diff --git a/.vsconfig b/.vsconfig new file mode 100644 index 00000000..f019fd0a --- /dev/null +++ b/.vsconfig @@ -0,0 +1,6 @@ +{ + "version": "1.0", + "components": [ + "Microsoft.VisualStudio.Workload.ManagedGame" + ] +} diff --git a/Assets/ADL-Plugins.meta b/Assets/ADL-Plugins.meta new file mode 100644 index 00000000..5ffcc014 --- /dev/null +++ b/Assets/ADL-Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: c47b285e8fe4b2248a2cad2a1a97bc15 +folderAsset: yes +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4.meta b/Assets/ADL-Plugins/LZ4.meta new file mode 100644 index 00000000..0ab40342 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 673e554486793784d92d2ef90b8dea5a +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf b/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf new file mode 100644 index 00000000..a416dd02 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf differ diff --git a/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf.meta b/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf.meta new file mode 100644 index 00000000..05c05fc6 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Instructions_LZ4.pdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3c160d3ac61ffb24280705bed0c10407 +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/LZ4Demo.unity b/Assets/ADL-Plugins/LZ4/LZ4Demo.unity new file mode 100644 index 00000000..f46551a2 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4Demo.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 0847c23f6299b08449f39502733f7805, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &448084245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 448084250} + - component: {fileID: 448084249} + - component: {fileID: 448084247} + - component: {fileID: 448084246} + - component: {fileID: 448084251} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &448084246 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 +--- !u!124 &448084247 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 +--- !u!20 &448084249 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.19852942, g: 0.17863621, b: 0.16057527, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &448084250 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &448084251 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 981c86a1b803d94408869e6ec746834a, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/LZ4/LZ4Demo.unity.meta b/Assets/ADL-Plugins/LZ4/LZ4Demo.unity.meta new file mode 100644 index 00000000..b2b37d05 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4Demo.unity.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: 91f0e133e0bfc794da70fc393c643d4e +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting b/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting new file mode 100644 index 00000000..8fcf9216 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: LZ4DemoSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting.meta b/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting.meta new file mode 100644 index 00000000..72d99af5 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0847c23f6299b08449f39502733f7805 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity new file mode 100644 index 00000000..2b616f6e --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 573b2714aeb9d2e4e8db669feb1ca633, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &448084245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 448084250} + - component: {fileID: 448084249} + - component: {fileID: 448084247} + - component: {fileID: 448084246} + - component: {fileID: 448084251} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &448084246 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 +--- !u!124 &448084247 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 +--- !u!20 &448084249 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.3455882, g: 0.25635213, b: 0.1753352, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &448084250 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &448084251 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 448084245} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ab3415a07d4720340bdbada4392e5a1d, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity.meta b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity.meta new file mode 100644 index 00000000..3dbef014 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOS.unity.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 085b09c1884d0e4439d0d764db99294c +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting new file mode 100644 index 00000000..60ce1a23 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: LZ4DemoWebGLtvOSSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting.meta b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting.meta new file mode 100644 index 00000000..fb267a9d --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/LZ4DemoWebGLtvOSSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 573b2714aeb9d2e4e8db669feb1ca633 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins.meta b/Assets/ADL-Plugins/LZ4/Plugins.meta new file mode 100644 index 00000000..802dfca1 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 2d260117c8a0ece4f828af94e62c153b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android.meta new file mode 100644 index 00000000..065a26c3 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 516ae443aec77514dbff9fa328ec083a +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs.meta new file mode 100644 index 00000000..827fac6a --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 92b3b193a934e2b4ca676c01c7dc5407 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a.meta new file mode 100644 index 00000000..710ddb31 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: ecfaac3a146ce634293499223bcd4472 +folderAsset: yes +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so new file mode 100644 index 00000000..c1f7f555 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so.meta new file mode 100644 index 00000000..0a3357cf --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/arm64-v8a/liblz4.so.meta @@ -0,0 +1,97 @@ +fileFormatVersion: 2 +guid: 150578e90870d6944922922c2e97a448 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARM64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a.meta new file mode 100644 index 00000000..b29a8584 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 0c4d3c932d67b214d929b9bd81687246 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so new file mode 100644 index 00000000..eed169b2 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so.meta new file mode 100644 index 00000000..9c156327 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/armeabi-v7a/liblz4.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: 35e1d6e4e143a4043883bd0b43358dc5 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86.meta new file mode 100644 index 00000000..ae24d8d2 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: fde2cd5749a38e54f8d0b3f05b20dbe0 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so new file mode 100644 index 00000000..a9d073ee Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so.meta new file mode 100644 index 00000000..510416ba --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86/liblz4.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: e7c00049e3663bb428c850799644cc33 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: x86 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64.meta new file mode 100644 index 00000000..ba566ecf --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 196223d89bc925b4c96c2a18314c57b4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so new file mode 100644 index 00000000..a0752c8d Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so.meta b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so.meta new file mode 100644 index 00000000..232bd905 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/Android/libs/x86_64/liblz4.so.meta @@ -0,0 +1,71 @@ +fileFormatVersion: 2 +guid: 35f97115a4906694e848b65c994e2a86 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86_64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs b/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs new file mode 100644 index 00000000..d4678ba6 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs @@ -0,0 +1,635 @@ +using System; +using System.IO; +using System.Runtime.InteropServices; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.Networking; + +public class LZ4 +{ +#if !UNITY_WEBPLAYER || UNITY_EDITOR + + internal static bool isle = BitConverter.IsLittleEndian; + +#if UNITY_5_4_OR_NEWER + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR || UNITY_EDITOR_LINUX + private const string libname = "lz4"; + #elif UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "liblz4"; + #endif +#else + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR + private const string libname = "lz4"; + #endif + #if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "liblz4"; + #endif +#endif + +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX + #if (!UNITY_WEBGL || UNITY_EDITOR) + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX)&& !UNITY_EDITOR_WIN + [DllImport(libname, EntryPoint = "z4setPermissions")] + internal static extern int z4setPermissions(string filePath, string _user, string _group, string _other); + #endif + [DllImport(libname, EntryPoint = "LZ4DecompressFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int LZ4DecompressFile(string inFile, string outFile, IntPtr bytes, IntPtr FileBuffer, int fileBufferLength); + + [DllImport(libname, EntryPoint = "LZ4CompressFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int LZ4CompressFile(string inFile, string outFile, int level, IntPtr percentage, ref float rate); + #endif + + [DllImport(libname, EntryPoint = "LZ4releaseBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void LZ4releaseBuffer(IntPtr buffer); + + [DllImport(libname, EntryPoint = "LZ4Create_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern IntPtr LZ4Create_Buffer(int size); + + [DllImport(libname, EntryPoint = "LZ4AddTo_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + private static extern void LZ4AddTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + + [DllImport(libname, EntryPoint = "LZ4CompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr LZ4CompressBuffer(IntPtr buffer, int bufferLength, ref int v, int level); + + [DllImport(libname, EntryPoint = "LZ4DecompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int LZ4DecompressBuffer(IntPtr buffer, IntPtr outbuffer, int bufferLength); +#endif + + +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) && !UNITY_EDITOR + #if (UNITY_IOS || UNITY_IPHONE) && !UNITY_WEBGL + [DllImport("__Internal")] + private static extern int z4setPermissions(string filePath, string _user, string _group, string _other); + [DllImport("__Internal")] + private static extern int LZ4DecompressFile(string inFile, string outFile, IntPtr bytes, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal")] + private static extern int LZ4CompressFile(string inFile, string outFile, int level, IntPtr percentage, ref float rate); + #endif + #if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) + [DllImport("__Internal")] + public static extern void LZ4releaseBuffer(IntPtr buffer); + [DllImport("__Internal")] + public static extern IntPtr LZ4Create_Buffer(int size); + [DllImport("__Internal")] + internal static extern void LZ4AddTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + [DllImport("__Internal")] + private static extern IntPtr LZ4CompressBuffer(IntPtr buffer, int bufferLength, ref int v, int level); + [DllImport("__Internal")] + private static extern int LZ4DecompressBuffer(IntPtr buffer, IntPtr outbuffer, int bufferLength); + #endif +#endif + + //Helper function + internal static GCHandle gcA(object o) { + return GCHandle.Alloc(o, GCHandleType.Pinned); + } + +#if ((!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR) + // set permissions of a file in user, group, other. + // Each string should contain any or all chars of "rwx". + // returns 0 on success + public static int setFilePermissions(string filePath, string _user, string _group, string _other){ + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX || UNITY_IOS || UNITY_TVOS || UNITY_IPHONE) && !UNITY_EDITOR_WIN + return z4setPermissions(filePath, _user, _group, _other); + #else + return -1; + #endif + } + + //Helper function + private static bool checkObject(object fileBuffer, string filePath, ref GCHandle fbuf, ref IntPtr fileBufferPointer, ref int fileBufferLength) { + if(fileBuffer is byte[]) { byte[] tempBuf = (byte[])fileBuffer; fbuf = gcA(tempBuf); fileBufferPointer = fbuf.AddrOfPinnedObject(); fileBufferLength = tempBuf.Length; return true; } + if(fileBuffer is IntPtr) { fileBufferPointer = (IntPtr)fileBuffer; fileBufferLength = Convert.ToInt32(filePath); } + return false; + } + + //Compress a file to LZ4. + // + //Full paths to the files should be provided. + //level: level of compression (1 - 9). + //returns: rate of compression. + //progress: provide a single item float array to get the progress of the compression in real time. (only when called from a thread/task) + // + public static float compress(string inFile, string outFile, int level, float[] progress) { + if (level < 1) level = 1; + if (level > 9) level = 9; + float rate = 0; + if(progress == null) progress = new float[1]; + progress[0] = 0; + GCHandle ibuf = GCHandle.Alloc(progress, GCHandleType.Pinned); + + int res = LZ4CompressFile(@inFile, @outFile, level, ibuf.AddrOfPinnedObject(), ref rate); + + ibuf.Free(); + if (res != 0) return -1; + return rate; + } + + //Decompress an LZ4 file. + // + //Full paths to the files should be provided. + //returns: 0 on success. + //bytes: provide a single item ulong array to get the bytes currently decompressed in real time. (only when called from a thread/task) + // fileBuffer : A buffer that holds an LZ4 file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: downloadLZ4FileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the inFile parameter! + // + public static int decompress(string inFile, string outFile, ulong[] bytes, object fileBuffer = null) { + if(bytes == null) bytes = new ulong[1]; + bytes[0] = 0; + int res = 0; + GCHandle ibuf = GCHandle.Alloc(bytes , GCHandleType.Pinned); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, inFile, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + + if (!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return -5; } + + res = LZ4DecompressFile(null, @outFile, ibuf.AddrOfPinnedObject(), fileBufferPointer, fileBufferLength); + + fbuf.Free(); + ibuf.Free(); + return res; + } + #endif + res =LZ4DecompressFile(@inFile, @outFile, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); + return res; + } + +#endif + + + + + //Compress a byte buffer in LZ4 format. + // + //inBuffer: the uncompressed buffer. + //outBuffer: a referenced buffer that will be resized to fit the lz4 compressed data. + //level: level of compression (1 - 9). + //includeSize: include the uncompressed size of the buffer in the resulted compressed one because lz4 does not include this. + //returns true on success + // + public static bool compressBuffer(byte[] inBuffer, ref byte[] outBuffer, int level, bool includeSize = true) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int res = 0, size = 0; + byte[] bsiz = null; + + //if the uncompressed size of the buffer should be included. This is a hack since lz4 lib does not support this. + if (includeSize){ + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!isle) Array.Reverse(bsiz); + } + + if (level < 1) level = 1; + if (level > 9) level = 9; + + ptr = LZ4CompressBuffer(cbuf.AddrOfPinnedObject(), inBuffer.Length, ref res, level); + + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { LZ4releaseBuffer(ptr); return false; } + + System.Array.Resize(ref outBuffer, res + size); + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i+res] = bsiz[i]; /*Debug.Log(BitConverter.ToInt32(bsiz, 0));*/ } + + Marshal.Copy(ptr, outBuffer, 0, res ); + + LZ4releaseBuffer(ptr); + bsiz = null; + return true; + } + + + + //Compress a byte buffer in LZ4 format and return a new buffer compressed. + // + //inBuffer: the uncompressed buffer. + //level: level of compression (1 - 9). + //includeSize: include the uncompressed size of the buffer in the resulted compressed one because lz4 does not include this. + //returns: a new buffer with the compressed data. + // + public static byte[] compressBuffer(byte[] inBuffer, int level, bool includeSize = true) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int res = 0, size = 0; + byte[] bsiz = null; + + //if the uncompressed size of the buffer should be included. This is a hack since lz4 lib does not support this. + if (includeSize){ + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!isle) Array.Reverse(bsiz); + } + + if (level < 1) level = 1; + if (level > 9) level = 9; + + ptr = LZ4CompressBuffer(cbuf.AddrOfPinnedObject(), inBuffer.Length, ref res, level); + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { LZ4releaseBuffer(ptr); return null; } + + byte[] outBuffer = new byte[res + size]; + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i + res] = bsiz[i]; /*Debug.Log(BitConverter.ToInt32(bsiz, 0));*/ } + + Marshal.Copy(ptr, outBuffer, 0, res); + + LZ4releaseBuffer(ptr); + bsiz = null; + + return outBuffer; + } + + + //Compress a byte buffer in LZ4 format at a specific position of a fixed size outBuffer + // + //inBuffer: the uncompressed buffer. + //outBuffer: a referenced buffer of fixed size that could have already some lz4 compressed buffers stored. + //outBufferPartialIndex: the position at which the compressed data will be written to. + //level: level of compression (1 - 9). + // + //returns compressed size (+4 bytes if footer is used) + // + public static int compressBufferPartialFixed (byte[] inBuffer, ref byte[] outBuffer,int outBufferPartialIndex, int level, bool includeSize = true) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int res = 0, size = 0; + byte[] bsiz = null; + + //if the uncompressed size of the buffer should be included. This is a hack since lz4 lib does not support this. + if (includeSize){ + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!isle) Array.Reverse(bsiz); + } + + if (level < 1) level = 1; + if (level > 9) level = 9; + + ptr = LZ4CompressBuffer(cbuf.AddrOfPinnedObject(), inBuffer.Length, ref res, level); + + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { LZ4releaseBuffer(ptr); return 0; } + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[outBufferPartialIndex + res + i ] = bsiz[i]; } + + Marshal.Copy(ptr, outBuffer, outBufferPartialIndex, res ); + + LZ4releaseBuffer(ptr); + bsiz = null; + return res + size; + } + + + //compressedBufferSize: compressed size of the buffer to be decompressed + //partialIndex: position of an lz4 compressed buffer + // + //returns the uncompressed size + public static int decompressBufferPartialFixed (byte[] inBuffer, ref byte[] outBuffer, int partialIndex , int compressedBufferSize, bool safe = true, bool useFooter = true, int customLength = 0) { + + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + + int uncompressedSize = 0; + + //be carefull with this. You must know exactly where your compressed data lies in the inBuffer + int res2 = partialIndex + compressedBufferSize; + + + //if the hacked in LZ4 footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter){ + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } + else{ + uncompressedSize = customLength; + } + + //Check if the uncompressed size is bigger then the size of the fixed buffer. Then: + //1. write only the data that fit in it. + //2. or return a negative number. + //It depends on if we set the safe flag to true or not. + if(uncompressedSize > outBuffer.Length) { + if(safe) return -101; else uncompressedSize = outBuffer.Length; + } + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + IntPtr ptrPartial; + ptrPartial = new IntPtr(cbuf.AddrOfPinnedObject().ToInt64() + partialIndex); + + //res should be the compressed size + LZ4DecompressBuffer(ptrPartial, obuf.AddrOfPinnedObject(), uncompressedSize); + + cbuf.Free(); + obuf.Free(); + + return uncompressedSize; + } + + + //Decompress an lz4 compressed buffer to a referenced buffer. + // + //inBuffer: the lz4 compressed buffer + //outBuffer: a referenced buffer that will be resized to store the uncompressed data. + //useFooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the usefooter is used! + //returns true on success + // + public static bool decompressBuffer(byte[] inBuffer, ref byte[] outBuffer, bool useFooter = true, int customLength = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + //if the hacked in LZ4 footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter){ + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } + else{ + uncompressedSize = customLength; + } + + System.Array.Resize(ref outBuffer, uncompressedSize); + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + //res should be the compressed size + int res = LZ4DecompressBuffer(cbuf.AddrOfPinnedObject(), obuf.AddrOfPinnedObject(), uncompressedSize); + + cbuf.Free(); + obuf.Free(); + + if (res != res2) { /*Debug.Log("ERROR: " + res.ToString());*/ return false; } + + return true; + } + + //Decompress an lz4 compressed buffer to a referenced fixed size buffer. + // + //inBuffer: the lz4 compressed buffer + //outBuffer: a referenced fixed size buffer where the data will get decompressed + //usefooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the usefooter is used! + //returns uncompressedSize + // + public static int decompressBufferFixed(byte[] inBuffer, ref byte[] outBuffer, bool safe = true, bool useFooter = true, int customLength = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + //if the hacked in LZ4 footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter){ + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } + else{ + uncompressedSize = customLength; + } + + //Check if the uncompressed size is bigger then the size of the fixed buffer. Then: + //1. write only the data that fit in it. + //2. or return a negative number. + //It depends on if we set the safe flag to true or not. + if(uncompressedSize > outBuffer.Length) { + if(safe) return -101; else uncompressedSize = outBuffer.Length; + } + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + //res should be the compressed size + int res = LZ4DecompressBuffer(cbuf.AddrOfPinnedObject(), obuf.AddrOfPinnedObject(), uncompressedSize); + + cbuf.Free(); + obuf.Free(); + + if(safe) { + if (res != res2) { /*Debug.Log("ERROR: " + res.ToString());*/ return -101; } + } + + return uncompressedSize; + } + + + //Decompress an lz4 compressed buffer to a new buffer. + // + //inBuffer: the lz4 compressed buffer + //useFooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the usefooter is used! + //returns: a new buffer with the uncompressed data. + // + public static byte[] decompressBuffer(byte[] inBuffer, bool useFooter = true, int customLength = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + //if the hacked in LZ4 footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter) + { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } + else + { + uncompressedSize = customLength; + } + + byte[] outBuffer = new byte[uncompressedSize]; + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + //res should be the compressed size + int res = LZ4DecompressBuffer(cbuf.AddrOfPinnedObject(), obuf.AddrOfPinnedObject(), uncompressedSize); + + cbuf.Free(); + obuf.Free(); + + if (res != res2) { /*Debug.Log("ERROR: " + res.ToString());*/ return null; } + + return outBuffer; + } + + // A reusable native memory pointer for downloading files. + public static IntPtr nativeBuffer = IntPtr.Zero; + public static bool nativeBufferIsBeingUsed = false; + public static int nativeOffset = 0; + + // A Coroutine to dowload a file to a native/unmaged memory buffer. + // You can call it for an IntPtr. + // + // + // This function can only be called for one file at a time. Don't use it to call multiple files at once. + // + // This is useful to avoid memory spikes when downloading large files and intend to decompress from memory. + // With the old method, a copy of the downloaded file to memory would be produced by pinning the buffer to memory. + // Now with this method, it is downloaded to memory and can be manipulated with no memory spikes. + // + // In any case, if you don't need the created in-Memory file, you should use the LZ4.LZ4releaseBuffer function to free the memory! + // + // Parameters: + // + // url: The url of the file you want to download to a native memory buffer. + // downloadDone: Informs a bool that the download of the file to memory is done. + // pointer: An IntPtr for a native memory buffer + // fileSize: The size of the downloaded file will be returned here. + public static IEnumerator downloadLZ4FileNative(string url, Action downloadDone, Action pointer = null, Action fileSize = null) { + // Get the file lenght first, so we create a correct size native memory buffer. + UnityWebRequest wr = UnityWebRequest.Head(url); + + nativeBufferIsBeingUsed = true; + + yield return wr.SendWebRequest(); + string size = wr.GetResponseHeader("Content-Length"); + + nativeBufferIsBeingUsed = false; + + #if UNITY_2020_1_OR_NEWER + if (wr.result == UnityWebRequest.Result.ConnectionError || wr.result == UnityWebRequest.Result.ProtocolError) { + #else + if (wr.isNetworkError || wr.isHttpError) { + #endif + Debug.LogError("Error While Getting Length: " + wr.error); + } else { + if (!nativeBufferIsBeingUsed) { + + //get the size of the zip + int zipSize = Convert.ToInt32(size); + + // If the zip size is larger then 0 + if (zipSize > 0) { + + nativeBuffer = LZ4Create_Buffer(zipSize); + nativeBufferIsBeingUsed = true; + + // buffer for the download + byte[] bytes = new byte[2048]; + nativeOffset = 0; + + using (UnityWebRequest wwwSK = UnityWebRequest.Get(url)) { + + // Here we call our custom webrequest function to download our archive to a native memory buffer. + wwwSK.downloadHandler = new CustomWebRequest4(bytes); + + yield return wwwSK.SendWebRequest(); + + if (wwwSK.error != null) { + Debug.Log(wwwSK.error); + } else { + downloadDone(true); + + if(pointer != null) { pointer(nativeBuffer); fileSize(zipSize); } + + //reset intermediate buffer params. + nativeBufferIsBeingUsed = false; + nativeOffset = 0; + nativeBuffer = IntPtr.Zero; + + //Debug.Log("Custom download done"); + } + } + + } + + } else { Debug.LogError("Native buffer is being used, or not yet freed!"); } + } + } + + + // A custom WebRequest Override to download data to a native-unmanaged memory buffer. + public class CustomWebRequest4 : DownloadHandlerScript { + + public CustomWebRequest4() + : base() + { + } + + public CustomWebRequest4(byte[] buffer) + : base(buffer) + { + } + + protected override byte[] GetData() { return null; } + + + protected override bool ReceiveData(byte[] bytesFromServer, int dataLength) { + if (bytesFromServer == null || bytesFromServer.Length < 1) { + Debug.Log("CustomWebRequest: Received a null/empty buffer"); + return false; + } + + var pbuf = gcA(bytesFromServer); + + //Process byteFromServer + LZ4AddTo_Buffer(nativeBuffer, nativeOffset, pbuf.AddrOfPinnedObject(), dataLength ); + nativeOffset += dataLength; + pbuf.Free(); + + return true; + } + + // Use the below functions only when needed. You get the same functionality from the main coroutine. + /* + // If all data has been received from the server + protected override void CompleteContent() + { + //Debug.Log(Download Complete."); + } + + // If a Content-Length header is received from the server. + protected override void ReceiveContentLength(int fileLength) + { + //Debug.Log("ReceiveContentLength: " + fileLength); + } + */ + } + +#endif +} diff --git a/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs.meta b/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs.meta new file mode 100644 index 00000000..7208c765 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/LZ4.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: 7f2aff91fc4b7a5478086149224b1d30 +timeCreated: 1553412858 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL.meta new file mode 100644 index 00000000..737edf0b --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 0e70a6eaee266b246af755bee6eb5452 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp.meta new file mode 100644 index 00000000..79831922 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 19b593114c441f349b1510ae835c8ef8 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp new file mode 100644 index 00000000..832f7b78 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp @@ -0,0 +1,1485 @@ + +/************************************** +* Tuning parameters +**************************************/ +/* + * HEAPMODE : + * Select how default compression functions will allocate memory for their hash table, + * in memory stack (0:default, fastest), or in memory heap (1:requires malloc()). + */ +#define HEAPMODE 0 + +/* + * ACCELERATION_DEFAULT : + * Select "acceleration" for LZ3__compress_fast() when parameter value <= 0 + */ +#define ACCELERATION_DEFAULT 1 + + +/************************************** +* CPU Feature Detection +**************************************/ +/* + * LZ3__FORCE_SW_BITCOUNT + * Define this parameter if your target system or compiler does not support hardware bit count + */ +#if defined(_MSC_VER) && defined(_WIN32_WCE) /* Visual Studio for Windows CE does not support Hardware bit count */ +# define LZ3__FORCE_SW_BITCOUNT +#endif + + +/************************************** +* Includes +**************************************/ +#include "lz4.h" + + +/************************************** +* Compiler Options +**************************************/ +#ifdef _MSC_VER /* Visual Studio */ +# define FORCE_INLINE static __forceinline +# include +# pragma warning(disable : 4127) /* disable: C4127: conditional expression is constant */ +# pragma warning(disable : 4293) /* disable: C4293: too large shift (32-bits) */ +#else +# if defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */ +# if defined(__GNUC__) || defined(__clang__) +# define FORCE_INLINE static inline __attribute__((always_inline)) +# else +# define FORCE_INLINE static inline +# endif +# else +# define FORCE_INLINE static +# endif /* __STDC_VERSION__ */ +#endif /* _MSC_VER */ + +/* LZ3__GCC_VERSION is defined into lz3.h */ +#if (LZ3__GCC_VERSION >= 302) || (__INTEL_COMPILER >= 800) || defined(__clang__) +# define expect(expr,value) (__builtin_expect ((expr),(value)) ) +#else +# define expect(expr,value) (expr) +#endif + +#define likely(expr) expect((expr) != 0, 1) +#define unlikely(expr) expect((expr) != 0, 0) + + +/************************************** +* Memory routines +**************************************/ +#include /* malloc, calloc, free */ +#define ALLOCATOR(n,s) calloc(n,s) +#define FREEMEM free +#include /* memset, memcpy */ +#define MEM_INIT memset + + +/************************************** +* Basic Types +**************************************/ +#if defined (__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */ +# include + typedef uint8_t BYTE; + typedef uint16_t U16; + typedef uint32_t U32; + typedef int32_t S32; + typedef uint64_t U64; +#else + typedef unsigned char BYTE; + typedef unsigned short U16; + typedef unsigned int U32; + typedef signed int S32; + typedef unsigned long long U64; +#endif + + +/************************************** +* Reading and writing into memory +**************************************/ +#define STEPSIZE sizeof(size_t) + +static unsigned LZ3__64bits(void) { return sizeof(void*)==8; } + +static unsigned LZ3__isLittleEndian(void) +{ + const union { U32 i; BYTE c[4]; } one = { 1 }; /* don't use static : performance detrimental */ + return one.c[0]; +} + + +static U16 LZ3__read16(const void* memPtr) +{ + U16 val16; + memcpy(&val16, memPtr, 2); + return val16; +} + +static U16 LZ3__readLE16(const void* memPtr) +{ + if (LZ3__isLittleEndian()) + { + return LZ3__read16(memPtr); + } + else + { + const BYTE* p = (const BYTE*)memPtr; + return (U16)((U16)p[0] + (p[1]<<8)); + } +} + +static void LZ3__writeLE16(void* memPtr, U16 value) +{ + if (LZ3__isLittleEndian()) + { + memcpy(memPtr, &value, 2); + } + else + { + BYTE* p = (BYTE*)memPtr; + p[0] = (BYTE) value; + p[1] = (BYTE)(value>>8); + } +} + +static U32 LZ3__read32(const void* memPtr) +{ + U32 val32; + memcpy(&val32, memPtr, 4); + return val32; +} + +static U64 LZ3__read64(const void* memPtr) +{ + U64 val64; + memcpy(&val64, memPtr, 8); + return val64; +} + +static size_t LZ3__read_ARCH(const void* p) +{ + if (LZ3__64bits()) + return (size_t)LZ3__read64(p); + else + return (size_t)LZ3__read32(p); +} + + +static void LZ3__copy4(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 4); } + +static void LZ3__copy8(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 8); } + +/* customized version of memcpy, which may overwrite up to 7 bytes beyond dstEnd */ +static void LZ3__wildCopy(void* dstPtr, const void* srcPtr, void* dstEnd) +{ + BYTE* d = (BYTE*)dstPtr; + const BYTE* s = (const BYTE*)srcPtr; + BYTE* e = (BYTE*)dstEnd; + do { LZ3__copy8(d,s); d+=8; s+=8; } while (d>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctzll((U64)val) >> 3); +# else + static const int DeBruijnBytePos[64] = { 0, 0, 0, 0, 0, 1, 1, 2, 0, 3, 1, 3, 1, 4, 2, 7, 0, 2, 3, 6, 1, 5, 3, 5, 1, 3, 4, 4, 2, 5, 6, 7, 7, 0, 1, 2, 3, 3, 4, 6, 2, 6, 5, 5, 3, 4, 5, 6, 7, 1, 2, 4, 6, 4, 4, 5, 7, 2, 6, 5, 7, 6, 7, 7 }; + return DeBruijnBytePos[((U64)((val & -(long long)val) * 0x0218A392CDABBD3FULL)) >> 58]; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r; + _BitScanForward( &r, (U32)val ); + return (int)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctz((U32)val) >> 3); +# else + static const int DeBruijnBytePos[32] = { 0, 0, 3, 0, 3, 1, 3, 0, 3, 2, 2, 1, 3, 2, 0, 1, 3, 3, 1, 2, 2, 2, 2, 0, 3, 1, 2, 0, 1, 0, 1, 1 }; + return DeBruijnBytePos[((U32)((val & -(S32)val) * 0x077CB531U)) >> 27]; +# endif + } + } + else /* Big Endian CPU */ + { + if (LZ3__64bits()) + { +# if defined(_MSC_VER) && defined(_WIN64) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse64( &r, val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clzll((U64)val) >> 3); +# else + unsigned r; + if (!(val>>32)) { r=4; } else { r=0; val>>=32; } + if (!(val>>16)) { r+=2; val>>=8; } else { val>>=24; } + r += (!val); + return r; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse( &r, (unsigned long)val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clz((U32)val) >> 3); +# else + unsigned r; + if (!(val>>16)) { r=2; val>>=8; } else { r=0; val>>=24; } + r += (!val); + return r; +# endif + } + } +} + +static unsigned LZ3__count(const BYTE* pIn, const BYTE* pMatch, const BYTE* pInLimit) +{ + const BYTE* const pStart = pIn; + + while (likely(pIn compression run slower on incompressible data */ + + +/************************************** +* Local Structures and types +**************************************/ +typedef struct { + U32 hashTable[HASH_SIZE_U32]; + U32 currentOffset; + U32 initCheck; + const BYTE* dictionary; + BYTE* bufferStart; /* obsolete, used for slideInputBuffer */ + U32 dictSize; +} LZ3__stream_t_internal; + +typedef enum { notLimited = 0, limitedOutput = 1 } limitedOutput_directive; +typedef enum { byPtr, byU32, byU16 } tableType_t; + +typedef enum { noDict = 0, withPrefix64k, usingExtDict } dict_directive; +typedef enum { noDictIssue = 0, dictSmall } dictIssue_directive; + +typedef enum { endOnOutputSize = 0, endOnInputSize = 1 } endCondition_directive; +typedef enum { full = 0, partial = 1 } earlyEnd_directive; + + +#define LZ3__COMPRESSBOUND(isize) ((unsigned)(isize) > (unsigned)LZ3__MAX_INPUT_SIZE ? 0 : (isize) + ((isize)/255) + 16) +int LZ3__compressBound(int inputSize); +/************************************** +* Local Utils +**************************************/ +int LZ3__versionNumber (void) { return LZ3__VERSION_NUMBER; } +int LZ3__compressBound(int isize) { return LZ3__COMPRESSBOUND(isize); } +int LZ3__sizeofState() { return LZ3__STREAMSIZE; } + +// + + +/******************************** +* Compression functions +********************************/ + +static U32 LZ3__hashSequence(U32 sequence, tableType_t const tableType) +{ + if (tableType == byU16) + return (((sequence) * 2654435761U) >> ((MINMATCH*8)-(LZ3__HASHLOG+1))); + else + return (((sequence) * 2654435761U) >> ((MINMATCH*8)-LZ3__HASHLOG)); +} + +static const U64 prime5bytes = 889523592379ULL; +static U32 LZ3__hashSequence64(size_t sequence, tableType_t const tableType) +{ + const U32 hashLog = (tableType == byU16) ? LZ3__HASHLOG+1 : LZ3__HASHLOG; + const U32 hashMask = (1<> (40 - hashLog)) & hashMask; +} + +static U32 LZ3__hashSequenceT(size_t sequence, tableType_t const tableType) +{ + if (LZ3__64bits()) + return LZ3__hashSequence64(sequence, tableType); + return LZ3__hashSequence((U32)sequence, tableType); +} + +static U32 LZ3__hashPosition(const void* p, tableType_t tableType) { return LZ3__hashSequenceT(LZ3__read_ARCH(p), tableType); } + +static void LZ3__putPositionOnHash(const BYTE* p, U32 h, void* tableBase, tableType_t const tableType, const BYTE* srcBase) +{ + switch (tableType) + { + case byPtr: { const BYTE** hashTable = (const BYTE**)tableBase; hashTable[h] = p; return; } + case byU32: { U32* hashTable = (U32*) tableBase; hashTable[h] = (U32)(p-srcBase); return; } + case byU16: { U16* hashTable = (U16*) tableBase; hashTable[h] = (U16)(p-srcBase); return; } + } +} + +static void LZ3__putPosition(const BYTE* p, void* tableBase, tableType_t tableType, const BYTE* srcBase) +{ + U32 h = LZ3__hashPosition(p, tableType); + LZ3__putPositionOnHash(p, h, tableBase, tableType, srcBase); +} + +static const BYTE* LZ3__getPositionOnHash(U32 h, void* tableBase, tableType_t tableType, const BYTE* srcBase) +{ + if (tableType == byPtr) { const BYTE** hashTable = (const BYTE**) tableBase; return hashTable[h]; } + if (tableType == byU32) { U32* hashTable = (U32*) tableBase; return hashTable[h] + srcBase; } + { U16* hashTable = (U16*) tableBase; return hashTable[h] + srcBase; } /* default, to ensure a return */ +} + +static const BYTE* LZ3__getPosition(const BYTE* p, void* tableBase, tableType_t tableType, const BYTE* srcBase) +{ + U32 h = LZ3__hashPosition(p, tableType); + return LZ3__getPositionOnHash(h, tableBase, tableType, srcBase); +} + +FORCE_INLINE int LZ3__compress_generic( + void* const ctx, + const char* const source, + char* const dest, + const int inputSize, + const int maxOutputSize, + const limitedOutput_directive outputLimited, + const tableType_t tableType, + const dict_directive dict, + const dictIssue_directive dictIssue, + const U32 acceleration) +{ + LZ3__stream_t_internal* const dictPtr = (LZ3__stream_t_internal*)ctx; + + const BYTE* ip = (const BYTE*) source; + const BYTE* base; + const BYTE* lowLimit; + const BYTE* const lowRefLimit = ip - dictPtr->dictSize; + const BYTE* const dictionary = dictPtr->dictionary; + const BYTE* const dictEnd = dictionary + dictPtr->dictSize; + const size_t dictDelta = dictEnd - (const BYTE*)source; + const BYTE* anchor = (const BYTE*) source; + const BYTE* const iend = ip + inputSize; + const BYTE* const mflimit = iend - MFLIMIT; + const BYTE* const matchlimit = iend - LASTLITERALS; + + BYTE* op = (BYTE*) dest; + BYTE* const olimit = op + maxOutputSize; + + U32 forwardH; + size_t refDelta=0; + + /* Init conditions */ + if ((U32)inputSize > (U32)LZ3__MAX_INPUT_SIZE) return 0; /* Unsupported input size, too large (or negative) */ + switch(dict) + { + case noDict: + default: + base = (const BYTE*)source; + lowLimit = (const BYTE*)source; + break; + case withPrefix64k: + base = (const BYTE*)source - dictPtr->currentOffset; + lowLimit = (const BYTE*)source - dictPtr->dictSize; + break; + case usingExtDict: + base = (const BYTE*)source - dictPtr->currentOffset; + lowLimit = (const BYTE*)source; + break; + } + if ((tableType == byU16) && (inputSize>=LZ3__64Klimit)) return 0; /* Size too large (not within 64K limit) */ + if (inputSize> LZ3__skipTrigger); + + if (unlikely(forwardIp > mflimit)) goto _last_literals; + + match = LZ3__getPositionOnHash(h, ctx, tableType, base); + if (dict==usingExtDict) + { + if (match<(const BYTE*)source) + { + refDelta = dictDelta; + lowLimit = dictionary; + } + else + { + refDelta = 0; + lowLimit = (const BYTE*)source; + } + } + forwardH = LZ3__hashPosition(forwardIp, tableType); + LZ3__putPositionOnHash(ip, h, ctx, tableType, base); + + } while ( ((dictIssue==dictSmall) ? (match < lowRefLimit) : 0) + || ((tableType==byU16) ? 0 : (match + MAX_DISTANCE < ip)) + || (LZ3__read32(match+refDelta) != LZ3__read32(ip)) ); + } + + /* Catch up */ + while ((ip>anchor) && (match+refDelta > lowLimit) && (unlikely(ip[-1]==match[refDelta-1]))) { ip--; match--; } + + { + /* Encode Literal length */ + unsigned litLength = (unsigned)(ip - anchor); + token = op++; + if ((outputLimited) && (unlikely(op + litLength + (2 + 1 + LASTLITERALS) + (litLength/255) > olimit))) + return 0; /* Check output limit */ + if (litLength>=RUN_MASK) + { + int len = (int)litLength-RUN_MASK; + *token=(RUN_MASK<= 255 ; len-=255) *op++ = 255; + *op++ = (BYTE)len; + } + else *token = (BYTE)(litLength< matchlimit) limit = matchlimit; + matchLength = LZ3__count(ip+MINMATCH, match+MINMATCH, limit); + ip += MINMATCH + matchLength; + if (ip==limit) + { + unsigned more = LZ3__count(ip, (const BYTE*)source, matchlimit); + matchLength += more; + ip += more; + } + } + else + { + matchLength = LZ3__count(ip+MINMATCH, match+MINMATCH, matchlimit); + ip += MINMATCH + matchLength; + } + + if ((outputLimited) && (unlikely(op + (1 + LASTLITERALS) + (matchLength>>8) > olimit))) + return 0; /* Check output limit */ + if (matchLength>=ML_MASK) + { + *token += ML_MASK; + matchLength -= ML_MASK; + for (; matchLength >= 510 ; matchLength-=510) { *op++ = 255; *op++ = 255; } + if (matchLength >= 255) { matchLength-=255; *op++ = 255; } + *op++ = (BYTE)matchLength; + } + else *token += (BYTE)(matchLength); + } + + anchor = ip; + + /* Test end of chunk */ + if (ip > mflimit) break; + + /* Fill table */ + LZ3__putPosition(ip-2, ctx, tableType, base); + + /* Test next position */ + match = LZ3__getPosition(ip, ctx, tableType, base); + if (dict==usingExtDict) + { + if (match<(const BYTE*)source) + { + refDelta = dictDelta; + lowLimit = dictionary; + } + else + { + refDelta = 0; + lowLimit = (const BYTE*)source; + } + } + LZ3__putPosition(ip, ctx, tableType, base); + if ( ((dictIssue==dictSmall) ? (match>=lowRefLimit) : 1) + && (match+MAX_DISTANCE>=ip) + && (LZ3__read32(match+refDelta)==LZ3__read32(ip)) ) + { token=op++; *token=0; goto _next_match; } + + /* Prepare next loop */ + forwardH = LZ3__hashPosition(++ip, tableType); + } + +_last_literals: + /* Encode Last Literals */ + { + const size_t lastRun = (size_t)(iend - anchor); + if ((outputLimited) && ((op - (BYTE*)dest) + lastRun + 1 + ((lastRun+255-RUN_MASK)/255) > (U32)maxOutputSize)) + return 0; /* Check output limit */ + if (lastRun >= RUN_MASK) + { + size_t accumulator = lastRun - RUN_MASK; + *op++ = RUN_MASK << ML_BITS; + for(; accumulator >= 255 ; accumulator-=255) *op++ = 255; + *op++ = (BYTE) accumulator; + } + else + { + *op++ = (BYTE)(lastRun<= LZ3__compressBound(inputSize)) + { + if (inputSize < LZ3__64Klimit) + return LZ3__compress_generic(state, source, dest, inputSize, 0, notLimited, byU16, noDict, noDictIssue, acceleration); + else + return LZ3__compress_generic(state, source, dest, inputSize, 0, notLimited, LZ3__64bits() ? byU32 : byPtr, noDict, noDictIssue, acceleration); + } + else + { + if (inputSize < LZ3__64Klimit) + return LZ3__compress_generic(state, source, dest, inputSize, maxOutputSize, limitedOutput, byU16, noDict, noDictIssue, acceleration); + else + return LZ3__compress_generic(state, source, dest, inputSize, maxOutputSize, limitedOutput, LZ3__64bits() ? byU32 : byPtr, noDict, noDictIssue, acceleration); + } +} + + +int LZ3__compress_fast(const char* source, char* dest, int inputSize, int maxOutputSize, int acceleration) +{ +#if (HEAPMODE) + void* ctxPtr = ALLOCATOR(1, sizeof(LZ3__stream_t)); /* malloc-calloc always properly aligned */ +#else + LZ3__stream_t ctx; + void* ctxPtr = &ctx; +#endif + + int result = LZ3__compress_fast_extState(ctxPtr, source, dest, inputSize, maxOutputSize, acceleration); + +#if (HEAPMODE) + FREEMEM(ctxPtr); +#endif + return result; +} + + +int LZ3__compress_default(const char* source, char* dest, int inputSize, int maxOutputSize) +{ + return LZ3__compress_fast(source, dest, inputSize, maxOutputSize, 1); +} + + +/* hidden debug function */ +/* strangely enough, gcc generates faster code when this function is uncommented, even if unused */ +int LZ3__compress_fast_force(const char* source, char* dest, int inputSize, int maxOutputSize, int acceleration) +{ + LZ3__stream_t ctx; + + LZ3__resetStream(&ctx); + + if (inputSize < LZ3__64Klimit) + return LZ3__compress_generic(&ctx, source, dest, inputSize, maxOutputSize, limitedOutput, byU16, noDict, noDictIssue, acceleration); + else + return LZ3__compress_generic(&ctx, source, dest, inputSize, maxOutputSize, limitedOutput, LZ3__64bits() ? byU32 : byPtr, noDict, noDictIssue, acceleration); +} + + +/******************************** +* destSize variant +********************************/ + +static int LZ3__compress_destSize_generic( + void* const ctx, + const char* const src, + char* const dst, + int* const srcSizePtr, + const int targetDstSize, + const tableType_t tableType) +{ + const BYTE* ip = (const BYTE*) src; + const BYTE* base = (const BYTE*) src; + const BYTE* lowLimit = (const BYTE*) src; + const BYTE* anchor = ip; + const BYTE* const iend = ip + *srcSizePtr; + const BYTE* const mflimit = iend - MFLIMIT; + const BYTE* const matchlimit = iend - LASTLITERALS; + + BYTE* op = (BYTE*) dst; + BYTE* const oend = op + targetDstSize; + BYTE* const oMaxLit = op + targetDstSize - 2 /* offset */ - 8 /* because 8+MINMATCH==MFLIMIT */ - 1 /* token */; + BYTE* const oMaxMatch = op + targetDstSize - (LASTLITERALS + 1 /* token */); + BYTE* const oMaxSeq = oMaxLit - 1 /* token */; + + U32 forwardH; + + + /* Init conditions */ + if (targetDstSize < 1) return 0; /* Impossible to store anything */ + if ((U32)*srcSizePtr > (U32)LZ3__MAX_INPUT_SIZE) return 0; /* Unsupported input size, too large (or negative) */ + if ((tableType == byU16) && (*srcSizePtr>=LZ3__64Klimit)) return 0; /* Size too large (not within 64K limit) */ + if (*srcSizePtr> LZ3__skipTrigger); + + if (unlikely(forwardIp > mflimit)) + goto _last_literals; + + match = LZ3__getPositionOnHash(h, ctx, tableType, base); + forwardH = LZ3__hashPosition(forwardIp, tableType); + LZ3__putPositionOnHash(ip, h, ctx, tableType, base); + + } while ( ((tableType==byU16) ? 0 : (match + MAX_DISTANCE < ip)) + || (LZ3__read32(match) != LZ3__read32(ip)) ); + } + + /* Catch up */ + while ((ip>anchor) && (match > lowLimit) && (unlikely(ip[-1]==match[-1]))) { ip--; match--; } + + { + /* Encode Literal length */ + unsigned litLength = (unsigned)(ip - anchor); + token = op++; + if (op + ((litLength+240)/255) + litLength > oMaxLit) + { + /* Not enough space for a last match */ + op--; + goto _last_literals; + } + if (litLength>=RUN_MASK) + { + unsigned len = litLength - RUN_MASK; + *token=(RUN_MASK<= 255 ; len-=255) *op++ = 255; + *op++ = (BYTE)len; + } + else *token = (BYTE)(litLength< oMaxMatch) + { + /* Match description too long : reduce it */ + matchLength = (15-1) + (oMaxMatch-op) * 255; + } + //printf("offset %5i, matchLength%5i \n", (int)(ip-match), matchLength + MINMATCH); + ip += MINMATCH + matchLength; + + if (matchLength>=ML_MASK) + { + *token += ML_MASK; + matchLength -= ML_MASK; + while (matchLength >= 255) { matchLength-=255; *op++ = 255; } + *op++ = (BYTE)matchLength; + } + else *token += (BYTE)(matchLength); + } + + anchor = ip; + + /* Test end of block */ + if (ip > mflimit) break; + if (op > oMaxSeq) break; + + /* Fill table */ + LZ3__putPosition(ip-2, ctx, tableType, base); + + /* Test next position */ + match = LZ3__getPosition(ip, ctx, tableType, base); + LZ3__putPosition(ip, ctx, tableType, base); + if ( (match+MAX_DISTANCE>=ip) + && (LZ3__read32(match)==LZ3__read32(ip)) ) + { token=op++; *token=0; goto _next_match; } + + /* Prepare next loop */ + forwardH = LZ3__hashPosition(++ip, tableType); + } + +_last_literals: + /* Encode Last Literals */ + { + size_t lastRunSize = (size_t)(iend - anchor); + if (op + 1 /* token */ + ((lastRunSize+240)/255) /* litLength */ + lastRunSize /* literals */ > oend) + { + /* adapt lastRunSize to fill 'dst' */ + lastRunSize = (oend-op) - 1; + lastRunSize -= (lastRunSize+240)/255; + } + ip = anchor + lastRunSize; + + if (lastRunSize >= RUN_MASK) + { + size_t accumulator = lastRunSize - RUN_MASK; + *op++ = RUN_MASK << ML_BITS; + for(; accumulator >= 255 ; accumulator-=255) *op++ = 255; + *op++ = (BYTE) accumulator; + } + else + { + *op++ = (BYTE)(lastRunSize<= LZ3__compressBound(*srcSizePtr)) /* compression success is guaranteed */ + { + return LZ3__compress_fast_extState(state, src, dst, *srcSizePtr, targetDstSize, 1); + } + else + { + if (*srcSizePtr < LZ3__64Klimit) + return LZ3__compress_destSize_generic(state, src, dst, srcSizePtr, targetDstSize, byU16); + else + return LZ3__compress_destSize_generic(state, src, dst, srcSizePtr, targetDstSize, LZ3__64bits() ? byU32 : byPtr); + } +} + + +int LZ3__compress_destSize(const char* src, char* dst, int* srcSizePtr, int targetDstSize) +{ +#if (HEAPMODE) + void* ctx = ALLOCATOR(1, sizeof(LZ3__stream_t)); /* malloc-calloc always properly aligned */ +#else + LZ3__stream_t ctxBody; + void* ctx = &ctxBody; +#endif + + int result = LZ3__compress_destSize_extState(ctx, src, dst, srcSizePtr, targetDstSize); + +#if (HEAPMODE) + FREEMEM(ctx); +#endif + return result; +} + + + +/******************************** +* Streaming functions +********************************/ + +LZ3__stream_t* LZ3__createStream(void) +{ + LZ3__stream_t* lz3s = (LZ3__stream_t*)ALLOCATOR(8, LZ3__STREAMSIZE_U64); + LZ3__STATIC_ASSERT(LZ3__STREAMSIZE >= sizeof(LZ3__stream_t_internal)); /* A compilation error here means LZ3__STREAMSIZE is not large enough */ + LZ3__resetStream(lz3s); + return lz3s; +} + +void LZ3__resetStream (LZ3__stream_t* LZ3__stream) +{ + MEM_INIT(LZ3__stream, 0, sizeof(LZ3__stream_t)); +} + +int LZ3__freeStream (LZ3__stream_t* LZ3__stream) +{ + FREEMEM(LZ3__stream); + return (0); +} + + +#define HASH_UNIT sizeof(size_t) +int LZ3__loadDict (LZ3__stream_t* LZ3__dict, const char* dictionary, int dictSize) +{ + LZ3__stream_t_internal* dict = (LZ3__stream_t_internal*) LZ3__dict; + const BYTE* p = (const BYTE*)dictionary; + const BYTE* const dictEnd = p + dictSize; + const BYTE* base; + + if ((dict->initCheck) || (dict->currentOffset > 1 GB)) /* Uninitialized structure, or reuse overflow */ + LZ3__resetStream(LZ3__dict); + + if (dictSize < (int)HASH_UNIT) + { + dict->dictionary = NULL; + dict->dictSize = 0; + return 0; + } + + if ((dictEnd - p) > 64 KB) p = dictEnd - 64 KB; + dict->currentOffset += 64 KB; + base = p - dict->currentOffset; + dict->dictionary = p; + dict->dictSize = (U32)(dictEnd - p); + dict->currentOffset += dict->dictSize; + + while (p <= dictEnd-HASH_UNIT) + { + LZ3__putPosition(p, dict->hashTable, byU32, base); + p+=3; + } + + return dict->dictSize; +} + + +static void LZ3__renormDictT(LZ3__stream_t_internal* LZ3__dict, const BYTE* src) +{ + if ((LZ3__dict->currentOffset > 0x80000000) || + ((size_t)LZ3__dict->currentOffset > (size_t)src)) /* address space overflow */ + { + /* rescale hash table */ + U32 delta = LZ3__dict->currentOffset - 64 KB; + const BYTE* dictEnd = LZ3__dict->dictionary + LZ3__dict->dictSize; + int i; + for (i=0; ihashTable[i] < delta) LZ3__dict->hashTable[i]=0; + else LZ3__dict->hashTable[i] -= delta; + } + LZ3__dict->currentOffset = 64 KB; + if (LZ3__dict->dictSize > 64 KB) LZ3__dict->dictSize = 64 KB; + LZ3__dict->dictionary = dictEnd - LZ3__dict->dictSize; + } +} + + +int LZ3__compress_fast_continue (LZ3__stream_t* LZ3__stream, const char* source, char* dest, int inputSize, int maxOutputSize, int acceleration) +{ + LZ3__stream_t_internal* streamPtr = (LZ3__stream_t_internal*)LZ3__stream; + const BYTE* const dictEnd = streamPtr->dictionary + streamPtr->dictSize; + + const BYTE* smallest = (const BYTE*) source; + if (streamPtr->initCheck) return 0; /* Uninitialized structure detected */ + if ((streamPtr->dictSize>0) && (smallest>dictEnd)) smallest = dictEnd; + LZ3__renormDictT(streamPtr, smallest); + if (acceleration < 1) acceleration = ACCELERATION_DEFAULT; + + /* Check overlapping input/dictionary space */ + { + const BYTE* sourceEnd = (const BYTE*) source + inputSize; + if ((sourceEnd > streamPtr->dictionary) && (sourceEnd < dictEnd)) + { + streamPtr->dictSize = (U32)(dictEnd - sourceEnd); + if (streamPtr->dictSize > 64 KB) streamPtr->dictSize = 64 KB; + if (streamPtr->dictSize < 4) streamPtr->dictSize = 0; + streamPtr->dictionary = dictEnd - streamPtr->dictSize; + } + } + + /* prefix mode : source data follows dictionary */ + if (dictEnd == (const BYTE*)source) + { + int result; + if ((streamPtr->dictSize < 64 KB) && (streamPtr->dictSize < streamPtr->currentOffset)) + result = LZ3__compress_generic(LZ3__stream, source, dest, inputSize, maxOutputSize, limitedOutput, byU32, withPrefix64k, dictSmall, acceleration); + else + result = LZ3__compress_generic(LZ3__stream, source, dest, inputSize, maxOutputSize, limitedOutput, byU32, withPrefix64k, noDictIssue, acceleration); + streamPtr->dictSize += (U32)inputSize; + streamPtr->currentOffset += (U32)inputSize; + return result; + } + + /* external dictionary mode */ + { + int result; + if ((streamPtr->dictSize < 64 KB) && (streamPtr->dictSize < streamPtr->currentOffset)) + result = LZ3__compress_generic(LZ3__stream, source, dest, inputSize, maxOutputSize, limitedOutput, byU32, usingExtDict, dictSmall, acceleration); + else + result = LZ3__compress_generic(LZ3__stream, source, dest, inputSize, maxOutputSize, limitedOutput, byU32, usingExtDict, noDictIssue, acceleration); + streamPtr->dictionary = (const BYTE*)source; + streamPtr->dictSize = (U32)inputSize; + streamPtr->currentOffset += (U32)inputSize; + return result; + } +} + + +/* Hidden debug function, to force external dictionary mode */ +int LZ3__compress_forceExtDict (LZ3__stream_t* LZ3__dict, const char* source, char* dest, int inputSize) +{ + LZ3__stream_t_internal* streamPtr = (LZ3__stream_t_internal*)LZ3__dict; + int result; + const BYTE* const dictEnd = streamPtr->dictionary + streamPtr->dictSize; + + const BYTE* smallest = dictEnd; + if (smallest > (const BYTE*) source) smallest = (const BYTE*) source; + LZ3__renormDictT((LZ3__stream_t_internal*)LZ3__dict, smallest); + + result = LZ3__compress_generic(LZ3__dict, source, dest, inputSize, 0, notLimited, byU32, usingExtDict, noDictIssue, 1); + + streamPtr->dictionary = (const BYTE*)source; + streamPtr->dictSize = (U32)inputSize; + streamPtr->currentOffset += (U32)inputSize; + + return result; +} + + +int LZ3__saveDict (LZ3__stream_t* LZ3__dict, char* safeBuffer, int dictSize) +{ + LZ3__stream_t_internal* dict = (LZ3__stream_t_internal*) LZ3__dict; + const BYTE* previousDictEnd = dict->dictionary + dict->dictSize; + + if ((U32)dictSize > 64 KB) dictSize = 64 KB; /* useless to define a dictionary > 64 KB */ + if ((U32)dictSize > dict->dictSize) dictSize = dict->dictSize; + + memmove(safeBuffer, previousDictEnd - dictSize, dictSize); + + dict->dictionary = (const BYTE*)safeBuffer; + dict->dictSize = (U32)dictSize; + + return dictSize; +} + + + +/******************************* +* Decompression functions +*******************************/ +/* + * This generic decompression function cover all use cases. + * It shall be instantiated several times, using different sets of directives + * Note that it is essential this generic function is really inlined, + * in order to remove useless branches during compilation optimization. + */ +FORCE_INLINE int LZ3__decompress_generic( + const char* const source, + char* const dest, + int inputSize, + int outputSize, /* If endOnInput==endOnInputSize, this value is the max size of Output Buffer. */ + + int endOnInput, /* endOnOutputSize, endOnInputSize */ + int partialDecoding, /* full, partial */ + int targetOutputSize, /* only used if partialDecoding==partial */ + int dict, /* noDict, withPrefix64k, usingExtDict */ + const BYTE* const lowPrefix, /* == dest if dict == noDict */ + const BYTE* const dictStart, /* only if dict==usingExtDict */ + const size_t dictSize /* note : = 0 if noDict */ + ) +{ + /* Local Variables */ + const BYTE* ip = (const BYTE*) source; + const BYTE* const iend = ip + inputSize; + + BYTE* op = (BYTE*) dest; + BYTE* const oend = op + outputSize; + BYTE* cpy; + BYTE* oexit = op + targetOutputSize; + const BYTE* const lowLimit = lowPrefix - dictSize; + + const BYTE* const dictEnd = (const BYTE*)dictStart + dictSize; + const size_t dec32table[] = {4, 1, 2, 1, 4, 4, 4, 4}; + const size_t dec64table[] = {0, 0, 0, (size_t)-1, 0, 1, 2, 3}; + + const int safeDecode = (endOnInput==endOnInputSize); + const int checkOffset = ((safeDecode) && (dictSize < (int)(64 KB))); + + + /* Special cases */ + if ((partialDecoding) && (oexit> oend-MFLIMIT)) oexit = oend-MFLIMIT; /* targetOutputSize too high => decode everything */ + if ((endOnInput) && (unlikely(outputSize==0))) return ((inputSize==1) && (*ip==0)) ? 0 : -1; /* Empty output buffer */ + if ((!endOnInput) && (unlikely(outputSize==0))) return (*ip==0?1:-1); + + + /* Main Loop */ + while (1) + { + unsigned token; + size_t length; + const BYTE* match; + + /* get literal length */ + token = *ip++; + if ((length=(token>>ML_BITS)) == RUN_MASK) + { + unsigned s; + do + { + s = *ip++; + length += s; + } + while (likely((endOnInput)?ip(partialDecoding?oexit:oend-MFLIMIT)) || (ip+length>iend-(2+1+LASTLITERALS))) ) + || ((!endOnInput) && (cpy>oend-COPYLENGTH))) + { + if (partialDecoding) + { + if (cpy > oend) goto _output_error; /* Error : write attempt beyond end of output buffer */ + if ((endOnInput) && (ip+length > iend)) goto _output_error; /* Error : read attempt beyond end of input buffer */ + } + else + { + if ((!endOnInput) && (cpy != oend)) goto _output_error; /* Error : block decoding must stop exactly there */ + if ((endOnInput) && ((ip+length != iend) || (cpy > oend))) goto _output_error; /* Error : input must be consumed */ + } + memcpy(op, ip, length); + ip += length; + op += length; + break; /* Necessarily EOF, due to parsing restrictions */ + } + LZ3__wildCopy(op, ip, cpy); + ip += length; op = cpy; + + /* get offset */ + match = cpy - LZ3__readLE16(ip); ip+=2; + if ((checkOffset) && (unlikely(match < lowLimit))) goto _output_error; /* Error : offset outside destination buffer */ + + /* get matchlength */ + length = token & ML_MASK; + if (length == ML_MASK) + { + unsigned s; + do + { + if ((endOnInput) && (ip > iend-LASTLITERALS)) goto _output_error; + s = *ip++; + length += s; + } while (s==255); + if ((safeDecode) && unlikely((size_t)(op+length)<(size_t)op)) goto _output_error; /* overflow detection */ + } + length += MINMATCH; + + /* check external dictionary */ + if ((dict==usingExtDict) && (match < lowPrefix)) + { + if (unlikely(op+length > oend-LASTLITERALS)) goto _output_error; /* doesn't respect parsing restriction */ + + if (length <= (size_t)(lowPrefix-match)) + { + /* match can be copied as a single segment from external dictionary */ + match = dictEnd - (lowPrefix-match); + memmove(op, match, length); op += length; + } + else + { + /* match encompass external dictionary and current segment */ + size_t copySize = (size_t)(lowPrefix-match); + memcpy(op, dictEnd - copySize, copySize); + op += copySize; + copySize = length - copySize; + if (copySize > (size_t)(op-lowPrefix)) /* overlap within current segment */ + { + BYTE* const endOfMatch = op + copySize; + const BYTE* copyFrom = lowPrefix; + while (op < endOfMatch) *op++ = *copyFrom++; + } + else + { + memcpy(op, lowPrefix, copySize); + op += copySize; + } + } + continue; + } + + /* copy repeated sequence */ + cpy = op + length; + if (unlikely((op-match)<8)) + { + const size_t dec64 = dec64table[op-match]; + op[0] = match[0]; + op[1] = match[1]; + op[2] = match[2]; + op[3] = match[3]; + match += dec32table[op-match]; + LZ3__copy4(op+4, match); + op += 8; match -= dec64; + } else { LZ3__copy8(op, match); op+=8; match+=8; } + + if (unlikely(cpy>oend-12)) + { + if (cpy > oend-LASTLITERALS) goto _output_error; /* Error : last LASTLITERALS bytes must be literals */ + if (op < oend-8) + { + LZ3__wildCopy(op, match, oend-8); + match += (oend-8) - op; + op = oend-8; + } + while (opprefixSize = (size_t) dictSize; + lz3sd->prefixEnd = (const BYTE*) dictionary + dictSize; + lz3sd->externalDict = NULL; + lz3sd->extDictSize = 0; + return 1; +} + +/* +*_continue() : + These decoding functions allow decompression of multiple blocks in "streaming" mode. + Previously decoded blocks must still be available at the memory position where they were decoded. + If it's not possible, save the relevant part of decoded data into a safe buffer, + and indicate where it stands using LZ3__setStreamDecode() +*/ +int LZ3__decompress_safe_continue (LZ3__streamDecode_t* LZ3__streamDecode, const char* source, char* dest, int compressedSize, int maxOutputSize) +{ + LZ3__streamDecode_t_internal* lz3sd = (LZ3__streamDecode_t_internal*) LZ3__streamDecode; + int result; + + if (lz3sd->prefixEnd == (BYTE*)dest) + { + result = LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, + endOnInputSize, full, 0, + usingExtDict, lz3sd->prefixEnd - lz3sd->prefixSize, lz3sd->externalDict, lz3sd->extDictSize); + if (result <= 0) return result; + lz3sd->prefixSize += result; + lz3sd->prefixEnd += result; + } + else + { + lz3sd->extDictSize = lz3sd->prefixSize; + lz3sd->externalDict = lz3sd->prefixEnd - lz3sd->extDictSize; + result = LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, + endOnInputSize, full, 0, + usingExtDict, (BYTE*)dest, lz3sd->externalDict, lz3sd->extDictSize); + if (result <= 0) return result; + lz3sd->prefixSize = result; + lz3sd->prefixEnd = (BYTE*)dest + result; + } + + return result; +} + +int LZ3__decompress_fast_continue (LZ3__streamDecode_t* LZ3__streamDecode, const char* source, char* dest, int originalSize) +{ + LZ3__streamDecode_t_internal* lz3sd = (LZ3__streamDecode_t_internal*) LZ3__streamDecode; + int result; + + if (lz3sd->prefixEnd == (BYTE*)dest) + { + result = LZ3__decompress_generic(source, dest, 0, originalSize, + endOnOutputSize, full, 0, + usingExtDict, lz3sd->prefixEnd - lz3sd->prefixSize, lz3sd->externalDict, lz3sd->extDictSize); + if (result <= 0) return result; + lz3sd->prefixSize += originalSize; + lz3sd->prefixEnd += originalSize; + } + else + { + lz3sd->extDictSize = lz3sd->prefixSize; + lz3sd->externalDict = (BYTE*)dest - lz3sd->extDictSize; + result = LZ3__decompress_generic(source, dest, 0, originalSize, + endOnOutputSize, full, 0, + usingExtDict, (BYTE*)dest, lz3sd->externalDict, lz3sd->extDictSize); + if (result <= 0) return result; + lz3sd->prefixSize = originalSize; + lz3sd->prefixEnd = (BYTE*)dest + originalSize; + } + + return result; +} + + +/* +Advanced decoding functions : +*_usingDict() : + These decoding functions work the same as "_continue" ones, + the dictionary must be explicitly provided within parameters +*/ + +FORCE_INLINE int LZ3__decompress_usingDict_generic(const char* source, char* dest, int compressedSize, int maxOutputSize, int safe, const char* dictStart, int dictSize) +{ + if (dictSize==0) + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, safe, full, 0, noDict, (BYTE*)dest, NULL, 0); + if (dictStart+dictSize == dest) + { + if (dictSize >= (int)(64 KB - 1)) + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, safe, full, 0, withPrefix64k, (BYTE*)dest-64 KB, NULL, 0); + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, safe, full, 0, noDict, (BYTE*)dest-dictSize, NULL, 0); + } + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, safe, full, 0, usingExtDict, (BYTE*)dest, (const BYTE*)dictStart, dictSize); +} + +int LZ3__decompress_safe_usingDict(const char* source, char* dest, int compressedSize, int maxOutputSize, const char* dictStart, int dictSize) +{ + return LZ3__decompress_usingDict_generic(source, dest, compressedSize, maxOutputSize, 1, dictStart, dictSize); +} + +int LZ3__decompress_fast_usingDict(const char* source, char* dest, int originalSize, const char* dictStart, int dictSize) +{ + return LZ3__decompress_usingDict_generic(source, dest, 0, originalSize, 0, dictStart, dictSize); +} + +/* debug function */ +int LZ3__decompress_safe_forceExtDict(const char* source, char* dest, int compressedSize, int maxOutputSize, const char* dictStart, int dictSize) +{ + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, endOnInputSize, full, 0, usingExtDict, (BYTE*)dest, (const BYTE*)dictStart, dictSize); +} + + +/*************************************************** +* Obsolete Functions +***************************************************/ +/* obsolete compression functions */ +int LZ3__compress_limitedOutput(const char* source, char* dest, int inputSize, int maxOutputSize) { return LZ3__compress_default(source, dest, inputSize, maxOutputSize); } +int LZ3__compress(const char* source, char* dest, int inputSize) { return LZ3__compress_default(source, dest, inputSize, LZ3__compressBound(inputSize)); } +int LZ3__compress_limitedOutput_withState (void* state, const char* src, char* dst, int srcSize, int dstSize) { return LZ3__compress_fast_extState(state, src, dst, srcSize, dstSize, 1); } +int LZ3__compress_withState (void* state, const char* src, char* dst, int srcSize) { return LZ3__compress_fast_extState(state, src, dst, srcSize, LZ3__compressBound(srcSize), 1); } +int LZ3__compress_limitedOutput_continue (LZ3__stream_t* LZ3__stream, const char* src, char* dst, int srcSize, int maxDstSize) { return LZ3__compress_fast_continue(LZ3__stream, src, dst, srcSize, maxDstSize, 1); } +int LZ3__compress_continue (LZ3__stream_t* LZ3__stream, const char* source, char* dest, int inputSize) { return LZ3__compress_fast_continue(LZ3__stream, source, dest, inputSize, LZ3__compressBound(inputSize), 1); } + +/* +These function names are deprecated and should no longer be used. +They are only provided here for compatibility with older user programs. +- LZ3__uncompress is totally equivalent to LZ3__decompress_fast +- LZ3__uncompress_unknownOutputSize is totally equivalent to LZ3__decompress_safe +*/ +int LZ3__uncompress (const char* source, char* dest, int outputSize) { return LZ3__decompress_fast(source, dest, outputSize); } +int LZ3__uncompress_unknownOutputSize (const char* source, char* dest, int isize, int maxOutputSize) { return LZ3__decompress_safe(source, dest, isize, maxOutputSize); } + + +/* Obsolete Streaming functions */ + +int LZ3__sizeofStreamState() { return LZ3__STREAMSIZE; } + +static void LZ3__init(LZ3__stream_t_internal* lz3ds, BYTE* base) +{ + MEM_INIT(lz3ds, 0, LZ3__STREAMSIZE); + lz3ds->bufferStart = base; +} + +int LZ3__resetStreamState(void* state, char* inputBuffer) +{ + if ((((size_t)state) & 3) != 0) return 1; /* Error : pointer is not aligned on 4-bytes boundary */ + LZ3__init((LZ3__stream_t_internal*)state, (BYTE*)inputBuffer); + return 0; +} + +void* LZ3__create (char* inputBuffer) +{ + void* lz3ds = ALLOCATOR(8, LZ3__STREAMSIZE_U64); + LZ3__init ((LZ3__stream_t_internal*)lz3ds, (BYTE*)inputBuffer); + return lz3ds; +} + +char* LZ3__slideInputBuffer (void* LZ3__Data) +{ + LZ3__stream_t_internal* ctx = (LZ3__stream_t_internal*)LZ3__Data; + int dictSize = LZ3__saveDict((LZ3__stream_t*)LZ3__Data, (char*)ctx->bufferStart, 64 KB); + return (char*)(ctx->bufferStart + dictSize); +} + +/* Obsolete streaming decompression functions */ + +int LZ3__decompress_safe_withPrefix64k(const char* source, char* dest, int compressedSize, int maxOutputSize) +{ + return LZ3__decompress_generic(source, dest, compressedSize, maxOutputSize, endOnInputSize, full, 0, withPrefix64k, (BYTE*)dest - 64 KB, NULL, 64 KB); +} + +int LZ3__decompress_fast_withPrefix64k(const char* source, char* dest, int originalSize) +{ + return LZ3__decompress_generic(source, dest, 0, originalSize, endOnOutputSize, full, 0, withPrefix64k, (BYTE*)dest - 64 KB, NULL, 64 KB); +} + +#endif /* LZ3__COMMONDEFS_ONLY */ + diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp.meta new file mode 100644 index 00000000..91b0ec85 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.cpp.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 3feaddf74316e0c4680d550568d8e111 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h new file mode 100644 index 00000000..137748d4 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h @@ -0,0 +1,360 @@ +/* + LZ3 - Fast LZ compression algorithm + Header File + Copyright (C) 2011-2015, Yann Collet. + + BSD 2-Clause License (http://www.opensource.org/licenses/bsd-license.php) + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following disclaimer + in the documentation and/or other materials provided with the + distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + You can contact the author at : + - LZ3 source repository : https://github.com/Cyan4973/lz3 + - LZ3 public forum : https://groups.google.com/forum/#!forum/lz3c +*/ +#pragma once + +#if defined (__cplusplus) +extern "C" { +#endif + +/* + * lz3.h provides block compression functions, and gives full buffer control to programmer. + * If you need to generate inter-operable compressed data (respecting LZ3 frame specification), + * and can let the library handle its own memory, please use lz3frame.h instead. +*/ + +/************************************** +* Version +**************************************/ +#define LZ3__VERSION_MAJOR 1 /* for breaking interface changes */ +#define LZ3__VERSION_MINOR 7 /* for new (non-breaking) interface capabilities */ +#define LZ3__VERSION_RELEASE 1 /* for tweaks, bug-fixes, or development */ +#define LZ3__VERSION_NUMBER (LZ3__VERSION_MAJOR *100*100 + LZ3__VERSION_MINOR *100 + LZ3__VERSION_RELEASE) +int LZ3__versionNumber (void); + +/************************************** +* Tuning parameter +**************************************/ +/* + * LZ3__MEMORY_USAGE : + * Memory usage formula : N->2^N Bytes (examples : 10 -> 1KB; 12 -> 4KB ; 16 -> 64KB; 20 -> 1MB; etc.) + * Increasing memory usage improves compression ratio + * Reduced memory usage can improve speed, due to cache effect + * Default value is 14, for 16KB, which nicely fits into Intel x86 L1 cache + */ +#define LZ3__MEMORY_USAGE 14 + + +/************************************** +* Simple Functions +**************************************/ + +int LZ3__compress_default(const char* source, char* dest, int sourceSize, int maxDestSize); +int LZ3__decompress_safe (const char* source, char* dest, int compressedSize, int maxDecompressedSize); + +/* +LZ3__compress_default() : + Compresses 'sourceSize' bytes from buffer 'source' + into already allocated 'dest' buffer of size 'maxDestSize'. + Compression is guaranteed to succeed if 'maxDestSize' >= LZ3__compressBound(sourceSize). + It also runs faster, so it's a recommended setting. + If the function cannot compress 'source' into a more limited 'dest' budget, + compression stops *immediately*, and the function result is zero. + As a consequence, 'dest' content is not valid. + This function never writes outside 'dest' buffer, nor read outside 'source' buffer. + sourceSize : Max supported value is LZ3__MAX_INPUT_VALUE + maxDestSize : full or partial size of buffer 'dest' (which must be already allocated) + return : the number of bytes written into buffer 'dest' (necessarily <= maxOutputSize) + or 0 if compression fails + +LZ3__decompress_safe() : + compressedSize : is the precise full size of the compressed block. + maxDecompressedSize : is the size of destination buffer, which must be already allocated. + return : the number of bytes decompressed into destination buffer (necessarily <= maxDecompressedSize) + If destination buffer is not large enough, decoding will stop and output an error code (<0). + If the source stream is detected malformed, the function will stop decoding and return a negative result. + This function is protected against buffer overflow exploits, including malicious data packets. + It never writes outside output buffer, nor reads outside input buffer. +*/ + + +/************************************** +* Advanced Functions +**************************************/ +#define LZ3__MAX_INPUT_SIZE 0x7E000000 /* 2 113 929 216 bytes */ +//#define LZ3__COMPRESSBOUND(isize) ((unsigned)(isize) > (unsigned)LZ3__MAX_INPUT_SIZE ? 0 : (isize) + ((isize)/255) + 16) + +/* +LZ3__compressBound() : + Provides the maximum size that LZ3 compression may output in a "worst case" scenario (input data not compressible) + This function is primarily useful for memory allocation purposes (destination buffer size). + Macro LZ3__COMPRESSBOUND() is also provided for compilation-time evaluation (stack memory allocation for example). + Note that LZ3__compress_default() compress faster when dest buffer size is >= LZ3__compressBound(srcSize) + inputSize : max supported value is LZ3__MAX_INPUT_SIZE + return : maximum output size in a "worst case" scenario + or 0, if input size is too large ( > LZ3__MAX_INPUT_SIZE) +*/ +//int LZ3__compressBound(int inputSize); + +/* +LZ3__compress_fast() : + Same as LZ3__compress_default(), but allows to select an "acceleration" factor. + The larger the acceleration value, the faster the algorithm, but also the lesser the compression. + It's a trade-off. It can be fine tuned, with each successive value providing roughly +~3% to speed. + An acceleration value of "1" is the same as regular LZ3__compress_default() + Values <= 0 will be replaced by ACCELERATION_DEFAULT (see lz3.c), which is 1. +*/ +int LZ3__compress_fast (const char* source, char* dest, int sourceSize, int maxDestSize, int acceleration); + + +/* +LZ3__compress_fast_extState() : + Same compression function, just using an externally allocated memory space to store compression state. + Use LZ3__sizeofState() to know how much memory must be allocated, + and allocate it on 8-bytes boundaries (using malloc() typically). + Then, provide it as 'void* state' to compression function. +*/ +int LZ3__sizeofState(void); +int LZ3__compress_fast_extState (void* state, const char* source, char* dest, int inputSize, int maxDestSize, int acceleration); + + +/* +LZ3__compress_destSize() : + Reverse the logic, by compressing as much data as possible from 'source' buffer + into already allocated buffer 'dest' of size 'targetDestSize'. + This function either compresses the entire 'source' content into 'dest' if it's large enough, + or fill 'dest' buffer completely with as much data as possible from 'source'. + *sourceSizePtr : will be modified to indicate how many bytes where read from 'source' to fill 'dest'. + New value is necessarily <= old value. + return : Nb bytes written into 'dest' (necessarily <= targetDestSize) + or 0 if compression fails +*/ +int LZ3__compress_destSize (const char* source, char* dest, int* sourceSizePtr, int targetDestSize); + + +/* +LZ3__decompress_fast() : + originalSize : is the original and therefore uncompressed size + return : the number of bytes read from the source buffer (in other words, the compressed size) + If the source stream is detected malformed, the function will stop decoding and return a negative result. + Destination buffer must be already allocated. Its size must be a minimum of 'originalSize' bytes. + note : This function fully respect memory boundaries for properly formed compressed data. + It is a bit faster than LZ3__decompress_safe(). + However, it does not provide any protection against intentionally modified data stream (malicious input). + Use this function in trusted environment only (data to decode comes from a trusted source). +*/ +int LZ3__decompress_fast (const char* source, char* dest, int originalSize); + +/* +LZ3__decompress_safe_partial() : + This function decompress a compressed block of size 'compressedSize' at position 'source' + into destination buffer 'dest' of size 'maxDecompressedSize'. + The function tries to stop decompressing operation as soon as 'targetOutputSize' has been reached, + reducing decompression time. + return : the number of bytes decoded in the destination buffer (necessarily <= maxDecompressedSize) + Note : this number can be < 'targetOutputSize' should the compressed block to decode be smaller. + Always control how many bytes were decoded. + If the source stream is detected malformed, the function will stop decoding and return a negative result. + This function never writes outside of output buffer, and never reads outside of input buffer. It is therefore protected against malicious data packets +*/ +int LZ3__decompress_safe_partial (const char* source, char* dest, int compressedSize, int targetOutputSize, int maxDecompressedSize); + + +/*********************************************** +* Streaming Compression Functions +***********************************************/ +#define LZ3__STREAMSIZE_U64 ((1 << (LZ3__MEMORY_USAGE-3)) + 4) +#define LZ3__STREAMSIZE (LZ3__STREAMSIZE_U64 * sizeof(long long)) +/* + * LZ3__stream_t + * information structure to track an LZ3 stream. + * important : init this structure content before first use ! + * note : only allocated directly the structure if you are statically linking LZ3 + * If you are using liblz3 as a DLL, please use below construction methods instead. + */ +typedef struct { long long table[LZ3__STREAMSIZE_U64]; } LZ3__stream_t; + +/* + * LZ3__resetStream + * Use this function to init an allocated LZ3__stream_t structure + */ +void LZ3__resetStream (LZ3__stream_t* streamPtr); + +/* + * LZ3__createStream will allocate and initialize an LZ3__stream_t structure + * LZ3__freeStream releases its memory. + * In the context of a DLL (liblz3), please use these methods rather than the static struct. + * They are more future proof, in case of a change of LZ3__stream_t size. + */ +LZ3__stream_t* LZ3__createStream(void); +int LZ3__freeStream (LZ3__stream_t* streamPtr); + +/* + * LZ3__loadDict + * Use this function to load a static dictionary into LZ3__stream. + * Any previous data will be forgotten, only 'dictionary' will remain in memory. + * Loading a size of 0 is allowed. + * Return : dictionary size, in bytes (necessarily <= 64 KB) + */ +int LZ3__loadDict (LZ3__stream_t* streamPtr, const char* dictionary, int dictSize); + +/* + * LZ3__compress_fast_continue + * Compress buffer content 'src', using data from previously compressed blocks as dictionary to improve compression ratio. + * Important : Previous data blocks are assumed to still be present and unmodified ! + * 'dst' buffer must be already allocated. + * If maxDstSize >= LZ3__compressBound(srcSize), compression is guaranteed to succeed, and runs faster. + * If not, and if compressed data cannot fit into 'dst' buffer size, compression stops, and function returns a zero. + */ +int LZ3__compress_fast_continue (LZ3__stream_t* streamPtr, const char* src, char* dst, int srcSize, int maxDstSize, int acceleration); + +/* + * LZ3__saveDict + * If previously compressed data block is not guaranteed to remain available at its memory location + * save it into a safer place (char* safeBuffer) + * Note : you don't need to call LZ3__loadDict() afterwards, + * dictionary is immediately usable, you can therefore call LZ3__compress_fast_continue() + * Return : saved dictionary size in bytes (necessarily <= dictSize), or 0 if error + */ +int LZ3__saveDict (LZ3__stream_t* streamPtr, char* safeBuffer, int dictSize); + + +/************************************************ +* Streaming Decompression Functions +************************************************/ + +#define LZ3__STREAMDECODESIZE_U64 4 +#define LZ3__STREAMDECODESIZE (LZ3__STREAMDECODESIZE_U64 * sizeof(unsigned long long)) +typedef struct { unsigned long long table[LZ3__STREAMDECODESIZE_U64]; } LZ3__streamDecode_t; +/* + * LZ3__streamDecode_t + * information structure to track an LZ3 stream. + * init this structure content using LZ3__setStreamDecode or memset() before first use ! + * + * In the context of a DLL (liblz3) please prefer usage of construction methods below. + * They are more future proof, in case of a change of LZ3__streamDecode_t size in the future. + * LZ3__createStreamDecode will allocate and initialize an LZ3__streamDecode_t structure + * LZ3__freeStreamDecode releases its memory. + */ +LZ3__streamDecode_t* LZ3__createStreamDecode(void); +int LZ3__freeStreamDecode (LZ3__streamDecode_t* LZ3__stream); + +/* + * LZ3__setStreamDecode + * Use this function to instruct where to find the dictionary. + * Setting a size of 0 is allowed (same effect as reset). + * Return : 1 if OK, 0 if error + */ +int LZ3__setStreamDecode (LZ3__streamDecode_t* LZ3__streamDecode, const char* dictionary, int dictSize); + +/* +*_continue() : + These decoding functions allow decompression of multiple blocks in "streaming" mode. + Previously decoded blocks *must* remain available at the memory position where they were decoded (up to 64 KB) + In the case of a ring buffers, decoding buffer must be either : + - Exactly same size as encoding buffer, with same update rule (block boundaries at same positions) + In which case, the decoding & encoding ring buffer can have any size, including very small ones ( < 64 KB). + - Larger than encoding buffer, by a minimum of maxBlockSize more bytes. + maxBlockSize is implementation dependent. It's the maximum size you intend to compress into a single block. + In which case, encoding and decoding buffers do not need to be synchronized, + and encoding ring buffer can have any size, including small ones ( < 64 KB). + - _At least_ 64 KB + 8 bytes + maxBlockSize. + In which case, encoding and decoding buffers do not need to be synchronized, + and encoding ring buffer can have any size, including larger than decoding buffer. + Whenever these conditions are not possible, save the last 64KB of decoded data into a safe buffer, + and indicate where it is saved using LZ3__setStreamDecode() +*/ +int LZ3__decompress_safe_continue (LZ3__streamDecode_t* LZ3__streamDecode, const char* source, char* dest, int compressedSize, int maxDecompressedSize); +int LZ3__decompress_fast_continue (LZ3__streamDecode_t* LZ3__streamDecode, const char* source, char* dest, int originalSize); + + +/* +Advanced decoding functions : +*_usingDict() : + These decoding functions work the same as + a combination of LZ3__setStreamDecode() followed by LZ3__decompress_x_continue() + They are stand-alone. They don't need nor update an LZ3__streamDecode_t structure. +*/ +int LZ3__decompress_safe_usingDict (const char* source, char* dest, int compressedSize, int maxDecompressedSize, const char* dictStart, int dictSize); +int LZ3__decompress_fast_usingDict (const char* source, char* dest, int originalSize, const char* dictStart, int dictSize); + + + +/************************************** +* Obsolete Functions +**************************************/ +/* Deprecate Warnings */ +/* Should these warnings messages be a problem, + it is generally possible to disable them, + with -Wno-deprecated-declarations for gcc + or _CRT_SECURE_NO_WARNINGS in Visual for example. + You can also define LZ3__DEPRECATE_WARNING_DEFBLOCK. */ +#ifndef LZ3__DEPRECATE_WARNING_DEFBLOCK +# define LZ3__DEPRECATE_WARNING_DEFBLOCK +# define LZ3__GCC_VERSION (__GNUC__ * 100 + __GNUC_MINOR__) +# if (LZ3__GCC_VERSION >= 405) || defined(__clang__) +# define LZ3__DEPRECATED(message) __attribute__((deprecated(message))) +# elif (LZ3__GCC_VERSION >= 301) +# define LZ3__DEPRECATED(message) __attribute__((deprecated)) +# elif defined(_MSC_VER) +# define LZ3__DEPRECATED(message) __declspec(deprecated(message)) +# else +# pragma message("WARNING: You need to implement LZ3__DEPRECATED for this compiler") +# define LZ3__DEPRECATED(message) +# endif +#endif /* LZ3__DEPRECATE_WARNING_DEFBLOCK */ + +/* Obsolete compression functions */ +/* These functions are planned to start generate warnings by r131 approximately */ +int LZ3__compress (const char* source, char* dest, int sourceSize); +int LZ3__compress_limitedOutput (const char* source, char* dest, int sourceSize, int maxOutputSize); +int LZ3__compress_withState (void* state, const char* source, char* dest, int inputSize); +int LZ3__compress_limitedOutput_withState (void* state, const char* source, char* dest, int inputSize, int maxOutputSize); +int LZ3__compress_continue (LZ3__stream_t* LZ3__streamPtr, const char* source, char* dest, int inputSize); +int LZ3__compress_limitedOutput_continue (LZ3__stream_t* LZ3__streamPtr, const char* source, char* dest, int inputSize, int maxOutputSize); + +/* Obsolete decompression functions */ +/* These function names are completely deprecated and must no longer be used. + They are only provided here for compatibility with older programs. + - LZ3__uncompress is the same as LZ3__decompress_fast + - LZ3__uncompress_unknownOutputSize is the same as LZ3__decompress_safe + These function prototypes are now disabled; uncomment them only if you really need them. + It is highly recommended to stop using these prototypes and migrate to maintained ones */ +/* int LZ3__uncompress (const char* source, char* dest, int outputSize); */ +/* int LZ3__uncompress_unknownOutputSize (const char* source, char* dest, int isize, int maxOutputSize); */ + +/* Obsolete streaming functions; use new streaming interface whenever possible */ +LZ3__DEPRECATED("use LZ3__createStream() instead") void* LZ3__create (char* inputBuffer); +LZ3__DEPRECATED("use LZ3__createStream() instead") int LZ3__sizeofStreamState(void); +LZ3__DEPRECATED("use LZ3__resetStream() instead") int LZ3__resetStreamState(void* state, char* inputBuffer); +LZ3__DEPRECATED("use LZ3__saveDict() instead") char* LZ3__slideInputBuffer (void* state); + +/* Obsolete streaming decoding functions */ +LZ3__DEPRECATED("use LZ3__decompress_safe_usingDict() instead") int LZ3__decompress_safe_withPrefix64k (const char* src, char* dst, int compressedSize, int maxDstSize); +LZ3__DEPRECATED("use LZ3__decompress_fast_usingDict() instead") int LZ3__decompress_fast_withPrefix64k (const char* src, char* dst, int originalSize); + + +#if defined (__cplusplus) +} +#endif diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h.meta new file mode 100644 index 00000000..88d497d4 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: f5bbb091252993d4c9af8fb1027244a1 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp new file mode 100644 index 00000000..8f3ee19b --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp @@ -0,0 +1,1441 @@ + +/************************************** +* Compiler Options +**************************************/ +#ifdef _MSC_VER /* Visual Studio */ +# pragma warning(disable : 4127) /* disable: C4127: conditional expression is constant */ +#endif + + +/************************************** +* Memory routines +**************************************/ +#include /* malloc, calloc, free */ +#define ALLOCATOR(s) calloc(1,s) +#define FREEMEM free +#include /* memset, memcpy, memmove */ +#define MEM_INIT memset + + +/************************************** +* Includes +**************************************/ +#include "lz4frame_static.h" +#include "lz4.h" +#include "lz4hc.h" +#include "xxhash.h" + + +/************************************** +* Basic Types +**************************************/ +#if defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */ +# include +typedef uint8_t BYTE; +typedef uint16_t U16; +typedef uint32_t U32; +typedef int32_t S32; +typedef uint64_t U64; +#else +typedef unsigned char BYTE; +typedef unsigned short U16; +typedef unsigned int U32; +typedef signed int S32; +typedef unsigned long long U64; +#endif + + +/************************************** +* Constants +**************************************/ +#define KB *(1<<10) +#define MB *(1<<20) +#define GB *(1<<30) + +#define _1BIT 0x01 +#define _2BITS 0x03 +#define _3BITS 0x07 +#define _4BITS 0x0F +#define _8BITS 0xFF + +#define LZ3F_MAGIC_SKIPPABLE_START 0x184D2A50U +#define LZ3F_MAGICNUMBER 0x184D2204U +#define LZ3F_BLOCKUNCOMPRESSED_FLAG 0x80000000U +#define LZ3F_BLOCKSIZEID_DEFAULT LZ3F_max64KB + +static const size_t minFHSize = 7; +static const size_t maxFHSize = 15; +static const size_t BHSize = 4; +static const int minHClevel = 3; + + +/************************************** +* Structures and local types +**************************************/ +typedef struct LZ3F_cctx_s +{ + LZ3F_preferences_t prefs; + U32 version; + U32 cStage; + size_t maxBlockSize; + size_t maxBufferSize; + BYTE* tmpBuff; + BYTE* tmpIn; + size_t tmpInSize; + U64 totalInSize; + XX_H32_state_t xxh; + void* lz3CtxPtr; + U32 lz3CtxLevel; /* 0: unallocated; 1: LZ3__stream_t; 3: LZ3__streamHC_t */ +} LZ3F_cctx_t; + +typedef struct LZ3F_dctx_s +{ + LZ3F_frameInfo_t frameInfo; + U32 version; + U32 dStage; + U64 frameRemainingSize; + size_t maxBlockSize; + size_t maxBufferSize; + const BYTE* srcExpect; + BYTE* tmpIn; + size_t tmpInSize; + size_t tmpInTarget; + BYTE* tmpOutBuffer; + const BYTE* dict; + size_t dictSize; + BYTE* tmpOut; + size_t tmpOutSize; + size_t tmpOutStart; + XX_H32_state_t xxh; + BYTE header[16]; +} LZ3F_dctx_t; + + +/************************************** +* Error management +**************************************/ +#define LZ3F_GENERATE_STRING(STRING) #STRING, +static const char* LZ3F_errorStrings[] = { LZ3F_LIST_ERRORS(LZ3F_GENERATE_STRING) }; + + + +unsigned LZ3F_isError(LZ3F_errorCode_t code) +{ + return (code > (LZ3F_errorCode_t)(-LZ3F_ERROR_maxCode)); +} + +const char* LZ3F_getErrorName(LZ3F_errorCode_t code) +{ + static const char* codeError = "Unspecified error code"; + if (LZ3F_isError(code)) return LZ3F_errorStrings[-(int)(code)]; + return codeError; +} + + +/************************************** +* Private functions +**************************************/ +static size_t LZ3F_getBlockSize(unsigned blockSizeID) +{ + static const size_t blockSizes[4] = { 64 KB, 256 KB, 1 MB, 4 MB }; + + if (blockSizeID == 0) blockSizeID = LZ3F_BLOCKSIZEID_DEFAULT; + blockSizeID -= 4; + if (blockSizeID > 3) return (size_t)-LZ3F_ERROR_maxBlockSize_invalid; + return blockSizes[blockSizeID]; +} + + +/* unoptimized version; solves endianess & alignment issues */ +static U32 LZ3F_readLE32 (const BYTE* srcPtr) +{ + U32 value32 = srcPtr[0]; + value32 += (srcPtr[1]<<8); + value32 += (srcPtr[2]<<16); + value32 += ((U32)srcPtr[3])<<24; + return value32; +} + +static void LZ3F_writeLE32 (BYTE* dstPtr, U32 value32) +{ + dstPtr[0] = (BYTE)value32; + dstPtr[1] = (BYTE)(value32 >> 8); + dstPtr[2] = (BYTE)(value32 >> 16); + dstPtr[3] = (BYTE)(value32 >> 24); +} + +static U64 LZ3F_readLE64 (const BYTE* srcPtr) +{ + U64 value64 = srcPtr[0]; + value64 += ((U64)srcPtr[1]<<8); + value64 += ((U64)srcPtr[2]<<16); + value64 += ((U64)srcPtr[3]<<24); + value64 += ((U64)srcPtr[4]<<32); + value64 += ((U64)srcPtr[5]<<40); + value64 += ((U64)srcPtr[6]<<48); + value64 += ((U64)srcPtr[7]<<56); + return value64; +} + +static void LZ3F_writeLE64 (BYTE* dstPtr, U64 value64) +{ + dstPtr[0] = (BYTE)value64; + dstPtr[1] = (BYTE)(value64 >> 8); + dstPtr[2] = (BYTE)(value64 >> 16); + dstPtr[3] = (BYTE)(value64 >> 24); + dstPtr[4] = (BYTE)(value64 >> 32); + dstPtr[5] = (BYTE)(value64 >> 40); + dstPtr[6] = (BYTE)(value64 >> 48); + dstPtr[7] = (BYTE)(value64 >> 56); +} + + +static BYTE LZ3F_headerChecksum (const void* header, size_t length) +{ + U32 xxh = XX_H32(header, length, 0); + return (BYTE)(xxh >> 8); +} + + +/************************************** +* Simple compression functions +**************************************/ +static LZ3F_blockSizeID_t LZ3F_optimalBSID(const LZ3F_blockSizeID_t requestedBSID, const size_t srcSize) +{ + LZ3F_blockSizeID_t proposedBSID = LZ3F_max64KB; + size_t maxBlockSize = 64 KB; + while (requestedBSID > proposedBSID) + { + if (srcSize <= maxBlockSize) + return proposedBSID; + proposedBSID = (LZ3F_blockSizeID_t)((int)proposedBSID + 1); + maxBlockSize <<= 2; + } + return requestedBSID; +} + + +size_t LZ3F_compressFrameBound(size_t srcSize, const LZ3F_preferences_t* preferencesPtr) +{ + LZ3F_preferences_t prefs; + size_t headerSize; + size_t streamSize; + + if (preferencesPtr!=NULL) prefs = *preferencesPtr; + else memset(&prefs, 0, sizeof(prefs)); + + prefs.frameInfo.blockSizeID = LZ3F_optimalBSID(prefs.frameInfo.blockSizeID, srcSize); + prefs.autoFlush = 1; + + headerSize = maxFHSize; /* header size, including magic number and frame content size*/ + streamSize = LZ3F_compressBound(srcSize, &prefs); + + return headerSize + streamSize; +} + + +/* LZ3F_compressFrame() +* Compress an entire srcBuffer into a valid LZ3 frame, as defined by specification v1.5.0, in a single step. +* The most important rule is that dstBuffer MUST be large enough (dstMaxSize) to ensure compression completion even in worst case. +* You can get the minimum value of dstMaxSize by using LZ3F_compressFrameBound() +* If this condition is not respected, LZ3F_compressFrame() will fail (result is an errorCode) +* The LZ3F_preferences_t structure is optional : you can provide NULL as argument. All preferences will then be set to default. +* The result of the function is the number of bytes written into dstBuffer. +* The function outputs an error code if it fails (can be tested using LZ3F_isError()) +*/ +size_t LZ3F_compressFrame(void* dstBuffer, size_t dstMaxSize, const void* srcBuffer, size_t srcSize, const LZ3F_preferences_t* preferencesPtr) +{ + LZ3F_cctx_t cctxI; + LZ3__stream_t lz3ctx; + LZ3F_preferences_t prefs; + LZ3F_compressOptions_t options; + LZ3F_errorCode_t errorCode; + BYTE* const dstStart = (BYTE*) dstBuffer; + BYTE* dstPtr = dstStart; + BYTE* const dstEnd = dstStart + dstMaxSize; + + memset(&cctxI, 0, sizeof(cctxI)); /* works because no allocation */ + memset(&options, 0, sizeof(options)); + + cctxI.version = LZ3F_VERSION; + cctxI.maxBufferSize = 5 MB; /* mess with real buffer size to prevent allocation; works because autoflush==1 & stableSrc==1 */ + + if (preferencesPtr!=NULL) + prefs = *preferencesPtr; + else + memset(&prefs, 0, sizeof(prefs)); + if (prefs.frameInfo.contentSize != 0) + prefs.frameInfo.contentSize = (U64)srcSize; /* auto-correct content size if selected (!=0) */ + + if (prefs.compressionLevel < (int)minHClevel) + { + cctxI.lz3CtxPtr = &lz3ctx; + cctxI.lz3CtxLevel = 1; + } + + prefs.frameInfo.blockSizeID = LZ3F_optimalBSID(prefs.frameInfo.blockSizeID, srcSize); + prefs.autoFlush = 1; + if (srcSize <= LZ3F_getBlockSize(prefs.frameInfo.blockSizeID)) + prefs.frameInfo.blockMode = LZ3F_blockIndependent; /* no need for linked blocks */ + + options.stableSrc = 1; + + if (dstMaxSize < LZ3F_compressFrameBound(srcSize, &prefs)) + return (size_t)-LZ3F_ERROR_dstMaxSize_tooSmall; + + errorCode = LZ3F_compressBegin(&cctxI, dstBuffer, dstMaxSize, &prefs); /* write header */ + if (LZ3F_isError(errorCode)) return errorCode; + dstPtr += errorCode; /* header size */ + + errorCode = LZ3F_compressUpdate(&cctxI, dstPtr, dstEnd-dstPtr, srcBuffer, srcSize, &options); + if (LZ3F_isError(errorCode)) return errorCode; + dstPtr += errorCode; + + errorCode = LZ3F_compressEnd(&cctxI, dstPtr, dstEnd-dstPtr, &options); /* flush last block, and generate suffix */ + if (LZ3F_isError(errorCode)) return errorCode; + dstPtr += errorCode; + + if (prefs.compressionLevel >= (int)minHClevel) /* no allocation necessary with lz3 fast */ + FREEMEM(cctxI.lz3CtxPtr); + + return (dstPtr - dstStart); +} + + +/*********************************** +* Advanced compression functions +***********************************/ + +/* LZ3F_createCompressionContext() : +* The first thing to do is to create a compressionContext object, which will be used in all compression operations. +* This is achieved using LZ3F_createCompressionContext(), which takes as argument a version and an LZ3F_preferences_t structure. +* The version provided MUST be LZ3F_VERSION. It is intended to track potential version differences between different binaries. +* The function will provide a pointer to an allocated LZ3F_compressionContext_t object. +* If the result LZ3F_errorCode_t is not OK_NoError, there was an error during context creation. +* Object can release its memory using LZ3F_freeCompressionContext(); +*/ +LZ3F_errorCode_t LZ3F_createCompressionContext(LZ3F_compressionContext_t* LZ3F_compressionContextPtr, unsigned version) +{ + LZ3F_cctx_t* cctxPtr; + + cctxPtr = (LZ3F_cctx_t*)ALLOCATOR(sizeof(LZ3F_cctx_t)); + if (cctxPtr==NULL) return (LZ3F_errorCode_t)(-LZ3F_ERROR_allocation_failed); + + cctxPtr->version = version; + cctxPtr->cStage = 0; /* Next stage : write header */ + + *LZ3F_compressionContextPtr = (LZ3F_compressionContext_t)cctxPtr; + + return LZ3F_OK_NoError; +} + + +LZ3F_errorCode_t LZ3F_freeCompressionContext(LZ3F_compressionContext_t LZ3F_compressionContext) +{ + LZ3F_cctx_t* cctxPtr = (LZ3F_cctx_t*)LZ3F_compressionContext; + + if (cctxPtr != NULL) /* null pointers can be safely provided to this function, like free() */ + { + FREEMEM(cctxPtr->lz3CtxPtr); + FREEMEM(cctxPtr->tmpBuff); + FREEMEM(LZ3F_compressionContext); + } + + return LZ3F_OK_NoError; +} + + +/* LZ3F_compressBegin() : +* will write the frame header into dstBuffer. +* dstBuffer must be large enough to accommodate a header (dstMaxSize). Maximum header size is LZ3F_MAXHEADERFRAME_SIZE bytes. +* The result of the function is the number of bytes written into dstBuffer for the header +* or an error code (can be tested using LZ3F_isError()) +*/ +size_t LZ3F_compressBegin(LZ3F_compressionContext_t compressionContext, void* dstBuffer, size_t dstMaxSize, const LZ3F_preferences_t* preferencesPtr) +{ + LZ3F_preferences_t prefNull; + LZ3F_cctx_t* cctxPtr = (LZ3F_cctx_t*)compressionContext; + BYTE* const dstStart = (BYTE*)dstBuffer; + BYTE* dstPtr = dstStart; + BYTE* headerStart; + size_t requiredBuffSize; + + if (dstMaxSize < maxFHSize) return (size_t)-LZ3F_ERROR_dstMaxSize_tooSmall; + if (cctxPtr->cStage != 0) return (size_t)-LZ3F_ERROR_GENERIC; + memset(&prefNull, 0, sizeof(prefNull)); + if (preferencesPtr == NULL) preferencesPtr = &prefNull; + cctxPtr->prefs = *preferencesPtr; + + /* ctx Management */ + { + U32 tableID = (cctxPtr->prefs.compressionLevel < minHClevel) ? 1 : 2; /* 0:nothing ; 1:LZ3 table ; 2:HC tables */ + if (cctxPtr->lz3CtxLevel < tableID) + { + FREEMEM(cctxPtr->lz3CtxPtr); + if (cctxPtr->prefs.compressionLevel < minHClevel) + cctxPtr->lz3CtxPtr = (void*)LZ3__createStream(); + else + cctxPtr->lz3CtxPtr = (void*)LZ3__createStreamHC(); + cctxPtr->lz3CtxLevel = tableID; + } + } + + /* Buffer Management */ + if (cctxPtr->prefs.frameInfo.blockSizeID == 0) cctxPtr->prefs.frameInfo.blockSizeID = LZ3F_BLOCKSIZEID_DEFAULT; + cctxPtr->maxBlockSize = LZ3F_getBlockSize(cctxPtr->prefs.frameInfo.blockSizeID); + + requiredBuffSize = cctxPtr->maxBlockSize + ((cctxPtr->prefs.frameInfo.blockMode == LZ3F_blockLinked) * 128 KB); + if (preferencesPtr->autoFlush) + requiredBuffSize = (cctxPtr->prefs.frameInfo.blockMode == LZ3F_blockLinked) * 64 KB; /* just needs dict */ + + if (cctxPtr->maxBufferSize < requiredBuffSize) + { + cctxPtr->maxBufferSize = requiredBuffSize; + FREEMEM(cctxPtr->tmpBuff); + cctxPtr->tmpBuff = (BYTE*)ALLOCATOR(requiredBuffSize); + if (cctxPtr->tmpBuff == NULL) return (size_t)-LZ3F_ERROR_allocation_failed; + } + cctxPtr->tmpIn = cctxPtr->tmpBuff; + cctxPtr->tmpInSize = 0; + XX_H32_reset(&(cctxPtr->xxh), 0); + if (cctxPtr->prefs.compressionLevel < minHClevel) + LZ3__resetStream((LZ3__stream_t*)(cctxPtr->lz3CtxPtr)); + else + LZ3__resetStreamHC((LZ3__streamHC_t*)(cctxPtr->lz3CtxPtr), cctxPtr->prefs.compressionLevel); + + /* Magic Number */ + LZ3F_writeLE32(dstPtr, LZ3F_MAGICNUMBER); + dstPtr += 4; + headerStart = dstPtr; + + /* FLG Byte */ + *dstPtr++ = (BYTE)(((1 & _2BITS) << 6) /* Version('01') */ + + ((cctxPtr->prefs.frameInfo.blockMode & _1BIT ) << 5) /* Block mode */ + + ((cctxPtr->prefs.frameInfo.contentChecksumFlag & _1BIT ) << 2) /* Frame checksum */ + + ((cctxPtr->prefs.frameInfo.contentSize > 0) << 3)); /* Frame content size */ + /* BD Byte */ + *dstPtr++ = (BYTE)((cctxPtr->prefs.frameInfo.blockSizeID & _3BITS) << 4); + /* Optional Frame content size field */ + if (cctxPtr->prefs.frameInfo.contentSize) + { + LZ3F_writeLE64(dstPtr, cctxPtr->prefs.frameInfo.contentSize); + dstPtr += 8; + cctxPtr->totalInSize = 0; + } + /* CRC Byte */ + *dstPtr = LZ3F_headerChecksum(headerStart, dstPtr - headerStart); + dstPtr++; + + cctxPtr->cStage = 1; /* header written, now request input data block */ + + return (dstPtr - dstStart); +} + + +/* LZ3F_compressBound() : gives the size of Dst buffer given a srcSize to handle worst case situations. +* The LZ3F_frameInfo_t structure is optional : +* you can provide NULL as argument, preferences will then be set to cover worst case situations. +* */ +size_t LZ3F_compressBound(size_t srcSize, const LZ3F_preferences_t* preferencesPtr) +{ + LZ3F_preferences_t prefsNull; + memset(&prefsNull, 0, sizeof(prefsNull)); + prefsNull.frameInfo.contentChecksumFlag = LZ3F_contentChecksumEnabled; /* worst case */ + { + const LZ3F_preferences_t* prefsPtr = (preferencesPtr==NULL) ? &prefsNull : preferencesPtr; + LZ3F_blockSizeID_t bid = prefsPtr->frameInfo.blockSizeID; + size_t blockSize = LZ3F_getBlockSize(bid); + unsigned nbBlocks = (unsigned)(srcSize / blockSize) + 1; + size_t lastBlockSize = prefsPtr->autoFlush ? srcSize % blockSize : blockSize; + size_t blockInfo = 4; /* default, without block CRC option */ + size_t frameEnd = 4 + (prefsPtr->frameInfo.contentChecksumFlag*4); + + return (blockInfo * nbBlocks) + (blockSize * (nbBlocks-1)) + lastBlockSize + frameEnd;; + } +} + + +typedef int (*compressFunc_t)(void* ctx, const char* src, char* dst, int srcSize, int dstSize, int level); + +static size_t LZ3F_compressBlock(void* dst, const void* src, size_t srcSize, compressFunc_t compress, void* lz3ctx, int level) +{ + /* compress one block */ + BYTE* cSizePtr = (BYTE*)dst; + U32 cSize; + cSize = (U32)compress(lz3ctx, (const char*)src, (char*)(cSizePtr+4), (int)(srcSize), (int)(srcSize-1), level); + LZ3F_writeLE32(cSizePtr, cSize); + if (cSize == 0) /* compression failed */ + { + cSize = (U32)srcSize; + LZ3F_writeLE32(cSizePtr, cSize + LZ3F_BLOCKUNCOMPRESSED_FLAG); + memcpy(cSizePtr+4, src, srcSize); + } + return cSize + 4; +} + + +static int LZ3F_localLZ3__compress_limitedOutput_withState(void* ctx, const char* src, char* dst, int srcSize, int dstSize, int level) +{ + (void) level; + return LZ3__compress_limitedOutput_withState(ctx, src, dst, srcSize, dstSize); +} + +static int LZ3F_localLZ3__compress_limitedOutput_continue(void* ctx, const char* src, char* dst, int srcSize, int dstSize, int level) +{ + (void) level; + return LZ3__compress_limitedOutput_continue((LZ3__stream_t*)ctx, src, dst, srcSize, dstSize); +} + +static int LZ3F_localLZ3__compressHC_limitedOutput_continue(void* ctx, const char* src, char* dst, int srcSize, int dstSize, int level) +{ + (void) level; + return LZ3__compress_HC_continue((LZ3__streamHC_t*)ctx, src, dst, srcSize, dstSize); +} + +static compressFunc_t LZ3F_selectCompression(LZ3F_blockMode_t blockMode, int level) +{ + if (level < minHClevel) + { + if (blockMode == LZ3F_blockIndependent) return LZ3F_localLZ3__compress_limitedOutput_withState; + return LZ3F_localLZ3__compress_limitedOutput_continue; + } + if (blockMode == LZ3F_blockIndependent) return LZ3__compress_HC_extStateHC; + return LZ3F_localLZ3__compressHC_limitedOutput_continue; +} + +static int LZ3F_localSaveDict(LZ3F_cctx_t* cctxPtr) +{ + if (cctxPtr->prefs.compressionLevel < minHClevel) + return LZ3__saveDict ((LZ3__stream_t*)(cctxPtr->lz3CtxPtr), (char*)(cctxPtr->tmpBuff), 64 KB); + return LZ3__saveDictHC ((LZ3__streamHC_t*)(cctxPtr->lz3CtxPtr), (char*)(cctxPtr->tmpBuff), 64 KB); +} + +typedef enum { notDone, fromTmpBuffer, fromSrcBuffer } LZ3F_lastBlockStatus; + +/* LZ3F_compressUpdate() +* LZ3F_compressUpdate() can be called repetitively to compress as much data as necessary. +* The most important rule is that dstBuffer MUST be large enough (dstMaxSize) to ensure compression completion even in worst case. +* If this condition is not respected, LZ3F_compress() will fail (result is an errorCode) +* You can get the minimum value of dstMaxSize by using LZ3F_compressBound() +* The LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. +* The result of the function is the number of bytes written into dstBuffer : it can be zero, meaning input data was just buffered. +* The function outputs an error code if it fails (can be tested using LZ3F_isError()) +*/ +size_t LZ3F_compressUpdate(LZ3F_compressionContext_t compressionContext, void* dstBuffer, size_t dstMaxSize, const void* srcBuffer, size_t srcSize, const LZ3F_compressOptions_t* compressOptionsPtr) +{ + LZ3F_compressOptions_t cOptionsNull; + LZ3F_cctx_t* cctxPtr = (LZ3F_cctx_t*)compressionContext; + size_t blockSize = cctxPtr->maxBlockSize; + const BYTE* srcPtr = (const BYTE*)srcBuffer; + const BYTE* const srcEnd = srcPtr + srcSize; + BYTE* const dstStart = (BYTE*)dstBuffer; + BYTE* dstPtr = dstStart; + LZ3F_lastBlockStatus lastBlockCompressed = notDone; + compressFunc_t compress; + + + if (cctxPtr->cStage != 1) return (size_t)-LZ3F_ERROR_GENERIC; + if (dstMaxSize < LZ3F_compressBound(srcSize, &(cctxPtr->prefs))) return (size_t)-LZ3F_ERROR_dstMaxSize_tooSmall; + memset(&cOptionsNull, 0, sizeof(cOptionsNull)); + if (compressOptionsPtr == NULL) compressOptionsPtr = &cOptionsNull; + + /* select compression function */ + compress = LZ3F_selectCompression(cctxPtr->prefs.frameInfo.blockMode, cctxPtr->prefs.compressionLevel); + + /* complete tmp buffer */ + if (cctxPtr->tmpInSize > 0) /* some data already within tmp buffer */ + { + size_t sizeToCopy = blockSize - cctxPtr->tmpInSize; + if (sizeToCopy > srcSize) + { + /* add src to tmpIn buffer */ + memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, srcSize); + srcPtr = srcEnd; + cctxPtr->tmpInSize += srcSize; + /* still needs some CRC */ + } + else + { + /* complete tmpIn block and then compress it */ + lastBlockCompressed = fromTmpBuffer; + memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, sizeToCopy); + srcPtr += sizeToCopy; + + dstPtr += LZ3F_compressBlock(dstPtr, cctxPtr->tmpIn, blockSize, compress, cctxPtr->lz3CtxPtr, cctxPtr->prefs.compressionLevel); + + if (cctxPtr->prefs.frameInfo.blockMode==LZ3F_blockLinked) cctxPtr->tmpIn += blockSize; + cctxPtr->tmpInSize = 0; + } + } + + while ((size_t)(srcEnd - srcPtr) >= blockSize) + { + /* compress full block */ + lastBlockCompressed = fromSrcBuffer; + dstPtr += LZ3F_compressBlock(dstPtr, srcPtr, blockSize, compress, cctxPtr->lz3CtxPtr, cctxPtr->prefs.compressionLevel); + srcPtr += blockSize; + } + + if ((cctxPtr->prefs.autoFlush) && (srcPtr < srcEnd)) + { + /* compress remaining input < blockSize */ + lastBlockCompressed = fromSrcBuffer; + dstPtr += LZ3F_compressBlock(dstPtr, srcPtr, srcEnd - srcPtr, compress, cctxPtr->lz3CtxPtr, cctxPtr->prefs.compressionLevel); + srcPtr = srcEnd; + } + + /* preserve dictionary if necessary */ + if ((cctxPtr->prefs.frameInfo.blockMode==LZ3F_blockLinked) && (lastBlockCompressed==fromSrcBuffer)) + { + if (compressOptionsPtr->stableSrc) + { + cctxPtr->tmpIn = cctxPtr->tmpBuff; + } + else + { + int realDictSize = LZ3F_localSaveDict(cctxPtr); + if (realDictSize==0) return (size_t)-LZ3F_ERROR_GENERIC; + cctxPtr->tmpIn = cctxPtr->tmpBuff + realDictSize; + } + } + + /* keep tmpIn within limits */ + if ((cctxPtr->tmpIn + blockSize) > (cctxPtr->tmpBuff + cctxPtr->maxBufferSize) /* necessarily LZ3F_blockLinked && lastBlockCompressed==fromTmpBuffer */ + && !(cctxPtr->prefs.autoFlush)) + { + int realDictSize = LZ3F_localSaveDict(cctxPtr); + cctxPtr->tmpIn = cctxPtr->tmpBuff + realDictSize; + } + + /* some input data left, necessarily < blockSize */ + if (srcPtr < srcEnd) + { + /* fill tmp buffer */ + size_t sizeToCopy = srcEnd - srcPtr; + memcpy(cctxPtr->tmpIn, srcPtr, sizeToCopy); + cctxPtr->tmpInSize = sizeToCopy; + } + + if (cctxPtr->prefs.frameInfo.contentChecksumFlag == LZ3F_contentChecksumEnabled) + XX_H32_update(&(cctxPtr->xxh), srcBuffer, srcSize); + + cctxPtr->totalInSize += srcSize; + return dstPtr - dstStart; +} + + +/* LZ3F_flush() +* Should you need to create compressed data immediately, without waiting for a block to be filled, +* you can call LZ3__flush(), which will immediately compress any remaining data stored within compressionContext. +* The result of the function is the number of bytes written into dstBuffer +* (it can be zero, this means there was no data left within compressionContext) +* The function outputs an error code if it fails (can be tested using LZ3F_isError()) +* The LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. +*/ +size_t LZ3F_flush(LZ3F_compressionContext_t compressionContext, void* dstBuffer, size_t dstMaxSize, const LZ3F_compressOptions_t* compressOptionsPtr) +{ + LZ3F_cctx_t* cctxPtr = (LZ3F_cctx_t*)compressionContext; + BYTE* const dstStart = (BYTE*)dstBuffer; + BYTE* dstPtr = dstStart; + compressFunc_t compress; + + + if (cctxPtr->tmpInSize == 0) return 0; /* nothing to flush */ + if (cctxPtr->cStage != 1) return (size_t)-LZ3F_ERROR_GENERIC; + if (dstMaxSize < (cctxPtr->tmpInSize + 8)) return (size_t)-LZ3F_ERROR_dstMaxSize_tooSmall; /* +8 : block header(4) + block checksum(4) */ + (void)compressOptionsPtr; /* not yet useful */ + + /* select compression function */ + compress = LZ3F_selectCompression(cctxPtr->prefs.frameInfo.blockMode, cctxPtr->prefs.compressionLevel); + + /* compress tmp buffer */ + dstPtr += LZ3F_compressBlock(dstPtr, cctxPtr->tmpIn, cctxPtr->tmpInSize, compress, cctxPtr->lz3CtxPtr, cctxPtr->prefs.compressionLevel); + if (cctxPtr->prefs.frameInfo.blockMode==LZ3F_blockLinked) cctxPtr->tmpIn += cctxPtr->tmpInSize; + cctxPtr->tmpInSize = 0; + + /* keep tmpIn within limits */ + if ((cctxPtr->tmpIn + cctxPtr->maxBlockSize) > (cctxPtr->tmpBuff + cctxPtr->maxBufferSize)) /* necessarily LZ3F_blockLinked */ + { + int realDictSize = LZ3F_localSaveDict(cctxPtr); + cctxPtr->tmpIn = cctxPtr->tmpBuff + realDictSize; + } + + return dstPtr - dstStart; +} + + +/* LZ3F_compressEnd() +* When you want to properly finish the compressed frame, just call LZ3F_compressEnd(). +* It will flush whatever data remained within compressionContext (like LZ3__flush()) +* but also properly finalize the frame, with an endMark and a checksum. +* The result of the function is the number of bytes written into dstBuffer (necessarily >= 4 (endMark size)) +* The function outputs an error code if it fails (can be tested using LZ3F_isError()) +* The LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. +* compressionContext can then be used again, starting with LZ3F_compressBegin(). The preferences will remain the same. +*/ +size_t LZ3F_compressEnd(LZ3F_compressionContext_t compressionContext, void* dstBuffer, size_t dstMaxSize, const LZ3F_compressOptions_t* compressOptionsPtr) +{ + LZ3F_cctx_t* cctxPtr = (LZ3F_cctx_t*)compressionContext; + BYTE* const dstStart = (BYTE*)dstBuffer; + BYTE* dstPtr = dstStart; + size_t errorCode; + + errorCode = LZ3F_flush(compressionContext, dstBuffer, dstMaxSize, compressOptionsPtr); + if (LZ3F_isError(errorCode)) return errorCode; + dstPtr += errorCode; + + LZ3F_writeLE32(dstPtr, 0); + dstPtr+=4; /* endMark */ + + if (cctxPtr->prefs.frameInfo.contentChecksumFlag == LZ3F_contentChecksumEnabled) + { + U32 xxh = XX_H32_digest(&(cctxPtr->xxh)); + LZ3F_writeLE32(dstPtr, xxh); + dstPtr+=4; /* content Checksum */ + } + + cctxPtr->cStage = 0; /* state is now re-usable (with identical preferences) */ + + if (cctxPtr->prefs.frameInfo.contentSize) + { + if (cctxPtr->prefs.frameInfo.contentSize != cctxPtr->totalInSize) + return (size_t)-LZ3F_ERROR_frameSize_wrong; + } + + return dstPtr - dstStart; +} + + +/********************************** +* Decompression functions +**********************************/ + +/* Resource management */ + +/* LZ3F_createDecompressionContext() : +* The first thing to do is to create a decompressionContext object, which will be used in all decompression operations. +* This is achieved using LZ3F_createDecompressionContext(). +* The function will provide a pointer to a fully allocated and initialized LZ3F_decompressionContext object. +* If the result LZ3F_errorCode_t is not zero, there was an error during context creation. +* Object can release its memory using LZ3F_freeDecompressionContext(); +*/ +LZ3F_errorCode_t LZ3F_createDecompressionContext(LZ3F_decompressionContext_t* LZ3F_decompressionContextPtr, unsigned versionNumber) +{ + LZ3F_dctx_t* dctxPtr; + + dctxPtr = (LZ3F_dctx_t*)ALLOCATOR(sizeof(LZ3F_dctx_t)); + if (dctxPtr==NULL) return (LZ3F_errorCode_t)-LZ3F_ERROR_GENERIC; + + dctxPtr->version = versionNumber; + *LZ3F_decompressionContextPtr = (LZ3F_decompressionContext_t)dctxPtr; + return LZ3F_OK_NoError; +} + +LZ3F_errorCode_t LZ3F_freeDecompressionContext(LZ3F_decompressionContext_t LZ3F_decompressionContext) +{ + LZ3F_errorCode_t result = LZ3F_OK_NoError; + LZ3F_dctx_t* dctxPtr = (LZ3F_dctx_t*)LZ3F_decompressionContext; + if (dctxPtr != NULL) /* can accept NULL input, like free() */ + { + result = (LZ3F_errorCode_t)dctxPtr->dStage; + FREEMEM(dctxPtr->tmpIn); + FREEMEM(dctxPtr->tmpOutBuffer); + FREEMEM(dctxPtr); + } + return result; +} + + +/* ******************************************************************** */ +/* ********************* Decompression ******************************** */ +/* ******************************************************************** */ + +typedef enum { dstage_getHeader=0, dstage_storeHeader, + dstage_getCBlockSize, dstage_storeCBlockSize, + dstage_copyDirect, + dstage_getCBlock, dstage_storeCBlock, + dstage_decodeCBlock, dstage_decodeCBlock_intoDst, + dstage_decodeCBlock_intoTmp, dstage_flushOut, + dstage_getSuffix, dstage_storeSuffix, + dstage_getSFrameSize, dstage_storeSFrameSize, + dstage_skipSkippable +} dStage_t; + + +/* LZ3F_decodeHeader + return : nb Bytes read from srcVoidPtr (necessarily <= srcSize) + or an error code (testable with LZ3F_isError()) + output : set internal values of dctx, such as + dctxPtr->frameInfo and dctxPtr->dStage. + input : srcVoidPtr points at the **beginning of the frame** +*/ +static size_t LZ3F_decodeHeader(LZ3F_dctx_t* dctxPtr, const void* srcVoidPtr, size_t srcSize) +{ + BYTE FLG, BD, HC; + unsigned version, blockMode, blockChecksumFlag, contentSizeFlag, contentChecksumFlag, blockSizeID; + size_t bufferNeeded; + size_t frameHeaderSize; + const BYTE* srcPtr = (const BYTE*)srcVoidPtr; + + /* need to decode header to get frameInfo */ + if (srcSize < minFHSize) return (size_t)-LZ3F_ERROR_frameHeader_incomplete; /* minimal frame header size */ + memset(&(dctxPtr->frameInfo), 0, sizeof(dctxPtr->frameInfo)); + + /* special case : skippable frames */ + if ((LZ3F_readLE32(srcPtr) & 0xFFFFFFF0U) == LZ3F_MAGIC_SKIPPABLE_START) + { + dctxPtr->frameInfo.frameType = LZ3F_skippableFrame; + if (srcVoidPtr == (void*)(dctxPtr->header)) + { + dctxPtr->tmpInSize = srcSize; + dctxPtr->tmpInTarget = 8; + dctxPtr->dStage = dstage_storeSFrameSize; + return srcSize; + } + else + { + dctxPtr->dStage = dstage_getSFrameSize; + return 4; + } + } + + /* control magic number */ + if (LZ3F_readLE32(srcPtr) != LZ3F_MAGICNUMBER) return (size_t)-LZ3F_ERROR_frameType_unknown; + dctxPtr->frameInfo.frameType = LZ3F_frame; + + /* Flags */ + FLG = srcPtr[4]; + version = (FLG>>6) & _2BITS; + blockMode = (FLG>>5) & _1BIT; + blockChecksumFlag = (FLG>>4) & _1BIT; + contentSizeFlag = (FLG>>3) & _1BIT; + contentChecksumFlag = (FLG>>2) & _1BIT; + + /* Frame Header Size */ + frameHeaderSize = contentSizeFlag ? maxFHSize : minFHSize; + + if (srcSize < frameHeaderSize) + { + /* not enough input to fully decode frame header */ + if (srcPtr != dctxPtr->header) + memcpy(dctxPtr->header, srcPtr, srcSize); + dctxPtr->tmpInSize = srcSize; + dctxPtr->tmpInTarget = frameHeaderSize; + dctxPtr->dStage = dstage_storeHeader; + return srcSize; + } + + BD = srcPtr[5]; + blockSizeID = (BD>>4) & _3BITS; + + /* validate */ + if (version != 1) return (size_t)-LZ3F_ERROR_headerVersion_wrong; /* Version Number, only supported value */ + if (blockChecksumFlag != 0) return (size_t)-LZ3F_ERROR_blockChecksum_unsupported; /* Not supported for the time being */ + if (((FLG>>0)&_2BITS) != 0) return (size_t)-LZ3F_ERROR_reservedFlag_set; /* Reserved bits */ + if (((BD>>7)&_1BIT) != 0) return (size_t)-LZ3F_ERROR_reservedFlag_set; /* Reserved bit */ + if (blockSizeID < 4) return (size_t)-LZ3F_ERROR_maxBlockSize_invalid; /* 4-7 only supported values for the time being */ + if (((BD>>0)&_4BITS) != 0) return (size_t)-LZ3F_ERROR_reservedFlag_set; /* Reserved bits */ + + /* check */ + HC = LZ3F_headerChecksum(srcPtr+4, frameHeaderSize-5); + if (HC != srcPtr[frameHeaderSize-1]) return (size_t)-LZ3F_ERROR_headerChecksum_invalid; /* Bad header checksum error */ + + /* save */ + dctxPtr->frameInfo.blockMode = (LZ3F_blockMode_t)blockMode; + dctxPtr->frameInfo.contentChecksumFlag = (LZ3F_contentChecksum_t)contentChecksumFlag; + dctxPtr->frameInfo.blockSizeID = (LZ3F_blockSizeID_t)blockSizeID; + dctxPtr->maxBlockSize = LZ3F_getBlockSize(blockSizeID); + if (contentSizeFlag) + dctxPtr->frameRemainingSize = dctxPtr->frameInfo.contentSize = LZ3F_readLE64(srcPtr+6); + + /* init */ + if (contentChecksumFlag) XX_H32_reset(&(dctxPtr->xxh), 0); + + /* alloc */ + bufferNeeded = dctxPtr->maxBlockSize + ((dctxPtr->frameInfo.blockMode==LZ3F_blockLinked) * 128 KB); + if (bufferNeeded > dctxPtr->maxBufferSize) /* tmp buffers too small */ + { + FREEMEM(dctxPtr->tmpIn); + FREEMEM(dctxPtr->tmpOutBuffer); + dctxPtr->maxBufferSize = bufferNeeded; + dctxPtr->tmpIn = (BYTE*)ALLOCATOR(dctxPtr->maxBlockSize); + if (dctxPtr->tmpIn == NULL) return (size_t)-LZ3F_ERROR_GENERIC; + dctxPtr->tmpOutBuffer= (BYTE*)ALLOCATOR(dctxPtr->maxBufferSize); + if (dctxPtr->tmpOutBuffer== NULL) return (size_t)-LZ3F_ERROR_GENERIC; + } + dctxPtr->tmpInSize = 0; + dctxPtr->tmpInTarget = 0; + dctxPtr->dict = dctxPtr->tmpOutBuffer; + dctxPtr->dictSize = 0; + dctxPtr->tmpOut = dctxPtr->tmpOutBuffer; + dctxPtr->tmpOutStart = 0; + dctxPtr->tmpOutSize = 0; + + dctxPtr->dStage = dstage_getCBlockSize; + + return frameHeaderSize; +} + + +/* LZ3F_getFrameInfo() +* This function decodes frame header information, such as blockSize. +* It is optional : you could start by calling directly LZ3F_decompress() instead. +* The objective is to extract header information without starting decompression, typically for allocation purposes. +* LZ3F_getFrameInfo() can also be used *after* starting decompression, on a valid LZ3F_decompressionContext_t. +* The number of bytes read from srcBuffer will be provided within *srcSizePtr (necessarily <= original value). +* You are expected to resume decompression from where it stopped (srcBuffer + *srcSizePtr) +* The function result is an hint of the better srcSize to use for next call to LZ3F_decompress, +* or an error code which can be tested using LZ3F_isError(). +*/ +LZ3F_errorCode_t LZ3F_getFrameInfo(LZ3F_decompressionContext_t dCtx, LZ3F_frameInfo_t* frameInfoPtr, + const void* srcBuffer, size_t* srcSizePtr) +{ + LZ3F_dctx_t* dctxPtr = (LZ3F_dctx_t*)dCtx; + + if (dctxPtr->dStage > dstage_storeHeader) /* note : requires dstage_* header related to be at beginning of enum */ + { + size_t o=0, i=0; + /* frameInfo already decoded */ + *srcSizePtr = 0; + *frameInfoPtr = dctxPtr->frameInfo; + return LZ3F_decompress(dCtx, NULL, &o, NULL, &i, NULL); + } + else + { + size_t o=0; + size_t nextSrcSize = LZ3F_decompress(dCtx, NULL, &o, srcBuffer, srcSizePtr, NULL); + if (dctxPtr->dStage <= dstage_storeHeader) /* note : requires dstage_* header related to be at beginning of enum */ + return (size_t)-LZ3F_ERROR_frameHeader_incomplete; + *frameInfoPtr = dctxPtr->frameInfo; + return nextSrcSize; + } +} + + +/* trivial redirector, for common prototype */ +static int LZ3F_decompress_safe (const char* source, char* dest, int compressedSize, int maxDecompressedSize, const char* dictStart, int dictSize) +{ + (void)dictStart; (void)dictSize; + return LZ3__decompress_safe (source, dest, compressedSize, maxDecompressedSize); +} + + +static void LZ3F_updateDict(LZ3F_dctx_t* dctxPtr, const BYTE* dstPtr, size_t dstSize, const BYTE* dstPtr0, unsigned withinTmp) +{ + if (dctxPtr->dictSize==0) + dctxPtr->dict = (const BYTE*)dstPtr; /* priority to dictionary continuity */ + + if (dctxPtr->dict + dctxPtr->dictSize == dstPtr) /* dictionary continuity */ + { + dctxPtr->dictSize += dstSize; + return; + } + + if (dstPtr - dstPtr0 + dstSize >= 64 KB) /* dstBuffer large enough to become dictionary */ + { + dctxPtr->dict = (const BYTE*)dstPtr0; + dctxPtr->dictSize = dstPtr - dstPtr0 + dstSize; + return; + } + + if ((withinTmp) && (dctxPtr->dict == dctxPtr->tmpOutBuffer)) + { + /* assumption : dctxPtr->dict + dctxPtr->dictSize == dctxPtr->tmpOut + dctxPtr->tmpOutStart */ + dctxPtr->dictSize += dstSize; + return; + } + + if (withinTmp) /* copy relevant dict portion in front of tmpOut within tmpOutBuffer */ + { + size_t preserveSize = dctxPtr->tmpOut - dctxPtr->tmpOutBuffer; + size_t copySize = 64 KB - dctxPtr->tmpOutSize; + const BYTE* oldDictEnd = dctxPtr->dict + dctxPtr->dictSize - dctxPtr->tmpOutStart; + if (dctxPtr->tmpOutSize > 64 KB) copySize = 0; + if (copySize > preserveSize) copySize = preserveSize; + + memcpy(dctxPtr->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize); + + dctxPtr->dict = dctxPtr->tmpOutBuffer; + dctxPtr->dictSize = preserveSize + dctxPtr->tmpOutStart + dstSize; + return; + } + + if (dctxPtr->dict == dctxPtr->tmpOutBuffer) /* copy dst into tmp to complete dict */ + { + if (dctxPtr->dictSize + dstSize > dctxPtr->maxBufferSize) /* tmp buffer not large enough */ + { + size_t preserveSize = 64 KB - dstSize; /* note : dstSize < 64 KB */ + memcpy(dctxPtr->tmpOutBuffer, dctxPtr->dict + dctxPtr->dictSize - preserveSize, preserveSize); + dctxPtr->dictSize = preserveSize; + } + memcpy(dctxPtr->tmpOutBuffer + dctxPtr->dictSize, dstPtr, dstSize); + dctxPtr->dictSize += dstSize; + return; + } + + /* join dict & dest into tmp */ + { + size_t preserveSize = 64 KB - dstSize; /* note : dstSize < 64 KB */ + if (preserveSize > dctxPtr->dictSize) preserveSize = dctxPtr->dictSize; + memcpy(dctxPtr->tmpOutBuffer, dctxPtr->dict + dctxPtr->dictSize - preserveSize, preserveSize); + memcpy(dctxPtr->tmpOutBuffer + preserveSize, dstPtr, dstSize); + dctxPtr->dict = dctxPtr->tmpOutBuffer; + dctxPtr->dictSize = preserveSize + dstSize; + } +} + + + +/* LZ3F_decompress() +* Call this function repetitively to regenerate data compressed within srcBuffer. +* The function will attempt to decode *srcSizePtr from srcBuffer, into dstBuffer of maximum size *dstSizePtr. +* +* The number of bytes regenerated into dstBuffer will be provided within *dstSizePtr (necessarily <= original value). +* +* The number of bytes effectively read from srcBuffer will be provided within *srcSizePtr (necessarily <= original value). +* If the number of bytes read is < number of bytes provided, then the decompression operation is not complete. +* You will have to call it again, continuing from where it stopped. +* +* The function result is an hint of the better srcSize to use for next call to LZ3F_decompress. +* Basically, it's the size of the current (or remaining) compressed block + header of next block. +* Respecting the hint provides some boost to performance, since it allows less buffer shuffling. +* Note that this is just a hint, you can always provide any srcSize you want. +* When a frame is fully decoded, the function result will be 0. +* If decompression failed, function result is an error code which can be tested using LZ3F_isError(). +*/ +size_t LZ3F_decompress(LZ3F_decompressionContext_t decompressionContext, + void* dstBuffer, size_t* dstSizePtr, + const void* srcBuffer, size_t* srcSizePtr, + const LZ3F_decompressOptions_t* decompressOptionsPtr) +{ + LZ3F_dctx_t* dctxPtr = (LZ3F_dctx_t*)decompressionContext; + LZ3F_decompressOptions_t optionsNull; + const BYTE* const srcStart = (const BYTE*)srcBuffer; + const BYTE* const srcEnd = srcStart + *srcSizePtr; + const BYTE* srcPtr = srcStart; + BYTE* const dstStart = (BYTE*)dstBuffer; + BYTE* const dstEnd = dstStart + *dstSizePtr; + BYTE* dstPtr = dstStart; + const BYTE* selectedIn = NULL; + unsigned doAnotherStage = 1; + size_t nextSrcSizeHint = 1; + + + memset(&optionsNull, 0, sizeof(optionsNull)); + if (decompressOptionsPtr==NULL) decompressOptionsPtr = &optionsNull; + *srcSizePtr = 0; + *dstSizePtr = 0; + + /* expect to continue decoding src buffer where it left previously */ + if (dctxPtr->srcExpect != NULL) + { + if (srcStart != dctxPtr->srcExpect) return (size_t)-LZ3F_ERROR_srcPtr_wrong; + } + + /* programmed as a state machine */ + + while (doAnotherStage) + { + + switch(dctxPtr->dStage) + { + + case dstage_getHeader: + { + if ((size_t)(srcEnd-srcPtr) >= maxFHSize) /* enough to decode - shortcut */ + { + LZ3F_errorCode_t errorCode = LZ3F_decodeHeader(dctxPtr, srcPtr, srcEnd-srcPtr); + if (LZ3F_isError(errorCode)) return errorCode; + srcPtr += errorCode; + break; + } + dctxPtr->tmpInSize = 0; + dctxPtr->tmpInTarget = minFHSize; /* minimum to attempt decode */ + dctxPtr->dStage = dstage_storeHeader; + } + + case dstage_storeHeader: + { + size_t sizeToCopy = dctxPtr->tmpInTarget - dctxPtr->tmpInSize; + if (sizeToCopy > (size_t)(srcEnd - srcPtr)) sizeToCopy = srcEnd - srcPtr; + memcpy(dctxPtr->header + dctxPtr->tmpInSize, srcPtr, sizeToCopy); + dctxPtr->tmpInSize += sizeToCopy; + srcPtr += sizeToCopy; + if (dctxPtr->tmpInSize < dctxPtr->tmpInTarget) + { + nextSrcSizeHint = (dctxPtr->tmpInTarget - dctxPtr->tmpInSize) + BHSize; /* rest of header + nextBlockHeader */ + doAnotherStage = 0; /* not enough src data, ask for some more */ + break; + } + { + LZ3F_errorCode_t errorCode = LZ3F_decodeHeader(dctxPtr, dctxPtr->header, dctxPtr->tmpInTarget); + if (LZ3F_isError(errorCode)) return errorCode; + } + break; + } + + case dstage_getCBlockSize: + { + if ((size_t)(srcEnd - srcPtr) >= BHSize) + { + selectedIn = srcPtr; + srcPtr += BHSize; + } + else + { + /* not enough input to read cBlockSize field */ + dctxPtr->tmpInSize = 0; + dctxPtr->dStage = dstage_storeCBlockSize; + } + } + + if (dctxPtr->dStage == dstage_storeCBlockSize) + case dstage_storeCBlockSize: + { + size_t sizeToCopy = BHSize - dctxPtr->tmpInSize; + if (sizeToCopy > (size_t)(srcEnd - srcPtr)) sizeToCopy = srcEnd - srcPtr; + memcpy(dctxPtr->tmpIn + dctxPtr->tmpInSize, srcPtr, sizeToCopy); + srcPtr += sizeToCopy; + dctxPtr->tmpInSize += sizeToCopy; + if (dctxPtr->tmpInSize < BHSize) /* not enough input to get full cBlockSize; wait for more */ + { + nextSrcSizeHint = BHSize - dctxPtr->tmpInSize; + doAnotherStage = 0; + break; + } + selectedIn = dctxPtr->tmpIn; + } + + /* case dstage_decodeCBlockSize: */ /* no more direct access, to prevent scan-build warning */ + { + size_t nextCBlockSize = LZ3F_readLE32(selectedIn) & 0x7FFFFFFFU; + if (nextCBlockSize==0) /* frameEnd signal, no more CBlock */ + { + dctxPtr->dStage = dstage_getSuffix; + break; + } + if (nextCBlockSize > dctxPtr->maxBlockSize) return (size_t)-LZ3F_ERROR_GENERIC; /* invalid cBlockSize */ + dctxPtr->tmpInTarget = nextCBlockSize; + if (LZ3F_readLE32(selectedIn) & LZ3F_BLOCKUNCOMPRESSED_FLAG) + { + dctxPtr->dStage = dstage_copyDirect; + break; + } + dctxPtr->dStage = dstage_getCBlock; + if (dstPtr==dstEnd) + { + nextSrcSizeHint = nextCBlockSize + BHSize; + doAnotherStage = 0; + } + break; + } + + case dstage_copyDirect: /* uncompressed block */ + { + size_t sizeToCopy = dctxPtr->tmpInTarget; + if ((size_t)(srcEnd-srcPtr) < sizeToCopy) sizeToCopy = srcEnd - srcPtr; /* not enough input to read full block */ + if ((size_t)(dstEnd-dstPtr) < sizeToCopy) sizeToCopy = dstEnd - dstPtr; + memcpy(dstPtr, srcPtr, sizeToCopy); + if (dctxPtr->frameInfo.contentChecksumFlag) XX_H32_update(&(dctxPtr->xxh), srcPtr, sizeToCopy); + if (dctxPtr->frameInfo.contentSize) dctxPtr->frameRemainingSize -= sizeToCopy; + + /* dictionary management */ + if (dctxPtr->frameInfo.blockMode==LZ3F_blockLinked) + LZ3F_updateDict(dctxPtr, dstPtr, sizeToCopy, dstStart, 0); + + srcPtr += sizeToCopy; + dstPtr += sizeToCopy; + if (sizeToCopy == dctxPtr->tmpInTarget) /* all copied */ + { + dctxPtr->dStage = dstage_getCBlockSize; + break; + } + dctxPtr->tmpInTarget -= sizeToCopy; /* still need to copy more */ + nextSrcSizeHint = dctxPtr->tmpInTarget + BHSize; + doAnotherStage = 0; + break; + } + + case dstage_getCBlock: /* entry from dstage_decodeCBlockSize */ + { + if ((size_t)(srcEnd-srcPtr) < dctxPtr->tmpInTarget) + { + dctxPtr->tmpInSize = 0; + dctxPtr->dStage = dstage_storeCBlock; + break; + } + selectedIn = srcPtr; + srcPtr += dctxPtr->tmpInTarget; + dctxPtr->dStage = dstage_decodeCBlock; + break; + } + + case dstage_storeCBlock: + { + size_t sizeToCopy = dctxPtr->tmpInTarget - dctxPtr->tmpInSize; + if (sizeToCopy > (size_t)(srcEnd-srcPtr)) sizeToCopy = srcEnd-srcPtr; + memcpy(dctxPtr->tmpIn + dctxPtr->tmpInSize, srcPtr, sizeToCopy); + dctxPtr->tmpInSize += sizeToCopy; + srcPtr += sizeToCopy; + if (dctxPtr->tmpInSize < dctxPtr->tmpInTarget) /* need more input */ + { + nextSrcSizeHint = (dctxPtr->tmpInTarget - dctxPtr->tmpInSize) + BHSize; + doAnotherStage=0; + break; + } + selectedIn = dctxPtr->tmpIn; + dctxPtr->dStage = dstage_decodeCBlock; + break; + } + + case dstage_decodeCBlock: + { + if ((size_t)(dstEnd-dstPtr) < dctxPtr->maxBlockSize) /* not enough place into dst : decode into tmpOut */ + dctxPtr->dStage = dstage_decodeCBlock_intoTmp; + else + dctxPtr->dStage = dstage_decodeCBlock_intoDst; + break; + } + + case dstage_decodeCBlock_intoDst: + { + int (*decoder)(const char*, char*, int, int, const char*, int); + int decodedSize; + + if (dctxPtr->frameInfo.blockMode == LZ3F_blockLinked) + decoder = LZ3__decompress_safe_usingDict; + else + decoder = LZ3F_decompress_safe; + + decodedSize = decoder((const char*)selectedIn, (char*)dstPtr, (int)dctxPtr->tmpInTarget, (int)dctxPtr->maxBlockSize, (const char*)dctxPtr->dict, (int)dctxPtr->dictSize); + if (decodedSize < 0) return (size_t)-LZ3F_ERROR_GENERIC; /* decompression failed */ + if (dctxPtr->frameInfo.contentChecksumFlag) XX_H32_update(&(dctxPtr->xxh), dstPtr, decodedSize); + if (dctxPtr->frameInfo.contentSize) dctxPtr->frameRemainingSize -= decodedSize; + + /* dictionary management */ + if (dctxPtr->frameInfo.blockMode==LZ3F_blockLinked) + LZ3F_updateDict(dctxPtr, dstPtr, decodedSize, dstStart, 0); + + dstPtr += decodedSize; + dctxPtr->dStage = dstage_getCBlockSize; + break; + } + + case dstage_decodeCBlock_intoTmp: + { + /* not enough place into dst : decode into tmpOut */ + int (*decoder)(const char*, char*, int, int, const char*, int); + int decodedSize; + + if (dctxPtr->frameInfo.blockMode == LZ3F_blockLinked) + decoder = LZ3__decompress_safe_usingDict; + else + decoder = LZ3F_decompress_safe; + + /* ensure enough place for tmpOut */ + if (dctxPtr->frameInfo.blockMode == LZ3F_blockLinked) + { + if (dctxPtr->dict == dctxPtr->tmpOutBuffer) + { + if (dctxPtr->dictSize > 128 KB) + { + memcpy(dctxPtr->tmpOutBuffer, dctxPtr->dict + dctxPtr->dictSize - 64 KB, 64 KB); + dctxPtr->dictSize = 64 KB; + } + dctxPtr->tmpOut = dctxPtr->tmpOutBuffer + dctxPtr->dictSize; + } + else /* dict not within tmp */ + { + size_t reservedDictSpace = dctxPtr->dictSize; + if (reservedDictSpace > 64 KB) reservedDictSpace = 64 KB; + dctxPtr->tmpOut = dctxPtr->tmpOutBuffer + reservedDictSpace; + } + } + + /* Decode */ + decodedSize = decoder((const char*)selectedIn, (char*)dctxPtr->tmpOut, (int)dctxPtr->tmpInTarget, (int)dctxPtr->maxBlockSize, (const char*)dctxPtr->dict, (int)dctxPtr->dictSize); + if (decodedSize < 0) return (size_t)-LZ3F_ERROR_decompressionFailed; /* decompression failed */ + if (dctxPtr->frameInfo.contentChecksumFlag) XX_H32_update(&(dctxPtr->xxh), dctxPtr->tmpOut, decodedSize); + if (dctxPtr->frameInfo.contentSize) dctxPtr->frameRemainingSize -= decodedSize; + dctxPtr->tmpOutSize = decodedSize; + dctxPtr->tmpOutStart = 0; + dctxPtr->dStage = dstage_flushOut; + break; + } + + case dstage_flushOut: /* flush decoded data from tmpOut to dstBuffer */ + { + size_t sizeToCopy = dctxPtr->tmpOutSize - dctxPtr->tmpOutStart; + if (sizeToCopy > (size_t)(dstEnd-dstPtr)) sizeToCopy = dstEnd-dstPtr; + memcpy(dstPtr, dctxPtr->tmpOut + dctxPtr->tmpOutStart, sizeToCopy); + + /* dictionary management */ + if (dctxPtr->frameInfo.blockMode==LZ3F_blockLinked) + LZ3F_updateDict(dctxPtr, dstPtr, sizeToCopy, dstStart, 1); + + dctxPtr->tmpOutStart += sizeToCopy; + dstPtr += sizeToCopy; + + /* end of flush ? */ + if (dctxPtr->tmpOutStart == dctxPtr->tmpOutSize) + { + dctxPtr->dStage = dstage_getCBlockSize; + break; + } + nextSrcSizeHint = BHSize; + doAnotherStage = 0; /* still some data to flush */ + break; + } + + case dstage_getSuffix: + { + size_t suffixSize = dctxPtr->frameInfo.contentChecksumFlag * 4; + if (dctxPtr->frameRemainingSize) return (size_t)-LZ3F_ERROR_frameSize_wrong; /* incorrect frame size decoded */ + if (suffixSize == 0) /* frame completed */ + { + nextSrcSizeHint = 0; + dctxPtr->dStage = dstage_getHeader; + doAnotherStage = 0; + break; + } + if ((srcEnd - srcPtr) < 4) /* not enough size for entire CRC */ + { + dctxPtr->tmpInSize = 0; + dctxPtr->dStage = dstage_storeSuffix; + } + else + { + selectedIn = srcPtr; + srcPtr += 4; + } + } + + if (dctxPtr->dStage == dstage_storeSuffix) + case dstage_storeSuffix: + { + size_t sizeToCopy = 4 - dctxPtr->tmpInSize; + if (sizeToCopy > (size_t)(srcEnd - srcPtr)) sizeToCopy = srcEnd - srcPtr; + memcpy(dctxPtr->tmpIn + dctxPtr->tmpInSize, srcPtr, sizeToCopy); + srcPtr += sizeToCopy; + dctxPtr->tmpInSize += sizeToCopy; + if (dctxPtr->tmpInSize < 4) /* not enough input to read complete suffix */ + { + nextSrcSizeHint = 4 - dctxPtr->tmpInSize; + doAnotherStage=0; + break; + } + selectedIn = dctxPtr->tmpIn; + } + + /* case dstage_checkSuffix: */ /* no direct call, to avoid scan-build warning */ + { + U32 readCRC = LZ3F_readLE32(selectedIn); + U32 resultCRC = XX_H32_digest(&(dctxPtr->xxh)); + if (readCRC != resultCRC) return (size_t)-LZ3F_ERROR_contentChecksum_invalid; + nextSrcSizeHint = 0; + dctxPtr->dStage = dstage_getHeader; + doAnotherStage = 0; + break; + } + + case dstage_getSFrameSize: + { + if ((srcEnd - srcPtr) >= 4) + { + selectedIn = srcPtr; + srcPtr += 4; + } + else + { + /* not enough input to read cBlockSize field */ + dctxPtr->tmpInSize = 4; + dctxPtr->tmpInTarget = 8; + dctxPtr->dStage = dstage_storeSFrameSize; + } + } + + if (dctxPtr->dStage == dstage_storeSFrameSize) + case dstage_storeSFrameSize: + { + size_t sizeToCopy = dctxPtr->tmpInTarget - dctxPtr->tmpInSize; + if (sizeToCopy > (size_t)(srcEnd - srcPtr)) sizeToCopy = srcEnd - srcPtr; + memcpy(dctxPtr->header + dctxPtr->tmpInSize, srcPtr, sizeToCopy); + srcPtr += sizeToCopy; + dctxPtr->tmpInSize += sizeToCopy; + if (dctxPtr->tmpInSize < dctxPtr->tmpInTarget) /* not enough input to get full sBlockSize; wait for more */ + { + nextSrcSizeHint = dctxPtr->tmpInTarget - dctxPtr->tmpInSize; + doAnotherStage = 0; + break; + } + selectedIn = dctxPtr->header + 4; + } + + /* case dstage_decodeSFrameSize: */ /* no direct access */ + { + size_t SFrameSize = LZ3F_readLE32(selectedIn); + dctxPtr->frameInfo.contentSize = SFrameSize; + dctxPtr->tmpInTarget = SFrameSize; + dctxPtr->dStage = dstage_skipSkippable; + break; + } + + case dstage_skipSkippable: + { + size_t skipSize = dctxPtr->tmpInTarget; + if (skipSize > (size_t)(srcEnd-srcPtr)) skipSize = srcEnd-srcPtr; + srcPtr += skipSize; + dctxPtr->tmpInTarget -= skipSize; + doAnotherStage = 0; + nextSrcSizeHint = dctxPtr->tmpInTarget; + if (nextSrcSizeHint) break; + dctxPtr->dStage = dstage_getHeader; + break; + } + } + } + + /* preserve dictionary within tmp if necessary */ + if ( (dctxPtr->frameInfo.blockMode==LZ3F_blockLinked) + &&(dctxPtr->dict != dctxPtr->tmpOutBuffer) + &&(!decompressOptionsPtr->stableDst) + &&((unsigned)(dctxPtr->dStage-1) < (unsigned)(dstage_getSuffix-1)) + ) + { + if (dctxPtr->dStage == dstage_flushOut) + { + size_t preserveSize = dctxPtr->tmpOut - dctxPtr->tmpOutBuffer; + size_t copySize = 64 KB - dctxPtr->tmpOutSize; + const BYTE* oldDictEnd = dctxPtr->dict + dctxPtr->dictSize - dctxPtr->tmpOutStart; + if (dctxPtr->tmpOutSize > 64 KB) copySize = 0; + if (copySize > preserveSize) copySize = preserveSize; + + memcpy(dctxPtr->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize); + + dctxPtr->dict = dctxPtr->tmpOutBuffer; + dctxPtr->dictSize = preserveSize + dctxPtr->tmpOutStart; + } + else + { + size_t newDictSize = dctxPtr->dictSize; + const BYTE* oldDictEnd = dctxPtr->dict + dctxPtr->dictSize; + if ((newDictSize) > 64 KB) newDictSize = 64 KB; + + memcpy(dctxPtr->tmpOutBuffer, oldDictEnd - newDictSize, newDictSize); + + dctxPtr->dict = dctxPtr->tmpOutBuffer; + dctxPtr->dictSize = newDictSize; + dctxPtr->tmpOut = dctxPtr->tmpOutBuffer + newDictSize; + } + } + + /* require function to be called again from position where it stopped */ + if (srcPtrsrcExpect = srcPtr; + else + dctxPtr->srcExpect = NULL; + + *srcSizePtr = (srcPtr - srcStart); + *dstSizePtr = (dstPtr - dstStart); + return nextSrcSizeHint; +} diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp.meta new file mode 100644 index 00000000..996f49b4 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.cpp.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 9e14348bbbccf3a43883b495fd4da244 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h new file mode 100644 index 00000000..83d568f0 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h @@ -0,0 +1,270 @@ + +/* LZ3F is a stand-alone API to create LZ3-compressed frames + * fully conformant to specification v1.5.1. + * All related operations, including memory management, are handled by the library. + * You don't need lz3.h when using lz3frame.h. + * */ + +#pragma once + +#if defined (__cplusplus) +extern "C" { +#endif + +/************************************** +* Includes +**************************************/ +#include /* size_t */ + + +/************************************** + * Error management + * ************************************/ +typedef size_t LZ3F_errorCode_t; + +unsigned LZ3F_isError(LZ3F_errorCode_t code); +const char* LZ3F_getErrorName(LZ3F_errorCode_t code); /* return error code string; useful for debugging */ + + +/************************************** + * Frame compression types + * ************************************/ +//#define LZ3F_DISABLE_OBSOLETE_ENUMS +#ifndef LZ3F_DISABLE_OBSOLETE_ENUMS +# define LZ3F_OBSOLETE_ENUM(x) ,x +#else +# define LZ3F_OBSOLETE_ENUM(x) +#endif + +typedef enum { + LZ3F_default=0, + LZ3F_max64KB=4, + LZ3F_max256KB=5, + LZ3F_max1MB=6, + LZ3F_max4MB=7 + LZ3F_OBSOLETE_ENUM(max64KB = LZ3F_max64KB) + LZ3F_OBSOLETE_ENUM(max256KB = LZ3F_max256KB) + LZ3F_OBSOLETE_ENUM(max1MB = LZ3F_max1MB) + LZ3F_OBSOLETE_ENUM(max4MB = LZ3F_max4MB) +} LZ3F_blockSizeID_t; + +typedef enum { + LZ3F_blockLinked=0, + LZ3F_blockIndependent + LZ3F_OBSOLETE_ENUM(blockLinked = LZ3F_blockLinked) + LZ3F_OBSOLETE_ENUM(blockIndependent = LZ3F_blockIndependent) +} LZ3F_blockMode_t; + +typedef enum { + LZ3F_noContentChecksum=0, + LZ3F_contentChecksumEnabled + LZ3F_OBSOLETE_ENUM(noContentChecksum = LZ3F_noContentChecksum) + LZ3F_OBSOLETE_ENUM(contentChecksumEnabled = LZ3F_contentChecksumEnabled) +} LZ3F_contentChecksum_t; + +typedef enum { + LZ3F_frame=0, + LZ3F_skippableFrame + LZ3F_OBSOLETE_ENUM(skippableFrame = LZ3F_skippableFrame) +} LZ3F_frameType_t; + +#ifndef LZ3F_DISABLE_OBSOLETE_ENUMS +typedef LZ3F_blockSizeID_t blockSizeID_t; +typedef LZ3F_blockMode_t blockMode_t; +typedef LZ3F_frameType_t frameType_t; +typedef LZ3F_contentChecksum_t contentChecksum_t; +#endif + +typedef struct { + LZ3F_blockSizeID_t blockSizeID; /* max64KB, max256KB, max1MB, max4MB ; 0 == default */ + LZ3F_blockMode_t blockMode; /* blockLinked, blockIndependent ; 0 == default */ + LZ3F_contentChecksum_t contentChecksumFlag; /* noContentChecksum, contentChecksumEnabled ; 0 == default */ + LZ3F_frameType_t frameType; /* LZ3F_frame, skippableFrame ; 0 == default */ + unsigned long long contentSize; /* Size of uncompressed (original) content ; 0 == unknown */ + unsigned reserved[2]; /* must be zero for forward compatibility */ +} LZ3F_frameInfo_t; + +typedef struct { + LZ3F_frameInfo_t frameInfo; + int compressionLevel; /* 0 == default (fast mode); values above 16 count as 16; values below 0 count as 0 */ + unsigned autoFlush; /* 1 == always flush (reduce need for tmp buffer) */ + unsigned reserved[4]; /* must be zero for forward compatibility */ +} LZ3F_preferences_t; + + +/*********************************** + * Simple compression function + * *********************************/ +size_t LZ3F_compressFrameBound(size_t srcSize, const LZ3F_preferences_t* preferencesPtr); + +size_t LZ3F_compressFrame(void* dstBuffer, size_t dstMaxSize, const void* srcBuffer, size_t srcSize, const LZ3F_preferences_t* preferencesPtr); +/* LZ3F_compressFrame() + * Compress an entire srcBuffer into a valid LZ3 frame, as defined by specification v1.5.1 + * The most important rule is that dstBuffer MUST be large enough (dstMaxSize) to ensure compression completion even in worst case. + * You can get the minimum value of dstMaxSize by using LZ3F_compressFrameBound() + * If this condition is not respected, LZ3F_compressFrame() will fail (result is an errorCode) + * The LZ3F_preferences_t structure is optional : you can provide NULL as argument. All preferences will be set to default. + * The result of the function is the number of bytes written into dstBuffer. + * The function outputs an error code if it fails (can be tested using LZ3F_isError()) + */ + + + +/********************************** +* Advanced compression functions +**********************************/ +typedef struct LZ3F_cctx_s* LZ3F_compressionContext_t; /* must be aligned on 8-bytes */ + +typedef struct { + unsigned stableSrc; /* 1 == src content will remain available on future calls to LZ3F_compress(); avoid saving src content within tmp buffer as future dictionary */ + unsigned reserved[3]; +} LZ3F_compressOptions_t; + +/* Resource Management */ + +#define LZ3F_VERSION 100 +LZ3F_errorCode_t LZ3F_createCompressionContext(LZ3F_compressionContext_t* cctxPtr, unsigned version); +LZ3F_errorCode_t LZ3F_freeCompressionContext(LZ3F_compressionContext_t cctx); +/* LZ3F_createCompressionContext() : + * The first thing to do is to create a compressionContext object, which will be used in all compression operations. + * This is achieved using LZ3F_createCompressionContext(), which takes as argument a version and an LZ3F_preferences_t structure. + * The version provided MUST be LZ3F_VERSION. It is intended to track potential version differences between different binaries. + * The function will provide a pointer to a fully allocated LZ3F_compressionContext_t object. + * If the result LZ3F_errorCode_t is not zero, there was an error during context creation. + * Object can release its memory using LZ3F_freeCompressionContext(); + */ + + +/* Compression */ + +size_t LZ3F_compressBegin(LZ3F_compressionContext_t cctx, void* dstBuffer, size_t dstMaxSize, const LZ3F_preferences_t* prefsPtr); +/* LZ3F_compressBegin() : + * will write the frame header into dstBuffer. + * dstBuffer must be large enough to accommodate a header (dstMaxSize). Maximum header size is 15 bytes. + * The LZ3F_preferences_t structure is optional : you can provide NULL as argument, all preferences will then be set to default. + * The result of the function is the number of bytes written into dstBuffer for the header + * or an error code (can be tested using LZ3F_isError()) + */ + +size_t LZ3F_compressBound(size_t srcSize, const LZ3F_preferences_t* prefsPtr); +/* LZ3F_compressBound() : + * Provides the minimum size of Dst buffer given srcSize to handle worst case situations. + * Different preferences can produce different results. + * prefsPtr is optional : you can provide NULL as argument, all preferences will then be set to cover worst case. + * This function includes frame termination cost (4 bytes, or 8 if frame checksum is enabled) + */ + +size_t LZ3F_compressUpdate(LZ3F_compressionContext_t cctx, void* dstBuffer, size_t dstMaxSize, const void* srcBuffer, size_t srcSize, const LZ3F_compressOptions_t* cOptPtr); +/* LZ3F_compressUpdate() + * LZ3F_compressUpdate() can be called repetitively to compress as much data as necessary. + * The most important rule is that dstBuffer MUST be large enough (dstMaxSize) to ensure compression completion even in worst case. + * You can get the minimum value of dstMaxSize by using LZ3F_compressBound(). + * If this condition is not respected, LZ3F_compress() will fail (result is an errorCode). + * LZ3F_compressUpdate() doesn't guarantee error recovery, so you have to reset compression context when an error occurs. + * The LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. + * The result of the function is the number of bytes written into dstBuffer : it can be zero, meaning input data was just buffered. + * The function outputs an error code if it fails (can be tested using LZ3F_isError()) + */ + +size_t LZ3F_flush(LZ3F_compressionContext_t cctx, void* dstBuffer, size_t dstMaxSize, const LZ3F_compressOptions_t* cOptPtr); +/* LZ3F_flush() + * Should you need to generate compressed data immediately, without waiting for the current block to be filled, + * you can call LZ3__flush(), which will immediately compress any remaining data buffered within cctx. + * Note that dstMaxSize must be large enough to ensure the operation will be successful. + * LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. + * The result of the function is the number of bytes written into dstBuffer + * (it can be zero, this means there was no data left within cctx) + * The function outputs an error code if it fails (can be tested using LZ3F_isError()) + */ + +size_t LZ3F_compressEnd(LZ3F_compressionContext_t cctx, void* dstBuffer, size_t dstMaxSize, const LZ3F_compressOptions_t* cOptPtr); +/* LZ3F_compressEnd() + * When you want to properly finish the compressed frame, just call LZ3F_compressEnd(). + * It will flush whatever data remained within compressionContext (like LZ3__flush()) + * but also properly finalize the frame, with an endMark and a checksum. + * The result of the function is the number of bytes written into dstBuffer (necessarily >= 4 (endMark), or 8 if optional frame checksum is enabled) + * The function outputs an error code if it fails (can be tested using LZ3F_isError()) + * The LZ3F_compressOptions_t structure is optional : you can provide NULL as argument. + * A successful call to LZ3F_compressEnd() makes cctx available again for next compression task. + */ + + +/*********************************** +* Decompression functions +***********************************/ + +typedef struct LZ3F_dctx_s* LZ3F_decompressionContext_t; /* must be aligned on 8-bytes */ + +typedef struct { + unsigned stableDst; /* guarantee that decompressed data will still be there on next function calls (avoid storage into tmp buffers) */ + unsigned reserved[3]; +} LZ3F_decompressOptions_t; + + +/* Resource management */ + +LZ3F_errorCode_t LZ3F_createDecompressionContext(LZ3F_decompressionContext_t* dctxPtr, unsigned version); +LZ3F_errorCode_t LZ3F_freeDecompressionContext(LZ3F_decompressionContext_t dctx); +/* LZ3F_createDecompressionContext() : + * The first thing to do is to create an LZ3F_decompressionContext_t object, which will be used in all decompression operations. + * This is achieved using LZ3F_createDecompressionContext(). + * The version provided MUST be LZ3F_VERSION. It is intended to track potential breaking differences between different versions. + * The function will provide a pointer to a fully allocated and initialized LZ3F_decompressionContext_t object. + * The result is an errorCode, which can be tested using LZ3F_isError(). + * dctx memory can be released using LZ3F_freeDecompressionContext(); + * The result of LZ3F_freeDecompressionContext() is indicative of the current state of decompressionContext when being released. + * That is, it should be == 0 if decompression has been completed fully and correctly. + */ + + +/* Decompression */ + +size_t LZ3F_getFrameInfo(LZ3F_decompressionContext_t dctx, + LZ3F_frameInfo_t* frameInfoPtr, + const void* srcBuffer, size_t* srcSizePtr); +/* LZ3F_getFrameInfo() + * This function decodes frame header information (such as max blockSize, frame checksum, etc.). + * Its usage is optional : you can start by calling directly LZ3F_decompress() instead. + * The objective is to extract frame header information, typically for allocation purposes. + * LZ3F_getFrameInfo() can also be used anytime *after* starting decompression, on any valid LZ3F_decompressionContext_t. + * The result is *copied* into an existing LZ3F_frameInfo_t structure which must be already allocated. + * The number of bytes read from srcBuffer will be provided within *srcSizePtr (necessarily <= original value). + * The function result is an hint of how many srcSize bytes LZ3F_decompress() expects for next call, + * or an error code which can be tested using LZ3F_isError() + * (typically, when there is not enough src bytes to fully decode the frame header) + * You are expected to resume decompression from where it stopped (srcBuffer + *srcSizePtr) + */ + +size_t LZ3F_decompress(LZ3F_decompressionContext_t dctx, + void* dstBuffer, size_t* dstSizePtr, + const void* srcBuffer, size_t* srcSizePtr, + const LZ3F_decompressOptions_t* dOptPtr); +/* LZ3F_decompress() + * Call this function repetitively to regenerate data compressed within srcBuffer. + * The function will attempt to decode *srcSizePtr bytes from srcBuffer, into dstBuffer of maximum size *dstSizePtr. + * + * The number of bytes regenerated into dstBuffer will be provided within *dstSizePtr (necessarily <= original value). + * + * The number of bytes read from srcBuffer will be provided within *srcSizePtr (necessarily <= original value). + * If number of bytes read is < number of bytes provided, then decompression operation is not completed. + * It typically happens when dstBuffer is not large enough to contain all decoded data. + * LZ3F_decompress() must be called again, starting from where it stopped (srcBuffer + *srcSizePtr) + * The function will check this condition, and refuse to continue if it is not respected. + * + * dstBuffer is supposed to be flushed between each call to the function, since its content will be overwritten. + * dst arguments can be changed at will with each consecutive call to the function. + * + * The function result is an hint of how many srcSize bytes LZ3F_decompress() expects for next call. + * Schematically, it's the size of the current (or remaining) compressed block + header of next block. + * Respecting the hint provides some boost to performance, since it does skip intermediate buffers. + * This is just a hint, you can always provide any srcSize you want. + * When a frame is fully decoded, the function result will be 0 (no more data expected). + * If decompression failed, function result is an error code, which can be tested using LZ3F_isError(). + * + * After a frame is fully decoded, dctx can be used again to decompress another frame. + */ + + +#if defined (__cplusplus) +} +#endif diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h.meta new file mode 100644 index 00000000..bb837c8c --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 10bedf9e6c389a74f8f61a784caaefb5 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h new file mode 100644 index 00000000..13d27706 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h @@ -0,0 +1,81 @@ +/* + LZ3 auto-framing library + Header File for static linking only + Copyright (C) 2011-2015, Yann Collet. + + BSD 2-Clause License (http://www.opensource.org/licenses/bsd-license.php) + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following disclaimer + in the documentation and/or other materials provided with the + distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + You can contact the author at : + - LZ3 source repository : https://github.com/Cyan4973/lz3 + - LZ3 public forum : https://groups.google.com/forum/#!forum/lz3c +*/ + +#pragma once + +#if defined (__cplusplus) +extern "C" { +#endif + +/* lz3frame_static.h should be used solely in the context of static linking. + * It contains definitions which may still change overtime. + * Never use it in the context of DLL linking. + * */ + + +/************************************** +* Includes +**************************************/ +#include "lz4frame.h" + + +/************************************** + * Error management + * ************************************/ +#define LZ3F_LIST_ERRORS(ITEM) \ + ITEM(OK_NoError) ITEM(ERROR_GENERIC) \ + ITEM(ERROR_maxBlockSize_invalid) ITEM(ERROR_blockMode_invalid) ITEM(ERROR_contentChecksumFlag_invalid) \ + ITEM(ERROR_compressionLevel_invalid) \ + ITEM(ERROR_headerVersion_wrong) ITEM(ERROR_blockChecksum_unsupported) ITEM(ERROR_reservedFlag_set) \ + ITEM(ERROR_allocation_failed) \ + ITEM(ERROR_srcSize_tooLarge) ITEM(ERROR_dstMaxSize_tooSmall) \ + ITEM(ERROR_frameHeader_incomplete) ITEM(ERROR_frameType_unknown) ITEM(ERROR_frameSize_wrong) \ + ITEM(ERROR_srcPtr_wrong) \ + ITEM(ERROR_decompressionFailed) \ + ITEM(ERROR_headerChecksum_invalid) ITEM(ERROR_contentChecksum_invalid) \ + ITEM(ERROR_maxCode) + +//#define LZ3F_DISABLE_OLD_ENUMS +#ifndef LZ3F_DISABLE_OLD_ENUMS +#define LZ3F_GENERATE_ENUM(ENUM) LZ3F_##ENUM, ENUM = LZ3F_##ENUM, +#else +#define LZ3F_GENERATE_ENUM(ENUM) LZ3F_##ENUM, +#endif +typedef enum { LZ3F_LIST_ERRORS(LZ3F_GENERATE_ENUM) } LZ3F_errorCodes; /* enum is exposed, to handle specific errors; compare function result to -enum value */ + + +#if defined (__cplusplus) +} +#endif diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h.meta new file mode 100644 index 00000000..30f1944e --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4frame_static.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 1cf54d5b4faeac14a97c77dca9020367 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp new file mode 100644 index 00000000..1cb7609b --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp @@ -0,0 +1,953 @@ + + +/************************************** +* Tuning Parameter +**************************************/ +static const int LZ3HC_compressionLevel_default = 9; + + +/************************************** +* Includes +**************************************/ +#include "lz4hc.h" + + +/************************************** +* Local Compiler Options +**************************************/ +#if defined(__GNUC__) +# pragma GCC diagnostic ignored "-Wunused-function" +#endif + +#if defined (__clang__) +# pragma clang diagnostic ignored "-Wunused-function" +#endif + + +/************************************** +* Common LZ3 definition +**************************************/ +#define LZ3__COMMONDEFS_ONLY +#include "lz4.h" + + +/************************************** +* Compiler Options +**************************************/ +#ifdef _MSC_VER /* Visual Studio */ +# define FORCE_INLINE static __forceinline +# include +# pragma warning(disable : 4127) /* disable: C4127: conditional expression is constant */ +# pragma warning(disable : 4293) /* disable: C4293: too large shift (32-bits) */ +#else +# if defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */ +# if defined(__GNUC__) || defined(__clang__) +# define FORCE_INLINE static inline __attribute__((always_inline)) +# else +# define FORCE_INLINE static inline +# endif +# else +# define FORCE_INLINE static +# endif /* __STDC_VERSION__ */ +#endif /* _MSC_VER */ + +/* LZ3__GCC_VERSION is defined into lz3.h */ +#if (LZ3__GCC_VERSION >= 302) || (__INTEL_COMPILER >= 800) || defined(__clang__) +# define expect(expr,value) (__builtin_expect ((expr),(value)) ) +#else +# define expect(expr,value) (expr) +#endif + +#define likely(expr) expect((expr) != 0, 1) +#define unlikely(expr) expect((expr) != 0, 0) + +/************************************** +* Memory routines +**************************************/ +#include /* malloc, calloc, free */ +#define ALLOCATOR(n,s) calloc(n,s) +#define FREEMEM free +#include /* memset, memcpy */ +#define MEM_INIT memset + + +#if defined (__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */ +# include + typedef uint8_t BYTE; + typedef uint16_t U16; + typedef uint32_t U32; + typedef int32_t S32; + typedef uint64_t U64; +#else + typedef unsigned char BYTE; + typedef unsigned short U16; + typedef unsigned int U32; + typedef signed int S32; + typedef unsigned long long U64; +#endif + + +/************************************** +* Reading and writing into memory +**************************************/ +#define STEPSIZE sizeof(size_t) + +static unsigned LZ3__64bits(void) { return sizeof(void*)==8; } + +static unsigned LZ3__isLittleEndian(void) +{ + const union { U32 i; BYTE c[4]; } one = { 1 }; /* don't use static : performance detrimental */ + return one.c[0]; +} + + +static U16 LZ3__read16(const void* memPtr) +{ + U16 val16; + memcpy(&val16, memPtr, 2); + return val16; +} + +static U16 LZ3__readLE16(const void* memPtr) +{ + if (LZ3__isLittleEndian()) + { + return LZ3__read16(memPtr); + } + else + { + const BYTE* p = (const BYTE*)memPtr; + return (U16)((U16)p[0] + (p[1]<<8)); + } +} + +static void LZ3__writeLE16(void* memPtr, U16 value) +{ + if (LZ3__isLittleEndian()) + { + memcpy(memPtr, &value, 2); + } + else + { + BYTE* p = (BYTE*)memPtr; + p[0] = (BYTE) value; + p[1] = (BYTE)(value>>8); + } +} + +static U32 LZ3__read32(const void* memPtr) +{ + U32 val32; + memcpy(&val32, memPtr, 4); + return val32; +} + +static U64 LZ3__read64(const void* memPtr) +{ + U64 val64; + memcpy(&val64, memPtr, 8); + return val64; +} + +static size_t LZ3__read_ARCH(const void* p) +{ + if (LZ3__64bits()) + return (size_t)LZ3__read64(p); + else + return (size_t)LZ3__read32(p); +} + + +static void LZ3__copy4(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 4); } + +static void LZ3__copy8(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 8); } + +/* customized version of memcpy, which may overwrite up to 7 bytes beyond dstEnd */ +static void LZ3__wildCopy(void* dstPtr, const void* srcPtr, void* dstEnd) +{ + BYTE* d = (BYTE*)dstPtr; + const BYTE* s = (const BYTE*)srcPtr; + BYTE* e = (BYTE*)dstEnd; + do { LZ3__copy8(d,s); d+=8; s+=8; } while (d (unsigned)LZ3__MAX_INPUT_SIZE ? 0 : (isize) + ((isize)/255) + 16) +int LZ3__compressBound(int inputSize); +/************************************** +* Common functions +**************************************/ +static unsigned LZ3__NbCommonBytes ( size_t val) +{ + if (LZ3__isLittleEndian()) + { + if (LZ3__64bits()) + { +# if defined(_MSC_VER) && defined(_WIN64) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanForward64( &r, (U64)val ); + return (int)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctzll((U64)val) >> 3); +# else + static const int DeBruijnBytePos[64] = { 0, 0, 0, 0, 0, 1, 1, 2, 0, 3, 1, 3, 1, 4, 2, 7, 0, 2, 3, 6, 1, 5, 3, 5, 1, 3, 4, 4, 2, 5, 6, 7, 7, 0, 1, 2, 3, 3, 4, 6, 2, 6, 5, 5, 3, 4, 5, 6, 7, 1, 2, 4, 6, 4, 4, 5, 7, 2, 6, 5, 7, 6, 7, 7 }; + return DeBruijnBytePos[((U64)((val & -(long long)val) * 0x0218A392CDABBD3FULL)) >> 58]; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r; + _BitScanForward( &r, (U32)val ); + return (int)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctz((U32)val) >> 3); +# else + static const int DeBruijnBytePos[32] = { 0, 0, 3, 0, 3, 1, 3, 0, 3, 2, 2, 1, 3, 2, 0, 1, 3, 3, 1, 2, 2, 2, 2, 0, 3, 1, 2, 0, 1, 0, 1, 1 }; + return DeBruijnBytePos[((U32)((val & -(S32)val) * 0x077CB531U)) >> 27]; +# endif + } + } + else /* Big Endian CPU */ + { + if (LZ3__64bits()) + { +# if defined(_MSC_VER) && defined(_WIN64) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse64( &r, val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clzll((U64)val) >> 3); +# else + unsigned r; + if (!(val>>32)) { r=4; } else { r=0; val>>=32; } + if (!(val>>16)) { r+=2; val>>=8; } else { val>>=24; } + r += (!val); + return r; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse( &r, (unsigned long)val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clz((U32)val) >> 3); +# else + unsigned r; + if (!(val>>16)) { r=2; val>>=8; } else { r=0; val>>=24; } + r += (!val); + return r; +# endif + } + } +} + +static unsigned LZ3__count(const BYTE* pIn, const BYTE* pMatch, const BYTE* pInLimit) +{ + const BYTE* const pStart = pIn; + + while (likely(pIn> ((MINMATCH*8)-HASH_LOG)) +//#define DELTANEXTU16(p) chainTable[(p) & MAXD_MASK] /* flexible, MAXD dependent */ +#define DELTANEXTU16(p) chainTable[(U16)(p)] /* faster */ + +static U32 LZ3HC_hashPtr(const void* ptr) { return HASH_FUNCTION(LZ3__read32(ptr)); } + + + +/************************************** +* HC Compression +**************************************/ +static void LZ3HC_init (LZ3HC_Data_Structure* hc4, const BYTE* start) +{ + MEM_INIT((void*)hc4->hashTable, 0, sizeof(hc4->hashTable)); + MEM_INIT(hc4->chainTable, 0xFF, sizeof(hc4->chainTable)); + hc4->nextToUpdate = 64 KB; + hc4->base = start - 64 KB; + hc4->end = start; + hc4->dictBase = start - 64 KB; + hc4->dictLimit = 64 KB; + hc4->lowLimit = 64 KB; +} + + +/* Update chains up to ip (excluded) */ +FORCE_INLINE void LZ3HC_Insert (LZ3HC_Data_Structure* hc4, const BYTE* ip) +{ + U16* chainTable = hc4->chainTable; + U32* HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const U32 target = (U32)(ip - base); + U32 idx = hc4->nextToUpdate; + + while(idx < target) + { + U32 h = LZ3HC_hashPtr(base+idx); + size_t delta = idx - HashTable[h]; + if (delta>MAX_DISTANCE) delta = MAX_DISTANCE; + DELTANEXTU16(idx) = (U16)delta; + HashTable[h] = idx; + idx++; + } + + hc4->nextToUpdate = target; +} + + +FORCE_INLINE int LZ3HC_InsertAndFindBestMatch (LZ3HC_Data_Structure* hc4, /* Index table will be updated */ + const BYTE* ip, const BYTE* const iLimit, + const BYTE** matchpos, + const int maxNbAttempts) +{ + U16* const chainTable = hc4->chainTable; + U32* const HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const BYTE* const dictBase = hc4->dictBase; + const U32 dictLimit = hc4->dictLimit; + const U32 lowLimit = (hc4->lowLimit + 64 KB > (U32)(ip-base)) ? hc4->lowLimit : (U32)(ip - base) - (64 KB - 1); + U32 matchIndex; + const BYTE* match; + int nbAttempts=maxNbAttempts; + size_t ml=0; + + /* HC4 match finder */ + LZ3HC_Insert(hc4, ip); + matchIndex = HashTable[LZ3HC_hashPtr(ip)]; + + while ((matchIndex>=lowLimit) && (nbAttempts)) + { + nbAttempts--; + if (matchIndex >= dictLimit) + { + match = base + matchIndex; + if (*(match+ml) == *(ip+ml) + && (LZ3__read32(match) == LZ3__read32(ip))) + { + size_t mlt = LZ3__count(ip+MINMATCH, match+MINMATCH, iLimit) + MINMATCH; + if (mlt > ml) { ml = mlt; *matchpos = match; } + } + } + else + { + match = dictBase + matchIndex; + if (LZ3__read32(match) == LZ3__read32(ip)) + { + size_t mlt; + const BYTE* vLimit = ip + (dictLimit - matchIndex); + if (vLimit > iLimit) vLimit = iLimit; + mlt = LZ3__count(ip+MINMATCH, match+MINMATCH, vLimit) + MINMATCH; + if ((ip+mlt == vLimit) && (vLimit < iLimit)) + mlt += LZ3__count(ip+mlt, base+dictLimit, iLimit); + if (mlt > ml) { ml = mlt; *matchpos = base + matchIndex; } /* virtual matchpos */ + } + } + matchIndex -= DELTANEXTU16(matchIndex); + } + + return (int)ml; +} + + +FORCE_INLINE int LZ3HC_InsertAndGetWiderMatch ( + LZ3HC_Data_Structure* hc4, + const BYTE* const ip, + const BYTE* const iLowLimit, + const BYTE* const iHighLimit, + int longest, + const BYTE** matchpos, + const BYTE** startpos, + const int maxNbAttempts) +{ + U16* const chainTable = hc4->chainTable; + U32* const HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const U32 dictLimit = hc4->dictLimit; + const BYTE* const lowPrefixPtr = base + dictLimit; + const U32 lowLimit = (hc4->lowLimit + 64 KB > (U32)(ip-base)) ? hc4->lowLimit : (U32)(ip - base) - (64 KB - 1); + const BYTE* const dictBase = hc4->dictBase; + U32 matchIndex; + int nbAttempts = maxNbAttempts; + int delta = (int)(ip-iLowLimit); + + + /* First Match */ + LZ3HC_Insert(hc4, ip); + matchIndex = HashTable[LZ3HC_hashPtr(ip)]; + + while ((matchIndex>=lowLimit) && (nbAttempts)) + { + nbAttempts--; + if (matchIndex >= dictLimit) + { + const BYTE* matchPtr = base + matchIndex; + if (*(iLowLimit + longest) == *(matchPtr - delta + longest)) + if (LZ3__read32(matchPtr) == LZ3__read32(ip)) + { + int mlt = MINMATCH + LZ3__count(ip+MINMATCH, matchPtr+MINMATCH, iHighLimit); + int back = 0; + + while ((ip+back>iLowLimit) + && (matchPtr+back > lowPrefixPtr) + && (ip[back-1] == matchPtr[back-1])) + back--; + + mlt -= back; + + if (mlt > longest) + { + longest = (int)mlt; + *matchpos = matchPtr+back; + *startpos = ip+back; + } + } + } + else + { + const BYTE* matchPtr = dictBase + matchIndex; + if (LZ3__read32(matchPtr) == LZ3__read32(ip)) + { + size_t mlt; + int back=0; + const BYTE* vLimit = ip + (dictLimit - matchIndex); + if (vLimit > iHighLimit) vLimit = iHighLimit; + mlt = LZ3__count(ip+MINMATCH, matchPtr+MINMATCH, vLimit) + MINMATCH; + if ((ip+mlt == vLimit) && (vLimit < iHighLimit)) + mlt += LZ3__count(ip+mlt, base+dictLimit, iHighLimit); + while ((ip+back > iLowLimit) && (matchIndex+back > lowLimit) && (ip[back-1] == matchPtr[back-1])) back--; + mlt -= back; + if ((int)mlt > longest) { longest = (int)mlt; *matchpos = base + matchIndex + back; *startpos = ip+back; } + } + } + matchIndex -= DELTANEXTU16(matchIndex); + } + + return longest; +} + + +typedef enum { noLimit = 0, limitedOutput = 1 } limitedOutput_directive; + +#define LZ3HC_DEBUG 0 +#if LZ3HC_DEBUG +static unsigned debug = 0; +#endif + +FORCE_INLINE int LZ3HC_encodeSequence ( + const BYTE** ip, + BYTE** op, + const BYTE** anchor, + int matchLength, + const BYTE* const match, + limitedOutput_directive limitedOutputBuffer, + BYTE* oend) +{ + int length; + BYTE* token; + +#if LZ3HC_DEBUG + if (debug) printf("literal : %u -- match : %u -- offset : %u\n", (U32)(*ip - *anchor), (U32)matchLength, (U32)(*ip-match)); +#endif + + /* Encode Literal length */ + length = (int)(*ip - *anchor); + token = (*op)++; + if ((limitedOutputBuffer) && ((*op + (length>>8) + length + (2 + 1 + LASTLITERALS)) > oend)) return 1; /* Check output limit */ + if (length>=(int)RUN_MASK) { int len; *token=(RUN_MASK< 254 ; len-=255) *(*op)++ = 255; *(*op)++ = (BYTE)len; } + else *token = (BYTE)(length<>8) + (1 + LASTLITERALS) > oend)) return 1; /* Check output limit */ + if (length>=(int)ML_MASK) { *token+=ML_MASK; length-=ML_MASK; for(; length > 509 ; length-=510) { *(*op)++ = 255; *(*op)++ = 255; } if (length > 254) { length-=255; *(*op)++ = 255; } *(*op)++ = (BYTE)length; } + else *token += (BYTE)(length); + + /* Prepare next loop */ + *ip += matchLength; + *anchor = *ip; + + return 0; +} + + +static int LZ3HC_compress_generic ( + void* ctxvoid, + const char* source, + char* dest, + int inputSize, + int maxOutputSize, + int compressionLevel, + limitedOutput_directive limit + ) +{ + LZ3HC_Data_Structure* ctx = (LZ3HC_Data_Structure*) ctxvoid; + const BYTE* ip = (const BYTE*) source; + const BYTE* anchor = ip; + const BYTE* const iend = ip + inputSize; + const BYTE* const mflimit = iend - MFLIMIT; + const BYTE* const matchlimit = (iend - LASTLITERALS); + + BYTE* op = (BYTE*) dest; + BYTE* const oend = op + maxOutputSize; + + unsigned maxNbAttempts; + int ml, ml2, ml3, ml0; + const BYTE* ref=NULL; + const BYTE* start2=NULL; + const BYTE* ref2=NULL; + const BYTE* start3=NULL; + const BYTE* ref3=NULL; + const BYTE* start0; + const BYTE* ref0; + + + /* init */ + if (compressionLevel > g_maxCompressionLevel) compressionLevel = g_maxCompressionLevel; + if (compressionLevel < 1) compressionLevel = LZ3HC_compressionLevel_default; + maxNbAttempts = 1 << (compressionLevel-1); + ctx->end += inputSize; + + ip++; + + /* Main Loop */ + while (ip < mflimit) + { + ml = LZ3HC_InsertAndFindBestMatch (ctx, ip, matchlimit, (&ref), maxNbAttempts); + if (!ml) { ip++; continue; } + + /* saved, in case we would skip too much */ + start0 = ip; + ref0 = ref; + ml0 = ml; + +_Search2: + if (ip+ml < mflimit) + ml2 = LZ3HC_InsertAndGetWiderMatch(ctx, ip + ml - 2, ip + 1, matchlimit, ml, &ref2, &start2, maxNbAttempts); + else ml2 = ml; + + if (ml2 == ml) /* No better match */ + { + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + continue; + } + + if (start0 < ip) + { + if (start2 < ip + ml0) /* empirical */ + { + ip = start0; + ref = ref0; + ml = ml0; + } + } + + /* Here, start0==ip */ + if ((start2 - ip) < 3) /* First Match too small : removed */ + { + ml = ml2; + ip = start2; + ref =ref2; + goto _Search2; + } + +_Search3: + /* + * Currently we have : + * ml2 > ml1, and + * ip1+3 <= ip2 (usually < ip1+ml1) + */ + if ((start2 - ip) < OPTIMAL_ML) + { + int correction; + int new_ml = ml; + if (new_ml > OPTIMAL_ML) new_ml = OPTIMAL_ML; + if (ip+new_ml > start2 + ml2 - MINMATCH) new_ml = (int)(start2 - ip) + ml2 - MINMATCH; + correction = new_ml - (int)(start2 - ip); + if (correction > 0) + { + start2 += correction; + ref2 += correction; + ml2 -= correction; + } + } + /* Now, we have start2 = ip+new_ml, with new_ml = min(ml, OPTIMAL_ML=18) */ + + if (start2 + ml2 < mflimit) + ml3 = LZ3HC_InsertAndGetWiderMatch(ctx, start2 + ml2 - 3, start2, matchlimit, ml2, &ref3, &start3, maxNbAttempts); + else ml3 = ml2; + + if (ml3 == ml2) /* No better match : 2 sequences to encode */ + { + /* ip & ref are known; Now for ml */ + if (start2 < ip+ml) ml = (int)(start2 - ip); + /* Now, encode 2 sequences */ + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + ip = start2; + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml2, ref2, limit, oend)) return 0; + continue; + } + + if (start3 < ip+ml+3) /* Not enough space for match 2 : remove it */ + { + if (start3 >= (ip+ml)) /* can write Seq1 immediately ==> Seq2 is removed, so Seq3 becomes Seq1 */ + { + if (start2 < ip+ml) + { + int correction = (int)(ip+ml - start2); + start2 += correction; + ref2 += correction; + ml2 -= correction; + if (ml2 < MINMATCH) + { + start2 = start3; + ref2 = ref3; + ml2 = ml3; + } + } + + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + ip = start3; + ref = ref3; + ml = ml3; + + start0 = start2; + ref0 = ref2; + ml0 = ml2; + goto _Search2; + } + + start2 = start3; + ref2 = ref3; + ml2 = ml3; + goto _Search3; + } + + /* + * OK, now we have 3 ascending matches; let's write at least the first one + * ip & ref are known; Now for ml + */ + if (start2 < ip+ml) + { + if ((start2 - ip) < (int)ML_MASK) + { + int correction; + if (ml > OPTIMAL_ML) ml = OPTIMAL_ML; + if (ip + ml > start2 + ml2 - MINMATCH) ml = (int)(start2 - ip) + ml2 - MINMATCH; + correction = ml - (int)(start2 - ip); + if (correction > 0) + { + start2 += correction; + ref2 += correction; + ml2 -= correction; + } + } + else + { + ml = (int)(start2 - ip); + } + } + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + + ip = start2; + ref = ref2; + ml = ml2; + + start2 = start3; + ref2 = ref3; + ml2 = ml3; + + goto _Search3; + } + + /* Encode Last Literals */ + { + int lastRun = (int)(iend - anchor); + if ((limit) && (((char*)op - dest) + lastRun + 1 + ((lastRun+255-RUN_MASK)/255) > (U32)maxOutputSize)) return 0; /* Check output limit */ + if (lastRun>=(int)RUN_MASK) { *op++=(RUN_MASK< 254 ; lastRun-=255) *op++ = 255; *op++ = (BYTE) lastRun; } + else *op++ = (BYTE)(lastRun<base = NULL; + ((LZ3HC_Data_Structure*)LZ3__streamHCPtr)->compressionLevel = (unsigned)compressionLevel; +} + +int LZ3__loadDictHC (LZ3__streamHC_t* LZ3__streamHCPtr, const char* dictionary, int dictSize) +{ + LZ3HC_Data_Structure* ctxPtr = (LZ3HC_Data_Structure*) LZ3__streamHCPtr; + if (dictSize > 64 KB) + { + dictionary += dictSize - 64 KB; + dictSize = 64 KB; + } + LZ3HC_init (ctxPtr, (const BYTE*)dictionary); + if (dictSize >= 4) LZ3HC_Insert (ctxPtr, (const BYTE*)dictionary +(dictSize-3)); + ctxPtr->end = (const BYTE*)dictionary + dictSize; + return dictSize; +} + + +/* compression */ + +static void LZ3HC_setExternalDict(LZ3HC_Data_Structure* ctxPtr, const BYTE* newBlock) +{ + if (ctxPtr->end >= ctxPtr->base + 4) + LZ3HC_Insert (ctxPtr, ctxPtr->end-3); /* Referencing remaining dictionary content */ + /* Only one memory segment for extDict, so any previous extDict is lost at this stage */ + ctxPtr->lowLimit = ctxPtr->dictLimit; + ctxPtr->dictLimit = (U32)(ctxPtr->end - ctxPtr->base); + ctxPtr->dictBase = ctxPtr->base; + ctxPtr->base = newBlock - ctxPtr->dictLimit; + ctxPtr->end = newBlock; + ctxPtr->nextToUpdate = ctxPtr->dictLimit; /* match referencing will resume from there */ +} + +static int LZ3__compressHC_continue_generic (LZ3HC_Data_Structure* ctxPtr, + const char* source, char* dest, + int inputSize, int maxOutputSize, limitedOutput_directive limit) +{ + /* auto-init if forgotten */ + if (ctxPtr->base == NULL) + LZ3HC_init (ctxPtr, (const BYTE*) source); + + /* Check overflow */ + if ((size_t)(ctxPtr->end - ctxPtr->base) > 2 GB) + { + size_t dictSize = (size_t)(ctxPtr->end - ctxPtr->base) - ctxPtr->dictLimit; + if (dictSize > 64 KB) dictSize = 64 KB; + + LZ3__loadDictHC((LZ3__streamHC_t*)ctxPtr, (const char*)(ctxPtr->end) - dictSize, (int)dictSize); + } + + /* Check if blocks follow each other */ + if ((const BYTE*)source != ctxPtr->end) + LZ3HC_setExternalDict(ctxPtr, (const BYTE*)source); + + /* Check overlapping input/dictionary space */ + { + const BYTE* sourceEnd = (const BYTE*) source + inputSize; + const BYTE* dictBegin = ctxPtr->dictBase + ctxPtr->lowLimit; + const BYTE* dictEnd = ctxPtr->dictBase + ctxPtr->dictLimit; + if ((sourceEnd > dictBegin) && ((const BYTE*)source < dictEnd)) + { + if (sourceEnd > dictEnd) sourceEnd = dictEnd; + ctxPtr->lowLimit = (U32)(sourceEnd - ctxPtr->dictBase); + if (ctxPtr->dictLimit - ctxPtr->lowLimit < 4) ctxPtr->lowLimit = ctxPtr->dictLimit; + } + } + + return LZ3HC_compress_generic (ctxPtr, source, dest, inputSize, maxOutputSize, ctxPtr->compressionLevel, limit); +} + +int LZ3__compress_HC_continue (LZ3__streamHC_t* LZ3__streamHCPtr, const char* source, char* dest, int inputSize, int maxOutputSize) +{ + if (maxOutputSize < LZ3__compressBound(inputSize)) + return LZ3__compressHC_continue_generic ((LZ3HC_Data_Structure*)LZ3__streamHCPtr, source, dest, inputSize, maxOutputSize, limitedOutput); + else + return LZ3__compressHC_continue_generic ((LZ3HC_Data_Structure*)LZ3__streamHCPtr, source, dest, inputSize, maxOutputSize, noLimit); +} + + +/* dictionary saving */ + +int LZ3__saveDictHC (LZ3__streamHC_t* LZ3__streamHCPtr, char* safeBuffer, int dictSize) +{ + LZ3HC_Data_Structure* streamPtr = (LZ3HC_Data_Structure*)LZ3__streamHCPtr; + int prefixSize = (int)(streamPtr->end - (streamPtr->base + streamPtr->dictLimit)); + if (dictSize > 64 KB) dictSize = 64 KB; + if (dictSize < 4) dictSize = 0; + if (dictSize > prefixSize) dictSize = prefixSize; + memmove(safeBuffer, streamPtr->end - dictSize, dictSize); + { + U32 endIndex = (U32)(streamPtr->end - streamPtr->base); + streamPtr->end = (const BYTE*)safeBuffer + dictSize; + streamPtr->base = streamPtr->end - endIndex; + streamPtr->dictLimit = endIndex - dictSize; + streamPtr->lowLimit = endIndex - dictSize; + if (streamPtr->nextToUpdate < streamPtr->dictLimit) streamPtr->nextToUpdate = streamPtr->dictLimit; + } + return dictSize; +} + + +/*********************************** +* Deprecated Functions +***********************************/ +/* Deprecated compression functions */ +/* These functions are planned to start generate warnings by r131 approximately */ +int LZ3__compressHC(const char* src, char* dst, int srcSize) { return LZ3__compress_HC (src, dst, srcSize, LZ3__compressBound(srcSize), 0); } +int LZ3__compressHC_limitedOutput(const char* src, char* dst, int srcSize, int maxDstSize) { return LZ3__compress_HC(src, dst, srcSize, maxDstSize, 0); } +int LZ3__compressHC2(const char* src, char* dst, int srcSize, int cLevel) { return LZ3__compress_HC (src, dst, srcSize, LZ3__compressBound(srcSize), cLevel); } +int LZ3__compressHC2_limitedOutput(const char* src, char* dst, int srcSize, int maxDstSize, int cLevel) { return LZ3__compress_HC(src, dst, srcSize, maxDstSize, cLevel); } +int LZ3__compressHC_withStateHC (void* state, const char* src, char* dst, int srcSize) { return LZ3__compress_HC_extStateHC (state, src, dst, srcSize, LZ3__compressBound(srcSize), 0); } +int LZ3__compressHC_limitedOutput_withStateHC (void* state, const char* src, char* dst, int srcSize, int maxDstSize) { return LZ3__compress_HC_extStateHC (state, src, dst, srcSize, maxDstSize, 0); } +int LZ3__compressHC2_withStateHC (void* state, const char* src, char* dst, int srcSize, int cLevel) { return LZ3__compress_HC_extStateHC(state, src, dst, srcSize, LZ3__compressBound(srcSize), cLevel); } +int LZ3__compressHC2_limitedOutput_withStateHC (void* state, const char* src, char* dst, int srcSize, int maxDstSize, int cLevel) { return LZ3__compress_HC_extStateHC(state, src, dst, srcSize, maxDstSize, cLevel); } +int LZ3__compressHC_continue (LZ3__streamHC_t* ctx, const char* src, char* dst, int srcSize) { return LZ3__compress_HC_continue (ctx, src, dst, srcSize, LZ3__compressBound(srcSize)); } +int LZ3__compressHC_limitedOutput_continue (LZ3__streamHC_t* ctx, const char* src, char* dst, int srcSize, int maxDstSize) { return LZ3__compress_HC_continue (ctx, src, dst, srcSize, maxDstSize); } + + +/* Deprecated streaming functions */ +/* These functions currently generate deprecation warnings */ +int LZ3__sizeofStreamStateHC(void) { return LZ3__STREAMHCSIZE; } + +int LZ3__resetStreamStateHC(void* state, char* inputBuffer) +{ + if ((((size_t)state) & (sizeof(void*)-1)) != 0) return 1; /* Error : pointer is not aligned for pointer (32 or 64 bits) */ + LZ3HC_init((LZ3HC_Data_Structure*)state, (const BYTE*)inputBuffer); + ((LZ3HC_Data_Structure*)state)->inputBuffer = (BYTE*)inputBuffer; + return 0; +} + +void* LZ3__createHC (char* inputBuffer) +{ + void* hc4 = ALLOCATOR(1, sizeof(LZ3HC_Data_Structure)); + if (hc4 == NULL) return NULL; /* not enough memory */ + LZ3HC_init ((LZ3HC_Data_Structure*)hc4, (const BYTE*)inputBuffer); + ((LZ3HC_Data_Structure*)hc4)->inputBuffer = (BYTE*)inputBuffer; + return hc4; +} + +int LZ3__freeHC (void* LZ3HC_Data) +{ + FREEMEM(LZ3HC_Data); + return (0); +} + +int LZ3__compressHC2_continue (void* LZ3HC_Data, const char* source, char* dest, int inputSize, int compressionLevel) +{ + return LZ3HC_compress_generic (LZ3HC_Data, source, dest, inputSize, 0, compressionLevel, noLimit); +} + +int LZ3__compressHC2_limitedOutput_continue (void* LZ3HC_Data, const char* source, char* dest, int inputSize, int maxOutputSize, int compressionLevel) +{ + return LZ3HC_compress_generic (LZ3HC_Data, source, dest, inputSize, maxOutputSize, compressionLevel, limitedOutput); +} + +char* LZ3__slideInputBufferHC(void* LZ3HC_Data) +{ + LZ3HC_Data_Structure* hc4 = (LZ3HC_Data_Structure*)LZ3HC_Data; + int dictSize = LZ3__saveDictHC((LZ3__streamHC_t*)LZ3HC_Data, (char*)(hc4->inputBuffer), 64 KB); + return (char*)(hc4->inputBuffer + dictSize); +} diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp.meta new file mode 100644 index 00000000..2fba0e06 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.cpp.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 7897d562f1859394396e7338ace48ff5 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h new file mode 100644 index 00000000..cd53012a --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h @@ -0,0 +1,189 @@ +/* + LZ3 HC - High Compression Mode of LZ3 + Header File + Copyright (C) 2011-2015, Yann Collet. + BSD 2-Clause License (http://www.opensource.org/licenses/bsd-license.php) + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following disclaimer + in the documentation and/or other materials provided with the + distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + You can contact the author at : + - LZ3 source repository : https://github.com/Cyan4973/lz3 + - LZ3 public forum : https://groups.google.com/forum/#!forum/lz3c +*/ +#pragma once + + +#if defined (__cplusplus) +extern "C" { +#endif + +/***************************** +* Includes +*****************************/ +#include /* size_t */ + + +/************************************** +* Block Compression +**************************************/ +int LZ3__compress_HC (const char* src, char* dst, int srcSize, int maxDstSize, int compressionLevel); +/* +LZ3__compress_HC : + Destination buffer 'dst' must be already allocated. + Compression completion is guaranteed if 'dst' buffer is sized to handle worst circumstances (data not compressible) + Worst size evaluation is provided by function LZ3__compressBound() (see "lz3.h") + srcSize : Max supported value is LZ3__MAX_INPUT_SIZE (see "lz3.h") + compressionLevel : Recommended values are between 4 and 9, although any value between 0 and 16 will work. + 0 means "use default value" (see lz3hc.c). + Values >16 behave the same as 16. + return : the number of bytes written into buffer 'dst' + or 0 if compression fails. +*/ + + +/* Note : + Decompression functions are provided within LZ3 source code (see "lz3.h") (BSD license) +*/ + + +int LZ3__sizeofStateHC(void); +int LZ3__compress_HC_extStateHC(void* state, const char* src, char* dst, int srcSize, int maxDstSize, int compressionLevel); +/* +LZ3__compress_HC_extStateHC() : + Use this function if you prefer to manually allocate memory for compression tables. + To know how much memory must be allocated for the compression tables, use : + int LZ3__sizeofStateHC(); + + Allocated memory must be aligned on 8-bytes boundaries (which a normal malloc() will do properly). + + The allocated memory can then be provided to the compression functions using 'void* state' parameter. + LZ3__compress_HC_extStateHC() is equivalent to previously described function. + It just uses externally allocated memory for stateHC. +*/ + + +/************************************** +* Streaming Compression +**************************************/ +#define LZ3__STREAMHCSIZE 262192 +#define LZ3__STREAMHCSIZE_SIZET (LZ3__STREAMHCSIZE / sizeof(size_t)) +typedef struct { size_t table[LZ3__STREAMHCSIZE_SIZET]; } LZ3__streamHC_t; +/* + LZ3__streamHC_t + This structure allows static allocation of LZ3 HC streaming state. + State must then be initialized using LZ3__resetStreamHC() before first use. + + Static allocation should only be used in combination with static linking. + If you want to use LZ3 as a DLL, please use construction functions below, which are future-proof. +*/ + + +LZ3__streamHC_t* LZ3__createStreamHC(void); +int LZ3__freeStreamHC (LZ3__streamHC_t* streamHCPtr); +/* + These functions create and release memory for LZ3 HC streaming state. + Newly created states are already initialized. + Existing state space can be re-used anytime using LZ3__resetStreamHC(). + If you use LZ3 as a DLL, use these functions instead of static structure allocation, + to avoid size mismatch between different versions. +*/ + +void LZ3__resetStreamHC (LZ3__streamHC_t* streamHCPtr, int compressionLevel); +int LZ3__loadDictHC (LZ3__streamHC_t* streamHCPtr, const char* dictionary, int dictSize); + +int LZ3__compress_HC_continue (LZ3__streamHC_t* streamHCPtr, const char* src, char* dst, int srcSize, int maxDstSize); + +int LZ3__saveDictHC (LZ3__streamHC_t* streamHCPtr, char* safeBuffer, int maxDictSize); + +/* + These functions compress data in successive blocks of any size, using previous blocks as dictionary. + One key assumption is that previous blocks (up to 64 KB) remain read-accessible while compressing next blocks. + There is an exception for ring buffers, which can be smaller 64 KB. + Such case is automatically detected and correctly handled by LZ3__compress_HC_continue(). + + Before starting compression, state must be properly initialized, using LZ3__resetStreamHC(). + A first "fictional block" can then be designated as initial dictionary, using LZ3__loadDictHC() (Optional). + + Then, use LZ3__compress_HC_continue() to compress each successive block. + It works like LZ3__compress_HC(), but use previous memory blocks as dictionary to improve compression. + Previous memory blocks (including initial dictionary when present) must remain accessible and unmodified during compression. + As a reminder, size 'dst' buffer to handle worst cases, using LZ3__compressBound(), to ensure success of compression operation. + + If, for any reason, previous data blocks can't be preserved unmodified in memory during next compression block, + you must save it to a safer memory space, using LZ3__saveDictHC(). + Return value of LZ3__saveDictHC() is the size of dictionary effectively saved into 'safeBuffer'. +*/ + + + +/************************************** +* Deprecated Functions +**************************************/ +/* Deprecate Warnings */ +/* Should these warnings messages be a problem, + it is generally possible to disable them, + with -Wno-deprecated-declarations for gcc + or _CRT_SECURE_NO_WARNINGS in Visual for example. + You can also define LZ3__DEPRECATE_WARNING_DEFBLOCK. */ +#ifndef LZ3__DEPRECATE_WARNING_DEFBLOCK +# define LZ3__DEPRECATE_WARNING_DEFBLOCK +# define LZ3__GCC_VERSION (__GNUC__ * 100 + __GNUC_MINOR__) +# if (LZ3__GCC_VERSION >= 405) || defined(__clang__) +# define LZ3__DEPRECATED(message) __attribute__((deprecated(message))) +# elif (LZ3__GCC_VERSION >= 301) +# define LZ3__DEPRECATED(message) __attribute__((deprecated)) +# elif defined(_MSC_VER) +# define LZ3__DEPRECATED(message) __declspec(deprecated(message)) +# else +# pragma message("WARNING: You need to implement LZ3__DEPRECATED for this compiler") +# define LZ3__DEPRECATED(message) +# endif +#endif // LZ3__DEPRECATE_WARNING_DEFBLOCK + +/* compression functions */ +/* these functions are planned to trigger warning messages by r131 approximately */ +int LZ3__compressHC (const char* source, char* dest, int inputSize); +int LZ3__compressHC_limitedOutput (const char* source, char* dest, int inputSize, int maxOutputSize); +int LZ3__compressHC2 (const char* source, char* dest, int inputSize, int compressionLevel); +int LZ3__compressHC2_limitedOutput (const char* source, char* dest, int inputSize, int maxOutputSize, int compressionLevel); +int LZ3__compressHC_withStateHC (void* state, const char* source, char* dest, int inputSize); +int LZ3__compressHC_limitedOutput_withStateHC (void* state, const char* source, char* dest, int inputSize, int maxOutputSize); +int LZ3__compressHC2_withStateHC (void* state, const char* source, char* dest, int inputSize, int compressionLevel); +int LZ3__compressHC2_limitedOutput_withStateHC(void* state, const char* source, char* dest, int inputSize, int maxOutputSize, int compressionLevel); +int LZ3__compressHC_continue (LZ3__streamHC_t* LZ3__streamHCPtr, const char* source, char* dest, int inputSize); +int LZ3__compressHC_limitedOutput_continue (LZ3__streamHC_t* LZ3__streamHCPtr, const char* source, char* dest, int inputSize, int maxOutputSize); + +/* Streaming functions following the older model; should no longer be used */ +LZ3__DEPRECATED("use LZ3__createStreamHC() instead") void* LZ3__createHC (char* inputBuffer); +LZ3__DEPRECATED("use LZ3__saveDictHC() instead") char* LZ3__slideInputBufferHC (void* LZ3HC_Data); +LZ3__DEPRECATED("use LZ3__freeStreamHC() instead") int LZ3__freeHC (void* LZ3HC_Data); +LZ3__DEPRECATED("use LZ3__compress_HC_continue() instead") int LZ3__compressHC2_continue (void* LZ3HC_Data, const char* source, char* dest, int inputSize, int compressionLevel); +LZ3__DEPRECATED("use LZ3__compress_HC_continue() instead") int LZ3__compressHC2_limitedOutput_continue (void* LZ3HC_Data, const char* source, char* dest, int inputSize, int maxOutputSize, int compressionLevel); +LZ3__DEPRECATED("use LZ3__createStreamHC() instead") int LZ3__sizeofStreamStateHC(void); +LZ3__DEPRECATED("use LZ3__resetStreamHC() instead") int LZ3__resetStreamStateHC(void* state, char* inputBuffer); + + +#if defined (__cplusplus) +} +#endif diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h.meta new file mode 100644 index 00000000..a11a550c --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4hc.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 8143639c0b7f67d4a8cea5202933138c +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp new file mode 100644 index 00000000..6351597a --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp @@ -0,0 +1,1079 @@ + + + +/***************************** +* Includes +*****************************/ +#include /* fprintf, fopen, fread, stdin, stdout, fflush, getchar */ +#include /* malloc, free */ +#include /* strcmp, strlen */ +#include /* clock */ +#include /* stat64 */ +#include /* stat64 */ +#include "lz4w.h" +//#include "lz3.h" /* still required for legacy format */ +#include "lz4hc.h" /* still required for legacy format */ + +#include "lz4frame.h" + + + + + +#define LZ3W__BLOCKSIZEID_DEFAULT 7 + + + + + +/************************************** +* Local Parameters +**************************************/ + +static int g_blockSizeId = LZ3W__BLOCKSIZEID_DEFAULT; + +static int g_streamChecksum = 1; +static int g_blockIndependence = 1; + + + +extern "C"{ + void LZ4releaseBuffer(unsigned char *src) +{ + free(src); +} + + + char* LZ4Create_Buffer(int size) +{ + + return (char *)malloc(size); +} + + + + void LZ4AddTo_Buffer(char* dst, int offset, char* buf, int len) +{ + + memcpy(dst + offset, buf, len); +} + +} + +/* +#define LZ3__MAX_INPUT_SIZE 0x7E000000 // 2 113 929 216 bytes +#define LZ3__COMPRESSBOUND(isize) ((unsigned)(isize) > (unsigned)LZ3__MAX_INPUT_SIZE ? 0 : (isize) + ((isize)/255) + 16) +static int LZ3__compressBound(int isize) { return LZ3__COMPRESSBOUND(isize); } +*/ + +/* +extern "C"{ +unsigned char* LZ3CompressBuffer(unsigned const char* src, int inLength, int *sizz, int level) { + + (*sizz) = 0; + LZ3F_preferences_t prefs; + + prefs.autoFlush = 1; + prefs.compressionLevel = level; + prefs.frameInfo.blockMode = (LZ3F_blockMode_t)g_blockIndependence; + prefs.frameInfo.blockSizeID = (LZ3F_blockSizeID_t)g_blockSizeId; + prefs.frameInfo.contentChecksumFlag = (LZ3F_contentChecksum_t)g_streamChecksum; + + int max = (int)LZ3F_compressFrameBound(inLength, &prefs); + + unsigned char *dest = (unsigned char *)malloc(((int)max) * sizeof(char)); + + //(*sizz) = LZ3__compress_default(src , dest, inLength, max); + + (*sizz) = LZ3F_compressFrame(dest, max, src, inLength, &prefs); + + return dest; +} +} +*/ + + + + + /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// + // + /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// + + typedef unsigned char BYTE; + typedef unsigned short U16; + typedef unsigned int U32; + typedef signed int S32; + typedef unsigned long long U64; + + /* LZ3__GCC_VERSION is defined into lz3.h */ +#if (LZ3__GCC_VERSION >= 302) || (__INTEL_COMPILER >= 800) || defined(__clang__) +# define expect(expr,value) (__builtin_expect ((expr),(value)) ) +#else +# define expect(expr,value) (expr) +#endif + + #define likely(expr) expect((expr) != 0, 1) +#define unlikely(expr) expect((expr) != 0, 0) + + #define MINMATCH 4 + +#define COPYLENGTH 8 +#define LASTLITERALS 5 +#define MFLIMIT (COPYLENGTH+MINMATCH) +//static const int LZ3__minLength = (MFLIMIT+1); + +#define KB *(1 <<10) +#define MB *(1 <<20) +#define GB *(1U<<30) + +#define MAXD_LOG 16 +#define MAX_DISTANCE ((1 << MAXD_LOG) - 1) + +#define ML_BITS 4 +#define ML_MASK ((1U<>8); + } +} + +static U32 LZ3__read32(const void* memPtr) +{ + U32 val32; + memcpy(&val32, memPtr, 4); + return val32; +} + +static size_t LZ3__read_ARCH(const void* p) +{ + if (LZ3__64bits()) + return (size_t)LZ3__read64(p); + else + return (size_t)LZ3__read32(p); +} + + + +static void LZ3__copy4(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 4); } + +static void LZ3__copy8(void* dstPtr, const void* srcPtr) { memcpy(dstPtr, srcPtr, 8); } + +/* customized version of memcpy, which may overwrite up to 7 bytes beyond dstEnd */ +static void LZ3__wildCopy(void* dstPtr, const void* srcPtr, void* dstEnd) +{ + BYTE* d = (BYTE*)dstPtr; + const BYTE* s = (const BYTE*)srcPtr; + BYTE* e = (BYTE*)dstEnd; + do { LZ3__copy8(d,s); d+=8; s+=8; } while (d oend-MFLIMIT)) oexit = oend-MFLIMIT; /* targetOutputSize too high => decode everything */ + if ((endOnInput) && (unlikely(outputSize==0))) return ((inputSize==1) && (*ip==0)) ? 0 : -1; /* Empty output buffer */ + if ((!endOnInput) && (unlikely(outputSize==0))) return (*ip==0?1:-1); + + + /* Main Loop */ + while (1) + { + unsigned token; + size_t length; + const BYTE* match; + + /* get literal length */ + token = *ip++; + if ((length=(token>>ML_BITS)) == RUN_MASK) + { + unsigned s; + do + { + s = *ip++; + length += s; + } + while (likely((endOnInput)?ip(partialDecoding?oexit:oend-MFLIMIT)) || (ip+length>iend-(2+1+LASTLITERALS))) ) + || ((!endOnInput) && (cpy>oend-COPYLENGTH))) + { + if (partialDecoding) + { + if (cpy > oend) goto _output_error; /* Error : write attempt beyond end of output buffer */ + if ((endOnInput) && (ip+length > iend)) goto _output_error; /* Error : read attempt beyond end of input buffer */ + } + else + { + if ((!endOnInput) && (cpy != oend)) goto _output_error; /* Error : block decoding must stop exactly there */ + if ((endOnInput) && ((ip+length != iend) || (cpy > oend))) goto _output_error; /* Error : input must be consumed */ + } + memcpy(op, ip, length); + ip += length; + op += length; + break; /* Necessarily EOF, due to parsing restrictions */ + } + LZ3__wildCopy(op, ip, cpy); + ip += length; op = cpy; + + /* get offset */ + match = cpy - LZ3__readLE16(ip); ip+=2; + if ((checkOffset) && (unlikely(match < lowLimit))) goto _output_error; /* Error : offset outside destination buffer */ + + /* get matchlength */ + length = token & ML_MASK; + if (length == ML_MASK) + { + unsigned s; + do + { + if ((endOnInput) && (ip > iend-LASTLITERALS)) goto _output_error; + s = *ip++; + length += s; + } while (s==255); + if ((safeDecode) && unlikely((size_t)(op+length)<(size_t)op)) goto _output_error; /* overflow detection */ + } + length += MINMATCH; + + /* check external dictionary */ + if ((dict==usingExtDict) && (match < lowPrefix)) + { + if (unlikely(op+length > oend-LASTLITERALS)) goto _output_error; /* doesn't respect parsing restriction */ + + if (length <= (size_t)(lowPrefix-match)) + { + /* match can be copied as a single segment from external dictionary */ + match = dictEnd - (lowPrefix-match); + memmove(op, match, length); op += length; + } + else + { + /* match encompass external dictionary and current segment */ + size_t copySize = (size_t)(lowPrefix-match); + memcpy(op, dictEnd - copySize, copySize); + op += copySize; + copySize = length - copySize; + if (copySize > (size_t)(op-lowPrefix)) /* overlap within current segment */ + { + BYTE* const endOfMatch = op + copySize; + const BYTE* copyFrom = lowPrefix; + while (op < endOfMatch) *op++ = *copyFrom++; + } + else + { + memcpy(op, lowPrefix, copySize); + op += copySize; + } + } + continue; + } + + /* copy repeated sequence */ + cpy = op + length; + if (unlikely((op-match)<8)) + { + const size_t dec64 = dec64table[op-match]; + op[0] = match[0]; + op[1] = match[1]; + op[2] = match[2]; + op[3] = match[3]; + match += dec32table[op-match]; + LZ3__copy4(op+4, match); + op += 8; match -= dec64; + } else { LZ3__copy8(op, match); op+=8; match+=8; } + + if (unlikely(cpy>oend-12)) + { + if (cpy > oend-LASTLITERALS) goto _output_error; /* Error : last LASTLITERALS bytes must be literals */ + if (op < oend-8) + { + LZ3__wildCopy(op, match, oend-8); + match += (oend-8) - op; + op = oend-8; + } + while (op>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctzll((U64)val) >> 3); +# else + static const int DeBruijnBytePos[64] = { 0, 0, 0, 0, 0, 1, 1, 2, 0, 3, 1, 3, 1, 4, 2, 7, 0, 2, 3, 6, 1, 5, 3, 5, 1, 3, 4, 4, 2, 5, 6, 7, 7, 0, 1, 2, 3, 3, 4, 6, 2, 6, 5, 5, 3, 4, 5, 6, 7, 1, 2, 4, 6, 4, 4, 5, 7, 2, 6, 5, 7, 6, 7, 7 }; + return DeBruijnBytePos[((U64)((val & -(long long)val) * 0x0218A392CDABBD3FULL)) >> 58]; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r; + _BitScanForward( &r, (U32)val ); + return (int)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_ctz((U32)val) >> 3); +# else + static const int DeBruijnBytePos[32] = { 0, 0, 3, 0, 3, 1, 3, 0, 3, 2, 2, 1, 3, 2, 0, 1, 3, 3, 1, 2, 2, 2, 2, 0, 3, 1, 2, 0, 1, 0, 1, 1 }; + return DeBruijnBytePos[((U32)((val & -(S32)val) * 0x077CB531U)) >> 27]; +# endif + } + } + else /* Big Endian CPU */ + { + if (LZ3__64bits()) + { +# if defined(_MSC_VER) && defined(_WIN64) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse64( &r, val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clzll((U64)val) >> 3); +# else + unsigned r; + if (!(val>>32)) { r=4; } else { r=0; val>>=32; } + if (!(val>>16)) { r+=2; val>>=8; } else { val>>=24; } + r += (!val); + return r; +# endif + } + else /* 32 bits */ + { +# if defined(_MSC_VER) && !defined(LZ3__FORCE_SW_BITCOUNT) + unsigned long r = 0; + _BitScanReverse( &r, (unsigned long)val ); + return (unsigned)(r>>3); +# elif (defined(__clang__) || (LZ3__GCC_VERSION >= 304)) && !defined(LZ3__FORCE_SW_BITCOUNT) + return (__builtin_clz((U32)val) >> 3); +# else + unsigned r; + if (!(val>>16)) { r=2; val>>=8; } else { r=0; val>>=24; } + r += (!val); + return r; +# endif + } + } +} + + + + static const int LZ3HC_compressionLevel_default = 9; + + + +/************************************** +* Local Types +**************************************/ +typedef struct +{ + U32 hashTable[HASHTABLESIZE]; + U16 chainTable[MAXD]; + const BYTE* end; /* next block here to continue on current prefix */ + const BYTE* base; /* All index relative to this position */ + const BYTE* dictBase; /* alternate base for extDict */ + BYTE* inputBuffer; /* deprecated */ + U32 dictLimit; /* below that point, need extDict */ + U32 lowLimit; /* below that point, no more dict */ + U32 nextToUpdate; /* index from which to continue dictionary update */ + U32 compressionLevel; +} LZ3HC_Data_Structure; + + +/************************************** +* Local Macros +**************************************/ +#define HASH_FUNCTION(i) (((i) * 2654435761U) >> ((MINMATCH*8)-HASH_LOG)) +//#define DELTANEXTU16(p) chainTable[(p) & MAXD_MASK] /* flexible, MAXD dependent */ +#define DELTANEXTU16(p) chainTable[(U16)(p)] /* faster */ + + + + +static unsigned LZ3__count(const BYTE* pIn, const BYTE* pMatch, const BYTE* pInLimit) +{ + const BYTE* const pStart = pIn; + + while (likely(pInhashTable, 0, sizeof(hc4->hashTable)); + MEM_INIT(hc4->chainTable, 0xFF, sizeof(hc4->chainTable)); + hc4->nextToUpdate = 64 KB; + hc4->base = start - 64 KB; + hc4->end = start; + hc4->dictBase = start - 64 KB; + hc4->dictLimit = 64 KB; + hc4->lowLimit = 64 KB; +} + + + +/* Update chains up to ip (excluded) */ + static inline __attribute__((always_inline)) void LZ3HC_Insert (LZ3HC_Data_Structure* hc4, const BYTE* ip) +{ + U16* chainTable = hc4->chainTable; + U32* HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const U32 target = (U32)(ip - base); + U32 idx = hc4->nextToUpdate; + + while(idx < target) + { + U32 h = LZ3HC_hashPtr(base+idx); + size_t delta = idx - HashTable[h]; + if (delta>MAX_DISTANCE) delta = MAX_DISTANCE; + DELTANEXTU16(idx) = (U16)delta; + HashTable[h] = idx; + idx++; + } + + hc4->nextToUpdate = target; +} + + + + static inline __attribute__((always_inline)) int LZ3HC_InsertAndFindBestMatch (LZ3HC_Data_Structure* hc4, /* Index table will be updated */ + const BYTE* ip, const BYTE* const iLimit, + const BYTE** matchpos, + const int maxNbAttempts) +{ + U16* const chainTable = hc4->chainTable; + U32* const HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const BYTE* const dictBase = hc4->dictBase; + const U32 dictLimit = hc4->dictLimit; + const U32 lowLimit = (hc4->lowLimit + 64 KB > (U32)(ip-base)) ? hc4->lowLimit : (U32)(ip - base) - (64 KB - 1); + U32 matchIndex; + const BYTE* match; + int nbAttempts=maxNbAttempts; + size_t ml=0; + + /* HC4 match finder */ + LZ3HC_Insert(hc4, ip); + matchIndex = HashTable[LZ3HC_hashPtr(ip)]; + + while ((matchIndex>=lowLimit) && (nbAttempts)) + { + nbAttempts--; + if (matchIndex >= dictLimit) + { + match = base + matchIndex; + if (*(match+ml) == *(ip+ml) + && (LZ3__read32(match) == LZ3__read32(ip))) + { + size_t mlt = LZ3__count(ip+MINMATCH, match+MINMATCH, iLimit) + MINMATCH; + if (mlt > ml) { ml = mlt; *matchpos = match; } + } + } + else + { + match = dictBase + matchIndex; + if (LZ3__read32(match) == LZ3__read32(ip)) + { + size_t mlt; + const BYTE* vLimit = ip + (dictLimit - matchIndex); + if (vLimit > iLimit) vLimit = iLimit; + mlt = LZ3__count(ip+MINMATCH, match+MINMATCH, vLimit) + MINMATCH; + if ((ip+mlt == vLimit) && (vLimit < iLimit)) + mlt += LZ3__count(ip+mlt, base+dictLimit, iLimit); + if (mlt > ml) { ml = mlt; *matchpos = base + matchIndex; } /* virtual matchpos */ + } + } + matchIndex -= DELTANEXTU16(matchIndex); + } + + return (int)ml; +} + + + + + static inline __attribute__((always_inline)) int LZ3HC_InsertAndGetWiderMatch ( + LZ3HC_Data_Structure* hc4, + const BYTE* const ip, + const BYTE* const iLowLimit, + const BYTE* const iHighLimit, + int longest, + const BYTE** matchpos, + const BYTE** startpos, + const int maxNbAttempts) +{ + U16* const chainTable = hc4->chainTable; + U32* const HashTable = hc4->hashTable; + const BYTE* const base = hc4->base; + const U32 dictLimit = hc4->dictLimit; + const BYTE* const lowPrefixPtr = base + dictLimit; + const U32 lowLimit = (hc4->lowLimit + 64 KB > (U32)(ip-base)) ? hc4->lowLimit : (U32)(ip - base) - (64 KB - 1); + const BYTE* const dictBase = hc4->dictBase; + U32 matchIndex; + int nbAttempts = maxNbAttempts; + int delta = (int)(ip-iLowLimit); + + + /* First Match */ + LZ3HC_Insert(hc4, ip); + matchIndex = HashTable[LZ3HC_hashPtr(ip)]; + + while ((matchIndex>=lowLimit) && (nbAttempts)) + { + nbAttempts--; + if (matchIndex >= dictLimit) + { + const BYTE* matchPtr = base + matchIndex; + if (*(iLowLimit + longest) == *(matchPtr - delta + longest)) + if (LZ3__read32(matchPtr) == LZ3__read32(ip)) + { + int mlt = MINMATCH + LZ3__count(ip+MINMATCH, matchPtr+MINMATCH, iHighLimit); + int back = 0; + + while ((ip+back>iLowLimit) + && (matchPtr+back > lowPrefixPtr) + && (ip[back-1] == matchPtr[back-1])) + back--; + + mlt -= back; + + if (mlt > longest) + { + longest = (int)mlt; + *matchpos = matchPtr+back; + *startpos = ip+back; + } + } + } + else + { + const BYTE* matchPtr = dictBase + matchIndex; + if (LZ3__read32(matchPtr) == LZ3__read32(ip)) + { + size_t mlt; + int back=0; + const BYTE* vLimit = ip + (dictLimit - matchIndex); + if (vLimit > iHighLimit) vLimit = iHighLimit; + mlt = LZ3__count(ip+MINMATCH, matchPtr+MINMATCH, vLimit) + MINMATCH; + if ((ip+mlt == vLimit) && (vLimit < iHighLimit)) + mlt += LZ3__count(ip+mlt, base+dictLimit, iHighLimit); + while ((ip+back > iLowLimit) && (matchIndex+back > lowLimit) && (ip[back-1] == matchPtr[back-1])) back--; + mlt -= back; + if ((int)mlt > longest) { longest = (int)mlt; *matchpos = base + matchIndex + back; *startpos = ip+back; } + } + } + matchIndex -= DELTANEXTU16(matchIndex); + } + + return longest; +} + + + + + + + static inline __attribute__((always_inline)) int LZ3HC_encodeSequence ( + const BYTE** ip, + BYTE** op, + const BYTE** anchor, + int matchLength, + const BYTE* const match, + limitedOutput_directive limitedOutputBuffer, + BYTE* oend) +{ + int length; + BYTE* token; + + /* Encode Literal length */ + length = (int)(*ip - *anchor); + token = (*op)++; + if ((limitedOutputBuffer) && ((*op + (length>>8) + length + (2 + 1 + LASTLITERALS)) > oend)) return 1; /* Check output limit */ + if (length>=(int)RUN_MASK) { int len; *token=(RUN_MASK< 254 ; len-=255) *(*op)++ = 255; *(*op)++ = (BYTE)len; } + else *token = (BYTE)(length<>8) + (1 + LASTLITERALS) > oend)) return 1; /* Check output limit */ + if (length>=(int)ML_MASK) { *token+=ML_MASK; length-=ML_MASK; for(; length > 509 ; length-=510) { *(*op)++ = 255; *(*op)++ = 255; } if (length > 254) { length-=255; *(*op)++ = 255; } *(*op)++ = (BYTE)length; } + else *token += (BYTE)(length); + + /* Prepare next loop */ + *ip += matchLength; + *anchor = *ip; + + return 0; +} + + + + + + +static int LZ3HC_compress_generic2 ( + void* ctxvoid, + const char* source, + char* dest, + int inputSize, + int maxOutputSize, + int compressionLevel, + limitedOutput_directive limit + ) +{ + LZ3HC_Data_Structure* ctx = (LZ3HC_Data_Structure*) ctxvoid; + const BYTE* ip = (const BYTE*) source; + const BYTE* anchor = ip; + const BYTE* const iend = ip + inputSize; + const BYTE* const mflimit = iend - MFLIMIT; + const BYTE* const matchlimit = (iend - LASTLITERALS); + + BYTE* op = (BYTE*) dest; + BYTE* const oend = op + maxOutputSize; + + unsigned maxNbAttempts; + int ml, ml2, ml3, ml0; + const BYTE* ref=NULL; + const BYTE* start2=NULL; + const BYTE* ref2=NULL; + const BYTE* start3=NULL; + const BYTE* ref3=NULL; + const BYTE* start0; + const BYTE* ref0; + + + /* init */ + if (compressionLevel > g_maxCompressionLevel) compressionLevel = g_maxCompressionLevel; + if (compressionLevel < 1) compressionLevel = LZ3HC_compressionLevel_default; + maxNbAttempts = 1 << (compressionLevel-1); + ctx->end += inputSize; + + ip++; + + /* Main Loop */ + while (ip < mflimit) + { + ml = LZ3HC_InsertAndFindBestMatch (ctx, ip, matchlimit, (&ref), maxNbAttempts); + if (!ml) { ip++; continue; } + + /* saved, in case we would skip too much */ + start0 = ip; + ref0 = ref; + ml0 = ml; + +_Search2: + if (ip+ml < mflimit) + ml2 = LZ3HC_InsertAndGetWiderMatch(ctx, ip + ml - 2, ip + 1, matchlimit, ml, &ref2, &start2, maxNbAttempts); + else ml2 = ml; + + if (ml2 == ml) /* No better match */ + { + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + continue; + } + + if (start0 < ip) + { + if (start2 < ip + ml0) /* empirical */ + { + ip = start0; + ref = ref0; + ml = ml0; + } + } + + /* Here, start0==ip */ + if ((start2 - ip) < 3) /* First Match too small : removed */ + { + ml = ml2; + ip = start2; + ref =ref2; + goto _Search2; + } + +_Search3: + /* + * Currently we have : + * ml2 > ml1, and + * ip1+3 <= ip2 (usually < ip1+ml1) + */ + if ((start2 - ip) < OPTIMAL_ML) + { + int correction; + int new_ml = ml; + if (new_ml > OPTIMAL_ML) new_ml = OPTIMAL_ML; + if (ip+new_ml > start2 + ml2 - MINMATCH) new_ml = (int)(start2 - ip) + ml2 - MINMATCH; + correction = new_ml - (int)(start2 - ip); + if (correction > 0) + { + start2 += correction; + ref2 += correction; + ml2 -= correction; + } + } + /* Now, we have start2 = ip+new_ml, with new_ml = min(ml, OPTIMAL_ML=18) */ + + if (start2 + ml2 < mflimit) + ml3 = LZ3HC_InsertAndGetWiderMatch(ctx, start2 + ml2 - 3, start2, matchlimit, ml2, &ref3, &start3, maxNbAttempts); + else ml3 = ml2; + + if (ml3 == ml2) /* No better match : 2 sequences to encode */ + { + /* ip & ref are known; Now for ml */ + if (start2 < ip+ml) ml = (int)(start2 - ip); + /* Now, encode 2 sequences */ + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + ip = start2; + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml2, ref2, limit, oend)) return 0; + continue; + } + + if (start3 < ip+ml+3) /* Not enough space for match 2 : remove it */ + { + if (start3 >= (ip+ml)) /* can write Seq1 immediately ==> Seq2 is removed, so Seq3 becomes Seq1 */ + { + if (start2 < ip+ml) + { + int correction = (int)(ip+ml - start2); + start2 += correction; + ref2 += correction; + ml2 -= correction; + if (ml2 < MINMATCH) + { + start2 = start3; + ref2 = ref3; + ml2 = ml3; + } + } + + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + ip = start3; + ref = ref3; + ml = ml3; + + start0 = start2; + ref0 = ref2; + ml0 = ml2; + goto _Search2; + } + + start2 = start3; + ref2 = ref3; + ml2 = ml3; + goto _Search3; + } + + /* + * OK, now we have 3 ascending matches; let's write at least the first one + * ip & ref are known; Now for ml + */ + if (start2 < ip+ml) + { + if ((start2 - ip) < (int)ML_MASK) + { + int correction; + if (ml > OPTIMAL_ML) ml = OPTIMAL_ML; + if (ip + ml > start2 + ml2 - MINMATCH) ml = (int)(start2 - ip) + ml2 - MINMATCH; + correction = ml - (int)(start2 - ip); + if (correction > 0) + { + start2 += correction; + ref2 += correction; + ml2 -= correction; + } + } + else + { + ml = (int)(start2 - ip); + } + } + if (LZ3HC_encodeSequence(&ip, &op, &anchor, ml, ref, limit, oend)) return 0; + + ip = start2; + ref = ref2; + ml = ml2; + + start2 = start3; + ref2 = ref3; + ml2 = ml3; + + goto _Search3; + } + + /* Encode Last Literals */ + { + int lastRun = (int)(iend - anchor); + if ((limit) && (((char*)op - dest) + lastRun + 1 + ((lastRun+255-RUN_MASK)/255) > (U32)maxOutputSize)) return 0; /* Check output limit */ + if (lastRun>=(int)RUN_MASK) { *op++=(RUN_MASK< 254 ; lastRun-=255) *op++ = 255; *op++ = (BYTE) lastRun; } + else *op++ = (BYTE)(lastRun< (unsigned)LZ3__MAX_INPUT_SIZE ? 0 : (isize) + ((isize)/255) + 16) +int LZ3__compressBound(int inputSize); +//typedef enum { notLimited = 0, limitedOutput = 1 } limitedOutput_directive; + + int LZ4__compressBound(int isize) { return LZ3__COMPRESSBOUND(isize); } + + + extern "C"{ + char* LZ4CompressBuffer(const char* src, int srcSize, int *sizz, int compressionLevel) { + + (*sizz) = 0; + + //int max = LZ3__compressBound(inLength); + + LZ3F_preferences_t prefs; + prefs.autoFlush = 1; + prefs.compressionLevel = compressionLevel; + prefs.frameInfo.blockMode = (LZ3F_blockMode_t)g_blockIndependence; + prefs.frameInfo.blockSizeID = (LZ3F_blockSizeID_t)g_blockSizeId; + prefs.frameInfo.contentChecksumFlag = (LZ3F_contentChecksum_t)g_streamChecksum; + + int maxDstSize = (int)LZ3F_compressFrameBound(srcSize, &prefs); + + + char *dst = ( char *)malloc(((int)maxDstSize) * sizeof(char)); + + LZ3HC_Data_Structure state; + + if (((size_t)(&state)&(sizeof(void*)-1)) != 0) return NULL; // Error : state is not aligned for pointers (32 or 64 bits) + + LZ3HC_init ((LZ3HC_Data_Structure*)&state, (const BYTE*)src); + + //if (maxDstSize < LZ3__compressBound(srcSize))//(srcSize) + ((srcSize)/255) + 16; + if (maxDstSize < (srcSize) + ((srcSize)/255) + 16) + (*sizz) = LZ3HC_compress_generic2 (&state, src, dst, srcSize, maxDstSize, compressionLevel, limitedOutput); + else + (*sizz) = LZ3HC_compress_generic2 (&state, src, dst, srcSize, maxDstSize, compressionLevel, notLimited); + + //int LZ3__compress_HC (const char* src, char* dst, int srcSize, int maxDstSize, int compressionLevel); + //(*sizz) = LZ3__compress_HC(src , dest, inLength, max, level); + + return dst; + } +} + + +/* +extern "C"{ +unsigned char* LZ4CompressBuffer(const char* src, int inLength, int *sizz, int level) { + + (*sizz) = 0; + LZ3F_preferences_t prefs; + + prefs.autoFlush = 1; + prefs.compressionLevel = level; + prefs.frameInfo.blockMode = (LZ3F_blockMode_t)g_blockIndependence; + prefs.frameInfo.blockSizeID = (LZ3F_blockSizeID_t)g_blockSizeId; + prefs.frameInfo.contentChecksumFlag = (LZ3F_contentChecksum_t)g_streamChecksum; + + int max = (int)LZ3F_compressFrameBound(inLength, &prefs); + + unsigned char *dest = (unsigned char *)malloc(((int)max) * sizeof(char)); + + //(*sizz) = LZ3__compress_default(src , dest, inLength, max); + + (*sizz) = LZ3F_compressFrame(dest, max, src, inLength, &prefs); + + return dest; +} +} +*/ + + + + + + \ No newline at end of file diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp.meta new file mode 100644 index 00000000..3b734608 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.cpp.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: c8e5fcca88aab684eab88643cb1bda84 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h new file mode 100644 index 00000000..4e878d19 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h @@ -0,0 +1,32 @@ + + +#pragma once + +/* ************************************************** */ +/* Special input/output values */ +/* ************************************************** */ +#define NULL_OUTPUT "null" +static char const stdinmark[] = "stdin"; +static char const stdoutmark[] = "stdout"; +#ifdef _WIN32 +static char const nulmark[] = "nul"; +#else +static char const nulmark[] = "/dev/null"; +#endif + + +/* ************************************************** */ +/* ****************** Functions ********************* */ +/* ************************************************** */ + +//int __declspec(dllexport) LZ3CompressFile (const char* input_filename, const char* output_filename, int compressionlevel); +//int __declspec(dllexport) LZ3DecompressFile(const char* input_filename, const char* output_filename); + + +//int LZ3ComressFiles(const char** inFileNamesTable, int ifntSize, const char* suffix, int compressionlevel); +//int LZ3DecomressFiles(const char** inFileNamesTable, int ifntSize, const char* suffix); + +/* ************************************************** */ +/* ****************** Parameters ******************** */ +/* ************************************************** */ + diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h.meta new file mode 100644 index 00000000..0bea56a5 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/lz4w.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: f10009d6a3e390c40b709701a079784c +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp new file mode 100644 index 00000000..9e56d935 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp @@ -0,0 +1,882 @@ + +/************************************** +* Tuning parameters +**************************************/ +/* Unaligned memory access is automatically enabled for "common" CPU, such as x86. + * For others CPU, the compiler will be more cautious, and insert extra code to ensure aligned access is respected. + * If you know your target CPU supports unaligned memory access, you want to force this option manually to improve performance. + * You can also enable this parameter if you know your input data will always be aligned (boundaries of 4, for U32). + */ +#if defined(__ARM_FEATURE_UNALIGNED) || defined(__i386) || defined(_M_IX86) || defined(__x86_64__) || defined(_M_X64) +# define XXH_USE_UNALIGNED_ACCESS 1 +#endif + +/* XXH_ACCEPT_NULL_INPUT_POINTER : + * If the input pointer is a null pointer, xxHash default behavior is to trigger a memory access error, since it is a bad pointer. + * When this option is enabled, xxHash output for null input pointers will be the same as a null-length input. + * By default, this option is disabled. To enable it, uncomment below define : + */ +/* #define XXH_ACCEPT_NULL_INPUT_POINTER 1 */ + +/* XXH_FORCE_NATIVE_FORMAT : + * By default, xxHash library provides endian-independant Hash values, based on little-endian convention. + * Results are therefore identical for little-endian and big-endian CPU. + * This comes at a performance cost for big-endian CPU, since some swapping is required to emulate little-endian format. + * Should endian-independance be of no importance for your application, you may set the #define below to 1. + * It will improve speed for Big-endian CPU. + * This option has no impact on Little_Endian CPU. + */ +#define XXH_FORCE_NATIVE_FORMAT 0 + + +/************************************** +* Compiler Specific Options +***************************************/ +#ifdef _MSC_VER /* Visual Studio */ +# pragma warning(disable : 4127) /* disable: C4127: conditional expression is constant */ +# define FORCE_INLINE static __forceinline +#else +# if defined (__STDC_VERSION__) && __STDC_VERSION__ >= 199901L /* C99 */ +# ifdef __GNUC__ +# define FORCE_INLINE static inline __attribute__((always_inline)) +# else +# define FORCE_INLINE static inline +# endif +# else +# define FORCE_INLINE static +# endif /* __STDC_VERSION__ */ +#endif + + +/************************************** +* Includes & Memory related functions +***************************************/ +#include "xxhash.h" +/* Modify the local functions below should you wish to use some other memory routines */ +/* for malloc(), free() */ +#include +static void* XXH_malloc(size_t s) { return malloc(s); } +static void XXH_free (void* p) { free(p); } +/* for memcpy() */ +#include +static void* XXH_memcpy(void* dest, const void* src, size_t size) { return memcpy(dest,src,size); } + + +/************************************** +* Basic Types +***************************************/ +#if defined (__STDC_VERSION__) && __STDC_VERSION__ >= 199901L /* C99 */ +# include + typedef uint8_t BYTE; + typedef uint16_t U16; + typedef uint32_t U32; + typedef int32_t S32; + typedef uint64_t U64; +#else + typedef unsigned char BYTE; + typedef unsigned short U16; + typedef unsigned int U32; + typedef signed int S32; + typedef unsigned long long U64; +#endif + +static U32 XXH_read32(const void* memPtr) +{ + U32 val32; + memcpy(&val32, memPtr, 4); + return val32; +} + +static U64 XXH_read64(const void* memPtr) +{ + U64 val64; + memcpy(&val64, memPtr, 8); + return val64; +} + + + +/****************************************** +* Compiler-specific Functions and Macros +******************************************/ +#define GCC_VERSION (__GNUC__ * 100 + __GNUC_MINOR__) + +/* Note : although _rotl exists for minGW (GCC under windows), performance seems poor */ +#if defined(_MSC_VER) +# define XXH_rotl32(x,r) _rotl(x,r) +# define XXH_rotl64(x,r) _rotl64(x,r) +#else +# define XXH_rotl32(x,r) ((x << r) | (x >> (32 - r))) +# define XXH_rotl64(x,r) ((x << r) | (x >> (64 - r))) +#endif + +#if defined(_MSC_VER) /* Visual Studio */ +# define XXH_swap32 _byteswap_ulong +# define XXH_swap64 _byteswap_uint64 +#elif GCC_VERSION >= 403 +# define XXH_swap32 __builtin_bswap32 +# define XXH_swap64 __builtin_bswap64 +#else +static U32 XXH_swap32 (U32 x) +{ + return ((x << 24) & 0xff000000 ) | + ((x << 8) & 0x00ff0000 ) | + ((x >> 8) & 0x0000ff00 ) | + ((x >> 24) & 0x000000ff ); +} +static U64 XXH_swap64 (U64 x) +{ + return ((x << 56) & 0xff00000000000000ULL) | + ((x << 40) & 0x00ff000000000000ULL) | + ((x << 24) & 0x0000ff0000000000ULL) | + ((x << 8) & 0x000000ff00000000ULL) | + ((x >> 8) & 0x00000000ff000000ULL) | + ((x >> 24) & 0x0000000000ff0000ULL) | + ((x >> 40) & 0x000000000000ff00ULL) | + ((x >> 56) & 0x00000000000000ffULL); +} +#endif + + +/*************************************** +* Architecture Macros +***************************************/ +typedef enum { XXH_bigEndian=0, XXH_littleEndian=1 } XXH_endianess; +#ifndef XXH_CPU_LITTLE_ENDIAN /* XXH_CPU_LITTLE_ENDIAN can be defined externally, for example using a compiler switch */ +static const int one = 1; +# define XXH_CPU_LITTLE_ENDIAN (*(const char*)(&one)) +#endif + + +/***************************** +* Memory reads +*****************************/ +typedef enum { XXH_aligned, XXH_unaligned } XXH_alignment; + +FORCE_INLINE U32 XXH_readLE32_align(const void* ptr, XXH_endianess endian, XXH_alignment align) +{ + if (align==XXH_unaligned) + return endian==XXH_littleEndian ? XXH_read32(ptr) : XXH_swap32(XXH_read32(ptr)); + else + return endian==XXH_littleEndian ? *(const U32*)ptr : XXH_swap32(*(const U32*)ptr); +} + +FORCE_INLINE U32 XXH_readLE32(const void* ptr, XXH_endianess endian) +{ + return XXH_readLE32_align(ptr, endian, XXH_unaligned); +} + +FORCE_INLINE U64 XXH_readLE64_align(const void* ptr, XXH_endianess endian, XXH_alignment align) +{ + if (align==XXH_unaligned) + return endian==XXH_littleEndian ? XXH_read64(ptr) : XXH_swap64(XXH_read64(ptr)); + else + return endian==XXH_littleEndian ? *(const U64*)ptr : XXH_swap64(*(const U64*)ptr); +} + +FORCE_INLINE U64 XXH_readLE64(const void* ptr, XXH_endianess endian) +{ + return XXH_readLE64_align(ptr, endian, XXH_unaligned); +} + + +/*************************************** +* Macros +***************************************/ +#define XXH_STATIC_ASSERT(c) { enum { XXH_static_assert = 1/(!!(c)) }; } /* use only *after* variable declarations */ + + +/*************************************** +* Constants +***************************************/ +#define PRIME32_1 2654435761U +#define PRIME32_2 2246822519U +#define PRIME32_3 3266489917U +#define PRIME32_4 668265263U +#define PRIME32_5 374761393U + +#define PRIME64_1 11400714785074694791ULL +#define PRIME64_2 14029467366897019727ULL +#define PRIME64_3 1609587929392839161ULL +#define PRIME64_4 9650029242287828579ULL +#define PRIME64_5 2870177450012600261ULL + + +/***************************** +* Simple Hash Functions +*****************************/ +FORCE_INLINE U32 XX_H32_endian_align(const void* input, size_t len, U32 seed, XXH_endianess endian, XXH_alignment align) +{ + const BYTE* p = (const BYTE*)input; + const BYTE* bEnd = p + len; + U32 h32; +#define XXH_get32bits(p) XXH_readLE32_align(p, endian, align) + +#ifdef XXH_ACCEPT_NULL_INPUT_POINTER + if (p==NULL) + { + len=0; + bEnd=p=(const BYTE*)(size_t)16; + } +#endif + + if (len>=16) + { + const BYTE* const limit = bEnd - 16; + U32 v1 = seed + PRIME32_1 + PRIME32_2; + U32 v2 = seed + PRIME32_2; + U32 v3 = seed + 0; + U32 v4 = seed - PRIME32_1; + + do + { + v1 += XXH_get32bits(p) * PRIME32_2; + v1 = XXH_rotl32(v1, 13); + v1 *= PRIME32_1; + p+=4; + v2 += XXH_get32bits(p) * PRIME32_2; + v2 = XXH_rotl32(v2, 13); + v2 *= PRIME32_1; + p+=4; + v3 += XXH_get32bits(p) * PRIME32_2; + v3 = XXH_rotl32(v3, 13); + v3 *= PRIME32_1; + p+=4; + v4 += XXH_get32bits(p) * PRIME32_2; + v4 = XXH_rotl32(v4, 13); + v4 *= PRIME32_1; + p+=4; + } + while (p<=limit); + + h32 = XXH_rotl32(v1, 1) + XXH_rotl32(v2, 7) + XXH_rotl32(v3, 12) + XXH_rotl32(v4, 18); + } + else + { + h32 = seed + PRIME32_5; + } + + h32 += (U32) len; + + while (p+4<=bEnd) + { + h32 += XXH_get32bits(p) * PRIME32_3; + h32 = XXH_rotl32(h32, 17) * PRIME32_4 ; + p+=4; + } + + while (p> 15; + h32 *= PRIME32_2; + h32 ^= h32 >> 13; + h32 *= PRIME32_3; + h32 ^= h32 >> 16; + + return h32; +} + + +unsigned XX_H32 (const void* input, size_t len, unsigned seed) +{ +#if 0 + /* Simple version, good for code maintenance, but unfortunately slow for small inputs */ + XX_H32_state_t state; + XX_H32_reset(&state, seed); + XX_H32_update(&state, input, len); + return XX_H32_digest(&state); +#else + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + +# if !defined(XXH_USE_UNALIGNED_ACCESS) + if ((((size_t)input) & 3) == 0) /* Input is 4-bytes aligned, leverage the speed benefit */ + { + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H32_endian_align(input, len, seed, XXH_littleEndian, XXH_aligned); + else + return XX_H32_endian_align(input, len, seed, XXH_bigEndian, XXH_aligned); + } +# endif + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H32_endian_align(input, len, seed, XXH_littleEndian, XXH_unaligned); + else + return XX_H32_endian_align(input, len, seed, XXH_bigEndian, XXH_unaligned); +#endif +} + +FORCE_INLINE U64 XX_H64_endian_align(const void* input, size_t len, U64 seed, XXH_endianess endian, XXH_alignment align) +{ + const BYTE* p = (const BYTE*)input; + const BYTE* bEnd = p + len; + U64 h64; +#define XXH_get64bits(p) XXH_readLE64_align(p, endian, align) + +#ifdef XXH_ACCEPT_NULL_INPUT_POINTER + if (p==NULL) + { + len=0; + bEnd=p=(const BYTE*)(size_t)32; + } +#endif + + if (len>=32) + { + const BYTE* const limit = bEnd - 32; + U64 v1 = seed + PRIME64_1 + PRIME64_2; + U64 v2 = seed + PRIME64_2; + U64 v3 = seed + 0; + U64 v4 = seed - PRIME64_1; + + do + { + v1 += XXH_get64bits(p) * PRIME64_2; + p+=8; + v1 = XXH_rotl64(v1, 31); + v1 *= PRIME64_1; + v2 += XXH_get64bits(p) * PRIME64_2; + p+=8; + v2 = XXH_rotl64(v2, 31); + v2 *= PRIME64_1; + v3 += XXH_get64bits(p) * PRIME64_2; + p+=8; + v3 = XXH_rotl64(v3, 31); + v3 *= PRIME64_1; + v4 += XXH_get64bits(p) * PRIME64_2; + p+=8; + v4 = XXH_rotl64(v4, 31); + v4 *= PRIME64_1; + } + while (p<=limit); + + h64 = XXH_rotl64(v1, 1) + XXH_rotl64(v2, 7) + XXH_rotl64(v3, 12) + XXH_rotl64(v4, 18); + + v1 *= PRIME64_2; + v1 = XXH_rotl64(v1, 31); + v1 *= PRIME64_1; + h64 ^= v1; + h64 = h64 * PRIME64_1 + PRIME64_4; + + v2 *= PRIME64_2; + v2 = XXH_rotl64(v2, 31); + v2 *= PRIME64_1; + h64 ^= v2; + h64 = h64 * PRIME64_1 + PRIME64_4; + + v3 *= PRIME64_2; + v3 = XXH_rotl64(v3, 31); + v3 *= PRIME64_1; + h64 ^= v3; + h64 = h64 * PRIME64_1 + PRIME64_4; + + v4 *= PRIME64_2; + v4 = XXH_rotl64(v4, 31); + v4 *= PRIME64_1; + h64 ^= v4; + h64 = h64 * PRIME64_1 + PRIME64_4; + } + else + { + h64 = seed + PRIME64_5; + } + + h64 += (U64) len; + + while (p+8<=bEnd) + { + U64 k1 = XXH_get64bits(p); + k1 *= PRIME64_2; + k1 = XXH_rotl64(k1,31); + k1 *= PRIME64_1; + h64 ^= k1; + h64 = XXH_rotl64(h64,27) * PRIME64_1 + PRIME64_4; + p+=8; + } + + if (p+4<=bEnd) + { + h64 ^= (U64)(XXH_get32bits(p)) * PRIME64_1; + h64 = XXH_rotl64(h64, 23) * PRIME64_2 + PRIME64_3; + p+=4; + } + + while (p> 33; + h64 *= PRIME64_2; + h64 ^= h64 >> 29; + h64 *= PRIME64_3; + h64 ^= h64 >> 32; + + return h64; +} + + +unsigned long long XX_H64 (const void* input, size_t len, unsigned long long seed) +{ +#if 0 + /* Simple version, good for code maintenance, but unfortunately slow for small inputs */ + XX_H64_state_t state; + XX_H64_reset(&state, seed); + XX_H64_update(&state, input, len); + return XX_H64_digest(&state); +#else + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + +# if !defined(XXH_USE_UNALIGNED_ACCESS) + if ((((size_t)input) & 7)==0) /* Input is aligned, let's leverage the speed advantage */ + { + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H64_endian_align(input, len, seed, XXH_littleEndian, XXH_aligned); + else + return XX_H64_endian_align(input, len, seed, XXH_bigEndian, XXH_aligned); + } +# endif + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H64_endian_align(input, len, seed, XXH_littleEndian, XXH_unaligned); + else + return XX_H64_endian_align(input, len, seed, XXH_bigEndian, XXH_unaligned); +#endif +} + +/**************************************************** +* Advanced Hash Functions +****************************************************/ + +/*** Allocation ***/ +typedef struct +{ + U64 total_len; + U32 seed; + U32 v1; + U32 v2; + U32 v3; + U32 v4; + U32 mem32[4]; /* defined as U32 for alignment */ + U32 memsize; +} XXH_istate32_t; + +typedef struct +{ + U64 total_len; + U64 seed; + U64 v1; + U64 v2; + U64 v3; + U64 v4; + U64 mem64[4]; /* defined as U64 for alignment */ + U32 memsize; +} XXH_istate64_t; + + +XX_H32_state_t* XX_H32_createState(void) +{ + XXH_STATIC_ASSERT(sizeof(XX_H32_state_t) >= sizeof(XXH_istate32_t)); /* A compilation error here means XX_H32_state_t is not large enough */ + return (XX_H32_state_t*)XXH_malloc(sizeof(XX_H32_state_t)); +} +XXH_errorcode XX_H32_freeState(XX_H32_state_t* statePtr) +{ + XXH_free(statePtr); + return XXH_OK; +} + +XX_H64_state_t* XX_H64_createState(void) +{ + XXH_STATIC_ASSERT(sizeof(XX_H64_state_t) >= sizeof(XXH_istate64_t)); /* A compilation error here means XX_H64_state_t is not large enough */ + return (XX_H64_state_t*)XXH_malloc(sizeof(XX_H64_state_t)); +} +XXH_errorcode XX_H64_freeState(XX_H64_state_t* statePtr) +{ + XXH_free(statePtr); + return XXH_OK; +} + + +/*** Hash feed ***/ + +XXH_errorcode XX_H32_reset(XX_H32_state_t* state_in, U32 seed) +{ + XXH_istate32_t* state = (XXH_istate32_t*) state_in; + state->seed = seed; + state->v1 = seed + PRIME32_1 + PRIME32_2; + state->v2 = seed + PRIME32_2; + state->v3 = seed + 0; + state->v4 = seed - PRIME32_1; + state->total_len = 0; + state->memsize = 0; + return XXH_OK; +} + +XXH_errorcode XX_H64_reset(XX_H64_state_t* state_in, unsigned long long seed) +{ + XXH_istate64_t* state = (XXH_istate64_t*) state_in; + state->seed = seed; + state->v1 = seed + PRIME64_1 + PRIME64_2; + state->v2 = seed + PRIME64_2; + state->v3 = seed + 0; + state->v4 = seed - PRIME64_1; + state->total_len = 0; + state->memsize = 0; + return XXH_OK; +} + + +FORCE_INLINE XXH_errorcode XX_H32_update_endian (XX_H32_state_t* state_in, const void* input, size_t len, XXH_endianess endian) +{ + XXH_istate32_t* state = (XXH_istate32_t *) state_in; + const BYTE* p = (const BYTE*)input; + const BYTE* const bEnd = p + len; + +#ifdef XXH_ACCEPT_NULL_INPUT_POINTER + if (input==NULL) return XXH_ERROR; +#endif + + state->total_len += len; + + if (state->memsize + len < 16) /* fill in tmp buffer */ + { + XXH_memcpy((BYTE*)(state->mem32) + state->memsize, input, len); + state->memsize += (U32)len; + return XXH_OK; + } + + if (state->memsize) /* some data left from previous update */ + { + XXH_memcpy((BYTE*)(state->mem32) + state->memsize, input, 16-state->memsize); + { + const U32* p32 = state->mem32; + state->v1 += XXH_readLE32(p32, endian) * PRIME32_2; + state->v1 = XXH_rotl32(state->v1, 13); + state->v1 *= PRIME32_1; + p32++; + state->v2 += XXH_readLE32(p32, endian) * PRIME32_2; + state->v2 = XXH_rotl32(state->v2, 13); + state->v2 *= PRIME32_1; + p32++; + state->v3 += XXH_readLE32(p32, endian) * PRIME32_2; + state->v3 = XXH_rotl32(state->v3, 13); + state->v3 *= PRIME32_1; + p32++; + state->v4 += XXH_readLE32(p32, endian) * PRIME32_2; + state->v4 = XXH_rotl32(state->v4, 13); + state->v4 *= PRIME32_1; + p32++; + } + p += 16-state->memsize; + state->memsize = 0; + } + + if (p <= bEnd-16) + { + const BYTE* const limit = bEnd - 16; + U32 v1 = state->v1; + U32 v2 = state->v2; + U32 v3 = state->v3; + U32 v4 = state->v4; + + do + { + v1 += XXH_readLE32(p, endian) * PRIME32_2; + v1 = XXH_rotl32(v1, 13); + v1 *= PRIME32_1; + p+=4; + v2 += XXH_readLE32(p, endian) * PRIME32_2; + v2 = XXH_rotl32(v2, 13); + v2 *= PRIME32_1; + p+=4; + v3 += XXH_readLE32(p, endian) * PRIME32_2; + v3 = XXH_rotl32(v3, 13); + v3 *= PRIME32_1; + p+=4; + v4 += XXH_readLE32(p, endian) * PRIME32_2; + v4 = XXH_rotl32(v4, 13); + v4 *= PRIME32_1; + p+=4; + } + while (p<=limit); + + state->v1 = v1; + state->v2 = v2; + state->v3 = v3; + state->v4 = v4; + } + + if (p < bEnd) + { + XXH_memcpy(state->mem32, p, bEnd-p); + state->memsize = (int)(bEnd-p); + } + + return XXH_OK; +} + +XXH_errorcode XX_H32_update (XX_H32_state_t* state_in, const void* input, size_t len) +{ + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H32_update_endian(state_in, input, len, XXH_littleEndian); + else + return XX_H32_update_endian(state_in, input, len, XXH_bigEndian); +} + + + +FORCE_INLINE U32 XX_H32_digest_endian (const XX_H32_state_t* state_in, XXH_endianess endian) +{ + const XXH_istate32_t* state = (const XXH_istate32_t*) state_in; + const BYTE * p = (const BYTE*)state->mem32; + const BYTE* bEnd = (const BYTE*)(state->mem32) + state->memsize; + U32 h32; + + if (state->total_len >= 16) + { + h32 = XXH_rotl32(state->v1, 1) + XXH_rotl32(state->v2, 7) + XXH_rotl32(state->v3, 12) + XXH_rotl32(state->v4, 18); + } + else + { + h32 = state->seed + PRIME32_5; + } + + h32 += (U32) state->total_len; + + while (p+4<=bEnd) + { + h32 += XXH_readLE32(p, endian) * PRIME32_3; + h32 = XXH_rotl32(h32, 17) * PRIME32_4; + p+=4; + } + + while (p> 15; + h32 *= PRIME32_2; + h32 ^= h32 >> 13; + h32 *= PRIME32_3; + h32 ^= h32 >> 16; + + return h32; +} + + +U32 XX_H32_digest (const XX_H32_state_t* state_in) +{ + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H32_digest_endian(state_in, XXH_littleEndian); + else + return XX_H32_digest_endian(state_in, XXH_bigEndian); +} + + +FORCE_INLINE XXH_errorcode XX_H64_update_endian (XX_H64_state_t* state_in, const void* input, size_t len, XXH_endianess endian) +{ + XXH_istate64_t * state = (XXH_istate64_t *) state_in; + const BYTE* p = (const BYTE*)input; + const BYTE* const bEnd = p + len; + +#ifdef XXH_ACCEPT_NULL_INPUT_POINTER + if (input==NULL) return XXH_ERROR; +#endif + + state->total_len += len; + + if (state->memsize + len < 32) /* fill in tmp buffer */ + { + XXH_memcpy(((BYTE*)state->mem64) + state->memsize, input, len); + state->memsize += (U32)len; + return XXH_OK; + } + + if (state->memsize) /* some data left from previous update */ + { + XXH_memcpy(((BYTE*)state->mem64) + state->memsize, input, 32-state->memsize); + { + const U64* p64 = state->mem64; + state->v1 += XXH_readLE64(p64, endian) * PRIME64_2; + state->v1 = XXH_rotl64(state->v1, 31); + state->v1 *= PRIME64_1; + p64++; + state->v2 += XXH_readLE64(p64, endian) * PRIME64_2; + state->v2 = XXH_rotl64(state->v2, 31); + state->v2 *= PRIME64_1; + p64++; + state->v3 += XXH_readLE64(p64, endian) * PRIME64_2; + state->v3 = XXH_rotl64(state->v3, 31); + state->v3 *= PRIME64_1; + p64++; + state->v4 += XXH_readLE64(p64, endian) * PRIME64_2; + state->v4 = XXH_rotl64(state->v4, 31); + state->v4 *= PRIME64_1; + p64++; + } + p += 32-state->memsize; + state->memsize = 0; + } + + if (p+32 <= bEnd) + { + const BYTE* const limit = bEnd - 32; + U64 v1 = state->v1; + U64 v2 = state->v2; + U64 v3 = state->v3; + U64 v4 = state->v4; + + do + { + v1 += XXH_readLE64(p, endian) * PRIME64_2; + v1 = XXH_rotl64(v1, 31); + v1 *= PRIME64_1; + p+=8; + v2 += XXH_readLE64(p, endian) * PRIME64_2; + v2 = XXH_rotl64(v2, 31); + v2 *= PRIME64_1; + p+=8; + v3 += XXH_readLE64(p, endian) * PRIME64_2; + v3 = XXH_rotl64(v3, 31); + v3 *= PRIME64_1; + p+=8; + v4 += XXH_readLE64(p, endian) * PRIME64_2; + v4 = XXH_rotl64(v4, 31); + v4 *= PRIME64_1; + p+=8; + } + while (p<=limit); + + state->v1 = v1; + state->v2 = v2; + state->v3 = v3; + state->v4 = v4; + } + + if (p < bEnd) + { + XXH_memcpy(state->mem64, p, bEnd-p); + state->memsize = (int)(bEnd-p); + } + + return XXH_OK; +} + +XXH_errorcode XX_H64_update (XX_H64_state_t* state_in, const void* input, size_t len) +{ + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H64_update_endian(state_in, input, len, XXH_littleEndian); + else + return XX_H64_update_endian(state_in, input, len, XXH_bigEndian); +} + + + +FORCE_INLINE U64 XX_H64_digest_endian (const XX_H64_state_t* state_in, XXH_endianess endian) +{ + const XXH_istate64_t * state = (const XXH_istate64_t *) state_in; + const BYTE * p = (const BYTE*)state->mem64; + const BYTE* bEnd = (const BYTE*)state->mem64 + state->memsize; + U64 h64; + + if (state->total_len >= 32) + { + U64 v1 = state->v1; + U64 v2 = state->v2; + U64 v3 = state->v3; + U64 v4 = state->v4; + + h64 = XXH_rotl64(v1, 1) + XXH_rotl64(v2, 7) + XXH_rotl64(v3, 12) + XXH_rotl64(v4, 18); + + v1 *= PRIME64_2; + v1 = XXH_rotl64(v1, 31); + v1 *= PRIME64_1; + h64 ^= v1; + h64 = h64*PRIME64_1 + PRIME64_4; + + v2 *= PRIME64_2; + v2 = XXH_rotl64(v2, 31); + v2 *= PRIME64_1; + h64 ^= v2; + h64 = h64*PRIME64_1 + PRIME64_4; + + v3 *= PRIME64_2; + v3 = XXH_rotl64(v3, 31); + v3 *= PRIME64_1; + h64 ^= v3; + h64 = h64*PRIME64_1 + PRIME64_4; + + v4 *= PRIME64_2; + v4 = XXH_rotl64(v4, 31); + v4 *= PRIME64_1; + h64 ^= v4; + h64 = h64*PRIME64_1 + PRIME64_4; + } + else + { + h64 = state->seed + PRIME64_5; + } + + h64 += (U64) state->total_len; + + while (p+8<=bEnd) + { + U64 k1 = XXH_readLE64(p, endian); + k1 *= PRIME64_2; + k1 = XXH_rotl64(k1,31); + k1 *= PRIME64_1; + h64 ^= k1; + h64 = XXH_rotl64(h64,27) * PRIME64_1 + PRIME64_4; + p+=8; + } + + if (p+4<=bEnd) + { + h64 ^= (U64)(XXH_readLE32(p, endian)) * PRIME64_1; + h64 = XXH_rotl64(h64, 23) * PRIME64_2 + PRIME64_3; + p+=4; + } + + while (p> 33; + h64 *= PRIME64_2; + h64 ^= h64 >> 29; + h64 *= PRIME64_3; + h64 ^= h64 >> 32; + + return h64; +} + + +unsigned long long XX_H64_digest (const XX_H64_state_t* state_in) +{ + XXH_endianess endian_detected = (XXH_endianess)XXH_CPU_LITTLE_ENDIAN; + + if ((endian_detected==XXH_littleEndian) || XXH_FORCE_NATIVE_FORMAT) + return XX_H64_digest_endian(state_in, XXH_littleEndian); + else + return XX_H64_digest_endian(state_in, XXH_bigEndian); +} + + diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp.meta new file mode 100644 index 00000000..3667e2c5 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.cpp.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: 52ae2e366e2b8514aa157ffb1cb9c7bd +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h new file mode 100644 index 00000000..325138dd --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h @@ -0,0 +1,192 @@ +/* + xxHash - Extremely Fast Hash algorithm + Header File + Copyright (C) 2012-2015, Yann Collet. + + BSD 2-Clause License (http://www.opensource.org/licenses/bsd-license.php) + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following disclaimer + in the documentation and/or other materials provided with the + distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + You can contact the author at : + - xxHash source repository : https://github.com/Cyan4973/xxHash +*/ + +/* Notice extracted from xxHash homepage : + +xxHash is an extremely fast Hash algorithm, running at RAM speed limits. +It also successfully passes all tests from the SMHasher suite. + +Comparison (single thread, Windows Seven 32 bits, using SMHasher on a Core 2 Duo @3GHz) + +Name Speed Q.Score Author +xxHash 5.4 GB/s 10 +CrapWow 3.2 GB/s 2 Andrew +MumurHash 3a 2.7 GB/s 10 Austin Appleby +SpookyHash 2.0 GB/s 10 Bob Jenkins +SBox 1.4 GB/s 9 Bret Mulvey +Lookup3 1.2 GB/s 9 Bob Jenkins +SuperFastHash 1.2 GB/s 1 Paul Hsieh +CityHash64 1.05 GB/s 10 Pike & Alakuijala +FNV 0.55 GB/s 5 Fowler, Noll, Vo +CRC32 0.43 GB/s 9 +MD5-32 0.33 GB/s 10 Ronald L. Rivest +SHA1-32 0.28 GB/s 10 + +Q.Score is a measure of quality of the hash function. +It depends on successfully passing SMHasher test set. +10 is a perfect score. + +A 64-bits version, named XX_H64, is available since r35. +It offers much better speed, but for 64-bits applications only. +Name Speed on 64 bits Speed on 32 bits +XX_H64 13.8 GB/s 1.9 GB/s +XX_H32 6.8 GB/s 6.0 GB/s +*/ + +#pragma once + +#if defined (__cplusplus) +extern "C" { +#endif + + +/***************************** +* Definitions +*****************************/ +#include /* size_t */ +typedef enum { XXH_OK=0, XXH_ERROR } XXH_errorcode; + + +/***************************** +* Namespace Emulation +*****************************/ +/* Motivations : + +If you need to include xxHash into your library, +but wish to avoid xxHash symbols to be present on your library interface +in an effort to avoid potential name collision if another library also includes xxHash, + +you can use XXH_NAMESPACE, which will automatically prefix any symbol from xxHash +with the value of XXH_NAMESPACE (so avoid to keep it NULL, and avoid numeric values). + +Note that no change is required within the calling program : +it can still call xxHash functions using their regular name. +They will be automatically translated by this header. +*/ +#ifdef XXH_NAMESPACE +# define XXH_CAT(A,B) A##B +# define XXH_NAME2(A,B) XXH_CAT(A,B) +# define XX_H32 XXH_NAME2(XXH_NAMESPACE, XX_H32) +# define XX_H64 XXH_NAME2(XXH_NAMESPACE, XX_H64) +# define XX_H32_createState XXH_NAME2(XXH_NAMESPACE, XX_H32_createState) +# define XX_H64_createState XXH_NAME2(XXH_NAMESPACE, XX_H64_createState) +# define XX_H32_freeState XXH_NAME2(XXH_NAMESPACE, XX_H32_freeState) +# define XX_H64_freeState XXH_NAME2(XXH_NAMESPACE, XX_H64_freeState) +# define XX_H32_reset XXH_NAME2(XXH_NAMESPACE, XX_H32_reset) +# define XX_H64_reset XXH_NAME2(XXH_NAMESPACE, XX_H64_reset) +# define XX_H32_update XXH_NAME2(XXH_NAMESPACE, XX_H32_update) +# define XX_H64_update XXH_NAME2(XXH_NAMESPACE, XX_H64_update) +# define XX_H32_digest XXH_NAME2(XXH_NAMESPACE, XX_H32_digest) +# define XX_H64_digest XXH_NAME2(XXH_NAMESPACE, XX_H64_digest) +#endif + + +/***************************** +* Simple Hash Functions +*****************************/ + +unsigned int XX_H32 (const void* input, size_t length, unsigned seed); +unsigned long long XX_H64 (const void* input, size_t length, unsigned long long seed); + +/* +XX_H32() : + Calculate the 32-bits hash of sequence "length" bytes stored at memory address "input". + The memory between input & input+length must be valid (allocated and read-accessible). + "seed" can be used to alter the result predictably. + This function successfully passes all SMHasher tests. + Speed on Core 2 Duo @ 3 GHz (single thread, SMHasher benchmark) : 5.4 GB/s +XX_H64() : + Calculate the 64-bits hash of sequence of length "len" stored at memory address "input". + Faster on 64-bits systems. Slower on 32-bits systems. +*/ + + + +/***************************** +* Advanced Hash Functions +*****************************/ +typedef struct { long long ll[ 6]; } XX_H32_state_t; +typedef struct { long long ll[11]; } XX_H64_state_t; + +/* +These structures allow static allocation of XXH states. +States must then be initialized using XXHnn_reset() before first use. + +If you prefer dynamic allocation, please refer to functions below. +*/ + +XX_H32_state_t* XX_H32_createState(void); +XXH_errorcode XX_H32_freeState(XX_H32_state_t* statePtr); + +XX_H64_state_t* XX_H64_createState(void); +XXH_errorcode XX_H64_freeState(XX_H64_state_t* statePtr); + +/* +These functions create and release memory for XXH state. +States must then be initialized using XXHnn_reset() before first use. +*/ + + +XXH_errorcode XX_H32_reset (XX_H32_state_t* statePtr, unsigned seed); +XXH_errorcode XX_H32_update (XX_H32_state_t* statePtr, const void* input, size_t length); +unsigned int XX_H32_digest (const XX_H32_state_t* statePtr); + +XXH_errorcode XX_H64_reset (XX_H64_state_t* statePtr, unsigned long long seed); +XXH_errorcode XX_H64_update (XX_H64_state_t* statePtr, const void* input, size_t length); +unsigned long long XX_H64_digest (const XX_H64_state_t* statePtr); + +/* +These functions calculate the xxHash of an input provided in multiple smaller packets, +as opposed to an input provided as a single block. + +XXH state space must first be allocated, using either static or dynamic method provided above. + +Start a new hash by initializing state with a seed, using XXHnn_reset(). + +Then, feed the hash state by calling XXHnn_update() as many times as necessary. +Obviously, input must be valid, meaning allocated and read accessible. +The function returns an error code, with 0 meaning OK, and any other value meaning there is an error. + +Finally, you can produce a hash anytime, by using XXHnn_digest(). +This function returns the final nn-bits hash. +You can nonetheless continue feeding the hash state with more input, +and therefore get some new hashes, by calling again XXHnn_digest(). + +When you are done, don't forget to free XXH state space, using typically XXHnn_freeState(). +*/ + + +#if defined (__cplusplus) +} +#endif diff --git a/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h.meta b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h.meta new file mode 100644 index 00000000..b4c3a4e7 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/WebGL/cpp/xxhash.h.meta @@ -0,0 +1,37 @@ +fileFormatVersion: 2 +guid: f76b62f793e182d43863dc5527a5b393 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: WebGL + second: + enabled: 1 + settings: {} + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS.meta new file mode 100644 index 00000000..f727ba98 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 3605bda20581e5d468344c163d61f949 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a new file mode 100644 index 00000000..a0727783 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip new file mode 100644 index 00000000..a8b622e4 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip.meta new file mode 100644 index 00000000..eb7b43e4 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 4a5c4e27d266b6945965f03f1a2ae513 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.meta new file mode 100644 index 00000000..86867155 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.a.meta @@ -0,0 +1,33 @@ +fileFormatVersion: 2 +guid: 0c7f4d607bc225c4f897d42e04e8720f +timeCreated: 1567837724 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + data: + first: + iPhone: iOS + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip new file mode 100644 index 00000000..200f714f Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..076c7dce --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 638d669af33f8604c9bdb68ae260b8b3 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip new file mode 100644 index 00000000..b6b97e35 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..bbecd287 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/liblz4.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 1974392f91cc1224baacac62fa96014b +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode.meta new file mode 100644 index 00000000..6019c14f --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: cd674dae89266124c8327f200d9dfa3a +folderAsset: yes +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip new file mode 100644 index 00000000..43046c16 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip.meta new file mode 100644 index 00000000..59f2cbdf --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/iOS/non-bitcode/liblz4.a.zip.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4f5339459ddbb5e48ab22202464f9d9c +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip new file mode 100644 index 00000000..2e31f071 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip.meta new file mode 100644 index 00000000..b04b5464 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Intel.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3b0cf7647ff38c049841101e92aa9bc9 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip new file mode 100644 index 00000000..50e8398e Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip.meta new file mode 100644 index 00000000..875ab95e --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-SiliconSupport.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 194985c81aea22a4f81f61722b01f140 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip new file mode 100644 index 00000000..197e049a Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip.meta new file mode 100644 index 00000000..239a8a57 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle-Universal.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: d387e1c0efcb9db40a073bbbbb8d461b +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle.meta new file mode 100644 index 00000000..9eb3e79b --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle.meta @@ -0,0 +1,46 @@ +fileFormatVersion: 2 +guid: db5ef0f4f1a7f42478c2791e728db85b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 1 + settings: + DefaultValueInitialized: true + data: + first: + Standalone: OSXIntel + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents.meta new file mode 100644 index 00000000..212e45b9 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 04a470e0d94624d1f9810ea31f51e94a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/Info.plist b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/Info.plist new file mode 100644 index 00000000..6149f599 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/Info.plist @@ -0,0 +1,50 @@ + + + + + BuildMachineOSBuild + 20B29 + CFBundleDevelopmentRegion + en + CFBundleExecutable + liblz4 + CFBundleIdentifier + com.liblz4.liblz4 + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + liblz4 + CFBundlePackageType + BNDL + CFBundleShortVersionString + 1.0 + CFBundleSignature + ???? + CFBundleSupportedPlatforms + + MacOSX + + CFBundleVersion + 1 + DTCompiler + com.apple.compilers.llvm.clang.1_0 + DTPlatformBuild + 12E507 + DTPlatformName + macosx + DTPlatformVersion + 11.3 + DTSDKBuild + 20E214 + DTSDKName + macosx11.3 + DTXcode + 1251 + DTXcodeBuild + 12E507 + LSMinimumSystemVersion + 10.9 + NSHumanReadableCopyright + Copyright © 2015 liblz4. All rights reserved. + + diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS.meta b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS.meta new file mode 100644 index 00000000..ebdaf06e --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c68165d61d3e44189aadc53fdbcd0985 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS/liblz4 b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS/liblz4 new file mode 100644 index 00000000..b23bd528 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/liblz4.bundle/Contents/MacOS/liblz4 differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS.meta new file mode 100644 index 00000000..ab130ffa --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: aaa597c9e1032c0489186e444097732e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a new file mode 100644 index 00000000..8141e64d Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip new file mode 100644 index 00000000..f38672d6 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip.meta new file mode 100644 index 00000000..0fb1b9de --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 0e6895b2f2d7561469a3b05bb8dfc88f +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.meta new file mode 100644 index 00000000..8123d3b4 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.a.meta @@ -0,0 +1,102 @@ +fileFormatVersion: 2 +guid: 6d9835f81452559419b39274d86c51f2 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + - first: + '': Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude tvOS: 0 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + tvOS: tvOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip new file mode 100644 index 00000000..564a8188 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..806c2a33 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 2832d8b70771bd8428e0de775e39980f +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip new file mode 100644 index 00000000..7b90f04d Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..51cc305e --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/liblz4.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: fe234cb92fcd38d4d8054e612fb68390 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode.meta new file mode 100644 index 00000000..9efc7730 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a70c4f81a0216b44fa2cf5c8a5dd3845 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip new file mode 100644 index 00000000..86ee4813 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip.meta new file mode 100644 index 00000000..6631ba8a --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/tvOS/non-bitcode/liblz4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: e320367224963104c8119a2c2209502b +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86.meta b/Assets/ADL-Plugins/LZ4/Plugins/x86.meta new file mode 100644 index 00000000..8bed57ec --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/x86.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: eb49344276eae2b4cb5a230c2730078b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip b/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip new file mode 100644 index 00000000..2fe1cd59 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip.meta b/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip.meta new file mode 100644 index 00000000..6c3741ce --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/x86/liblz4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 9dd6b5fea6ed8a847ab6019a93e8cb4a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86_64.meta b/Assets/ADL-Plugins/LZ4/Plugins/x86_64.meta new file mode 100644 index 00000000..68b26b88 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/x86_64.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 5c5385db3b7af82478a060bf1aeeb35b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll new file mode 100644 index 00000000..da5fff1b Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll.meta b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll.meta new file mode 100644 index 00000000..a8e973db --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.dll.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: 420062dfc98071a48948b0c19c25aff9 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Windows + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so new file mode 100644 index 00000000..e3d27a99 Binary files /dev/null and b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so differ diff --git a/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so.meta b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so.meta new file mode 100644 index 00000000..99c4259b --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Plugins/x86_64/liblz4.so.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: 3667b8e5a8b4c324fa9a456bbcd60da3 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 1 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: None + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Linux + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Scripts.meta b/Assets/ADL-Plugins/LZ4/Scripts.meta new file mode 100644 index 00000000..3df405ad --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Scripts.meta @@ -0,0 +1,5 @@ +fileFormatVersion: 2 +guid: 3f0906f81482cba4285a97706ce4c3d4 +folderAsset: yes +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs b/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs new file mode 100644 index 00000000..2803a467 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs @@ -0,0 +1,121 @@ +using UnityEngine; +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine.Networking; + + + +public class LZ4testWebGLtvOS : MonoBehaviour +{ +#if UNITY_WEBGL || UNITY_TVOS + + private string myFile = "testLZ4b.png.lz4"; + + //an output Buffer for the decompressed lz4 buffer + private byte[] outbuffer = null; + private Texture2D tex = null; + + byte[] compressedBuffer = null; + byte[] wwb = null; + + private bool downloadDone2; + + private string log = ""; + + //log for output of results + void plog(string t) { + log += t + "\n"; ; + } + + void Start(){ + + tex = new Texture2D(1600,1280,TextureFormat.RGBA32, false); + //get an lz4 file as saved buffer from StreamingAssets + StartCoroutine( getFromSite() ); + + + } + + + + void OnGUI(){ + + if (downloadDone2 == true) { + GUI.Label(new Rect(10, 0, 250, 30), "got package, ready to extract"); + + + + if (GUI.Button(new Rect(10, 90, 230, 50), "start Lz4 test")) { + + StartCoroutine(performOperations()); + + } + } + + if(tex != null) GUI.DrawTexture(new Rect(360, 10, 375, 300), tex); + + GUI.TextArea(new Rect(10, 370, Screen.width - 20, Screen.height - 400), log); + + } + + + + // ============================================================================================================================================================= + + IEnumerator performOperations() { + log =""; + yield return true; + + if(wwb == null) yield break; else plog("Image size: " + wwb.Length.ToString()); + + if(compressedBuffer != null) compressedBuffer = null; + + compressedBuffer = LZ4.compressBuffer(wwb, 9); + + plog("LZ4 buffer compressed. Size: " + compressedBuffer.Length.ToString()); + yield return true; + + plog("LZ4 decompress: " + LZ4.decompressBuffer(compressedBuffer, ref outbuffer).ToString() ); + if(outbuffer != null) { tex.LoadImage(outbuffer); plog("Decompressed size: " + outbuffer.Length.ToString()); } + yield return true; + } + + IEnumerator getFromSite() { + plog("getting image from site ..."); + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropbox.com/s/sp79pnbnw6xhn43/testLZ4b.png")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + wwb = new byte[www.downloadHandler.data.Length]; + Array.Copy(www.downloadHandler.data, 0, wwb, 0, www.downloadHandler.data.Length); + plog("Got image"); + } + } + + + if(wwb == null) plog("Could not find file: " + myFile + " in StreamingAssets"); + + outbuffer = new byte[ 0 ]; + downloadDone2 = true; + #if UNITY_TVOS && !UNITY_EDITOR + yield return true; + StartCoroutine(performOperations()); + #endif + } + +#else + void OnGUI(){ + GUI.Label(new Rect(10,10,500,40),"Only for WebGL or tvOS."); + } +#endif + +} + diff --git a/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs.meta b/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs.meta new file mode 100644 index 00000000..d4700809 --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Scripts/LZ4testWebGLtvOS.cs.meta @@ -0,0 +1,11 @@ +fileFormatVersion: 2 +guid: ab3415a07d4720340bdbada4392e5a1d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs b/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs new file mode 100644 index 00000000..6f0afedd --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs @@ -0,0 +1,227 @@ +using System; + +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using System.Threading; +using System.IO; + + +public class lz4test : MonoBehaviour { +#if (!UNITY_TVOS && !UNITY_WEBGL) || UNITY_EDITOR + + // some variables to get status returns from the functions + private float lz1 = 0; + private int lz2 = -1, lz3, lz4, fbuftest, nFbuftest; + + // A single item ulong array to get the bytes being decompressed + private ulong[] bytes = new ulong[1]; + + // A single item float array to get progress of compression. + private float[] progress = new float[1]; + + // a test file that will be downloaded to run the tests + private string myFile = "testLZ4.tif"; + + // the adress from where we download our test file + private string uri = "https://dl.dropbox.com/s/r1ccmnreyd460vr/"; + + // our path where we do the tests + private string ppath; + + private bool compressionStarted; + private bool downloadDone; + + // a reusable buffer + private byte[] buff; + + // fixed size buffer, that don't gets resized, to perform decompression of buffers in them and avoid memory allocations. + private byte[] fixedOutBuffer = new byte[1024*768]; + + + // Use this for initialization + void Start () { + ppath = Application.persistentDataPath; + + #if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; + #endif + + buff = new byte[0]; + + Debug.Log(ppath); + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + if(!File.Exists(ppath + "/" + myFile)) StartCoroutine(DownloadTestFile()); else downloadDone = true; + } + + + // Update is called once per frame + void Update () { + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI() + { + if (downloadDone == true) + { + GUI.Label(new Rect(50, 0, 350, 30), "package downloaded, ready to extract"); + GUI.Label(new Rect(50, 30, 450, 90), ppath); + } + + if (downloadDone) + { + if (GUI.Button(new Rect(50, 150, 250, 50), "start LZ4 test")) + { + compressionStarted = true; + // call the decompresion demo functions. + // DoTests(); + // we call the test function on a thread to able to see progress. WebGL does not support threads. + Thread th = new Thread(DoTests); th.Start(); + + // native FileBuffer test + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + StartCoroutine(nativeFileBufferTest()); + #endif + } + } + + if (compressionStarted){ + // if the return code is 1 then the decompression was succesful. + GUI.Label(new Rect(50, 220, 250, 40), "LZ4 Compress: " + (lz1).ToString() + "%"); + GUI.Label(new Rect(300, 220, 120, 40), progress[0].ToString() + "%"); + + GUI.Label(new Rect(50, 260, 250, 40), "LZ4 Decompress: " + (lz2+1).ToString()); + GUI.Label(new Rect(300, 260, 250, 40), bytes[0].ToString()); + + GUI.Label(new Rect(50, 300, 250, 40), "Buffer Compress: " + lz3.ToString()); + GUI.Label(new Rect(50, 340, 250, 40), "Buffer Decompress: " + lz4.ToString()); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + GUI.Label(new Rect(50, 380, 250, 40), "FileBuffer test: " + (fbuftest+1).ToString()); + GUI.Label(new Rect(50, 420, 280, 40), "Native FileBuffer test: " + nFbuftest.ToString()); + #endif + } + + } + + + void DoTests() { + + // File tests + // compress a file to lz4 with highest level of compression (9). + lz1 = LZ4.compress(ppath+ "/" + myFile, ppath + "/" + myFile + ".lz4", 9, progress); + + // decompress the previously compressed archive + lz2 = LZ4.decompress(ppath + "/" + myFile + ".lz4", ppath + "/" + myFile + "B.tif", bytes); + + + // Buffer tests + if (File.Exists(ppath + "/" + myFile)){ + byte[] bt = File.ReadAllBytes(ppath + "/" + myFile); + + // compress a byte buffer (we write the output buffer to a file for debug purposes.) + if (LZ4.compressBuffer(bt, ref buff, 9, true)){ + lz3 = 1; + File.WriteAllBytes(ppath + "/buffer1.lz4buf", buff); + } + + byte[] bt2 = File.ReadAllBytes(ppath + "/buffer1.lz4buf"); + + // decompress a byte buffer (we write the output buffer to a file for debug purposes.) + if (LZ4.decompressBuffer(bt2, ref buff, true)){ + lz4 = 1; + File.WriteAllBytes(ppath + "/buffer1D.tif", buff); + } + + //FIXED BUFFER FUNCTION: + int decommpressedSize = LZ4.decompressBufferFixed(bt2, ref fixedOutBuffer); + if(decommpressedSize > 0) Debug.Log(" # Decompress Fixed size Buffer: " + decommpressedSize); + + bt2= null; bt = null; + } + + // make FileBuffer test on supported platfoms. + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + // make a temp buffer to read an lz4 file in. + if (File.Exists(ppath + "/" + myFile + ".lz4")){ + byte[] FileBuffer = File.ReadAllBytes(ppath + "/" + myFile + ".lz4"); + fbuftest = LZ4.decompress(null, ppath + "/" + myFile + ".FBUFF.tif", bytes, FileBuffer); + } + #endif + + } + + + IEnumerator DownloadTestFile() + { + // make sure a previous lz4 file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) File.Delete(ppath + "/" + myFile); + + Debug.Log("starting download"); + + // replace the link to the lz4 file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(uri + myFile)) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) + { + Debug.Log(www.error); + } else { + downloadDone = true; + + // write the downloaded lz4 file to the ppath directory so we can have access to it + // depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + } + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + // native file buffer test + // For iOS, Android, Linux and MacOSX the plugin can handle a byte buffer as a file. (in this case a native file buffer) + // This way you can extract the file or parts of it without writing it to disk. + IEnumerator nativeFileBufferTest() { + + //make a check that the intermediate native buffer is not being used! + if(LZ4.nativeBufferIsBeingUsed) { Debug.Log("Native buffer download is in use"); yield break; } + + // A bool for download checking + bool downloadDoneN = false; + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // int to get the downloaded file size + int zsize = 0; + + Debug.Log("Downloading LZ4 file to native memory buffer"); + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. + StartCoroutine(LZ4.downloadLZ4FileNative("http://telias.free.fr/temp/testLZ4.tif.lz4", r => downloadDoneN = r, pointerResult => nativePointer = pointerResult, size => zsize = size)); + + while (!downloadDoneN) yield return true; + + nFbuftest = LZ4.decompress(zsize.ToString(), ppath + "/nativeBufferToFileLZ4.tif", null, nativePointer); + + if(nFbuftest ==0) nFbuftest = 1; + + // free the native memory buffer! + LZ4.LZ4releaseBuffer(nativePointer); + } + #endif + +#else + void OnGUI(){ + GUI.Label(new Rect(10,10,500,40),"Please run the WebGL/tvOS demo."); + } +#endif +} diff --git a/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs.meta b/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs.meta new file mode 100644 index 00000000..075497dd --- /dev/null +++ b/Assets/ADL-Plugins/LZ4/Scripts/lz4test.cs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 981c86a1b803d94408869e6ec746834a +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: diff --git a/Assets/ADL-Plugins/SevenZip.meta b/Assets/ADL-Plugins/SevenZip.meta new file mode 100644 index 00000000..5a71e5ca --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: b531282285362a34ba6b3cddb6d5f82c +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf b/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf new file mode 100644 index 00000000..e559596c Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf differ diff --git a/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf.meta b/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf.meta new file mode 100644 index 00000000..eafedb46 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Instructions_7_ZIP.pdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3180800de33b46a4495f9cafef5ead7f +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins.meta b/Assets/ADL-Plugins/SevenZip/Plugins.meta new file mode 100644 index 00000000..68849379 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 041964cd192c28942ada8f88aa3d5361 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android.meta new file mode 100644 index 00000000..e5e0a90b --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: efa16d7b2406833479cce0c3e2d7f1d3 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs.meta new file mode 100644 index 00000000..a437c58f --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: b261e510df6fd2c40a66daeaf8f3b686 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a.meta new file mode 100644 index 00000000..8ccfe1a3 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 89f739248c548734d9ba28651eaca66a +folderAsset: yes +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so new file mode 100644 index 00000000..010dac8d Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so.meta new file mode 100644 index 00000000..42284857 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/arm64-v8a/liblzma.so.meta @@ -0,0 +1,97 @@ +fileFormatVersion: 2 +guid: c27267ff4065e064ca23b593694d9d4a +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARM64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a.meta new file mode 100644 index 00000000..68273ea2 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 1bc6a1436a9386d4f9baa14a67e69646 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so new file mode 100644 index 00000000..643c4ea1 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so.meta new file mode 100644 index 00000000..13ce9bf8 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/armeabi-v7a/liblzma.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: da56e1e6d4c5adf46bc165c9fe64c734 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86.meta new file mode 100644 index 00000000..a4a77e09 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: c606b6c0c23ed8043bba0ac0183b416c +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so new file mode 100644 index 00000000..3f84806f Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so.meta new file mode 100644 index 00000000..5f7b3d11 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86/liblzma.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: 22cc1bcd89fcbbd4986aba290fe2dd5c +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: x86 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64.meta new file mode 100644 index 00000000..477ace26 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3658f5004c1bf294cb5202767858835e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so new file mode 100644 index 00000000..9867ee72 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so.meta b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so.meta new file mode 100644 index 00000000..59e61a3b --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/Android/libs/x86_64/liblzma.so.meta @@ -0,0 +1,71 @@ +fileFormatVersion: 2 +guid: b9d6b9f63bf1f594ab61a4fdba365a2e +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86_64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/WebGL.meta b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL.meta new file mode 100644 index 00000000..5a69527a --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 49f713bf26f36804da40a423ebbfae3e +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a new file mode 100644 index 00000000..ff7365bd Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a.meta b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a.meta new file mode 100644 index 00000000..a53188f6 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/WebGL/lzma.a.meta @@ -0,0 +1,76 @@ +fileFormatVersion: 2 +guid: 8a8c6a726ebf4704d919e98dcdda9dfa +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS.meta new file mode 100644 index 00000000..e031576f --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: dae2db38ba7f7254983749d8c2d67e8e +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a new file mode 100644 index 00000000..b0c84692 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip new file mode 100644 index 00000000..c171bdc4 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip.meta new file mode 100644 index 00000000..56e6c6aa --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a-Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 286676dc9087a324782599ea33a5571a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a.meta new file mode 100644 index 00000000..2e1ad282 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.a.meta @@ -0,0 +1,33 @@ +fileFormatVersion: 2 +guid: 890a3e587670e472e9154b97b5efb4ef +timeCreated: 1567837724 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + data: + first: + iPhone: iOS + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip new file mode 100644 index 00000000..1522db6f Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..8d6fc2e6 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: f61d0deb0660f1d44b27d813a79faf17 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip new file mode 100644 index 00000000..4c5eee44 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..7d9875d7 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/liblzma.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 5fba5584e910ed04ebde361ff03371f6 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode.meta new file mode 100644 index 00000000..14e2ec86 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 86091736710878747a127b1b76661060 +folderAsset: yes +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip new file mode 100644 index 00000000..f46f6435 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip.meta new file mode 100644 index 00000000..1d74671c --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/iOS/non-bitcode/liblzma.a.zip.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8aeb9d325ff895448b72a8ae6de2df1c +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip new file mode 100644 index 00000000..88b4e74a Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip.meta new file mode 100644 index 00000000..b28612da --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Intel.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 7e6be3eafc47a824f8d608276bb892a2 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip new file mode 100644 index 00000000..78d187d1 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip.meta new file mode 100644 index 00000000..7cba05ce --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-SiliconSupport.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: f099c3247c309674fa7708fa447e0351 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip new file mode 100644 index 00000000..2178d4e6 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip.meta new file mode 100644 index 00000000..373f97b7 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle-Universal.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 99bd6b4a2998ff847b57c76738750bf7 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle.meta new file mode 100644 index 00000000..9ff4cee5 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle.meta @@ -0,0 +1,46 @@ +fileFormatVersion: 2 +guid: 945e5a2a1bd84d44d9892ff44d9565c1 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 1 + settings: + DefaultValueInitialized: true + data: + first: + Standalone: OSXIntel + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents.meta new file mode 100644 index 00000000..40312cb3 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: dc97a21f359ee4227b7f5c87717fb807 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/Info.plist b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/Info.plist new file mode 100644 index 00000000..5bf677aa --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/Info.plist @@ -0,0 +1,50 @@ + + + + + BuildMachineOSBuild + 20B29 + CFBundleDevelopmentRegion + en + CFBundleExecutable + liblzma + CFBundleIdentifier + com.lzma.liblzma + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + liblzma + CFBundlePackageType + BNDL + CFBundleShortVersionString + 1.0 + CFBundleSignature + ???? + CFBundleSupportedPlatforms + + MacOSX + + CFBundleVersion + 1 + DTCompiler + com.apple.compilers.llvm.clang.1_0 + DTPlatformBuild + 12E507 + DTPlatformName + macosx + DTPlatformVersion + 11.3 + DTSDKBuild + 20E214 + DTSDKName + macosx11.3 + DTXcode + 1251 + DTXcodeBuild + 12E507 + LSMinimumSystemVersion + 10.9 + NSHumanReadableCopyright + Copyright © 2015 liblzma. All rights reserved. + + diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS.meta b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS.meta new file mode 100644 index 00000000..e33666be --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: fcdc6e0bbfd78425f96d7e8a1196b892 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS/liblzma b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS/liblzma new file mode 100644 index 00000000..01f33c60 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/liblzma.bundle/Contents/MacOS/liblzma differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs b/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs new file mode 100644 index 00000000..4361913d --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs @@ -0,0 +1,1109 @@ +using System; +using System.Runtime.InteropServices; +using UnityEngine; +using System.Collections; +using System.Collections.Generic; +using System.IO; +using UnityEngine.Networking; + +public class lzma { +#if !UNITY_WEBPLAYER || UNITY_EDITOR + //if you want to be able to call the functions: get7zinfo, get7zSize, decode2Buffer from a thread set this string before to the Application.persistentDataPath ! + public static string persitentDataPath=""; + + internal static int[] props = new int [7]; + internal static bool defaultsSet = false; + + public enum dic : int { + K0004 = 4096, + K0008 = 8192, + K0016 = 16384, + K0032 = 32768, + K0064 = 65536, + K0128 = 131072, + K0256 = 262144, + K0512 = 524288, + K1024 = 1048576, + K2048 = 2097152 + } + + + /* + level + Description: The compression level. + Range: [0;9]. + Default: 5. + + dictSize + Description: The dictionary size. + Range: [1<<12;1<<27] for 32-bit version or [1<<12;1<<30] for 64-bit version. + Default: 1<<24. + + lc + Description: The number of high bits of the previous byte to use as a context for literal encoding. + Range [0;8]. + Default: 3 + Sometimes lc = 4 gives gain for big files. + + lp + Description: The number of low bits of the dictionary position to include in literal_pos_state. + Range: [0;4]. + Default: 0. + It is intended for periodical data when period is equal 2^value (where lp=value). For example, for 32-bit (4 bytes) periodical data you can use lp=2. Often it's better to set lc=0, if you change lp switch. + + pb + Description: pb is the number of low bits of the dictionary position to include in pos_state. + Range: [0;4]. + Default: 2. + It is intended for periodical data when period is equal 2^value (where lp=value). + + fb + Description: Sets the number of fast bytes for the Deflate/Deflate64 encoder. + Range: [5;255]. + Default: 128. + Usually, a big number gives a little bit better compression ratio and a slower compression process. A large fast bytes parameter can significantly increase the compression ratio for files which contain long identical sequences of bytes. + + numThreads + Description: Number of threads. + Options: 1 or 2 + Default: 2 + */ + + //0 = level, /* 0 <= level <= 9, default = 5 */ + //1 = dictSize, /* use (1 << N) or (3 << N). 4 KB < dictSize <= 128 MB */4194304 + //2 = lc, /* 0 <= lc <= 8, default = 3 */ + //3 = lp, /* 0 <= lp <= 4, default = 0 */ + //4 = pb, /* 0 <= pb <= 4, default = 2 */ + //5 = fb, /* 5 <= fb <= 273, default = 32 */ + //6 = numThreads /* 1 or 2, default = 2 */ + + //A function that sets the compression properties for the lzma compressor. Will affect the lzma alone file and the lzma buffer compression. + //A simple usage of this function is to call it only with the 1st parameter that sets the compression level: setProps(9); + // + //Multithread safe advice: call this function before starting any thread operations !!! + public static void setProps(int level = 5, int dictSize = 65536, int lc = 3, int lp = 0, int pb = 2, int fb = 32, int numThreads = 2) { + defaultsSet = true; + props[0] = level; + props[1] = dictSize; + props[2] = lc; + props[3] = lp; + props[4] = pb; + props[5] = fb; + props[6] = numThreads; + } + + +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) && !UNITY_EDITOR +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE) && !UNITY_WEBGL + #if !UNITY_TVOS + [DllImport("__Internal")] + public static extern void sevenZcancel(); + [DllImport("__Internal")] + public static extern int lsetPermissions(string filePath, string _user, string _group, string _other); + [DllImport("__Internal")] + private static extern int decompress7zip(string filePath, string exctractionPath, bool fullPaths, string entry, IntPtr progress, IntPtr FileBuffer, int FileBufferLength); + [DllImport("__Internal")] + private static extern int decompress7zip2(string filePath, string exctractionPath, bool fullPaths, string entry, IntPtr progress, IntPtr FileBuffer, int FileBufferLength); + [DllImport("__Internal")] + internal static extern int lzmaUtil(bool encode, string inPath, string outPath, IntPtr Props); + #endif + [DllImport("__Internal")] + private static extern IntPtr _getSize(string filePath, IntPtr FileBuffer, int FileBufferLength, bool justParse); + [DllImport("__Internal")] + private static extern ulong entrySize(string filePath, string entry, IntPtr FileBuffer, int FileBufferLength); + [DllImport("__Internal")] + internal static extern int decode2Buf(string filePath, string entry, IntPtr buffer, IntPtr FileBuffer, int FileBufferLength); + [DllImport("__Internal")] + public static extern void resetBytesRead(); + [DllImport("__Internal")] + public static extern ulong getBytesRead(); + [DllImport("__Internal")] + public static extern ulong getBytesWritten(); + [DllImport("__Internal")] + public static extern IntPtr _createBuffer(int size); + [DllImport("__Internal")] + internal static extern void _addToBuffer(IntPtr destination, int offset, IntPtr buffer, int len); +#endif +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) + [DllImport("__Internal")] + public static extern void _releaseBuffer(IntPtr buffer); + [DllImport("__Internal")] + internal static extern IntPtr Lzma_Compress( IntPtr buffer, int bufferLength, bool makeHeader, ref int v, IntPtr Props); + [DllImport("__Internal")] + internal static extern int Lzma_Uncompress( IntPtr buffer, int bufferLength, int uncompressedSize, IntPtr outbuffer,bool useHeader); +#endif +#endif + +#if UNITY_5_4_OR_NEWER +#if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR || UNITY_EDITOR_LINUX + private const string libname = "lzma"; +#elif UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "liblzma"; + #endif +#else + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR + private const string libname = "lzma"; + #endif + #if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "liblzma"; + #endif +#endif + +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX + #if (!UNITY_WEBGL || UNITY_EDITOR) + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX)&& !UNITY_EDITOR_WIN + //set permissions of a file in user, group, other. Each string should contain any or all chars of "rwx". + //returns 0 on success + [DllImport(libname, EntryPoint = "lsetPermissions")] + internal static extern int lsetPermissions(string filePath, string _user, string _group, string _other); + #endif + [DllImport(libname, EntryPoint = "decompress7zip" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int decompress7zip(string filePath, string exctractionPath, bool fullPaths, string entry, IntPtr progress, IntPtr FileBuffer, int FileBufferLength); + + [DllImport(libname, EntryPoint = "decompress7zip2" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int decompress7zip2(string filePath, string exctractionPath, bool fullPaths, string entry, IntPtr progress, IntPtr FileBuffer, int FileBufferLength); + + [DllImport(libname, EntryPoint = "_getSize" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + + internal static extern IntPtr _getSize(string filePath, IntPtr FileBuffer, int FileBufferLength, bool justParse); + + [DllImport(libname, EntryPoint = "entrySize" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern ulong entrySize(string filePath, string entry, IntPtr FileBuffer, int FileBufferLength); + + [DllImport(libname, EntryPoint = "lzmaUtil" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int lzmaUtil(bool encode, string inPath, string outPath, IntPtr Props); + + [DllImport(libname, EntryPoint = "decode2Buf" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int decode2Buf(string filePath, string entry, IntPtr buffer, IntPtr FileBuffer, int FileBufferLength); + #endif + [DllImport(libname, EntryPoint = "_releaseBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void _releaseBuffer(IntPtr buffer); + + [DllImport(libname, EntryPoint = "_createBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern IntPtr _createBuffer(int size); + + [DllImport(libname, EntryPoint = "_addToBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + private static extern void _addToBuffer(IntPtr destination, int offset, IntPtr buffer, int len); + + [DllImport(libname, EntryPoint = "Lzma_Compress" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr Lzma_Compress( IntPtr buffer, int bufferLength, bool makeHeader, ref int v, IntPtr Props); + + [DllImport(libname, EntryPoint = "Lzma_Uncompress" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int Lzma_Uncompress( IntPtr buffer, int bufferLength, int uncompressedSize, IntPtr outbuffer,bool useHeader); + + // Send cancel signal when decompressing a 7z archive with multiple files + [DllImport(libname, EntryPoint = "sevenZcancel" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void sevenZcancel(); + + // reset the global bytes written and read variables + [DllImport(libname, EntryPoint = "resetBytesRead" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void resetBytesRead(); + + // returns the bytes read by the plugin (in real time if called from a thread). + [DllImport(libname, EntryPoint = "getBytesRead" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern ulong getBytesRead(); + + // returns the bytes written by the plugin (in real time if called from a thread). + [DllImport(libname, EntryPoint = "getBytesWritten" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern ulong getBytesWritten(); +#endif + + internal static GCHandle gcA(object o) { + return GCHandle.Alloc(o, GCHandleType.Pinned); + } + +#if !UNITY_WEBGL || UNITY_EDITOR + // set permissions of a file in user, group, other. + // Each string should contain any or all chars of "rwx". + // returns 0 on success + #if !UNITY_TVOS || UNITY_EDITOR + public static int setFilePermissions(string filePath, string _user, string _group, string _other){ + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX || UNITY_IOS || UNITY_IPHONE) && !UNITY_EDITOR_WIN + return lsetPermissions(filePath, _user, _group, _other); + #else + return -1; + #endif + } + #endif + + +#if !UNITY_TVOS || UNITY_EDITOR + + //Helper function + private static bool checkObject(object fileBuffer, string filePath, ref GCHandle fbuf, ref IntPtr fileBufferPointer, ref int fileBufferLength) { + if(fileBuffer is byte[]) { byte[] tempBuf = (byte[])fileBuffer; fbuf = gcA(tempBuf); fileBufferPointer = fbuf.AddrOfPinnedObject(); fileBufferLength = tempBuf.Length; return true; } + if(fileBuffer is IntPtr) { fileBufferPointer = (IntPtr)fileBuffer; fileBufferLength = Convert.ToInt32(filePath); } + return false; + } + + + // A function to decompress a 7z file + // + // filePath : the full path to the archive, including the archives name. (/myPath/myArchive.7z) + // exctractionPath : the path in where you want your files to be extracted. If null, the same path as of the 7z archive will be used. + // progress : a single item integer array to get the progress of the extracted files (use this function when calling from a separate thread, otherwise call the 2nd implementation) + // : if you want byte level real time progress, call this function from a thread and use the getBytesRead or getBytesWritten to compare against the total uncompressed + // : size of the files or against the file size of the 7z archive. + // largeFiles : set this to true if you are extracting files larger then 90-100 Mb. It is slower though but prevents crashing your app when extracting large files! + // fullPaths : set this to true if you want to keep the folder structure of the 7z file. + // entry : set the name of a single file file you want to extract from your archive. If the file resides in a folder, the full path should be added. + // (for example game/meshes/small/table.mesh ) + // For entry extractions, it is much faster if the 7z is non-solid compressed! + // fileBuffer : A buffer that holds a 7zip file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: download7zFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the filePath parameter. + // + // use this function from a separate thread to get the progress of the extracted files in the referenced 'progress' integer, or use the getBytesRead/getBytesWritten function fro byte level % progress. + // + // ERROR CODES: + // 1 : OK + // 2 : Could not find requested file in archive + // -1 : Could not open input(7z) file + // -2 : Decoder doesn't support this archive + // -3 : Can not allocate memory + // -5 : Unknown error + // -6 : File IO error + + public static int doDecompress7zip(string filePath, string exctractionPath = null, int [] progress = null, bool largeFiles = false, bool fullPaths = true, string entry = null, object fileBuffer = null) { + + if(exctractionPath == null) exctractionPath = Path.GetDirectoryName(filePath); + if (@exctractionPath.Substring(@exctractionPath.Length - 1, 1) != "/") { @exctractionPath += "/"; } + if(!Directory.Exists(@exctractionPath)) Directory.CreateDirectory(@exctractionPath); + if(entry == "") entry = null; + + int res = 0; + if(progress == null) progress = new int[1]; + var ibuf = gcA(progress); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if (!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return -5; } + + if (largeFiles){ + res = decompress7zip(null, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject() ,fileBufferPointer , fileBufferLength); + }else{ + res = decompress7zip2(null, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject() , fileBufferPointer, fileBufferLength); + } + if (managed) fbuf.Free(); + ibuf.Free(); return res; + } else { + if (largeFiles){ + res = decompress7zip(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject() , IntPtr.Zero, 0); + ibuf.Free(); return res; + }else{ + res = decompress7zip2(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject() , IntPtr.Zero, 0); + ibuf.Free(); return res; + } + } + + #endif + + #if (!UNITY_EDITOR_OSX && !UNITY_ANDROID && !UNITY_IOS && !UNITY_EDITOR_LINUX && !UNITY_STANDALONE_LINUX) || UNITY_EDITOR_WIN + if (largeFiles){ + res = decompress7zip(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + }else{ + res = decompress7zip2(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + } + #endif + } + + + // Same function as above only the progress integer is a local variable. + // Use this when you don't want to get the progress of the extracted files and when not calling the function from a separate thread. + public static int doDecompress7zip(string filePath, string exctractionPath = null, bool largeFiles = false, bool fullPaths = true, string entry = null, object fileBuffer = null) { + + if(exctractionPath == null) exctractionPath = Path.GetDirectoryName(filePath); + //make a check if the last '/' exists at the end of the exctractionPath and add it if it is missing + if (@exctractionPath.Substring(@exctractionPath.Length - 1, 1) != "/") { @exctractionPath += "/"; } + if(!Directory.Exists(@exctractionPath)) Directory.CreateDirectory(@exctractionPath); + if(entry == "") entry = null; + + int[] progress = new int[1]; + var ibuf = gcA(progress); + + int res = 0; + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if(!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return -5;} + + if (largeFiles){ + res = decompress7zip(null, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), fileBufferPointer , fileBufferLength); + }else{ + res = decompress7zip2(null, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), fileBufferPointer , fileBufferLength); + } + fbuf.Free(); + ibuf.Free(); return res; + } else { + if (largeFiles){ + res = decompress7zip(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + }else{ + res = decompress7zip2(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + } + } + #endif + + #if (!UNITY_EDITOR_OSX && !UNITY_ANDROID && !UNITY_IOS && !UNITY_EDITOR_LINUX && !UNITY_STANDALONE_LINUX) || UNITY_EDITOR_WIN + if (largeFiles){ + res = decompress7zip(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + } + else{ + res = decompress7zip2(@filePath, @exctractionPath, fullPaths, entry, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); return res; + } + #endif + } + + + + // This function encodes a single archive in lzma alone format. + // + // inPath : the file to be encoded. (use full path + file name) + // outPath : the .lzma file that will be produced. (use full path + file name) + // + // You can set the compression properties by calling the setProps function before. + // setProps(9) for example will set compression level to highest level. + // + // To get the progress of compression, call this function from a thread and use the getBytesRead function to compare against the file size of the encoded archive. + // + // ERROR CODES (for both encode/decode LzmaUtil functions): + // 1 : OK + // -1 : Can not read input file + // -2 : Can not write output file + // -12 : Can not allocate memory + // -13 : Data error + // -11 : Can't write + // -10 : Cant read + public static int LzmaUtilEncode(string inPath, string outPath){ + if (!defaultsSet) setProps(); + var prps = gcA(props); + int res = lzmaUtil(true, @inPath, @outPath, prps.AddrOfPinnedObject()); + prps.Free(); + return res; + } + + + // This function decodes a single archive in lzma alone format. + // + // inPath : the .lzma file that will be decoded. (use full path + file name) + // outPath : the decoded file. (use full path + file name) + // + // To get the progress of decompression, call this function from a thread and use the getBytesRead function to compare against the file size of the compressed archive. + // + // ERROR CODES (for both encode/decode LzmaUtil functions): + // 1 : OK + // -1 : Can not read input file + // -2 : Can not write output file + // -12 : Can not allocate memory + // -13 : Data error + // -11 : Can't write + // -10 : Cant read + public static int LzmaUtilDecode(string inPath, string outPath){ + return lzmaUtil(false, @inPath, @outPath, IntPtr.Zero); + } + #endif + + // Lists that get filled with filenames (including path if the file is in a folder) and uncompressed file sizes by the get7zInfo function + public static List ninfo = new List();//filenames + public static List sinfo = new List();//file sizes + + // An integer variable to store the total number of files in a 7z archive, excluding the folders. + public static int trueTotalFiles = 0; + + + // This function fills the ArrayLists with the filenames and file sizes that are in the 7zip file + // + // returns : the total size in bytes of the files in the 7z archive + // + // filePath : the full path to the archive, including the archives name. (/myPath/myArchive.7z) + // fileBuffer : A buffer that holds a 7zip file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: download7zFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the filePath parameter. + // + // trueTotalFiles is an integer variable to store the total number of files in a 7z archive, excluding the folders. + + public static ulong get7zInfo(string filePath, object fileBuffer = null) { + + ninfo.Clear(); sinfo.Clear(); + trueTotalFiles = 0; + + IntPtr uni = IntPtr.Zero; + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if(!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return 0;} + + uni = _getSize(null, fileBufferPointer, fileBufferLength, false); + fbuf.Free(); + }else { + uni = _getSize(@filePath, IntPtr.Zero, 0, false); + } + #else + uni = _getSize(@filePath, IntPtr.Zero, 0, false); + #endif + + if (uni == IntPtr.Zero) { /*Debug.Log("Input file not found.");*/ return 0; } + + string str = Marshal.PtrToStringAuto ( uni ); + StringReader r = new StringReader(str); + string line; + + string[] rtt; + ulong t = 0, sum = 0; + + while ((line = r.ReadLine()) != null) { + rtt = line.Split('|'); + if(rtt.Length > 0) ninfo.Add(rtt[0]); else ninfo.Add("null"); + if(rtt.Length > 1) { + ulong.TryParse(rtt[1], out t); + sum += t; + sinfo.Add(t); + if (t > 0) trueTotalFiles++; + } else { + sinfo.Add(0); + } + } + + r.Close(); + r.Dispose(); + _releaseBuffer(uni); + + return sum; + } + + // This function returns the uncompressed file size of a given file in the 7z archive if specified, otherwise it will return the total uncompressed size of all the files in the archive. + // + // filePath : the full path to the archive, including the archives name. (/myPath/myArchive.7z) + // : if you call the function with filePath as null, it will try to find file sizes from the last call. + // entry : the file name we want to get the file size (if it resides in a folder add the folder path also). If null the size of all the files will ne returned. + // fileBuffer : A buffer that holds a 7zip file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: download7zFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the filePath parameter. + public static ulong get7zSize( string filePath = null, string entry = null, object fileBuffer=null) { + ulong sum = 0; + if (entry == "") entry = null; + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if(!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return 0;} + + sum = entrySize(null, entry, fileBufferPointer, fileBufferLength); + fbuf.Free(); + return sum; + }else { + sum = entrySize(@filePath, entry, IntPtr.Zero, 0); + return sum; + } + #else + sum = entrySize(@filePath, entry, IntPtr.Zero, 0); + return sum; + #endif + } + + // A function that return the headers size of a 7z archive. + // + // This function is usefull for getting the correct progress when extracting an entry. + // + // filePath : the full path to the archive, including the archives name. (/myPath/myArchive.7z) + // fileBuffer : A buffer that holds a 7zip file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: download7zFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the filePath parameter. + public static uint getHeadersSize(string filePath, object fileBuffer = null) { + IntPtr res = IntPtr.Zero; + #if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if(!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return 0;} + + res = _getSize(null, fileBufferPointer, fileBufferLength, true); + fbuf.Free(); + }else { + res = _getSize(@filePath, IntPtr.Zero, 0, true); + } + #else + res = _getSize(@filePath, IntPtr.Zero, 0, true); + #endif + + if( res != IntPtr.Zero) _releaseBuffer(res); + + return (uint)getBytesRead(); + } + + // A function to decode a specific archive in a 7z archive to a byte buffer + // + // filePath : the full path to the 7z archive + // entry : the file name to decode to a buffer. If the file resides in a folder, the full path should be used. + // fileBuffer : A buffer that holds a 7zip file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: download7zFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the filePath parameter. + public static byte[] decode2Buffer(string filePath, string entry, object fileBuffer=null) { + + int bufs = (int)get7zSize( @filePath, entry, fileBuffer ); + if (bufs <= 0) return null;//entry error or it does not exist + byte[] nb = new byte[bufs]; + int res = 0; + if(entry == "") entry = null; + + var dec2buf = gcA(nb); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, filePath, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + if(!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return null;} + + res = decode2Buf(null, entry, dec2buf.AddrOfPinnedObject(), fileBufferPointer, fileBufferLength); + fbuf.Free(); + }else { + res = decode2Buf(@filePath, entry, dec2buf.AddrOfPinnedObject(), IntPtr.Zero, 0); + } + #else + res = decode2Buf(@filePath, entry, dec2buf.AddrOfPinnedObject(), IntPtr.Zero, 0); + #endif + + dec2buf.Free(); + if(res == 1){ return nb;} + else {nb = null; return null; } + + } + + #if !UNITY_TVOS || UNITY_EDITOR + // --------------------------------------------------------------------------------------------------------------------------------------------------------------- + // + // UTILITY FUNCTIONS + // + // --------------------------------------------------------------------------------------------------------------------------------------------------------------- + + // Use this function to get the total files of a directory and its subdirectories. + public static int getAllFiles(string dir) { + string[] filePaths = Directory.GetFiles(@dir, "*", SearchOption.AllDirectories); + int res = filePaths.Length; + filePaths = null; + return res; + } + + // Use this function to get the size of a file in the file system. + public static long getFileSize(string file) { + FileInfo fi = new FileInfo(file); + if(fi.Exists) return fi.Length; else return 0; + } + + // Use this function to get the size of the files in a directory. + public static ulong getDirSize(string dir) { + string[] filePaths = Directory.GetFiles(@dir, "*", SearchOption.AllDirectories); + ulong size = 0; + for(int i = 0; i < filePaths.Length; i++) { + FileInfo fi = new FileInfo(filePaths[i]); + if(fi.Exists) size += (ulong)fi.Length; + } + return size; + } + #endif + + +#endif + + // --------------------------------------------------------------------------------------------------------------------------------------------------------------- + // + // BUFFER FUNCTIONS + // + // --------------------------------------------------------------------------------------------------------------------------------------------------------------- + + + // This function encodes inBuffer to lzma alone format into the outBuffer provided. + // The buffer can be saved also into a file and can be opened by applications that opens the lzma alone format. + // This buffer can be uncompressed by the decompressBuffer function. + // Returns true if success + // + // if makeHeader == false then the lzma 13 bytes header will not be added to the buffer. + // + // You can set the compression properties by calling the setProps function before. + // setProps(9) for example will set compression level to the highest level. + // + public static bool compressBuffer(byte[] inBuffer, ref byte[] outBuffer, bool makeHeader=true){ + + if (!defaultsSet) setProps(); + var prps = gcA(props); + + var cbuf = gcA(inBuffer); + IntPtr ptr; + + int res = 0; + + ptr = Lzma_Compress(cbuf.AddrOfPinnedObject(), inBuffer.Length, makeHeader, ref res, prps.AddrOfPinnedObject()); + + cbuf.Free(); prps.Free(); + + if(res == 0 || ptr == IntPtr.Zero) {_releaseBuffer(ptr); return false;} + + Array.Resize(ref outBuffer,res); + Marshal.Copy(ptr, outBuffer, 0, res); + + _releaseBuffer(ptr); + + return true; + } + + // Same as the above function, only this returns the compressed buffer in a new created byte[] buffer. + public static byte[] compressBuffer(byte[] inBuffer, bool makeHeader=true) { + + if (!defaultsSet) setProps(); + var prps = gcA(props); + + var cbuf = gcA(inBuffer); + IntPtr ptr; + + int res = 0; + + ptr = Lzma_Compress(cbuf.AddrOfPinnedObject(), inBuffer.Length, makeHeader, ref res, prps.AddrOfPinnedObject()); + + cbuf.Free(); prps.Free(); + + if(res == 0 || ptr == IntPtr.Zero){_releaseBuffer(ptr); return null;} + + + byte[] outBuffer = new byte[res]; + + Marshal.Copy(ptr, outBuffer, 0, res); + + _releaseBuffer(ptr); + + return outBuffer; + } + + // Same as the above function, only it compresses a part of the input buffer. + // + // inBufferPartialLength: the size of the input buffer that should be compressed + // inBufferPartialIndex: the offset of the input buffer from where the compression will start + // + public static bool compressBufferPartial(byte[] inBuffer, int inBufferPartialIndex, int inBufferPartialLength, ref byte[] outBuffer, bool makeHeader = true) { + if(inBufferPartialIndex + inBufferPartialLength > inBuffer.Length) return false; + + if (!defaultsSet) setProps(); + var prps = gcA(props); + var cbuf = gcA(inBuffer); + + IntPtr ptr; + IntPtr ptrPartial; + + int res = 0; + + ptrPartial = new IntPtr(cbuf.AddrOfPinnedObject().ToInt64() + inBufferPartialIndex); + + ptr = Lzma_Compress(ptrPartial, inBufferPartialLength, makeHeader, ref res, prps.AddrOfPinnedObject()); + + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { _releaseBuffer(ptr); return false; } + + Array.Resize(ref outBuffer, res); + Marshal.Copy(ptr, outBuffer, 0, res); + + _releaseBuffer(ptr); + + return true; + } + + + // Same as compressBufferPartial, only this function will compress the data into a fixed size buffer + // The compressed size is returned so you can manipulate it at will. + // + // Use the 'safe' parameter to avoid buffer overrun. + public static int compressBufferPartialFixed(byte[] inBuffer, int inBufferPartialIndex, int inBufferPartialLength, ref byte[] outBuffer, bool safe = true, bool makeHeader = true) { + if(inBufferPartialIndex + inBufferPartialLength > inBuffer.Length) return 0; + + if (!defaultsSet) setProps(); + var prps = gcA(props); + var cbuf = gcA(inBuffer); + + IntPtr ptr; + IntPtr ptrPartial; + + int res = 0; + + ptrPartial = new IntPtr(cbuf.AddrOfPinnedObject().ToInt64() + inBufferPartialIndex); + + ptr = Lzma_Compress(ptrPartial, inBufferPartialLength, makeHeader, ref res, prps.AddrOfPinnedObject()); + + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { _releaseBuffer(ptr); return 0; } + + // if the compressed buffer is larger then the fixed size buffer we use: + // 1. then write only the data that fit in it. + // 2. or we return 0. + // It depends on if we set the safe flag to true or not. + if(res > outBuffer.Length) { + if(safe) { _releaseBuffer(ptr); return 0; } else { res = outBuffer.Length; } + } + + Marshal.Copy(ptr, outBuffer, 0, res); + + _releaseBuffer(ptr); + + return res; + } + + + // Same as the compressBuffer function, only this function will put the result in a fixed size buffer to avoid memory allocations. + // The compressed size is returned so you can manipulate it at will. + // + // Use the 'safe' parameter to avoid buffer overrun. + public static int compressBufferFixed(byte[] inBuffer, ref byte[] outBuffer, bool safe = true, bool makeHeader=true) { + + if (!defaultsSet) setProps(); + var prps = gcA(props); + + var cbuf = gcA(inBuffer); + IntPtr ptr; + + int res = 0; + + ptr = Lzma_Compress(cbuf.AddrOfPinnedObject(), inBuffer.Length, makeHeader, ref res, prps.AddrOfPinnedObject()); + + cbuf.Free(); prps.Free(); + if(res == 0 || ptr == IntPtr.Zero){_releaseBuffer(ptr); return 0;} + + // if the compressed buffer is larger then the fixed size buffer we use: + // 1. then write only the data that fit in it. + // 2. or we return 0. + // It depends on if we set the safe flag to true or not. + if(res > outBuffer.Length) { + if(safe) { _releaseBuffer(ptr); return 0; } else { res = outBuffer.Length; } + } + + Marshal.Copy(ptr, outBuffer, 0, res); + + _releaseBuffer(ptr); + + return res; + } + + + + // This function decompresses an lzma compressed byte buffer and puts the data in a provided referenced out-buffer that will get resized to fit the data. + // If the useHeader flag is false you have to provide the uncompressed size of the buffer via the customLength integer. + // if res == 0 operation was successful + // + // Error codes + /* + OK 0 + + ERROR_DATA 1 + ERROR_MEM 2 + ERROR_UNSUPPORTED 4 + ERROR_PARAM 5 + ERROR_INPUT_EOF 6 + ERROR_OUTPUT_EOF 7 + ERROR_FAIL 11 + ERROR_THREAD 12 + */ + public static int decompressBuffer(byte[] inBuffer, ref byte[] outbuffer, bool useHeader = true, int customLength = 0) { + + var cbuf = gcA(inBuffer); + int uncompressedSize = 0; + + //if the lzma header will be used to extract the uncompressed size of the buffer. If the buffer does not have a header + //provide the known uncompressed size through the customLength integer. + if(useHeader) uncompressedSize = (int)BitConverter.ToUInt64(inBuffer,5); else uncompressedSize = customLength; + + Array.Resize(ref outbuffer, uncompressedSize); + + var obuf = gcA(outbuffer); + + int res = Lzma_Uncompress(cbuf.AddrOfPinnedObject(), inBuffer.Length, uncompressedSize, obuf.AddrOfPinnedObject(), useHeader); + + cbuf.Free(); + obuf.Free(); + + //if(res!=0){/*Debug.Log("ERROR: "+res.ToString());*/ return res; } + + return res; + } + + // Same as above, only this one returns a new created buffer with the data + public static byte[] decompressBuffer(byte[] inBuffer, bool useHeader = true, int customLength = 0) { + + var cbuf = gcA(inBuffer); + int uncompressedSize = 0; + + //if the lzma header will be used to extract the uncompressed size of the buffer. If the buffer does not have a header + //provide the known uncompressed size through the customLength integer. + if(useHeader) uncompressedSize = (int)BitConverter.ToUInt64(inBuffer,5); else uncompressedSize = customLength; + + byte[] outbuffer = new byte[uncompressedSize]; + + var obuf = gcA(outbuffer); + + int res = Lzma_Uncompress(cbuf.AddrOfPinnedObject(), inBuffer.Length, uncompressedSize, obuf.AddrOfPinnedObject(), useHeader); + + cbuf.Free(); + obuf.Free(); + + if(res!=0){/*Debug.Log("ERROR: "+res.ToString());*/ return null; } + + return outbuffer; + } + + + // Same as above function. Only this one outputs to a buffer of fixed which size isn't resized to avoid memory allocations. + // The fixed buffer should have a size that will be able to hold the incoming decompressed data. + // + // returns the uncompressed size. + public static int decompressBufferFixed(byte[] inBuffer, ref byte[] outbuffer, bool safe = true, bool useHeader = true, int customLength = 0) { + + int uncompressedSize = 0; + + // if the lzma header will be used to extract the uncompressed size of the buffer. If the buffer does not have a header + // provide the known uncompressed size through the customLength integer. + if(useHeader) uncompressedSize = (int)BitConverter.ToUInt64(inBuffer,5); else uncompressedSize = customLength; + + // Check if the uncompressed size is bigger then the size of the fixed buffer. Then: + // 1. write only the data that fit in it. + // 2. or return a negative number. + // It depends on if we set the safe flag to true or not. + if(uncompressedSize > outbuffer.Length) { + if(safe) return -101; else uncompressedSize = outbuffer.Length; + } + + var cbuf = gcA(inBuffer); + var obuf = gcA(outbuffer); + + int res = Lzma_Uncompress(cbuf.AddrOfPinnedObject(), inBuffer.Length, uncompressedSize, obuf.AddrOfPinnedObject(), useHeader); + + cbuf.Free(); + obuf.Free(); + + if(res!=0){/*Debug.Log("ERROR: "+res.ToString());*/ return -res; } + + return uncompressedSize; + } + + + #if !UNITY_WEBGL && !UNITY_TVOS + // A reusable native memory pointer for downloading files. + public static IntPtr nativeBuffer = IntPtr.Zero; + public static bool nativeBufferIsBeingUsed = false; + public static int nativeOffset = 0; + + + // A Coroutine to dowload a file to a native/unmaged memory buffer. + // You can call it for an IntPtr. + // + // + // This function can only be called for one file at a time. Don't use it to call multiple files at once. + // + // This is useful to avoid memory spikes when downloading large files and intend to decompress from memory. + // With the old method, a copy of the downloaded file to memory would be produced by pinning the buffer to memory. + // Now with this method, it is downloaded to memory and can be manipulated with no memory spikes. + // + // In any case, if you don't need the created in-Memory file, you should use the lzma._releaseBuffer function to free the memory! + // + // Parameters: + // + // url: The url of the file you want to download to a native memory buffer. + // downloadDone: Informs a bool that the download of the file to memory is done. + // pointer: An IntPtr for a native memory buffer + // fileSize: The size of the downloaded file will be returned here. + public static IEnumerator download7zFileNative(string url, Action downloadDone, Action pointer = null, Action fileSize = null) { + // Get the file lenght first, so we create a correct size native memory buffer. + UnityWebRequest wr = UnityWebRequest.Head(url); + + nativeBufferIsBeingUsed = true; + + yield return wr.SendWebRequest(); + string size = wr.GetResponseHeader("Content-Length"); + + nativeBufferIsBeingUsed = false; + + #if UNITY_2020_1_OR_NEWER + if (wr.result == UnityWebRequest.Result.ConnectionError || wr.result == UnityWebRequest.Result.ProtocolError) { + #else + if (wr.isNetworkError || wr.isHttpError) { + #endif + Debug.LogError("Error While Getting Length: " + wr.error); + } else { + if (!nativeBufferIsBeingUsed) { + + //get the size of the zip + int zipSize = Convert.ToInt32(size); + + // If the zip size is larger then 0 + if (zipSize > 0) { + + nativeBuffer = _createBuffer(zipSize); + nativeBufferIsBeingUsed = true; + + // buffer for the download + byte[] bytes = new byte[2048]; + nativeOffset = 0; + + using (UnityWebRequest wwwSK = UnityWebRequest.Get(url)) { + + // Here we call our custom webrequest function to download our archive to a native memory buffer. + wwwSK.downloadHandler = new CustomWebRequest2(bytes); + + yield return wwwSK.SendWebRequest(); + + if (wwwSK.error != null) { + Debug.Log(wwwSK.error); + } else { + downloadDone(true); + + if(pointer != null) { pointer(nativeBuffer); fileSize(zipSize); } + + //reset intermediate buffer params. + nativeBufferIsBeingUsed = false; + nativeOffset = 0; + nativeBuffer = IntPtr.Zero; + + //Debug.Log("Custom download done"); + } + } + + } + + } else { Debug.LogError("Native buffer is being used, or not yet freed!"); } + } + } + + + // A custom WebRequest Override to download data to a native-unmanaged memory buffer. + public class CustomWebRequest2 : DownloadHandlerScript { + + public CustomWebRequest2() + : base() + { + } + + public CustomWebRequest2(byte[] buffer) + : base(buffer) + { + } + + protected override byte[] GetData() { return null; } + + + protected override bool ReceiveData(byte[] bytesFromServer, int dataLength) { + if (bytesFromServer == null || bytesFromServer.Length < 1) { + Debug.Log("CustomWebRequest: Received a null/empty buffer"); + return false; + } + + var pbuf = gcA(bytesFromServer); + + //Process byteFromServer + _addToBuffer(nativeBuffer, nativeOffset, pbuf.AddrOfPinnedObject(), dataLength ); + nativeOffset += dataLength; + pbuf.Free(); + + return true; + } + + // Use the below functions only when needed. You get the same functionality from the main coroutine. + /* + // If all data has been received from the server + protected override void CompleteContent() + { + //Debug.Log(Download Complete."); + } + + // If a Content-Length header is received from the server. + protected override void ReceiveContentLength(int fileLength) + { + //Debug.Log("ReceiveContentLength: " + fileLength); + } + */ + } + #endif + +#endif +} + diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs.meta b/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs.meta new file mode 100644 index 00000000..c06647de --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/lzma.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: a8329f5faced69d44a5e21b4349d4103 +timeCreated: 1553412858 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS.meta new file mode 100644 index 00000000..4d940d12 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e6bbd4906120d9742bcb489b98f31c5f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a new file mode 100644 index 00000000..83cab644 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip new file mode 100644 index 00000000..087af5ac Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip.meta new file mode 100644 index 00000000..6b2f3368 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a-Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 97ff2c793a490bd43b66ad27334f4f4e +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a.meta new file mode 100644 index 00000000..ecdbe914 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.a.meta @@ -0,0 +1,102 @@ +fileFormatVersion: 2 +guid: 7b2c542e5b4f075489e83806899116aa +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + - first: + '': Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude tvOS: 0 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + tvOS: tvOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip new file mode 100644 index 00000000..e72bf46d Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..8fbb82fc --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 29dfcb5789857a8468d1f53d72e7685e +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip new file mode 100644 index 00000000..f6d8f6d7 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..b7d3bd50 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/liblzma.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 4d0121f39cd493b49b224209a1b40513 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode.meta new file mode 100644 index 00000000..5233bad3 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ef98f383142f8484d8c5a671d0a63c3f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip new file mode 100644 index 00000000..ea502efb Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip.meta new file mode 100644 index 00000000..4f497196 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/tvOS/non-bitcode/liblzma.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 1ab0597a73a68474b90cf4cdd84230ab +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86.meta b/Assets/ADL-Plugins/SevenZip/Plugins/x86.meta new file mode 100644 index 00000000..85430a4c --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/x86.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 15b725914d0245b479c1317951ffde5b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip b/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip new file mode 100644 index 00000000..e4bee24a Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip.meta b/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip.meta new file mode 100644 index 00000000..9d70be3e --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/x86/liblzma.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 1132f61398a6e124caea41615357ce07 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86_64.meta b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64.meta new file mode 100644 index 00000000..ae400225 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: bca37ff9706548d4ab652ea1f9440729 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll new file mode 100644 index 00000000..737e3e74 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll.meta b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll.meta new file mode 100644 index 00000000..7951868f --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.dll.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: 0d7397906591d1543b12896515e5bb7b +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Windows + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so new file mode 100644 index 00000000..4ac1b614 Binary files /dev/null and b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so differ diff --git a/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so.meta b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so.meta new file mode 100644 index 00000000..69031086 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Plugins/x86_64/liblzma.so.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: 3c8bb32d930a3b14ba417ee6a3629daf +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 1 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: None + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Linux + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/Scripts.meta b/Assets/ADL-Plugins/SevenZip/Scripts.meta new file mode 100644 index 00000000..e578ea56 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Scripts.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: 4a87c6bf4a9034841adb553442f74073 +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs b/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs new file mode 100644 index 00000000..fd113cd0 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs @@ -0,0 +1,412 @@ +using UnityEngine; +using System; +using System.Threading; +using System.IO; +using System.Collections; + + +public class SevenZipTest : MonoBehaviour{ +#if (!UNITY_TVOS && !UNITY_WEBGL) || UNITY_EDITOR + + //the test file to download. + private string myFile = "test.7z"; + + //the adress from where we download our test file + private string uri = "https://dl.dropbox.com/s/16v2ng25fnagiwg/"; + + private string ppath; + + private string log =""; + + void plog(string t = "") { + log += t + "\n"; ; + } + + private bool downloadDone; + + private ulong tsize; + + //reusable buffer for lzma alone buffer to buffer encoding/decoding + private byte[] buff; + + //fixed size buffers, that don't get resized, to perform compression/decompression of buffers in them and avoid memory allocations. + private byte[] fixedInBuffer = new byte[1024*256]; + private byte[] fixedOutBuffer = new byte[1024*256]; + + Thread th = null; + + + //A 1 item integer array to get the current extracted file of the 7z archive. Compare this to the total number of the files to get the progress %. + private int[] fileProgress = new int[1]; + + void Start(){ + + ppath = Application.persistentDataPath; + + //we are setting the lzma.persitentDataPath so the get7zinfo, get7zSize, decode2Buffer functions can work on separate threads! + lzma.persitentDataPath = Application.persistentDataPath; + + #if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; + #endif + + // a reusable buffer to compress/decopmress data in/from buffers + buff = new byte[0]; + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + //download a 7z test file + if (!File.Exists(ppath + "/" + myFile)) StartCoroutine(Download7ZFile()); else downloadDone = true; + } + + + + void Update(){ + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI(){ + + if (downloadDone == true) { + GUI.Label(new Rect(50, 5, 350, 30), "package downloaded, ready to extract"); + GUI.Label(new Rect(350, 5, 450, 40), ppath); + + // progress on threaded function call + if (th != null) { + //Show a referenced integer that indicate the current file beeing extracted. + GUI.Label(new Rect(Screen.width - 90, 10, 90, 50), fileProgress[0].ToString()); + // Use these values for byte level progress. + GUI.Label(new Rect(Screen.width - 90, 30, 90, 50), lzma.getBytesWritten().ToString() + " : " +lzma.getBytesRead().ToString()); + } + + GUI.TextArea(new Rect(50, 120, Screen.width - 100, Screen.height - 135), log); + + if (GUI.Button(new Rect(50, 55, 150, 50), "start 7z test")) { + //delete the known files that are extracted from the downloaded example z file + //it is important to do this when you re-extract the same files on some platforms. + if (File.Exists(ppath + "/1.txt")) File.Delete(ppath + "/1.txt"); + if (File.Exists(ppath + "/2.txt")) File.Delete(ppath + "/2.txt"); + log = ""; + + //call the decompresion demo functions. + DoDecompression(); + } + + if (GUI.Button(new Rect(210, 55, 120, 50), "Lzma buffer tests")) { + log = ""; + //download an lzma alone format file to test buffer 2 buffer encoding/decoding functions + StartCoroutine(buff2buffTest()); + } + + //decompress file from buffer + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + if (GUI.Button(new Rect(340, 55, 120, 50), "File Buffer test")) { + doFileBufferTest(); + } + if (GUI.Button(new Rect(470, 55, 130, 50), "Native fileBuffer test")) { + StartCoroutine(nativeFileBufferTest()); + } + #endif + } + + } + + + + + void DoDecompression(){ + + // Decompress the 7z file + int lzres; + float t = Time.realtimeSinceStartup; + + // the referenced progress int will indicate the current index of file beeing decompressed. Use in a separate thread to show it realtime. + + // to get realtime byte level decompression progress (from a thread), there are 2 ways: + // + // 1. use lzma.get7zSize function to get the total uncompressed size of the files and compare against the bytes written in realtime, calling the lzma.getBytesWritten function. + // + // 2. use the lzma.getFileSize (or buffer length for FileBuffers) to get the file size and compare against the bytes read in realtime, calling the lzma.getBytesRead function. + fileProgress[0] = 0; + + lzres = lzma.doDecompress7zip(ppath + "/" + myFile, ppath + "/", fileProgress, true, true); + + plog ("7z return code: " + lzres.ToString()); + + plog ("Bytes Read: " + lzma.getBytesRead().ToString() + " Bytes Written: " + lzma.getBytesWritten().ToString() ); + + plog( "Headers size: " + lzma.getHeadersSize(ppath + "/" + myFile).ToString() );// this function will reset the bytesRead and bytesWritten + + // If your 7z archive has multiple files and you call the lzma.doDecompress7zip function, you can call the lzip.sevenZcancel() function to cancel the operation. + + // get the uncompressed size of an entry. + ulong sizeOfEntry = lzma.get7zSize(ppath + "/" + myFile, "1.txt"); + + // Extract an entry and get its progress. + plog( "Extract entry: " + lzma.doDecompress7zip(ppath + "/" + myFile, null, false, false, "1.txt").ToString() + " progress: " + ((sizeOfEntry/lzma.getBytesWritten())*100f).ToString() +"%" ); + + //read file names and file sizes of the 7z archive, store them in the lzma.ninfo & lzma.sinfo ArrayLists and return the total uncompressed size of the included files. + tsize = lzma.get7zInfo(ppath + "/" + myFile); + + plog( ("Total Size: " + tsize + " trueTotalFiles: " + lzma.trueTotalFiles) ); + + //Look through the ninfo and info ArrayLists where the file names and sizes are stored. + if(lzma.ninfo != null){ + for (int i = 0; i < lzma.ninfo.Count; i++){ + plog( lzma.ninfo[i] + " - " + lzma.sinfo[i] ); + //Debug.Log(i.ToString()+" " +lzma.ninfo[i]+"|"+lzma.sinfo[i].ToString()); + } + } + + plog(); + + //get size of a specific file. (if the file path is null it will look in the arraylists created by the get7zInfo function + plog ("Uncompressed Size: "+lzma.get7zSize(ppath + "/" + myFile, "1.txt")); + + //setup the lzma compression level. (see more at the function declaration at lzma.cs) + //This function is not multiple threads safe so call it before starting multiple threads with lzma compress operations. + lzma.setProps(9); + + //set encoding properties. lower dictionary compresses faster and consumes less ram! + lzma.setProps(9, 1 << 16); + + + //encode an archive to lzma alone format + lzres = lzma.LzmaUtilEncode( ppath + "/1.txt", ppath + "/1.txt.lzma"); + if (lzres != 0) plog("lzma encoded " + lzres.ToString()); + + //write out bytes read/written. If called from a thread you can get the progress of the encoding + plog("bytes read: " + lzma.getBytesRead().ToString() + " / bytes written: " + lzma.getBytesWritten().ToString()); + + //decode an archive from lzma alone format + lzres = lzma.LzmaUtilDecode( ppath + "/1.txt.lzma", ppath + "/1BCD.txt"); + if (lzres != 0) plog("lzma decoded " + lzres.ToString()); + + //write out bytes read/written. If called from a thread you can get the progress of the encoding + plog("bytes read: " + lzma.getBytesRead().ToString() + " / bytes written: " + lzma.getBytesWritten().ToString()); + + //decode a specific file from a 7z archive to a byte buffer + var buffer = lzma.decode2Buffer( ppath + "/" + myFile, "1.txt"); + + if (buffer != null) { + File.WriteAllBytes(ppath + "/1AAA.txt", buffer); + if (buffer.Length > 0) { plog ("Decode2Buffer Size: " + buffer.Length.ToString()); plog("decoded to buffer: ok"); } + } + + + //you might want to call this function in another thread to not halt the main thread and to get the progress of the extracted files. + //for example: + th = new Thread(Decompress); th.Start(); // faster then coroutine + + //calculate the time it took to decompress the file + plog("time: " + (Time.realtimeSinceStartup - t).ToString()); + } + + + //call from separate thread. here you can get the progress of the extracted files through a referenced integer. + void Decompress() { + int lzres = lzma.doDecompress7zip(ppath + "/"+myFile , ppath + "/", fileProgress, true,true); + if(lzres == 1) plog ("Multithreaded 7z decompression: ok"); + } + + + +#if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_EDITOR || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + void doFileBufferTest() { + //For iOS, Android, Linux and MacOSX the plugin can handle a byte buffer as a file. (in this case the www.bytes) + //This way you can extract the file or parts of it without writing it to disk. + // + + if (File.Exists(ppath + "/" + myFile)) { + byte[] www = File.ReadAllBytes(ppath + "/" + myFile); + log=""; + + int lzres = lzma.doDecompress7zip(null, ppath + "/", true,true,null, www); + plog("Decompression result: " + lzres.ToString()); + plog ("bytes read: " + lzma.getBytesRead().ToString() ); + plog ("headers size: " + lzma.getHeadersSize(null, www).ToString() ); + + fileProgress[0] = 0; + lzres = lzma.doDecompress7zip(null, ppath + "/", fileProgress, false,true,null, www); + plog (lzres.ToString() + "\n progress files: " + fileProgress[0].ToString() + " progress bytes: " + lzma.getBytesWritten() ); + + tsize = lzma.get7zInfo(null, www); + plog ("total size: " + tsize.ToString() + " number of files: " + lzma.trueTotalFiles.ToString()); + for(int i=0 ; i 0) { plog ("FileBuffer_Decode2Buffer Length: " + buffer.Length.ToString()); } + } + + + } + } + + + // native file buffer test + //For iOS, Android, Linux and MacOSX the plugin can handle a byte buffer as a file. (in this case a native file buffer) + //This way you can extract the file or parts of it without writing it to disk. + IEnumerator nativeFileBufferTest() { + + //make a check that the intermediate native buffer is not being used! + if(lzma.nativeBufferIsBeingUsed) { Debug.Log("Native buffer download is in use"); yield break; } + + log = ""; + + // A bool for download checking + bool downloadDoneN = false; + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // int to get the downloaded file size + int zsize = 0; + + plog("Downloading 7z file to native memory buffer"); + plog(); + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. + StartCoroutine(lzma.download7zFileNative("http://telias.free.fr/temp/test.7z", r => downloadDoneN = r, pointerResult => nativePointer = pointerResult, size => zsize = size)); + + while (!downloadDoneN) yield return true; + + int lzres = lzma.doDecompress7zip(zsize.ToString(), ppath + "/", true,true,null, nativePointer); + plog("Decompression result: " + lzres.ToString()); + plog ("bytes read: " + lzma.getBytesRead().ToString() ); + plog ("headers size: " + lzma.getHeadersSize(zsize.ToString(), nativePointer).ToString() ); + + fileProgress[0] = 0; + lzres = lzma.doDecompress7zip(zsize.ToString(), ppath + "/", fileProgress, false,true,null, nativePointer); + plog (lzres.ToString() + "\n progress files: " + fileProgress[0].ToString() + " progress bytes: " + lzma.getBytesWritten() ); + + tsize = lzma.get7zInfo(zsize.ToString(), nativePointer); + plog ("total size: " + tsize.ToString() + " number of files: " + lzma.trueTotalFiles.ToString()); + for(int i=0 ; i 0) { plog ("FileBuffer_Decode2Buffer Length: " + buffer.Length.ToString()); } + } + } + #endif + + IEnumerator Download7ZFile() { + + //make sure a previous 7z file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) File.Delete(ppath + "/" + myFile); + + Debug.Log("starting download"); + + //replace the link to the 7zip file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(uri + myFile)) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + downloadDone = true; + log = ""; + //write the downloaded 7zip file to the ppath directory so we can have access to it + //depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + + } + + + IEnumerator buff2buffTest() { + //BUFFER TO BUFFER lzma alone compression/decompression EXAMPLE + // + //An example on how to decompress an lzma alone file downloaded through www without storing it to disk + //using just the www.bytes buffer. + + plog("Downloading a file..."); + + using (UnityEngine.Networking.UnityWebRequest w = UnityEngine.Networking.UnityWebRequest.Get("https://dl.dropbox.com/s/3e6i0mri2v3xfdy/google.jpg.lzma")) { + #if UNITY_5 || UNITY_4 + yield return w.Send(); + #else + yield return w.SendWebRequest(); + #endif + + if(w.error==null){ + //we decompress the lzma file in the buff buffer. + if(lzma.decompressBuffer( w.downloadHandler.data, ref buff )==0) { + plog( "decompress Buffer: True" ); + //we write it to disk just to check that the decompression was ok + File.WriteAllBytes( ppath + "/google.jpg",buff); + }else{ + plog ("Error decompressing www.bytes to buffer"); + } + }else{ + plog (w.error); + } + } + + yield return new WaitForSeconds(0.2f); + + + //Example on how to compress a buffer. + if (File.Exists(ppath + "/google.jpg")) { + byte[] bt = File.ReadAllBytes(ppath + "/google.jpg"); + + //compress the data buffer into a compressed buffer + if(lzma.compressBuffer(bt ,ref buff)){ + plog ("compress Buffer: True" ); + //write it to disk just for checking purposes + File.WriteAllBytes( ppath+"/google.jpg.lzma", buff); + + plog(); + //print info + plog ("uncompressed size in lzma: " + BitConverter.ToUInt64(buff,5).ToString()) ; + plog ("lzma size: " + buff.Length); + } else { + plog ("could not compress to buffer ..."); + } + + plog(); + + //FIXED BUFFER FUNCTIONS: + int compressedSize = lzma.compressBufferFixed(bt, ref fixedInBuffer); + plog (" #-> Compress Fixed size Buffer: " + compressedSize.ToString()); + + if(compressedSize > 0) { + int decommpressedSize = lzma.decompressBufferFixed(fixedInBuffer, ref fixedOutBuffer); + if(decommpressedSize > 0) plog (" #-> Decompress Fixed size Buffer: " + decommpressedSize.ToString()); + } + + bt =null; + } + + } +#else + void OnGUI(){ + GUI.Label(new Rect(10,10,500,40),"Please run the WebGL/tvOS demo."); + } +#endif +} + diff --git a/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs.meta b/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs.meta new file mode 100644 index 00000000..ec4b7aee --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Scripts/SevenZipTest.cs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 86c5d1c6f05894f6984c04af9617452e +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: diff --git a/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs b/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs new file mode 100644 index 00000000..6490231a --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs @@ -0,0 +1,178 @@ +using UnityEngine; +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine.Networking; + + + +public class testLzmaWebGLtvOS : MonoBehaviour +{ +#if UNITY_WEBGL || UNITY_TVOS + + //an output Buffer for the decompressed lzma buffer + private byte[] outbuffer = null, outbuffer2 = null; + private Texture2D tex = null, tex2 = null; + + byte[] wwb = null; + #if UNITY_TVOS + byte[] sevenZ = null; + #endif + + private bool downloadDone2; + + private string log = ""; + + //log for output of results + void plog(string t = "") { + log += t + "\n"; ; + } + + void Start(){ + tex = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex2 = new Texture2D(1,1,TextureFormat.RGBA32, false); + + //get an lzma file from the net + StartCoroutine( getFromSite() ); + #if UNITY_TVOS + StartCoroutine(Download7ZFile()); + #endif + + outbuffer2 = new byte[1]; + + #if UNITY_TVOS && !UNITY_EDITOR + StartCoroutine(tvos()); + #endif + } + + #if UNITY_TVOS && !UNITY_EDITOR + IEnumerator tvos() { + yield return new WaitForSeconds(6); + log = ""; + StartCoroutine(performOperations()); + yield return new WaitForSeconds(2); + log = ""; + StartCoroutine(perform7zOperations()); + yield return true; + } + #endif + + void OnGUI(){ + + if (downloadDone2 == true) { + GUI.Label(new Rect(10, 0, 250, 30), "got package, ready to test"); + + if (GUI.Button(new Rect(10, 40, 230, 50), "start Lzma test")) { + log = ""; + StartCoroutine(performOperations()); + } + #if UNITY_TVOS + if (GUI.Button(new Rect(10, 100, 230, 50), "7z decode2Buffer test")) { + log = ""; + StartCoroutine(perform7zOperations()); + } + #endif + } + + if (tex != null) GUI.DrawTexture(new Rect(300, 10, 375, 300), tex); + if(tex2 != null) GUI.DrawTexture(new Rect(680, 10, 375, 300), tex2); + + GUI.TextArea(new Rect(10, 370, Screen.width - 20, Screen.height - 400), log); + + } + + + + // ============================================================================================================================================================= + + + IEnumerator getFromSite() { + plog("getting file from Site ..."); + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropbox.com/s/r8upgppb4kqz1sw/testLZ4b.png.lzma")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + wwb = new byte[www.downloadHandler.data.Length]; + Array.Copy(www.downloadHandler.data, 0, wwb, 0, www.downloadHandler.data.Length); + plog("Got file"); + } + } + + downloadDone2 = true; + } + + #if UNITY_TVOS + IEnumerator Download7ZFile() { + + //replace the link to the 7zip file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get("https://dl.dropbox.com/s/16v2ng25fnagiwg/test.7z")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + plog(www.error); + } else { + + log = ""; + sevenZ = new byte[www.downloadHandler.data.Length]; + Array.Copy(www.downloadHandler.data, sevenZ, www.downloadHandler.data.Length); + + plog("download 7z done"); + } + } + + } + IEnumerator perform7zOperations() { + if(sevenZ == null || (sevenZ != null && sevenZ.Length < 10)) { plog("No 7z found."); yield break;} + + uint headersSize = lzma.getHeadersSize(null, sevenZ); + plog("Headers size of 7z: " + headersSize.ToString()); + + var entry = lzma.decode2Buffer(null, "1.txt", sevenZ); + if(entry != null) plog("buffer decoded. size: " + entry.Length.ToString() + " progress: " + lzma.getBytesWritten().ToString()); + + plog("Get entry size: " + lzma.get7zSize(null, "1.txt", sevenZ).ToString() + "\n"); + + plog("Get info on 7z: " + lzma.get7zInfo(null, sevenZ).ToString() ); + + + if(lzma.ninfo != null && lzma.ninfo.Count > 0) { + for(int i = 0; i < lzma.ninfo.Count; i++){ + plog(i.ToString() + ". " + lzma.ninfo[i].ToString() + " : " + lzma.sinfo[i].ToString()); + } + } + } + #endif + + IEnumerator performOperations() { + plog("Decompress buffer: "+lzma.decompressBuffer(wwb, ref outbuffer).ToString()); + if(outbuffer != null) tex.LoadImage(outbuffer); + plog(); + yield return true; + byte[] bb = new byte[1]; + lzma.setProps(9, 1 << 16); + plog("Compress buffer: " +lzma.compressBuffer(outbuffer, ref bb).ToString()); + plog(); + yield return true; + plog("Decompress buffer 2: "+lzma.decompressBuffer(bb, ref outbuffer2).ToString()); + if(outbuffer2 != null) tex2.LoadImage(outbuffer2); + } + +#else + void OnGUI(){ + GUI.Label(new Rect(10,10,500,40),"Only for WebGL or tvOS."); + } +#endif + +} + diff --git a/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs.meta b/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs.meta new file mode 100644 index 00000000..aae79333 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/Scripts/testLzmaWebGLtvOS.cs.meta @@ -0,0 +1,11 @@ +fileFormatVersion: 2 +guid: c7c8a47606e185c4a960e0a3b5603cf8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/testScene.unity b/Assets/ADL-Plugins/SevenZip/testScene.unity new file mode 100644 index 00000000..fe8beb0d --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testScene.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: d065ebdbbb0bf8643966b50d3bf0a0a0, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &1405511207 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1405511212} + - component: {fileID: 1405511211} + - component: {fileID: 1405511209} + - component: {fileID: 1405511208} + - component: {fileID: 1405511213} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &1405511208 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 +--- !u!124 &1405511209 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 +--- !u!20 &1405511211 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.12307865, g: 0.15067078, b: 0.19402987, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 100 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &1405511212 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &1405511213 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 86c5d1c6f05894f6984c04af9617452e, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/SevenZip/testScene.unity.meta b/Assets/ADL-Plugins/SevenZip/testScene.unity.meta new file mode 100644 index 00000000..057378b5 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testScene.unity.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: a9cbd135636f56749a814be852381eb0 +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting b/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting new file mode 100644 index 00000000..9032533b --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: testSceneSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting.meta b/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting.meta new file mode 100644 index 00000000..0776da78 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d065ebdbbb0bf8643966b50d3bf0a0a0 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity new file mode 100644 index 00000000..ce17e3a3 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: ed46aed4b795ea44d953ff1431f76ac2, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &1405511207 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1405511212} + - component: {fileID: 1405511211} + - component: {fileID: 1405511209} + - component: {fileID: 1405511208} + - component: {fileID: 1405511213} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &1405511208 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 +--- !u!124 &1405511209 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 +--- !u!20 &1405511211 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.19296063, g: 0.2408779, b: 0.31617647, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 100 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &1405511212 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &1405511213 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1405511207} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: c7c8a47606e185c4a960e0a3b5603cf8, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity.meta b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity.meta new file mode 100644 index 00000000..5592fa7a --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOS.unity.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 365efd51117c27647b8c51192ab7d1df +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting new file mode 100644 index 00000000..2fa6bd3f --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: testSceneWebGLtvOSSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting.meta b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting.meta new file mode 100644 index 00000000..63d52f47 --- /dev/null +++ b/Assets/ADL-Plugins/SevenZip/testSceneWebGLtvOSSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ed46aed4b795ea44d953ff1431f76ac2 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/benchmark.meta b/Assets/ADL-Plugins/benchmark.meta new file mode 100644 index 00000000..d2cca3cb --- /dev/null +++ b/Assets/ADL-Plugins/benchmark.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 04646c82660fc444abcf44ddcb29e73a +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/benchmark/Scripts.meta b/Assets/ADL-Plugins/benchmark/Scripts.meta new file mode 100644 index 00000000..ce44e456 --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/Scripts.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 117bbb861acde084c8c37d58fc1bbc44 +folderAsset: yes +timeCreated: 1450947697 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs b/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs new file mode 100644 index 00000000..6f5d2887 --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs @@ -0,0 +1,306 @@ + +using UnityEngine; +using System; +using System.Threading; +using System.IO; +using System.Collections; +using System.Collections.Generic; + +public class benchmark : MonoBehaviour{ +#if (!UNITY_WEBPLAYER && !UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + + + private int lzres = 0, zipres = 0, flzres = 0; + private int brres = 0, lz4res = 0, gzres = 0; + + private bool pass1, pass2; + + //for counting the time taken to decompress the 7z file. + private float t1, tim; + + //the test file to download. + private string myFile = "testimg2.7z", myFile2 = "testimg.zip", uncFile = "testimg.tif"; + + //the adress from where we download our test file + private string uri = "https://dl.dropbox.com/s/5r7tlkvff9ba04b/"; + + private string ppath; + + private string log=""; + + private bool downloadDone, benchmarkStarted; + + private long tsize; + + GUIStyle style; + + //A 1 item integer array to get the current extracted file of the 7z archive. Compare this to the total number of the files to get the progress %. + private int[] progress = new int[1]; + private ulong[] progress1 = new ulong[1]; + private ulong[] progress2 = new ulong[1]; + private float[] progress3 = new float[1]; + private ulong[] progress4 = new ulong[1]; + private ulong[] bytes = new ulong[1]; + private ulong[] gzProgress = new ulong[1]; + + void Start(){ + + ppath = Application.persistentDataPath; + + //we are setting the lzma.persitentDataPath so the get7zinfo, get7zSize, decode2Buffer functions can work on separate threads! + lzma.persitentDataPath = Application.persistentDataPath; + + #if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; + #endif + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + if (!File.Exists(ppath + "/" + myFile)) StartCoroutine(Download7ZFile()); else downloadDone = true; + + benchmarkStarted = false; + + style = new GUIStyle (); + style.richText = true; + GUI.color = Color.black; + } + + + + void Update(){ + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI(){ + + if (downloadDone){ + + if(!benchmarkStarted) { + if (GUI.Button(new Rect(10, 10, 170, 50), "start Benchmark (48 mb)")){ + benchmarkStarted = true; + log = ""; + lzres = 0; zipres = 0; flzres = 0; lz4res = 0; + + + StartCoroutine(decompressFunc()); + } + } + + } + + GUI.TextArea(new Rect(10, 70, Screen.width - 20, Screen.height - 190), log,style); + } + + + + //call from separate thread. here you can get the progress of the extracted files through a referenced integer. + IEnumerator decompressFunc(){ + System.IO.FileInfo fio; + + fio = new FileInfo(ppath + "/testimg2.7z"); + //decompress 7zip + log += "decompressing 7zip ... (" + ((float)fio.Length/1024).ToString("F")+ " kb)"; + t1 = Time.realtimeSinceStartup; + lzres = lzma.doDecompress7zip(ppath + "/"+myFile , ppath + "/", true,true); + log += " (" + lzma.getBytesWritten().ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ lzres + " | 7z time: " + ""+ tim + " sec\n\n"; + log += "compressing lzma ... "; + yield return true; + + //compress lzma alone + t1 = Time.realtimeSinceStartup; + lzma.setProps(9, 1 << 16); + if(File.Exists(ppath +"/"+ uncFile+".lzma")) File.Delete(ppath +"/"+ uncFile+".lzma"); + lzres = lzma.LzmaUtilEncode( ppath +"/"+ uncFile, ppath +"/"+ uncFile+".lzma"); + log += "(" + lzma.getBytesRead().ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + uncFile + ".lzma"); + log += "status: "+ lzres +" | lzma time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "decompressing lzma alone ... "; + yield return true; + + //decompress lzma alone + t1 = Time.realtimeSinceStartup; + lzres = lzma.LzmaUtilDecode(ppath + "/" + uncFile + ".lzma", ppath + "/" + uncFile ); + log += "(" + lzma.getBytesWritten().ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: " + lzres + " | lzma time: " + "" + tim + " sec\n\n"; + log += "compressing zip ... "; + yield return true; + + + //compress zip + t1 = Time.realtimeSinceStartup; + if(File.Exists(ppath + "/"+myFile2)) File.Delete(ppath + "/"+myFile2); + progress1[0] = 0; + zipres = lzip.compress_File(9, ppath + "/"+myFile2, ppath + "/"+uncFile, false, null, null, null, false, 0, progress1); + log += "(" + progress1[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + myFile2); + log += "status: "+ zipres + " | zip time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "decompressing zip ... "; + yield return true; + + //decompress zip + t1 = Time.realtimeSinceStartup; + zipres = lzip.decompress_File(ppath + "/"+myFile2, ppath+"/", progress, null, progress1); + log += "(" + progress1[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ zipres + " | zip time: " + "" + tim + " sec\n\n"; + #if (!UNITY_EDITOR_OSX && !UNITY_STANDALONE_OSX && !UNITY_IOS && !UNITY_TVOS) || (UNITY_EDITOR && !UNITY_EDITOR_OSX) + log += "Compressing to zip-bz2 ... "; + yield return true; + + //compress zip-bz2 + t1 = Time.realtimeSinceStartup; + if(File.Exists(ppath + "/"+myFile2+"bz2.zip")) File.Delete(ppath + "/"+myFile2+"bz2.zip"); + progress1[0] = 0; + zipres = lzip.compress_File(9, ppath + "/"+myFile2+"bz2.zip", ppath + "/"+uncFile, false, null, null, null, true, 0, progress1); + log += "(" + progress1[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + myFile2+"bz2.zip"); + log += "status: "+ zipres + " | zip-bz2 time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "decompressing zip-bz2 ... "; + yield return true; + + //decompress zip-bz2 + t1 = Time.realtimeSinceStartup; + zipres = lzip.decompress_File(ppath + "/"+myFile2+"bz2.zip", ppath+"/", progress, null, progress1); + log += "(" + progress1[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ zipres + " | zip-bz2 time: " + "" + tim + " sec\n\n"; + #endif + log += "Compressing to flz ... "; + yield return true; + + //compress flz + t1 = Time.realtimeSinceStartup; + flzres = fLZ.compressFile(ppath+ "/" + uncFile, ppath + "/" + uncFile + ".flz", 2, true, progress2); + log += "(" + progress2[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + uncFile + ".flz"); + log += "status: "+ flzres + " | flz time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "Decompressing flz ... "; + yield return true; + + //decompress flz + t1 = Time.realtimeSinceStartup; + flzres = fLZ.decompressFile(ppath + "/" + uncFile + ".flz", ppath + "/" + uncFile , true, progress2); + log += "(" + progress2[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ flzres + " | flz time: " + "" + tim + " sec\n\n"; + log += "Compressing to LZ4 ... "; + yield return true; + + //compress lz4 + t1 = Time.realtimeSinceStartup; + lz4res = (int) LZ4.compress(ppath+ "/" + uncFile, ppath + "/" + uncFile + ".lz4", 9, progress3); + log += "(" + progress3[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + uncFile + ".lz4"); + log += "status: "+ lz4res + " | LZ4 time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "Decompressing LZ4 ... "; + yield return true; + + //decompress lz4 + t1 = Time.realtimeSinceStartup; + lz4res = LZ4.decompress(ppath + "/" + uncFile + ".lz4", ppath + "/" + uncFile , bytes); + log += "(" + bytes[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ lz4res + " | LZ4 time: " + "" + tim + " sec \n\n"; + log += "Compressing to brotli ... "; + yield return true; + + //compress brotli + t1 = Time.realtimeSinceStartup; + brres = (int) brotli.compressFile(ppath+ "/" + uncFile, ppath + "/" + uncFile + ".br", progress4); + log += "(" + progress4[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + uncFile + ".br"); + log += "status: "+ brres + " | brotli time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "Decompressing brotli ... "; + yield return true; + + //decompress brotli + t1 = Time.realtimeSinceStartup; + progress4[0] = 0; + brres = brotli.decompressFile(ppath + "/" + uncFile + ".br", ppath + "/" + uncFile , progress4); + log += "(" + progress4[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ brres + " | brotli time: " + "" + tim + " sec \n\n"; + log += "Compressing gzip ... "; + yield return true; + + //compress gzip + t1 = Time.realtimeSinceStartup; + gzres = lzip.gzipFile(ppath+ "/" + uncFile, ppath + "/" + uncFile + ".gz", 10, gzProgress); + log += "(" + gzProgress[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + fio = new FileInfo(ppath + "/" + uncFile + ".gz"); + log += "status: "+ gzres + " | gzip time: " + "" + tim + " sec (" + ((float)fio.Length / 1024).ToString("F") + " kb)\n\n"; + log += "Decompressing gzip ... "; + yield return true; + + //decompress gzip + t1 = Time.realtimeSinceStartup; + gzProgress[0] = 0; + gzres = lzip.ungzipFile(ppath + "/" + uncFile + ".gz", ppath + "/" + uncFile , gzProgress); + log += "(" + gzProgress[0].ToString() + ")\n"; + tim = Time.realtimeSinceStartup - t1; + log += "status: "+ brres + " | gzip time: " + "" + tim + " sec \n\n"; + yield return true; + + //test setting file permissions + #if !UNITY_EDITOR && !UNITY_STANDALONE_WINDOWS + Debug.Log(lzma.setFilePermissions(ppath+ "/" + uncFile, "rw","r","r")); + Debug.Log(lzip.setFilePermissions(ppath+ "/" + uncFile, "rw","r","r")); + Debug.Log(fLZ.setFilePermissions(ppath+ "/" + uncFile, "rw","r","r")); + Debug.Log(LZ4.setFilePermissions(ppath+ "/" + uncFile, "rw","r","r")); + Debug.Log(brotli.setFilePermissions(ppath+ "/" + uncFile, "rw","r","r")); + #endif + benchmarkStarted = false; + } + + + + IEnumerator Download7ZFile() { + + //make sure a previous 7z file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) File.Delete(ppath + "/" + myFile); + + Debug.Log("downloading 7zip file"); + log += "downloading 7zip file ...\n"; + + //replace the link to the brotli file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(uri + myFile)) { + #if UNITY_5 || UNITY_5 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) + { + Debug.Log(www.error); + } else { + downloadDone = true; + log = ""; + //write the downloaded brotli file to the ppath directory so we can have access to it + //depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + } + + +#else + void OnGUI(){ + GUI.Label(new Rect(10, 10, 500, 40), "Does not work on WebGL or tvOS."); + } +#endif +} + diff --git a/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs.meta b/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs.meta new file mode 100644 index 00000000..b2f37b50 --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/Scripts/benchmark.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: ae56d2d56bbb5bc47a694737d239842c +timeCreated: 1450947697 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/benchmark/benchmark.unity b/Assets/ADL-Plugins/benchmark/benchmark.unity new file mode 100644 index 00000000..d0920840 --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/benchmark.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.212, g: 0.227, b: 0.259, a: 1} + m_AmbientEquatorColor: {r: 0.114, g: 0.125, b: 0.133, a: 1} + m_AmbientGroundColor: {r: 0.047, g: 0.043, b: 0.035, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &3 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 0 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 2 + m_BakeResolution: 40 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 1 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 6ce85c26f45790946afcd24a6c3bb3f1, type: 2} +--- !u!196 &4 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666667 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &571154020 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 571154025} + - component: {fileID: 571154024} + - component: {fileID: 571154022} + - component: {fileID: 571154021} + - component: {fileID: 571154026} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &571154021 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 571154020} + m_Enabled: 1 +--- !u!124 &571154022 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 571154020} + m_Enabled: 1 +--- !u!20 &571154024 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 571154020} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.11764706, g: 0.1254902, b: 0.11372549, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &571154025 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 571154020} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &571154026 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 571154020} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ae56d2d56bbb5bc47a694737d239842c, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/benchmark/benchmark.unity.meta b/Assets/ADL-Plugins/benchmark/benchmark.unity.meta new file mode 100644 index 00000000..5465b42e --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/benchmark.unity.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 1e78599673e27384a8b32d1bd3e6634b +timeCreated: 1450947802 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting b/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting new file mode 100644 index 00000000..3e0abae9 --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: benchmarkSettings + serializedVersion: 4 + m_GIWorkflowMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 40 + m_Padding: 2 + m_LightmapCompression: 3 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 2 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting.meta b/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting.meta new file mode 100644 index 00000000..c1ea568e --- /dev/null +++ b/Assets/ADL-Plugins/benchmark/benchmarkSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6ce85c26f45790946afcd24a6c3bb3f1 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli.meta b/Assets/ADL-Plugins/brotli.meta new file mode 100644 index 00000000..9e6f251e --- /dev/null +++ b/Assets/ADL-Plugins/brotli.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 7055b48e14f0c634697e6fba1bbc1d6d +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf b/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf new file mode 100644 index 00000000..143d7166 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf differ diff --git a/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf.meta b/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf.meta new file mode 100644 index 00000000..d095a6a2 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Instructions_Brotli.pdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: bde4b59177ab33f44a1ea23cc97e7b96 +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins.meta b/Assets/ADL-Plugins/brotli/Plugins.meta new file mode 100644 index 00000000..d3414c63 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: d21a871149125a841962e53f04d1f9ed +folderAsset: yes +timeCreated: 1553410188 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android.meta b/Assets/ADL-Plugins/brotli/Plugins/Android.meta new file mode 100644 index 00000000..6c11ef2b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: e5865cd5c25fd9a438fcf118544a66de +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs.meta new file mode 100644 index 00000000..9a0da814 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3aa6b407dbf0b8f44a6782de03d78fba +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a.meta new file mode 100644 index 00000000..257de5d0 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 342042b12e110af418b31c6cd1edc7ab +folderAsset: yes +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so new file mode 100644 index 00000000..21dc8dec Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so.meta new file mode 100644 index 00000000..7b70a8a2 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/arm64-v8a/libbrotli.so.meta @@ -0,0 +1,97 @@ +fileFormatVersion: 2 +guid: 417316800a41a6a4ba8de0cfc9806144 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARM64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a.meta new file mode 100644 index 00000000..60a9c39b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 2e713c432b643fd4ba5a7985ab34b026 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so new file mode 100644 index 00000000..badc0d37 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so.meta new file mode 100644 index 00000000..4cb3c27a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/armeabi-v7a/libbrotli.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: b7ecd020c1a62df49b8e87a47f72dfd8 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86.meta new file mode 100644 index 00000000..5c01fd47 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3e6b39bfaca2c4b44accd7fa6944b9f3 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so new file mode 100644 index 00000000..8a6c63f1 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so.meta new file mode 100644 index 00000000..2c92facf --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86/libbrotli.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: 8645287accb06b5498b9b8426e7bd161 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: x86 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64.meta new file mode 100644 index 00000000..33f0c2e4 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 334d4a7d4acc4a743a3f75164d592366 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so new file mode 100644 index 00000000..967331bf Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so.meta b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so.meta new file mode 100644 index 00000000..02b34c6c --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/Android/libs/x86_64/libbrotli.so.meta @@ -0,0 +1,71 @@ +fileFormatVersion: 2 +guid: 4cd0cee407dd3b24abf62af92a726ee9 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86_64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL.meta new file mode 100644 index 00000000..1a782b8d --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7d2379635aa82be43985b48ce2e368d7 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a b/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a new file mode 100644 index 00000000..e525c7f4 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a.meta new file mode 100644 index 00000000..fa408a4a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/brotli-dec.a.meta @@ -0,0 +1,76 @@ +fileFormatVersion: 2 +guid: 1e858483c24b07641b82af926cab916f +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h b/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h new file mode 100644 index 00000000..f26f6112 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h @@ -0,0 +1,349 @@ +/* Copyright 2013 Google Inc. All Rights Reserved. + + Distributed under MIT license. + See file LICENSE for detail or copy at https://opensource.org/licenses/MIT +*/ + +/** + * @file + * API for Brotli decompression. + */ + +#ifndef BROTLI_DEC_DECODE_H_ +#define BROTLI_DEC_DECODE_H_ + +#include "port.h" +#include "types.h" + +#if defined(__cplusplus) || defined(c_plusplus) +extern "C" { +#endif + +/** + * Opaque structure that holds decoder state. + * + * Allocated and initialized with ::BrotliDecoderCreateInstance. + * Cleaned up and deallocated with ::BrotliDecoderDestroyInstance. + */ +typedef struct BrotliDecoderStateStruct BrotliDecoderState; + +/** + * Result type for ::BrotliDecoderDecompress and + * ::BrotliDecoderDecompressStream functions. + */ +typedef enum { + /** Decoding error, e.g. corrupted input or memory allocation problem. */ + BROTLI_DECODER_RESULT_ERROR = 0, + /** Decoding successfully completed. */ + BROTLI_DECODER_RESULT_SUCCESS = 1, + /** Partially done; should be called again with more input. */ + BROTLI_DECODER_RESULT_NEEDS_MORE_INPUT = 2, + /** Partially done; should be called again with more output. */ + BROTLI_DECODER_RESULT_NEEDS_MORE_OUTPUT = 3 +} BrotliDecoderResult; + +/** + * Template that evaluates items of ::BrotliDecoderErrorCode. + * + * Example: @code {.cpp} + * // Log Brotli error code. + * switch (brotliDecoderErrorCode) { + * #define CASE_(PREFIX, NAME, CODE) \ + * case BROTLI_DECODER ## PREFIX ## NAME: \ + * LOG(INFO) << "error code:" << #NAME; \ + * break; + * #define NEWLINE_ + * BROTLI_DECODER_ERROR_CODES_LIST(CASE_, NEWLINE_) + * #undef CASE_ + * #undef NEWLINE_ + * default: LOG(FATAL) << "unknown brotli error code"; + * } + * @endcode + */ +#define BROTLI_DECODER_ERROR_CODES_LIST(BROTLI_ERROR_CODE, SEPARATOR) \ + BROTLI_ERROR_CODE(_, NO_ERROR, 0) SEPARATOR \ + /* Same as BrotliDecoderResult values */ \ + BROTLI_ERROR_CODE(_, SUCCESS, 1) SEPARATOR \ + BROTLI_ERROR_CODE(_, NEEDS_MORE_INPUT, 2) SEPARATOR \ + BROTLI_ERROR_CODE(_, NEEDS_MORE_OUTPUT, 3) SEPARATOR \ + \ + /* Errors caused by invalid input */ \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, EXUBERANT_NIBBLE, -1) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, RESERVED, -2) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, EXUBERANT_META_NIBBLE, -3) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, SIMPLE_HUFFMAN_ALPHABET, -4) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, SIMPLE_HUFFMAN_SAME, -5) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, CL_SPACE, -6) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, HUFFMAN_SPACE, -7) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, CONTEXT_MAP_REPEAT, -8) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, BLOCK_LENGTH_1, -9) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, BLOCK_LENGTH_2, -10) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, TRANSFORM, -11) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, DICTIONARY, -12) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, WINDOW_BITS, -13) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, PADDING_1, -14) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, PADDING_2, -15) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_FORMAT_, DISTANCE, -16) SEPARATOR \ + \ + /* -17..-18 codes are reserved */ \ + \ + BROTLI_ERROR_CODE(_ERROR_, DICTIONARY_NOT_SET, -19) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_, INVALID_ARGUMENTS, -20) SEPARATOR \ + \ + /* Memory allocation problems */ \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, CONTEXT_MODES, -21) SEPARATOR \ + /* Literal, insert and distance trees together */ \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, TREE_GROUPS, -22) SEPARATOR \ + /* -23..-24 codes are reserved for distinct tree groups */ \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, CONTEXT_MAP, -25) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, RING_BUFFER_1, -26) SEPARATOR \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, RING_BUFFER_2, -27) SEPARATOR \ + /* -28..-29 codes are reserved for dynamic ring-buffer allocation */ \ + BROTLI_ERROR_CODE(_ERROR_ALLOC_, BLOCK_TYPE_TREES, -30) SEPARATOR \ + \ + /* "Impossible" states */ \ + BROTLI_ERROR_CODE(_ERROR_, UNREACHABLE, -31) + +/** + * Error code for detailed logging / production debugging. + * + * See ::BrotliDecoderGetErrorCode and ::BROTLI_LAST_ERROR_CODE. + */ +typedef enum { +#define BROTLI_COMMA_ , +#define BROTLI_ERROR_CODE_ENUM_ITEM_(PREFIX, NAME, CODE) \ + BROTLI_DECODER ## PREFIX ## NAME = CODE + BROTLI_DECODER_ERROR_CODES_LIST(BROTLI_ERROR_CODE_ENUM_ITEM_, BROTLI_COMMA_) +} BrotliDecoderErrorCode; +#undef BROTLI_ERROR_CODE_ENUM_ITEM_ +#undef BROTLI_COMMA_ + +/** + * The value of the last error code, negative integer. + * + * All other error code values are in the range from ::BROTLI_LAST_ERROR_CODE + * to @c -1. There are also 4 other possible non-error codes @c 0 .. @c 3 in + * ::BrotliDecoderErrorCode enumeration. + */ +#define BROTLI_LAST_ERROR_CODE BROTLI_DECODER_ERROR_UNREACHABLE + +/** Options to be used with ::BrotliDecoderSetParameter. */ +typedef enum BrotliDecoderParameter { + /** + * Disable "canny" ring buffer allocation strategy. + * + * Ring buffer is allocated according to window size, despite the real size of + * the content. + */ + BROTLI_DECODER_PARAM_DISABLE_RING_BUFFER_REALLOCATION = 0, + /** + * Flag that determines if "Large Window Brotli" is used. + */ + BROTLI_DECODER_PARAM_LARGE_WINDOW = 1 +} BrotliDecoderParameter; + +/** + * Sets the specified parameter to the given decoder instance. + * + * @param state decoder instance + * @param param parameter to set + * @param value new parameter value + * @returns ::BROTLI_FALSE if parameter is unrecognized, or value is invalid + * @returns ::BROTLI_TRUE if value is accepted + */ +BROTLI_DEC_API BROTLI_BOOL BrotliDecoderSetParameter( + BrotliDecoderState* state, BrotliDecoderParameter param, uint32_t value); + +/** + * Creates an instance of ::BrotliDecoderState and initializes it. + * + * The instance can be used once for decoding and should then be destroyed with + * ::BrotliDecoderDestroyInstance, it cannot be reused for a new decoding + * session. + * + * @p alloc_func and @p free_func @b MUST be both zero or both non-zero. In the + * case they are both zero, default memory allocators are used. @p opaque is + * passed to @p alloc_func and @p free_func when they are called. @p free_func + * has to return without doing anything when asked to free a NULL pointer. + * + * @param alloc_func custom memory allocation function + * @param free_func custom memory free function + * @param opaque custom memory manager handle + * @returns @c 0 if instance can not be allocated or initialized + * @returns pointer to initialized ::BrotliDecoderState otherwise + */ +BROTLI_DEC_API BrotliDecoderState* BrotliDecoderCreateInstance( + brotli_alloc_func alloc_func, brotli_free_func free_func, void* opaque); + +/** + * Deinitializes and frees ::BrotliDecoderState instance. + * + * @param state decoder instance to be cleaned up and deallocated + */ +BROTLI_DEC_API void BrotliDecoderDestroyInstance(BrotliDecoderState* state); + +/** + * Performs one-shot memory-to-memory decompression. + * + * Decompresses the data in @p encoded_buffer into @p decoded_buffer, and sets + * @p *decoded_size to the decompressed length. + * + * @param encoded_size size of @p encoded_buffer + * @param encoded_buffer compressed data buffer with at least @p encoded_size + * addressable bytes + * @param[in, out] decoded_size @b in: size of @p decoded_buffer; \n + * @b out: length of decompressed data written to + * @p decoded_buffer + * @param decoded_buffer decompressed data destination buffer + * @returns ::BROTLI_DECODER_RESULT_ERROR if input is corrupted, memory + * allocation failed, or @p decoded_buffer is not large enough; + * @returns ::BROTLI_DECODER_RESULT_SUCCESS otherwise + */ +BROTLI_DEC_API BrotliDecoderResult BrotliDecoderDecompress( + size_t encoded_size, + const uint8_t encoded_buffer[BROTLI_ARRAY_PARAM(encoded_size)], + size_t* decoded_size, + uint8_t decoded_buffer[BROTLI_ARRAY_PARAM(*decoded_size)]); + + +BROTLI_DEC_API int BrotliDecompressedSize(size_t encoded_size, + const uint8_t* encoded_buffer, + size_t* decoded_size); + +/** + * Decompresses the input stream to the output stream. + * + * The values @p *available_in and @p *available_out must specify the number of + * bytes addressable at @p *next_in and @p *next_out respectively. + * When @p *available_out is @c 0, @p next_out is allowed to be @c NULL. + * + * After each call, @p *available_in will be decremented by the amount of input + * bytes consumed, and the @p *next_in pointer will be incremented by that + * amount. Similarly, @p *available_out will be decremented by the amount of + * output bytes written, and the @p *next_out pointer will be incremented by + * that amount. + * + * @p total_out, if it is not a null-pointer, will be set to the number + * of bytes decompressed since the last @p state initialization. + * + * @note Input is never overconsumed, so @p next_in and @p available_in could be + * passed to the next consumer after decoding is complete. + * + * @param state decoder instance + * @param[in, out] available_in @b in: amount of available input; \n + * @b out: amount of unused input + * @param[in, out] next_in pointer to the next compressed byte + * @param[in, out] available_out @b in: length of output buffer; \n + * @b out: remaining size of output buffer + * @param[in, out] next_out output buffer cursor; + * can be @c NULL if @p available_out is @c 0 + * @param[out] total_out number of bytes decompressed so far; can be @c NULL + * @returns ::BROTLI_DECODER_RESULT_ERROR if input is corrupted, memory + * allocation failed, arguments were invalid, etc.; + * use ::BrotliDecoderGetErrorCode to get detailed error code + * @returns ::BROTLI_DECODER_RESULT_NEEDS_MORE_INPUT decoding is blocked until + * more input data is provided + * @returns ::BROTLI_DECODER_RESULT_NEEDS_MORE_OUTPUT decoding is blocked until + * more output space is provided + * @returns ::BROTLI_DECODER_RESULT_SUCCESS decoding is finished, no more + * input might be consumed and no more output will be produced + */ +BROTLI_DEC_API BrotliDecoderResult BrotliDecoderDecompressStream( + BrotliDecoderState* state, size_t* available_in, const uint8_t** next_in, + size_t* available_out, uint8_t** next_out, size_t* total_out); + +/** + * Checks if decoder has more output. + * + * @param state decoder instance + * @returns ::BROTLI_TRUE, if decoder has some unconsumed output + * @returns ::BROTLI_FALSE otherwise + */ +BROTLI_DEC_API BROTLI_BOOL BrotliDecoderHasMoreOutput( + const BrotliDecoderState* state); + +/** + * Acquires pointer to internal output buffer. + * + * This method is used to make language bindings easier and more efficient: + * -# push data to ::BrotliDecoderDecompressStream, + * until ::BROTLI_DECODER_RESULT_NEEDS_MORE_OUTPUT is reported + * -# use ::BrotliDecoderTakeOutput to peek bytes and copy to language-specific + * entity + * + * Also this could be useful if there is an output stream that is able to + * consume all the provided data (e.g. when data is saved to file system). + * + * @attention After every call to ::BrotliDecoderTakeOutput @p *size bytes of + * output are considered consumed for all consecutive calls to the + * instance methods; returned pointer becomes invalidated as well. + * + * @note Decoder output is not guaranteed to be contiguous. This means that + * after the size-unrestricted call to ::BrotliDecoderTakeOutput, + * immediate next call to ::BrotliDecoderTakeOutput may return more data. + * + * @param state decoder instance + * @param[in, out] size @b in: number of bytes caller is ready to take, @c 0 if + * any amount could be handled; \n + * @b out: amount of data pointed by returned pointer and + * considered consumed; \n + * out value is never greater than in value, unless it is @c 0 + * @returns pointer to output data + */ +BROTLI_DEC_API const uint8_t* BrotliDecoderTakeOutput( + BrotliDecoderState* state, size_t* size); + +/** + * Checks if instance has already consumed input. + * + * Instance that returns ::BROTLI_FALSE is considered "fresh" and could be + * reused. + * + * @param state decoder instance + * @returns ::BROTLI_TRUE if decoder has already used some input bytes + * @returns ::BROTLI_FALSE otherwise + */ +BROTLI_DEC_API BROTLI_BOOL BrotliDecoderIsUsed(const BrotliDecoderState* state); + +/** + * Checks if decoder instance reached the final state. + * + * @param state decoder instance + * @returns ::BROTLI_TRUE if decoder is in a state where it reached the end of + * the input and produced all of the output + * @returns ::BROTLI_FALSE otherwise + */ +BROTLI_DEC_API BROTLI_BOOL BrotliDecoderIsFinished( + const BrotliDecoderState* state); + +/** + * Acquires a detailed error code. + * + * Should be used only after ::BrotliDecoderDecompressStream returns + * ::BROTLI_DECODER_RESULT_ERROR. + * + * See also ::BrotliDecoderErrorString + * + * @param state decoder instance + * @returns last saved error code + */ +BROTLI_DEC_API BrotliDecoderErrorCode BrotliDecoderGetErrorCode( + const BrotliDecoderState* state); + +/** + * Converts error code to a c-string. + */ +BROTLI_DEC_API const char* BrotliDecoderErrorString(BrotliDecoderErrorCode c); + +/** + * Gets a decoder library version. + * + * Look at BROTLI_VERSION for more information. + */ +BROTLI_DEC_API uint32_t BrotliDecoderVersion(void); + +#if defined(__cplusplus) || defined(c_plusplus) +} /* extern "C" */ +#endif + +#endif /* BROTLI_DEC_DECODE_H_ */ diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h.meta new file mode 100644 index 00000000..ea83b30c --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/decode.h.meta @@ -0,0 +1,69 @@ +fileFormatVersion: 2 +guid: b403095eed1e7574aacfbab7d8acf31b +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude Lumin: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c new file mode 100644 index 00000000..8b51327b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c @@ -0,0 +1,5909 @@ +/* Copyright 2013 Google Inc. All Rights Reserved. + + Distributed under MIT license. + See file LICENSE for detail or copy at https://opensource.org/licenses/MIT +*/ + +#include "./dictionary.h" + +#if defined(__cplusplus) || defined(c_plusplus) +extern "C" { +#endif + +void brReleaseBuffer(uint8_t* src){ + free(src); +} + +#ifndef BROTLI_EXTERNAL_DICTIONARY_DATA +static const uint8_t kBrotliDictionaryData[] = +{ +116,105,109,101,100,111,119,110,108,105,102,101,108,101,102,116,98,97,99,107,99, +111,100,101,100,97,116,97,115,104,111,119,111,110,108,121,115,105,116,101,99,105 +,116,121,111,112,101,110,106,117,115,116,108,105,107,101,102,114,101,101,119,111 +,114,107,116,101,120,116,121,101,97,114,111,118,101,114,98,111,100,121,108,111, +118,101,102,111,114,109,98,111,111,107,112,108,97,121,108,105,118,101,108,105, +110,101,104,101,108,112,104,111,109,101,115,105,100,101,109,111,114,101,119,111, +114,100,108,111,110,103,116,104,101,109,118,105,101,119,102,105,110,100,112,97, +103,101,100,97,121,115,102,117,108,108,104,101,97,100,116,101,114,109,101,97,99, +104,97,114,101,97,102,114,111,109,116,114,117,101,109,97,114,107,97,98,108,101, +117,112,111,110,104,105,103,104,100,97,116,101,108,97,110,100,110,101,119,115, +101,118,101,110,110,101,120,116,99,97,115,101,98,111,116,104,112,111,115,116,117 +,115,101,100,109,97,100,101,104,97,110,100,104,101,114,101,119,104,97,116,110,97 +,109,101,76,105,110,107,98,108,111,103,115,105,122,101,98,97,115,101,104,101,108 +,100,109,97,107,101,109,97,105,110,117,115,101,114,39,41,32,43,104,111,108,100, +101,110,100,115,119,105,116,104,78,101,119,115,114,101,97,100,119,101,114,101, +115,105,103,110,116,97,107,101,104,97,118,101,103,97,109,101,115,101,101,110,99, +97,108,108,112,97,116,104,119,101,108,108,112,108,117,115,109,101,110,117,102, +105,108,109,112,97,114,116,106,111,105,110,116,104,105,115,108,105,115,116,103, +111,111,100,110,101,101,100,119,97,121,115,119,101,115,116,106,111,98,115,109, +105,110,100,97,108,115,111,108,111,103,111,114,105,99,104,117,115,101,115,108,97 +,115,116,116,101,97,109,97,114,109,121,102,111,111,100,107,105,110,103,119,105, +108,108,101,97,115,116,119,97,114,100,98,101,115,116,102,105,114,101,80,97,103, +101,107,110,111,119,97,119,97,121,46,112,110,103,109,111,118,101,116,104,97,110, +108,111,97,100,103,105,118,101,115,101,108,102,110,111,116,101,109,117,99,104, +102,101,101,100,109,97,110,121,114,111,99,107,105,99,111,110,111,110,99,101,108, +111,111,107,104,105,100,101,100,105,101,100,72,111,109,101,114,117,108,101,104, +111,115,116,97,106,97,120,105,110,102,111,99,108,117,98,108,97,119,115,108,101, +115,115,104,97,108,102,115,111,109,101,115,117,99,104,122,111,110,101,49,48,48, +37,111,110,101,115,99,97,114,101,84,105,109,101,114,97,99,101,98,108,117,101,102 +,111,117,114,119,101,101,107,102,97,99,101,104,111,112,101,103,97,118,101,104,97 +,114,100,108,111,115,116,119,104,101,110,112,97,114,107,107,101,112,116,112,97, +115,115,115,104,105,112,114,111,111,109,72,84,77,76,112,108,97,110,84,121,112, +101,100,111,110,101,115,97,118,101,107,101,101,112,102,108,97,103,108,105,110, +107,115,111,108,100,102,105,118,101,116,111,111,107,114,97,116,101,116,111,119, +110,106,117,109,112,116,104,117,115,100,97,114,107,99,97,114,100,102,105,108,101 +,102,101,97,114,115,116,97,121,107,105,108,108,116,104,97,116,102,97,108,108,97, +117,116,111,101,118,101,114,46,99,111,109,116,97,108,107,115,104,111,112,118,111 +,116,101,100,101,101,112,109,111,100,101,114,101,115,116,116,117,114,110,98,111, +114,110,98,97,110,100,102,101,108,108,114,111,115,101,117,114,108,40,115,107,105 +,110,114,111,108,101,99,111,109,101,97,99,116,115,97,103,101,115,109,101,101,116 +,103,111,108,100,46,106,112,103,105,116,101,109,118,97,114,121,102,101,108,116, +116,104,101,110,115,101,110,100,100,114,111,112,86,105,101,119,99,111,112,121,49 +,46,48,34,60,47,97,62,115,116,111,112,101,108,115,101,108,105,101,115,116,111, +117,114,112,97,99,107,46,103,105,102,112,97,115,116,99,115,115,63,103,114,97,121 +,109,101,97,110,38,103,116,59,114,105,100,101,115,104,111,116,108,97,116,101,115 +,97,105,100,114,111,97,100,118,97,114,32,102,101,101,108,106,111,104,110,114,105 +,99,107,112,111,114,116,102,97,115,116,39,85,65,45,100,101,97,100,60,47,98,62, +112,111,111,114,98,105,108,108,116,121,112,101,85,46,83,46,119,111,111,100,109, +117,115,116,50,112,120,59,73,110,102,111,114,97,110,107,119,105,100,101,119,97, +110,116,119,97,108,108,108,101,97,100,91,48,93,59,112,97,117,108,119,97,118,101, +115,117,114,101,36,40,39,35,119,97,105,116,109,97,115,115,97,114,109,115,103,111 +,101,115,103,97,105,110,108,97,110,103,112,97,105,100,33,45,45,32,108,111,99,107 +,117,110,105,116,114,111,111,116,119,97,108,107,102,105,114,109,119,105,102,101, +120,109,108,34,115,111,110,103,116,101,115,116,50,48,112,120,107,105,110,100,114 +,111,119,115,116,111,111,108,102,111,110,116,109,97,105,108,115,97,102,101,115, +116,97,114,109,97,112,115,99,111,114,101,114,97,105,110,102,108,111,119,98,97,98 +,121,115,112,97,110,115,97,121,115,52,112,120,59,54,112,120,59,97,114,116,115, +102,111,111,116,114,101,97,108,119,105,107,105,104,101,97,116,115,116,101,112, +116,114,105,112,111,114,103,47,108,97,107,101,119,101,97,107,116,111,108,100,70, +111,114,109,99,97,115,116,102,97,110,115,98,97,110,107,118,101,114,121,114,117, +110,115,106,117,108,121,116,97,115,107,49,112,120,59,103,111,97,108,103,114,101, +119,115,108,111,119,101,100,103,101,105,100,61,34,115,101,116,115,53,112,120,59, +46,106,115,63,52,48,112,120,105,102,32,40,115,111,111,110,115,101,97,116,110,111 +,110,101,116,117,98,101,122,101,114,111,115,101,110,116,114,101,101,100,102,97, +99,116,105,110,116,111,103,105,102,116,104,97,114,109,49,56,112,120,99,97,109, +101,104,105,108,108,98,111,108,100,122,111,111,109,118,111,105,100,101,97,115, +121,114,105,110,103,102,105,108,108,112,101,97,107,105,110,105,116,99,111,115, +116,51,112,120,59,106,97,99,107,116,97,103,115,98,105,116,115,114,111,108,108, +101,100,105,116,107,110,101,119,110,101,97,114,60,33,45,45,103,114,111,119,74,83 +,79,78,100,117,116,121,78,97,109,101,115,97,108,101,121,111,117,32,108,111,116, +115,112,97,105,110,106,97,122,122,99,111,108,100,101,121,101,115,102,105,115,104 +,119,119,119,46,114,105,115,107,116,97,98,115,112,114,101,118,49,48,112,120,114, +105,115,101,50,53,112,120,66,108,117,101,100,105,110,103,51,48,48,44,98,97,108, +108,102,111,114,100,101,97,114,110,119,105,108,100,98,111,120,46,102,97,105,114, +108,97,99,107,118,101,114,115,112,97,105,114,106,117,110,101,116,101,99,104,105, +102,40,33,112,105,99,107,101,118,105,108,36,40,34,35,119,97,114,109,108,111,114, +100,100,111,101,115,112,117,108,108,44,48,48,48,105,100,101,97,100,114,97,119, +104,117,103,101,115,112,111,116,102,117,110,100,98,117,114,110,104,114,101,102, +99,101,108,108,107,101,121,115,116,105,99,107,104,111,117,114,108,111,115,115, +102,117,101,108,49,50,112,120,115,117,105,116,100,101,97,108,82,83,83,34,97,103, +101,100,103,114,101,121,71,69,84,34,101,97,115,101,97,105,109,115,103,105,114, +108,97,105,100,115,56,112,120,59,110,97,118,121,103,114,105,100,116,105,112,115, +35,57,57,57,119,97,114,115,108,97,100,121,99,97,114,115,41,59,32,125,112,104,112 +,63,104,101,108,108,116,97,108,108,119,104,111,109,122,104,58,229,42,47,13,10,32 +,49,48,48,104,97,108,108,46,10,10,65,55,112,120,59,112,117,115,104,99,104,97,116 +,48,112,120,59,99,114,101,119,42,47,60,47,104,97,115,104,55,53,112,120,102,108, +97,116,114,97,114,101,32,38,38,32,116,101,108,108,99,97,109,112,111,110,116,111, +108,97,105,100,109,105,115,115,115,107,105,112,116,101,110,116,102,105,110,101, +109,97,108,101,103,101,116,115,112,108,111,116,52,48,48,44,13,10,13,10,99,111, +111,108,102,101,101,116,46,112,104,112,60,98,114,62,101,114,105,99,109,111,115, +116,103,117,105,100,98,101,108,108,100,101,115,99,104,97,105,114,109,97,116,104, +97,116,111,109,47,105,109,103,38,35,56,50,108,117,99,107,99,101,110,116,48,48,48 +,59,116,105,110,121,103,111,110,101,104,116,109,108,115,101,108,108,100,114,117, +103,70,82,69,69,110,111,100,101,110,105,99,107,63,105,100,61,108,111,115,101,110 +,117,108,108,118,97,115,116,119,105,110,100,82,83,83,32,119,101,97,114,114,101, +108,121,98,101,101,110,115,97,109,101,100,117,107,101,110,97,115,97,99,97,112, +101,119,105,115,104,103,117,108,102,84,50,51,58,104,105,116,115,115,108,111,116, +103,97,116,101,107,105,99,107,98,108,117,114,116,104,101,121,49,53,112,120,39,39 +,41,59,41,59,34,62,109,115,105,101,119,105,110,115,98,105,114,100,115,111,114, +116,98,101,116,97,115,101,101,107,84,49,56,58,111,114,100,115,116,114,101,101, +109,97,108,108,54,48,112,120,102,97,114,109,226,128,153,115,98,111,121,115,91,48 +,93,46,39,41,59,34,80,79,83,84,98,101,97,114,107,105,100,115,41,59,125,125,109, +97,114,121,116,101,110,100,40,85,75,41,113,117,97,100,122,104,58,230,45,115,105, +122,45,45,45,45,112,114,111,112,39,41,59,13,108,105,102,116,84,49,57,58,118,105, +99,101,97,110,100,121,100,101,98,116,62,82,83,83,112,111,111,108,110,101,99,107, +98,108,111,119,84,49,54,58,100,111,111,114,101,118,97,108,84,49,55,58,108,101, +116,115,102,97,105,108,111,114,97,108,112,111,108,108,110,111,118,97,99,111,108, +115,103,101,110,101,32,226,128,148,115,111,102,116,114,111,109,101,116,105,108, +108,114,111,115,115,60,104,51,62,112,111,117,114,102,97,100,101,112,105,110,107, +60,116,114,62,109,105,110,105,41,124,33,40,109,105,110,101,122,104,58,232,98,97, +114,115,104,101,97,114,48,48,41,59,109,105,108,107,32,45,45,62,105,114,111,110, +102,114,101,100,100,105,115,107,119,101,110,116,115,111,105,108,112,117,116,115, +47,106,115,47,104,111,108,121,84,50,50,58,73,83,66,78,84,50,48,58,97,100,97,109, +115,101,101,115,60,104,50,62,106,115,111,110,39,44,32,39,99,111,110,116,84,50,49 +,58,32,82,83,83,108,111,111,112,97,115,105,97,109,111,111,110,60,47,112,62,115, +111,117,108,76,73,78,69,102,111,114,116,99,97,114,116,84,49,52,58,60,104,49,62, +56,48,112,120,33,45,45,60,57,112,120,59,84,48,52,58,109,105,107,101,58,52,54,90, +110,105,99,101,105,110,99,104,89,111,114,107,114,105,99,101,122,104,58,228,39,41 +,41,59,112,117,114,101,109,97,103,101,112,97,114,97,116,111,110,101,98,111,110, +100,58,51,55,90,95,111,102,95,39,93,41,59,48,48,48,44,122,104,58,231,116,97,110, +107,121,97,114,100,98,111,119,108,98,117,115,104,58,53,54,90,74,97,118,97,51,48, +112,120,10,124,125,10,37,67,51,37,58,51,52,90,106,101,102,102,69,88,80,73,99,97, +115,104,118,105,115,97,103,111,108,102,115,110,111,119,122,104,58,233,113,117, +101,114,46,99,115,115,115,105,99,107,109,101,97,116,109,105,110,46,98,105,110, +100,100,101,108,108,104,105,114,101,112,105,99,115,114,101,110,116,58,51,54,90, +72,84,84,80,45,50,48,49,102,111,116,111,119,111,108,102,69,78,68,32,120,98,111, +120,58,53,52,90,66,79,68,89,100,105,99,107,59,10,125,10,101,120,105,116,58,51,53 +,90,118,97,114,115,98,101,97,116,39,125,41,59,100,105,101,116,57,57,57,59,97,110 +,110,101,125,125,60,47,91,105,93,46,76,97,110,103,107,109,194,178,119,105,114, +101,116,111,121,115,97,100,100,115,115,101,97,108,97,108,101,120,59,10,9,125,101 +,99,104,111,110,105,110,101,46,111,114,103,48,48,53,41,116,111,110,121,106,101, +119,115,115,97,110,100,108,101,103,115,114,111,111,102,48,48,48,41,32,50,48,48, +119,105,110,101,103,101,97,114,100,111,103,115,98,111,111,116,103,97,114,121,99, +117,116,115,116,121,108,101,116,101,109,112,116,105,111,110,46,120,109,108,99, +111,99,107,103,97,110,103,36,40,39,46,53,48,112,120,80,104,46,68,109,105,115,99, +97,108,97,110,108,111,97,110,100,101,115,107,109,105,108,101,114,121,97,110,117, +110,105,120,100,105,115,99,41,59,125,10,100,117,115,116,99,108,105,112,41,46,10, +10,55,48,112,120,45,50,48,48,68,86,68,115,55,93,62,60,116,97,112,101,100,101,109 +,111,105,43,43,41,119,97,103,101,101,117,114,111,112,104,105,108,111,112,116,115 +,104,111,108,101,70,65,81,115,97,115,105,110,45,50,54,84,108,97,98,115,112,101, +116,115,85,82,76,32,98,117,108,107,99,111,111,107,59,125,13,10,72,69,65,68,91,48 +,93,41,97,98,98,114,106,117,97,110,40,49,57,56,108,101,115,104,116,119,105,110, +60,47,105,62,115,111,110,121,103,117,121,115,102,117,99,107,112,105,112,101,124, +45,10,33,48,48,50,41,110,100,111,119,91,49,93,59,91,93,59,10,76,111,103,32,115, +97,108,116,13,10,9,9,98,97,110,103,116,114,105,109,98,97,116,104,41,123,13,10,48 +,48,112,120,10,125,41,59,107,111,58,236,102,101,101,115,97,100,62,13,115,58,47, +47,32,91,93,59,116,111,108,108,112,108,117,103,40,41,123,10,123,13,10,32,46,106, +115,39,50,48,48,112,100,117,97,108,98,111,97,116,46,74,80,71,41,59,10,125,113, +117,111,116,41,59,10,10,39,41,59,10,13,10,125,13,50,48,49,52,50,48,49,53,50,48, +49,54,50,48,49,55,50,48,49,56,50,48,49,57,50,48,50,48,50,48,50,49,50,48,50,50,50 +,48,50,51,50,48,50,52,50,48,50,53,50,48,50,54,50,48,50,55,50,48,50,56,50,48,50, +57,50,48,51,48,50,48,51,49,50,48,51,50,50,48,51,51,50,48,51,52,50,48,51,53,50,48 +,51,54,50,48,51,55,50,48,49,51,50,48,49,50,50,48,49,49,50,48,49,48,50,48,48,57, +50,48,48,56,50,48,48,55,50,48,48,54,50,48,48,53,50,48,48,52,50,48,48,51,50,48,48 +,50,50,48,48,49,50,48,48,48,49,57,57,57,49,57,57,56,49,57,57,55,49,57,57,54,49, +57,57,53,49,57,57,52,49,57,57,51,49,57,57,50,49,57,57,49,49,57,57,48,49,57,56,57 +,49,57,56,56,49,57,56,55,49,57,56,54,49,57,56,53,49,57,56,52,49,57,56,51,49,57, +56,50,49,57,56,49,49,57,56,48,49,57,55,57,49,57,55,56,49,57,55,55,49,57,55,54,49 +,57,55,53,49,57,55,52,49,57,55,51,49,57,55,50,49,57,55,49,49,57,55,48,49,57,54, +57,49,57,54,56,49,57,54,55,49,57,54,54,49,57,54,53,49,57,54,52,49,57,54,51,49,57 +,54,50,49,57,54,49,49,57,54,48,49,57,53,57,49,57,53,56,49,57,53,55,49,57,53,54, +49,57,53,53,49,57,53,52,49,57,53,51,49,57,53,50,49,57,53,49,49,57,53,48,49,48,48 +,48,49,48,50,52,49,51,57,52,48,48,48,48,57,57,57,57,99,111,109,111,109,195,161, +115,101,115,116,101,101,115,116,97,112,101,114,111,116,111,100,111,104,97,99,101 +,99,97,100,97,97,195,177,111,98,105,101,110,100,195,173,97,97,115,195,173,118, +105,100,97,99,97,115,111,111,116,114,111,102,111,114,111,115,111,108,111,111,116 +,114,97,99,117,97,108,100,105,106,111,115,105,100,111,103,114,97,110,116,105,112 +,111,116,101,109,97,100,101,98,101,97,108,103,111,113,117,195,169,101,115,116, +111,110,97,100,97,116,114,101,115,112,111,99,111,99,97,115,97,98,97,106,111,116, +111,100,97,115,105,110,111,97,103,117,97,112,117,101,115,117,110,111,115,97,110, +116,101,100,105,99,101,108,117,105,115,101,108,108,97,109,97,121,111,122,111,110 +,97,97,109,111,114,112,105,115,111,111,98,114,97,99,108,105,99,101,108,108,111, +100,105,111,115,104,111,114,97,99,97,115,105,208,183,208,176,208,189,208,176,208 +,190,208,188,209,128,208,176,209,128,209,131,209,130,208,176,208,189,208,181,208 +,191,208,190,208,190,209,130,208,184,208,183,208,189,208,190,208,180,208,190,209 +,130,208,190,208,182,208,181,208,190,208,189,208,184,209,133,208,157,208,176,208 +,181,208,181,208,177,209,139,208,188,209,139,208,146,209,139,209,129,208,190,208 +,178,209,139,208,178,208,190,208,157,208,190,208,190,208,177,208,159,208,190,208 +,187,208,184,208,189,208,184,208,160,208,164,208,157,208,181,208,156,209,139,209 +,130,209,139,208,158,208,189,208,184,208,188,208,180,208,176,208,151,208,176,208 +,148,208,176,208,157,209,131,208,158,208,177,209,130,208,181,208,152,208,183,208 +,181,208,185,208,189,209,131,208,188,208,188,208,162,209,139,209,131,208,182,217 +,129,217,138,216,163,217,134,217,133,216,167,217,133,216,185,217,131,217,132,216 +,163,217,136,216,177,216,175,217,138,216,167,217,129,217,137,217,135,217,136,217 +,132,217,133,217,132,217,131,216,167,217,136,217,132,217,135,216,168,216,179,216 +,167,217,132,216,165,217,134,217,135,217,138,216,163,217,138,217,130,216,175,217 +,135,217,132,216,171,217,133,216,168,217,135,217,132,217,136,217,132,217,138,216 +,168,217,132,216,167,217,138,216,168,217,131,216,180,217,138,216,167,217,133,216 +,163,217,133,217,134,216,170,216,168,217,138,217,132,217,134,216,173,216,168,217 +,135,217,133,217,133,216,180,217,136,216,180,102,105,114,115,116,118,105,100,101 +,111,108,105,103,104,116,119,111,114,108,100,109,101,100,105,97,119,104,105,116, +101,99,108,111,115,101,98,108,97,99,107,114,105,103,104,116,115,109,97,108,108, +98,111,111,107,115,112,108,97,99,101,109,117,115,105,99,102,105,101,108,100,111, +114,100,101,114,112,111,105,110,116,118,97,108,117,101,108,101,118,101,108,116, +97,98,108,101,98,111,97,114,100,104,111,117,115,101,103,114,111,117,112,119,111, +114,107,115,121,101,97,114,115,115,116,97,116,101,116,111,100,97,121,119,97,116, +101,114,115,116,97,114,116,115,116,121,108,101,100,101,97,116,104,112,111,119, +101,114,112,104,111,110,101,110,105,103,104,116,101,114,114,111,114,105,110,112, +117,116,97,98,111,117,116,116,101,114,109,115,116,105,116,108,101,116,111,111, +108,115,101,118,101,110,116,108,111,99,97,108,116,105,109,101,115,108,97,114,103 +,101,119,111,114,100,115,103,97,109,101,115,115,104,111,114,116,115,112,97,99, +101,102,111,99,117,115,99,108,101,97,114,109,111,100,101,108,98,108,111,99,107, +103,117,105,100,101,114,97,100,105,111,115,104,97,114,101,119,111,109,101,110,97 +,103,97,105,110,109,111,110,101,121,105,109,97,103,101,110,97,109,101,115,121, +111,117,110,103,108,105,110,101,115,108,97,116,101,114,99,111,108,111,114,103, +114,101,101,110,102,114,111,110,116,38,97,109,112,59,119,97,116,99,104,102,111, +114,99,101,112,114,105,99,101,114,117,108,101,115,98,101,103,105,110,97,102,116, +101,114,118,105,115,105,116,105,115,115,117,101,97,114,101,97,115,98,101,108,111 +,119,105,110,100,101,120,116,111,116,97,108,104,111,117,114,115,108,97,98,101, +108,112,114,105,110,116,112,114,101,115,115,98,117,105,108,116,108,105,110,107, +115,115,112,101,101,100,115,116,117,100,121,116,114,97,100,101,102,111,117,110, +100,115,101,110,115,101,117,110,100,101,114,115,104,111,119,110,102,111,114,109, +115,114,97,110,103,101,97,100,100,101,100,115,116,105,108,108,109,111,118,101, +100,116,97,107,101,110,97,98,111,118,101,102,108,97,115,104,102,105,120,101,100, +111,102,116,101,110,111,116,104,101,114,118,105,101,119,115,99,104,101,99,107, +108,101,103,97,108,114,105,118,101,114,105,116,101,109,115,113,117,105,99,107, +115,104,97,112,101,104,117,109,97,110,101,120,105,115,116,103,111,105,110,103, +109,111,118,105,101,116,104,105,114,100,98,97,115,105,99,112,101,97,99,101,115, +116,97,103,101,119,105,100,116,104,108,111,103,105,110,105,100,101,97,115,119, +114,111,116,101,112,97,103,101,115,117,115,101,114,115,100,114,105,118,101,115, +116,111,114,101,98,114,101,97,107,115,111,117,116,104,118,111,105,99,101,115,105 +,116,101,115,109,111,110,116,104,119,104,101,114,101,98,117,105,108,100,119,104, +105,99,104,101,97,114,116,104,102,111,114,117,109,116,104,114,101,101,115,112, +111,114,116,112,97,114,116,121,67,108,105,99,107,108,111,119,101,114,108,105,118 +,101,115,99,108,97,115,115,108,97,121,101,114,101,110,116,114,121,115,116,111, +114,121,117,115,97,103,101,115,111,117,110,100,99,111,117,114,116,121,111,117, +114,32,98,105,114,116,104,112,111,112,117,112,116,121,112,101,115,97,112,112,108 +,121,73,109,97,103,101,98,101,105,110,103,117,112,112,101,114,110,111,116,101, +115,101,118,101,114,121,115,104,111,119,115,109,101,97,110,115,101,120,116,114, +97,109,97,116,99,104,116,114,97,99,107,107,110,111,119,110,101,97,114,108,121,98 +,101,103,97,110,115,117,112,101,114,112,97,112,101,114,110,111,114,116,104,108, +101,97,114,110,103,105,118,101,110,110,97,109,101,100,101,110,100,101,100,84,101 +,114,109,115,112,97,114,116,115,71,114,111,117,112,98,114,97,110,100,117,115,105 +,110,103,119,111,109,97,110,102,97,108,115,101,114,101,97,100,121,97,117,100,105 +,111,116,97,107,101,115,119,104,105,108,101,46,99,111,109,47,108,105,118,101,100 +,99,97,115,101,115,100,97,105,108,121,99,104,105,108,100,103,114,101,97,116,106, +117,100,103,101,116,104,111,115,101,117,110,105,116,115,110,101,118,101,114,98, +114,111,97,100,99,111,97,115,116,99,111,118,101,114,97,112,112,108,101,102,105, +108,101,115,99,121,99,108,101,115,99,101,110,101,112,108,97,110,115,99,108,105, +99,107,119,114,105,116,101,113,117,101,101,110,112,105,101,99,101,101,109,97,105 +,108,102,114,97,109,101,111,108,100,101,114,112,104,111,116,111,108,105,109,105, +116,99,97,99,104,101,99,105,118,105,108,115,99,97,108,101,101,110,116,101,114, +116,104,101,109,101,116,104,101,114,101,116,111,117,99,104,98,111,117,110,100, +114,111,121,97,108,97,115,107,101,100,119,104,111,108,101,115,105,110,99,101,115 +,116,111,99,107,32,110,97,109,101,102,97,105,116,104,104,101,97,114,116,101,109, +112,116,121,111,102,102,101,114,115,99,111,112,101,111,119,110,101,100,109,105, +103,104,116,97,108,98,117,109,116,104,105,110,107,98,108,111,111,100,97,114,114, +97,121,109,97,106,111,114,116,114,117,115,116,99,97,110,111,110,117,110,105,111, +110,99,111,117,110,116,118,97,108,105,100,115,116,111,110,101,83,116,121,108,101 +,76,111,103,105,110,104,97,112,112,121,111,99,99,117,114,108,101,102,116,58,102, +114,101,115,104,113,117,105,116,101,102,105,108,109,115,103,114,97,100,101,110, +101,101,100,115,117,114,98,97,110,102,105,103,104,116,98,97,115,105,115,104,111, +118,101,114,97,117,116,111,59,114,111,117,116,101,46,104,116,109,108,109,105,120 +,101,100,102,105,110,97,108,89,111,117,114,32,115,108,105,100,101,116,111,112, +105,99,98,114,111,119,110,97,108,111,110,101,100,114,97,119,110,115,112,108,105, +116,114,101,97,99,104,82,105,103,104,116,100,97,116,101,115,109,97,114,99,104, +113,117,111,116,101,103,111,111,100,115,76,105,110,107,115,100,111,117,98,116,97 +,115,121,110,99,116,104,117,109,98,97,108,108,111,119,99,104,105,101,102,121,111 +,117,116,104,110,111,118,101,108,49,48,112,120,59,115,101,114,118,101,117,110, +116,105,108,104,97,110,100,115,67,104,101,99,107,83,112,97,99,101,113,117,101, +114,121,106,97,109,101,115,101,113,117,97,108,116,119,105,99,101,48,44,48,48,48, +83,116,97,114,116,112,97,110,101,108,115,111,110,103,115,114,111,117,110,100,101 +,105,103,104,116,115,104,105,102,116,119,111,114,116,104,112,111,115,116,115,108 +,101,97,100,115,119,101,101,107,115,97,118,111,105,100,116,104,101,115,101,109, +105,108,101,115,112,108,97,110,101,115,109,97,114,116,97,108,112,104,97,112,108, +97,110,116,109,97,114,107,115,114,97,116,101,115,112,108,97,121,115,99,108,97, +105,109,115,97,108,101,115,116,101,120,116,115,115,116,97,114,115,119,114,111, +110,103,60,47,104,51,62,116,104,105,110,103,46,111,114,103,47,109,117,108,116, +105,104,101,97,114,100,80,111,119,101,114,115,116,97,110,100,116,111,107,101,110 +,115,111,108,105,100,40,116,104,105,115,98,114,105,110,103,115,104,105,112,115, +115,116,97,102,102,116,114,105,101,100,99,97,108,108,115,102,117,108,108,121,102 +,97,99,116,115,97,103,101,110,116,84,104,105,115,32,47,47,45,45,62,97,100,109, +105,110,101,103,121,112,116,69,118,101,110,116,49,53,112,120,59,69,109,97,105, +108,116,114,117,101,34,99,114,111,115,115,115,112,101,110,116,98,108,111,103,115 +,98,111,120,34,62,110,111,116,101,100,108,101,97,118,101,99,104,105,110,97,115, +105,122,101,115,103,117,101,115,116,60,47,104,52,62,114,111,98,111,116,104,101, +97,118,121,116,114,117,101,44,115,101,118,101,110,103,114,97,110,100,99,114,105, +109,101,115,105,103,110,115,97,119,97,114,101,100,97,110,99,101,112,104,97,115, +101,62,60,33,45,45,101,110,95,85,83,38,35,51,57,59,50,48,48,112,120,95,110,97, +109,101,108,97,116,105,110,101,110,106,111,121,97,106,97,120,46,97,116,105,111, +110,115,109,105,116,104,85,46,83,46,32,104,111,108,100,115,112,101,116,101,114, +105,110,100,105,97,110,97,118,34,62,99,104,97,105,110,115,99,111,114,101,99,111, +109,101,115,100,111,105,110,103,112,114,105,111,114,83,104,97,114,101,49,57,57, +48,115,114,111,109,97,110,108,105,115,116,115,106,97,112,97,110,102,97,108,108, +115,116,114,105,97,108,111,119,110,101,114,97,103,114,101,101,60,47,104,50,62,97 +,98,117,115,101,97,108,101,114,116,111,112,101,114,97,34,45,47,47,87,99,97,114, +100,115,104,105,108,108,115,116,101,97,109,115,80,104,111,116,111,116,114,117, +116,104,99,108,101,97,110,46,112,104,112,63,115,97,105,110,116,109,101,116,97, +108,108,111,117,105,115,109,101,97,110,116,112,114,111,111,102,98,114,105,101, +102,114,111,119,34,62,103,101,110,114,101,116,114,117,99,107,108,111,111,107,115 +,86,97,108,117,101,70,114,97,109,101,46,110,101,116,47,45,45,62,10,60,116,114, +121,32,123,10,118,97,114,32,109,97,107,101,115,99,111,115,116,115,112,108,97,105 +,110,97,100,117,108,116,113,117,101,115,116,116,114,97,105,110,108,97,98,111,114 +,104,101,108,112,115,99,97,117,115,101,109,97,103,105,99,109,111,116,111,114,116 +,104,101,105,114,50,53,48,112,120,108,101,97,115,116,115,116,101,112,115,67,111, +117,110,116,99,111,117,108,100,103,108,97,115,115,115,105,100,101,115,102,117, +110,100,115,104,111,116,101,108,97,119,97,114,100,109,111,117,116,104,109,111, +118,101,115,112,97,114,105,115,103,105,118,101,115,100,117,116,99,104,116,101, +120,97,115,102,114,117,105,116,110,117,108,108,44,124,124,91,93,59,116,111,112, +34,62,10,60,33,45,45,80,79,83,84,34,111,99,101,97,110,60,98,114,47,62,102,108, +111,111,114,115,112,101,97,107,100,101,112,116,104,32,115,105,122,101,98,97,110, +107,115,99,97,116,99,104,99,104,97,114,116,50,48,112,120,59,97,108,105,103,110, +100,101,97,108,115,119,111,117,108,100,53,48,112,120,59,117,114,108,61,34,112,97 +,114,107,115,109,111,117,115,101,77,111,115,116,32,46,46,46,60,47,97,109,111,110 +,103,98,114,97,105,110,98,111,100,121,32,110,111,110,101,59,98,97,115,101,100,99 +,97,114,114,121,100,114,97,102,116,114,101,102,101,114,112,97,103,101,95,104,111 +,109,101,46,109,101,116,101,114,100,101,108,97,121,100,114,101,97,109,112,114, +111,118,101,106,111,105,110,116,60,47,116,114,62,100,114,117,103,115,60,33,45,45 +,32,97,112,114,105,108,105,100,101,97,108,97,108,108,101,110,101,120,97,99,116, +102,111,114,116,104,99,111,100,101,115,108,111,103,105,99,86,105,101,119,32,115, +101,101,109,115,98,108,97,110,107,112,111,114,116,115,32,40,50,48,48,115,97,118, +101,100,95,108,105,110,107,103,111,97,108,115,103,114,97,110,116,103,114,101,101 +,107,104,111,109,101,115,114,105,110,103,115,114,97,116,101,100,51,48,112,120,59 +,119,104,111,115,101,112,97,114,115,101,40,41,59,34,32,66,108,111,99,107,108,105 +,110,117,120,106,111,110,101,115,112,105,120,101,108,39,41,59,34,62,41,59,105, +102,40,45,108,101,102,116,100,97,118,105,100,104,111,114,115,101,70,111,99,117, +115,114,97,105,115,101,98,111,120,101,115,84,114,97,99,107,101,109,101,110,116, +60,47,101,109,62,98,97,114,34,62,46,115,114,99,61,116,111,119,101,114,97,108,116 +,61,34,99,97,98,108,101,104,101,110,114,121,50,52,112,120,59,115,101,116,117,112 +,105,116,97,108,121,115,104,97,114,112,109,105,110,111,114,116,97,115,116,101, +119,97,110,116,115,116,104,105,115,46,114,101,115,101,116,119,104,101,101,108, +103,105,114,108,115,47,99,115,115,47,49,48,48,37,59,99,108,117,98,115,115,116, +117,102,102,98,105,98,108,101,118,111,116,101,115,32,49,48,48,48,107,111,114,101 +,97,125,41,59,13,10,98,97,110,100,115,113,117,101,117,101,61,32,123,125,59,56,48 +,112,120,59,99,107,105,110,103,123,13,10,9,9,97,104,101,97,100,99,108,111,99,107 +,105,114,105,115,104,108,105,107,101,32,114,97,116,105,111,115,116,97,116,115,70 +,111,114,109,34,121,97,104,111,111,41,91,48,93,59,65,98,111,117,116,102,105,110, +100,115,60,47,104,49,62,100,101,98,117,103,116,97,115,107,115,85,82,76,32,61,99, +101,108,108,115,125,41,40,41,59,49,50,112,120,59,112,114,105,109,101,116,101,108 +,108,115,116,117,114,110,115,48,120,54,48,48,46,106,112,103,34,115,112,97,105, +110,98,101,97,99,104,116,97,120,101,115,109,105,99,114,111,97,110,103,101,108,45 +,45,62,60,47,103,105,102,116,115,115,116,101,118,101,45,108,105,110,107,98,111, +100,121,46,125,41,59,10,9,109,111,117,110,116,32,40,49,57,57,70,65,81,60,47,114, +111,103,101,114,102,114,97,110,107,67,108,97,115,115,50,56,112,120,59,102,101, +101,100,115,60,104,49,62,60,115,99,111,116,116,116,101,115,116,115,50,50,112,120 +,59,100,114,105,110,107,41,32,124,124,32,108,101,119,105,115,115,104,97,108,108, +35,48,51,57,59,32,102,111,114,32,108,111,118,101,100,119,97,115,116,101,48,48, +112,120,59,106,97,58,227,130,115,105,109,111,110,60,102,111,110,116,114,101,112, +108,121,109,101,101,116,115,117,110,116,101,114,99,104,101,97,112,116,105,103, +104,116,66,114,97,110,100,41,32,33,61,32,100,114,101,115,115,99,108,105,112,115, +114,111,111,109,115,111,110,107,101,121,109,111,98,105,108,109,97,105,110,46,78, +97,109,101,32,112,108,97,116,101,102,117,110,110,121,116,114,101,101,115,99,111, +109,47,34,49,46,106,112,103,119,109,111,100,101,112,97,114,97,109,83,84,65,82,84 +,108,101,102,116,32,105,100,100,101,110,44,32,50,48,49,41,59,10,125,10,102,111, +114,109,46,118,105,114,117,115,99,104,97,105,114,116,114,97,110,115,119,111,114, +115,116,80,97,103,101,115,105,116,105,111,110,112,97,116,99,104,60,33,45,45,10, +111,45,99,97,99,102,105,114,109,115,116,111,117,114,115,44,48,48,48,32,97,115, +105,97,110,105,43,43,41,123,97,100,111,98,101,39,41,91,48,93,105,100,61,49,48,98 +,111,116,104,59,109,101,110,117,32,46,50,46,109,105,46,112,110,103,34,107,101, +118,105,110,99,111,97,99,104,67,104,105,108,100,98,114,117,99,101,50,46,106,112, +103,85,82,76,41,43,46,106,112,103,124,115,117,105,116,101,115,108,105,99,101,104 +,97,114,114,121,49,50,48,34,32,115,119,101,101,116,116,114,62,13,10,110,97,109, +101,61,100,105,101,103,111,112,97,103,101,32,115,119,105,115,115,45,45,62,10,10, +35,102,102,102,59,34,62,76,111,103,46,99,111,109,34,116,114,101,97,116,115,104, +101,101,116,41,32,38,38,32,49,52,112,120,59,115,108,101,101,112,110,116,101,110, +116,102,105,108,101,100,106,97,58,227,131,105,100,61,34,99,78,97,109,101,34,119, +111,114,115,101,115,104,111,116,115,45,98,111,120,45,100,101,108,116,97,10,38, +108,116,59,98,101,97,114,115,58,52,56,90,60,100,97,116,97,45,114,117,114,97,108, +60,47,97,62,32,115,112,101,110,100,98,97,107,101,114,115,104,111,112,115,61,32, +34,34,59,112,104,112,34,62,99,116,105,111,110,49,51,112,120,59,98,114,105,97,110 +,104,101,108,108,111,115,105,122,101,61,111,61,37,50,70,32,106,111,105,110,109, +97,121,98,101,60,105,109,103,32,105,109,103,34,62,44,32,102,106,115,105,109,103, +34,32,34,41,91,48,93,77,84,111,112,66,84,121,112,101,34,110,101,119,108,121,68, +97,110,115,107,99,122,101,99,104,116,114,97,105,108,107,110,111,119,115,60,47, +104,53,62,102,97,113,34,62,122,104,45,99,110,49,48,41,59,10,45,49,34,41,59,116, +121,112,101,61,98,108,117,101,115,116,114,117,108,121,100,97,118,105,115,46,106, +115,39,59,62,13,10,60,33,115,116,101,101,108,32,121,111,117,32,104,50,62,13,10, +102,111,114,109,32,106,101,115,117,115,49,48,48,37,32,109,101,110,117,46,13,10,9 +,13,10,119,97,108,101,115,114,105,115,107,115,117,109,101,110,116,100,100,105, +110,103,98,45,108,105,107,116,101,97,99,104,103,105,102,34,32,118,101,103,97,115 +,100,97,110,115,107,101,101,115,116,105,115,104,113,105,112,115,117,111,109,105, +115,111,98,114,101,100,101,115,100,101,101,110,116,114,101,116,111,100,111,115, +112,117,101,100,101,97,195,177,111,115,101,115,116,195,161,116,105,101,110,101, +104,97,115,116,97,111,116,114,111,115,112,97,114,116,101,100,111,110,100,101,110 +,117,101,118,111,104,97,99,101,114,102,111,114,109,97,109,105,115,109,111,109, +101,106,111,114,109,117,110,100,111,97,113,117,195,173,100,195,173,97,115,115, +195,179,108,111,97,121,117,100,97,102,101,99,104,97,116,111,100,97,115,116,97, +110,116,111,109,101,110,111,115,100,97,116,111,115,111,116,114,97,115,115,105, +116,105,111,109,117,99,104,111,97,104,111,114,97,108,117,103,97,114,109,97,121, +111,114,101,115,116,111,115,104,111,114,97,115,116,101,110,101,114,97,110,116, +101,115,102,111,116,111,115,101,115,116,97,115,112,97,195,173,115,110,117,101, +118,97,115,97,108,117,100,102,111,114,111,115,109,101,100,105,111,113,117,105, +101,110,109,101,115,101,115,112,111,100,101,114,99,104,105,108,101,115,101,114, +195,161,118,101,99,101,115,100,101,99,105,114,106,111,115,195,169,101,115,116,97 +,114,118,101,110,116,97,103,114,117,112,111,104,101,99,104,111,101,108,108,111, +115,116,101,110,103,111,97,109,105,103,111,99,111,115,97,115,110,105,118,101,108 +,103,101,110,116,101,109,105,115,109,97,97,105,114,101,115,106,117,108,105,111, +116,101,109,97,115,104,97,99,105,97,102,97,118,111,114,106,117,110,105,111,108, +105,98,114,101,112,117,110,116,111,98,117,101,110,111,97,117,116,111,114,97,98, +114,105,108,98,117,101,110,97,116,101,120,116,111,109,97,114,122,111,115,97,98, +101,114,108,105,115,116,97,108,117,101,103,111,99,195,179,109,111,101,110,101, +114,111,106,117,101,103,111,112,101,114,195,186,104,97,98,101,114,101,115,116, +111,121,110,117,110,99,97,109,117,106,101,114,118,97,108,111,114,102,117,101,114 +,97,108,105,98,114,111,103,117,115,116,97,105,103,117,97,108,118,111,116,111,115 +,99,97,115,111,115,103,117,195,173,97,112,117,101,100,111,115,111,109,111,115,97 +,118,105,115,111,117,115,116,101,100,100,101,98,101,110,110,111,99,104,101,98, +117,115,99,97,102,97,108,116,97,101,117,114,111,115,115,101,114,105,101,100,105, +99,104,111,99,117,114,115,111,99,108,97,118,101,99,97,115,97,115,108,101,195,179 +,110,112,108,97,122,111,108,97,114,103,111,111,98,114,97,115,118,105,115,116,97, +97,112,111,121,111,106,117,110,116,111,116,114,97,116,97,118,105,115,116,111,99, +114,101,97,114,99,97,109,112,111,104,101,109,111,115,99,105,110,99,111,99,97,114 +,103,111,112,105,115,111,115,111,114,100,101,110,104,97,99,101,110,195,161,114, +101,97,100,105,115,99,111,112,101,100,114,111,99,101,114,99,97,112,117,101,100, +97,112,97,112,101,108,109,101,110,111,114,195,186,116,105,108,99,108,97,114,111, +106,111,114,103,101,99,97,108,108,101,112,111,110,101,114,116,97,114,100,101,110 +,97,100,105,101,109,97,114,99,97,115,105,103,117,101,101,108,108,97,115,115,105, +103,108,111,99,111,99,104,101,109,111,116,111,115,109,97,100,114,101,99,108,97, +115,101,114,101,115,116,111,110,105,195,177,111,113,117,101,100,97,112,97,115,97 +,114,98,97,110,99,111,104,105,106,111,115,118,105,97,106,101,112,97,98,108,111, +195,169,115,116,101,118,105,101,110,101,114,101,105,110,111,100,101,106,97,114, +102,111,110,100,111,99,97,110,97,108,110,111,114,116,101,108,101,116,114,97,99, +97,117,115,97,116,111,109,97,114,109,97,110,111,115,108,117,110,101,115,97,117, +116,111,115,118,105,108,108,97,118,101,110,100,111,112,101,115,97,114,116,105, +112,111,115,116,101,110,103,97,109,97,114,99,111,108,108,101,118,97,112,97,100, +114,101,117,110,105,100,111,118,97,109,111,115,122,111,110,97,115,97,109,98,111, +115,98,97,110,100,97,109,97,114,105,97,97,98,117,115,111,109,117,99,104,97,115, +117,98,105,114,114,105,111,106,97,118,105,118,105,114,103,114,97,100,111,99,104, +105,99,97,97,108,108,195,173,106,111,118,101,110,100,105,99,104,97,101,115,116, +97,110,116,97,108,101,115,115,97,108,105,114,115,117,101,108,111,112,101,115,111 +,115,102,105,110,101,115,108,108,97,109,97,98,117,115,99,111,195,169,115,116,97, +108,108,101,103,97,110,101,103,114,111,112,108,97,122,97,104,117,109,111,114,112 +,97,103,97,114,106,117,110,116,97,100,111,98,108,101,105,115,108,97,115,98,111, +108,115,97,98,97,195,177,111,104,97,98,108,97,108,117,99,104,97,195,129,114,101, +97,100,105,99,101,110,106,117,103,97,114,110,111,116,97,115,118,97,108,108,101, +97,108,108,195,161,99,97,114,103,97,100,111,108,111,114,97,98,97,106,111,101,115 +,116,195,169,103,117,115,116,111,109,101,110,116,101,109,97,114,105,111,102,105, +114,109,97,99,111,115,116,111,102,105,99,104,97,112,108,97,116,97,104,111,103,97 +,114,97,114,116,101,115,108,101,121,101,115,97,113,117,101,108,109,117,115,101, +111,98,97,115,101,115,112,111,99,111,115,109,105,116,97,100,99,105,101,108,111, +99,104,105,99,111,109,105,101,100,111,103,97,110,97,114,115,97,110,116,111,101, +116,97,112,97,100,101,98,101,115,112,108,97,121,97,114,101,100,101,115,115,105, +101,116,101,99,111,114,116,101,99,111,114,101,97,100,117,100,97,115,100,101,115, +101,111,118,105,101,106,111,100,101,115,101,97,97,103,117,97,115,38,113,117,111, +116,59,100,111,109,97,105,110,99,111,109,109,111,110,115,116,97,116,117,115,101, +118,101,110,116,115,109,97,115,116,101,114,115,121,115,116,101,109,97,99,116,105 +,111,110,98,97,110,110,101,114,114,101,109,111,118,101,115,99,114,111,108,108, +117,112,100,97,116,101,103,108,111,98,97,108,109,101,100,105,117,109,102,105,108 +,116,101,114,110,117,109,98,101,114,99,104,97,110,103,101,114,101,115,117,108, +116,112,117,98,108,105,99,115,99,114,101,101,110,99,104,111,111,115,101,110,111, +114,109,97,108,116,114,97,118,101,108,105,115,115,117,101,115,115,111,117,114,99 +,101,116,97,114,103,101,116,115,112,114,105,110,103,109,111,100,117,108,101,109, +111,98,105,108,101,115,119,105,116,99,104,112,104,111,116,111,115,98,111,114,100 +,101,114,114,101,103,105,111,110,105,116,115,101,108,102,115,111,99,105,97,108, +97,99,116,105,118,101,99,111,108,117,109,110,114,101,99,111,114,100,102,111,108, +108,111,119,116,105,116,108,101,62,101,105,116,104,101,114,108,101,110,103,116, +104,102,97,109,105,108,121,102,114,105,101,110,100,108,97,121,111,117,116,97,117 +,116,104,111,114,99,114,101,97,116,101,114,101,118,105,101,119,115,117,109,109, +101,114,115,101,114,118,101,114,112,108,97,121,101,100,112,108,97,121,101,114, +101,120,112,97,110,100,112,111,108,105,99,121,102,111,114,109,97,116,100,111,117 +,98,108,101,112,111,105,110,116,115,115,101,114,105,101,115,112,101,114,115,111, +110,108,105,118,105,110,103,100,101,115,105,103,110,109,111,110,116,104,115,102, +111,114,99,101,115,117,110,105,113,117,101,119,101,105,103,104,116,112,101,111, +112,108,101,101,110,101,114,103,121,110,97,116,117,114,101,115,101,97,114,99,104 +,102,105,103,117,114,101,104,97,118,105,110,103,99,117,115,116,111,109,111,102, +102,115,101,116,108,101,116,116,101,114,119,105,110,100,111,119,115,117,98,109, +105,116,114,101,110,100,101,114,103,114,111,117,112,115,117,112,108,111,97,100, +104,101,97,108,116,104,109,101,116,104,111,100,118,105,100,101,111,115,115,99, +104,111,111,108,102,117,116,117,114,101,115,104,97,100,111,119,100,101,98,97,116 +,101,118,97,108,117,101,115,79,98,106,101,99,116,111,116,104,101,114,115,114,105 +,103,104,116,115,108,101,97,103,117,101,99,104,114,111,109,101,115,105,109,112, +108,101,110,111,116,105,99,101,115,104,97,114,101,100,101,110,100,105,110,103, +115,101,97,115,111,110,114,101,112,111,114,116,111,110,108,105,110,101,115,113, +117,97,114,101,98,117,116,116,111,110,105,109,97,103,101,115,101,110,97,98,108, +101,109,111,118,105,110,103,108,97,116,101,115,116,119,105,110,116,101,114,70, +114,97,110,99,101,112,101,114,105,111,100,115,116,114,111,110,103,114,101,112, +101,97,116,76,111,110,100,111,110,100,101,116,97,105,108,102,111,114,109,101,100 +,100,101,109,97,110,100,115,101,99,117,114,101,112,97,115,115,101,100,116,111, +103,103,108,101,112,108,97,99,101,115,100,101,118,105,99,101,115,116,97,116,105, +99,99,105,116,105,101,115,115,116,114,101,97,109,121,101,108,108,111,119,97,116, +116,97,99,107,115,116,114,101,101,116,102,108,105,103,104,116,104,105,100,100, +101,110,105,110,102,111,34,62,111,112,101,110,101,100,117,115,101,102,117,108, +118,97,108,108,101,121,99,97,117,115,101,115,108,101,97,100,101,114,115,101,99, +114,101,116,115,101,99,111,110,100,100,97,109,97,103,101,115,112,111,114,116,115 +,101,120,99,101,112,116,114,97,116,105,110,103,115,105,103,110,101,100,116,104, +105,110,103,115,101,102,102,101,99,116,102,105,101,108,100,115,115,116,97,116, +101,115,111,102,102,105,99,101,118,105,115,117,97,108,101,100,105,116,111,114, +118,111,108,117,109,101,82,101,112,111,114,116,109,117,115,101,117,109,109,111, +118,105,101,115,112,97,114,101,110,116,97,99,99,101,115,115,109,111,115,116,108, +121,109,111,116,104,101,114,34,32,105,100,61,34,109,97,114,107,101,116,103,114, +111,117,110,100,99,104,97,110,99,101,115,117,114,118,101,121,98,101,102,111,114, +101,115,121,109,98,111,108,109,111,109,101,110,116,115,112,101,101,99,104,109, +111,116,105,111,110,105,110,115,105,100,101,109,97,116,116,101,114,67,101,110, +116,101,114,111,98,106,101,99,116,101,120,105,115,116,115,109,105,100,100,108, +101,69,117,114,111,112,101,103,114,111,119,116,104,108,101,103,97,99,121,109,97, +110,110,101,114,101,110,111,117,103,104,99,97,114,101,101,114,97,110,115,119,101 +,114,111,114,105,103,105,110,112,111,114,116,97,108,99,108,105,101,110,116,115, +101,108,101,99,116,114,97,110,100,111,109,99,108,111,115,101,100,116,111,112,105 +,99,115,99,111,109,105,110,103,102,97,116,104,101,114,111,112,116,105,111,110, +115,105,109,112,108,121,114,97,105,115,101,100,101,115,99,97,112,101,99,104,111, +115,101,110,99,104,117,114,99,104,100,101,102,105,110,101,114,101,97,115,111,110 +,99,111,114,110,101,114,111,117,116,112,117,116,109,101,109,111,114,121,105,102, +114,97,109,101,112,111,108,105,99,101,109,111,100,101,108,115,78,117,109,98,101, +114,100,117,114,105,110,103,111,102,102,101,114,115,115,116,121,108,101,115,107, +105,108,108,101,100,108,105,115,116,101,100,99,97,108,108,101,100,115,105,108, +118,101,114,109,97,114,103,105,110,100,101,108,101,116,101,98,101,116,116,101, +114,98,114,111,119,115,101,108,105,109,105,116,115,71,108,111,98,97,108,115,105, +110,103,108,101,119,105,100,103,101,116,99,101,110,116,101,114,98,117,100,103, +101,116,110,111,119,114,97,112,99,114,101,100,105,116,99,108,97,105,109,115,101, +110,103,105,110,101,115,97,102,101,116,121,99,104,111,105,99,101,115,112,105,114 +,105,116,45,115,116,121,108,101,115,112,114,101,97,100,109,97,107,105,110,103, +110,101,101,100,101,100,114,117,115,115,105,97,112,108,101,97,115,101,101,120, +116,101,110,116,83,99,114,105,112,116,98,114,111,107,101,110,97,108,108,111,119, +115,99,104,97,114,103,101,100,105,118,105,100,101,102,97,99,116,111,114,109,101, +109,98,101,114,45,98,97,115,101,100,116,104,101,111,114,121,99,111,110,102,105, +103,97,114,111,117,110,100,119,111,114,107,101,100,104,101,108,112,101,100,67, +104,117,114,99,104,105,109,112,97,99,116,115,104,111,117,108,100,97,108,119,97, +121,115,108,111,103,111,34,32,98,111,116,116,111,109,108,105,115,116,34,62,41, +123,118,97,114,32,112,114,101,102,105,120,111,114,97,110,103,101,72,101,97,100, +101,114,46,112,117,115,104,40,99,111,117,112,108,101,103,97,114,100,101,110,98, +114,105,100,103,101,108,97,117,110,99,104,82,101,118,105,101,119,116,97,107,105, +110,103,118,105,115,105,111,110,108,105,116,116,108,101,100,97,116,105,110,103, +66,117,116,116,111,110,98,101,97,117,116,121,116,104,101,109,101,115,102,111,114 +,103,111,116,83,101,97,114,99,104,97,110,99,104,111,114,97,108,109,111,115,116, +108,111,97,100,101,100,67,104,97,110,103,101,114,101,116,117,114,110,115,116,114 +,105,110,103,114,101,108,111,97,100,77,111,98,105,108,101,105,110,99,111,109,101 +,115,117,112,112,108,121,83,111,117,114,99,101,111,114,100,101,114,115,118,105, +101,119,101,100,38,110,98,115,112,59,99,111,117,114,115,101,65,98,111,117,116,32 +,105,115,108,97,110,100,60,104,116,109,108,32,99,111,111,107,105,101,110,97,109, +101,61,34,97,109,97,122,111,110,109,111,100,101,114,110,97,100,118,105,99,101, +105,110,60,47,97,62,58,32,84,104,101,32,100,105,97,108,111,103,104,111,117,115, +101,115,66,69,71,73,78,32,77,101,120,105,99,111,115,116,97,114,116,115,99,101, +110,116,114,101,104,101,105,103,104,116,97,100,100,105,110,103,73,115,108,97,110 +,100,97,115,115,101,116,115,69,109,112,105,114,101,83,99,104,111,111,108,101,102 +,102,111,114,116,100,105,114,101,99,116,110,101,97,114,108,121,109,97,110,117,97 +,108,83,101,108,101,99,116,46,10,10,79,110,101,106,111,105,110,101,100,109,101, +110,117,34,62,80,104,105,108,105,112,97,119,97,114,100,115,104,97,110,100,108, +101,105,109,112,111,114,116,79,102,102,105,99,101,114,101,103,97,114,100,115,107 +,105,108,108,115,110,97,116,105,111,110,83,112,111,114,116,115,100,101,103,114, +101,101,119,101,101,107,108,121,32,40,101,46,103,46,98,101,104,105,110,100,100, +111,99,116,111,114,108,111,103,103,101,100,117,110,105,116,101,100,60,47,98,62, +60,47,98,101,103,105,110,115,112,108,97,110,116,115,97,115,115,105,115,116,97, +114,116,105,115,116,105,115,115,117,101,100,51,48,48,112,120,124,99,97,110,97, +100,97,97,103,101,110,99,121,115,99,104,101,109,101,114,101,109,97,105,110,66, +114,97,122,105,108,115,97,109,112,108,101,108,111,103,111,34,62,98,101,121,111, +110,100,45,115,99,97,108,101,97,99,99,101,112,116,115,101,114,118,101,100,109,97 +,114,105,110,101,70,111,111,116,101,114,99,97,109,101,114,97,60,47,104,49,62,10, +95,102,111,114,109,34,108,101,97,118,101,115,115,116,114,101,115,115,34,32,47,62 +,13,10,46,103,105,102,34,32,111,110,108,111,97,100,108,111,97,100,101,114,79,120 +,102,111,114,100,115,105,115,116,101,114,115,117,114,118,105,118,108,105,115,116 +,101,110,102,101,109,97,108,101,68,101,115,105,103,110,115,105,122,101,61,34,97, +112,112,101,97,108,116,101,120,116,34,62,108,101,118,101,108,115,116,104,97,110, +107,115,104,105,103,104,101,114,102,111,114,99,101,100,97,110,105,109,97,108,97, +110,121,111,110,101,65,102,114,105,99,97,97,103,114,101,101,100,114,101,99,101, +110,116,80,101,111,112,108,101,60,98,114,32,47,62,119,111,110,100,101,114,112, +114,105,99,101,115,116,117,114,110,101,100,124,124,32,123,125,59,109,97,105,110, +34,62,105,110,108,105,110,101,115,117,110,100,97,121,119,114,97,112,34,62,102,97 +,105,108,101,100,99,101,110,115,117,115,109,105,110,117,116,101,98,101,97,99,111 +,110,113,117,111,116,101,115,49,53,48,112,120,124,101,115,116,97,116,101,114,101 +,109,111,116,101,101,109,97,105,108,34,108,105,110,107,101,100,114,105,103,104, +116,59,115,105,103,110,97,108,102,111,114,109,97,108,49,46,104,116,109,108,115, +105,103,110,117,112,112,114,105,110,99,101,102,108,111,97,116,58,46,112,110,103, +34,32,102,111,114,117,109,46,65,99,99,101,115,115,112,97,112,101,114,115,115,111 +,117,110,100,115,101,120,116,101,110,100,72,101,105,103,104,116,115,108,105,100, +101,114,85,84,70,45,56,34,38,97,109,112,59,32,66,101,102,111,114,101,46,32,87, +105,116,104,115,116,117,100,105,111,111,119,110,101,114,115,109,97,110,97,103, +101,112,114,111,102,105,116,106,81,117,101,114,121,97,110,110,117,97,108,112,97, +114,97,109,115,98,111,117,103,104,116,102,97,109,111,117,115,103,111,111,103,108 +,101,108,111,110,103,101,114,105,43,43,41,32,123,105,115,114,97,101,108,115,97, +121,105,110,103,100,101,99,105,100,101,104,111,109,101,34,62,104,101,97,100,101, +114,101,110,115,117,114,101,98,114,97,110,99,104,112,105,101,99,101,115,98,108, +111,99,107,59,115,116,97,116,101,100,116,111,112,34,62,60,114,97,99,105,110,103, +114,101,115,105,122,101,45,45,38,103,116,59,112,97,99,105,116,121,115,101,120, +117,97,108,98,117,114,101,97,117,46,106,112,103,34,32,49,48,44,48,48,48,111,98, +116,97,105,110,116,105,116,108,101,115,97,109,111,117,110,116,44,32,73,110,99,46 +,99,111,109,101,100,121,109,101,110,117,34,32,108,121,114,105,99,115,116,111,100 +,97,121,46,105,110,100,101,101,100,99,111,117,110,116,121,95,108,111,103,111,46, +70,97,109,105,108,121,108,111,111,107,101,100,77,97,114,107,101,116,108,115,101, +32,105,102,80,108,97,121,101,114,116,117,114,107,101,121,41,59,118,97,114,32,102 +,111,114,101,115,116,103,105,118,105,110,103,101,114,114,111,114,115,68,111,109, +97,105,110,125,101,108,115,101,123,105,110,115,101,114,116,66,108,111,103,60,47, +102,111,111,116,101,114,108,111,103,105,110,46,102,97,115,116,101,114,97,103,101 +,110,116,115,60,98,111,100,121,32,49,48,112,120,32,48,112,114,97,103,109,97,102, +114,105,100,97,121,106,117,110,105,111,114,100,111,108,108,97,114,112,108,97,99, +101,100,99,111,118,101,114,115,112,108,117,103,105,110,53,44,48,48,48,32,112,97, +103,101,34,62,98,111,115,116,111,110,46,116,101,115,116,40,97,118,97,116,97,114, +116,101,115,116,101,100,95,99,111,117,110,116,102,111,114,117,109,115,115,99,104 +,101,109,97,105,110,100,101,120,44,102,105,108,108,101,100,115,104,97,114,101, +115,114,101,97,100,101,114,97,108,101,114,116,40,97,112,112,101,97,114,83,117,98 +,109,105,116,108,105,110,101,34,62,98,111,100,121,34,62,10,42,32,84,104,101,84, +104,111,117,103,104,115,101,101,105,110,103,106,101,114,115,101,121,78,101,119, +115,60,47,118,101,114,105,102,121,101,120,112,101,114,116,105,110,106,117,114, +121,119,105,100,116,104,61,67,111,111,107,105,101,83,84,65,82,84,32,97,99,114, +111,115,115,95,105,109,97,103,101,116,104,114,101,97,100,110,97,116,105,118,101, +112,111,99,107,101,116,98,111,120,34,62,10,83,121,115,116,101,109,32,68,97,118, +105,100,99,97,110,99,101,114,116,97,98,108,101,115,112,114,111,118,101,100,65, +112,114,105,108,32,114,101,97,108,108,121,100,114,105,118,101,114,105,116,101, +109,34,62,109,111,114,101,34,62,98,111,97,114,100,115,99,111,108,111,114,115,99, +97,109,112,117,115,102,105,114,115,116,32,124,124,32,91,93,59,109,101,100,105,97 +,46,103,117,105,116,97,114,102,105,110,105,115,104,119,105,100,116,104,58,115, +104,111,119,101,100,79,116,104,101,114,32,46,112,104,112,34,32,97,115,115,117, +109,101,108,97,121,101,114,115,119,105,108,115,111,110,115,116,111,114,101,115, +114,101,108,105,101,102,115,119,101,100,101,110,67,117,115,116,111,109,101,97, +115,105,108,121,32,121,111,117,114,32,83,116,114,105,110,103,10,10,87,104,105, +108,116,97,121,108,111,114,99,108,101,97,114,58,114,101,115,111,114,116,102,114, +101,110,99,104,116,104,111,117,103,104,34,41,32,43,32,34,60,98,111,100,121,62,98 +,117,121,105,110,103,98,114,97,110,100,115,77,101,109,98,101,114,110,97,109,101, +34,62,111,112,112,105,110,103,115,101,99,116,111,114,53,112,120,59,34,62,118,115 +,112,97,99,101,112,111,115,116,101,114,109,97,106,111,114,32,99,111,102,102,101, +101,109,97,114,116,105,110,109,97,116,117,114,101,104,97,112,112,101,110,60,47, +110,97,118,62,107,97,110,115,97,115,108,105,110,107,34,62,73,109,97,103,101,115, +61,102,97,108,115,101,119,104,105,108,101,32,104,115,112,97,99,101,48,38,97,109, +112,59,32,10,10,73,110,32,32,112,111,119,101,114,80,111,108,115,107,105,45,99, +111,108,111,114,106,111,114,100,97,110,66,111,116,116,111,109,83,116,97,114,116, +32,45,99,111,117,110,116,50,46,104,116,109,108,110,101,119,115,34,62,48,49,46, +106,112,103,79,110,108,105,110,101,45,114,105,103,104,116,109,105,108,108,101, +114,115,101,110,105,111,114,73,83,66,78,32,48,48,44,48,48,48,32,103,117,105,100, +101,115,118,97,108,117,101,41,101,99,116,105,111,110,114,101,112,97,105,114,46, +120,109,108,34,32,32,114,105,103,104,116,115,46,104,116,109,108,45,98,108,111,99 +,107,114,101,103,69,120,112,58,104,111,118,101,114,119,105,116,104,105,110,118, +105,114,103,105,110,112,104,111,110,101,115,60,47,116,114,62,13,117,115,105,110, +103,32,10,9,118,97,114,32,62,39,41,59,10,9,60,47,116,100,62,10,60,47,116,114,62, +10,98,97,104,97,115,97,98,114,97,115,105,108,103,97,108,101,103,111,109,97,103, +121,97,114,112,111,108,115,107,105,115,114,112,115,107,105,216,177,216,175,217, +136,228,184,173,230,150,135,231,174,128,228,189,147,231,185,129,233,171,148,228, +191,161,230,129,175,228,184,173,229,155,189,230,136,145,228,187,172,228,184,128, +228,184,170,229,133,172,229,143,184,231,174,161,231,144,134,232,174,186,229,157, +155,229,143,175,228,187,165,230,156,141,229,138,161,230,151,182,233,151,180,228, +184,170,228,186,186,228,186,167,229,147,129,232,135,170,229,183,177,228,188,129, +228,184,154,230,159,165,231,156,139,229,183,165,228,189,156,232,129,148,231,179, +187,230,178,161,230,156,137,231,189,145,231,171,153,230,137,128,230,156,137,232, +175,132,232,174,186,228,184,173,229,191,131,230,150,135,231,171,160,231,148,168, +230,136,183,233,166,150,233,161,181,228,189,156,232,128,133,230,138,128,230,156, +175,233,151,174,233,162,152,231,155,184,229,133,179,228,184,139,232,189,189,230, +144,156,231,180,162,228,189,191,231,148,168,232,189,175,228,187,182,229,156,168, +231,186,191,228,184,187,233,162,152,232,181,132,230,150,153,232,167,134,233,162, +145,229,155,158,229,164,141,230,179,168,229,134,140,231,189,145,231,187,156,230, +148,182,232,151,143,229,134,133,229,174,185,230,142,168,232,141,144,229,184,130, +229,156,186,230,182,136,230,129,175,231,169,186,233,151,180,229,143,145,229,184, +131,228,187,128,228,185,136,229,165,189,229,143,139,231,148,159,230,180,187,229, +155,190,231,137,135,229,143,145,229,177,149,229,166,130,230,158,156,230,137,139, +230,156,186,230,150,176,233,151,187,230,156,128,230,150,176,230,150,185,229,188, +143,229,140,151,228,186,172,230,143,144,228,190,155,229,133,179,228,186,142,230, +155,180,229,164,154,232,191,153,228,184,170,231,179,187,231,187,159,231,159,165, +233,129,147,230,184,184,230,136,143,229,185,191,229,145,138,229,133,182,228,187, +150,229,143,145,232,161,168,229,174,137,229,133,168,231,172,172,228,184,128,228, +188,154,229,145,152,232,191,155,232,161,140,231,130,185,229,135,187,231,137,136, +230,157,131,231,148,181,229,173,144,228,184,150,231,149,140,232,174,190,232,174, +161,229,133,141,232,180,185,230,149,153,232,130,178,229,138,160,229,133,165,230, +180,187,229,138,168,228,187,150,228,187,172,229,149,134,229,147,129,229,141,154, +229,174,162,231,142,176,229,156,168,228,184,138,230,181,183,229,166,130,228,189, +149,229,183,178,231,187,143,231,149,153,232,168,128,232,175,166,231,187,134,231, +164,190,229,140,186,231,153,187,229,189,149,230,156,172,231,171,153,233,156,128, +232,166,129,228,187,183,230,160,188,230,148,175,230,140,129,229,155,189,233,153, +133,233,147,190,230,142,165,229,155,189,229,174,182,229,187,186,232,174,190,230, +156,139,229,143,139,233,152,133,232,175,187,230,179,149,229,190,139,228,189,141, +231,189,174,231,187,143,230,181,142,233,128,137,230,139,169,232,191,153,230,160, +183,229,189,147,229,137,141,229,136,134,231,177,187,230,142,146,232,161,140,229, +155,160,228,184,186,228,186,164,230,152,147,230,156,128,229,144,142,233,159,179, +228,185,144,228,184,141,232,131,189,233,128,154,232,191,135,232,161,140,228,184, +154,231,167,145,230,138,128,229,143,175,232,131,189,232,174,190,229,164,135,229, +144,136,228,189,156,229,164,167,229,174,182,231,164,190,228,188,154,231,160,148, +231,169,182,228,184,147,228,184,154,229,133,168,233,131,168,233,161,185,231,155, +174,232,191,153,233,135,140,232,191,152,230,152,175,229,188,128,229,167,139,230, +131,133,229,134,181,231,148,181,232,132,145,230,150,135,228,187,182,229,147,129, +231,137,140,229,184,174,229,138,169,230,150,135,229,140,150,232,181,132,230,186, +144,229,164,167,229,173,166,229,173,166,228,185,160,229,156,176,229,157,128,230, +181,143,232,167,136,230,138,149,232,181,132,229,183,165,231,168,139,232,166,129, +230,177,130,230,128,142,228,185,136,230,151,182,229,128,153,229,138,159,232,131, +189,228,184,187,232,166,129,231,155,174,229,137,141,232,181,132,232,174,175,229, +159,142,229,184,130,230,150,185,230,179,149,231,148,181,229,189,177,230,139,155, +232,129,152,229,163,176,230,152,142,228,187,187,228,189,149,229,129,165,229,186, +183,230,149,176,230,141,174,231,190,142,229,155,189,230,177,189,232,189,166,228, +187,139,231,187,141,228,189,134,230,152,175,228,186,164,230,181,129,231,148,159, +228,186,167,230,137,128,228,187,165,231,148,181,232,175,157,230,152,190,231,164, +186,228,184,128,228,186,155,229,141,149,228,189,141,228,186,186,229,145,152,229, +136,134,230,158,144,229,156,176,229,155,190,230,151,133,230,184,184,229,183,165, +229,133,183,229,173,166,231,148,159,231,179,187,229,136,151,231,189,145,229,143, +139,229,184,150,229,173,144,229,175,134,231,160,129,233,162,145,233,129,147,230, +142,167,229,136,182,229,156,176,229,140,186,229,159,186,230,156,172,229,133,168, +229,155,189,231,189,145,228,184,138,233,135,141,232,166,129,231,172,172,228,186, +140,229,150,156,230,172,162,232,191,155,229,133,165,229,143,139,230,131,133,232, +191,153,228,186,155,232,128,131,232,175,149,229,143,145,231,142,176,229,159,185, +232,174,173,228,187,165,228,184,138,230,148,191,229,186,156,230,136,144,228,184, +186,231,142,175,229,162,131,233,166,153,230,184,175,229,144,140,230,151,182,229, +168,177,228,185,144,229,143,145,233,128,129,228,184,128,229,174,154,229,188,128, +229,143,145,228,189,156,229,147,129,230,160,135,229,135,134,230,172,162,232,191, +142,232,167,163,229,134,179,229,156,176,230,150,185,228,184,128,228,184,139,228, +187,165,229,143,138,232,180,163,228,187,187,230,136,150,232,128,133,229,174,162, +230,136,183,228,187,163,232,161,168,231,167,175,229,136,134,229,165,179,228,186, +186,230,149,176,231,160,129,233,148,128,229,148,174,229,135,186,231,142,176,231, +166,187,231,186,191,229,186,148,231,148,168,229,136,151,232,161,168,228,184,141, +229,144,140,231,188,150,232,190,145,231,187,159,232,174,161,230,159,165,232,175, +162,228,184,141,232,166,129,230,156,137,229,133,179,230,156,186,230,158,132,229, +190,136,229,164,154,230,146,173,230,148,190,231,187,132,231,187,135,230,148,191, +231,173,150,231,155,180,230,142,165,232,131,189,229,138,155,230,157,165,230,186, +144,230,153,130,233,150,147,231,156,139,229,136,176,231,131,173,233,151,168,229, +133,179,233,148,174,228,184,147,229,140,186,233,157,158,229,184,184,232,139,177, +232,175,173,231,153,190,229,186,166,229,184,140,230,156,155,231,190,142,229,165, +179,230,175,148,232,190,131,231,159,165,232,175,134,232,167,132,229,174,154,229, +187,186,232,174,174,233,131,168,233,151,168,230,132,143,232,167,129,231,178,190, +229,189,169,230,151,165,230,156,172,230,143,144,233,171,152,229,143,145,232,168, +128,230,150,185,233,157,162,229,159,186,233,135,145,229,164,132,231,144,134,230, +157,131,233,153,144,229,189,177,231,137,135,233,147,182,232,161,140,232,191,152, +230,156,137,229,136,134,228,186,171,231,137,169,229,147,129,231,187,143,232,144, +165,230,183,187,229,138,160,228,184,147,229,174,182,232,191,153,231,167,141,232, +175,157,233,162,152,232,181,183,230,157,165,228,184,154,229,138,161,229,133,172, +229,145,138,232,174,176,229,189,149,231,174,128,228,187,139,232,180,168,233,135, +143,231,148,183,228,186,186,229,189,177,229,147,141,229,188,149,231,148,168,230, +138,165,229,145,138,233,131,168,229,136,134,229,191,171,233,128,159,229,146,168, +232,175,162,230,151,182,229,176,154,230,179,168,230,132,143,231,148,179,232,175, +183,229,173,166,230,160,161,229,186,148,232,175,165,229,142,134,229,143,178,229, +143,170,230,152,175,232,191,148,229,155,158,232,180,173,228,185,176,229,144,141, +231,167,176,228,184,186,228,186,134,230,136,144,229,138,159,232,175,180,230,152, +142,228,190,155,229,186,148,229,173,169,229,173,144,228,184,147,233,162,152,231, +168,139,229,186,143,228,184,128,232,136,172,230,156,131,229,147,161,229,143,170, +230,156,137,229,133,182,229,174,131,228,191,157,230,138,164,232,128,140,228,184, +148,228,187,138,229,164,169,231,170,151,229,143,163,229,138,168,230,128,129,231, +138,182,230,128,129,231,137,185,229,136,171,232,174,164,228,184,186,229,191,133, +233,161,187,230,155,180,230,150,176,229,176,143,232,175,180,230,136,145,229,128, +145,228,189,156,228,184,186,229,170,146,228,189,147,229,140,133,230,139,172,233, +130,163,228,185,136,228,184,128,230,160,183,229,155,189,229,134,133,230,152,175, +229,144,166,230,160,185,230,141,174,231,148,181,232,167,134,229,173,166,233,153, +162,229,133,183,230,156,137,232,191,135,231,168,139,231,148,177,228,186,142,228, +186,186,230,137,141,229,135,186,230,157,165,228,184,141,232,191,135,230,173,163, +229,156,168,230,152,142,230,152,159,230,149,133,228,186,139,229,133,179,231,179, +187,230,160,135,233,162,152,229,149,134,229,138,161,232,190,147,229,133,165,228, +184,128,231,155,180,229,159,186,231,161,128,230,149,153,229,173,166,228,186,134, +232,167,163,229,187,186,231,173,145,231,187,147,230,158,156,229,133,168,231,144, +131,233,128,154,231,159,165,232,174,161,229,136,146,229,175,185,228,186,142,232, +137,186,230,156,175,231,155,184,229,134,140,229,143,145,231,148,159,231,156,159, +231,154,132,229,187,186,231,171,139,231,173,137,231,186,167,231,177,187,229,158, +139,231,187,143,233,170,140,229,174,158,231,142,176,229,136,182,228,189,156,230, +157,165,232,135,170,230,160,135,231,173,190,228,187,165,228,184,139,229,142,159, +229,136,155,230,151,160,230,179,149,229,133,182,228,184,173,229,128,139,228,186, +186,228,184,128,229,136,135,230,140,135,229,141,151,229,133,179,233,151,173,233, +155,134,229,155,162,231,172,172,228,184,137,229,133,179,230,179,168,229,155,160, +230,173,164,231,133,167,231,137,135,230,183,177,229,156,179,229,149,134,228,184, +154,229,185,191,229,183,158,230,151,165,230,156,159,233,171,152,231,186,167,230, +156,128,232,191,145,231,187,188,229,144,136,232,161,168,231,164,186,228,184,147, +232,190,145,232,161,140,228,184,186,228,186,164,233,128,154,232,175,132,228,187, +183,232,167,137,229,190,151,231,178,190,229,141,142,229,174,182,229,186,173,229, +174,140,230,136,144,230,132,159,232,167,137,229,174,137,232,163,133,229,190,151, +229,136,176,233,130,174,228,187,182,229,136,182,229,186,166,233,163,159,229,147, +129,232,153,189,231,132,182,232,189,172,232,189,189,230,138,165,228,187,183,232, +174,176,232,128,133,230,150,185,230,161,136,232,161,140,230,148,191,228,186,186, +230,176,145,231,148,168,229,147,129,228,184,156,232,165,191,230,143,144,229,135, +186,233,133,146,229,186,151,231,132,182,229,144,142,228,187,152,230,172,190,231, +131,173,231,130,185,228,187,165,229,137,141,229,174,140,229,133,168,229,143,145, +229,184,150,232,174,190,231,189,174,233,162,134,229,175,188,229,183,165,228,184, +154,229,140,187,233,153,162,231,156,139,231,156,139,231,187,143,229,133,184,229, +142,159,229,155,160,229,185,179,229,143,176,229,144,132,231,167,141,229,162,158, +229,138,160,230,157,144,230,150,153,230,150,176,229,162,158,228,185,139,229,144, +142,232,129,140,228,184,154,230,149,136,230,158,156,228,187,138,229,185,180,232, +174,186,230,150,135,230,136,145,229,155,189,229,145,138,232,175,137,231,137,136, +228,184,187,228,191,174,230,148,185,229,143,130,228,184,142,230,137,147,229,141, +176,229,191,171,228,185,144,230,156,186,230,162,176,232,167,130,231,130,185,229, +173,152,229,156,168,231,178,190,231,165,158,232,142,183,229,190,151,229,136,169, +231,148,168,231,187,167,231,187,173,228,189,160,228,187,172,232,191,153,228,185, +136,230,168,161,229,188,143,232,175,173,232,168,128,232,131,189,229,164,159,233, +155,133,232,153,142,230,147,141,228,189,156,233,163,142,230,160,188,228,184,128, +232,181,183,231,167,145,229,173,166,228,189,147,232,130,178,231,159,173,228,191, +161,230,157,161,228,187,182,230,178,187,231,150,151,232,191,144,229,138,168,228, +186,167,228,184,154,228,188,154,232,174,174,229,175,188,232,136,170,229,133,136, +231,148,159,232,129,148,231,155,159,229,143,175,230,152,175,229,149,143,233,161, +140,231,187,147,230,158,132,228,189,156,231,148,168,232,176,131,230,159,165,232, +179,135,230,150,153,232,135,170,229,138,168,232,180,159,232,180,163,229,134,156, +228,184,154,232,174,191,233,151,174,229,174,158,230,150,189,230,142,165,229,143, +151,232,174,168,232,174,186,233,130,163,228,184,170,229,143,141,233,166,136,229, +138,160,229,188,186,229,165,179,230,128,167,232,140,131,229,155,180,230,156,141, +229,139,153,228,188,145,233,151,178,228,187,138,230,151,165,229,174,162,230,156, +141,232,167,128,231,156,139,229,143,130,229,138,160,231,154,132,232,175,157,228, +184,128,231,130,185,228,191,157,232,175,129,229,155,190,228,185,166,230,156,137, +230,149,136,230,181,139,232,175,149,231,167,187,229,138,168,230,137,141,232,131, +189,229,134,179,229,174,154,232,130,161,231,165,168,228,184,141,230,150,173,233, +156,128,230,177,130,228,184,141,229,190,151,229,138,158,230,179,149,228,185,139, +233,151,180,233,135,135,231,148,168,232,144,165,233,148,128,230,138,149,232,175, +137,231,155,174,230,160,135,231,136,177,230,131,133,230,145,132,229,189,177,230, +156,137,228,186,155,232,164,135,232,163,189,230,150,135,229,173,166,230,156,186, +228,188,154,230,149,176,229,173,151,232,163,133,228,191,174,232,180,173,231,137, +169,229,134,156,230,157,145,229,133,168,233,157,162,231,178,190,229,147,129,229, +133,182,229,174,158,228,186,139,230,131,133,230,176,180,229,185,179,230,143,144, +231,164,186,228,184,138,229,184,130,232,176,162,232,176,162,230,153,174,233,128, +154,230,149,153,229,184,136,228,184,138,228,188,160,231,177,187,229,136,171,230, +173,140,230,155,178,230,139,165,230,156,137,229,136,155,230,150,176,233,133,141, +228,187,182,229,143,170,232,166,129,230,151,182,228,187,163,232,179,135,232,168, +138,232,190,190,229,136,176,228,186,186,231,148,159,232,174,162,233,152,133,232, +128,129,229,184,136,229,177,149,231,164,186,229,191,131,231,144,134,232,180,180, +229,173,144,231,182,178,231,171,153,228,184,187,233,161,140,232,135,170,231,132, +182,231,186,167,229,136,171,231,174,128,229,141,149,230,148,185,233,157,169,233, +130,163,228,186,155,230,157,165,232,175,180,230,137,147,229,188,128,228,187,163, +231,160,129,229,136,160,233,153,164,232,175,129,229,136,184,232,138,130,231,155, +174,233,135,141,231,130,185,230,172,161,230,149,184,229,164,154,229,176,145,232, +167,132,229,136,146,232,181,132,233,135,145,230,137,190,229,136,176,228,187,165, +229,144,142,229,164,167,229,133,168,228,184,187,233,161,181,230,156,128,228,189, +179,229,155,158,231,173,148,229,164,169,228,184,139,228,191,157,233,154,156,231, +142,176,228,187,163,230,163,128,230,159,165,230,138,149,231,165,168,229,176,143, +230,151,182,230,178,146,230,156,137,230,173,163,229,184,184,231,148,154,232,135, +179,228,187,163,231,144,134,231,155,174,229,189,149,229,133,172,229,188,128,229, +164,141,229,136,182,233,135,145,232,158,141,229,185,184,231,166,143,231,137,136, +230,156,172,229,189,162,230,136,144,229,135,134,229,164,135,232,161,140,230,131, +133,229,155,158,229,136,176,230,128,157,230,131,179,230,128,142,230,160,183,229, +141,143,232,174,174,232,174,164,232,175,129,230,156,128,229,165,189,228,186,167, +231,148,159,230,140,137,231,133,167,230,156,141,232,163,133,229,185,191,228,184, +156,229,138,168,230,188,171,233,135,135,232,180,173,230,150,176,230,137,139,231, +187,132,229,155,190,233,157,162,230,157,191,229,143,130,232,128,131,230,148,191, +230,178,187,229,174,185,230,152,147,229,164,169,229,156,176,229,138,170,229,138, +155,228,186,186,228,187,172,229,141,135,231,186,167,233,128,159,229,186,166,228, +186,186,231,137,169,232,176,131,230,149,180,230,181,129,232,161,140,233,128,160, +230,136,144,230,150,135,229,173,151,233,159,169,229,155,189,232,180,184,230,152, +147,229,188,128,229,177,149,231,155,184,233,151,156,232,161,168,231,142,176,229, +189,177,232,167,134,229,166,130,230,173,164,231,190,142,229,174,185,229,164,167, +229,176,143,230,138,165,233,129,147,230,157,161,230,172,190,229,191,131,230,131, +133,232,174,184,229,164,154,230,179,149,232,167,132,229,174,182,229,177,133,228, +185,166,229,186,151,232,191,158,230,142,165,231,171,139,229,141,179,228,184,190, +230,138,165,230,138,128,229,183,167,229,165,165,232,191,144,231,153,187,229,133, +165,228,187,165,230,157,165,231,144,134,232,174,186,228,186,139,228,187,182,232, +135,170,231,148,177,228,184,173,229,141,142,229,138,158,229,133,172,229,166,136, +229,166,136,231,156,159,230,173,163,228,184,141,233,148,153,229,133,168,230,150, +135,229,144,136,229,144,140,228,187,183,229,128,188,229,136,171,228,186,186,231, +155,145,231,157,163,229,133,183,228,189,147,228,184,150,231,186,170,229,155,162, +233,152,159,229,136,155,228,184,154,230,137,191,230,139,133,229,162,158,233,149, +191,230,156,137,228,186,186,228,191,157,230,140,129,229,149,134,229,174,182,231, +187,180,228,191,174,229,143,176,230,185,190,229,183,166,229,143,179,232,130,161, +228,187,189,231,173,148,230,161,136,229,174,158,233,153,133,231,148,181,228,191, +161,231,187,143,231,144,134,231,148,159,229,145,189,229,174,163,228,188,160,228, +187,187,229,138,161,230,173,163,229,188,143,231,137,185,232,137,178,228,184,139, +230,157,165,229,141,143,228,188,154,229,143,170,232,131,189,229,189,147,231,132, +182,233,135,141,230,150,176,229,133,167,229,174,185,230,140,135,229,175,188,232, +191,144,232,161,140,230,151,165,229,191,151,232,179,163,229,174,182,232,182,133, +232,191,135,229,156,159,229,156,176,230,181,153,230,177,159,230,148,175,228,187, +152,230,142,168,229,135,186,231,171,153,233,149,191,230,157,173,229,183,158,230, +137,167,232,161,140,229,136,182,233,128,160,228,185,139,228,184,128,230,142,168, +229,185,191,231,142,176,229,156,186,230,143,143,232,191,176,229,143,152,229,140, +150,228,188,160,231,187,159,230,173,140,230,137,139,228,191,157,233,153,169,232, +175,190,231,168,139,229,140,187,231,150,151,231,187,143,232,191,135,232,191,135, +229,142,187,228,185,139,229,137,141,230,148,182,229,133,165,229,185,180,229,186, +166,230,157,130,229,191,151,231,190,142,228,184,189,230,156,128,233,171,152,231, +153,187,233,153,134,230,156,170,230,157,165,229,138,160,229,183,165,229,133,141, +232,180,163,230,149,153,231,168,139,231,137,136,229,157,151,232,186,171,228,189, +147,233,135,141,229,186,134,229,135,186,229,148,174,230,136,144,230,156,172,229, +189,162,229,188,143,229,156,159,232,177,134,229,135,186,229,131,185,228,184,156, +230,150,185,233,130,174,231,174,177,229,141,151,228,186,172,230,177,130,232,129, +140,229,143,150,229,190,151,232,129,140,228,189,141,231,155,184,228,191,161,233, +161,181,233,157,162,229,136,134,233,146,159,231,189,145,233,161,181,231,161,174, +229,174,154,229,155,190,228,190,139,231,189,145,229,157,128,231,167,175,230,158, +129,233,148,153,232,175,175,231,155,174,231,154,132,229,174,157,232,180,157,230, +156,186,229,133,179,233,163,142,233,153,169,230,142,136,230,157,131,231,151,133, +230,175,146,229,174,160,231,137,169,233,153,164,228,186,134,232,169,149,232,171, +150,231,150,190,231,151,133,229,143,138,230,151,182,230,177,130,232,180,173,231, +171,153,231,130,185,229,132,191,231,171,165,230,175,143,229,164,169,228,184,173, +229,164,174,232,174,164,232,175,134,230,175,143,228,184,170,229,164,169,230,180, +165,229,173,151,228,189,147,229,143,176,231,129,163,231,187,180,230,138,164,230, +156,172,233,161,181,228,184,170,230,128,167,229,174,152,230,150,185,229,184,184, +232,167,129,231,155,184,230,156,186,230,136,152,231,149,165,229,186,148,229,189, +147,229,190,139,229,184,136,230,150,185,228,190,191,230,160,161,229,155,173,232, +130,161,229,184,130,230,136,191,229,177,139,230,160,143,231,155,174,229,145,152, +229,183,165,229,175,188,232,135,180,231,170,129,231,132,182,233,129,147,229,133, +183,230,156,172,231,189,145,231,187,147,229,144,136,230,161,163,230,161,136,229, +138,179,229,138,168,229,143,166,229,164,150,231,190,142,229,133,131,229,188,149, +232,181,183,230,148,185,229,143,152,231,172,172,229,155,155,228,188,154,232,174, +161,232,170,170,230,152,142,233,154,144,231,167,129,229,174,157,229,174,157,232, +167,132,232,140,131,230,182,136,232,180,185,229,133,177,229,144,140,229,191,152, +232,174,176,228,189,147,231,179,187,229,184,166,230,157,165,229,144,141,229,173, +151,231,153,188,232,161,168,229,188,128,230,148,190,229,138,160,231,155,159,229, +143,151,229,136,176,228,186,140,230,137,139,229,164,167,233,135,143,230,136,144, +228,186,186,230,149,176,233,135,143,229,133,177,228,186,171,229,140,186,229,159, +159,229,165,179,229,173,169,229,142,159,229,136,153,230,137,128,229,156,168,231, +187,147,230,157,159,233,128,154,228,191,161,232,182,133,231,186,167,233,133,141, +231,189,174,229,189,147,230,151,182,228,188,152,231,167,128,230,128,167,230,132, +159,230,136,191,228,186,167,233,129,138,230,136,178,229,135,186,229,143,163,230, +143,144,228,186,164,229,176,177,228,184,154,228,191,157,229,129,165,231,168,139, +229,186,166,229,143,130,230,149,176,228,186,139,228,184,154,230,149,180,228,184, +170,229,177,177,228,184,156,230,131,133,230,132,159,231,137,185,230,174,138,229, +136,134,233,161,158,230,144,156,229,176,139,229,177,158,228,186,142,233,151,168, +230,136,183,232,180,162,229,138,161,229,163,176,233,159,179,229,143,138,229,133, +182,232,180,162,231,187,143,229,157,154,230,140,129,229,185,178,233,131,168,230, +136,144,231,171,139,229,136,169,231,155,138,232,128,131,232,153,145,230,136,144, +233,131,189,229,140,133,232,163,133,231,148,168,230,136,182,230,175,148,232,181, +155,230,150,135,230,152,142,230,139,155,229,149,134,229,174,140,230,149,180,231, +156,159,230,152,175,231,156,188,231,157,155,228,188,153,228,188,180,229,168,129, +230,156,155,233,162,134,229,159,159,229,141,171,231,148,159,228,188,152,230,131, +160,232,171,150,229,163,135,229,133,172,229,133,177,232,137,175,229,165,189,229, +133,133,229,136,134,231,172,166,229,144,136,233,153,132,228,187,182,231,137,185, +231,130,185,228,184,141,229,143,175,232,139,177,230,150,135,232,181,132,228,186, +167,230,160,185,230,156,172,230,152,142,230,152,190,229,175,134,231,162,188,229, +133,172,228,188,151,230,176,145,230,151,143,230,155,180,229,138,160,228,186,171, +229,143,151,229,144,140,229,173,166,229,144,175,229,138,168,233,128,130,229,144, +136,229,142,159,230,157,165,233,151,174,231,173,148,230,156,172,230,150,135,231, +190,142,233,163,159,231,187,191,232,137,178,231,168,179,229,174,154,231,187,136, +228,186,142,231,148,159,231,137,169,228,190,155,230,177,130,230,144,156,231,139, +144,229,138,155,233,135,143,228,184,165,233,135,141,230,176,184,232,191,156,229, +134,153,231,156,159,230,156,137,233,153,144,231,171,158,228,186,137,229,175,185, +232,177,161,232,180,185,231,148,168,228,184,141,229,165,189,231,187,157,229,175, +185,229,141,129,229,136,134,228,191,131,232,191,155,231,130,185,232,175,132,229, +189,177,233,159,179,228,188,152,229,138,191,228,184,141,229,176,145,230,172,163, +232,181,143,229,185,182,228,184,148,230,156,137,231,130,185,230,150,185,229,144, +145,229,133,168,230,150,176,228,191,161,231,148,168,232,174,190,230,150,189,229, +189,162,232,177,161,232,181,132,230,160,188,231,170,129,231,160,180,233,154,143, +231,157,128,233,135,141,229,164,167,228,186,142,230,152,175,230,175,149,228,184, +154,230,153,186,232,131,189,229,140,150,229,183,165,229,174,140,231,190,142,229, +149,134,229,159,142,231,187,159,228,184,128,229,135,186,231,137,136,230,137,147, +233,128,160,231,148,162,229,147,129,230,166,130,229,134,181,231,148,168,228,186, +142,228,191,157,231,149,153,229,155,160,231,180,160,228,184,173,229,156,139,229, +173,152,229,130,168,232,180,180,229,155,190,230,156,128,230,132,155,233,149,191, +230,156,159,229,143,163,228,187,183,231,144,134,232,180,162,229,159,186,229,156, +176,229,174,137,230,142,146,230,173,166,230,177,137,233,135,140,233,157,162,229, +136,155,229,187,186,229,164,169,231,169,186,233,166,150,229,133,136,229,174,140, +229,150,132,233,169,177,229,138,168,228,184,139,233,157,162,228,184,141,229,134, +141,232,175,154,228,191,161,230,132,143,228,185,137,233,152,179,229,133,137,232, +139,177,229,155,189,230,188,130,228,186,174,229,134,155,228,186,139,231,142,169, +229,174,182,231,190,164,228,188,151,229,134,156,230,176,145,229,141,179,229,143, +175,229,144,141,231,168,177,229,174,182,229,133,183,229,138,168,231,148,187,230, +131,179,229,136,176,230,179,168,230,152,142,229,176,143,229,173,166,230,128,167, +232,131,189,232,128,131,231,160,148,231,161,172,228,187,182,232,167,130,231,156, +139,230,184,133,230,165,154,230,144,158,231,172,145,233,166,150,233,160,129,233, +187,132,233,135,145,233,128,130,231,148,168,230,177,159,232,139,143,231,156,159, +229,174,158,228,184,187,231,174,161,233,152,182,230,174,181,232,168,187,229,134, +138,231,191,187,232,175,145,230,157,131,229,136,169,229,129,154,229,165,189,228, +188,188,228,185,142,233,128,154,232,174,175,230,150,189,229,183,165,231,139,128, +230,133,139,228,185,159,232,174,184,231,142,175,228,191,157,229,159,185,229,133, +187,230,166,130,229,191,181,229,164,167,229,158,139,230,156,186,231,165,168,231, +144,134,232,167,163,229,140,191,229,144,141,99,117,97,110,100,111,101,110,118, +105,97,114,109,97,100,114,105,100,98,117,115,99,97,114,105,110,105,99,105,111, +116,105,101,109,112,111,112,111,114,113,117,101,99,117,101,110,116,97,101,115, +116,97,100,111,112,117,101,100,101,110,106,117,101,103,111,115,99,111,110,116, +114,97,101,115,116,195,161,110,110,111,109,98,114,101,116,105,101,110,101,110, +112,101,114,102,105,108,109,97,110,101,114,97,97,109,105,103,111,115,99,105,117, +100,97,100,99,101,110,116,114,111,97,117,110,113,117,101,112,117,101,100,101,115 +,100,101,110,116,114,111,112,114,105,109,101,114,112,114,101,99,105,111,115,101, +103,195,186,110,98,117,101,110,111,115,118,111,108,118,101,114,112,117,110,116, +111,115,115,101,109,97,110,97,104,97,98,195,173,97,97,103,111,115,116,111,110, +117,101,118,111,115,117,110,105,100,111,115,99,97,114,108,111,115,101,113,117, +105,112,111,110,105,195,177,111,115,109,117,99,104,111,115,97,108,103,117,110,97 +,99,111,114,114,101,111,105,109,97,103,101,110,112,97,114,116,105,114,97,114,114 +,105,98,97,109,97,114,195,173,97,104,111,109,98,114,101,101,109,112,108,101,111, +118,101,114,100,97,100,99,97,109,98,105,111,109,117,99,104,97,115,102,117,101, +114,111,110,112,97,115,97,100,111,108,195,173,110,101,97,112,97,114,101,99,101, +110,117,101,118,97,115,99,117,114,115,111,115,101,115,116,97,98,97,113,117,105, +101,114,111,108,105,98,114,111,115,99,117,97,110,116,111,97,99,99,101,115,111, +109,105,103,117,101,108,118,97,114,105,111,115,99,117,97,116,114,111,116,105,101 +,110,101,115,103,114,117,112,111,115,115,101,114,195,161,110,101,117,114,111,112 +,97,109,101,100,105,111,115,102,114,101,110,116,101,97,99,101,114,99,97,100,101, +109,195,161,115,111,102,101,114,116,97,99,111,99,104,101,115,109,111,100,101,108 +,111,105,116,97,108,105,97,108,101,116,114,97,115,97,108,103,195,186,110,99,111, +109,112,114,97,99,117,97,108,101,115,101,120,105,115,116,101,99,117,101,114,112, +111,115,105,101,110,100,111,112,114,101,110,115,97,108,108,101,103,97,114,118, +105,97,106,101,115,100,105,110,101,114,111,109,117,114,99,105,97,112,111,100,114 +,195,161,112,117,101,115,116,111,100,105,97,114,105,111,112,117,101,98,108,111, +113,117,105,101,114,101,109,97,110,117,101,108,112,114,111,112,105,111,99,114, +105,115,105,115,99,105,101,114,116,111,115,101,103,117,114,111,109,117,101,114, +116,101,102,117,101,110,116,101,99,101,114,114,97,114,103,114,97,110,100,101,101 +,102,101,99,116,111,112,97,114,116,101,115,109,101,100,105,100,97,112,114,111, +112,105,97,111,102,114,101,99,101,116,105,101,114,114,97,101,45,109,97,105,108, +118,97,114,105,97,115,102,111,114,109,97,115,102,117,116,117,114,111,111,98,106, +101,116,111,115,101,103,117,105,114,114,105,101,115,103,111,110,111,114,109,97, +115,109,105,115,109,111,115,195,186,110,105,99,111,99,97,109,105,110,111,115,105 +,116,105,111,115,114,97,122,195,179,110,100,101,98,105,100,111,112,114,117,101, +98,97,116,111,108,101,100,111,116,101,110,195,173,97,106,101,115,195,186,115,101 +,115,112,101,114,111,99,111,99,105,110,97,111,114,105,103,101,110,116,105,101, +110,100,97,99,105,101,110,116,111,99,195,161,100,105,122,104,97,98,108,97,114, +115,101,114,195,173,97,108,97,116,105,110,97,102,117,101,114,122,97,101,115,116, +105,108,111,103,117,101,114,114,97,101,110,116,114,97,114,195,169,120,105,116, +111,108,195,179,112,101,122,97,103,101,110,100,97,118,195,173,100,101,111,101, +118,105,116,97,114,112,97,103,105,110,97,109,101,116,114,111,115,106,97,118,105, +101,114,112,97,100,114,101,115,102,195,161,99,105,108,99,97,98,101,122,97,195, +161,114,101,97,115,115,97,108,105,100,97,101,110,118,195,173,111,106,97,112,195, +179,110,97,98,117,115,111,115,98,105,101,110,101,115,116,101,120,116,111,115,108 +,108,101,118,97,114,112,117,101,100,97,110,102,117,101,114,116,101,99,111,109, +195,186,110,99,108,97,115,101,115,104,117,109,97,110,111,116,101,110,105,100,111 +,98,105,108,98,97,111,117,110,105,100,97,100,101,115,116,195,161,115,101,100,105 +,116,97,114,99,114,101,97,100,111,208,180,208,187,209,143,209,135,209,130,208, +190,208,186,208,176,208,186,208,184,208,187,208,184,209,141,209,130,208,190,208, +178,209,129,208,181,208,181,208,179,208,190,208,191,209,128,208,184,209,130,208, +176,208,186,208,181,209,137,208,181,209,131,208,182,208,181,208,154,208,176,208, +186,208,177,208,181,208,183,208,177,209,139,208,187,208,190,208,189,208,184,208, +146,209,129,208,181,208,191,208,190,208,180,208,173,209,130,208,190,209,130,208, +190,208,188,209,135,208,181,208,188,208,189,208,181,209,130,208,187,208,181,209, +130,209,128,208,176,208,183,208,190,208,189,208,176,208,179,208,180,208,181,208, +188,208,189,208,181,208,148,208,187,209,143,208,159,209,128,208,184,208,189,208, +176,209,129,208,189,208,184,209,133,209,130,208,181,208,188,208,186,209,130,208, +190,208,179,208,190,208,180,208,178,208,190,209,130,209,130,208,176,208,188,208, +161,208,168,208,144,208,188,208,176,209,143,208,167,209,130,208,190,208,178,208, +176,209,129,208,178,208,176,208,188,208,181,208,188,209,131,208,162,208,176,208, +186,208,180,208,178,208,176,208,189,208,176,208,188,209,141,209,130,208,184,209, +141,209,130,209,131,208,146,208,176,208,188,209,130,208,181,209,133,208,191,209, +128,208,190,209,130,209,131,209,130,208,189,208,176,208,180,208,180,208,189,209, +143,208,146,208,190,209,130,209,130,209,128,208,184,208,189,208,181,208,185,208, +146,208,176,209,129,208,189,208,184,208,188,209,129,208,176,208,188,209,130,208, +190,209,130,209,128,209,131,208,177,208,158,208,189,208,184,208,188,208,184,209, +128,208,189,208,181,208,181,208,158,208,158,208,158,208,187,208,184,209,134,209, +141,209,130,208,176,208,158,208,189,208,176,208,189,208,181,208,188,208,180,208, +190,208,188,208,188,208,190,208,185,208,180,208,178,208,181,208,190,208,189,208, +190,209,129,209,131,208,180,224,164,149,224,165,135,224,164,185,224,165,136,224, +164,149,224,165,128,224,164,184,224,165,135,224,164,149,224,164,190,224,164,149, +224,165,139,224,164,148,224,164,176,224,164,170,224,164,176,224,164,168,224,165, +135,224,164,143,224,164,149,224,164,149,224,164,191,224,164,173,224,165,128,224, +164,135,224,164,184,224,164,149,224,164,176,224,164,164,224,165,139,224,164,185, +224,165,139,224,164,134,224,164,170,224,164,185,224,165,128,224,164,175,224,164, +185,224,164,175,224,164,190,224,164,164,224,164,149,224,164,165,224,164,190,106, +97,103,114,97,110,224,164,134,224,164,156,224,164,156,224,165,139,224,164,133, +224,164,172,224,164,166,224,165,139,224,164,151,224,164,136,224,164,156,224,164, +190,224,164,151,224,164,143,224,164,185,224,164,174,224,164,135,224,164,168,224, +164,181,224,164,185,224,164,175,224,165,135,224,164,165,224,165,135,224,164,165, +224,165,128,224,164,152,224,164,176,224,164,156,224,164,172,224,164,166,224,165, +128,224,164,149,224,164,136,224,164,156,224,165,128,224,164,181,224,165,135,224, +164,168,224,164,136,224,164,168,224,164,143,224,164,185,224,164,176,224,164,137, +224,164,184,224,164,174,224,165,135,224,164,149,224,164,174,224,164,181,224,165, +139,224,164,178,224,165,135,224,164,184,224,164,172,224,164,174,224,164,136,224, +164,166,224,165,135,224,164,147,224,164,176,224,164,134,224,164,174,224,164,172, +224,164,184,224,164,173,224,164,176,224,164,172,224,164,168,224,164,154,224,164, +178,224,164,174,224,164,168,224,164,134,224,164,151,224,164,184,224,165,128,224, +164,178,224,165,128,216,185,217,132,217,137,216,165,217,132,217,137,217,135,216, +176,216,167,216,162,216,174,216,177,216,185,216,175,216,175,216,167,217,132,217, +137,217,135,216,176,217,135,216,181,217,136,216,177,216,186,217,138,216,177,217, +131,216,167,217,134,217,136,217,132,216,167,216,168,217,138,217,134,216,185,216, +177,216,182,216,176,217,132,217,131,217,135,217,134,216,167,217,138,217,136,217, +133,217,130,216,167,217,132,216,185,217,132,217,138,216,167,217,134,216,167,217, +132,217,131,217,134,216,173,216,170,217,137,217,130,216,168,217,132,217,136,216, +173,216,169,216,167,216,174,216,177,217,129,217,130,216,183,216,185,216,168,216, +175,216,177,217,131,217,134,216,165,216,176,216,167,217,131,217,133,216,167,216, +167,216,173,216,175,216,165,217,132,216,167,217,129,217,138,217,135,216,168,216, +185,216,182,217,131,217,138,217,129,216,168,216,173,216,171,217,136,217,133,217, +134,217,136,217,135,217,136,216,163,217,134,216,167,216,172,216,175,216,167,217, +132,217,135,216,167,216,179,217,132,217,133,216,185,217,134,216,175,217,132,217, +138,216,179,216,185,216,168,216,177,216,181,217,132,217,137,217,133,217,134,216, +176,216,168,217,135,216,167,216,163,217,134,217,135,217,133,216,171,217,132,217, +131,217,134,216,170,216,167,217,132,216,167,216,173,217,138,216,171,217,133,216, +181,216,177,216,180,216,177,216,173,216,173,217,136,217,132,217,136,217,129,217, +138,216,167,216,176,216,167,217,132,217,131,217,132,217,133,216,177,216,169,216, +167,217,134,216,170,216,167,217,132,217,129,216,163,216,168,217,136,216,174,216, +167,216,181,216,163,217,134,216,170,216,167,217,134,217,135,216,167,217,132,217, +138,216,185,216,182,217,136,217,136,217,130,216,175,216,167,216,168,217,134,216, +174,217,138,216,177,216,168,217,134,216,170,217,132,217,131,217,133,216,180,216, +167,216,161,217,136,217,135,217,138,216,167,216,168,217,136,217,130,216,181,216, +181,217,136,217,133,216,167,216,177,217,130,217,133,216,163,216,173,216,175,217, +134,216,173,217,134,216,185,216,175,217,133,216,177,216,163,217,138,216,167,216, +173,216,169,217,131,216,170,216,168,216,175,217,136,217,134,217,138,216,172,216, +168,217,133,217,134,217,135,216,170,216,173,216,170,216,172,217,135,216,169,216, +179,217,134,216,169,217,138,216,170,217,133,217,131,216,177,216,169,216,186,216, +178,216,169,217,134,217,129,216,179,216,168,217,138,216,170,217,132,217,132,217, +135,217,132,217,134,216,167,216,170,217,132,217,131,217,130,217,132,216,168,217, +132,217,133,216,167,216,185,217,134,217,135,216,163,217,136,217,132,216,180,217, +138,216,161,217,134,217,136,216,177,216,163,217,133,216,167,217,129,217,138,217, +131,216,168,217,131,217,132,216,176,216,167,216,170,216,177,216,170,216,168,216, +168,216,163,217,134,217,135,217,133,216,179,216,167,217,134,217,131,216,168,217, +138,216,185,217,129,217,130,216,175,216,173,216,179,217,134,217,132,217,135,217, +133,216,180,216,185,216,177,216,163,217,135,217,132,216,180,217,135,216,177,217, +130,216,183,216,177,216,183,217,132,216,168,112,114,111,102,105,108,101,115,101, +114,118,105,99,101,100,101,102,97,117,108,116,104,105,109,115,101,108,102,100, +101,116,97,105,108,115,99,111,110,116,101,110,116,115,117,112,112,111,114,116, +115,116,97,114,116,101,100,109,101,115,115,97,103,101,115,117,99,99,101,115,115, +102,97,115,104,105,111,110,60,116,105,116,108,101,62,99,111,117,110,116,114,121, +97,99,99,111,117,110,116,99,114,101,97,116,101,100,115,116,111,114,105,101,115, +114,101,115,117,108,116,115,114,117,110,110,105,110,103,112,114,111,99,101,115, +115,119,114,105,116,105,110,103,111,98,106,101,99,116,115,118,105,115,105,98,108 +,101,119,101,108,99,111,109,101,97,114,116,105,99,108,101,117,110,107,110,111, +119,110,110,101,116,119,111,114,107,99,111,109,112,97,110,121,100,121,110,97,109 +,105,99,98,114,111,119,115,101,114,112,114,105,118,97,99,121,112,114,111,98,108, +101,109,83,101,114,118,105,99,101,114,101,115,112,101,99,116,100,105,115,112,108 +,97,121,114,101,113,117,101,115,116,114,101,115,101,114,118,101,119,101,98,115, +105,116,101,104,105,115,116,111,114,121,102,114,105,101,110,100,115,111,112,116, +105,111,110,115,119,111,114,107,105,110,103,118,101,114,115,105,111,110,109,105, +108,108,105,111,110,99,104,97,110,110,101,108,119,105,110,100,111,119,46,97,100, +100,114,101,115,115,118,105,115,105,116,101,100,119,101,97,116,104,101,114,99, +111,114,114,101,99,116,112,114,111,100,117,99,116,101,100,105,114,101,99,116,102 +,111,114,119,97,114,100,121,111,117,32,99,97,110,114,101,109,111,118,101,100,115 +,117,98,106,101,99,116,99,111,110,116,114,111,108,97,114,99,104,105,118,101,99, +117,114,114,101,110,116,114,101,97,100,105,110,103,108,105,98,114,97,114,121,108 +,105,109,105,116,101,100,109,97,110,97,103,101,114,102,117,114,116,104,101,114, +115,117,109,109,97,114,121,109,97,99,104,105,110,101,109,105,110,117,116,101,115 +,112,114,105,118,97,116,101,99,111,110,116,101,120,116,112,114,111,103,114,97, +109,115,111,99,105,101,116,121,110,117,109,98,101,114,115,119,114,105,116,116, +101,110,101,110,97,98,108,101,100,116,114,105,103,103,101,114,115,111,117,114,99 +,101,115,108,111,97,100,105,110,103,101,108,101,109,101,110,116,112,97,114,116, +110,101,114,102,105,110,97,108,108,121,112,101,114,102,101,99,116,109,101,97,110 +,105,110,103,115,121,115,116,101,109,115,107,101,101,112,105,110,103,99,117,108, +116,117,114,101,38,113,117,111,116,59,44,106,111,117,114,110,97,108,112,114,111, +106,101,99,116,115,117,114,102,97,99,101,115,38,113,117,111,116,59,101,120,112, +105,114,101,115,114,101,118,105,101,119,115,98,97,108,97,110,99,101,69,110,103, +108,105,115,104,67,111,110,116,101,110,116,116,104,114,111,117,103,104,80,108, +101,97,115,101,32,111,112,105,110,105,111,110,99,111,110,116,97,99,116,97,118, +101,114,97,103,101,112,114,105,109,97,114,121,118,105,108,108,97,103,101,83,112, +97,110,105,115,104,103,97,108,108,101,114,121,100,101,99,108,105,110,101,109,101 +,101,116,105,110,103,109,105,115,115,105,111,110,112,111,112,117,108,97,114,113, +117,97,108,105,116,121,109,101,97,115,117,114,101,103,101,110,101,114,97,108,115 +,112,101,99,105,101,115,115,101,115,115,105,111,110,115,101,99,116,105,111,110, +119,114,105,116,101,114,115,99,111,117,110,116,101,114,105,110,105,116,105,97, +108,114,101,112,111,114,116,115,102,105,103,117,114,101,115,109,101,109,98,101, +114,115,104,111,108,100,105,110,103,100,105,115,112,117,116,101,101,97,114,108, +105,101,114,101,120,112,114,101,115,115,100,105,103,105,116,97,108,112,105,99, +116,117,114,101,65,110,111,116,104,101,114,109,97,114,114,105,101,100,116,114,97 +,102,102,105,99,108,101,97,100,105,110,103,99,104,97,110,103,101,100,99,101,110, +116,114,97,108,118,105,99,116,111,114,121,105,109,97,103,101,115,47,114,101,97, +115,111,110,115,115,116,117,100,105,101,115,102,101,97,116,117,114,101,108,105, +115,116,105,110,103,109,117,115,116,32,98,101,115,99,104,111,111,108,115,86,101, +114,115,105,111,110,117,115,117,97,108,108,121,101,112,105,115,111,100,101,112, +108,97,121,105,110,103,103,114,111,119,105,110,103,111,98,118,105,111,117,115, +111,118,101,114,108,97,121,112,114,101,115,101,110,116,97,99,116,105,111,110,115 +,60,47,117,108,62,13,10,119,114,97,112,112,101,114,97,108,114,101,97,100,121,99, +101,114,116,97,105,110,114,101,97,108,105,116,121,115,116,111,114,97,103,101,97, +110,111,116,104,101,114,100,101,115,107,116,111,112,111,102,102,101,114,101,100, +112,97,116,116,101,114,110,117,110,117,115,117,97,108,68,105,103,105,116,97,108, +99,97,112,105,116,97,108,87,101,98,115,105,116,101,102,97,105,108,117,114,101,99 +,111,110,110,101,99,116,114,101,100,117,99,101,100,65,110,100,114,111,105,100, +100,101,99,97,100,101,115,114,101,103,117,108,97,114,32,38,97,109,112,59,32,97, +110,105,109,97,108,115,114,101,108,101,97,115,101,65,117,116,111,109,97,116,103, +101,116,116,105,110,103,109,101,116,104,111,100,115,110,111,116,104,105,110,103, +80,111,112,117,108,97,114,99,97,112,116,105,111,110,108,101,116,116,101,114,115, +99,97,112,116,117,114,101,115,99,105,101,110,99,101,108,105,99,101,110,115,101, +99,104,97,110,103,101,115,69,110,103,108,97,110,100,61,49,38,97,109,112,59,72, +105,115,116,111,114,121,32,61,32,110,101,119,32,67,101,110,116,114,97,108,117, +112,100,97,116,101,100,83,112,101,99,105,97,108,78,101,116,119,111,114,107,114, +101,113,117,105,114,101,99,111,109,109,101,110,116,119,97,114,110,105,110,103,67 +,111,108,108,101,103,101,116,111,111,108,98,97,114,114,101,109,97,105,110,115,98 +,101,99,97,117,115,101,101,108,101,99,116,101,100,68,101,117,116,115,99,104,102, +105,110,97,110,99,101,119,111,114,107,101,114,115,113,117,105,99,107,108,121,98, +101,116,119,101,101,110,101,120,97,99,116,108,121,115,101,116,116,105,110,103, +100,105,115,101,97,115,101,83,111,99,105,101,116,121,119,101,97,112,111,110,115, +101,120,104,105,98,105,116,38,108,116,59,33,45,45,67,111,110,116,114,111,108,99, +108,97,115,115,101,115,99,111,118,101,114,101,100,111,117,116,108,105,110,101,97 +,116,116,97,99,107,115,100,101,118,105,99,101,115,40,119,105,110,100,111,119,112 +,117,114,112,111,115,101,116,105,116,108,101,61,34,77,111,98,105,108,101,32,107, +105,108,108,105,110,103,115,104,111,119,105,110,103,73,116,97,108,105,97,110,100 +,114,111,112,112,101,100,104,101,97,118,105,108,121,101,102,102,101,99,116,115, +45,49,39,93,41,59,10,99,111,110,102,105,114,109,67,117,114,114,101,110,116,97, +100,118,97,110,99,101,115,104,97,114,105,110,103,111,112,101,110,105,110,103,100 +,114,97,119,105,110,103,98,105,108,108,105,111,110,111,114,100,101,114,101,100, +71,101,114,109,97,110,121,114,101,108,97,116,101,100,60,47,102,111,114,109,62, +105,110,99,108,117,100,101,119,104,101,116,104,101,114,100,101,102,105,110,101, +100,83,99,105,101,110,99,101,99,97,116,97,108,111,103,65,114,116,105,99,108,101, +98,117,116,116,111,110,115,108,97,114,103,101,115,116,117,110,105,102,111,114, +109,106,111,117,114,110,101,121,115,105,100,101,98,97,114,67,104,105,99,97,103, +111,104,111,108,105,100,97,121,71,101,110,101,114,97,108,112,97,115,115,97,103, +101,44,38,113,117,111,116,59,97,110,105,109,97,116,101,102,101,101,108,105,110, +103,97,114,114,105,118,101,100,112,97,115,115,105,110,103,110,97,116,117,114,97, +108,114,111,117,103,104,108,121,46,10,10,84,104,101,32,98,117,116,32,110,111,116 +,100,101,110,115,105,116,121,66,114,105,116,97,105,110,67,104,105,110,101,115, +101,108,97,99,107,32,111,102,116,114,105,98,117,116,101,73,114,101,108,97,110, +100,34,32,100,97,116,97,45,102,97,99,116,111,114,115,114,101,99,101,105,118,101, +116,104,97,116,32,105,115,76,105,98,114,97,114,121,104,117,115,98,97,110,100,105 +,110,32,102,97,99,116,97,102,102,97,105,114,115,67,104,97,114,108,101,115,114,97 +,100,105,99,97,108,98,114,111,117,103,104,116,102,105,110,100,105,110,103,108,97 +,110,100,105,110,103,58,108,97,110,103,61,34,114,101,116,117,114,110,32,108,101, +97,100,101,114,115,112,108,97,110,110,101,100,112,114,101,109,105,117,109,112,97 +,99,107,97,103,101,65,109,101,114,105,99,97,69,100,105,116,105,111,110,93,38,113 +,117,111,116,59,77,101,115,115,97,103,101,110,101,101,100,32,116,111,118,97,108, +117,101,61,34,99,111,109,112,108,101,120,108,111,111,107,105,110,103,115,116,97, +116,105,111,110,98,101,108,105,101,118,101,115,109,97,108,108,101,114,45,109,111 +,98,105,108,101,114,101,99,111,114,100,115,119,97,110,116,32,116,111,107,105,110 +,100,32,111,102,70,105,114,101,102,111,120,121,111,117,32,97,114,101,115,105,109 +,105,108,97,114,115,116,117,100,105,101,100,109,97,120,105,109,117,109,104,101, +97,100,105,110,103,114,97,112,105,100,108,121,99,108,105,109,97,116,101,107,105, +110,103,100,111,109,101,109,101,114,103,101,100,97,109,111,117,110,116,115,102, +111,117,110,100,101,100,112,105,111,110,101,101,114,102,111,114,109,117,108,97, +100,121,110,97,115,116,121,104,111,119,32,116,111,32,83,117,112,112,111,114,116, +114,101,118,101,110,117,101,101,99,111,110,111,109,121,82,101,115,117,108,116, +115,98,114,111,116,104,101,114,115,111,108,100,105,101,114,108,97,114,103,101, +108,121,99,97,108,108,105,110,103,46,38,113,117,111,116,59,65,99,99,111,117,110, +116,69,100,119,97,114,100,32,115,101,103,109,101,110,116,82,111,98,101,114,116, +32,101,102,102,111,114,116,115,80,97,99,105,102,105,99,108,101,97,114,110,101, +100,117,112,32,119,105,116,104,104,101,105,103,104,116,58,119,101,32,104,97,118, +101,65,110,103,101,108,101,115,110,97,116,105,111,110,115,95,115,101,97,114,99, +104,97,112,112,108,105,101,100,97,99,113,117,105,114,101,109,97,115,115,105,118, +101,103,114,97,110,116,101,100,58,32,102,97,108,115,101,116,114,101,97,116,101, +100,98,105,103,103,101,115,116,98,101,110,101,102,105,116,100,114,105,118,105, +110,103,83,116,117,100,105,101,115,109,105,110,105,109,117,109,112,101,114,104, +97,112,115,109,111,114,110,105,110,103,115,101,108,108,105,110,103,105,115,32, +117,115,101,100,114,101,118,101,114,115,101,118,97,114,105,97,110,116,32,114,111 +,108,101,61,34,109,105,115,115,105,110,103,97,99,104,105,101,118,101,112,114,111 +,109,111,116,101,115,116,117,100,101,110,116,115,111,109,101,111,110,101,101,120 +,116,114,101,109,101,114,101,115,116,111,114,101,98,111,116,116,111,109,58,101, +118,111,108,118,101,100,97,108,108,32,116,104,101,115,105,116,101,109,97,112,101 +,110,103,108,105,115,104,119,97,121,32,116,111,32,32,65,117,103,117,115,116,115, +121,109,98,111,108,115,67,111,109,112,97,110,121,109,97,116,116,101,114,115,109, +117,115,105,99,97,108,97,103,97,105,110,115,116,115,101,114,118,105,110,103,125, +41,40,41,59,13,10,112,97,121,109,101,110,116,116,114,111,117,98,108,101,99,111, +110,99,101,112,116,99,111,109,112,97,114,101,112,97,114,101,110,116,115,112,108, +97,121,101,114,115,114,101,103,105,111,110,115,109,111,110,105,116,111,114,32,39 +,39,84,104,101,32,119,105,110,110,105,110,103,101,120,112,108,111,114,101,97,100 +,97,112,116,101,100,71,97,108,108,101,114,121,112,114,111,100,117,99,101,97,98, +105,108,105,116,121,101,110,104,97,110,99,101,99,97,114,101,101,114,115,41,46,32 +,84,104,101,32,99,111,108,108,101,99,116,83,101,97,114,99,104,32,97,110,99,105, +101,110,116,101,120,105,115,116,101,100,102,111,111,116,101,114,32,104,97,110, +100,108,101,114,112,114,105,110,116,101,100,99,111,110,115,111,108,101,69,97,115 +,116,101,114,110,101,120,112,111,114,116,115,119,105,110,100,111,119,115,67,104, +97,110,110,101,108,105,108,108,101,103,97,108,110,101,117,116,114,97,108,115,117 +,103,103,101,115,116,95,104,101,97,100,101,114,115,105,103,110,105,110,103,46, +104,116,109,108,34,62,115,101,116,116,108,101,100,119,101,115,116,101,114,110,99 +,97,117,115,105,110,103,45,119,101,98,107,105,116,99,108,97,105,109,101,100,74, +117,115,116,105,99,101,99,104,97,112,116,101,114,118,105,99,116,105,109,115,84, +104,111,109,97,115,32,109,111,122,105,108,108,97,112,114,111,109,105,115,101,112 +,97,114,116,105,101,115,101,100,105,116,105,111,110,111,117,116,115,105,100,101, +58,102,97,108,115,101,44,104,117,110,100,114,101,100,79,108,121,109,112,105,99, +95,98,117,116,116,111,110,97,117,116,104,111,114,115,114,101,97,99,104,101,100, +99,104,114,111,110,105,99,100,101,109,97,110,100,115,115,101,99,111,110,100,115, +112,114,111,116,101,99,116,97,100,111,112,116,101,100,112,114,101,112,97,114,101 +,110,101,105,116,104,101,114,103,114,101,97,116,108,121,103,114,101,97,116,101, +114,111,118,101,114,97,108,108,105,109,112,114,111,118,101,99,111,109,109,97,110 +,100,115,112,101,99,105,97,108,115,101,97,114,99,104,46,119,111,114,115,104,105, +112,102,117,110,100,105,110,103,116,104,111,117,103,104,116,104,105,103,104,101, +115,116,105,110,115,116,101,97,100,117,116,105,108,105,116,121,113,117,97,114, +116,101,114,67,117,108,116,117,114,101,116,101,115,116,105,110,103,99,108,101,97 +,114,108,121,101,120,112,111,115,101,100,66,114,111,119,115,101,114,108,105,98, +101,114,97,108,125,32,99,97,116,99,104,80,114,111,106,101,99,116,101,120,97,109, +112,108,101,104,105,100,101,40,41,59,70,108,111,114,105,100,97,97,110,115,119, +101,114,115,97,108,108,111,119,101,100,69,109,112,101,114,111,114,100,101,102, +101,110,115,101,115,101,114,105,111,117,115,102,114,101,101,100,111,109,83,101, +118,101,114,97,108,45,98,117,116,116,111,110,70,117,114,116,104,101,114,111,117, +116,32,111,102,32,33,61,32,110,117,108,108,116,114,97,105,110,101,100,68,101,110 +,109,97,114,107,118,111,105,100,40,48,41,47,97,108,108,46,106,115,112,114,101, +118,101,110,116,82,101,113,117,101,115,116,83,116,101,112,104,101,110,10,10,87, +104,101,110,32,111,98,115,101,114,118,101,60,47,104,50,62,13,10,77,111,100,101, +114,110,32,112,114,111,118,105,100,101,34,32,97,108,116,61,34,98,111,114,100,101 +,114,115,46,10,10,70,111,114,32,10,10,77,97,110,121,32,97,114,116,105,115,116, +115,112,111,119,101,114,101,100,112,101,114,102,111,114,109,102,105,99,116,105, +111,110,116,121,112,101,32,111,102,109,101,100,105,99,97,108,116,105,99,107,101, +116,115,111,112,112,111,115,101,100,67,111,117,110,99,105,108,119,105,116,110, +101,115,115,106,117,115,116,105,99,101,71,101,111,114,103,101,32,66,101,108,103, +105,117,109,46,46,46,60,47,97,62,116,119,105,116,116,101,114,110,111,116,97,98, +108,121,119,97,105,116,105,110,103,119,97,114,102,97,114,101,32,79,116,104,101, +114,32,114,97,110,107,105,110,103,112,104,114,97,115,101,115,109,101,110,116,105 +,111,110,115,117,114,118,105,118,101,115,99,104,111,108,97,114,60,47,112,62,13, +10,32,67,111,117,110,116,114,121,105,103,110,111,114,101,100,108,111,115,115,32, +111,102,106,117,115,116,32,97,115,71,101,111,114,103,105,97,115,116,114,97,110, +103,101,60,104,101,97,100,62,60,115,116,111,112,112,101,100,49,39,93,41,59,13,10 +,105,115,108,97,110,100,115,110,111,116,97,98,108,101,98,111,114,100,101,114,58, +108,105,115,116,32,111,102,99,97,114,114,105,101,100,49,48,48,44,48,48,48,60,47, +104,51,62,10,32,115,101,118,101,114,97,108,98,101,99,111,109,101,115,115,101,108 +,101,99,116,32,119,101,100,100,105,110,103,48,48,46,104,116,109,108,109,111,110, +97,114,99,104,111,102,102,32,116,104,101,116,101,97,99,104,101,114,104,105,103, +104,108,121,32,98,105,111,108,111,103,121,108,105,102,101,32,111,102,111,114,32, +101,118,101,110,114,105,115,101,32,111,102,38,114,97,113,117,111,59,112,108,117, +115,111,110,101,104,117,110,116,105,110,103,40,116,104,111,117,103,104,68,111, +117,103,108,97,115,106,111,105,110,105,110,103,99,105,114,99,108,101,115,70,111, +114,32,116,104,101,65,110,99,105,101,110,116,86,105,101,116,110,97,109,118,101, +104,105,99,108,101,115,117,99,104,32,97,115,99,114,121,115,116,97,108,118,97,108 +,117,101,32,61,87,105,110,100,111,119,115,101,110,106,111,121,101,100,97,32,115, +109,97,108,108,97,115,115,117,109,101,100,60,97,32,105,100,61,34,102,111,114,101 +,105,103,110,32,65,108,108,32,114,105,104,111,119,32,116,104,101,68,105,115,112, +108,97,121,114,101,116,105,114,101,100,104,111,119,101,118,101,114,104,105,100, +100,101,110,59,98,97,116,116,108,101,115,115,101,101,107,105,110,103,99,97,98, +105,110,101,116,119,97,115,32,110,111,116,108,111,111,107,32,97,116,99,111,110, +100,117,99,116,103,101,116,32,116,104,101,74,97,110,117,97,114,121,104,97,112, +112,101,110,115,116,117,114,110,105,110,103,97,58,104,111,118,101,114,79,110,108 +,105,110,101,32,70,114,101,110,99,104,32,108,97,99,107,105,110,103,116,121,112, +105,99,97,108,101,120,116,114,97,99,116,101,110,101,109,105,101,115,101,118,101, +110,32,105,102,103,101,110,101,114,97,116,100,101,99,105,100,101,100,97,114,101, +32,110,111,116,47,115,101,97,114,99,104,98,101,108,105,101,102,115,45,105,109,97 +,103,101,58,108,111,99,97,116,101,100,115,116,97,116,105,99,46,108,111,103,105, +110,34,62,99,111,110,118,101,114,116,118,105,111,108,101,110,116,101,110,116,101 +,114,101,100,102,105,114,115,116,34,62,99,105,114,99,117,105,116,70,105,110,108, +97,110,100,99,104,101,109,105,115,116,115,104,101,32,119,97,115,49,48,112,120,59 +,34,62,97,115,32,115,117,99,104,100,105,118,105,100,101,100,60,47,115,112,97,110 +,62,119,105,108,108,32,98,101,108,105,110,101,32,111,102,97,32,103,114,101,97, +116,109,121,115,116,101,114,121,47,105,110,100,101,120,46,102,97,108,108,105,110 +,103,100,117,101,32,116,111,32,114,97,105,108,119,97,121,99,111,108,108,101,103, +101,109,111,110,115,116,101,114,100,101,115,99,101,110,116,105,116,32,119,105, +116,104,110,117,99,108,101,97,114,74,101,119,105,115,104,32,112,114,111,116,101, +115,116,66,114,105,116,105,115,104,102,108,111,119,101,114,115,112,114,101,100, +105,99,116,114,101,102,111,114,109,115,98,117,116,116,111,110,32,119,104,111,32, +119,97,115,108,101,99,116,117,114,101,105,110,115,116,97,110,116,115,117,105,99, +105,100,101,103,101,110,101,114,105,99,112,101,114,105,111,100,115,109,97,114, +107,101,116,115,83,111,99,105,97,108,32,102,105,115,104,105,110,103,99,111,109, +98,105,110,101,103,114,97,112,104,105,99,119,105,110,110,101,114,115,60,98,114, +32,47,62,60,98,121,32,116,104,101,32,78,97,116,117,114,97,108,80,114,105,118,97, +99,121,99,111,111,107,105,101,115,111,117,116,99,111,109,101,114,101,115,111,108 +,118,101,83,119,101,100,105,115,104,98,114,105,101,102,108,121,80,101,114,115, +105,97,110,115,111,32,109,117,99,104,67,101,110,116,117,114,121,100,101,112,105, +99,116,115,99,111,108,117,109,110,115,104,111,117,115,105,110,103,115,99,114,105 +,112,116,115,110,101,120,116,32,116,111,98,101,97,114,105,110,103,109,97,112,112 +,105,110,103,114,101,118,105,115,101,100,106,81,117,101,114,121,40,45,119,105, +100,116,104,58,116,105,116,108,101,34,62,116,111,111,108,116,105,112,83,101,99, +116,105,111,110,100,101,115,105,103,110,115,84,117,114,107,105,115,104,121,111, +117,110,103,101,114,46,109,97,116,99,104,40,125,41,40,41,59,10,10,98,117,114,110 +,105,110,103,111,112,101,114,97,116,101,100,101,103,114,101,101,115,115,111,117, +114,99,101,61,82,105,99,104,97,114,100,99,108,111,115,101,108,121,112,108,97,115 +,116,105,99,101,110,116,114,105,101,115,60,47,116,114,62,13,10,99,111,108,111, +114,58,35,117,108,32,105,100,61,34,112,111,115,115,101,115,115,114,111,108,108, +105,110,103,112,104,121,115,105,99,115,102,97,105,108,105,110,103,101,120,101,99 +,117,116,101,99,111,110,116,101,115,116,108,105,110,107,32,116,111,68,101,102,97 +,117,108,116,60,98,114,32,47,62,10,58,32,116,114,117,101,44,99,104,97,114,116, +101,114,116,111,117,114,105,115,109,99,108,97,115,115,105,99,112,114,111,99,101, +101,100,101,120,112,108,97,105,110,60,47,104,49,62,13,10,111,110,108,105,110,101 +,46,63,120,109,108,32,118,101,104,101,108,112,105,110,103,100,105,97,109,111,110 +,100,117,115,101,32,116,104,101,97,105,114,108,105,110,101,101,110,100,32,45,45, +62,41,46,97,116,116,114,40,114,101,97,100,101,114,115,104,111,115,116,105,110, +103,35,102,102,102,102,102,102,114,101,97,108,105,122,101,86,105,110,99,101,110, +116,115,105,103,110,97,108,115,32,115,114,99,61,34,47,80,114,111,100,117,99,116, +100,101,115,112,105,116,101,100,105,118,101,114,115,101,116,101,108,108,105,110, +103,80,117,98,108,105,99,32,104,101,108,100,32,105,110,74,111,115,101,112,104,32 +,116,104,101,97,116,114,101,97,102,102,101,99,116,115,60,115,116,121,108,101,62, +97,32,108,97,114,103,101,100,111,101,115,110,39,116,108,97,116,101,114,44,32,69, +108,101,109,101,110,116,102,97,118,105,99,111,110,99,114,101,97,116,111,114,72, +117,110,103,97,114,121,65,105,114,112,111,114,116,115,101,101,32,116,104,101,115 +,111,32,116,104,97,116,77,105,99,104,97,101,108,83,121,115,116,101,109,115,80, +114,111,103,114,97,109,115,44,32,97,110,100,32,32,119,105,100,116,104,61,101,38, +113,117,111,116,59,116,114,97,100,105,110,103,108,101,102,116,34,62,10,112,101, +114,115,111,110,115,71,111,108,100,101,110,32,65,102,102,97,105,114,115,103,114, +97,109,109,97,114,102,111,114,109,105,110,103,100,101,115,116,114,111,121,105, +100,101,97,32,111,102,99,97,115,101,32,111,102,111,108,100,101,115,116,32,116, +104,105,115,32,105,115,46,115,114,99,32,61,32,99,97,114,116,111,111,110,114,101, +103,105,115,116,114,67,111,109,109,111,110,115,77,117,115,108,105,109,115,87,104 +,97,116,32,105,115,105,110,32,109,97,110,121,109,97,114,107,105,110,103,114,101, +118,101,97,108,115,73,110,100,101,101,100,44,101,113,117,97,108,108,121,47,115, +104,111,119,95,97,111,117,116,100,111,111,114,101,115,99,97,112,101,40,65,117, +115,116,114,105,97,103,101,110,101,116,105,99,115,121,115,116,101,109,44,73,110, +32,116,104,101,32,115,105,116,116,105,110,103,72,101,32,97,108,115,111,73,115, +108,97,110,100,115,65,99,97,100,101,109,121,10,9,9,60,33,45,45,68,97,110,105,101 +,108,32,98,105,110,100,105,110,103,98,108,111,99,107,34,62,105,109,112,111,115, +101,100,117,116,105,108,105,122,101,65,98,114,97,104,97,109,40,101,120,99,101, +112,116,123,119,105,100,116,104,58,112,117,116,116,105,110,103,41,46,104,116,109 +,108,40,124,124,32,91,93,59,10,68,65,84,65,91,32,42,107,105,116,99,104,101,110, +109,111,117,110,116,101,100,97,99,116,117,97,108,32,100,105,97,108,101,99,116, +109,97,105,110,108,121,32,95,98,108,97,110,107,39,105,110,115,116,97,108,108,101 +,120,112,101,114,116,115,105,102,40,116,121,112,101,73,116,32,97,108,115,111,38, +99,111,112,121,59,32,34,62,84,101,114,109,115,98,111,114,110,32,105,110,79,112, +116,105,111,110,115,101,97,115,116,101,114,110,116,97,108,107,105,110,103,99,111 +,110,99,101,114,110,103,97,105,110,101,100,32,111,110,103,111,105,110,103,106, +117,115,116,105,102,121,99,114,105,116,105,99,115,102,97,99,116,111,114,121,105, +116,115,32,111,119,110,97,115,115,97,117,108,116,105,110,118,105,116,101,100,108 +,97,115,116,105,110,103,104,105,115,32,111,119,110,104,114,101,102,61,34,47,34, +32,114,101,108,61,34,100,101,118,101,108,111,112,99,111,110,99,101,114,116,100, +105,97,103,114,97,109,100,111,108,108,97,114,115,99,108,117,115,116,101,114,112, +104,112,63,105,100,61,97,108,99,111,104,111,108,41,59,125,41,40,41,59,117,115, +105,110,103,32,97,62,60,115,112,97,110,62,118,101,115,115,101,108,115,114,101, +118,105,118,97,108,65,100,100,114,101,115,115,97,109,97,116,101,117,114,97,110, +100,114,111,105,100,97,108,108,101,103,101,100,105,108,108,110,101,115,115,119, +97,108,107,105,110,103,99,101,110,116,101,114,115,113,117,97,108,105,102,121,109 +,97,116,99,104,101,115,117,110,105,102,105,101,100,101,120,116,105,110,99,116,68 +,101,102,101,110,115,101,100,105,101,100,32,105,110,10,9,60,33,45,45,32,99,117, +115,116,111,109,115,108,105,110,107,105,110,103,76,105,116,116,108,101,32,66,111 +,111,107,32,111,102,101,118,101,110,105,110,103,109,105,110,46,106,115,63,97,114 +,101,32,116,104,101,107,111,110,116,97,107,116,116,111,100,97,121,39,115,46,104, +116,109,108,34,32,116,97,114,103,101,116,61,119,101,97,114,105,110,103,65,108, +108,32,82,105,103,59,10,125,41,40,41,59,114,97,105,115,105,110,103,32,65,108,115 +,111,44,32,99,114,117,99,105,97,108,97,98,111,117,116,34,62,100,101,99,108,97, +114,101,45,45,62,10,60,115,99,102,105,114,101,102,111,120,97,115,32,109,117,99, +104,97,112,112,108,105,101,115,105,110,100,101,120,44,32,115,44,32,98,117,116,32 +,116,121,112,101,32,61,32,10,13,10,60,33,45,45,116,111,119,97,114,100,115,82,101 +,99,111,114,100,115,80,114,105,118,97,116,101,70,111,114,101,105,103,110,80,114, +101,109,105,101,114,99,104,111,105,99,101,115,86,105,114,116,117,97,108,114,101, +116,117,114,110,115,67,111,109,109,101,110,116,80,111,119,101,114,101,100,105, +110,108,105,110,101,59,112,111,118,101,114,116,121,99,104,97,109,98,101,114,76, +105,118,105,110,103,32,118,111,108,117,109,101,115,65,110,116,104,111,110,121, +108,111,103,105,110,34,32,82,101,108,97,116,101,100,69,99,111,110,111,109,121, +114,101,97,99,104,101,115,99,117,116,116,105,110,103,103,114,97,118,105,116,121, +108,105,102,101,32,105,110,67,104,97,112,116,101,114,45,115,104,97,100,111,119, +78,111,116,97,98,108,101,60,47,116,100,62,13,10,32,114,101,116,117,114,110,115, +116,97,100,105,117,109,119,105,100,103,101,116,115,118,97,114,121,105,110,103, +116,114,97,118,101,108,115,104,101,108,100,32,98,121,119,104,111,32,97,114,101, +119,111,114,107,32,105,110,102,97,99,117,108,116,121,97,110,103,117,108,97,114, +119,104,111,32,104,97,100,97,105,114,112,111,114,116,116,111,119,110,32,111,102, +10,10,83,111,109,101,32,39,99,108,105,99,107,39,99,104,97,114,103,101,115,107, +101,121,119,111,114,100,105,116,32,119,105,108,108,99,105,116,121,32,111,102,40, +116,104,105,115,41,59,65,110,100,114,101,119,32,117,110,105,113,117,101,32,99, +104,101,99,107,101,100,111,114,32,109,111,114,101,51,48,48,112,120,59,32,114,101 +,116,117,114,110,59,114,115,105,111,110,61,34,112,108,117,103,105,110,115,119, +105,116,104,105,110,32,104,101,114,115,101,108,102,83,116,97,116,105,111,110,70, +101,100,101,114,97,108,118,101,110,116,117,114,101,112,117,98,108,105,115,104, +115,101,110,116,32,116,111,116,101,110,115,105,111,110,97,99,116,114,101,115,115 +,99,111,109,101,32,116,111,102,105,110,103,101,114,115,68,117,107,101,32,111,102 +,112,101,111,112,108,101,44,101,120,112,108,111,105,116,119,104,97,116,32,105, +115,104,97,114,109,111,110,121,97,32,109,97,106,111,114,34,58,34,104,116,116,112 +,105,110,32,104,105,115,32,109,101,110,117,34,62,10,109,111,110,116,104,108,121, +111,102,102,105,99,101,114,99,111,117,110,99,105,108,103,97,105,110,105,110,103, +101,118,101,110,32,105,110,83,117,109,109,97,114,121,100,97,116,101,32,111,102, +108,111,121,97,108,116,121,102,105,116,110,101,115,115,97,110,100,32,119,97,115, +101,109,112,101,114,111,114,115,117,112,114,101,109,101,83,101,99,111,110,100,32 +,104,101,97,114,105,110,103,82,117,115,115,105,97,110,108,111,110,103,101,115, +116,65,108,98,101,114,116,97,108,97,116,101,114,97,108,115,101,116,32,111,102,32 +,115,109,97,108,108,34,62,46,97,112,112,101,110,100,100,111,32,119,105,116,104, +102,101,100,101,114,97,108,98,97,110,107,32,111,102,98,101,110,101,97,116,104,68 +,101,115,112,105,116,101,67,97,112,105,116,97,108,103,114,111,117,110,100,115,41 +,44,32,97,110,100,32,112,101,114,99,101,110,116,105,116,32,102,114,111,109,99, +108,111,115,105,110,103,99,111,110,116,97,105,110,73,110,115,116,101,97,100,102, +105,102,116,101,101,110,97,115,32,119,101,108,108,46,121,97,104,111,111,46,114, +101,115,112,111,110,100,102,105,103,104,116,101,114,111,98,115,99,117,114,101, +114,101,102,108,101,99,116,111,114,103,97,110,105,99,61,32,77,97,116,104,46,101, +100,105,116,105,110,103,111,110,108,105,110,101,32,112,97,100,100,105,110,103,97 +,32,119,104,111,108,101,111,110,101,114,114,111,114,121,101,97,114,32,111,102, +101,110,100,32,111,102,32,98,97,114,114,105,101,114,119,104,101,110,32,105,116, +104,101,97,100,101,114,32,104,111,109,101,32,111,102,114,101,115,117,109,101,100 +,114,101,110,97,109,101,100,115,116,114,111,110,103,62,104,101,97,116,105,110, +103,114,101,116,97,105,110,115,99,108,111,117,100,102,114,119,97,121,32,111,102, +32,77,97,114,99,104,32,49,107,110,111,119,105,110,103,105,110,32,112,97,114,116, +66,101,116,119,101,101,110,108,101,115,115,111,110,115,99,108,111,115,101,115, +116,118,105,114,116,117,97,108,108,105,110,107,115,34,62,99,114,111,115,115,101, +100,69,78,68,32,45,45,62,102,97,109,111,117,115,32,97,119,97,114,100,101,100,76, +105,99,101,110,115,101,72,101,97,108,116,104,32,102,97,105,114,108,121,32,119, +101,97,108,116,104,121,109,105,110,105,109,97,108,65,102,114,105,99,97,110,99, +111,109,112,101,116,101,108,97,98,101,108,34,62,115,105,110,103,105,110,103,102, +97,114,109,101,114,115,66,114,97,115,105,108,41,100,105,115,99,117,115,115,114, +101,112,108,97,99,101,71,114,101,103,111,114,121,102,111,110,116,32,99,111,112, +117,114,115,117,101,100,97,112,112,101,97,114,115,109,97,107,101,32,117,112,114, +111,117,110,100,101,100,98,111,116,104,32,111,102,98,108,111,99,107,101,100,115, +97,119,32,116,104,101,111,102,102,105,99,101,115,99,111,108,111,117,114,115,105, +102,40,100,111,99,117,119,104,101,110,32,104,101,101,110,102,111,114,99,101,112, +117,115,104,40,102,117,65,117,103,117,115,116,32,85,84,70,45,56,34,62,70,97,110, +116,97,115,121,105,110,32,109,111,115,116,105,110,106,117,114,101,100,85,115,117 +,97,108,108,121,102,97,114,109,105,110,103,99,108,111,115,117,114,101,111,98,106 +,101,99,116,32,100,101,102,101,110,99,101,117,115,101,32,111,102,32,77,101,100, +105,99,97,108,60,98,111,100,121,62,10,101,118,105,100,101,110,116,98,101,32,117, +115,101,100,107,101,121,67,111,100,101,115,105,120,116,101,101,110,73,115,108,97 +,109,105,99,35,48,48,48,48,48,48,101,110,116,105,114,101,32,119,105,100,101,108, +121,32,97,99,116,105,118,101,32,40,116,121,112,101,111,102,111,110,101,32,99,97, +110,99,111,108,111,114,32,61,115,112,101,97,107,101,114,101,120,116,101,110,100, +115,80,104,121,115,105,99,115,116,101,114,114,97,105,110,60,116,98,111,100,121, +62,102,117,110,101,114,97,108,118,105,101,119,105,110,103,109,105,100,100,108, +101,32,99,114,105,99,107,101,116,112,114,111,112,104,101,116,115,104,105,102,116 +,101,100,100,111,99,116,111,114,115,82,117,115,115,101,108,108,32,116,97,114,103 +,101,116,99,111,109,112,97,99,116,97,108,103,101,98,114,97,115,111,99,105,97,108 +,45,98,117,108,107,32,111,102,109,97,110,32,97,110,100,60,47,116,100,62,10,32, +104,101,32,108,101,102,116,41,46,118,97,108,40,41,102,97,108,115,101,41,59,108, +111,103,105,99,97,108,98,97,110,107,105,110,103,104,111,109,101,32,116,111,110, +97,109,105,110,103,32,65,114,105,122,111,110,97,99,114,101,100,105,116,115,41,59 +,10,125,41,59,10,102,111,117,110,100,101,114,105,110,32,116,117,114,110,67,111, +108,108,105,110,115,98,101,102,111,114,101,32,66,117,116,32,116,104,101,99,104, +97,114,103,101,100,84,105,116,108,101,34,62,67,97,112,116,97,105,110,115,112,101 +,108,108,101,100,103,111,100,100,101,115,115,84,97,103,32,45,45,62,65,100,100, +105,110,103,58,98,117,116,32,119,97,115,82,101,99,101,110,116,32,112,97,116,105, +101,110,116,98,97,99,107,32,105,110,61,102,97,108,115,101,38,76,105,110,99,111, +108,110,119,101,32,107,110,111,119,67,111,117,110,116,101,114,74,117,100,97,105, +115,109,115,99,114,105,112,116,32,97,108,116,101,114,101,100,39,93,41,59,10,32, +32,104,97,115,32,116,104,101,117,110,99,108,101,97,114,69,118,101,110,116,39,44, +98,111,116,104,32,105,110,110,111,116,32,97,108,108,10,10,60,33,45,45,32,112,108 +,97,99,105,110,103,104,97,114,100,32,116,111,32,99,101,110,116,101,114,115,111, +114,116,32,111,102,99,108,105,101,110,116,115,115,116,114,101,101,116,115,66,101 +,114,110,97,114,100,97,115,115,101,114,116,115,116,101,110,100,32,116,111,102,97 +,110,116,97,115,121,100,111,119,110,32,105,110,104,97,114,98,111,117,114,70,114, +101,101,100,111,109,106,101,119,101,108,114,121,47,97,98,111,117,116,46,46,115, +101,97,114,99,104,108,101,103,101,110,100,115,105,115,32,109,97,100,101,109,111, +100,101,114,110,32,111,110,108,121,32,111,110,111,110,108,121,32,116,111,105,109 +,97,103,101,34,32,108,105,110,101,97,114,32,112,97,105,110,116,101,114,97,110, +100,32,110,111,116,114,97,114,101,108,121,32,97,99,114,111,110,121,109,100,101, +108,105,118,101,114,115,104,111,114,116,101,114,48,48,38,97,109,112,59,97,115,32 +,109,97,110,121,119,105,100,116,104,61,34,47,42,32,60,33,91,67,116,105,116,108, +101,32,61,111,102,32,116,104,101,32,108,111,119,101,115,116,32,112,105,99,107, +101,100,32,101,115,99,97,112,101,100,117,115,101,115,32,111,102,112,101,111,112, +108,101,115,32,80,117,98,108,105,99,77,97,116,116,104,101,119,116,97,99,116,105, +99,115,100,97,109,97,103,101,100,119,97,121,32,102,111,114,108,97,119,115,32,111 +,102,101,97,115,121,32,116,111,32,119,105,110,100,111,119,115,116,114,111,110, +103,32,32,115,105,109,112,108,101,125,99,97,116,99,104,40,115,101,118,101,110, +116,104,105,110,102,111,98,111,120,119,101,110,116,32,116,111,112,97,105,110,116 +,101,100,99,105,116,105,122,101,110,73,32,100,111,110,39,116,114,101,116,114,101 +,97,116,46,32,83,111,109,101,32,119,119,46,34,41,59,10,98,111,109,98,105,110,103 +,109,97,105,108,116,111,58,109,97,100,101,32,105,110,46,32,77,97,110,121,32,99, +97,114,114,105,101,115,124,124,123,125,59,119,105,119,111,114,107,32,111,102,115 +,121,110,111,110,121,109,100,101,102,101,97,116,115,102,97,118,111,114,101,100, +111,112,116,105,99,97,108,112,97,103,101,84,114,97,117,110,108,101,115,115,32, +115,101,110,100,105,110,103,108,101,102,116,34,62,60,99,111,109,83,99,111,114,65 +,108,108,32,116,104,101,106,81,117,101,114,121,46,116,111,117,114,105,115,116,67 +,108,97,115,115,105,99,102,97,108,115,101,34,32,87,105,108,104,101,108,109,115, +117,98,117,114,98,115,103,101,110,117,105,110,101,98,105,115,104,111,112,115,46, +115,112,108,105,116,40,103,108,111,98,97,108,32,102,111,108,108,111,119,115,98, +111,100,121,32,111,102,110,111,109,105,110,97,108,67,111,110,116,97,99,116,115, +101,99,117,108,97,114,108,101,102,116,32,116,111,99,104,105,101,102,108,121,45, +104,105,100,100,101,110,45,98,97,110,110,101,114,60,47,108,105,62,10,10,46,32,87 +,104,101,110,32,105,110,32,98,111,116,104,100,105,115,109,105,115,115,69,120,112 +,108,111,114,101,97,108,119,97,121,115,32,118,105,97,32,116,104,101,115,112,97, +195,177,111,108,119,101,108,102,97,114,101,114,117,108,105,110,103,32,97,114,114 +,97,110,103,101,99,97,112,116,97,105,110,104,105,115,32,115,111,110,114,117,108, +101,32,111,102,104,101,32,116,111,111,107,105,116,115,101,108,102,44,61,48,38,97 +,109,112,59,40,99,97,108,108,101,100,115,97,109,112,108,101,115,116,111,32,109, +97,107,101,99,111,109,47,112,97,103,77,97,114,116,105,110,32,75,101,110,110,101, +100,121,97,99,99,101,112,116,115,102,117,108,108,32,111,102,104,97,110,100,108, +101,100,66,101,115,105,100,101,115,47,47,45,45,62,60,47,97,98,108,101,32,116,111 +,116,97,114,103,101,116,115,101,115,115,101,110,99,101,104,105,109,32,116,111,32 +,105,116,115,32,98,121,32,99,111,109,109,111,110,46,109,105,110,101,114,97,108, +116,111,32,116,97,107,101,119,97,121,115,32,116,111,115,46,111,114,103,47,108,97 +,100,118,105,115,101,100,112,101,110,97,108,116,121,115,105,109,112,108,101,58, +105,102,32,116,104,101,121,76,101,116,116,101,114,115,97,32,115,104,111,114,116, +72,101,114,98,101,114,116,115,116,114,105,107,101,115,32,103,114,111,117,112,115 +,46,108,101,110,103,116,104,102,108,105,103,104,116,115,111,118,101,114,108,97, +112,115,108,111,119,108,121,32,108,101,115,115,101,114,32,115,111,99,105,97,108, +32,60,47,112,62,10,9,9,105,116,32,105,110,116,111,114,97,110,107,101,100,32,114, +97,116,101,32,111,102,117,108,62,13,10,32,32,97,116,116,101,109,112,116,112,97, +105,114,32,111,102,109,97,107,101,32,105,116,75,111,110,116,97,107,116,65,110, +116,111,110,105,111,104,97,118,105,110,103,32,114,97,116,105,110,103,115,32,97, +99,116,105,118,101,115,116,114,101,97,109,115,116,114,97,112,112,101,100,34,41, +46,99,115,115,40,104,111,115,116,105,108,101,108,101,97,100,32,116,111,108,105, +116,116,108,101,32,103,114,111,117,112,115,44,80,105,99,116,117,114,101,45,45,62 +,13,10,13,10,32,114,111,119,115,61,34,32,111,98,106,101,99,116,105,110,118,101, +114,115,101,60,102,111,111,116,101,114,67,117,115,116,111,109,86,62,60,92,47,115 +,99,114,115,111,108,118,105,110,103,67,104,97,109,98,101,114,115,108,97,118,101, +114,121,119,111,117,110,100,101,100,119,104,101,114,101,97,115,33,61,32,39,117, +110,100,102,111,114,32,97,108,108,112,97,114,116,108,121,32,45,114,105,103,104, +116,58,65,114,97,98,105,97,110,98,97,99,107,101,100,32,99,101,110,116,117,114, +121,117,110,105,116,32,111,102,109,111,98,105,108,101,45,69,117,114,111,112,101, +44,105,115,32,104,111,109,101,114,105,115,107,32,111,102,100,101,115,105,114,101 +,100,67,108,105,110,116,111,110,99,111,115,116,32,111,102,97,103,101,32,111,102, +32,98,101,99,111,109,101,32,110,111,110,101,32,111,102,112,38,113,117,111,116,59 +,77,105,100,100,108,101,32,101,97,100,39,41,91,48,67,114,105,116,105,99,115,115, +116,117,100,105,111,115,62,38,99,111,112,121,59,103,114,111,117,112,34,62,97,115 +,115,101,109,98,108,109,97,107,105,110,103,32,112,114,101,115,115,101,100,119, +105,100,103,101,116,46,112,115,58,34,32,63,32,114,101,98,117,105,108,116,98,121, +32,115,111,109,101,70,111,114,109,101,114,32,101,100,105,116,111,114,115,100,101 +,108,97,121,101,100,67,97,110,111,110,105,99,104,97,100,32,116,104,101,112,117, +115,104,105,110,103,99,108,97,115,115,61,34,98,117,116,32,97,114,101,112,97,114, +116,105,97,108,66,97,98,121,108,111,110,98,111,116,116,111,109,32,99,97,114,114, +105,101,114,67,111,109,109,97,110,100,105,116,115,32,117,115,101,65,115,32,119, +105,116,104,99,111,117,114,115,101,115,97,32,116,104,105,114,100,100,101,110,111 +,116,101,115,97,108,115,111,32,105,110,72,111,117,115,116,111,110,50,48,112,120, +59,34,62,97,99,99,117,115,101,100,100,111,117,98,108,101,32,103,111,97,108,32, +111,102,70,97,109,111,117,115,32,41,46,98,105,110,100,40,112,114,105,101,115,116 +,115,32,79,110,108,105,110,101,105,110,32,74,117,108,121,115,116,32,43,32,34,103 +,99,111,110,115,117,108,116,100,101,99,105,109,97,108,104,101,108,112,102,117, +108,114,101,118,105,118,101,100,105,115,32,118,101,114,121,114,39,43,39,105,112, +116,108,111,115,105,110,103,32,102,101,109,97,108,101,115,105,115,32,97,108,115, +111,115,116,114,105,110,103,115,100,97,121,115,32,111,102,97,114,114,105,118,97, +108,102,117,116,117,114,101,32,60,111,98,106,101,99,116,102,111,114,99,105,110, +103,83,116,114,105,110,103,40,34,32,47,62,10,9,9,104,101,114,101,32,105,115,101, +110,99,111,100,101,100,46,32,32,84,104,101,32,98,97,108,108,111,111,110,100,111, +110,101,32,98,121,47,99,111,109,109,111,110,98,103,99,111,108,111,114,108,97,119 +,32,111,102,32,73,110,100,105,97,110,97,97,118,111,105,100,101,100,98,117,116,32 +,116,104,101,50,112,120,32,51,112,120,106,113,117,101,114,121,46,97,102,116,101, +114,32,97,112,111,108,105,99,121,46,109,101,110,32,97,110,100,102,111,111,116, +101,114,45,61,32,116,114,117,101,59,102,111,114,32,117,115,101,115,99,114,101, +101,110,46,73,110,100,105,97,110,32,105,109,97,103,101,32,61,102,97,109,105,108, +121,44,104,116,116,112,58,47,47,32,38,110,98,115,112,59,100,114,105,118,101,114, +115,101,116,101,114,110,97,108,115,97,109,101,32,97,115,110,111,116,105,99,101, +100,118,105,101,119,101,114,115,125,41,40,41,59,10,32,105,115,32,109,111,114,101 +,115,101,97,115,111,110,115,102,111,114,109,101,114,32,116,104,101,32,110,101, +119,105,115,32,106,117,115,116,99,111,110,115,101,110,116,32,83,101,97,114,99, +104,119,97,115,32,116,104,101,119,104,121,32,116,104,101,115,104,105,112,112,101 +,100,98,114,62,60,98,114,62,119,105,100,116,104,58,32,104,101,105,103,104,116,61 +,109,97,100,101,32,111,102,99,117,105,115,105,110,101,105,115,32,116,104,97,116, +97,32,118,101,114,121,32,65,100,109,105,114,97,108,32,102,105,120,101,100,59,110 +,111,114,109,97,108,32,77,105,115,115,105,111,110,80,114,101,115,115,44,32,111, +110,116,97,114,105,111,99,104,97,114,115,101,116,116,114,121,32,116,111,32,105, +110,118,97,100,101,100,61,34,116,114,117,101,34,115,112,97,99,105,110,103,105, +115,32,109,111,115,116,97,32,109,111,114,101,32,116,111,116,97,108,108,121,102, +97,108,108,32,111,102,125,41,59,13,10,32,32,105,109,109,101,110,115,101,116,105, +109,101,32,105,110,115,101,116,32,111,117,116,115,97,116,105,115,102,121,116,111 +,32,102,105,110,100,100,111,119,110,32,116,111,108,111,116,32,111,102,32,80,108, +97,121,101,114,115,105,110,32,74,117,110,101,113,117,97,110,116,117,109,110,111, +116,32,116,104,101,116,105,109,101,32,116,111,100,105,115,116,97,110,116,70,105, +110,110,105,115,104,115,114,99,32,61,32,40,115,105,110,103,108,101,32,104,101, +108,112,32,111,102,71,101,114,109,97,110,32,108,97,119,32,97,110,100,108,97,98, +101,108,101,100,102,111,114,101,115,116,115,99,111,111,107,105,110,103,115,112, +97,99,101,34,62,104,101,97,100,101,114,45,119,101,108,108,32,97,115,83,116,97, +110,108,101,121,98,114,105,100,103,101,115,47,103,108,111,98,97,108,67,114,111, +97,116,105,97,32,65,98,111,117,116,32,91,48,93,59,10,32,32,105,116,44,32,97,110, +100,103,114,111,117,112,101,100,98,101,105,110,103,32,97,41,123,116,104,114,111, +119,104,101,32,109,97,100,101,108,105,103,104,116,101,114,101,116,104,105,99,97, +108,70,70,70,70,70,70,34,98,111,116,116,111,109,34,108,105,107,101,32,97,32,101, +109,112,108,111,121,115,108,105,118,101,32,105,110,97,115,32,115,101,101,110,112 +,114,105,110,116,101,114,109,111,115,116,32,111,102,117,98,45,108,105,110,107, +114,101,106,101,99,116,115,97,110,100,32,117,115,101,105,109,97,103,101,34,62, +115,117,99,99,101,101,100,102,101,101,100,105,110,103,78,117,99,108,101,97,114, +105,110,102,111,114,109,97,116,111,32,104,101,108,112,87,111,109,101,110,39,115, +78,101,105,116,104,101,114,77,101,120,105,99,97,110,112,114,111,116,101,105,110, +60,116,97,98,108,101,32,98,121,32,109,97,110,121,104,101,97,108,116,104,121,108, +97,119,115,117,105,116,100,101,118,105,115,101,100,46,112,117,115,104,40,123,115 +,101,108,108,101,114,115,115,105,109,112,108,121,32,84,104,114,111,117,103,104, +46,99,111,111,107,105,101,32,73,109,97,103,101,40,111,108,100,101,114,34,62,117, +115,46,106,115,34,62,32,83,105,110,99,101,32,117,110,105,118,101,114,115,108,97, +114,103,101,114,32,111,112,101,110,32,116,111,33,45,45,32,101,110,100,108,105, +101,115,32,105,110,39,93,41,59,13,10,32,32,109,97,114,107,101,116,119,104,111,32 +,105,115,32,40,34,68,79,77,67,111,109,97,110,97,103,101,100,111,110,101,32,102, +111,114,116,121,112,101,111,102,32,75,105,110,103,100,111,109,112,114,111,102, +105,116,115,112,114,111,112,111,115,101,116,111,32,115,104,111,119,99,101,110, +116,101,114,59,109,97,100,101,32,105,116,100,114,101,115,115,101,100,119,101,114 +,101,32,105,110,109,105,120,116,117,114,101,112,114,101,99,105,115,101,97,114, +105,115,105,110,103,115,114,99,32,61,32,39,109,97,107,101,32,97,32,115,101,99, +117,114,101,100,66,97,112,116,105,115,116,118,111,116,105,110,103,32,10,9,9,118, +97,114,32,77,97,114,99,104,32,50,103,114,101,119,32,117,112,67,108,105,109,97, +116,101,46,114,101,109,111,118,101,115,107,105,108,108,101,100,119,97,121,32,116 +,104,101,60,47,104,101,97,100,62,102,97,99,101,32,111,102,97,99,116,105,110,103, +32,114,105,103,104,116,34,62,116,111,32,119,111,114,107,114,101,100,117,99,101, +115,104,97,115,32,104,97,100,101,114,101,99,116,101,100,115,104,111,119,40,41,59 +,97,99,116,105,111,110,61,98,111,111,107,32,111,102,97,110,32,97,114,101,97,61, +61,32,34,104,116,116,60,104,101,97,100,101,114,10,60,104,116,109,108,62,99,111, +110,102,111,114,109,102,97,99,105,110,103,32,99,111,111,107,105,101,46,114,101, +108,121,32,111,110,104,111,115,116,101,100,32,46,99,117,115,116,111,109,104,101, +32,119,101,110,116,98,117,116,32,102,111,114,115,112,114,101,97,100,32,70,97,109 +,105,108,121,32,97,32,109,101,97,110,115,111,117,116,32,116,104,101,102,111,114, +117,109,115,46,102,111,111,116,97,103,101,34,62,77,111,98,105,108,67,108,101,109 +,101,110,116,115,34,32,105,100,61,34,97,115,32,104,105,103,104,105,110,116,101, +110,115,101,45,45,62,60,33,45,45,102,101,109,97,108,101,32,105,115,32,115,101, +101,110,105,109,112,108,105,101,100,115,101,116,32,116,104,101,97,32,115,116,97, +116,101,97,110,100,32,104,105,115,102,97,115,116,101,115,116,98,101,115,105,100, +101,115,98,117,116,116,111,110,95,98,111,117,110,100,101,100,34,62,60,105,109, +103,32,73,110,102,111,98,111,120,101,118,101,110,116,115,44,97,32,121,111,117, +110,103,97,110,100,32,97,114,101,78,97,116,105,118,101,32,99,104,101,97,112,101, +114,84,105,109,101,111,117,116,97,110,100,32,104,97,115,101,110,103,105,110,101, +115,119,111,110,32,116,104,101,40,109,111,115,116,108,121,114,105,103,104,116,58 +,32,102,105,110,100,32,97,32,45,98,111,116,116,111,109,80,114,105,110,99,101,32, +97,114,101,97,32,111,102,109,111,114,101,32,111,102,115,101,97,114,99,104,95,110 +,97,116,117,114,101,44,108,101,103,97,108,108,121,112,101,114,105,111,100,44,108 +,97,110,100,32,111,102,111,114,32,119,105,116,104,105,110,100,117,99,101,100,112 +,114,111,118,105,110,103,109,105,115,115,105,108,101,108,111,99,97,108,108,121, +65,103,97,105,110,115,116,116,104,101,32,119,97,121,107,38,113,117,111,116,59, +112,120,59,34,62,13,10,112,117,115,104,101,100,32,97,98,97,110,100,111,110,110, +117,109,101,114,97,108,67,101,114,116,97,105,110,73,110,32,116,104,105,115,109, +111,114,101,32,105,110,111,114,32,115,111,109,101,110,97,109,101,32,105,115,97, +110,100,44,32,105,110,99,114,111,119,110,101,100,73,83,66,78,32,48,45,99,114,101 +,97,116,101,115,79,99,116,111,98,101,114,109,97,121,32,110,111,116,99,101,110, +116,101,114,32,108,97,116,101,32,105,110,68,101,102,101,110,99,101,101,110,97,99 +,116,101,100,119,105,115,104,32,116,111,98,114,111,97,100,108,121,99,111,111,108 +,105,110,103,111,110,108,111,97,100,61,105,116,46,32,84,104,101,114,101,99,111, +118,101,114,77,101,109,98,101,114,115,104,101,105,103,104,116,32,97,115,115,117, +109,101,115,60,104,116,109,108,62,10,112,101,111,112,108,101,46,105,110,32,111, +110,101,32,61,119,105,110,100,111,119,102,111,111,116,101,114,95,97,32,103,111, +111,100,32,114,101,107,108,97,109,97,111,116,104,101,114,115,44,116,111,32,116, +104,105,115,95,99,111,111,107,105,101,112,97,110,101,108,34,62,76,111,110,100, +111,110,44,100,101,102,105,110,101,115,99,114,117,115,104,101,100,98,97,112,116, +105,115,109,99,111,97,115,116,97,108,115,116,97,116,117,115,32,116,105,116,108, +101,34,32,109,111,118,101,32,116,111,108,111,115,116,32,105,110,98,101,116,116, +101,114,32,105,109,112,108,105,101,115,114,105,118,97,108,114,121,115,101,114, +118,101,114,115,32,83,121,115,116,101,109,80,101,114,104,97,112,115,101,115,32, +97,110,100,32,99,111,110,116,101,110,100,102,108,111,119,105,110,103,108,97,115, +116,101,100,32,114,105,115,101,32,105,110,71,101,110,101,115,105,115,118,105,101 +,119,32,111,102,114,105,115,105,110,103,32,115,101,101,109,32,116,111,98,117,116 +,32,105,110,32,98,97,99,107,105,110,103,104,101,32,119,105,108,108,103,105,118, +101,110,32,97,103,105,118,105,110,103,32,99,105,116,105,101,115,46,102,108,111, +119,32,111,102,32,76,97,116,101,114,32,97,108,108,32,98,117,116,72,105,103,104, +119,97,121,111,110,108,121,32,98,121,115,105,103,110,32,111,102,104,101,32,100, +111,101,115,100,105,102,102,101,114,115,98,97,116,116,101,114,121,38,97,109,112, +59,108,97,115,105,110,103,108,101,115,116,104,114,101,97,116,115,105,110,116,101 +,103,101,114,116,97,107,101,32,111,110,114,101,102,117,115,101,100,99,97,108,108 +,101,100,32,61,85,83,38,97,109,112,83,101,101,32,116,104,101,110,97,116,105,118, +101,115,98,121,32,116,104,105,115,115,121,115,116,101,109,46,104,101,97,100,32, +111,102,58,104,111,118,101,114,44,108,101,115,98,105,97,110,115,117,114,110,97, +109,101,97,110,100,32,97,108,108,99,111,109,109,111,110,47,104,101,97,100,101, +114,95,95,112,97,114,97,109,115,72,97,114,118,97,114,100,47,112,105,120,101,108, +46,114,101,109,111,118,97,108,115,111,32,108,111,110,103,114,111,108,101,32,111, +102,106,111,105,110,116,108,121,115,107,121,115,99,114,97,85,110,105,99,111,100, +101,98,114,32,47,62,13,10,65,116,108,97,110,116,97,110,117,99,108,101,117,115,67 +,111,117,110,116,121,44,112,117,114,101,108,121,32,99,111,117,110,116,34,62,101, +97,115,105,108,121,32,98,117,105,108,100,32,97,111,110,99,108,105,99,107,97,32, +103,105,118,101,110,112,111,105,110,116,101,114,104,38,113,117,111,116,59,101, +118,101,110,116,115,32,101,108,115,101,32,123,10,100,105,116,105,111,110,115,110 +,111,119,32,116,104,101,44,32,119,105,116,104,32,109,97,110,32,119,104,111,111, +114,103,47,87,101,98,111,110,101,32,97,110,100,99,97,118,97,108,114,121,72,101, +32,100,105,101,100,115,101,97,116,116,108,101,48,48,44,48,48,48,32,123,119,105, +110,100,111,119,104,97,118,101,32,116,111,105,102,40,119,105,110,100,97,110,100, +32,105,116,115,115,111,108,101,108,121,32,109,38,113,117,111,116,59,114,101,110, +101,119,101,100,68,101,116,114,111,105,116,97,109,111,110,103,115,116,101,105, +116,104,101,114,32,116,104,101,109,32,105,110,83,101,110,97,116,111,114,85,115, +60,47,97,62,60,75,105,110,103,32,111,102,70,114,97,110,99,105,115,45,112,114,111 +,100,117,99,104,101,32,117,115,101,100,97,114,116,32,97,110,100,104,105,109,32, +97,110,100,117,115,101,100,32,98,121,115,99,111,114,105,110,103,97,116,32,104, +111,109,101,116,111,32,104,97,118,101,114,101,108,97,116,101,115,105,98,105,108, +105,116,121,102,97,99,116,105,111,110,66,117,102,102,97,108,111,108,105,110,107, +34,62,60,119,104,97,116,32,104,101,102,114,101,101,32,116,111,67,105,116,121,32, +111,102,99,111,109,101,32,105,110,115,101,99,116,111,114,115,99,111,117,110,116, +101,100,111,110,101,32,100,97,121,110,101,114,118,111,117,115,115,113,117,97,114 +,101,32,125,59,105,102,40,103,111,105,110,32,119,104,97,116,105,109,103,34,32,97 +,108,105,115,32,111,110,108,121,115,101,97,114,99,104,47,116,117,101,115,100,97, +121,108,111,111,115,101,108,121,83,111,108,111,109,111,110,115,101,120,117,97, +108,32,45,32,60,97,32,104,114,109,101,100,105,117,109,34,68,79,32,78,79,84,32,70 +,114,97,110,99,101,44,119,105,116,104,32,97,32,119,97,114,32,97,110,100,115,101, +99,111,110,100,32,116,97,107,101,32,97,32,62,13,10,13,10,13,10,109,97,114,107, +101,116,46,104,105,103,104,119,97,121,100,111,110,101,32,105,110,99,116,105,118, +105,116,121,34,108,97,115,116,34,62,111,98,108,105,103,101,100,114,105,115,101, +32,116,111,34,117,110,100,101,102,105,109,97,100,101,32,116,111,32,69,97,114,108 +,121,32,112,114,97,105,115,101,100,105,110,32,105,116,115,32,102,111,114,32,104, +105,115,97,116,104,108,101,116,101,74,117,112,105,116,101,114,89,97,104,111,111, +33,32,116,101,114,109,101,100,32,115,111,32,109,97,110,121,114,101,97,108,108, +121,32,115,46,32,84,104,101,32,97,32,119,111,109,97,110,63,118,97,108,117,101,61 +,100,105,114,101,99,116,32,114,105,103,104,116,34,32,98,105,99,121,99,108,101,97 +,99,105,110,103,61,34,100,97,121,32,97,110,100,115,116,97,116,105,110,103,82,97, +116,104,101,114,44,104,105,103,104,101,114,32,79,102,102,105,99,101,32,97,114, +101,32,110,111,119,116,105,109,101,115,44,32,119,104,101,110,32,97,32,112,97,121 +,32,102,111,114,111,110,32,116,104,105,115,45,108,105,110,107,34,62,59,98,111, +114,100,101,114,97,114,111,117,110,100,32,97,110,110,117,97,108,32,116,104,101, +32,78,101,119,112,117,116,32,116,104,101,46,99,111,109,34,32,116,97,107,105,110, +32,116,111,97,32,98,114,105,101,102,40,105,110,32,116,104,101,103,114,111,117, +112,115,46,59,32,119,105,100,116,104,101,110,122,121,109,101,115,115,105,109,112 +,108,101,32,105,110,32,108,97,116,101,123,114,101,116,117,114,110,116,104,101, +114,97,112,121,97,32,112,111,105,110,116,98,97,110,110,105,110,103,105,110,107, +115,34,62,10,40,41,59,34,32,114,101,97,32,112,108,97,99,101,92,117,48,48,51,67, +97,97,98,111,117,116,32,97,116,114,62,13,10,9,9,99,99,111,117,110,116,32,103,105 +,118,101,115,32,97,60,83,67,82,73,80,84,82,97,105,108,119,97,121,116,104,101,109 +,101,115,47,116,111,111,108,98,111,120,66,121,73,100,40,34,120,104,117,109,97, +110,115,44,119,97,116,99,104,101,115,105,110,32,115,111,109,101,32,105,102,32,40 +,119,105,99,111,109,105,110,103,32,102,111,114,109,97,116,115,32,85,110,100,101, +114,32,98,117,116,32,104,97,115,104,97,110,100,101,100,32,109,97,100,101,32,98, +121,116,104,97,110,32,105,110,102,101,97,114,32,111,102,100,101,110,111,116,101, +100,47,105,102,114,97,109,101,108,101,102,116,32,105,110,118,111,108,116,97,103, +101,105,110,32,101,97,99,104,97,38,113,117,111,116,59,98,97,115,101,32,111,102, +73,110,32,109,97,110,121,117,110,100,101,114,103,111,114,101,103,105,109,101,115 +,97,99,116,105,111,110,32,60,47,112,62,13,10,60,117,115,116,111,109,86,97,59,38, +103,116,59,60,47,105,109,112,111,114,116,115,111,114,32,116,104,97,116,109,111, +115,116,108,121,32,38,97,109,112,59,114,101,32,115,105,122,101,61,34,60,47,97,62 +,60,47,104,97,32,99,108,97,115,115,112,97,115,115,105,118,101,72,111,115,116,32, +61,32,87,104,101,116,104,101,114,102,101,114,116,105,108,101,86,97,114,105,111, +117,115,61,91,93,59,40,102,117,99,97,109,101,114,97,115,47,62,60,47,116,100,62, +97,99,116,115,32,97,115,73,110,32,115,111,109,101,62,13,10,13,10,60,33,111,114, +103,97,110,105,115,32,60,98,114,32,47,62,66,101,105,106,105,110,103,99,97,116,97 +,108,195,160,100,101,117,116,115,99,104,101,117,114,111,112,101,117,101,117,115, +107,97,114,97,103,97,101,105,108,103,101,115,118,101,110,115,107,97,101,115,112, +97,195,177,97,109,101,110,115,97,106,101,117,115,117,97,114,105,111,116,114,97, +98,97,106,111,109,195,169,120,105,99,111,112,195,161,103,105,110,97,115,105,101, +109,112,114,101,115,105,115,116,101,109,97,111,99,116,117,98,114,101,100,117,114 +,97,110,116,101,97,195,177,97,100,105,114,101,109,112,114,101,115,97,109,111,109 +,101,110,116,111,110,117,101,115,116,114,111,112,114,105,109,101,114,97,116,114, +97,118,195,169,115,103,114,97,99,105,97,115,110,117,101,115,116,114,97,112,114, +111,99,101,115,111,101,115,116,97,100,111,115,99,97,108,105,100,97,100,112,101, +114,115,111,110,97,110,195,186,109,101,114,111,97,99,117,101,114,100,111,109,195 +,186,115,105,99,97,109,105,101,109,98,114,111,111,102,101,114,116,97,115,97,108, +103,117,110,111,115,112,97,195,173,115,101,115,101,106,101,109,112,108,111,100, +101,114,101,99,104,111,97,100,101,109,195,161,115,112,114,105,118,97,100,111,97, +103,114,101,103,97,114,101,110,108,97,99,101,115,112,111,115,105,98,108,101,104, +111,116,101,108,101,115,115,101,118,105,108,108,97,112,114,105,109,101,114,111, +195,186,108,116,105,109,111,101,118,101,110,116,111,115,97,114,99,104,105,118, +111,99,117,108,116,117,114,97,109,117,106,101,114,101,115,101,110,116,114,97,100 +,97,97,110,117,110,99,105,111,101,109,98,97,114,103,111,109,101,114,99,97,100, +111,103,114,97,110,100,101,115,101,115,116,117,100,105,111,109,101,106,111,114, +101,115,102,101,98,114,101,114,111,100,105,115,101,195,177,111,116,117,114,105, +115,109,111,99,195,179,100,105,103,111,112,111,114,116,97,100,97,101,115,112,97, +99,105,111,102,97,109,105,108,105,97,97,110,116,111,110,105,111,112,101,114,109, +105,116,101,103,117,97,114,100,97,114,97,108,103,117,110,97,115,112,114,101,99, +105,111,115,97,108,103,117,105,101,110,115,101,110,116,105,100,111,118,105,115, +105,116,97,115,116,195,173,116,117,108,111,99,111,110,111,99,101,114,115,101,103 +,117,110,100,111,99,111,110,115,101,106,111,102,114,97,110,99,105,97,109,105,110 +,117,116,111,115,115,101,103,117,110,100,97,116,101,110,101,109,111,115,101,102, +101,99,116,111,115,109,195,161,108,97,103,97,115,101,115,105,195,179,110,114,101 +,118,105,115,116,97,103,114,97,110,97,100,97,99,111,109,112,114,97,114,105,110, +103,114,101,115,111,103,97,114,99,195,173,97,97,99,99,105,195,179,110,101,99,117 +,97,100,111,114,113,117,105,101,110,101,115,105,110,99,108,117,115,111,100,101, +98,101,114,195,161,109,97,116,101,114,105,97,104,111,109,98,114,101,115,109,117, +101,115,116,114,97,112,111,100,114,195,173,97,109,97,195,177,97,110,97,195,186, +108,116,105,109,97,101,115,116,97,109,111,115,111,102,105,99,105,97,108,116,97, +109,98,105,101,110,110,105,110,103,195,186,110,115,97,108,117,100,111,115,112, +111,100,101,109,111,115,109,101,106,111,114,97,114,112,111,115,105,116,105,111, +110,98,117,115,105,110,101,115,115,104,111,109,101,112,97,103,101,115,101,99,117 +,114,105,116,121,108,97,110,103,117,97,103,101,115,116,97,110,100,97,114,100,99, +97,109,112,97,105,103,110,102,101,97,116,117,114,101,115,99,97,116,101,103,111, +114,121,101,120,116,101,114,110,97,108,99,104,105,108,100,114,101,110,114,101, +115,101,114,118,101,100,114,101,115,101,97,114,99,104,101,120,99,104,97,110,103, +101,102,97,118,111,114,105,116,101,116,101,109,112,108,97,116,101,109,105,108, +105,116,97,114,121,105,110,100,117,115,116,114,121,115,101,114,118,105,99,101, +115,109,97,116,101,114,105,97,108,112,114,111,100,117,99,116,115,122,45,105,110, +100,101,120,58,99,111,109,109,101,110,116,115,115,111,102,116,119,97,114,101,99, +111,109,112,108,101,116,101,99,97,108,101,110,100,97,114,112,108,97,116,102,111, +114,109,97,114,116,105,99,108,101,115,114,101,113,117,105,114,101,100,109,111, +118,101,109,101,110,116,113,117,101,115,116,105,111,110,98,117,105,108,100,105, +110,103,112,111,108,105,116,105,99,115,112,111,115,115,105,98,108,101,114,101, +108,105,103,105,111,110,112,104,121,115,105,99,97,108,102,101,101,100,98,97,99, +107,114,101,103,105,115,116,101,114,112,105,99,116,117,114,101,115,100,105,115, +97,98,108,101,100,112,114,111,116,111,99,111,108,97,117,100,105,101,110,99,101, +115,101,116,116,105,110,103,115,97,99,116,105,118,105,116,121,101,108,101,109, +101,110,116,115,108,101,97,114,110,105,110,103,97,110,121,116,104,105,110,103,97 +,98,115,116,114,97,99,116,112,114,111,103,114,101,115,115,111,118,101,114,118, +105,101,119,109,97,103,97,122,105,110,101,101,99,111,110,111,109,105,99,116,114, +97,105,110,105,110,103,112,114,101,115,115,117,114,101,118,97,114,105,111,117, +115,32,60,115,116,114,111,110,103,62,112,114,111,112,101,114,116,121,115,104,111 +,112,112,105,110,103,116,111,103,101,116,104,101,114,97,100,118,97,110,99,101, +100,98,101,104,97,118,105,111,114,100,111,119,110,108,111,97,100,102,101,97,116, +117,114,101,100,102,111,111,116,98,97,108,108,115,101,108,101,99,116,101,100,76, +97,110,103,117,97,103,101,100,105,115,116,97,110,99,101,114,101,109,101,109,98, +101,114,116,114,97,99,107,105,110,103,112,97,115,115,119,111,114,100,109,111,100 +,105,102,105,101,100,115,116,117,100,101,110,116,115,100,105,114,101,99,116,108, +121,102,105,103,104,116,105,110,103,110,111,114,116,104,101,114,110,100,97,116, +97,98,97,115,101,102,101,115,116,105,118,97,108,98,114,101,97,107,105,110,103, +108,111,99,97,116,105,111,110,105,110,116,101,114,110,101,116,100,114,111,112, +100,111,119,110,112,114,97,99,116,105,99,101,101,118,105,100,101,110,99,101,102, +117,110,99,116,105,111,110,109,97,114,114,105,97,103,101,114,101,115,112,111,110 +,115,101,112,114,111,98,108,101,109,115,110,101,103,97,116,105,118,101,112,114, +111,103,114,97,109,115,97,110,97,108,121,115,105,115,114,101,108,101,97,115,101, +100,98,97,110,110,101,114,34,62,112,117,114,99,104,97,115,101,112,111,108,105,99 +,105,101,115,114,101,103,105,111,110,97,108,99,114,101,97,116,105,118,101,97,114 +,103,117,109,101,110,116,98,111,111,107,109,97,114,107,114,101,102,101,114,114, +101,114,99,104,101,109,105,99,97,108,100,105,118,105,115,105,111,110,99,97,108, +108,98,97,99,107,115,101,112,97,114,97,116,101,112,114,111,106,101,99,116,115,99 +,111,110,102,108,105,99,116,104,97,114,100,119,97,114,101,105,110,116,101,114, +101,115,116,100,101,108,105,118,101,114,121,109,111,117,110,116,97,105,110,111, +98,116,97,105,110,101,100,61,32,102,97,108,115,101,59,102,111,114,40,118,97,114, +32,97,99,99,101,112,116,101,100,99,97,112,97,99,105,116,121,99,111,109,112,117, +116,101,114,105,100,101,110,116,105,116,121,97,105,114,99,114,97,102,116,101,109 +,112,108,111,121,101,100,112,114,111,112,111,115,101,100,100,111,109,101,115,116 +,105,99,105,110,99,108,117,100,101,115,112,114,111,118,105,100,101,100,104,111, +115,112,105,116,97,108,118,101,114,116,105,99,97,108,99,111,108,108,97,112,115, +101,97,112,112,114,111,97,99,104,112,97,114,116,110,101,114,115,108,111,103,111, +34,62,60,97,100,97,117,103,104,116,101,114,97,117,116,104,111,114,34,32,99,117, +108,116,117,114,97,108,102,97,109,105,108,105,101,115,47,105,109,97,103,101,115, +47,97,115,115,101,109,98,108,121,112,111,119,101,114,102,117,108,116,101,97,99, +104,105,110,103,102,105,110,105,115,104,101,100,100,105,115,116,114,105,99,116, +99,114,105,116,105,99,97,108,99,103,105,45,98,105,110,47,112,117,114,112,111,115 +,101,115,114,101,113,117,105,114,101,115,101,108,101,99,116,105,111,110,98,101, +99,111,109,105,110,103,112,114,111,118,105,100,101,115,97,99,97,100,101,109,105, +99,101,120,101,114,99,105,115,101,97,99,116,117,97,108,108,121,109,101,100,105, +99,105,110,101,99,111,110,115,116,97,110,116,97,99,99,105,100,101,110,116,77,97, +103,97,122,105,110,101,100,111,99,117,109,101,110,116,115,116,97,114,116,105,110 +,103,98,111,116,116,111,109,34,62,111,98,115,101,114,118,101,100,58,32,38,113, +117,111,116,59,101,120,116,101,110,100,101,100,112,114,101,118,105,111,117,115, +83,111,102,116,119,97,114,101,99,117,115,116,111,109,101,114,100,101,99,105,115, +105,111,110,115,116,114,101,110,103,116,104,100,101,116,97,105,108,101,100,115, +108,105,103,104,116,108,121,112,108,97,110,110,105,110,103,116,101,120,116,97, +114,101,97,99,117,114,114,101,110,99,121,101,118,101,114,121,111,110,101,115,116 +,114,97,105,103,104,116,116,114,97,110,115,102,101,114,112,111,115,105,116,105, +118,101,112,114,111,100,117,99,101,100,104,101,114,105,116,97,103,101,115,104, +105,112,112,105,110,103,97,98,115,111,108,117,116,101,114,101,99,101,105,118,101 +,100,114,101,108,101,118,97,110,116,98,117,116,116,111,110,34,32,118,105,111,108 +,101,110,99,101,97,110,121,119,104,101,114,101,98,101,110,101,102,105,116,115, +108,97,117,110,99,104,101,100,114,101,99,101,110,116,108,121,97,108,108,105,97, +110,99,101,102,111,108,108,111,119,101,100,109,117,108,116,105,112,108,101,98, +117,108,108,101,116,105,110,105,110,99,108,117,100,101,100,111,99,99,117,114,114 +,101,100,105,110,116,101,114,110,97,108,36,40,116,104,105,115,41,46,114,101,112, +117,98,108,105,99,62,60,116,114,62,60,116,100,99,111,110,103,114,101,115,115,114 +,101,99,111,114,100,101,100,117,108,116,105,109,97,116,101,115,111,108,117,116, +105,111,110,60,117,108,32,105,100,61,34,100,105,115,99,111,118,101,114,72,111, +109,101,60,47,97,62,119,101,98,115,105,116,101,115,110,101,116,119,111,114,107, +115,97,108,116,104,111,117,103,104,101,110,116,105,114,101,108,121,109,101,109, +111,114,105,97,108,109,101,115,115,97,103,101,115,99,111,110,116,105,110,117,101 +,97,99,116,105,118,101,34,62,115,111,109,101,119,104,97,116,118,105,99,116,111, +114,105,97,87,101,115,116,101,114,110,32,32,116,105,116,108,101,61,34,76,111,99, +97,116,105,111,110,99,111,110,116,114,97,99,116,118,105,115,105,116,111,114,115, +68,111,119,110,108,111,97,100,119,105,116,104,111,117,116,32,114,105,103,104,116 +,34,62,10,109,101,97,115,117,114,101,115,119,105,100,116,104,32,61,32,118,97,114 +,105,97,98,108,101,105,110,118,111,108,118,101,100,118,105,114,103,105,110,105, +97,110,111,114,109,97,108,108,121,104,97,112,112,101,110,101,100,97,99,99,111, +117,110,116,115,115,116,97,110,100,105,110,103,110,97,116,105,111,110,97,108,82, +101,103,105,115,116,101,114,112,114,101,112,97,114,101,100,99,111,110,116,114, +111,108,115,97,99,99,117,114,97,116,101,98,105,114,116,104,100,97,121,115,116, +114,97,116,101,103,121,111,102,102,105,99,105,97,108,103,114,97,112,104,105,99, +115,99,114,105,109,105,110,97,108,112,111,115,115,105,98,108,121,99,111,110,115, +117,109,101,114,80,101,114,115,111,110,97,108,115,112,101,97,107,105,110,103,118 +,97,108,105,100,97,116,101,97,99,104,105,101,118,101,100,46,106,112,103,34,32,47 +,62,109,97,99,104,105,110,101,115,60,47,104,50,62,10,32,32,107,101,121,119,111, +114,100,115,102,114,105,101,110,100,108,121,98,114,111,116,104,101,114,115,99, +111,109,98,105,110,101,100,111,114,105,103,105,110,97,108,99,111,109,112,111,115 +,101,100,101,120,112,101,99,116,101,100,97,100,101,113,117,97,116,101,112,97,107 +,105,115,116,97,110,102,111,108,108,111,119,34,32,118,97,108,117,97,98,108,101, +60,47,108,97,98,101,108,62,114,101,108,97,116,105,118,101,98,114,105,110,103,105 +,110,103,105,110,99,114,101,97,115,101,103,111,118,101,114,110,111,114,112,108, +117,103,105,110,115,47,76,105,115,116,32,111,102,32,72,101,97,100,101,114,34,62, +34,32,110,97,109,101,61,34,32,40,38,113,117,111,116,59,103,114,97,100,117,97,116 +,101,60,47,104,101,97,100,62,10,99,111,109,109,101,114,99,101,109,97,108,97,121, +115,105,97,100,105,114,101,99,116,111,114,109,97,105,110,116,97,105,110,59,104, +101,105,103,104,116,58,115,99,104,101,100,117,108,101,99,104,97,110,103,105,110, +103,98,97,99,107,32,116,111,32,99,97,116,104,111,108,105,99,112,97,116,116,101, +114,110,115,99,111,108,111,114,58,32,35,103,114,101,97,116,101,115,116,115,117, +112,112,108,105,101,115,114,101,108,105,97,98,108,101,60,47,117,108,62,10,9,9,60 +,115,101,108,101,99,116,32,99,105,116,105,122,101,110,115,99,108,111,116,104,105 +,110,103,119,97,116,99,104,105,110,103,60,108,105,32,105,100,61,34,115,112,101, +99,105,102,105,99,99,97,114,114,121,105,110,103,115,101,110,116,101,110,99,101, +60,99,101,110,116,101,114,62,99,111,110,116,114,97,115,116,116,104,105,110,107, +105,110,103,99,97,116,99,104,40,101,41,115,111,117,116,104,101,114,110,77,105,99 +,104,97,101,108,32,109,101,114,99,104,97,110,116,99,97,114,111,117,115,101,108, +112,97,100,100,105,110,103,58,105,110,116,101,114,105,111,114,46,115,112,108,105 +,116,40,34,108,105,122,97,116,105,111,110,79,99,116,111,98,101,114,32,41,123,114 +,101,116,117,114,110,105,109,112,114,111,118,101,100,45,45,38,103,116,59,10,10, +99,111,118,101,114,97,103,101,99,104,97,105,114,109,97,110,46,112,110,103,34,32, +47,62,115,117,98,106,101,99,116,115,82,105,99,104,97,114,100,32,119,104,97,116, +101,118,101,114,112,114,111,98,97,98,108,121,114,101,99,111,118,101,114,121,98, +97,115,101,98,97,108,108,106,117,100,103,109,101,110,116,99,111,110,110,101,99, +116,46,46,99,115,115,34,32,47,62,32,119,101,98,115,105,116,101,114,101,112,111, +114,116,101,100,100,101,102,97,117,108,116,34,47,62,60,47,97,62,13,10,101,108, +101,99,116,114,105,99,115,99,111,116,108,97,110,100,99,114,101,97,116,105,111, +110,113,117,97,110,116,105,116,121,46,32,73,83,66,78,32,48,100,105,100,32,110, +111,116,32,105,110,115,116,97,110,99,101,45,115,101,97,114,99,104,45,34,32,108, +97,110,103,61,34,115,112,101,97,107,101,114,115,67,111,109,112,117,116,101,114, +99,111,110,116,97,105,110,115,97,114,99,104,105,118,101,115,109,105,110,105,115, +116,101,114,114,101,97,99,116,105,111,110,100,105,115,99,111,117,110,116,73,116, +97,108,105,97,110,111,99,114,105,116,101,114,105,97,115,116,114,111,110,103,108, +121,58,32,39,104,116,116,112,58,39,115,99,114,105,112,116,39,99,111,118,101,114, +105,110,103,111,102,102,101,114,105,110,103,97,112,112,101,97,114,101,100,66,114 +,105,116,105,115,104,32,105,100,101,110,116,105,102,121,70,97,99,101,98,111,111, +107,110,117,109,101,114,111,117,115,118,101,104,105,99,108,101,115,99,111,110,99 +,101,114,110,115,65,109,101,114,105,99,97,110,104,97,110,100,108,105,110,103,100 +,105,118,32,105,100,61,34,87,105,108,108,105,97,109,32,112,114,111,118,105,100, +101,114,95,99,111,110,116,101,110,116,97,99,99,117,114,97,99,121,115,101,99,116, +105,111,110,32,97,110,100,101,114,115,111,110,102,108,101,120,105,98,108,101,67, +97,116,101,103,111,114,121,108,97,119,114,101,110,99,101,60,115,99,114,105,112, +116,62,108,97,121,111,117,116,61,34,97,112,112,114,111,118,101,100,32,109,97,120 +,105,109,117,109,104,101,97,100,101,114,34,62,60,47,116,97,98,108,101,62,83,101, +114,118,105,99,101,115,104,97,109,105,108,116,111,110,99,117,114,114,101,110,116 +,32,99,97,110,97,100,105,97,110,99,104,97,110,110,101,108,115,47,116,104,101,109 +,101,115,47,47,97,114,116,105,99,108,101,111,112,116,105,111,110,97,108,112,111, +114,116,117,103,97,108,118,97,108,117,101,61,34,34,105,110,116,101,114,118,97, +108,119,105,114,101,108,101,115,115,101,110,116,105,116,108,101,100,97,103,101, +110,99,105,101,115,83,101,97,114,99,104,34,32,109,101,97,115,117,114,101,100,116 +,104,111,117,115,97,110,100,115,112,101,110,100,105,110,103,38,104,101,108,108, +105,112,59,110,101,119,32,68,97,116,101,34,32,115,105,122,101,61,34,112,97,103, +101,78,97,109,101,109,105,100,100,108,101,34,32,34,32,47,62,60,47,97,62,104,105, +100,100,101,110,34,62,115,101,113,117,101,110,99,101,112,101,114,115,111,110,97, +108,111,118,101,114,102,108,111,119,111,112,105,110,105,111,110,115,105,108,108, +105,110,111,105,115,108,105,110,107,115,34,62,10,9,60,116,105,116,108,101,62,118 +,101,114,115,105,111,110,115,115,97,116,117,114,100,97,121,116,101,114,109,105, +110,97,108,105,116,101,109,112,114,111,112,101,110,103,105,110,101,101,114,115, +101,99,116,105,111,110,115,100,101,115,105,103,110,101,114,112,114,111,112,111, +115,97,108,61,34,102,97,108,115,101,34,69,115,112,97,195,177,111,108,114,101,108 +,101,97,115,101,115,115,117,98,109,105,116,34,32,101,114,38,113,117,111,116,59, +97,100,100,105,116,105,111,110,115,121,109,112,116,111,109,115,111,114,105,101, +110,116,101,100,114,101,115,111,117,114,99,101,114,105,103,104,116,34,62,60,112, +108,101,97,115,117,114,101,115,116,97,116,105,111,110,115,104,105,115,116,111, +114,121,46,108,101,97,118,105,110,103,32,32,98,111,114,100,101,114,61,99,111,110 +,116,101,110,116,115,99,101,110,116,101,114,34,62,46,10,10,83,111,109,101,32,100 +,105,114,101,99,116,101,100,115,117,105,116,97,98,108,101,98,117,108,103,97,114, +105,97,46,115,104,111,119,40,41,59,100,101,115,105,103,110,101,100,71,101,110, +101,114,97,108,32,99,111,110,99,101,112,116,115,69,120,97,109,112,108,101,115, +119,105,108,108,105,97,109,115,79,114,105,103,105,110,97,108,34,62,60,115,112,97 +,110,62,115,101,97,114,99,104,34,62,111,112,101,114,97,116,111,114,114,101,113, +117,101,115,116,115,97,32,38,113,117,111,116,59,97,108,108,111,119,105,110,103, +68,111,99,117,109,101,110,116,114,101,118,105,115,105,111,110,46,32,10,10,84,104 +,101,32,121,111,117,114,115,101,108,102,67,111,110,116,97,99,116,32,109,105,99, +104,105,103,97,110,69,110,103,108,105,115,104,32,99,111,108,117,109,98,105,97, +112,114,105,111,114,105,116,121,112,114,105,110,116,105,110,103,100,114,105,110, +107,105,110,103,102,97,99,105,108,105,116,121,114,101,116,117,114,110,101,100,67 +,111,110,116,101,110,116,32,111,102,102,105,99,101,114,115,82,117,115,115,105,97 +,110,32,103,101,110,101,114,97,116,101,45,56,56,53,57,45,49,34,105,110,100,105, +99,97,116,101,102,97,109,105,108,105,97,114,32,113,117,97,108,105,116,121,109,97 +,114,103,105,110,58,48,32,99,111,110,116,101,110,116,118,105,101,119,112,111,114 +,116,99,111,110,116,97,99,116,115,45,116,105,116,108,101,34,62,112,111,114,116, +97,98,108,101,46,108,101,110,103,116,104,32,101,108,105,103,105,98,108,101,105, +110,118,111,108,118,101,115,97,116,108,97,110,116,105,99,111,110,108,111,97,100, +61,34,100,101,102,97,117,108,116,46,115,117,112,112,108,105,101,100,112,97,121, +109,101,110,116,115,103,108,111,115,115,97,114,121,10,10,65,102,116,101,114,32, +103,117,105,100,97,110,99,101,60,47,116,100,62,60,116,100,101,110,99,111,100,105 +,110,103,109,105,100,100,108,101,34,62,99,97,109,101,32,116,111,32,100,105,115, +112,108,97,121,115,115,99,111,116,116,105,115,104,106,111,110,97,116,104,97,110, +109,97,106,111,114,105,116,121,119,105,100,103,101,116,115,46,99,108,105,110,105 +,99,97,108,116,104,97,105,108,97,110,100,116,101,97,99,104,101,114,115,60,104, +101,97,100,62,10,9,97,102,102,101,99,116,101,100,115,117,112,112,111,114,116,115 +,112,111,105,110,116,101,114,59,116,111,83,116,114,105,110,103,60,47,115,109,97, +108,108,62,111,107,108,97,104,111,109,97,119,105,108,108,32,98,101,32,105,110, +118,101,115,116,111,114,48,34,32,97,108,116,61,34,104,111,108,105,100,97,121,115 +,82,101,115,111,117,114,99,101,108,105,99,101,110,115,101,100,32,40,119,104,105, +99,104,32,46,32,65,102,116,101,114,32,99,111,110,115,105,100,101,114,118,105,115 +,105,116,105,110,103,101,120,112,108,111,114,101,114,112,114,105,109,97,114,121, +32,115,101,97,114,99,104,34,32,97,110,100,114,111,105,100,34,113,117,105,99,107, +108,121,32,109,101,101,116,105,110,103,115,101,115,116,105,109,97,116,101,59,114 +,101,116,117,114,110,32,59,99,111,108,111,114,58,35,32,104,101,105,103,104,116, +61,97,112,112,114,111,118,97,108,44,32,38,113,117,111,116,59,32,99,104,101,99, +107,101,100,46,109,105,110,46,106,115,34,109,97,103,110,101,116,105,99,62,60,47, +97,62,60,47,104,102,111,114,101,99,97,115,116,46,32,87,104,105,108,101,32,116, +104,117,114,115,100,97,121,100,118,101,114,116,105,115,101,38,101,97,99,117,116, +101,59,104,97,115,67,108,97,115,115,101,118,97,108,117,97,116,101,111,114,100, +101,114,105,110,103,101,120,105,115,116,105,110,103,112,97,116,105,101,110,116, +115,32,79,110,108,105,110,101,32,99,111,108,111,114,97,100,111,79,112,116,105, +111,110,115,34,99,97,109,112,98,101,108,108,60,33,45,45,32,101,110,100,60,47,115 +,112,97,110,62,60,60,98,114,32,47,62,13,10,95,112,111,112,117,112,115,124,115,99 +,105,101,110,99,101,115,44,38,113,117,111,116,59,32,113,117,97,108,105,116,121, +32,87,105,110,100,111,119,115,32,97,115,115,105,103,110,101,100,104,101,105,103, +104,116,58,32,60,98,32,99,108,97,115,115,108,101,38,113,117,111,116,59,32,118,97 +,108,117,101,61,34,32,67,111,109,112,97,110,121,101,120,97,109,112,108,101,115, +60,105,102,114,97,109,101,32,98,101,108,105,101,118,101,115,112,114,101,115,101, +110,116,115,109,97,114,115,104,97,108,108,112,97,114,116,32,111,102,32,112,114, +111,112,101,114,108,121,41,46,10,10,84,104,101,32,116,97,120,111,110,111,109,121 +,109,117,99,104,32,111,102,32,60,47,115,112,97,110,62,10,34,32,100,97,116,97,45, +115,114,116,117,103,117,195,170,115,115,99,114,111,108,108,84,111,32,112,114,111 +,106,101,99,116,60,104,101,97,100,62,13,10,97,116,116,111,114,110,101,121,101, +109,112,104,97,115,105,115,115,112,111,110,115,111,114,115,102,97,110,99,121,98, +111,120,119,111,114,108,100,39,115,32,119,105,108,100,108,105,102,101,99,104,101 +,99,107,101,100,61,115,101,115,115,105,111,110,115,112,114,111,103,114,97,109, +109,112,120,59,102,111,110,116,45,32,80,114,111,106,101,99,116,106,111,117,114, +110,97,108,115,98,101,108,105,101,118,101,100,118,97,99,97,116,105,111,110,116, +104,111,109,112,115,111,110,108,105,103,104,116,105,110,103,97,110,100,32,116, +104,101,32,115,112,101,99,105,97,108,32,98,111,114,100,101,114,61,48,99,104,101, +99,107,105,110,103,60,47,116,98,111,100,121,62,60,98,117,116,116,111,110,32,67, +111,109,112,108,101,116,101,99,108,101,97,114,102,105,120,10,60,104,101,97,100, +62,10,97,114,116,105,99,108,101,32,60,115,101,99,116,105,111,110,102,105,110,100 +,105,110,103,115,114,111,108,101,32,105,110,32,112,111,112,117,108,97,114,32,32, +79,99,116,111,98,101,114,119,101,98,115,105,116,101,32,101,120,112,111,115,117, +114,101,117,115,101,100,32,116,111,32,32,99,104,97,110,103,101,115,111,112,101, +114,97,116,101,100,99,108,105,99,107,105,110,103,101,110,116,101,114,105,110,103 +,99,111,109,109,97,110,100,115,105,110,102,111,114,109,101,100,32,110,117,109,98 +,101,114,115,32,32,60,47,100,105,118,62,99,114,101,97,116,105,110,103,111,110,83 +,117,98,109,105,116,109,97,114,121,108,97,110,100,99,111,108,108,101,103,101,115 +,97,110,97,108,121,116,105,99,108,105,115,116,105,110,103,115,99,111,110,116,97, +99,116,46,108,111,103,103,101,100,73,110,97,100,118,105,115,111,114,121,115,105, +98,108,105,110,103,115,99,111,110,116,101,110,116,34,115,38,113,117,111,116,59, +41,115,46,32,84,104,105,115,32,112,97,99,107,97,103,101,115,99,104,101,99,107,98 +,111,120,115,117,103,103,101,115,116,115,112,114,101,103,110,97,110,116,116,111, +109,111,114,114,111,119,115,112,97,99,105,110,103,61,105,99,111,110,46,112,110, +103,106,97,112,97,110,101,115,101,99,111,100,101,98,97,115,101,98,117,116,116, +111,110,34,62,103,97,109,98,108,105,110,103,115,117,99,104,32,97,115,32,44,32, +119,104,105,108,101,32,60,47,115,112,97,110,62,32,109,105,115,115,111,117,114, +105,115,112,111,114,116,105,110,103,116,111,112,58,49,112,120,32,46,60,47,115, +112,97,110,62,116,101,110,115,105,111,110,115,119,105,100,116,104,61,34,50,108, +97,122,121,108,111,97,100,110,111,118,101,109,98,101,114,117,115,101,100,32,105, +110,32,104,101,105,103,104,116,61,34,99,114,105,112,116,34,62,10,38,110,98,115, +112,59,60,47,60,116,114,62,60,116,100,32,104,101,105,103,104,116,58,50,47,112, +114,111,100,117,99,116,99,111,117,110,116,114,121,32,105,110,99,108,117,100,101, +32,102,111,111,116,101,114,34,32,38,108,116,59,33,45,45,32,116,105,116,108,101, +34,62,60,47,106,113,117,101,114,121,46,60,47,102,111,114,109,62,10,40,231,174, +128,228,189,147,41,40,231,185,129,233,171,148,41,104,114,118,97,116,115,107,105, +105,116,97,108,105,97,110,111,114,111,109,195,162,110,196,131,116,195,188,114, +107,195,167,101,216,167,216,177,216,175,217,136,116,97,109,98,105,195,169,110, +110,111,116,105,99,105,97,115,109,101,110,115,97,106,101,115,112,101,114,115,111 +,110,97,115,100,101,114,101,99,104,111,115,110,97,99,105,111,110,97,108,115,101, +114,118,105,99,105,111,99,111,110,116,97,99,116,111,117,115,117,97,114,105,111, +115,112,114,111,103,114,97,109,97,103,111,98,105,101,114,110,111,101,109,112,114 +,101,115,97,115,97,110,117,110,99,105,111,115,118,97,108,101,110,99,105,97,99, +111,108,111,109,98,105,97,100,101,115,112,117,195,169,115,100,101,112,111,114, +116,101,115,112,114,111,121,101,99,116,111,112,114,111,100,117,99,116,111,112, +195,186,98,108,105,99,111,110,111,115,111,116,114,111,115,104,105,115,116,111, +114,105,97,112,114,101,115,101,110,116,101,109,105,108,108,111,110,101,115,109, +101,100,105,97,110,116,101,112,114,101,103,117,110,116,97,97,110,116,101,114,105 +,111,114,114,101,99,117,114,115,111,115,112,114,111,98,108,101,109,97,115,97,110 +,116,105,97,103,111,110,117,101,115,116,114,111,115,111,112,105,110,105,195,179, +110,105,109,112,114,105,109,105,114,109,105,101,110,116,114,97,115,97,109,195, +169,114,105,99,97,118,101,110,100,101,100,111,114,115,111,99,105,101,100,97,100, +114,101,115,112,101,99,116,111,114,101,97,108,105,122,97,114,114,101,103,105,115 +,116,114,111,112,97,108,97,98,114,97,115,105,110,116,101,114,195,169,115,101,110 +,116,111,110,99,101,115,101,115,112,101,99,105,97,108,109,105,101,109,98,114,111 +,115,114,101,97,108,105,100,97,100,99,195,179,114,100,111,98,97,122,97,114,97, +103,111,122,97,112,195,161,103,105,110,97,115,115,111,99,105,97,108,101,115,98, +108,111,113,117,101,97,114,103,101,115,116,105,195,179,110,97,108,113,117,105, +108,101,114,115,105,115,116,101,109,97,115,99,105,101,110,99,105,97,115,99,111, +109,112,108,101,116,111,118,101,114,115,105,195,179,110,99,111,109,112,108,101, +116,97,101,115,116,117,100,105,111,115,112,195,186,98,108,105,99,97,111,98,106, +101,116,105,118,111,97,108,105,99,97,110,116,101,98,117,115,99,97,100,111,114,99 +,97,110,116,105,100,97,100,101,110,116,114,97,100,97,115,97,99,99,105,111,110, +101,115,97,114,99,104,105,118,111,115,115,117,112,101,114,105,111,114,109,97,121 +,111,114,195,173,97,97,108,101,109,97,110,105,97,102,117,110,99,105,195,179,110, +195,186,108,116,105,109,111,115,104,97,99,105,101,110,100,111,97,113,117,101,108 +,108,111,115,101,100,105,99,105,195,179,110,102,101,114,110,97,110,100,111,97, +109,98,105,101,110,116,101,102,97,99,101,98,111,111,107,110,117,101,115,116,114, +97,115,99,108,105,101,110,116,101,115,112,114,111,99,101,115,111,115,98,97,115, +116,97,110,116,101,112,114,101,115,101,110,116,97,114,101,112,111,114,116,97,114 +,99,111,110,103,114,101,115,111,112,117,98,108,105,99,97,114,99,111,109,101,114, +99,105,111,99,111,110,116,114,97,116,111,106,195,179,118,101,110,101,115,100,105 +,115,116,114,105,116,111,116,195,169,99,110,105,99,97,99,111,110,106,117,110,116 +,111,101,110,101,114,103,195,173,97,116,114,97,98,97,106,97,114,97,115,116,117, +114,105,97,115,114,101,99,105,101,110,116,101,117,116,105,108,105,122,97,114,98, +111,108,101,116,195,173,110,115,97,108,118,97,100,111,114,99,111,114,114,101,99, +116,97,116,114,97,98,97,106,111,115,112,114,105,109,101,114,111,115,110,101,103, +111,99,105,111,115,108,105,98,101,114,116,97,100,100,101,116,97,108,108,101,115, +112,97,110,116,97,108,108,97,112,114,195,179,120,105,109,111,97,108,109,101,114, +195,173,97,97,110,105,109,97,108,101,115,113,117,105,195,169,110,101,115,99,111, +114,97,122,195,179,110,115,101,99,99,105,195,179,110,98,117,115,99,97,110,100, +111,111,112,99,105,111,110,101,115,101,120,116,101,114,105,111,114,99,111,110,99 +,101,112,116,111,116,111,100,97,118,195,173,97,103,97,108,101,114,195,173,97,101 +,115,99,114,105,98,105,114,109,101,100,105,99,105,110,97,108,105,99,101,110,99, +105,97,99,111,110,115,117,108,116,97,97,115,112,101,99,116,111,115,99,114,195, +173,116,105,99,97,100,195,179,108,97,114,101,115,106,117,115,116,105,99,105,97, +100,101,98,101,114,195,161,110,112,101,114,195,173,111,100,111,110,101,99,101, +115,105,116,97,109,97,110,116,101,110,101,114,112,101,113,117,101,195,177,111, +114,101,99,105,98,105,100,97,116,114,105,98,117,110,97,108,116,101,110,101,114, +105,102,101,99,97,110,99,105,195,179,110,99,97,110,97,114,105,97,115,100,101,115 +,99,97,114,103,97,100,105,118,101,114,115,111,115,109,97,108,108,111,114,99,97, +114,101,113,117,105,101,114,101,116,195,169,99,110,105,99,111,100,101,98,101,114 +,195,173,97,118,105,118,105,101,110,100,97,102,105,110,97,110,122,97,115,97,100, +101,108,97,110,116,101,102,117,110,99,105,111,110,97,99,111,110,115,101,106,111, +115,100,105,102,195,173,99,105,108,99,105,117,100,97,100,101,115,97,110,116,105, +103,117,97,115,97,118,97,110,122,97,100,97,116,195,169,114,109,105,110,111,117, +110,105,100,97,100,101,115,115,195,161,110,99,104,101,122,99,97,109,112,97,195, +177,97,115,111,102,116,111,110,105,99,114,101,118,105,115,116,97,115,99,111,110, +116,105,101,110,101,115,101,99,116,111,114,101,115,109,111,109,101,110,116,111, +115,102,97,99,117,108,116,97,100,99,114,195,169,100,105,116,111,100,105,118,101, +114,115,97,115,115,117,112,117,101,115,116,111,102,97,99,116,111,114,101,115,115 +,101,103,117,110,100,111,115,112,101,113,117,101,195,177,97,208,179,208,190,208, +180,208,176,208,181,209,129,208,187,208,184,208,181,209,129,209,130,209,140,208, +177,209,139,208,187,208,190,208,177,209,139,209,130,209,140,209,141,209,130,208, +190,208,188,208,149,209,129,208,187,208,184,209,130,208,190,208,179,208,190,208, +188,208,181,208,189,209,143,208,178,209,129,208,181,209,133,209,141,209,130,208, +190,208,185,208,180,208,176,208,182,208,181,208,177,209,139,208,187,208,184,208, +179,208,190,208,180,209,131,208,180,208,181,208,189,209,140,209,141,209,130,208, +190,209,130,208,177,209,139,208,187,208,176,209,129,208,181,208,177,209,143,208, +190,208,180,208,184,208,189,209,129,208,181,208,177,208,181,208,189,208,176,208, +180,208,190,209,129,208,176,208,185,209,130,209,132,208,190,209,130,208,190,208, +189,208,181,208,179,208,190,209,129,208,178,208,190,208,184,209,129,208,178,208, +190,208,185,208,184,208,179,209,128,209,139,209,130,208,190,208,182,208,181,208, +178,209,129,208,181,208,188,209,129,208,178,208,190,209,142,208,187,208,184,209, +136,209,140,209,141,209,130,208,184,209,133,208,191,208,190,208,186,208,176,208, +180,208,189,208,181,208,185,208,180,208,190,208,188,208,176,208,188,208,184,209, +128,208,176,208,187,208,184,208,177,208,190,209,130,208,181,208,188,209,131,209, +133,208,190,209,130,209,143,208,180,208,178,209,131,209,133,209,129,208,181,209, +130,208,184,208,187,209,142,208,180,208,184,208,180,208,181,208,187,208,190,208, +188,208,184,209,128,208,181,209,130,208,181,208,177,209,143,209,129,208,178,208, +190,208,181,208,178,208,184,208,180,208,181,209,135,208,181,208,179,208,190,209, +141,209,130,208,184,208,188,209,129,209,135,208,181,209,130,209,130,208,181,208, +188,209,139,209,134,208,181,208,189,209,139,209,129,209,130,208,176,208,187,208, +178,208,181,208,180,209,140,209,130,208,181,208,188,208,181,208,178,208,190,208, +180,209,139,209,130,208,181,208,177,208,181,208,178,209,139,209,136,208,181,208, +189,208,176,208,188,208,184,209,130,208,184,208,191,208,176,209,130,208,190,208, +188,209,131,208,191,209,128,208,176,208,178,208,187,208,184,209,134,208,176,208, +190,208,180,208,189,208,176,208,179,208,190,208,180,209,139,208,183,208,189,208, +176,209,142,208,188,208,190,208,179,209,131,208,180,209,128,209,131,208,179,208, +178,209,129,208,181,208,185,208,184,208,180,208,181,209,130,208,186,208,184,208, +189,208,190,208,190,208,180,208,189,208,190,208,180,208,181,208,187,208,176,208, +180,208,181,208,187,208,181,209,129,209,128,208,190,208,186,208,184,209,142,208, +189,209,143,208,178,208,181,209,129,209,140,208,149,209,129,209,130,209,140,209, +128,208,176,208,183,208,176,208,189,208,176,209,136,208,184,216,167,217,132,217, +132,217,135,216,167,217,132,216,170,217,138,216,172,217,133,217,138,216,185,216, +174,216,167,216,181,216,169,216,167,217,132,216,176,217,138,216,185,217,132,217, +138,217,135,216,172,216,175,217,138,216,175,216,167,217,132,216,162,217,134,216, +167,217,132,216,177,216,175,216,170,216,173,217,131,217,133,216,181,217,129,216, +173,216,169,217,131,216,167,217,134,216,170,216,167,217,132,217,132,217,138,217, +138,217,131,217,136,217,134,216,180,216,168,217,131,216,169,217,129,217,138,217, +135,216,167,216,168,217,134,216,167,216,170,216,173,217,136,216,167,216,161,216, +163,217,131,216,171,216,177,216,174,217,132,216,167,217,132,216,167,217,132,216, +173,216,168,216,175,217,132,217,138,217,132,216,175,216,177,217,136,216,179,216, +167,216,182,216,186,216,183,216,170,217,131,217,136,217,134,217,135,217,134,216, +167,217,131,216,179,216,167,216,173,216,169,217,134,216,167,216,175,217,138,216, +167,217,132,216,183,216,168,216,185,217,132,217,138,217,131,216,180,217,131,216, +177,216,167,217,138,217,133,217,131,217,134,217,133,217,134,217,135,216,167,216, +180,216,177,217,131,216,169,216,177,216,166,217,138,216,179,217,134,216,180,217, +138,216,183,217,133,216,167,216,176,216,167,216,167,217,132,217,129,217,134,216, +180,216,168,216,167,216,168,216,170,216,185,216,168,216,177,216,177,216,173,217, +133,216,169,217,131,216,167,217,129,216,169,217,138,217,130,217,136,217,132,217, +133,216,177,217,131,216,178,217,131,217,132,217,133,216,169,216,163,216,173,217, +133,216,175,217,130,217,132,216,168,217,138,217,138,216,185,217,134,217,138,216, +181,217,136,216,177,216,169,216,183,216,177,217,138,217,130,216,180,216,167,216, +177,217,131,216,172,217,136,216,167,217,132,216,163,216,174,216,177,217,137,217, +133,216,185,217,134,216,167,216,167,216,168,216,173,216,171,216,185,216,177,217, +136,216,182,216,168,216,180,217,131,217,132,217,133,216,179,216,172,217,132,216, +168,217,134,216,167,217,134,216,174,216,167,217,132,216,175,217,131,216,170,216, +167,216,168,217,131,217,132,217,138,216,169,216,168,216,175,217,136,217,134,216, +163,217,138,216,182,216,167,217,138,217,136,216,172,216,175,217,129,216,177,217, +138,217,130,217,131,216,170,216,168,216,170,216,163,217,129,216,182,217,132,217, +133,216,183,216,168,216,174,216,167,217,131,216,171,216,177,216,168,216,167,216, +177,217,131,216,167,217,129,216,182,217,132,216,167,216,173,217,132,217,137,217, +134,217,129,216,179,217,135,216,163,217,138,216,167,217,133,216,177,216,175,217, +136,216,175,216,163,217,134,217,135,216,167,216,175,217,138,217,134,216,167,216, +167,217,132,216,167,217,134,217,133,216,185,216,177,216,182,216,170,216,185,217, +132,217,133,216,175,216,167,216,174,217,132,217,133,217,133,217,131,217,134,0,0, +0,0,0,0,0,0,1,0,1,0,1,0,1,0,2,0,2,0,2,0,2,0,4,0,4,0,4,0,4,0,0,1,2,3,4,5,6,7,7,6, +5,4,3,2,1,0,8,9,10,11,12,13,14,15,15,14,13,12,11,10,9,8,16,17,18,19,20,21,22,23, +23,22,21,20,19,18,17,16,24,25,26,27,28,29,30,31,31,30,29,28,27,26,25,24,255,255, +255,255,0,0,0,0,0,0,0,0,255,255,255,255,1,0,0,0,2,0,0,0,2,0,0,0,1,0,0,0,1,0,0,0, +3,0,0,0,255,255,0,1,0,0,0,1,0,0,255,255,0,1,0,0,0,8,0,8,0,8,0,8,0,0,0,1,0,2,0,3, +0,4,0,5,0,6,0,7,114,101,115,111,117,114,99,101,115,99,111,117,110,116,114,105, +101,115,113,117,101,115,116,105,111,110,115,101,113,117,105,112,109,101,110,116, +99,111,109,109,117,110,105,116,121,97,118,97,105,108,97,98,108,101,104,105,103, +104,108,105,103,104,116,68,84,68,47,120,104,116,109,108,109,97,114,107,101,116, +105,110,103,107,110,111,119,108,101,100,103,101,115,111,109,101,116,104,105,110, +103,99,111,110,116,97,105,110,101,114,100,105,114,101,99,116,105,111,110,115,117 +,98,115,99,114,105,98,101,97,100,118,101,114,116,105,115,101,99,104,97,114,97,99 +,116,101,114,34,32,118,97,108,117,101,61,34,60,47,115,101,108,101,99,116,62,65, +117,115,116,114,97,108,105,97,34,32,99,108,97,115,115,61,34,115,105,116,117,97, +116,105,111,110,97,117,116,104,111,114,105,116,121,102,111,108,108,111,119,105, +110,103,112,114,105,109,97,114,105,108,121,111,112,101,114,97,116,105,111,110,99 +,104,97,108,108,101,110,103,101,100,101,118,101,108,111,112,101,100,97,110,111, +110,121,109,111,117,115,102,117,110,99,116,105,111,110,32,102,117,110,99,116,105 +,111,110,115,99,111,109,112,97,110,105,101,115,115,116,114,117,99,116,117,114, +101,97,103,114,101,101,109,101,110,116,34,32,116,105,116,108,101,61,34,112,111, +116,101,110,116,105,97,108,101,100,117,99,97,116,105,111,110,97,114,103,117,109, +101,110,116,115,115,101,99,111,110,100,97,114,121,99,111,112,121,114,105,103,104 +,116,108,97,110,103,117,97,103,101,115,101,120,99,108,117,115,105,118,101,99,111 +,110,100,105,116,105,111,110,60,47,102,111,114,109,62,13,10,115,116,97,116,101, +109,101,110,116,97,116,116,101,110,116,105,111,110,66,105,111,103,114,97,112,104 +,121,125,32,101,108,115,101,32,123,10,115,111,108,117,116,105,111,110,115,119, +104,101,110,32,116,104,101,32,65,110,97,108,121,116,105,99,115,116,101,109,112, +108,97,116,101,115,100,97,110,103,101,114,111,117,115,115,97,116,101,108,108,105 +,116,101,100,111,99,117,109,101,110,116,115,112,117,98,108,105,115,104,101,114, +105,109,112,111,114,116,97,110,116,112,114,111,116,111,116,121,112,101,105,110, +102,108,117,101,110,99,101,38,114,97,113,117,111,59,60,47,101,102,102,101,99,116 +,105,118,101,103,101,110,101,114,97,108,108,121,116,114,97,110,115,102,111,114, +109,98,101,97,117,116,105,102,117,108,116,114,97,110,115,112,111,114,116,111,114 +,103,97,110,105,122,101,100,112,117,98,108,105,115,104,101,100,112,114,111,109, +105,110,101,110,116,117,110,116,105,108,32,116,104,101,116,104,117,109,98,110,97 +,105,108,78,97,116,105,111,110,97,108,32,46,102,111,99,117,115,40,41,59,111,118, +101,114,32,116,104,101,32,109,105,103,114,97,116,105,111,110,97,110,110,111,117, +110,99,101,100,102,111,111,116,101,114,34,62,10,101,120,99,101,112,116,105,111, +110,108,101,115,115,32,116,104,97,110,101,120,112,101,110,115,105,118,101,102, +111,114,109,97,116,105,111,110,102,114,97,109,101,119,111,114,107,116,101,114, +114,105,116,111,114,121,110,100,105,99,97,116,105,111,110,99,117,114,114,101,110 +,116,108,121,99,108,97,115,115,78,97,109,101,99,114,105,116,105,99,105,115,109, +116,114,97,100,105,116,105,111,110,101,108,115,101,119,104,101,114,101,65,108, +101,120,97,110,100,101,114,97,112,112,111,105,110,116,101,100,109,97,116,101,114 +,105,97,108,115,98,114,111,97,100,99,97,115,116,109,101,110,116,105,111,110,101, +100,97,102,102,105,108,105,97,116,101,60,47,111,112,116,105,111,110,62,116,114, +101,97,116,109,101,110,116,100,105,102,102,101,114,101,110,116,47,100,101,102,97 +,117,108,116,46,80,114,101,115,105,100,101,110,116,111,110,99,108,105,99,107,61, +34,98,105,111,103,114,97,112,104,121,111,116,104,101,114,119,105,115,101,112,101 +,114,109,97,110,101,110,116,70,114,97,110,195,167,97,105,115,72,111,108,108,121, +119,111,111,100,101,120,112,97,110,115,105,111,110,115,116,97,110,100,97,114,100 +,115,60,47,115,116,121,108,101,62,10,114,101,100,117,99,116,105,111,110,68,101, +99,101,109,98,101,114,32,112,114,101,102,101,114,114,101,100,67,97,109,98,114, +105,100,103,101,111,112,112,111,110,101,110,116,115,66,117,115,105,110,101,115, +115,32,99,111,110,102,117,115,105,111,110,62,10,60,116,105,116,108,101,62,112, +114,101,115,101,110,116,101,100,101,120,112,108,97,105,110,101,100,100,111,101, +115,32,110,111,116,32,119,111,114,108,100,119,105,100,101,105,110,116,101,114, +102,97,99,101,112,111,115,105,116,105,111,110,115,110,101,119,115,112,97,112,101 +,114,60,47,116,97,98,108,101,62,10,109,111,117,110,116,97,105,110,115,108,105, +107,101,32,116,104,101,32,101,115,115,101,110,116,105,97,108,102,105,110,97,110, +99,105,97,108,115,101,108,101,99,116,105,111,110,97,99,116,105,111,110,61,34,47, +97,98,97,110,100,111,110,101,100,69,100,117,99,97,116,105,111,110,112,97,114,115 +,101,73,110,116,40,115,116,97,98,105,108,105,116,121,117,110,97,98,108,101,32, +116,111,60,47,116,105,116,108,101,62,10,114,101,108,97,116,105,111,110,115,78, +111,116,101,32,116,104,97,116,101,102,102,105,99,105,101,110,116,112,101,114,102 +,111,114,109,101,100,116,119,111,32,121,101,97,114,115,83,105,110,99,101,32,116, +104,101,116,104,101,114,101,102,111,114,101,119,114,97,112,112,101,114,34,62,97, +108,116,101,114,110,97,116,101,105,110,99,114,101,97,115,101,100,66,97,116,116, +108,101,32,111,102,112,101,114,99,101,105,118,101,100,116,114,121,105,110,103,32 +,116,111,110,101,99,101,115,115,97,114,121,112,111,114,116,114,97,121,101,100, +101,108,101,99,116,105,111,110,115,69,108,105,122,97,98,101,116,104,60,47,105, +102,114,97,109,101,62,100,105,115,99,111,118,101,114,121,105,110,115,117,114,97, +110,99,101,115,46,108,101,110,103,116,104,59,108,101,103,101,110,100,97,114,121, +71,101,111,103,114,97,112,104,121,99,97,110,100,105,100,97,116,101,99,111,114, +112,111,114,97,116,101,115,111,109,101,116,105,109,101,115,115,101,114,118,105, +99,101,115,46,105,110,104,101,114,105,116,101,100,60,47,115,116,114,111,110,103, +62,67,111,109,109,117,110,105,116,121,114,101,108,105,103,105,111,117,115,108, +111,99,97,116,105,111,110,115,67,111,109,109,105,116,116,101,101,98,117,105,108, +100,105,110,103,115,116,104,101,32,119,111,114,108,100,110,111,32,108,111,110, +103,101,114,98,101,103,105,110,110,105,110,103,114,101,102,101,114,101,110,99, +101,99,97,110,110,111,116,32,98,101,102,114,101,113,117,101,110,99,121,116,121, +112,105,99,97,108,108,121,105,110,116,111,32,116,104,101,32,114,101,108,97,116, +105,118,101,59,114,101,99,111,114,100,105,110,103,112,114,101,115,105,100,101, +110,116,105,110,105,116,105,97,108,108,121,116,101,99,104,110,105,113,117,101, +116,104,101,32,111,116,104,101,114,105,116,32,99,97,110,32,98,101,101,120,105, +115,116,101,110,99,101,117,110,100,101,114,108,105,110,101,116,104,105,115,32, +116,105,109,101,116,101,108,101,112,104,111,110,101,105,116,101,109,115,99,111, +112,101,112,114,97,99,116,105,99,101,115,97,100,118,97,110,116,97,103,101,41,59, +114,101,116,117,114,110,32,70,111,114,32,111,116,104,101,114,112,114,111,118,105 +,100,105,110,103,100,101,109,111,99,114,97,99,121,98,111,116,104,32,116,104,101, +32,101,120,116,101,110,115,105,118,101,115,117,102,102,101,114,105,110,103,115, +117,112,112,111,114,116,101,100,99,111,109,112,117,116,101,114,115,32,102,117, +110,99,116,105,111,110,112,114,97,99,116,105,99,97,108,115,97,105,100,32,116,104 +,97,116,105,116,32,109,97,121,32,98,101,69,110,103,108,105,115,104,60,47,102,114 +,111,109,32,116,104,101,32,115,99,104,101,100,117,108,101,100,100,111,119,110, +108,111,97,100,115,60,47,108,97,98,101,108,62,10,115,117,115,112,101,99,116,101, +100,109,97,114,103,105,110,58,32,48,115,112,105,114,105,116,117,97,108,60,47,104 +,101,97,100,62,10,10,109,105,99,114,111,115,111,102,116,103,114,97,100,117,97, +108,108,121,100,105,115,99,117,115,115,101,100,104,101,32,98,101,99,97,109,101, +101,120,101,99,117,116,105,118,101,106,113,117,101,114,121,46,106,115,104,111, +117,115,101,104,111,108,100,99,111,110,102,105,114,109,101,100,112,117,114,99, +104,97,115,101,100,108,105,116,101,114,97,108,108,121,100,101,115,116,114,111, +121,101,100,117,112,32,116,111,32,116,104,101,118,97,114,105,97,116,105,111,110, +114,101,109,97,105,110,105,110,103,105,116,32,105,115,32,110,111,116,99,101,110, +116,117,114,105,101,115,74,97,112,97,110,101,115,101,32,97,109,111,110,103,32, +116,104,101,99,111,109,112,108,101,116,101,100,97,108,103,111,114,105,116,104, +109,105,110,116,101,114,101,115,116,115,114,101,98,101,108,108,105,111,110,117, +110,100,101,102,105,110,101,100,101,110,99,111,117,114,97,103,101,114,101,115, +105,122,97,98,108,101,105,110,118,111,108,118,105,110,103,115,101,110,115,105, +116,105,118,101,117,110,105,118,101,114,115,97,108,112,114,111,118,105,115,105, +111,110,40,97,108,116,104,111,117,103,104,102,101,97,116,117,114,105,110,103,99, +111,110,100,117,99,116,101,100,41,44,32,119,104,105,99,104,32,99,111,110,116,105 +,110,117,101,100,45,104,101,97,100,101,114,34,62,70,101,98,114,117,97,114,121,32 +,110,117,109,101,114,111,117,115,32,111,118,101,114,102,108,111,119,58,99,111, +109,112,111,110,101,110,116,102,114,97,103,109,101,110,116,115,101,120,99,101, +108,108,101,110,116,99,111,108,115,112,97,110,61,34,116,101,99,104,110,105,99,97 +,108,110,101,97,114,32,116,104,101,32,65,100,118,97,110,99,101,100,32,115,111, +117,114,99,101,32,111,102,101,120,112,114,101,115,115,101,100,72,111,110,103,32, +75,111,110,103,32,70,97,99,101,98,111,111,107,109,117,108,116,105,112,108,101,32 +,109,101,99,104,97,110,105,115,109,101,108,101,118,97,116,105,111,110,111,102, +102,101,110,115,105,118,101,60,47,102,111,114,109,62,10,9,115,112,111,110,115, +111,114,101,100,100,111,99,117,109,101,110,116,46,111,114,32,38,113,117,111,116, +59,116,104,101,114,101,32,97,114,101,116,104,111,115,101,32,119,104,111,109,111, +118,101,109,101,110,116,115,112,114,111,99,101,115,115,101,115,100,105,102,102, +105,99,117,108,116,115,117,98,109,105,116,116,101,100,114,101,99,111,109,109,101 +,110,100,99,111,110,118,105,110,99,101,100,112,114,111,109,111,116,105,110,103, +34,32,119,105,100,116,104,61,34,46,114,101,112,108,97,99,101,40,99,108,97,115, +115,105,99,97,108,99,111,97,108,105,116,105,111,110,104,105,115,32,102,105,114, +115,116,100,101,99,105,115,105,111,110,115,97,115,115,105,115,116,97,110,116,105 +,110,100,105,99,97,116,101,100,101,118,111,108,117,116,105,111,110,45,119,114,97 +,112,112,101,114,34,101,110,111,117,103,104,32,116,111,97,108,111,110,103,32,116 +,104,101,100,101,108,105,118,101,114,101,100,45,45,62,13,10,60,33,45,45,65,109, +101,114,105,99,97,110,32,112,114,111,116,101,99,116,101,100,78,111,118,101,109, +98,101,114,32,60,47,115,116,121,108,101,62,60,102,117,114,110,105,116,117,114, +101,73,110,116,101,114,110,101,116,32,32,111,110,98,108,117,114,61,34,115,117, +115,112,101,110,100,101,100,114,101,99,105,112,105,101,110,116,98,97,115,101,100 +,32,111,110,32,77,111,114,101,111,118,101,114,44,97,98,111,108,105,115,104,101, +100,99,111,108,108,101,99,116,101,100,119,101,114,101,32,109,97,100,101,101,109, +111,116,105,111,110,97,108,101,109,101,114,103,101,110,99,121,110,97,114,114,97, +116,105,118,101,97,100,118,111,99,97,116,101,115,112,120,59,98,111,114,100,101, +114,99,111,109,109,105,116,116,101,100,100,105,114,61,34,108,116,114,34,101,109, +112,108,111,121,101,101,115,114,101,115,101,97,114,99,104,46,32,115,101,108,101, +99,116,101,100,115,117,99,99,101,115,115,111,114,99,117,115,116,111,109,101,114, +115,100,105,115,112,108,97,121,101,100,83,101,112,116,101,109,98,101,114,97,100, +100,67,108,97,115,115,40,70,97,99,101,98,111,111,107,32,115,117,103,103,101,115, +116,101,100,97,110,100,32,108,97,116,101,114,111,112,101,114,97,116,105,110,103, +101,108,97,98,111,114,97,116,101,83,111,109,101,116,105,109,101,115,73,110,115, +116,105,116,117,116,101,99,101,114,116,97,105,110,108,121,105,110,115,116,97,108 +,108,101,100,102,111,108,108,111,119,101,114,115,74,101,114,117,115,97,108,101, +109,116,104,101,121,32,104,97,118,101,99,111,109,112,117,116,105,110,103,103,101 +,110,101,114,97,116,101,100,112,114,111,118,105,110,99,101,115,103,117,97,114,97 +,110,116,101,101,97,114,98,105,116,114,97,114,121,114,101,99,111,103,110,105,122 +,101,119,97,110,116,101,100,32,116,111,112,120,59,119,105,100,116,104,58,116,104 +,101,111,114,121,32,111,102,98,101,104,97,118,105,111,117,114,87,104,105,108,101 +,32,116,104,101,101,115,116,105,109,97,116,101,100,98,101,103,97,110,32,116,111, +32,105,116,32,98,101,99,97,109,101,109,97,103,110,105,116,117,100,101,109,117, +115,116,32,104,97,118,101,109,111,114,101,32,116,104,97,110,68,105,114,101,99, +116,111,114,121,101,120,116,101,110,115,105,111,110,115,101,99,114,101,116,97, +114,121,110,97,116,117,114,97,108,108,121,111,99,99,117,114,114,105,110,103,118, +97,114,105,97,98,108,101,115,103,105,118,101,110,32,116,104,101,112,108,97,116, +102,111,114,109,46,60,47,108,97,98,101,108,62,60,102,97,105,108,101,100,32,116, +111,99,111,109,112,111,117,110,100,115,107,105,110,100,115,32,111,102,32,115,111 +,99,105,101,116,105,101,115,97,108,111,110,103,115,105,100,101,32,45,45,38,103, +116,59,10,10,115,111,117,116,104,119,101,115,116,116,104,101,32,114,105,103,104, +116,114,97,100,105,97,116,105,111,110,109,97,121,32,104,97,118,101,32,117,110, +101,115,99,97,112,101,40,115,112,111,107,101,110,32,105,110,34,32,104,114,101, +102,61,34,47,112,114,111,103,114,97,109,109,101,111,110,108,121,32,116,104,101, +32,99,111,109,101,32,102,114,111,109,100,105,114,101,99,116,111,114,121,98,117, +114,105,101,100,32,105,110,97,32,115,105,109,105,108,97,114,116,104,101,121,32, +119,101,114,101,60,47,102,111,110,116,62,60,47,78,111,114,119,101,103,105,97,110 +,115,112,101,99,105,102,105,101,100,112,114,111,100,117,99,105,110,103,112,97, +115,115,101,110,103,101,114,40,110,101,119,32,68,97,116,101,116,101,109,112,111, +114,97,114,121,102,105,99,116,105,111,110,97,108,65,102,116,101,114,32,116,104, +101,101,113,117,97,116,105,111,110,115,100,111,119,110,108,111,97,100,46,114,101 +,103,117,108,97,114,108,121,100,101,118,101,108,111,112,101,114,97,98,111,118, +101,32,116,104,101,108,105,110,107,101,100,32,116,111,112,104,101,110,111,109, +101,110,97,112,101,114,105,111,100,32,111,102,116,111,111,108,116,105,112,34,62, +115,117,98,115,116,97,110,99,101,97,117,116,111,109,97,116,105,99,97,115,112,101 +,99,116,32,111,102,65,109,111,110,103,32,116,104,101,99,111,110,110,101,99,116, +101,100,101,115,116,105,109,97,116,101,115,65,105,114,32,70,111,114,99,101,115, +121,115,116,101,109,32,111,102,111,98,106,101,99,116,105,118,101,105,109,109,101 +,100,105,97,116,101,109,97,107,105,110,103,32,105,116,112,97,105,110,116,105,110 +,103,115,99,111,110,113,117,101,114,101,100,97,114,101,32,115,116,105,108,108, +112,114,111,99,101,100,117,114,101,103,114,111,119,116,104,32,111,102,104,101,97 +,100,101,100,32,98,121,69,117,114,111,112,101,97,110,32,100,105,118,105,115,105, +111,110,115,109,111,108,101,99,117,108,101,115,102,114,97,110,99,104,105,115,101 +,105,110,116,101,110,116,105,111,110,97,116,116,114,97,99,116,101,100,99,104,105 +,108,100,104,111,111,100,97,108,115,111,32,117,115,101,100,100,101,100,105,99,97 +,116,101,100,115,105,110,103,97,112,111,114,101,100,101,103,114,101,101,32,111, +102,102,97,116,104,101,114,32,111,102,99,111,110,102,108,105,99,116,115,60,47,97 +,62,60,47,112,62,10,99,97,109,101,32,102,114,111,109,119,101,114,101,32,117,115, +101,100,110,111,116,101,32,116,104,97,116,114,101,99,101,105,118,105,110,103,69, +120,101,99,117,116,105,118,101,101,118,101,110,32,109,111,114,101,97,99,99,101, +115,115,32,116,111,99,111,109,109,97,110,100,101,114,80,111,108,105,116,105,99, +97,108,109,117,115,105,99,105,97,110,115,100,101,108,105,99,105,111,117,115,112, +114,105,115,111,110,101,114,115,97,100,118,101,110,116,32,111,102,85,84,70,45,56 +,34,32,47,62,60,33,91,67,68,65,84,65,91,34,62,67,111,110,116,97,99,116,83,111, +117,116,104,101,114,110,32,98,103,99,111,108,111,114,61,34,115,101,114,105,101, +115,32,111,102,46,32,73,116,32,119,97,115,32,105,110,32,69,117,114,111,112,101, +112,101,114,109,105,116,116,101,100,118,97,108,105,100,97,116,101,46,97,112,112, +101,97,114,105,110,103,111,102,102,105,99,105,97,108,115,115,101,114,105,111,117 +,115,108,121,45,108,97,110,103,117,97,103,101,105,110,105,116,105,97,116,101,100 +,101,120,116,101,110,100,105,110,103,108,111,110,103,45,116,101,114,109,105,110, +102,108,97,116,105,111,110,115,117,99,104,32,116,104,97,116,103,101,116,67,111, +111,107,105,101,109,97,114,107,101,100,32,98,121,60,47,98,117,116,116,111,110,62 +,105,109,112,108,101,109,101,110,116,98,117,116,32,105,116,32,105,115,105,110,99 +,114,101,97,115,101,115,100,111,119,110,32,116,104,101,32,114,101,113,117,105, +114,105,110,103,100,101,112,101,110,100,101,110,116,45,45,62,10,60,33,45,45,32, +105,110,116,101,114,118,105,101,119,87,105,116,104,32,116,104,101,32,99,111,112, +105,101,115,32,111,102,99,111,110,115,101,110,115,117,115,119,97,115,32,98,117, +105,108,116,86,101,110,101,122,117,101,108,97,40,102,111,114,109,101,114,108,121 +,116,104,101,32,115,116,97,116,101,112,101,114,115,111,110,110,101,108,115,116, +114,97,116,101,103,105,99,102,97,118,111,117,114,32,111,102,105,110,118,101,110, +116,105,111,110,87,105,107,105,112,101,100,105,97,99,111,110,116,105,110,101,110 +,116,118,105,114,116,117,97,108,108,121,119,104,105,99,104,32,119,97,115,112,114 +,105,110,99,105,112,108,101,67,111,109,112,108,101,116,101,32,105,100,101,110, +116,105,99,97,108,115,104,111,119,32,116,104,97,116,112,114,105,109,105,116,105, +118,101,97,119,97,121,32,102,114,111,109,109,111,108,101,99,117,108,97,114,112, +114,101,99,105,115,101,108,121,100,105,115,115,111,108,118,101,100,85,110,100, +101,114,32,116,104,101,118,101,114,115,105,111,110,61,34,62,38,110,98,115,112,59 +,60,47,73,116,32,105,115,32,116,104,101,32,84,104,105,115,32,105,115,32,119,105, +108,108,32,104,97,118,101,111,114,103,97,110,105,115,109,115,115,111,109,101,32, +116,105,109,101,70,114,105,101,100,114,105,99,104,119,97,115,32,102,105,114,115, +116,116,104,101,32,111,110,108,121,32,102,97,99,116,32,116,104,97,116,102,111, +114,109,32,105,100,61,34,112,114,101,99,101,100,105,110,103,84,101,99,104,110, +105,99,97,108,112,104,121,115,105,99,105,115,116,111,99,99,117,114,115,32,105, +110,110,97,118,105,103,97,116,111,114,115,101,99,116,105,111,110,34,62,115,112, +97,110,32,105,100,61,34,115,111,117,103,104,116,32,116,111,98,101,108,111,119,32 +,116,104,101,115,117,114,118,105,118,105,110,103,125,60,47,115,116,121,108,101, +62,104,105,115,32,100,101,97,116,104,97,115,32,105,110,32,116,104,101,99,97,117, +115,101,100,32,98,121,112,97,114,116,105,97,108,108,121,101,120,105,115,116,105, +110,103,32,117,115,105,110,103,32,116,104,101,119,97,115,32,103,105,118,101,110, +97,32,108,105,115,116,32,111,102,108,101,118,101,108,115,32,111,102,110,111,116, +105,111,110,32,111,102,79,102,102,105,99,105,97,108,32,100,105,115,109,105,115, +115,101,100,115,99,105,101,110,116,105,115,116,114,101,115,101,109,98,108,101, +115,100,117,112,108,105,99,97,116,101,101,120,112,108,111,115,105,118,101,114, +101,99,111,118,101,114,101,100,97,108,108,32,111,116,104,101,114,103,97,108,108, +101,114,105,101,115,123,112,97,100,100,105,110,103,58,112,101,111,112,108,101,32 +,111,102,114,101,103,105,111,110,32,111,102,97,100,100,114,101,115,115,101,115, +97,115,115,111,99,105,97,116,101,105,109,103,32,97,108,116,61,34,105,110,32,109, +111,100,101,114,110,115,104,111,117,108,100,32,98,101,109,101,116,104,111,100,32 +,111,102,114,101,112,111,114,116,105,110,103,116,105,109,101,115,116,97,109,112, +110,101,101,100,101,100,32,116,111,116,104,101,32,71,114,101,97,116,114,101,103, +97,114,100,105,110,103,115,101,101,109,101,100,32,116,111,118,105,101,119,101, +100,32,97,115,105,109,112,97,99,116,32,111,110,105,100,101,97,32,116,104,97,116, +116,104,101,32,87,111,114,108,100,104,101,105,103,104,116,32,111,102,101,120,112 +,97,110,100,105,110,103,84,104,101,115,101,32,97,114,101,99,117,114,114,101,110, +116,34,62,99,97,114,101,102,117,108,108,121,109,97,105,110,116,97,105,110,115,99 +,104,97,114,103,101,32,111,102,67,108,97,115,115,105,99,97,108,97,100,100,114, +101,115,115,101,100,112,114,101,100,105,99,116,101,100,111,119,110,101,114,115, +104,105,112,60,100,105,118,32,105,100,61,34,114,105,103,104,116,34,62,13,10,114, +101,115,105,100,101,110,99,101,108,101,97,118,101,32,116,104,101,99,111,110,116, +101,110,116,34,62,97,114,101,32,111,102,116,101,110,32,32,125,41,40,41,59,13,10, +112,114,111,98,97,98,108,121,32,80,114,111,102,101,115,115,111,114,45,98,117,116 +,116,111,110,34,32,114,101,115,112,111,110,100,101,100,115,97,121,115,32,116,104 +,97,116,104,97,100,32,116,111,32,98,101,112,108,97,99,101,100,32,105,110,72,117, +110,103,97,114,105,97,110,115,116,97,116,117,115,32,111,102,115,101,114,118,101, +115,32,97,115,85,110,105,118,101,114,115,97,108,101,120,101,99,117,116,105,111, +110,97,103,103,114,101,103,97,116,101,102,111,114,32,119,104,105,99,104,105,110, +102,101,99,116,105,111,110,97,103,114,101,101,100,32,116,111,104,111,119,101,118 +,101,114,44,32,112,111,112,117,108,97,114,34,62,112,108,97,99,101,100,32,111,110 +,99,111,110,115,116,114,117,99,116,101,108,101,99,116,111,114,97,108,115,121,109 +,98,111,108,32,111,102,105,110,99,108,117,100,105,110,103,114,101,116,117,114, +110,32,116,111,97,114,99,104,105,116,101,99,116,67,104,114,105,115,116,105,97, +110,112,114,101,118,105,111,117,115,32,108,105,118,105,110,103,32,105,110,101,97 +,115,105,101,114,32,116,111,112,114,111,102,101,115,115,111,114,10,38,108,116,59 +,33,45,45,32,101,102,102,101,99,116,32,111,102,97,110,97,108,121,116,105,99,115, +119,97,115,32,116,97,107,101,110,119,104,101,114,101,32,116,104,101,116,111,111, +107,32,111,118,101,114,98,101,108,105,101,102,32,105,110,65,102,114,105,107,97, +97,110,115,97,115,32,102,97,114,32,97,115,112,114,101,118,101,110,116,101,100, +119,111,114,107,32,119,105,116,104,97,32,115,112,101,99,105,97,108,60,102,105, +101,108,100,115,101,116,67,104,114,105,115,116,109,97,115,82,101,116,114,105,101 +,118,101,100,10,10,73,110,32,116,104,101,32,98,97,99,107,32,105,110,116,111,110, +111,114,116,104,101,97,115,116,109,97,103,97,122,105,110,101,115,62,60,115,116, +114,111,110,103,62,99,111,109,109,105,116,116,101,101,103,111,118,101,114,110, +105,110,103,103,114,111,117,112,115,32,111,102,115,116,111,114,101,100,32,105, +110,101,115,116,97,98,108,105,115,104,97,32,103,101,110,101,114,97,108,105,116, +115,32,102,105,114,115,116,116,104,101,105,114,32,111,119,110,112,111,112,117, +108,97,116,101,100,97,110,32,111,98,106,101,99,116,67,97,114,105,98,98,101,97, +110,97,108,108,111,119,32,116,104,101,100,105,115,116,114,105,99,116,115,119,105 +,115,99,111,110,115,105,110,108,111,99,97,116,105,111,110,46,59,32,119,105,100, +116,104,58,32,105,110,104,97,98,105,116,101,100,83,111,99,105,97,108,105,115,116 +,74,97,110,117,97,114,121,32,49,60,47,102,111,111,116,101,114,62,115,105,109,105 +,108,97,114,108,121,99,104,111,105,99,101,32,111,102,116,104,101,32,115,97,109, +101,32,115,112,101,99,105,102,105,99,32,98,117,115,105,110,101,115,115,32,84,104 +,101,32,102,105,114,115,116,46,108,101,110,103,116,104,59,32,100,101,115,105,114 +,101,32,116,111,100,101,97,108,32,119,105,116,104,115,105,110,99,101,32,116,104, +101,117,115,101,114,65,103,101,110,116,99,111,110,99,101,105,118,101,100,105,110 +,100,101,120,46,112,104,112,97,115,32,38,113,117,111,116,59,101,110,103,97,103, +101,32,105,110,114,101,99,101,110,116,108,121,44,102,101,119,32,121,101,97,114, +115,119,101,114,101,32,97,108,115,111,10,60,104,101,97,100,62,10,60,101,100,105, +116,101,100,32,98,121,97,114,101,32,107,110,111,119,110,99,105,116,105,101,115, +32,105,110,97,99,99,101,115,115,107,101,121,99,111,110,100,101,109,110,101,100, +97,108,115,111,32,104,97,118,101,115,101,114,118,105,99,101,115,44,102,97,109, +105,108,121,32,111,102,83,99,104,111,111,108,32,111,102,99,111,110,118,101,114, +116,101,100,110,97,116,117,114,101,32,111,102,32,108,97,110,103,117,97,103,101, +109,105,110,105,115,116,101,114,115,60,47,111,98,106,101,99,116,62,116,104,101, +114,101,32,105,115,32,97,32,112,111,112,117,108,97,114,115,101,113,117,101,110, +99,101,115,97,100,118,111,99,97,116,101,100,84,104,101,121,32,119,101,114,101,97 +,110,121,32,111,116,104,101,114,108,111,99,97,116,105,111,110,61,101,110,116,101 +,114,32,116,104,101,109,117,99,104,32,109,111,114,101,114,101,102,108,101,99,116 +,101,100,119,97,115,32,110,97,109,101,100,111,114,105,103,105,110,97,108,32,97, +32,116,121,112,105,99,97,108,119,104,101,110,32,116,104,101,121,101,110,103,105, +110,101,101,114,115,99,111,117,108,100,32,110,111,116,114,101,115,105,100,101, +110,116,115,119,101,100,110,101,115,100,97,121,116,104,101,32,116,104,105,114, +100,32,112,114,111,100,117,99,116,115,74,97,110,117,97,114,121,32,50,119,104,97, +116,32,116,104,101,121,97,32,99,101,114,116,97,105,110,114,101,97,99,116,105,111 +,110,115,112,114,111,99,101,115,115,111,114,97,102,116,101,114,32,104,105,115, +116,104,101,32,108,97,115,116,32,99,111,110,116,97,105,110,101,100,34,62,60,47, +100,105,118,62,10,60,47,97,62,60,47,116,100,62,100,101,112,101,110,100,32,111, +110,115,101,97,114,99,104,34,62,10,112,105,101,99,101,115,32,111,102,99,111,109, +112,101,116,105,110,103,82,101,102,101,114,101,110,99,101,116,101,110,110,101, +115,115,101,101,119,104,105,99,104,32,104,97,115,32,118,101,114,115,105,111,110, +61,60,47,115,112,97,110,62,32,60,60,47,104,101,97,100,101,114,62,103,105,118,101 +,115,32,116,104,101,104,105,115,116,111,114,105,97,110,118,97,108,117,101,61,34, +34,62,112,97,100,100,105,110,103,58,48,118,105,101,119,32,116,104,97,116,116,111 +,103,101,116,104,101,114,44,116,104,101,32,109,111,115,116,32,119,97,115,32,102, +111,117,110,100,115,117,98,115,101,116,32,111,102,97,116,116,97,99,107,32,111, +110,99,104,105,108,100,114,101,110,44,112,111,105,110,116,115,32,111,102,112,101 +,114,115,111,110,97,108,32,112,111,115,105,116,105,111,110,58,97,108,108,101,103 +,101,100,108,121,67,108,101,118,101,108,97,110,100,119,97,115,32,108,97,116,101, +114,97,110,100,32,97,102,116,101,114,97,114,101,32,103,105,118,101,110,119,97, +115,32,115,116,105,108,108,115,99,114,111,108,108,105,110,103,100,101,115,105, +103,110,32,111,102,109,97,107,101,115,32,116,104,101,109,117,99,104,32,108,101, +115,115,65,109,101,114,105,99,97,110,115,46,10,10,65,102,116,101,114,32,44,32,98 +,117,116,32,116,104,101,77,117,115,101,117,109,32,111,102,108,111,117,105,115, +105,97,110,97,40,102,114,111,109,32,116,104,101,109,105,110,110,101,115,111,116, +97,112,97,114,116,105,99,108,101,115,97,32,112,114,111,99,101,115,115,68,111,109 +,105,110,105,99,97,110,118,111,108,117,109,101,32,111,102,114,101,116,117,114, +110,105,110,103,100,101,102,101,110,115,105,118,101,48,48,112,120,124,114,105, +103,104,109,97,100,101,32,102,114,111,109,109,111,117,115,101,111,118,101,114,34 +,32,115,116,121,108,101,61,34,115,116,97,116,101,115,32,111,102,40,119,104,105, +99,104,32,105,115,99,111,110,116,105,110,117,101,115,70,114,97,110,99,105,115,99 +,111,98,117,105,108,100,105,110,103,32,119,105,116,104,111,117,116,32,97,119,105 +,116,104,32,115,111,109,101,119,104,111,32,119,111,117,108,100,97,32,102,111,114 +,109,32,111,102,97,32,112,97,114,116,32,111,102,98,101,102,111,114,101,32,105, +116,107,110,111,119,110,32,97,115,32,32,83,101,114,118,105,99,101,115,108,111,99 +,97,116,105,111,110,32,97,110,100,32,111,102,116,101,110,109,101,97,115,117,114, +105,110,103,97,110,100,32,105,116,32,105,115,112,97,112,101,114,98,97,99,107,118 +,97,108,117,101,115,32,111,102,13,10,60,116,105,116,108,101,62,61,32,119,105,110 +,100,111,119,46,100,101,116,101,114,109,105,110,101,101,114,38,113,117,111,116, +59,32,112,108,97,121,101,100,32,98,121,97,110,100,32,101,97,114,108,121,60,47,99 +,101,110,116,101,114,62,102,114,111,109,32,116,104,105,115,116,104,101,32,116, +104,114,101,101,112,111,119,101,114,32,97,110,100,111,102,32,38,113,117,111,116, +59,105,110,110,101,114,72,84,77,76,60,97,32,104,114,101,102,61,34,121,58,105,110 +,108,105,110,101,59,67,104,117,114,99,104,32,111,102,116,104,101,32,101,118,101, +110,116,118,101,114,121,32,104,105,103,104,111,102,102,105,99,105,97,108,32,45, +104,101,105,103,104,116,58,32,99,111,110,116,101,110,116,61,34,47,99,103,105,45, +98,105,110,47,116,111,32,99,114,101,97,116,101,97,102,114,105,107,97,97,110,115, +101,115,112,101,114,97,110,116,111,102,114,97,110,195,167,97,105,115,108,97,116, +118,105,101,197,161,117,108,105,101,116,117,118,105,197,179,196,140,101,197,161, +116,105,110,97,196,141,101,197,161,116,105,110,97,224,185,132,224,184,151,224, +184,162,230,151,165,230,156,172,232,170,158,231,174,128,228,189,147,229,173,151, +231,185,129,233,171,148,229,173,151,237,149,156,234,181,173,236,150,180,228,184, +186,228,187,128,228,185,136,232,174,161,231,174,151,230,156,186,231,172,148,232, +174,176,230,156,172,232,168,142,232,171,150,229,141,128,230,156,141,229,138,161, +229,153,168,228,186,146,232,129,148,231,189,145,230,136,191,229,156,176,228,186, +167,228,191,177,228,185,144,233,131,168,229,135,186,231,137,136,231,164,190,230, +142,146,232,161,140,230,166,156,233,131,168,232,144,189,230,160,188,232,191,155, +228,184,128,230,173,165,230,148,175,228,187,152,229,174,157,233,170,140,232,175, +129,231,160,129,229,167,148,229,145,152,228,188,154,230,149,176,230,141,174,229, +186,147,230,182,136,232,180,185,232,128,133,229,138,158,229,133,172,229,174,164, +232,174,168,232,174,186,229,140,186,230,183,177,229,156,179,229,184,130,230,146, +173,230,148,190,229,153,168,229,140,151,228,186,172,229,184,130,229,164,167,229, +173,166,231,148,159,232,182,138,230,157,165,232,182,138,231,174,161,231,144,134, +229,145,152,228,191,161,230,129,175,231,189,145,115,101,114,118,105,99,105,111, +115,97,114,116,195,173,99,117,108,111,97,114,103,101,110,116,105,110,97,98,97, +114,99,101,108,111,110,97,99,117,97,108,113,117,105,101,114,112,117,98,108,105, +99,97,100,111,112,114,111,100,117,99,116,111,115,112,111,108,195,173,116,105,99, +97,114,101,115,112,117,101,115,116,97,119,105,107,105,112,101,100,105,97,115,105 +,103,117,105,101,110,116,101,98,195,186,115,113,117,101,100,97,99,111,109,117, +110,105,100,97,100,115,101,103,117,114,105,100,97,100,112,114,105,110,99,105,112 +,97,108,112,114,101,103,117,110,116,97,115,99,111,110,116,101,110,105,100,111, +114,101,115,112,111,110,100,101,114,118,101,110,101,122,117,101,108,97,112,114, +111,98,108,101,109,97,115,100,105,99,105,101,109,98,114,101,114,101,108,97,99, +105,195,179,110,110,111,118,105,101,109,98,114,101,115,105,109,105,108,97,114, +101,115,112,114,111,121,101,99,116,111,115,112,114,111,103,114,97,109,97,115,105 +,110,115,116,105,116,117,116,111,97,99,116,105,118,105,100,97,100,101,110,99,117 +,101,110,116,114,97,101,99,111,110,111,109,195,173,97,105,109,195,161,103,101, +110,101,115,99,111,110,116,97,99,116,97,114,100,101,115,99,97,114,103,97,114,110 +,101,99,101,115,97,114,105,111,97,116,101,110,99,105,195,179,110,116,101,108,195 +,169,102,111,110,111,99,111,109,105,115,105,195,179,110,99,97,110,99,105,111,110 +,101,115,99,97,112,97,99,105,100,97,100,101,110,99,111,110,116,114,97,114,97,110 +,195,161,108,105,115,105,115,102,97,118,111,114,105,116,111,115,116,195,169,114, +109,105,110,111,115,112,114,111,118,105,110,99,105,97,101,116,105,113,117,101, +116,97,115,101,108,101,109,101,110,116,111,115,102,117,110,99,105,111,110,101, +115,114,101,115,117,108,116,97,100,111,99,97,114,195,161,99,116,101,114,112,114, +111,112,105,101,100,97,100,112,114,105,110,99,105,112,105,111,110,101,99,101,115 +,105,100,97,100,109,117,110,105,99,105,112,97,108,99,114,101,97,99,105,195,179, +110,100,101,115,99,97,114,103,97,115,112,114,101,115,101,110,99,105,97,99,111, +109,101,114,99,105,97,108,111,112,105,110,105,111,110,101,115,101,106,101,114,99 +,105,99,105,111,101,100,105,116,111,114,105,97,108,115,97,108,97,109,97,110,99, +97,103,111,110,122,195,161,108,101,122,100,111,99,117,109,101,110,116,111,112, +101,108,195,173,99,117,108,97,114,101,99,105,101,110,116,101,115,103,101,110,101 +,114,97,108,101,115,116,97,114,114,97,103,111,110,97,112,114,195,161,99,116,105, +99,97,110,111,118,101,100,97,100,101,115,112,114,111,112,117,101,115,116,97,112, +97,99,105,101,110,116,101,115,116,195,169,99,110,105,99,97,115,111,98,106,101, +116,105,118,111,115,99,111,110,116,97,99,116,111,115,224,164,174,224,165,135,224 +,164,130,224,164,178,224,164,191,224,164,143,224,164,185,224,165,136,224,164,130 +,224,164,151,224,164,175,224,164,190,224,164,184,224,164,190,224,164,165,224,164 +,143,224,164,181,224,164,130,224,164,176,224,164,185,224,165,135,224,164,149,224 +,165,139,224,164,136,224,164,149,224,165,129,224,164,155,224,164,176,224,164,185 +,224,164,190,224,164,172,224,164,190,224,164,166,224,164,149,224,164,185,224,164 +,190,224,164,184,224,164,173,224,165,128,224,164,185,224,165,129,224,164,143,224 +,164,176,224,164,185,224,165,128,224,164,174,224,165,136,224,164,130,224,164,166 +,224,164,191,224,164,168,224,164,172,224,164,190,224,164,164,100,105,112,108,111 +,100,111,99,115,224,164,184,224,164,174,224,164,175,224,164,176,224,165,130,224, +164,170,224,164,168,224,164,190,224,164,174,224,164,170,224,164,164,224,164,190, +224,164,171,224,164,191,224,164,176,224,164,148,224,164,184,224,164,164,224,164, +164,224,164,176,224,164,185,224,164,178,224,165,139,224,164,151,224,164,185,224, +165,129,224,164,134,224,164,172,224,164,190,224,164,176,224,164,166,224,165,135, +224,164,182,224,164,185,224,165,129,224,164,136,224,164,150,224,165,135,224,164, +178,224,164,175,224,164,166,224,164,191,224,164,149,224,164,190,224,164,174,224, +164,181,224,165,135,224,164,172,224,164,164,224,165,128,224,164,168,224,164,172, +224,165,128,224,164,154,224,164,174,224,165,140,224,164,164,224,164,184,224,164, +190,224,164,178,224,164,178,224,165,135,224,164,150,224,164,156,224,165,137,224, +164,172,224,164,174,224,164,166,224,164,166,224,164,164,224,164,165,224,164,190, +224,164,168,224,164,185,224,165,128,224,164,182,224,164,185,224,164,176,224,164, +133,224,164,178,224,164,151,224,164,149,224,164,173,224,165,128,224,164,168,224, +164,151,224,164,176,224,164,170,224,164,190,224,164,184,224,164,176,224,164,190, +224,164,164,224,164,149,224,164,191,224,164,143,224,164,137,224,164,184,224,165, +135,224,164,151,224,164,175,224,165,128,224,164,185,224,165,130,224,164,129,224, +164,134,224,164,151,224,165,135,224,164,159,224,165,128,224,164,174,224,164,150, +224,165,139,224,164,156,224,164,149,224,164,190,224,164,176,224,164,133,224,164, +173,224,165,128,224,164,151,224,164,175,224,165,135,224,164,164,224,165,129,224, +164,174,224,164,181,224,165,139,224,164,159,224,164,166,224,165,135,224,164,130, +224,164,133,224,164,151,224,164,176,224,164,144,224,164,184,224,165,135,224,164, +174,224,165,135,224,164,178,224,164,178,224,164,151,224,164,190,224,164,185,224, +164,190,224,164,178,224,164,138,224,164,170,224,164,176,224,164,154,224,164,190, +224,164,176,224,164,144,224,164,184,224,164,190,224,164,166,224,165,135,224,164, +176,224,164,156,224,164,191,224,164,184,224,164,166,224,164,191,224,164,178,224, +164,172,224,164,130,224,164,166,224,164,172,224,164,168,224,164,190,224,164,185, +224,165,130,224,164,130,224,164,178,224,164,190,224,164,150,224,164,156,224,165, +128,224,164,164,224,164,172,224,164,159,224,164,168,224,164,174,224,164,191,224, +164,178,224,164,135,224,164,184,224,165,135,224,164,134,224,164,168,224,165,135, +224,164,168,224,164,175,224,164,190,224,164,149,224,165,129,224,164,178,224,164, +178,224,165,137,224,164,151,224,164,173,224,164,190,224,164,151,224,164,176,224, +165,135,224,164,178,224,164,156,224,164,151,224,164,185,224,164,176,224,164,190, +224,164,174,224,164,178,224,164,151,224,165,135,224,164,170,224,165,135,224,164, +156,224,164,185,224,164,190,224,164,165,224,164,135,224,164,184,224,165,128,224, +164,184,224,164,185,224,165,128,224,164,149,224,164,178,224,164,190,224,164,160, +224,165,128,224,164,149,224,164,185,224,164,190,224,164,129,224,164,166,224,165, +130,224,164,176,224,164,164,224,164,185,224,164,164,224,164,184,224,164,190,224, +164,164,224,164,175,224,164,190,224,164,166,224,164,134,224,164,175,224,164,190, +224,164,170,224,164,190,224,164,149,224,164,149,224,165,140,224,164,168,224,164, +182,224,164,190,224,164,174,224,164,166,224,165,135,224,164,150,224,164,175,224, +164,185,224,165,128,224,164,176,224,164,190,224,164,175,224,164,150,224,165,129, +224,164,166,224,164,178,224,164,151,224,165,128,99,97,116,101,103,111,114,105, +101,115,101,120,112,101,114,105,101,110,99,101,60,47,116,105,116,108,101,62,13, +10,67,111,112,121,114,105,103,104,116,32,106,97,118,97,115,99,114,105,112,116,99 +,111,110,100,105,116,105,111,110,115,101,118,101,114,121,116,104,105,110,103,60, +112,32,99,108,97,115,115,61,34,116,101,99,104,110,111,108,111,103,121,98,97,99, +107,103,114,111,117,110,100,60,97,32,99,108,97,115,115,61,34,109,97,110,97,103, +101,109,101,110,116,38,99,111,112,121,59,32,50,48,49,106,97,118,97,83,99,114,105 +,112,116,99,104,97,114,97,99,116,101,114,115,98,114,101,97,100,99,114,117,109,98 +,116,104,101,109,115,101,108,118,101,115,104,111,114,105,122,111,110,116,97,108, +103,111,118,101,114,110,109,101,110,116,67,97,108,105,102,111,114,110,105,97,97, +99,116,105,118,105,116,105,101,115,100,105,115,99,111,118,101,114,101,100,78,97, +118,105,103,97,116,105,111,110,116,114,97,110,115,105,116,105,111,110,99,111,110 +,110,101,99,116,105,111,110,110,97,118,105,103,97,116,105,111,110,97,112,112,101 +,97,114,97,110,99,101,60,47,116,105,116,108,101,62,60,109,99,104,101,99,107,98, +111,120,34,32,116,101,99,104,110,105,113,117,101,115,112,114,111,116,101,99,116, +105,111,110,97,112,112,97,114,101,110,116,108,121,97,115,32,119,101,108,108,32, +97,115,117,110,116,39,44,32,39,85,65,45,114,101,115,111,108,117,116,105,111,110, +111,112,101,114,97,116,105,111,110,115,116,101,108,101,118,105,115,105,111,110, +116,114,97,110,115,108,97,116,101,100,87,97,115,104,105,110,103,116,111,110,110, +97,118,105,103,97,116,111,114,46,32,61,32,119,105,110,100,111,119,46,105,109,112 +,114,101,115,115,105,111,110,38,108,116,59,98,114,38,103,116,59,108,105,116,101, +114,97,116,117,114,101,112,111,112,117,108,97,116,105,111,110,98,103,99,111,108, +111,114,61,34,35,101,115,112,101,99,105,97,108,108,121,32,99,111,110,116,101,110 +,116,61,34,112,114,111,100,117,99,116,105,111,110,110,101,119,115,108,101,116, +116,101,114,112,114,111,112,101,114,116,105,101,115,100,101,102,105,110,105,116, +105,111,110,108,101,97,100,101,114,115,104,105,112,84,101,99,104,110,111,108,111 +,103,121,80,97,114,108,105,97,109,101,110,116,99,111,109,112,97,114,105,115,111, +110,117,108,32,99,108,97,115,115,61,34,46,105,110,100,101,120,79,102,40,34,99, +111,110,99,108,117,115,105,111,110,100,105,115,99,117,115,115,105,111,110,99,111 +,109,112,111,110,101,110,116,115,98,105,111,108,111,103,105,99,97,108,82,101,118 +,111,108,117,116,105,111,110,95,99,111,110,116,97,105,110,101,114,117,110,100, +101,114,115,116,111,111,100,110,111,115,99,114,105,112,116,62,60,112,101,114,109 +,105,115,115,105,111,110,101,97,99,104,32,111,116,104,101,114,97,116,109,111,115 +,112,104,101,114,101,32,111,110,102,111,99,117,115,61,34,60,102,111,114,109,32, +105,100,61,34,112,114,111,99,101,115,115,105,110,103,116,104,105,115,46,118,97, +108,117,101,103,101,110,101,114,97,116,105,111,110,67,111,110,102,101,114,101, +110,99,101,115,117,98,115,101,113,117,101,110,116,119,101,108,108,45,107,110,111 +,119,110,118,97,114,105,97,116,105,111,110,115,114,101,112,117,116,97,116,105, +111,110,112,104,101,110,111,109,101,110,111,110,100,105,115,99,105,112,108,105, +110,101,108,111,103,111,46,112,110,103,34,32,40,100,111,99,117,109,101,110,116, +44,98,111,117,110,100,97,114,105,101,115,101,120,112,114,101,115,115,105,111,110 +,115,101,116,116,108,101,109,101,110,116,66,97,99,107,103,114,111,117,110,100, +111,117,116,32,111,102,32,116,104,101,101,110,116,101,114,112,114,105,115,101,40 +,34,104,116,116,112,115,58,34,32,117,110,101,115,99,97,112,101,40,34,112,97,115, +115,119,111,114,100,34,32,100,101,109,111,99,114,97,116,105,99,60,97,32,104,114, +101,102,61,34,47,119,114,97,112,112,101,114,34,62,10,109,101,109,98,101,114,115, +104,105,112,108,105,110,103,117,105,115,116,105,99,112,120,59,112,97,100,100,105 +,110,103,112,104,105,108,111,115,111,112,104,121,97,115,115,105,115,116,97,110, +99,101,117,110,105,118,101,114,115,105,116,121,102,97,99,105,108,105,116,105,101 +,115,114,101,99,111,103,110,105,122,101,100,112,114,101,102,101,114,101,110,99, +101,105,102,32,40,116,121,112,101,111,102,109,97,105,110,116,97,105,110,101,100, +118,111,99,97,98,117,108,97,114,121,104,121,112,111,116,104,101,115,105,115,46, +115,117,98,109,105,116,40,41,59,38,97,109,112,59,110,98,115,112,59,97,110,110, +111,116,97,116,105,111,110,98,101,104,105,110,100,32,116,104,101,70,111,117,110, +100,97,116,105,111,110,112,117,98,108,105,115,104,101,114,34,97,115,115,117,109, +112,116,105,111,110,105,110,116,114,111,100,117,99,101,100,99,111,114,114,117, +112,116,105,111,110,115,99,105,101,110,116,105,115,116,115,101,120,112,108,105, +99,105,116,108,121,105,110,115,116,101,97,100,32,111,102,100,105,109,101,110,115 +,105,111,110,115,32,111,110,67,108,105,99,107,61,34,99,111,110,115,105,100,101, +114,101,100,100,101,112,97,114,116,109,101,110,116,111,99,99,117,112,97,116,105, +111,110,115,111,111,110,32,97,102,116,101,114,105,110,118,101,115,116,109,101, +110,116,112,114,111,110,111,117,110,99,101,100,105,100,101,110,116,105,102,105, +101,100,101,120,112,101,114,105,109,101,110,116,77,97,110,97,103,101,109,101,110 +,116,103,101,111,103,114,97,112,104,105,99,34,32,104,101,105,103,104,116,61,34, +108,105,110,107,32,114,101,108,61,34,46,114,101,112,108,97,99,101,40,47,100,101, +112,114,101,115,115,105,111,110,99,111,110,102,101,114,101,110,99,101,112,117, +110,105,115,104,109,101,110,116,101,108,105,109,105,110,97,116,101,100,114,101, +115,105,115,116,97,110,99,101,97,100,97,112,116,97,116,105,111,110,111,112,112, +111,115,105,116,105,111,110,119,101,108,108,32,107,110,111,119,110,115,117,112, +112,108,101,109,101,110,116,100,101,116,101,114,109,105,110,101,100,104,49,32,99 +,108,97,115,115,61,34,48,112,120,59,109,97,114,103,105,110,109,101,99,104,97,110 +,105,99,97,108,115,116,97,116,105,115,116,105,99,115,99,101,108,101,98,114,97, +116,101,100,71,111,118,101,114,110,109,101,110,116,10,10,68,117,114,105,110,103, +32,116,100,101,118,101,108,111,112,101,114,115,97,114,116,105,102,105,99,105,97, +108,101,113,117,105,118,97,108,101,110,116,111,114,105,103,105,110,97,116,101, +100,67,111,109,109,105,115,115,105,111,110,97,116,116,97,99,104,109,101,110,116, +60,115,112,97,110,32,105,100,61,34,116,104,101,114,101,32,119,101,114,101,78,101 +,100,101,114,108,97,110,100,115,98,101,121,111,110,100,32,116,104,101,114,101, +103,105,115,116,101,114,101,100,106,111,117,114,110,97,108,105,115,116,102,114, +101,113,117,101,110,116,108,121,97,108,108,32,111,102,32,116,104,101,108,97,110, +103,61,34,101,110,34,32,60,47,115,116,121,108,101,62,13,10,97,98,115,111,108,117 +,116,101,59,32,115,117,112,112,111,114,116,105,110,103,101,120,116,114,101,109, +101,108,121,32,109,97,105,110,115,116,114,101,97,109,60,47,115,116,114,111,110, +103,62,32,112,111,112,117,108,97,114,105,116,121,101,109,112,108,111,121,109,101 +,110,116,60,47,116,97,98,108,101,62,13,10,32,99,111,108,115,112,97,110,61,34,60, +47,102,111,114,109,62,10,32,32,99,111,110,118,101,114,115,105,111,110,97,98,111, +117,116,32,116,104,101,32,60,47,112,62,60,47,100,105,118,62,105,110,116,101,103, +114,97,116,101,100,34,32,108,97,110,103,61,34,101,110,80,111,114,116,117,103,117 +,101,115,101,115,117,98,115,116,105,116,117,116,101,105,110,100,105,118,105,100, +117,97,108,105,109,112,111,115,115,105,98,108,101,109,117,108,116,105,109,101, +100,105,97,97,108,109,111,115,116,32,97,108,108,112,120,32,115,111,108,105,100, +32,35,97,112,97,114,116,32,102,114,111,109,115,117,98,106,101,99,116,32,116,111, +105,110,32,69,110,103,108,105,115,104,99,114,105,116,105,99,105,122,101,100,101, +120,99,101,112,116,32,102,111,114,103,117,105,100,101,108,105,110,101,115,111, +114,105,103,105,110,97,108,108,121,114,101,109,97,114,107,97,98,108,101,116,104, +101,32,115,101,99,111,110,100,104,50,32,99,108,97,115,115,61,34,60,97,32,116,105 +,116,108,101,61,34,40,105,110,99,108,117,100,105,110,103,112,97,114,97,109,101, +116,101,114,115,112,114,111,104,105,98,105,116,101,100,61,32,34,104,116,116,112, +58,47,47,100,105,99,116,105,111,110,97,114,121,112,101,114,99,101,112,116,105, +111,110,114,101,118,111,108,117,116,105,111,110,102,111,117,110,100,97,116,105, +111,110,112,120,59,104,101,105,103,104,116,58,115,117,99,99,101,115,115,102,117, +108,115,117,112,112,111,114,116,101,114,115,109,105,108,108,101,110,110,105,117, +109,104,105,115,32,102,97,116,104,101,114,116,104,101,32,38,113,117,111,116,59, +110,111,45,114,101,112,101,97,116,59,99,111,109,109,101,114,99,105,97,108,105, +110,100,117,115,116,114,105,97,108,101,110,99,111,117,114,97,103,101,100,97,109, +111,117,110,116,32,111,102,32,117,110,111,102,102,105,99,105,97,108,101,102,102, +105,99,105,101,110,99,121,82,101,102,101,114,101,110,99,101,115,99,111,111,114, +100,105,110,97,116,101,100,105,115,99,108,97,105,109,101,114,101,120,112,101,100 +,105,116,105,111,110,100,101,118,101,108,111,112,105,110,103,99,97,108,99,117, +108,97,116,101,100,115,105,109,112,108,105,102,105,101,100,108,101,103,105,116, +105,109,97,116,101,115,117,98,115,116,114,105,110,103,40,48,34,32,99,108,97,115, +115,61,34,99,111,109,112,108,101,116,101,108,121,105,108,108,117,115,116,114,97, +116,101,102,105,118,101,32,121,101,97,114,115,105,110,115,116,114,117,109,101, +110,116,80,117,98,108,105,115,104,105,110,103,49,34,32,99,108,97,115,115,61,34, +112,115,121,99,104,111,108,111,103,121,99,111,110,102,105,100,101,110,99,101,110 +,117,109,98,101,114,32,111,102,32,97,98,115,101,110,99,101,32,111,102,102,111,99 +,117,115,101,100,32,111,110,106,111,105,110,101,100,32,116,104,101,115,116,114, +117,99,116,117,114,101,115,112,114,101,118,105,111,117,115,108,121,62,60,47,105, +102,114,97,109,101,62,111,110,99,101,32,97,103,97,105,110,98,117,116,32,114,97, +116,104,101,114,105,109,109,105,103,114,97,110,116,115,111,102,32,99,111,117,114 +,115,101,44,97,32,103,114,111,117,112,32,111,102,76,105,116,101,114,97,116,117, +114,101,85,110,108,105,107,101,32,116,104,101,60,47,97,62,38,110,98,115,112,59, +10,102,117,110,99,116,105,111,110,32,105,116,32,119,97,115,32,116,104,101,67,111 +,110,118,101,110,116,105,111,110,97,117,116,111,109,111,98,105,108,101,80,114, +111,116,101,115,116,97,110,116,97,103,103,114,101,115,115,105,118,101,97,102,116 +,101,114,32,116,104,101,32,83,105,109,105,108,97,114,108,121,44,34,32,47,62,60, +47,100,105,118,62,99,111,108,108,101,99,116,105,111,110,13,10,102,117,110,99,116 +,105,111,110,118,105,115,105,98,105,108,105,116,121,116,104,101,32,117,115,101, +32,111,102,118,111,108,117,110,116,101,101,114,115,97,116,116,114,97,99,116,105, +111,110,117,110,100,101,114,32,116,104,101,32,116,104,114,101,97,116,101,110,101 +,100,42,60,33,91,67,68,65,84,65,91,105,109,112,111,114,116,97,110,99,101,105,110 +,32,103,101,110,101,114,97,108,116,104,101,32,108,97,116,116,101,114,60,47,102, +111,114,109,62,10,60,47,46,105,110,100,101,120,79,102,40,39,105,32,61,32,48,59, +32,105,32,60,100,105,102,102,101,114,101,110,99,101,100,101,118,111,116,101,100, +32,116,111,116,114,97,100,105,116,105,111,110,115,115,101,97,114,99,104,32,102, +111,114,117,108,116,105,109,97,116,101,108,121,116,111,117,114,110,97,109,101, +110,116,97,116,116,114,105,98,117,116,101,115,115,111,45,99,97,108,108,101,100, +32,125,10,60,47,115,116,121,108,101,62,101,118,97,108,117,97,116,105,111,110,101 +,109,112,104,97,115,105,122,101,100,97,99,99,101,115,115,105,98,108,101,60,47, +115,101,99,116,105,111,110,62,115,117,99,99,101,115,115,105,111,110,97,108,111, +110,103,32,119,105,116,104,77,101,97,110,119,104,105,108,101,44,105,110,100,117, +115,116,114,105,101,115,60,47,97,62,60,98,114,32,47,62,104,97,115,32,98,101,99, +111,109,101,97,115,112,101,99,116,115,32,111,102,84,101,108,101,118,105,115,105, +111,110,115,117,102,102,105,99,105,101,110,116,98,97,115,107,101,116,98,97,108, +108,98,111,116,104,32,115,105,100,101,115,99,111,110,116,105,110,117,105,110,103 +,97,110,32,97,114,116,105,99,108,101,60,105,109,103,32,97,108,116,61,34,97,100, +118,101,110,116,117,114,101,115,104,105,115,32,109,111,116,104,101,114,109,97, +110,99,104,101,115,116,101,114,112,114,105,110,99,105,112,108,101,115,112,97,114 +,116,105,99,117,108,97,114,99,111,109,109,101,110,116,97,114,121,101,102,102,101 +,99,116,115,32,111,102,100,101,99,105,100,101,100,32,116,111,34,62,60,115,116, +114,111,110,103,62,112,117,98,108,105,115,104,101,114,115,74,111,117,114,110,97, +108,32,111,102,100,105,102,102,105,99,117,108,116,121,102,97,99,105,108,105,116, +97,116,101,97,99,99,101,112,116,97,98,108,101,115,116,121,108,101,46,99,115,115, +34,9,102,117,110,99,116,105,111,110,32,105,110,110,111,118,97,116,105,111,110,62 +,67,111,112,121,114,105,103,104,116,115,105,116,117,97,116,105,111,110,115,119, +111,117,108,100,32,104,97,118,101,98,117,115,105,110,101,115,115,101,115,68,105, +99,116,105,111,110,97,114,121,115,116,97,116,101,109,101,110,116,115,111,102,116 +,101,110,32,117,115,101,100,112,101,114,115,105,115,116,101,110,116,105,110,32, +74,97,110,117,97,114,121,99,111,109,112,114,105,115,105,110,103,60,47,116,105, +116,108,101,62,10,9,100,105,112,108,111,109,97,116,105,99,99,111,110,116,97,105, +110,105,110,103,112,101,114,102,111,114,109,105,110,103,101,120,116,101,110,115, +105,111,110,115,109,97,121,32,110,111,116,32,98,101,99,111,110,99,101,112,116,32 +,111,102,32,111,110,99,108,105,99,107,61,34,73,116,32,105,115,32,97,108,115,111, +102,105,110,97,110,99,105,97,108,32,109,97,107,105,110,103,32,116,104,101,76,117 +,120,101,109,98,111,117,114,103,97,100,100,105,116,105,111,110,97,108,97,114,101 +,32,99,97,108,108,101,100,101,110,103,97,103,101,100,32,105,110,34,115,99,114, +105,112,116,34,41,59,98,117,116,32,105,116,32,119,97,115,101,108,101,99,116,114, +111,110,105,99,111,110,115,117,98,109,105,116,61,34,10,60,33,45,45,32,69,110,100 +,32,101,108,101,99,116,114,105,99,97,108,111,102,102,105,99,105,97,108,108,121, +115,117,103,103,101,115,116,105,111,110,116,111,112,32,111,102,32,116,104,101, +117,110,108,105,107,101,32,116,104,101,65,117,115,116,114,97,108,105,97,110,79, +114,105,103,105,110,97,108,108,121,114,101,102,101,114,101,110,99,101,115,10,60, +47,104,101,97,100,62,13,10,114,101,99,111,103,110,105,115,101,100,105,110,105, +116,105,97,108,105,122,101,108,105,109,105,116,101,100,32,116,111,65,108,101,120 +,97,110,100,114,105,97,114,101,116,105,114,101,109,101,110,116,65,100,118,101, +110,116,117,114,101,115,102,111,117,114,32,121,101,97,114,115,10,10,38,108,116, +59,33,45,45,32,105,110,99,114,101,97,115,105,110,103,100,101,99,111,114,97,116, +105,111,110,104,51,32,99,108,97,115,115,61,34,111,114,105,103,105,110,115,32,111 +,102,111,98,108,105,103,97,116,105,111,110,114,101,103,117,108,97,116,105,111, +110,99,108,97,115,115,105,102,105,101,100,40,102,117,110,99,116,105,111,110,40, +97,100,118,97,110,116,97,103,101,115,98,101,105,110,103,32,116,104,101,32,104, +105,115,116,111,114,105,97,110,115,60,98,97,115,101,32,104,114,101,102,114,101, +112,101,97,116,101,100,108,121,119,105,108,108,105,110,103,32,116,111,99,111,109 +,112,97,114,97,98,108,101,100,101,115,105,103,110,97,116,101,100,110,111,109,105 +,110,97,116,105,111,110,102,117,110,99,116,105,111,110,97,108,105,110,115,105, +100,101,32,116,104,101,114,101,118,101,108,97,116,105,111,110,101,110,100,32,111 +,102,32,116,104,101,115,32,102,111,114,32,116,104,101,32,97,117,116,104,111,114, +105,122,101,100,114,101,102,117,115,101,100,32,116,111,116,97,107,101,32,112,108 +,97,99,101,97,117,116,111,110,111,109,111,117,115,99,111,109,112,114,111,109,105 +,115,101,112,111,108,105,116,105,99,97,108,32,114,101,115,116,97,117,114,97,110, +116,116,119,111,32,111,102,32,116,104,101,70,101,98,114,117,97,114,121,32,50,113 +,117,97,108,105,116,121,32,111,102,115,119,102,111,98,106,101,99,116,46,117,110, +100,101,114,115,116,97,110,100,110,101,97,114,108,121,32,97,108,108,119,114,105, +116,116,101,110,32,98,121,105,110,116,101,114,118,105,101,119,115,34,32,119,105, +100,116,104,61,34,49,119,105,116,104,100,114,97,119,97,108,102,108,111,97,116,58 +,108,101,102,116,105,115,32,117,115,117,97,108,108,121,99,97,110,100,105,100,97, +116,101,115,110,101,119,115,112,97,112,101,114,115,109,121,115,116,101,114,105, +111,117,115,68,101,112,97,114,116,109,101,110,116,98,101,115,116,32,107,110,111, +119,110,112,97,114,108,105,97,109,101,110,116,115,117,112,112,114,101,115,115, +101,100,99,111,110,118,101,110,105,101,110,116,114,101,109,101,109,98,101,114, +101,100,100,105,102,102,101,114,101,110,116,32,115,121,115,116,101,109,97,116, +105,99,104,97,115,32,108,101,100,32,116,111,112,114,111,112,97,103,97,110,100,97 +,99,111,110,116,114,111,108,108,101,100,105,110,102,108,117,101,110,99,101,115, +99,101,114,101,109,111,110,105,97,108,112,114,111,99,108,97,105,109,101,100,80, +114,111,116,101,99,116,105,111,110,108,105,32,99,108,97,115,115,61,34,83,99,105, +101,110,116,105,102,105,99,99,108,97,115,115,61,34,110,111,45,116,114,97,100,101 +,109,97,114,107,115,109,111,114,101,32,116,104,97,110,32,119,105,100,101,115,112 +,114,101,97,100,76,105,98,101,114,97,116,105,111,110,116,111,111,107,32,112,108, +97,99,101,100,97,121,32,111,102,32,116,104,101,97,115,32,108,111,110,103,32,97, +115,105,109,112,114,105,115,111,110,101,100,65,100,100,105,116,105,111,110,97, +108,10,60,104,101,97,100,62,10,60,109,76,97,98,111,114,97,116,111,114,121,78,111 +,118,101,109,98,101,114,32,50,101,120,99,101,112,116,105,111,110,115,73,110,100, +117,115,116,114,105,97,108,118,97,114,105,101,116,121,32,111,102,102,108,111,97, +116,58,32,108,101,102,68,117,114,105,110,103,32,116,104,101,97,115,115,101,115, +115,109,101,110,116,104,97,118,101,32,98,101,101,110,32,100,101,97,108,115,32, +119,105,116,104,83,116,97,116,105,115,116,105,99,115,111,99,99,117,114,114,101, +110,99,101,47,117,108,62,60,47,100,105,118,62,99,108,101,97,114,102,105,120,34, +62,116,104,101,32,112,117,98,108,105,99,109,97,110,121,32,121,101,97,114,115,119 +,104,105,99,104,32,119,101,114,101,111,118,101,114,32,116,105,109,101,44,115,121 +,110,111,110,121,109,111,117,115,99,111,110,116,101,110,116,34,62,10,112,114,101 +,115,117,109,97,98,108,121,104,105,115,32,102,97,109,105,108,121,117,115,101,114 +,65,103,101,110,116,46,117,110,101,120,112,101,99,116,101,100,105,110,99,108,117 +,100,105,110,103,32,99,104,97,108,108,101,110,103,101,100,97,32,109,105,110,111, +114,105,116,121,117,110,100,101,102,105,110,101,100,34,98,101,108,111,110,103, +115,32,116,111,116,97,107,101,110,32,102,114,111,109,105,110,32,79,99,116,111,98 +,101,114,112,111,115,105,116,105,111,110,58,32,115,97,105,100,32,116,111,32,98, +101,114,101,108,105,103,105,111,117,115,32,70,101,100,101,114,97,116,105,111,110 +,32,114,111,119,115,112,97,110,61,34,111,110,108,121,32,97,32,102,101,119,109, +101,97,110,116,32,116,104,97,116,108,101,100,32,116,111,32,116,104,101,45,45,62, +13,10,60,100,105,118,32,60,102,105,101,108,100,115,101,116,62,65,114,99,104,98, +105,115,104,111,112,32,99,108,97,115,115,61,34,110,111,98,101,105,110,103,32,117 +,115,101,100,97,112,112,114,111,97,99,104,101,115,112,114,105,118,105,108,101, +103,101,115,110,111,115,99,114,105,112,116,62,10,114,101,115,117,108,116,115,32, +105,110,109,97,121,32,98,101,32,116,104,101,69,97,115,116,101,114,32,101,103,103 +,109,101,99,104,97,110,105,115,109,115,114,101,97,115,111,110,97,98,108,101,80, +111,112,117,108,97,116,105,111,110,67,111,108,108,101,99,116,105,111,110,115,101 +,108,101,99,116,101,100,34,62,110,111,115,99,114,105,112,116,62,13,47,105,110, +100,101,120,46,112,104,112,97,114,114,105,118,97,108,32,111,102,45,106,115,115, +100,107,39,41,41,59,109,97,110,97,103,101,100,32,116,111,105,110,99,111,109,112, +108,101,116,101,99,97,115,117,97,108,116,105,101,115,99,111,109,112,108,101,116, +105,111,110,67,104,114,105,115,116,105,97,110,115,83,101,112,116,101,109,98,101, +114,32,97,114,105,116,104,109,101,116,105,99,112,114,111,99,101,100,117,114,101, +115,109,105,103,104,116,32,104,97,118,101,80,114,111,100,117,99,116,105,111,110, +105,116,32,97,112,112,101,97,114,115,80,104,105,108,111,115,111,112,104,121,102, +114,105,101,110,100,115,104,105,112,108,101,97,100,105,110,103,32,116,111,103, +105,118,105,110,103,32,116,104,101,116,111,119,97,114,100,32,116,104,101,103,117 +,97,114,97,110,116,101,101,100,100,111,99,117,109,101,110,116,101,100,99,111,108 +,111,114,58,35,48,48,48,118,105,100,101,111,32,103,97,109,101,99,111,109,109,105 +,115,115,105,111,110,114,101,102,108,101,99,116,105,110,103,99,104,97,110,103, +101,32,116,104,101,97,115,115,111,99,105,97,116,101,100,115,97,110,115,45,115, +101,114,105,102,111,110,107,101,121,112,114,101,115,115,59,32,112,97,100,100,105 +,110,103,58,72,101,32,119,97,115,32,116,104,101,117,110,100,101,114,108,121,105, +110,103,116,121,112,105,99,97,108,108,121,32,44,32,97,110,100,32,116,104,101,32, +115,114,99,69,108,101,109,101,110,116,115,117,99,99,101,115,115,105,118,101,115, +105,110,99,101,32,116,104,101,32,115,104,111,117,108,100,32,98,101,32,110,101, +116,119,111,114,107,105,110,103,97,99,99,111,117,110,116,105,110,103,117,115,101 +,32,111,102,32,116,104,101,108,111,119,101,114,32,116,104,97,110,115,104,111,119 +,115,32,116,104,97,116,60,47,115,112,97,110,62,10,9,9,99,111,109,112,108,97,105, +110,116,115,99,111,110,116,105,110,117,111,117,115,113,117,97,110,116,105,116, +105,101,115,97,115,116,114,111,110,111,109,101,114,104,101,32,100,105,100,32,110 +,111,116,100,117,101,32,116,111,32,105,116,115,97,112,112,108,105,101,100,32,116 +,111,97,110,32,97,118,101,114,97,103,101,101,102,102,111,114,116,115,32,116,111, +116,104,101,32,102,117,116,117,114,101,97,116,116,101,109,112,116,32,116,111,84, +104,101,114,101,102,111,114,101,44,99,97,112,97,98,105,108,105,116,121,82,101, +112,117,98,108,105,99,97,110,119,97,115,32,102,111,114,109,101,100,69,108,101,99 +,116,114,111,110,105,99,107,105,108,111,109,101,116,101,114,115,99,104,97,108, +108,101,110,103,101,115,112,117,98,108,105,115,104,105,110,103,116,104,101,32, +102,111,114,109,101,114,105,110,100,105,103,101,110,111,117,115,100,105,114,101, +99,116,105,111,110,115,115,117,98,115,105,100,105,97,114,121,99,111,110,115,112, +105,114,97,99,121,100,101,116,97,105,108,115,32,111,102,97,110,100,32,105,110,32 +,116,104,101,97,102,102,111,114,100,97,98,108,101,115,117,98,115,116,97,110,99, +101,115,114,101,97,115,111,110,32,102,111,114,99,111,110,118,101,110,116,105,111 +,110,105,116,101,109,116,121,112,101,61,34,97,98,115,111,108,117,116,101,108,121 +,115,117,112,112,111,115,101,100,108,121,114,101,109,97,105,110,101,100,32,97,97 +,116,116,114,97,99,116,105,118,101,116,114,97,118,101,108,108,105,110,103,115, +101,112,97,114,97,116,101,108,121,102,111,99,117,115,101,115,32,111,110,101,108, +101,109,101,110,116,97,114,121,97,112,112,108,105,99,97,98,108,101,102,111,117, +110,100,32,116,104,97,116,115,116,121,108,101,115,104,101,101,116,109,97,110,117 +,115,99,114,105,112,116,115,116,97,110,100,115,32,102,111,114,32,110,111,45,114, +101,112,101,97,116,40,115,111,109,101,116,105,109,101,115,67,111,109,109,101,114 +,99,105,97,108,105,110,32,65,109,101,114,105,99,97,117,110,100,101,114,116,97, +107,101,110,113,117,97,114,116,101,114,32,111,102,97,110,32,101,120,97,109,112, +108,101,112,101,114,115,111,110,97,108,108,121,105,110,100,101,120,46,112,104, +112,63,60,47,98,117,116,116,111,110,62,10,112,101,114,99,101,110,116,97,103,101, +98,101,115,116,45,107,110,111,119,110,99,114,101,97,116,105,110,103,32,97,34,32, +100,105,114,61,34,108,116,114,76,105,101,117,116,101,110,97,110,116,10,60,100, +105,118,32,105,100,61,34,116,104,101,121,32,119,111,117,108,100,97,98,105,108, +105,116,121,32,111,102,109,97,100,101,32,117,112,32,111,102,110,111,116,101,100, +32,116,104,97,116,99,108,101,97,114,32,116,104,97,116,97,114,103,117,101,32,116, +104,97,116,116,111,32,97,110,111,116,104,101,114,99,104,105,108,100,114,101,110, +39,115,112,117,114,112,111,115,101,32,111,102,102,111,114,109,117,108,97,116,101 +,100,98,97,115,101,100,32,117,112,111,110,116,104,101,32,114,101,103,105,111,110 +,115,117,98,106,101,99,116,32,111,102,112,97,115,115,101,110,103,101,114,115,112 +,111,115,115,101,115,115,105,111,110,46,10,10,73,110,32,116,104,101,32,66,101, +102,111,114,101,32,116,104,101,97,102,116,101,114,119,97,114,100,115,99,117,114, +114,101,110,116,108,121,32,97,99,114,111,115,115,32,116,104,101,115,99,105,101, +110,116,105,102,105,99,99,111,109,109,117,110,105,116,121,46,99,97,112,105,116, +97,108,105,115,109,105,110,32,71,101,114,109,97,110,121,114,105,103,104,116,45, +119,105,110,103,116,104,101,32,115,121,115,116,101,109,83,111,99,105,101,116,121 +,32,111,102,112,111,108,105,116,105,99,105,97,110,100,105,114,101,99,116,105,111 +,110,58,119,101,110,116,32,111,110,32,116,111,114,101,109,111,118,97,108,32,111, +102,32,78,101,119,32,89,111,114,107,32,97,112,97,114,116,109,101,110,116,115,105 +,110,100,105,99,97,116,105,111,110,100,117,114,105,110,103,32,116,104,101,117, +110,108,101,115,115,32,116,104,101,104,105,115,116,111,114,105,99,97,108,104,97, +100,32,98,101,101,110,32,97,100,101,102,105,110,105,116,105,118,101,105,110,103, +114,101,100,105,101,110,116,97,116,116,101,110,100,97,110,99,101,67,101,110,116, +101,114,32,102,111,114,112,114,111,109,105,110,101,110,99,101,114,101,97,100,121 +,83,116,97,116,101,115,116,114,97,116,101,103,105,101,115,98,117,116,32,105,110, +32,116,104,101,97,115,32,112,97,114,116,32,111,102,99,111,110,115,116,105,116, +117,116,101,99,108,97,105,109,32,116,104,97,116,108,97,98,111,114,97,116,111,114 +,121,99,111,109,112,97,116,105,98,108,101,102,97,105,108,117,114,101,32,111,102, +44,32,115,117,99,104,32,97,115,32,98,101,103,97,110,32,119,105,116,104,117,115, +105,110,103,32,116,104,101,32,116,111,32,112,114,111,118,105,100,101,102,101,97, +116,117,114,101,32,111,102,102,114,111,109,32,119,104,105,99,104,47,34,32,99,108 +,97,115,115,61,34,103,101,111,108,111,103,105,99,97,108,115,101,118,101,114,97, +108,32,111,102,100,101,108,105,98,101,114,97,116,101,105,109,112,111,114,116,97, +110,116,32,104,111,108,100,115,32,116,104,97,116,105,110,103,38,113,117,111,116, +59,32,118,97,108,105,103,110,61,116,111,112,116,104,101,32,71,101,114,109,97,110 +,111,117,116,115,105,100,101,32,111,102,110,101,103,111,116,105,97,116,101,100, +104,105,115,32,99,97,114,101,101,114,115,101,112,97,114,97,116,105,111,110,105, +100,61,34,115,101,97,114,99,104,119,97,115,32,99,97,108,108,101,100,116,104,101, +32,102,111,117,114,116,104,114,101,99,114,101,97,116,105,111,110,111,116,104,101 +,114,32,116,104,97,110,112,114,101,118,101,110,116,105,111,110,119,104,105,108, +101,32,116,104,101,32,101,100,117,99,97,116,105,111,110,44,99,111,110,110,101,99 +,116,105,110,103,97,99,99,117,114,97,116,101,108,121,119,101,114,101,32,98,117, +105,108,116,119,97,115,32,107,105,108,108,101,100,97,103,114,101,101,109,101,110 +,116,115,109,117,99,104,32,109,111,114,101,32,68,117,101,32,116,111,32,116,104, +101,119,105,100,116,104,58,32,49,48,48,115,111,109,101,32,111,116,104,101,114,75 +,105,110,103,100,111,109,32,111,102,116,104,101,32,101,110,116,105,114,101,102, +97,109,111,117,115,32,102,111,114,116,111,32,99,111,110,110,101,99,116,111,98, +106,101,99,116,105,118,101,115,116,104,101,32,70,114,101,110,99,104,112,101,111, +112,108,101,32,97,110,100,102,101,97,116,117,114,101,100,34,62,105,115,32,115,97 +,105,100,32,116,111,115,116,114,117,99,116,117,114,97,108,114,101,102,101,114, +101,110,100,117,109,109,111,115,116,32,111,102,116,101,110,97,32,115,101,112,97, +114,97,116,101,45,62,10,60,100,105,118,32,105,100,32,79,102,102,105,99,105,97, +108,32,119,111,114,108,100,119,105,100,101,46,97,114,105,97,45,108,97,98,101,108 +,116,104,101,32,112,108,97,110,101,116,97,110,100,32,105,116,32,119,97,115,100, +34,32,118,97,108,117,101,61,34,108,111,111,107,105,110,103,32,97,116,98,101,110, +101,102,105,99,105,97,108,97,114,101,32,105,110,32,116,104,101,109,111,110,105, +116,111,114,105,110,103,114,101,112,111,114,116,101,100,108,121,116,104,101,32, +109,111,100,101,114,110,119,111,114,107,105,110,103,32,111,110,97,108,108,111, +119,101,100,32,116,111,119,104,101,114,101,32,116,104,101,32,105,110,110,111,118 +,97,116,105,118,101,60,47,97,62,60,47,100,105,118,62,115,111,117,110,100,116,114 +,97,99,107,115,101,97,114,99,104,70,111,114,109,116,101,110,100,32,116,111,32,98 +,101,105,110,112,117,116,32,105,100,61,34,111,112,101,110,105,110,103,32,111,102 +,114,101,115,116,114,105,99,116,101,100,97,100,111,112,116,101,100,32,98,121,97, +100,100,114,101,115,115,105,110,103,116,104,101,111,108,111,103,105,97,110,109, +101,116,104,111,100,115,32,111,102,118,97,114,105,97,110,116,32,111,102,67,104, +114,105,115,116,105,97,110,32,118,101,114,121,32,108,97,114,103,101,97,117,116, +111,109,111,116,105,118,101,98,121,32,102,97,114,32,116,104,101,114,97,110,103, +101,32,102,114,111,109,112,117,114,115,117,105,116,32,111,102,102,111,108,108, +111,119,32,116,104,101,98,114,111,117,103,104,116,32,116,111,105,110,32,69,110, +103,108,97,110,100,97,103,114,101,101,32,116,104,97,116,97,99,99,117,115,101,100 +,32,111,102,99,111,109,101,115,32,102,114,111,109,112,114,101,118,101,110,116, +105,110,103,100,105,118,32,115,116,121,108,101,61,104,105,115,32,111,114,32,104, +101,114,116,114,101,109,101,110,100,111,117,115,102,114,101,101,100,111,109,32, +111,102,99,111,110,99,101,114,110,105,110,103,48,32,49,101,109,32,49,101,109,59, +66,97,115,107,101,116,98,97,108,108,47,115,116,121,108,101,46,99,115,115,97,110, +32,101,97,114,108,105,101,114,101,118,101,110,32,97,102,116,101,114,47,34,32,116 +,105,116,108,101,61,34,46,99,111,109,47,105,110,100,101,120,116,97,107,105,110, +103,32,116,104,101,112,105,116,116,115,98,117,114,103,104,99,111,110,116,101,110 +,116,34,62,13,60,115,99,114,105,112,116,62,40,102,116,117,114,110,101,100,32,111 +,117,116,104,97,118,105,110,103,32,116,104,101,60,47,115,112,97,110,62,13,10,32, +111,99,99,97,115,105,111,110,97,108,98,101,99,97,117,115,101,32,105,116,115,116, +97,114,116,101,100,32,116,111,112,104,121,115,105,99,97,108,108,121,62,60,47,100 +,105,118,62,10,32,32,99,114,101,97,116,101,100,32,98,121,67,117,114,114,101,110, +116,108,121,44,32,98,103,99,111,108,111,114,61,34,116,97,98,105,110,100,101,120, +61,34,100,105,115,97,115,116,114,111,117,115,65,110,97,108,121,116,105,99,115,32 +,97,108,115,111,32,104,97,115,32,97,62,60,100,105,118,32,105,100,61,34,60,47,115 +,116,121,108,101,62,10,60,99,97,108,108,101,100,32,102,111,114,115,105,110,103, +101,114,32,97,110,100,46,115,114,99,32,61,32,34,47,47,118,105,111,108,97,116,105 +,111,110,115,116,104,105,115,32,112,111,105,110,116,99,111,110,115,116,97,110, +116,108,121,105,115,32,108,111,99,97,116,101,100,114,101,99,111,114,100,105,110, +103,115,100,32,102,114,111,109,32,116,104,101,110,101,100,101,114,108,97,110,100 +,115,112,111,114,116,117,103,117,195,170,115,215,162,215,145,215,168,215,153,215 +,170,217,129,216,167,216,177,216,179,219,140,100,101,115,97,114,114,111,108,108, +111,99,111,109,101,110,116,97,114,105,111,101,100,117,99,97,99,105,195,179,110, +115,101,112,116,105,101,109,98,114,101,114,101,103,105,115,116,114,97,100,111, +100,105,114,101,99,99,105,195,179,110,117,98,105,99,97,99,105,195,179,110,112, +117,98,108,105,99,105,100,97,100,114,101,115,112,117,101,115,116,97,115,114,101, +115,117,108,116,97,100,111,115,105,109,112,111,114,116,97,110,116,101,114,101, +115,101,114,118,97,100,111,115,97,114,116,195,173,99,117,108,111,115,100,105,102 +,101,114,101,110,116,101,115,115,105,103,117,105,101,110,116,101,115,114,101,112 +,195,186,98,108,105,99,97,115,105,116,117,97,99,105,195,179,110,109,105,110,105, +115,116,101,114,105,111,112,114,105,118,97,99,105,100,97,100,100,105,114,101,99, +116,111,114,105,111,102,111,114,109,97,99,105,195,179,110,112,111,98,108,97,99, +105,195,179,110,112,114,101,115,105,100,101,110,116,101,99,111,110,116,101,110, +105,100,111,115,97,99,99,101,115,111,114,105,111,115,116,101,99,104,110,111,114, +97,116,105,112,101,114,115,111,110,97,108,101,115,99,97,116,101,103,111,114,195, +173,97,101,115,112,101,99,105,97,108,101,115,100,105,115,112,111,110,105,98,108, +101,97,99,116,117,97,108,105,100,97,100,114,101,102,101,114,101,110,99,105,97, +118,97,108,108,97,100,111,108,105,100,98,105,98,108,105,111,116,101,99,97,114, +101,108,97,99,105,111,110,101,115,99,97,108,101,110,100,97,114,105,111,112,111, +108,195,173,116,105,99,97,115,97,110,116,101,114,105,111,114,101,115,100,111,99, +117,109,101,110,116,111,115,110,97,116,117,114,97,108,101,122,97,109,97,116,101, +114,105,97,108,101,115,100,105,102,101,114,101,110,99,105,97,101,99,111,110,195, +179,109,105,99,97,116,114,97,110,115,112,111,114,116,101,114,111,100,114,195,173 +,103,117,101,122,112,97,114,116,105,99,105,112,97,114,101,110,99,117,101,110,116 +,114,97,110,100,105,115,99,117,115,105,195,179,110,101,115,116,114,117,99,116, +117,114,97,102,117,110,100,97,99,105,195,179,110,102,114,101,99,117,101,110,116, +101,115,112,101,114,109,97,110,101,110,116,101,116,111,116,97,108,109,101,110, +116,101,208,188,208,190,208,182,208,189,208,190,208,177,209,131,208,180,208,181, +209,130,208,188,208,190,208,182,208,181,209,130,208,178,209,128,208,181,208,188, +209,143,209,130,208,176,208,186,208,182,208,181,209,135,209,130,208,190,208,177, +209,139,208,177,208,190,208,187,208,181,208,181,208,190,209,135,208,181,208,189, +209,140,209,141,209,130,208,190,208,179,208,190,208,186,208,190,208,179,208,180, +208,176,208,191,208,190,209,129,208,187,208,181,208,178,209,129,208,181,208,179, +208,190,209,129,208,176,208,185,209,130,208,181,209,135,208,181,209,128,208,181, +208,183,208,188,208,190,208,179,209,131,209,130,209,129,208,176,208,185,209,130, +208,176,208,182,208,184,208,183,208,189,208,184,208,188,208,181,208,182,208,180, +209,131,208,177,209,131,208,180,209,131,209,130,208,159,208,190,208,184,209,129, +208,186,208,183,208,180,208,181,209,129,209,140,208,178,208,184,208,180,208,181, +208,190,209,129,208,178,209,143,208,183,208,184,208,189,209,131,208,182,208,189, +208,190,209,129,208,178,208,190,208,181,208,185,208,187,209,142,208,180,208,181, +208,185,208,191,208,190,209,128,208,189,208,190,208,188,208,189,208,190,208,179, +208,190,208,180,208,181,209,130,208,181,208,185,209,129,208,178,208,190,208,184, +209,133,208,191,209,128,208,176,208,178,208,176,209,130,208,176,208,186,208,190, +208,185,208,188,208,181,209,129,209,130,208,190,208,184,208,188,208,181,208,181, +209,130,208,182,208,184,208,183,208,189,209,140,208,190,208,180,208,189,208,190, +208,185,208,187,209,131,209,135,209,136,208,181,208,191,208,181,209,128,208,181, +208,180,209,135,208,176,209,129,209,130,208,184,209,135,208,176,209,129,209,130, +209,140,209,128,208,176,208,177,208,190,209,130,208,189,208,190,208,178,209,139, +209,133,208,191,209,128,208,176,208,178,208,190,209,129,208,190,208,177,208,190, +208,185,208,191,208,190,209,130,208,190,208,188,208,188,208,181,208,189,208,181, +208,181,209,135,208,184,209,129,208,187,208,181,208,189,208,190,208,178,209,139, +208,181,209,131,209,129,208,187,209,131,208,179,208,190,208,186,208,190,208,187, +208,190,208,189,208,176,208,183,208,176,208,180,209,130,208,176,208,186,208,190, +208,181,209,130,208,190,208,179,208,180,208,176,208,191,208,190,209,135,209,130, +208,184,208,159,208,190,209,129,208,187,208,181,209,130,208,176,208,186,208,184, +208,181,208,189,208,190,208,178,209,139,208,185,209,129,209,130,208,190,208,184, +209,130,209,130,208,176,208,186,208,184,209,133,209,129,209,128,208,176,208,183, +209,131,208,161,208,176,208,189,208,186,209,130,209,132,208,190,209,128,209,131, +208,188,208,154,208,190,208,179,208,180,208,176,208,186,208,189,208,184,208,179, +208,184,209,129,208,187,208,190,208,178,208,176,208,189,208,176,209,136,208,181, +208,185,208,189,208,176,208,185,209,130,208,184,209,129,208,178,208,190,208,184, +208,188,209,129,208,178,209,143,208,183,209,140,208,187,209,142,208,177,208,190, +208,185,209,135,208,176,209,129,209,130,208,190,209,129,209,128,208,181,208,180, +208,184,208,154,209,128,208,190,208,188,208,181,208,164,208,190,209,128,209,131, +208,188,209,128,209,139,208,189,208,186,208,181,209,129,209,130,208,176,208,187, +208,184,208,191,208,190,208,184,209,129,208,186,209,130,209,139,209,129,209,143, +209,135,208,188,208,181,209,129,209,143,209,134,209,134,208,181,208,189,209,130, +209,128,209,130,209,128,209,131,208,180,208,176,209,129,208,176,208,188,209,139, +209,133,209,128,209,139,208,189,208,186,208,176,208,157,208,190,208,178,209,139, +208,185,209,135,208,176,209,129,208,190,208,178,208,188,208,181,209,129,209,130, +208,176,209,132,208,184,208,187,209,140,208,188,208,188,208,176,209,128,209,130, +208,176,209,129,209,130,209,128,208,176,208,189,208,188,208,181,209,129,209,130, +208,181,209,130,208,181,208,186,209,129,209,130,208,189,208,176,209,136,208,184, +209,133,208,188,208,184,208,189,209,131,209,130,208,184,208,188,208,181,208,189, +208,184,208,184,208,188,208,181,209,142,209,130,208,189,208,190,208,188,208,181, +209,128,208,179,208,190,209,128,208,190,208,180,209,129,208,176,208,188,208,190, +208,188,209,141,209,130,208,190,208,188,209,131,208,186,208,190,208,189,209,134, +208,181,209,129,208,178,208,190,208,181,208,188,208,186,208,176,208,186,208,190, +208,185,208,144,209,128,209,133,208,184,208,178,217,133,217,134,216,170,216,175, +217,137,216,165,216,177,216,179,216,167,217,132,216,177,216,179,216,167,217,132, +216,169,216,167,217,132,216,185,216,167,217,133,217,131,216,170,216,168,217,135, +216,167,216,168,216,177,216,167,217,133,216,172,216,167,217,132,217,138,217,136, +217,133,216,167,217,132,216,181,217,136,216,177,216,172,216,175,217,138,216,175, +216,169,216,167,217,132,216,185,216,182,217,136,216,165,216,182,216,167,217,129, +216,169,216,167,217,132,217,130,216,179,217,133,216,167,217,132,216,185,216,167, +216,168,216,170,216,173,217,133,217,138,217,132,217,133,217,132,217,129,216,167, +216,170,217,133,217,132,216,170,217,130,217,137,216,170,216,185,216,175,217,138, +217,132,216,167,217,132,216,180,216,185,216,177,216,163,216,174,216,168,216,167, +216,177,216,170,216,183,217,136,217,138,216,177,216,185,217,132,217,138,217,131, +217,133,216,165,216,177,217,129,216,167,217,130,216,183,217,132,216,168,216,167, +216,170,216,167,217,132,217,132,216,186,216,169,216,170,216,177,216,170,217,138, +216,168,216,167,217,132,217,134,216,167,216,179,216,167,217,132,216,180,217,138, +216,174,217,133,217,134,216,170,216,175,217,138,216,167,217,132,216,185,216,177, +216,168,216,167,217,132,217,130,216,181,216,181,216,167,217,129,217,132,216,167, +217,133,216,185,217,132,217,138,217,135,216,167,216,170,216,173,216,175,217,138, +216,171,216,167,217,132,217,132,217,135,217,133,216,167,217,132,216,185,217,133, +217,132,217,133,217,131,216,170,216,168,216,169,217,138,217,133,217,131,217,134, +217,131,216,167,217,132,216,183,217,129,217,132,217,129,217,138,216,175,217,138, +217,136,216,165,216,175,216,167,216,177,216,169,216,170,216,167,216,177,217,138, +216,174,216,167,217,132,216,181,216,173,216,169,216,170,216,179,216,172,217,138, +217,132,216,167,217,132,217,136,217,130,216,170,216,185,217,134,216,175,217,133, +216,167,217,133,216,175,217,138,217,134,216,169,216,170,216,181,217,133,217,138, +217,133,216,163,216,177,216,180,217,138,217,129,216,167,217,132,216,176,217,138, +217,134,216,185,216,177,216,168,217,138,216,169,216,168,217,136,216,167,216,168, +216,169,216,163,217,132,216,185,216,167,216,168,216,167,217,132,216,179,217,129, +216,177,217,133,216,180,216,167,217,131,217,132,216,170,216,185,216,167,217,132, +217,137,216,167,217,132,216,163,217,136,217,132,216,167,217,132,216,179,217,134, +216,169,216,172,216,167,217,133,216,185,216,169,216,167,217,132,216,181,216,173, +217,129,216,167,217,132,216,175,217,138,217,134,217,131,217,132,217,133,216,167, +216,170,216,167,217,132,216,174,216,167,216,181,216,167,217,132,217,133,217,132, +217,129,216,163,216,185,216,182,216,167,216,161,217,131,216,170,216,167,216,168, +216,169,216,167,217,132,216,174,217,138,216,177,216,177,216,179,216,167,216,166, +217,132,216,167,217,132,217,130,217,132,216,168,216,167,217,132,216,163,216,175, +216,168,217,133,217,130,216,167,216,183,216,185,217,133,216,177,216,167,216,179, +217,132,217,133,217,134,216,183,217,130,216,169,216,167,217,132,217,131,216,170, +216,168,216,167,217,132,216,177,216,172,217,132,216,167,216,180,216,170,216,177, +217,131,216,167,217,132,217,130,216,175,217,133,217,138,216,185,216,183,217,138, +217,131,115,66,121,84,97,103,78,97,109,101,40,46,106,112,103,34,32,97,108,116,61 +,34,49,112,120,32,115,111,108,105,100,32,35,46,103,105,102,34,32,97,108,116,61, +34,116,114,97,110,115,112,97,114,101,110,116,105,110,102,111,114,109,97,116,105, +111,110,97,112,112,108,105,99,97,116,105,111,110,34,32,111,110,99,108,105,99,107 +,61,34,101,115,116,97,98,108,105,115,104,101,100,97,100,118,101,114,116,105,115, +105,110,103,46,112,110,103,34,32,97,108,116,61,34,101,110,118,105,114,111,110, +109,101,110,116,112,101,114,102,111,114,109,97,110,99,101,97,112,112,114,111,112 +,114,105,97,116,101,38,97,109,112,59,109,100,97,115,104,59,105,109,109,101,100, +105,97,116,101,108,121,60,47,115,116,114,111,110,103,62,60,47,114,97,116,104,101 +,114,32,116,104,97,110,116,101,109,112,101,114,97,116,117,114,101,100,101,118, +101,108,111,112,109,101,110,116,99,111,109,112,101,116,105,116,105,111,110,112, +108,97,99,101,104,111,108,100,101,114,118,105,115,105,98,105,108,105,116,121,58, +99,111,112,121,114,105,103,104,116,34,62,48,34,32,104,101,105,103,104,116,61,34, +101,118,101,110,32,116,104,111,117,103,104,114,101,112,108,97,99,101,109,101,110 +,116,100,101,115,116,105,110,97,116,105,111,110,67,111,114,112,111,114,97,116, +105,111,110,60,117,108,32,99,108,97,115,115,61,34,65,115,115,111,99,105,97,116, +105,111,110,105,110,100,105,118,105,100,117,97,108,115,112,101,114,115,112,101, +99,116,105,118,101,115,101,116,84,105,109,101,111,117,116,40,117,114,108,40,104, +116,116,112,58,47,47,109,97,116,104,101,109,97,116,105,99,115,109,97,114,103,105 +,110,45,116,111,112,58,101,118,101,110,116,117,97,108,108,121,32,100,101,115,99, +114,105,112,116,105,111,110,41,32,110,111,45,114,101,112,101,97,116,99,111,108, +108,101,99,116,105,111,110,115,46,74,80,71,124,116,104,117,109,98,124,112,97,114 +,116,105,99,105,112,97,116,101,47,104,101,97,100,62,60,98,111,100,121,102,108, +111,97,116,58,108,101,102,116,59,60,108,105,32,99,108,97,115,115,61,34,104,117, +110,100,114,101,100,115,32,111,102,10,10,72,111,119,101,118,101,114,44,32,99,111 +,109,112,111,115,105,116,105,111,110,99,108,101,97,114,58,98,111,116,104,59,99, +111,111,112,101,114,97,116,105,111,110,119,105,116,104,105,110,32,116,104,101,32 +,108,97,98,101,108,32,102,111,114,61,34,98,111,114,100,101,114,45,116,111,112,58 +,78,101,119,32,90,101,97,108,97,110,100,114,101,99,111,109,109,101,110,100,101, +100,112,104,111,116,111,103,114,97,112,104,121,105,110,116,101,114,101,115,116, +105,110,103,38,108,116,59,115,117,112,38,103,116,59,99,111,110,116,114,111,118, +101,114,115,121,78,101,116,104,101,114,108,97,110,100,115,97,108,116,101,114,110 +,97,116,105,118,101,109,97,120,108,101,110,103,116,104,61,34,115,119,105,116,122 +,101,114,108,97,110,100,68,101,118,101,108,111,112,109,101,110,116,101,115,115, +101,110,116,105,97,108,108,121,10,10,65,108,116,104,111,117,103,104,32,60,47,116 +,101,120,116,97,114,101,97,62,116,104,117,110,100,101,114,98,105,114,100,114,101 +,112,114,101,115,101,110,116,101,100,38,97,109,112,59,110,100,97,115,104,59,115, +112,101,99,117,108,97,116,105,111,110,99,111,109,109,117,110,105,116,105,101,115 +,108,101,103,105,115,108,97,116,105,111,110,101,108,101,99,116,114,111,110,105, +99,115,10,9,60,100,105,118,32,105,100,61,34,105,108,108,117,115,116,114,97,116, +101,100,101,110,103,105,110,101,101,114,105,110,103,116,101,114,114,105,116,111, +114,105,101,115,97,117,116,104,111,114,105,116,105,101,115,100,105,115,116,114, +105,98,117,116,101,100,54,34,32,104,101,105,103,104,116,61,34,115,97,110,115,45, +115,101,114,105,102,59,99,97,112,97,98,108,101,32,111,102,32,100,105,115,97,112, +112,101,97,114,101,100,105,110,116,101,114,97,99,116,105,118,101,108,111,111,107 +,105,110,103,32,102,111,114,105,116,32,119,111,117,108,100,32,98,101,65,102,103, +104,97,110,105,115,116,97,110,119,97,115,32,99,114,101,97,116,101,100,77,97,116, +104,46,102,108,111,111,114,40,115,117,114,114,111,117,110,100,105,110,103,99,97, +110,32,97,108,115,111,32,98,101,111,98,115,101,114,118,97,116,105,111,110,109,97 +,105,110,116,101,110,97,110,99,101,101,110,99,111,117,110,116,101,114,101,100,60 +,104,50,32,99,108,97,115,115,61,34,109,111,114,101,32,114,101,99,101,110,116,105 +,116,32,104,97,115,32,98,101,101,110,105,110,118,97,115,105,111,110,32,111,102, +41,46,103,101,116,84,105,109,101,40,41,102,117,110,100,97,109,101,110,116,97,108 +,68,101,115,112,105,116,101,32,116,104,101,34,62,60,100,105,118,32,105,100,61,34 +,105,110,115,112,105,114,97,116,105,111,110,101,120,97,109,105,110,97,116,105, +111,110,112,114,101,112,97,114,97,116,105,111,110,101,120,112,108,97,110,97,116, +105,111,110,60,105,110,112,117,116,32,105,100,61,34,60,47,97,62,60,47,115,112,97 +,110,62,118,101,114,115,105,111,110,115,32,111,102,105,110,115,116,114,117,109, +101,110,116,115,98,101,102,111,114,101,32,116,104,101,32,32,61,32,39,104,116,116 +,112,58,47,47,68,101,115,99,114,105,112,116,105,111,110,114,101,108,97,116,105, +118,101,108,121,32,46,115,117,98,115,116,114,105,110,103,40,101,97,99,104,32,111 +,102,32,116,104,101,101,120,112,101,114,105,109,101,110,116,115,105,110,102,108, +117,101,110,116,105,97,108,105,110,116,101,103,114,97,116,105,111,110,109,97,110 +,121,32,112,101,111,112,108,101,100,117,101,32,116,111,32,116,104,101,32,99,111, +109,98,105,110,97,116,105,111,110,100,111,32,110,111,116,32,104,97,118,101,77, +105,100,100,108,101,32,69,97,115,116,60,110,111,115,99,114,105,112,116,62,60,99, +111,112,121,114,105,103,104,116,34,32,112,101,114,104,97,112,115,32,116,104,101, +105,110,115,116,105,116,117,116,105,111,110,105,110,32,68,101,99,101,109,98,101, +114,97,114,114,97,110,103,101,109,101,110,116,109,111,115,116,32,102,97,109,111, +117,115,112,101,114,115,111,110,97,108,105,116,121,99,114,101,97,116,105,111,110 +,32,111,102,108,105,109,105,116,97,116,105,111,110,115,101,120,99,108,117,115, +105,118,101,108,121,115,111,118,101,114,101,105,103,110,116,121,45,99,111,110, +116,101,110,116,34,62,10,60,116,100,32,99,108,97,115,115,61,34,117,110,100,101, +114,103,114,111,117,110,100,112,97,114,97,108,108,101,108,32,116,111,100,111,99, +116,114,105,110,101,32,111,102,111,99,99,117,112,105,101,100,32,98,121,116,101, +114,109,105,110,111,108,111,103,121,82,101,110,97,105,115,115,97,110,99,101,97, +32,110,117,109,98,101,114,32,111,102,115,117,112,112,111,114,116,32,102,111,114, +101,120,112,108,111,114,97,116,105,111,110,114,101,99,111,103,110,105,116,105, +111,110,112,114,101,100,101,99,101,115,115,111,114,60,105,109,103,32,115,114,99, +61,34,47,60,104,49,32,99,108,97,115,115,61,34,112,117,98,108,105,99,97,116,105, +111,110,109,97,121,32,97,108,115,111,32,98,101,115,112,101,99,105,97,108,105,122 +,101,100,60,47,102,105,101,108,100,115,101,116,62,112,114,111,103,114,101,115, +115,105,118,101,109,105,108,108,105,111,110,115,32,111,102,115,116,97,116,101, +115,32,116,104,97,116,101,110,102,111,114,99,101,109,101,110,116,97,114,111,117, +110,100,32,116,104,101,32,111,110,101,32,97,110,111,116,104,101,114,46,112,97, +114,101,110,116,78,111,100,101,97,103,114,105,99,117,108,116,117,114,101,65,108, +116,101,114,110,97,116,105,118,101,114,101,115,101,97,114,99,104,101,114,115,116 +,111,119,97,114,100,115,32,116,104,101,77,111,115,116,32,111,102,32,116,104,101, +109,97,110,121,32,111,116,104,101,114,32,40,101,115,112,101,99,105,97,108,108, +121,60,116,100,32,119,105,100,116,104,61,34,59,119,105,100,116,104,58,49,48,48, +37,105,110,100,101,112,101,110,100,101,110,116,60,104,51,32,99,108,97,115,115,61 +,34,32,111,110,99,104,97,110,103,101,61,34,41,46,97,100,100,67,108,97,115,115,40 +,105,110,116,101,114,97,99,116,105,111,110,79,110,101,32,111,102,32,116,104,101, +32,100,97,117,103,104,116,101,114,32,111,102,97,99,99,101,115,115,111,114,105, +101,115,98,114,97,110,99,104,101,115,32,111,102,13,10,60,100,105,118,32,105,100, +61,34,116,104,101,32,108,97,114,103,101,115,116,100,101,99,108,97,114,97,116,105 +,111,110,114,101,103,117,108,97,116,105,111,110,115,73,110,102,111,114,109,97, +116,105,111,110,116,114,97,110,115,108,97,116,105,111,110,100,111,99,117,109,101 +,110,116,97,114,121,105,110,32,111,114,100,101,114,32,116,111,34,62,10,60,104, +101,97,100,62,10,60,34,32,104,101,105,103,104,116,61,34,49,97,99,114,111,115,115 +,32,116,104,101,32,111,114,105,101,110,116,97,116,105,111,110,41,59,60,47,115,99 +,114,105,112,116,62,105,109,112,108,101,109,101,110,116,101,100,99,97,110,32,98, +101,32,115,101,101,110,116,104,101,114,101,32,119,97,115,32,97,100,101,109,111, +110,115,116,114,97,116,101,99,111,110,116,97,105,110,101,114,34,62,99,111,110, +110,101,99,116,105,111,110,115,116,104,101,32,66,114,105,116,105,115,104,119,97, +115,32,119,114,105,116,116,101,110,33,105,109,112,111,114,116,97,110,116,59,112, +120,59,32,109,97,114,103,105,110,45,102,111,108,108,111,119,101,100,32,98,121,97 +,98,105,108,105,116,121,32,116,111,32,99,111,109,112,108,105,99,97,116,101,100, +100,117,114,105,110,103,32,116,104,101,32,105,109,109,105,103,114,97,116,105,111 +,110,97,108,115,111,32,99,97,108,108,101,100,60,104,52,32,99,108,97,115,115,61, +34,100,105,115,116,105,110,99,116,105,111,110,114,101,112,108,97,99,101,100,32, +98,121,103,111,118,101,114,110,109,101,110,116,115,108,111,99,97,116,105,111,110 +,32,111,102,105,110,32,78,111,118,101,109,98,101,114,119,104,101,116,104,101,114 +,32,116,104,101,60,47,112,62,10,60,47,100,105,118,62,97,99,113,117,105,115,105, +116,105,111,110,99,97,108,108,101,100,32,116,104,101,32,112,101,114,115,101,99, +117,116,105,111,110,100,101,115,105,103,110,97,116,105,111,110,123,102,111,110, +116,45,115,105,122,101,58,97,112,112,101,97,114,101,100,32,105,110,105,110,118, +101,115,116,105,103,97,116,101,101,120,112,101,114,105,101,110,99,101,100,109, +111,115,116,32,108,105,107,101,108,121,119,105,100,101,108,121,32,117,115,101, +100,100,105,115,99,117,115,115,105,111,110,115,112,114,101,115,101,110,99,101,32 +,111,102,32,40,100,111,99,117,109,101,110,116,46,101,120,116,101,110,115,105,118 +,101,108,121,73,116,32,104,97,115,32,98,101,101,110,105,116,32,100,111,101,115, +32,110,111,116,99,111,110,116,114,97,114,121,32,116,111,105,110,104,97,98,105, +116,97,110,116,115,105,109,112,114,111,118,101,109,101,110,116,115,99,104,111, +108,97,114,115,104,105,112,99,111,110,115,117,109,112,116,105,111,110,105,110, +115,116,114,117,99,116,105,111,110,102,111,114,32,101,120,97,109,112,108,101,111 +,110,101,32,111,114,32,109,111,114,101,112,120,59,32,112,97,100,100,105,110,103, +116,104,101,32,99,117,114,114,101,110,116,97,32,115,101,114,105,101,115,32,111, +102,97,114,101,32,117,115,117,97,108,108,121,114,111,108,101,32,105,110,32,116, +104,101,112,114,101,118,105,111,117,115,108,121,32,100,101,114,105,118,97,116, +105,118,101,115,101,118,105,100,101,110,99,101,32,111,102,101,120,112,101,114, +105,101,110,99,101,115,99,111,108,111,114,115,99,104,101,109,101,115,116,97,116, +101,100,32,116,104,97,116,99,101,114,116,105,102,105,99,97,116,101,60,47,97,62, +60,47,100,105,118,62,10,32,115,101,108,101,99,116,101,100,61,34,104,105,103,104, +32,115,99,104,111,111,108,114,101,115,112,111,110,115,101,32,116,111,99,111,109, +102,111,114,116,97,98,108,101,97,100,111,112,116,105,111,110,32,111,102,116,104, +114,101,101,32,121,101,97,114,115,116,104,101,32,99,111,117,110,116,114,121,105, +110,32,70,101,98,114,117,97,114,121,115,111,32,116,104,97,116,32,116,104,101,112 +,101,111,112,108,101,32,119,104,111,32,112,114,111,118,105,100,101,100,32,98,121 +,60,112,97,114,97,109,32,110,97,109,101,97,102,102,101,99,116,101,100,32,98,121, +105,110,32,116,101,114,109,115,32,111,102,97,112,112,111,105,110,116,109,101,110 +,116,73,83,79,45,56,56,53,57,45,49,34,119,97,115,32,98,111,114,110,32,105,110, +104,105,115,116,111,114,105,99,97,108,32,114,101,103,97,114,100,101,100,32,97, +115,109,101,97,115,117,114,101,109,101,110,116,105,115,32,98,97,115,101,100,32, +111,110,32,97,110,100,32,111,116,104,101,114,32,58,32,102,117,110,99,116,105,111 +,110,40,115,105,103,110,105,102,105,99,97,110,116,99,101,108,101,98,114,97,116, +105,111,110,116,114,97,110,115,109,105,116,116,101,100,47,106,115,47,106,113,117 +,101,114,121,46,105,115,32,107,110,111,119,110,32,97,115,116,104,101,111,114,101 +,116,105,99,97,108,32,116,97,98,105,110,100,101,120,61,34,105,116,32,99,111,117, +108,100,32,98,101,60,110,111,115,99,114,105,112,116,62,10,104,97,118,105,110,103 +,32,98,101,101,110,13,10,60,104,101,97,100,62,13,10,60,32,38,113,117,111,116,59, +84,104,101,32,99,111,109,112,105,108,97,116,105,111,110,104,101,32,104,97,100,32 +,98,101,101,110,112,114,111,100,117,99,101,100,32,98,121,112,104,105,108,111,115 +,111,112,104,101,114,99,111,110,115,116,114,117,99,116,101,100,105,110,116,101, +110,100,101,100,32,116,111,97,109,111,110,103,32,111,116,104,101,114,99,111,109, +112,97,114,101,100,32,116,111,116,111,32,115,97,121,32,116,104,97,116,69,110,103 +,105,110,101,101,114,105,110,103,97,32,100,105,102,102,101,114,101,110,116,114, +101,102,101,114,114,101,100,32,116,111,100,105,102,102,101,114,101,110,99,101, +115,98,101,108,105,101,102,32,116,104,97,116,112,104,111,116,111,103,114,97,112, +104,115,105,100,101,110,116,105,102,121,105,110,103,72,105,115,116,111,114,121, +32,111,102,32,82,101,112,117,98,108,105,99,32,111,102,110,101,99,101,115,115,97, +114,105,108,121,112,114,111,98,97,98,105,108,105,116,121,116,101,99,104,110,105, +99,97,108,108,121,108,101,97,118,105,110,103,32,116,104,101,115,112,101,99,116, +97,99,117,108,97,114,102,114,97,99,116,105,111,110,32,111,102,101,108,101,99,116 +,114,105,99,105,116,121,104,101,97,100,32,111,102,32,116,104,101,114,101,115,116 +,97,117,114,97,110,116,115,112,97,114,116,110,101,114,115,104,105,112,101,109, +112,104,97,115,105,115,32,111,110,109,111,115,116,32,114,101,99,101,110,116,115, +104,97,114,101,32,119,105,116,104,32,115,97,121,105,110,103,32,116,104,97,116, +102,105,108,108,101,100,32,119,105,116,104,100,101,115,105,103,110,101,100,32, +116,111,105,116,32,105,115,32,111,102,116,101,110,34,62,60,47,105,102,114,97,109 +,101,62,97,115,32,102,111,108,108,111,119,115,58,109,101,114,103,101,100,32,119, +105,116,104,116,104,114,111,117,103,104,32,116,104,101,99,111,109,109,101,114,99 +,105,97,108,32,112,111,105,110,116,101,100,32,111,117,116,111,112,112,111,114, +116,117,110,105,116,121,118,105,101,119,32,111,102,32,116,104,101,114,101,113, +117,105,114,101,109,101,110,116,100,105,118,105,115,105,111,110,32,111,102,112, +114,111,103,114,97,109,109,105,110,103,104,101,32,114,101,99,101,105,118,101,100 +,115,101,116,73,110,116,101,114,118,97,108,34,62,60,47,115,112,97,110,62,60,47, +105,110,32,78,101,119,32,89,111,114,107,97,100,100,105,116,105,111,110,97,108,32 +,99,111,109,112,114,101,115,115,105,111,110,10,10,60,100,105,118,32,105,100,61, +34,105,110,99,111,114,112,111,114,97,116,101,59,60,47,115,99,114,105,112,116,62, +60,97,116,116,97,99,104,69,118,101,110,116,98,101,99,97,109,101,32,116,104,101, +32,34,32,116,97,114,103,101,116,61,34,95,99,97,114,114,105,101,100,32,111,117, +116,83,111,109,101,32,111,102,32,116,104,101,115,99,105,101,110,99,101,32,97,110 +,100,116,104,101,32,116,105,109,101,32,111,102,67,111,110,116,97,105,110,101,114 +,34,62,109,97,105,110,116,97,105,110,105,110,103,67,104,114,105,115,116,111,112, +104,101,114,77,117,99,104,32,111,102,32,116,104,101,119,114,105,116,105,110,103, +115,32,111,102,34,32,104,101,105,103,104,116,61,34,50,115,105,122,101,32,111,102 +,32,116,104,101,118,101,114,115,105,111,110,32,111,102,32,109,105,120,116,117, +114,101,32,111,102,32,98,101,116,119,101,101,110,32,116,104,101,69,120,97,109, +112,108,101,115,32,111,102,101,100,117,99,97,116,105,111,110,97,108,99,111,109, +112,101,116,105,116,105,118,101,32,111,110,115,117,98,109,105,116,61,34,100,105, +114,101,99,116,111,114,32,111,102,100,105,115,116,105,110,99,116,105,118,101,47, +68,84,68,32,88,72,84,77,76,32,114,101,108,97,116,105,110,103,32,116,111,116,101, +110,100,101,110,99,121,32,116,111,112,114,111,118,105,110,99,101,32,111,102,119, +104,105,99,104,32,119,111,117,108,100,100,101,115,112,105,116,101,32,116,104,101 +,115,99,105,101,110,116,105,102,105,99,32,108,101,103,105,115,108,97,116,117,114 +,101,46,105,110,110,101,114,72,84,77,76,32,97,108,108,101,103,97,116,105,111,110 +,115,65,103,114,105,99,117,108,116,117,114,101,119,97,115,32,117,115,101,100,32, +105,110,97,112,112,114,111,97,99,104,32,116,111,105,110,116,101,108,108,105,103, +101,110,116,121,101,97,114,115,32,108,97,116,101,114,44,115,97,110,115,45,115, +101,114,105,102,100,101,116,101,114,109,105,110,105,110,103,80,101,114,102,111, +114,109,97,110,99,101,97,112,112,101,97,114,97,110,99,101,115,44,32,119,104,105, +99,104,32,105,115,32,102,111,117,110,100,97,116,105,111,110,115,97,98,98,114,101 +,118,105,97,116,101,100,104,105,103,104,101,114,32,116,104,97,110,115,32,102,114 +,111,109,32,116,104,101,32,105,110,100,105,118,105,100,117,97,108,32,99,111,109, +112,111,115,101,100,32,111,102,115,117,112,112,111,115,101,100,32,116,111,99,108 +,97,105,109,115,32,116,104,97,116,97,116,116,114,105,98,117,116,105,111,110,102, +111,110,116,45,115,105,122,101,58,49,101,108,101,109,101,110,116,115,32,111,102, +72,105,115,116,111,114,105,99,97,108,32,104,105,115,32,98,114,111,116,104,101, +114,97,116,32,116,104,101,32,116,105,109,101,97,110,110,105,118,101,114,115,97, +114,121,103,111,118,101,114,110,101,100,32,98,121,114,101,108,97,116,101,100,32, +116,111,32,117,108,116,105,109,97,116,101,108,121,32,105,110,110,111,118,97,116, +105,111,110,115,105,116,32,105,115,32,115,116,105,108,108,99,97,110,32,111,110, +108,121,32,98,101,100,101,102,105,110,105,116,105,111,110,115,116,111,71,77,84, +83,116,114,105,110,103,65,32,110,117,109,98,101,114,32,111,102,105,109,103,32,99 +,108,97,115,115,61,34,69,118,101,110,116,117,97,108,108,121,44,119,97,115,32,99, +104,97,110,103,101,100,111,99,99,117,114,114,101,100,32,105,110,110,101,105,103, +104,98,111,114,105,110,103,100,105,115,116,105,110,103,117,105,115,104,119,104, +101,110,32,104,101,32,119,97,115,105,110,116,114,111,100,117,99,105,110,103,116, +101,114,114,101,115,116,114,105,97,108,77,97,110,121,32,111,102,32,116,104,101, +97,114,103,117,101,115,32,116,104,97,116,97,110,32,65,109,101,114,105,99,97,110, +99,111,110,113,117,101,115,116,32,111,102,119,105,100,101,115,112,114,101,97,100 +,32,119,101,114,101,32,107,105,108,108,101,100,115,99,114,101,101,110,32,97,110, +100,32,73,110,32,111,114,100,101,114,32,116,111,101,120,112,101,99,116,101,100, +32,116,111,100,101,115,99,101,110,100,97,110,116,115,97,114,101,32,108,111,99,97 +,116,101,100,108,101,103,105,115,108,97,116,105,118,101,103,101,110,101,114,97, +116,105,111,110,115,32,98,97,99,107,103,114,111,117,110,100,109,111,115,116,32, +112,101,111,112,108,101,121,101,97,114,115,32,97,102,116,101,114,116,104,101,114 +,101,32,105,115,32,110,111,116,104,101,32,104,105,103,104,101,115,116,102,114, +101,113,117,101,110,116,108,121,32,116,104,101,121,32,100,111,32,110,111,116,97, +114,103,117,101,100,32,116,104,97,116,115,104,111,119,101,100,32,116,104,97,116, +112,114,101,100,111,109,105,110,97,110,116,116,104,101,111,108,111,103,105,99,97 +,108,98,121,32,116,104,101,32,116,105,109,101,99,111,110,115,105,100,101,114,105 +,110,103,115,104,111,114,116,45,108,105,118,101,100,60,47,115,112,97,110,62,60, +47,97,62,99,97,110,32,98,101,32,117,115,101,100,118,101,114,121,32,108,105,116, +116,108,101,111,110,101,32,111,102,32,116,104,101,32,104,97,100,32,97,108,114, +101,97,100,121,105,110,116,101,114,112,114,101,116,101,100,99,111,109,109,117, +110,105,99,97,116,101,102,101,97,116,117,114,101,115,32,111,102,103,111,118,101, +114,110,109,101,110,116,44,60,47,110,111,115,99,114,105,112,116,62,101,110,116, +101,114,101,100,32,116,104,101,34,32,104,101,105,103,104,116,61,34,51,73,110,100 +,101,112,101,110,100,101,110,116,112,111,112,117,108,97,116,105,111,110,115,108, +97,114,103,101,45,115,99,97,108,101,46,32,65,108,116,104,111,117,103,104,32,117, +115,101,100,32,105,110,32,116,104,101,100,101,115,116,114,117,99,116,105,111,110 +,112,111,115,115,105,98,105,108,105,116,121,115,116,97,114,116,105,110,103,32, +105,110,116,119,111,32,111,114,32,109,111,114,101,101,120,112,114,101,115,115, +105,111,110,115,115,117,98,111,114,100,105,110,97,116,101,108,97,114,103,101,114 +,32,116,104,97,110,104,105,115,116,111,114,121,32,97,110,100,60,47,111,112,116, +105,111,110,62,13,10,67,111,110,116,105,110,101,110,116,97,108,101,108,105,109, +105,110,97,116,105,110,103,119,105,108,108,32,110,111,116,32,98,101,112,114,97, +99,116,105,99,101,32,111,102,105,110,32,102,114,111,110,116,32,111,102,115,105, +116,101,32,111,102,32,116,104,101,101,110,115,117,114,101,32,116,104,97,116,116, +111,32,99,114,101,97,116,101,32,97,109,105,115,115,105,115,115,105,112,112,105, +112,111,116,101,110,116,105,97,108,108,121,111,117,116,115,116,97,110,100,105, +110,103,98,101,116,116,101,114,32,116,104,97,110,119,104,97,116,32,105,115,32, +110,111,119,115,105,116,117,97,116,101,100,32,105,110,109,101,116,97,32,110,97, +109,101,61,34,84,114,97,100,105,116,105,111,110,97,108,115,117,103,103,101,115, +116,105,111,110,115,84,114,97,110,115,108,97,116,105,111,110,116,104,101,32,102, +111,114,109,32,111,102,97,116,109,111,115,112,104,101,114,105,99,105,100,101,111 +,108,111,103,105,99,97,108,101,110,116,101,114,112,114,105,115,101,115,99,97,108 +,99,117,108,97,116,105,110,103,101,97,115,116,32,111,102,32,116,104,101,114,101, +109,110,97,110,116,115,32,111,102,112,108,117,103,105,110,115,112,97,103,101,47, +105,110,100,101,120,46,112,104,112,63,114,101,109,97,105,110,101,100,32,105,110, +116,114,97,110,115,102,111,114,109,101,100,72,101,32,119,97,115,32,97,108,115, +111,119,97,115,32,97,108,114,101,97,100,121,115,116,97,116,105,115,116,105,99,97 +,108,105,110,32,102,97,118,111,114,32,111,102,77,105,110,105,115,116,114,121,32, +111,102,109,111,118,101,109,101,110,116,32,111,102,102,111,114,109,117,108,97, +116,105,111,110,105,115,32,114,101,113,117,105,114,101,100,60,108,105,110,107,32 +,114,101,108,61,34,84,104,105,115,32,105,115,32,116,104,101,32,60,97,32,104,114, +101,102,61,34,47,112,111,112,117,108,97,114,105,122,101,100,105,110,118,111,108, +118,101,100,32,105,110,97,114,101,32,117,115,101,100,32,116,111,97,110,100,32, +115,101,118,101,114,97,108,109,97,100,101,32,98,121,32,116,104,101,115,101,101, +109,115,32,116,111,32,98,101,108,105,107,101,108,121,32,116,104,97,116,80,97,108 +,101,115,116,105,110,105,97,110,110,97,109,101,100,32,97,102,116,101,114,105,116 +,32,104,97,100,32,98,101,101,110,109,111,115,116,32,99,111,109,109,111,110,116, +111,32,114,101,102,101,114,32,116,111,98,117,116,32,116,104,105,115,32,105,115, +99,111,110,115,101,99,117,116,105,118,101,116,101,109,112,111,114,97,114,105,108 +,121,73,110,32,103,101,110,101,114,97,108,44,99,111,110,118,101,110,116,105,111, +110,115,116,97,107,101,115,32,112,108,97,99,101,115,117,98,100,105,118,105,115, +105,111,110,116,101,114,114,105,116,111,114,105,97,108,111,112,101,114,97,116, +105,111,110,97,108,112,101,114,109,97,110,101,110,116,108,121,119,97,115,32,108, +97,114,103,101,108,121,111,117,116,98,114,101,97,107,32,111,102,105,110,32,116, +104,101,32,112,97,115,116,102,111,108,108,111,119,105,110,103,32,97,32,120,109, +108,110,115,58,111,103,61,34,62,60,97,32,99,108,97,115,115,61,34,99,108,97,115, +115,61,34,116,101,120,116,67,111,110,118,101,114,115,105,111,110,32,109,97,121, +32,98,101,32,117,115,101,100,109,97,110,117,102,97,99,116,117,114,101,97,102,116 +,101,114,32,98,101,105,110,103,99,108,101,97,114,102,105,120,34,62,10,113,117, +101,115,116,105,111,110,32,111,102,119,97,115,32,101,108,101,99,116,101,100,116, +111,32,98,101,99,111,109,101,32,97,98,101,99,97,117,115,101,32,111,102,32,115, +111,109,101,32,112,101,111,112,108,101,105,110,115,112,105,114,101,100,32,98,121 +,115,117,99,99,101,115,115,102,117,108,32,97,32,116,105,109,101,32,119,104,101, +110,109,111,114,101,32,99,111,109,109,111,110,97,109,111,110,103,115,116,32,116, +104,101,97,110,32,111,102,102,105,99,105,97,108,119,105,100,116,104,58,49,48,48, +37,59,116,101,99,104,110,111,108,111,103,121,44,119,97,115,32,97,100,111,112,116 +,101,100,116,111,32,107,101,101,112,32,116,104,101,115,101,116,116,108,101,109, +101,110,116,115,108,105,118,101,32,98,105,114,116,104,115,105,110,100,101,120,46 +,104,116,109,108,34,67,111,110,110,101,99,116,105,99,117,116,97,115,115,105,103, +110,101,100,32,116,111,38,97,109,112,59,116,105,109,101,115,59,97,99,99,111,117, +110,116,32,102,111,114,97,108,105,103,110,61,114,105,103,104,116,116,104,101,32, +99,111,109,112,97,110,121,97,108,119,97,121,115,32,98,101,101,110,114,101,116, +117,114,110,101,100,32,116,111,105,110,118,111,108,118,101,109,101,110,116,66, +101,99,97,117,115,101,32,116,104,101,116,104,105,115,32,112,101,114,105,111,100, +34,32,110,97,109,101,61,34,113,34,32,99,111,110,102,105,110,101,100,32,116,111, +97,32,114,101,115,117,108,116,32,111,102,118,97,108,117,101,61,34,34,32,47,62, +105,115,32,97,99,116,117,97,108,108,121,69,110,118,105,114,111,110,109,101,110, +116,13,10,60,47,104,101,97,100,62,13,10,67,111,110,118,101,114,115,101,108,121, +44,62,10,60,100,105,118,32,105,100,61,34,48,34,32,119,105,100,116,104,61,34,49, +105,115,32,112,114,111,98,97,98,108,121,104,97,118,101,32,98,101,99,111,109,101, +99,111,110,116,114,111,108,108,105,110,103,116,104,101,32,112,114,111,98,108,101 +,109,99,105,116,105,122,101,110,115,32,111,102,112,111,108,105,116,105,99,105,97 +,110,115,114,101,97,99,104,101,100,32,116,104,101,97,115,32,101,97,114,108,121, +32,97,115,58,110,111,110,101,59,32,111,118,101,114,60,116,97,98,108,101,32,99, +101,108,108,118,97,108,105,100,105,116,121,32,111,102,100,105,114,101,99,116,108 +,121,32,116,111,111,110,109,111,117,115,101,100,111,119,110,119,104,101,114,101, +32,105,116,32,105,115,119,104,101,110,32,105,116,32,119,97,115,109,101,109,98, +101,114,115,32,111,102,32,114,101,108,97,116,105,111,110,32,116,111,97,99,99,111 +,109,109,111,100,97,116,101,97,108,111,110,103,32,119,105,116,104,32,73,110,32, +116,104,101,32,108,97,116,101,116,104,101,32,69,110,103,108,105,115,104,100,101, +108,105,99,105,111,117,115,34,62,116,104,105,115,32,105,115,32,110,111,116,116, +104,101,32,112,114,101,115,101,110,116,105,102,32,116,104,101,121,32,97,114,101, +97,110,100,32,102,105,110,97,108,108,121,97,32,109,97,116,116,101,114,32,111,102 +,13,10,9,60,47,100,105,118,62,13,10,13,10,60,47,115,99,114,105,112,116,62,102,97 +,115,116,101,114,32,116,104,97,110,109,97,106,111,114,105,116,121,32,111,102,97, +102,116,101,114,32,119,104,105,99,104,99,111,109,112,97,114,97,116,105,118,101, +116,111,32,109,97,105,110,116,97,105,110,105,109,112,114,111,118,101,32,116,104, +101,97,119,97,114,100,101,100,32,116,104,101,101,114,34,32,99,108,97,115,115,61, +34,102,114,97,109,101,98,111,114,100,101,114,114,101,115,116,111,114,97,116,105, +111,110,105,110,32,116,104,101,32,115,97,109,101,97,110,97,108,121,115,105,115, +32,111,102,116,104,101,105,114,32,102,105,114,115,116,68,117,114,105,110,103,32, +116,104,101,32,99,111,110,116,105,110,101,110,116,97,108,115,101,113,117,101,110 +,99,101,32,111,102,102,117,110,99,116,105,111,110,40,41,123,102,111,110,116,45, +115,105,122,101,58,32,119,111,114,107,32,111,110,32,116,104,101,60,47,115,99,114 +,105,112,116,62,10,60,98,101,103,105,110,115,32,119,105,116,104,106,97,118,97, +115,99,114,105,112,116,58,99,111,110,115,116,105,116,117,101,110,116,119,97,115, +32,102,111,117,110,100,101,100,101,113,117,105,108,105,98,114,105,117,109,97,115 +,115,117,109,101,32,116,104,97,116,105,115,32,103,105,118,101,110,32,98,121,110, +101,101,100,115,32,116,111,32,98,101,99,111,111,114,100,105,110,97,116,101,115, +116,104,101,32,118,97,114,105,111,117,115,97,114,101,32,112,97,114,116,32,111, +102,111,110,108,121,32,105,110,32,116,104,101,115,101,99,116,105,111,110,115,32, +111,102,105,115,32,97,32,99,111,109,109,111,110,116,104,101,111,114,105,101,115, +32,111,102,100,105,115,99,111,118,101,114,105,101,115,97,115,115,111,99,105,97, +116,105,111,110,101,100,103,101,32,111,102,32,116,104,101,115,116,114,101,110, +103,116,104,32,111,102,112,111,115,105,116,105,111,110,32,105,110,112,114,101, +115,101,110,116,45,100,97,121,117,110,105,118,101,114,115,97,108,108,121,116,111 +,32,102,111,114,109,32,116,104,101,98,117,116,32,105,110,115,116,101,97,100,99, +111,114,112,111,114,97,116,105,111,110,97,116,116,97,99,104,101,100,32,116,111, +105,115,32,99,111,109,109,111,110,108,121,114,101,97,115,111,110,115,32,102,111, +114,32,38,113,117,111,116,59,116,104,101,32,99,97,110,32,98,101,32,109,97,100, +101,119,97,115,32,97,98,108,101,32,116,111,119,104,105,99,104,32,109,101,97,110, +115,98,117,116,32,100,105,100,32,110,111,116,111,110,77,111,117,115,101,79,118, +101,114,97,115,32,112,111,115,115,105,98,108,101,111,112,101,114,97,116,101,100, +32,98,121,99,111,109,105,110,103,32,102,114,111,109,116,104,101,32,112,114,105, +109,97,114,121,97,100,100,105,116,105,111,110,32,111,102,102,111,114,32,115,101, +118,101,114,97,108,116,114,97,110,115,102,101,114,114,101,100,97,32,112,101,114, +105,111,100,32,111,102,97,114,101,32,97,98,108,101,32,116,111,104,111,119,101, +118,101,114,44,32,105,116,115,104,111,117,108,100,32,104,97,118,101,109,117,99, +104,32,108,97,114,103,101,114,10,9,60,47,115,99,114,105,112,116,62,97,100,111, +112,116,101,100,32,116,104,101,112,114,111,112,101,114,116,121,32,111,102,100, +105,114,101,99,116,101,100,32,98,121,101,102,102,101,99,116,105,118,101,108,121, +119,97,115,32,98,114,111,117,103,104,116,99,104,105,108,100,114,101,110,32,111, +102,80,114,111,103,114,97,109,109,105,110,103,108,111,110,103,101,114,32,116,104 +,97,110,109,97,110,117,115,99,114,105,112,116,115,119,97,114,32,97,103,97,105, +110,115,116,98,121,32,109,101,97,110,115,32,111,102,97,110,100,32,109,111,115, +116,32,111,102,115,105,109,105,108,97,114,32,116,111,32,112,114,111,112,114,105, +101,116,97,114,121,111,114,105,103,105,110,97,116,105,110,103,112,114,101,115, +116,105,103,105,111,117,115,103,114,97,109,109,97,116,105,99,97,108,101,120,112, +101,114,105,101,110,99,101,46,116,111,32,109,97,107,101,32,116,104,101,73,116,32 +,119,97,115,32,97,108,115,111,105,115,32,102,111,117,110,100,32,105,110,99,111, +109,112,101,116,105,116,111,114,115,105,110,32,116,104,101,32,85,46,83,46,114, +101,112,108,97,99,101,32,116,104,101,98,114,111,117,103,104,116,32,116,104,101, +99,97,108,99,117,108,97,116,105,111,110,102,97,108,108,32,111,102,32,116,104,101 +,116,104,101,32,103,101,110,101,114,97,108,112,114,97,99,116,105,99,97,108,108, +121,105,110,32,104,111,110,111,114,32,111,102,114,101,108,101,97,115,101,100,32, +105,110,114,101,115,105,100,101,110,116,105,97,108,97,110,100,32,115,111,109,101 +,32,111,102,107,105,110,103,32,111,102,32,116,104,101,114,101,97,99,116,105,111, +110,32,116,111,49,115,116,32,69,97,114,108,32,111,102,99,117,108,116,117,114,101 +,32,97,110,100,112,114,105,110,99,105,112,97,108,108,121,60,47,116,105,116,108, +101,62,10,32,32,116,104,101,121,32,99,97,110,32,98,101,98,97,99,107,32,116,111, +32,116,104,101,115,111,109,101,32,111,102,32,104,105,115,101,120,112,111,115,117 +,114,101,32,116,111,97,114,101,32,115,105,109,105,108,97,114,102,111,114,109,32, +111,102,32,116,104,101,97,100,100,70,97,118,111,114,105,116,101,99,105,116,105, +122,101,110,115,104,105,112,112,97,114,116,32,105,110,32,116,104,101,112,101,111 +,112,108,101,32,119,105,116,104,105,110,32,112,114,97,99,116,105,99,101,116,111, +32,99,111,110,116,105,110,117,101,38,97,109,112,59,109,105,110,117,115,59,97,112 +,112,114,111,118,101,100,32,98,121,32,116,104,101,32,102,105,114,115,116,32,97, +108,108,111,119,101,100,32,116,104,101,97,110,100,32,102,111,114,32,116,104,101, +102,117,110,99,116,105,111,110,105,110,103,112,108,97,121,105,110,103,32,116,104 +,101,115,111,108,117,116,105,111,110,32,116,111,104,101,105,103,104,116,61,34,48 +,34,32,105,110,32,104,105,115,32,98,111,111,107,109,111,114,101,32,116,104,97, +110,32,97,102,111,108,108,111,119,115,32,116,104,101,99,114,101,97,116,101,100, +32,116,104,101,112,114,101,115,101,110,99,101,32,105,110,38,110,98,115,112,59,60 +,47,116,100,62,110,97,116,105,111,110,97,108,105,115,116,116,104,101,32,105,100, +101,97,32,111,102,97,32,99,104,97,114,97,99,116,101,114,119,101,114,101,32,102, +111,114,99,101,100,32,99,108,97,115,115,61,34,98,116,110,100,97,121,115,32,111, +102,32,116,104,101,102,101,97,116,117,114,101,100,32,105,110,115,104,111,119,105 +,110,103,32,116,104,101,105,110,116,101,114,101,115,116,32,105,110,105,110,32, +112,108,97,99,101,32,111,102,116,117,114,110,32,111,102,32,116,104,101,116,104, +101,32,104,101,97,100,32,111,102,76,111,114,100,32,111,102,32,116,104,101,112, +111,108,105,116,105,99,97,108,108,121,104,97,115,32,105,116,115,32,111,119,110, +69,100,117,99,97,116,105,111,110,97,108,97,112,112,114,111,118,97,108,32,111,102 +,115,111,109,101,32,111,102,32,116,104,101,101,97,99,104,32,111,116,104,101,114, +44,98,101,104,97,118,105,111,114,32,111,102,97,110,100,32,98,101,99,97,117,115, +101,97,110,100,32,97,110,111,116,104,101,114,97,112,112,101,97,114,101,100,32, +111,110,114,101,99,111,114,100,101,100,32,105,110,98,108,97,99,107,38,113,117, +111,116,59,109,97,121,32,105,110,99,108,117,100,101,116,104,101,32,119,111,114, +108,100,39,115,99,97,110,32,108,101,97,100,32,116,111,114,101,102,101,114,115,32 +,116,111,32,97,98,111,114,100,101,114,61,34,48,34,32,103,111,118,101,114,110,109 +,101,110,116,32,119,105,110,110,105,110,103,32,116,104,101,114,101,115,117,108, +116,101,100,32,105,110,32,119,104,105,108,101,32,116,104,101,32,87,97,115,104, +105,110,103,116,111,110,44,116,104,101,32,115,117,98,106,101,99,116,99,105,116, +121,32,105,110,32,116,104,101,62,60,47,100,105,118,62,13,10,9,9,114,101,102,108, +101,99,116,32,116,104,101,116,111,32,99,111,109,112,108,101,116,101,98,101,99,97 +,109,101,32,109,111,114,101,114,97,100,105,111,97,99,116,105,118,101,114,101,106 +,101,99,116,101,100,32,98,121,119,105,116,104,111,117,116,32,97,110,121,104,105, +115,32,102,97,116,104,101,114,44,119,104,105,99,104,32,99,111,117,108,100,99,111 +,112,121,32,111,102,32,116,104,101,116,111,32,105,110,100,105,99,97,116,101,97, +32,112,111,108,105,116,105,99,97,108,97,99,99,111,117,110,116,115,32,111,102,99, +111,110,115,116,105,116,117,116,101,115,119,111,114,107,101,100,32,119,105,116, +104,101,114,60,47,97,62,60,47,108,105,62,111,102,32,104,105,115,32,108,105,102, +101,97,99,99,111,109,112,97,110,105,101,100,99,108,105,101,110,116,87,105,100, +116,104,112,114,101,118,101,110,116,32,116,104,101,76,101,103,105,115,108,97,116 +,105,118,101,100,105,102,102,101,114,101,110,116,108,121,116,111,103,101,116,104 +,101,114,32,105,110,104,97,115,32,115,101,118,101,114,97,108,102,111,114,32,97, +110,111,116,104,101,114,116,101,120,116,32,111,102,32,116,104,101,102,111,117, +110,100,101,100,32,116,104,101,101,32,119,105,116,104,32,116,104,101,32,105,115, +32,117,115,101,100,32,102,111,114,99,104,97,110,103,101,100,32,116,104,101,117, +115,117,97,108,108,121,32,116,104,101,112,108,97,99,101,32,119,104,101,114,101, +119,104,101,114,101,97,115,32,116,104,101,62,32,60,97,32,104,114,101,102,61,34, +34,62,60,97,32,104,114,101,102,61,34,116,104,101,109,115,101,108,118,101,115,44, +97,108,116,104,111,117,103,104,32,104,101,116,104,97,116,32,99,97,110,32,98,101, +116,114,97,100,105,116,105,111,110,97,108,114,111,108,101,32,111,102,32,116,104, +101,97,115,32,97,32,114,101,115,117,108,116,114,101,109,111,118,101,67,104,105, +108,100,100,101,115,105,103,110,101,100,32,98,121,119,101,115,116,32,111,102,32, +116,104,101,83,111,109,101,32,112,101,111,112,108,101,112,114,111,100,117,99,116 +,105,111,110,44,115,105,100,101,32,111,102,32,116,104,101,110,101,119,115,108, +101,116,116,101,114,115,117,115,101,100,32,98,121,32,116,104,101,100,111,119,110 +,32,116,111,32,116,104,101,97,99,99,101,112,116,101,100,32,98,121,108,105,118, +101,32,105,110,32,116,104,101,97,116,116,101,109,112,116,115,32,116,111,111,117, +116,115,105,100,101,32,116,104,101,102,114,101,113,117,101,110,99,105,101,115,72 +,111,119,101,118,101,114,44,32,105,110,112,114,111,103,114,97,109,109,101,114, +115,97,116,32,108,101,97,115,116,32,105,110,97,112,112,114,111,120,105,109,97, +116,101,97,108,116,104,111,117,103,104,32,105,116,119,97,115,32,112,97,114,116, +32,111,102,97,110,100,32,118,97,114,105,111,117,115,71,111,118,101,114,110,111, +114,32,111,102,116,104,101,32,97,114,116,105,99,108,101,116,117,114,110,101,100, +32,105,110,116,111,62,60,97,32,104,114,101,102,61,34,47,116,104,101,32,101,99, +111,110,111,109,121,105,115,32,116,104,101,32,109,111,115,116,109,111,115,116,32 +,119,105,100,101,108,121,119,111,117,108,100,32,108,97,116,101,114,97,110,100,32 +,112,101,114,104,97,112,115,114,105,115,101,32,116,111,32,116,104,101,111,99,99, +117,114,115,32,119,104,101,110,117,110,100,101,114,32,119,104,105,99,104,99,111, +110,100,105,116,105,111,110,115,46,116,104,101,32,119,101,115,116,101,114,110, +116,104,101,111,114,121,32,116,104,97,116,105,115,32,112,114,111,100,117,99,101, +100,116,104,101,32,99,105,116,121,32,111,102,105,110,32,119,104,105,99,104,32, +104,101,115,101,101,110,32,105,110,32,116,104,101,116,104,101,32,99,101,110,116, +114,97,108,98,117,105,108,100,105,110,103,32,111,102,109,97,110,121,32,111,102, +32,104,105,115,97,114,101,97,32,111,102,32,116,104,101,105,115,32,116,104,101,32 +,111,110,108,121,109,111,115,116,32,111,102,32,116,104,101,109,97,110,121,32,111 +,102,32,116,104,101,116,104,101,32,87,101,115,116,101,114,110,84,104,101,114,101 +,32,105,115,32,110,111,101,120,116,101,110,100,101,100,32,116,111,83,116,97,116, +105,115,116,105,99,97,108,99,111,108,115,112,97,110,61,50,32,124,115,104,111,114 +,116,32,115,116,111,114,121,112,111,115,115,105,98,108,101,32,116,111,116,111, +112,111,108,111,103,105,99,97,108,99,114,105,116,105,99,97,108,32,111,102,114, +101,112,111,114,116,101,100,32,116,111,97,32,67,104,114,105,115,116,105,97,110, +100,101,99,105,115,105,111,110,32,116,111,105,115,32,101,113,117,97,108,32,116, +111,112,114,111,98,108,101,109,115,32,111,102,84,104,105,115,32,99,97,110,32,98, +101,109,101,114,99,104,97,110,100,105,115,101,102,111,114,32,109,111,115,116,32, +111,102,110,111,32,101,118,105,100,101,110,99,101,101,100,105,116,105,111,110, +115,32,111,102,101,108,101,109,101,110,116,115,32,105,110,38,113,117,111,116,59, +46,32,84,104,101,99,111,109,47,105,109,97,103,101,115,47,119,104,105,99,104,32, +109,97,107,101,115,116,104,101,32,112,114,111,99,101,115,115,114,101,109,97,105, +110,115,32,116,104,101,108,105,116,101,114,97,116,117,114,101,44,105,115,32,97, +32,109,101,109,98,101,114,116,104,101,32,112,111,112,117,108,97,114,116,104,101, +32,97,110,99,105,101,110,116,112,114,111,98,108,101,109,115,32,105,110,116,105, +109,101,32,111,102,32,116,104,101,100,101,102,101,97,116,101,100,32,98,121,98, +111,100,121,32,111,102,32,116,104,101,97,32,102,101,119,32,121,101,97,114,115, +109,117,99,104,32,111,102,32,116,104,101,116,104,101,32,119,111,114,107,32,111, +102,67,97,108,105,102,111,114,110,105,97,44,115,101,114,118,101,100,32,97,115,32 +,97,103,111,118,101,114,110,109,101,110,116,46,99,111,110,99,101,112,116,115,32, +111,102,109,111,118,101,109,101,110,116,32,105,110,9,9,60,100,105,118,32,105,100 +,61,34,105,116,34,32,118,97,108,117,101,61,34,108,97,110,103,117,97,103,101,32, +111,102,97,115,32,116,104,101,121,32,97,114,101,112,114,111,100,117,99,101,100, +32,105,110,105,115,32,116,104,97,116,32,116,104,101,101,120,112,108,97,105,110, +32,116,104,101,100,105,118,62,60,47,100,105,118,62,10,72,111,119,101,118,101,114 +,32,116,104,101,108,101,97,100,32,116,111,32,116,104,101,9,60,97,32,104,114,101, +102,61,34,47,119,97,115,32,103,114,97,110,116,101,100,112,101,111,112,108,101,32 +,104,97,118,101,99,111,110,116,105,110,117,97,108,108,121,119,97,115,32,115,101, +101,110,32,97,115,97,110,100,32,114,101,108,97,116,101,100,116,104,101,32,114, +111,108,101,32,111,102,112,114,111,112,111,115,101,100,32,98,121,111,102,32,116, +104,101,32,98,101,115,116,101,97,99,104,32,111,116,104,101,114,46,67,111,110,115 +,116,97,110,116,105,110,101,112,101,111,112,108,101,32,102,114,111,109,100,105, +97,108,101,99,116,115,32,111,102,116,111,32,114,101,118,105,115,105,111,110,119, +97,115,32,114,101,110,97,109,101,100,97,32,115,111,117,114,99,101,32,111,102,116 +,104,101,32,105,110,105,116,105,97,108,108,97,117,110,99,104,101,100,32,105,110, +112,114,111,118,105,100,101,32,116,104,101,116,111,32,116,104,101,32,119,101,115 +,116,119,104,101,114,101,32,116,104,101,114,101,97,110,100,32,115,105,109,105, +108,97,114,98,101,116,119,101,101,110,32,116,119,111,105,115,32,97,108,115,111, +32,116,104,101,69,110,103,108,105,115,104,32,97,110,100,99,111,110,100,105,116, +105,111,110,115,44,116,104,97,116,32,105,116,32,119,97,115,101,110,116,105,116, +108,101,100,32,116,111,116,104,101,109,115,101,108,118,101,115,46,113,117,97,110 +,116,105,116,121,32,111,102,114,97,110,115,112,97,114,101,110,99,121,116,104,101 +,32,115,97,109,101,32,97,115,116,111,32,106,111,105,110,32,116,104,101,99,111, +117,110,116,114,121,32,97,110,100,116,104,105,115,32,105,115,32,116,104,101,84, +104,105,115,32,108,101,100,32,116,111,97,32,115,116,97,116,101,109,101,110,116, +99,111,110,116,114,97,115,116,32,116,111,108,97,115,116,73,110,100,101,120,79, +102,116,104,114,111,117,103,104,32,104,105,115,105,115,32,100,101,115,105,103, +110,101,100,116,104,101,32,116,101,114,109,32,105,115,105,115,32,112,114,111,118 +,105,100,101,100,112,114,111,116,101,99,116,32,116,104,101,110,103,60,47,97,62, +60,47,108,105,62,84,104,101,32,99,117,114,114,101,110,116,116,104,101,32,115,105 +,116,101,32,111,102,115,117,98,115,116,97,110,116,105,97,108,101,120,112,101,114 +,105,101,110,99,101,44,105,110,32,116,104,101,32,87,101,115,116,116,104,101,121, +32,115,104,111,117,108,100,115,108,111,118,101,110,196,141,105,110,97,99,111,109 +,101,110,116,97,114,105,111,115,117,110,105,118,101,114,115,105,100,97,100,99, +111,110,100,105,99,105,111,110,101,115,97,99,116,105,118,105,100,97,100,101,115, +101,120,112,101,114,105,101,110,99,105,97,116,101,99,110,111,108,111,103,195,173 +,97,112,114,111,100,117,99,99,105,195,179,110,112,117,110,116,117,97,99,105,195, +179,110,97,112,108,105,99,97,99,105,195,179,110,99,111,110,116,114,97,115,101, +195,177,97,99,97,116,101,103,111,114,195,173,97,115,114,101,103,105,115,116,114, +97,114,115,101,112,114,111,102,101,115,105,111,110,97,108,116,114,97,116,97,109, +105,101,110,116,111,114,101,103,195,173,115,116,114,97,116,101,115,101,99,114, +101,116,97,114,195,173,97,112,114,105,110,99,105,112,97,108,101,115,112,114,111, +116,101,99,99,105,195,179,110,105,109,112,111,114,116,97,110,116,101,115,105,109 +,112,111,114,116,97,110,99,105,97,112,111,115,105,98,105,108,105,100,97,100,105, +110,116,101,114,101,115,97,110,116,101,99,114,101,99,105,109,105,101,110,116,111 +,110,101,99,101,115,105,100,97,100,101,115,115,117,115,99,114,105,98,105,114,115 +,101,97,115,111,99,105,97,99,105,195,179,110,100,105,115,112,111,110,105,98,108, +101,115,101,118,97,108,117,97,99,105,195,179,110,101,115,116,117,100,105,97,110, +116,101,115,114,101,115,112,111,110,115,97,98,108,101,114,101,115,111,108,117,99 +,105,195,179,110,103,117,97,100,97,108,97,106,97,114,97,114,101,103,105,115,116, +114,97,100,111,115,111,112,111,114,116,117,110,105,100,97,100,99,111,109,101,114 +,99,105,97,108,101,115,102,111,116,111,103,114,97,102,195,173,97,97,117,116,111, +114,105,100,97,100,101,115,105,110,103,101,110,105,101,114,195,173,97,116,101, +108,101,118,105,115,105,195,179,110,99,111,109,112,101,116,101,110,99,105,97,111 +,112,101,114,97,99,105,111,110,101,115,101,115,116,97,98,108,101,99,105,100,111, +115,105,109,112,108,101,109,101,110,116,101,97,99,116,117,97,108,109,101,110,116 +,101,110,97,118,101,103,97,99,105,195,179,110,99,111,110,102,111,114,109,105,100 +,97,100,108,105,110,101,45,104,101,105,103,104,116,58,102,111,110,116,45,102,97, +109,105,108,121,58,34,32,58,32,34,104,116,116,112,58,47,47,97,112,112,108,105,99 +,97,116,105,111,110,115,108,105,110,107,34,32,104,114,101,102,61,34,115,112,101, +99,105,102,105,99,97,108,108,121,47,47,60,33,91,67,68,65,84,65,91,10,79,114,103, +97,110,105,122,97,116,105,111,110,100,105,115,116,114,105,98,117,116,105,111,110 +,48,112,120,59,32,104,101,105,103,104,116,58,114,101,108,97,116,105,111,110,115, +104,105,112,100,101,118,105,99,101,45,119,105,100,116,104,60,100,105,118,32,99, +108,97,115,115,61,34,60,108,97,98,101,108,32,102,111,114,61,34,114,101,103,105, +115,116,114,97,116,105,111,110,60,47,110,111,115,99,114,105,112,116,62,10,47,105 +,110,100,101,120,46,104,116,109,108,34,119,105,110,100,111,119,46,111,112,101, +110,40,32,33,105,109,112,111,114,116,97,110,116,59,97,112,112,108,105,99,97,116, +105,111,110,47,105,110,100,101,112,101,110,100,101,110,99,101,47,47,119,119,119, +46,103,111,111,103,108,101,111,114,103,97,110,105,122,97,116,105,111,110,97,117, +116,111,99,111,109,112,108,101,116,101,114,101,113,117,105,114,101,109,101,110, +116,115,99,111,110,115,101,114,118,97,116,105,118,101,60,102,111,114,109,32,110, +97,109,101,61,34,105,110,116,101,108,108,101,99,116,117,97,108,109,97,114,103, +105,110,45,108,101,102,116,58,49,56,116,104,32,99,101,110,116,117,114,121,97,110 +,32,105,109,112,111,114,116,97,110,116,105,110,115,116,105,116,117,116,105,111, +110,115,97,98,98,114,101,118,105,97,116,105,111,110,60,105,109,103,32,99,108,97, +115,115,61,34,111,114,103,97,110,105,115,97,116,105,111,110,99,105,118,105,108, +105,122,97,116,105,111,110,49,57,116,104,32,99,101,110,116,117,114,121,97,114,99 +,104,105,116,101,99,116,117,114,101,105,110,99,111,114,112,111,114,97,116,101, +100,50,48,116,104,32,99,101,110,116,117,114,121,45,99,111,110,116,97,105,110,101 +,114,34,62,109,111,115,116,32,110,111,116,97,98,108,121,47,62,60,47,97,62,60,47, +100,105,118,62,110,111,116,105,102,105,99,97,116,105,111,110,39,117,110,100,101, +102,105,110,101,100,39,41,70,117,114,116,104,101,114,109,111,114,101,44,98,101, +108,105,101,118,101,32,116,104,97,116,105,110,110,101,114,72,84,77,76,32,61,32, +112,114,105,111,114,32,116,111,32,116,104,101,100,114,97,109,97,116,105,99,97, +108,108,121,114,101,102,101,114,114,105,110,103,32,116,111,110,101,103,111,116, +105,97,116,105,111,110,115,104,101,97,100,113,117,97,114,116,101,114,115,83,111, +117,116,104,32,65,102,114,105,99,97,117,110,115,117,99,99,101,115,115,102,117, +108,80,101,110,110,115,121,108,118,97,110,105,97,65,115,32,97,32,114,101,115,117 +,108,116,44,60,104,116,109,108,32,108,97,110,103,61,34,38,108,116,59,47,115,117, +112,38,103,116,59,100,101,97,108,105,110,103,32,119,105,116,104,112,104,105,108, +97,100,101,108,112,104,105,97,104,105,115,116,111,114,105,99,97,108,108,121,41, +59,60,47,115,99,114,105,112,116,62,10,112,97,100,100,105,110,103,45,116,111,112, +58,101,120,112,101,114,105,109,101,110,116,97,108,103,101,116,65,116,116,114,105 +,98,117,116,101,105,110,115,116,114,117,99,116,105,111,110,115,116,101,99,104, +110,111,108,111,103,105,101,115,112,97,114,116,32,111,102,32,116,104,101,32,61, +102,117,110,99,116,105,111,110,40,41,123,115,117,98,115,99,114,105,112,116,105, +111,110,108,46,100,116,100,34,62,13,10,60,104,116,103,101,111,103,114,97,112,104 +,105,99,97,108,67,111,110,115,116,105,116,117,116,105,111,110,39,44,32,102,117, +110,99,116,105,111,110,40,115,117,112,112,111,114,116,101,100,32,98,121,97,103, +114,105,99,117,108,116,117,114,97,108,99,111,110,115,116,114,117,99,116,105,111, +110,112,117,98,108,105,99,97,116,105,111,110,115,102,111,110,116,45,115,105,122, +101,58,32,49,97,32,118,97,114,105,101,116,121,32,111,102,60,100,105,118,32,115, +116,121,108,101,61,34,69,110,99,121,99,108,111,112,101,100,105,97,105,102,114,97 +,109,101,32,115,114,99,61,34,100,101,109,111,110,115,116,114,97,116,101,100,97, +99,99,111,109,112,108,105,115,104,101,100,117,110,105,118,101,114,115,105,116, +105,101,115,68,101,109,111,103,114,97,112,104,105,99,115,41,59,60,47,115,99,114, +105,112,116,62,60,100,101,100,105,99,97,116,101,100,32,116,111,107,110,111,119, +108,101,100,103,101,32,111,102,115,97,116,105,115,102,97,99,116,105,111,110,112, +97,114,116,105,99,117,108,97,114,108,121,60,47,100,105,118,62,60,47,100,105,118, +62,69,110,103,108,105,115,104,32,40,85,83,41,97,112,112,101,110,100,67,104,105, +108,100,40,116,114,97,110,115,109,105,115,115,105,111,110,115,46,32,72,111,119, +101,118,101,114,44,32,105,110,116,101,108,108,105,103,101,110,99,101,34,32,116, +97,98,105,110,100,101,120,61,34,102,108,111,97,116,58,114,105,103,104,116,59,67, +111,109,109,111,110,119,101,97,108,116,104,114,97,110,103,105,110,103,32,102,114 +,111,109,105,110,32,119,104,105,99,104,32,116,104,101,97,116,32,108,101,97,115, +116,32,111,110,101,114,101,112,114,111,100,117,99,116,105,111,110,101,110,99,121 +,99,108,111,112,101,100,105,97,59,102,111,110,116,45,115,105,122,101,58,49,106, +117,114,105,115,100,105,99,116,105,111,110,97,116,32,116,104,97,116,32,116,105, +109,101,34,62,60,97,32,99,108,97,115,115,61,34,73,110,32,97,100,100,105,116,105, +111,110,44,100,101,115,99,114,105,112,116,105,111,110,43,99,111,110,118,101,114, +115,97,116,105,111,110,99,111,110,116,97,99,116,32,119,105,116,104,105,115,32, +103,101,110,101,114,97,108,108,121,114,34,32,99,111,110,116,101,110,116,61,34, +114,101,112,114,101,115,101,110,116,105,110,103,38,108,116,59,109,97,116,104,38, +103,116,59,112,114,101,115,101,110,116,97,116,105,111,110,111,99,99,97,115,105, +111,110,97,108,108,121,60,105,109,103,32,119,105,100,116,104,61,34,110,97,118, +105,103,97,116,105,111,110,34,62,99,111,109,112,101,110,115,97,116,105,111,110, +99,104,97,109,112,105,111,110,115,104,105,112,109,101,100,105,97,61,34,97,108, +108,34,32,118,105,111,108,97,116,105,111,110,32,111,102,114,101,102,101,114,101, +110,99,101,32,116,111,114,101,116,117,114,110,32,116,114,117,101,59,83,116,114, +105,99,116,47,47,69,78,34,32,116,114,97,110,115,97,99,116,105,111,110,115,105, +110,116,101,114,118,101,110,116,105,111,110,118,101,114,105,102,105,99,97,116, +105,111,110,73,110,102,111,114,109,97,116,105,111,110,32,100,105,102,102,105,99, +117,108,116,105,101,115,67,104,97,109,112,105,111,110,115,104,105,112,99,97,112, +97,98,105,108,105,116,105,101,115,60,33,91,101,110,100,105,102,93,45,45,62,125, +10,60,47,115,99,114,105,112,116,62,10,67,104,114,105,115,116,105,97,110,105,116, +121,102,111,114,32,101,120,97,109,112,108,101,44,80,114,111,102,101,115,115,105, +111,110,97,108,114,101,115,116,114,105,99,116,105,111,110,115,115,117,103,103, +101,115,116,32,116,104,97,116,119,97,115,32,114,101,108,101,97,115,101,100,40, +115,117,99,104,32,97,115,32,116,104,101,114,101,109,111,118,101,67,108,97,115, +115,40,117,110,101,109,112,108,111,121,109,101,110,116,116,104,101,32,65,109,101 +,114,105,99,97,110,115,116,114,117,99,116,117,114,101,32,111,102,47,105,110,100, +101,120,46,104,116,109,108,32,112,117,98,108,105,115,104,101,100,32,105,110,115, +112,97,110,32,99,108,97,115,115,61,34,34,62,60,97,32,104,114,101,102,61,34,47, +105,110,116,114,111,100,117,99,116,105,111,110,98,101,108,111,110,103,105,110, +103,32,116,111,99,108,97,105,109,101,100,32,116,104,97,116,99,111,110,115,101, +113,117,101,110,99,101,115,60,109,101,116,97,32,110,97,109,101,61,34,71,117,105, +100,101,32,116,111,32,116,104,101,111,118,101,114,119,104,101,108,109,105,110, +103,97,103,97,105,110,115,116,32,116,104,101,32,99,111,110,99,101,110,116,114,97 +,116,101,100,44,10,46,110,111,110,116,111,117,99,104,32,111,98,115,101,114,118, +97,116,105,111,110,115,60,47,97,62,10,60,47,100,105,118,62,10,102,32,40,100,111, +99,117,109,101,110,116,46,98,111,114,100,101,114,58,32,49,112,120,32,123,102,111 +,110,116,45,115,105,122,101,58,49,116,114,101,97,116,109,101,110,116,32,111,102, +48,34,32,104,101,105,103,104,116,61,34,49,109,111,100,105,102,105,99,97,116,105, +111,110,73,110,100,101,112,101,110,100,101,110,99,101,100,105,118,105,100,101, +100,32,105,110,116,111,103,114,101,97,116,101,114,32,116,104,97,110,97,99,104, +105,101,118,101,109,101,110,116,115,101,115,116,97,98,108,105,115,104,105,110, +103,74,97,118,97,83,99,114,105,112,116,34,32,110,101,118,101,114,116,104,101,108 +,101,115,115,115,105,103,110,105,102,105,99,97,110,99,101,66,114,111,97,100,99, +97,115,116,105,110,103,62,38,110,98,115,112,59,60,47,116,100,62,99,111,110,116, +97,105,110,101,114,34,62,10,115,117,99,104,32,97,115,32,116,104,101,32,105,110, +102,108,117,101,110,99,101,32,111,102,97,32,112,97,114,116,105,99,117,108,97,114 +,115,114,99,61,39,104,116,116,112,58,47,47,110,97,118,105,103,97,116,105,111,110 +,34,32,104,97,108,102,32,111,102,32,116,104,101,32,115,117,98,115,116,97,110,116 +,105,97,108,32,38,110,98,115,112,59,60,47,100,105,118,62,97,100,118,97,110,116, +97,103,101,32,111,102,100,105,115,99,111,118,101,114,121,32,111,102,102,117,110, +100,97,109,101,110,116,97,108,32,109,101,116,114,111,112,111,108,105,116,97,110, +116,104,101,32,111,112,112,111,115,105,116,101,34,32,120,109,108,58,108,97,110, +103,61,34,100,101,108,105,98,101,114,97,116,101,108,121,97,108,105,103,110,61,99 +,101,110,116,101,114,101,118,111,108,117,116,105,111,110,32,111,102,112,114,101, +115,101,114,118,97,116,105,111,110,105,109,112,114,111,118,101,109,101,110,116, +115,98,101,103,105,110,110,105,110,103,32,105,110,74,101,115,117,115,32,67,104, +114,105,115,116,80,117,98,108,105,99,97,116,105,111,110,115,100,105,115,97,103, +114,101,101,109,101,110,116,116,101,120,116,45,97,108,105,103,110,58,114,44,32, +102,117,110,99,116,105,111,110,40,41,115,105,109,105,108,97,114,105,116,105,101, +115,98,111,100,121,62,60,47,104,116,109,108,62,105,115,32,99,117,114,114,101,110 +,116,108,121,97,108,112,104,97,98,101,116,105,99,97,108,105,115,32,115,111,109, +101,116,105,109,101,115,116,121,112,101,61,34,105,109,97,103,101,47,109,97,110, +121,32,111,102,32,116,104,101,32,102,108,111,119,58,104,105,100,100,101,110,59, +97,118,97,105,108,97,98,108,101,32,105,110,100,101,115,99,114,105,98,101,32,116, +104,101,101,120,105,115,116,101,110,99,101,32,111,102,97,108,108,32,111,118,101, +114,32,116,104,101,116,104,101,32,73,110,116,101,114,110,101,116,9,60,117,108,32 +,99,108,97,115,115,61,34,105,110,115,116,97,108,108,97,116,105,111,110,110,101, +105,103,104,98,111,114,104,111,111,100,97,114,109,101,100,32,102,111,114,99,101, +115,114,101,100,117,99,105,110,103,32,116,104,101,99,111,110,116,105,110,117,101 +,115,32,116,111,78,111,110,101,116,104,101,108,101,115,115,44,116,101,109,112, +101,114,97,116,117,114,101,115,10,9,9,60,97,32,104,114,101,102,61,34,99,108,111, +115,101,32,116,111,32,116,104,101,101,120,97,109,112,108,101,115,32,111,102,32, +105,115,32,97,98,111,117,116,32,116,104,101,40,115,101,101,32,98,101,108,111,119 +,41,46,34,32,105,100,61,34,115,101,97,114,99,104,112,114,111,102,101,115,115,105 +,111,110,97,108,105,115,32,97,118,97,105,108,97,98,108,101,116,104,101,32,111, +102,102,105,99,105,97,108,9,9,60,47,115,99,114,105,112,116,62,10,10,9,9,60,100, +105,118,32,105,100,61,34,97,99,99,101,108,101,114,97,116,105,111,110,116,104,114 +,111,117,103,104,32,116,104,101,32,72,97,108,108,32,111,102,32,70,97,109,101,100 +,101,115,99,114,105,112,116,105,111,110,115,116,114,97,110,115,108,97,116,105, +111,110,115,105,110,116,101,114,102,101,114,101,110,99,101,32,116,121,112,101,61 +,39,116,101,120,116,47,114,101,99,101,110,116,32,121,101,97,114,115,105,110,32, +116,104,101,32,119,111,114,108,100,118,101,114,121,32,112,111,112,117,108,97,114 +,123,98,97,99,107,103,114,111,117,110,100,58,116,114,97,100,105,116,105,111,110, +97,108,32,115,111,109,101,32,111,102,32,116,104,101,32,99,111,110,110,101,99,116 +,101,100,32,116,111,101,120,112,108,111,105,116,97,116,105,111,110,101,109,101, +114,103,101,110,99,101,32,111,102,99,111,110,115,116,105,116,117,116,105,111,110 +,65,32,72,105,115,116,111,114,121,32,111,102,115,105,103,110,105,102,105,99,97, +110,116,32,109,97,110,117,102,97,99,116,117,114,101,100,101,120,112,101,99,116, +97,116,105,111,110,115,62,60,110,111,115,99,114,105,112,116,62,60,99,97,110,32, +98,101,32,102,111,117,110,100,98,101,99,97,117,115,101,32,116,104,101,32,104,97, +115,32,110,111,116,32,98,101,101,110,110,101,105,103,104,98,111,117,114,105,110, +103,119,105,116,104,111,117,116,32,116,104,101,32,97,100,100,101,100,32,116,111, +32,116,104,101,9,60,108,105,32,99,108,97,115,115,61,34,105,110,115,116,114,117, +109,101,110,116,97,108,83,111,118,105,101,116,32,85,110,105,111,110,97,99,107, +110,111,119,108,101,100,103,101,100,119,104,105,99,104,32,99,97,110,32,98,101, +110,97,109,101,32,102,111,114,32,116,104,101,97,116,116,101,110,116,105,111,110, +32,116,111,97,116,116,101,109,112,116,115,32,116,111,32,100,101,118,101,108,111, +112,109,101,110,116,115,73,110,32,102,97,99,116,44,32,116,104,101,60,108,105,32, +99,108,97,115,115,61,34,97,105,109,112,108,105,99,97,116,105,111,110,115,115,117 +,105,116,97,98,108,101,32,102,111,114,109,117,99,104,32,111,102,32,116,104,101, +32,99,111,108,111,110,105,122,97,116,105,111,110,112,114,101,115,105,100,101,110 +,116,105,97,108,99,97,110,99,101,108,66,117,98,98,108,101,32,73,110,102,111,114, +109,97,116,105,111,110,109,111,115,116,32,111,102,32,116,104,101,32,105,115,32, +100,101,115,99,114,105,98,101,100,114,101,115,116,32,111,102,32,116,104,101,32, +109,111,114,101,32,111,114,32,108,101,115,115,105,110,32,83,101,112,116,101,109, +98,101,114,73,110,116,101,108,108,105,103,101,110,99,101,115,114,99,61,34,104, +116,116,112,58,47,47,112,120,59,32,104,101,105,103,104,116,58,32,97,118,97,105, +108,97,98,108,101,32,116,111,109,97,110,117,102,97,99,116,117,114,101,114,104, +117,109,97,110,32,114,105,103,104,116,115,108,105,110,107,32,104,114,101,102,61, +34,47,97,118,97,105,108,97,98,105,108,105,116,121,112,114,111,112,111,114,116, +105,111,110,97,108,111,117,116,115,105,100,101,32,116,104,101,32,97,115,116,114, +111,110,111,109,105,99,97,108,104,117,109,97,110,32,98,101,105,110,103,115,110, +97,109,101,32,111,102,32,116,104,101,32,97,114,101,32,102,111,117,110,100,32,105 +,110,97,114,101,32,98,97,115,101,100,32,111,110,115,109,97,108,108,101,114,32, +116,104,97,110,97,32,112,101,114,115,111,110,32,119,104,111,101,120,112,97,110, +115,105,111,110,32,111,102,97,114,103,117,105,110,103,32,116,104,97,116,110,111, +119,32,107,110,111,119,110,32,97,115,73,110,32,116,104,101,32,101,97,114,108,121 +,105,110,116,101,114,109,101,100,105,97,116,101,100,101,114,105,118,101,100,32, +102,114,111,109,83,99,97,110,100,105,110,97,118,105,97,110,60,47,97,62,60,47,100 +,105,118,62,13,10,99,111,110,115,105,100,101,114,32,116,104,101,97,110,32,101, +115,116,105,109,97,116,101,100,116,104,101,32,78,97,116,105,111,110,97,108,60, +100,105,118,32,105,100,61,34,112,97,103,114,101,115,117,108,116,105,110,103,32, +105,110,99,111,109,109,105,115,115,105,111,110,101,100,97,110,97,108,111,103,111 +,117,115,32,116,111,97,114,101,32,114,101,113,117,105,114,101,100,47,117,108,62, +10,60,47,100,105,118,62,10,119,97,115,32,98,97,115,101,100,32,111,110,97,110,100 +,32,98,101,99,97,109,101,32,97,38,110,98,115,112,59,38,110,98,115,112,59,116,34, +32,118,97,108,117,101,61,34,34,32,119,97,115,32,99,97,112,116,117,114,101,100, +110,111,32,109,111,114,101,32,116,104,97,110,114,101,115,112,101,99,116,105,118, +101,108,121,99,111,110,116,105,110,117,101,32,116,111,32,62,13,10,60,104,101,97, +100,62,13,10,60,119,101,114,101,32,99,114,101,97,116,101,100,109,111,114,101,32, +103,101,110,101,114,97,108,105,110,102,111,114,109,97,116,105,111,110,32,117,115 +,101,100,32,102,111,114,32,116,104,101,105,110,100,101,112,101,110,100,101,110, +116,32,116,104,101,32,73,109,112,101,114,105,97,108,99,111,109,112,111,110,101, +110,116,32,111,102,116,111,32,116,104,101,32,110,111,114,116,104,105,110,99,108, +117,100,101,32,116,104,101,32,67,111,110,115,116,114,117,99,116,105,111,110,115, +105,100,101,32,111,102,32,116,104,101,32,119,111,117,108,100,32,110,111,116,32, +98,101,102,111,114,32,105,110,115,116,97,110,99,101,105,110,118,101,110,116,105, +111,110,32,111,102,109,111,114,101,32,99,111,109,112,108,101,120,99,111,108,108, +101,99,116,105,118,101,108,121,98,97,99,107,103,114,111,117,110,100,58,32,116, +101,120,116,45,97,108,105,103,110,58,32,105,116,115,32,111,114,105,103,105,110, +97,108,105,110,116,111,32,97,99,99,111,117,110,116,116,104,105,115,32,112,114, +111,99,101,115,115,97,110,32,101,120,116,101,110,115,105,118,101,104,111,119,101 +,118,101,114,44,32,116,104,101,116,104,101,121,32,97,114,101,32,110,111,116,114, +101,106,101,99,116,101,100,32,116,104,101,99,114,105,116,105,99,105,115,109,32, +111,102,100,117,114,105,110,103,32,119,104,105,99,104,112,114,111,98,97,98,108, +121,32,116,104,101,116,104,105,115,32,97,114,116,105,99,108,101,40,102,117,110, +99,116,105,111,110,40,41,123,73,116,32,115,104,111,117,108,100,32,98,101,97,110, +32,97,103,114,101,101,109,101,110,116,97,99,99,105,100,101,110,116,97,108,108, +121,100,105,102,102,101,114,115,32,102,114,111,109,65,114,99,104,105,116,101,99, +116,117,114,101,98,101,116,116,101,114,32,107,110,111,119,110,97,114,114,97,110, +103,101,109,101,110,116,115,105,110,102,108,117,101,110,99,101,32,111,110,97,116 +,116,101,110,100,101,100,32,116,104,101,105,100,101,110,116,105,99,97,108,32,116 +,111,115,111,117,116,104,32,111,102,32,116,104,101,112,97,115,115,32,116,104,114 +,111,117,103,104,120,109,108,34,32,116,105,116,108,101,61,34,119,101,105,103,104 +,116,58,98,111,108,100,59,99,114,101,97,116,105,110,103,32,116,104,101,100,105, +115,112,108,97,121,58,110,111,110,101,114,101,112,108,97,99,101,100,32,116,104, +101,60,105,109,103,32,115,114,99,61,34,47,105,104,116,116,112,115,58,47,47,119, +119,119,46,87,111,114,108,100,32,87,97,114,32,73,73,116,101,115,116,105,109,111, +110,105,97,108,115,102,111,117,110,100,32,105,110,32,116,104,101,114,101,113,117 +,105,114,101,100,32,116,111,32,97,110,100,32,116,104,97,116,32,116,104,101,98, +101,116,119,101,101,110,32,116,104,101,32,119,97,115,32,100,101,115,105,103,110, +101,100,99,111,110,115,105,115,116,115,32,111,102,32,99,111,110,115,105,100,101, +114,97,98,108,121,112,117,98,108,105,115,104,101,100,32,98,121,116,104,101,32, +108,97,110,103,117,97,103,101,67,111,110,115,101,114,118,97,116,105,111,110,99, +111,110,115,105,115,116,101,100,32,111,102,114,101,102,101,114,32,116,111,32,116 +,104,101,98,97,99,107,32,116,111,32,116,104,101,32,99,115,115,34,32,109,101,100, +105,97,61,34,80,101,111,112,108,101,32,102,114,111,109,32,97,118,97,105,108,97, +98,108,101,32,111,110,112,114,111,118,101,100,32,116,111,32,98,101,115,117,103, +103,101,115,116,105,111,110,115,34,119,97,115,32,107,110,111,119,110,32,97,115, +118,97,114,105,101,116,105,101,115,32,111,102,108,105,107,101,108,121,32,116,111 +,32,98,101,99,111,109,112,114,105,115,101,100,32,111,102,115,117,112,112,111,114 +,116,32,116,104,101,32,104,97,110,100,115,32,111,102,32,116,104,101,99,111,117, +112,108,101,100,32,119,105,116,104,99,111,110,110,101,99,116,32,97,110,100,32,98 +,111,114,100,101,114,58,110,111,110,101,59,112,101,114,102,111,114,109,97,110,99 +,101,115,98,101,102,111,114,101,32,98,101,105,110,103,108,97,116,101,114,32,98, +101,99,97,109,101,99,97,108,99,117,108,97,116,105,111,110,115,111,102,116,101, +110,32,99,97,108,108,101,100,114,101,115,105,100,101,110,116,115,32,111,102,109, +101,97,110,105,110,103,32,116,104,97,116,62,60,108,105,32,99,108,97,115,115,61, +34,101,118,105,100,101,110,99,101,32,102,111,114,101,120,112,108,97,110,97,116, +105,111,110,115,101,110,118,105,114,111,110,109,101,110,116,115,34,62,60,47,97, +62,60,47,100,105,118,62,119,104,105,99,104,32,97,108,108,111,119,115,73,110,116, +114,111,100,117,99,116,105,111,110,100,101,118,101,108,111,112,101,100,32,98,121 +,97,32,119,105,100,101,32,114,97,110,103,101,111,110,32,98,101,104,97,108,102,32 +,111,102,118,97,108,105,103,110,61,34,116,111,112,34,112,114,105,110,99,105,112, +108,101,32,111,102,97,116,32,116,104,101,32,116,105,109,101,44,60,47,110,111,115 +,99,114,105,112,116,62,13,115,97,105,100,32,116,111,32,104,97,118,101,105,110,32 +,116,104,101,32,102,105,114,115,116,119,104,105,108,101,32,111,116,104,101,114, +115,104,121,112,111,116,104,101,116,105,99,97,108,112,104,105,108,111,115,111, +112,104,101,114,115,112,111,119,101,114,32,111,102,32,116,104,101,99,111,110,116 +,97,105,110,101,100,32,105,110,112,101,114,102,111,114,109,101,100,32,98,121,105 +,110,97,98,105,108,105,116,121,32,116,111,119,101,114,101,32,119,114,105,116,116 +,101,110,115,112,97,110,32,115,116,121,108,101,61,34,105,110,112,117,116,32,110, +97,109,101,61,34,116,104,101,32,113,117,101,115,116,105,111,110,105,110,116,101, +110,100,101,100,32,102,111,114,114,101,106,101,99,116,105,111,110,32,111,102,105 +,109,112,108,105,101,115,32,116,104,97,116,105,110,118,101,110,116,101,100,32, +116,104,101,116,104,101,32,115,116,97,110,100,97,114,100,119,97,115,32,112,114, +111,98,97,98,108,121,108,105,110,107,32,98,101,116,119,101,101,110,112,114,111, +102,101,115,115,111,114,32,111,102,105,110,116,101,114,97,99,116,105,111,110,115 +,99,104,97,110,103,105,110,103,32,116,104,101,73,110,100,105,97,110,32,79,99,101 +,97,110,32,99,108,97,115,115,61,34,108,97,115,116,119,111,114,107,105,110,103,32 +,119,105,116,104,39,104,116,116,112,58,47,47,119,119,119,46,121,101,97,114,115, +32,98,101,102,111,114,101,84,104,105,115,32,119,97,115,32,116,104,101,114,101,99 +,114,101,97,116,105,111,110,97,108,101,110,116,101,114,105,110,103,32,116,104, +101,109,101,97,115,117,114,101,109,101,110,116,115,97,110,32,101,120,116,114,101 +,109,101,108,121,118,97,108,117,101,32,111,102,32,116,104,101,115,116,97,114,116 +,32,111,102,32,116,104,101,10,60,47,115,99,114,105,112,116,62,10,10,97,110,32, +101,102,102,111,114,116,32,116,111,105,110,99,114,101,97,115,101,32,116,104,101, +116,111,32,116,104,101,32,115,111,117,116,104,115,112,97,99,105,110,103,61,34,48 +,34,62,115,117,102,102,105,99,105,101,110,116,108,121,116,104,101,32,69,117,114, +111,112,101,97,110,99,111,110,118,101,114,116,101,100,32,116,111,99,108,101,97, +114,84,105,109,101,111,117,116,100,105,100,32,110,111,116,32,104,97,118,101,99, +111,110,115,101,113,117,101,110,116,108,121,102,111,114,32,116,104,101,32,110, +101,120,116,101,120,116,101,110,115,105,111,110,32,111,102,101,99,111,110,111, +109,105,99,32,97,110,100,97,108,116,104,111,117,103,104,32,116,104,101,97,114, +101,32,112,114,111,100,117,99,101,100,97,110,100,32,119,105,116,104,32,116,104, +101,105,110,115,117,102,102,105,99,105,101,110,116,103,105,118,101,110,32,98,121 +,32,116,104,101,115,116,97,116,105,110,103,32,116,104,97,116,101,120,112,101,110 +,100,105,116,117,114,101,115,60,47,115,112,97,110,62,60,47,97,62,10,116,104,111, +117,103,104,116,32,116,104,97,116,111,110,32,116,104,101,32,98,97,115,105,115,99 +,101,108,108,112,97,100,100,105,110,103,61,105,109,97,103,101,32,111,102,32,116, +104,101,114,101,116,117,114,110,105,110,103,32,116,111,105,110,102,111,114,109, +97,116,105,111,110,44,115,101,112,97,114,97,116,101,100,32,98,121,97,115,115,97, +115,115,105,110,97,116,101,100,115,34,32,99,111,110,116,101,110,116,61,34,97,117 +,116,104,111,114,105,116,121,32,111,102,110,111,114,116,104,119,101,115,116,101, +114,110,60,47,100,105,118,62,10,60,100,105,118,32,34,62,60,47,100,105,118,62,13, +10,32,32,99,111,110,115,117,108,116,97,116,105,111,110,99,111,109,109,117,110, +105,116,121,32,111,102,116,104,101,32,110,97,116,105,111,110,97,108,105,116,32, +115,104,111,117,108,100,32,98,101,112,97,114,116,105,99,105,112,97,110,116,115, +32,97,108,105,103,110,61,34,108,101,102,116,116,104,101,32,103,114,101,97,116, +101,115,116,115,101,108,101,99,116,105,111,110,32,111,102,115,117,112,101,114, +110,97,116,117,114,97,108,100,101,112,101,110,100,101,110,116,32,111,110,105,115 +,32,109,101,110,116,105,111,110,101,100,97,108,108,111,119,105,110,103,32,116, +104,101,119,97,115,32,105,110,118,101,110,116,101,100,97,99,99,111,109,112,97, +110,121,105,110,103,104,105,115,32,112,101,114,115,111,110,97,108,97,118,97,105, +108,97,98,108,101,32,97,116,115,116,117,100,121,32,111,102,32,116,104,101,111, +110,32,116,104,101,32,111,116,104,101,114,101,120,101,99,117,116,105,111,110,32, +111,102,72,117,109,97,110,32,82,105,103,104,116,115,116,101,114,109,115,32,111, +102,32,116,104,101,97,115,115,111,99,105,97,116,105,111,110,115,114,101,115,101, +97,114,99,104,32,97,110,100,115,117,99,99,101,101,100,101,100,32,98,121,100,101, +102,101,97,116,101,100,32,116,104,101,97,110,100,32,102,114,111,109,32,116,104, +101,98,117,116,32,116,104,101,121,32,97,114,101,99,111,109,109,97,110,100,101, +114,32,111,102,115,116,97,116,101,32,111,102,32,116,104,101,121,101,97,114,115, +32,111,102,32,97,103,101,116,104,101,32,115,116,117,100,121,32,111,102,60,117, +108,32,99,108,97,115,115,61,34,115,112,108,97,99,101,32,105,110,32,116,104,101, +119,104,101,114,101,32,104,101,32,119,97,115,60,108,105,32,99,108,97,115,115,61, +34,102,116,104,101,114,101,32,97,114,101,32,110,111,119,104,105,99,104,32,98,101 +,99,97,109,101,104,101,32,112,117,98,108,105,115,104,101,100,101,120,112,114,101 +,115,115,101,100,32,105,110,116,111,32,119,104,105,99,104,32,116,104,101,99,111, +109,109,105,115,115,105,111,110,101,114,102,111,110,116,45,119,101,105,103,104, +116,58,116,101,114,114,105,116,111,114,121,32,111,102,101,120,116,101,110,115, +105,111,110,115,34,62,82,111,109,97,110,32,69,109,112,105,114,101,101,113,117,97 +,108,32,116,111,32,116,104,101,73,110,32,99,111,110,116,114,97,115,116,44,104, +111,119,101,118,101,114,44,32,97,110,100,105,115,32,116,121,112,105,99,97,108, +108,121,97,110,100,32,104,105,115,32,119,105,102,101,40,97,108,115,111,32,99,97, +108,108,101,100,62,60,117,108,32,99,108,97,115,115,61,34,101,102,102,101,99,116, +105,118,101,108,121,32,101,118,111,108,118,101,100,32,105,110,116,111,115,101, +101,109,32,116,111,32,104,97,118,101,119,104,105,99,104,32,105,115,32,116,104, +101,116,104,101,114,101,32,119,97,115,32,110,111,97,110,32,101,120,99,101,108, +108,101,110,116,97,108,108,32,111,102,32,116,104,101,115,101,100,101,115,99,114, +105,98,101,100,32,98,121,73,110,32,112,114,97,99,116,105,99,101,44,98,114,111,97 +,100,99,97,115,116,105,110,103,99,104,97,114,103,101,100,32,119,105,116,104,114, +101,102,108,101,99,116,101,100,32,105,110,115,117,98,106,101,99,116,101,100,32, +116,111,109,105,108,105,116,97,114,121,32,97,110,100,116,111,32,116,104,101,32, +112,111,105,110,116,101,99,111,110,111,109,105,99,97,108,108,121,115,101,116,84, +97,114,103,101,116,105,110,103,97,114,101,32,97,99,116,117,97,108,108,121,118, +105,99,116,111,114,121,32,111,118,101,114,40,41,59,60,47,115,99,114,105,112,116, +62,99,111,110,116,105,110,117,111,117,115,108,121,114,101,113,117,105,114,101, +100,32,102,111,114,101,118,111,108,117,116,105,111,110,97,114,121,97,110,32,101, +102,102,101,99,116,105,118,101,110,111,114,116,104,32,111,102,32,116,104,101,44, +32,119,104,105,99,104,32,119,97,115,32,102,114,111,110,116,32,111,102,32,116,104 +,101,111,114,32,111,116,104,101,114,119,105,115,101,115,111,109,101,32,102,111, +114,109,32,111,102,104,97,100,32,110,111,116,32,98,101,101,110,103,101,110,101, +114,97,116,101,100,32,98,121,105,110,102,111,114,109,97,116,105,111,110,46,112, +101,114,109,105,116,116,101,100,32,116,111,105,110,99,108,117,100,101,115,32,116 +,104,101,100,101,118,101,108,111,112,109,101,110,116,44,101,110,116,101,114,101, +100,32,105,110,116,111,116,104,101,32,112,114,101,118,105,111,117,115,99,111,110 +,115,105,115,116,101,110,116,108,121,97,114,101,32,107,110,111,119,110,32,97,115 +,116,104,101,32,102,105,101,108,100,32,111,102,116,104,105,115,32,116,121,112, +101,32,111,102,103,105,118,101,110,32,116,111,32,116,104,101,116,104,101,32,116, +105,116,108,101,32,111,102,99,111,110,116,97,105,110,115,32,116,104,101,105,110, +115,116,97,110,99,101,115,32,111,102,105,110,32,116,104,101,32,110,111,114,116, +104,100,117,101,32,116,111,32,116,104,101,105,114,97,114,101,32,100,101,115,105, +103,110,101,100,99,111,114,112,111,114,97,116,105,111,110,115,119,97,115,32,116, +104,97,116,32,116,104,101,111,110,101,32,111,102,32,116,104,101,115,101,109,111, +114,101,32,112,111,112,117,108,97,114,115,117,99,99,101,101,100,101,100,32,105, +110,115,117,112,112,111,114,116,32,102,114,111,109,105,110,32,100,105,102,102, +101,114,101,110,116,100,111,109,105,110,97,116,101,100,32,98,121,100,101,115,105 +,103,110,101,100,32,102,111,114,111,119,110,101,114,115,104,105,112,32,111,102, +97,110,100,32,112,111,115,115,105,98,108,121,115,116,97,110,100,97,114,100,105, +122,101,100,114,101,115,112,111,110,115,101,84,101,120,116,119,97,115,32,105,110 +,116,101,110,100,101,100,114,101,99,101,105,118,101,100,32,116,104,101,97,115, +115,117,109,101,100,32,116,104,97,116,97,114,101,97,115,32,111,102,32,116,104, +101,112,114,105,109,97,114,105,108,121,32,105,110,116,104,101,32,98,97,115,105, +115,32,111,102,105,110,32,116,104,101,32,115,101,110,115,101,97,99,99,111,117, +110,116,115,32,102,111,114,100,101,115,116,114,111,121,101,100,32,98,121,97,116, +32,108,101,97,115,116,32,116,119,111,119,97,115,32,100,101,99,108,97,114,101,100 +,99,111,117,108,100,32,110,111,116,32,98,101,83,101,99,114,101,116,97,114,121,32 +,111,102,97,112,112,101,97,114,32,116,111,32,98,101,109,97,114,103,105,110,45, +116,111,112,58,49,47,94,92,115,43,124,92,115,43,36,47,103,101,41,123,116,104,114 +,111,119,32,101,125,59,116,104,101,32,115,116,97,114,116,32,111,102,116,119,111, +32,115,101,112,97,114,97,116,101,108,97,110,103,117,97,103,101,32,97,110,100,119 +,104,111,32,104,97,100,32,98,101,101,110,111,112,101,114,97,116,105,111,110,32, +111,102,100,101,97,116,104,32,111,102,32,116,104,101,114,101,97,108,32,110,117, +109,98,101,114,115,9,60,108,105,110,107,32,114,101,108,61,34,112,114,111,118,105 +,100,101,100,32,116,104,101,116,104,101,32,115,116,111,114,121,32,111,102,99,111 +,109,112,101,116,105,116,105,111,110,115,101,110,103,108,105,115,104,32,40,85,75 +,41,101,110,103,108,105,115,104,32,40,85,83,41,208,156,208,190,208,189,208,179, +208,190,208,187,208,161,209,128,208,191,209,129,208,186,208,184,209,129,209,128, +208,191,209,129,208,186,208,184,209,129,209,128,208,191,209,129,208,186,208,190, +217,132,216,185,216,177,216,168,217,138,216,169,230,173,163,233,171,148,228,184, +173,230,150,135,231,174,128,228,189,147,228,184,173,230,150,135,231,185,129,228, +189,147,228,184,173,230,150,135,230,156,137,233,153,144,229,133,172,229,143,184, +228,186,186,230,176,145,230,148,191,229,186,156,233,152,191,233,135,140,229,183, +180,229,183,180,231,164,190,228,188,154,228,184,187,228,185,137,230,147,141,228, +189,156,231,179,187,231,187,159,230,148,191,231,173,150,230,179,149,232,167,132, +105,110,102,111,114,109,97,99,105,195,179,110,104,101,114,114,97,109,105,101,110 +,116,97,115,101,108,101,99,116,114,195,179,110,105,99,111,100,101,115,99,114,105 +,112,99,105,195,179,110,99,108,97,115,105,102,105,99,97,100,111,115,99,111,110, +111,99,105,109,105,101,110,116,111,112,117,98,108,105,99,97,99,105,195,179,110, +114,101,108,97,99,105,111,110,97,100,97,115,105,110,102,111,114,109,195,161,116, +105,99,97,114,101,108,97,99,105,111,110,97,100,111,115,100,101,112,97,114,116,97 +,109,101,110,116,111,116,114,97,98,97,106,97,100,111,114,101,115,100,105,114,101 +,99,116,97,109,101,110,116,101,97,121,117,110,116,97,109,105,101,110,116,111,109 +,101,114,99,97,100,111,76,105,98,114,101,99,111,110,116,195,161,99,116,101,110, +111,115,104,97,98,105,116,97,99,105,111,110,101,115,99,117,109,112,108,105,109, +105,101,110,116,111,114,101,115,116,97,117,114,97,110,116,101,115,100,105,115, +112,111,115,105,99,105,195,179,110,99,111,110,115,101,99,117,101,110,99,105,97, +101,108,101,99,116,114,195,179,110,105,99,97,97,112,108,105,99,97,99,105,111,110 +,101,115,100,101,115,99,111,110,101,99,116,97,100,111,105,110,115,116,97,108,97, +99,105,195,179,110,114,101,97,108,105,122,97,99,105,195,179,110,117,116,105,108, +105,122,97,99,105,195,179,110,101,110,99,105,99,108,111,112,101,100,105,97,101, +110,102,101,114,109,101,100,97,100,101,115,105,110,115,116,114,117,109,101,110, +116,111,115,101,120,112,101,114,105,101,110,99,105,97,115,105,110,115,116,105, +116,117,99,105,195,179,110,112,97,114,116,105,99,117,108,97,114,101,115,115,117, +98,99,97,116,101,103,111,114,105,97,209,130,208,190,208,187,209,140,208,186,208, +190,208,160,208,190,209,129,209,129,208,184,208,184,209,128,208,176,208,177,208, +190,209,130,209,139,208,177,208,190,208,187,209,140,209,136,208,181,208,191,209, +128,208,190,209,129,209,130,208,190,208,188,208,190,208,182,208,181,209,130,208, +181,208,180,209,128,209,131,208,179,208,184,209,133,209,129,208,187,209,131,209, +135,208,176,208,181,209,129,208,181,208,185,209,135,208,176,209,129,208,178,209, +129,208,181,208,179,208,180,208,176,208,160,208,190,209,129,209,129,208,184,209, +143,208,156,208,190,209,129,208,186,208,178,208,181,208,180,209,128,209,131,208, +179,208,184,208,181,208,179,208,190,209,128,208,190,208,180,208,176,208,178,208, +190,208,191,209,128,208,190,209,129,208,180,208,176,208,189,208,189,209,139,209, +133,208,180,208,190,208,187,208,182,208,189,209,139,208,184,208,188,208,181,208, +189,208,189,208,190,208,156,208,190,209,129,208,186,208,178,209,139,209,128,209, +131,208,177,208,187,208,181,208,185,208,156,208,190,209,129,208,186,208,178,208, +176,209,129,209,130,209,128,208,176,208,189,209,139,208,189,208,184,209,135,208, +181,208,179,208,190,209,128,208,176,208,177,208,190,209,130,208,181,208,180,208, +190,208,187,208,182,208,181,208,189,209,131,209,129,208,187,209,131,208,179,208, +184,209,130,208,181,208,191,208,181,209,128,209,140,208,158,208,180,208,189,208, +176,208,186,208,190,208,191,208,190,209,130,208,190,208,188,209,131,209,128,208, +176,208,177,208,190,209,130,209,131,208,176,208,191,209,128,208,181,208,187,209, +143,208,178,208,190,208,190,208,177,209,137,208,181,208,190,208,180,208,189,208, +190,208,179,208,190,209,129,208,178,208,190,208,181,208,179,208,190,209,129,209, +130,208,176,209,130,209,140,208,184,208,180,209,128,209,131,208,179,208,190,208, +185,209,132,208,190,209,128,209,131,208,188,208,181,209,133,208,190,209,128,208, +190,209,136,208,190,208,191,209,128,208,190,209,130,208,184,208,178,209,129,209, +129,209,139,208,187,208,186,208,176,208,186,208,176,208,182,208,180,209,139,208, +185,208,178,208,187,208,176,209,129,209,130,208,184,208,179,209,128,209,131,208, +191,208,191,209,139,208,178,208,188,208,181,209,129,209,130,208,181,209,128,208, +176,208,177,208,190,209,130,208,176,209,129,208,186,208,176,208,183,208,176,208, +187,208,191,208,181,209,128,208,178,209,139,208,185,208,180,208,181,208,187,208, +176,209,130,209,140,208,180,208,181,208,189,209,140,208,179,208,184,208,191,208, +181,209,128,208,184,208,190,208,180,208,177,208,184,208,183,208,189,208,181,209, +129,208,190,209,129,208,189,208,190,208,178,208,181,208,188,208,190,208,188,208, +181,208,189,209,130,208,186,209,131,208,191,208,184,209,130,209,140,208,180,208, +190,208,187,208,182,208,189,208,176,209,128,208,176,208,188,208,186,208,176,209, +133,208,189,208,176,209,135,208,176,208,187,208,190,208,160,208,176,208,177,208, +190,209,130,208,176,208,162,208,190,208,187,209,140,208,186,208,190,209,129,208, +190,208,178,209,129,208,181,208,188,208,178,209,130,208,190,209,128,208,190,208, +185,208,189,208,176,209,135,208,176,208,187,208,176,209,129,208,191,208,184,209, +129,208,190,208,186,209,129,208,187,209,131,208,182,208,177,209,139,209,129,208, +184,209,129,209,130,208,181,208,188,208,191,208,181,209,135,208,176,209,130,208, +184,208,189,208,190,208,178,208,190,208,179,208,190,208,191,208,190,208,188,208, +190,209,137,208,184,209,129,208,176,208,185,209,130,208,190,208,178,208,191,208, +190,209,135,208,181,208,188,209,131,208,191,208,190,208,188,208,190,209,137,209, +140,208,180,208,190,208,187,208,182,208,189,208,190,209,129,209,129,209,139,208, +187,208,186,208,184,208,177,209,139,209,129,209,130,209,128,208,190,208,180,208, +176,208,189,208,189,209,139,208,181,208,188,208,189,208,190,208,179,208,184,208, +181,208,191,209,128,208,190,208,181,208,186,209,130,208,161,208,181,208,185,209, +135,208,176,209,129,208,188,208,190,208,180,208,181,208,187,208,184,209,130,208, +176,208,186,208,190,208,179,208,190,208,190,208,189,208,187,208,176,208,185,208, +189,208,179,208,190,209,128,208,190,208,180,208,181,208,178,208,181,209,128,209, +129,208,184,209,143,209,129,209,130,209,128,208,176,208,189,208,181,209,132,208, +184,208,187,209,140,208,188,209,139,209,131,209,128,208,190,208,178,208,189,209, +143,209,128,208,176,208,183,208,189,209,139,209,133,208,184,209,129,208,186,208, +176,209,130,209,140,208,189,208,181,208,180,208,181,208,187,209,142,209,143,208, +189,208,178,208,176,209,128,209,143,208,188,208,181,208,189,209,140,209,136,208, +181,208,188,208,189,208,190,208,179,208,184,209,133,208,180,208,176,208,189,208, +189,208,190,208,185,208,183,208,189,208,176,209,135,208,184,209,130,208,189,208, +181,208,187,209,140,208,183,209,143,209,132,208,190,209,128,209,131,208,188,208, +176,208,162,208,181,208,191,208,181,209,128,209,140,208,188,208,181,209,129,209, +143,209,134,208,176,208,183,208,176,209,137,208,184,209,130,209,139,208,155,209, +131,209,135,209,136,208,184,208,181,224,164,168,224,164,185,224,165,128,224,164, +130,224,164,149,224,164,176,224,164,168,224,165,135,224,164,133,224,164,170,224, +164,168,224,165,135,224,164,149,224,164,191,224,164,175,224,164,190,224,164,149, +224,164,176,224,165,135,224,164,130,224,164,133,224,164,168,224,165,141,224,164, +175,224,164,149,224,165,141,224,164,175,224,164,190,224,164,151,224,164,190,224, +164,135,224,164,161,224,164,172,224,164,190,224,164,176,224,165,135,224,164,149, +224,164,191,224,164,184,224,165,128,224,164,166,224,164,191,224,164,175,224,164, +190,224,164,170,224,164,185,224,164,178,224,165,135,224,164,184,224,164,191,224, +164,130,224,164,185,224,164,173,224,164,190,224,164,176,224,164,164,224,164,133, +224,164,170,224,164,168,224,165,128,224,164,181,224,164,190,224,164,178,224,165, +135,224,164,184,224,165,135,224,164,181,224,164,190,224,164,149,224,164,176,224, +164,164,224,165,135,224,164,174,224,165,135,224,164,176,224,165,135,224,164,185, +224,165,139,224,164,168,224,165,135,224,164,184,224,164,149,224,164,164,224,165, +135,224,164,172,224,164,185,224,165,129,224,164,164,224,164,184,224,164,190,224, +164,135,224,164,159,224,164,185,224,165,139,224,164,151,224,164,190,224,164,156, +224,164,190,224,164,168,224,165,135,224,164,174,224,164,191,224,164,168,224,164, +159,224,164,149,224,164,176,224,164,164,224,164,190,224,164,149,224,164,176,224, +164,168,224,164,190,224,164,137,224,164,168,224,164,149,224,165,135,224,164,175, +224,164,185,224,164,190,224,164,129,224,164,184,224,164,172,224,164,184,224,165, +135,224,164,173,224,164,190,224,164,183,224,164,190,224,164,134,224,164,170,224, +164,149,224,165,135,224,164,178,224,164,191,224,164,175,224,165,135,224,164,182, +224,165,129,224,164,176,224,165,130,224,164,135,224,164,184,224,164,149,224,165, +135,224,164,152,224,164,130,224,164,159,224,165,135,224,164,174,224,165,135,224, +164,176,224,165,128,224,164,184,224,164,149,224,164,164,224,164,190,224,164,174, +224,165,135,224,164,176,224,164,190,224,164,178,224,165,135,224,164,149,224,164, +176,224,164,133,224,164,167,224,164,191,224,164,149,224,164,133,224,164,170,224, +164,168,224,164,190,224,164,184,224,164,174,224,164,190,224,164,156,224,164,174, +224,165,129,224,164,157,224,165,135,224,164,149,224,164,190,224,164,176,224,164, +163,224,164,185,224,165,139,224,164,164,224,164,190,224,164,149,224,164,161,224, +164,188,224,165,128,224,164,175,224,164,185,224,164,190,224,164,130,224,164,185, +224,165,139,224,164,159,224,164,178,224,164,182,224,164,172,224,165,141,224,164, +166,224,164,178,224,164,191,224,164,175,224,164,190,224,164,156,224,165,128,224, +164,181,224,164,168,224,164,156,224,164,190,224,164,164,224,164,190,224,164,149, +224,165,136,224,164,184,224,165,135,224,164,134,224,164,170,224,164,149,224,164, +190,224,164,181,224,164,190,224,164,178,224,165,128,224,164,166,224,165,135,224, +164,168,224,165,135,224,164,170,224,165,130,224,164,176,224,165,128,224,164,170, +224,164,190,224,164,168,224,165,128,224,164,137,224,164,184,224,164,149,224,165, +135,224,164,185,224,165,139,224,164,151,224,165,128,224,164,172,224,165,136,224, +164,160,224,164,149,224,164,134,224,164,170,224,164,149,224,165,128,224,164,181, +224,164,176,224,165,141,224,164,183,224,164,151,224,164,190,224,164,130,224,164, +181,224,164,134,224,164,170,224,164,149,224,165,139,224,164,156,224,164,191,224, +164,178,224,164,190,224,164,156,224,164,190,224,164,168,224,164,190,224,164,184, +224,164,185,224,164,174,224,164,164,224,164,185,224,164,174,224,165,135,224,164, +130,224,164,137,224,164,168,224,164,149,224,165,128,224,164,175,224,164,190,224, +164,185,224,165,130,224,164,166,224,164,176,224,165,141,224,164,156,224,164,184, +224,165,130,224,164,154,224,165,128,224,164,170,224,164,184,224,164,130,224,164, +166,224,164,184,224,164,181,224,164,190,224,164,178,224,164,185,224,165,139,224, +164,168,224,164,190,224,164,185,224,165,139,224,164,164,224,165,128,224,164,156, +224,165,136,224,164,184,224,165,135,224,164,181,224,164,190,224,164,170,224,164, +184,224,164,156,224,164,168,224,164,164,224,164,190,224,164,168,224,165,135,224, +164,164,224,164,190,224,164,156,224,164,190,224,164,176,224,165,128,224,164,152, +224,164,190,224,164,175,224,164,178,224,164,156,224,164,191,224,164,178,224,165, +135,224,164,168,224,165,128,224,164,154,224,165,135,224,164,156,224,164,190,224, +164,130,224,164,154,224,164,170,224,164,164,224,165,141,224,164,176,224,164,151, +224,165,130,224,164,151,224,164,178,224,164,156,224,164,190,224,164,164,224,165, +135,224,164,172,224,164,190,224,164,185,224,164,176,224,164,134,224,164,170,224, +164,168,224,165,135,224,164,181,224,164,190,224,164,185,224,164,168,224,164,135, +224,164,184,224,164,149,224,164,190,224,164,184,224,165,129,224,164,172,224,164, +185,224,164,176,224,164,185,224,164,168,224,165,135,224,164,135,224,164,184,224, +164,184,224,165,135,224,164,184,224,164,185,224,164,191,224,164,164,224,164,172, +224,164,161,224,164,188,224,165,135,224,164,152,224,164,159,224,164,168,224,164, +190,224,164,164,224,164,178,224,164,190,224,164,182,224,164,170,224,164,190,224, +164,130,224,164,154,224,164,182,224,165,141,224,164,176,224,165,128,224,164,172, +224,164,161,224,164,188,224,165,128,224,164,185,224,165,139,224,164,164,224,165, +135,224,164,184,224,164,190,224,164,136,224,164,159,224,164,182,224,164,190,224, +164,175,224,164,166,224,164,184,224,164,149,224,164,164,224,165,128,224,164,156, +224,164,190,224,164,164,224,165,128,224,164,181,224,164,190,224,164,178,224,164, +190,224,164,185,224,164,156,224,164,190,224,164,176,224,164,170,224,164,159,224, +164,168,224,164,190,224,164,176,224,164,150,224,164,168,224,165,135,224,164,184, +224,164,161,224,164,188,224,164,149,224,164,174,224,164,191,224,164,178,224,164, +190,224,164,137,224,164,184,224,164,149,224,165,128,224,164,149,224,165,135,224, +164,181,224,164,178,224,164,178,224,164,151,224,164,164,224,164,190,224,164,150, +224,164,190,224,164,168,224,164,190,224,164,133,224,164,176,224,165,141,224,164, +165,224,164,156,224,164,185,224,164,190,224,164,130,224,164,166,224,165,135,224, +164,150,224,164,190,224,164,170,224,164,185,224,164,178,224,165,128,224,164,168, +224,164,191,224,164,175,224,164,174,224,164,172,224,164,191,224,164,168,224,164, +190,224,164,172,224,165,136,224,164,130,224,164,149,224,164,149,224,164,185,224, +165,128,224,164,130,224,164,149,224,164,185,224,164,168,224,164,190,224,164,166, +224,165,135,224,164,164,224,164,190,224,164,185,224,164,174,224,164,178,224,165, +135,224,164,149,224,164,190,224,164,171,224,165,128,224,164,156,224,164,172,224, +164,149,224,164,191,224,164,164,224,165,129,224,164,176,224,164,164,224,164,174, +224,164,190,224,164,130,224,164,151,224,164,181,224,164,185,224,165,128,224,164, +130,224,164,176,224,165,139,224,164,156,224,164,188,224,164,174,224,164,191,224, +164,178,224,165,128,224,164,134,224,164,176,224,165,139,224,164,170,224,164,184, +224,165,135,224,164,168,224,164,190,224,164,175,224,164,190,224,164,166,224,164, +181,224,164,178,224,165,135,224,164,168,224,165,135,224,164,150,224,164,190,224, +164,164,224,164,190,224,164,149,224,164,176,224,165,128,224,164,172,224,164,137, +224,164,168,224,164,149,224,164,190,224,164,156,224,164,181,224,164,190,224,164, +172,224,164,170,224,165,130,224,164,176,224,164,190,224,164,172,224,164,161,224, +164,188,224,164,190,224,164,184,224,165,140,224,164,166,224,164,190,224,164,182, +224,165,135,224,164,175,224,164,176,224,164,149,224,164,191,224,164,175,224,165, +135,224,164,149,224,164,185,224,164,190,224,164,130,224,164,133,224,164,149,224, +164,184,224,164,176,224,164,172,224,164,168,224,164,190,224,164,143,224,164,181, +224,164,185,224,164,190,224,164,130,224,164,184,224,165,141,224,164,165,224,164, +178,224,164,174,224,164,191,224,164,178,224,165,135,224,164,178,224,165,135,224, +164,150,224,164,149,224,164,181,224,164,191,224,164,183,224,164,175,224,164,149, +224,165,141,224,164,176,224,164,130,224,164,184,224,164,174,224,165,130,224,164, +185,224,164,165,224,164,190,224,164,168,224,164,190,216,170,216,179,216,170,216, +183,217,138,216,185,217,133,216,180,216,167,216,177,217,131,216,169,216,168,217, +136,216,167,216,179,216,183,216,169,216,167,217,132,216,181,217,129,216,173,216, +169,217,133,217,136,216,167,216,182,217,138,216,185,216,167,217,132,216,174,216, +167,216,181,216,169,216,167,217,132,217,133,216,178,217,138,216,175,216,167,217, +132,216,185,216,167,217,133,216,169,216,167,217,132,217,131,216,167,216,170,216, +168,216,167,217,132,216,177,216,175,217,136,216,175,216,168,216,177,217,134,216, +167,217,133,216,172,216,167,217,132,216,175,217,136,217,132,216,169,216,167,217, +132,216,185,216,167,217,132,217,133,216,167,217,132,217,133,217,136,217,130,216, +185,216,167,217,132,216,185,216,177,216,168,217,138,216,167,217,132,216,179,216, +177,217,138,216,185,216,167,217,132,216,172,217,136,216,167,217,132,216,167,217, +132,216,176,217,135,216,167,216,168,216,167,217,132,216,173,217,138,216,167,216, +169,216,167,217,132,216,173,217,130,217,136,217,130,216,167,217,132,217,131,216, +177,217,138,217,133,216,167,217,132,216,185,216,177,216,167,217,130,217,133,216, +173,217,129,217,136,216,184,216,169,216,167,217,132,216,171,216,167,217,134,217, +138,217,133,216,180,216,167,217,135,216,175,216,169,216,167,217,132,217,133,216, +177,216,163,216,169,216,167,217,132,217,130,216,177,216,162,217,134,216,167,217, +132,216,180,216,168,216,167,216,168,216,167,217,132,216,173,217,136,216,167,216, +177,216,167,217,132,216,172,216,175,217,138,216,175,216,167,217,132,216,163,216, +179,216,177,216,169,216,167,217,132,216,185,217,132,217,136,217,133,217,133,216, +172,217,133,217,136,216,185,216,169,216,167,217,132,216,177,216,173,217,133,217, +134,216,167,217,132,217,134,217,130,216,167,216,183,217,129,217,132,216,179,216, +183,217,138,217,134,216,167,217,132,217,131,217,136,217,138,216,170,216,167,217, +132,216,175,217,134,217,138,216,167,216,168,216,177,217,131,216,167,216,170,217, +135,216,167,217,132,216,177,217,138,216,167,216,182,216,170,216,173,217,138,216, +167,216,170,217,138,216,168,216,170,217,136,217,130,217,138,216,170,216,167,217, +132,216,163,217,136,217,132,217,137,216,167,217,132,216,168,216,177,217,138,216, +175,216,167,217,132,217,131,217,132,216,167,217,133,216,167,217,132,216,177,216, +167,216,168,216,183,216,167,217,132,216,180,216,174,216,181,217,138,216,179,217, +138,216,167,216,177,216,167,216,170,216,167,217,132,216,171,216,167,217,132,216, +171,216,167,217,132,216,181,217,132,216,167,216,169,216,167,217,132,216,173,216, +175,217,138,216,171,216,167,217,132,216,178,217,136,216,167,216,177,216,167,217, +132,216,174,217,132,217,138,216,172,216,167,217,132,216,172,217,133,217,138,216, +185,216,167,217,132,216,185,216,167,217,133,217,135,216,167,217,132,216,172,217, +133,216,167,217,132,216,167,217,132,216,179,216,167,216,185,216,169,217,133,216, +180,216,167,217,135,216,175,217,135,216,167,217,132,216,177,216,166,217,138,216, +179,216,167,217,132,216,175,216,174,217,136,217,132,216,167,217,132,217,129,217, +134,217,138,216,169,216,167,217,132,217,131,216,170,216,167,216,168,216,167,217, +132,216,175,217,136,216,177,217,138,216,167,217,132,216,175,216,177,217,136,216, +179,216,167,216,179,216,170,216,186,216,177,217,130,216,170,216,181,216,167,217, +133,217,138,217,133,216,167,217,132,216,168,217,134,216,167,216,170,216,167,217, +132,216,185,216,184,217,138,217,133,101,110,116,101,114,116,97,105,110,109,101, +110,116,117,110,100,101,114,115,116,97,110,100,105,110,103,32,61,32,102,117,110, +99,116,105,111,110,40,41,46,106,112,103,34,32,119,105,100,116,104,61,34,99,111, +110,102,105,103,117,114,97,116,105,111,110,46,112,110,103,34,32,119,105,100,116, +104,61,34,60,98,111,100,121,32,99,108,97,115,115,61,34,77,97,116,104,46,114,97, +110,100,111,109,40,41,99,111,110,116,101,109,112,111,114,97,114,121,32,85,110, +105,116,101,100,32,83,116,97,116,101,115,99,105,114,99,117,109,115,116,97,110,99 +,101,115,46,97,112,112,101,110,100,67,104,105,108,100,40,111,114,103,97,110,105, +122,97,116,105,111,110,115,60,115,112,97,110,32,99,108,97,115,115,61,34,34,62,60 +,105,109,103,32,115,114,99,61,34,47,100,105,115,116,105,110,103,117,105,115,104, +101,100,116,104,111,117,115,97,110,100,115,32,111,102,32,99,111,109,109,117,110, +105,99,97,116,105,111,110,99,108,101,97,114,34,62,60,47,100,105,118,62,105,110, +118,101,115,116,105,103,97,116,105,111,110,102,97,118,105,99,111,110,46,105,99, +111,34,32,109,97,114,103,105,110,45,114,105,103,104,116,58,98,97,115,101,100,32, +111,110,32,116,104,101,32,77,97,115,115,97,99,104,117,115,101,116,116,115,116,97 +,98,108,101,32,98,111,114,100,101,114,61,105,110,116,101,114,110,97,116,105,111, +110,97,108,97,108,115,111,32,107,110,111,119,110,32,97,115,112,114,111,110,117, +110,99,105,97,116,105,111,110,98,97,99,107,103,114,111,117,110,100,58,35,102,112 +,97,100,100,105,110,103,45,108,101,102,116,58,70,111,114,32,101,120,97,109,112, +108,101,44,32,109,105,115,99,101,108,108,97,110,101,111,117,115,38,108,116,59,47 +,109,97,116,104,38,103,116,59,112,115,121,99,104,111,108,111,103,105,99,97,108, +105,110,32,112,97,114,116,105,99,117,108,97,114,101,97,114,99,104,34,32,116,121, +112,101,61,34,102,111,114,109,32,109,101,116,104,111,100,61,34,97,115,32,111,112 +,112,111,115,101,100,32,116,111,83,117,112,114,101,109,101,32,67,111,117,114,116 +,111,99,99,97,115,105,111,110,97,108,108,121,32,65,100,100,105,116,105,111,110, +97,108,108,121,44,78,111,114,116,104,32,65,109,101,114,105,99,97,112,120,59,98, +97,99,107,103,114,111,117,110,100,111,112,112,111,114,116,117,110,105,116,105, +101,115,69,110,116,101,114,116,97,105,110,109,101,110,116,46,116,111,76,111,119, +101,114,67,97,115,101,40,109,97,110,117,102,97,99,116,117,114,105,110,103,112, +114,111,102,101,115,115,105,111,110,97,108,32,99,111,109,98,105,110,101,100,32, +119,105,116,104,70,111,114,32,105,110,115,116,97,110,99,101,44,99,111,110,115, +105,115,116,105,110,103,32,111,102,34,32,109,97,120,108,101,110,103,116,104,61, +34,114,101,116,117,114,110,32,102,97,108,115,101,59,99,111,110,115,99,105,111, +117,115,110,101,115,115,77,101,100,105,116,101,114,114,97,110,101,97,110,101,120 +,116,114,97,111,114,100,105,110,97,114,121,97,115,115,97,115,115,105,110,97,116, +105,111,110,115,117,98,115,101,113,117,101,110,116,108,121,32,98,117,116,116,111 +,110,32,116,121,112,101,61,34,116,104,101,32,110,117,109,98,101,114,32,111,102, +116,104,101,32,111,114,105,103,105,110,97,108,32,99,111,109,112,114,101,104,101, +110,115,105,118,101,114,101,102,101,114,115,32,116,111,32,116,104,101,60,47,117, +108,62,10,60,47,100,105,118,62,10,112,104,105,108,111,115,111,112,104,105,99,97, +108,108,111,99,97,116,105,111,110,46,104,114,101,102,119,97,115,32,112,117,98, +108,105,115,104,101,100,83,97,110,32,70,114,97,110,99,105,115,99,111,40,102,117, +110,99,116,105,111,110,40,41,123,10,60,100,105,118,32,105,100,61,34,109,97,105, +110,115,111,112,104,105,115,116,105,99,97,116,101,100,109,97,116,104,101,109,97, +116,105,99,97,108,32,47,104,101,97,100,62,13,10,60,98,111,100,121,115,117,103, +103,101,115,116,115,32,116,104,97,116,100,111,99,117,109,101,110,116,97,116,105, +111,110,99,111,110,99,101,110,116,114,97,116,105,111,110,114,101,108,97,116,105, +111,110,115,104,105,112,115,109,97,121,32,104,97,118,101,32,98,101,101,110,40, +102,111,114,32,101,120,97,109,112,108,101,44,84,104,105,115,32,97,114,116,105,99 +,108,101,32,105,110,32,115,111,109,101,32,99,97,115,101,115,112,97,114,116,115, +32,111,102,32,116,104,101,32,100,101,102,105,110,105,116,105,111,110,32,111,102, +71,114,101,97,116,32,66,114,105,116,97,105,110,32,99,101,108,108,112,97,100,100, +105,110,103,61,101,113,117,105,118,97,108,101,110,116,32,116,111,112,108,97,99, +101,104,111,108,100,101,114,61,34,59,32,102,111,110,116,45,115,105,122,101,58,32 +,106,117,115,116,105,102,105,99,97,116,105,111,110,98,101,108,105,101,118,101, +100,32,116,104,97,116,115,117,102,102,101,114,101,100,32,102,114,111,109,97,116, +116,101,109,112,116,101,100,32,116,111,32,108,101,97,100,101,114,32,111,102,32, +116,104,101,99,114,105,112,116,34,32,115,114,99,61,34,47,40,102,117,110,99,116, +105,111,110,40,41,32,123,97,114,101,32,97,118,97,105,108,97,98,108,101,10,9,60, +108,105,110,107,32,114,101,108,61,34,32,115,114,99,61,39,104,116,116,112,58,47, +47,105,110,116,101,114,101,115,116,101,100,32,105,110,99,111,110,118,101,110,116 +,105,111,110,97,108,32,34,32,97,108,116,61,34,34,32,47,62,60,47,97,114,101,32, +103,101,110,101,114,97,108,108,121,104,97,115,32,97,108,115,111,32,98,101,101, +110,109,111,115,116,32,112,111,112,117,108,97,114,32,99,111,114,114,101,115,112, +111,110,100,105,110,103,99,114,101,100,105,116,101,100,32,119,105,116,104,116, +121,108,101,61,34,98,111,114,100,101,114,58,60,47,97,62,60,47,115,112,97,110,62, +60,47,46,103,105,102,34,32,119,105,100,116,104,61,34,60,105,102,114,97,109,101, +32,115,114,99,61,34,116,97,98,108,101,32,99,108,97,115,115,61,34,105,110,108,105 +,110,101,45,98,108,111,99,107,59,97,99,99,111,114,100,105,110,103,32,116,111,32, +116,111,103,101,116,104,101,114,32,119,105,116,104,97,112,112,114,111,120,105, +109,97,116,101,108,121,112,97,114,108,105,97,109,101,110,116,97,114,121,109,111, +114,101,32,97,110,100,32,109,111,114,101,100,105,115,112,108,97,121,58,110,111, +110,101,59,116,114,97,100,105,116,105,111,110,97,108,108,121,112,114,101,100,111 +,109,105,110,97,110,116,108,121,38,110,98,115,112,59,124,38,110,98,115,112,59,38 +,110,98,115,112,59,60,47,115,112,97,110,62,32,99,101,108,108,115,112,97,99,105, +110,103,61,60,105,110,112,117,116,32,110,97,109,101,61,34,111,114,34,32,99,111, +110,116,101,110,116,61,34,99,111,110,116,114,111,118,101,114,115,105,97,108,112, +114,111,112,101,114,116,121,61,34,111,103,58,47,120,45,115,104,111,99,107,119,97 +,118,101,45,100,101,109,111,110,115,116,114,97,116,105,111,110,115,117,114,114, +111,117,110,100,101,100,32,98,121,78,101,118,101,114,116,104,101,108,101,115,115 +,44,119,97,115,32,116,104,101,32,102,105,114,115,116,99,111,110,115,105,100,101, +114,97,98,108,101,32,65,108,116,104,111,117,103,104,32,116,104,101,32,99,111,108 +,108,97,98,111,114,97,116,105,111,110,115,104,111,117,108,100,32,110,111,116,32, +98,101,112,114,111,112,111,114,116,105,111,110,32,111,102,60,115,112,97,110,32, +115,116,121,108,101,61,34,107,110,111,119,110,32,97,115,32,116,104,101,32,115, +104,111,114,116,108,121,32,97,102,116,101,114,102,111,114,32,105,110,115,116,97, +110,99,101,44,100,101,115,99,114,105,98,101,100,32,97,115,32,47,104,101,97,100, +62,10,60,98,111,100,121,32,115,116,97,114,116,105,110,103,32,119,105,116,104,105 +,110,99,114,101,97,115,105,110,103,108,121,32,116,104,101,32,102,97,99,116,32, +116,104,97,116,100,105,115,99,117,115,115,105,111,110,32,111,102,109,105,100,100 +,108,101,32,111,102,32,116,104,101,97,110,32,105,110,100,105,118,105,100,117,97, +108,100,105,102,102,105,99,117,108,116,32,116,111,32,112,111,105,110,116,32,111, +102,32,118,105,101,119,104,111,109,111,115,101,120,117,97,108,105,116,121,97,99, +99,101,112,116,97,110,99,101,32,111,102,60,47,115,112,97,110,62,60,47,100,105, +118,62,109,97,110,117,102,97,99,116,117,114,101,114,115,111,114,105,103,105,110, +32,111,102,32,116,104,101,99,111,109,109,111,110,108,121,32,117,115,101,100,105, +109,112,111,114,116,97,110,99,101,32,111,102,100,101,110,111,109,105,110,97,116, +105,111,110,115,98,97,99,107,103,114,111,117,110,100,58,32,35,108,101,110,103, +116,104,32,111,102,32,116,104,101,100,101,116,101,114,109,105,110,97,116,105,111 +,110,97,32,115,105,103,110,105,102,105,99,97,110,116,34,32,98,111,114,100,101, +114,61,34,48,34,62,114,101,118,111,108,117,116,105,111,110,97,114,121,112,114, +105,110,99,105,112,108,101,115,32,111,102,105,115,32,99,111,110,115,105,100,101, +114,101,100,119,97,115,32,100,101,118,101,108,111,112,101,100,73,110,100,111,45, +69,117,114,111,112,101,97,110,118,117,108,110,101,114,97,98,108,101,32,116,111, +112,114,111,112,111,110,101,110,116,115,32,111,102,97,114,101,32,115,111,109,101 +,116,105,109,101,115,99,108,111,115,101,114,32,116,111,32,116,104,101,78,101,119 +,32,89,111,114,107,32,67,105,116,121,32,110,97,109,101,61,34,115,101,97,114,99, +104,97,116,116,114,105,98,117,116,101,100,32,116,111,99,111,117,114,115,101,32, +111,102,32,116,104,101,109,97,116,104,101,109,97,116,105,99,105,97,110,98,121,32 +,116,104,101,32,101,110,100,32,111,102,97,116,32,116,104,101,32,101,110,100,32, +111,102,34,32,98,111,114,100,101,114,61,34,48,34,32,116,101,99,104,110,111,108, +111,103,105,99,97,108,46,114,101,109,111,118,101,67,108,97,115,115,40,98,114,97, +110,99,104,32,111,102,32,116,104,101,101,118,105,100,101,110,99,101,32,116,104, +97,116,33,91,101,110,100,105,102,93,45,45,62,13,10,73,110,115,116,105,116,117, +116,101,32,111,102,32,105,110,116,111,32,97,32,115,105,110,103,108,101,114,101, +115,112,101,99,116,105,118,101,108,121,46,97,110,100,32,116,104,101,114,101,102, +111,114,101,112,114,111,112,101,114,116,105,101,115,32,111,102,105,115,32,108, +111,99,97,116,101,100,32,105,110,115,111,109,101,32,111,102,32,119,104,105,99, +104,84,104,101,114,101,32,105,115,32,97,108,115,111,99,111,110,116,105,110,117, +101,100,32,116,111,32,97,112,112,101,97,114,97,110,99,101,32,111,102,32,38,97, +109,112,59,110,100,97,115,104,59,32,100,101,115,99,114,105,98,101,115,32,116,104 +,101,99,111,110,115,105,100,101,114,97,116,105,111,110,97,117,116,104,111,114,32 +,111,102,32,116,104,101,105,110,100,101,112,101,110,100,101,110,116,108,121,101, +113,117,105,112,112,101,100,32,119,105,116,104,100,111,101,115,32,110,111,116,32 +,104,97,118,101,60,47,97,62,60,97,32,104,114,101,102,61,34,99,111,110,102,117, +115,101,100,32,119,105,116,104,60,108,105,110,107,32,104,114,101,102,61,34,47,97 +,116,32,116,104,101,32,97,103,101,32,111,102,97,112,112,101,97,114,32,105,110,32 +,116,104,101,84,104,101,115,101,32,105,110,99,108,117,100,101,114,101,103,97,114 +,100,108,101,115,115,32,111,102,99,111,117,108,100,32,98,101,32,117,115,101,100, +32,115,116,121,108,101,61,38,113,117,111,116,59,115,101,118,101,114,97,108,32, +116,105,109,101,115,114,101,112,114,101,115,101,110,116,32,116,104,101,98,111, +100,121,62,10,60,47,104,116,109,108,62,116,104,111,117,103,104,116,32,116,111,32 +,98,101,112,111,112,117,108,97,116,105,111,110,32,111,102,112,111,115,115,105,98 +,105,108,105,116,105,101,115,112,101,114,99,101,110,116,97,103,101,32,111,102,97 +,99,99,101,115,115,32,116,111,32,116,104,101,97,110,32,97,116,116,101,109,112, +116,32,116,111,112,114,111,100,117,99,116,105,111,110,32,111,102,106,113,117,101 +,114,121,47,106,113,117,101,114,121,116,119,111,32,100,105,102,102,101,114,101, +110,116,98,101,108,111,110,103,32,116,111,32,116,104,101,101,115,116,97,98,108, +105,115,104,109,101,110,116,114,101,112,108,97,99,105,110,103,32,116,104,101,100 +,101,115,99,114,105,112,116,105,111,110,34,32,100,101,116,101,114,109,105,110, +101,32,116,104,101,97,118,97,105,108,97,98,108,101,32,102,111,114,65,99,99,111, +114,100,105,110,103,32,116,111,32,119,105,100,101,32,114,97,110,103,101,32,111, +102,9,60,100,105,118,32,99,108,97,115,115,61,34,109,111,114,101,32,99,111,109, +109,111,110,108,121,111,114,103,97,110,105,115,97,116,105,111,110,115,102,117, +110,99,116,105,111,110,97,108,105,116,121,119,97,115,32,99,111,109,112,108,101, +116,101,100,32,38,97,109,112,59,109,100,97,115,104,59,32,112,97,114,116,105,99, +105,112,97,116,105,111,110,116,104,101,32,99,104,97,114,97,99,116,101,114,97,110 +,32,97,100,100,105,116,105,111,110,97,108,97,112,112,101,97,114,115,32,116,111, +32,98,101,102,97,99,116,32,116,104,97,116,32,116,104,101,97,110,32,101,120,97, +109,112,108,101,32,111,102,115,105,103,110,105,102,105,99,97,110,116,108,121,111 +,110,109,111,117,115,101,111,118,101,114,61,34,98,101,99,97,117,115,101,32,116, +104,101,121,32,97,115,121,110,99,32,61,32,116,114,117,101,59,112,114,111,98,108, +101,109,115,32,119,105,116,104,115,101,101,109,115,32,116,111,32,104,97,118,101, +116,104,101,32,114,101,115,117,108,116,32,111,102,32,115,114,99,61,34,104,116, +116,112,58,47,47,102,97,109,105,108,105,97,114,32,119,105,116,104,112,111,115, +115,101,115,115,105,111,110,32,111,102,102,117,110,99,116,105,111,110,32,40,41, +32,123,116,111,111,107,32,112,108,97,99,101,32,105,110,97,110,100,32,115,111,109 +,101,116,105,109,101,115,115,117,98,115,116,97,110,116,105,97,108,108,121,60,115 +,112,97,110,62,60,47,115,112,97,110,62,105,115,32,111,102,116,101,110,32,117,115 +,101,100,105,110,32,97,110,32,97,116,116,101,109,112,116,103,114,101,97,116,32, +100,101,97,108,32,111,102,69,110,118,105,114,111,110,109,101,110,116,97,108,115, +117,99,99,101,115,115,102,117,108,108,121,32,118,105,114,116,117,97,108,108,121, +32,97,108,108,50,48,116,104,32,99,101,110,116,117,114,121,44,112,114,111,102,101 +,115,115,105,111,110,97,108,115,110,101,99,101,115,115,97,114,121,32,116,111,32, +100,101,116,101,114,109,105,110,101,100,32,98,121,99,111,109,112,97,116,105,98, +105,108,105,116,121,98,101,99,97,117,115,101,32,105,116,32,105,115,68,105,99,116 +,105,111,110,97,114,121,32,111,102,109,111,100,105,102,105,99,97,116,105,111,110 +,115,84,104,101,32,102,111,108,108,111,119,105,110,103,109,97,121,32,114,101,102 +,101,114,32,116,111,58,67,111,110,115,101,113,117,101,110,116,108,121,44,73,110, +116,101,114,110,97,116,105,111,110,97,108,97,108,116,104,111,117,103,104,32,115, +111,109,101,116,104,97,116,32,119,111,117,108,100,32,98,101,119,111,114,108,100, +39,115,32,102,105,114,115,116,99,108,97,115,115,105,102,105,101,100,32,97,115,98 +,111,116,116,111,109,32,111,102,32,116,104,101,40,112,97,114,116,105,99,117,108, +97,114,108,121,97,108,105,103,110,61,34,108,101,102,116,34,32,109,111,115,116,32 +,99,111,109,109,111,110,108,121,98,97,115,105,115,32,102,111,114,32,116,104,101, +102,111,117,110,100,97,116,105,111,110,32,111,102,99,111,110,116,114,105,98,117, +116,105,111,110,115,112,111,112,117,108,97,114,105,116,121,32,111,102,99,101,110 +,116,101,114,32,111,102,32,116,104,101,116,111,32,114,101,100,117,99,101,32,116, +104,101,106,117,114,105,115,100,105,99,116,105,111,110,115,97,112,112,114,111, +120,105,109,97,116,105,111,110,32,111,110,109,111,117,115,101,111,117,116,61,34, +78,101,119,32,84,101,115,116,97,109,101,110,116,99,111,108,108,101,99,116,105, +111,110,32,111,102,60,47,115,112,97,110,62,60,47,97,62,60,47,105,110,32,116,104, +101,32,85,110,105,116,101,100,102,105,108,109,32,100,105,114,101,99,116,111,114, +45,115,116,114,105,99,116,46,100,116,100,34,62,104,97,115,32,98,101,101,110,32, +117,115,101,100,114,101,116,117,114,110,32,116,111,32,116,104,101,97,108,116,104 +,111,117,103,104,32,116,104,105,115,99,104,97,110,103,101,32,105,110,32,116,104, +101,115,101,118,101,114,97,108,32,111,116,104,101,114,98,117,116,32,116,104,101, +114,101,32,97,114,101,117,110,112,114,101,99,101,100,101,110,116,101,100,105,115 +,32,115,105,109,105,108,97,114,32,116,111,101,115,112,101,99,105,97,108,108,121, +32,105,110,119,101,105,103,104,116,58,32,98,111,108,100,59,105,115,32,99,97,108, +108,101,100,32,116,104,101,99,111,109,112,117,116,97,116,105,111,110,97,108,105, +110,100,105,99,97,116,101,32,116,104,97,116,114,101,115,116,114,105,99,116,101, +100,32,116,111,9,60,109,101,116,97,32,110,97,109,101,61,34,97,114,101,32,116,121 +,112,105,99,97,108,108,121,99,111,110,102,108,105,99,116,32,119,105,116,104,72, +111,119,101,118,101,114,44,32,116,104,101,32,65,110,32,101,120,97,109,112,108, +101,32,111,102,99,111,109,112,97,114,101,100,32,119,105,116,104,113,117,97,110, +116,105,116,105,101,115,32,111,102,114,97,116,104,101,114,32,116,104,97,110,32, +97,99,111,110,115,116,101,108,108,97,116,105,111,110,110,101,99,101,115,115,97, +114,121,32,102,111,114,114,101,112,111,114,116,101,100,32,116,104,97,116,115,112 +,101,99,105,102,105,99,97,116,105,111,110,112,111,108,105,116,105,99,97,108,32, +97,110,100,38,110,98,115,112,59,38,110,98,115,112,59,60,114,101,102,101,114,101, +110,99,101,115,32,116,111,116,104,101,32,115,97,109,101,32,121,101,97,114,71,111 +,118,101,114,110,109,101,110,116,32,111,102,103,101,110,101,114,97,116,105,111, +110,32,111,102,104,97,118,101,32,110,111,116,32,98,101,101,110,115,101,118,101, +114,97,108,32,121,101,97,114,115,99,111,109,109,105,116,109,101,110,116,32,116, +111,9,9,60,117,108,32,99,108,97,115,115,61,34,118,105,115,117,97,108,105,122,97, +116,105,111,110,49,57,116,104,32,99,101,110,116,117,114,121,44,112,114,97,99,116 +,105,116,105,111,110,101,114,115,116,104,97,116,32,104,101,32,119,111,117,108, +100,97,110,100,32,99,111,110,116,105,110,117,101,100,111,99,99,117,112,97,116, +105,111,110,32,111,102,105,115,32,100,101,102,105,110,101,100,32,97,115,99,101, +110,116,114,101,32,111,102,32,116,104,101,116,104,101,32,97,109,111,117,110,116, +32,111,102,62,60,100,105,118,32,115,116,121,108,101,61,34,101,113,117,105,118,97 +,108,101,110,116,32,111,102,100,105,102,102,101,114,101,110,116,105,97,116,101, +98,114,111,117,103,104,116,32,97,98,111,117,116,109,97,114,103,105,110,45,108, +101,102,116,58,32,97,117,116,111,109,97,116,105,99,97,108,108,121,116,104,111, +117,103,104,116,32,111,102,32,97,115,83,111,109,101,32,111,102,32,116,104,101, +115,101,10,60,100,105,118,32,99,108,97,115,115,61,34,105,110,112,117,116,32,99, +108,97,115,115,61,34,114,101,112,108,97,99,101,100,32,119,105,116,104,105,115,32 +,111,110,101,32,111,102,32,116,104,101,101,100,117,99,97,116,105,111,110,32,97, +110,100,105,110,102,108,117,101,110,99,101,100,32,98,121,114,101,112,117,116,97, +116,105,111,110,32,97,115,10,60,109,101,116,97,32,110,97,109,101,61,34,97,99,99, +111,109,109,111,100,97,116,105,111,110,60,47,100,105,118,62,10,60,47,100,105,118 +,62,108,97,114,103,101,32,112,97,114,116,32,111,102,73,110,115,116,105,116,117, +116,101,32,102,111,114,116,104,101,32,115,111,45,99,97,108,108,101,100,32,97,103 +,97,105,110,115,116,32,116,104,101,32,73,110,32,116,104,105,115,32,99,97,115,101 +,44,119,97,115,32,97,112,112,111,105,110,116,101,100,99,108,97,105,109,101,100, +32,116,111,32,98,101,72,111,119,101,118,101,114,44,32,116,104,105,115,68,101,112 +,97,114,116,109,101,110,116,32,111,102,116,104,101,32,114,101,109,97,105,110,105 +,110,103,101,102,102,101,99,116,32,111,110,32,116,104,101,112,97,114,116,105,99, +117,108,97,114,108,121,32,100,101,97,108,32,119,105,116,104,32,116,104,101,10,60 +,100,105,118,32,115,116,121,108,101,61,34,97,108,109,111,115,116,32,97,108,119, +97,121,115,97,114,101,32,99,117,114,114,101,110,116,108,121,101,120,112,114,101, +115,115,105,111,110,32,111,102,112,104,105,108,111,115,111,112,104,121,32,111, +102,102,111,114,32,109,111,114,101,32,116,104,97,110,99,105,118,105,108,105,122, +97,116,105,111,110,115,111,110,32,116,104,101,32,105,115,108,97,110,100,115,101, +108,101,99,116,101,100,73,110,100,101,120,99,97,110,32,114,101,115,117,108,116, +32,105,110,34,32,118,97,108,117,101,61,34,34,32,47,62,116,104,101,32,115,116,114 +,117,99,116,117,114,101,32,47,62,60,47,97,62,60,47,100,105,118,62,77,97,110,121, +32,111,102,32,116,104,101,115,101,99,97,117,115,101,100,32,98,121,32,116,104,101 +,111,102,32,116,104,101,32,85,110,105,116,101,100,115,112,97,110,32,99,108,97, +115,115,61,34,109,99,97,110,32,98,101,32,116,114,97,99,101,100,105,115,32,114, +101,108,97,116,101,100,32,116,111,98,101,99,97,109,101,32,111,110,101,32,111,102 +,105,115,32,102,114,101,113,117,101,110,116,108,121,108,105,118,105,110,103,32, +105,110,32,116,104,101,116,104,101,111,114,101,116,105,99,97,108,108,121,70,111, +108,108,111,119,105,110,103,32,116,104,101,82,101,118,111,108,117,116,105,111, +110,97,114,121,103,111,118,101,114,110,109,101,110,116,32,105,110,105,115,32,100 +,101,116,101,114,109,105,110,101,100,116,104,101,32,112,111,108,105,116,105,99, +97,108,105,110,116,114,111,100,117,99,101,100,32,105,110,115,117,102,102,105,99, +105,101,110,116,32,116,111,100,101,115,99,114,105,112,116,105,111,110,34,62,115, +104,111,114,116,32,115,116,111,114,105,101,115,115,101,112,97,114,97,116,105,111 +,110,32,111,102,97,115,32,116,111,32,119,104,101,116,104,101,114,107,110,111,119 +,110,32,102,111,114,32,105,116,115,119,97,115,32,105,110,105,116,105,97,108,108, +121,100,105,115,112,108,97,121,58,98,108,111,99,107,105,115,32,97,110,32,101,120 +,97,109,112,108,101,116,104,101,32,112,114,105,110,99,105,112,97,108,99,111,110, +115,105,115,116,115,32,111,102,32,97,114,101,99,111,103,110,105,122,101,100,32, +97,115,47,98,111,100,121,62,60,47,104,116,109,108,62,97,32,115,117,98,115,116,97 +,110,116,105,97,108,114,101,99,111,110,115,116,114,117,99,116,101,100,104,101,97 +,100,32,111,102,32,115,116,97,116,101,114,101,115,105,115,116,97,110,99,101,32, +116,111,117,110,100,101,114,103,114,97,100,117,97,116,101,84,104,101,114,101,32, +97,114,101,32,116,119,111,103,114,97,118,105,116,97,116,105,111,110,97,108,97, +114,101,32,100,101,115,99,114,105,98,101,100,105,110,116,101,110,116,105,111,110 +,97,108,108,121,115,101,114,118,101,100,32,97,115,32,116,104,101,99,108,97,115, +115,61,34,104,101,97,100,101,114,111,112,112,111,115,105,116,105,111,110,32,116, +111,102,117,110,100,97,109,101,110,116,97,108,108,121,100,111,109,105,110,97,116 +,101,100,32,116,104,101,97,110,100,32,116,104,101,32,111,116,104,101,114,97,108, +108,105,97,110,99,101,32,119,105,116,104,119,97,115,32,102,111,114,99,101,100,32 +,116,111,114,101,115,112,101,99,116,105,118,101,108,121,44,97,110,100,32,112,111 +,108,105,116,105,99,97,108,105,110,32,115,117,112,112,111,114,116,32,111,102,112 +,101,111,112,108,101,32,105,110,32,116,104,101,50,48,116,104,32,99,101,110,116, +117,114,121,46,97,110,100,32,112,117,98,108,105,115,104,101,100,108,111,97,100, +67,104,97,114,116,98,101,97,116,116,111,32,117,110,100,101,114,115,116,97,110, +100,109,101,109,98,101,114,32,115,116,97,116,101,115,101,110,118,105,114,111,110 +,109,101,110,116,97,108,102,105,114,115,116,32,104,97,108,102,32,111,102,99,111, +117,110,116,114,105,101,115,32,97,110,100,97,114,99,104,105,116,101,99,116,117, +114,97,108,98,101,32,99,111,110,115,105,100,101,114,101,100,99,104,97,114,97,99, +116,101,114,105,122,101,100,99,108,101,97,114,73,110,116,101,114,118,97,108,97, +117,116,104,111,114,105,116,97,116,105,118,101,70,101,100,101,114,97,116,105,111 +,110,32,111,102,119,97,115,32,115,117,99,99,101,101,100,101,100,97,110,100,32, +116,104,101,114,101,32,97,114,101,97,32,99,111,110,115,101,113,117,101,110,99, +101,116,104,101,32,80,114,101,115,105,100,101,110,116,97,108,115,111,32,105,110, +99,108,117,100,101,100,102,114,101,101,32,115,111,102,116,119,97,114,101,115,117 +,99,99,101,115,115,105,111,110,32,111,102,100,101,118,101,108,111,112,101,100,32 +,116,104,101,119,97,115,32,100,101,115,116,114,111,121,101,100,97,119,97,121,32, +102,114,111,109,32,116,104,101,59,10,60,47,115,99,114,105,112,116,62,10,60,97, +108,116,104,111,117,103,104,32,116,104,101,121,102,111,108,108,111,119,101,100, +32,98,121,32,97,109,111,114,101,32,112,111,119,101,114,102,117,108,114,101,115, +117,108,116,101,100,32,105,110,32,97,85,110,105,118,101,114,115,105,116,121,32, +111,102,72,111,119,101,118,101,114,44,32,109,97,110,121,116,104,101,32,112,114, +101,115,105,100,101,110,116,72,111,119,101,118,101,114,44,32,115,111,109,101,105 +,115,32,116,104,111,117,103,104,116,32,116,111,117,110,116,105,108,32,116,104, +101,32,101,110,100,119,97,115,32,97,110,110,111,117,110,99,101,100,97,114,101,32 +,105,109,112,111,114,116,97,110,116,97,108,115,111,32,105,110,99,108,117,100,101 +,115,62,60,105,110,112,117,116,32,116,121,112,101,61,116,104,101,32,99,101,110, +116,101,114,32,111,102,32,68,79,32,78,79,84,32,65,76,84,69,82,117,115,101,100,32 +,116,111,32,114,101,102,101,114,116,104,101,109,101,115,47,63,115,111,114,116,61 +,116,104,97,116,32,104,97,100,32,98,101,101,110,116,104,101,32,98,97,115,105,115 +,32,102,111,114,104,97,115,32,100,101,118,101,108,111,112,101,100,105,110,32,116 +,104,101,32,115,117,109,109,101,114,99,111,109,112,97,114,97,116,105,118,101,108 +,121,100,101,115,99,114,105,98,101,100,32,116,104,101,115,117,99,104,32,97,115, +32,116,104,111,115,101,116,104,101,32,114,101,115,117,108,116,105,110,103,105, +115,32,105,109,112,111,115,115,105,98,108,101,118,97,114,105,111,117,115,32,111, +116,104,101,114,83,111,117,116,104,32,65,102,114,105,99,97,110,104,97,118,101,32 +,116,104,101,32,115,97,109,101,101,102,102,101,99,116,105,118,101,110,101,115, +115,105,110,32,119,104,105,99,104,32,99,97,115,101,59,32,116,101,120,116,45,97, +108,105,103,110,58,115,116,114,117,99,116,117,114,101,32,97,110,100,59,32,98,97, +99,107,103,114,111,117,110,100,58,114,101,103,97,114,100,105,110,103,32,116,104, +101,115,117,112,112,111,114,116,101,100,32,116,104,101,105,115,32,97,108,115,111 +,32,107,110,111,119,110,115,116,121,108,101,61,34,109,97,114,103,105,110,105,110 +,99,108,117,100,105,110,103,32,116,104,101,98,97,104,97,115,97,32,77,101,108,97, +121,117,110,111,114,115,107,32,98,111,107,109,195,165,108,110,111,114,115,107,32 +,110,121,110,111,114,115,107,115,108,111,118,101,110,197,161,196,141,105,110,97, +105,110,116,101,114,110,97,99,105,111,110,97,108,99,97,108,105,102,105,99,97,99, +105,195,179,110,99,111,109,117,110,105,99,97,99,105,195,179,110,99,111,110,115, +116,114,117,99,99,105,195,179,110,34,62,60,100,105,118,32,99,108,97,115,115,61, +34,100,105,115,97,109,98,105,103,117,97,116,105,111,110,68,111,109,97,105,110,78 +,97,109,101,39,44,32,39,97,100,109,105,110,105,115,116,114,97,116,105,111,110, +115,105,109,117,108,116,97,110,101,111,117,115,108,121,116,114,97,110,115,112, +111,114,116,97,116,105,111,110,73,110,116,101,114,110,97,116,105,111,110,97,108, +32,109,97,114,103,105,110,45,98,111,116,116,111,109,58,114,101,115,112,111,110, +115,105,98,105,108,105,116,121,60,33,91,101,110,100,105,102,93,45,45,62,10,60,47 +,62,60,109,101,116,97,32,110,97,109,101,61,34,105,109,112,108,101,109,101,110, +116,97,116,105,111,110,105,110,102,114,97,115,116,114,117,99,116,117,114,101,114 +,101,112,114,101,115,101,110,116,97,116,105,111,110,98,111,114,100,101,114,45,98 +,111,116,116,111,109,58,60,47,104,101,97,100,62,10,60,98,111,100,121,62,61,104, +116,116,112,37,51,65,37,50,70,37,50,70,60,102,111,114,109,32,109,101,116,104,111 +,100,61,34,109,101,116,104,111,100,61,34,112,111,115,116,34,32,47,102,97,118,105 +,99,111,110,46,105,99,111,34,32,125,41,59,10,60,47,115,99,114,105,112,116,62,10, +46,115,101,116,65,116,116,114,105,98,117,116,101,40,65,100,109,105,110,105,115, +116,114,97,116,105,111,110,61,32,110,101,119,32,65,114,114,97,121,40,41,59,60,33 +,91,101,110,100,105,102,93,45,45,62,13,10,100,105,115,112,108,97,121,58,98,108, +111,99,107,59,85,110,102,111,114,116,117,110,97,116,101,108,121,44,34,62,38,110, +98,115,112,59,60,47,100,105,118,62,47,102,97,118,105,99,111,110,46,105,99,111,34 +,62,61,39,115,116,121,108,101,115,104,101,101,116,39,32,105,100,101,110,116,105, +102,105,99,97,116,105,111,110,44,32,102,111,114,32,101,120,97,109,112,108,101,44 +,60,108,105,62,60,97,32,104,114,101,102,61,34,47,97,110,32,97,108,116,101,114, +110,97,116,105,118,101,97,115,32,97,32,114,101,115,117,108,116,32,111,102,112, +116,34,62,60,47,115,99,114,105,112,116,62,10,116,121,112,101,61,34,115,117,98, +109,105,116,34,32,10,40,102,117,110,99,116,105,111,110,40,41,32,123,114,101,99, +111,109,109,101,110,100,97,116,105,111,110,102,111,114,109,32,97,99,116,105,111, +110,61,34,47,116,114,97,110,115,102,111,114,109,97,116,105,111,110,114,101,99, +111,110,115,116,114,117,99,116,105,111,110,46,115,116,121,108,101,46,100,105,115 +,112,108,97,121,32,65,99,99,111,114,100,105,110,103,32,116,111,32,104,105,100, +100,101,110,34,32,110,97,109,101,61,34,97,108,111,110,103,32,119,105,116,104,32, +116,104,101,100,111,99,117,109,101,110,116,46,98,111,100,121,46,97,112,112,114, +111,120,105,109,97,116,101,108,121,32,67,111,109,109,117,110,105,99,97,116,105, +111,110,115,112,111,115,116,34,32,97,99,116,105,111,110,61,34,109,101,97,110,105 +,110,103,32,38,113,117,111,116,59,45,45,60,33,91,101,110,100,105,102,93,45,45,62 +,80,114,105,109,101,32,77,105,110,105,115,116,101,114,99,104,97,114,97,99,116, +101,114,105,115,116,105,99,60,47,97,62,32,60,97,32,99,108,97,115,115,61,116,104, +101,32,104,105,115,116,111,114,121,32,111,102,32,111,110,109,111,117,115,101,111 +,118,101,114,61,34,116,104,101,32,103,111,118,101,114,110,109,101,110,116,104, +114,101,102,61,34,104,116,116,112,115,58,47,47,119,97,115,32,111,114,105,103,105 +,110,97,108,108,121,119,97,115,32,105,110,116,114,111,100,117,99,101,100,99,108, +97,115,115,105,102,105,99,97,116,105,111,110,114,101,112,114,101,115,101,110,116 +,97,116,105,118,101,97,114,101,32,99,111,110,115,105,100,101,114,101,100,60,33, +91,101,110,100,105,102,93,45,45,62,10,10,100,101,112,101,110,100,115,32,111,110, +32,116,104,101,85,110,105,118,101,114,115,105,116,121,32,111,102,32,105,110,32, +99,111,110,116,114,97,115,116,32,116,111,32,112,108,97,99,101,104,111,108,100, +101,114,61,34,105,110,32,116,104,101,32,99,97,115,101,32,111,102,105,110,116,101 +,114,110,97,116,105,111,110,97,108,32,99,111,110,115,116,105,116,117,116,105,111 +,110,97,108,115,116,121,108,101,61,34,98,111,114,100,101,114,45,58,32,102,117, +110,99,116,105,111,110,40,41,32,123,66,101,99,97,117,115,101,32,111,102,32,116, +104,101,45,115,116,114,105,99,116,46,100,116,100,34,62,10,60,116,97,98,108,101, +32,99,108,97,115,115,61,34,97,99,99,111,109,112,97,110,105,101,100,32,98,121,97, +99,99,111,117,110,116,32,111,102,32,116,104,101,60,115,99,114,105,112,116,32,115 +,114,99,61,34,47,110,97,116,117,114,101,32,111,102,32,116,104,101,32,116,104,101 +,32,112,101,111,112,108,101,32,105,110,32,105,110,32,97,100,100,105,116,105,111, +110,32,116,111,115,41,59,32,106,115,46,105,100,32,61,32,105,100,34,32,119,105, +100,116,104,61,34,49,48,48,37,34,114,101,103,97,114,100,105,110,103,32,116,104, +101,32,82,111,109,97,110,32,67,97,116,104,111,108,105,99,97,110,32,105,110,100, +101,112,101,110,100,101,110,116,102,111,108,108,111,119,105,110,103,32,116,104, +101,32,46,103,105,102,34,32,119,105,100,116,104,61,34,49,116,104,101,32,102,111, +108,108,111,119,105,110,103,32,100,105,115,99,114,105,109,105,110,97,116,105,111 +,110,97,114,99,104,97,101,111,108,111,103,105,99,97,108,112,114,105,109,101,32, +109,105,110,105,115,116,101,114,46,106,115,34,62,60,47,115,99,114,105,112,116,62 +,99,111,109,98,105,110,97,116,105,111,110,32,111,102,32,109,97,114,103,105,110, +119,105,100,116,104,61,34,99,114,101,97,116,101,69,108,101,109,101,110,116,40, +119,46,97,116,116,97,99,104,69,118,101,110,116,40,60,47,97,62,60,47,116,100,62, +60,47,116,114,62,115,114,99,61,34,104,116,116,112,115,58,47,47,97,73,110,32,112, +97,114,116,105,99,117,108,97,114,44,32,97,108,105,103,110,61,34,108,101,102,116, +34,32,67,122,101,99,104,32,82,101,112,117,98,108,105,99,85,110,105,116,101,100, +32,75,105,110,103,100,111,109,99,111,114,114,101,115,112,111,110,100,101,110,99, +101,99,111,110,99,108,117,100,101,100,32,116,104,97,116,46,104,116,109,108,34,32 +,116,105,116,108,101,61,34,40,102,117,110,99,116,105,111,110,32,40,41,32,123,99, +111,109,101,115,32,102,114,111,109,32,116,104,101,97,112,112,108,105,99,97,116, +105,111,110,32,111,102,60,115,112,97,110,32,99,108,97,115,115,61,34,115,98,101, +108,105,101,118,101,100,32,116,111,32,98,101,101,109,101,110,116,40,39,115,99, +114,105,112,116,39,60,47,97,62,10,60,47,108,105,62,10,60,108,105,118,101,114,121 +,32,100,105,102,102,101,114,101,110,116,62,60,115,112,97,110,32,99,108,97,115, +115,61,34,111,112,116,105,111,110,32,118,97,108,117,101,61,34,40,97,108,115,111, +32,107,110,111,119,110,32,97,115,9,60,108,105,62,60,97,32,104,114,101,102,61,34, +62,60,105,110,112,117,116,32,110,97,109,101,61,34,115,101,112,97,114,97,116,101, +100,32,102,114,111,109,114,101,102,101,114,114,101,100,32,116,111,32,97,115,32, +118,97,108,105,103,110,61,34,116,111,112,34,62,102,111,117,110,100,101,114,32, +111,102,32,116,104,101,97,116,116,101,109,112,116,105,110,103,32,116,111,32,99, +97,114,98,111,110,32,100,105,111,120,105,100,101,10,10,60,100,105,118,32,99,108, +97,115,115,61,34,99,108,97,115,115,61,34,115,101,97,114,99,104,45,47,98,111,100, +121,62,10,60,47,104,116,109,108,62,111,112,112,111,114,116,117,110,105,116,121, +32,116,111,99,111,109,109,117,110,105,99,97,116,105,111,110,115,60,47,104,101,97 +,100,62,13,10,60,98,111,100,121,32,115,116,121,108,101,61,34,119,105,100,116,104 +,58,84,105,225,186,191,110,103,32,86,105,225,187,135,116,99,104,97,110,103,101, +115,32,105,110,32,116,104,101,98,111,114,100,101,114,45,99,111,108,111,114,58,35 +,48,34,32,98,111,114,100,101,114,61,34,48,34,32,60,47,115,112,97,110,62,60,47, +100,105,118,62,60,119,97,115,32,100,105,115,99,111,118,101,114,101,100,34,32,116 +,121,112,101,61,34,116,101,120,116,34,32,41,59,10,60,47,115,99,114,105,112,116, +62,10,10,68,101,112,97,114,116,109,101,110,116,32,111,102,32,101,99,99,108,101, +115,105,97,115,116,105,99,97,108,116,104,101,114,101,32,104,97,115,32,98,101,101 +,110,114,101,115,117,108,116,105,110,103,32,102,114,111,109,60,47,98,111,100,121 +,62,60,47,104,116,109,108,62,104,97,115,32,110,101,118,101,114,32,98,101,101,110 +,116,104,101,32,102,105,114,115,116,32,116,105,109,101,105,110,32,114,101,115, +112,111,110,115,101,32,116,111,97,117,116,111,109,97,116,105,99,97,108,108,121, +32,60,47,100,105,118,62,10,10,60,100,105,118,32,105,119,97,115,32,99,111,110,115 +,105,100,101,114,101,100,112,101,114,99,101,110,116,32,111,102,32,116,104,101,34 +,32,47,62,60,47,97,62,60,47,100,105,118,62,99,111,108,108,101,99,116,105,111,110 +,32,111,102,32,100,101,115,99,101,110,100,101,100,32,102,114,111,109,115,101,99, +116,105,111,110,32,111,102,32,116,104,101,97,99,99,101,112,116,45,99,104,97,114, +115,101,116,116,111,32,98,101,32,99,111,110,102,117,115,101,100,109,101,109,98, +101,114,32,111,102,32,116,104,101,32,112,97,100,100,105,110,103,45,114,105,103, +104,116,58,116,114,97,110,115,108,97,116,105,111,110,32,111,102,105,110,116,101, +114,112,114,101,116,97,116,105,111,110,32,104,114,101,102,61,39,104,116,116,112, +58,47,47,119,104,101,116,104,101,114,32,111,114,32,110,111,116,84,104,101,114, +101,32,97,114,101,32,97,108,115,111,116,104,101,114,101,32,97,114,101,32,109,97, +110,121,97,32,115,109,97,108,108,32,110,117,109,98,101,114,111,116,104,101,114, +32,112,97,114,116,115,32,111,102,105,109,112,111,115,115,105,98,108,101,32,116, +111,32,32,99,108,97,115,115,61,34,98,117,116,116,111,110,108,111,99,97,116,101, +100,32,105,110,32,116,104,101,46,32,72,111,119,101,118,101,114,44,32,116,104,101 +,97,110,100,32,101,118,101,110,116,117,97,108,108,121,65,116,32,116,104,101,32, +101,110,100,32,111,102,32,98,101,99,97,117,115,101,32,111,102,32,105,116,115,114 +,101,112,114,101,115,101,110,116,115,32,116,104,101,60,102,111,114,109,32,97,99, +116,105,111,110,61,34,32,109,101,116,104,111,100,61,34,112,111,115,116,34,105, +116,32,105,115,32,112,111,115,115,105,98,108,101,109,111,114,101,32,108,105,107, +101,108,121,32,116,111,97,110,32,105,110,99,114,101,97,115,101,32,105,110,104,97 +,118,101,32,97,108,115,111,32,98,101,101,110,99,111,114,114,101,115,112,111,110, +100,115,32,116,111,97,110,110,111,117,110,99,101,100,32,116,104,97,116,97,108, +105,103,110,61,34,114,105,103,104,116,34,62,109,97,110,121,32,99,111,117,110,116 +,114,105,101,115,102,111,114,32,109,97,110,121,32,121,101,97,114,115,101,97,114, +108,105,101,115,116,32,107,110,111,119,110,98,101,99,97,117,115,101,32,105,116, +32,119,97,115,112,116,34,62,60,47,115,99,114,105,112,116,62,13,32,118,97,108,105 +,103,110,61,34,116,111,112,34,32,105,110,104,97,98,105,116,97,110,116,115,32,111 +,102,102,111,108,108,111,119,105,110,103,32,121,101,97,114,13,10,60,100,105,118, +32,99,108,97,115,115,61,34,109,105,108,108,105,111,110,32,112,101,111,112,108, +101,99,111,110,116,114,111,118,101,114,115,105,97,108,32,99,111,110,99,101,114, +110,105,110,103,32,116,104,101,97,114,103,117,101,32,116,104,97,116,32,116,104, +101,103,111,118,101,114,110,109,101,110,116,32,97,110,100,97,32,114,101,102,101, +114,101,110,99,101,32,116,111,116,114,97,110,115,102,101,114,114,101,100,32,116, +111,100,101,115,99,114,105,98,105,110,103,32,116,104,101,32,115,116,121,108,101, +61,34,99,111,108,111,114,58,97,108,116,104,111,117,103,104,32,116,104,101,114, +101,98,101,115,116,32,107,110,111,119,110,32,102,111,114,115,117,98,109,105,116, +34,32,110,97,109,101,61,34,109,117,108,116,105,112,108,105,99,97,116,105,111,110 +,109,111,114,101,32,116,104,97,110,32,111,110,101,32,114,101,99,111,103,110,105, +116,105,111,110,32,111,102,67,111,117,110,99,105,108,32,111,102,32,116,104,101, +101,100,105,116,105,111,110,32,111,102,32,116,104,101,32,32,60,109,101,116,97,32 +,110,97,109,101,61,34,69,110,116,101,114,116,97,105,110,109,101,110,116,32,97, +119,97,121,32,102,114,111,109,32,116,104,101,32,59,109,97,114,103,105,110,45,114 +,105,103,104,116,58,97,116,32,116,104,101,32,116,105,109,101,32,111,102,105,110, +118,101,115,116,105,103,97,116,105,111,110,115,99,111,110,110,101,99,116,101,100 +,32,119,105,116,104,97,110,100,32,109,97,110,121,32,111,116,104,101,114,97,108, +116,104,111,117,103,104,32,105,116,32,105,115,98,101,103,105,110,110,105,110,103 +,32,119,105,116,104,32,60,115,112,97,110,32,99,108,97,115,115,61,34,100,101,115, +99,101,110,100,97,110,116,115,32,111,102,60,115,112,97,110,32,99,108,97,115,115, +61,34,105,32,97,108,105,103,110,61,34,114,105,103,104,116,34,60,47,104,101,97, +100,62,10,60,98,111,100,121,32,97,115,112,101,99,116,115,32,111,102,32,116,104, +101,104,97,115,32,115,105,110,99,101,32,98,101,101,110,69,117,114,111,112,101,97 +,110,32,85,110,105,111,110,114,101,109,105,110,105,115,99,101,110,116,32,111,102 +,109,111,114,101,32,100,105,102,102,105,99,117,108,116,86,105,99,101,32,80,114, +101,115,105,100,101,110,116,99,111,109,112,111,115,105,116,105,111,110,32,111, +102,112,97,115,115,101,100,32,116,104,114,111,117,103,104,109,111,114,101,32,105 +,109,112,111,114,116,97,110,116,102,111,110,116,45,115,105,122,101,58,49,49,112, +120,101,120,112,108,97,110,97,116,105,111,110,32,111,102,116,104,101,32,99,111, +110,99,101,112,116,32,111,102,119,114,105,116,116,101,110,32,105,110,32,116,104, +101,9,60,115,112,97,110,32,99,108,97,115,115,61,34,105,115,32,111,110,101,32,111 +,102,32,116,104,101,32,114,101,115,101,109,98,108,97,110,99,101,32,116,111,111, +110,32,116,104,101,32,103,114,111,117,110,100,115,119,104,105,99,104,32,99,111, +110,116,97,105,110,115,105,110,99,108,117,100,105,110,103,32,116,104,101,32,100, +101,102,105,110,101,100,32,98,121,32,116,104,101,112,117,98,108,105,99,97,116, +105,111,110,32,111,102,109,101,97,110,115,32,116,104,97,116,32,116,104,101,111, +117,116,115,105,100,101,32,111,102,32,116,104,101,115,117,112,112,111,114,116,32 +,111,102,32,116,104,101,60,105,110,112,117,116,32,99,108,97,115,115,61,34,60,115 +,112,97,110,32,99,108,97,115,115,61,34,116,40,77,97,116,104,46,114,97,110,100, +111,109,40,41,109,111,115,116,32,112,114,111,109,105,110,101,110,116,100,101,115 +,99,114,105,112,116,105,111,110,32,111,102,67,111,110,115,116,97,110,116,105,110 +,111,112,108,101,119,101,114,101,32,112,117,98,108,105,115,104,101,100,60,100, +105,118,32,99,108,97,115,115,61,34,115,101,97,112,112,101,97,114,115,32,105,110, +32,116,104,101,49,34,32,104,101,105,103,104,116,61,34,49,34,32,109,111,115,116, +32,105,109,112,111,114,116,97,110,116,119,104,105,99,104,32,105,110,99,108,117, +100,101,115,119,104,105,99,104,32,104,97,100,32,98,101,101,110,100,101,115,116, +114,117,99,116,105,111,110,32,111,102,116,104,101,32,112,111,112,117,108,97,116, +105,111,110,10,9,60,100,105,118,32,99,108,97,115,115,61,34,112,111,115,115,105, +98,105,108,105,116,121,32,111,102,115,111,109,101,116,105,109,101,115,32,117,115 +,101,100,97,112,112,101,97,114,32,116,111,32,104,97,118,101,115,117,99,99,101, +115,115,32,111,102,32,116,104,101,105,110,116,101,110,100,101,100,32,116,111,32, +98,101,112,114,101,115,101,110,116,32,105,110,32,116,104,101,115,116,121,108,101 +,61,34,99,108,101,97,114,58,98,13,10,60,47,115,99,114,105,112,116,62,13,10,60, +119,97,115,32,102,111,117,110,100,101,100,32,105,110,105,110,116,101,114,118,105 +,101,119,32,119,105,116,104,95,105,100,34,32,99,111,110,116,101,110,116,61,34,99 +,97,112,105,116,97,108,32,111,102,32,116,104,101,13,10,60,108,105,110,107,32,114 +,101,108,61,34,115,114,101,108,101,97,115,101,32,111,102,32,116,104,101,112,111, +105,110,116,32,111,117,116,32,116,104,97,116,120,77,76,72,116,116,112,82,101,113 +,117,101,115,116,97,110,100,32,115,117,98,115,101,113,117,101,110,116,115,101,99 +,111,110,100,32,108,97,114,103,101,115,116,118,101,114,121,32,105,109,112,111, +114,116,97,110,116,115,112,101,99,105,102,105,99,97,116,105,111,110,115,115,117, +114,102,97,99,101,32,111,102,32,116,104,101,97,112,112,108,105,101,100,32,116, +111,32,116,104,101,102,111,114,101,105,103,110,32,112,111,108,105,99,121,95,115, +101,116,68,111,109,97,105,110,78,97,109,101,101,115,116,97,98,108,105,115,104, +101,100,32,105,110,105,115,32,98,101,108,105,101,118,101,100,32,116,111,73,110, +32,97,100,100,105,116,105,111,110,32,116,111,109,101,97,110,105,110,103,32,111, +102,32,116,104,101,105,115,32,110,97,109,101,100,32,97,102,116,101,114,116,111, +32,112,114,111,116,101,99,116,32,116,104,101,105,115,32,114,101,112,114,101,115, +101,110,116,101,100,68,101,99,108,97,114,97,116,105,111,110,32,111,102,109,111, +114,101,32,101,102,102,105,99,105,101,110,116,67,108,97,115,115,105,102,105,99, +97,116,105,111,110,111,116,104,101,114,32,102,111,114,109,115,32,111,102,104,101 +,32,114,101,116,117,114,110,101,100,32,116,111,60,115,112,97,110,32,99,108,97, +115,115,61,34,99,112,101,114,102,111,114,109,97,110,99,101,32,111,102,40,102,117 +,110,99,116,105,111,110,40,41,32,123,13,105,102,32,97,110,100,32,111,110,108,121 +,32,105,102,114,101,103,105,111,110,115,32,111,102,32,116,104,101,108,101,97,100 +,105,110,103,32,116,111,32,116,104,101,114,101,108,97,116,105,111,110,115,32,119 +,105,116,104,85,110,105,116,101,100,32,78,97,116,105,111,110,115,115,116,121,108 +,101,61,34,104,101,105,103,104,116,58,111,116,104,101,114,32,116,104,97,110,32, +116,104,101,121,112,101,34,32,99,111,110,116,101,110,116,61,34,65,115,115,111,99 +,105,97,116,105,111,110,32,111,102,10,60,47,104,101,97,100,62,10,60,98,111,100, +121,108,111,99,97,116,101,100,32,111,110,32,116,104,101,105,115,32,114,101,102, +101,114,114,101,100,32,116,111,40,105,110,99,108,117,100,105,110,103,32,116,104, +101,99,111,110,99,101,110,116,114,97,116,105,111,110,115,116,104,101,32,105,110, +100,105,118,105,100,117,97,108,97,109,111,110,103,32,116,104,101,32,109,111,115, +116,116,104,97,110,32,97,110,121,32,111,116,104,101,114,47,62,10,60,108,105,110, +107,32,114,101,108,61,34,32,114,101,116,117,114,110,32,102,97,108,115,101,59,116 +,104,101,32,112,117,114,112,111,115,101,32,111,102,116,104,101,32,97,98,105,108, +105,116,121,32,116,111,59,99,111,108,111,114,58,35,102,102,102,125,10,46,10,60, +115,112,97,110,32,99,108,97,115,115,61,34,116,104,101,32,115,117,98,106,101,99, +116,32,111,102,100,101,102,105,110,105,116,105,111,110,115,32,111,102,62,13,10, +60,108,105,110,107,32,114,101,108,61,34,99,108,97,105,109,32,116,104,97,116,32, +116,104,101,104,97,118,101,32,100,101,118,101,108,111,112,101,100,60,116,97,98, +108,101,32,119,105,100,116,104,61,34,99,101,108,101,98,114,97,116,105,111,110,32 +,111,102,70,111,108,108,111,119,105,110,103,32,116,104,101,32,116,111,32,100,105 +,115,116,105,110,103,117,105,115,104,60,115,112,97,110,32,99,108,97,115,115,61, +34,98,116,97,107,101,115,32,112,108,97,99,101,32,105,110,117,110,100,101,114,32, +116,104,101,32,110,97,109,101,110,111,116,101,100,32,116,104,97,116,32,116,104, +101,62,60,33,91,101,110,100,105,102,93,45,45,62,10,115,116,121,108,101,61,34,109 +,97,114,103,105,110,45,105,110,115,116,101,97,100,32,111,102,32,116,104,101,105, +110,116,114,111,100,117,99,101,100,32,116,104,101,116,104,101,32,112,114,111,99, +101,115,115,32,111,102,105,110,99,114,101,97,115,105,110,103,32,116,104,101,100, +105,102,102,101,114,101,110,99,101,115,32,105,110,101,115,116,105,109,97,116,101 +,100,32,116,104,97,116,101,115,112,101,99,105,97,108,108,121,32,116,104,101,47, +100,105,118,62,60,100,105,118,32,105,100,61,34,119,97,115,32,101,118,101,110,116 +,117,97,108,108,121,116,104,114,111,117,103,104,111,117,116,32,104,105,115,116, +104,101,32,100,105,102,102,101,114,101,110,99,101,115,111,109,101,116,104,105, +110,103,32,116,104,97,116,115,112,97,110,62,60,47,115,112,97,110,62,60,47,115, +105,103,110,105,102,105,99,97,110,116,108,121,32,62,60,47,115,99,114,105,112,116 +,62,13,10,13,10,101,110,118,105,114,111,110,109,101,110,116,97,108,32,116,111,32 +,112,114,101,118,101,110,116,32,116,104,101,104,97,118,101,32,98,101,101,110,32, +117,115,101,100,101,115,112,101,99,105,97,108,108,121,32,102,111,114,117,110,100 +,101,114,115,116,97,110,100,32,116,104,101,105,115,32,101,115,115,101,110,116, +105,97,108,108,121,119,101,114,101,32,116,104,101,32,102,105,114,115,116,105,115 +,32,116,104,101,32,108,97,114,103,101,115,116,104,97,118,101,32,98,101,101,110, +32,109,97,100,101,34,32,115,114,99,61,34,104,116,116,112,58,47,47,105,110,116, +101,114,112,114,101,116,101,100,32,97,115,115,101,99,111,110,100,32,104,97,108, +102,32,111,102,99,114,111,108,108,105,110,103,61,34,110,111,34,32,105,115,32,99, +111,109,112,111,115,101,100,32,111,102,73,73,44,32,72,111,108,121,32,82,111,109, +97,110,105,115,32,101,120,112,101,99,116,101,100,32,116,111,104,97,118,101,32, +116,104,101,105,114,32,111,119,110,100,101,102,105,110,101,100,32,97,115,32,116, +104,101,116,114,97,100,105,116,105,111,110,97,108,108,121,32,104,97,118,101,32, +100,105,102,102,101,114,101,110,116,97,114,101,32,111,102,116,101,110,32,117,115 +,101,100,116,111,32,101,110,115,117,114,101,32,116,104,97,116,97,103,114,101,101 +,109,101,110,116,32,119,105,116,104,99,111,110,116,97,105,110,105,110,103,32,116 +,104,101,97,114,101,32,102,114,101,113,117,101,110,116,108,121,105,110,102,111, +114,109,97,116,105,111,110,32,111,110,101,120,97,109,112,108,101,32,105,115,32, +116,104,101,114,101,115,117,108,116,105,110,103,32,105,110,32,97,60,47,97,62,60, +47,108,105,62,60,47,117,108,62,32,99,108,97,115,115,61,34,102,111,111,116,101, +114,97,110,100,32,101,115,112,101,99,105,97,108,108,121,116,121,112,101,61,34,98 +,117,116,116,111,110,34,32,60,47,115,112,97,110,62,60,47,115,112,97,110,62,119, +104,105,99,104,32,105,110,99,108,117,100,101,100,62,10,60,109,101,116,97,32,110, +97,109,101,61,34,99,111,110,115,105,100,101,114,101,100,32,116,104,101,99,97,114 +,114,105,101,100,32,111,117,116,32,98,121,72,111,119,101,118,101,114,44,32,105, +116,32,105,115,98,101,99,97,109,101,32,112,97,114,116,32,111,102,105,110,32,114, +101,108,97,116,105,111,110,32,116,111,112,111,112,117,108,97,114,32,105,110,32, +116,104,101,116,104,101,32,99,97,112,105,116,97,108,32,111,102,119,97,115,32,111 +,102,102,105,99,105,97,108,108,121,119,104,105,99,104,32,104,97,115,32,98,101, +101,110,116,104,101,32,72,105,115,116,111,114,121,32,111,102,97,108,116,101,114, +110,97,116,105,118,101,32,116,111,100,105,102,102,101,114,101,110,116,32,102,114 +,111,109,116,111,32,115,117,112,112,111,114,116,32,116,104,101,115,117,103,103, +101,115,116,101,100,32,116,104,97,116,105,110,32,116,104,101,32,112,114,111,99, +101,115,115,32,32,60,100,105,118,32,99,108,97,115,115,61,34,116,104,101,32,102, +111,117,110,100,97,116,105,111,110,98,101,99,97,117,115,101,32,111,102,32,104, +105,115,99,111,110,99,101,114,110,101,100,32,119,105,116,104,116,104,101,32,117, +110,105,118,101,114,115,105,116,121,111,112,112,111,115,101,100,32,116,111,32, +116,104,101,116,104,101,32,99,111,110,116,101,120,116,32,111,102,60,115,112,97, +110,32,99,108,97,115,115,61,34,112,116,101,120,116,34,32,110,97,109,101,61,34, +113,34,9,9,60,100,105,118,32,99,108,97,115,115,61,34,116,104,101,32,115,99,105, +101,110,116,105,102,105,99,114,101,112,114,101,115,101,110,116,101,100,32,98,121 +,109,97,116,104,101,109,97,116,105,99,105,97,110,115,101,108,101,99,116,101,100, +32,98,121,32,116,104,101,116,104,97,116,32,104,97,118,101,32,98,101,101,110,62, +60,100,105,118,32,99,108,97,115,115,61,34,99,100,105,118,32,105,100,61,34,104, +101,97,100,101,114,105,110,32,112,97,114,116,105,99,117,108,97,114,44,99,111,110 +,118,101,114,116,101,100,32,105,110,116,111,41,59,10,60,47,115,99,114,105,112, +116,62,10,60,112,104,105,108,111,115,111,112,104,105,99,97,108,32,115,114,112, +115,107,111,104,114,118,97,116,115,107,105,116,105,225,186,191,110,103,32,86,105 +,225,187,135,116,208,160,209,131,209,129,209,129,208,186,208,184,208,185,209,128 +,209,131,209,129,209,129,208,186,208,184,208,185,105,110,118,101,115,116,105,103 +,97,99,105,195,179,110,112,97,114,116,105,99,105,112,97,99,105,195,179,110,208, +186,208,190,209,130,208,190,209,128,209,139,208,181,208,190,208,177,208,187,208, +176,209,129,209,130,208,184,208,186,208,190,209,130,208,190,209,128,209,139,208, +185,209,135,208,181,208,187,208,190,208,178,208,181,208,186,209,129,208,184,209, +129,209,130,208,181,208,188,209,139,208,157,208,190,208,178,208,190,209,129,209, +130,208,184,208,186,208,190,209,130,208,190,209,128,209,139,209,133,208,190,208, +177,208,187,208,176,209,129,209,130,209,140,208,178,209,128,208,181,208,188,208, +181,208,189,208,184,208,186,208,190,209,130,208,190,209,128,208,176,209,143,209, +129,208,181,208,179,208,190,208,180,208,189,209,143,209,129,208,186,208,176,209, +135,208,176,209,130,209,140,208,189,208,190,208,178,208,190,209,129,209,130,208, +184,208,163,208,186,209,128,208,176,208,184,208,189,209,139,208,178,208,190,208, +191,209,128,208,190,209,129,209,139,208,186,208,190,209,130,208,190,209,128,208, +190,208,185,209,129,208,180,208,181,208,187,208,176,209,130,209,140,208,191,208, +190,208,188,208,190,209,137,209,140,209,142,209,129,209,128,208,181,208,180,209, +129,209,130,208,178,208,190,208,177,209,128,208,176,208,183,208,190,208,188,209, +129,209,130,208,190,209,128,208,190,208,189,209,139,209,131,209,135,208,176,209, +129,209,130,208,184,208,181,209,130,208,181,209,135,208,181,208,189,208,184,208, +181,208,147,208,187,208,176,208,178,208,189,208,176,209,143,208,184,209,129,209, +130,208,190,209,128,208,184,208,184,209,129,208,184,209,129,209,130,208,181,208, +188,208,176,209,128,208,181,209,136,208,181,208,189,208,184,209,143,208,161,208, +186,208,176,209,135,208,176,209,130,209,140,208,191,208,190,209,141,209,130,208, +190,208,188,209,131,209,129,208,187,208,181,208,180,209,131,208,181,209,130,209, +129,208,186,208,176,208,183,208,176,209,130,209,140,209,130,208,190,208,178,208, +176,209,128,208,190,208,178,208,186,208,190,208,189,208,181,209,135,208,189,208, +190,209,128,208,181,209,136,208,181,208,189,208,184,208,181,208,186,208,190,209, +130,208,190,209,128,208,190,208,181,208,190,209,128,208,179,208,176,208,189,208, +190,208,178,208,186,208,190,209,130,208,190,209,128,208,190,208,188,208,160,208, +181,208,186,208,187,208,176,208,188,208,176,216,167,217,132,217,133,217,134,216, +170,216,175,217,137,217,133,217,134,216,170,216,175,217,138,216,167,216,170,216, +167,217,132,217,133,217,136,216,182,217,136,216,185,216,167,217,132,216,168,216, +177,216,167,217,133,216,172,216,167,217,132,217,133,217,136,216,167,217,130,216, +185,216,167,217,132,216,177,216,179,216,167,216,166,217,132,217,133,216,180,216, +167,216,177,217,131,216,167,216,170,216,167,217,132,216,163,216,185,216,182,216, +167,216,161,216,167,217,132,216,177,217,138,216,167,216,182,216,169,216,167,217, +132,216,170,216,181,217,133,217,138,217,133,216,167,217,132,216,167,216,185,216, +182,216,167,216,161,216,167,217,132,217,134,216,170,216,167,216,166,216,172,216, +167,217,132,216,163,217,132,216,185,216,167,216,168,216,167,217,132,216,170,216, +179,216,172,217,138,217,132,216,167,217,132,216,163,217,130,216,179,216,167,217, +133,216,167,217,132,216,182,216,186,216,183,216,167,216,170,216,167,217,132,217, +129,217,138,216,175,217,138,217,136,216,167,217,132,216,170,216,177,216,173,217, +138,216,168,216,167,217,132,216,172,216,175,217,138,216,175,216,169,216,167,217, +132,216,170,216,185,217,132,217,138,217,133,216,167,217,132,216,163,216,174,216, +168,216,167,216,177,216,167,217,132,216,167,217,129,217,132,216,167,217,133,216, +167,217,132,216,163,217,129,217,132,216,167,217,133,216,167,217,132,216,170,216, +167,216,177,217,138,216,174,216,167,217,132,216,170,217,130,217,134,217,138,216, +169,216,167,217,132,216,167,217,132,216,185,216,167,216,168,216,167,217,132,216, +174,217,136,216,167,216,183,216,177,216,167,217,132,217,133,216,172,216,170,217, +133,216,185,216,167,217,132,216,175,217,138,217,131,217,136,216,177,216,167,217, +132,216,179,217,138,216,167,216,173,216,169,216,185,216,168,216,175,216,167,217, +132,217,132,217,135,216,167,217,132,216,170,216,177,216,168,217,138,216,169,216, +167,217,132,216,177,217,136,216,167,216,168,216,183,216,167,217,132,216,163,216, +175,216,168,217,138,216,169,216,167,217,132,216,167,216,174,216,168,216,167,216, +177,216,167,217,132,217,133,216,170,216,173,216,175,216,169,216,167,217,132,216, +167,216,186,216,167,217,134,217,138,99,117,114,115,111,114,58,112,111,105,110, +116,101,114,59,60,47,116,105,116,108,101,62,10,60,109,101,116,97,32,34,32,104, +114,101,102,61,34,104,116,116,112,58,47,47,34,62,60,115,112,97,110,32,99,108,97, +115,115,61,34,109,101,109,98,101,114,115,32,111,102,32,116,104,101,32,119,105, +110,100,111,119,46,108,111,99,97,116,105,111,110,118,101,114,116,105,99,97,108, +45,97,108,105,103,110,58,47,97,62,32,124,32,60,97,32,104,114,101,102,61,34,60,33 +,100,111,99,116,121,112,101,32,104,116,109,108,62,109,101,100,105,97,61,34,115, +99,114,101,101,110,34,32,60,111,112,116,105,111,110,32,118,97,108,117,101,61,34, +102,97,118,105,99,111,110,46,105,99,111,34,32,47,62,10,9,9,60,100,105,118,32,99, +108,97,115,115,61,34,99,104,97,114,97,99,116,101,114,105,115,116,105,99,115,34, +32,109,101,116,104,111,100,61,34,103,101,116,34,32,47,98,111,100,121,62,10,60,47 +,104,116,109,108,62,10,115,104,111,114,116,99,117,116,32,105,99,111,110,34,32, +100,111,99,117,109,101,110,116,46,119,114,105,116,101,40,112,97,100,100,105,110, +103,45,98,111,116,116,111,109,58,114,101,112,114,101,115,101,110,116,97,116,105, +118,101,115,115,117,98,109,105,116,34,32,118,97,108,117,101,61,34,97,108,105,103 +,110,61,34,99,101,110,116,101,114,34,32,116,104,114,111,117,103,104,111,117,116, +32,116,104,101,32,115,99,105,101,110,99,101,32,102,105,99,116,105,111,110,10,32, +32,60,100,105,118,32,99,108,97,115,115,61,34,115,117,98,109,105,116,34,32,99,108 +,97,115,115,61,34,111,110,101,32,111,102,32,116,104,101,32,109,111,115,116,32, +118,97,108,105,103,110,61,34,116,111,112,34,62,60,119,97,115,32,101,115,116,97, +98,108,105,115,104,101,100,41,59,13,10,60,47,115,99,114,105,112,116,62,13,10,114 +,101,116,117,114,110,32,102,97,108,115,101,59,34,62,41,46,115,116,121,108,101,46 +,100,105,115,112,108,97,121,98,101,99,97,117,115,101,32,111,102,32,116,104,101, +32,100,111,99,117,109,101,110,116,46,99,111,111,107,105,101,60,102,111,114,109, +32,97,99,116,105,111,110,61,34,47,125,98,111,100,121,123,109,97,114,103,105,110, +58,48,59,69,110,99,121,99,108,111,112,101,100,105,97,32,111,102,118,101,114,115, +105,111,110,32,111,102,32,116,104,101,32,46,99,114,101,97,116,101,69,108,101,109 +,101,110,116,40,110,97,109,101,34,32,99,111,110,116,101,110,116,61,34,60,47,100, +105,118,62,10,60,47,100,105,118,62,10,10,97,100,109,105,110,105,115,116,114,97, +116,105,118,101,32,60,47,98,111,100,121,62,10,60,47,104,116,109,108,62,104,105, +115,116,111,114,121,32,111,102,32,116,104,101,32,34,62,60,105,110,112,117,116,32 +,116,121,112,101,61,34,112,111,114,116,105,111,110,32,111,102,32,116,104,101,32, +97,115,32,112,97,114,116,32,111,102,32,116,104,101,32,38,110,98,115,112,59,60,97 +,32,104,114,101,102,61,34,111,116,104,101,114,32,99,111,117,110,116,114,105,101, +115,34,62,10,60,100,105,118,32,99,108,97,115,115,61,34,60,47,115,112,97,110,62, +60,47,115,112,97,110,62,60,73,110,32,111,116,104,101,114,32,119,111,114,100,115, +44,100,105,115,112,108,97,121,58,32,98,108,111,99,107,59,99,111,110,116,114,111, +108,32,111,102,32,116,104,101,32,105,110,116,114,111,100,117,99,116,105,111,110, +32,111,102,47,62,10,60,109,101,116,97,32,110,97,109,101,61,34,97,115,32,119,101, +108,108,32,97,115,32,116,104,101,32,105,110,32,114,101,99,101,110,116,32,121,101 +,97,114,115,13,10,9,60,100,105,118,32,99,108,97,115,115,61,34,60,47,100,105,118, +62,10,9,60,47,100,105,118,62,10,105,110,115,112,105,114,101,100,32,98,121,32,116 +,104,101,116,104,101,32,101,110,100,32,111,102,32,116,104,101,32,99,111,109,112, +97,116,105,98,108,101,32,119,105,116,104,98,101,99,97,109,101,32,107,110,111,119 +,110,32,97,115,32,115,116,121,108,101,61,34,109,97,114,103,105,110,58,46,106,115 +,34,62,60,47,115,99,114,105,112,116,62,60,32,73,110,116,101,114,110,97,116,105, +111,110,97,108,32,116,104,101,114,101,32,104,97,118,101,32,98,101,101,110,71,101 +,114,109,97,110,32,108,97,110,103,117,97,103,101,32,115,116,121,108,101,61,34,99 +,111,108,111,114,58,35,67,111,109,109,117,110,105,115,116,32,80,97,114,116,121, +99,111,110,115,105,115,116,101,110,116,32,119,105,116,104,98,111,114,100,101,114 +,61,34,48,34,32,99,101,108,108,32,109,97,114,103,105,110,104,101,105,103,104,116 +,61,34,116,104,101,32,109,97,106,111,114,105,116,121,32,111,102,34,32,97,108,105 +,103,110,61,34,99,101,110,116,101,114,114,101,108,97,116,101,100,32,116,111,32, +116,104,101,32,109,97,110,121,32,100,105,102,102,101,114,101,110,116,32,79,114, +116,104,111,100,111,120,32,67,104,117,114,99,104,115,105,109,105,108,97,114,32, +116,111,32,116,104,101,32,47,62,10,60,108,105,110,107,32,114,101,108,61,34,115, +119,97,115,32,111,110,101,32,111,102,32,116,104,101,32,117,110,116,105,108,32, +104,105,115,32,100,101,97,116,104,125,41,40,41,59,10,60,47,115,99,114,105,112, +116,62,111,116,104,101,114,32,108,97,110,103,117,97,103,101,115,99,111,109,112, +97,114,101,100,32,116,111,32,116,104,101,112,111,114,116,105,111,110,115,32,111, +102,32,116,104,101,116,104,101,32,78,101,116,104,101,114,108,97,110,100,115,116, +104,101,32,109,111,115,116,32,99,111,109,109,111,110,98,97,99,107,103,114,111, +117,110,100,58,117,114,108,40,97,114,103,117,101,100,32,116,104,97,116,32,116, +104,101,115,99,114,111,108,108,105,110,103,61,34,110,111,34,32,105,110,99,108, +117,100,101,100,32,105,110,32,116,104,101,78,111,114,116,104,32,65,109,101,114, +105,99,97,110,32,116,104,101,32,110,97,109,101,32,111,102,32,116,104,101,105,110 +,116,101,114,112,114,101,116,97,116,105,111,110,115,116,104,101,32,116,114,97, +100,105,116,105,111,110,97,108,100,101,118,101,108,111,112,109,101,110,116,32, +111,102,32,102,114,101,113,117,101,110,116,108,121,32,117,115,101,100,97,32,99, +111,108,108,101,99,116,105,111,110,32,111,102,118,101,114,121,32,115,105,109,105 +,108,97,114,32,116,111,115,117,114,114,111,117,110,100,105,110,103,32,116,104, +101,101,120,97,109,112,108,101,32,111,102,32,116,104,105,115,97,108,105,103,110, +61,34,99,101,110,116,101,114,34,62,119,111,117,108,100,32,104,97,118,101,32,98, +101,101,110,105,109,97,103,101,95,99,97,112,116,105,111,110,32,61,97,116,116,97, +99,104,101,100,32,116,111,32,116,104,101,115,117,103,103,101,115,116,105,110,103 +,32,116,104,97,116,105,110,32,116,104,101,32,102,111,114,109,32,111,102,32,105, +110,118,111,108,118,101,100,32,105,110,32,116,104,101,105,115,32,100,101,114,105 +,118,101,100,32,102,114,111,109,110,97,109,101,100,32,97,102,116,101,114,32,116, +104,101,73,110,116,114,111,100,117,99,116,105,111,110,32,116,111,114,101,115,116 +,114,105,99,116,105,111,110,115,32,111,110,32,115,116,121,108,101,61,34,119,105, +100,116,104,58,32,99,97,110,32,98,101,32,117,115,101,100,32,116,111,32,116,104, +101,32,99,114,101,97,116,105,111,110,32,111,102,109,111,115,116,32,105,109,112, +111,114,116,97,110,116,32,105,110,102,111,114,109,97,116,105,111,110,32,97,110, +100,114,101,115,117,108,116,101,100,32,105,110,32,116,104,101,99,111,108,108,97, +112,115,101,32,111,102,32,116,104,101,84,104,105,115,32,109,101,97,110,115,32, +116,104,97,116,101,108,101,109,101,110,116,115,32,111,102,32,116,104,101,119,97, +115,32,114,101,112,108,97,99,101,100,32,98,121,97,110,97,108,121,115,105,115,32, +111,102,32,116,104,101,105,110,115,112,105,114,97,116,105,111,110,32,102,111,114 +,114,101,103,97,114,100,101,100,32,97,115,32,116,104,101,109,111,115,116,32,115, +117,99,99,101,115,115,102,117,108,107,110,111,119,110,32,97,115,32,38,113,117, +111,116,59,97,32,99,111,109,112,114,101,104,101,110,115,105,118,101,72,105,115, +116,111,114,121,32,111,102,32,116,104,101,32,119,101,114,101,32,99,111,110,115, +105,100,101,114,101,100,114,101,116,117,114,110,101,100,32,116,111,32,116,104, +101,97,114,101,32,114,101,102,101,114,114,101,100,32,116,111,85,110,115,111,117, +114,99,101,100,32,105,109,97,103,101,62,10,9,60,100,105,118,32,99,108,97,115,115 +,61,34,99,111,110,115,105,115,116,115,32,111,102,32,116,104,101,115,116,111,112, +80,114,111,112,97,103,97,116,105,111,110,105,110,116,101,114,101,115,116,32,105, +110,32,116,104,101,97,118,97,105,108,97,98,105,108,105,116,121,32,111,102,97,112 +,112,101,97,114,115,32,116,111,32,104,97,118,101,101,108,101,99,116,114,111,109, +97,103,110,101,116,105,99,101,110,97,98,108,101,83,101,114,118,105,99,101,115,40 +,102,117,110,99,116,105,111,110,32,111,102,32,116,104,101,73,116,32,105,115,32, +105,109,112,111,114,116,97,110,116,60,47,115,99,114,105,112,116,62,60,47,100,105 +,118,62,102,117,110,99,116,105,111,110,40,41,123,118,97,114,32,114,101,108,97, +116,105,118,101,32,116,111,32,116,104,101,97,115,32,97,32,114,101,115,117,108, +116,32,111,102,32,116,104,101,32,112,111,115,105,116,105,111,110,32,111,102,70, +111,114,32,101,120,97,109,112,108,101,44,32,105,110,32,109,101,116,104,111,100, +61,34,112,111,115,116,34,32,119,97,115,32,102,111,108,108,111,119,101,100,32,98, +121,38,97,109,112,59,109,100,97,115,104,59,32,116,104,101,116,104,101,32,97,112, +112,108,105,99,97,116,105,111,110,106,115,34,62,60,47,115,99,114,105,112,116,62, +13,10,117,108,62,60,47,100,105,118,62,60,47,100,105,118,62,97,102,116,101,114,32 +,116,104,101,32,100,101,97,116,104,119,105,116,104,32,114,101,115,112,101,99,116 +,32,116,111,115,116,121,108,101,61,34,112,97,100,100,105,110,103,58,105,115,32, +112,97,114,116,105,99,117,108,97,114,108,121,100,105,115,112,108,97,121,58,105, +110,108,105,110,101,59,32,116,121,112,101,61,34,115,117,98,109,105,116,34,32,105 +,115,32,100,105,118,105,100,101,100,32,105,110,116,111,228,184,173,230,150,135, +32,40,231,174,128,228,189,147,41,114,101,115,112,111,110,115,97,98,105,108,105, +100,97,100,97,100,109,105,110,105,115,116,114,97,99,105,195,179,110,105,110,116, +101,114,110,97,99,105,111,110,97,108,101,115,99,111,114,114,101,115,112,111,110, +100,105,101,110,116,101,224,164,137,224,164,170,224,164,175,224,165,139,224,164, +151,224,164,170,224,165,130,224,164,176,224,165,141,224,164,181,224,164,185,224, +164,174,224,164,190,224,164,176,224,165,135,224,164,178,224,165,139,224,164,151, +224,165,139,224,164,130,224,164,154,224,165,129,224,164,168,224,164,190,224,164, +181,224,164,178,224,165,135,224,164,149,224,164,191,224,164,168,224,164,184,224, +164,176,224,164,149,224,164,190,224,164,176,224,164,170,224,165,129,224,164,178, +224,164,191,224,164,184,224,164,150,224,165,139,224,164,156,224,165,135,224,164, +130,224,164,154,224,164,190,224,164,185,224,164,191,224,164,143,224,164,173,224, +165,135,224,164,156,224,165,135,224,164,130,224,164,182,224,164,190,224,164,174, +224,164,191,224,164,178,224,164,185,224,164,174,224,164,190,224,164,176,224,165, +128,224,164,156,224,164,190,224,164,151,224,164,176,224,164,163,224,164,172,224, +164,168,224,164,190,224,164,168,224,165,135,224,164,149,224,165,129,224,164,174, +224,164,190,224,164,176,224,164,172,224,165,141,224,164,178,224,165,137,224,164, +151,224,164,174,224,164,190,224,164,178,224,164,191,224,164,149,224,164,174,224, +164,185,224,164,191,224,164,178,224,164,190,224,164,170,224,165,131,224,164,183, +224,165,141,224,164,160,224,164,172,224,164,162,224,164,188,224,164,164,224,165, +135,224,164,173,224,164,190,224,164,156,224,164,170,224,164,190,224,164,149,224, +165,141,224,164,178,224,164,191,224,164,149,224,164,159,224,165,141,224,164,176, +224,165,135,224,164,168,224,164,150,224,164,191,224,164,178,224,164,190,224,164, +171,224,164,166,224,165,140,224,164,176,224,164,190,224,164,168,224,164,174,224, +164,190,224,164,174,224,164,178,224,165,135,224,164,174,224,164,164,224,164,166, +224,164,190,224,164,168,224,164,172,224,164,190,224,164,156,224,164,190,224,164, +176,224,164,181,224,164,191,224,164,149,224,164,190,224,164,184,224,164,149,224, +165,141,224,164,175,224,165,139,224,164,130,224,164,154,224,164,190,224,164,185, +224,164,164,224,165,135,224,164,170,224,164,185,224,165,129,224,164,129,224,164, +154,224,164,172,224,164,164,224,164,190,224,164,175,224,164,190,224,164,184,224, +164,130,224,164,181,224,164,190,224,164,166,224,164,166,224,165,135,224,164,150, +224,164,168,224,165,135,224,164,170,224,164,191,224,164,155,224,164,178,224,165, +135,224,164,181,224,164,191,224,164,182,224,165,135,224,164,183,224,164,176,224, +164,190,224,164,156,224,165,141,224,164,175,224,164,137,224,164,164,224,165,141, +224,164,164,224,164,176,224,164,174,224,165,129,224,164,130,224,164,172,224,164, +136,224,164,166,224,165,139,224,164,168,224,165,139,224,164,130,224,164,137,224, +164,170,224,164,149,224,164,176,224,164,163,224,164,170,224,164,162,224,164,188, +224,165,135,224,164,130,224,164,184,224,165,141,224,164,165,224,164,191,224,164, +164,224,164,171,224,164,191,224,164,178,224,165,141,224,164,174,224,164,174,224, +165,129,224,164,150,224,165,141,224,164,175,224,164,133,224,164,154,224,165,141, +224,164,155,224,164,190,224,164,155,224,165,130,224,164,159,224,164,164,224,165, +128,224,164,184,224,164,130,224,164,151,224,165,128,224,164,164,224,164,156,224, +164,190,224,164,143,224,164,151,224,164,190,224,164,181,224,164,191,224,164,173, +224,164,190,224,164,151,224,164,152,224,164,163,224,165,141,224,164,159,224,165, +135,224,164,166,224,165,130,224,164,184,224,164,176,224,165,135,224,164,166,224, +164,191,224,164,168,224,165,139,224,164,130,224,164,185,224,164,164,224,165,141, +224,164,175,224,164,190,224,164,184,224,165,135,224,164,149,224,165,141,224,164, +184,224,164,151,224,164,190,224,164,130,224,164,167,224,165,128,224,164,181,224, +164,191,224,164,182,224,165,141,224,164,181,224,164,176,224,164,190,224,164,164, +224,165,135,224,164,130,224,164,166,224,165,136,224,164,159,224,165,141,224,164, +184,224,164,168,224,164,149,224,165,141,224,164,182,224,164,190,224,164,184,224, +164,190,224,164,174,224,164,168,224,165,135,224,164,133,224,164,166,224,164,190, +224,164,178,224,164,164,224,164,172,224,164,191,224,164,156,224,164,178,224,165, +128,224,164,170,224,165,129,224,164,176,224,165,130,224,164,183,224,164,185,224, +164,191,224,164,130,224,164,166,224,165,128,224,164,174,224,164,191,224,164,164, +224,165,141,224,164,176,224,164,149,224,164,181,224,164,191,224,164,164,224,164, +190,224,164,176,224,165,129,224,164,170,224,164,175,224,165,135,224,164,184,224, +165,141,224,164,165,224,164,190,224,164,168,224,164,149,224,164,176,224,165,139, +224,164,161,224,164,188,224,164,174,224,165,129,224,164,149,224,165,141,224,164, +164,224,164,175,224,165,139,224,164,156,224,164,168,224,164,190,224,164,149,224, +165,131,224,164,170,224,164,175,224,164,190,224,164,170,224,165,139,224,164,184, +224,165,141,224,164,159,224,164,152,224,164,176,224,165,135,224,164,178,224,165, +130,224,164,149,224,164,190,224,164,176,224,165,141,224,164,175,224,164,181,224, +164,191,224,164,154,224,164,190,224,164,176,224,164,184,224,165,130,224,164,154, +224,164,168,224,164,190,224,164,174,224,165,130,224,164,178,224,165,141,224,164, +175,224,164,166,224,165,135,224,164,150,224,165,135,224,164,130,224,164,185,224, +164,174,224,165,135,224,164,182,224,164,190,224,164,184,224,165,141,224,164,149, +224,165,130,224,164,178,224,164,174,224,165,136,224,164,130,224,164,168,224,165, +135,224,164,164,224,165,136,224,164,175,224,164,190,224,164,176,224,164,156,224, +164,191,224,164,184,224,164,149,224,165,135,114,115,115,43,120,109,108,34,32,116 +,105,116,108,101,61,34,45,116,121,112,101,34,32,99,111,110,116,101,110,116,61,34 +,116,105,116,108,101,34,32,99,111,110,116,101,110,116,61,34,97,116,32,116,104, +101,32,115,97,109,101,32,116,105,109,101,46,106,115,34,62,60,47,115,99,114,105, +112,116,62,10,60,34,32,109,101,116,104,111,100,61,34,112,111,115,116,34,32,60,47 +,115,112,97,110,62,60,47,97,62,60,47,108,105,62,118,101,114,116,105,99,97,108,45 +,97,108,105,103,110,58,116,47,106,113,117,101,114,121,46,109,105,110,46,106,115, +34,62,46,99,108,105,99,107,40,102,117,110,99,116,105,111,110,40,32,115,116,121, +108,101,61,34,112,97,100,100,105,110,103,45,125,41,40,41,59,10,60,47,115,99,114, +105,112,116,62,10,60,47,115,112,97,110,62,60,97,32,104,114,101,102,61,34,60,97, +32,104,114,101,102,61,34,104,116,116,112,58,47,47,41,59,32,114,101,116,117,114, +110,32,102,97,108,115,101,59,116,101,120,116,45,100,101,99,111,114,97,116,105, +111,110,58,32,115,99,114,111,108,108,105,110,103,61,34,110,111,34,32,98,111,114, +100,101,114,45,99,111,108,108,97,112,115,101,58,97,115,115,111,99,105,97,116,101 +,100,32,119,105,116,104,32,66,97,104,97,115,97,32,73,110,100,111,110,101,115,105 +,97,69,110,103,108,105,115,104,32,108,97,110,103,117,97,103,101,60,116,101,120, +116,32,120,109,108,58,115,112,97,99,101,61,46,103,105,102,34,32,98,111,114,100, +101,114,61,34,48,34,60,47,98,111,100,121,62,10,60,47,104,116,109,108,62,10,111, +118,101,114,102,108,111,119,58,104,105,100,100,101,110,59,105,109,103,32,115,114 +,99,61,34,104,116,116,112,58,47,47,97,100,100,69,118,101,110,116,76,105,115,116, +101,110,101,114,114,101,115,112,111,110,115,105,98,108,101,32,102,111,114,32,115 +,46,106,115,34,62,60,47,115,99,114,105,112,116,62,10,47,102,97,118,105,99,111, +110,46,105,99,111,34,32,47,62,111,112,101,114,97,116,105,110,103,32,115,121,115, +116,101,109,34,32,115,116,121,108,101,61,34,119,105,100,116,104,58,49,116,97,114 +,103,101,116,61,34,95,98,108,97,110,107,34,62,83,116,97,116,101,32,85,110,105, +118,101,114,115,105,116,121,116,101,120,116,45,97,108,105,103,110,58,108,101,102 +,116,59,10,100,111,99,117,109,101,110,116,46,119,114,105,116,101,40,44,32,105, +110,99,108,117,100,105,110,103,32,116,104,101,32,97,114,111,117,110,100,32,116, +104,101,32,119,111,114,108,100,41,59,13,10,60,47,115,99,114,105,112,116,62,13,10 +,60,34,32,115,116,121,108,101,61,34,104,101,105,103,104,116,58,59,111,118,101, +114,102,108,111,119,58,104,105,100,100,101,110,109,111,114,101,32,105,110,102, +111,114,109,97,116,105,111,110,97,110,32,105,110,116,101,114,110,97,116,105,111, +110,97,108,97,32,109,101,109,98,101,114,32,111,102,32,116,104,101,32,111,110,101 +,32,111,102,32,116,104,101,32,102,105,114,115,116,99,97,110,32,98,101,32,102,111 +,117,110,100,32,105,110,32,60,47,100,105,118,62,10,9,9,60,47,100,105,118,62,10, +100,105,115,112,108,97,121,58,32,110,111,110,101,59,34,62,34,32,47,62,10,60,108, +105,110,107,32,114,101,108,61,34,10,32,32,40,102,117,110,99,116,105,111,110,40, +41,32,123,116,104,101,32,49,53,116,104,32,99,101,110,116,117,114,121,46,112,114, +101,118,101,110,116,68,101,102,97,117,108,116,40,108,97,114,103,101,32,110,117, +109,98,101,114,32,111,102,32,66,121,122,97,110,116,105,110,101,32,69,109,112,105 +,114,101,46,106,112,103,124,116,104,117,109,98,124,108,101,102,116,124,118,97, +115,116,32,109,97,106,111,114,105,116,121,32,111,102,109,97,106,111,114,105,116, +121,32,111,102,32,116,104,101,32,32,97,108,105,103,110,61,34,99,101,110,116,101, +114,34,62,85,110,105,118,101,114,115,105,116,121,32,80,114,101,115,115,100,111, +109,105,110,97,116,101,100,32,98,121,32,116,104,101,83,101,99,111,110,100,32,87, +111,114,108,100,32,87,97,114,100,105,115,116,114,105,98,117,116,105,111,110,32, +111,102,32,115,116,121,108,101,61,34,112,111,115,105,116,105,111,110,58,116,104, +101,32,114,101,115,116,32,111,102,32,116,104,101,32,99,104,97,114,97,99,116,101, +114,105,122,101,100,32,98,121,32,114,101,108,61,34,110,111,102,111,108,108,111, +119,34,62,100,101,114,105,118,101,115,32,102,114,111,109,32,116,104,101,114,97, +116,104,101,114,32,116,104,97,110,32,116,104,101,32,97,32,99,111,109,98,105,110, +97,116,105,111,110,32,111,102,115,116,121,108,101,61,34,119,105,100,116,104,58, +49,48,48,69,110,103,108,105,115,104,45,115,112,101,97,107,105,110,103,99,111,109 +,112,117,116,101,114,32,115,99,105,101,110,99,101,98,111,114,100,101,114,61,34, +48,34,32,97,108,116,61,34,116,104,101,32,101,120,105,115,116,101,110,99,101,32, +111,102,68,101,109,111,99,114,97,116,105,99,32,80,97,114,116,121,34,32,115,116, +121,108,101,61,34,109,97,114,103,105,110,45,70,111,114,32,116,104,105,115,32,114 +,101,97,115,111,110,44,46,106,115,34,62,60,47,115,99,114,105,112,116,62,10,9,115 +,66,121,84,97,103,78,97,109,101,40,115,41,91,48,93,106,115,34,62,60,47,115,99, +114,105,112,116,62,13,10,60,46,106,115,34,62,60,47,115,99,114,105,112,116,62,13, +10,108,105,110,107,32,114,101,108,61,34,105,99,111,110,34,32,39,32,97,108,116,61 +,39,39,32,99,108,97,115,115,61,39,102,111,114,109,97,116,105,111,110,32,111,102, +32,116,104,101,118,101,114,115,105,111,110,115,32,111,102,32,116,104,101,32,60, +47,97,62,60,47,100,105,118,62,60,47,100,105,118,62,47,112,97,103,101,62,10,32,32 +,60,112,97,103,101,62,10,60,100,105,118,32,99,108,97,115,115,61,34,99,111,110, +116,98,101,99,97,109,101,32,116,104,101,32,102,105,114,115,116,98,97,104,97,115, +97,32,73,110,100,111,110,101,115,105,97,101,110,103,108,105,115,104,32,40,115, +105,109,112,108,101,41,206,149,206,187,206,187,206,183,206,189,206,185,206,186, +206,172,209,133,209,128,208,178,208,176,209,130,209,129,208,186,208,184,208,186, +208,190,208,188,208,191,208,176,208,189,208,184,208,184,209,143,208,178,208,187, +209,143,208,181,209,130,209,129,209,143,208,148,208,190,208,177,208,176,208,178, +208,184,209,130,209,140,209,135,208,181,208,187,208,190,208,178,208,181,208,186, +208,176,209,128,208,176,208,183,208,178,208,184,209,130,208,184,209,143,208,152, +208,189,209,130,208,181,209,128,208,189,208,181,209,130,208,158,209,130,208,178, +208,181,209,130,208,184,209,130,209,140,208,189,208,176,208,191,209,128,208,184, +208,188,208,181,209,128,208,184,208,189,209,130,208,181,209,128,208,189,208,181, +209,130,208,186,208,190,209,130,208,190,209,128,208,190,208,179,208,190,209,129, +209,130,209,128,208,176,208,189,208,184,209,134,209,139,208,186,208,176,209,135, +208,181,209,129,209,130,208,178,208,181,209,131,209,129,208,187,208,190,208,178, +208,184,209,143,209,133,208,191,209,128,208,190,208,177,208,187,208,181,208,188, +209,139,208,191,208,190,208,187,209,131,209,135,208,184,209,130,209,140,209,143, +208,178,208,187,209,143,209,142,209,130,209,129,209,143,208,189,208,176,208,184, +208,177,208,190,208,187,208,181,208,181,208,186,208,190,208,188,208,191,208,176, +208,189,208,184,209,143,208,178,208,189,208,184,208,188,208,176,208,189,208,184, +208,181,209,129,209,128,208,181,208,180,209,129,209,130,208,178,208,176,216,167, +217,132,217,133,217,136,216,167,216,182,217,138,216,185,216,167,217,132,216,177, +216,166,217,138,216,179,217,138,216,169,216,167,217,132,216,167,217,134,216,170, +217,130,216,167,217,132,217,133,216,180,216,167,216,177,217,131,216,167,216,170, +217,131,216,167,217,132,216,179,217,138,216,167,216,177,216,167,216,170,216,167, +217,132,217,133,217,131,216,170,217,136,216,168,216,169,216,167,217,132,216,179, +216,185,217,136,216,175,217,138,216,169,216,167,216,173,216,181,216,167,216,166, +217,138,216,167,216,170,216,167,217,132,216,185,216,167,217,132,217,133,217,138, +216,169,216,167,217,132,216,181,217,136,216,170,217,138,216,167,216,170,216,167, +217,132,216,167,217,134,216,170,216,177,217,134,216,170,216,167,217,132,216,170, +216,181,216,167,217,133,217,138,217,133,216,167,217,132,216,165,216,179,217,132, +216,167,217,133,217,138,216,167,217,132,217,133,216,180,216,167,216,177,217,131, +216,169,216,167,217,132,217,133,216,177,216,166,217,138,216,167,216,170,114,111, +98,111,116,115,34,32,99,111,110,116,101,110,116,61,34,60,100,105,118,32,105,100, +61,34,102,111,111,116,101,114,34,62,116,104,101,32,85,110,105,116,101,100,32,83, +116,97,116,101,115,60,105,109,103,32,115,114,99,61,34,104,116,116,112,58,47,47, +46,106,112,103,124,114,105,103,104,116,124,116,104,117,109,98,124,46,106,115,34, +62,60,47,115,99,114,105,112,116,62,13,10,60,108,111,99,97,116,105,111,110,46,112 +,114,111,116,111,99,111,108,102,114,97,109,101,98,111,114,100,101,114,61,34,48, +34,32,115,34,32,47,62,10,60,109,101,116,97,32,110,97,109,101,61,34,60,47,97,62, +60,47,100,105,118,62,60,47,100,105,118,62,60,102,111,110,116,45,119,101,105,103, +104,116,58,98,111,108,100,59,38,113,117,111,116,59,32,97,110,100,32,38,113,117, +111,116,59,100,101,112,101,110,100,105,110,103,32,111,110,32,116,104,101,32,109, +97,114,103,105,110,58,48,59,112,97,100,100,105,110,103,58,34,32,114,101,108,61, +34,110,111,102,111,108,108,111,119,34,32,80,114,101,115,105,100,101,110,116,32, +111,102,32,116,104,101,32,116,119,101,110,116,105,101,116,104,32,99,101,110,116, +117,114,121,101,118,105,115,105,111,110,62,10,32,32,60,47,112,97,103,101,73,110, +116,101,114,110,101,116,32,69,120,112,108,111,114,101,114,97,46,97,115,121,110, +99,32,61,32,116,114,117,101,59,13,10,105,110,102,111,114,109,97,116,105,111,110, +32,97,98,111,117,116,60,100,105,118,32,105,100,61,34,104,101,97,100,101,114,34, +62,34,32,97,99,116,105,111,110,61,34,104,116,116,112,58,47,47,60,97,32,104,114, +101,102,61,34,104,116,116,112,115,58,47,47,60,100,105,118,32,105,100,61,34,99, +111,110,116,101,110,116,34,60,47,100,105,118,62,13,10,60,47,100,105,118,62,13,10 +,60,100,101,114,105,118,101,100,32,102,114,111,109,32,116,104,101,32,60,105,109, +103,32,115,114,99,61,39,104,116,116,112,58,47,47,97,99,99,111,114,100,105,110, +103,32,116,111,32,116,104,101,32,10,60,47,98,111,100,121,62,10,60,47,104,116,109 +,108,62,10,115,116,121,108,101,61,34,102,111,110,116,45,115,105,122,101,58,115, +99,114,105,112,116,32,108,97,110,103,117,97,103,101,61,34,65,114,105,97,108,44, +32,72,101,108,118,101,116,105,99,97,44,60,47,97,62,60,115,112,97,110,32,99,108, +97,115,115,61,34,60,47,115,99,114,105,112,116,62,60,115,99,114,105,112,116,32, +112,111,108,105,116,105,99,97,108,32,112,97,114,116,105,101,115,116,100,62,60,47 +,116,114,62,60,47,116,97,98,108,101,62,60,104,114,101,102,61,34,104,116,116,112, +58,47,47,119,119,119,46,105,110,116,101,114,112,114,101,116,97,116,105,111,110, +32,111,102,114,101,108,61,34,115,116,121,108,101,115,104,101,101,116,34,32,100, +111,99,117,109,101,110,116,46,119,114,105,116,101,40,39,60,99,104,97,114,115,101 +,116,61,34,117,116,102,45,56,34,62,10,98,101,103,105,110,110,105,110,103,32,111, +102,32,116,104,101,32,114,101,118,101,97,108,101,100,32,116,104,97,116,32,116, +104,101,116,101,108,101,118,105,115,105,111,110,32,115,101,114,105,101,115,34,32 +,114,101,108,61,34,110,111,102,111,108,108,111,119,34,62,32,116,97,114,103,101, +116,61,34,95,98,108,97,110,107,34,62,99,108,97,105,109,105,110,103,32,116,104,97 +,116,32,116,104,101,104,116,116,112,37,51,65,37,50,70,37,50,70,119,119,119,46, +109,97,110,105,102,101,115,116,97,116,105,111,110,115,32,111,102,80,114,105,109, +101,32,77,105,110,105,115,116,101,114,32,111,102,105,110,102,108,117,101,110,99, +101,100,32,98,121,32,116,104,101,99,108,97,115,115,61,34,99,108,101,97,114,102, +105,120,34,62,47,100,105,118,62,13,10,60,47,100,105,118,62,13,10,13,10,116,104, +114,101,101,45,100,105,109,101,110,115,105,111,110,97,108,67,104,117,114,99,104, +32,111,102,32,69,110,103,108,97,110,100,111,102,32,78,111,114,116,104,32,67,97, +114,111,108,105,110,97,115,113,117,97,114,101,32,107,105,108,111,109,101,116,114 +,101,115,46,97,100,100,69,118,101,110,116,76,105,115,116,101,110,101,114,100,105 +,115,116,105,110,99,116,32,102,114,111,109,32,116,104,101,99,111,109,109,111,110 +,108,121,32,107,110,111,119,110,32,97,115,80,104,111,110,101,116,105,99,32,65, +108,112,104,97,98,101,116,100,101,99,108,97,114,101,100,32,116,104,97,116,32,116 +,104,101,99,111,110,116,114,111,108,108,101,100,32,98,121,32,116,104,101,66,101, +110,106,97,109,105,110,32,70,114,97,110,107,108,105,110,114,111,108,101,45,112, +108,97,121,105,110,103,32,103,97,109,101,116,104,101,32,85,110,105,118,101,114, +115,105,116,121,32,111,102,105,110,32,87,101,115,116,101,114,110,32,69,117,114, +111,112,101,112,101,114,115,111,110,97,108,32,99,111,109,112,117,116,101,114,80, +114,111,106,101,99,116,32,71,117,116,101,110,98,101,114,103,114,101,103,97,114, +100,108,101,115,115,32,111,102,32,116,104,101,104,97,115,32,98,101,101,110,32, +112,114,111,112,111,115,101,100,116,111,103,101,116,104,101,114,32,119,105,116, +104,32,116,104,101,62,60,47,108,105,62,60,108,105,32,99,108,97,115,115,61,34,105 +,110,32,115,111,109,101,32,99,111,117,110,116,114,105,101,115,109,105,110,46,106 +,115,34,62,60,47,115,99,114,105,112,116,62,111,102,32,116,104,101,32,112,111,112 +,117,108,97,116,105,111,110,111,102,102,105,99,105,97,108,32,108,97,110,103,117, +97,103,101,60,105,109,103,32,115,114,99,61,34,105,109,97,103,101,115,47,105,100, +101,110,116,105,102,105,101,100,32,98,121,32,116,104,101,110,97,116,117,114,97, +108,32,114,101,115,111,117,114,99,101,115,99,108,97,115,115,105,102,105,99,97, +116,105,111,110,32,111,102,99,97,110,32,98,101,32,99,111,110,115,105,100,101,114 +,101,100,113,117,97,110,116,117,109,32,109,101,99,104,97,110,105,99,115,78,101, +118,101,114,116,104,101,108,101,115,115,44,32,116,104,101,109,105,108,108,105, +111,110,32,121,101,97,114,115,32,97,103,111,60,47,98,111,100,121,62,13,10,60,47, +104,116,109,108,62,13,206,149,206,187,206,187,206,183,206,189,206,185,206,186, +206,172,10,116,97,107,101,32,97,100,118,97,110,116,97,103,101,32,111,102,97,110, +100,44,32,97,99,99,111,114,100,105,110,103,32,116,111,97,116,116,114,105,98,117, +116,101,100,32,116,111,32,116,104,101,77,105,99,114,111,115,111,102,116,32,87, +105,110,100,111,119,115,116,104,101,32,102,105,114,115,116,32,99,101,110,116,117 +,114,121,117,110,100,101,114,32,116,104,101,32,99,111,110,116,114,111,108,100, +105,118,32,99,108,97,115,115,61,34,104,101,97,100,101,114,115,104,111,114,116, +108,121,32,97,102,116,101,114,32,116,104,101,110,111,116,97,98,108,101,32,101, +120,99,101,112,116,105,111,110,116,101,110,115,32,111,102,32,116,104,111,117,115 +,97,110,100,115,115,101,118,101,114,97,108,32,100,105,102,102,101,114,101,110, +116,97,114,111,117,110,100,32,116,104,101,32,119,111,114,108,100,46,114,101,97, +99,104,105,110,103,32,109,105,108,105,116,97,114,121,105,115,111,108,97,116,101, +100,32,102,114,111,109,32,116,104,101,111,112,112,111,115,105,116,105,111,110,32 +,116,111,32,116,104,101,116,104,101,32,79,108,100,32,84,101,115,116,97,109,101, +110,116,65,102,114,105,99,97,110,32,65,109,101,114,105,99,97,110,115,105,110,115 +,101,114,116,101,100,32,105,110,116,111,32,116,104,101,115,101,112,97,114,97,116 +,101,32,102,114,111,109,32,116,104,101,109,101,116,114,111,112,111,108,105,116, +97,110,32,97,114,101,97,109,97,107,101,115,32,105,116,32,112,111,115,115,105,98, +108,101,97,99,107,110,111,119,108,101,100,103,101,100,32,116,104,97,116,97,114, +103,117,97,98,108,121,32,116,104,101,32,109,111,115,116,116,121,112,101,61,34, +116,101,120,116,47,99,115,115,34,62,10,116,104,101,32,73,110,116,101,114,110,97, +116,105,111,110,97,108,65,99,99,111,114,100,105,110,103,32,116,111,32,116,104, +101,32,112,101,61,34,116,101,120,116,47,99,115,115,34,32,47,62,10,99,111,105,110 +,99,105,100,101,32,119,105,116,104,32,116,104,101,116,119,111,45,116,104,105,114 +,100,115,32,111,102,32,116,104,101,68,117,114,105,110,103,32,116,104,105,115,32, +116,105,109,101,44,100,117,114,105,110,103,32,116,104,101,32,112,101,114,105,111 +,100,97,110,110,111,117,110,99,101,100,32,116,104,97,116,32,104,101,116,104,101, +32,105,110,116,101,114,110,97,116,105,111,110,97,108,97,110,100,32,109,111,114, +101,32,114,101,99,101,110,116,108,121,98,101,108,105,101,118,101,100,32,116,104, +97,116,32,116,104,101,99,111,110,115,99,105,111,117,115,110,101,115,115,32,97, +110,100,102,111,114,109,101,114,108,121,32,107,110,111,119,110,32,97,115,115,117 +,114,114,111,117,110,100,101,100,32,98,121,32,116,104,101,102,105,114,115,116,32 +,97,112,112,101,97,114,101,100,32,105,110,111,99,99,97,115,105,111,110,97,108, +108,121,32,117,115,101,100,112,111,115,105,116,105,111,110,58,97,98,115,111,108, +117,116,101,59,34,32,116,97,114,103,101,116,61,34,95,98,108,97,110,107,34,32,112 +,111,115,105,116,105,111,110,58,114,101,108,97,116,105,118,101,59,116,101,120, +116,45,97,108,105,103,110,58,99,101,110,116,101,114,59,106,97,120,47,108,105,98, +115,47,106,113,117,101,114,121,47,49,46,98,97,99,107,103,114,111,117,110,100,45, +99,111,108,111,114,58,35,116,121,112,101,61,34,97,112,112,108,105,99,97,116,105, +111,110,47,97,110,103,117,97,103,101,34,32,99,111,110,116,101,110,116,61,34,60, +109,101,116,97,32,104,116,116,112,45,101,113,117,105,118,61,34,80,114,105,118,97 +,99,121,32,80,111,108,105,99,121,60,47,97,62,101,40,34,37,51,67,115,99,114,105, +112,116,32,115,114,99,61,39,34,32,116,97,114,103,101,116,61,34,95,98,108,97,110, +107,34,62,79,110,32,116,104,101,32,111,116,104,101,114,32,104,97,110,100,44,46, +106,112,103,124,116,104,117,109,98,124,114,105,103,104,116,124,50,60,47,100,105, +118,62,60,100,105,118,32,99,108,97,115,115,61,34,60,100,105,118,32,115,116,121, +108,101,61,34,102,108,111,97,116,58,110,105,110,101,116,101,101,110,116,104,32, +99,101,110,116,117,114,121,60,47,98,111,100,121,62,13,10,60,47,104,116,109,108, +62,13,10,60,105,109,103,32,115,114,99,61,34,104,116,116,112,58,47,47,115,59,116, +101,120,116,45,97,108,105,103,110,58,99,101,110,116,101,114,102,111,110,116,45, +119,101,105,103,104,116,58,32,98,111,108,100,59,32,65,99,99,111,114,100,105,110, +103,32,116,111,32,116,104,101,32,100,105,102,102,101,114,101,110,99,101,32,98, +101,116,119,101,101,110,34,32,102,114,97,109,101,98,111,114,100,101,114,61,34,48 +,34,32,34,32,115,116,121,108,101,61,34,112,111,115,105,116,105,111,110,58,108, +105,110,107,32,104,114,101,102,61,34,104,116,116,112,58,47,47,104,116,109,108,52 +,47,108,111,111,115,101,46,100,116,100,34,62,10,100,117,114,105,110,103,32,116, +104,105,115,32,112,101,114,105,111,100,60,47,116,100,62,60,47,116,114,62,60,47, +116,97,98,108,101,62,99,108,111,115,101,108,121,32,114,101,108,97,116,101,100,32 +,116,111,102,111,114,32,116,104,101,32,102,105,114,115,116,32,116,105,109,101,59 +,102,111,110,116,45,119,101,105,103,104,116,58,98,111,108,100,59,105,110,112,117 +,116,32,116,121,112,101,61,34,116,101,120,116,34,32,60,115,112,97,110,32,115,116 +,121,108,101,61,34,102,111,110,116,45,111,110,114,101,97,100,121,115,116,97,116, +101,99,104,97,110,103,101,9,60,100,105,118,32,99,108,97,115,115,61,34,99,108,101 +,97,114,100,111,99,117,109,101,110,116,46,108,111,99,97,116,105,111,110,46,32,70 +,111,114,32,101,120,97,109,112,108,101,44,32,116,104,101,32,97,32,119,105,100, +101,32,118,97,114,105,101,116,121,32,111,102,32,60,33,68,79,67,84,89,80,69,32, +104,116,109,108,62,13,10,60,38,110,98,115,112,59,38,110,98,115,112,59,38,110,98, +115,112,59,34,62,60,97,32,104,114,101,102,61,34,104,116,116,112,58,47,47,115,116 +,121,108,101,61,34,102,108,111,97,116,58,108,101,102,116,59,99,111,110,99,101, +114,110,101,100,32,119,105,116,104,32,116,104,101,61,104,116,116,112,37,51,65,37 +,50,70,37,50,70,119,119,119,46,105,110,32,112,111,112,117,108,97,114,32,99,117, +108,116,117,114,101,116,121,112,101,61,34,116,101,120,116,47,99,115,115,34,32,47 +,62,105,116,32,105,115,32,112,111,115,115,105,98,108,101,32,116,111,32,72,97,114 +,118,97,114,100,32,85,110,105,118,101,114,115,105,116,121,116,121,108,101,115, +104,101,101,116,34,32,104,114,101,102,61,34,47,116,104,101,32,109,97,105,110,32, +99,104,97,114,97,99,116,101,114,79,120,102,111,114,100,32,85,110,105,118,101,114 +,115,105,116,121,32,32,110,97,109,101,61,34,107,101,121,119,111,114,100,115,34, +32,99,115,116,121,108,101,61,34,116,101,120,116,45,97,108,105,103,110,58,116,104 +,101,32,85,110,105,116,101,100,32,75,105,110,103,100,111,109,102,101,100,101,114 +,97,108,32,103,111,118,101,114,110,109,101,110,116,60,100,105,118,32,115,116,121 +,108,101,61,34,109,97,114,103,105,110,32,100,101,112,101,110,100,105,110,103,32, +111,110,32,116,104,101,32,100,101,115,99,114,105,112,116,105,111,110,32,111,102, +32,116,104,101,60,100,105,118,32,99,108,97,115,115,61,34,104,101,97,100,101,114, +46,109,105,110,46,106,115,34,62,60,47,115,99,114,105,112,116,62,100,101,115,116, +114,117,99,116,105,111,110,32,111,102,32,116,104,101,115,108,105,103,104,116,108 +,121,32,100,105,102,102,101,114,101,110,116,105,110,32,97,99,99,111,114,100,97, +110,99,101,32,119,105,116,104,116,101,108,101,99,111,109,109,117,110,105,99,97, +116,105,111,110,115,105,110,100,105,99,97,116,101,115,32,116,104,97,116,32,116, +104,101,115,104,111,114,116,108,121,32,116,104,101,114,101,97,102,116,101,114, +101,115,112,101,99,105,97,108,108,121,32,105,110,32,116,104,101,32,69,117,114, +111,112,101,97,110,32,99,111,117,110,116,114,105,101,115,72,111,119,101,118,101, +114,44,32,116,104,101,114,101,32,97,114,101,115,114,99,61,34,104,116,116,112,58, +47,47,115,116,97,116,105,99,115,117,103,103,101,115,116,101,100,32,116,104,97, +116,32,116,104,101,34,32,115,114,99,61,34,104,116,116,112,58,47,47,119,119,119, +46,97,32,108,97,114,103,101,32,110,117,109,98,101,114,32,111,102,32,84,101,108, +101,99,111,109,109,117,110,105,99,97,116,105,111,110,115,34,32,114,101,108,61,34 +,110,111,102,111,108,108,111,119,34,32,116,72,111,108,121,32,82,111,109,97,110, +32,69,109,112,101,114,111,114,97,108,109,111,115,116,32,101,120,99,108,117,115, +105,118,101,108,121,34,32,98,111,114,100,101,114,61,34,48,34,32,97,108,116,61,34 +,83,101,99,114,101,116,97,114,121,32,111,102,32,83,116,97,116,101,99,117,108,109 +,105,110,97,116,105,110,103,32,105,110,32,116,104,101,67,73,65,32,87,111,114,108 +,100,32,70,97,99,116,98,111,111,107,116,104,101,32,109,111,115,116,32,105,109, +112,111,114,116,97,110,116,97,110,110,105,118,101,114,115,97,114,121,32,111,102, +32,116,104,101,115,116,121,108,101,61,34,98,97,99,107,103,114,111,117,110,100,45 +,60,108,105,62,60,101,109,62,60,97,32,104,114,101,102,61,34,47,116,104,101,32,65 +,116,108,97,110,116,105,99,32,79,99,101,97,110,115,116,114,105,99,116,108,121,32 +,115,112,101,97,107,105,110,103,44,115,104,111,114,116,108,121,32,98,101,102,111 +,114,101,32,116,104,101,100,105,102,102,101,114,101,110,116,32,116,121,112,101, +115,32,111,102,116,104,101,32,79,116,116,111,109,97,110,32,69,109,112,105,114, +101,62,60,105,109,103,32,115,114,99,61,34,104,116,116,112,58,47,47,65,110,32,73, +110,116,114,111,100,117,99,116,105,111,110,32,116,111,99,111,110,115,101,113,117 +,101,110,99,101,32,111,102,32,116,104,101,100,101,112,97,114,116,117,114,101,32, +102,114,111,109,32,116,104,101,67,111,110,102,101,100,101,114,97,116,101,32,83, +116,97,116,101,115,105,110,100,105,103,101,110,111,117,115,32,112,101,111,112, +108,101,115,80,114,111,99,101,101,100,105,110,103,115,32,111,102,32,116,104,101, +105,110,102,111,114,109,97,116,105,111,110,32,111,110,32,116,104,101,116,104,101 +,111,114,105,101,115,32,104,97,118,101,32,98,101,101,110,105,110,118,111,108,118 +,101,109,101,110,116,32,105,110,32,116,104,101,100,105,118,105,100,101,100,32, +105,110,116,111,32,116,104,114,101,101,97,100,106,97,99,101,110,116,32,99,111, +117,110,116,114,105,101,115,105,115,32,114,101,115,112,111,110,115,105,98,108, +101,32,102,111,114,100,105,115,115,111,108,117,116,105,111,110,32,111,102,32,116 +,104,101,99,111,108,108,97,98,111,114,97,116,105,111,110,32,119,105,116,104,119, +105,100,101,108,121,32,114,101,103,97,114,100,101,100,32,97,115,104,105,115,32, +99,111,110,116,101,109,112,111,114,97,114,105,101,115,102,111,117,110,100,105, +110,103,32,109,101,109,98,101,114,32,111,102,68,111,109,105,110,105,99,97,110,32 +,82,101,112,117,98,108,105,99,103,101,110,101,114,97,108,108,121,32,97,99,99,101 +,112,116,101,100,116,104,101,32,112,111,115,115,105,98,105,108,105,116,121,32, +111,102,97,114,101,32,97,108,115,111,32,97,118,97,105,108,97,98,108,101,117,110, +100,101,114,32,99,111,110,115,116,114,117,99,116,105,111,110,114,101,115,116,111 +,114,97,116,105,111,110,32,111,102,32,116,104,101,116,104,101,32,103,101,110,101 +,114,97,108,32,112,117,98,108,105,99,105,115,32,97,108,109,111,115,116,32,101, +110,116,105,114,101,108,121,112,97,115,115,101,115,32,116,104,114,111,117,103, +104,32,116,104,101,104,97,115,32,98,101,101,110,32,115,117,103,103,101,115,116, +101,100,99,111,109,112,117,116,101,114,32,97,110,100,32,118,105,100,101,111,71, +101,114,109,97,110,105,99,32,108,97,110,103,117,97,103,101,115,32,97,99,99,111, +114,100,105,110,103,32,116,111,32,116,104,101,32,100,105,102,102,101,114,101,110 +,116,32,102,114,111,109,32,116,104,101,115,104,111,114,116,108,121,32,97,102,116 +,101,114,119,97,114,100,115,104,114,101,102,61,34,104,116,116,112,115,58,47,47, +119,119,119,46,114,101,99,101,110,116,32,100,101,118,101,108,111,112,109,101,110 +,116,66,111,97,114,100,32,111,102,32,68,105,114,101,99,116,111,114,115,60,100, +105,118,32,99,108,97,115,115,61,34,115,101,97,114,99,104,124,32,60,97,32,104,114 +,101,102,61,34,104,116,116,112,58,47,47,73,110,32,112,97,114,116,105,99,117,108, +97,114,44,32,116,104,101,77,117,108,116,105,112,108,101,32,102,111,111,116,110, +111,116,101,115,111,114,32,111,116,104,101,114,32,115,117,98,115,116,97,110,99, +101,116,104,111,117,115,97,110,100,115,32,111,102,32,121,101,97,114,115,116,114, +97,110,115,108,97,116,105,111,110,32,111,102,32,116,104,101,60,47,100,105,118,62 +,13,10,60,47,100,105,118,62,13,10,13,10,60,97,32,104,114,101,102,61,34,105,110, +100,101,120,46,112,104,112,119,97,115,32,101,115,116,97,98,108,105,115,104,101, +100,32,105,110,109,105,110,46,106,115,34,62,60,47,115,99,114,105,112,116,62,10, +112,97,114,116,105,99,105,112,97,116,101,32,105,110,32,116,104,101,97,32,115,116 +,114,111,110,103,32,105,110,102,108,117,101,110,99,101,115,116,121,108,101,61,34 +,109,97,114,103,105,110,45,116,111,112,58,114,101,112,114,101,115,101,110,116, +101,100,32,98,121,32,116,104,101,103,114,97,100,117,97,116,101,100,32,102,114, +111,109,32,116,104,101,84,114,97,100,105,116,105,111,110,97,108,108,121,44,32, +116,104,101,69,108,101,109,101,110,116,40,34,115,99,114,105,112,116,34,41,59,72, +111,119,101,118,101,114,44,32,115,105,110,99,101,32,116,104,101,47,100,105,118, +62,10,60,47,100,105,118,62,10,60,100,105,118,32,108,101,102,116,59,32,109,97,114 +,103,105,110,45,108,101,102,116,58,112,114,111,116,101,99,116,105,111,110,32,97, +103,97,105,110,115,116,48,59,32,118,101,114,116,105,99,97,108,45,97,108,105,103, +110,58,85,110,102,111,114,116,117,110,97,116,101,108,121,44,32,116,104,101,116, +121,112,101,61,34,105,109,97,103,101,47,120,45,105,99,111,110,47,100,105,118,62, +10,60,100,105,118,32,99,108,97,115,115,61,34,32,99,108,97,115,115,61,34,99,108, +101,97,114,102,105,120,34,62,60,100,105,118,32,99,108,97,115,115,61,34,102,111, +111,116,101,114,9,9,60,47,100,105,118,62,10,9,9,60,47,100,105,118,62,10,116,104, +101,32,109,111,116,105,111,110,32,112,105,99,116,117,114,101,208,145,209,138,208 +,187,208,179,208,176,209,128,209,129,208,186,208,184,208,177,209,138,208,187,208 +,179,208,176,209,128,209,129,208,186,208,184,208,164,208,181,208,180,208,181,209 +,128,208,176,209,134,208,184,208,184,208,189,208,181,209,129,208,186,208,190,208 +,187,209,140,208,186,208,190,209,129,208,190,208,190,208,177,209,137,208,181,208 +,189,208,184,208,181,209,129,208,190,208,190,208,177,209,137,208,181,208,189,208 +,184,209,143,208,191,209,128,208,190,208,179,209,128,208,176,208,188,208,188,209 +,139,208,158,209,130,208,191,209,128,208,176,208,178,208,184,209,130,209,140,208 +,177,208,181,209,129,208,191,208,187,208,176,209,130,208,189,208,190,208,188,208 +,176,209,130,208,181,209,128,208,184,208,176,208,187,209,139,208,191,208,190,208 +,183,208,178,208,190,208,187,209,143,208,181,209,130,208,191,208,190,209,129,208 +,187,208,181,208,180,208,189,208,184,208,181,209,128,208,176,208,183,208,187,208 +,184,209,135,208,189,209,139,209,133,208,191,209,128,208,190,208,180,209,131,208 +,186,209,134,208,184,208,184,208,191,209,128,208,190,208,179,209,128,208,176,208 +,188,208,188,208,176,208,191,208,190,208,187,208,189,208,190,209,129,209,130,209 +,140,209,142,208,189,208,176,209,133,208,190,208,180,208,184,209,130,209,129,209 +,143,208,184,208,183,208,177,209,128,208,176,208,189,208,189,208,190,208,181,208 +,189,208,176,209,129,208,181,208,187,208,181,208,189,208,184,209,143,208,184,208 +,183,208,188,208,181,208,189,208,181,208,189,208,184,209,143,208,186,208,176,209 +,130,208,181,208,179,208,190,209,128,208,184,208,184,208,144,208,187,208,181,208 +,186,209,129,208,176,208,189,208,180,209,128,224,164,166,224,165,141,224,164,181 +,224,164,190,224,164,176,224,164,190,224,164,174,224,165,136,224,164,168,224,165 +,129,224,164,133,224,164,178,224,164,170,224,165,141,224,164,176,224,164,166,224 +,164,190,224,164,168,224,164,173,224,164,190,224,164,176,224,164,164,224,165,128 +,224,164,175,224,164,133,224,164,168,224,165,129,224,164,166,224,165,135,224,164 +,182,224,164,185,224,164,191,224,164,168,224,165,141,224,164,166,224,165,128,224 +,164,135,224,164,130,224,164,161,224,164,191,224,164,175,224,164,190,224,164,166 +,224,164,191,224,164,178,224,165,141,224,164,178,224,165,128,224,164,133,224,164 +,167,224,164,191,224,164,149,224,164,190,224,164,176,224,164,181,224,165,128,224 +,164,161,224,164,191,224,164,175,224,165,139,224,164,154,224,164,191,224,164,159 +,224,165,141,224,164,160,224,165,135,224,164,184,224,164,174,224,164,190,224,164 +,154,224,164,190,224,164,176,224,164,156,224,164,130,224,164,149,224,165,141,224 +,164,182,224,164,168,224,164,166,224,165,129,224,164,168,224,164,191,224,164,175 +,224,164,190,224,164,170,224,165,141,224,164,176,224,164,175,224,165,139,224,164 +,151,224,164,133,224,164,168,224,165,129,224,164,184,224,164,190,224,164,176,224 +,164,145,224,164,168,224,164,178,224,164,190,224,164,135,224,164,168,224,164,170 +,224,164,190,224,164,176,224,165,141,224,164,159,224,165,128,224,164,182,224,164 +,176,224,165,141,224,164,164,224,165,139,224,164,130,224,164,178,224,165,139,224 +,164,149,224,164,184,224,164,173,224,164,190,224,164,171,224,164,188,224,165,141 +,224,164,178,224,165,136,224,164,182,224,164,182,224,164,176,224,165,141,224,164 +,164,224,165,135,224,164,130,224,164,170,224,165,141,224,164,176,224,164,166,224 +,165,135,224,164,182,224,164,170,224,165,141,224,164,178,224,165,135,224,164,175 +,224,164,176,224,164,149,224,165,135,224,164,130,224,164,166,224,165,141,224,164 +,176,224,164,184,224,165,141,224,164,165,224,164,191,224,164,164,224,164,191,224 +,164,137,224,164,164,224,165,141,224,164,170,224,164,190,224,164,166,224,164,137 +,224,164,168,224,165,141,224,164,185,224,165,135,224,164,130,224,164,154,224,164 +,191,224,164,159,224,165,141,224,164,160,224,164,190,224,164,175,224,164,190,224 +,164,164,224,165,141,224,164,176,224,164,190,224,164,156,224,165,141,224,164,175 +,224,164,190,224,164,166,224,164,190,224,164,170,224,165,129,224,164,176,224,164 +,190,224,164,168,224,165,135,224,164,156,224,165,139,224,164,161,224,164,188,224 +,165,135,224,164,130,224,164,133,224,164,168,224,165,129,224,164,181,224,164,190 +,224,164,166,224,164,182,224,165,141,224,164,176,224,165,135,224,164,163,224,165 +,128,224,164,182,224,164,191,224,164,149,224,165,141,224,164,183,224,164,190,224 +,164,184,224,164,176,224,164,149,224,164,190,224,164,176,224,165,128,224,164,184 +,224,164,130,224,164,151,224,165,141,224,164,176,224,164,185,224,164,170,224,164 +,176,224,164,191,224,164,163,224,164,190,224,164,174,224,164,172,224,165,141,224 +,164,176,224,164,190,224,164,130,224,164,161,224,164,172,224,164,154,224,165,141 +,224,164,154,224,165,139,224,164,130,224,164,137,224,164,170,224,164,178,224,164 +,172,224,165,141,224,164,167,224,164,174,224,164,130,224,164,164,224,165,141,224 +,164,176,224,165,128,224,164,184,224,164,130,224,164,170,224,164,176,224,165,141 +,224,164,149,224,164,137,224,164,174,224,165,141,224,164,174,224,165,128,224,164 +,166,224,164,174,224,164,190,224,164,167,224,165,141,224,164,175,224,164,174,224 +,164,184,224,164,185,224,164,190,224,164,175,224,164,164,224,164,190,224,164,182 +,224,164,172,224,165,141,224,164,166,224,165,139,224,164,130,224,164,174,224,165 +,128,224,164,161,224,164,191,224,164,175,224,164,190,224,164,134,224,164,136,224 +,164,170,224,165,128,224,164,143,224,164,178,224,164,174,224,165,139,224,164,172 +,224,164,190,224,164,135,224,164,178,224,164,184,224,164,130,224,164,150,224,165 +,141,224,164,175,224,164,190,224,164,134,224,164,170,224,164,176,224,165,135,224 +,164,182,224,164,168,224,164,133,224,164,168,224,165,129,224,164,172,224,164,130 +,224,164,167,224,164,172,224,164,190,224,164,156,224,164,188,224,164,190,224,164 +,176,224,164,168,224,164,181,224,165,128,224,164,168,224,164,164,224,164,174,224 +,164,170,224,165,141,224,164,176,224,164,174,224,165,129,224,164,150,224,164,170 +,224,165,141,224,164,176,224,164,182,224,165,141,224,164,168,224,164,170,224,164 +,176,224,164,191,224,164,181,224,164,190,224,164,176,224,164,168,224,165,129,224 +,164,149,224,164,184,224,164,190,224,164,168,224,164,184,224,164,174,224,164,176 +,224,165,141,224,164,165,224,164,168,224,164,134,224,164,175,224,165,139,224,164 +,156,224,164,191,224,164,164,224,164,184,224,165,139,224,164,174,224,164,181,224 +,164,190,224,164,176,216,167,217,132,217,133,216,180,216,167,216,177,217,131,216 +,167,216,170,216,167,217,132,217,133,217,134,216,170,216,175,217,138,216,167,216 +,170,216,167,217,132,217,131,217,133,216,168,217,138,217,136,216,170,216,177,216 +,167,217,132,217,133,216,180,216,167,217,135,216,175,216,167,216,170,216,185,216 +,175,216,175,216,167,217,132,216,178,217,136,216,167,216,177,216,185,216,175,216 +,175,216,167,217,132,216,177,216,175,217,136,216,175,216,167,217,132,216,165,216 +,179,217,132,216,167,217,133,217,138,216,169,216,167,217,132,217,129,217,136,216 +,170,217,136,216,180,217,136,216,168,216,167,217,132,217,133,216,179,216,167,216 +,168,217,130,216,167,216,170,216,167,217,132,217,133,216,185,217,132,217,136,217 +,133,216,167,216,170,216,167,217,132,217,133,216,179,217,132,216,179,217,132,216 +,167,216,170,216,167,217,132,216,172,216,177,216,167,217,129,217,138,217,131,216 +,179,216,167,217,132,216,167,216,179,217,132,216,167,217,133,217,138,216,169,216 +,167,217,132,216,167,216,170,216,181,216,167,217,132,216,167,216,170,107,101,121 +,119,111,114,100,115,34,32,99,111,110,116,101,110,116,61,34,119,51,46,111,114, +103,47,49,57,57,57,47,120,104,116,109,108,34,62,60,97,32,116,97,114,103,101,116, +61,34,95,98,108,97,110,107,34,32,116,101,120,116,47,104,116,109,108,59,32,99,104 +,97,114,115,101,116,61,34,32,116,97,114,103,101,116,61,34,95,98,108,97,110,107, +34,62,60,116,97,98,108,101,32,99,101,108,108,112,97,100,100,105,110,103,61,34,97 +,117,116,111,99,111,109,112,108,101,116,101,61,34,111,102,102,34,32,116,101,120, +116,45,97,108,105,103,110,58,32,99,101,110,116,101,114,59,116,111,32,108,97,115, +116,32,118,101,114,115,105,111,110,32,98,121,32,98,97,99,107,103,114,111,117,110 +,100,45,99,111,108,111,114,58,32,35,34,32,104,114,101,102,61,34,104,116,116,112, +58,47,47,119,119,119,46,47,100,105,118,62,60,47,100,105,118,62,60,100,105,118,32 +,105,100,61,60,97,32,104,114,101,102,61,34,35,34,32,99,108,97,115,115,61,34,34, +62,60,105,109,103,32,115,114,99,61,34,104,116,116,112,58,47,47,99,114,105,112, +116,34,32,115,114,99,61,34,104,116,116,112,58,47,47,10,60,115,99,114,105,112,116 +,32,108,97,110,103,117,97,103,101,61,34,47,47,69,78,34,32,34,104,116,116,112,58, +47,47,119,119,119,46,119,101,110,99,111,100,101,85,82,73,67,111,109,112,111,110, +101,110,116,40,34,32,104,114,101,102,61,34,106,97,118,97,115,99,114,105,112,116, +58,60,100,105,118,32,99,108,97,115,115,61,34,99,111,110,116,101,110,116,100,111, +99,117,109,101,110,116,46,119,114,105,116,101,40,39,60,115,99,112,111,115,105, +116,105,111,110,58,32,97,98,115,111,108,117,116,101,59,115,99,114,105,112,116,32 +,115,114,99,61,34,104,116,116,112,58,47,47,32,115,116,121,108,101,61,34,109,97, +114,103,105,110,45,116,111,112,58,46,109,105,110,46,106,115,34,62,60,47,115,99, +114,105,112,116,62,10,60,47,100,105,118,62,10,60,100,105,118,32,99,108,97,115, +115,61,34,119,51,46,111,114,103,47,49,57,57,57,47,120,104,116,109,108,34,32,10, +13,10,60,47,98,111,100,121,62,13,10,60,47,104,116,109,108,62,100,105,115,116,105 +,110,99,116,105,111,110,32,98,101,116,119,101,101,110,47,34,32,116,97,114,103, +101,116,61,34,95,98,108,97,110,107,34,62,60,108,105,110,107,32,104,114,101,102, +61,34,104,116,116,112,58,47,47,101,110,99,111,100,105,110,103,61,34,117,116,102, +45,56,34,63,62,10,119,46,97,100,100,69,118,101,110,116,76,105,115,116,101,110, +101,114,63,97,99,116,105,111,110,61,34,104,116,116,112,58,47,47,119,119,119,46, +105,99,111,110,34,32,104,114,101,102,61,34,104,116,116,112,58,47,47,32,115,116, +121,108,101,61,34,98,97,99,107,103,114,111,117,110,100,58,116,121,112,101,61,34, +116,101,120,116,47,99,115,115,34,32,47,62,10,109,101,116,97,32,112,114,111,112, +101,114,116,121,61,34,111,103,58,116,60,105,110,112,117,116,32,116,121,112,101, +61,34,116,101,120,116,34,32,32,115,116,121,108,101,61,34,116,101,120,116,45,97, +108,105,103,110,58,116,104,101,32,100,101,118,101,108,111,112,109,101,110,116,32 +,111,102,32,116,121,108,101,115,104,101,101,116,34,32,116,121,112,101,61,34,116, +101,104,116,109,108,59,32,99,104,97,114,115,101,116,61,117,116,102,45,56,105,115 +,32,99,111,110,115,105,100,101,114,101,100,32,116,111,32,98,101,116,97,98,108, +101,32,119,105,100,116,104,61,34,49,48,48,37,34,32,73,110,32,97,100,100,105,116, +105,111,110,32,116,111,32,116,104,101,32,99,111,110,116,114,105,98,117,116,101, +100,32,116,111,32,116,104,101,32,100,105,102,102,101,114,101,110,99,101,115,32, +98,101,116,119,101,101,110,100,101,118,101,108,111,112,109,101,110,116,32,111, +102,32,116,104,101,32,73,116,32,105,115,32,105,109,112,111,114,116,97,110,116,32 +,116,111,32,60,47,115,99,114,105,112,116,62,10,10,60,115,99,114,105,112,116,32, +32,115,116,121,108,101,61,34,102,111,110,116,45,115,105,122,101,58,49,62,60,47, +115,112,97,110,62,60,115,112,97,110,32,105,100,61,103,98,76,105,98,114,97,114, +121,32,111,102,32,67,111,110,103,114,101,115,115,60,105,109,103,32,115,114,99,61 +,34,104,116,116,112,58,47,47,105,109,69,110,103,108,105,115,104,32,116,114,97, +110,115,108,97,116,105,111,110,65,99,97,100,101,109,121,32,111,102,32,83,99,105, +101,110,99,101,115,100,105,118,32,115,116,121,108,101,61,34,100,105,115,112,108, +97,121,58,99,111,110,115,116,114,117,99,116,105,111,110,32,111,102,32,116,104, +101,46,103,101,116,69,108,101,109,101,110,116,66,121,73,100,40,105,100,41,105, +110,32,99,111,110,106,117,110,99,116,105,111,110,32,119,105,116,104,69,108,101, +109,101,110,116,40,39,115,99,114,105,112,116,39,41,59,32,60,109,101,116,97,32, +112,114,111,112,101,114,116,121,61,34,111,103,58,208,145,209,138,208,187,208,179 +,208,176,209,128,209,129,208,186,208,184,10,32,116,121,112,101,61,34,116,101,120 +,116,34,32,110,97,109,101,61,34,62,80,114,105,118,97,99,121,32,80,111,108,105,99 +,121,60,47,97,62,97,100,109,105,110,105,115,116,101,114,101,100,32,98,121,32,116 +,104,101,101,110,97,98,108,101,83,105,110,103,108,101,82,101,113,117,101,115,116 +,115,116,121,108,101,61,38,113,117,111,116,59,109,97,114,103,105,110,58,60,47, +100,105,118,62,60,47,100,105,118,62,60,47,100,105,118,62,60,62,60,105,109,103,32 +,115,114,99,61,34,104,116,116,112,58,47,47,105,32,115,116,121,108,101,61,38,113, +117,111,116,59,102,108,111,97,116,58,114,101,102,101,114,114,101,100,32,116,111, +32,97,115,32,116,104,101,32,116,111,116,97,108,32,112,111,112,117,108,97,116,105 +,111,110,32,111,102,105,110,32,87,97,115,104,105,110,103,116,111,110,44,32,68,46 +,67,46,32,115,116,121,108,101,61,34,98,97,99,107,103,114,111,117,110,100,45,97, +109,111,110,103,32,111,116,104,101,114,32,116,104,105,110,103,115,44,111,114,103 +,97,110,105,122,97,116,105,111,110,32,111,102,32,116,104,101,112,97,114,116,105, +99,105,112,97,116,101,100,32,105,110,32,116,104,101,116,104,101,32,105,110,116, +114,111,100,117,99,116,105,111,110,32,111,102,105,100,101,110,116,105,102,105, +101,100,32,119,105,116,104,32,116,104,101,102,105,99,116,105,111,110,97,108,32, +99,104,97,114,97,99,116,101,114,32,79,120,102,111,114,100,32,85,110,105,118,101, +114,115,105,116,121,32,109,105,115,117,110,100,101,114,115,116,97,110,100,105, +110,103,32,111,102,84,104,101,114,101,32,97,114,101,44,32,104,111,119,101,118, +101,114,44,115,116,121,108,101,115,104,101,101,116,34,32,104,114,101,102,61,34, +47,67,111,108,117,109,98,105,97,32,85,110,105,118,101,114,115,105,116,121,101, +120,112,97,110,100,101,100,32,116,111,32,105,110,99,108,117,100,101,117,115,117, +97,108,108,121,32,114,101,102,101,114,114,101,100,32,116,111,105,110,100,105,99, +97,116,105,110,103,32,116,104,97,116,32,116,104,101,104,97,118,101,32,115,117, +103,103,101,115,116,101,100,32,116,104,97,116,97,102,102,105,108,105,97,116,101, +100,32,119,105,116,104,32,116,104,101,99,111,114,114,101,108,97,116,105,111,110, +32,98,101,116,119,101,101,110,110,117,109,98,101,114,32,111,102,32,100,105,102, +102,101,114,101,110,116,62,60,47,116,100,62,60,47,116,114,62,60,47,116,97,98,108 +,101,62,82,101,112,117,98,108,105,99,32,111,102,32,73,114,101,108,97,110,100,10, +60,47,115,99,114,105,112,116,62,10,60,115,99,114,105,112,116,32,117,110,100,101, +114,32,116,104,101,32,105,110,102,108,117,101,110,99,101,99,111,110,116,114,105, +98,117,116,105,111,110,32,116,111,32,116,104,101,79,102,102,105,99,105,97,108,32 +,119,101,98,115,105,116,101,32,111,102,104,101,97,100,113,117,97,114,116,101,114 +,115,32,111,102,32,116,104,101,99,101,110,116,101,114,101,100,32,97,114,111,117, +110,100,32,116,104,101,105,109,112,108,105,99,97,116,105,111,110,115,32,111,102, +32,116,104,101,104,97,118,101,32,98,101,101,110,32,100,101,118,101,108,111,112, +101,100,70,101,100,101,114,97,108,32,82,101,112,117,98,108,105,99,32,111,102,98, +101,99,97,109,101,32,105,110,99,114,101,97,115,105,110,103,108,121,99,111,110, +116,105,110,117,97,116,105,111,110,32,111,102,32,116,104,101,78,111,116,101,44, +32,104,111,119,101,118,101,114,44,32,116,104,97,116,115,105,109,105,108,97,114, +32,116,111,32,116,104,97,116,32,111,102,32,99,97,112,97,98,105,108,105,116,105, +101,115,32,111,102,32,116,104,101,97,99,99,111,114,100,97,110,99,101,32,119,105, +116,104,32,116,104,101,112,97,114,116,105,99,105,112,97,110,116,115,32,105,110, +32,116,104,101,102,117,114,116,104,101,114,32,100,101,118,101,108,111,112,109, +101,110,116,117,110,100,101,114,32,116,104,101,32,100,105,114,101,99,116,105,111 +,110,105,115,32,111,102,116,101,110,32,99,111,110,115,105,100,101,114,101,100, +104,105,115,32,121,111,117,110,103,101,114,32,98,114,111,116,104,101,114,60,47, +116,100,62,60,47,116,114,62,60,47,116,97,98,108,101,62,60,97,32,104,116,116,112, +45,101,113,117,105,118,61,34,88,45,85,65,45,112,104,121,115,105,99,97,108,32,112 +,114,111,112,101,114,116,105,101,115,111,102,32,66,114,105,116,105,115,104,32,67 +,111,108,117,109,98,105,97,104,97,115,32,98,101,101,110,32,99,114,105,116,105,99 +,105,122,101,100,40,119,105,116,104,32,116,104,101,32,101,120,99,101,112,116,105 +,111,110,113,117,101,115,116,105,111,110,115,32,97,98,111,117,116,32,116,104,101 +,112,97,115,115,105,110,103,32,116,104,114,111,117,103,104,32,116,104,101,48,34, +32,99,101,108,108,112,97,100,100,105,110,103,61,34,48,34,32,116,104,111,117,115, +97,110,100,115,32,111,102,32,112,101,111,112,108,101,114,101,100,105,114,101,99, +116,115,32,104,101,114,101,46,32,70,111,114,104,97,118,101,32,99,104,105,108,100 +,114,101,110,32,117,110,100,101,114,37,51,69,37,51,67,47,115,99,114,105,112,116, +37,51,69,34,41,41,59,60,97,32,104,114,101,102,61,34,104,116,116,112,58,47,47,119 +,119,119,46,60,108,105,62,60,97,32,104,114,101,102,61,34,104,116,116,112,58,47, +47,115,105,116,101,95,110,97,109,101,34,32,99,111,110,116,101,110,116,61,34,116, +101,120,116,45,100,101,99,111,114,97,116,105,111,110,58,110,111,110,101,115,116, +121,108,101,61,34,100,105,115,112,108,97,121,58,32,110,111,110,101,60,109,101, +116,97,32,104,116,116,112,45,101,113,117,105,118,61,34,88,45,110,101,119,32,68, +97,116,101,40,41,46,103,101,116,84,105,109,101,40,41,32,116,121,112,101,61,34, +105,109,97,103,101,47,120,45,105,99,111,110,34,60,47,115,112,97,110,62,60,115, +112,97,110,32,99,108,97,115,115,61,34,108,97,110,103,117,97,103,101,61,34,106,97 +,118,97,115,99,114,105,112,116,119,105,110,100,111,119,46,108,111,99,97,116,105, +111,110,46,104,114,101,102,60,97,32,104,114,101,102,61,34,106,97,118,97,115,99, +114,105,112,116,58,45,45,62,13,10,60,115,99,114,105,112,116,32,116,121,112,101, +61,34,116,60,97,32,104,114,101,102,61,39,104,116,116,112,58,47,47,119,119,119,46 +,104,111,114,116,99,117,116,32,105,99,111,110,34,32,104,114,101,102,61,34,60,47, +100,105,118,62,13,10,60,100,105,118,32,99,108,97,115,115,61,34,60,115,99,114,105 +,112,116,32,115,114,99,61,34,104,116,116,112,58,47,47,34,32,114,101,108,61,34, +115,116,121,108,101,115,104,101,101,116,34,32,116,60,47,100,105,118,62,10,60,115 +,99,114,105,112,116,32,116,121,112,101,61,47,97,62,32,60,97,32,104,114,101,102, +61,34,104,116,116,112,58,47,47,32,97,108,108,111,119,84,114,97,110,115,112,97, +114,101,110,99,121,61,34,88,45,85,65,45,67,111,109,112,97,116,105,98,108,101,34, +32,99,111,110,114,101,108,97,116,105,111,110,115,104,105,112,32,98,101,116,119, +101,101,110,10,60,47,115,99,114,105,112,116,62,13,10,60,115,99,114,105,112,116, +32,60,47,97,62,60,47,108,105,62,60,47,117,108,62,60,47,100,105,118,62,97,115,115 +,111,99,105,97,116,101,100,32,119,105,116,104,32,116,104,101,32,112,114,111,103, +114,97,109,109,105,110,103,32,108,97,110,103,117,97,103,101,60,47,97,62,60,97,32 +,104,114,101,102,61,34,104,116,116,112,58,47,47,60,47,97,62,60,47,108,105,62,60, +108,105,32,99,108,97,115,115,61,34,102,111,114,109,32,97,99,116,105,111,110,61, +34,104,116,116,112,58,47,47,60,100,105,118,32,115,116,121,108,101,61,34,100,105, +115,112,108,97,121,58,116,121,112,101,61,34,116,101,120,116,34,32,110,97,109,101 +,61,34,113,34,60,116,97,98,108,101,32,119,105,100,116,104,61,34,49,48,48,37,34, +32,98,97,99,107,103,114,111,117,110,100,45,112,111,115,105,116,105,111,110,58,34 +,32,98,111,114,100,101,114,61,34,48,34,32,119,105,100,116,104,61,34,114,101,108, +61,34,115,104,111,114,116,99,117,116,32,105,99,111,110,34,32,104,54,62,60,117, +108,62,60,108,105,62,60,97,32,104,114,101,102,61,34,32,32,60,109,101,116,97,32, +104,116,116,112,45,101,113,117,105,118,61,34,99,115,115,34,32,109,101,100,105,97 +,61,34,115,99,114,101,101,110,34,32,114,101,115,112,111,110,115,105,98,108,101, +32,102,111,114,32,116,104,101,32,34,32,116,121,112,101,61,34,97,112,112,108,105, +99,97,116,105,111,110,47,34,32,115,116,121,108,101,61,34,98,97,99,107,103,114, +111,117,110,100,45,104,116,109,108,59,32,99,104,97,114,115,101,116,61,117,116, +102,45,56,34,32,97,108,108,111,119,116,114,97,110,115,112,97,114,101,110,99,121, +61,34,115,116,121,108,101,115,104,101,101,116,34,32,116,121,112,101,61,34,116, +101,13,10,60,109,101,116,97,32,104,116,116,112,45,101,113,117,105,118,61,34,62, +60,47,115,112,97,110,62,60,115,112,97,110,32,99,108,97,115,115,61,34,48,34,32,99 +,101,108,108,115,112,97,99,105,110,103,61,34,48,34,62,59,10,60,47,115,99,114,105 +,112,116,62,10,60,115,99,114,105,112,116,32,115,111,109,101,116,105,109,101,115, +32,99,97,108,108,101,100,32,116,104,101,100,111,101,115,32,110,111,116,32,110, +101,99,101,115,115,97,114,105,108,121,70,111,114,32,109,111,114,101,32,105,110, +102,111,114,109,97,116,105,111,110,97,116,32,116,104,101,32,98,101,103,105,110, +110,105,110,103,32,111,102,32,60,33,68,79,67,84,89,80,69,32,104,116,109,108,62, +60,104,116,109,108,112,97,114,116,105,99,117,108,97,114,108,121,32,105,110,32, +116,104,101,32,116,121,112,101,61,34,104,105,100,100,101,110,34,32,110,97,109, +101,61,34,106,97,118,97,115,99,114,105,112,116,58,118,111,105,100,40,48,41,59,34 +,101,102,102,101,99,116,105,118,101,110,101,115,115,32,111,102,32,116,104,101,32 +,97,117,116,111,99,111,109,112,108,101,116,101,61,34,111,102,102,34,32,103,101, +110,101,114,97,108,108,121,32,99,111,110,115,105,100,101,114,101,100,62,60,105, +110,112,117,116,32,116,121,112,101,61,34,116,101,120,116,34,32,34,62,60,47,115, +99,114,105,112,116,62,13,10,60,115,99,114,105,112,116,116,104,114,111,117,103, +104,111,117,116,32,116,104,101,32,119,111,114,108,100,99,111,109,109,111,110,32, +109,105,115,99,111,110,99,101,112,116,105,111,110,97,115,115,111,99,105,97,116, +105,111,110,32,119,105,116,104,32,116,104,101,60,47,100,105,118,62,10,60,47,100, +105,118,62,10,60,100,105,118,32,99,100,117,114,105,110,103,32,104,105,115,32,108 +,105,102,101,116,105,109,101,44,99,111,114,114,101,115,112,111,110,100,105,110, +103,32,116,111,32,116,104,101,116,121,112,101,61,34,105,109,97,103,101,47,120,45 +,105,99,111,110,34,32,97,110,32,105,110,99,114,101,97,115,105,110,103,32,110,117 +,109,98,101,114,100,105,112,108,111,109,97,116,105,99,32,114,101,108,97,116,105, +111,110,115,97,114,101,32,111,102,116,101,110,32,99,111,110,115,105,100,101,114, +101,100,109,101,116,97,32,99,104,97,114,115,101,116,61,34,117,116,102,45,56,34, +32,60,105,110,112,117,116,32,116,121,112,101,61,34,116,101,120,116,34,32,101,120 +,97,109,112,108,101,115,32,105,110,99,108,117,100,101,32,116,104,101,34,62,60, +105,109,103,32,115,114,99,61,34,104,116,116,112,58,47,47,105,112,97,114,116,105, +99,105,112,97,116,105,111,110,32,105,110,32,116,104,101,116,104,101,32,101,115, +116,97,98,108,105,115,104,109,101,110,116,32,111,102,10,60,47,100,105,118,62,10, +60,100,105,118,32,99,108,97,115,115,61,34,38,97,109,112,59,110,98,115,112,59,38, +97,109,112,59,110,98,115,112,59,116,111,32,100,101,116,101,114,109,105,110,101, +32,119,104,101,116,104,101,114,113,117,105,116,101,32,100,105,102,102,101,114, +101,110,116,32,102,114,111,109,109,97,114,107,101,100,32,116,104,101,32,98,101, +103,105,110,110,105,110,103,100,105,115,116,97,110,99,101,32,98,101,116,119,101, +101,110,32,116,104,101,99,111,110,116,114,105,98,117,116,105,111,110,115,32,116, +111,32,116,104,101,99,111,110,102,108,105,99,116,32,98,101,116,119,101,101,110, +32,116,104,101,119,105,100,101,108,121,32,99,111,110,115,105,100,101,114,101,100 +,32,116,111,119,97,115,32,111,110,101,32,111,102,32,116,104,101,32,102,105,114, +115,116,119,105,116,104,32,118,97,114,121,105,110,103,32,100,101,103,114,101,101 +,115,104,97,118,101,32,115,112,101,99,117,108,97,116,101,100,32,116,104,97,116, +40,100,111,99,117,109,101,110,116,46,103,101,116,69,108,101,109,101,110,116,112, +97,114,116,105,99,105,112,97,116,105,110,103,32,105,110,32,116,104,101,111,114, +105,103,105,110,97,108,108,121,32,100,101,118,101,108,111,112,101,100,101,116,97 +,32,99,104,97,114,115,101,116,61,34,117,116,102,45,56,34,62,32,116,121,112,101, +61,34,116,101,120,116,47,99,115,115,34,32,47,62,10,105,110,116,101,114,99,104,97 +,110,103,101,97,98,108,121,32,119,105,116,104,109,111,114,101,32,99,108,111,115, +101,108,121,32,114,101,108,97,116,101,100,115,111,99,105,97,108,32,97,110,100,32 +,112,111,108,105,116,105,99,97,108,116,104,97,116,32,119,111,117,108,100,32,111, +116,104,101,114,119,105,115,101,112,101,114,112,101,110,100,105,99,117,108,97, +114,32,116,111,32,116,104,101,115,116,121,108,101,32,116,121,112,101,61,34,116, +101,120,116,47,99,115,115,116,121,112,101,61,34,115,117,98,109,105,116,34,32,110 +,97,109,101,61,34,102,97,109,105,108,105,101,115,32,114,101,115,105,100,105,110, +103,32,105,110,100,101,118,101,108,111,112,105,110,103,32,99,111,117,110,116,114 +,105,101,115,99,111,109,112,117,116,101,114,32,112,114,111,103,114,97,109,109, +105,110,103,101,99,111,110,111,109,105,99,32,100,101,118,101,108,111,112,109,101 +,110,116,100,101,116,101,114,109,105,110,97,116,105,111,110,32,111,102,32,116, +104,101,102,111,114,32,109,111,114,101,32,105,110,102,111,114,109,97,116,105,111 +,110,111,110,32,115,101,118,101,114,97,108,32,111,99,99,97,115,105,111,110,115, +112,111,114,116,117,103,117,195,170,115,32,40,69,117,114,111,112,101,117,41,208, +163,208,186,209,128,208,176,209,151,208,189,209,129,209,140,208,186,208,176,209, +131,208,186,209,128,208,176,209,151,208,189,209,129,209,140,208,186,208,176,208, +160,208,190,209,129,209,129,208,184,208,185,209,129,208,186,208,190,208,185,208, +188,208,176,209,130,208,181,209,128,208,184,208,176,208,187,208,190,208,178,208, +184,208,189,209,132,208,190,209,128,208,188,208,176,209,134,208,184,208,184,209, +131,208,191,209,128,208,176,208,178,208,187,208,181,208,189,208,184,209,143,208, +189,208,181,208,190,208,177,209,133,208,190,208,180,208,184,208,188,208,190,208, +184,208,189,209,132,208,190,209,128,208,188,208,176,209,134,208,184,209,143,208, +152,208,189,209,132,208,190,209,128,208,188,208,176,209,134,208,184,209,143,208, +160,208,181,209,129,208,191,209,131,208,177,208,187,208,184,208,186,208,184,208, +186,208,190,208,187,208,184,209,135,208,181,209,129,209,130,208,178,208,190,208, +184,208,189,209,132,208,190,209,128,208,188,208,176,209,134,208,184,209,142,209, +130,208,181,209,128,209,128,208,184,209,130,208,190,209,128,208,184,208,184,208, +180,208,190,209,129,209,130,208,176,209,130,208,190,209,135,208,189,208,190,216, +167,217,132,217,133,216,170,217,136,216,167,216,172,216,175,217,136,217,134,216, +167,217,132,216,167,216,180,216,170,216,177,216,167,217,131,216,167,216,170,216, +167,217,132,216,167,217,130,216,170,216,177,216,167,216,173,216,167,216,170,104, +116,109,108,59,32,99,104,97,114,115,101,116,61,85,84,70,45,56,34,32,115,101,116, +84,105,109,101,111,117,116,40,102,117,110,99,116,105,111,110,40,41,100,105,115, +112,108,97,121,58,105,110,108,105,110,101,45,98,108,111,99,107,59,60,105,110,112 +,117,116,32,116,121,112,101,61,34,115,117,98,109,105,116,34,32,116,121,112,101, +32,61,32,39,116,101,120,116,47,106,97,118,97,115,99,114,105,60,105,109,103,32, +115,114,99,61,34,104,116,116,112,58,47,47,119,119,119,46,34,32,34,104,116,116, +112,58,47,47,119,119,119,46,119,51,46,111,114,103,47,115,104,111,114,116,99,117, +116,32,105,99,111,110,34,32,104,114,101,102,61,34,34,32,97,117,116,111,99,111, +109,112,108,101,116,101,61,34,111,102,102,34,32,60,47,97,62,60,47,100,105,118,62 +,60,100,105,118,32,99,108,97,115,115,61,60,47,97,62,60,47,108,105,62,10,60,108, +105,32,99,108,97,115,115,61,34,99,115,115,34,32,116,121,112,101,61,34,116,101, +120,116,47,99,115,115,34,32,60,102,111,114,109,32,97,99,116,105,111,110,61,34, +104,116,116,112,58,47,47,120,116,47,99,115,115,34,32,104,114,101,102,61,34,104, +116,116,112,58,47,47,108,105,110,107,32,114,101,108,61,34,97,108,116,101,114,110 +,97,116,101,34,32,13,10,60,115,99,114,105,112,116,32,116,121,112,101,61,34,116, +101,120,116,47,32,111,110,99,108,105,99,107,61,34,106,97,118,97,115,99,114,105, +112,116,58,40,110,101,119,32,68,97,116,101,41,46,103,101,116,84,105,109,101,40, +41,125,104,101,105,103,104,116,61,34,49,34,32,119,105,100,116,104,61,34,49,34,32 +,80,101,111,112,108,101,39,115,32,82,101,112,117,98,108,105,99,32,111,102,32,32, +60,97,32,104,114,101,102,61,34,104,116,116,112,58,47,47,119,119,119,46,116,101, +120,116,45,100,101,99,111,114,97,116,105,111,110,58,117,110,100,101,114,116,104, +101,32,98,101,103,105,110,110,105,110,103,32,111,102,32,116,104,101,32,60,47,100 +,105,118,62,10,60,47,100,105,118,62,10,60,47,100,105,118,62,10,101,115,116,97,98 +,108,105,115,104,109,101,110,116,32,111,102,32,116,104,101,32,60,47,100,105,118, +62,60,47,100,105,118,62,60,47,100,105,118,62,60,47,100,35,118,105,101,119,112, +111,114,116,123,109,105,110,45,104,101,105,103,104,116,58,10,60,115,99,114,105, +112,116,32,115,114,99,61,34,104,116,116,112,58,47,47,111,112,116,105,111,110,62, +60,111,112,116,105,111,110,32,118,97,108,117,101,61,111,102,116,101,110,32,114, +101,102,101,114,114,101,100,32,116,111,32,97,115,32,47,111,112,116,105,111,110, +62,10,60,111,112,116,105,111,110,32,118,97,108,117,60,33,68,79,67,84,89,80,69,32 +,104,116,109,108,62,10,60,33,45,45,91,73,110,116,101,114,110,97,116,105,111,110, +97,108,32,65,105,114,112,111,114,116,62,10,60,97,32,104,114,101,102,61,34,104, +116,116,112,58,47,47,119,119,119,60,47,97,62,60,97,32,104,114,101,102,61,34,104, +116,116,112,58,47,47,119,224,184,160,224,184,178,224,184,169,224,184,178,224,185 +,132,224,184,151,224,184,162,225,131,165,225,131,144,225,131,160,225,131,151,225 +,131,163,225,131,154,225,131,152,230,173,163,233,171,148,228,184,173,230,150,135 +,32,40,231,185,129,233,171,148,41,224,164,168,224,164,191,224,164,176,224,165, +141,224,164,166,224,165,135,224,164,182,224,164,161,224,164,190,224,164,137,224, +164,168,224,164,178,224,165,139,224,164,161,224,164,149,224,165,141,224,164,183, +224,165,135,224,164,164,224,165,141,224,164,176,224,164,156,224,164,190,224,164, +168,224,164,149,224,164,190,224,164,176,224,165,128,224,164,184,224,164,130,224, +164,172,224,164,130,224,164,167,224,164,191,224,164,164,224,164,184,224,165,141, +224,164,165,224,164,190,224,164,170,224,164,168,224,164,190,224,164,184,224,165, +141,224,164,181,224,165,128,224,164,149,224,164,190,224,164,176,224,164,184,224, +164,130,224,164,184,224,165,141,224,164,149,224,164,176,224,164,163,224,164,184, +224,164,190,224,164,174,224,164,151,224,165,141,224,164,176,224,165,128,224,164, +154,224,164,191,224,164,159,224,165,141,224,164,160,224,165,139,224,164,130,224, +164,181,224,164,191,224,164,156,224,165,141,224,164,158,224,164,190,224,164,168, +224,164,133,224,164,174,224,165,135,224,164,176,224,164,191,224,164,149,224,164, +190,224,164,181,224,164,191,224,164,173,224,164,191,224,164,168,224,165,141,224, +164,168,224,164,151,224,164,190,224,164,161,224,164,191,224,164,175,224,164,190, +224,164,129,224,164,149,224,165,141,224,164,175,224,165,139,224,164,130,224,164, +149,224,164,191,224,164,184,224,165,129,224,164,176,224,164,149,224,165,141,224, +164,183,224,164,190,224,164,170,224,164,185,224,165,129,224,164,129,224,164,154, +224,164,164,224,165,128,224,164,170,224,165,141,224,164,176,224,164,172,224,164, +130,224,164,167,224,164,168,224,164,159,224,164,191,224,164,170,224,165,141,224, +164,170,224,164,163,224,165,128,224,164,149,224,165,141,224,164,176,224,164,191, +224,164,149,224,165,135,224,164,159,224,164,170,224,165,141,224,164,176,224,164, +190,224,164,176,224,164,130,224,164,173,224,164,170,224,165,141,224,164,176,224, +164,190,224,164,170,224,165,141,224,164,164,224,164,174,224,164,190,224,164,178, +224,164,191,224,164,149,224,165,139,224,164,130,224,164,176,224,164,171,224,164, +188,224,165,141,224,164,164,224,164,190,224,164,176,224,164,168,224,164,191,224, +164,176,224,165,141,224,164,174,224,164,190,224,164,163,224,164,178,224,164,191, +224,164,174,224,164,191,224,164,159,224,165,135,224,164,161,100,101,115,99,114, +105,112,116,105,111,110,34,32,99,111,110,116,101,110,116,61,34,100,111,99,117, +109,101,110,116,46,108,111,99,97,116,105,111,110,46,112,114,111,116,46,103,101, +116,69,108,101,109,101,110,116,115,66,121,84,97,103,78,97,109,101,40,60,33,68,79 +,67,84,89,80,69,32,104,116,109,108,62,10,60,104,116,109,108,32,60,109,101,116,97 +,32,99,104,97,114,115,101,116,61,34,117,116,102,45,56,34,62,58,117,114,108,34,32 +,99,111,110,116,101,110,116,61,34,104,116,116,112,58,47,47,46,99,115,115,34,32, +114,101,108,61,34,115,116,121,108,101,115,104,101,101,116,34,115,116,121,108,101 +,32,116,121,112,101,61,34,116,101,120,116,47,99,115,115,34,62,116,121,112,101,61 +,34,116,101,120,116,47,99,115,115,34,32,104,114,101,102,61,34,119,51,46,111,114, +103,47,49,57,57,57,47,120,104,116,109,108,34,32,120,109,108,116,121,112,101,61, +34,116,101,120,116,47,106,97,118,97,115,99,114,105,112,116,34,32,109,101,116,104 +,111,100,61,34,103,101,116,34,32,97,99,116,105,111,110,61,34,108,105,110,107,32, +114,101,108,61,34,115,116,121,108,101,115,104,101,101,116,34,32,32,61,32,100,111 +,99,117,109,101,110,116,46,103,101,116,69,108,101,109,101,110,116,116,121,112, +101,61,34,105,109,97,103,101,47,120,45,105,99,111,110,34,32,47,62,99,101,108,108 +,112,97,100,100,105,110,103,61,34,48,34,32,99,101,108,108,115,112,46,99,115,115, +34,32,116,121,112,101,61,34,116,101,120,116,47,99,115,115,34,32,60,47,97,62,60, +47,108,105,62,60,108,105,62,60,97,32,104,114,101,102,61,34,34,32,119,105,100,116 +,104,61,34,49,34,32,104,101,105,103,104,116,61,34,49,34,34,62,60,97,32,104,114, +101,102,61,34,104,116,116,112,58,47,47,119,119,119,46,115,116,121,108,101,61,34, +100,105,115,112,108,97,121,58,110,111,110,101,59,34,62,97,108,116,101,114,110,97 +,116,101,34,32,116,121,112,101,61,34,97,112,112,108,105,45,47,47,87,51,67,47,47, +68,84,68,32,88,72,84,77,76,32,49,46,48,32,101,108,108,115,112,97,99,105,110,103, +61,34,48,34,32,99,101,108,108,112,97,100,32,116,121,112,101,61,34,104,105,100, +100,101,110,34,32,118,97,108,117,101,61,34,47,97,62,38,110,98,115,112,59,60,115, +112,97,110,32,114,111,108,101,61,34,115,10,60,105,110,112,117,116,32,116,121,112 +,101,61,34,104,105,100,100,101,110,34,32,108,97,110,103,117,97,103,101,61,34,74, +97,118,97,83,99,114,105,112,116,34,32,32,100,111,99,117,109,101,110,116,46,103, +101,116,69,108,101,109,101,110,116,115,66,103,61,34,48,34,32,99,101,108,108,115, +112,97,99,105,110,103,61,34,48,34,32,121,112,101,61,34,116,101,120,116,47,99,115 +,115,34,32,109,101,100,105,97,61,34,116,121,112,101,61,39,116,101,120,116,47,106 +,97,118,97,115,99,114,105,112,116,39,119,105,116,104,32,116,104,101,32,101,120, +99,101,112,116,105,111,110,32,111,102,32,121,112,101,61,34,116,101,120,116,47,99 +,115,115,34,32,114,101,108,61,34,115,116,32,104,101,105,103,104,116,61,34,49,34, +32,119,105,100,116,104,61,34,49,34,32,61,39,43,101,110,99,111,100,101,85,82,73, +67,111,109,112,111,110,101,110,116,40,60,108,105,110,107,32,114,101,108,61,34,97 +,108,116,101,114,110,97,116,101,34,32,10,98,111,100,121,44,32,116,114,44,32,105, +110,112,117,116,44,32,116,101,120,116,109,101,116,97,32,110,97,109,101,61,34,114 +,111,98,111,116,115,34,32,99,111,110,109,101,116,104,111,100,61,34,112,111,115, +116,34,32,97,99,116,105,111,110,61,34,62,10,60,97,32,104,114,101,102,61,34,104, +116,116,112,58,47,47,119,119,119,46,99,115,115,34,32,114,101,108,61,34,115,116, +121,108,101,115,104,101,101,116,34,32,60,47,100,105,118,62,60,47,100,105,118,62, +60,100,105,118,32,99,108,97,115,115,108,97,110,103,117,97,103,101,61,34,106,97, +118,97,115,99,114,105,112,116,34,62,97,114,105,97,45,104,105,100,100,101,110,61, +34,116,114,117,101,34,62,194,183,60,114,105,112,116,34,32,116,121,112,101,61,34, +116,101,120,116,47,106,97,118,97,115,108,61,48,59,125,41,40,41,59,10,40,102,117, +110,99,116,105,111,110,40,41,123,98,97,99,107,103,114,111,117,110,100,45,105,109 +,97,103,101,58,32,117,114,108,40,47,97,62,60,47,108,105,62,60,108,105,62,60,97, +32,104,114,101,102,61,34,104,9,9,60,108,105,62,60,97,32,104,114,101,102,61,34, +104,116,116,112,58,47,47,97,116,111,114,34,32,97,114,105,97,45,104,105,100,100, +101,110,61,34,116,114,117,62,32,60,97,32,104,114,101,102,61,34,104,116,116,112, +58,47,47,119,119,119,46,108,97,110,103,117,97,103,101,61,34,106,97,118,97,115,99 +,114,105,112,116,34,32,47,111,112,116,105,111,110,62,10,60,111,112,116,105,111, +110,32,118,97,108,117,101,47,100,105,118,62,60,47,100,105,118,62,60,100,105,118, +32,99,108,97,115,115,61,114,97,116,111,114,34,32,97,114,105,97,45,104,105,100, +100,101,110,61,34,116,114,101,61,40,110,101,119,32,68,97,116,101,41,46,103,101, +116,84,105,109,101,40,41,112,111,114,116,117,103,117,195,170,115,32,40,100,111, +32,66,114,97,115,105,108,41,208,190,209,128,208,179,208,176,208,189,208,184,208, +183,208,176,209,134,208,184,208,184,208,178,208,190,208,183,208,188,208,190,208, +182,208,189,208,190,209,129,209,130,209,140,208,190,208,177,209,128,208,176,208, +183,208,190,208,178,208,176,208,189,208,184,209,143,209,128,208,181,208,179,208, +184,209,129,209,130,209,128,208,176,209,134,208,184,208,184,208,178,208,190,208, +183,208,188,208,190,208,182,208,189,208,190,209,129,209,130,208,184,208,190,208, +177,209,143,208,183,208,176,209,130,208,181,208,187,209,140,208,189,208,176,60, +33,68,79,67,84,89,80,69,32,104,116,109,108,32,80,85,66,76,73,67,32,34,110,116,45 +,84,121,112,101,34,32,99,111,110,116,101,110,116,61,34,116,101,120,116,47,60,109 +,101,116,97,32,104,116,116,112,45,101,113,117,105,118,61,34,67,111,110,116,101, +114,97,110,115,105,116,105,111,110,97,108,47,47,69,78,34,32,34,104,116,116,112, +58,60,104,116,109,108,32,120,109,108,110,115,61,34,104,116,116,112,58,47,47,119, +119,119,45,47,47,87,51,67,47,47,68,84,68,32,88,72,84,77,76,32,49,46,48,32,84,68, +84,68,47,120,104,116,109,108,49,45,116,114,97,110,115,105,116,105,111,110,97,108 +,47,47,119,119,119,46,119,51,46,111,114,103,47,84,82,47,120,104,116,109,108,49, +47,112,101,32,61,32,39,116,101,120,116,47,106,97,118,97,115,99,114,105,112,116, +39,59,60,109,101,116,97,32,110,97,109,101,61,34,100,101,115,99,114,105,112,116, +105,111,110,112,97,114,101,110,116,78,111,100,101,46,105,110,115,101,114,116,66, +101,102,111,114,101,60,105,110,112,117,116,32,116,121,112,101,61,34,104,105,100, +100,101,110,34,32,110,97,106,115,34,32,116,121,112,101,61,34,116,101,120,116,47, +106,97,118,97,115,99,114,105,40,100,111,99,117,109,101,110,116,41,46,114,101,97, +100,121,40,102,117,110,99,116,105,115,99,114,105,112,116,32,116,121,112,101,61, +34,116,101,120,116,47,106,97,118,97,115,105,109,97,103,101,34,32,99,111,110,116, +101,110,116,61,34,104,116,116,112,58,47,47,85,65,45,67,111,109,112,97,116,105,98 +,108,101,34,32,99,111,110,116,101,110,116,61,116,109,108,59,32,99,104,97,114,115 +,101,116,61,117,116,102,45,56,34,32,47,62,10,108,105,110,107,32,114,101,108,61, +34,115,104,111,114,116,99,117,116,32,105,99,111,110,60,108,105,110,107,32,114, +101,108,61,34,115,116,121,108,101,115,104,101,101,116,34,32,60,47,115,99,114,105 +,112,116,62,10,60,115,99,114,105,112,116,32,116,121,112,101,61,61,32,100,111,99, +117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,60,97,32,116 +,97,114,103,101,116,61,34,95,98,108,97,110,107,34,32,104,114,101,102,61,32,100, +111,99,117,109,101,110,116,46,103,101,116,69,108,101,109,101,110,116,115,66,105, +110,112,117,116,32,116,121,112,101,61,34,116,101,120,116,34,32,110,97,109,101,61 +,97,46,116,121,112,101,32,61,32,39,116,101,120,116,47,106,97,118,97,115,99,114, +105,110,112,117,116,32,116,121,112,101,61,34,104,105,100,100,101,110,34,32,110, +97,109,101,104,116,109,108,59,32,99,104,97,114,115,101,116,61,117,116,102,45,56, +34,32,47,62,100,116,100,34,62,10,60,104,116,109,108,32,120,109,108,110,115,61,34 +,104,116,116,112,45,47,47,87,51,67,47,47,68,84,68,32,72,84,77,76,32,52,46,48,49, +32,84,101,110,116,115,66,121,84,97,103,78,97,109,101,40,39,115,99,114,105,112, +116,39,41,105,110,112,117,116,32,116,121,112,101,61,34,104,105,100,100,101,110, +34,32,110,97,109,60,115,99,114,105,112,116,32,116,121,112,101,61,34,116,101,120, +116,47,106,97,118,97,115,34,32,115,116,121,108,101,61,34,100,105,115,112,108,97, +121,58,110,111,110,101,59,34,62,100,111,99,117,109,101,110,116,46,103,101,116,69 +,108,101,109,101,110,116,66,121,73,100,40,61,100,111,99,117,109,101,110,116,46, +99,114,101,97,116,101,69,108,101,109,101,110,116,40,39,32,116,121,112,101,61,39, +116,101,120,116,47,106,97,118,97,115,99,114,105,112,116,39,105,110,112,117,116, +32,116,121,112,101,61,34,116,101,120,116,34,32,110,97,109,101,61,34,100,46,103, +101,116,69,108,101,109,101,110,116,115,66,121,84,97,103,78,97,109,101,40,115,110 +,105,99,97,108,34,32,104,114,101,102,61,34,104,116,116,112,58,47,47,119,119,119, +46,67,47,47,68,84,68,32,72,84,77,76,32,52,46,48,49,32,84,114,97,110,115,105,116, +60,115,116,121,108,101,32,116,121,112,101,61,34,116,101,120,116,47,99,115,115,34 +,62,10,10,60,115,116,121,108,101,32,116,121,112,101,61,34,116,101,120,116,47,99, +115,115,34,62,105,111,110,97,108,46,100,116,100,34,62,10,60,104,116,109,108,32, +120,109,108,110,115,61,104,116,116,112,45,101,113,117,105,118,61,34,67,111,110, +116,101,110,116,45,84,121,112,101,100,105,110,103,61,34,48,34,32,99,101,108,108, +115,112,97,99,105,110,103,61,34,48,34,104,116,109,108,59,32,99,104,97,114,115, +101,116,61,117,116,102,45,56,34,32,47,62,10,32,115,116,121,108,101,61,34,100,105 +,115,112,108,97,121,58,110,111,110,101,59,34,62,60,60,108,105,62,60,97,32,104, +114,101,102,61,34,104,116,116,112,58,47,47,119,119,119,46,32,116,121,112,101,61, +39,116,101,120,116,47,106,97,118,97,115,99,114,105,112,116,39,62,208,180,208,181 +,209,143,209,130,208,181,208,187,209,140,208,189,208,190,209,129,209,130,208,184 +,209,129,208,190,208,190,209,130,208,178,208,181,209,130,209,129,209,130,208,178 +,208,184,208,184,208,191,209,128,208,190,208,184,208,183,208,178,208,190,208,180 +,209,129,209,130,208,178,208,176,208,177,208,181,208,183,208,190,208,191,208,176 +,209,129,208,189,208,190,209,129,209,130,208,184,224,164,170,224,165,129,224,164 +,184,224,165,141,224,164,164,224,164,191,224,164,149,224,164,190,224,164,149,224 +,164,190,224,164,130,224,164,151,224,165,141,224,164,176,224,165,135,224,164,184 +,224,164,137,224,164,168,224,165,141,224,164,185,224,165,139,224,164,130,224,164 +,168,224,165,135,224,164,181,224,164,191,224,164,167,224,164,190,224,164,168,224 +,164,184,224,164,173,224,164,190,224,164,171,224,164,191,224,164,149,224,165,141 +,224,164,184,224,164,191,224,164,130,224,164,151,224,164,184,224,165,129,224,164 +,176,224,164,149,224,165,141,224,164,183,224,164,191,224,164,164,224,164,149,224 +,165,137,224,164,170,224,165,128,224,164,176,224,164,190,224,164,135,224,164,159 +,224,164,181,224,164,191,224,164,156,224,165,141,224,164,158,224,164,190,224,164 +,170,224,164,168,224,164,149,224,164,190,224,164,176,224,165,141,224,164,176,224 +,164,181,224,164,190,224,164,136,224,164,184,224,164,149,224,165,141,224,164,176 +,224,164,191,224,164,175,224,164,164,224,164,190 +} +; +#endif /* !BROTLI_EXTERNAL_DICTIONARY_DATA */ + +static BrotliDictionary kBrotliDictionary = { + /* size_bits_by_length */ + { + 0, 0, 0, 0, 10, 10, 11, 11, + 10, 10, 10, 10, 10, 9, 9, 8, + 7, 7, 8, 7, 7, 6, 6, 5, + 5, 0, 0, 0, 0, 0, 0, 0 + }, + + /* offsets_by_length */ + { + 0, 0, 0, 0, 0, 4096, 9216, 21504, + 35840, 44032, 53248, 63488, 74752, 87040, 93696, 100864, + 104704, 106752, 108928, 113536, 115968, 118528, 119872, 121280, + 122016, 122784, 122784, 122784, 122784, 122784, 122784, 122784 + }, + + /* data_size == sizeof(kBrotliDictionaryData) */ + 122784, + + /* data */ +#if defined(BROTLI_EXTERNAL_DICTIONARY_DATA) + NULL +#else + kBrotliDictionaryData +#endif +}; + +const BrotliDictionary* BrotliGetDictionary() { + return &kBrotliDictionary; +} + +void BrotliSetDictionaryData(const uint8_t* data) { + if (!!data && !kBrotliDictionary.data) { + kBrotliDictionary.data = data; + } +} + +#if defined(__cplusplus) || defined(c_plusplus) +} /* extern "C" */ +#endif diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c.meta new file mode 100644 index 00000000..e5124d0b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.c.meta @@ -0,0 +1,69 @@ +fileFormatVersion: 2 +guid: 81d03c46083b027478f1e35022f24360 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude Lumin: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h new file mode 100644 index 00000000..f3fb6bea --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h @@ -0,0 +1,65 @@ +/* Copyright 2013 Google Inc. All Rights Reserved. + + Distributed under MIT license. + See file LICENSE for detail or copy at https://opensource.org/licenses/MIT +*/ + +/* Collection of static dictionary words. */ + +#ifndef BROTLI_COMMON_DICTIONARY_H_ +#define BROTLI_COMMON_DICTIONARY_H_ + +#include "./port.h" +#include "./types.h" +#include + +#if defined(__cplusplus) || defined(c_plusplus) +extern "C" { +#endif + +typedef struct BrotliDictionary { + /** + * Number of bits to encode index of dictionary word in a bucket. + * + * Specification: Appendix A. Static Dictionary Data + * + * Words in a dictionary are bucketed by length. + * @c 0 means that there are no words of a given length. + * Dictionary consists of words with length of [4..24] bytes. + * Values at [0..3] and [25..31] indices should not be addressed. + */ + uint8_t size_bits_by_length[32]; + + /* assert(offset[i + 1] == offset[i] + (bits[i] ? (i << bits[i]) : 0)) */ + uint32_t offsets_by_length[32]; + + /* assert(data_size == offsets_by_length[31]) */ + size_t data_size; + + /* Data array is not bound, and should obey to size_bits_by_length values. + Specified size matches default (RFC 7932) dictionary. Its size is + defined by data_size */ + const uint8_t* data; +} BrotliDictionary; + +BROTLI_COMMON_API const BrotliDictionary* BrotliGetDictionary(void); + +/** + * Sets dictionary data. + * + * When dictionary data is already set / present, this method is no-op. + * + * Dictionary data MUST be provided before BrotliGetDictionary is invoked. + * This method is used ONLY in multi-client environment (e.g. C + Java), + * to reduce storage by sharing single dictionary between implementations. + */ +BROTLI_COMMON_API void BrotliSetDictionaryData(const uint8_t* data); + +#define BROTLI_MIN_DICTIONARY_WORD_LENGTH 4 +#define BROTLI_MAX_DICTIONARY_WORD_LENGTH 24 + +#if defined(__cplusplus) || defined(c_plusplus) +} /* extern "C" */ +#endif + +#endif /* BROTLI_COMMON_DICTIONARY_H_ */ diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h.meta new file mode 100644 index 00000000..4611e6e4 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/dictionary.h.meta @@ -0,0 +1,69 @@ +fileFormatVersion: 2 +guid: 77fa48b863192b44ab65191d005793b3 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude Lumin: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h b/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h new file mode 100644 index 00000000..825237a3 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h @@ -0,0 +1,288 @@ +/* Copyright 2016 Google Inc. All Rights Reserved. + + Distributed under MIT license. + See file LICENSE for detail or copy at https://opensource.org/licenses/MIT +*/ + +/* Macros for compiler / platform specific API declarations. */ + +#ifndef BROTLI_COMMON_PORT_H_ +#define BROTLI_COMMON_PORT_H_ + +/* The following macros were borrowed from https://github.com/nemequ/hedley + * with permission of original author - Evan Nemerson */ + +/* >>> >>> >>> hedley macros */ + +#define BROTLI_MAKE_VERSION(major, minor, revision) \ + (((major) * 1000000) + ((minor) * 1000) + (revision)) + +#if defined(__GNUC__) && defined(__GNUC_PATCHLEVEL__) +#define BROTLI_GNUC_VERSION \ + BROTLI_MAKE_VERSION(__GNUC__, __GNUC_MINOR__, __GNUC_PATCHLEVEL__) +#elif defined(__GNUC__) +#define BROTLI_GNUC_VERSION BROTLI_MAKE_VERSION(__GNUC__, __GNUC_MINOR__, 0) +#endif + +#if defined(BROTLI_GNUC_VERSION) +#define BROTLI_GNUC_VERSION_CHECK(major, minor, patch) \ + (BROTLI_GNUC_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_GNUC_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(_MSC_FULL_VER) && (_MSC_FULL_VER >= 140000000) +#define BROTLI_MSVC_VERSION \ + BROTLI_MAKE_VERSION((_MSC_FULL_VER / 10000000), \ + (_MSC_FULL_VER % 10000000) / 100000, \ + (_MSC_FULL_VER % 100000) / 100) +#elif defined(_MSC_FULL_VER) +#define BROTLI_MSVC_VERSION \ + BROTLI_MAKE_VERSION((_MSC_FULL_VER / 1000000), \ + (_MSC_FULL_VER % 1000000) / 10000, \ + (_MSC_FULL_VER % 10000) / 10) +#elif defined(_MSC_VER) +#define BROTLI_MSVC_VERSION \ + BROTLI_MAKE_VERSION(_MSC_VER / 100, _MSC_VER % 100, 0) +#endif + +#if !defined(_MSC_VER) +#define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) (0) +#elif defined(_MSC_VER) && (_MSC_VER >= 1400) +#define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ + (_MSC_FULL_VER >= ((major * 10000000) + (minor * 100000) + (patch))) +#elif defined(_MSC_VER) && (_MSC_VER >= 1200) +#define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ + (_MSC_FULL_VER >= ((major * 1000000) + (minor * 10000) + (patch))) +#else +#define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ + (_MSC_VER >= ((major * 100) + (minor))) +#endif + +#if defined(__INTEL_COMPILER) && defined(__INTEL_COMPILER_UPDATE) +#define BROTLI_INTEL_VERSION \ + BROTLI_MAKE_VERSION(__INTEL_COMPILER / 100, \ + __INTEL_COMPILER % 100, \ + __INTEL_COMPILER_UPDATE) +#elif defined(__INTEL_COMPILER) +#define BROTLI_INTEL_VERSION \ + BROTLI_MAKE_VERSION(__INTEL_COMPILER / 100, __INTEL_COMPILER % 100, 0) +#endif + +#if defined(BROTLI_INTEL_VERSION) +#define BROTLI_INTEL_VERSION_CHECK(major, minor, patch) \ + (BROTLI_INTEL_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_INTEL_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__PGI) && \ + defined(__PGIC__) && defined(__PGIC_MINOR__) && defined(__PGIC_PATCHLEVEL__) +#define BROTLI_PGI_VERSION \ + BROTLI_MAKE_VERSION(__PGIC__, __PGIC_MINOR__, __PGIC_PATCHLEVEL__) +#endif + +#if defined(BROTLI_PGI_VERSION) +#define BROTLI_PGI_VERSION_CHECK(major, minor, patch) \ + (BROTLI_PGI_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_PGI_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__SUNPRO_C) && (__SUNPRO_C > 0x1000) +#define BROTLI_SUNPRO_VERSION \ + BROTLI_MAKE_VERSION( \ + (((__SUNPRO_C >> 16) & 0xf) * 10) + ((__SUNPRO_C >> 12) & 0xf), \ + (((__SUNPRO_C >> 8) & 0xf) * 10) + ((__SUNPRO_C >> 4) & 0xf), \ + (__SUNPRO_C & 0xf) * 10) +#elif defined(__SUNPRO_C) +#define BROTLI_SUNPRO_VERSION \ + BROTLI_MAKE_VERSION((__SUNPRO_C >> 8) & 0xf, \ + (__SUNPRO_C >> 4) & 0xf, \ + (__SUNPRO_C) & 0xf) +#elif defined(__SUNPRO_CC) && (__SUNPRO_CC > 0x1000) +#define BROTLI_SUNPRO_VERSION \ + BROTLI_MAKE_VERSION( \ + (((__SUNPRO_CC >> 16) & 0xf) * 10) + ((__SUNPRO_CC >> 12) & 0xf), \ + (((__SUNPRO_CC >> 8) & 0xf) * 10) + ((__SUNPRO_CC >> 4) & 0xf), \ + (__SUNPRO_CC & 0xf) * 10) +#elif defined(__SUNPRO_CC) +#define BROTLI_SUNPRO_VERSION \ + BROTLI_MAKE_VERSION((__SUNPRO_CC >> 8) & 0xf, \ + (__SUNPRO_CC >> 4) & 0xf, \ + (__SUNPRO_CC) & 0xf) +#endif + +#if defined(BROTLI_SUNPRO_VERSION) +#define BROTLI_SUNPRO_VERSION_CHECK(major, minor, patch) \ + (BROTLI_SUNPRO_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_SUNPRO_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__CC_ARM) && defined(__ARMCOMPILER_VERSION) +#define BROTLI_ARM_VERSION \ + BROTLI_MAKE_VERSION((__ARMCOMPILER_VERSION / 1000000), \ + (__ARMCOMPILER_VERSION % 1000000) / 10000, \ + (__ARMCOMPILER_VERSION % 10000) / 100) +#elif defined(__CC_ARM) && defined(__ARMCC_VERSION) +#define BROTLI_ARM_VERSION \ + BROTLI_MAKE_VERSION((__ARMCC_VERSION / 1000000), \ + (__ARMCC_VERSION % 1000000) / 10000, \ + (__ARMCC_VERSION % 10000) / 100) +#endif + +#if defined(BROTLI_ARM_VERSION) +#define BROTLI_ARM_VERSION_CHECK(major, minor, patch) \ + (BROTLI_ARM_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_ARM_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__ibmxl__) +#define BROTLI_IBM_VERSION \ + BROTLI_MAKE_VERSION(__ibmxl_version__, \ + __ibmxl_release__, \ + __ibmxl_modification__) +#elif defined(__xlC__) && defined(__xlC_ver__) +#define BROTLI_IBM_VERSION \ + BROTLI_MAKE_VERSION(__xlC__ >> 8, __xlC__ & 0xff, (__xlC_ver__ >> 8) & 0xff) +#elif defined(__xlC__) +#define BROTLI_IBM_VERSION BROTLI_MAKE_VERSION(__xlC__ >> 8, __xlC__ & 0xff, 0) +#endif + +#if defined(BROTLI_IBM_VERSION) +#define BROTLI_IBM_VERSION_CHECK(major, minor, patch) \ + (BROTLI_IBM_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_IBM_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__TI_COMPILER_VERSION__) +#define BROTLI_TI_VERSION \ + BROTLI_MAKE_VERSION((__TI_COMPILER_VERSION__ / 1000000), \ + (__TI_COMPILER_VERSION__ % 1000000) / 1000, \ + (__TI_COMPILER_VERSION__ % 1000)) +#endif + +#if defined(BROTLI_TI_VERSION) +#define BROTLI_TI_VERSION_CHECK(major, minor, patch) \ + (BROTLI_TI_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_TI_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__IAR_SYSTEMS_ICC__) +#if __VER__ > 1000 +#define BROTLI_IAR_VERSION \ + BROTLI_MAKE_VERSION((__VER__ / 1000000), \ + (__VER__ / 1000) % 1000, \ + (__VER__ % 1000)) +#else +#define BROTLI_IAR_VERSION BROTLI_MAKE_VERSION(VER / 100, __VER__ % 100, 0) +#endif +#endif + +#if defined(BROTLI_IAR_VERSION) +#define BROTLI_IAR_VERSION_CHECK(major, minor, patch) \ + (BROTLI_IAR_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_IAR_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__TINYC__) +#define BROTLI_TINYC_VERSION \ + BROTLI_MAKE_VERSION(__TINYC__ / 1000, (__TINYC__ / 100) % 10, __TINYC__ % 100) +#endif + +#if defined(BROTLI_TINYC_VERSION) +#define BROTLI_TINYC_VERSION_CHECK(major, minor, patch) \ + (BROTLI_TINYC_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch)) +#else +#define BROTLI_TINYC_VERSION_CHECK(major, minor, patch) (0) +#endif + +#if defined(__has_attribute) +#define BROTLI_GNUC_HAS_ATTRIBUTE(attribute, major, minor, patch) \ + __has_attribute(attribute) +#else +#define BROTLI_GNUC_HAS_ATTRIBUTE(attribute, major, minor, patch) \ + BROTLI_GNUC_VERSION_CHECK(major, minor, patch) +#endif + +#if defined(__has_builtin) +#define BROTLI_GNUC_HAS_BUILTIN(builtin, major, minor, patch) \ + __has_builtin(builtin) +#else +#define BROTLI_GNUC_HAS_BUILTIN(builtin, major, minor, patch) \ + BROTLI_GNUC_VERSION_CHECK(major, minor, patch) +#endif + +#if defined(__has_feature) +#define BROTLI_HAS_FEATURE(feature) __has_feature(feature) +#else +#define BROTLI_HAS_FEATURE(feature) (0) +#endif + +#if defined(ADDRESS_SANITIZER) || BROTLI_HAS_FEATURE(address_sanitizer) || \ + defined(THREAD_SANITIZER) || BROTLI_HAS_FEATURE(thread_sanitizer) || \ + defined(MEMORY_SANITIZER) || BROTLI_HAS_FEATURE(memory_sanitizer) +#define BROTLI_SANITIZED 1 +#else +#define BROTLI_SANITIZED 0 +#endif + +#if defined(_WIN32) || defined(__CYGWIN__) +#define BROTLI_PUBLIC +#elif BROTLI_GNUC_VERSION_CHECK(3, 3, 0) || \ + BROTLI_TI_VERSION_CHECK(8, 0, 0) || \ + BROTLI_INTEL_VERSION_CHECK(16, 0, 0) || \ + BROTLI_ARM_VERSION_CHECK(4, 1, 0) || \ + BROTLI_IBM_VERSION_CHECK(13, 1, 0) || \ + BROTLI_SUNPRO_VERSION_CHECK(5, 11, 0) || \ + (BROTLI_TI_VERSION_CHECK(7, 3, 0) && \ + defined(__TI_GNU_ATTRIBUTE_SUPPORT__) && defined(__TI_EABI__)) +#define BROTLI_PUBLIC __attribute__ ((visibility ("default"))) +#else +#define BROTLI_PUBLIC +#endif + +#if defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) && \ + !defined(__STDC_NO_VLA__) && !defined(__cplusplus) && \ + !defined(__PGI) && !defined(__PGIC__) && !defined(__TINYC__) +#define BROTLI_ARRAY_PARAM(name) (name) +#else +#define BROTLI_ARRAY_PARAM(name) +#endif + +/* <<< <<< <<< end of hedley macros. */ + +#if defined(BROTLI_SHARED_COMPILATION) +#if defined(_WIN32) +#if defined(BROTLICOMMON_SHARED_COMPILATION) +#define BROTLI_COMMON_API __declspec(dllexport) +#else +#define BROTLI_COMMON_API __declspec(dllimport) +#endif /* BROTLICOMMON_SHARED_COMPILATION */ +#if defined(BROTLIDEC_SHARED_COMPILATION) +#define BROTLI_DEC_API __declspec(dllexport) +#else +#define BROTLI_DEC_API __declspec(dllimport) +#endif /* BROTLIDEC_SHARED_COMPILATION */ +#if defined(BROTLIENC_SHARED_COMPILATION) +#define BROTLI_ENC_API __declspec(dllexport) +#else +#define BROTLI_ENC_API __declspec(dllimport) +#endif /* BROTLIENC_SHARED_COMPILATION */ +#else /* _WIN32 */ +#define BROTLI_COMMON_API BROTLI_PUBLIC +#define BROTLI_DEC_API BROTLI_PUBLIC +#define BROTLI_ENC_API BROTLI_PUBLIC +#endif /* _WIN32 */ +#else /* BROTLI_SHARED_COMPILATION */ +#define BROTLI_COMMON_API +#define BROTLI_DEC_API +#define BROTLI_ENC_API +#endif + +#endif /* BROTLI_COMMON_PORT_H_ */ diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h.meta new file mode 100644 index 00000000..0e5f1077 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/port.h.meta @@ -0,0 +1,69 @@ +fileFormatVersion: 2 +guid: 2276dcfe1fd7fb64f8251fffa490fac2 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude Lumin: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h b/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h new file mode 100644 index 00000000..eff1a3cd --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h @@ -0,0 +1,83 @@ +/* Copyright 2013 Google Inc. All Rights Reserved. + + Distributed under MIT license. + See file LICENSE for detail or copy at https://opensource.org/licenses/MIT +*/ + +/** + * @file + * Common types used in decoder and encoder API. + */ + +#ifndef BROTLI_COMMON_TYPES_H_ +#define BROTLI_COMMON_TYPES_H_ + +#include /* for size_t */ + +#if defined(_MSC_VER) && (_MSC_VER < 1600) +typedef __int8 int8_t; +typedef unsigned __int8 uint8_t; +typedef __int16 int16_t; +typedef unsigned __int16 uint16_t; +typedef __int32 int32_t; +typedef unsigned __int32 uint32_t; +typedef unsigned __int64 uint64_t; +typedef __int64 int64_t; +#else +#include +#endif /* defined(_MSC_VER) && (_MSC_VER < 1600) */ + +/** + * A portable @c bool replacement. + * + * ::BROTLI_BOOL is a "documentation" type: actually it is @c int, but in API it + * denotes a type, whose only values are ::BROTLI_TRUE and ::BROTLI_FALSE. + * + * ::BROTLI_BOOL values passed to Brotli should either be ::BROTLI_TRUE or + * ::BROTLI_FALSE, or be a result of ::TO_BROTLI_BOOL macros. + * + * ::BROTLI_BOOL values returned by Brotli should not be tested for equality + * with @c true, @c false, ::BROTLI_TRUE, ::BROTLI_FALSE, but rather should be + * evaluated, for example: @code{.cpp} + * if (SomeBrotliFunction(encoder, BROTLI_TRUE) && + * !OtherBrotliFunction(decoder, BROTLI_FALSE)) { + * bool x = !!YetAnotherBrotliFunction(encoder, TO_BROLTI_BOOL(2 * 2 == 4)); + * DoSomething(x); + * } + * @endcode + */ +#define BROTLI_BOOL int +/** Portable @c true replacement. */ +#define BROTLI_TRUE 1 +/** Portable @c false replacement. */ +#define BROTLI_FALSE 0 +/** @c bool to ::BROTLI_BOOL conversion macros. */ +#define TO_BROTLI_BOOL(X) (!!(X) ? BROTLI_TRUE : BROTLI_FALSE) + +#define BROTLI_MAKE_UINT64_T(high, low) ((((uint64_t)(high)) << 32) | low) + +#define BROTLI_UINT32_MAX (~((uint32_t)0)) +#define BROTLI_SIZE_MAX (~((size_t)0)) + +/** + * Allocating function pointer type. + * + * @param opaque custom memory manager handle provided by client + * @param size requested memory region size; can not be @c 0 + * @returns @c 0 in the case of failure + * @returns a valid pointer to a memory region of at least @p size bytes + * long otherwise + */ +typedef void* (*brotli_alloc_func)(void* opaque, size_t size); + +/** + * Deallocating function pointer type. + * + * This function @b SHOULD do nothing if @p address is @c 0. + * + * @param opaque custom memory manager handle provided by client + * @param address memory region pointer returned by ::brotli_alloc_func, or @c 0 + */ +typedef void (*brotli_free_func)(void* opaque, void* address); + +#endif /* BROTLI_COMMON_TYPES_H_ */ diff --git a/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h.meta b/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h.meta new file mode 100644 index 00000000..d8b694be --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/WebGL/types.h.meta @@ -0,0 +1,69 @@ +fileFormatVersion: 2 +guid: 7f01c0b84d3b74c4b977e681b1c10cf9 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude Lumin: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/brotli.cs b/Assets/ADL-Plugins/brotli/Plugins/brotli.cs new file mode 100644 index 00000000..ab53f79d --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/brotli.cs @@ -0,0 +1,636 @@ +using System; +using System.IO; +using System.Runtime.InteropServices; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.Networking; + + +public class brotli{ + +#if !UNITY_WEBPLAYER || UNITY_EDITOR + + +#if UNITY_5_4_OR_NEWER + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR || UNITY_EDITOR_LINUX + private const string libname = "brotli"; + #elif UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libbrotli"; + #endif +#else + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR + private const string libname = "brotli"; + #endif + #if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libbrotli"; + #endif +#endif + +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX)&& !UNITY_EDITOR_WIN + [DllImport(libname, EntryPoint = "setPermissions")] + internal static extern int setPermissions(string filePath, string _user, string _group, string _other); + #endif + + [DllImport(libname, EntryPoint = "brCompress" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int brCompress(string inFile, string outFile, IntPtr proc, int quality, int lgwin, int lgblock, int mode); + + [DllImport(libname, EntryPoint = "brDecompresss" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int brDecompresss(string inFile, string outFile, IntPtr proc, IntPtr FileBuffer, int fileBufferLength); + + [DllImport(libname, EntryPoint = "brReleaseBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void brReleaseBuffer(IntPtr buffer); + + [DllImport(libname, EntryPoint = "brCreate_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern IntPtr brCreate_Buffer(int size); + + [DllImport(libname, EntryPoint = "brAddTo_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + private static extern void brAddTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + + [DllImport(libname, EntryPoint = "brCompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr brCompressBuffer( int bufferLength, IntPtr buffer, IntPtr encodedSize, IntPtr proc, int quality, int lgwin, int lgblock, int mode); + + //this will work on small files with one meta block + [DllImport(libname, EntryPoint = "brGetDecodedSize" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int brGetDecodedSize(int bufferLength, IntPtr buffer); + + [DllImport(libname, EntryPoint = "brDecompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int brDecompressBuffer(int bufferLength, IntPtr buffer, int outLength, IntPtr outbuffer); +#endif + +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) && !UNITY_EDITOR + +#if !UNITY_TVOS && !UNITY_WEBGL + [DllImport("__Internal")] + internal static extern int setPermissions(string filePath, string _user, string _group, string _other); + [DllImport("__Internal")] + internal static extern int brCompress( string inFile, string outFile, IntPtr proc, int quality, int lgwin, int lgblock, int mode); + [DllImport("__Internal")] + internal static extern int brDecompresss(string inFile, string outFile, IntPtr proc, IntPtr FileBuffer, int fileBufferLength); + +#endif + #if !UNITY_WEBGL + [DllImport("__Internal")] + public static extern IntPtr brCreate_Buffer(int size); + [DllImport("__Internal")] + internal static extern void brAddTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + [DllImport("__Internal")] + internal static extern IntPtr brCompressBuffer( int bufferLength, IntPtr buffer, IntPtr encodedSize, IntPtr proc, int quality, int lgwin, int lgblock, int mode); + #endif + + [DllImport("__Internal")] + public static extern void brReleaseBuffer(IntPtr buffer); + //this will work on small files with one meta block + [DllImport("__Internal")] + internal static extern int brGetDecodedSize(int bufferLength, IntPtr buffer); + [DllImport("__Internal")] + internal static extern int brDecompressBuffer(int bufferLength, IntPtr buffer, int outLength, IntPtr outbuffer); + +#endif + +#if (!UNITY_TVOS && !UNITY_WEBGL) || UNITY_EDITOR + // set permissions of a file in user, group, other. + // Each string should contain any or all chars of "rwx". + // returns 0 on success + public static int setFilePermissions(string filePath, string _user, string _group, string _other){ +#if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX || UNITY_IOS || UNITY_IPHONE) && !UNITY_EDITOR_WIN + if(!File.Exists(filePath)) return -1; + return setPermissions(filePath, _user, _group, _other); +#else + return -1; +#endif + } + + + //Helper functions + internal static GCHandle gcA(object o) { + return GCHandle.Alloc(o, GCHandleType.Pinned); + } + + private static bool checkObject(object fileBuffer, string filePath, ref GCHandle fbuf, ref IntPtr fileBufferPointer, ref int fileBufferLength) { + if(fileBuffer is byte[]) { byte[] tempBuf = (byte[])fileBuffer; fbuf = gcA(tempBuf); fileBufferPointer = fbuf.AddrOfPinnedObject(); fileBufferLength = tempBuf.Length; return true; } + if(fileBuffer is IntPtr) { fileBufferPointer = (IntPtr)fileBuffer; fileBufferLength = Convert.ToInt32(filePath); } + return false; + } + + // Compress a file to brotli format. + // + // Full paths to the files should be provided. + // inFile: The input file + // outFile: The output file + // proc: A single item ulong array to provide progress of compression + // + // quality: (0 - 11) quality of compression (0 = faster/bigger - 11 = slower/smaller). + // + // Base 2 logarithm of the sliding window size. Range is 10 to 24. + // lgwin : (10 - 24) memory used for compression (higher numbers use more ram) + // + // Base 2 logarithm of the maximum input block size. Range is 16 to 24. + // If set to 0, the value will be set based on the quality. + // lgblock: 0 for auto or 16-24 + // mode : (0 - 2) 0 = default, 1 = utf8 text, 2 = woff 2.0 font + // + // error codes: 1 : OK + // -1 : compression failed + // -2 : not enough memory + // -3 : could not close in file + // -4 : could not close out file + // -5 : no input file found + // + public static int compressFile(string inFile, string outFile, ulong[] proc, int quality = 9, int lgwin = 19, int lgblock = 0, int mode = 0) { + if(!File.Exists(inFile)) return -5; + if (quality < 0) quality = 1; if (quality > 11) quality = 11; + if (lgwin < 10) lgwin = 10; if(lgwin > 24) lgwin = 24; + if(proc == null) proc = new ulong[1]; + GCHandle cbuf = GCHandle.Alloc(proc, GCHandleType.Pinned); + int res = brCompress( @inFile, @outFile,cbuf.AddrOfPinnedObject(), quality, lgwin, lgblock, mode); + cbuf.Free(); + return res; + } + + // Decompress a brotli file. + // + // Full paths to the files should be provided. + // inFile: The input file + // outFile: The output file + // proc: A single item ulong array to provide progress of decompression + // FileBuffer: A buffer that holds a brotli file. When assigned the function will read from this buffer and will ignore the filePath. (Linux, iOS, Android, MacOSX) + // returns: 1 on success. + // + // error codes: 1 : OK + // -1 : failed to write output + // -2 : corrupt input + // -3 : could not close in file + // -4 : could not close out file + // -5 : no input file found + // + public static int decompressFile(string inFile, string outFile, ulong[] proc, object fileBuffer = null) { + if(fileBuffer == null && !File.Exists(inFile)) return -5; + if(proc == null) proc = new ulong[1]; + GCHandle cbuf = GCHandle.Alloc(proc, GCHandleType.Pinned); + int res; + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, inFile, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + + if (!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return -5; } + + res = brDecompresss(null, @outFile, cbuf.AddrOfPinnedObject(), fileBufferPointer, fileBufferLength); + + fbuf.Free(); + cbuf.Free(); + return res; + } + #endif + + res = brDecompresss(@inFile, @outFile, cbuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + cbuf.Free(); + return res; + } + +#endif + + + + // Get the uncompressed size of a brotli buffer. + // This will work only on small buffers with one metablock. Otherwise use the includeSize/hasFooter flags with the buffer functions. + // + // inBuffer: the input buffer that stores a brotli compressed buffer. + public static int getDecodedSize(byte[] inBuffer) + { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int res = brGetDecodedSize(inBuffer.Length, cbuf.AddrOfPinnedObject()); + cbuf.Free(); + return res; + } + +#if !UNITY_WEBGL || UNITY_EDITOR + // Compress a byte buffer in brotli format. + // + // inBuffer: the uncompressed buffer. + // outBuffer: a referenced buffer that will store the compressed data. (it should be large enough to store it.) + // proc: A single item referenced ulong array to provide progress of compression + // + // includeSize: include the uncompressed size of the buffer in the resulted compressed one because brotli does not support it for larger then 1 metablock. + // + // quality: (0 - 11) quality of compression (0 = faster/bigger - 11 = slower/smaller). + // + // Base 2 logarithm of the sliding window size. Range is 10 to 24. + // lgwin : (10 - 24) memory used for compression (higher numbers use more ram) + // + // Base 2 logarithm of the maximum input block size. Range is 16 to 24. + // If set to 0, the value will be set based on the quality. + // lgblock: 0 for auto or 16-24 + // mode : (0 - 2) 0 = default, 1 = utf8 text, 2 = woff 2.0 font + // returns true on success + // + public static bool compressBuffer(byte[] inBuffer, ref byte[] outBuffer, ulong[] proc, bool includeSize = false, int quality = 9, int lgwin = 19, int lgblock = 0, int mode = 0) { + if (quality < 0) quality = 1; if (quality > 11) quality = 11; + if (lgwin < 10) lgwin = 10; if(lgwin > 24) lgwin = 24; + + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int size = 0; + byte[] bsiz = null; + int[] esiz = new int[1];//the compressed size + GCHandle ebuf = GCHandle.Alloc(esiz, GCHandleType.Pinned); + + //if the uncompressed size of the buffer should be included. This is a hack since brotli lib does not support this on larger buffers. + if (includeSize) { + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!BitConverter.IsLittleEndian) Array.Reverse(bsiz); + } + + if(proc == null) proc = new ulong[1]; + GCHandle pbuf = GCHandle.Alloc(proc, GCHandleType.Pinned); + + ptr = brCompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), ebuf.AddrOfPinnedObject(), pbuf.AddrOfPinnedObject(), quality, lgwin, lgblock, mode); + + cbuf.Free(); ebuf.Free(); pbuf.Free(); + + if (ptr == IntPtr.Zero) { brReleaseBuffer(ptr); esiz = null; bsiz = null; return false; } + + System.Array.Resize(ref outBuffer, esiz[0] + size); + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i + esiz[0]] = bsiz[i]; } + + Marshal.Copy( ptr, outBuffer, 0, esiz[0] ); + + brReleaseBuffer(ptr); + esiz = null; + bsiz = null; + + return true; + } + + // same as above only this function returns a new created buffer with the compressed data. + // + public static byte[] compressBuffer(byte[] inBuffer, int[] proc, bool includeSize = false, int quality = 9, int lgwin = 19, int lgblock = 0, int mode = 0) { + if (quality < 0) quality = 1; if (quality > 11) quality = 11; + if (lgwin < 10) lgwin = 10; if(lgwin > 24) lgwin = 24; + + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int size = 0; + byte[] bsiz = null; + int[] esiz = new int[1];//the compressed size + GCHandle ebuf = GCHandle.Alloc(esiz, GCHandleType.Pinned); + + // if the uncompressed size of the buffer should be included. This is a hack since brotli lib does not support this on larger buffers. + if (includeSize) { + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!BitConverter.IsLittleEndian) Array.Reverse(bsiz); + } + + if(proc == null) proc = new int[1]; + GCHandle pbuf = GCHandle.Alloc(proc, GCHandleType.Pinned); + + ptr = brCompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), ebuf.AddrOfPinnedObject(), pbuf.AddrOfPinnedObject(), quality, lgwin, lgblock, mode); + + cbuf.Free(); ebuf.Free(); pbuf.Free(); + + if (ptr == IntPtr.Zero) { brReleaseBuffer(ptr); esiz = null; bsiz = null; return null; } + + byte[] outBuffer = new byte[esiz[0] + size]; + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i + esiz[0]] = bsiz[i]; } + + Marshal.Copy( ptr, outBuffer, 0, esiz[0] ); + + brReleaseBuffer(ptr); + esiz = null; + bsiz = null; + + return outBuffer; + } + + // Same as above, only this time the compressed buffer is written in a fixed size buffer. + // The compressed size in bytes is returned. If includeSize is true, then 4 extra bytes are written at the end of the buffer. + // The fixed size buffer should be larger then the compressed size returned. + // + public static int compressBuffer(byte[] inBuffer, byte[] outBuffer, int[] proc, bool includeSize = false, int quality = 9, int lgwin = 19, int lgblock = 0, int mode = 0) { + if (quality < 0) quality = 1; if (quality > 11) quality = 11; + if (lgwin < 10) lgwin = 10; if(lgwin > 24) lgwin = 24; + + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int size = 0; + byte[] bsiz = null; + int res = 0; + int[] esiz = new int[1];//the compressed size + GCHandle ebuf = GCHandle.Alloc(esiz, GCHandleType.Pinned); + + // if the uncompressed size of the buffer should be included. This is a hack since brotli lib does not support this on larger buffers. + if (includeSize) { + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!BitConverter.IsLittleEndian) Array.Reverse(bsiz); + } + + if(proc == null) proc = new int[1]; + GCHandle pbuf = GCHandle.Alloc(proc, GCHandleType.Pinned); + + ptr = brCompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), ebuf.AddrOfPinnedObject(), pbuf.AddrOfPinnedObject(), quality, lgwin, lgblock, mode); + + cbuf.Free(); ebuf.Free(); pbuf.Free(); + res = esiz[0]; + + if (ptr == IntPtr.Zero || outBuffer.Length < (esiz[0] + size)) { brReleaseBuffer(ptr); esiz = null; bsiz = null; return 0; } + + Marshal.Copy( ptr, outBuffer, 0, esiz[0] ); + + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i + esiz[0]] = bsiz[i]; } + + brReleaseBuffer(ptr); + esiz = null; + bsiz = null; + + return res + size; + } + +#endif + + // Decompress a brotli compressed buffer to a referenced buffer. + // + // inBuffer: the brotli compressed buffer + // outBuffer: a referenced buffer that will be resized to store the uncompressed data. + // useFooter: if the input Buffer has the uncompressed size info. + // unCompressedSize: if unCompressedSize is > 0 then this is the uncompressed size that will be used. Useful when decompressing brotli buffers created from servers. + // + // returns true on success + // + public static bool decompressBuffer(byte[] inBuffer, ref byte[] outBuffer, bool useFooter = false, int unCompressedSize = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + if (unCompressedSize == 0) { + if (useFooter) { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } else { + //use the brotli native method to get the uncompressed size (this will work on buffers with one metablock) + uncompressedSize = getDecodedSize(inBuffer); + } + } else { + uncompressedSize = unCompressedSize; + } + + System.Array.Resize(ref outBuffer, uncompressedSize); + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + int res = brDecompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), uncompressedSize, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if(res == 1) return true; else return false; + } + + // same as above only this time the uncompressed data is returned in a new created buffer + // + public static byte[] decompressBuffer(byte[] inBuffer, bool useFooter = false, int unCompressedSize = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + if (unCompressedSize == 0) { + if (useFooter) { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } else { + //use the brotli native method to get the uncompressed size (this will work on buffers with one metablock) + uncompressedSize = getDecodedSize(inBuffer); + } + } else { + uncompressedSize = unCompressedSize; + } + + byte[] outBuffer = new byte[uncompressedSize]; + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + int res = brDecompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), uncompressedSize, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if(res == 1) return outBuffer; else return null; + } + + + // same as above only the decompressed data will be stored in a fixed size outBuffer. + // make sure the fixed buffer is big enough to store the data. + // + // returns: uncompressed size in bytes. + // + public static int decompressBuffer(byte[] inBuffer, byte[] outBuffer, bool useFooter = false, int unCompressedSize = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length; + + if (unCompressedSize == 0) { + if (useFooter) { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + } else { + //use the brotli native method to get the uncompressed size (this will work on buffers with one metablock) + uncompressedSize = getDecodedSize(inBuffer); + } + } else { + uncompressedSize = unCompressedSize; + } + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + int res = brDecompressBuffer(inBuffer.Length, cbuf.AddrOfPinnedObject(), uncompressedSize, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if(res == 1) return uncompressedSize; else return 0; + } + + #if !UNITY_WEBGL && !UNITY_TVOS + // A reusable native memory pointer for downloading files. + public static IntPtr nativeBuffer = IntPtr.Zero; + public static bool nativeBufferIsBeingUsed = false; + public static int nativeOffset = 0; + + // A Coroutine to dowload a file to a native/unmaged memory buffer. + // You can call it for an IntPtr. + // + // + // This function can only be called for one file at a time. Don't use it to call multiple files at once. + // + // This is useful to avoid memory spikes when downloading large files and intend to decompress from memory. + // With the old method, a copy of the downloaded file to memory would be produced by pinning the buffer to memory. + // Now with this method, it is downloaded to memory and can be manipulated with no memory spikes. + // + // In any case, if you don't need the created in-Memory file, you should use the brotli.brReleaseBuffer function to free the memory! + // + // Parameters: + // + // url: The url of the file you want to download to a native memory buffer. + // downloadDone: Informs a bool that the download of the file to memory is done. + // pointer: An IntPtr for a native memory buffer + // fileSize: The size of the downloaded file will be returned here. + public static IEnumerator downloadBrFileNative(string url, Action downloadDone, Action pointer = null, Action fileSize = null) { + // Get the file lenght first, so we create a correct size native memory buffer. + UnityWebRequest wr = UnityWebRequest.Head(url); + + nativeBufferIsBeingUsed = true; + + yield return wr.SendWebRequest(); + string size = wr.GetResponseHeader("Content-Length"); + + nativeBufferIsBeingUsed = false; + + #if UNITY_2020_1_OR_NEWER + if (wr.result == UnityWebRequest.Result.ConnectionError || wr.result == UnityWebRequest.Result.ProtocolError) { + #else + if (wr.isNetworkError || wr.isHttpError) { + #endif + Debug.LogError("Error While Getting Length: " + wr.error); + } else { + if (!nativeBufferIsBeingUsed) { + + //get the size of the zip + int zipSize = Convert.ToInt32(size); + + // If the zip size is larger then 0 + if (zipSize > 0) { + + nativeBuffer = brCreate_Buffer(zipSize); + nativeBufferIsBeingUsed = true; + + // buffer for the download + byte[] bytes = new byte[2048]; + nativeOffset = 0; + + using (UnityWebRequest wwwSK = UnityWebRequest.Get(url)) { + + // Here we call our custom webrequest function to download our archive to a native memory buffer. + wwwSK.downloadHandler = new CustomWebRequest5(bytes); + + yield return wwwSK.SendWebRequest(); + + if (wwwSK.error != null) { + Debug.Log(wwwSK.error); + } else { + downloadDone(true); + + if(pointer != null) { pointer(nativeBuffer); fileSize(zipSize); } + + //reset intermediate buffer params. + nativeBufferIsBeingUsed = false; + nativeOffset = 0; + nativeBuffer = IntPtr.Zero; + + //Debug.Log("Custom download done"); + } + } + + } + + } else { Debug.LogError("Native buffer is being used, or not yet freed!"); } + } + } + + + // A custom WebRequest Override to download data to a native-unmanaged memory buffer. + public class CustomWebRequest5 : DownloadHandlerScript { + + public CustomWebRequest5() + : base() + { + } + + public CustomWebRequest5(byte[] buffer) + : base(buffer) + { + } + + protected override byte[] GetData() { return null; } + + + protected override bool ReceiveData(byte[] bytesFromServer, int dataLength) { + if (bytesFromServer == null || bytesFromServer.Length < 1) { + Debug.Log("CustomWebRequest: Received a null/empty buffer"); + return false; + } + + var pbuf = gcA(bytesFromServer); + + //Process byteFromServer + brAddTo_Buffer(nativeBuffer, nativeOffset, pbuf.AddrOfPinnedObject(), dataLength ); + nativeOffset += dataLength; + pbuf.Free(); + + return true; + } + + // Use the below functions only when needed. You get the same functionality from the main coroutine. + /* + // If all data has been received from the server + protected override void CompleteContent() + { + //Debug.Log(Download Complete."); + } + + // If a Content-Length header is received from the server. + protected override void ReceiveContentLength(int fileLength) + { + //Debug.Log("ReceiveContentLength: " + fileLength); + } + */ + } + #endif +#endif +} + diff --git a/Assets/ADL-Plugins/brotli/Plugins/brotli.cs.meta b/Assets/ADL-Plugins/brotli/Plugins/brotli.cs.meta new file mode 100644 index 00000000..20167443 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/brotli.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: cf5362b31a6006148b706d6724df72f6 +timeCreated: 1553412858 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS.meta new file mode 100644 index 00000000..e8bc8174 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 69219d9c4125b2b46a3bb264358855cf +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a new file mode 100644 index 00000000..99f76dfd Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip new file mode 100644 index 00000000..ad76aae1 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip.meta new file mode 100644 index 00000000..4ef80b88 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a-Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3ab97e27c01346d44b6d8fd53fdc4a83 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a.meta new file mode 100644 index 00000000..7434dc84 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.a.meta @@ -0,0 +1,119 @@ +fileFormatVersion: 2 +guid: fc4c4ad5ef7c67541b19f945c7ace77e +timeCreated: 1567837724 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + '': WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + data: + first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + data: + first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + data: + first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + data: + first: + Standalone: OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Standalone: OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + data: + first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + data: + first: + iPhone: iOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip new file mode 100644 index 00000000..8cd55085 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..f8ecbb3a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 92d4703b087253e48a75823598d484ae +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip new file mode 100644 index 00000000..cf6bfb70 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..0143f582 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/libbrotli.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: f51fcb992987f63409b742467c417ef1 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode.meta new file mode 100644 index 00000000..97de0311 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: fdd7f5bd5a4b48e48b315b818b4b31de +folderAsset: yes +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip new file mode 100644 index 00000000..493e3311 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip.meta new file mode 100644 index 00000000..2811c55a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/iOS/non-bitcode/libbrotli.a.zip.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d1e686fed98a1f2499407f348a72733b +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip new file mode 100644 index 00000000..e9b841e8 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip.meta new file mode 100644 index 00000000..db6f3094 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Intel.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3eac735845d22bb43bb5b3734ab53992 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip new file mode 100644 index 00000000..ec5c9b0e Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip.meta new file mode 100644 index 00000000..bf4d91a6 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-SiliconSupport.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 6a1fc17c46d8fbc4f950aeaad32ab869 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip new file mode 100644 index 00000000..42b9d8e5 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip.meta new file mode 100644 index 00000000..264c738f --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle-Universal.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: aed541e4bc04a2b4d9904271394e13e4 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle.meta new file mode 100644 index 00000000..94ca281b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle.meta @@ -0,0 +1,46 @@ +fileFormatVersion: 2 +guid: b51e0ee90848d9c438bff3b118d9ba58 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 1 + settings: + DefaultValueInitialized: true + data: + first: + Standalone: OSXIntel + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents.meta new file mode 100644 index 00000000..3648c7e2 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: aa898f38bbe043944ac2fde198f8037f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/Info.plist b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/Info.plist new file mode 100644 index 00000000..215101a4 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/Info.plist @@ -0,0 +1,50 @@ + + + + + BuildMachineOSBuild + 20B29 + CFBundleDevelopmentRegion + en + CFBundleExecutable + libbrotli + CFBundleIdentifier + com.brotli.libbrotli + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + libbrotli + CFBundlePackageType + BNDL + CFBundleShortVersionString + 1.0 + CFBundleSignature + ???? + CFBundleSupportedPlatforms + + MacOSX + + CFBundleVersion + 1 + DTCompiler + com.apple.compilers.llvm.clang.1_0 + DTPlatformBuild + 12E507 + DTPlatformName + macosx + DTPlatformVersion + 11.3 + DTSDKBuild + 20E214 + DTSDKName + macosx11.3 + DTXcode + 1251 + DTXcodeBuild + 12E507 + LSMinimumSystemVersion + 10.9 + NSHumanReadableCopyright + Copyright © 2016 brotli. All rights reserved. + + diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS.meta b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS.meta new file mode 100644 index 00000000..b232da9d --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 973f25661e6e10a4c88a2d03b6158805 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS/libbrotli b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS/libbrotli new file mode 100644 index 00000000..a82e8f22 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/libbrotli.bundle/Contents/MacOS/libbrotli differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS.meta new file mode 100644 index 00000000..7a3566c9 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c215876d36c7c4a44be2507e48a82586 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a new file mode 100644 index 00000000..a55a363d Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip new file mode 100644 index 00000000..65e02671 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip.meta new file mode 100644 index 00000000..9d14684b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a-Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 03f69c8c1d2588e4fb490b92e34eae5c +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a.meta new file mode 100644 index 00000000..4c56e22a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.a.meta @@ -0,0 +1,102 @@ +fileFormatVersion: 2 +guid: cec3a25f283b3f5488f396f9754fe90c +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + - first: + '': Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude tvOS: 0 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + tvOS: tvOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip new file mode 100644 index 00000000..843a125a Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..8300f927 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: a48160090f48b5f42bf602e30c2d5dd9 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip new file mode 100644 index 00000000..4f3879d9 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..0a809147 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/libbrotli.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 6db2aeec2c7e35f418001f48a5a30ac8 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode.meta new file mode 100644 index 00000000..8e2c85ae --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 66603865cbe470b4386086cd61e83de8 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip new file mode 100644 index 00000000..4c6e93c9 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip.meta new file mode 100644 index 00000000..2be20f79 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/tvOS/non-bitcode/libbrotli.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 5a7909b3e2cee104185740192f406f77 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86.meta b/Assets/ADL-Plugins/brotli/Plugins/x86.meta new file mode 100644 index 00000000..aaa90813 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/x86.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 5fa8df76824fbe44fa224e16ac1e3b94 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip b/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip new file mode 100644 index 00000000..05426920 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip.meta b/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip.meta new file mode 100644 index 00000000..768aa433 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/x86/libbrotli.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: f1342b7a7d0252f419bfee717bb7296a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86_64.meta b/Assets/ADL-Plugins/brotli/Plugins/x86_64.meta new file mode 100644 index 00000000..f2d8625f --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/x86_64.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: eff161d37d276254da4aa7f0b3952d10 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll new file mode 100644 index 00000000..def74fdd Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll.meta b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll.meta new file mode 100644 index 00000000..773ce9d2 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.dll.meta @@ -0,0 +1,99 @@ +fileFormatVersion: 2 +guid: 7b3354d9be0d9d743afc3688867c375d +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Windows + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so new file mode 100644 index 00000000..72abbb58 Binary files /dev/null and b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so differ diff --git a/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so.meta b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so.meta new file mode 100644 index 00000000..8580009a --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Plugins/x86_64/libbrotli.so.meta @@ -0,0 +1,99 @@ +fileFormatVersion: 2 +guid: df8ed2f8816dd624abda5181b8250125 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Linux + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Scripts.meta b/Assets/ADL-Plugins/brotli/Scripts.meta new file mode 100644 index 00000000..a245fb07 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Scripts.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 34c2e3d46e097ec4bb63c53962822940 +folderAsset: yes +timeCreated: 1453302062 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs b/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs new file mode 100644 index 00000000..df4b0477 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs @@ -0,0 +1,235 @@ +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using System.Threading; +using System.IO; + + + +public class brotlitest : MonoBehaviour { +#if (!UNITY_TVOS && !UNITY_WEBGL) || UNITY_EDITOR + + // some variables to get status returns from the functions + private int lz1, lz2, lz3, lz4, fbuftest, nFbuftest; + + // a single item ulong array to get the progress of the compression + private ulong[] progress = new ulong[1]; + private ulong[] progress2 = new ulong[1]; + private ulong[] progress3 = new ulong[1]; + private ulong[] progress4 = new ulong[1]; + + // a test file that will be downloaded to run the tests + private string myFile = "testLZ4.tif"; + + // the adress from where we download our test file + private string uri = "https://dl.dropbox.com/s/r1ccmnreyd460vr/"; + + // our path where we do the tests + private string ppath; + + private bool compressionStarted; + private bool downloadDone, downloadError; + + // a reusable buffer + private byte[] buff; + + // buffer operations buffers + byte[] bt = null, bt2 = null; + + // fixed size buffer, that don't gets resized, to perform decompression of buffers in them and avoid memory allocations. + private byte[] fixedOutBuffer = new byte[1024*768*3]; + + // Use this for initialization + void Start () { + ppath = Application.persistentDataPath; + + #if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; + #endif + + buff = new byte[0]; + + Debug.Log(ppath); + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + if (!File.Exists(ppath + "/" + myFile)) + StartCoroutine(DownloadTestFile()); + else downloadDone = true; + + } + + + + // Update is called once per frame + void Update () { + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI() { + + if (downloadDone) { + GUI.Label(new Rect(50, 0, 350, 30), "package downloaded, ready to extract"); + GUI.Label(new Rect(50, 30, 450, 90), ppath); + + + if (GUI.Button(new Rect(50, 150, 250, 50), "start brotli test")) { + compressionStarted = true; + lz1 = 0; lz2 = 0; progress[0] = 0; progress2[0] = 0; progress3[0] = 0; progress4[0] = 0; + + // call the decompresion demo functions. + // DoTests(); + // we call the test function on a thread to able to see progress. WebGL does not support threads. + + Thread th = new Thread(DoTests); th.Start(); + // native FileBuffer test + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + StartCoroutine(nativeFileBufferTest()); + #endif + + + } + + } else { + if(downloadError) GUI.Label(new Rect(50, 150, 250, 50), "Download Error!"); + } + + if (compressionStarted) { + // if the return code is 1 then the decompression was succesful. + GUI.Label(new Rect(50, 220, 250, 40), "brotli Compress: " + lz1.ToString() + " : " + progress[0].ToString()); + GUI.Label(new Rect(50, 260, 250, 40), "brotli Decompress: " + lz2.ToString() + " : " + progress2[0].ToString()); + GUI.Label(new Rect(50, 300, 250, 40), "Buffer Compress: " + lz3.ToString() + " : " + progress3[0].ToString()); + GUI.Label(new Rect(50, 340, 250, 40), "Buffer Decompress: " + lz4.ToString()); + + #if (UNITY_EDITOR || UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + GUI.Label(new Rect(50, 380, 250, 40), "FileBuffer test: " + fbuftest.ToString() + " : " + progress3[0].ToString() ); + GUI.Label(new Rect(50, 420, 320, 40), "Native FileBuffer test: " + nFbuftest.ToString() + " : " + progress4[0].ToString()); + #endif + } + + } + + + void DoTests() { + + // File tests + // compress a file to brotli format. + lz1 = brotli.compressFile(ppath+ "/" + myFile, ppath + "/" + myFile + ".br", progress); + + // decompress the previously compressed archive + lz2 = brotli.decompressFile(ppath + "/" + myFile + ".br", ppath + "/" + myFile + ".Br.tif", progress2); + + // Buffer tests + if (File.Exists(ppath + "/" + myFile)) { + bt = File.ReadAllBytes(ppath + "/" + myFile); + + //compress a byte buffer (we write the output buffer to a file for debug purposes.) + if (brotli.compressBuffer(bt, ref buff, progress3, true)){ + lz3 = 1; + File.WriteAllBytes(ppath + "/buffer1.brbuf", buff); + } + + bt2 = File.ReadAllBytes(ppath + "/buffer1.brbuf"); + + // decompress a byte buffer (we write the output buffer to a file for debug purposes.) + if (brotli.decompressBuffer(bt2, ref buff, true)){ + lz4 = 1; + File.WriteAllBytes(ppath + "/buffer1.tif", buff); + } + + // FIXED BUFFER FUNCTION: + int decompressedSize = brotli.decompressBuffer(bt2, fixedOutBuffer, true); + if (decompressedSize > 0) Debug.Log(" # Decompress Fixed size Buffer: " + decompressedSize); + + // NEW BUFFER FUNCTION + var newBuffer = brotli.decompressBuffer(bt2, true); + if (newBuffer != null) { File.WriteAllBytes(ppath + "/buffer1NEW.tif", newBuffer); Debug.Log(" # new Buffer: " + newBuffer.Length); } + newBuffer = null; + } + + // make FileBuffer test on supported platfoms. + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + // make a temp buffer to read a br file in. + if (File.Exists(ppath + "/" + myFile + ".br")){ + progress2[0] = 0; + byte[] FileBuffer = File.ReadAllBytes(ppath + "/" + myFile + ".br"); + fbuftest = brotli.decompressFile(null, ppath + "/" + myFile + "FB.tif", progress2, FileBuffer); + } + #endif + } + + IEnumerator DownloadTestFile() { + + // make sure a previous brotli file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) File.Delete(ppath + "/" + myFile); + + Debug.Log("starting download"); + + string fileD = uri + myFile; + + // replace the link to the brotli file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(fileD)) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + downloadError = true; + } else { + downloadDone = true; + + // write the downloaded brotli file to the ppath directory so we can have access to it + // depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + } + + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN && !UNITY_WEBGL + // native file buffer test + // For iOS, Android, Linux and MacOSX the plugin can handle a byte buffer as a file. (in this case a native file buffer) + // This way you can extract the file or parts of it without writing it to disk. + IEnumerator nativeFileBufferTest() { + + //make a check that the intermediate native buffer is not being used! + if(brotli.nativeBufferIsBeingUsed) { Debug.Log("Native buffer download is in use"); yield break; } + + // A bool for download checking + bool downloadDoneN = false; + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // int to get the downloaded file size + int zsize = 0; + + Debug.Log("Downloading Brotli file to native memory buffer"); + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. + StartCoroutine(brotli.downloadBrFileNative("http://telias.free.fr/temp/testLZ4.tif.br", r => downloadDoneN = r, pointerResult => nativePointer = pointerResult, size => zsize = size)); + + while (!downloadDoneN) yield return true; + + nFbuftest = brotli.decompressFile(zsize.ToString(), ppath + "/nativeBufferToFileBR.tif", progress4, nativePointer); + + // free the native memory buffer! + brotli.brReleaseBuffer(nativePointer); + } + #endif + +#else + void OnGUI(){ + GUI.Label(new Rect(10,10,500,40),"Please run the WebGL/tvOS demo."); + } +#endif +} + + diff --git a/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs.meta b/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs.meta new file mode 100644 index 00000000..7b8dda38 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Scripts/brotlitest.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: 5988116fa7305f0408d78ed62421172b +timeCreated: 1453302062 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs b/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs new file mode 100644 index 00000000..38970953 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs @@ -0,0 +1,127 @@ +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; + + +public class brotlitestWebGL : MonoBehaviour { +#if UNITY_WEBGL || UNITY_TVOS + + private bool downloadDone, downloadError; + + private int lz4 = 0; + private int fixedDecompress = 0, newBufferSize = 0; + // a reusable buffer + private byte[] buff; + + // buffer operations buffers + byte[] bt = null, bt2 = null; + + private ulong[] progress3 = new ulong[1]; + + private Texture2D tex = null; + + // fixed size buffer, that don't gets resized, to perform decompression of buffers in them and avoid memory allocations. + private byte[] fixedOutBuffer = new byte[1024*1024*4]; + + // Use this for initialization + void Start () { + + buff = new byte[0]; + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + tex = new Texture2D(1,1,TextureFormat.RGBA32, false); + + StartCoroutine(DownloadTestFile()); + + } + + + + // Update is called once per frame + void Update () { + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI() { + + if (downloadDone) { + GUI.Label(new Rect(50, 0, 350, 30), "package downloaded, ready to extract"); + } else { + if(downloadError) GUI.Label(new Rect(50, 150, 250, 50), "Download Error!"); + } + + if(lz4 == 1) GUI.DrawTexture(new Rect(360, 10, 575, 300), tex); + + GUI.Label(new Rect(50, 60, 250, 40), "Fixed buffer: " + fixedDecompress.ToString()); + GUI.Label(new Rect(50, 100, 250, 40), "New buffer: " + fixedDecompress.ToString()); + } + + + IEnumerator DoTests() { + + bt2 = new byte[1]; + + // decompress the .brotli buffer that contains an image + if (brotli.decompressBuffer(bt, ref bt2, true)) lz4 =1; + + // verify by loading the extracted buffer to a texture + tex.LoadImage(bt2); + + yield return true; + + // decompress to a fixed size buffer + fixedDecompress = brotli.decompressBuffer(bt, fixedOutBuffer, true); + + // decompress to a new returned buffer + var newBuffer = brotli.decompressBuffer(bt, true); + if(newBuffer != null) newBufferSize = newBuffer.Length; + + newBuffer = null; buff = null; + bt2 = null; bt = null; + + } + + IEnumerator DownloadTestFile() { + + Debug.Log("starting download"); + + string fileD = "https://dl.dropbox.com/s/jri8c8a4zg5g2o6/bufferpng.brbuf"; + + // replace the link to the brotli file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(fileD)) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + downloadError = true; + } else { + downloadDone = true; + + bt = new byte[www.downloadHandler.data.Length]; + Array.Copy(www.downloadHandler.data, bt, www.downloadHandler.data.Length); + yield return true; + + StartCoroutine (DoTests()); + + Debug.Log("download done"); + } + } + } + + + +#else + void OnGUI(){ + GUI.Label(new Rect(10, 10, 500, 40), "Only for WebGL or tvOS."); + } +#endif +} + + diff --git a/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs.meta b/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs.meta new file mode 100644 index 00000000..002de469 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/Scripts/brotlitestWebGL.cs.meta @@ -0,0 +1,11 @@ +fileFormatVersion: 2 +guid: 572110a2739007042955b0424f0850a4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/brotliTest.unity b/Assets/ADL-Plugins/brotli/brotliTest.unity new file mode 100644 index 00000000..f791895b --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTest.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 7e538a76291b9b64db95a4e11381891e, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &197455903 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 197455908} + - component: {fileID: 197455907} + - component: {fileID: 197455905} + - component: {fileID: 197455904} + - component: {fileID: 197455909} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &197455904 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!124 &197455905 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!20 &197455907 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.32352942, g: 0.32352942, b: 0.32352942, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &197455908 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &197455909 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5988116fa7305f0408d78ed62421172b, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/brotli/brotliTest.unity.meta b/Assets/ADL-Plugins/brotli/brotliTest.unity.meta new file mode 100644 index 00000000..3bf09cc4 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTest.unity.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: edcfe3f0e0ef0654cb61b2942adf8ec5 +timeCreated: 1453287243 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting b/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting new file mode 100644 index 00000000..7359dd8f --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: brotliTestSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting.meta b/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting.meta new file mode 100644 index 00000000..8274a7b0 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTestSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7e538a76291b9b64db95a4e11381891e +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity b/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity new file mode 100644 index 00000000..15162adc --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 7e538a76291b9b64db95a4e11381891e, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &197455903 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 197455908} + - component: {fileID: 197455907} + - component: {fileID: 197455905} + - component: {fileID: 197455904} + - component: {fileID: 197455909} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &197455904 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!124 &197455905 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!20 &197455907 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.32352942, g: 0.32352942, b: 0.32352942, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &197455908 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &197455909 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 572110a2739007042955b0424f0850a4, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity.meta b/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity.meta new file mode 100644 index 00000000..793b8154 --- /dev/null +++ b/Assets/ADL-Plugins/brotli/brotliTestWebGL.unity.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 10ad0aaeb82822f479b5cbd987239156 +timeCreated: 1453287243 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/changelog.txt b/Assets/ADL-Plugins/changelog.txt new file mode 100644 index 00000000..6f6fdf6c --- /dev/null +++ b/Assets/ADL-Plugins/changelog.txt @@ -0,0 +1,681 @@ +version 2.9.2 + +- ZIP: Added the extract_entries function which allows to extract a specific list of entries of a zip archive. + + +version 2.9.1 + +- Fixed compatibility issues with Unity 2022 for the Lz4, Lzma, Brotli and Flz plugin scripts. +- ZIP: Updated the WebGL demo script to work correctly with NativeFileBuffers. (On Unity2022.x+ you should enable http connection for the demo) +- Brotli: Added a separate WebGL demo scene. + + +version 2.9 + +- Updated WebGL plugins for Unity 2021+ +- Added a custom download functions to the plugins, to download a file to a native (unmanaged) memory buffer. +- All Plugins: Ability to pass an IntPtr unmanaged buffer as a file buffer where supported. +- ZIP: IntPtr (native memory buffers) and inMemory lzip class can be passed now as a file Buffer. + This allows avoiding memory spikes when downloading large files to unzip. +- ZIP: Gzip file functions return -8 now on cancel. + +- Brotli:WebGL: fixed an issue with not releasing a buffer on decompression. +- Brotli:WebGL: fixed an issue with Development builds. + +- Native buffer examples updated because dropbox would not allow the webrequest function to work properly. +- ZIP: CompressDir function: fixed an issue where the inplace zip creation (without adding a custom output file) would truncate the last character. +- Removed Linux x86 plugins for Unity 2019+ (no longer supported by Unity) +- Added Android x86_64 plugins for Unity 2019+ +- Removed Windows x86 plugins for Unity 2021+ (no longer supported by Unity) + + +version 2.8.1 + +- Added Android x86_64 plugins to support Chrome OS (2019, 2020 and 2021 versions). + + +version 2.8 + +- ZIP: Critical Fix for the delete_entry functions. +- ZIP: Added MacOS bundles: Intel only, Silicon only, Universal (Intel + Silicon) + + + +version 2.7.5 + +- Zip: Fix for Marshal.StringToCoTaskMemAuto -> Marshal.StringToHGlobalAuto on Unity 2019.3 or older (il2cpp Android) +- Brotli: buffer functions got uncompressed size parameter. +- MacOS bundles BigSur. Optional silicon support via zipped .bundles (MacOS 10.9 minimum) + + +version 2.7.4 + +- Brotli: Added support for WebGL to allow decompression of brotli buffers. +- 7Zip: Fixed some issues with the demo script. +- ZIP: Fixed some preprocessor issues that caused compilation errors on some platforms. +- ZIP: The setPermissions function was accidentaly removed in a previous update. Now reinstated. +- ZIP: Fixed date issues when extracting zip archives. + + +version 2.7.3 + +- ZIP: Windows: reintroduced the lzip.setEncoding function, since some applications do not use utf8 encoding for filenames. + + +version 2.7.2 [important update] + +- ZIP: Windows: Resolved all issues with Unicode paths (reading and writing) +- ZIP: All platforms: All file paths/names will be treated as utf-8 +- ZIP: Gzip file decompression got 4 times faster. +- FLZ: Fixed the decompress buffer function. + +version 2.7.1 + +- ZIP: Fixed Unicode issues with the windows plugins. + + +version 2.7 [Major update] + +- 7ZIP: Added byte level progress for 7zip extraction (whole files/fileBuffers or entries) +- 7ZIP: Added byte level progress for lzma alone creation/decompression. +- 7ZIP: For this reason 3 new functions have been introduced. See examples and docs. +- 7ZIP: Improved entry search and extraction speed. +- 7ZIP: Fixed an issue with entries extraction, where some unwanted empty folders could be extracted. +- 7ZIP: Decompress buffer imporoved. +- 7ZIP: Fixed issues with files larger then 2GB on 64bit systems. +- 7ZIP: Linux: reintroduced FileBuffers for Linux. +- 7ZIP: Protection against illegal characters in 7z entries. +- 7ZIP: The get7zInfo and get7zSize functions run faster and no more a temp log is needed. + +- LZ4: Progress of decompression is a ulong now. + + +- ZIP: Added support for tar/untar. +- ZIP: Added support for tar.gz, tar.bz2 creation. +- ZIP: Protection against illegal characters in entries. +- ZIP: Added ability to create and decompress bz2 files. +- ZIP: Protection against illegal characters in zip entries. +- ZIP: Faster reaction to the cancel command. +- ZIP: Fixed gzip file decompression issues. +- ZIP: gzip uncompress progress relies on the compressed files size now. + +- ALL: tvOS uses the same functions as WebGL now, since it does not allow access to the file system. +- ALL: Combined tvOS and WebGL in one demo scene. + (WebGL sample scenes renamed to reflect the above changes.) +- ALL: Updated and refactored the demo scene and scripts to reflect the new changes. +- ALL: Removed the Streaming Assets folder files. All example files are downloaded now. + +- ALL:LINUX: Only one glibc version of Linux plugins now provided (glibc2.17) + +In general, a lot more has been done to improve the stability and usability of the plugins. + + +version 2.6.3 + +- Brotli: Fixed the buffer functions. + + +version 2.6.2 + +- 7zip: Windows: Unicode issues resolved. +- 7zip: Added a cancel function when decompressing 7zip archives with multiple entries. +- 7zip: Linux: FileBuffers disabled for now on Linux since they are not stable. +- ZIP: Hotfix: the previous update broke the decompression of zip file. It is now fixed! +- ZIP: Added 2 new functions to gzip and ungzip archives on the File System. + + +version 2.6.1 + +- ZIP: Hot fix for zips that contain the __MACOSX folder. +- ZIP: Added simulator plugin for iOS. + + +version 2.6 (ZIP: Important feature and maintenance update) + +- ZIP: Setting level of compression to zero will now use the STORE method. +- ZIP: Added the setCancel() function to cancel the compress_File, compressDir, compress_File_List, decompress_File, extract_entry, entry2Buffer functions. +- ZIP: Added the ability to get byte level progress when compressing files. +- ZIP: Android arm64-v8a plugin should decompress files larger then 2GB now. +- ZIP: Windows: compression with unicode characters in path should work correct now. +- ZIP: The getEntrySize function returns a ulong value now. +- ZIP: The getFileInfo function filled Lists for uncompressed, compressed and localOffset are filled with UInt64 values now. +- ZIP: The getFileInfo function fills a new list localOffset. Useful for archives with the STORE method to find the position in the zip. (you should add + 30 bytes + name.length to get the final offset) +- ZIP: Demo script updated to reflect the new changes. +- 7zip: When extracting a 7z archive the output folder should be created when not existing now. + +version 2.58 + +- ZIP: fixed WebGL issues on Unity 2019.x +- fixed ios/tvos issue with bitcode plugins on xcode 11.x +- Lzma/7zip: fixed issue with the windows plugins. Now bcj and ppmd are back. + + +version 2.57 + +- ZIP: Process of decompression in bytes now returned as ulong. +- ZIP: Fixed an issue with ios/tvOS caused by the 1.64 update. + + +version 2.56 + +- ZIP: Hotfix for the compressDir/compress_File_List functions. The plugin could crash when thousands of files were going to get compressed. + + +version 2.55 + +- ZIP: Using compress_File/compress_File_List/compressDir to append multiple files to a zip were very slow. Now compress_File_List and compressDir work very fast. +- ZIP: For the same reason the inMemory class got some low level functions to allow much faster appending of multiple entries. See examples and docs. + +version 2.54 + +- ZIP: Critical fix for the inMemory zip creation functions. All users that use these functions should update to this version. +- ZIP: Added a public function to the inMemory struct for getting the byte[] buffer of the inMemory created zip. + + +version 2.53 [Major update] + +- ZIP: WebGL has now full zip support. Obviously not on the file system but on memory buffers. (bz2 method not supported yet.) +- ZIP: Webgl got zlib buffer support again. (Was misplaced in a previous update.) +- ZIP: Added the ability to find merged/hidden zip/gzip archives in files or buffers and extract/get info from them. +- ZIP: iOS/tvOS: fixed potential issues with admob/facebook/google sdk. +- ZIP: Windows/Android: fixed bz2 issue. +- ZIP: bz2 method support for inmemory compression. (not for macos/ios/tvos/webgl.) +- All Plugins-tvOS: fixed preprocessor issues on newer versions of Unity. +- plugin binary sizes got smaller. +- updated the benchmark script. + +version 2.52 + +- ZIP: fixed some C# issues with the compress_dir and compress_file_list functions + + +version 2.51 + +- ZIP: iOS/tvOS: fixed duplicate symbol issue with Unity2018. + + +version 2.50 + +- ZIP: iOS/tvOS: fixed some conflict issues with the Facebook SDK. + +version 2.49 + +- tvOS plugins were accidentally not provided as bitcode by default. + +version 2.48 + +- tvOS has its own plugin folder now. +- iOS/tvOS plugins are provided by default as bitcode enabled. (non bitcode versions are still provided.) + +version 2.47 + +- 7z/lzma: fixed some issues with the windows plugins. +- ZIP: Added the ability to create In Memory zip archives and manipulate them. +- MacOS: removed the 32bit only bundle. +- Replaced the www functions with UnityWebRequest. +- Removed the watchOS plugins. +- Docs updated. + +version 2.46 + +- LZMA/Windows x86/Il2cpp: fixed a crash issue. + + +version 2.45 + +- Android arm64 plugins for brotli, flz, lz4 & 7zip updated to fix a crash when using FileBuffers. + + +version 2.44 + +- ZIP: buffer2File fix. (was adding modified time field when it was not needed.) + +- Added Linux glibc 2.17 version plugins (useful for SteamOS). + + +version 2.43 + +- ZIP: Fixed some preprocessor directives. + +version 2.42 + +- ZIP: Added the ability to create split zip archives. +- ZIP: Fixed an issue with the iOS bitcode enabled plugin. + +version 2.41 + +- Addded arm64-v8a Android support for all plugins. + +- Removed WSA support for all plugins. + +- Separated the plugin folders for each category. + +- MacOS plugins compiled only for 64 bit now. + +- ZIP: Resolved some il2cpp issues. + +- ZIP: Unicode filenames on decompression should work now on Windows. + +- ZIP: decompress of split zip archives in the form of 1.zip, 1.z01, 1.z02, ... + +- LZ4/WebGL compress buffer fix. + + +version 2.32 + +- ZIP: Hotfix for password encoded zip files not creating folders. +- ZIP: Hotfix for the compressDir function. + + +version 2.31 + +- ZIP: Added the entry2FixedBuffer function to decompress an entry to a fixed size buffer. + +- ZIP: The getFileInfo is now much faster on zip archives with thousands of files. + + +version 2.30 + +- ZIP: Added the getEntryDateTime function, to get DateTime for a specific entry + +- Updated the file sample links of the demos, due to a server switch. + + +version 2.29 + +- ZIP: Removed encryption/decryption for WSA due to certification reasons. + + + +version 2.28.2 + +- ZIP: iOS/MacOS Hotfix. + +- ZIP: bz2 method removed for MacOS/iOS/watchOS/tvOS because it is not working correctly. + + + +version 2.28.1 + +- Zip: The -lz linking flag should be added for iOS/watchOS/tvOS on xcode. + +- Plugins moved to ADL-Plugins folder. + + + +version 2.28 [Major zip update] + +- Zip: Added Encryption/Decryption support. + +- Zip: Added bz2 as an alternative compression/decompression method of zip archives. + +- Zip: WSA supports now FileBuffers. + +- Zip: On WSA encryption is supported only on UWP10 x64. + +- Zip: Better Unicode support on Windows platforms. + +- Zip: Faster and more reliable getInfo function. (intermediate file is not used anymore.) + +- Zip: Low level functions have been removed due to inconsistency between platforms. + +- Zip: Added the ability to compress a list of files into a single archive. + + + + +version 2.27 + +- Added webGL LZ4 support for compression / decompression of buffers. + + + +version 2.26 + +- Reintroduced webGL support for zip/gzip, flz and lzma compression/decompression of buffers. + + +version 2.25 + +- Zip: hotfix for zip files which use backslashes instead of slashes for directories + +- Zip: Linux/MacOS fixes for the low level functions on standalone builds. + +- Zip/ios: watchOS & tvOS. Added simulator plugins. + + +version 2.24 + +- Zip: Added zip64 support. + +- Zip: Added low level functions (except for WSA) - see demo and lzip.cs. + +- Zip: WSA8.1 fixes. + +- Zip: Added a setEncoding function for Windows and WSA10 to set text encoding on file names. + +- Zip: Added a validate function to check sanity of zip files. + +- Zip: The getTotalFiles will now return only the true files number (no folders and no zero byte files). + +- All plugins: Removed WebGL support since it is almost impossible to work on Unity5.5. + + +version 2.22 + +- changed links for demo projects + + +version 2.21 + +- fix for a WSA/x86/il2cpp crash. + + +version 2.2 + +Removed WebGL support for the LZ4 plugin since there are too many conflicts with Unity5.5. +If you have the LZ4 webgl plugin in your project and you are on Unity5.5 you are advised to removed it. + + +version 2.19 + +zip/All platforms: added the delete_entry function to delete an entry in a zip file. +zip/All platforms: added the replace_entry function to replace an entry in a zip file(from a filepath or a buffer). + + +version 2.18 + +iOS/zip/bitcode: removed older version of bitcode compiled lib which was missing the new ungzip function. + + +version 2.17 + +zip/Windows: A small fix to the getTotalFiles function to allow to work correctly with FileBuffers. + + +version 2.16 + +ZIP All Platforms: Fixed a bug that was introduced in a previous update that had to with the outbuffer length. Now the gzip functions behave as intended. + +ZIP Windows: Now you can treat a zip file that is loaded in a byte buffer as a file. + +ZIP ios/gzip: updated the gzip functions. + + +version 2.15 + +Linux: fixed preprocessor directives for Unity5.4.x and up. + + +version 2.14 + +gzip: Fixed Android issues and added a 2nd ungzip function. + + +version 2.13 + +zip/Windows: better unicode support. Unity5.4 compatibility fix. + + +version 2.12 + +lzma: fixed a bug with lzma compression. (lzma compression on already compressed files would produce corrupted lzma files.) + + +version 2.11 + +zip/iOS: hotfix to fix a GcHandle crash. +LZ4: added compress buffer to a specific location of a fixed size buffer. +LZ4: added decompress an lz4 buffer from a specific location of a fixed size buffer. + + +version 2.1 (Major update) + +- Added Brotli support for all platforms except WebGL & watchOS. + +- zip: added gzip support. Can operate on buffers with or without headers/footers. + +- zip: added progress for individual file decompression. + +- Android, Linux, iOS, MacOSX got chmod support to set file permissions. + +- iOS: made the plugins much smaller in size. + +- Reorganized the demo folders. You are adviced to delete the demo folders before updating the sample scenes. + + + +version 2.09 + +- Added bitcode supported plugins for iOS + + +version 2.08 + +- Compatibility fixes for Windows Phone 8.1 and WSA8.1. Should work out of the box now. + +- Added a benchmark scene. + + +version 2.07 + +- lzma plugin: fix for decompression of asset bundles. + + +version 2.06 + +- Winx86, Winx86_64 & WSA plugins: full unicode support on paths and filenames. Was problematic before. + + +version 2.05 (important update) + +- progress functions are the same on all platforms now. That introduced a small breaking code change. + Instead of providing a referenced integer or float you provide a single item integer of float array. + Removed deprecated iOS functions to get progress. + +- iOS: renamed some native functions to avoid collision with unity's libiphone lib. + +- lzma: added a function to decompress a compressed Asset Bundle. + +- lzma: added an example on how to decompress a compressed asset bundle from the StreamingAssets Folder. + +- zip: fixed an issue with decompressing of zip files containing the '__MACOSX' folder. + The '__MACOSX' folder will be ignored along with files starting with '._' and files with 0 bytes size. + + + +version 2.0 (Major update) + +- Added WebGL support for all plugins! + +- Linux, iOS, Android, MacOSX can treat now buffers as files. That means if you have a file in www.bytes + you can perform operations directly on the buffer. + For Android this is very useful since you can decompress from Streaming Assets without copying to + Persistent data path. + +- all plugins/all platforms: added support for fixed buffer operations to avoid memory allocations. + +- lzma: added support for partial buffer compression. + +- lzma: added the ability to modify the compression properties for buffers and lzma alone files. + +- refactored the preprocessor directives to comply with Unity 5.3. + +- iOS: simulator plugins have now universal, i386 and x86_64 variations. + + + +version 1.9.1 + +- added fastLZ support. + + +version 1.9 + +- Added LZ4 support. (Read the dedicated documentation for it.) + +- Discontinued Blackberry support. + +- Minor improvements for the lzma plugins. + +- WSA10: Accidentally in the previous update the largeFiles support for 7z files was removed. Now it is back in. + +- added a folder with the plugins separated as unitypackage files. + + +version 1.8 + +- iOS: added tvOS, watchOS and simulator plugins. + +- Unity5.2: added WSA SDK10 NetCore support. That means even XboxOne is supported. + +(Delete the old Metro plugins folder, since it is replaced with a different naming scheme.) + + + +version 1.7.7 + +- zip: corrected misbehaviour of the compressDir functions on some operating systems. + + +version 1.7.6 + +- 7zip iOS: fixed a bug in the get7zInfo function when extracting from the StreamingAssets folder. + +- zip iOS : updated the ios plugins to have minimum iOS support 6.0 + + +version 1.7.5 + +- removed vc++2013 dependency for windows editor. + +- zip/7zip iOS: added extra workaround functions to get the progress of files when extracting multiple files in multiple threads. See documentation! + + +version 1.7.4 + +- 7zip iOS: added an extra function to get properly the progress of the extracted files. + +- 7zip iOS: now you can use the largeFiles flag when decompressing a file that is stored in StreamingAssets to some other folder with writing permissions. + +- zip: - added 2 global integers zipFiles & zipFolders that get updated when calling the getFileInfo function. + + +version 1.7.3 + +- Fix for the CompressDir function for the zip plugin. + +- Total true files in a 7zip file are counted now when calling the get7zInfo function and stored in the trueTotalFiles integer variable. + + +version 1.7.21 + +- Hotfix for iOS. Issue was conflicting functions between the zip and 7zip plugin. + +version 1.7.1 + +- cleaned up 7z/lzma cs files. + +- added a second method on 7zip decompression for not forcing the user to use a ref int to get the extraction progress when not needed/wanted. + + +version 1.7 + +MAJOR UPDATE: + +- Added full ZIP support (see appropriate documentation for more). + In short, compression/decompression of files/directories and buffers is supported on all platforms. + +- Changed the way how the decompression progress of archives with multiple files is returned. + Now you have to provide a referenced integer where the progress will be written to. + This was done to avoid shared memory violations when having multiple threads calling the same function. + +- Progress works now for Linux and Win8.1 (Phone and WSA) + +- Removed some obsolete functions and revamped the code. + +- Added an example for Android, to copy a file from the StreamingAssets folder to the PersistantDataPath and do there file operations. + + + + +version 1.6.2 +- critical bug fixed in the 7z decode2Buffer function that caused a crash. Works as expected now. + + +version 1.6.1 +- cleaned up the cs code. Less preprocessor directives used now. + +- updated Blackberry plugin. Added x86 binary. + + +version 1.6 + +Major update: + +-Ability to compress a buffer to the lzma format and to decompress a buffer that is in the lzma format. + +-Added basic support for Windows Phone 8.1 and WSA plugins. + +-Added a method to get the current number of files extracted from a 7z archive. + (Provides a solution to get progress of decompression when the 7z archive has multiple files.) + + - Fixed a bug in the Linux plugin where folders where not created correctly. + + +version 1.5.8 +Added ppmd decompression method support. + + +version 1.5.7 +Addressed memory leak issues and changed the get7zInfo and get7zSize functions. +It is recommended to use this verion if you are calling the above functions on 7z archives +that contain hundreds or thousands of files. + + +version 1.5.5 +Added the ability to decode a specific file in a 7z archive to a byte buffer. + + +version 1.5 +Added the ability to get filename and file size information of a 7z archive. +Added the ability to encode/decode to/from .lzma alone format. + + +version 1.4.5 +Added experimental Blackberry support. +Made sure that iOS works on 64bit builds with il2cpp. + + +version 1.4 +Added support for OSX and LINUX. +Now you should be able to test in the editor and use the lib in standalone applications for win,linux,osx. + + +version 1.3.1 +preprocessor fixes + + +version 1.3 +Added support for x86 and x86_64 windows. A macOS version might come in the future. +Removed crc checks on android and ios builds for faster extraction. + + +version 1.2.5 +Added support for x86 Android builds. +Changed the folder structure of the Plugins/Android folder. +Now the plugins for each platform reside in their own folder named after the platform. +You don't have to do anything. Unity will copy the correct lib for you whether you build for arm, x86 or both (fat binary). + + +version 1.2.1 +- By mistake in the previous version the iOS library was the Debug one. +- 3 compiled versions of the library are now included. Debug, Fast and Small, Aggressive optimizations (faster and bigger) +(the variations are included as zip files in the plugins/iOS folder. Unzip the one you want to use) + + +version 1.2 +- Added iOS support +- improved the example and the documentation. + + diff --git a/Assets/ADL-Plugins/changelog.txt.meta b/Assets/ADL-Plugins/changelog.txt.meta new file mode 100644 index 00000000..f2333dc5 --- /dev/null +++ b/Assets/ADL-Plugins/changelog.txt.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4554c6288b871a24899877147404195b +timeCreated: 1446132328 +licenseType: Store +TextScriptImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ.meta b/Assets/ADL-Plugins/fastLZ.meta new file mode 100644 index 00000000..5597e280 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 321a216ea5cc65d4c9094a41f0c16227 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf b/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf new file mode 100644 index 00000000..517c1bfe Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf differ diff --git a/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf.meta b/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf.meta new file mode 100644 index 00000000..fcc7c52c --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Instructions_FastLZ.pdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6cb214ec45928be478c9d02097a0f74a +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins.meta b/Assets/ADL-Plugins/fastLZ/Plugins.meta new file mode 100644 index 00000000..f3782a3a --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: c86ef44a4a0697943b20b4741495632b +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android.meta new file mode 100644 index 00000000..ef364ba5 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 6ba8ea8ab928f8d4e94c3b23f0aab871 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs.meta new file mode 100644 index 00000000..3c94662b --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: c7622ced1b3d57f458a257238584f961 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a.meta new file mode 100644 index 00000000..0ea7f277 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 2d02dee2c6a445d46b30ba0487355e99 +folderAsset: yes +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so new file mode 100644 index 00000000..93bf7559 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so.meta new file mode 100644 index 00000000..c7a1747f --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/arm64-v8a/libfastlz.so.meta @@ -0,0 +1,97 @@ +fileFormatVersion: 2 +guid: 1ffbd63f83e61374cbd693dc8e8b4a84 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARM64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a.meta new file mode 100644 index 00000000..87667113 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: cb3b38d75ef0f8546bbf583ef7dac2f4 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so new file mode 100644 index 00000000..78dee10b Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so.meta new file mode 100644 index 00000000..eed6124b --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/armeabi-v7a/libfastlz.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: b0991eeaeeefadb46bb8035b7e61f096 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86.meta new file mode 100644 index 00000000..eb6d15d7 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 27f3fc6247234e045a8455a60117dc46 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so new file mode 100644 index 00000000..90c2f52d Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so.meta new file mode 100644 index 00000000..07f101c5 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86/libfastlz.so.meta @@ -0,0 +1,95 @@ +fileFormatVersion: 2 +guid: c89edb380dcfb03408424f5d80d96eb0 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: x86 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64.meta new file mode 100644 index 00000000..04087c55 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 970272caca413874884e58d9db6b1c73 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so new file mode 100644 index 00000000..4aced29a Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so.meta b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so.meta new file mode 100644 index 00000000..a80f2001 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/Android/libs/x86_64/libfastlz.so.meta @@ -0,0 +1,71 @@ +fileFormatVersion: 2 +guid: 2c75f6ae528da0742843f6ada63671bc +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86_64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/WebGL.meta b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL.meta new file mode 100644 index 00000000..1a43988c --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 6b6cb567c0b963e49b6f65d78630a408 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a new file mode 100644 index 00000000..550a2d18 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a.meta b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a.meta new file mode 100644 index 00000000..084ec278 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/WebGL/fastlz.a.meta @@ -0,0 +1,76 @@ +fileFormatVersion: 2 +guid: 37db47a9a60cefa49bc4604322d2d227 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs b/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs new file mode 100644 index 00000000..1a43cddc --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs @@ -0,0 +1,568 @@ +using System; +using System.IO; +using System.Runtime.InteropServices; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.Networking; + + +public class fLZ{ + +#if !UNITY_WEBPLAYER || UNITY_EDITOR + + internal static bool isle = BitConverter.IsLittleEndian; + +#if UNITY_5_4_OR_NEWER + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR || UNITY_EDITOR_LINUX + private const string libname = "fastlz"; + #elif UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libfastlz"; + #endif +#else + #if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR + private const string libname = "fastlz"; + #endif + #if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libfastlz"; + #endif +#endif + +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX + + #if (!UNITY_WEBGL || UNITY_EDITOR) + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX)&& !UNITY_EDITOR_WIN + [DllImport(libname, EntryPoint = "fsetPermissions")] + internal static extern int fsetPermissions(string filePath, string _user, string _group, string _other); + #endif + [DllImport(libname, EntryPoint = "fLZcompressFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int fLZcompressFile(int level, string inFile, string outFile, bool overwrite, IntPtr percent); + + [DllImport(libname, EntryPoint = "fLZdecompressFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int fLZdecompressFile(string inFile, string outFile, bool overwrite, IntPtr percent, IntPtr FileBuffer, int fileBufferLength); + #endif + + [DllImport(libname, EntryPoint = "fLZreleaseBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void fLZreleaseBuffer(IntPtr buffer); + + [DllImport(libname, EntryPoint = "create_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern IntPtr create_Buffer(int size); + + [DllImport(libname, EntryPoint = "addTo_Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + private static extern void addTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + + + [DllImport(libname, EntryPoint = "fLZcompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr fLZcompressBuffer(IntPtr buffer, int bufferLength, int level, ref int v); + + [DllImport(libname, EntryPoint = "fLZdecompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int fLZdecompressBuffer(IntPtr buffer, int bufferLength, IntPtr outbuffer); +#endif + +#if (UNITY_IOS || UNITY_TVOS || UNITY_IPHONE || UNITY_WEBGL) && !UNITY_EDITOR + #if (UNITY_IOS || UNITY_IPHONE) && !UNITY_WEBGL + [DllImport("__Internal")] + internal static extern int fsetPermissions(string filePath, string _user, string _group, string _other); + [DllImport("__Internal")] + internal static extern int fLZcompressFile(int level, string inFile, string outFile, bool overwrite, IntPtr percent); + [DllImport("__Internal")] + internal static extern int fLZdecompressFile(string inFile, string outFile, bool overwrite, IntPtr percent, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal")] + public static extern IntPtr create_Buffer(int size); + [DllImport("__Internal")] + internal static extern void addTo_Buffer(IntPtr destination, int offset, IntPtr buffer, int len); + #endif + #if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_WEBGL) + [DllImport("__Internal")] + public static extern void fLZreleaseBuffer(IntPtr buffer); + [DllImport("__Internal")] + internal static extern IntPtr fLZcompressBuffer(IntPtr buffer, int bufferLength, int level, ref int v); + [DllImport("__Internal")] + internal static extern int fLZdecompressBuffer(IntPtr buffer, int bufferLength, IntPtr outbuffer); + #endif +#endif + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + // set permissions of a file in user, group, other. + // Each string should contain any or all chars of "rwx". + // returns 0 on success + public static int setFilePermissions(string filePath, string _user, string _group, string _other){ + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX || UNITY_IOS || UNITY_TVOS || UNITY_IPHONE) && !UNITY_EDITOR_WIN + return fsetPermissions(filePath, _user, _group, _other); + #else + return -1; + #endif + } + + + //Helper functions + internal static GCHandle gcA(object o) { + return GCHandle.Alloc(o, GCHandleType.Pinned); + } + + private static bool checkObject(object fileBuffer, string filePath, ref GCHandle fbuf, ref IntPtr fileBufferPointer, ref int fileBufferLength) { + if(fileBuffer is byte[]) { byte[] tempBuf = (byte[])fileBuffer; fbuf = gcA(tempBuf); fileBufferPointer = fbuf.AddrOfPinnedObject(); fileBufferLength = tempBuf.Length; return true; } + if(fileBuffer is IntPtr) { fileBufferPointer = (IntPtr)fileBuffer; fileBufferLength = Convert.ToInt32(filePath); } + return false; + } + + + //Compress a file to fLZ. + // + //Full paths to the files should be provided. + //level: level of compression (1 = faster/bigger, 2 = slower/smaller). + //returns: size of resulting archive in bytes + //progress: provide a single item ulong array to get the progress of the compression in real time. (only when called from a thread/task) + // + + public static int compressFile(string inFile, string outFile, int level, bool overwrite, ulong[] progress) + { + if (level < 1) level = 1; + if (level > 2) level = 2; + if(progress == null) progress = new ulong[1]; + + GCHandle ibuf = GCHandle.Alloc(progress, GCHandleType.Pinned); + int res = fLZcompressFile(level, @inFile, @outFile, overwrite, ibuf.AddrOfPinnedObject()); + ibuf.Free(); + return res; + } + + // Decompress an fLZ file. An overloaded function to receive managed and unmanaged file Buffers. + // + // Full paths to the files should be provided. + // returns: 1 on success. ( -5 when not passing the size of a native file buffer through the inFile string parameter. ) + // progress: provide a single item ulong array to get the progress of the decompression in real time. (only when called from a thread/task) + // fileBuffer : A buffer that holds an FLZ file. When assigned the function will decompress from this buffer and will ignore the filePath. (iOS, Android, MacOSX, Linux) + // : It can be a byte[] buffer or a native IntPtr buffer (downloaded using the helper function: downloadFlzFileNative) + // : When an IntPtr is used as the input buffer, the size of it must be passed to the function as a string with the inFile parameter! + // + public static int decompressFile(string inFile, string outFile, bool overwrite, ulong[] progress, object fileBuffer = null) { + int res = 0; + if(progress == null) progress = new ulong[1]; + GCHandle ibuf = GCHandle.Alloc(progress, GCHandleType.Pinned); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + if(fileBuffer != null) { + int fileBufferLength = 0; + IntPtr fileBufferPointer = IntPtr.Zero; + GCHandle fbuf = gcA(null); + bool managed = checkObject(fileBuffer, inFile, ref fbuf, ref fileBufferPointer, ref fileBufferLength); + + if (!managed && fileBufferLength == 0) { Debug.Log("Please provide a valid native buffer size as a string in filePath"); return -5; } + + res = fLZdecompressFile(null, @outFile, overwrite, ibuf.AddrOfPinnedObject(), fileBufferPointer, fileBufferLength); + + fbuf.Free(); + ibuf.Free(); + return res; + } + #endif + res = fLZdecompressFile(inFile, @outFile, overwrite, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0); + ibuf.Free(); + return res; + } + + + + + #endif + + //Compress a byte buffer in fLZ format. + // + //inBuffer: the uncompressed buffer. + //outBuffer: a referenced buffer that will be resized to fit the fLZ compressed data. + //includeSize: include the uncompressed size of the buffer in the resulted compressed one because fLZ does not include this. + //level: level of compression (1 = faster/bigger, 2 = slower/smaller). + //returns true on success + // + // !! If the input is not compressible, the returned buffer might be larger than the input buffer and not valid !! + // + // The minimum input buffer size is 16. + // The output buffer can not be smaller than 66 bytes + // + public static bool compressBuffer(byte[] inBuffer, ref byte[] outBuffer, int level, bool includeSize = true) + { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int res = 0, size = 0; + byte[] bsiz = null; + + //if the uncompressed size of the buffer should be included. This is a hack since fLZ lib does not support this. + if (includeSize) { + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!isle) Array.Reverse(bsiz); + } + + if (level < 1) level = 1; + if (level > 2) level = 2; + + ptr = fLZcompressBuffer(cbuf.AddrOfPinnedObject(), inBuffer.Length, level, ref res); + + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { fLZreleaseBuffer(ptr); return false; } + + System.Array.Resize(ref outBuffer, res + size); + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i+res] = bsiz[i]; /*Debug.Log(BitConverter.ToInt32(bsiz, 0));*/ } + + Marshal.Copy(ptr, outBuffer, 0, res ); + + fLZreleaseBuffer(ptr); + bsiz = null; + + return true; + } + + + //Compress a byte buffer in fLZ format. + // + //inBuffer: the uncompressed buffer. + //outBuffer: a referenced buffer that will be resized to fit the fLZ compressed data. + //includeSize: include the uncompressed size of the buffer in the resulted compressed one because fLZ does not include this. + //level: level of compression (1 = faster/bigger, 2 = slower/smaller). + //returns: a new buffer with the compressed data. + // + // !! If the input is not compressible, the returned buffer might be larger than the input buffer and not valid !! + // + // The minimum input buffer size is 16. + // The output buffer can not be smaller than 66 bytes + // + public static byte[] compressBuffer(byte[] inBuffer, int level, bool includeSize = true) + { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + IntPtr ptr; + + int res = 0, size = 0; + byte[] bsiz = null; + + //if the uncompressed size of the buffer should be included. This is a hack since fLZ lib does not support this. + if (includeSize) { + bsiz = new byte[4]; + size = 4; + bsiz = BitConverter.GetBytes(inBuffer.Length); + if (!isle) Array.Reverse(bsiz); + } + + if (level < 1) level = 1; + if (level > 2) level = 2; + + ptr = fLZcompressBuffer(cbuf.AddrOfPinnedObject(), inBuffer.Length, level, ref res); + cbuf.Free(); + + if (res == 0 || ptr == IntPtr.Zero) { fLZreleaseBuffer(ptr); return null; } + + byte[] outBuffer = new byte[res + size]; + + //add the uncompressed size to the buffer + if (includeSize) { for (int i = 0; i < 4; i++) outBuffer[i + res] = bsiz[i]; /*Debug.Log(BitConverter.ToInt32(bsiz, 0));*/ } + + Marshal.Copy(ptr, outBuffer, 0, res); + + fLZreleaseBuffer(ptr); + bsiz = null; + + return outBuffer; + } + + + //Decompress an fLZ compressed buffer to a referenced buffer. + // + //inBuffer: the fLZ compressed buffer + //outBuffer: a referenced buffer that will be resized to store the uncompressed data. + //useFooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the usefooter is used! + //returns true on success + // + public static bool decompressBuffer(byte[] inBuffer, ref byte[] outBuffer, bool useFooter = true, int customLength = 0) + { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length ,ex = 0; + + //if the hacked in fLZ footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter) { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + if(inBuffer.Length > uncompressedSize) ex = inBuffer.Length - uncompressedSize; + } + else { + uncompressedSize = customLength; + if(inBuffer.Length > outBuffer.Length) ex = inBuffer.Length - outBuffer.Length; + } + + System.Array.Resize(ref outBuffer, uncompressedSize); + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + + int res = fLZdecompressBuffer(cbuf.AddrOfPinnedObject(), uncompressedSize + ex, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if (res == 0) return true; + + return false; + } + + //Decompress an flz compressed buffer to a referenced fixed size buffer. + // + //inBuffer: the flz compressed buffer + //outBuffer: a referenced fixed size buffer where the data will get decompressed + //useFooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the useFooter is used! + //returns uncompressedSize + // + public static int decompressBufferFixed(byte[] inBuffer, ref byte[] outBuffer, bool safe = true, bool useFooter = true, int customLength = 0) { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length, ex = 0; + + //if the hacked in LZ4 footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter){ + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + if(inBuffer.Length > uncompressedSize) ex = inBuffer.Length - uncompressedSize; + } + else{ + uncompressedSize = customLength; + if(inBuffer.Length > outBuffer.Length) ex = inBuffer.Length - outBuffer.Length; + } + + //Check if the uncompressed size is bigger then the size of the fixed buffer. Then: + //1. write only the data that fits in it. + //2. or return a negative number. + //It depends on if we set the safe flag to true or not. + if(uncompressedSize > outBuffer.Length) { + if(safe) return -101; else uncompressedSize = outBuffer.Length; + } + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + int res = fLZdecompressBuffer(cbuf.AddrOfPinnedObject(), uncompressedSize + ex, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if(safe) { if (res != 0) return -101; } + + return uncompressedSize; + } + + + //Decompress an fLZ compressed buffer to a new buffer. + // + //inBuffer: the fLZ compressed buffer + //useFooter: if the input Buffer has the uncompressed size info. + //customLength: provide the uncompressed size of the compressed buffer. Not needed if the usefooter is used! + //returns: a new buffer with the uncompressed data. + // + public static byte[] decompressBuffer(byte[] inBuffer, bool useFooter = true, int customLength = 0) + { + GCHandle cbuf = GCHandle.Alloc(inBuffer, GCHandleType.Pinned); + int uncompressedSize = 0, res2 = inBuffer.Length, ex = 0; + + //if the hacked in fLZ footer will be used to extract the uncompressed size of the buffer. If the buffer does not have a footer + //provide the known uncompressed size through the customLength integer. + if (useFooter) + { + res2 -= 4; + uncompressedSize = (int)BitConverter.ToInt32(inBuffer, res2); + if(inBuffer.Length > uncompressedSize) ex = inBuffer.Length - uncompressedSize; + } + else + { + uncompressedSize = customLength; + if(inBuffer.Length > customLength) ex = inBuffer.Length - customLength; + } + + byte[] outBuffer = new byte[uncompressedSize]; + + GCHandle obuf = GCHandle.Alloc(outBuffer, GCHandleType.Pinned); + + + int res = fLZdecompressBuffer(cbuf.AddrOfPinnedObject(), uncompressedSize + ex, obuf.AddrOfPinnedObject()); + + cbuf.Free(); + obuf.Free(); + + if (res != 0) return null; + + return outBuffer; + } + + + + #if !UNITY_WEBGL && !UNITY_TVOS + // A reusable native memory pointer for downloading files. + public static IntPtr nativeBuffer = IntPtr.Zero; + public static bool nativeBufferIsBeingUsed = false; + public static int nativeOffset = 0; + + + // A Coroutine to dowload a file to a native/unmaged memory buffer. + // You can call it for an IntPtr. + // + // + // This function can only be called for one file at a time. Don't use it to call multiple files at once. + // + // This is useful to avoid memory spikes when downloading large files and intend to decompress from memory. + // With the old method, a copy of the downloaded file to memory would be produced by pinning the buffer to memory. + // Now with this method, it is downloaded to memory and can be manipulated with no memory spikes. + // + // In any case, if you don't need the created in-Memory file, you should use the fLZ.fLZreleaseBuffer function to free the memory! + // + // Parameters: + // + // url: The url of the file you want to download to a native memory buffer. + // downloadDone: Informs a bool that the download of the file to memory is done. + // pointer: An IntPtr for a native memory buffer + // fileSize: The size of the downloaded file will be returned here. + public static IEnumerator downloadFlzFileNative(string url, Action downloadDone, Action pointer = null, Action fileSize = null) { + // Get the file lenght first, so we create a correct size native memory buffer. + UnityWebRequest wr = UnityWebRequest.Head(url); + + nativeBufferIsBeingUsed = true; + + yield return wr.SendWebRequest(); + string size = wr.GetResponseHeader("Content-Length"); + + nativeBufferIsBeingUsed = false; + + #if UNITY_2020_1_OR_NEWER + if (wr.result == UnityWebRequest.Result.ConnectionError || wr.result == UnityWebRequest.Result.ProtocolError) { + #else + if (wr.isNetworkError || wr.isHttpError) { + #endif + Debug.LogError("Error While Getting Length: " + wr.error); + } else { + if (!nativeBufferIsBeingUsed) { + + //get the size of the zip + int zipSize = Convert.ToInt32(size); + + // If the zip size is larger then 0 + if (zipSize > 0) { + + nativeBuffer = create_Buffer(zipSize); + nativeBufferIsBeingUsed = true; + + // buffer for the download + byte[] bytes = new byte[2048]; + nativeOffset = 0; + + using (UnityWebRequest wwwSK = UnityWebRequest.Get(url)) { + + // Here we call our custom webrequest function to download our archive to a native memory buffer. + wwwSK.downloadHandler = new CustomWebRequest3(bytes); + + yield return wwwSK.SendWebRequest(); + + if (wwwSK.error != null) { + Debug.Log(wwwSK.error); + } else { + downloadDone(true); + + if(pointer != null) { pointer(nativeBuffer); fileSize(zipSize); } + + //reset intermediate buffer params. + nativeBufferIsBeingUsed = false; + nativeOffset = 0; + nativeBuffer = IntPtr.Zero; + + //Debug.Log("Custom download done"); + } + } + + } + + } else { Debug.LogError("Native buffer is being used, or not yet freed!"); } + } + } + + + // A custom WebRequest Override to download data to a native-unmanaged memory buffer. + public class CustomWebRequest3 : DownloadHandlerScript { + + public CustomWebRequest3() + : base() + { + } + + public CustomWebRequest3(byte[] buffer) + : base(buffer) + { + } + + protected override byte[] GetData() { return null; } + + + protected override bool ReceiveData(byte[] bytesFromServer, int dataLength) { + if (bytesFromServer == null || bytesFromServer.Length < 1) { + Debug.Log("CustomWebRequest: Received a null/empty buffer"); + return false; + } + + var pbuf = gcA(bytesFromServer); + + //Process byteFromServer + addTo_Buffer(nativeBuffer, nativeOffset, pbuf.AddrOfPinnedObject(), dataLength ); + nativeOffset += dataLength; + pbuf.Free(); + + return true; + } + + // Use the below functions only when needed. You get the same functionality from the main coroutine. + /* + // If all data has been received from the server + protected override void CompleteContent() + { + //Debug.Log(Download Complete."); + } + + // If a Content-Length header is received from the server. + protected override void ReceiveContentLength(int fileLength) + { + //Debug.Log("ReceiveContentLength: " + fileLength); + } + */ + } + #endif + +#endif +} + diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs.meta b/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs.meta new file mode 100644 index 00000000..9bfa06af --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/fLZ.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: 62f15ad6ad149a34d8eac48622c5a647 +timeCreated: 1553412858 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS.meta new file mode 100644 index 00000000..64c48973 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 6c5a2c17c350b094c9850f05780b0917 +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a new file mode 100644 index 00000000..6b243163 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip new file mode 100644 index 00000000..b3e54e27 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip.meta new file mode 100644 index 00000000..3605cf6e --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a-ios.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 971b3504c84d78b4482631a937d93cb7 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a.meta new file mode 100644 index 00000000..2b527505 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.a.meta @@ -0,0 +1,33 @@ +fileFormatVersion: 2 +guid: 508b8b3ee3e4de049a76bc664fa3271b +timeCreated: 1567837724 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + data: + first: + iPhone: iOS + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip new file mode 100644 index 00000000..9ae57a1a Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..22119286 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: c9beba6265b14c54b9225b0ec9e62f82 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip new file mode 100644 index 00000000..4d466b7b Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..0b588015 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/libfastlz.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 8e48a71de3e754f48ae510c4db7a0369 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode.meta new file mode 100644 index 00000000..1ea869eb --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 64d37b5d4de12e44991876e99c0ec30f +folderAsset: yes +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip new file mode 100644 index 00000000..f7beaac7 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip.meta new file mode 100644 index 00000000..0701a4fb --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/iOS/non-bitcode/libfastlz.a.zip.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d2c775c24cd941a4c8f9664a4a0393c1 +timeCreated: 1567837722 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip new file mode 100644 index 00000000..2755a320 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip.meta new file mode 100644 index 00000000..c6a0cf71 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Intel.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 119e2c08c1161594fa4325170a935961 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip new file mode 100644 index 00000000..1521b937 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip.meta new file mode 100644 index 00000000..78a27828 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-SiliconSupport.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: c1e2c6fbd88bf0747914c362b6aa9e18 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip new file mode 100644 index 00000000..ced05771 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip.meta new file mode 100644 index 00000000..11fb013d --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle-Universal.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 377b84ed5ebe9924aa0f4d9d9afe2601 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle.meta new file mode 100644 index 00000000..99d319d3 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle.meta @@ -0,0 +1,46 @@ +fileFormatVersion: 2 +guid: 5b4dc524733ca6e44b826b0c2bea351c +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 1 + settings: + DefaultValueInitialized: true + data: + first: + Standalone: OSXIntel + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents.meta new file mode 100644 index 00000000..059f6b3c --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a854662524a47a34282e642c038ddc03 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/Info.plist b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/Info.plist new file mode 100644 index 00000000..07193b18 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/Info.plist @@ -0,0 +1,50 @@ + + + + + BuildMachineOSBuild + 20B29 + CFBundleDevelopmentRegion + en + CFBundleExecutable + libfastlz + CFBundleIdentifier + com.libfastlz.libfastlz + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + libfastlz + CFBundlePackageType + BNDL + CFBundleShortVersionString + 1.0 + CFBundleSignature + ???? + CFBundleSupportedPlatforms + + MacOSX + + CFBundleVersion + 1 + DTCompiler + com.apple.compilers.llvm.clang.1_0 + DTPlatformBuild + 12E507 + DTPlatformName + macosx + DTPlatformVersion + 11.3 + DTSDKBuild + 20E214 + DTSDKName + macosx11.3 + DTXcode + 1251 + DTXcodeBuild + 12E507 + LSMinimumSystemVersion + 10.9 + NSHumanReadableCopyright + Copyright © 2015 libfastlz. All rights reserved. + + diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS.meta b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS.meta new file mode 100644 index 00000000..6e3f8150 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a99bf601b9db82d469ce8fd27656cc76 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS/libfastlz b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS/libfastlz new file mode 100644 index 00000000..2207e5d0 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/libfastlz.bundle/Contents/MacOS/libfastlz differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS.meta new file mode 100644 index 00000000..80253bdd --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8cf3e197d1565cc4baa92e0ddd0ca07e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a new file mode 100644 index 00000000..0ed95c45 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip new file mode 100644 index 00000000..e02eedb1 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip.meta new file mode 100644 index 00000000..64efec2e --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a-ios.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: e135dd5c114ed19438bb3f106abbe48a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a.meta new file mode 100644 index 00000000..56c89ca9 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.a.meta @@ -0,0 +1,102 @@ +fileFormatVersion: 2 +guid: 1aa77c23737d24a44afabb24835656db +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + - first: + '': Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude tvOS: 0 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + tvOS: tvOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip new file mode 100644 index 00000000..75ab828c Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..b186f671 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 93b6023eb2b102540acf3995435b83a7 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip new file mode 100644 index 00000000..5b54011e Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..5ffa8d3d --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/libfastlz.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: e600a6d8c08cac24dabcc67fa08a52eb +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode.meta new file mode 100644 index 00000000..a7ee9df0 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5d33e5574c9e6fd458982e4717fc4f40 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip new file mode 100644 index 00000000..3d175754 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip.meta new file mode 100644 index 00000000..ccda5b1d --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/tvOS/non-bitcode/libfastlz.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 41c61c228b448d84ea5254c89c4c78a1 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86.meta b/Assets/ADL-Plugins/fastLZ/Plugins/x86.meta new file mode 100644 index 00000000..4d437f0e --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/x86.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: d196586c5f190194bb8776cb15273b4a +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip b/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip new file mode 100644 index 00000000..86ee9d4d Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip.meta b/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip.meta new file mode 100644 index 00000000..f05c4cdb --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/x86/libfastlz.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 17d5bf944e6ed474d9ba8237cfc4f59a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86_64.meta b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64.meta new file mode 100644 index 00000000..fbb4efe4 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: b32ea98e88670a445a0fd3126af8ea2a +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll new file mode 100644 index 00000000..878a5555 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll.meta b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll.meta new file mode 100644 index 00000000..8a5360ca --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.dll.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: 2705ea2ce45cca24a95e6f60c4d86c60 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Windows + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so new file mode 100644 index 00000000..93c160a5 Binary files /dev/null and b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so differ diff --git a/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so.meta b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so.meta new file mode 100644 index 00000000..83451c6c --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Plugins/x86_64/libfastlz.so.meta @@ -0,0 +1,113 @@ +fileFormatVersion: 2 +guid: f44f3566ebc1e4d48bf1a4a11233555f +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Linux + second: + enabled: 0 + settings: + CPU: None + - first: + : LinuxUniversal + second: + enabled: 1 + settings: + CPU: x86_64 + - first: + : OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + : OSXIntel64 + second: + enabled: 0 + settings: + CPU: None + - first: + : SamsungTV + second: + enabled: 0 + settings: + STV_MODEL: STANDARD_13 + - first: + : WP8 + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Linux + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 0 + settings: + CPU: AnyCPU + DontProcess: False + PlaceholderPath: + SDK: AnySDK + - first: + iPhone: iOS + second: + enabled: 0 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/Scripts.meta b/Assets/ADL-Plugins/fastLZ/Scripts.meta new file mode 100644 index 00000000..991a4b65 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Scripts.meta @@ -0,0 +1,5 @@ +fileFormatVersion: 2 +guid: 3418d6132717a0a40ad5be9805206be6 +folderAsset: yes +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs new file mode 100644 index 00000000..bff16bad --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs @@ -0,0 +1,227 @@ +using System; + +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using System.Threading; +using System.IO; + + +public class fLZtest : MonoBehaviour { +#if (!UNITY_TVOS && !UNITY_WEBGL) || UNITY_EDITOR + + // some variables to get status returns from the functions + private int lz1, lz2, lz3, lz4, fbuftest, nFbuftest; + + // a single item ulong array to get the progress of the compression + private ulong[] progress = new ulong[1]; + + // a single item ulong array to get the progress of the decompression + private ulong[] progress2 = new ulong[1]; + + // a test file that will be downloaded to run the tests + private string myFile = "testLZ4.tif"; + + // the adress from where we download our test file + private string uri = "https://dl.dropbox.com/s/r1ccmnreyd460vr/"; + + // our path where we do the tests + private string ppath; + + private bool compressionStarted; + private bool downloadDone; + + // a reusable buffer + private byte[] buff; + + // fixed size buffer, that don't gets resized, to perform decompression of buffers in them and avoid memory allocations. + private byte[] fixedOutBuffer = new byte[1024*768]; + + // Use this for initialization + void Start () { + ppath = Application.persistentDataPath; + + #if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; + #endif + + buff = new byte[0]; + + Debug.Log(ppath); + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + if(!File.Exists(ppath + "/" + myFile)) StartCoroutine(DownloadTestFile()); else downloadDone = true; + } + + + + // Update is called once per frame + void Update () { + if (Input.GetKeyDown(KeyCode.Escape)) { Application.Quit(); } + } + + + void OnGUI() + { + if (downloadDone == true) + { + GUI.Label(new Rect(50, 0, 350, 30), "package downloaded, ready to extract"); + GUI.Label(new Rect(50, 30, 450, 90), ppath); + } + + if (downloadDone) + { + if (GUI.Button(new Rect(50, 150, 250, 50), "start fastLZ test")) + { + compressionStarted = true; + // call the decompresion demo functions. + // DoTests(); + // we call the test function on a thread to able to see progress. WebGL does not support threads. + Thread th = new Thread(DoTests); th.Start(); + + // native FileBuffer test + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + StartCoroutine(nativeFileBufferTest()); + #endif + } + + } + + if (compressionStarted){ + // if the return code is 1 then the decompression was succesful. + GUI.Label(new Rect(50, 220, 250, 40), "fLZ Compress: " + lz1.ToString() + " bytes"); + GUI.Label(new Rect(300, 220, 120, 40), progress[0].ToString() + "%"); + + GUI.Label(new Rect(50, 260, 250, 40), "fLZ Decompress: " + lz2.ToString()); + GUI.Label(new Rect(300, 260, 250, 40), progress2[0].ToString() + "%"); + + GUI.Label(new Rect(50, 300, 250, 40), "Buffer Compress: " + lz3.ToString()); + GUI.Label(new Rect(50, 340, 250, 40), "Buffer Decompress: " + lz4.ToString()); + + #if (UNITY_EDITOR || UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX) && !UNITY_EDITOR_WIN + GUI.Label(new Rect(50, 380, 250, 40), "FileBuffer test: " + fbuftest.ToString()); + GUI.Label(new Rect(50, 420, 280, 40), "Native FileBuffer test: " + nFbuftest.ToString()); + #endif + } + + } + + + void DoTests() { + // File tests + // compress a file to flz with highest level of compression (2). + lz1 = fLZ.compressFile(ppath+ "/" + myFile, ppath + "/" + myFile + ".flz", 2, true, progress); + + // decompress the previously compressed archive + lz2 = fLZ.decompressFile(ppath + "/" + myFile + ".flz", ppath + "/" + myFile + "B.tif", true, progress2); + + // Buffer tests + if (File.Exists(ppath + "/" + myFile)) { + byte[] bt = File.ReadAllBytes(ppath + "/" + myFile); + + // compress a byte buffer (we write the output buffer to a file for debug purposes.) + if (fLZ.compressBuffer(bt, ref buff, 2, true)){ + lz3 = 1; + File.WriteAllBytes(ppath + "/buffer1.flzbuf", buff); + } + + byte[] bt2 = File.ReadAllBytes(ppath + "/buffer1.flzbuf"); + + // decompress a byte buffer (we write the output buffer to a file for debug purposes.) + if (fLZ.decompressBuffer(bt2, ref buff, true)){ + lz4 = 1; + File.WriteAllBytes(ppath + "/buffer1.tif", buff); + } + + // FIXED BUFFER FUNCTION: + int decommpressedSize = fLZ.decompressBufferFixed(bt2, ref fixedOutBuffer); + if(decommpressedSize > 0) Debug.Log(" # Decompress Fixed size Buffer: " + decommpressedSize); + + + bt2= null; bt = null; + } + + // make FileBuffer tests on supported platfoms. + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + // make a temp buffer to read an flz file in. + if (File.Exists(ppath + "/" + myFile + ".flz")){ + byte[] FileBuffer = File.ReadAllBytes(ppath + "/" + myFile + ".flz"); + fbuftest = fLZ.decompressFile(null, ppath + "/" + myFile + ".flzFILE_BUFF.tif", true, progress2, FileBuffer); + } + + + #endif + + + } + + + IEnumerator DownloadTestFile() { + //make sure a previous flz file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) File.Delete(ppath + "/" + myFile); + + Debug.Log("starting download"); + + //replace the link to the flz file with your own (although this will work also) + using (UnityEngine.Networking.UnityWebRequest www = UnityEngine.Networking.UnityWebRequest.Get(uri + myFile)) { + + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) + { + Debug.Log(www.error); + } else { + downloadDone = true; + + //write the downloaded flz file to the ppath directory so we can have access to it + //depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + } + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR) && !UNITY_EDITOR_WIN + // native file buffer test + // For iOS, Android, Linux and MacOSX the plugin can handle a byte buffer as a file. (in this case a native file buffer) + // This way you can extract the file or parts of it without writing it to disk. + IEnumerator nativeFileBufferTest() { + + //make a check that the intermediate native buffer is not being used! + if(fLZ.nativeBufferIsBeingUsed) { Debug.Log("Native buffer download is in use"); yield break; } + + // A bool for download checking + bool downloadDoneN = false; + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // int to get the downloaded file size + int zsize = 0; + + Debug.Log("Downloading flz file to native memory buffer"); + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. + StartCoroutine(fLZ.downloadFlzFileNative("http://telias.free.fr/temp/testLZ4.tif.flz", r => downloadDoneN = r, pointerResult => nativePointer = pointerResult, size => zsize = size)); + + while (!downloadDoneN) yield return true; + + nFbuftest = fLZ.decompressFile(zsize.ToString(), ppath + "/nativeBufferToFile.tif", true, null, nativePointer); + + // free the native memory buffer! + fLZ.fLZreleaseBuffer(nativePointer); + } + #endif + +#else + void OnGUI() { + GUI.Label(new Rect(10, 10, 500, 40), "Please switch to the WebGL-tvOS example."); + } +#endif +} diff --git a/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs.meta b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs.meta new file mode 100644 index 00000000..a1538f5f --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtest.cs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b7452c204619a0d4f80ca9c1436c4c57 +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: diff --git a/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs new file mode 100644 index 00000000..50d54bc5 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs @@ -0,0 +1,113 @@ +using UnityEngine; +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine.Networking; + + + +public class fLZtestWebGLtvOS : MonoBehaviour +{ +#if UNITY_WEBGL || UNITY_TVOS + + + //an output Buffer for the decompressed flz buffer + private byte[] outbuffer = null; + private Texture2D tex = null; + + byte[] compressedBuffer = null; + byte[] wwb = null; + + private bool downloadDone2; + + private string log = ""; + + //log for output of results + void plog(string t) + { + log += t + "\n"; ; + } + + void Start(){ + tex = new Texture2D(1600,1280,TextureFormat.RGBA32, false); + + //get an image from the internet to perform compress/decompress operations on it + StartCoroutine( getFromSite() ); + } + + + + void OnGUI(){ + + if (downloadDone2 == true) { + GUI.Label(new Rect(10, 0, 250, 30), "got image, ready to compress/decompress"); + + + if (GUI.Button(new Rect(10, 90, 230, 50), "start FLZ test")) { + StartCoroutine(performOperations()); + + } + } + + if(tex != null) GUI.DrawTexture(new Rect(360, 10, 375, 300), tex); + + GUI.TextArea(new Rect(10, 370, Screen.width - 20, Screen.height - 400), log); + } + + + + // ============================================================================================================================================================= + + IEnumerator performOperations() { + log =""; + yield return true; + + if(wwb == null) yield break; else plog("Image size: " + wwb.Length.ToString()); + + if(compressedBuffer != null) compressedBuffer = null; + + compressedBuffer = fLZ.compressBuffer(wwb, 2); + + plog("Buffer compressed. Size: " + compressedBuffer.Length.ToString()); + yield return true; + + plog("flz decompress: " + fLZ.decompressBuffer(compressedBuffer, ref outbuffer).ToString() ); + if(outbuffer != null) { tex.LoadImage(outbuffer); plog("Decompressed size: " + outbuffer.Length.ToString()); } + yield return true; + } + + IEnumerator getFromSite() { + plog("getting image from Site ..."); + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropbox.com/s/sp79pnbnw6xhn43/testLZ4b.png")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + wwb = new byte[www.downloadHandler.data.Length]; + Array.Copy(www.downloadHandler.data, 0, wwb, 0, www.downloadHandler.data.Length); + plog("Got image"); + } + } + + downloadDone2 = true; + + #if UNITY_TVOS && !UNITY_EDITOR + yield return true; + StartCoroutine(performOperations()); + #endif + } + +#else + void OnGUI(){ + GUI.Label(new Rect(10, 10, 500, 40),"Only for WebGL or tvOS"); + } +#endif + +} + diff --git a/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs.meta b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs.meta new file mode 100644 index 00000000..aace7e90 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/Scripts/fLZtestWebGLtvOS.cs.meta @@ -0,0 +1,11 @@ +fileFormatVersion: 2 +guid: d29b3f376007061459e1b1191f307a81 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity new file mode 100644 index 00000000..b473a182 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 93a7db3e7afb7324a99181d1b3dab1b7, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &197455903 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 197455908} + - component: {fileID: 197455907} + - component: {fileID: 197455905} + - component: {fileID: 197455904} + - component: {fileID: 197455909} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &197455904 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!124 &197455905 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!20 &197455907 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.21339932, g: 0.20134082, b: 0.3602941, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &197455908 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &197455909 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: d29b3f376007061459e1b1191f307a81, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity.meta b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity.meta new file mode 100644 index 00000000..6534c668 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOS.unity.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: a648cb3b57e603a4b8776e8c1a6b5ffa +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting new file mode 100644 index 00000000..c94399ec --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: fastLZ-WebGL-tvOSSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting.meta b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting.meta new file mode 100644 index 00000000..8b0c1de5 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZ-WebGL-tvOSSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 93a7db3e7afb7324a99181d1b3dab1b7 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity b/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity new file mode 100644 index 00000000..76285c71 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 1024 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: b12ddeb00aec8d84d833d39a7ba37fdd, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &197455903 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 197455908} + - component: {fileID: 197455907} + - component: {fileID: 197455905} + - component: {fileID: 197455904} + - component: {fileID: 197455909} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &197455904 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!124 &197455905 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 +--- !u!20 &197455907 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.2352941, g: 0.121107265, b: 0.22269417, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &197455908 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &197455909 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 197455903} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: b7452c204619a0d4f80ca9c1436c4c57, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity.meta b/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity.meta new file mode 100644 index 00000000..e1f4ef40 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZdemo.unity.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: e50f1987ce30d87449496af3914d18b2 +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting b/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting new file mode 100644 index 00000000..e38af6b5 --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: fastLZdemoSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 0 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 0 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 1024 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting.meta b/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting.meta new file mode 100644 index 00000000..5f26457d --- /dev/null +++ b/Assets/ADL-Plugins/fastLZ/fastLZdemoSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b12ddeb00aec8d84d833d39a7ba37fdd +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip.meta b/Assets/ADL-Plugins/zip.meta new file mode 100644 index 00000000..f1f553cf --- /dev/null +++ b/Assets/ADL-Plugins/zip.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: f656b5f77e1679f4ca9140d01bbe864f +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf b/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf new file mode 100644 index 00000000..0e942e60 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf differ diff --git a/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf.meta b/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf.meta new file mode 100644 index 00000000..794bb429 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Instructions_ZIP.pdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: eb3faed7be5b201479b85fbc0f8e037a +timeCreated: 1553410075 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins.meta b/Assets/ADL-Plugins/zip/Plugins.meta new file mode 100644 index 00000000..b18d98b3 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: ee00418e18d49054484933a6bcfcaddc +folderAsset: yes +timeCreated: 1553412858 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android.meta b/Assets/ADL-Plugins/zip/Plugins/Android.meta new file mode 100644 index 00000000..ad9f5d76 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 940594a43be6f2444983b83a01042f5a +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs.meta new file mode 100644 index 00000000..223bc542 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c43aecf8261b1c448b96fbf5af0ec40a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a.meta new file mode 100644 index 00000000..3f324785 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 26c051ac15f46774c87edd3415cd359c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so new file mode 100644 index 00000000..eac1c46a Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so differ diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so.meta new file mode 100644 index 00000000..7873c4b5 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/arm64-v8a/libzipw.so.meta @@ -0,0 +1,91 @@ +fileFormatVersion: 2 +guid: 64583dd0463e0794fa3493f8a5cf083e +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARM64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a.meta new file mode 100644 index 00000000..3450e0b8 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 70b210060b87eab4a836a7ce070174d1 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so new file mode 100644 index 00000000..f0cf55ea Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so differ diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so.meta new file mode 100644 index 00000000..562ec52d --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/armeabi-v7a/libzipw.so.meta @@ -0,0 +1,33 @@ +fileFormatVersion: 2 +guid: a22a0b82908174c418ed65fd0fae8be7 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86.meta new file mode 100644 index 00000000..4de2d7ad --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c89e90f5a39fe6940bc3420fbaf3aede +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so new file mode 100644 index 00000000..08f4e5af Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so differ diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so.meta new file mode 100644 index 00000000..30bbafc9 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86/libzipw.so.meta @@ -0,0 +1,87 @@ +fileFormatVersion: 2 +guid: 37d68bb370fce8d4b94d3337f05bcaf3 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude WindowsStoreApps: 0 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 0 + settings: {} + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 1 + settings: + CPU: AnyCPU + DontProcess: false + PlaceholderPath: + SDK: AnySDK + ScriptingBackend: AnyScriptingBackend + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64.meta new file mode 100644 index 00000000..32e8afe5 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5c60079eb2a376a4e8a9d4f34e574020 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so new file mode 100644 index 00000000..0a2e1149 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so differ diff --git a/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so.meta b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so.meta new file mode 100644 index 00000000..4e0fbf4f --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/Android/libs/x86_64/libzipw.so.meta @@ -0,0 +1,87 @@ +fileFormatVersion: 2 +guid: c52d9cbb9c3db6a4980f9a344a72866d +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 0 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude WindowsStoreApps: 0 + - first: + Android: Android + second: + enabled: 1 + settings: + CPU: X86_64 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 0 + settings: {} + - first: + Windows Store Apps: WindowsStoreApps + second: + enabled: 1 + settings: + CPU: X86 + DontProcess: false + PlaceholderPath: + SDK: AnySDK + ScriptingBackend: AnyScriptingBackend + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL.meta b/Assets/ADL-Plugins/zip/Plugins/WebGL.meta new file mode 100644 index 00000000..aa709275 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/WebGL.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: a76d65dc02e88284b9153c61dab05fea +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip new file mode 100644 index 00000000..bd2c3168 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip.meta b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip.meta new file mode 100644 index 00000000..6b3f6677 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-AES.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 6503748fa6c5db34e80c20c1b6b3b9bd +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip new file mode 100644 index 00000000..599e423c Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip.meta b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip.meta new file mode 100644 index 00000000..cac2447b --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw-noAES.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: c99b69d6d29ad734a8f196c64e22f74e +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a new file mode 100644 index 00000000..fc68773f Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a differ diff --git a/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a.meta b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a.meta new file mode 100644 index 00000000..10f52555 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/WebGL/zipw.a.meta @@ -0,0 +1,76 @@ +fileFormatVersion: 2 +guid: 1cf85d19c53f8f549a9b6cd17d4d8ae2 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 1 + Exclude Win64: 1 + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + DefaultValueInitialized: true + OS: AnyOS + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: None + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS.meta b/Assets/ADL-Plugins/zip/Plugins/iOS.meta new file mode 100644 index 00000000..46b8f264 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 9ecd857051f20144eaef845fe8e63e04 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip new file mode 100644 index 00000000..ff45a34f Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip.meta new file mode 100644 index 00000000..5ea37c96 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw-bitcode-xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: ff46de9d429e3b1449047cf42b2dcd60 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a new file mode 100644 index 00000000..4cbfccfa Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a differ diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip new file mode 100644 index 00000000..d1d5e6d9 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip.meta new file mode 100644 index 00000000..3e4ef5fb --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a-ios.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 12a9c72bcc197994ea81e05b4bb9f237 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a.meta new file mode 100644 index 00000000..30d07258 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.a.meta @@ -0,0 +1,32 @@ +fileFormatVersion: 2 +guid: ece9200d547082c47b5eab631d13e10c +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + iPhone: iOS + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip new file mode 100644 index 00000000..5932978d Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip.meta new file mode 100644 index 00000000..e2dfedfc --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/libzipw.bitcode.xcode12.2.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 9283fb3c90935d447b05a0af28f82cfc +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode.meta new file mode 100644 index 00000000..3911ab4a --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2968d93219aca8345bc89e4af7a2e1d4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip new file mode 100644 index 00000000..43245b1f Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip.meta b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip.meta new file mode 100644 index 00000000..0222ebd6 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/iOS/non-bitcode/libzipw.a.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 113b2c997acf28242aff7057b641d29b +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip b/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip new file mode 100644 index 00000000..f115be97 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip.meta new file mode 100644 index 00000000..56ab9ca9 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw-Intel.bundle.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 9eb0a132215ead54b818b479e4532f94 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip b/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip new file mode 100644 index 00000000..9455f7b5 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip.meta new file mode 100644 index 00000000..d74f61bb --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw-universal.bundle.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: b1beaa9b34636364b83556644de4d95a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip new file mode 100644 index 00000000..718dfa32 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip.meta new file mode 100644 index 00000000..3e523858 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle-Silicon.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 3ded330e0c3b66543aa8afc5855ee6b2 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle.meta new file mode 100644 index 00000000..a9b16bf9 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle.meta @@ -0,0 +1,44 @@ +fileFormatVersion: 2 +guid: 7fc3a5313453ec442ba80acfeb1ac11b +folderAsset: yes +PluginImporter: + serializedVersion: 2 + iconMap: {} + executionOrder: {} + isPreloaded: 0 + isOverridable: 0 + platformData: + data: + first: + Any: + second: + enabled: 0 + settings: {} + data: + first: + Editor: Editor + second: + enabled: 1 + settings: + DefaultValueInitialized: true + data: + first: + Standalone: OSXIntel + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: {} + data: + first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents.meta new file mode 100644 index 00000000..a99a3153 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 04d8ca552ec3a804a914dde3943cc148 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/Info.plist b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/Info.plist new file mode 100644 index 00000000..d43c46e7 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/Info.plist @@ -0,0 +1,50 @@ + + + + + BuildMachineOSBuild + 20B29 + CFBundleDevelopmentRegion + en + CFBundleExecutable + libzipw + CFBundleIdentifier + com.zipwlib.libzipws + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + libzipw + CFBundlePackageType + BNDL + CFBundleShortVersionString + 1.0 + CFBundleSignature + ???? + CFBundleSupportedPlatforms + + MacOSX + + CFBundleVersion + 1 + DTCompiler + com.apple.compilers.llvm.clang.1_0 + DTPlatformBuild + 12E507 + DTPlatformName + macosx + DTPlatformVersion + 11.3 + DTSDKBuild + 20E214 + DTSDKName + macosx11.3 + DTXcode + 1251 + DTXcodeBuild + 12E507 + LSMinimumSystemVersion + 10.9 + NSHumanReadableCopyright + + + diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS.meta b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS.meta new file mode 100644 index 00000000..245353e7 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3e6bce653aafa1345864be29482ee3f3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS/libzipw b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS/libzipw new file mode 100644 index 00000000..38c5ec91 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/libzipw.bundle/Contents/MacOS/libzipw differ diff --git a/Assets/ADL-Plugins/zip/Plugins/lzip.cs b/Assets/ADL-Plugins/zip/Plugins/lzip.cs new file mode 100644 index 00000000..b2e6f0f5 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/lzip.cs @@ -0,0 +1,3967 @@ +using System; +using System.IO; +using System.Runtime.InteropServices; +using System.Collections; +using System.Collections.Generic; +using System.Text; +using UnityEngine; +using UnityEngine.Networking; + +public class lzip { + +#if !UNITY_WEBPLAYER || UNITY_EDITOR + + +#if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_WEBGL) && !UNITY_EDITOR + +#if (UNITY_IPHONE || UNITY_IOS) && !UNITY_WEBGL && !UNITY_TVOS + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zsetPermissions(string filePath, string _user, string _group, string _other); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipCD(int levelOfCompression, string zipArchive, string inFilePath, string fileName, string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2, int diskSize, IntPtr bprog); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipEX(string zipArchive, string outPath, IntPtr progress, IntPtr FileBuffer, int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipEntry(string zipArchive, string arcFilename, string outpath, IntPtr FileBuffer,int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipEntryList(string zipArchive, IntPtr outpath, IntPtr filename, int arrayLength, IntPtr FileBuffer, int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern bool zipBuf2File(int levelOfCompression, string zipArchive, string arcFilename, IntPtr buffer, int bufferSize, string comment,[MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipDeleteFile(string zipArchive, string arcFilename, string tempArchive); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipCDList(int levelOfCompression, string zipArchive, IntPtr filename, int arrayLength, IntPtr prog, IntPtr filenameForced, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2, int diskSize, IntPtr bprog); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int gzip_File(string inFile, string outFile, int level, IntPtr progress, bool addHeader); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int ungzip_File(string inFile, string outFile, IntPtr progress); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int readTarA(string zipArchive, IntPtr total); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr readTar(string zipArchive, int size, IntPtr unc); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int createTar(string outFile, IntPtr filePath, IntPtr filename, int arrayLength, IntPtr prog, IntPtr bprog); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int extractTar(string inFile, string outDir, string entry, IntPtr prog, IntPtr bprog, bool fullPaths); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int bz2(bool decompress, int level, string inFile, string outFile, IntPtr byteProgress); +#endif + +#if (UNITY_IPHONE || UNITY_IOS || UNITY_TVOS || UNITY_WEBGL) + + // Send cancel signal to the following operations: + // - compress a single file + // - compress directory or list of files + // - extract a single file to the file system + // - extract a zip to the file system. + // - entry2Buffer + // + // This function is useful when the zip operation is executed in a Thread. + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + public static extern void setCancel(); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + public static extern void releaseBuffer(IntPtr buffer); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr createBuffer(int size); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern void addToBuffer(IntPtr destination, int offset, IntPtr buffer, int len); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipCompressBuffer(IntPtr source, int sourceLen, int levelOfCompression, ref int v); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipDecompressBuffer(IntPtr source, int sourceLen, ref int v); + + //gzip section + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + internal static extern int zipGzip(IntPtr source, int sourceLen, IntPtr outBuffer, int levelOfCompression, bool addHeader, bool addFooter); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + internal static extern int zipUnGzip(IntPtr source, int sourceLen, IntPtr outBuffer, int outLen, bool hasHeader, bool hasFooter); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + internal static extern int zipUnGzip2(IntPtr source, int sourceLen, IntPtr outBuffer, int outLen); + // + + //inMemory section + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int freeMemStruct(IntPtr buffer); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipCDMem(IntPtr info, IntPtr pnt, int levelOfCompression, IntPtr source, int sourceLen, string fileName, string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr initMemStruct(); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr initFileStruct(); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int freeMemZ(IntPtr pointer); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int freeFileZ(IntPtr pointer); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipCDMemStart(IntPtr info, IntPtr pnt, IntPtr fileStruct, IntPtr memStruct); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipCDMemAdd(IntPtr zf, int levelOfCompression, IntPtr source, int sourceLen, string fileName, string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipCDMemClose(IntPtr zf, IntPtr memStruct, IntPtr info, int err); + // + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern uint getEntryDateTime(string zipArchive, string arcFilename, IntPtr FileBuffer,int fileBufferLength); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipGetTotalFiles(string zipArchive, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipGetTotalEntries(string zipArchive, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipGetInfoA(string zipArchive, IntPtr total, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern IntPtr zipGetInfo(string zipArchive, int size, IntPtr unc, IntPtr comp, IntPtr offs, IntPtr FileBuffer, int fileBufferLength); + + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern bool zipEntryExists(string zipArchive, string entry, IntPtr FileBuffer, int fileBufferLength); + + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern bool zipValidateFile(string zip_Archive, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern ulong zipGetEntrySize(string zipArchive, string entry, IntPtr FileBuffer, int fileBufferLength); + [DllImport("__Internal", CallingConvention = CallingConvention.Cdecl)] + private static extern int zipEntry2Buffer(string zipArchive, string entry, IntPtr buffer, int bufferSize, IntPtr FileBuffer, int fileBufferLength, [MarshalAs(UnmanagedType.LPStr)] string password); +#endif +#endif + +#if UNITY_5_4_OR_NEWER +#if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR || UNITY_EDITOR_LINUX + private const string libname = "zipw"; +#elif UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libzipw"; +#endif +#else +#if (UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_WEBGL) && !UNITY_EDITOR + private const string libname = "zipw"; +#endif +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX + private const string libname = "libzipw"; +#endif +#endif + +#if UNITY_EDITOR || UNITY_STANDALONE_WIN || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX + +#if ((!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR) + +#if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX) && !UNITY_EDITOR_WIN + [DllImport(libname, EntryPoint = "zsetPermissions" +#if (UNITY_ANDROID && !UNITY_EDITOR) + , CallingConvention = CallingConvention.Cdecl +#endif + )] + internal static extern int zsetPermissions(string filePath, string _user, string _group, string _other); +#endif + + + + + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + // CP_ACP = 0 + // CP_OEMCP/UNICODE = 1 + // CP_UTF8 = 65001 (default) + // CP_WINUNICODE = 1200 + // Chinese = 54936 or 936 + + // https://docs.microsoft.com/en-us/windows/win32/intl/code-page-identifiers + + [DllImport(libname, EntryPoint = "setTarEncoding" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void setTarEncoding(uint encoding); + + // CP_ACP = 0 + // CP_OEMCP/UNICODE = 1 + // CP_UTF8 = 65001 (default) + // CP_WINUNICODE = 1200 + // Chinese = 54936 or 936 + + // In general keeping the default utf-8 encoding should be ok. But in some cases where the application that created the zip didn't used utf-8, you should set your encoding with this function. + + [DllImport(libname, EntryPoint = "setEncoding" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) + , CallingConvention = CallingConvention.Cdecl + #endif + )] + + public static extern void setEncoding(uint encoding); + #endif + + + [DllImport(libname, EntryPoint = "zipValidateFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern bool zipValidateFile( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr FileBuffer,int fileBufferLength); + + [DllImport(libname, EntryPoint = "zipGetTotalFiles" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipGetTotalFiles( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr FileBuffer, int fileBufferLength); + + + [DllImport(libname, EntryPoint = "zipGetTotalEntries" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipGetTotalEntries( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr FileBuffer, int fileBufferLength); + + + [DllImport(libname, EntryPoint = "zipGetInfoA" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipGetInfoA( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr total, IntPtr FileBuffer, int fileBufferLength); + + + + + [DllImport(libname, EntryPoint = "zipGetInfo" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern IntPtr zipGetInfo( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, int size, IntPtr unc, IntPtr comp, IntPtr offs, IntPtr FileBuffer, int fileBufferLength); + + + [DllImport(libname, EntryPoint = "releaseBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void releaseBuffer(IntPtr buffer); + + + [DllImport(libname, EntryPoint = "createBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern IntPtr createBuffer(int size); + + [DllImport(libname, EntryPoint = "addToBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + private static extern void addToBuffer(IntPtr destination, int offset, IntPtr buffer, int len); + + [DllImport(libname, EntryPoint = "zipGetEntrySize" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern ulong zipGetEntrySize( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string entry, IntPtr FileBuffer, int fileBufferLength); + + [DllImport(libname, EntryPoint = "zipEntryExists" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern bool zipEntryExists( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string entry, IntPtr FileBuffer, int fileBufferLength); + + [DllImport(libname, EntryPoint = "zipCD" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipCD( + int levelOfCompression, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + # endif + string inFilePath, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string fileName, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2, int diskSize, IntPtr bprog + ); + + [DllImport(libname, EntryPoint = "zipCDList" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipCDList( + int levelOfCompression, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr filename, int arrayLength, IntPtr prog, IntPtr filenameForced, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2, int diskSize, IntPtr bprog + ); + + [DllImport(libname, EntryPoint = "zipBuf2File" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern bool zipBuf2File(int levelOfCompression, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + # endif + string arcFilename, IntPtr buffer, int bufferSize, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string comment,[MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2 + ); + + [DllImport(libname, EntryPoint = "zipDeleteFile" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipDeleteFile( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string arcFilename, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string tempArchive); + + + [DllImport(libname, EntryPoint = "zipEntry2Buffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipEntry2Buffer( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string entry, IntPtr buffer, int bufferSize, IntPtr FileBuffer, int fileBufferLength, [MarshalAs(UnmanagedType.LPStr)] string password); + + [DllImport(libname, EntryPoint = "zipCompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr zipCompressBuffer(IntPtr source, int sourceLen, int levelOfCompression, ref int v); + + [DllImport(libname, EntryPoint = "zipDecompressBuffer" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr zipDecompressBuffer(IntPtr source, int sourceLen, ref int v); + + [DllImport(libname, EntryPoint = "zipEX" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipEX( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outPath, IntPtr progress, IntPtr FileBuffer, int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + + + [DllImport(libname, EntryPoint = "zipEntry" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipEntry( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string arcFilename, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outpath, IntPtr FileBuffer,int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + + [DllImport(libname, EntryPoint = "zipEntryList" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipEntryList( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + IntPtr outpath, + IntPtr filename, int arrayLength, IntPtr FileBuffer,int fileBufferLength, IntPtr proc, [MarshalAs(UnmanagedType.LPStr)] string password); + + + [DllImport(libname, EntryPoint = "getEntryDateTime" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern uint getEntryDateTime( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string arcFilename, IntPtr FileBuffer,int fileBufferLength); + + //inMemory section + [DllImport(libname, EntryPoint = "freeMemStruct" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int freeMemStruct(IntPtr buffer); + + [DllImport(libname, EntryPoint = "zipCDMem" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern IntPtr zipCDMem(IntPtr info, IntPtr pnt, int levelOfCompression, IntPtr source, int sourceLen, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string fileName, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2 + ); + + + [DllImport(libname, EntryPoint = "initMemStruct" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr initMemStruct(); + + [DllImport(libname, EntryPoint = "initFileStruct" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr initFileStruct(); + + + [DllImport(libname, EntryPoint = "freeMemZ" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int freeMemZ(IntPtr pointer); + + [DllImport(libname, EntryPoint = "freeFileZ" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int freeFileZ(IntPtr pointer); + + + [DllImport(libname, EntryPoint = "zipCDMemStart" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr zipCDMemStart(IntPtr info, IntPtr pnt, IntPtr fileStruct, IntPtr memStruct); + + + [DllImport(libname, EntryPoint = "zipCDMemAdd" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int zipCDMemAdd(IntPtr zf, int levelOfCompression, IntPtr source, int sourceLen, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string fileName, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string comment, [MarshalAs(UnmanagedType.LPStr)] string password, bool useBz2 + ); + + [DllImport(libname, EntryPoint = "zipCDMemClose" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern IntPtr zipCDMemClose(IntPtr zf, IntPtr memStruct, IntPtr info, int err); + + + + //gzip section + [DllImport(libname, EntryPoint = "zipGzip" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int zipGzip(IntPtr source, int sourceLen, IntPtr outBuffer, int levelOfCompression, bool addHeader, bool addFooter); + + + + [DllImport(libname, EntryPoint = "zipUnGzip" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + + internal static extern int zipUnGzip(IntPtr source, int sourceLen, IntPtr outBuffer,int outLen, bool hasHeader, bool hasFooter); + + [DllImport(libname, EntryPoint = "zipUnGzip2" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int zipUnGzip2(IntPtr source, int sourceLen, IntPtr outBuffer, int outLen); + + [DllImport(libname, EntryPoint = "gzip_File" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int gzip_File( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string inFile, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outFile, int level, IntPtr progress, bool addHeader); + + [DllImport(libname, EntryPoint = "ungzip_File" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + internal static extern int ungzip_File( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string inFile, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outFile, IntPtr progress); + + // Send cancel signal to the following operations: + // - compress a single file + // - compress directory or list of files + // - extract a single file to the file system + // - extract a zip to the file system. + // - entry2Buffer + // - bz2/tar/gz file operations + // + // This function is useful when the zip operation is executed in a Thread. + [DllImport(libname, EntryPoint = "setCancel" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + )] + public static extern void setCancel(); + + + + [DllImport(libname, EntryPoint = "readTarA" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Ansi + #endif + )] + internal static extern int readTarA( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, IntPtr total); + + + + + [DllImport(libname, EntryPoint = "readTar" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Ansi + #endif + )] + internal static extern IntPtr readTar( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string zipArchive, int size, IntPtr unc); + + + + + [DllImport(libname, EntryPoint = "createTar" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Ansi + #endif + )] + + internal static extern int createTar( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outFile, IntPtr filePath, IntPtr filename, int arrayLength, IntPtr prog, IntPtr bprog + ); + + //int extractTar(char* inFile, char* outDir) + [DllImport(libname, EntryPoint = "extractTar" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Ansi + #endif + )] + + internal static extern int extractTar( + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string inFile, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outDir, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string entry, IntPtr prog, IntPtr bprog, bool fullPaths + ); + + + [DllImport(libname, EntryPoint = "bz2" + #if (UNITY_STANDALONE_WIN && ENABLE_IL2CPP) || UNITY_ANDROID + , CallingConvention = CallingConvention.Cdecl + #endif + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + , CharSet = CharSet.Auto + #endif + )] + internal static extern int bz2(bool decompress, int level, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string inFile, + #if (UNITY_STANDALONE_WIN || UNITY_EDITOR_WIN) + [MarshalAs(UnmanagedType.LPWStr)] + #endif + string outFile, IntPtr byteProgress + ); + +#endif +#endif + + // A reusable native memory pointer for downloading files. + public static IntPtr nativeBuffer = IntPtr.Zero; + public static bool nativeBufferIsBeingUsed = false; + public static int nativeOffset = 0; + + // Helper function + internal static GCHandle gcA(object o) { + return GCHandle.Alloc(o, GCHandleType.Pinned); + } + + + // Helper function + private static bool checkObject(object o, string zipArchive, ref int len, ref IntPtr ptr) { + if (o is IntPtr) { + len = Convert.ToInt32(zipArchive); + if (len <= 0) return false; + ptr = (IntPtr)o; + } else { + inMemory t = (inMemory)o; + len = t.info[0]; + ptr = t.pointer; + } + return true; + } + + + + + + // Lists get filled with filenames (including path if the file is in a folder) and uncompressed file sizes + // Call getFileInfo(string zipArchive, string path) to get them filled. After that you can iterate through them to get the info you want. + public static List ninfo = new List();//filenames + public static List uinfo = new List();//uncompressed file sizes + public static List cinfo = new List();//compressed file sizes + + // Local offset file header. (usefull when the STORE method is used to grab a file from the zip.) + // For archives with the STORE method you should add + 30 bytes + name.length extra offset. + public static List localOffset = new List(); + + public static int zipFiles, zipFolders;// global integers that store the number of files and folders in a zip file. + + // Global value of the compressed size of all the files in a zip archive. (gets updated when calling getFileinfo). + public static ulong totalCompressedSize; + + // Global value of the uncompressed size of all the files in a zip archive. (gets updated when calling getFileinfo). + public static ulong totalUncompressedSize; + + + + // This function fills the Lists with the filenames and file sizes that are in the zip file + // Returns : the total size of uncompressed bytes of the files in the zip archive + // + // zipArchive : the full path to the archive, including the archives name. (/myPath/myArchive.zip) + // fileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + // ERROR CODES : 0 = Input file not found or could not get info or fileBuffer didn't input correct zip file size. + // + public static UInt64 getFileInfo(string zipArchive, object fileBuffer = null) { + ninfo.Clear(); uinfo.Clear(); cinfo.Clear(); localOffset.Clear(); + zipFiles = 0; zipFolders = 0; + totalCompressedSize = 0; + totalUncompressedSize = 0; + + int res = 0; + + int[] tt = new int[1]; + var tb = gcA(tt); + + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipGetInfoA(null,tb.AddrOfPinnedObject(), fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { tb.Free(); return 0; } + res = zipGetInfoA(null,tb.AddrOfPinnedObject(), FileBuffer, fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipGetInfoA(@zipArchive, tb.AddrOfPinnedObject(),IntPtr.Zero, 0); + #endif + } + + tb.Free(); + + if (res <= 0) return 0; + + IntPtr uni = IntPtr.Zero; + + UInt64[] unc = new UInt64[tt[0]]; + UInt64[] comp = new UInt64[tt[0]]; + UInt64[] offs = new UInt64[tt[0]]; + + var uncb = gcA(unc); + var compb = gcA(comp); + var offsb = gcA(offs); + + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + uni = zipGetInfo(null, res, uncb.AddrOfPinnedObject(), compb.AddrOfPinnedObject(), offsb.AddrOfPinnedObject(), fbuf.AddrOfPinnedObject() ,FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { uncb.Free(); compb.Free(); offsb.Free(); return 0; } + + uni = zipGetInfo(null, res, uncb.AddrOfPinnedObject(), compb.AddrOfPinnedObject(), offsb.AddrOfPinnedObject(), FileBuffer ,fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + uni = zipGetInfo(@zipArchive, res, uncb.AddrOfPinnedObject(), compb.AddrOfPinnedObject(), offsb.AddrOfPinnedObject(), IntPtr.Zero, 0); + #endif + } + + if(uni == IntPtr.Zero) { uncb.Free(); compb.Free(); offsb.Free(); return 0; } + + string str = Marshal.PtrToStringAuto ( uni ); + StringReader r = new StringReader(str); + string line; + UInt64 sum = 0; + + for(int i=0; i 0) zipFiles++; else zipFolders++; + } + if (comp != null) { cinfo.Add(comp[i]); totalCompressedSize += comp[i]; } + if (offs != null) localOffset.Add(offs[i]); + } + + r.Close(); + r.Dispose(); + uncb.Free(); compb.Free(); offsb.Free(); + releaseBuffer(uni); + tt = null; + unc = null; + comp = null; + offs = null; + + totalUncompressedSize = sum; + return sum; + } + + + // This function returns the index of an entry assuming the getFileInfo function was called prior on a zip file. + // + // entry: the entry for which we want to get the index. + // Returns -1 if no entry was found in the List. + public static int getEntryIndex(string entry) { + if(ninfo == null || ninfo.Count == 0) return -1; + + int index = -1; + for(int i = 0; i < ninfo.Count; i++) { + if(entry == ninfo[i]) { index = i; break; } + } + + return index; + } + + // A function that returns the total number of files in a zip archive (files only, no folders). + // + // zipArchive : the zip to be checked + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + // ERROR CODES + // : -1 = failed to access zip archive + // : -3 = non valid zip size when using native file buffer + // : any number>0 = the number of files in the zip archive + // + public static int getTotalFiles(string zipArchive, object fileBuffer = null) { + int res = 0; + + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + + res = zipGetTotalFiles(null, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + + fbuf.Free(); + } + + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -3; + + res = zipGetTotalFiles(null, FileBuffer, fileBufferLength); + } + + return res; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipGetTotalFiles(@zipArchive, IntPtr.Zero, 0); + #endif + + return res; + } + + // A function that will return the total entries in a zip arcive. (files + folders) + // + // zipArchive : the zip to be checked + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + // ERROR CODES + // : -2 = failed to access zip archive + // : -3 = non valid zip size when using native file buffer + // : any number>0 = the number of entries in the zip archive + // + public static int getTotalEntries(string zipArchive, object fileBuffer = null) { + int res = 0; + + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipGetTotalEntries(null, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + + fbuf.Free(); + } + + + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -3; + + res = zipGetTotalEntries(null, FileBuffer, fileBufferLength); + } + + + return res; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipGetTotalEntries(@zipArchive, IntPtr.Zero, 0); + #endif + + return res; + } + + // A function that returns the uncompressed size of a file in a zip archive. + // + // zipArchive : the zip archive to get the info from. + // entry : the entry for which we want to know it uncompressed size. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + public static ulong getEntrySize(string zipArchive, string entry, object fileBuffer = null) { + ulong res = 0; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipGetEntrySize(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return 0; + res = zipGetEntrySize(null, entry, FileBuffer, fileBufferLength); + } + return res; + } + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipGetEntrySize(@zipArchive, entry, IntPtr.Zero, 0); + #endif + return res; + } + + + // A function that tells if an entry in zip archive exists. + // + // Returns true or false. + // + // zipArchive : the zip archive to get the info from. + // entry : the entry for which we want to know if it exists. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + public static bool entryExists(string zipArchive, string entry, object fileBuffer = null) { + bool res = false; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipEntryExists(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return false; + + res = zipEntryExists(null, entry, FileBuffer, fileBufferLength); + } + return res; + } + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipEntryExists(@zipArchive, entry, IntPtr.Zero, 0); + #endif + return res; + } + + + +#if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + + // set permissions of a file in user, group, other. + // Each string should contain any or all chars of "rwx". + // returns 0 on success + public static int setFilePermissions(string filePath, string _user, string _group, string _other){ + #if (UNITY_STANDALONE_OSX || UNITY_STANDALONE_LINUX || UNITY_ANDROID || UNITY_EDITOR_OSX || UNITY_EDITOR_LINUX || UNITY_IOS || UNITY_IPHONE) && !UNITY_EDITOR_WIN + return zsetPermissions(filePath, _user, _group, _other); + #else + return -1; + #endif + } + + // A function that compresses a byte buffer and writes it to a zip file. I you set the append flag to true, the output will get appended to an existing zip archive. + // + // levelOfCompression : (0-9) recommended 9 for maximum. (0 = Store method.) + // zipArchive : the full path to the zip archive to be created or append to. + // arcFilename : the name of the file that will be written to the archive. + // buffer : the buffer that will be compressed and will be put in the zip archive. + // append : set to true if you want the output to be appended to an existing zip archive. + // comment : an optional comment for this entry. + // password : an optional password to encrypt this entry. + // useBz2 : set to true if you want bz2 compression instead of zlib. (not available for MacOS/iOS/tvOS) + // + // ERROR CODES : true = success + // : false = failed + // + public static bool buffer2File(int levelOfCompression, string zipArchive, string arcFilename, byte[] buffer, bool append = false, string comment = null, string password = null, bool useBz2 = false + ) { + if (!append) { if (File.Exists(@zipArchive)) File.Delete(@zipArchive); } + var sbuf = gcA(buffer); + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 9) levelOfCompression = 9; + if(password == "") password = null; + if(comment == "") comment = null; + bool res = zipBuf2File(levelOfCompression, @zipArchive, arcFilename, sbuf.AddrOfPinnedObject(), buffer.Length, comment, password, useBz2); + sbuf.Free(); + return res; + } + + + // A function that deletes a file in a zip archive. It creates a temp file where the compressed data of the old archive is copied except the one that needs to be deleted. + // After that the old zip archive is deleted and the temp file gets renamed to the original zip archive. + // You can delete directories too if they are empty. Does not work on password protected archives. + // + // zipArchive : the full path to the zip archive + // arcFilename : the name of the file that will be deleted. + // + // ERROR CODES : 1 = success + // : -1 = failed to open zip + // : -2 = failed to locate the archive to be deleted in the zip file + // : -3 = error copying compressed data from original zip + // : -4 = failed to create temp zip file. + // + public static int delete_entry(string zipArchive, string arcFilename) { + string tmp = @zipArchive+".tmp"; + int res = zipDeleteFile(@zipArchive, @arcFilename, tmp); + + if(res>0) { + File.Delete(@zipArchive); + File.Move(tmp, @zipArchive); + }else { + if(File.Exists(tmp)) File.Delete(tmp); + } + + return res; + } + + + // A function that replaces an entry in a zip archive with a file that lies in a path. The original name of the archive will be used. Does not work on password protected archives. + // + // zipArchive : the full path to the zip archive + // arcFilename : the name of the file that will be replaced. + // newFilePath : a path to the file that will replace the original entry. + // level: : the level of compression of the new entry. (0 = Store method.) + // comment : add a comment for the file in the zip file header. + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // + // ERROR CODES + // : -1 = could not create or append + // : -2 = error during operation + // : -3 = failed to delete original entry + // + + public static int replace_entry(string zipArchive, string arcFilename, string newFilePath, int level = 9, string comment = null, string password = null, bool useBz2 = false) { + int res = delete_entry(@zipArchive, @arcFilename); + if(res < 0) return -3; + if(password == "") password = null; + if(comment == "") comment = null; + return zipCD(level, @zipArchive, newFilePath, @arcFilename, comment, password, useBz2, 0, IntPtr.Zero); + } + + // A function that replaces an entry in a zip archive with a buffer. The original name of the archive will be used. Does not work on password protected archives. + // + // zipArchive : the full path to the zip archive + // arcFilename : the name of the file that will be replaced. + // newFileBuffer : a byte buffer that will replace the original entry. + // level: : the level of compression of the new entry. (0 = Store method.) + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // + // ERROR CODES + // : 1 = success + // : -5 = failed to delete the original file + // : -6 = failed to append the buffer to the zip + + public static int replace_entry(string zipArchive, string arcFilename, byte[] newFileBuffer, int level = 9, string password = null, bool useBz2 = false) { + int res = delete_entry(@zipArchive, @arcFilename); + if(res<0) return -5; + + if( buffer2File(level, @zipArchive, @arcFilename, newFileBuffer, true, null, password, useBz2) ) return 1; else return - 6; + } + + + // A function that will extract only the specified file that resides in a zip archive. + // + // zipArchive : the full path to the zip archive from which we want to extract the specific file. + // arcFilename : the specific file we want to extract. (If the file resides in a directory, the directory path should be included. like dir1/dir2/myfile.bin) + // : --> on some zip files the internal dir structure uses \\ instead of / characters for directories separators. In that case use the appropriate + // : --> chars that will allow the file to be extracted. + // outpath : the full path to where the file should be extracted + the desired name for it. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // proc: : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the decompressed size of the file is reached.) + // password : if needed, the password to decrypt the entry. + // + // ERROR CODES : -1 = extraction failed + // : -2 = could not initialize zip archive. + // : -3 = could not locate entry + // : -4 = could not get entry info + // : -5 = password error + // : -6 = non valid zip size when using native file buffer + // : -7 = output directory does not exist or could not be created + // : 1 = success + // + public static int extract_entry(string zipArchive, string arcFilename, string outpath, object fileBuffer = null, ulong[] proc = null, string password = null) { + + if(!Directory.Exists( Path.GetDirectoryName(outpath) ) ) return -7; + + int res=-1; + if(proc == null) proc = new ulong[1]; + var pbuf = gcA(proc); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR || UNITY_STANDALONE_WIN) + if(fileBuffer != null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + + res = zipEntry(null, arcFilename, @outpath, fbuf.AddrOfPinnedObject(), FileBuffer.Length, pbuf.AddrOfPinnedObject(), password); + + fbuf.Free(); + + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -6; + + res = zipEntry(null, arcFilename, @outpath, FileBuffer, fileBufferLength, pbuf.AddrOfPinnedObject(), password); + } + + pbuf.Free(); + return res; + } + #endif + + res = zipEntry(@zipArchive, arcFilename, @outpath, IntPtr.Zero, 0, pbuf.AddrOfPinnedObject(), password); + + pbuf.Free(); + return res; + + } + + + // A function that will extract a list of entries from a zip file. + // + // zipArchive : the full path to the zip archive from which we want to extract the specific files. + // fileList[] : a string array list of the entries we want to exctract. + // outpath : the full path to where the entries should be extracted. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // proc : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the decompressed size of the file is reached.) + // password : if needed, the password to decrypt the entry. + // + // ERROR CODES : -2 = could not initialize zip archive. + // : -3 = fileList provided is null. + // : -4 = could not get entry info + // : -5 = password error + // : -6 = non valid zip size when using native file buffer + // : -7 = output directory does not exist or could not be created + // : 1 = success + // + public static int extract_entries(string zipArchive, string[] fileList, string outpath, object fileBuffer = null, ulong[] proc = null, string password = null) { + + string odir = @outpath.Replace("\\", "/"); + if(outpath.Substring(outpath.Length - 1) != "/") odir += "/"; + + if(!Directory.Exists( outpath )) Directory.CreateDirectory(@outpath); + if(!Directory.Exists( outpath )) return -7; + + if(fileList == null) return -3; + + int len = fileList.Length; + + string[] outFiles = new string[len]; + for(int i =0; i < len; i++) outFiles[i] = odir + fileList[i]; + + int res=-1; + if(proc == null) proc = new ulong[1]; + var pbuf = gcA(proc); + + IntPtr[] fp = new IntPtr[len]; + IntPtr[] op = new IntPtr[len]; + + for(int i = 0; i < len; i++) { + #if UNITY_2019_3_OR_NEWER + fp[i] = Marshal.StringToCoTaskMemAuto(fileList[i]); + op[i] = Marshal.StringToCoTaskMemAuto(outFiles[i]); + #else + fp[i] = Marshal.StringToHGlobalAuto(fileList[i]); + op[i] = Marshal.StringToHGlobalAuto(outFiles[i]); + #endif + } + + var faBuf = gcA(fp); + var ofBuf = gcA(op); + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR || UNITY_STANDALONE_WIN) + if(fileBuffer != null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + + res = zipEntryList(null, ofBuf.AddrOfPinnedObject(), faBuf.AddrOfPinnedObject(), len, fbuf.AddrOfPinnedObject(), FileBuffer.Length, pbuf.AddrOfPinnedObject(), password); + + fbuf.Free(); + + } + + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -6; + + res = zipEntryList(null, ofBuf.AddrOfPinnedObject(), faBuf.AddrOfPinnedObject(), len, FileBuffer, fileBufferLength, pbuf.AddrOfPinnedObject(), password); + } + + pbuf.Free(); + for (int i = 0; i < len; i++) { + #if UNITY_2019_3_OR_NEWER + Marshal.FreeCoTaskMem(fp[i]); + Marshal.FreeCoTaskMem(op[i]); + #else + Marshal.FreeHGlobal(fp[i]); + Marshal.FreeHGlobal(op[i]); + #endif + } + faBuf.Free(); fp = null; + ofBuf.Free(); op = null; + return res; + } + #endif + + res = zipEntryList(@zipArchive, ofBuf.AddrOfPinnedObject(), faBuf.AddrOfPinnedObject(), len, IntPtr.Zero, 0, pbuf.AddrOfPinnedObject(), password); + + pbuf.Free(); + for (int i = 0; i < len; i++) { + #if UNITY_2019_3_OR_NEWER + Marshal.FreeCoTaskMem(fp[i]); + Marshal.FreeCoTaskMem(op[i]); + #else + Marshal.FreeHGlobal(fp[i]); + Marshal.FreeHGlobal(op[i]); + #endif + } + faBuf.Free(); fp = null; + ofBuf.Free(); op = null; + return res; + } + + + + // A function that decompresses a zip file. If the zip contains directories, they will be created. + // + // zipArchive : the full path to the zip archive that will be decompressed. + // : In case we are going to pass an IntPtr as a file buffer, this parameter will be used as the length of the buffer passed to the function! + // outPath : the directory in which the zip contents will be extracted. If null the same path as the zip's path will be used. + // progress : a single item integer array that gets updated with the number of files decompressed. To use it in realtime, call + // : this function in a separate thread. Usefull for broad progress. Otherwise use the proc variable below. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // proc: : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the decompressed size of the files is reached.) + // password : if needed, the password to decrypt the archive. + // + // ERROR CODES + // : -1 = could not initialize zip archive. + // : -2 = failed extraction + // : -6 = IntPtr buffer had no valid buffer length parameter passed. + // : 1 = success + // + public static int decompress_File (string zipArchive, string outPath = null, int[] progress = null, object fileBuffer = null, ulong[] proc = null, string password = null) { + + // if outPath == null use the same path as the zips's path. + if(outPath == null) outPath = Path.GetDirectoryName(zipArchive); + + // make a check if the last '/' exists at the end of the exctractionPath and add it if it is missing + if (outPath.Substring(outPath.Length - 1, 1) != "/") { outPath += "/"; } + int res; + var ibuf = gcA(progress); + if(proc == null) proc = new ulong[1]; + var pbuf = gcA(proc); + + + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR || UNITY_STANDALONE_WIN) + + if(fileBuffer != null) { + // Managed buffer + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + + res = zipEX(null, @outPath, ibuf.AddrOfPinnedObject(), fbuf.AddrOfPinnedObject(), FileBuffer.Length, pbuf.AddrOfPinnedObject(), password); + fbuf.Free(); ibuf.Free(); pbuf.Free(); return res; + } + + // When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the IntPtr buffer! + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { ibuf.Free(); pbuf.Free(); return -6; } + + res = zipEX(null, @outPath, ibuf.AddrOfPinnedObject(), FileBuffer, fileBufferLength, pbuf.AddrOfPinnedObject(), password); + ibuf.Free(); pbuf.Free(); return res; + } + } + #endif + + res = zipEX(@zipArchive, @outPath, ibuf.AddrOfPinnedObject(), IntPtr.Zero, 0, pbuf.AddrOfPinnedObject(), password); + ibuf.Free(); pbuf.Free(); + return res; + } + + + + // A function that compresses a file to a zip file. If the flag append is set to true then it will get appended to an existing zip file. + // (This function is slow when appending many files. Use compress_File_List instead.) + // + // levelOfCompression : (0-9) recommended 9 for maximum (0 = Store method.) + // zipArchive : the full path to the zip archive that will be created + // inFilePath : the full path to the file that should be compressed and added to the zip file. + // append : set to true if you want the input file to get appended to an existing zip file. (if the zip file does not exist it will be created.) + // filename : if you want the name of your file to be different then the one it has, set it here. If you add a folder structure to it, + // like (dir1/dir2/myfile.bin) the directories will be created in the zip file. + // comment : add a comment for the file in the zip file header. + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // disksize : if a disksize is used > 0 then the zip archive will be split to the assigned disksize (in bytes). + // byteProgress : this variable is a single ulong array that keeps track of all the uncompressed bytes that have been processed. (set to 0 after finish). + // : To get a progress of the compression, store the sum of the files that will get zipped and compare it to byteProgress. + // ERROR CODES + // : 1 = success + // : -1 = could not create or append + // : -2 = error during operation + // + public static int compress_File(int levelOfCompression, string zipArchive, string inFilePath, bool append = false, string fileName = "", string comment = null, string password = null, bool useBz2 = false, int diskSize = 0, ulong[] byteProgress = null) { + if (!File.Exists(@inFilePath)) return -10; + if (!append) { if (File.Exists(@zipArchive)) File.Delete(@zipArchive); } + + if (fileName == null || fileName == "") fileName = Path.GetFileName(@inFilePath); + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 9) levelOfCompression = 9; + if (password == "") password = null; + if (comment == "") comment = null; + + int res = 0; + if(byteProgress == null) res = zipCD(levelOfCompression, @zipArchive, @inFilePath, fileName, comment, password, useBz2, diskSize, IntPtr.Zero); + else { + var prog = gcA(byteProgress); + res = zipCD(levelOfCompression, @zipArchive, @inFilePath, fileName, comment, password, useBz2, diskSize, prog.AddrOfPinnedObject()); + prog.Free(); + } + + return res; + } + + // A function that compresses a list of files to a zip file. Use this function to compress multiple files fast instead of appending to existing files with the compress_File function. + // + // levelOfCompression : (0-9) recommended 9 for maximum (0 = Store method.) + // zipArchive : the full path to the zip archive that will be created. + // inFilePath[] : an array of the full paths to the files that should be compressed and added to the zip file. + // progress : this var will increment until the number of the input files and this are equal. + // append : set to true if you want the input files to get appended to an existing zip file. (if the zip file does not exist it will be created.) + // filename[] : if you want the names of your files to be different then the one they have, set it here. If you add a folder structure to it, + // like (dir1/dir2/myfile.bin) the directories will be created in the zip file. + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // diskSize : if a disksize is used > 0 then the zip archive will be split to the assigned disksize (in bytes). + // byteProgress : this variable is a single ulong array that keeps track of all the uncompressed bytes that have been processed. (set to 0 after finish). + // : To get a progress of the compression, store the sum of the files that will get zipped and compare it to byteProgress. + // ERROR CODES + // : 1 = success + // : -1 = could not create or append + // : -2 = error during operation + // : -3 = file list is null + // : -4 = custom file names length does not match the original file names length + // : -10 = some or all input files are missing + public static int compress_File_List(int levelOfCompression, string zipArchive, string[] inFilePath, int[] progress = null, bool append = false, string[] fileName = null, string password = null, bool useBz2 = false, int diskSize = 0, ulong[] byteProgress = null) { + + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 9) levelOfCompression = 9; + if(password == "") password = null; + if (!append) { if (File.Exists(@zipArchive)) File.Delete(@zipArchive); } + + if (inFilePath == null) return -3; + + if(fileName !=null && fileName.Length != inFilePath.Length) return -4; + + for(int i=0; i 0 then the zip archive will be split to the assigned disksize (in bytes). + // append : set to true if you want the input files to get appended to an existing zip file. (if the zip file does not exist it will be created.) + // byteProgress : this variable is a single ulong array that keeps track of all the uncompressed bytes that have been processed. (set to 0 after finish). + // : To get a progress of the compression, store the sum of the files that will get zipped and compare it to byteProgress. + // + // If you want to get the progress of compression, call the getAllFiles function to get the total number of files + // in a directory and its subdirectories. The compressDir when called from a separate thread will update the progress[0] provided parameter. + // Divide this with the total number of files (as floats) and you have the % of the procedure. + // + // ERROR CODES + // : 1 = success + // : -1 = could not create or append + // : -2 = error during operation + // + + public static int compressDir(string sourceDir, int levelOfCompression, string zipArchive = null, bool includeRoot = false, int[] progress = null, string password = null, bool useBz2 = false, int diskSize = 0, bool append = false, ulong[] byteProgress = null) { + if(!Directory.Exists(sourceDir)) return 0; + + string fdir = @sourceDir.Replace("\\", "/"); + if(sourceDir.Substring(sourceDir.Length - 1) != "/") fdir += "/"; + + if(zipArchive == null) zipArchive = sourceDir.Substring(0, sourceDir.Length) + ".zip"; + + int totalFiles = getAllFiles(fdir); + if (totalFiles == 0) return 0; + + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 9) levelOfCompression = 9; + + int res = 0; + + if(Directory.Exists(fdir)) { + List inFilePath = new List(); + List fileName = new List(); + + fillLists(fdir, includeRoot, ref inFilePath, ref fileName); + + res = compress_File_List(levelOfCompression, zipArchive, inFilePath.ToArray(), progress, append, fileName.ToArray(), password, useBz2, diskSize, byteProgress); + + inFilePath.Clear(); inFilePath = null; + fileName.Clear(); fileName = null; + } + + return res; + } + + + private static void fillPointers(string outFile, string[] fileName, string[] inFilePath, ref IntPtr[] fp, ref IntPtr[] np) { + string[] fna = null; + string path = Path.GetDirectoryName(@outFile); + + if(fileName == null) { + fna = new string[inFilePath.Length]; + for(int i = 0; i < inFilePath.Length; i++) { fna[i] = inFilePath[i].Replace(path, ""); } + } else { + fna = fileName; + } + + for(int i = 0; i < inFilePath.Length; i++) { if(fna[i] == null) fna[i] = inFilePath[i].Replace(path, ""); } + + for(int i = 0; i < inFilePath.Length; i++) { + inFilePath[i] = inFilePath[i].Replace("\\", "/"); + fna[i] = fna[i].Replace("\\", "/"); + + #if UNITY_2019_3_OR_NEWER + fp[i] = Marshal.StringToCoTaskMemAuto(inFilePath[i]); + np[i] = Marshal.StringToCoTaskMemAuto(fna[i]); + #else + fp[i] = Marshal.StringToHGlobalAuto(inFilePath[i]); + np[i] = Marshal.StringToHGlobalAuto(fna[i]); + #endif + } + + path = null; + } + + private static void fillLists(string fdir, bool includeRoot, ref List inFilePath, ref List fileName) { + string[] ss = fdir.Split('/'); + string rdir = ss[ss.Length - 1]; + string root = rdir; + + if(ss.Length > 1 && includeRoot) root = rdir = ss[ss.Length - 2] + "/"; + + foreach (string f in Directory.GetFiles(fdir, "*", SearchOption.AllDirectories)) { + string s = f.Replace(fdir, rdir).Replace("\\", "/").Replace("//", "/"); + if (!includeRoot) { + s = s.Substring(root.Length); + if(s.Substring(0, 1) == "/") s = s.Substring(1, s.Length-1); + } + inFilePath.Add(f); + fileName.Add(s); + } + } + + // Use this function to get the total files of a directory and its subdirectories. + public static int getAllFiles(string dir) { + string[] filePaths = Directory.GetFiles(@dir, "*", SearchOption.AllDirectories); + int res = filePaths.Length; + filePaths = null; + return res; + } + + // Use this function to get the size of a file in the file system. + public static long getFileSize(string file) { + FileInfo fi = new FileInfo(file); + if(fi.Exists) return fi.Length; else return 0; + } + + // Use this function to get the size of the files in a directory. + public static ulong getDirSize(string dir) { + string[] filePaths = Directory.GetFiles(@dir, "*", SearchOption.AllDirectories); + ulong size = 0; + for(int i = 0; i < filePaths.Length; i++) { + FileInfo fi = new FileInfo(filePaths[i]); + if(fi.Exists) size += (ulong)fi.Length; + } + return size; + } + + //--------------------------------------------------------------------------------------------------------------------------- + // TAR SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + // Untar a .tar archive + // + // inFile : the full path to the tar archive. + // outPath : the path where the extraction will take place. If null, the same path as the one of the inFile will be used. + // progress : a single item integer array that will get updated with the number of the entries that get extracted. Use in a Thread for real time report. + // byteProgress : a single item ulong array that will get updated with the bytes that have been extracted so far. Use in a Thread for real time report. + // + // Error codes : -1 could not find input file. + // : -3 could not write output file. + // : -8 canceled + // : 1 Success + + public static int tarExtract(string inFile, string outPath = null, int[] progress = null, ulong[] byteProgress = null) { + + if(outPath == null) outPath = Path.GetDirectoryName(inFile); + if (outPath.Substring(outPath.Length - 1, 1) != "/") { outPath += "/"; } + + var prog = gcA(progress); + var bProg = gcA(byteProgress); + + int res = 0; + + res = extractTar(inFile, outPath, null, prog.AddrOfPinnedObject(), bProg.AddrOfPinnedObject(), true); + + prog.Free(); bProg.Free(); + + return res; + } + + // Extract an entry from a tar archive + // + // inFile : the full path to our tar archive + // entry : the entry we want to extract. (If the file resides in a directory, the directory path should be included. like dir1/dir2/myfile.bin) + // outPath : the path in which want to extract our entry. If null the same path as the inFile will be used. + // fullPaths : if the entry resides in a directory, use this flag to create the directory structure or not. + // ! If it is set to false, you can use an absolute path in the outPath parameter to extract with a different filename ! + // byteProgress : a sigle item ulong array that will get updated with the bytes of the extraction progress. Use in a Thread for real time report. + // + // Error codes : -1 could not find input file. + // : -3 could not write output file. + // : -5 could not find entry + // : -8 canceled + // : 1 Success + + public static int tarExtractEntry(string inFile, string entry, string outPath = null, bool fullPaths = true, ulong[] byteProgress = null) { + + if(outPath == null) outPath = Path.GetDirectoryName(inFile); + if (fullPaths && outPath.Substring(outPath.Length - 1, 1) != "/") { outPath += "/"; } + if(fullPaths && File.Exists(outPath)) { Debug.Log("There is a file with the same name in the path!"); return -7; } + if(!fullPaths && Directory.Exists(outPath)) { Debug.Log("There is a directory with the same name in the path!"); return -8; } + + var bProg = gcA(byteProgress); + int res = 0; + + res = extractTar(inFile, outPath, entry, IntPtr.Zero, bProg.AddrOfPinnedObject(), fullPaths); + + bProg.Free(); + + return res; + } + + // Create a tar file out of a directory containing files. + // + // sourceDir : the directory that contains our files + // outFile : the full path to the tar archive that will be created. If null the same name as the sourceDir will be used. + // includeRoot : if the root directory should be included in the filenames. + // progress : a single item integer array that will increment with each file added to the tar archive. Use in a Thread for real time report. + // byteProgress : a sigle item ulong array that will get updated with the bytes that get added to the tar archive. Call the function in a thread to get real time progress. + // + // Error codes : -1 could not write output file. + // : -3 could not find input file. + // : -8 canceled + // : 1 Success + // : 0 no files found in Dir. + + public static int tarDir(string sourceDir, string outFile = null, bool includeRoot = false, int[] progress = null, ulong[] byteProgress = null) { + if(!Directory.Exists(sourceDir)) return 0; + + string fdir = @sourceDir.Replace("\\", "/"); + if(sourceDir.Substring(sourceDir.Length - 1) != "/") fdir += "/"; + + if(outFile == null) outFile = sourceDir.Substring(0,sourceDir.Length - 1) + ".tar"; + + int totalFiles = getAllFiles(fdir); + if (totalFiles == 0) return 0; + + int res = 0; + + if(Directory.Exists(fdir)) { + List inFilePath = new List(); + List fileName = new List(); + + fillLists(fdir, includeRoot, ref inFilePath, ref fileName); + + res = tarList(outFile, inFilePath.ToArray(), fileName.ToArray(), progress, byteProgress); + + inFilePath.Clear(); inFilePath = null; + fileName.Clear(); fileName = null; + } + + return res; + + } + + // This function creates a tar archive from a list of file paths provided. + // + // outFile : the full path to the tar archive that will be created. + // inFilePath[] : an array of the full paths to the files that should be added to the tar archive. + // fileName[] : if you want the names of your files to be different then the one they have, set it here. + // progress : this var will increment until the number of the input files and this are equal. Use in a Thread for real time report. + // byteProgress : this variable is a single ulong array that keeps track of all the bytes that have been processed. Use in a Thread for real time report. + // + // + // Error codes : -1 could not write output file. + // : -3 could not find input file. + // : -4 input files number different than filenames number + // : -8 canceled + // : -10 an input file was not found. + // : 1 Success + + public static int tarList(string outFile, string[] inFilePath, string[] fileName = null, int[] progress = null, ulong[] byteProgress = null) { + if (inFilePath == null) return -3; + + if(fileName !=null && fileName.Length != inFilePath.Length) return -4; + + for(int i=0; i 0) zipFiles++; else zipFolders++; + } + } + + r.Close(); + r.Dispose(); + uncb.Free(); + releaseBuffer(uni); + tt = null; + unc = null; + + totalUncompressedSize = sum; + return sum; + } + + //--------------------------------------------------------------------------------------------------------------------------- + // END TAR SECTION + //--------------------------------------------------------------------------------------------------------------------------- + +#endif + + // get the DateTime of an entry in a zip archive + // + // zipArchive : the full path to the zip archive from which we want to extract the specific file. + // entry : the specific entry we want to get the DateTime of. (If the entry resides in a directory, the directory path should be included. like dir1/dir2/myfile.bin) + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the zipArchive path. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // + // Returns the date and time of the entry in DateTime format. + // + + public static DateTime entryDateTime(string zipArchive, string entry, object fileBuffer = null) { + uint dosDateTime = 0; + + if (fileBuffer != null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + dosDateTime = getEntryDateTime(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { Debug.Log("Error in getting DateTime: " + dosDateTime); return DateTime.Now; } + dosDateTime = getEntryDateTime(null, entry, FileBuffer, fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + dosDateTime = getEntryDateTime(zipArchive, entry, IntPtr.Zero, 0); + #endif + } + + var date = (dosDateTime & 0xFFFF0000) >> 16; + var time = (dosDateTime & 0x0000FFFF); + + var year = (date >> 9) + 1980; + var month = (date & 0x01e0) >> 5; + var day = date & 0x1F; + var hour = time >> 11; + var minute = (time & 0x07e0) >> 5; + var second = (time & 0x1F) * 2; + + if (dosDateTime == 0 || dosDateTime == 1 || dosDateTime == 2) { Debug.Log("Error in getting DateTime: " + dosDateTime); return DateTime.Now; } + + return new DateTime((int)year, (int)month, (int)day, (int)hour, (int)minute, (int)second); + } + + + + + //--------------------------------------------------------------------------------------------------------------------------- + // In Memory Functions + //--------------------------------------------------------------------------------------------------------------------------- + + // The inMemory class the holds the pointer to our in memory zip archive. + // Use the size() function to get the size of the memory it occupies. + // The getZipBuffer() function returns a new byte[] buffer that contains the inmemory zip. + // + public class inMemory + { + public IntPtr pointer = IntPtr.Zero; + + public IntPtr zf = IntPtr.Zero; + public IntPtr memStruct = IntPtr.Zero; + public IntPtr fileStruct = IntPtr.Zero; + + public int[] info = new int[3]; + + public int lastResult = 0; + + // A bool that tells if an inMemory zip archive is open or closed. (Used with the low level functions only.) + public bool isClosed = true; + + public int size() { return info[0]; } + + public IntPtr memoryPointer() { return pointer; } + + public byte[] getZipBuffer() { + if (pointer != IntPtr.Zero && info[0] > 0 ) { + byte [] p = new byte[ info[0] ]; + Marshal.Copy(pointer, p, 0, info[0]); + return p; + } else { + return null; + } + } + } + + // Use this function to free the pointer and the object of the inMemory zip archive. + // It is important to call this function after you don't need the in memory zip any more! + // + public static void free_inmemory(inMemory t) { + if(t.info == null) { Debug.Log("inMemory object is null"); return; } + if(freeMemStruct(t.pointer) != 1) Debug.Log("In memory pointer was not freed"); + t.info = null; + if(t.memStruct != IntPtr.Zero && freeMemZ(t.memStruct) != 1) Debug.Log("MemStruct was not freed"); + if(t.fileStruct != IntPtr.Zero && freeFileZ(t.fileStruct) != 1) Debug.Log("FileStruct was not freed"); + t = null; + } + + + // Low level inMemory functions ---------------------------------------------------------------------------------------------------- + + // A function that creates an inMemory zip archive + // + // t : the inMemory class that holds the pointer to our inMemory zip file. You can call this function again for more buffers with the same + // : inMemory object and the next buffers will get appended to the in memory zip. + // + // Returns true on success. + public static bool inMemoryZipStart(inMemory t) { + if(t.info == null) { Debug.Log("inMemory object is null"); return false; } + if(t.fileStruct == IntPtr.Zero) t.fileStruct = initFileStruct(); + if(t.memStruct == IntPtr.Zero) t.memStruct = initMemStruct(); + if(!t.isClosed) inMemoryZipClose(t); + + var inf = gcA(t.info); + + t.zf = zipCDMemStart(inf.AddrOfPinnedObject(), t.pointer, t.fileStruct, t.memStruct); + + inf.Free(); + t.isClosed = false; + + if(t.zf != IntPtr.Zero) return true; else return false; + } + + // A function that adds a buffer as a zip entry in an opened inMemory zip archive with the inMemoryZipStart function. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // levelOfCompression : (0-9) recommended 9 for maximum (0 = Store method.) + // buffer : The byte[] buffer that should be added to the zip. + // filename : The name of the file added. If you add a folder structure to it, + // like (dir1/dir2/myfile.bin) the directories will be created in the zip file. + // comment : add a comment for the file in the zip file header. + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // + // Returns 0 on success. + public static int inMemoryZipAdd(inMemory t, int levelOfCompression, byte[] buffer, string fileName, string comment = null, string password = null, bool useBz2 = false) { + if(t.info == null) { Debug.Log("inMemory object is null"); return -1; } + if (t.isClosed) { Debug.Log("Can't add entry. inMemory zip is closed."); return -2; } + if (password == "") password = null; + if (comment == "") comment = null; + if (fileName == null) fileName = ""; + + var fbuf = gcA(buffer); + + int res = zipCDMemAdd(t.zf, levelOfCompression, fbuf.AddrOfPinnedObject(), buffer.Length, fileName, comment, password, useBz2); + + fbuf.Free(); + t.lastResult = res; + + return res; + } + + // A function to close the inMemory zip archive that has been created with the inMemoryZipStart function. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // + // If t.lastResult is different then 0 a null pointer will get returned. + // + public static IntPtr inMemoryZipClose(inMemory t) { + if(t.info == null) { Debug.Log("inMemory object is null"); return IntPtr.Zero; } + if (t.isClosed) { Debug.Log("Can't close zip. inMemory zip is closed."); return t.pointer; } + var inf = gcA(t.info); + + t.pointer = zipCDMemClose(t.zf, t.memStruct, inf.AddrOfPinnedObject(), t.lastResult); + + inf.Free(); + t.isClosed = true; + + return t.pointer; + } + + // End low level inMemory functions ------------------------------------------------------------------------------------------------ + + + // A function that compresses a buffer to an inMemory zip file. Appending using this function can be slow. Use the low level functions for way faster proccessing. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. You can call this function again for more buffers with the same + // : inMemory object and the next buffers will get appended to the in memory zip. + // levelOfCompression : (0-9) recommended 9 for maximum (0 = Store method.) + // buffer : The byte[] buffer that should be added to the zip. + // filename : The name of the file added. If you add a folder structure to it, + // like (dir1/dir2/myfile.bin) the directories will be created in the zip file. + // comment : add a comment for the file in the zip file header. + // password : set the password to protect this file. + // useBz2 : use the bz2 compression algorithm. If false the zlib deflate algorithm will be used. (not available for MacOS/iOS/tvOS) + // + /// Although the inMemory t.pointer gets internally updated, the function returns an IntPtr of the inMemory zip file buffer. + /// So to check if the operation was successful, check if the pointer returned is a non IntPtr.Zero pointer. + public static IntPtr compress_Buf2Mem(inMemory t, int levelOfCompression, byte[] buffer, string fileName, string comment = null, string password = null, bool useBz2 = false) { + if(t.info == null) { Debug.Log("inMemory object is null"); return IntPtr.Zero; } + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 9) levelOfCompression = 9; + if (password == "") password = null; + if (comment == "") comment = null; + if (fileName == null) fileName = ""; + + if (buffer == null || buffer.Length == 0) { Debug.Log("Buffer was null or zero size !"); return t.pointer; } + + var fbuf = gcA(buffer); + var inf = gcA(t.info); + + t.pointer = zipCDMem(inf.AddrOfPinnedObject(), t.pointer, levelOfCompression, fbuf.AddrOfPinnedObject(), buffer.Length, fileName, comment, password, useBz2); + + fbuf.Free(); + inf.Free(); + + return t.pointer; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + // A function that decompresses a zip file from an inMemory pointer. If the zip contains directories, they will be created. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // outPath : the directory in which the zip contents will be extracted. + // progress : a single item integer array that increments with the archives that have been extracted. To use it in realtime, call + // : this function in a separate thread. + // proc: : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the compressed size of the file is reached.) + // password : if needed, the password to decrypt the archive. + // + // ERROR CODES + // : -1 = could not initialize zip archive. + // : -2 = failed extraction + // : 1 = success + // + public static int decompress_Mem2File(inMemory t, string outPath, int[] progress = null, ulong[] proc = null, string password = null) { + if(t.info == null) { Debug.Log("inMemory object is null"); return -1; } + //make a check if the last '/' exists at the end of the exctractionPath and add it if it is missing + if (outPath.Substring(outPath.Length - 1, 1) != "/") { outPath += "/"; } + int res = 0; + var ibuf = gcA(progress); + if(progress == null) progress = new int[1]; + if (proc == null) proc = new ulong[1]; + var pbuf = gcA(proc); + + if (t != null) { + res = zipEX(null, @outPath, ibuf.AddrOfPinnedObject(), t.pointer, t.info[0], pbuf.AddrOfPinnedObject(), password); + + ibuf.Free(); pbuf.Free(); return res; + } else return 0; + } + #endif + + // A function that will decompress a file from an inmemory zip file pointer directly in a provided byte buffer. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included.) + // buffer : a referenced byte buffer that will be resized and will be filled with the extraction data. + // password : If the archive is encrypted use a password. + // + // ERROR CODES : 1 = success + // : -2 = could not find/open zip file + // : -3 = could not locate entry + // : -4 = could not get entry info + // : -5 = password error + // : -18 = the entry has no size + // : -104 = internal memory error + // + public static int entry2BufferMem(inMemory t, string entry, ref byte[] buffer, string password = null) { + if(t.info == null) return -2; + + int siz = 0; + if (password == "") password = null; + if (t != null) siz = (int)zipGetEntrySize(null, entry, t.pointer, t.info[0]); + + if (siz <= 0) return -18; + if(buffer == null) buffer = new byte[0]; + Array.Resize(ref buffer, (int)siz); + var sbuf = gcA(buffer); + + int res = 0; + if (t != null) res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), (int)siz, t.pointer, t.info[0], password); + sbuf.Free(); + + return res; + } + + // A function that will decompress a file from an inmemory zip file pointer to a new created and returned byte buffer. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included. + // password : If the archive is encrypted use a password. + // + // ERROR CODES : non-null = success + // : null = failed + // + public static byte[] entry2BufferMem(inMemory t, string entry, string password = null) { + if(t.info == null) return null; + int siz = 0; + if (password == "") password = null; + if (t != null) siz = (int)zipGetEntrySize(null, entry, t.pointer, t.info[0]); + + if (siz <= 0) return null; + byte[] buffer = new byte[siz]; + var sbuf = gcA(buffer); + + int res = 0; + if (t != null) res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), (int)siz, t.pointer, t.info[0], password); + + sbuf.Free(); + + if (res != 1) return null; + else return buffer; + } + + + // A function that will decompress a file from an inmemory zip file pointer directly to a provided fixed size byte buffer. + // + // Returns the uncompressed size of the entry. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included.) + // buffer : a referenced fixed size byte buffer that will be filled with the extraction data. It should be large enough to store the data. + // password : if the archive is encrypted use a password. + // + // ERROR CODES : 1 = success + // : -2 = could not find/open zip archive + // : -3 = could not locate entry + // : -4 = could not get entry info + // : -5 = password error + // : -18 = the entry has no size + // : -19 = the fixed size buffer is not big enough to store the uncompressed data + // : -104 = internal memory error + // + public static int entry2FixedBufferMem(inMemory t, string entry, ref byte[] fixedBuffer, string password = null) { + if(t.info == null) return -2; + int siz = 0; + if (password == "") password = null; + if (t != null) siz = (int)zipGetEntrySize(null, entry, t.pointer, t.info[0]); + + if (siz <= 0) return -18; + + if (fixedBuffer.Length < (int)siz) return -19; + + var sbuf = gcA(fixedBuffer); + + int res = 0; + if (t != null) res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, t.pointer, t.info[0], password); + + sbuf.Free(); + + if (res != 1) return res; + + return siz; + } + + // This function fills the Lists with the filenames and file sizes that are in the inMemory zip file. + // Returns : the total size of uncompressed bytes of the files in the zip archive. + // + // t : the inMemory class that holds the pointer to our inMemory zip file. + // + // ERROR CODES : 0 = Input file not found or Could not get info + // + public static UInt64 getFileInfoMem(inMemory t) { + if(t.info == null) return 0; + ninfo.Clear(); uinfo.Clear(); cinfo.Clear(); localOffset.Clear(); + zipFiles = 0; zipFolders = 0; + totalCompressedSize = 0; + totalUncompressedSize = 0; + + int res = 0; + int[] tt = new int[1]; + var tb = gcA(tt); + + if (t != null) res = zipGetInfoA(null, tb.AddrOfPinnedObject(), t.pointer, t.info[0]); + tb.Free(); + + if (res <= 0) return 0; + + IntPtr uni = IntPtr.Zero; + + UInt64[] unc = new UInt64[tt[0]]; + UInt64[] comp = new UInt64[tt[0]]; + UInt64[] offs = new UInt64[tt[0]]; + + var uncb = gcA(unc); + var compb = gcA(comp); + var offsb = gcA(offs); + + if (t != null) uni = zipGetInfo(null, res, uncb.AddrOfPinnedObject(), compb.AddrOfPinnedObject(), offsb.AddrOfPinnedObject(), t.pointer, t.info[0]); + + if (uni == IntPtr.Zero) { uncb.Free(); compb.Free(); offsb.Free(); return 0; } + + string str = Marshal.PtrToStringAuto(uni); + StringReader r = new StringReader(str); + + string line; + UInt64 sum = 0; + + for (int i = 0; i < tt[0]; i++) { + if ((line = r.ReadLine()) != null) ninfo.Add(line); + if (unc != null) { + uinfo.Add(unc[i]); + sum += unc[i]; + if (unc[i] > 0) zipFiles++; else zipFolders++; + } + if (comp != null) { cinfo.Add(comp[i]); totalCompressedSize += comp[i]; } + if (offs != null) localOffset.Add(offs[i]); + } + + r.Close(); + r.Dispose(); + uncb.Free(); compb.Free(); offsb.Free(); + releaseBuffer(uni); + tt = null; + unc = null; + comp = null; + offs = null; + + totalUncompressedSize = sum; + + return sum; + } + + //--------------------------------------------------------------------------------------------------------------------------- + // End in Memory Functions + //--------------------------------------------------------------------------------------------------------------------------- + + + // A function that will decompress a file in a zip archive directly to a provided byte buffer. + // + // zipArchive : the full path to the zip archive from which a specific file will be extracted to a byte buffer. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included.) + // buffer : a referenced byte buffer that will be resized and will be filled with the extraction data. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // password : If the archive is encrypted use a password. + // + // ERROR CODES : 1 = success + // : -2 = could not find/open zip archive + // : -3 = could not locate entry + // : -4 = could not get entry info + // : -5 = password error + // : -6 = non valid zip size when using native file buffer + // : -18 = the entry has no size + // : -104 = internal memory error + // + public static int entry2Buffer(string zipArchive, string entry, ref byte[] buffer, object fileBuffer = null, string password = null) { + + int siz = 0; + if(password == "") password = null; + if(fileBuffer != null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + siz = (int)zipGetEntrySize(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -6; + siz = (int)zipGetEntrySize(null, entry, FileBuffer, fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + siz = (int)zipGetEntrySize( @zipArchive, entry, IntPtr.Zero, 0); + #endif + } + + if (siz <= 0) return -18; + + Array.Resize(ref buffer, siz); + + var sbuf = gcA(buffer); + + int res = 0; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, fbuf.AddrOfPinnedObject(), FileBuffer.Length, password); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { sbuf.Free(); return -6; } + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, FileBuffer, fileBufferLength, password); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipEntry2Buffer( @zipArchive, entry, sbuf.AddrOfPinnedObject(), siz, IntPtr.Zero, 0, password); + #endif + } + + sbuf.Free(); + + return res; + } + + // A function that will decompress a file in a zip archive directly to a provided fixed size byte buffer. + // + // Returns the uncompressed size of the entry. + // + // zipArchive : the full path to the zip archive from which a specific file will be extracted to a byte buffer. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included.) + // buffer : a referenced fixed size byte buffer that will be filled with the extraction data. It should be large enough to store the data. + // FileBuffer : a buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // password : if the archive is encrypted use a password. + // + // ERROR CODES : number of extracted bytes = success + // : -2 = could not find/open zip archive + // : -3 = could not locate entry + // : -4 = could not get entry info + // : -5 = password error + // : -6 = non valid zip size when using native file buffer + // : -18 = the entry has no size + // : -19 = the fixed size buffer is not big enough to store the uncompressed data + // : -104 = internal memory error + // + public static int entry2FixedBuffer(string zipArchive, string entry, ref byte[] fixedBuffer, object fileBuffer = null, string password = null) { + + int siz = 0; + if(password == "") password = null; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + siz = (int)zipGetEntrySize(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return -6; + siz = (int)zipGetEntrySize(null, entry, FileBuffer, fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + siz = (int)zipGetEntrySize( @zipArchive, entry, IntPtr.Zero, 0); + #endif + } + + if (siz <= 0) return -18; + + if(fixedBuffer.Length < siz) return -19; + + var sbuf = gcA(fixedBuffer); + + int res = 0; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, fbuf.AddrOfPinnedObject(), FileBuffer.Length, password); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { sbuf.Free(); return -6; } + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, FileBuffer, fileBufferLength, password); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipEntry2Buffer( @zipArchive, entry, sbuf.AddrOfPinnedObject(), siz, IntPtr.Zero, 0, password); + #endif + } + + sbuf.Free(); + + if(res != 1) return res; + + return siz; + } + + + // A function that will decompress a file in a zip archive to a new created and returned byte buffer. + // + // zipArchive : the full path to the zip archive from which a specific file will be extracted to a byte buffer. + // entry : the file we want to extract to a buffer. (If the file resides in a directory, the directory should be included. + // FileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // password : If the archive is encrypted use a password. + // + // ERROR CODES : non-null = success + // : null = failed + // + public static byte[] entry2Buffer(string zipArchive, string entry, object fileBuffer = null, string password = null) { + int siz = 0; + if(password == "") password = null; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + siz = (int)zipGetEntrySize(null, entry, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return null; + siz = (int)zipGetEntrySize(null, entry, FileBuffer, fileBufferLength); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + siz = (int)zipGetEntrySize( @zipArchive, entry, IntPtr.Zero, 0); + #endif + } + + if (siz <= 0) return null; + + byte[] buffer = new byte[siz]; + + var sbuf = gcA(buffer); + + int res = 0; + if(fileBuffer!= null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, fbuf.AddrOfPinnedObject(), FileBuffer.Length, password); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) { sbuf.Free(); return null; } + res = zipEntry2Buffer(null, entry, sbuf.AddrOfPinnedObject(), siz, FileBuffer, fileBufferLength, password); + } + } else { + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipEntry2Buffer( @zipArchive, entry, sbuf.AddrOfPinnedObject(), siz, IntPtr.Zero, 0, password); + #endif + } + + sbuf.Free(); + if (res != 1) return null; + else return buffer; + } + + + // A function that will validate a zip archive. + // + // zipArchive : the zip to be checked + // fileBuffer : A buffer that holds a zip file. When assigned the function will read from this buffer and will ignore the filePath. + // : Can be a c# byte[] buffer or an unmanaged Inptr buffer or an inMemory class! When an IntPtr is used, then the zipArchive string parameter will be used to pass the Length of the Intptr buffer! + // ERROR CODES + // + // : true. The archive is ok. + // : false. The archive could not be validated. + // + public static bool validateFile(string zipArchive, object fileBuffer = null) { + bool res = false; + + if(fileBuffer != null) { + if (fileBuffer is byte[]) { + byte[] FileBuffer = (byte[])fileBuffer; + var fbuf = gcA(FileBuffer); + res = zipValidateFile(null, fbuf.AddrOfPinnedObject(), FileBuffer.Length); + fbuf.Free(); + } + if (fileBuffer is IntPtr || fileBuffer is inMemory) { + IntPtr FileBuffer = IntPtr.Zero; + int fileBufferLength = 0; + if (!checkObject(fileBuffer, zipArchive, ref fileBufferLength, ref FileBuffer)) return false; + res = zipValidateFile(null, FileBuffer, fileBufferLength); + } + return res; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + res = zipValidateFile(@zipArchive, IntPtr.Zero, 0); + #endif + + return res; + } + + // --------------------------------------------------------------------------------------------------------------------------------- + // + // Hidden/merged zip and zipInfo functions + // + // --------------------------------------------------------------------------------------------------------------------------------- + + // a struct to store zip entry information + public struct zipInfo{ + public short VersionMadeBy; + public short MinimumVersionToExtract; + public short BitFlag; + public short CompressionMethod; + public short FileLastModificationTime; + public short FileLastModificationDate; + public int CRC; + public int CompressedSize; + public int UncompressedSize; + public short DiskNumberWhereFileStarts; + public short InternalFileAttributes; + public int ExternalFileAttributes; + public int RelativeOffsetOfLocalFileHeader; + public int AbsoluteOffsetOfLocalFileHeaderStore; + public string filename; + public string extraField; + public string fileComment; + }; + + // a list that will be filled with info of all the zip archive entries. + public static List zinfo; + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + // This function is used to get extended info of the entries in a zip archive in the file system. + // Use this as an alternative function to get zip info with more information about entries. + // For now it does not work with zip64. + // Returns true on success. + public static bool getZipInfo(string fileName) { + + if (!File.Exists(fileName)) { Debug.Log("File not found: "+ fileName); return false; } + + int pos =0, size = 0; + + using (var file = File.OpenRead(fileName)) { + using (var reader = new BinaryReader(file)) { + if (findPK(reader)) { + int entryCount = findEnd(reader, ref pos, ref size); + if (entryCount > 0) { + getCentralDir(reader, entryCount); + return true; + } else { + Debug.Log("No Entries in zip"); + return false; + } + } + } + } + return false; + } + + // Get position, size and/or entry info of a zip archive in the file system. + // This function is mainly useful to discover a zip archive hidden or merged in another bigger archive. + // filename: the path to the archive. + // ref pos: the position in bytes of the zip archive. + // ref size: the size of the zip archive. + // If getCentralDirectory is set to true it will fill the zinfo List with extended entry information. + // For now it does not work with zip64. + // Returns true on success. + public static bool getZipInfoMerged(string fileName, ref int pos, ref int size, bool getCentralDirectory = false) { + + if (!File.Exists(fileName)) { Debug.Log("File not found: "+ fileName); return false; } + + using (var file = File.OpenRead(fileName)) { + using (var reader = new BinaryReader(file)) { + if (findPK(reader)) { + int entryCount = findEnd(reader, ref pos, ref size); + if (entryCount > 0) { + if(getCentralDirectory) getCentralDir(reader, entryCount); + return true; + } else { + Debug.Log("No Entries in zip"); + return false; + } + } + } + } + return false; + } + #endif + + // Get position, size and/or entry info of a zip archive in a buffer. + // This function is mainly useful to discover a zip archive hidden or merged in another bigger buffer. + // buffer: the buffer where the merged zip archive resides. + // ref pos: the position in bytes of the zip archive. + // ref size: the size of the zip archive. + // If getCentralDirectory is set to true it will fill the zinfo List with extended entry information. + // For now it does not work with zip64. + // Returns true on success. + public static bool getZipInfoMerged(byte[] buffer, ref int pos, ref int size, bool getCentralDirectory = false) { + + if (buffer == null) { Debug.Log("Buffer is null"); return false; } + + using (var file = new MemoryStream(buffer)) { + using (var reader = new BinaryReader(file)) { + if (findPK(reader)) { + int entryCount = findEnd(reader, ref pos, ref size); + if (entryCount > 0) { + if (getCentralDirectory) getCentralDir(reader, entryCount); + return true; + } else { + Debug.Log("No Entries in zip"); + return false; + } + } + } + } + return false; + } + + // This function is used to get extended info of the entries in a zip archive in a buffer. + // buffer: the buffer where the merged zip archive resides. + // For now it does not work with zip64. + // Returns true on success. + public static bool getZipInfoMerged(byte[] buffer) { + + if (buffer == null) { Debug.Log("Buffer is null"); return false; } + + int pos =0, size = 0; + + using (var file = new MemoryStream(buffer)) { + using (var reader = new BinaryReader(file)) { + if (findPK(reader)) { + int entryCount = findEnd(reader, ref pos, ref size); + if (entryCount > 0) { + getCentralDir(reader, entryCount); + return true; + } else { + Debug.Log("No Entries in zip"); + return false; + } + } + } + } + return false; + } + + // Find Central directory position + private static bool findPK(BinaryReader reader) { + + var p = reader.ReadByte(); + bool res = false; + int i = 0; + + while (reader.BaseStream.Position < reader.BaseStream.Length-3) { + i++; + + if (p == 0x50) { + if(reader.ReadByte() == 0x4b && reader.ReadByte() == 0x05 && reader.ReadByte() == 0x06) { reader.BaseStream.Seek(reader.BaseStream.Position - 4, 0); res = true; break; } + else{ reader.BaseStream.Seek(i, 0);} + } + p = reader.ReadByte(); + } + return res; + } + + // Read central directory basics and find position and size of the zip archive in stream. Returns entry count. + private static int findEnd(BinaryReader reader, ref int pos, ref int size) { + + long origin = reader.BaseStream.Position; + + int result = 0; + while (result == 0 && reader.BaseStream.Position < reader.BaseStream.Length) { + + var b = reader.ReadByte(); + + while (b != 0x50 ) { + if (reader.BaseStream.Position < reader.BaseStream.Length) + b = reader.ReadByte(); + else + break; + } + + if (reader.BaseStream.Position >= reader.BaseStream.Length) break; + + if (reader.ReadByte() == 0x4b && reader.ReadByte() == 0x05 && reader.ReadByte() == 0x06) { + + /*int diskNumber =*/ reader.ReadInt16(); + /*int centralDirectoryStartDiskNumber =*/ reader.ReadInt16(); + /*int centralDirectoryCount =*/ reader.ReadInt16(); + int centralDirectoryTotal = reader.ReadInt16(); + result = centralDirectoryTotal; + int centralDirectorySize = reader.ReadInt32(); + int centralDirectoryOffset = reader.ReadInt32(); + + int commentLength = reader.ReadInt16(); + + reader.ReadBytes(commentLength); + //string comment = Encoding.UTF8.GetString(reader.ReadBytes(commentLength)); + + pos = (int)reader.BaseStream.Position - (centralDirectoryOffset + centralDirectorySize + 22); + size = (int)reader.BaseStream.Position - pos; + + reader.BaseStream.Seek(pos + centralDirectoryOffset, 0); + break; + } + } + return result; + } + + // Read info for each entry in the zip archive and store it in zinfo List. + private static void getCentralDir(BinaryReader reader, int count) { + + if(zinfo != null && zinfo.Count > 0) zinfo.Clear(); + + zinfo = new List(); + + for (int i = 0; i < count; i++) { + var magic = reader.ReadInt32(); + + if (magic == 0x02014b50) { + zipInfo z = new zipInfo(); + + z.VersionMadeBy = reader.ReadInt16(); + z.MinimumVersionToExtract = reader.ReadInt16(); + z.BitFlag = reader.ReadInt16(); + z.CompressionMethod = reader.ReadInt16(); + z.FileLastModificationTime = reader.ReadInt16(); + z.FileLastModificationDate = reader.ReadInt16(); + z.CRC = reader.ReadInt32(); + z.CompressedSize = reader.ReadInt32(); + z.UncompressedSize = reader.ReadInt32(); + short fileNameLength = reader.ReadInt16(); + short extraFieldLength = reader.ReadInt16(); + short fileCommentLength = reader.ReadInt16(); + z.DiskNumberWhereFileStarts = reader.ReadInt16(); + z.InternalFileAttributes = reader.ReadInt16(); + z.ExternalFileAttributes = reader.ReadInt32(); + z.RelativeOffsetOfLocalFileHeader = reader.ReadInt32(); + z.filename = Encoding.UTF8.GetString(reader.ReadBytes(fileNameLength)); + z.AbsoluteOffsetOfLocalFileHeaderStore = z.RelativeOffsetOfLocalFileHeader + 30 + z.filename.Length; + var extra = reader.ReadBytes(extraFieldLength); + z.extraField = Encoding.ASCII.GetString(extra); + z.fileComment = Encoding.UTF8.GetString(reader.ReadBytes(fileCommentLength)); + + zinfo.Add(z); + } + } + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + // Get the merged zip archive in a file system archive as a byte buffer and provide postion and size. + // filePath: the path to the archive. + // ref position: the position in bytes of the zip archive. + // ref size: the size of the zip archive. + public static byte[] getMergedZip(string filePath, ref int position, ref int siz) { + int pos = 0, size = 0; + if (!File.Exists(filePath)) return null; + + getZipInfoMerged(filePath, ref pos, ref size); + + position = pos; siz = size; + if(size == 0) return null; + + byte[] tempBuffer = new byte[size]; + + using (var file = File.OpenRead(filePath)) { + using (var reader = new BinaryReader(file)) { + reader.BaseStream.Seek(pos, SeekOrigin.Begin); + reader.Read(tempBuffer, 0, size); + } + } + + return tempBuffer; + } + + // Get the merged zip archive in a file system archive as a byte buffer. + // filePath: the path to the archive. + public static byte[] getMergedZip(string filePath) { + int pos = 0, size = 0; + if (!File.Exists(filePath)) return null; + + getZipInfoMerged(filePath, ref pos, ref size); + if(size == 0) return null; + + byte[] tempBuffer = new byte[size]; + + using (var file = File.OpenRead(filePath)) { + using (var reader = new BinaryReader(file)) { + reader.BaseStream.Seek(pos, SeekOrigin.Begin); + reader.Read(tempBuffer, 0, size); + } + } + + return tempBuffer; + } + #endif + + // Get the merged zip archive in a buffer as a byte buffer. + // buffer: the buffer where the zip archive resides. + // ref position: the position in bytes of the zip archive. + // ref size: the size of the zip archive. + public static byte[] getMergedZip(byte[] buffer, ref int position, ref int siz) { + int pos = 0, size = 0; + + if (buffer == null) return null; + + getZipInfoMerged(buffer, ref pos, ref size); + + position = pos; siz = size; + + if(size == 0) return null; + + byte[] tempBuffer = new byte[size]; + + using (var file = new MemoryStream(buffer)) { + using (var reader = new BinaryReader(file)) { + reader.BaseStream.Seek(pos, SeekOrigin.Begin); + reader.Read(tempBuffer, 0, size); + } + } + + return tempBuffer; + } + // Get the merged zip archive in a buffer as a byte buffer. + // buffer: the buffer where the zip archive resides. + public static byte[] getMergedZip(byte[] buffer) { + int pos = 0, size = 0; + if (buffer == null) return null; + + getZipInfoMerged(buffer, ref pos, ref size); + if(size == 0) return null; + byte[] tempBuffer = new byte[size]; + + using (var file = new MemoryStream(buffer)) { + using (var reader = new BinaryReader(file)) { + reader.BaseStream.Seek(pos, SeekOrigin.Begin); + reader.Read(tempBuffer, 0, size); + } + } + + return tempBuffer; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + // A function that extracts all contents of a zip file that is merged in another file in the file system, to disk. + // file : the path to the file where the zip archive resides. + // outPath : the directory in which the zip contents will be extracted. + // progress : provide a single item integer array to write the current index of the file getting extracted. To use it in realtime, call + // : this function in a separate thread. + // proc: : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the compressed size of the file is reached.) + // password : if needed, the password to decrypt the archive. + // ERROR CODES + // : -1 = could not initialize zip archive. + // : -2 = failed extraction + // : 1 = success + public static int decompressZipMerged(string file, string outPath, int[] progress = null, ulong[] proc = null, string password = null) { + + if (!File.Exists(file)) return 0; + outPath = outPath.Replace("//", "/"); + + if (!Directory.Exists(outPath)) Directory.CreateDirectory(outPath); + + int pos = 0, size = 0, res = 0; + + var tempBuffer = getMergedZip(file, ref pos, ref size); + + if(tempBuffer != null) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(tempBuffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() ); + t2.info[0] = size; + + res = decompress_Mem2File(t2, outPath, progress, proc, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tempBuffer = null; + } + return res; + } + + // A function that extracts all contents of a merged zip file that resides in a buffer to disk. + // buffer : the buffer where the zip archive resides. + // outPath : the directory in which the zip contents will be extracted. + // progress : a single item integer array that increments with the archives that have been extracted. To use it in realtime, call + // : this function in a separate thread. + // proc: : a single item ulong array that gets updated with the progress of the decompression in bytes. + // (100% is reached when the compressed size of the file is reached.) + // password : if needed, the password to decrypt the archive. + // ERROR CODES + // : -1 = could not initialize zip archive. + // : -2 = failed extraction + // : 1 = success + public static int decompressZipMerged(byte[] buffer, string outPath, int[] progress = null, ulong[] proc = null, string password = null) { + + if (buffer == null) return 0; + outPath = outPath.Replace("//", "/"); + if (!Directory.Exists(outPath)) Directory.CreateDirectory(outPath); + + int pos = 0, size = 0, res = 0; + + if( getZipInfoMerged(buffer, ref pos, ref size)) { + + inMemory t2 = new inMemory(); + + var pinnedArray = gcA(buffer); + + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() + pos); + t2.info[0] = size; + + res = decompress_Mem2File(t2, outPath, progress, proc, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + } + + return res; + } + + private static void writeFile(byte[] tb, string entry, string outPath, string overrideEntryName, ref int res) { + if(tb != null) { + string fn; + + if(overrideEntryName == null){ + if(entry.Contains("/")) { + string[] fileName = entry.Split('/'); + fn = fileName[fileName.Length-1]; + } else{ + fn = entry; + } + } else { + fn = overrideEntryName; + } + File.WriteAllBytes(outPath + "/" + fn, tb); + res = 1; + } else { + Debug.Log("Could not extract entry."); + } + } + + // Extract an entry from a merged zip that resides in the file system to disk. + // Returns 1 on success. + // + // file : the path to the file where the zip archive resides. + // entry : the entry to extract. + // outPath : the path where the entry will be extracted. + // overrideEntryName : with this you can override the default entry name. + // password : if needed, the password to decrypt the archive. + public static int entry2FileMerged(string file, string entry, string outPath, string overrideEntryName = null, string password = null) { + + if (!File.Exists(file)) return -10; + outPath = outPath.Replace("//", "/"); + + int pos = 0, size = 0, res = 0; + + var tempBuffer = getMergedZip(file, ref pos, ref size); + + if(tempBuffer != null) { + + inMemory t2 = new inMemory(); + var pinnedArray = gcA(tempBuffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() ); + t2.info[0] = size; + + var tb = entry2BufferMem(t2, entry, password); + pinnedArray.Free(); + + writeFile(tb, entry, outPath, overrideEntryName, ref res); + + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tempBuffer = null; + tb = null; + } + + return res; + } + + + // Extract an entry from a merged zip that resides in a buffer to disk. + // Returns 1 on success. + // + // buffer : the buffer where the zip archive resides. + // entry : the entry to extract. + // outPath : the path where the entry will be extracted. + // overrideEntryName : with this you can override the default entry name. + // password : if needed, the password to decrypt the archive. + public static int entry2FileMerged(byte[] buffer, string entry, string outPath, string overrideEntryName = null, string password = null) { + + if (buffer == null) return -10; + + outPath = outPath.Replace("//", "/"); + + int pos = 0, size = 0, res = 0; + + if( getZipInfoMerged(buffer, ref pos, ref size)) { + + inMemory t2 = new inMemory(); + + var pinnedArray = gcA(buffer); + + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() + pos); + t2.info[0] = size; + + var tb = entry2BufferMem(t2, entry, password); + pinnedArray.Free(); + + writeFile(tb, entry, outPath, overrideEntryName, ref res); + + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tb = null; + } + + return res; + } + + + // A function that extracts an entry from a zip archive that is merged/hidden in the file system and returns the extracted data in a new buffer. + // + // file : the path to the file where the zip archive resides. + // entry : the entry to extract. + // password : if needed, the password to decrypt the archive. + public static byte[] entry2BufferMerged(string file, string entry, string password = null) { + + if (!File.Exists(file)) return null; + + int pos = 0, size = 0; + + var tempBuffer = getMergedZip(file, ref pos, ref size); + + if(tempBuffer != null) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(tempBuffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64()); + t2.info[0] = size; + + var res = entry2BufferMem(t2, entry, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tempBuffer = null; + return res; + } + return null; + } + + // A function that extracts an entry from a zip archive that is merged/hidden in the file system and returns the extracted data in a referenced buffer that will get resized to fit the data. + // + // file : the path to the file where the zip archive resides. + // entry : the entry to extract. + // refBuffer : the referenced buffer that will get resized to store the decompressed data. + // password : if needed, the password to decrypt the archive. + public static int entry2BufferMerged(string file, string entry, ref byte[] refBuffer, string password = null) { + + if (!File.Exists(file)) return 0; + + int pos = 0, size = 0; + + var tempBuffer = getMergedZip(file, ref pos, ref size); + + if(tempBuffer != null) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(tempBuffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64()); + t2.info[0] = size; + + var res = entry2BufferMem(t2, entry,ref refBuffer, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tempBuffer = null; + return res; + } + return 0; + } + + // A function that extracts an entry from a zip archive that is merged/hidden in the file system and writes the extracted data in a fixed size buffer. + // + // file : the path to the file where the zip archive resides. + // entry : the entry to extract. + // fixedBuffer : the fixed sized buffer where the data will be written. + // password : if needed, the password to decrypt the archive. + public static int entry2FixedBufferMerged(string file, string entry, ref byte[] fixedBuffer, string password = null) { + + if (!File.Exists(file)) return 0; + + int pos = 0, size = 0; + + var tempBuffer = getMergedZip(file, ref pos, ref size); + + if(tempBuffer != null) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(tempBuffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64()); + t2.info[0] = size; + + int res = entry2FixedBufferMem(t2, entry, ref fixedBuffer, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + tempBuffer = null; + return res; + } + return 0; + } + #endif + + // A function that extracts an entry from a zip archive that is merged/hidden in a buffer and returns the extracted data in a new buffer. + // + // buffer : the buffer where the zip archive resides. + // entry : the entry to extract. + // password : if needed, the password to decrypt the archive. + public static byte[] entry2BufferMerged(byte[] buffer, string entry, string password = null) { + + if (buffer == null) return null; + + int pos = 0, size = 0; + + if( getZipInfoMerged(buffer, ref pos, ref size)) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(buffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() + pos); + t2.info[0] = size; + + var res = entry2BufferMem(t2, entry, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + return res; + } + return null; + } + + // A function that extracts an entry from a zip archive that is merged/hidden in a buffer and returns the extracted data in a referenced buffer that will get resized to fit the data. + // + // buffer : the buffer where the zip archive resides. + // entry : the entry to extract. + // refBuffer : the referenced buffer that will get resized to store the decompressed data. + // password : if needed, the password to decrypt the archive. + public static int entry2BufferMerged(byte[] buffer, string entry, ref byte[] refBuffer, string password = null) { + + if (buffer == null) return 0; + + int pos = 0, size = 0; + + if( getZipInfoMerged(buffer, ref pos, ref size)) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(buffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() + pos); + t2.info[0] = size; + + var res = entry2BufferMem(t2, entry, ref refBuffer, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + return res; + } + return 0; + } + + // A function that extracts an entry from a zip archive that is merged/hidden in a buffer and writes the extracted data in a fixed size buffer. + // Returns the size of the uncompressed data. + // + // buffer : the buffer where the zip archive resides. + // entry : the entry to extract. + // fixedBuffer : the fixed sized buffer where the data will be written. + // password : if needed, the password to decrypt the archive. + // ERROR CODES + // : -1 = could not initialize zip archive. + // : -2 = failed extraction + // : 1 = success + public static int entry2FixedBufferMerged(byte[] buffer, string entry, ref byte[] fixedBuffer, string password = null) { + + if (buffer == null) return 0; + + int pos = 0, size = 0; + + if( getZipInfoMerged(buffer, ref pos, ref size)) { + inMemory t2 = new inMemory(); + var pinnedArray = gcA(buffer); + t2.pointer = new IntPtr(pinnedArray.AddrOfPinnedObject().ToInt64() + pos); + t2.info[0] = size; + + int res = entry2FixedBufferMem(t2, entry, ref fixedBuffer, password); + + pinnedArray.Free(); + t2.info = null; + t2.pointer = IntPtr.Zero; + t2 = null; + return res; + } + return 0; + } + // --------------------------------------------------------------------------------------------------------------------------------- + // + // END hidden/merged zip and zipInfo functions + // + // --------------------------------------------------------------------------------------------------------------------------------- + + + //--------------------------------------------------------------------------------------------------------------------------- + // ZLIB BUFFER SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + // A function that compresses a byte buffer to a zlib stream compressed buffer. Provide a reference buffer to write to. This buffer will be resized. + // + // source : the input buffer + // outBuffer : the referenced output buffer + // levelOfCompression : (0-10) recommended 9 for maximum (10 is highest but slower and not zlib compatible) + // + // ERROR CODES : true = success + // : false = failed + // + public static bool compressBuffer(byte[] source, ref byte[] outBuffer, int levelOfCompression) { + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 10) levelOfCompression = 10; + + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipCompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, levelOfCompression, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return false; } + + Array.Resize(ref outBuffer, siz); + Marshal.Copy(ptr, outBuffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return true; + } + + + // same as the compressBuffer function, only this function will put the result in a fixed size buffer to avoid memory allocations. + // the compressed size is returned so you can manipulate it at will. + // + // safe: if set to true the function will abort if the compressed resut is larger the the fixed size output buffer. + // Otherwise compressed data will be written only until the end of the fixed output buffer. + // + public static int compressBufferFixed(byte[] source, ref byte[] outBuffer, int levelOfCompression, bool safe = true) { + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 10) levelOfCompression = 10; + + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipCompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, levelOfCompression, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return 0; } + + if (siz>outBuffer.Length) { + if(safe) { sbuf.Free(); releaseBuffer(ptr); return 0; } else { siz = outBuffer.Length; } + } + + Marshal.Copy(ptr, outBuffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return siz; + } + + + // A function that compresses a byte buffer to a zlib stream compressed buffer. Returns a new buffer with the compressed data. + // + // source : the input buffer + // levelOfCompression : (0-10) recommended 9 for maximum (10 is highest but slower and not zlib compatible) + // + // ERROR CODES : a valid byte buffer = success + // : null = failed + // + public static byte[] compressBuffer(byte[] source, int levelOfCompression) { + if (levelOfCompression < 0) levelOfCompression = 0; if (levelOfCompression > 10) levelOfCompression = 10; + + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipCompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, levelOfCompression, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return null; } + + byte[] buffer = new byte[siz]; + Marshal.Copy(ptr, buffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return buffer; + } + + + // A function that decompresses a zlib compressed buffer to a referenced outBuffer. The outbuffer will be resized. + // + // source : a zlib compressed buffer. + // outBuffer : a referenced out buffer provided to extract the data. This buffer will be resized to fit the uncompressed data. + // + // ERROR CODES : true = success + // : false = failed + // + public static bool decompressBuffer(byte[] source, ref byte[] outBuffer) { + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipDecompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return false; } + + Array.Resize(ref outBuffer, siz); + Marshal.Copy(ptr, outBuffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return true; + } + + + // same as the decompressBuffer function. Only this one outputs to a buffer of fixed which size isn't resized to avoid memory allocations. + // The fixed buffer should have a size that will be able to hold the incoming decompressed data. + // Returns the uncompressed size. + // + // safe: if set to true the function will abort if the decompressed resut is larger the the fixed size output buffer. + // Otherwise decompressed data will be written only until the end of the fixed output buffer. + // + public static int decompressBufferFixed(byte[] source, ref byte[] outBuffer, bool safe = true) { + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipDecompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return 0; } + + if (siz>outBuffer.Length) { + if(safe) { sbuf.Free(); releaseBuffer(ptr); return 0; } else { siz = outBuffer.Length; } + } + + Marshal.Copy(ptr, outBuffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return siz; + } + + + // A function that decompresses a zlib compressed buffer and creates a new buffer. Returns a new buffer with the uncompressed data. + // + // source : a zlib compressed buffer. + // + // ERROR CODES : a valid byte buffer = success + // : null = failed + // + public static byte[] decompressBuffer(byte[] source) { + var sbuf = gcA(source); + IntPtr ptr; + int siz = 0; + + ptr = zipDecompressBuffer(sbuf.AddrOfPinnedObject(), source.Length, ref siz); + + if (siz == 0 || ptr == IntPtr.Zero) { sbuf.Free(); releaseBuffer(ptr); return null; } + + byte[] buffer = new byte[siz]; + Marshal.Copy(ptr, buffer, 0, siz); + + sbuf.Free(); + releaseBuffer(ptr); + + return buffer; + } + //--------------------------------------------------------------------------------------------------------------------------- + // END ZLIB BUFFER SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + + //--------------------------------------------------------------------------------------------------------------------------- + // GZIP SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + // compress a byte buffer to gzip format. + // + // returns the size of the compressed buffer. + // + // source: the uncompressed input buffer. + // outBuffer: the provided output buffer where the compressed data will be stored (it should be at least the size of the input buffer +18 bytes). + // level: the level of compression (0-10). (0 = Store method.) + // addHeader: if a gzip header should be added. (recommended if you want to write out a gzip file) + // addFooter: if a gzip footer should be added. (recommended if you want to write out a gzip file) + // overrideDateTimeWithLength: use the bytes 5-8 of the header to store the gzip length instead of DateTime modification. This is useful when you want to know the + // compressed size of a gzip buffer. Then use the gzipCompressedSize function to get this size. + public static int gzip(byte[] source, byte[] outBuffer, int level, bool addHeader = true, bool addFooter = true, bool overrideDateTimeWithLength = false) { + if(source == null || outBuffer == null) return 0; + var sbuf = gcA(source); + var dbuf = gcA(outBuffer); + + if(level < 0) level = 0; if(level > 10) level = 10; + + int res = zipGzip(sbuf.AddrOfPinnedObject(), source.Length, dbuf.AddrOfPinnedObject(), level, addHeader, addFooter); + + sbuf.Free(); dbuf.Free(); + int hf = 0; + if(addHeader) hf += 10; + if(addFooter) hf += 8; + + int compressedSize = res + hf; + + if(addHeader && overrideDateTimeWithLength) { + outBuffer[4] = (byte)(((uint)compressedSize >> 0) & 0xff); + outBuffer[5] = (byte)(((uint)compressedSize >> 8) & 0xff); + outBuffer[6] = (byte)(((uint)compressedSize >> 16) & 0xff); + outBuffer[7] = (byte)(((uint)compressedSize >> 24) & 0xff); + // use the operating system flag to mark this gzip that it holds the compressed data size. + outBuffer[9] = 0xfe; + } + return compressedSize; + } + + + // get the uncompressed size from a gzip buffer that has a footer included + // + // source: the gzip compressed input buffer. (it should have at least a gzip footer) + public static int gzipUncompressedSize(byte[] source) { + if (source == null) return 0; + int res = source.Length; + uint size = ((uint)source[res-4] & 0xff) | + ((uint)source[res-3] & 0xff) << 8 | + ((uint)source[res-2] & 0xff) << 16 | + ((uint)source[res-1]& 0xff) << 24; + return (int)size; + } + + // get the compressed size of a gzip, if the compressed size of it has been written in the date header bytes and marked as such, with the gzip function above. + // + // source: the gzip compressed input buffer. + public static int gzipCompressedSize(byte[] source, int offset = 0) { + if (source == null) return 0; + + if(source[offset + 9] != 0xfe) { + Debug.Log("Gzip has not been marked to have compressed size stored."); + return 0; + } + + int res = offset + 8; + + uint size = ((uint)source[res-4] & 0xff) | + ((uint)source[res-3] & 0xff) << 8 | + ((uint)source[res-2] & 0xff) << 16 | + ((uint)source[res-1]& 0xff) << 24; + return (int)size; + } + + // find where the merged gzip starts in a buffer. + // + // buffer: a memory buffer that has a gzip merged at the end of it. + public static int findGzStart(byte[] buffer) { + if(buffer == null) return 0; + int res = 0; + int i = 0; + + while (i < buffer.Length - 2) { + if (buffer[i] == 0x1f) { + if(buffer[i+1] == 0x8b && buffer[i+2] == 0x08 ) { res = i; break; } + } + i++; + } + return res; + } + + // decompress a gzip buffer + // + // returns: uncompressed size. negative error code on error. + // + // source: the gzip compressed input buffer. + // outBuffer: the provided output buffer where the uncompressed data will be stored. + // hasHeader: if the buffer has a header. + // hasFooter: if the buffer has a footer. + // + public static int unGzip(byte[] source, byte[] outBuffer, bool hasHeader = true, bool hasFooter = true) { + if(source == null || outBuffer == null) return 0; + var sbuf = gcA(source); + var dbuf = gcA(outBuffer); + + int res = zipUnGzip( sbuf.AddrOfPinnedObject(), source.Length, dbuf.AddrOfPinnedObject(), outBuffer.Length, hasHeader, hasFooter ); + + sbuf.Free(); dbuf.Free(); + return res; + } + + // decompress a gzip buffer (This function assumes that the gzip buffer has a gzip header !!!) + // + // returns: uncompressed size. negative error code on error. -11 when a native pointer is passed as source and no source length defined. + // + // source: the gzip compressed input buffer. It can be a managed byte[] buffer or a native/unmanaged IntPtr buffer. + // outBuffer: the provided output buffer where the uncompressed data will be stored. + // intPtrLength: when passing an IntPtr pointer as the input gzip, we need to pass the size of this buffer to the function. Not needed for byte[] source gz. + // + public static int unGzip2(object source, byte[] outBuffer, int intPtrLength = 0) { + if(source == null || outBuffer == null) return 0; + + int res = 0; + + if (source is byte[]) { + byte[] Source = (byte[])source; + var sbuf = gcA(Source); + var dbuf = gcA(outBuffer); + res = zipUnGzip2( sbuf.AddrOfPinnedObject(), Source.Length, dbuf.AddrOfPinnedObject(), outBuffer.Length ); + sbuf.Free(); dbuf.Free(); + } + if (source is IntPtr && intPtrLength > 0) { + IntPtr Source = (IntPtr)source; + var dbuf = gcA(outBuffer); + res = zipUnGzip2( Source, intPtrLength, dbuf.AddrOfPinnedObject(), outBuffer.Length ); + dbuf.Free(); + } else { return -11; } + return res; + } + + // decompress a gzip buffer that is merged in the end of a buffer (This function assumes that the gzip buffer has a gzip header !!!) + // + // returns: uncompressed size. negative error code on error. + // + // source: the buffer where the gzip compressed input buffer resides. (at the end of it, or anywhere if you know the length of it) + // offset: the offset in bytes where the gzip starts. + // bufferLength: the length of the gzip buffer. + // outBuffer: the provided output buffer where the uncompressed data will be stored. + // + public static int unGzip2Merged(byte[] source, int offset, int bufferLength, byte[] outBuffer) { + if(source == null || outBuffer == null) return 0; + if(bufferLength == 0 ) return 0; + + var sbuf = gcA(source); + var dbuf = gcA(outBuffer); + + IntPtr p = new IntPtr(sbuf.AddrOfPinnedObject().ToInt64() + offset); + + int res = zipUnGzip2( p, bufferLength, dbuf.AddrOfPinnedObject(), outBuffer.Length ); + + sbuf.Free(); dbuf.Free(); + return res; + } + + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + + // Create a gzip file in the file system. + // + // returns 1 on success. -8 when canceled. + // + // inFile : the input file to compress. + // outFile : the output path of the created gzip. If null, the input file + ".gz" will be used. + // level : level of compression (1 - 10). + // progress : a ulong single item array that will report how many bytes have been processed. It should equal the uncompressed size. + // addHeader : if gzip header and footer should be added. If set to false the gzip can still be extracted but not opened from other decompression apps. + // + // error codes : -10 could not open input file + // : -11 could not write output file + // : -1 general error + // : -8 canceled. (Make sure you delete the canceled gz file) + public static int gzipFile(string inFile, string outFile = null, int level = 9, ulong[] progress = null, bool addHeader = true) { + int res = -1; + if(level < 1) level = 1; if(level > 10) level = 10; + + if(outFile == null) outFile = inFile + ".gz"; + + if(progress != null) { + var prog = gcA(progress); + res = gzip_File(@inFile.Replace("//", "/"), @outFile.Replace("//", "/"), level, prog.AddrOfPinnedObject(), addHeader); + prog.Free(); + } else { + res = gzip_File(@inFile.Replace("//", "/"), @outFile.Replace("//", "/"), level, IntPtr.Zero, addHeader); + } + + if(res == 0) return 1; else return res; + } + + // Decompress a gzip file + // + // returns 1 on success. -8 when canceled. + // + // inFile : the gzip file to extract. + // outFile : the output path of the extracted file. If null, the original name will be used. + // progress : a ulong single item array that will report how many bytes have been processed. It should equal the compressed size of the gz file. + // + // error codes : -11 could not open input file + // : -12 could not write output file + // : -3 error reading gz file + // : -4 error writing output + // : -8 canceled. (Make sure you delete the canceled output file) + public static int ungzipFile(string inFile, string outFile = null, ulong[] progress = null) { + int res = -1; + + if(outFile == null) { + if(inFile.Substring(inFile.Length -3, 3).ToLower() != ".gz") { Debug.Log("Input file does not have a .gz extension"); return -2; } + outFile = inFile.Substring(0, inFile.Length -3); + } + + if(progress != null) { + var prog = gcA(progress); + res = ungzip_File(@inFile.Replace("//", "/"), @outFile.Replace("//", "/"), prog.AddrOfPinnedObject()); + prog.Free(); + } else { + res = ungzip_File(@inFile.Replace("//", "/"), @outFile.Replace("//", "/"), IntPtr.Zero); + } + return res; + } + +#endif + //--------------------------------------------------------------------------------------------------------------------------- + // END GZIP SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + + //--------------------------------------------------------------------------------------------------------------------------- + // START BZ2 SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + // Create a bz2 file in the file system. + // + // returns 1 on success. + // + // inFile: the input file to compress. + // outFile: the output path of the created bz2. If null, the input file + ".bz2" will be used. + // level: level of compression (0 - 9). + // progress: a ulong single item array that will report how many bytes have been processed. It should equal the uncompressed size. + // + // error codes : 1 success + // : -3 could not read input file + // : -4 could not create output file + // : -8 canceled + #if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + public static int bz2Create(string inFile, string outFile = null, int level = 9, ulong[] byteProgress = null) { + int res = -10; + + if(outFile == null) outFile = inFile + ".bz2"; + + if(byteProgress != null) { + var prog = gcA(byteProgress); + res = bz2(false, level, @inFile.Replace("//", "/"), @outFile.Replace("//", "/"), prog.AddrOfPinnedObject()); + prog.Free(); + } else { + res = bz2(false, level, @inFile.Replace("//", "/"), @outFile.Replace("//", "/"), IntPtr.Zero); + } + + return res; + } + + // Decompress a bz2 file + // + // returns 1 on success. + // + // inFile : the bz2 file to extract. + // outFile : the output path of the extracted file. If null, the original name will be used. + // progress : a ulong single item array that will report how many bytes have been processed. It should equal the compressed size of the bz2 file. + // + // error codes : 1 success + // : -1 could not create output file + // : -2 could not read input file + // : -8 canceled + public static int bz2Decompress(string inFile, string outFile = null, ulong[] byteProgress = null) { + int res = -10; + + if(outFile == null) { + if(inFile.Substring(inFile.Length -4, 4).ToLower() != ".bz2") { Debug.Log("Input file does not have a .bz2 extension"); return -2; } + outFile = inFile.Substring(0, inFile.Length -4); + } + + if(byteProgress != null) { + var prog = gcA(byteProgress); + res = bz2(true, 0, @inFile.Replace("//", "/"), @outFile.Replace("//", "/"), prog.AddrOfPinnedObject()); + prog.Free(); + } else { + res = bz2(true, 0, @inFile.Replace("//", "/"), @outFile.Replace("//", "/"), IntPtr.Zero); + } + return res; + } +#endif + //--------------------------------------------------------------------------------------------------------------------------- + // END BZ2 SECTION + //--------------------------------------------------------------------------------------------------------------------------- + + + + + // A Coroutine to download a file to a native/unmaged memory buffer. + // You can call it for an lzip.inMemory class or for an IntPtr. + // See testZip.cs or testWebGLtvOS.cs for usage examples. + // + // This function can only be called for one file at a time. Don't use it to call multiple files at once. + // + // This is useful to avoid memory spikes when downloading large files and intend to decompress from memory. + // With the old method, a copy of the downloaded file to memory would be produced by pinning the buffer to memory. + // Now with this method, it is downloaded to memory and an inMemory zip structure is created. You can decompress from there, with no memory spikes and + // delete the inMemory zip, or keep it for further usage. + // + // In any case, if you don't need the created inMemory zip, you should use the lzip.free_inmemory or lzip.releaseBuffer functions to free the memory! + // + // (You can modify it or replace it with one that suits you better) + // + // Keep in mind that the server where your files are should allow reporting of file sizes as defined in the .htaccess server file. + // + // Parameters: + // + // url: The url of the file you want to download to a native memory buffer. + // downloadDone: Informs a bool that the download of the file to memory is done. + // inmem: An lzip.inMemory class to get the data. + // pointer: An IntPtr for a native memory buffer + // fileSize: The size of the downloaded file will be returned here. + public static IEnumerator downloadZipFileNative(string url, Action downloadDone, Action inmem, Action pointer = null, Action fileSize = null) { + // Get the file lenght first, so we create a correct size native memory buffer. + UnityWebRequest wr = UnityWebRequest.Head(url); + + lzip.nativeBufferIsBeingUsed = true; + + yield return wr.SendWebRequest(); + string size = wr.GetResponseHeader("Content-Length"); + + lzip.nativeBufferIsBeingUsed = false; + + #if UNITY_2020_1_OR_NEWER + if (wr.result == UnityWebRequest.Result.ConnectionError || wr.result == UnityWebRequest.Result.ProtocolError) { + #else + if (wr.isNetworkError || wr.isHttpError) { + #endif + Debug.LogError("Error While Getting Length: " + wr.error); + } else { + if (!lzip.nativeBufferIsBeingUsed) { + + //get the size of the zip + int zipSize = Convert.ToInt32(size); + + // If the zip size is larger then 0 + if (zipSize > 0) { + + lzip.nativeBuffer = lzip.createBuffer(zipSize); + lzip.nativeBufferIsBeingUsed = true; + + // buffer for the download + byte[] bytes = new byte[2048]; + lzip.nativeOffset = 0; + + using (UnityWebRequest wwwSK = UnityWebRequest.Get(url)) { + + // Here we call our custom webrequest function to download our archive to a native memory buffer. + wwwSK.downloadHandler = new lzip.CustomWebRequest(bytes); + + yield return wwwSK.SendWebRequest(); + + if (wwwSK.error != null) { + Debug.Log(wwwSK.error); + } else { + downloadDone(true); + + if(inmem != null) { + // create a new inMemory struct to pass as output to the Action param. + lzip.inMemory t = new lzip.inMemory(); + + t.pointer = lzip.nativeBuffer; + t.info[0] = zipSize; + inmem(t); + } + + if(pointer != null) { pointer(lzip.nativeBuffer); fileSize(zipSize); } + + //reset lzip intermediate buffer params. + lzip.nativeBufferIsBeingUsed = false; + lzip.nativeOffset = 0; + lzip.nativeBuffer = IntPtr.Zero; + + //Debug.Log("Custom download done"); + } + } + + } + + } else { Debug.LogError("Native buffer is being used, or not yet freed!"); } + } + } + + + // A custom WebRequest Override to download data to a native-unmanaged memory buffer. + public class CustomWebRequest : DownloadHandlerScript { + + public CustomWebRequest() + : base() + { + } + + public CustomWebRequest(byte[] buffer) + : base(buffer) + { + } + + protected override byte[] GetData() { return null; } + + + protected override bool ReceiveData(byte[] bytesFromServer, int dataLength) + { + if (bytesFromServer == null || bytesFromServer.Length < 1) + { + Debug.Log("CustomWebRequest: Received a null/empty buffer"); + return false; + } + + var pbuf = gcA(bytesFromServer); + + //Process byteFromServer + addToBuffer(nativeBuffer, nativeOffset, pbuf.AddrOfPinnedObject(), dataLength ); + nativeOffset += dataLength; + pbuf.Free(); + + return true; + } + + // Use the below functions on ly when needed. You get the same functionality from the main coroutine. + /* + // If all data has been received from the server + protected override void CompleteContent() + { + //Debug.Log("Download Complete."); + } + + // If a Content-Length header is received from the server. + protected override void ReceiveContentLength(int fileLength) + { + //Debug.Log("ReceiveContentLength: " + fileLength); + } + */ + } + +#endif +} diff --git a/Assets/ADL-Plugins/zip/Plugins/lzip.cs.meta b/Assets/ADL-Plugins/zip/Plugins/lzip.cs.meta new file mode 100644 index 00000000..723f04ff --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/lzip.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: fc37654099986b948b1124e11f534ef5 +timeCreated: 1567652860 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS.meta new file mode 100644 index 00000000..b26184a4 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 70383550f152f17479b2179e5c819274 +folderAsset: yes +timeCreated: 1567735096 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a new file mode 100644 index 00000000..a3ab9c7f Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a differ diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip new file mode 100644 index 00000000..55b36f74 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip.meta new file mode 100644 index 00000000..87432361 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a-tvos.Simulator.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: dd414bf80d62f764fb95cd5a001d5779 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a.meta new file mode 100644 index 00000000..bf0187ba --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.a.meta @@ -0,0 +1,124 @@ +fileFormatVersion: 2 +guid: f65e0d1f805ae2e4dbf7173c2b568461 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + '': Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 1 + Exclude Linux: 1 + Exclude Linux64: 1 + Exclude LinuxUniversal: 1 + Exclude OSXIntel: 1 + Exclude OSXIntel64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 1 + Exclude tvOS: 0 + - first: + '': Editor + second: + enabled: 0 + settings: + CPU: AnyCPU + OS: AnyOS + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Facebook: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: x86 + - first: + Standalone: Linux64 + second: + enabled: 0 + settings: + CPU: x86_64 + - first: + Standalone: LinuxUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXIntel + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: OSXIntel64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + Standalone: Win64 + second: + enabled: 0 + settings: + CPU: AnyCPU + - first: + tvOS: tvOS + second: + enabled: 1 + settings: + CompileFlags: + FrameworkDependencies: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip new file mode 100644 index 00000000..3f05f280 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip.meta new file mode 100644 index 00000000..3601d2b4 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode10.3.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: a8f84080fdf594f49bdc217cfb9246aa +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip new file mode 100644 index 00000000..df7417d6 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip.meta new file mode 100644 index 00000000..5ed3ec0c --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/libzipw.bitcode.xcode11.4.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: dc354f9f0356ac140a261deda4aa6e3f +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode.meta new file mode 100644 index 00000000..386df0fc --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 492ed1c6ee9f50c498c75b7eaa48a3e4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip new file mode 100644 index 00000000..447d37c0 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip.meta b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip.meta new file mode 100644 index 00000000..5fed0fe2 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/tvOS/non-bitcode/libzipw.a.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 6042b03eb88027042ad5f1bdfb604e01 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/x86.meta b/Assets/ADL-Plugins/zip/Plugins/x86.meta new file mode 100644 index 00000000..266942ef --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/x86.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: a4aabde8510241a42bf5e43fe303a897 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip b/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip new file mode 100644 index 00000000..cf892040 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip differ diff --git a/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip.meta b/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip.meta new file mode 100644 index 00000000..797666b7 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/x86/libzipw-windows-32bit.zip.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: fbe53f7870caa6b42bc3de18c6504596 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/x86_64.meta b/Assets/ADL-Plugins/zip/Plugins/x86_64.meta new file mode 100644 index 00000000..fe2576db --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/x86_64.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: bfa780335cf589644a31c5bf779a3ed9 +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll new file mode 100644 index 00000000..d6a22545 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll differ diff --git a/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll.meta b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll.meta new file mode 100644 index 00000000..bb5debf3 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.dll.meta @@ -0,0 +1,123 @@ +fileFormatVersion: 2 +guid: 83bb54e223d3463428fa9e7975d97278 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 0 + Exclude Linux: 0 + Exclude Linux64: 0 + Exclude LinuxUniversal: 0 + Exclude OSXIntel: 0 + Exclude OSXIntel64: 0 + Exclude OSXUniversal: 0 + Exclude WebGL: 1 + Exclude Win: 1 + Exclude Win64: 0 + - first: + : Editor + second: + enabled: 0 + settings: + CPU: x86_64 + OS: Windows + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Windows + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Facebook: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 1 + settings: + CPU: None + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXIntel + second: + enabled: 1 + settings: + CPU: None + - first: + Standalone: OSXIntel64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: OSXUniversal + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + WebGL: WebGL + second: + enabled: 0 + settings: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so new file mode 100644 index 00000000..a7a1c204 Binary files /dev/null and b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so differ diff --git a/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so.meta b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so.meta new file mode 100644 index 00000000..4bdc989c --- /dev/null +++ b/Assets/ADL-Plugins/zip/Plugins/x86_64/libzipw.so.meta @@ -0,0 +1,118 @@ +fileFormatVersion: 2 +guid: fcaf3ffcf8f3a4b4496f84439ccdf1c5 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + : Any + second: + enabled: 0 + settings: + Exclude Android: 1 + Exclude Editor: 0 + Exclude Linux: 1 + Exclude Linux64: 0 + Exclude LinuxUniversal: 0 + Exclude OSXIntel: 1 + Exclude OSXIntel64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 1 + Exclude Win: 0 + Exclude Win64: 0 + - first: + : Editor + second: + enabled: 0 + settings: + CPU: x86 + OS: Linux + - first: + Android: Android + second: + enabled: 0 + settings: + CPU: ARMv7 + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: Linux + - first: + Facebook: Win + second: + enabled: 0 + settings: + CPU: None + - first: + Facebook: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: Linux + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Linux64 + second: + enabled: 1 + settings: + CPU: AnyCPU + - first: + Standalone: LinuxUniversal + second: + enabled: 1 + settings: + CPU: x86_64 + - first: + Standalone: OSXIntel + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXIntel64 + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: OSXUniversal + second: + enabled: 0 + settings: + CPU: None + - first: + Standalone: Win + second: + enabled: 1 + settings: + CPU: None + - first: + Standalone: Win64 + second: + enabled: 1 + settings: + CPU: AnyCPU + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Scripts.meta b/Assets/ADL-Plugins/zip/Scripts.meta new file mode 100644 index 00000000..6f90701c --- /dev/null +++ b/Assets/ADL-Plugins/zip/Scripts.meta @@ -0,0 +1,5 @@ +fileFormatVersion: 2 +guid: 1968b9102ec70564f9ce93a02486ce4f +folderAsset: yes +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs b/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs new file mode 100644 index 00000000..3d413e74 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs @@ -0,0 +1,417 @@ +using UnityEngine; +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine.Networking; + + + +public class testWebGLtvOS : MonoBehaviour +{ +#if UNITY_WEBGL || UNITY_TVOS + + //an output Buffer for the decompressed gz buffer + private byte[] outbuffer = null, outbuffer2 = null; + private Texture2D tex = null, tex2 = null, tex3 = null, tex4 = null, tex5 = null, tex6 = null, tex7 = null, tex8 = null, tex9 = null; + + byte[] wwb = null, wwb3 = null, zipwww = null; + + private bool downloadDone1, downloadDone2, downloadDone3, downloadDone4; + + private string log = ""; + + //log for output of results + void plog(string t = "") + { + log += t + "\n"; ; + } + + void Start(){ + tex = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex2 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex3 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex4 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex5 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex6 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex7 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex8 = new Texture2D(1,1,TextureFormat.RGBA32, false); + tex9 = new Texture2D(1,1,TextureFormat.RGBA32, false); + + //get some files from a server + StartCoroutine( getFromSite() ); + + + } + + + + + void OnGUI(){ + + if(tex != null) GUI.DrawTexture(new Rect(200, 10, 185, 140), tex); + if(tex2 != null) GUI.DrawTexture(new Rect(395, 10, 185, 140), tex2); + if(tex3 != null) GUI.DrawTexture(new Rect(590, 10,185, 140), tex3); + if(tex4 != null) GUI.DrawTexture(new Rect(785, 10,185, 140), tex4); + if(tex5 != null) GUI.DrawTexture(new Rect(980, 10,185, 140), tex5); + if(tex6 != null) GUI.DrawTexture(new Rect(200, 160,125, 100), tex6); + if(tex7 != null) GUI.DrawTexture(new Rect(335, 160,125, 100), tex7); + if(tex8 != null) GUI.DrawTexture(new Rect(470, 160,125, 100), tex8); + if(tex9 != null) GUI.DrawTexture(new Rect(605, 160,125, 100), tex9); + + if(downloadDone1) { + // gzip read from buffer and decompress. gzip compress a buffer. + if (GUI.Button(new Rect(5, 5, 180, 40), "Buffer gz test")) gzTest(); + } + + if(downloadDone2) { + // find a gzip file merged in a buffer and decompress. The gzip attached must be created with the plugin's gzip function and the overrideDateTimeWithLength = true. + if (GUI.Button(new Rect(5, 50, 180, 40), "start merged gzip test")) mergedTest(); + + //check the compress/decompress zlib buffers section in the lzip.cs section for more variations + if(outbuffer != null) { + if (GUI.Button(new Rect(5, 95, 180, 40), "zlib buffer tests")) zlibTest(); + } + } + + + //-------------------------------------------------------------------------------------------------------------- + // + // ZIP tests peformed in byte buffers. All operations are supported except those that need a file system. + // (Refer to the testZip.cs script for more examples that do not use the file system!) + // + //-------------------------------------------------------------------------------------------------------------- + if (downloadDone3) { + if (GUI.Button(new Rect(5, 140, 180, 40), "zip tests 1")) zipTest(); + } + + + // Zip tests performed using native file buffers. Avoid memory peaks during decompression. + if (GUI.Button(new Rect(5, 185, 180, 40), "zip native buffer")) StartCoroutine(zipNativeBuffer()); + + + GUI.TextArea(new Rect(10, 270, Screen.width - 20, Screen.height - 280), log); + + } + + + + + void gzTest() { + log = ""; + //decompress a gzip buffer. + plog("ungzip2: "+lzip.unGzip2(wwb, outbuffer).ToString()+" bytes"+ "\n"); + + if(outbuffer != null) { + tex.LoadImage(outbuffer); + //compress a buffer to a gzip buffer. + plog("gzip a buffer"); + // a temp buffer where the compression will occur. + var tempBuffer = new byte[outbuffer.Length + 18]; + // do compression + int res = lzip.gzip(outbuffer, tempBuffer, 9); + // create the final gzipped buffer + var gzippedBuffer = new byte[res]; + // copy the compressed data to it. + Buffer.BlockCopy(tempBuffer, 0, gzippedBuffer, 0, res); + // erase the the temp buffer. (or it could be a reusable fixed buffer to avoid allocations.) + tempBuffer = null; + // show decompresed and compressed sizes + plog(outbuffer.Length.ToString() + " -> " + res.ToString()); + + gzippedBuffer = null; // erase gzipped buffer + } + } + + void mergedTest() { + log = ""; + + int offset = lzip.findGzStart(wwb3); + + int gzipSize = lzip.gzipCompressedSize(wwb3, offset); + + if(gzipSize > 0) plog("Compresed size: " + gzipSize.ToString()); else plog("No compressed size stored in gzip."); + + plog("Start of gzip File: " + offset.ToString()); + + plog("unGzip2Merged: "+lzip.unGzip2Merged(wwb3, offset, wwb3.Length - offset, outbuffer2).ToString()+" bytes"); + + if(outbuffer2 != null) tex2.LoadImage(outbuffer2); + } + + void zlibTest() { + log = ""; + var nt = lzip.compressBuffer(outbuffer, 9); + if(nt != null){ + plog("compressed zlib buffer size: " + nt.Length.ToString()); + + var cb = lzip.decompressBuffer(nt); + + if(cb != null) { + plog("decompressed zlib buffer size: " + cb.Length.ToString()); + tex3.LoadImage(cb); + } + cb = null; nt = null; + } + } + + void zipTest() { + log = ""; + + // Handle regular zip in buffer + // + // get info of a zip file using the getFileInfo method. + plog("Get Info of zip in Buffer: " + lzip.getFileInfo(null, zipwww).ToString()); + if(lzip.ninfo != null && lzip.ninfo.Count > 0) { + for(int i=0; i < lzip.ninfo.Count; i++){ + plog("Entry no: " + (i+1).ToString() + + " " + lzip.ninfo[i] + + " uncompressed: " + lzip.uinfo[i].ToString() + + " compressed: " + lzip.cinfo[i].ToString() + + " offset: " + lzip.localOffset[i].ToString()); + } + } + + //validate a zip file in a buffer and extract an entry from it to a byte buffer. + plog("Validate zip file in Buffer: " + lzip.validateFile(null, zipwww).ToString()); + var ob = lzip.entry2Buffer(null, "dir1/dir2/dir3/Unity_1.jpg", zipwww); + plog("entry2Buffer: " + ob.Length.ToString()); + if(ob != null) tex4.LoadImage(ob); + + byte [] merged = null; + + //create an inMemory zip file. + if(ob != null) { + lzip.inMemory t = new lzip.inMemory(); + // compress a buffer to an in memory zip with a password. bz2 compression method is not supported. + // The function returns the pointer to the in memory zip buffer. But you can get this also through t.pointer. + // This function is slow when adding multiple buffers to the inMemory zip. It is better to use the low level functions below this example. + lzip.compress_Buf2Mem(t, 9, ob, "inmem/test.jpg", null,"1234"); + // print the in memory zip size in bytes. + plog("Create inMemory zip size: " + t.size().ToString()); + + // a buffer to perform decompression operations from an in memory zip to it. + byte[] bf = null; + // a function that decompresses an entry from an in memory zip to a buffer that will get resized to fit the output. + // (you can use entry2FixedBufferMem to decompress to a fixed sixed buffer or the overloaded entry2BufferMem function that returns a new buffer.) + plog("entry2BufferMem: " + lzip.entry2BufferMem(t,"inmem/test.jpg", ref bf, "1234").ToString()); + + // (!) If you don't need anymore the inMemory object use the free_inmemory function to free the occupied memory by the zip (!) + // + lzip.free_inmemory(t); + + // low level functions to create inMemory zip which are faster then using the above function. ------------------------------ + // + // Create an in memory object to reference our in memory zip + lzip.inMemory t2 = new lzip.inMemory(); + // Initiate an inMemory zip archive + lzip.inMemoryZipStart(t2); + // Add a buffer as a first entry in the inMemory zip + lzip.inMemoryZipAdd(t2, 9, ob, "test.jpg"); + // Add a second buffer as the second entry. + lzip.inMemoryZipAdd(t2, 9, ob, "directory/test2.jpg"); + // !!! -> After finishing adding buffer/files in the inMemory zip we must close it <- !!! + // You can reopen it later with the inMemoryZipStart function to append more entries to it. + lzip.inMemoryZipClose(t2); + // Write out the compressed size of the inMemory created zip + plog("Size of Low Level inMemory zip: " + t2.size().ToString()); + + byte[] bf2 = null; + plog("entry2BufferMem low: " + lzip.entry2BufferMem(t2,"directory/test2.jpg", ref bf2).ToString()); + // make sure we got a valid inMemory zip by extracting an image out of it and loading it to a texture. + if(bf2 != null) { tex7.LoadImage(bf2); bf2 = null; } + + // free the t2 inMemory object if you don't need it anymore. + lzip.free_inmemory(t2); + // end low memory functions ------------------------------------------------------------------------------------------------- + + if(bf != null) { + tex5.LoadImage(bf); + //create a mereged zip file for the next test + merged = new byte[bf.Length + zipwww.Length]; + Array.Copy(bf, 0, merged, 0, bf.Length); + Array.Copy(zipwww, 0, merged, bf.Length, zipwww.Length); + } + } + + // Merged zip file in buffer examples. + // + // ----------------------------------- + if (merged != null) { + plog(""); + // get info of a zip file using the merged method. + plog("Get Info of merged zip in Buffer: " + lzip.getZipInfoMerged( merged ).ToString()); + if(lzip.zinfo != null && lzip.zinfo.Count > 0) { + for(int i=0; i < lzip.zinfo.Count; i++){ + plog("Entry no: " + (i+1).ToString() + + " " + lzip.zinfo[i].filename + + " uncompressed: " + lzip.zinfo[i].UncompressedSize.ToString() + + " compressed: " + lzip.zinfo[i].CompressedSize.ToString() + + " offset: " + lzip.zinfo[i].RelativeOffsetOfLocalFileHeader.ToString()); + } + } + + // get the position and size of the merged zip in a buffer + int position = 0, size = 0; + lzip.getZipInfoMerged(merged, ref position, ref size, false); + plog("merged zip: position = " + position.ToString() + " , size = "+ size.ToString()); + + // get the pure zip file from where it is merged. + var pureZip = lzip.getMergedZip(merged); + if(pureZip != null) plog("got pure zip buffer with size: " + pureZip.Length.ToString()); + pureZip = null; + + // extract an entry from a merged zip + // see lzip.cs for more overloaded functions to extract to referenced or fixed sized buffers + var extractedData = lzip.entry2BufferMerged(merged, "dir1/dir2/dir3/Unity_1.jpg"); + if(extractedData != null) { + tex6.LoadImage(extractedData); + plog("entry2BufferMerged: " + extractedData.Length.ToString()); + } + } + } + + + IEnumerator zipNativeBuffer() { + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // Declare an int to get the downloaded archive size from the coroutine. When we pass directly a pointer to the plugin we need the size or the buffer it occupies. + int zipSize = 0; + + log = ""; + + plog("Downloading 1st file"); + plog(); + + downloadDone4 = false; + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. + StartCoroutine(lzip.downloadZipFileNative("http://telias.free.fr/temp/testZip.zip", r => downloadDone4 = r, null, pointerResult => nativePointer = pointerResult, size => zipSize = size)); + + while (!downloadDone4) yield return true; + + plog("File size: " + zipSize.ToString()); // show size of the zip + + // validate a zip file in a buffer. + plog("Validate zip file in Buffer: " + lzip.validateFile(zipSize.ToString(), nativePointer).ToString()); + + // extract an entry from it to a byte buffer (could be in a fixed or referenced buffer also) + var ob = lzip.entry2Buffer(zipSize.ToString(), "dir1/dir2/dir3/Unity_1.jpg", nativePointer); + + // Delete the buffer from native memory. + lzip.releaseBuffer(nativePointer); + + plog("entry2Buffer: " + ob.Length.ToString()); + if(ob != null) tex8.LoadImage(ob); + + plog(); plog(); + + + + // Now download a zip file to a native pointer of an lzip.inMemory class + downloadDone4 = false; + + plog("Downloading 2nd file"); + plog(); + + // An inMemory lzip struct class. + lzip.inMemory inMemZip = null; + + // Here we are calling the coroutine for an inMemory class. + StartCoroutine(lzip.downloadZipFileNative("http://telias.free.fr/temp/testZip.zip", r => downloadDone4 = r, result => inMemZip = result)); + + while (!downloadDone4) yield return true; + + plog("File size: " + inMemZip.size().ToString()); + + // validate a zip file in a buffer. + plog("Validate zip file in Buffer: " + lzip.validateFile(inMemZip.size().ToString(), inMemZip.memoryPointer()).ToString()); + + // extract an entry from it to a byte buffer (could be in a fixed or referenced buffer also) + var ob2 = lzip.entry2Buffer(inMemZip.size().ToString(), "dir1/dir2/dir3/Unity_1.jpg", inMemZip.memoryPointer()); + + // free the struct and the native memory it occupies!!! + lzip.free_inmemory(inMemZip); + + plog("entry2Buffer: " + ob2.Length.ToString()); + if(ob2 != null) tex9.LoadImage(ob); + } + + // ============================================================================================================================================================= + + IEnumerator getFromSite() { + plog("getting buffer from site ..."); + yield return true; + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropboxusercontent.com/s/zk118shcawkiwas/testLZ4b.png.gz")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + wwb = new byte[www.downloadHandler.data.Length]; Array.Copy(www.downloadHandler.data, 0, wwb, 0, www.downloadHandler.data.Length); + outbuffer = new byte[ lzip.gzipUncompressedSize(wwb) ]; + plog("Got buffer"); + downloadDone1 = true; + } + } + + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropboxusercontent.com/s/874ijig3hzq1jzm/gzipMerged.jpg")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + wwb3 = new byte[www.downloadHandler.data.Length]; Array.Copy(www.downloadHandler.data, 0, wwb3, 0, www.downloadHandler.data.Length); + outbuffer2 = new byte[ lzip.gzipUncompressedSize(wwb3) ]; + plog("Got buffer2"); + downloadDone2 = true; + } + } + + + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropboxusercontent.com/s/whbz2hsuyescgej/test2Zip.zip")) { + #if UNITY_5 || UNITY_4 + yield return www.Send(); + #else + yield return www.SendWebRequest(); + #endif + + if (www.error != null) { + Debug.Log(www.error); + } else { + zipwww = new byte[www.downloadHandler.data.Length]; Array.Copy(www.downloadHandler.data, 0, zipwww, 0, www.downloadHandler.data.Length); + plog("Got zip file"); + downloadDone3 = true; + } + } + + yield return true; + + // Run all the tests on tvos (usefull for emulator) + #if UNITY_TVOS && !UNITY_EDITOR + gzTest(); + mergedTest(); + zlibTest(); + zipTest(); + #endif + + } + +#else + void Start(){ + Debug.Log("Only for WebGL ot tvOS"); + } +#endif + +} diff --git a/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs.meta b/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs.meta new file mode 100644 index 00000000..8e4398be --- /dev/null +++ b/Assets/ADL-Plugins/zip/Scripts/testWebGLtvOS.cs.meta @@ -0,0 +1,11 @@ +fileFormatVersion: 2 +guid: b4df1b211f2ec374eb619529f7cc30a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/Scripts/testZip.cs b/Assets/ADL-Plugins/zip/Scripts/testZip.cs new file mode 100644 index 00000000..c42018dc --- /dev/null +++ b/Assets/ADL-Plugins/zip/Scripts/testZip.cs @@ -0,0 +1,996 @@ +using UnityEngine; +using System; +using System.Text; +using System.Threading; +using System.IO; +using System.Collections; +using System.Collections.Generic; +using UnityEngine.Networking; + +public class testZip : MonoBehaviour +{ +#if (!UNITY_WEBGL && !UNITY_TVOS) || UNITY_EDITOR + + // we use some integer to get error codes from the lzma library (look at lzma.cs for the meaning of these error codes) + private int zres=0; + + private string myFile; + private string log; + private string ppath; + + private bool compressionStarted, pass; + private bool downloadDone, downloadDone2; + + // reusable buffers + private byte[] reusableBuffer, reusableBuffer2, reusableBuffer3; + + // fixed size buffers, that don't get resized, to perform compression/decompression of buffers in them and avoid memory allocations. + private byte[] fixedInBuffer = new byte[1024 * 256]; + private byte[] fixedOutBuffer = new byte[1024 * 768]; + private byte[] fixedBuffer = new byte[1024 * 1024]; + + // A single item integer array that changes to the current number of file that get uncompressed of a zip archive. + // When running the decompress_File function, compare this int to the total number of files returned by the getTotalFiles function + // to get the progress of the extraction if the zip contains multiple files. + // If you use multiple threads, remember to use other progress integers for the other threads, otherwise there will be a sharing violation. + // + private int[] progress = new int[1]; + + // individual file progress (in bytes) + private ulong[] progress2 = new ulong[1], byteProgress = new ulong[1]; + + + // log for output of results + void plog(string t = "") + { + log += t + "\n"; ; + } + + void Start() { + + ppath = Application.persistentDataPath; + +#if UNITY_STANDALONE_OSX && !UNITY_EDITOR + ppath="."; +#endif + + Debug.Log("persistentDataPath: " + ppath); + + // various byte buffers for testing + reusableBuffer = new byte[4096]; + reusableBuffer2 = new byte[0]; + reusableBuffer3 = new byte[0]; + + Screen.sleepTimeout = SleepTimeout.NeverSleep; + + // call the download coroutine to download a test file + StartCoroutine(DownloadZipFile()); + } + + + void Update(){ + if (Input.GetKeyDown(KeyCode.Escape)) Application.Quit(); + } + + + void OnGUI(){ + + if(GUI.Button(new Rect(Screen.width - 100, 90, 80, 40), "Cancel")) lzip.setCancel(); + + if (downloadDone == true) { + GUI.Label(new Rect(10, 2, 250, 30), "package downloaded, ready to extract"); + GUI.Label(new Rect(310, 2, 650, 100), "Path: " + ppath); + } + + if (compressionStarted || downloadDone2){ + GUI.TextArea(new Rect(10, 160, Screen.width - 20, Screen.height - 170), log); + GUI.Label(new Rect(Screen.width - 30, 0, 80,40), progress[0].ToString()); + GUI.Label(new Rect(Screen.width - 140, 0, 80,40), progress2[0].ToString()); + } + + if (downloadDone) { + // ZIP TEST + if (GUI.Button(new Rect(10, 40, 110, 50), "Zip test")) { + log = ""; + compressionStarted = true; + DoDecompression(); + } + + //FILE BUFFER TEST + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR || UNITY_STANDALONE_WIN) + if (GUI.Button(new Rect(130, 40, 110, 50), "FileBuffer test")) { + log = ""; + compressionStarted = true; + DoDecompression_FileBuffer(); + } + if (GUI.Button(new Rect(10, 100, 180, 50), "Native FileBuffer tests")) { + compressionStarted = true; downloadDone2 = false; + StartCoroutine( NativeFileBufferDownload() ); + } + #endif + + // INMEMORY TEST + if (GUI.Button(new Rect(250, 40, 110, 50),"InMemory Test")) { + log = ""; + compressionStarted = true; + DoInMemoryTest(); + } + + //MERGED ZIP TEST + if(GUI.Button(new Rect(370, 40, 110, 50),"Merged zip Test")) { + log = ""; + compressionStarted = true; + DoDecompression_Merged(); + } + + //GZIP/BZIP2 TEST + if(GUI.Button(new Rect(490, 40, 110, 50),"Gzip/Bz2 Test")) { + log = ""; + compressionStarted = true; + DoGzipBz2Tests(); + } + + //TAR TAR.GZ TAR.BZ2 TEST + if(GUI.Button(new Rect(610, 40, 110, 50),"Tar Test")) { + log = ""; + compressionStarted = true; + DoTarTests(); + } + } + + } + + + + #region Normal Zip tests + // Test zip functions + void DoDecompression(){ + + //---------------------------------------------------------------------------------------------------------------- + // Commented out example on how to set the permissions of a MacOSX executable that has been unzipped so it can run. + // + //lzip.setFilePermissions(ppath + "/Untitled.app", "rwx","rx","rx"); + //lzip.setFilePermissions(ppath + "/Untitled.app/Contents/MacOS/Untitled", "rwx","rx","rx"); + // + //---------------------------------------------------------------------------------------------------------------- + + + //--------------------------------------------------------------------------------------------------------------------------------------------------------- + // + // Use the lzip.setCancel() command to cancel the compress_File, compressDir, compress_File_List, decompress_File, extract_entry, entry2Buffer functions. + // + //--------------------------------------------------------------------------------------------------------------------------------------------------------- + + + //----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + // + // To get a progress percentage: + // + // Use the lzip.getFileInfo function. This function returns the total uncompressed bytes of the contents in the zip (among other things). + // Then when decompressing (through a separate thread), divide the progress[0] returned by the function with the total bytes returned from the lzip.getFileInfo function. + // Like this (float)(totalBytes / progress[0]). This will go from 0.0f to 1.0f. Multiply this with 100 and you will have the progress. + // + // The same for compression. Only this time you have to make the sum of the total file sizes and compare against the byteProgress of the compress_File/compressDir/compress_File_List function + // + //----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + + // In general keeping the default utf-8 encoding should be ok. But in some cases where the application that created the zip didn't used utf-8, you should set your encoding with this function. + // lzip.setEncoding(65001); // UTF-8 + // lzip.setEncoding(54936); // Chinese + + // validate sanity of a zip archive + plog("Validate: "+ lzip.validateFile(ppath + "/testZip.zip").ToString()); + + // decompress the downloaded file + zres = lzip.decompress_File(ppath + "/testZip.zip", ppath+"/", progress,null, progress2); + plog("decompress: "+zres.ToString()); + plog(); + + + // get the true total files of the zip + plog("true total files: "+lzip.getTotalFiles(ppath + "/testZip.zip")); + + + // get the total entries of the zip + plog("true total entries: "+lzip.getTotalEntries(ppath + "/testZip.zip")); + + + // entry exists + bool eres = lzip.entryExists(ppath + "/testZip.zip", "dir1/dir2/test2.bmp"); + plog("entry exists: " + eres.ToString()); + + + // get entry dateTime + plog(); + plog("DateTime: " + lzip.entryDateTime(ppath + "/testZip.zip", "dir1/dir2/test2.bmp").ToString()); + + + // extract an entry + zres = lzip.extract_entry(ppath + "/testZip.zip", "dir1/dir2/test2.bmp", ppath + "/test22P.bmp", null, progress2); + plog("extract entry: " + zres.ToString()); + plog(); + + // extract entries using a List + List entries = new List(); + entries.Add("dir1/dir2/test2.bmp"); + entries.Add("dir1/dir2/dir3/Unity_1.jpg"); + zres = lzip.extract_entries(ppath + "/testZip.zip", entries.ToArray(), ppath + "/entries", null, progress2); + plog("extract entries: " + zres.ToString()); + plog(); + + + // compress a file and add it to a new zip + // + // we use the byteProgress var to monitor how many bytes have been processed. (useful for progress of compression.) + zres = lzip.compress_File(9, ppath + "/test2Zip.zip", ppath + "/dir1/dir2/test2.bmp",false, "dir1/dir2/test2.bmp", null, null, false, 0, byteProgress); + plog("compress: " + zres.ToString()); + + // append a file to it + // Appending to an existing file can be slow. For faster results, multiple files should be added using the compressDir or compress_File_List functions ! + // + // for the second file we use compression level = 0, to test the STORE method. + zres = lzip.compress_File(0, ppath + "/test2Zip.zip", ppath + "/dir1/dir2/dir3/Unity_1.jpg",true, "dir1/dir2/dir3/Unity_1.jpg","ccc",null, false, 0, byteProgress); + plog("append: " + zres.ToString() + "\nTotal bytes processed: " + byteProgress[0].ToString()); + //reset byteProgress[0] to zero + byteProgress[0] = 0; + + // localOffset operations + // + // the second file was added with compression level = 0. That means the method for it is STORE. + // we use the lzip.localOffset list to retrieve its position in the zip file and extract it without zip operations. + // this is usefull when you want to use the AssetBundle.LoadFromFile on a zip or use the zip container as a storage for non compressed files. + // + // first we get the info about the zip and fill the appropriate lists. You can use either lzip.getFileInfo or the lzip.getZipInfo(not working on zip64 zips) functions. + lzip.getFileInfo(ppath + "/test2Zip.zip"); + + // then we get the offset to the uncompressed data and the uncompressed size of the file. + // get the index of our entry in the info lists + int index = lzip.getEntryIndex("dir1/dir2/dir3/Unity_1.jpg"); + + // if we got a valid index we are going to extract our archive without zip operations + if(index != -1) { + int uncompressedSize = (int)lzip.uinfo[index]; + int localOffset = (int)lzip.localOffset[index] + 30 + lzip.ninfo[index].Length; // for archives with the STORE method we use 30 bytes + name.length extra offset + plog("Real Offset: " + localOffset.ToString()); + // create a temp byte buffer to store our archive + byte[] tempBuffer = new byte[uncompressedSize]; + using (BinaryReader bnr = new BinaryReader(new FileStream(ppath + "/test2Zip.zip", FileMode.Open))) { + bnr.BaseStream.Seek(localOffset, SeekOrigin.Begin); + bnr.Read(tempBuffer, 0, uncompressedSize); + } + // write the file to disk to validate the operation + File.WriteAllBytes(ppath + "/Offset.jpg", tempBuffer); + tempBuffer = null; + } + + + plog(); + + + //------------------------------------------------------------------------------------------------------------------------------ + // SPANNED archives + //------------------------------------------------------------------------------------------------------------------------------ + progress2[0] = 0; + zres = lzip.compress_File(9, ppath + "/test2ZipSPAN.zip", ppath + "/dir1/dir2/test2.bmp", false, "dir1/dir2/test2.bmp", null, null, false, 20000, progress2); + + + plog("compress SPAN: " + zres.ToString() + " progress: " + progress2[0].ToString()); + + // add a second file in the split disk archive + zres = lzip.compress_File(9, ppath + "/test2ZipSPAN.zip", ppath + "/dir1/dir2/dir3/Unity_1.jpg", true, "dir1/dir2/dir3/Unity_1.jpg", null, null, false, 20000, progress2); + + plog("compress SPAN 2: " + zres.ToString() + " progress: " + progress2[0].ToString()); + + // decompress spanned archive + progress2[0] = 0; + zres = lzip.decompress_File(ppath + "/test2ZipSPAN.zip", ppath + "/SPANNED/", progress, null, progress2); + plog("decompress SPAN: " + zres.ToString() + " progress: " + progress2[0].ToString()); + + + plog(); + + //------------------------------------------------------------------------------------------------------------------------------ + + bool useBz2 = true; + // macos/ios/tvos do not support bz2 compression method. + #if (UNITY_EDITOR_OSX || UNITY_STANDALONE_OSX || UNITY_IOS) + useBz2 = false; + #endif + + // compress multiple files added in some lists, and protect them with a password + // + // create a list of files to get compressed + List myFiles = new List(); + myFiles.Add(ppath + "/test22P.bmp"); + myFiles.Add(ppath + "/dir1/dir2/test2.bmp"); + // create an optional list with new names for the above listings + List myNames = new List(); + myNames.Add("NEW_test22P.bmp"); + myNames.Add("dir13/dir23/New_test2.bmp"); + + // use password and bz2 method + zres = lzip.compress_File_List(9, ppath+"/fileList.zip", myFiles.ToArray(), progress, false, myNames.ToArray(),"password", useBz2); + plog("MultiFile Compress password: " + zres.ToString()); + myFiles.Clear(); myFiles = null; myNames.Clear(); myNames = null; + + // decompress a password protected archive + zres = lzip.decompress_File(ppath + "/fileList.zip", ppath+"/", progress,null, progress2,"password"); + plog("decompress password: " + zres.ToString()); + + plog(); + + + // compress a buffer to a file and name it. + plog( "Buffer2File: "+ lzip.buffer2File(9, ppath + "/test3Zip.zip", "buffer.bin", reusableBuffer).ToString()); + + // compress a buffer, name it and append it to an existing zip archive + plog("Buffer2File append: " + lzip.buffer2File(9, ppath + "/test3Zip.zip", "dir4/buffer.bin", reusableBuffer, true).ToString()); + // Debug.Log(reusableBuffer.Length); + plog(); + + + + // get the uncompressed size of a specific file in the zip archive + plog("get entry size: " + lzip.getEntrySize(ppath + "/testZip.zip", "dir1/dir2/test2.bmp").ToString()); + plog(); + + + // extract a file in a zip archive to a byte buffer (referenced buffer method) + plog("entry2Buffer1: "+ lzip.entry2Buffer(ppath + "/testZip.zip","dir1/dir2/test2.bmp",ref reusableBuffer2).ToString() ); + // File.WriteAllBytes(ppath + "/out.bmp", reusableBuffer2); + plog(); + + // extract an entry in a zip archive to a fixed size buffer + plog("entry2FixedBuffer: " + lzip.entry2FixedBuffer(ppath + "/testZip.zip", "dir1/dir2/test2.bmp", ref fixedBuffer).ToString()); + plog(); + + + // extract a file in a zip archive to a byte buffer (new buffer method) + var newBuffer = lzip.entry2Buffer(ppath + "/testZip.zip", "dir1/dir2/test2.bmp"); + zres = 0; + if (newBuffer != null) zres = 1; + plog("entry2Buffer2: "+ zres.ToString()); + // write a file out to confirm all was ok + //File.WriteAllBytes(ppath + "/out.bmp", newBuffer); + plog(); + + + // FIXED BUFFER FUNCTIONS: + int compressedSize = lzip.compressBufferFixed(newBuffer, ref fixedInBuffer, 9); + plog(" # Compress Fixed size Buffer: " + compressedSize.ToString()); + + if(compressedSize > 0){ + int decommpressedSize = lzip.decompressBufferFixed(fixedInBuffer, ref fixedOutBuffer); + if(decommpressedSize > 0) plog(" # Decompress Fixed size Buffer: " + decommpressedSize.ToString()); + } + plog(); + + + // compress a buffer into a referenced buffer + pass = lzip.compressBuffer(reusableBuffer2, ref reusableBuffer3, 9); + plog("compressBuffer1: " + pass.ToString()); + // write a file out to confirm all was ok + if(pass) File.WriteAllBytes(ppath + "/out.bin", reusableBuffer3); + + + // compress a buffer and return a new buffer with the compresed data. + newBuffer = lzip.compressBuffer(reusableBuffer2,9); + zres = 0; + if (newBuffer != null) zres = 1; + plog("compressBuffer2: " + zres.ToString()); + plog(); + + + // decompress a previously compressed buffer into a referenced buffer + pass = lzip.decompressBuffer(reusableBuffer3, ref reusableBuffer2); + plog("decompressBuffer1: " + pass.ToString()); + //Debug.Log(reusableBuffer2.Length); + // write a file out to confirm all was ok + if(pass) File.WriteAllBytes(ppath + "/out.bmp", reusableBuffer2); + zres = 0; + if (newBuffer != null) zres = 1; + + + // decompress a previously compressed buffer into a new returned buffer + newBuffer = lzip.decompressBuffer(reusableBuffer3); + if(newBuffer != null) plog("decompressBuffer2: " + newBuffer.Length.ToString()); else plog("decompressBuffer2: Failed"); + if(newBuffer != null) File.WriteAllBytes(ppath + "/out2.bmp", newBuffer); + plog(); + + + // get file info of the zip file (names, uncompressed and compressed sizes) + plog( "total bytes: " + lzip.getFileInfo(ppath + "/testZip.zip").ToString()); + + + + // Look through the ninfo, uinfo and cinfo Lists where the file names and sizes are stored. + if (lzip.ninfo != null) { + for (int i = 0; i < lzip.ninfo.Count; i++) { + log += lzip.ninfo[i] + " - " + lzip.uinfo[i] + " / " + lzip.cinfo[i] + "\n"; + } + } + plog(); + + + // Recursively compress a directory + int[] dirProgress = new int[1]; + lzip.compressDir(ppath + "/dir1", 9, ppath + "/recursive.zip", false, dirProgress); + plog("recursive - no. of files: " + dirProgress[0].ToString()); + + // decompress the above compressed zip to make sure all was ok. + zres = lzip.decompress_File(ppath + "/recursive.zip", ppath+"/recursive/", progress, null, progress2); + plog("decompress recursive: "+zres.ToString()); + + + // multithreading example to show progress of extraction, using the ref progress int + // in this example it happens to fast, because I didn't want the user to download a big file with many entrie. + Thread th = new Thread(decompressFunc); th.Start(); + + + // delete/replace entry example + if(File.Exists(ppath+"/test-Zip.zip")) File.Delete(ppath+"/test-Zip.zip"); + if(File.Exists(ppath+"/testZip.zip")) File.Copy(ppath+"/testZip.zip", ppath+"/test-Zip.zip"); + + + + // replace an entry with a byte buffer + var newBuffer3 = lzip.entry2Buffer(ppath + "/testZip.zip", "dir1/dir2/test2.bmp"); + plog("replace entry: "+lzip.replace_entry(ppath+"/test-Zip.zip", "dir1/dir2/test2.bmp", newBuffer3, 9, null).ToString() ); + + + // replace an entry with a file in the disk (ability to asign a password or bz2 compression) + plog("replace entry 2: "+lzip.replace_entry(ppath+"/test-Zip.zip", "dir1/dir2/test2.bmp",ppath+"/dir1/dir2/test2.bmp", 9, null, null).ToString() ); + + + // delete an entry in the zip + plog("delete entry: "+lzip.delete_entry(ppath+"/test-Zip.zip", "dir1/dir2/test2.bmp").ToString() ); + + + } + + void decompressFunc() + { + int res = lzip.decompress_File(ppath + "/recursive.zip", ppath + "/recursive/", progress,null, progress2); + if (res == 1) plog("multithreaded ok"); else plog("multithreaded error: "+res.ToString()); + } + + #endregion + + #region Native File Buffer tests + // A function to download a zip archive to a native/unmanaged memory buffer + // We use here a temp lzip.inMemory struct to keep the pointer and size of the buffer + IEnumerator NativeFileBufferDownload() { + + //make a check that the intermediate native buffer is not being used! + if(lzip.nativeBufferIsBeingUsed) { Debug.Log("Native buffer download is in use"); yield break; } + + log = ""; + + // An inMemory lzip struct class. + lzip.inMemory inMemZip = null; + + // download a file to a native/unmanaged memory buffer (to avoid memory spikes when decompressing from memory) + // You can pass to the function an inMemory class or an IntPtr. + + // Here we are calling the coroutine for an inMemory class. (make sure your file server supports GetResponseHeader("Content-Length")) + StartCoroutine(lzip.downloadZipFileNative("http://telias.free.fr/temp/" + myFile, r => downloadDone2 = r, result => inMemZip = result)); + + plog("Downloading 1st file"); + plog(); + + + while (!downloadDone2) yield return true; + + + if (inMemZip.info == null) { + log = ""; plog("InMemZip is null. Please redownload to memory."); + } else { + plog("File size: " + inMemZip.size().ToString()); // show size of the zip + + + // Here we pass directly the size of the buffer (in the place of the zip archive name) and the pointer of the buffer. + zres = lzip.decompress_File(inMemZip.size().ToString(), ppath + "/native1/", progress, inMemZip.memoryPointer(), progress2); + + plog("Validate 1 " + lzip.validateFile(inMemZip.size().ToString(), inMemZip.memoryPointer()).ToString()); + + plog("decompress native 1: " + zres.ToString()); + plog(); + + // Here we pass the temp lzip.inMemory struct to the lzip.decompress_File function + zres = lzip.decompress_File(null, ppath + "/native2/", progress, inMemZip, progress2); + + plog("Validate 2 " + lzip.validateFile(null, inMemZip).ToString()); + + plog("decompress native 2: " + zres.ToString()); + plog(); + + + // extract entries using a List + List entries = new List(); + entries.Add("dir1/dir2/test2.bmp"); + entries.Add("dir1/dir2/dir3/Unity_1.jpg"); + zres = lzip.extract_entries(inMemZip.size().ToString(), entries.ToArray(), ppath + "/entriesNative", inMemZip.memoryPointer(), progress2); + plog("extract entries: " + zres.ToString()); + plog(); + + // free the struct and the native memory it occupies!!! + lzip.free_inmemory(inMemZip); + } + + + downloadDone2 = false; + + // A native memory pointer + IntPtr nativePointer = IntPtr.Zero; + + // Declare an int to get the downloaded archive size from the coroutine. When we pass directly a pointer to the plugin we need the size or the buffer it occupies. + int zipSize = 0; + + plog(); + plog("Downloading 2nd file"); + plog(); + + // Here we are calling the coroutine for a pointer. We also get the downloaded file size. (make sure your file server supports GetResponseHeader("Content-Length")) + StartCoroutine(lzip.downloadZipFileNative("http://telias.free.fr/temp/" + myFile, r => downloadDone2 = r, null, pointerResult => nativePointer = pointerResult, size => zipSize = size)); + + while (!downloadDone2) yield return true; + + plog("File size: " + zipSize.ToString()); // show size of the zip + + // We pass directly the size of the buffer (in the place of the zip archive name) and the pointer of the buffer. + zres = lzip.decompress_File(zipSize.ToString(), ppath + "/native3/", progress, nativePointer, progress2); + + plog("Validate 3 " + lzip.validateFile(zipSize.ToString(), nativePointer).ToString()); + + plog(); + plog("decompress native 3: " + zres.ToString()); + plog(); + + // Delete the buffer from native memory. + lzip.releaseBuffer(nativePointer); + } + #endregion + + #region File Buffer tests + // these functions demonstrate how to extract data from a zip file in a byte buffer. + void DoDecompression_FileBuffer() { + #if (UNITY_IPHONE || UNITY_IOS || UNITY_STANDALONE_OSX || UNITY_ANDROID || UNITY_STANDALONE_LINUX || UNITY_EDITOR || UNITY_STANDALONE_WIN) + // we read a downloaded zip from the Persistent data path. It could be also a file in a www.bytes buffer. + var fileBuffer = File.ReadAllBytes(ppath + "/testZip.zip"); + + plog("Validate: "+ lzip.validateFile(null, fileBuffer).ToString()); + + + // decompress the downloaded file + zres = lzip.decompress_File(null, ppath+"/", progress, fileBuffer, progress2); + plog("decompress: " + zres.ToString() + " progress: " + progress2[0]); + + + plog("true total files: " + lzip.getTotalFiles(null, fileBuffer) ); + plog("total entries: " + lzip.getTotalEntries(null, fileBuffer) ); + + + // entry exists + bool eres = lzip.entryExists(null, "dir1/dir2/test2.bmp", fileBuffer); + plog("entry exists: " + eres.ToString()); + + + // extract an entry + zres = lzip.extract_entry(null, "dir1/dir2/test2.bmp", ppath + "/test22B.bmp", fileBuffer, progress2); + plog("extract entry: " + zres.ToString() + " progress: " + progress2[0]); + plog(); + + // extract entries using a List + List entries = new List(); + entries.Add("dir1/dir2/test2.bmp"); + entries.Add("dir1/dir2/dir3/Unity_1.jpg"); + zres = lzip.extract_entries(null, entries.ToArray(), ppath + "/entriesFB", fileBuffer, progress2); + plog("extract entries: " + zres.ToString()); + plog(); + + + // get the uncompressed size of a specific file in the zip archive + plog("get entry size: " + lzip.getEntrySize(null, "dir1/dir2/test2.bmp", fileBuffer).ToString()); + plog(); + + + // extract a file in a zip archive to a byte buffer (referenced buffer method) + plog("entry2Buffer1: "+ lzip.entry2Buffer(null,"dir1/dir2/test2.bmp",ref reusableBuffer2, fileBuffer).ToString() ); + //File.WriteAllBytes(ppath + "/out.bmp", reusableBuffer2); + + + // extract a file in a zip archive to a byte buffer (new buffer method) + var newBuffer = lzip.entry2Buffer(null, "dir1/dir2/test2.bmp", fileBuffer); + zres = 0; + if (newBuffer != null) zres = 1; + plog("entry2Buffer2: "+ zres.ToString()); + // write a file out to confirm all was ok + // File.WriteAllBytes(ppath + "/out.bmp", reusableBuffer2); + plog(); + + + // get file info of the zip file (names, uncompressed and compressed sizes) + plog( "total bytes: " + lzip.getFileInfo(null, fileBuffer).ToString()); + + // Look through the ninfo, uinfo and cinfo Lists where the file names and sizes are stored. + if (lzip.ninfo != null) { + for (int i = 0; i < lzip.ninfo.Count; i++) { + log += lzip.ninfo[i] + " - " + lzip.uinfo[i] + " / " + lzip.cinfo[i] + "\n"; + } + } + plog(); + + #endif + } + #endregion + + #region InMemory zip tests + void DoInMemoryTest() { + // make sure we have some files to work with + if(!File.Exists(ppath + "/dir1/dir2/test2.bmp")) { + lzip.decompress_File(ppath + "/testZip.zip"); + } + if(reusableBuffer2.Length ==0 ) lzip.entry2Buffer(ppath + "/testZip.zip", "dir1/dir2/test2.bmp", ref reusableBuffer2); + + //------------------------------------------------------------------------------------------------------------------------------ + //IN MEMORY zip functions + //------------------------------------------------------------------------------------------------------------------------------ + + // first we create an in memory object to reference our in memory zip + // (it is important to delete this object later. see below.) + lzip.inMemory t = new lzip.inMemory(); + + // read a file to a buffer + byte[] reusableBuffer2a = File.ReadAllBytes(ppath + "/dir1/dir2/dir3/Unity_1.jpg"); + + // compress a buffer to an in memory zip using bz2 method. + // The function returns the pointer to the in memory zip buffer. But you can get this also through t.pointer. + lzip.compress_Buf2Mem(t, 9, reusableBuffer2a, "inmem/Unity_1.jpg", null,"1234", true); + + reusableBuffer2a = null; + + // print the in memory zip size in bytes. + plog("inMemory zip size: " + t.size().ToString()); + + // add a second buffer to the in memory zip. If you use the same inMemory object that already has created an inMemory zip file , + // it will append the next one to it, resizing it! + // Appending on an existing inMemory zip is slow as more files are added to it. + // For really fast inMemory zip creation the lower level inMemory functions should be used. (See below.) + lzip.compress_Buf2Mem(t, 9, reusableBuffer2, "inmem/test.bmp", null, "1234", true); + + // print the in memory zip size in bytes. + plog("inMemory zip size: " + t.info[0].ToString()); + + // Example on how to save an in memory zip file to disk. + // + // use the struct public function to get the byte buffer where the inmemory zip was created + var p = t.getZipBuffer(); + + // and save the buffer to disk. + File.WriteAllBytes(ppath+"/MEM.zip", p); + p = null; + + progress2[0] = 0; + + // Example on how to decompress an in memory zip to disk + plog("decompress_Mem2File: " + lzip.decompress_Mem2File(t, ppath+"/", null, progress2,"1234").ToString() + " progress: " + progress2[0].ToString()); + + // a function to get info from an in memory zip. + lzip.getFileInfoMem(t); + + plog(); + + // print out the name, uncompressed and compressed sizes. + if (lzip.ninfo != null) { + for (int i = 0; i < lzip.ninfo.Count; i++) { + log += lzip.ninfo[i] + " - " + lzip.uinfo[i] + " / " + lzip.cinfo[i] + "\n"; + } + } + + plog(); + + // a buffer to perform decompression operations from an in memory zip to it. + byte[] bf = null; + + // a function that decompresses an entry from an in memory zip to a buffer that will get resized to fit the output. + plog("entry2BufferMem: " + lzip.entry2BufferMem(t,"inmem/test.bmp", ref bf, "1234").ToString()); + + // a function that decompresses an entry from an in memory zip to a fixed size buffer. + plog("entry2FixedBufferMem: " + lzip.entry2FixedBufferMem(t, "inmem/test.bmp", ref bf, "1234").ToString()); + + // a function that decompresses an entry from an in memory zip to a new created buffer and returns it. + var bt = lzip.entry2BufferMem(t, "inmem/test.bmp", "1234"); + plog("entry2BufferMem new buffer: " + bt.Length.ToString()); + + // (!) If you don't need anymore the inMemory object use the free_inmemory function to free the occupied memory by the zip (!) + // + lzip.free_inmemory(t); + + plog(); + // ----------------------------------------------------------------------------------------------------------------------------- + + + // Lower level inMemory functions for Faster! compressing multiple files/buffers to memory. + + // Create an in memory object to reference our in memory zip + lzip.inMemory t2 = new lzip.inMemory(); + + // Initiate an inMemory zip archive + lzip.inMemoryZipStart(t2); + + // Read some file to a byte[] buffer (as an example only). + reusableBuffer2a = File.ReadAllBytes(ppath + "/dir1/dir2/dir3/Unity_1.jpg"); + + // Add a buffer as a first entry in the inMemory zip + lzip.inMemoryZipAdd(t2, 9, reusableBuffer2a, "test.jpg"); + + // Add a second buffer as the second entry. + lzip.inMemoryZipAdd(t2, 9, reusableBuffer2, "directory/test.bmp"); + + // !!! -> After finishing adding buffer/files in the inMemory zip we must close it <- !!! + lzip.inMemoryZipClose(t2); + + // Reopen the t2 inMemory zip archive and add 2 more files. They will automatically get appended. + lzip.inMemoryZipStart(t2); + lzip.inMemoryZipAdd(t2, 9, reusableBuffer2a, "newDir/test2.jpg"); + lzip.inMemoryZipAdd(t2, 9, reusableBuffer2, "directory2/test2.bmp"); + lzip.inMemoryZipClose(t2); + + // Write out the compressed size of the inMemory created zip + plog("Size of Low Level inMemory zip: " + t2.size().ToString()); + + // Write a file to disk to make sure that everything was done correct. + File.WriteAllBytes(ppath+"/MEM2.zip", t2.getZipBuffer()); + + // nullify the temp buffer + reusableBuffer2a = null; + + // (!) If you don't need anymore the inMemory object use the free_inmemory function to free the occupied memory by the zip (!) + lzip.free_inmemory(t2); + + plog(); + + //------------------------------------------------------------------------------------------------------------------------------ + // END IN MEMORY zip functions + //------------------------------------------------------------------------------------------------------------------------------ + + } + #endregion + + #region Bz2 tests + void DoGzipBz2Tests() { + //------------------------------------------------------------------------------------------------------------------------- + // GZIP TESTS + //------------------------------------------------------------------------------------------------------------------------- + + // make sure we have some data in one byte[] buffer + if(reusableBuffer2.Length < 1) lzip.entry2Buffer(ppath + "/testZip.zip","dir1/dir2/test2.bmp",ref reusableBuffer2); + + // create a buffer that will store the compressed gzip data. + // it should be at least the size of the input buffer +18 bytes. + var btt = new byte[reusableBuffer2.Length+18]; + + // compress a buffer to gzip format and add gzip header and footer + // returns total size of compressed buffer. + // + // set the last parameter to true if you want to include the compressed size in the gzip. (use the lzip.gzipCompressedSize to get it). + int rr = lzip.gzip(reusableBuffer2,btt,10, true, true); + plog("gzip compressed size: "+ rr); + + + // create a buffer to store the compressed data (optional, if you want to write out a gzip file) + var bt2 = new byte[rr]; + // copy the data to the new buffer + Buffer.BlockCopy(btt, 0, bt2, 0, rr); + + // write a .gz file + File.WriteAllBytes(ppath+"/test2.bmp.gz", bt2); + + // create a buffer to decompress a gzip buffer + var bt3 = new byte[lzip.gzipUncompressedSize(bt2)]; + + // decompress the gzip compressed buffer + int gzres = lzip.unGzip(bt2, bt3); + //int gzres = lzip.unGzip2(bt2, bt3); // same as UnGzip assuming the gzip buffer has a gzip header. + + if(gzres > 0) { File.WriteAllBytes(ppath+"/test2GZIP.bmp", bt3); plog("gzip decompression: success " + gzres.ToString());} + else {plog("gzip decompression error: " + gzres.ToString());} + + btt=null; bt2=null; bt3=null; + plog(); + + // gzip file system tests + + // create a ulong progress variable. For realtime report call the functions from a Thread. + ulong[] gzipProgress = new ulong[1]; + // create a gzip archive + plog("Gzip file creation: " + lzip.gzipFile(ppath + "/test2GZIP.bmp", ppath + "/Ftest2GZIP.bmp.gz", 10, gzipProgress).ToString() + " progress: " + gzipProgress[0].ToString()); + + // extract a gzip archive + plog("Gzip file decompression: " + lzip.ungzipFile(ppath + "/Ftest2GZIP.bmp.gz", ppath + "/Ftest2GZIP.bmp", gzipProgress).ToString() + " progress: " + gzipProgress[0].ToString()); + plog(); + + //------------------------------------------------------------------------------------------------------------------------- + // BZIP2 TESTS + //------------------------------------------------------------------------------------------------------------------------- + + plog("bz2 creation: " + lzip.bz2Create( ppath + "/Ftest2GZIP.bmp", ppath + "/Ftest2GZIP.bmp.bz2", 9, gzipProgress).ToString() + " progress: " + gzipProgress[0].ToString()); + plog("bz2 extract: " + lzip.bz2Decompress( ppath + "/Ftest2GZIP.bmp.bz2", ppath + "/Ftest2GZIP-Bz2.bmp", gzipProgress).ToString() + " progress: " + gzipProgress[0].ToString()); + plog(); + } + #endregion + + #region Tar tests + // The tar tests + void DoTarTests() { + // make sure we have some files to work with + if(!Directory.Exists(ppath + "/mergedTests")) DoDecompression_Merged(); + log = ""; + + ulong [] tarProgress = new ulong[1]; + tarProgress[0] = 0; + + // Windows only (other platforms don't need this). + #if (UNITY_EDITOR_WIN || UNITY_STANDALONE_WIN) + lzip.setTarEncoding(65001);//CP_UTF8 = 65001 // CP_OEMCP/UNICODE = 1 + #endif + + plog("Create Tar: " + lzip.tarDir(ppath+"/mergedTests", ppath + "/out.tar", true, null, tarProgress).ToString()); + plog("processed: " + tarProgress[0]); + plog(); + + tarProgress[0] = 0; + + plog("Extract Tar: " + lzip.tarExtract(ppath + "/out.tar", ppath + "/tarOut", null, tarProgress).ToString()); + plog("processed: " + tarProgress[0]); + plog(); + + plog("Extract Tar entry: " + lzip.tarExtractEntry(ppath + "/out.tar", "mergedTests/dir1/dir2/test2.bmp", ppath + "/tarOut2", true, tarProgress).ToString()); + plog("Extract Tar entry absolute Path: " + lzip.tarExtractEntry(ppath + "/out.tar", "mergedTests/overriden.jpg", ppath + "/outTarAbsolute.jpeg", false, tarProgress).ToString()); + plog(); + + plog("tar.gz creation: " + lzip.gzipFile( ppath + "/out.tar", ppath + "/out.tar.gz", 10).ToString()); + plog("tar.bz2 creation: " + lzip.bz2Create( ppath + "/out.tar", ppath + "/out.tar.bz2", 9).ToString()); + plog(); + + lzip.getTarInfo(ppath + "/out.tar"); + + if(lzip.ninfo != null && lzip.ninfo.Count > 0) { + for(int i=0; i < lzip.ninfo.Count; i++){ + plog("Entry no: " + (i+1).ToString() + " " + lzip.ninfo[i] +" size: " + lzip.uinfo[i].ToString() ); + } + } + + } + #endregion + + #region Merged zip tests + // The merged/hidden zip file tests. + void DoDecompression_Merged() { + + // if the merged file does not exist, create it. + // (create a combination of a jpg and a zip file attached to it from existing files). + if(!File.Exists(ppath + "/merged.jpg")) { + if(!File.Exists(ppath + "/dir1/dir2/dir3/Unity_1.jpg")){ + lzip.decompress_File(ppath + "/testZip.zip", ppath+"/", progress,null, progress2); + } + + var bf1 = File.ReadAllBytes(ppath + "/dir1/dir2/dir3/Unity_1.jpg"); + var bf2 = File.ReadAllBytes(ppath + "/testZip.zip"); + + byte[] fb = new byte[bf1.Length + bf2.Length]; + + Array.Copy(bf1, 0, fb, 0, bf1.Length); + Array.Copy(bf2, 0, fb, bf1.Length, bf2.Length); + + File.WriteAllBytes(ppath + "/merged.jpg", fb); + + bf1 = null; bf2 = null; fb = null; + // if the merged file exists, perfom some operations with it. + } + + // get entry info of the merged zip. (Can be used also for regular zip archives to get extended info on the entries. After calling this iterate through the lzip.zinfo List.) + plog("Get Info of merged zip: " + lzip.getZipInfo(ppath + "/merged.jpg").ToString()); + + // if the zip has entries + if(lzip.zinfo != null && lzip.zinfo.Count > 0) { + for(int i=0; i < lzip.zinfo.Count; i++){ + plog("Entry no: " + (i+1).ToString() + " " + lzip.zinfo[i].filename +" uncompressed: " + lzip.zinfo[i].UncompressedSize.ToString() + " compressed: " + lzip.zinfo[i].CompressedSize.ToString()); + } + } + plog(); + + // Extract the whole zip to disk + int[] prog = new int[1]; + ulong[] byteProgress = new ulong[1]; + + plog("Decompress to disk from merged file: " + lzip.decompressZipMerged(ppath + "/merged.jpg", ppath + "/mergedTests/", prog, byteProgress).ToString() + " progress: " + byteProgress[0].ToString()); + + // extract an entry from the merged zip that resides in the file system and override the entry name. + plog("Extract entry to disk from merged file: " + lzip.entry2FileMerged(ppath + "/merged.jpg", "dir1/dir2/dir3/Unity_1.jpg", ppath + "/mergedTests", "overriden.jpg")); + + plog(); + // now let's say we have the above archive in a memory buffer. + var tempBuffer = File.ReadAllBytes(ppath + "/merged.jpg"); + + // get the zip entries from the merged archive in the buffer + plog("Get Info of merged zip in Buffer: " + lzip.getZipInfoMerged(tempBuffer).ToString()); + + if(lzip.zinfo != null && lzip.zinfo.Count > 0) { + for(int i=0; i < lzip.zinfo.Count; i++){ + plog("Entry no: " + (i+1).ToString() + " " + lzip.zinfo[i].filename +" uncompressed: " + lzip.zinfo[i].UncompressedSize.ToString() + " compressed: " + lzip.zinfo[i].CompressedSize.ToString()); + } + } + + plog(); + + // decompress to disk from a merged file that resides in a buffer. + plog("Decompress to disk from merged buffer: " + lzip.decompressZipMerged(tempBuffer, ppath + "/mergedTests/", prog).ToString()); + + // extract an entry from the merged zip in the buffer to disk. + plog("Entry2File from merged buffer: " + lzip.entry2FileMerged( tempBuffer, "dir1/dir2/dir3/Unity_1.jpg", ppath + "/mergedTests").ToString()); + + plog(); + + // extract an entry from a merged file in the file system to a new buffer. + var newBuffer = lzip.entry2BufferMerged(ppath + "/merged.jpg", "dir1/dir2/dir3/Unity_1.jpg"); + plog("Size of entry in new buffer 1: " + newBuffer.Length); + newBuffer = null; + + // extract an entry from a merged file in the file system to a fixed sized buffer. + byte[] fixedSizedBuffer = new byte[11 * 1024]; + plog("Size of entry in fixed buffer 1: " + lzip.entry2FixedBufferMerged(ppath + "/merged.jpg", "dir1/dir2/dir3/Unity_1.jpg", ref fixedSizedBuffer).ToString()); + + plog(); + // extract an entry from a merged file in a buffer to a new buffer. + var newBuffer2 = lzip.entry2BufferMerged(tempBuffer, "dir1/dir2/dir3/Unity_1.jpg"); + plog("Size of entry in new buffer 2: " + newBuffer2.Length); + + // extract an entry from a merged file in a buffer to a fixed sized buffer. + plog("Size of entry in fixed buffer 2: " + lzip.entry2FixedBufferMerged(tempBuffer, "dir1/dir2/dir3/Unity_1.jpg", ref fixedSizedBuffer).ToString()); + + fixedSizedBuffer = null; + tempBuffer = null; + } + #endregion + + + + IEnumerator DownloadZipFile() { + + myFile = "testZip.zip"; + + // make sure a previous zip file having the same name with the one we want to download does not exist in the ppath folder + if (File.Exists(ppath + "/" + myFile)) { downloadDone = true; yield break; }//File.Delete(ppath + "/" + myFile); + + Debug.Log("starting download"); + + // replace the link to the zip file with your own (although this will work also) + using (UnityWebRequest www = UnityWebRequest.Get("https://dl.dropboxusercontent.com/s/xve34ldz3pqvmh1/" + myFile)) { + + yield return www.SendWebRequest(); + + if (www.error != null) + { + Debug.Log(www.error); + } else { + downloadDone = true; + + // write the downloaded zip file to the ppath directory so we can have access to it + // depending on the Install Location you have set for your app, set the Write Access accordingly! + File.WriteAllBytes(ppath + "/" + myFile, www.downloadHandler.data); + + Debug.Log("download done"); + } + } + } + + +#else + void Start(){ + Debug.Log("Does not work on WebPlayer!"); + } +#endif + +} + diff --git a/Assets/ADL-Plugins/zip/Scripts/testZip.cs.meta b/Assets/ADL-Plugins/zip/Scripts/testZip.cs.meta new file mode 100644 index 00000000..64adc338 --- /dev/null +++ b/Assets/ADL-Plugins/zip/Scripts/testZip.cs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c50185126d7abae4d91ed7d09e1c80a7 +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: diff --git a/Assets/ADL-Plugins/zip/testWebGLtvOS.unity b/Assets/ADL-Plugins/zip/testWebGLtvOS.unity new file mode 100644 index 00000000..9eeaea35 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testWebGLtvOS.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 1 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 256 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: 4b79e9aa379d9c843a96821d6b6dd523, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &1517965436 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1517965441} + - component: {fileID: 1517965440} + - component: {fileID: 1517965438} + - component: {fileID: 1517965437} + - component: {fileID: 1517965442} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &1517965437 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1517965436} + m_Enabled: 1 +--- !u!124 &1517965438 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1517965436} + m_Enabled: 1 +--- !u!20 &1517965440 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1517965436} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.11082655, g: 0.33715874, b: 0.48620686, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 0 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &1517965441 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1517965436} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &1517965442 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1517965436} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: b4df1b211f2ec374eb619529f7cc30a8, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/zip/testWebGLtvOS.unity.meta b/Assets/ADL-Plugins/zip/testWebGLtvOS.unity.meta new file mode 100644 index 00000000..32e258f4 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testWebGLtvOS.unity.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: 71c08b698cb72af408583c60884eaafa +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting b/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting new file mode 100644 index 00000000..0c499d10 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: testWebGLtvOSSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 1 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 256 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 500 + m_PVREnvironmentSampleCount: 500 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting.meta b/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting.meta new file mode 100644 index 00000000..6836fad2 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testWebGLtvOSSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4b79e9aa379d9c843a96821d6b6dd523 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/ADL-Plugins/zip/testZip.unity b/Assets/ADL-Plugins/zip/testZip.unity new file mode 100644 index 00000000..4afecac4 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testZip.unity @@ -0,0 +1,231 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientEquatorColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientGroundColor: {r: 0.2, g: 0.2, b: 0.2, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 3 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0, g: 0, b: 0, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &4 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 1 + m_BakeResolution: 50 + m_AtlasSize: 1024 + m_AO: 1 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 0 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 256 + m_ReflectionCompression: 2 + m_MixedBakeMode: 1 + m_BakeBackend: 0 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 4890085278179872738, guid: ad16ba99cbfa87648a07ac8be26659b7, type: 2} +--- !u!196 &5 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 2 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666666 + manualTileSize: 0 + tileSize: 256 + accuratePlacement: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &2072008191 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2072008196} + - component: {fileID: 2072008195} + - component: {fileID: 2072008193} + - component: {fileID: 2072008192} + - component: {fileID: 2072008197} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &2072008192 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2072008191} + m_Enabled: 1 +--- !u!124 &2072008193 +Behaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2072008191} + m_Enabled: 1 +--- !u!20 &2072008195 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2072008191} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.12943341, g: 0.14304233, b: 0.1544118, a: 0.019607844} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_FocalLength: 50 + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 0 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &2072008196 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2072008191} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &2072008197 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2072008191} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: c50185126d7abae4d91ed7d09e1c80a7, type: 3} + m_Name: + m_EditorClassIdentifier: diff --git a/Assets/ADL-Plugins/zip/testZip.unity.meta b/Assets/ADL-Plugins/zip/testZip.unity.meta new file mode 100644 index 00000000..aba6c221 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testZip.unity.meta @@ -0,0 +1,4 @@ +fileFormatVersion: 2 +guid: 9dee9a39ceabb304f902f16e9ade17ae +DefaultImporter: + userData: diff --git a/Assets/ADL-Plugins/zip/testZipSettings.lighting b/Assets/ADL-Plugins/zip/testZipSettings.lighting new file mode 100644 index 00000000..e190430a --- /dev/null +++ b/Assets/ADL-Plugins/zip/testZipSettings.lighting @@ -0,0 +1,64 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!850595691 &4890085278179872738 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: testZipSettings + serializedVersion: 4 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 0 + m_BakeBackend: 0 + m_LightmapMaxSize: 1024 + m_BakeResolution: 50 + m_Padding: 2 + m_LightmapCompression: 0 + m_AO: 1 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 1 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 1 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 256 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentMIS: 0 + m_PVRFilteringMode: 0 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 diff --git a/Assets/ADL-Plugins/zip/testZipSettings.lighting.meta b/Assets/ADL-Plugins/zip/testZipSettings.lighting.meta new file mode 100644 index 00000000..0da8e4e9 --- /dev/null +++ b/Assets/ADL-Plugins/zip/testZipSettings.lighting.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ad16ba99cbfa87648a07ac8be26659b7 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 4890085278179872738 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/InputSystem_Actions.inputactions b/Assets/InputSystem_Actions.inputactions new file mode 100644 index 00000000..1a12cb91 --- /dev/null +++ b/Assets/InputSystem_Actions.inputactions @@ -0,0 +1,1057 @@ +{ + "name": "InputSystem_Actions", + "maps": [ + { + "name": "Player", + "id": "df70fa95-8a34-4494-b137-73ab6b9c7d37", + "actions": [ + { + "name": "Move", + "type": "Value", + "id": "351f2ccd-1f9f-44bf-9bec-d62ac5c5f408", + "expectedControlType": "Vector2", + "processors": "", + "interactions": "", + "initialStateCheck": true + }, + { + "name": "Look", + "type": "Value", + "id": "6b444451-8a00-4d00-a97e-f47457f736a8", + "expectedControlType": "Vector2", + "processors": "", + "interactions": "", + "initialStateCheck": true + }, + { + "name": "Attack", + "type": "Button", + "id": "6c2ab1b8-8984-453a-af3d-a3c78ae1679a", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Interact", + "type": "Button", + "id": "852140f2-7766-474d-8707-702459ba45f3", + "expectedControlType": "Button", + "processors": "", + "interactions": "Hold", + "initialStateCheck": false + }, + { + "name": "Crouch", + "type": "Button", + "id": "27c5f898-bc57-4ee1-8800-db469aca5fe3", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Jump", + "type": "Button", + "id": "f1ba0d36-48eb-4cd5-b651-1c94a6531f70", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Previous", + "type": "Button", + "id": "2776c80d-3c14-4091-8c56-d04ced07a2b0", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Next", + "type": "Button", + "id": "b7230bb6-fc9b-4f52-8b25-f5e19cb2c2ba", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Sprint", + "type": "Button", + "id": "641cd816-40e6-41b4-8c3d-04687c349290", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + } + ], + "bindings": [ + { + "name": "", + "id": "978bfe49-cc26-4a3d-ab7b-7d7a29327403", + "path": "/leftStick", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Move", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "WASD", + "id": "00ca640b-d935-4593-8157-c05846ea39b3", + "path": "Dpad", + "interactions": "", + "processors": "", + "groups": "", + "action": "Move", + "isComposite": true, + "isPartOfComposite": false + }, + { + "name": "up", + "id": "e2062cb9-1b15-46a2-838c-2f8d72a0bdd9", + "path": "/w", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "up", + "id": "8180e8bd-4097-4f4e-ab88-4523101a6ce9", + "path": "/upArrow", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "320bffee-a40b-4347-ac70-c210eb8bc73a", + "path": "/s", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "1c5327b5-f71c-4f60-99c7-4e737386f1d1", + "path": "/downArrow", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "d2581a9b-1d11-4566-b27d-b92aff5fabbc", + "path": "/a", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "2e46982e-44cc-431b-9f0b-c11910bf467a", + "path": "/leftArrow", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "fcfe95b8-67b9-4526-84b5-5d0bc98d6400", + "path": "/d", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "77bff152-3580-4b21-b6de-dcd0c7e41164", + "path": "/rightArrow", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Move", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "", + "id": "1635d3fe-58b6-4ba9-a4e2-f4b964f6b5c8", + "path": "/{Primary2DAxis}", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "Move", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "3ea4d645-4504-4529-b061-ab81934c3752", + "path": "/stick", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Move", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "c1f7a91b-d0fd-4a62-997e-7fb9b69bf235", + "path": "/rightStick", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Look", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "8c8e490b-c610-4785-884f-f04217b23ca4", + "path": "/delta", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse;Touch", + "action": "Look", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "3e5f5442-8668-4b27-a940-df99bad7e831", + "path": "/{Hatswitch}", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Look", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "143bb1cd-cc10-4eca-a2f0-a3664166fe91", + "path": "/buttonWest", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "05f6913d-c316-48b2-a6bb-e225f14c7960", + "path": "/leftButton", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "886e731e-7071-4ae4-95c0-e61739dad6fd", + "path": "/primaryTouch/tap", + "interactions": "", + "processors": "", + "groups": ";Touch", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "ee3d0cd2-254e-47a7-a8cb-bc94d9658c54", + "path": "/trigger", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "8255d333-5683-4943-a58a-ccb207ff1dce", + "path": "/{PrimaryAction}", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "b3c1c7f0-bd20-4ee7-a0f1-899b24bca6d7", + "path": "/enter", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Attack", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "cbac6039-9c09-46a1-b5f2-4e5124ccb5ed", + "path": "/2", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Next", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "e15ca19d-e649-4852-97d5-7fe8ccc44e94", + "path": "/dpad/right", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Next", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "f2e9ba44-c423-42a7-ad56-f20975884794", + "path": "/leftShift", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Sprint", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "8cbb2f4b-a784-49cc-8d5e-c010b8c7f4e6", + "path": "/leftStickPress", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Sprint", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "d8bf24bf-3f2f-4160-a97c-38ec1eb520ba", + "path": "/trigger", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "Sprint", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "eb40bb66-4559-4dfa-9a2f-820438abb426", + "path": "/space", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Jump", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "daba33a1-ad0c-4742-a909-43ad1cdfbeb6", + "path": "/buttonSouth", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Jump", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "603f3daf-40bd-4854-8724-93e8017f59e3", + "path": "/secondaryButton", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "Jump", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "1534dc16-a6aa-499d-9c3a-22b47347b52a", + "path": "/1", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Previous", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "25060bbd-a3a6-476e-8fba-45ae484aad05", + "path": "/dpad/left", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Previous", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "1c04ea5f-b012-41d1-a6f7-02e963b52893", + "path": "/e", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Interact", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "b3f66d0b-7751-423f-908b-a11c5bd95930", + "path": "/buttonNorth", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Interact", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "4f4649ac-64a8-4a73-af11-b3faef356a4d", + "path": "/buttonEast", + "interactions": "", + "processors": "", + "groups": "Gamepad", + "action": "Crouch", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "36e52cba-0905-478e-a818-f4bfcb9f3b9a", + "path": "/c", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Crouch", + "isComposite": false, + "isPartOfComposite": false + } + ] + }, + { + "name": "UI", + "id": "272f6d14-89ba-496f-b7ff-215263d3219f", + "actions": [ + { + "name": "Navigate", + "type": "PassThrough", + "id": "c95b2375-e6d9-4b88-9c4c-c5e76515df4b", + "expectedControlType": "Vector2", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Submit", + "type": "Button", + "id": "7607c7b6-cd76-4816-beef-bd0341cfe950", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Cancel", + "type": "Button", + "id": "15cef263-9014-4fd5-94d9-4e4a6234a6ef", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "Point", + "type": "PassThrough", + "id": "32b35790-4ed0-4e9a-aa41-69ac6d629449", + "expectedControlType": "Vector2", + "processors": "", + "interactions": "", + "initialStateCheck": true + }, + { + "name": "Click", + "type": "PassThrough", + "id": "3c7022bf-7922-4f7c-a998-c437916075ad", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": true + }, + { + "name": "RightClick", + "type": "PassThrough", + "id": "44b200b1-1557-4083-816c-b22cbdf77ddf", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "MiddleClick", + "type": "PassThrough", + "id": "dad70c86-b58c-4b17-88ad-f5e53adf419e", + "expectedControlType": "Button", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "ScrollWheel", + "type": "PassThrough", + "id": "0489e84a-4833-4c40-bfae-cea84b696689", + "expectedControlType": "Vector2", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "TrackedDevicePosition", + "type": "PassThrough", + "id": "24908448-c609-4bc3-a128-ea258674378a", + "expectedControlType": "Vector3", + "processors": "", + "interactions": "", + "initialStateCheck": false + }, + { + "name": "TrackedDeviceOrientation", + "type": "PassThrough", + "id": "9caa3d8a-6b2f-4e8e-8bad-6ede561bd9be", + "expectedControlType": "Quaternion", + "processors": "", + "interactions": "", + "initialStateCheck": false + } + ], + "bindings": [ + { + "name": "Gamepad", + "id": "809f371f-c5e2-4e7a-83a1-d867598f40dd", + "path": "2DVector", + "interactions": "", + "processors": "", + "groups": "", + "action": "Navigate", + "isComposite": true, + "isPartOfComposite": false + }, + { + "name": "up", + "id": "14a5d6e8-4aaf-4119-a9ef-34b8c2c548bf", + "path": "/leftStick/up", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "up", + "id": "9144cbe6-05e1-4687-a6d7-24f99d23dd81", + "path": "/rightStick/up", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "2db08d65-c5fb-421b-983f-c71163608d67", + "path": "/leftStick/down", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "58748904-2ea9-4a80-8579-b500e6a76df8", + "path": "/rightStick/down", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "8ba04515-75aa-45de-966d-393d9bbd1c14", + "path": "/leftStick/left", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "712e721c-bdfb-4b23-a86c-a0d9fcfea921", + "path": "/rightStick/left", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "fcd248ae-a788-4676-a12e-f4d81205600b", + "path": "/leftStick/right", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "1f04d9bc-c50b-41a1-bfcc-afb75475ec20", + "path": "/rightStick/right", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "", + "id": "fb8277d4-c5cd-4663-9dc7-ee3f0b506d90", + "path": "/dpad", + "interactions": "", + "processors": "", + "groups": ";Gamepad", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "Joystick", + "id": "e25d9774-381c-4a61-b47c-7b6b299ad9f9", + "path": "2DVector", + "interactions": "", + "processors": "", + "groups": "", + "action": "Navigate", + "isComposite": true, + "isPartOfComposite": false + }, + { + "name": "up", + "id": "3db53b26-6601-41be-9887-63ac74e79d19", + "path": "/stick/up", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "0cb3e13e-3d90-4178-8ae6-d9c5501d653f", + "path": "/stick/down", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "0392d399-f6dd-4c82-8062-c1e9c0d34835", + "path": "/stick/left", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "942a66d9-d42f-43d6-8d70-ecb4ba5363bc", + "path": "/stick/right", + "interactions": "", + "processors": "", + "groups": "Joystick", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "Keyboard", + "id": "ff527021-f211-4c02-933e-5976594c46ed", + "path": "2DVector", + "interactions": "", + "processors": "", + "groups": "", + "action": "Navigate", + "isComposite": true, + "isPartOfComposite": false + }, + { + "name": "up", + "id": "563fbfdd-0f09-408d-aa75-8642c4f08ef0", + "path": "/w", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "up", + "id": "eb480147-c587-4a33-85ed-eb0ab9942c43", + "path": "/upArrow", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "2bf42165-60bc-42ca-8072-8c13ab40239b", + "path": "/s", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "down", + "id": "85d264ad-e0a0-4565-b7ff-1a37edde51ac", + "path": "/downArrow", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "74214943-c580-44e4-98eb-ad7eebe17902", + "path": "/a", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "left", + "id": "cea9b045-a000-445b-95b8-0c171af70a3b", + "path": "/leftArrow", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "8607c725-d935-4808-84b1-8354e29bab63", + "path": "/d", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "right", + "id": "4cda81dc-9edd-4e03-9d7c-a71a14345d0b", + "path": "/rightArrow", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Navigate", + "isComposite": false, + "isPartOfComposite": true + }, + { + "name": "", + "id": "9e92bb26-7e3b-4ec4-b06b-3c8f8e498ddc", + "path": "*/{Submit}", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse;Gamepad;Touch;Joystick;XR", + "action": "Submit", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "82627dcc-3b13-4ba9-841d-e4b746d6553e", + "path": "*/{Cancel}", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse;Gamepad;Touch;Joystick;XR", + "action": "Cancel", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "c52c8e0b-8179-41d3-b8a1-d149033bbe86", + "path": "/position", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Point", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "e1394cbc-336e-44ce-9ea8-6007ed6193f7", + "path": "/position", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "Point", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "5693e57a-238a-46ed-b5ae-e64e6e574302", + "path": "/touch*/position", + "interactions": "", + "processors": "", + "groups": "Touch", + "action": "Point", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "4faf7dc9-b979-4210-aa8c-e808e1ef89f5", + "path": "/leftButton", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Click", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "8d66d5ba-88d7-48e6-b1cd-198bbfef7ace", + "path": "/tip", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "Click", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "47c2a644-3ebc-4dae-a106-589b7ca75b59", + "path": "/touch*/press", + "interactions": "", + "processors": "", + "groups": "Touch", + "action": "Click", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "bb9e6b34-44bf-4381-ac63-5aa15d19f677", + "path": "/trigger", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "Click", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "38c99815-14ea-4617-8627-164d27641299", + "path": "/scroll", + "interactions": "", + "processors": "", + "groups": ";Keyboard&Mouse", + "action": "ScrollWheel", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "4c191405-5738-4d4b-a523-c6a301dbf754", + "path": "/rightButton", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "RightClick", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "24066f69-da47-44f3-a07e-0015fb02eb2e", + "path": "/middleButton", + "interactions": "", + "processors": "", + "groups": "Keyboard&Mouse", + "action": "MiddleClick", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "7236c0d9-6ca3-47cf-a6ee-a97f5b59ea77", + "path": "/devicePosition", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "TrackedDevicePosition", + "isComposite": false, + "isPartOfComposite": false + }, + { + "name": "", + "id": "23e01e3a-f935-4948-8d8b-9bcac77714fb", + "path": "/deviceRotation", + "interactions": "", + "processors": "", + "groups": "XR", + "action": "TrackedDeviceOrientation", + "isComposite": false, + "isPartOfComposite": false + } + ] + } + ], + "controlSchemes": [ + { + "name": "Keyboard&Mouse", + "bindingGroup": "Keyboard&Mouse", + "devices": [ + { + "devicePath": "", + "isOptional": false, + "isOR": false + }, + { + "devicePath": "", + "isOptional": false, + "isOR": false + } + ] + }, + { + "name": "Gamepad", + "bindingGroup": "Gamepad", + "devices": [ + { + "devicePath": "", + "isOptional": false, + "isOR": false + } + ] + }, + { + "name": "Touch", + "bindingGroup": "Touch", + "devices": [ + { + "devicePath": "", + "isOptional": false, + "isOR": false + } + ] + }, + { + "name": "Joystick", + "bindingGroup": "Joystick", + "devices": [ + { + "devicePath": "", + "isOptional": false, + "isOR": false + } + ] + }, + { + "name": "XR", + "bindingGroup": "XR", + "devices": [ + { + "devicePath": "", + "isOptional": false, + "isOR": false + } + ] + } + ] +} \ No newline at end of file diff --git a/Assets/InputSystem_Actions.inputactions.meta b/Assets/InputSystem_Actions.inputactions.meta new file mode 100644 index 00000000..6b38b043 --- /dev/null +++ b/Assets/InputSystem_Actions.inputactions.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 052faaac586de48259a63d0c4782560b +ScriptedImporter: + internalIDToNameTable: [] + externalObjects: {} + serializedVersion: 2 + userData: + assetBundleName: + assetBundleVariant: + script: {fileID: 11500000, guid: 8404be70184654265930450def6a9037, type: 3} + generateWrapperCode: 0 + wrapperCodePath: + wrapperClassName: + wrapperCodeNamespace: diff --git a/Assets/Plugins.meta b/Assets/Plugins.meta new file mode 100644 index 00000000..4508002f --- /dev/null +++ b/Assets/Plugins.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9ae2791bcb52c8c40a2238ea182042d1 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Plugins/sqlite3.dll b/Assets/Plugins/sqlite3.dll new file mode 100644 index 00000000..ce7c02c4 Binary files /dev/null and b/Assets/Plugins/sqlite3.dll differ diff --git a/Assets/Plugins/sqlite3.dll.meta b/Assets/Plugins/sqlite3.dll.meta new file mode 100644 index 00000000..89297350 --- /dev/null +++ b/Assets/Plugins/sqlite3.dll.meta @@ -0,0 +1,59 @@ +fileFormatVersion: 2 +guid: 6e6d471cdfddb7044a4e97fe43b6eb39 +PluginImporter: + externalObjects: {} + serializedVersion: 3 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 1 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + Any: + enabled: 1 + settings: + Exclude Editor: 0 + Exclude Linux64: 1 + Exclude OSXUniversal: 1 + Exclude WebGL: 0 + Exclude Win: 0 + Exclude Win64: 0 + Exclude WindowsStoreApps: 0 + Editor: + enabled: 1 + settings: + CPU: x86_64 + DefaultValueInitialized: true + OS: AnyOS + Linux64: + enabled: 0 + settings: + CPU: x86_64 + OSXUniversal: + enabled: 0 + settings: + CPU: None + WebGL: + enabled: 1 + settings: {} + Win: + enabled: 1 + settings: + CPU: x86 + Win64: + enabled: 1 + settings: + CPU: x86_64 + WindowsStoreApps: + enabled: 1 + settings: + CPU: X86 + DontProcess: false + PlaceholderPath: + SDK: AnySDK + ScriptingBackend: AnyScriptingBackend + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Readme.asset b/Assets/Readme.asset new file mode 100644 index 00000000..77c2f83c --- /dev/null +++ b/Assets/Readme.asset @@ -0,0 +1,34 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fcf7219bab7fe46a1ad266029b2fee19, type: 3} + m_Name: Readme + m_EditorClassIdentifier: + icon: {fileID: 2800000, guid: 727a75301c3d24613a3ebcec4a24c2c8, type: 3} + title: URP Empty Template + sections: + - heading: Welcome to the Universal Render Pipeline + text: This template includes the settings and assets you need to start creating with the Universal Render Pipeline. + linkText: + url: + - heading: URP Documentation + text: + linkText: Read more about URP + url: https://docs.unity3d.com/Packages/com.unity.render-pipelines.universal@latest + - heading: Forums + text: + linkText: Get answers and support + url: https://forum.unity.com/forums/universal-render-pipeline.383/ + - heading: Report bugs + text: + linkText: Submit a report + url: https://unity3d.com/unity/qa/bug-reporting + loadedLayout: 1 diff --git a/Assets/Readme.asset.meta b/Assets/Readme.asset.meta new file mode 100644 index 00000000..ab3ad453 --- /dev/null +++ b/Assets/Readme.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8105016687592461f977c054a80ce2f2 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 0 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Resources.meta b/Assets/Resources.meta new file mode 100644 index 00000000..fb94fbb1 --- /dev/null +++ b/Assets/Resources.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d3420ee8a58589b478abdf61f0ffdfc2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Resources/Prefabs.meta b/Assets/Resources/Prefabs.meta new file mode 100644 index 00000000..455d5928 --- /dev/null +++ b/Assets/Resources/Prefabs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ac39743c61a78154c9e25fb9e1d3cb52 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Resources/log4net.editor.xml b/Assets/Resources/log4net.editor.xml new file mode 100644 index 00000000..1aa446ad --- /dev/null +++ b/Assets/Resources/log4net.editor.xml @@ -0,0 +1,38 @@ + + + + + + + + + + + A + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/Assets/Resources/log4net.editor.xml.meta b/Assets/Resources/log4net.editor.xml.meta new file mode 100644 index 00000000..60dfca78 --- /dev/null +++ b/Assets/Resources/log4net.editor.xml.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 67e5f58c4cfb73841ad93135e9691f97 +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Resources/log4net.runtime.xml b/Assets/Resources/log4net.runtime.xml new file mode 100644 index 00000000..9cc254f1 --- /dev/null +++ b/Assets/Resources/log4net.runtime.xml @@ -0,0 +1,38 @@ + + + + + + + + + + + A + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/Assets/Resources/log4net.runtime.xml.meta b/Assets/Resources/log4net.runtime.xml.meta new file mode 100644 index 00000000..403a19ae --- /dev/null +++ b/Assets/Resources/log4net.runtime.xml.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: ed42a5456cac54c4bab457ab1209287f +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scenes.meta b/Assets/Scenes.meta new file mode 100644 index 00000000..e59fb459 --- /dev/null +++ b/Assets/Scenes.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9c53962885c2c4f449125a979d6ad240 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scenes/Main.unity b/Assets/Scenes/Main.unity new file mode 100644 index 00000000..d3890104 --- /dev/null +++ b/Assets/Scenes/Main.unity @@ -0,0 +1,480 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 10 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.212, g: 0.227, b: 0.259, a: 1} + m_AmbientEquatorColor: {r: 0.114, g: 0.125, b: 0.133, a: 1} + m_AmbientGroundColor: {r: 0.047, g: 0.043, b: 0.035, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 0 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 10304, guid: 0000000000000000f000000000000000, type: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &3 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 13 + m_BakeOnSceneLoad: 0 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 0 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 2 + m_BakeResolution: 40 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 1 + m_ReflectionCompression: 2 + m_MixedBakeMode: 2 + m_BakeBackend: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 256 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 1 + m_PVRDenoiserTypeDirect: 1 + m_PVRDenoiserTypeIndirect: 1 + m_PVRDenoiserTypeAO: 1 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 1 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 20201, guid: 0000000000000000f000000000000000, type: 0} + m_LightingSettings: {fileID: 0} +--- !u!196 &4 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 3 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666667 + manualTileSize: 0 + tileSize: 256 + buildHeightMesh: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &330585543 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 330585546} + - component: {fileID: 330585545} + - component: {fileID: 330585544} + - component: {fileID: 330585547} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!81 &330585544 +AudioListener: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 330585543} + m_Enabled: 1 +--- !u!20 &330585545 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 330585543} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 1 + m_BackGroundColor: {r: 0.19215687, g: 0.3019608, b: 0.4745098, a: 0} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_Iso: 200 + m_ShutterSpeed: 0.005 + m_Aperture: 16 + m_FocusDistance: 10 + m_FocalLength: 50 + m_BladeCount: 5 + m_Curvature: {x: 2, y: 11} + m_BarrelClipping: 0.25 + m_Anamorphism: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 1 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &330585546 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 330585543} + serializedVersion: 2 + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &330585547 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 330585543} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: a79441f348de89743a2939f4d699eac1, type: 3} + m_Name: + m_EditorClassIdentifier: + m_RenderShadows: 1 + m_RequiresDepthTextureOption: 2 + m_RequiresOpaqueTextureOption: 2 + m_CameraType: 0 + m_Cameras: [] + m_RendererIndex: -1 + m_VolumeLayerMask: + serializedVersion: 2 + m_Bits: 1 + m_VolumeTrigger: {fileID: 0} + m_VolumeFrameworkUpdateModeOption: 2 + m_RenderPostProcessing: 1 + m_Antialiasing: 0 + m_AntialiasingQuality: 2 + m_StopNaN: 0 + m_Dithering: 0 + m_ClearDepth: 1 + m_AllowXRRendering: 1 + m_AllowHDROutput: 1 + m_UseScreenCoordOverride: 0 + m_ScreenSizeOverride: {x: 0, y: 0, z: 0, w: 0} + m_ScreenCoordScaleBias: {x: 0, y: 0, z: 0, w: 0} + m_RequiresDepthTexture: 0 + m_RequiresColorTexture: 0 + m_Version: 2 + m_TaaSettings: + m_Quality: 3 + m_FrameInfluence: 0.1 + m_JitterScale: 1 + m_MipBias: 0 + m_VarianceClampScale: 0.9 + m_ContrastAdaptiveSharpening: 0 +--- !u!1 &410087039 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 410087041} + - component: {fileID: 410087040} + - component: {fileID: 410087042} + m_Layer: 0 + m_Name: Directional Light + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!108 &410087040 +Light: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 410087039} + m_Enabled: 1 + serializedVersion: 11 + m_Type: 1 + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_Intensity: 2 + m_Range: 10 + m_SpotAngle: 30 + m_InnerSpotAngle: 21.80208 + m_CookieSize: 10 + m_Shadows: + m_Type: 2 + m_Resolution: -1 + m_CustomResolution: -1 + m_Strength: 1 + m_Bias: 0.05 + m_NormalBias: 0.4 + m_NearPlane: 0.2 + m_CullingMatrixOverride: + e00: 1 + e01: 0 + e02: 0 + e03: 0 + e10: 0 + e11: 1 + e12: 0 + e13: 0 + e20: 0 + e21: 0 + e22: 1 + e23: 0 + e30: 0 + e31: 0 + e32: 0 + e33: 1 + m_UseCullingMatrixOverride: 0 + m_Cookie: {fileID: 0} + m_DrawHalo: 0 + m_Flare: {fileID: 0} + m_RenderMode: 0 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingLayerMask: 1 + m_Lightmapping: 4 + m_LightShadowCasterMode: 0 + m_AreaSize: {x: 1, y: 1} + m_BounceIntensity: 1 + m_ColorTemperature: 5000 + m_UseColorTemperature: 1 + m_BoundingSphereOverride: {x: 0, y: 0, z: 0, w: 0} + m_UseBoundingSphereOverride: 0 + m_UseViewFrustumForShadowCasterCull: 1 + m_ForceVisible: 0 + m_ShadowRadius: 0 + m_ShadowAngle: 0 + m_LightUnit: 1 + m_LuxAtDistance: 1 + m_EnableSpotReflector: 1 +--- !u!4 &410087041 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 410087039} + serializedVersion: 2 + m_LocalRotation: {x: 0.40821788, y: -0.23456968, z: 0.10938163, w: 0.8754261} + m_LocalPosition: {x: 0, y: 3, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 50, y: -30, z: 0} +--- !u!114 &410087042 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 410087039} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 474bcb49853aa07438625e644c072ee6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Version: 3 + m_UsePipelineSettings: 1 + m_AdditionalLightsShadowResolutionTier: 2 + m_LightLayerMask: 1 + m_RenderingLayers: 1 + m_CustomShadowLayers: 0 + m_ShadowLayerMask: 1 + m_ShadowRenderingLayers: 1 + m_LightCookieSize: {x: 1, y: 1} + m_LightCookieOffset: {x: 0, y: 0} + m_SoftShadowQuality: 1 +--- !u!1 &632541406 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 632541407} + - component: {fileID: 632541408} + m_Layer: 0 + m_Name: AppMain + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!4 &632541407 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 632541406} + serializedVersion: 2 + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!114 &632541408 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 632541406} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ccb57283566667d45924328b93aeb7f4, type: 3} + m_Name: + m_EditorClassIdentifier: +--- !u!1 &832575517 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 832575519} + - component: {fileID: 832575518} + m_Layer: 0 + m_Name: Global Volume + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &832575518 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 832575517} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 172515602e62fb746b5d573b38a5fe58, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IsGlobal: 1 + priority: 0 + blendDistance: 0 + weight: 1 + sharedProfile: {fileID: 11400000, guid: 10fc4df2da32a41aaa32d77bc913491c, type: 2} +--- !u!4 &832575519 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 832575517} + serializedVersion: 2 + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!1660057539 &9223372036854775807 +SceneRoots: + m_ObjectHideFlags: 0 + m_Roots: + - {fileID: 330585546} + - {fileID: 410087041} + - {fileID: 832575519} + - {fileID: 632541407} diff --git a/Assets/Scenes/Main.unity.meta b/Assets/Scenes/Main.unity.meta new file mode 100644 index 00000000..9531828b --- /dev/null +++ b/Assets/Scenes/Main.unity.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 99c9720ab356a0642a771bea13969a05 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts.meta b/Assets/Scripts.meta new file mode 100644 index 00000000..51599e9c --- /dev/null +++ b/Assets/Scripts.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 41e097f95e75c6d4cae1ab5b2af8c0df +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/Base.meta b/Assets/Scripts/Base.meta new file mode 100644 index 00000000..df019984 --- /dev/null +++ b/Assets/Scripts/Base.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 738b70901bc546d49a9ea4a3492648de +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/Base/AppMain.cs b/Assets/Scripts/Base/AppMain.cs new file mode 100644 index 00000000..d69fd3ee --- /dev/null +++ b/Assets/Scripts/Base/AppMain.cs @@ -0,0 +1,51 @@ +using System.Collections.Generic; +using UnityEngine; +using UVC.Data; +using UVC.Log; +using UVC.network; +using UVC.Network; +using UVC.Tests; + +namespace Base +{ + public class AppMain : MonoBehaviour + { + + // Start is called once before the first execution of Update after the MonoBehaviour is created + async void Start() + { + + Tester.RunAllTests(); + + + URLList.Add("baseinfo", "http://localhost:8888/baseinfo/00:00"); + URLList.Add("AGV", "http://localhost:8888/AGV/00:00"); + URLList.Add("STOCKER_STACK", "http://localhost:8888/STOCKER_STACK/00:00"); + URLList.Add("CARRIER", "http://localhost:8888/CARRIER/00:00"); + URLList.Add("EQUIPMENT", "http://localhost:8888/EQUIPMENT/00:00"); + URLList.Add("PORT", "http://localhost:8888/PORT/00:00"); + URLList.Add("RACK", "http://localhost:8888/RACK/00:00"); + URLList.Add("TWIN_FORK", "http://localhost:8888/TWIN_FORK/00:00"); + URLList.Add("HVC_PLC", "http://localhost:8888/HVC_PLC/00:00"); + URLList.Add("HVC_CRANE", "http://localhost:8888/HVC_CRANE/00:00"); + URLList.Add("ALARM", "http://localhost:8888/ALARM/00:00"); + URLList.Add("Dashboard", "http://localhost:8888/Dashboard/00:00"); + URLList.Add("SIMULATION_RANK", "http://localhost:8888/SIMULATION_RANK/00:00"); + + + + //Dictionary headers = new Dictionary(); + //headers.Add("Content-Encoding", "gzip"); + //string result = await HttpRequester.RequestPost("http://localhost:8888/AGV/00:00", (string)null, headers); + //Debug.Log($"AGV Result: {result}"); + + //MQTTService mqttService = new MQTTService("localhost", 1883); + //mqttService.AddTopicHandler("AGV", (topic, message) => + //{ + // Debug.Log($"Received message on topic {topic}: {message}"); + //}); + //mqttService.Connect(); + } + + } +} diff --git a/Assets/Scripts/Base/AppMain.cs.meta b/Assets/Scripts/Base/AppMain.cs.meta new file mode 100644 index 00000000..cdf00b20 --- /dev/null +++ b/Assets/Scripts/Base/AppMain.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: ccb57283566667d45924328b93aeb7f4 \ No newline at end of file diff --git a/Assets/Scripts/UVC.meta b/Assets/Scripts/UVC.meta new file mode 100644 index 00000000..78bd1440 --- /dev/null +++ b/Assets/Scripts/UVC.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: eae859e6601e7a34c87e36e473beded1 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/DB.meta b/Assets/Scripts/UVC/DB.meta new file mode 100644 index 00000000..4998ea34 --- /dev/null +++ b/Assets/Scripts/UVC/DB.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 592f6ea237f45d640b47ef601a0cb39e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/DB/SQLite.cs b/Assets/Scripts/UVC/DB/SQLite.cs new file mode 100644 index 00000000..3503c882 --- /dev/null +++ b/Assets/Scripts/UVC/DB/SQLite.cs @@ -0,0 +1,4472 @@ +// +// Copyright (c) 2009-2012 Krueger Systems, Inc. +// +// Permission is hereby granted, free of charge, to any person obtaining a copy +// of this software and associated documentation files (the "Software"), to deal +// in the Software without restriction, including without limitation the rights +// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +// copies of the Software, and to permit persons to whom the Software is +// furnished to do so, subject to the following conditions: +// +// The above copyright notice and this permission notice shall be included in +// all copies or substantial portions of the Software. +// +// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +// THE SOFTWARE. +// +#if WINDOWS_PHONE && !USE_WP8_NATIVE_SQLITE +#define USE_CSHARP_SQLITE +#endif + +using System; +using System.Diagnostics; +using System.Runtime.InteropServices; +using System.Collections.Generic; +using System.Reflection; +using System.Linq; +using System.Linq.Expressions; +using System.Threading; + +#if USE_CSHARP_SQLITE +using Sqlite3 = Community.CsharpSqlite.Sqlite3; +using Sqlite3DatabaseHandle = Community.CsharpSqlite.Sqlite3.sqlite3; +using Sqlite3Statement = Community.CsharpSqlite.Sqlite3.Vdbe; +#elif USE_WP8_NATIVE_SQLITE +using Sqlite3 = Sqlite.Sqlite3; +using Sqlite3DatabaseHandle = Sqlite.Database; +using Sqlite3Statement = Sqlite.Statement; +#else +using Sqlite3DatabaseHandle = System.IntPtr; +using Sqlite3Statement = System.IntPtr; +#endif + +/// +/// SQLite4Unity3d Unity ȯ濡 SQLite ְ ִ ̺귯Դϴ. +/// Ŭ SQLite ͺ̽ մϴ. +/// +namespace SQLite4Unity3d +{ + /// + /// SQLite ۾ ߻ϴ ܸ óϱ ŬԴϴ. + /// + public class SQLiteException : Exception + { + public SQLite3.Result Result { get; private set; } + + protected SQLiteException(SQLite3.Result r, string message) : base(message) + { + Result = r; + } + + public static SQLiteException New(SQLite3.Result r, string message) + { + return new SQLiteException(r, message); + } + } + + /// + /// NOT NULL ߻ϴ ܸ óϱ ŬԴϴ. + /// + public class NotNullConstraintViolationException : SQLiteException + { + public IEnumerable Columns { get; protected set; } + + protected NotNullConstraintViolationException(SQLite3.Result r, string message) + : this(r, message, null, null) + { + + } + + protected NotNullConstraintViolationException(SQLite3.Result r, string message, TableMapping mapping, object obj) + : base(r, message) + { + if (mapping != null && obj != null) + { + this.Columns = from c in mapping.Columns + where c.IsNullable == false && c.GetValue(obj) == null + select c; + } + } + + public static new NotNullConstraintViolationException New(SQLite3.Result r, string message) + { + return new NotNullConstraintViolationException(r, message); + } + + public static NotNullConstraintViolationException New(SQLite3.Result r, string message, TableMapping mapping, object obj) + { + return new NotNullConstraintViolationException(r, message, mapping, obj); + } + + public static NotNullConstraintViolationException New(SQLiteException exception, TableMapping mapping, object obj) + { + return new NotNullConstraintViolationException(exception.Result, exception.Message, mapping, obj); + } + } + + /// + /// SQLite ͺ̽ ɼǵ մϴ. + /// + [Flags] + public enum SQLiteOpenFlags + { + ReadOnly = 1, ReadWrite = 2, Create = 4, + NoMutex = 0x8000, FullMutex = 0x10000, + SharedCache = 0x20000, PrivateCache = 0x40000, + ProtectionComplete = 0x00100000, + ProtectionCompleteUnlessOpen = 0x00200000, + ProtectionCompleteUntilFirstUserAuthentication = 0x00300000, + ProtectionNone = 0x00400000 + } + + /// + /// ̺ Ǵ ÷Դϴ. + /// + [Flags] + public enum CreateFlags + { + None = 0, + ImplicitPK = 1, // create a primary key for field called 'Id' (Orm.ImplicitPkName) + ImplicitIndex = 2, // create an index for fields ending in 'Id' (Orm.ImplicitIndexSuffix) + AllImplicit = 3, // do both above + + AutoIncPK = 4 // force PK field to be auto inc + } + + /// + /// SQLite ͺ̽ Ÿϴ. + /// + public partial class SQLiteConnection : IDisposable + { + private bool _open; + private TimeSpan _busyTimeout; + private Dictionary _mappings = null; + private Dictionary _tables = null; + private System.Diagnostics.Stopwatch _sw; + private TimeSpan _elapsed = default(TimeSpan); + + private int _transactionDepth = 0; + private Random _rand = new Random(); + + public Sqlite3DatabaseHandle Handle { get; private set; } + internal static readonly Sqlite3DatabaseHandle NullHandle = default(Sqlite3DatabaseHandle); + + public string DatabasePath { get; private set; } + + // ȭ ü Դϴ. + // + // ͺ̽ ջ ϱ ͺ̽ Ͽ ** ؾ մϴ. + // ̸ ͺ̽ Ͽ ȭ ü ϰ ϱ + // մϴ. + // Ű ͺ̽ ̰, lock() üԴϴ. + // + // : + // - ͺ̽ Ͻ ڵ ̷ϴ. + // - ¸ ϱ α׷ ͺ̽ ֽϴ: + // - RunInTransaction(Action) Ʈ ߿ ͺ̽ ޴ϴ(/Ʈ). + // - RunInDatabaseLock(Action) ϰ ͺ̽ Ʈ ϴ(). + private static Dictionary syncObjects = new Dictionary(); + + #region debug tracing + + public bool Trace { get; set; } + public bool TimeExecution { get; set; } + + public delegate void TraceHandler(string message); + public event TraceHandler TraceEvent; + + internal void InvokeTrace(string message) + { + if (TraceEvent != null) + { + TraceEvent(message); + } + } + + public delegate void TimeExecutionHandler(TimeSpan executionTime, TimeSpan totalExecutionTime); + public event TimeExecutionHandler TimeExecutionEvent; + + internal void InvokeTimeExecution(TimeSpan executionTime, TimeSpan totalExecutionTime) + { + if (TimeExecutionEvent != null) + { + TimeExecutionEvent(executionTime, totalExecutionTime); + } + } + + #endregion + + public bool StoreDateTimeAsTicks { get; private set; } + + /// + /// ο SQLiteConnection ϰ SQLite ͺ̽ ϴ. + /// + /// + /// ͺ̽ θ մϴ. + /// + /// + /// DateTime Ӽ ƽ(true) Ǵ ڿ(false) մϴ. + /// Ʈ ݵ true ϴ ϴ. false ȣȯ Դϴ. + /// true ϸ ũ Ǹ ϴ. + /// + /// + /// + /// // ⺻ ͺ̽ + /// var db = new SQLiteConnection(Application.persistentDataPath + "/myDatabase.db", true); + /// + /// // ̺ + /// db.CreateTable<Person>(); + /// + /// + public SQLiteConnection(string databasePath, bool storeDateTimeAsTicks = false) + : this(databasePath, SQLiteOpenFlags.ReadWrite | SQLiteOpenFlags.Create, storeDateTimeAsTicks) + { + } + + /// + /// ο SQLiteConnection ϰ SQLite ͺ̽ ϴ. + /// + /// + /// ͺ̽ θ մϴ. + /// + /// + /// ͺ̽ ϴ ÷Դϴ. + /// + /// + /// DateTime Ӽ ƽ(true) Ǵ ڿ(false) մϴ. + /// Ʈ ݵ true ϴ ϴ. false ȣȯ Դϴ. + /// true ϸ ũ Ǹ ϴ. + /// + /// + /// + /// // б ͺ̽ + /// var dbReadOnly = new SQLiteConnection( + /// Application.persistentDataPath + "/myDatabase.db", + /// SQLiteOpenFlags.ReadOnly, + /// true); + /// + /// + public SQLiteConnection(string databasePath, SQLiteOpenFlags openFlags, bool storeDateTimeAsTicks = false) + { + if (string.IsNullOrEmpty(databasePath)) + throw new ArgumentException("Must be specified", "databasePath"); + + DatabasePath = databasePath; + mayCreateSyncObject(databasePath); + +#if NETFX_CORE + SQLite3.SetDirectory(/*temp directory type*/2, Windows.Storage.ApplicationData.Current.TemporaryFolder.Path); +#endif + + Sqlite3DatabaseHandle handle; + +#if SILVERLIGHT || USE_CSHARP_SQLITE + var r = SQLite3.Open (databasePath, out handle, (int)openFlags, IntPtr.Zero); +#else + // open using the byte[] + // in the case where the path may include Unicode + // force open to using UTF-8 using sqlite3_open_v2 + var databasePathAsBytes = GetNullTerminatedUtf8(DatabasePath); + var r = SQLite3.Open(databasePathAsBytes, out handle, (int)openFlags, IntPtr.Zero); +#endif + + Handle = handle; + if (r != SQLite3.Result.OK) + { + throw SQLiteException.New(r, String.Format("Could not open database file: {0} ({1})", DatabasePath, r)); + } + _open = true; + + StoreDateTimeAsTicks = storeDateTimeAsTicks; + + BusyTimeout = TimeSpan.FromSeconds(0.1); + } + + static SQLiteConnection() + { + if (_preserveDuringLinkMagic) + { + var ti = new ColumnInfo(); + ti.Name = "magic"; + } + } + + /// + /// ־ ͺ̽ ο ȭ ü մϴ( ʴ ). + /// + /// ͺ̽ + void mayCreateSyncObject(string databasePath) + { + if (!syncObjects.ContainsKey(databasePath)) + { + syncObjects[databasePath] = new object(); + } + } + + /// + /// ͺ̽ Ʈϱ ȭ ü ɴϴ. + /// + /// ȭ ü. + public object SyncObject { get { return syncObjects[DatabasePath]; } } + + /// + /// Ȯ ε带 Ȱȭ Ǵ Ȱȭմϴ. + /// + /// 1̸ Ȱȭ, 0̸ Ȱȭ + /// + /// + /// // SQLite Ȯ Ȱȭ + /// db.EnableLoadExtension(1); + /// + /// + public void EnableLoadExtension(int onoff) + { + SQLite3.Result r = SQLite3.EnableLoadExtension(Handle, onoff); + if (r != SQLite3.Result.OK) + { + string msg = SQLite3.GetErrmsg(Handle); + throw SQLiteException.New(r, msg); + } + } + + /// + /// ڿ UTF-8 ڵϰ NULL Ʈ ߰մϴ. + /// + /// ڵ ڿ + /// NULL UTF-8 Ʈ 迭 + static byte[] GetNullTerminatedUtf8(string s) + { + var utf8Length = System.Text.Encoding.UTF8.GetByteCount(s); + var bytes = new byte[utf8Length + 1]; + utf8Length = System.Text.Encoding.UTF8.GetBytes(s, 0, s.Length, bytes, 0); + return bytes; + } + + /// + /// MonoTouch Ŀ ʱ⸦ ٶ ڵ带 ϴ ˴ϴ. + /// +#pragma warning disable 649 + static bool _preserveDuringLinkMagic; +#pragma warning restore 649 + + /// + /// ̺ ð ϴ ڵ鷯 մϴ. + /// ڵ鷯 ð մϴ. + /// + /// + /// + /// // ð + /// db.BusyTimeout = TimeSpan.FromSeconds(5); + /// + /// + public TimeSpan BusyTimeout + { + get { return _busyTimeout; } + set + { + _busyTimeout = value; + if (Handle != NullHandle) + { + SQLite3.BusyTimeout(Handle, (int)_busyTimeout.TotalMilliseconds); + } + } + } + + /// + /// ϴ ŸԿ ̺ ȯմϴ. + /// + public IEnumerable TableMappings + { + get + { + return _tables != null ? _tables.Values : Enumerable.Empty(); + } + } + + /// + /// ־ ŸԿ ڵ ˻մϴ. + /// + /// + /// ͺ̽ ȯǴ ŸԴϴ. + /// + /// + /// Ģ Ͻ PK ε ϴ ÷ + /// + /// + /// ͺ̽ Ű Ÿ ü Ӽ ϰ + /// ޼带 մϴ. + /// + /// + /// + /// // Person Ŭ + /// var mapping = db.GetMapping(typeof(Person)); + /// + /// // ̺ ̸ Ȯ + /// Console.WriteLine("̺ ̸: " + mapping.TableName); + /// + /// + public TableMapping GetMapping(Type type, CreateFlags createFlags = CreateFlags.None) + { + if (_mappings == null) + { + _mappings = new Dictionary(); + } + TableMapping map; + if (!_mappings.TryGetValue(type.FullName, out map)) + { + map = new TableMapping(type, createFlags); + _mappings[type.FullName] = map; + } + return map; + } + + /// + /// ־ ŸԿ ڵ ˻մϴ. + /// + /// + /// ͺ̽ Ű Ÿ ü Ӽ ϰ + /// ޼带 մϴ. + /// + /// + /// + /// // ׸ Ÿ + /// var mapping = db.GetMapping<Person>(); + /// + /// + public TableMapping GetMapping() + { + return GetMapping(typeof(T)); + } + + private struct IndexedColumn + { + public int Order; + public string ColumnName; + } + + private struct IndexInfo + { + public string IndexName; + public string TableName; + public bool Unique; + public List Columns; + } + + /// + /// ͺ̽ "drop table" մϴ. ۾ ϴ. + /// + /// + /// + /// // Person ̺ + /// db.DropTable<Person>(); + /// + /// + public int DropTable() + { + var map = GetMapping(typeof(T)); + + var query = string.Format("drop table if exists \"{0}\"", map.TableName); + + return Execute(query); + } + + /// + /// ͺ̽ "create table if not exists" մϴ. + /// ̺ ε մϴ. + /// ŸԿ ڵ Ű մϴ. + /// ߿ GetMapping ȣϿ Ű ׼ ֽϴ. + /// + /// + /// ͺ̽ Ű ߰ ׸ ȯմϴ. + /// + /// + /// + /// // Person Ŭ ǥϴ ̺ + /// db.CreateTable<Person>(); + /// + /// // Ͻ ε ɼ + /// db.CreateTable<Person>(CreateFlags.ImplicitIndex); + /// + /// + public int CreateTable(CreateFlags createFlags = CreateFlags.None) + { + return CreateTable(typeof(T), createFlags); + } + + /// + /// ͺ̽ "create table if not exists" մϴ. + /// ̺ ε մϴ. + /// ŸԿ ڵ Ű մϴ. + /// ߿ GetMapping ȣϿ Ű ׼ ֽϴ. + /// + /// ͺ̽ ̺ ݿ ŸԴϴ. + /// Ģ Ͻ PK ε ϴ ÷Դϴ. + /// + /// ͺ̽ Ű ߰ ׸ ȯմϴ. + /// + /// + /// + /// // Type ü Ͽ ̺ + /// db.CreateTable(typeof(Person), CreateFlags.AutoIncPK); + /// + /// + public int CreateTable(Type ty, CreateFlags createFlags = CreateFlags.None) + { + if (_tables == null) + { + _tables = new Dictionary(); + } + TableMapping map; + if (!_tables.TryGetValue(ty.FullName, out map)) + { + map = GetMapping(ty, createFlags); + _tables.Add(ty.FullName, map); + } + var query = "create table if not exists \"" + map.TableName + "\"(\n"; + + var decls = map.Columns.Select(p => Orm.SqlDecl(p, StoreDateTimeAsTicks)); + var decl = string.Join(",\n", decls.ToArray()); + query += decl; + query += ")"; + + var count = Execute(query); + + if (count == 0) + { //Possible bug: This always seems to return 0? + // Table already exists, migrate it + MigrateTable(map); + } + + var indexes = new Dictionary(); + foreach (var c in map.Columns) + { + foreach (var i in c.Indices) + { + var iname = i.Name ?? map.TableName + "_" + c.Name; + IndexInfo iinfo; + if (!indexes.TryGetValue(iname, out iinfo)) + { + iinfo = new IndexInfo + { + IndexName = iname, + TableName = map.TableName, + Unique = i.Unique, + Columns = new List() + }; + indexes.Add(iname, iinfo); + } + + if (i.Unique != iinfo.Unique) + throw new Exception("All the columns in an index must have the same value for their Unique property"); + + iinfo.Columns.Add(new IndexedColumn + { + Order = i.Order, + ColumnName = c.Name + }); + } + } + + foreach (var indexName in indexes.Keys) + { + var index = indexes[indexName]; + string[] columnNames = new string[index.Columns.Count]; + if (index.Columns.Count == 1) + { + columnNames[0] = index.Columns[0].ColumnName; + } + else + { + index.Columns.Sort((lhs, rhs) => { + return lhs.Order - rhs.Order; + }); + for (int i = 0, end = index.Columns.Count; i < end; ++i) + { + columnNames[i] = index.Columns[i].ColumnName; + } + } + count += CreateIndex(indexName, index.TableName, columnNames, index.Unique); + } + + return count; + } + + /// + /// ̺ ε մϴ. + /// + /// ε ̸ + /// ͺ̽ ̺ ̸ + /// ε ̸ 迭 + /// ε ؾ ϴ + /// + /// + /// // ε + /// db.CreateIndex("personNameIndex", "Person", new[] { "FirstName", "LastName" }, true); + /// + /// + public int CreateIndex(string indexName, string tableName, string[] columnNames, bool unique = false) + { + const string sqlFormat = "create {2} index if not exists \"{3}\" on \"{0}\"(\"{1}\")"; + var sql = String.Format(sqlFormat, tableName, string.Join("\", \"", columnNames), unique ? "unique" : "", indexName); + return Execute(sql); + } + + /// + /// ̺ ε մϴ. + /// + /// ε ̸ + /// ͺ̽ ̺ ̸ + /// ε ̸ + /// ε ؾ ϴ + /// + /// + /// // ε + /// db.CreateIndex("emailIndex", "Person", "Email", true); + /// + /// + public int CreateIndex(string indexName, string tableName, string columnName, bool unique = false) + { + return CreateIndex(indexName, tableName, new string[] { columnName }, unique); + } + + /// + /// ̺ ε մϴ. + /// + /// ͺ̽ ̺ ̸ + /// ε ̸ + /// ε ؾ ϴ + /// + /// + /// // ̺ ̸ ε ̸ ڵ + /// db.CreateIndex("Person", "Age", false); + /// // ε ̸ "Person_Age" + /// + /// + public int CreateIndex(string tableName, string columnName, bool unique = false) + { + return CreateIndex(tableName + "_" + columnName, tableName, columnName, unique); + } + + /// + /// ̺ ε մϴ. + /// + /// ͺ̽ ̺ ̸ + /// ε ̸ 迭 + /// ε ؾ ϴ + /// + /// + /// // ̺ ̸ ε ̸ ڵ + /// db.CreateIndex("Person", new[] { "FirstName", "LastName" }, true); + /// // ε ̸ "Person_FirstName_LastName" + /// + /// + public int CreateIndex(string tableName, string[] columnNames, bool unique = false) + { + return CreateIndex(tableName + "_" + string.Join("_", columnNames), tableName, columnNames, unique); + } + + /// + /// ü Ӽ ε մϴ. + /// : CreateIndex<Client>(c => c.Name); + /// + /// ͺ̽ ̺ ݿ Ÿ. + /// ε Ӽ + /// ε ؾ ϴ + /// + /// + /// // Ͽ Ӽ ε + /// db.CreateIndex<Person>(p => p.Email, true); + /// + /// + public void CreateIndex(Expression> property, bool unique = false) + { + MemberExpression mx; + if (property.Body.NodeType == ExpressionType.Convert) + { + mx = ((UnaryExpression)property.Body).Operand as MemberExpression; + } + else + { + mx = (property.Body as MemberExpression); + } + var propertyInfo = mx.Member as PropertyInfo; + if (propertyInfo == null) + { + throw new ArgumentException("The lambda expression 'property' should point to a valid Property"); + } + + var propName = propertyInfo.Name; + + var map = GetMapping(); + var colName = map.FindColumnWithPropertyName(propName).Name; + + CreateIndex(map.TableName, colName, unique); + } + + /// + /// ͺ̽ ̺ ϴ ŬԴϴ. + /// + public class ColumnInfo + { + // public int cid { get; set; } + + /// + /// ̸Դϴ. + /// + [Column("name")] + public string Name { get; set; } + + // [Column ("type")] + // public string ColumnType { get; set; } + + /// + /// NULL θ Ÿϴ. 0̸ NULL , 1̸ NOT NULLԴϴ. + /// + public int notnull { get; set; } + + // public string dflt_value { get; set; } + + // public int pk { get; set; } + + public override string ToString() + { + return Name; + } + } + + /// + /// ̺ ɴϴ. + /// + /// ̺ ̸ + /// ̺ + /// + /// + /// // Person ̺ + /// var columns = db.GetTableInfo("Person"); + /// foreach (var column in columns) { + /// Console.WriteLine(" ̸: " + column.Name); + /// } + /// + /// + public List GetTableInfo(string tableName) + { + var query = "pragma table_info(\"" + tableName + "\")"; + return Query(query); + } + + /// + /// ̺ ε ü ġϵ Ʈմϴ. + /// ο ̺ ߰մϴ. + /// + /// ̺ + void MigrateTable(TableMapping map) + { + var existingCols = GetTableInfo(map.TableName); + + var toBeAdded = new List(); + + foreach (var p in map.Columns) + { + var found = false; + foreach (var c in existingCols) + { + found = (string.Compare(p.Name, c.Name, StringComparison.OrdinalIgnoreCase) == 0); + if (found) + break; + } + if (!found) + { + toBeAdded.Add(p); + } + } + + foreach (var p in toBeAdded) + { + var addCol = "alter table \"" + map.TableName + "\" add column " + Orm.SqlDecl(p, StoreDateTimeAsTicks); + Execute(addCol); + } + } + + /// + /// ο SQLiteCommand մϴ. Ŭ ֽϴ. + /// + /// + protected virtual SQLiteCommand NewCommand() + { + return new SQLiteCommand(this); + } + + /// + /// μ ִ ؽƮ SQLiteCommand մϴ. + /// ؽƮ μ '?' ġմϴ. + /// + /// + /// ̽ SQL. + /// + /// + /// ؽƮ '?' üϴ μ. + /// + /// + /// ü + /// + /// + /// + /// // ĶͰ ִ + /// var cmd = db.CreateCommand("SELECT * FROM Person WHERE Id = ?", 1); + /// var person = cmd.ExecuteQuery<Person>().FirstOrDefault(); + /// + /// + public SQLiteCommand CreateCommand(string cmdText, params object[] ps) + { + if (!_open) + throw SQLiteException.New(SQLite3.Result.Error, "Cannot create commands from unopened database"); + + var cmd = NewCommand(); + cmd.CommandText = cmdText; + foreach (var o in ps) + { + cmd.Bind(o); + } + return cmd; + } + + /// + /// μ ִ ؽƮ(SQL) SQLiteCommand ϰ մϴ. + /// ؽƮ μ '?' ġ ش մϴ. + /// ȯ Query ޼带 ϼ. + /// ̷ 쿡 INSERT, UPDATE DELETE Ե˴ϴ. + /// Trace Ǵ TimeExecution Ӽ Ͽ ϸ ֽϴ. + /// + /// + /// ̽ SQL. + /// + /// + /// '?' üϴ μ. + /// + /// + /// ͺ̽ . + /// + /// + /// + /// // SQL + /// int rowsAffected = db.Execute("UPDATE Person SET Name = ? WHERE Id = ?", "ȫ浿", 1); + /// Console.WriteLine($"Ʈ : {rowsAffected}"); + /// + /// + public int Execute(string query, params object[] args) + { + var cmd = CreateCommand(query, args); + + if (TimeExecution) + { + if (_sw == null) + { + _sw = new Stopwatch(); + } + _sw.Reset(); + _sw.Start(); + } + + var r = cmd.ExecuteNonQuery(); + + if (TimeExecution) + { + _sw.Stop(); + _elapsed += _sw.Elapsed; + this.InvokeTimeExecution(_sw.Elapsed, _elapsed); + } + + return r; + } + + /// + /// SQL ϰ Į ȯմϴ. + /// + /// ȯǴ Į Ÿ + /// SQL + /// Ķ + /// ù ° , ù ° + /// + /// + /// // Į + /// int count = db.ExecuteScalar<int>("SELECT COUNT(*) FROM Person"); + /// string name = db.ExecuteScalar<string>("SELECT Name FROM Person WHERE Id = ?", 1); + /// + /// + public T ExecuteScalar(string query, params object[] args) + { + var cmd = CreateCommand(query, args); + + if (TimeExecution) + { + if (_sw == null) + { + _sw = new Stopwatch(); + } + _sw.Reset(); + _sw.Start(); + } + + var r = cmd.ExecuteScalar(); + + if (TimeExecution) + { + _sw.Stop(); + _elapsed += _sw.Elapsed; + this.InvokeTimeExecution(_sw.Elapsed, _elapsed); + } + + return r; + } + + /// + /// μ ִ ؽƮ(SQL) SQLiteCommand ϰ մϴ. + /// ؽƮ μ '?' ġ ش մϴ. + /// ŸԿ ڵ Ͽ ȯմϴ. + /// + /// + /// ̽ SQL. + /// + /// + /// '?' üϴ μ. + /// + /// + /// ȯ ࿡ ϳ . + /// + /// + /// + /// // ǿ ´ Person ü ȸ + /// var adults = db.Query<Person>("SELECT * FROM Person WHERE Age >= ?", 18); + /// foreach (var person in adults) { + /// Console.WriteLine($": {person.Name}, {person.Age}"); + /// } + /// + /// + public List Query(string query, params object[] args) where T : new() + { + var cmd = CreateCommand(query, args); + return cmd.ExecuteQuery(); + } + + /// + /// μ ִ ؽƮ(SQL) SQLiteCommand ϰ մϴ. + /// ؽƮ μ '?' ġ ش մϴ. + /// ŸԿ ڵ Ͽ ȯմϴ. + /// + /// + /// ̽ SQL. + /// + /// + /// '?' üϴ μ. + /// + /// + /// ȯ ࿡ ϳ . + /// ڴ MoveNext ȣ sqlite3_step ȣϹǷ, + /// ͺ̽ ־ մϴ. + /// + /// + /// + /// // 뷮 ͸ ε ó + /// var query = db.DeferredQuery<Person>("SELECT * FROM Person"); + /// using (var enumerator = query.GetEnumerator()) { + /// while (enumerator.MoveNext()) { + /// var person = enumerator.Current; + /// ProcessPerson(person); + /// } + /// } + /// + /// + public IEnumerable DeferredQuery(string query, params object[] args) where T : new() + { + var cmd = CreateCommand(query, args); + return cmd.ExecuteDeferredQuery(); + } + + /// + /// μ ִ ؽƮ(SQL) SQLiteCommand ϰ մϴ. + /// ؽƮ μ '?' ġ ش մϴ. + /// Ͽ ȯմϴ. + /// Լ (introspection) ͺ̽ ϱ + /// ̺귯 ˴ϴ. Ϲ ʽϴ. + /// + /// + /// ü ȯϴ . + /// + /// + /// ̽ SQL. + /// + /// + /// '?' üϴ μ. + /// + /// + /// ȯ ࿡ ϳ . + /// + /// + /// + /// // ü + /// var map = db.GetMapping(typeof(Person)); + /// var results = db.Query(map, "SELECT * FROM Person WHERE Id = ?", 1); + /// if (results.Count > 0) { + /// var person = results[0] as Person; + /// } + /// + /// + public List Query(TableMapping map, string query, params object[] args) + { + var cmd = CreateCommand(query, args); + return cmd.ExecuteQuery(map); + } + + /// + /// μ ִ ؽƮ(SQL) SQLiteCommand ϰ մϴ. + /// ؽƮ μ '?' ġ ش մϴ. + /// Ͽ ȯմϴ. + /// Լ (introspection) ͺ̽ ϱ + /// ̺귯 ˴ϴ. Ϲ ʽϴ. + /// + /// + /// ü ȯϴ . + /// + /// + /// ̽ SQL. + /// + /// + /// '?' üϴ μ. + /// + /// + /// ȯ ࿡ ϳ . + /// ڴ MoveNext ȣ sqlite3_step ȣϹǷ, + /// ͺ̽ ־ մϴ. + /// + public IEnumerable DeferredQuery(TableMapping map, string query, params object[] args) + { + var cmd = CreateCommand(query, args); + return cmd.ExecuteDeferredQuery(map); + } + + /// + /// ־ Ÿ Ÿ ̺ ̽ ȯմϴ. + /// + /// + /// Where, OrderBy, Take Ƽ SQL ȯ ִ ü. + /// + /// + /// + /// // LINQ Ͽ ϱ + /// var query = db.Table<Person>() + /// .Where(p => p.Age > 18) + /// .OrderBy(p => p.Name); + /// + /// foreach(var adult in query) { + /// Console.WriteLine($": {adult.Name}, {adult.Age}"); + /// } + /// + /// + public TableQuery Table() where T : new() + { + return new TableQuery(this); + } + + /// + /// ⺻ Ű ü ̺ ˻մϴ. + /// ޼ ŸԿ (PrimaryKeyAttribute Ͽ) + /// PrimaryKey ־ մϴ. + /// + /// + /// ⺻ Ű. + /// + /// + /// ־ ⺻ Ű ü. + /// ü ã not found ܸ ߻ŵϴ. + /// + /// + /// + /// // ⺻ Ű Person ü + /// try { + /// var person = db.Get<Person>(1); + /// Console.WriteLine($"̸: {person.Name}"); + /// } catch (Exception) { + /// Console.WriteLine("ش ID Person ã ϴ"); + /// } + /// + /// + public T Get(object pk) where T : new() + { + var map = GetMapping(typeof(T)); + return Query(map.GetByPrimaryKeySql, pk).First(); + } + + /// + /// ̺ ǽİ ġϴ ù ° ü ˻մϴ. + /// + /// + ///  ü ã ϴ ǽ. + /// + /// + /// ־ ǽİ ġϴ ü. + /// ü ã not found ܸ ߻ŵϴ. + /// + /// + /// + /// // ǽ Person ü + /// try { + /// var person = db.Get<Person>(p => p.Email == "test@example.com"); + /// Console.WriteLine($"̸: {person.Name}"); + /// } catch (Exception) { + /// Console.WriteLine("ǿ ´ Person ã ϴ"); + /// } + /// + /// + public T Get(Expression> predicate) where T : new() + { + return Table().Where(predicate).First(); + } + + /// + /// ̺ ⺻ Ű ü ˻մϴ. + /// ޼ ŸԿ (PrimaryKeyAttribute Ͽ) + /// PrimaryKey ־ մϴ. + /// + /// + /// ⺻ Ű. + /// + /// + /// ־ ⺻ Ű ü Ǵ + /// ü ã null. + /// + /// + /// + /// // ⺻ Ű Person ü ã ( null ȯ) + /// var person = db.Find<Person>(1); + /// if (person != null) { + /// Console.WriteLine($"ãҽϴ: {person.Name}"); + /// } else { + /// Console.WriteLine("ش ID Person ϴ"); + /// } + /// + /// + public T Find(object pk) where T : new() + { + var map = GetMapping(typeof(T)); + return Query(map.GetByPrimaryKeySql, pk).FirstOrDefault(); + } + + /// + /// ̺ ⺻ Ű ü ˻մϴ. + /// ޼ ŸԿ (PrimaryKeyAttribute Ͽ) + /// PrimaryKey ־ մϴ. + /// + /// + /// ⺻ Ű. + /// + /// + /// ü Ÿ ĺϴ Ǵ TableMapping. + /// + /// + /// ־ ⺻ Ű ü Ǵ + /// ü ã null. + /// + /// + /// + /// // ü ü ã + /// var map = db.GetMapping(typeof(Person)); + /// var obj = db.Find(1, map); + /// if (obj != null) { + /// var person = obj as Person; + /// Console.WriteLine($"ãҽϴ: {person.Name}"); + /// } + /// + /// + public object Find(object pk, TableMapping map) + { + return Query(map, map.GetByPrimaryKeySql, pk).FirstOrDefault(); + } + + /// + /// ̺ ǽİ ġϴ ù ° ü ˻մϴ. + /// + /// + ///  ü ã ϴ ǽ. + /// + /// + /// ־ ǽİ ġϴ ü Ǵ + /// ü ã null. + /// + /// + /// + /// // ǽ Person ü ã ( null ȯ) + /// var person = db.Find<Person>(p => p.Email == "test@example.com"); + /// if (person != null) { + /// Console.WriteLine($"ãҽϴ: {person.Name}"); + /// } else { + /// Console.WriteLine("ش ̸ Person ϴ"); + /// } + /// + /// + public T Find(Expression> predicate) where T : new() + { + return Table().Where(predicate).FirstOrDefault(); + } + + /// + /// ȣǾ ͺ̽ ٸ ִ . + /// + public bool IsInTransaction + { + get { return _transactionDepth > 0; } + } + + /// + /// Ʈ մϴ. Ʈ Ϸ ȣϼ. + /// + /// Ʈ ̹ ۵ ܰ ߻մϴ. + /// + /// + /// // Ʈ + /// try { + /// db.BeginTransaction(); + /// + /// // ۾ + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// + /// // ϷǸ Ʈ Ŀ + /// db.Commit(); + /// } catch (Exception) { + /// // ߻ ڵ ѹ˴ϴ + /// Console.WriteLine("Ʈ "); + /// } + /// + /// + public void BeginTransaction() + { + // BEGIN Ʈ ִ , Ʈ 쿡 ۵մϴ. + // BEGIN ȣ Ʈ Բ մϴ. + // 浹 ߻ϴ , ߻ ִ BeginTransaction ȣ մϴ. + if (Interlocked.CompareExchange(ref _transactionDepth, 1, 0) == 0) + { + try + { + Execute("begin transaction"); + } + catch (Exception ex) + { + var sqlExp = ex as SQLiteException; + if (sqlExp != null) + { + // Ʒ ؼ ø̼ǿ ROLLBACK Ͽ ϴ ϴ. + // TODO: ѹ ġ ߻ Ʈ Ǿ մϴ. + switch (sqlExp.Result) + { + case SQLite3.Result.IOError: + case SQLite3.Result.Full: + case SQLite3.Result.Busy: + case SQLite3.Result.NoMem: + case SQLite3.Result.Interrupt: + RollbackTo(null, true); + break; + } + } + else + { + // SaveTransactionPoint catch ̹ Ʈ Ʈ + // 쿡 VolatileWrite ƴ decrement ȣϼ. + Interlocked.Decrement(ref _transactionDepth); + } + + throw; + } + } + else + { + // ̹ ִ Ʈǿ BeginTransaction ȣϴ ȿ ʽϴ. + throw new InvalidOperationException("Cannot begin a transaction while already in a transaction."); + } + } + + /// + /// Ʈ ŸӶ ͺ̽ ̺Ʈ մϴ. + /// Ʈ Ʈ մϴ. + /// + /// ȯ ̺Ʈ ۾ Ϸ ȣϼ. + /// ȯ ̺Ʈ ۾ ȮϷ ȣϼ. + /// Ʈ ϰ ȮϷ ȣϼ. + /// + /// ̺Ʈ ĺϴ ڿ. + /// + /// + /// // ̺Ʈ Ʈ ó + /// db.BeginTransaction(); + /// + /// // ù ° ۾ + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// + /// // ̺Ʈ + /// string savepoint = db.SaveTransactionPoint(); + /// + /// try { + /// // ° ۾ + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// + /// // ̺Ʈ (Ȯ) + /// db.Release(savepoint); + /// } catch(Exception) { + /// // ߻ϸ ̺Ʈ ѹ + /// db.RollbackTo(savepoint); + /// } + /// + /// // Ʈ Ȯ + /// db.Commit(); + /// + /// + public string SaveTransactionPoint() + { + int depth = Interlocked.Increment(ref _transactionDepth) - 1; + string retVal = "S" + _rand.Next(short.MaxValue) + "D" + depth; + + try + { + Execute("savepoint " + retVal); + } + catch (Exception ex) + { + var sqlExp = ex as SQLiteException; + if (sqlExp != null) + { + // It is recommended that applications respond to the errors listed below + // by explicitly issuing a ROLLBACK command. + // TODO: This rollback failsafe should be localized to all throw sites. + switch (sqlExp.Result) + { + case SQLite3.Result.IOError: + case SQLite3.Result.Full: + case SQLite3.Result.Busy: + case SQLite3.Result.NoMem: + case SQLite3.Result.Interrupt: + RollbackTo(null, true); + break; + } + } + else + { + Interlocked.Decrement(ref _transactionDepth); + } + + throw; + } + + return retVal; + } + + /// + /// Ǵ ۵ Ʈ ѹմϴ. + /// + /// + /// + /// // Ʈ ϰ ѹ + /// try { + /// db.BeginTransaction(); + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// + /// // ߻ ִ ۾ + /// if (SomeConditionFails()) { + /// // Ʈ ѹ + /// db.Rollback(); + /// return; + /// } + /// + /// // Ŀ + /// db.Commit(); + /// } catch(Exception) { + /// // ߻ ѹ + /// db.Rollback(); + /// } + /// + /// + public void Rollback() + { + RollbackTo(null, false); + } + + /// + /// Ǵ SaveTransactionPoint ̺Ʈ ѹմϴ. + /// + /// ȯ ѹ ̺Ʈ ̸. savepoint null̰ų ޼ ȣ մϴ. + /// + /// + /// // ̺Ʈ κ ѹ + /// db.BeginTransaction(); + /// + /// // ù ° ۾ + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// + /// // ̺Ʈ + /// string savepoint = db.SaveTransactionPoint(); + /// + /// // ° ۾ + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// + /// // ° ۾ ѹ (̺Ʈ ǵ) + /// db.RollbackTo(savepoint); + /// + /// // ù ° ۾ ȿϸ Ʈ Ŀ + /// db.Commit(); + /// + /// + public void RollbackTo(string savepoint) + { + RollbackTo(savepoint, false); + } + + /// + /// ۵ ŷ ѹմϴ. + /// + /// ߻ Ϸ true, ׷ false + void RollbackTo(string savepoint, bool noThrow) + { + // Rolling back without a TO clause rolls backs all transactions + // and leaves the transaction stack empty. + try + { + if (String.IsNullOrEmpty(savepoint)) + { + if (Interlocked.Exchange(ref _transactionDepth, 0) > 0) + { + Execute("rollback"); + } + } + else + { + DoSavePointExecute(savepoint, "rollback to "); + } + } + catch (SQLiteException) + { + if (!noThrow) + throw; + + } + // No need to rollback if there are no transactions open. + } + + /// + /// ȯ ̺Ʈ մϴ. + /// ̺Ʈ ϸ ش ̺Ʈ Ʈ ߴ + /// ̺Ʈ ˴ϴ. + /// ׷ 쿡 ȣ · ˴ϴ. + /// + /// RELEASE SAVEPOINT COMMIT ϴ. + /// + /// ̺Ʈ ̸. ڿ ȣ մϴ. + /// + /// + /// // ̺Ʈ (Ȯ) + /// db.BeginTransaction(); + /// + /// // ۾ + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// + /// // ̺Ʈ + /// string savepoint1 = db.SaveTransactionPoint(); + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// + /// // ٸ ̺Ʈ + /// string savepoint2 = db.SaveTransactionPoint(); + /// db.Insert(new Person { Name = "̿", Age = 35 }); + /// + /// // ° ̺Ʈ Ȯ + /// db.Release(savepoint2); + /// + /// // ù ° ̺Ʈ ׵ Ȯ + /// db.Release(savepoint1); + /// + /// // ü Ʈ Ŀ + /// db.Commit(); + /// + /// + public void Release(string savepoint) + { + DoSavePointExecute(savepoint, "release "); + } + + /// + /// ̺Ʈ մϴ. + /// + /// ̺Ʈ ĺ + /// SQL (rollback to Ǵ release) + /// ̺Ʈ ȿ ߻ + void DoSavePointExecute(string savepoint, string cmd) + { + // Validate the savepoint + int firstLen = savepoint.IndexOf('D'); + if (firstLen >= 2 && savepoint.Length > firstLen + 1) + { + int depth; + if (Int32.TryParse(savepoint.Substring(firstLen + 1), out depth)) + { + // TODO: Mild race here, but inescapable without locking almost everywhere. + if (0 <= depth && depth < _transactionDepth) + { +#if NETFX_CORE + Volatile.Write (ref _transactionDepth, depth); +#elif SILVERLIGHT + _transactionDepth = depth; +#else + Thread.VolatileWrite(ref _transactionDepth, depth); +#endif + Execute(cmd + savepoint); + return; + } + } + } + + throw new ArgumentException("savePoint is not valid, and should be the result of a call to SaveTransactionPoint.", "savePoint"); + } + + /// + /// ۵ Ʈ Ŀմϴ. + /// + /// + /// + /// // Ʈ Ŀ + /// try { + /// db.BeginTransaction(); + /// + /// // ۾ + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// db.Insert(new Person { Name = "̿", Age = 35 }); + /// + /// // ۾ ϷǸ Ʈ Ŀ + /// db.Commit(); + /// } catch(Exception ex) { + /// // ߻ ѹ + /// db.Rollback(); + /// Console.WriteLine("Ʈ : " + ex.Message); + /// } + /// + /// + public void Commit() + { + if (Interlocked.Exchange(ref _transactionDepth, 0) != 0) + { + Execute("commit"); + } + // Do nothing on a commit with no open transaction + } + + /// + /// ־ ׼ SAVEPOINT μ (ø ִ) Ʈ մϴ. + /// ܰ ߻ϸ ̺ƮӸ ƴ϶ ü Ʈ ѹ˴ϴ. + /// ߻ ܴ ٽ ϴ. + /// + /// + /// Ʈ . action ῡ ۾ + /// Ǵ ȣؼ ˴ϴ. + /// + /// + /// + /// // RunInTransaction Ʈ ó + /// db.RunInTransaction(() => { + /// // ۾ ϳ Ʈ ˴ϴ. + /// db.Insert(new Person { Name = "ȫ浿", Age = 30 }); + /// db.Insert(new Person { Name = "ö", Age = 25 }); + /// db.Update(new Person { Id = 1, Name = "ȫ浿", Age = 31 }); + /// + /// // ܰ ߻ϸ ۾ ѹ˴ϴ. + /// }); + /// + /// // ⿡ ϸ Ʈ ĿԵ Դϴ. + /// + /// + public void RunInTransaction(Action action) + { + try + { + lock (syncObjects[DatabasePath]) + { + var savePoint = SaveTransactionPoint(); + action(); + Release(savePoint); + } + } + catch (Exception) + { + Rollback(); + throw; + } + } + + /// + /// ٸ 尡 ͺ̽ ϵ ϸ鼭 ־ ׼ մϴ. + /// + /// + /// (lock) . + /// + /// + /// + /// // RunInDatabaseLock ͺ̽ + /// db.RunInDatabaseLock(() => { + /// // ۾ ٸ 忡 ͺ̽ ϴ. + /// var count = db.ExecuteScalar<int>("SELECT COUNT(*) FROM Person"); + /// + /// if (count > 0) { + /// var people = db.Query<Person>("SELECT * FROM Person"); + /// foreach (var person in people) { + /// // ϰ ó + /// ProcessPerson(person); + /// } + /// } + /// }); + /// + /// + public void RunInDatabaseLock(Action action) + { + lock (syncObjects[DatabasePath]) + { + action(); + } + } + + /// + /// ü մϴ. + /// + /// + /// ü ÷. + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // ü + /// var people = new List<Person> + /// { + /// new Person { Name = "ȫ浿", Age = 30 }, + /// new Person { Name = "ö", Age = 25 }, + /// new Person { Name = "̿", Age = 35 } + /// }; + /// + /// // ü ϰ ȯ + /// int count = db.InsertAll(people); + /// Console.WriteLine($"Ե : {count}"); + /// + /// + public int InsertAll(System.Collections.IEnumerable objects) + { + var c = 0; + RunInTransaction(() => { + foreach (var r in objects) + { + c += Insert(r); + } + }); + return c; + } + + /// + /// ü մϴ. + /// + /// + /// ü ÷. + /// + /// + /// ɿ ԵǴ ͷ SQL ڵԴϴ. INSERT {extra} INTO ... + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // ü (浹 ɼ ) + /// var people = new List<Person> + /// { + /// new Person { Id = 1, Name = "ȫ浿", Age = 30 }, + /// new Person { Id = 2, Name = "ö", Age = 25 }, + /// new Person { Id = 3, Name = "̿", Age = 35 } + /// }; + /// + /// // OR IGNORE ɼ Ͽ ߺ Ű 浹 + /// int count = db.InsertAll(people, "OR IGNORE"); + /// Console.WriteLine($"Ե : {count}"); + /// + /// + public int InsertAll(System.Collections.IEnumerable objects, string extra) + { + var c = 0; + RunInTransaction(() => { + foreach (var r in objects) + { + c += Insert(r, extra); + } + }); + return c; + } + + /// + /// ü մϴ. + /// + /// + /// ü ÷. + /// + /// + /// ü Ÿ. + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // Ÿ ü + /// var people = new List<object> + /// { + /// new Person { Name = "ȫ浿", Age = 30 }, + /// new Person { Name = "ö", Age = 25 } + /// }; + /// + /// // Ư Ÿ Ͽ + /// int count = db.InsertAll(people, typeof(Person)); + /// Console.WriteLine($"Ե : {count}"); + /// + /// + public int InsertAll(System.Collections.IEnumerable objects, Type objType) + { + var c = 0; + RunInTransaction(() => { + foreach (var r in objects) + { + c += Insert(r, objType); + } + }); + return c; + } + + /// + /// ־ ü ϰ, ڵ ⺻ Ű ִٸ ɴϴ. + /// + /// + /// ü. + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // Person ü ϰ + /// var person = new Person { Name = "ȫ浿", Age = 30 }; + /// + /// // ü Ȯ + /// int rowsAffected = db.Insert(person); + /// + /// // ڵ ID ִ , ID ü + /// Console.WriteLine($"Ե ID: {person.Id}"); + /// + /// + public int Insert(object obj) + { + if (obj == null) + { + return 0; + } + return Insert(obj, "", obj.GetType()); + } + + /// + /// ־ ü ϰ, ڵ ⺻ Ű ִٸ ɴϴ. + /// UNIQUE ߻ ü մϴ. + /// + /// + /// ü. + /// + /// + /// . + /// + /// + /// + /// // ߺ Ű ִ üϿ + /// var existingPerson = new Person { Id = 1, Name = "ȫ浿", Age = 30 }; + /// + /// // Id ü ( ü ü) + /// db.InsertOrReplace(new Person { Id = 1, Name = "ȫ浿()", Age = 31 }); + /// + /// // ü ü ϴ Ʈ + /// var person = db.Get<Person>(1); + /// person.Age += 1; + /// db.InsertOrReplace(person); + /// + /// + public int InsertOrReplace(object obj) + { + if (obj == null) + { + return 0; + } + return Insert(obj, "OR REPLACE", obj.GetType()); + } + + /// + /// ־ ü ϰ ڵ ⺻ Ű ִٸ ɴϴ. + /// + /// + /// ü. + /// + /// + /// ɿ ԵǴ ͷ SQL ڵԴϴ. INSERT {extra} INTO ... + /// + /// + /// ü Ÿ. + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // Ư Ÿ ü + /// object person = new Person { Name = "ȫ浿", Age = 30 }; + /// + /// // OR IGNORE ɼ Ͽ 浹 + /// int count = db.Insert(person, "OR IGNORE", typeof(Person)); + /// + /// // Ǵ ٸ SQL ɼ ߰ + /// db.Insert(person, "OR FAIL", typeof(Person)); + /// + /// + public int Insert(object obj, Type objType) + { + return Insert(obj, "", objType); + } + + /// + /// ־ ü ϰ ڵ ⺻ Ű ִٸ ɴϴ. + /// UNIQUE ߻ ü üմϴ. + /// + /// + /// ü. + /// + /// + /// ü Ÿ. + /// + /// + /// . + /// + /// + /// + /// // Ư Ÿ ü ü + /// object person = new Person { Id = 1, Name = "ȫ浿", Age = 30 }; + /// + /// // ü + /// int count = db.InsertOrReplace(person, typeof(Person)); + /// + /// + public int InsertOrReplace(object obj, Type objType) + { + return Insert(obj, "OR REPLACE", objType); + } + + /// + /// ־ ü ϰ ڵ ⺻ Ű ִٸ ɴϴ. + /// + /// + /// ü. + /// + /// + /// ɿ ԵǴ ͷ SQL ڵԴϴ. INSERT {extra} INTO ... + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // 浹 ɼ ü + /// var person = new Person { Id = 1, Name = "ȫ浿", Age = 30 }; + /// + /// // OR IGNORE ɼ Ͽ ߺ Ű 浹 + /// int count = db.Insert(person, "OR IGNORE"); + /// Console.WriteLine($"Ե : {count}"); + /// + /// + public int Insert(object obj, string extra) + { + if (obj == null) + { + return 0; + } + return Insert(obj, extra, obj.GetType()); + } + + /// + /// ־ ü ϰ ڵ ⺻ Ű ִٸ ɴϴ. + /// + /// + /// ü. + /// + /// + /// ɿ ԵǴ ͷ SQL ڵԴϴ. INSERT {extra} INTO ... + /// + /// + /// ü Ÿ. + /// + /// + /// ̺ ߰ . + /// + /// + /// + /// // پ ɼ ü + /// var person = new Person { Name = "ȫ浿", Age = 30 }; + /// + /// // ⺻ + /// db.Insert(person); + /// + /// // OR IGNORE ɼ 浹 + /// db.Insert(person, "OR IGNORE"); + /// + /// // Ư Ÿ + /// db.Insert(person, "OR REPLACE", typeof(Person)); + /// + /// + public int Insert(object obj, string extra, Type objType) + { + if (obj == null || objType == null) + { + return 0; + } + + + var map = GetMapping(objType); + +#if NETFX_CORE + if (map.PK != null && map.PK.IsAutoGuid) + { + // no GetProperty so search our way up the inheritance chain till we find it + PropertyInfo prop; + while (objType != null) + { + var info = objType.GetTypeInfo(); + prop = info.GetDeclaredProperty(map.PK.PropertyName); + if (prop != null) + { + if (prop.GetValue(obj, null).Equals(Guid.Empty)) + { + prop.SetValue(obj, Guid.NewGuid(), null); + } + break; + } + + objType = info.BaseType; + } + } +#else + if (map.PK != null && map.PK.IsAutoGuid) + { + var prop = objType.GetProperty(map.PK.PropertyName); + if (prop != null) + { + //if (prop.GetValue(obj, null).Equals(Guid.Empty)) { + if (prop.GetGetMethod().Invoke(obj, null).Equals(Guid.Empty)) + { + prop.SetValue(obj, Guid.NewGuid(), null); + } + } + } +#endif + + + var replacing = string.Compare(extra, "OR REPLACE", StringComparison.OrdinalIgnoreCase) == 0; + + var cols = replacing ? map.InsertOrReplaceColumns : map.InsertColumns; + var vals = new object[cols.Length]; + for (var i = 0; i < vals.Length; i++) + { + vals[i] = cols[i].GetValue(obj); + } + + var insertCmd = map.GetInsertCommand(this, extra); + int count; + + try + { + count = insertCmd.ExecuteNonQuery(vals); + } + catch (SQLiteException ex) + { + + if (SQLite3.ExtendedErrCode(this.Handle) == SQLite3.ExtendedResult.ConstraintNotNull) + { + throw NotNullConstraintViolationException.New(ex.Result, ex.Message, map, obj); + } + throw; + } + + if (map.HasAutoIncPK) + { + var id = SQLite3.LastInsertRowid(Handle); + map.SetAutoIncPK(obj, id); + } + + return count; + } + + /// + /// ü Ͽ ̺ ⺻ Ű ϰ Ʈմϴ. + /// ü ⺻ Ű ־ մϴ. + /// + /// + /// Ʈ ü. PrimaryKeyAttribute Ͽ ⺻ Ű ־ մϴ. + /// + /// + /// Ʈ . + /// + /// + /// + /// // ͺ̽ ü ˻ + /// var person = db.Get<Person>(1); + /// + /// // ü Ӽ + /// person.Name = "ȫ浿()"; + /// person.Age = 31; + /// + /// // ü Ʈ + /// int rowsAffected = db.Update(person); + /// Console.WriteLine($"Ʈ : {rowsAffected}"); + /// + /// + public int Update(object obj) + { + if (obj == null) + { + return 0; + } + return Update(obj, obj.GetType()); + } + + /// + /// ü Ͽ ̺ ⺻ Ű ϰ Ʈմϴ. + /// ü ⺻ Ű ־ մϴ. + /// + /// + /// Ʈ ü. PrimaryKeyAttribute Ͽ ⺻ Ű ־ մϴ. + /// + /// + /// Ʈ ü Ÿ. + /// + /// + /// Ʈ . + /// + /// + /// + /// // Ÿ ü Ʈ + /// object person = new Person { Id = 1, Name = "ȫ浿()", Age = 31 }; + /// + /// // Ư Ÿ Ͽ Ʈ + /// int count = db.Update(person, typeof(Person)); + /// Console.WriteLine($"Ʈ : {count}"); + /// + /// + public int Update(object obj, Type objType) + { + int rowsAffected = 0; + if (obj == null || objType == null) + { + return 0; + } + + var map = GetMapping(objType); + + var pk = map.PK; + + if (pk == null) + { + throw new NotSupportedException("Cannot update " + map.TableName + ": it has no PK"); + } + + var cols = from p in map.Columns + where p != pk + select p; + var vals = from c in cols + select c.GetValue(obj); + var ps = new List(vals); + ps.Add(pk.GetValue(obj)); + var q = string.Format("update \"{0}\" set {1} where {2} = ? ", map.TableName, string.Join(",", (from c in cols + select "\"" + c.Name + "\" = ? ").ToArray()), pk.Name); + + try + { + rowsAffected = Execute(q, ps.ToArray()); + } + catch (SQLiteException ex) + { + + if (ex.Result == SQLite3.Result.Constraint && SQLite3.ExtendedErrCode(this.Handle) == SQLite3.ExtendedResult.ConstraintNotNull) + { + throw NotNullConstraintViolationException.New(ex, map, obj); + } + + throw ex; + } + + return rowsAffected; + } + + /// + /// ü Ʈմϴ. + /// + /// + /// Ʈ ü ÷. + /// + /// + /// . + /// + /// + /// + /// // ü Ʈ + /// var people = db.Query<Person>("SELECT * FROM Person WHERE Age < 30"); + /// foreach (var person in people) { + /// person.Age++; + /// } + /// + /// // ü Ʈ + /// int count = db.UpdateAll(people); + /// Console.WriteLine($"Ʈ : {count}"); + /// + /// + public int UpdateAll(System.Collections.IEnumerable objects) + { + var c = 0; + RunInTransaction(() => { + foreach (var r in objects) + { + c += Update(r); + } + }); + return c; + } + + /// + /// ⺻ Ű Ͽ ͺ̽ ü մϴ. + /// + /// + /// ü. PrimaryKeyAttribute Ͽ ⺻ Ű ־ մϴ. + /// + /// + /// . + /// + /// + /// + /// // ͺ̽ ü ˻ + /// var person = db.Get<Person>(1); + /// + /// // ü + /// int rowsAffected = db.Delete(person); + /// Console.WriteLine($" : {rowsAffected}"); + /// + /// // Ǵ ID + /// rowsAffected = db.Delete<Person>(2); + /// + /// + public int Delete(object objectToDelete) + { + var map = GetMapping(objectToDelete.GetType()); + var pk = map.PK; + if (pk == null) + { + throw new NotSupportedException("Cannot delete " + map.TableName + ": it has no PK"); + } + var q = string.Format("delete from \"{0}\" where \"{1}\" = ?", map.TableName, pk.Name); + return Execute(q, pk.GetValue(objectToDelete)); + } + + /// + /// ⺻ Ű ü մϴ. + /// + /// + /// ü ⺻ Ű. + /// + /// + /// ü . + /// + /// + /// ü Ÿ. + /// + /// + /// + /// // ⺻ Ű ü + /// int rowsDeleted = db.Delete<Person>(1); + /// Console.WriteLine($"ID 1 Person ü {rowsDeleted} "); + /// + /// // ID ʷ + /// int[] idsToDelete = { 2, 3, 4 }; + /// foreach (int id in idsToDelete) { + /// db.Delete<Person>(id); + /// } + /// + /// + public int Delete(object primaryKey) + { + var map = GetMapping(typeof(T)); + var pk = map.PK; + if (pk == null) + { + throw new NotSupportedException("Cannot delete " + map.TableName + ": it has no PK"); + } + var q = string.Format("delete from \"{0}\" where \"{1}\" = ?", map.TableName, pk.Name); + return Execute(q, primaryKey); + } + + /// + /// ̺ ü մϴ. + /// : ݺϿ ڸ, ޼ҵ ̺ ü մϴ. + /// ۾ Ϸ ´ Ȯϼ. + /// + /// + /// ü . + /// + /// + /// ü Ÿ. + /// + /// + /// + /// // ̺ (ؼ ) + /// db.BeginTransaction(); + /// try { + /// // Ȯ īƮ + /// int beforeCount = db.ExecuteScalar<int>("SELECT COUNT(*) FROM Person"); + /// Console.WriteLine($" : {beforeCount}"); + /// + /// // Person + /// int deleted = db.DeleteAll<Person>(); + /// + /// Console.WriteLine($" : {deleted}"); + /// db.Commit(); + /// } catch(Exception) { + /// db.Rollback(); + /// Console.WriteLine(" ۾ ҵ"); + /// } + /// + /// + public int DeleteAll() + { + var map = GetMapping(typeof(T)); + var query = string.Format("delete from \"{0}\"", map.TableName); + return Execute(query); + } + + ~SQLiteConnection() + { + Dispose(false); + } + + /// + /// ͺ̽ ϰ ݽϴ. + /// + /// + /// + /// // using ڵ ҽ + /// using (var db = new SQLiteConnection("database.db")) + /// { + /// // ͺ̽ ۾ + /// var people = db.Query<Person>("SELECT * FROM Person"); + /// + /// // using ڵ db.Dispose() ȣ + /// } + /// + /// // ҽ + /// var connection = new SQLiteConnection("database.db"); + /// try + /// { + /// // ۾ + /// connection.CreateTable<Person>(); + /// } + /// finally + /// { + /// connection.Dispose(); + /// } + /// + /// + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + protected virtual void Dispose(bool disposing) + { + Close(); + } + + /// + /// ͺ̽ ݽϴ. ޼ҵ Dispose ȣ˴ϴ. + /// + /// + /// + /// // ͺ̽ ݱ + /// db.Close(); + /// + /// // Ǵ using Ͽ ڵ ݱ + /// using (var db = new SQLiteConnection("database.db")) { + /// // ͺ̽ ۾ + /// var count = db.ExecuteScalar<int>("SELECT COUNT(*) FROM Person"); + /// Console.WriteLine($"Person ̺ : {count}"); + /// + /// // using ڵ db.Dispose() ȣǾ + /// } + /// + /// + public void Close() + { + if (_open && Handle != NullHandle) + { + try + { + if (_mappings != null) + { + foreach (var sqlInsertCommand in _mappings.Values) + { + sqlInsertCommand.Dispose(); + } + } + var r = SQLite3.Close(Handle); + if (r != SQLite3.Result.OK) + { + string msg = SQLite3.GetErrmsg(Handle); + throw SQLiteException.New(r, msg); + } + } + finally + { + Handle = NullHandle; + _open = false; + } + } + } + } + + /// + /// Represents a parsed connection string. + /// + class SQLiteConnectionString + { + public string ConnectionString { get; private set; } + public string DatabasePath { get; private set; } + public bool StoreDateTimeAsTicks { get; private set; } + +#if NETFX_CORE + static readonly string MetroStyleDataPath = Windows.Storage.ApplicationData.Current.LocalFolder.Path; +#endif + + public SQLiteConnectionString(string databasePath, bool storeDateTimeAsTicks) + { + ConnectionString = databasePath; + StoreDateTimeAsTicks = storeDateTimeAsTicks; + +#if NETFX_CORE + DatabasePath = System.IO.Path.Combine (MetroStyleDataPath, databasePath); +#else + DatabasePath = databasePath; +#endif + } + } + + [AttributeUsage(AttributeTargets.Class)] + public class TableAttribute : Attribute + { + public string Name { get; set; } + + public TableAttribute(string name) + { + Name = name; + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class ColumnAttribute : Attribute + { + public string Name { get; set; } + + public ColumnAttribute(string name) + { + Name = name; + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class PrimaryKeyAttribute : Attribute + { + } + + [AttributeUsage(AttributeTargets.Property)] + public class AutoIncrementAttribute : Attribute + { + } + + [AttributeUsage(AttributeTargets.Property)] + public class IndexedAttribute : Attribute + { + public string Name { get; set; } + public int Order { get; set; } + public virtual bool Unique { get; set; } + + public IndexedAttribute() + { + } + + public IndexedAttribute(string name, int order) + { + Name = name; + Order = order; + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class IgnoreAttribute : Attribute + { + } + + [AttributeUsage(AttributeTargets.Property)] + public class UniqueAttribute : IndexedAttribute + { + public override bool Unique + { + get { return true; } + set { /* throw? */ } + } + + public UniqueAttribute() : base() + { + } + + public UniqueAttribute(string name, int order) : base(name, order) + { + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class MaxLengthAttribute : Attribute + { + public int Value { get; private set; } + + public MaxLengthAttribute(int length) + { + Value = length; + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class CollationAttribute : Attribute + { + public string Value { get; private set; } + + public CollationAttribute(string collation) + { + Value = collation; + } + } + + [AttributeUsage(AttributeTargets.Property)] + public class NotNullAttribute : Attribute + { + } + + public class TableMapping + { + public Type MappedType { get; private set; } + + public string TableName { get; private set; } + + public Column[] Columns { get; private set; } + + public Column PK { get; private set; } + + public string GetByPrimaryKeySql { get; private set; } + + Column _autoPk; + Column[] _insertColumns; + Column[] _insertOrReplaceColumns; + + public TableMapping(Type type, CreateFlags createFlags = CreateFlags.None) + { + MappedType = type; + +#if NETFX_CORE + var tableAttr = (TableAttribute)System.Reflection.CustomAttributeExtensions + .GetCustomAttribute(type.GetTypeInfo(), typeof(TableAttribute), true); +#else + var tableAttr = (TableAttribute)type.GetCustomAttributes(typeof(TableAttribute), true).FirstOrDefault(); +#endif + + TableName = tableAttr != null ? tableAttr.Name : MappedType.Name; + +#if !NETFX_CORE + var props = MappedType.GetProperties(BindingFlags.Public | BindingFlags.Instance | BindingFlags.SetProperty); +#else + var props = from p in MappedType.GetRuntimeProperties() + where ((p.GetMethod != null && p.GetMethod.IsPublic) || (p.SetMethod != null && p.SetMethod.IsPublic) || (p.GetMethod != null && p.GetMethod.IsStatic) || (p.SetMethod != null && p.SetMethod.IsStatic)) + select p; +#endif + var cols = new List(); + foreach (var p in props) + { +#if !NETFX_CORE + var ignore = p.GetCustomAttributes(typeof(IgnoreAttribute), true).Length > 0; +#else + var ignore = p.GetCustomAttributes (typeof(IgnoreAttribute), true).Count() > 0; +#endif + if (p.CanWrite && !ignore) + { + cols.Add(new Column(p, createFlags)); + } + } + Columns = cols.ToArray(); + foreach (var c in Columns) + { + if (c.IsAutoInc && c.IsPK) + { + _autoPk = c; + } + if (c.IsPK) + { + PK = c; + } + } + + HasAutoIncPK = _autoPk != null; + + if (PK != null) + { + GetByPrimaryKeySql = string.Format("select * from \"{0}\" where \"{1}\" = ?", TableName, PK.Name); + } + else + { + // People should not be calling Get/Find without a PK + GetByPrimaryKeySql = string.Format("select * from \"{0}\" limit 1", TableName); + } + } + + public bool HasAutoIncPK { get; private set; } + + public void SetAutoIncPK(object obj, long id) + { + if (_autoPk != null) + { + _autoPk.SetValue(obj, Convert.ChangeType(id, _autoPk.ColumnType, null)); + } + } + + public Column[] InsertColumns + { + get + { + if (_insertColumns == null) + { + _insertColumns = Columns.Where(c => !c.IsAutoInc).ToArray(); + } + return _insertColumns; + } + } + + public Column[] InsertOrReplaceColumns + { + get + { + if (_insertOrReplaceColumns == null) + { + _insertOrReplaceColumns = Columns.ToArray(); + } + return _insertOrReplaceColumns; + } + } + + public Column FindColumnWithPropertyName(string propertyName) + { + var exact = Columns.FirstOrDefault(c => c.PropertyName == propertyName); + return exact; + } + + public Column FindColumn(string columnName) + { + var exact = Columns.FirstOrDefault(c => c.Name == columnName); + return exact; + } + + PreparedSqlLiteInsertCommand _insertCommand; + string _insertCommandExtra; + + public PreparedSqlLiteInsertCommand GetInsertCommand(SQLiteConnection conn, string extra) + { + if (_insertCommand == null) + { + _insertCommand = CreateInsertCommand(conn, extra); + _insertCommandExtra = extra; + } + else if (_insertCommandExtra != extra) + { + _insertCommand.Dispose(); + _insertCommand = CreateInsertCommand(conn, extra); + _insertCommandExtra = extra; + } + return _insertCommand; + } + + PreparedSqlLiteInsertCommand CreateInsertCommand(SQLiteConnection conn, string extra) + { + var cols = InsertColumns; + string insertSql; + if (!cols.Any() && Columns.Count() == 1 && Columns[0].IsAutoInc) + { + insertSql = string.Format("insert {1} into \"{0}\" default values", TableName, extra); + } + else + { + var replacing = string.Compare(extra, "OR REPLACE", StringComparison.OrdinalIgnoreCase) == 0; + + if (replacing) + { + cols = InsertOrReplaceColumns; + } + + insertSql = string.Format("insert {3} into \"{0}\"({1}) values ({2})", TableName, + string.Join(",", (from c in cols + select "\"" + c.Name + "\"").ToArray()), + string.Join(",", (from c in cols + select "?").ToArray()), extra); + + } + + var insertCommand = new PreparedSqlLiteInsertCommand(conn); + insertCommand.CommandText = insertSql; + return insertCommand; + } + + protected internal void Dispose() + { + if (_insertCommand != null) + { + _insertCommand.Dispose(); + _insertCommand = null; + } + } + + public class Column + { + PropertyInfo _prop; + + public string Name { get; private set; } + + public string PropertyName { get { return _prop.Name; } } + + public Type ColumnType { get; private set; } + + public string Collation { get; private set; } + + public bool IsAutoInc { get; private set; } + public bool IsAutoGuid { get; private set; } + + public bool IsPK { get; private set; } + + public IEnumerable Indices { get; set; } + + public bool IsNullable { get; private set; } + + public int? MaxStringLength { get; private set; } + + public Column(PropertyInfo prop, CreateFlags createFlags = CreateFlags.None) + { + var colAttr = (ColumnAttribute)prop.GetCustomAttributes(typeof(ColumnAttribute), true).FirstOrDefault(); + + _prop = prop; + Name = colAttr == null ? prop.Name : colAttr.Name; + //If this type is Nullable then Nullable.GetUnderlyingType returns the T, otherwise it returns null, so get the actual type instead + ColumnType = Nullable.GetUnderlyingType(prop.PropertyType) ?? prop.PropertyType; + Collation = Orm.Collation(prop); + + IsPK = Orm.IsPK(prop) || + (((createFlags & CreateFlags.ImplicitPK) == CreateFlags.ImplicitPK) && + string.Compare(prop.Name, Orm.ImplicitPkName, StringComparison.OrdinalIgnoreCase) == 0); + + var isAuto = Orm.IsAutoInc(prop) || (IsPK && ((createFlags & CreateFlags.AutoIncPK) == CreateFlags.AutoIncPK)); + IsAutoGuid = isAuto && ColumnType == typeof(Guid); + IsAutoInc = isAuto && !IsAutoGuid; + + Indices = Orm.GetIndices(prop); + if (!Indices.Any() + && !IsPK + && ((createFlags & CreateFlags.ImplicitIndex) == CreateFlags.ImplicitIndex) + && Name.EndsWith(Orm.ImplicitIndexSuffix, StringComparison.OrdinalIgnoreCase) + ) + { + Indices = new IndexedAttribute[] { new IndexedAttribute() }; + } + IsNullable = !(IsPK || Orm.IsMarkedNotNull(prop)); + MaxStringLength = Orm.MaxStringLength(prop); + } + + public void SetValue(object obj, object val) + { + _prop.SetValue(obj, val, null); + } + + public object GetValue(object obj) + { + return _prop.GetGetMethod().Invoke(obj, null); + } + } + } + + public static class Orm + { + public const int DefaultMaxStringLength = 140; + public const string ImplicitPkName = "Id"; + public const string ImplicitIndexSuffix = "Id"; + + public static string SqlDecl(TableMapping.Column p, bool storeDateTimeAsTicks) + { + string decl = "\"" + p.Name + "\" " + SqlType(p, storeDateTimeAsTicks) + " "; + + if (p.IsPK) + { + decl += "primary key "; + } + if (p.IsAutoInc) + { + decl += "autoincrement "; + } + if (!p.IsNullable) + { + decl += "not null "; + } + if (!string.IsNullOrEmpty(p.Collation)) + { + decl += "collate " + p.Collation + " "; + } + + return decl; + } + + public static string SqlType(TableMapping.Column p, bool storeDateTimeAsTicks) + { + var clrType = p.ColumnType; + if (clrType == typeof(Boolean) || clrType == typeof(Byte) || clrType == typeof(UInt16) || clrType == typeof(SByte) || clrType == typeof(Int16) || clrType == typeof(Int32)) + { + return "integer"; + } + else if (clrType == typeof(UInt32) || clrType == typeof(Int64)) + { + return "bigint"; + } + else if (clrType == typeof(Single) || clrType == typeof(Double) || clrType == typeof(Decimal)) + { + return "float"; + } + else if (clrType == typeof(String)) + { + int? len = p.MaxStringLength; + + if (len.HasValue) + return "varchar(" + len.Value + ")"; + + return "varchar"; + } + else if (clrType == typeof(TimeSpan)) + { + return "bigint"; + } + else if (clrType == typeof(DateTime)) + { + return storeDateTimeAsTicks ? "bigint" : "datetime"; + } + else if (clrType == typeof(DateTimeOffset)) + { + return "bigint"; +#if !NETFX_CORE + } + else if (clrType.IsEnum) + { +#else + } else if (clrType.GetTypeInfo().IsEnum) { +#endif + return "integer"; + } + else if (clrType == typeof(byte[])) + { + return "blob"; + } + else if (clrType == typeof(Guid)) + { + return "varchar(36)"; + } + else + { + throw new NotSupportedException("Don't know about " + clrType); + } + } + + public static bool IsPK(MemberInfo p) + { + var attrs = p.GetCustomAttributes(typeof(PrimaryKeyAttribute), true); +#if !NETFX_CORE + return attrs.Length > 0; +#else + return attrs.Count() > 0; +#endif + } + + public static string Collation(MemberInfo p) + { + var attrs = p.GetCustomAttributes(typeof(CollationAttribute), true); +#if !NETFX_CORE + if (attrs.Length > 0) + { + return ((CollationAttribute)attrs[0]).Value; +#else + if (attrs.Count() > 0) { + return ((CollationAttribute)attrs.First()).Value; +#endif + } + else + { + return string.Empty; + } + } + + public static bool IsAutoInc(MemberInfo p) + { + var attrs = p.GetCustomAttributes(typeof(AutoIncrementAttribute), true); +#if !NETFX_CORE + return attrs.Length > 0; +#else + return attrs.Count() > 0; +#endif + } + + public static IEnumerable GetIndices(MemberInfo p) + { + var attrs = p.GetCustomAttributes(typeof(IndexedAttribute), true); + return attrs.Cast(); + } + + public static int? MaxStringLength(PropertyInfo p) + { + var attrs = p.GetCustomAttributes(typeof(MaxLengthAttribute), true); +#if !NETFX_CORE + if (attrs.Length > 0) + return ((MaxLengthAttribute)attrs[0]).Value; +#else + if (attrs.Count() > 0) + return ((MaxLengthAttribute)attrs.First()).Value; +#endif + + return null; + } + + public static bool IsMarkedNotNull(MemberInfo p) + { + var attrs = p.GetCustomAttributes(typeof(NotNullAttribute), true); +#if !NETFX_CORE + return attrs.Length > 0; +#else + return attrs.Count() > 0; +#endif + } + } + + public partial class SQLiteCommand + { + SQLiteConnection _conn; + private List _bindings; + + public string CommandText { get; set; } + + internal SQLiteCommand(SQLiteConnection conn) + { + _conn = conn; + _bindings = new List(); + CommandText = ""; + } + + public int ExecuteNonQuery() + { + if (_conn.Trace) + { + _conn.InvokeTrace("Executing: " + this); + } + + var r = SQLite3.Result.OK; + lock (_conn.SyncObject) + { + var stmt = Prepare(); + r = SQLite3.Step(stmt); + Finalize(stmt); + } + if (r == SQLite3.Result.Done) + { + int rowsAffected = SQLite3.Changes(_conn.Handle); + return rowsAffected; + } + else if (r == SQLite3.Result.Error) + { + string msg = SQLite3.GetErrmsg(_conn.Handle); + throw SQLiteException.New(r, msg); + } + else if (r == SQLite3.Result.Constraint) + { + if (SQLite3.ExtendedErrCode(_conn.Handle) == SQLite3.ExtendedResult.ConstraintNotNull) + { + throw NotNullConstraintViolationException.New(r, SQLite3.GetErrmsg(_conn.Handle)); + } + } + + throw SQLiteException.New(r, r.ToString()); + } + + public IEnumerable ExecuteDeferredQuery() + { + return ExecuteDeferredQuery(_conn.GetMapping(typeof(T))); + } + + public List ExecuteQuery() + { + return ExecuteDeferredQuery(_conn.GetMapping(typeof(T))).ToList(); + } + + public List ExecuteQuery(TableMapping map) + { + return ExecuteDeferredQuery(map).ToList(); + } + + /// + /// Invoked every time an instance is loaded from the database. + /// + /// + /// The newly created object. + /// + /// + /// This can be overridden in combination with the + /// method to hook into the life-cycle of objects. + /// + /// Type safety is not possible because MonoTouch does not support virtual generic methods. + /// + protected virtual void OnInstanceCreated(object obj) + { + // Can be overridden. + } + + public IEnumerable ExecuteDeferredQuery(TableMapping map) + { + if (_conn.Trace) + { + _conn.InvokeTrace("Executing Query: " + this); + } + + lock (_conn.SyncObject) + { + var stmt = Prepare(); + try + { + var cols = new TableMapping.Column[SQLite3.ColumnCount(stmt)]; + + for (int i = 0; i < cols.Length; i++) + { + var name = SQLite3.ColumnName16(stmt, i); + cols[i] = map.FindColumn(name); + } + + while (SQLite3.Step(stmt) == SQLite3.Result.Row) + { + var obj = Activator.CreateInstance(map.MappedType); + for (int i = 0; i < cols.Length; i++) + { + if (cols[i] == null) + continue; + var colType = SQLite3.ColumnType(stmt, i); + var val = ReadCol(stmt, i, colType, cols[i].ColumnType); + cols[i].SetValue(obj, val); + } + OnInstanceCreated(obj); + yield return (T)obj; + } + } + finally + { + SQLite3.Finalize(stmt); + } + } + } + + public T ExecuteScalar() + { + if (_conn.Trace) + { + _conn.InvokeTrace("Executing Query: " + this); + } + + T val = default(T); + + lock (_conn.SyncObject) + { + var stmt = Prepare(); + + try + { + var r = SQLite3.Step(stmt); + if (r == SQLite3.Result.Row) + { + var colType = SQLite3.ColumnType(stmt, 0); + val = (T)ReadCol(stmt, 0, colType, typeof(T)); + } + else if (r == SQLite3.Result.Done) + { + } + else + { + throw SQLiteException.New(r, SQLite3.GetErrmsg(_conn.Handle)); + } + } + finally + { + Finalize(stmt); + } + } + + return val; + } + + public void Bind(string name, object val) + { + _bindings.Add(new Binding + { + Name = name, + Value = val + }); + } + + public void Bind(object val) + { + Bind(null, val); + } + + public override string ToString() + { + var parts = new string[1 + _bindings.Count]; + parts[0] = CommandText; + var i = 1; + foreach (var b in _bindings) + { + parts[i] = string.Format(" {0}: {1}", i - 1, b.Value); + i++; + } + return string.Join(Environment.NewLine, parts); + } + + Sqlite3Statement Prepare() + { + var stmt = SQLite3.Prepare2(_conn.Handle, CommandText); + BindAll(stmt); + return stmt; + } + + void Finalize(Sqlite3Statement stmt) + { + SQLite3.Finalize(stmt); + } + + void BindAll(Sqlite3Statement stmt) + { + int nextIdx = 1; + foreach (var b in _bindings) + { + if (b.Name != null) + { + b.Index = SQLite3.BindParameterIndex(stmt, b.Name); + } + else + { + b.Index = nextIdx++; + } + + BindParameter(stmt, b.Index, b.Value, _conn.StoreDateTimeAsTicks); + } + } + + internal static IntPtr NegativePointer = new IntPtr(-1); + + internal static void BindParameter(Sqlite3Statement stmt, int index, object value, bool storeDateTimeAsTicks) + { + if (value == null) + { + SQLite3.BindNull(stmt, index); + } + else + { + if (value is Int32) + { + SQLite3.BindInt(stmt, index, (int)value); + } + else if (value is String) + { + SQLite3.BindText(stmt, index, (string)value, -1, NegativePointer); + } + else if (value is Byte || value is UInt16 || value is SByte || value is Int16) + { + SQLite3.BindInt(stmt, index, Convert.ToInt32(value)); + } + else if (value is Boolean) + { + SQLite3.BindInt(stmt, index, (bool)value ? 1 : 0); + } + else if (value is UInt32 || value is Int64) + { + SQLite3.BindInt64(stmt, index, Convert.ToInt64(value)); + } + else if (value is Single || value is Double || value is Decimal) + { + SQLite3.BindDouble(stmt, index, Convert.ToDouble(value)); + } + else if (value is TimeSpan) + { + SQLite3.BindInt64(stmt, index, ((TimeSpan)value).Ticks); + } + else if (value is DateTime) + { + if (storeDateTimeAsTicks) + { + SQLite3.BindInt64(stmt, index, ((DateTime)value).Ticks); + } + else + { + SQLite3.BindText(stmt, index, ((DateTime)value).ToString("yyyy-MM-dd HH:mm:ss"), -1, NegativePointer); + } + } + else if (value is DateTimeOffset) + { + SQLite3.BindInt64(stmt, index, ((DateTimeOffset)value).UtcTicks); +#if !NETFX_CORE + } + else if (value.GetType().IsEnum) + { +#else + } else if (value.GetType().GetTypeInfo().IsEnum) { +#endif + SQLite3.BindInt(stmt, index, Convert.ToInt32(value)); + } + else if (value is byte[]) + { + SQLite3.BindBlob(stmt, index, (byte[])value, ((byte[])value).Length, NegativePointer); + } + else if (value is Guid) + { + SQLite3.BindText(stmt, index, ((Guid)value).ToString(), 72, NegativePointer); + } + else + { + throw new NotSupportedException("Cannot store type: " + value.GetType()); + } + } + } + + class Binding + { + public string Name { get; set; } + + public object Value { get; set; } + + public int Index { get; set; } + } + + object ReadCol(Sqlite3Statement stmt, int index, SQLite3.ColType type, Type clrType) + { + if (type == SQLite3.ColType.Null) + { + return null; + } + else + { + if (clrType == typeof(String)) + { + return SQLite3.ColumnString(stmt, index); + } + else if (clrType == typeof(Int32)) + { + return (int)SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(Boolean)) + { + return SQLite3.ColumnInt(stmt, index) == 1; + } + else if (clrType == typeof(double)) + { + return SQLite3.ColumnDouble(stmt, index); + } + else if (clrType == typeof(float)) + { + return (float)SQLite3.ColumnDouble(stmt, index); + } + else if (clrType == typeof(TimeSpan)) + { + return new TimeSpan(SQLite3.ColumnInt64(stmt, index)); + } + else if (clrType == typeof(DateTime)) + { + if (_conn.StoreDateTimeAsTicks) + { + return new DateTime(SQLite3.ColumnInt64(stmt, index)); + } + else + { + var text = SQLite3.ColumnString(stmt, index); + return DateTime.Parse(text); + } + } + else if (clrType == typeof(DateTimeOffset)) + { + return new DateTimeOffset(SQLite3.ColumnInt64(stmt, index), TimeSpan.Zero); +#if !NETFX_CORE + } + else if (clrType.IsEnum) + { +#else + } else if (clrType.GetTypeInfo().IsEnum) { +#endif + return SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(Int64)) + { + return SQLite3.ColumnInt64(stmt, index); + } + else if (clrType == typeof(UInt32)) + { + return (uint)SQLite3.ColumnInt64(stmt, index); + } + else if (clrType == typeof(decimal)) + { + return (decimal)SQLite3.ColumnDouble(stmt, index); + } + else if (clrType == typeof(Byte)) + { + return (byte)SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(UInt16)) + { + return (ushort)SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(Int16)) + { + return (short)SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(sbyte)) + { + return (sbyte)SQLite3.ColumnInt(stmt, index); + } + else if (clrType == typeof(byte[])) + { + return SQLite3.ColumnByteArray(stmt, index); + } + else if (clrType == typeof(Guid)) + { + var text = SQLite3.ColumnString(stmt, index); + return new Guid(text); + } + else + { + throw new NotSupportedException("Don't know how to read " + clrType); + } + } + } + } + + /// + /// Since the insert never changed, we only need to prepare once. + /// + public class PreparedSqlLiteInsertCommand : IDisposable + { + public bool Initialized { get; set; } + + protected SQLiteConnection Connection { get; set; } + + public string CommandText { get; set; } + + protected Sqlite3Statement Statement { get; set; } + internal static readonly Sqlite3Statement NullStatement = default(Sqlite3Statement); + + internal PreparedSqlLiteInsertCommand(SQLiteConnection conn) + { + Connection = conn; + } + + public int ExecuteNonQuery(object[] source) + { + if (Connection.Trace) + { + Connection.InvokeTrace("Executing: " + CommandText); + } + + var r = SQLite3.Result.OK; + + if (!Initialized) + { + Statement = Prepare(); + Initialized = true; + } + + //bind the values. + if (source != null) + { + for (int i = 0; i < source.Length; i++) + { + SQLiteCommand.BindParameter(Statement, i + 1, source[i], Connection.StoreDateTimeAsTicks); + } + } + r = SQLite3.Step(Statement); + + if (r == SQLite3.Result.Done) + { + int rowsAffected = SQLite3.Changes(Connection.Handle); + SQLite3.Reset(Statement); + return rowsAffected; + } + else if (r == SQLite3.Result.Error) + { + string msg = SQLite3.GetErrmsg(Connection.Handle); + SQLite3.Reset(Statement); + throw SQLiteException.New(r, msg); + } + else if (r == SQLite3.Result.Constraint && SQLite3.ExtendedErrCode(Connection.Handle) == SQLite3.ExtendedResult.ConstraintNotNull) + { + SQLite3.Reset(Statement); + throw NotNullConstraintViolationException.New(r, SQLite3.GetErrmsg(Connection.Handle)); + } + else + { + SQLite3.Reset(Statement); + throw SQLiteException.New(r, r.ToString()); + } + } + + protected virtual Sqlite3Statement Prepare() + { + var stmt = SQLite3.Prepare2(Connection.Handle, CommandText); + return stmt; + } + + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + private void Dispose(bool disposing) + { + if (Statement != NullStatement) + { + try + { + SQLite3.Finalize(Statement); + } + finally + { + Statement = NullStatement; + Connection = null; + } + } + } + + ~PreparedSqlLiteInsertCommand() + { + Dispose(false); + } + } + + public abstract class BaseTableQuery + { + protected class Ordering + { + public string ColumnName { get; set; } + public bool Ascending { get; set; } + } + } + + public class TableQuery : BaseTableQuery, IEnumerable + { + public SQLiteConnection Connection { get; private set; } + + public TableMapping Table { get; private set; } + + Expression _where; + List _orderBys; + int? _limit; + int? _offset; + + BaseTableQuery _joinInner; + Expression _joinInnerKeySelector; + BaseTableQuery _joinOuter; + Expression _joinOuterKeySelector; + Expression _joinSelector; + + Expression _selector; + + TableQuery(SQLiteConnection conn, TableMapping table) + { + Connection = conn; + Table = table; + } + + public TableQuery(SQLiteConnection conn) + { + Connection = conn; + Table = Connection.GetMapping(typeof(T)); + } + + public TableQuery Clone() + { + var q = new TableQuery(Connection, Table); + q._where = _where; + q._deferred = _deferred; + if (_orderBys != null) + { + q._orderBys = new List(_orderBys); + } + q._limit = _limit; + q._offset = _offset; + q._joinInner = _joinInner; + q._joinInnerKeySelector = _joinInnerKeySelector; + q._joinOuter = _joinOuter; + q._joinOuterKeySelector = _joinOuterKeySelector; + q._joinSelector = _joinSelector; + q._selector = _selector; + return q; + } + + /// + /// ǽĿ ̺ ͸մϴ. + /// + /// + /// ͸ϴ ǽ. + /// + /// + /// ͸ TableQuery ü. + /// + /// + /// + /// // ǽ ͸ + /// var adults = db.Table<Person>() + /// .Where(p => p.Age >= 18); + /// + /// // ü̴ + /// var adultMales = db.Table<Person>() + /// .Where(p => p.Age >= 18) + /// .Where(p => p.Gender == ""); + /// + /// foreach (var person in adults) { + /// Console.WriteLine($": {person.Name}, {person.Age}"); + /// } + /// + /// + public TableQuery Where(Expression> predExpr) + { + if (predExpr.NodeType == ExpressionType.Lambda) + { + var lambda = (LambdaExpression)predExpr; + var pred = lambda.Body; + var q = Clone(); + q.AddWhere(pred); + return q; + } + else + { + throw new NotSupportedException("Must be a predicate"); + } + } + + public TableQuery Take(int n) + { + var q = Clone(); + q._limit = n; + return q; + } + + public TableQuery Skip(int n) + { + var q = Clone(); + q._offset = n; + return q; + } + + public T ElementAt(int index) + { + return Skip(index).Take(1).First(); + } + + bool _deferred; + public TableQuery Deferred() + { + var q = Clone(); + q._deferred = true; + return q; + } + + /// + /// Ӽ ̺ մϴ. + /// + /// Ӽ Ÿ + /// Ӽ ϴ + /// ĵ ü + /// + /// + /// // ̼ + /// var peopleByAge = db.Table<Person>().OrderBy(p => p.Age); + /// + /// // ̸ + /// var peopleByName = db.Table<Person>().OrderBy(p => p.Name); + /// + /// foreach (var person in peopleByAge) { + /// Console.WriteLine($"{person.Name}, {person.Age}"); + /// } + /// + /// + public TableQuery OrderBy(Expression> orderExpr) + { + return AddOrderBy(orderExpr, true); + } + + /// + /// Ӽ ̺ մϴ. + /// + /// Ӽ Ÿ + /// Ӽ ϴ + /// ĵ ü + /// + /// + /// // + /// var olderFirst = db.Table<Person>().OrderByDescending(p => p.Age); + /// + /// // ̸ + /// var reverseAlpha = db.Table<Person>().OrderByDescending(p => p.Name); + /// + /// foreach (var person in olderFirst) { + /// Console.WriteLine($"{person.Name}, {person.Age}"); + /// } + /// + /// + public TableQuery OrderByDescending(Expression> orderExpr) + { + return AddOrderBy(orderExpr, false); + } + + public TableQuery ThenBy(Expression> orderExpr) + { + return AddOrderBy(orderExpr, true); + } + + public TableQuery ThenByDescending(Expression> orderExpr) + { + return AddOrderBy(orderExpr, false); + } + + private TableQuery AddOrderBy(Expression> orderExpr, bool asc) + { + if (orderExpr.NodeType == ExpressionType.Lambda) + { + var lambda = (LambdaExpression)orderExpr; + + MemberExpression mem = null; + + var unary = lambda.Body as UnaryExpression; + if (unary != null && unary.NodeType == ExpressionType.Convert) + { + mem = unary.Operand as MemberExpression; + } + else + { + mem = lambda.Body as MemberExpression; + } + + if (mem != null && (mem.Expression.NodeType == ExpressionType.Parameter)) + { + var q = Clone(); + if (q._orderBys == null) + { + q._orderBys = new List(); + } + q._orderBys.Add(new Ordering + { + ColumnName = Table.FindColumnWithPropertyName(mem.Member.Name).Name, + Ascending = asc + }); + return q; + } + else + { + throw new NotSupportedException("Order By does not support: " + orderExpr); + } + } + else + { + throw new NotSupportedException("Must be a predicate"); + } + } + + private void AddWhere(Expression pred) + { + if (_where == null) + { + _where = pred; + } + else + { + _where = Expression.AndAlso(_where, pred); + } + } + + public TableQuery Join( + TableQuery inner, + Expression> outerKeySelector, + Expression> innerKeySelector, + Expression> resultSelector) + { + var q = new TableQuery(Connection, Connection.GetMapping(typeof(TResult))) + { + _joinOuter = this, + _joinOuterKeySelector = outerKeySelector, + _joinInner = inner, + _joinInnerKeySelector = innerKeySelector, + _joinSelector = resultSelector, + }; + return q; + } + + public TableQuery Select(Expression> selector) + { + var q = Clone(); + q._selector = selector; + return q; + } + + private SQLiteCommand GenerateCommand(string selectionList) + { + if (_joinInner != null && _joinOuter != null) + { + throw new NotSupportedException("Joins are not supported."); + } + else + { + var cmdText = "select " + selectionList + " from \"" + Table.TableName + "\""; + var args = new List(); + if (_where != null) + { + var w = CompileExpr(_where, args); + cmdText += " where " + w.CommandText; + } + if ((_orderBys != null) && (_orderBys.Count > 0)) + { + var t = string.Join(", ", _orderBys.Select(o => "\"" + o.ColumnName + "\"" + (o.Ascending ? "" : " desc")).ToArray()); + cmdText += " order by " + t; + } + if (_limit.HasValue) + { + cmdText += " limit " + _limit.Value; + } + if (_offset.HasValue) + { + if (!_limit.HasValue) + { + cmdText += " limit -1 "; + } + cmdText += " offset " + _offset.Value; + } + return Connection.CreateCommand(cmdText, args.ToArray()); + } + } + + class CompileResult + { + public string CommandText { get; set; } + + public object Value { get; set; } + } + + private CompileResult CompileExpr(Expression expr, List queryArgs) + { + if (expr == null) + { + throw new NotSupportedException("Expression is NULL"); + } + else if (expr is BinaryExpression) + { + var bin = (BinaryExpression)expr; + + var leftr = CompileExpr(bin.Left, queryArgs); + var rightr = CompileExpr(bin.Right, queryArgs); + + //If either side is a parameter and is null, then handle the other side specially (for "is null"/"is not null") + string text; + if (leftr.CommandText == "?" && leftr.Value == null) + text = CompileNullBinaryExpression(bin, rightr); + else if (rightr.CommandText == "?" && rightr.Value == null) + text = CompileNullBinaryExpression(bin, leftr); + else + text = "(" + leftr.CommandText + " " + GetSqlName(bin) + " " + rightr.CommandText + ")"; + return new CompileResult { CommandText = text }; + } + else if (expr.NodeType == ExpressionType.Call) + { + + var call = (MethodCallExpression)expr; + var args = new CompileResult[call.Arguments.Count]; + var obj = call.Object != null ? CompileExpr(call.Object, queryArgs) : null; + + for (var i = 0; i < args.Length; i++) + { + args[i] = CompileExpr(call.Arguments[i], queryArgs); + } + + var sqlCall = ""; + + if (call.Method.Name == "Like" && args.Length == 2) + { + sqlCall = "(" + args[0].CommandText + " like " + args[1].CommandText + ")"; + } + else if (call.Method.Name == "Contains" && args.Length == 2) + { + sqlCall = "(" + args[1].CommandText + " in " + args[0].CommandText + ")"; + } + else if (call.Method.Name == "Contains" && args.Length == 1) + { + if (call.Object != null && call.Object.Type == typeof(string)) + { + sqlCall = "(" + obj.CommandText + " like ('%' || " + args[0].CommandText + " || '%'))"; + } + else + { + sqlCall = "(" + args[0].CommandText + " in " + obj.CommandText + ")"; + } + } + else if (call.Method.Name == "StartsWith" && args.Length == 1) + { + sqlCall = "(" + obj.CommandText + " like (" + args[0].CommandText + " || '%'))"; + } + else if (call.Method.Name == "EndsWith" && args.Length == 1) + { + sqlCall = "(" + obj.CommandText + " like ('%' || " + args[0].CommandText + "))"; + } + else if (call.Method.Name == "Equals" && args.Length == 1) + { + sqlCall = "(" + obj.CommandText + " = (" + args[0].CommandText + "))"; + } + else if (call.Method.Name == "ToLower") + { + sqlCall = "(lower(" + obj.CommandText + "))"; + } + else if (call.Method.Name == "ToUpper") + { + sqlCall = "(upper(" + obj.CommandText + "))"; + } + else + { + sqlCall = call.Method.Name.ToLower() + "(" + string.Join(",", args.Select(a => a.CommandText).ToArray()) + ")"; + } + return new CompileResult { CommandText = sqlCall }; + + } + else if (expr.NodeType == ExpressionType.Constant) + { + var c = (ConstantExpression)expr; + queryArgs.Add(c.Value); + return new CompileResult + { + CommandText = "?", + Value = c.Value + }; + } + else if (expr.NodeType == ExpressionType.Convert) + { + var u = (UnaryExpression)expr; + var ty = u.Type; + var valr = CompileExpr(u.Operand, queryArgs); + return new CompileResult + { + CommandText = valr.CommandText, + Value = valr.Value != null ? ConvertTo(valr.Value, ty) : null + }; + } + else if (expr.NodeType == ExpressionType.Not) + { + var u = (UnaryExpression)expr; + var ty = u.Type; + var valr = CompileExpr(u.Operand, queryArgs); + + return new CompileResult + { + CommandText = "NOT " + valr.CommandText, + Value = valr.Value != null ? valr.Value : null + }; + } + else if (expr.NodeType == ExpressionType.MemberAccess) + { + var mem = (MemberExpression)expr; + + if (mem.Expression != null && mem.Expression.NodeType == ExpressionType.Parameter) + { + // + // This is a column of our table, output just the column name + // Need to translate it if that column name is mapped + // + var columnName = Table.FindColumnWithPropertyName(mem.Member.Name).Name; + return new CompileResult { CommandText = "\"" + columnName + "\"" }; + } + else + { + object obj = null; + if (mem.Expression != null) + { + var r = CompileExpr(mem.Expression, queryArgs); + if (r.Value == null) + { + throw new NotSupportedException("Member access failed to compile expression"); + } + if (r.CommandText == "?") + { + queryArgs.RemoveAt(queryArgs.Count - 1); + } + obj = r.Value; + } + + // + // Get the member value + // + object val = null; + +#if !NETFX_CORE + if (mem.Member.MemberType == MemberTypes.Property) + { +#else + if (mem.Member is PropertyInfo) { +#endif + var m = (PropertyInfo)mem.Member; + //val = m.GetValue (obj, null); + val = m.GetGetMethod().Invoke(obj, null); +#if !NETFX_CORE + } + else if (mem.Member.MemberType == MemberTypes.Field) + { +#else + } else if (mem.Member is FieldInfo) { +#endif +#if SILVERLIGHT + val = Expression.Lambda (expr).Compile ().DynamicInvoke (); +#else + var m = (FieldInfo)mem.Member; + val = m.GetValue(obj); +#endif + } + else + { +#if !NETFX_CORE + throw new NotSupportedException("MemberExpr: " + mem.Member.MemberType); +#else + throw new NotSupportedException ("MemberExpr: " + mem.Member.DeclaringType); +#endif + } + + // + // Work special magic for enumerables + // + if (val != null && val is System.Collections.IEnumerable && !(val is string) && !(val is System.Collections.Generic.IEnumerable)) + { + var sb = new System.Text.StringBuilder(); + sb.Append("("); + var head = ""; + foreach (var a in (System.Collections.IEnumerable)val) + { + queryArgs.Add(a); + sb.Append(head); + sb.Append("?"); + head = ","; + } + sb.Append(")"); + return new CompileResult + { + CommandText = sb.ToString(), + Value = val + }; + } + else + { + queryArgs.Add(val); + return new CompileResult + { + CommandText = "?", + Value = val + }; + } + } + } + throw new NotSupportedException("Cannot compile: " + expr.NodeType.ToString()); + } + + static object ConvertTo(object obj, Type t) + { + Type nut = Nullable.GetUnderlyingType(t); + + if (nut != null) + { + if (obj == null) return null; + return Convert.ChangeType(obj, nut); + } + else + { + return Convert.ChangeType(obj, t); + } + } + + /// + /// Compiles a BinaryExpression where one of the parameters is null. + /// + /// The non-null parameter + private string CompileNullBinaryExpression(BinaryExpression expression, CompileResult parameter) + { + if (expression.NodeType == ExpressionType.Equal) + return "(" + parameter.CommandText + " is ?)"; + else if (expression.NodeType == ExpressionType.NotEqual) + return "(" + parameter.CommandText + " is not ?)"; + else + throw new NotSupportedException("Cannot compile Null-BinaryExpression with type " + expression.NodeType.ToString()); + } + + string GetSqlName(Expression expr) + { + var n = expr.NodeType; + if (n == ExpressionType.GreaterThan) + return ">"; + else if (n == ExpressionType.GreaterThanOrEqual) + { + return ">="; + } + else if (n == ExpressionType.LessThan) + { + return "<"; + } + else if (n == ExpressionType.LessThanOrEqual) + { + return "<="; + } + else if (n == ExpressionType.And) + { + return "&"; + } + else if (n == ExpressionType.AndAlso) + { + return "and"; + } + else if (n == ExpressionType.Or) + { + return "|"; + } + else if (n == ExpressionType.OrElse) + { + return "or"; + } + else if (n == ExpressionType.Equal) + { + return "="; + } + else if (n == ExpressionType.NotEqual) + { + return "!="; + } + else + { + throw new NotSupportedException("Cannot get SQL for: " + n); + } + } + + public int Count() + { + return GenerateCommand("count(*)").ExecuteScalar(); + } + + public int Count(Expression> predExpr) + { + return Where(predExpr).Count(); + } + + public IEnumerator GetEnumerator() + { + if (!_deferred) + return GenerateCommand("*").ExecuteQuery().GetEnumerator(); + + return GenerateCommand("*").ExecuteDeferredQuery().GetEnumerator(); + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public T First() + { + var query = Take(1); + return query.ToList().First(); + } + + public T FirstOrDefault() + { + var query = Take(1); + return query.ToList().FirstOrDefault(); + } + } + + public static class SQLite3 + { + public enum Result : int + { + OK = 0, + Error = 1, + Internal = 2, + Perm = 3, + Abort = 4, + Busy = 5, + Locked = 6, + NoMem = 7, + ReadOnly = 8, + Interrupt = 9, + IOError = 10, + Corrupt = 11, + NotFound = 12, + Full = 13, + CannotOpen = 14, + LockErr = 15, + Empty = 16, + SchemaChngd = 17, + TooBig = 18, + Constraint = 19, + Mismatch = 20, + Misuse = 21, + NotImplementedLFS = 22, + AccessDenied = 23, + Format = 24, + Range = 25, + NonDBFile = 26, + Notice = 27, + Warning = 28, + Row = 100, + Done = 101 + } + + public enum ExtendedResult : int + { + IOErrorRead = (Result.IOError | (1 << 8)), + IOErrorShortRead = (Result.IOError | (2 << 8)), + IOErrorWrite = (Result.IOError | (3 << 8)), + IOErrorFsync = (Result.IOError | (4 << 8)), + IOErrorDirFSync = (Result.IOError | (5 << 8)), + IOErrorTruncate = (Result.IOError | (6 << 8)), + IOErrorFStat = (Result.IOError | (7 << 8)), + IOErrorUnlock = (Result.IOError | (8 << 8)), + IOErrorRdlock = (Result.IOError | (9 << 8)), + IOErrorDelete = (Result.IOError | (10 << 8)), + IOErrorBlocked = (Result.IOError | (11 << 8)), + IOErrorNoMem = (Result.IOError | (12 << 8)), + IOErrorAccess = (Result.IOError | (13 << 8)), + IOErrorCheckReservedLock = (Result.IOError | (14 << 8)), + IOErrorLock = (Result.IOError | (15 << 8)), + IOErrorClose = (Result.IOError | (16 << 8)), + IOErrorDirClose = (Result.IOError | (17 << 8)), + IOErrorSHMOpen = (Result.IOError | (18 << 8)), + IOErrorSHMSize = (Result.IOError | (19 << 8)), + IOErrorSHMLock = (Result.IOError | (20 << 8)), + IOErrorSHMMap = (Result.IOError | (21 << 8)), + IOErrorSeek = (Result.IOError | (22 << 8)), + IOErrorDeleteNoEnt = (Result.IOError | (23 << 8)), + IOErrorMMap = (Result.IOError | (24 << 8)), + LockedSharedcache = (Result.Locked | (1 << 8)), + BusyRecovery = (Result.Busy | (1 << 8)), + CannottOpenNoTempDir = (Result.CannotOpen | (1 << 8)), + CannotOpenIsDir = (Result.CannotOpen | (2 << 8)), + CannotOpenFullPath = (Result.CannotOpen | (3 << 8)), + CorruptVTab = (Result.Corrupt | (1 << 8)), + ReadonlyRecovery = (Result.ReadOnly | (1 << 8)), + ReadonlyCannotLock = (Result.ReadOnly | (2 << 8)), + ReadonlyRollback = (Result.ReadOnly | (3 << 8)), + AbortRollback = (Result.Abort | (2 << 8)), + ConstraintCheck = (Result.Constraint | (1 << 8)), + ConstraintCommitHook = (Result.Constraint | (2 << 8)), + ConstraintForeignKey = (Result.Constraint | (3 << 8)), + ConstraintFunction = (Result.Constraint | (4 << 8)), + ConstraintNotNull = (Result.Constraint | (5 << 8)), + ConstraintPrimaryKey = (Result.Constraint | (6 << 8)), + ConstraintTrigger = (Result.Constraint | (7 << 8)), + ConstraintUnique = (Result.Constraint | (8 << 8)), + ConstraintVTab = (Result.Constraint | (9 << 8)), + NoticeRecoverWAL = (Result.Notice | (1 << 8)), + NoticeRecoverRollback = (Result.Notice | (2 << 8)) + } + + + public enum ConfigOption : int + { + SingleThread = 1, + MultiThread = 2, + Serialized = 3 + } + +#if !USE_CSHARP_SQLITE && !USE_WP8_NATIVE_SQLITE + [DllImport("sqlite3", EntryPoint = "sqlite3_open", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Open([MarshalAs(UnmanagedType.LPStr)] string filename, out IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_open_v2", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Open([MarshalAs(UnmanagedType.LPStr)] string filename, out IntPtr db, int flags, IntPtr zvfs); + + [DllImport("sqlite3", EntryPoint = "sqlite3_open_v2", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Open(byte[] filename, out IntPtr db, int flags, IntPtr zvfs); + + [DllImport("sqlite3", EntryPoint = "sqlite3_open16", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Open16([MarshalAs(UnmanagedType.LPWStr)] string filename, out IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_enable_load_extension", CallingConvention = CallingConvention.Cdecl)] + public static extern Result EnableLoadExtension(IntPtr db, int onoff); + + [DllImport("sqlite3", EntryPoint = "sqlite3_close", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Close(IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_initialize", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Initialize(); + + [DllImport("sqlite3", EntryPoint = "sqlite3_shutdown", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Shutdown(); + + [DllImport("sqlite3", EntryPoint = "sqlite3_config", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Config(ConfigOption option); + + [DllImport("sqlite3", EntryPoint = "sqlite3_win32_set_directory", CallingConvention = CallingConvention.Cdecl, CharSet = CharSet.Unicode)] + public static extern int SetDirectory(uint directoryType, string directoryPath); + + [DllImport("sqlite3", EntryPoint = "sqlite3_busy_timeout", CallingConvention = CallingConvention.Cdecl)] + public static extern Result BusyTimeout(IntPtr db, int milliseconds); + + [DllImport("sqlite3", EntryPoint = "sqlite3_changes", CallingConvention = CallingConvention.Cdecl)] + public static extern int Changes(IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_prepare_v2", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Prepare2(IntPtr db, [MarshalAs(UnmanagedType.LPStr)] string sql, int numBytes, out IntPtr stmt, IntPtr pzTail); + +#if NETFX_CORE + [DllImport ("sqlite3", EntryPoint = "sqlite3_prepare_v2", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Prepare2 (IntPtr db, byte[] queryBytes, int numBytes, out IntPtr stmt, IntPtr pzTail); +#endif + + public static IntPtr Prepare2(IntPtr db, string query) + { + IntPtr stmt; +#if NETFX_CORE + byte[] queryBytes = System.Text.UTF8Encoding.UTF8.GetBytes (query); + var r = Prepare2 (db, queryBytes, queryBytes.Length, out stmt, IntPtr.Zero); +#else + var r = Prepare2(db, query, System.Text.UTF8Encoding.UTF8.GetByteCount(query), out stmt, IntPtr.Zero); +#endif + if (r != Result.OK) + { + throw SQLiteException.New(r, GetErrmsg(db)); + } + return stmt; + } + + [DllImport("sqlite3", EntryPoint = "sqlite3_step", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Step(IntPtr stmt); + + [DllImport("sqlite3", EntryPoint = "sqlite3_reset", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Reset(IntPtr stmt); + + [DllImport("sqlite3", EntryPoint = "sqlite3_finalize", CallingConvention = CallingConvention.Cdecl)] + public static extern Result Finalize(IntPtr stmt); + + [DllImport("sqlite3", EntryPoint = "sqlite3_last_insert_rowid", CallingConvention = CallingConvention.Cdecl)] + public static extern long LastInsertRowid(IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_errmsg16", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr Errmsg(IntPtr db); + + public static string GetErrmsg(IntPtr db) + { + return Marshal.PtrToStringUni(Errmsg(db)); + } + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_parameter_index", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindParameterIndex(IntPtr stmt, [MarshalAs(UnmanagedType.LPStr)] string name); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_null", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindNull(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_int", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindInt(IntPtr stmt, int index, int val); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_int64", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindInt64(IntPtr stmt, int index, long val); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_double", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindDouble(IntPtr stmt, int index, double val); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_text16", CallingConvention = CallingConvention.Cdecl, CharSet = CharSet.Unicode)] + public static extern int BindText(IntPtr stmt, int index, [MarshalAs(UnmanagedType.LPWStr)] string val, int n, IntPtr free); + + [DllImport("sqlite3", EntryPoint = "sqlite3_bind_blob", CallingConvention = CallingConvention.Cdecl)] + public static extern int BindBlob(IntPtr stmt, int index, byte[] val, int n, IntPtr free); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_count", CallingConvention = CallingConvention.Cdecl)] + public static extern int ColumnCount(IntPtr stmt); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_name", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr ColumnName(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_name16", CallingConvention = CallingConvention.Cdecl)] + static extern IntPtr ColumnName16Internal(IntPtr stmt, int index); + public static string ColumnName16(IntPtr stmt, int index) + { + return Marshal.PtrToStringUni(ColumnName16Internal(stmt, index)); + } + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_type", CallingConvention = CallingConvention.Cdecl)] + public static extern ColType ColumnType(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_int", CallingConvention = CallingConvention.Cdecl)] + public static extern int ColumnInt(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_int64", CallingConvention = CallingConvention.Cdecl)] + public static extern long ColumnInt64(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_double", CallingConvention = CallingConvention.Cdecl)] + public static extern double ColumnDouble(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_text", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr ColumnText(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_text16", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr ColumnText16(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_blob", CallingConvention = CallingConvention.Cdecl)] + public static extern IntPtr ColumnBlob(IntPtr stmt, int index); + + [DllImport("sqlite3", EntryPoint = "sqlite3_column_bytes", CallingConvention = CallingConvention.Cdecl)] + public static extern int ColumnBytes(IntPtr stmt, int index); + + public static string ColumnString(IntPtr stmt, int index) + { + return Marshal.PtrToStringUni(SQLite3.ColumnText16(stmt, index)); + } + + public static byte[] ColumnByteArray(IntPtr stmt, int index) + { + int length = ColumnBytes(stmt, index); + var result = new byte[length]; + if (length > 0) + Marshal.Copy(ColumnBlob(stmt, index), result, 0, length); + return result; + } + + [DllImport("sqlite3", EntryPoint = "sqlite3_extended_errcode", CallingConvention = CallingConvention.Cdecl)] + public static extern ExtendedResult ExtendedErrCode(IntPtr db); + + [DllImport("sqlite3", EntryPoint = "sqlite3_libversion_number", CallingConvention = CallingConvention.Cdecl)] + public static extern int LibVersionNumber(); +#else + public static Result Open(string filename, out Sqlite3DatabaseHandle db) + { + return (Result) Sqlite3.sqlite3_open(filename, out db); + } + + public static Result Open(string filename, out Sqlite3DatabaseHandle db, int flags, IntPtr zVfs) + { +#if USE_WP8_NATIVE_SQLITE + return (Result)Sqlite3.sqlite3_open_v2(filename, out db, flags, ""); +#else + return (Result)Sqlite3.sqlite3_open_v2(filename, out db, flags, null); +#endif + } + + public static Result Close(Sqlite3DatabaseHandle db) + { + return (Result)Sqlite3.sqlite3_close(db); + } + + public static Result BusyTimeout(Sqlite3DatabaseHandle db, int milliseconds) + { + return (Result)Sqlite3.sqlite3_busy_timeout(db, milliseconds); + } + + public static int Changes(Sqlite3DatabaseHandle db) + { + return Sqlite3.sqlite3_changes(db); + } + + public static Sqlite3Statement Prepare2(Sqlite3DatabaseHandle db, string query) + { + Sqlite3Statement stmt = default(Sqlite3Statement); +#if USE_WP8_NATIVE_SQLITE + var r = Sqlite3.sqlite3_prepare_v2(db, query, out stmt); +#else + stmt = new Sqlite3Statement(); + var r = Sqlite3.sqlite3_prepare_v2(db, query, -1, ref stmt, 0); +#endif + if (r != 0) + { + throw SQLiteException.New((Result)r, GetErrmsg(db)); + } + return stmt; + } + + public static Result Step(Sqlite3Statement stmt) + { + return (Result)Sqlite3.sqlite3_step(stmt); + } + + public static Result Reset(Sqlite3Statement stmt) + { + return (Result)Sqlite3.sqlite3_reset(stmt); + } + + public static Result Finalize(Sqlite3Statement stmt) + { + return (Result)Sqlite3.sqlite3_finalize(stmt); + } + + public static long LastInsertRowid(Sqlite3DatabaseHandle db) + { + return Sqlite3.sqlite3_last_insert_rowid(db); + } + + public static string GetErrmsg(Sqlite3DatabaseHandle db) + { + return Sqlite3.sqlite3_errmsg(db); + } + + public static int BindParameterIndex(Sqlite3Statement stmt, string name) + { + return Sqlite3.sqlite3_bind_parameter_index(stmt, name); + } + + public static int BindNull(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_bind_null(stmt, index); + } + + public static int BindInt(Sqlite3Statement stmt, int index, int val) + { + return Sqlite3.sqlite3_bind_int(stmt, index, val); + } + + public static int BindInt64(Sqlite3Statement stmt, int index, long val) + { + return Sqlite3.sqlite3_bind_int64(stmt, index, val); + } + + public static int BindDouble(Sqlite3Statement stmt, int index, double val) + { + return Sqlite3.sqlite3_bind_double(stmt, index, val); + } + + public static int BindText(Sqlite3Statement stmt, int index, string val, int n, IntPtr free) + { +#if USE_WP8_NATIVE_SQLITE + return Sqlite3.sqlite3_bind_text(stmt, index, val, n); +#else + return Sqlite3.sqlite3_bind_text(stmt, index, val, n, null); +#endif + } + + public static int BindBlob(Sqlite3Statement stmt, int index, byte[] val, int n, IntPtr free) + { +#if USE_WP8_NATIVE_SQLITE + return Sqlite3.sqlite3_bind_blob(stmt, index, val, n); +#else + return Sqlite3.sqlite3_bind_blob(stmt, index, val, n, null); +#endif + } + + public static int ColumnCount(Sqlite3Statement stmt) + { + return Sqlite3.sqlite3_column_count(stmt); + } + + public static string ColumnName(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_name(stmt, index); + } + + public static string ColumnName16(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_name(stmt, index); + } + + public static ColType ColumnType(Sqlite3Statement stmt, int index) + { + return (ColType)Sqlite3.sqlite3_column_type(stmt, index); + } + + public static int ColumnInt(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_int(stmt, index); + } + + public static long ColumnInt64(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_int64(stmt, index); + } + + public static double ColumnDouble(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_double(stmt, index); + } + + public static string ColumnText(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_text(stmt, index); + } + + public static string ColumnText16(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_text(stmt, index); + } + + public static byte[] ColumnBlob(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_blob(stmt, index); + } + + public static int ColumnBytes(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_bytes(stmt, index); + } + + public static string ColumnString(Sqlite3Statement stmt, int index) + { + return Sqlite3.sqlite3_column_text(stmt, index); + } + + public static byte[] ColumnByteArray(Sqlite3Statement stmt, int index) + { + return ColumnBlob(stmt, index); + } + + public static Result EnableLoadExtension(Sqlite3DatabaseHandle db, int onoff) + { + return (Result)Sqlite3.sqlite3_enable_load_extension(db, onoff); + } + + public static ExtendedResult ExtendedErrCode(Sqlite3DatabaseHandle db) + { + return (ExtendedResult)Sqlite3.sqlite3_extended_errcode(db); + } +#endif + + public enum ColType : int + { + Integer = 1, + Float = 2, + Text = 3, + Blob = 4, + Null = 5 + } + } +} diff --git a/Assets/Scripts/UVC/DB/SQLite.cs.meta b/Assets/Scripts/UVC/DB/SQLite.cs.meta new file mode 100644 index 00000000..0a2a970c --- /dev/null +++ b/Assets/Scripts/UVC/DB/SQLite.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 3d56adbd33ed8624f8f41e9c216a6453 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Data.meta b/Assets/Scripts/UVC/Data.meta new file mode 100644 index 00000000..0b3a9326 --- /dev/null +++ b/Assets/Scripts/UVC/Data.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: dc5db6b817a7c084db3007822a1a0d55 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Data/DataMapper.cs b/Assets/Scripts/UVC/Data/DataMapper.cs new file mode 100644 index 00000000..23eaa336 --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataMapper.cs @@ -0,0 +1,92 @@ +using Newtonsoft.Json.Linq; +using System; + +namespace UVC.Data +{ + /// + /// 서로 다른 형식이나 구조 간에 데이터를 매핑하는 기능을 제공합니다. + /// + /// 이 클래스는 일반적으로 데이터베이스 레코드를 도메인 객체에 매핑하거나 서로 다른 데이터 모델 간에 변환하는 등 데이터를 한 표현에서 다른 표현으로 변환하거나 매핑하는 데 사용됩니다. + /// + public class DataMapper + { + private JObject source; + private JObject guide; + + public DataMapper(JObject source, JObject target) + { + this.source = source; + this.guide = target; + } + + public JObject Map() + { + JObject target = new JObject(); + foreach (var property in source.Properties()) + { + if (guide.ContainsKey(property.Name)) + { + JToken guideValue = guide[property.Name]; + string guideType = guideValue?.Type.ToString() ?? "null"; + if (guideType == "String" && property.Value.Type == JTokenType.String) + { + target[property.Name] = property.Value.ToObject(); + } + else if (guideType == "Integer" && property.Value.Type == JTokenType.Integer) + { + target[property.Name] = property.Value.ToObject(); + } + else if (guideType == "Float" && property.Value.Type == JTokenType.Float) + { + target[property.Name] = property.Value.ToObject(); + } + else if (guideType == "Boolean" && property.Value.Type == JTokenType.Boolean) + { + target[property.Name] = property.Value.ToObject(); + } + else if (guideType == "Object" && guideValue.ToObject() is DataValueMapper && property.Value.Type == JTokenType.String) + { + string strValue = property.Value.ToObject(); + var dataValueMapper = guideValue.ToObject(); + if (dataValueMapper != null && dataValueMapper.ContainsKey(strValue)) + { + target[property.Name] = dataValueMapper[strValue]; + } + else + { + target[property.Name] = strValue; + } + } + else if (guideType == "Date" && property.Value.Type == JTokenType.String) + { + string dateStr = property.Value.ToObject(); + if (DateTime.TryParse(dateStr, out DateTime dateValue)) + { + target[property.Name] = JToken.FromObject(dateValue); + } + else + { + target[property.Name] = null; + } + } + else if (guideValue.ToObject()?.GetType()?.IsEnum == true && property.Value.Type == JTokenType.String) + { + Type enumType = guideValue.ToObject().GetType(); + target[property.Name] = JToken.FromObject(Enum.Parse(enumType, property.Value.ToObject(), true)); + } + else + { + target[property.Name] = property.Value; + } + } + else + { + target[property.Name] = property.Value; + } + } + return target; + } + + + } +} diff --git a/Assets/Scripts/UVC/Data/DataMapper.cs.meta b/Assets/Scripts/UVC/Data/DataMapper.cs.meta new file mode 100644 index 00000000..4f9875ea --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataMapper.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: f9f3db6ee7bbb234982df4138828fe94 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Data/DataRequestInfo.cs b/Assets/Scripts/UVC/Data/DataRequestInfo.cs new file mode 100644 index 00000000..a5824783 --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataRequestInfo.cs @@ -0,0 +1,13 @@ +using System.Collections.Generic; + +namespace UVC.Data +{ + public class DataRequestInfo + { + private string url; + private string method; + private Dictionary headers; + private string body; + + } +} diff --git a/Assets/Scripts/UVC/Data/DataRequestInfo.cs.meta b/Assets/Scripts/UVC/Data/DataRequestInfo.cs.meta new file mode 100644 index 00000000..21b2b954 --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataRequestInfo.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 7ed1a40f92147e942b095cef6d1263ca \ No newline at end of file diff --git a/Assets/Scripts/UVC/Data/DataValueMapper.cs b/Assets/Scripts/UVC/Data/DataValueMapper.cs new file mode 100644 index 00000000..59164273 --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataValueMapper.cs @@ -0,0 +1,9 @@ +using System.Collections.Generic; + +namespace UVC.Data +{ + /// + /// DataMapper에서 사용되는 데이터 값 매핑을 위한 클래스입니다. + /// + public class DataValueMapper : Dictionary{} +} diff --git a/Assets/Scripts/UVC/Data/DataValueMapper.cs.meta b/Assets/Scripts/UVC/Data/DataValueMapper.cs.meta new file mode 100644 index 00000000..7ede2e67 --- /dev/null +++ b/Assets/Scripts/UVC/Data/DataValueMapper.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 0a87f36aa32645a40927e6e3ddfc1fc8 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Data/URLList.cs b/Assets/Scripts/UVC/Data/URLList.cs new file mode 100644 index 00000000..d5ab8ea0 --- /dev/null +++ b/Assets/Scripts/UVC/Data/URLList.cs @@ -0,0 +1,151 @@ +using System; +using System.Collections.Generic; + +namespace UVC.Data +{ + /// + /// URL ּҸ Ű- ϰ ϴ ŬԴϴ. + /// + public static class URLList + { + /// + /// URL ϴ Dictionary ÷ + /// + private static Dictionary urls = new Dictionary(); + + /// + /// Ű URL ÷ǿ ߰մϴ. Ű ̹ ϸ URL Ʈմϴ. + /// + /// URL ϱ Ű + /// URL ڿ + /// + /// + /// URLList.Add("google", "https://www.google.com"); + /// URLList.Add("naver", "https://www.naver.com"); + /// + /// // Ű URL Ʈ + /// URLList.Add("google", "https://www.google.co.kr"); + /// + /// + public static void Add(string key, string url) + { + if (!urls.ContainsKey(key)) + { + urls.Add(key, url); + } + else + { + urls[key] = url; // Update existing URL + } + } + + /// + /// Ű شϴ URL ÷ǿ մϴ. + /// + /// URL Ű + /// + /// + /// URLList.Add("temp", "https://www.temp.com"); + /// + /// // URL + /// URLList.Remove("temp"); + /// + /// // ʴ Ű õ(ƹ ϵ ߻ ) + /// URLList.Remove("nonexistent"); + /// + /// + public static void Remove(string key) + { + if (urls.ContainsKey(key)) + { + urls.Remove(key); + } + } + + /// + /// Ű ÷ǿ ϴ Ȯմϴ. + /// + /// Ȯ Ű + /// Ű ϸ true, ׷ false + /// + /// + /// URLList.Add("github", "https://github.com"); + /// + /// // Ű Ȯ + /// if(URLList.ContainsKey("github")) + /// { + /// Console.WriteLine("GitHub URL մϴ."); + /// } + /// + /// if(!URLList.ContainsKey("gitlab")) + /// { + /// Console.WriteLine("GitLab URL ʽϴ."); + /// } + /// + /// + public static bool ContainsKey(string key) + { + return urls.ContainsKey(key); + } + + /// + /// Ű شϴ URL ȯմϴ. + /// + /// URL Ű + /// Ű شϴ URL Ǵ Ű null + /// + /// + /// URLList.Add("youtube", "https://www.youtube.com"); + /// + /// // URL + /// string youtubeUrl = URLList.Get("youtube"); + /// if (youtubeUrl != null) + /// { + /// Console.WriteLine($"YouTube URL: {youtubeUrl}"); + /// } + /// + /// // ʴ Ű URL + /// string nullUrl = URLList.Get("nonexistent"); + /// if (nullUrl == null) + /// { + /// Console.WriteLine("URL ʽϴ."); + /// } + /// + /// + public static string? Get(string key) + { + if (urls.TryGetValue(key, out string url)) + { + return url; + } + return null; // or throw an exception if preferred + } + + /// + /// URL κ մϴ. + /// + /// URL + /// Ǵ Ľ null + /// + /// + /// string domain = URLList.ExtractDomain("https://www.example.com/path/page.html"); + /// Console.WriteLine(domain); // : www.example.com + /// + /// + public static string? ExtractDomain(string url) + { + if (string.IsNullOrEmpty(url)) + return null; + + try + { + Uri uri = new Uri(url); + return uri.Host; + } + catch (UriFormatException) + { + return null; + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Data/URLList.cs.meta b/Assets/Scripts/UVC/Data/URLList.cs.meta new file mode 100644 index 00000000..cd3a7d1d --- /dev/null +++ b/Assets/Scripts/UVC/Data/URLList.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: a924ff5fe95047c49912fceced5f2c0a \ No newline at end of file diff --git a/Assets/Scripts/UVC/Event.meta b/Assets/Scripts/UVC/Event.meta new file mode 100644 index 00000000..e6ffac1f --- /dev/null +++ b/Assets/Scripts/UVC/Event.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 03e9a333656798b46829b0537d667711 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs b/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs new file mode 100644 index 00000000..a59f8421 --- /dev/null +++ b/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs @@ -0,0 +1,58 @@ +using Cysharp.Threading.Tasks; + +namespace UVC.Event +{ + /// + /// 񵿱 ̺Ʈ ó ׸ Ʈ + /// UniTask ȯϴ ̺Ʈ ڵ鷯 Ͽ 񵿱 ۾ ̺Ʈ ó ְ + /// + /// ̺Ʈ ͸ ϴ ׸ Ÿ Ű + /// ̺Ʈ ߻Ų ü + /// ̺Ʈ õ + /// 񵿱 ۾ Ÿ UniTask + /// + /// + /// // ̺Ʈ + /// public class NetworkManager + /// { + /// // UniTaskEventHandler Ÿ ̺Ʈ + /// public event UniTaskEventHandler OnDataReceived; + /// + /// // ̺Ʈ ߻ ޼ҵ + /// public async UniTask RaiseDataReceivedEvent(DataReceivedEventArgs args) + /// { + /// if (OnDataReceived != null) + /// { + /// // ϵ ڵ鷯 + /// foreach (var handler in OnDataReceived.GetInvocationList()) + /// { + /// await ((UniTaskEventHandler)handler).Invoke(this, args); + /// } + /// } + /// } + /// } + /// + /// // ̺Ʈ + /// public class DataProcessor + /// { + /// public void Initialize(NetworkManager networkManager) + /// { + /// networkManager.OnDataReceived += HandleDataReceived; + /// } + /// + /// private async UniTask HandleDataReceived(object sender, DataReceivedEventArgs e) + /// { + /// // 񵿱 ̺Ʈ ó + /// await ProcessDataAsync(e.Data); + /// } + /// + /// private async UniTask ProcessDataAsync(byte[] data) + /// { + /// await UniTask.Delay(100); // 񵿱 ۾ + /// // ó + /// } + /// } + /// + /// + public delegate UniTask UniTaskEventHandler(object sender, TEventArgs e); +} diff --git a/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs.meta b/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs.meta new file mode 100644 index 00000000..adabd377 --- /dev/null +++ b/Assets/Scripts/UVC/Event/UniTaskEventHandler.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 3ca0fa58769f83f45ac98a8cca80b5dd \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention.meta b/Assets/Scripts/UVC/Extention.meta new file mode 100644 index 00000000..ed1e068a --- /dev/null +++ b/Assets/Scripts/UVC/Extention.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5124f1749e21a5b41877e7b4915c8ffb +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Extention/DictionaryEx.cs b/Assets/Scripts/UVC/Extention/DictionaryEx.cs new file mode 100644 index 00000000..ebaf917d --- /dev/null +++ b/Assets/Scripts/UVC/Extention/DictionaryEx.cs @@ -0,0 +1,157 @@ +using System; +using System.Collections.Generic; +using System.Text; + +namespace UVC.Extention +{ + /// + /// Dictionary 클래스에 대한 확장 메소드를 제공하는 클래스입니다. + /// + public static class DictionaryEx + { + /// + /// Dictionary를 JSON 문자열로 변환합니다. + /// 중첩된 Dictionary 객체도 재귀적으로 처리합니다. + /// + /// Dictionary의 키 타입 + /// Dictionary의 값 타입 + /// JSON 문자열로 변환할 Dictionary 객체 + /// JSON 형식의 문자열 + /// + /// + /// var dict = new Dictionary + /// { + /// { "name", "홍길동" }, + /// { "age", 30 }, + /// { "address", new Dictionary { { "city", "서울" }, { "zip", "12345" } } } + /// }; + /// + /// string json = dict.ToJson(); + /// // 결과: {"name":"홍길동","age":"30","address":{"city":"서울","zip":"12345"}} + /// + /// + public static string ToJson(this IDictionary dict) + { + if (dict == null || dict.Count == 0) + return "{}"; + var sb = new StringBuilder("{"); + foreach (var kvp in dict) + { + sb.Append($"\"{kvp.Key}\":"); + + // 값이 null인 경우 처리 + if (kvp.Value == null) + { + sb.Append("null,"); + continue; + } + + // 값이 중첩된 Dictionary인 경우 재귀적으로 처리 + if (kvp.Value is IDictionary dictObject) + { + string nestedJson = ToJson(dictObject); + sb.Append($"{nestedJson},"); + } + else if (kvp.Value is IDictionary dictStringObject) + { + string nestedJson = ToJson(dictStringObject); + sb.Append($"{nestedJson},"); + } + else if (kvp.Value is IDictionary dictStringString) + { + string nestedJson = ToJson(dictStringString); + sb.Append($"{nestedJson},"); + } + // 값이 숫자인 경우 따옴표 없이 추가 + else if (IsNumericType(kvp.Value.GetType())) + { + sb.Append($"{kvp.Value},"); + } + // 값이 불리언인 경우 따옴표 없이 추가 (소문자 true/false) + else if (kvp.Value is bool boolValue) + { + sb.Append($"{boolValue.ToString().ToLowerInvariant()},"); + } + // 그 외의 경우 문자열로 처리 + else + { + // 특수 문자를 이스케이프 처리 + string escapedValue = EscapeJsonString(kvp.Value.ToString()); + sb.Append($"\"{escapedValue}\","); + } + } + if (dict.Count > 0) + { + sb.Length--; // 마지막 쉼표(,) 제거 + } + sb.Append("}"); + return sb.ToString(); + } + + /// + /// 주어진 타입이 숫자형인지 확인합니다. + /// + /// 검사할 타입 + /// 숫자형이면 true, 아니면 false + private static bool IsNumericType(Type type) + { + if (type == null) + return false; + + switch (Type.GetTypeCode(type)) + { + case TypeCode.Byte: + case TypeCode.SByte: + case TypeCode.Int16: + case TypeCode.Int32: + case TypeCode.Int64: + case TypeCode.UInt16: + case TypeCode.UInt32: + case TypeCode.UInt64: + case TypeCode.Single: + case TypeCode.Double: + case TypeCode.Decimal: + return true; + default: + return false; + } + } + + /// + /// JSON 문자열에서 특수 문자를 이스케이프 처리합니다. + /// + /// 이스케이프 처리할 문자열 + /// 이스케이프 처리된 문자열 + private static string EscapeJsonString(string value) + { + if (string.IsNullOrEmpty(value)) + return value; + + StringBuilder sb = new StringBuilder(); + foreach (char c in value) + { + switch (c) + { + case '\\': sb.Append("\\\\"); break; + case '\"': sb.Append("\\\""); break; + case '\n': sb.Append("\\n"); break; + case '\r': sb.Append("\\r"); break; + case '\t': sb.Append("\\t"); break; + case '\b': sb.Append("\\b"); break; + case '\f': sb.Append("\\f"); break; + default: + if (c < 32) // 제어 문자 + { + sb.Append($"\\u{(int)c:X4}"); + } + else + { + sb.Append(c); + } + break; + } + } + return sb.ToString(); + } + } +} diff --git a/Assets/Scripts/UVC/Extention/DictionaryEx.cs.meta b/Assets/Scripts/UVC/Extention/DictionaryEx.cs.meta new file mode 100644 index 00000000..5b09e0a7 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/DictionaryEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: ecdaa0037672f2f409f7a07151a41b42 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/ImageEx.cs b/Assets/Scripts/UVC/Extention/ImageEx.cs new file mode 100644 index 00000000..91caa0d9 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/ImageEx.cs @@ -0,0 +1,98 @@ +using UnityEngine; +using UnityEngine.UI; + +namespace UVC.Extension +{ + /// + /// Unity UI Image 컴포넌트를 위한 확장 메소드 모음입니다. + /// + public static class ImageEx + { + /// + /// Image 컴포넌트의 알파값을 설정합니다. + /// + /// 알파값을 변경할 Image 컴포넌트 + /// 적용할 알파값 (0.0f ~ 1.0f) + /// + /// + /// // Image 컴포넌트의 알파값을 0.5로 설정 + /// Image myImage = GetComponent(); + /// myImage.SetAlpha(0.5f); + /// + /// // 또는 한 줄로 체이닝 가능 + /// GetComponent().SetAlpha(0.5f); + /// + /// + public static void SetAlpha(this Image image, float alpha) + { + Color tempColor = image.color; + tempColor.a = alpha; + image.color = tempColor; + } + + /// + /// Image 컴포넌트에 페이드 인(투명 → 불투명) 효과를 적용합니다. + /// + /// 페이드 효과를 적용할 Image 컴포넌트 + /// 페이드 효과 지속 시간(초) + /// 페이드 인 목표 알파값 (기본값: 1.0f) + /// 코루틴으로 사용할 수 있는 IEnumerator + /// + /// + /// // 기본 사용법 (알파값 1.0까지 페이드 인) + /// StartCoroutine(myImage.FadeIn(1.0f)); + /// + /// // 알파값 0.8까지만 페이드 인 + /// StartCoroutine(myImage.FadeIn(1.0f, 0.8f)); + /// + /// + public static System.Collections.IEnumerator FadeIn(this Image image, float duration, float targetAlpha = 1.0f) + { + float startAlpha = image.color.a; + float time = 0; + + while (time < duration) + { + time += Time.deltaTime; + float alpha = Mathf.Lerp(startAlpha, targetAlpha, time / duration); + image.SetAlpha(alpha); + yield return null; + } + + image.SetAlpha(targetAlpha); + } + + /// + /// Image 컴포넌트에 페이드 아웃(불투명 → 투명) 효과를 적용합니다. + /// + /// 페이드 효과를 적용할 Image 컴포넌트 + /// 페이드 효과 지속 시간(초) + /// 페이드 아웃 목표 알파값 (기본값: 0.0f) + /// 코루틴으로 사용할 수 있는 IEnumerator + /// + /// + /// // 기본 사용법 (알파값 0.0까지 페이드 아웃) + /// StartCoroutine(myImage.FadeOut(1.0f)); + /// + /// // 알파값 0.2까지만 페이드 아웃 + /// StartCoroutine(myImage.FadeOut(1.0f, 0.2f)); + /// + /// + public static System.Collections.IEnumerator FadeOut(this Image image, float duration, float targetAlpha = 0.0f) + { + float startAlpha = image.color.a; + float time = 0; + + while (time < duration) + { + time += Time.deltaTime; + float alpha = Mathf.Lerp(startAlpha, targetAlpha, time / duration); + image.SetAlpha(alpha); + yield return null; + } + + image.SetAlpha(targetAlpha); + } + + } +} diff --git a/Assets/Scripts/UVC/Extention/ImageEx.cs.meta b/Assets/Scripts/UVC/Extention/ImageEx.cs.meta new file mode 100644 index 00000000..801b36bd --- /dev/null +++ b/Assets/Scripts/UVC/Extention/ImageEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: f315419079dadca46b728fd61401f6ed \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/NumberEx.cs b/Assets/Scripts/UVC/Extention/NumberEx.cs new file mode 100644 index 00000000..3a4ec465 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/NumberEx.cs @@ -0,0 +1,256 @@ +using System; + +namespace UVC.Extension +{ + /// + /// 숫자 관련 확장 메서드를 제공하는 클래스입니다. + /// + public static class NumberEx + { + /// + /// 바이트 단위의 숫자를 사람이 읽기 쉬운 KB, MB, GB 등의 형태로 변환합니다. + /// 1024.ToSizeSuffix() => 1KB + /// https://stackoverflow.com/questions/14488796/does-net-provide-an-easy-way-convert-bytes-to-kb-mb-gb-etc + /// + /// 변환할 바이트 크기 + /// 소수점 자릿수 (기본값: 1) + /// 단위가 포함된 크기 문자열 (예: "1.5 KB") + /// decimalPlaces가 0보다 작은 경우 발생 + /// + /// + /// // 바이트 값을 크기 단위와 함께 표시 + /// long fileSize = 1536; + /// string readableSize = fileSize.ToSizeSuffix(); // "1.5 KB" 반환 + /// + /// // 소수점 2자리까지 표시 + /// string preciseSize = fileSize.ToSizeSuffix(2); // "1.50 KB" 반환 + /// + /// // 더 큰 값 변환 + /// long bigFileSize = 1073741824; // 1GB + /// string bigSize = bigFileSize.ToSizeSuffix(); // "1.0 GB" 반환 + /// + /// + public static string ToSizeSuffix(this long value, int decimalPlaces = 1) + { + if (decimalPlaces < 0) { throw new ArgumentOutOfRangeException("decimalPlaces"); } + if (value < 0) { return "-" + ToSizeSuffix(-value, decimalPlaces); } + if (value == 0) { return string.Format("{0:n" + decimalPlaces + "} bytes", 0); } + + // mag는 단위를 나타냄: 0=바이트, 1=KB, 2=MB 등 + int mag = (int)Math.Log(value, 1024); + + // 1L << (mag * 10) == 2 ^ (10 * mag) + // [즉, mag에 해당하는 단위의 바이트 수] + decimal adjustedSize = (decimal)value / (1L << (mag * 10)); + + // 반올림했을 때 1000 이상이 되는 경우 단위를 한 단계 올림 + if (Math.Round(adjustedSize, decimalPlaces) >= 1000) + { + mag += 1; + adjustedSize /= 1024; + } + + string[] SizeSuffixes = { "bytes", "KB", "MB", "GB", "TB", "PB", "EB", "ZB", "YB" }; + + return string.Format("{0:n" + decimalPlaces + "} {1}", + adjustedSize, + SizeSuffixes[mag]); + } + + /// + /// 숫자가 지정된 범위 내에 있는지 확인합니다. + /// + /// 비교 가능한 숫자 타입 + /// 검사할 값 + /// 최소값 (포함) + /// 최대값 (포함) + /// 값이 지정된 범위 내에 있으면 true, 그렇지 않으면 false + /// + /// + /// int score = 85; + /// bool isInRange = score.IsBetween(0, 100); // true 반환 + /// + /// float temperature = -5.5f; + /// bool isValidTemp = temperature.IsBetween(-10f, 40f); // true 반환 + /// + /// + public static bool IsBetween(this T value, T min, T max) where T : IComparable + { + return value.CompareTo(min) >= 0 && value.CompareTo(max) <= 0; + } + + /// + /// 값을 지정된 최소값과 최대값 사이로 제한합니다. + /// + /// 비교 가능한 숫자 타입 + /// 제한할 값 + /// 최소값 + /// 최대값 + /// 최소값과 최대값 사이로 제한된 값 + /// + /// + /// int health = -10; + /// int clampedHealth = health.Clamp(0, 100); // 0 반환 + /// + /// float speed = 120.5f; + /// float clampedSpeed = speed.Clamp(0f, 100f); // 100f 반환 + /// + /// + public static T Clamp(this T value, T min, T max) where T : IComparable + { + if (value.CompareTo(min) < 0) return min; + if (value.CompareTo(max) > 0) return max; + return value; + } + + /// + /// 숫자를 백분율로 변환합니다. + /// + /// 변환할 값 (0.0~1.0) + /// 소수점 자릿수 + /// 백분율 문자열 (예: "85%") + /// + /// + /// float progress = 0.85f; + /// string percent = progress.ToPercentString(); // "85.0%" 반환 + /// + /// double ratio = 0.7525; + /// string precisePercent = ratio.ToPercentString(2); // "75.25%" 반환 + /// + /// + public static string ToPercentString(this float value, int decimalPlaces = 1) + { + return string.Format("{0:n" + decimalPlaces + "}%", value * 100); + } + + public static string ToPercentString(this double value, int decimalPlaces = 1) + { + return string.Format("{0:n" + decimalPlaces + "}%", value * 100); + } + + /// + /// 초 단위 시간을 시:분:초 형식의 문자열로 변환합니다. + /// + /// 초 단위 시간 + /// 시:분:초 형식의 문자열 + /// + /// + /// int gameTime = 3725; // 1시간 2분 5초 + /// string formattedTime = gameTime.ToTimeString(); // "01:02:05" 반환 + /// + /// float recordTime = 135.5f; // 2분 15.5초 + /// string shortTime = recordTime.ToTimeString(); // "00:02:16" 반환 (반올림됨) + /// + /// + public static string ToTimeString(this int seconds) + { + TimeSpan time = TimeSpan.FromSeconds(seconds); + return time.ToString(@"hh\:mm\:ss"); + } + + public static string ToTimeString(this float seconds) + { + TimeSpan time = TimeSpan.FromSeconds((double)seconds); + return time.ToString(@"hh\:mm\:ss"); + } + + /// + /// 숫자를 서수형 문자열로 변환합니다 (1st, 2nd, 3rd 등). + /// + /// 변환할 숫자 + /// 서수형 문자열 + /// + /// + /// int rank = 1; + /// string rankString = rank.ToOrdinal(); // "1st" 반환 + /// + /// for (int i = 1; i <= 5; i++) + /// { + /// Console.WriteLine(i.ToOrdinal()); // "1st", "2nd", "3rd", "4th", "5th" 출력 + /// } + /// + /// + public static string ToOrdinal(this int number) + { + string suffix = "번째"; + return number + suffix; + } + + /// + /// 숫자의 각 자리 합을 계산합니다. + /// + /// 계산할 숫자 + /// 각 자리 숫자의 합 + /// + /// + /// int number = 12345; + /// int digitSum = number.SumOfDigits(); // 1+2+3+4+5 = 15 반환 + /// + /// + public static int SumOfDigits(this int number) + { + int sum = 0; + number = Math.Abs(number); + + while (number > 0) + { + sum += number % 10; + number /= 10; + } + + return sum; + } + + /// + /// 두 숫자 사이의 선형 보간된 값을 계산합니다. + /// + /// 시작값 + /// 종료값 + /// 보간 비율 (0.0 ~ 1.0) + /// 보간된 값 + /// + /// + /// float min = 0f; + /// float max = 100f; + /// float half = min.Lerp(max, 0.5f); // 50f 반환 + /// + /// // 부드러운 이동 애니메이션 예제 + /// float startPosition = 0f; + /// float endPosition = 10f; + /// float t = 0.3f; // 30% 이동 + /// float currentPosition = startPosition.Lerp(endPosition, t); // 3f 반환 + /// + /// + public static float Lerp(this float start, float end, float t) + { + t = Math.Clamp(t, 0f, 1f); + return start + (end - start) * t; + } + + /// + /// 숫자를 가장 가까운 배수로 반올림합니다. + /// + /// 반올림할 값 + /// 배수 단위 + /// 가장 가까운 배수로 반올림된 값 + /// + /// + /// int price = 1242; + /// int roundedPrice = price.RoundToNearest(100); // 1200 반환 + /// + /// float value = 3.7f; + /// float rounded = value.RoundToNearest(0.5f); // 3.5f 반환 + /// + /// + public static int RoundToNearest(this int value, int factor) + { + return (int)Math.Round((double)value / factor) * factor; + } + + public static float RoundToNearest(this float value, float factor) + { + return (float)Math.Round(value / factor) * factor; + } + + } +} diff --git a/Assets/Scripts/UVC/Extention/NumberEx.cs.meta b/Assets/Scripts/UVC/Extention/NumberEx.cs.meta new file mode 100644 index 00000000..9de06c9f --- /dev/null +++ b/Assets/Scripts/UVC/Extention/NumberEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 4e1c69702a06aee48b285ad5461b8591 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/RectTransformEx.cs b/Assets/Scripts/UVC/Extention/RectTransformEx.cs new file mode 100644 index 00000000..36d551e9 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/RectTransformEx.cs @@ -0,0 +1,195 @@ +using UnityEngine; + + +namespace UVC.Extension +{ + /// + /// RectTransform Ȯ ޼带 ϴ ŬԴϴ. + /// + public static class RectTransformEx + { + /// + /// RectTransform մϴ. θ ü ¿ մϴ. + /// Ŀ ڵ 𼭸 ˴ϴ(anchorMin=[0,0], anchorMax=[1,1]). + /// + /// RectTransform + /// + /// + /// + /// Ʒ + /// + /// + /// // Ʈ RectTransform + /// RectTransform panelRect = panel.GetComponent<RectTransform>(); + /// panelRect.SetRectMargin(10f, 10f, 10f, 10f); // 10ȼ + /// + /// // UI Ҹ θ ̳ʿ ߵ ֱ + /// RectTransform childRect = childObject.GetComponent<RectTransform>(); + /// childRect.SetRectMargin(5f, 5f, 20f, 5f); // ܿ ū + /// + /// + public static void SetRectMargin(this RectTransform trans, float left, float right, float top, float bottom) + { + trans.anchorMin = new Vector2(0, 0); + trans.anchorMax = new Vector2(1f, 1f); + trans.offsetMin = new Vector2(left, bottom); + trans.offsetMax = new Vector2(-right, -top); + } + + /// + /// RectTransform ʺ մϴ. + /// + /// RectTransform + /// ʺ + /// + /// + /// // ư ʺ 200 + /// RectTransform buttonRect = button.GetComponent<RectTransform>(); + /// buttonRect.SetWidth(200f); + /// + /// + public static void SetWidth(this RectTransform trans, float width) + { + trans.SetSizeWithCurrentAnchors(RectTransform.Axis.Horizontal, width); + } + + /// + /// RectTransform ̸ մϴ. + /// + /// RectTransform + /// + /// + /// + /// // г ̸ 150 + /// RectTransform panelRect = panel.GetComponent<RectTransform>(); + /// panelRect.SetHeight(150f); + /// + /// + public static void SetHeight(this RectTransform trans, float height) + { + trans.SetSizeWithCurrentAnchors(RectTransform.Axis.Vertical, height); + } + + /// + /// RectTransform ũ⸦ մϴ. + /// + /// RectTransform + /// ũ (ʺ, ) + /// + /// + /// // ̹ ũ⸦ 100x100 + /// RectTransform imageRect = image.GetComponent<RectTransform>(); + /// imageRect.SetSize(new Vector2(100f, 100f)); + /// + /// + public static void SetSize(this RectTransform trans, Vector2 size) + { + trans.SetWidth(size.x); + trans.SetHeight(size.y); + } + + /// + /// RectTransform Ŀ ߾ӿ ġŰ ǹ ߾ մϴ. + /// + /// RectTransform + /// + /// + /// // ư ȭ ߾ӿ ġŰ + /// RectTransform buttonRect = button.GetComponent<RectTransform>(); + /// buttonRect.SetAnchorsToCenter(); + /// buttonRect.anchoredPosition = Vector2.zero; // ߾ ġ ġ + /// + /// + public static void SetAnchorsToCenter(this RectTransform trans) + { + trans.anchorMin = new Vector2(0.5f, 0.5f); + trans.anchorMax = new Vector2(0.5f, 0.5f); + trans.pivot = new Vector2(0.5f, 0.5f); + } + + /// + /// RectTransform Ŀ ǹ մϴ. + /// + /// RectTransform + /// + /// + /// // UI Ҹ ܿ ġŰ + /// RectTransform elementRect = element.GetComponent<RectTransform>(); + /// elementRect.SetAnchorsToTopLeft(); + /// elementRect.anchoredPosition = new Vector2(10f, -10f); // ణ ߰ + /// + /// + public static void SetAnchorsToTopLeft(this RectTransform trans) + { + trans.anchorMin = new Vector2(0f, 1f); + trans.anchorMax = new Vector2(0f, 1f); + trans.pivot = new Vector2(0f, 1f); + } + + /// + /// RectTransform θ մϴ( ). + /// + /// RectTransform + /// + /// + /// // ̹ г ü ä + /// RectTransform backgroundRect = backgroundImage.GetComponent<RectTransform>(); + /// backgroundRect.StretchToParentEdges(); + /// + /// + public static void StretchToParentEdges(this RectTransform trans) + { + trans.SetRectMargin(0f, 0f, 0f, 0f); + } + + /// + /// RectTransform ġ θ RectTransform ġ(0~1) մϴ. + /// + /// RectTransform + /// ȭ ġ (0,0= ϴ, 1,1= ) + /// + /// + /// // Ҹ θ ܿ ġ + /// RectTransform elementRect = element.GetComponent<RectTransform>(); + /// elementRect.SetNormalizedPosition(new Vector2(0.95f, 0.95f)); + /// + /// + public static void SetNormalizedPosition(this RectTransform trans, Vector2 normalizedPosition) + { + if (trans.parent is RectTransform parent) + { + trans.anchorMin = trans.anchorMax = new Vector2(0, 0); + trans.pivot = new Vector2(0.5f, 0.5f); + + Rect parentRect = parent.rect; + float x = parentRect.x + parentRect.width * normalizedPosition.x; + float y = parentRect.y + parentRect.height * normalizedPosition.y; + + trans.anchoredPosition = new Vector2(x, y); + } + } + + /// + /// RectTransform 簢 ǥ ȯմϴ. + /// + /// RectTransform + /// ǥ 簢 + /// + /// + /// // UI Ұ Ư ǥ ϴ Ȯ + /// RectTransform elementRect = element.GetComponent<RectTransform>(); + /// Rect worldRect = elementRect.GetWorldRect(); + /// Vector3 worldPos = Camera.main.ScreenToWorldPoint(Input.mousePosition); + /// bool isOverUI = worldRect.Contains(new Vector2(worldPos.x, worldPos.y)); + /// + /// + public static Rect GetWorldRect(this RectTransform trans) + { + Vector3[] corners = new Vector3[4]; + trans.GetWorldCorners(corners); + Vector2 min = corners[0]; + Vector2 max = corners[2]; + return new Rect(min, max - min); + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/RectTransformEx.cs.meta b/Assets/Scripts/UVC/Extention/RectTransformEx.cs.meta new file mode 100644 index 00000000..eb24f822 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/RectTransformEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 07a921beaf9b5dd4ab801f6f3b21d5a4 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/RenderTextureEx.cs b/Assets/Scripts/UVC/Extention/RenderTextureEx.cs new file mode 100644 index 00000000..41c7d1b1 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/RenderTextureEx.cs @@ -0,0 +1,119 @@ +using UnityEngine; + +namespace UVC.Extension +{ + /// + /// RenderTexture Ȯ ޼带 ϴ ŬԴϴ. + /// + public static class RenderTextureEx + { + /// + /// RenderTexture Texture2D ȯմϴ. + /// + /// ȯ RenderTexture ü + /// ȯ Texture2D ü + /// + /// : + /// + /// // RenderTexture + /// RenderTexture renderTexture = new RenderTexture(256, 256, 24); + /// + /// // ī޶󿡼 renderTexture + /// Camera.main.targetTexture = renderTexture; + /// Camera.main.Render(); + /// + /// // RenderTexture Texture2D ȯ + /// Texture2D texture2D = renderTexture.ToTexture2D(); + /// + /// // + /// Camera.main.targetTexture = null; + /// Camera.main.ResetAspect(); + /// + /// + public static Texture2D ToTexture2D(this RenderTexture renderTexture) + { + Texture2D texture2D = new Texture2D(renderTexture.width, renderTexture.height); + RenderTexture.active = renderTexture; + texture2D.ReadPixels(new UnityEngine.Rect(0, 0, renderTexture.width, renderTexture.height), 0, 0); + texture2D.Apply(); + return texture2D; + } + + /// + /// RenderTexture Ʈ 迭 ȯմϴ. + /// + /// ȯ RenderTexture ü + /// ̹ (⺻: PNG) + /// Ʈ 迭 + /// + /// : + /// + /// RenderTexture rt = new RenderTexture(256, 256, 24); + /// byte[] bytes = rt.ToBytes(); + /// File.WriteAllBytes("screenshot.png", bytes); + /// + /// + public static byte[] ToBytes(this RenderTexture renderTexture, TextureFormat format = TextureFormat.RGBA32) + { + Texture2D texture2D = renderTexture.ToTexture2D(); + byte[] bytes = texture2D.EncodeToPNG(); + Object.Destroy(texture2D); + return bytes; + } + + /// + /// RenderTexture ο PNG Ϸ մϴ. + /// + /// RenderTexture ü + /// + /// + /// + /// : + /// + /// RenderTexture rt = new RenderTexture(256, 256, 24); + /// Camera.main.targetTexture = rt; + /// Camera.main.Render(); + /// bool success = rt.SaveToPNG("Assets/Screenshots/screenshot.png"); + /// Camera.main.targetTexture = null; + /// + /// + public static bool SaveToPNG(this RenderTexture renderTexture, string filePath) + { + try + { + byte[] bytes = renderTexture.ToBytes(); + System.IO.File.WriteAllBytes(filePath, bytes); + return true; + } + catch (System.Exception e) + { + Debug.LogError($"RenderTexture PNG ϴ ߽ϴ: {e.Message}"); + return false; + } + } + + /// + /// RenderTexture ũ⸦ մϴ. + /// + /// RenderTexture + /// ʺ + /// + /// ũⰡ ο RenderTexture + /// + /// : + /// + /// RenderTexture originalRT = new RenderTexture(1024, 1024, 24); + /// RenderTexture resizedRT = originalRT.Resize(512, 512); + /// // + /// resizedRT.Release(); + /// originalRT.Release(); + /// + /// + public static RenderTexture Resize(this RenderTexture renderTexture, int width, int height) + { + RenderTexture resized = new RenderTexture(width, height, renderTexture.depth); + Graphics.Blit(renderTexture, resized); + return resized; + } + } +} diff --git a/Assets/Scripts/UVC/Extention/RenderTextureEx.cs.meta b/Assets/Scripts/UVC/Extention/RenderTextureEx.cs.meta new file mode 100644 index 00000000..5fdf6d84 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/RenderTextureEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 7fc68fe9ffff1da42bf689cd8f414d62 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/SerializableEx.cs b/Assets/Scripts/UVC/Extention/SerializableEx.cs new file mode 100644 index 00000000..f049f76c --- /dev/null +++ b/Assets/Scripts/UVC/Extention/SerializableEx.cs @@ -0,0 +1,211 @@ +using System; +using System.IO; +using System.Runtime.Serialization.Formatters.Binary; + +namespace UVC.Extension +{ + /// + /// 직렬화 관련 확장 메서드를 제공하는 클래스입니다. + /// + public static class SerializableEx + { + /// + /// 객체의 깊은 복사본을 생성합니다. + /// + /// 복사할 객체의 타입 (Serializable 속성이 필요) + /// 복사할 원본 객체 + /// 원본 객체의 깊은 복사본 또는 직렬화 불가능한 경우 기본값 + /// + /// 이 메서드는 BinaryFormatter를 사용하여 객체를 깊은 복사합니다. + /// 대상 타입은 반드시 [Serializable] 속성을 가져야 합니다. + /// + /// + /// + /// [Serializable] + /// public class Person + /// { + /// public string Name { get; set; } + /// public int Age { get; set; } + /// } + /// + /// // 사용 예시 + /// var original = new Person { Name = "홍길동", Age = 30 }; + /// var copy = original.DeepCopy(); + /// + /// // copy는 original과 동일한 값을 가지지만 서로 다른 메모리 참조 + /// copy.Name = "김철수"; // original.Name은 여전히 "홍길동" + /// + /// + public static T? DeepCopy(this T source)// where T : new() + { + if (!typeof(T).IsSerializable) + { + return default(T);// 직렬화 불가능한 경우 기본값 반환 + } + + try + { + object result = null; + using (var ms = new MemoryStream()) + { + var formatter = new BinaryFormatter(); + formatter.Serialize(ms, source);// 객체를 메모리 스트림에 직렬화 + ms.Position = 0;// 스트림 위치 초기화 + result = (T)formatter.Deserialize(ms);// 역직렬화하여 새 객체 생성 + ms.Close();// 스트림 닫기 + } + + return (T)result; + } + catch (Exception ex) + { + return default(T);// 예외 발생 시 기본값 반환 + } + } + + /// + /// 객체를 바이트 배열로 직렬화합니다. + /// + /// 직렬화할 객체의 타입 (Serializable 속성이 필요) + /// 직렬화할 객체 + /// 직렬화된 바이트 배열 또는 실패 시 null + /// + /// + /// [Serializable] + /// public class Person + /// { + /// public string Name { get; set; } + /// public int Age { get; set; } + /// } + /// + /// // 사용 예시 + /// var person = new Person { Name = "홍길동", Age = 30 }; + /// byte[] data = person.SerializeToBytes(); + /// // 직렬화된 바이트 배열을 저장하거나 네트워크 전송 가능 + /// + /// + public static byte[] SerializeToBytes(this T obj) where T : class + { + if (obj == null || !typeof(T).IsSerializable) + return null; + + try + { + using (var ms = new MemoryStream()) + { + var formatter = new BinaryFormatter(); + formatter.Serialize(ms, obj); + return ms.ToArray(); + } + } + catch (Exception) + { + return null; + } + } + + /// + /// 바이트 배열에서 객체로 역직렬화합니다. + /// + /// 역직렬화할 객체 타입 (Serializable 속성이 필요) + /// 역직렬화할 바이트 배열 + /// 역직렬화된 객체 또는 실패 시 null + /// + /// + /// // 바이트 배열에서 객체 복원 + /// byte[] savedData = GetSavedDataFromSomewhere(); + /// Person restoredPerson = savedData.DeserializeFromBytes<Person>(); + /// + /// if (restoredPerson != null) + /// { + /// Console.WriteLine($"이름: {restoredPerson.Name}, 나이: {restoredPerson.Age}"); + /// } + /// + /// + public static T DeserializeFromBytes(this byte[] bytes) where T : class + { + if (bytes == null || bytes.Length == 0 || !typeof(T).IsSerializable) + return null; + + try + { + using (var ms = new MemoryStream(bytes)) + { + var formatter = new BinaryFormatter(); + return (T)formatter.Deserialize(ms); + } + } + catch (Exception) + { + return null; + } + } + + /// + /// 객체를 파일에 직렬화하여 저장합니다. + /// + /// 직렬화할 객체의 타입 (Serializable 속성이 필요) + /// 저장할 객체 + /// 저장할 파일 경로 + /// 성공 여부 + /// + /// + /// var settings = new GameSettings { Volume = 0.8f, Difficulty = "Hard" }; + /// bool success = settings.SerializeToFile("Assets/settings.dat"); + /// + /// + public static bool SerializeToFile(this T obj, string filePath) where T : class + { + if (obj == null || !typeof(T).IsSerializable || string.IsNullOrEmpty(filePath)) + return false; + + try + { + using (var fs = new FileStream(filePath, FileMode.Create)) + { + var formatter = new BinaryFormatter(); + formatter.Serialize(fs, obj); + return true; + } + } + catch (Exception) + { + return false; + } + } + + /// + /// 파일에서 객체를 역직렬화하여 로드합니다. + /// + /// 역직렬화할 객체 타입 (Serializable 속성이 필요) + /// 로드할 파일 경로 + /// 역직렬화된 객체 또는 실패 시 null + /// + /// + /// GameSettings settings = DeserializeFromFile<GameSettings>("Assets/settings.dat"); + /// if (settings != null) + /// { + /// ApplySettings(settings.Volume, settings.Difficulty); + /// } + /// + /// + public static T DeserializeFromFile(string filePath) where T : class + { + if (string.IsNullOrEmpty(filePath) || !File.Exists(filePath) || !typeof(T).IsSerializable) + return null; + + try + { + using (var fs = new FileStream(filePath, FileMode.Open)) + { + var formatter = new BinaryFormatter(); + return (T)formatter.Deserialize(fs); + } + } + catch (Exception) + { + return null; + } + } + } +} diff --git a/Assets/Scripts/UVC/Extention/SerializableEx.cs.meta b/Assets/Scripts/UVC/Extention/SerializableEx.cs.meta new file mode 100644 index 00000000..6b5ed495 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/SerializableEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: ecdf5e3295a988d428c4a4f88f8dfbbe \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/StringEx.cs b/Assets/Scripts/UVC/Extention/StringEx.cs new file mode 100644 index 00000000..d3c2210d --- /dev/null +++ b/Assets/Scripts/UVC/Extention/StringEx.cs @@ -0,0 +1,526 @@ +using System; +using System.Collections.Generic; +using System.Globalization; +using System.Text; +using System.Text.RegularExpressions; +using UnityEngine; +using UVC.Json; + +namespace UVC.Extention +{ + /// + /// 문자열 확장 메소드를 제공하는 클래스입니다. + /// + public static class StringEx + { + /// + /// 문자열을 지정된 열거형 타입으로 변환합니다. + /// + /// 변환할 열거형 타입 + /// 변환할 문자열 + /// 변환된 열거형 값 + /// 문자열이 열거형 값으로 변환될 수 없을 때 발생 + /// + /// + /// // 사용 예시 + /// public enum Direction { North, South, East, West } + /// + /// string dirText = "North"; + /// Direction dir = dirText.ToEnum(); // Direction.North가 반환됨 + /// + /// + public static T ToEnum(this string txt) + { + return (T)Enum.Parse(typeof(T), txt); + } + + /// + /// 문자열이 null이거나 빈 문자열인지 확인합니다. + /// + /// 검사할 문자열 + /// 문자열이 null이거나 빈 문자열이면 true, 그렇지 않으면 false + /// + /// + /// // 사용 예시 + /// string text1 = null; + /// string text2 = ""; + /// string text3 = "Hello"; + /// + /// bool result1 = text1.IsNullOrEmpty(); // true 반환 + /// bool result2 = text2.IsNullOrEmpty(); // true 반환 + /// bool result3 = text3.IsNullOrEmpty(); // false 반환 + /// + /// + public static bool IsNullOrEmpty(this string value) + { + return value == null || value.Length == 0; + } + + /// + /// 문자열이 null, 빈 문자열 또는 공백 문자로만 구성되어 있는지 확인합니다. + /// + /// 검사할 문자열 + /// 문자열이 null, 빈 문자열 또는 공백 문자로만 구성되어 있으면 true, 그렇지 않으면 false + /// + /// + /// string text1 = null; + /// string text2 = " "; + /// string text3 = "Hello"; + /// + /// bool result1 = text1.IsNullOrWhiteSpace(); // true 반환 + /// bool result2 = text2.IsNullOrWhiteSpace(); // true 반환 + /// bool result3 = text3.IsNullOrWhiteSpace(); // false 반환 + /// + /// + public static bool IsNullOrWhiteSpace(this string value) + { + if (value == null) return true; + + for (int i = 0; i < value.Length; i++) + { + if (!char.IsWhiteSpace(value[i])) + { + return false; + } + } + + return true; + } + + /// + /// 문자열을 지정된 타입으로 변환합니다. + /// + /// 변환할 타입 + /// 변환할 문자열 + /// 변환 실패시 반환할 기본값 + /// 변환된 값 또는 기본값 + /// + /// + /// string numStr = "123"; + /// string invalidStr = "abc"; + /// + /// int num1 = numStr.To(); // 123 반환 + /// int num2 = invalidStr.To(0); // 0 반환 (기본값) + /// + /// + public static T To(this string value, T defaultValue = default) + { + try + { + return (T)Convert.ChangeType(value, typeof(T), CultureInfo.InvariantCulture); + } + catch + { + return defaultValue; + } + } + + /// + /// 문자열의 첫 글자만 대문자로 변환합니다. + /// + /// 변환할 문자열 + /// 첫 글자가 대문자로 변환된 문자열 + /// + /// + /// string text = "hello world"; + /// string result = text.Capitalize(); // "Hello world" 반환 + /// + /// + public static string Capitalize(this string value) + { + if (value.IsNullOrEmpty()) return value; + return char.ToUpper(value[0]) + value.Substring(1); + } + + /// + /// 주어진 패턴을 이용하여 문자열이 정규식 패턴과 일치하는지 확인합니다. + /// + /// 검사할 문자열 + /// 정규식 패턴 + /// 문자열이 패턴과 일치하면 true, 그렇지 않으면 false + /// + /// + /// string email = "user@example.com"; + /// string pattern = @"^[^@\s]+@[^@\s]+\.[^@\s]+$"; + /// + /// bool isValid = email.IsMatch(pattern); // true 반환 + /// + /// + public static bool IsMatch(this string value, string pattern) + { + if (value == null) return false; + return Regex.IsMatch(value, pattern); + } + + /// + /// JSON 문자열을 Dictionary로 변환합니다. + /// + /// Dictionary의 키 타입 + /// Dictionary의 값 타입 + /// 변환할 JSON 문자열 + /// 변환된 Dictionary 객체 + /// JSON 문자열 형식이 올바르지 않은 경우 발생 + /// + /// + /// string json = "{\"name\":\"홍길동\",\"age\":30,\"isStudent\":false}"; + /// var dict = json.ToDictionaryFromJson(); + /// + /// // 결과: + /// // dict["name"] == "홍길동" + /// // dict["age"] == 30 + /// // dict["isStudent"] == false + /// + /// // 중첩된 객체도 처리 가능 + /// string nestedJson = "{\"user\":{\"name\":\"홍길동\",\"address\":{\"city\":\"서울\"}}}"; + /// var nestedDict = nestedJson.ToDictionaryFromJson(); + /// + /// + public static Dictionary ToDictionaryFromJson(this string json) + { + if (json.IsNullOrWhiteSpace()) + { + return new Dictionary(); + } + + // JSON 객체가 아닌 경우 예외 발생 + json = json.Trim(); + if (!json.StartsWith("{") || !json.EndsWith("}")) + throw new ArgumentException("유효한 JSON 객체 형식이 아닙니다.", nameof(json)); + + try + { + // JsonHelper를 사용하여 Dictionary로 변환 + return JsonHelper.FromJson>(json); + } + catch (Exception ex) + { + // 변환 실패 시 예외 정보 로깅 (선택적) + Debug.LogError($"JSON을 Dictionary로 변환하는 중 오류 발생: {ex.Message}"); + return new Dictionary(); + } + } + + + /// + /// JSON 문자열을 Dictionary로 변환합니다. + /// + /// Dictionary의 키 타입 (일반적으로 string) + /// Dictionary의 값 타입 + /// 변환할 JSON 문자열 + /// JSON 문자열에서 파싱된 Dictionary + /// JSON 문자열 형식이 올바르지 않은 경우 발생 + /// + /// + /// string jsonStr = "{\"name\":\"홍길동\",\"age\":30,\"isStudent\":false}"; + /// var dict = jsonStr.ToDictionary(); + /// + /// // 결과: + /// // dict["name"] = "홍길동" + /// // dict["age"] = 30 + /// // dict["isStudent"] = false + /// + /// + public static Dictionary ToDictionary(this string json) + { + // JSON 문자열이 null이거나 비어있는 경우 + if (json.IsNullOrWhiteSpace()) + return new Dictionary(); + + // JSON 객체가 아닌 경우 예외 발생 + json = json.Trim(); + if (!json.StartsWith("{") || !json.EndsWith("}")) + throw new ArgumentException("유효한 JSON 객체 형식이 아닙니다.", nameof(json)); + + // Dictionary 생성 + var result = new Dictionary(); + + // 중괄호 제거 후 내용만 추출 + json = json.Substring(1, json.Length - 2).Trim(); + if (string.IsNullOrEmpty(json)) + return result; + + int startIndex = 0; + while (startIndex < json.Length) + { + // 키 추출 + int keyStartIndex = json.IndexOf('"', startIndex); + if (keyStartIndex == -1) + break; + + int keyEndIndex = FindClosingQuote(json, keyStartIndex + 1); + if (keyEndIndex == -1) + throw new ArgumentException("JSON 키 형식이 올바르지 않습니다.", nameof(json)); + + string keyStr = json.Substring(keyStartIndex + 1, keyEndIndex - keyStartIndex - 1); + + // : 찾기 + int colonIndex = json.IndexOf(':', keyEndIndex + 1); + if (colonIndex == -1) + throw new ArgumentException("JSON 형식이 올바르지 않습니다: 콜론이 없습니다.", nameof(json)); + + // 값의 시작 위치 + int valueStartIndex = FindNextNonWhitespaceIndex(json, colonIndex + 1); + if (valueStartIndex >= json.Length) + break; + + // 값 유형에 따른 처리 + object value; + int nextStartIndex; + + char firstChar = json[valueStartIndex]; + switch (firstChar) + { + case '{': // 중첩된 객체 + int objectEndIndex = FindMatchingClosingBrace(json, valueStartIndex); + string objectJson = json.Substring(valueStartIndex, objectEndIndex - valueStartIndex + 1); + + // 재귀적으로 중첩 객체 처리 (최종 타입에 따라 처리) + if (typeof(TValue) == typeof(Dictionary)) + { + value = objectJson.ToDictionary(); + } + else if (typeof(TValue) == typeof(Dictionary)) + { + value = objectJson.ToDictionary(); + } + else + { + // 기본적으로 문자열로 저장 + value = objectJson; + } + + nextStartIndex = objectEndIndex + 1; + break; + + case '[': // 배열(현재 구현에서는 단순 문자열로 처리) + int arrayEndIndex = FindMatchingClosingBracket(json, valueStartIndex); + value = json.Substring(valueStartIndex, arrayEndIndex - valueStartIndex + 1); + nextStartIndex = arrayEndIndex + 1; + break; + + case '"': // 문자열 + int stringEndIndex = FindClosingQuote(json, valueStartIndex + 1); + string stringValue = json.Substring(valueStartIndex + 1, stringEndIndex - valueStartIndex - 1); + value = UnescapeJsonString(stringValue); + nextStartIndex = stringEndIndex + 1; + break; + + default: // 숫자, boolean, null + int commaOrEndIndex = json.IndexOfAny(new[] { ',', '}' }, valueStartIndex); + if (commaOrEndIndex == -1) + commaOrEndIndex = json.Length; + + string primitiveValueStr = json.Substring(valueStartIndex, commaOrEndIndex - valueStartIndex).Trim(); + + // null, boolean, 숫자 처리 + if (primitiveValueStr == "null") + { + value = null; + } + else if (primitiveValueStr == "true") + { + value = true; + } + else if (primitiveValueStr == "false") + { + value = false; + } + else if (double.TryParse(primitiveValueStr, NumberStyles.Any, CultureInfo.InvariantCulture, out double numValue)) + { + // 정수인지 실수인지 확인 + if (Math.Floor(numValue) == numValue && numValue >= int.MinValue && numValue <= int.MaxValue) + { + value = (int)numValue; + } + else + { + value = numValue; + } + } + else + { + value = primitiveValueStr; // 숫자로 파싱할 수 없다면 문자열로 처리 + } + + nextStartIndex = commaOrEndIndex; + break; + } + + // 키와 값을 딕셔너리에 추가 (형변환 시도) + try + { + var key = (TKey)Convert.ChangeType(keyStr, typeof(TKey), CultureInfo.InvariantCulture); + result[key] = value is TValue tValue ? tValue : (TValue)Convert.ChangeType(value, typeof(TValue), CultureInfo.InvariantCulture); + } + catch + { + // 형변환 실패 시 건너뜀 + } + + // 다음 키-값 쌍의 시작 위치 찾기 + startIndex = json.IndexOf(',', nextStartIndex); + if (startIndex == -1) + break; + + startIndex++; // 콤마 다음 위치로 이동 + } + + return result; + } + + /// + /// JSON 문자열의 이스케이프된 문자를 원래 문자로 변환합니다. + /// + private static string UnescapeJsonString(string value) + { + if (string.IsNullOrEmpty(value)) + return value; + + StringBuilder sb = new StringBuilder(value.Length); + int i = 0; + + while (i < value.Length) + { + char c = value[i++]; + if (c == '\\' && i < value.Length) + { + char escapeChar = value[i++]; + switch (escapeChar) + { + case '\\': sb.Append('\\'); break; + case '\"': sb.Append('\"'); break; + case 'n': sb.Append('\n'); break; + case 'r': sb.Append('\r'); break; + case 't': sb.Append('\t'); break; + case 'b': sb.Append('\b'); break; + case 'f': sb.Append('\f'); break; + case 'u': + if (i + 4 <= value.Length) + { + string unicodeHex = value.Substring(i, 4); + if (int.TryParse(unicodeHex, NumberStyles.HexNumber, CultureInfo.InvariantCulture, out int unicodeValue)) + { + sb.Append((char)unicodeValue); + i += 4; + } + else + { + sb.Append(escapeChar); + } + } + else + { + sb.Append(escapeChar); + } + break; + default: sb.Append(escapeChar); break; + } + } + else + { + sb.Append(c); + } + } + + return sb.ToString(); + } + + /// + /// JSON 문자열에서 닫는 따옴표의 위치를 찾습니다. + /// + private static int FindClosingQuote(string json, int startIndex) + { + for (int i = startIndex; i < json.Length; i++) + { + if (json[i] == '\"' && (i == 0 || json[i - 1] != '\\')) + return i; + + if (json[i] == '\\') + i++; // 이스케이프된 문자 건너뛰기 + } + return -1; + } + + /// + /// 주어진 위치 이후의 첫 번째 공백이 아닌 문자의 위치를 반환합니다. + /// + private static int FindNextNonWhitespaceIndex(string text, int startIndex) + { + for (int i = startIndex; i < text.Length; i++) + { + if (!char.IsWhiteSpace(text[i])) + return i; + } + return text.Length; + } + + /// + /// 여는 중괄호에 대응하는 닫는 중괄호의 위치를 찾습니다. + /// + private static int FindMatchingClosingBrace(string json, int openBraceIndex) + { + int depth = 1; + bool inString = false; + + for (int i = openBraceIndex + 1; i < json.Length; i++) + { + if (json[i] == '\"' && (i == 0 || json[i - 1] != '\\')) + { + inString = !inString; + continue; + } + + if (inString) + continue; + + if (json[i] == '{') + { + depth++; + } + else if (json[i] == '}') + { + depth--; + if (depth == 0) + return i; + } + } + + return -1; + } + + /// + /// 여는 대괄호에 대응하는 닫는 대괄호의 위치를 찾습니다. + /// + private static int FindMatchingClosingBracket(string json, int openBracketIndex) + { + int depth = 1; + bool inString = false; + + for (int i = openBracketIndex + 1; i < json.Length; i++) + { + if (json[i] == '\"' && (i == 0 || json[i - 1] != '\\')) + { + inString = !inString; + continue; + } + + if (inString) + continue; + + if (json[i] == '[') + { + depth++; + } + else if (json[i] == ']') + { + depth--; + if (depth == 0) + return i; + } + } + + return -1; + } + + } +} diff --git a/Assets/Scripts/UVC/Extention/StringEx.cs.meta b/Assets/Scripts/UVC/Extention/StringEx.cs.meta new file mode 100644 index 00000000..5cfb53e8 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/StringEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 176807d5f3555374f8e5e1c785ad6ed3 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/TextEx.cs b/Assets/Scripts/UVC/Extention/TextEx.cs new file mode 100644 index 00000000..02d6da98 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/TextEx.cs @@ -0,0 +1,105 @@ +using UnityEngine; +using UnityEngine.UI; + +namespace UVC.Extension +{ + /// + /// Unity UI Text Ʈ Ȯ ޼ + /// + public static class TextEx + { + /// + /// Text Ʈ ؽƮ ϵ, ־ ʰ ǥ(...) ߰մϴ. + /// + /// Text Ʈ + /// ǥ ؽƮ + /// + /// + /// // + /// Text myText = GetComponent(); + /// myText.SetTextWithEllipsis(" ؽƮ ʹ ڵ ٿϴ..."); + /// + /// + public static void SetTextWithEllipsis(this Text txt, string value) + { + // TextGenerator ؽƮ Ʈ + TextGenerator generator = new TextGenerator(); + RectTransform rectTrans = txt.rectTransform; + TextGenerationSettings settings = txt.GetGenerationSettings(rectTrans.rect.size); + generator.Populate(value, settings); + + // ǥ + int characterCountVisible = generator.characterCountVisible; + string updatedText = value; + + // ؽƮ ǥ ʰϴ ǥ ó + if (value.Length > characterCountVisible && characterCountVisible >= 3) + { + updatedText = value.Substring(0, characterCountVisible - 3); + updatedText += "..."; + } + // ؽƮ + txt.text = updatedText; + } + + /// + /// ؽƮ Ʈ ִ ̷ մϴ. + /// + /// Text Ʈ + /// ǥ ؽƮ + /// ִ ڼ + /// + /// + /// Text myText = GetComponent(); + /// myText.SetTextWithMaxLength(" ؽƮ Դϴ", 10); // " ؽƮ ..." + /// + /// + public static void SetTextWithMaxLength(this Text txt, string value, int maxLength) + { + if (string.IsNullOrEmpty(value) || value.Length <= maxLength) + { + txt.text = value; + return; + } + + txt.text = value.Substring(0, maxLength - 3) + "..."; + } + + /// + /// ؽƮ Ʈ ڸ õ (,) Բ ǥմϴ. + /// + /// Text Ʈ + /// ǥ + /// + /// + /// Text scoreText = GetComponent(); + /// scoreText.SetNumberWithCommas(1000000); // "1,000,000" ǥ + /// + /// + public static void SetNumberWithCommas(this Text txt, int number) + { + txt.text = string.Format("{0:#,0}", number); + } + + /// + /// ؽƮ ǥ ° ڵ Ʈ ũ⸦ մϴ. + /// + /// Text Ʈ + /// ǥ ؽƮ + /// ּ Ʈ ũ + /// ִ Ʈ ũ + /// + /// + /// Text titleText = GetComponent(); + /// titleText.SetTextWithBestFit(" ؽƮ", 10, 30); + /// + /// + public static void SetTextWithBestFit(this Text txt, string value, int minSize = 10, int maxSize = 40) + { + txt.text = value; + txt.resizeTextForBestFit = true; + txt.resizeTextMinSize = minSize; + txt.resizeTextMaxSize = maxSize; + } + } +} diff --git a/Assets/Scripts/UVC/Extention/TextEx.cs.meta b/Assets/Scripts/UVC/Extention/TextEx.cs.meta new file mode 100644 index 00000000..9c4f79d4 --- /dev/null +++ b/Assets/Scripts/UVC/Extention/TextEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 886e62b3763eb0546898f5048b1adb38 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Extention/TransformEx.cs b/Assets/Scripts/UVC/Extention/TransformEx.cs new file mode 100644 index 00000000..df586afd --- /dev/null +++ b/Assets/Scripts/UVC/Extention/TransformEx.cs @@ -0,0 +1,176 @@ +using UnityEngine; + +namespace UVC.Extension +{ + /// + /// Transform 클래스에 대한 확장 메소드를 제공하는 정적 클래스입니다. + /// + public static class TransformEx + { + /// + /// 하위 자식까지 재귀적으로 확인해서 이름이 같은 오브젝트를 찾는다. + /// + /// 검색을 시작할 부모 Transform + /// 찾고자 하는 자식 GameObject의 이름 + /// 찾은 자식 Transform 또는 찾지 못한 경우 null + /// + /// + /// // 사용 예시 + /// Transform parentTransform = gameObject.transform; + /// Transform childTransform = parentTransform.FindChildren("TargetChild"); + /// + /// if (childTransform != null) + /// { + /// // 찾은 자식 오브젝트 사용 + /// childTransform.gameObject.SetActive(true); + /// } + /// + /// + public static Transform? FindChildren(this Transform t, string name) + { + + Transform? child = null; + + int len = t.childCount; + for (int i = 0; i < len; i++) + { + Transform c = t.GetChild(i); + if (c.name == name) + { + child = c; + break; + } + else + { + Transform? result = FindChildren(c, name); + if (result != null) + { + child = result; + break; + } + } + } + + return child; + } + + /// + /// Transform의 X 좌표만 변경합니다. + /// + /// 대상 Transform + /// 설정할 X 좌표 값 + /// 변경된 Transform (메소드 체이닝 지원) + /// + /// + /// // 사용 예시 + /// transform.SetPositionX(5f).SetPositionZ(3f); + /// + /// + public static Transform SetPositionX(this Transform t, float x) + { + Vector3 position = t.position; + position.x = x; + t.position = position; + return t; + } + + /// + /// Transform의 Y 좌표만 변경합니다. + /// + /// 대상 Transform + /// 설정할 Y 좌표 값 + /// 변경된 Transform (메소드 체이닝 지원) + /// + /// + /// // 사용 예시 + /// transform.SetPositionY(5f).SetPositionZ(3f); + /// + /// + public static Transform SetPositionY(this Transform t, float y) + { + Vector3 position = t.position; + position.y = y; + t.position = position; + return t; + } + + /// + /// Transform의 Z 좌표만 변경합니다. + /// + /// 대상 Transform + /// 설정할 Z 좌표 값 + /// 변경된 Transform (메소드 체이닝 지원) + /// + /// + /// // 사용 예시 + /// transform.SetPositionX(5f).SetPositionZ(3f); + /// + /// + public static Transform SetPositionZ(this Transform t, float z) + { + Vector3 position = t.position; + position.z = z; + t.position = position; + return t; + } + + /// + /// 하위 자식 중에서 특정 태그를 가진 오브젝트를 모두 찾습니다. + /// + /// 검색을 시작할 부모 Transform + /// 찾고자 하는 태그 + /// 찾은 Transform 배열 + /// + /// + /// // 사용 예시 + /// Transform[] enemies = parentTransform.FindChildrenWithTag("Enemy"); + /// foreach (Transform enemy in enemies) + /// { + /// // 찾은 적 오브젝트 처리 + /// enemy.gameObject.SetActive(false); + /// } + /// + /// + public static Transform[] FindChildrenWithTag(this Transform t, string tag) + { + System.Collections.Generic.List result = new System.Collections.Generic.List(); + FindChildrenWithTagRecursive(t, tag, result); + return result.ToArray(); + } + + private static void FindChildrenWithTagRecursive(Transform parent, string tag, System.Collections.Generic.List result) + { + int childCount = parent.childCount; + for (int i = 0; i < childCount; i++) + { + Transform child = parent.GetChild(i); + if (child.CompareTag(tag)) + { + result.Add(child); + } + + FindChildrenWithTagRecursive(child, tag, result); + } + } + + /// + /// Transform을 기본 상태로 초기화합니다. (위치: 원점, 회전: 0, 크기: 1) + /// + /// 초기화할 Transform + /// 초기화된 Transform (메소드 체이닝 지원) + /// + /// + /// // 사용 예시 + /// transform.ResetTransform(); + /// + /// + public static Transform ResetTransform(this Transform t) + { + t.localPosition = Vector3.zero; + t.localRotation = Quaternion.identity; + t.localScale = Vector3.one; + return t; + } + + } +} diff --git a/Assets/Scripts/UVC/Extention/TransformEx.cs.meta b/Assets/Scripts/UVC/Extention/TransformEx.cs.meta new file mode 100644 index 00000000..280e05bf --- /dev/null +++ b/Assets/Scripts/UVC/Extention/TransformEx.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: a020e272c213bb74c840bbf577eb1e23 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Json.meta b/Assets/Scripts/UVC/Json.meta new file mode 100644 index 00000000..0bf13e0e --- /dev/null +++ b/Assets/Scripts/UVC/Json.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 50eae807820824b439898332324362d7 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Json/JsonHelper.cs b/Assets/Scripts/UVC/Json/JsonHelper.cs new file mode 100644 index 00000000..3e56b579 --- /dev/null +++ b/Assets/Scripts/UVC/Json/JsonHelper.cs @@ -0,0 +1,83 @@ +using Newtonsoft.Json; +using System.Collections; +using UnityEngine; + +namespace UVC.Json +{ + /// + /// Json 직렬화/역직렬화 시 사용해야 함. + /// 배열과 컬렉션은 Best.HTTP.JSON.LitJson, 일반 객체는 Unity의 JsonUtility를 사용합니다. + /// Newtonsoft.Json을 사용한 역직렬화를 지원합니다. + /// + public static class JsonHelper + { + /// + /// 객체를 JSON 문자열로 직렬화합니다. + /// + /// 직렬화할 객체 + /// JSON 형식의 문자열 + /// + /// 객체가 배열이나 컬렉션인 경우 Best.HTTP.JSON.LitJson을 사용하고, + /// 그 외의 경우엔 Unity의 JsonUtility를 사용합니다. + /// + /// + /// + /// // 단일 객체 직렬화 + /// var user = new User { Id = 1, Name = "홍길동" }; + /// string userJson = JsonHelper.ToJson(user); + /// + /// // 배열 직렬화 + /// var users = new User[] { + /// new User { Id = 1, Name = "홍길동" }, + /// new User { Id = 2, Name = "김철수" } + /// }; + /// string arrayJson = JsonHelper.ToJson(users); + /// + /// + public static string ToJson(object obj) + { + if (obj.GetType().IsArray || obj is ICollection) + { + return Best.HTTP.JSON.LitJson.JsonMapper.ToJson(obj); + } + else + { + return JsonUtility.ToJson(obj); + } + } + + /// + /// JSON 문자열을 지정된 타입의 객체로 역직렬화합니다. + /// + /// 변환할 대상 객체 타입 + /// 역직렬화할 JSON 문자열 + /// 역직렬화된 T 타입의 객체 + /// + /// JsonProperty 속성을 지원하기 위해 Newtonsoft.Json 라이브러리를 사용합니다. + /// 이전에 사용하던 LitJson은 JsonProperty 지원이 제한적이었습니다. + /// + /// + /// + /// // 단일 객체 역직렬화 + /// string userJson = "{\"Id\":1,\"Name\":\"홍길동\"}"; + /// User user = JsonHelper.FromJson<User>(userJson); + /// Debug.Log($"사용자 정보: {user.Id}, {user.Name}"); + /// + /// // 컬렉션 역직렬화 + /// string arrayJson = "[{\"Id\":1,\"Name\":\"홍길동\"},{\"Id\":2,\"Name\":\"김철수\"}]"; + /// List<User> users = JsonHelper.FromJson<List<User>>(arrayJson); + /// foreach(var u in users) { + /// Debug.Log($"사용자 정보: {u.Id}, {u.Name}"); + /// } + /// + /// + public static T FromJson(string json) + { + //JsonProperty 지원안해서 newtonsoft로 변경 + //return Best.HTTP.JSON.LitJson.JsonMapper.ToObject(json); + return JsonConvert.DeserializeObject(json); + } + + + } +} diff --git a/Assets/Scripts/UVC/Json/JsonHelper.cs.meta b/Assets/Scripts/UVC/Json/JsonHelper.cs.meta new file mode 100644 index 00000000..f0178c43 --- /dev/null +++ b/Assets/Scripts/UVC/Json/JsonHelper.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 8ff44642a645f1c4fbd361ec338af351 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs b/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs new file mode 100644 index 00000000..f5390515 --- /dev/null +++ b/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs @@ -0,0 +1,111 @@ +using System; +using UnityEngine; + +namespace UVC.Json +{ + /// + /// JsonUtility를 이용한 배열 직렬화/역직렬화 + /// Unity의 기본 JsonUtility는 최상위 배열을 지원하지 않기 때문에 Wrapper 클래스를 사용하여 이 문제를 해결합니다. + /// 참조: https://stackoverflow.com/questions/36239705/serialize-and-deserialize-json-and-json-array-in-unity + /// + public static class JsonUtilityHelper + { + /// + /// JSON 문자열을 T 타입 배열로 역직렬화합니다. + /// + /// 배열 요소의 타입 + /// 역직렬화할 JSON 문자열 + /// 역직렬화된 T 타입 배열 + /// + /// + /// // Player 클래스가 [Serializable] 속성을 가지고 있다고 가정 + /// string jsonData = "{\"Items\":[{\"name\":\"플레이어1\",\"level\":10},{\"name\":\"플레이어2\",\"level\":20}]}"; + /// Player[] players = JsonUtilityHelper.FromJson(jsonData); + /// // players[0].name == "플레이어1", players[0].level == 10 + /// // players[1].name == "플레이어2", players[1].level == 20 + /// + /// + public static T[] FromJson(string json) + { + Wrapper wrapper = JsonUtility.FromJson>(json); + return wrapper.Items; + } + + /// + /// T 타입 배열을 JSON 문자열로 직렬화합니다. + /// + /// 배열 요소의 타입 + /// 직렬화할 배열 + /// 직렬화된 JSON 문자열 + /// + /// + /// // Player 클래스가 [Serializable] 속성을 가지고 있다고 가정 + /// Player[] players = new Player[] + /// { + /// new Player { name = "플레이어1", level = 10 }, + /// new Player { name = "플레이어2", level = 20 } + /// }; + /// + /// string json = JsonUtilityHelper.ToJson(players); + /// // json == "{\"Items\":[{\"name\":\"플레이어1\",\"level\":10},{\"name\":\"플레이어2\",\"level\":20}]}" + /// + /// + public static string ToJson(T[] array) + { + Wrapper wrapper = new Wrapper(); + wrapper.Items = array; + return JsonUtility.ToJson(wrapper); + } + + /// + /// T 타입 배열을 JSON 문자열로 직렬화합니다. 가독성 향상을 위한 들여쓰기 옵션을 제공합니다. + /// + /// 배열 요소의 타입 + /// 직렬화할 배열 + /// 들여쓰기를 포함한 가독성 높은 형식 사용 여부 + /// 직렬화된 JSON 문자열 + /// + /// + /// // Player 클래스가 [Serializable] 속성을 가지고 있다고 가정 + /// Player[] players = new Player[] + /// { + /// new Player { name = "플레이어1", level = 10 }, + /// new Player { name = "플레이어2", level = 20 } + /// }; + /// + /// string json = JsonUtilityHelper.ToJson(players, true); + /// // json은 다음과 같이 들여쓰기가 포함된 형식: + /// // { + /// // "Items": [ + /// // { + /// // "name": "플레이어1", + /// // "level": 10 + /// // }, + /// // { + /// // "name": "플레이어2", + /// // "level": 20 + /// // } + /// // ] + /// // } + /// + /// + public static string ToJson(T[] array, bool prettyPrint) + { + Wrapper wrapper = new Wrapper(); + wrapper.Items = array; + return JsonUtility.ToJson(wrapper, prettyPrint); + } + + /// + /// 배열을 위한 직렬화 래퍼 클래스입니다. + /// Unity의 JsonUtility는 최상위 배열을 직접 지원하지 않기 때문에 이 클래스로 배열을 감싸줍니다. + /// + /// 배열 요소의 타입 + [Serializable] + private class Wrapper + { + public T[] Items; + } + } + +} diff --git a/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs.meta b/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs.meta new file mode 100644 index 00000000..7889e1a9 --- /dev/null +++ b/Assets/Scripts/UVC/Json/JsonUtilityHelper.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: f82ae368fb09a734d9cfe708903d3978 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq.meta b/Assets/Scripts/UVC/Linq.meta new file mode 100644 index 00000000..3c639837 --- /dev/null +++ b/Assets/Scripts/UVC/Linq.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f55687cdb12325943941c1549f066b1b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs new file mode 100644 index 00000000..611e4b3c --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs @@ -0,0 +1,167 @@ +using System; +using System.Collections.Generic; +using UnityEngine; + +namespace UVC.Linq +{ + public static partial class GameObjectExtensions + { + /// ҽ ÷ǿ ִ GameObject ϴ GameObject ÷ ȯմϴ. + public static IEnumerable Ancestors(this IEnumerable source) + { + foreach (var item in source) + { + var e = item.Ancestors().GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ GameObject ̵ GameObject ϴ ÷ ȯմϴ. + public static IEnumerable AncestorsAndSelf(this IEnumerable source) + { + foreach (var item in source) + { + var e = item.AncestorsAndSelf().GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ǿ ִ GameObject ڼ GameObject ϴ ÷ ȯմϴ. + /// ڽ ü ȸ ϴ ԼԴϴ. null̸ ڽ ȸմϴ. + public static IEnumerable Descendants(this IEnumerable source, Func descendIntoChildren = null) + { + foreach (var item in source) + { + var e = item.Descendants(descendIntoChildren).GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ GameObject ̵ ڼ GameObject ϴ ÷ ȯմϴ. + public static IEnumerable DescendantsAndSelf(this IEnumerable source, Func descendIntoChildren = null) + { + foreach (var item in source) + { + var e = item.DescendantsAndSelf(descendIntoChildren).GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ǿ ִ GameObject ڽ GameObject ϴ ÷ ȯմϴ. + public static IEnumerable Children(this IEnumerable source) + { + foreach (var item in source) + { + var e = item.Children().GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ GameObject ̵ ڽ GameObject ϴ ÷ ȯմϴ. + public static IEnumerable ChildrenAndSelf(this IEnumerable source) + { + foreach (var item in source) + { + var e = item.ChildrenAndSelf().GetEnumerator(); + while (e.MoveNext()) + { + yield return e.Current; + } + } + } + + /// ҽ ÷ǿ ִ GameObject ϰ(null üũ ) ıմϴ. + /// 忡 true ϰų !Application.isPlaying ϼ. + /// θ null մϴ. + public static void Destroy(this IEnumerable source, bool useDestroyImmediate = false, bool detachParent = false) + { + if (detachParent) + { + var l = new List(source); // avoid halloween problem + var e = l.GetEnumerator(); // get struct enumerator for avoid unity's compiler bug(avoid boxing) + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, true); + } + } + else + { + foreach (var item in source) + { + item.Destroy(useDestroyImmediate, false); // doesn't detach. + } + } + } + + /// ҽ ÷ǿ Ʈ Ÿ ÷ ȯմϴ. + /// ˻ Ʈ ŸԴϴ. + /// 忡 ޸ Ҵ ּȭϱ ij Ŀ մϴ. + public static IEnumerable OfComponent(this IEnumerable source) + where T : UnityEngine.Component + { + foreach (var item in source) + { +#if UNITY_EDITOR + var cache = ComponentCache.Instance; + item.GetComponents(cache); + if (cache.Count != 0) + { + var component = cache[0]; + cache.Clear(); + yield return component; + } +#else + + var component = item.GetComponent(); + if (component != null) + { + yield return component; + } +#endif + } + } + + +#if UNITY_EDITOR + class ComponentCache + { + public static readonly List Instance = new List(); // for no allocate on UNITY_EDITOR + } +#endif + + /// Ҹ ۿ ϰ, ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + /// ҵ ҽ ÷Դϴ. + /// Ҹ 迭 Դϴ. ʿ信 ũⰡ ˴ϴ. + /// 迭 ȯմϴ. + public static int ToArrayNonAlloc(this IEnumerable source, ref T[] array) + { + var index = 0; + foreach (var item in source) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs.meta b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs.meta new file mode 100644 index 00000000..f9e4a4ce --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Enumerable.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: a8416b1d411272c41b39cd525e9bff6e \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs new file mode 100644 index 00000000..a2258c92 --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs @@ -0,0 +1,624 @@ +using System; +using System.Collections.Generic; +using UnityEngine; + +namespace UVC.Linq +{ + /// + /// ڽ GameObject localPosition/Scale/Rotation ŸԴϴ. + /// + public enum TransformCloneType + { + /// ϰ մϴ. Add ޼ҵ ⺻Դϴ. + KeepOriginal, + /// θ ϰ մϴ. + FollowParent, + /// Position = , Scale = , Rotation = ׵ ȸ մϴ. + Origin, + /// Position/Scale/Rotation ״ մϴ. + DoNothing + } + + /// + /// ̵ ڽ GameObject localPosition/Scale/Rotation ŸԴϴ. + /// + public enum TransformMoveType + { + /// θ ϰ մϴ. + FollowParent, + /// Position = , Scale = , Rotation = ׵ ȸ մϴ. + Origin, + /// Position/Scale/Rotation ״ մϴ. + DoNothing + } + + public static partial class GameObjectExtensions + { + static UnityEngine.GameObject GetGameObject(T obj) + where T : UnityEngine.Object + { + var gameObject = obj as GameObject; + if (gameObject == null) + { + var component = obj as Component; + if (component == null) + { + return null; + } + + gameObject = component.gameObject; + } + + return gameObject; + } + + #region Add + + /// + /// GameObject/Component GameObject ڽ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T Add(this GameObject parent, T childOriginal, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + if (parent == null) throw new ArgumentNullException("parent"); + if (childOriginal == null) throw new ArgumentNullException("childOriginal"); + + var child = UnityEngine.Object.Instantiate(childOriginal); + + var childGameObject = GetGameObject(child); + + // uGUI SetParent(parent, false) ؾ մϴ + var childTransform = childGameObject.transform; +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + var rectTransform = childTransform as RectTransform; + if (rectTransform != null) + { + rectTransform.SetParent(parent.transform, worldPositionStays: false); + } + else + { +#endif + var parentTransform = parent.transform; + childTransform.parent = parentTransform; + switch (cloneType) + { + case TransformCloneType.FollowParent: + childTransform.localPosition = parentTransform.localPosition; + childTransform.localScale = parentTransform.localScale; + childTransform.localRotation = parentTransform.localRotation; + break; + case TransformCloneType.Origin: + childTransform.localPosition = Vector3.zero; + childTransform.localScale = Vector3.one; + childTransform.localRotation = Quaternion.identity; + break; + case TransformCloneType.KeepOriginal: + var co = GetGameObject(childOriginal); + var childOriginalTransform = co.transform; + childTransform.localPosition = childOriginalTransform.localPosition; + childTransform.localScale = childOriginalTransform.localScale; + childTransform.localRotation = childOriginalTransform.localRotation; + break; + case TransformCloneType.DoNothing: + default: + break; + } +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + } +#endif + if (setLayer) + { + childGameObject.layer = parent.layer; + } + + if (setActive != null) + { + childGameObject.SetActive(setActive.Value); + } + if (specifiedName != null) + { + child.name = specifiedName; + } + + return child; + } + + /// + /// GameObject/Component GameObject ڽ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] AddRange(this GameObject parent, IEnumerable childOriginals, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + if (parent == null) throw new ArgumentNullException("parent"); + if (childOriginals == null) throw new ArgumentNullException("childOriginals"); + + // ݺ ȭ + { + var array = childOriginals as T[]; + if (array != null) + { + var result = new T[array.Length]; + for (int i = 0; i < array.Length; i++) + { + var child = Add(parent, array[i], cloneType, setActive, specifiedName, setLayer); + result[i] = child; + } + return result; + } + } + + { + var iterList = childOriginals as IList; + if (iterList != null) + { + var result = new T[iterList.Count]; + for (int i = 0; i < iterList.Count; i++) + { + var child = Add(parent, iterList[i], cloneType, setActive, specifiedName, setLayer); + result[i] = child; + } + return result; + } + } + + { + var result = new List(); + foreach (var childOriginal in childOriginals) + { + var child = Add(parent, childOriginal, cloneType, setActive, specifiedName, setLayer); + result.Add(child); + } + + return result.ToArray(); + } + } + + /// + /// GameObject/Component GameObject ù ° ڽ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T AddFirst(this GameObject parent, T childOriginal, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var child = Add(parent, childOriginal, cloneType, setActive, specifiedName, setLayer); + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetAsFirstSibling(); + return child; + } + + /// + /// GameObject/Component GameObject ù ° ڽ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] AddFirstRange(this GameObject parent, IEnumerable childOriginals, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var child = AddRange(parent, childOriginals, cloneType, setActive, specifiedName, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + go.transform.SetAsFirstSibling(); + } + return child; + } + + /// + /// GameObject/Component GameObject տ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T AddBeforeSelf(this GameObject parent, T childOriginal, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("The parent root is null"); + + var sibilingIndex = parent.transform.GetSiblingIndex(); + + var child = Add(root, childOriginal, cloneType, setActive, specifiedName, setLayer); + + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetSiblingIndex(sibilingIndex); + return child; + } + + /// + /// GameObject/Component GameObject տ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] AddBeforeSelfRange(this GameObject parent, IEnumerable childOriginals, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("The parent root is null"); + + var sibilingIndex = parent.transform.GetSiblingIndex(); + var child = AddRange(root, childOriginals, cloneType, setActive, specifiedName, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + go.transform.SetSiblingIndex(sibilingIndex); + } + + return child; + } + + /// + /// GameObject/Component GameObject ڿ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T AddAfterSelf(this GameObject parent, T childOriginal, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("The parent root is null"); + + var sibilingIndex = parent.transform.GetSiblingIndex() + 1; + var child = Add(root, childOriginal, cloneType, setActive, specifiedName, setLayer); + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetSiblingIndex(sibilingIndex); + return child; + } + + /// + /// GameObject/Component GameObject ڿ ߰մϴ. ˴ϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] AddAfterSelfRange(this GameObject parent, IEnumerable childOriginals, TransformCloneType cloneType = TransformCloneType.KeepOriginal, bool? setActive = null, string specifiedName = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("The parent root is null"); + + var sibilingIndex = parent.transform.GetSiblingIndex() + 1; + var child = AddRange(root, childOriginals, cloneType, setActive, specifiedName, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + go.transform.SetSiblingIndex(sibilingIndex); + } + + return child; + } + + #endregion + + #region Move + + /// + /// GameObject/Component GameObject ڽ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T MoveToLast(this GameObject parent, T child, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + if (parent == null) throw new ArgumentNullException("parent"); + if (child == null) throw new ArgumentNullException("child"); + + var childGameObject = GetGameObject(child); + if (child == null) return child; + + // uGUI SetParent(parent, false) ؾ մϴ + var childTransform = childGameObject.transform; +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + var rectTransform = childTransform as RectTransform; + if (rectTransform != null) + { + rectTransform.SetParent(parent.transform, worldPositionStays: false); + } + else + { +#endif + var parentTransform = parent.transform; + childTransform.parent = parentTransform; + switch (moveType) + { + case TransformMoveType.FollowParent: + childTransform.localPosition = parentTransform.localPosition; + childTransform.localScale = parentTransform.localScale; + childTransform.localRotation = parentTransform.localRotation; + break; + case TransformMoveType.Origin: + childTransform.localPosition = Vector3.zero; + childTransform.localScale = Vector3.one; + childTransform.localRotation = Quaternion.identity; + break; + case TransformMoveType.DoNothing: + default: + break; + } +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + } +#endif + if (setLayer) + { + childGameObject.layer = parent.layer; + } + + if (setActive != null) + { + childGameObject.SetActive(setActive.Value); + } + + return child; + } + + /// + /// GameObject/Component GameObject ڽ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] MoveToLastRange(this GameObject parent, IEnumerable childs, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + if (parent == null) throw new ArgumentNullException("parent"); + if (childs == null) throw new ArgumentNullException("childs"); + + // ݺ ȭ + { + var array = childs as T[]; + if (array != null) + { + var result = new T[array.Length]; + for (int i = 0; i < array.Length; i++) + { + var child = MoveToLast(parent, array[i], moveType, setActive, setLayer); + result[i] = child; + } + return result; + } + } + + { + var iterList = childs as IList; + if (iterList != null) + { + var result = new T[iterList.Count]; + for (int i = 0; i < iterList.Count; i++) + { + var child = MoveToLast(parent, iterList[i], moveType, setActive, setLayer); + result[i] = child; + } + return result; + } + } + { + var result = new List(); + foreach (var childOriginal in childs) + { + var child = MoveToLast(parent, childOriginal, moveType, setActive, setLayer); + result.Add(child); + } + + return result.ToArray(); + } + } + + /// + /// GameObject/Component GameObject ù ° ڽ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T MoveToFirst(this GameObject parent, T child, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + MoveToLast(parent, child, moveType, setActive, setLayer); + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetAsFirstSibling(); + return child; + } + + /// + /// GameObject/Component GameObject ù ° ڽ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] MoveToFirstRange(this GameObject parent, IEnumerable childs, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + var child = MoveToLastRange(parent, childs, moveType, setActive, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + + go.transform.SetAsFirstSibling(); + } + return child; + } + + /// + /// GameObject/Component GameObject ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T MoveToBeforeSelf(this GameObject parent, T child, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("θ Ʈ nullԴϴ"); + + var sibilingIndex = parent.transform.GetSiblingIndex(); + + MoveToLast(root, child, moveType, setActive, setLayer); + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetSiblingIndex(sibilingIndex); + return child; + } + + /// + /// GameObject/Component GameObject ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] MoveToBeforeSelfRange(this GameObject parent, IEnumerable childs, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("θ Ʈ nullԴϴ"); + + var sibilingIndex = parent.transform.GetSiblingIndex(); + var child = MoveToLastRange(root, childs, moveType, setActive, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + + go.transform.SetSiblingIndex(sibilingIndex); + } + + return child; + } + + /// + /// GameObject/Component GameObject ڷ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T MoveToAfterSelf(this GameObject parent, T child, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("θ Ʈ nullԴϴ"); + + var sibilingIndex = parent.transform.GetSiblingIndex() + 1; + MoveToLast(root, child, moveType, setActive, setLayer); + var go = GetGameObject(child); + if (go == null) return child; + + go.transform.SetSiblingIndex(sibilingIndex); + return child; + } + + /// + /// GameObject/Component GameObject ڷ ̵մϴ. + /// + /// θ GameObjectԴϴ. + /// Դϴ. + /// ̵ ڽ GameObject localPosition/Scale/Rotation Ÿ մϴ. + /// ڽ GameObject Ȱ/Ȱ ¸ մϴ. null̸ ʽϴ. + /// ڽ GameObject ̾ θ ϰ Դϴ. + public static T[] MoveToAfterSelfRange(this GameObject parent, IEnumerable childs, TransformMoveType moveType = TransformMoveType.DoNothing, bool? setActive = null, bool setLayer = false) + where T : UnityEngine.Object + { + var root = parent.Parent(); + if (root == null) throw new InvalidOperationException("θ Ʈ nullԴϴ"); + + var sibilingIndex = parent.transform.GetSiblingIndex() + 1; + var child = MoveToLastRange(root, childs, moveType, setActive, setLayer); + for (int i = child.Length - 1; i >= 0; i--) + { + var go = GetGameObject(child[i]); + if (go == null) continue; + + go.transform.SetSiblingIndex(sibilingIndex); + } + + return child; + } + + #endregion + + /// GameObject ϰ(null üũ) ıմϴ. + /// 忡 true ϰų !Application.isPlaying ϼ. + /// θ null մϴ. + public static void Destroy(this GameObject self, bool useDestroyImmediate = false, bool detachParent = false) + { + if (self == null) return; + + if (detachParent) + { +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + self.transform.SetParent(null); +#else + self.transform.parent = null; +#endif + } + + if (useDestroyImmediate) + { + GameObject.DestroyImmediate(self); + } + else + { + GameObject.Destroy(self); + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs.meta b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs.meta new file mode 100644 index 00000000..ce892640 --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Operate.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 78abc66b41fb8464581244934889b0d0 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs new file mode 100644 index 00000000..fcbccaef --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs @@ -0,0 +1,2654 @@ +using System; +using System.Collections; +using System.Collections.Generic; +using UnityEngine; + +namespace UVC.Linq +{ + + public static partial class GameObjectExtensions + { + /// (θ, ڽ, ڽĵ, /ڼ, / ü) ü ȸմϴ. + /// GameObject θ GameObject ɴϴ. GameObject θ null ȯմϴ. + public static GameObject Parent(this GameObject origin) + { + if (origin == null) return null; + + var parentTransform = origin.transform.parent; + if (parentTransform == null) return null; + + return parentTransform.gameObject; + } + + /// ̸ ù ° ڽ GameObject ɴϴ. ̸ GameObject null ȯմϴ. + public static GameObject Child(this GameObject origin, string name) + { + if (origin == null) return null; + + var child = origin.transform.Find(name); // transform.find Ȱ ü ֽϴ. + if (child == null) return null; + return child.gameObject; + } + + /// ڽ GameObject ÷ ȯմϴ. + public static ChildrenEnumerable Children(this GameObject origin) + { + return new ChildrenEnumerable(origin, false); + } + + /// GameObject ڽ GameObject ϴ GameObject ÷ ȯմϴ. + public static ChildrenEnumerable ChildrenAndSelf(this GameObject origin) + { + return new ChildrenEnumerable(origin, true); + } + + /// GameObject GameObject ÷ ȯմϴ. + public static AncestorsEnumerable Ancestors(this GameObject origin) + { + return new AncestorsEnumerable(origin, false); + } + + /// ҿ GameObject ϴ GameObject ÷ ȯմϴ. + public static AncestorsEnumerable AncestorsAndSelf(this GameObject origin) + { + return new AncestorsEnumerable(origin, true); + } + + /// ڼ GameObject ÷ ȯմϴ. + public static DescendantsEnumerable Descendants(this GameObject origin, Func descendIntoChildren = null) + { + return new DescendantsEnumerable(origin, false, descendIntoChildren); + } + + /// GameObject GameObject ڼ GameObject ϴ GameObject ÷ ȯմϴ. + public static DescendantsEnumerable DescendantsAndSelf(this GameObject origin, Func descendIntoChildren = null) + { + return new DescendantsEnumerable(origin, true, descendIntoChildren); + } + + /// GameObject GameObject ÷ ȯմϴ. + public static BeforeSelfEnumerable BeforeSelf(this GameObject origin) + { + return new BeforeSelfEnumerable(origin, false); + } + + /// GameObject GameObject GameObject ϴ GameObject ÷ ȯմϴ. + public static BeforeSelfEnumerable BeforeSelfAndSelf(this GameObject origin) + { + return new BeforeSelfEnumerable(origin, true); + } + + /// GameObject GameObject ÷ ȯմϴ. + public static AfterSelfEnumerable AfterSelf(this GameObject origin) + { + return new AfterSelfEnumerable(origin, false); + } + + /// GameObject GameObject GameObject ϴ GameObject ÷ ȯմϴ. + public static AfterSelfEnumerable AfterSelfAndSelf(this GameObject origin) + { + return new AfterSelfEnumerable(origin, true); + } + + // ü ڸ մϴ. + + public struct ChildrenEnumerable : IEnumerable + { + readonly GameObject origin; + readonly bool withSelf; + + public ChildrenEnumerable(GameObject origin, bool withSelf) + { + this.origin = origin; + this.withSelf = withSelf; + } + + /// ҽ ÷ǿ Ʈ ÷ ȯմϴ. + public OfComponentEnumerable OfComponent() + where T : Component + { + return new OfComponentEnumerable(ref this); + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + /// parent = null մϴ. + public void Destroy(bool useDestroyImmediate = false, bool detachParent = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, false); + } + if (detachParent) + { + origin.transform.DetachChildren(); + if (withSelf) + { +#if !(UNITY_4_0 || UNITY_4_1 || UNITY_4_2 || UNITY_4_3 || UNITY_4_4 || UNITY_4_5) + origin.transform.SetParent(null); +#else + origin.transform.parent = null; +#endif + } + } + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(Func predicate, bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + var item = e.Current; + if (predicate(item)) + { + item.Destroy(useDestroyImmediate, false); + } + } + } + + public Enumerator GetEnumerator() + { + // GetEnumerator GameObject ıǾ Ȯմϴ. + return (origin == null) + ? new Enumerator(null, withSelf, false) + : new Enumerator(origin.transform, withSelf, true); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + int GetChildrenSize() + { + return origin.transform.childCount + (withSelf ? 1 : 0); + } + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref GameObject[] array) + { + var index = 0; + + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, ref GameObject[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func let, Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + var state = let(item); + + if (!filter(state)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(state); + } + + return index; + } + + public GameObject[] ToArray() + { + var array = new GameObject[GetChildrenSize()]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject[] ToArray(Func filter) + { + var array = new GameObject[GetChildrenSize()]; + var len = ToArrayNonAlloc(filter, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func selector) + { + var array = new T[GetChildrenSize()]; + var len = ToArrayNonAlloc(selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func filter, Func selector) + { + var array = new T[GetChildrenSize()]; + var len = ToArrayNonAlloc(filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func let, Func filter, Func selector) + { + var array = new T[GetChildrenSize()]; + var len = ToArrayNonAlloc(let, filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public GameObject FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + #endregion + + public struct Enumerator : IEnumerator + { + readonly int childCount; // childCount GetEnumerator ȣ ˴ϴ. + + readonly Transform originTransform; + readonly bool canRun; + + bool withSelf; + int currentIndex; + GameObject current; + + internal Enumerator(Transform originTransform, bool withSelf, bool canRun) + { + this.originTransform = originTransform; + this.withSelf = withSelf; + this.childCount = canRun ? originTransform.childCount : 0; + this.currentIndex = -1; + this.canRun = canRun; + this.current = null; + } + + public bool MoveNext() + { + if (!canRun) return false; + + if (withSelf) + { + current = originTransform.gameObject; + withSelf = false; + return true; + } + + currentIndex++; + if (currentIndex < childCount) + { + var child = originTransform.GetChild(currentIndex); + current = child.gameObject; + return true; + } + + return false; + } + + public GameObject Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + + public struct OfComponentEnumerable : IEnumerable + where T : Component + { + ChildrenEnumerable parent; + + public OfComponentEnumerable(ref ChildrenEnumerable parent) + { + this.parent = parent; + } + + public OfComponentEnumerator GetEnumerator() + { + return new OfComponentEnumerator(ref this.parent); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + public T First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public T FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + public T[] ToArray() + { + var array = new T[parent.GetChildrenSize()]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + if (array.Length == index) + { + var newSize = (index == 0) ? parent.GetChildrenSize() : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = e.Current; + } + + return index; + } + + #endregion + } + + public struct OfComponentEnumerator : IEnumerator + where T : Component + { + Enumerator enumerator; // ڴ մϴ. + T current; + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + public OfComponentEnumerator(ref ChildrenEnumerable parent) + { + this.enumerator = parent.GetEnumerator(); + this.current = default(T); + } + + public bool MoveNext() + { + while (enumerator.MoveNext()) + { +#if UNITY_EDITOR + enumerator.Current.GetComponents(componentCache); + if (componentCache.Count != 0) + { + current = componentCache[0]; + componentCache.Clear(); + return true; + } +#else + + var component = enumerator.Current.GetComponent(); + if (component != null) + { + current = component; + return true; + } +#endif + } + + return false; + } + + public T Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + } + + public struct AncestorsEnumerable : IEnumerable + { + readonly GameObject origin; + readonly bool withSelf; + + public AncestorsEnumerable(GameObject origin, bool withSelf) + { + this.origin = origin; + this.withSelf = withSelf; + } + + /// ҽ ÷ǿ Ʈ ÷ ȯմϴ. + public OfComponentEnumerable OfComponent() + where T : Component + { + return new OfComponentEnumerable(ref this); + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, false); + } + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(Func predicate, bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + var item = e.Current; + if (predicate(item)) + { + item.Destroy(useDestroyImmediate, false); + } + } + } + + public Enumerator GetEnumerator() + { + // GetEnumerator GameObject ıǾ Ȯմϴ. + return (origin == null) + ? new Enumerator(null, null, withSelf, false) + : new Enumerator(origin, origin.transform, withSelf, true); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref GameObject[] array) + { + var index = 0; + + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, ref GameObject[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func let, Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + var state = let(item); + + if (!filter(state)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(state); + } + + return index; + } + + public GameObject[] ToArray() + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject[] ToArray(Func filter) + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(filter, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func let, Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(let, filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public GameObject FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + #endregion + + public struct Enumerator : IEnumerator + { + readonly bool canRun; + + GameObject current; + Transform currentTransform; + bool withSelf; + + internal Enumerator(GameObject origin, Transform originTransform, bool withSelf, bool canRun) + { + this.current = origin; + this.currentTransform = originTransform; + this.withSelf = withSelf; + this.canRun = canRun; + } + + public bool MoveNext() + { + if (!canRun) return false; + + if (withSelf) + { + // withSelf, origin originTransform + withSelf = false; + return true; + } + + var parentTransform = currentTransform.parent; + if (parentTransform != null) + { + current = parentTransform.gameObject; + currentTransform = parentTransform; + return true; + } + + return false; + } + + public GameObject Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + + public struct OfComponentEnumerable : IEnumerable + where T : Component + { + AncestorsEnumerable parent; + + public OfComponentEnumerable(ref AncestorsEnumerable parent) + { + this.parent = parent; + } + + public OfComponentEnumerator GetEnumerator() + { + return new OfComponentEnumerator(ref parent); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + public T First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public T FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + public T[] ToArray() + { + var array = new T[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = e.Current; + } + + return index; + } + + #endregion + } + + public struct OfComponentEnumerator : IEnumerator + where T : Component + { + Enumerator enumerator; // ڴ մϴ. + T current; + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + public OfComponentEnumerator(ref AncestorsEnumerable parent) + { + this.enumerator = parent.GetEnumerator(); + this.current = default(T); + } + + public bool MoveNext() + { + while (enumerator.MoveNext()) + { +#if UNITY_EDITOR + enumerator.Current.GetComponents(componentCache); + if (componentCache.Count != 0) + { + current = componentCache[0]; + componentCache.Clear(); + return true; + } +#else + + var component = enumerator.Current.GetComponent(); + if (component != null) + { + current = component; + return true; + } +#endif + } + + return false; + } + + public T Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + } + + public struct DescendantsEnumerable : IEnumerable + { + static readonly Func alwaysTrue = _ => true; + + readonly GameObject origin; + readonly bool withSelf; + readonly Func descendIntoChildren; + + public DescendantsEnumerable(GameObject origin, bool withSelf, Func descendIntoChildren) + { + this.origin = origin; + this.withSelf = withSelf; + this.descendIntoChildren = descendIntoChildren ?? alwaysTrue; + } + + /// ҽ ÷ǿ Ʈ ÷ ȯմϴ. + public OfComponentEnumerable OfComponent() + where T : Component + { + return new OfComponentEnumerable(ref this); + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, false); + } + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(Func predicate, bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + var item = e.Current; + if (predicate(item)) + { + item.Destroy(useDestroyImmediate, false); + } + } + } + + public Enumerator GetEnumerator() + { + // GetEnumerator GameObject ıǾ Ȯմϴ. + if (origin == null) + { + return new Enumerator(null, withSelf, false, null, descendIntoChildren); + } + + InternalUnsafeRefStack refStack; + if (InternalUnsafeRefStack.RefStackPool.Count != 0) + { + refStack = InternalUnsafeRefStack.RefStackPool.Dequeue(); + refStack.Reset(); + } + else + { + refStack = new InternalUnsafeRefStack(6); + } + + return new Enumerator(origin.transform, withSelf, true, refStack, descendIntoChildren); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + void ResizeArray(ref int index, ref T[] array) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + } + + void DescendantsCore(ref Transform transform, ref Action action) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + action(child.gameObject); + DescendantsCore(ref child, ref action); + } + } + + void DescendantsCore(ref Transform transform, ref int index, ref GameObject[] array) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + ResizeArray(ref index, ref array); + array[index++] = child.gameObject; + DescendantsCore(ref child, ref index, ref array); + } + } + + void DescendantsCore(ref Func filter, ref Transform transform, ref int index, ref GameObject[] array) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + var childGameObject = child.gameObject; + if (filter(childGameObject)) + { + ResizeArray(ref index, ref array); + array[index++] = childGameObject; + } + DescendantsCore(ref filter, ref child, ref index, ref array); + } + } + + void DescendantsCore(ref Func selector, ref Transform transform, ref int index, ref T[] array) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + ResizeArray(ref index, ref array); + array[index++] = selector(child.gameObject); + DescendantsCore(ref selector, ref child, ref index, ref array); + } + } + + void DescendantsCore(ref Func filter, ref Func selector, ref Transform transform, ref int index, ref T[] array) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + var childGameObject = child.gameObject; + if (filter(childGameObject)) + { + ResizeArray(ref index, ref array); + array[index++] = selector(childGameObject); + } + DescendantsCore(ref filter, ref selector, ref child, ref index, ref array); + } + } + + void DescendantsCore(ref Func let, ref Func filter, ref Func selector, ref Transform transform, ref int index, ref T[] array) + { + if (!descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + var state = let(child.gameObject); + if (filter(state)) + { + ResizeArray(ref index, ref array); + array[index++] = selector(state); + } + DescendantsCore(ref let, ref filter, ref selector, ref child, ref index, ref array); + } + } + + /// ȭ ݺ⸦ մϴ. + /// + public void ForEach(Action action) + { + if (withSelf) + { + action(origin); + } + var originTransform = origin.transform; + DescendantsCore(ref originTransform, ref action); + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref GameObject[] array) + { + var index = 0; + if (withSelf) + { + ResizeArray(ref index, ref array); + array[index++] = origin; + } + + var originTransform = origin.transform; + DescendantsCore(ref originTransform, ref index, ref array); + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, ref GameObject[] array) + { + var index = 0; + if (withSelf && filter(origin)) + { + ResizeArray(ref index, ref array); + array[index++] = origin; + } + var originTransform = origin.transform; + DescendantsCore(ref filter, ref originTransform, ref index, ref array); + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func selector, ref T[] array) + { + var index = 0; + if (withSelf) + { + ResizeArray(ref index, ref array); + array[index++] = selector(origin); + } + var originTransform = origin.transform; + DescendantsCore(ref selector, ref originTransform, ref index, ref array); + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, Func selector, ref T[] array) + { + var index = 0; + if (withSelf && filter(origin)) + { + ResizeArray(ref index, ref array); + array[index++] = selector(origin); + } + var originTransform = origin.transform; + DescendantsCore(ref filter, ref selector, ref originTransform, ref index, ref array); + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func let, Func filter, Func selector, ref T[] array) + { + var index = 0; + if (withSelf) + { + var state = let(origin); + if (filter(state)) + { + ResizeArray(ref index, ref array); + array[index++] = selector(state); + } + } + + var originTransform = origin.transform; + DescendantsCore(ref let, ref filter, ref selector, ref originTransform, ref index, ref array); + + return index; + } + + public GameObject[] ToArray() + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject[] ToArray(Func filter) + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(filter, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func let, Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(let, filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject First() + { + var e = this.GetEnumerator(); + try + { + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + finally + { + e.Dispose(); + } + } + + public GameObject FirstOrDefault() + { + var e = this.GetEnumerator(); + try + { + return (e.MoveNext()) + ? e.Current + : null; + } + finally + { + e.Dispose(); + } + } + + #endregion + + internal class InternalUnsafeRefStack + { + public static Queue RefStackPool = new Queue(); + + public int size = 0; + public Enumerator[] array; // Pop = this.array[--size]; + + public InternalUnsafeRefStack(int initialStackDepth) + { + array = new GameObjectExtensions.DescendantsEnumerable.Enumerator[initialStackDepth]; + } + + public void Push(ref Enumerator e) + { + if (size == array.Length) + { + Array.Resize(ref array, array.Length * 2); + } + array[size++] = e; + } + + public void Reset() + { + size = 0; + } + } + + public struct Enumerator : IEnumerator + { + readonly int childCount; // childCount GetEnumerator ȣ ˴ϴ. + + readonly Transform originTransform; + bool canRun; + + bool withSelf; + int currentIndex; + GameObject current; + InternalUnsafeRefStack sharedStack; + Func descendIntoChildren; + + internal Enumerator(Transform originTransform, bool withSelf, bool canRun, InternalUnsafeRefStack sharedStack, Func descendIntoChildren) + { + this.originTransform = originTransform; + this.withSelf = withSelf; + this.childCount = canRun ? originTransform.childCount : 0; + this.currentIndex = -1; + this.canRun = canRun; + this.current = null; + this.sharedStack = sharedStack; + this.descendIntoChildren = descendIntoChildren; + } + + public bool MoveNext() + { + if (!canRun) return false; + + while (sharedStack.size != 0) + { + if (sharedStack.array[sharedStack.size - 1].MoveNextCore(true, out current)) + { + return true; + } + } + + if (!withSelf && !descendIntoChildren(originTransform)) + { + // + canRun = false; + InternalUnsafeRefStack.RefStackPool.Enqueue(sharedStack); + return false; + } + + if (MoveNextCore(false, out current)) + { + return true; + } + else + { + // + canRun = false; + InternalUnsafeRefStack.RefStackPool.Enqueue(sharedStack); + return false; + } + } + + bool MoveNextCore(bool peek, out GameObject current) + { + if (withSelf) + { + current = originTransform.gameObject; + withSelf = false; + return true; + } + + ++currentIndex; + if (currentIndex < childCount) + { + var item = originTransform.GetChild(currentIndex); + if (descendIntoChildren(item)) + { + var childEnumerator = new Enumerator(item, true, true, sharedStack, descendIntoChildren); + sharedStack.Push(ref childEnumerator); + return sharedStack.array[sharedStack.size - 1].MoveNextCore(true, out current); + } + else + { + current = item.gameObject; + return true; + } + } + + if (peek) + { + sharedStack.size--; // Pop + } + + current = null; + return false; + } + + public GameObject Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + + public void Dispose() + { + if (canRun) + { + canRun = false; + InternalUnsafeRefStack.RefStackPool.Enqueue(sharedStack); + } + } + + public void Reset() { throw new NotSupportedException(); } + } + + public struct OfComponentEnumerable : IEnumerable + where T : Component + { + DescendantsEnumerable parent; + + public OfComponentEnumerable(ref DescendantsEnumerable parent) + { + this.parent = parent; + } + + public OfComponentEnumerator GetEnumerator() + { + return new OfComponentEnumerator(ref parent); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public T First() + { + var e = this.GetEnumerator(); + try + { + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + finally + { + e.Dispose(); + } + } + + public T FirstOrDefault() + { + var e = this.GetEnumerator(); + try + { + return (e.MoveNext()) + ? e.Current + : null; + } + finally + { + e.Dispose(); + } + } + + /// ȭ ݺ⸦ մϴ. + public void ForEach(Action action) + { + if (parent.withSelf) + { + T component = default(T); +#if UNITY_EDITOR + parent.origin.GetComponents(componentCache); + if (componentCache.Count != 0) + { + component = componentCache[0]; + componentCache.Clear(); + } +#else + component = parent.origin.GetComponent(); +#endif + + if (component != null) + { + action(component); + } + } + + var originTransform = parent.origin.transform; + OfComponentDescendantsCore(ref originTransform, ref action); + } + + + public T[] ToArray() + { + var array = new T[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + void OfComponentDescendantsCore(ref Transform transform, ref Action action) + { + if (!parent.descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + + T component = default(T); +#if UNITY_EDITOR + child.GetComponents(componentCache); + if (componentCache.Count != 0) + { + component = componentCache[0]; + componentCache.Clear(); + } +#else + component = child.GetComponent(); +#endif + + if (component != null) + { + action(component); + } + OfComponentDescendantsCore(ref child, ref action); + } + } + + void OfComponentDescendantsCore(ref Transform transform, ref int index, ref T[] array) + { + if (!parent.descendIntoChildren(transform)) return; + + var childCount = transform.childCount; + for (int i = 0; i < childCount; i++) + { + var child = transform.GetChild(i); + T component = default(T); +#if UNITY_EDITOR + child.GetComponents(componentCache); + if (componentCache.Count != 0) + { + component = componentCache[0]; + componentCache.Clear(); + } +#else + component = child.GetComponent(); +#endif + + if (component != null) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + + array[index++] = component; + } + OfComponentDescendantsCore(ref child, ref index, ref array); + } + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref T[] array) + { + var index = 0; + if (parent.withSelf) + { + T component = default(T); +#if UNITY_EDITOR + parent.origin.GetComponents(componentCache); + if (componentCache.Count != 0) + { + component = componentCache[0]; + componentCache.Clear(); + } +#else + component = parent.origin.GetComponent(); +#endif + + if (component != null) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + + array[index++] = component; + } + } + + var originTransform = parent.origin.transform; + OfComponentDescendantsCore(ref originTransform, ref index, ref array); + + return index; + } + + #endregion + } + + public struct OfComponentEnumerator : IEnumerator + where T : Component + { + Enumerator enumerator; // ڴ մϴ. + T current; + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + public OfComponentEnumerator(ref DescendantsEnumerable parent) + { + this.enumerator = parent.GetEnumerator(); + this.current = default(T); + } + + public bool MoveNext() + { + while (enumerator.MoveNext()) + { +#if UNITY_EDITOR + enumerator.Current.GetComponents(componentCache); + if (componentCache.Count != 0) + { + current = componentCache[0]; + componentCache.Clear(); + return true; + } +#else + + var component = enumerator.Current.GetComponent(); + if (component != null) + { + current = component; + return true; + } +#endif + } + + return false; + } + + public T Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + + public void Dispose() + { + enumerator.Dispose(); + } + + public void Reset() { throw new NotSupportedException(); } + } + } + + public struct BeforeSelfEnumerable : IEnumerable + { + readonly GameObject origin; + readonly bool withSelf; + + public BeforeSelfEnumerable(GameObject origin, bool withSelf) + { + this.origin = origin; + this.withSelf = withSelf; + } + + /// ҽ ÷ǿ Ʈ ÷ ȯմϴ. + public OfComponentEnumerable OfComponent() + where T : Component + { + return new OfComponentEnumerable(ref this); + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, false); + } + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(Func predicate, bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + var item = e.Current; + if (predicate(item)) + { + item.Destroy(useDestroyImmediate, false); + } + } + } + + public Enumerator GetEnumerator() + { + // GetEnumerator GameObject ıǾ Ȯմϴ. + return (origin == null) + ? new Enumerator(null, withSelf, false) + : new Enumerator(origin.transform, withSelf, true); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref GameObject[] array) + { + var index = 0; + + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, ref GameObject[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func let, Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + var state = let(item); + + if (!filter(state)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(state); + } + + return index; + } + + public GameObject[] ToArray() + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject[] ToArray(Func filter) + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(filter, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func let, Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(let, filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public GameObject FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + #endregion + + public struct Enumerator : IEnumerator + { + readonly int childCount; // childCount GetEnumerator ȣ ˴ϴ. + readonly Transform originTransform; + bool canRun; + + bool withSelf; + int currentIndex; + GameObject current; + Transform parent; + + internal Enumerator(Transform originTransform, bool withSelf, bool canRun) + { + this.originTransform = originTransform; + this.withSelf = withSelf; + this.currentIndex = -1; + this.canRun = canRun; + this.current = null; + this.parent = originTransform.parent; + this.childCount = (parent != null) ? parent.childCount : 0; + } + + public bool MoveNext() + { + if (!canRun) return false; + + if (parent == null) goto RETURN_SELF; + + currentIndex++; + if (currentIndex < childCount) + { + var item = parent.GetChild(currentIndex); + + if (item == originTransform) + { + goto RETURN_SELF; + } + + current = item.gameObject; + return true; + } + + RETURN_SELF: + if (withSelf) + { + current = originTransform.gameObject; + withSelf = false; + canRun = false; // ڽſ Ƿ Ϸ. + return true; + } + + return false; + } + + public GameObject Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + + public struct OfComponentEnumerable : IEnumerable + where T : Component + { + BeforeSelfEnumerable parent; + + public OfComponentEnumerable(ref BeforeSelfEnumerable parent) + { + this.parent = parent; + } + + public OfComponentEnumerator GetEnumerator() + { + return new OfComponentEnumerator(ref parent); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + public T First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public T FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + public T[] ToArray() + { + var array = new T[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = e.Current; + } + + return index; + } + + #endregion + } + + public struct OfComponentEnumerator : IEnumerator + where T : Component + { + Enumerator enumerator; // ڴ մϴ. + T current; + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + public OfComponentEnumerator(ref BeforeSelfEnumerable parent) + { + this.enumerator = parent.GetEnumerator(); + this.current = default(T); + } + + public bool MoveNext() + { + while (enumerator.MoveNext()) + { +#if UNITY_EDITOR + enumerator.Current.GetComponents(componentCache); + if (componentCache.Count != 0) + { + current = componentCache[0]; + componentCache.Clear(); + return true; + } +#else + + var component = enumerator.Current.GetComponent(); + if (component != null) + { + current = component; + return true; + } +#endif + } + + return false; + } + + public T Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + } + + public struct AfterSelfEnumerable : IEnumerable + { + readonly GameObject origin; + readonly bool withSelf; + + public AfterSelfEnumerable(GameObject origin, bool withSelf) + { + this.origin = origin; + this.withSelf = withSelf; + } + + /// ҽ ÷ǿ Ʈ ÷ ȯմϴ. + public OfComponentEnumerable OfComponent() + where T : Component + { + return new OfComponentEnumerable(ref this); + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + e.Current.Destroy(useDestroyImmediate, false); + } + } + + /// ҽ ÷ GameObject ϰ(null Ȯ) ıմϴ. + /// truḛų !Application.isPlaying ؾ մϴ. + public void Destroy(Func predicate, bool useDestroyImmediate = false) + { + var e = GetEnumerator(); + while (e.MoveNext()) + { + var item = e.Current; + if (predicate(item)) + { + item.Destroy(useDestroyImmediate, false); + } + } + } + + public Enumerator GetEnumerator() + { + // GetEnumerator GameObject ıǾ Ȯմϴ. + return (origin == null) + ? new Enumerator(null, withSelf, false) + : new Enumerator(origin.transform, withSelf, true); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref GameObject[] array) + { + var index = 0; + + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, ref GameObject[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = item; + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + if (!filter(item)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(item); + } + + return index; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(Func let, Func filter, Func selector, ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); // Dispose ȣ ʿ䰡 ϴ. + while (e.MoveNext()) + { + var item = e.Current; + var state = let(item); + + if (!filter(state)) continue; + + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = selector(state); + } + + return index; + } + + public GameObject[] ToArray() + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject[] ToArray(Func filter) + { + var array = new GameObject[4]; + var len = ToArrayNonAlloc(filter, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public T[] ToArray(Func let, Func filter, Func selector) + { + var array = new T[4]; + var len = ToArrayNonAlloc(let, filter, selector, ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + public GameObject First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public GameObject FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + #endregion + + public struct Enumerator : IEnumerator + { + readonly int childCount; // childCount GetEnumerator ȣ ˴ϴ. + readonly Transform originTransform; + readonly bool canRun; + + bool withSelf; + int currentIndex; + GameObject current; + Transform parent; + + internal Enumerator(Transform originTransform, bool withSelf, bool canRun) + { + this.originTransform = originTransform; + this.withSelf = withSelf; + this.currentIndex = (originTransform != null) ? originTransform.GetSiblingIndex() + 1 : 0; + this.canRun = canRun; + this.current = null; + this.parent = originTransform.parent; + this.childCount = (parent != null) ? parent.childCount : 0; + } + + public bool MoveNext() + { + if (!canRun) return false; + + if (withSelf) + { + current = originTransform.gameObject; + withSelf = false; + return true; + } + + if (currentIndex < childCount) + { + current = parent.GetChild(currentIndex).gameObject; + currentIndex++; + return true; + } + + return false; + } + + public GameObject Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + + public struct OfComponentEnumerable : IEnumerable + where T : Component + { + AfterSelfEnumerable parent; + + public OfComponentEnumerable(ref AfterSelfEnumerable parent) + { + this.parent = parent; + } + + public OfComponentEnumerator GetEnumerator() + { + return new OfComponentEnumerator(ref this.parent); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + IEnumerator IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + #region LINQ + + public void ForEach(Action action) + { + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + action(e.Current); + } + } + + public T First() + { + var e = this.GetEnumerator(); + if (e.MoveNext()) + { + return e.Current; + } + else + { + throw new InvalidOperationException(" ֽϴ."); + } + } + + public T FirstOrDefault() + { + var e = this.GetEnumerator(); + return (e.MoveNext()) + ? e.Current + : null; + } + + public T[] ToArray() + { + var array = new T[4]; + var len = ToArrayNonAlloc(ref array); + if (array.Length != len) + { + Array.Resize(ref array, len); + } + return array; + } + + /// Ҹ ۿ ϰ ũ⸦ ȯմϴ. 迭 ڵ Ȯ˴ϴ. + public int ToArrayNonAlloc(ref T[] array) + { + var index = 0; + var e = this.GetEnumerator(); + while (e.MoveNext()) + { + if (array.Length == index) + { + var newSize = (index == 0) ? 4 : index * 2; + Array.Resize(ref array, newSize); + } + array[index++] = e.Current; + } + + return index; + } + + #endregion + } + + public struct OfComponentEnumerator : IEnumerator + where T : Component + { + Enumerator enumerator; // ڴ մϴ. + T current; + +#if UNITY_EDITOR + static List componentCache = new List(); // UNITY_EDITOR Ҵ +#endif + + public OfComponentEnumerator(ref AfterSelfEnumerable parent) + { + this.enumerator = parent.GetEnumerator(); + this.current = default(T); + } + + public bool MoveNext() + { + while (enumerator.MoveNext()) + { +#if UNITY_EDITOR + enumerator.Current.GetComponents(componentCache); + if (componentCache.Count != 0) + { + current = componentCache[0]; + componentCache.Clear(); + return true; + } +#else + + var component = enumerator.Current.GetComponent(); + if (component != null) + { + current = component; + return true; + } +#endif + } + + return false; + } + + public T Current { get { return current; } } + object IEnumerator.Current { get { return current; } } + public void Dispose() { } + public void Reset() { throw new NotSupportedException(); } + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs.meta b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs.meta new file mode 100644 index 00000000..61027a54 --- /dev/null +++ b/Assets/Scripts/UVC/Linq/GameObjectExtensions.Traverse.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 820f8c1041b41f14fbd34aa9d9b25fa9 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Log.meta b/Assets/Scripts/UVC/Log.meta new file mode 100644 index 00000000..9cb0a4a9 --- /dev/null +++ b/Assets/Scripts/UVC/Log.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 74aac87fd95d0f4458bbde2267c15895 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Log/SQLiteAppender.cs b/Assets/Scripts/UVC/Log/SQLiteAppender.cs new file mode 100644 index 00000000..c8a25ade --- /dev/null +++ b/Assets/Scripts/UVC/Log/SQLiteAppender.cs @@ -0,0 +1,178 @@ +using log4net.Appender; +using log4net.Core; +using SQLite4Unity3d; +using System; +using System.Threading; +using UVC.Extention; + +namespace UVC.Log +{ + /// + /// SQLite 데이터베이스에 로그를 저장하는 log4net Appender 구현체입니다. + /// 로그 메시지를 SQLite 데이터베이스 테이블에 저장하고 오래된 로그를 자동으로 정리합니다. + /// + /// + /// 이 클래스는 log4net의 AppenderSkeleton을 상속받아 로그 레코드를 SQLite 데이터베이스에 저장합니다. + /// 한 달 이상 지난 로그 레코드는 자동으로 삭제되며, 데이터베이스 락 상황에서의 재시도 메커니즘을 포함하고 있습니다. + /// + /// + /// log4net 구성 파일(App.config 또는 log4net.config)에서 다음과 같이 설정할 수 있습니다: + /// + /// + /// + /// + /// + /// + /// + /// 코드에서 직접 설정하는 방법: + /// + /// var sqliteAppender = new SQLiteAppender(); + /// sqliteAppender.ConnectionString = "data.db"; + /// sqliteAppender.Threshold = log4net.Core.Level.Debug; + /// + /// log4net.Config.BasicConfigurator.Configure(sqliteAppender); + /// + /// + public class SQLiteAppender : AppenderSkeleton + { + /// + /// SQLite 데이터베이스 파일의 경로를 지정하거나 가져옵니다. + /// + /// + /// 절대 경로 또는 상대 경로로 설정할 수 있으며, 상대 경로는 애플리케이션의 실행 디렉터리를 기준으로 합니다. + /// + /// + /// + /// var sqliteAppender = new SQLiteAppender(); + /// // 절대 경로 사용 + /// sqliteAppender.ConnectionString = "C:\\Logs\\application.db"; + /// // 또는 상대 경로 사용 + /// sqliteAppender.ConnectionString = "Logs\\application.db"; + /// + /// + public string ConnectionString { get; set; } + + /// + /// 한 달 이상 된 로그 데이터 삭제 여부를 추적합니다. + /// + private bool doDeleted = false; + + /// + /// SQLite 데이터베이스 연결을 저장합니다. + /// + private SQLiteConnection? db; + + /// + /// 데이터베이스 작업에 대한 동기화 잠금 객체입니다. + /// + private static readonly object _dbLock = new object(); + + /// + /// 로깅 이벤트를 SQLite 데이터베이스에 기록합니다. + /// + /// 기록할 로깅 이벤트 + /// + /// 이 메서드는 log4net 프레임워크에 의해 새로운 로그 메시지가 발생할 때마다 호출됩니다. + /// 빈 메시지는 무시하고, 로그 항목을 데이터베이스에 저장합니다. + /// 데이터베이스 연결이 없는 경우 새로 생성하고, 필요시 오래된 로그를 삭제합니다. + /// + protected override void Append(LoggingEvent loggingEvent) + { + // 빈 메시지 무시 + if (loggingEvent.RenderedMessage.Trim().IsNullOrEmpty()) return; + + // 로그 항목 생성 + var logEntry = new LogEntry + { + Date = loggingEvent.TimeStamp.ToString("yyyy-MM-ddTHH:mm:ss.fffZ"), + Thread = loggingEvent.ThreadName, + Level = loggingEvent.Level.ToString(), + Logger = loggingEvent.LoggerName, + Message = loggingEvent.RenderedMessage, + Exception = loggingEvent.GetExceptionString() + }; + + // 데이터베이스 연결이 없으면 새로 생성 + if (db == null) + { + var dbPath = ConnectionString;// System.IO.Path.Combine(AppDomain.CurrentDomain.BaseDirectory, ConnectionString); + db = new SQLiteConnection(dbPath); + db.CreateTable(); + } + + // 한 달 이상 된 로그 데이터 삭제 (최초 1회만 실행) + if (doDeleted == false) + { + //한달 지난 로그 삭제 + db.Execute("DELETE FROM LogEntry WHERE Date < datetime('now', '-1 month', 'localtime');"); + doDeleted = true; + } + + // 스레드 동기화를 통해 데이터베이스 작업 수행 + lock (_dbLock) + { + // 데이터베이스 락 시 재시도 메커니즘 + int retryCount = 100; + while (retryCount > 0) + { + try + { + db.Insert(logEntry); + break; + } + catch (SQLiteException ex) when (ex.Message.Contains("database is locked")) + { + retryCount--; + if (retryCount == 0) break; // 최대 재시도 횟수 초과 + Thread.Sleep(100); // 재시도 전에 100ms 대기 + } + } + } + } + + /// + /// SQLite 데이터베이스에 저장되는 로그 항목 구조를 정의합니다. + /// + /// + /// 이 클래스는 로그 테이블의 스키마를 정의하며, SQLite4Unity3d의 ORM 기능을 사용합니다. + /// + public class LogEntry + { + /// + /// 로그 항목의 고유 식별자입니다. 자동 증가되는 기본 키로 사용됩니다. + /// + [PrimaryKey, AutoIncrement] + public int Id { get; set; } + + /// + /// 로그가 생성된 날짜와 시간을 ISO 8601 형식으로 저장합니다. + /// + public string Date { get; set; } + + /// + /// 로그를 생성한 스레드의 이름을 저장합니다. + /// + public string Thread { get; set; } + + /// + /// 로그 레벨을 저장합니다 (DEBUG, INFO, WARN, ERROR, FATAL 등). + /// + public string Level { get; set; } + + /// + /// 로그를 생성한 로거의 이름을 저장합니다. + /// + public string Logger { get; set; } + + /// + /// 로그 메시지 내용을 저장합니다. + /// + public string Message { get; set; } + + /// + /// 예외 정보를 저장합니다. 예외가 없는 경우 빈 문자열이 될 수 있습니다. + /// + public string Exception { get; set; } + } + } +} diff --git a/Assets/Scripts/UVC/Log/SQLiteAppender.cs.meta b/Assets/Scripts/UVC/Log/SQLiteAppender.cs.meta new file mode 100644 index 00000000..8fd0e612 --- /dev/null +++ b/Assets/Scripts/UVC/Log/SQLiteAppender.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 3eff6e2833321564099ab586cfa2d49e \ No newline at end of file diff --git a/Assets/Scripts/UVC/Log/ServerLog.cs b/Assets/Scripts/UVC/Log/ServerLog.cs new file mode 100644 index 00000000..c89443b0 --- /dev/null +++ b/Assets/Scripts/UVC/Log/ServerLog.cs @@ -0,0 +1,190 @@ +using SQLite4Unity3d; +using System; +using System.IO; +using UnityEngine; + + +namespace UVC.Log +{ + /// + /// ServerLog는 HTTP 요청과 MQTT 메시지를 기록하는 기능을 제공합니다. + /// + public class ServerLog + { + + private static bool doDeletedHttp = false; + private static bool doDeletedMqtt = false; + + private static SQLiteConnection? db; + + private static readonly object _dbLock = new object(); + + static ServerLog() + { + try + { + CheckDatabaseConnection(); + if (doDeletedHttp == false) + { + //한달 지난 로그 삭제 + db.Execute("DELETE FROM HttpLogEntry WHERE RequestDate < datetime('now', '-1 month', 'localtime');"); + doDeletedHttp = true; + } + if (doDeletedMqtt == false) + { + //한달 지난 로그 삭제 + db.Execute("DELETE FROM MqttLogEntry WHERE Date < datetime('now', '-1 month', 'localtime');"); + doDeletedMqtt = true; + } + } + catch (Exception ex) + { + Debug.LogException(ex); + throw; + } + } + + /// + /// HTTP 요청을 로깅하여 데이터베이스에 로그 항목을 생성하고 저장합니다. + /// + /// 이 메소드는 스레드 안전하며 로그 항목이 동기화된 방식으로 데이터베이스에 저장되도록 보장합니다. + /// 호출자는 유효한 입력 값을 제공할 책임이 있습니다. + /// HTTP 요청의 URL입니다. + /// 요청에 사용된 HTTP 메소드(예: GET, POST)입니다. + /// JSON 형식의 HTTP 요청 헤더입니다. + /// HTTP 요청의 본문을 문자열로 표현한 것입니다. + /// HTTP 요청의 날짜와 시간을 문자열로 표현한 것입니다. + /// 로깅된 HTTP 요청을 나타내는 객체입니다. 반환된 객체는 + /// 요청 URL, 메소드, 헤더, 본문, 날짜와 같은 세부 정보를 포함합니다. + public static HttpLogEntry LogHttpRequest(string url, string method, string headerJson, string bodyString, string date) + { + var logEntry = new HttpLogEntry + { + RequestURL = url, + RequestMethod = method, + RequestHeader = headerJson, + RequestBody = bodyString, + RequestDate = date, + }; + lock (_dbLock) + { + db.Insert(logEntry); + return logEntry; // 반환값으로 ID를 반환 + } + } + + /// + /// HTTP 응답의 세부 정보를 데이터베이스에 기록합니다. + /// + /// 이 메소드는 스레드 안전하며 로깅 작업이 동기화되도록 보장합니다. + /// 기록할 응답의 세부 정보가 포함된 HTTP 로그 항목입니다. 이 매개변수는 일 수 없습니다. + public static void LogHttpResponse(HttpLogEntry httpLogEntry) + { + lock (_dbLock) + { + db.Update(httpLogEntry); + } + } + + /// + /// MQTT 메시지를 데이터베이스에 기록하고 생성된 로그 항목을 반환합니다. + /// + /// 이 메서드는 MQTT 메시지에 대한 새로운 로그 항목을 생성하여 데이터베이스에 저장합니다. 이 메서드는 스레드 안전하며 데이터베이스 작업이 동기화되도록 보장합니다. + /// MQTT 브로커의 URL입니다. + /// MQTT 브로커에 연결하는 데 사용된 포트입니다. + /// MQTT 메시지의 토픽입니다. + /// MQTT 메시지의 페이로드입니다. + /// 메시지가 수신된 날짜와 시간(문자열 형식)입니다. + /// 처리 중 오류가 발생한 경우의 예외 메시지(옵션). 일 수 있습니다. + /// 기록된 MQTT 메시지를 나타내는 객체입니다. + public static MqttLogEntry LogMqtt(string url, string port, string topic, string payload, string date, string exception = null) + { + var logEntry = new MqttLogEntry + { + URL = url, + Port = port, + Topic = topic, + Payload = payload, + Date = date, + Exception = exception + }; + lock (_dbLock) + { + db.Insert(logEntry); + return logEntry; + } + } + + + protected static void CheckDatabaseConnection() + { + if (db == null) + { + string dbPath = string.Empty; + if (Application.platform == RuntimePlatform.WindowsPlayer) + { + + string unityLogsPath = Path.Combine(AppDomain.CurrentDomain.BaseDirectory, @"unityLogs"); + if (!Directory.Exists(unityLogsPath)) Directory.CreateDirectory(unityLogsPath); + dbPath = Path.Combine(unityLogsPath, @"unityLogs\serverLog.db"); + } + else + { + DirectoryInfo di = new DirectoryInfo(Application.dataPath).Parent; + //di 하위에 Logs 디렉토리가 없으면 생성 + DirectoryInfo di2 = new DirectoryInfo(Path.Combine(di.FullName, @"Logs")); + if (!di2.Exists) di.CreateSubdirectory("Logs"); + string unityLogsPath = Path.Combine(di2.FullName, @"unityLogs"); + if (!Directory.Exists(unityLogsPath)) Directory.CreateDirectory(unityLogsPath); + dbPath = Path.Combine(unityLogsPath, @"serverLog.db"); + } + + db = new SQLiteConnection(dbPath); + db.CreateTable(); + db.CreateTable(); + } + } + } + + + /// + /// HTTP 요청 및 관련 응답을 위한 로그 항목을 나타냅니다. + /// + /// + /// 이 클래스는 HTTP 요청의 URL, 메소드, 헤더, 본문과 응답 데이터를 (가능한 경우) 포함한 세부 정보를 저장하는 데 사용됩니다. + /// 또한 요청 또는 응답 처리 중 발생한 예외 사항도 기록합니다. + /// + public class HttpLogEntry + { + [PrimaryKey, AutoIncrement] + public int Id { get; set; } + public string RequestURL { get; set; } + public string RequestMethod { get; set; } + public string RequestHeader { get; set; } + public string RequestBody { get; set; } + public string RequestDate { get; set; } + public string? ResponseData { get; set; } + public string? ResponseDate { get; set; } + public string? Exception { get; set; } + } + + + /// + /// MQTT 메시지에 대한 로그 항목을 나타냅니다. 연결, 토픽, 페이로드 및 모든 관련 예외에 대한 세부 정보를 포함합니다. + /// + /// 이 클래스는 일반적으로 로깅 또는 디버깅 목적으로 MQTT 메시지에 대한 정보를 저장하고 검색하는 데 사용됩니다. + /// 각 로그 항목에는 URL, 포트, 토픽, 페이로드 및 메시지가 기록된 날짜와 같은 세부 정보가 포함됩니다. + /// MQTT 작업 중 예외가 발생한 경우 속성에도 기록될 수 있습니다. + public class MqttLogEntry + { + [PrimaryKey, AutoIncrement] + public int Id { get; set; } + public string URL { get; set; } + public string Port { get; set; } + public string Topic { get; set; } + public string Payload { get; set; } + public string Date { get; set; } + public string? Exception { get; set; } + } +} diff --git a/Assets/Scripts/UVC/Log/ServerLog.cs.meta b/Assets/Scripts/UVC/Log/ServerLog.cs.meta new file mode 100644 index 00000000..58c7efd7 --- /dev/null +++ b/Assets/Scripts/UVC/Log/ServerLog.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 746e8d042d13de6499e6dd0af345a94f \ No newline at end of file diff --git a/Assets/Scripts/UVC/Network.meta b/Assets/Scripts/UVC/Network.meta new file mode 100644 index 00000000..a9bb4544 --- /dev/null +++ b/Assets/Scripts/UVC/Network.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f505a8f3e2e273a4391c754c4aa57396 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Network/HttpRequester.cs b/Assets/Scripts/UVC/Network/HttpRequester.cs new file mode 100644 index 00000000..a8a9eb82 --- /dev/null +++ b/Assets/Scripts/UVC/Network/HttpRequester.cs @@ -0,0 +1,522 @@ +using Best.HTTP; +using Best.HTTP.Response; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Cysharp.Threading.Tasks; +using Newtonsoft.Json; +using Newtonsoft.Json.Linq; +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; +using UnityEngine; +using UVC.Json; +using UVC.Log; + +namespace UVC.Network +{ + /// + /// HTTP û óϱ ƿƼ Ŭ + /// + /// + /// Ŭ REST API ȣ ޼ҵ մϴ. + /// GET, POST û ٿε带 ϸ û/ α ɵ մϴ. + /// û 񵿱(UniTask) ó˴ϴ. + /// + public static class HttpRequester + { + /// + /// ⺻ ּԴϴ. + /// + public static string Domain {get; set; } = ""; // Replace with your actual API domain + + /// + /// Dictionary JSON body ȯϿ POST û մϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û Dictionary (null ) + /// ߰ (null ) + /// ū + /// Ÿ ȯ + /// + /// + /// // α û + /// public async UniTask LoginAsync(string username, string password) + /// { + /// var body = new Dictionary + /// { + /// { "username", username }, + /// { "password", password } + /// }; + /// + /// return await HttpRequester.RequestPost("/api/login", body); + /// } + /// + /// // LoginResponse Ŭ + /// [Serializable] + /// public class LoginResponse + /// { + /// public string token; + /// public UserInfo userInfo; + /// } + /// + /// + public static async UniTask RequestPost(string url, Dictionary body = null, Dictionary header = null, bool useAuth = false) + { + return await Request(url, body, HTTPMethods.Post, header, useAuth); + } + + /// + /// ڿ JSON body Ͽ POST û մϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û JSON ڿ + /// ߰ (null ) + /// ū + /// Ÿ ȯ + /// + /// + /// // JSON ڿ ûϴ + /// public async UniTask UpdateProductAsync(int productId, string productName) + /// { + /// string jsonBody = $"{{\"id\": {productId}, \"name\": \"{productName}\"}}"; + /// + /// return await HttpRequester.RequestPost("/api/products/update", jsonBody); + /// } + /// + /// + public static async UniTask RequestPost(string url, string body, Dictionary header = null, bool useAuth = false) + { + return await Request(url, body, HTTPMethods.Post, header, useAuth); + } + + /// + /// GET API ȣմϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û Ķ (URL Ʈ ȯ) + /// ߰ (null ) + /// ū + /// Ÿ ȯ + /// + /// + /// // ǰ + /// public async UniTask> GetProductsAsync(int page = 1, int pageSize = 20) + /// { + /// var queryParams = new Dictionary + /// { + /// { "page", page }, + /// { "pageSize", pageSize } + /// }; + /// + /// return await HttpRequester.RequestGet>("/api/products", queryParams); + /// } + /// + /// // Product Ŭ + /// [Serializable] + /// public class Product + /// { + /// public int id; + /// public string name; + /// public float price; + /// } + /// + /// + public static async UniTask RequestGet(string url, Dictionary body = null, Dictionary header = null, bool useAuth = false) + { + return await Request(url, body, HTTPMethods.Get, header, useAuth); + } + + /// + /// HTTP û óϴ ޼ҵ + /// + private static async UniTask Request(string url, object body = null, HTTPMethods method = HTTPMethods.Post, Dictionary header = null, bool useAuth = false) + { + string bodyString = ""; + if (body != null) + { + if (body is string) + { + bodyString = body.ToString(); + } + else if (body is Dictionary) + { + bodyString = JsonHelper.ToJson(body); + } + } + if (!url.Contains("http")) url = $"{Domain}{url}"; + + var request = SelectHTTPRequest(method, url); + + request.DownloadSettings = new Best.HTTP.Request.Settings.DownloadSettings() { ContentStreamMaxBuffered = 1024 * 1024 * 200 }; + request.MethodType = method; + request.SetHeader("Content-Type", "application/json; charset=utf-8"); + //if (useAuth) request.SetHeader("access-token", AuthService.Instance.Entiti.accessToken); + JObject headerObject = new JObject(); + headerObject.Add("Content-Type", "application/json; charset=utf-8"); + + if (header != null) + { + foreach (var kvp in header) + { + request.SetHeader(kvp.Key, kvp.Value); + headerObject.Add(kvp.Key, kvp.Value); + } + } + HttpLogEntry log = ServerLog.LogHttpRequest(url, method.ToString(), headerObject.ToString(Formatting.None), bodyString, DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.fffZ")); + //Debug.Log($"Request APIToken :{AuthService.Instance.Entiti.accessToken}"); + if (body != null) + { + if (body is string) + { + request.UploadSettings.UploadStream = + new MemoryStream(Encoding.UTF8.GetBytes(body as string)); + } + else if (body is Dictionary) + { + request.UploadSettings.UploadStream = + new MemoryStream(Encoding.UTF8.GetBytes(JsonHelper.ToJson(body))); + } + } + //var response = await request.GetFromJsonResultAsync(); + var response = await request.GetAsStringAsync(); + log.ResponseData = response; + log.ResponseDate = DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.fffZ"); + ServerLog.LogHttpResponse(log); + //T string̸ + if (typeof(T) == typeof(string)) + { + return (T)(object)response; + } + else + { + return JsonHelper.FromJson(response); + } + } + + /// + /// Dictionary JSON body ȯϿ POST û ϰ ó ð Բ ȯմϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û Dictionary (null ) + /// ߰ (null ) + /// ū + /// Ÿ ȯ Ϳ û ó ð + /// + /// + /// // ð ϴ + /// public async UniTask<(UserData, TimeSpan)> GetUserDataWithPerformanceCheck(int userId) + /// { + /// var body = new Dictionary + /// { + /// { "userId", userId } + /// }; + /// + /// var (userData, duration) = await HttpRequester.RequestPostWithDuration("/api/users/details", body); + /// + /// Debug.Log($"API ð: {duration.TotalMilliseconds}ms"); + /// return (userData, duration); + /// } + /// + /// + public static async UniTask<(T, TimeSpan)> RequestPostWithDuration(string url, Dictionary body = null, Dictionary header = null, bool useAuth = true) + { + return await RequestWithDuration(url, body, HTTPMethods.Post, header, useAuth); + } + + /// + /// ڿ JSON body Ͽ POST û ϰ ó ð Բ ȯմϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û JSON ڿ + /// ߰ (null ) + /// ū + /// Ÿ ȯ Ϳ û ó ð + /// + /// + /// // Ŀ JSON ûϰ ð ϴ + /// public async UniTask<(APIResponse, TimeSpan)> SendComplexDataWithTiming(string jsonData) + /// { + /// // jsonData ̹ ȭ JSON ڿ + /// + /// var (response, duration) = await HttpRequester.RequestPostWithDuration("/api/complex-operation", jsonData); + /// + /// if (duration.TotalSeconds > 1.0) + /// { + /// Debug.LogWarning($"API ϴ: {duration.TotalSeconds}"); + /// } + /// + /// return (response, duration); + /// } + /// + /// + public static async UniTask<(T, TimeSpan)> RequestPostWithDuration(string url, string body, Dictionary header = null, bool useAuth = true) + { + return await RequestWithDuration(url, body, HTTPMethods.Post, header, useAuth); + } + + /// + /// GET API ȣϰ ó ð Բ ȯմϴ. + /// + /// ͸ ȯ Ÿ + /// û URL (http Ե Domain ) + /// û Ķ (URL Ʈ ȯ) + /// ߰ (null ) + /// ū + /// Ÿ ȯ Ϳ û ó ð + /// + /// + /// // Ȯ ð + /// public async UniTask<(ServerStatus, TimeSpan)> CheckServerStatus() + /// { + /// var (status, duration) = await HttpRequester.RequestGetWithDuration("/api/server/status"); + /// + /// // ð + /// if (duration.TotalMilliseconds < 100) + /// { + /// Debug.Log(" : ſ "); + /// } + /// else if (duration.TotalMilliseconds < 500) + /// { + /// Debug.Log(" : ȣ"); + /// } + /// else + /// { + /// Debug.Log(" : "); + /// } + /// + /// return (status, duration); + /// } + /// + /// + public static async UniTask<(T, TimeSpan)> RequestGetWithDuration(string url, Dictionary body = null, Dictionary header = null, bool useAuth = true) + { + return await RequestWithDuration(url, body, HTTPMethods.Get, header, useAuth); + } + + /// + /// HTTP û óϰ ó ð ϴ ޼ҵ + /// + private static async UniTask<(T, TimeSpan)> RequestWithDuration(string url, object body = null, HTTPMethods method = HTTPMethods.Post, Dictionary header = null, bool useAuth = true) + { + string bodyString = ""; + if (body != null) + { + if (body is string) + { + bodyString = body.ToString(); + } + else if (body is Dictionary) + { + bodyString = JsonHelper.ToJson(body); + } + } + if (!url.Contains("http")) url = $"{Domain}{url}"; + var request = SelectHTTPRequest(method, url); + request.DownloadSettings = new Best.HTTP.Request.Settings.DownloadSettings() { ContentStreamMaxBuffered = 1024 * 1024 * 200 }; + request.MethodType = method; + request.SetHeader("Content-Type", "application/json; charset=utf-8"); + JObject headerObject = new JObject(); + headerObject.Add("Content-Type", "application/json; charset=utf-8"); + if (header != null) + { + foreach (var kvp in header) + { + request.SetHeader(kvp.Key, kvp.Value); + headerObject.Add(kvp.Key, kvp.Value); + } + } + //Debug.Log($"RequestWithDuration APIToken :{AuthService.Instance.Entiti.accessToken}"); + //if (useAuth) request.SetHeader("access-token", AuthService.Instance.Entiti.accessToken); + if (body != null) + { + if (body is string) + { + request.UploadSettings.UploadStream = + new MemoryStream(Encoding.UTF8.GetBytes(body as string)); + } + else if (body is Dictionary) + { + request.UploadSettings.UploadStream = + new MemoryStream(Encoding.UTF8.GetBytes(JsonHelper.ToJson(body))); + } + } + + HttpLogEntry log = ServerLog.LogHttpRequest(url, method.ToString(), headerObject.ToString(Formatting.None), bodyString, DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.fffZ")); + //var response = await request.GetFromJsonResultAsync(); + var now = DateTime.UtcNow; + var response = await request.GetAsStringAsync(); + var diff = DateTime.UtcNow - now; + log.ResponseData = response; + log.ResponseDate = DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.fffZ"); + ServerLog.LogHttpResponse(log); + if (typeof(T) == typeof(string)) + { + return ((T)(object)response, diff); + } + else + { + return (JsonHelper.FromJson(response), diff); + } + } + + /// + /// ٿεմϴ. + /// + /// ٿε URL + /// + /// ٿε Ϸ ȣ ݹ + /// ٿε Ʈ ݹ (progress: ٿε Ʈ , length: ü ũ) + /// ߻ ȣ ݹ + /// HTTP û ü ( ̹ ϴ null) + /// + /// ο ̹ ϴ ٿε带 ʰ ٷ OnComplete ݹ ȣմϴ. + /// + /// + /// + /// // ̹ ٿε + /// public void DownloadImage(string imageUrl, string fileName) + /// { + /// string savePath = Path.Combine(Application.persistentDataPath, fileName); + /// + /// HttpRequester.Download( + /// imageUrl, + /// savePath, + /// () => { + /// Debug.Log($"̹ ٿεǾϴ: {savePath}"); + /// // ٿε ̹ ڵ... + /// }, + /// (progress, length) => { + /// float percentage = (float)progress / length * 100f; + /// Debug.Log($"ٿε : {percentage:F1}%"); + /// }, + /// (error) => { + /// Debug.LogError($"ٿε : {error}"); + /// } + /// ); + /// } + /// + /// + public static HTTPRequest Download(string url, string savePath, Action OnComplete, Action OnProgress = null, Action OnError = null) + { + Debug.Log($"Download {url}"); + if (File.Exists(savePath)) + { + OnComplete.Invoke(); + return null; + } + + OnRequestFinishedDelegate onRequest = (HTTPRequest req, HTTPResponse resp) => + { + req.DownloadSettings.OnDownloadStarted = null; + req.DownloadSettings.OnDownloadProgress = null; + req.DownloadSettings.DownloadStreamFactory = null; + + switch (req.State) + { + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + { + //System.IO.File.WriteAllBytes(savePath, resp.Data); + OnComplete.Invoke(); + } + else + { + Debug.Log($"Server error({resp.StatusCode} - {resp.Message})! " + new Exception(resp.Message)); + OnError?.Invoke($"Server error({resp.StatusCode} - {resp.Message})!"); + } + break; + default: + Debug.Log(req.State.ToString() + ", " + new Exception(resp.Message)); + OnError?.Invoke(req.State.ToString()); + break; + } + }; + + var request = SelectHTTPRequest(HTTPMethods.Get, url, onRequest); + + request.DownloadSettings.OnDownloadStarted += async (HTTPRequest req, HTTPResponse resp, DownloadContentStream stream) => + { + Debug.Log("Download Started"); + + long len = await UniTask.RunOnThreadPool(() => ConsumeDownloadStream(savePath, stream as BlockingDownloadContentStream)); + if (len == 0) + OnError?.Invoke($"Download Fail!"); + + Debug.Log($"Download finished!"); + }; + request.DownloadSettings.OnDownloadProgress += (HTTPRequest req, long progress, long length) => + { + Debug.Log($"Download Progress! progress:{progress} length:{length}"); + OnProgress?.Invoke(progress, length); + }; + request.DownloadSettings.DownloadStreamFactory = (req, resp, bufferAvailableHandler) + => new BlockingDownloadContentStream(resp, req.DownloadSettings.ContentStreamMaxBuffered, bufferAvailableHandler); + + return request.Send(); + } + + /// + /// ٿε Ʈ óϿ Ϸ մϴ. + /// + private static long ConsumeDownloadStream(string savePath, BlockingDownloadContentStream blockingStream) + { + long len = 0; + using (FileStream fs = new FileStream(savePath, System.IO.FileMode.Create)) + { + try + { + //Debug.Log($"ConsumeDownloadStream blockingStream:{blockingStream == null}"); + while (blockingStream != null && !blockingStream.IsCompleted) + { + if (blockingStream.TryTake(out var buffer)) + { + try + { + //Debug.Log($"ConsumeDownloadStream buffer.Data:{buffer.Data.Length}, Offset:{buffer.Offset}, Count:{buffer.Count}"); + fs.Write(buffer.Data, buffer.Offset, buffer.Count); + } + finally + { + BufferPool.Release(buffer); + } + } + } + } + finally + { + if (blockingStream != null) blockingStream.Dispose(); + + len = fs.Length; + } + } + if (len == 0) File.Delete(savePath); + return len; + + } + + /// + /// HTTP ޼ҵ URL HTTPRequest ü մϴ. + /// + private static HTTPRequest SelectHTTPRequest(HTTPMethods methods, string url, OnRequestFinishedDelegate onRequest = null) + { + switch (methods) + { + case HTTPMethods.Get: + + if (onRequest != null) + return HTTPRequest.CreateGet(url, onRequest); + else + return HTTPRequest.CreateGet(url); + case HTTPMethods.Post: + return HTTPRequest.CreatePost(url); + } + + return null; + } + } +} diff --git a/Assets/Scripts/UVC/Network/HttpRequester.cs.meta b/Assets/Scripts/UVC/Network/HttpRequester.cs.meta new file mode 100644 index 00000000..57d48c0b --- /dev/null +++ b/Assets/Scripts/UVC/Network/HttpRequester.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 6d0b4948de15d4741ac98029df843f34 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Network/MQTTService.cs b/Assets/Scripts/UVC/Network/MQTTService.cs new file mode 100644 index 00000000..1bf6e39d --- /dev/null +++ b/Assets/Scripts/UVC/Network/MQTTService.cs @@ -0,0 +1,367 @@ +using Best.MQTT; +using Best.MQTT.Packets.Builders; +using Cysharp.Threading.Tasks; +using System; +using System.Collections.Concurrent; +using System.Text; +using UnityEngine; +using UVC.Log; + +namespace UVC.network +{ + /// + /// MQTT 클라이언트를 관리하고 메시지 송수신을 처리하는 서비스 클래스입니다. + /// 이 클래스는 MQTT 브로커와의 연결 관리, 토픽 구독, 메시지 발행 등의 기능을 제공합니다. + /// + /// + /// 이 클래스는 스레드 안전한 방식으로 토픽 핸들러를 관리하며, 연결 끊김 시 자동 재연결 기능을 제공합니다. + /// 내부적으로 Best.MQTT 라이브러리를 사용하여 MQTT 프로토콜 통신을 구현합니다. + /// + public class MQTTService + { + private string MQTTDomain = "localhost"; + private int MQTTPort = 1883; + + private MQTTClient client; + + private bool autoReconnect = true; // 자동 재연결 여부 + private int reconnectDelay = 1000; // 재연결 시도 간격 (ms) + + private ConcurrentDictionary> topicHandler; + + /// + /// MQTT 브로커와의 연결 상태를 확인합니다. + /// + /// 클라이언트가 초기화되고 브로커에 연결된 경우 true를 반환합니다. + public bool IsConnected => client != null && client.State == ClientStates.Connected; + + private Action onMessageReceived; + + /// + /// MQTTService 인스턴스를 생성합니다. + /// + /// MQTT 브로커의 호스트명 또는 IP 주소입니다. + /// MQTT 브로커의 포트 번호입니다. + /// 연결이 끊겼을 때 자동으로 재연결을 시도할지 여부입니다. + /// + /// + /// // localhost의 기본 MQTT 포트(1883)에 연결하는 서비스 생성 + /// var mqttService = new MQTTService("localhost", 1883); + /// + /// // 자동 재연결 비활성화 + /// var mqttService = new MQTTService("mqtt.example.com", 8883, false); + /// + /// + public MQTTService(string domain, int port = 1883, bool autoReconnect = true) + { + topicHandler = new ConcurrentDictionary>(); + MQTTDomain = domain; + MQTTPort = port; + this.autoReconnect = autoReconnect; + } + + /// + /// MQTT 클라이언트를 생성하고 이벤트 핸들러를 등록합니다. + /// + /// + /// 이 메서드는 클라이언트가 이미 존재하는 경우 기존 연결을 종료한 후 새로운 클라이언트를 생성합니다. + /// + private void CreateMQTTClient() + { + Debug.Log($"MQTT Domain:{MQTTDomain} , MQTTPORT:{MQTTPort}"); + var options = new ConnectionOptionsBuilder() + .WithTCP(MQTTDomain, MQTTPort) + .Build(); + + if (client != null) Disconnect(); + + client = new MQTTClient(options); + client.OnConnected += OnConnectedMQTT; + client.OnStateChanged += OnStateChangedMQTT; + client.OnDisconnect += OnDisconnectedMQTT; + client.OnError += OnErrorMQTT; + + } + + /// + /// 특정 MQTT 토픽에 대한 메시지 핸들러를 추가합니다. + /// + /// 구독할 MQTT 토픽입니다. + /// 토픽에 메시지가 수신되면 호출될 핸들러입니다. + /// 첫 번째 매개변수는 토픽이고 두 번째 매개변수는 메시지 내용입니다. + /// + /// 하나의 토픽에 여러 핸들러를 등록할 수 있으며, 메시지 수신 시 모든 핸들러가 호출됩니다. + /// + /// + /// + /// // MQTT 서비스 인스턴스 생성 + /// var mqtt = new MQTTService("localhost", 1883); + /// + /// // 핸들러 등록 및 연결 + /// mqtt.AddTopicHandler("sensor/temperature", (topic, message) => { + /// Debug.Log($"온도 데이터 수신: {message}"); + /// }); + /// mqtt.Connect(); + /// + /// + public void AddTopicHandler(string topic, Action handler) + { + topicHandler.AddOrUpdate( + topic, + // 키가 없을 때 새로운 핸들러 추가 + handler, + // 키가 이미 있을 때 기존 핸들러에 추가 + (_, existingHandler) => existingHandler + handler + ); + } + + /// + /// 특정 MQTT 토픽에서 메시지 핸들러를 제거합니다. + /// + /// 핸들러를 제거할 MQTT 토픽입니다. + /// 제거할 메시지 핸들러입니다. + /// + /// 지정된 토픽에 대한 모든 핸들러가 제거되면 해당 토픽에 대한 키도 제거됩니다. + /// + /// + /// + /// // 핸들러 정의 + /// Action<string, string> temperatureHandler = (topic, message) => { + /// Debug.Log($"온도 데이터 수신: {message}"); + /// }; + /// + /// // 핸들러 등록 + /// mqtt.AddTopicHandler("sensor/temperature", temperatureHandler); + /// + /// // 나중에 핸들러 제거 + /// mqtt.RemoveTopicHandler("sensor/temperature", temperatureHandler); + /// + /// + public void RemoveTopicHandler(string topic, Action handler) + { + topicHandler.AddOrUpdate( + topic, + // 키가 없는 경우 - 여기서는 발생하면 안 됨 + _ => null, + // 기존 핸들러에서 제거 + (_, existingHandler) => + { + var updatedHandler = existingHandler - handler; + return updatedHandler; + } + ); + + // 핸들러가 null이면 키 자체를 제거 + if (topicHandler.TryGetValue(topic, out var currentHandler) && currentHandler == null) + { + topicHandler.TryRemove(topic, out _); + } + } + + /// + /// 모든 토픽 핸들러를 제거합니다. + /// + /// + /// 이 메서드는 모든 토픽 구독을 효과적으로 취소합니다. 다음에 연결할 때 + /// 새로운 핸들러를 추가해야 합니다. + /// + /// + /// + /// // 모든 핸들러 제거 + /// mqtt.ClearTopicHandlers(); + /// + /// + public void ClearTopicHandlers() + { + topicHandler.Clear(); + } + + /// + /// MQTT 브로커에 연결합니다. + /// + /// + /// 이 메서드는 새 MQTT 클라이언트를 생성하고 브로커에 연결을 시작합니다. + /// 연결 성공 시 OnConnectedMQTT 이벤트 핸들러가 호출되며, 이때 등록된 모든 토픽을 구독합니다. + /// + /// + /// + /// // MQTT 서비스 인스턴스 생성 + /// var mqtt = new MQTTService("test.mosquitto.org", 1883); + /// + /// // 토픽 핸들러 추가 후 연결 + /// mqtt.AddTopicHandler("test/topic", (topic, message) => { + /// Debug.Log($"메시지 수신: {message}"); + /// }); + /// mqtt.Connect(); + /// + /// + public void Connect() + { + CreateMQTTClient(); + client.BeginConnect(ConnectPacketBuilderCallback); + } + + /// + /// MQTT 브로커와의 연결을 종료합니다. + /// + /// + /// 이 메서드는 모든 이벤트 핸들러를 제거하고 연결된 경우 MQTT 브로커로 정상 연결 종료 패킷을 전송합니다. + /// + /// + /// + /// // 사용이 끝난 후 연결 종료 + /// mqtt.Disconnect(); + /// + /// + public void Disconnect() + { + if (client != null) + { + // 이벤트 핸들러 제거 + client.OnConnected -= OnConnectedMQTT; + client.OnStateChanged -= OnStateChangedMQTT; + client.OnDisconnect -= OnDisconnectedMQTT; + client.OnError -= OnErrorMQTT; + if (IsConnected) + { + client.CreateDisconnectPacketBuilder() + .WithReasonCode(DisconnectReasonCodes.NormalDisconnection) + .WithReasonString("Bye") + .BeginDisconnect(); + } + client = null; + } + } + + /// + /// 연결 패킷 빌더를 구성하는 콜백 메서드입니다. + /// + /// MQTT 클라이언트 인스턴스 + /// 연결 패킷 빌더 + /// 구성된 연결 패킷 빌더 + private ConnectPacketBuilder ConnectPacketBuilderCallback(MQTTClient client, ConnectPacketBuilder builder) + { + return builder.WithKeepAlive(60 * 60);//keep alive 1 + } + + /// + /// MQTT 브로커에 연결되었을 때 호출되는 이벤트 핸들러입니다. + /// + /// 연결된 MQTT 클라이언트 + /// + /// 이 메서드는 연결 성공 시 등록된 모든 토픽에 대한 구독을 시작합니다. + /// + private void OnConnectedMQTT(MQTTClient client) + { + Debug.Log($"MQTT OnConnected"); + BulkSubscribePacketBuilder builder = client.CreateBulkSubscriptionBuilder(); + foreach (var topic in topicHandler.Keys) + { + builder.WithTopic(new SubscribeTopicBuilder(topic).WithMessageCallback(OnTopic)); + } + builder.BeginSubscribe(); + } + + /// + /// MQTT 클라이언트의 상태가 변경되었을 때 호출되는 이벤트 핸들러입니다. + /// + /// MQTT 클라이언트 + /// 이전 상태 + /// 새 상태 + private void OnStateChangedMQTT(MQTTClient client, ClientStates oldState, ClientStates newState) + { + Debug.Log($"MQTT OnStateChanged {oldState} => {newState}"); + } + + /// + /// MQTT 브로커와의 연결이 종료되었을 때 호출되는 이벤트 핸들러입니다. + /// + /// MQTT 클라이언트 + /// 연결 종료 이유 코드 + /// 연결 종료 이유 문자열 + /// + /// 자동 재연결이 활성화된 경우 지정된 지연 시간 후에 재연결을 시도합니다. + /// + private void OnDisconnectedMQTT(MQTTClient client, DisconnectReasonCodes code, string reason) + { + //ULog.Info($"MQTT Disconnected - code: {code}, reason: '{reason}'"); + Debug.Log($"MQTTDisconnected pcTime={DateTime.Now}"); + // 지연 후에만 한 번 연결 + if (Application.isPlaying && autoReconnect) + { + UniTask.Delay(reconnectDelay).ContinueWith(() => + { + Connect(); + }).Forget(); + } + } + + /// + /// MQTT 클라이언트에서 오류가 발생했을 때 호출되는 이벤트 핸들러입니다. + /// + /// MQTT 클라이언트 + /// 오류 발생 이유 + /// + /// 이 이벤트 후에는 OnDisconnectedMQTT 이벤트도 발생합니다. + /// + private void OnErrorMQTT(MQTTClient client, string reason) + { + Debug.LogError($"MQTT OnError reason: '{reason}'"); + } + + /// + /// 구독한 토픽으로 메시지가 수신되었을 때 호출되는 콜백입니다. + /// + /// MQTT 클라이언트 + /// 구독 토픽 정보 + /// 수신된 메시지의 토픽 이름 + /// 수신된 메시지 + /// + /// 이 메서드는 메시지를 로깅하고 해당 토픽에 등록된 모든 핸들러를 호출합니다. + /// + private void OnTopic(MQTTClient client, SubscriptionTopic topic, string topicName, ApplicationMessage message) + { + string payload = Encoding.UTF8.GetString(message.Payload.Data, message.Payload.Offset, message.Payload.Count); + Debug.Log($"MQTT OnTopic {topic.Filter.OriginalFilter} => {payload}"); + ServerLog.LogMqtt(MQTTDomain, MQTTPort.ToString(), topic.Filter.OriginalFilter, payload, DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.fffZ")); + if (onMessageReceived != null) + { + onMessageReceived.Invoke(topic.Filter.OriginalFilter, payload); + } + } + + /// + /// 지정된 토픽으로 메시지를 발행(publish)합니다. + /// + /// 메시지를 발행할 토픽입니다. + /// 발행할 메시지 내용입니다. + /// + /// 이 메서드는 클라이언트가 연결되어 있지 않으면 오류 로그를 기록하고 메시지를 발행하지 않습니다. + /// + /// + /// + /// // MQTT 서비스 인스턴스 생성 및 연결 + /// var mqtt = new MQTTService("localhost", 1883); + /// mqtt.Connect(); + /// + /// // 메시지 발행 + /// mqtt.Publish("device/status", "online"); + /// + /// // JSON 형식 메시지 발행 + /// string jsonMessage = JsonUtility.ToJson(new DeviceStatus { status = "online", battery = 95 }); + /// mqtt.Publish("device/status", jsonMessage); + /// + /// + public void Publish(string topic, string message) + { + if (client == null || client.State != ClientStates.Connected) + { + Debug.LogError("MQTT client is not connected. Cannot publish message."); + return; + } + client.CreateApplicationMessageBuilder(topic) + .WithPayload(message) + .BeginPublish(); + } + } +} diff --git a/Assets/Scripts/UVC/Network/MQTTService.cs.meta b/Assets/Scripts/UVC/Network/MQTTService.cs.meta new file mode 100644 index 00000000..e916cd26 --- /dev/null +++ b/Assets/Scripts/UVC/Network/MQTTService.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: f998dc656acc3d7499dbf134df597fc0 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Tests.meta b/Assets/Scripts/UVC/Tests.meta new file mode 100644 index 00000000..52b64e44 --- /dev/null +++ b/Assets/Scripts/UVC/Tests.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7b692852ba3f94d45990b0637d03eeb6 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Tests/Data.meta b/Assets/Scripts/UVC/Tests/Data.meta new file mode 100644 index 00000000..6e6eec73 --- /dev/null +++ b/Assets/Scripts/UVC/Tests/Data.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4162837cd34c49f479963ff3a17e9365 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs b/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs new file mode 100644 index 00000000..e5b7ae1a --- /dev/null +++ b/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs @@ -0,0 +1,269 @@ +using NUnit.Framework; +using System; +using Newtonsoft.Json.Linq; +using UVC.Data; +using UnityEngine; + +namespace UVC.Tests.Data +{ + /// + /// DataMapper 클래스의 테스트를 위한 테스트 클래스입니다. + /// + [TestFixture] + public class DataMapperTests + { + /// + /// 문자열 타입 매핑 테스트 + /// + [Test] + public void Map_StringProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["Name"] = "홍길동"; + + var source = JObject.Parse(@"{ ""Name"": ""김철수"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Name")); + Assert.AreEqual("김철수", result["Name"].ToString()); + } + + /// + /// 정수 타입 매핑 테스트 + /// + [Test] + public void Map_IntProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["Age"] = 25; + + var source = JObject.Parse(@"{ ""Age"": 30 }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Age")); + Assert.AreEqual(30, result["Age"].ToObject()); + } + + /// + /// 부동소수점 타입 매핑 테스트 + /// + [Test] + public void Map_DoubleProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["Height"] = 175.5; + + var source = JObject.Parse(@"{ ""Height"": 180.5 }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Height")); + Assert.AreEqual(180.5, result["Height"].ToObject()); + } + + /// + /// Boolean 타입 매핑 테스트 + /// + [Test] + public void Map_BoolProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["IsActive"] = false; + + var source = JObject.Parse(@"{ ""IsActive"": true }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("IsActive")); + Assert.IsTrue(result["IsActive"].ToObject()); + } + + /// + /// DateTime 타입 매핑 테스트 + /// + [Test] + public void Map_DateTimeProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["BirthDate"] = JToken.FromObject(DateTime.Now); + + var expectedDate = new DateTime(1990, 1, 1); + var source = JObject.Parse(@"{ ""BirthDate"": ""1990-01-01T00:00:00.000"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("BirthDate")); + Assert.AreEqual(expectedDate, result["BirthDate"].ToObject()); + } + + /// + /// DataValueMapper 타입 매핑 테스트 + /// + [Test] + public void Map_DataValueMapperProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + var valueMapper = new DataValueMapper(); + valueMapper["ON"] = "활성화"; + valueMapper["OFF"] = "비활성화"; + guide["Status"] = JToken.FromObject(valueMapper); + + var source = JObject.Parse(@"{ ""Status"": ""ON"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Status")); + Assert.AreEqual("활성화", result["Status"].ToString()); + } + + /// + /// 열거형 타입 매핑 테스트 + /// + [Test] + public void Map_EnumProperty_MapsCorrectly() + { + // Arrange + var guide = new JObject(); + guide["Status"] = JToken.FromObject(UserStatus.Inactive); + + var source = JObject.Parse(@"{ ""Status"": ""Active"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Status")); + Assert.AreEqual(UserStatus.Active, result["Status"].ToObject()); + } + + /// + /// 타겟에 없는 추가 속성 매핑 테스트 + /// + [Test] + public void Map_AdditionalProperty_AddsToResult() + { + // Arrange + var guide = new JObject(); + guide["Name"] = "홍길동"; + + var source = JObject.Parse(@"{ ""Name"": ""김철수"", ""Email"": ""kim@example.com"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("Email")); + Assert.AreEqual("kim@example.com", result["Email"].ToString()); + } + + /// + /// 유효하지 않은 DateTime 문자열 매핑 테스트 + /// + [Test] + public void Map_InvalidDateTimeString_ReturnsNull() + { + // Arrange + var guide = new JObject(); + guide["BirthDate"] = JToken.FromObject(DateTime.Now); + + var source = JObject.Parse(@"{ ""BirthDate"": ""InvalidDateTime"" }"); + + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.IsTrue(result.ContainsKey("BirthDate")); + Assert.AreEqual(JTokenType.Null, result["BirthDate"].Type); + } + + /// + /// 복합 객체 매핑 테스트 + /// + [Test] + public void Map_ComplexObject_MapsAllProperties() + { + // Arrange + var guide = new JObject(); + guide["Id"] = 1; + guide["Name"] = "홍길동"; + guide["IsActive"] = false; + guide["JoinDate"] = JToken.FromObject(DateTime.Now); + guide["Height"] = 175.5; + guide["Status"] = JToken.FromObject(UserStatus.Inactive); + + string json = @"{ + ""Id"": 100, + ""Name"": ""김철수"", + ""IsActive"": true, + ""JoinDate"": ""2023-01-01T00:00:00"", + ""Height"": 180.0, + ""Status"": ""Active"", + ""Email"": ""kim@example.com"" + }"; + + var source = JObject.Parse(json); + var mapper = new DataMapper(source, guide); + + // Act + var result = mapper.Map(); + + // Assert + Assert.AreEqual(7, result.Count); + Assert.AreEqual(100, result["Id"].ToObject()); + Assert.AreEqual("김철수", result["Name"].ToString()); + Assert.IsTrue(result["IsActive"].ToObject()); + Assert.AreEqual(new DateTime(2023, 1, 1), result["JoinDate"].ToObject()); + Assert.AreEqual(180.0, result["Height"].ToObject()); + Assert.AreEqual(UserStatus.Active, result["Status"].ToObject()); + Assert.AreEqual("kim@example.com", result["Email"].ToString()); + } + } + + /// + /// 테스트에 사용할 샘플 열거형 + /// + public enum UserStatus + { + Active, + Inactive, + Suspended + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs.meta b/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs.meta new file mode 100644 index 00000000..d9c05382 --- /dev/null +++ b/Assets/Scripts/UVC/Tests/Data/DataMapperTests.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 8cb892a13f491044698192b8085a7dd3 \ No newline at end of file diff --git a/Assets/Scripts/UVC/Tests/Tester.cs b/Assets/Scripts/UVC/Tests/Tester.cs new file mode 100644 index 00000000..b3acb4d7 --- /dev/null +++ b/Assets/Scripts/UVC/Tests/Tester.cs @@ -0,0 +1,49 @@ +using System; +using System.Collections.Generic; +using System.Linq; +using System.Text; +using System.Threading.Tasks; +using UnityEngine; +using UVC.Tests.Data; + +namespace UVC.Tests +{ + public static class Tester + { + + public static void RunAllTests() + { + Debug.Log("테스트 시작: DataMapperTests"); + RunDataMapperTests(); + Debug.Log("테스트 완료: DataMapperTests"); + } + + private static void RunDataMapperTests() + { + DataMapperTests test = new DataMapperTests(); + + RunTest("Map_StringProperty_MapsCorrectly", () => test.Map_StringProperty_MapsCorrectly()); + RunTest("Map_IntProperty_MapsCorrectly", () => test.Map_IntProperty_MapsCorrectly()); + RunTest("Map_DoubleProperty_MapsCorrectly", () => test.Map_DoubleProperty_MapsCorrectly()); + RunTest("Map_BoolProperty_MapsCorrectly", () => test.Map_BoolProperty_MapsCorrectly()); + RunTest("Map_DateTimeProperty_MapsCorrectly", () => test.Map_DateTimeProperty_MapsCorrectly()); + RunTest("Map_EnumProperty_MapsCorrectly", () => test.Map_EnumProperty_MapsCorrectly()); + RunTest("Map_AdditionalProperty_AddsToResult", () => test.Map_AdditionalProperty_AddsToResult()); + RunTest("Map_InvalidDateTimeString_ReturnsNull", () => test.Map_InvalidDateTimeString_ReturnsNull()); + RunTest("Map_ComplexObject_MapsAllProperties", () => test.Map_ComplexObject_MapsAllProperties()); + } + + private static void RunTest(string testName, Action testMethod) + { + try + { + testMethod(); + Debug.Log($"테스트 성공: {testName}"); + } + catch (Exception ex) + { + Debug.LogError($"테스트 실패: {testName} - {ex.Message}\n{ex.StackTrace}"); + } + } + } +} diff --git a/Assets/Scripts/UVC/Tests/Tester.cs.meta b/Assets/Scripts/UVC/Tests/Tester.cs.meta new file mode 100644 index 00000000..67ae94fe --- /dev/null +++ b/Assets/Scripts/UVC/Tests/Tester.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 756669856ddcff54cb51eb7e4f80c1fd \ No newline at end of file diff --git a/Assets/Scripts/UVC/attribute.meta b/Assets/Scripts/UVC/attribute.meta new file mode 100644 index 00000000..377742c2 --- /dev/null +++ b/Assets/Scripts/UVC/attribute.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: aa222a164a5475049986f114e886ce97 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/attribute/StringValueAttribute.cs b/Assets/Scripts/UVC/attribute/StringValueAttribute.cs new file mode 100644 index 00000000..0ca6b8b1 --- /dev/null +++ b/Assets/Scripts/UVC/attribute/StringValueAttribute.cs @@ -0,0 +1,102 @@ +using System; +using System.Reflection; + + +namespace UVC.Attribute +{ + /// + /// enum의 string 값을 가져오기 위한 Attribute입니다. + /// enum 값에 문자열을 연결하여 표시 이름, API 매핑 등 다양한 용도로 활용할 수 있습니다. + /// + /// + /// 사용 예제: + /// + /// public enum Test { + /// [StringValue("a")] + /// Foo, + /// [StringValue("b")] + /// Something + /// } + /// + /// string value = Test.Foo.GetStringValue(); // "a" 반환 + /// + /// 출처: https://weblogs.asp.net/stefansedich/enum-with-string-values-in-c + /// + public class StringValueAttribute : System.Attribute + { + #region Properties + + /// + /// enum 값에 연결된 문자열 값을 저장합니다. + /// + public string StringValue { get; protected set; } + + #endregion + + #region Constructor + + /// + /// StringValue Attribute를 초기화하는 생성자입니다. + /// + /// enum 값과 연결할 문자열 + /// + /// + /// public enum UserType { + /// [StringValue("관리자")] + /// Admin, + /// [StringValue("일반 사용자")] + /// Normal + /// } + /// + /// + public StringValueAttribute(string value) + { + this.StringValue = value; + } + + #endregion + } + + + public static class StringValueEx + { + /// + /// enum 값에 연결된 StringValue 속성의 문자열 값을 가져옵니다. + /// + /// 문자열 값을 가져올 enum 값 + /// 연결된 문자열 값이 있으면 해당 값을, 없으면 null을 반환합니다. + /// + /// + /// public enum ApiEndpoint { + /// [StringValue("/api/users")] + /// Users, + /// [StringValue("/api/products")] + /// Products + /// } + /// + /// // 사용 예: + /// string endpoint = ApiEndpoint.Users.GetStringValue(); // "/api/users" 반환 + /// + /// // 실제 API 호출 시 활용: + /// var url = baseUrl + ApiEndpoint.Products.GetStringValue(); + /// HttpClient.Get(url); + /// + /// + public static string GetStringValue(this Enum value) + { + // 타입 정보 가져오기 + Type type = value.GetType(); + + // 현재 enum 값에 대한 필드 정보 가져오기 + FieldInfo fieldInfo = type.GetField(value.ToString()); + + // StringValue 특성 배열 가져오기 + StringValueAttribute[] attribs = fieldInfo.GetCustomAttributes( + typeof(StringValueAttribute), false) as StringValueAttribute[]; + + // 일치하는 것이 있으면 첫 번째 특성의 문자열 값 반환 + return attribs.Length > 0 ? attribs[0].StringValue : null; + } + } +} + diff --git a/Assets/Scripts/UVC/attribute/StringValueAttribute.cs.meta b/Assets/Scripts/UVC/attribute/StringValueAttribute.cs.meta new file mode 100644 index 00000000..c33d9633 --- /dev/null +++ b/Assets/Scripts/UVC/attribute/StringValueAttribute.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: e88d76ce4a8d3454bb6b5d2fc5545c14 \ No newline at end of file diff --git a/Assets/Scripts/UVC/core.meta b/Assets/Scripts/UVC/core.meta new file mode 100644 index 00000000..c9f6d346 --- /dev/null +++ b/Assets/Scripts/UVC/core.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: cd6776278fbd3ce4db1517f2bcbd4d94 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/core/Singleton.cs b/Assets/Scripts/UVC/core/Singleton.cs new file mode 100644 index 00000000..6e326082 --- /dev/null +++ b/Assets/Scripts/UVC/core/Singleton.cs @@ -0,0 +1,250 @@ +using System; +using UnityEngine; + +namespace UVC.Core +{ + + #region Singleton + + /// + /// MonoBehaviour가 아닌 일반 클래스를 위한 싱글톤 패턴 + /// 지연 초기화(lazy initialization)를 사용하여 필요할 때만 인스턴스 생성 + /// + /// 싱글톤으로 구현할 클래스 타입(반드시 기본 생성자가 있어야 함) + /// + /// + /// public class JournalClass + /// { + /// // 클래스 내용 + /// } + /// + /// // 싱글톤 사용 예시 + /// var journalSingleton = Singleton.Instance; + /// + /// + public class Singleton where T : class, new() + { + /// + /// 싱글톤 인스턴스를 지연 초기화 방식으로 생성 + /// + protected static readonly Lazy instance = new Lazy(() => new T()); + + /// + /// 외부에서 생성자 직접 호출 방지 + /// + protected Singleton(){} + + /// + /// 싱글톤 인스턴스에 접근하기 위한 전역 접근점 + /// + /// + /// + /// // 싱글톤 인스턴스 접근 방법 + /// MyClass instance = Singleton.Instance; + /// + /// + public static T Instance { get { return instance.Value; } } + } + #endregion + + + #region SingletonApp + + /// + /// 씬 전환 시에도 유지되는 MonoBehaviour 기반 싱글톤 + /// DontDestroyOnLoad를 통해 씬 전환 시에도 객체가 파괴되지 않음 + /// + /// MonoBehaviour를 상속받는 컴포넌트 타입 + /// + /// + /// // 사용 예시 + /// public class AppMain : SingletonApp + /// { + /// protected override void Init() + /// { + /// // 초기화 코드 작성 + /// Debug.Log("AppMain 초기화 완료"); + /// } + /// } + /// + /// // 접근 방법 + /// AppMain.Instance.SomeMethod(); + /// + /// + public abstract class SingletonApp : UnityEngine.MonoBehaviour where T : UnityEngine.Component + { + /// + /// 싱글톤 인스턴스 + /// + private static T instance; + + /// + /// 싱글톤 인스턴스에 접근하기 위한 전역 접근점 + /// 인스턴스가 없는 경우 자동으로 생성함 + /// + /// + /// + /// // 접근 방법 + /// MyAppSingleton.Instance.DoSomething(); + /// + /// + public static T Instance + { + get + { + if (instance == null) + { + instance = (T)GameObject.FindFirstObjectByType(typeof(T)); // Updated to use FindFirstObjectByType + if (instance == null) + { + // 씬에 인스턴스가 없으면 새로 생성 + instance = new GameObject(string.Format(typeof(T) + "")).AddComponent(); + } + } + return instance; + } + } + + /// + /// 컴포넌트가 활성화될 때 호출되는 Unity 메소드 + /// 인스턴스 설정 및 씬 전환 시 객체 유지 설정 + /// + protected virtual void Awake() + { + if (instance == null) + { + instance = this as T; + } + // 인스턴스 초기화 호출 + (instance as SingletonApp).Init(); + //if (transform.parent != null && transform.root != null) + //{ + // DontDestroyOnLoad(transform.root.gameObject); + //} + //else + { + // 씬 전환 시에도 파괴되지 않도록 설정 + DontDestroyOnLoad(gameObject); + } + } + + /// + /// 인스턴스화될 때 호출되는 초기화 메소드 + /// 자식 클래스에서 오버라이드하여 초기화 로직 구현 + /// + /// + /// + /// protected override void Init() + /// { + /// // 초기화 코드 작성 + /// playerData = new PlayerData(); + /// LoadSettings(); + /// } + /// + /// + protected virtual void Init() { } + + } + #endregion + + #region SingletonScene + + /// + /// 현재 씬 내에서만 유지되는 MonoBehaviour 기반 싱글톤 + /// 씬 전환 시 인스턴스가 파괴됨 + /// + /// MonoBehaviour를 상속받는 컴포넌트 타입 + /// + /// + /// // 사용 예시 + /// public class SceneMain : SingletonScene + /// { + /// protected override void Init() + /// { + /// // 초기화 코드 작성 + /// Debug.Log("SceneMain 초기화 완료"); + /// } + /// } + /// + /// // 접근 방법 + /// SceneMain.Instance.SomeMethod(); + /// + /// + public abstract class SingletonScene : UnityEngine.MonoBehaviour where T : UnityEngine.Component + { + /// + /// 싱글톤 인스턴스 + /// + private static T instance; + + /// + /// 싱글톤 인스턴스에 접근하기 위한 전역 접근점 + /// 인스턴스가 없는 경우 자동으로 생성함 + /// + /// + /// + /// // 접근 방법 + /// MySceneSingleton.Instance.DoSomething(); + /// + /// + public static T Instance + { + get + { + if (instance == null) + { + instance = (T)GameObject.FindFirstObjectByType(typeof(T)); // Updated to use FindFirstObjectByType + if (instance == null) + { + // 씬에 인스턴스가 없으면 새로 생성 + instance = new GameObject(string.Format(typeof(T) + "")).AddComponent(); + } + } + return instance; + } + } + + + /// + /// 컴포넌트가 활성화될 때 호출되는 Unity 메소드 + /// 인스턴스 설정 및 초기화 + /// + protected virtual void Awake() + { + if (instance == null) + { + instance = this as T; + + } + // 인스턴스 초기화 호출 + (instance as SingletonScene).Init(); + } + + /// + /// 인스턴스화될 때 호출되는 초기화 메소드 + /// 자식 클래스에서 오버라이드하여 초기화 로직 구현 + /// + /// + /// + /// protected override void Init() + /// { + /// // 초기화 코드 작성 + /// uiManager = GetComponent(); + /// SetupEventListeners(); + /// } + /// + /// + protected virtual void Init() { } + + /// + /// 컴포넌트가 파괴될 때 호출되는 Unity 메소드 + /// 싱글톤 인스턴스 참조 해제 + /// + protected virtual void OnDestroy() + { + instance = null; + } + + } + #endregion +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/core/Singleton.cs.meta b/Assets/Scripts/UVC/core/Singleton.cs.meta new file mode 100644 index 00000000..0acb4551 --- /dev/null +++ b/Assets/Scripts/UVC/core/Singleton.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 74ccb7e1eb96e8744808b11bbfff217e \ No newline at end of file diff --git a/Assets/Scripts/UVC/util.meta b/Assets/Scripts/UVC/util.meta new file mode 100644 index 00000000..f6ac280d --- /dev/null +++ b/Assets/Scripts/UVC/util.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 47644ae0fdd35a54cba6dd724cef4489 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Scripts/UVC/util/ColorUtil.cs b/Assets/Scripts/UVC/util/ColorUtil.cs new file mode 100644 index 00000000..3e063066 --- /dev/null +++ b/Assets/Scripts/UVC/util/ColorUtil.cs @@ -0,0 +1,55 @@ +using UnityEngine; + +namespace UVC.Util +{ + public static class ColorUtil + { + /// + /// hex code to color #FFFFFF + /// + /// #rrggbb + /// Color ü + /// + /// // Example usage: + /// Color color = ColorUtil.FromHex("#FF5733"); + /// Debug.Log($"Color: {color}"); + /// + public static Color FromHex(string hexCode) + { + Color color; + if (ColorUtility.TryParseHtmlString(hexCode, out color)) + { + return color; + } + + Debug.LogError("[UnityExtension::HexColor]invalid hex code - " + hexCode); + return Color.white; + } + + /// + /// hex code to color with alpha #FFFFFF + /// + /// #rrggbb + /// 0.0~1.0 + /// Color ü + /// + /// // Example usage: + /// Color colorWithAlpha = ColorUtil.FromHex("#FF5733", 0.5f); + /// Debug.Log($"Color with alpha: {colorWithAlpha}"); + /// + public static Color FromHex(string hexCode, float alpha) + { + Color color; + if (ColorUtility.TryParseHtmlString(hexCode, out color)) + { + color.a = alpha; + return color; + } + + Debug.LogError("[UnityExtension::HexColor]invalid hex code - " + hexCode); + color = Color.white; + color.a = alpha; + return color; + } + } +} diff --git a/Assets/Scripts/UVC/util/ColorUtil.cs.meta b/Assets/Scripts/UVC/util/ColorUtil.cs.meta new file mode 100644 index 00000000..0b789469 --- /dev/null +++ b/Assets/Scripts/UVC/util/ColorUtil.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 21f0437a07bf58842a9db3a313d4766a \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/Debounce.cs b/Assets/Scripts/UVC/util/Debounce.cs new file mode 100644 index 00000000..427a9860 --- /dev/null +++ b/Assets/Scripts/UVC/util/Debounce.cs @@ -0,0 +1,63 @@ +using Cysharp.Threading.Tasks; +using System; +using System.Threading; + +namespace UVC.Util +{ + public class Debounce : IDisposable + { + private CancellationTokenSource cts = new CancellationTokenSource(); + + /// + /// 마지막 호출 된 함수 한번 실행. milliseconds 이후 실행 되어 추가로 호추 되면 이전 함수 취소 함. + /// Debounce debounce = new Debounce(); + /// debounce.DebounceAction(1000, repository.SaveToolBarData, data); + /// + /// param Type + /// + /// + /// + public void DebounceAction(int milliseconds, Action action, T param) + { + resetCancellationToken(); + UniTask.Delay(TimeSpan.FromMilliseconds(milliseconds), cancellationToken: cts.Token, ignoreTimeScale: false).ContinueWith(() => + { + action.Invoke(param); + }); + } + + /// + /// 마지막 호출 된 함수 한번 실행. milliseconds 이후 실행 되어 추가로 호추 되면 이전 함수 취소 함. + /// Debounce debounce = new Debounce(); + /// debounce.DebounceUniTask(1000, repository.SaveToolBarData, data); + /// + /// param Type + /// + /// + /// + public void DebounceUniTask(int milliseconds, Func action, T param) + { + resetCancellationToken(); + UniTask.Delay(TimeSpan.FromMilliseconds(milliseconds), cancellationToken: cts.Token, ignoreTimeScale: false).ContinueWith(() => + { + action.Invoke(param).Forget(); + }); + } + + + + private void resetCancellationToken() + { + cts.Cancel(); + cts = new CancellationTokenSource(); + } + + + public void Dispose() + { + cts.Cancel(); + cts.Dispose(); + } + + } +} diff --git a/Assets/Scripts/UVC/util/Debounce.cs.meta b/Assets/Scripts/UVC/util/Debounce.cs.meta new file mode 100644 index 00000000..590ca410 --- /dev/null +++ b/Assets/Scripts/UVC/util/Debounce.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: ee6e5e9af2f9c724489f5afabf85257b \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/DriveUtil.cs b/Assets/Scripts/UVC/util/DriveUtil.cs new file mode 100644 index 00000000..cf887dcc --- /dev/null +++ b/Assets/Scripts/UVC/util/DriveUtil.cs @@ -0,0 +1,43 @@ +using System.IO; + +namespace UVC.Util +{ + /// + /// DriveUtil 클래스는 시스템 드라이브의 가용 공간을 계산하는 유틸리티를 제공합니다. + /// + public static class DriveUtil + { + /// + /// 지정된 드라이브의 가용 GigaByte 크기를 반환합니다. + /// + /// 드라이브 이름 (예: "C"). 기본값은 "C"입니다. + /// 가용 공간(GigaByte) 또는 드라이브가 없을 경우 -1을 반환합니다. + /// + /// // Example usage: + /// long freeSpace = DriveUtil.GetDriveGigaBytes("C"); + /// if (freeSpace != -1) + /// { + /// Debug.Log($"C 드라이브의 가용 공간: {freeSpace} GB"); + /// } + /// else + /// { + /// Debug.LogError("드라이브를 찾을 수 없습니다."); + /// } + /// + public static long GetDriveGigaBytes(string driveName = "C") + { + DriveInfo[] drivers = DriveInfo.GetDrives(); + foreach (var item in drivers) + { + if (item.DriveType == DriveType.Fixed) + { + if (item.Name.StartsWith(driveName)) + { + return item.AvailableFreeSpace / 1024 / 1024 / 1024; + } + } + } + return -1; + } + } +} diff --git a/Assets/Scripts/UVC/util/DriveUtil.cs.meta b/Assets/Scripts/UVC/util/DriveUtil.cs.meta new file mode 100644 index 00000000..0853570c --- /dev/null +++ b/Assets/Scripts/UVC/util/DriveUtil.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: acbe413c2ea538646af2f2ce0d8bd54f \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/GameObjectUtil.cs b/Assets/Scripts/UVC/util/GameObjectUtil.cs new file mode 100644 index 00000000..0470169d --- /dev/null +++ b/Assets/Scripts/UVC/util/GameObjectUtil.cs @@ -0,0 +1,50 @@ +using UnityEngine; + +namespace UVC.Util +{ + /// + /// Unity θ GameObject ϰų Ư Ʈ ƿƼ ŬԴϴ. + /// + public static class GameObjectUtil + { + /// + /// ־ θ GameObject մϴ. + /// + /// Resources + /// GameObject θ Transform ( ) + /// GameObject + /// + /// + /// string prefabPath = "Prefabs/MyPrefab"; + /// GameObject newObject = prefabPath.GetGameObjectFromPrefabPath(); + /// + /// + public static GameObject GetGameObjectFromPrefabPath(this string prefabPath, Transform parent = null) + { + GameObject prefab = Resources.Load(prefabPath, typeof(GameObject)) as GameObject; + return UnityEngine.Object.Instantiate(prefab); + + } + + /// + /// ־ θ Ư Ÿ Ʈ ɴϴ. + /// + /// Ʈ Ÿ + /// Resources + /// GameObject θ Transform ( ) + /// GameObject Ʈ + /// + /// + /// string prefabPath = "Prefabs/MyPrefab"; + /// MyComponent component = prefabPath.GetComponentFromPrefabPath(); + /// + /// + public static T GetComponentFromPrefabPath(this string prefabPath, Transform parent = null) + { + GameObject prefab = Resources.Load(prefabPath, typeof(GameObject)) as GameObject; + GameObject go = UnityEngine.Object.Instantiate(prefab); + if (parent != null) go.transform.SetParent(parent, false); + return go.GetComponent(); + } + } +} diff --git a/Assets/Scripts/UVC/util/GameObjectUtil.cs.meta b/Assets/Scripts/UVC/util/GameObjectUtil.cs.meta new file mode 100644 index 00000000..f7bdb030 --- /dev/null +++ b/Assets/Scripts/UVC/util/GameObjectUtil.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: c8fe5ea7a4ba58e4099f712f5d3cf133 \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/GizmoDraw.cs b/Assets/Scripts/UVC/util/GizmoDraw.cs new file mode 100644 index 00000000..2f07ca4e --- /dev/null +++ b/Assets/Scripts/UVC/util/GizmoDraw.cs @@ -0,0 +1,105 @@ +using UnityEngine; + +namespace UVC.Util +{ + /// + /// GizmoDraw Ŭ Unity Gizmo Ͽ Sphere, Box, Ǵ Mesh ׸ մϴ. + /// + public class GizmoDraw : MonoBehaviour + { + /// + /// Gizmo Ÿ մϴ. Sphere, Box, Ǵ Mesh ϳ ֽϴ. + /// + public enum GizmoType + { + Sphere, + Box, + Mesh + } + + /// + /// Gizmo Ÿ մϴ. + /// + public GizmoType gizmoType; + + /// + /// Gizmo ȭ鿡 ǥ θ մϴ. + /// + public bool show = true; + + /// + /// Gizmo ̾ ׸ θ մϴ. + /// + public bool wire = false; + + /// + /// Gizmo մϴ. + /// + [SerializeField] + private Color color = Color.yellow; + + /// + /// Sphere Gizmo մϴ. + /// + [SerializeField] + private float radius = 1f; + + /// + /// Box Gizmo (Bounds) մϴ. + /// + public Bounds bounds = new Bounds(Vector3.zero, Vector3.one); + + /// + /// Mesh Gizmo ׸ Mesh մϴ. + /// + public Mesh mesh; + + /// + /// Mesh Gizmo մϴ. + /// + public float scale = 1f; + + /// + /// Unity Gizmo ׸ ޼ҵԴϴ. Unity Ϳ մϴ. + /// + /// + /// GizmoDraw Ʈ Ͽ Sphere ׸ : + /// + /// var gizmoDraw = gameObject.AddComponent(); + /// gizmoDraw.gizmoType = GizmoDraw.GizmoType.Sphere; + /// gizmoDraw.show = true; + /// gizmoDraw.wire = false; + /// gizmoDraw.radius = 2f; + /// + /// + void OnDrawGizmos() + { + if (this.show) + { + Gizmos.color = color; + + if (gizmoType == GizmoType.Sphere) + { + if (wire) + Gizmos.DrawWireSphere(transform.position, radius); + else + Gizmos.DrawSphere(transform.position, radius); + } + else if (gizmoType == GizmoType.Box) + { + if (wire) + Gizmos.DrawWireCube(transform.position + bounds.center, bounds.size); + else + Gizmos.DrawCube(transform.position + bounds.center, bounds.size); + } + else + { + if (wire) + Gizmos.DrawWireMesh(mesh, transform.position, Quaternion.identity, new Vector3(scale, scale, scale)); + else + Gizmos.DrawMesh(mesh, transform.position, Quaternion.identity, new Vector3(scale, scale, scale)); + } + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/GizmoDraw.cs.meta b/Assets/Scripts/UVC/util/GizmoDraw.cs.meta new file mode 100644 index 00000000..09b76ae6 --- /dev/null +++ b/Assets/Scripts/UVC/util/GizmoDraw.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: e951c873a7dc88e42b201fca48bb08dd \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/MathUtil.cs b/Assets/Scripts/UVC/util/MathUtil.cs new file mode 100644 index 00000000..c3316372 --- /dev/null +++ b/Assets/Scripts/UVC/util/MathUtil.cs @@ -0,0 +1,34 @@ +using Unity.Mathematics; +using UnityEngine; + +namespace UVC.Util +{ + /// + /// 수학 관련 유틸리티 메소드를 제공하는 클래스입니다. + /// + public static class MathUtil + { + /// + /// 중심점(`center`)을 기준으로 반지름(`radius`) 거리에서 각도(`angle`)에 해당하는 위치를 계산합니다. + /// + /// 회전의 중심점 + /// 회전 반지름 + /// 회전 각도 (0~360도) + /// 계산된 위치를 나타내는 `Vector3` + /// + /// 다음은 `GetCircleLocationXY` 메소드를 사용하는 예제입니다: + /// + /// Vector3 center = new Vector3(0, 0, 0); + /// float radius = 5f; + /// float angle = 90f; + /// Vector3 position = MathUtil.GetCircleLocationXY(center, radius, angle); + /// Debug.Log(position); // 출력: (0.0, 5.0, 0.0) + /// + /// + public static Vector3 GetCircleLocationXY(Vector3 center, float radius, float angle) + { + Vector3 pos = new Vector3(math.cos(angle * Mathf.Deg2Rad) * radius, math.sin(angle * Mathf.Deg2Rad) * radius, 0); + return pos + center; + } + } +} diff --git a/Assets/Scripts/UVC/util/MathUtil.cs.meta b/Assets/Scripts/UVC/util/MathUtil.cs.meta new file mode 100644 index 00000000..391c66e0 --- /dev/null +++ b/Assets/Scripts/UVC/util/MathUtil.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 0fb243d5835026d4bb990bd68bd32bb1 \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/ScreenCapture.cs b/Assets/Scripts/UVC/util/ScreenCapture.cs new file mode 100644 index 00000000..3e3e6718 --- /dev/null +++ b/Assets/Scripts/UVC/util/ScreenCapture.cs @@ -0,0 +1,72 @@ +using UnityEngine; + + +namespace UVC.Util +{ + /// + /// 화면 캡처를 위한 유틸리티 클래스입니다. + /// 지정된 카메라 또는 화면 전체를 캡처하여 Texture2D로 반환합니다. + /// + public static class ScreenCapture + { + /// + /// 화면을 캡처하여 Texture2D로 반환합니다. + /// 대상 카메라가 RenderTexture를 사용하는 경우 해당 크기로 캡처하며, + /// 그렇지 않은 경우 화면 전체를 캡처합니다. + /// + /// 캡처된 Texture2D 객체 + /// + /// + /// // 화면 캡처 실행 + /// Texture2D capturedImage = ScreenCapture.GetScreenShot(GetComponent()); + /// if (capturedImage != null) + /// { + /// Debug.Log("화면 캡처 성공!"); + /// // 캡처된 이미지를 파일로 저장하거나 UI에 표시 가능 + /// } + /// else + /// { + /// Debug.LogError("화면 캡처 실패: 대상 카메라가 설정되지 않았습니다."); + /// } + /// + /// + public static Texture2D GetScreenShot(Camera camera) + { + if (camera == null) return null; + + if (camera.targetTexture != null) + { + Texture2D screenShot = new Texture2D(camera.targetTexture.width, camera.targetTexture.height, TextureFormat.RGB24, false); + screenShot.wrapMode = TextureWrapMode.Clamp; + + RenderTexture rt = camera.targetTexture; + camera.Render(); + + RenderTexture.active = rt; + screenShot.ReadPixels(new Rect(0, 0, camera.targetTexture.width, camera.targetTexture.height), 0, 0); + screenShot.Apply(false); + RenderTexture.active = null; + + return screenShot; + } + else + { + Texture2D screenShot = new Texture2D(Screen.width, Screen.height, TextureFormat.RGB24, false); + screenShot.wrapMode = TextureWrapMode.Clamp; + + RenderTexture rt = new RenderTexture(Screen.width, Screen.height, 24); + + camera.targetTexture = rt; + camera.Render(); + camera.targetTexture = null; + + RenderTexture.active = rt; + screenShot.ReadPixels(new Rect(0, 0, Screen.width, Screen.height), 0, 0); + screenShot.Apply(false); + RenderTexture.active = null; + + return screenShot; + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/ScreenCapture.cs.meta b/Assets/Scripts/UVC/util/ScreenCapture.cs.meta new file mode 100644 index 00000000..b9cb514d --- /dev/null +++ b/Assets/Scripts/UVC/util/ScreenCapture.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 277b6a259a675b34d9a9a502ccb36aa7 \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/Throttle.cs b/Assets/Scripts/UVC/util/Throttle.cs new file mode 100644 index 00000000..2fa40ac8 --- /dev/null +++ b/Assets/Scripts/UVC/util/Throttle.cs @@ -0,0 +1,66 @@ +using Cysharp.Threading.Tasks; +using System; + +namespace UVC.Util +{ + /// + /// 특정 시간 동안 함수 실행을 제한하는 유틸리티 클래스 + /// + public class Throttle + { + private DateTime timerStarted = DateTime.UtcNow.AddYears(-1); + + /// + /// 비동기 함수 실행 후 지정된 milliseconds 동안 추가 실행을 모두 취소합니다. + /// + /// 함수에 전달할 매개변수의 타입 + /// 제한 시간(밀리초) + /// 실행할 비동기 함수 + /// 비동기 함수에 전달할 매개변수 + /// + /// 아래는 ThrottleUniTask 메소드를 사용하는 예제입니다: + /// + /// var throttle = new Throttle(); + /// await throttle.ThrottleUniTask(1000, async (param) => + /// { + /// Console.WriteLine($"실행됨: {param}"); + /// await UniTask.Delay(500); + /// }, "테스트 매개변수"); + /// + /// + public void ThrottleUniTask(int milliseconds, Func action, T param) + { + if (DateTime.UtcNow - timerStarted > TimeSpan.FromMilliseconds(milliseconds)) + { + timerStarted = DateTime.UtcNow; + action.Invoke(param).Forget(); + } + } + + /// + /// 동기 함수 실행 후 지정된 milliseconds 동안 추가 실행을 모두 취소합니다. + /// + /// 함수에 전달할 매개변수의 타입 + /// 제한 시간(밀리초) + /// 실행할 동기 함수 + /// 동기 함수에 전달할 매개변수 + /// + /// 아래는 ThrottleAction 메소드를 사용하는 예제입니다: + /// + /// var throttle = new Throttle(); + /// throttle.ThrottleAction(1000, (param) => + /// { + /// Console.WriteLine($"실행됨: {param}"); + /// }, "테스트 매개변수"); + /// + /// + public void ThrottleAction(int milliseconds, Action action, T param) + { + if (DateTime.UtcNow - timerStarted > TimeSpan.FromMilliseconds(milliseconds)) + { + timerStarted = DateTime.UtcNow; + action.Invoke(param); + } + } + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/Throttle.cs.meta b/Assets/Scripts/UVC/util/Throttle.cs.meta new file mode 100644 index 00000000..13bdbcb7 --- /dev/null +++ b/Assets/Scripts/UVC/util/Throttle.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: c421342b11ca02d44ac9baeb45f794e1 \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/WindowTools.cs b/Assets/Scripts/UVC/util/WindowTools.cs new file mode 100644 index 00000000..4473b0cf --- /dev/null +++ b/Assets/Scripts/UVC/util/WindowTools.cs @@ -0,0 +1,630 @@ +// Copyright (C) 2017 d.mind - All Rights Reserved +// Version 1.0.1 + +using System; +using System.Collections; +using System.Runtime.InteropServices; +using UnityEngine; +using UVC.Core; + + +namespace UVC.Util +{ + public enum GWLWindowStyles : long + { + GWL_EXSTYLE = -20, // 새로운 확장 창 스타일을 설정합니다. + GWL_HINSTANCE = -6, // 새로운 애플리케이션 인스턴스 핸들을 설정합니다. + GWL_ID = -12, // 자식 창의 새로운 식별자를 설정합니다. 창은 최상위 창일 수 없습니다. + GWL_STYLE = -16, // 새로운 창 스타일을 설정합니다. + GWL_USERDATA = -21, // 창과 연관된 사용자 데이터를 설정합니다. 이 데이터는 창을 생성한 애플리케이션에서 사용하기 위한 것입니다. 초기 값은 0입니다. + GWL_WNDPROC = -4 // 창 프로시저의 새로운 주소를 설정합니다. 호출 스레드와 동일한 프로세스에 속하지 않는 창의 속성은 변경할 수 없습니다. + } + + public enum WindowStyles : long + { + WS_BORDER = 0x00800000, // 창에 얇은 선의 테두리가 있습니다. + WS_CAPTION = 0x00C00000, // 창에 제목 표시줄이 있습니다(WS_BORDER 스타일 포함). + WS_CHILD = 0x40000000, // 창이 자식 창입니다. 이 스타일을 가진 창은 메뉴 표시줄을 가질 수 없습니다. 이 스타일은 WS_POPUP 스타일과 함께 사용할 수 없습니다. + WS_CHILDWINDOW = 0x40000000, // WS_CHILD 스타일과 동일합니다. + WS_CLIPCHILDREN = 0x02000000, // 부모 창 내에서 그리기가 발생할 때 자식 창이 차지하는 영역을 제외합니다. 이 스타일은 부모 창을 생성할 때 사용됩니다. + WS_CLIPSIBLINGS = 0x04000000, // 자식 창을 서로 상대적으로 클리핑합니다. 특정 자식 창이 WM_PAINT 메시지를 받을 때 WS_CLIPSIBLINGS 스타일은 다른 겹치는 자식 창을 업데이트할 영역에서 제외합니다. + WS_DISABLED = 0x08000000, // 창이 처음에 비활성화됩니다. 비활성화된 창은 사용자로부터 입력을 받을 수 없습니다. + WS_DLGFRAME = 0x00400000, // 창에 대화 상자 스타일의 테두리가 있습니다. 이 스타일을 가진 창은 제목 표시줄을 가질 수 없습니다. + WS_GROUP = 0x00020000, // 창이 컨트롤 그룹의 첫 번째 컨트롤입니다. 그룹은 이 첫 번째 컨트롤과 WS_GROUP 스타일이 있는 다음 컨트롤까지 정의된 모든 컨트롤로 구성됩니다. + WS_HSCROLL = 0x00100000, // 창에 가로 스크롤바가 있습니다. + WS_ICONIC = 0x20000000, // 창이 처음에 최소화됩니다. WS_MINIMIZE 스타일과 동일합니다. + WS_MAXIMIZE = 0x01000000, // 창이 처음에 최대화됩니다. + WS_MAXIMIZEBOX = 0x00010000, // 창에 최대화 버튼이 있습니다. WS_EX_CONTEXTHELP 스타일과 함께 사용할 수 없습니다. + WS_MINIMIZE = 0x20000000, // 창이 처음에 최소화됩니다. WS_ICONIC 스타일과 동일합니다. + WS_MINIMIZEBOX = 0x00020000, // 창에 최소화 버튼이 있습니다. WS_EX_CONTEXTHELP 스타일과 함께 사용할 수 없습니다. WS_SYSMENU 스타일도 지정해야 합니다. + WS_OVERLAPPED = 0x00000000, // 창이 겹쳐진 창입니다. 겹쳐진 창은 제목 표시줄과 테두리를 가집니다. WS_TILED 스타일과 동일합니다. + WS_OVERLAPPEDWINDOW = 0x00000000 | 0x00C00000 | 0x00080000 | 0x00040000 | 0x00020000 | 0x00010000, // 창이 겹쳐진 창입니다. WS_TILEDWINDOW 스타일과 동일합니다. + WS_POPUP = 0x80000000, // 창이 팝업 창입니다. 이 스타일은 WS_CHILD 스타일과 함께 사용할 수 없습니다. + WS_POPUPWINDOW = 0x80000000 | 0x00800000 | 0x00080000, // 창이 팝업 창입니다. WS_CAPTION 및 WS_POPUPWINDOW 스타일을 결합하여 창 메뉴를 표시할 수 있습니다. + WS_SIZEBOX = 0x00040000, // 창에 크기 조정 테두리가 있습니다. WS_THICKFRAME 스타일과 동일합니다. + WS_SYSMENU = 0x00080000, // 창의 제목 표시줄에 시스템 메뉴가 있습니다. WS_CAPTION 스타일도 지정해야 합니다. + WS_TABSTOP = 0x00010000, // 창이 사용자가 TAB 키를 눌렀을 때 키보드 포커스를 받을 수 있는 컨트롤입니다. TAB 키를 누르면 WS_TABSTOP 스타일이 있는 다음 컨트롤로 키보드 포커스가 이동합니다. + WS_THICKFRAME = 0x00040000, // 창에 크기 조정 테두리가 있습니다. WS_SIZEBOX 스타일과 동일합니다. + WS_TILED = 0x00000000, // 창이 겹쳐진 창입니다. 겹쳐진 창은 제목 표시줄과 테두리를 가집니다. WS_OVERLAPPED 스타일과 동일합니다. + WS_TILEDWINDOW = 0x00000000 | 0x00C00000 | 0x00080000 | 0x00040000 | 0x00020000 | 0x00010000, // 창이 겹쳐진 창입니다. WS_OVERLAPPEDWINDOW 스타일과 동일합니다. + WS_VISIBLE = 0x10000000, // 창이 처음에 표시됩니다. + WS_VSCROLL = 0x00200000 // 창에 세로 스크롤바가 있습니다. + } + + public enum ExtendedWindowStyles : long + { + WS_EX_ACCEPTFILES = 0x00000010, // 창이 드래그 앤 드롭 파일을 허용합니다. + WS_EX_APPWINDOW = 0x00040000, // 창이 보일 때 최상위 창을 작업 표시줄에 강제로 표시합니다. + WS_EX_CLIENTEDGE = 0x00000200, // 창에 오목한 가장자리 테두리가 있습니다. + WS_EX_COMPOSITED = 0x02000000, // 모든 하위 창을 이중 버퍼링을 사용하여 아래에서 위로 그립니다. + WS_EX_CONTEXTHELP = 0x00000400, // 창의 제목 표시줄에 물음표가 포함됩니다. 사용자가 물음표를 클릭하면 커서가 물음표와 포인터로 변경됩니다. 사용자가 자식 창을 클릭하면 WM_HELP 메시지를 받습니다. + WS_EX_CONTROLPARENT = 0x00010000, // 창 자체가 대화 상자 탐색에 참여해야 하는 자식 창을 포함합니다. + WS_EX_DLGMODALFRAME = 0x00000001, // 창에 이중 테두리가 있습니다. 선택적으로 WS_CAPTION 스타일을 dwStyle 매개변수에 지정하여 제목 표시줄을 생성할 수 있습니다. + WS_EX_LAYERED = 0x00080000, // 창이 레이어드 창입니다. + WS_EX_LAYOUTRTL = 0x00400000, // 셸 언어가 히브리어, 아랍어 또는 읽기 순서 정렬을 지원하는 다른 언어인 경우 창의 수평 원점이 오른쪽 가장자리에 있습니다. 수평 값을 증가시키면 왼쪽으로 이동합니다. + WS_EX_LEFT = 0x00000000, // 창에 일반적인 왼쪽 정렬 속성이 있습니다. 기본값입니다. + WS_EX_LEFTSCROLLBAR = 0x00004000, // 셸 언어가 히브리어, 아랍어 또는 읽기 순서 정렬을 지원하는 다른 언어인 경우 수직 스크롤바(있는 경우)가 왼쪽에 있습니다. + WS_EX_LTRREADING = 0x00000000, // 창 텍스트가 왼쪽에서 오른쪽 읽기 순서 속성을 사용하여 표시됩니다. 기본값입니다. + WS_EX_MDICHILD = 0x00000040, // 창이 MDI 자식 창입니다. + WS_EX_NOACTIVATE = 0x08000000, // 이 스타일로 생성된 최상위 창은 사용자가 클릭해도 포그라운드 창이 되지 않습니다. + WS_EX_NOINHERITLAYOUT = 0x00100000, // 창이 창 레이아웃을 자식 창에 전달하지 않습니다. + WS_EX_NOPARENTNOTIFY = 0x00000004, // 이 스타일로 생성된 자식 창은 생성되거나 삭제될 때 WM_PARENTNOTIFY 메시지를 부모 창에 보내지 않습니다. + WS_EX_NOREDIRECTIONBITMAP = 0x00200000, // 창이 리디렉션 표면에 렌더링되지 않습니다. 이는 보이는 콘텐츠가 없거나 표면 이외의 메커니즘을 사용하여 시각적 콘텐츠를 제공하는 창에 해당합니다. + WS_EX_OVERLAPPEDWINDOW = 0x00000300, // 창이 겹쳐진 창입니다. + WS_EX_PALETTEWINDOW = 0x00000188, // 창이 팔레트 창입니다. 이는 명령 배열을 제공하는 모달리스 대화 상자입니다. + WS_EX_RIGHT = 0x00001000, // 창에 일반적인 "오른쪽 정렬" 속성이 있습니다. 이는 창 클래스에 따라 다릅니다. + WS_EX_RIGHTSCROLLBAR = 0x00000000, // 수직 스크롤바(있는 경우)가 클라이언트 영역의 오른쪽에 있습니다. 기본값입니다. + WS_EX_RTLREADING = 0x00002000, // 셸 언어가 히브리어, 아랍어 또는 읽기 순서 정렬을 지원하는 다른 언어인 경우 창 텍스트가 오른쪽에서 왼쪽 읽기 순서 속성을 사용하여 표시됩니다. + WS_EX_STATICEDGE = 0x00020000, // 창에 사용자 입력을 받지 않는 항목에 사용하기 위한 3차원 테두리 스타일이 있습니다. + WS_EX_TOOLWINDOW = 0x00000080, // 창이 플로팅 도구 모음으로 사용되도록 의도되었습니다. 도구 창은 일반 제목 표시줄보다 짧은 제목 표시줄을 가지며 창 제목은 더 작은 글꼴로 그려집니다. + WS_EX_TOPMOST = 0x00000008, // 창이 모든 비최상위 창 위에 배치되며 비활성화되더라도 그 위에 유지됩니다. 이 스타일을 추가하거나 제거하려면 SetWindowPos 함수를 사용하십시오. + WS_EX_TRANSPARENT = 0x00000020, // 창이 동일한 스레드에서 생성된 아래의 형제 창이 그려질 때까지 그려지지 않습니다. 창은 투명하게 보입니다. + WS_EX_WINDOWEDGE = 0x00000100 // 창에 돌출된 가장자리 테두리가 있습니다. + } + + public enum WindowToolsFlags : long + { + SWP_NOSIZE = 0x0001, //Binary: 0000 0000 0000 0001 + SWP_NOMOVE = 0x0002, //Binary: 0000 0000 0000 0010 + SWP_NOZORDER = 0x0004, //Binary: 0000 0000 0000 0100 + SWP_DRAWFRAME = 0x0020, //Binary: 0000 0000 0010 0000 + SWP_HIDEWINDOW = 0x0080, //Binary: 0000 0000 1000 0000 + SWP_NOACTIVATE = 0x0010, //Binary: 0000 0000 0001 0000 + SWP_SHOWWINDOW = 0x0040 //Binary: 0000 0000 0100 0000 + } + + public enum WindowToolsAlphaFlag : long + { + LWA_ALPHA = 0x00000002, //Binary: 0000 0000 0000 0000 0000 0000 0000 0010 + LWA_COLORKEY = 0x00000001 //Binary: 0000 0000 0000 0000 0000 0000 0000 0001 + } + + + /// + /// WindowTools 클래스는 Unity 애플리케이션에서 창의 위치, 크기, 스타일 등을 제어하는 기능을 제공합니다. + /// 이 클래스는 Windows API를 활용하여 창의 속성을 변경하며, Unity 환경에서 실행 시 유용한 창 관리 기능을 제공합니다. + /// + public class WindowTools : SingletonApp + { + [Serializable] + public class WindowInfoData + { + public class RectInfo + { + public int x; // 창의 X 좌표 + public int y; // 창의 Y 좌표 + public int width; // 창의 너비 + public int height; // 창의 높이 + } + + [Tooltip("기능 사용 여부")] + public bool use = true;// 창 관리 기능 활성화 여부 + + [Tooltip("창 표시 영역")] + public RectInfo rect = new RectInfo() { x = 0, y = 0, width = 1920, height = 1080 }; // 창의 초기 위치 및 크기 + + [Tooltip("항상 최상위에 놓을지 여부")] + public bool alwaysTop = false; // 창을 항상 최상위로 유지할지 여부 + + [Tooltip("창 테두리 표시 여부")] + public bool showBorder = true; // 창 테두리 표시 여부 + + [Tooltip("첫 실행 시 창 크기, 1:기본, 2:최소화, 3:최대화"), Range(1, 3)] + public int initWindowState = 1; // 창의 초기 상태 (기본, 최소화, 최대화) + + [Tooltip("실행 딜레이 (단위:초)")] + public float startDelay = 0f; // 창 초기화 지연 시간 + + [Tooltip("새 타이틀 명 (비어있으면 반영안됨)")] + public string newTitle = "Octopus"; // 창의 새 제목 + } + + private WindowInfoData WindowInfo = new WindowInfoData(); + + private IntPtr _hwnd; // 창 핸들 + private long _old; // 이전 창 스타일 + private string _filePath; // 파일 경로 + private int screenWidth; // 화면 너비 + private int screenHeight; // 화면 높이 + private int startWidth; // 초기 창 너비 + private int startHeight; // 초기 창 높이 + + /// + /// Unity 애플리케이션 시작 시 창의 초기 위치와 크기를 설정합니다. + /// + private void Start() + { + + DisplayInfo displayInfo = Screen.mainWindowDisplayInfo; + + // 화면 해상도 계산 + screenWidth = int.Parse(displayInfo.workArea.width.ToString()) + 14;// Screen.width; 14:그림자 + screenHeight = int.Parse(displayInfo.workArea.height.ToString()) + 7;// creen.height; 7:그림자 + + startWidth = 350 + 14; + startHeight = 606 + 7; + int centerX = ((screenWidth - startWidth) / 2); + int centerY = ((screenHeight - startHeight) / 2); + + WindowInfo.rect.x = centerX; + WindowInfo.rect.y = centerY; + WindowInfo.rect.width = startWidth; + WindowInfo.rect.height = startHeight; + +#if !UNITY_EDITOR || UNITY_STANDALONE_OSX || UNITY_STANDALONE_WIN + + Screen.MoveMainWindowTo(displayInfo, new Vector2Int(centerX, centerY)); + + + // 창 관리 기능 활성화 시 초기화 수행 + if (WindowInfo.use) + { + StartCoroutine(Initialize()); + } +#endif + } + /// + /// + /// 애플리케이션 종료 시 창의 크기를 저장합니다. + /// + private void OnApplicationQuit() + { + PlayerPrefs.SetInt("Screenmanager Resolution Width", startWidth); + PlayerPrefs.SetInt("Screenmanager Resolution Height", startHeight); + PlayerPrefs.Save(); + } + + //private void Update() + //{ + // if (Input.GetKeyDown(KeyCode.Space)) + // { + // SaveData(); + // } + + // if (Input.GetKeyDown(KeyCode.Q)) + // { + // SetWindowPosition(100, 100); + // } + // if (Input.GetKeyDown(KeyCode.W)) + // { + // SetWindowPosition(0, 0); + // } + // if (Input.GetKeyDown(KeyCode.A)) + // { + // SetWindowSize(800, 600); + // } + // if (Input.GetKeyDown(KeyCode.S)) + // { + // SetWindowSize(1280, 900); + // } + + // if (Input.GetKeyDown(KeyCode.Z)) + // { + // ShowBorder(); + // } + // if (Input.GetKeyDown(KeyCode.X)) + // { + // HideBorder(); + // } + + // if (Input.GetKeyDown(KeyCode.Alpha1)) + // { + // NormalizeWindow(); + // } + // if (Input.GetKeyDown(KeyCode.Alpha2)) + // { + // MinimizeWindow(); + // } + // if (Input.GetKeyDown(KeyCode.Alpha3)) + // { + // MaximizeWindow(); + // } + + // if (Input.GetKeyDown(KeyCode.Alpha4)) + // { + // SetWindowTitle("Window1"); + // } + // if (Input.GetKeyDown(KeyCode.Alpha5)) + // { + // SetWindowTitle("Window2"); + // } + + // if (Input.GetKeyDown(KeyCode.Alpha6)) + // { + // SetAlphaWindow(0.3f); + // } + // if (Input.GetKeyDown(KeyCode.Alpha7)) + // { + // SetAlphaWindow(1f); + // } + //} + + + + /// + /// 창 초기화 작업을 수행합니다. + /// + /// 코루틴 + private IEnumerator Initialize() + { +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + _hwnd = GetWindowHandle();//FindWindow("UnityWndClass", Application.productName); + _old = GetWindowLong(_hwnd, (long)GWLWindowStyles.GWL_STYLE); + + yield return new WaitForSeconds(this.WindowInfo.startDelay); + + + int hWndInsertAfter = (this.WindowInfo.alwaysTop) ? -1 : 0; + Rect winRect = new Rect(WindowInfo.rect.x, WindowInfo.rect.y, WindowInfo.rect.width, WindowInfo.rect.height); + SetActiveWindow(_hwnd); + + if (!WindowInfo.showBorder) + { + SetWindowLong(_hwnd, (int)GWLWindowStyles.GWL_STYLE, 1); + } + + SetWindowPos(_hwnd, hWndInsertAfter, (int)winRect.x, (int)winRect.y, (int)winRect.width, (int)winRect.height, (uint)WindowToolsFlags.SWP_SHOWWINDOW); + + if(!string.IsNullOrEmpty(WindowInfo.newTitle.Trim())) + { + SetWindowTitle(WindowInfo.newTitle); + } + + if(WindowInfo.initWindowState == 2) + { + MinimizeWindow(); + } + else if(WindowInfo.initWindowState == 3) + { + MaximizeWindow(); + } + else + { + NormalizeWindow(); + } +#endif + yield return null; + } + + + /// + /// 윈도우 창의 위치를 지정합니다. + /// + /// 창의 X 좌표 + /// 창의 Y 좌표 + public void SetWindowPosition(int x, int y) + { + WindowInfo.rect.x = x; + WindowInfo.rect.y = y; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + int hWndInsertAfter = (this.WindowInfo.alwaysTop) ? -1 : 0; + SetWindowPos(_hwnd, hWndInsertAfter, x, y, 0, 0, (UInt32)(WindowToolsFlags.SWP_NOSIZE | WindowToolsFlags.SWP_NOZORDER | WindowToolsFlags.SWP_DRAWFRAME)); +#endif + } + + /// + /// 윈도우 창의 크기를 지정합니다. + /// + /// 창의 너비 + /// 창의 높이 + public void SetWindowSize(int w, int h) + { + WindowInfo.rect.width = w; + WindowInfo.rect.height = h; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + int hWndInsertAfter = (this.WindowInfo.alwaysTop) ? -1 : 0; + SetWindowPos(_hwnd, hWndInsertAfter, 0, 0, w, h, (UInt32)(WindowToolsFlags.SWP_NOMOVE | WindowToolsFlags.SWP_NOZORDER | WindowToolsFlags.SWP_DRAWFRAME)); +#endif + } + + /// + /// 윈도우 창의 크기를 화면 해상도에 맞게 최대 크기로 설정합니다. + /// + public void SetWindowMaxSize() + { + SetWindowSize(screenWidth, screenHeight); + } + + /// + /// 윈도우 창의 테두리를 활성화합니다. + /// + public void ShowBorder() + { + this.WindowInfo.showBorder = true; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + SetActiveWindow(_hwnd); + SetWindowLong(_hwnd, (int)GWLWindowStyles.GWL_STYLE, (int)_old); + RefreshWindow(); +#endif + } + + /// + /// 윈도우 창의 테두리를 숨깁니다. + /// + public void HideBorder() + { + this.WindowInfo.showBorder = false; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + SetActiveWindow(_hwnd); + SetWindowLong(_hwnd, (int)GWLWindowStyles.GWL_STYLE, 1); + RefreshWindow(); +#endif + } + + /// + /// 윈도우 창을 새로고침하여 변경 사항을 적용합니다. + /// + private void RefreshWindow() + { +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + int hWndInsertAfter = (this.WindowInfo.alwaysTop) ? -1 : 0; + + Rect2 windowRect = new Rect2(); + GetWindowRect(_hwnd, ref windowRect); + + int screenW = (int)Screen.width; + int screenH = (int)Screen.height; + SetWindowPos(_hwnd, hWndInsertAfter, (int)windowRect.Left, (int)windowRect.Top, screenW, screenH, (int)(WindowToolsFlags.SWP_SHOWWINDOW)); +#endif + } + + //public void SetAlwaysTop(bool alwaysTop) + //{ + // this.WindowInfo.alwaysTop = alwaysTop; + // StopAllCoroutines(); + // StartCoroutine(Init()); + //} + + /// + /// 윈도우 창을 기본 상태로 설정합니다. + /// + public void NormalizeWindow() + { + this.WindowInfo.initWindowState = 1; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + ShowWindowAsync(_hwnd, 1); +#endif + } + + /// + /// 윈도우 창을 최소화합니다. + /// + public void MinimizeWindow() + { + this.WindowInfo.initWindowState = 2; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + ShowWindowAsync(_hwnd, 2); +#endif + } + + /// + /// 윈도우 창을 최대화합니다. + /// + public void MaximizeWindow() + { + this.WindowInfo.initWindowState = 3; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + ShowWindowAsync(_hwnd, 3); +#endif + } + + /// + /// 윈도우 창의 제목을 설정합니다. + /// + /// 새로운 창 제목 + public void SetWindowTitle(string newTitle) + { + this.WindowInfo.newTitle = newTitle; + +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + SetWindowText(_hwnd, newTitle); +#endif + } + + /// + /// 윈도우 창의 투명도를 설정합니다. + /// + /// 투명도 값 (0.0 ~ 1.0) + public void SetAlphaWindow(float opacity) + { +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + opacity = Mathf.Clamp01(opacity); + int alpha = Mathf.RoundToInt(opacity * 255); + SetWindowLong(_hwnd, (int)GWLWindowStyles.GWL_EXSTYLE, GetWindowLong(_hwnd, (long)GWLWindowStyles.GWL_EXSTYLE) | (long)ExtendedWindowStyles.WS_EX_LAYERED); + SetLayeredWindowAttributes(_hwnd, 0, (byte)alpha, (uint)WindowToolsAlphaFlag.LWA_ALPHA); +#endif + } + + /// + /// 메시지 박스를 표시합니다. + /// + /// 메시지 박스 제목 + /// 메시지 내용 + /// 메시지 박스 유형 (AbortRetryIgnore, CancelTryContinue, Help, OK, OkCancel, RetryCancel, YesNo, YesNoCancel) + /// 사용자가 선택한 버튼의 결과 (OK, CANCEL, ABORT, RETRY, IGNORE, YES, NO, TRY AGAIN) + public static string Alert(string title, string message, string type = "OK") + { + //#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + try + { + string DialogResult = string.Empty; + uint MB_ABORTRETRYIGNORE = (uint)(0x00000002L | 0x00000010L); + uint MB_CANCELTRYCONTINUE = (uint)(0x00000006L | 0x00000030L); + uint MB_HELP = (uint)(0x00004000L | 0x00000040L); + uint MB_OK = (uint)(0x00000000L | 0x00000040L); + uint MB_OKCANCEL = (uint)(0x00000001L | 0x00000040L); + uint MB_RETRYCANCEL = (uint)0x00000005L; + uint MB_YESNO = (uint)(0x00000004L | 0x00000040L); + uint MB_YESNOCANCEL = (uint)(0x00000003L | 0x00000040L); + int intresult = -1; + string strResult = string.Empty; + + switch (type) + { + case "AbortRetryIgnore": + intresult = MessageBox(GetWindowHandle(), message, title, MB_ABORTRETRYIGNORE); + break; + case "CancelTryContinue": + intresult = MessageBox(GetWindowHandle(), message, title, MB_CANCELTRYCONTINUE); + break; + case "Help": + intresult = MessageBox(GetWindowHandle(), message, title, MB_HELP); + break; + case "OK": + intresult = MessageBox(GetWindowHandle(), message, title, MB_OK); + break; + case "OkCancel": + intresult = MessageBox(GetWindowHandle(), message, title, MB_OKCANCEL); + break; + case "RetryCancel": + intresult = MessageBox(GetWindowHandle(), message, title, MB_RETRYCANCEL); + break; + case "YesNo": + intresult = MessageBox(GetWindowHandle(), message, title, MB_YESNO); + break; + case "YesNoCancel": + intresult = MessageBox(GetWindowHandle(), message, title, MB_YESNOCANCEL); + break; + default: + intresult = MessageBox(GetWindowHandle(), message, title, (uint)(0x00000000L | 0x00000010L)); + break; + } + + switch (intresult) + { + case 1: + strResult = "OK"; + break; + case 2: + strResult = "CANCEL"; + break; + case 3: + strResult = "ABORT"; + break; + case 4: + strResult = "RETRY"; + break; + case 5: + strResult = "IGNORE"; + break; + case 6: + strResult = "YES"; + break; + case 7: + strResult = "NO"; + break; + case 10: + strResult = "TRY AGAIN"; + break; + default: + strResult = "OK"; + break; + + } + + return strResult; + } + catch (Exception ex) + { + return string.Empty; + } + //#endif + } + + + private static System.IntPtr GetWindowHandle() + { + return GetActiveWindow(); + } + + #region User32 +#if UNITY_STANDALONE_WIN && !UNITY_EDITOR + [DllImport("user32.dll", SetLastError = true)] + static extern IntPtr FindWindow(string lpClassName, string lpWindowName); + + [DllImport("user32.dll", EntryPoint = "FindWindow", SetLastError = true)] + static extern IntPtr FindWindowByCaption(IntPtr ZeroOnly, string lpWindowName); + + [DllImport("user32.dll")] + static extern bool SetWindowPos(IntPtr hWnd, IntPtr hWndInsertAfter, int X, int Y, int cx, int cy, uint uFlags); + + [DllImport("user32.dll")] + static extern IntPtr GetForegroundWindow(); + + [DllImport("user32.dll")] + static extern long GetWindowText(IntPtr hWnd, StringBuilder text, int count); + + [DllImport("user32.dll")] + static extern bool SetWindowText(System.IntPtr hwnd, System.String lpString); + + [DllImport("user32.dll")] + static extern IntPtr SetWindowLong(IntPtr hwnd, long nIndex, long dwNewLong); + + [DllImport("user32.dll")] + static extern IntPtr SetWindowLong(IntPtr hwnd, int _nIndex, int dwNewLong); + + [DllImport("user32.dll")] + static extern bool ShowWindowAsync(IntPtr hWnd, int nCmdShow); + + [DllImport("user32.dll")] + static extern bool SetLayeredWindowAttributes(IntPtr hwnd, uint crKey, byte bAlpha, uint dwFlags); + + [DllImport("user32.dll")] + static extern long GetWindowLong(IntPtr hwnd, long nIndex); + + [DllImport("user32.dll")] + static extern bool SetWindowPos(IntPtr hWnd, int hWndInsertAfter, int X, int Y, int cx, int cy, uint uFlags); + + [DllImport("user32")] + static extern int SetActiveWindow(IntPtr hwnd); + + + [DllImport("user32.dll")] + static extern bool GetWindowRect(IntPtr hwnd, ref Rect2 rectangle); + + + + public struct Rect2 + { + public int Left { get; set; } + public int Top { get; set; } + public int Right { get; set; } + public int Bottom { get; set; } + } +#endif + + [DllImport("user32.dll")] + static extern IntPtr GetActiveWindow(); + + [DllImport("user32.dll", CharSet = CharSet.Unicode, SetLastError = true)] + static extern int MessageBox(IntPtr hwnd, String lpText, String lpCaption, uint uType); + #endregion + } +} \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/WindowTools.cs.meta b/Assets/Scripts/UVC/util/WindowTools.cs.meta new file mode 100644 index 00000000..b0e0f6aa --- /dev/null +++ b/Assets/Scripts/UVC/util/WindowTools.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 7db14290c261fca4483a39761e5bd49f \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/XmlDataUtil.cs b/Assets/Scripts/UVC/util/XmlDataUtil.cs new file mode 100644 index 00000000..670e2d0e --- /dev/null +++ b/Assets/Scripts/UVC/util/XmlDataUtil.cs @@ -0,0 +1,333 @@ +using System; +using System.Collections; +using System.IO; +using System.Linq; +using System.Xml; +using System.Xml.Linq; +using System.Xml.Serialization; +using UnityEngine; +using UnityEngine.Networking; + +namespace UVC.Util +{ + /// + /// XML 데이터 처리 유틸리티 클래스 + /// + public class XmlDataUtil : MonoBehaviour + { + private static XmlDataUtil __instance = null; + + public static XmlDataUtil Instance + { + get + { + if(__instance == null) + { + __instance = new GameObject("_XmlDataUtil").AddComponent(); + } + return __instance; + } + } + + + private void Awake() + { + DontDestroyOnLoad(gameObject); + } + + + /// + /// 데이터 직렬화 + XML 파일 저장 + /// + /// 저장될 파일 경로 + /// 직렬화할 데이터 + /// + /// + /// var data = new MyData { Name = "Test", Age = 25 }; + /// XmlDataUtil.Instance.SerializeXmlData("path/to/file.xml", data); + /// + /// + public void SerializeXmlData(string filePath, object data) + { + Debug.Log("SerializeXmlData"); + + XmlSerializer serializer = new XmlSerializer(data.GetType()); + + using (TextWriter writer = new StreamWriter(filePath)) + { + serializer.Serialize(writer, data); + } + } + + /// + /// 데이터 비직렬화 + XML 파일 로드 + /// + /// 비직렬화할 데이터 타입 + /// XML 파일 경로 + /// 로드 완료 후 실행할 콜백 + /// + /// + /// XmlDataUtil.Instance.DeserializeXmlData("path/to/file.xml", (data) => + /// { + /// Debug.Log($"Name: {data.Name}, Age: {data.Age}"); + /// }); + /// + /// + public void DeserializeXmlData(string filePath, Action completeAction) + { + XmlSerializer serializer = new XmlSerializer(typeof(T)); + + using (FileStream fs = new FileStream(filePath, FileMode.Open)) + { + XmlReader reader = XmlReader.Create(fs); + + if (completeAction != null) + { + completeAction.Invoke((T)serializer.Deserialize(reader)); + } + } + } + + /// + /// XML 데이터 저장 + /// + /// 저장될 파일 경로 + /// 저장할 데이터 + /// + /// + /// var data = new MyData { Name = "Test", Age = 25 }; + /// XmlDataUtil.Instance.SaveXmlData("path/to/file.xml", data); + /// + /// + public void SaveXmlData(string filePath, object data) + { + //Debug.Log(filePath + " , " + data); + //Debug.Log("File.Exist: " + File.Exists(filePath)); + + if (data == null) return; + + //파일이 있으면 기존 파일 로드 후 수정 + if(File.Exists(filePath)) + { + StartCoroutine(LoadXml(filePath, (XDocument xdoc) => + { + //Debug.Log(xdoc.ToString()); + + UpdateData(xdoc, data, (isChanged, isDataError) => + { + //Debug.Log("isChanged: " + isChanged + " , isDataError: " + isDataError); + + if (isChanged && !isDataError) + { + xdoc.Save(filePath); + Debug.Log("SaveXmlData!"); + } + else if (isDataError) + { + Debug.Log("XML 데이터 노드 순서가 잘못되었다.! 다시 강제로 직렬화한다."); + SerializeXmlData(filePath, data); + } + }); + })); + } + //파일이 없으면 새롭게 직렬화, 저장 + else + { + SerializeXmlData(filePath, data); + } + } + + /// + /// XML 데이터 로드 + /// + /// XML 파일 경로 + /// 로드 완료 이벤트 핸들러 + /// 에러 핸들러 + /// 코루틴 + /// + /// + /// StartCoroutine(XmlDataUtil.Instance.LoadXml("path/to/file.xml", (xdoc) => + /// { + /// Debug.Log(xdoc.ToString()); + /// }, (error) => + /// { + /// Debug.LogError(error); + /// })); + /// + /// + public IEnumerator LoadXml(string filePath, Action OnLoadComplete, Action OnError = null) + { + if (!filePath.Contains("://")) + { + filePath = "file://" + filePath; + } + using (UnityWebRequest www = UnityWebRequest.Get(filePath)) + { + www.timeout = 5;//5초 + yield return www.SendWebRequest(); + + if (www.isNetworkError || www.isHttpError) + { + if (OnError != null) + { + OnError(www.error); + } + } + else + { + using (MemoryStream memStream = new MemoryStream()) + { + memStream.Write(www.downloadHandler.data, 0, www.downloadHandler.data.Length); + memStream.Position = 0; + + XmlReader reader = XmlReader.Create(memStream); + XDocument xdoc = XDocument.Load(reader); + + if (OnLoadComplete != null) + { + OnLoadComplete(xdoc); + } + } + } + } + } + + /// + /// XML 데이터를 비직렬화하여 로드합니다. + /// + /// 비직렬화할 데이터 타입 + /// XML 파일 경로 + /// 로드 완료 후 실행할 콜백 (비직렬화된 데이터 전달) + /// 에러 발생 시 실행할 콜백 (에러 메시지 전달) + /// 코루틴 + /// + /// + /// StartCoroutine(XmlDataUtil.Instance.LoadXml("path/to/file.xml", (data) => + /// { + /// Debug.Log($"Name: {data.Name}, Age: {data.Age}"); + /// }, (error) => + /// { + /// Debug.LogError($"Error loading XML: {error}"); + /// })); + /// + /// + [Obsolete] + public IEnumerator LoadXml(string filePath, Action OnLoadComplete, Action OnError = null) + { + if (!filePath.Contains("://")) + { + filePath = "file://" + filePath; + } + using (UnityWebRequest www = UnityWebRequest.Get(filePath)) + { + www.timeout = 5;//5초 + yield return www.SendWebRequest(); + + if (www.isNetworkError || www.isHttpError) + { + if (OnError != null) + { + OnError(www.error); + } + } + else + { + + using (MemoryStream memStream = new MemoryStream()) + { + memStream.Write(www.downloadHandler.data, 0, www.downloadHandler.data.Length); + memStream.Position = 0; + + XmlSerializer serializer = new XmlSerializer(typeof(T)); + XmlReader reader = XmlReader.Create(memStream); + T result = (T)serializer.Deserialize(reader); + + if (OnLoadComplete != null) + { + OnLoadComplete(result); + } + } + } + } + } + + + private void UpdateData(XDocument xdoc, object data, Action OnComplete) + { + XmlSerializer xmlSerializer = new XmlSerializer(data.GetType()); + using (StringWriter textWriter = new StringWriter()) + { + xmlSerializer.Serialize(textWriter, data); + var currentData = XElement.Parse(textWriter.ToString()); + bool isChanged = false; + bool isDataError = false; + + var currentItemList = currentData.Descendants().ToList(); + var originItemList = xdoc.Root.Descendants().ToList(); + + foreach (var currentItem in currentItemList) + { + foreach (var originItem in originItemList) + { + if (currentItemList.IndexOf(currentItem) == originItemList.IndexOf(originItem)) + { + if (currentItem.Name.Equals(originItem.Name)) + { + if (!currentItem.Value.Equals(originItem.Value) && !originItem.HasElements) + { + originItem.SetValue(currentItem.Value); + isChanged = true; + } + + foreach (var currentAtt in currentItem.Attributes()) + { + foreach (var originAtt in originItem.Attributes()) + { + if (!currentAtt.Value.Equals(originAtt.Value)) + { + originAtt.SetValue(currentAtt.Value); + isChanged = true; + } + } + } + } + else + { + isDataError = true; + break; + } + } + } + } + + if(OnComplete != null) + { + OnComplete(isChanged, isDataError); + } + } + } + + /// + /// XML 데이터를 문자열로 직렬화 + /// + /// 직렬화할 객체 + /// XML 문자열 + /// + /// + /// var xmlString = XmlDataUtil.ToXmlString(new MyData { Name = "Test", Age = 25 }); + /// Debug.Log(xmlString); + /// + /// + public static string ToXmlString(object toSerialize) + { + XmlSerializer xmlSerializer = new XmlSerializer(toSerialize.GetType()); + + using (StringWriter textWriter = new StringWriter()) + { + xmlSerializer.Serialize(textWriter, toSerialize); + return textWriter.ToString(); + } + } + + } +} diff --git a/Assets/Scripts/UVC/util/XmlDataUtil.cs.meta b/Assets/Scripts/UVC/util/XmlDataUtil.cs.meta new file mode 100644 index 00000000..78cbb86c --- /dev/null +++ b/Assets/Scripts/UVC/util/XmlDataUtil.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 6852d598b0f731548ac4b408f055c8aa \ No newline at end of file diff --git a/Assets/Scripts/UVC/util/Zipper.cs b/Assets/Scripts/UVC/util/Zipper.cs new file mode 100644 index 00000000..fa88dcc4 --- /dev/null +++ b/Assets/Scripts/UVC/util/Zipper.cs @@ -0,0 +1,247 @@ +using Cysharp.Threading.Tasks; +using System; + +namespace UVC.Util +{ + /// + /// Zipper 클래스는 압축 파일(Zip 및 7z)의 압축 해제 기능을 제공합니다. + /// 7zip 라이브러리를 사용하며, 압축 해제 진행률을 실시간으로 추적할 수 있습니다. + /// 7zip 사용. https://assetstore.unity.com/packages/tools/input-management/7zip-lzma-lz4-fastlz-zip-gzip-brotli-multiplatform-plugins-12674 + /// + public class Zipper + { + + // zip 보관 파일을 압축하지 않은 현재 파일 수로 변경하는 단일 항목 정수 배열입니다. + // decompress_File 기능을 실행할 때 getTotalFiles 기능으로 반환된 총 파일 수와 이 int를 비교하여 zip에 여러 개의 파일이 포함된 경우 추출의 진행 상황을 파악한다. + // 여러 개의 스레드를 사용하는 경우 다른 스레드에 다른 진행 정수를 사용해야 합니다.그렇지 않으면 공유 위반이 발생합니다. + private int[] progress; + + /// + /// 개별 파일의 압축 해제 진행률(바이트 단위)을 나타내는 배열입니다. + /// + private ulong[] progress2; + /// + /// 압축 파일의 경로를 저장합니다. + /// + private string zipFilePath; + /// + /// 압축 해제가 완료되었는지 여부를 나타냅니다. + /// + private bool isComplete = false; + /// + /// 압축 해제 진행률(0.0 ~ 1.0)을 나타냅니다. + /// + private float percent = 0; + /// + /// 압축 해제 진행 상황을 콜백으로 전달하는 액션입니다. + /// + private Action OnProgress; + + + /// + /// 압축 파일을 해제합니다. + /// 파일 형식(Zip 또는 7z)에 따라 적절한 메서드를 호출합니다. + /// + /// 압축 파일 경로 + /// 압축 해제 대상 폴더 경로 + /// 압축 해제 진행 상황을 전달하는 콜백 + /// 압축 해제 결과 메시지 + /// + /// Zipper zipper = new Zipper(); + /// string result = await zipper.Decompress("path/to/file.zip", "path/to/output", (current, total, percent) => + /// { + /// Debug.Log($"Progress: {percent * 100}%"); + /// }); + /// if (result == null) + /// { + /// Debug.Log("Decompression successful!"); + /// } + /// else + /// { + /// Debug.LogError($"Decompression failed: {result}"); + /// } + /// + public async UniTask Decompress(string zipFilePath, string decompressFolderPath, Action OnProgress) + { + if (zipFilePath.ToLower().Contains(".zip")) + { + return await DecompressZip(zipFilePath, decompressFolderPath, OnProgress); + } + else if (zipFilePath.ToLower().Contains(".7z")) + { + return await Decompress7Zip(zipFilePath, decompressFolderPath, OnProgress); + } + return "Unsupported compressed file"; + } + + /// + /// Zip 파일을 압축 해제합니다. + /// + /// 압축 파일 경로 + /// 압축 해제 대상 폴더 경로 + /// 압축 해제 진행 상황을 전달하는 콜백 + /// 압축 해제 결과 메시지 + /// + /// Zipper zipper = new Zipper(); + /// string result = await zipper.DecompressZip("path/to/file.zip", "path/to/output", (current, total, percent) => + /// { + /// Debug.Log($"Progress: {percent * 100}%"); + /// }); + /// if (result == null) + /// { + /// Debug.Log("Decompression successful!"); + /// } + /// else + /// { + /// Debug.LogError($"Decompression failed: {result}"); + /// } + /// + public async UniTask DecompressZip(string zipFilePath, string decompressFolderPath, Action OnProgress) + { + progress = new int[1]; + progress2 = new ulong[1]; + isComplete = false; + this.zipFilePath = zipFilePath; + this.OnProgress = OnProgress; + + if (lzip.validateFile(zipFilePath)) + { + //getFileInfo zip 내의 콘텐츠의 총 압축되지 않은 바이트를 반환한다. + ulong totalBytes = lzip.getFileInfo(zipFilePath); + CountPercentZipAsync(totalBytes).Forget(); + int result = await UniTask.RunOnThreadPool(() => + { + return lzip.decompress_File(zipFilePath, decompressFolderPath, progress, null, progress2); + }); + isComplete = true; + if (result == 1) //success + { + return null; + } + else + { + //-1 = could not initialize zip archive. + //-2 = failed extraction + //- 6 = IntPtr buffer had no valid buffer length parameter passed. + string errorMessage = "Unknown error"; + if (result == -1) errorMessage = "could not initialize zip archive."; + else if (result == -2) errorMessage = "failed extraction."; + else if (result == -6) errorMessage = "IntPtr buffer had no valid buffer length parameter passed."; + return errorMessage; + } + } + + return "invalidate File"; + } + + /// + /// Zip 파일의 압축 해제 진행률을 계산합니다. + /// + /// 압축 해제 대상 파일의 총 바이트 수 + private async UniTaskVoid CountPercentZipAsync(ulong totalBytes) + { + + percent = (float)progress2[0] / (float)totalBytes; + + //Debug.Log($"CountPercentAsync totalBytes:{totalBytes} progress:{progress[0]} progress2:{progress2[0]} {percent}"); + if (OnProgress != null) OnProgress((long)progress2[0], (long)totalBytes, percent); + if (percent == 1) isComplete = true; + if (!isComplete) + { + await UniTask.Delay(TimeSpan.FromMilliseconds(100));//0.1초에 한번씩 + CountPercentZipAsync(totalBytes).Forget(); + } + } + + /// + /// 7z 파일을 압축 해제합니다. + /// + /// 압축 파일 경로 + /// 압축 해제 대상 폴더 경로 + /// 압축 해제 진행 상황을 전달하는 콜백 + /// 압축 해제 결과 메시지 + /// + /// Zipper zipper = new Zipper(); + /// string result = await zipper.Decompress7Zip("path/to/file.7z", "path/to/output", (current, total, percent) => + /// { + /// Debug.Log($"Progress: {percent * 100}%"); + /// }); + /// if (result == null) + /// { + /// Debug.Log("Decompression successful!"); + /// } + /// else + /// { + /// Debug.LogError($"Decompression failed: {result}"); + /// } + /// + public async UniTask Decompress7Zip(string zipFilePath, string decompressFolderPath, Action OnProgress) + { + progress = new int[1] { 0 }; + isComplete = false; + this.zipFilePath = zipFilePath; + this.OnProgress = OnProgress; + + // 참조된 progress int는 압축 해제 중인 파일의 현재 인덱스를 나타냅니다. 별도의 스레드에서 사용하여 실시간으로 표시합니다. + // (thread에서) 실시간 바이트 레벨 압축해제 진행을 얻기 위해서는 두 가지 방법이 있습니다. + // 1. lzma.get7zSize 함수를 사용하여 파일의 총 압축되지 않은 크기를 구하고 lzma.getBytesWritten 함수를 호출하여 실시간으로 작성된 바이트들과 비교한다. + // 2. lzma.getFileSize(또는 FileBuffers의 버퍼 길이)를 사용하여 파일 크기를 구하고 lzma.getBytesRead 기능을 호출하여 실시간으로 읽는 바이트들과 비교한다. + //FileInfo fileInfo = new(zipFilePath); + //FileSecurity fsecurity = fileInfo.GetAccessControl(); + //var id = System.Security.Principal.WindowsIdentity.GetCurrent().Name.Trim(); + //var name = id.Split("\\"); + //fsecurity.AddAccessRule(new FileSystemAccessRule(new NTAccount(name[1]), FileSystemRights.FullControl, InheritanceFlags.ObjectInherit | InheritanceFlags.ContainerInherit, PropagationFlags.None, AccessControlType.Allow)); + //fileInfo.SetAccessControl(fsecurity); + long totalBytes = lzma.getFileSize(zipFilePath); + CountPercent7ZipAsync(totalBytes, true).Forget(); + int result = await UniTask.RunOnThreadPool(() => + { + return lzma.doDecompress7zip(zipFilePath, decompressFolderPath, progress, true, true); + }); + isComplete = true; + if (result == 1) //success + { + return null; + } + else + { + //1 : OK + //2 : Could not find requested file in archive + //- 1 : Could not open input(7z) file + //- 2 : Decoder doesn't support this archive + //- 3 : Can not allocate memory + //-5 : Unknown error + //-6 : File IO error + string errorMessage = "Unknown error"; + if (result == 2) errorMessage = "Could not find requested file in archive"; + else if (result == -1) errorMessage = "Could not open input(7z) file"; + else if (result == -2) errorMessage = "Decoder doesn't support this archive"; + else if (result == -3) errorMessage = "Can not allocate memory"; + else if (result == -6) errorMessage = "File IO error"; + return errorMessage; + } + } + + /// + /// 7z 파일의 압축 해제 진행률을 계산합니다. + /// + /// 압축 해제 대상 파일의 총 바이트 수 + /// 첫 번째 호출 여부 + private async UniTaskVoid CountPercent7ZipAsync(long totalBytes, bool isFirst = false) + { + if (!isFirst) + { + long readByted = (long)lzma.getBytesRead(); + percent = (float)readByted / (float)totalBytes; + //Debug.Log($"CountPercent7ZipAsync totalBytes:{totalBytes} progress:{progress}"); + if (OnProgress != null) OnProgress(readByted, totalBytes, percent); + if (percent == 1) isComplete = true; + } + if (!isComplete) + { + await UniTask.Delay(TimeSpan.FromMilliseconds(100));//0.1초에 한번씩 + CountPercent7ZipAsync(totalBytes).Forget(); + } + } + } +} diff --git a/Assets/Scripts/UVC/util/Zipper.cs.meta b/Assets/Scripts/UVC/util/Zipper.cs.meta new file mode 100644 index 00000000..46e0b66d --- /dev/null +++ b/Assets/Scripts/UVC/util/Zipper.cs.meta @@ -0,0 +1,2 @@ +fileFormatVersion: 2 +guid: 2814ffe18bfd10a48b2fc4f027b6046b \ No newline at end of file diff --git a/Assets/Settings.meta b/Assets/Settings.meta new file mode 100644 index 00000000..39b94dd7 --- /dev/null +++ b/Assets/Settings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 709f11a7f3c4041caa4ef136ea32d874 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/DefaultVolumeProfile.asset b/Assets/Settings/DefaultVolumeProfile.asset new file mode 100644 index 00000000..6fb18220 --- /dev/null +++ b/Assets/Settings/DefaultVolumeProfile.asset @@ -0,0 +1,982 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &-9167874883656233139 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5485954d14dfb9a4c8ead8edb0ded5b1, type: 3} + m_Name: LiftGammaGain + m_EditorClassIdentifier: + active: 1 + lift: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} + gamma: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} + gain: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} +--- !u!114 &-8270506406425502121 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 70afe9e12c7a7ed47911bb608a23a8ff, type: 3} + m_Name: SplitToning + m_EditorClassIdentifier: + active: 1 + shadows: + m_OverrideState: 1 + m_Value: {r: 0.5, g: 0.5, b: 0.5, a: 1} + highlights: + m_OverrideState: 1 + m_Value: {r: 0.5, g: 0.5, b: 0.5, a: 1} + balance: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-8104416584915340131 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 0} + m_Name: CopyPasteTestComponent2 + m_EditorClassIdentifier: Unity.RenderPipelines.Core.Editor.Tests:UnityEditor.Rendering.Tests:VolumeComponentCopyPasteTests/CopyPasteTestComponent2 + active: 1 + p1: + m_OverrideState: 1 + m_Value: 0 + p2: + m_OverrideState: 1 + m_Value: 0 + p21: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-7750755424749557576 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 60f3b30c03e6ba64d9a27dc9dba8f28d, type: 3} + m_Name: OutlineVolumeComponent + m_EditorClassIdentifier: + active: 1 + Enabled: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-7743500325797982168 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ccf1aba9553839d41ae37dd52e9ebcce, type: 3} + m_Name: MotionBlur + m_EditorClassIdentifier: + active: 1 + mode: + m_OverrideState: 1 + m_Value: 0 + quality: + m_OverrideState: 1 + m_Value: 0 + intensity: + m_OverrideState: 1 + m_Value: 0 + clamp: + m_OverrideState: 1 + m_Value: 0.05 +--- !u!114 &-7274224791359825572 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 0fd9ee276a1023e439cf7a9c393195fa, type: 3} + m_Name: TestAnimationCurveVolumeComponent + m_EditorClassIdentifier: + active: 1 + testParameter: + m_OverrideState: 1 + m_Value: + serializedVersion: 2 + m_Curve: + - serializedVersion: 3 + time: 0.5 + value: 10 + inSlope: 0 + outSlope: 10 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + - serializedVersion: 3 + time: 1 + value: 15 + inSlope: 10 + outSlope: 0 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 +--- !u!114 &-6335409530604852063 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 66f335fb1ffd8684294ad653bf1c7564, type: 3} + m_Name: ColorAdjustments + m_EditorClassIdentifier: + active: 1 + postExposure: + m_OverrideState: 1 + m_Value: 0 + contrast: + m_OverrideState: 1 + m_Value: 0 + colorFilter: + m_OverrideState: 1 + m_Value: {r: 1, g: 1, b: 1, a: 1} + hueShift: + m_OverrideState: 1 + m_Value: 0 + saturation: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-6288072647309666549 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 29fa0085f50d5e54f8144f766051a691, type: 3} + m_Name: FilmGrain + m_EditorClassIdentifier: + active: 1 + type: + m_OverrideState: 1 + m_Value: 0 + intensity: + m_OverrideState: 1 + m_Value: 0 + response: + m_OverrideState: 1 + m_Value: 0.8 + texture: + m_OverrideState: 1 + m_Value: {fileID: 0} +--- !u!114 &-5520245016509672950 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 97c23e3b12dc18c42a140437e53d3951, type: 3} + m_Name: Tonemapping + m_EditorClassIdentifier: + active: 1 + mode: + m_OverrideState: 1 + m_Value: 0 + neutralHDRRangeReductionMode: + m_OverrideState: 1 + m_Value: 2 + acesPreset: + m_OverrideState: 1 + m_Value: 3 + hueShiftAmount: + m_OverrideState: 1 + m_Value: 0 + detectPaperWhite: + m_OverrideState: 1 + m_Value: 0 + paperWhite: + m_OverrideState: 1 + m_Value: 300 + detectBrightnessLimits: + m_OverrideState: 1 + m_Value: 1 + minNits: + m_OverrideState: 1 + m_Value: 0.005 + maxNits: + m_OverrideState: 1 + m_Value: 1000 +--- !u!114 &-5360449096862653589 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 0} + m_Name: VolumeComponentSupportedEverywhere + m_EditorClassIdentifier: Unity.RenderPipelines.Core.Editor.Tests:UnityEngine.Rendering.Tests:VolumeComponentEditorSupportedOnTests/VolumeComponentSupportedEverywhere + active: 1 +--- !u!114 &-5139089513906902183 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5a00a63fdd6bd2a45ab1f2d869305ffd, type: 3} + m_Name: OasisFogVolumeComponent + m_EditorClassIdentifier: + active: 1 + Density: + m_OverrideState: 1 + m_Value: 0 + StartDistance: + m_OverrideState: 1 + m_Value: 0 + HeightRange: + m_OverrideState: 1 + m_Value: {x: 0, y: 50} + Tint: + m_OverrideState: 1 + m_Value: {r: 1, g: 1, b: 1, a: 1} + SunScatteringIntensity: + m_OverrideState: 1 + m_Value: 2 +--- !u!114 &-4463884970436517307 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fb60a22f311433c4c962b888d1393f88, type: 3} + m_Name: PaniniProjection + m_EditorClassIdentifier: + active: 1 + distance: + m_OverrideState: 1 + m_Value: 0 + cropToFit: + m_OverrideState: 1 + m_Value: 1 +--- !u!114 &-1410297666881709256 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 6bd486065ce11414fa40e631affc4900, type: 3} + m_Name: ProbeVolumesOptions + m_EditorClassIdentifier: + active: 1 + normalBias: + m_OverrideState: 1 + m_Value: 0.33 + viewBias: + m_OverrideState: 1 + m_Value: 0 + scaleBiasWithMinProbeDistance: + m_OverrideState: 1 + m_Value: 0 + samplingNoise: + m_OverrideState: 1 + m_Value: 0.1 + animateSamplingNoise: + m_OverrideState: 1 + m_Value: 1 + leakReductionMode: + m_OverrideState: 1 + m_Value: 1 + minValidDotProductValue: + m_OverrideState: 1 + m_Value: 0.1 + occlusionOnlyReflectionNormalization: + m_OverrideState: 1 + m_Value: 1 + intensityMultiplier: + m_OverrideState: 1 + m_Value: 1 + skyOcclusionIntensityMultiplier: + m_OverrideState: 1 + m_Value: 1 +--- !u!114 &-1216621516061285780 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 0b2db86121404754db890f4c8dfe81b2, type: 3} + m_Name: Bloom + m_EditorClassIdentifier: + active: 1 + skipIterations: + m_OverrideState: 1 + m_Value: 1 + threshold: + m_OverrideState: 1 + m_Value: 0.9 + intensity: + m_OverrideState: 1 + m_Value: 0 + scatter: + m_OverrideState: 1 + m_Value: 0.7 + clamp: + m_OverrideState: 1 + m_Value: 65472 + tint: + m_OverrideState: 1 + m_Value: {r: 1, g: 1, b: 1, a: 1} + highQualityFiltering: + m_OverrideState: 1 + m_Value: 0 + downscale: + m_OverrideState: 1 + m_Value: 0 + maxIterations: + m_OverrideState: 1 + m_Value: 6 + dirtTexture: + m_OverrideState: 1 + m_Value: {fileID: 0} + dimension: 1 + dirtIntensity: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-1170528603972255243 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 221518ef91623a7438a71fef23660601, type: 3} + m_Name: WhiteBalance + m_EditorClassIdentifier: + active: 1 + temperature: + m_OverrideState: 1 + m_Value: 0 + tint: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &-581120513425526550 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 0} + m_Name: CopyPasteTestComponent3 + m_EditorClassIdentifier: Unity.RenderPipelines.Core.Editor.Tests:UnityEditor.Rendering.Tests:VolumeComponentCopyPasteTests/CopyPasteTestComponent3 + active: 1 + p1: + m_OverrideState: 1 + m_Value: 0 + p2: + m_OverrideState: 1 + m_Value: 0 + p31: + m_OverrideState: 1 + m_Value: {r: 0, g: 0, b: 0, a: 1} +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: d7fd9488000d3734a9e00ee676215985, type: 3} + m_Name: DefaultVolumeProfile + m_EditorClassIdentifier: + components: + - {fileID: -9167874883656233139} + - {fileID: 1918650496244738858} + - {fileID: 853819529557874667} + - {fileID: 1052315754049611418} + - {fileID: -1170528603972255243} + - {fileID: -8270506406425502121} + - {fileID: -5520245016509672950} + - {fileID: 7173750748008157695} + - {fileID: 1666464333004379222} + - {fileID: 9001657382290151224} + - {fileID: -6335409530604852063} + - {fileID: -1216621516061285780} + - {fileID: 3959858460715838825} + - {fileID: -7743500325797982168} + - {fileID: 4644742534064026673} + - {fileID: -4463884970436517307} + - {fileID: -6288072647309666549} + - {fileID: 7518938298396184218} + - {fileID: -1410297666881709256} + - {fileID: -7750755424749557576} + - {fileID: -5139089513906902183} +--- !u!114 &853819529557874667 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 06437c1ff663d574d9447842ba0a72e4, type: 3} + m_Name: ScreenSpaceLensFlare + m_EditorClassIdentifier: + active: 1 + intensity: + m_OverrideState: 1 + m_Value: 0 + tintColor: + m_OverrideState: 1 + m_Value: {r: 1, g: 1, b: 1, a: 1} + bloomMip: + m_OverrideState: 1 + m_Value: 1 + firstFlareIntensity: + m_OverrideState: 1 + m_Value: 1 + secondaryFlareIntensity: + m_OverrideState: 1 + m_Value: 1 + warpedFlareIntensity: + m_OverrideState: 1 + m_Value: 1 + warpedFlareScale: + m_OverrideState: 1 + m_Value: {x: 1, y: 1} + samples: + m_OverrideState: 1 + m_Value: 1 + sampleDimmer: + m_OverrideState: 1 + m_Value: 0.5 + vignetteEffect: + m_OverrideState: 1 + m_Value: 1 + startingPosition: + m_OverrideState: 1 + m_Value: 1.25 + scale: + m_OverrideState: 1 + m_Value: 1.5 + streaksIntensity: + m_OverrideState: 1 + m_Value: 0 + streaksLength: + m_OverrideState: 1 + m_Value: 0.5 + streaksOrientation: + m_OverrideState: 1 + m_Value: 0 + streaksThreshold: + m_OverrideState: 1 + m_Value: 0.25 + resolution: + m_OverrideState: 1 + m_Value: 4 + chromaticAbberationIntensity: + m_OverrideState: 1 + m_Value: 0.5 +--- !u!114 &1052315754049611418 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 558a8e2b6826cf840aae193990ba9f2e, type: 3} + m_Name: ShadowsMidtonesHighlights + m_EditorClassIdentifier: + active: 1 + shadows: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} + midtones: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} + highlights: + m_OverrideState: 1 + m_Value: {x: 1, y: 1, z: 1, w: 0} + shadowsStart: + m_OverrideState: 1 + m_Value: 0 + shadowsEnd: + m_OverrideState: 1 + m_Value: 0.3 + highlightsStart: + m_OverrideState: 1 + m_Value: 0.55 + highlightsEnd: + m_OverrideState: 1 + m_Value: 1 +--- !u!114 &1666464333004379222 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3eb4b772797da9440885e8bd939e9560, type: 3} + m_Name: ColorCurves + m_EditorClassIdentifier: + active: 1 + master: + m_OverrideState: 1 + m_Value: + k__BackingField: 2 + m_Loop: 0 + m_ZeroValue: 0 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: + - serializedVersion: 3 + time: 0 + value: 0 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + - serializedVersion: 3 + time: 1 + value: 1 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + red: + m_OverrideState: 1 + m_Value: + k__BackingField: 2 + m_Loop: 0 + m_ZeroValue: 0 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: + - serializedVersion: 3 + time: 0 + value: 0 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + - serializedVersion: 3 + time: 1 + value: 1 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + green: + m_OverrideState: 1 + m_Value: + k__BackingField: 2 + m_Loop: 0 + m_ZeroValue: 0 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: + - serializedVersion: 3 + time: 0 + value: 0 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + - serializedVersion: 3 + time: 1 + value: 1 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + blue: + m_OverrideState: 1 + m_Value: + k__BackingField: 2 + m_Loop: 0 + m_ZeroValue: 0 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: + - serializedVersion: 3 + time: 0 + value: 0 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + - serializedVersion: 3 + time: 1 + value: 1 + inSlope: 1 + outSlope: 1 + tangentMode: 0 + weightedMode: 0 + inWeight: 0 + outWeight: 0 + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + hueVsHue: + m_OverrideState: 1 + m_Value: + k__BackingField: 0 + m_Loop: 1 + m_ZeroValue: 0.5 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: [] + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + hueVsSat: + m_OverrideState: 1 + m_Value: + k__BackingField: 0 + m_Loop: 1 + m_ZeroValue: 0.5 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: [] + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + satVsSat: + m_OverrideState: 1 + m_Value: + k__BackingField: 0 + m_Loop: 0 + m_ZeroValue: 0.5 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: [] + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 + lumVsSat: + m_OverrideState: 1 + m_Value: + k__BackingField: 0 + m_Loop: 0 + m_ZeroValue: 0.5 + m_Range: 1 + m_Curve: + serializedVersion: 2 + m_Curve: [] + m_PreInfinity: 2 + m_PostInfinity: 2 + m_RotationOrder: 4 +--- !u!114 &1918650496244738858 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: e021b4c809a781e468c2988c016ebbea, type: 3} + m_Name: ColorLookup + m_EditorClassIdentifier: + active: 1 + texture: + m_OverrideState: 1 + m_Value: {fileID: 0} + dimension: 1 + contribution: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &3959858460715838825 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: c01700fd266d6914ababb731e09af2eb, type: 3} + m_Name: DepthOfField + m_EditorClassIdentifier: + active: 1 + mode: + m_OverrideState: 1 + m_Value: 0 + gaussianStart: + m_OverrideState: 1 + m_Value: 10 + gaussianEnd: + m_OverrideState: 1 + m_Value: 30 + gaussianMaxRadius: + m_OverrideState: 1 + m_Value: 1 + highQualitySampling: + m_OverrideState: 1 + m_Value: 0 + focusDistance: + m_OverrideState: 1 + m_Value: 10 + aperture: + m_OverrideState: 1 + m_Value: 5.6 + focalLength: + m_OverrideState: 1 + m_Value: 50 + bladeCount: + m_OverrideState: 1 + m_Value: 5 + bladeCurvature: + m_OverrideState: 1 + m_Value: 1 + bladeRotation: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &4251301726029935498 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 74955a4b0b4243bc87231e8b59ed9140, type: 3} + m_Name: TestVolume + m_EditorClassIdentifier: + active: 1 + param: + m_OverrideState: 1 + m_Value: 123 +--- !u!114 &4644742534064026673 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 81180773991d8724ab7f2d216912b564, type: 3} + m_Name: ChromaticAberration + m_EditorClassIdentifier: + active: 1 + intensity: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &6940869943325143175 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 0} + m_Name: VolumeComponentSupportedOnAnySRP + m_EditorClassIdentifier: Unity.RenderPipelines.Core.Editor.Tests:UnityEngine.Rendering.Tests:VolumeComponentEditorSupportedOnTests/VolumeComponentSupportedOnAnySRP + active: 1 +--- !u!114 &7173750748008157695 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 899c54efeace73346a0a16faa3afe726, type: 3} + m_Name: Vignette + m_EditorClassIdentifier: + active: 1 + color: + m_OverrideState: 1 + m_Value: {r: 0, g: 0, b: 0, a: 1} + center: + m_OverrideState: 1 + m_Value: {x: 0.5, y: 0.5} + intensity: + m_OverrideState: 1 + m_Value: 0 + smoothness: + m_OverrideState: 1 + m_Value: 0.2 + rounded: + m_OverrideState: 1 + m_Value: 0 +--- !u!114 &7518938298396184218 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: c5e1dc532bcb41949b58bc4f2abfbb7e, type: 3} + m_Name: LensDistortion + m_EditorClassIdentifier: + active: 1 + intensity: + m_OverrideState: 1 + m_Value: 0 + xMultiplier: + m_OverrideState: 1 + m_Value: 1 + yMultiplier: + m_OverrideState: 1 + m_Value: 1 + center: + m_OverrideState: 1 + m_Value: {x: 0.5, y: 0.5} + scale: + m_OverrideState: 1 + m_Value: 1 +--- !u!114 &9001657382290151224 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: cdfbdbb87d3286943a057f7791b43141, type: 3} + m_Name: ChannelMixer + m_EditorClassIdentifier: + active: 1 + redOutRedIn: + m_OverrideState: 1 + m_Value: 100 + redOutGreenIn: + m_OverrideState: 1 + m_Value: 0 + redOutBlueIn: + m_OverrideState: 1 + m_Value: 0 + greenOutRedIn: + m_OverrideState: 1 + m_Value: 0 + greenOutGreenIn: + m_OverrideState: 1 + m_Value: 100 + greenOutBlueIn: + m_OverrideState: 1 + m_Value: 0 + blueOutRedIn: + m_OverrideState: 1 + m_Value: 0 + blueOutGreenIn: + m_OverrideState: 1 + m_Value: 0 + blueOutBlueIn: + m_OverrideState: 1 + m_Value: 100 +--- !u!114 &9122958982931076880 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 0} + m_Name: CopyPasteTestComponent1 + m_EditorClassIdentifier: Unity.RenderPipelines.Core.Editor.Tests:UnityEditor.Rendering.Tests:VolumeComponentCopyPasteTests/CopyPasteTestComponent1 + active: 1 + p1: + m_OverrideState: 1 + m_Value: 0 + p2: + m_OverrideState: 1 + m_Value: 0 diff --git a/Assets/Settings/DefaultVolumeProfile.asset.meta b/Assets/Settings/DefaultVolumeProfile.asset.meta new file mode 100644 index 00000000..53b314ad --- /dev/null +++ b/Assets/Settings/DefaultVolumeProfile.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ab09877e2e707104187f6f83e2f62510 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/Mobile_RPAsset.asset b/Assets/Settings/Mobile_RPAsset.asset new file mode 100644 index 00000000..0fdefd13 --- /dev/null +++ b/Assets/Settings/Mobile_RPAsset.asset @@ -0,0 +1,135 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: bf2edee5c58d82540a51f03df9d42094, type: 3} + m_Name: Mobile_RPAsset + m_EditorClassIdentifier: + k_AssetVersion: 12 + k_AssetPreviousVersion: 12 + m_RendererType: 1 + m_RendererData: {fileID: 0} + m_RendererDataList: + - {fileID: 11400000, guid: 65bc7dbf4170f435aa868c779acfb082, type: 2} + m_DefaultRendererIndex: 0 + m_RequireDepthTexture: 0 + m_RequireOpaqueTexture: 0 + m_OpaqueDownsampling: 0 + m_SupportsTerrainHoles: 1 + m_SupportsHDR: 1 + m_HDRColorBufferPrecision: 0 + m_MSAA: 1 + m_RenderScale: 0.8 + m_UpscalingFilter: 3 + m_FsrOverrideSharpness: 0 + m_FsrSharpness: 0.92 + m_EnableLODCrossFade: 1 + m_LODCrossFadeDitheringType: 1 + m_ShEvalMode: 0 + m_LightProbeSystem: 0 + m_ProbeVolumeMemoryBudget: 1024 + m_ProbeVolumeBlendingMemoryBudget: 256 + m_SupportProbeVolumeGPUStreaming: 0 + m_SupportProbeVolumeDiskStreaming: 0 + m_SupportProbeVolumeScenarios: 0 + m_SupportProbeVolumeScenarioBlending: 0 + m_ProbeVolumeSHBands: 1 + m_MainLightRenderingMode: 1 + m_MainLightShadowsSupported: 1 + m_MainLightShadowmapResolution: 1024 + m_AdditionalLightsRenderingMode: 1 + m_AdditionalLightsPerObjectLimit: 4 + m_AdditionalLightShadowsSupported: 0 + m_AdditionalLightsShadowmapResolution: 2048 + m_AdditionalLightsShadowResolutionTierLow: 256 + m_AdditionalLightsShadowResolutionTierMedium: 512 + m_AdditionalLightsShadowResolutionTierHigh: 1024 + m_ReflectionProbeBlending: 1 + m_ReflectionProbeBoxProjection: 1 + m_ShadowDistance: 50 + m_ShadowCascadeCount: 1 + m_Cascade2Split: 0.25 + m_Cascade3Split: {x: 0.1, y: 0.3} + m_Cascade4Split: {x: 0.067, y: 0.2, z: 0.467} + m_CascadeBorder: 0.2 + m_ShadowDepthBias: 1 + m_ShadowNormalBias: 1 + m_AnyShadowsSupported: 1 + m_SoftShadowsSupported: 0 + m_ConservativeEnclosingSphere: 1 + m_NumIterationsEnclosingSphere: 64 + m_SoftShadowQuality: 2 + m_AdditionalLightsCookieResolution: 1024 + m_AdditionalLightsCookieFormat: 1 + m_UseSRPBatcher: 1 + m_SupportsDynamicBatching: 0 + m_MixedLightingSupported: 1 + m_SupportsLightCookies: 1 + m_SupportsLightLayers: 1 + m_DebugLevel: 0 + m_StoreActionsOptimization: 0 + m_UseAdaptivePerformance: 1 + m_ColorGradingMode: 0 + m_ColorGradingLutSize: 32 + m_UseFastSRGBLinearConversion: 1 + m_SupportDataDrivenLensFlare: 1 + m_SupportScreenSpaceLensFlare: 1 + m_GPUResidentDrawerMode: 0 + m_UseLegacyLightmaps: 0 + m_SmallMeshScreenPercentage: 0 + m_GPUResidentDrawerEnableOcclusionCullingInCameras: 0 + m_ShadowType: 1 + m_LocalShadowsSupported: 0 + m_LocalShadowsAtlasResolution: 256 + m_MaxPixelLights: 0 + m_ShadowAtlasResolution: 256 + m_VolumeFrameworkUpdateMode: 0 + m_VolumeProfile: {fileID: 11400000, guid: 10fc4df2da32a41aaa32d77bc913491c, type: 2} + apvScenesData: + obsoleteSceneBounds: + m_Keys: [] + m_Values: [] + obsoleteHasProbeVolumes: + m_Keys: [] + m_Values: + m_PrefilteringModeMainLightShadows: 3 + m_PrefilteringModeAdditionalLight: 4 + m_PrefilteringModeAdditionalLightShadows: 0 + m_PrefilterXRKeywords: 1 + m_PrefilteringModeForwardPlus: 1 + m_PrefilteringModeDeferredRendering: 0 + m_PrefilteringModeScreenSpaceOcclusion: 0 + m_PrefilterDebugKeywords: 1 + m_PrefilterWriteRenderingLayers: 1 + m_PrefilterHDROutput: 1 + m_PrefilterSSAODepthNormals: 1 + m_PrefilterSSAOSourceDepthLow: 1 + m_PrefilterSSAOSourceDepthMedium: 0 + m_PrefilterSSAOSourceDepthHigh: 1 + m_PrefilterSSAOInterleaved: 0 + m_PrefilterSSAOBlueNoise: 1 + m_PrefilterSSAOSampleCountLow: 1 + m_PrefilterSSAOSampleCountMedium: 0 + m_PrefilterSSAOSampleCountHigh: 1 + m_PrefilterDBufferMRT1: 1 + m_PrefilterDBufferMRT2: 1 + m_PrefilterDBufferMRT3: 1 + m_PrefilterSoftShadowsQualityLow: 1 + m_PrefilterSoftShadowsQualityMedium: 1 + m_PrefilterSoftShadowsQualityHigh: 1 + m_PrefilterSoftShadows: 0 + m_PrefilterScreenCoord: 1 + m_PrefilterNativeRenderPass: 1 + m_PrefilterUseLegacyLightmaps: 0 + m_ShaderVariantLogLevel: 0 + m_ShadowCascades: 0 + m_Textures: + blueNoise64LTex: {fileID: 2800000, guid: e3d24661c1e055f45a7560c033dbb837, type: 3} + bayerMatrixTex: {fileID: 2800000, guid: f9ee4ed84c1d10c49aabb9b210b0fc44, type: 3} diff --git a/Assets/Settings/Mobile_RPAsset.asset.meta b/Assets/Settings/Mobile_RPAsset.asset.meta new file mode 100644 index 00000000..3660d151 --- /dev/null +++ b/Assets/Settings/Mobile_RPAsset.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5e6cbd92db86f4b18aec3ed561671858 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/Mobile_Renderer.asset b/Assets/Settings/Mobile_Renderer.asset new file mode 100644 index 00000000..99d4fa5b --- /dev/null +++ b/Assets/Settings/Mobile_Renderer.asset @@ -0,0 +1,52 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: de640fe3d0db1804a85f9fc8f5cadab6, type: 3} + m_Name: Mobile_Renderer + m_EditorClassIdentifier: + debugShaders: + debugReplacementPS: {fileID: 4800000, guid: cf852408f2e174538bcd9b7fda1c5ae7, + type: 3} + hdrDebugViewPS: {fileID: 4800000, guid: 573620ae32aec764abd4d728906d2587, type: 3} + probeVolumeSamplingDebugComputeShader: {fileID: 7200000, guid: 53626a513ea68ce47b59dc1299fe3959, + type: 3} + probeVolumeResources: + probeVolumeDebugShader: {fileID: 0} + probeVolumeFragmentationDebugShader: {fileID: 0} + probeVolumeOffsetDebugShader: {fileID: 0} + probeVolumeSamplingDebugShader: {fileID: 0} + probeSamplingDebugMesh: {fileID: 0} + probeSamplingDebugTexture: {fileID: 0} + probeVolumeBlendStatesCS: {fileID: 0} + m_RendererFeatures: [] + m_RendererFeatureMap: + m_UseNativeRenderPass: 1 + postProcessData: {fileID: 11400000, guid: 41439944d30ece34e96484bdb6645b55, type: 2} + m_AssetVersion: 2 + m_OpaqueLayerMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_TransparentLayerMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_DefaultStencilState: + overrideStencilState: 0 + stencilReference: 0 + stencilCompareFunction: 8 + passOperation: 2 + failOperation: 0 + zFailOperation: 0 + m_ShadowTransparentReceive: 0 + m_RenderingMode: 2 + m_DepthPrimingMode: 0 + m_CopyDepthMode: 0 + m_AccurateGbufferNormals: 0 + m_IntermediateTextureMode: 0 diff --git a/Assets/Settings/Mobile_Renderer.asset.meta b/Assets/Settings/Mobile_Renderer.asset.meta new file mode 100644 index 00000000..a3588b1a --- /dev/null +++ b/Assets/Settings/Mobile_Renderer.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 65bc7dbf4170f435aa868c779acfb082 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/PC_RPAsset.asset b/Assets/Settings/PC_RPAsset.asset new file mode 100644 index 00000000..8b30a060 --- /dev/null +++ b/Assets/Settings/PC_RPAsset.asset @@ -0,0 +1,135 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: bf2edee5c58d82540a51f03df9d42094, type: 3} + m_Name: PC_RPAsset + m_EditorClassIdentifier: + k_AssetVersion: 12 + k_AssetPreviousVersion: 12 + m_RendererType: 1 + m_RendererData: {fileID: 0} + m_RendererDataList: + - {fileID: 11400000, guid: f288ae1f4751b564a96ac7587541f7a2, type: 2} + m_DefaultRendererIndex: 0 + m_RequireDepthTexture: 1 + m_RequireOpaqueTexture: 1 + m_OpaqueDownsampling: 1 + m_SupportsTerrainHoles: 1 + m_SupportsHDR: 1 + m_HDRColorBufferPrecision: 0 + m_MSAA: 1 + m_RenderScale: 1 + m_UpscalingFilter: 0 + m_FsrOverrideSharpness: 0 + m_FsrSharpness: 0.92 + m_EnableLODCrossFade: 1 + m_LODCrossFadeDitheringType: 1 + m_ShEvalMode: 0 + m_LightProbeSystem: 0 + m_ProbeVolumeMemoryBudget: 1024 + m_ProbeVolumeBlendingMemoryBudget: 256 + m_SupportProbeVolumeGPUStreaming: 0 + m_SupportProbeVolumeDiskStreaming: 0 + m_SupportProbeVolumeScenarios: 0 + m_SupportProbeVolumeScenarioBlending: 0 + m_ProbeVolumeSHBands: 1 + m_MainLightRenderingMode: 1 + m_MainLightShadowsSupported: 1 + m_MainLightShadowmapResolution: 2048 + m_AdditionalLightsRenderingMode: 1 + m_AdditionalLightsPerObjectLimit: 4 + m_AdditionalLightShadowsSupported: 1 + m_AdditionalLightsShadowmapResolution: 2048 + m_AdditionalLightsShadowResolutionTierLow: 256 + m_AdditionalLightsShadowResolutionTierMedium: 512 + m_AdditionalLightsShadowResolutionTierHigh: 1024 + m_ReflectionProbeBlending: 1 + m_ReflectionProbeBoxProjection: 1 + m_ShadowDistance: 50 + m_ShadowCascadeCount: 4 + m_Cascade2Split: 0.25 + m_Cascade3Split: {x: 0.1, y: 0.3} + m_Cascade4Split: {x: 0.12299999, y: 0.2926, z: 0.53599995} + m_CascadeBorder: 0.107758604 + m_ShadowDepthBias: 0.1 + m_ShadowNormalBias: 0.5 + m_AnyShadowsSupported: 1 + m_SoftShadowsSupported: 1 + m_ConservativeEnclosingSphere: 1 + m_NumIterationsEnclosingSphere: 64 + m_SoftShadowQuality: 3 + m_AdditionalLightsCookieResolution: 2048 + m_AdditionalLightsCookieFormat: 3 + m_UseSRPBatcher: 1 + m_SupportsDynamicBatching: 0 + m_MixedLightingSupported: 1 + m_SupportsLightCookies: 1 + m_SupportsLightLayers: 1 + m_DebugLevel: 0 + m_StoreActionsOptimization: 0 + m_UseAdaptivePerformance: 1 + m_ColorGradingMode: 0 + m_ColorGradingLutSize: 32 + m_UseFastSRGBLinearConversion: 0 + m_SupportDataDrivenLensFlare: 1 + m_SupportScreenSpaceLensFlare: 1 + m_GPUResidentDrawerMode: 0 + m_UseLegacyLightmaps: 0 + m_SmallMeshScreenPercentage: 0 + m_GPUResidentDrawerEnableOcclusionCullingInCameras: 0 + m_ShadowType: 1 + m_LocalShadowsSupported: 0 + m_LocalShadowsAtlasResolution: 256 + m_MaxPixelLights: 0 + m_ShadowAtlasResolution: 256 + m_VolumeFrameworkUpdateMode: 0 + m_VolumeProfile: {fileID: 11400000, guid: 10fc4df2da32a41aaa32d77bc913491c, type: 2} + apvScenesData: + obsoleteSceneBounds: + m_Keys: [] + m_Values: [] + obsoleteHasProbeVolumes: + m_Keys: [] + m_Values: + m_PrefilteringModeMainLightShadows: 3 + m_PrefilteringModeAdditionalLight: 4 + m_PrefilteringModeAdditionalLightShadows: 0 + m_PrefilterXRKeywords: 1 + m_PrefilteringModeForwardPlus: 1 + m_PrefilteringModeDeferredRendering: 0 + m_PrefilteringModeScreenSpaceOcclusion: 1 + m_PrefilterDebugKeywords: 1 + m_PrefilterWriteRenderingLayers: 0 + m_PrefilterHDROutput: 1 + m_PrefilterSSAODepthNormals: 0 + m_PrefilterSSAOSourceDepthLow: 1 + m_PrefilterSSAOSourceDepthMedium: 1 + m_PrefilterSSAOSourceDepthHigh: 1 + m_PrefilterSSAOInterleaved: 1 + m_PrefilterSSAOBlueNoise: 0 + m_PrefilterSSAOSampleCountLow: 1 + m_PrefilterSSAOSampleCountMedium: 0 + m_PrefilterSSAOSampleCountHigh: 1 + m_PrefilterDBufferMRT1: 1 + m_PrefilterDBufferMRT2: 1 + m_PrefilterDBufferMRT3: 0 + m_PrefilterSoftShadowsQualityLow: 0 + m_PrefilterSoftShadowsQualityMedium: 0 + m_PrefilterSoftShadowsQualityHigh: 0 + m_PrefilterSoftShadows: 0 + m_PrefilterScreenCoord: 1 + m_PrefilterNativeRenderPass: 1 + m_PrefilterUseLegacyLightmaps: 0 + m_ShaderVariantLogLevel: 0 + m_ShadowCascades: 0 + m_Textures: + blueNoise64LTex: {fileID: 2800000, guid: e3d24661c1e055f45a7560c033dbb837, type: 3} + bayerMatrixTex: {fileID: 2800000, guid: f9ee4ed84c1d10c49aabb9b210b0fc44, type: 3} diff --git a/Assets/Settings/PC_RPAsset.asset.meta b/Assets/Settings/PC_RPAsset.asset.meta new file mode 100644 index 00000000..e286b2fd --- /dev/null +++ b/Assets/Settings/PC_RPAsset.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4b83569d67af61e458304325a23e5dfd +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/PC_Renderer.asset b/Assets/Settings/PC_Renderer.asset new file mode 100644 index 00000000..475b02e5 --- /dev/null +++ b/Assets/Settings/PC_Renderer.asset @@ -0,0 +1,95 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: de640fe3d0db1804a85f9fc8f5cadab6, type: 3} + m_Name: PC_Renderer + m_EditorClassIdentifier: + debugShaders: + debugReplacementPS: {fileID: 4800000, guid: cf852408f2e174538bcd9b7fda1c5ae7, + type: 3} + hdrDebugViewPS: {fileID: 4800000, guid: 573620ae32aec764abd4d728906d2587, type: 3} + probeVolumeSamplingDebugComputeShader: {fileID: 7200000, guid: 53626a513ea68ce47b59dc1299fe3959, + type: 3} + probeVolumeResources: + probeVolumeDebugShader: {fileID: 4800000, guid: e5c6678ed2aaa91408dd3df699057aae, + type: 3} + probeVolumeFragmentationDebugShader: {fileID: 4800000, guid: 03cfc4915c15d504a9ed85ecc404e607, + type: 3} + probeVolumeOffsetDebugShader: {fileID: 4800000, guid: 53a11f4ebaebf4049b3638ef78dc9664, + type: 3} + probeVolumeSamplingDebugShader: {fileID: 4800000, guid: 8f96cd657dc40064aa21efcc7e50a2e7, + type: 3} + probeSamplingDebugMesh: {fileID: -3555484719484374845, guid: 57d7c4c16e2765b47a4d2069b311bffe, + type: 3} + probeSamplingDebugTexture: {fileID: 2800000, guid: 24ec0e140fb444a44ab96ee80844e18e, + type: 3} + probeVolumeBlendStatesCS: {fileID: 7200000, guid: b9a23f869c4fd45f19c5ada54dd82176, + type: 3} + m_RendererFeatures: + - {fileID: 7833122117494664109} + m_RendererFeatureMap: ad6b866f10d7b46c + m_UseNativeRenderPass: 1 + postProcessData: {fileID: 11400000, guid: 41439944d30ece34e96484bdb6645b55, type: 2} + m_AssetVersion: 2 + m_OpaqueLayerMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_TransparentLayerMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_DefaultStencilState: + overrideStencilState: 0 + stencilReference: 1 + stencilCompareFunction: 3 + passOperation: 2 + failOperation: 0 + zFailOperation: 0 + m_ShadowTransparentReceive: 1 + m_RenderingMode: 2 + m_DepthPrimingMode: 0 + m_CopyDepthMode: 0 + m_AccurateGbufferNormals: 0 + m_IntermediateTextureMode: 0 +--- !u!114 &7833122117494664109 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: f62c9c65cf3354c93be831c8bc075510, type: 3} + m_Name: ScreenSpaceAmbientOcclusion + m_EditorClassIdentifier: + m_Active: 1 + m_Settings: + AOMethod: 0 + Downsample: 0 + AfterOpaque: 0 + Source: 1 + NormalSamples: 1 + Intensity: 0.4 + DirectLightingStrength: 0.25 + Radius: 0.3 + Samples: 1 + BlurQuality: 0 + Falloff: 100 + SampleCount: -1 + m_BlueNoise256Textures: + - {fileID: 2800000, guid: 36f118343fc974119bee3d09e2111500, type: 3} + - {fileID: 2800000, guid: 4b7b083e6b6734e8bb2838b0b50a0bc8, type: 3} + - {fileID: 2800000, guid: c06cc21c692f94f5fb5206247191eeee, type: 3} + - {fileID: 2800000, guid: cb76dd40fa7654f9587f6a344f125c9a, type: 3} + - {fileID: 2800000, guid: e32226222ff144b24bf3a5a451de54bc, type: 3} + - {fileID: 2800000, guid: 3302065f671a8450b82c9ddf07426f3a, type: 3} + - {fileID: 2800000, guid: 56a77a3e8d64f47b6afe9e3c95cb57d5, type: 3} + m_Shader: {fileID: 4800000, guid: 0849e84e3d62649e8882e9d6f056a017, type: 3} diff --git a/Assets/Settings/PC_Renderer.asset.meta b/Assets/Settings/PC_Renderer.asset.meta new file mode 100644 index 00000000..ddae6a5f --- /dev/null +++ b/Assets/Settings/PC_Renderer.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f288ae1f4751b564a96ac7587541f7a2 +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/SampleSceneProfile.asset b/Assets/Settings/SampleSceneProfile.asset new file mode 100644 index 00000000..c1b0f631 --- /dev/null +++ b/Assets/Settings/SampleSceneProfile.asset @@ -0,0 +1,159 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &-7893295128165547882 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 0b2db86121404754db890f4c8dfe81b2, type: 3} + m_Name: Bloom + m_EditorClassIdentifier: + active: 1 + skipIterations: + m_OverrideState: 1 + m_Value: 0 + threshold: + m_OverrideState: 1 + m_Value: 1 + intensity: + m_OverrideState: 1 + m_Value: 0.25 + scatter: + m_OverrideState: 1 + m_Value: 0.5 + clamp: + m_OverrideState: 0 + m_Value: 65472 + tint: + m_OverrideState: 0 + m_Value: {r: 1, g: 1, b: 1, a: 1} + highQualityFiltering: + m_OverrideState: 1 + m_Value: 1 + downscale: + m_OverrideState: 0 + m_Value: 0 + maxIterations: + m_OverrideState: 0 + m_Value: 6 + dirtTexture: + m_OverrideState: 0 + m_Value: {fileID: 0} + dimension: 1 + dirtIntensity: + m_OverrideState: 0 + m_Value: 0 +--- !u!114 &-3357603926938260329 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 899c54efeace73346a0a16faa3afe726, type: 3} + m_Name: Vignette + m_EditorClassIdentifier: + active: 1 + color: + m_OverrideState: 0 + m_Value: {r: 0, g: 0, b: 0, a: 1} + center: + m_OverrideState: 0 + m_Value: {x: 0.5, y: 0.5} + intensity: + m_OverrideState: 1 + m_Value: 0.2 + smoothness: + m_OverrideState: 0 + m_Value: 0.2 + rounded: + m_OverrideState: 0 + m_Value: 0 +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: d7fd9488000d3734a9e00ee676215985, type: 3} + m_Name: SampleSceneProfile + m_EditorClassIdentifier: + components: + - {fileID: 849379129802519247} + - {fileID: -7893295128165547882} + - {fileID: 7391319092446245454} + - {fileID: -3357603926938260329} +--- !u!114 &849379129802519247 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 97c23e3b12dc18c42a140437e53d3951, type: 3} + m_Name: Tonemapping + m_EditorClassIdentifier: + active: 1 + mode: + m_OverrideState: 1 + m_Value: 1 + neutralHDRRangeReductionMode: + m_OverrideState: 0 + m_Value: 2 + acesPreset: + m_OverrideState: 0 + m_Value: 3 + hueShiftAmount: + m_OverrideState: 0 + m_Value: 0 + detectPaperWhite: + m_OverrideState: 1 + m_Value: 0 + paperWhite: + m_OverrideState: 1 + m_Value: 234 + detectBrightnessLimits: + m_OverrideState: 1 + m_Value: 1 + minNits: + m_OverrideState: 1 + m_Value: 0.005 + maxNits: + m_OverrideState: 1 + m_Value: 647 +--- !u!114 &7391319092446245454 +MonoBehaviour: + m_ObjectHideFlags: 3 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ccf1aba9553839d41ae37dd52e9ebcce, type: 3} + m_Name: MotionBlur + m_EditorClassIdentifier: + active: 0 + mode: + m_OverrideState: 0 + m_Value: 0 + quality: + m_OverrideState: 1 + m_Value: 2 + intensity: + m_OverrideState: 1 + m_Value: 0.6 + clamp: + m_OverrideState: 0 + m_Value: 0.05 diff --git a/Assets/Settings/SampleSceneProfile.asset.meta b/Assets/Settings/SampleSceneProfile.asset.meta new file mode 100644 index 00000000..b82270c5 --- /dev/null +++ b/Assets/Settings/SampleSceneProfile.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 10fc4df2da32a41aaa32d77bc913491c +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 0 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset b/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset new file mode 100644 index 00000000..f72201d1 --- /dev/null +++ b/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset @@ -0,0 +1,391 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &11400000 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2ec995e51a6e251468d2a3fd8a686257, type: 3} + m_Name: UniversalRenderPipelineGlobalSettings + m_EditorClassIdentifier: + m_ShaderStrippingSetting: + m_Version: 0 + m_ExportShaderVariants: 1 + m_ShaderVariantLogLevel: 0 + m_StripRuntimeDebugShaders: 1 + m_URPShaderStrippingSetting: + m_Version: 0 + m_StripUnusedPostProcessingVariants: 1 + m_StripUnusedVariants: 1 + m_StripScreenCoordOverrideVariants: 1 + m_ShaderVariantLogLevel: 0 + m_ExportShaderVariants: 1 + m_StripDebugVariants: 1 + m_StripUnusedPostProcessingVariants: 1 + m_StripUnusedVariants: 1 + m_StripScreenCoordOverrideVariants: 1 + supportRuntimeDebugDisplay: 0 + m_EnableRenderGraph: 0 + m_Settings: + m_SettingsList: + m_List: + - rid: 6852985685364965376 + - rid: 6852985685364965377 + - rid: 6852985685364965378 + - rid: 6852985685364965379 + - rid: 6852985685364965380 + - rid: 6852985685364965381 + - rid: 6852985685364965382 + - rid: 6852985685364965383 + - rid: 6852985685364965384 + - rid: 6852985685364965385 + - rid: 6852985685364965386 + - rid: 6852985685364965387 + - rid: 6852985685364965388 + - rid: 6852985685364965389 + - rid: 6852985685364965390 + - rid: 6852985685364965391 + - rid: 6852985685364965392 + - rid: 6852985685364965393 + - rid: 6852985685364965394 + - rid: 8712630790384254976 + - rid: 7620972423683506176 + - rid: 7620972423683506177 + - rid: 3778867636856684544 + - rid: 3778867636856684545 + - rid: 3778867636856684546 + - rid: 3778867636856684547 + - rid: 3778867636856684548 + - rid: 3778867636856684549 + m_RuntimeSettings: + m_List: [] + m_AssetVersion: 8 + m_ObsoleteDefaultVolumeProfile: {fileID: 0} + m_RenderingLayerNames: + - Light Layer default + - Light Layer 1 + - Light Layer 2 + - Light Layer 3 + - Light Layer 4 + - Light Layer 5 + - Light Layer 6 + - Light Layer 7 + m_ValidRenderingLayers: 0 + lightLayerName0: Light Layer default + lightLayerName1: Light Layer 1 + lightLayerName2: Light Layer 2 + lightLayerName3: Light Layer 3 + lightLayerName4: Light Layer 4 + lightLayerName5: Light Layer 5 + lightLayerName6: Light Layer 6 + lightLayerName7: Light Layer 7 + apvScenesData: + obsoleteSceneBounds: + m_Keys: [] + m_Values: [] + obsoleteHasProbeVolumes: + m_Keys: [] + m_Values: + references: + version: 2 + RefIds: + - rid: 3778867636856684544 + type: {class: PostProcessData/ShaderResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + stopNanPS: {fileID: 4800000, guid: 1121bb4e615ca3c48b214e79e841e823, type: 3} + subpixelMorphologicalAntialiasingPS: {fileID: 4800000, guid: 63eaba0ebfb82cc43bde059b4a8c65f6, type: 3} + gaussianDepthOfFieldPS: {fileID: 4800000, guid: 5e7134d6e63e0bc47a1dd2669cedb379, type: 3} + bokehDepthOfFieldPS: {fileID: 4800000, guid: 2aed67ad60045d54ba3a00c91e2d2631, type: 3} + cameraMotionBlurPS: {fileID: 4800000, guid: 1edcd131364091c46a17cbff0b1de97a, type: 3} + paniniProjectionPS: {fileID: 4800000, guid: a15b78cf8ca26ca4fb2090293153c62c, type: 3} + lutBuilderLdrPS: {fileID: 4800000, guid: 65df88701913c224d95fc554db28381a, type: 3} + lutBuilderHdrPS: {fileID: 4800000, guid: ec9fec698a3456d4fb18cf8bacb7a2bc, type: 3} + bloomPS: {fileID: 4800000, guid: 5f1864addb451f54bae8c86d230f736e, type: 3} + temporalAntialiasingPS: {fileID: 4800000, guid: 9c70c1a35ff15f340b38ea84842358bf, type: 3} + LensFlareDataDrivenPS: {fileID: 4800000, guid: 6cda457ac28612740adb23da5d39ea92, type: 3} + LensFlareScreenSpacePS: {fileID: 4800000, guid: 701880fecb344ea4c9cd0db3407ab287, type: 3} + scalingSetupPS: {fileID: 4800000, guid: e8ee25143a34b8c4388709ea947055d1, type: 3} + easuPS: {fileID: 4800000, guid: 562b7ae4f629f144aa97780546fce7c6, type: 3} + uberPostPS: {fileID: 4800000, guid: e7857e9d0c934dc4f83f270f8447b006, type: 3} + finalPostPassPS: {fileID: 4800000, guid: c49e63ed1bbcb334780a3bd19dfed403, type: 3} + m_ShaderResourcesVersion: 0 + - rid: 3778867636856684545 + type: {class: ScreenSpaceAmbientOcclusionPersistentResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Shader: {fileID: 4800000, guid: 0849e84e3d62649e8882e9d6f056a017, type: 3} + m_Version: 0 + - rid: 3778867636856684546 + type: {class: ScreenSpaceAmbientOcclusionDynamicResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_BlueNoise256Textures: + - {fileID: 2800000, guid: 36f118343fc974119bee3d09e2111500, type: 3} + - {fileID: 2800000, guid: 4b7b083e6b6734e8bb2838b0b50a0bc8, type: 3} + - {fileID: 2800000, guid: c06cc21c692f94f5fb5206247191eeee, type: 3} + - {fileID: 2800000, guid: cb76dd40fa7654f9587f6a344f125c9a, type: 3} + - {fileID: 2800000, guid: e32226222ff144b24bf3a5a451de54bc, type: 3} + - {fileID: 2800000, guid: 3302065f671a8450b82c9ddf07426f3a, type: 3} + - {fileID: 2800000, guid: 56a77a3e8d64f47b6afe9e3c95cb57d5, type: 3} + m_Version: 0 + - rid: 3778867636856684547 + type: {class: PostProcessData/TextureResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + blueNoise16LTex: + - {fileID: 2800000, guid: 81200413a40918d4d8702e94db29911c, type: 3} + - {fileID: 2800000, guid: d50c5e07c9911a74982bddf7f3075e7b, type: 3} + - {fileID: 2800000, guid: 1134690bf9216164dbc75050e35b7900, type: 3} + - {fileID: 2800000, guid: 7ce2118f74614a94aa8a0cdf2e6062c3, type: 3} + - {fileID: 2800000, guid: 2ca97df9d1801e84a8a8f2c53cb744f0, type: 3} + - {fileID: 2800000, guid: e63eef8f54aa9dc4da9a5ac094b503b5, type: 3} + - {fileID: 2800000, guid: 39451254daebd6d40b52899c1f1c0c1b, type: 3} + - {fileID: 2800000, guid: c94ad916058dff743b0f1c969ddbe660, type: 3} + - {fileID: 2800000, guid: ed5ea7ce59ca8ec4f9f14bf470a30f35, type: 3} + - {fileID: 2800000, guid: 071e954febf155243a6c81e48f452644, type: 3} + - {fileID: 2800000, guid: 96aaab9cc247d0b4c98132159688c1af, type: 3} + - {fileID: 2800000, guid: fc3fa8f108657e14486697c9a84ccfc5, type: 3} + - {fileID: 2800000, guid: bfed3e498947fcb4890b7f40f54d85b9, type: 3} + - {fileID: 2800000, guid: d512512f4af60a442ab3458489412954, type: 3} + - {fileID: 2800000, guid: 47a45908f6db0cb44a0d5e961143afec, type: 3} + - {fileID: 2800000, guid: 4dcc0502f8586f941b5c4a66717205e8, type: 3} + - {fileID: 2800000, guid: 9d92991794bb5864c8085468b97aa067, type: 3} + - {fileID: 2800000, guid: 14381521ff11cb74abe3fe65401c23be, type: 3} + - {fileID: 2800000, guid: d36f0fe53425e08499a2333cf423634c, type: 3} + - {fileID: 2800000, guid: d4044ea2490d63b43aa1765f8efbf8a9, type: 3} + - {fileID: 2800000, guid: c9bd74624d8070f429e3f46d161f9204, type: 3} + - {fileID: 2800000, guid: d5c9b274310e5524ebe32a4e4da3df1f, type: 3} + - {fileID: 2800000, guid: f69770e54f2823f43badf77916acad83, type: 3} + - {fileID: 2800000, guid: 10b6c6d22e73dea46a8ab36b6eebd629, type: 3} + - {fileID: 2800000, guid: a2ec5cbf5a9b64345ad3fab0912ddf7b, type: 3} + - {fileID: 2800000, guid: 1c3c6d69a645b804fa232004b96b7ad3, type: 3} + - {fileID: 2800000, guid: d18a24d7b4ed50f4387993566d9d3ae2, type: 3} + - {fileID: 2800000, guid: c989e1ed85cf7154caa922fec53e6af6, type: 3} + - {fileID: 2800000, guid: ff47e5a0f105eb34883b973e51f4db62, type: 3} + - {fileID: 2800000, guid: fa042edbfc40fbd4bad0ab9d505b1223, type: 3} + - {fileID: 2800000, guid: 896d9004736809c4fb5973b7c12eb8b9, type: 3} + - {fileID: 2800000, guid: 179f794063d2a66478e6e726f84a65bc, type: 3} + filmGrainTex: + - {fileID: 2800000, guid: 654c582f7f8a5a14dbd7d119cbde215d, type: 3} + - {fileID: 2800000, guid: dd77ffd079630404e879388999033049, type: 3} + - {fileID: 2800000, guid: 1097e90e1306e26439701489f391a6c0, type: 3} + - {fileID: 2800000, guid: f0b67500f7fad3b4c9f2b13e8f41ba6e, type: 3} + - {fileID: 2800000, guid: 9930fb4528622b34687b00bbe6883de7, type: 3} + - {fileID: 2800000, guid: bd9e8c758250ef449a4b4bfaad7a2133, type: 3} + - {fileID: 2800000, guid: 510a2f57334933e4a8dbabe4c30204e4, type: 3} + - {fileID: 2800000, guid: b4db8180660810945bf8d55ab44352ad, type: 3} + - {fileID: 2800000, guid: fd2fd78b392986e42a12df2177d3b89c, type: 3} + - {fileID: 2800000, guid: 5cdee82a77d13994f83b8fdabed7c301, type: 3} + smaaAreaTex: {fileID: 2800000, guid: d1f1048909d55cd4fa1126ab998f617e, type: 3} + smaaSearchTex: {fileID: 2800000, guid: 51eee22c2a633ef4aada830eed57c3fd, type: 3} + m_TexturesResourcesVersion: 0 + - rid: 3778867636856684548 + type: {class: LightmapSamplingSettings, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 1 + m_UseBicubicLightmapSampling: 0 + - rid: 3778867636856684549 + type: {class: VrsRenderPipelineRuntimeResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_TextureComputeShader: {fileID: 7200000, guid: cacb30de6c40c7444bbc78cb0a81fd2a, type: 3} + m_VisualizationShader: {fileID: 4800000, guid: 620b55b8040a88d468e94abe55bed5ba, type: 3} + m_VisualizationLookupTable: + m_Data: + - {r: 1, g: 0, b: 0, a: 1} + - {r: 1, g: 0.92156863, b: 0.015686275, a: 1} + - {r: 1, g: 1, b: 1, a: 1} + - {r: 0, g: 1, b: 0, a: 1} + - {r: 0.75, g: 0.75, b: 0, a: 1} + - {r: 0, g: 0.75, b: 0.55, a: 1} + - {r: 0.5, g: 0, b: 0.5, a: 1} + - {r: 0.5, g: 0.5, b: 0.5, a: 1} + - {r: 0, g: 0, b: 1, a: 1} + m_ConversionLookupTable: + m_Data: + - {r: 1, g: 0, b: 0, a: 1} + - {r: 1, g: 0.92156863, b: 0.015686275, a: 1} + - {r: 1, g: 1, b: 1, a: 1} + - {r: 0, g: 1, b: 0, a: 1} + - {r: 0.75, g: 0.75, b: 0, a: 1} + - {r: 0, g: 0.75, b: 0.55, a: 1} + - {r: 0.5, g: 0, b: 0.5, a: 1} + - {r: 0.5, g: 0.5, b: 0.5, a: 1} + - {r: 0, g: 0, b: 1, a: 1} + - rid: 6852985685364965376 + type: {class: URPShaderStrippingSetting, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_StripUnusedPostProcessingVariants: 1 + m_StripUnusedVariants: 1 + m_StripScreenCoordOverrideVariants: 1 + - rid: 6852985685364965377 + type: {class: UniversalRenderPipelineEditorShaders, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_AutodeskInteractive: {fileID: 4800000, guid: 0e9d5a909a1f7e84882a534d0d11e49f, type: 3} + m_AutodeskInteractiveTransparent: {fileID: 4800000, guid: 5c81372d981403744adbdda4433c9c11, type: 3} + m_AutodeskInteractiveMasked: {fileID: 4800000, guid: 80aa867ac363ac043847b06ad71604cd, type: 3} + m_TerrainDetailLit: {fileID: 4800000, guid: f6783ab646d374f94b199774402a5144, type: 3} + m_TerrainDetailGrassBillboard: {fileID: 4800000, guid: 29868e73b638e48ca99a19ea58c48d90, type: 3} + m_TerrainDetailGrass: {fileID: 4800000, guid: e507fdfead5ca47e8b9a768b51c291a1, type: 3} + m_DefaultSpeedTree7Shader: {fileID: 4800000, guid: 0f4122b9a743b744abe2fb6a0a88868b, type: 3} + m_DefaultSpeedTree8Shader: {fileID: -6465566751694194690, guid: 9920c1f1781549a46ba081a2a15a16ec, type: 3} + m_DefaultSpeedTree9Shader: {fileID: -6465566751694194690, guid: cbd3e1cc4ae141c42a30e33b4d666a61, type: 3} + - rid: 6852985685364965378 + type: {class: UniversalRendererResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_CopyDepthPS: {fileID: 4800000, guid: d6dae50ee9e1bfa4db75f19f99355220, type: 3} + m_CameraMotionVector: {fileID: 4800000, guid: c56b7e0d4c7cb484e959caeeedae9bbf, type: 3} + m_StencilDeferredPS: {fileID: 4800000, guid: e9155b26e1bc55942a41e518703fe304, type: 3} + m_ClusterDeferred: {fileID: 4800000, guid: 222cce62363a44a380c36bf03b392608, type: 3} + m_StencilDitherMaskSeedPS: {fileID: 4800000, guid: 8c3ee818f2efa514c889881ccb2e95a2, type: 3} + m_DBufferClear: {fileID: 4800000, guid: f056d8bd2a1c7e44e9729144b4c70395, type: 3} + - rid: 6852985685364965379 + type: {class: UniversalRenderPipelineDebugShaders, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_DebugReplacementPS: {fileID: 4800000, guid: cf852408f2e174538bcd9b7fda1c5ae7, type: 3} + m_HdrDebugViewPS: {fileID: 4800000, guid: 573620ae32aec764abd4d728906d2587, type: 3} + m_ProbeVolumeSamplingDebugComputeShader: {fileID: 7200000, guid: 53626a513ea68ce47b59dc1299fe3959, type: 3} + - rid: 6852985685364965380 + type: {class: UniversalRenderPipelineRuntimeShaders, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_FallbackErrorShader: {fileID: 4800000, guid: e6e9a19c3678ded42a3bc431ebef7dbd, type: 3} + m_BlitHDROverlay: {fileID: 4800000, guid: a89bee29cffa951418fc1e2da94d1959, type: 3} + m_CoreBlitPS: {fileID: 4800000, guid: 93446b5c5339d4f00b85c159e1159b7c, type: 3} + m_CoreBlitColorAndDepthPS: {fileID: 4800000, guid: d104b2fc1ca6445babb8e90b0758136b, type: 3} + m_SamplingPS: {fileID: 4800000, guid: 04c410c9937594faa893a11dceb85f7e, type: 3} + m_TerrainDetailLit: {fileID: 4800000, guid: f6783ab646d374f94b199774402a5144, type: 3} + m_TerrainDetailGrassBillboard: {fileID: 4800000, guid: 29868e73b638e48ca99a19ea58c48d90, type: 3} + m_TerrainDetailGrass: {fileID: 4800000, guid: e507fdfead5ca47e8b9a768b51c291a1, type: 3} + - rid: 6852985685364965381 + type: {class: UniversalRenderPipelineRuntimeTextures, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 1 + m_BlueNoise64LTex: {fileID: 2800000, guid: e3d24661c1e055f45a7560c033dbb837, type: 3} + m_BayerMatrixTex: {fileID: 2800000, guid: f9ee4ed84c1d10c49aabb9b210b0fc44, type: 3} + m_DebugFontTex: {fileID: 2800000, guid: 26a413214480ef144b2915d6ff4d0beb, type: 3} + - rid: 6852985685364965382 + type: {class: Renderer2DResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_LightShader: {fileID: 4800000, guid: 3f6c848ca3d7bca4bbe846546ac701a1, type: 3} + m_ProjectedShadowShader: {fileID: 4800000, guid: ce09d4a80b88c5a4eb9768fab4f1ee00, type: 3} + m_SpriteShadowShader: {fileID: 4800000, guid: 44fc62292b65ab04eabcf310e799ccf6, type: 3} + m_SpriteUnshadowShader: {fileID: 4800000, guid: de02b375720b5c445afe83cd483bedf3, type: 3} + m_GeometryShadowShader: {fileID: 4800000, guid: 19349a0f9a7ed4c48a27445bcf92e5e1, type: 3} + m_GeometryUnshadowShader: {fileID: 4800000, guid: 77774d9009bb81447b048c907d4c6273, type: 3} + m_FallOffLookup: {fileID: 2800000, guid: 5688ab254e4c0634f8d6c8e0792331ca, type: 3} + m_CopyDepthPS: {fileID: 4800000, guid: d6dae50ee9e1bfa4db75f19f99355220, type: 3} + m_DefaultLitMaterial: {fileID: 2100000, guid: a97c105638bdf8b4a8650670310a4cd3, type: 2} + m_DefaultUnlitMaterial: {fileID: 2100000, guid: 9dfc825aed78fcd4ba02077103263b40, type: 2} + m_DefaultMaskMaterial: {fileID: 2100000, guid: 15d0c3709176029428a0da2f8cecf0b5, type: 2} + - rid: 6852985685364965383 + type: {class: UniversalRenderPipelineEditorMaterials, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_DefaultMaterial: {fileID: 2100000, guid: 31321ba15b8f8eb4c954353edc038b1d, type: 2} + m_DefaultParticleMaterial: {fileID: 2100000, guid: e823cd5b5d27c0f4b8256e7c12ee3e6d, type: 2} + m_DefaultLineMaterial: {fileID: 2100000, guid: e823cd5b5d27c0f4b8256e7c12ee3e6d, type: 2} + m_DefaultTerrainMaterial: {fileID: 2100000, guid: 594ea882c5a793440b60ff72d896021e, type: 2} + m_DefaultDecalMaterial: {fileID: 2100000, guid: 31d0dcc6f2dd4e4408d18036a2c93862, type: 2} + m_DefaultSpriteMaterial: {fileID: 2100000, guid: 9dfc825aed78fcd4ba02077103263b40, type: 2} + - rid: 6852985685364965384 + type: {class: URPDefaultVolumeProfileSettings, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_VolumeProfile: {fileID: 11400000, guid: ab09877e2e707104187f6f83e2f62510, type: 2} + - rid: 6852985685364965385 + type: {class: RenderGraphSettings, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_Version: 0 + m_EnableRenderCompatibilityMode: 0 + - rid: 6852985685364965386 + type: {class: GPUResidentDrawerResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.GPUDriven.Runtime} + data: + m_Version: 0 + m_InstanceDataBufferCopyKernels: {fileID: 7200000, guid: f984aeb540ded8b4fbb8a2047ab5b2e2, type: 3} + m_InstanceDataBufferUploadKernels: {fileID: 7200000, guid: 53864816eb00f2343b60e1a2c5a262ef, type: 3} + m_TransformUpdaterKernels: {fileID: 7200000, guid: 2a567b9b2733f8d47a700c3c85bed75b, type: 3} + m_WindDataUpdaterKernels: {fileID: 7200000, guid: fde76746e4fd0ed418c224f6b4084114, type: 3} + m_OccluderDepthPyramidKernels: {fileID: 7200000, guid: 08b2b5fb307b0d249860612774a987da, type: 3} + m_InstanceOcclusionCullingKernels: {fileID: 7200000, guid: f6d223acabc2f974795a5a7864b50e6c, type: 3} + m_OcclusionCullingDebugKernels: {fileID: 7200000, guid: b23e766bcf50ca4438ef186b174557df, type: 3} + m_DebugOcclusionTestPS: {fileID: 4800000, guid: d3f0849180c2d0944bc71060693df100, type: 3} + m_DebugOccluderPS: {fileID: 4800000, guid: b3c92426a88625841ab15ca6a7917248, type: 3} + - rid: 6852985685364965387 + type: {class: STP/RuntimeResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_setupCS: {fileID: 7200000, guid: 33be2e9a5506b2843bdb2bdff9cad5e1, type: 3} + m_preTaaCS: {fileID: 7200000, guid: a679dba8ec4d9ce45884a270b0e22dda, type: 3} + m_taaCS: {fileID: 7200000, guid: 3923900e2b41b5e47bc25bfdcbcdc9e6, type: 3} + - rid: 6852985685364965388 + type: {class: ProbeVolumeBakingResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 1 + dilationShader: {fileID: 7200000, guid: 6bb382f7de370af41b775f54182e491d, type: 3} + subdivideSceneCS: {fileID: 7200000, guid: bb86f1f0af829fd45b2ebddda1245c22, type: 3} + voxelizeSceneShader: {fileID: 4800000, guid: c8b6a681c7b4e2e4785ffab093907f9e, type: 3} + traceVirtualOffsetCS: {fileID: -6772857160820960102, guid: ff2cbab5da58bf04d82c5f34037ed123, type: 3} + traceVirtualOffsetRT: {fileID: -5126288278712620388, guid: ff2cbab5da58bf04d82c5f34037ed123, type: 3} + skyOcclusionCS: {fileID: -6772857160820960102, guid: 5a2a534753fbdb44e96c3c78b5a6999d, type: 3} + skyOcclusionRT: {fileID: -5126288278712620388, guid: 5a2a534753fbdb44e96c3c78b5a6999d, type: 3} + renderingLayerCS: {fileID: -6772857160820960102, guid: 94a070d33e408384bafc1dea4a565df9, type: 3} + renderingLayerRT: {fileID: -5126288278712620388, guid: 94a070d33e408384bafc1dea4a565df9, type: 3} + - rid: 6852985685364965389 + type: {class: ProbeVolumeGlobalSettings, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 1 + m_ProbeVolumeDisableStreamingAssets: 0 + - rid: 6852985685364965390 + type: {class: ProbeVolumeDebugResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 1 + probeVolumeDebugShader: {fileID: 4800000, guid: 3b21275fd12d65f49babb5286f040f2d, type: 3} + probeVolumeFragmentationDebugShader: {fileID: 4800000, guid: 3a80877c579b9144ebdcc6d923bca303, type: 3} + probeVolumeSamplingDebugShader: {fileID: 4800000, guid: bf54e6528c79a224e96346799064c393, type: 3} + probeVolumeOffsetDebugShader: {fileID: 4800000, guid: db8bd7436dc2c5f4c92655307d198381, type: 3} + probeSamplingDebugMesh: {fileID: -3555484719484374845, guid: 20be25aac4e22ee49a7db76fb3df6de2, type: 3} + numbersDisplayTex: {fileID: 2800000, guid: 73fe53b428c5b3440b7e87ee830b608a, type: 3} + - rid: 6852985685364965391 + type: {class: IncludeAdditionalRPAssets, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_version: 0 + m_IncludeReferencedInScenes: 0 + m_IncludeAssetsByLabel: 0 + m_LabelToInclude: + - rid: 6852985685364965392 + type: {class: ShaderStrippingSetting, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 0 + m_ExportShaderVariants: 1 + m_ShaderVariantLogLevel: 0 + m_StripRuntimeDebugShaders: 1 + - rid: 6852985685364965393 + type: {class: ProbeVolumeRuntimeResources, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 1 + probeVolumeBlendStatesCS: {fileID: 7200000, guid: a3f7b8c99de28a94684cb1daebeccf5d, type: 3} + probeVolumeUploadDataCS: {fileID: 7200000, guid: 0951de5992461754fa73650732c4954c, type: 3} + probeVolumeUploadDataL2CS: {fileID: 7200000, guid: 6196f34ed825db14b81fb3eb0ea8d931, type: 3} + - rid: 6852985685364965394 + type: {class: RenderGraphGlobalSettings, ns: UnityEngine.Rendering, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_version: 0 + m_EnableCompilationCaching: 1 + m_EnableValidityChecks: 1 + - rid: 7620972423683506176 + type: {class: UniversalRenderPipelineEditorAssets, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_DefaultSettingsVolumeProfile: {fileID: 11400000, guid: eda47df5b85f4f249abf7abd73db2cb2, type: 2} + - rid: 7620972423683506177 + type: {class: UniversalRenderPipelineRuntimeXRResources, ns: UnityEngine.Rendering.Universal, asm: Unity.RenderPipelines.Universal.Runtime} + data: + m_xrOcclusionMeshPS: {fileID: 4800000, guid: 4431b1f1f743fbf4eb310a967890cbea, type: 3} + m_xrMirrorViewPS: {fileID: 4800000, guid: d5a307c014552314b9f560906d708772, type: 3} + m_xrMotionVector: {fileID: 4800000, guid: f89aac1e4f84468418fe30e611dff395, type: 3} + - rid: 8712630790384254976 + type: {class: RenderGraphUtilsResources, ns: UnityEngine.Rendering.RenderGraphModule.Util, asm: Unity.RenderPipelines.Core.Runtime} + data: + m_Version: 0 + m_CoreCopyPS: {fileID: 4800000, guid: 12dc59547ea167a4ab435097dd0f9add, type: 3} diff --git a/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset.meta b/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset.meta new file mode 100644 index 00000000..81b84f2a --- /dev/null +++ b/Assets/Settings/UniversalRenderPipelineGlobalSettings.asset.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 18dc0cd2c080841dea60987a38ce93fa +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 11400000 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/StreamingAssets.meta b/Assets/StreamingAssets.meta new file mode 100644 index 00000000..09299401 --- /dev/null +++ b/Assets/StreamingAssets.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9f36911faf742c0439a2af9ebb9cacb2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo.meta b/Assets/TutorialInfo.meta new file mode 100644 index 00000000..a700bca4 --- /dev/null +++ b/Assets/TutorialInfo.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ba062aa6c92b140379dbc06b43dd3b9b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Icons.meta b/Assets/TutorialInfo/Icons.meta new file mode 100644 index 00000000..1d19fb99 --- /dev/null +++ b/Assets/TutorialInfo/Icons.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 8a0c9218a650547d98138cd835033977 +folderAsset: yes +timeCreated: 1484670163 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Icons/URP.png b/Assets/TutorialInfo/Icons/URP.png new file mode 100644 index 00000000..6194a807 Binary files /dev/null and b/Assets/TutorialInfo/Icons/URP.png differ diff --git a/Assets/TutorialInfo/Icons/URP.png.meta b/Assets/TutorialInfo/Icons/URP.png.meta new file mode 100644 index 00000000..0f2cab05 --- /dev/null +++ b/Assets/TutorialInfo/Icons/URP.png.meta @@ -0,0 +1,134 @@ +fileFormatVersion: 2 +guid: 727a75301c3d24613a3ebcec4a24c2c8 +TextureImporter: + internalIDToNameTable: [] + externalObjects: {} + serializedVersion: 11 + mipmaps: + mipMapMode: 0 + enableMipMap: 0 + sRGBTexture: 1 + linearTexture: 0 + fadeOut: 0 + borderMipMap: 0 + mipMapsPreserveCoverage: 0 + alphaTestReferenceValue: 0.5 + mipMapFadeDistanceStart: 1 + mipMapFadeDistanceEnd: 3 + bumpmap: + convertToNormalMap: 0 + externalNormalMap: 0 + heightScale: 0.25 + normalMapFilter: 0 + isReadable: 0 + streamingMipmaps: 0 + streamingMipmapsPriority: 0 + vTOnly: 0 + ignoreMasterTextureLimit: 0 + grayScaleToAlpha: 0 + generateCubemap: 6 + cubemapConvolution: 0 + seamlessCubemap: 0 + textureFormat: 1 + maxTextureSize: 2048 + textureSettings: + serializedVersion: 2 + filterMode: 0 + aniso: 1 + mipBias: 0 + wrapU: 1 + wrapV: 1 + wrapW: 0 + nPOTScale: 0 + lightmap: 0 + compressionQuality: 50 + spriteMode: 0 + spriteExtrude: 1 + spriteMeshType: 1 + alignment: 0 + spritePivot: {x: 0.5, y: 0.5} + spritePixelsToUnits: 100 + spriteBorder: {x: 0, y: 0, z: 0, w: 0} + spriteGenerateFallbackPhysicsShape: 1 + alphaUsage: 1 + alphaIsTransparency: 1 + spriteTessellationDetail: -1 + textureType: 2 + textureShape: 1 + singleChannelComponent: 0 + flipbookRows: 1 + flipbookColumns: 1 + maxTextureSizeSet: 0 + compressionQualitySet: 0 + textureFormatSet: 0 + ignorePngGamma: 0 + applyGammaDecoding: 0 + platformSettings: + - serializedVersion: 3 + buildTarget: DefaultTexturePlatform + maxTextureSize: 2048 + resizeAlgorithm: 0 + textureFormat: -1 + textureCompression: 0 + compressionQuality: 50 + crunchedCompression: 0 + allowsAlphaSplitting: 0 + overridden: 0 + androidETC2FallbackOverride: 0 + forceMaximumCompressionQuality_BC6H_BC7: 0 + - serializedVersion: 3 + buildTarget: Standalone + maxTextureSize: 2048 + resizeAlgorithm: 0 + textureFormat: -1 + textureCompression: 1 + compressionQuality: 50 + crunchedCompression: 0 + allowsAlphaSplitting: 0 + overridden: 0 + androidETC2FallbackOverride: 0 + forceMaximumCompressionQuality_BC6H_BC7: 0 + - serializedVersion: 3 + buildTarget: Android + maxTextureSize: 2048 + resizeAlgorithm: 0 + textureFormat: -1 + textureCompression: 1 + compressionQuality: 50 + crunchedCompression: 0 + allowsAlphaSplitting: 0 + overridden: 0 + androidETC2FallbackOverride: 0 + forceMaximumCompressionQuality_BC6H_BC7: 0 + - serializedVersion: 3 + buildTarget: iPhone + maxTextureSize: 2048 + resizeAlgorithm: 0 + textureFormat: -1 + textureCompression: 1 + compressionQuality: 50 + crunchedCompression: 0 + allowsAlphaSplitting: 0 + overridden: 0 + androidETC2FallbackOverride: 0 + forceMaximumCompressionQuality_BC6H_BC7: 0 + spriteSheet: + serializedVersion: 2 + sprites: [] + outline: [] + physicsShape: [] + bones: [] + spriteID: + internalID: 0 + vertices: [] + indices: + edges: [] + weights: [] + secondaryTextures: [] + nameFileIdTable: {} + spritePackingTag: + pSDRemoveMatte: 0 + pSDShowRemoveMatteOption: 0 + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Layout.wlt b/Assets/TutorialInfo/Layout.wlt new file mode 100644 index 00000000..7b50a252 --- /dev/null +++ b/Assets/TutorialInfo/Layout.wlt @@ -0,0 +1,654 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!114 &1 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12004, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_PixelRect: + serializedVersion: 2 + x: 0 + y: 45 + width: 1666 + height: 958 + m_ShowMode: 4 + m_Title: + m_RootView: {fileID: 6} + m_MinSize: {x: 950, y: 542} + m_MaxSize: {x: 10000, y: 10000} +--- !u!114 &2 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12006, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 466 + width: 290 + height: 442 + m_MinSize: {x: 234, y: 271} + m_MaxSize: {x: 10004, y: 10021} + m_ActualView: {fileID: 14} + m_Panes: + - {fileID: 14} + m_Selected: 0 + m_LastSelected: 0 +--- !u!114 &3 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12010, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: + - {fileID: 4} + - {fileID: 2} + m_Position: + serializedVersion: 2 + x: 973 + y: 0 + width: 290 + height: 908 + m_MinSize: {x: 234, y: 492} + m_MaxSize: {x: 10004, y: 14042} + vertical: 1 + controlID: 226 +--- !u!114 &4 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12006, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 0 + width: 290 + height: 466 + m_MinSize: {x: 204, y: 221} + m_MaxSize: {x: 4004, y: 4021} + m_ActualView: {fileID: 17} + m_Panes: + - {fileID: 17} + m_Selected: 0 + m_LastSelected: 0 +--- !u!114 &5 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12006, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 466 + width: 973 + height: 442 + m_MinSize: {x: 202, y: 221} + m_MaxSize: {x: 4002, y: 4021} + m_ActualView: {fileID: 15} + m_Panes: + - {fileID: 15} + m_Selected: 0 + m_LastSelected: 0 +--- !u!114 &6 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12008, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: + - {fileID: 7} + - {fileID: 8} + - {fileID: 9} + m_Position: + serializedVersion: 2 + x: 0 + y: 0 + width: 1666 + height: 958 + m_MinSize: {x: 950, y: 542} + m_MaxSize: {x: 10000, y: 10000} +--- !u!114 &7 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12011, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 0 + width: 1666 + height: 30 + m_MinSize: {x: 0, y: 0} + m_MaxSize: {x: 0, y: 0} + m_LastLoadedLayoutName: Tutorial +--- !u!114 &8 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12010, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: + - {fileID: 10} + - {fileID: 3} + - {fileID: 11} + m_Position: + serializedVersion: 2 + x: 0 + y: 30 + width: 1666 + height: 908 + m_MinSize: {x: 713, y: 492} + m_MaxSize: {x: 18008, y: 14042} + vertical: 0 + controlID: 74 +--- !u!114 &9 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12042, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 938 + width: 1666 + height: 20 + m_MinSize: {x: 0, y: 0} + m_MaxSize: {x: 0, y: 0} +--- !u!114 &10 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12010, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: + - {fileID: 12} + - {fileID: 5} + m_Position: + serializedVersion: 2 + x: 0 + y: 0 + width: 973 + height: 908 + m_MinSize: {x: 202, y: 442} + m_MaxSize: {x: 4002, y: 8042} + vertical: 1 + controlID: 75 +--- !u!114 &11 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12006, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 1263 + y: 0 + width: 403 + height: 908 + m_MinSize: {x: 277, y: 71} + m_MaxSize: {x: 4002, y: 4021} + m_ActualView: {fileID: 13} + m_Panes: + - {fileID: 13} + m_Selected: 0 + m_LastSelected: 0 +--- !u!114 &12 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12006, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_Children: [] + m_Position: + serializedVersion: 2 + x: 0 + y: 0 + width: 973 + height: 466 + m_MinSize: {x: 202, y: 221} + m_MaxSize: {x: 4002, y: 4021} + m_ActualView: {fileID: 16} + m_Panes: + - {fileID: 16} + m_Selected: 0 + m_LastSelected: 0 +--- !u!114 &13 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12019, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_AutoRepaintOnSceneChange: 0 + m_MinSize: {x: 275, y: 50} + m_MaxSize: {x: 4000, y: 4000} + m_TitleContent: + m_Text: Inspector + m_Image: {fileID: -6905738622615590433, guid: 0000000000000000d000000000000000, + type: 0} + m_Tooltip: + m_DepthBufferBits: 0 + m_Pos: + serializedVersion: 2 + x: 2 + y: 19 + width: 401 + height: 887 + m_ScrollPosition: {x: 0, y: 0} + m_InspectorMode: 0 + m_PreviewResizer: + m_CachedPref: -160 + m_ControlHash: -371814159 + m_PrefName: Preview_InspectorPreview + m_PreviewWindow: {fileID: 0} +--- !u!114 &14 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12014, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_AutoRepaintOnSceneChange: 0 + m_MinSize: {x: 230, y: 250} + m_MaxSize: {x: 10000, y: 10000} + m_TitleContent: + m_Text: Project + m_Image: {fileID: -7501376956915960154, guid: 0000000000000000d000000000000000, + type: 0} + m_Tooltip: + m_DepthBufferBits: 0 + m_Pos: + serializedVersion: 2 + x: 2 + y: 19 + width: 286 + height: 421 + m_SearchFilter: + m_NameFilter: + m_ClassNames: [] + m_AssetLabels: [] + m_AssetBundleNames: [] + m_VersionControlStates: [] + m_ReferencingInstanceIDs: + m_ScenePaths: [] + m_ShowAllHits: 0 + m_SearchArea: 0 + m_Folders: + - Assets + m_ViewMode: 0 + m_StartGridSize: 64 + m_LastFolders: + - Assets + m_LastFoldersGridSize: -1 + m_LastProjectPath: /Users/danielbrauer/Unity Projects/New Unity Project 47 + m_IsLocked: 0 + m_FolderTreeState: + scrollPos: {x: 0, y: 0} + m_SelectedIDs: ee240000 + m_LastClickedID: 9454 + m_ExpandedIDs: ee24000000ca9a3bffffff7f + m_RenameOverlay: + m_UserAcceptedRename: 0 + m_Name: + m_OriginalName: + m_EditFieldRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 0 + height: 0 + m_UserData: 0 + m_IsWaitingForDelay: 0 + m_IsRenaming: 0 + m_OriginalEventType: 11 + m_IsRenamingFilename: 1 + m_ClientGUIView: {fileID: 0} + m_SearchString: + m_CreateAssetUtility: + m_EndAction: {fileID: 0} + m_InstanceID: 0 + m_Path: + m_Icon: {fileID: 0} + m_ResourceFile: + m_AssetTreeState: + scrollPos: {x: 0, y: 0} + m_SelectedIDs: 68fbffff + m_LastClickedID: 0 + m_ExpandedIDs: ee240000 + m_RenameOverlay: + m_UserAcceptedRename: 0 + m_Name: + m_OriginalName: + m_EditFieldRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 0 + height: 0 + m_UserData: 0 + m_IsWaitingForDelay: 0 + m_IsRenaming: 0 + m_OriginalEventType: 11 + m_IsRenamingFilename: 1 + m_ClientGUIView: {fileID: 0} + m_SearchString: + m_CreateAssetUtility: + m_EndAction: {fileID: 0} + m_InstanceID: 0 + m_Path: + m_Icon: {fileID: 0} + m_ResourceFile: + m_ListAreaState: + m_SelectedInstanceIDs: 68fbffff + m_LastClickedInstanceID: -1176 + m_HadKeyboardFocusLastEvent: 0 + m_ExpandedInstanceIDs: c6230000 + m_RenameOverlay: + m_UserAcceptedRename: 0 + m_Name: + m_OriginalName: + m_EditFieldRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 0 + height: 0 + m_UserData: 0 + m_IsWaitingForDelay: 0 + m_IsRenaming: 0 + m_OriginalEventType: 11 + m_IsRenamingFilename: 1 + m_ClientGUIView: {fileID: 0} + m_CreateAssetUtility: + m_EndAction: {fileID: 0} + m_InstanceID: 0 + m_Path: + m_Icon: {fileID: 0} + m_ResourceFile: + m_NewAssetIndexInList: -1 + m_ScrollPosition: {x: 0, y: 0} + m_GridSize: 64 + m_DirectoriesAreaWidth: 110 +--- !u!114 &15 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12015, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_AutoRepaintOnSceneChange: 1 + m_MinSize: {x: 200, y: 200} + m_MaxSize: {x: 4000, y: 4000} + m_TitleContent: + m_Text: Game + m_Image: {fileID: -2087823869225018852, guid: 0000000000000000d000000000000000, + type: 0} + m_Tooltip: + m_DepthBufferBits: 32 + m_Pos: + serializedVersion: 2 + x: 0 + y: 19 + width: 971 + height: 421 + m_MaximizeOnPlay: 0 + m_Gizmos: 0 + m_Stats: 0 + m_SelectedSizes: 00000000000000000000000000000000000000000000000000000000000000000000000000000000 + m_TargetDisplay: 0 + m_ZoomArea: + m_HRangeLocked: 0 + m_VRangeLocked: 0 + m_HBaseRangeMin: -242.75 + m_HBaseRangeMax: 242.75 + m_VBaseRangeMin: -101 + m_VBaseRangeMax: 101 + m_HAllowExceedBaseRangeMin: 1 + m_HAllowExceedBaseRangeMax: 1 + m_VAllowExceedBaseRangeMin: 1 + m_VAllowExceedBaseRangeMax: 1 + m_ScaleWithWindow: 0 + m_HSlider: 0 + m_VSlider: 0 + m_IgnoreScrollWheelUntilClicked: 0 + m_EnableMouseInput: 1 + m_EnableSliderZoom: 0 + m_UniformScale: 1 + m_UpDirection: 1 + m_DrawArea: + serializedVersion: 2 + x: 0 + y: 17 + width: 971 + height: 404 + m_Scale: {x: 2, y: 2} + m_Translation: {x: 485.5, y: 202} + m_MarginLeft: 0 + m_MarginRight: 0 + m_MarginTop: 0 + m_MarginBottom: 0 + m_LastShownAreaInsideMargins: + serializedVersion: 2 + x: -242.75 + y: -101 + width: 485.5 + height: 202 + m_MinimalGUI: 1 + m_defaultScale: 2 + m_TargetTexture: {fileID: 0} + m_CurrentColorSpace: 0 + m_LastWindowPixelSize: {x: 1942, y: 842} + m_ClearInEditMode: 1 + m_NoCameraWarning: 1 + m_LowResolutionForAspectRatios: 01000000000100000100 +--- !u!114 &16 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12013, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_AutoRepaintOnSceneChange: 1 + m_MinSize: {x: 200, y: 200} + m_MaxSize: {x: 4000, y: 4000} + m_TitleContent: + m_Text: Scene + m_Image: {fileID: 2318424515335265636, guid: 0000000000000000d000000000000000, + type: 0} + m_Tooltip: + m_DepthBufferBits: 32 + m_Pos: + serializedVersion: 2 + x: 0 + y: 19 + width: 971 + height: 445 + m_SceneLighting: 1 + lastFramingTime: 0 + m_2DMode: 0 + m_isRotationLocked: 0 + m_AudioPlay: 0 + m_Position: + m_Target: {x: 0, y: 0, z: 0} + speed: 2 + m_Value: {x: 0, y: 0, z: 0} + m_RenderMode: 0 + m_ValidateTrueMetals: 0 + m_SceneViewState: + showFog: 1 + showMaterialUpdate: 0 + showSkybox: 1 + showFlares: 1 + showImageEffects: 1 + grid: + xGrid: + m_Target: 0 + speed: 2 + m_Value: 0 + yGrid: + m_Target: 1 + speed: 2 + m_Value: 1 + zGrid: + m_Target: 0 + speed: 2 + m_Value: 0 + m_Rotation: + m_Target: {x: -0.08717229, y: 0.89959055, z: -0.21045254, w: -0.3726226} + speed: 2 + m_Value: {x: -0.08717229, y: 0.89959055, z: -0.21045254, w: -0.3726226} + m_Size: + m_Target: 10 + speed: 2 + m_Value: 10 + m_Ortho: + m_Target: 0 + speed: 2 + m_Value: 0 + m_LastSceneViewRotation: {x: 0, y: 0, z: 0, w: 0} + m_LastSceneViewOrtho: 0 + m_ReplacementShader: {fileID: 0} + m_ReplacementString: + m_LastLockedObject: {fileID: 0} + m_ViewIsLockedToObject: 0 +--- !u!114 &17 +MonoBehaviour: + m_ObjectHideFlags: 52 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 0} + m_GameObject: {fileID: 0} + m_Enabled: 1 + m_EditorHideFlags: 1 + m_Script: {fileID: 12061, guid: 0000000000000000e000000000000000, type: 0} + m_Name: + m_EditorClassIdentifier: + m_AutoRepaintOnSceneChange: 0 + m_MinSize: {x: 200, y: 200} + m_MaxSize: {x: 4000, y: 4000} + m_TitleContent: + m_Text: Hierarchy + m_Image: {fileID: -590624980919486359, guid: 0000000000000000d000000000000000, + type: 0} + m_Tooltip: + m_DepthBufferBits: 0 + m_Pos: + serializedVersion: 2 + x: 2 + y: 19 + width: 286 + height: 445 + m_TreeViewState: + scrollPos: {x: 0, y: 0} + m_SelectedIDs: 68fbffff + m_LastClickedID: -1176 + m_ExpandedIDs: 7efbffff00000000 + m_RenameOverlay: + m_UserAcceptedRename: 0 + m_Name: + m_OriginalName: + m_EditFieldRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 0 + height: 0 + m_UserData: 0 + m_IsWaitingForDelay: 0 + m_IsRenaming: 0 + m_OriginalEventType: 11 + m_IsRenamingFilename: 0 + m_ClientGUIView: {fileID: 0} + m_SearchString: + m_ExpandedScenes: + - + m_CurrenRootInstanceID: 0 + m_Locked: 0 + m_CurrentSortingName: TransformSorting diff --git a/Assets/TutorialInfo/Layout.wlt.meta b/Assets/TutorialInfo/Layout.wlt.meta new file mode 100644 index 00000000..c0c8c773 --- /dev/null +++ b/Assets/TutorialInfo/Layout.wlt.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: eabc9546105bf4accac1fd62a63e88e6 +timeCreated: 1487337779 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Scripts.meta b/Assets/TutorialInfo/Scripts.meta new file mode 100644 index 00000000..02da605b --- /dev/null +++ b/Assets/TutorialInfo/Scripts.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 5a9bcd70e6a4b4b05badaa72e827d8e0 +folderAsset: yes +timeCreated: 1475835190 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Scripts/Editor.meta b/Assets/TutorialInfo/Scripts/Editor.meta new file mode 100644 index 00000000..f59f0996 --- /dev/null +++ b/Assets/TutorialInfo/Scripts/Editor.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 3ad9b87dffba344c89909c6d1b1c17e1 +folderAsset: yes +timeCreated: 1475593892 +licenseType: Store +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs b/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs new file mode 100644 index 00000000..ad55ecaa --- /dev/null +++ b/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs @@ -0,0 +1,242 @@ +using System.Collections; +using System.Collections.Generic; +using UnityEngine; +using UnityEditor; +using System; +using System.IO; +using System.Reflection; + +[CustomEditor(typeof(Readme))] +[InitializeOnLoad] +public class ReadmeEditor : Editor +{ + static string s_ShowedReadmeSessionStateName = "ReadmeEditor.showedReadme"; + + static string s_ReadmeSourceDirectory = "Assets/TutorialInfo"; + + const float k_Space = 16f; + + static ReadmeEditor() + { + EditorApplication.delayCall += SelectReadmeAutomatically; + } + + static void RemoveTutorial() + { + if (EditorUtility.DisplayDialog("Remove Readme Assets", + + $"All contents under {s_ReadmeSourceDirectory} will be removed, are you sure you want to proceed?", + "Proceed", + "Cancel")) + { + if (Directory.Exists(s_ReadmeSourceDirectory)) + { + FileUtil.DeleteFileOrDirectory(s_ReadmeSourceDirectory); + FileUtil.DeleteFileOrDirectory(s_ReadmeSourceDirectory + ".meta"); + } + else + { + Debug.Log($"Could not find the Readme folder at {s_ReadmeSourceDirectory}"); + } + + var readmeAsset = SelectReadme(); + if (readmeAsset != null) + { + var path = AssetDatabase.GetAssetPath(readmeAsset); + FileUtil.DeleteFileOrDirectory(path + ".meta"); + FileUtil.DeleteFileOrDirectory(path); + } + + AssetDatabase.Refresh(); + } + } + + static void SelectReadmeAutomatically() + { + if (!SessionState.GetBool(s_ShowedReadmeSessionStateName, false)) + { + var readme = SelectReadme(); + SessionState.SetBool(s_ShowedReadmeSessionStateName, true); + + if (readme && !readme.loadedLayout) + { + LoadLayout(); + readme.loadedLayout = true; + } + } + } + + static void LoadLayout() + { + var assembly = typeof(EditorApplication).Assembly; + var windowLayoutType = assembly.GetType("UnityEditor.WindowLayout", true); + var method = windowLayoutType.GetMethod("LoadWindowLayout", BindingFlags.Public | BindingFlags.Static); + method.Invoke(null, new object[] { Path.Combine(Application.dataPath, "TutorialInfo/Layout.wlt"), false }); + } + + static Readme SelectReadme() + { + var ids = AssetDatabase.FindAssets("Readme t:Readme"); + if (ids.Length == 1) + { + var readmeObject = AssetDatabase.LoadMainAssetAtPath(AssetDatabase.GUIDToAssetPath(ids[0])); + + Selection.objects = new UnityEngine.Object[] { readmeObject }; + + return (Readme)readmeObject; + } + else + { + Debug.Log("Couldn't find a readme"); + return null; + } + } + + protected override void OnHeaderGUI() + { + var readme = (Readme)target; + Init(); + + var iconWidth = Mathf.Min(EditorGUIUtility.currentViewWidth / 3f - 20f, 128f); + + GUILayout.BeginHorizontal("In BigTitle"); + { + if (readme.icon != null) + { + GUILayout.Space(k_Space); + GUILayout.Label(readme.icon, GUILayout.Width(iconWidth), GUILayout.Height(iconWidth)); + } + GUILayout.Space(k_Space); + GUILayout.BeginVertical(); + { + + GUILayout.FlexibleSpace(); + GUILayout.Label(readme.title, TitleStyle); + GUILayout.FlexibleSpace(); + } + GUILayout.EndVertical(); + GUILayout.FlexibleSpace(); + } + GUILayout.EndHorizontal(); + } + + public override void OnInspectorGUI() + { + var readme = (Readme)target; + Init(); + + foreach (var section in readme.sections) + { + if (!string.IsNullOrEmpty(section.heading)) + { + GUILayout.Label(section.heading, HeadingStyle); + } + + if (!string.IsNullOrEmpty(section.text)) + { + GUILayout.Label(section.text, BodyStyle); + } + + if (!string.IsNullOrEmpty(section.linkText)) + { + if (LinkLabel(new GUIContent(section.linkText))) + { + Application.OpenURL(section.url); + } + } + + GUILayout.Space(k_Space); + } + + if (GUILayout.Button("Remove Readme Assets", ButtonStyle)) + { + RemoveTutorial(); + } + } + + bool m_Initialized; + + GUIStyle LinkStyle + { + get { return m_LinkStyle; } + } + + [SerializeField] + GUIStyle m_LinkStyle; + + GUIStyle TitleStyle + { + get { return m_TitleStyle; } + } + + [SerializeField] + GUIStyle m_TitleStyle; + + GUIStyle HeadingStyle + { + get { return m_HeadingStyle; } + } + + [SerializeField] + GUIStyle m_HeadingStyle; + + GUIStyle BodyStyle + { + get { return m_BodyStyle; } + } + + [SerializeField] + GUIStyle m_BodyStyle; + + GUIStyle ButtonStyle + { + get { return m_ButtonStyle; } + } + + [SerializeField] + GUIStyle m_ButtonStyle; + + void Init() + { + if (m_Initialized) + return; + m_BodyStyle = new GUIStyle(EditorStyles.label); + m_BodyStyle.wordWrap = true; + m_BodyStyle.fontSize = 14; + m_BodyStyle.richText = true; + + m_TitleStyle = new GUIStyle(m_BodyStyle); + m_TitleStyle.fontSize = 26; + + m_HeadingStyle = new GUIStyle(m_BodyStyle); + m_HeadingStyle.fontStyle = FontStyle.Bold; + m_HeadingStyle.fontSize = 18; + + m_LinkStyle = new GUIStyle(m_BodyStyle); + m_LinkStyle.wordWrap = false; + + // Match selection color which works nicely for both light and dark skins + m_LinkStyle.normal.textColor = new Color(0x00 / 255f, 0x78 / 255f, 0xDA / 255f, 1f); + m_LinkStyle.stretchWidth = false; + + m_ButtonStyle = new GUIStyle(EditorStyles.miniButton); + m_ButtonStyle.fontStyle = FontStyle.Bold; + + m_Initialized = true; + } + + bool LinkLabel(GUIContent label, params GUILayoutOption[] options) + { + var position = GUILayoutUtility.GetRect(label, LinkStyle, options); + + Handles.BeginGUI(); + Handles.color = LinkStyle.normal.textColor; + Handles.DrawLine(new Vector3(position.xMin, position.yMax), new Vector3(position.xMax, position.yMax)); + Handles.color = Color.white; + Handles.EndGUI(); + + EditorGUIUtility.AddCursorRect(position, MouseCursor.Link); + + return GUI.Button(position, label, LinkStyle); + } +} diff --git a/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs.meta b/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs.meta new file mode 100644 index 00000000..f0386181 --- /dev/null +++ b/Assets/TutorialInfo/Scripts/Editor/ReadmeEditor.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: 476cc7d7cd9874016adc216baab94a0a +timeCreated: 1484146680 +licenseType: Store +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Assets/TutorialInfo/Scripts/Readme.cs b/Assets/TutorialInfo/Scripts/Readme.cs new file mode 100644 index 00000000..95f62693 --- /dev/null +++ b/Assets/TutorialInfo/Scripts/Readme.cs @@ -0,0 +1,16 @@ +using System; +using UnityEngine; + +public class Readme : ScriptableObject +{ + public Texture2D icon; + public string title; + public Section[] sections; + public bool loadedLayout; + + [Serializable] + public class Section + { + public string heading, text, linkText, url; + } +} diff --git a/Assets/TutorialInfo/Scripts/Readme.cs.meta b/Assets/TutorialInfo/Scripts/Readme.cs.meta new file mode 100644 index 00000000..935153ff --- /dev/null +++ b/Assets/TutorialInfo/Scripts/Readme.cs.meta @@ -0,0 +1,12 @@ +fileFormatVersion: 2 +guid: fcf7219bab7fe46a1ad266029b2fee19 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: + - icon: {instanceID: 0} + executionOrder: 0 + icon: {fileID: 2800000, guid: a186f8a87ca4f4d3aa864638ad5dfb65, type: 3} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/CHANGELOG.md b/Packages/com.tivadar.best.http/CHANGELOG.md new file mode 100644 index 00000000..057e74f2 --- /dev/null +++ b/Packages/com.tivadar.best.http/CHANGELOG.md @@ -0,0 +1,28 @@ +# Changelog + +## 3.0.0 (2023-01-01) + +__Additions and improvements__ + +- New namespace hierarchy. +- Added [DNSCache](https://bestdocshub.pages.dev/Shared/DNS/dns-cache.md) implementation to speed up consecutive connection processes. +- Added support for [DNSCache](https://bestdocshub.pages.dev/HTTP/api-reference/Cache/DNSCache.md) to manually store and retrieve entries. +- Added new [Negotiator](https://bestdocshub.pages.dev/HTTP/api-reference/Tcp/Negotiator.md) class help building new plugins that doesn't use HTTP, but require the same lower-level infrastructure. +- Added new [TCPRingmaster](https://bestdocshub.pages.dev/HTTP/api-reference/Tcp/TCPRingmaster.md) class to speed up TCP connection process by sending out multiple tcp connection requests and use the first connected one. +- Reimplemented connection logic to use the new DNS cache, negotiator and tcp-ringmaster. +- Reimplemented network read and write operations. Instead of blocking Reads&Writes, now the plugin uses non-blocking functions. This enabled implementing new ways for downloads and uploads. There's forward and backward feedback between the low level tcp layer and higher level connection layers. If the [download-stream](https://bestdocshub.pages.dev/HTTP/api-reference/Response/DownloadContentStream.md)'s buffer is full, it can notify the tcp layer that it can resume receiving from the server. +- Reimplemented [HTTPCache](https://bestdocshub.pages.dev/HTTP/api-reference/Caching/HTTPCache.md), it's got more robust and future proof. +- (#69) Now it's possible and easy to populate the local HTTP cache. +- Added new, cleaner samples for both old and new features. +- Halved active threads per connections. +- Added [Memory](https://bestdocshub.pages.dev/Shared/Profiler/memory.md) and [Network](https://bestdocshub.pages.dev/Shared/Profiler/memory.md) profilers. + +__Removals__ + +- Removed old, cluttered samples. + +__Fixes__ + +- Fixed chaos around different upload sources (RawData, Forms, UploadStream) and unified them in one [UploadStream](https://bestdocshub.pages.dev/HTTP/getting-started/uploads.md). + +For API changes and upgrade guides see the [Upgrade Guide topic](https://bestdocshub.pages.dev/HTTP/upgrade-guide.md). \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/CHANGELOG.md.meta b/Packages/com.tivadar.best.http/CHANGELOG.md.meta new file mode 100644 index 00000000..10186d09 --- /dev/null +++ b/Packages/com.tivadar.best.http/CHANGELOG.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: a17df9b0515742b44b02487fd902a50a +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/CHANGELOG.md + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Editor.meta b/Packages/com.tivadar.best.http/Editor.meta new file mode 100644 index 00000000..3ac8603b --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: de19425b9f4e6b244a8fce52c1b74253 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Editor/Profiler.meta b/Packages/com.tivadar.best.http/Editor/Profiler.meta new file mode 100644 index 00000000..175b870b --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a1b9757b08647fd429fb2d3a504d3788 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Memory.meta b/Packages/com.tivadar.best.http/Editor/Profiler/Memory.meta new file mode 100644 index 00000000..4dcf2359 --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Memory.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ee6898caa8b437445b91ccde35286fae +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs b/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs new file mode 100644 index 00000000..ffffec5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs @@ -0,0 +1,25 @@ +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER +using Best.HTTP.Profiler.Memory; + +using Unity.Profiling.Editor; + +namespace Best.HTTP.Editor.Profiler.Memory +{ + [System.Serializable] + [ProfilerModuleMetadata(MemoryStats.CategoryName)] + public sealed class MemoryStatsProfilerModule : ProfilerModule + { + static readonly ProfilerCounterDescriptor[] k_Counters = + { + new ProfilerCounterDescriptor(MemoryStats.BorrowedName, MemoryStats.Category), + new ProfilerCounterDescriptor(MemoryStats.PooledName, MemoryStats.Category), + new ProfilerCounterDescriptor(MemoryStats.CacheHitsName, MemoryStats.Category), + new ProfilerCounterDescriptor(MemoryStats.ArrayAllocationsName, MemoryStats.Category) + }; + + public MemoryStatsProfilerModule() : base(k_Counters) + { + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs.meta b/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs.meta new file mode 100644 index 00000000..c1af90f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a27483e3bb01d5546bd803c92f53c77f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Editor/Profiler/Memory/MemoryStatsProfilerModule.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Network.meta b/Packages/com.tivadar.best.http/Editor/Profiler/Network.meta new file mode 100644 index 00000000..5e07dbeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Network.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 1e4f967529f18d5439bc00808ed1f326 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs b/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs new file mode 100644 index 00000000..e4549fe7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs @@ -0,0 +1,34 @@ +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER +using Unity.Profiling.Editor; + +using Best.HTTP.Profiler.Network; + +namespace Best.HTTP.Editor.Profiler.Network +{ + [System.Serializable] + [ProfilerModuleMetadata(NetworkStats.CategoryName)] + public sealed class NetworkStatsProfilerModule : ProfilerModule + { + static readonly ProfilerCounterDescriptor[] k_Counters = + { + new ProfilerCounterDescriptor(NetworkStats.BufferedToSendName, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.SentSinceLastFrameName, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.SentTotalName, NetworkStats.Category), + + new ProfilerCounterDescriptor(NetworkStats.ReceivedAndUnprocessedName, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.ReceivedSinceLastFrameName, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.ReceivedTotalName, NetworkStats.Category), + + new ProfilerCounterDescriptor(NetworkStats.OpenConnectionsName, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.TotalConnectionsName, NetworkStats.Category), + + new ProfilerCounterDescriptor(NetworkStats.TotalDNSCacheHits, NetworkStats.Category), + new ProfilerCounterDescriptor(NetworkStats.TotalDNSCacheMiss, NetworkStats.Category), + }; + + public NetworkStatsProfilerModule() : base(k_Counters) + { + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs.meta b/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs.meta new file mode 100644 index 00000000..73a70581 --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 997070aa1f569c44ab6386e5a3b8c075 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Editor/Profiler/Network/NetworkStatsProfilerModule.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef b/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef new file mode 100644 index 00000000..f50cad58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef @@ -0,0 +1,25 @@ +{ + "name": "com.Tivadar.Best.HTTP.Profiler.Editor", + "rootNamespace": "", + "references": [ + "GUID:b46779583a009f04ba9f5f31d0e7e6ac", + "GUID:9069ac25d95ca17448a247f3bb1c769f" + ], + "includePlatforms": [ + "Editor" + ], + "excludePlatforms": [], + "allowUnsafeCode": false, + "overrideReferences": false, + "precompiledReferences": [], + "autoReferenced": false, + "defineConstraints": [], + "versionDefines": [ + { + "name": "com.unity.profiling.core", + "expression": "1.0.0", + "define": "BESTHTTP_PROFILE" + } + ], + "noEngineReferences": false +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef.meta b/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef.meta new file mode 100644 index 00000000..4d38e05f --- /dev/null +++ b/Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: f5172b08096bc564e960c6b5e420e790 +AssemblyDefinitionImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Editor/Profiler/com.Tivadar.Best.HTTP.Profiler.Editor.asmdef + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/LICENSE.md b/Packages/com.tivadar.best.http/LICENSE.md new file mode 100644 index 00000000..58d2a045 --- /dev/null +++ b/Packages/com.tivadar.best.http/LICENSE.md @@ -0,0 +1 @@ +The plugin's license falls under the Unity Asset Store EULA that can be found here under Appendix 1: https://unity3d.com/legal/as_terms \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/LICENSE.md.meta b/Packages/com.tivadar.best.http/LICENSE.md.meta new file mode 100644 index 00000000..15029fda --- /dev/null +++ b/Packages/com.tivadar.best.http/LICENSE.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: a2e6e996ec793e84fa9174fa8769cc7f +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/LICENSE.md + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/README.md b/Packages/com.tivadar.best.http/README.md new file mode 100644 index 00000000..5cd2c7ac --- /dev/null +++ b/Packages/com.tivadar.best.http/README.md @@ -0,0 +1,85 @@ +Best HTTP is a comprehensive networking library for Unity that empowers developers to make HTTP and HTTPS requests with ease. +Whether you're building web applications, multiplayer games, or real-time communication solutions, Best HTTP has got you covered. + +## Overview +In today's digital era, efficient and reliable web communication forms the backbone of many applications. +Whether you're fetching data from remote servers, sending game scores, or updating user profiles, HTTP requests are indispensable. +Recognizing the multifaceted needs of Unity developers, Best HTTP is designed to simplify these interactions, providing a streamlined and efficient means to handle web-based communication. + +## Key Features +- **Supported Unity Versions**: Best HTTP is compatible with Unity versions starting from :fontawesome-brands-unity: **2021.1 onwards**. +- **Cross-Platform:** Best HTTP is designed to work seamlessly across a diverse range of Unity platforms, ensuring versatility for all your development needs. Specifically, it supports: + - :fontawesome-solid-desktop: **Desktop**: Windows, Linux, MacOS + - :fontawesome-solid-mobile: **Mobile**: iOS, Android + - :material-microsoft-windows: **Universal Windows Platform** (UWP) + - :material-web: **Web Browsers**: WebGL + + This broad platform support means you can confidently use Best HTTP, regardless of your target audience or deployment strategy. + +- **Versatile Request Outcome Handling**: Best HTTP ensures flexibility in managing network request outcomes to seamlessly fit within your development style and the varied structures of different applications: + - **Traditional Callbacks:** Adopt the classic approach with regular C# callbacks. Ideal for those who prefer traditional programming patterns, allowing for simple and straightforward handling of responses. + - **Unity Coroutines:** For those who are deeply integrated with Unity's workflow, Best HTTP provides native support for Unity's coroutines. This facilitates non-blocking operations while keeping the code structure clean and readable, particularly when sequencing multiple network requests. + - **Async-Await Pattern:** Embrace the modern C# asynchronous programming paradigm with the async-await pattern. Best HTTP's support for this ensures that developers can write non-blocking code in a linear fashion, greatly simplifying error handling and state management for asynchronous operations. + + With these diverse options for request outcome handling, developers can choose the best approach that aligns with their project requirements and personal coding preferences. + +- **HTTP/HTTPS Support**: Best HTTP supports both HTTP and HTTPS protocols, ensuring secure communication for your applications. +- **HTTP/2 Support**: Benefit from the advantages of HTTP/2, including faster loading times, reduced latency and **trailing headers** for advanced scenarios like **GRPC**. +- **Caching**: Implement efficient caching mechanisms to reduce redundant network requests, optimizing your application's performance and data usage. +- **Authentication**: Easily handle various authentication methods, such as Basic, Digest, and Bearer token authentication. +- **Cookie Management**: Manage cookies effortlessly, ensuring smooth user experiences in web applications. +- **Compression**: Compress and decompress data using gzip and deflate algorithms to save bandwidth and improve loading times. +- **Streaming**: Best HTTP supports streaming for both downloads and uploads. This enables you to stream large files and responses directly to storage when downloading, and stream data from storage when uploading, effectively avoiding memory bottlenecks. +- **Customization**: Tailor your HTTP requests with customizable headers, timeouts, and other parameters to meet your specific needs. +- **Built-In Profiler Support**: Best HTTP now comes with a built-in profiler, ensuring developers have direct access to critical insights without the need for external tools. +This enhancement is instrumental in understanding the performance and network behavior of your application, thereby facilitating optimization and debugging. Key features of the built-in profiler include: + - **Memory Profiler:** Dive into the library's internal memory usage. This tool is invaluable for ensuring optimal memory management and for identifying potential bottlenecks or leaks. + - **Network Profiler:** This profiler allows for a granular analysis of your network operations. Notable features include: + - **Byte Tracking:** Monitor the bytes sent and received between two frames, providing a clear overview of data transfers and insight into traffic patterns. + - **Connection Analysis:** Stay informed on the total number of open and closed connections. This data gives a transparent view of your app's network activity. + - **DNS Cache Profiling:** With this feature, you can track DNS cache hits and misses, aiding in the fine-tuning of DNS cache strategies and understanding potential network resolution delays. + + With the integration of this built-in profiler support, developers can not only ensure that their application's network activities are optimized but also make data-driven decisions that enhance both performance and user experience. + +## Installation Guide + +Getting started with Best HTTP is straightforward. +Depending on your preference, you can either install the package via the Unity Asset Store or use a .unitypackage. +Below are step-by-step guides for both methods: + +### Installing from the Unity Asset Store using the Package Manager Window + +1. **Purchase:** If you haven't previously purchased the package, proceed to do so. Once purchased, Unity will recognize your purchase, and you can install the package directly from within the Unity Editor. If you already own the package, you can skip these steps. + 1. **Visit the Unity Asset Store:** Using your preferred web browser, navigate to the [Unity Asset Store](https://assetstore.unity.com/publishers/4137?aid=1101lfX8E). + 2. **Search for Best HTTP:** Locate and choose the official Best HTTP package. + 3. **Buy Best HTTP:** By clicking on the `Buy Now` button go though the purchase process. +2. **Open Unity & Access the Package Manager:** Launch Unity and open your desired project. Navigate to [Window > Package Manager](https://docs.unity3d.com/Manual/upm-ui.html). +3. **Select 'My Assets':** In the Package Manager window, switch to the [My Assets](https://docs.unity3d.com/Manual/upm-ui-import.html) tab. This will show all assets you have access to, including ones you've purchased or added to your Asset Store account. +4. **Find Best HTTP and Download:** Locate "Best HTTP" in the list. Once found, click on it to view the details. If the package isn't already downloaded, you'll see a Download button. Click this button and wait for the package to download. Once downloaded, the button will change to Import. +5. **Import the Package:** After downloading, click the Import button. Unity will then show you a list of all the assets associated with the Best HTTP package. Ensure all assets are checked and click Import. +6. **Confirmation:** Upon importing, Best HTTP will be added to your project, indicating a successful installation. + +### Installing from a .unitypackage file + +In some cases you might have a .unitypackage file containing the plugin. + +1. **Download the .unitypackage:** Ensure you have the Best HTTP.unitypackage file saved on your computer. This might be from a direct download link or an email attachment, depending on how it was distributed. +2. **Import into Unity:** Launch Unity and open your project. Go to Assets > Import Package > Custom Package. +3. **Locate and Select the .unitypackage:** Navigate to the location where you saved the Best HTTP.unitypackage file. Select it and click Open. +4. **Review and Import:** Unity will show you a list of all the assets contained in the package. Make sure all assets are selected and click Import. +5. **Confirmation:** After importing, you should see all the Best HTTP assets added to your project's Asset folder, confirming a successful installation. + +!!! Note + Best HTTP also supports other installation methods as documented in Unity's manual for packages. + For more advanced installation options, refer to the Unity Manual on [Sharing Packages](https://docs.unity3d.com/Manual/cus-share.html). + +### Assembly Definitions and Runtime References +For developers familiar with Unity's development patterns, it's essential to understand how Best HTTP incorporates Unity's systems: + +- **Assembly Definition Files:** Best HTTP incorporates [Unity's Assembly Definition files](https://docs.unity3d.com/Manual/ScriptCompilationAssemblyDefinitionFiles.html). It aids in organizing and managing the codebase efficiently. +- **Auto-Referencing of Runtime DLLs:** The runtime DLLs produced by Best HTTP are [Auto Referenced](https://docs.unity3d.com/Manual/class-AssemblyDefinitionImporter.html), allowing Unity to automatically recognize and utilize them without manual intervention. +- **Manual Package Referencing:** Should you need to reference Best HTTP manually in your project (for advanced setups or specific use cases), you can do so. Simply [reference the package](https://docs.unity3d.com/Manual/ScriptCompilationAssemblyDefinitionFiles.html#reference-another-assembly) by searching for `com.Tivadar.Best.HTTP`. + +That's it! You've now successfully installed Best HTTP in your Unity project. Dive into the [Getting Started guide](getting-started/index.md) to begin your journey with Best HTTP. + +If you encounter any issues or need further assistance, please visit our [Community and Support page](../Shared/support.md). \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/README.md.meta b/Packages/com.tivadar.best.http/README.md.meta new file mode 100644 index 00000000..f95cac05 --- /dev/null +++ b/Packages/com.tivadar.best.http/README.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: d945ceaee22ec124ea21e8924d1780f9 +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/README.md + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime.meta b/Packages/com.tivadar.best.http/Runtime.meta new file mode 100644 index 00000000..c7bfd574 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 547ae4cc6dd99314dab4bd761faa6802 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty.meta new file mode 100644 index 00000000..39b72f8c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2720467a1ae4cdb4c949d469c1827cc2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle.meta new file mode 100644 index 00000000..28fdb9c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 262d190881d534841b89c75741207e22 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt new file mode 100644 index 00000000..96e67d58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt @@ -0,0 +1,7 @@ +Copyright (c) 2000 - 2017 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org) + +Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt.meta new file mode 100644 index 00000000..2e06e6ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: deffb42883fe27b4c833e8617deec47f +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/License.txt + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1.meta new file mode 100644 index 00000000..74859783 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 95944b65ba7736c42b16376b8a546a47 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs new file mode 100644 index 00000000..d6486cfb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Generator + { + private Stream _out; + + protected Asn1Generator( + Stream outStream) + { + _out = outStream; + } + + protected Stream Out + { + get { return _out; } + } + + public abstract void AddObject(Asn1Encodable obj); + + public abstract void AddObject(Asn1Object obj); + + public abstract Stream GetRawOutputStream(); + + public abstract void Close(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs.meta new file mode 100644 index 00000000..b186f2e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7773fea4f16e26d4480e20f8df896c7f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1Generator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs new file mode 100644 index 00000000..758ba1f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface Asn1OctetStringParser + : IAsn1Convertible + { + /// Return the content of the OCTET STRING as a . + /// A represnting the OCTET STRING's content. + Stream GetOctetStream(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs.meta new file mode 100644 index 00000000..7a9e9130 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 106a99bb8c6b6c046b7a5d3f6dc106a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1OctetStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs new file mode 100644 index 00000000..01bcc539 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs @@ -0,0 +1,12 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface Asn1SequenceParser + : IAsn1Convertible + { + IAsn1Convertible ReadObject(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs.meta new file mode 100644 index 00000000..8055a475 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5d90107b1bb70649bd933287abb52a6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SequenceParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs new file mode 100644 index 00000000..42e184fe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs @@ -0,0 +1,12 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface Asn1SetParser + : IAsn1Convertible + { + IAsn1Convertible ReadObject(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs.meta new file mode 100644 index 00000000..d1753dea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d056b261f918f64b8a91a610ceb8702 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1SetParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs new file mode 100644 index 00000000..988c2586 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs @@ -0,0 +1,248 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class Asn1StreamParser + { + private readonly Stream _in; + private readonly int _limit; + + private readonly byte[][] tmpBuffers; + + public Asn1StreamParser(Stream input) + : this(input, Asn1InputStream.FindLimit(input)) + { + } + + public Asn1StreamParser(byte[] encoding) + : this(new MemoryStream(encoding, false), encoding.Length) + { + } + + public Asn1StreamParser(Stream input, int limit) + : this(input, limit, new byte[16][]) + { + } + + internal Asn1StreamParser(Stream input, int limit, byte[][] tmpBuffers) + { + if (!input.CanRead) + throw new ArgumentException("Expected stream to be readable", "input"); + + this._in = input; + this._limit = limit; + this.tmpBuffers = tmpBuffers; + } + + public virtual IAsn1Convertible ReadObject() + { + int tagHdr = _in.ReadByte(); + if (tagHdr < 0) + return null; + + return ImplParseObject(tagHdr); + } + + internal IAsn1Convertible ImplParseObject(int tagHdr) + { + // turn off looking for "00" while we resolve the tag + Set00Check(false); + + // + // calculate tag number + // + int tagNo = Asn1InputStream.ReadTagNumber(_in, tagHdr); + + // + // calculate length + // + int length = Asn1InputStream.ReadLength(_in, _limit, + tagNo == Asn1Tags.BitString || tagNo == Asn1Tags.OctetString || tagNo == Asn1Tags.Sequence || + tagNo == Asn1Tags.Set || tagNo == Asn1Tags.External); + + if (length < 0) // indefinite-length method + { + if (0 == (tagHdr & Asn1Tags.Constructed)) + throw new IOException("indefinite-length primitive encoding encountered"); + + IndefiniteLengthInputStream indIn = new IndefiniteLengthInputStream(_in, _limit); + Asn1StreamParser sp = new Asn1StreamParser(indIn, _limit, tmpBuffers); + + int tagClass = tagHdr & Asn1Tags.Private; + if (0 != tagClass) + return new BerTaggedObjectParser(tagClass, tagNo, sp); + + return sp.ParseImplicitConstructedIL(tagNo); + } + else + { + DefiniteLengthInputStream defIn = new DefiniteLengthInputStream(_in, length, _limit); + + if (0 == (tagHdr & Asn1Tags.Flags)) + return ParseImplicitPrimitive(tagNo, defIn); + + Asn1StreamParser sp = new Asn1StreamParser(defIn, defIn.Remaining, tmpBuffers); + + int tagClass = tagHdr & Asn1Tags.Private; + if (0 != tagClass) + { + bool isConstructed = (tagHdr & Asn1Tags.Constructed) != 0; + + return new DLTaggedObjectParser(tagClass, tagNo, isConstructed, sp); + } + + return sp.ParseImplicitConstructedDL(tagNo); + } + } + + internal Asn1Object LoadTaggedDL(int tagClass, int tagNo, bool constructed) + { + if (!constructed) + { + byte[] contentsOctets = ((DefiniteLengthInputStream)_in).ToArray(); + return Asn1TaggedObject.CreatePrimitive(tagClass, tagNo, contentsOctets); + } + + Asn1EncodableVector contentsElements = ReadVector(); + return Asn1TaggedObject.CreateConstructedDL(tagClass, tagNo, contentsElements); + } + + internal Asn1Object LoadTaggedIL(int tagClass, int tagNo) + { + Asn1EncodableVector contentsElements = ReadVector(); + return Asn1TaggedObject.CreateConstructedIL(tagClass, tagNo, contentsElements); + } + + internal IAsn1Convertible ParseImplicitConstructedDL(int univTagNo) + { + switch (univTagNo) + { + case Asn1Tags.BitString: + // TODO[asn1] DLConstructedBitStringParser + return new BerBitStringParser(this); + case Asn1Tags.External: + return new DerExternalParser(this); + case Asn1Tags.OctetString: + // TODO[asn1] DLConstructedOctetStringParser + return new BerOctetStringParser(this); + case Asn1Tags.Set: + return new DerSetParser(this); + case Asn1Tags.Sequence: + return new DerSequenceParser(this); + default: + throw new Asn1Exception("unknown DL object encountered: 0x" + univTagNo.ToString("X")); + } + } + + internal IAsn1Convertible ParseImplicitConstructedIL(int univTagNo) + { + switch (univTagNo) + { + case Asn1Tags.BitString: + return new BerBitStringParser(this); + case Asn1Tags.External: + // TODO[asn1] BERExternalParser + return new DerExternalParser(this); + case Asn1Tags.OctetString: + return new BerOctetStringParser(this); + case Asn1Tags.Sequence: + return new BerSequenceParser(this); + case Asn1Tags.Set: + return new BerSetParser(this); + default: + throw new Asn1Exception("unknown BER object encountered: 0x" + univTagNo.ToString("X")); + } + } + + internal IAsn1Convertible ParseImplicitPrimitive(int univTagNo) + { + return ParseImplicitPrimitive(univTagNo, (DefiniteLengthInputStream)_in); + } + + internal IAsn1Convertible ParseImplicitPrimitive(int univTagNo, DefiniteLengthInputStream defIn) + { + // Some primitive encodings can be handled by parsers too... + switch (univTagNo) + { + case Asn1Tags.BitString: + return new DLBitStringParser(defIn); + case Asn1Tags.External: + throw new Asn1Exception("externals must use constructed encoding (see X.690 8.18)"); + case Asn1Tags.OctetString: + return new DerOctetStringParser(defIn); + case Asn1Tags.Set: + throw new Asn1Exception("sequences must use constructed encoding (see X.690 8.9.1/8.10.1)"); + case Asn1Tags.Sequence: + throw new Asn1Exception("sets must use constructed encoding (see X.690 8.11.1/8.12.1)"); + } + + try + { + return Asn1InputStream.CreatePrimitiveDerObject(univTagNo, defIn, tmpBuffers); + } + catch (ArgumentException e) + { + throw new Asn1Exception("corrupted stream detected", e); + } + } + + internal IAsn1Convertible ParseObject(int univTagNo) + { + if (univTagNo < 0 || univTagNo > 30) + throw new ArgumentException("invalid universal tag number: " + univTagNo, "univTagNo"); + + int tagHdr = _in.ReadByte(); + if (tagHdr < 0) + return null; + + if ((tagHdr & ~Asn1Tags.Constructed) != univTagNo) + throw new IOException("unexpected identifier encountered: " + tagHdr); + + return ImplParseObject(tagHdr); + } + + internal Asn1TaggedObjectParser ParseTaggedObject() + { + int tagHdr = _in.ReadByte(); + if (tagHdr< 0) + return null; + + int tagClass = tagHdr & Asn1Tags.Private; + if (0 == tagClass) + throw new Asn1Exception("no tagged object found"); + + return (Asn1TaggedObjectParser)ImplParseObject(tagHdr); + } + + // TODO[asn1] Prefer 'LoadVector' + internal Asn1EncodableVector ReadVector() + { + int tagHdr = _in.ReadByte(); + if (tagHdr < 0) + return new Asn1EncodableVector(0); + + Asn1EncodableVector v = new Asn1EncodableVector(); + do + { + IAsn1Convertible obj = ImplParseObject(tagHdr); + + v.Add(obj.ToAsn1Object()); + } + while ((tagHdr = _in.ReadByte()) >= 0); + return v; + } + + private void Set00Check(bool enabled) + { + if (_in is IndefiniteLengthInputStream indef) + { + indef.SetEofOn00(enabled); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs.meta new file mode 100644 index 00000000..e7398923 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ba3873ab071c0c4cb935177f746056d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1StreamParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs new file mode 100644 index 00000000..9980b489 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface Asn1TaggedObjectParser + : IAsn1Convertible + { + int TagClass { get; } + + int TagNo { get; } + + bool HasContextTag(int tagNo); + + bool HasTag(int tagClass, int tagNo); + + /// + IAsn1Convertible ParseBaseUniversal(bool declaredExplicit, int baseTagNo); + + /// Needed for open types, until we have better type-guided parsing support. + /// + /// Use sparingly for other purposes, and prefer or + /// where possible. Before using, check for matching tag + /// class and number. + /// + /// + IAsn1Convertible ParseExplicitBaseObject(); + + /// + Asn1TaggedObjectParser ParseExplicitBaseTagged(); + + /// + Asn1TaggedObjectParser ParseImplicitBaseTagged(int baseTagClass, int baseTagNo); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs.meta new file mode 100644 index 00000000..5bcf69b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea10709a890a7a246bd1f3dd49c4a30f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ASN1TaggedObjectParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs new file mode 100644 index 00000000..8b7e4317 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface Asn1BitStringParser + : IAsn1Convertible + { + /// Return a representing the contents of the BIT STRING. The final byte, if any, + /// may include pad bits. See . + /// A with its source as the BIT STRING content. + /// + Stream GetBitStream(); + + /// Return a representing the contents of the BIT STRING, where the content is + /// expected to be octet-aligned (this will be automatically checked during parsing). + /// A with its source as the BIT STRING content. + /// + Stream GetOctetStream(); + + /// Return the number of pad bits, if any, in the final byte, if any, read from + /// . + /// + /// This number is in the range zero to seven. That number of the least significant bits of the final byte, if + /// any, are not part of the contents and should be ignored. NOTE: Must be called AFTER the stream has been + /// fully processed. (Does not need to be called if was used instead of + /// . + /// + /// The number of pad bits. In the range zero to seven. + int PadBits { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs.meta new file mode 100644 index 00000000..e0ef2a99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8af37adf1ddd05d40a2f5b914eb19ca0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1BitStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs new file mode 100644 index 00000000..368176a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Encodable + : IAsn1Convertible + { + public const string Der = "DER"; + public const string Ber = "BER"; + + public virtual void EncodeTo(Stream output) + { + ToAsn1Object().EncodeTo(output); + } + + public virtual void EncodeTo(Stream output, string encoding) + { + ToAsn1Object().EncodeTo(output, encoding); + } + + public byte[] GetEncoded() + { + MemoryStream bOut = new MemoryStream(); + ToAsn1Object().EncodeTo(bOut); + return bOut.ToArray(); + } + + public byte[] GetEncoded(string encoding) + { + MemoryStream bOut = new MemoryStream(); + ToAsn1Object().EncodeTo(bOut, encoding); + return bOut.ToArray(); + } + + /** + * Return the DER encoding of the object, null if the DER encoding can not be made. + * + * @return a DER byte array, null otherwise. + */ + public byte[] GetDerEncoded() + { + try + { + return GetEncoded(Der); + } + catch (IOException) + { + return null; + } + } + + public sealed override int GetHashCode() + { + return ToAsn1Object().CallAsn1GetHashCode(); + } + + public sealed override bool Equals( + object obj) + { + if (obj == this) + return true; + + IAsn1Convertible other = obj as IAsn1Convertible; + + if (other == null) + return false; + + Asn1Object o1 = ToAsn1Object(); + Asn1Object o2 = other.ToAsn1Object(); + + return o1 == o2 || (null != o2 && o1.CallAsn1Equals(o2)); + } + + public abstract Asn1Object ToAsn1Object(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs.meta new file mode 100644 index 00000000..6e5bc9a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c60cf771c6932a640bfc69beb96b1752 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Encodable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs new file mode 100644 index 00000000..b9756d02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs @@ -0,0 +1,248 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Mutable class for building ASN.1 constructed objects such as SETs or SEQUENCEs. + */ + public class Asn1EncodableVector + : IEnumerable + { + internal static readonly Asn1Encodable[] EmptyElements = new Asn1Encodable[0]; + + private const int DefaultCapacity = 10; + + private Asn1Encodable[] elements; + private int elementCount; + private bool copyOnWrite; + + public static Asn1EncodableVector FromEnumerable(IEnumerable e) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + foreach (Asn1Encodable obj in e) + { + v.Add(obj); + } + return v; + } + + public Asn1EncodableVector() + : this(DefaultCapacity) + { + } + + public Asn1EncodableVector(int initialCapacity) + { + if (initialCapacity < 0) + throw new ArgumentException("must not be negative", "initialCapacity"); + + this.elements = (initialCapacity == 0) ? EmptyElements : new Asn1Encodable[initialCapacity]; + this.elementCount = 0; + this.copyOnWrite = false; + } + + public Asn1EncodableVector(Asn1Encodable element) + : this() + { + Add(element); + } + + public Asn1EncodableVector(Asn1Encodable element1, Asn1Encodable element2) + : this() + { + Add(element1); + Add(element2); + } + + public Asn1EncodableVector(params Asn1Encodable[] v) + : this() + { + Add(v); + } + + public void Add(Asn1Encodable element) + { + if (null == element) + throw new ArgumentNullException("element"); + + int capacity = elements.Length; + int minCapacity = elementCount + 1; + if ((minCapacity > capacity) | copyOnWrite) + { + Reallocate(minCapacity); + } + + this.elements[elementCount] = element; + this.elementCount = minCapacity; + } + + public void Add(Asn1Encodable element1, Asn1Encodable element2) + { + Add(element1); + Add(element2); + } + + public void Add(params Asn1Encodable[] objs) + { + foreach (Asn1Encodable obj in objs) + { + Add(obj); + } + } + + public void AddOptional(Asn1Encodable element) + { + if (element != null) + { + Add(element); + } + } + + public void AddOptional(Asn1Encodable element1, Asn1Encodable element2) + { + if (element1 != null) + { + Add(element1); + } + if (element2 != null) + { + Add(element2); + } + } + + public void AddOptional(params Asn1Encodable[] elements) + { + if (elements != null) + { + foreach (var element in elements) + { + if (element != null) + { + Add(element); + } + } + } + } + + public void AddOptionalTagged(bool isExplicit, int tagNo, Asn1Encodable obj) + { + if (null != obj) + { + Add(new DerTaggedObject(isExplicit, tagNo, obj)); + } + } + + public void AddOptionalTagged(bool isExplicit, int tagClass, int tagNo, Asn1Encodable obj) + { + if (null != obj) + { + Add(new DerTaggedObject(isExplicit, tagClass, tagNo, obj)); + } + } + + public void AddAll(Asn1EncodableVector other) + { + if (null == other) + throw new ArgumentNullException("other"); + + int otherElementCount = other.Count; + if (otherElementCount < 1) + return; + + int capacity = elements.Length; + int minCapacity = elementCount + otherElementCount; + if ((minCapacity > capacity) | copyOnWrite) + { + Reallocate(minCapacity); + } + + int i = 0; + do + { + Asn1Encodable otherElement = other[i]; + if (null == otherElement) + throw new NullReferenceException("'other' elements cannot be null"); + + this.elements[elementCount + i] = otherElement; + } + while (++i < otherElementCount); + + this.elementCount = minCapacity; + } + + public Asn1Encodable this[int index] + { + get + { + if (index >= elementCount) + throw new IndexOutOfRangeException(index + " >= " + elementCount); + + return elements[index]; + } + } + + public int Count + { + get { return elementCount; } + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public IEnumerator GetEnumerator() + { + IEnumerable e = CopyElements(); + return e.GetEnumerator(); + } + + internal Asn1Encodable[] CopyElements() + { + if (0 == elementCount) + return EmptyElements; + + Asn1Encodable[] copy = new Asn1Encodable[elementCount]; + Array.Copy(elements, 0, copy, 0, elementCount); + return copy; + } + + internal Asn1Encodable[] TakeElements() + { + if (0 == elementCount) + return EmptyElements; + + if (elements.Length == elementCount) + { + this.copyOnWrite = true; + return elements; + } + + Asn1Encodable[] copy = new Asn1Encodable[elementCount]; + Array.Copy(elements, 0, copy, 0, elementCount); + return copy; + } + + private void Reallocate(int minCapacity) + { + int oldCapacity = elements.Length; + int newCapacity = System.Math.Max(oldCapacity, minCapacity + (minCapacity >> 1)); + + Asn1Encodable[] copy = new Asn1Encodable[newCapacity]; + Array.Copy(elements, 0, copy, 0, elementCount); + + this.elements = copy; + this.copyOnWrite = false; + } + + internal static Asn1Encodable[] CloneElements(Asn1Encodable[] elements) + { + return elements.Length < 1 ? EmptyElements : (Asn1Encodable[])elements.Clone(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs.meta new file mode 100644 index 00000000..c5e1a64e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c5ecb82d71ebb494b879cd2f66a4e8b9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1EncodableVector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs new file mode 100644 index 00000000..8dfc21c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + [Serializable] + public class Asn1Exception + : IOException + { + public Asn1Exception() + : base() + { + } + + public Asn1Exception(string message) + : base(message) + { + } + + public Asn1Exception(string message, Exception innerException) + : base(message, innerException) + { + } + + protected Asn1Exception(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs.meta new file mode 100644 index 00000000..c9f0d0b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c5b82b2e9c2a14f4aa25260784d5f222 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Exception.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs new file mode 100644 index 00000000..610bd1a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs @@ -0,0 +1,266 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /// GeneralizedTime ASN.1 type + public class Asn1GeneralizedTime + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1GeneralizedTime), Asn1Tags.GeneralizedTime) { } + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + public static Asn1GeneralizedTime GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1GeneralizedTime asn1GeneralizedTime) + return asn1GeneralizedTime; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1GeneralizedTime converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1GeneralizedTime)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct generalized time from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static Asn1GeneralizedTime GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1GeneralizedTime)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly string m_timeString; + private readonly bool m_timeStringCanonical; + private readonly DateTime m_dateTime; + + public Asn1GeneralizedTime(string timeString) + { + m_timeString = timeString ?? throw new ArgumentNullException(nameof(timeString)); + m_timeStringCanonical = false; // TODO Dynamic check? + + try + { + m_dateTime = FromString(timeString); + } + catch (FormatException e) + { + throw new ArgumentException("invalid date string: " + e.Message); + } + } + + public Asn1GeneralizedTime(DateTime dateTime) + { + dateTime = dateTime.ToUniversalTime(); + + m_dateTime = dateTime; + m_timeString = ToStringCanonical(dateTime); + m_timeStringCanonical = true; + } + + // TODO TimeZoneInfo or other locale-specific constructors? + + internal Asn1GeneralizedTime(byte[] contents) + : this(Encoding.ASCII.GetString(contents)) + { + } + + public string TimeString => m_timeString; + + public DateTime ToDateTime() + { + return m_dateTime; + } + + internal byte[] GetContents(int encoding) + { + if (encoding == Asn1OutputStream.EncodingDer && !m_timeStringCanonical) + return Encoding.ASCII.GetBytes(ToStringCanonical(m_dateTime)); + + return Encoding.ASCII.GetBytes(m_timeString); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.GeneralizedTime, GetContents(encoding)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents(encoding)); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + if (!(asn1Object is Asn1GeneralizedTime that)) + return false; + + // TODO Performance + return Arrays.AreEqual( + this.GetContents(Asn1OutputStream.EncodingDer), + that.GetContents(Asn1OutputStream.EncodingDer)); + } + + protected override int Asn1GetHashCode() + { + // TODO Performance + return Arrays.GetHashCode( + this.GetContents(Asn1OutputStream.EncodingDer)); + } + + internal static Asn1GeneralizedTime CreatePrimitive(byte[] contents) + { + return new Asn1GeneralizedTime(contents); + } + + private static DateTime FromString(string s) + { + if (s.Length < 10) + throw new FormatException(); + + s = s.Replace(',', '.'); + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(s, "Z")) + { + switch (s.Length) + { + case 11: return ParseUtc(s, @"yyyyMMddHH\Z"); + case 13: return ParseUtc(s, @"yyyyMMddHHmm\Z"); + case 15: return ParseUtc(s, @"yyyyMMddHHmmss\Z"); + case 17: return ParseUtc(s, @"yyyyMMddHHmmss.f\Z"); + case 18: return ParseUtc(s, @"yyyyMMddHHmmss.ff\Z"); + case 19: return ParseUtc(s, @"yyyyMMddHHmmss.fff\Z"); + case 20: return ParseUtc(s, @"yyyyMMddHHmmss.ffff\Z"); + case 21: return ParseUtc(s, @"yyyyMMddHHmmss.fffff\Z"); + case 22: return ParseUtc(s, @"yyyyMMddHHmmss.ffffff\Z"); + case 23: return ParseUtc(s, @"yyyyMMddHHmmss.fffffff\Z"); + default: + throw new FormatException(); + } + } + + int signIndex = IndexOfSign(s, System.Math.Max(10, s.Length - 5)); + + if (signIndex < 0) + { + switch (s.Length) + { + case 10: return ParseLocal(s, @"yyyyMMddHH"); + case 12: return ParseLocal(s, @"yyyyMMddHHmm"); + case 14: return ParseLocal(s, @"yyyyMMddHHmmss"); + case 16: return ParseLocal(s, @"yyyyMMddHHmmss.f"); + case 17: return ParseLocal(s, @"yyyyMMddHHmmss.ff"); + case 18: return ParseLocal(s, @"yyyyMMddHHmmss.fff"); + case 19: return ParseLocal(s, @"yyyyMMddHHmmss.ffff"); + case 20: return ParseLocal(s, @"yyyyMMddHHmmss.fffff"); + case 21: return ParseLocal(s, @"yyyyMMddHHmmss.ffffff"); + case 22: return ParseLocal(s, @"yyyyMMddHHmmss.fffffff"); + default: + throw new FormatException(); + } + } + + if (signIndex == s.Length - 5) + { + switch (s.Length) + { + case 15: return ParseTimeZone(s, @"yyyyMMddHHzzz"); + case 17: return ParseTimeZone(s, @"yyyyMMddHHmmzzz"); + case 19: return ParseTimeZone(s, @"yyyyMMddHHmmsszzz"); + case 21: return ParseTimeZone(s, @"yyyyMMddHHmmss.fzzz"); + case 22: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffzzz"); + case 23: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffzzz"); + case 24: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffffzzz"); + case 25: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffffzzz"); + case 26: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffffffzzz"); + case 27: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffffffzzz"); + default: + throw new FormatException(); + } + } + + if (signIndex == s.Length - 3) + { + switch (s.Length) + { + case 13: return ParseTimeZone(s, @"yyyyMMddHHzz"); + case 15: return ParseTimeZone(s, @"yyyyMMddHHmmzz"); + case 17: return ParseTimeZone(s, @"yyyyMMddHHmmsszz"); + case 19: return ParseTimeZone(s, @"yyyyMMddHHmmss.fzz"); + case 20: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffzz"); + case 21: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffzz"); + case 22: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffffzz"); + case 23: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffffzz"); + case 24: return ParseTimeZone(s, @"yyyyMMddHHmmss.ffffffzz"); + case 25: return ParseTimeZone(s, @"yyyyMMddHHmmss.fffffffzz"); + default: + throw new FormatException(); + } + } + + throw new FormatException(); + } + + private static int IndexOfSign(string s, int startIndex) + { + int index = Org.BouncyCastle.Utilities.Platform.IndexOf(s, '+', startIndex); + if (index < 0) + { + index = Org.BouncyCastle.Utilities.Platform.IndexOf(s, '-', startIndex); + } + return index; + } + + private static DateTime ParseLocal(string s, string format) + { + return DateTime.ParseExact(s, format, DateTimeFormatInfo.InvariantInfo, DateTimeStyles.AssumeLocal); + } + + private static DateTime ParseTimeZone(string s, string format) + { + return DateTime.ParseExact(s, format, DateTimeFormatInfo.InvariantInfo, DateTimeStyles.AdjustToUniversal); + } + + private static DateTime ParseUtc(string s, string format) + { + return DateTime.ParseExact(s, format, DateTimeFormatInfo.InvariantInfo, + DateTimeStyles.AdjustToUniversal | DateTimeStyles.AssumeUniversal); + } + + private static string ToStringCanonical(DateTime dateTime) + { + return dateTime.ToUniversalTime().ToString(@"yyyyMMddHHmmss.FFFFFFFK", DateTimeFormatInfo.InvariantInfo); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs.meta new file mode 100644 index 00000000..49cc350c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 62e5a274f71306c469aecc7ff2a8569b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1GeneralizedTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs new file mode 100644 index 00000000..4487564a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs @@ -0,0 +1,471 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * a general purpose ASN.1 decoder - note: this class differs from the + * others in that it returns null after it has read the last object in + * the stream. If an ASN.1 Null is encountered a Der/BER Null object is + * returned. + */ + public class Asn1InputStream + : FilterStream + { + private readonly int limit; + + internal byte[][] tmpBuffers; + + internal static int FindLimit(Stream input) + { + if (input is LimitedInputStream limited) + return limited.Limit; + + if (input is Asn1InputStream asn1) + return asn1.Limit; + + if (input is MemoryStream memory) + return Convert.ToInt32(memory.Length - memory.Position); + + return int.MaxValue; + } + + public Asn1InputStream(Stream input) + : this(input, FindLimit(input)) + { + } + + /** + * Create an ASN1InputStream based on the input byte array. The length of DER objects in + * the stream is automatically limited to the length of the input array. + * + * @param input array containing ASN.1 encoded data. + */ + public Asn1InputStream(byte[] input) + : this(new MemoryStream(input, false), input.Length) + { + } + + /** + * Create an ASN1InputStream where no DER object will be longer than limit. + * + * @param input stream containing ASN.1 encoded data. + * @param limit maximum size of a DER encoded object. + */ + public Asn1InputStream(Stream input, int limit) + : this(input, limit, new byte[16][]) + { + } + + internal Asn1InputStream(Stream input, int limit, byte[][] tmpBuffers) + : base(input) + { + this.limit = limit; + this.tmpBuffers = tmpBuffers; + } + + protected override void Dispose(bool disposing) + { + tmpBuffers = null; + + base.Dispose(disposing); + } + + /** + * build an object given its tag and the number of bytes to construct it from. + */ + private Asn1Object BuildObject(int tagHdr, int tagNo, int length) + { + // TODO[asn1] Special-case zero length first? + + DefiniteLengthInputStream defIn = new DefiniteLengthInputStream(s, length, limit); + + if (0 == (tagHdr & Asn1Tags.Flags)) + return CreatePrimitiveDerObject(tagNo, defIn, tmpBuffers); + + int tagClass = tagHdr & Asn1Tags.Private; + if (0 != tagClass) + { + bool isConstructed = (tagHdr & Asn1Tags.Constructed) != 0; + return ReadTaggedObjectDL(tagClass, tagNo, isConstructed, defIn); + } + + switch (tagNo) + { + case Asn1Tags.BitString: + return BuildConstructedBitString(ReadVector(defIn)); + case Asn1Tags.OctetString: + return BuildConstructedOctetString(ReadVector(defIn)); + case Asn1Tags.Sequence: + return CreateDLSequence(defIn); + case Asn1Tags.Set: + return CreateDLSet(defIn); + case Asn1Tags.External: + return DLSequence.FromVector(ReadVector(defIn)).ToAsn1External(); + default: + throw new IOException("unknown tag " + tagNo + " encountered"); + } + } + + internal Asn1Object ReadTaggedObjectDL(int tagClass, int tagNo, bool constructed, DefiniteLengthInputStream defIn) + { + if (!constructed) + { + byte[] contentsOctets = defIn.ToArray(); + return Asn1TaggedObject.CreatePrimitive(tagClass, tagNo, contentsOctets); + } + + Asn1EncodableVector contentsElements = ReadVector(defIn); + return Asn1TaggedObject.CreateConstructedDL(tagClass, tagNo, contentsElements); + } + + internal virtual Asn1EncodableVector ReadVector() + { + Asn1Object o = ReadObject(); + if (null == o) + return new Asn1EncodableVector(0); + + Asn1EncodableVector v = new Asn1EncodableVector(); + do + { + v.Add(o); + } + while ((o = ReadObject()) != null); + return v; + } + + internal virtual Asn1EncodableVector ReadVector(DefiniteLengthInputStream defIn) + { + int remaining = defIn.Remaining; + if (remaining < 1) + return new Asn1EncodableVector(0); + + return new Asn1InputStream(defIn, remaining, tmpBuffers).ReadVector(); + } + + internal virtual Asn1Sequence CreateDLSequence(DefiniteLengthInputStream defIn) + { + return DLSequence.FromVector(ReadVector(defIn)); + } + + internal virtual Asn1Set CreateDLSet(DefiniteLengthInputStream defIn) + { + return DLSet.FromVector(ReadVector(defIn)); + } + + public Asn1Object ReadObject() + { + int tagHdr = s.ReadByte(); + if (tagHdr <= 0) + { + if (tagHdr == 0) + throw new IOException("unexpected end-of-contents marker"); + + return null; + } + + int tagNo = ReadTagNumber(s, tagHdr); + int length = ReadLength(s, limit, false); + + if (length >= 0) + { + // definite-length + try + { + return BuildObject(tagHdr, tagNo, length); + } + catch (ArgumentException e) + { + throw new Asn1Exception("corrupted stream detected", e); + } + } + + // indefinite-length + + if (0 == (tagHdr & Asn1Tags.Constructed)) + throw new IOException("indefinite-length primitive encoding encountered"); + + IndefiniteLengthInputStream indIn = new IndefiniteLengthInputStream(s, limit); + Asn1StreamParser sp = new Asn1StreamParser(indIn, limit, tmpBuffers); + + int tagClass = tagHdr & Asn1Tags.Private; + if (0 != tagClass) + return sp.LoadTaggedIL(tagClass, tagNo); + + switch (tagNo) + { + case Asn1Tags.BitString: + return BerBitStringParser.Parse(sp); + case Asn1Tags.OctetString: + return BerOctetStringParser.Parse(sp); + case Asn1Tags.Sequence: + return BerSequenceParser.Parse(sp); + case Asn1Tags.Set: + return BerSetParser.Parse(sp); + case Asn1Tags.External: + // TODO[asn1] BerExternalParser + return DerExternalParser.Parse(sp); + default: + throw new IOException("unknown BER object encountered"); + } + } + + internal virtual DerBitString BuildConstructedBitString(Asn1EncodableVector contentsElements) + { + DerBitString[] bitStrings = new DerBitString[contentsElements.Count]; + + for (int i = 0; i != bitStrings.Length; i++) + { + DerBitString bitString = contentsElements[i] as DerBitString; + if (null == bitString) + throw new Asn1Exception("unknown object encountered in constructed BIT STRING: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(contentsElements[i])); + + bitStrings[i] = bitString; + } + + return new DLBitString(BerBitString.FlattenBitStrings(bitStrings), false); + } + + internal virtual Asn1OctetString BuildConstructedOctetString(Asn1EncodableVector contentsElements) + { + Asn1OctetString[] octetStrings = new Asn1OctetString[contentsElements.Count]; + + for (int i = 0; i != octetStrings.Length; i++) + { + Asn1OctetString octetString = contentsElements[i] as Asn1OctetString; + if (null == octetString) + throw new Asn1Exception("unknown object encountered in constructed OCTET STRING: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(contentsElements[i])); + + octetStrings[i] = octetString; + } + + // Note: No DLOctetString available + return new DerOctetString(BerOctetString.FlattenOctetStrings(octetStrings)); + } + + internal virtual int Limit + { + get { return limit; } + } + + internal static int ReadTagNumber(Stream s, int tagHdr) + { + int tagNo = tagHdr & 0x1f; + + // + // with tagged object tag number is bottom 5 bits, or stored at the start of the content + // + if (tagNo == 0x1f) + { + int b = s.ReadByte(); + if (b < 31) + { + if (b < 0) + throw new EndOfStreamException("EOF found inside tag value."); + + throw new IOException("corrupted stream - high tag number < 31 found"); + } + + tagNo = b & 0x7f; + + // X.690-0207 8.1.2.4.2 + // "c) bits 7 to 1 of the first subsequent octet shall not all be zero." + if (0 == tagNo) + throw new IOException("corrupted stream - invalid high tag number found"); + + while ((b & 0x80) != 0) + { + if (((uint)tagNo >> 24) != 0U) + throw new IOException("Tag number more than 31 bits"); + + tagNo <<= 7; + + b = s.ReadByte(); + if (b < 0) + throw new EndOfStreamException("EOF found inside tag value."); + + tagNo |= b & 0x7f; + } + } + + return tagNo; + } + + internal static int ReadLength(Stream s, int limit, bool isParsing) + { + int length = s.ReadByte(); + if (0U == ((uint)length >> 7)) + { + // definite-length short form + return length; + } + if (0x80 == length) + { + // indefinite-length + return -1; + } + if (length < 0) + { + throw new EndOfStreamException("EOF found when length expected"); + } + if (0xFF == length) + { + throw new IOException("invalid long form definite-length 0xFF"); + } + + int octetsCount = length & 0x7F, octetsPos = 0; + + length = 0; + do + { + int octet = s.ReadByte(); + if (octet < 0) + throw new EndOfStreamException("EOF found reading length"); + + if (((uint)length >> 23) != 0U) + throw new IOException("long form definite-length more than 31 bits"); + + length = (length << 8) + octet; + } + while (++octetsPos < octetsCount); + + if (length >= limit && !isParsing) // after all we must have read at least 1 byte + throw new IOException("corrupted stream - out of bounds length found: " + length + " >= " + limit); + + return length; + } + + private static byte[] GetBuffer(DefiniteLengthInputStream defIn, byte[][] tmpBuffers) + { + int len = defIn.Remaining; + if (len >= tmpBuffers.Length) + { + return defIn.ToArray(); + } + + byte[] buf = tmpBuffers[len]; + if (buf == null) + { + buf = tmpBuffers[len] = new byte[len]; + } + + defIn.ReadAllIntoByteArray(buf); + + return buf; + } + + private static char[] GetBmpCharBuffer(DefiniteLengthInputStream defIn) + { + int remainingBytes = defIn.Remaining; + if (0 != (remainingBytes & 1)) + throw new IOException("malformed BMPString encoding encountered"); + + char[] str = new char[remainingBytes / 2]; + int stringPos = 0; + + byte[] buf = new byte[8]; + while (remainingBytes >= 8) + { + if (Streams.ReadFully(defIn, buf, 0, 8) != 8) + throw new EndOfStreamException("EOF encountered in middle of BMPString"); + + str[stringPos ] = (char)((buf[0] << 8) | (buf[1] & 0xFF)); + str[stringPos + 1] = (char)((buf[2] << 8) | (buf[3] & 0xFF)); + str[stringPos + 2] = (char)((buf[4] << 8) | (buf[5] & 0xFF)); + str[stringPos + 3] = (char)((buf[6] << 8) | (buf[7] & 0xFF)); + stringPos += 4; + remainingBytes -= 8; + } + if (remainingBytes > 0) + { + if (Streams.ReadFully(defIn, buf, 0, remainingBytes) != remainingBytes) + throw new EndOfStreamException("EOF encountered in middle of BMPString"); + + int bufPos = 0; + do + { + int b1 = buf[bufPos++] << 8; + int b2 = buf[bufPos++] & 0xFF; + str[stringPos++] = (char)(b1 | b2); + } + while (bufPos < remainingBytes); + } + + if (0 != defIn.Remaining || str.Length != stringPos) + throw new InvalidOperationException(); + + return str; + } + + internal static Asn1Object CreatePrimitiveDerObject(int tagNo, DefiniteLengthInputStream defIn, + byte[][] tmpBuffers) + { + switch (tagNo) + { + case Asn1Tags.BmpString: + return DerBmpString.CreatePrimitive(GetBmpCharBuffer(defIn)); + case Asn1Tags.Boolean: + return DerBoolean.CreatePrimitive(GetBuffer(defIn, tmpBuffers)); + case Asn1Tags.Enumerated: + // TODO Ideally only clone if we used a buffer + return DerEnumerated.CreatePrimitive(GetBuffer(defIn, tmpBuffers), true); + case Asn1Tags.ObjectIdentifier: + // TODO Ideally only clone if we used a buffer + return DerObjectIdentifier.CreatePrimitive(GetBuffer(defIn, tmpBuffers), true); + } + + byte[] bytes = defIn.ToArray(); + + switch (tagNo) + { + case Asn1Tags.BitString: + return DerBitString.CreatePrimitive(bytes); + case Asn1Tags.GeneralizedTime: + return Asn1GeneralizedTime.CreatePrimitive(bytes); + case Asn1Tags.GeneralString: + return DerGeneralString.CreatePrimitive(bytes); + case Asn1Tags.GraphicString: + return DerGraphicString.CreatePrimitive(bytes); + case Asn1Tags.IA5String: + return DerIA5String.CreatePrimitive(bytes); + case Asn1Tags.Integer: + return DerInteger.CreatePrimitive(bytes); + case Asn1Tags.Null: + return Asn1Null.CreatePrimitive(bytes); + case Asn1Tags.NumericString: + return DerNumericString.CreatePrimitive(bytes); + case Asn1Tags.ObjectDescriptor: + return Asn1ObjectDescriptor.CreatePrimitive(bytes); + case Asn1Tags.OctetString: + return Asn1OctetString.CreatePrimitive(bytes); + case Asn1Tags.PrintableString: + return DerPrintableString.CreatePrimitive(bytes); + case Asn1Tags.RelativeOid: + return Asn1RelativeOid.CreatePrimitive(bytes, false); + case Asn1Tags.T61String: + return DerT61String.CreatePrimitive(bytes); + case Asn1Tags.UniversalString: + return DerUniversalString.CreatePrimitive(bytes); + case Asn1Tags.UtcTime: + return Asn1UtcTime.CreatePrimitive(bytes); + case Asn1Tags.Utf8String: + return DerUtf8String.CreatePrimitive(bytes); + case Asn1Tags.VideotexString: + return DerVideotexString.CreatePrimitive(bytes); + case Asn1Tags.VisibleString: + return DerVisibleString.CreatePrimitive(bytes); + default: + throw new IOException("unknown tag " + tagNo + " encountered"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs.meta new file mode 100644 index 00000000..6c42d88c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b95c96ff5d2c7f94ab6207dae0d3fd05 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1InputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs new file mode 100644 index 00000000..6719869d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * A Null object. + */ + public abstract class Asn1Null + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1Null), Asn1Tags.Null) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + public static Asn1Null GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1Null asn1Null) + return asn1Null; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1Null converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1Null)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct NULL from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public static Asn1Null GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1Null)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + internal Asn1Null() + { + } + + public override string ToString() + { + return "NULL"; + } + + internal static Asn1Null CreatePrimitive(byte[] contents) + { + if (0 != contents.Length) + throw new InvalidOperationException("malformed NULL encoding encountered"); + + return DerNull.Instance; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs.meta new file mode 100644 index 00000000..2a061a18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4a876da42eab2c748afb267168fb5dc6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Null.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs new file mode 100644 index 00000000..5ae24403 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Object + : Asn1Encodable + { + public override void EncodeTo(Stream output) + { + Asn1OutputStream asn1Out = Asn1OutputStream.Create(output); + GetEncoding(asn1Out.Encoding).Encode(asn1Out); + asn1Out.FlushInternal(); + } + + public override void EncodeTo(Stream output, string encoding) + { + Asn1OutputStream asn1Out = Asn1OutputStream.Create(output, encoding); + GetEncoding(asn1Out.Encoding).Encode(asn1Out); + asn1Out.FlushInternal(); + } + + public bool Equals(Asn1Object other) + { + return this == other || Asn1Equals(other); + } + + /// Create a base ASN.1 object from a byte array. + /// The byte array to parse. + /// The base ASN.1 object represented by the byte array. + /// + /// If there is a problem parsing the data, or parsing an object did not exhaust the available data. + /// + public static Asn1Object FromByteArray( + byte[] data) + { + try + { + MemoryStream input = new MemoryStream(data, false); + Asn1InputStream asn1 = new Asn1InputStream(input, data.Length); + Asn1Object result = asn1.ReadObject(); + if (input.Position != input.Length) + throw new IOException("extra data found after object"); + return result; + } + catch (InvalidCastException) + { + throw new IOException("cannot recognise object in byte array"); + } + } + + /// Read a base ASN.1 object from a stream. + /// The stream to parse. + /// The base ASN.1 object represented by the byte array. + /// If there is a problem parsing the data. + public static Asn1Object FromStream( + Stream inStr) + { + try + { + return new Asn1InputStream(inStr).ReadObject(); + } + catch (InvalidCastException) + { + throw new IOException("cannot recognise object in stream"); + } + } + + public sealed override Asn1Object ToAsn1Object() + { + return this; + } + + internal abstract IAsn1Encoding GetEncoding(int encoding); + + internal abstract IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo); + + protected abstract bool Asn1Equals(Asn1Object asn1Object); + protected abstract int Asn1GetHashCode(); + + internal bool CallAsn1Equals(Asn1Object obj) + { + return Asn1Equals(obj); + } + + internal int CallAsn1GetHashCode() + { + return Asn1GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs.meta new file mode 100644 index 00000000..ceb47dbe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 15f5e5389eb7ade49904deb4cb013b90 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Object.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs new file mode 100644 index 00000000..024132ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs @@ -0,0 +1,125 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public sealed class Asn1ObjectDescriptor + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1ObjectDescriptor), Asn1Tags.ObjectDescriptor) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return new Asn1ObjectDescriptor( + (DerGraphicString)DerGraphicString.Meta.Instance.FromImplicitPrimitive(octetString)); + } + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return new Asn1ObjectDescriptor( + (DerGraphicString)DerGraphicString.Meta.Instance.FromImplicitConstructed(sequence)); + } + } + + /** + * Return an ObjectDescriptor from the passed in object. + * + * @param obj an ASN1ObjectDescriptor or an object that can be converted into one. + * @exception IllegalArgumentException if the object cannot be converted. + * @return an ASN1ObjectDescriptor instance, or null. + */ + public static Asn1ObjectDescriptor GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1ObjectDescriptor asn1ObjectDescriptor) + return asn1ObjectDescriptor; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1ObjectDescriptor converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1ObjectDescriptor)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct object descriptor from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Return an ObjectDescriptor from a tagged object. + * + * @param taggedObject the tagged object holding the object we want. + * @param declaredExplicit true if the object is meant to be explicitly tagged, false otherwise. + * @exception IllegalArgumentException if the tagged object cannot be converted. + * @return an ASN1ObjectDescriptor instance, or null. + */ + public static Asn1ObjectDescriptor GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1ObjectDescriptor)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly DerGraphicString m_baseGraphicString; + + public Asn1ObjectDescriptor(DerGraphicString baseGraphicString) + { + if (null == baseGraphicString) + throw new ArgumentNullException("baseGraphicString"); + + this.m_baseGraphicString = baseGraphicString; + } + + public DerGraphicString BaseGraphicString + { + get { return m_baseGraphicString; } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return m_baseGraphicString.GetEncodingImplicit(encoding, Asn1Tags.Universal, Asn1Tags.ObjectDescriptor); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return m_baseGraphicString.GetEncodingImplicit(encoding, tagClass, tagNo); + } + + protected override int Asn1GetHashCode() + { + return ~m_baseGraphicString.CallAsn1GetHashCode(); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + Asn1ObjectDescriptor that = asn1Object as Asn1ObjectDescriptor; + return null != that + && this.m_baseGraphicString.Equals(that.m_baseGraphicString); + } + + internal static Asn1ObjectDescriptor CreatePrimitive(byte[] contents) + { + return new Asn1ObjectDescriptor(DerGraphicString.CreatePrimitive(contents)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs.meta new file mode 100644 index 00000000..3bd49d9b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c060c54a712364249874ff2de41a9cc4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ObjectDescriptor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs new file mode 100644 index 00000000..2a829342 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1OctetString + : Asn1Object, Asn1OctetStringParser + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1OctetString), Asn1Tags.OctetString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return octetString; + } + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return sequence.ToAsn1OctetString(); + } + } + + internal static readonly byte[] EmptyOctets = new byte[0]; + + /** + * return an Octet string from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static Asn1OctetString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1OctetString asn1OctetString) + return asn1OctetString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1OctetString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1OctetString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct OCTET STRING from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * return an octet string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want. + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static Asn1OctetString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1OctetString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + internal readonly byte[] contents; + + /** + * @param string the octets making up the octet string. + */ + internal Asn1OctetString(byte[] contents) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + this.contents = contents; + } + + public Stream GetOctetStream() + { + return new MemoryStream(contents, false); + } + + public Asn1OctetStringParser Parser + { + get { return this; } + } + + public virtual byte[] GetOctets() + { + return contents; + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(GetOctets()); + } + + protected override bool Asn1Equals( + Asn1Object asn1Object) + { + DerOctetString other = asn1Object as DerOctetString; + + if (other == null) + return false; + + return Arrays.AreEqual(GetOctets(), other.GetOctets()); + } + + public override string ToString() + { + return "#" + Hex.ToHexString(contents); + } + + internal static Asn1OctetString CreatePrimitive(byte[] contents) + { + return new DerOctetString(contents); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs.meta new file mode 100644 index 00000000..99f87711 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6bcdb5a8710e085408bcf9979de57789 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OctetString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs new file mode 100644 index 00000000..73fcd8dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs @@ -0,0 +1,192 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Diagnostics; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +using System.Numerics; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class Asn1OutputStream + : FilterStream + { + internal const int EncodingBer = 1; + internal const int EncodingDer = 2; + + public static Asn1OutputStream Create(Stream output) + { + return new Asn1OutputStream(output); + } + + public static Asn1OutputStream Create(Stream output, string encoding) + { + if (Asn1Encodable.Der.Equals(encoding)) + { + return new DerOutputStream(output); + } + else + { + return new Asn1OutputStream(output); + } + } + + internal Asn1OutputStream(Stream os) + : base(os) + { + } + + public virtual void WriteObject(Asn1Encodable asn1Encodable) + { + if (null == asn1Encodable) + throw new ArgumentNullException("asn1Encodable"); + + asn1Encodable.ToAsn1Object().GetEncoding(this.Encoding).Encode(this); + FlushInternal(); + } + + public virtual void WriteObject(Asn1Object asn1Object) + { + if (null == asn1Object) + throw new ArgumentNullException("asn1Object"); + + asn1Object.GetEncoding(this.Encoding).Encode(this); + FlushInternal(); + } + + internal void EncodeContents(IAsn1Encoding[] contentsEncodings) + { + for (int i = 0, count = contentsEncodings.Length; i < count; ++i) + { + contentsEncodings[i].Encode(this); + } + } + + internal virtual int Encoding + { + get { return EncodingBer; } + } + + internal void FlushInternal() + { + // Placeholder to support future internal buffering + } + + internal void WriteDL(int dl) + { + if (dl < 128) + { + Debug.Assert(dl >= 0); + WriteByte((byte)dl); + return; + } + +#if false && (NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER) + Span encoding = stackalloc byte[5]; + BinaryPrimitives.WriteUInt32BigEndian(encoding[1..], (uint)dl); + int leadingZeroBytes = BitOperations.LeadingZeroCount((uint)dl) / 8; + encoding[leadingZeroBytes] = (byte)(0x84 - leadingZeroBytes); + Write(encoding[leadingZeroBytes..]); +#else + byte[] stack = new byte[5]; + int pos = stack.Length; + + do + { + stack[--pos] = (byte)dl; + dl >>= 8; + } + while (dl > 0); + + int count = stack.Length - pos; + stack[--pos] = (byte)(0x80 | count); + + Write(stack, pos, count + 1); +#endif + } + + internal void WriteIdentifier(int tagClass, int tagNo) + { + if (tagNo < 31) + { + WriteByte((byte)(tagClass | tagNo)); + return; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span stack = stackalloc byte[6]; +#else + byte[] stack = new byte[6]; +#endif + int pos = stack.Length; + + stack[--pos] = (byte)(tagNo & 0x7F); + while (tagNo > 127) + { + tagNo >>= 7; + stack[--pos] = (byte)(tagNo & 0x7F | 0x80); + } + + stack[--pos] = (byte)(tagClass | 0x1F); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Write(stack[pos..]); +#else + Write(stack, pos, stack.Length - pos); +#endif + } + + internal static IAsn1Encoding[] GetContentsEncodings(int encoding, Asn1Encodable[] elements) + { + int count = elements.Length; + IAsn1Encoding[] contentsEncodings = new IAsn1Encoding[count]; + for (int i = 0; i < count; ++i) + { + contentsEncodings[i] = elements[i].ToAsn1Object().GetEncoding(encoding); + } + return contentsEncodings; + } + + internal static int GetLengthOfContents(IAsn1Encoding[] contentsEncodings) + { + int contentsLength = 0; + for (int i = 0, count = contentsEncodings.Length; i < count; ++i) + { + contentsLength += contentsEncodings[i].GetLength(); + } + return contentsLength; + } + + internal static int GetLengthOfDL(int dl) + { + if (dl < 128) + return 1; + + int length = 2; + while ((dl >>= 8) > 0) + { + ++length; + } + return length; + } + + internal static int GetLengthOfIdentifier(int tagNo) + { + if (tagNo < 31) + return 1; + + int length = 2; + while ((tagNo >>= 7) > 0) + { + ++length; + } + return length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs.meta new file mode 100644 index 00000000..71c4861a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93f27584bff53394399766c65f08a579 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1OutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs new file mode 100644 index 00000000..538db97b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + [Serializable] + public class Asn1ParsingException + : InvalidOperationException + { + public Asn1ParsingException() + : base() + { + } + + public Asn1ParsingException(string message) + : base(message) + { + } + + public Asn1ParsingException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected Asn1ParsingException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs.meta new file mode 100644 index 00000000..cd0dae93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c635f62a712c34f4ca1a6f28571653ad +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1ParsingException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs new file mode 100644 index 00000000..99484b03 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs @@ -0,0 +1,320 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class Asn1RelativeOid + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1RelativeOid), Asn1Tags.RelativeOid) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets(), false); + } + } + + public static Asn1RelativeOid FromContents(byte[] contents) + { + return CreatePrimitive(contents, true); + } + + public static Asn1RelativeOid GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1RelativeOid asn1RelativeOid) + return asn1RelativeOid; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1RelativeOid converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1RelativeOid)FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct relative OID from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static Asn1RelativeOid GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1RelativeOid)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private const long LongLimit = (long.MaxValue >> 7) - 0x7F; + + private readonly string identifier; + private byte[] contents; + + public Asn1RelativeOid(string identifier) + { + if (identifier == null) + throw new ArgumentNullException("identifier"); + if (!IsValidIdentifier(identifier, 0)) + throw new FormatException("string " + identifier + " not a relative OID"); + + this.identifier = identifier; + } + + private Asn1RelativeOid(Asn1RelativeOid oid, string branchID) + { + if (!IsValidIdentifier(branchID, 0)) + throw new FormatException("string " + branchID + " not a valid relative OID branch"); + + this.identifier = oid.Id + "." + branchID; + } + + private Asn1RelativeOid(byte[] contents, bool clone) + { + this.identifier = ParseContents(contents); + this.contents = clone ? Arrays.Clone(contents) : contents; + } + + public virtual Asn1RelativeOid Branch(string branchID) + { + return new Asn1RelativeOid(this, branchID); + } + + public string Id + { + get { return identifier; } + } + + public override string ToString() + { + return identifier; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + Asn1RelativeOid that = asn1Object as Asn1RelativeOid; + return null != that + && this.identifier == that.identifier; + } + + protected override int Asn1GetHashCode() + { + return identifier.GetHashCode(); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.RelativeOid, GetContents()); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents()); + } + + private void DoOutput(MemoryStream bOut) + { + OidTokenizer tok = new OidTokenizer(identifier); + while (tok.HasMoreTokens) + { + string token = tok.NextToken(); + if (token.Length <= 18) + { + WriteField(bOut, long.Parse(token)); + } + else + { + WriteField(bOut, new BigInteger(token)); + } + } + } + + private byte[] GetContents() + { + lock (this) + { + if (contents == null) + { + MemoryStream bOut = new MemoryStream(); + DoOutput(bOut); + contents = bOut.ToArray(); + } + + return contents; + } + } + + internal static Asn1RelativeOid CreatePrimitive(byte[] contents, bool clone) + { + return new Asn1RelativeOid(contents, clone); + } + + internal static bool IsValidIdentifier(string identifier, int from) + { + int digitCount = 0; + + int pos = identifier.Length; + while (--pos >= from) + { + char ch = identifier[pos]; + + if (ch == '.') + { + if (0 == digitCount || (digitCount > 1 && identifier[pos + 1] == '0')) + return false; + + digitCount = 0; + } + else if ('0' <= ch && ch <= '9') + { + ++digitCount; + } + else + { + return false; + } + } + + if (0 == digitCount || (digitCount > 1 && identifier[pos + 1] == '0')) + return false; + + return true; + } + + internal static void WriteField(Stream outputStream, long fieldValue) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span result = stackalloc byte[9]; +#else + byte[] result = new byte[9]; +#endif + int pos = 8; + result[pos] = (byte)((int)fieldValue & 0x7F); + while (fieldValue >= (1L << 7)) + { + fieldValue >>= 7; + result[--pos] = (byte)((int)fieldValue | 0x80); + } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + outputStream.Write(result[pos..]); +#else + outputStream.Write(result, pos, 9 - pos); +#endif + } + + internal static void WriteField(Stream outputStream, BigInteger fieldValue) + { + int byteCount = (fieldValue.BitLength + 6) / 7; + if (byteCount == 0) + { + outputStream.WriteByte(0); + } + else + { + BigInteger tmpValue = fieldValue; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span tmp = byteCount <= 16 + ? stackalloc byte[byteCount] + : new byte[byteCount]; +#else + byte[] tmp = new byte[byteCount]; +#endif + for (int i = byteCount - 1; i >= 0; i--) + { + tmp[i] = (byte)(tmpValue.IntValue | 0x80); + tmpValue = tmpValue.ShiftRight(7); + } + tmp[byteCount - 1] &= 0x7F; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + outputStream.Write(tmp); +#else + outputStream.Write(tmp, 0, tmp.Length); +#endif + } + } + + private static string ParseContents(byte[] contents) + { + StringBuilder objId = new StringBuilder(); + long value = 0; + BigInteger bigValue = null; + bool first = true; + + for (int i = 0; i != contents.Length; i++) + { + int b = contents[i]; + + if (value <= LongLimit) + { + value += b & 0x7F; + if ((b & 0x80) == 0) + { + if (first) + { + first = false; + } + else + { + objId.Append('.'); + } + + objId.Append(value); + value = 0; + } + else + { + value <<= 7; + } + } + else + { + if (bigValue == null) + { + bigValue = BigInteger.ValueOf(value); + } + bigValue = bigValue.Or(BigInteger.ValueOf(b & 0x7F)); + if ((b & 0x80) == 0) + { + if (first) + { + first = false; + } + else + { + objId.Append('.'); + } + + objId.Append(bigValue); + bigValue = null; + value = 0; + } + else + { + bigValue = bigValue.ShiftLeft(7); + } + } + } + + return objId.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs.meta new file mode 100644 index 00000000..35606f6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91715840bb32d704cb27b905f3b08e35 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1RelativeOid.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs new file mode 100644 index 00000000..d93f3c03 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs @@ -0,0 +1,284 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Sequence + : Asn1Object, IEnumerable + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1Sequence), Asn1Tags.Sequence) {} + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return sequence; + } + } + + /** + * return an Asn1Sequence from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static Asn1Sequence GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1Sequence asn1Sequence) + return asn1Sequence; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1Sequence converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1Sequence)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct sequence from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Return an ASN1 sequence from a tagged object. There is a special + * case here, if an object appears to have been explicitly tagged on + * reading but we were expecting it to be implicitly tagged in the + * normal course of events it indicates that we lost the surrounding + * sequence - so we need to add it back (this will happen if the tagged + * object is a sequence that contains other sequences). If you are + * dealing with implicitly tagged sequences you really should + * be using this method. + * + * @param taggedObject the tagged object. + * @param declaredExplicit true if the object is meant to be explicitly tagged, false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static Asn1Sequence GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1Sequence)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + // NOTE: Only non-readonly to support LazyDLSequence + internal Asn1Encodable[] elements; + + protected internal Asn1Sequence() + { + this.elements = Asn1EncodableVector.EmptyElements; + } + + protected internal Asn1Sequence(Asn1Encodable element) + { + if (null == element) + throw new ArgumentNullException(nameof(element)); + + this.elements = new Asn1Encodable[]{ element }; + } + + protected internal Asn1Sequence(Asn1Encodable element1, Asn1Encodable element2) + { + if (null == element1) + throw new ArgumentNullException(nameof(element1)); + if (null == element2) + throw new ArgumentNullException(nameof(element2)); + + this.elements = new Asn1Encodable[]{ element1, element2 }; + } + + protected internal Asn1Sequence(params Asn1Encodable[] elements) + { + if (Arrays.IsNullOrContainsNull(elements)) + throw new NullReferenceException("'elements' cannot be null, or contain null"); + + this.elements = Asn1EncodableVector.CloneElements(elements); + } + + internal Asn1Sequence(Asn1Encodable[] elements, bool clone) + { + this.elements = clone ? Asn1EncodableVector.CloneElements(elements) : elements; + } + + protected internal Asn1Sequence(Asn1EncodableVector elementVector) + { + if (null == elementVector) + throw new ArgumentNullException("elementVector"); + + this.elements = elementVector.TakeElements(); + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public virtual IEnumerator GetEnumerator() + { + IEnumerable e = elements; + return e.GetEnumerator(); + } + + private class Asn1SequenceParserImpl + : Asn1SequenceParser + { + private readonly Asn1Sequence outer; + private readonly int max; + private int index; + + public Asn1SequenceParserImpl( + Asn1Sequence outer) + { + this.outer = outer; + // NOTE: Call Count here to 'force' a LazyDerSequence + this.max = outer.Count; + } + + public IAsn1Convertible ReadObject() + { + if (index == max) + return null; + + Asn1Encodable obj = outer[index++]; + + if (obj is Asn1Sequence) + return ((Asn1Sequence)obj).Parser; + + if (obj is Asn1Set) + return ((Asn1Set)obj).Parser; + + // NB: Asn1OctetString implements Asn1OctetStringParser directly +// if (obj is Asn1OctetString) +// return ((Asn1OctetString)obj).Parser; + + return obj; + } + + public Asn1Object ToAsn1Object() + { + return outer; + } + } + + public virtual Asn1SequenceParser Parser + { + get { return new Asn1SequenceParserImpl(this); } + } + + /** + * return the object at the sequence position indicated by index. + * + * @param index the sequence number (starting at zero) of the object + * @return the object at the sequence position indicated by index. + */ + public virtual Asn1Encodable this[int index] + { + get { return elements[index]; } + } + + public virtual int Count + { + get { return elements.Length; } + } + + public virtual T[] MapElements(Func func) + { + // NOTE: Call Count here to 'force' a LazyDerSequence + int count = Count; + T[] result = new T[count]; + for (int i = 0; i < count; ++i) + { + result[i] = func(elements[i]); + } + return result; + } + + public virtual Asn1Encodable[] ToArray() + { + return Asn1EncodableVector.CloneElements(elements); + } + + protected override int Asn1GetHashCode() + { + // NOTE: Call Count here to 'force' a LazyDerSequence + int i = Count; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= elements[i].ToAsn1Object().CallAsn1GetHashCode(); + } + + return hc; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + Asn1Sequence that = asn1Object as Asn1Sequence; + if (null == that) + return false; + + // NOTE: Call Count here (on both) to 'force' a LazyDerSequence + int count = this.Count; + if (that.Count != count) + return false; + + for (int i = 0; i < count; ++i) + { + Asn1Object o1 = this.elements[i].ToAsn1Object(); + Asn1Object o2 = that.elements[i].ToAsn1Object(); + + if (!o1.Equals(o2)) + return false; + } + + return true; + } + + public override string ToString() + { + return CollectionUtilities.ToString(elements); + } + + // TODO[asn1] Preferably return an Asn1BitString[] (doesn't exist yet) + internal DerBitString[] GetConstructedBitStrings() + { + return MapElements(DerBitString.GetInstance); + } + + internal Asn1OctetString[] GetConstructedOctetStrings() + { + return MapElements(Asn1OctetString.GetInstance); + } + + // TODO[asn1] Preferably return an Asn1BitString (doesn't exist yet) + internal abstract DerBitString ToAsn1BitString(); + + // TODO[asn1] Preferably return an Asn1External (doesn't exist yet) + internal abstract DerExternal ToAsn1External(); + + internal abstract Asn1OctetString ToAsn1OctetString(); + + internal abstract Asn1Set ToAsn1Set(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs.meta new file mode 100644 index 00000000..0c896752 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6142db4c291df94f9783fc3a2ab531c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Sequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs new file mode 100644 index 00000000..b24c4c46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs @@ -0,0 +1,331 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Set + : Asn1Object, IEnumerable + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1Set), Asn1Tags.Set) {} + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return sequence.ToAsn1Set(); + } + } + + /** + * return an ASN1Set from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static Asn1Set GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1Set asn1Set) + return asn1Set; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1Set converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1Set)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct set from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Return an ASN1 set from a tagged object. There is a special + * case here, if an object appears to have been explicitly tagged on + * reading but we were expecting it to be implicitly tagged in the + * normal course of events it indicates that we lost the surrounding + * set - so we need to add it back (this will happen if the tagged + * object is a sequence that contains other sequences). If you are + * dealing with implicitly tagged sets you really should + * be using this method. + * + * @param taggedObject the tagged object. + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static Asn1Set GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1Set)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + // NOTE: Only non-readonly to support LazyDLSet + internal Asn1Encodable[] elements; + internal bool isSorted; + + protected internal Asn1Set() + { + this.elements = Asn1EncodableVector.EmptyElements; + this.isSorted = true; + } + + protected internal Asn1Set(Asn1Encodable element) + { + if (null == element) + throw new ArgumentNullException("element"); + + this.elements = new Asn1Encodable[]{ element }; + this.isSorted = true; + } + + protected internal Asn1Set(Asn1Encodable[] elements, bool doSort) + { + if (Arrays.IsNullOrContainsNull(elements)) + throw new NullReferenceException("'elements' cannot be null, or contain null"); + + Asn1Encodable[] tmp = Asn1EncodableVector.CloneElements(elements); + if (doSort && tmp.Length >= 2) + { + tmp = Sort(tmp); + } + + this.elements = tmp; + this.isSorted = doSort || tmp.Length < 2; + } + + protected internal Asn1Set(Asn1EncodableVector elementVector, bool doSort) + { + if (null == elementVector) + throw new ArgumentNullException("elementVector"); + + Asn1Encodable[] tmp; + if (doSort && elementVector.Count >= 2) + { + tmp = Sort(elementVector.CopyElements()); + } + else + { + tmp = elementVector.TakeElements(); + } + + this.elements = tmp; + this.isSorted = doSort || tmp.Length < 2; + } + + protected internal Asn1Set(bool isSorted, Asn1Encodable[] elements) + { + this.elements = elements; + this.isSorted = isSorted || elements.Length < 2; + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public virtual IEnumerator GetEnumerator() + { + IEnumerable e = elements; + return e.GetEnumerator(); + } + + /** + * return the object at the set position indicated by index. + * + * @param index the set number (starting at zero) of the object + * @return the object at the set position indicated by index. + */ + public virtual Asn1Encodable this[int index] + { + get { return elements[index]; } + } + + public virtual int Count + { + get { return elements.Length; } + } + + public virtual T[] MapElements(Func func) + { + // NOTE: Call Count here to 'force' a LazyDerSet + int count = Count; + T[] result = new T[count]; + for (int i = 0; i < count; ++i) + { + result[i] = func(elements[i]); + } + return result; + } + + public virtual Asn1Encodable[] ToArray() + { + return Asn1EncodableVector.CloneElements(elements); + } + + private class Asn1SetParserImpl + : Asn1SetParser + { + private readonly Asn1Set outer; + private readonly int max; + private int index; + + public Asn1SetParserImpl( + Asn1Set outer) + { + this.outer = outer; + // NOTE: Call Count here to 'force' a LazyDerSet + this.max = outer.Count; + } + + public IAsn1Convertible ReadObject() + { + if (index == max) + return null; + + Asn1Encodable obj = outer[index++]; + if (obj is Asn1Sequence) + return ((Asn1Sequence)obj).Parser; + + if (obj is Asn1Set) + return ((Asn1Set)obj).Parser; + + // NB: Asn1OctetString implements Asn1OctetStringParser directly +// if (obj is Asn1OctetString) +// return ((Asn1OctetString)obj).Parser; + + return obj; + } + + public virtual Asn1Object ToAsn1Object() + { + return outer; + } + } + + public Asn1SetParser Parser + { + get { return new Asn1SetParserImpl(this); } + } + + protected override int Asn1GetHashCode() + { + // NOTE: Call Count here to 'force' a LazyDerSet + int i = Count; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= elements[i].ToAsn1Object().CallAsn1GetHashCode(); + } + + return hc; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + Asn1Set that = asn1Object as Asn1Set; + if (null == that) + return false; + + // NOTE: Call Count here (on both) to 'force' a LazyDerSet + int count = this.Count; + if (that.Count != count) + return false; + + for (int i = 0; i < count; ++i) + { + Asn1Object o1 = this.elements[i].ToAsn1Object(); + Asn1Object o2 = that.elements[i].ToAsn1Object(); + + if (!o1.Equals(o2)) + return false; + } + + return true; + } + + public override string ToString() + { + return CollectionUtilities.ToString(elements); + } + + internal static Asn1Encodable[] Sort(Asn1Encodable[] elements) + { + int count = elements.Length; + if (count < 2) + return elements; + + byte[][] keys = new byte[count][]; + for (int i = 0; i < count; ++i) + { + keys[i] = elements[i].GetEncoded(Der); + } + Array.Sort(keys, elements, new DerComparer()); + return elements; + } + + private class DerComparer + : IComparer + { + public int Compare(byte[] a, byte[] b) + { + Debug.Assert(a.Length >= 2 && b.Length >= 2); + + /* + * NOTE: Set elements in DER encodings are ordered first according to their tags (class and + * number); the CONSTRUCTED bit is not part of the tag. + * + * For SET-OF, this is unimportant. All elements have the same tag and DER requires them to + * either all be in constructed form or all in primitive form, according to that tag. The + * elements are effectively ordered according to their content octets. + * + * For SET, the elements will have distinct tags, and each will be in constructed or + * primitive form accordingly. Failing to ignore the CONSTRUCTED bit could therefore lead to + * ordering inversions. + */ + int a0 = a[0] & ~Asn1Tags.Constructed; + int b0 = b[0] & ~Asn1Tags.Constructed; + if (a0 != b0) + return a0 < b0 ? -1 : 1; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int compareLength = System.Math.Min(a.Length, b.Length) - 1; + return a.AsSpan(1, compareLength).SequenceCompareTo(b.AsSpan(1, compareLength)); +#else + int len = System.Math.Min(a.Length, b.Length); + for (int i = 1; i < len; ++i) + { + byte ai = a[i], bi = b[i]; + if (ai != bi) + return ai < bi ? -1 : 1; + } + Debug.Assert(a.Length == b.Length); + return 0; +#endif + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs.meta new file mode 100644 index 00000000..7da8f55d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 19cbe864b3e49ea4ba93776bdcc68b1e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Set.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs new file mode 100644 index 00000000..5a64230a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal sealed class Asn1Tag + { + internal static Asn1Tag Create(int tagClass, int tagNo) + { + return new Asn1Tag(tagClass, tagNo); + } + + private readonly int m_tagClass; + private readonly int m_tagNo; + + private Asn1Tag(int tagClass, int tagNo) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + } + + internal int TagClass + { + get { return m_tagClass; } + } + + internal int TagNo + { + get { return m_tagNo; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs.meta new file mode 100644 index 00000000..2c76bf90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3365721bf28b1da45a5cd228c0b0bc75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tag.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs new file mode 100644 index 00000000..fcfa3eba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs @@ -0,0 +1,409 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * ASN.1 TaggedObject - in ASN.1 notation this is any object preceded by + * a [n] where n is some number - these are assumed to follow the construction + * rules (as with sequences). + */ + public abstract class Asn1TaggedObject + : Asn1Object, Asn1TaggedObjectParser + { + private const int DeclaredExplicit = 1; + private const int DeclaredImplicit = 2; + // TODO It will probably be better to track parsing constructed vs primitive instead + private const int ParsedExplicit = 3; + private const int ParsedImplicit = 4; + + public static Asn1TaggedObject GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1TaggedObject asn1TaggedObject) + return asn1TaggedObject; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1TaggedObject converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return CheckedCast(FromByteArray(bytes)); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct tagged object from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static Asn1TaggedObject GetInstance(object obj, int tagClass) + { + if (obj == null) + throw new ArgumentNullException(nameof(obj)); + + Asn1TaggedObject taggedObject = GetInstance(obj); + if (tagClass != taggedObject.TagClass) + throw new ArgumentException("unexpected tag in GetInstance: " + Asn1Utilities.GetTagText(taggedObject)); + + return taggedObject; + } + + public static Asn1TaggedObject GetInstance(object obj, int tagClass, int tagNo) + { + if (obj == null) + throw new ArgumentNullException(nameof(obj)); + + Asn1TaggedObject taggedObject = GetInstance(obj); + if (!taggedObject.HasTag(tagClass, tagNo)) + throw new ArgumentException("unexpected tag in GetInstance: " + Asn1Utilities.GetTagText(taggedObject)); + + return taggedObject; + } + + public static Asn1TaggedObject GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + if (Asn1Tags.ContextSpecific != taggedObject.TagClass) + throw new InvalidOperationException("this method only valid for CONTEXT_SPECIFIC tags"); + + if (declaredExplicit) + return taggedObject.GetExplicitBaseTagged(); + + throw new ArgumentException("this method not valid for implicitly tagged tagged objects"); + } + + internal readonly int explicitness; + internal readonly int tagClass; + internal readonly int tagNo; + internal readonly Asn1Encodable obj; + + /** + * @param explicitly true if the object is explicitly tagged. + * @param tagNo the tag number for this object. + * @param obj the tagged object. + */ + protected Asn1TaggedObject(bool isExplicit, int tagNo, Asn1Encodable obj) + : this(isExplicit, Asn1Tags.ContextSpecific, tagNo, obj) + { + } + + protected Asn1TaggedObject(bool isExplicit, int tagClass, int tagNo, Asn1Encodable obj) + : this(isExplicit ? DeclaredExplicit : DeclaredImplicit, tagClass, tagNo, obj) + { + } + + internal Asn1TaggedObject(int explicitness, int tagClass, int tagNo, Asn1Encodable obj) + { + if (null == obj) + throw new ArgumentNullException("obj"); + if (Asn1Tags.Universal == tagClass || (tagClass & Asn1Tags.Private) != tagClass) + throw new ArgumentException("invalid tag class: " + tagClass, "tagClass"); + + this.explicitness = (obj is IAsn1Choice) ? DeclaredExplicit : explicitness; + this.tagClass = tagClass; + this.tagNo = tagNo; + this.obj = obj; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + Asn1TaggedObject that = asn1Object as Asn1TaggedObject; + if (null == that || this.tagNo != that.tagNo || this.tagClass != that.tagClass) + return false; + + if (this.explicitness != that.explicitness) + { + /* + * TODO This seems incorrect for some cases of implicit tags e.g. if one is a + * declared-implicit SET and the other a parsed object. + */ + if (this.IsExplicit() != that.IsExplicit()) + return false; + } + + Asn1Object p1 = this.obj.ToAsn1Object(); + Asn1Object p2 = that.obj.ToAsn1Object(); + + if (p1 == p2) + return true; + + if (!this.IsExplicit()) + { + try + { + byte[] d1 = this.GetEncoded(); + byte[] d2 = that.GetEncoded(); + + return Arrays.AreEqual(d1, d2); + } + catch (IOException) + { + return false; + } + } + + return p1.CallAsn1Equals(p2); + } + + protected override int Asn1GetHashCode() + { + return (tagClass * 7919) ^ tagNo ^ (IsExplicit() ? 0x0F : 0xF0) ^ obj.ToAsn1Object().CallAsn1GetHashCode(); + } + + public int TagClass + { + get { return tagClass; } + } + + public int TagNo + { + get { return tagNo; } + } + + public bool HasContextTag(int tagNo) + { + return this.tagClass == Asn1Tags.ContextSpecific && this.tagNo == tagNo; + } + + public bool HasTag(int tagClass, int tagNo) + { + return this.tagClass == tagClass && this.tagNo == tagNo; + } + + /** + * return whether or not the object may be explicitly tagged. + *

+ * Note: if the object has been read from an input stream, the only + * time you can be sure if isExplicit is returning the true state of + * affairs is if it returns false. An implicitly tagged object may appear + * to be explicitly tagged, so you need to understand the context under + * which the reading was done as well, see GetObject below.

+ */ + public bool IsExplicit() + { + // TODO New methods like 'IsKnownExplicit' etc. to distinguish uncertain cases? + switch (explicitness) + { + case DeclaredExplicit: + case ParsedExplicit: + return true; + default: + return false; + } + } + + internal bool IsParsed() + { + switch (explicitness) + { + case ParsedExplicit: + case ParsedImplicit: + return true; + default: + return false; + } + } + + /** + * return whatever was following the tag. + *

+ * Note: tagged objects are generally context dependent if you're + * trying to extract a tagged object you should be going via the + * appropriate GetInstance method.

+ */ + public Asn1Object GetObject() + { + if (Asn1Tags.ContextSpecific != TagClass) + throw new InvalidOperationException("this method only valid for CONTEXT_SPECIFIC tags"); + + return obj.ToAsn1Object(); + } + + /** + * Needed for open types, until we have better type-guided parsing support. Use sparingly for other + * purposes, and prefer {@link #getExplicitBaseTagged()}, {@link #getImplicitBaseTagged(int, int)} or + * {@link #getBaseUniversal(boolean, int)} where possible. Before using, check for matching tag + * {@link #getTagClass() class} and {@link #getTagNo() number}. + */ + public Asn1Encodable GetBaseObject() + { + return obj; + } + + /** + * Needed for open types, until we have better type-guided parsing support. Use + * sparingly for other purposes, and prefer {@link #getExplicitBaseTagged()} or + * {@link #getBaseUniversal(boolean, int)} where possible. Before using, check + * for matching tag {@link #getTagClass() class} and {@link #getTagNo() number}. + */ + public Asn1Encodable GetExplicitBaseObject() + { + if (!IsExplicit()) + throw new InvalidOperationException("object implicit - explicit expected."); + + return obj; + } + + public Asn1TaggedObject GetExplicitBaseTagged() + { + if (!IsExplicit()) + throw new InvalidOperationException("object implicit - explicit expected."); + + return CheckedCast(obj.ToAsn1Object()); + } + + public Asn1TaggedObject GetImplicitBaseTagged(int baseTagClass, int baseTagNo) + { + if (Asn1Tags.Universal == baseTagClass || (baseTagClass & Asn1Tags.Private) != baseTagClass) + throw new ArgumentException("invalid base tag class: " + baseTagClass, "baseTagClass"); + + switch (explicitness) + { + case DeclaredExplicit: + throw new InvalidOperationException("object explicit - implicit expected."); + + case DeclaredImplicit: + { + Asn1TaggedObject declared = CheckedCast(obj.ToAsn1Object()); + return Asn1Utilities.CheckTag(declared, baseTagClass, baseTagNo); + } + + // Parsed; return a virtual tag (i.e. that couldn't have been present in the encoding) + default: + return ReplaceTag(baseTagClass, baseTagNo); + } + } + + public Asn1Object GetBaseUniversal(bool declaredExplicit, int tagNo) + { + Asn1UniversalType universalType = Asn1UniversalTypes.Get(tagNo); + if (null == universalType) + throw new ArgumentException("unsupported UNIVERSAL tag number: " + tagNo, "tagNo"); + + return GetBaseUniversal(declaredExplicit, universalType); + } + + internal Asn1Object GetBaseUniversal(bool declaredExplicit, Asn1UniversalType universalType) + { + if (declaredExplicit) + { + if (!IsExplicit()) + throw new InvalidOperationException("object explicit - implicit expected."); + + return universalType.CheckedCast(obj.ToAsn1Object()); + } + + if (DeclaredExplicit == explicitness) + throw new InvalidOperationException("object explicit - implicit expected."); + + Asn1Object baseObject = obj.ToAsn1Object(); + switch (explicitness) + { + case ParsedExplicit: + return universalType.FromImplicitConstructed(RebuildConstructed(baseObject)); + case ParsedImplicit: + { + if (baseObject is Asn1Sequence asn1Sequence) + return universalType.FromImplicitConstructed(asn1Sequence); + + return universalType.FromImplicitPrimitive((DerOctetString)baseObject); + } + default: + return universalType.CheckedCast(baseObject); + } + } + + public IAsn1Convertible ParseBaseUniversal(bool declaredExplicit, int baseTagNo) + { + Asn1Object asn1Object = GetBaseUniversal(declaredExplicit, baseTagNo); + + switch (baseTagNo) + { + case Asn1Tags.BitString: + return ((DerBitString)asn1Object).Parser; + case Asn1Tags.OctetString: + return ((Asn1OctetString)asn1Object).Parser; + case Asn1Tags.Sequence: + return ((Asn1Sequence)asn1Object).Parser; + case Asn1Tags.Set: + return ((Asn1Set)asn1Object).Parser; + } + + return asn1Object; + } + + public IAsn1Convertible ParseExplicitBaseObject() + { + return GetExplicitBaseObject(); + } + + public Asn1TaggedObjectParser ParseExplicitBaseTagged() + { + return GetExplicitBaseTagged(); + } + + public Asn1TaggedObjectParser ParseImplicitBaseTagged(int baseTagClass, int baseTagNo) + { + return GetImplicitBaseTagged(baseTagClass, baseTagNo); + } + + public override string ToString() + { + return Asn1Utilities.GetTagText(tagClass, tagNo) + obj; + } + + internal abstract string Asn1Encoding { get; } + + internal abstract Asn1Sequence RebuildConstructed(Asn1Object asn1Object); + + internal abstract Asn1TaggedObject ReplaceTag(int tagClass, int tagNo); + + internal static Asn1Object CreateConstructedDL(int tagClass, int tagNo, Asn1EncodableVector contentsElements) + { + bool maybeExplicit = (contentsElements.Count == 1); + + return maybeExplicit + ? new DLTaggedObject(ParsedExplicit, tagClass, tagNo, contentsElements[0]) + : new DLTaggedObject(ParsedImplicit, tagClass, tagNo, DLSequence.FromVector(contentsElements)); + } + + internal static Asn1Object CreateConstructedIL(int tagClass, int tagNo, Asn1EncodableVector contentsElements) + { + bool maybeExplicit = (contentsElements.Count == 1); + + return maybeExplicit + ? new BerTaggedObject(ParsedExplicit, tagClass, tagNo, contentsElements[0]) + : new BerTaggedObject(ParsedImplicit, tagClass, tagNo, BerSequence.FromVector(contentsElements)); + } + + internal static Asn1Object CreatePrimitive(int tagClass, int tagNo, byte[] contentsOctets) + { + // Note: !CONSTRUCTED => IMPLICIT + return new DLTaggedObject(ParsedImplicit, tagClass, tagNo, new DerOctetString(contentsOctets)); + } + + private static Asn1TaggedObject CheckedCast(Asn1Object asn1Object) + { + Asn1TaggedObject taggedObject = asn1Object as Asn1TaggedObject; + if (null != taggedObject) + return taggedObject; + + throw new InvalidOperationException("unexpected object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(asn1Object)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs.meta new file mode 100644 index 00000000..c1689aa0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0f0c13fb231eed4e855220942c52d6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1TaggedObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs new file mode 100644 index 00000000..1206d2e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class Asn1Tags + { + public const int Boolean = 0x01; + public const int Integer = 0x02; + public const int BitString = 0x03; + public const int OctetString = 0x04; + public const int Null = 0x05; + public const int ObjectIdentifier = 0x06; + public const int ObjectDescriptor = 0x07; + public const int External = 0x08; + public const int Real = 0x09; + public const int Enumerated = 0x0a; + public const int EmbeddedPdv = 0x0b; + public const int Utf8String = 0x0c; + public const int RelativeOid = 0x0d; + // NOTE: 14-15 are reserved. + public const int Sequence = 0x10; + public const int SequenceOf = 0x10; // for completeness + public const int Set = 0x11; + public const int SetOf = 0x11; // for completeness + + public const int NumericString = 0x12; + public const int PrintableString = 0x13; + public const int T61String = 0x14; + public const int VideotexString = 0x15; + public const int IA5String = 0x16; + public const int UtcTime = 0x17; + public const int GeneralizedTime = 0x18; + public const int GraphicString = 0x19; + public const int VisibleString = 0x1a; + public const int GeneralString = 0x1b; + public const int UniversalString = 0x1c; + public const int UnrestrictedString = 0x1d; + public const int BmpString = 0x1e; + + public const int Constructed = 0x20; + + public const int Universal = 0x00; + public const int Application = 0x40; + public const int ContextSpecific = 0x80; + public const int Private = 0xC0; + + public const int Flags = 0xE0; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs.meta new file mode 100644 index 00000000..64d4b0b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ab7dd4c87b823e7419783ae09616970a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Tags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs new file mode 100644 index 00000000..cc7cdfb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal abstract class Asn1Type + { + internal readonly Type m_platformType; + + internal Asn1Type(Type platformType) + { + m_platformType = platformType; + } + + internal Type PlatformType + { + get { return m_platformType; } + } + + public sealed override bool Equals(object that) + { + return this == that; + } + + public sealed override int GetHashCode() + { + return base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs.meta new file mode 100644 index 00000000..a9537369 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05aba7ee1ff30564eafbd48bf7a419d4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Type.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs new file mode 100644 index 00000000..b89507b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +#if UNITY_WSA && !UNITY_EDITOR && !ENABLE_IL2CPP +using System.TypeFix; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal abstract class Asn1UniversalType + : Asn1Type + { + internal readonly Asn1Tag m_tag; + + internal Asn1UniversalType(Type platformType, int tagNo) + : base(platformType) + { + m_tag = Asn1Tag.Create(Asn1Tags.Universal, tagNo); + } + + internal Asn1Object CheckedCast(Asn1Object asn1Object) + { + if (PlatformType.IsInstanceOfType(asn1Object)) + return asn1Object; + + throw new InvalidOperationException("unexpected object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(asn1Object)); + } + + internal virtual Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + throw new InvalidOperationException("unexpected implicit primitive encoding"); + } + + internal virtual Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + throw new InvalidOperationException("unexpected implicit constructed encoding"); + } + + /// + internal Asn1Object FromByteArray(byte[] bytes) + { + return CheckedCast(Asn1Object.FromByteArray(bytes)); + } + + internal Asn1Object GetContextInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + if (Asn1Tags.ContextSpecific != taggedObject.TagClass) + throw new InvalidOperationException("this method only valid for CONTEXT_SPECIFIC tags"); + + return CheckedCast(taggedObject.GetBaseUniversal(declaredExplicit, this)); + } + + internal Asn1Tag Tag + { + get { return m_tag; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs.meta new file mode 100644 index 00000000..30b5a00f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5402b2db701c12744a8d53907cda870e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs new file mode 100644 index 00000000..7edd8adf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal sealed class Asn1UniversalTypes + { + private Asn1UniversalTypes() + { + } + + internal static Asn1UniversalType Get(int tagNo) + { + switch (tagNo) + { + case Asn1Tags.Boolean: + return DerBoolean.Meta.Instance; + case Asn1Tags.Integer: + return DerInteger.Meta.Instance; + case Asn1Tags.BitString: + return DerBitString.Meta.Instance; + case Asn1Tags.OctetString: + return Asn1OctetString.Meta.Instance; + case Asn1Tags.Null: + return Asn1Null.Meta.Instance; + case Asn1Tags.ObjectIdentifier: + return DerObjectIdentifier.Meta.Instance; + case Asn1Tags.ObjectDescriptor: // [UNIVERSAL 7] IMPLICIT GraphicString + return Asn1ObjectDescriptor.Meta.Instance; + case Asn1Tags.External: + return DerExternal.Meta.Instance; + case Asn1Tags.Enumerated: + return DerEnumerated.Meta.Instance; + case Asn1Tags.Utf8String: // [UNIVERSAL 12] IMPLICIT OCTET STRING (encode as if) + return DerUtf8String.Meta.Instance; + case Asn1Tags.RelativeOid: + return Asn1RelativeOid.Meta.Instance; + case Asn1Tags.Sequence: + return Asn1Sequence.Meta.Instance; + case Asn1Tags.Set: + return Asn1Set.Meta.Instance; + case Asn1Tags.NumericString: // [UNIVERSAL 18] IMPLICIT OCTET STRING (encode as if) + return DerNumericString.Meta.Instance; + case Asn1Tags.PrintableString: // [UNIVERSAL 19] IMPLICIT OCTET STRING (encode as if) + return DerPrintableString.Meta.Instance; + case Asn1Tags.T61String: // [UNIVERSAL 20] IMPLICIT OCTET STRING (encode as if) + return DerT61String.Meta.Instance; + case Asn1Tags.VideotexString: // [UNIVERSAL 21] IMPLICIT OCTET STRING (encode as if) + return DerVideotexString.Meta.Instance; + case Asn1Tags.IA5String: // [UNIVERSAL 22] IMPLICIT OCTET STRING (encode as if) + return DerIA5String.Meta.Instance; + case Asn1Tags.UtcTime: // [UNIVERSAL 23] IMPLICIT VisibleString (restricted values) + return Asn1UtcTime.Meta.Instance; + case Asn1Tags.GeneralizedTime: // [UNIVERSAL 24] IMPLICIT VisibleString (restricted values) + return Asn1GeneralizedTime.Meta.Instance; + case Asn1Tags.GraphicString: // [UNIVERSAL 25] IMPLICIT OCTET STRING (encode as if) + return DerGraphicString.Meta.Instance; + case Asn1Tags.VisibleString: // [UNIVERSAL 26] IMPLICIT OCTET STRING (encode as if) + return DerVisibleString.Meta.Instance; + case Asn1Tags.GeneralString: // [UNIVERSAL 27] IMPLICIT OCTET STRING (encode as if) + return DerGeneralString.Meta.Instance; + case Asn1Tags.UniversalString: // [UNIVERSAL 28] IMPLICIT OCTET STRING (encode as if) + return DerUniversalString.Meta.Instance; + case Asn1Tags.BmpString: // [UNIVERSAL 30] IMPLICIT OCTET STRING (encode as if) + return DerBmpString.Meta.Instance; + + case Asn1Tags.Real: + case Asn1Tags.EmbeddedPdv: + case Asn1Tags.UnrestrictedString: + default: + return null; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs.meta new file mode 100644 index 00000000..8099552e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fbcae4ac01ba20647a8a3924a283ad45 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UniversalTypes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs new file mode 100644 index 00000000..02afcfa4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs @@ -0,0 +1,257 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /// UTCTime ASN.1 type + public class Asn1UtcTime + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(Asn1UtcTime), Asn1Tags.UtcTime) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a UTC Time from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static Asn1UtcTime GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is Asn1UtcTime asn1UtcTime) + return asn1UtcTime; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is Asn1UtcTime converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (Asn1UtcTime)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct UTC time from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static Asn1UtcTime GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (Asn1UtcTime)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly string m_timeString; + private readonly DateTime m_dateTime; + private readonly bool m_dateTimeLocked; + private readonly int m_twoDigitYearMax; + + public Asn1UtcTime(string timeString) + { + m_timeString = timeString ?? throw new ArgumentNullException(nameof(timeString)); + + try + { + m_dateTime = FromString(timeString, out m_twoDigitYearMax); + m_dateTimeLocked = false; + } + catch (FormatException e) + { + throw new ArgumentException("invalid date string: " + e.Message); + } + } + + + public Asn1UtcTime(DateTime dateTime) + { + dateTime = DateTimeUtilities.WithPrecisionSecond(dateTime.ToUniversalTime()); + + m_dateTime = dateTime; + m_dateTimeLocked = true; + m_timeString = ToStringCanonical(dateTime, out m_twoDigitYearMax); + } + + public Asn1UtcTime(DateTime dateTime, int twoDigitYearMax) + { + dateTime = DateTimeUtilities.WithPrecisionSecond(dateTime.ToUniversalTime()); + + Validate(dateTime, twoDigitYearMax); + + m_dateTime = dateTime; + m_dateTimeLocked = true; + m_timeString = ToStringCanonical(dateTime); + m_twoDigitYearMax = twoDigitYearMax; + } + + internal Asn1UtcTime(byte[] contents) + // NOTE: Non-ASCII characters will produce '?' characters, which will fail DateTime parsing + : this(Encoding.ASCII.GetString(contents)) + { + } + + public string TimeString => m_timeString; + + public DateTime ToDateTime() + { + return m_dateTime; + } + + public DateTime ToDateTime(int twoDigitYearMax) + { + if (InRange(m_dateTime, twoDigitYearMax)) + return m_dateTime; + + if (m_dateTimeLocked) + throw new InvalidOperationException(); + + int twoDigitYear = m_dateTime.Year % 100; + int twoDigitYearCutoff = twoDigitYearMax % 100; + + int diff = twoDigitYear - twoDigitYearCutoff; + int newYear = twoDigitYearMax + diff; + if (diff > 0) + { + newYear -= 100; + } + + return m_dateTime.AddYears(newYear - m_dateTime.Year); + } + + public DateTime ToDateTime(Calendar calendar) + { + return ToDateTime(calendar.TwoDigitYearMax); + } + + /// Return an adjusted date in the range of 1950 - 2049. + + public DateTime ToAdjustedDateTime() + { + return ToDateTime(2049); + } + + public int TwoDigitYearMax => m_twoDigitYearMax; + + internal byte[] GetContents(int encoding) + { + if (encoding == Asn1OutputStream.EncodingDer && m_timeString.Length != 13) + { + string canonical = ToStringCanonical(m_dateTime); + return Encoding.ASCII.GetBytes(canonical); + } + + return Encoding.ASCII.GetBytes(m_timeString); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.UtcTime, GetContents(encoding)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents(encoding)); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + if (!(asn1Object is Asn1UtcTime that)) + return false; + + // TODO Performance + return Arrays.AreEqual( + this.GetContents(Asn1OutputStream.EncodingDer), + that.GetContents(Asn1OutputStream.EncodingDer)); + } + + protected override int Asn1GetHashCode() + { + // TODO Performance + return Arrays.GetHashCode( + this.GetContents(Asn1OutputStream.EncodingDer)); + } + + public override string ToString() + { + return m_timeString; + } + + internal static Asn1UtcTime CreatePrimitive(byte[] contents) + { + return new Asn1UtcTime(contents); + } + + private static DateTime FromString(string s, out int twoDigitYearMax) + { + var provider = DateTimeFormatInfo.InvariantInfo; + twoDigitYearMax = provider.Calendar.TwoDigitYearMax; + + switch (s.Length) + { + case 11: + return DateTime.ParseExact(s, @"yyMMddHHmm\Z", provider, + DateTimeStyles.AdjustToUniversal | DateTimeStyles.AssumeUniversal); + case 13: + return DateTime.ParseExact(s, @"yyMMddHHmmss\Z", provider, + DateTimeStyles.AdjustToUniversal | DateTimeStyles.AssumeUniversal); + case 15: + return DateTime.ParseExact(s, @"yyMMddHHmmzzz", provider, DateTimeStyles.AdjustToUniversal); + case 17: + return DateTime.ParseExact(s, @"yyMMddHHmmsszzz", provider, DateTimeStyles.AdjustToUniversal); + default: + throw new FormatException(); + } + } + + private static bool InRange(DateTime dateTime, int twoDigitYearMax) + { + return (uint)(twoDigitYearMax - dateTime.Year) < 100; + } + + private static string ToStringCanonical(DateTime dateTime, out int twoDigitYearMax) + { + var provider = DateTimeFormatInfo.InvariantInfo; + twoDigitYearMax = provider.Calendar.TwoDigitYearMax; + + Validate(dateTime, twoDigitYearMax); + + return dateTime.ToString(@"yyMMddHHmmss\Z", provider); + } + + private static string ToStringCanonical(DateTime dateTime) + { + return dateTime.ToString(@"yyMMddHHmmss\Z", DateTimeFormatInfo.InvariantInfo); + } + + private static void Validate(DateTime dateTime, int twoDigitYearMax) + { + if (!InRange(dateTime, twoDigitYearMax)) + throw new ArgumentOutOfRangeException(nameof(dateTime)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs.meta new file mode 100644 index 00000000..1ecb554d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 98e5527f6530d2644a265dfb642a8c44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1UtcTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs new file mode 100644 index 00000000..e0063fc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs @@ -0,0 +1,333 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class Asn1Utilities + { + internal static Asn1TaggedObject CheckTag(Asn1TaggedObject taggedObject, int tagClass, int tagNo) + { + if (!taggedObject.HasTag(tagClass, tagNo)) + { + string expected = GetTagText(tagClass, tagNo); + string found = GetTagText(taggedObject); + throw new InvalidOperationException("Expected " + expected + " tag but found " + found); + } + return taggedObject; + } + + internal static Asn1TaggedObjectParser CheckTag(Asn1TaggedObjectParser taggedObjectParser, int tagClass, + int tagNo) + { + if (!taggedObjectParser.HasTag(tagClass, tagNo)) + { + string expected = GetTagText(tagClass, tagNo); + string found = GetTagText(taggedObjectParser); + throw new InvalidOperationException("Expected " + expected + " tag but found " + found); + } + return taggedObjectParser; + } + + + internal static string GetTagText(Asn1Tag tag) + { + return GetTagText(tag.TagClass, tag.TagNo); + } + + public static string GetTagText(Asn1TaggedObject taggedObject) + { + return GetTagText(taggedObject.TagClass, taggedObject.TagNo); + } + + public static string GetTagText(Asn1TaggedObjectParser taggedObjectParser) + { + return GetTagText(taggedObjectParser.TagClass, taggedObjectParser.TagNo); + } + + public static string GetTagText(int tagClass, int tagNo) + { + switch (tagClass) + { + case Asn1Tags.Application: + return "[APPLICATION " + tagNo + "]"; + case Asn1Tags.ContextSpecific: + return "[CONTEXT " + tagNo + "]"; + case Asn1Tags.Private: + return "[PRIVATE " + tagNo + "]"; + default: + return "[UNIVERSAL " + tagNo + "]"; + } + } + + + /* + * Wrappers for Asn1TaggedObject.GetExplicitBaseObject + */ + + public static Asn1Encodable GetExplicitBaseObject(Asn1TaggedObject taggedObject, int tagClass, int tagNo) + { + return CheckTag(taggedObject, tagClass, tagNo).GetExplicitBaseObject(); + } + + public static Asn1Encodable GetExplicitContextBaseObject(Asn1TaggedObject taggedObject, int tagNo) + { + return GetExplicitBaseObject(taggedObject, Asn1Tags.ContextSpecific, tagNo); + } + + public static Asn1Encodable TryGetExplicitBaseObject(Asn1TaggedObject taggedObject, int tagClass, int tagNo) + { + if (!taggedObject.HasTag(tagClass, tagNo)) + return null; + + return taggedObject.GetExplicitBaseObject(); + } + + public static Asn1Encodable TryGetExplicitContextBaseObject(Asn1TaggedObject taggedObject, int tagNo) + { + return TryGetExplicitBaseObject(taggedObject, Asn1Tags.ContextSpecific, tagNo); + } + + + /* + * Wrappers for Asn1TaggedObject.GetExplicitBaseTagged + */ + + public static Asn1TaggedObject GetExplicitBaseTagged(Asn1TaggedObject taggedObject, int tagClass, int tagNo) + { + return CheckTag(taggedObject, tagClass, tagNo).GetExplicitBaseTagged(); + } + + public static Asn1TaggedObject GetExplicitContextBaseTagged(Asn1TaggedObject taggedObject, int tagNo) + { + return GetExplicitBaseTagged(taggedObject, Asn1Tags.ContextSpecific, tagNo); + } + + public static Asn1TaggedObject TryGetExplicitBaseTagged(Asn1TaggedObject taggedObject, int tagClass, int tagNo) + { + if (!taggedObject.HasTag(tagClass, tagNo)) + return null; + + return taggedObject.GetExplicitBaseTagged(); + } + + public static Asn1TaggedObject TryGetExplicitContextBaseTagged(Asn1TaggedObject taggedObject, int tagNo) + { + return TryGetExplicitBaseTagged(taggedObject, Asn1Tags.ContextSpecific, tagNo); + } + + + /* + * Wrappers for Asn1TaggedObject.GetImplicitBaseTagged + */ + + public static Asn1TaggedObject GetImplicitBaseTagged(Asn1TaggedObject taggedObject, int tagClass, int tagNo, + int baseTagClass, int baseTagNo) + { + return CheckTag(taggedObject, tagClass, tagNo).GetImplicitBaseTagged(baseTagClass, baseTagNo); + } + + public static Asn1TaggedObject GetImplicitContextBaseTagged(Asn1TaggedObject taggedObject, int tagNo, + int baseTagClass, int baseTagNo) + { + return GetImplicitBaseTagged(taggedObject, Asn1Tags.ContextSpecific, tagNo, baseTagClass, baseTagNo); + } + + public static Asn1TaggedObject TryGetImplicitBaseTagged(Asn1TaggedObject taggedObject, int tagClass, int tagNo, + int baseTagClass, int baseTagNo) + { + if (!taggedObject.HasTag(tagClass, tagNo)) + return null; + + return taggedObject.GetImplicitBaseTagged(baseTagClass, baseTagNo); + } + + public static Asn1TaggedObject TryGetImplicitContextBaseTagged(Asn1TaggedObject taggedObject, int tagNo, + int baseTagClass, int baseTagNo) + { + return TryGetImplicitBaseTagged(taggedObject, Asn1Tags.ContextSpecific, tagNo, baseTagClass, baseTagNo); + } + + + /* + * Wrappers for Asn1TaggedObject.GetBaseUniversal + */ + + public static Asn1Object GetBaseUniversal(Asn1TaggedObject taggedObject, int tagClass, int tagNo, + bool declaredExplicit, int baseTagNo) + { + return CheckTag(taggedObject, tagClass, tagNo).GetBaseUniversal(declaredExplicit, baseTagNo); + } + + public static Asn1Object GetContextBaseUniversal(Asn1TaggedObject taggedObject, int tagNo, + bool declaredExplicit, int baseTagNo) + { + return GetBaseUniversal(taggedObject, Asn1Tags.ContextSpecific, tagNo, declaredExplicit, baseTagNo); + } + + public static Asn1Object TryGetBaseUniversal(Asn1TaggedObject taggedObject, int tagClass, int tagNo, + bool declaredExplicit, int baseTagNo) + { + if (!taggedObject.HasTag(tagClass, tagNo)) + return null; + + return taggedObject.GetBaseUniversal(declaredExplicit, baseTagNo); + } + + public static Asn1Object TryGetContextBaseUniversal(Asn1TaggedObject taggedObject, int tagNo, + bool declaredExplicit, int baseTagNo) + { + return TryGetBaseUniversal(taggedObject, Asn1Tags.ContextSpecific, tagNo, declaredExplicit, baseTagNo); + } + + + /* + * Wrappers for Asn1TaggedObjectParser.ParseExplicitBaseTagged + */ + + /// + public static Asn1TaggedObjectParser ParseExplicitBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagClass, int tagNo) + { + return CheckTag(taggedObjectParser, tagClass, tagNo).ParseExplicitBaseTagged(); + } + + /// + public static Asn1TaggedObjectParser ParseExplicitContextBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagNo) + { + return ParseExplicitBaseTagged(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo); + } + + /// + public static Asn1TaggedObjectParser TryParseExplicitBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagClass, int tagNo) + { + if (!taggedObjectParser.HasTag(tagClass, tagNo)) + return null; + + return taggedObjectParser.ParseExplicitBaseTagged(); + } + + /// + public static Asn1TaggedObjectParser TryParseExplicitContextBaseTagged( + Asn1TaggedObjectParser taggedObjectParser, int tagNo) + { + return TryParseExplicitBaseTagged(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo); + } + + + /* + * Wrappers for Asn1TaggedObjectParser.ParseImplicitBaseTagged + */ + + /// + public static Asn1TaggedObjectParser ParseImplicitBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagClass, int tagNo, int baseTagClass, int baseTagNo) + { + return CheckTag(taggedObjectParser, tagClass, tagNo).ParseImplicitBaseTagged(baseTagClass, baseTagNo); + } + + /// + public static Asn1TaggedObjectParser ParseImplicitContextBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagNo, int baseTagClass, int baseTagNo) + { + return ParseImplicitBaseTagged(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo, baseTagClass, + baseTagNo); + } + + /// + public static Asn1TaggedObjectParser TryParseImplicitBaseTagged(Asn1TaggedObjectParser taggedObjectParser, + int tagClass, int tagNo, int baseTagClass, int baseTagNo) + { + if (!taggedObjectParser.HasTag(tagClass, tagNo)) + return null; + + return taggedObjectParser.ParseImplicitBaseTagged(baseTagClass, baseTagNo); + } + + /// + public static Asn1TaggedObjectParser TryParseImplicitContextBaseTagged( + Asn1TaggedObjectParser taggedObjectParser, int tagNo, int baseTagClass, int baseTagNo) + { + return TryParseImplicitBaseTagged(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo, baseTagClass, + baseTagNo); + } + + + /* + * Wrappers for Asn1TaggedObjectParser.ParseBaseUniversal + */ + + /// + public static IAsn1Convertible ParseBaseUniversal(Asn1TaggedObjectParser taggedObjectParser, int tagClass, + int tagNo, bool declaredExplicit, int baseTagNo) + { + return CheckTag(taggedObjectParser, tagClass, tagNo).ParseBaseUniversal(declaredExplicit, baseTagNo); + } + + /// + public static IAsn1Convertible ParseContextBaseUniversal(Asn1TaggedObjectParser taggedObjectParser, int tagNo, + bool declaredExplicit, int baseTagNo) + { + return ParseBaseUniversal(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo, declaredExplicit, baseTagNo); + } + + /// + public static IAsn1Convertible TryParseBaseUniversal(Asn1TaggedObjectParser taggedObjectParser, int tagClass, + int tagNo, bool declaredExplicit, int baseTagNo) + { + if (!taggedObjectParser.HasTag(tagClass, tagNo)) + return null; + + return taggedObjectParser.ParseBaseUniversal(declaredExplicit, baseTagNo); + } + + /// + public static IAsn1Convertible TryParseContextBaseUniversal(Asn1TaggedObjectParser taggedObjectParser, + int tagNo, bool declaredExplicit, int baseTagNo) + { + return TryParseBaseUniversal(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo, declaredExplicit, + baseTagNo); + } + + + /* + * Wrappers for Asn1TaggedObjectParser.ParseExplicitBaseObject + */ + + /// + public static IAsn1Convertible ParseExplicitBaseObject(Asn1TaggedObjectParser taggedObjectParser, int tagClass, + int tagNo) + { + return CheckTag(taggedObjectParser, tagClass, tagNo).ParseExplicitBaseObject(); + } + + /// + public static IAsn1Convertible ParseExplicitContextBaseObject(Asn1TaggedObjectParser taggedObjectParser, + int tagNo) + { + return ParseExplicitBaseObject(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo); + } + + /// + public static IAsn1Convertible TryParseExplicitBaseObject(Asn1TaggedObjectParser taggedObjectParser, + int tagClass, int tagNo) + { + if (!taggedObjectParser.HasTag(tagClass, tagNo)) + return null; + + return taggedObjectParser.ParseExplicitBaseObject(); + } + + /// + public static IAsn1Convertible TryParseExplicitContextBaseObject(Asn1TaggedObjectParser taggedObjectParser, + int tagNo) + { + return TryParseExplicitBaseObject(taggedObjectParser, Asn1Tags.ContextSpecific, tagNo); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs.meta new file mode 100644 index 00000000..ca8e14b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 223a5a612cd390246a8f027e1cbf61f7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/Asn1Utilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs new file mode 100644 index 00000000..ff9324bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs @@ -0,0 +1,142 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerBitString + : DerBitString + { + private const int DefaultSegmentLimit = 1000; + + internal static byte[] FlattenBitStrings(DerBitString[] bitStrings) + { + int count = bitStrings.Length; + switch (count) + { + case 0: + // No bits + return new byte[]{ 0 }; + case 1: + return bitStrings[0].contents; + default: + { + int last = count - 1, totalLength = 0; + for (int i = 0; i < last; ++i) + { + byte[] elementContents = bitStrings[i].contents; + if (elementContents[0] != 0) + throw new ArgumentException("only the last nested bitstring can have padding", "bitStrings"); + + totalLength += elementContents.Length - 1; + } + + // Last one can have padding + byte[] lastElementContents = bitStrings[last].contents; + byte padBits = lastElementContents[0]; + totalLength += lastElementContents.Length; + + byte[] contents = new byte[totalLength]; + contents[0] = padBits; + + int pos = 1; + for (int i = 0; i < count; ++i) + { + byte[] elementContents = bitStrings[i].contents; + int length = elementContents.Length - 1; + Array.Copy(elementContents, 1, contents, pos, length); + pos += length; + } + + Debug.Assert(pos == totalLength); + return contents; + } + } + } + + private readonly int segmentLimit; + private readonly DerBitString[] elements; + + public BerBitString(byte data, int padBits) + : base(data, padBits) + { + this.elements = null; + this.segmentLimit = DefaultSegmentLimit; + } + + public BerBitString(byte[] data) + : this(data, 0) + { + } + + public BerBitString(byte[] data, int padBits) + : this(data, padBits, DefaultSegmentLimit) + { + } + + public BerBitString(byte[] data, int padBits, int segmentLimit) + : base(data, padBits) + { + this.elements = null; + this.segmentLimit = segmentLimit; + } + + public BerBitString(int namedBits) + : base(namedBits) + { + this.elements = null; + this.segmentLimit = DefaultSegmentLimit; + } + + public BerBitString(Asn1Encodable obj) + : this(obj.GetDerEncoded(), 0) + { + } + + public BerBitString(DerBitString[] elements) + : this(elements, DefaultSegmentLimit) + { + } + + public BerBitString(DerBitString[] elements, int segmentLimit) + : base(FlattenBitStrings(elements), false) + { + this.elements = elements; + this.segmentLimit = segmentLimit; + } + + internal BerBitString(byte[] contents, bool check) + : base(contents, check) + { + this.elements = null; + this.segmentLimit = DefaultSegmentLimit; + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncoding(encoding); + + if (null == elements) + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.BitString, contents); + + return new ConstructedILEncoding(Asn1Tags.Universal, Asn1Tags.BitString, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + if (null == elements) + return new PrimitiveEncoding(tagClass, tagNo, contents); + + return new ConstructedILEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs.meta new file mode 100644 index 00000000..3a8c41a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4381f60712bf2ca4ea06427a034e76be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERBitString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs new file mode 100644 index 00000000..b3f02fdd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class BerGenerator + : Asn1Generator + { + private bool _tagged = false; + private bool _isExplicit; + private int _tagNo; + + protected BerGenerator( + Stream outStream) + : base(outStream) + { + } + + protected BerGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream) + { + _tagged = true; + _isExplicit = isExplicit; + _tagNo = tagNo; + } + + public override void AddObject(Asn1Encodable obj) + { + obj.EncodeTo(Out); + } + + public override void AddObject(Asn1Object obj) + { + obj.EncodeTo(Out); + } + + public override Stream GetRawOutputStream() + { + return Out; + } + + public override void Close() + { + WriteBerEnd(); + } + + private void WriteHdr( + int tag) + { + Out.WriteByte((byte) tag); + Out.WriteByte(0x80); + } + + protected void WriteBerHeader( + int tag) + { + if (_tagged) + { + int tagNum = _tagNo | Asn1Tags.ContextSpecific; + + if (_isExplicit) + { + WriteHdr(tagNum | Asn1Tags.Constructed); + WriteHdr(tag); + } + else + { + if ((tag & Asn1Tags.Constructed) != 0) + { + WriteHdr(tagNum | Asn1Tags.Constructed); + } + else + { + WriteHdr(tagNum); + } + } + } + else + { + WriteHdr(tag); + } + } + + protected void WriteBerBody( + Stream contentStream) + { + Streams.PipeAll(contentStream, Out); + } + + protected void WriteBerEnd() + { + Out.WriteByte(0x00); + Out.WriteByte(0x00); + + if (_tagged && _isExplicit) // write extra end for tag header + { + Out.WriteByte(0x00); + Out.WriteByte(0x00); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs.meta new file mode 100644 index 00000000..c2fe7089 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9e21f7c787b7354c896a05ab17862f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs new file mode 100644 index 00000000..5a8e3a02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs @@ -0,0 +1,162 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerOctetStringGenerator + : BerGenerator + { + public BerOctetStringGenerator(Stream outStream) + : base(outStream) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.OctetString); + } + + public BerOctetStringGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream, tagNo, isExplicit) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.OctetString); + } + + public Stream GetOctetOutputStream() + { + return GetOctetOutputStream(new byte[1000]); // limit for CER encoding. + } + + public Stream GetOctetOutputStream( + int bufSize) + { + return bufSize < 1 + ? GetOctetOutputStream() + : GetOctetOutputStream(new byte[bufSize]); + } + + public Stream GetOctetOutputStream( + byte[] buf) + { + return new BufferedBerOctetStream(this, buf); + } + + private class BufferedBerOctetStream + : BaseOutputStream + { + private byte[] _buf; + private int _off; + private readonly BerOctetStringGenerator _gen; + private readonly Asn1OutputStream _derOut; + + internal BufferedBerOctetStream( + BerOctetStringGenerator gen, + byte[] buf) + { + _gen = gen; + _buf = buf; + _off = 0; + _derOut = Asn1OutputStream.Create(_gen.Out, Asn1Encodable.Der); + } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Write(buffer.AsSpan(offset, count)); +#else + int bufLen = _buf.Length; + int available = bufLen - _off; + if (count < available) + { + Array.Copy(buffer, offset, _buf, _off, count); + _off += count; + return; + } + + int pos = 0; + if (_off > 0) + { + Array.Copy(buffer, offset, _buf, _off, available); + pos = available; + DerOctetString.Encode(_derOut, _buf, 0, bufLen); + //_off = 0; + } + + int remaining; + while ((remaining = count - pos) >= bufLen) + { + DerOctetString.Encode(_derOut, buffer, offset + pos, bufLen); + pos += bufLen; + } + + Array.Copy(buffer, offset + pos, _buf, 0, remaining); + this._off = remaining; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + int bufLen = _buf.Length; + int available = bufLen - _off; + if (buffer.Length < available) + { + buffer.CopyTo(_buf.AsSpan(_off)); + _off += buffer.Length; + return; + } + + if (_off > 0) + { + DerOctetString.Encode(_derOut, _buf.AsSpan(0, _off), buffer[..available]); + buffer = buffer[available..]; + //_off = 0; + } + + while (buffer.Length >= bufLen) + { + DerOctetString.Encode(_derOut, buffer[..bufLen]); + buffer = buffer[bufLen..]; + } + + buffer.CopyTo(_buf.AsSpan()); + _off = buffer.Length; + } +#endif + + public override void WriteByte(byte value) + { + _buf[_off++] = value; + + if (_off == _buf.Length) + { + DerOctetString.Encode(_derOut, _buf, 0, _off); + _off = 0; + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + if (_off != 0) + { + DerOctetString.Encode(_derOut, _buf, 0, _off); + } + + _derOut.FlushInternal(); + + _gen.WriteBerEnd(); + } + base.Dispose(disposing); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs.meta new file mode 100644 index 00000000..0aa0eb84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e73e600154c4fa5488bfcfa4d5ea8cd8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs new file mode 100644 index 00000000..73a3eb38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerOctetStringParser + : Asn1OctetStringParser + { + private readonly Asn1StreamParser _parser; + + internal BerOctetStringParser(Asn1StreamParser parser) + { + _parser = parser; + } + + public Stream GetOctetStream() + { + return new ConstructedOctetStream(_parser); + } + + public Asn1Object ToAsn1Object() + { + try + { + return Parse(_parser); + } + catch (IOException e) + { + throw new Asn1ParsingException("IOException converting stream to byte array: " + e.Message, e); + } + } + + internal static BerOctetString Parse(Asn1StreamParser sp) + { + return new BerOctetString(Streams.ReadAll(new ConstructedOctetStream(sp))); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs.meta new file mode 100644 index 00000000..83a6d70f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6737d031bdbf98b4db3df28da1cba304 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BEROctetStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs new file mode 100644 index 00000000..69fadd15 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSequenceGenerator + : BerGenerator + { + public BerSequenceGenerator( + Stream outStream) + : base(outStream) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.Sequence); + } + + public BerSequenceGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream, tagNo, isExplicit) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.Sequence); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs.meta new file mode 100644 index 00000000..4485087f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6a71387db1b1b948a093875fe1d03e8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs new file mode 100644 index 00000000..e43b944b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSequenceParser + : Asn1SequenceParser + { + private readonly Asn1StreamParser _parser; + + internal BerSequenceParser(Asn1StreamParser parser) + { + this._parser = parser; + } + + public IAsn1Convertible ReadObject() + { + return _parser.ReadObject(); + } + + public Asn1Object ToAsn1Object() + { + return Parse(_parser); + } + + internal static BerSequence Parse(Asn1StreamParser sp) + { + return new BerSequence(sp.ReadVector()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs.meta new file mode 100644 index 00000000..fdedbb47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2b17d41b04fc32d4a89fc9acbdee6374 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSequenceParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs new file mode 100644 index 00000000..b4357eb4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSetGenerator + : BerGenerator + { + public BerSetGenerator( + Stream outStream) + : base(outStream) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.Set); + } + + public BerSetGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream, tagNo, isExplicit) + { + WriteBerHeader(Asn1Tags.Constructed | Asn1Tags.Set); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs.meta new file mode 100644 index 00000000..fe586223 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f0bb6c2b266fbb42b99bbc63bd87437 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs new file mode 100644 index 00000000..572627c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSetParser + : Asn1SetParser + { + private readonly Asn1StreamParser _parser; + + internal BerSetParser(Asn1StreamParser parser) + { + this._parser = parser; + } + + public IAsn1Convertible ReadObject() + { + return _parser.ReadObject(); + } + + public Asn1Object ToAsn1Object() + { + return Parse(_parser); + } + + internal static BerSet Parse(Asn1StreamParser sp) + { + return new BerSet(sp.ReadVector()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs.meta new file mode 100644 index 00000000..7526f96f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cd5c6d29971f67847b798d77cf460c7b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERSetParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs new file mode 100644 index 00000000..b761501d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class BerTaggedObjectParser + : Asn1TaggedObjectParser + { + internal readonly int m_tagClass; + internal readonly int m_tagNo; + internal readonly Asn1StreamParser m_parser; + + internal BerTaggedObjectParser(int tagClass, int tagNo, Asn1StreamParser parser) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_parser = parser; + } + + public virtual bool IsConstructed + { + get { return true; } + } + + public int TagClass + { + get { return m_tagClass; } + } + + public int TagNo + { + get { return m_tagNo; } + } + + public bool HasContextTag(int tagNo) + { + return m_tagClass == Asn1Tags.ContextSpecific && m_tagNo == tagNo; + } + + public bool HasTag(int tagClass, int tagNo) + { + return m_tagClass == tagClass && m_tagNo == tagNo; + } + + public virtual IAsn1Convertible ParseBaseUniversal(bool declaredExplicit, int baseTagNo) + { + if (declaredExplicit) + return m_parser.ParseObject(baseTagNo); + + return m_parser.ParseImplicitConstructedIL(baseTagNo); + } + + public virtual IAsn1Convertible ParseExplicitBaseObject() + { + return m_parser.ReadObject(); + } + + public virtual Asn1TaggedObjectParser ParseExplicitBaseTagged() + { + return m_parser.ParseTaggedObject(); + } + + public virtual Asn1TaggedObjectParser ParseImplicitBaseTagged(int baseTagClass, int baseTagNo) + { + return new BerTaggedObjectParser(baseTagClass, baseTagNo, m_parser); + } + + public virtual Asn1Object ToAsn1Object() + { + try + { + return m_parser.LoadTaggedIL(TagClass, TagNo); + } + catch (IOException e) + { + throw new Asn1ParsingException(e.Message); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs.meta new file mode 100644 index 00000000..6f017995 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a686da308c11dfb47939b504fe6dd185 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BERTaggedObjectParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs.meta new file mode 100644 index 00000000..07eff1a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 200244db58e60814db5ecd517a42d8fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecific.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs new file mode 100644 index 00000000..3b1d777f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs @@ -0,0 +1,2 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs.meta new file mode 100644 index 00000000..942a23aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 268b457089193154383ac52b05919a4b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerApplicationSpecificParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs new file mode 100644 index 00000000..cfd6a808 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /// A parser for indefinite-length BIT STRINGs. + internal class BerBitStringParser + : Asn1BitStringParser + { + private readonly Asn1StreamParser m_parser; + + private ConstructedBitStream m_bitStream; + + internal BerBitStringParser(Asn1StreamParser parser) + { + m_parser = parser; + } + + public Stream GetOctetStream() + { + return m_bitStream = new ConstructedBitStream(m_parser, true); + } + + public Stream GetBitStream() + { + return m_bitStream = new ConstructedBitStream(m_parser, false); + } + + public int PadBits + { + get { return m_bitStream.PadBits; } + } + + public Asn1Object ToAsn1Object() + { + try + { + return Parse(m_parser); + } + catch (IOException e) + { + throw new Asn1ParsingException("IOException converting stream to byte array: " + e.Message, e); + } + } + + internal static BerBitString Parse(Asn1StreamParser sp) + { + ConstructedBitStream bitStream = new ConstructedBitStream(sp, false); + byte[] data = Streams.ReadAll(bitStream); + int padBits = bitStream.PadBits; + return new BerBitString(data, padBits); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs.meta new file mode 100644 index 00000000..6fc816a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a9e7aaac66278d48b27f19d3fc18ab3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerBitStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs new file mode 100644 index 00000000..dd710260 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerOctetString + : DerOctetString + { + private const int DefaultSegmentLimit = 1000; + + public static BerOctetString FromSequence(Asn1Sequence seq) + { + int count = seq.Count; + Asn1OctetString[] v = new Asn1OctetString[count]; + for (int i = 0; i < count; ++i) + { + v[i] = GetInstance(seq[i]); + } + return new BerOctetString(v); + } + + internal static byte[] FlattenOctetStrings(Asn1OctetString[] octetStrings) + { + int count = octetStrings.Length; + switch (count) + { + case 0: + return EmptyOctets; + case 1: + return octetStrings[0].contents; + default: + { + int totalOctets = 0; + for (int i = 0; i < count; ++i) + { + totalOctets += octetStrings[i].contents.Length; + } + + byte[] str = new byte[totalOctets]; + int pos = 0; + for (int i = 0; i < count; ++i) + { + byte[] octets = octetStrings[i].contents; + Array.Copy(octets, 0, str, pos, octets.Length); + pos += octets.Length; + } + + Debug.Assert(pos == totalOctets); + return str; + } + } + } + + private readonly int segmentLimit; + private readonly Asn1OctetString[] elements; + + public BerOctetString(byte[] contents) + : this(contents, DefaultSegmentLimit) + { + } + + public BerOctetString(Asn1OctetString[] elements) + : this(elements, DefaultSegmentLimit) + { + } + + public BerOctetString(byte[] contents, int segmentLimit) + : this(contents, null, segmentLimit) + { + } + + public BerOctetString(Asn1OctetString[] elements, int segmentLimit) + : this(FlattenOctetStrings(elements), elements, segmentLimit) + { + } + + private BerOctetString(byte[] contents, Asn1OctetString[] elements, int segmentLimit) + : base(contents) + { + this.elements = elements; + this.segmentLimit = segmentLimit; + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncoding(encoding); + + if (null == elements) + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.OctetString, contents); + + return new ConstructedILEncoding(Asn1Tags.Universal, Asn1Tags.OctetString, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + if (null == elements) + return new PrimitiveEncoding(tagClass, tagNo, contents); + + return new ConstructedILEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs.meta new file mode 100644 index 00000000..4756c65c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1f27e07decbed4b469250704cc20a1f6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOctetString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs.meta new file mode 100644 index 00000000..63b7e1a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e83770e78aa440c43b0ba64c3daf5a35 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs new file mode 100644 index 00000000..d220ea83 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSequence + : DerSequence + { + public static new readonly BerSequence Empty = new BerSequence(); + + public static new BerSequence FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new BerSequence(elementVector); + } + + /** + * create an empty sequence + */ + public BerSequence() + : base() + { + } + + /** + * create a sequence containing one object + */ + public BerSequence(Asn1Encodable element) + : base(element) + { + } + + /** + * create a sequence containing two objects + */ + public BerSequence(Asn1Encodable element1, Asn1Encodable element2) + : base(element1, element2) + { + } + + public BerSequence(params Asn1Encodable[] elements) + : base(elements) + { + } + + /** + * create a sequence containing a vector of objects. + */ + public BerSequence(Asn1EncodableVector elementVector) + : base(elementVector) + { + } + + internal BerSequence(Asn1Encodable[] elements, bool clone) + : base(elements, clone) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncoding(encoding); + + return new ConstructedILEncoding(Asn1Tags.Universal, Asn1Tags.Sequence, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedILEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override DerBitString ToAsn1BitString() + { + return new BerBitString(GetConstructedBitStrings()); + } + + internal override DerExternal ToAsn1External() + { + // TODO There is currently no BerExternal class (or ToDLObject/ToDerObject) + //return ((Asn1Sequence)ToDLObject()).ToAsn1External(); + return new DLSequence(elements).ToAsn1External(); + } + + internal override Asn1OctetString ToAsn1OctetString() + { + return new BerOctetString(GetConstructedOctetStrings()); + } + + internal override Asn1Set ToAsn1Set() + { + return new BerSet(false, elements); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs.meta new file mode 100644 index 00000000..d9a2f6d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f133f22b4b78d34a9f680f5cb023125 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs new file mode 100644 index 00000000..f1fc9546 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class BerSet + : DerSet + { + public static new readonly BerSet Empty = new BerSet(); + + public static new BerSet FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new BerSet(elementVector); + } + + /** + * create an empty set + */ + public BerSet() + : base() + { + } + + /** + * create a set containing one object + */ + public BerSet(Asn1Encodable element) + : base(element) + { + } + + public BerSet(params Asn1Encodable[] elements) + : base(elements, false) + { + } + + /** + * create a set containing a vector of objects. + */ + public BerSet(Asn1EncodableVector elementVector) + : base(elementVector, false) + { + } + + internal BerSet(bool isSorted, Asn1Encodable[] elements) + : base(isSorted, elements) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncoding(encoding); + + return new ConstructedILEncoding(Asn1Tags.Universal, Asn1Tags.Set, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedILEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs.meta new file mode 100644 index 00000000..d30c6400 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3cbc1af8008d12d46a0e1c5746de6176 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs new file mode 100644 index 00000000..5ddced2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * BER TaggedObject - in ASN.1 notation this is any object preceded by + * a [n] where n is some number - these are assumed to follow the construction + * rules (as with sequences). + */ + public class BerTaggedObject + : DerTaggedObject + { + /** + * @param tagNo the tag number for this object. + * @param obj the tagged object. + */ + public BerTaggedObject(int tagNo, Asn1Encodable obj) + : base(true, tagNo, obj) + { + } + + public BerTaggedObject(int tagClass, int tagNo, Asn1Encodable obj) + : base(true, tagClass, tagNo, obj) + { + } + + /** + * @param isExplicit true if an explicitly tagged object. + * @param tagNo the tag number for this object. + * @param obj the tagged object. + */ + public BerTaggedObject(bool isExplicit, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagNo, obj) + { + } + + public BerTaggedObject(bool isExplicit, int tagClass, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagClass, tagNo, obj) + { + } + + internal BerTaggedObject(int explicitness, int tagClass, int tagNo, Asn1Encodable obj) + : base(explicitness, tagClass, tagNo, obj) + { + } + + internal override string Asn1Encoding + { + get { return Ber; } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncoding(encoding); + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, TagClass, TagNo); + + return new ConstructedILEncoding(TagClass, TagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer != encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedILEncoding(tagClass, tagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override Asn1Sequence RebuildConstructed(Asn1Object asn1Object) + { + return new BerSequence(asn1Object); + } + + internal override Asn1TaggedObject ReplaceTag(int tagClass, int tagNo) + { + return new BerTaggedObject(explicitness, tagClass, tagNo, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs.meta new file mode 100644 index 00000000..8c93a946 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 04b1d2e25d7260149bb1bc3d59182839 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/BerTaggedObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs new file mode 100644 index 00000000..eb170980 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs @@ -0,0 +1,192 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class ConstructedBitStream + : BaseInputStream + { + private readonly Asn1StreamParser m_parser; + private readonly bool m_octetAligned; + + private bool m_first = true; + private int m_padBits = 0; + + private Asn1BitStringParser m_currentParser; + private Stream m_currentStream; + + internal ConstructedBitStream(Asn1StreamParser parser, bool octetAligned) + { + m_parser = parser; + m_octetAligned = octetAligned; + } + + internal int PadBits + { + get { return m_padBits; } + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Read(buffer.AsSpan(offset, count)); +#else + if (count < 1) + return 0; + + if (m_currentStream == null) + { + if (!m_first) + return 0; + + m_currentParser = GetNextParser(); + if (m_currentParser == null) + return 0; + + m_first = false; + m_currentStream = m_currentParser.GetBitStream(); + } + + int totalRead = 0; + + for (;;) + { + int numRead = m_currentStream.Read(buffer, offset + totalRead, count - totalRead); + + if (numRead > 0) + { + totalRead += numRead; + + if (totalRead == count) + return totalRead; + } + else + { + m_padBits = m_currentParser.PadBits; + m_currentParser = GetNextParser(); + if (m_currentParser == null) + { + m_currentStream = null; + return totalRead; + } + + m_currentStream = m_currentParser.GetBitStream(); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (buffer.IsEmpty) + return 0; + + if (m_currentStream == null) + { + if (!m_first) + return 0; + + m_currentParser = GetNextParser(); + if (m_currentParser == null) + return 0; + + m_first = false; + m_currentStream = m_currentParser.GetBitStream(); + } + + int totalRead = 0; + + for (;;) + { + int numRead = m_currentStream.Read(buffer[totalRead..]); + + if (numRead > 0) + { + totalRead += numRead; + + if (totalRead == buffer.Length) + return totalRead; + } + else + { + m_padBits = m_currentParser.PadBits; + m_currentParser = GetNextParser(); + if (m_currentParser == null) + { + m_currentStream = null; + return totalRead; + } + + m_currentStream = m_currentParser.GetBitStream(); + } + } + } +#endif + + public override int ReadByte() + { + if (m_currentStream == null) + { + if (!m_first) + return -1; + + m_currentParser = GetNextParser(); + if (m_currentParser == null) + return -1; + + m_first = false; + m_currentStream = m_currentParser.GetBitStream(); + } + + for (;;) + { + int b = m_currentStream.ReadByte(); + + if (b >= 0) + return b; + + m_padBits = m_currentParser.PadBits; + m_currentParser = GetNextParser(); + if (m_currentParser == null) + { + m_currentStream = null; + return -1; + } + + m_currentStream = m_currentParser.GetBitStream(); + } + } + + private Asn1BitStringParser GetNextParser() + { + IAsn1Convertible asn1Obj = m_parser.ReadObject(); + if (asn1Obj == null) + { + if (m_octetAligned && m_padBits != 0) + throw new IOException("expected octet-aligned bitstring, but found padBits: " + m_padBits); + + return null; + } + + if (asn1Obj is Asn1BitStringParser) + { + if (m_padBits != 0) + throw new IOException("only the last nested bitstring can have padding"); + + return (Asn1BitStringParser)asn1Obj; + } + + throw new IOException("unknown object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(asn1Obj)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs.meta new file mode 100644 index 00000000..3d2eec5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4df5e9cc473b1fb4fbbaf4d414676a85 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedBitStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs new file mode 100644 index 00000000..0abbc2f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class ConstructedDLEncoding + : IAsn1Encoding + { + private readonly int m_tagClass; + private readonly int m_tagNo; + private readonly IAsn1Encoding[] m_contentsElements; + private readonly int m_contentsLength; + + internal ConstructedDLEncoding(int tagClass, int tagNo, IAsn1Encoding[] contentsElements) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_contentsElements = contentsElements; + m_contentsLength = Asn1OutputStream.GetLengthOfContents(contentsElements); + } + + void IAsn1Encoding.Encode(Asn1OutputStream asn1Out) + { + asn1Out.WriteIdentifier(Asn1Tags.Constructed | m_tagClass, m_tagNo); + asn1Out.WriteDL(m_contentsLength); + asn1Out.EncodeContents(m_contentsElements); + } + + int IAsn1Encoding.GetLength() + { + return Asn1OutputStream.GetLengthOfIdentifier(m_tagNo) + + Asn1OutputStream.GetLengthOfDL(m_contentsLength) + + m_contentsLength; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs.meta new file mode 100644 index 00000000..5643fbf4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed1df0acabdf49e43b42cc028f4e86de +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedDLEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs new file mode 100644 index 00000000..12fdc55a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class ConstructedILEncoding + : IAsn1Encoding + { + private readonly int m_tagClass; + private readonly int m_tagNo; + private readonly IAsn1Encoding[] m_contentsElements; + + internal ConstructedILEncoding(int tagClass, int tagNo, IAsn1Encoding[] contentsElements) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_contentsElements = contentsElements; + } + + void IAsn1Encoding.Encode(Asn1OutputStream asn1Out) + { + asn1Out.WriteIdentifier(Asn1Tags.Constructed | m_tagClass, m_tagNo); + asn1Out.WriteByte(0x80); + asn1Out.EncodeContents(m_contentsElements); + asn1Out.WriteByte(0x00); + asn1Out.WriteByte(0x00); + } + + int IAsn1Encoding.GetLength() + { + return Asn1OutputStream.GetLengthOfIdentifier(m_tagNo) + + 3 + + Asn1OutputStream.GetLengthOfContents(m_contentsElements); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs.meta new file mode 100644 index 00000000..6a35c076 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a7bdce731feef0945aebd0ddc41e7aa0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedILEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs new file mode 100644 index 00000000..2df54782 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class ConstructedLazyDLEncoding + : IAsn1Encoding + { + private readonly int m_tagClass; + private readonly int m_tagNo; + private readonly byte[] m_contentsOctets; + + internal ConstructedLazyDLEncoding(int tagClass, int tagNo, byte[] contentsOctets) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_contentsOctets = contentsOctets; + } + + void IAsn1Encoding.Encode(Asn1OutputStream asn1Out) + { + asn1Out.WriteIdentifier(Asn1Tags.Constructed | m_tagClass, m_tagNo); + asn1Out.WriteDL(m_contentsOctets.Length); + asn1Out.Write(m_contentsOctets, 0, m_contentsOctets.Length); + } + + int IAsn1Encoding.GetLength() + { + return Asn1OutputStream.GetLengthOfIdentifier(m_tagNo) + + Asn1OutputStream.GetLengthOfDL(m_contentsOctets.Length) + + m_contentsOctets.Length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs.meta new file mode 100644 index 00000000..d14eaada --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e14f4a01de2f81845acdb071cf305c38 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedLazyDLEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs new file mode 100644 index 00000000..aa06c121 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs @@ -0,0 +1,169 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class ConstructedOctetStream + : BaseInputStream + { + private readonly Asn1StreamParser m_parser; + + private bool m_first = true; + private Stream m_currentStream; + + internal ConstructedOctetStream(Asn1StreamParser parser) + { + m_parser = parser; + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Read(buffer.AsSpan(offset, count)); +#else + if (count < 1) + return 0; + + if (m_currentStream == null) + { + if (!m_first) + return 0; + + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + return 0; + + m_first = false; + m_currentStream = next.GetOctetStream(); + } + + int totalRead = 0; + + for (;;) + { + int numRead = m_currentStream.Read(buffer, offset + totalRead, count - totalRead); + + if (numRead > 0) + { + totalRead += numRead; + + if (totalRead == count) + return totalRead; + } + else + { + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + { + m_currentStream = null; + return totalRead; + } + + m_currentStream = next.GetOctetStream(); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (buffer.IsEmpty) + return 0; + + if (m_currentStream == null) + { + if (!m_first) + return 0; + + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + return 0; + + m_first = false; + m_currentStream = next.GetOctetStream(); + } + + int totalRead = 0; + + for (;;) + { + int numRead = m_currentStream.Read(buffer[totalRead..]); + + if (numRead > 0) + { + totalRead += numRead; + + if (totalRead == buffer.Length) + return totalRead; + } + else + { + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + { + m_currentStream = null; + return totalRead; + } + + m_currentStream = next.GetOctetStream(); + } + } + } +#endif + + public override int ReadByte() + { + if (m_currentStream == null) + { + if (!m_first) + return -1; + + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + return -1; + + m_first = false; + m_currentStream = next.GetOctetStream(); + } + + for (;;) + { + int b = m_currentStream.ReadByte(); + + if (b >= 0) + return b; + + Asn1OctetStringParser next = GetNextParser(); + if (next == null) + { + m_currentStream = null; + return -1; + } + + m_currentStream = next.GetOctetStream(); + } + } + + private Asn1OctetStringParser GetNextParser() + { + IAsn1Convertible asn1Obj = m_parser.ReadObject(); + if (asn1Obj == null) + return null; + + if (asn1Obj is Asn1OctetStringParser) + return (Asn1OctetStringParser)asn1Obj; + + throw new IOException("unknown object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(asn1Obj)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs.meta new file mode 100644 index 00000000..ffe3e885 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b6ad31b621c691449423ae0beea4950 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ConstructedOctetStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs new file mode 100644 index 00000000..63e10453 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Class representing the DER-type External + */ + public class DerExternal + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerExternal), Asn1Tags.External) {} + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return sequence.ToAsn1External(); + } + } + + public static DerExternal GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerExternal derExternal) + return derExternal; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerExternal converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerExternal)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct external from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static DerExternal GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerExternal)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly DerObjectIdentifier directReference; + private readonly DerInteger indirectReference; + private readonly Asn1ObjectDescriptor dataValueDescriptor; + private readonly int encoding; + private readonly Asn1Object externalContent; + + public DerExternal(Asn1EncodableVector vector) + : this(new DerSequence(vector)) + { + } + + public DerExternal(Asn1Sequence sequence) + { + int offset = 0; + + Asn1Object asn1 = GetObjFromSequence(sequence, offset); + if (asn1 is DerObjectIdentifier) + { + directReference = (DerObjectIdentifier)asn1; + asn1 = GetObjFromSequence(sequence, ++offset); + } + if (asn1 is DerInteger) + { + indirectReference = (DerInteger)asn1; + asn1 = GetObjFromSequence(sequence, ++offset); + } + if (!(asn1 is Asn1TaggedObject)) + { + dataValueDescriptor = (Asn1ObjectDescriptor)asn1; + asn1 = GetObjFromSequence(sequence, ++offset); + } + + if (sequence.Count != offset + 1) + throw new ArgumentException("input sequence too large", "sequence"); + + if (!(asn1 is Asn1TaggedObject)) + throw new ArgumentException( + "No tagged object found in sequence. Structure doesn't seem to be of type External", "sequence"); + + Asn1TaggedObject obj = (Asn1TaggedObject)asn1; + this.encoding = CheckEncoding(obj.TagNo); + this.externalContent = GetExternalContent(obj); + } + + /** + * Creates a new instance of DerExternal + * See X.690 for more informations about the meaning of these parameters + * @param directReference The direct reference or null if not set. + * @param indirectReference The indirect reference or null if not set. + * @param dataValueDescriptor The data value descriptor or null if not set. + * @param externalData The external data in its encoded form. + */ + public DerExternal(DerObjectIdentifier directReference, DerInteger indirectReference, + Asn1ObjectDescriptor dataValueDescriptor, DerTaggedObject externalData) + { + this.directReference = directReference; + this.indirectReference = indirectReference; + this.dataValueDescriptor = dataValueDescriptor; + this.encoding = CheckEncoding(externalData.TagNo); + this.externalContent = GetExternalContent(externalData); + } + + /** + * Creates a new instance of DerExternal. + * See X.690 for more informations about the meaning of these parameters + * @param directReference The direct reference or null if not set. + * @param indirectReference The indirect reference or null if not set. + * @param dataValueDescriptor The data value descriptor or null if not set. + * @param encoding The encoding to be used for the external data + * @param externalData The external data + */ + public DerExternal(DerObjectIdentifier directReference, DerInteger indirectReference, + Asn1ObjectDescriptor dataValueDescriptor, int encoding, Asn1Object externalData) + { + this.directReference = directReference; + this.indirectReference = indirectReference; + this.dataValueDescriptor = dataValueDescriptor; + this.encoding = CheckEncoding(encoding); + this.externalContent = CheckExternalContent(encoding, externalData); + } + + internal Asn1Sequence BuildSequence() + { + Asn1EncodableVector v = new Asn1EncodableVector(4); + v.AddOptional(directReference, indirectReference, dataValueDescriptor); + v.Add(new DerTaggedObject(0 == encoding, encoding, externalContent)); + return new DerSequence(v); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return BuildSequence().GetEncodingImplicit(encoding, Asn1Tags.Universal, Asn1Tags.External); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return BuildSequence().GetEncodingImplicit(encoding, tagClass, tagNo); + } + + protected override int Asn1GetHashCode() + { + return Objects.GetHashCode(this.directReference) + ^ Objects.GetHashCode(this.indirectReference) + ^ Objects.GetHashCode(this.dataValueDescriptor) + ^ this.encoding + ^ this.externalContent.GetHashCode(); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerExternal that = asn1Object as DerExternal; + return null != that + && Equals(this.directReference, that.directReference) + && Equals(this.indirectReference, that.indirectReference) + && Equals(this.dataValueDescriptor, that.dataValueDescriptor) + && this.encoding == that.encoding + && this.externalContent.Equals(that.externalContent); + } + + public Asn1ObjectDescriptor DataValueDescriptor + { + get { return dataValueDescriptor; } + } + + public DerObjectIdentifier DirectReference + { + get { return directReference; } + } + + /** + * The encoding of the content. Valid values are + *
    + *
  • 0 single-ASN1-type
  • + *
  • 1 OCTET STRING
  • + *
  • 2 BIT STRING
  • + *
+ */ + public int Encoding + { + get { return encoding; } + } + + public Asn1Object ExternalContent + { + get { return externalContent; } + } + + public DerInteger IndirectReference + { + get { return indirectReference; } + } + + private static Asn1ObjectDescriptor CheckDataValueDescriptor(Asn1Object dataValueDescriptor) + { + if (dataValueDescriptor is Asn1ObjectDescriptor) + return (Asn1ObjectDescriptor)dataValueDescriptor; + if (dataValueDescriptor is DerGraphicString) + return new Asn1ObjectDescriptor((DerGraphicString)dataValueDescriptor); + + throw new ArgumentException("incompatible type for data-value-descriptor", "dataValueDescriptor"); + } + + private static int CheckEncoding(int encoding) + { + if (encoding < 0 || encoding > 2) + throw new InvalidOperationException("invalid encoding value: " + encoding); + + return encoding; + } + + private static Asn1Object CheckExternalContent(int tagNo, Asn1Object externalContent) + { + switch (tagNo) + { + case 1: + return Asn1OctetString.Meta.Instance.CheckedCast(externalContent); + case 2: + return DerBitString.Meta.Instance.CheckedCast(externalContent); + default: + return externalContent; + } + } + + private static Asn1Object GetExternalContent(Asn1TaggedObject encoding) + { + int tagClass = encoding.TagClass, tagNo = encoding.TagNo; + if (Asn1Tags.ContextSpecific != tagClass) + throw new ArgumentException("invalid tag: " + Asn1Utilities.GetTagText(tagClass, tagNo), "encoding"); + + switch (tagNo) + { + case 0: + return encoding.GetExplicitBaseObject().ToAsn1Object(); + case 1: + return Asn1OctetString.GetInstance(encoding, false); + case 2: + return DerBitString.GetInstance(encoding, false); + default: + throw new ArgumentException("invalid tag: " + Asn1Utilities.GetTagText(tagClass, tagNo), "encoding"); + } + } + + private static Asn1Object GetObjFromSequence(Asn1Sequence sequence, int index) + { + if (sequence.Count <= index) + throw new ArgumentException("too few objects in input sequence", "sequence"); + + return sequence[index].ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs.meta new file mode 100644 index 00000000..55642cf1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7de6b1643459902439cc419ed2c23a5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternal.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs new file mode 100644 index 00000000..0a0b11a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerExternalParser + : Asn1Encodable + { + private readonly Asn1StreamParser m_parser; + + internal DerExternalParser(Asn1StreamParser parser) + { + m_parser = parser; + } + + public IAsn1Convertible ReadObject() + { + return m_parser.ReadObject(); + } + + public override Asn1Object ToAsn1Object() + { + return Parse(m_parser); + } + + internal static DerExternal Parse(Asn1StreamParser sp) + { + return new DerExternal(sp.ReadVector()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs.meta new file mode 100644 index 00000000..4822a5fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 76d5229ffcd5a6d4aa7a0503ec69839c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERExternalParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs new file mode 100644 index 00000000..ea4a34d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class DerGenerator + : Asn1Generator + { + private bool _tagged = false; + private bool _isExplicit; + private int _tagNo; + + protected DerGenerator( + Stream outStream) + : base(outStream) + { + } + + protected DerGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream) + { + _tagged = true; + _isExplicit = isExplicit; + _tagNo = tagNo; + } + + private static void WriteLength( + Stream outStr, + int length) + { + if (length > 127) + { + int size = 1; + int val = length; + + while ((val >>= 8) != 0) + { + size++; + } + + outStr.WriteByte((byte)(size | 0x80)); + + for (int i = (size - 1) * 8; i >= 0; i -= 8) + { + outStr.WriteByte((byte)(length >> i)); + } + } + else + { + outStr.WriteByte((byte)length); + } + } + + internal static void WriteDerEncoded( + Stream outStream, + int tag, + byte[] bytes) + { + outStream.WriteByte((byte) tag); + WriteLength(outStream, bytes.Length); + outStream.Write(bytes, 0, bytes.Length); + } + + internal void WriteDerEncoded( + int tag, + byte[] bytes) + { + if (_tagged) + { + int tagNum = _tagNo | Asn1Tags.ContextSpecific; + + if (_isExplicit) + { + int newTag = _tagNo | Asn1Tags.Constructed | Asn1Tags.ContextSpecific; + MemoryStream bOut = new MemoryStream(); + WriteDerEncoded(bOut, tag, bytes); + WriteDerEncoded(Out, newTag, bOut.ToArray()); + } + else + { + if ((tag & Asn1Tags.Constructed) != 0) + { + tagNum |= Asn1Tags.Constructed; + } + + WriteDerEncoded(Out, tagNum, bytes); + } + } + else + { + WriteDerEncoded(Out, tag, bytes); + } + } + + internal static void WriteDerEncoded( + Stream outStr, + int tag, + Stream inStr) + { + WriteDerEncoded(outStr, tag, Streams.ReadAll(inStr)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs.meta new file mode 100644 index 00000000..4ee3dc16 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7bab1741429e308439076f0d9a4f0169 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs new file mode 100644 index 00000000..9ddffc1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerOctetStringParser + : Asn1OctetStringParser + { + private readonly DefiniteLengthInputStream stream; + + internal DerOctetStringParser( + DefiniteLengthInputStream stream) + { + this.stream = stream; + } + + public Stream GetOctetStream() + { + return stream; + } + + public Asn1Object ToAsn1Object() + { + try + { + return new DerOctetString(stream.ToArray()); + } + catch (IOException e) + { + throw new InvalidOperationException("IOException converting stream to byte array: " + e.Message, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs.meta new file mode 100644 index 00000000..192b86d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 055d489d9e7b2744bb099acf15ba6b8a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DEROctetStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs new file mode 100644 index 00000000..0f40bab3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerSequenceGenerator + : DerGenerator + { + private readonly MemoryStream _bOut = new MemoryStream(); + + public DerSequenceGenerator( + Stream outStream) + : base(outStream) + { + } + + public DerSequenceGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream, tagNo, isExplicit) + { + } + + public override void AddObject(Asn1Encodable obj) + { + obj.EncodeTo(_bOut, Asn1Encodable.Der); + } + + public override void AddObject(Asn1Object obj) + { + obj.EncodeTo(_bOut, Asn1Encodable.Der); + } + + public override Stream GetRawOutputStream() + { + return _bOut; + } + + public override void Close() + { + WriteDerEncoded(Asn1Tags.Constructed | Asn1Tags.Sequence, _bOut.ToArray()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs.meta new file mode 100644 index 00000000..446d5e30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a8636daaeaa4ce64d93c0319e865d18b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs new file mode 100644 index 00000000..abedf0c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + // TODO[asn1] Should be renamed/replaced with DLSequenceParser + public class DerSequenceParser + : Asn1SequenceParser + { + private readonly Asn1StreamParser m_parser; + + internal DerSequenceParser(Asn1StreamParser parser) + { + this.m_parser = parser; + } + + public IAsn1Convertible ReadObject() + { + return m_parser.ReadObject(); + } + + public Asn1Object ToAsn1Object() + { + return DLSequence.FromVector(m_parser.ReadVector()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs.meta new file mode 100644 index 00000000..51ec66ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e70d55d6d960ae43942e648ae0c950c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSequenceParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs new file mode 100644 index 00000000..3f46e4cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerSetGenerator + : DerGenerator + { + private readonly MemoryStream _bOut = new MemoryStream(); + + public DerSetGenerator( + Stream outStream) + : base(outStream) + { + } + + public DerSetGenerator( + Stream outStream, + int tagNo, + bool isExplicit) + : base(outStream, tagNo, isExplicit) + { + } + + public override void AddObject(Asn1Encodable obj) + { + obj.EncodeTo(_bOut, Asn1Encodable.Der); + } + + public override void AddObject(Asn1Object obj) + { + obj.EncodeTo(_bOut, Asn1Encodable.Der); + } + + public override Stream GetRawOutputStream() + { + return _bOut; + } + + public override void Close() + { + WriteDerEncoded(Asn1Tags.Constructed | Asn1Tags.Set, _bOut.ToArray()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs.meta new file mode 100644 index 00000000..84e39c09 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 723e20a2a5ffa9a45848aa5b6555e2cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs new file mode 100644 index 00000000..9e3d92c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + // TODO[asn1] Should be renamed/replaced with DLSetParser + public class DerSetParser + : Asn1SetParser + { + private readonly Asn1StreamParser m_parser; + + internal DerSetParser(Asn1StreamParser parser) + { + this.m_parser = parser; + } + + public IAsn1Convertible ReadObject() + { + return m_parser.ReadObject(); + } + + public Asn1Object ToAsn1Object() + { + return DLSet.FromVector(m_parser.ReadVector()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs.meta new file mode 100644 index 00000000..15e0f413 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ddfaf818a55b89b4eac2feeaa19932a6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DERSetParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs new file mode 100644 index 00000000..d4b73443 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /// A Definite length BIT STRING + public class DLBitString + : DerBitString + { + public DLBitString(byte data, int padBits) + : base(data, padBits) + { + } + + public DLBitString(byte[] data) + : this(data, 0) + { + } + + public DLBitString(byte[] data, int padBits) + : base(data, padBits) + { + } + + public DLBitString(int namedBits) + : base(namedBits) + { + } + + public DLBitString(Asn1Encodable obj) + : this(obj.GetDerEncoded(), 0) + { + } + + internal DLBitString(byte[] contents, bool check) + : base(contents, check) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncoding(encoding); + + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.BitString, contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new PrimitiveEncoding(tagClass, tagNo, contents); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs.meta new file mode 100644 index 00000000..bf11c088 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d43c59de09d754f41974414f74d28683 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs new file mode 100644 index 00000000..2523e745 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /// Parser for a DL encoded BIT STRING. + internal class DLBitStringParser + : Asn1BitStringParser + { + private readonly DefiniteLengthInputStream m_stream; + private int m_padBits = 0; + + internal DLBitStringParser(DefiniteLengthInputStream stream) + { + m_stream = stream; + } + + public Stream GetBitStream() + { + return GetBitStream(false); + } + + public Stream GetOctetStream() + { + return GetBitStream(true); + } + + public int PadBits + { + get { return m_padBits; } + } + + public Asn1Object ToAsn1Object() + { + try + { + return DerBitString.CreatePrimitive(m_stream.ToArray()); + } + catch (IOException e) + { + throw new Asn1ParsingException("IOException converting stream to byte array: " + e.Message, e); + } + } + + private Stream GetBitStream(bool octetAligned) + { + int length = m_stream.Remaining; + if (length < 1) + throw new InvalidOperationException("content octets cannot be empty"); + + m_padBits = m_stream.ReadByte(); + if (m_padBits > 0) + { + if (length < 2) + throw new InvalidOperationException("zero length data with non-zero pad bits"); + if (m_padBits > 7) + throw new InvalidOperationException("pad bits cannot be greater than 7 or less than 0"); + if (octetAligned) + throw new IOException("expected octet-aligned bitstring, but found padBits: " + m_padBits); + } + + return m_stream; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs.meta new file mode 100644 index 00000000..6ea0b1fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b3508871b97d4024189aff5c89274477 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLBitStringParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs new file mode 100644 index 00000000..9cfe890f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class DLSequence + : DerSequence + { + internal static new readonly DLSequence Empty = new DLSequence(); + + internal static new DLSequence FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new DLSequence(elementVector); + } + + /** + * create an empty sequence + */ + internal DLSequence() + : base() + { + } + + /** + * create a sequence containing one object + */ + internal DLSequence(Asn1Encodable element) + : base(element) + { + } + + /** + * create a sequence containing two objects + */ + public DLSequence(Asn1Encodable element1, Asn1Encodable element2) + : base(element1, element2) + { + } + + internal DLSequence(params Asn1Encodable[] elements) + : base(elements) + { + } + + /** + * create a sequence containing a vector of objects. + */ + internal DLSequence(Asn1EncodableVector elementVector) + : base(elementVector) + { + } + + internal DLSequence(Asn1Encodable[] elements, bool clone) + : base(elements, clone) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncoding(encoding); + + return new ConstructedDLEncoding(Asn1Tags.Universal, Asn1Tags.Sequence, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedDLEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override DerBitString ToAsn1BitString() + { + return new DLBitString(BerBitString.FlattenBitStrings(GetConstructedBitStrings()), false); + } + + // TODO[asn1] DLExternal + //internal override DerExternal ToAsn1External() + //{ + // return new DLExternal(this); + //} + + internal override Asn1Set ToAsn1Set() + { + return new DLSet(false, elements); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs.meta new file mode 100644 index 00000000..03fc9fb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aee60a4e5f1092c4dba31d041a11410a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs new file mode 100644 index 00000000..fbca39a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class DLSet + : DerSet + { + internal static new readonly DLSet Empty = new DLSet(); + + internal static new DLSet FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new DLSet(elementVector); + } + + /** + * create an empty set + */ + internal DLSet() + : base() + { + } + + /** + * create a set containing one object + */ + internal DLSet(Asn1Encodable element) + : base(element) + { + } + + internal DLSet(params Asn1Encodable[] elements) + : base(elements, false) + { + } + + /** + * create a set containing a vector of objects. + */ + internal DLSet(Asn1EncodableVector elementVector) + : base(elementVector, false) + { + } + + internal DLSet(bool isSorted, Asn1Encodable[] elements) + : base(isSorted, elements) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncoding(encoding); + + return new ConstructedDLEncoding(Asn1Tags.Universal, Asn1Tags.Set, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedDLEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(encoding, elements)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs.meta new file mode 100644 index 00000000..46ef061c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 97a0f52e9e1410946a128fba4cd0b9aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs new file mode 100644 index 00000000..f563e4d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class DLTaggedObject + : DerTaggedObject + { + internal DLTaggedObject(int tagNo, Asn1Encodable obj) + : base(tagNo, obj) + { + } + + internal DLTaggedObject(int tagClass, int tagNo, Asn1Encodable obj) + : base(tagClass, tagNo, obj) + { + } + + internal DLTaggedObject(bool isExplicit, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagNo, obj) + { + } + + internal DLTaggedObject(bool isExplicit, int tagClass, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagClass, tagNo, obj) + { + } + + internal DLTaggedObject(int explicitness, int tagClass, int tagNo, Asn1Encodable obj) + : base(explicitness, tagClass, tagNo, obj) + { + } + + internal override string Asn1Encoding + { + // TODO[asn1] Use DL encoding when supported + get { return Ber; } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncoding(encoding); + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, TagClass, TagNo); + + return new ConstructedDLEncoding(TagClass, TagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingDer == encoding) + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedDLEncoding(tagClass, tagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override Asn1Sequence RebuildConstructed(Asn1Object asn1Object) + { + return new DLSequence(asn1Object); + } + + internal override Asn1TaggedObject ReplaceTag(int tagClass, int tagNo) + { + return new DLTaggedObject(explicitness, tagClass, tagNo, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs.meta new file mode 100644 index 00000000..36140b33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6339bcf433150e742a5fc43ebbe249fe +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs new file mode 100644 index 00000000..a8681555 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Parser for definite-length tagged objects. + */ + internal class DLTaggedObjectParser + : BerTaggedObjectParser + { + private readonly bool m_constructed; + + internal DLTaggedObjectParser(int tagClass, int tagNo, bool constructed, Asn1StreamParser parser) + : base(tagClass, tagNo, parser) + { + m_constructed = constructed; + } + + public override bool IsConstructed + { + get { return m_constructed; } + } + + public override IAsn1Convertible ParseBaseUniversal(bool declaredExplicit, int baseTagNo) + { + if (declaredExplicit) + { + if (!m_constructed) + throw new IOException("Explicit tags must be constructed (see X.690 8.14.2)"); + + return m_parser.ParseObject(baseTagNo); + } + + return m_constructed + ? m_parser.ParseImplicitConstructedDL(baseTagNo) + : m_parser.ParseImplicitPrimitive(baseTagNo); + } + + public override IAsn1Convertible ParseExplicitBaseObject() + { + if (!m_constructed) + throw new IOException("Explicit tags must be constructed (see X.690 8.14.2)"); + + return m_parser.ReadObject(); + } + + public override Asn1TaggedObjectParser ParseExplicitBaseTagged() + { + if (!m_constructed) + throw new IOException("Explicit tags must be constructed (see X.690 8.14.2)"); + + return m_parser.ParseTaggedObject(); + } + + public override Asn1TaggedObjectParser ParseImplicitBaseTagged(int baseTagClass, int baseTagNo) + { + return new DLTaggedObjectParser(baseTagClass, baseTagNo, m_constructed, m_parser); + } + + public override Asn1Object ToAsn1Object() + { + try + { + return m_parser.LoadTaggedDL(TagClass, TagNo, m_constructed); + } + catch (IOException e) + { + throw new Asn1ParsingException(e.Message); + } + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs.meta new file mode 100644 index 00000000..cfd37679 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b129bd8a066d10243a74987fcd9214e8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DLTaggedObjectParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs new file mode 100644 index 00000000..06aeccb9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs @@ -0,0 +1,142 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + class DefiniteLengthInputStream + : LimitedInputStream + { + private static readonly byte[] EmptyBytes = new byte[0]; + + private readonly int _originalLength; + private int _remaining; + + internal DefiniteLengthInputStream(Stream inStream, int length, int limit) + : base(inStream, limit) + { + if (length <= 0) + { + if (length < 0) + throw new ArgumentException("negative lengths not allowed", "length"); + + SetParentEofDetect(); + } + + this._originalLength = length; + this._remaining = length; + } + + internal int Remaining + { + get { return _remaining; } + } + + public override int ReadByte() + { + if (_remaining < 2) + { + if (_remaining == 0) + return -1; + + int b = _in.ReadByte(); + if (b < 0) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + + _remaining = 0; + SetParentEofDetect(); + + return b; + } + else + { + int b = _in.ReadByte(); + if (b < 0) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + + --_remaining; + return b; + } + } + + public override int Read(byte[] buf, int off, int len) + { + if (_remaining == 0) + return 0; + + int toRead = System.Math.Min(len, _remaining); + int numRead = _in.Read(buf, off, toRead); + + if (numRead < 1) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + + if ((_remaining -= numRead) == 0) + { + SetParentEofDetect(); + } + + return numRead; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (_remaining == 0) + return 0; + + int toRead = System.Math.Min(buffer.Length, _remaining); + int numRead = _in.Read(buffer[..toRead]); + + if (numRead < 1) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + + if ((_remaining -= numRead) == 0) + { + SetParentEofDetect(); + } + + return numRead; + } +#endif + + internal void ReadAllIntoByteArray(byte[] buf) + { + if (_remaining != buf.Length) + throw new ArgumentException("buffer length not right for data"); + + if (_remaining == 0) + return; + + // make sure it's safe to do this! + int limit = Limit; + if (_remaining >= limit) + throw new IOException("corrupted stream - out of bounds length found: " + _remaining + " >= " + limit); + + if ((_remaining -= Streams.ReadFully(_in, buf, 0, buf.Length)) != 0) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + SetParentEofDetect(); + } + + internal byte[] ToArray() + { + if (_remaining == 0) + return EmptyBytes; + + // make sure it's safe to do this! + int limit = Limit; + if (_remaining >= limit) + throw new IOException("corrupted stream - out of bounds length found: " + _remaining + " >= " + limit); + + byte[] bytes = new byte[_remaining]; + if ((_remaining -= Streams.ReadFully(_in, bytes, 0, bytes.Length)) != 0) + throw new EndOfStreamException("DEF length " + _originalLength + " object truncated by " + _remaining); + SetParentEofDetect(); + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs.meta new file mode 100644 index 00000000..f1eebd95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5a06b938d8d7bef4a9969af62aa3b989 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DefiniteLengthInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs.meta new file mode 100644 index 00000000..d11f791c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ae4fdc6ab80d7324c9fc8f7674ab0f4b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerApplicationSpecific.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs new file mode 100644 index 00000000..2f0d6538 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs @@ -0,0 +1,170 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Der BMPString object. + */ + public class DerBmpString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerBmpString), Asn1Tags.BmpString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a BMP string from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static DerBmpString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerBmpString derBmpString) + return derBmpString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerBmpString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerBmpString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct BMP string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a BMP string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerBmpString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerBmpString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly string m_str; + + internal DerBmpString(byte[] contents) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + int byteLen = contents.Length; + if (0 != (byteLen & 1)) + throw new ArgumentException("malformed BMPString encoding encountered", "contents"); + + int charLen = byteLen / 2; + char[] cs = new char[charLen]; + + for (int i = 0; i != charLen; i++) + { + cs[i] = (char)((contents[2 * i] << 8) | (contents[2 * i + 1] & 0xff)); + } + + m_str = new string(cs); + } + + internal DerBmpString(char[] str) + { + if (str == null) + throw new ArgumentNullException("str"); + + m_str = new string(str); + } + + /** + * basic constructor + */ + public DerBmpString(string str) + { + if (str == null) + throw new ArgumentNullException("str"); + + m_str = str; + } + + public override string GetString() + { + return m_str; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerBmpString that = asn1Object as DerBmpString; + return null != that + && this.m_str.Equals(that.m_str); + } + + protected override int Asn1GetHashCode() + { + return m_str.GetHashCode(); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.BmpString, GetContents()); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents()); + } + + private byte[] GetContents() + { + char[] c = m_str.ToCharArray(); + byte[] b = new byte[c.Length * 2]; + + for (int i = 0; i != c.Length; i++) + { + b[2 * i] = (byte)(c[i] >> 8); + b[2 * i + 1] = (byte)c[i]; + } + + return b; + } + + internal static DerBmpString CreatePrimitive(byte[] contents) + { + return new DerBmpString(contents); + } + + internal static DerBmpString CreatePrimitive(char[] str) + { + // TODO[asn1] Asn1InputStream has a validator/converter that should be unified in this class somehow + return new DerBmpString(str); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs.meta new file mode 100644 index 00000000..6030da2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1cfd94322d7199449fe2fe04f974ce9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBMPString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs new file mode 100644 index 00000000..fb199692 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs @@ -0,0 +1,373 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerBitString + : DerStringBase, Asn1BitStringParser + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerBitString), Asn1Tags.BitString) { } + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + + internal override Asn1Object FromImplicitConstructed(Asn1Sequence sequence) + { + return sequence.ToAsn1BitString(); + } + } + + private static readonly char[] table + = { '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F' }; + + /** + * return a Bit string from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerBitString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerBitString derBitString) + return derBitString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerBitString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return GetInstance(FromByteArray(bytes)); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct BIT STRING from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a Bit string from a tagged object. + * + * @param obj the tagged object holding the object we want + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the tagged object cannot + * be converted. + */ + public static DerBitString GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + Asn1Object o = obj.GetObject(); + + if (isExplicit || o is DerBitString) + { + return GetInstance(o); + } + + // Not copied because assumed to be a tagged implicit primitive from the parser + return CreatePrimitive(((Asn1OctetString)o).GetOctets()); + } + + internal readonly byte[] contents; + + public DerBitString(byte data, int padBits) + { + if (padBits > 7 || padBits < 0) + throw new ArgumentException("pad bits cannot be greater than 7 or less than 0", "padBits"); + + this.contents = new byte[] { (byte)padBits, data }; + } + + public DerBitString(byte[] data) + : this(data, 0) + { + } + + /** + * @param data the octets making up the bit string. + * @param padBits the number of extra bits at the end of the string. + */ + public DerBitString(byte[] data, int padBits) + { + if (data == null) + throw new ArgumentNullException("data"); + if (padBits < 0 || padBits > 7) + throw new ArgumentException("must be in the range 0 to 7", "padBits"); + if (data.Length == 0 && padBits != 0) + throw new ArgumentException("if 'data' is empty, 'padBits' must be 0"); + + this.contents = Arrays.Prepend(data, (byte)padBits); + } + + public DerBitString(int namedBits) + { + if (namedBits == 0) + { + this.contents = new byte[]{ 0 }; + return; + } + + int bits = 32 - Integers.NumberOfLeadingZeros(namedBits); + int bytes = (bits + 7) / 8; + Debug.Assert(0 < bytes && bytes <= 4); + + byte[] data = new byte[1 + bytes]; + + for (int i = 1; i < bytes; i++) + { + data[i] = (byte)namedBits; + namedBits >>= 8; + } + + Debug.Assert((namedBits & 0xFF) != 0); + data[bytes] = (byte)namedBits; + + int padBits = 0; + while ((namedBits & (1 << padBits)) == 0) + { + ++padBits; + } + + Debug.Assert(padBits < 8); + data[0] = (byte)padBits; + + this.contents = data; + } + + public DerBitString(Asn1Encodable obj) + : this(obj.GetDerEncoded()) + { + } + + internal DerBitString(byte[] contents, bool check) + { + if (check) + { + if (null == contents) + throw new ArgumentNullException("contents"); + if (contents.Length < 1) + throw new ArgumentException("cannot be empty", "contents"); + + int padBits = contents[0]; + if (padBits > 0) + { + if (contents.Length < 2) + throw new ArgumentException("zero length data with non-zero pad bits", "contents"); + if (padBits > 7) + throw new ArgumentException("pad bits cannot be greater than 7 or less than 0", "contents"); + } + } + + this.contents = contents; + } + + /** + * Return the octets contained in this BIT STRING, checking that this BIT STRING really + * does represent an octet aligned string. Only use this method when the standard you are + * following dictates that the BIT STRING will be octet aligned. + * + * @return a copy of the octet aligned data. + */ + public virtual byte[] GetOctets() + { + if (contents[0] != 0) + throw new InvalidOperationException("attempt to get non-octet aligned data from BIT STRING"); + + return Arrays.CopyOfRange(contents, 1, contents.Length); + } + + public virtual byte[] GetBytes() + { + if (contents.Length == 1) + return Asn1OctetString.EmptyOctets; + + int padBits = contents[0]; + byte[] rv = Arrays.CopyOfRange(contents, 1, contents.Length); + // DER requires pad bits be zero + rv[rv.Length - 1] &= (byte)(0xFF << padBits); + return rv; + } + + public virtual int PadBits + { + get { return contents[0]; } + } + + /** + * @return the value of the bit string as an int (truncating if necessary) + */ + public virtual int IntValue + { + get + { + int value = 0, end = System.Math.Min(5, contents.Length - 1); + for (int i = 1; i < end; ++i) + { + value |= (int)contents[i] << (8 * (i - 1)); + } + if (1 <= end && end < 5) + { + int padBits = contents[0]; + byte der = (byte)(contents[end] & (0xFF << padBits)); + value |= (int)der << (8 * (end - 1)); + } + return value; + } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + int padBits = contents[0]; + if (padBits != 0) + { + int last = contents.Length - 1; + byte lastBer = contents[last]; + byte lastDer = (byte)(lastBer & (0xFF << padBits)); + + if (lastBer != lastDer) + return new PrimitiveEncodingSuffixed(Asn1Tags.Universal, Asn1Tags.BitString, contents, lastDer); + } + + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.BitString, contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + int padBits = contents[0]; + if (padBits != 0) + { + int last = contents.Length - 1; + byte lastBer = contents[last]; + byte lastDer = (byte)(lastBer & (0xFF << padBits)); + + if (lastBer != lastDer) + return new PrimitiveEncodingSuffixed(tagClass, tagNo, contents, lastDer); + } + + return new PrimitiveEncoding(tagClass, tagNo, contents); + } + + protected override int Asn1GetHashCode() + { + if (contents.Length < 2) + return 1; + + int padBits = contents[0]; + int last = contents.Length - 1; + + byte lastDer = (byte)(contents[last] & (0xFF << padBits)); + + int hc = Arrays.GetHashCode(contents, 0, last); + hc *= 257; + hc ^= lastDer; + return hc; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerBitString that = asn1Object as DerBitString; + if (null == that) + return false; + + byte[] thisContents = this.contents, thatContents = that.contents; + + int length = thisContents.Length; + if (thatContents.Length != length) + return false; + if (length == 1) + return true; + + int last = length - 1; + for (int i = 0; i < last; ++i) + { + if (thisContents[i] != thatContents[i]) + return false; + } + + int padBits = thisContents[0]; + byte thisLastDer = (byte)(thisContents[last] & (0xFF << padBits)); + byte thatLastDer = (byte)(thatContents[last] & (0xFF << padBits)); + + return thisLastDer == thatLastDer; + } + + public Stream GetBitStream() + { + return new MemoryStream(contents, 1, contents.Length - 1, false); + } + + public Stream GetOctetStream() + { + int padBits = contents[0] & 0xFF; + if (0 != padBits) + throw new IOException("expected octet-aligned bitstring, but found padBits: " + padBits); + + return GetBitStream(); + } + + public Asn1BitStringParser Parser + { + get { return this; } + } + + public override string GetString() + { + byte[] str = GetDerEncoded(); + + StringBuilder buffer = Shared.PlatformSupport.Text.StringBuilderPool.Get(1 + str.Length * 2); //new StringBuilder(1 + str.Length * 2); + buffer.Append('#'); + + for (int i = 0; i != str.Length; i++) + { + uint u8 = str[i]; + buffer.Append(table[u8 >> 4]); + buffer.Append(table[u8 & 0xF]); + } + + return Shared.PlatformSupport.Text.StringBuilderPool.ReleaseAndGrab(buffer); + } + + internal static DerBitString CreatePrimitive(byte[] contents) + { + int length = contents.Length; + if (length < 1) + throw new ArgumentException("truncated BIT STRING detected", "contents"); + + int padBits = contents[0]; + if (padBits > 0) + { + if (padBits > 7 || length < 2) + throw new ArgumentException("invalid pad bits detected", "contents"); + + byte finalOctet = contents[length - 1]; + if (finalOctet != (byte)(finalOctet & (0xFF << padBits))) + return new DLBitString(contents, false); + } + + return new DerBitString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs.meta new file mode 100644 index 00000000..10af88af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: afe4a168436e143438c7233820e235ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBitString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs new file mode 100644 index 00000000..fa9213a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs @@ -0,0 +1,161 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerBoolean + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerBoolean), Asn1Tags.Boolean) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + public static readonly DerBoolean False = new DerBoolean(false); + public static readonly DerBoolean True = new DerBoolean(true); + + /** + * return a bool from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerBoolean GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerBoolean derBoolean) + return derBoolean; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerBoolean converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerBoolean)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct boolean from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public static DerBoolean GetInstance(bool value) + { + return value ? True : False; + } + + public static DerBoolean GetInstance(int value) + { + return value != 0 ? True : False; + } + + /** + * return a Boolean from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerBoolean GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerBoolean)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte value; + + public DerBoolean( + byte[] val) + { + if (val.Length != 1) + throw new ArgumentException("byte value should have 1 byte in it", "val"); + + // TODO Are there any constraints on the possible byte values? + this.value = val[0]; + } + + private DerBoolean( + bool value) + { + this.value = value ? (byte)0xff : (byte)0; + } + + public bool IsTrue + { + get { return value != 0; } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.Boolean, GetContents(encoding)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents(encoding)); + } + + protected override bool Asn1Equals( + Asn1Object asn1Object) + { + DerBoolean other = asn1Object as DerBoolean; + + if (other == null) + return false; + + return IsTrue == other.IsTrue; + } + + protected override int Asn1GetHashCode() + { + return IsTrue.GetHashCode(); + } + + public override string ToString() + { + return IsTrue ? "TRUE" : "FALSE"; + } + + internal static DerBoolean CreatePrimitive(byte[] contents) + { + if (contents.Length != 1) + throw new ArgumentException("BOOLEAN value should have 1 byte in it", "contents"); + + byte b = contents[0]; + + return b == 0 ? False : b == 0xFF ? True : new DerBoolean(contents); + } + + private byte[] GetContents(int encoding) + { + byte contents = value; + if (Asn1OutputStream.EncodingDer == encoding && IsTrue) + { + contents = 0xFF; + } + + return new byte[]{ contents }; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs.meta new file mode 100644 index 00000000..992a45f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c3ae8606957a24d4f834357fba92926a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerBoolean.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs new file mode 100644 index 00000000..ebd6ada7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs @@ -0,0 +1,196 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerEnumerated + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerEnumerated), Asn1Tags.Enumerated) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets(), false); + } + } + + /** + * return an integer from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerEnumerated GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerEnumerated derEnumerated) + return derEnumerated; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerEnumerated converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerEnumerated)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct enumerated from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return an Enumerated from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerEnumerated GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerEnumerated)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] contents; + private readonly int start; + + public DerEnumerated(int val) + { + if (val < 0) + throw new ArgumentException("enumerated must be non-negative", "val"); + + this.contents = BigInteger.ValueOf(val).ToByteArray(); + this.start = 0; + } + + public DerEnumerated(long val) + { + if (val < 0L) + throw new ArgumentException("enumerated must be non-negative", "val"); + + this.contents = BigInteger.ValueOf(val).ToByteArray(); + this.start = 0; + } + + public DerEnumerated(BigInteger val) + { + if (val.SignValue < 0) + throw new ArgumentException("enumerated must be non-negative", "val"); + + this.contents = val.ToByteArray(); + this.start = 0; + } + + public DerEnumerated(byte[] contents) + : this(contents, true) + { + } + + internal DerEnumerated(byte[] contents, bool clone) + { + if (DerInteger.IsMalformed(contents)) + throw new ArgumentException("malformed enumerated", "contents"); + if (0 != (contents[0] & 0x80)) + throw new ArgumentException("enumerated must be non-negative", "contents"); + + this.contents = clone ? Arrays.Clone(contents) : contents; + this.start = DerInteger.SignBytesToSkip(this.contents); + } + + public BigInteger Value + { + get { return new BigInteger(contents); } + } + + public bool HasValue(int x) + { + return (contents.Length - start) <= 4 + && DerInteger.IntValue(contents, start, DerInteger.SignExtSigned) == x; + } + + public bool HasValue(BigInteger x) + { + return null != x + // Fast check to avoid allocation + && DerInteger.IntValue(contents, start, DerInteger.SignExtSigned) == x.IntValue + && Value.Equals(x); + } + + public int IntValueExact + { + get + { + int count = contents.Length - start; + if (count > 4) + throw new ArithmeticException("ASN.1 Enumerated out of int range"); + + return DerInteger.IntValue(contents, start, DerInteger.SignExtSigned); + } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.Enumerated, contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerEnumerated other = asn1Object as DerEnumerated; + if (other == null) + return false; + + return Arrays.AreEqual(this.contents, other.contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(contents); + } + + private static readonly DerEnumerated[] cache = new DerEnumerated[12]; + + internal static DerEnumerated CreatePrimitive(byte[] contents, bool clone) + { + if (contents.Length > 1) + return new DerEnumerated(contents, clone); + if (contents.Length == 0) + throw new ArgumentException("ENUMERATED has zero length", "contents"); + + int value = contents[0]; + if (value >= cache.Length) + return new DerEnumerated(contents, clone); + + DerEnumerated possibleMatch = cache[value]; + if (possibleMatch == null) + { + cache[value] = possibleMatch = new DerEnumerated(contents, clone); + } + return possibleMatch; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs.meta new file mode 100644 index 00000000..cd5589e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c38944825bb299c48bbb1fd4953fca56 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerEnumerated.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs new file mode 100644 index 00000000..51211050 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerGeneralString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerGeneralString), Asn1Tags.GeneralString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + public static DerGeneralString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerGeneralString derGeneralString) + return derGeneralString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerGeneralString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerGeneralString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct general string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public static DerGeneralString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerGeneralString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerGeneralString(string str) + { + if (str == null) + throw new ArgumentNullException("str"); + + m_contents = Strings.ToAsciiByteArray(str); + } + + public DerGeneralString(byte[] contents) + : this(contents, true) + { + } + + internal DerGeneralString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromAsciiByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.GeneralString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerGeneralString that = asn1Object as DerGeneralString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal static DerGeneralString CreatePrimitive(byte[] contents) + { + return new DerGeneralString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs.meta new file mode 100644 index 00000000..2c5e1026 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f2953ef1a29c4145a7caa92482546b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs new file mode 100644 index 00000000..bf410b6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerGeneralizedTime + : Asn1GeneralizedTime + { + public DerGeneralizedTime(string timeString) + : base(timeString) + { + } + + public DerGeneralizedTime(DateTime dateTime) + : base(dateTime) + { + } + + internal DerGeneralizedTime(byte[] contents) + : base(contents) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.GeneralizedTime, + GetContents(Asn1OutputStream.EncodingDer)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents(Asn1OutputStream.EncodingDer)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs.meta new file mode 100644 index 00000000..5d92a5b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cbdbd0fdc2cac9e4b904480e09ae7b9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGeneralizedTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs new file mode 100644 index 00000000..aa7e17ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerGraphicString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerGraphicString), Asn1Tags.GraphicString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a Graphic String from the passed in object + * + * @param obj a DerGraphicString or an object that can be converted into one. + * @exception IllegalArgumentException if the object cannot be converted. + * @return a DerGraphicString instance, or null. + */ + public static DerGraphicString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerGraphicString derGraphicString) + return derGraphicString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerGraphicString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerGraphicString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct graphic string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * return a Graphic String from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception IllegalArgumentException if the tagged object cannot be converted. + * @return a DerGraphicString instance, or null. + */ + public static DerGraphicString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerGraphicString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerGraphicString(byte[] contents) + : this(contents, true) + { + } + + internal DerGraphicString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + this.m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.GraphicString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerGraphicString that = asn1Object as DerGraphicString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + internal static DerGraphicString CreatePrimitive(byte[] contents) + { + return new DerGraphicString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs.meta new file mode 100644 index 00000000..992d0519 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 940e3e1a96b330c43ab6ed65d0c681a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerGraphicString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs new file mode 100644 index 00000000..68c2bcd7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs @@ -0,0 +1,168 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * IA5String object - this is an Ascii string. + */ + public class DerIA5String + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerIA5String), Asn1Tags.IA5String) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return an IA5 string from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerIA5String GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerIA5String derIA5String) + return derIA5String; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerIA5String converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerIA5String)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct IA5 string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return an IA5 string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerIA5String GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerIA5String)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerIA5String(string str) + : this(str, false) + { + } + + /** + * Constructor with optional validation. + * + * @param string the base string to wrap. + * @param validate whether or not to check the string. + * @throws ArgumentException if validate is true and the string + * contains characters that should not be in an IA5String. + */ + public DerIA5String(string str, bool validate) + { + if (str == null) + throw new ArgumentNullException("str"); + if (validate && !IsIA5String(str)) + throw new ArgumentException("string contains illegal characters", "str"); + + m_contents = Strings.ToAsciiByteArray(str); + } + + public DerIA5String(byte[] contents) + : this(contents, true) + { + } + + internal DerIA5String(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromAsciiByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.IA5String, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerIA5String that = asn1Object as DerIA5String; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + /** + * return true if the passed in String can be represented without + * loss as an IA5String, false otherwise. + * + * @return true if in printable set, false otherwise. + */ + public static bool IsIA5String(string str) + { + foreach (char ch in str) + { + if (ch > 0x007f) + return false; + } + + return true; + } + + internal static DerIA5String CreatePrimitive(byte[] contents) + { + return new DerIA5String(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs.meta new file mode 100644 index 00000000..c83da721 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f149b931f494537459126bb9eb037c09 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerIA5String.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs new file mode 100644 index 00000000..3c7b65d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs @@ -0,0 +1,283 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerInteger + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerInteger), Asn1Tags.Integer) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + public const string AllowUnsafeProperty = "Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.AllowUnsafeInteger"; + + internal static bool AllowUnsafe() + { + string allowUnsafeValue = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(AllowUnsafeProperty); + return allowUnsafeValue != null && Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("true", allowUnsafeValue); + } + + internal const int SignExtSigned = -1; + internal const int SignExtUnsigned = 0xFF; + + private readonly byte[] bytes; + private readonly int start; + + /** + * return an integer from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerInteger GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerInteger derInteger) + return derInteger; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerInteger converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerInteger)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct integer from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return an Integer from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerInteger GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerInteger)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + public DerInteger(int value) + { + this.bytes = BigInteger.ValueOf(value).ToByteArray(); + this.start = 0; + } + + public DerInteger(long value) + { + this.bytes = BigInteger.ValueOf(value).ToByteArray(); + this.start = 0; + } + + public DerInteger(BigInteger value) + { + if (value == null) + throw new ArgumentNullException("value"); + + this.bytes = value.ToByteArray(); + this.start = 0; + } + + public DerInteger(byte[] bytes) + : this(bytes, true) + { + } + + internal DerInteger(byte[] bytes, bool clone) + { + if (IsMalformed(bytes)) + throw new ArgumentException("malformed integer", "bytes"); + + this.bytes = clone ? Arrays.Clone(bytes) : bytes; + this.start = SignBytesToSkip(bytes); + } + + /** + * in some cases positive values Get crammed into a space, + * that's not quite big enough... + */ + public BigInteger PositiveValue + { + get { return new BigInteger(1, bytes); } + } + + public BigInteger Value + { + get { return new BigInteger(bytes); } + } + + public bool HasValue(int x) + { + return (bytes.Length - start) <= 4 + && IntValue(bytes, start, SignExtSigned) == x; + } + + public bool HasValue(long x) + { + return (bytes.Length - start) <= 8 + && LongValue(bytes, start, SignExtSigned) == x; + } + + public bool HasValue(BigInteger x) + { + return null != x + // Fast check to avoid allocation + && IntValue(bytes, start, SignExtSigned) == x.IntValue + && Value.Equals(x); + } + + public int IntPositiveValueExact + { + get + { + int count = bytes.Length - start; + if (count > 4 || (count == 4 && 0 != (bytes[start] & 0x80))) + throw new ArithmeticException("ASN.1 Integer out of positive int range"); + + return IntValue(bytes, start, SignExtUnsigned); + } + } + + public int IntValueExact + { + get + { + int count = bytes.Length - start; + if (count > 4) + throw new ArithmeticException("ASN.1 Integer out of int range"); + + return IntValue(bytes, start, SignExtSigned); + } + } + + public long LongValueExact + { + get + { + int count = bytes.Length - start; + if (count > 8) + throw new ArithmeticException("ASN.1 Integer out of long range"); + + return LongValue(bytes, start, SignExtSigned); + } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.Integer, bytes); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, bytes); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(bytes); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerInteger other = asn1Object as DerInteger; + if (other == null) + return false; + + return Arrays.AreEqual(this.bytes, other.bytes); + } + + public override string ToString() + { + return Value.ToString(); + } + + internal static DerInteger CreatePrimitive(byte[] contents) + { + return new DerInteger(contents, false); + } + + internal static int IntValue(byte[] bytes, int start, int signExt) + { + int length = bytes.Length; + int pos = System.Math.Max(start, length - 4); + + int val = (sbyte)bytes[pos] & signExt; + while (++pos < length) + { + val = (val << 8) | bytes[pos]; + } + return val; + } + + internal static long LongValue(byte[] bytes, int start, int signExt) + { + int length = bytes.Length; + int pos = System.Math.Max(start, length - 8); + + long val = (sbyte)bytes[pos] & signExt; + while (++pos < length) + { + val = (val << 8) | bytes[pos]; + } + return val; + } + + /** + * Apply the correct validation for an INTEGER primitive following the BER rules. + * + * @param bytes The raw encoding of the integer. + * @return true if the (in)put fails this validation. + */ + internal static bool IsMalformed(byte[] bytes) + { + switch (bytes.Length) + { + case 0: + return true; + case 1: + return false; + default: + return (sbyte)bytes[0] == ((sbyte)bytes[1] >> 7) && !AllowUnsafe(); + } + } + + internal static int SignBytesToSkip(byte[] bytes) + { + int pos = 0, last = bytes.Length - 1; + while (pos < last + && (sbyte)bytes[pos] == ((sbyte)bytes[pos + 1] >> 7)) + { + ++pos; + } + return pos; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs.meta new file mode 100644 index 00000000..03e0036d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f568af57a81ac874a801136ef816ceaa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerInteger.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs new file mode 100644 index 00000000..6f95a3ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * A Null object. + */ + public class DerNull + : Asn1Null + { + public static readonly DerNull Instance = new DerNull(); + + private static readonly byte[] ZeroBytes = new byte[0]; + + protected internal DerNull() + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.Null, ZeroBytes); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, ZeroBytes); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + return asn1Object is DerNull; + } + + protected override int Asn1GetHashCode() + { + return -1; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs.meta new file mode 100644 index 00000000..ab3ff99f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aefa4e6aee5c3004fa79f32aaf8b4187 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNull.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs new file mode 100644 index 00000000..8a382ed9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs @@ -0,0 +1,197 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Der NumericString object - this is an ascii string of characters {0,1,2,3,4,5,6,7,8,9, }. + */ + public class DerNumericString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerNumericString), Asn1Tags.NumericString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a numeric string from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerNumericString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerNumericString derNumericString) + return derNumericString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerNumericString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerNumericString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct numeric string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a numeric string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerNumericString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerNumericString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerNumericString(string str) + : this(str, false) + { + } + + /** + * Constructor with optional validation. + * + * @param string the base string to wrap. + * @param validate whether or not to check the string. + * @throws ArgumentException if validate is true and the string + * contains characters that should not be in a NumericString. + */ + public DerNumericString(string str, bool validate) + { + if (str == null) + throw new ArgumentNullException("str"); + if (validate && !IsNumericString(str)) + throw new ArgumentException("string contains illegal characters", "str"); + + m_contents = Strings.ToAsciiByteArray(str); + } + + public DerNumericString(byte[] contents) + : this(contents, true) + { + } + + internal DerNumericString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromAsciiByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.NumericString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerNumericString that = asn1Object as DerNumericString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + /** + * Return true if the string can be represented as a NumericString ('0'..'9', ' ') + * + * @param str string to validate. + * @return true if numeric, fale otherwise. + */ + public static bool IsNumericString(string str) + { + foreach (char ch in str) + { + if (ch > 0x007f || (ch != ' ' && !char.IsDigit(ch))) + return false; + } + + return true; + } + + internal static bool IsNumericString(byte[] contents) + { + for (int i = 0; i < contents.Length; ++i) + { + switch (contents[i]) + { + case 0x20: + case 0x30: + case 0x31: + case 0x32: + case 0x33: + case 0x34: + case 0x35: + case 0x36: + case 0x37: + case 0x38: + case 0x39: + break; + default: + return false; + } + } + + return true; + } + + internal static DerNumericString CreatePrimitive(byte[] contents) + { + // TODO Validation - sort out exception types + //if (!IsNumericString(contents)) + + return new DerNumericString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs.meta new file mode 100644 index 00000000..7fde1393 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 170c68d391661cc4ca852725e47f02e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerNumericString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs new file mode 100644 index 00000000..580a160d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs @@ -0,0 +1,314 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerObjectIdentifier + : Asn1Object + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerObjectIdentifier), Asn1Tags.ObjectIdentifier) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets(), false); + } + } + + public static DerObjectIdentifier FromContents(byte[] contents) + { + return CreatePrimitive(contents, true); + } + + /** + * return an OID from the passed in object + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerObjectIdentifier GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerObjectIdentifier derObjectIdentifier) + return derObjectIdentifier; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerObjectIdentifier converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerObjectIdentifier)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct object identifier from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static DerObjectIdentifier GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + /* + * TODO[asn1] This block here is for backward compatibility, but should eventually be removed. + * + * - see https://github.com/bcgit/bc-java/issues/1015 + */ + if (!declaredExplicit && !taggedObject.IsParsed()) + { + Asn1Object baseObject = taggedObject.GetObject(); + if (!(baseObject is DerObjectIdentifier)) + return FromContents(Asn1OctetString.GetInstance(baseObject).GetOctets()); + } + + return (DerObjectIdentifier)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private const long LongLimit = (long.MaxValue >> 7) - 0x7F; + + private static readonly DerObjectIdentifier[] cache = new DerObjectIdentifier[1024]; + + private readonly string identifier; + private byte[] contents; + + public DerObjectIdentifier(string identifier) + { + if (identifier == null) + throw new ArgumentNullException("identifier"); + if (!IsValidIdentifier(identifier)) + throw new FormatException("string " + identifier + " not an OID"); + + this.identifier = identifier; + } + + private DerObjectIdentifier(DerObjectIdentifier oid, string branchID) + { + if (!Asn1RelativeOid.IsValidIdentifier(branchID, 0)) + throw new ArgumentException("string " + branchID + " not a valid OID branch", "branchID"); + + this.identifier = oid.Id + "." + branchID; + } + + private DerObjectIdentifier(byte[] contents, bool clone) + { + this.identifier = ParseContents(contents); + this.contents = clone ? Arrays.Clone(contents) : contents; + } + + public virtual DerObjectIdentifier Branch(string branchID) + { + return new DerObjectIdentifier(this, branchID); + } + + public string Id + { + get { return identifier; } + } + + /** + * Return true if this oid is an extension of the passed in branch, stem. + * @param stem the arc or branch that is a possible parent. + * @return true if the branch is on the passed in stem, false otherwise. + */ + public virtual bool On(DerObjectIdentifier stem) + { + string id = Id, stemId = stem.Id; + return id.Length > stemId.Length && id[stemId.Length] == '.' && Org.BouncyCastle.Utilities.Platform.StartsWith(id, stemId); + } + + public override string ToString() + { + return identifier; + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerObjectIdentifier that = asn1Object as DerObjectIdentifier; + return null != that + && this.identifier == that.identifier; + } + + protected override int Asn1GetHashCode() + { + return identifier.GetHashCode(); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.ObjectIdentifier, GetContents()); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents()); + } + + private void DoOutput(MemoryStream bOut) + { + OidTokenizer tok = new OidTokenizer(identifier); + + string token = tok.NextToken(); + int first = int.Parse(token) * 40; + + token = tok.NextToken(); + if (token.Length <= 18) + { + Asn1RelativeOid.WriteField(bOut, first + long.Parse(token)); + } + else + { + Asn1RelativeOid.WriteField(bOut, new BigInteger(token).Add(BigInteger.ValueOf(first))); + } + + while (tok.HasMoreTokens) + { + token = tok.NextToken(); + if (token.Length <= 18) + { + Asn1RelativeOid.WriteField(bOut, long.Parse(token)); + } + else + { + Asn1RelativeOid.WriteField(bOut, new BigInteger(token)); + } + } + } + + private byte[] GetContents() + { + lock (this) + { + if (contents == null) + { + MemoryStream bOut = new MemoryStream(); + DoOutput(bOut); + contents = bOut.ToArray(); + } + + return contents; + } + } + + internal static DerObjectIdentifier CreatePrimitive(byte[] contents, bool clone) + { + int hashCode = Arrays.GetHashCode(contents); + int first = hashCode & 1023; + + lock (cache) + { + DerObjectIdentifier entry = cache[first]; + if (entry != null && Arrays.AreEqual(contents, entry.GetContents())) + { + return entry; + } + + return cache[first] = new DerObjectIdentifier(contents, clone); + } + } + + private static bool IsValidIdentifier(string identifier) + { + if (identifier.Length < 3 || identifier[1] != '.') + return false; + + char first = identifier[0]; + if (first < '0' || first > '2') + return false; + + return Asn1RelativeOid.IsValidIdentifier(identifier, 2); + } + + private static string ParseContents(byte[] contents) + { + StringBuilder objId = new StringBuilder(); + long value = 0; + BigInteger bigValue = null; + bool first = true; + + for (int i = 0; i != contents.Length; i++) + { + int b = contents[i]; + + if (value <= LongLimit) + { + value += b & 0x7F; + if ((b & 0x80) == 0) + { + if (first) + { + if (value < 40) + { + objId.Append('0'); + } + else if (value < 80) + { + objId.Append('1'); + value -= 40; + } + else + { + objId.Append('2'); + value -= 80; + } + first = false; + } + + objId.Append('.'); + objId.Append(value); + value = 0; + } + else + { + value <<= 7; + } + } + else + { + if (bigValue == null) + { + bigValue = BigInteger.ValueOf(value); + } + bigValue = bigValue.Or(BigInteger.ValueOf(b & 0x7F)); + if ((b & 0x80) == 0) + { + if (first) + { + objId.Append('2'); + bigValue = bigValue.Subtract(BigInteger.ValueOf(80)); + first = false; + } + + objId.Append('.'); + objId.Append(bigValue); + bigValue = null; + value = 0; + } + else + { + bigValue = bigValue.ShiftLeft(7); + } + } + } + + return objId.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs.meta new file mode 100644 index 00000000..27cf17ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fff7b0e023f3d8a4c873a20a6d22ef3b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerObjectIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs new file mode 100644 index 00000000..6a41c71b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerOctetString + : Asn1OctetString + { + /// The octets making up the octet string. + public DerOctetString(byte[] contents) + : base(contents) + { + } + + public DerOctetString(IAsn1Convertible obj) + : this(obj.ToAsn1Object()) + { + } + + public DerOctetString(Asn1Encodable obj) + : base(obj.GetEncoded(Der)) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.OctetString, contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, contents); + } + + internal static void Encode(Asn1OutputStream asn1Out, byte[] buf, int off, int len) + { + asn1Out.WriteIdentifier(Asn1Tags.Universal, Asn1Tags.OctetString); + asn1Out.WriteDL(len); + asn1Out.Write(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void Encode(Asn1OutputStream asn1Out, ReadOnlySpan buf) + { + asn1Out.WriteIdentifier(Asn1Tags.Universal, Asn1Tags.OctetString); + asn1Out.WriteDL(buf.Length); + asn1Out.Write(buf); + } + + internal static void Encode(Asn1OutputStream asn1Out, ReadOnlySpan buf1, ReadOnlySpan buf2) + { + asn1Out.WriteIdentifier(Asn1Tags.Universal, Asn1Tags.OctetString); + asn1Out.WriteDL(buf1.Length + buf2.Length); + asn1Out.Write(buf1); + asn1Out.Write(buf2); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs.meta new file mode 100644 index 00000000..97cbd5b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a2fbc398075faf49836a3464175d32f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOctetString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs new file mode 100644 index 00000000..13717b95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class DerOutputStream + : Asn1OutputStream + { + internal DerOutputStream(Stream os) + : base(os) + { + } + + internal override int Encoding + { + get { return EncodingDer; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs.meta new file mode 100644 index 00000000..64d88ca0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5622672ae97bc604bb6bfde0cb52e7a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs new file mode 100644 index 00000000..c23d6c3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs @@ -0,0 +1,194 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Der PrintableString object. + */ + public class DerPrintableString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerPrintableString), Asn1Tags.PrintableString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a printable string from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerPrintableString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerPrintableString derPrintableString) + return derPrintableString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerPrintableString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerPrintableString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct printable string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a printable string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerPrintableString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerPrintableString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerPrintableString(string str) + : this(str, false) + { + } + + /** + * Constructor with optional validation. + * + * @param string the base string to wrap. + * @param validate whether or not to check the string. + * @throws ArgumentException if validate is true and the string + * contains characters that should not be in a PrintableString. + */ + public DerPrintableString(string str, bool validate) + { + if (str == null) + throw new ArgumentNullException("str"); + if (validate && !IsPrintableString(str)) + throw new ArgumentException("string contains illegal characters", "str"); + + m_contents = Strings.ToAsciiByteArray(str); + } + + public DerPrintableString(byte[] contents) + : this(contents, true) + { + } + + internal DerPrintableString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromAsciiByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.PrintableString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals( + Asn1Object asn1Object) + { + DerPrintableString that = asn1Object as DerPrintableString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + /** + * return true if the passed in String can be represented without + * loss as a PrintableString, false otherwise. + * + * @return true if in printable set, false otherwise. + */ + public static bool IsPrintableString(string str) + { + foreach (char ch in str) + { + if (ch > 0x007f) + return false; + + if (char.IsLetterOrDigit(ch)) + continue; + +// if (char.IsPunctuation(ch)) +// continue; + + switch (ch) + { + case ' ': + case '\'': + case '(': + case ')': + case '+': + case '-': + case '.': + case ':': + case '=': + case '?': + case '/': + case ',': + continue; + } + + return false; + } + + return true; + } + + internal static DerPrintableString CreatePrimitive(byte[] contents) + { + return new DerPrintableString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs.meta new file mode 100644 index 00000000..fb398dbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: de8a5689c754c164eb355e5536e6f8a7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerPrintableString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs new file mode 100644 index 00000000..f25931be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerSequence + : Asn1Sequence + { + public static readonly DerSequence Empty = new DerSequence(); + + public static DerSequence FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new DerSequence(elementVector); + } + + /** + * create an empty sequence + */ + public DerSequence() + : base() + { + } + + /** + * create a sequence containing one object + */ + public DerSequence(Asn1Encodable element) + : base(element) + { + } + + /** + * create a sequence containing two objects + */ + public DerSequence(Asn1Encodable element1, Asn1Encodable element2) + : base(element1, element2) + { + } + + public DerSequence(params Asn1Encodable[] elements) + : base(elements) + { + } + + /** + * create a sequence containing a vector of objects. + */ + public DerSequence(Asn1EncodableVector elementVector) + : base(elementVector) + { + } + + internal DerSequence(Asn1Encodable[] elements, bool clone) + : base(elements, clone) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new ConstructedDLEncoding(Asn1Tags.Universal, Asn1Tags.Sequence, + Asn1OutputStream.GetContentsEncodings(Asn1OutputStream.EncodingDer, elements)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new ConstructedDLEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(Asn1OutputStream.EncodingDer, elements)); + } + + internal override DerBitString ToAsn1BitString() + { + return new DerBitString(BerBitString.FlattenBitStrings(GetConstructedBitStrings()), false); + } + + internal override DerExternal ToAsn1External() + { + return new DerExternal(this); + } + + internal override Asn1OctetString ToAsn1OctetString() + { + return new DerOctetString(BerOctetString.FlattenOctetStrings(GetConstructedOctetStrings())); + } + + internal override Asn1Set ToAsn1Set() + { + // NOTE: DLSet is intentional, we don't want sorting + return new DLSet(false, elements); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs.meta new file mode 100644 index 00000000..40a45066 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 18cfbc9c97ef55445b926ddeb1992930 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs new file mode 100644 index 00000000..d6b61f44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * A Der encoded set object + */ + public class DerSet + : Asn1Set + { + public static readonly DerSet Empty = new DerSet(); + + public static DerSet FromVector(Asn1EncodableVector elementVector) + { + return elementVector.Count < 1 ? Empty : new DerSet(elementVector); + } + + /** + * create an empty set + */ + public DerSet() + : base() + { + } + + /** + * @param obj - a single object that makes up the set. + */ + public DerSet(Asn1Encodable element) + : base(element) + { + } + + public DerSet(params Asn1Encodable[] elements) + : base(elements, true) + { + } + + internal DerSet(Asn1Encodable[] elements, bool doSort) + : base(elements, doSort) + { + } + + /** + * @param v - a vector of objects making up the set. + */ + public DerSet(Asn1EncodableVector elementVector) + : base(elementVector, true) + { + } + + internal DerSet(Asn1EncodableVector elementVector, bool doSort) + : base(elementVector, doSort) + { + } + + internal DerSet(bool isSorted, Asn1Encodable[] elements) + : base(isSorted, elements) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new ConstructedDLEncoding(Asn1Tags.Universal, Asn1Tags.Set, + Asn1OutputStream.GetContentsEncodings(Asn1OutputStream.EncodingDer, GetSortedElements())); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new ConstructedDLEncoding(tagClass, tagNo, + Asn1OutputStream.GetContentsEncodings(Asn1OutputStream.EncodingDer, GetSortedElements())); + } + + private Asn1Encodable[] GetSortedElements() + { + if (isSorted) + return elements; + + int count = elements.Length; + Asn1Object[] asn1Objects = new Asn1Object[count]; + for (int i = 0; i < count; ++i) + { + asn1Objects[i] = elements[i].ToAsn1Object(); + } + + return Sort(asn1Objects); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs.meta new file mode 100644 index 00000000..5bc472ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7b6f98de535c404d9620013bafc762b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs new file mode 100644 index 00000000..20747417 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public abstract class DerStringBase + : Asn1Object, IAsn1String + { + protected DerStringBase() + { + } + + public abstract string GetString(); + + public override string ToString() + { + return GetString(); + } + + protected override int Asn1GetHashCode() + { + return GetString().GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs.meta new file mode 100644 index 00000000..53b3407a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66c767e5b8bde5b4aaee4e729c60e790 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerStringBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs new file mode 100644 index 00000000..b46550ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Der T61String (also the teletex string) - 8-bit characters + */ + public class DerT61String + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerT61String), Asn1Tags.T61String) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a T61 string from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerT61String GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerT61String derT61String) + return derT61String; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerT61String converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerT61String)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct T61 string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a T61 string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerT61String GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerT61String)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerT61String(string str) + { + if (str == null) + throw new ArgumentNullException("str"); + + m_contents = Strings.ToByteArray(str); + } + + public DerT61String(byte[] contents) + : this(contents, true) + { + } + + internal DerT61String(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromByteArray(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.T61String, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerT61String that = asn1Object as DerT61String; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal static DerT61String CreatePrimitive(byte[] contents) + { + return new DerT61String(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs.meta new file mode 100644 index 00000000..f00e2231 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f768a3ce90b3ce4c90195eb914767aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerT61String.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs new file mode 100644 index 00000000..687f2436 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * DER TaggedObject - in ASN.1 notation this is any object preceded by + * a [n] where n is some number - these are assumed to follow the construction + * rules (as with sequences). + */ + public class DerTaggedObject + : Asn1TaggedObject + { + public DerTaggedObject(int tagNo, Asn1Encodable obj) + : base(true, tagNo, obj) + { + } + + public DerTaggedObject(int tagClass, int tagNo, Asn1Encodable obj) + : base(true, tagClass, tagNo, obj) + { + } + + /** + * @param isExplicit true if an explicitly tagged object. + * @param tagNo the tag number for this object. + * @param obj the tagged object. + */ + public DerTaggedObject(bool isExplicit, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagNo, obj) + { + } + + public DerTaggedObject(bool isExplicit, int tagClass, int tagNo, Asn1Encodable obj) + : base(isExplicit, tagClass, tagNo, obj) + { + } + + internal DerTaggedObject(int explicitness, int tagClass, int tagNo, Asn1Encodable obj) + : base(explicitness, tagClass, tagNo, obj) + { + } + + internal override string Asn1Encoding + { + get { return Der; } + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + encoding = Asn1OutputStream.EncodingDer; + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, TagClass, TagNo); + + return new ConstructedDLEncoding(TagClass, TagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + encoding = Asn1OutputStream.EncodingDer; + + Asn1Object baseObject = GetBaseObject().ToAsn1Object(); + + if (!IsExplicit()) + return baseObject.GetEncodingImplicit(encoding, tagClass, tagNo); + + return new ConstructedDLEncoding(tagClass, tagNo, new IAsn1Encoding[]{ baseObject.GetEncoding(encoding) }); + } + + internal override Asn1Sequence RebuildConstructed(Asn1Object asn1Object) + { + return new DerSequence(asn1Object); + } + + internal override Asn1TaggedObject ReplaceTag(int tagClass, int tagNo) + { + return new DerTaggedObject(explicitness, tagClass, tagNo, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs.meta new file mode 100644 index 00000000..9dca8ac9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9ed40b8b6a420f842ab356de13fde3be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerTaggedObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs new file mode 100644 index 00000000..6e0299ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerUtcTime + : Asn1UtcTime + { + public DerUtcTime(string timeString) + : base(timeString) + { + } + + + public DerUtcTime(DateTime dateTime) + : base(dateTime) + { + } + + public DerUtcTime(DateTime dateTime, int twoDigitYearMax) + : base(dateTime, twoDigitYearMax) + { + } + + internal DerUtcTime(byte[] contents) + : base(contents) + { + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.UtcTime, + GetContents(Asn1OutputStream.EncodingDer)); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, GetContents(Asn1OutputStream.EncodingDer)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs.meta new file mode 100644 index 00000000..430c367c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 491472b8ab436e4468b5f1e8e6e6b452 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTCTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs new file mode 100644 index 00000000..2203c7c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Der UTF8String object. + */ + public class DerUtf8String + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerUtf8String), Asn1Tags.Utf8String) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return an UTF8 string from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerUtf8String GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerUtf8String derUtf8String) + return derUtf8String; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerUtf8String converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerUtf8String)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct UTF8 string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a UTF8 string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerUtf8String GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerUtf8String)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerUtf8String(string str) + : this(Strings.ToUtf8ByteArray(str), false) + { + } + + public DerUtf8String(byte[] contents) + : this(contents, true) + { + } + + internal DerUtf8String(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromUtf8ByteArray(m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerUtf8String that = asn1Object as DerUtf8String; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.Utf8String, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + internal static DerUtf8String CreatePrimitive(byte[] contents) + { + return new DerUtf8String(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs.meta new file mode 100644 index 00000000..8be568d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43e5b2a9158cb7747a4f679e741160fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUTF8String.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs new file mode 100644 index 00000000..9db82fa1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs @@ -0,0 +1,177 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * UniversalString object. + */ + public class DerUniversalString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerUniversalString), Asn1Tags.UniversalString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + private static readonly char[] table = { '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F' }; + + /** + * return a universal string from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerUniversalString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerUniversalString derUniversalString) + return derUniversalString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerUniversalString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerUniversalString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct universal string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a universal string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerUniversalString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerUniversalString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerUniversalString(byte[] contents) + : this(contents, true) + { + } + + internal DerUniversalString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + int dl = m_contents.Length; + int capacity = 3 + 2 * (Asn1OutputStream.GetLengthOfDL(dl) + dl); + StringBuilder buf = new StringBuilder("#1C", capacity); + EncodeHexDL(buf, dl); + + for (int i = 0; i < dl; ++i) + { + EncodeHexByte(buf, m_contents[i]); + } + + Debug.Assert(buf.Length == capacity); + return buf.ToString(); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.UniversalString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerUniversalString that = asn1Object as DerUniversalString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal static DerUniversalString CreatePrimitive(byte[] contents) + { + return new DerUniversalString(contents, false); + } + + private static void EncodeHexByte(StringBuilder buf, int i) + { + buf.Append(table[(i >> 4) & 0xF]); + buf.Append(table[i & 0xF]); + } + + private static void EncodeHexDL(StringBuilder buf, int dl) + { + if (dl < 128) + { + EncodeHexByte(buf, dl); + return; + } + + byte[] stack = new byte[5]; + int pos = 5; + + do + { + stack[--pos] = (byte)dl; + dl >>= 8; + } + while (dl != 0); + + int count = stack.Length - pos; + stack[--pos] = (byte)(0x80 | count); + + do + { + EncodeHexByte(buf, stack[pos++]); + } + while (pos < stack.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs.meta new file mode 100644 index 00000000..6d7da58f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a4aa1a46fb2453a4596d0052a3f66a9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerUniversalString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs new file mode 100644 index 00000000..003a706b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class DerVideotexString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerVideotexString), Asn1Tags.VideotexString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a videotex string from the passed in object + * + * @param obj a DERVideotexString or an object that can be converted into one. + * @exception IllegalArgumentException if the object cannot be converted. + * @return a DERVideotexString instance, or null. + */ + public static DerVideotexString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerVideotexString derVideotexString) + return derVideotexString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerVideotexString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerVideotexString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct videotex string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * return a videotex string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception IllegalArgumentException if the tagged object cannot be converted. + * @return a DERVideotexString instance, or null. + */ + public static DerVideotexString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerVideotexString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerVideotexString(byte[] contents) + : this(contents, true) + { + } + + internal DerVideotexString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.VideotexString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerVideotexString that = asn1Object as DerVideotexString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal static DerVideotexString CreatePrimitive(byte[] contents) + { + return new DerVideotexString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs.meta new file mode 100644 index 00000000..8d7b3b38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1dedfb92e90e8fa4288c9409aa1f56db +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVideotexString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs new file mode 100644 index 00000000..13b0110d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * VisibleString object. + */ + public class DerVisibleString + : DerStringBase + { + internal class Meta : Asn1UniversalType + { + internal static readonly Asn1UniversalType Instance = new Meta(); + + private Meta() : base(typeof(DerVisibleString), Asn1Tags.VisibleString) {} + + internal override Asn1Object FromImplicitPrimitive(DerOctetString octetString) + { + return CreatePrimitive(octetString.GetOctets()); + } + } + + /** + * return a visible string from the passed in object. + * + * @exception ArgumentException if the object cannot be converted. + */ + public static DerVisibleString GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is DerVisibleString derVisibleString) + return derVisibleString; + + if (obj is IAsn1Convertible asn1Convertible) + { + Asn1Object asn1Object = asn1Convertible.ToAsn1Object(); + if (asn1Object is DerVisibleString converted) + return converted; + } + else if (obj is byte[] bytes) + { + try + { + return (DerVisibleString)Meta.Instance.FromByteArray(bytes); + } + catch (IOException e) + { + throw new ArgumentException("failed to construct visible string from byte[]: " + e.Message); + } + } + + throw new ArgumentException("illegal object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + /** + * return a visible string from a tagged object. + * + * @param taggedObject the tagged object holding the object we want + * @param declaredExplicit true if the object is meant to be explicitly tagged false otherwise. + * @exception ArgumentException if the tagged object cannot be converted. + */ + public static DerVisibleString GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return (DerVisibleString)Meta.Instance.GetContextInstance(taggedObject, declaredExplicit); + } + + private readonly byte[] m_contents; + + public DerVisibleString(string str) + { + if (str == null) + throw new ArgumentNullException("str"); + + m_contents = Strings.ToAsciiByteArray(str); + } + + public DerVisibleString(byte[] contents) + : this(contents, true) + { + } + + internal DerVisibleString(byte[] contents, bool clone) + { + if (null == contents) + throw new ArgumentNullException("contents"); + + m_contents = clone ? Arrays.Clone(contents) : contents; + } + + public override string GetString() + { + return Strings.FromAsciiByteArray(m_contents); + } + + public byte[] GetOctets() + { + return Arrays.Clone(m_contents); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + return new PrimitiveEncoding(Asn1Tags.Universal, Asn1Tags.VisibleString, m_contents); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + return new PrimitiveEncoding(tagClass, tagNo, m_contents); + } + + protected override bool Asn1Equals(Asn1Object asn1Object) + { + DerVisibleString that = asn1Object as DerVisibleString; + return null != that + && Arrays.AreEqual(this.m_contents, that.m_contents); + } + + protected override int Asn1GetHashCode() + { + return Arrays.GetHashCode(m_contents); + } + + internal static DerVisibleString CreatePrimitive(byte[] contents) + { + return new DerVisibleString(contents, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs.meta new file mode 100644 index 00000000..0c76a10b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c26a4d8aa1c97ad4fba7e2b082779c8a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/DerVisibleString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs new file mode 100644 index 00000000..4dfdc448 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * Marker interface for CHOICE objects - if you implement this in a roll-your-own + * object, any attempt to tag the object implicitly will convert the tag to an + * explicit one as the encoding rules require. + *

+ * If you use this interface your class should also implement the getInstance + * pattern which takes a tag object and the tagging mode used. + *

+ */ + public interface IAsn1Choice + { + // marker interface + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs.meta new file mode 100644 index 00000000..4dc49e89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: de56f751268603f4888ddf77279fcf49 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Choice.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs new file mode 100644 index 00000000..360aad32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs @@ -0,0 +1,11 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public interface IAsn1Convertible + { + Asn1Object ToAsn1Object(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs.meta new file mode 100644 index 00000000..66f8b489 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bf97a78f07eb4014aa45263238e8a398 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Convertible.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs new file mode 100644 index 00000000..7dafc324 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal interface IAsn1Encoding + { + void Encode(Asn1OutputStream asn1Out); + + int GetLength(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs.meta new file mode 100644 index 00000000..2c769996 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d851edf86d395494aa24a1f97c349e3e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1Encoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs new file mode 100644 index 00000000..e76a8d07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * basic interface for Der string objects. + */ + public interface IAsn1String + { + string GetString(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs.meta new file mode 100644 index 00000000..0cea5c7d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b93f5e1d6fccd954386bdec9ea1f25a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IAsn1String.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs new file mode 100644 index 00000000..777cdbae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + class IndefiniteLengthInputStream + : LimitedInputStream + { + private int _lookAhead; + private bool _eofOn00 = true; + + internal IndefiniteLengthInputStream(Stream inStream, int limit) + : base(inStream, limit) + { + _lookAhead = RequireByte(); + + if (0 == _lookAhead) + { + CheckEndOfContents(); + } + } + + internal void SetEofOn00(bool eofOn00) + { + _eofOn00 = eofOn00; + if (_eofOn00 && 0 == _lookAhead) + { + CheckEndOfContents(); + } + } + + private void CheckEndOfContents() + { + if (0 != RequireByte()) + throw new IOException("malformed end-of-contents marker"); + + _lookAhead = -1; + SetParentEofDetect(); + } + + public override int Read(byte[] buffer, int offset, int count) + { + // Only use this optimisation if we aren't checking for 00 + if (_eofOn00 || count <= 1) + return base.Read(buffer, offset, count); + + if (_lookAhead < 0) + return 0; + + int numRead = _in.Read(buffer, offset + 1, count - 1); + if (numRead <= 0) + throw new EndOfStreamException(); + + buffer[offset] = (byte)_lookAhead; + _lookAhead = RequireByte(); + + return numRead + 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + // Only use this optimisation if we aren't checking for 00 + if (_eofOn00 || buffer.Length <= 1) + return base.Read(buffer); + + if (_lookAhead < 0) + return 0; + + int numRead = _in.Read(buffer[1..]); + if (numRead <= 0) + throw new EndOfStreamException(); + + buffer[0] = (byte)_lookAhead; + _lookAhead = RequireByte(); + + return numRead + 1; + } +#endif + + public override int ReadByte() + { + if (_eofOn00 && _lookAhead <= 0) + { + if (0 == _lookAhead) + { + CheckEndOfContents(); + } + return -1; + } + + int result = _lookAhead; + _lookAhead = RequireByte(); + return result; + } + + private int RequireByte() + { + int b = _in.ReadByte(); + if (b < 0) + throw new EndOfStreamException(); + + return b; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs.meta new file mode 100644 index 00000000..67a84d8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aff1a961cdd1a1646b1d3e70630d9efb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/IndefiniteLengthInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs new file mode 100644 index 00000000..907f26c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + public class LazyAsn1InputStream + : Asn1InputStream + { + public LazyAsn1InputStream(byte[] input) + : base(input) + { + } + + public LazyAsn1InputStream(Stream inputStream) + : base(inputStream) + { + } + + internal LazyAsn1InputStream(Stream input, int limit, byte[][] tmpBuffers) + : base(input, limit, tmpBuffers) + { + } + + internal override Asn1Sequence CreateDLSequence(DefiniteLengthInputStream defIn) + { + return new LazyDLSequence(defIn.ToArray()); + } + + internal override Asn1Set CreateDLSet(DefiniteLengthInputStream defIn) + { + return new LazyDLSet(defIn.ToArray()); + } + + internal override Asn1EncodableVector ReadVector(DefiniteLengthInputStream defIn) + { + int remaining = defIn.Remaining; + if (remaining < 1) + return new Asn1EncodableVector(0); + + return new LazyAsn1InputStream(defIn, remaining, tmpBuffers).ReadVector(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs.meta new file mode 100644 index 00000000..fc990bad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 738018e7fe54f6c4f8d66774e8cfc724 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyASN1InputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs.meta new file mode 100644 index 00000000..e4eaec64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 56ed6e24dde98cd418f75e8e758f9a05 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs.meta new file mode 100644 index 00000000..dccc8e36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92f9ab26b85e3c04cb36692097569df6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDERSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs new file mode 100644 index 00000000..48a36bc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class LazyDLEnumerator + : IEnumerator + { + private readonly byte[] m_contents; + + private Asn1InputStream m_input; + private Asn1Object m_current; + + internal LazyDLEnumerator(byte[] contents) + { + this.m_contents = contents; + + Reset(); + } + + object System.Collections.IEnumerator.Current + { + get { return Current; } + } + + public Asn1Encodable Current + { + get + { + if (null == m_current) + throw new InvalidOperationException(); + + return m_current; + } + } + + public virtual void Dispose() + { + } + + public bool MoveNext() + { + return null != (this.m_current = ReadObject()); + } + + public void Reset() + { + this.m_input = new LazyAsn1InputStream(m_contents); + this.m_current = null; + } + + private Asn1Object ReadObject() + { + try + { + return m_input.ReadObject(); + } + catch (IOException e) + { + throw new Asn1ParsingException("malformed ASN.1: " + e.Message, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs.meta new file mode 100644 index 00000000..20d4f365 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ff80a9d865f46f34d9c6744eff28fba1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLEnumerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs new file mode 100644 index 00000000..1c0302ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs @@ -0,0 +1,129 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class LazyDLSequence + : DLSequence + { + private byte[] encoded; + + internal LazyDLSequence(byte[] encoded) + : base() + { + if (null == encoded) + throw new ArgumentNullException("encoded"); + + this.encoded = encoded; + } + + public override Asn1Encodable this[int index] + { + get + { + Force(); + + return base[index]; + } + } + + public override IEnumerator GetEnumerator() + { + byte[] encoded = GetContents(); + if (null != encoded) + { + return new LazyDLEnumerator(encoded); + } + + return base.GetEnumerator(); + } + + public override int Count + { + get + { + Force(); + + return base.Count; + } + } + + public override Asn1Encodable[] ToArray() + { + Force(); + + return base.ToArray(); + } + + public override string ToString() + { + Force(); + + return base.ToString(); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer == encoding) + { + byte[] encoded = GetContents(); + if (encoded != null) + return new ConstructedLazyDLEncoding(Asn1Tags.Universal, Asn1Tags.Sequence, encoded); + } + else + { + Force(); + } + + return base.GetEncoding(encoding); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer == encoding) + { + byte[] encoded = GetContents(); + if (encoded != null) + return new ConstructedLazyDLEncoding(tagClass, tagNo, encoded); + } + else + { + Force(); + } + + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + } + + private void Force() + { + lock (this) + { + if (null != encoded) + { + Asn1InputStream input = new LazyAsn1InputStream(encoded); + try + { + Asn1EncodableVector v = input.ReadVector(); + + this.elements = v.TakeElements(); + this.encoded = null; + } + catch (IOException e) + { + throw new Asn1ParsingException("malformed ASN.1: " + e.Message, e); + } + } + } + } + + private byte[] GetContents() + { + lock (this) return encoded; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs.meta new file mode 100644 index 00000000..be62f032 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4494807fd9696b841ab30a90e1c62a1c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSequence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs new file mode 100644 index 00000000..25d5ae4b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class LazyDLSet + : DLSet + { + private byte[] encoded; + + internal LazyDLSet(byte[] encoded) + : base() + { + if (null == encoded) + throw new ArgumentNullException("encoded"); + + this.encoded = encoded; + } + + public override Asn1Encodable this[int index] + { + get + { + Force(); + + return base[index]; + } + } + + public override IEnumerator GetEnumerator() + { + byte[] encoded = GetContents(); + if (null != encoded) + return new LazyDLEnumerator(encoded); + + return base.GetEnumerator(); + } + + public override int Count + { + get + { + Force(); + + return base.Count; + } + } + + public override Asn1Encodable[] ToArray() + { + Force(); + + return base.ToArray(); + } + + public override string ToString() + { + Force(); + + return base.ToString(); + } + + internal override IAsn1Encoding GetEncoding(int encoding) + { + if (Asn1OutputStream.EncodingBer == encoding) + { + byte[] encoded = GetContents(); + if (null != encoded) + return new ConstructedLazyDLEncoding(Asn1Tags.Universal, Asn1Tags.Set, encoded); + } + else + { + Force(); + } + + return base.GetEncoding(encoding); + } + + internal override IAsn1Encoding GetEncodingImplicit(int encoding, int tagClass, int tagNo) + { + if (Asn1OutputStream.EncodingBer == encoding) + { + byte[] encoded = GetContents(); + if (null != encoded) + return new ConstructedLazyDLEncoding(tagClass, tagNo, encoded); + } + else + { + Force(); + } + + return base.GetEncodingImplicit(encoding, tagClass, tagNo); + } + + private void Force() + { + lock (this) + { + if (null != encoded) + { + Asn1InputStream input = new LazyAsn1InputStream(encoded); + try + { + Asn1EncodableVector v = input.ReadVector(); + + this.elements = v.TakeElements(); + this.isSorted = elements.Length < 2; + this.encoded = null; + } + catch (IOException e) + { + throw new Asn1ParsingException("malformed ASN.1: " + e.Message, e); + } + } + } + } + + private byte[] GetContents() + { + lock (this) return encoded; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs.meta new file mode 100644 index 00000000..0313c6bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b81af7b123dc024ba1b0bff6f852c89 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LazyDLSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs new file mode 100644 index 00000000..2c1d4876 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal abstract class LimitedInputStream + : BaseInputStream + { + protected readonly Stream _in; + private int _limit; + + internal LimitedInputStream(Stream inStream, int limit) + { + this._in = inStream; + this._limit = limit; + } + + internal virtual int Limit + { + get { return _limit; } + } + + protected void SetParentEofDetect() + { + if (_in is IndefiniteLengthInputStream) + { + ((IndefiniteLengthInputStream)_in).SetEofOn00(true); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs.meta new file mode 100644 index 00000000..420b73e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7b112b2819289440aee03e1ef154f0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/LimitedInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs new file mode 100644 index 00000000..04716058 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + /** + * class for breaking up an Oid into it's component tokens, ala + * java.util.StringTokenizer. We need this class as some of the + * lightweight Java environment don't support classes like + * StringTokenizer. + */ + public class OidTokenizer + { + private string oid; + private int index; + + public OidTokenizer( + string oid) + { + this.oid = oid; + } + + public bool HasMoreTokens + { + get { return index != -1; } + } + + public string NextToken() + { + if (index == -1) + { + return null; + } + + int end = oid.IndexOf('.', index); + if (end == -1) + { + string lastToken = oid.Substring(index); + index = -1; + return lastToken; + } + + string nextToken = oid.Substring(index, end - index); + index = end + 1; + return nextToken; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs.meta new file mode 100644 index 00000000..5f06c1e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 12f21243aaf83f24784fe8e9eb3d5125 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/OidTokenizer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs new file mode 100644 index 00000000..155ba1c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class PrimitiveEncoding + : IAsn1Encoding + { + private readonly int m_tagClass; + private readonly int m_tagNo; + private readonly byte[] m_contentsOctets; + + internal PrimitiveEncoding(int tagClass, int tagNo, byte[] contentsOctets) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_contentsOctets = contentsOctets; + } + + void IAsn1Encoding.Encode(Asn1OutputStream asn1Out) + { + asn1Out.WriteIdentifier(m_tagClass, m_tagNo); + asn1Out.WriteDL(m_contentsOctets.Length); + asn1Out.Write(m_contentsOctets, 0, m_contentsOctets.Length); + } + + int IAsn1Encoding.GetLength() + { + return Asn1OutputStream.GetLengthOfIdentifier(m_tagNo) + + Asn1OutputStream.GetLengthOfDL(m_contentsOctets.Length) + + m_contentsOctets.Length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs.meta new file mode 100644 index 00000000..351dbee3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d4a820e2a7f32e2419201f78cd333979 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs new file mode 100644 index 00000000..fb1a6e07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1 +{ + internal class PrimitiveEncodingSuffixed + : IAsn1Encoding + { + private readonly int m_tagClass; + private readonly int m_tagNo; + private readonly byte[] m_contentsOctets; + private readonly byte m_contentsSuffix; + + internal PrimitiveEncodingSuffixed(int tagClass, int tagNo, byte[] contentsOctets, byte contentsSuffix) + { + m_tagClass = tagClass; + m_tagNo = tagNo; + m_contentsOctets = contentsOctets; + m_contentsSuffix = contentsSuffix; + } + + void IAsn1Encoding.Encode(Asn1OutputStream asn1Out) + { + asn1Out.WriteIdentifier(m_tagClass, m_tagNo); + asn1Out.WriteDL(m_contentsOctets.Length); + asn1Out.Write(m_contentsOctets, 0, m_contentsOctets.Length - 1); + asn1Out.WriteByte(m_contentsSuffix); + } + + int IAsn1Encoding.GetLength() + { + return Asn1OutputStream.GetLengthOfIdentifier(m_tagNo) + + Asn1OutputStream.GetLengthOfDL(m_contentsOctets.Length) + + m_contentsOctets.Length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs.meta new file mode 100644 index 00000000..e935ddf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b60c7413ea350154ab11ed4abed746f9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/PrimitiveEncodingSuffixed.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi.meta new file mode 100644 index 00000000..2d6fd749 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0b6b319a68e38624fa2dd44348593df9 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs new file mode 100644 index 00000000..426dbbf3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi +{ + /// Elliptic curve registry for ANSSI. + public static class AnssiNamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class Frp256v1Holder + : X9ECParametersHolder + { + private Frp256v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Frp256v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger p = FromHex("F1FD178C0B3AD58F10126DE8CE42435B3961ADBCABC8CA6DE8FCF353D86E9C03"); + BigInteger a = FromHex("F1FD178C0B3AD58F10126DE8CE42435B3961ADBCABC8CA6DE8FCF353D86E9C00"); + BigInteger b = FromHex("EE353FCA5428A9300D4ABA754A44C00FDFEC0C9AE4B1A1803075ED967B7BB73F"); + BigInteger n = FromHex("F1FD178C0B3AD58F10126DE8CE42435B53DC67E140D2BF941FFDD459C6D655E1"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04B6B3D4C356C139EB31183D4749D423958C27D2DCAF98B70164C97A2DD98F5CFF6142E0F7C8B204911F9271F0F3ECEF8C2701C307E8E4C9E183115A1554062CFB"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static AnssiNamedCurves() + { + DefineCurve("FRP256v1", AnssiObjectIdentifiers.FRP256v1, Frp256v1Holder.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs.meta new file mode 100644 index 00000000..2372aa61 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9371a6795776fc4b862f472af16f312 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSINamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs new file mode 100644 index 00000000..d75a8de3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi +{ + public sealed class AnssiObjectIdentifiers + { + private AnssiObjectIdentifiers() + { + } + + public static readonly DerObjectIdentifier FRP256v1 = new DerObjectIdentifier("1.2.250.1.223.101.256.1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs.meta new file mode 100644 index 00000000..210a3de4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09497abd67eab674d9ec3d9f98ca94b8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/anssi/ANSSIObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc.meta new file mode 100644 index 00000000..d3e9d6e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 215244200306e0943968033f7dbe9a4a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs new file mode 100644 index 00000000..9d582ea2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs @@ -0,0 +1,252 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC +{ + public abstract class BCObjectIdentifiers + { + /** + * iso.org.dod.internet.private.enterprise.legion-of-the-bouncy-castle + *

1.3.6.1.4.1.22554

+ */ + public static readonly DerObjectIdentifier bc = new DerObjectIdentifier("1.3.6.1.4.1.22554"); + + /** + * pbe(1) algorithms + *

1.3.6.1.4.1.22554.1

+ */ + public static readonly DerObjectIdentifier bc_pbe = bc.Branch("1"); + + /** + * SHA-1(1) + *

1.3.6.1.4.1.22554.1.1

+ */ + public static readonly DerObjectIdentifier bc_pbe_sha1 = bc_pbe.Branch("1"); + + /** SHA-2.SHA-256; 1.3.6.1.4.1.22554.1.2.1 */ + public static readonly DerObjectIdentifier bc_pbe_sha256 = bc_pbe.Branch("2.1"); + /** SHA-2.SHA-384; 1.3.6.1.4.1.22554.1.2.2 */ + public static readonly DerObjectIdentifier bc_pbe_sha384 = bc_pbe.Branch("2.2"); + /** SHA-2.SHA-512; 1.3.6.1.4.1.22554.1.2.3 */ + public static readonly DerObjectIdentifier bc_pbe_sha512 = bc_pbe.Branch("2.3"); + /** SHA-2.SHA-224; 1.3.6.1.4.1.22554.1.2.4 */ + public static readonly DerObjectIdentifier bc_pbe_sha224 = bc_pbe.Branch("2.4"); + + /** + * PKCS-5(1)|PKCS-12(2) + */ + /** SHA-1.PKCS5; 1.3.6.1.4.1.22554.1.1.1 */ + public static readonly DerObjectIdentifier bc_pbe_sha1_pkcs5 = bc_pbe_sha1.Branch("1"); + /** SHA-1.PKCS12; 1.3.6.1.4.1.22554.1.1.2 */ + public static readonly DerObjectIdentifier bc_pbe_sha1_pkcs12 = bc_pbe_sha1.Branch("2"); + + /** SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.1 */ + public static readonly DerObjectIdentifier bc_pbe_sha256_pkcs5 = bc_pbe_sha256.Branch("1"); + /** SHA-256.PKCS12; 1.3.6.1.4.1.22554.1.2.1.2 */ + public static readonly DerObjectIdentifier bc_pbe_sha256_pkcs12 = bc_pbe_sha256.Branch("2"); + + /** + * AES(1) . (CBC-128(2)|CBC-192(22)|CBC-256(42)) + */ + /** 1.3.6.1.4.1.22554.1.1.2.1.2 */ + public static readonly DerObjectIdentifier bc_pbe_sha1_pkcs12_aes128_cbc = bc_pbe_sha1_pkcs12.Branch("1.2"); + /** 1.3.6.1.4.1.22554.1.1.2.1.22 */ + public static readonly DerObjectIdentifier bc_pbe_sha1_pkcs12_aes192_cbc = bc_pbe_sha1_pkcs12.Branch("1.22"); + /** 1.3.6.1.4.1.22554.1.1.2.1.42 */ + public static readonly DerObjectIdentifier bc_pbe_sha1_pkcs12_aes256_cbc = bc_pbe_sha1_pkcs12.Branch("1.42"); + + /** 1.3.6.1.4.1.22554.1.1.2.2.2 */ + public static readonly DerObjectIdentifier bc_pbe_sha256_pkcs12_aes128_cbc = bc_pbe_sha256_pkcs12.Branch("1.2"); + /** 1.3.6.1.4.1.22554.1.1.2.2.22 */ + public static readonly DerObjectIdentifier bc_pbe_sha256_pkcs12_aes192_cbc = bc_pbe_sha256_pkcs12.Branch("1.22"); + /** 1.3.6.1.4.1.22554.1.1.2.2.42 */ + public static readonly DerObjectIdentifier bc_pbe_sha256_pkcs12_aes256_cbc = bc_pbe_sha256_pkcs12.Branch("1.42"); + + /** + * signature(2) algorithms + */ + public static readonly DerObjectIdentifier bc_sig = bc.Branch("2"); + + /** + * Sphincs-256 + */ + public static readonly DerObjectIdentifier sphincs256 = bc_sig.Branch("1"); + public static readonly DerObjectIdentifier sphincs256_with_BLAKE512 = sphincs256.Branch("1"); + public static readonly DerObjectIdentifier sphincs256_with_SHA512 = sphincs256.Branch("2"); + public static readonly DerObjectIdentifier sphincs256_with_SHA3_512 = sphincs256.Branch("3"); + + /** + * XMSS + */ + public static readonly DerObjectIdentifier xmss = bc_sig.Branch("2"); + public static readonly DerObjectIdentifier xmss_with_SHA256 = xmss.Branch("1"); + public static readonly DerObjectIdentifier xmss_with_SHA512 = xmss.Branch("2"); + public static readonly DerObjectIdentifier xmss_with_SHAKE128 = xmss.Branch("3"); + public static readonly DerObjectIdentifier xmss_with_SHAKE256 = xmss.Branch("4"); + + /** + * XMSS^MT + */ + public static readonly DerObjectIdentifier xmss_mt = bc_sig.Branch("3"); + public static readonly DerObjectIdentifier xmss_mt_with_SHA256 = xmss_mt.Branch("1"); + public static readonly DerObjectIdentifier xmss_mt_with_SHA512 = xmss_mt.Branch("2"); + public static readonly DerObjectIdentifier xmss_mt_with_SHAKE128 = xmss_mt.Branch("3"); + public static readonly DerObjectIdentifier xmss_mt_with_SHAKE256 = xmss_mt.Branch("4"); + + /** + * SPHINCS+ + */ + public static readonly DerObjectIdentifier sphincsPlus = bc_sig.Branch("5"); + public static readonly DerObjectIdentifier sphincsPlus_shake_256 = sphincsPlus.Branch("1"); + public static readonly DerObjectIdentifier sphincsPlus_sha_256 = sphincsPlus.Branch("2"); + public static readonly DerObjectIdentifier sphincsPlus_sha_512 = sphincsPlus.Branch("3"); + + /** + * Picnic + */ + public static readonly DerObjectIdentifier picnic = bc_sig.Branch("6"); + public static readonly DerObjectIdentifier picnicl1fs = picnic.Branch("1"); + public static readonly DerObjectIdentifier picnicl1ur = picnic.Branch("2"); + public static readonly DerObjectIdentifier picnicl3fs = picnic.Branch("3"); + public static readonly DerObjectIdentifier picnicl3ur = picnic.Branch("4"); + public static readonly DerObjectIdentifier picnicl5fs = picnic.Branch("5"); + public static readonly DerObjectIdentifier picnicl5ur = picnic.Branch("6"); + public static readonly DerObjectIdentifier picnic3l1 = picnic.Branch("7"); + public static readonly DerObjectIdentifier picnic3l3 = picnic.Branch("8"); + public static readonly DerObjectIdentifier picnic3l5 = picnic.Branch("9"); + public static readonly DerObjectIdentifier picnicl1full = picnic.Branch("10"); + public static readonly DerObjectIdentifier picnicl3full = picnic.Branch("11"); + public static readonly DerObjectIdentifier picnicl5full = picnic.Branch("12"); + + /* + * Falcon + */ + public static readonly DerObjectIdentifier falcon = bc_sig.Branch("7"); + + public static readonly DerObjectIdentifier falcon_512 = new DerObjectIdentifier("1.3.9999.3.1"); // falcon.branch("1"); + public static readonly DerObjectIdentifier falcon_1024 = new DerObjectIdentifier("1.3.9999.3.4"); // falcon.branch("2"); + + /* + * Dilithium + */ + public static readonly DerObjectIdentifier dilithium = bc_sig.Branch("8"); + + // OpenSSL OIDs + public static readonly DerObjectIdentifier dilithium2 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.7.4.4"); // dilithium.branch("1"); + public static readonly DerObjectIdentifier dilithium3 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.7.6.5"); // dilithium.branch("2"); + public static readonly DerObjectIdentifier dilithium5 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.7.8.7"); // dilithium.branch("3"); + public static readonly DerObjectIdentifier dilithium2_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.11.4.4"); // dilithium.branch("4"); + public static readonly DerObjectIdentifier dilithium3_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.11.6.5"); // dilithium.branch("5"); + public static readonly DerObjectIdentifier dilithium5_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.11.8.7"); // dilithium.branch("6"); + + + /** + * key_exchange(3) algorithms + */ + public static readonly DerObjectIdentifier bc_exch = bc.Branch("3"); + + /** + * NewHope + */ + public static readonly DerObjectIdentifier newHope = bc_exch.Branch("1"); + + /** + * X.509 extension(4) values + *

+ * 1.3.6.1.4.1.22554.4 + */ + public static readonly DerObjectIdentifier bc_ext = bc.Branch("4"); + + public static readonly DerObjectIdentifier linkedCertificate = bc_ext.Branch("1"); + + /** + * KEM(4) algorithms + */ + public static readonly DerObjectIdentifier bc_kem = bc.Branch("5"); + + /** + * Classic McEliece + */ + public static readonly DerObjectIdentifier pqc_kem_mceliece = bc_kem.Branch("1"); + + public static readonly DerObjectIdentifier mceliece348864_r3 = pqc_kem_mceliece.Branch("1"); + public static readonly DerObjectIdentifier mceliece348864f_r3 = pqc_kem_mceliece.Branch("2"); + public static readonly DerObjectIdentifier mceliece460896_r3 = pqc_kem_mceliece.Branch("3"); + public static readonly DerObjectIdentifier mceliece460896f_r3 = pqc_kem_mceliece.Branch("4"); + public static readonly DerObjectIdentifier mceliece6688128_r3 = pqc_kem_mceliece.Branch("5"); + public static readonly DerObjectIdentifier mceliece6688128f_r3 = pqc_kem_mceliece.Branch("6"); + public static readonly DerObjectIdentifier mceliece6960119_r3 = pqc_kem_mceliece.Branch("7"); + public static readonly DerObjectIdentifier mceliece6960119f_r3 = pqc_kem_mceliece.Branch("8"); + public static readonly DerObjectIdentifier mceliece8192128_r3 = pqc_kem_mceliece.Branch("9"); + public static readonly DerObjectIdentifier mceliece8192128f_r3 = pqc_kem_mceliece.Branch("10"); + + /** + * SABER + */ + public static readonly DerObjectIdentifier pqc_kem_saber = bc_kem.Branch("3"); + public static readonly DerObjectIdentifier lightsaberkem128r3 = pqc_kem_saber.Branch("1"); + public static readonly DerObjectIdentifier saberkem128r3 = pqc_kem_saber.Branch("2"); + public static readonly DerObjectIdentifier firesaberkem128r3 = pqc_kem_saber.Branch("3"); + public static readonly DerObjectIdentifier lightsaberkem192r3 = pqc_kem_saber.Branch("4"); + public static readonly DerObjectIdentifier saberkem192r3 = pqc_kem_saber.Branch("5"); + public static readonly DerObjectIdentifier firesaberkem192r3 = pqc_kem_saber.Branch("6"); + public static readonly DerObjectIdentifier lightsaberkem256r3 = pqc_kem_saber.Branch("7"); + public static readonly DerObjectIdentifier saberkem256r3 = pqc_kem_saber.Branch("8"); + public static readonly DerObjectIdentifier firesaberkem256r3 = pqc_kem_saber.Branch("9"); + public static readonly DerObjectIdentifier ulightsaberkemr3 = pqc_kem_saber.Branch("10"); + public static readonly DerObjectIdentifier usaberkemr3 = pqc_kem_saber.Branch("11"); + public static readonly DerObjectIdentifier ufiresaberkemr3 = pqc_kem_saber.Branch("12"); + public static readonly DerObjectIdentifier lightsaberkem90sr3 = pqc_kem_saber.Branch("13"); + public static readonly DerObjectIdentifier saberkem90sr3 = pqc_kem_saber.Branch("14"); + public static readonly DerObjectIdentifier firesaberkem90sr3 = pqc_kem_saber.Branch("15"); + public static readonly DerObjectIdentifier ulightsaberkem90sr3 = pqc_kem_saber.Branch("16"); + public static readonly DerObjectIdentifier usaberkem90sr3 = pqc_kem_saber.Branch("17"); + public static readonly DerObjectIdentifier ufiresaberkem90sr3 = pqc_kem_saber.Branch("18"); + + /** + * SIKE + */ + public static readonly DerObjectIdentifier pqc_kem_sike = bc_kem.Branch("4"); + public static readonly DerObjectIdentifier sikep434 = pqc_kem_sike.Branch("1"); + public static readonly DerObjectIdentifier sikep503 = pqc_kem_sike.Branch("2"); + public static readonly DerObjectIdentifier sikep610 = pqc_kem_sike.Branch("3"); + public static readonly DerObjectIdentifier sikep751 = pqc_kem_sike.Branch("4"); + public static readonly DerObjectIdentifier sikep434_compressed = pqc_kem_sike.Branch("5"); + public static readonly DerObjectIdentifier sikep503_compressed = pqc_kem_sike.Branch("6"); + public static readonly DerObjectIdentifier sikep610_compressed = pqc_kem_sike.Branch("7"); + public static readonly DerObjectIdentifier sikep751_compressed = pqc_kem_sike.Branch("8"); + + /** + * Kyber + */ + public static readonly DerObjectIdentifier pqc_kem_kyber = bc_kem.Branch("6"); + + public static readonly DerObjectIdentifier kyber512 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.8.2.2"); // pqc_kem_kyber.Branch("1"); + public static readonly DerObjectIdentifier kyber768 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.8.3.3"); // pqc_kem_kyber.Branch("2"); + public static readonly DerObjectIdentifier kyber1024 = new DerObjectIdentifier("1.3.6.1.4.1.2.267.8.4.4"); // pqc_kem_kyber.Branch("3"); + public static readonly DerObjectIdentifier kyber512_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.10.2.2"); // pqc_kem_kyber.Branch("4"); + public static readonly DerObjectIdentifier kyber768_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.10.3.3"); // pqc_kem_kyber.Branch("5"); + public static readonly DerObjectIdentifier kyber1024_aes = new DerObjectIdentifier("1.3.6.1.4.1.2.267.10.4.4"); // pqc_kem_kyber.Branch("6"); + + /** + * BIKE + */ + public static readonly DerObjectIdentifier pqc_kem_bike = bc_kem.Branch("8"); + + public static readonly DerObjectIdentifier bike128 = pqc_kem_bike.Branch("1"); + public static readonly DerObjectIdentifier bike192 = pqc_kem_bike.Branch("2"); + public static readonly DerObjectIdentifier bike256 = pqc_kem_bike.Branch("3"); + + /** + * HQC + */ + public static readonly DerObjectIdentifier pqc_kem_hqc = bc_kem.Branch("9"); + + public static readonly DerObjectIdentifier hqc128 = pqc_kem_hqc.Branch("1"); + public static readonly DerObjectIdentifier hqc192 = pqc_kem_hqc.Branch("2"); + public static readonly DerObjectIdentifier hqc256 = pqc_kem_hqc.Branch("3"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs.meta new file mode 100644 index 00000000..e9359c01 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 84d050018d48c5142a254b8d048bd9b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/BCObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs new file mode 100644 index 00000000..6b5c298a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC +{ + /** + * Extension to tie an alternate certificate to the containing certificate. + *

+     *     LinkedCertificate := SEQUENCE {
+     *         digest        DigestInfo,                   -- digest of PQC certificate
+     *         certLocation  GeneralName,                  -- location of PQC certificate
+     *         certIssuer    [0] Name OPTIONAL,            -- issuer of PQC cert (if different from current certificate)
+     *         cACerts       [1] GeneralNames OPTIONAL,    -- CA certificates for PQC cert (one of more locations)
+     * }
+     * 
+ */ + public class LinkedCertificate + : Asn1Encodable + { + private readonly DigestInfo mDigest; + private readonly GeneralName mCertLocation; + + private X509Name mCertIssuer; + private GeneralNames mCACerts; + + public LinkedCertificate(DigestInfo digest, GeneralName certLocation) + : this(digest, certLocation, null, null) + { + } + + public LinkedCertificate(DigestInfo digest, GeneralName certLocation, X509Name certIssuer, GeneralNames caCerts) + { + this.mDigest = digest; + this.mCertLocation = certLocation; + this.mCertIssuer = certIssuer; + this.mCACerts = caCerts; + } + + private LinkedCertificate(Asn1Sequence seq) + { + this.mDigest = DigestInfo.GetInstance(seq[0]); + this.mCertLocation = GeneralName.GetInstance(seq[1]); + + for (int i = 2; i < seq.Count; ++i) + { + Asn1TaggedObject tagged = Asn1TaggedObject.GetInstance(seq[i]); + + switch (tagged.TagNo) + { + case 0: + this.mCertIssuer = X509Name.GetInstance(tagged, false); + break; + case 1: + this.mCACerts = GeneralNames.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("unknown tag in tagged field"); + } + } + } + + public static LinkedCertificate GetInstance(object obj) + { + if (obj is LinkedCertificate) + return (LinkedCertificate)obj; + if (obj != null) + return new LinkedCertificate(Asn1Sequence.GetInstance(obj)); + return null; + } + + public virtual DigestInfo Digest + { + get { return mDigest; } + } + + public virtual GeneralName CertLocation + { + get { return mCertLocation; } + } + + public virtual X509Name CertIssuer + { + get { return mCertIssuer; } + } + + public virtual GeneralNames CACerts + { + get { return mCACerts; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(mDigest, mCertLocation); + v.AddOptionalTagged(false, 0, mCertIssuer); + v.AddOptionalTagged(false, 1, mCACerts); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs.meta new file mode 100644 index 00000000..e9e89e74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e370f5bf43973e4592dc199e6edb38f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bc/LinkedCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi.meta new file mode 100644 index 00000000..7c3c43a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 794149a9b99e3cf42829d6238b14579d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs new file mode 100644 index 00000000..c138365b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs @@ -0,0 +1,106 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi +{ + /// See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf + public abstract class BsiObjectIdentifiers + { + public static readonly DerObjectIdentifier bsi_de = new DerObjectIdentifier("0.4.0.127.0.7"); + + /* 0.4.0.127.0.7.1.1 */ + public static readonly DerObjectIdentifier id_ecc = bsi_de.Branch("1.1"); + + /* 0.4.0.127.0.7.1.1.4.1 */ + public static readonly DerObjectIdentifier ecdsa_plain_signatures = id_ecc.Branch("4.1"); + + /* 0.4.0.127.0.7.1.1.4.1.1 */ + public static readonly DerObjectIdentifier ecdsa_plain_SHA1 = ecdsa_plain_signatures.Branch("1"); + + /* 0.4.0.127.0.7.1.1.4.1.2 */ + public static readonly DerObjectIdentifier ecdsa_plain_SHA224 = ecdsa_plain_signatures.Branch("2"); + + /* 0.4.0.127.0.7.1.1.4.1.3 */ + public static readonly DerObjectIdentifier ecdsa_plain_SHA256 = ecdsa_plain_signatures.Branch("3"); + + /* 0.4.0.127.0.7.1.1.4.1.4 */ + public static readonly DerObjectIdentifier ecdsa_plain_SHA384 = ecdsa_plain_signatures.Branch("4"); + + /* 0.4.0.127.0.7.1.1.4.1.5 */ + public static readonly DerObjectIdentifier ecdsa_plain_SHA512 = ecdsa_plain_signatures.Branch("5"); + + /* 0.4.0.127.0.7.1.1.4.1.6 */ + public static readonly DerObjectIdentifier ecdsa_plain_RIPEMD160 = ecdsa_plain_signatures.Branch("6"); + + /** 0.4.0.127.0.7.1 */ + public static readonly DerObjectIdentifier algorithm = bsi_de.Branch("1"); + + public static readonly DerObjectIdentifier ecka_eg = id_ecc.Branch("5.1"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf = ecka_eg.Branch("1"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function SHA-1 + * OID: 0.4.0.127.0.7.1.1.5.1.1.1 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA1 = ecka_eg_X963kdf.Branch("1"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function SHA224 + * OID: 0.4.0.127.0.7.1.1.5.1.1.2 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA224 = ecka_eg_X963kdf.Branch("2"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function SHA256 + * OID: 0.4.0.127.0.7.1.1.5.1.1.3 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA256 = ecka_eg_X963kdf.Branch("3"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function SHA384 + * OID: 0.4.0.127.0.7.1.1.5.1.1.4 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA384 = ecka_eg_X963kdf.Branch("4"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function SHA512 + * OID: 0.4.0.127.0.7.1.1.5.1.1.5 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA512 = ecka_eg_X963kdf.Branch("5"); + + /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 + * with hash function RIPEMD160 + * OID: 0.4.0.127.0.7.1.1.5.1.1.6 */ + public static readonly DerObjectIdentifier ecka_eg_X963kdf_RIPEMD160 = ecka_eg_X963kdf.Branch("6"); + + /** + * Key Derivation Function for Session Keys + */ + public static readonly DerObjectIdentifier ecka_eg_SessionKDF = ecka_eg.Branch("2"); + + public static readonly DerObjectIdentifier ecka_eg_SessionKDF_3DES = ecka_eg_SessionKDF.Branch("1"); + public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES128 = ecka_eg_SessionKDF.Branch("2"); + public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES192 = ecka_eg_SessionKDF.Branch("3"); + public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES256 = ecka_eg_SessionKDF.Branch("4"); + + /* AES encryption (CBC) and authentication (CMAC) + * OID: 0.4.0.127.0.7.1.x */ + //TODO: replace "1" with correct OID + //public static readonly DerObjectIdentifier aes_cbc_cmac = algorithm.Branch("1"); + + /* AES encryption (CBC) and authentication (CMAC) with 128 bit + * OID: 0.4.0.127.0.7.1.x.y1 */ + //TODO: replace "1" with correct OID + //public static readonly DerObjectIdentifier id_aes128_CBC_CMAC = aes_cbc_cmac.Branch("1"); + + /* AES encryption (CBC) and authentication (CMAC) with 192 bit + * OID: 0.4.0.127.0.7.1.x.y2 */ + //TODO: replace "1" with correct OID + //public static readonly DerObjectIdentifier id_aes192_CBC_CMAC = aes_cbc_cmac.Branch("1"); + + /* AES encryption (CBC) and authentication (CMAC) with 256 bit + * OID: 0.4.0.127.0.7.1.x.y3 */ + //TODO: replace "1" with correct OID + //public static readonly DerObjectIdentifier id_aes256_CBC_CMAC = aes_cbc_cmac.Branch("1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs.meta new file mode 100644 index 00000000..6228d21a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c9ae4b1a1eb02554091aa25ad48ca7d7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/bsi/BsiObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp.meta new file mode 100644 index 00000000..6c5f1e37 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0adb45ec3ca28424b8d3f7f5f3dcbff4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs new file mode 100644 index 00000000..6f390a74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CAKeyUpdAnnContent + : Asn1Encodable + { + public static CAKeyUpdAnnContent GetInstance(object obj) + { + if (obj is CAKeyUpdAnnContent content) + return content; + + if (obj is Asn1Sequence seq) + return new CAKeyUpdAnnContent(seq); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + private readonly CmpCertificate m_oldWithNew; + private readonly CmpCertificate m_newWithOld; + private readonly CmpCertificate m_newWithNew; + + private CAKeyUpdAnnContent(Asn1Sequence seq) + { + m_oldWithNew = CmpCertificate.GetInstance(seq[0]); + m_newWithOld = CmpCertificate.GetInstance(seq[1]); + m_newWithNew = CmpCertificate.GetInstance(seq[2]); + } + + public virtual CmpCertificate OldWithNew => m_oldWithNew; + + public virtual CmpCertificate NewWithOld => m_newWithOld; + + public virtual CmpCertificate NewWithNew => m_newWithNew; + + /** + *
+		 * CAKeyUpdAnnContent ::= SEQUENCE {
+		 *                             oldWithNew   CmpCertificate, -- old pub signed with new priv
+		 *                             newWithOld   CmpCertificate, -- new pub signed with old priv
+		 *                             newWithNew   CmpCertificate  -- new pub signed with new priv
+		 *  }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(m_oldWithNew, m_newWithOld, m_newWithNew); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs.meta new file mode 100644 index 00000000..fa4e57dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 57d4f662ef9f4e94c8f85ae891f3b22c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CAKeyUpdAnnContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs new file mode 100644 index 00000000..9d4229aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * CertAnnContent ::= CMPCertificate + */ + public class CertAnnContent + : CmpCertificate + { + public static new CertAnnContent GetInstance(object obj) + { + // TODO[cmp] + if (obj == null) + return null; + + if (obj is CertAnnContent content) + return content; + + if (obj is CmpCertificate cmpCertificate) + return GetInstance(cmpCertificate.GetEncoded()); + + if (obj is byte[] bs) + { + try + { + obj = Asn1Object.FromByteArray(bs); + } + catch (IOException) + { + throw new ArgumentException("Invalid encoding in CertAnnContent"); + } + } + + if (obj is Asn1Sequence) + return new CertAnnContent(X509CertificateStructure.GetInstance(obj)); + + // TODO[cmp] + if (obj is Asn1TaggedObject taggedObject) + return new CertAnnContent(taggedObject.TagNo, taggedObject.GetObject()); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static new CertAnnContent GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + // TODO[cmp] + if (taggedObject == null) + return null; + + if (!declaredExplicit) + throw new ArgumentException("tag must be explicit"); + + // TODO[cmp] + return GetInstance(taggedObject.GetObject()); + } + + public CertAnnContent(int type, Asn1Object otherCert) + : base(type, otherCert) + { + } + + public CertAnnContent(X509CertificateStructure x509v3PKCert) + : base(x509v3PKCert) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs.meta new file mode 100644 index 00000000..05672327 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5528beb2cf14d3f4b8fe42441aa9eed6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertAnnContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs new file mode 100644 index 00000000..95bee7ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertConfirmContent + : Asn1Encodable + { + public static CertConfirmContent GetInstance(object obj) + { + if (obj is CertConfirmContent content) + return content; + + if (obj is Asn1Sequence seq) + return new CertConfirmContent(seq); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + private readonly Asn1Sequence m_content; + + private CertConfirmContent(Asn1Sequence seq) + { + m_content = seq; + } + + public virtual CertStatus[] ToCertStatusArray() + { + return m_content.MapElements(CertStatus.GetInstance); + } + + /** + *
+		 * CertConfirmContent ::= SEQUENCE OF CertStatus
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs.meta new file mode 100644 index 00000000..69713eb6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 806651b6f8cc9794e89ef40e3281c494 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertConfirmContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs new file mode 100644 index 00000000..f2938900 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertOrEncCert + : Asn1Encodable, IAsn1Choice + { + public static CertOrEncCert GetInstance(object obj) + { + if (obj is CertOrEncCert certOrEncCert) + return certOrEncCert; + + if (obj is Asn1TaggedObject taggedObject) + return new CertOrEncCert(taggedObject); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + private readonly CmpCertificate m_certificate; + private readonly EncryptedKey m_encryptedCert; + + private CertOrEncCert(Asn1TaggedObject taggedObject) + { + if (taggedObject.TagNo == 0) + { + m_certificate = CmpCertificate.GetInstance(taggedObject.GetObject()); + } + else if (taggedObject.TagNo == 1) + { + m_encryptedCert = EncryptedKey.GetInstance(taggedObject.GetObject()); + } + else + { + throw new ArgumentException("unknown tag: " + taggedObject.TagNo, nameof(taggedObject)); + } + } + + public CertOrEncCert(CmpCertificate certificate) + { + if (certificate == null) + throw new ArgumentNullException(nameof(certificate)); + + m_certificate = certificate; + } + + public CertOrEncCert(EncryptedValue encryptedValue) + { + if (encryptedValue == null) + throw new ArgumentNullException(nameof(encryptedValue)); + + m_encryptedCert = new EncryptedKey(encryptedValue); + } + + public CertOrEncCert(EncryptedKey encryptedKey) + { + if (encryptedKey == null) + throw new ArgumentNullException(nameof(encryptedKey)); + + m_encryptedCert = encryptedKey; + } + + public virtual CmpCertificate Certificate => m_certificate; + + public virtual EncryptedKey EncryptedCert => m_encryptedCert; + + /** + *
+		 * CertOrEncCert ::= CHOICE {
+		 *                      certificate     [0] CMPCertificate,
+		 *                      encryptedCert   [1] EncryptedKey
+		 *           }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + if (m_certificate != null) + return new DerTaggedObject(true, 0, m_certificate); + + return new DerTaggedObject(true, 1, m_encryptedCert); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs.meta new file mode 100644 index 00000000..d6ea7430 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a143c3b2ffb42f94c841a934c47faa04 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertOrEncCert.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs new file mode 100644 index 00000000..a3498829 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertRepMessage + : Asn1Encodable + { + public static CertRepMessage GetInstance(object obj) + { + if (obj is CertRepMessage certRepMessage) + return certRepMessage; + + if (obj != null) + return new CertRepMessage(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_caPubs; + private readonly Asn1Sequence m_response; + + private CertRepMessage(Asn1Sequence seq) + { + int index = 0; + + if (seq.Count > 1) + { + m_caPubs = Asn1Sequence.GetInstance((Asn1TaggedObject)seq[index++], true); + } + + m_response = Asn1Sequence.GetInstance(seq[index]); + } + + public CertRepMessage(CmpCertificate[] caPubs, CertResponse[] response) + { + if (response == null) + throw new ArgumentNullException(nameof(response)); + + if (caPubs != null) + { + m_caPubs = new DerSequence(caPubs); + } + + m_response = new DerSequence(response); + } + + public virtual CmpCertificate[] GetCAPubs() + { + return m_caPubs == null ? null : m_caPubs.MapElements(CmpCertificate.GetInstance); + } + + public virtual CertResponse[] GetResponse() + { + return m_response.MapElements(CertResponse.GetInstance); + } + + /** + *
+		 * CertRepMessage ::= SEQUENCE {
+		 *                          caPubs       [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
+		 *                                                                             OPTIONAL,
+		 *                          response         SEQUENCE OF CertResponse
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(2); + v.AddOptionalTagged(true, 1, m_caPubs); + v.Add(m_response); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs.meta new file mode 100644 index 00000000..68d4c4ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1d20678a246c7e94a812b42475ff5992 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertRepMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs new file mode 100644 index 00000000..fcbe3c26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * GenMsg: {id-it 19}, < absent > + * GenRep: {id-it 19}, CertReqTemplateContent | < absent > + *

+ * CertReqTemplateValue ::= CertReqTemplateContent + *

+ * CertReqTemplateContent ::= SEQUENCE { + * certTemplate CertTemplate, + * keySpec Controls OPTIONAL } + *

+ * Controls ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue + *

+ */ + public class CertReqTemplateContent + : Asn1Encodable + { + public static CertReqTemplateContent GetInstance(object obj) + { + if (obj is CertReqTemplateContent certReqTemplateContent) + return certReqTemplateContent; + + if (obj != null) + return new CertReqTemplateContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly CertTemplate m_certTemplate; + private readonly Asn1Sequence m_keySpec; + + private CertReqTemplateContent(Asn1Sequence seq) + { + if (seq.Count != 1 && seq.Count != 2) + throw new ArgumentException("expected sequence size of 1 or 2"); + + m_certTemplate = CertTemplate.GetInstance(seq[0]); + + if (seq.Count > 1) + { + m_keySpec = Asn1Sequence.GetInstance(seq[1]); + } + } + + public CertReqTemplateContent(CertTemplate certTemplate, Asn1Sequence keySpec) + { + m_certTemplate = certTemplate; + m_keySpec = keySpec; + } + + public virtual CertTemplate CertTemplate => m_certTemplate; + + public virtual Asn1Sequence KeySpec => m_keySpec; + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certTemplate); + v.AddOptional(m_keySpec); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs.meta new file mode 100644 index 00000000..76e5599b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07b23d09e986bb142a18b0598079970f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertReqTemplateContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs new file mode 100644 index 00000000..d15534c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertResponse + : Asn1Encodable + { + public static CertResponse GetInstance(object obj) + { + if (obj is CertResponse certResponse) + return certResponse; + + if (obj != null) + return new CertResponse(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly DerInteger m_certReqId; + private readonly PkiStatusInfo m_status; + private readonly CertifiedKeyPair m_certifiedKeyPair; + private readonly Asn1OctetString m_rspInfo; + + private CertResponse(Asn1Sequence seq) + { + m_certReqId = DerInteger.GetInstance(seq[0]); + m_status = PkiStatusInfo.GetInstance(seq[1]); + + if (seq.Count >= 3) + { + if (seq.Count == 3) + { + Asn1Encodable o = seq[2]; + if (o is Asn1OctetString) + { + m_rspInfo = Asn1OctetString.GetInstance(o); + } + else + { + m_certifiedKeyPair = CertifiedKeyPair.GetInstance(o); + } + } + else + { + m_certifiedKeyPair = CertifiedKeyPair.GetInstance(seq[2]); + m_rspInfo = Asn1OctetString.GetInstance(seq[3]); + } + } + } + + public CertResponse(DerInteger certReqId, PkiStatusInfo status) + : this(certReqId, status, null, null) + { + } + + public CertResponse(DerInteger certReqId, PkiStatusInfo status, CertifiedKeyPair certifiedKeyPair, + Asn1OctetString rspInfo) + { + if (certReqId == null) + throw new ArgumentNullException(nameof(certReqId)); + + if (status == null) + throw new ArgumentNullException(nameof(status)); + + m_certReqId = certReqId; + m_status = status; + m_certifiedKeyPair = certifiedKeyPair; + m_rspInfo = rspInfo; + } + + public virtual DerInteger CertReqID => m_certReqId; + + public virtual PkiStatusInfo Status => m_status; + + public virtual CertifiedKeyPair CertifiedKeyPair => m_certifiedKeyPair; + + /** + *
+		 * CertResponse ::= SEQUENCE {
+		 *                            certReqId           INTEGER,
+		 *                            -- to match this response with corresponding request (a value
+		 *                            -- of -1 is to be used if certReqId is not specified in the
+		 *                            -- corresponding request)
+		 *                            status              PKIStatusInfo,
+		 *                            certifiedKeyPair    CertifiedKeyPair    OPTIONAL,
+		 *                            rspInfo             OCTET STRING        OPTIONAL
+		 *                            -- analogous to the id-regInfo-utf8Pairs string defined
+		 *                            -- for regInfo in CertReqMsg [CRMF]
+		 *             }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certReqId, m_status); + v.AddOptional(m_certifiedKeyPair, m_rspInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs.meta new file mode 100644 index 00000000..7b1b9085 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 01689c05e132a6548ac537485333564a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs new file mode 100644 index 00000000..9b9e11cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertStatus + : Asn1Encodable + { + public static CertStatus GetInstance(object obj) + { + if (obj is CertStatus certStatus) + return certStatus; + + if (obj != null) + return new CertStatus(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1OctetString m_certHash; + private readonly DerInteger m_certReqID; + private readonly PkiStatusInfo m_statusInfo; + private readonly AlgorithmIdentifier m_hashAlg; + + private CertStatus(Asn1Sequence seq) + { + m_certHash = Asn1OctetString.GetInstance(seq[0]); + m_certReqID = DerInteger.GetInstance(seq[1]); + + if (seq.Count > 2) + { + for (int t = 2; t < seq.Count; t++) + { + Asn1Object p = seq[t].ToAsn1Object(); + if (p is Asn1Sequence s) + { + m_statusInfo = PkiStatusInfo.GetInstance(s); + } + if (p is Asn1TaggedObject dto) + { + if (dto.TagNo != 0) + throw new ArgumentException("unknown tag " + dto.TagNo); + + m_hashAlg = AlgorithmIdentifier.GetInstance(dto, true); + } + } + } + } + + public CertStatus(byte[] certHash, BigInteger certReqID) + { + m_certHash = new DerOctetString(certHash); + m_certReqID = new DerInteger(certReqID); + } + + public CertStatus(byte[] certHash, BigInteger certReqID, PkiStatusInfo statusInfo) + { + m_certHash = new DerOctetString(certHash); + m_certReqID = new DerInteger(certReqID); + m_statusInfo = statusInfo; + } + + public CertStatus(byte[] certHash, BigInteger certReqID, PkiStatusInfo statusInfo, AlgorithmIdentifier hashAlg) + { + m_certHash = new DerOctetString(certHash); + m_certReqID = new DerInteger(certReqID); + m_statusInfo = statusInfo; + m_hashAlg = hashAlg; + } + + public virtual Asn1OctetString CertHash => m_certHash; + + public virtual DerInteger CertReqID => m_certReqID; + + public virtual PkiStatusInfo StatusInfo => m_statusInfo; + + public virtual AlgorithmIdentifier HashAlg => m_hashAlg; + + /** + *
+         *
+         *  CertStatus ::= SEQUENCE {
+         *     certHash    OCTET STRING,
+         *     certReqId   INTEGER,
+         *     statusInfo  PKIStatusInfo OPTIONAL,
+         *     hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}} OPTIONAL
+         *   }
+         *
+         * 
+ * + * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certHash, m_certReqID); + v.AddOptional(m_statusInfo); + v.AddOptionalTagged(true, 0, m_hashAlg); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs.meta new file mode 100644 index 00000000..5914174e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0efe7846acc4774418d88c81a9f46a55 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs new file mode 100644 index 00000000..0677d9e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs @@ -0,0 +1,102 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CertifiedKeyPair + : Asn1Encodable + { + public static CertifiedKeyPair GetInstance(object obj) + { + if (obj is CertifiedKeyPair certifiedKeyPair) + return certifiedKeyPair; + + if (obj != null) + return new CertifiedKeyPair(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly CertOrEncCert m_certOrEncCert; + private readonly EncryptedKey m_privateKey; + private readonly PkiPublicationInfo m_publicationInfo; + + private CertifiedKeyPair(Asn1Sequence seq) + { + m_certOrEncCert = CertOrEncCert.GetInstance(seq[0]); + + if (seq.Count >= 2) + { + if (seq.Count == 2) + { + Asn1TaggedObject tagged = Asn1TaggedObject.GetInstance(seq[1]); + if (tagged.TagNo == 0) + { + m_privateKey = EncryptedKey.GetInstance(tagged.GetObject()); + } + else + { + m_publicationInfo = PkiPublicationInfo.GetInstance(tagged.GetObject()); + } + } + else + { + m_privateKey = EncryptedKey.GetInstance(Asn1TaggedObject.GetInstance(seq[1]).GetObject()); + m_publicationInfo = PkiPublicationInfo.GetInstance(Asn1TaggedObject.GetInstance(seq[2]).GetObject()); + } + } + } + + public CertifiedKeyPair(CertOrEncCert certOrEncCert) + : this(certOrEncCert, (EncryptedKey)null, null) + { + } + + public CertifiedKeyPair(CertOrEncCert certOrEncCert, EncryptedValue privateKey, + PkiPublicationInfo publicationInfo) + : this(certOrEncCert, privateKey == null ? null : new EncryptedKey(privateKey), publicationInfo) + { + } + + public CertifiedKeyPair(CertOrEncCert certOrEncCert, EncryptedKey privateKey, + PkiPublicationInfo publicationInfo) + { + if (certOrEncCert == null) + throw new ArgumentNullException(nameof(certOrEncCert)); + + m_certOrEncCert = certOrEncCert; + m_privateKey = privateKey; + m_publicationInfo = publicationInfo; + } + + public virtual CertOrEncCert CertOrEncCert => m_certOrEncCert; + + public virtual EncryptedKey PrivateKey => m_privateKey; + + public virtual PkiPublicationInfo PublicationInfo => m_publicationInfo; + + /** + *
+		 * CertifiedKeyPair ::= SEQUENCE {
+		 *                                  certOrEncCert       CertOrEncCert,
+		 *                                  privateKey      [0] EncryptedValue      OPTIONAL,
+		 *                                  -- see [CRMF] for comment on encoding
+		 *                                  publicationInfo [1] PKIPublicationInfo  OPTIONAL
+		 *       }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certOrEncCert); + v.AddOptionalTagged(true, 0, m_privateKey); + v.AddOptionalTagged(true, 1, m_publicationInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs.meta new file mode 100644 index 00000000..564a27fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 679079ba357f9f54780c4f094af9d15a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CertifiedKeyPair.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs new file mode 100644 index 00000000..bed8f8a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs @@ -0,0 +1,166 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     * Challenge ::= SEQUENCE {
+     *          owf                 AlgorithmIdentifier  OPTIONAL,
+     *
+     *          -- MUST be present in the first Challenge; MAY be omitted in
+     *          -- any subsequent Challenge in POPODecKeyChallContent (if
+     *          -- omitted, then the owf used in the immediately preceding
+     *          -- Challenge is to be used).
+     *
+     *          witness             OCTET STRING,
+     *          -- the result of applying the one-way function (owf) to a
+     *          -- randomly-generated INTEGER, A.  [Note that a different
+     *          -- INTEGER MUST be used for each Challenge.]
+     *          challenge           OCTET STRING
+     *          -- the encryption (under the public key for which the cert.
+     *          -- request is being made) of Rand, where Rand is specified as
+     *          --   Rand ::= SEQUENCE {
+     *          --      int      INTEGER,
+     *          --       - the randomly-generated INTEGER A (above)
+     *          --      sender   GeneralName
+     *          --       - the sender's name (as included in PKIHeader)
+     *          --   }
+     *      }
+     *      
+ */ + public class Challenge + : Asn1Encodable + { + public static Challenge GetInstance(object obj) + { + if (obj is Challenge challenge) + return challenge; + + if (obj != null) + return new Challenge(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly AlgorithmIdentifier m_owf; + private readonly Asn1OctetString m_witness; + private readonly Asn1OctetString m_challenge; + + private Challenge(Asn1Sequence seq) + { + int index = 0; + + if (seq.Count == 3) + { + m_owf = AlgorithmIdentifier.GetInstance(seq[index++]); + } + + m_witness = Asn1OctetString.GetInstance(seq[index++]); + m_challenge = Asn1OctetString.GetInstance(seq[index]); + } + + public Challenge(byte[] witness, byte[] challenge) + : this(null, witness, challenge) + { + } + + public Challenge(AlgorithmIdentifier owf, byte[] witness, byte[] challenge) + { + m_owf = owf; + m_witness = new DerOctetString(witness); + m_challenge = new DerOctetString(challenge); + } + + public virtual AlgorithmIdentifier Owf => m_owf; + + public virtual Asn1OctetString Witness => m_witness; + + public virtual Asn1OctetString ChallengeValue => m_challenge; + + /** + *
+		 * Challenge ::= SEQUENCE {
+		 *                 owf                 AlgorithmIdentifier  OPTIONAL,
+		 *
+		 *                 -- MUST be present in the first Challenge; MAY be omitted in
+		 *                 -- any subsequent Challenge in POPODecKeyChallContent (if
+		 *                 -- omitted, then the owf used in the immediately preceding
+		 *                 -- Challenge is to be used).
+		 *
+		 *                 witness             OCTET STRING,
+		 *                 -- the result of applying the one-way function (owf) to a
+		 *                 -- randomly-generated INTEGER, A.  [Note that a different
+		 *                 -- INTEGER MUST be used for each Challenge.]
+		 *                 challenge           OCTET STRING
+		 *                 -- the encryption (under the public key for which the cert.
+		 *                 -- request is being made) of Rand, where Rand is specified as
+		 *                 --   Rand ::= SEQUENCE {
+		 *                 --      int      INTEGER,
+		 *                 --       - the randomly-generated INTEGER A (above)
+		 *                 --      sender   GeneralName
+		 *                 --       - the sender's name (as included in PKIHeader)
+		 *                 --   }
+		 *      }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(m_owf); + v.Add(m_witness, m_challenge); + return new DerSequence(v); + } + + /** + * Rand is the inner type + */ + public class Rand + : Asn1Encodable + { + public static Rand GetInstance(object obj) + { + if (obj is Rand rand) + return rand; + + if (obj != null) + return new Rand(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly DerInteger m_intVal; + private readonly GeneralName m_sender; + + public Rand(DerInteger intVal, GeneralName sender) + { + m_intVal = intVal; + m_sender = sender; + } + + public Rand(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("expected sequence size of 2"); + + m_intVal = DerInteger.GetInstance(seq[0]); + m_sender = GeneralName.GetInstance(seq[1]); + } + + public virtual DerInteger IntVal => m_intVal; + + public virtual GeneralName Sender => m_sender; + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(m_intVal, m_sender); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs.meta new file mode 100644 index 00000000..a5d82830 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fcf21e414c8b368428aeda9d6a20b398 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/Challenge.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs new file mode 100644 index 00000000..16266707 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CmpCertificate + : Asn1Encodable, IAsn1Choice + { + public static CmpCertificate GetInstance(object obj) + { + // TODO[cmp] Review this whole metho + + if (obj == null) + return null; + + if (obj is CmpCertificate cmpCertificate) + return cmpCertificate; + + if (obj is byte[] bs) + { + try + { + obj = Asn1Object.FromByteArray(bs); + } + catch (IOException) + { + throw new ArgumentException("Invalid encoding in CmpCertificate"); + } + } + + if (obj is Asn1Sequence) + return new CmpCertificate(X509CertificateStructure.GetInstance(obj)); + + if (obj is Asn1TaggedObject taggedObject) + return new CmpCertificate(taggedObject.TagNo, taggedObject.GetObject()); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static CmpCertificate GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + // TODO[cmp] + if (taggedObject == null) + return null; + + if (!declaredExplicit) + throw new ArgumentException("tag must be explicit"); + + // TODO[cmp] + return GetInstance(taggedObject.GetObject()); + } + + private readonly X509CertificateStructure m_x509v3PKCert; + + private readonly int m_otherTagValue; + private readonly Asn1Encodable m_otherCert; + + /** + * Note: the addition of other certificates is a BC extension. If you use this constructor they + * will be added with an explicit tag value of type. + * + * @param type the type of the certificate (used as a tag value). + * @param otherCert the object representing the certificate + */ + public CmpCertificate(int type, Asn1Encodable otherCert) + { + m_otherTagValue = type; + m_otherCert = otherCert; + } + + public CmpCertificate(X509CertificateStructure x509v3PKCert) + { + if (x509v3PKCert.Version != 3) + throw new ArgumentException("only version 3 certificates allowed", nameof(x509v3PKCert)); + + m_x509v3PKCert = x509v3PKCert; + } + + public virtual bool IsX509v3PKCert => m_x509v3PKCert != null; + + public virtual X509CertificateStructure X509v3PKCert => m_x509v3PKCert; + + public virtual int OtherCertTag => m_otherTagValue; + + public virtual Asn1Encodable OtherCert => m_otherCert; + + /** + *
+         * CMPCertificate ::= CHOICE {
+         *            x509v3PKCert        Certificate
+         *            x509v2AttrCert      [1] AttributeCertificate
+         *  }
+         * 
+ * Note: the addition of attribute certificates is a BC extension. + * + * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + if (m_otherCert != null) + { + // explicit following CMP conventions + return new DerTaggedObject(true, m_otherTagValue, m_otherCert); + } + + return m_x509v3PKCert.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs.meta new file mode 100644 index 00000000..2c573222 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a09d19b54d9fad14daf62903f6c98a70 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs new file mode 100644 index 00000000..ada256b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs @@ -0,0 +1,262 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public static class CmpObjectIdentifiers + { + // RFC 4210 + + /** + * id-PasswordBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 13} + */ + public static readonly DerObjectIdentifier passwordBasedMac = new DerObjectIdentifier("1.2.840.113533.7.66.13"); + + /** + * id-DHBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 30} + */ + public static readonly DerObjectIdentifier dhBasedMac = new DerObjectIdentifier("1.2.840.113533.7.66.30"); + + // Example InfoTypeAndValue contents include, but are not limited + // to, the following (un-comment in this ASN.1 module and use as + // appropriate for a given environment): + // + // id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1} + // CAProtEncCertValue ::= CMPCertificate + // id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2} + // SignKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier + // id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3} + // EncKeyPairTypesValue ::= SEQUENCE OF AlgorithmIdentifier + // id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4} + // PreferredSymmAlgValue ::= AlgorithmIdentifier + // id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5} + // CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent + // id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6} + // CurrentCRLValue ::= CertificateList + // id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7} + // UnsupportedOIDsValue ::= SEQUENCE OF OBJECT IDENTIFIER + // id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10} + // KeyPairParamReqValue ::= OBJECT IDENTIFIER + // id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11} + // KeyPairParamRepValue ::= AlgorithmIdentifer + // id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12} + // RevPassphraseValue ::= EncryptedValue + // id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13} + // ImplicitConfirmValue ::= NULL + // id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14} + // ConfirmWaitTimeValue ::= GeneralizedTime + // id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15} + // OrigPKIMessageValue ::= PKIMessages + // id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16} + // SuppLangTagsValue ::= SEQUENCE OF UTF8String + // id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21} + // CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF UTF8String + // where + // + // id-pkix OBJECT IDENTIFIER ::= { + // iso(1) identified-organization(3) + // dod(6) internet(1) security(5) mechanisms(5) pkix(7)} + // and + // id-it OBJECT IDENTIFIER ::= {id-pkix 4} + + /** RFC 4120: it-id: PKIX.4 = 1.3.6.1.5.5.7.4 */ + + + /** + * RFC 4120: 1.3.6.1.5.5.7.4.1 + */ + public static readonly DerObjectIdentifier it_caProtEncCert = new DerObjectIdentifier("1.3.6.1.5.5.7.4.1"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.2 + */ + public static readonly DerObjectIdentifier it_signKeyPairTypes = new DerObjectIdentifier("1.3.6.1.5.5.7.4.2"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.3 + */ + public static readonly DerObjectIdentifier it_encKeyPairTypes = new DerObjectIdentifier("1.3.6.1.5.5.7.4.3"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.4 + */ + public static readonly DerObjectIdentifier it_preferredSymAlg = new DerObjectIdentifier("1.3.6.1.5.5.7.4.4"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.5 + */ + public static readonly DerObjectIdentifier it_caKeyUpdateInfo = new DerObjectIdentifier("1.3.6.1.5.5.7.4.5"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.6 + */ + public static readonly DerObjectIdentifier it_currentCRL = new DerObjectIdentifier("1.3.6.1.5.5.7.4.6"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.7 + */ + public static readonly DerObjectIdentifier it_unsupportedOIDs = new DerObjectIdentifier("1.3.6.1.5.5.7.4.7"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.10 + */ + public static readonly DerObjectIdentifier it_keyPairParamReq = new DerObjectIdentifier("1.3.6.1.5.5.7.4.10"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.11 + */ + public static readonly DerObjectIdentifier it_keyPairParamRep = new DerObjectIdentifier("1.3.6.1.5.5.7.4.11"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.12 + */ + public static readonly DerObjectIdentifier it_revPassphrase = new DerObjectIdentifier("1.3.6.1.5.5.7.4.12"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.13 + */ + public static readonly DerObjectIdentifier it_implicitConfirm = new DerObjectIdentifier("1.3.6.1.5.5.7.4.13"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.14 + */ + public static readonly DerObjectIdentifier it_confirmWaitTime = new DerObjectIdentifier("1.3.6.1.5.5.7.4.14"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.15 + */ + public static readonly DerObjectIdentifier it_origPKIMessage = new DerObjectIdentifier("1.3.6.1.5.5.7.4.15"); + /** + * RFC 4120: 1.3.6.1.5.5.7.4.16 + */ + public static readonly DerObjectIdentifier it_suppLangTags = new DerObjectIdentifier("1.3.6.1.5.5.7.4.16"); + + /** + * Update 16, RFC 4210 + * {id-it 17} + */ + public static readonly DerObjectIdentifier id_it_caCerts = new DerObjectIdentifier("1.3.6.1.5.5.7.4.17"); + + + /** + * Update 16, RFC 4210 + * GenRep: {id-it 18}, RootCaKeyUpdateContent + */ + public static readonly DerObjectIdentifier id_it_rootCaKeyUpdate = new DerObjectIdentifier("1.3.6.1.5.5.7.4.18"); + + + /** + * Update 16, RFC 4210 + * {id-it 19} + */ + public static readonly DerObjectIdentifier id_it_certReqTemplate = new DerObjectIdentifier("1.3.6.1.5.5.7.4.19"); + + + /** + * Update 16, RFC 4210 + * GenMsg: {id-it 20}, RootCaCertValue + */ + public static readonly DerObjectIdentifier id_it_rootCaCert = new DerObjectIdentifier("1.3.6.1.5.5.7.4.20"); + + /** + * Update-16 to RFC 4210 + * id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21} + */ + public static readonly DerObjectIdentifier id_it_certProfile = new DerObjectIdentifier("1.3.6.1.5.5.7.4.21"); + + public static readonly DerObjectIdentifier id_it_crlStatusList = new DerObjectIdentifier("1.3.6.1.5.5.7.4.22"); + + public static readonly DerObjectIdentifier id_it_crls = new DerObjectIdentifier("1.3.6.1.5.5.7.4.23"); + + // Not yet formally defined. + + //public static readonly DerObjectIdentifier id_it_crlStatusList = null; + //public static readonly DerObjectIdentifier id_it_crls = null; + + + // RFC 4211 + + // id-pkix OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) + // dod(6) internet(1) security(5) mechanisms(5) pkix(7) } + // + // arc for Internet X.509 PKI protocols and their components + // id-pkip OBJECT IDENTIFIER :: { id-pkix pkip(5) } + // + // arc for Registration Controls in CRMF + // id-regCtrl OBJECT IDENTIFIER ::= { id-pkip regCtrl(1) } + // + // arc for Registration Info in CRMF + // id-regInfo OBJECT IDENTIFIER ::= { id-pkip id-regInfo(2) } + + /** + * RFC 4211: it-pkip: PKIX.5 = 1.3.6.1.5.5.7.5 + */ + public static readonly DerObjectIdentifier id_pkip = new DerObjectIdentifier("1.3.6.1.5.5.7.5"); + + /** + * RFC 4211: it-regCtrl: 1.3.6.1.5.5.7.5.1 + */ + public static readonly DerObjectIdentifier id_regCtrl = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1"); + /** + * RFC 4211: it-regInfo: 1.3.6.1.5.5.7.5.2 + */ + public static readonly DerObjectIdentifier id_regInfo = new DerObjectIdentifier("1.3.6.1.5.5.7.5.2"); + + + /** + * 1.3.6.1.5.5.7.5.1.1 + */ + public static readonly DerObjectIdentifier regCtrl_regToken = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.1"); + /** + * 1.3.6.1.5.5.7.5.1.2 + */ + public static readonly DerObjectIdentifier regCtrl_authenticator = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.2"); + /** + * 1.3.6.1.5.5.7.5.1.3 + */ + public static readonly DerObjectIdentifier regCtrl_pkiPublicationInfo = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.3"); + /** + * 1.3.6.1.5.5.7.5.1.4 + */ + public static readonly DerObjectIdentifier regCtrl_pkiArchiveOptions = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.4"); + /** + * 1.3.6.1.5.5.7.5.1.5 + */ + public static readonly DerObjectIdentifier regCtrl_oldCertID = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.5"); + /** + * 1.3.6.1.5.5.7.5.1.6 + */ + public static readonly DerObjectIdentifier regCtrl_protocolEncrKey = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.6"); + + /** + * From RFC4210: + * id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= {id-regCtrl 7}; 1.3.6.1.5.5.7.1.7 + */ + public static readonly DerObjectIdentifier regCtrl_altCertTemplate = new DerObjectIdentifier("1.3.6.1.5.5.7.5.1.7"); + + /** + * RFC 4211: it-regInfo-utf8Pairs: 1.3.6.1.5.5.7.5.2.1 + */ + public static readonly DerObjectIdentifier regInfo_utf8Pairs = new DerObjectIdentifier("1.3.6.1.5.5.7.5.2.1"); + /** + * RFC 4211: it-regInfo-certReq: 1.3.6.1.5.5.7.5.2.1 + */ + public static readonly DerObjectIdentifier regInfo_certReq = new DerObjectIdentifier("1.3.6.1.5.5.7.5.2.2"); + + /** + * 1.2.840.113549.1.9.16.1.21 + *

+ * id-ct OBJECT IDENTIFIER ::= { id-smime 1 } -- content types + *

+ * id-ct-encKeyWithID OBJECT IDENTIFIER ::= {id-ct 21} + *

+ */ + public static readonly DerObjectIdentifier ct_encKeyWithID = new DerObjectIdentifier("1.2.840.113549.1.9.16.1.21"); + + + /** + * id-regCtrl-algId OBJECT IDENTIFIER ::= { iso(1) + * identified-organization(3) dod(6) internet(1) security(5) + * mechanisms(5) pkix(7) pkip(5) regCtrl(1) 11 } + */ + public static readonly DerObjectIdentifier id_regCtrl_algId = id_pkip.Branch("1.11"); + + /** + * id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { iso(1) + * identified-organization(3) dod(6) internet(1) security(5) + * mechanisms(5) pkix(7) pkip(5) regCtrl(1) 12 } + */ + public static readonly DerObjectIdentifier id_regCtrl_rsaKeyLen = id_pkip.Branch("1.12"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs.meta new file mode 100644 index 00000000..3e626189 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 67d51d1e662ef944b9ecf34bebe6a4cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CmpObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs new file mode 100644 index 00000000..7d6da241 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class CrlAnnContent + : Asn1Encodable + { + public static CrlAnnContent GetInstance(object obj) + { + if (obj is CrlAnnContent crlAnnContent) + return crlAnnContent; + + if (obj != null) + return new CrlAnnContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private CrlAnnContent(Asn1Sequence seq) + { + m_content = seq; + } + + public CrlAnnContent(CertificateList crl) + { + m_content = new DerSequence(crl); + } + + public virtual CertificateList[] ToCertificateListArray() + { + return m_content.MapElements(CertificateList.GetInstance); + } + + /** + *
+		 * CrlAnnContent ::= SEQUENCE OF CertificateList
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs.meta new file mode 100644 index 00000000..4f761562 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b3ceb87b6ac3e444b5ce59b0dcc8aee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlAnnContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs new file mode 100644 index 00000000..bf3dc8d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * GenMsg: {id-it TBD1}, SEQUENCE SIZE (1..MAX) OF CRLStatus + * GenRep: {id-it TBD2}, SEQUENCE SIZE (1..MAX) OF + * CertificateList | < absent > + *

+ * CRLSource ::= CHOICE { + * dpn [0] DistributionPointName, + * issuer [1] GeneralNames } + *

+ */ + public class CrlSource + : Asn1Encodable, IAsn1Choice + { + public static CrlSource GetInstance(object obj) + { + if (obj is CrlSource crlSource) + return crlSource; + + if (obj != null) + return new CrlSource(Asn1TaggedObject.GetInstance(obj)); + + return null; + } + + private readonly DistributionPointName m_dpn; + private readonly GeneralNames m_issuer; + + private CrlSource(Asn1TaggedObject taggedObject) + { + switch (taggedObject.TagNo) + { + case 0: + m_dpn = DistributionPointName.GetInstance(taggedObject, true); + m_issuer = null; + break; + case 1: + m_dpn = null; + m_issuer = GeneralNames.GetInstance(taggedObject, true); + break; + default: + throw new ArgumentException("unknown tag: " + Asn1Utilities.GetTagText(taggedObject)); + } + } + + public CrlSource(DistributionPointName dpn, GeneralNames issuer) + { + if ((dpn == null) == (issuer == null)) + throw new ArgumentException("either dpn or issuer must be set"); + + m_dpn = dpn; + m_issuer = issuer; + } + + public virtual DistributionPointName Dpn => m_dpn; + + public virtual GeneralNames Issuer => m_issuer; + + public override Asn1Object ToAsn1Object() + { + if (m_dpn != null) + return new DerTaggedObject(true, 0, m_dpn); + + return new DerTaggedObject(true, 1, m_issuer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs.meta new file mode 100644 index 00000000..22b3d2c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d78b1f2c335bedc4da114a48080d16dd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlSource.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs new file mode 100644 index 00000000..4bcb2d6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * CRLStatus ::= SEQUENCE { + * source CRLSource, + * thisUpdate Time OPTIONAL } + */ + public class CrlStatus + : Asn1Encodable + { + public static CrlStatus GetInstance(object obj) + { + if (obj is CrlStatus crlStatus) + return crlStatus; + + if (obj != null) + return new CrlStatus(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly CrlSource m_source; + private readonly Time m_thisUpdate; + + private CrlStatus(Asn1Sequence sequence) + { + int count = sequence.Count; + if (count < 1 || count > 2) + throw new ArgumentException("expected sequence size of 1 or 2, got " + count); + + m_source = CrlSource.GetInstance(sequence[0]); + + if (sequence.Count == 2) + { + m_thisUpdate = Time.GetInstance(sequence[1]); + } + } + + public CrlStatus(CrlSource source, Time thisUpdate) + { + m_source = source; + m_thisUpdate = thisUpdate; + } + + public virtual CrlSource Source => m_source; + + public virtual Time ThisUpdate => m_thisUpdate; + + public override Asn1Object ToAsn1Object() + { + if (m_thisUpdate == null) + return new DerSequence(m_source); + + return new DerSequence(m_source, m_thisUpdate); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs.meta new file mode 100644 index 00000000..a0f9d554 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 52cb7b06f5c4825439f29b0bd117df7a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/CrlStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs new file mode 100644 index 00000000..7d8bc238 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * DHBMParameter ::= SEQUENCE { + * owf AlgorithmIdentifier, + * -- AlgId for a One-Way Function (SHA-1 recommended) + * mac AlgorithmIdentifier + * -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11], + * } -- or HMAC [RFC2104, RFC2202]) + */ + public class DhbmParameter + : Asn1Encodable + { + public static DhbmParameter GetInstance(object obj) + { + if (obj is DhbmParameter dhbmParameter) + return dhbmParameter; + + if (obj != null) + return new DhbmParameter(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly AlgorithmIdentifier m_owf; + private readonly AlgorithmIdentifier m_mac; + + private DhbmParameter(Asn1Sequence sequence) + { + if (sequence.Count != 2) + throw new ArgumentException("expecting sequence size of 2"); + + m_owf = AlgorithmIdentifier.GetInstance(sequence[0]); + m_mac = AlgorithmIdentifier.GetInstance(sequence[1]); + } + + public DhbmParameter(AlgorithmIdentifier owf, AlgorithmIdentifier mac) + { + m_owf = owf; + m_mac = mac; + } + + public virtual AlgorithmIdentifier Owf => m_owf; + + public virtual AlgorithmIdentifier Mac => m_mac; + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(m_owf, m_mac); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs.meta new file mode 100644 index 00000000..fb972fd5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 300d96581f173764084a386a2ac53f7d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/DhbmParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs new file mode 100644 index 00000000..2864bbe9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     *      ErrorMsgContent ::= SEQUENCE {
+     *          pKIStatusInfo          PKIStatusInfo,
+     *          errorCode              INTEGER           OPTIONAL,
+     *          -- implementation-specific error codes
+     *          errorDetails           PKIFreeText       OPTIONAL
+     *          -- implementation-specific error details
+     *      }
+     * 
+ */ + public class ErrorMsgContent + : Asn1Encodable + { + public static ErrorMsgContent GetInstance(object obj) + { + if (obj is ErrorMsgContent errorMsgContent) + return errorMsgContent; + + if (obj != null) + return new ErrorMsgContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly PkiStatusInfo m_pkiStatusInfo; + private readonly DerInteger m_errorCode; + private readonly PkiFreeText m_errorDetails; + + private ErrorMsgContent(Asn1Sequence seq) + { + m_pkiStatusInfo = PkiStatusInfo.GetInstance(seq[0]); + + for (int pos = 1; pos < seq.Count; ++pos) + { + Asn1Encodable ae = seq[pos]; + if (ae is DerInteger) + { + m_errorCode = DerInteger.GetInstance(ae); + } + else + { + m_errorDetails = PkiFreeText.GetInstance(ae); + } + } + } + + public ErrorMsgContent(PkiStatusInfo pkiStatusInfo) + : this(pkiStatusInfo, null, null) + { + } + + public ErrorMsgContent( + PkiStatusInfo pkiStatusInfo, + DerInteger errorCode, + PkiFreeText errorDetails) + { + if (pkiStatusInfo == null) + throw new ArgumentNullException(nameof(pkiStatusInfo)); + + m_pkiStatusInfo = pkiStatusInfo; + m_errorCode = errorCode; + m_errorDetails = errorDetails; + } + + public virtual PkiStatusInfo PkiStatusInfo => m_pkiStatusInfo; + + public virtual DerInteger ErrorCode => m_errorCode; + + public virtual PkiFreeText ErrorDetails => m_errorDetails; + + /** + *
+		 * ErrorMsgContent ::= SEQUENCE {
+		 *                        pKIStatusInfo          PKIStatusInfo,
+		 *                        errorCode              INTEGER           OPTIONAL,
+		 *                        -- implementation-specific error codes
+		 *                        errorDetails           PKIFreeText       OPTIONAL
+		 *                        -- implementation-specific error details
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_pkiStatusInfo); + v.AddOptional(m_errorCode, m_errorDetails); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs.meta new file mode 100644 index 00000000..e6375c05 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 223c8b85c7e2f3f42b4a5de603d5f19a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ErrorMsgContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs new file mode 100644 index 00000000..44c034d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
+ */ + public class GenMsgContent + : Asn1Encodable + { + public static GenMsgContent GetInstance(object obj) + { + if (obj is GenMsgContent genMsgContent) + return genMsgContent; + + if (obj != null) + return new GenMsgContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private GenMsgContent(Asn1Sequence seq) + { + m_content = seq; + } + + public GenMsgContent(InfoTypeAndValue itv) + { + m_content = new DerSequence(itv); + } + + public GenMsgContent(params InfoTypeAndValue[] itvs) + { + m_content = new DerSequence(itvs); + } + + public virtual InfoTypeAndValue[] ToInfoTypeAndValueArray() + { + return m_content.MapElements(InfoTypeAndValue.GetInstance); + } + + /** + *
+		 * GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs.meta new file mode 100644 index 00000000..5c3c0537 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: adf9aeef68859ff43965340be1c9a07f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenMsgContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs new file mode 100644 index 00000000..2aa454f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class GenRepContent + : Asn1Encodable + { + public static GenRepContent GetInstance(object obj) + { + if (obj is GenRepContent genRepContent) + return genRepContent; + + if (obj != null) + return new GenRepContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private GenRepContent(Asn1Sequence seq) + { + m_content = seq; + } + + public GenRepContent(InfoTypeAndValue itv) + { + m_content = new DerSequence(itv); + } + + public GenRepContent(params InfoTypeAndValue[] itvs) + { + m_content = new DerSequence(itvs); + } + + public virtual InfoTypeAndValue[] ToInfoTypeAndValueArray() + { + return m_content.MapElements(InfoTypeAndValue.GetInstance); + } + + /** + *
+		 * GenRepContent ::= SEQUENCE OF InfoTypeAndValue
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs.meta new file mode 100644 index 00000000..d4f03369 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35b01055823536940ad781d6f35b3c82 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/GenRepContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs new file mode 100644 index 00000000..d724bcd3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * Example InfoTypeAndValue contents include, but are not limited + * to, the following (un-comment in this ASN.1 module and use as + * appropriate for a given environment): + *
+     *   id-it-caProtEncCert    OBJECT IDENTIFIER ::= {id-it 1}
+     *      CAProtEncCertValue      ::= CMPCertificate
+     *   id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
+     *     SignKeyPairTypesValue   ::= SEQUENCE OF AlgorithmIdentifier
+     *   id-it-encKeyPairTypes  OBJECT IDENTIFIER ::= {id-it 3}
+     *     EncKeyPairTypesValue    ::= SEQUENCE OF AlgorithmIdentifier
+     *   id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
+     *      PreferredSymmAlgValue   ::= AlgorithmIdentifier
+     *   id-it-caKeyUpdateInfo  OBJECT IDENTIFIER ::= {id-it 5}
+     *      CAKeyUpdateInfoValue    ::= CAKeyUpdAnnContent
+     *   id-it-currentCRL       OBJECT IDENTIFIER ::= {id-it 6}
+     *      CurrentCRLValue         ::= CertificateList
+     *   id-it-unsupportedOIDs  OBJECT IDENTIFIER ::= {id-it 7}
+     *      UnsupportedOIDsValue    ::= SEQUENCE OF OBJECT IDENTIFIER
+     *   id-it-keyPairParamReq  OBJECT IDENTIFIER ::= {id-it 10}
+     *      KeyPairParamReqValue    ::= OBJECT IDENTIFIER
+     *   id-it-keyPairParamRep  OBJECT IDENTIFIER ::= {id-it 11}
+     *      KeyPairParamRepValue    ::= AlgorithmIdentifer
+     *   id-it-revPassphrase    OBJECT IDENTIFIER ::= {id-it 12}
+     *      RevPassphraseValue      ::= EncryptedValue
+     *   id-it-implicitConfirm  OBJECT IDENTIFIER ::= {id-it 13}
+     *      ImplicitConfirmValue    ::= NULL
+     *   id-it-confirmWaitTime  OBJECT IDENTIFIER ::= {id-it 14}
+     *      ConfirmWaitTimeValue    ::= GeneralizedTime
+     *   id-it-origPKIMessage   OBJECT IDENTIFIER ::= {id-it 15}
+     *      OrigPKIMessageValue     ::= PKIMessages
+     *   id-it-suppLangTags     OBJECT IDENTIFIER ::= {id-it 16}
+     *      SuppLangTagsValue       ::= SEQUENCE OF UTF8String
+     *
+     * where
+     *
+     *   id-pkix OBJECT IDENTIFIER ::= {
+     *      iso(1) identified-organization(3)
+     *      dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
+     * and
+     *      id-it   OBJECT IDENTIFIER ::= {id-pkix 4}
+     * 
+ */ + public class InfoTypeAndValue + : Asn1Encodable + { + private readonly DerObjectIdentifier m_infoType; + private readonly Asn1Encodable m_infoValue; + + private InfoTypeAndValue(Asn1Sequence seq) + { + m_infoType = DerObjectIdentifier.GetInstance(seq[0]); + + if (seq.Count > 1) + { + m_infoValue = seq[1]; + } + } + + public static InfoTypeAndValue GetInstance(object obj) + { + if (obj is InfoTypeAndValue infoTypeAndValue) + return infoTypeAndValue; + + if (obj != null) + return new InfoTypeAndValue(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public InfoTypeAndValue(DerObjectIdentifier infoType) + : this(infoType, null) + { + } + + public InfoTypeAndValue(DerObjectIdentifier infoType, Asn1Encodable infoValue) + { + if (infoType == null) + throw new ArgumentNullException(nameof(infoType)); + + m_infoType = infoType; + m_infoValue = infoValue; + } + + public virtual DerObjectIdentifier InfoType => m_infoType; + + public virtual Asn1Encodable InfoValue => m_infoValue; + + /** + *
+         * InfoTypeAndValue ::= SEQUENCE {
+         *                         infoType               OBJECT IDENTIFIER,
+         *                         infoValue              ANY DEFINED BY infoType  OPTIONAL
+         * }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + if (m_infoValue == null) + return new DerSequence(m_infoType); + + return new DerSequence(m_infoType, m_infoValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs.meta new file mode 100644 index 00000000..c250f22a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f080219935a78543b30e20caf3e76cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/InfoTypeAndValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs new file mode 100644 index 00000000..2475da22 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class KeyRecRepContent + : Asn1Encodable + { + public static KeyRecRepContent GetInstance(object obj) + { + if (obj is KeyRecRepContent keyRecRepContent) + return keyRecRepContent; + + if (obj != null) + return new KeyRecRepContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly PkiStatusInfo m_status; + private readonly CmpCertificate m_newSigCert; + private readonly Asn1Sequence m_caCerts; + private readonly Asn1Sequence m_keyPairHist; + + private KeyRecRepContent(Asn1Sequence seq) + { + m_status = PkiStatusInfo.GetInstance(seq[0]); + + for (int pos = 1; pos < seq.Count; ++pos) + { + Asn1TaggedObject tObj = Asn1TaggedObject.GetInstance(seq[pos]); + + switch (tObj.TagNo) + { + case 0: + m_newSigCert = CmpCertificate.GetInstance(tObj.GetObject()); + break; + case 1: + m_caCerts = Asn1Sequence.GetInstance(tObj.GetObject()); + break; + case 2: + m_keyPairHist = Asn1Sequence.GetInstance(tObj.GetObject()); + break; + default: + throw new ArgumentException("unknown tag number: " + tObj.TagNo, "seq"); + } + } + } + + public virtual PkiStatusInfo Status => m_status; + + public virtual CmpCertificate NewSigCert => m_newSigCert; + + public virtual CmpCertificate[] GetCACerts() + { + if (m_caCerts == null) + return null; + + return m_caCerts.MapElements(CmpCertificate.GetInstance); + } + + public virtual CertifiedKeyPair[] GetKeyPairHist() + { + if (m_keyPairHist == null) + return null; + + return m_keyPairHist.MapElements(CertifiedKeyPair.GetInstance); + } + + /** + *
+		 * KeyRecRepContent ::= SEQUENCE {
+		 *                         status                  PKIStatusInfo,
+		 *                         newSigCert          [0] CMPCertificate OPTIONAL,
+		 *                         caCerts             [1] SEQUENCE SIZE (1..MAX) OF
+		 *                                                           CMPCertificate OPTIONAL,
+		 *                         keyPairHist         [2] SEQUENCE SIZE (1..MAX) OF
+		 *                                                           CertifiedKeyPair OPTIONAL
+		 *              }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_status); + v.AddOptionalTagged(true, 0, m_newSigCert); + v.AddOptionalTagged(true, 1, m_caCerts); + v.AddOptionalTagged(true, 2, m_keyPairHist); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs.meta new file mode 100644 index 00000000..4b111960 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25d6550531e2d484dabf2a4845730218 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/KeyRecRepContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs new file mode 100644 index 00000000..e47ffda0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * NestedMessageContent ::= PKIMessages + */ + public class NestedMessageContent + : PkiMessages + { + public static new NestedMessageContent GetInstance(object obj) + { + if (obj is NestedMessageContent nestedMessageContent) + return nestedMessageContent; + + if (obj != null) + return new NestedMessageContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public NestedMessageContent(PkiMessage msg) + : base(msg) + { + } + + public NestedMessageContent(PkiMessage[] msgs) + : base(msgs) + { + } + + public NestedMessageContent(Asn1Sequence seq) + : base(seq) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs.meta new file mode 100644 index 00000000..829c00db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 836d63ef9195b904787d4f0125ddbcea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/NestedMessageContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs new file mode 100644 index 00000000..91f7c743 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * OOBCert ::= CMPCertificate + */ + public class OobCert + : CmpCertificate + { + public static new OobCert GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is OobCert oobCert) + return oobCert; + + if (obj is CmpCertificate cmpCertificate) + return GetInstance(cmpCertificate.GetEncoded()); + + if (obj is byte[] bs) + { + try + { + obj = Asn1Object.FromByteArray(bs); + } + catch (IOException) + { + throw new ArgumentException("Invalid encoding in OobCert"); + } + } + + if (obj is Asn1Sequence seq) + return new OobCert(X509CertificateStructure.GetInstance(obj)); + + if (obj is Asn1TaggedObject taggedObject) + return new OobCert(taggedObject.TagNo, taggedObject.GetObject()); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static new OobCert GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + if (taggedObject == null) + return null; + + if (!declaredExplicit) + throw new ArgumentException("tag must be explicit"); + + return GetInstance(taggedObject.GetObject()); + } + + public OobCert(int type, Asn1Encodable otherCert) + : base(type, otherCert) + { + } + + public OobCert(X509CertificateStructure x509v3PKCert) + : base(x509v3PKCert) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs.meta new file mode 100644 index 00000000..c9b10998 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eb775e2d7757c7c47b194f7d6fcd200d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCert.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs new file mode 100644 index 00000000..63c4246d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     * OOBCertHash ::= SEQUENCE {
+     * hashAlg     [0] AlgorithmIdentifier     OPTIONAL,
+     * certId      [1] CertId                  OPTIONAL,
+     * hashVal         BIT STRING
+     * -- hashVal is calculated over the DER encoding of the
+     * -- self-signed certificate with the identifier certID.
+     * }
+     * 
+ */ + public class OobCertHash + : Asn1Encodable + { + public static OobCertHash GetInstance(object obj) + { + if (obj is OobCertHash oobCertHash) + return oobCertHash; + + if (obj != null) + return new OobCertHash(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly AlgorithmIdentifier m_hashAlg; + private readonly CertId m_certId; + private readonly DerBitString m_hashVal; + + private OobCertHash(Asn1Sequence seq) + { + int index = seq.Count - 1; + + m_hashVal = DerBitString.GetInstance(seq[index--]); + + for (int i = index; i >= 0; i--) + { + Asn1TaggedObject tObj = (Asn1TaggedObject)seq[i]; + + if (tObj.TagNo == 0) + { + m_hashAlg = AlgorithmIdentifier.GetInstance(tObj, true); + } + else + { + m_certId = CertId.GetInstance(tObj, true); + } + } + } + + public virtual CertId CertID => m_certId; + + public virtual AlgorithmIdentifier HashAlg => m_hashAlg; + + public virtual DerBitString HashVal => m_hashVal; + + /** + *
+		 * OobCertHash ::= SEQUENCE {
+		 *                      hashAlg     [0] AlgorithmIdentifier     OPTIONAL,
+		 *                      certId      [1] CertId                  OPTIONAL,
+		 *                      hashVal         BIT STRING
+		 *                      -- hashVal is calculated over the Der encoding of the
+		 *                      -- self-signed certificate with the identifier certID.
+		 *       }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, m_hashAlg); + v.AddOptionalTagged(true, 1, m_certId); + v.Add(m_hashVal); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs.meta new file mode 100644 index 00000000..6deda39b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f791678c53a2bf49a7b8095bd8739d4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/OobCertHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs new file mode 100644 index 00000000..34e366c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs @@ -0,0 +1,215 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * PKIBody ::= CHOICE { -- message-specific body elements + * ir [0] CertReqMessages, --Initialization Request + * ip [1] CertRepMessage, --Initialization Response + * cr [2] CertReqMessages, --Certification Request + * cp [3] CertRepMessage, --Certification Response + * p10cr [4] CertificationRequest, --imported from [PKCS10] + * popdecc [5] POPODecKeyChallContent, --pop Challenge + * popdecr [6] POPODecKeyRespContent, --pop Response + * kur [7] CertReqMessages, --Key Update Request + * kup [8] CertRepMessage, --Key Update Response + * krr [9] CertReqMessages, --Key Recovery Request + * krp [10] KeyRecRepContent, --Key Recovery Response + * rr [11] RevReqContent, --Revocation Request + * rp [12] RevRepContent, --Revocation Response + * ccr [13] CertReqMessages, --Cross-Cert. Request + * ccp [14] CertRepMessage, --Cross-Cert. Response + * ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann. + * cann [16] CertAnnContent, --Certificate Ann. + * rann [17] RevAnnContent, --Revocation Ann. + * crlann [18] CRLAnnContent, --CRL Announcement + * pkiconf [19] PKIConfirmContent, --Confirmation + * nested [20] NestedMessageContent, --Nested Message + * genm [21] GenMsgContent, --General Message + * genp [22] GenRepContent, --General Response + * error [23] ErrorMsgContent, --Error Message + * certConf [24] CertConfirmContent, --Certificate confirm + * pollReq [25] PollReqContent, --Polling request + * pollRep [26] PollRepContent --Polling response + * } + */ + public class PkiBody + : Asn1Encodable, IAsn1Choice + { + public const int TYPE_INIT_REQ = 0; + public const int TYPE_INIT_REP = 1; + public const int TYPE_CERT_REQ = 2; + public const int TYPE_CERT_REP = 3; + public const int TYPE_P10_CERT_REQ = 4; + public const int TYPE_POPO_CHALL = 5; + public const int TYPE_POPO_REP = 6; + public const int TYPE_KEY_UPDATE_REQ = 7; + public const int TYPE_KEY_UPDATE_REP = 8; + public const int TYPE_KEY_RECOVERY_REQ = 9; + public const int TYPE_KEY_RECOVERY_REP = 10; + public const int TYPE_REVOCATION_REQ = 11; + public const int TYPE_REVOCATION_REP = 12; + public const int TYPE_CROSS_CERT_REQ = 13; + public const int TYPE_CROSS_CERT_REP = 14; + public const int TYPE_CA_KEY_UPDATE_ANN = 15; + public const int TYPE_CERT_ANN = 16; + public const int TYPE_REVOCATION_ANN = 17; + public const int TYPE_CRL_ANN = 18; + public const int TYPE_CONFIRM = 19; + public const int TYPE_NESTED = 20; + public const int TYPE_GEN_MSG = 21; + public const int TYPE_GEN_REP = 22; + public const int TYPE_ERROR = 23; + public const int TYPE_CERT_CONFIRM = 24; + public const int TYPE_POLL_REQ = 25; + public const int TYPE_POLL_REP = 26; + + public static PkiBody GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is PkiBody pkiBody) + return pkiBody; + + if (obj is Asn1TaggedObject taggedObject) + return new PkiBody(taggedObject); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + private readonly int m_tagNo; + private readonly Asn1Encodable m_body; + + private PkiBody(Asn1TaggedObject taggedObject) + { + m_tagNo = taggedObject.TagNo; + m_body = GetBodyForType(m_tagNo, taggedObject.GetObject()); + } + + /** + * Creates a new PkiBody. + * @param type one of the TYPE_* constants + * @param content message content + */ + public PkiBody(int type, Asn1Encodable content) + { + m_tagNo = type; + m_body = GetBodyForType(type, content); + } + + private static Asn1Encodable GetBodyForType(int type, Asn1Encodable o) + { + switch (type) + { + case TYPE_INIT_REQ: + return CertReqMessages.GetInstance(o); + case TYPE_INIT_REP: + return CertRepMessage.GetInstance(o); + case TYPE_CERT_REQ: + return CertReqMessages.GetInstance(o); + case TYPE_CERT_REP: + return CertRepMessage.GetInstance(o); + case TYPE_P10_CERT_REQ: + return CertificationRequest.GetInstance(o); + case TYPE_POPO_CHALL: + return PopoDecKeyChallContent.GetInstance(o); + case TYPE_POPO_REP: + return PopoDecKeyRespContent.GetInstance(o); + case TYPE_KEY_UPDATE_REQ: + return CertReqMessages.GetInstance(o); + case TYPE_KEY_UPDATE_REP: + return CertRepMessage.GetInstance(o); + case TYPE_KEY_RECOVERY_REQ: + return CertReqMessages.GetInstance(o); + case TYPE_KEY_RECOVERY_REP: + return KeyRecRepContent.GetInstance(o); + case TYPE_REVOCATION_REQ: + return RevReqContent.GetInstance(o); + case TYPE_REVOCATION_REP: + return RevRepContent.GetInstance(o); + case TYPE_CROSS_CERT_REQ: + return CertReqMessages.GetInstance(o); + case TYPE_CROSS_CERT_REP: + return CertRepMessage.GetInstance(o); + case TYPE_CA_KEY_UPDATE_ANN: + return CAKeyUpdAnnContent.GetInstance(o); + case TYPE_CERT_ANN: + return CmpCertificate.GetInstance(o); + case TYPE_REVOCATION_ANN: + return RevAnnContent.GetInstance(o); + case TYPE_CRL_ANN: + return CrlAnnContent.GetInstance(o); + case TYPE_CONFIRM: + return PkiConfirmContent.GetInstance(o); + case TYPE_NESTED: + return PkiMessages.GetInstance(o); + case TYPE_GEN_MSG: + return GenMsgContent.GetInstance(o); + case TYPE_GEN_REP: + return GenRepContent.GetInstance(o); + case TYPE_ERROR: + return ErrorMsgContent.GetInstance(o); + case TYPE_CERT_CONFIRM: + return CertConfirmContent.GetInstance(o); + case TYPE_POLL_REQ: + return PollReqContent.GetInstance(o); + case TYPE_POLL_REP: + return PollRepContent.GetInstance(o); + default: + throw new ArgumentException("unknown tag number: " + type, nameof(type)); + } + } + + public virtual Asn1Encodable Content => m_body; + + public virtual int Type => m_tagNo; + + /** + *
+         * PkiBody ::= CHOICE {       -- message-specific body elements
+         *        ir       [0]  CertReqMessages,        --Initialization Request
+         *        ip       [1]  CertRepMessage,         --Initialization Response
+         *        cr       [2]  CertReqMessages,        --Certification Request
+         *        cp       [3]  CertRepMessage,         --Certification Response
+         *        p10cr    [4]  CertificationRequest,   --imported from [PKCS10]
+         *        popdecc  [5]  POPODecKeyChallContent, --pop Challenge
+         *        popdecr  [6]  POPODecKeyRespContent,  --pop Response
+         *        kur      [7]  CertReqMessages,        --Key Update Request
+         *        kup      [8]  CertRepMessage,         --Key Update Response
+         *        krr      [9]  CertReqMessages,        --Key Recovery Request
+         *        krp      [10] KeyRecRepContent,       --Key Recovery Response
+         *        rr       [11] RevReqContent,          --Revocation Request
+         *        rp       [12] RevRepContent,          --Revocation Response
+         *        ccr      [13] CertReqMessages,        --Cross-Cert. Request
+         *        ccp      [14] CertRepMessage,         --Cross-Cert. Response
+         *        ckuann   [15] CAKeyUpdAnnContent,     --CA Key Update Ann.
+         *        cann     [16] CertAnnContent,         --Certificate Ann.
+         *        rann     [17] RevAnnContent,          --Revocation Ann.
+         *        crlann   [18] CRLAnnContent,          --CRL Announcement
+         *        pkiconf  [19] PKIConfirmContent,      --Confirmation
+         *        nested   [20] NestedMessageContent,   --Nested Message
+         *        genm     [21] GenMsgContent,          --General Message
+         *        genp     [22] GenRepContent,          --General Response
+         *        error    [23] ErrorMsgContent,        --Error Message
+         *        certConf [24] CertConfirmContent,     --Certificate confirm
+         *        pollReq  [25] PollReqContent,         --Polling request
+         *        pollRep  [26] PollRepContent          --Polling response
+         * }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerTaggedObject(true, m_tagNo, m_body); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs.meta new file mode 100644 index 00000000..39f37f78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 100678a52df8fee4aa9e190c3548f1e6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIBody.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs new file mode 100644 index 00000000..50b835d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * PKIConfirmContent ::= NULL + */ + public class PkiConfirmContent + : Asn1Encodable + { + public static PkiConfirmContent GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is PkiConfirmContent pkiConfirmContent) + return pkiConfirmContent; + + if (obj is Asn1Null asn1Null) + return new PkiConfirmContent(asn1Null); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + private readonly Asn1Null m_val; + + public PkiConfirmContent() + : this(DerNull.Instance) + { + } + + private PkiConfirmContent(Asn1Null val) + { + m_val = val; + } + + /** + *
+		 * PkiConfirmContent ::= NULL
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_val; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs.meta new file mode 100644 index 00000000..4c004920 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ba8173b7bd86d5f4c85e84ad002431b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIConfirmContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs new file mode 100644 index 00000000..af8051e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     * PKIFailureInfo ::= BIT STRING {
+     * badAlg               (0),
+     *   -- unrecognized or unsupported Algorithm Identifier
+     * badMessageCheck      (1), -- integrity check failed (e.g., signature did not verify)
+     * badRequest           (2),
+     *   -- transaction not permitted or supported
+     * badTime              (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
+     * badCertId            (4), -- no certificate could be found matching the provided criteria
+     * badDataFormat        (5),
+     *   -- the data submitted has the wrong format
+     * wrongAuthority       (6), -- the authority indicated in the request is different from the one creating the response token
+     * incorrectData        (7), -- the requester's data is incorrect (for notary services)
+     * missingTimeStamp     (8), -- when the timestamp is missing but should be there (by policy)
+     * badPOP               (9)  -- the proof-of-possession failed
+     * certRevoked         (10),
+     * certConfirmed       (11),
+     * wrongIntegrity      (12),
+     * badRecipientNonce   (13),
+     * timeNotAvailable    (14),
+     *   -- the TSA's time source is not available
+     * unacceptedPolicy    (15),
+     *   -- the requested TSA policy is not supported by the TSA
+     * unacceptedExtension (16),
+     *   -- the requested extension is not supported by the TSA
+     * addInfoNotAvailable (17)
+     *   -- the additional information requested could not be understood
+     *   -- or is not available
+     * badSenderNonce      (18),
+     * badCertTemplate     (19),
+     * signerNotTrusted    (20),
+     * transactionIdInUse  (21),
+     * unsupportedVersion  (22),
+     * notAuthorized       (23),
+     * systemUnavail       (24),
+     * systemFailure       (25),
+     *   -- the request cannot be handled due to system failure
+     * duplicateCertReq    (26)
+     * 
+ */ + public class PkiFailureInfo + : DerBitString + { + public const int BadAlg = (1 << 7); // unrecognized or unsupported Algorithm Identifier + public const int BadMessageCheck = (1 << 6); // integrity check failed (e.g., signature did not verify) + public const int BadRequest = (1 << 5); + public const int BadTime = (1 << 4); // -- messageTime was not sufficiently close to the system time, as defined by local policy + public const int BadCertId = (1 << 3); // no certificate could be found matching the provided criteria + public const int BadDataFormat = (1 << 2); + public const int WrongAuthority = (1 << 1); // the authority indicated in the request is different from the one creating the response token + public const int IncorrectData = 1; // the requester's data is incorrect (for notary services) + public const int MissingTimeStamp = (1 << 15); // when the timestamp is missing but should be there (by policy) + public const int BadPop = (1 << 14); // the proof-of-possession failed + public const int CertRevoked = (1 << 13); + public const int CertConfirmed = (1 << 12); + public const int WrongIntegrity = (1 << 11); + public const int BadRecipientNonce = (1 << 10); + public const int TimeNotAvailable = (1 << 9); // the TSA's time source is not available + public const int UnacceptedPolicy = (1 << 8); // the requested TSA policy is not supported by the TSA + public const int UnacceptedExtension = (1 << 23); //the requested extension is not supported by the TSA + public const int AddInfoNotAvailable = (1 << 22); //the additional information requested could not be understood or is not available + public const int BadSenderNonce = (1 << 21); + public const int BadCertTemplate = (1 << 20); + public const int SignerNotTrusted = (1 << 19); + public const int TransactionIdInUse = (1 << 18); + public const int UnsupportedVersion = (1 << 17); + public const int NotAuthorized = (1 << 16); + public const int SystemUnavail = (1 << 31); + public const int SystemFailure = (1 << 30); //the request cannot be handled due to system failure + public const int DuplicateCertReq = (1 << 29); + + /** + * Basic constructor. + */ + public PkiFailureInfo(int info) + : base(info) + { + } + + public PkiFailureInfo( + DerBitString info) + : base(info.GetBytes(), info.PadBits) + { + } + + public override string ToString() + { + return "PkiFailureInfo: 0x" + this.IntValue.ToString("X"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs.meta new file mode 100644 index 00000000..c94c9ed0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ad154923d7ccf2747bc9b2de360c755e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFailureInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs new file mode 100644 index 00000000..cfffd592 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiFreeText + : Asn1Encodable + { + public static PkiFreeText GetInstance(object obj) + { + if (obj is PkiFreeText pkiFreeText) + return pkiFreeText; + + if (obj != null) + return new PkiFreeText(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public static PkiFreeText GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(taggedObject, declaredExplicit)); + } + + internal Asn1Sequence m_strings; + + internal PkiFreeText(Asn1Sequence seq) + { + foreach (var element in seq) + { + if (!(element is DerUtf8String)) + throw new ArgumentException("attempt to insert non UTF8 STRING into PkiFreeText"); + } + + m_strings = seq; + } + + public PkiFreeText(DerUtf8String p) + { + m_strings = new DerSequence(p); + } + + public PkiFreeText(string p) + : this(new DerUtf8String(p)) + { + } + + public PkiFreeText(DerUtf8String[] strs) + { + m_strings = new DerSequence(strs); + } + + public PkiFreeText(string[] strs) + { + Asn1EncodableVector v = new Asn1EncodableVector(strs.Length); + for (int i = 0; i < strs.Length; i++) + { + v.Add(new DerUtf8String(strs[i])); + } + m_strings = new DerSequence(v); + } + + public virtual int Count => m_strings.Count; + + /** + * Return the UTF8STRING at index. + * + * @param index index of the string of interest + * @return the string at index. + */ + public DerUtf8String this[int index] + { + get { return (DerUtf8String)m_strings[index]; } + } + + /** + *
+		 * PkiFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + return m_strings; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs.meta new file mode 100644 index 00000000..5066c875 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e77f847664938404cbf3fd462c2af358 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIFreeText.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs new file mode 100644 index 00000000..9765032a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs @@ -0,0 +1,232 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiHeader + : Asn1Encodable + { + /** + * Value for a "null" recipient or sender. + */ + public static readonly GeneralName NULL_NAME = new GeneralName(X509Name.GetInstance(new DerSequence())); + + public static readonly int CMP_1999 = 1; + public static readonly int CMP_2000 = 2; + + private readonly DerInteger pvno; + private readonly GeneralName sender; + private readonly GeneralName recipient; + private readonly Asn1GeneralizedTime messageTime; + private readonly AlgorithmIdentifier protectionAlg; + private readonly Asn1OctetString senderKID; // KeyIdentifier + private readonly Asn1OctetString recipKID; // KeyIdentifier + private readonly Asn1OctetString transactionID; + private readonly Asn1OctetString senderNonce; + private readonly Asn1OctetString recipNonce; + private readonly PkiFreeText freeText; + private readonly Asn1Sequence generalInfo; + + private PkiHeader(Asn1Sequence seq) + { + pvno = DerInteger.GetInstance(seq[0]); + sender = GeneralName.GetInstance(seq[1]); + recipient = GeneralName.GetInstance(seq[2]); + + for (int pos = 3; pos < seq.Count; ++pos) + { + Asn1TaggedObject tObj = (Asn1TaggedObject)seq[pos]; + + switch (tObj.TagNo) + { + case 0: + messageTime = Asn1GeneralizedTime.GetInstance(tObj, true); + break; + case 1: + protectionAlg = AlgorithmIdentifier.GetInstance(tObj, true); + break; + case 2: + senderKID = Asn1OctetString.GetInstance(tObj, true); + break; + case 3: + recipKID = Asn1OctetString.GetInstance(tObj, true); + break; + case 4: + transactionID = Asn1OctetString.GetInstance(tObj, true); + break; + case 5: + senderNonce = Asn1OctetString.GetInstance(tObj, true); + break; + case 6: + recipNonce = Asn1OctetString.GetInstance(tObj, true); + break; + case 7: + freeText = PkiFreeText.GetInstance(tObj, true); + break; + case 8: + generalInfo = Asn1Sequence.GetInstance(tObj, true); + break; + default: + throw new ArgumentException("unknown tag number: " + tObj.TagNo, nameof(seq)); + } + } + } + + public static PkiHeader GetInstance(object obj) + { + if (obj is PkiHeader) + return (PkiHeader)obj; + + if (obj is Asn1Sequence) + return new PkiHeader((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public PkiHeader( + int pvno, + GeneralName sender, + GeneralName recipient) + : this(new DerInteger(pvno), sender, recipient) + { + } + + private PkiHeader( + DerInteger pvno, + GeneralName sender, + GeneralName recipient) + { + this.pvno = pvno; + this.sender = sender; + this.recipient = recipient; + } + + public virtual DerInteger Pvno + { + get { return pvno; } + } + + public virtual GeneralName Sender + { + get { return sender; } + } + + public virtual GeneralName Recipient + { + get { return recipient; } + } + + public virtual Asn1GeneralizedTime MessageTime + { + get { return messageTime; } + } + + public virtual AlgorithmIdentifier ProtectionAlg + { + get { return protectionAlg; } + } + + public virtual Asn1OctetString SenderKID + { + get { return senderKID; } + } + + public virtual Asn1OctetString RecipKID + { + get { return recipKID; } + } + + public virtual Asn1OctetString TransactionID + { + get { return transactionID; } + } + + public virtual Asn1OctetString SenderNonce + { + get { return senderNonce; } + } + + public virtual Asn1OctetString RecipNonce + { + get { return recipNonce; } + } + + public virtual PkiFreeText FreeText + { + get { return freeText; } + } + + public virtual InfoTypeAndValue[] GetGeneralInfo() + { + if (generalInfo == null) + { + return null; + } + InfoTypeAndValue[] results = new InfoTypeAndValue[generalInfo.Count]; + for (int i = 0; i < results.Length; i++) + { + results[i] = InfoTypeAndValue.GetInstance(generalInfo[i]); + } + return results; + } + + /** + *
+         *  PkiHeader ::= SEQUENCE {
+         *            pvno                INTEGER     { cmp1999(1), cmp2000(2) },
+         *            sender              GeneralName,
+         *            -- identifies the sender
+         *            recipient           GeneralName,
+         *            -- identifies the intended recipient
+         *            messageTime     [0] GeneralizedTime         OPTIONAL,
+         *            -- time of production of this message (used when sender
+         *            -- believes that the transport will be "suitable"; i.e.,
+         *            -- that the time will still be meaningful upon receipt)
+         *            protectionAlg   [1] AlgorithmIdentifier     OPTIONAL,
+         *            -- algorithm used for calculation of protection bits
+         *            senderKID       [2] KeyIdentifier           OPTIONAL,
+         *            recipKID        [3] KeyIdentifier           OPTIONAL,
+         *            -- to identify specific keys used for protection
+         *            transactionID   [4] OCTET STRING            OPTIONAL,
+         *            -- identifies the transaction; i.e., this will be the same in
+         *            -- corresponding request, response, certConf, and PKIConf
+         *            -- messages
+         *            senderNonce     [5] OCTET STRING            OPTIONAL,
+         *            recipNonce      [6] OCTET STRING            OPTIONAL,
+         *            -- nonces used to provide replay protection, senderNonce
+         *            -- is inserted by the creator of this message; recipNonce
+         *            -- is a nonce previously inserted in a related message by
+         *            -- the intended recipient of this message
+         *            freeText        [7] PKIFreeText             OPTIONAL,
+         *            -- this may be used to indicate context-specific instructions
+         *            -- (this field is intended for human consumption)
+         *            generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
+         *                                 InfoTypeAndValue     OPTIONAL
+         *            -- this may be used to convey context-specific information
+         *            -- (this field not primarily intended for human consumption)
+         * }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(pvno, sender, recipient); + v.AddOptionalTagged(true, 0, messageTime); + v.AddOptionalTagged(true, 1, protectionAlg); + v.AddOptionalTagged(true, 2, senderKID); + v.AddOptionalTagged(true, 3, recipKID); + v.AddOptionalTagged(true, 4, transactionID); + v.AddOptionalTagged(true, 5, senderNonce); + v.AddOptionalTagged(true, 6, recipNonce); + v.AddOptionalTagged(true, 7, freeText); + v.AddOptionalTagged(true, 8, generalInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs.meta new file mode 100644 index 00000000..337e2f7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9077f3c98ec2b1a49b9754bd175a9c4d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs new file mode 100644 index 00000000..c54b3e67 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs @@ -0,0 +1,227 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiHeaderBuilder + { + private DerInteger pvno; + private GeneralName sender; + private GeneralName recipient; + private Asn1GeneralizedTime messageTime; + private AlgorithmIdentifier protectionAlg; + private Asn1OctetString senderKID; // KeyIdentifier + private Asn1OctetString recipKID; // KeyIdentifier + private Asn1OctetString transactionID; + private Asn1OctetString senderNonce; + private Asn1OctetString recipNonce; + private PkiFreeText freeText; + private Asn1Sequence generalInfo; + + public PkiHeaderBuilder( + int pvno, + GeneralName sender, + GeneralName recipient) + : this(new DerInteger(pvno), sender, recipient) + { + } + + private PkiHeaderBuilder( + DerInteger pvno, + GeneralName sender, + GeneralName recipient) + { + this.pvno = pvno; + this.sender = sender; + this.recipient = recipient; + } + + public virtual PkiHeaderBuilder SetMessageTime(Asn1GeneralizedTime time) + { + messageTime = time; + return this; + } + + public virtual PkiHeaderBuilder SetProtectionAlg(AlgorithmIdentifier aid) + { + protectionAlg = aid; + return this; + } + + public virtual PkiHeaderBuilder SetSenderKID(byte[] kid) + { + return SetSenderKID(kid == null ? null : new DerOctetString(kid)); + } + + public virtual PkiHeaderBuilder SetSenderKID(Asn1OctetString kid) + { + senderKID = kid; + return this; + } + + public virtual PkiHeaderBuilder SetRecipKID(byte[] kid) + { + return SetRecipKID(kid == null ? null : new DerOctetString(kid)); + } + + public virtual PkiHeaderBuilder SetRecipKID(Asn1OctetString kid) + { + recipKID = kid; + return this; + } + + public virtual PkiHeaderBuilder SetTransactionID(byte[] tid) + { + return SetTransactionID(tid == null ? null : new DerOctetString(tid)); + } + + public virtual PkiHeaderBuilder SetTransactionID(Asn1OctetString tid) + { + transactionID = tid; + return this; + } + + public virtual PkiHeaderBuilder SetSenderNonce(byte[] nonce) + { + return SetSenderNonce(nonce == null ? null : new DerOctetString(nonce)); + } + + public virtual PkiHeaderBuilder SetSenderNonce(Asn1OctetString nonce) + { + senderNonce = nonce; + return this; + } + + public virtual PkiHeaderBuilder SetRecipNonce(byte[] nonce) + { + return SetRecipNonce(nonce == null ? null : new DerOctetString(nonce)); + } + + public virtual PkiHeaderBuilder SetRecipNonce(Asn1OctetString nonce) + { + recipNonce = nonce; + return this; + } + + public virtual PkiHeaderBuilder SetFreeText(PkiFreeText text) + { + freeText = text; + return this; + } + + public virtual PkiHeaderBuilder SetGeneralInfo(InfoTypeAndValue genInfo) + { + return SetGeneralInfo(MakeGeneralInfoSeq(genInfo)); + } + + public virtual PkiHeaderBuilder SetGeneralInfo(InfoTypeAndValue[] genInfos) + { + return SetGeneralInfo(MakeGeneralInfoSeq(genInfos)); + } + + public virtual PkiHeaderBuilder SetGeneralInfo(Asn1Sequence seqOfInfoTypeAndValue) + { + generalInfo = seqOfInfoTypeAndValue; + return this; + } + + private static Asn1Sequence MakeGeneralInfoSeq( + InfoTypeAndValue generalInfo) + { + return new DerSequence(generalInfo); + } + + private static Asn1Sequence MakeGeneralInfoSeq( + InfoTypeAndValue[] generalInfos) + { + Asn1Sequence genInfoSeq = null; + if (generalInfos != null) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + for (int i = 0; i < generalInfos.Length; ++i) + { + v.Add(generalInfos[i]); + } + genInfoSeq = new DerSequence(v); + } + return genInfoSeq; + } + + /** + *
+		 *  PKIHeader ::= SEQUENCE {
+		 *            pvno                INTEGER     { cmp1999(1), cmp2000(2) },
+		 *            sender              GeneralName,
+		 *            -- identifies the sender
+		 *            recipient           GeneralName,
+		 *            -- identifies the intended recipient
+		 *            messageTime     [0] GeneralizedTime         OPTIONAL,
+		 *            -- time of production of this message (used when sender
+		 *            -- believes that the transport will be "suitable"; i.e.,
+		 *            -- that the time will still be meaningful upon receipt)
+		 *            protectionAlg   [1] AlgorithmIdentifier     OPTIONAL,
+		 *            -- algorithm used for calculation of protection bits
+		 *            senderKID       [2] KeyIdentifier           OPTIONAL,
+		 *            recipKID        [3] KeyIdentifier           OPTIONAL,
+		 *            -- to identify specific keys used for protection
+		 *            transactionID   [4] OCTET STRING            OPTIONAL,
+		 *            -- identifies the transaction; i.e., this will be the same in
+		 *            -- corresponding request, response, certConf, and PKIConf
+		 *            -- messages
+		 *            senderNonce     [5] OCTET STRING            OPTIONAL,
+		 *            recipNonce      [6] OCTET STRING            OPTIONAL,
+		 *            -- nonces used to provide replay protection, senderNonce
+		 *            -- is inserted by the creator of this message; recipNonce
+		 *            -- is a nonce previously inserted in a related message by
+		 *            -- the intended recipient of this message
+		 *            freeText        [7] PKIFreeText             OPTIONAL,
+		 *            -- this may be used to indicate context-specific instructions
+		 *            -- (this field is intended for human consumption)
+		 *            generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
+		 *                                 InfoTypeAndValue     OPTIONAL
+		 *            -- this may be used to convey context-specific information
+		 *            -- (this field not primarily intended for human consumption)
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public virtual PkiHeader Build() + { + Asn1EncodableVector v = new Asn1EncodableVector(pvno, sender, recipient); + AddOptional(v, 0, messageTime); + AddOptional(v, 1, protectionAlg); + AddOptional(v, 2, senderKID); + AddOptional(v, 3, recipKID); + AddOptional(v, 4, transactionID); + AddOptional(v, 5, senderNonce); + AddOptional(v, 6, recipNonce); + AddOptional(v, 7, freeText); + AddOptional(v, 8, generalInfo); + + messageTime = null; + protectionAlg = null; + senderKID = null; + recipKID = null; + transactionID = null; + senderNonce = null; + recipNonce = null; + freeText = null; + generalInfo = null; + + return PkiHeader.GetInstance(new DerSequence(v)); + } + + private void AddOptional(Asn1EncodableVector v, int tagNo, Asn1Encodable obj) + { + if (obj != null) + { + v.Add(new DerTaggedObject(true, tagNo, obj)); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs.meta new file mode 100644 index 00000000..7d49a415 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a85274fc962a4eb40b0193f5d7ff5ccb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIHeaderBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs new file mode 100644 index 00000000..ae3ac38e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiMessage + : Asn1Encodable + { + private readonly PkiHeader header; + private readonly PkiBody body; + private readonly DerBitString protection; + private readonly Asn1Sequence extraCerts; + + private PkiMessage(Asn1Sequence seq) + { + header = PkiHeader.GetInstance(seq[0]); + body = PkiBody.GetInstance(seq[1]); + + for (int pos = 2; pos < seq.Count; ++pos) + { + Asn1TaggedObject tObj = (Asn1TaggedObject)seq[pos].ToAsn1Object(); + + if (tObj.TagNo == 0) + { + protection = DerBitString.GetInstance(tObj, true); + } + else + { + extraCerts = Asn1Sequence.GetInstance(tObj, true); + } + } + } + + public static PkiMessage GetInstance(object obj) + { + if (obj is PkiMessage) + return (PkiMessage)obj; + + if (obj != null) + return new PkiMessage(Asn1Sequence.GetInstance(obj)); + + return null; + } + + /** + * Creates a new PkiMessage. + * + * @param header message header + * @param body message body + * @param protection message protection (may be null) + * @param extraCerts extra certificates (may be null) + */ + public PkiMessage( + PkiHeader header, + PkiBody body, + DerBitString protection, + CmpCertificate[] extraCerts) + { + this.header = header; + this.body = body; + this.protection = protection; + if (extraCerts != null) + { + this.extraCerts = new DerSequence(extraCerts); + } + } + + public PkiMessage( + PkiHeader header, + PkiBody body, + DerBitString protection) + : this(header, body, protection, null) + { + } + + public PkiMessage( + PkiHeader header, + PkiBody body) + : this(header, body, null, null) + { + } + + public virtual PkiHeader Header + { + get { return header; } + } + + public virtual PkiBody Body + { + get { return body; } + } + + public virtual DerBitString Protection + { + get { return protection; } + } + + public virtual CmpCertificate[] GetExtraCerts() + { + if (extraCerts == null) + return null; + + CmpCertificate[] results = new CmpCertificate[extraCerts.Count]; + for (int i = 0; i < results.Length; ++i) + { + results[i] = CmpCertificate.GetInstance(extraCerts[i]); + } + return results; + } + + /** + *
+         * PkiMessage ::= SEQUENCE {
+         *                  header           PKIHeader,
+         *                  body             PKIBody,
+         *                  protection   [0] PKIProtection OPTIONAL,
+         *                  extraCerts   [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
+         *                                                                     OPTIONAL
+         * }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(header, body); + v.AddOptionalTagged(true, 0, protection); + v.AddOptionalTagged(true, 1, extraCerts); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs.meta new file mode 100644 index 00000000..10025ea5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c766bc81d0a58f04dbd305ed7364de06 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs new file mode 100644 index 00000000..0c762851 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiMessages + : Asn1Encodable + { + private Asn1Sequence content; + + internal PkiMessages(Asn1Sequence seq) + { + content = seq; + } + + public static PkiMessages GetInstance(object obj) + { + if (obj is PkiMessages) + return (PkiMessages)obj; + + if (obj is Asn1Sequence) + return new PkiMessages((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public PkiMessages(params PkiMessage[] msgs) + { + content = new DerSequence(msgs); + } + + public virtual PkiMessage[] ToPkiMessageArray() + { + PkiMessage[] result = new PkiMessage[content.Count]; + for (int i = 0; i != result.Length; ++i) + { + result[i] = PkiMessage.GetInstance(content[i]); + } + return result; + } + + /** + *
+         * PkiMessages ::= SEQUENCE SIZE (1..MAX) OF PkiMessage
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs.meta new file mode 100644 index 00000000..388c6b4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6aa6d080265a8284389d7b43a19e8fea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIMessages.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs new file mode 100644 index 00000000..788d3284 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public enum PkiStatus + { + Granted = 0, + GrantedWithMods = 1, + Rejection = 2, + Waiting = 3, + RevocationWarning = 4, + RevocationNotification = 5, + KeyUpdateWarning = 6, + } + + public class PkiStatusEncodable + : Asn1Encodable + { + public static readonly PkiStatusEncodable granted = new PkiStatusEncodable(PkiStatus.Granted); + public static readonly PkiStatusEncodable grantedWithMods = new PkiStatusEncodable(PkiStatus.GrantedWithMods); + public static readonly PkiStatusEncodable rejection = new PkiStatusEncodable(PkiStatus.Rejection); + public static readonly PkiStatusEncodable waiting = new PkiStatusEncodable(PkiStatus.Waiting); + public static readonly PkiStatusEncodable revocationWarning = new PkiStatusEncodable(PkiStatus.RevocationWarning); + public static readonly PkiStatusEncodable revocationNotification = new PkiStatusEncodable(PkiStatus.RevocationNotification); + public static readonly PkiStatusEncodable keyUpdateWaiting = new PkiStatusEncodable(PkiStatus.KeyUpdateWarning); + + private readonly DerInteger status; + + private PkiStatusEncodable(PkiStatus status) + : this(new DerInteger((int)status)) + { + } + + private PkiStatusEncodable(DerInteger status) + { + this.status = status; + } + + public static PkiStatusEncodable GetInstance(object obj) + { + if (obj is PkiStatusEncodable) + return (PkiStatusEncodable)obj; + + if (obj is DerInteger) + return new PkiStatusEncodable((DerInteger)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public virtual BigInteger Value + { + get { return status.Value; } + } + + public override Asn1Object ToAsn1Object() + { + return status; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs.meta new file mode 100644 index 00000000..ad7d2930 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ab11c44e454a734abe83489016d91ce +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs new file mode 100644 index 00000000..666905ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs @@ -0,0 +1,160 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PkiStatusInfo + : Asn1Encodable + { + DerInteger status; + PkiFreeText statusString; + DerBitString failInfo; + + public static PkiStatusInfo GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static PkiStatusInfo GetInstance( + object obj) + { + if (obj is PkiStatusInfo) + { + return (PkiStatusInfo)obj; + } + else if (obj is Asn1Sequence) + { + return new PkiStatusInfo((Asn1Sequence)obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public PkiStatusInfo( + Asn1Sequence seq) + { + this.status = DerInteger.GetInstance(seq[0]); + + this.statusString = null; + this.failInfo = null; + + if (seq.Count > 2) + { + this.statusString = PkiFreeText.GetInstance(seq[1]); + this.failInfo = DerBitString.GetInstance(seq[2]); + } + else if (seq.Count > 1) + { + object obj = seq[1]; + if (obj is DerBitString) + { + this.failInfo = DerBitString.GetInstance(obj); + } + else + { + this.statusString = PkiFreeText.GetInstance(obj); + } + } + } + + /** + * @param status + */ + public PkiStatusInfo(int status) + { + this.status = new DerInteger(status); + } + + /** + * @param status + * @param statusString + */ + public PkiStatusInfo( + int status, + PkiFreeText statusString) + { + this.status = new DerInteger(status); + this.statusString = statusString; + } + + public PkiStatusInfo( + int status, + PkiFreeText statusString, + PkiFailureInfo failInfo) + { + this.status = new DerInteger(status); + this.statusString = statusString; + this.failInfo = failInfo; + } + + public BigInteger Status + { + get + { + return status.Value; + } + } + + public PkiFreeText StatusString + { + get + { + return statusString; + } + } + + public DerBitString FailInfo + { + get + { + return failInfo; + } + } + + /** + *
+		 * PkiStatusInfo ::= SEQUENCE {
+		 *     status        PKIStatus,                (INTEGER)
+		 *     statusString  PkiFreeText     OPTIONAL,
+		 *     failInfo      PkiFailureInfo  OPTIONAL  (BIT STRING)
+		 * }
+		 *
+		 * PKIStatus:
+		 *   granted                (0), -- you got exactly what you asked for
+		 *   grantedWithMods        (1), -- you got something like what you asked for
+		 *   rejection              (2), -- you don't get it, more information elsewhere in the message
+		 *   waiting                (3), -- the request body part has not yet been processed, expect to hear more later
+		 *   revocationWarning      (4), -- this message contains a warning that a revocation is imminent
+		 *   revocationNotification (5), -- notification that a revocation has occurred
+		 *   keyUpdateWarning       (6)  -- update already done for the oldCertId specified in CertReqMsg
+		 *
+		 * PkiFailureInfo:
+		 *   badAlg           (0), -- unrecognized or unsupported Algorithm Identifier
+		 *   badMessageCheck  (1), -- integrity check failed (e.g., signature did not verify)
+		 *   badRequest       (2), -- transaction not permitted or supported
+		 *   badTime          (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
+		 *   badCertId        (4), -- no certificate could be found matching the provided criteria
+		 *   badDataFormat    (5), -- the data submitted has the wrong format
+		 *   wrongAuthority   (6), -- the authority indicated in the request is different from the one creating the response token
+		 *   incorrectData    (7), -- the requester's data is incorrect (for notary services)
+		 *   missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
+		 *   badPOP           (9)  -- the proof-of-possession failed
+		 *
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(status); + v.AddOptional(statusString, failInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs.meta new file mode 100644 index 00000000..7f4c89f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5e920049330b4c543a988929e11dada6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PKIStatusInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs new file mode 100644 index 00000000..c1916c51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs @@ -0,0 +1,102 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * PBMParameter ::= SEQUENCE { + * salt OCTET STRING, + * -- note: implementations MAY wish to limit acceptable sizes + * -- of this string to values appropriate for their environment + * -- in order to reduce the risk of denial-of-service attacks + * owf AlgorithmIdentifier, + * -- AlgId for a One-Way Function (SHA-1 recommended) + * iterationCount INTEGER, + * -- number of times the OWF is applied + * -- note: implementations MAY wish to limit acceptable sizes + * -- of this integer to values appropriate for their environment + * -- in order to reduce the risk of denial-of-service attacks + * mac AlgorithmIdentifier + * -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11], + * } -- or HMAC [RFC2104, RFC2202]) + */ + public class PbmParameter + : Asn1Encodable + { + public static PbmParameter GetInstance(object obj) + { + if (obj is PbmParameter pbmParameter) + return pbmParameter; + + if (obj != null) + return new PbmParameter(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1OctetString m_salt; + private readonly AlgorithmIdentifier m_owf; + private readonly DerInteger m_iterationCount; + private readonly AlgorithmIdentifier m_mac; + + private PbmParameter(Asn1Sequence seq) + { + m_salt = Asn1OctetString.GetInstance(seq[0]); + m_owf = AlgorithmIdentifier.GetInstance(seq[1]); + m_iterationCount = DerInteger.GetInstance(seq[2]); + m_mac = AlgorithmIdentifier.GetInstance(seq[3]); + } + + public PbmParameter(byte[] salt, AlgorithmIdentifier owf, int iterationCount, AlgorithmIdentifier mac) + : this(new DerOctetString(salt), owf, new DerInteger(iterationCount), mac) + { + } + + public PbmParameter(Asn1OctetString salt, AlgorithmIdentifier owf, DerInteger iterationCount, + AlgorithmIdentifier mac) + { + m_salt = salt; + m_owf = owf; + m_iterationCount = iterationCount; + m_mac = mac; + } + + public virtual DerInteger IterationCount => m_iterationCount; + + public virtual AlgorithmIdentifier Mac => m_mac; + + public virtual AlgorithmIdentifier Owf => m_owf; + + public virtual Asn1OctetString Salt => m_salt; + + /** + *
+         *  PbmParameter ::= SEQUENCE {
+         *                        salt                OCTET STRING,
+         *                        -- note:  implementations MAY wish to limit acceptable sizes
+         *                        -- of this string to values appropriate for their environment
+         *                        -- in order to reduce the risk of denial-of-service attacks
+         *                        owf                 AlgorithmIdentifier,
+         *                        -- AlgId for a One-Way Function (SHA-1 recommended)
+         *                        iterationCount      INTEGER,
+         *                        -- number of times the OWF is applied
+         *                        -- note:  implementations MAY wish to limit acceptable sizes
+         *                        -- of this integer to values appropriate for their environment
+         *                        -- in order to reduce the risk of denial-of-service attacks
+         *                        mac                 AlgorithmIdentifier
+         *                        -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
+         *    }   -- or HMAC [RFC2104, RFC2202])
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(m_salt, m_owf, m_iterationCount, m_mac); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs.meta new file mode 100644 index 00000000..11f90ec7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7d820fb493c2e3b448eea9f6935804a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PbmParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs new file mode 100644 index 00000000..441d72a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * PollRepContent ::= SEQUENCE OF SEQUENCE { + * certReqId INTEGER, + * checkAfter INTEGER, -- time in seconds + * reason PKIFreeText OPTIONAL } + */ + public class PollRepContent + : Asn1Encodable + { + public static PollRepContent GetInstance(object obj) + { + if (obj is PollRepContent pollRepContent) + return pollRepContent; + + if (obj != null) + return new PollRepContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly DerInteger[] m_certReqID; + private readonly DerInteger[] m_checkAfter; + private readonly PkiFreeText[] m_reason; + + private PollRepContent(Asn1Sequence seq) + { + int count = seq.Count; + m_certReqID = new DerInteger[count]; + m_checkAfter = new DerInteger[count]; + m_reason = new PkiFreeText[count]; + + for (int i = 0; i != count; i++) + { + Asn1Sequence s = Asn1Sequence.GetInstance(seq[i]); + + m_certReqID[i] = DerInteger.GetInstance(s[0]); + m_checkAfter[i] = DerInteger.GetInstance(s[1]); + + if (s.Count > 2) + { + m_reason[i] = PkiFreeText.GetInstance(s[2]); + } + } + } + + public PollRepContent(DerInteger certReqID, DerInteger checkAfter) + : this(certReqID, checkAfter, null) + { + } + + public PollRepContent(DerInteger certReqID, DerInteger checkAfter, PkiFreeText reason) + { + m_certReqID = new DerInteger[1]{ certReqID }; + m_checkAfter = new DerInteger[1]{ checkAfter }; + m_reason = new PkiFreeText[1]{ reason }; + } + + public virtual int Count => m_certReqID.Length; + + public virtual DerInteger GetCertReqID(int index) => m_certReqID[index]; + + public virtual DerInteger GetCheckAfter(int index) => m_checkAfter[index]; + + public virtual PkiFreeText GetReason(int index) => m_reason[index]; + + /** + *
+		 * PollRepContent ::= SEQUENCE OF SEQUENCE {
+		 *         certReqId              INTEGER,
+		 *         checkAfter             INTEGER,  -- time in seconds
+		 *         reason                 PKIFreeText OPTIONAL
+		 *     }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector outer = new Asn1EncodableVector(m_certReqID.Length); + + for (int i = 0; i != m_certReqID.Length; i++) + { + Asn1EncodableVector v = new Asn1EncodableVector(3); + + v.Add(m_certReqID[i]); + v.Add(m_checkAfter[i]); + v.AddOptional(m_reason[i]); + + outer.Add(new DerSequence(v)); + } + + return new DerSequence(outer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs.meta new file mode 100644 index 00000000..1de08956 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7d4c7c5d740ed224588b9122ba4db074 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollRepContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs new file mode 100644 index 00000000..6de7f12b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PollReqContent + : Asn1Encodable + { + public static PollReqContent GetInstance(object obj) + { + if (obj is PollReqContent pollReqContent) + return pollReqContent; + + if (obj != null) + return new PollReqContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private PollReqContent(Asn1Sequence seq) + { + m_content = seq; + } + + /** + * Create a pollReqContent for a single certReqId. + * + * @param certReqId the certificate request ID. + */ + public PollReqContent(DerInteger certReqId) + : this(new DerSequence(new DerSequence(certReqId))) + { + } + + /** + * Create a pollReqContent for a multiple certReqIds. + * + * @param certReqIds the certificate request IDs. + */ + public PollReqContent(DerInteger[] certReqIds) + : this(new DerSequence(IntsToSequence(certReqIds))) + { + } + + /** + * Create a pollReqContent for a single certReqId. + * + * @param certReqId the certificate request ID. + */ + public PollReqContent(BigInteger certReqId) + : this(new DerInteger(certReqId)) + { + } + + /** + * Create a pollReqContent for a multiple certReqIds. + * + * @param certReqIds the certificate request IDs. + */ + public PollReqContent(BigInteger[] certReqIds) + : this(IntsToAsn1(certReqIds)) + { + } + + public virtual DerInteger[][] GetCertReqIDs() + { + DerInteger[][] result = new DerInteger[m_content.Count][]; + for (int i = 0; i != result.Length; ++i) + { + result[i] = SequenceToDerIntegerArray((Asn1Sequence)m_content[i]); + } + return result; + } + + public virtual BigInteger[] GetCertReqIDValues() + { + BigInteger[] result = new BigInteger[m_content.Count]; + + for (int i = 0; i != result.Length; i++) + { + result[i] = DerInteger.GetInstance(Asn1Sequence.GetInstance(m_content[i])[0]).Value; + } + + return result; + } + + /** + *
+		 * PollReqContent ::= SEQUENCE OF SEQUENCE {
+		 *                        certReqId              INTEGER
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + + private static DerInteger[] SequenceToDerIntegerArray(Asn1Sequence seq) + { + return seq.MapElements(DerInteger.GetInstance); + } + + private static DerSequence[] IntsToSequence(DerInteger[] ids) + { + DerSequence[] result = new DerSequence[ids.Length]; + + for (int i = 0; i != result.Length; i++) + { + result[i] = new DerSequence(ids[i]); + } + + return result; + } + + private static DerInteger[] IntsToAsn1(BigInteger[] ids) + { + DerInteger[] result = new DerInteger[ids.Length]; + + for (int i = 0; i != result.Length; i++) + { + result[i] = new DerInteger(ids[i]); + } + + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs.meta new file mode 100644 index 00000000..d55d1b0a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 89db50e925544cc4bb8035575757618a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PollReqContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs new file mode 100644 index 00000000..69581c8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PopoDecKeyChallContent + : Asn1Encodable + { + public static PopoDecKeyChallContent GetInstance(object obj) + { + if (obj is PopoDecKeyChallContent popoDecKeyChallContent) + return popoDecKeyChallContent; + + if (obj != null) + return new PopoDecKeyChallContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private PopoDecKeyChallContent(Asn1Sequence seq) + { + m_content = seq; + } + + public virtual Challenge[] ToChallengeArray() + { + return m_content.MapElements(Challenge.GetInstance); + } + + /** + *
+	     * PopoDecKeyChallContent ::= SEQUENCE OF Challenge
+	     * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs.meta new file mode 100644 index 00000000..5d7b5530 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ca6e2dbcd0353db4e9e07fab689b6db0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyChallContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs new file mode 100644 index 00000000..d2bc4917 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class PopoDecKeyRespContent + : Asn1Encodable + { + public static PopoDecKeyRespContent GetInstance(object obj) + { + if (obj is PopoDecKeyRespContent popoDecKeyRespContent) + return popoDecKeyRespContent; + + if (obj != null) + return new PopoDecKeyRespContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private PopoDecKeyRespContent(Asn1Sequence seq) + { + m_content = seq; + } + + public virtual DerInteger[] ToIntegerArray() + { + return m_content.MapElements(DerInteger.GetInstance); + } + + /** + *
+		 * PopoDecKeyRespContent ::= SEQUENCE OF INTEGER
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs.meta new file mode 100644 index 00000000..a1cc2a05 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 285540a2dd3350b4dba1bb41d57b1f9b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/PopoDecKeyRespContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs new file mode 100644 index 00000000..bee2af6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class ProtectedPart + : Asn1Encodable + { + public static ProtectedPart GetInstance(object obj) + { + if (obj is ProtectedPart protectedPart) + return protectedPart; + + if (obj != null) + return new ProtectedPart(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly PkiHeader m_header; + private readonly PkiBody m_body; + + private ProtectedPart(Asn1Sequence seq) + { + m_header = PkiHeader.GetInstance(seq[0]); + m_body = PkiBody.GetInstance(seq[1]); + } + + public ProtectedPart(PkiHeader header, PkiBody body) + { + m_header = header; + m_body = body; + } + + public virtual PkiHeader Header => m_header; + + public virtual PkiBody Body => m_body; + + /** + *
+		 * ProtectedPart ::= SEQUENCE {
+		 *                    header    PKIHeader,
+		 *                    body      PKIBody
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(m_header, m_body); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs.meta new file mode 100644 index 00000000..3dbc3c6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79565afff7b32cf498e67edf130c2fa1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/ProtectedPart.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs new file mode 100644 index 00000000..c42044a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class RevAnnContent + : Asn1Encodable + { + public static RevAnnContent GetInstance(object obj) + { + if (obj is RevAnnContent revAnnContent) + return revAnnContent; + + if (obj != null) + return new RevAnnContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly PkiStatusEncodable m_status; + private readonly CertId m_certID; + private readonly Asn1GeneralizedTime m_willBeRevokedAt; + private readonly Asn1GeneralizedTime m_badSinceDate; + private readonly X509Extensions m_crlDetails; + + public RevAnnContent(PkiStatusEncodable status, CertId certID, Asn1GeneralizedTime willBeRevokedAt, + Asn1GeneralizedTime badSinceDate) + : this(status, certID, willBeRevokedAt, badSinceDate, null) + { + } + + public RevAnnContent(PkiStatusEncodable status, CertId certID, Asn1GeneralizedTime willBeRevokedAt, + Asn1GeneralizedTime badSinceDate, X509Extensions crlDetails) + { + m_status = status; + m_certID = certID; + m_willBeRevokedAt = willBeRevokedAt; + m_badSinceDate = badSinceDate; + m_crlDetails = crlDetails; + } + + private RevAnnContent(Asn1Sequence seq) + { + m_status = PkiStatusEncodable.GetInstance(seq[0]); + m_certID = CertId.GetInstance(seq[1]); + m_willBeRevokedAt = Asn1GeneralizedTime.GetInstance(seq[2]); + m_badSinceDate = Asn1GeneralizedTime.GetInstance(seq[3]); + + if (seq.Count > 4) + { + m_crlDetails = X509Extensions.GetInstance(seq[4]); + } + } + + public virtual PkiStatusEncodable Status => m_status; + + public virtual CertId CertID => m_certID; + + public virtual Asn1GeneralizedTime WillBeRevokedAt => m_willBeRevokedAt; + + public virtual Asn1GeneralizedTime BadSinceDate => m_badSinceDate; + + public virtual X509Extensions CrlDetails => m_crlDetails; + + /** + *
+		 * RevAnnContent ::= SEQUENCE {
+		 *       status              PKIStatus,
+		 *       certId              CertId,
+		 *       willBeRevokedAt     GeneralizedTime,
+		 *       badSinceDate        GeneralizedTime,
+		 *       crlDetails          Extensions  OPTIONAL
+		 *        -- extra CRL details (e.g., crl number, reason, location, etc.)
+		 * }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_status, m_certID, m_willBeRevokedAt, m_badSinceDate); + v.AddOptional(m_crlDetails); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs.meta new file mode 100644 index 00000000..ff99d7d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec0ea9c18865c29439dc8cb75ed463ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevAnnContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs new file mode 100644 index 00000000..493bd406 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     * RevDetails ::= SEQUENCE {
+     *          certDetails         CertTemplate,
+     *          -- allows requester to specify as much as they can about
+     *          -- the cert. for which revocation is requested
+     *          -- (e.g., for cases in which serialNumber is not available)
+     *          crlEntryDetails     Extensions       OPTIONAL
+     *          -- requested crlEntryExtensions
+     *      }
+     * 
+ */ + public class RevDetails + : Asn1Encodable + { + public static RevDetails GetInstance(object obj) + { + if (obj is RevDetails revDetails) + return revDetails; + + if (obj != null) + return new RevDetails(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly CertTemplate m_certDetails; + private readonly X509Extensions m_crlEntryDetails; + + private RevDetails(Asn1Sequence seq) + { + m_certDetails = CertTemplate.GetInstance(seq[0]); + + if (seq.Count > 1) + { + m_crlEntryDetails = X509Extensions.GetInstance(seq[1]); + } + } + + public RevDetails(CertTemplate certDetails) + : this(certDetails, null) + { + } + + public RevDetails(CertTemplate certDetails, X509Extensions crlEntryDetails) + { + m_certDetails = certDetails; + m_crlEntryDetails = crlEntryDetails; + } + + public virtual CertTemplate CertDetails => m_certDetails; + + public virtual X509Extensions CrlEntryDetails => m_crlEntryDetails; + + /** + *
+		* RevDetails ::= SEQUENCE {
+		*                  certDetails         CertTemplate,
+		*                   -- allows requester to specify as much as they can about
+		*                   -- the cert. for which revocation is requested
+		*                   -- (e.g., for cases in which serialNumber is not available)
+		*                   crlEntryDetails     Extensions       OPTIONAL
+		*                   -- requested crlEntryExtensions
+		*             }
+		* 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certDetails); + v.AddOptional(m_crlEntryDetails); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs.meta new file mode 100644 index 00000000..698406c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f4b3619c16336b345b55ab20dce9a8ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevDetails.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs new file mode 100644 index 00000000..809a5608 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + *
+     * RevRepContent ::= SEQUENCE {
+     *          status       SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
+     *          -- in same order as was sent in RevReqContent
+     *          revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId
+     *                                              OPTIONAL,
+     *          -- IDs for which revocation was requested
+     *          -- (same order as status)
+     *          crls     [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
+     *          -- the resulting CRLs (there may be more than one)
+     *      }
+     *
+ */ + public class RevRepContent + : Asn1Encodable + { + public static RevRepContent GetInstance(object obj) + { + if (obj is RevRepContent revRepContent) + return revRepContent; + + if (obj != null) + return new RevRepContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_status; + private readonly Asn1Sequence m_revCerts; + private readonly Asn1Sequence m_crls; + + private RevRepContent(Asn1Sequence seq) + { + m_status = Asn1Sequence.GetInstance(seq[0]); + + for (int pos = 1; pos < seq.Count; ++pos) + { + Asn1TaggedObject tObj = Asn1TaggedObject.GetInstance(seq[pos]); + + if (tObj.TagNo == 0) + { + m_revCerts = Asn1Sequence.GetInstance(tObj, true); + } + else + { + m_crls = Asn1Sequence.GetInstance(tObj, true); + } + } + } + + public virtual PkiStatusInfo[] GetStatus() + { + return m_status.MapElements(PkiStatusInfo.GetInstance); + } + + public virtual CertId[] GetRevCerts() + { + if (m_revCerts == null) + return null; + + return m_revCerts.MapElements(CertId.GetInstance); + } + + public virtual CertificateList[] GetCrls() + { + if (m_crls == null) + return null; + + return m_crls.MapElements(CertificateList.GetInstance); + } + + /** + *
+		 * RevRepContent ::= SEQUENCE {
+		 *        status       SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
+		 *        -- in same order as was sent in RevReqContent
+		 *        revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId OPTIONAL,
+		 *        -- IDs for which revocation was requested
+		 *        -- (same order as status)
+		 *        crls     [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
+		 *        -- the resulting CRLs (there may be more than one)
+		 *   }
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_status); + v.AddOptionalTagged(true, 0, m_revCerts); + v.AddOptionalTagged(true, 1, m_crls); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs.meta new file mode 100644 index 00000000..dded9341 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 61fb5fcb2f0c8f94abe8b3191cf184eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs new file mode 100644 index 00000000..4c4f4e86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class RevRepContentBuilder + { + private readonly Asn1EncodableVector m_status = new Asn1EncodableVector(); + private readonly Asn1EncodableVector m_revCerts = new Asn1EncodableVector(); + private readonly Asn1EncodableVector m_crls = new Asn1EncodableVector(); + + public virtual RevRepContentBuilder Add(PkiStatusInfo status) + { + m_status.Add(status); + return this; + } + + public virtual RevRepContentBuilder Add(PkiStatusInfo status, CertId certId) + { + if (m_status.Count != m_revCerts.Count) + throw new InvalidOperationException("status and revCerts sequence must be in common order"); + + m_status.Add(status); + m_revCerts.Add(certId); + return this; + } + + public virtual RevRepContentBuilder AddCrl(CertificateList crl) + { + m_crls.Add(crl); + return this; + } + + public virtual RevRepContent Build() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + v.Add(new DerSequence(m_status)); + + if (m_revCerts.Count != 0) + { + v.Add(new DerTaggedObject(true, 0, new DerSequence(m_revCerts))); + } + + if (m_crls.Count != 0) + { + v.Add(new DerTaggedObject(true, 1, new DerSequence(m_crls))); + } + + return RevRepContent.GetInstance(new DerSequence(v)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs.meta new file mode 100644 index 00000000..620c6571 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05e473700bed52f47ad85cabbd7413d3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevRepContentBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs new file mode 100644 index 00000000..dd051cff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + public class RevReqContent + : Asn1Encodable + { + public static RevReqContent GetInstance(object obj) + { + if (obj is RevReqContent revReqContent) + return revReqContent; + + if (obj != null) + return new RevReqContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly Asn1Sequence m_content; + + private RevReqContent(Asn1Sequence seq) + { + m_content = seq; + } + + public RevReqContent(RevDetails revDetails) + { + m_content = new DerSequence(revDetails); + } + + public RevReqContent(params RevDetails[] revDetailsArray) + { + m_content = new DerSequence(revDetailsArray); + } + + public virtual RevDetails[] ToRevDetailsArray() + { + return m_content.MapElements(RevDetails.GetInstance); + } + + /** + *
+		 * RevReqContent ::= SEQUENCE OF RevDetails
+		 * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return m_content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs.meta new file mode 100644 index 00000000..3f519017 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a8e0e45790a3804ba7cda6acc7c3a37 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RevReqContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs new file mode 100644 index 00000000..98ba9aeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp +{ + /** + * GenMsg: {id-it 20}, RootCaCertValue | < absent > + * GenRep: {id-it 18}, RootCaKeyUpdateContent | < absent > + *

+ * RootCaCertValue ::= CMPCertificate + *

+ * RootCaKeyUpdateValue ::= RootCaKeyUpdateContent + *

+ * RootCaKeyUpdateContent ::= SEQUENCE { + * newWithNew CMPCertificate, + * newWithOld [0] CMPCertificate OPTIONAL, + * oldWithNew [1] CMPCertificate OPTIONAL + * } + *

+ */ + public class RootCaKeyUpdateContent + : Asn1Encodable + { + public static RootCaKeyUpdateContent GetInstance(object obj) + { + if (obj is RootCaKeyUpdateContent rootCaKeyUpdateContent) + return rootCaKeyUpdateContent; + + if (obj != null) + return new RootCaKeyUpdateContent(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly CmpCertificate m_newWithNew; + private readonly CmpCertificate m_newWithOld; + private readonly CmpCertificate m_oldWithNew; + + public RootCaKeyUpdateContent(CmpCertificate newWithNew, CmpCertificate newWithOld, CmpCertificate oldWithNew) + { + if (newWithNew == null) + throw new ArgumentNullException(nameof(newWithNew)); + + m_newWithNew = newWithNew; + m_newWithOld = newWithOld; + m_oldWithNew = oldWithNew; + } + + private RootCaKeyUpdateContent(Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 3) + throw new ArgumentException("expected sequence of 1 to 3 elements only"); + + CmpCertificate newWithNew; + CmpCertificate newWithOld = null; + CmpCertificate oldWithNew = null; + + newWithNew = CmpCertificate.GetInstance(seq[0]); + + for (int pos = 1; pos < seq.Count; ++pos) + { + Asn1TaggedObject ato = Asn1TaggedObject.GetInstance(seq[pos]); + if (ato.TagNo == 0) + { + newWithOld = CmpCertificate.GetInstance(ato, true); + } + else if (ato.TagNo == 1) + { + oldWithNew = CmpCertificate.GetInstance(ato, true); + } + } + + m_newWithNew = newWithNew; + m_newWithOld = newWithOld; + m_oldWithNew = oldWithNew; + } + + public virtual CmpCertificate NewWithNew => m_newWithNew; + + public virtual CmpCertificate NewWithOld => m_newWithOld; + + public virtual CmpCertificate OldWithNew => m_oldWithNew; + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_newWithNew); + v.AddOptionalTagged(true, 0, m_newWithOld); + v.AddOptionalTagged(true, 1, m_oldWithNew); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs.meta new file mode 100644 index 00000000..fae0bebf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1715bfa0022963c4696082543f5e8fe2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cmp/RootCaKeyUpdateContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms.meta new file mode 100644 index 00000000..093211b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5e708fec1acb56d4c8ef1b399036826d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs new file mode 100644 index 00000000..1132cdcc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs @@ -0,0 +1,74 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class Attribute + : Asn1Encodable + { + private DerObjectIdentifier attrType; + private Asn1Set attrValues; + + /** + * return an Attribute object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static Attribute GetInstance( + object obj) + { + if (obj == null || obj is Attribute) + return (Attribute) obj; + + if (obj is Asn1Sequence) + return new Attribute((Asn1Sequence) obj); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Attribute( + Asn1Sequence seq) + { + attrType = (DerObjectIdentifier)seq[0]; + attrValues = (Asn1Set)seq[1]; + } + + public Attribute( + DerObjectIdentifier attrType, + Asn1Set attrValues) + { + this.attrType = attrType; + this.attrValues = attrValues; + } + + public DerObjectIdentifier AttrType + { + get { return attrType; } + } + + public Asn1Set AttrValues + { + get { return attrValues; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+        * Attribute ::= SEQUENCE {
+        *     attrType OBJECT IDENTIFIER,
+        *     attrValues SET OF AttributeValue
+        * }
+        * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(attrType, attrValues); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs.meta new file mode 100644 index 00000000..f47ac6bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4e7b2ed0c0e219d439652e22b9125ff7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs new file mode 100644 index 00000000..263a6448 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs @@ -0,0 +1,224 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class AttributeTable + { + private readonly Dictionary m_attributes; + + public AttributeTable(IDictionary attrs) + { + m_attributes = new Dictionary(attrs); + } + + public AttributeTable(Asn1EncodableVector v) + { + m_attributes = new Dictionary(v.Count); + + foreach (Asn1Encodable e in v) + { + AddAttribute(Attribute.GetInstance(e)); + } + } + + public AttributeTable(Asn1Set s) + { + m_attributes = new Dictionary(s.Count); + + foreach (Asn1Encodable e in s) + { + AddAttribute(Attribute.GetInstance(e)); + } + } + + public AttributeTable(Attributes attrs) + : this(Asn1Set.GetInstance(attrs.ToAsn1Object())) + { + } + + private void AddAttribute(Attribute a) + { + DerObjectIdentifier oid = a.AttrType; + + if (!m_attributes.TryGetValue(oid, out object existingValue)) + { + m_attributes[oid] = a; + return; + } + + if (existingValue is IList existingList) + { + existingList.Add(a); + return; + } + + if (existingValue is Attribute existingAttr) + { + var newList = new List(); + newList.Add(existingAttr); + newList.Add(a); + m_attributes[oid] = newList; + return; + } + + throw new InvalidOperationException(); + } + + /// Return the first attribute matching the given OBJECT IDENTIFIER + public Attribute this[DerObjectIdentifier oid] + { + get + { + if (!m_attributes.TryGetValue(oid, out object existingValue)) + return null; + + if (existingValue is IList existingList) + return existingList[0]; + + if (existingValue is Attribute existingAttr) + return existingAttr; + + throw new InvalidOperationException(); + } + } + + /** + * Return all the attributes matching the OBJECT IDENTIFIER oid. The vector will be + * empty if there are no attributes of the required type present. + * + * @param oid type of attribute required. + * @return a vector of all the attributes found of type oid. + */ + public Asn1EncodableVector GetAll(DerObjectIdentifier oid) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (m_attributes.TryGetValue(oid, out object existingValue)) + { + if (existingValue is IList existingList) + { + foreach (var attr in existingList) + { + v.Add(attr); + } + } + else if (existingValue is Attribute existingAttr) + { + v.Add(existingAttr); + } + else + { + throw new InvalidOperationException(); + } + } + + return v; + } + + public int Count + { + get + { + int total = 0; + + foreach (object existingValue in m_attributes.Values) + { + if (existingValue is IList existingList) + { + total += existingList.Count; + } + else if (existingValue is Attribute existingAttr) + { + ++total; + } + else + { + throw new InvalidOperationException(); + } + } + + return total; + } + } + + public IDictionary ToDictionary() + { + return new Dictionary(m_attributes); + } + + public Asn1EncodableVector ToAsn1EncodableVector() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + foreach (object existingValue in m_attributes.Values) + { + if (existingValue is IList existingList) + { + foreach (Attribute existingAttr in existingList) + { + v.Add(existingAttr); + } + } + else if (existingValue is Attribute existingAttr) + { + v.Add(existingAttr); + } + else + { + throw new InvalidOperationException(); + } + } + + return v; + } + + public Attributes ToAttributes() + { + return new Attributes(ToAsn1EncodableVector()); + } + + public AttributeTable Add(params Attribute[] attributes) + { + if (attributes == null || attributes.Length < 1) + return this; + + var newTable = new AttributeTable(m_attributes); + foreach (Attribute attribute in attributes) + { + newTable.AddAttribute(attribute); + } + + return newTable; + } + + /** + * Return a new table with the passed in attribute added. + * + * @param attrType + * @param attrValue + * @return + */ + public AttributeTable Add(DerObjectIdentifier attrType, Asn1Encodable attrValue) + { + AttributeTable newTable = new AttributeTable(m_attributes); + + newTable.AddAttribute(new Attribute(attrType, new DerSet(attrValue))); + + return newTable; + } + + public AttributeTable Remove(DerObjectIdentifier attrType) + { + AttributeTable newTable = new AttributeTable(m_attributes); + + newTable.m_attributes.Remove(attrType); + + return newTable; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs.meta new file mode 100644 index 00000000..05203998 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7d4a7121d9179946b171e9919501078 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AttributeTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs new file mode 100644 index 00000000..aff0bd9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class Attributes + : Asn1Encodable + { + private readonly Asn1Set attributes; + + private Attributes(Asn1Set attributes) + { + this.attributes = attributes; + } + + public Attributes(Asn1EncodableVector v) + { + attributes = new BerSet(v); + } + + public static Attributes GetInstance(object obj) + { + if (obj is Attributes) + return (Attributes)obj; + + if (obj != null) + return new Attributes(Asn1Set.GetInstance(obj)); + + return null; + } + + public virtual Attribute[] GetAttributes() + { + Attribute[] rv = new Attribute[attributes.Count]; + + for (int i = 0; i != rv.Length; i++) + { + rv[i] = Attribute.GetInstance(attributes[i]); + } + + return rv; + } + + /** + *
+         * Attributes ::=
+         *   SET SIZE(1..MAX) OF Attribute -- according to RFC 5652
+         * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + return attributes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs.meta new file mode 100644 index 00000000..81d2ef10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93e45ad275157a34f82737172f176419 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Attributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs new file mode 100644 index 00000000..fd08babf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs @@ -0,0 +1,209 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class AuthEnvelopedData + : Asn1Encodable + { + private DerInteger version; + private OriginatorInfo originatorInfo; + private Asn1Set recipientInfos; + private EncryptedContentInfo authEncryptedContentInfo; + private Asn1Set authAttrs; + private Asn1OctetString mac; + private Asn1Set unauthAttrs; + + public AuthEnvelopedData( + OriginatorInfo originatorInfo, + Asn1Set recipientInfos, + EncryptedContentInfo authEncryptedContentInfo, + Asn1Set authAttrs, + Asn1OctetString mac, + Asn1Set unauthAttrs) + { + // "It MUST be set to 0." + this.version = new DerInteger(0); + + this.originatorInfo = originatorInfo; + + // "There MUST be at least one element in the collection." + this.recipientInfos = recipientInfos; + if (this.recipientInfos.Count < 1) + throw new ArgumentException("AuthEnvelopedData requires at least 1 RecipientInfo"); + + this.authEncryptedContentInfo = authEncryptedContentInfo; + + // "The authAttrs MUST be present if the content type carried in + // EncryptedContentInfo is not id-data." + this.authAttrs = authAttrs; + if (!authEncryptedContentInfo.ContentType.Equals(CmsObjectIdentifiers.Data)) + { + if (authAttrs == null || authAttrs.Count < 1) + throw new ArgumentException("authAttrs must be present with non-data content"); + } + + this.mac = mac; + + this.unauthAttrs = unauthAttrs; + } + + private AuthEnvelopedData( + Asn1Sequence seq) + { + int index = 0; + + // "It MUST be set to 0." + Asn1Object tmp = seq[index++].ToAsn1Object(); + version = DerInteger.GetInstance(tmp); + if (!version.HasValue(0)) + throw new ArgumentException("AuthEnvelopedData version number must be 0"); + + tmp = seq[index++].ToAsn1Object(); + if (tmp is Asn1TaggedObject) + { + originatorInfo = OriginatorInfo.GetInstance((Asn1TaggedObject)tmp, false); + tmp = seq[index++].ToAsn1Object(); + } + + // "There MUST be at least one element in the collection." + recipientInfos = Asn1Set.GetInstance(tmp); + if (recipientInfos.Count < 1) + throw new ArgumentException("AuthEnvelopedData requires at least 1 RecipientInfo"); + + tmp = seq[index++].ToAsn1Object(); + authEncryptedContentInfo = EncryptedContentInfo.GetInstance(tmp); + + tmp = seq[index++].ToAsn1Object(); + if (tmp is Asn1TaggedObject) + { + authAttrs = Asn1Set.GetInstance((Asn1TaggedObject)tmp, false); + tmp = seq[index++].ToAsn1Object(); + } + else + { + // "The authAttrs MUST be present if the content type carried in + // EncryptedContentInfo is not id-data." + if (!authEncryptedContentInfo.ContentType.Equals(CmsObjectIdentifiers.Data)) + { + if (authAttrs == null || authAttrs.Count < 1) + throw new ArgumentException("authAttrs must be present with non-data content"); + } + } + + mac = Asn1OctetString.GetInstance(tmp); + + if (seq.Count > index) + { + tmp = seq[index++].ToAsn1Object(); + unauthAttrs = Asn1Set.GetInstance((Asn1TaggedObject)tmp, false); + } + } + + /** + * return an AuthEnvelopedData object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param isExplicit true if the object is meant to be explicitly + * tagged false otherwise. + * @throws ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static AuthEnvelopedData GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return an AuthEnvelopedData object from the given object. + * + * @param obj the object we want converted. + * @throws ArgumentException if the object cannot be converted. + */ + public static AuthEnvelopedData GetInstance( + object obj) + { + if (obj == null || obj is AuthEnvelopedData) + return (AuthEnvelopedData)obj; + + if (obj is Asn1Sequence) + return new AuthEnvelopedData((Asn1Sequence)obj); + + throw new ArgumentException("Invalid AuthEnvelopedData: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorInfo OriginatorInfo + { + get { return originatorInfo; } + } + + public Asn1Set RecipientInfos + { + get { return recipientInfos; } + } + + public EncryptedContentInfo AuthEncryptedContentInfo + { + get { return authEncryptedContentInfo; } + } + + public Asn1Set AuthAttrs + { + get { return authAttrs; } + } + + public Asn1OctetString Mac + { + get { return mac; } + } + + public Asn1Set UnauthAttrs + { + get { return unauthAttrs; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		 * AuthEnvelopedData ::= SEQUENCE {
+		 *   version CMSVersion,
+		 *   originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+		 *   recipientInfos RecipientInfos,
+		 *   authEncryptedContentInfo EncryptedContentInfo,
+		 *   authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
+		 *   mac MessageAuthenticationCode,
+		 *   unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version); + v.AddOptionalTagged(false, 0, originatorInfo); + v.Add(recipientInfos, authEncryptedContentInfo); + + // "authAttrs optionally contains the authenticated attributes." + // "AuthAttributes MUST be DER encoded, even if the rest of the + // AuthEnvelopedData structure is BER encoded." + v.AddOptionalTagged(false, 1, authAttrs); + + v.Add(mac); + + // "unauthAttrs optionally contains the unauthenticated attributes." + v.AddOptionalTagged(false, 2, unauthAttrs); + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs.meta new file mode 100644 index 00000000..9a8c5ba8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4395da7e62945354ebf65fc7312dc0be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs new file mode 100644 index 00000000..fb0e6340 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * Produce an object suitable for an Asn1OutputStream. + * + *
+	 * AuthEnvelopedData ::= SEQUENCE {
+	 *   version CMSVersion,
+	 *   originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+	 *   recipientInfos RecipientInfos,
+	 *   authEncryptedContentInfo EncryptedContentInfo,
+	 *   authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
+	 *   mac MessageAuthenticationCode,
+	 *   unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
+	 * 
+ */ + public class AuthEnvelopedDataParser + { + private Asn1SequenceParser seq; + private DerInteger version; + private IAsn1Convertible nextObject; + private bool originatorInfoCalled; + private bool isData; + + public AuthEnvelopedDataParser( + Asn1SequenceParser seq) + { + this.seq = seq; + + // "It MUST be set to 0." + this.version = (DerInteger)seq.ReadObject(); + if (!version.HasValue(0)) + throw new Asn1ParsingException("AuthEnvelopedData version number must be 0"); + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorInfo GetOriginatorInfo() + { + originatorInfoCalled = true; + + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject is Asn1TaggedObjectParser o) + { + if (o.HasContextTag(0)) + { + Asn1SequenceParser originatorInfo = (Asn1SequenceParser)o.ParseBaseUniversal(false, Asn1Tags.Sequence); + nextObject = null; + return OriginatorInfo.GetInstance(originatorInfo.ToAsn1Object()); + } + } + + return null; + } + + public Asn1SetParser GetRecipientInfos() + { + if (!originatorInfoCalled) + { + GetOriginatorInfo(); + } + + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + Asn1SetParser recipientInfos = (Asn1SetParser)nextObject; + nextObject = null; + return recipientInfos; + } + + public EncryptedContentInfoParser GetAuthEncryptedContentInfo() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject != null) + { + Asn1SequenceParser o = (Asn1SequenceParser) nextObject; + nextObject = null; + EncryptedContentInfoParser encryptedContentInfoParser = new EncryptedContentInfoParser(o); + isData = CmsObjectIdentifiers.Data.Equals(encryptedContentInfoParser.ContentType); + return encryptedContentInfoParser; + } + + return null; + } + + public Asn1SetParser GetAuthAttrs() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject is Asn1TaggedObjectParser o) + { + nextObject = null; + return (Asn1SetParser)Asn1Utilities.ParseContextBaseUniversal(o, 1, false, Asn1Tags.SetOf); + } + + // "The authAttrs MUST be present if the content type carried in EncryptedContentInfo is not id-data." + if (!isData) + throw new Asn1ParsingException("authAttrs must be present with non-data content"); + + return null; + } + + public Asn1OctetString GetMac() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + IAsn1Convertible o = nextObject; + nextObject = null; + + return Asn1OctetString.GetInstance(o.ToAsn1Object()); + } + + public Asn1SetParser GetUnauthAttrs() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject != null) + { + Asn1TaggedObjectParser o = (Asn1TaggedObjectParser)nextObject; + nextObject = null; + return (Asn1SetParser)Asn1Utilities.ParseContextBaseUniversal(o, 2, false, Asn1Tags.SetOf); + } + + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs.meta new file mode 100644 index 00000000..58d15e1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8e5fac709ab110c47bc9eb66d230007a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthEnvelopedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs new file mode 100644 index 00000000..47380cc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs @@ -0,0 +1,255 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class AuthenticatedData + : Asn1Encodable + { + private DerInteger version; + private OriginatorInfo originatorInfo; + private Asn1Set recipientInfos; + private AlgorithmIdentifier macAlgorithm; + private AlgorithmIdentifier digestAlgorithm; + private ContentInfo encapsulatedContentInfo; + private Asn1Set authAttrs; + private Asn1OctetString mac; + private Asn1Set unauthAttrs; + + public AuthenticatedData( + OriginatorInfo originatorInfo, + Asn1Set recipientInfos, + AlgorithmIdentifier macAlgorithm, + AlgorithmIdentifier digestAlgorithm, + ContentInfo encapsulatedContent, + Asn1Set authAttrs, + Asn1OctetString mac, + Asn1Set unauthAttrs) + { + if (digestAlgorithm != null || authAttrs != null) + { + if (digestAlgorithm == null || authAttrs == null) + { + throw new ArgumentException("digestAlgorithm and authAttrs must be set together"); + } + } + + version = new DerInteger(CalculateVersion(originatorInfo)); + + this.originatorInfo = originatorInfo; + this.macAlgorithm = macAlgorithm; + this.digestAlgorithm = digestAlgorithm; + this.recipientInfos = recipientInfos; + this.encapsulatedContentInfo = encapsulatedContent; + this.authAttrs = authAttrs; + this.mac = mac; + this.unauthAttrs = unauthAttrs; + } + + private AuthenticatedData( + Asn1Sequence seq) + { + int index = 0; + + version = (DerInteger)seq[index++]; + + Asn1Encodable tmp = seq[index++]; + if (tmp is Asn1TaggedObject) + { + originatorInfo = OriginatorInfo.GetInstance((Asn1TaggedObject)tmp, false); + tmp = seq[index++]; + } + + recipientInfos = Asn1Set.GetInstance(tmp); + macAlgorithm = AlgorithmIdentifier.GetInstance(seq[index++]); + + tmp = seq[index++]; + if (tmp is Asn1TaggedObject) + { + digestAlgorithm = AlgorithmIdentifier.GetInstance((Asn1TaggedObject)tmp, false); + tmp = seq[index++]; + } + + encapsulatedContentInfo = ContentInfo.GetInstance(tmp); + + tmp = seq[index++]; + if (tmp is Asn1TaggedObject) + { + authAttrs = Asn1Set.GetInstance((Asn1TaggedObject)tmp, false); + tmp = seq[index++]; + } + + mac = Asn1OctetString.GetInstance(tmp); + + if (seq.Count > index) + { + unauthAttrs = Asn1Set.GetInstance((Asn1TaggedObject)seq[index], false); + } + } + + /** + * return an AuthenticatedData object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param isExplicit true if the object is meant to be explicitly + * tagged false otherwise. + * @throws ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static AuthenticatedData GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return an AuthenticatedData object from the given object. + * + * @param obj the object we want converted. + * @throws ArgumentException if the object cannot be converted. + */ + public static AuthenticatedData GetInstance( + object obj) + { + if (obj == null || obj is AuthenticatedData) + { + return (AuthenticatedData)obj; + } + + if (obj is Asn1Sequence) + { + return new AuthenticatedData((Asn1Sequence)obj); + } + + throw new ArgumentException("Invalid AuthenticatedData: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorInfo OriginatorInfo + { + get { return originatorInfo; } + } + + public Asn1Set RecipientInfos + { + get { return recipientInfos; } + } + + public AlgorithmIdentifier MacAlgorithm + { + get { return macAlgorithm; } + } + + public AlgorithmIdentifier DigestAlgorithm + { + get { return digestAlgorithm; } + } + + public ContentInfo EncapsulatedContentInfo + { + get { return encapsulatedContentInfo; } + } + + public Asn1Set AuthAttrs + { + get { return authAttrs; } + } + + public Asn1OctetString Mac + { + get { return mac; } + } + + public Asn1Set UnauthAttrs + { + get { return unauthAttrs; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		 * AuthenticatedData ::= SEQUENCE {
+		 *       version CMSVersion,
+		 *       originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+		 *       recipientInfos RecipientInfos,
+		 *       macAlgorithm MessageAuthenticationCodeAlgorithm,
+		 *       digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
+		 *       encapContentInfo EncapsulatedContentInfo,
+		 *       authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
+		 *       mac MessageAuthenticationCode,
+		 *       unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
+		 *
+		 * AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
+		 *
+		 * UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
+		 *
+		 * MessageAuthenticationCode ::= OCTET STRING
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version); + v.AddOptionalTagged(false, 0, originatorInfo); + v.Add(recipientInfos, macAlgorithm); + v.AddOptionalTagged(false, 1, digestAlgorithm); + v.Add(encapsulatedContentInfo); + v.AddOptionalTagged(false, 2, authAttrs); + v.Add(mac); + v.AddOptionalTagged(false, 3, unauthAttrs); + return new BerSequence(v); + } + + public static int CalculateVersion(OriginatorInfo origInfo) + { + if (origInfo == null) + return 0; + + int ver = 0; + + foreach (object obj in origInfo.Certificates) + { + if (obj is Asn1TaggedObject) + { + Asn1TaggedObject tag = (Asn1TaggedObject)obj; + + if (tag.TagNo == 2) + { + ver = 1; + } + else if (tag.TagNo == 3) + { + ver = 3; + break; + } + } + } + + foreach (object obj in origInfo.Crls) + { + if (obj is Asn1TaggedObject) + { + Asn1TaggedObject tag = (Asn1TaggedObject)obj; + + if (tag.TagNo == 1) + { + ver = 3; + break; + } + } + } + + return ver; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs.meta new file mode 100644 index 00000000..3f1f0850 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4ff572d35ad682f4486444d1af9600a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs new file mode 100644 index 00000000..7fcb7b9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs @@ -0,0 +1,188 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * Produce an object suitable for an Asn1OutputStream. + *
+	 * AuthenticatedData ::= SEQUENCE {
+	 *       version CMSVersion,
+	 *       originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+	 *       recipientInfos RecipientInfos,
+	 *       macAlgorithm MessageAuthenticationCodeAlgorithm,
+	 *       digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL,
+	 *       encapContentInfo EncapsulatedContentInfo,
+	 *       authAttrs [2] IMPLICIT AuthAttributes OPTIONAL,
+	 *       mac MessageAuthenticationCode,
+	 *       unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
+	 *
+	 * AuthAttributes ::= SET SIZE (1..MAX) OF Attribute
+	 *
+	 * UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute
+	 *
+	 * MessageAuthenticationCode ::= OCTET STRING
+	 * 
+ */ + public class AuthenticatedDataParser + { + private Asn1SequenceParser seq; + private DerInteger version; + private IAsn1Convertible nextObject; + private bool originatorInfoCalled; + + public AuthenticatedDataParser( + Asn1SequenceParser seq) + { + this.seq = seq; + this.version = (DerInteger)seq.ReadObject(); + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorInfo GetOriginatorInfo() + { + originatorInfoCalled = true; + + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject is Asn1TaggedObjectParser o) + { + if (o.HasContextTag(0)) + { + Asn1SequenceParser originatorInfo = (Asn1SequenceParser)o.ParseBaseUniversal(false, Asn1Tags.Sequence); + nextObject = null; + return OriginatorInfo.GetInstance(originatorInfo.ToAsn1Object()); + } + } + + return null; + } + + public Asn1SetParser GetRecipientInfos() + { + if (!originatorInfoCalled) + { + GetOriginatorInfo(); + } + + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + Asn1SetParser recipientInfos = (Asn1SetParser)nextObject; + nextObject = null; + return recipientInfos; + } + + public AlgorithmIdentifier GetMacAlgorithm() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject != null) + { + Asn1SequenceParser o = (Asn1SequenceParser)nextObject; + nextObject = null; + return AlgorithmIdentifier.GetInstance(o.ToAsn1Object()); + } + + return null; + } + + public AlgorithmIdentifier GetDigestAlgorithm() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject is Asn1TaggedObjectParser) + { + AlgorithmIdentifier obj = AlgorithmIdentifier.GetInstance( + (Asn1TaggedObject)nextObject.ToAsn1Object(), false); + nextObject = null; + return obj; + } + + return null; + } + + public ContentInfoParser GetEnapsulatedContentInfo() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject != null) + { + Asn1SequenceParser o = (Asn1SequenceParser)nextObject; + nextObject = null; + return new ContentInfoParser(o); + } + + return null; + } + + public Asn1SetParser GetAuthAttrs() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject is Asn1TaggedObjectParser o) + { + nextObject = null; + return (Asn1SetParser)Asn1Utilities.ParseContextBaseUniversal(o, 2, false, Asn1Tags.SetOf); + } + + return null; + } + + public Asn1OctetString GetMac() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + IAsn1Convertible o = nextObject; + nextObject = null; + + return Asn1OctetString.GetInstance(o.ToAsn1Object()); + } + + public Asn1SetParser GetUnauthAttrs() + { + if (nextObject == null) + { + nextObject = seq.ReadObject(); + } + + if (nextObject != null) + { + Asn1TaggedObject o = (Asn1TaggedObject)nextObject; + nextObject = null; + return (Asn1SetParser)Asn1Utilities.ParseContextBaseUniversal(o, 3, false, Asn1Tags.SetOf); + } + + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs.meta new file mode 100644 index 00000000..88ef0d65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c19c2da6a0d2194e86593aad8a68c87 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/AuthenticatedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs new file mode 100644 index 00000000..3d70670b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public abstract class CmsAttributes + { + public static readonly DerObjectIdentifier ContentType = PkcsObjectIdentifiers.Pkcs9AtContentType; + public static readonly DerObjectIdentifier MessageDigest = PkcsObjectIdentifiers.Pkcs9AtMessageDigest; + public static readonly DerObjectIdentifier SigningTime = PkcsObjectIdentifiers.Pkcs9AtSigningTime; + public static readonly DerObjectIdentifier CounterSignature = PkcsObjectIdentifiers.Pkcs9AtCounterSignature; + public static readonly DerObjectIdentifier ContentHint = PkcsObjectIdentifiers.IdAAContentHint; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs.meta new file mode 100644 index 00000000..9fa99ba5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3536faf70205ac240a1f81abacaa70b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSAttributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs new file mode 100644 index 00000000..f1ec2cfb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public abstract class CmsObjectIdentifiers + { + public static readonly DerObjectIdentifier Data = PkcsObjectIdentifiers.Data; + public static readonly DerObjectIdentifier SignedData = PkcsObjectIdentifiers.SignedData; + public static readonly DerObjectIdentifier EnvelopedData = PkcsObjectIdentifiers.EnvelopedData; + public static readonly DerObjectIdentifier SignedAndEnvelopedData = PkcsObjectIdentifiers.SignedAndEnvelopedData; + public static readonly DerObjectIdentifier DigestedData = PkcsObjectIdentifiers.DigestedData; + public static readonly DerObjectIdentifier EncryptedData = PkcsObjectIdentifiers.EncryptedData; + public static readonly DerObjectIdentifier AuthenticatedData = PkcsObjectIdentifiers.IdCTAuthData; + public static readonly DerObjectIdentifier CompressedData = PkcsObjectIdentifiers.IdCTCompressedData; + public static readonly DerObjectIdentifier AuthEnvelopedData = PkcsObjectIdentifiers.IdCTAuthEnvelopedData; + public static readonly DerObjectIdentifier TimestampedData = PkcsObjectIdentifiers.IdCTTimestampedData; + public static readonly DerObjectIdentifier ZlibCompress = PkcsObjectIdentifiers.IdAlgZlibCompress; + + /** + * The other Revocation Info arc + * id-ri OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) + * dod(6) internet(1) security(5) mechanisms(5) pkix(7) ri(16) } + */ + public static readonly DerObjectIdentifier id_ri = new DerObjectIdentifier("1.3.6.1.5.5.7.16"); + + public static readonly DerObjectIdentifier id_ri_ocsp_response = id_ri.Branch("2"); + public static readonly DerObjectIdentifier id_ri_scvp = id_ri.Branch("4"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs.meta new file mode 100644 index 00000000..09a57913 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb16ff4f1005f3c43b3f3b7527cef3c5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CMSObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs new file mode 100644 index 00000000..186f8297 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * RFC 3274 - CMS Compressed Data. + *
+     * CompressedData ::= Sequence {
+     *  version CMSVersion,
+     *  compressionAlgorithm CompressionAlgorithmIdentifier,
+     *  encapContentInfo EncapsulatedContentInfo
+     * }
+     * 
+ */ + public class CompressedData + : Asn1Encodable + { + private DerInteger version; + private AlgorithmIdentifier compressionAlgorithm; + private ContentInfo encapContentInfo; + + public CompressedData( + AlgorithmIdentifier compressionAlgorithm, + ContentInfo encapContentInfo) + { + this.version = new DerInteger(0); + this.compressionAlgorithm = compressionAlgorithm; + this.encapContentInfo = encapContentInfo; + } + + public CompressedData( + Asn1Sequence seq) + { + this.version = (DerInteger) seq[0]; + this.compressionAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + this.encapContentInfo = ContentInfo.GetInstance(seq[2]); + } + + /** + * return a CompressedData object from a tagged object. + * + * @param ato the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static CompressedData GetInstance( + Asn1TaggedObject ato, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(ato, explicitly)); + } + + /** + * return a CompressedData object from the given object. + * + * @param _obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static CompressedData GetInstance( + object obj) + { + if (obj == null || obj is CompressedData) + return (CompressedData)obj; + + if (obj is Asn1Sequence) + return new CompressedData((Asn1Sequence) obj); + + throw new ArgumentException("Invalid CompressedData: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public AlgorithmIdentifier CompressionAlgorithmIdentifier + { + get { return compressionAlgorithm; } + } + + public ContentInfo EncapContentInfo + { + get { return encapContentInfo; } + } + + public override Asn1Object ToAsn1Object() + { + return new BerSequence(version, compressionAlgorithm, encapContentInfo); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs.meta new file mode 100644 index 00000000..b9d9b47d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9457f0c939bd3a64db91f73728493334 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs new file mode 100644 index 00000000..7059747c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * RFC 3274 - CMS Compressed Data. + *
+	* CompressedData ::= SEQUENCE {
+	*  version CMSVersion,
+	*  compressionAlgorithm CompressionAlgorithmIdentifier,
+	*  encapContentInfo EncapsulatedContentInfo
+	* }
+	* 
+ */ + public class CompressedDataParser + { + private DerInteger _version; + private AlgorithmIdentifier _compressionAlgorithm; + private ContentInfoParser _encapContentInfo; + + public CompressedDataParser( + Asn1SequenceParser seq) + { + this._version = (DerInteger)seq.ReadObject(); + this._compressionAlgorithm = AlgorithmIdentifier.GetInstance(seq.ReadObject().ToAsn1Object()); + this._encapContentInfo = new ContentInfoParser((Asn1SequenceParser)seq.ReadObject()); + } + + public DerInteger Version + { + get { return _version; } + } + + public AlgorithmIdentifier CompressionAlgorithmIdentifier + { + get { return _compressionAlgorithm; } + } + + public ContentInfoParser GetEncapContentInfo() + { + return _encapContentInfo; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs.meta new file mode 100644 index 00000000..a5329775 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3793ea5a61cce8e469fa9dc164e95a48 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/CompressedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs new file mode 100644 index 00000000..cbad3fab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class ContentInfo + : Asn1Encodable + { + private readonly DerObjectIdentifier contentType; + private readonly Asn1Encodable content; + + public static ContentInfo GetInstance( + object obj) + { + if (obj == null || obj is ContentInfo) + return (ContentInfo) obj; + + if (obj is Asn1Sequence) + return new ContentInfo((Asn1Sequence) obj); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public static ContentInfo GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + private ContentInfo( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + contentType = (DerObjectIdentifier) seq[0]; + + if (seq.Count > 1) + { + Asn1TaggedObject tagged = (Asn1TaggedObject) seq[1]; + if (!tagged.IsExplicit() || tagged.TagNo != 0) + throw new ArgumentException("Bad tag for 'content'", "seq"); + + content = tagged.GetObject(); + } + } + + public ContentInfo( + DerObjectIdentifier contentType, + Asn1Encodable content) + { + this.contentType = contentType; + this.content = content; + } + + public DerObjectIdentifier ContentType + { + get { return contentType; } + } + + public Asn1Encodable Content + { + get { return content; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ContentInfo ::= Sequence {
+         *          contentType ContentType,
+         *          content
+         *          [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(contentType); + + if (content != null) + { + v.Add(new BerTaggedObject(0, content)); + } + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs.meta new file mode 100644 index 00000000..493bfbee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 60dc726915386494a93527c45d350449 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs new file mode 100644 index 00000000..ae701e41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * Produce an object suitable for an Asn1OutputStream. + *
+	* ContentInfo ::= SEQUENCE {
+	*          contentType ContentType,
+	*          content
+	*          [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
+	* 
+ */ + public class ContentInfoParser + { + private readonly DerObjectIdentifier m_contentType; + private readonly Asn1TaggedObjectParser m_content; + + public ContentInfoParser(Asn1SequenceParser seq) + { + m_contentType = (DerObjectIdentifier)seq.ReadObject(); + m_content = (Asn1TaggedObjectParser)seq.ReadObject(); + } + + public DerObjectIdentifier ContentType + { + get { return m_contentType; } + } + + public IAsn1Convertible GetContent(int tag) + { + if (null == m_content) + return null; + + // TODO[cms] Ideally we could enforce the claimed tag + //return Asn1Utilities.ParseContextBaseUniversal(content, 0, true, tag); + return Asn1Utilities.ParseExplicitContextBaseObject(m_content, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs.meta new file mode 100644 index 00000000..4ee96231 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea9252b7438c0be4391421c0b342301d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ContentInfoParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs new file mode 100644 index 00000000..85145871 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class EncryptedContentInfo + : Asn1Encodable + { + private DerObjectIdentifier contentType; + private AlgorithmIdentifier contentEncryptionAlgorithm; + private Asn1OctetString encryptedContent; + + public EncryptedContentInfo( + DerObjectIdentifier contentType, + AlgorithmIdentifier contentEncryptionAlgorithm, + Asn1OctetString encryptedContent) + { + this.contentType = contentType; + this.contentEncryptionAlgorithm = contentEncryptionAlgorithm; + this.encryptedContent = encryptedContent; + } + + public EncryptedContentInfo( + Asn1Sequence seq) + { + contentType = (DerObjectIdentifier) seq[0]; + contentEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + + if (seq.Count > 2) + { + encryptedContent = Asn1OctetString.GetInstance( + (Asn1TaggedObject) seq[2], false); + } + } + + /** + * return an EncryptedContentInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static EncryptedContentInfo GetInstance( + object obj) + { + if (obj == null || obj is EncryptedContentInfo) + return (EncryptedContentInfo)obj; + + if (obj is Asn1Sequence) + return new EncryptedContentInfo((Asn1Sequence)obj); + + throw new ArgumentException("Invalid EncryptedContentInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerObjectIdentifier ContentType + { + get { return contentType; } + } + + public AlgorithmIdentifier ContentEncryptionAlgorithm + { + get { return contentEncryptionAlgorithm; } + } + + public Asn1OctetString EncryptedContent + { + get { return encryptedContent; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * EncryptedContentInfo ::= Sequence {
+         *     contentType ContentType,
+         *     contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
+         *     encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + contentType, contentEncryptionAlgorithm); + + if (encryptedContent != null) + { + v.Add(new BerTaggedObject(false, 0, encryptedContent)); + } + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs.meta new file mode 100644 index 00000000..be264253 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3bad0f2b4823f394ca2aa0ff2f31de2c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs new file mode 100644 index 00000000..a03a2ad7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + *
+	* EncryptedContentInfo ::= SEQUENCE {
+	*     contentType ContentType,
+	*     contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier,
+	*     encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
+	* }
+	* 
+ */ + public class EncryptedContentInfoParser + { + private DerObjectIdentifier _contentType; + private AlgorithmIdentifier _contentEncryptionAlgorithm; + private Asn1TaggedObjectParser _encryptedContent; + + public EncryptedContentInfoParser( + Asn1SequenceParser seq) + { + _contentType = (DerObjectIdentifier)seq.ReadObject(); + _contentEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq.ReadObject().ToAsn1Object()); + _encryptedContent = (Asn1TaggedObjectParser)seq.ReadObject(); + } + + public DerObjectIdentifier ContentType + { + get { return _contentType; } + } + + public AlgorithmIdentifier ContentEncryptionAlgorithm + { + get { return _contentEncryptionAlgorithm; } + } + + public IAsn1Convertible GetEncryptedContent( + int tag) + { + return Asn1Utilities.ParseContextBaseUniversal(_encryptedContent, 0, false, tag); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs.meta new file mode 100644 index 00000000..3a17df67 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1bfe6014042c4844687f17cbad385878 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedContentInfoParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs new file mode 100644 index 00000000..0ffb6196 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class EncryptedData + : Asn1Encodable + { + private readonly DerInteger version; + private readonly EncryptedContentInfo encryptedContentInfo; + private readonly Asn1Set unprotectedAttrs; + + public static EncryptedData GetInstance( + object obj) + { + if (obj is EncryptedData) + return (EncryptedData) obj; + + if (obj is Asn1Sequence) + return new EncryptedData((Asn1Sequence) obj); + + throw new ArgumentException("Invalid EncryptedData: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public EncryptedData( + EncryptedContentInfo encInfo) + : this(encInfo, null) + { + } + + public EncryptedData( + EncryptedContentInfo encInfo, + Asn1Set unprotectedAttrs) + { + if (encInfo == null) + throw new ArgumentNullException("encInfo"); + + this.version = new DerInteger((unprotectedAttrs == null) ? 0 : 2); + this.encryptedContentInfo = encInfo; + this.unprotectedAttrs = unprotectedAttrs; + } + + private EncryptedData( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 2 || seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.version = DerInteger.GetInstance(seq[0]); + this.encryptedContentInfo = EncryptedContentInfo.GetInstance(seq[1]); + + if (seq.Count > 2) + { + this.unprotectedAttrs = Asn1Set.GetInstance((Asn1TaggedObject)seq[2], false); + } + } + + public virtual DerInteger Version + { + get { return version; } + } + + public virtual EncryptedContentInfo EncryptedContentInfo + { + get { return encryptedContentInfo; } + } + + public virtual Asn1Set UnprotectedAttrs + { + get { return unprotectedAttrs; } + } + + /** + *
+		*       EncryptedData ::= SEQUENCE {
+		*                     version CMSVersion,
+		*                     encryptedContentInfo EncryptedContentInfo,
+		*                     unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL }
+		* 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, encryptedContentInfo); + + if (unprotectedAttrs != null) + { + v.Add(new BerTaggedObject(false, 1, unprotectedAttrs)); + } + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs.meta new file mode 100644 index 00000000..16ec2789 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e831d81ebdc6d1049bda28344baa9e4a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EncryptedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs new file mode 100644 index 00000000..7c1924f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs @@ -0,0 +1,165 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class EnvelopedData + : Asn1Encodable + { + private DerInteger version; + private OriginatorInfo originatorInfo; + private Asn1Set recipientInfos; + private EncryptedContentInfo encryptedContentInfo; + private Asn1Set unprotectedAttrs; + + public EnvelopedData( + OriginatorInfo originatorInfo, + Asn1Set recipientInfos, + EncryptedContentInfo encryptedContentInfo, + Asn1Set unprotectedAttrs) + { + this.version = new DerInteger(CalculateVersion(originatorInfo, recipientInfos, unprotectedAttrs)); + this.originatorInfo = originatorInfo; + this.recipientInfos = recipientInfos; + this.encryptedContentInfo = encryptedContentInfo; + this.unprotectedAttrs = unprotectedAttrs; + } + + public EnvelopedData( + OriginatorInfo originatorInfo, + Asn1Set recipientInfos, + EncryptedContentInfo encryptedContentInfo, + Attributes unprotectedAttrs) + { + this.version = new DerInteger(CalculateVersion(originatorInfo, recipientInfos, Asn1Set.GetInstance(unprotectedAttrs))); + this.originatorInfo = originatorInfo; + this.recipientInfos = recipientInfos; + this.encryptedContentInfo = encryptedContentInfo; + this.unprotectedAttrs = Asn1Set.GetInstance(unprotectedAttrs); + } + + private EnvelopedData(Asn1Sequence seq) + { + int index = 0; + + version = (DerInteger) seq[index++]; + + object tmp = seq[index++]; + + if (tmp is Asn1TaggedObject) + { + originatorInfo = OriginatorInfo.GetInstance((Asn1TaggedObject) tmp, false); + tmp = seq[index++]; + } + + recipientInfos = Asn1Set.GetInstance(tmp); + encryptedContentInfo = EncryptedContentInfo.GetInstance(seq[index++]); + + if (seq.Count > index) + { + unprotectedAttrs = Asn1Set.GetInstance((Asn1TaggedObject) seq[index], false); + } + } + + /** + * return an EnvelopedData object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static EnvelopedData GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return an EnvelopedData object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static EnvelopedData GetInstance( + object obj) + { + if (obj is EnvelopedData) + return (EnvelopedData)obj; + if (obj == null) + return null; + return new EnvelopedData(Asn1Sequence.GetInstance(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorInfo OriginatorInfo + { + get { return originatorInfo; } + } + + public Asn1Set RecipientInfos + { + get { return recipientInfos; } + } + + public EncryptedContentInfo EncryptedContentInfo + { + get { return encryptedContentInfo; } + } + + public Asn1Set UnprotectedAttrs + { + get { return unprotectedAttrs; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * EnvelopedData ::= Sequence {
+         *     version CMSVersion,
+         *     originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+         *     recipientInfos RecipientInfos,
+         *     encryptedContentInfo EncryptedContentInfo,
+         *     unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version); + v.AddOptionalTagged(false, 0, originatorInfo); + v.Add(recipientInfos, encryptedContentInfo); + v.AddOptionalTagged(false, 1, unprotectedAttrs); + return new BerSequence(v); + } + + public static int CalculateVersion(OriginatorInfo originatorInfo, Asn1Set recipientInfos, Asn1Set unprotectedAttrs) + { + if (originatorInfo != null || unprotectedAttrs != null) + { + return 2; + } + + foreach (object o in recipientInfos) + { + RecipientInfo ri = RecipientInfo.GetInstance(o); + + if (!ri.Version.HasValue(0)) + { + return 2; + } + } + + return 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs.meta new file mode 100644 index 00000000..9ae2873f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 888a33b285e27814b89fea6c91204f49 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs new file mode 100644 index 00000000..feea1c40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs @@ -0,0 +1,113 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * Produce an object suitable for an Asn1OutputStream. + *
+	* EnvelopedData ::= SEQUENCE {
+	*     version CMSVersion,
+	*     originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
+	*     recipientInfos RecipientInfos,
+	*     encryptedContentInfo EncryptedContentInfo,
+	*     unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL
+	* }
+	* 
+ */ + public class EnvelopedDataParser + { + private Asn1SequenceParser _seq; + private DerInteger _version; + private IAsn1Convertible _nextObject; + private bool _originatorInfoCalled; + + public EnvelopedDataParser( + Asn1SequenceParser seq) + { + this._seq = seq; + this._version = (DerInteger)seq.ReadObject(); + } + + public DerInteger Version + { + get { return _version; } + } + + public OriginatorInfo GetOriginatorInfo() + { + _originatorInfoCalled = true; + + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + if (_nextObject is Asn1TaggedObjectParser o) + { + if (o.HasContextTag(0)) + { + Asn1SequenceParser originatorInfo = (Asn1SequenceParser)o.ParseBaseUniversal(false, Asn1Tags.Sequence); + _nextObject = null; + return OriginatorInfo.GetInstance(originatorInfo.ToAsn1Object()); + } + } + + return null; + } + + public Asn1SetParser GetRecipientInfos() + { + if (!_originatorInfoCalled) + { + GetOriginatorInfo(); + } + + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + Asn1SetParser recipientInfos = (Asn1SetParser)_nextObject; + _nextObject = null; + return recipientInfos; + } + + public EncryptedContentInfoParser GetEncryptedContentInfo() + { + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + if (_nextObject != null) + { + Asn1SequenceParser o = (Asn1SequenceParser) _nextObject; + _nextObject = null; + return new EncryptedContentInfoParser(o); + } + + return null; + } + + public Asn1SetParser GetUnprotectedAttrs() + { + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + if (_nextObject != null) + { + Asn1TaggedObjectParser o = (Asn1TaggedObjectParser)_nextObject; + _nextObject = null; + return (Asn1SetParser)Asn1Utilities.ParseContextBaseUniversal(o, 1, false, Asn1Tags.SetOf); + } + + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs.meta new file mode 100644 index 00000000..9724ee51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bc54f1f2ca7d7ae499634d13c6c8aaa7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/EnvelopedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs new file mode 100644 index 00000000..85c2e93a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class Evidence + : Asn1Encodable, IAsn1Choice + { + private TimeStampTokenEvidence tstEvidence; + private Asn1Sequence otherEvidence; + + public Evidence(TimeStampTokenEvidence tstEvidence) + { + this.tstEvidence = tstEvidence; + } + + private Evidence(Asn1TaggedObject tagged) + { + if (tagged.TagNo == 0) + { + this.tstEvidence = TimeStampTokenEvidence.GetInstance(tagged, false); + } + //else if (tagged.TagNo == 1) + //{ + // this.ersEvidence = EvidenceRecord.GetInstance(tagged, false); + //} + else if (tagged.TagNo == 2) + { + this.otherEvidence = Asn1Sequence.GetInstance(tagged, false); + } + else + { + throw new ArgumentException("unknown tag in Evidence", "tagged"); + } + } + + public static Evidence GetInstance(object obj) + { + if (obj is Evidence) + return (Evidence)obj; + + if (obj is Asn1TaggedObject) + return new Evidence(Asn1TaggedObject.GetInstance(obj)); + + throw new ArgumentException("Unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static Evidence GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(obj.GetObject()); // must be explicitly tagged + } + + public virtual TimeStampTokenEvidence TstEvidence + { + get { return tstEvidence; } + } + + //public EvidenceRecord ErsEvidence + //{ + // get { return ersEvidence; } + //} + + public override Asn1Object ToAsn1Object() + { + if (tstEvidence != null) + return new DerTaggedObject(false, 0, tstEvidence); + //if (ersEvidence != null) + // return new DerTaggedObject(false, 1, ersEvidence); + return new DerTaggedObject(false, 2, otherEvidence); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs.meta new file mode 100644 index 00000000..91297cee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e0d0b98dea935524fba0aaa44e38d720 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Evidence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs new file mode 100644 index 00000000..66a46c87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class IssuerAndSerialNumber + : Asn1Encodable + { + private X509Name name; + private DerInteger serialNumber; + + public static IssuerAndSerialNumber GetInstance(object obj) + { + if (obj == null) + return null; + IssuerAndSerialNumber existing = obj as IssuerAndSerialNumber; + if (existing != null) + return existing; + return new IssuerAndSerialNumber(Asn1Sequence.GetInstance(obj)); + } + + private IssuerAndSerialNumber(Asn1Sequence seq) + { + this.name = X509Name.GetInstance(seq[0]); + this.serialNumber = (DerInteger) seq[1]; + } + + public IssuerAndSerialNumber( + X509Name name, + BigInteger serialNumber) + { + this.name = name; + this.serialNumber = new DerInteger(serialNumber); + } + + public IssuerAndSerialNumber( + X509Name name, + DerInteger serialNumber) + { + this.name = name; + this.serialNumber = serialNumber; + } + + public X509Name Name + { + get { return name; } + } + + public DerInteger SerialNumber + { + get { return serialNumber; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(name, serialNumber); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs.meta new file mode 100644 index 00000000..4859afa3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ae24f598301e6d245954af2b9f8c72f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/IssuerAndSerialNumber.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs new file mode 100644 index 00000000..11739989 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs @@ -0,0 +1,123 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class KekIdentifier + : Asn1Encodable + { + private Asn1OctetString keyIdentifier; + private Asn1GeneralizedTime date; + private OtherKeyAttribute other; + + public KekIdentifier( + byte[] keyIdentifier, + Asn1GeneralizedTime date, + OtherKeyAttribute other) + { + this.keyIdentifier = new DerOctetString(keyIdentifier); + this.date = date; + this.other = other; + } + + public KekIdentifier( + Asn1Sequence seq) + { + keyIdentifier = (Asn1OctetString) seq[0]; + + switch (seq.Count) + { + case 1: + break; + case 2: + if (seq[1] is Asn1GeneralizedTime) + { + date = (Asn1GeneralizedTime) seq[1]; + } + else + { + other = OtherKeyAttribute.GetInstance(seq[2]); + } + break; + case 3: + date = (Asn1GeneralizedTime) seq[1]; + other = OtherKeyAttribute.GetInstance(seq[2]); + break; + default: + throw new ArgumentException("Invalid KekIdentifier"); + } + } + + /** + * return a KekIdentifier object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static KekIdentifier GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return a KekIdentifier object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static KekIdentifier GetInstance( + object obj) + { + if (obj == null || obj is KekIdentifier) + return (KekIdentifier)obj; + + if (obj is Asn1Sequence) + return new KekIdentifier((Asn1Sequence)obj); + + throw new ArgumentException("Invalid KekIdentifier: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public Asn1OctetString KeyIdentifier + { + get { return keyIdentifier; } + } + + public Asn1GeneralizedTime Date + { + get { return date; } + } + + public OtherKeyAttribute Other + { + get { return other; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * KekIdentifier ::= Sequence {
+         *     keyIdentifier OCTET STRING,
+         *     date GeneralizedTime OPTIONAL,
+         *     other OtherKeyAttribute OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(keyIdentifier); + v.AddOptional(date, other); + return new DerSequence(v); + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs.meta new file mode 100644 index 00000000..06db24c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 61cf57550f3fe8245aa52a6fda2b863c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs new file mode 100644 index 00000000..1f603f2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class KekRecipientInfo + : Asn1Encodable + { + private DerInteger version; + private KekIdentifier kekID; + private AlgorithmIdentifier keyEncryptionAlgorithm; + private Asn1OctetString encryptedKey; + + public KekRecipientInfo( + KekIdentifier kekID, + AlgorithmIdentifier keyEncryptionAlgorithm, + Asn1OctetString encryptedKey) + { + this.version = new DerInteger(4); + this.kekID = kekID; + this.keyEncryptionAlgorithm = keyEncryptionAlgorithm; + this.encryptedKey = encryptedKey; + } + + public KekRecipientInfo( + Asn1Sequence seq) + { + version = (DerInteger) seq[0]; + kekID = KekIdentifier.GetInstance(seq[1]); + keyEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq[2]); + encryptedKey = (Asn1OctetString) seq[3]; + } + + /** + * return a KekRecipientInfo object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static KekRecipientInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return a KekRecipientInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static KekRecipientInfo GetInstance( + object obj) + { + if (obj == null || obj is KekRecipientInfo) + return (KekRecipientInfo)obj; + + if(obj is Asn1Sequence) + return new KekRecipientInfo((Asn1Sequence)obj); + + throw new ArgumentException("Invalid KekRecipientInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public KekIdentifier KekID + { + get { return kekID; } + } + + public AlgorithmIdentifier KeyEncryptionAlgorithm + { + get { return keyEncryptionAlgorithm; } + } + + public Asn1OctetString EncryptedKey + { + get { return encryptedKey; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * KekRecipientInfo ::= Sequence {
+         *     version CMSVersion,  -- always set to 4
+         *     kekID KekIdentifier,
+         *     keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
+         *     encryptedKey EncryptedKey
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(version, kekID, keyEncryptionAlgorithm, encryptedKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs.meta new file mode 100644 index 00000000..69688ad2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 078b20050375049498516d9b8d758480 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KEKRecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs new file mode 100644 index 00000000..afa5dc6b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class KeyAgreeRecipientIdentifier + : Asn1Encodable, IAsn1Choice + { + /** + * return an KeyAgreeRecipientIdentifier object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param isExplicit true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static KeyAgreeRecipientIdentifier GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return an KeyAgreeRecipientIdentifier object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static KeyAgreeRecipientIdentifier GetInstance( + object obj) + { + if (obj == null || obj is KeyAgreeRecipientIdentifier) + return (KeyAgreeRecipientIdentifier)obj; + + if (obj is Asn1Sequence) + return new KeyAgreeRecipientIdentifier(IssuerAndSerialNumber.GetInstance(obj)); + + if (obj is Asn1TaggedObject && ((Asn1TaggedObject)obj).TagNo == 0) + { + return new KeyAgreeRecipientIdentifier(RecipientKeyIdentifier.GetInstance( + (Asn1TaggedObject)obj, false)); + } + + throw new ArgumentException("Invalid KeyAgreeRecipientIdentifier: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private readonly IssuerAndSerialNumber issuerSerial; + private readonly RecipientKeyIdentifier rKeyID; + + public KeyAgreeRecipientIdentifier( + IssuerAndSerialNumber issuerSerial) + { + this.issuerSerial = issuerSerial; + } + + public KeyAgreeRecipientIdentifier( + RecipientKeyIdentifier rKeyID) + { + this.rKeyID = rKeyID; + } + + public IssuerAndSerialNumber IssuerAndSerialNumber + { + get { return issuerSerial; } + } + + public RecipientKeyIdentifier RKeyID + { + get { return rKeyID; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		 * KeyAgreeRecipientIdentifier ::= CHOICE {
+		 *     issuerAndSerialNumber IssuerAndSerialNumber,
+		 *     rKeyId [0] IMPLICIT RecipientKeyIdentifier
+		 * }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + if (issuerSerial != null) + { + return issuerSerial.ToAsn1Object(); + } + + return new DerTaggedObject(false, 0, rKeyID); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs.meta new file mode 100644 index 00000000..d2f495e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 31df2eb3dc66bac439bb35b6655efd96 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs new file mode 100644 index 00000000..1520f9de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs @@ -0,0 +1,138 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class KeyAgreeRecipientInfo + : Asn1Encodable + { + private DerInteger version; + private OriginatorIdentifierOrKey originator; + private Asn1OctetString ukm; + private AlgorithmIdentifier keyEncryptionAlgorithm; + private Asn1Sequence recipientEncryptedKeys; + + public KeyAgreeRecipientInfo( + OriginatorIdentifierOrKey originator, + Asn1OctetString ukm, + AlgorithmIdentifier keyEncryptionAlgorithm, + Asn1Sequence recipientEncryptedKeys) + { + this.version = new DerInteger(3); + this.originator = originator; + this.ukm = ukm; + this.keyEncryptionAlgorithm = keyEncryptionAlgorithm; + this.recipientEncryptedKeys = recipientEncryptedKeys; + } + + public KeyAgreeRecipientInfo( + Asn1Sequence seq) + { + int index = 0; + + version = (DerInteger) seq[index++]; + originator = OriginatorIdentifierOrKey.GetInstance( + (Asn1TaggedObject) seq[index++], true); + + if (seq[index] is Asn1TaggedObject) + { + ukm = Asn1OctetString.GetInstance( + (Asn1TaggedObject) seq[index++], true); + } + + keyEncryptionAlgorithm = AlgorithmIdentifier.GetInstance( + seq[index++]); + + recipientEncryptedKeys = (Asn1Sequence) seq[index++]; + } + + /** + * return a KeyAgreeRecipientInfo object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static KeyAgreeRecipientInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return a KeyAgreeRecipientInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static KeyAgreeRecipientInfo GetInstance( + object obj) + { + if (obj == null || obj is KeyAgreeRecipientInfo) + return (KeyAgreeRecipientInfo)obj; + + if (obj is Asn1Sequence) + return new KeyAgreeRecipientInfo((Asn1Sequence)obj); + + throw new ArgumentException( + "Illegal object in KeyAgreeRecipientInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + + } + + public DerInteger Version + { + get { return version; } + } + + public OriginatorIdentifierOrKey Originator + { + get { return originator; } + } + + public Asn1OctetString UserKeyingMaterial + { + get { return ukm; } + } + + public AlgorithmIdentifier KeyEncryptionAlgorithm + { + get { return keyEncryptionAlgorithm; } + } + + public Asn1Sequence RecipientEncryptedKeys + { + get { return recipientEncryptedKeys; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * KeyAgreeRecipientInfo ::= Sequence {
+         *     version CMSVersion,  -- always set to 3
+         *     originator [0] EXPLICIT OriginatorIdentifierOrKey,
+         *     ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL,
+         *     keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
+         *     recipientEncryptedKeys RecipientEncryptedKeys
+         * }
+		 *
+		 * UserKeyingMaterial ::= OCTET STRING
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, new DerTaggedObject(true, 0, originator)); + v.AddOptionalTagged(true, 1, ukm); + v.Add(keyEncryptionAlgorithm, recipientEncryptedKeys); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs.meta new file mode 100644 index 00000000..9f4f37be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 34fe33ea8c64d624197ed3c1d6992862 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyAgreeRecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs new file mode 100644 index 00000000..b6a4e0e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs @@ -0,0 +1,103 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class KeyTransRecipientInfo + : Asn1Encodable + { + private DerInteger version; + private RecipientIdentifier rid; + private AlgorithmIdentifier keyEncryptionAlgorithm; + private Asn1OctetString encryptedKey; + + public KeyTransRecipientInfo( + RecipientIdentifier rid, + AlgorithmIdentifier keyEncryptionAlgorithm, + Asn1OctetString encryptedKey) + { + if (rid.ToAsn1Object() is Asn1TaggedObject) + { + this.version = new DerInteger(2); + } + else + { + this.version = new DerInteger(0); + } + + this.rid = rid; + this.keyEncryptionAlgorithm = keyEncryptionAlgorithm; + this.encryptedKey = encryptedKey; + } + + public KeyTransRecipientInfo( + Asn1Sequence seq) + { + this.version = (DerInteger) seq[0]; + this.rid = RecipientIdentifier.GetInstance(seq[1]); + this.keyEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq[2]); + this.encryptedKey = (Asn1OctetString) seq[3]; + } + + /** + * return a KeyTransRecipientInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static KeyTransRecipientInfo GetInstance( + object obj) + { + if (obj == null || obj is KeyTransRecipientInfo) + return (KeyTransRecipientInfo) obj; + + if(obj is Asn1Sequence) + return new KeyTransRecipientInfo((Asn1Sequence) obj); + + throw new ArgumentException( + "Illegal object in KeyTransRecipientInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public RecipientIdentifier RecipientIdentifier + { + get { return rid; } + } + + public AlgorithmIdentifier KeyEncryptionAlgorithm + { + get { return keyEncryptionAlgorithm; } + } + + public Asn1OctetString EncryptedKey + { + get { return encryptedKey; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * KeyTransRecipientInfo ::= Sequence {
+         *     version CMSVersion,  -- always set to 0 or 2
+         *     rid RecipientIdentifier,
+         *     keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
+         *     encryptedKey EncryptedKey
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(version, rid, keyEncryptionAlgorithm, encryptedKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs.meta new file mode 100644 index 00000000..ac7182d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ecf1fad3a8bf9247bca3ece6b50dcbe +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/KeyTransRecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs new file mode 100644 index 00000000..5a753b7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class MetaData + : Asn1Encodable + { + private DerBoolean hashProtected; + private DerUtf8String fileName; + private DerIA5String mediaType; + private Attributes otherMetaData; + + public MetaData( + DerBoolean hashProtected, + DerUtf8String fileName, + DerIA5String mediaType, + Attributes otherMetaData) + { + this.hashProtected = hashProtected; + this.fileName = fileName; + this.mediaType = mediaType; + this.otherMetaData = otherMetaData; + } + + private MetaData(Asn1Sequence seq) + { + this.hashProtected = DerBoolean.GetInstance(seq[0]); + + int index = 1; + + if (index < seq.Count && seq[index] is DerUtf8String) + { + this.fileName = DerUtf8String.GetInstance(seq[index++]); + } + if (index < seq.Count && seq[index] is DerIA5String) + { + this.mediaType = DerIA5String.GetInstance(seq[index++]); + } + if (index < seq.Count) + { + this.otherMetaData = Attributes.GetInstance(seq[index++]); + } + } + + public static MetaData GetInstance(object obj) + { + if (obj is MetaData) + return (MetaData)obj; + + if (obj != null) + return new MetaData(Asn1Sequence.GetInstance(obj)); + + return null; + } + + /** + *
+		 * MetaData ::= SEQUENCE {
+		 *   hashProtected        BOOLEAN,
+		 *   fileName             UTF8String OPTIONAL,
+		 *   mediaType            IA5String OPTIONAL,
+		 *   otherMetaData        Attributes OPTIONAL
+		 * }
+		 * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(hashProtected); + v.AddOptional(fileName, mediaType, otherMetaData); + return new DerSequence(v); + } + + public virtual bool IsHashProtected + { + get { return hashProtected.IsTrue; } + } + + public virtual DerUtf8String FileName + { + get { return fileName; } + } + + public virtual DerIA5String MediaType + { + get { return mediaType; } + } + + public virtual Attributes OtherMetaData + { + get { return otherMetaData; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs.meta new file mode 100644 index 00000000..d242b544 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d2d072480f8d0a4499b4251e11c11d91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/MetaData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs new file mode 100644 index 00000000..3c1663bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs @@ -0,0 +1,148 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OriginatorIdentifierOrKey + : Asn1Encodable, IAsn1Choice + { + private readonly Asn1Encodable id; + + public OriginatorIdentifierOrKey(IssuerAndSerialNumber id) + { + this.id = id; + } + + public OriginatorIdentifierOrKey(SubjectKeyIdentifier id) + { + this.id = new DerTaggedObject(false, 0, id); + } + + public OriginatorIdentifierOrKey(OriginatorPublicKey id) + { + this.id = new DerTaggedObject(false, 1, id); + } + + private OriginatorIdentifierOrKey(Asn1TaggedObject id) + { + // TODO Add validation + this.id = id; + } + + /** + * return an OriginatorIdentifierOrKey object from a tagged object. + * + * @param o the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static OriginatorIdentifierOrKey GetInstance( + Asn1TaggedObject o, + bool explicitly) + { + if (!explicitly) + { + throw new ArgumentException( + "Can't implicitly tag OriginatorIdentifierOrKey"); + } + + return GetInstance(o.GetObject()); + } + + /** + * return an OriginatorIdentifierOrKey object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static OriginatorIdentifierOrKey GetInstance( + object o) + { + if (o == null || o is OriginatorIdentifierOrKey) + return (OriginatorIdentifierOrKey)o; + + if (o is IssuerAndSerialNumber) + return new OriginatorIdentifierOrKey((IssuerAndSerialNumber)o); + + if (o is SubjectKeyIdentifier) + return new OriginatorIdentifierOrKey((SubjectKeyIdentifier)o); + + if (o is OriginatorPublicKey) + return new OriginatorIdentifierOrKey((OriginatorPublicKey)o); + + if (o is Asn1TaggedObject) + return new OriginatorIdentifierOrKey((Asn1TaggedObject)o); + + throw new ArgumentException("Invalid OriginatorIdentifierOrKey: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + + public Asn1Encodable ID + { + get { return id; } + } + + public IssuerAndSerialNumber IssuerAndSerialNumber + { + get + { + if (id is IssuerAndSerialNumber) + { + return (IssuerAndSerialNumber)id; + } + + return null; + } + } + + public SubjectKeyIdentifier SubjectKeyIdentifier + { + get + { + if (id is Asn1TaggedObject && ((Asn1TaggedObject)id).TagNo == 0) + { + return SubjectKeyIdentifier.GetInstance((Asn1TaggedObject)id, false); + } + + return null; + } + } + + public OriginatorPublicKey OriginatorPublicKey + { + get + { + if (id is Asn1TaggedObject && ((Asn1TaggedObject)id).TagNo == 1) + { + return OriginatorPublicKey.GetInstance((Asn1TaggedObject)id, false); + } + + return null; + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OriginatorIdentifierOrKey ::= CHOICE {
+         *     issuerAndSerialNumber IssuerAndSerialNumber,
+         *     subjectKeyIdentifier [0] SubjectKeyIdentifier,
+         *     originatorKey [1] OriginatorPublicKey
+         * }
+         *
+         * SubjectKeyIdentifier ::= OCTET STRING
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return id.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs.meta new file mode 100644 index 00000000..959a0824 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc08d582034c58541b6a145196d0002f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorIdentifierOrKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs new file mode 100644 index 00000000..7df256ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OriginatorInfo + : Asn1Encodable + { + private Asn1Set certs; + private Asn1Set crls; + + public OriginatorInfo( + Asn1Set certs, + Asn1Set crls) + { + this.certs = certs; + this.crls = crls; + } + + public OriginatorInfo( + Asn1Sequence seq) + { + switch (seq.Count) + { + case 0: // empty + break; + case 1: + Asn1TaggedObject o = (Asn1TaggedObject) seq[0]; + switch (o.TagNo) + { + case 0 : + certs = Asn1Set.GetInstance(o, false); + break; + case 1 : + crls = Asn1Set.GetInstance(o, false); + break; + default: + throw new ArgumentException("Bad tag in OriginatorInfo: " + o.TagNo); + } + break; + case 2: + certs = Asn1Set.GetInstance((Asn1TaggedObject) seq[0], false); + crls = Asn1Set.GetInstance((Asn1TaggedObject) seq[1], false); + break; + default: + throw new ArgumentException("OriginatorInfo too big"); + } + } + + /** + * return an OriginatorInfo object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static OriginatorInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return an OriginatorInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static OriginatorInfo GetInstance( + object obj) + { + if (obj == null || obj is OriginatorInfo) + return (OriginatorInfo)obj; + + if (obj is Asn1Sequence) + return new OriginatorInfo((Asn1Sequence)obj); + + throw new ArgumentException("Invalid OriginatorInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public Asn1Set Certificates + { + get { return certs; } + } + + public Asn1Set Crls + { + get { return crls; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OriginatorInfo ::= Sequence {
+         *     certs [0] IMPLICIT CertificateSet OPTIONAL,
+         *     crls [1] IMPLICIT CertificateRevocationLists OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, certs); + v.AddOptionalTagged(false, 1, crls); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs.meta new file mode 100644 index 00000000..3036d90f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b67e77451499f541ac1eec0c4a94419 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs new file mode 100644 index 00000000..422c1b18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OriginatorPublicKey + : Asn1Encodable + { + private readonly AlgorithmIdentifier mAlgorithm; + private readonly DerBitString mPublicKey; + + public OriginatorPublicKey( + AlgorithmIdentifier algorithm, + byte[] publicKey) + { + this.mAlgorithm = algorithm; + this.mPublicKey = new DerBitString(publicKey); + } + + private OriginatorPublicKey(Asn1Sequence seq) + { + this.mAlgorithm = AlgorithmIdentifier.GetInstance(seq[0]); + this.mPublicKey = DerBitString.GetInstance(seq[1]); + } + + /** + * return an OriginatorPublicKey object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static OriginatorPublicKey GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return an OriginatorPublicKey object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static OriginatorPublicKey GetInstance( + object obj) + { + if (obj == null || obj is OriginatorPublicKey) + return (OriginatorPublicKey)obj; + + if (obj is Asn1Sequence) + return new OriginatorPublicKey(Asn1Sequence.GetInstance(obj)); + + throw new ArgumentException("Invalid OriginatorPublicKey: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public AlgorithmIdentifier Algorithm + { + get { return mAlgorithm; } + } + + public DerBitString PublicKey + { + get { return mPublicKey; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OriginatorPublicKey ::= Sequence {
+         *     algorithm AlgorithmIdentifier,
+         *     publicKey BIT STRING
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(mAlgorithm, mPublicKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs.meta new file mode 100644 index 00000000..5c082f50 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 901fb85c86fb2bb44bf63a38fb907c76 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OriginatorPublicKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs new file mode 100644 index 00000000..491b6f10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs @@ -0,0 +1,74 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OtherKeyAttribute + : Asn1Encodable + { + private DerObjectIdentifier keyAttrId; + private Asn1Encodable keyAttr; + + /** + * return an OtherKeyAttribute object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static OtherKeyAttribute GetInstance( + object obj) + { + if (obj == null || obj is OtherKeyAttribute) + return (OtherKeyAttribute) obj; + + if (obj is Asn1Sequence) + return new OtherKeyAttribute((Asn1Sequence) obj); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public OtherKeyAttribute( + Asn1Sequence seq) + { + keyAttrId = (DerObjectIdentifier) seq[0]; + keyAttr = seq[1]; + } + + public OtherKeyAttribute( + DerObjectIdentifier keyAttrId, + Asn1Encodable keyAttr) + { + this.keyAttrId = keyAttrId; + this.keyAttr = keyAttr; + } + + public DerObjectIdentifier KeyAttrId + { + get { return keyAttrId; } + } + + public Asn1Encodable KeyAttr + { + get { return keyAttr; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OtherKeyAttribute ::= Sequence {
+         *     keyAttrId OBJECT IDENTIFIER,
+         *     keyAttr ANY DEFINED BY keyAttrId OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(keyAttrId, keyAttr); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs.meta new file mode 100644 index 00000000..d3a8f1a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bce1698247e12b44d9bca522b2d812b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherKeyAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs new file mode 100644 index 00000000..b66b2655 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs @@ -0,0 +1,85 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OtherRecipientInfo + : Asn1Encodable + { + private readonly DerObjectIdentifier oriType; + private readonly Asn1Encodable oriValue; + + public OtherRecipientInfo( + DerObjectIdentifier oriType, + Asn1Encodable oriValue) + { + this.oriType = oriType; + this.oriValue = oriValue; + } + + private OtherRecipientInfo(Asn1Sequence seq) + { + oriType = DerObjectIdentifier.GetInstance(seq[0]); + oriValue = seq[1]; + } + + /** + * return a OtherRecipientInfo object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static OtherRecipientInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return a OtherRecipientInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static OtherRecipientInfo GetInstance( + object obj) + { + if (obj == null) + return null; + OtherRecipientInfo existing = obj as OtherRecipientInfo; + if (existing != null) + return existing; + return new OtherRecipientInfo(Asn1Sequence.GetInstance(obj)); + } + + public virtual DerObjectIdentifier OriType + { + get { return oriType; } + } + + public virtual Asn1Encodable OriValue + { + get { return oriValue; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OtherRecipientInfo ::= Sequence {
+         *    oriType OBJECT IDENTIFIER,
+         *    oriValue ANY DEFINED BY oriType }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(oriType, oriValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs.meta new file mode 100644 index 00000000..14dd5db8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f1d41e3896d8556499306ab621d44846 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs new file mode 100644 index 00000000..645970eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class OtherRevocationInfoFormat + : Asn1Encodable + { + private readonly DerObjectIdentifier otherRevInfoFormat; + private readonly Asn1Encodable otherRevInfo; + + public OtherRevocationInfoFormat( + DerObjectIdentifier otherRevInfoFormat, + Asn1Encodable otherRevInfo) + { + this.otherRevInfoFormat = otherRevInfoFormat; + this.otherRevInfo = otherRevInfo; + } + + private OtherRevocationInfoFormat(Asn1Sequence seq) + { + otherRevInfoFormat = DerObjectIdentifier.GetInstance(seq[0]); + otherRevInfo = seq[1]; + } + + /** + * return a OtherRevocationInfoFormat object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicit true if the object is meant to be explicitly + * tagged false otherwise. + * @exception IllegalArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static OtherRevocationInfoFormat GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return a OtherRevocationInfoFormat object from the given object. + * + * @param obj the object we want converted. + * @exception IllegalArgumentException if the object cannot be converted. + */ + public static OtherRevocationInfoFormat GetInstance(object obj) + { + if (obj is OtherRevocationInfoFormat otherRevocationInfoFormat) + return otherRevocationInfoFormat; + if (obj != null) + return new OtherRevocationInfoFormat(Asn1Sequence.GetInstance(obj)); + return null; + } + + public virtual DerObjectIdentifier InfoFormat + { + get { return otherRevInfoFormat; } + } + + public virtual Asn1Encodable Info + { + get { return otherRevInfo; } + } + + /** + * Produce an object suitable for an ASN1OutputStream. + *
+         * OtherRevocationInfoFormat ::= SEQUENCE {
+         *      otherRevInfoFormat OBJECT IDENTIFIER,
+         *      otherRevInfo ANY DEFINED BY otherRevInfoFormat }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(otherRevInfoFormat, otherRevInfo); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs.meta new file mode 100644 index 00000000..e6b47a21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6056228d8a0a82849bf87fc2b84bb594 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/OtherRevocationInfoFormat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs new file mode 100644 index 00000000..981b5240 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs @@ -0,0 +1,131 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class PasswordRecipientInfo + : Asn1Encodable + { + private readonly DerInteger version; + private readonly AlgorithmIdentifier keyDerivationAlgorithm; + private readonly AlgorithmIdentifier keyEncryptionAlgorithm; + private readonly Asn1OctetString encryptedKey; + + public PasswordRecipientInfo( + AlgorithmIdentifier keyEncryptionAlgorithm, + Asn1OctetString encryptedKey) + { + this.version = new DerInteger(0); + this.keyEncryptionAlgorithm = keyEncryptionAlgorithm; + this.encryptedKey = encryptedKey; + } + + public PasswordRecipientInfo( + AlgorithmIdentifier keyDerivationAlgorithm, + AlgorithmIdentifier keyEncryptionAlgorithm, + Asn1OctetString encryptedKey) + { + this.version = new DerInteger(0); + this.keyDerivationAlgorithm = keyDerivationAlgorithm; + this.keyEncryptionAlgorithm = keyEncryptionAlgorithm; + this.encryptedKey = encryptedKey; + } + + public PasswordRecipientInfo( + Asn1Sequence seq) + { + version = (DerInteger) seq[0]; + + if (seq[1] is Asn1TaggedObject) + { + keyDerivationAlgorithm = AlgorithmIdentifier.GetInstance((Asn1TaggedObject) seq[1], false); + keyEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq[2]); + encryptedKey = (Asn1OctetString) seq[3]; + } + else + { + keyEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + encryptedKey = (Asn1OctetString) seq[2]; + } + } + + /** + * return a PasswordRecipientInfo object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param explicitly true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static PasswordRecipientInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + /** + * return a PasswordRecipientInfo object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static PasswordRecipientInfo GetInstance( + object obj) + { + if (obj == null || obj is PasswordRecipientInfo) + return (PasswordRecipientInfo) obj; + + if (obj is Asn1Sequence) + return new PasswordRecipientInfo((Asn1Sequence) obj); + + throw new ArgumentException("Invalid PasswordRecipientInfo: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DerInteger Version + { + get { return version; } + } + + public AlgorithmIdentifier KeyDerivationAlgorithm + { + get { return keyDerivationAlgorithm; } + } + + public AlgorithmIdentifier KeyEncryptionAlgorithm + { + get { return keyEncryptionAlgorithm; } + } + + public Asn1OctetString EncryptedKey + { + get { return encryptedKey; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * PasswordRecipientInfo ::= Sequence {
+         *   version CMSVersion,   -- Always set to 0
+         *   keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier
+         *                             OPTIONAL,
+         *  keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier,
+         *  encryptedKey EncryptedKey }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version); + v.AddOptionalTagged(false, 0, keyDerivationAlgorithm); + v.Add(keyEncryptionAlgorithm, encryptedKey); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs.meta new file mode 100644 index 00000000..eef79d53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a0b8029af5f106a4ca472ea854b10b5f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/PasswordRecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs new file mode 100644 index 00000000..cb7d94f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class RecipientEncryptedKey + : Asn1Encodable + { + private readonly KeyAgreeRecipientIdentifier identifier; + private readonly Asn1OctetString encryptedKey; + + private RecipientEncryptedKey( + Asn1Sequence seq) + { + identifier = KeyAgreeRecipientIdentifier.GetInstance(seq[0]); + encryptedKey = (Asn1OctetString) seq[1]; + } + + /** + * return an RecipientEncryptedKey object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param isExplicit true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static RecipientEncryptedKey GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return a RecipientEncryptedKey object from the given object. + * + * @param obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static RecipientEncryptedKey GetInstance( + object obj) + { + if (obj == null || obj is RecipientEncryptedKey) + { + return (RecipientEncryptedKey) obj; + } + + if (obj is Asn1Sequence) + { + return new RecipientEncryptedKey((Asn1Sequence) obj); + } + + throw new ArgumentException("Invalid RecipientEncryptedKey: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public RecipientEncryptedKey( + KeyAgreeRecipientIdentifier id, + Asn1OctetString encryptedKey) + { + this.identifier = id; + this.encryptedKey = encryptedKey; + } + + public KeyAgreeRecipientIdentifier Identifier + { + get { return identifier; } + } + + public Asn1OctetString EncryptedKey + { + get { return encryptedKey; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		 * RecipientEncryptedKey ::= SEQUENCE {
+		 *     rid KeyAgreeRecipientIdentifier,
+		 *     encryptedKey EncryptedKey
+		 * }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(identifier, encryptedKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs.meta new file mode 100644 index 00000000..0645c2ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 55d6b0041f9583941bcaa6cb61a9ecb3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientEncryptedKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs new file mode 100644 index 00000000..94fdf452 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class RecipientIdentifier + : Asn1Encodable, IAsn1Choice + { + private Asn1Encodable id; + + public RecipientIdentifier( + IssuerAndSerialNumber id) + { + this.id = id; + } + + public RecipientIdentifier( + Asn1OctetString id) + { + this.id = new DerTaggedObject(false, 0, id); + } + + public RecipientIdentifier( + Asn1Object id) + { + this.id = id; + } + + /** + * return a RecipientIdentifier object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static RecipientIdentifier GetInstance( + object o) + { + if (o == null || o is RecipientIdentifier) + return (RecipientIdentifier)o; + + if (o is IssuerAndSerialNumber) + return new RecipientIdentifier((IssuerAndSerialNumber) o); + + if (o is Asn1OctetString) + return new RecipientIdentifier((Asn1OctetString) o); + + if (o is Asn1Object) + return new RecipientIdentifier((Asn1Object) o); + + throw new ArgumentException( + "Illegal object in RecipientIdentifier: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + + public bool IsTagged + { + get { return (id is Asn1TaggedObject); } + } + + public Asn1Encodable ID + { + get + { + if (id is Asn1TaggedObject) + { + return Asn1OctetString.GetInstance((Asn1TaggedObject) id, false); + } + + return IssuerAndSerialNumber.GetInstance(id); + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * RecipientIdentifier ::= CHOICE {
+         *     issuerAndSerialNumber IssuerAndSerialNumber,
+         *     subjectKeyIdentifier [0] SubjectKeyIdentifier
+         * }
+         *
+         * SubjectKeyIdentifier ::= OCTET STRING
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return id.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs.meta new file mode 100644 index 00000000..653e1a1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 268ed068df9ccc340a33d29480368f40 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs new file mode 100644 index 00000000..a1c2dfda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs @@ -0,0 +1,149 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class RecipientInfo + : Asn1Encodable, IAsn1Choice + { + internal Asn1Encodable info; + + public RecipientInfo( + KeyTransRecipientInfo info) + { + this.info = info; + } + + public RecipientInfo( + KeyAgreeRecipientInfo info) + { + this.info = new DerTaggedObject(false, 1, info); + } + + public RecipientInfo( + KekRecipientInfo info) + { + this.info = new DerTaggedObject(false, 2, info); + } + + public RecipientInfo( + PasswordRecipientInfo info) + { + this.info = new DerTaggedObject(false, 3, info); + } + + public RecipientInfo( + OtherRecipientInfo info) + { + this.info = new DerTaggedObject(false, 4, info); + } + + public RecipientInfo( + Asn1Object info) + { + this.info = info; + } + + public static RecipientInfo GetInstance( + object o) + { + if (o == null || o is RecipientInfo) + return (RecipientInfo) o; + + if (o is Asn1Sequence) + return new RecipientInfo((Asn1Sequence) o); + + if (o is Asn1TaggedObject) + return new RecipientInfo((Asn1TaggedObject) o); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + + public DerInteger Version + { + get + { + if (info is Asn1TaggedObject) + { + Asn1TaggedObject o = (Asn1TaggedObject) info; + + switch (o.TagNo) + { + case 1: + return KeyAgreeRecipientInfo.GetInstance(o, false).Version; + case 2: + return GetKekInfo(o).Version; + case 3: + return PasswordRecipientInfo.GetInstance(o, false).Version; + case 4: + return new DerInteger(0); // no syntax version for OtherRecipientInfo + default: + throw new InvalidOperationException("unknown tag"); + } + } + + return KeyTransRecipientInfo.GetInstance(info).Version; + } + } + + public bool IsTagged + { + get { return info is Asn1TaggedObject; } + } + + public Asn1Encodable Info + { + get + { + if (info is Asn1TaggedObject) + { + Asn1TaggedObject o = (Asn1TaggedObject) info; + + switch (o.TagNo) + { + case 1: + return KeyAgreeRecipientInfo.GetInstance(o, false); + case 2: + return GetKekInfo(o); + case 3: + return PasswordRecipientInfo.GetInstance(o, false); + case 4: + return OtherRecipientInfo.GetInstance(o, false); + default: + throw new InvalidOperationException("unknown tag"); + } + } + + return KeyTransRecipientInfo.GetInstance(info); + } + } + + private KekRecipientInfo GetKekInfo( + Asn1TaggedObject o) + { + // For compatibility with erroneous version, we don't always pass 'false' here + return KekRecipientInfo.GetInstance(o, o.IsExplicit()); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * RecipientInfo ::= CHOICE {
+         *     ktri KeyTransRecipientInfo,
+         *     kari [1] KeyAgreeRecipientInfo,
+         *     kekri [2] KekRecipientInfo,
+         *     pwri [3] PasswordRecipientInfo,
+         *     ori [4] OtherRecipientInfo }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return info.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs.meta new file mode 100644 index 00000000..87dc4398 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5eac07e1fb01c1046820e7a687450906 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs new file mode 100644 index 00000000..297b2d2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs @@ -0,0 +1,141 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class RecipientKeyIdentifier + : Asn1Encodable + { + private Asn1OctetString subjectKeyIdentifier; + private Asn1GeneralizedTime date; + private OtherKeyAttribute other; + + public RecipientKeyIdentifier( + Asn1OctetString subjectKeyIdentifier, + Asn1GeneralizedTime date, + OtherKeyAttribute other) + { + this.subjectKeyIdentifier = subjectKeyIdentifier; + this.date = date; + this.other = other; + } + + public RecipientKeyIdentifier( + byte[] subjectKeyIdentifier) + : this(subjectKeyIdentifier, null, null) + { + } + + public RecipientKeyIdentifier( + byte[] subjectKeyIdentifier, + Asn1GeneralizedTime date, + OtherKeyAttribute other) + { + this.subjectKeyIdentifier = new DerOctetString(subjectKeyIdentifier); + this.date = date; + this.other = other; + } + + public RecipientKeyIdentifier( + Asn1Sequence seq) + { + subjectKeyIdentifier = Asn1OctetString.GetInstance( + seq[0]); + + switch(seq.Count) + { + case 1: + break; + case 2: + if (seq[1] is Asn1GeneralizedTime) + { + date = (Asn1GeneralizedTime)seq[1]; + } + else + { + other = OtherKeyAttribute.GetInstance(seq[2]); + } + break; + case 3: + date = (Asn1GeneralizedTime)seq[1]; + other = OtherKeyAttribute.GetInstance(seq[2]); + break; + default: + throw new ArgumentException("Invalid RecipientKeyIdentifier"); + } + } + + /** + * return a RecipientKeyIdentifier object from a tagged object. + * + * @param _ato the tagged object holding the object we want. + * @param _explicit true if the object is meant to be explicitly + * tagged false otherwise. + * @exception ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static RecipientKeyIdentifier GetInstance( + Asn1TaggedObject ato, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(ato, explicitly)); + } + + /** + * return a RecipientKeyIdentifier object from the given object. + * + * @param _obj the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static RecipientKeyIdentifier GetInstance( + object obj) + { + if (obj == null || obj is RecipientKeyIdentifier) + return (RecipientKeyIdentifier) obj; + + if (obj is Asn1Sequence) + return new RecipientKeyIdentifier((Asn1Sequence) obj); + + throw new ArgumentException("Invalid RecipientKeyIdentifier: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public Asn1OctetString SubjectKeyIdentifier + { + get { return subjectKeyIdentifier; } + } + + public Asn1GeneralizedTime Date + { + get { return date; } + } + + public OtherKeyAttribute OtherKeyAttribute + { + get { return other; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * RecipientKeyIdentifier ::= Sequence {
+         *     subjectKeyIdentifier SubjectKeyIdentifier,
+         *     date GeneralizedTime OPTIONAL,
+         *     other OtherKeyAttribute OPTIONAL
+         * }
+         *
+         * SubjectKeyIdentifier ::= OCTET STRING
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(subjectKeyIdentifier); + v.AddOptional(date, other); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs.meta new file mode 100644 index 00000000..64a7e2d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f98189ae4c7921f4b89e1df99adbea78 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/RecipientKeyIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs new file mode 100644 index 00000000..5e16f60c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class ScvpReqRes + : Asn1Encodable + { + private readonly ContentInfo request; + private readonly ContentInfo response; + + public static ScvpReqRes GetInstance(object obj) + { + if (obj is ScvpReqRes) + return (ScvpReqRes)obj; + if (obj != null) + return new ScvpReqRes(Asn1Sequence.GetInstance(obj)); + return null; + } + + private ScvpReqRes(Asn1Sequence seq) + { + if (seq[0] is Asn1TaggedObject) + { + this.request = ContentInfo.GetInstance(Asn1TaggedObject.GetInstance(seq[0]), true); + this.response = ContentInfo.GetInstance(seq[1]); + } + else + { + this.request = null; + this.response = ContentInfo.GetInstance(seq[0]); + } + } + + public ScvpReqRes(ContentInfo response) + : this(null, response) + { + } + + public ScvpReqRes(ContentInfo request, ContentInfo response) + { + this.request = request; + this.response = response; + } + + public virtual ContentInfo Request + { + get { return request; } + } + + public virtual ContentInfo Response + { + get { return response; } + } + + /** + *
+         *    ScvpReqRes ::= SEQUENCE {
+         *    request  [0] EXPLICIT ContentInfo OPTIONAL,
+         *    response     ContentInfo }
+         * 
+ * @return the ASN.1 primitive representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, request); + v.Add(response); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs.meta new file mode 100644 index 00000000..6b51bbdc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30933c482b046e147af52fff411761cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SCVPReqRes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs new file mode 100644 index 00000000..53ed892a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs @@ -0,0 +1,281 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + * a signed data object. + */ + public class SignedData + : Asn1Encodable + { + private static readonly DerInteger Version1 = new DerInteger(1); + private static readonly DerInteger Version3 = new DerInteger(3); + private static readonly DerInteger Version4 = new DerInteger(4); + private static readonly DerInteger Version5 = new DerInteger(5); + + private readonly DerInteger version; + private readonly Asn1Set digestAlgorithms; + private readonly ContentInfo contentInfo; + private readonly Asn1Set certificates; + private readonly Asn1Set crls; + private readonly Asn1Set signerInfos; + private readonly bool certsBer; + private readonly bool crlsBer; + + public static SignedData GetInstance(object obj) + { + if (obj is SignedData) + return (SignedData)obj; + if (obj == null) + return null; + return new SignedData(Asn1Sequence.GetInstance(obj)); + } + + public SignedData( + Asn1Set digestAlgorithms, + ContentInfo contentInfo, + Asn1Set certificates, + Asn1Set crls, + Asn1Set signerInfos) + { + this.version = CalculateVersion(contentInfo.ContentType, certificates, crls, signerInfos); + this.digestAlgorithms = digestAlgorithms; + this.contentInfo = contentInfo; + this.certificates = certificates; + this.crls = crls; + this.signerInfos = signerInfos; + this.crlsBer = crls is BerSet; + this.certsBer = certificates is BerSet; + } + + // RFC3852, section 5.1: + // IF ((certificates is present) AND + // (any certificates with a type of other are present)) OR + // ((crls is present) AND + // (any crls with a type of other are present)) + // THEN version MUST be 5 + // ELSE + // IF (certificates is present) AND + // (any version 2 attribute certificates are present) + // THEN version MUST be 4 + // ELSE + // IF ((certificates is present) AND + // (any version 1 attribute certificates are present)) OR + // (any SignerInfo structures are version 3) OR + // (encapContentInfo eContentType is other than id-data) + // THEN version MUST be 3 + // ELSE version MUST be 1 + // + private DerInteger CalculateVersion( + DerObjectIdentifier contentOid, + Asn1Set certs, + Asn1Set crls, + Asn1Set signerInfs) + { + bool otherCert = false; + bool otherCrl = false; + bool attrCertV1Found = false; + bool attrCertV2Found = false; + + if (certs != null) + { + foreach (object obj in certs) + { + if (obj is Asn1TaggedObject) + { + Asn1TaggedObject tagged = (Asn1TaggedObject)obj; + + if (tagged.TagNo == 1) + { + attrCertV1Found = true; + } + else if (tagged.TagNo == 2) + { + attrCertV2Found = true; + } + else if (tagged.TagNo == 3) + { + otherCert = true; + break; + } + } + } + } + + if (otherCert) + { + return Version5; + } + + if (crls != null) + { + foreach (object obj in crls) + { + if (obj is Asn1TaggedObject) + { + otherCrl = true; + break; + } + } + } + + if (otherCrl) + { + return Version5; + } + + if (attrCertV2Found) + { + return Version4; + } + + if (attrCertV1Found || !CmsObjectIdentifiers.Data.Equals(contentOid) || CheckForVersion3(signerInfs)) + { + return Version3; + } + + return Version1; + } + + private bool CheckForVersion3(Asn1Set signerInfs) + { + foreach (object obj in signerInfs) + { + SignerInfo s = SignerInfo.GetInstance(obj); + + if (s.Version.HasValue(3)) + { + return true; + } + } + + return false; + } + + private SignedData(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + version = (DerInteger)e.Current; + + e.MoveNext(); + digestAlgorithms = (Asn1Set)e.Current.ToAsn1Object(); + + e.MoveNext(); + contentInfo = ContentInfo.GetInstance(e.Current.ToAsn1Object()); + + while (e.MoveNext()) + { + Asn1Object o = e.Current.ToAsn1Object(); + + // + // an interesting feature of SignedData is that there appear + // to be varying implementations... + // for the moment we ignore anything which doesn't fit. + // + if (o is Asn1TaggedObject tagged) + { + switch (tagged.TagNo) + { + case 0: + certsBer = tagged is BerTaggedObject; + certificates = Asn1Set.GetInstance(tagged, false); + break; + case 1: + crlsBer = tagged is BerTaggedObject; + crls = Asn1Set.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("unknown tag value " + tagged.TagNo); + } + } + else + { + signerInfos = (Asn1Set) o; + } + } + } + + public DerInteger Version + { + get { return version; } + } + + public Asn1Set DigestAlgorithms + { + get { return digestAlgorithms; } + } + + public ContentInfo EncapContentInfo + { + get { return contentInfo; } + } + + public Asn1Set Certificates + { + get { return certificates; } + } + + public Asn1Set CRLs + { + get { return crls; } + } + + public Asn1Set SignerInfos + { + get { return signerInfos; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * SignedData ::= Sequence {
+         *     version CMSVersion,
+         *     digestAlgorithms DigestAlgorithmIdentifiers,
+         *     encapContentInfo EncapsulatedContentInfo,
+         *     certificates [0] IMPLICIT CertificateSet OPTIONAL,
+         *     crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
+         *     signerInfos SignerInfos
+         *   }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + version, digestAlgorithms, contentInfo); + + if (certificates != null) + { + if (certsBer) + { + v.Add(new BerTaggedObject(false, 0, certificates)); + } + else + { + v.Add(new DerTaggedObject(false, 0, certificates)); + } + } + + if (crls != null) + { + if (crlsBer) + { + v.Add(new BerTaggedObject(false, 1, crls)); + } + else + { + v.Add(new DerTaggedObject(false, 1, crls)); + } + } + + v.Add(signerInfos); + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs.meta new file mode 100644 index 00000000..5d0f05b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7c423f66ca24d1c4ba73c7e43140f576 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs new file mode 100644 index 00000000..c6c2a800 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + /** + *
+	* SignedData ::= SEQUENCE {
+	*     version CMSVersion,
+	*     digestAlgorithms DigestAlgorithmIdentifiers,
+	*     encapContentInfo EncapsulatedContentInfo,
+	*     certificates [0] IMPLICIT CertificateSet OPTIONAL,
+	*     crls [1] IMPLICIT CertificateRevocationLists OPTIONAL,
+	*     signerInfos SignerInfos
+	*   }
+	* 
+ */ + public class SignedDataParser + { + private Asn1SequenceParser _seq; + private DerInteger _version; + private object _nextObject; + private bool _certsCalled; + private bool _crlsCalled; + + public static SignedDataParser GetInstance( + object o) + { + if (o is Asn1Sequence) + return new SignedDataParser(((Asn1Sequence)o).Parser); + + if (o is Asn1SequenceParser) + return new SignedDataParser((Asn1SequenceParser)o); + + throw new IOException("unknown object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + + public SignedDataParser( + Asn1SequenceParser seq) + { + this._seq = seq; + this._version = (DerInteger)seq.ReadObject(); + } + + public DerInteger Version + { + get { return _version; } + } + + public Asn1SetParser GetDigestAlgorithms() + { + return (Asn1SetParser)_seq.ReadObject(); + } + + public ContentInfoParser GetEncapContentInfo() + { + return new ContentInfoParser((Asn1SequenceParser)_seq.ReadObject()); + } + + public Asn1SetParser GetCertificates() + { + _certsCalled = true; + _nextObject = _seq.ReadObject(); + + if (_nextObject is Asn1TaggedObjectParser o) + { + if (o.HasContextTag(0)) + { + Asn1SetParser certs = (Asn1SetParser)o.ParseBaseUniversal(false, Asn1Tags.SetOf); + _nextObject = null; + return certs; + } + } + + return null; + } + + public Asn1SetParser GetCrls() + { + if (!_certsCalled) + throw new IOException("GetCerts() has not been called."); + + _crlsCalled = true; + + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + if (_nextObject is Asn1TaggedObjectParser o) + { + if (o.HasContextTag(1)) + { + Asn1SetParser crls = (Asn1SetParser)o.ParseBaseUniversal(false, Asn1Tags.SetOf); + _nextObject = null; + return crls; + } + } + + return null; + } + + public Asn1SetParser GetSignerInfos() + { + if (!_certsCalled || !_crlsCalled) + throw new IOException("GetCerts() and/or GetCrls() has not been called."); + + if (_nextObject == null) + { + _nextObject = _seq.ReadObject(); + } + + return (Asn1SetParser)_nextObject; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs.meta new file mode 100644 index 00000000..797344aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05e7b42e6f58b8241b76bd70edc648ee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs new file mode 100644 index 00000000..9463bcac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class SignerIdentifier + : Asn1Encodable, IAsn1Choice + { + private Asn1Encodable id; + + public SignerIdentifier( + IssuerAndSerialNumber id) + { + this.id = id; + } + + public SignerIdentifier( + Asn1OctetString id) + { + this.id = new DerTaggedObject(false, 0, id); + } + + public SignerIdentifier( + Asn1Object id) + { + this.id = id; + } + + /** + * return a SignerIdentifier object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static SignerIdentifier GetInstance( + object o) + { + if (o == null || o is SignerIdentifier) + return (SignerIdentifier) o; + + if (o is IssuerAndSerialNumber) + return new SignerIdentifier((IssuerAndSerialNumber) o); + + if (o is Asn1OctetString) + return new SignerIdentifier((Asn1OctetString) o); + + if (o is Asn1Object) + return new SignerIdentifier((Asn1Object) o); + + throw new ArgumentException( + "Illegal object in SignerIdentifier: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + + public bool IsTagged + { + get { return (id is Asn1TaggedObject); } + } + + public Asn1Encodable ID + { + get + { + if (id is Asn1TaggedObject) + { + return Asn1OctetString.GetInstance((Asn1TaggedObject)id, false); + } + + return id; + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * SignerIdentifier ::= CHOICE {
+         *     issuerAndSerialNumber IssuerAndSerialNumber,
+         *     subjectKeyIdentifier [0] SubjectKeyIdentifier
+         * }
+         *
+         * SubjectKeyIdentifier ::= OCTET STRING
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return id.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs.meta new file mode 100644 index 00000000..2cea2b99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5831edaa0fffd8c49b6b6954d736ca02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs new file mode 100644 index 00000000..5ec45801 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class SignerInfo + : Asn1Encodable + { + private DerInteger version; + private SignerIdentifier sid; + private AlgorithmIdentifier digAlgorithm; + private Asn1Set authenticatedAttributes; + private AlgorithmIdentifier digEncryptionAlgorithm; + private Asn1OctetString encryptedDigest; + private Asn1Set unauthenticatedAttributes; + + public static SignerInfo GetInstance(object obj) + { + if (obj == null || obj is SignerInfo) + return (SignerInfo) obj; + + if (obj is Asn1Sequence) + return new SignerInfo((Asn1Sequence) obj); + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public SignerInfo( + SignerIdentifier sid, + AlgorithmIdentifier digAlgorithm, + Asn1Set authenticatedAttributes, + AlgorithmIdentifier digEncryptionAlgorithm, + Asn1OctetString encryptedDigest, + Asn1Set unauthenticatedAttributes) + { + this.version = new DerInteger(sid.IsTagged ? 3 : 1); + this.sid = sid; + this.digAlgorithm = digAlgorithm; + this.authenticatedAttributes = authenticatedAttributes; + this.digEncryptionAlgorithm = digEncryptionAlgorithm; + this.encryptedDigest = encryptedDigest; + this.unauthenticatedAttributes = unauthenticatedAttributes; + } + + public SignerInfo( + SignerIdentifier sid, + AlgorithmIdentifier digAlgorithm, + Attributes authenticatedAttributes, + AlgorithmIdentifier digEncryptionAlgorithm, + Asn1OctetString encryptedDigest, + Attributes unauthenticatedAttributes) + { + this.version = new DerInteger(sid.IsTagged ? 3 : 1); + this.sid = sid; + this.digAlgorithm = digAlgorithm; + this.authenticatedAttributes = Asn1Set.GetInstance(authenticatedAttributes); + this.digEncryptionAlgorithm = digEncryptionAlgorithm; + this.encryptedDigest = encryptedDigest; + this.unauthenticatedAttributes = Asn1Set.GetInstance(unauthenticatedAttributes); + } + + private SignerInfo(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + version = (DerInteger)e.Current; + + e.MoveNext(); + sid = SignerIdentifier.GetInstance(e.Current.ToAsn1Object()); + + e.MoveNext(); + digAlgorithm = AlgorithmIdentifier.GetInstance(e.Current.ToAsn1Object()); + + e.MoveNext(); + var obj = e.Current.ToAsn1Object(); + + if (obj is Asn1TaggedObject tagged) + { + authenticatedAttributes = Asn1Set.GetInstance(tagged, false); + + e.MoveNext(); + digEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(e.Current.ToAsn1Object()); + } + else + { + authenticatedAttributes = null; + digEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(obj); + } + + e.MoveNext(); + encryptedDigest = Asn1OctetString.GetInstance(e.Current.ToAsn1Object()); + + if (e.MoveNext()) + { + unauthenticatedAttributes = Asn1Set.GetInstance((Asn1TaggedObject)e.Current.ToAsn1Object(), false); + } + else + { + unauthenticatedAttributes = null; + } + } + + public DerInteger Version + { + get { return version; } + } + + public SignerIdentifier SignerID + { + get { return sid; } + } + + public Asn1Set AuthenticatedAttributes + { + get { return authenticatedAttributes; } + } + + public AlgorithmIdentifier DigestAlgorithm + { + get { return digAlgorithm; } + } + + public Asn1OctetString EncryptedDigest + { + get { return encryptedDigest; } + } + + public AlgorithmIdentifier DigestEncryptionAlgorithm + { + get { return digEncryptionAlgorithm; } + } + + public Asn1Set UnauthenticatedAttributes + { + get { return unauthenticatedAttributes; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  SignerInfo ::= Sequence {
+         *      version Version,
+         *      SignerIdentifier sid,
+         *      digestAlgorithm DigestAlgorithmIdentifier,
+         *      authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
+         *      digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
+         *      encryptedDigest EncryptedDigest,
+         *      unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
+         *  }
+         *
+         *  EncryptedDigest ::= OCTET STRING
+         *
+         *  DigestAlgorithmIdentifier ::= AlgorithmIdentifier
+         *
+         *  DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, sid, digAlgorithm); + v.AddOptionalTagged(false, 0, authenticatedAttributes); + v.Add(digEncryptionAlgorithm, encryptedDigest); + v.AddOptionalTagged(false, 1, unauthenticatedAttributes); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs.meta new file mode 100644 index 00000000..dd1d0fdc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 45efbcfcd327360458fa1d300c0cb7a7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/SignerInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs new file mode 100644 index 00000000..4c0e6935 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs @@ -0,0 +1,114 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class Time + : Asn1Encodable, IAsn1Choice + { + public static Time GetInstance(object obj) + { + if (obj == null) + return null; + if (obj is Time time) + return time; + if (obj is Asn1UtcTime utcTime) + return new Time(utcTime); + if (obj is Asn1GeneralizedTime generalizedTime) + return new Time(generalizedTime); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static Time GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return GetInstance(taggedObject.GetObject()); + } + + private readonly Asn1Object m_timeObject; + + public Time(Asn1GeneralizedTime generalizedTime) + { + this.m_timeObject = generalizedTime ?? throw new ArgumentNullException(nameof(generalizedTime)); + } + + public Time(Asn1UtcTime utcTime) + { + if (utcTime == null) + throw new ArgumentNullException(nameof(utcTime)); + + // Validate utcTime is in the appropriate year range + utcTime.ToDateTime(2049); + + this.m_timeObject = utcTime; + } + + /** + * creates a time object from a given date - if the date is between 1950 + * and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime + * is used. + */ + public Time(DateTime date) + { + DateTime utc = date.ToUniversalTime(); + + if (utc.Year < 1950 || utc.Year > 2049) + { + m_timeObject = new DerGeneralizedTime(utc); + } + else + { + m_timeObject = new DerUtcTime(utc, 2049); + } + } + + public DateTime ToDateTime() + { + try + { + if (m_timeObject is Asn1UtcTime utcTime) + return utcTime.ToDateTime(2049); + + return ((Asn1GeneralizedTime)m_timeObject).ToDateTime(); + } + catch (FormatException e) + { + // this should never happen + throw new InvalidOperationException("invalid date string: " + e.Message); + } + } + + + public DateTime Date => ToDateTime(); + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Time ::= CHOICE {
+         *             utcTime        UTCTime,
+         *             generalTime    GeneralizedTime }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return m_timeObject; + } + + public override string ToString() + { + if (m_timeObject is Asn1UtcTime utcTime) + return utcTime.ToDateTime(2049).ToString(@"yyyyMMddHHmmssK", DateTimeFormatInfo.InvariantInfo); + + if (m_timeObject is Asn1GeneralizedTime generalizedTime) + return generalizedTime.ToDateTime().ToString(@"yyyyMMddHHmmss.FFFFFFFK", DateTimeFormatInfo.InvariantInfo); + + throw new InvalidOperationException(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs.meta new file mode 100644 index 00000000..ebe6f4e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bb973623f792e0f409b05930fa72b8d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/Time.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs new file mode 100644 index 00000000..6495df90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class TimeStampAndCrl + : Asn1Encodable + { + private ContentInfo timeStamp; + private X509.CertificateList crl; + + public TimeStampAndCrl(ContentInfo timeStamp) + { + this.timeStamp = timeStamp; + } + + private TimeStampAndCrl(Asn1Sequence seq) + { + this.timeStamp = ContentInfo.GetInstance(seq[0]); + if (seq.Count == 2) + { + this.crl = X509.CertificateList.GetInstance(seq[1]); + } + } + + public static TimeStampAndCrl GetInstance(object obj) + { + if (obj is TimeStampAndCrl) + return (TimeStampAndCrl)obj; + + if (obj != null) + return new TimeStampAndCrl(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public virtual ContentInfo TimeStampToken + { + get { return this.timeStamp; } + } + + public virtual X509.CertificateList Crl + { + get { return this.crl; } + } + + /** + *
+		 * TimeStampAndCRL ::= SEQUENCE {
+		 *     timeStamp   TimeStampToken,          -- according to RFC 3161
+		 *     crl         CertificateList OPTIONAL -- according to RFC 5280
+		 *  }
+		 * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(timeStamp); + v.AddOptional(crl); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs.meta new file mode 100644 index 00000000..b6d05d5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f4dcd32502de784a9926445d3380301 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampAndCRL.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs new file mode 100644 index 00000000..319976cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class TimeStampTokenEvidence + : Asn1Encodable + { + private TimeStampAndCrl[] timeStampAndCrls; + + public TimeStampTokenEvidence(TimeStampAndCrl[] timeStampAndCrls) + { + this.timeStampAndCrls = timeStampAndCrls; + } + + public TimeStampTokenEvidence(TimeStampAndCrl timeStampAndCrl) + { + this.timeStampAndCrls = new TimeStampAndCrl[]{ timeStampAndCrl }; + } + + private TimeStampTokenEvidence(Asn1Sequence seq) + { + this.timeStampAndCrls = new TimeStampAndCrl[seq.Count]; + + int count = 0; + + foreach (Asn1Encodable ae in seq) + { + this.timeStampAndCrls[count++] = TimeStampAndCrl.GetInstance(ae.ToAsn1Object()); + } + } + + public static TimeStampTokenEvidence GetInstance(Asn1TaggedObject tagged, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(tagged, isExplicit)); + } + + public static TimeStampTokenEvidence GetInstance(object obj) + { + if (obj is TimeStampTokenEvidence) + return (TimeStampTokenEvidence)obj; + + if (obj != null) + return new TimeStampTokenEvidence(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public virtual TimeStampAndCrl[] ToTimeStampAndCrlArray() + { + return (TimeStampAndCrl[])timeStampAndCrls.Clone(); + } + + /** + *
+		 * TimeStampTokenEvidence ::=
+		 *    SEQUENCE SIZE(1..MAX) OF TimeStampAndCrl
+		 * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(timeStampAndCrls); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs.meta new file mode 100644 index 00000000..253bcc92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9677d88eeedf9374597fdb1722202d99 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampTokenEvidence.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs new file mode 100644 index 00000000..68d89cea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class TimeStampedData + : Asn1Encodable + { + private DerInteger version; + private DerIA5String dataUri; + private MetaData metaData; + private Asn1OctetString content; + private Evidence temporalEvidence; + + public TimeStampedData(DerIA5String dataUri, MetaData metaData, Asn1OctetString content, + Evidence temporalEvidence) + { + this.version = new DerInteger(1); + this.dataUri = dataUri; + this.metaData = metaData; + this.content = content; + this.temporalEvidence = temporalEvidence; + } + + private TimeStampedData(Asn1Sequence seq) + { + this.version = DerInteger.GetInstance(seq[0]); + + int index = 1; + if (seq[index] is DerIA5String) + { + this.dataUri = DerIA5String.GetInstance(seq[index++]); + } + if (seq[index] is MetaData || seq[index] is Asn1Sequence) + { + this.metaData = MetaData.GetInstance(seq[index++]); + } + if (seq[index] is Asn1OctetString) + { + this.content = Asn1OctetString.GetInstance(seq[index++]); + } + this.temporalEvidence = Evidence.GetInstance(seq[index]); + } + + public static TimeStampedData GetInstance(object obj) + { + if (obj is TimeStampedData) + return (TimeStampedData)obj; + + if (obj != null) + return new TimeStampedData(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public virtual DerIA5String DataUri + { + get { return dataUri; } + } + + public MetaData MetaData + { + get { return metaData; } + } + + public Asn1OctetString Content + { + get { return content; } + } + + public Evidence TemporalEvidence + { + get { return temporalEvidence; } + } + + /** + *
+		 * TimeStampedData ::= SEQUENCE {
+		 *   version              INTEGER { v1(1) },
+		 *   dataUri              IA5String OPTIONAL,
+		 *   metaData             MetaData OPTIONAL,
+		 *   content              OCTET STRING OPTIONAL,
+		 *   temporalEvidence     Evidence
+		 * }
+		 * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version); + v.AddOptional(dataUri, metaData, content); + v.Add(temporalEvidence); + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs.meta new file mode 100644 index 00000000..df23a4bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 44dbb40e9540e9a43828dba5a0dedd98 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs new file mode 100644 index 00000000..bb4136f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms +{ + public class TimeStampedDataParser + { + private DerInteger version; + private DerIA5String dataUri; + private MetaData metaData; + private Asn1OctetStringParser content; + private Evidence temporalEvidence; + private Asn1SequenceParser parser; + + private TimeStampedDataParser(Asn1SequenceParser parser) + { + this.parser = parser; + this.version = DerInteger.GetInstance(parser.ReadObject()); + + Asn1Object obj = parser.ReadObject().ToAsn1Object(); + + if (obj is DerIA5String) + { + this.dataUri = DerIA5String.GetInstance(obj); + obj = parser.ReadObject().ToAsn1Object(); + } + + if (//obj is MetaData || + obj is Asn1SequenceParser) + { + this.metaData = MetaData.GetInstance(obj.ToAsn1Object()); + obj = parser.ReadObject().ToAsn1Object(); + } + + if (obj is Asn1OctetStringParser) + { + this.content = (Asn1OctetStringParser)obj; + } + } + + public static TimeStampedDataParser GetInstance(object obj) + { + if (obj is Asn1Sequence) + return new TimeStampedDataParser(((Asn1Sequence)obj).Parser); + + if (obj is Asn1SequenceParser) + return new TimeStampedDataParser((Asn1SequenceParser)obj); + + return null; + } + + public virtual DerIA5String DataUri + { + get { return dataUri; } + } + + public virtual MetaData MetaData + { + get { return metaData; } + } + + public virtual Asn1OctetStringParser Content + { + get { return content; } + } + + public virtual Evidence GetTemporalEvidence() + { + if (temporalEvidence == null) + { + temporalEvidence = Evidence.GetInstance(parser.ReadObject().ToAsn1Object()); + } + + return temporalEvidence; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs.meta new file mode 100644 index 00000000..27175cd8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 11ea87c7cb447c647ab686bb9dd0deda +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/TimeStampedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc.meta new file mode 100644 index 00000000..c924191f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ddfa1d4dfe54044448daca0f58ec039a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs new file mode 100644 index 00000000..96002fcf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc +{ + public class MQVuserKeyingMaterial + : Asn1Encodable + { + private OriginatorPublicKey ephemeralPublicKey; + private Asn1OctetString addedukm; + + public MQVuserKeyingMaterial( + OriginatorPublicKey ephemeralPublicKey, + Asn1OctetString addedukm) + { + // TODO Check ephemeralPublicKey not null + + this.ephemeralPublicKey = ephemeralPublicKey; + this.addedukm = addedukm; + } + + private MQVuserKeyingMaterial( + Asn1Sequence seq) + { + // TODO Check seq has either 1 or 2 elements + + this.ephemeralPublicKey = OriginatorPublicKey.GetInstance(seq[0]); + + if (seq.Count > 1) + { + this.addedukm = Asn1OctetString.GetInstance( + (Asn1TaggedObject)seq[1], true); + } + } + + /** + * return an AuthEnvelopedData object from a tagged object. + * + * @param obj the tagged object holding the object we want. + * @param isExplicit true if the object is meant to be explicitly + * tagged false otherwise. + * @throws ArgumentException if the object held by the + * tagged object cannot be converted. + */ + public static MQVuserKeyingMaterial GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * return an AuthEnvelopedData object from the given object. + * + * @param obj the object we want converted. + * @throws ArgumentException if the object cannot be converted. + */ + public static MQVuserKeyingMaterial GetInstance( + object obj) + { + if (obj == null || obj is MQVuserKeyingMaterial) + { + return (MQVuserKeyingMaterial)obj; + } + + if (obj is Asn1Sequence) + { + return new MQVuserKeyingMaterial((Asn1Sequence)obj); + } + + throw new ArgumentException("Invalid MQVuserKeyingMaterial: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public OriginatorPublicKey EphemeralPublicKey + { + get { return ephemeralPublicKey; } + } + + public Asn1OctetString AddedUkm + { + get { return addedukm; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		* MQVuserKeyingMaterial ::= SEQUENCE {
+		*   ephemeralPublicKey OriginatorPublicKey,
+		*   addedukm [0] EXPLICIT UserKeyingMaterial OPTIONAL  }
+		* 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(ephemeralPublicKey); + v.AddOptionalTagged(true, 0, addedukm); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs.meta new file mode 100644 index 00000000..611226be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ca994732aac101b46a2c4018dbb9a9b0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cms/ecc/MQVuserKeyingMaterial.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf.meta new file mode 100644 index 00000000..355d0c07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 64c68fae2f3b4e742ab1bb4bbd415d58 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs new file mode 100644 index 00000000..036ad938 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class AttributeTypeAndValue + : Asn1Encodable + { + private readonly DerObjectIdentifier type; + private readonly Asn1Encodable value; + + private AttributeTypeAndValue(Asn1Sequence seq) + { + type = (DerObjectIdentifier)seq[0]; + value = (Asn1Encodable)seq[1]; + } + + public static AttributeTypeAndValue GetInstance(object obj) + { + if (obj is AttributeTypeAndValue) + return (AttributeTypeAndValue)obj; + + if (obj is Asn1Sequence) + return new AttributeTypeAndValue((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public AttributeTypeAndValue( + string oid, + Asn1Encodable value) + : this(new DerObjectIdentifier(oid), value) + { + } + + public AttributeTypeAndValue( + DerObjectIdentifier type, + Asn1Encodable value) + { + this.type = type; + this.value = value; + } + + public virtual DerObjectIdentifier Type + { + get { return type; } + } + + public virtual Asn1Encodable Value + { + get { return value; } + } + + /** + *
+         * AttributeTypeAndValue ::= SEQUENCE {
+         *           type         OBJECT IDENTIFIER,
+         *           value        ANY DEFINED BY type }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(type, value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs.meta new file mode 100644 index 00000000..544b27c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10929e85222075a45944037e77775558 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/AttributeTypeAndValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs new file mode 100644 index 00000000..c29b2bfc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertId + : Asn1Encodable + { + private readonly GeneralName issuer; + private readonly DerInteger serialNumber; + + private CertId(Asn1Sequence seq) + { + issuer = GeneralName.GetInstance(seq[0]); + serialNumber = DerInteger.GetInstance(seq[1]); + } + + public static CertId GetInstance(object obj) + { + if (obj is CertId) + return (CertId)obj; + + if (obj is Asn1Sequence) + return new CertId((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static CertId GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public virtual GeneralName Issuer + { + get { return issuer; } + } + + public virtual DerInteger SerialNumber + { + get { return serialNumber; } + } + + /** + *
+         * CertId ::= SEQUENCE {
+         *                 issuer           GeneralName,
+         *                 serialNumber     INTEGER }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(issuer, serialNumber); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs.meta new file mode 100644 index 00000000..12e49278 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 278626812312f974d9ceb32eba1c407f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs new file mode 100644 index 00000000..5d7ad4a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertReqMessages + : Asn1Encodable + { + private readonly Asn1Sequence content; + + private CertReqMessages(Asn1Sequence seq) + { + content = seq; + } + + public static CertReqMessages GetInstance(object obj) + { + if (obj is CertReqMessages) + return (CertReqMessages)obj; + + if (obj is Asn1Sequence) + return new CertReqMessages((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public CertReqMessages(params CertReqMsg[] msgs) + { + content = new DerSequence(msgs); + } + + public virtual CertReqMsg[] ToCertReqMsgArray() + { + CertReqMsg[] result = new CertReqMsg[content.Count]; + for (int i = 0; i != result.Length; ++i) + { + result[i] = CertReqMsg.GetInstance(content[i]); + } + return result; + } + + /** + *
+         * CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs.meta new file mode 100644 index 00000000..4df5a47a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 95c108803b6695049aa7a5f143e18635 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMessages.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs new file mode 100644 index 00000000..a1c800f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertReqMsg + : Asn1Encodable + { + private readonly CertRequest certReq; + private readonly ProofOfPossession popo; + private readonly Asn1Sequence regInfo; + + private CertReqMsg(Asn1Sequence seq) + { + certReq = CertRequest.GetInstance(seq[0]); + + for (int pos = 1; pos < seq.Count; ++pos) + { + object o = seq[pos]; + + if (o is Asn1TaggedObject || o is ProofOfPossession) + { + popo = ProofOfPossession.GetInstance(o); + } + else + { + regInfo = Asn1Sequence.GetInstance(o); + } + } + } + + public static CertReqMsg GetInstance(object obj) + { + if (obj is CertReqMsg) + return (CertReqMsg)obj; + + if (obj != null) + return new CertReqMsg(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public static CertReqMsg GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * Creates a new CertReqMsg. + * @param certReq CertRequest + * @param popo may be null + * @param regInfo may be null + */ + public CertReqMsg( + CertRequest certReq, + ProofOfPossession popo, + AttributeTypeAndValue[] regInfo) + { + if (certReq == null) + throw new ArgumentNullException("certReq"); + + this.certReq = certReq; + this.popo = popo; + + if (regInfo != null) + { + this.regInfo = new DerSequence(regInfo); + } + } + + public virtual CertRequest CertReq + { + get { return certReq; } + } + + public virtual ProofOfPossession Popo + { + get { return popo; } + } + + public virtual AttributeTypeAndValue[] GetRegInfo() + { + if (regInfo == null) + return null; + + AttributeTypeAndValue[] results = new AttributeTypeAndValue[regInfo.Count]; + for (int i = 0; i != results.Length; ++i) + { + results[i] = AttributeTypeAndValue.GetInstance(regInfo[i]); + } + return results; + } + + /** + *
+         * CertReqMsg ::= SEQUENCE {
+         *                    certReq   CertRequest,
+         *                    pop       ProofOfPossession  OPTIONAL,
+         *                    -- content depends upon key type
+         *                    regInfo   SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue OPTIONAL }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certReq); + v.AddOptional(popo, regInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs.meta new file mode 100644 index 00000000..24484db3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e017944cda918a54a9128204afdbe99f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertReqMsg.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs new file mode 100644 index 00000000..c482fed3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertRequest + : Asn1Encodable + { + private readonly DerInteger certReqId; + private readonly CertTemplate certTemplate; + private readonly Controls controls; + + private CertRequest(Asn1Sequence seq) + { + certReqId = DerInteger.GetInstance(seq[0]); + certTemplate = CertTemplate.GetInstance(seq[1]); + if (seq.Count > 2) + { + controls = Controls.GetInstance(seq[2]); + } + } + + public static CertRequest GetInstance(object obj) + { + if (obj is CertRequest) + return (CertRequest)obj; + + if (obj != null) + return new CertRequest(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public CertRequest( + int certReqId, + CertTemplate certTemplate, + Controls controls) + : this(new DerInteger(certReqId), certTemplate, controls) + { + } + + public CertRequest( + DerInteger certReqId, + CertTemplate certTemplate, + Controls controls) + { + this.certReqId = certReqId; + this.certTemplate = certTemplate; + this.controls = controls; + } + + public virtual DerInteger CertReqID + { + get { return certReqId; } + } + + public virtual CertTemplate CertTemplate + { + get { return certTemplate; } + } + + public virtual Controls Controls + { + get { return controls; } + } + + /** + *
+         * CertRequest ::= SEQUENCE {
+         *                      certReqId     INTEGER,          -- ID for matching request and reply
+         *                      certTemplate  CertTemplate,  -- Selected fields of cert to be issued
+         *                      controls      Controls OPTIONAL }   -- Attributes affecting issuance
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certReqId, certTemplate); + v.AddOptional(controls); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs.meta new file mode 100644 index 00000000..32251f0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6af25341d32afe64b918925674998e1e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs new file mode 100644 index 00000000..fbefc7e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs @@ -0,0 +1,153 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertTemplate + : Asn1Encodable + { + private readonly Asn1Sequence seq; + + private readonly DerInteger version; + private readonly DerInteger serialNumber; + private readonly AlgorithmIdentifier signingAlg; + private readonly X509Name issuer; + private readonly OptionalValidity validity; + private readonly X509Name subject; + private readonly SubjectPublicKeyInfo publicKey; + private readonly DerBitString issuerUID; + private readonly DerBitString subjectUID; + private readonly X509Extensions extensions; + + private CertTemplate(Asn1Sequence seq) + { + this.seq = seq; + + foreach (Asn1TaggedObject tObj in seq) + { + switch (tObj.TagNo) + { + case 0: + version = DerInteger.GetInstance(tObj, false); + break; + case 1: + serialNumber = DerInteger.GetInstance(tObj, false); + break; + case 2: + signingAlg = AlgorithmIdentifier.GetInstance(tObj, false); + break; + case 3: + issuer = X509Name.GetInstance(tObj, true); // CHOICE + break; + case 4: + validity = OptionalValidity.GetInstance(Asn1Sequence.GetInstance(tObj, false)); + break; + case 5: + subject = X509Name.GetInstance(tObj, true); // CHOICE + break; + case 6: + publicKey = SubjectPublicKeyInfo.GetInstance(tObj, false); + break; + case 7: + issuerUID = DerBitString.GetInstance(tObj, false); + break; + case 8: + subjectUID = DerBitString.GetInstance(tObj, false); + break; + case 9: + extensions = X509Extensions.GetInstance(tObj, false); + break; + default: + throw new ArgumentException("unknown tag: " + tObj.TagNo, "seq"); + } + } + } + + public static CertTemplate GetInstance(object obj) + { + if (obj is CertTemplate) + return (CertTemplate)obj; + + if (obj != null) + return new CertTemplate(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public virtual int Version + { + get { return version.IntValueExact; } + } + + public virtual DerInteger SerialNumber + { + get { return serialNumber; } + } + + public virtual AlgorithmIdentifier SigningAlg + { + get { return signingAlg; } + } + + public virtual X509Name Issuer + { + get { return issuer; } + } + + public virtual OptionalValidity Validity + { + get { return validity; } + } + + public virtual X509Name Subject + { + get { return subject; } + } + + public virtual SubjectPublicKeyInfo PublicKey + { + get { return publicKey; } + } + + public virtual DerBitString IssuerUID + { + get { return issuerUID; } + } + + public virtual DerBitString SubjectUID + { + get { return subjectUID; } + } + + public virtual X509Extensions Extensions + { + get { return extensions; } + } + + /** + *
+         *  CertTemplate ::= SEQUENCE {
+         *      version      [0] Version               OPTIONAL,
+         *      serialNumber [1] INTEGER               OPTIONAL,
+         *      signingAlg   [2] AlgorithmIdentifier   OPTIONAL,
+         *      issuer       [3] Name                  OPTIONAL,
+         *      validity     [4] OptionalValidity      OPTIONAL,
+         *      subject      [5] Name                  OPTIONAL,
+         *      publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,
+         *      issuerUID    [7] UniqueIdentifier      OPTIONAL,
+         *      subjectUID   [8] UniqueIdentifier      OPTIONAL,
+         *      extensions   [9] Extensions            OPTIONAL }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return seq; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs.meta new file mode 100644 index 00000000..1de886d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1121577eb63294944a978be8412f172a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs new file mode 100644 index 00000000..bb4b98df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs @@ -0,0 +1,129 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class CertTemplateBuilder + { + private DerInteger version; + private DerInteger serialNumber; + private AlgorithmIdentifier signingAlg; + private X509Name issuer; + private OptionalValidity validity; + private X509Name subject; + private SubjectPublicKeyInfo publicKey; + private DerBitString issuerUID; + private DerBitString subjectUID; + private X509Extensions extensions; + + /** Sets the X.509 version. Note: for X509v3, use 2 here. */ + public virtual CertTemplateBuilder SetVersion(int ver) + { + version = new DerInteger(ver); + return this; + } + + public virtual CertTemplateBuilder SetSerialNumber(DerInteger ser) + { + serialNumber = ser; + return this; + } + + public virtual CertTemplateBuilder SetSigningAlg(AlgorithmIdentifier aid) + { + signingAlg = aid; + return this; + } + + public virtual CertTemplateBuilder SetIssuer(X509Name name) + { + issuer = name; + return this; + } + + public virtual CertTemplateBuilder SetValidity(OptionalValidity v) + { + validity = v; + return this; + } + + public virtual CertTemplateBuilder SetSubject(X509Name name) + { + subject = name; + return this; + } + + public virtual CertTemplateBuilder SetPublicKey(SubjectPublicKeyInfo spki) + { + publicKey = spki; + return this; + } + + /** Sets the issuer unique ID (deprecated in X.509v3) */ + public virtual CertTemplateBuilder SetIssuerUID(DerBitString uid) + { + issuerUID = uid; + return this; + } + + /** Sets the subject unique ID (deprecated in X.509v3) */ + public virtual CertTemplateBuilder SetSubjectUID(DerBitString uid) + { + subjectUID = uid; + return this; + } + + public virtual CertTemplateBuilder SetExtensions(X509Extensions extens) + { + extensions = extens; + return this; + } + + /** + *
+         *  CertTemplate ::= SEQUENCE {
+         *      version      [0] Version               OPTIONAL,
+         *      serialNumber [1] INTEGER               OPTIONAL,
+         *      signingAlg   [2] AlgorithmIdentifier   OPTIONAL,
+         *      issuer       [3] Name                  OPTIONAL,
+         *      validity     [4] OptionalValidity      OPTIONAL,
+         *      subject      [5] Name                  OPTIONAL,
+         *      publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,
+         *      issuerUID    [7] UniqueIdentifier      OPTIONAL,
+         *      subjectUID   [8] UniqueIdentifier      OPTIONAL,
+         *      extensions   [9] Extensions            OPTIONAL }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public virtual CertTemplate Build() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + AddOptional(v, 0, false, version); + AddOptional(v, 1, false, serialNumber); + AddOptional(v, 2, false, signingAlg); + AddOptional(v, 3, true, issuer); // CHOICE + AddOptional(v, 4, false, validity); + AddOptional(v, 5, true, subject); // CHOICE + AddOptional(v, 6, false, publicKey); + AddOptional(v, 7, false, issuerUID); + AddOptional(v, 8, false, subjectUID); + AddOptional(v, 9, false, extensions); + + return CertTemplate.GetInstance(new DerSequence(v)); + } + + private void AddOptional(Asn1EncodableVector v, int tagNo, bool isExplicit, Asn1Encodable obj) + { + if (obj != null) + { + v.Add(new DerTaggedObject(isExplicit, tagNo, obj)); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs.meta new file mode 100644 index 00000000..99936602 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 68e8dab6aededb04fa4a98f8ba95f225 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CertTemplateBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs new file mode 100644 index 00000000..2de5195b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class Controls + : Asn1Encodable + { + private readonly Asn1Sequence content; + + private Controls(Asn1Sequence seq) + { + content = seq; + } + + public static Controls GetInstance(object obj) + { + if (obj is Controls) + return (Controls)obj; + + if (obj is Asn1Sequence) + return new Controls((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Controls(params AttributeTypeAndValue[] atvs) + { + content = new DerSequence(atvs); + } + + public virtual AttributeTypeAndValue[] ToAttributeTypeAndValueArray() + { + AttributeTypeAndValue[] result = new AttributeTypeAndValue[content.Count]; + for (int i = 0; i != result.Length; ++i) + { + result[i] = AttributeTypeAndValue.GetInstance(content[i]); + } + return result; + } + + /** + *
+         * Controls  ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return content; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs.meta new file mode 100644 index 00000000..f63a6cb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7181c72771f04904580361d17a8472c5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/Controls.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs new file mode 100644 index 00000000..e71f4ac2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public abstract class CrmfObjectIdentifiers + { + public static readonly DerObjectIdentifier id_pkix = new DerObjectIdentifier("1.3.6.1.5.5.7"); + + // arc for Internet X.509 PKI protocols and their components + + public static readonly DerObjectIdentifier id_pkip = id_pkix.Branch("5"); + + public static readonly DerObjectIdentifier id_regCtrl = id_pkip.Branch("1"); + public static readonly DerObjectIdentifier id_regCtrl_regToken = id_regCtrl.Branch("1"); + public static readonly DerObjectIdentifier id_regCtrl_authenticator = id_regCtrl.Branch("2"); + public static readonly DerObjectIdentifier id_regCtrl_pkiPublicationInfo = id_regCtrl.Branch("3"); + public static readonly DerObjectIdentifier id_regCtrl_pkiArchiveOptions = id_regCtrl.Branch("4"); + + public static readonly DerObjectIdentifier id_ct_encKeyWithID = new DerObjectIdentifier(PkcsObjectIdentifiers.IdCT + ".21"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs.meta new file mode 100644 index 00000000..f1a2c758 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4012dc3c092db046a06a77ad11940ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/CrmfObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs new file mode 100644 index 00000000..74922d8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class EncKeyWithID + : Asn1Encodable + { + private readonly PrivateKeyInfo privKeyInfo; + private readonly Asn1Encodable identifier; + + public static EncKeyWithID GetInstance(object obj) + { + if (obj is EncKeyWithID) + return (EncKeyWithID)obj; + + if (obj != null) + return new EncKeyWithID(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private EncKeyWithID(Asn1Sequence seq) + { + this.privKeyInfo = PrivateKeyInfo.GetInstance(seq[0]); + + if (seq.Count > 1) + { + if (!(seq[1] is DerUtf8String)) + { + this.identifier = GeneralName.GetInstance(seq[1]); + } + else + { + this.identifier = (Asn1Encodable)seq[1]; + } + } + else + { + this.identifier = null; + } + } + + public EncKeyWithID(PrivateKeyInfo privKeyInfo) + { + this.privKeyInfo = privKeyInfo; + this.identifier = null; + } + + public EncKeyWithID(PrivateKeyInfo privKeyInfo, DerUtf8String str) + { + this.privKeyInfo = privKeyInfo; + this.identifier = str; + } + + public EncKeyWithID(PrivateKeyInfo privKeyInfo, GeneralName generalName) + { + this.privKeyInfo = privKeyInfo; + this.identifier = generalName; + } + + public virtual PrivateKeyInfo PrivateKey + { + get { return privKeyInfo; } + } + + public virtual bool HasIdentifier + { + get { return identifier != null; } + } + + public virtual bool IsIdentifierUtf8String + { + get { return identifier is DerUtf8String; } + } + + public virtual Asn1Encodable Identifier + { + get { return identifier; } + } + + /** + *
+         * EncKeyWithID ::= SEQUENCE {
+         *      privateKey           PrivateKeyInfo,
+         *      identifier CHOICE {
+         *         string               UTF8String,
+         *         generalName          GeneralName
+         *     } OPTIONAL
+         * }
+         * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(privKeyInfo); + v.AddOptional(identifier); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs.meta new file mode 100644 index 00000000..9835d2ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4d9851431fa9fa749b0d380fc86ade10 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncKeyWithID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs new file mode 100644 index 00000000..becfd3b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class EncryptedKey + : Asn1Encodable, IAsn1Choice + { + public static EncryptedKey GetInstance(object obj) + { + if (obj is EncryptedKey encryptedKey) + return encryptedKey; + + if (obj is Asn1TaggedObject taggedObject) + return new EncryptedKey(EnvelopedData.GetInstance(taggedObject, false)); + + return new EncryptedKey(EncryptedValue.GetInstance(obj)); + } + + private readonly EnvelopedData m_envelopedData; + private readonly EncryptedValue m_encryptedValue; + + public EncryptedKey(EnvelopedData envelopedData) + { + m_envelopedData = envelopedData; + } + + public EncryptedKey(EncryptedValue encryptedValue) + { + m_encryptedValue = encryptedValue; + } + + public virtual bool IsEncryptedValue => m_encryptedValue != null; + + public virtual Asn1Encodable Value + { + get + { + if (m_encryptedValue != null) + return m_encryptedValue; + + return m_envelopedData; + } + } + + /** + *
+         *    EncryptedKey ::= CHOICE {
+         *        encryptedValue        EncryptedValue, -- deprecated
+         *        envelopedData     [0] EnvelopedData }
+         *        -- The encrypted private key MUST be placed in the envelopedData
+         *        -- encryptedContentInfo encryptedContent OCTET STRING.
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + if (m_encryptedValue != null) + return m_encryptedValue.ToAsn1Object(); + + return new DerTaggedObject(false, 0, m_envelopedData); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs.meta new file mode 100644 index 00000000..4c82bb1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 987b8baf397675b4b8c1c16838cc119a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs new file mode 100644 index 00000000..3ea0066f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class EncryptedValue + : Asn1Encodable + { + public static EncryptedValue GetInstance(object obj) + { + if (obj is EncryptedValue encryptedValue) + return encryptedValue; + + if (obj != null) + return new EncryptedValue(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly AlgorithmIdentifier m_intendedAlg; + private readonly AlgorithmIdentifier m_symmAlg; + private readonly DerBitString m_encSymmKey; + private readonly AlgorithmIdentifier m_keyAlg; + private readonly Asn1OctetString m_valueHint; + private readonly DerBitString m_encValue; + + private EncryptedValue(Asn1Sequence seq) + { + int index = 0; + while (seq[index] is Asn1TaggedObject tObj) + { + switch (tObj.TagNo) + { + case 0: + m_intendedAlg = AlgorithmIdentifier.GetInstance(tObj, false); + break; + case 1: + m_symmAlg = AlgorithmIdentifier.GetInstance(tObj, false); + break; + case 2: + m_encSymmKey = DerBitString.GetInstance(tObj, false); + break; + case 3: + m_keyAlg = AlgorithmIdentifier.GetInstance(tObj, false); + break; + case 4: + m_valueHint = Asn1OctetString.GetInstance(tObj, false); + break; + } + ++index; + } + + m_encValue = DerBitString.GetInstance(seq[index]); + } + + public EncryptedValue(AlgorithmIdentifier intendedAlg, AlgorithmIdentifier symmAlg, DerBitString encSymmKey, + AlgorithmIdentifier keyAlg, Asn1OctetString valueHint, DerBitString encValue) + { + if (encValue == null) + throw new ArgumentNullException(nameof(encValue)); + + m_intendedAlg = intendedAlg; + m_symmAlg = symmAlg; + m_encSymmKey = encSymmKey; + m_keyAlg = keyAlg; + m_valueHint = valueHint; + m_encValue = encValue; + } + + public virtual AlgorithmIdentifier IntendedAlg => m_intendedAlg; + + public virtual AlgorithmIdentifier SymmAlg => m_symmAlg; + + public virtual DerBitString EncSymmKey => m_encSymmKey; + + public virtual AlgorithmIdentifier KeyAlg => m_keyAlg; + + public virtual Asn1OctetString ValueHint => m_valueHint; + + public virtual DerBitString EncValue => m_encValue; + + /** + *
+         * (IMPLICIT TAGS)
+         * EncryptedValue ::= SEQUENCE {
+         *                     intendedAlg   [0] AlgorithmIdentifier  OPTIONAL,
+         *                     -- the intended algorithm for which the value will be used
+         *                     symmAlg       [1] AlgorithmIdentifier  OPTIONAL,
+         *                     -- the symmetric algorithm used to encrypt the value
+         *                     encSymmKey    [2] BIT STRING           OPTIONAL,
+         *                     -- the (encrypted) symmetric key used to encrypt the value
+         *                     keyAlg        [3] AlgorithmIdentifier  OPTIONAL,
+         *                     -- algorithm used to encrypt the symmetric key
+         *                     valueHint     [4] OCTET STRING         OPTIONAL,
+         *                     -- a brief description or identifier of the encValue content
+         *                     -- (may be meaningful only to the sending entity, and used only
+         *                     -- if EncryptedValue might be re-examined by the sending entity
+         *                     -- in the future)
+         *                     encValue       BIT STRING }
+         *                     -- the encrypted value itself
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, m_intendedAlg); + v.AddOptionalTagged(false, 1, m_symmAlg); + v.AddOptionalTagged(false, 2, m_encSymmKey); + v.AddOptionalTagged(false, 3, m_keyAlg); + v.AddOptionalTagged(false, 4, m_valueHint); + v.Add(m_encValue); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs.meta new file mode 100644 index 00000000..6168f87e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 384131c555e30744da1edefbb044e78e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/EncryptedValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs new file mode 100644 index 00000000..b6c0061f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class OptionalValidity + : Asn1Encodable + { + private readonly Time notBefore; + private readonly Time notAfter; + + private OptionalValidity(Asn1Sequence seq) + { + foreach (Asn1TaggedObject tObj in seq) + { + if (tObj.TagNo == 0) + { + notBefore = Time.GetInstance(tObj, true); + } + else + { + notAfter = Time.GetInstance(tObj, true); + } + } + } + + public static OptionalValidity GetInstance(object obj) + { + if (obj == null || obj is OptionalValidity) + return (OptionalValidity)obj; + + return new OptionalValidity(Asn1Sequence.GetInstance(obj)); + } + + public OptionalValidity(Time notBefore, Time notAfter) + { + this.notBefore = notBefore; + this.notAfter = notAfter; + } + + public virtual Time NotBefore + { + get { return notBefore; } + } + + public virtual Time NotAfter + { + get { return notAfter; } + } + + /** + *
+         * OptionalValidity ::= SEQUENCE {
+         *                        notBefore  [0] Time OPTIONAL,
+         *                        notAfter   [1] Time OPTIONAL } --at least one MUST be present
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, notBefore); + v.AddOptionalTagged(true, 1, notAfter); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs.meta new file mode 100644 index 00000000..c718e3ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1f1791c18ff6755478877daf115e5d74 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/OptionalValidity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs new file mode 100644 index 00000000..b3914155 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class PkiArchiveOptions + : Asn1Encodable, IAsn1Choice + { + public const int encryptedPrivKey = 0; + public const int keyGenParameters = 1; + public const int archiveRemGenPrivKey = 2; + + private readonly Asn1Encodable value; + + public static PkiArchiveOptions GetInstance(object obj) + { + if (obj is PkiArchiveOptions) + return (PkiArchiveOptions)obj; + + if (obj is Asn1TaggedObject) + return new PkiArchiveOptions((Asn1TaggedObject)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private PkiArchiveOptions(Asn1TaggedObject tagged) + { + switch (tagged.TagNo) + { + case encryptedPrivKey: + value = EncryptedKey.GetInstance(tagged.GetObject()); + break; + case keyGenParameters: + value = Asn1OctetString.GetInstance(tagged, false); + break; + case archiveRemGenPrivKey: + value = DerBoolean.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("unknown tag number: " + tagged.TagNo, "tagged"); + } + } + + public PkiArchiveOptions(EncryptedKey encKey) + { + this.value = encKey; + } + + public PkiArchiveOptions(Asn1OctetString keyGenParameters) + { + this.value = keyGenParameters; + } + + public PkiArchiveOptions(bool archiveRemGenPrivKey) + { + this.value = DerBoolean.GetInstance(archiveRemGenPrivKey); + } + + public virtual int Type + { + get + { + if (value is EncryptedKey) + return encryptedPrivKey; + + if (value is Asn1OctetString) + return keyGenParameters; + + return archiveRemGenPrivKey; + } + } + + public virtual Asn1Encodable Value + { + get { return value; } + } + + /** + *
+         *  PkiArchiveOptions ::= CHOICE {
+         *      encryptedPrivKey     [0] EncryptedKey,
+         *      -- the actual value of the private key
+         *      keyGenParameters     [1] KeyGenParameters,
+         *      -- parameters which allow the private key to be re-generated
+         *      archiveRemGenPrivKey [2] BOOLEAN }
+         *      -- set to TRUE if sender wishes receiver to archive the private
+         *      -- key of a key pair that the receiver generates in response to
+         *      -- this request; set to FALSE if no archival is desired.
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + if (value is EncryptedKey) + { + return new DerTaggedObject(true, encryptedPrivKey, value); // choice + } + + if (value is Asn1OctetString) + { + return new DerTaggedObject(false, keyGenParameters, value); + } + + return new DerTaggedObject(false, archiveRemGenPrivKey, value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs.meta new file mode 100644 index 00000000..4fe7c029 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb54bc848ddbe7142a167523c41379b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIArchiveOptions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs new file mode 100644 index 00000000..7803fdf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + /** + *
+     * PKIPublicationInfo ::= SEQUENCE {
+     *                  action     INTEGER {
+     *                                 dontPublish (0),
+     *                                 pleasePublish (1) },
+     *                  pubInfos  SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
+     * -- pubInfos MUST NOT be present if action is "dontPublish"
+     * -- (if action is "pleasePublish" and pubInfos is omitted,
+     * -- "dontCare" is assumed)
+     * 
+ */ + public class PkiPublicationInfo + : Asn1Encodable + { + public static readonly DerInteger DontPublish = new DerInteger(0); + public static readonly DerInteger PleasePublish = new DerInteger(1); + + public static PkiPublicationInfo GetInstance(object obj) + { + if (obj is PkiPublicationInfo pkiPublicationInfo) + return pkiPublicationInfo; + + if (obj != null) + return new PkiPublicationInfo(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private readonly DerInteger m_action; + private readonly Asn1Sequence m_pubInfos; + + private PkiPublicationInfo(Asn1Sequence seq) + { + m_action = DerInteger.GetInstance(seq[0]); + if (seq.Count > 1) + { + m_pubInfos = Asn1Sequence.GetInstance(seq[1]); + } + } + + public PkiPublicationInfo(BigInteger action) + : this(new DerInteger(action)) + { + } + + public PkiPublicationInfo(DerInteger action) + { + m_action = action; + } + + /** + * Constructor with a single pubInfo, assumes pleasePublish as the action. + * + * @param pubInfo the pubInfo to be published (can be null if don't care is required). + */ + public PkiPublicationInfo(SinglePubInfo pubInfo) + : this(pubInfo != null ? new SinglePubInfo[1]{ pubInfo } : null) + { + } + + /** + * Constructor with multiple pubInfo, assumes pleasePublish as the action. + * + * @param pubInfos the pubInfos to be published (can be null if don't care is required). + */ + public PkiPublicationInfo(SinglePubInfo[] pubInfos) + { + m_action = PleasePublish; + + if (pubInfos != null) + { + m_pubInfos = new DerSequence(pubInfos); + } + } + + public virtual DerInteger Action => m_action; + + public virtual SinglePubInfo[] GetPubInfos() + { + if (m_pubInfos == null) + return null; + + return m_pubInfos.MapElements(SinglePubInfo.GetInstance); + } + + /** + *
+         * PkiPublicationInfo ::= SEQUENCE {
+         *                  action     INTEGER {
+         *                                 dontPublish (0),
+         *                                 pleasePublish (1) },
+         *                  pubInfos  SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
+         * -- pubInfos MUST NOT be present if action is "dontPublish"
+         * -- (if action is "pleasePublish" and pubInfos is omitted,
+         * -- "dontCare" is assumed)
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + if (m_pubInfos == null) + return new DerSequence(m_action); + + return new DerSequence(m_action, m_pubInfos); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs.meta new file mode 100644 index 00000000..46e2b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b092b0381196e13428b372cefd759e9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKIPublicationInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs new file mode 100644 index 00000000..6b5646e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + /** + * Password-based MAC value for use with POPOSigningKeyInput. + */ + public class PKMacValue + : Asn1Encodable + { + private readonly AlgorithmIdentifier algID; + private readonly DerBitString macValue; + + private PKMacValue(Asn1Sequence seq) + { + this.algID = AlgorithmIdentifier.GetInstance(seq[0]); + this.macValue = DerBitString.GetInstance(seq[1]); + } + + public static PKMacValue GetInstance(object obj) + { + if (obj is PKMacValue) + return (PKMacValue)obj; + + if (obj is Asn1Sequence) + return new PKMacValue((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static PKMacValue GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * Creates a new PKMACValue. + * @param params parameters for password-based MAC + * @param value MAC of the DER-encoded SubjectPublicKeyInfo + */ + public PKMacValue( + PbmParameter pbmParams, + DerBitString macValue) + : this(new AlgorithmIdentifier(CmpObjectIdentifiers.passwordBasedMac, pbmParams), macValue) + { + } + + /** + * Creates a new PKMACValue. + * @param aid CMPObjectIdentifiers.passwordBasedMAC, with PBMParameter + * @param value MAC of the DER-encoded SubjectPublicKeyInfo + */ + public PKMacValue( + AlgorithmIdentifier algID, + DerBitString macValue) + { + this.algID = algID; + this.macValue = macValue; + } + + public virtual AlgorithmIdentifier AlgID + { + get { return algID; } + } + + public virtual DerBitString MacValue + { + get { return macValue; } + } + + /** + *
+         * PKMACValue ::= SEQUENCE {
+         *      algId  AlgorithmIdentifier,
+         *      -- algorithm value shall be PasswordBasedMac 1.2.840.113533.7.66.13
+         *      -- parameter value is PBMParameter
+         *      value  BIT STRING }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(algID, macValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs.meta new file mode 100644 index 00000000..20b09c09 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 95cf0bd85d68cb0439a7cb22a794ecc7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PKMacValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs new file mode 100644 index 00000000..8eece57f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs @@ -0,0 +1,88 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class PopoPrivKey + : Asn1Encodable, IAsn1Choice + { + public const int thisMessage = 0; + public const int subsequentMessage = 1; + public const int dhMAC = 2; + public const int agreeMAC = 3; + public const int encryptedKey = 4; + + private readonly int tagNo; + private readonly Asn1Encodable obj; + + private PopoPrivKey(Asn1TaggedObject obj) + { + this.tagNo = obj.TagNo; + + switch (tagNo) + { + case thisMessage: + this.obj = DerBitString.GetInstance(obj, false); + break; + case subsequentMessage: + this.obj = SubsequentMessage.ValueOf(DerInteger.GetInstance(obj, false).IntValueExact); + break; + case dhMAC: + this.obj = DerBitString.GetInstance(obj, false); + break; + case agreeMAC: + this.obj = PKMacValue.GetInstance(obj, false); + break; + case encryptedKey: + this.obj = EnvelopedData.GetInstance(obj, false); + break; + default: + throw new ArgumentException("unknown tag in PopoPrivKey", "obj"); + } + } + + public static PopoPrivKey GetInstance(Asn1TaggedObject tagged, bool isExplicit) + { + return new PopoPrivKey(Asn1TaggedObject.GetInstance(tagged, true)); + } + + public PopoPrivKey(SubsequentMessage msg) + { + this.tagNo = subsequentMessage; + this.obj = msg; + } + + public virtual int Type + { + get { return tagNo; } + } + + public virtual Asn1Encodable Value + { + get { return obj; } + } + + /** + *
+         * PopoPrivKey ::= CHOICE {
+         *        thisMessage       [0] BIT STRING,         -- Deprecated
+         *         -- possession is proven in this message (which contains the private
+         *         -- key itself (encrypted for the CA))
+         *        subsequentMessage [1] SubsequentMessage,
+         *         -- possession will be proven in a subsequent message
+         *        dhMAC             [2] BIT STRING,         -- Deprecated
+         *        agreeMAC          [3] PKMACValue,
+         *        encryptedKey      [4] EnvelopedData }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerTaggedObject(false, tagNo, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs.meta new file mode 100644 index 00000000..759e9371 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f28283b87adf8414b8447039f9e98f91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoPrivKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs new file mode 100644 index 00000000..7173cbe5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs @@ -0,0 +1,114 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class PopoSigningKey + : Asn1Encodable + { + private readonly PopoSigningKeyInput poposkInput; + private readonly AlgorithmIdentifier algorithmIdentifier; + private readonly DerBitString signature; + + private PopoSigningKey(Asn1Sequence seq) + { + int index = 0; + + if (seq[index] is Asn1TaggedObject) + { + Asn1TaggedObject tagObj + = (Asn1TaggedObject) seq[index++]; + if (tagObj.TagNo != 0) + { + throw new ArgumentException( "Unknown PopoSigningKeyInput tag: " + tagObj.TagNo, "seq"); + } + poposkInput = PopoSigningKeyInput.GetInstance(tagObj.GetObject()); + } + algorithmIdentifier = AlgorithmIdentifier.GetInstance(seq[index++]); + signature = DerBitString.GetInstance(seq[index]); + } + + public static PopoSigningKey GetInstance(object obj) + { + if (obj is PopoSigningKey) + return (PopoSigningKey)obj; + + if (obj is Asn1Sequence) + return new PopoSigningKey((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static PopoSigningKey GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * Creates a new Proof of Possession object for a signing key. + * @param poposkIn the PopoSigningKeyInput structure, or null if the + * CertTemplate includes both subject and publicKey values. + * @param aid the AlgorithmIdentifier used to sign the proof of possession. + * @param signature a signature over the DER-encoded value of poposkIn, + * or the DER-encoded value of certReq if poposkIn is null. + */ + public PopoSigningKey( + PopoSigningKeyInput poposkIn, + AlgorithmIdentifier aid, + DerBitString signature) + { + this.poposkInput = poposkIn; + this.algorithmIdentifier = aid; + this.signature = signature; + } + + public virtual PopoSigningKeyInput PoposkInput + { + get { return poposkInput; } + } + + public virtual AlgorithmIdentifier AlgorithmIdentifier + { + get { return algorithmIdentifier; } + } + + public virtual DerBitString Signature + { + get { return signature; } + } + + /** + *
+         * PopoSigningKey ::= SEQUENCE {
+         *                      poposkInput           [0] PopoSigningKeyInput OPTIONAL,
+         *                      algorithmIdentifier   AlgorithmIdentifier,
+         *                      signature             BIT STRING }
+         *  -- The signature (using "algorithmIdentifier") is on the
+         *  -- DER-encoded value of poposkInput.  NOTE: If the CertReqMsg
+         *  -- certReq CertTemplate contains the subject and publicKey values,
+         *  -- then poposkInput MUST be omitted and the signature MUST be
+         *  -- computed on the DER-encoded value of CertReqMsg certReq.  If
+         *  -- the CertReqMsg certReq CertTemplate does not contain the public
+         *  -- key and subject values, then poposkInput MUST be present and
+         *  -- MUST be signed.  This strategy ensures that the public key is
+         *  -- not present in both the poposkInput and CertReqMsg certReq
+         *  -- CertTemplate fields.
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, poposkInput); + v.Add(algorithmIdentifier); + v.Add(signature); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs.meta new file mode 100644 index 00000000..221978e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6208fd84c2584df449899d3bba939bd9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs new file mode 100644 index 00000000..3928a52f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs @@ -0,0 +1,120 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class PopoSigningKeyInput + : Asn1Encodable + { + private readonly GeneralName sender; + private readonly PKMacValue publicKeyMac; + private readonly SubjectPublicKeyInfo publicKey; + + private PopoSigningKeyInput(Asn1Sequence seq) + { + Asn1Encodable authInfo = (Asn1Encodable)seq[0]; + + if (authInfo is Asn1TaggedObject) + { + Asn1TaggedObject tagObj = (Asn1TaggedObject)authInfo; + if (tagObj.TagNo != 0) + { + throw new ArgumentException("Unknown authInfo tag: " + tagObj.TagNo, "seq"); + } + sender = GeneralName.GetInstance(tagObj.GetObject()); + } + else + { + publicKeyMac = PKMacValue.GetInstance(authInfo); + } + + publicKey = SubjectPublicKeyInfo.GetInstance(seq[1]); + } + + public static PopoSigningKeyInput GetInstance(object obj) + { + if (obj is PopoSigningKeyInput) + return (PopoSigningKeyInput)obj; + + if (obj is Asn1Sequence) + return new PopoSigningKeyInput((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** Creates a new PopoSigningKeyInput with sender name as authInfo. */ + public PopoSigningKeyInput( + GeneralName sender, + SubjectPublicKeyInfo spki) + { + this.sender = sender; + this.publicKey = spki; + } + + /** Creates a new PopoSigningKeyInput using password-based MAC. */ + public PopoSigningKeyInput( + PKMacValue pkmac, + SubjectPublicKeyInfo spki) + { + this.publicKeyMac = pkmac; + this.publicKey = spki; + } + + /** Returns the sender field, or null if authInfo is publicKeyMac */ + public virtual GeneralName Sender + { + get { return sender; } + } + + /** Returns the publicKeyMac field, or null if authInfo is sender */ + public virtual PKMacValue PublicKeyMac + { + get { return publicKeyMac; } + } + + public virtual SubjectPublicKeyInfo PublicKey + { + get { return publicKey; } + } + + /** + *
+         * PopoSigningKeyInput ::= SEQUENCE {
+         *        authInfo             CHOICE {
+         *                                 sender              [0] GeneralName,
+         *                                 -- used only if an authenticated identity has been
+         *                                 -- established for the sender (e.g., a DN from a
+         *                                 -- previously-issued and currently-valid certificate
+         *                                 publicKeyMac        PKMacValue },
+         *                                 -- used if no authenticated GeneralName currently exists for
+         *                                 -- the sender; publicKeyMac contains a password-based MAC
+         *                                 -- on the DER-encoded value of publicKey
+         *        publicKey           SubjectPublicKeyInfo }  -- from CertTemplate
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (sender != null) + { + v.Add(new DerTaggedObject(false, 0, sender)); + } + else + { + v.Add(publicKeyMac); + } + + v.Add(publicKey); + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs.meta new file mode 100644 index 00000000..21dce2dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2412d787b4f435545abff0826e0c9e4d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/PopoSigningKeyInput.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs new file mode 100644 index 00000000..1856c256 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class ProofOfPossession + : Asn1Encodable, IAsn1Choice + { + public const int TYPE_RA_VERIFIED = 0; + public const int TYPE_SIGNING_KEY = 1; + public const int TYPE_KEY_ENCIPHERMENT = 2; + public const int TYPE_KEY_AGREEMENT = 3; + + private readonly int tagNo; + private readonly Asn1Encodable obj; + + private ProofOfPossession(Asn1TaggedObject tagged) + { + tagNo = tagged.TagNo; + switch (tagNo) + { + case 0: + obj = DerNull.Instance; + break; + case 1: + obj = PopoSigningKey.GetInstance(tagged, false); + break; + case 2: + case 3: + obj = PopoPrivKey.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("unknown tag: " + tagNo, "tagged"); + } + } + + public static ProofOfPossession GetInstance(object obj) + { + if (obj is ProofOfPossession) + return (ProofOfPossession)obj; + + if (obj is Asn1TaggedObject) + return new ProofOfPossession((Asn1TaggedObject)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** Creates a ProofOfPossession with type raVerified. */ + public ProofOfPossession() + { + tagNo = TYPE_RA_VERIFIED; + obj = DerNull.Instance; + } + + /** Creates a ProofOfPossession for a signing key. */ + public ProofOfPossession(PopoSigningKey Poposk) + { + tagNo = TYPE_SIGNING_KEY; + obj = Poposk; + } + + /** + * Creates a ProofOfPossession for key encipherment or agreement. + * @param type one of TYPE_KEY_ENCIPHERMENT or TYPE_KEY_AGREEMENT + */ + public ProofOfPossession(int type, PopoPrivKey privkey) + { + tagNo = type; + obj = privkey; + } + + public virtual int Type + { + get { return tagNo; } + } + + public virtual Asn1Encodable Object + { + get { return obj; } + } + + /** + *
+         * ProofOfPossession ::= CHOICE {
+         *                           raVerified        [0] NULL,
+         *                           -- used if the RA has already verified that the requester is in
+         *                           -- possession of the private key
+         *                           signature         [1] PopoSigningKey,
+         *                           keyEncipherment   [2] PopoPrivKey,
+         *                           keyAgreement      [3] PopoPrivKey }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerTaggedObject(false, tagNo, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs.meta new file mode 100644 index 00000000..bd0bd0c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7ca0880911f99c44b8163c48da74263 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/ProofOfPossession.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs new file mode 100644 index 00000000..6df3320f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class SinglePubInfo + : Asn1Encodable + { + private readonly DerInteger pubMethod; + private readonly GeneralName pubLocation; + + private SinglePubInfo(Asn1Sequence seq) + { + pubMethod = DerInteger.GetInstance(seq[0]); + + if (seq.Count == 2) + { + pubLocation = GeneralName.GetInstance(seq[1]); + } + } + + public static SinglePubInfo GetInstance(object obj) + { + if (obj is SinglePubInfo) + return (SinglePubInfo)obj; + + if (obj is Asn1Sequence) + return new SinglePubInfo((Asn1Sequence)obj); + + throw new ArgumentException("Invalid object: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public virtual GeneralName PubLocation + { + get { return pubLocation; } + } + + /** + *
+         * SinglePubInfo ::= SEQUENCE {
+         *        pubMethod    INTEGER {
+         *           dontCare    (0),
+         *           x500        (1),
+         *           web         (2),
+         *           ldap        (3) },
+         *       pubLocation  GeneralName OPTIONAL }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(pubMethod); + v.AddOptional(pubLocation); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs.meta new file mode 100644 index 00000000..53ce7839 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 645932d2306ef97438653d481b2e9963 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SinglePubInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs new file mode 100644 index 00000000..2653c54f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf +{ + public class SubsequentMessage + : DerInteger + { + public static readonly SubsequentMessage encrCert = new SubsequentMessage(0); + public static readonly SubsequentMessage challengeResp = new SubsequentMessage(1); + + private SubsequentMessage(int value) + : base(value) + { + } + + public static SubsequentMessage ValueOf(int value) + { + if (value == 0) + return encrCert; + + if (value == 1) + return challengeResp; + + throw new ArgumentException("unknown value: " + value, "value"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs.meta new file mode 100644 index 00000000..c11809fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6c948121986aaf45bede1acf7e93383 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/crmf/SubsequentMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib.meta new file mode 100644 index 00000000..2b4c1a7d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 05b02271c8391bb4fb3676049ca35cc5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs new file mode 100644 index 00000000..a4b828b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cryptlib +{ + internal class CryptlibObjectIdentifiers + { + internal static readonly DerObjectIdentifier cryptlib = new DerObjectIdentifier("1.3.6.1.4.1.3029"); + + internal static readonly DerObjectIdentifier ecc = cryptlib.Branch("1.5"); + + internal static readonly DerObjectIdentifier curvey25519 = ecc.Branch("1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs.meta new file mode 100644 index 00000000..d8bf2090 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0adc39be45fadbd459b78552e8e7e16a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptlib/CryptlibObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro.meta new file mode 100644 index 00000000..0afddef8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6bba8ac3161358f4d85bd886d90e08b3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs new file mode 100644 index 00000000..cd4d3bff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + public abstract class CryptoProObjectIdentifiers + { + // GOST Algorithms OBJECT IDENTIFIERS : + // { iso(1) member-body(2) ru(643) rans(2) cryptopro(2)} + public const string GostID = "1.2.643.2.2"; + + public static readonly DerObjectIdentifier GostR3411 = new DerObjectIdentifier(GostID + ".9"); + public static readonly DerObjectIdentifier GostR3411Hmac = new DerObjectIdentifier(GostID + ".10"); + + public static readonly DerObjectIdentifier GostR28147Gcfb = new DerObjectIdentifier(GostID + ".21"); + + public static readonly DerObjectIdentifier GostR28147Cbc = GostR28147Gcfb; + + public static readonly DerObjectIdentifier ID_Gost28147_89_CryptoPro_A_ParamSet = new DerObjectIdentifier(GostID + ".31.1"); + + public static readonly DerObjectIdentifier GostR3410x94 = new DerObjectIdentifier(GostID + ".20"); + public static readonly DerObjectIdentifier GostR3410x2001 = new DerObjectIdentifier(GostID + ".19"); + public static readonly DerObjectIdentifier GostR3411x94WithGostR3410x94 = new DerObjectIdentifier(GostID + ".4"); + public static readonly DerObjectIdentifier GostR3411x94WithGostR3410x2001 = new DerObjectIdentifier(GostID + ".3"); + + // { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) hashes(30) } + public static readonly DerObjectIdentifier GostR3411x94CryptoProParamSet = new DerObjectIdentifier(GostID + ".30.1"); + + // { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) signs(32) } + public static readonly DerObjectIdentifier GostR3410x94CryptoProA = new DerObjectIdentifier(GostID + ".32.2"); + public static readonly DerObjectIdentifier GostR3410x94CryptoProB = new DerObjectIdentifier(GostID + ".32.3"); + public static readonly DerObjectIdentifier GostR3410x94CryptoProC = new DerObjectIdentifier(GostID + ".32.4"); + public static readonly DerObjectIdentifier GostR3410x94CryptoProD = new DerObjectIdentifier(GostID + ".32.5"); + + // { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) exchanges(33) } + public static readonly DerObjectIdentifier GostR3410x94CryptoProXchA = new DerObjectIdentifier(GostID + ".33.1"); + public static readonly DerObjectIdentifier GostR3410x94CryptoProXchB = new DerObjectIdentifier(GostID + ".33.2"); + public static readonly DerObjectIdentifier GostR3410x94CryptoProXchC = new DerObjectIdentifier(GostID + ".33.3"); + + //{ iso(1) member-body(2)ru(643) rans(2) cryptopro(2) ecc-signs(35) } + public static readonly DerObjectIdentifier GostR3410x2001CryptoProA = new DerObjectIdentifier(GostID + ".35.1"); + public static readonly DerObjectIdentifier GostR3410x2001CryptoProB = new DerObjectIdentifier(GostID + ".35.2"); + public static readonly DerObjectIdentifier GostR3410x2001CryptoProC = new DerObjectIdentifier(GostID + ".35.3"); + + // { iso(1) member-body(2) ru(643) rans(2) cryptopro(2) ecc-exchanges(36) } + public static readonly DerObjectIdentifier GostR3410x2001CryptoProXchA = new DerObjectIdentifier(GostID + ".36.0"); + public static readonly DerObjectIdentifier GostR3410x2001CryptoProXchB = new DerObjectIdentifier(GostID + ".36.1"); + + public static readonly DerObjectIdentifier GostElSgDH3410Default = new DerObjectIdentifier(GostID + ".36.0"); + public static readonly DerObjectIdentifier GostElSgDH3410x1 = new DerObjectIdentifier(GostID + ".36.1"); + + public static readonly DerObjectIdentifier GostR3410x2001CryptoProESDH = new DerObjectIdentifier(GostID + ".96"); + + public static readonly DerObjectIdentifier GostR3410x2001DH = new DerObjectIdentifier(GostID + ".98"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs.meta new file mode 100644 index 00000000..08554054 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c23ba903641042c4f91e1e06f872e1c5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/CryptoProObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs new file mode 100644 index 00000000..2953f501 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs @@ -0,0 +1,399 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + /// Elliptic curve registry for GOST 3410-2001 / 2012. + public static class ECGost3410NamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, BigInteger x, BigInteger y) + { + ECPoint G = curve.CreatePoint(x, y); + WNafUtilities.ConfigureBasepoint(G); + return new X9ECPoint(G, false); + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class Holder_gostR3410_2001_CryptoPro_A + : X9ECParametersHolder + { + private Holder_gostR3410_2001_CryptoPro_A() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_gostR3410_2001_CryptoPro_A(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD97"); + BigInteger mod_q = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF6C611070995AD10045841B09B761B893"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD94"), + FromHex("A6"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.One, + FromHex("8D91E471E0989CDA27DF505A453F2B7635294F2DDF23E3B122ACC99C9E9F1E14")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_gostR3410_2001_CryptoPro_B + : X9ECParametersHolder + { + private Holder_gostR3410_2001_CryptoPro_B() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_gostR3410_2001_CryptoPro_B(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("8000000000000000000000000000000000000000000000000000000000000C99"); + BigInteger mod_q = FromHex("800000000000000000000000000000015F700CFFF1A624E5E497161BCC8A198F"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("8000000000000000000000000000000000000000000000000000000000000C96"), + FromHex("3E1AF419A269A5F866A7D3C25C3DF80AE979259373FF2B182F49D4CE7E1BBC8B"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.One, + FromHex("3FA8124359F96680B83D1C3EB2C070E5C545C9858D03ECFB744BF8D717717EFC")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_gostR3410_2001_CryptoPro_C + : X9ECParametersHolder + { + private Holder_gostR3410_2001_CryptoPro_C() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_gostR3410_2001_CryptoPro_C(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D759B"); + BigInteger mod_q = FromHex("9B9F605F5A858107AB1EC85E6B41C8AA582CA3511EDDFB74F02F3A6598980BB9"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D7598"), + FromHex("805A"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.Zero, + FromHex("41ECE55743711A8C3CBF3783CD08C0EE4D4DC440D4641A8F366E550DFDB3BB67")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_gostR3410_2001_CryptoPro_XchB + : X9ECParametersHolder + { + private Holder_gostR3410_2001_CryptoPro_XchB() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_gostR3410_2001_CryptoPro_XchB(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D759B"); + BigInteger mod_q = FromHex("9B9F605F5A858107AB1EC85E6B41C8AA582CA3511EDDFB74F02F3A6598980BB9"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("9B9F605F5A858107AB1EC85E6B41C8AACF846E86789051D37998F7B9022D7598"), + FromHex("805A"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.Zero, + FromHex("41ECE55743711A8C3CBF3783CD08C0EE4D4DC440D4641A8F366E550DFDB3BB67")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_id_tc26_gost_3410_12_256_paramSetA + : X9ECParametersHolder + { + private Holder_id_tc26_gost_3410_12_256_paramSetA() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_id_tc26_gost_3410_12_256_paramSetA(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD97"); + BigInteger mod_q = FromHex("400000000000000000000000000000000FD8CDDFC87B6635C115AF556C360C67"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("C2173F1513981673AF4892C23035A27CE25E2013BF95AA33B22C656F277E7335"), + FromHex("295F9BAE7428ED9CCC20E7C359A9D41A22FCCD9108E17BF7BA9337A6F8AE9513"), + mod_q, BigInteger.Four, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + FromHex("91E38443A5E82C0D880923425712B2BB658B9196932E02C78B2582FE742DAA28"), + FromHex("32879423AB1A0375895786C4BB46E9565FDE0B5344766740AF268ADB32322E5C")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_id_tc26_gost_3410_12_512_paramSetA + : X9ECParametersHolder + { + private Holder_id_tc26_gost_3410_12_512_paramSetA() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_id_tc26_gost_3410_12_512_paramSetA(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC7"); + BigInteger mod_q = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF27E69532F48D89116FF22B8D4E0560609B4B38ABFAD2B85DCACDB1411F10B275"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC4"), + FromHex("E8C2505DEDFC86DDC1BD0B2B6667F1DA34B82574761CB0E879BD081CFD0B6265EE3CB090F30D27614CB4574010DA90DD862EF9D4EBEE4761503190785A71C760"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.Three, + FromHex("7503CFE87A836AE3A61B8816E25450E6CE5E1C93ACF1ABC1778064FDCBEFA921DF1626BE4FD036E93D75E6A50E3A41E98028FE5FC235F5B889A589CB5215F2A4")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_id_tc26_gost_3410_12_512_paramSetB + : X9ECParametersHolder + { + private Holder_id_tc26_gost_3410_12_512_paramSetB() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_id_tc26_gost_3410_12_512_paramSetB(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006F"); + BigInteger mod_q = FromHex("800000000000000000000000000000000000000000000000000000000000000149A1EC142565A545ACFDB77BD9D40CFA8B996712101BEA0EC6346C54374F25BD"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006C"), + FromHex("687D1B459DC841457E3E06CF6F5E2517B97C7D614AF138BCBF85DC806C4B289F3E965D2DB1416D217F8B276FAD1AB69C50F78BEE1FA3106EFB8CCBC7C5140116"), + mod_q, BigInteger.One, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + BigInteger.Two, + FromHex("1A8F7EDA389B094C2C071E3647A8940F3C123B697578C213BE6DD9E6C8EC7335DCB228FD1EDF4A39152CBCAAF8C0398828041055F94CEEEC7E21340780FE41BD")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class Holder_id_tc26_gost_3410_12_512_paramSetC + : X9ECParametersHolder + { + private Holder_id_tc26_gost_3410_12_512_paramSetC() {} + + internal static readonly X9ECParametersHolder Instance = new Holder_id_tc26_gost_3410_12_512_paramSetC(); + + protected override ECCurve CreateCurve() + { + BigInteger mod_p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFDC7"); + BigInteger mod_q = FromHex("3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC98CDBA46506AB004C33A9FF5147502CC8EDA9E7A769A12694623CEF47F023ED"); + + return ConfigureCurve(new FpCurve( + mod_p, + FromHex("DC9203E514A721875485A529D2C722FB187BC8980EB866644DE41C68E143064546E861C0E2C9EDD92ADE71F46FCF50FF2AD97F951FDA9F2A2EB6546F39689BD3"), + FromHex("B4C4EE28CEBC6C2C8AC12952CF37F16AC7EFB6A9F69F4B57FFDA2E4F0DE5ADE038CBC2FFF719D2C18DE0284B8BFEF3B52B8CC7A5F5BF0A3C8D2319A5312557E1"), + mod_q, BigInteger.Four, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + FromHex("E2E31EDFC23DE7BDEBE241CE593EF5DE2295B7A9CBAEF021D385F7074CEA043AA27272A7AE602BF2A7B9033DB9ED3610C6FB85487EAE97AAC5BC7928C1950148"), + FromHex("F5CE40D95B5EB899ABBCCFF5911CB8577939804D6527378B8C108C3D2090FF9BE18E2D33E3021ED2EF32D85822423B6304F726AA854BAE07D0396E9A9ADDC40F")); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static ECGost3410NamedCurves() + { + DefineCurve("GostR3410-2001-CryptoPro-A", + CryptoProObjectIdentifiers.GostR3410x2001CryptoProA, + Holder_gostR3410_2001_CryptoPro_A.Instance); + DefineCurve("GostR3410-2001-CryptoPro-B", + CryptoProObjectIdentifiers.GostR3410x2001CryptoProB, + Holder_gostR3410_2001_CryptoPro_B.Instance); + DefineCurve("GostR3410-2001-CryptoPro-C", + CryptoProObjectIdentifiers.GostR3410x2001CryptoProC, + Holder_gostR3410_2001_CryptoPro_C.Instance); + DefineCurve("GostR3410-2001-CryptoPro-XchA", + CryptoProObjectIdentifiers.GostR3410x2001CryptoProXchA, + Holder_gostR3410_2001_CryptoPro_A.Instance); + DefineCurve("GostR3410-2001-CryptoPro-XchB", + CryptoProObjectIdentifiers.GostR3410x2001CryptoProXchB, + Holder_gostR3410_2001_CryptoPro_XchB.Instance); + DefineCurve("Tc26-Gost-3410-12-256-paramSetA", + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256_paramSetA, + Holder_id_tc26_gost_3410_12_256_paramSetA.Instance); + DefineCurve("Tc26-Gost-3410-12-512-paramSetA", + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512_paramSetA, + Holder_id_tc26_gost_3410_12_512_paramSetA.Instance); + DefineCurve("Tc26-Gost-3410-12-512-paramSetB", + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512_paramSetB, + Holder_id_tc26_gost_3410_12_512_paramSetB.Instance); + DefineCurve("Tc26-Gost-3410-12-512-paramSetC", + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512_paramSetC, + Holder_id_tc26_gost_3410_12_512_paramSetC.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs.meta new file mode 100644 index 00000000..3ed03f7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66d8e5a0881bc6c4496b585b4e8bbc64 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410NamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs new file mode 100644 index 00000000..e0fa6cde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs @@ -0,0 +1,85 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + public class ECGost3410ParamSetParameters + : Asn1Encodable + { + internal readonly DerInteger p, q, a, b, x, y; + + public static ECGost3410ParamSetParameters GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static ECGost3410ParamSetParameters GetInstance(object obj) + { + if (obj == null || obj is ECGost3410ParamSetParameters) + { + return (ECGost3410ParamSetParameters) obj; + } + + if (obj is Asn1Sequence seq) + return new ECGost3410ParamSetParameters(seq); + + throw new ArgumentException("Invalid GOST3410Parameter: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public ECGost3410ParamSetParameters( + BigInteger a, + BigInteger b, + BigInteger p, + BigInteger q, + int x, + BigInteger y) + { + this.a = new DerInteger(a); + this.b = new DerInteger(b); + this.p = new DerInteger(p); + this.q = new DerInteger(q); + this.x = new DerInteger(x); + this.y = new DerInteger(y); + } + + public ECGost3410ParamSetParameters( + Asn1Sequence seq) + { + if (seq.Count != 6) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.a = DerInteger.GetInstance(seq[0]); + this.b = DerInteger.GetInstance(seq[1]); + this.p = DerInteger.GetInstance(seq[2]); + this.q = DerInteger.GetInstance(seq[3]); + this.x = DerInteger.GetInstance(seq[4]); + this.y = DerInteger.GetInstance(seq[5]); + } + + public BigInteger P + { + get { return p.PositiveValue; } + } + + public BigInteger Q + { + get { return q.PositiveValue; } + } + + public BigInteger A + { + get { return a.PositiveValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(a, b, p, q, x, y); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs.meta new file mode 100644 index 00000000..59459a52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dba7ef28019746549ac489da0e382c5e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/ECGOST3410ParamSetParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs new file mode 100644 index 00000000..04316aa6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + public class Gost28147Parameters + : Asn1Encodable + { + private readonly Asn1OctetString iv; + private readonly DerObjectIdentifier paramSet; + + public static Gost28147Parameters GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static Gost28147Parameters GetInstance(object obj) + { + if (obj == null || obj is Gost28147Parameters) + return (Gost28147Parameters) obj; + + if (obj is Asn1Sequence seq) + return new Gost28147Parameters(seq); + + throw new ArgumentException("Invalid GOST3410Parameter: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + private Gost28147Parameters(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.iv = Asn1OctetString.GetInstance(seq[0]); + this.paramSet = DerObjectIdentifier.GetInstance(seq[1]); + } + + /** + *
+         * Gost28147-89-Parameters ::=
+         *               SEQUENCE {
+         *                       iv                   Gost28147-89-IV,
+         *                       encryptionParamSet   OBJECT IDENTIFIER
+         *                }
+         *
+         *   Gost28147-89-IV ::= OCTET STRING (SIZE (8))
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(iv, paramSet); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs.meta new file mode 100644 index 00000000..f1f91b9b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d51ef1fdb3f40e459a78a6810363964 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST28147Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs new file mode 100644 index 00000000..f3dd24cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + /// Registry of available named parameters for GOST 3410-94. + public static class Gost3410NamedParameters + { + private static readonly Gost3410ParamSetParameters cryptoProA = new Gost3410ParamSetParameters( + 1024, + new BigInteger("127021248288932417465907042777176443525787653508916535812817507265705031260985098497423188333483401180925999995120988934130659205614996724254121049274349357074920312769561451689224110579311248812610229678534638401693520013288995000362260684222750813532307004517341633685004541062586971416883686778842537820383"), + new BigInteger("68363196144955700784444165611827252895102170888761442055095051287550314083023"), + new BigInteger("100997906755055304772081815535925224869841082572053457874823515875577147990529272777244152852699298796483356699682842027972896052747173175480590485607134746852141928680912561502802222185647539190902656116367847270145019066794290930185446216399730872221732889830323194097355403213400972588322876850946740663962") + // validationAlgorithm { + // algorithm + // id-GostR3410-94-bBis, + // parameters + // GostR3410-94-ValidationBisParameters: { + // x0 1376285941, + // c 3996757427 + // } + // } + + ); + + private static readonly Gost3410ParamSetParameters cryptoProB = new Gost3410ParamSetParameters( + 1024, + new BigInteger("139454871199115825601409655107690713107041707059928031797758001454375765357722984094124368522288239833039114681648076688236921220737322672160740747771700911134550432053804647694904686120113087816240740184800477047157336662926249423571248823968542221753660143391485680840520336859458494803187341288580489525163"), + new BigInteger("79885141663410976897627118935756323747307951916507639758300472692338873533959"), + new BigInteger("42941826148615804143873447737955502392672345968607143066798112994089471231420027060385216699563848719957657284814898909770759462613437669456364882730370838934791080835932647976778601915343474400961034231316672578686920482194932878633360203384797092684342247621055760235016132614780652761028509445403338652341") + // validationAlgorithm { + // algorithm + // id-GostR3410-94-bBis, + // parameters + // GostR3410-94-ValidationBisParameters: { + // x0 1536654555, + // c 1855361757, + // d 14408629386140014567655 + //4902939282056547857802241461782996702017713059974755104394739915140 + //6115284791024439062735788342744854120601660303926203867703556828005 + //8957203818114895398976594425537561271800850306 + // } + // } + //} + ); + + private static readonly Gost3410ParamSetParameters cryptoProXchA = new Gost3410ParamSetParameters( + 1024, + new BigInteger("142011741597563481196368286022318089743276138395243738762872573441927459393512718973631166078467600360848946623567625795282774719212241929071046134208380636394084512691828894000571524625445295769349356752728956831541775441763139384457191755096847107846595662547942312293338483924514339614727760681880609734239"), + new BigInteger("91771529896554605945588149018382750217296858393520724172743325725474374979801"), + new BigInteger("133531813272720673433859519948319001217942375967847486899482359599369642528734712461590403327731821410328012529253871914788598993103310567744136196364803064721377826656898686468463277710150809401182608770201615324990468332931294920912776241137878030224355746606283971659376426832674269780880061631528163475887") + ); + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary parameters = + new Dictionary(); + + private static void DefineParameters(string name, DerObjectIdentifier oid, + Gost3410ParamSetParameters parameterSet) + { + objIds.Add(name, oid); + parameters.Add(oid, parameterSet); + } + + static Gost3410NamedParameters() + { + DefineParameters("GostR3410-94-CryptoPro-A", CryptoProObjectIdentifiers.GostR3410x94CryptoProA, cryptoProA); + DefineParameters("GostR3410-94-CryptoPro-B", CryptoProObjectIdentifiers.GostR3410x94CryptoProB, cryptoProB); + DefineParameters("GostR3410-94-CryptoPro-XchA", CryptoProObjectIdentifiers.GostR3410x94CryptoProXchA, + cryptoProXchA); + } + + /// Look up the for the parameter set with the given name. + /// + /// The name of the parameter set. + public static Gost3410ParamSetParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up the for the parameter set with the given + /// OID. + /// The OID for the parameter set. + public static Gost3410ParamSetParameters GetByOid(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(parameters, oid); + } + + /// Look up the OID of the parameter set with the given name. + /// + /// The name of the parameter set. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available parameter set names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs.meta new file mode 100644 index 00000000..fdb2d87c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 202baced9e4bc474ea48f92a5dce885a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410NamedParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs new file mode 100644 index 00000000..bf6a9dbf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + public class Gost3410ParamSetParameters + : Asn1Encodable + { + private readonly int keySize; + private readonly DerInteger p, q, a; + + public static Gost3410ParamSetParameters GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static Gost3410ParamSetParameters GetInstance(object obj) + { + if (obj == null || obj is Gost3410ParamSetParameters) + return (Gost3410ParamSetParameters) obj; + + if (obj is Asn1Sequence seq) + return new Gost3410ParamSetParameters(seq); + + throw new ArgumentException("Invalid GOST3410Parameter: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public Gost3410ParamSetParameters( + int keySize, + BigInteger p, + BigInteger q, + BigInteger a) + { + this.keySize = keySize; + this.p = new DerInteger(p); + this.q = new DerInteger(q); + this.a = new DerInteger(a); + } + + private Gost3410ParamSetParameters( + Asn1Sequence seq) + { + if (seq.Count != 4) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.keySize = DerInteger.GetInstance(seq[0]).IntValueExact; + this.p = DerInteger.GetInstance(seq[1]); + this.q = DerInteger.GetInstance(seq[2]); + this.a = DerInteger.GetInstance(seq[3]); + } + + public int KeySize + { + get { return keySize; } + } + + public BigInteger P + { + get { return p.PositiveValue; } + } + + public BigInteger Q + { + get { return q.PositiveValue; } + } + + public BigInteger A + { + get { return a.PositiveValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(new DerInteger(keySize), p, q, a); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs.meta new file mode 100644 index 00000000..6901c0ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 212fae964a87c784cb48c6d34c296562 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410ParamSetParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs new file mode 100644 index 00000000..3ad0ca8c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro +{ + public class Gost3410PublicKeyAlgParameters + : Asn1Encodable + { + private DerObjectIdentifier publicKeyParamSet; + private DerObjectIdentifier digestParamSet; + private DerObjectIdentifier encryptionParamSet; + + public static Gost3410PublicKeyAlgParameters GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(taggedObject, declaredExplicit)); + } + + public static Gost3410PublicKeyAlgParameters GetInstance(object obj) + { + if (obj == null || obj is Gost3410PublicKeyAlgParameters) + return (Gost3410PublicKeyAlgParameters)obj; + + return new Gost3410PublicKeyAlgParameters(Asn1Sequence.GetInstance(obj)); + } + + public Gost3410PublicKeyAlgParameters( + DerObjectIdentifier publicKeyParamSet, + DerObjectIdentifier digestParamSet) + : this (publicKeyParamSet, digestParamSet, null) + { + } + + public Gost3410PublicKeyAlgParameters( + DerObjectIdentifier publicKeyParamSet, + DerObjectIdentifier digestParamSet, + DerObjectIdentifier encryptionParamSet) + { + if (publicKeyParamSet == null) + throw new ArgumentNullException("publicKeyParamSet"); + if (digestParamSet == null) + throw new ArgumentNullException("digestParamSet"); + + this.publicKeyParamSet = publicKeyParamSet; + this.digestParamSet = digestParamSet; + this.encryptionParamSet = encryptionParamSet; + } + + private Gost3410PublicKeyAlgParameters(Asn1Sequence seq) + { + this.publicKeyParamSet = (DerObjectIdentifier) seq[0]; + this.digestParamSet = (DerObjectIdentifier) seq[1]; + + if (seq.Count > 2) + { + this.encryptionParamSet = (DerObjectIdentifier) seq[2]; + } + } + + public DerObjectIdentifier PublicKeyParamSet + { + get { return publicKeyParamSet; } + } + + public DerObjectIdentifier DigestParamSet + { + get { return digestParamSet; } + } + + public DerObjectIdentifier EncryptionParamSet + { + get { return encryptionParamSet; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(publicKeyParamSet, digestParamSet); + v.AddOptional(encryptionParamSet); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs.meta new file mode 100644 index 00000000..8b5297be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 60a88c8a465a350409779ce27c0561aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/cryptopro/GOST3410PublicKeyAlgParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac.meta new file mode 100644 index 00000000..535c9757 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d34df01b25a926f46aec98c6d19537c5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs new file mode 100644 index 00000000..d6d5704a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac +{ + public abstract class EacObjectIdentifiers + { + // bsi-de OBJECT IDENTIFIER ::= { + // itu-t(0) identified-organization(4) etsi(0) + // reserved(127) etsi-identified-organization(0) 7 + // } + public static readonly DerObjectIdentifier bsi_de = new DerObjectIdentifier("0.4.0.127.0.7"); + + // id-PK OBJECT IDENTIFIER ::= { + // bsi-de protocols(2) smartcard(2) 1 + // } + public static readonly DerObjectIdentifier id_PK = new DerObjectIdentifier(bsi_de + ".2.2.1"); + + public static readonly DerObjectIdentifier id_PK_DH = new DerObjectIdentifier(id_PK + ".1"); + public static readonly DerObjectIdentifier id_PK_ECDH = new DerObjectIdentifier(id_PK + ".2"); + + // id-CA OBJECT IDENTIFIER ::= { + // bsi-de protocols(2) smartcard(2) 3 + // } + public static readonly DerObjectIdentifier id_CA = new DerObjectIdentifier(bsi_de + ".2.2.3"); + public static readonly DerObjectIdentifier id_CA_DH = new DerObjectIdentifier(id_CA + ".1"); + public static readonly DerObjectIdentifier id_CA_DH_3DES_CBC_CBC = new DerObjectIdentifier(id_CA_DH + ".1"); + public static readonly DerObjectIdentifier id_CA_ECDH = new DerObjectIdentifier(id_CA + ".2"); + public static readonly DerObjectIdentifier id_CA_ECDH_3DES_CBC_CBC = new DerObjectIdentifier(id_CA_ECDH + ".1"); + + // + // id-TA OBJECT IDENTIFIER ::= { + // bsi-de protocols(2) smartcard(2) 2 + // } + public static readonly DerObjectIdentifier id_TA = new DerObjectIdentifier(bsi_de + ".2.2.2"); + + public static readonly DerObjectIdentifier id_TA_RSA = new DerObjectIdentifier(id_TA + ".1"); + public static readonly DerObjectIdentifier id_TA_RSA_v1_5_SHA_1 = new DerObjectIdentifier(id_TA_RSA + ".1"); + public static readonly DerObjectIdentifier id_TA_RSA_v1_5_SHA_256 = new DerObjectIdentifier(id_TA_RSA + ".2"); + public static readonly DerObjectIdentifier id_TA_RSA_PSS_SHA_1 = new DerObjectIdentifier(id_TA_RSA + ".3"); + public static readonly DerObjectIdentifier id_TA_RSA_PSS_SHA_256 = new DerObjectIdentifier(id_TA_RSA + ".4"); + public static readonly DerObjectIdentifier id_TA_ECDSA = new DerObjectIdentifier(id_TA + ".2"); + public static readonly DerObjectIdentifier id_TA_ECDSA_SHA_1 = new DerObjectIdentifier(id_TA_ECDSA + ".1"); + public static readonly DerObjectIdentifier id_TA_ECDSA_SHA_224 = new DerObjectIdentifier(id_TA_ECDSA + ".2"); + public static readonly DerObjectIdentifier id_TA_ECDSA_SHA_256 = new DerObjectIdentifier(id_TA_ECDSA + ".3"); + public static readonly DerObjectIdentifier id_TA_ECDSA_SHA_384 = new DerObjectIdentifier(id_TA_ECDSA + ".4"); + public static readonly DerObjectIdentifier id_TA_ECDSA_SHA_512 = new DerObjectIdentifier(id_TA_ECDSA + ".5"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs.meta new file mode 100644 index 00000000..c60c65cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 945d93ce3fb494c4db560cdb29a6bbfc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/eac/EACObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec.meta new file mode 100644 index 00000000..da1c4a0e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 50a22b5956cb47f49a13f96ffc28f6f0 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs new file mode 100644 index 00000000..041908f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC +{ + /** + * Edwards Elliptic Curve Object Identifiers (RFC 8410) + */ + public abstract class EdECObjectIdentifiers + { + public static readonly DerObjectIdentifier id_edwards_curve_algs = new DerObjectIdentifier("1.3.101"); + + public static readonly DerObjectIdentifier id_X25519 = id_edwards_curve_algs.Branch("110"); + public static readonly DerObjectIdentifier id_X448 = id_edwards_curve_algs.Branch("111"); + public static readonly DerObjectIdentifier id_Ed25519 = id_edwards_curve_algs.Branch("112"); + public static readonly DerObjectIdentifier id_Ed448 = id_edwards_curve_algs.Branch("113"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs.meta new file mode 100644 index 00000000..d93a1507 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5843a33e617f6d74f9aaa607ac291eb4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/edec/EdECObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf.meta new file mode 100644 index 00000000..fb1d61ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3ed857771f04d4447bd106c2150bf750 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs new file mode 100644 index 00000000..2d519f0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.3.1 Certificate Values Attribute Definition + /// + /// CertificateValues ::= SEQUENCE OF Certificate + /// + /// + public class CertificateValues + : Asn1Encodable + { + private readonly Asn1Sequence certificates; + + public static CertificateValues GetInstance( + object obj) + { + if (obj == null || obj is CertificateValues) + return (CertificateValues) obj; + + if (obj is Asn1Sequence) + return new CertificateValues((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CertificateValues' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CertificateValues( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + + foreach (Asn1Encodable ae in seq) + { + X509CertificateStructure.GetInstance(ae.ToAsn1Object()); + } + + this.certificates = seq; + } + + public CertificateValues( + params X509CertificateStructure[] certificates) + { + if (certificates == null) + throw new ArgumentNullException("certificates"); + + this.certificates = new DerSequence(certificates); + } + + public CertificateValues( + IEnumerable certificates) + { + if (certificates == null) + throw new ArgumentNullException("certificates"); + + this.certificates = new DerSequence( + Asn1EncodableVector.FromEnumerable(certificates)); + } + + public X509CertificateStructure[] GetCertificates() + { + X509CertificateStructure[] result = new X509CertificateStructure[certificates.Count]; + for (int i = 0; i < certificates.Count; ++i) + { + result[i] = X509CertificateStructure.GetInstance(certificates[i]); + } + return result; + } + + public override Asn1Object ToAsn1Object() + { + return certificates; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs.meta new file mode 100644 index 00000000..be0e3146 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 092b4648537b98d4b847275b3d4faf9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CertificateValues.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs new file mode 100644 index 00000000..6a7ab430 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + public abstract class CommitmentTypeIdentifier + { + public static readonly DerObjectIdentifier ProofOfOrigin = PkcsObjectIdentifiers.IdCtiEtsProofOfOrigin; + public static readonly DerObjectIdentifier ProofOfReceipt = PkcsObjectIdentifiers.IdCtiEtsProofOfReceipt; + public static readonly DerObjectIdentifier ProofOfDelivery = PkcsObjectIdentifiers.IdCtiEtsProofOfDelivery; + public static readonly DerObjectIdentifier ProofOfSender = PkcsObjectIdentifiers.IdCtiEtsProofOfSender; + public static readonly DerObjectIdentifier ProofOfApproval = PkcsObjectIdentifiers.IdCtiEtsProofOfApproval; + public static readonly DerObjectIdentifier ProofOfCreation = PkcsObjectIdentifiers.IdCtiEtsProofOfCreation; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs.meta new file mode 100644 index 00000000..88702cdb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec3d445a64faf9a4990e3f85b9972b01 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs new file mode 100644 index 00000000..84240e3c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + public class CommitmentTypeIndication + : Asn1Encodable + { + private readonly DerObjectIdentifier commitmentTypeId; + private readonly Asn1Sequence commitmentTypeQualifier; + + public static CommitmentTypeIndication GetInstance( + object obj) + { + if (obj == null || obj is CommitmentTypeIndication) + return (CommitmentTypeIndication) obj; + + if (obj is Asn1Sequence) + return new CommitmentTypeIndication((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CommitmentTypeIndication' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + public CommitmentTypeIndication( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.commitmentTypeId = (DerObjectIdentifier) seq[0].ToAsn1Object(); + + if (seq.Count > 1) + { + this.commitmentTypeQualifier = (Asn1Sequence) seq[1].ToAsn1Object(); + } + } + + public CommitmentTypeIndication( + DerObjectIdentifier commitmentTypeId) + : this(commitmentTypeId, null) + { + } + + public CommitmentTypeIndication( + DerObjectIdentifier commitmentTypeId, + Asn1Sequence commitmentTypeQualifier) + { + if (commitmentTypeId == null) + throw new ArgumentNullException("commitmentTypeId"); + + this.commitmentTypeId = commitmentTypeId; + + if (commitmentTypeQualifier != null) + { + this.commitmentTypeQualifier = commitmentTypeQualifier; + } + } + + public DerObjectIdentifier CommitmentTypeID + { + get { return commitmentTypeId; } + } + + public Asn1Sequence CommitmentTypeQualifier + { + get { return commitmentTypeQualifier; } + } + + /** + *
+        * CommitmentTypeIndication ::= SEQUENCE {
+        *      commitmentTypeId   CommitmentTypeIdentifier,
+        *      commitmentTypeQualifier   SEQUENCE SIZE (1..MAX) OF
+        *              CommitmentTypeQualifier OPTIONAL }
+        * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(commitmentTypeId); + v.AddOptional(commitmentTypeQualifier); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs.meta new file mode 100644 index 00000000..3129efc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2da3d0e0966b8f44dbf55929a796f6bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeIndication.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs new file mode 100644 index 00000000..c55365ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs @@ -0,0 +1,117 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /** + * Commitment type qualifiers, used in the Commitment-Type-Indication attribute (RFC3126). + * + *
+    *   CommitmentTypeQualifier ::= SEQUENCE {
+    *       commitmentTypeIdentifier  CommitmentTypeIdentifier,
+    *       qualifier          ANY DEFINED BY commitmentTypeIdentifier OPTIONAL }
+    * 
+ */ + public class CommitmentTypeQualifier + : Asn1Encodable + { + private readonly DerObjectIdentifier commitmentTypeIdentifier; + private readonly Asn1Object qualifier; + + /** + * Creates a new CommitmentTypeQualifier instance. + * + * @param commitmentTypeIdentifier a CommitmentTypeIdentifier value + */ + public CommitmentTypeQualifier( + DerObjectIdentifier commitmentTypeIdentifier) + : this(commitmentTypeIdentifier, null) + { + } + + /** + * Creates a new CommitmentTypeQualifier instance. + * + * @param commitmentTypeIdentifier a CommitmentTypeIdentifier value + * @param qualifier the qualifier, defined by the above field. + */ + public CommitmentTypeQualifier( + DerObjectIdentifier commitmentTypeIdentifier, + Asn1Encodable qualifier) + { + if (commitmentTypeIdentifier == null) + throw new ArgumentNullException("commitmentTypeIdentifier"); + + this.commitmentTypeIdentifier = commitmentTypeIdentifier; + + if (qualifier != null) + { + this.qualifier = qualifier.ToAsn1Object(); + } + } + + /** + * Creates a new CommitmentTypeQualifier instance. + * + * @param as CommitmentTypeQualifier structure + * encoded as an Asn1Sequence. + */ + public CommitmentTypeQualifier( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + commitmentTypeIdentifier = (DerObjectIdentifier) seq[0].ToAsn1Object(); + + if (seq.Count > 1) + { + qualifier = seq[1].ToAsn1Object(); + } + } + + public static CommitmentTypeQualifier GetInstance( + object obj) + { + if (obj == null || obj is CommitmentTypeQualifier) + return (CommitmentTypeQualifier) obj; + + if (obj is Asn1Sequence) + return new CommitmentTypeQualifier((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CommitmentTypeQualifier' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + public DerObjectIdentifier CommitmentTypeIdentifier + { + get { return commitmentTypeIdentifier; } + } + + public Asn1Object Qualifier + { + get { return qualifier; } + } + + /** + * Returns a DER-encodable representation of this instance. + * + * @return a Asn1Object value + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(commitmentTypeIdentifier); + v.AddOptional(qualifier); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs.meta new file mode 100644 index 00000000..14b28d2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e2eb54d61b3c7e0429e81810ee930b75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CommitmentTypeQualifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs new file mode 100644 index 00000000..46542a25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.1 Complete Certificate Refs Attribute Definition + /// + /// CompleteCertificateRefs ::= SEQUENCE OF OtherCertID + /// + /// + public class CompleteCertificateRefs + : Asn1Encodable + { + private readonly Asn1Sequence otherCertIDs; + + public static CompleteCertificateRefs GetInstance( + object obj) + { + if (obj == null || obj is CompleteCertificateRefs) + return (CompleteCertificateRefs) obj; + + if (obj is Asn1Sequence) + return new CompleteCertificateRefs((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CompleteCertificateRefs' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CompleteCertificateRefs( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + + foreach (Asn1Encodable ae in seq) + { + OtherCertID.GetInstance(ae.ToAsn1Object()); + } + + this.otherCertIDs = seq; + } + + public CompleteCertificateRefs( + params OtherCertID[] otherCertIDs) + { + if (otherCertIDs == null) + throw new ArgumentNullException("otherCertIDs"); + + this.otherCertIDs = new DerSequence(otherCertIDs); + } + + public CompleteCertificateRefs( + IEnumerable otherCertIDs) + { + if (otherCertIDs == null) + throw new ArgumentNullException("otherCertIDs"); + + this.otherCertIDs = new DerSequence( + Asn1EncodableVector.FromEnumerable(otherCertIDs)); + } + + public OtherCertID[] GetOtherCertIDs() + { + OtherCertID[] result = new OtherCertID[otherCertIDs.Count]; + for (int i = 0; i < otherCertIDs.Count; ++i) + { + result[i] = OtherCertID.GetInstance(otherCertIDs[i].ToAsn1Object()); + } + return result; + } + + public override Asn1Object ToAsn1Object() + { + return otherCertIDs; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs.meta new file mode 100644 index 00000000..52b047a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e47f9b58addc6cb4681cf1609c99d441 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteCertificateRefs.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs new file mode 100644 index 00000000..4f52c124 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// CompleteRevocationRefs ::= SEQUENCE OF CrlOcspRef + /// + /// + public class CompleteRevocationRefs + : Asn1Encodable + { + private readonly Asn1Sequence crlOcspRefs; + + public static CompleteRevocationRefs GetInstance( + object obj) + { + if (obj == null || obj is CompleteRevocationRefs) + return (CompleteRevocationRefs) obj; + + if (obj is Asn1Sequence) + return new CompleteRevocationRefs((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CompleteRevocationRefs' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CompleteRevocationRefs( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + + foreach (Asn1Encodable ae in seq) + { + CrlOcspRef.GetInstance(ae.ToAsn1Object()); + } + + this.crlOcspRefs = seq; + } + + public CompleteRevocationRefs( + params CrlOcspRef[] crlOcspRefs) + { + if (crlOcspRefs == null) + throw new ArgumentNullException("crlOcspRefs"); + + this.crlOcspRefs = new DerSequence(crlOcspRefs); + } + + public CompleteRevocationRefs( + IEnumerable crlOcspRefs) + { + if (crlOcspRefs == null) + throw new ArgumentNullException("crlOcspRefs"); + + this.crlOcspRefs = new DerSequence( + Asn1EncodableVector.FromEnumerable(crlOcspRefs)); + } + + public CrlOcspRef[] GetCrlOcspRefs() + { + CrlOcspRef[] result = new CrlOcspRef[crlOcspRefs.Count]; + for (int i = 0; i < crlOcspRefs.Count; ++i) + { + result[i] = CrlOcspRef.GetInstance(crlOcspRefs[i].ToAsn1Object()); + } + return result; + } + + public override Asn1Object ToAsn1Object() + { + return crlOcspRefs; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs.meta new file mode 100644 index 00000000..306ccc11 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b7f0539207fca804897c87c6a2c1c3e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CompleteRevocationRefs.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs new file mode 100644 index 00000000..55998c95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Reflection; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// CrlIdentifier ::= SEQUENCE + /// { + /// crlissuer Name, + /// crlIssuedTime UTCTime, + /// crlNumber INTEGER OPTIONAL + /// } + /// + /// + public class CrlIdentifier + : Asn1Encodable + { + private readonly X509Name crlIssuer; + private readonly Asn1UtcTime crlIssuedTime; + private readonly DerInteger crlNumber; + + public static CrlIdentifier GetInstance(object obj) + { + if (obj == null) + return null; + + if (obj is CrlIdentifier crlIdentifier) + return crlIdentifier; + + if (obj is Asn1Sequence asn1Sequence) + return new CrlIdentifier(asn1Sequence); + + throw new ArgumentException("Unknown object in 'CrlIdentifier' factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + nameof(obj)); + } + + private CrlIdentifier(Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException(nameof(seq)); + if (seq.Count < 2 || seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, nameof(seq)); + + this.crlIssuer = X509Name.GetInstance(seq[0]); + this.crlIssuedTime = Asn1UtcTime.GetInstance(seq[1]); + + // Validate crlIssuedTime is in the appropriate year range + crlIssuedTime.ToDateTime(2049); + + if (seq.Count > 2) + { + this.crlNumber = DerInteger.GetInstance(seq[2]); + } + } + + public CrlIdentifier(X509Name crlIssuer, DateTime crlIssuedTime) + : this(crlIssuer, crlIssuedTime, null) + { + } + + public CrlIdentifier(X509Name crlIssuer, DateTime crlIssuedTime, BigInteger crlNumber) + : this(crlIssuer, new Asn1UtcTime(crlIssuedTime, 2049), crlNumber) + { + } + + public CrlIdentifier(X509Name crlIssuer, Asn1UtcTime crlIssuedTime) + : this(crlIssuer, crlIssuedTime, null) + { + } + + public CrlIdentifier(X509Name crlIssuer, Asn1UtcTime crlIssuedTime, BigInteger crlNumber) + { + if (crlIssuer == null) + throw new ArgumentNullException(nameof(crlIssuer)); + if (crlIssuedTime == null) + throw new ArgumentNullException(nameof(crlIssuedTime)); + + // Validate crlIssuedTime is in the appropriate year range + crlIssuedTime.ToDateTime(2049); + + this.crlIssuer = crlIssuer; + this.crlIssuedTime = crlIssuedTime; + + if (null != crlNumber) + { + this.crlNumber = new DerInteger(crlNumber); + } + } + + public X509Name CrlIssuer + { + get { return crlIssuer; } + } + + public DateTime CrlIssuedTime + { + get { return crlIssuedTime.ToDateTime(2049); } + } + + public BigInteger CrlNumber + { + get { return crlNumber == null ? null : crlNumber.Value; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(crlIssuer.ToAsn1Object(), crlIssuedTime); + v.AddOptional(crlNumber); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs.meta new file mode 100644 index 00000000..d9012847 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f2b010df93d63524d8d0bcc16d49dd8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs new file mode 100644 index 00000000..926bf70b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// CRLListID ::= SEQUENCE + /// { + /// crls SEQUENCE OF CrlValidatedID + /// } + /// + /// + public class CrlListID + : Asn1Encodable + { + private readonly Asn1Sequence crls; + + public static CrlListID GetInstance( + object obj) + { + if (obj == null || obj is CrlListID) + return (CrlListID) obj; + + if (obj is Asn1Sequence) + return new CrlListID((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CrlListID' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CrlListID( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 1) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.crls = (Asn1Sequence) seq[0].ToAsn1Object(); + + foreach (Asn1Encodable ae in this.crls) + { + CrlValidatedID.GetInstance(ae.ToAsn1Object()); + } + } + + public CrlListID( + params CrlValidatedID[] crls) + { + if (crls == null) + throw new ArgumentNullException("crls"); + + this.crls = new DerSequence(crls); + } + + public CrlListID( + IEnumerable crls) + { + if (crls == null) + throw new ArgumentNullException("crls"); + + this.crls = new DerSequence( + Asn1EncodableVector.FromEnumerable(crls)); + } + + public CrlValidatedID[] GetCrls() + { + CrlValidatedID[] result = new CrlValidatedID[crls.Count]; + for (int i = 0; i < crls.Count; ++i) + { + result[i] = CrlValidatedID.GetInstance(crls[i].ToAsn1Object()); + } + return result; + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(crls); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs.meta new file mode 100644 index 00000000..81cc0207 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f2934f373eaa3fa439de7053968641ec +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlListID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs new file mode 100644 index 00000000..75521c84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs @@ -0,0 +1,117 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// CrlOcspRef ::= SEQUENCE { + /// crlids [0] CRLListID OPTIONAL, + /// ocspids [1] OcspListID OPTIONAL, + /// otherRev [2] OtherRevRefs OPTIONAL + /// } + /// + /// + public class CrlOcspRef + : Asn1Encodable + { + private readonly CrlListID crlids; + private readonly OcspListID ocspids; + private readonly OtherRevRefs otherRev; + + public static CrlOcspRef GetInstance( + object obj) + { + if (obj == null || obj is CrlOcspRef) + return (CrlOcspRef) obj; + + if (obj is Asn1Sequence) + return new CrlOcspRef((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CrlOcspRef' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CrlOcspRef( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + + foreach (Asn1TaggedObject taggedObj in seq) + { + Asn1Object asn1Obj = taggedObj.GetObject(); + + switch (taggedObj.TagNo) + { + case 0: + this.crlids = CrlListID.GetInstance(asn1Obj); + break; + case 1: + this.ocspids = OcspListID.GetInstance(asn1Obj); + break; + case 2: + this.otherRev = OtherRevRefs.GetInstance(asn1Obj); + break; + default: + throw new ArgumentException("Illegal tag in CrlOcspRef", "seq"); + } + } + } + + public CrlOcspRef( + CrlListID crlids, + OcspListID ocspids, + OtherRevRefs otherRev) + { + this.crlids = crlids; + this.ocspids = ocspids; + this.otherRev = otherRev; + } + + public CrlListID CrlIDs + { + get { return crlids; } + } + + public OcspListID OcspIDs + { + get { return ocspids; } + } + + public OtherRevRefs OtherRev + { + get { return otherRev; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (crlids != null) + { + v.Add(new DerTaggedObject(true, 0, crlids.ToAsn1Object())); + } + + if (ocspids != null) + { + v.Add(new DerTaggedObject(true, 1, ocspids.ToAsn1Object())); + } + + if (otherRev != null) + { + v.Add(new DerTaggedObject(true, 2, otherRev.ToAsn1Object())); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs.meta new file mode 100644 index 00000000..6e10f22d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c2b8ede172bb0f94880558a47cb9856b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlOcspRef.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs new file mode 100644 index 00000000..3dc22849 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// CrlValidatedID ::= SEQUENCE { + /// crlHash OtherHash, + /// crlIdentifier CrlIdentifier OPTIONAL} + /// + /// + public class CrlValidatedID + : Asn1Encodable + { + private readonly OtherHash crlHash; + private readonly CrlIdentifier crlIdentifier; + + public static CrlValidatedID GetInstance( + object obj) + { + if (obj == null || obj is CrlValidatedID) + return (CrlValidatedID) obj; + + if (obj is Asn1Sequence) + return new CrlValidatedID((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'CrlValidatedID' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private CrlValidatedID( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.crlHash = OtherHash.GetInstance(seq[0].ToAsn1Object()); + + if (seq.Count > 1) + { + this.crlIdentifier = CrlIdentifier.GetInstance(seq[1].ToAsn1Object()); + } + } + + public CrlValidatedID( + OtherHash crlHash) + : this(crlHash, null) + { + } + + public CrlValidatedID( + OtherHash crlHash, + CrlIdentifier crlIdentifier) + { + if (crlHash == null) + throw new ArgumentNullException("crlHash"); + + this.crlHash = crlHash; + this.crlIdentifier = crlIdentifier; + } + + public OtherHash CrlHash + { + get { return crlHash; } + } + + public CrlIdentifier CrlIdentifier + { + get { return crlIdentifier; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(crlHash.ToAsn1Object()); + + if (crlIdentifier != null) + { + v.Add(crlIdentifier.ToAsn1Object()); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs.meta new file mode 100644 index 00000000..383d7837 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92f8ddba6175fa941a7707d004cd0830 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/CrlValidatedID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs new file mode 100644 index 00000000..186445a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + public abstract class EsfAttributes + { + public static readonly DerObjectIdentifier SigPolicyId = PkcsObjectIdentifiers.IdAAEtsSigPolicyID; + public static readonly DerObjectIdentifier CommitmentType = PkcsObjectIdentifiers.IdAAEtsCommitmentType; + public static readonly DerObjectIdentifier SignerLocation = PkcsObjectIdentifiers.IdAAEtsSignerLocation; + public static readonly DerObjectIdentifier SignerAttr = PkcsObjectIdentifiers.IdAAEtsSignerAttr; + public static readonly DerObjectIdentifier OtherSigCert = PkcsObjectIdentifiers.IdAAEtsOtherSigCert; + public static readonly DerObjectIdentifier ContentTimestamp = PkcsObjectIdentifiers.IdAAEtsContentTimestamp; + public static readonly DerObjectIdentifier CertificateRefs = PkcsObjectIdentifiers.IdAAEtsCertificateRefs; + public static readonly DerObjectIdentifier RevocationRefs = PkcsObjectIdentifiers.IdAAEtsRevocationRefs; + public static readonly DerObjectIdentifier CertValues = PkcsObjectIdentifiers.IdAAEtsCertValues; + public static readonly DerObjectIdentifier RevocationValues = PkcsObjectIdentifiers.IdAAEtsRevocationValues; + public static readonly DerObjectIdentifier EscTimeStamp = PkcsObjectIdentifiers.IdAAEtsEscTimeStamp; + public static readonly DerObjectIdentifier CertCrlTimestamp = PkcsObjectIdentifiers.IdAAEtsCertCrlTimestamp; + public static readonly DerObjectIdentifier ArchiveTimestamp = PkcsObjectIdentifiers.IdAAEtsArchiveTimestamp; + public static readonly DerObjectIdentifier ArchiveTimestampV2 = new DerObjectIdentifier(PkcsObjectIdentifiers.IdAA + ".48"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs.meta new file mode 100644 index 00000000..2eef7ed0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc892043a96f9ba45bb32241548a273a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/ESFAttributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs new file mode 100644 index 00000000..61d0c291 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// OcspIdentifier ::= SEQUENCE { + /// ocspResponderID ResponderID, + /// -- As in OCSP response data + /// producedAt GeneralizedTime + /// -- As in OCSP response data + /// } + /// + /// + public class OcspIdentifier + : Asn1Encodable + { + private readonly ResponderID ocspResponderID; + private readonly Asn1GeneralizedTime producedAt; + + public static OcspIdentifier GetInstance( + object obj) + { + if (obj == null || obj is OcspIdentifier) + return (OcspIdentifier) obj; + + if (obj is Asn1Sequence) + return new OcspIdentifier((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OcspIdentifier' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OcspIdentifier( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.ocspResponderID = ResponderID.GetInstance(seq[0].ToAsn1Object()); + this.producedAt = (Asn1GeneralizedTime)seq[1].ToAsn1Object(); + } + + public OcspIdentifier(ResponderID ocspResponderID, DateTime producedAt) + { + if (ocspResponderID == null) + throw new ArgumentNullException(nameof(ocspResponderID)); + + this.ocspResponderID = ocspResponderID; + this.producedAt = new Asn1GeneralizedTime(producedAt); + } + + public OcspIdentifier(ResponderID ocspResponderID, Asn1GeneralizedTime producedAt) + { + if (ocspResponderID == null) + throw new ArgumentNullException(nameof(ocspResponderID)); + if (producedAt == null) + throw new ArgumentNullException(nameof(producedAt)); + + this.ocspResponderID = ocspResponderID; + this.producedAt = producedAt; + } + + public ResponderID OcspResponderID + { + get { return ocspResponderID; } + } + + public DateTime ProducedAt + { + get { return producedAt.ToDateTime(); } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(ocspResponderID, producedAt); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs.meta new file mode 100644 index 00000000..1da32dd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dd3d3b491378a6e4888a6db2ec78ba8c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs new file mode 100644 index 00000000..33ef078b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// OcspListID ::= SEQUENCE { + /// ocspResponses SEQUENCE OF OcspResponsesID + /// } + /// + /// + public class OcspListID + : Asn1Encodable + { + private readonly Asn1Sequence ocspResponses; + + public static OcspListID GetInstance( + object obj) + { + if (obj == null || obj is OcspListID) + return (OcspListID) obj; + + if (obj is Asn1Sequence) + return new OcspListID((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OcspListID' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OcspListID( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 1) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.ocspResponses = (Asn1Sequence) seq[0].ToAsn1Object(); + + foreach (Asn1Encodable ae in this.ocspResponses) + { + OcspResponsesID.GetInstance(ae.ToAsn1Object()); + } + } + + public OcspListID( + params OcspResponsesID[] ocspResponses) + { + if (ocspResponses == null) + throw new ArgumentNullException("ocspResponses"); + + this.ocspResponses = new DerSequence(ocspResponses); + } + + public OcspListID( + IEnumerable ocspResponses) + { + if (ocspResponses == null) + throw new ArgumentNullException("ocspResponses"); + + this.ocspResponses = new DerSequence( + Asn1EncodableVector.FromEnumerable(ocspResponses)); + } + + public OcspResponsesID[] GetOcspResponses() + { + OcspResponsesID[] result = new OcspResponsesID[ocspResponses.Count]; + for (int i = 0; i < ocspResponses.Count; ++i) + { + result[i] = OcspResponsesID.GetInstance(ocspResponses[i].ToAsn1Object()); + } + return result; + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(ocspResponses); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs.meta new file mode 100644 index 00000000..eef8723b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 428f1d09cf895a44194db8d397d51c0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspListID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs new file mode 100644 index 00000000..dd956aa9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// OcspResponsesID ::= SEQUENCE { + /// ocspIdentifier OcspIdentifier, + /// ocspRepHash OtherHash OPTIONAL + /// } + /// + /// + public class OcspResponsesID + : Asn1Encodable + { + private readonly OcspIdentifier ocspIdentifier; + private readonly OtherHash ocspRepHash; + + public static OcspResponsesID GetInstance( + object obj) + { + if (obj == null || obj is OcspResponsesID) + return (OcspResponsesID) obj; + + if (obj is Asn1Sequence) + return new OcspResponsesID((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OcspResponsesID' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OcspResponsesID( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.ocspIdentifier = OcspIdentifier.GetInstance(seq[0].ToAsn1Object()); + + if (seq.Count > 1) + { + this.ocspRepHash = OtherHash.GetInstance(seq[1].ToAsn1Object()); + } + } + + public OcspResponsesID( + OcspIdentifier ocspIdentifier) + : this(ocspIdentifier, null) + { + } + + public OcspResponsesID( + OcspIdentifier ocspIdentifier, + OtherHash ocspRepHash) + { + if (ocspIdentifier == null) + throw new ArgumentNullException("ocspIdentifier"); + + this.ocspIdentifier = ocspIdentifier; + this.ocspRepHash = ocspRepHash; + } + + public OcspIdentifier OcspIdentifier + { + get { return ocspIdentifier; } + } + + public OtherHash OcspRepHash + { + get { return ocspRepHash; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + ocspIdentifier.ToAsn1Object()); + + if (ocspRepHash != null) + { + v.Add(ocspRepHash.ToAsn1Object()); + } + + return new DerSequence(v); + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs.meta new file mode 100644 index 00000000..f242e2b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 772b3ba20242d6740b4138bb10e91309 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OcspResponsesID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs new file mode 100644 index 00000000..41b22523 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// OtherCertID ::= SEQUENCE { + /// otherCertHash OtherHash, + /// issuerSerial IssuerSerial OPTIONAL + /// } + /// + /// + public class OtherCertID + : Asn1Encodable + { + private readonly OtherHash otherCertHash; + private readonly IssuerSerial issuerSerial; + + public static OtherCertID GetInstance( + object obj) + { + if (obj == null || obj is OtherCertID) + return (OtherCertID) obj; + + if (obj is Asn1Sequence) + return new OtherCertID((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OtherCertID' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OtherCertID( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.otherCertHash = OtherHash.GetInstance(seq[0].ToAsn1Object()); + + if (seq.Count > 1) + { + this.issuerSerial = IssuerSerial.GetInstance(seq[1].ToAsn1Object()); + } + } + + public OtherCertID( + OtherHash otherCertHash) + : this(otherCertHash, null) + { + } + + public OtherCertID( + OtherHash otherCertHash, + IssuerSerial issuerSerial) + { + if (otherCertHash == null) + throw new ArgumentNullException("otherCertHash"); + + this.otherCertHash = otherCertHash; + this.issuerSerial = issuerSerial; + } + + public OtherHash OtherCertHash + { + get { return otherCertHash; } + } + + public IssuerSerial IssuerSerial + { + get { return issuerSerial; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + otherCertHash.ToAsn1Object()); + + if (issuerSerial != null) + { + v.Add(issuerSerial.ToAsn1Object()); + } + + return new DerSequence(v); + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs.meta new file mode 100644 index 00000000..197e4196 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: caba59b28b7bb2b44ab5f328dabdd593 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherCertID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs new file mode 100644 index 00000000..9ab30d72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// OtherHash ::= CHOICE { + /// sha1Hash OtherHashValue, -- This contains a SHA-1 hash + /// otherHash OtherHashAlgAndValue + /// } + /// + /// OtherHashValue ::= OCTET STRING + /// + /// + public class OtherHash + : Asn1Encodable, IAsn1Choice + { + private readonly Asn1OctetString sha1Hash; + private readonly OtherHashAlgAndValue otherHash; + + public static OtherHash GetInstance( + object obj) + { + if (obj == null || obj is OtherHash) + return (OtherHash) obj; + + if (obj is Asn1OctetString) + return new OtherHash((Asn1OctetString) obj); + + return new OtherHash( + OtherHashAlgAndValue.GetInstance(obj)); + } + + public OtherHash( + byte[] sha1Hash) + { + if (sha1Hash == null) + throw new ArgumentNullException("sha1Hash"); + + this.sha1Hash = new DerOctetString(sha1Hash); + } + + public OtherHash( + Asn1OctetString sha1Hash) + { + if (sha1Hash == null) + throw new ArgumentNullException("sha1Hash"); + + this.sha1Hash = sha1Hash; + } + + public OtherHash( + OtherHashAlgAndValue otherHash) + { + if (otherHash == null) + throw new ArgumentNullException("otherHash"); + + this.otherHash = otherHash; + } + + public AlgorithmIdentifier HashAlgorithm + { + get + { + return otherHash == null + ? new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1) + : otherHash.HashAlgorithm; + } + } + + public byte[] GetHashValue() + { + return otherHash == null + ? sha1Hash.GetOctets() + : otherHash.GetHashValue(); + } + + public override Asn1Object ToAsn1Object() + { + return otherHash == null + ? sha1Hash + : otherHash.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs.meta new file mode 100644 index 00000000..000bdc38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 17c0c475d3163d14dacf8e21ffbaf253 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs new file mode 100644 index 00000000..0d996639 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// Summary description for OtherHashAlgAndValue. + /// + /// + /// + /// OtherHashAlgAndValue ::= SEQUENCE { + /// hashAlgorithm AlgorithmIdentifier, + /// hashValue OtherHashValue + /// } + /// + /// OtherHashValue ::= OCTET STRING + /// + /// + public class OtherHashAlgAndValue + : Asn1Encodable + { + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly Asn1OctetString hashValue; + + public static OtherHashAlgAndValue GetInstance( + object obj) + { + if (obj == null || obj is OtherHashAlgAndValue) + return (OtherHashAlgAndValue) obj; + + if (obj is Asn1Sequence) + return new OtherHashAlgAndValue((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OtherHashAlgAndValue' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OtherHashAlgAndValue( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[0].ToAsn1Object()); + this.hashValue = (Asn1OctetString) seq[1].ToAsn1Object(); + } + + public OtherHashAlgAndValue( + AlgorithmIdentifier hashAlgorithm, + byte[] hashValue) + { + if (hashAlgorithm == null) + throw new ArgumentNullException("hashAlgorithm"); + if (hashValue == null) + throw new ArgumentNullException("hashValue"); + + this.hashAlgorithm = hashAlgorithm; + this.hashValue = new DerOctetString(hashValue); + } + + public OtherHashAlgAndValue( + AlgorithmIdentifier hashAlgorithm, + Asn1OctetString hashValue) + { + if (hashAlgorithm == null) + throw new ArgumentNullException("hashAlgorithm"); + if (hashValue == null) + throw new ArgumentNullException("hashValue"); + + this.hashAlgorithm = hashAlgorithm; + this.hashValue = hashValue; + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public byte[] GetHashValue() + { + return hashValue.GetOctets(); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(hashAlgorithm, hashValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs.meta new file mode 100644 index 00000000..99ad1a13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 298569801435f22439a2aaeb3b72b5d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherHashAlgAndValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs new file mode 100644 index 00000000..70a4a557 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.2.2 Complete Revocation Refs Attribute Definition + /// + /// OtherRevRefs ::= SEQUENCE + /// { + /// otherRevRefType OtherRevRefType, + /// otherRevRefs ANY DEFINED BY otherRevRefType + /// } + /// + /// OtherRevRefType ::= OBJECT IDENTIFIER + /// + /// + public class OtherRevRefs + : Asn1Encodable + { + private readonly DerObjectIdentifier otherRevRefType; + private readonly Asn1Object otherRevRefs; + + public static OtherRevRefs GetInstance( + object obj) + { + if (obj == null || obj is OtherRevRefs) + return (OtherRevRefs) obj; + + if (obj is Asn1Sequence) + return new OtherRevRefs((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OtherRevRefs' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OtherRevRefs( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.otherRevRefType = (DerObjectIdentifier) seq[0].ToAsn1Object(); + this.otherRevRefs = seq[1].ToAsn1Object(); + } + + public OtherRevRefs( + DerObjectIdentifier otherRevRefType, + Asn1Encodable otherRevRefs) + { + if (otherRevRefType == null) + throw new ArgumentNullException("otherRevRefType"); + if (otherRevRefs == null) + throw new ArgumentNullException("otherRevRefs"); + + this.otherRevRefType = otherRevRefType; + this.otherRevRefs = otherRevRefs.ToAsn1Object(); + } + + public DerObjectIdentifier OtherRevRefType + { + get { return otherRevRefType; } + } + + public Asn1Object OtherRevRefsObject + { + get { return otherRevRefs; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(otherRevRefType, otherRevRefs); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs.meta new file mode 100644 index 00000000..d7085af3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25166e4d38113624ba3b78c6201c7cf1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevRefs.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs new file mode 100644 index 00000000..e27ab14f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 3126: 4.3.2 Revocation Values Attribute Definition + /// + /// OtherRevVals ::= SEQUENCE + /// { + /// otherRevValType OtherRevValType, + /// otherRevVals ANY DEFINED BY otherRevValType + /// } + /// + /// OtherRevValType ::= OBJECT IDENTIFIER + /// + /// + public class OtherRevVals + : Asn1Encodable + { + private readonly DerObjectIdentifier otherRevValType; + private readonly Asn1Object otherRevVals; + + public static OtherRevVals GetInstance( + object obj) + { + if (obj == null || obj is OtherRevVals) + return (OtherRevVals) obj; + + if (obj is Asn1Sequence) + return new OtherRevVals((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OtherRevVals' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OtherRevVals( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.otherRevValType = (DerObjectIdentifier) seq[0].ToAsn1Object(); + this.otherRevVals = seq[1].ToAsn1Object(); + } + + public OtherRevVals( + DerObjectIdentifier otherRevValType, + Asn1Encodable otherRevVals) + { + if (otherRevValType == null) + throw new ArgumentNullException("otherRevValType"); + if (otherRevVals == null) + throw new ArgumentNullException("otherRevVals"); + + this.otherRevValType = otherRevValType; + this.otherRevVals = otherRevVals.ToAsn1Object(); + } + + public DerObjectIdentifier OtherRevValType + { + get { return otherRevValType; } + } + + public Asn1Object OtherRevValsObject + { + get { return otherRevVals; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(otherRevValType, otherRevVals); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs.meta new file mode 100644 index 00000000..285b3f9e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eb045476300253e419d767312265270b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherRevVals.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs new file mode 100644 index 00000000..94758170 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs @@ -0,0 +1,132 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// OtherSigningCertificate ::= SEQUENCE { + /// certs SEQUENCE OF OtherCertID, + /// policies SEQUENCE OF PolicyInformation OPTIONAL + /// } + /// + /// + public class OtherSigningCertificate + : Asn1Encodable + { + private readonly Asn1Sequence certs; + private readonly Asn1Sequence policies; + + public static OtherSigningCertificate GetInstance( + object obj) + { + if (obj == null || obj is OtherSigningCertificate) + return (OtherSigningCertificate) obj; + + if (obj is Asn1Sequence) + return new OtherSigningCertificate((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'OtherSigningCertificate' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private OtherSigningCertificate( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.certs = Asn1Sequence.GetInstance(seq[0].ToAsn1Object()); + + if (seq.Count > 1) + { + this.policies = Asn1Sequence.GetInstance(seq[1].ToAsn1Object()); + } + } + + public OtherSigningCertificate( + params OtherCertID[] certs) + : this(certs, null) + { + } + + public OtherSigningCertificate( + OtherCertID[] certs, + params PolicyInformation[] policies) + { + if (certs == null) + throw new ArgumentNullException("certs"); + + this.certs = new DerSequence(certs); + + if (policies != null) + { + this.policies = new DerSequence(policies); + } + } + + public OtherSigningCertificate( + IEnumerable certs) + : this(certs, null) + { + } + + public OtherSigningCertificate( + IEnumerable certs, + IEnumerable policies) + { + if (certs == null) + throw new ArgumentNullException("certs"); + + this.certs = new DerSequence( + Asn1EncodableVector.FromEnumerable(certs)); + + if (policies != null) + { + this.policies = new DerSequence( + Asn1EncodableVector.FromEnumerable(policies)); + } + } + + public OtherCertID[] GetCerts() + { + OtherCertID[] cs = new OtherCertID[certs.Count]; + for (int i = 0; i < certs.Count; ++i) + { + cs[i] = OtherCertID.GetInstance(certs[i].ToAsn1Object()); + } + return cs; + } + + public PolicyInformation[] GetPolicies() + { + if (policies == null) + return null; + + PolicyInformation[] ps = new PolicyInformation[policies.Count]; + for (int i = 0; i < policies.Count; ++i) + { + ps[i] = PolicyInformation.GetInstance(policies[i].ToAsn1Object()); + } + return ps; + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certs); + v.AddOptional(policies); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs.meta new file mode 100644 index 00000000..2a3bbda2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f7b6b9fb7323464ab4c5b7865a8a444 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/OtherSigningCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs new file mode 100644 index 00000000..5b0ba1f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs @@ -0,0 +1,154 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// RFC 5126: 6.3.4. revocation-values Attribute Definition + /// + /// RevocationValues ::= SEQUENCE { + /// crlVals [0] SEQUENCE OF CertificateList OPTIONAL, + /// ocspVals [1] SEQUENCE OF BasicOCSPResponse OPTIONAL, + /// otherRevVals [2] OtherRevVals OPTIONAL + /// } + /// + /// + public class RevocationValues + : Asn1Encodable + { + private readonly Asn1Sequence crlVals; + private readonly Asn1Sequence ocspVals; + private readonly OtherRevVals otherRevVals; + + public static RevocationValues GetInstance( + object obj) + { + if (obj == null || obj is RevocationValues) + return (RevocationValues) obj; + + return new RevocationValues(Asn1Sequence.GetInstance(obj)); + } + + private RevocationValues( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + foreach (Asn1TaggedObject taggedObj in seq) + { + Asn1Object asn1Obj = taggedObj.GetObject(); + switch (taggedObj.TagNo) + { + case 0: + Asn1Sequence crlValsSeq = (Asn1Sequence) asn1Obj; + foreach (Asn1Encodable ae in crlValsSeq) + { + CertificateList.GetInstance(ae.ToAsn1Object()); + } + this.crlVals = crlValsSeq; + break; + case 1: + Asn1Sequence ocspValsSeq = (Asn1Sequence) asn1Obj; + foreach (Asn1Encodable ae in ocspValsSeq) + { + BasicOcspResponse.GetInstance(ae.ToAsn1Object()); + } + this.ocspVals = ocspValsSeq; + break; + case 2: + this.otherRevVals = OtherRevVals.GetInstance(asn1Obj); + break; + default: + throw new ArgumentException("Illegal tag in RevocationValues", "seq"); + } + } + } + + public RevocationValues( + CertificateList[] crlVals, + BasicOcspResponse[] ocspVals, + OtherRevVals otherRevVals) + { + if (crlVals != null) + { + this.crlVals = new DerSequence(crlVals); + } + + if (ocspVals != null) + { + this.ocspVals = new DerSequence(ocspVals); + } + + this.otherRevVals = otherRevVals; + } + + public RevocationValues( + IEnumerable crlVals, + IEnumerable ocspVals, + OtherRevVals otherRevVals) + { + if (crlVals != null) + { + this.crlVals = new DerSequence( + Asn1EncodableVector.FromEnumerable(crlVals)); + } + + if (ocspVals != null) + { + this.ocspVals = new DerSequence( + Asn1EncodableVector.FromEnumerable(ocspVals)); + } + + this.otherRevVals = otherRevVals; + } + + public CertificateList[] GetCrlVals() + { + CertificateList[] result = new CertificateList[crlVals.Count]; + for (int i = 0; i < crlVals.Count; ++i) + { + result[i] = CertificateList.GetInstance(crlVals[i].ToAsn1Object()); + } + return result; + } + + public BasicOcspResponse[] GetOcspVals() + { + BasicOcspResponse[] result = new BasicOcspResponse[ocspVals.Count]; + for (int i = 0; i < ocspVals.Count; ++i) + { + result[i] = BasicOcspResponse.GetInstance(ocspVals[i].ToAsn1Object()); + } + return result; + } + + public OtherRevVals OtherRevVals + { + get { return otherRevVals; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, crlVals); + v.AddOptionalTagged(true, 1, ocspVals); + + if (otherRevVals != null) + { + v.Add(new DerTaggedObject(true, 2, otherRevVals.ToAsn1Object())); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs.meta new file mode 100644 index 00000000..e9e56abb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 55efe2f3e0343dd4386522217ef9cbe1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/RevocationValues.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs new file mode 100644 index 00000000..2afde411 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// SigPolicyQualifierInfo ::= SEQUENCE { + /// sigPolicyQualifierId SigPolicyQualifierId, + /// sigQualifier ANY DEFINED BY sigPolicyQualifierId + /// } + /// + /// SigPolicyQualifierId ::= OBJECT IDENTIFIER + /// + /// + public class SigPolicyQualifierInfo + : Asn1Encodable + { + private readonly DerObjectIdentifier sigPolicyQualifierId; + private readonly Asn1Object sigQualifier; + + public static SigPolicyQualifierInfo GetInstance( + object obj) + { + if (obj == null || obj is SigPolicyQualifierInfo) + return (SigPolicyQualifierInfo) obj; + + if (obj is Asn1Sequence) + return new SigPolicyQualifierInfo((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'SigPolicyQualifierInfo' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private SigPolicyQualifierInfo( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.sigPolicyQualifierId = (DerObjectIdentifier) seq[0].ToAsn1Object(); + this.sigQualifier = seq[1].ToAsn1Object(); + } + + public SigPolicyQualifierInfo( + DerObjectIdentifier sigPolicyQualifierId, + Asn1Encodable sigQualifier) + { + this.sigPolicyQualifierId = sigPolicyQualifierId; + this.sigQualifier = sigQualifier.ToAsn1Object(); + } + + public DerObjectIdentifier SigPolicyQualifierId + { + get { return sigPolicyQualifierId; } + } + + public Asn1Object SigQualifier + { + get { return sigQualifier; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(sigPolicyQualifierId, sigQualifier); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs.meta new file mode 100644 index 00000000..2b04f349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7fe96c8be596134bac2ee02392ee9d1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SigPolicyQualifierInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs new file mode 100644 index 00000000..aeba2b41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// SignaturePolicyId ::= SEQUENCE { + /// sigPolicyIdentifier SigPolicyId, + /// sigPolicyHash SigPolicyHash, + /// sigPolicyQualifiers SEQUENCE SIZE (1..MAX) OF SigPolicyQualifierInfo OPTIONAL + /// } + /// + /// SigPolicyId ::= OBJECT IDENTIFIER + /// + /// SigPolicyHash ::= OtherHashAlgAndValue + /// + /// + public class SignaturePolicyId + : Asn1Encodable + { + private readonly DerObjectIdentifier sigPolicyIdentifier; + private readonly OtherHashAlgAndValue sigPolicyHash; + private readonly Asn1Sequence sigPolicyQualifiers; + + public static SignaturePolicyId GetInstance( + object obj) + { + if (obj == null || obj is SignaturePolicyId) + return (SignaturePolicyId) obj; + + if (obj is Asn1Sequence) + return new SignaturePolicyId((Asn1Sequence) obj); + + throw new ArgumentException( + "Unknown object in 'SignaturePolicyId' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private SignaturePolicyId( + Asn1Sequence seq) + { + if (seq == null) + throw new ArgumentNullException("seq"); + if (seq.Count < 2 || seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.sigPolicyIdentifier = (DerObjectIdentifier) seq[0].ToAsn1Object(); + this.sigPolicyHash = OtherHashAlgAndValue.GetInstance(seq[1].ToAsn1Object()); + + if (seq.Count > 2) + { + this.sigPolicyQualifiers = (Asn1Sequence) seq[2].ToAsn1Object(); + } + } + + public SignaturePolicyId( + DerObjectIdentifier sigPolicyIdentifier, + OtherHashAlgAndValue sigPolicyHash) + : this(sigPolicyIdentifier, sigPolicyHash, null) + { + } + + public SignaturePolicyId( + DerObjectIdentifier sigPolicyIdentifier, + OtherHashAlgAndValue sigPolicyHash, + params SigPolicyQualifierInfo[] sigPolicyQualifiers) + { + if (sigPolicyIdentifier == null) + throw new ArgumentNullException("sigPolicyIdentifier"); + if (sigPolicyHash == null) + throw new ArgumentNullException("sigPolicyHash"); + + this.sigPolicyIdentifier = sigPolicyIdentifier; + this.sigPolicyHash = sigPolicyHash; + + if (sigPolicyQualifiers != null) + { + this.sigPolicyQualifiers = new DerSequence(sigPolicyQualifiers); + } + } + + public SignaturePolicyId( + DerObjectIdentifier sigPolicyIdentifier, + OtherHashAlgAndValue sigPolicyHash, + IEnumerable sigPolicyQualifiers) + { + if (sigPolicyIdentifier == null) + throw new ArgumentNullException("sigPolicyIdentifier"); + if (sigPolicyHash == null) + throw new ArgumentNullException("sigPolicyHash"); + + this.sigPolicyIdentifier = sigPolicyIdentifier; + this.sigPolicyHash = sigPolicyHash; + + if (sigPolicyQualifiers != null) + { + this.sigPolicyQualifiers = new DerSequence( + Asn1EncodableVector.FromEnumerable(sigPolicyQualifiers)); + } + } + + public DerObjectIdentifier SigPolicyIdentifier + { + get { return sigPolicyIdentifier; } + } + + public OtherHashAlgAndValue SigPolicyHash + { + get { return sigPolicyHash; } + } + + public SigPolicyQualifierInfo[] GetSigPolicyQualifiers() + { + if (sigPolicyQualifiers == null) + return null; + + SigPolicyQualifierInfo[] infos = new SigPolicyQualifierInfo[sigPolicyQualifiers.Count]; + for (int i = 0; i < sigPolicyQualifiers.Count; ++i) + { + infos[i] = SigPolicyQualifierInfo.GetInstance(sigPolicyQualifiers[i]); + } + return infos; + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + sigPolicyIdentifier, sigPolicyHash.ToAsn1Object()); + + if (sigPolicyQualifiers != null) + { + v.Add(sigPolicyQualifiers.ToAsn1Object()); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs.meta new file mode 100644 index 00000000..5b405297 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 99be878f13c4b034aa698d274b195b84 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs new file mode 100644 index 00000000..8ea91259 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /// + /// + /// SignaturePolicyIdentifier ::= CHOICE { + /// SignaturePolicyId SignaturePolicyId, + /// SignaturePolicyImplied SignaturePolicyImplied + /// } + /// + /// SignaturePolicyImplied ::= NULL + /// + /// + public class SignaturePolicyIdentifier + : Asn1Encodable, IAsn1Choice + { + private readonly SignaturePolicyId sigPolicy; + + public static SignaturePolicyIdentifier GetInstance( + object obj) + { + if (obj == null || obj is SignaturePolicyIdentifier) + return (SignaturePolicyIdentifier) obj; + + if (obj is SignaturePolicyId) + return new SignaturePolicyIdentifier((SignaturePolicyId) obj); + + if (obj is Asn1Null) + return new SignaturePolicyIdentifier(); + + throw new ArgumentException( + "Unknown object in 'SignaturePolicyIdentifier' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + public SignaturePolicyIdentifier() + { + this.sigPolicy = null; + } + + public SignaturePolicyIdentifier( + SignaturePolicyId signaturePolicyId) + { + if (signaturePolicyId == null) + throw new ArgumentNullException("signaturePolicyId"); + + this.sigPolicy = signaturePolicyId; + } + + public SignaturePolicyId SignaturePolicyId + { + get { return sigPolicy; } + } + + public override Asn1Object ToAsn1Object() + { + return sigPolicy == null + ? DerNull.Instance + : sigPolicy.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs.meta new file mode 100644 index 00000000..aa4d2c22 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 38e7b593193c0d848ad9ea61b84ba7f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignaturePolicyIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs new file mode 100644 index 00000000..bb452ae2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + public class SignerAttribute + : Asn1Encodable + { + private Asn1Sequence claimedAttributes; + private AttributeCertificate certifiedAttributes; + + public static SignerAttribute GetInstance( + object obj) + { + if (obj == null || obj is SignerAttribute) + return (SignerAttribute) obj; + + if (obj is Asn1Sequence) + return new SignerAttribute(obj); + + throw new ArgumentException( + "Unknown object in 'SignerAttribute' factory: " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), + "obj"); + } + + private SignerAttribute( + object obj) + { + Asn1Sequence seq = (Asn1Sequence) obj; + DerTaggedObject taggedObject = (DerTaggedObject) seq[0]; + if (taggedObject.TagNo == 0) + { + claimedAttributes = Asn1Sequence.GetInstance(taggedObject, true); + } + else if (taggedObject.TagNo == 1) + { + certifiedAttributes = AttributeCertificate.GetInstance(taggedObject); + } + else + { + throw new ArgumentException("illegal tag.", "obj"); + } + } + + public SignerAttribute( + Asn1Sequence claimedAttributes) + { + this.claimedAttributes = claimedAttributes; + } + + public SignerAttribute( + AttributeCertificate certifiedAttributes) + { + this.certifiedAttributes = certifiedAttributes; + } + + public virtual Asn1Sequence ClaimedAttributes + { + get { return claimedAttributes; } + } + + public virtual AttributeCertificate CertifiedAttributes + { + get { return certifiedAttributes; } + } + + /** + * + *
+		*  SignerAttribute ::= SEQUENCE OF CHOICE {
+		*      claimedAttributes   [0] ClaimedAttributes,
+		*      certifiedAttributes [1] CertifiedAttributes }
+		*
+		*  ClaimedAttributes ::= SEQUENCE OF Attribute
+		*  CertifiedAttributes ::= AttributeCertificate -- as defined in RFC 3281: see clause 4.1.
+		* 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (claimedAttributes != null) + { + v.Add(new DerTaggedObject(0, claimedAttributes)); + } + else + { + v.Add(new DerTaggedObject(1, certifiedAttributes)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs.meta new file mode 100644 index 00000000..3bcb8ee2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6fd77b53c8c1a1408dae6fba217b087 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs new file mode 100644 index 00000000..64aa5d97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf +{ + /** + * Signer-Location attribute (RFC3126). + * + *
+	*   SignerLocation ::= SEQUENCE {
+	*       countryName        [0] DirectoryString OPTIONAL,
+	*       localityName       [1] DirectoryString OPTIONAL,
+	*       postalAddress      [2] PostalAddress OPTIONAL }
+	*
+	*   PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
+	* 
+ */ + public class SignerLocation + : Asn1Encodable + { + private DirectoryString countryName; + private DirectoryString localityName; + private Asn1Sequence postalAddress; + + public SignerLocation(Asn1Sequence seq) + { + foreach (Asn1TaggedObject obj in seq) + { + switch (obj.TagNo) + { + case 0: + this.countryName = DirectoryString.GetInstance(obj, true); + break; + case 1: + this.localityName = DirectoryString.GetInstance(obj, true); + break; + case 2: + bool isExplicit = obj.IsExplicit(); // handle erroneous implicitly tagged sequences + this.postalAddress = Asn1Sequence.GetInstance(obj, isExplicit); + if (postalAddress != null && postalAddress.Count > 6) + throw new ArgumentException("postal address must contain less than 6 strings"); + break; + default: + throw new ArgumentException("illegal tag"); + } + } + } + + private SignerLocation( + DirectoryString countryName, + DirectoryString localityName, + Asn1Sequence postalAddress) + { + if (postalAddress != null && postalAddress.Count > 6) + throw new ArgumentException("postal address must contain less than 6 strings"); + + this.countryName = countryName; + this.localityName = localityName; + this.postalAddress = postalAddress; + } + + public SignerLocation( + DirectoryString countryName, + DirectoryString localityName, + DirectoryString[] postalAddress) + : this(countryName, localityName, new DerSequence(postalAddress)) + { + } + + public SignerLocation( + DerUtf8String countryName, + DerUtf8String localityName, + Asn1Sequence postalAddress) + : this(DirectoryString.GetInstance(countryName), DirectoryString.GetInstance(localityName), postalAddress) + { + } + + public static SignerLocation GetInstance(object obj) + { + if (obj == null || obj is SignerLocation) + return (SignerLocation) obj; + + return new SignerLocation(Asn1Sequence.GetInstance(obj)); + } + + public DirectoryString Country + { + get { return countryName; } + } + + public DirectoryString Locality + { + get { return localityName; } + } + + public DirectoryString[] GetPostal() + { + if (postalAddress == null) + return null; + + DirectoryString[] dirStrings = new DirectoryString[postalAddress.Count]; + for (int i = 0; i != dirStrings.Length; i++) + { + dirStrings[i] = DirectoryString.GetInstance(postalAddress[i]); + } + + return dirStrings; + } + + public Asn1Sequence PostalAddress + { + get { return postalAddress; } + } + + /** + *
+		*   SignerLocation ::= SEQUENCE {
+		*       countryName        [0] DirectoryString OPTIONAL,
+		*       localityName       [1] DirectoryString OPTIONAL,
+		*       postalAddress      [2] PostalAddress OPTIONAL }
+		*
+		*   PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
+		*
+		*   DirectoryString ::= CHOICE {
+		*         teletexString           TeletexString (SIZE (1..MAX)),
+		*         printableString         PrintableString (SIZE (1..MAX)),
+		*         universalString         UniversalString (SIZE (1..MAX)),
+		*         utf8String              UTF8String (SIZE (1.. MAX)),
+		*         bmpString               BMPString (SIZE (1..MAX)) }
+		* 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, countryName); + v.AddOptionalTagged(true, 1, localityName); + v.AddOptionalTagged(true, 2, postalAddress); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs.meta new file mode 100644 index 00000000..7a408669 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30313862107873a40bb9ba65d82dbcdd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/esf/SignerLocation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess.meta new file mode 100644 index 00000000..4db94f12 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b657f266ce7dfc14f839d03374753d22 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs new file mode 100644 index 00000000..b32caeb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class ContentHints + : Asn1Encodable + { + private readonly DerUtf8String contentDescription; + private readonly DerObjectIdentifier contentType; + + public static ContentHints GetInstance( + object o) + { + if (o == null || o is ContentHints) + { + return (ContentHints)o; + } + + if (o is Asn1Sequence) + { + return new ContentHints((Asn1Sequence)o); + } + + throw new ArgumentException("unknown object in 'ContentHints' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(o) + "."); + } + + /** + * constructor + */ + private ContentHints( + Asn1Sequence seq) + { + IAsn1Convertible field = seq[0]; + if (field.ToAsn1Object() is DerUtf8String) + { + contentDescription = DerUtf8String.GetInstance(field); + contentType = DerObjectIdentifier.GetInstance(seq[1]); + } + else + { + contentType = DerObjectIdentifier.GetInstance(seq[0]); + } + } + + public ContentHints( + DerObjectIdentifier contentType) + { + this.contentType = contentType; + this.contentDescription = null; + } + + public ContentHints( + DerObjectIdentifier contentType, + DerUtf8String contentDescription) + { + this.contentType = contentType; + this.contentDescription = contentDescription; + } + + public DerObjectIdentifier ContentType + { + get { return contentType; } + } + + public DerUtf8String ContentDescription + { + get { return contentDescription; } + } + + /** + *
+		 * ContentHints ::= SEQUENCE {
+		 *   contentDescription UTF8String (SIZE (1..MAX)) OPTIONAL,
+		 *   contentType ContentType }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(contentDescription); + v.Add(contentType); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs.meta new file mode 100644 index 00000000..c49455d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e9433cbc49e0f2049b844cfe16f2e5a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentHints.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs new file mode 100644 index 00000000..747c0168 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class ContentIdentifier + : Asn1Encodable + { + private Asn1OctetString value; + + public static ContentIdentifier GetInstance( + object o) + { + if (o == null || o is ContentIdentifier) + { + return (ContentIdentifier) o; + } + + if (o is Asn1OctetString) + { + return new ContentIdentifier((Asn1OctetString) o); + } + + throw new ArgumentException( + "unknown object in 'ContentIdentifier' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(o) + "."); + } + + /** + * Create from OCTET STRING whose octets represent the identifier. + */ + public ContentIdentifier( + Asn1OctetString value) + { + this.value = value; + } + + /** + * Create from byte array representing the identifier. + */ + public ContentIdentifier( + byte[] value) + : this(new DerOctetString(value)) + { + } + + public Asn1OctetString Value + { + get { return value; } + } + + /** + * The definition of ContentIdentifier is + *
+		 * ContentIdentifier ::=  OCTET STRING
+		 * 
+ * id-aa-contentIdentifier OBJECT IDENTIFIER ::= { iso(1) + * member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) + * smime(16) id-aa(2) 7 } + */ + public override Asn1Object ToAsn1Object() + { + return value; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs.meta new file mode 100644 index 00000000..8e2df9cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d718fb70d08b26d4793c1a8b738d1cf7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ContentIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs new file mode 100644 index 00000000..be1f8169 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class EssCertID + : Asn1Encodable + { + private Asn1OctetString certHash; + private IssuerSerial issuerSerial; + + public static EssCertID GetInstance( + object o) + { + if (o == null || o is EssCertID) + { + return (EssCertID) o; + } + + if (o is Asn1Sequence) + { + return new EssCertID((Asn1Sequence) o); + } + + throw new ArgumentException( + "unknown object in 'EssCertID' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(o) + "."); + } + + /** + * constructor + */ + public EssCertID( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + this.certHash = Asn1OctetString.GetInstance(seq[0]); + + if (seq.Count > 1) + { + issuerSerial = IssuerSerial.GetInstance(seq[1]); + } + } + + public EssCertID( + byte[] hash) + { + certHash = new DerOctetString(hash); + } + + public EssCertID( + byte[] hash, + IssuerSerial issuerSerial) + { + this.certHash = new DerOctetString(hash); + this.issuerSerial = issuerSerial; + } + + public byte[] GetCertHash() + { + return certHash.GetOctets(); + } + + public IssuerSerial IssuerSerial + { + get { return issuerSerial; } + } + + /** + *
+		 * EssCertID ::= SEQUENCE {
+		 *     certHash Hash,
+		 *     issuerSerial IssuerSerial OPTIONAL }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certHash); + v.AddOptional(issuerSerial); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs.meta new file mode 100644 index 00000000..e45922c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d12b9037daa67e4a850a9f040b538dc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs new file mode 100644 index 00000000..0ff5213c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class EssCertIDv2 + : Asn1Encodable + { + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly byte[] certHash; + private readonly IssuerSerial issuerSerial; + + private static readonly AlgorithmIdentifier DefaultAlgID = new AlgorithmIdentifier( + NistObjectIdentifiers.IdSha256); + + public static EssCertIDv2 GetInstance(object obj) + { + if (obj == null) + return null; + EssCertIDv2 existing = obj as EssCertIDv2; + if (existing != null) + return existing; + return new EssCertIDv2(Asn1Sequence.GetInstance(obj)); + } + + private EssCertIDv2( + Asn1Sequence seq) + { + if (seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + int count = 0; + + if (seq[0] is Asn1OctetString) + { + // Default value + this.hashAlgorithm = DefaultAlgID; + } + else + { + this.hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[count++].ToAsn1Object()); + } + + this.certHash = Asn1OctetString.GetInstance(seq[count++].ToAsn1Object()).GetOctets(); + + if (seq.Count > count) + { + this.issuerSerial = IssuerSerial.GetInstance( + Asn1Sequence.GetInstance(seq[count].ToAsn1Object())); + } + } + + public EssCertIDv2(byte[] certHash) + : this(null, certHash, null) + { + } + + public EssCertIDv2( + AlgorithmIdentifier algId, + byte[] certHash) + : this(algId, certHash, null) + { + } + + public EssCertIDv2( + byte[] certHash, + IssuerSerial issuerSerial) + : this(null, certHash, issuerSerial) + { + } + + public EssCertIDv2( + AlgorithmIdentifier algId, + byte[] certHash, + IssuerSerial issuerSerial) + { + if (algId == null) + { + // Default value + this.hashAlgorithm = DefaultAlgID; + } + else + { + this.hashAlgorithm = algId; + } + + this.certHash = certHash; + this.issuerSerial = issuerSerial; + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return this.hashAlgorithm; } + } + + public byte[] GetCertHash() + { + return Arrays.Clone(certHash); + } + + public IssuerSerial IssuerSerial + { + get { return issuerSerial; } + } + + /** + *
+         * EssCertIDv2 ::=  SEQUENCE {
+         *     hashAlgorithm     AlgorithmIdentifier
+         *              DEFAULT {algorithm id-sha256},
+         *     certHash          Hash,
+         *     issuerSerial      IssuerSerial OPTIONAL
+         * }
+         *
+         * Hash ::= OCTET STRING
+         *
+         * IssuerSerial ::= SEQUENCE {
+         *     issuer         GeneralNames,
+         *     serialNumber   CertificateSerialNumber
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (!hashAlgorithm.Equals(DefaultAlgID)) + { + v.Add(hashAlgorithm); + } + + v.Add(new DerOctetString(certHash).ToAsn1Object()); + v.AddOptional(issuerSerial); + return new DerSequence(v); + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs.meta new file mode 100644 index 00000000..919c3655 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa48900c0800a3546920b01edb65a5b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/ESSCertIDv2.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs new file mode 100644 index 00000000..e13394e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class SigningCertificate + : Asn1Encodable + { + private Asn1Sequence certs, policies; + + public static SigningCertificate GetInstance( + object o) + { + if (o == null || o is SigningCertificate) + { + return (SigningCertificate) o; + } + + if (o is Asn1Sequence) + { + return new SigningCertificate((Asn1Sequence) o); + } + + throw new ArgumentException( + "unknown object in 'SigningCertificate' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(o) + "."); + } + + /** + * constructors + */ + public SigningCertificate( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + this.certs = Asn1Sequence.GetInstance(seq[0]); + + if (seq.Count > 1) + { + this.policies = Asn1Sequence.GetInstance(seq[1]); + } + } + + public SigningCertificate( + EssCertID essCertID) + { + certs = new DerSequence(essCertID); + } + + public EssCertID[] GetCerts() + { + EssCertID[] cs = new EssCertID[certs.Count]; + + for (int i = 0; i != certs.Count; i++) + { + cs[i] = EssCertID.GetInstance(certs[i]); + } + + return cs; + } + + public PolicyInformation[] GetPolicies() + { + if (policies == null) + { + return null; + } + + PolicyInformation[] ps = new PolicyInformation[policies.Count]; + + for (int i = 0; i != policies.Count; i++) + { + ps[i] = PolicyInformation.GetInstance(policies[i]); + } + + return ps; + } + + /** + * The definition of SigningCertificate is + *
+		 * SigningCertificate ::=  SEQUENCE {
+		 *      certs        SEQUENCE OF EssCertID,
+		 *      policies     SEQUENCE OF PolicyInformation OPTIONAL
+		 * }
+		 * 
+ * id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1) + * member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) + * smime(16) id-aa(2) 12 } + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certs); + v.AddOptional(policies); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs.meta new file mode 100644 index 00000000..848ae0e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e70e8e77c86e9cf47bf645362e801f88 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs new file mode 100644 index 00000000..a93d9bd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess +{ + public class SigningCertificateV2 + : Asn1Encodable + { + private readonly Asn1Sequence certs; + private readonly Asn1Sequence policies; + + public static SigningCertificateV2 GetInstance( + object o) + { + if (o == null || o is SigningCertificateV2) + return (SigningCertificateV2) o; + + if (o is Asn1Sequence) + return new SigningCertificateV2((Asn1Sequence) o); + + throw new ArgumentException( + "unknown object in 'SigningCertificateV2' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(o) + "."); + } + + private SigningCertificateV2( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.certs = Asn1Sequence.GetInstance(seq[0].ToAsn1Object()); + + if (seq.Count > 1) + { + this.policies = Asn1Sequence.GetInstance(seq[1].ToAsn1Object()); + } + } + + public SigningCertificateV2( + EssCertIDv2 cert) + { + this.certs = new DerSequence(cert); + } + + public SigningCertificateV2( + EssCertIDv2[] certs) + { + this.certs = new DerSequence(certs); + } + + public SigningCertificateV2( + EssCertIDv2[] certs, + PolicyInformation[] policies) + { + this.certs = new DerSequence(certs); + + if (policies != null) + { + this.policies = new DerSequence(policies); + } + } + + public EssCertIDv2[] GetCerts() + { + EssCertIDv2[] certIds = new EssCertIDv2[certs.Count]; + for (int i = 0; i != certs.Count; i++) + { + certIds[i] = EssCertIDv2.GetInstance(certs[i]); + } + return certIds; + } + + public PolicyInformation[] GetPolicies() + { + if (policies == null) + return null; + + PolicyInformation[] policyInformations = new PolicyInformation[policies.Count]; + for (int i = 0; i != policies.Count; i++) + { + policyInformations[i] = PolicyInformation.GetInstance(policies[i]); + } + return policyInformations; + } + + /** + * The definition of SigningCertificateV2 is + *
+         * SigningCertificateV2 ::=  SEQUENCE {
+         *      certs        SEQUENCE OF EssCertIDv2,
+         *      policies     SEQUENCE OF PolicyInformation OPTIONAL
+         * }
+         * 
+ * id-aa-signingCertificateV2 OBJECT IDENTIFIER ::= { iso(1) + * member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) + * smime(16) id-aa(2) 47 } + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certs); + v.AddOptional(policies); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs.meta new file mode 100644 index 00000000..666b0a8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 06783a2331c183e42a9ebe87154438a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ess/SigningCertificateV2.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm.meta new file mode 100644 index 00000000..5a53ec54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 313fbff6073b42244bfa8ea7df584644 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs new file mode 100644 index 00000000..5b402711 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs @@ -0,0 +1,177 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM +{ + /// Elliptic curve registry for GM. + public static class GMNamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class SM2P256V1Holder + : X9ECParametersHolder + { + private SM2P256V1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SM2P256V1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger p = FromHex("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFC"); + BigInteger b = FromHex("28E9FA9E9D9F5E344D5A9E4BCF6509A7F39789F515AB8F92DDBCBD414D940E93"); + BigInteger n = FromHex("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFF7203DF6B21C6052B53BBF40939D54123"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0432C4AE2C1F1981195F9904466A39C9948FE30BBFF2660BE1715A4589334C74C7BC3736A2F4F6779C59BDCEE36B692153D0A9877CC62A474002DF32E52139F0A0"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class WapiP192V1Holder + : X9ECParametersHolder + { + private WapiP192V1Holder() { } + + internal static readonly X9ECParametersHolder Instance = new WapiP192V1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger p = FromHex("BDB6F4FE3E8B1D9E0DA8C0D46F4C318CEFE4AFE3B6B8551F"); + BigInteger a = FromHex("BB8E5E8FBC115E139FE6A814FE48AAA6F0ADA1AA5DF91985"); + BigInteger b = FromHex("1854BEBDC31B21B7AEFC80AB0ECD10D5B1B3308E6DBF11C1"); + BigInteger n = FromHex("BDB6F4FE3E8B1D9E0DA8C0D40FC962195DFAE76F56564677"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "044AD5F7048DE709AD51236DE65E4D4B482C836DC6E410664002BB3A02D4AAADACAE24817A4CA3A1B014B5270432DB27D2"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static GMNamedCurves() + { + DefineCurve("wapip192v1", GMObjectIdentifiers.wapip192v1, WapiP192V1Holder.Instance); + DefineCurve("sm2p256v1", GMObjectIdentifiers.sm2p256v1, SM2P256V1Holder.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs.meta new file mode 100644 index 00000000..5a626f20 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc5f0323c7d1d374c99b8e0fd3115d74 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMNamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs new file mode 100644 index 00000000..210d27ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM +{ + public abstract class GMObjectIdentifiers + { + public static readonly DerObjectIdentifier sm_scheme = new DerObjectIdentifier("1.2.156.10197.1"); + + public static readonly DerObjectIdentifier sm6_ecb = sm_scheme.Branch("101.1"); + public static readonly DerObjectIdentifier sm6_cbc = sm_scheme.Branch("101.2"); + public static readonly DerObjectIdentifier sm6_ofb128 = sm_scheme.Branch("101.3"); + public static readonly DerObjectIdentifier sm6_cfb128 = sm_scheme.Branch("101.4"); + + public static readonly DerObjectIdentifier sm1_ecb = sm_scheme.Branch("102.1"); + public static readonly DerObjectIdentifier sm1_cbc = sm_scheme.Branch("102.2"); + public static readonly DerObjectIdentifier sm1_ofb128 = sm_scheme.Branch("102.3"); + public static readonly DerObjectIdentifier sm1_cfb128 = sm_scheme.Branch("102.4"); + public static readonly DerObjectIdentifier sm1_cfb1 = sm_scheme.Branch("102.5"); + public static readonly DerObjectIdentifier sm1_cfb8 = sm_scheme.Branch("102.6"); + + public static readonly DerObjectIdentifier ssf33_ecb = sm_scheme.Branch("103.1"); + public static readonly DerObjectIdentifier ssf33_cbc = sm_scheme.Branch("103.2"); + public static readonly DerObjectIdentifier ssf33_ofb128 = sm_scheme.Branch("103.3"); + public static readonly DerObjectIdentifier ssf33_cfb128 = sm_scheme.Branch("103.4"); + public static readonly DerObjectIdentifier ssf33_cfb1 = sm_scheme.Branch("103.5"); + public static readonly DerObjectIdentifier ssf33_cfb8 = sm_scheme.Branch("103.6"); + + public static readonly DerObjectIdentifier sms4_ecb = sm_scheme.Branch("104.1"); + public static readonly DerObjectIdentifier sms4_cbc = sm_scheme.Branch("104.2"); + public static readonly DerObjectIdentifier sms4_ofb128 = sm_scheme.Branch("104.3"); + public static readonly DerObjectIdentifier sms4_cfb128 = sm_scheme.Branch("104.4"); + public static readonly DerObjectIdentifier sms4_cfb1 = sm_scheme.Branch("104.5"); + public static readonly DerObjectIdentifier sms4_cfb8 = sm_scheme.Branch("104.6"); + public static readonly DerObjectIdentifier sms4_ctr = sm_scheme.Branch("104.7"); + public static readonly DerObjectIdentifier sms4_gcm = sm_scheme.Branch("104.8"); + public static readonly DerObjectIdentifier sms4_ccm = sm_scheme.Branch("104.9"); + public static readonly DerObjectIdentifier sms4_xts = sm_scheme.Branch("104.10"); + public static readonly DerObjectIdentifier sms4_wrap = sm_scheme.Branch("104.11"); + public static readonly DerObjectIdentifier sms4_wrap_pad = sm_scheme.Branch("104.12"); + public static readonly DerObjectIdentifier sms4_ocb = sm_scheme.Branch("104.100"); + + public static readonly DerObjectIdentifier sm5 = sm_scheme.Branch("201"); + + public static readonly DerObjectIdentifier sm2p256v1 = sm_scheme.Branch("301"); + public static readonly DerObjectIdentifier sm2sign = sm_scheme.Branch("301.1"); + public static readonly DerObjectIdentifier sm2exchange = sm_scheme.Branch("301.2"); + public static readonly DerObjectIdentifier sm2encrypt = sm_scheme.Branch("301.3"); + + public static readonly DerObjectIdentifier wapip192v1 = sm_scheme.Branch("301.101"); + + public static readonly DerObjectIdentifier sm2encrypt_recommendedParameters = sm2encrypt.Branch("1"); + public static readonly DerObjectIdentifier sm2encrypt_specifiedParameters = sm2encrypt.Branch("2"); + public static readonly DerObjectIdentifier sm2encrypt_with_sm3 = sm2encrypt.Branch("2.1"); + public static readonly DerObjectIdentifier sm2encrypt_with_sha1 = sm2encrypt.Branch("2.2"); + public static readonly DerObjectIdentifier sm2encrypt_with_sha224 = sm2encrypt.Branch("2.3"); + public static readonly DerObjectIdentifier sm2encrypt_with_sha256 = sm2encrypt.Branch("2.4"); + public static readonly DerObjectIdentifier sm2encrypt_with_sha384 = sm2encrypt.Branch("2.5"); + public static readonly DerObjectIdentifier sm2encrypt_with_sha512 = sm2encrypt.Branch("2.6"); + public static readonly DerObjectIdentifier sm2encrypt_with_rmd160 = sm2encrypt.Branch("2.7"); + public static readonly DerObjectIdentifier sm2encrypt_with_whirlpool = sm2encrypt.Branch("2.8"); + public static readonly DerObjectIdentifier sm2encrypt_with_blake2b512 = sm2encrypt.Branch("2.9"); + public static readonly DerObjectIdentifier sm2encrypt_with_blake2s256 = sm2encrypt.Branch("2.10"); + public static readonly DerObjectIdentifier sm2encrypt_with_md5 = sm2encrypt.Branch("2.11"); + + public static readonly DerObjectIdentifier id_sm9PublicKey = sm_scheme.Branch("302"); + public static readonly DerObjectIdentifier sm9sign = sm_scheme.Branch("302.1"); + public static readonly DerObjectIdentifier sm9keyagreement = sm_scheme.Branch("302.2"); + public static readonly DerObjectIdentifier sm9encrypt = sm_scheme.Branch("302.3"); + + public static readonly DerObjectIdentifier sm3 = sm_scheme.Branch("401"); + + public static readonly DerObjectIdentifier hmac_sm3 = sm3.Branch("2"); + + public static readonly DerObjectIdentifier sm2sign_with_sm3 = sm_scheme.Branch("501"); + public static readonly DerObjectIdentifier sm2sign_with_sha1 = sm_scheme.Branch("502"); + public static readonly DerObjectIdentifier sm2sign_with_sha256 = sm_scheme.Branch("503"); + public static readonly DerObjectIdentifier sm2sign_with_sha512 = sm_scheme.Branch("504"); + public static readonly DerObjectIdentifier sm2sign_with_sha224 = sm_scheme.Branch("505"); + public static readonly DerObjectIdentifier sm2sign_with_sha384 = sm_scheme.Branch("506"); + public static readonly DerObjectIdentifier sm2sign_with_rmd160 = sm_scheme.Branch("507"); + public static readonly DerObjectIdentifier sm2sign_with_whirlpool = sm_scheme.Branch("520"); + public static readonly DerObjectIdentifier sm2sign_with_blake2b512 = sm_scheme.Branch("521"); + public static readonly DerObjectIdentifier sm2sign_with_blake2s256 = sm_scheme.Branch("522"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs.meta new file mode 100644 index 00000000..b41cc38a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0fde6a1bc666ac241ada3f5f8e2c6e90 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gm/GMObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu.meta new file mode 100644 index 00000000..8e608a2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ca80dc3c12ce0d745add4d2598bd0f28 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs new file mode 100644 index 00000000..96cc5759 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Gnu +{ + public abstract class GnuObjectIdentifiers + { + public static readonly DerObjectIdentifier Gnu = new DerObjectIdentifier("1.3.6.1.4.1.11591.1"); // GNU Radius + public static readonly DerObjectIdentifier GnuPG = new DerObjectIdentifier("1.3.6.1.4.1.11591.2"); // GnuPG (Ägypten) + public static readonly DerObjectIdentifier Notation = new DerObjectIdentifier("1.3.6.1.4.1.11591.2.1"); // notation + public static readonly DerObjectIdentifier PkaAddress = new DerObjectIdentifier("1.3.6.1.4.1.11591.2.1.1"); // pkaAddress + public static readonly DerObjectIdentifier GnuRadar = new DerObjectIdentifier("1.3.6.1.4.1.11591.3"); // GNU Radar + public static readonly DerObjectIdentifier DigestAlgorithm = new DerObjectIdentifier("1.3.6.1.4.1.11591.12"); // digestAlgorithm + public static readonly DerObjectIdentifier Tiger192 = new DerObjectIdentifier("1.3.6.1.4.1.11591.12.2"); // TIGER/192 + public static readonly DerObjectIdentifier EncryptionAlgorithm = new DerObjectIdentifier("1.3.6.1.4.1.11591.13"); // encryptionAlgorithm + public static readonly DerObjectIdentifier Serpent = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2"); // Serpent + public static readonly DerObjectIdentifier Serpent128Ecb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.1"); // Serpent-128-ECB + public static readonly DerObjectIdentifier Serpent128Cbc = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.2"); // Serpent-128-CBC + public static readonly DerObjectIdentifier Serpent128Ofb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.3"); // Serpent-128-OFB + public static readonly DerObjectIdentifier Serpent128Cfb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.4"); // Serpent-128-CFB + public static readonly DerObjectIdentifier Serpent192Ecb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.21"); // Serpent-192-ECB + public static readonly DerObjectIdentifier Serpent192Cbc = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.22"); // Serpent-192-CBC + public static readonly DerObjectIdentifier Serpent192Ofb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.23"); // Serpent-192-OFB + public static readonly DerObjectIdentifier Serpent192Cfb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.24"); // Serpent-192-CFB + public static readonly DerObjectIdentifier Serpent256Ecb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.41"); // Serpent-256-ECB + public static readonly DerObjectIdentifier Serpent256Cbc = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.42"); // Serpent-256-CBC + public static readonly DerObjectIdentifier Serpent256Ofb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.43"); // Serpent-256-OFB + public static readonly DerObjectIdentifier Serpent256Cfb = new DerObjectIdentifier("1.3.6.1.4.1.11591.13.2.44"); // Serpent-256-CFB + public static readonly DerObjectIdentifier Crc = new DerObjectIdentifier("1.3.6.1.4.1.11591.14"); // CRC algorithms + public static readonly DerObjectIdentifier Crc32 = new DerObjectIdentifier("1.3.6.1.4.1.11591.14.1"); // CRC 32 + + /** 1.3.6.1.4.1.11591.15 - ellipticCurve */ + public static readonly DerObjectIdentifier EllipticCurve = new DerObjectIdentifier("1.3.6.1.4.1.11591.15"); + + public static readonly DerObjectIdentifier Ed25519 = EllipticCurve.Branch("1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs.meta new file mode 100644 index 00000000..ad597889 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4376ce243d281454ea3ec0ebc759f9f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/gnu/GNUObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana.meta new file mode 100644 index 00000000..20062d1d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c9d033038e0d12244a24a4625ea3510d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs new file mode 100644 index 00000000..433e9cce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Iana +{ + public abstract class IanaObjectIdentifiers + { + // id-SHA1 OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) ipsec(8) isakmpOakley(1)} + // + + public static readonly DerObjectIdentifier IsakmpOakley = new DerObjectIdentifier("1.3.6.1.5.5.8.1"); + + public static readonly DerObjectIdentifier HmacMD5 = new DerObjectIdentifier(IsakmpOakley + ".1"); + public static readonly DerObjectIdentifier HmacSha1 = new DerObjectIdentifier(IsakmpOakley + ".2"); + + public static readonly DerObjectIdentifier HmacTiger = new DerObjectIdentifier(IsakmpOakley + ".3"); + + public static readonly DerObjectIdentifier HmacRipeMD160 = new DerObjectIdentifier(IsakmpOakley + ".4"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs.meta new file mode 100644 index 00000000..ec4a803a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a525be4db9035d24b9a04b721ce0eb4f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/iana/IANAObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao.meta new file mode 100644 index 00000000..be3eefff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a822227ad184de545b619b843a09c3c2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs new file mode 100644 index 00000000..73013aa8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao +{ + /** + * The CscaMasterList object. This object can be wrapped in a + * CMSSignedData to be published in LDAP. + * + *
+	 * CscaMasterList ::= SEQUENCE {
+	 *   version                CscaMasterListVersion,
+	 *   certList               SET OF Certificate }
+	 *   
+	 * CscaMasterListVersion :: INTEGER {v0(0)}
+	 * 
+ */ + public class CscaMasterList + : Asn1Encodable + { + private DerInteger version = new DerInteger(0); + private X509CertificateStructure[] certList; + + public static CscaMasterList GetInstance( + object obj) + { + if (obj is CscaMasterList) + return (CscaMasterList)obj; + + if (obj != null) + return new CscaMasterList(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private CscaMasterList( + Asn1Sequence seq) + { + if (seq == null || seq.Count == 0) + throw new ArgumentException("null or empty sequence passed."); + + if (seq.Count != 2) + throw new ArgumentException("Incorrect sequence size: " + seq.Count); + + this.version = DerInteger.GetInstance(seq[0]); + + Asn1Set certSet = Asn1Set.GetInstance(seq[1]); + + this.certList = new X509CertificateStructure[certSet.Count]; + for (int i = 0; i < certList.Length; i++) + { + certList[i] = X509CertificateStructure.GetInstance(certSet[i]); + } + } + + public CscaMasterList( + X509CertificateStructure[] certStructs) + { + certList = CopyCertList(certStructs); + } + + public virtual int Version + { + get { return version.IntValueExact; } + } + + public X509CertificateStructure[] GetCertStructs() + { + return CopyCertList(certList); + } + + private static X509CertificateStructure[] CopyCertList(X509CertificateStructure[] orig) + { + return (X509CertificateStructure[])orig.Clone(); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(version, new DerSet(certList)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs.meta new file mode 100644 index 00000000..4a3c3c62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f5d7fe5ed16a1714997106a145af7c88 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/CscaMasterList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs new file mode 100644 index 00000000..ccb3b522 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs @@ -0,0 +1,85 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao +{ + /** + * The DataGroupHash object. + *
+    * DataGroupHash  ::=  SEQUENCE {
+    *      dataGroupNumber         DataGroupNumber,
+    *      dataGroupHashValue     OCTET STRING }
+    *
+    * DataGroupNumber ::= INTEGER {
+    *         dataGroup1    (1),
+    *         dataGroup1    (2),
+    *         dataGroup1    (3),
+    *         dataGroup1    (4),
+    *         dataGroup1    (5),
+    *         dataGroup1    (6),
+    *         dataGroup1    (7),
+    *         dataGroup1    (8),
+    *         dataGroup1    (9),
+    *         dataGroup1    (10),
+    *         dataGroup1    (11),
+    *         dataGroup1    (12),
+    *         dataGroup1    (13),
+    *         dataGroup1    (14),
+    *         dataGroup1    (15),
+    *         dataGroup1    (16) }
+    *
+    * 
+ */ + public class DataGroupHash + : Asn1Encodable + { + private readonly DerInteger dataGroupNumber; + private readonly Asn1OctetString dataGroupHashValue; + + public static DataGroupHash GetInstance(object obj) + { + if (obj is DataGroupHash) + return (DataGroupHash)obj; + + if (obj != null) + return new DataGroupHash(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private DataGroupHash(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.dataGroupNumber = DerInteger.GetInstance(seq[0]); + this.dataGroupHashValue = Asn1OctetString.GetInstance(seq[1]); + } + + public DataGroupHash( + int dataGroupNumber, + Asn1OctetString dataGroupHashValue) + { + this.dataGroupNumber = new DerInteger(dataGroupNumber); + this.dataGroupHashValue = dataGroupHashValue; + } + + public int DataGroupNumber + { + get { return dataGroupNumber.IntValueExact; } + } + + public Asn1OctetString DataGroupHashValue + { + get { return dataGroupHashValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(dataGroupNumber, dataGroupHashValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs.meta new file mode 100644 index 00000000..755ebf6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b508919f8fc8bd49acad65a6400ae3d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/DataGroupHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs new file mode 100644 index 00000000..0573b1da --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao +{ + public abstract class IcaoObjectIdentifiers + { + // + // base id + // + public static readonly DerObjectIdentifier IdIcao = new DerObjectIdentifier("2.23.136"); + + public static readonly DerObjectIdentifier IdIcaoMrtd = IdIcao.Branch("1"); + public static readonly DerObjectIdentifier IdIcaoMrtdSecurity = IdIcaoMrtd.Branch("1"); + + // LDS security object, see ICAO Doc 9303-Volume 2-Section IV-A3.2 + public static readonly DerObjectIdentifier IdIcaoLdsSecurityObject = IdIcaoMrtdSecurity.Branch("1"); + + // CSCA master list, see TR CSCA Countersigning and Master List issuance + public static readonly DerObjectIdentifier IdIcaoCscaMasterList = IdIcaoMrtdSecurity.Branch("2"); + public static readonly DerObjectIdentifier IdIcaoCscaMasterListSigningKey = IdIcaoMrtdSecurity.Branch("3"); + + // document type list, see draft TR LDS and PKI Maintenance, par. 3.2.1 + public static readonly DerObjectIdentifier IdIcaoDocumentTypeList = IdIcaoMrtdSecurity.Branch("4"); + + // Active Authentication protocol, see draft TR LDS and PKI Maintenance, + // par. 5.2.2 + public static readonly DerObjectIdentifier IdIcaoAAProtocolObject = IdIcaoMrtdSecurity.Branch("5"); + + // CSCA name change and key reoll-over, see draft TR LDS and PKI + // Maintenance, par. 3.2.1 + public static readonly DerObjectIdentifier IdIcaoExtensions = IdIcaoMrtdSecurity.Branch("6"); + public static readonly DerObjectIdentifier IdIcaoExtensionsNamechangekeyrollover = IdIcaoExtensions.Branch("1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs.meta new file mode 100644 index 00000000..5d0f6c87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d745e3b72aeb38e4f9740ac8712594f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/ICAOObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs new file mode 100644 index 00000000..23e24e84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs @@ -0,0 +1,140 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao +{ + /** + * The LDSSecurityObject object (V1.8). + *
+	 * LDSSecurityObject ::= SEQUENCE {
+	 *   version                LDSSecurityObjectVersion,
+	 *   hashAlgorithm          DigestAlgorithmIdentifier,
+	 *   dataGroupHashValues    SEQUENCE SIZE (2..ub-DataGroups) OF DataHashGroup,
+	 *   ldsVersionInfo         LDSVersionInfo OPTIONAL
+	 *     -- if present, version MUST be v1 }
+	 *
+	 * DigestAlgorithmIdentifier ::= AlgorithmIdentifier,
+	 *
+	 * LDSSecurityObjectVersion :: INTEGER {V0(0)}
+	 * 
+ */ + public class LdsSecurityObject + : Asn1Encodable + { + public const int UBDataGroups = 16; + + private DerInteger version = new DerInteger(0); + private AlgorithmIdentifier digestAlgorithmIdentifier; + private DataGroupHash[] datagroupHash; + private LdsVersionInfo versionInfo; + + public static LdsSecurityObject GetInstance(object obj) + { + if (obj is LdsSecurityObject) + return (LdsSecurityObject)obj; + + if (obj != null) + return new LdsSecurityObject(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private LdsSecurityObject(Asn1Sequence seq) + { + if (seq == null || seq.Count == 0) + throw new ArgumentException("null or empty sequence passed."); + + var e = seq.GetEnumerator(); + + // version + e.MoveNext(); + version = DerInteger.GetInstance(e.Current); + // digestAlgorithmIdentifier + e.MoveNext(); + digestAlgorithmIdentifier = AlgorithmIdentifier.GetInstance(e.Current); + + e.MoveNext(); + Asn1Sequence datagroupHashSeq = Asn1Sequence.GetInstance(e.Current); + + if (version.HasValue(1)) + { + e.MoveNext(); + versionInfo = LdsVersionInfo.GetInstance(e.Current); + } + + CheckDatagroupHashSeqSize(datagroupHashSeq.Count); + + datagroupHash = new DataGroupHash[datagroupHashSeq.Count]; + for (int i= 0; i< datagroupHashSeq.Count; i++) + { + datagroupHash[i] = DataGroupHash.GetInstance(datagroupHashSeq[i]); + } + } + + public LdsSecurityObject( + AlgorithmIdentifier digestAlgorithmIdentifier, + DataGroupHash[] datagroupHash) + { + this.version = new DerInteger(0); + this.digestAlgorithmIdentifier = digestAlgorithmIdentifier; + this.datagroupHash = datagroupHash; + + CheckDatagroupHashSeqSize(datagroupHash.Length); + } + + + public LdsSecurityObject( + AlgorithmIdentifier digestAlgorithmIdentifier, + DataGroupHash[] datagroupHash, + LdsVersionInfo versionInfo) + { + this.version = new DerInteger(1); + this.digestAlgorithmIdentifier = digestAlgorithmIdentifier; + this.datagroupHash = datagroupHash; + this.versionInfo = versionInfo; + + CheckDatagroupHashSeqSize(datagroupHash.Length); + } + + private void CheckDatagroupHashSeqSize(int size) + { + if (size < 2 || size > UBDataGroups) + throw new ArgumentException("wrong size in DataGroupHashValues : not in (2.."+ UBDataGroups +")"); + } + + public BigInteger Version + { + get { return version.Value; } + } + + public AlgorithmIdentifier DigestAlgorithmIdentifier + { + get { return digestAlgorithmIdentifier; } + } + + public DataGroupHash[] GetDatagroupHash() + { + return datagroupHash; + } + + public LdsVersionInfo VersionInfo + { + get { return versionInfo; } + } + + public override Asn1Object ToAsn1Object() + { + DerSequence hashSeq = new DerSequence(datagroupHash); + + Asn1EncodableVector v = new Asn1EncodableVector(version, digestAlgorithmIdentifier, hashSeq); + v.AddOptional(versionInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs.meta new file mode 100644 index 00000000..a660f65d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 13e76aa13a3a04d41ad37460d35c2c7c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSSecurityObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs new file mode 100644 index 00000000..2eb805a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Icao +{ + public class LdsVersionInfo + : Asn1Encodable + { + private DerPrintableString ldsVersion; + private DerPrintableString unicodeVersion; + + public LdsVersionInfo(string ldsVersion, string unicodeVersion) + { + this.ldsVersion = new DerPrintableString(ldsVersion); + this.unicodeVersion = new DerPrintableString(unicodeVersion); + } + + private LdsVersionInfo(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("sequence wrong size for LDSVersionInfo", "seq"); + + this.ldsVersion = DerPrintableString.GetInstance(seq[0]); + this.unicodeVersion = DerPrintableString.GetInstance(seq[1]); + } + + public static LdsVersionInfo GetInstance(object obj) + { + if (obj is LdsVersionInfo) + return (LdsVersionInfo)obj; + + if (obj != null) + return new LdsVersionInfo(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public virtual string GetLdsVersion() + { + return ldsVersion.GetString(); + } + + public virtual string GetUnicodeVersion() + { + return unicodeVersion.GetString(); + } + + /** + *
+		 * LDSVersionInfo ::= SEQUENCE {
+		 *    ldsVersion PRINTABLE STRING
+		 *    unicodeVersion PRINTABLE STRING
+		 *  }
+		 * 
+ * @return + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(ldsVersion, unicodeVersion); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs.meta new file mode 100644 index 00000000..b3fad0d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a19ff095474efdb41945f53a3cd467eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/icao/LDSVersionInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt.meta new file mode 100644 index 00000000..a569f3cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 438c1c315dbc0594c8c4be527c4945d5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs new file mode 100644 index 00000000..ca243659 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt +{ + public abstract class IsisMttObjectIdentifiers + { + public static readonly DerObjectIdentifier IdIsisMtt = new DerObjectIdentifier("1.3.36.8"); + + public static readonly DerObjectIdentifier IdIsisMttCP = new DerObjectIdentifier(IdIsisMtt + ".1"); + + /** + * The id-isismtt-cp-accredited OID indicates that the certificate is a + * qualified certificate according to Directive 1999/93/EC of the European + * Parliament and of the Council of 13 December 1999 on a Community + * Framework for Electronic Signatures, which additionally conforms the + * special requirements of the SigG and has been issued by an accredited CA. + */ + public static readonly DerObjectIdentifier IdIsisMttCPAccredited = new DerObjectIdentifier(IdIsisMttCP + ".1"); + + public static readonly DerObjectIdentifier IdIsisMttAT = new DerObjectIdentifier(IdIsisMtt + ".3"); + + /** + * Certificate extensionDate of certificate generation + * + *
+		 *		DateOfCertGenSyntax ::= GeneralizedTime
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATDateOfCertGen = new DerObjectIdentifier(IdIsisMttAT + ".1"); + + /** + * Attribute to indicate that the certificate holder may sign in the name of + * a third person. May also be used as extension in a certificate. + */ + public static readonly DerObjectIdentifier IdIsisMttATProcuration = new DerObjectIdentifier(IdIsisMttAT + ".2"); + + /** + * Attribute to indicate admissions to certain professions. May be used as + * attribute in attribute certificate or as extension in a certificate + */ + public static readonly DerObjectIdentifier IdIsisMttATAdmission = new DerObjectIdentifier(IdIsisMttAT + ".3"); + + /** + * Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST + * be used in new certificates in place of the extension/attribute + * MonetaryLimit since January 1, 2004. For the sake of backward + * compatibility with certificates already in use, SigG conforming + * components MUST support MonetaryLimit (as well as QcEuLimitValue). + */ + public static readonly DerObjectIdentifier IdIsisMttATMonetaryLimit = new DerObjectIdentifier(IdIsisMttAT + ".4"); + + /** + * A declaration of majority. May be used as attribute in attribute + * certificate or as extension in a certificate + */ + public static readonly DerObjectIdentifier IdIsisMttATDeclarationOfMajority = new DerObjectIdentifier(IdIsisMttAT + ".5"); + + /** + * + * Serial number of the smart card containing the corresponding private key + * + *
+		 *		ICCSNSyntax ::= OCTET STRING (SIZE(8..20))
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATIccsn = new DerObjectIdentifier(IdIsisMttAT + ".6"); + + /** + * + * Reference for a file of a smartcard that stores the public key of this + * certificate and that is used as �security anchor�. + * + *
+		 *		PKReferenceSyntax ::= OCTET STRING (SIZE(20))
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATPKReference = new DerObjectIdentifier(IdIsisMttAT + ".7"); + + /** + * Some other restriction regarding the usage of this certificate. May be + * used as attribute in attribute certificate or as extension in a + * certificate. + * + *
+		 *		RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
+		 * 
+ * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Restriction + */ + public static readonly DerObjectIdentifier IdIsisMttATRestriction = new DerObjectIdentifier(IdIsisMttAT + ".8"); + + /** + * + * (Single)Request extension: Clients may include this extension in a + * (single) Request to request the responder to send the certificate in the + * response message along with the status information. Besides the LDAP + * service, this extension provides another mechanism for the distribution + * of certificates, which MAY optionally be provided by certificate + * repositories. + * + *
+		 *		RetrieveIfAllowed ::= BOOLEAN
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATRetrieveIfAllowed = new DerObjectIdentifier(IdIsisMttAT + ".9"); + + /** + * SingleOCSPResponse extension: The certificate requested by the client by + * inserting the RetrieveIfAllowed extension in the request, will be + * returned in this extension. + * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.RequestedCertificate + */ + public static readonly DerObjectIdentifier IdIsisMttATRequestedCertificate = new DerObjectIdentifier(IdIsisMttAT + ".10"); + + /** + * Base ObjectIdentifier for naming authorities + */ + public static readonly DerObjectIdentifier IdIsisMttATNamingAuthorities = new DerObjectIdentifier(IdIsisMttAT + ".11"); + + /** + * SingleOCSPResponse extension: Date, when certificate has been published + * in the directory and status information has become available. Currently, + * accrediting authorities enforce that SigG-conforming OCSP servers include + * this extension in the responses. + * + *
+		 *		CertInDirSince ::= GeneralizedTime
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATCertInDirSince = new DerObjectIdentifier(IdIsisMttAT + ".12"); + + /** + * Hash of a certificate in OCSP. + * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp.CertHash + */ + public static readonly DerObjectIdentifier IdIsisMttATCertHash = new DerObjectIdentifier(IdIsisMttAT + ".13"); + + /** + *
+		 *		NameAtBirth ::= DirectoryString(SIZE(1..64)
+		 * 
+ * + * Used in + * {@link Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SubjectDirectoryAttributes SubjectDirectoryAttributes} + */ + public static readonly DerObjectIdentifier IdIsisMttATNameAtBirth = new DerObjectIdentifier(IdIsisMttAT + ".14"); + + /** + * Some other information of non-restrictive nature regarding the usage of + * this certificate. May be used as attribute in atribute certificate or as + * extension in a certificate. + * + *
+		 *               AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
+		 * 
+ * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdditionalInformationSyntax + */ + public static readonly DerObjectIdentifier IdIsisMttATAdditionalInformation = new DerObjectIdentifier(IdIsisMttAT + ".15"); + + /** + * Indicates that an attribute certificate exists, which limits the + * usability of this public key certificate. Whenever verifying a signature + * with the help of this certificate, the content of the corresponding + * attribute certificate should be concerned. This extension MUST be + * included in a PKC, if a corresponding attribute certificate (having the + * PKC as base certificate) contains some attribute that restricts the + * usability of the PKC too. Attribute certificates with restricting content + * MUST always be included in the signed document. + * + *
+		 *		LiabilityLimitationFlagSyntax ::= BOOLEAN
+		 * 
+ */ + public static readonly DerObjectIdentifier IdIsisMttATLiabilityLimitationFlag = new DerObjectIdentifier("0.2.262.1.10.12.0"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs.meta new file mode 100644 index 00000000..dfadee8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c31166856664b3747998adc8ca633035 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ISISMTTObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp.meta new file mode 100644 index 00000000..bb71f39d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 56e51b11b6318274eaa908006ec522b6 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs new file mode 100644 index 00000000..ce464f2b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs @@ -0,0 +1,126 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp +{ + /** + * ISIS-MTT PROFILE: The responder may include this extension in a response to + * send the hash of the requested certificate to the responder. This hash is + * cryptographically bound to the certificate and serves as evidence that the + * certificate is known to the responder (i.e. it has been issued and is present + * in the directory). Hence, this extension is a means to provide a positive + * statement of availability as described in T8.[8]. As explained in T13.[1], + * clients may rely on this information to be able to validate signatures after + * the expiry of the corresponding certificate. Hence, clients MUST support this + * extension. If a positive statement of availability is to be delivered, this + * extension syntax and OID MUST be used. + *

+ *

+ *

+	*     CertHash ::= SEQUENCE {
+	*       hashAlgorithm AlgorithmIdentifier,
+	*       certificateHash OCTET STRING
+	*     }
+	* 
+ */ + public class CertHash + : Asn1Encodable + { + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly byte[] certificateHash; + + public static CertHash GetInstance( + object obj) + { + if (obj == null || obj is CertHash) + { + return (CertHash) obj; + } + + if (obj is Asn1Sequence) + { + return new CertHash((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type CertHash: + *

+ *

+		*     CertHash ::= SEQUENCE {
+		*       hashAlgorithm AlgorithmIdentifier,
+		*       certificateHash OCTET STRING
+		*     }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private CertHash( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + this.hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[0]); + this.certificateHash = DerOctetString.GetInstance(seq[1]).GetOctets(); + } + + /** + * Constructor from a given details. + * + * @param hashAlgorithm The hash algorithm identifier. + * @param certificateHash The hash of the whole DER encoding of the certificate. + */ + public CertHash( + AlgorithmIdentifier hashAlgorithm, + byte[] certificateHash) + { + if (hashAlgorithm == null) + throw new ArgumentNullException("hashAlgorithm"); + if (certificateHash == null) + throw new ArgumentNullException("certificateHash"); + + this.hashAlgorithm = hashAlgorithm; + this.certificateHash = (byte[]) certificateHash.Clone(); + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public byte[] CertificateHash + { + get { return (byte[]) certificateHash.Clone(); } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*     CertHash ::= SEQUENCE {
+		*       hashAlgorithm AlgorithmIdentifier,
+		*       certificateHash OCTET STRING
+		*     }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(hashAlgorithm, new DerOctetString(certificateHash)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs.meta new file mode 100644 index 00000000..b91c9890 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c599f67230568ed46878473f19edc18c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/CertHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs new file mode 100644 index 00000000..605fc102 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs @@ -0,0 +1,192 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.Ocsp +{ + /** + * ISIS-MTT-Optional: The certificate requested by the client by inserting the + * RetrieveIfAllowed extension in the request, will be returned in this + * extension. + *

+ * ISIS-MTT-SigG: The signature act allows publishing certificates only then, + * when the certificate owner gives his isExplicit permission. Accordingly, there + * may be �nondownloadable� certificates, about which the responder must provide + * status information, but MUST NOT include them in the response. Clients may + * get therefore the following three kind of answers on a single request + * including the RetrieveIfAllowed extension: + *

    + *
  • a) the responder supports the extension and is allowed to publish the + * certificate: RequestedCertificate returned including the requested + * certificate
  • + *
  • b) the responder supports the extension but is NOT allowed to publish + * the certificate: RequestedCertificate returned including an empty OCTET + * STRING
  • + *
  • c) the responder does not support the extension: RequestedCertificate is + * not included in the response
  • + *
+ * Clients requesting RetrieveIfAllowed MUST be able to handle these cases. If + * any of the OCTET STRING options is used, it MUST contain the DER encoding of + * the requested certificate. + *

+ *

+	*            RequestedCertificate ::= CHOICE {
+	*              Certificate Certificate,
+	*              publicKeyCertificate [0] EXPLICIT OCTET STRING,
+	*              attributeCertificate [1] EXPLICIT OCTET STRING
+	*            }
+	* 
+ */ + public class RequestedCertificate + : Asn1Encodable, IAsn1Choice + { + public enum Choice + { + Certificate = -1, + PublicKeyCertificate = 0, + AttributeCertificate = 1 + } + + private readonly X509CertificateStructure cert; + private readonly byte[] publicKeyCert; + private readonly byte[] attributeCert; + + public static RequestedCertificate GetInstance( + object obj) + { + if (obj == null || obj is RequestedCertificate) + { + return (RequestedCertificate) obj; + } + + if (obj is Asn1Sequence) + { + return new RequestedCertificate(X509CertificateStructure.GetInstance(obj)); + } + + if (obj is Asn1TaggedObject) + { + return new RequestedCertificate((Asn1TaggedObject) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static RequestedCertificate GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + if (!isExplicit) + throw new ArgumentException("choice item must be explicitly tagged"); + + return GetInstance(obj.GetObject()); + } + + private RequestedCertificate( + Asn1TaggedObject tagged) + { + switch ((Choice) tagged.TagNo) + { + case Choice.AttributeCertificate: + this.attributeCert = Asn1OctetString.GetInstance(tagged, true).GetOctets(); + break; + case Choice.PublicKeyCertificate: + this.publicKeyCert = Asn1OctetString.GetInstance(tagged, true).GetOctets(); + break; + default: + throw new ArgumentException("unknown tag number: " + tagged.TagNo); + } + } + + /** + * Constructor from a given details. + *

+ * Only one parameter can be given. All other must be null. + * + * @param certificate Given as Certificate + */ + public RequestedCertificate( + X509CertificateStructure certificate) + { + this.cert = certificate; + } + + public RequestedCertificate( + Choice type, + byte[] certificateOctets) + : this(new DerTaggedObject((int) type, new DerOctetString(certificateOctets))) + { + } + + public Choice Type + { + get + { + if (cert != null) + return Choice.Certificate; + + if (publicKeyCert != null) + return Choice.PublicKeyCertificate; + + return Choice.AttributeCertificate; + } + } + + public byte[] GetCertificateBytes() + { + if (cert != null) + { + try + { + return cert.GetEncoded(); + } + catch (IOException e) + { + throw new InvalidOperationException("can't decode certificate: " + e); + } + } + + if (publicKeyCert != null) + return publicKeyCert; + + return attributeCert; + } + + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*            RequestedCertificate ::= CHOICE {
+		*              Certificate Certificate,
+		*              publicKeyCertificate [0] EXPLICIT OCTET STRING,
+		*              attributeCertificate [1] EXPLICIT OCTET STRING
+		*            }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + if (publicKeyCert != null) + { + return new DerTaggedObject(0, new DerOctetString(publicKeyCert)); + } + + if (attributeCert != null) + { + return new DerTaggedObject(1, new DerOctetString(attributeCert)); + } + + return cert.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs.meta new file mode 100644 index 00000000..95196acf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ba2458c8f5cf77542a823ec99589d785 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/ocsp/RequestedCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509.meta new file mode 100644 index 00000000..2c142700 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3496fc8fa36fe3946931a61e02e78f0d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs new file mode 100644 index 00000000..64c37d0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Some other information of non-restrictive nature regarding the usage of this + * certificate. + * + *
+	*    AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
+	* 
+ */ + public class AdditionalInformationSyntax + : Asn1Encodable + { + private readonly DirectoryString information; + + public static AdditionalInformationSyntax GetInstance( + object obj) + { + if (obj is AdditionalInformationSyntax) + return (AdditionalInformationSyntax) obj; + + if (obj is IAsn1String) + return new AdditionalInformationSyntax(DirectoryString.GetInstance(obj)); + + throw new ArgumentException("Unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private AdditionalInformationSyntax( + DirectoryString information) + { + this.information = information; + } + + /** + * Constructor from a given details. + * + * @param information The describtion of the information. + */ + public AdditionalInformationSyntax( + string information) + { + this.information = new DirectoryString(information); + } + + public virtual DirectoryString Information + { + get { return information; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*   AdditionalInformationSyntax ::= DirectoryString (SIZE(1..2048))
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return information.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs.meta new file mode 100644 index 00000000..55018919 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d06e00a692047041bc68c25afa2929e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdditionalInformationSyntax.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs new file mode 100644 index 00000000..b0d22cda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs @@ -0,0 +1,279 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Attribute to indicate admissions to certain professions. + *

+ *

+    *     AdmissionSyntax ::= SEQUENCE
+    *     {
+    *       admissionAuthority GeneralName OPTIONAL,
+    *       contentsOfAdmissions SEQUENCE OF Admissions
+    *     }
+    * 

+ * Admissions ::= SEQUENCE + * { + * admissionAuthority [0] EXPLICIT GeneralName OPTIONAL + * namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL + * professionInfos SEQUENCE OF ProfessionInfo + * } + *

+ * NamingAuthority ::= SEQUENCE + * { + * namingAuthorityId OBJECT IDENTIFIER OPTIONAL, + * namingAuthorityUrl IA5String OPTIONAL, + * namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL + * } + *

+ * ProfessionInfo ::= SEQUENCE + * { + * namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL, + * professionItems SEQUENCE OF DirectoryString (SIZE(1..128)), + * professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL, + * registrationNumber PrintableString(SIZE(1..128)) OPTIONAL, + * addProfessionInfo OCTET STRING OPTIONAL + * } + *

+ *

+ *

+ * ISIS-MTT PROFILE: The relatively complex structure of AdmissionSyntax + * supports the following concepts and requirements: + *

    + *
  • External institutions (e.g. professional associations, chambers, unions, + * administrative bodies, companies, etc.), which are responsible for granting + * and verifying professional admissions, are indicated by means of the data + * field admissionAuthority. An admission authority is indicated by a + * GeneralName object. Here an X.501 directory name (distinguished name) can be + * indicated in the field directoryName, a URL address can be indicated in the + * field uniformResourceIdentifier, and an object identifier can be indicated in + * the field registeredId.
  • + *
  • The names of authorities which are responsible for the administration of + * title registers are indicated in the data field namingAuthority. The name of + * the authority can be identified by an object identifier in the field + * namingAuthorityId, by means of a text string in the field + * namingAuthorityText, by means of a URL address in the field + * namingAuthorityUrl, or by a combination of them. For example, the text string + * can contain the name of the authority, the country and the name of the title + * register. The URL-option refers to a web page which contains lists with + * officially registered professions (text and possibly OID) as well as + * further information on these professions. Object identifiers for the + * component namingAuthorityId are grouped under the OID-branch + * id-isis-at-namingAuthorities and must be applied for.
  • + *
  • See http://www.teletrust.de/anwend.asp?Id=30200&Sprache=E_&HomePG=0 + * for an application form and http://www.teletrust.de/links.asp?id=30220,11 + * for an overview of registered naming authorities.
  • + *
  • By means of the data type ProfessionInfo certain professions, + * specializations, disciplines, fields of activity, etc. are identified. A + * profession is represented by one or more text strings, resp. profession OIDs + * in the fields professionItems and professionOIDs and by a registration number + * in the field registrationNumber. An indication in text form must always be + * present, whereas the other indications are optional. The component + * addProfessionInfo may contain additional applicationspecific information in + * DER-encoded form.
  • + *
+ *

+ * By means of different namingAuthority-OIDs or profession OIDs hierarchies of + * professions, specializations, disciplines, fields of activity, etc. can be + * expressed. The issuing admission authority should always be indicated (field + * admissionAuthority), whenever a registration number is presented. Still, + * information on admissions can be given without indicating an admission or a + * naming authority by the exclusive use of the component professionItems. In + * this case the certification authority is responsible for the verification of + * the admission information. + *

+ *

+ *

+ * This attribute is single-valued. Still, several admissions can be captured in + * the sequence structure of the component contentsOfAdmissions of + * AdmissionSyntax or in the component professionInfos of Admissions. The + * component admissionAuthority of AdmissionSyntax serves as default value for + * the component admissionAuthority of Admissions. Within the latter component + * the default value can be overwritten, in case that another authority is + * responsible. The component namingAuthority of Admissions serves as a default + * value for the component namingAuthority of ProfessionInfo. Within the latter + * component the default value can be overwritten, in case that another naming + * authority needs to be recorded. + *

+ * The length of the string objects is limited to 128 characters. It is + * recommended to indicate a namingAuthorityURL in all issued attribute + * certificates. If a namingAuthorityURL is indicated, the field professionItems + * of ProfessionInfo should contain only registered titles. If the field + * professionOIDs exists, it has to contain the OIDs of the professions listed + * in professionItems in the same order. In general, the field professionInfos + * should contain only one entry, unless the admissions that are to be listed + * are logically connected (e.g. they have been issued under the same admission + * number). + * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.Admissions + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority + */ + public class AdmissionSyntax + : Asn1Encodable + { + private readonly GeneralName admissionAuthority; + private readonly Asn1Sequence contentsOfAdmissions; + + public static AdmissionSyntax GetInstance( + object obj) + { + if (obj == null || obj is AdmissionSyntax) + { + return (AdmissionSyntax)obj; + } + + if (obj is Asn1Sequence) + { + return new AdmissionSyntax((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type ProcurationSyntax: + *

+ *

+        *     AdmissionSyntax ::= SEQUENCE
+        *     {
+        *       admissionAuthority GeneralName OPTIONAL,
+        *       contentsOfAdmissions SEQUENCE OF Admissions
+        *     }
+        * 

+ * Admissions ::= SEQUENCE + * { + * admissionAuthority [0] EXPLICIT GeneralName OPTIONAL + * namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL + * professionInfos SEQUENCE OF ProfessionInfo + * } + *

+ * NamingAuthority ::= SEQUENCE + * { + * namingAuthorityId OBJECT IDENTIFIER OPTIONAL, + * namingAuthorityUrl IA5String OPTIONAL, + * namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL + * } + *

+ * ProfessionInfo ::= SEQUENCE + * { + * namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL, + * professionItems SEQUENCE OF DirectoryString (SIZE(1..128)), + * professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL, + * registrationNumber PrintableString(SIZE(1..128)) OPTIONAL, + * addProfessionInfo OCTET STRING OPTIONAL + * } + *

+ * + * @param seq The ASN.1 sequence. + */ + private AdmissionSyntax( + Asn1Sequence seq) + { + switch (seq.Count) + { + case 1: + this.contentsOfAdmissions = DerSequence.GetInstance(seq[0]); + break; + case 2: + admissionAuthority = GeneralName.GetInstance(seq[0]); + contentsOfAdmissions = DerSequence.GetInstance(seq[1]); + break; + default: + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + } + + /** + * Constructor from given details. + * + * @param admissionAuthority The admission authority. + * @param contentsOfAdmissions The admissions. + */ + public AdmissionSyntax( + GeneralName admissionAuthority, + Asn1Sequence contentsOfAdmissions) + { + this.admissionAuthority = admissionAuthority; + this.contentsOfAdmissions = contentsOfAdmissions; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+        *     AdmissionSyntax ::= SEQUENCE
+        *     {
+        *       admissionAuthority GeneralName OPTIONAL,
+        *       contentsOfAdmissions SEQUENCE OF Admissions
+        *     }
+        * 

+ * Admissions ::= SEQUENCE + * { + * admissionAuthority [0] EXPLICIT GeneralName OPTIONAL + * namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL + * professionInfos SEQUENCE OF ProfessionInfo + * } + *

+ * NamingAuthority ::= SEQUENCE + * { + * namingAuthorityId OBJECT IDENTIFIER OPTIONAL, + * namingAuthorityUrl IA5String OPTIONAL, + * namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL + * } + *

+ * ProfessionInfo ::= SEQUENCE + * { + * namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL, + * professionItems SEQUENCE OF DirectoryString (SIZE(1..128)), + * professionOIDs SEQUENCE OF OBJECT IDENTIFIER OPTIONAL, + * registrationNumber PrintableString(SIZE(1..128)) OPTIONAL, + * addProfessionInfo OCTET STRING OPTIONAL + * } + *

+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(admissionAuthority); + v.Add(contentsOfAdmissions); + return new DerSequence(v); + } + + /** + * @return Returns the admissionAuthority if present, null otherwise. + */ + public virtual GeneralName AdmissionAuthority + { + get { return admissionAuthority; } + } + + /** + * @return Returns the contentsOfAdmissions. + */ + public virtual Admissions[] GetContentsOfAdmissions() + { + Admissions[] result = new Admissions[contentsOfAdmissions.Count]; + + for (int i = 0; i < contentsOfAdmissions.Count; ++i) + { + result[i] = Admissions.GetInstance(contentsOfAdmissions[i]); + } + + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs.meta new file mode 100644 index 00000000..d571330e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9585d9a3646432b498c88670026b6b1c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/AdmissionSyntax.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs new file mode 100644 index 00000000..4267bec9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * An Admissions structure. + *

+ *

+	*            Admissions ::= SEQUENCE
+	*            {
+	*              admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
+	*              namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
+	*              professionInfos SEQUENCE OF ProfessionInfo
+	*            }
+	* 

+ *

+ * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.ProfessionInfo + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.NamingAuthority + */ + public class Admissions + : Asn1Encodable + { + private readonly GeneralName admissionAuthority; + private readonly NamingAuthority namingAuthority; + private readonly Asn1Sequence professionInfos; + + public static Admissions GetInstance(object obj) + { + if (obj == null || obj is Admissions) + return (Admissions)obj; + + if (obj is Asn1Sequence seq) + return new Admissions(seq); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type ProcurationSyntax: + *

+ *

+		*            Admissions ::= SEQUENCE
+		*            {
+		*              admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
+		*              namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
+		*              professionInfos SEQUENCE OF ProfessionInfo
+		*            }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private Admissions(Asn1Sequence seq) + { + if (seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + var e = seq.GetEnumerator(); + + e.MoveNext(); + Asn1Encodable o = e.Current; + if (o is Asn1TaggedObject tagged1) + { + switch (tagged1.TagNo) + { + case 0: + admissionAuthority = GeneralName.GetInstance((Asn1TaggedObject)o, true); + break; + case 1: + namingAuthority = NamingAuthority.GetInstance((Asn1TaggedObject)o, true); + break; + default: + throw new ArgumentException("Bad tag number: " + ((Asn1TaggedObject)o).TagNo); + } + e.MoveNext(); + o = e.Current; + } + if (o is Asn1TaggedObject tagged2) + { + switch (tagged2.TagNo) + { + case 1: + namingAuthority = NamingAuthority.GetInstance((Asn1TaggedObject)o, true); + break; + default: + throw new ArgumentException("Bad tag number: " + ((Asn1TaggedObject)o).TagNo); + } + e.MoveNext(); + o = e.Current; + } + professionInfos = Asn1Sequence.GetInstance(o); + if (e.MoveNext()) + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(e.Current)); + } + } + + /** + * Constructor from a given details. + *

+ * Parameter professionInfos is mandatory. + * + * @param admissionAuthority The admission authority. + * @param namingAuthority The naming authority. + * @param professionInfos The profession infos. + */ + public Admissions( + GeneralName admissionAuthority, + NamingAuthority namingAuthority, + ProfessionInfo[] professionInfos) + { + this.admissionAuthority = admissionAuthority; + this.namingAuthority = namingAuthority; + this.professionInfos = new DerSequence(professionInfos); + } + + public virtual GeneralName AdmissionAuthority + { + get { return admissionAuthority; } + } + + public virtual NamingAuthority NamingAuthority + { + get { return namingAuthority; } + } + + public ProfessionInfo[] GetProfessionInfos() + { + ProfessionInfo[] infos = new ProfessionInfo[professionInfos.Count]; + int count = 0; + foreach (Asn1Encodable ae in professionInfos) + { + infos[count++] = ProfessionInfo.GetInstance(ae); + } + return infos; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*       Admissions ::= SEQUENCE
+		*       {
+		*         admissionAuthority [0] EXPLICIT GeneralName OPTIONAL
+		*         namingAuthority [1] EXPLICIT NamingAuthority OPTIONAL
+		*         professionInfos SEQUENCE OF ProfessionInfo
+		*       }
+		* 

+ *

+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, admissionAuthority); + v.AddOptionalTagged(true, 1, namingAuthority); + v.Add(professionInfos); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs.meta new file mode 100644 index 00000000..606ee2d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7a8122cc5f09da46b019dbd4bb8a39e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Admissions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs new file mode 100644 index 00000000..2e95e90a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs @@ -0,0 +1,176 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * A declaration of majority. + *

+ *

+	*           DeclarationOfMajoritySyntax ::= CHOICE
+	*           {
+	*             notYoungerThan [0] IMPLICIT INTEGER,
+	*             fullAgeAtCountry [1] IMPLICIT SEQUENCE
+	*             {
+	*               fullAge BOOLEAN DEFAULT TRUE,
+	*               country PrintableString (SIZE(2))
+	*             }
+	*             dateOfBirth [2] IMPLICIT GeneralizedTime
+	*           }
+	* 
+ *

+ * fullAgeAtCountry indicates the majority of the owner with respect to the laws + * of a specific country. + */ + public class DeclarationOfMajority + : Asn1Encodable, IAsn1Choice + { + public enum Choice + { + NotYoungerThan = 0, + FullAgeAtCountry = 1, + DateOfBirth = 2 + }; + + private readonly Asn1TaggedObject declaration; + + public DeclarationOfMajority( + int notYoungerThan) + { + declaration = new DerTaggedObject(false, 0, new DerInteger(notYoungerThan)); + } + + public DeclarationOfMajority( + bool fullAge, + string country) + { + if (country.Length > 2) + throw new ArgumentException("country can only be 2 characters"); + + DerPrintableString countryString = new DerPrintableString(country, true); + + DerSequence seq; + if (fullAge) + { + seq = new DerSequence(countryString); + } + else + { + seq = new DerSequence(DerBoolean.False, countryString); + } + + this.declaration = new DerTaggedObject(false, 1, seq); + } + + public DeclarationOfMajority( + Asn1GeneralizedTime dateOfBirth) + { + this.declaration = new DerTaggedObject(false, 2, dateOfBirth); + } + + public static DeclarationOfMajority GetInstance( + object obj) + { + if (obj == null || obj is DeclarationOfMajority) + { + return (DeclarationOfMajority) obj; + } + + if (obj is Asn1TaggedObject) + { + return new DeclarationOfMajority((Asn1TaggedObject) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private DeclarationOfMajority( + Asn1TaggedObject o) + { + if (o.TagNo > 2) + throw new ArgumentException("Bad tag number: " + o.TagNo); + + this.declaration = o; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*           DeclarationOfMajoritySyntax ::= CHOICE
+		*           {
+		*             notYoungerThan [0] IMPLICIT INTEGER,
+		*             fullAgeAtCountry [1] IMPLICIT SEQUENCE
+		*             {
+		*               fullAge BOOLEAN DEFAULT TRUE,
+		*               country PrintableString (SIZE(2))
+		*             }
+		*             dateOfBirth [2] IMPLICIT GeneralizedTime
+		*           }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return declaration; + } + + public Choice Type + { + get { return (Choice) declaration.TagNo; } + } + + /** + * @return notYoungerThan if that's what we are, -1 otherwise + */ + public virtual int NotYoungerThan + { + get + { + switch ((Choice) declaration.TagNo) + { + case Choice.NotYoungerThan: + return DerInteger.GetInstance(declaration, false).IntValueExact; + default: + return -1; + } + } + } + + public virtual Asn1Sequence FullAgeAtCountry + { + get + { + switch ((Choice) declaration.TagNo) + { + case Choice.FullAgeAtCountry: + return Asn1Sequence.GetInstance(declaration, false); + default: + return null; + } + } + } + + public virtual Asn1GeneralizedTime DateOfBirth + { + get + { + switch ((Choice) declaration.TagNo) + { + case Choice.DateOfBirth: + return Asn1GeneralizedTime.GetInstance(declaration, false); + default: + return null; + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs.meta new file mode 100644 index 00000000..192edec7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a846b6feaeaf6047b72348ce0f2634a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/DeclarationOfMajority.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs new file mode 100644 index 00000000..d3b6a5b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs @@ -0,0 +1,126 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Monetary limit for transactions. The QcEuMonetaryLimit QC statement MUST be + * used in new certificates in place of the extension/attribute MonetaryLimit + * since January 1, 2004. For the sake of backward compatibility with + * certificates already in use, components SHOULD support MonetaryLimit (as well + * as QcEuLimitValue). + *

+ * Indicates a monetary limit within which the certificate holder is authorized + * to act. (This value DOES NOT express a limit on the liability of the + * certification authority). + *

+ *

+	*    MonetaryLimitSyntax ::= SEQUENCE
+	*    {
+	*      currency PrintableString (SIZE(3)),
+	*      amount INTEGER,
+	*      exponent INTEGER
+	*    }
+	* 
+ *

+ * currency must be the ISO code. + *

+ * value = amount�10*exponent + */ + public class MonetaryLimit + : Asn1Encodable + { + private readonly DerPrintableString currency; + private readonly DerInteger amount; + private readonly DerInteger exponent; + + public static MonetaryLimit GetInstance( + object obj) + { + if (obj == null || obj is MonetaryLimit) + { + return (MonetaryLimit) obj; + } + + if (obj is Asn1Sequence) + { + return new MonetaryLimit(Asn1Sequence.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private MonetaryLimit( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + currency = DerPrintableString.GetInstance(seq[0]); + amount = DerInteger.GetInstance(seq[1]); + exponent = DerInteger.GetInstance(seq[2]); + } + + /** + * Constructor from a given details. + *

+ *

+ * value = amount�10^exponent + * + * @param currency The currency. Must be the ISO code. + * @param amount The amount + * @param exponent The exponent + */ + public MonetaryLimit( + string currency, + int amount, + int exponent) + { + this.currency = new DerPrintableString(currency, true); + this.amount = new DerInteger(amount); + this.exponent = new DerInteger(exponent); + } + + public virtual string Currency + { + get { return currency.GetString(); } + } + + public virtual BigInteger Amount + { + get { return amount.Value; } + } + + public virtual BigInteger Exponent + { + get { return exponent.Value; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*    MonetaryLimitSyntax ::= SEQUENCE
+		*    {
+		*      currency PrintableString (SIZE(3)),
+		*      amount INTEGER,
+		*      exponent INTEGER
+		*    }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(currency, amount, exponent); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs.meta new file mode 100644 index 00000000..9de4e2b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d752b8efd0fd5c42a7ca40ae38d0f3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/MonetaryLimit.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs new file mode 100644 index 00000000..84a1fa4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs @@ -0,0 +1,206 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Names of authorities which are responsible for the administration of title + * registers. + * + *
+	*             NamingAuthority ::= SEQUENCE 
+	*             {
+	*               namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
+	*               namingAuthorityUrl IA5String OPTIONAL,
+	*               namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
+	*             }
+	* 
+ * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax + * + */ + public class NamingAuthority + : Asn1Encodable + { + /** + * Profession OIDs should always be defined under the OID branch of the + * responsible naming authority. At the time of this writing, the work group + * �Recht, Wirtschaft, Steuern� (�Law, Economy, Taxes�) is registered as the + * first naming authority under the OID id-isismtt-at-namingAuthorities. + */ + public static readonly DerObjectIdentifier IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + = new DerObjectIdentifier(IsisMttObjectIdentifiers.IdIsisMttATNamingAuthorities + ".1"); + + private readonly DerObjectIdentifier namingAuthorityID; + private readonly string namingAuthorityUrl; + private readonly DirectoryString namingAuthorityText; + + public static NamingAuthority GetInstance(object obj) + { + if (obj == null || obj is NamingAuthority) + return (NamingAuthority) obj; + + if (obj is Asn1Sequence seq) + return new NamingAuthority(seq); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static NamingAuthority GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * Constructor from Asn1Sequence. + *

+ *

+ *

+		*             NamingAuthority ::= SEQUENCE
+		*             {
+		*               namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
+		*               namingAuthorityUrl IA5String OPTIONAL,
+		*               namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
+		*             }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private NamingAuthority(Asn1Sequence seq) + { + if (seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + var e = seq.GetEnumerator(); + + if (e.MoveNext()) + { + Asn1Encodable o = e.Current; + if (o is DerObjectIdentifier oid) + { + namingAuthorityID = oid; + } + else if (o is DerIA5String ia5) + { + namingAuthorityUrl = ia5.GetString(); + } + else if (o is IAsn1String) + { + namingAuthorityText = DirectoryString.GetInstance(o); + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + + if (e.MoveNext()) + { + Asn1Encodable o = e.Current; + if (o is DerIA5String ia5) + { + namingAuthorityUrl = ia5.GetString(); + } + else if (o is IAsn1String) + { + namingAuthorityText = DirectoryString.GetInstance(o); + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + + if (e.MoveNext()) + { + Asn1Encodable o = e.Current; + if (o is IAsn1String) + { + namingAuthorityText = DirectoryString.GetInstance(o); + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + } + + /** + * @return Returns the namingAuthorityID. + */ + public virtual DerObjectIdentifier NamingAuthorityID + { + get { return namingAuthorityID; } + } + + /** + * @return Returns the namingAuthorityText. + */ + public virtual DirectoryString NamingAuthorityText + { + get { return namingAuthorityText; } + } + + /** + * @return Returns the namingAuthorityUrl. + */ + public virtual string NamingAuthorityUrl + { + get { return namingAuthorityUrl; } + } + + /** + * Constructor from given details. + *

+ * All parameters can be combined. + * + * @param namingAuthorityID ObjectIdentifier for naming authority. + * @param namingAuthorityUrl URL for naming authority. + * @param namingAuthorityText Textual representation of naming authority. + */ + public NamingAuthority( + DerObjectIdentifier namingAuthorityID, + string namingAuthorityUrl, + DirectoryString namingAuthorityText) + { + this.namingAuthorityID = namingAuthorityID; + this.namingAuthorityUrl = namingAuthorityUrl; + this.namingAuthorityText = namingAuthorityText; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*             NamingAuthority ::= SEQUENCE
+		*             {
+		*               namingAuthorityID OBJECT IDENTIFIER OPTIONAL,
+		*               namingAuthorityUrl IA5String OPTIONAL,
+		*               namingAuthorityText DirectoryString(SIZE(1..128)) OPTIONAL
+		*             }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(namingAuthorityID); + + if (namingAuthorityUrl != null) + { + v.Add(new DerIA5String(namingAuthorityUrl, true)); + } + + v.AddOptional(namingAuthorityText); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs.meta new file mode 100644 index 00000000..ce30dc95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d78ac00b78d233649bd92c29fa09f50b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/NamingAuthority.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs new file mode 100644 index 00000000..297544cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs @@ -0,0 +1,230 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Attribute to indicate that the certificate holder may sign in the name of a + * third person. + *

+ * ISIS-MTT PROFILE: The corresponding ProcurationSyntax contains either the + * name of the person who is represented (subcomponent thirdPerson) or a + * reference to his/her base certificate (in the component signingFor, + * subcomponent certRef), furthermore the optional components country and + * typeSubstitution to indicate the country whose laws apply, and respectively + * the type of procuration (e.g. manager, procuration, custody). + *

+ *

+ * ISIS-MTT PROFILE: The GeneralName MUST be of type directoryName and MAY only + * contain: - RFC3039 attributes, except pseudonym (countryName, commonName, + * surname, givenName, serialNumber, organizationName, organizationalUnitName, + * stateOrProvincename, localityName, postalAddress) and - SubjectDirectoryName + * attributes (title, dateOfBirth, placeOfBirth, gender, countryOfCitizenship, + * countryOfResidence and NameAtBirth). + *

+ *
+	*               ProcurationSyntax ::= SEQUENCE {
+	*                 country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
+	*                 typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
+	*                 signingFor [3] EXPLICIT SigningFor 
+	*               }
+	*               
+	*               SigningFor ::= CHOICE 
+	*               { 
+	*                 thirdPerson GeneralName,
+	*                 certRef IssuerSerial 
+	*               }
+	* 
+ * + */ + public class ProcurationSyntax + : Asn1Encodable + { + private readonly string country; + private readonly DirectoryString typeOfSubstitution; + private readonly GeneralName thirdPerson; + private readonly IssuerSerial certRef; + + public static ProcurationSyntax GetInstance(object obj) + { + if (obj == null || obj is ProcurationSyntax) + return (ProcurationSyntax) obj; + + if (obj is Asn1Sequence seq) + return new ProcurationSyntax(seq); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type ProcurationSyntax: + *

+ *

+		*               ProcurationSyntax ::= SEQUENCE {
+		*                 country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
+		*                 typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
+		*                 signingFor [3] EXPLICIT SigningFor
+		*               }
+		* 

+ * SigningFor ::= CHOICE + * { + * thirdPerson GeneralName, + * certRef IssuerSerial + * } + *

+ * + * @param seq The ASN.1 sequence. + */ + private ProcurationSyntax(Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + var e = seq.GetEnumerator(); + + while (e.MoveNext()) + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(e.Current); + switch (o.TagNo) + { + case 1: + country = DerPrintableString.GetInstance(o, true).GetString(); + break; + case 2: + typeOfSubstitution = DirectoryString.GetInstance(o, true); + break; + case 3: + Asn1Object signingFor = o.GetObject(); + if (signingFor is Asn1TaggedObject) + { + thirdPerson = GeneralName.GetInstance(signingFor); + } + else + { + certRef = IssuerSerial.GetInstance(signingFor); + } + break; + default: + throw new ArgumentException("Bad tag number: " + o.TagNo); + } + } + } + + /** + * Constructor from a given details. + *

+ *

+ * Either generalName or certRef MUST be + * null. + * + * @param country The country code whose laws apply. + * @param typeOfSubstitution The type of procuration. + * @param certRef Reference to certificate of the person who is represented. + */ + public ProcurationSyntax( + string country, + DirectoryString typeOfSubstitution, + IssuerSerial certRef) + { + this.country = country; + this.typeOfSubstitution = typeOfSubstitution; + this.thirdPerson = null; + this.certRef = certRef; + } + + /** + * Constructor from a given details. + *

+ *

+ * Either generalName or certRef MUST be + * null. + * + * @param country The country code whose laws apply. + * @param typeOfSubstitution The type of procuration. + * @param thirdPerson The GeneralName of the person who is represented. + */ + public ProcurationSyntax( + string country, + DirectoryString typeOfSubstitution, + GeneralName thirdPerson) + { + this.country = country; + this.typeOfSubstitution = typeOfSubstitution; + this.thirdPerson = thirdPerson; + this.certRef = null; + } + + public virtual string Country + { + get { return country; } + } + + public virtual DirectoryString TypeOfSubstitution + { + get { return typeOfSubstitution; } + } + + public virtual GeneralName ThirdPerson + { + get { return thirdPerson; } + } + + public virtual IssuerSerial CertRef + { + get { return certRef; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*               ProcurationSyntax ::= SEQUENCE {
+		*                 country [1] EXPLICIT PrintableString(SIZE(2)) OPTIONAL,
+		*                 typeOfSubstitution [2] EXPLICIT DirectoryString (SIZE(1..128)) OPTIONAL,
+		*                 signingFor [3] EXPLICIT SigningFor
+		*               }
+		* 

+ * SigningFor ::= CHOICE + * { + * thirdPerson GeneralName, + * certRef IssuerSerial + * } + *

+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (country != null) + { + v.Add(new DerTaggedObject(true, 1, new DerPrintableString(country, true))); + } + + v.AddOptionalTagged(true, 2, typeOfSubstitution); + + if (thirdPerson != null) + { + v.Add(new DerTaggedObject(true, 3, thirdPerson)); + } + else + { + v.Add(new DerTaggedObject(true, 3, certRef)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs.meta new file mode 100644 index 00000000..4a7d58a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc708de42965f2b4da574d61f562b6a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProcurationSyntax.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs new file mode 100644 index 00000000..19352461 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs @@ -0,0 +1,376 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Professions, specializations, disciplines, fields of activity, etc. + * + *
+	*               ProfessionInfo ::= SEQUENCE 
+	*               {
+	*                 namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
+	*                 professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
+	*                 professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
+	*                 registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
+	*                 addProfessionInfo OCTET STRING OPTIONAL 
+	*               }
+	* 
+ * + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509.AdmissionSyntax + */ + public class ProfessionInfo + : Asn1Encodable + { + /** + * Rechtsanw�ltin + */ + public static readonly DerObjectIdentifier Rechtsanwltin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".1"); + + /** + * Rechtsanwalt + */ + public static readonly DerObjectIdentifier Rechtsanwalt = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".2"); + + /** + * Rechtsbeistand + */ + public static readonly DerObjectIdentifier Rechtsbeistand = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".3"); + + /** + * Steuerberaterin + */ + public static readonly DerObjectIdentifier Steuerberaterin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".4"); + + /** + * Steuerberater + */ + public static readonly DerObjectIdentifier Steuerberater = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".5"); + + /** + * Steuerbevollm�chtigte + */ + public static readonly DerObjectIdentifier Steuerbevollmchtigte = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".6"); + + /** + * Steuerbevollm�chtigter + */ + public static readonly DerObjectIdentifier Steuerbevollmchtigter = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".7"); + + /** + * Notarin + */ + public static readonly DerObjectIdentifier Notarin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".8"); + + /** + * Notar + */ + public static readonly DerObjectIdentifier Notar = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".9"); + + /** + * Notarvertreterin + */ + public static readonly DerObjectIdentifier Notarvertreterin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".10"); + + /** + * Notarvertreter + */ + public static readonly DerObjectIdentifier Notarvertreter = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".11"); + + /** + * Notariatsverwalterin + */ + public static readonly DerObjectIdentifier Notariatsverwalterin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".12"); + + /** + * Notariatsverwalter + */ + public static readonly DerObjectIdentifier Notariatsverwalter = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".13"); + + /** + * Wirtschaftspr�ferin + */ + public static readonly DerObjectIdentifier Wirtschaftsprferin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".14"); + + /** + * Wirtschaftspr�fer + */ + public static readonly DerObjectIdentifier Wirtschaftsprfer = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".15"); + + /** + * Vereidigte Buchpr�ferin + */ + public static readonly DerObjectIdentifier VereidigteBuchprferin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".16"); + + /** + * Vereidigter Buchpr�fer + */ + public static readonly DerObjectIdentifier VereidigterBuchprfer = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".17"); + + /** + * Patentanw�ltin + */ + public static readonly DerObjectIdentifier Patentanwltin = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".18"); + + /** + * Patentanwalt + */ + public static readonly DerObjectIdentifier Patentanwalt = new DerObjectIdentifier( + NamingAuthority.IdIsisMttATNamingAuthoritiesRechtWirtschaftSteuern + ".19"); + + private readonly NamingAuthority namingAuthority; + private readonly Asn1Sequence professionItems; + private readonly Asn1Sequence professionOids; + private readonly string registrationNumber; + private readonly Asn1OctetString addProfessionInfo; + + public static ProfessionInfo GetInstance(object obj) + { + if (obj == null || obj is ProfessionInfo) + return (ProfessionInfo) obj; + + if (obj is Asn1Sequence seq) + return new ProfessionInfo(seq); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ *

+ *

+		*               ProfessionInfo ::= SEQUENCE
+		*               {
+		*                 namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
+		*                 professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
+		*                 professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
+		*                 registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
+		*                 addProfessionInfo OCTET STRING OPTIONAL
+		*               }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private ProfessionInfo(Asn1Sequence seq) + { + if (seq.Count > 5) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + var e = seq.GetEnumerator(); + + e.MoveNext(); + Asn1Encodable o = e.Current; + + if (o is Asn1TaggedObject ato) + { + if (ato.TagNo != 0) + throw new ArgumentException("Bad tag number: " + ato.TagNo); + + namingAuthority = NamingAuthority.GetInstance(ato, true); + e.MoveNext(); + o = e.Current; + } + + professionItems = Asn1Sequence.GetInstance(o); + + if (e.MoveNext()) + { + o = e.Current; + if (o is Asn1Sequence sequence) + { + professionOids = sequence; + } + else if (o is DerPrintableString printable) + { + registrationNumber = printable.GetString(); + } + else if (o is Asn1OctetString octets) + { + addProfessionInfo = octets; + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + + if (e.MoveNext()) + { + o = e.Current; + if (o is DerPrintableString printable) + { + registrationNumber = printable.GetString(); + } + else if (o is Asn1OctetString octets) + { + addProfessionInfo = octets; + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + + if (e.MoveNext()) + { + o = e.Current; + if (o is Asn1OctetString octets) + { + addProfessionInfo = octets; + } + else + { + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(o)); + } + } + } + + /** + * Constructor from given details. + *

+ * professionItems is mandatory, all other parameters are + * optional. + * + * @param namingAuthority The naming authority. + * @param professionItems Directory strings of the profession. + * @param professionOids DERObjectIdentfier objects for the + * profession. + * @param registrationNumber Registration number. + * @param addProfessionInfo Additional infos in encoded form. + */ + public ProfessionInfo( + NamingAuthority namingAuthority, + DirectoryString[] professionItems, + DerObjectIdentifier[] professionOids, + string registrationNumber, + Asn1OctetString addProfessionInfo) + { + this.namingAuthority = namingAuthority; + this.professionItems = new DerSequence(professionItems); + if (professionOids != null) + { + this.professionOids = new DerSequence(professionOids); + } + this.registrationNumber = registrationNumber; + this.addProfessionInfo = addProfessionInfo; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*               ProfessionInfo ::= SEQUENCE
+		*               {
+		*                 namingAuthority [0] EXPLICIT NamingAuthority OPTIONAL,
+		*                 professionItems SEQUENCE OF DirectoryString (SIZE(1..128)),
+		*                 professionOids SEQUENCE OF OBJECT IDENTIFIER OPTIONAL,
+		*                 registrationNumber PrintableString(SIZE(1..128)) OPTIONAL,
+		*                 addProfessionInfo OCTET STRING OPTIONAL
+		*               }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, namingAuthority); + v.Add(professionItems); + v.AddOptional(professionOids); + + if (registrationNumber != null) + { + v.Add(new DerPrintableString(registrationNumber, true)); + } + + v.AddOptional(addProfessionInfo); + return new DerSequence(v); + } + + /** + * @return Returns the addProfessionInfo. + */ + public virtual Asn1OctetString AddProfessionInfo + { + get { return addProfessionInfo; } + } + + /** + * @return Returns the namingAuthority. + */ + public virtual NamingAuthority NamingAuthority + { + get { return namingAuthority; } + } + + /** + * @return Returns the professionItems. + */ + public virtual DirectoryString[] GetProfessionItems() + { + DirectoryString[] result = new DirectoryString[professionItems.Count]; + + for (int i = 0; i < professionItems.Count; ++i) + { + result[i] = DirectoryString.GetInstance(professionItems[i]); + } + + return result; + } + + /** + * @return Returns the professionOids. + */ + public virtual DerObjectIdentifier[] GetProfessionOids() + { + if (professionOids == null) + { + return new DerObjectIdentifier[0]; + } + + DerObjectIdentifier[] result = new DerObjectIdentifier[professionOids.Count]; + + for (int i = 0; i < professionOids.Count; ++i) + { + result[i] = DerObjectIdentifier.GetInstance(professionOids[i]); + } + + return result; + } + + /** + * @return Returns the registrationNumber. + */ + public virtual string RegistrationNumber + { + get { return registrationNumber; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs.meta new file mode 100644 index 00000000..0c516c8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d6814f01a13d6b4b889110032b064af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/ProfessionInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs new file mode 100644 index 00000000..eeae09c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt.X509 +{ + /** + * Some other restriction regarding the usage of this certificate. + *

+ *

+	*  RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
+	* 
+ */ + public class Restriction + : Asn1Encodable + { + private readonly DirectoryString restriction; + + public static Restriction GetInstance(object obj) + { + if (obj is Restriction) + return (Restriction) obj; + + if (obj is IAsn1String) + return new Restriction(DirectoryString.GetInstance(obj)); + + throw new ArgumentException("Unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from DirectoryString. + *

+ * The DirectoryString is of type RestrictionSyntax: + *

+ *

+		*      RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
+		* 
+ * + * @param restriction A IAsn1String. + */ + private Restriction(DirectoryString restriction) + { + this.restriction = restriction; + } + + /** + * Constructor from a given details. + * + * @param restriction The description of the restriction. + */ + public Restriction(string restriction) + { + this.restriction = new DirectoryString(restriction); + } + + public virtual DirectoryString RestrictionString + { + get { return restriction; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*      RestrictionSyntax ::= DirectoryString (SIZE(1..1024))
+		* 

+ *

+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return restriction.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs.meta new file mode 100644 index 00000000..ecb9e947 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 87a6e7888408104458b791ec7669c5e3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/isismtt/x509/Restriction.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa.meta new file mode 100644 index 00000000..77360911 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 541c2a1edf19b8e4b8e9c103c2b80762 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs new file mode 100644 index 00000000..b918214d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs @@ -0,0 +1,12 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa +{ + public abstract class KisaObjectIdentifiers + { + public static readonly DerObjectIdentifier IdSeedCbc = new DerObjectIdentifier("1.2.410.200004.1.4"); + public static readonly DerObjectIdentifier IdNpkiAppCmsSeedWrap = new DerObjectIdentifier("1.2.410.200004.7.1.1.1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs.meta new file mode 100644 index 00000000..71f88d2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 789322e5999977548af42b9d087a4633 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/kisa/KISAObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft.meta new file mode 100644 index 00000000..9d55b585 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 1341de6b3ad718e4ca3aeb95e04ed889 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs new file mode 100644 index 00000000..346f8173 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Microsoft +{ + public abstract class MicrosoftObjectIdentifiers + { + // + // Microsoft + // iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) Microsoft(311) + // + public static readonly DerObjectIdentifier Microsoft = new DerObjectIdentifier("1.3.6.1.4.1.311"); + public static readonly DerObjectIdentifier MicrosoftCertTemplateV1 = Microsoft.Branch("20.2"); + public static readonly DerObjectIdentifier MicrosoftCAVersion = Microsoft.Branch("21.1"); + public static readonly DerObjectIdentifier MicrosoftPrevCACertHash = Microsoft.Branch("21.2"); + public static readonly DerObjectIdentifier MicrosoftCrlNextPublish = Microsoft.Branch("21.4"); + public static readonly DerObjectIdentifier MicrosoftCertTemplateV2 = Microsoft.Branch("21.7"); + public static readonly DerObjectIdentifier MicrosoftAppPolicies = Microsoft.Branch("21.10"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs.meta new file mode 100644 index 00000000..c848267c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 469fd9c10e8453b4fad454a5d4c89d3e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/microsoft/MicrosoftObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc.meta new file mode 100644 index 00000000..277bce9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e5312eac793d21c47855632cc9d52d1b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs new file mode 100644 index 00000000..5bffcaf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + public class Cast5CbcParameters + : Asn1Encodable + { + private readonly DerInteger keyLength; + private readonly Asn1OctetString iv; + + public static Cast5CbcParameters GetInstance( + object o) + { + if (o is Cast5CbcParameters) + { + return (Cast5CbcParameters) o; + } + + if (o is Asn1Sequence) + { + return new Cast5CbcParameters((Asn1Sequence) o); + } + + throw new ArgumentException("unknown object in Cast5CbcParameters factory"); + } + + public Cast5CbcParameters( + byte[] iv, + int keyLength) + { + this.iv = new DerOctetString(iv); + this.keyLength = new DerInteger(keyLength); + } + + private Cast5CbcParameters( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + iv = (Asn1OctetString) seq[0]; + keyLength = (DerInteger) seq[1]; + } + + public byte[] GetIV() + { + return Arrays.Clone(iv.GetOctets()); + } + + public int KeyLength + { + get { return keyLength.IntValueExact; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * cast5CBCParameters ::= Sequence {
+         *                           iv         OCTET STRING DEFAULT 0,
+         *                                  -- Initialization vector
+         *                           keyLength  Integer
+         *                                  -- Key length, in bits
+         *                      }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(iv, keyLength); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs.meta new file mode 100644 index 00000000..287c1c93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3f69b0269ba180c45ad3c00555a60398 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/CAST5CBCParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs new file mode 100644 index 00000000..779cf781 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + public class IdeaCbcPar + : Asn1Encodable + { + internal Asn1OctetString iv; + + public static IdeaCbcPar GetInstance( + object o) + { + if (o is IdeaCbcPar) + { + return (IdeaCbcPar) o; + } + + if (o is Asn1Sequence) + { + return new IdeaCbcPar((Asn1Sequence) o); + } + + throw new ArgumentException("unknown object in IDEACBCPar factory"); + } + + public IdeaCbcPar( + byte[] iv) + { + this.iv = new DerOctetString(iv); + } + + private IdeaCbcPar( + Asn1Sequence seq) + { + if (seq.Count == 1) + { + iv = (Asn1OctetString) seq[0]; + } + } + + public byte[] GetIV() + { + return iv == null ? null : iv.GetOctets(); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * IDEA-CBCPar ::= Sequence {
+         *                      iv    OCTET STRING OPTIONAL -- exactly 8 octets
+         *                  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(iv); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs.meta new file mode 100644 index 00000000..f59a0c19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 29a817e7067eb46489a7ec474922f0ec +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/IDEACBCPar.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs new file mode 100644 index 00000000..f3a16a30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs @@ -0,0 +1,124 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + public abstract class MiscObjectIdentifiers + { + // + // Netscape + // iso/itu(2) joint-assign(16) us(840) uscompany(1) Netscape(113730) cert-extensions(1) } + // + public static readonly DerObjectIdentifier Netscape = new DerObjectIdentifier("2.16.840.1.113730.1"); + public static readonly DerObjectIdentifier NetscapeCertType = Netscape.Branch("1"); + public static readonly DerObjectIdentifier NetscapeBaseUrl = Netscape.Branch("2"); + public static readonly DerObjectIdentifier NetscapeRevocationUrl = Netscape.Branch("3"); + public static readonly DerObjectIdentifier NetscapeCARevocationUrl = Netscape.Branch("4"); + public static readonly DerObjectIdentifier NetscapeRenewalUrl = Netscape.Branch("7"); + public static readonly DerObjectIdentifier NetscapeCAPolicyUrl = Netscape.Branch("8"); + public static readonly DerObjectIdentifier NetscapeSslServerName = Netscape.Branch("12"); + public static readonly DerObjectIdentifier NetscapeCertComment = Netscape.Branch("13"); + + // + // Verisign + // iso/itu(2) joint-assign(16) us(840) uscompany(1) verisign(113733) cert-extensions(1) } + // + public static readonly DerObjectIdentifier Verisign = new DerObjectIdentifier("2.16.840.1.113733.1"); + + // + // CZAG - country, zip, age, and gender + // + public static readonly DerObjectIdentifier VerisignCzagExtension = Verisign.Branch("6.3"); + + public static readonly DerObjectIdentifier VerisignPrivate_6_9 = Verisign.Branch("6.9"); + public static readonly DerObjectIdentifier VerisignOnSiteJurisdictionHash = Verisign.Branch("6.11"); + public static readonly DerObjectIdentifier VerisignBitString_6_13 = Verisign.Branch("6.13"); + + // D&B D-U-N-S number + public static readonly DerObjectIdentifier VerisignDnbDunsNumber = Verisign.Branch("6.15"); + + public static readonly DerObjectIdentifier VerisignIssStrongCrypto = Verisign.Branch("8.1"); + + // + // Novell + // iso/itu(2) country(16) us(840) organization(1) novell(113719) + // + public static readonly DerObjectIdentifier Novell = new DerObjectIdentifier("2.16.840.1.113719"); + public static readonly DerObjectIdentifier NovellSecurityAttribs = Novell.Branch("1.9.4.1"); + + // + // Entrust + // iso(1) member-body(16) us(840) nortelnetworks(113533) entrust(7) + // + public static readonly DerObjectIdentifier Entrust = new DerObjectIdentifier("1.2.840.113533.7"); + public static readonly DerObjectIdentifier EntrustVersionExtension = Entrust.Branch("65.0"); + + public static readonly DerObjectIdentifier cast5CBC = new DerObjectIdentifier(Entrust+ ".66.10"); + + // + // HMAC-SHA1 hMAC-SHA1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) + // dod(6) internet(1) security(5) mechanisms(5) 8 1 2 } + // + public static readonly DerObjectIdentifier HMAC_SHA1 = new DerObjectIdentifier("1.3.6.1.5.5.8.1.2"); + + // + // Ascom + // + public static readonly DerObjectIdentifier as_sys_sec_alg_ideaCBC = new DerObjectIdentifier("1.3.6.1.4.1.188.7.1.1.2"); + + // + // Peter Gutmann's Cryptlib + // + public static readonly DerObjectIdentifier cryptlib = new DerObjectIdentifier("1.3.6.1.4.1.3029"); + + public static readonly DerObjectIdentifier cryptlib_algorithm = cryptlib.Branch("1"); + public static readonly DerObjectIdentifier cryptlib_algorithm_blowfish_ECB = cryptlib_algorithm.Branch("1.1"); + public static readonly DerObjectIdentifier cryptlib_algorithm_blowfish_CBC = cryptlib_algorithm.Branch("1.2"); + public static readonly DerObjectIdentifier cryptlib_algorithm_blowfish_CFB = cryptlib_algorithm.Branch("1.3"); + public static readonly DerObjectIdentifier cryptlib_algorithm_blowfish_OFB = cryptlib_algorithm.Branch("1.4"); + + // + // Blake2b + // + public static readonly DerObjectIdentifier blake2 = new DerObjectIdentifier("1.3.6.1.4.1.1722.12.2"); + + public static readonly DerObjectIdentifier id_blake2b160 = blake2.Branch("1.5"); + public static readonly DerObjectIdentifier id_blake2b256 = blake2.Branch("1.8"); + public static readonly DerObjectIdentifier id_blake2b384 = blake2.Branch("1.12"); + public static readonly DerObjectIdentifier id_blake2b512 = blake2.Branch("1.16"); + + public static readonly DerObjectIdentifier id_blake2s128 = blake2.Branch("2.4"); + public static readonly DerObjectIdentifier id_blake2s160 = blake2.Branch("2.5"); + public static readonly DerObjectIdentifier id_blake2s224 = blake2.Branch("2.7"); + public static readonly DerObjectIdentifier id_blake2s256 = blake2.Branch("2.8"); + + public static readonly DerObjectIdentifier blake3 = blake2.Branch("3"); + + public static readonly DerObjectIdentifier blake3_256 = blake3.Branch("8"); + + // + // Scrypt + public static readonly DerObjectIdentifier id_scrypt = new DerObjectIdentifier("1.3.6.1.4.1.11591.4.11"); + + // Composite key/signature oid - prototyping + // + // id-alg-composite OBJECT IDENTIFIER ::= { + // iso(1) identified-organization(3) dod(6) internet(1) private(4) + // enterprise(1) OpenCA(18227) Algorithms(2) id-alg-composite(1) } + public static readonly DerObjectIdentifier id_alg_composite = new DerObjectIdentifier("1.3.6.1.4.1.18227.2.1"); + + // -- To be replaced by IANA + // + //id-composite-key OBJECT IDENTIFIER ::= { + // + // joint-iso-itu-t(2) country(16) us(840) organization(1) entrust(114027) + // + // Algorithm(80) Composite(4) CompositeKey(1) + public static readonly DerObjectIdentifier id_composite_key = + new DerObjectIdentifier("2.16.840.1.114027.80.4.1"); + + public static readonly DerObjectIdentifier id_oracle_pkcs12_trusted_key_usage = + new DerObjectIdentifier("2.16.840.1.113894.746875.1.1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs.meta new file mode 100644 index 00000000..b49d5d5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: faf6c2d54aebe384e9ebbb5837ed22d0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/MiscObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs new file mode 100644 index 00000000..42ed429a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + /** + * The NetscapeCertType object. + *
+     *    NetscapeCertType ::= BIT STRING {
+     *         SSLClient               (0),
+     *         SSLServer               (1),
+     *         S/MIME                  (2),
+     *         Object Signing          (3),
+     *         Reserved                (4),
+     *         SSL CA                  (5),
+     *         S/MIME CA               (6),
+     *         Object Signing CA       (7) }
+     * 
+ */ + public class NetscapeCertType + : DerBitString + { + public const int SslClient = (1 << 7); + public const int SslServer = (1 << 6); + public const int Smime = (1 << 5); + public const int ObjectSigning = (1 << 4); + public const int Reserved = (1 << 3); + public const int SslCA = (1 << 2); + public const int SmimeCA = (1 << 1); + public const int ObjectSigningCA = (1 << 0); + + /** + * Basic constructor. + * + * @param usage - the bitwise OR of the Key Usage flags giving the + * allowed uses for the key. + * e.g. (X509NetscapeCertType.sslCA | X509NetscapeCertType.smimeCA) + */ + public NetscapeCertType(int usage) + : base(usage) + { + } + + public NetscapeCertType(DerBitString usage) + : base(usage.GetBytes(), usage.PadBits) + { + } + + public override string ToString() + { + byte[] data = GetBytes(); + return "NetscapeCertType: 0x" + (data[0] & 0xff).ToString("X"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs.meta new file mode 100644 index 00000000..2be16a2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1bc5a052c31c0314994732d07f5afc4d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeCertType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs new file mode 100644 index 00000000..843e8124 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + public class NetscapeRevocationUrl + : DerIA5String + { + public NetscapeRevocationUrl(DerIA5String str) + : base(str.GetString()) + { + } + + public override string ToString() + { + return "NetscapeRevocationUrl: " + this.GetString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs.meta new file mode 100644 index 00000000..e9701bcd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d22c307cdb816a0459acb624803e18d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/NetscapeRevocationURL.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs new file mode 100644 index 00000000..9ca8edbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc +{ + public class VerisignCzagExtension + : DerIA5String + { + public VerisignCzagExtension(DerIA5String str) + : base(str.GetString()) + { + } + + public override string ToString() + { + return "VerisignCzagExtension: " + this.GetString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs.meta new file mode 100644 index 00000000..b09b8bb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e1851bd9fb0851f4580636dc5c47eeb9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/misc/VerisignCzagExtension.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla.meta new file mode 100644 index 00000000..2a95572c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2f646c6bd36b16d40a00554b4383c957 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs new file mode 100644 index 00000000..dce2854f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Mozilla +{ + /** + * This is designed to parse + * the PublicKeyAndChallenge created by the KEYGEN tag included by + * Mozilla based browsers. + *
+	 *  PublicKeyAndChallenge ::= SEQUENCE {
+	 *    spki SubjectPublicKeyInfo,
+	 *    challenge IA5STRING
+	 *  }
+	 *
+	 *  
+ */ + public class PublicKeyAndChallenge + : Asn1Encodable + { + private Asn1Sequence pkacSeq; + private SubjectPublicKeyInfo spki; + private DerIA5String challenge; + + public static PublicKeyAndChallenge GetInstance( + object obj) + { + if (obj is PublicKeyAndChallenge) + { + return (PublicKeyAndChallenge) obj; + } + + if (obj is Asn1Sequence) + { + return new PublicKeyAndChallenge((Asn1Sequence) obj); + } + + throw new ArgumentException( + "unknown object in 'PublicKeyAndChallenge' factory : " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj) + "."); + } + + public PublicKeyAndChallenge( + Asn1Sequence seq) + { + pkacSeq = seq; + spki = SubjectPublicKeyInfo.GetInstance(seq[0]); + challenge = DerIA5String.GetInstance(seq[1]); + } + + public override Asn1Object ToAsn1Object() + { + return pkacSeq; + } + + public SubjectPublicKeyInfo SubjectPublicKeyInfo + { + get { return spki; } + } + + public DerIA5String Challenge + { + get { return challenge; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs.meta new file mode 100644 index 00000000..53256198 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d8f606cb85a286849a7bec6ddbfd8636 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/mozilla/PublicKeyAndChallenge.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist.meta new file mode 100644 index 00000000..129e8346 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f55d0df425b7c1d499d6aca484aebdbd +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs new file mode 100644 index 00000000..28fe741c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using System; + + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist +{ + /// + /// KMACwithSHAKE128-params ::= SEQUENCE { + /// kMACOutputLength INTEGER DEFAULT 256, -- Output length in bits + /// customizationString OCTET STRING DEFAULT ''H + /// } + /// +public class KMacWithShake128Params : Asn1Encodable +{ + private static readonly byte[] EMPTY_STRING = new byte[0]; + private static readonly int DEF_LENGTH = 256; + + private readonly int outputLength; + private readonly byte[] customizationString; + + public KMacWithShake128Params(int outputLength) + { + this.outputLength = outputLength; + this.customizationString = EMPTY_STRING; + } + + public KMacWithShake128Params(int outputLength, byte[] customizationString) + { + this.outputLength = outputLength; + this.customizationString = Arrays.Clone(customizationString); + } + + public static KMacWithShake128Params GetInstance(object o) + { + if (o is KMacWithShake128Params) + { + return (KMacWithShake128Params)o; + } + else if (o != null) + { + return new KMacWithShake128Params(Asn1Sequence.GetInstance(o)); + } + + return null; + } + + private KMacWithShake128Params(Asn1Sequence seq) + { + if (seq.Count > 2) + throw new InvalidOperationException("sequence size greater than 2"); + + if (seq.Count == 2) + { + this.outputLength = DerInteger.GetInstance(seq[0]).IntValueExact; + this.customizationString = Arrays.Clone(Asn1OctetString.GetInstance(seq[1]).GetOctets()); + } + else if (seq.Count == 1) + { + if (seq[0] is DerInteger) + { + this.outputLength = DerInteger.GetInstance(seq[0]).IntValueExact; + this.customizationString = EMPTY_STRING; + } + else + { + this.outputLength = DEF_LENGTH; + this.customizationString = Arrays.Clone(Asn1OctetString.GetInstance(seq[0]).GetOctets()); + } + } + else + { + this.outputLength = DEF_LENGTH; + this.customizationString = EMPTY_STRING; + } + } + + public int OutputLength + { + get { return outputLength; } + } + + public byte[] CustomizationString + { + get { return Arrays.Clone(customizationString); } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + if (outputLength != DEF_LENGTH) + { + v.Add(new DerInteger(outputLength)); + } + + if (customizationString.Length != 0) + { + v.Add(new DerOctetString(CustomizationString)); + } + + return new DerSequence(v); + } +} +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs.meta new file mode 100644 index 00000000..a3a64408 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a24c9896b5be4c04caafa46c3e526a34 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE128_params.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs new file mode 100644 index 00000000..8f230851 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs @@ -0,0 +1,106 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist +{ + /// + /// KMACwithSHAKE256-params ::= SEQUENCE { + /// kMACOutputLength INTEGER DEFAULT 512, -- Output length in bits + /// customizationString OCTET STRING DEFAULT ''H + /// } + /// +public class KMacWithShake256Params : Asn1Encodable +{ + private static readonly byte[] EMPTY_STRING = new byte[0]; + private static readonly int DEF_LENGTH = 512; + + private readonly int outputLength; + private readonly byte[] customizationString; + + public KMacWithShake256Params(int outputLength) + { + this.outputLength = outputLength; + this.customizationString = EMPTY_STRING; + } + + public KMacWithShake256Params(int outputLength, byte[] customizationString) + { + this.outputLength = outputLength; + this.customizationString = Arrays.Clone(customizationString); + } + + public static KMacWithShake256Params GetInstance(object o) + { + if (o is KMacWithShake256Params) + { + return (KMacWithShake256Params)o; + } + else if (o != null) + { + return new KMacWithShake256Params(Asn1Sequence.GetInstance(o)); + } + + return null; + } + + private KMacWithShake256Params(Asn1Sequence seq) + { + if (seq.Count > 2) + throw new InvalidOperationException("sequence size greater than 2"); + + if (seq.Count == 2) + { + this.outputLength = DerInteger.GetInstance(seq[0]).IntValueExact; + this.customizationString = Arrays.Clone(Asn1OctetString.GetInstance(seq[1]).GetOctets()); + } + else if (seq.Count == 1) + { + if (seq[0] is DerInteger) + { + this.outputLength = DerInteger.GetInstance(seq[0]).IntValueExact; + this.customizationString = EMPTY_STRING; + } + else + { + this.outputLength = DEF_LENGTH; + this.customizationString = Arrays.Clone(Asn1OctetString.GetInstance(seq[0]).GetOctets()); + } + } + else + { + this.outputLength = DEF_LENGTH; + this.customizationString = EMPTY_STRING; + } + } + + public int OutputLength + { + get { return outputLength; } + } + + public byte[] CustomizationString + { + get { return Arrays.Clone(customizationString); } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + if (outputLength != DEF_LENGTH) + { + v.Add(new DerInteger(outputLength)); + } + + if (customizationString.Length != 0) + { + v.Add(new DerOctetString(CustomizationString)); + } + + return new DerSequence(v); + } +} +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs.meta new file mode 100644 index 00000000..0fc2f81d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 08f572fdeff008f4ca702197b266273f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/KMACwithSHAKE256_params.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs new file mode 100644 index 00000000..77c2a967 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist +{ + /// Elliptic curve registry for NIST curves. + public static class NistNamedCurves + { + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurveAlias(string name, DerObjectIdentifier oid) + { + if (SecNamedCurves.GetByOidLazy(oid) == null) + throw new InvalidOperationException(); + + objIds.Add(name, oid); + names.Add(oid, name); + } + + static NistNamedCurves() + { + DefineCurveAlias("B-163", SecObjectIdentifiers.SecT163r2); + DefineCurveAlias("B-233", SecObjectIdentifiers.SecT233r1); + DefineCurveAlias("B-283", SecObjectIdentifiers.SecT283r1); + DefineCurveAlias("B-409", SecObjectIdentifiers.SecT409r1); + DefineCurveAlias("B-571", SecObjectIdentifiers.SecT571r1); + + DefineCurveAlias("K-163", SecObjectIdentifiers.SecT163k1); + DefineCurveAlias("K-233", SecObjectIdentifiers.SecT233k1); + DefineCurveAlias("K-283", SecObjectIdentifiers.SecT283k1); + DefineCurveAlias("K-409", SecObjectIdentifiers.SecT409k1); + DefineCurveAlias("K-571", SecObjectIdentifiers.SecT571k1); + + DefineCurveAlias("P-192", SecObjectIdentifiers.SecP192r1); + DefineCurveAlias("P-224", SecObjectIdentifiers.SecP224r1); + DefineCurveAlias("P-256", SecObjectIdentifiers.SecP256r1); + DefineCurveAlias("P-384", SecObjectIdentifiers.SecP384r1); + DefineCurveAlias("P-521", SecObjectIdentifiers.SecP521r1); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of + /// the full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of + /// the full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return names.ContainsKey(oid) ? SecNamedCurves.GetByOidLazy(oid) : null; + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs.meta new file mode 100644 index 00000000..f20fd3a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b6f4d35ad37f26942a3e1fe948e58516 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTNamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs new file mode 100644 index 00000000..bcdb20f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist +{ + public sealed class NistObjectIdentifiers + { + private NistObjectIdentifiers() + { + } + + // + // NIST + // iso/itu(2) joint-assign(16) us(840) organization(1) gov(101) csor(3) + + // + // nistalgorithms(4) + // + public static readonly DerObjectIdentifier NistAlgorithm = new DerObjectIdentifier("2.16.840.1.101.3.4"); + + public static readonly DerObjectIdentifier HashAlgs = NistAlgorithm.Branch("2"); + + public static readonly DerObjectIdentifier IdSha256 = HashAlgs.Branch("1"); + public static readonly DerObjectIdentifier IdSha384 = HashAlgs.Branch("2"); + public static readonly DerObjectIdentifier IdSha512 = HashAlgs.Branch("3"); + public static readonly DerObjectIdentifier IdSha224 = HashAlgs.Branch("4"); + public static readonly DerObjectIdentifier IdSha512_224 = HashAlgs.Branch("5"); + public static readonly DerObjectIdentifier IdSha512_256 = HashAlgs.Branch("6"); + public static readonly DerObjectIdentifier IdSha3_224 = HashAlgs.Branch("7"); + public static readonly DerObjectIdentifier IdSha3_256 = HashAlgs.Branch("8"); + public static readonly DerObjectIdentifier IdSha3_384 = HashAlgs.Branch("9"); + public static readonly DerObjectIdentifier IdSha3_512 = HashAlgs.Branch("10"); + public static readonly DerObjectIdentifier IdShake128 = HashAlgs.Branch("11"); + public static readonly DerObjectIdentifier IdShake256 = HashAlgs.Branch("12"); + public static readonly DerObjectIdentifier IdHMacWithSha3_224 = HashAlgs.Branch("13"); + public static readonly DerObjectIdentifier IdHMacWithSha3_256 = HashAlgs.Branch("14"); + public static readonly DerObjectIdentifier IdHMacWithSha3_384 = HashAlgs.Branch("15"); + public static readonly DerObjectIdentifier IdHMacWithSha3_512 = HashAlgs.Branch("16"); + public static readonly DerObjectIdentifier IdShake128Len = HashAlgs.Branch("17"); + public static readonly DerObjectIdentifier IdShake256Len = HashAlgs.Branch("18"); + public static readonly DerObjectIdentifier IdKmacWithShake128 = HashAlgs.Branch("19"); + public static readonly DerObjectIdentifier IdKmacWithShake256 = HashAlgs.Branch("20"); + + public static readonly DerObjectIdentifier Aes = new DerObjectIdentifier(NistAlgorithm + ".1"); + + public static readonly DerObjectIdentifier IdAes128Ecb = new DerObjectIdentifier(Aes + ".1"); + public static readonly DerObjectIdentifier IdAes128Cbc = new DerObjectIdentifier(Aes + ".2"); + public static readonly DerObjectIdentifier IdAes128Ofb = new DerObjectIdentifier(Aes + ".3"); + public static readonly DerObjectIdentifier IdAes128Cfb = new DerObjectIdentifier(Aes + ".4"); + public static readonly DerObjectIdentifier IdAes128Wrap = new DerObjectIdentifier(Aes + ".5"); + public static readonly DerObjectIdentifier IdAes128Gcm = new DerObjectIdentifier(Aes + ".6"); + public static readonly DerObjectIdentifier IdAes128Ccm = new DerObjectIdentifier(Aes + ".7"); + + public static readonly DerObjectIdentifier IdAes192Ecb = new DerObjectIdentifier(Aes + ".21"); + public static readonly DerObjectIdentifier IdAes192Cbc = new DerObjectIdentifier(Aes + ".22"); + public static readonly DerObjectIdentifier IdAes192Ofb = new DerObjectIdentifier(Aes + ".23"); + public static readonly DerObjectIdentifier IdAes192Cfb = new DerObjectIdentifier(Aes + ".24"); + public static readonly DerObjectIdentifier IdAes192Wrap = new DerObjectIdentifier(Aes + ".25"); + public static readonly DerObjectIdentifier IdAes192Gcm = new DerObjectIdentifier(Aes + ".26"); + public static readonly DerObjectIdentifier IdAes192Ccm = new DerObjectIdentifier(Aes + ".27"); + + public static readonly DerObjectIdentifier IdAes256Ecb = new DerObjectIdentifier(Aes + ".41"); + public static readonly DerObjectIdentifier IdAes256Cbc = new DerObjectIdentifier(Aes + ".42"); + public static readonly DerObjectIdentifier IdAes256Ofb = new DerObjectIdentifier(Aes + ".43"); + public static readonly DerObjectIdentifier IdAes256Cfb = new DerObjectIdentifier(Aes + ".44"); + public static readonly DerObjectIdentifier IdAes256Wrap = new DerObjectIdentifier(Aes + ".45"); + public static readonly DerObjectIdentifier IdAes256Gcm = new DerObjectIdentifier(Aes + ".46"); + public static readonly DerObjectIdentifier IdAes256Ccm = new DerObjectIdentifier(Aes + ".47"); + + // + // signatures + // + public static readonly DerObjectIdentifier IdDsaWithSha2 = new DerObjectIdentifier(NistAlgorithm + ".3"); + + public static readonly DerObjectIdentifier DsaWithSha224 = new DerObjectIdentifier(IdDsaWithSha2 + ".1"); + public static readonly DerObjectIdentifier DsaWithSha256 = new DerObjectIdentifier(IdDsaWithSha2 + ".2"); + public static readonly DerObjectIdentifier DsaWithSha384 = new DerObjectIdentifier(IdDsaWithSha2 + ".3"); + public static readonly DerObjectIdentifier DsaWithSha512 = new DerObjectIdentifier(IdDsaWithSha2 + ".4"); + + /** 2.16.840.1.101.3.4.3.5 */ + public static readonly DerObjectIdentifier IdDsaWithSha3_224 = new DerObjectIdentifier(IdDsaWithSha2 + ".5"); + /** 2.16.840.1.101.3.4.3.6 */ + public static readonly DerObjectIdentifier IdDsaWithSha3_256 = new DerObjectIdentifier(IdDsaWithSha2 + ".6"); + /** 2.16.840.1.101.3.4.3.7 */ + public static readonly DerObjectIdentifier IdDsaWithSha3_384 = new DerObjectIdentifier(IdDsaWithSha2 + ".7"); + /** 2.16.840.1.101.3.4.3.8 */ + public static readonly DerObjectIdentifier IdDsaWithSha3_512 = new DerObjectIdentifier(IdDsaWithSha2 + ".8"); + + // ECDSA with SHA-3 + /** 2.16.840.1.101.3.4.3.9 */ + public static readonly DerObjectIdentifier IdEcdsaWithSha3_224 = new DerObjectIdentifier(IdDsaWithSha2 + ".9"); + /** 2.16.840.1.101.3.4.3.10 */ + public static readonly DerObjectIdentifier IdEcdsaWithSha3_256 = new DerObjectIdentifier(IdDsaWithSha2 + ".10"); + /** 2.16.840.1.101.3.4.3.11 */ + public static readonly DerObjectIdentifier IdEcdsaWithSha3_384 = new DerObjectIdentifier(IdDsaWithSha2 + ".11"); + /** 2.16.840.1.101.3.4.3.12 */ + public static readonly DerObjectIdentifier IdEcdsaWithSha3_512 = new DerObjectIdentifier(IdDsaWithSha2 + ".12"); + + // RSA PKCS #1 v1.5 Signature with SHA-3 family. + /** 2.16.840.1.101.3.4.3.9 */ + public static readonly DerObjectIdentifier IdRsassaPkcs1V15WithSha3_224 = new DerObjectIdentifier(IdDsaWithSha2 + ".13"); + /** 2.16.840.1.101.3.4.3.10 */ + public static readonly DerObjectIdentifier IdRsassaPkcs1V15WithSha3_256 = new DerObjectIdentifier(IdDsaWithSha2 + ".14"); + /** 2.16.840.1.101.3.4.3.11 */ + public static readonly DerObjectIdentifier IdRsassaPkcs1V15WithSha3_384 = new DerObjectIdentifier(IdDsaWithSha2 + ".15"); + /** 2.16.840.1.101.3.4.3.12 */ + public static readonly DerObjectIdentifier IdRsassaPkcs1V15WithSha3_512 = new DerObjectIdentifier(IdDsaWithSha2 + ".16"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs.meta new file mode 100644 index 00000000..c4ed5434 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6056fa0387de90644b8ed0dc77361e4d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nist/NISTObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri.meta new file mode 100644 index 00000000..bb40d7e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b6096e4d257a01641b9309842a6ca233 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs new file mode 100644 index 00000000..c65da543 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nsri +{ + public sealed class NsriObjectIdentifiers + { + public static readonly DerObjectIdentifier nsri = new DerObjectIdentifier("1.2.410.200046"); + + public static readonly DerObjectIdentifier id_algorithm = nsri.Branch("1"); + + public static readonly DerObjectIdentifier id_sea = id_algorithm.Branch("1"); + public static readonly DerObjectIdentifier id_pad = id_algorithm.Branch("2"); + + public static readonly DerObjectIdentifier id_pad_null = id_algorithm.Branch("0"); + public static readonly DerObjectIdentifier id_pad_1 = id_algorithm.Branch("1"); + + public static readonly DerObjectIdentifier id_aria128_ecb = id_sea.Branch("1"); + public static readonly DerObjectIdentifier id_aria128_cbc = id_sea.Branch("2"); + public static readonly DerObjectIdentifier id_aria128_cfb = id_sea.Branch("3"); + public static readonly DerObjectIdentifier id_aria128_ofb = id_sea.Branch("4"); + public static readonly DerObjectIdentifier id_aria128_ctr = id_sea.Branch("5"); + + public static readonly DerObjectIdentifier id_aria192_ecb = id_sea.Branch("6"); + public static readonly DerObjectIdentifier id_aria192_cbc = id_sea.Branch("7"); + public static readonly DerObjectIdentifier id_aria192_cfb = id_sea.Branch("8"); + public static readonly DerObjectIdentifier id_aria192_ofb = id_sea.Branch("9"); + public static readonly DerObjectIdentifier id_aria192_ctr = id_sea.Branch("10"); + + public static readonly DerObjectIdentifier id_aria256_ecb = id_sea.Branch("11"); + public static readonly DerObjectIdentifier id_aria256_cbc = id_sea.Branch("12"); + public static readonly DerObjectIdentifier id_aria256_cfb = id_sea.Branch("13"); + public static readonly DerObjectIdentifier id_aria256_ofb = id_sea.Branch("14"); + public static readonly DerObjectIdentifier id_aria256_ctr = id_sea.Branch("15"); + + public static readonly DerObjectIdentifier id_aria128_cmac = id_sea.Branch("21"); + public static readonly DerObjectIdentifier id_aria192_cmac = id_sea.Branch("22"); + public static readonly DerObjectIdentifier id_aria256_cmac = id_sea.Branch("23"); + + public static readonly DerObjectIdentifier id_aria128_ocb2 = id_sea.Branch("31"); + public static readonly DerObjectIdentifier id_aria192_ocb2 = id_sea.Branch("32"); + public static readonly DerObjectIdentifier id_aria256_ocb2 = id_sea.Branch("33"); + + public static readonly DerObjectIdentifier id_aria128_gcm = id_sea.Branch("34"); + public static readonly DerObjectIdentifier id_aria192_gcm = id_sea.Branch("35"); + public static readonly DerObjectIdentifier id_aria256_gcm = id_sea.Branch("36"); + + public static readonly DerObjectIdentifier id_aria128_ccm = id_sea.Branch("37"); + public static readonly DerObjectIdentifier id_aria192_ccm = id_sea.Branch("38"); + public static readonly DerObjectIdentifier id_aria256_ccm = id_sea.Branch("39"); + + public static readonly DerObjectIdentifier id_aria128_kw = id_sea.Branch("40"); + public static readonly DerObjectIdentifier id_aria192_kw = id_sea.Branch("41"); + public static readonly DerObjectIdentifier id_aria256_kw = id_sea.Branch("42"); + + public static readonly DerObjectIdentifier id_aria128_kwp = id_sea.Branch("43"); + public static readonly DerObjectIdentifier id_aria192_kwp = id_sea.Branch("44"); + public static readonly DerObjectIdentifier id_aria256_kwp = id_sea.Branch("45"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs.meta new file mode 100644 index 00000000..d29e39cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7b5851fbe594304f841ec00dae22ec2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/nsri/NsriObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt.meta new file mode 100644 index 00000000..ccf6c794 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0789eb0ee84bbb641a1b9d8a19843768 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs new file mode 100644 index 00000000..3e62dbcc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt +{ + /// From RFC 3657 + public abstract class NttObjectIdentifiers + { + public static readonly DerObjectIdentifier IdCamellia128Cbc = new DerObjectIdentifier("1.2.392.200011.61.1.1.1.2"); + public static readonly DerObjectIdentifier IdCamellia192Cbc = new DerObjectIdentifier("1.2.392.200011.61.1.1.1.3"); + public static readonly DerObjectIdentifier IdCamellia256Cbc = new DerObjectIdentifier("1.2.392.200011.61.1.1.1.4"); + + public static readonly DerObjectIdentifier IdCamellia128Wrap = new DerObjectIdentifier("1.2.392.200011.61.1.1.3.2"); + public static readonly DerObjectIdentifier IdCamellia192Wrap = new DerObjectIdentifier("1.2.392.200011.61.1.1.3.3"); + public static readonly DerObjectIdentifier IdCamellia256Wrap = new DerObjectIdentifier("1.2.392.200011.61.1.1.3.4"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs.meta new file mode 100644 index 00000000..94747ba0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 08c35f4be43a28944a4db9c088b7312f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ntt/NTTObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp.meta new file mode 100644 index 00000000..103ed668 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 049b1b14b33e02b4a9dff0258f94f6b9 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs new file mode 100644 index 00000000..9d6b6c5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class BasicOcspResponse + : Asn1Encodable + { + private readonly ResponseData tbsResponseData; + private readonly AlgorithmIdentifier signatureAlgorithm; + private readonly DerBitString signature; + private readonly Asn1Sequence certs; + + public static BasicOcspResponse GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static BasicOcspResponse GetInstance( + object obj) + { + if (obj == null || obj is BasicOcspResponse) + { + return (BasicOcspResponse)obj; + } + + if (obj is Asn1Sequence) + { + return new BasicOcspResponse((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public BasicOcspResponse( + ResponseData tbsResponseData, + AlgorithmIdentifier signatureAlgorithm, + DerBitString signature, + Asn1Sequence certs) + { + this.tbsResponseData = tbsResponseData; + this.signatureAlgorithm = signatureAlgorithm; + this.signature = signature; + this.certs = certs; + } + + private BasicOcspResponse( + Asn1Sequence seq) + { + this.tbsResponseData = ResponseData.GetInstance(seq[0]); + this.signatureAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + this.signature = (DerBitString)seq[2]; + + if (seq.Count > 3) + { + this.certs = Asn1Sequence.GetInstance((Asn1TaggedObject)seq[3], true); + } + } + + public ResponseData TbsResponseData + { + get { return tbsResponseData; } + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return signatureAlgorithm; } + } + + public DerBitString Signature + { + get { return signature; } + } + + public byte[] GetSignatureOctets() + { + return signature.GetOctets(); + } + + public Asn1Sequence Certs + { + get { return certs; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * BasicOcspResponse       ::= Sequence {
+         *      tbsResponseData      ResponseData,
+         *      signatureAlgorithm   AlgorithmIdentifier,
+         *      signature            BIT STRING,
+         *      certs                [0] EXPLICIT Sequence OF Certificate OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(tbsResponseData, signatureAlgorithm, signature); + v.AddOptionalTagged(true, 0, certs); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs.meta new file mode 100644 index 00000000..a7cf3ca7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a78e148fa5ffe994ca6bb04d921c50ba +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/BasicOCSPResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs new file mode 100644 index 00000000..ce29e9f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs @@ -0,0 +1,103 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class CertID + : Asn1Encodable + { + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly Asn1OctetString issuerNameHash; + private readonly Asn1OctetString issuerKeyHash; + private readonly DerInteger serialNumber; + + public static CertID GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static CertID GetInstance( + object obj) + { + if (obj == null || obj is CertID) + { + return (CertID)obj; + } + + if (obj is Asn1Sequence) + { + return new CertID((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public CertID( + AlgorithmIdentifier hashAlgorithm, + Asn1OctetString issuerNameHash, + Asn1OctetString issuerKeyHash, + DerInteger serialNumber) + { + this.hashAlgorithm = hashAlgorithm; + this.issuerNameHash = issuerNameHash; + this.issuerKeyHash = issuerKeyHash; + this.serialNumber = serialNumber; + } + + private CertID( + Asn1Sequence seq) + { + if (seq.Count != 4) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[0]); + this.issuerNameHash = Asn1OctetString.GetInstance(seq[1]); + this.issuerKeyHash = Asn1OctetString.GetInstance(seq[2]); + this.serialNumber = DerInteger.GetInstance(seq[3]); + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public Asn1OctetString IssuerNameHash + { + get { return issuerNameHash; } + } + + public Asn1OctetString IssuerKeyHash + { + get { return issuerKeyHash; } + } + + public DerInteger SerialNumber + { + get { return serialNumber; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * CertID          ::=     Sequence {
+         *     hashAlgorithm       AlgorithmIdentifier,
+         *     issuerNameHash      OCTET STRING, -- Hash of Issuer's DN
+         *     issuerKeyHash       OCTET STRING, -- Hash of Issuers public key
+         *     serialNumber        CertificateSerialNumber }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(hashAlgorithm, issuerNameHash, issuerKeyHash, serialNumber); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs.meta new file mode 100644 index 00000000..6f415090 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7bd00837f4fea0643a1b2ebd06c721b3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs new file mode 100644 index 00000000..cd9a2d8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class CertStatus + : Asn1Encodable, IAsn1Choice + { + private readonly int tagNo; + private readonly Asn1Encodable value; + + /** + * create a CertStatus object with a tag of zero. + */ + public CertStatus() + { + tagNo = 0; + value = DerNull.Instance; + } + + public CertStatus( + RevokedInfo info) + { + tagNo = 1; + value = info; + } + + public CertStatus( + int tagNo, + Asn1Encodable value) + { + this.tagNo = tagNo; + this.value = value; + } + + public CertStatus(Asn1TaggedObject choice) + { + this.tagNo = choice.TagNo; + + switch (choice.TagNo) + { + case 0: + value = Asn1Null.GetInstance(choice, false); + break; + case 1: + value = RevokedInfo.GetInstance(choice, false); + break; + case 2: + value = Asn1Null.GetInstance(choice, false); + break; + default: + throw new ArgumentException("Unknown tag encountered: " + Asn1Utilities.GetTagText(choice)); + } + } + + public static CertStatus GetInstance( + object obj) + { + if (obj == null || obj is CertStatus) + { + return (CertStatus)obj; + } + + if (obj is Asn1TaggedObject) + { + return new CertStatus((Asn1TaggedObject)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public int TagNo + { + get { return tagNo; } + } + + public Asn1Encodable Status + { + get { return value; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  CertStatus ::= CHOICE {
+         *                  good        [0]     IMPLICIT Null,
+         *                  revoked     [1]     IMPLICIT RevokedInfo,
+         *                  unknown     [2]     IMPLICIT UnknownInfo }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerTaggedObject(false, tagNo, value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs.meta new file mode 100644 index 00000000..6b5695e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4d3ba235321f4a0499f25d3aaca6e1ad +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CertStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs new file mode 100644 index 00000000..62fedc09 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class CrlID + : Asn1Encodable + { + private readonly DerIA5String crlUrl; + private readonly DerInteger crlNum; + private readonly Asn1GeneralizedTime crlTime; + + // TODO Add GetInstance method(s) and make this private? + public CrlID(Asn1Sequence seq) + { + foreach (Asn1TaggedObject o in seq) + { + switch (o.TagNo) + { + case 0: + crlUrl = DerIA5String.GetInstance(o, true); + break; + case 1: + crlNum = DerInteger.GetInstance(o, true); + break; + case 2: + crlTime = Asn1GeneralizedTime.GetInstance(o, true); + break; + default: + throw new ArgumentException("unknown tag number: " + o.TagNo); + } + } + } + + public DerIA5String CrlUrl + { + get { return crlUrl; } + } + + public DerInteger CrlNum + { + get { return crlNum; } + } + + public Asn1GeneralizedTime CrlTime + { + get { return crlTime; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * CrlID ::= Sequence {
+         *     crlUrl               [0]     EXPLICIT IA5String OPTIONAL,
+         *     crlNum               [1]     EXPLICIT Integer OPTIONAL,
+         *     crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, crlUrl); + v.AddOptionalTagged(true, 1, crlNum); + v.AddOptionalTagged(true, 2, crlTime); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs.meta new file mode 100644 index 00000000..47aea27a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a270ddb13f9b024e8328f62d7a75ede +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/CrlID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs new file mode 100644 index 00000000..6b76fcea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public abstract class OcspObjectIdentifiers + { + internal const string PkixOcspId = "1.3.6.1.5.5.7.48.1"; + + public static readonly DerObjectIdentifier PkixOcsp = new DerObjectIdentifier(PkixOcspId); + public static readonly DerObjectIdentifier PkixOcspBasic = new DerObjectIdentifier(PkixOcspId + ".1"); + + // + // extensions + // + public static readonly DerObjectIdentifier PkixOcspNonce = new DerObjectIdentifier(PkixOcsp + ".2"); + public static readonly DerObjectIdentifier PkixOcspCrl = new DerObjectIdentifier(PkixOcsp + ".3"); + + public static readonly DerObjectIdentifier PkixOcspResponse = new DerObjectIdentifier(PkixOcsp + ".4"); + public static readonly DerObjectIdentifier PkixOcspNocheck = new DerObjectIdentifier(PkixOcsp + ".5"); + public static readonly DerObjectIdentifier PkixOcspArchiveCutoff = new DerObjectIdentifier(PkixOcsp + ".6"); + public static readonly DerObjectIdentifier PkixOcspServiceLocator = new DerObjectIdentifier(PkixOcsp + ".7"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs.meta new file mode 100644 index 00000000..a326dad1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3cdf3f483bd239a438f365b5c7116bfd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs new file mode 100644 index 00000000..236a8d97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs @@ -0,0 +1,88 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class OcspRequest + : Asn1Encodable + { + private readonly TbsRequest tbsRequest; + private readonly Signature optionalSignature; + + public static OcspRequest GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static OcspRequest GetInstance( + object obj) + { + if (obj == null || obj is OcspRequest) + { + return (OcspRequest)obj; + } + + if (obj is Asn1Sequence) + { + return new OcspRequest((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public OcspRequest( + TbsRequest tbsRequest, + Signature optionalSignature) + { + if (tbsRequest == null) + throw new ArgumentNullException("tbsRequest"); + + this.tbsRequest = tbsRequest; + this.optionalSignature = optionalSignature; + } + + private OcspRequest( + Asn1Sequence seq) + { + tbsRequest = TbsRequest.GetInstance(seq[0]); + + if (seq.Count == 2) + { + optionalSignature = Signature.GetInstance( + (Asn1TaggedObject)seq[1], true); + } + } + + public TbsRequest TbsRequest + { + get { return tbsRequest; } + } + + public Signature OptionalSignature + { + get { return optionalSignature; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OcspRequest     ::=     Sequence {
+         *     tbsRequest                  TBSRequest,
+         *     optionalSignature   [0]     EXPLICIT Signature OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(tbsRequest); + v.AddOptionalTagged(true, 0, optionalSignature); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs.meta new file mode 100644 index 00000000..fc5737ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f00ee9eee897a047869c0862e6022e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs new file mode 100644 index 00000000..7892231b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class OcspResponse + : Asn1Encodable + { + private readonly OcspResponseStatus responseStatus; + private readonly ResponseBytes responseBytes; + + public static OcspResponse GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static OcspResponse GetInstance( + object obj) + { + if (obj == null || obj is OcspResponse) + { + return (OcspResponse)obj; + } + + if (obj is Asn1Sequence) + { + return new OcspResponse((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public OcspResponse( + OcspResponseStatus responseStatus, + ResponseBytes responseBytes) + { + if (responseStatus == null) + throw new ArgumentNullException("responseStatus"); + + this.responseStatus = responseStatus; + this.responseBytes = responseBytes; + } + + private OcspResponse( + Asn1Sequence seq) + { + responseStatus = new OcspResponseStatus( + DerEnumerated.GetInstance(seq[0])); + + if (seq.Count == 2) + { + responseBytes = ResponseBytes.GetInstance( + (Asn1TaggedObject)seq[1], true); + } + } + + public OcspResponseStatus ResponseStatus + { + get { return responseStatus; } + } + + public ResponseBytes ResponseBytes + { + get { return responseBytes; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * OcspResponse ::= Sequence {
+         *     responseStatus         OcspResponseStatus,
+         *     responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(responseStatus); + v.AddOptionalTagged(true, 0, responseBytes); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs.meta new file mode 100644 index 00000000..ec3e253e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25f607595e44d8f468452cba8e765218 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs new file mode 100644 index 00000000..e377107b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class OcspResponseStatus + : DerEnumerated + { + public const int Successful = 0; + public const int MalformedRequest = 1; + public const int InternalError = 2; + public const int TryLater = 3; + public const int SignatureRequired = 5; + public const int Unauthorized = 6; + + /** + * The OcspResponseStatus enumeration. + *
+         * OcspResponseStatus ::= Enumerated {
+         *     successful            (0),  --Response has valid confirmations
+         *     malformedRequest      (1),  --Illegal confirmation request
+         *     internalError         (2),  --Internal error in issuer
+         *     tryLater              (3),  --Try again later
+         *                                 --(4) is not used
+         *     sigRequired           (5),  --Must sign the request
+         *     unauthorized          (6)   --Request unauthorized
+         * }
+         * 
+ */ + public OcspResponseStatus(int value) + : base(value) + { + } + + public OcspResponseStatus(DerEnumerated value) + : base(value.IntValueExact) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs.meta new file mode 100644 index 00000000..74d0961e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 343e1dfaaabbf324faae98c0b4ca3016 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/OCSPResponseStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs new file mode 100644 index 00000000..37e7177d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class Request + : Asn1Encodable + { + private readonly CertID reqCert; + private readonly X509Extensions singleRequestExtensions; + + public static Request GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static Request GetInstance( + object obj) + { + if (obj == null || obj is Request) + { + return (Request)obj; + } + + if (obj is Asn1Sequence) + { + return new Request((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Request( + CertID reqCert, + X509Extensions singleRequestExtensions) + { + if (reqCert == null) + throw new ArgumentNullException("reqCert"); + + this.reqCert = reqCert; + this.singleRequestExtensions = singleRequestExtensions; + } + + private Request( + Asn1Sequence seq) + { + reqCert = CertID.GetInstance(seq[0]); + + if (seq.Count == 2) + { + singleRequestExtensions = X509Extensions.GetInstance( + (Asn1TaggedObject)seq[1], true); + } + } + + public CertID ReqCert + { + get { return reqCert; } + } + + public X509Extensions SingleRequestExtensions + { + get { return singleRequestExtensions; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Request         ::=     Sequence {
+         *     reqCert                     CertID,
+         *     singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(reqCert); + v.AddOptionalTagged(true, 0, singleRequestExtensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs.meta new file mode 100644 index 00000000..86b000ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 33c7d75991000524cbad39572f8566f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Request.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs new file mode 100644 index 00000000..bd30bd0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class ResponderID + : Asn1Encodable, IAsn1Choice + { + private readonly Asn1Encodable id; + + public static ResponderID GetInstance( + object obj) + { + if (obj == null || obj is ResponderID) + { + return (ResponderID)obj; + } + + if (obj is DerOctetString) + { + return new ResponderID((DerOctetString)obj); + } + + if (obj is Asn1TaggedObject) + { + Asn1TaggedObject o = (Asn1TaggedObject)obj; + + if (o.TagNo == 1) + { + return new ResponderID(X509Name.GetInstance(o, true)); + } + + return new ResponderID(Asn1OctetString.GetInstance(o, true)); + } + + return new ResponderID(X509Name.GetInstance(obj)); + } + + public ResponderID( + Asn1OctetString id) + { + if (id == null) + throw new ArgumentNullException("id"); + + this.id = id; + } + + public ResponderID( + X509Name id) + { + if (id == null) + throw new ArgumentNullException("id"); + + this.id = id; + } + + public static ResponderID GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(obj.GetObject()); // must be explicitly tagged + } + + public virtual byte[] GetKeyHash() + { + if (id is Asn1OctetString) + { + return ((Asn1OctetString)id).GetOctets(); + } + + return null; + } + + public virtual X509Name Name + { + get + { + if (id is Asn1OctetString) + { + return null; + } + + return X509Name.GetInstance(id); + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ResponderID ::= CHOICE {
+         *      byName          [1] Name,
+         *      byKey           [2] KeyHash }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + if (id is Asn1OctetString) + { + return new DerTaggedObject(true, 2, id); + } + + return new DerTaggedObject(true, 1, id); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs.meta new file mode 100644 index 00000000..25fe750e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fc63b7779ff0c61439730ae8bba82848 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponderID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs new file mode 100644 index 00000000..71b0286a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class ResponseBytes + : Asn1Encodable + { + private readonly DerObjectIdentifier responseType; + private readonly Asn1OctetString response; + + public static ResponseBytes GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static ResponseBytes GetInstance( + object obj) + { + if (obj == null || obj is ResponseBytes) + { + return (ResponseBytes)obj; + } + + if (obj is Asn1Sequence) + { + return new ResponseBytes((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public ResponseBytes( + DerObjectIdentifier responseType, + Asn1OctetString response) + { + if (responseType == null) + throw new ArgumentNullException("responseType"); + if (response == null) + throw new ArgumentNullException("response"); + + this.responseType = responseType; + this.response = response; + } + + private ResponseBytes( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.responseType = DerObjectIdentifier.GetInstance(seq[0]); + this.response = Asn1OctetString.GetInstance(seq[1]); + } + + public DerObjectIdentifier ResponseType + { + get { return responseType; } + } + + public Asn1OctetString Response + { + get { return response; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ResponseBytes ::=       Sequence {
+         *     responseType   OBJECT IDENTIFIER,
+         *     response       OCTET STRING }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(responseType, response); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs.meta new file mode 100644 index 00000000..255efda7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a810ad92acb00f242af349509d44cb4b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseBytes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs new file mode 100644 index 00000000..4b61cb56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs @@ -0,0 +1,157 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class ResponseData + : Asn1Encodable + { + private static readonly DerInteger V1 = new DerInteger(0); + + private readonly bool versionPresent; + private readonly DerInteger version; + private readonly ResponderID responderID; + private readonly Asn1GeneralizedTime producedAt; + private readonly Asn1Sequence responses; + private readonly X509Extensions responseExtensions; + + public static ResponseData GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static ResponseData GetInstance( + object obj) + { + if (obj == null || obj is ResponseData) + { + return (ResponseData)obj; + } + + if (obj is Asn1Sequence) + { + return new ResponseData((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public ResponseData( + DerInteger version, + ResponderID responderID, + Asn1GeneralizedTime producedAt, + Asn1Sequence responses, + X509Extensions responseExtensions) + { + this.version = version; + this.responderID = responderID; + this.producedAt = producedAt; + this.responses = responses; + this.responseExtensions = responseExtensions; + } + + public ResponseData( + ResponderID responderID, + Asn1GeneralizedTime producedAt, + Asn1Sequence responses, + X509Extensions responseExtensions) + : this(V1, responderID, producedAt, responses, responseExtensions) + { + } + + private ResponseData( + Asn1Sequence seq) + { + int index = 0; + + Asn1Encodable enc = seq[0]; + if (enc is Asn1TaggedObject) + { + Asn1TaggedObject o = (Asn1TaggedObject)enc; + + if (o.TagNo == 0) + { + this.versionPresent = true; + this.version = DerInteger.GetInstance(o, true); + index++; + } + else + { + this.version = V1; + } + } + else + { + this.version = V1; + } + + this.responderID = ResponderID.GetInstance(seq[index++]); + this.producedAt = (Asn1GeneralizedTime)seq[index++]; + this.responses = (Asn1Sequence)seq[index++]; + + if (seq.Count > index) + { + this.responseExtensions = X509Extensions.GetInstance( + (Asn1TaggedObject)seq[index], true); + } + } + + public DerInteger Version + { + get { return version; } + } + + public ResponderID ResponderID + { + get { return responderID; } + } + + public Asn1GeneralizedTime ProducedAt + { + get { return producedAt; } + } + + public Asn1Sequence Responses + { + get { return responses; } + } + + public X509Extensions ResponseExtensions + { + get { return responseExtensions; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ResponseData ::= Sequence {
+         *     version              [0] EXPLICIT Version DEFAULT v1,
+         *     responderID              ResponderID,
+         *     producedAt               GeneralizedTime,
+         *     responses                Sequence OF SingleResponse,
+         *     responseExtensions   [1] EXPLICIT Extensions OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (versionPresent || !version.Equals(V1)) + { + v.Add(new DerTaggedObject(true, 0, version)); + } + + v.Add(responderID, producedAt, responses); + v.AddOptionalTagged(true, 1, responseExtensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs.meta new file mode 100644 index 00000000..af943185 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 73f04262b993eaa4cb9f283fef37a601 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ResponseData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs new file mode 100644 index 00000000..f80b4b28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class RevokedInfo + : Asn1Encodable + { + private readonly Asn1GeneralizedTime revocationTime; + private readonly CrlReason revocationReason; + + public static RevokedInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static RevokedInfo GetInstance( + object obj) + { + if (obj == null || obj is RevokedInfo) + { + return (RevokedInfo) obj; + } + + if (obj is Asn1Sequence) + { + return new RevokedInfo((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public RevokedInfo( + Asn1GeneralizedTime revocationTime) + : this(revocationTime, null) + { + } + + public RevokedInfo( + Asn1GeneralizedTime revocationTime, + CrlReason revocationReason) + { + if (revocationTime == null) + throw new ArgumentNullException("revocationTime"); + + this.revocationTime = revocationTime; + this.revocationReason = revocationReason; + } + + private RevokedInfo( + Asn1Sequence seq) + { + this.revocationTime = (Asn1GeneralizedTime)seq[0]; + + if (seq.Count > 1) + { + this.revocationReason = new CrlReason( + DerEnumerated.GetInstance((Asn1TaggedObject) seq[1], true)); + } + } + + public Asn1GeneralizedTime RevocationTime + { + get { return revocationTime; } + } + + public CrlReason RevocationReason + { + get { return revocationReason; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * RevokedInfo ::= Sequence {
+         *      revocationTime              GeneralizedTime,
+         *      revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(revocationTime); + v.AddOptionalTagged(true, 0, revocationReason); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs.meta new file mode 100644 index 00000000..2d1ce0e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74e47e4f5d7ee1348a13175e36afb12a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/RevokedInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs new file mode 100644 index 00000000..e0e13f95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class ServiceLocator + : Asn1Encodable + { + private readonly X509Name issuer; + private readonly Asn1Object locator; + + public static ServiceLocator GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static ServiceLocator GetInstance( + object obj) + { + if (obj == null || obj is ServiceLocator) + { + return (ServiceLocator) obj; + } + + if (obj is Asn1Sequence) + { + return new ServiceLocator((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public ServiceLocator( + X509Name issuer) + : this(issuer, null) + { + } + + public ServiceLocator( + X509Name issuer, + Asn1Object locator) + { + if (issuer == null) + throw new ArgumentNullException("issuer"); + + this.issuer = issuer; + this.locator = locator; + } + + private ServiceLocator( + Asn1Sequence seq) + { + this.issuer = X509Name.GetInstance(seq[0]); + + if (seq.Count > 1) + { + this.locator = seq[1].ToAsn1Object(); + } + } + + public X509Name Issuer + { + get { return issuer; } + } + + public Asn1Object Locator + { + get { return locator; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ServiceLocator ::= Sequence {
+         *     issuer    Name,
+         *     locator   AuthorityInfoAccessSyntax OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(issuer); + v.AddOptional(locator); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs.meta new file mode 100644 index 00000000..fa2fd235 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c91e3d6069fb0e84d8c206a1f2213771 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/ServiceLocator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs new file mode 100644 index 00000000..c9c1e34a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs @@ -0,0 +1,113 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class Signature + : Asn1Encodable + { + internal AlgorithmIdentifier signatureAlgorithm; + internal DerBitString signatureValue; + internal Asn1Sequence certs; + + public static Signature GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static Signature GetInstance( + object obj) + { + if (obj == null || obj is Signature) + { + return (Signature)obj; + } + + if (obj is Asn1Sequence) + { + return new Signature((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Signature( + AlgorithmIdentifier signatureAlgorithm, + DerBitString signatureValue) + : this(signatureAlgorithm, signatureValue, null) + { + } + + public Signature( + AlgorithmIdentifier signatureAlgorithm, + DerBitString signatureValue, + Asn1Sequence certs) + { + if (signatureAlgorithm == null) + throw new ArgumentException("signatureAlgorithm"); + if (signatureValue == null) + throw new ArgumentException("signatureValue"); + + this.signatureAlgorithm = signatureAlgorithm; + this.signatureValue = signatureValue; + this.certs = certs; + } + + private Signature( + Asn1Sequence seq) + { + signatureAlgorithm = AlgorithmIdentifier.GetInstance(seq[0]); + signatureValue = (DerBitString)seq[1]; + + if (seq.Count == 3) + { + certs = Asn1Sequence.GetInstance( + (Asn1TaggedObject)seq[2], true); + } + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return signatureAlgorithm; } + } + + public DerBitString SignatureValue + { + get { return signatureValue; } + } + + public byte[] GetSignatureOctets() + { + return signatureValue.GetOctets(); + } + + public Asn1Sequence Certs + { + get { return certs; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Signature       ::=     Sequence {
+         *     signatureAlgorithm      AlgorithmIdentifier,
+         *     signature               BIT STRING,
+         *     certs               [0] EXPLICIT Sequence OF Certificate OPTIONAL}
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(signatureAlgorithm, signatureValue); + v.AddOptionalTagged(true, 0, certs); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs.meta new file mode 100644 index 00000000..8c369745 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9cb8d71b9385de8418b5a722d2d9579a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/Signature.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs new file mode 100644 index 00000000..8d58632d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs @@ -0,0 +1,131 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class SingleResponse + : Asn1Encodable + { + private readonly CertID certID; + private readonly CertStatus certStatus; + private readonly Asn1GeneralizedTime thisUpdate; + private readonly Asn1GeneralizedTime nextUpdate; + private readonly X509Extensions singleExtensions; + + public SingleResponse( + CertID certID, + CertStatus certStatus, + Asn1GeneralizedTime thisUpdate, + Asn1GeneralizedTime nextUpdate, + X509Extensions singleExtensions) + { + this.certID = certID; + this.certStatus = certStatus; + this.thisUpdate = thisUpdate; + this.nextUpdate = nextUpdate; + this.singleExtensions = singleExtensions; + } + + public SingleResponse( + Asn1Sequence seq) + { + this.certID = CertID.GetInstance(seq[0]); + this.certStatus = CertStatus.GetInstance(seq[1]); + this.thisUpdate = (Asn1GeneralizedTime)seq[2]; + + if (seq.Count > 4) + { + this.nextUpdate = Asn1GeneralizedTime.GetInstance( + (Asn1TaggedObject) seq[3], true); + this.singleExtensions = X509Extensions.GetInstance( + (Asn1TaggedObject) seq[4], true); + } + else if (seq.Count > 3) + { + Asn1TaggedObject o = (Asn1TaggedObject) seq[3]; + + if (o.TagNo == 0) + { + this.nextUpdate = Asn1GeneralizedTime.GetInstance(o, true); + } + else + { + this.singleExtensions = X509Extensions.GetInstance(o, true); + } + } + } + + public static SingleResponse GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static SingleResponse GetInstance( + object obj) + { + if (obj == null || obj is SingleResponse) + { + return (SingleResponse)obj; + } + + if (obj is Asn1Sequence) + { + return new SingleResponse((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public CertID CertId + { + get { return certID; } + } + + public CertStatus CertStatus + { + get { return certStatus; } + } + + public Asn1GeneralizedTime ThisUpdate + { + get { return thisUpdate; } + } + + public Asn1GeneralizedTime NextUpdate + { + get { return nextUpdate; } + } + + public X509Extensions SingleExtensions + { + get { return singleExtensions; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  SingleResponse ::= Sequence {
+         *          certID                       CertID,
+         *          certStatus                   CertStatus,
+         *          thisUpdate                   GeneralizedTime,
+         *          nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
+         *          singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(certID, certStatus, thisUpdate); + v.AddOptionalTagged(true, 0, nextUpdate); + v.AddOptionalTagged(true, 1, singleExtensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs.meta new file mode 100644 index 00000000..f0ddf9d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4214d46efe910cc4b854520cc23d9fa8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/SingleResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs new file mode 100644 index 00000000..09fa1437 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp +{ + public class TbsRequest + : Asn1Encodable + { + private static readonly DerInteger V1 = new DerInteger(0); + + private readonly DerInteger version; + private readonly GeneralName requestorName; + private readonly Asn1Sequence requestList; + private readonly X509Extensions requestExtensions; + + private bool versionSet; + + public static TbsRequest GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static TbsRequest GetInstance( + object obj) + { + if (obj == null || obj is TbsRequest) + { + return (TbsRequest)obj; + } + + if (obj is Asn1Sequence) + { + return new TbsRequest((Asn1Sequence)obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public TbsRequest( + GeneralName requestorName, + Asn1Sequence requestList, + X509Extensions requestExtensions) + { + this.version = V1; + this.requestorName = requestorName; + this.requestList = requestList; + this.requestExtensions = requestExtensions; + } + + private TbsRequest( + Asn1Sequence seq) + { + int index = 0; + + Asn1Encodable enc = seq[0]; + if (enc is Asn1TaggedObject) + { + Asn1TaggedObject o = (Asn1TaggedObject) enc; + + if (o.TagNo == 0) + { + versionSet = true; + version = DerInteger.GetInstance(o, true); + index++; + } + else + { + version = V1; + } + } + else + { + version = V1; + } + + if (seq[index] is Asn1TaggedObject) + { + requestorName = GeneralName.GetInstance((Asn1TaggedObject) seq[index++], true); + } + + requestList = (Asn1Sequence) seq[index++]; + + if (seq.Count == (index + 1)) + { + requestExtensions = X509Extensions.GetInstance((Asn1TaggedObject) seq[index], true); + } + } + + public DerInteger Version + { + get { return version; } + } + + public GeneralName RequestorName + { + get { return requestorName; } + } + + public Asn1Sequence RequestList + { + get { return requestList; } + } + + public X509Extensions RequestExtensions + { + get { return requestExtensions; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * TBSRequest      ::=     Sequence {
+         *     version             [0]     EXPLICIT Version DEFAULT v1,
+         *     requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
+         *     requestList                 Sequence OF Request,
+         *     requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + // + // if default don't include - unless explicitly provided. Not strictly correct + // but required for some requests + // + if (!version.Equals(V1) || versionSet) + { + v.Add(new DerTaggedObject(true, 0, version)); + } + + v.AddOptionalTagged(true, 1, requestorName); + v.Add(requestList); + v.AddOptionalTagged(true, 2, requestExtensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs.meta new file mode 100644 index 00000000..2fdcf82e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6e4f53713011703448927be09e3bfbd3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ocsp/TBSRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw.meta new file mode 100644 index 00000000..0b3afe64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ca8b9848f4801244e93a8033cc87eb8b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs new file mode 100644 index 00000000..7a5073f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw +{ + public class ElGamalParameter + : Asn1Encodable + { + internal DerInteger p, g; + + public ElGamalParameter( + BigInteger p, + BigInteger g) + { + this.p = new DerInteger(p); + this.g = new DerInteger(g); + } + + public ElGamalParameter( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + p = DerInteger.GetInstance(seq[0]); + g = DerInteger.GetInstance(seq[1]); + } + + public BigInteger P + { + get { return p.PositiveValue; } + } + + public BigInteger G + { + get { return g.PositiveValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(p, g); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs.meta new file mode 100644 index 00000000..9039fc4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9bebdf735272df247a9624b98d485314 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/ElGamalParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs new file mode 100644 index 00000000..98dcdff2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw +{ + public abstract class OiwObjectIdentifiers + { + public static readonly DerObjectIdentifier MD4WithRsa = new DerObjectIdentifier("1.3.14.3.2.2"); + public static readonly DerObjectIdentifier MD5WithRsa = new DerObjectIdentifier("1.3.14.3.2.3"); + public static readonly DerObjectIdentifier MD4WithRsaEncryption = new DerObjectIdentifier("1.3.14.3.2.4"); + + public static readonly DerObjectIdentifier DesEcb = new DerObjectIdentifier("1.3.14.3.2.6"); + public static readonly DerObjectIdentifier DesCbc = new DerObjectIdentifier("1.3.14.3.2.7"); + public static readonly DerObjectIdentifier DesOfb = new DerObjectIdentifier("1.3.14.3.2.8"); + public static readonly DerObjectIdentifier DesCfb = new DerObjectIdentifier("1.3.14.3.2.9"); + + public static readonly DerObjectIdentifier DesEde = new DerObjectIdentifier("1.3.14.3.2.17"); + + // id-SHA1 OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } // + public static readonly DerObjectIdentifier IdSha1 = new DerObjectIdentifier("1.3.14.3.2.26"); + + public static readonly DerObjectIdentifier DsaWithSha1 = new DerObjectIdentifier("1.3.14.3.2.27"); + + public static readonly DerObjectIdentifier Sha1WithRsa = new DerObjectIdentifier("1.3.14.3.2.29"); + + // ElGamal Algorithm OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) oiw(14) dirservsig(7) algorithm(2) encryption(1) 1 } + // + public static readonly DerObjectIdentifier ElGamalAlgorithm = new DerObjectIdentifier("1.3.14.7.2.1.1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs.meta new file mode 100644 index 00000000..c75abe3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 575bfad451892c84387b8d6d36305943 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/oiw/OIWObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs.meta new file mode 100644 index 00000000..59e7c165 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b87c35d0e53ee50469adc8ab6a06a396 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs new file mode 100644 index 00000000..a66b6cf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class AttributePkcs + : Asn1Encodable + { + private readonly DerObjectIdentifier attrType; + private readonly Asn1Set attrValues; + + /** + * return an Attribute object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static AttributePkcs GetInstance( + object obj) + { + AttributePkcs attr = obj as AttributePkcs; + if (obj == null || attr != null) + { + return attr; + } + + Asn1Sequence seq = obj as Asn1Sequence; + if (seq != null) + { + return new AttributePkcs(seq); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private AttributePkcs( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + attrType = DerObjectIdentifier.GetInstance(seq[0]); + attrValues = Asn1Set.GetInstance(seq[1]); + } + + public AttributePkcs( + DerObjectIdentifier attrType, + Asn1Set attrValues) + { + this.attrType = attrType; + this.attrValues = attrValues; + } + + public DerObjectIdentifier AttrType + { + get { return attrType; } + } + + public Asn1Set AttrValues + { + get { return attrValues; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Attr ::= Sequence {
+         *     attrType OBJECT IDENTIFIER,
+         *     attrValues Set OF AttributeValue
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(attrType, attrValues); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs.meta new file mode 100644 index 00000000..767b7802 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d268672e1497ee448ce1eb3dcb4e877 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Attribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs new file mode 100644 index 00000000..43da5225 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class AuthenticatedSafe + : Asn1Encodable + { + private static ContentInfo[] Copy(ContentInfo[] info) + { + return (ContentInfo[])info.Clone(); + } + + public static AuthenticatedSafe GetInstance(object obj) + { + if (obj is AuthenticatedSafe) + return (AuthenticatedSafe)obj; + if (obj == null) + return null; + return new AuthenticatedSafe(Asn1Sequence.GetInstance(obj)); + } + + private readonly ContentInfo[] info; + private readonly bool isBer; + + private AuthenticatedSafe(Asn1Sequence seq) + { + info = new ContentInfo[seq.Count]; + + for (int i = 0; i != info.Length; i++) + { + info[i] = ContentInfo.GetInstance(seq[i]); + } + + isBer = seq is BerSequence; + } + + public AuthenticatedSafe( + ContentInfo[] info) + { + this.info = Copy(info); + this.isBer = true; + } + + public ContentInfo[] GetContentInfo() + { + return Copy(info); + } + + public override Asn1Object ToAsn1Object() + { + if (isBer) + { + return new BerSequence(info); + } + + // TODO bc-java uses DL sequence + //return new DLSequence(info); + return new DerSequence(info); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs.meta new file mode 100644 index 00000000..65b6f60e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9fb6dd81e8425c14990ae72a959720c7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/AuthenticatedSafe.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs new file mode 100644 index 00000000..6463be37 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class CertBag + : Asn1Encodable + { + public static CertBag GetInstance(object obj) + { + if (obj is CertBag) + return (CertBag)obj; + if (obj == null) + return null; + return new CertBag(Asn1Sequence.GetInstance(obj)); + } + + private readonly DerObjectIdentifier certID; + private readonly Asn1Object certValue; + + private CertBag(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.certID = DerObjectIdentifier.GetInstance(seq[0]); + this.certValue = Asn1TaggedObject.GetInstance(seq[1]).GetObject(); + } + + public CertBag( + DerObjectIdentifier certID, + Asn1Object certValue) + { + this.certID = certID; + this.certValue = certValue; + } + + public virtual DerObjectIdentifier CertID + { + get { return certID; } + } + + public virtual Asn1Object CertValue + { + get { return certValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(certID, new DerTaggedObject(0, certValue)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs.meta new file mode 100644 index 00000000..0fef208d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b1219cc2eca6ed408abf4ec1ddc9385 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertBag.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs new file mode 100644 index 00000000..4c5da7e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * Pkcs10 Certfication request object. + *
+     * CertificationRequest ::= Sequence {
+     *   certificationRequestInfo  CertificationRequestInfo,
+     *   signatureAlgorithm        AlgorithmIdentifier{{ SignatureAlgorithms }},
+     *   signature                 BIT STRING
+     * }
+     * 
+ */ + public class CertificationRequest + : Asn1Encodable + { + protected CertificationRequestInfo reqInfo; + protected AlgorithmIdentifier sigAlgId; + protected DerBitString sigBits; + + public static CertificationRequest GetInstance( + object obj) + { + if (obj == null) + return null; + if (obj is CertificationRequest) + return (CertificationRequest)obj; + return new CertificationRequest(Asn1Sequence.GetInstance(obj)); + } + + protected CertificationRequest() + { + } + + public CertificationRequest( + CertificationRequestInfo requestInfo, + AlgorithmIdentifier algorithm, + DerBitString signature) + { + this.reqInfo = requestInfo; + this.sigAlgId = algorithm; + this.sigBits = signature; + } + + internal CertificationRequest(Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + reqInfo = CertificationRequestInfo.GetInstance(seq[0]); + sigAlgId = AlgorithmIdentifier.GetInstance(seq[1]); + sigBits = DerBitString.GetInstance(seq[2]); + } + + public CertificationRequestInfo GetCertificationRequestInfo() + { + return reqInfo; + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return sigAlgId; } + } + + public DerBitString Signature + { + get { return sigBits; } + } + + public byte[] GetSignatureOctets() + { + return sigBits.GetOctets(); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(reqInfo, sigAlgId, sigBits); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs.meta new file mode 100644 index 00000000..96413fd2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec57ebecbac0c3c49a399591def4ab9c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs new file mode 100644 index 00000000..3429481f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs @@ -0,0 +1,135 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * Pkcs10 CertificationRequestInfo object. + *
+     *  CertificationRequestInfo ::= Sequence {
+     *   version             Integer { v1(0) } (v1,...),
+     *   subject             Name,
+     *   subjectPKInfo   SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
+     *   attributes          [0] Attributes{{ CRIAttributes }}
+     *  }
+     *
+     *  Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }}
+     *
+     *  Attr { ATTRIBUTE:IOSet } ::= Sequence {
+     *    type    ATTRIBUTE.&id({IOSet}),
+     *    values  Set SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{\@type})
+     *  }
+     * 
+ */ + public class CertificationRequestInfo + : Asn1Encodable + { + internal DerInteger version = new DerInteger(0); + internal X509Name subject; + internal SubjectPublicKeyInfo subjectPKInfo; + internal Asn1Set attributes; + + public static CertificationRequestInfo GetInstance(object obj) + { + if (obj is CertificationRequestInfo) + return (CertificationRequestInfo)obj; + if (obj != null) + return new CertificationRequestInfo(Asn1Sequence.GetInstance(obj)); + return null; + } + + public CertificationRequestInfo( + X509Name subject, + SubjectPublicKeyInfo pkInfo, + Asn1Set attributes) + { + this.subject = subject; + this.subjectPKInfo = pkInfo; + this.attributes = attributes; + + ValidateAttributes(attributes); + + if (subject == null || version == null || subjectPKInfo == null) + { + throw new ArgumentException( + "Not all mandatory fields set in CertificationRequestInfo generator."); + } + } + + private CertificationRequestInfo( + Asn1Sequence seq) + { + version = (DerInteger) seq[0]; + + subject = X509Name.GetInstance(seq[1]); + subjectPKInfo = SubjectPublicKeyInfo.GetInstance(seq[2]); + + // + // some CertificationRequestInfo objects seem to treat this field + // as optional. + // + if (seq.Count > 3) + { + DerTaggedObject tagobj = (DerTaggedObject) seq[3]; + attributes = Asn1Set.GetInstance(tagobj, false); + } + + ValidateAttributes(attributes); + + if (subject == null || version == null || subjectPKInfo == null) + { + throw new ArgumentException( + "Not all mandatory fields set in CertificationRequestInfo generator."); + } + } + + public DerInteger Version + { + get { return version; } + } + + public X509Name Subject + { + get { return subject; } + } + + public SubjectPublicKeyInfo SubjectPublicKeyInfo + { + get { return subjectPKInfo; } + } + + public Asn1Set Attributes + { + get { return attributes; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, subject, subjectPKInfo); + v.AddOptionalTagged(false, 0, attributes); + return new DerSequence(v); + } + + private static void ValidateAttributes(Asn1Set attributes) + { + if (attributes == null) + return; + + foreach (Asn1Encodable ae in attributes) + { + Asn1Object obj = ae.ToAsn1Object(); + AttributePkcs attr = AttributePkcs.GetInstance(obj); + if (attr.AttrType.Equals(PkcsObjectIdentifiers.Pkcs9AtChallengePassword)) + { + if (attr.AttrValues.Count != 1) + throw new ArgumentException("challengePassword attribute must have one value"); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs.meta new file mode 100644 index 00000000..5e9fa3cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 39d9369d046e0624fb04640d2e352bfc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/CertificationRequestInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs new file mode 100644 index 00000000..793b8d62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class ContentInfo + : Asn1Encodable + { + private readonly DerObjectIdentifier contentType; + private readonly Asn1Encodable content; + + public static ContentInfo GetInstance(object obj) + { + if (obj == null) + return null; + ContentInfo existing = obj as ContentInfo; + if (existing != null) + return existing; + return new ContentInfo(Asn1Sequence.GetInstance(obj)); + } + + private ContentInfo( + Asn1Sequence seq) + { + contentType = (DerObjectIdentifier) seq[0]; + + if (seq.Count > 1) + { + content = ((Asn1TaggedObject) seq[1]).GetObject(); + } + } + + public ContentInfo( + DerObjectIdentifier contentType, + Asn1Encodable content) + { + this.contentType = contentType; + this.content = content; + } + + public DerObjectIdentifier ContentType + { + get { return contentType; } + } + + public Asn1Encodable Content + { + get { return content; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * ContentInfo ::= Sequence {
+         *          contentType ContentType,
+         *          content
+         *          [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(contentType); + + if (content != null) + { + v.Add(new BerTaggedObject(0, content)); + } + + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs.meta new file mode 100644 index 00000000..c0821ae1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ef23aeb3896d664f84c2b3ea17ab39a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/ContentInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs new file mode 100644 index 00000000..bb3ec764 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class DHParameter + : Asn1Encodable + { + internal DerInteger p, g, l; + + public DHParameter( + BigInteger p, + BigInteger g, + int l) + { + this.p = new DerInteger(p); + this.g = new DerInteger(g); + + if (l != 0) + { + this.l = new DerInteger(l); + } + } + + public DHParameter( + Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + p = (DerInteger)e.Current; + + e.MoveNext(); + g = (DerInteger)e.Current; + + if (e.MoveNext()) + { + l = (DerInteger) e.Current; + } + } + + public BigInteger P + { + get { return p.PositiveValue; } + } + + public BigInteger G + { + get { return g.PositiveValue; } + } + + public BigInteger L + { + get { return l == null ? null : l.PositiveValue; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(p, g); + v.AddOptional(l); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs.meta new file mode 100644 index 00000000..ca34fbed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e7a5d221997748c4bb607ccbaea8617a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/DHParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs new file mode 100644 index 00000000..28392123 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * The EncryptedData object. + *
+     *      EncryptedData ::= Sequence {
+     *           version Version,
+     *           encryptedContentInfo EncryptedContentInfo
+     *      }
+     *
+     *
+     *      EncryptedContentInfo ::= Sequence {
+     *          contentType ContentType,
+     *          contentEncryptionAlgorithm  ContentEncryptionAlgorithmIdentifier,
+     *          encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL
+     *    }
+     *
+     *    EncryptedContent ::= OCTET STRING
+     * 
+ */ + public class EncryptedData + : Asn1Encodable + { + private readonly Asn1Sequence data; +// private readonly DerObjectIdentifier bagId; +// private readonly Asn1Object bagValue; + + public static EncryptedData GetInstance( + object obj) + { + if (obj is EncryptedData) + { + return (EncryptedData) obj; + } + + if (obj is Asn1Sequence) + { + return new EncryptedData((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private EncryptedData( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + DerInteger version = (DerInteger)seq[0]; + if (!version.HasValue(0)) + throw new ArgumentException("sequence not version 0"); + + this.data = (Asn1Sequence) seq[1]; + } + + public EncryptedData( + DerObjectIdentifier contentType, + AlgorithmIdentifier encryptionAlgorithm, + Asn1Encodable content) + { + data = new BerSequence( + contentType, + encryptionAlgorithm.ToAsn1Object(), + new BerTaggedObject(false, 0, content)); + } + + public DerObjectIdentifier ContentType + { + get { return (DerObjectIdentifier) data[0]; } + } + + public AlgorithmIdentifier EncryptionAlgorithm + { + get { return AlgorithmIdentifier.GetInstance(data[1]); } + } + + public Asn1OctetString Content + { + get + { + if (data.Count == 3) + { + DerTaggedObject o = (DerTaggedObject) data[2]; + + return Asn1OctetString.GetInstance(o, false); + } + + return null; + } + } + + public override Asn1Object ToAsn1Object() + { + return new BerSequence(new DerInteger(0), data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs.meta new file mode 100644 index 00000000..73506c0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a61974c3c96b5343916f5ae4fda77c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs new file mode 100644 index 00000000..01bfabec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class EncryptedPrivateKeyInfo + : Asn1Encodable + { + private readonly AlgorithmIdentifier algId; + private readonly Asn1OctetString data; + + private EncryptedPrivateKeyInfo(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + algId = AlgorithmIdentifier.GetInstance(seq[0]); + data = Asn1OctetString.GetInstance(seq[1]); + } + + public EncryptedPrivateKeyInfo( + AlgorithmIdentifier algId, + byte[] encoding) + { + this.algId = algId; + this.data = new DerOctetString(encoding); + } + + public static EncryptedPrivateKeyInfo GetInstance( + object obj) + { + if (obj is EncryptedPrivateKeyInfo) + { + return (EncryptedPrivateKeyInfo) obj; + } + + if (obj is Asn1Sequence seq) + return new EncryptedPrivateKeyInfo(seq); + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public AlgorithmIdentifier EncryptionAlgorithm + { + get { return algId; } + } + + public byte[] GetEncryptedData() + { + return data.GetOctets(); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * EncryptedPrivateKeyInfo ::= Sequence {
+         *      encryptionAlgorithm AlgorithmIdentifier {{KeyEncryptionAlgorithms}},
+         *      encryptedData EncryptedData
+         * }
+         *
+         * EncryptedData ::= OCTET STRING
+         *
+         * KeyEncryptionAlgorithms ALGORITHM-IDENTIFIER ::= {
+         *          ... -- For local profiles
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(algId, data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs.meta new file mode 100644 index 00000000..a0ab839f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cabd96d4b4fb45e4a9477ae611e12485 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptedPrivateKeyInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs new file mode 100644 index 00000000..6684a1e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class EncryptionScheme + : AlgorithmIdentifier + { + public EncryptionScheme( + DerObjectIdentifier objectID) + : base(objectID) + { + } + + public EncryptionScheme( + DerObjectIdentifier objectID, + Asn1Encodable parameters) + : base(objectID, parameters) + { + } + + internal EncryptionScheme( + Asn1Sequence seq) + : this((DerObjectIdentifier)seq[0], seq[1]) + { + } + + public new static EncryptionScheme GetInstance(object obj) + { + if (obj is EncryptionScheme) + { + return (EncryptionScheme)obj; + } + + if (obj is Asn1Sequence) + { + return new EncryptionScheme((Asn1Sequence)obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Asn1Object Asn1Object + { + get { return Parameters.ToAsn1Object(); } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(Algorithm, Parameters); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs.meta new file mode 100644 index 00000000..b3c89e1d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 11049dd1b7d45a04ea99a06552561c31 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/EncryptionScheme.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs new file mode 100644 index 00000000..13c4dd8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class IssuerAndSerialNumber + : Asn1Encodable + { + private readonly X509Name name; + private readonly DerInteger certSerialNumber; + + public static IssuerAndSerialNumber GetInstance( + object obj) + { + if (obj is IssuerAndSerialNumber) + { + return (IssuerAndSerialNumber) obj; + } + + if (obj is Asn1Sequence) + { + return new IssuerAndSerialNumber((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private IssuerAndSerialNumber( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.name = X509Name.GetInstance(seq[0]); + this.certSerialNumber = DerInteger.GetInstance(seq[1]); + } + + public IssuerAndSerialNumber( + X509Name name, + BigInteger certSerialNumber) + { + this.name = name; + this.certSerialNumber = new DerInteger(certSerialNumber); + } + + public IssuerAndSerialNumber( + X509Name name, + DerInteger certSerialNumber) + { + this.name = name; + this.certSerialNumber = certSerialNumber; + } + + public X509Name Name + { + get { return name; } + } + + public DerInteger CertificateSerialNumber + { + get { return certSerialNumber; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(name, certSerialNumber); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs.meta new file mode 100644 index 00000000..8a48c8d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b4832801ca7151458986f5012c2e8e6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/IssuerAndSerialNumber.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs new file mode 100644 index 00000000..d3187529 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class KeyDerivationFunc + : AlgorithmIdentifier + { + internal KeyDerivationFunc(Asn1Sequence seq) + : base(seq) + { + } + + public KeyDerivationFunc( + DerObjectIdentifier id, + Asn1Encodable parameters) + : base(id, parameters) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs.meta new file mode 100644 index 00000000..361c1037 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f43d3668186ac844cbfdd49c34abbfbd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/KeyDerivationFunc.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs new file mode 100644 index 00000000..1189f701 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class MacData + : Asn1Encodable + { + internal DigestInfo digInfo; + internal byte[] salt; + internal BigInteger iterationCount; + + public static MacData GetInstance( + object obj) + { + if (obj is MacData) + { + return (MacData) obj; + } + + if (obj is Asn1Sequence) + { + return new MacData((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private MacData( + Asn1Sequence seq) + { + this.digInfo = DigestInfo.GetInstance(seq[0]); + this.salt = ((Asn1OctetString) seq[1]).GetOctets(); + + if (seq.Count == 3) + { + this.iterationCount = ((DerInteger) seq[2]).Value; + } + else + { + this.iterationCount = BigInteger.One; + } + } + + public MacData( + DigestInfo digInfo, + byte[] salt, + int iterationCount) + { + this.digInfo = digInfo; + this.salt = (byte[]) salt.Clone(); + this.iterationCount = BigInteger.ValueOf(iterationCount); + } + + public DigestInfo Mac + { + get { return digInfo; } + } + + public byte[] GetSalt() + { + return (byte[]) salt.Clone(); + } + + public BigInteger IterationCount + { + get { return iterationCount; } + } + + /** + *
+		 * MacData ::= SEQUENCE {
+		 *     mac      DigestInfo,
+		 *     macSalt  OCTET STRING,
+		 *     iterations INTEGER DEFAULT 1
+		 *     -- Note: The default is for historic reasons and its use is deprecated. A
+		 *     -- higher value, like 1024 is recommended.
+		 * 
+ * @return the basic DERObject construction. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(digInfo, new DerOctetString(salt)); + + if (!iterationCount.Equals(BigInteger.One)) + { + v.Add(new DerInteger(iterationCount)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs.meta new file mode 100644 index 00000000..2467d38f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32c8c807cc496de4e9d6ca0bf91adc71 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/MacData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs new file mode 100644 index 00000000..4617a952 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class PbeParameter + : Asn1Encodable + { + private readonly Asn1OctetString salt; + private readonly DerInteger iterationCount; + + public static PbeParameter GetInstance(object obj) + { + if (obj is PbeParameter || obj == null) + { + return (PbeParameter) obj; + } + + if (obj is Asn1Sequence) + { + return new PbeParameter((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private PbeParameter(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + salt = Asn1OctetString.GetInstance(seq[0]); + iterationCount = DerInteger.GetInstance(seq[1]); + } + + public PbeParameter(byte[] salt, int iterationCount) + { + this.salt = new DerOctetString(salt); + this.iterationCount = new DerInteger(iterationCount); + } + + public byte[] GetSalt() + { + return salt.GetOctets(); + } + + public BigInteger IterationCount + { + get { return iterationCount.Value; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(salt, iterationCount); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs.meta new file mode 100644 index 00000000..c9b56c47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e94bc4f5aa52ba241b77cf94c5b2e875 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBEParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs new file mode 100644 index 00000000..15359430 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class PbeS2Parameters + : Asn1Encodable + { + private readonly KeyDerivationFunc func; + private readonly EncryptionScheme scheme; + + public static PbeS2Parameters GetInstance(object obj) + { + if (obj == null) + return null; + PbeS2Parameters existing = obj as PbeS2Parameters; + if (existing != null) + return existing; + return new PbeS2Parameters(Asn1Sequence.GetInstance(obj)); + } + + public PbeS2Parameters(KeyDerivationFunc keyDevFunc, EncryptionScheme encScheme) + { + this.func = keyDevFunc; + this.scheme = encScheme; + } + + private PbeS2Parameters(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + Asn1Sequence funcSeq = (Asn1Sequence)seq[0].ToAsn1Object(); + + // TODO Not sure if this special case is really necessary/appropriate + if (funcSeq[0].Equals(PkcsObjectIdentifiers.IdPbkdf2)) + { + func = new KeyDerivationFunc(PkcsObjectIdentifiers.IdPbkdf2, + Pbkdf2Params.GetInstance(funcSeq[1])); + } + else + { + func = new KeyDerivationFunc(funcSeq); + } + + scheme = EncryptionScheme.GetInstance(seq[1].ToAsn1Object()); + } + + public KeyDerivationFunc KeyDerivationFunc + { + get { return func; } + } + + public EncryptionScheme EncryptionScheme + { + get { return scheme; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(func, scheme); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs.meta new file mode 100644 index 00000000..a1f474c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 38bf767c1b3addb40b6d4e0993b124f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBES2Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs new file mode 100644 index 00000000..539f71c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class Pbkdf2Params + : Asn1Encodable + { + private static AlgorithmIdentifier algid_hmacWithSHA1 = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdHmacWithSha1, DerNull.Instance); + + private readonly Asn1OctetString octStr; + private readonly DerInteger iterationCount, keyLength; + private readonly AlgorithmIdentifier prf; + + public static Pbkdf2Params GetInstance( + object obj) + { + if (obj == null || obj is Pbkdf2Params) + return (Pbkdf2Params)obj; + + if (obj is Asn1Sequence) + return new Pbkdf2Params((Asn1Sequence)obj); + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Pbkdf2Params( + Asn1Sequence seq) + { + if (seq.Count < 2 || seq.Count > 4) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.octStr = (Asn1OctetString)seq[0]; + this.iterationCount = (DerInteger)seq[1]; + + Asn1Encodable kl = null, d = null; + if (seq.Count > 3) + { + kl = seq[2]; + d = seq[3]; + } + else if (seq.Count > 2) + { + if (seq[2] is DerInteger) + { + kl = seq[2]; + } + else + { + d = seq[2]; + } + } + if (kl != null) + { + keyLength = (DerInteger)kl; + } + if (d != null) + { + prf = AlgorithmIdentifier.GetInstance(d); + } + } + + public Pbkdf2Params( + byte[] salt, + int iterationCount) + { + this.octStr = new DerOctetString(salt); + this.iterationCount = new DerInteger(iterationCount); + } + + public Pbkdf2Params( + byte[] salt, + int iterationCount, + int keyLength) + : this(salt, iterationCount) + { + this.keyLength = new DerInteger(keyLength); + } + + public Pbkdf2Params( + byte[] salt, + int iterationCount, + int keyLength, + AlgorithmIdentifier prf) + : this(salt, iterationCount, keyLength) + { + this.prf = prf; + } + + public Pbkdf2Params( + byte[] salt, + int iterationCount, + AlgorithmIdentifier prf) + : this(salt, iterationCount) + { + this.prf = prf; + } + + public byte[] GetSalt() + { + return octStr.GetOctets(); + } + + public BigInteger IterationCount + { + get { return iterationCount.Value; } + } + + public BigInteger KeyLength + { + get { return keyLength == null ? null : keyLength.Value; } + } + + public bool IsDefaultPrf + { + get { return prf == null || prf.Equals(algid_hmacWithSHA1); } + } + + public AlgorithmIdentifier Prf + { + get { return prf != null ? prf : algid_hmacWithSHA1; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(octStr, iterationCount); + v.AddOptional(keyLength); + + if (!IsDefaultPrf) + { + v.Add(prf); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs.meta new file mode 100644 index 00000000..3baf55f2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 847bdf2c765ac9543bb9eaca350caf03 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PBKDF2Params.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs new file mode 100644 index 00000000..aee1ce45 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class Pkcs12PbeParams + : Asn1Encodable + { + private readonly DerInteger iterations; + private readonly Asn1OctetString iv; + + public Pkcs12PbeParams( + byte[] salt, + int iterations) + { + this.iv = new DerOctetString(salt); + this.iterations = new DerInteger(iterations); + } + + private Pkcs12PbeParams( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + iv = Asn1OctetString.GetInstance(seq[0]); + iterations = DerInteger.GetInstance(seq[1]); + } + + public static Pkcs12PbeParams GetInstance( + object obj) + { + if (obj is Pkcs12PbeParams) + { + return (Pkcs12PbeParams) obj; + } + + if (obj is Asn1Sequence) + { + return new Pkcs12PbeParams((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public BigInteger Iterations + { + get { return iterations.Value; } + } + + public byte[] GetIV() + { + return iv.GetOctets(); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(iv, iterations); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs.meta new file mode 100644 index 00000000..1d7be13f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3d3038c74fca8ff42a93a94e90a17587 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCS12PBEParams.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs new file mode 100644 index 00000000..0a942268 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs @@ -0,0 +1,306 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public abstract class PkcsObjectIdentifiers + { + // + // pkcs-1 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } + // + public const string Pkcs1 = "1.2.840.113549.1.1"; + internal static readonly DerObjectIdentifier Pkcs1Oid = new DerObjectIdentifier(Pkcs1); + + public static readonly DerObjectIdentifier RsaEncryption = Pkcs1Oid.Branch("1"); + public static readonly DerObjectIdentifier MD2WithRsaEncryption = Pkcs1Oid.Branch("2"); + public static readonly DerObjectIdentifier MD4WithRsaEncryption = Pkcs1Oid.Branch("3"); + public static readonly DerObjectIdentifier MD5WithRsaEncryption = Pkcs1Oid.Branch("4"); + public static readonly DerObjectIdentifier Sha1WithRsaEncryption = Pkcs1Oid.Branch("5"); + public static readonly DerObjectIdentifier SrsaOaepEncryptionSet = Pkcs1Oid.Branch("6"); + public static readonly DerObjectIdentifier IdRsaesOaep = Pkcs1Oid.Branch("7"); + public static readonly DerObjectIdentifier IdMgf1 = Pkcs1Oid.Branch("8"); + public static readonly DerObjectIdentifier IdPSpecified = Pkcs1Oid.Branch("9"); + public static readonly DerObjectIdentifier IdRsassaPss = Pkcs1Oid.Branch("10"); + public static readonly DerObjectIdentifier Sha256WithRsaEncryption = Pkcs1Oid.Branch("11"); + public static readonly DerObjectIdentifier Sha384WithRsaEncryption = Pkcs1Oid.Branch("12"); + public static readonly DerObjectIdentifier Sha512WithRsaEncryption = Pkcs1Oid.Branch("13"); + public static readonly DerObjectIdentifier Sha224WithRsaEncryption = Pkcs1Oid.Branch("14"); + /** PKCS#1: 1.2.840.113549.1.1.15 */ + public static readonly DerObjectIdentifier Sha512_224WithRSAEncryption = Pkcs1Oid.Branch("15"); + /** PKCS#1: 1.2.840.113549.1.1.16 */ + public static readonly DerObjectIdentifier Sha512_256WithRSAEncryption = Pkcs1Oid.Branch("16"); + + // + // pkcs-3 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 3 } + // + public const string Pkcs3 = "1.2.840.113549.1.3"; + + public static readonly DerObjectIdentifier DhKeyAgreement = new DerObjectIdentifier(Pkcs3 + ".1"); + + // + // pkcs-5 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } + // + public const string Pkcs5 = "1.2.840.113549.1.5"; + + public static readonly DerObjectIdentifier PbeWithMD2AndDesCbc = new DerObjectIdentifier(Pkcs5 + ".1"); + public static readonly DerObjectIdentifier PbeWithMD2AndRC2Cbc = new DerObjectIdentifier(Pkcs5 + ".4"); + public static readonly DerObjectIdentifier PbeWithMD5AndDesCbc = new DerObjectIdentifier(Pkcs5 + ".3"); + public static readonly DerObjectIdentifier PbeWithMD5AndRC2Cbc = new DerObjectIdentifier(Pkcs5 + ".6"); + public static readonly DerObjectIdentifier PbeWithSha1AndDesCbc = new DerObjectIdentifier(Pkcs5 + ".10"); + public static readonly DerObjectIdentifier PbeWithSha1AndRC2Cbc = new DerObjectIdentifier(Pkcs5 + ".11"); + + public static readonly DerObjectIdentifier IdPbeS2 = new DerObjectIdentifier(Pkcs5 + ".13"); + public static readonly DerObjectIdentifier IdPbkdf2 = new DerObjectIdentifier(Pkcs5 + ".12"); + + // + // encryptionAlgorithm OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) 3 } + // + public const string EncryptionAlgorithm = "1.2.840.113549.3"; + + public static readonly DerObjectIdentifier DesEde3Cbc = new DerObjectIdentifier(EncryptionAlgorithm + ".7"); + public static readonly DerObjectIdentifier RC2Cbc = new DerObjectIdentifier(EncryptionAlgorithm + ".2"); + public static readonly DerObjectIdentifier rc4 = new DerObjectIdentifier(EncryptionAlgorithm + ".4"); + + // + // object identifiers for digests + // + public const string DigestAlgorithm = "1.2.840.113549.2"; + + // + // md2 OBJECT IDENTIFIER ::= + // {iso(1) member-body(2) US(840) rsadsi(113549) DigestAlgorithm(2) 2} + // + public static readonly DerObjectIdentifier MD2 = new DerObjectIdentifier(DigestAlgorithm + ".2"); + + // + // md4 OBJECT IDENTIFIER ::= + // {iso(1) member-body(2) US(840) rsadsi(113549) DigestAlgorithm(2) 4} + // + public static readonly DerObjectIdentifier MD4 = new DerObjectIdentifier(DigestAlgorithm + ".4"); + + // + // md5 OBJECT IDENTIFIER ::= + // {iso(1) member-body(2) US(840) rsadsi(113549) DigestAlgorithm(2) 5} + // + public static readonly DerObjectIdentifier MD5 = new DerObjectIdentifier(DigestAlgorithm + ".5"); + + public static readonly DerObjectIdentifier IdHmacWithSha1 = new DerObjectIdentifier(DigestAlgorithm + ".7"); + public static readonly DerObjectIdentifier IdHmacWithSha224 = new DerObjectIdentifier(DigestAlgorithm + ".8"); + public static readonly DerObjectIdentifier IdHmacWithSha256 = new DerObjectIdentifier(DigestAlgorithm + ".9"); + public static readonly DerObjectIdentifier IdHmacWithSha384 = new DerObjectIdentifier(DigestAlgorithm + ".10"); + public static readonly DerObjectIdentifier IdHmacWithSha512 = new DerObjectIdentifier(DigestAlgorithm + ".11"); + + // + // pkcs-7 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 7 } + // + public const string Pkcs7 = "1.2.840.113549.1.7"; + + public static readonly DerObjectIdentifier Data = new DerObjectIdentifier(Pkcs7 + ".1"); + public static readonly DerObjectIdentifier SignedData = new DerObjectIdentifier(Pkcs7 + ".2"); + public static readonly DerObjectIdentifier EnvelopedData = new DerObjectIdentifier(Pkcs7 + ".3"); + public static readonly DerObjectIdentifier SignedAndEnvelopedData = new DerObjectIdentifier(Pkcs7 + ".4"); + public static readonly DerObjectIdentifier DigestedData = new DerObjectIdentifier(Pkcs7 + ".5"); + public static readonly DerObjectIdentifier EncryptedData = new DerObjectIdentifier(Pkcs7 + ".6"); + + // + // pkcs-9 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } + // + public const string Pkcs9 = "1.2.840.113549.1.9"; + + public static readonly DerObjectIdentifier Pkcs9AtEmailAddress = new DerObjectIdentifier(Pkcs9 + ".1"); + public static readonly DerObjectIdentifier Pkcs9AtUnstructuredName = new DerObjectIdentifier(Pkcs9 + ".2"); + public static readonly DerObjectIdentifier Pkcs9AtContentType = new DerObjectIdentifier(Pkcs9 + ".3"); + public static readonly DerObjectIdentifier Pkcs9AtMessageDigest = new DerObjectIdentifier(Pkcs9 + ".4"); + public static readonly DerObjectIdentifier Pkcs9AtSigningTime = new DerObjectIdentifier(Pkcs9 + ".5"); + public static readonly DerObjectIdentifier Pkcs9AtCounterSignature = new DerObjectIdentifier(Pkcs9 + ".6"); + public static readonly DerObjectIdentifier Pkcs9AtChallengePassword = new DerObjectIdentifier(Pkcs9 + ".7"); + public static readonly DerObjectIdentifier Pkcs9AtUnstructuredAddress = new DerObjectIdentifier(Pkcs9 + ".8"); + public static readonly DerObjectIdentifier Pkcs9AtExtendedCertificateAttributes = new DerObjectIdentifier(Pkcs9 + ".9"); + public static readonly DerObjectIdentifier Pkcs9AtSigningDescription = new DerObjectIdentifier(Pkcs9 + ".13"); + public static readonly DerObjectIdentifier Pkcs9AtExtensionRequest = new DerObjectIdentifier(Pkcs9 + ".14"); + public static readonly DerObjectIdentifier Pkcs9AtSmimeCapabilities = new DerObjectIdentifier(Pkcs9 + ".15"); + public static readonly DerObjectIdentifier IdSmime = new DerObjectIdentifier(Pkcs9 + ".16"); + + public static readonly DerObjectIdentifier Pkcs9AtFriendlyName = new DerObjectIdentifier(Pkcs9 + ".20"); + public static readonly DerObjectIdentifier Pkcs9AtLocalKeyID = new DerObjectIdentifier(Pkcs9 + ".21"); + + public const string CertTypes = Pkcs9 + ".22"; + public static readonly DerObjectIdentifier X509Certificate = new DerObjectIdentifier(CertTypes + ".1"); + public static readonly DerObjectIdentifier SdsiCertificate = new DerObjectIdentifier(CertTypes + ".2"); + + public const string CrlTypes = Pkcs9 + ".23"; + public static readonly DerObjectIdentifier X509Crl = new DerObjectIdentifier(CrlTypes + ".1"); + + public static readonly DerObjectIdentifier IdAlg = IdSmime.Branch("3"); + + public static readonly DerObjectIdentifier IdAlgEsdh = IdAlg.Branch("5"); + public static readonly DerObjectIdentifier IdAlgCms3DesWrap = IdAlg.Branch("6"); + public static readonly DerObjectIdentifier IdAlgCmsRC2Wrap = IdAlg.Branch("7"); + public static readonly DerObjectIdentifier IdAlgZlibCompress = IdAlg.Branch("8"); + public static readonly DerObjectIdentifier IdAlgPwriKek = IdAlg.Branch("9"); + public static readonly DerObjectIdentifier IdAlgSsdh = IdAlg.Branch("10"); + + /* + *
+         * -- RSA-KEM Key Transport Algorithm
+         *
+         * id-rsa-kem OID ::= {
+         *      iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
+         *      pkcs-9(9) smime(16) alg(3) 14
+         *   }
+         * 
+ */ + public static readonly DerObjectIdentifier IdRsaKem = IdAlg.Branch("14"); + + /** + *
+         * id-alg-AEADChaCha20Poly1305 OBJECT IDENTIFIER ::=
+         * { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
+         *    pkcs9(9) smime(16) alg(3) 18 }
+         *
+         * AEADChaCha20Poly1305Nonce ::= OCTET STRING (SIZE(12))
+         * 
+ */ + public static readonly DerObjectIdentifier IdAlgAeadChaCha20Poly1305 = IdAlg.Branch("18"); + + + /** + * id-alg-hss-lms-hashsig OBJECT IDENTIFIER ::= { iso(1) + * member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) + * smime(16) alg(3) 17 } + */ + public static readonly DerObjectIdentifier IdAlgHssLmsHashsig = IdAlg.Branch("17"); + + // + // SMIME capability sub oids. + // + public static readonly DerObjectIdentifier PreferSignedData = Pkcs9AtSmimeCapabilities.Branch("1"); + public static readonly DerObjectIdentifier CannotDecryptAny = Pkcs9AtSmimeCapabilities.Branch("2"); + public static readonly DerObjectIdentifier SmimeCapabilitiesVersions = Pkcs9AtSmimeCapabilities.Branch("3"); + + // + // other SMIME attributes + // + public static readonly DerObjectIdentifier IdAAReceiptRequest = IdSmime.Branch("2.1"); + + // + // id-ct OBJECT IDENTIFIER ::= {iso(1) member-body(2) usa(840) + // rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1)} + // + public const string IdCT = "1.2.840.113549.1.9.16.1"; + + public static readonly DerObjectIdentifier IdCTAuthData = new DerObjectIdentifier(IdCT + ".2"); + public static readonly DerObjectIdentifier IdCTTstInfo = new DerObjectIdentifier(IdCT + ".4"); + public static readonly DerObjectIdentifier IdCTCompressedData = new DerObjectIdentifier(IdCT + ".9"); + public static readonly DerObjectIdentifier IdCTAuthEnvelopedData = new DerObjectIdentifier(IdCT + ".23"); + public static readonly DerObjectIdentifier IdCTTimestampedData = new DerObjectIdentifier(IdCT + ".31"); + + // + // id-cti OBJECT IDENTIFIER ::= {iso(1) member-body(2) usa(840) + // rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) cti(6)} + // + public const string IdCti = "1.2.840.113549.1.9.16.6"; + + public static readonly DerObjectIdentifier IdCtiEtsProofOfOrigin = new DerObjectIdentifier(IdCti + ".1"); + public static readonly DerObjectIdentifier IdCtiEtsProofOfReceipt = new DerObjectIdentifier(IdCti + ".2"); + public static readonly DerObjectIdentifier IdCtiEtsProofOfDelivery = new DerObjectIdentifier(IdCti + ".3"); + public static readonly DerObjectIdentifier IdCtiEtsProofOfSender = new DerObjectIdentifier(IdCti + ".4"); + public static readonly DerObjectIdentifier IdCtiEtsProofOfApproval = new DerObjectIdentifier(IdCti + ".5"); + public static readonly DerObjectIdentifier IdCtiEtsProofOfCreation = new DerObjectIdentifier(IdCti + ".6"); + + // + // id-aa OBJECT IDENTIFIER ::= {iso(1) member-body(2) usa(840) + // rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) attributes(2)} + // + public const string IdAA = "1.2.840.113549.1.9.16.2"; + public static readonly DerObjectIdentifier IdAAOid = new DerObjectIdentifier(IdAA); + + public static readonly DerObjectIdentifier IdAAContentHint = new DerObjectIdentifier(IdAA + ".4"); // See RFC 2634 + public static readonly DerObjectIdentifier IdAAMsgSigDigest = new DerObjectIdentifier(IdAA + ".5"); + public static readonly DerObjectIdentifier IdAAContentReference = new DerObjectIdentifier(IdAA + ".10"); + + /* + * id-aa-encrypKeyPref OBJECT IDENTIFIER ::= {id-aa 11} + * + */ + public static readonly DerObjectIdentifier IdAAEncrypKeyPref = new DerObjectIdentifier(IdAA + ".11"); + public static readonly DerObjectIdentifier IdAASigningCertificate = new DerObjectIdentifier(IdAA + ".12"); + public static readonly DerObjectIdentifier IdAASigningCertificateV2 = new DerObjectIdentifier(IdAA + ".47"); + + public static readonly DerObjectIdentifier IdAAContentIdentifier = new DerObjectIdentifier(IdAA + ".7"); // See RFC 2634 + + /* + * RFC 3126 + */ + public static readonly DerObjectIdentifier IdAASignatureTimeStampToken = new DerObjectIdentifier(IdAA + ".14"); + + public static readonly DerObjectIdentifier IdAAEtsSigPolicyID = new DerObjectIdentifier(IdAA + ".15"); + public static readonly DerObjectIdentifier IdAAEtsCommitmentType = new DerObjectIdentifier(IdAA + ".16"); + public static readonly DerObjectIdentifier IdAAEtsSignerLocation = new DerObjectIdentifier(IdAA + ".17"); + public static readonly DerObjectIdentifier IdAAEtsSignerAttr = new DerObjectIdentifier(IdAA + ".18"); + public static readonly DerObjectIdentifier IdAAEtsOtherSigCert = new DerObjectIdentifier(IdAA + ".19"); + public static readonly DerObjectIdentifier IdAAEtsContentTimestamp = new DerObjectIdentifier(IdAA + ".20"); + public static readonly DerObjectIdentifier IdAAEtsCertificateRefs = new DerObjectIdentifier(IdAA + ".21"); + public static readonly DerObjectIdentifier IdAAEtsRevocationRefs = new DerObjectIdentifier(IdAA + ".22"); + public static readonly DerObjectIdentifier IdAAEtsCertValues = new DerObjectIdentifier(IdAA + ".23"); + public static readonly DerObjectIdentifier IdAAEtsRevocationValues = new DerObjectIdentifier(IdAA + ".24"); + public static readonly DerObjectIdentifier IdAAEtsEscTimeStamp = new DerObjectIdentifier(IdAA + ".25"); + public static readonly DerObjectIdentifier IdAAEtsCertCrlTimestamp = new DerObjectIdentifier(IdAA + ".26"); + public static readonly DerObjectIdentifier IdAAEtsArchiveTimestamp = new DerObjectIdentifier(IdAA + ".27"); + + /** PKCS#9: 1.2.840.113549.1.9.16.2.37 - RFC 4108 */ + public static readonly DerObjectIdentifier IdAADecryptKeyID = IdAAOid.Branch("37"); + + /** PKCS#9: 1.2.840.113549.1.9.16.2.38 - RFC 4108 */ + public static readonly DerObjectIdentifier IdAAImplCryptoAlgs = IdAAOid.Branch("38"); + + /** PKCS#9: 1.2.840.113549.1.9.16.2.54 RFC7030*/ + public static readonly DerObjectIdentifier IdAAAsymmDecryptKeyID = IdAAOid.Branch("54"); + + /** PKCS#9: 1.2.840.113549.1.9.16.2.43 RFC7030*/ + public static readonly DerObjectIdentifier IdAAImplCompressAlgs = IdAAOid.Branch("43"); + /** PKCS#9: 1.2.840.113549.1.9.16.2.40 RFC7030*/ + public static readonly DerObjectIdentifier IdAACommunityIdentifiers = IdAAOid.Branch("40"); + + // + // id-spq OBJECT IDENTIFIER ::= {iso(1) member-body(2) usa(840) + // rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-spq(5)} + // + public const string IdSpq = "1.2.840.113549.1.9.16.5"; + + public static readonly DerObjectIdentifier IdSpqEtsUri = new DerObjectIdentifier(IdSpq + ".1"); + public static readonly DerObjectIdentifier IdSpqEtsUNotice = new DerObjectIdentifier(IdSpq + ".2"); + + // + // pkcs-12 OBJECT IDENTIFIER ::= { + // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } + // + public const string Pkcs12 = "1.2.840.113549.1.12"; + public const string BagTypes = Pkcs12 + ".10.1"; + + public static readonly DerObjectIdentifier KeyBag = new DerObjectIdentifier(BagTypes + ".1"); + public static readonly DerObjectIdentifier Pkcs8ShroudedKeyBag = new DerObjectIdentifier(BagTypes + ".2"); + public static readonly DerObjectIdentifier CertBag = new DerObjectIdentifier(BagTypes + ".3"); + public static readonly DerObjectIdentifier CrlBag = new DerObjectIdentifier(BagTypes + ".4"); + public static readonly DerObjectIdentifier SecretBag = new DerObjectIdentifier(BagTypes + ".5"); + public static readonly DerObjectIdentifier SafeContentsBag = new DerObjectIdentifier(BagTypes + ".6"); + + public const string Pkcs12PbeIds = Pkcs12 + ".1"; + + public static readonly DerObjectIdentifier PbeWithShaAnd128BitRC4 = new DerObjectIdentifier(Pkcs12PbeIds + ".1"); + public static readonly DerObjectIdentifier PbeWithShaAnd40BitRC4 = new DerObjectIdentifier(Pkcs12PbeIds + ".2"); + public static readonly DerObjectIdentifier PbeWithShaAnd3KeyTripleDesCbc = new DerObjectIdentifier(Pkcs12PbeIds + ".3"); + public static readonly DerObjectIdentifier PbeWithShaAnd2KeyTripleDesCbc = new DerObjectIdentifier(Pkcs12PbeIds + ".4"); + public static readonly DerObjectIdentifier PbeWithShaAnd128BitRC2Cbc = new DerObjectIdentifier(Pkcs12PbeIds + ".5"); + public static readonly DerObjectIdentifier PbewithShaAnd40BitRC2Cbc = new DerObjectIdentifier(Pkcs12PbeIds + ".6"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs.meta new file mode 100644 index 00000000..b0f98693 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b5a35db33d7f954a856e8127636bc8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PKCSObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs new file mode 100644 index 00000000..c7ddbd1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * the infamous Pfx from Pkcs12 + */ + public class Pfx + : Asn1Encodable + { + public static Pfx GetInstance(object obj) + { + if (obj is Pfx) + return (Pfx)obj; + if (obj == null) + return null; + return new Pfx(Asn1Sequence.GetInstance(obj)); + } + + private readonly ContentInfo contentInfo; + private readonly MacData macData; + + private Pfx(Asn1Sequence seq) + { + DerInteger version = DerInteger.GetInstance(seq[0]); + if (!version.HasValue(3)) + throw new ArgumentException("wrong version for PFX PDU"); + + this.contentInfo = ContentInfo.GetInstance(seq[1]); + + if (seq.Count == 3) + { + this.macData = MacData.GetInstance(seq[2]); + } + } + + public Pfx(ContentInfo contentInfo, MacData macData) + { + this.contentInfo = contentInfo; + this.macData = macData; + } + + public ContentInfo AuthSafe + { + get { return contentInfo; } + } + + public MacData MacData + { + get { return macData; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(new DerInteger(3), contentInfo); + v.AddOptional(macData); + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs.meta new file mode 100644 index 00000000..9e4ad0c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b047def731647e4fb7ae8d716ca7558 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/Pfx.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs new file mode 100644 index 00000000..232739e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs @@ -0,0 +1,207 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * RFC 5958 + * + *
+     *  [IMPLICIT TAGS]
+     *
+     *  OneAsymmetricKey ::= SEQUENCE {
+     *      version                   Version,
+     *      privateKeyAlgorithm       PrivateKeyAlgorithmIdentifier,
+     *      privateKey                PrivateKey,
+     *      attributes            [0] Attributes OPTIONAL,
+     *      ...,
+     *      [[2: publicKey        [1] PublicKey OPTIONAL ]],
+     *      ...
+     *  }
+     *
+     *  PrivateKeyInfo ::= OneAsymmetricKey
+     *
+     *  Version ::= INTEGER { v1(0), v2(1) } (v1, ..., v2)
+     *
+     *  PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
+     *                                     { PUBLIC-KEY,
+     *                                       { PrivateKeyAlgorithms } }
+     *
+     *  PrivateKey ::= OCTET STRING
+     *                     -- Content varies based on type of key.  The
+     *                     -- algorithm identifier dictates the format of
+     *                     -- the key.
+     *
+     *  PublicKey ::= BIT STRING
+     *                     -- Content varies based on type of key.  The
+     *                     -- algorithm identifier dictates the format of
+     *                     -- the key.
+     *
+     *  Attributes ::= SET OF Attribute { { OneAsymmetricKeyAttributes } }
+     *  
+ */ + public class PrivateKeyInfo + : Asn1Encodable + { + private readonly DerInteger version; + private readonly AlgorithmIdentifier privateKeyAlgorithm; + private readonly Asn1OctetString privateKey; + private readonly Asn1Set attributes; + private readonly DerBitString publicKey; + + public static PrivateKeyInfo GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static PrivateKeyInfo GetInstance( + object obj) + { + if (obj == null) + return null; + if (obj is PrivateKeyInfo) + return (PrivateKeyInfo)obj; + return new PrivateKeyInfo(Asn1Sequence.GetInstance(obj)); + } + + private static int GetVersionValue(DerInteger version) + { + BigInteger bigValue = version.Value; + if (bigValue.CompareTo(BigInteger.Zero) < 0 || bigValue.CompareTo(BigInteger.One) > 0) + throw new ArgumentException("invalid version for private key info", "version"); + + return bigValue.IntValue; + } + + public PrivateKeyInfo( + AlgorithmIdentifier privateKeyAlgorithm, + Asn1Encodable privateKey) + : this(privateKeyAlgorithm, privateKey, null, null) + { + } + + public PrivateKeyInfo( + AlgorithmIdentifier privateKeyAlgorithm, + Asn1Encodable privateKey, + Asn1Set attributes) + : this(privateKeyAlgorithm, privateKey, attributes, null) + { + } + + public PrivateKeyInfo( + AlgorithmIdentifier privateKeyAlgorithm, + Asn1Encodable privateKey, + Asn1Set attributes, + byte[] publicKey) + { + this.version = new DerInteger(publicKey != null ? BigInteger.One : BigInteger.Zero); + this.privateKeyAlgorithm = privateKeyAlgorithm; + this.privateKey = new DerOctetString(privateKey); + this.attributes = attributes; + this.publicKey = publicKey == null ? null : new DerBitString(publicKey); + } + + private PrivateKeyInfo(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + this.version = DerInteger.GetInstance(CollectionUtilities.RequireNext(e)); + + int versionValue = GetVersionValue(version); + + this.privateKeyAlgorithm = AlgorithmIdentifier.GetInstance(CollectionUtilities.RequireNext(e)); + this.privateKey = Asn1OctetString.GetInstance(CollectionUtilities.RequireNext(e)); + + int lastTag = -1; + while (e.MoveNext()) + { + Asn1TaggedObject tagged = (Asn1TaggedObject)e.Current; + + int tag = tagged.TagNo; + if (tag <= lastTag) + throw new ArgumentException("invalid optional field in private key info", "seq"); + + lastTag = tag; + + switch (tag) + { + case 0: + { + this.attributes = Asn1Set.GetInstance(tagged, false); + break; + } + case 1: + { + if (versionValue < 1) + throw new ArgumentException("'publicKey' requires version v2(1) or later", "seq"); + + this.publicKey = DerBitString.GetInstance(tagged, false); + break; + } + default: + { + throw new ArgumentException("unknown optional field in private key info", "seq"); + } + } + } + } + + public virtual DerInteger Version + { + get { return version; } + } + + public virtual Asn1Set Attributes + { + get { return attributes; } + } + + /// Return true if a public key is present, false otherwise. + public virtual bool HasPublicKey + { + get { return publicKey != null; } + } + + public virtual AlgorithmIdentifier PrivateKeyAlgorithm + { + get { return privateKeyAlgorithm; } + } + + public virtual Asn1OctetString PrivateKeyData + { + get { return privateKey; } + } + + public virtual Asn1Object ParsePrivateKey() + { + return Asn1Object.FromByteArray(privateKey.GetOctets()); + } + + /// For when the public key is an ASN.1 encoding. + public virtual Asn1Object ParsePublicKey() + { + return publicKey == null ? null : Asn1Object.FromByteArray(publicKey.GetOctets()); + } + + /// Return the public key as a raw bit string. + public virtual DerBitString PublicKeyData + { + get { return publicKey; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, privateKeyAlgorithm, privateKey); + v.AddOptionalTagged(false, 0, attributes); + v.AddOptionalTagged(false, 1, publicKey); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs.meta new file mode 100644 index 00000000..2456bc18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 68f715a8fa0b2614685db9fe32778d60 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/PrivateKeyInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs new file mode 100644 index 00000000..1f910567 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class RC2CbcParameter + : Asn1Encodable + { + internal DerInteger version; + internal Asn1OctetString iv; + + public static RC2CbcParameter GetInstance( + object obj) + { + if (obj is Asn1Sequence) + { + return new RC2CbcParameter((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public RC2CbcParameter( + byte[] iv) + { + this.iv = new DerOctetString(iv); + } + + public RC2CbcParameter( + int parameterVersion, + byte[] iv) + { + this.version = new DerInteger(parameterVersion); + this.iv = new DerOctetString(iv); + } + + private RC2CbcParameter( + Asn1Sequence seq) + { + if (seq.Count == 1) + { + iv = (Asn1OctetString)seq[0]; + } + else + { + version = (DerInteger)seq[0]; + iv = (Asn1OctetString)seq[1]; + } + } + + public BigInteger RC2ParameterVersion + { + get + { + return version == null ? null : version.Value; + } + } + + public byte[] GetIV() + { + return Arrays.Clone(iv.GetOctets()); + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(version); + v.Add(iv); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs.meta new file mode 100644 index 00000000..e03c5341 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 98be317ecd40b4147b5f2951df706084 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RC2CBCParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs new file mode 100644 index 00000000..5d299417 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class RsaesOaepParameters + : Asn1Encodable + { + private AlgorithmIdentifier hashAlgorithm; + private AlgorithmIdentifier maskGenAlgorithm; + private AlgorithmIdentifier pSourceAlgorithm; + + public readonly static AlgorithmIdentifier DefaultHashAlgorithm = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + public readonly static AlgorithmIdentifier DefaultMaskGenFunction = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, DefaultHashAlgorithm); + public readonly static AlgorithmIdentifier DefaultPSourceAlgorithm = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdPSpecified, new DerOctetString(new byte[0])); + + public static RsaesOaepParameters GetInstance( + object obj) + { + if (obj is RsaesOaepParameters) + { + return (RsaesOaepParameters)obj; + } + else if (obj is Asn1Sequence) + { + return new RsaesOaepParameters((Asn1Sequence)obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * The default version + */ + public RsaesOaepParameters() + : this(DefaultHashAlgorithm, DefaultMaskGenFunction, DefaultPSourceAlgorithm) + { + } + + public RsaesOaepParameters( + AlgorithmIdentifier hashAlgorithm, + AlgorithmIdentifier maskGenAlgorithm) + : this(hashAlgorithm, maskGenAlgorithm, DefaultPSourceAlgorithm) + { + } + + public RsaesOaepParameters( + AlgorithmIdentifier hashAlgorithm, + AlgorithmIdentifier maskGenAlgorithm, + AlgorithmIdentifier pSourceAlgorithm) + { + this.hashAlgorithm = hashAlgorithm; + this.maskGenAlgorithm = maskGenAlgorithm; + this.pSourceAlgorithm = pSourceAlgorithm; + } + + public RsaesOaepParameters( + Asn1Sequence seq) + { + hashAlgorithm = DefaultHashAlgorithm; + maskGenAlgorithm = DefaultMaskGenFunction; + pSourceAlgorithm = DefaultPSourceAlgorithm; + + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject o = (Asn1TaggedObject)seq[i]; + + switch (o.TagNo) + { + case 0: + hashAlgorithm = AlgorithmIdentifier.GetInstance(o, true); + break; + case 1: + maskGenAlgorithm = AlgorithmIdentifier.GetInstance(o, true); + break; + case 2: + pSourceAlgorithm = AlgorithmIdentifier.GetInstance(o, true); + break; + default: + throw new ArgumentException("unknown tag"); + } + } + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public AlgorithmIdentifier MaskGenAlgorithm + { + get { return maskGenAlgorithm; } + } + + public AlgorithmIdentifier PSourceAlgorithm + { + get { return pSourceAlgorithm; } + } + + /** + *
+		 *  RSAES-OAEP-params ::= SEQUENCE {
+		 *     hashAlgorithm      [0] OAEP-PSSDigestAlgorithms     DEFAULT sha1,
+		 *     maskGenAlgorithm   [1] PKCS1MGFAlgorithms  DEFAULT mgf1SHA1,
+		 *     pSourceAlgorithm   [2] PKCS1PSourceAlgorithms  DEFAULT pSpecifiedEmpty
+		 *   }
+		 *
+		 *   OAEP-PSSDigestAlgorithms    ALGORITHM-IDENTIFIER ::= {
+		 *     { OID id-sha1 PARAMETERS NULL   }|
+		 *     { OID id-sha256 PARAMETERS NULL }|
+		 *     { OID id-sha384 PARAMETERS NULL }|
+		 *     { OID id-sha512 PARAMETERS NULL },
+		 *     ...  -- Allows for future expansion --
+		 *   }
+		 *   PKCS1MGFAlgorithms    ALGORITHM-IDENTIFIER ::= {
+		 *     { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
+		 *    ...  -- Allows for future expansion --
+		 *   }
+		 *   PKCS1PSourceAlgorithms    ALGORITHM-IDENTIFIER ::= {
+		 *     { OID id-pSpecified PARAMETERS OCTET STRING },
+		 *     ...  -- Allows for future expansion --
+		 *  }
+		 * 
+ * @return the asn1 primitive representing the parameters. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (!hashAlgorithm.Equals(DefaultHashAlgorithm)) + { + v.Add(new DerTaggedObject(true, 0, hashAlgorithm)); + } + + if (!maskGenAlgorithm.Equals(DefaultMaskGenFunction)) + { + v.Add(new DerTaggedObject(true, 1, maskGenAlgorithm)); + } + + if (!pSourceAlgorithm.Equals(DefaultPSourceAlgorithm)) + { + v.Add(new DerTaggedObject(true, 2, pSourceAlgorithm)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs.meta new file mode 100644 index 00000000..d8068d08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b6fc9562b657954896be11d9c85d2d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAESOAEPparams.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs new file mode 100644 index 00000000..fb2542c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class RsaPrivateKeyStructure + : Asn1Encodable + { + private readonly BigInteger modulus; + private readonly BigInteger publicExponent; + private readonly BigInteger privateExponent; + private readonly BigInteger prime1; + private readonly BigInteger prime2; + private readonly BigInteger exponent1; + private readonly BigInteger exponent2; + private readonly BigInteger coefficient; + + public static RsaPrivateKeyStructure GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static RsaPrivateKeyStructure GetInstance(object obj) + { + if (obj == null) + return null; + if (obj is RsaPrivateKeyStructure) + return (RsaPrivateKeyStructure)obj; + return new RsaPrivateKeyStructure(Asn1Sequence.GetInstance(obj)); + } + + public RsaPrivateKeyStructure( + BigInteger modulus, + BigInteger publicExponent, + BigInteger privateExponent, + BigInteger prime1, + BigInteger prime2, + BigInteger exponent1, + BigInteger exponent2, + BigInteger coefficient) + { + this.modulus = modulus; + this.publicExponent = publicExponent; + this.privateExponent = privateExponent; + this.prime1 = prime1; + this.prime2 = prime2; + this.exponent1 = exponent1; + this.exponent2 = exponent2; + this.coefficient = coefficient; + } + + private RsaPrivateKeyStructure(Asn1Sequence seq) + { + BigInteger version = ((DerInteger)seq[0]).Value; + if (version.IntValue != 0) + throw new ArgumentException("wrong version for RSA private key"); + + modulus = ((DerInteger)seq[1]).Value; + publicExponent = ((DerInteger)seq[2]).Value; + privateExponent = ((DerInteger)seq[3]).Value; + prime1 = ((DerInteger)seq[4]).Value; + prime2 = ((DerInteger)seq[5]).Value; + exponent1 = ((DerInteger)seq[6]).Value; + exponent2 = ((DerInteger)seq[7]).Value; + coefficient = ((DerInteger)seq[8]).Value; + } + + public BigInteger Modulus + { + get { return modulus; } + } + + public BigInteger PublicExponent + { + get { return publicExponent; } + } + + public BigInteger PrivateExponent + { + get { return privateExponent; } + } + + public BigInteger Prime1 + { + get { return prime1; } + } + + public BigInteger Prime2 + { + get { return prime2; } + } + + public BigInteger Exponent1 + { + get { return exponent1; } + } + + public BigInteger Exponent2 + { + get { return exponent2; } + } + + public BigInteger Coefficient + { + get { return coefficient; } + } + + /** + * This outputs the key in Pkcs1v2 format. + *
+         *      RsaPrivateKey ::= Sequence {
+         *                          version Version,
+         *                          modulus Integer, -- n
+         *                          publicExponent Integer, -- e
+         *                          privateExponent Integer, -- d
+         *                          prime1 Integer, -- p
+         *                          prime2 Integer, -- q
+         *                          exponent1 Integer, -- d mod (p-1)
+         *                          exponent2 Integer, -- d mod (q-1)
+         *                          coefficient Integer -- (inverse of q) mod p
+         *                      }
+         *
+         *      Version ::= Integer
+         * 
+ *

This routine is written to output Pkcs1 version 0, private keys.

+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence( + new DerInteger(0), // version + new DerInteger(Modulus), + new DerInteger(PublicExponent), + new DerInteger(PrivateExponent), + new DerInteger(Prime1), + new DerInteger(Prime2), + new DerInteger(Exponent1), + new DerInteger(Exponent2), + new DerInteger(Coefficient)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs.meta new file mode 100644 index 00000000..3fed8d54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: af28ed0dbcfbf6949b06528a70b42dc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSAPrivateKeyStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs new file mode 100644 index 00000000..32160a4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs @@ -0,0 +1,170 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class RsassaPssParameters + : Asn1Encodable + { + private AlgorithmIdentifier hashAlgorithm; + private AlgorithmIdentifier maskGenAlgorithm; + private DerInteger saltLength; + private DerInteger trailerField; + + public readonly static AlgorithmIdentifier DefaultHashAlgorithm = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + public readonly static AlgorithmIdentifier DefaultMaskGenFunction = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, DefaultHashAlgorithm); + public readonly static DerInteger DefaultSaltLength = new DerInteger(20); + public readonly static DerInteger DefaultTrailerField = new DerInteger(1); + + public static RsassaPssParameters GetInstance( + object obj) + { + if (obj == null || obj is RsassaPssParameters) + { + return (RsassaPssParameters)obj; + } + + if (obj is Asn1Sequence) + { + return new RsassaPssParameters((Asn1Sequence)obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * The default version + */ + public RsassaPssParameters() + { + hashAlgorithm = DefaultHashAlgorithm; + maskGenAlgorithm = DefaultMaskGenFunction; + saltLength = DefaultSaltLength; + trailerField = DefaultTrailerField; + } + + public RsassaPssParameters( + AlgorithmIdentifier hashAlgorithm, + AlgorithmIdentifier maskGenAlgorithm, + DerInteger saltLength, + DerInteger trailerField) + { + this.hashAlgorithm = hashAlgorithm; + this.maskGenAlgorithm = maskGenAlgorithm; + this.saltLength = saltLength; + this.trailerField = trailerField; + } + + public RsassaPssParameters( + Asn1Sequence seq) + { + hashAlgorithm = DefaultHashAlgorithm; + maskGenAlgorithm = DefaultMaskGenFunction; + saltLength = DefaultSaltLength; + trailerField = DefaultTrailerField; + + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject o = (Asn1TaggedObject)seq[i]; + + switch (o.TagNo) + { + case 0: + hashAlgorithm = AlgorithmIdentifier.GetInstance(o, true); + break; + case 1: + maskGenAlgorithm = AlgorithmIdentifier.GetInstance(o, true); + break; + case 2: + saltLength = DerInteger.GetInstance(o, true); + break; + case 3: + trailerField = DerInteger.GetInstance(o, true); + break; + default: + throw new ArgumentException("unknown tag"); + } + } + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public AlgorithmIdentifier MaskGenAlgorithm + { + get { return maskGenAlgorithm; } + } + + public DerInteger SaltLength + { + get { return saltLength; } + } + + public DerInteger TrailerField + { + get { return trailerField; } + } + + /** + *
+		 * RSASSA-PSS-params ::= SEQUENCE {
+		 *   hashAlgorithm      [0] OAEP-PSSDigestAlgorithms  DEFAULT sha1,
+		 *    maskGenAlgorithm   [1] PKCS1MGFAlgorithms  DEFAULT mgf1SHA1,
+		 *    saltLength         [2] INTEGER  DEFAULT 20,
+		 *    trailerField       [3] TrailerField  DEFAULT trailerFieldBC
+		 *  }
+		 *
+		 * OAEP-PSSDigestAlgorithms    ALGORITHM-IDENTIFIER ::= {
+		 *    { OID id-sha1 PARAMETERS NULL   }|
+		 *    { OID id-sha256 PARAMETERS NULL }|
+		 *    { OID id-sha384 PARAMETERS NULL }|
+		 *    { OID id-sha512 PARAMETERS NULL },
+		 *    ...  -- Allows for future expansion --
+		 * }
+		 *
+		 * PKCS1MGFAlgorithms    ALGORITHM-IDENTIFIER ::= {
+		 *   { OID id-mgf1 PARAMETERS OAEP-PSSDigestAlgorithms },
+		 *    ...  -- Allows for future expansion --
+		 * }
+		 *
+		 * TrailerField ::= INTEGER { trailerFieldBC(1) }
+		 * 
+ * @return the asn1 primitive representing the parameters. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (!hashAlgorithm.Equals(DefaultHashAlgorithm)) + { + v.Add(new DerTaggedObject(true, 0, hashAlgorithm)); + } + + if (!maskGenAlgorithm.Equals(DefaultMaskGenFunction)) + { + v.Add(new DerTaggedObject(true, 1, maskGenAlgorithm)); + } + + if (!saltLength.Equals(DefaultSaltLength)) + { + v.Add(new DerTaggedObject(true, 2, saltLength)); + } + + if (!trailerField.Equals(DefaultTrailerField)) + { + v.Add(new DerTaggedObject(true, 3, trailerField)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs.meta new file mode 100644 index 00000000..4e8a85e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8d93f906e4aef5245949be6c399b9bd4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/RSASSAPSSparams.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs new file mode 100644 index 00000000..41a68560 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + public class SafeBag + : Asn1Encodable + { + public static SafeBag GetInstance(object obj) + { + if (obj is SafeBag) + return (SafeBag)obj; + if (obj == null) + return null; + return new SafeBag(Asn1Sequence.GetInstance(obj)); + } + + private readonly DerObjectIdentifier bagID; + private readonly Asn1Object bagValue; + private readonly Asn1Set bagAttributes; + + public SafeBag( + DerObjectIdentifier oid, + Asn1Object obj) + { + this.bagID = oid; + this.bagValue = obj; + this.bagAttributes = null; + } + + public SafeBag( + DerObjectIdentifier oid, + Asn1Object obj, + Asn1Set bagAttributes) + { + this.bagID = oid; + this.bagValue = obj; + this.bagAttributes = bagAttributes; + } + + private SafeBag(Asn1Sequence seq) + { + this.bagID = (DerObjectIdentifier)seq[0]; + this.bagValue = ((DerTaggedObject)seq[1]).GetObject(); + if (seq.Count == 3) + { + this.bagAttributes = (Asn1Set)seq[2]; + } + } + + public DerObjectIdentifier BagID + { + get { return bagID; } + } + + public Asn1Object BagValue + { + get { return bagValue; } + } + + public Asn1Set BagAttributes + { + get { return bagAttributes; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(bagID, new DerTaggedObject(0, bagValue)); + v.AddOptional(bagAttributes); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs.meta new file mode 100644 index 00000000..d8f36071 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 377fef3d32291114494f56d9d5ea884f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SafeBag.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs new file mode 100644 index 00000000..856d582d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * a Pkcs#7 signed data object. + */ + public class SignedData + : Asn1Encodable + { + private readonly DerInteger version; + private readonly Asn1Set digestAlgorithms; + private readonly ContentInfo contentInfo; + private readonly Asn1Set certificates; + private readonly Asn1Set crls; + private readonly Asn1Set signerInfos; + + public static SignedData GetInstance(object obj) + { + if (obj == null) + return null; + SignedData existing = obj as SignedData; + if (existing != null) + return existing; + return new SignedData(Asn1Sequence.GetInstance(obj)); + } + + public SignedData( + DerInteger _version, + Asn1Set _digestAlgorithms, + ContentInfo _contentInfo, + Asn1Set _certificates, + Asn1Set _crls, + Asn1Set _signerInfos) + { + version = _version; + digestAlgorithms = _digestAlgorithms; + contentInfo = _contentInfo; + certificates = _certificates; + crls = _crls; + signerInfos = _signerInfos; + } + + private SignedData( + Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + version = (DerInteger) e.Current; + + e.MoveNext(); + digestAlgorithms = (Asn1Set) e.Current; + + e.MoveNext(); + contentInfo = ContentInfo.GetInstance(e.Current); + + while (e.MoveNext()) + { + Asn1Object o = e.Current.ToAsn1Object(); + + // + // an interesting feature of SignedData is that there appear to be varying implementations... + // for the moment we ignore anything which doesn't fit. + // + if (o is Asn1TaggedObject tagged) + { + switch (tagged.TagNo) + { + case 0: + certificates = Asn1Set.GetInstance(tagged, false); + break; + case 1: + crls = Asn1Set.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("unknown tag value " + tagged.TagNo); + } + } + else + { + signerInfos = (Asn1Set) o; + } + } + } + + public DerInteger Version + { + get { return version; } + } + + public Asn1Set DigestAlgorithms + { + get { return digestAlgorithms; } + } + + public ContentInfo ContentInfo + { + get { return contentInfo; } + } + + public Asn1Set Certificates + { + get { return certificates; } + } + + public Asn1Set Crls + { + get { return crls; } + } + + public Asn1Set SignerInfos + { + get { return signerInfos; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  SignedData ::= Sequence {
+         *      version Version,
+         *      digestAlgorithms DigestAlgorithmIdentifiers,
+         *      contentInfo ContentInfo,
+         *      certificates
+         *          [0] IMPLICIT ExtendedCertificatesAndCertificates
+         *                   OPTIONAL,
+         *      crls
+         *          [1] IMPLICIT CertificateRevocationLists OPTIONAL,
+         *      signerInfos SignerInfos }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, digestAlgorithms, contentInfo); + v.AddOptionalTagged(false, 0, certificates); + v.AddOptionalTagged(false, 1, crls); + v.Add(signerInfos); + return new BerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs.meta new file mode 100644 index 00000000..2a262b3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79707c1b9341dac4ea02ac8c31c82c84 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs new file mode 100644 index 00000000..33b099d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs +{ + /** + * a Pkcs#7 signer info object. + */ + public class SignerInfo + : Asn1Encodable + { + private DerInteger version; + private IssuerAndSerialNumber issuerAndSerialNumber; + private AlgorithmIdentifier digAlgorithm; + private Asn1Set authenticatedAttributes; + private AlgorithmIdentifier digEncryptionAlgorithm; + private Asn1OctetString encryptedDigest; + private Asn1Set unauthenticatedAttributes; + + public static SignerInfo GetInstance( + object obj) + { + if (obj is SignerInfo) + { + return (SignerInfo) obj; + } + + if (obj is Asn1Sequence) + { + return new SignerInfo((Asn1Sequence) obj); + } + + throw new ArgumentException("Unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public SignerInfo( + DerInteger version, + IssuerAndSerialNumber issuerAndSerialNumber, + AlgorithmIdentifier digAlgorithm, + Asn1Set authenticatedAttributes, + AlgorithmIdentifier digEncryptionAlgorithm, + Asn1OctetString encryptedDigest, + Asn1Set unauthenticatedAttributes) + { + this.version = version; + this.issuerAndSerialNumber = issuerAndSerialNumber; + this.digAlgorithm = digAlgorithm; + this.authenticatedAttributes = authenticatedAttributes; + this.digEncryptionAlgorithm = digEncryptionAlgorithm; + this.encryptedDigest = encryptedDigest; + this.unauthenticatedAttributes = unauthenticatedAttributes; + } + + public SignerInfo( + Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + version = (DerInteger) e.Current; + + e.MoveNext(); + issuerAndSerialNumber = IssuerAndSerialNumber.GetInstance(e.Current); + + e.MoveNext(); + digAlgorithm = AlgorithmIdentifier.GetInstance(e.Current); + + e.MoveNext(); + var obj = e.Current; + + if (obj is Asn1TaggedObject tagged) + { + authenticatedAttributes = Asn1Set.GetInstance(tagged, false); + + e.MoveNext(); + digEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(e.Current); + } + else + { + authenticatedAttributes = null; + digEncryptionAlgorithm = AlgorithmIdentifier.GetInstance(obj); + } + + e.MoveNext(); + encryptedDigest = DerOctetString.GetInstance(e.Current); + + if (e.MoveNext()) + { + unauthenticatedAttributes = Asn1Set.GetInstance((Asn1TaggedObject)e.Current, false); + } + else + { + unauthenticatedAttributes = null; + } + } + + public DerInteger Version { get { return version; } } + + public IssuerAndSerialNumber IssuerAndSerialNumber { get { return issuerAndSerialNumber; } } + + public Asn1Set AuthenticatedAttributes { get { return authenticatedAttributes; } } + + public AlgorithmIdentifier DigestAlgorithm { get { return digAlgorithm; } } + + public Asn1OctetString EncryptedDigest { get { return encryptedDigest; } } + + public AlgorithmIdentifier DigestEncryptionAlgorithm { get { return digEncryptionAlgorithm; } } + + public Asn1Set UnauthenticatedAttributes { get { return unauthenticatedAttributes; } } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  SignerInfo ::= Sequence {
+         *      version Version,
+         *      issuerAndSerialNumber IssuerAndSerialNumber,
+         *      digestAlgorithm DigestAlgorithmIdentifier,
+         *      authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
+         *      digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
+         *      encryptedDigest EncryptedDigest,
+         *      unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
+         *  }
+         *
+         *  EncryptedDigest ::= OCTET STRING
+         *
+         *  DigestAlgorithmIdentifier ::= AlgorithmIdentifier
+         *
+         *  DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, issuerAndSerialNumber, digAlgorithm); + v.AddOptionalTagged(false, 0, authenticatedAttributes); + v.Add(digEncryptionAlgorithm, encryptedDigest); + v.AddOptionalTagged(false, 1, unauthenticatedAttributes); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs.meta new file mode 100644 index 00000000..9cc9432a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6502c2d8185b0614fbcb752e02f3713c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/pkcs/SignerInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart.meta new file mode 100644 index 00000000..d6e28264 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5fa0c9d7383ddc74da08e1de0a03e61f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs new file mode 100644 index 00000000..4fb2f8bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart +{ + public abstract class RosstandartObjectIdentifiers + { + public static readonly DerObjectIdentifier rosstandart = new DerObjectIdentifier("1.2.643.7"); + + public static readonly DerObjectIdentifier id_tc26 = rosstandart.Branch("1"); + + public static readonly DerObjectIdentifier id_tc26_gost_3411_12_256 = id_tc26.Branch("1.2.2"); + + public static readonly DerObjectIdentifier id_tc26_gost_3411_12_512 = id_tc26.Branch("1.2.3"); + + public static readonly DerObjectIdentifier id_tc26_hmac_gost_3411_12_256 = id_tc26.Branch("1.4.1"); + + public static readonly DerObjectIdentifier id_tc26_hmac_gost_3411_12_512 = id_tc26.Branch("1.4.2"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_256 = id_tc26.Branch("1.1.1"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_512 = id_tc26.Branch("1.1.2"); + + public static readonly DerObjectIdentifier id_tc26_signwithdigest_gost_3410_12_256 = id_tc26.Branch("1.3.2"); + + public static readonly DerObjectIdentifier id_tc26_signwithdigest_gost_3410_12_512 = id_tc26.Branch("1.3.3"); + + public static readonly DerObjectIdentifier id_tc26_agreement = id_tc26.Branch("1.6"); + + public static readonly DerObjectIdentifier id_tc26_agreement_gost_3410_12_256 = id_tc26_agreement.Branch("1"); + + public static readonly DerObjectIdentifier id_tc26_agreement_gost_3410_12_512 = id_tc26_agreement.Branch("2"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_256_paramSet = id_tc26.Branch("2.1.1"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_256_paramSetA = id_tc26_gost_3410_12_256_paramSet.Branch("1"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_512_paramSet = id_tc26.Branch("2.1.2"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_512_paramSetA = id_tc26_gost_3410_12_512_paramSet.Branch("1"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_512_paramSetB = id_tc26_gost_3410_12_512_paramSet.Branch("2"); + + public static readonly DerObjectIdentifier id_tc26_gost_3410_12_512_paramSetC = id_tc26_gost_3410_12_512_paramSet.Branch("3"); + + public static readonly DerObjectIdentifier id_tc26_gost_28147_param_Z = id_tc26.Branch("2.5.1.1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs.meta new file mode 100644 index 00000000..12171c38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8c7a3e963e4c5c14dbeccdea84267081 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/rosstandart/RosstandartObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec.meta new file mode 100644 index 00000000..c7c9bbdd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 92c79a6ffc5c0e746a1de24957b60e0a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs new file mode 100644 index 00000000..932881ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec +{ + /** + * the elliptic curve private key object from SEC 1 + */ + public class ECPrivateKeyStructure + : Asn1Encodable + { + private readonly Asn1Sequence m_seq; + + public static ECPrivateKeyStructure GetInstance(object obj) + { + if (obj == null) + return null; + if (obj is ECPrivateKeyStructure ecPrivateKeyStructure) + return ecPrivateKeyStructure; + return new ECPrivateKeyStructure(Asn1Sequence.GetInstance(obj)); + } + + private ECPrivateKeyStructure(Asn1Sequence seq) + { + m_seq = seq ?? throw new ArgumentNullException(nameof(seq)); + } + + public ECPrivateKeyStructure( + int orderBitLength, + BigInteger key) + : this(orderBitLength, key, null) + { + } + + public ECPrivateKeyStructure( + int orderBitLength, + BigInteger key, + Asn1Encodable parameters) + : this(orderBitLength, key, null, parameters) + { + } + + public ECPrivateKeyStructure( + int orderBitLength, + BigInteger key, + DerBitString publicKey, + Asn1Encodable parameters) + { + if (key == null) + throw new ArgumentNullException(nameof(key)); + if (orderBitLength < key.BitLength) + throw new ArgumentException("must be >= key bitlength", nameof(orderBitLength)); + + byte[] bytes = BigIntegers.AsUnsignedByteArray((orderBitLength + 7) / 8, key); + + Asn1EncodableVector v = new Asn1EncodableVector( + new DerInteger(1), + new DerOctetString(bytes)); + + v.AddOptionalTagged(true, 0, parameters); + v.AddOptionalTagged(true, 1, publicKey); + + m_seq = new DerSequence(v); + } + + public virtual BigInteger GetKey() + { + Asn1OctetString octs = (Asn1OctetString)m_seq[1]; + + return new BigInteger(1, octs.GetOctets()); + } + + public virtual DerBitString GetPublicKey() + { + return (DerBitString)GetObjectInTag(1, Asn1Tags.BitString); + } + + public virtual Asn1Object GetParameters() + { + return GetObjectInTag(0, -1); + } + + private Asn1Object GetObjectInTag(int tagNo, int baseTagNo) + { + foreach (Asn1Encodable ae in m_seq) + { + Asn1Object obj = ae.ToAsn1Object(); + + if (obj is Asn1TaggedObject tag) + { + if (tag.HasContextTag(tagNo)) + { + return baseTagNo < 0 + ? tag.GetExplicitBaseObject().ToAsn1Object() + : tag.GetBaseUniversal(true, baseTagNo); + } + } + } + + return null; + } + + /** + * ECPrivateKey ::= SEQUENCE { + * version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1), + * privateKey OCTET STRING, + * parameters [0] Parameters OPTIONAL, + * publicKey [1] BIT STRING OPTIONAL } + */ + public override Asn1Object ToAsn1Object() + { + return m_seq; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs.meta new file mode 100644 index 00000000..7b1e4d7c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d3d5786feccac3499d0f2fe7b812100 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/ECPrivateKeyStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs new file mode 100644 index 00000000..8fe3f61e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs @@ -0,0 +1,1278 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec +{ + /// Elliptic curve registry for the SEC standard. + public static class SecNamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static ECCurve ConfigureCurveGlv(ECCurve c, GlvTypeBParameters p) + { + return c.Configure().SetEndomorphism(new GlvTypeBEndomorphism(c, p)).Create(); + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class Secp112r1Holder + : X9ECParametersHolder + { + private Secp112r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp112r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = (2^128 - 3) / 76439 + BigInteger p = FromHex("DB7C2ABF62E35E668076BEAD208B"); + BigInteger a = FromHex("DB7C2ABF62E35E668076BEAD2088"); + BigInteger b = FromHex("659EF8BA043916EEDE8911702B22"); + BigInteger n = FromHex("DB7C2ABF62E35E7628DFAC6561C5"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("00F50B028E4D696E676875615175290472783FB1"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0409487239995A5EE76B55F9C2F098A89CE5AF8724C0A23E0E0FF77500"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp112r2Holder + : X9ECParametersHolder + { + private Secp112r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp112r2Holder(); + + protected override ECCurve CreateCurve() + { + // p = (2^128 - 3) / 76439 + BigInteger p = FromHex("DB7C2ABF62E35E668076BEAD208B"); + BigInteger a = FromHex("6127C24C05F38A0AAAF65C0EF02C"); + BigInteger b = FromHex("51DEF1815DB5ED74FCC34C85D709"); + BigInteger n = FromHex("36DF0AAFD8B8D7597CA10520D04B"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("002757A1114D696E6768756151755316C05E0BD4"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "044BA30AB5E892B4E1649DD0928643ADCD46F5882E3747DEF36E956E97"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp128r1Holder + : X9ECParametersHolder + { + private Secp128r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp128r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^128 - 2^97 - 1 + BigInteger p = FromHex("FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC"); + BigInteger b = FromHex("E87579C11079F43DD824993C2CEE5ED3"); + BigInteger n = FromHex("FFFFFFFE0000000075A30D1B9038A115"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("000E0D4D696E6768756151750CC03A4473D03679"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04161FF7528B899B2D0C28607CA52C5B86CF5AC8395BAFEB13C02DA292DDED7A83"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp128r2Holder + : X9ECParametersHolder + { + private Secp128r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp128r2Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^128 - 2^97 - 1 + BigInteger p = FromHex("FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("D6031998D1B3BBFEBF59CC9BBFF9AEE1"); + BigInteger b = FromHex("5EEEFCA380D02919DC2C6558BB6D8A5D"); + BigInteger n = FromHex("3FFFFFFF7FFFFFFFBE0024720613B5A3"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("004D696E67687561517512D8F03431FCE63B88F4"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "047B6AA5D85E572983E6FB32A7CDEBC14027B6916A894D3AEE7106FE805FC34B44"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp160k1Holder + : X9ECParametersHolder + { + private Secp160k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp160k1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^160 - 2^32 - 2^14 - 2^12 - 2^9 - 2^8 - 2^7 - 2^3 - 2^2 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73"); + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.ValueOf(7); + BigInteger n = FromHex("0100000000000000000001B8FA16DFAB9ACA16B6B3"); + BigInteger h = BigInteger.One; + + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("9ba48cba5ebcb9b6bd33b92830b2a2e0e192f10a", 16), + new BigInteger("c39c6c3b3a36d7701b9c71a1f5804ae5d0003f4", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("9162fbe73984472a0a9e", 16), + new BigInteger("-96341f1138933bc2f505", 16) }, + new BigInteger[]{ + new BigInteger("127971af8721782ecffa3", 16), + new BigInteger("9162fbe73984472a0a9e", 16) }, + new BigInteger("9162fbe73984472a0a9d0590", 16), + new BigInteger("96341f1138933bc2f503fd44", 16), + 176)); + + return ConfigureCurveGlv(new FpCurve(p, a, b, n, h, true), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "043B4C382CE37AA192A4019E763036F4F5DD4D7EBB938CF935318FDCED6BC28286531733C3F03C4FEE"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp160r1Holder + : X9ECParametersHolder + { + private Secp160r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp160r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^160 - 2^31 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF"); + BigInteger a = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC"); + BigInteger b = FromHex("1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45"); + BigInteger n = FromHex("0100000000000000000001F4C8F927AED3CA752257"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("1053CDE42C14D696E67687561517533BF3F83345"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "044A96B5688EF573284664698968C38BB913CBFC8223A628553168947D59DCC912042351377AC5FB32"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp160r2Holder + : X9ECParametersHolder + { + private Secp160r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp160r2Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^160 - 2^32 - 2^14 - 2^12 - 2^9 - 2^8 - 2^7 - 2^3 - 2^2 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73"); + BigInteger a = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC70"); + BigInteger b = FromHex("B4E134D3FB59EB8BAB57274904664D5AF50388BA"); + BigInteger n = FromHex("0100000000000000000000351EE786A818F3A1A16B"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("B99B99B099B323E02709A4D696E6768756151751"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0452DCB034293A117E1F4FF11B30F7199D3144CE6DFEAFFEF2E331F296E071FA0DF9982CFEA7D43F2E"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp192k1Holder + : X9ECParametersHolder + { + private Secp192k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp192k1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^192 - 2^32 - 2^12 - 2^8 - 2^7 - 2^6 - 2^3 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFEE37"); + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.ValueOf(3); + BigInteger n = FromHex("FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8D"); + BigInteger h = BigInteger.One; + + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("bb85691939b869c1d087f601554b96b80cb4f55b35f433c2", 16), + new BigInteger("3d84f26c12238d7b4f3d516613c1759033b1a5800175d0b1", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("71169be7330b3038edb025f1", 16), + new BigInteger("-b3fb3400dec5c4adceb8655c", 16) }, + new BigInteger[]{ + new BigInteger("12511cfe811d0f4e6bc688b4d", 16), + new BigInteger("71169be7330b3038edb025f1", 16) }, + new BigInteger("71169be7330b3038edb025f1d0f9", 16), + new BigInteger("b3fb3400dec5c4adceb8655d4c94", 16), + 208)); + + return ConfigureCurveGlv(new FpCurve(p, a, b, n, h, true), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04DB4FF10EC057E9AE26B07D0280B7F4341DA5D1B1EAE06C7D9B2F2F6D9C5628A7844163D015BE86344082AA88D95E2F9D"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp192r1Holder + : X9ECParametersHolder + { + private Secp192r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp192r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^192 - 2^64 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC"); + BigInteger b = FromHex("64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1"); + BigInteger n = FromHex("FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("3045AE6FC8422F64ED579528D38120EAE12196D5"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF101207192B95FFC8DA78631011ED6B24CDD573F977A11E794811"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp224k1Holder + : X9ECParametersHolder + { + private Secp224k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp224k1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^224 - 2^32 - 2^12 - 2^11 - 2^9 - 2^7 - 2^4 - 2 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFE56D"); + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.ValueOf(5); + BigInteger n = FromHex("010000000000000000000000000001DCE8D2EC6184CAF0A971769FB1F7"); + BigInteger h = BigInteger.One; + + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("fe0e87005b4e83761908c5131d552a850b3f58b749c37cf5b84d6768", 16), + new BigInteger("60dcd2104c4cbc0be6eeefc2bdd610739ec34e317f9b33046c9e4788", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("6b8cf07d4ca75c88957d9d670591", 16), + new BigInteger("-b8adf1378a6eb73409fa6c9c637d", 16) }, + new BigInteger[]{ + new BigInteger("1243ae1b4d71613bc9f780a03690e", 16), + new BigInteger("6b8cf07d4ca75c88957d9d670591", 16) }, + new BigInteger("6b8cf07d4ca75c88957d9d67059037a4", 16), + new BigInteger("b8adf1378a6eb73409fa6c9c637ba7f5", 16), + 240)); + + return ConfigureCurveGlv(new FpCurve(p, a, b, n, h, true), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04A1455B334DF099DF30FC28A169A467E9E47075A90F7E650EB6B7A45C7E089FED7FBA344282CAFBD6F7E319F7C0B0BD59E2CA4BDB556D61A5"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp224r1Holder + : X9ECParametersHolder + { + private Secp224r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp224r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^224 - 2^96 + 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001"); + BigInteger a = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE"); + BigInteger b = FromHex("B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4"); + BigInteger n = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("BD71344799D5C7FCDC45B59FA3B9AB8F6A948BC5"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp256k1Holder + : X9ECParametersHolder + { + private Secp256k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp256k1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^256 - 2^32 - 2^9 - 2^8 - 2^7 - 2^6 - 2^4 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F"); + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.ValueOf(7); + BigInteger n = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141"); + BigInteger h = BigInteger.One; + + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("7ae96a2b657c07106e64479eac3434e99cf0497512f58995c1396c28719501ee", 16), + new BigInteger("5363ad4cc05c30e0a5261c028812645a122e22ea20816678df02967c1b23bd72", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("3086d221a7d46bcde86c90e49284eb15", 16), + new BigInteger("-e4437ed6010e88286f547fa90abfe4c3", 16) }, + new BigInteger[]{ + new BigInteger("114ca50f7a8e2f3f657c1108d9d44cfd8", 16), + new BigInteger("3086d221a7d46bcde86c90e49284eb15", 16) }, + new BigInteger("3086d221a7d46bcde86c90e49284eb153dab", 16), + new BigInteger("e4437ed6010e88286f547fa90abfe4c42212", 16), + 272)); + + return ConfigureCurveGlv(new FpCurve(p, a, b, n, h, true), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp256r1Holder + : X9ECParametersHolder + { + private Secp256r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp256r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^224 (2^32 - 1) + 2^192 + 2^96 - 1 + BigInteger p = FromHex("FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC"); + BigInteger b = FromHex("5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B"); + BigInteger n = FromHex("FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("C49D360886E704936A6678E1139D26B7819F7E90"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "046B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C2964FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp384r1Holder + : X9ECParametersHolder + { + private Secp384r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp384r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^384 - 2^128 - 2^96 + 2^32 - 1 + BigInteger p = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF"); + BigInteger a = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC"); + BigInteger b = FromHex("B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF"); + BigInteger n = FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("A335926AA319A27A1D00896A6773A4827ACDAC73"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7" + + "3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Secp521r1Holder + : X9ECParametersHolder + { + private Secp521r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Secp521r1Holder(); + + protected override ECCurve CreateCurve() + { + // p = 2^521 - 1 + BigInteger p = FromHex("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); + BigInteger a = FromHex("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC"); + BigInteger b = FromHex("0051953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00"); + BigInteger n = FromHex("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve(p, a, b, n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("D09E8800291CB85396CC6717393284AAA0DA64BA"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "00C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66" + + "011839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect113r1Holder + : X9ECParametersHolder + { + private Sect113r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect113r1Holder(); + + private const int m = 113; + private const int k = 9; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("003088250CA6E7C7FE649CE85820F7"); + BigInteger b = FromHex("00E8BEE4D3E2260744188BE0E9C723"); + BigInteger n = FromHex("0100000000000000D9CCEC8A39E56F"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10E723AB14D696E6768756151756FEBF8FCB49A9"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04009D73616F35F4AB1407D73562C10F00A52830277958EE84D1315ED31886"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect113r2Holder + : X9ECParametersHolder + { + private Sect113r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect113r2Holder(); + + private const int m = 113; + private const int k = 9; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("00689918DBEC7E5A0DD6DFC0AA55C7"); + BigInteger b = FromHex("0095E9A9EC9B297BD4BF36E059184F"); + BigInteger n = FromHex("010000000000000108789B2496AF93"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10C0FB15760860DEF1EEF4D696E676875615175D"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0401A57A6A7B26CA5EF52FCDB816479700B3ADC94ED1FE674C06E695BABA1D"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect131r1Holder + : X9ECParametersHolder + { + private Sect131r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect131r1Holder(); + + private const int m = 131; + private const int k1 = 2; + private const int k2 = 3; + private const int k3 = 8; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("07A11B09A76B562144418FF3FF8C2570B8"); + BigInteger b = FromHex("0217C05610884B63B9C6C7291678F9D341"); + BigInteger n = FromHex("0400000000000000023123953A9464B54D"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("4D696E676875615175985BD3ADBADA21B43A97E2"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "040081BAF91FDF9833C40F9C181343638399078C6E7EA38C001F73C8134B1B4EF9E150"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect131r2Holder + : X9ECParametersHolder + { + private Sect131r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect131r2Holder(); + + private const int m = 131; + private const int k1 = 2; + private const int k2 = 3; + private const int k3 = 8; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("03E5A88919D7CAFCBF415F07C2176573B2"); + BigInteger b = FromHex("04B8266A46C55657AC734CE38F018F2192"); + BigInteger n = FromHex("0400000000000000016954A233049BA98F"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("985BD3ADBAD4D696E676875615175A21B43A97E3"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "040356DCD8F2F95031AD652D23951BB366A80648F06D867940A5366D9E265DE9EB240F"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect163k1Holder + : X9ECParametersHolder + { + private Sect163k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect163k1Holder(); + + private const int m = 163; + private const int k1 = 3; + private const int k2 = 6; + private const int k3 = 7; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("04000000000000000000020108A2E0CC0D99F8A5EF"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0402FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE80289070FB05D38FF58321F2E800536D538CCDAA3D9"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect163r1Holder + : X9ECParametersHolder + { + private Sect163r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect163r1Holder(); + + private const int m = 163; + private const int k1 = 3; + private const int k2 = 6; + private const int k3 = 7; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("07B6882CAAEFA84F9554FF8428BD88E246D2782AE2"); + BigInteger b = FromHex("0713612DCDDCB40AAB946BDA29CA91F73AF958AFD9"); + BigInteger n = FromHex("03FFFFFFFFFFFFFFFFFFFF48AAB689C29CA710279B"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("24B7B137C8A14D696E6768756151756FD0DA2E5C"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "040369979697AB43897789566789567F787A7876A65400435EDB42EFAFB2989D51FEFCE3C80988F41FF883"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect163r2Holder + : X9ECParametersHolder + { + private Sect163r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect163r2Holder(); + + private const int m = 163; + private const int k1 = 3; + private const int k2 = 6; + private const int k3 = 7; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = FromHex("020A601907B8C953CA1481EB10512F78744A3205FD"); + BigInteger n = FromHex("040000000000000000000292FE77E70C12A4234C33"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("85E25BFE5C86226CDB12016F7553F9D0E693A268"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0403F0EBA16286A2D57EA0991168D4994637E8343E3600D51FBC6C71A0094FA2CDD545B11C5C0C797324F1"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect193r1Holder + : X9ECParametersHolder + { + private Sect193r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect193r1Holder(); + + private const int m = 193; + private const int k = 15; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("0017858FEB7A98975169E171F77B4087DE098AC8A911DF7B01"); + BigInteger b = FromHex("00FDFB49BFE6C3A89FACADAA7A1E5BBC7CC1C2E5D831478814"); + BigInteger n = FromHex("01000000000000000000000000C7F34A778F443ACC920EBA49"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("103FAEC74D696E676875615175777FC5B191EF30"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0401F481BC5F0FF84A74AD6CDF6FDEF4BF6179625372D8C0C5E10025E399F2903712CCF3EA9E3A1AD17FB0B3201B6AF7CE1B05"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect193r2Holder + : X9ECParametersHolder + { + private Sect193r2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect193r2Holder(); + + private const int m = 193; + private const int k = 15; + + protected override ECCurve CreateCurve() + { + BigInteger a = FromHex("0163F35A5137C2CE3EA6ED8667190B0BC43ECD69977702709B"); + BigInteger b = FromHex("00C9BB9E8927D4D64C377E2AB2856A5B16E3EFB7F61D4316AE"); + BigInteger n = FromHex("010000000000000000000000015AAB561B005413CCD4EE99D5"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10B7B4D696E676875615175137C8A16FD0DA2211"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0400D9B67D192E0367C803F39E1A7E82CA14A651350AAE617E8F01CE94335607C304AC29E7DEFBD9CA01F596F927224CDECF6C"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect233k1Holder + : X9ECParametersHolder + { + private Sect233k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect233k1Holder(); + + private const int m = 233; + private const int k = 74; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("8000000000000000000000000000069D5BB915BCD46EFB1AD5F173ABDF"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04017232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD612601DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect233r1Holder + : X9ECParametersHolder + { + private Sect233r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect233r1Holder(); + + private const int m = 233; + private const int k = 74; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = FromHex("0066647EDE6C332C7F8C0923BB58213B333B20E9CE4281FE115F7D8F90AD"); + BigInteger n = FromHex("01000000000000000000000000000013E974E72F8A6922031D2603CFE0D7"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("74D59FF07F6B413D0EA14B344B20A2DB049B50C3"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0400FAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B01006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect239k1Holder + : X9ECParametersHolder + { + private Sect239k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect239k1Holder(); + + private const int m = 239; + private const int k = 158; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("2000000000000000000000000000005A79FEC67CB6E91F1C1DA800E478A5"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0429A0B6A887A983E9730988A68727A8B2D126C44CC2CC7B2A6555193035DC76310804F12E549BDB011C103089E73510ACB275FC312A5DC6B76553F0CA"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect283k1Holder + : X9ECParametersHolder + { + private Sect283k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect283k1Holder(); + + private const int m = 283; + private const int k1 = 5; + private const int k2 = 7; + private const int k3 = 12; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE9AE2ED07577265DFF7F94451E061E163C61"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC2458492836" + + "01CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD2259"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect283r1Holder + : X9ECParametersHolder + { + private Sect283r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect283r1Holder(); + + private const int m = 283; + private const int k1 = 5; + private const int k2 = 7; + private const int k3 = 12; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = FromHex("027B680AC8B8596DA5A4AF8A19A0303FCA97FD7645309FA2A581485AF6263E313B79A2F5"); + BigInteger n = FromHex("03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEF90399660FC938A90165B042A7CEFADB307"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("77E2B07370EB0F832A6DD5B62DFC88CD06BB84BE"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "05F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B12053" + + "03676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE8112F4"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect409k1Holder + : X9ECParametersHolder + { + private Sect409k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect409k1Holder(); + + private const int m = 409; + private const int k = 87; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE5F83B2D4EA20400EC4557D5ED3E3E7CA5B4B5C83B8E01E5FCF"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0060F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C460189EB5AAAA62EE222EB1B35540CFE9023746" + + "01E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6C42E9C55215AA9CA27A5863EC48D8E0286B"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect409r1Holder + : X9ECParametersHolder + { + private Sect409r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect409r1Holder(); + + private const int m = 409; + private const int k = 87; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = FromHex("0021A5C2C8EE9FEB5C4B9A753B7B476B7FD6422EF1F3DD674761FA99D6AC27C8A9A197B272822F6CD57A55AA4F50AE317B13545F"); + BigInteger n = FromHex("010000000000000000000000000000000000000000000000000001E2AAD6A612F33307BE5FA47C3C9E052F838164CD37D9A21173"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("4099B5A457F9D69F79213D094C4BCD4D4262210B"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "015D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A868A1180515603AEAB60794E54BB7996A7" + + "0061B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1FDF4B4F40D2181B3681C364BA0273C706"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect571k1Holder + : X9ECParametersHolder + { + private Sect571k1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect571k1Holder(); + + private const int m = 571; + private const int k1 = 2; + private const int k2 = 5; + private const int k3 = 10; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.Zero; + BigInteger b = BigInteger.One; + BigInteger n = FromHex("020000000000000000000000000000000000000000000000000000000000000000000000131850E1F19A63E4B391A8DB917F4138B630D84BE5D639381E91DEB45CFE778F637C1001"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "026EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA44370958493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C8972" + + "0349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7A3"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Sect571r1Holder + : X9ECParametersHolder + { + private Sect571r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Sect571r1Holder(); + + private const int m = 571; + private const int k1 = 2; + private const int k2 = 5; + private const int k3 = 10; + + protected override ECCurve CreateCurve() + { + BigInteger a = BigInteger.One; + BigInteger b = FromHex("02F40E7E2221F295DE297117B7F3D62F5C6A97FFCB8CEFF1CD6BA8CE4A9A18AD84FFABBD8EFA59332BE7AD6756A66E294AFD185A78FF12AA520E4DE739BACA0C7FFEFF7F2955727A"); + BigInteger n = FromHex("03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE661CE18FF55987308059B186823851EC7DD9CA1161DE93D5174D66E8382E9BB2FE84E47"); + BigInteger h = BigInteger.ValueOf(2); + + return ConfigureCurve(new F2mCurve(m, k1, k2, k3, a, b, n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("2AA058F73A0E33AB486B0F610410C53A7F132310"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE53950F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D19" + + "037BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC15B"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static SecNamedCurves() + { + DefineCurve("secp112r1", SecObjectIdentifiers.SecP112r1, Secp112r1Holder.Instance); + DefineCurve("secp112r2", SecObjectIdentifiers.SecP112r2, Secp112r2Holder.Instance); + DefineCurve("secp128r1", SecObjectIdentifiers.SecP128r1, Secp128r1Holder.Instance); + DefineCurve("secp128r2", SecObjectIdentifiers.SecP128r2, Secp128r2Holder.Instance); + DefineCurve("secp160k1", SecObjectIdentifiers.SecP160k1, Secp160k1Holder.Instance); + DefineCurve("secp160r1", SecObjectIdentifiers.SecP160r1, Secp160r1Holder.Instance); + DefineCurve("secp160r2", SecObjectIdentifiers.SecP160r2, Secp160r2Holder.Instance); + DefineCurve("secp192k1", SecObjectIdentifiers.SecP192k1, Secp192k1Holder.Instance); + DefineCurve("secp192r1", SecObjectIdentifiers.SecP192r1, Secp192r1Holder.Instance); + DefineCurve("secp224k1", SecObjectIdentifiers.SecP224k1, Secp224k1Holder.Instance); + DefineCurve("secp224r1", SecObjectIdentifiers.SecP224r1, Secp224r1Holder.Instance); + DefineCurve("secp256k1", SecObjectIdentifiers.SecP256k1, Secp256k1Holder.Instance); + DefineCurve("secp256r1", SecObjectIdentifiers.SecP256r1, Secp256r1Holder.Instance); + DefineCurve("secp384r1", SecObjectIdentifiers.SecP384r1, Secp384r1Holder.Instance); + DefineCurve("secp521r1", SecObjectIdentifiers.SecP521r1, Secp521r1Holder.Instance); + + DefineCurve("sect113r1", SecObjectIdentifiers.SecT113r1, Sect113r1Holder.Instance); + DefineCurve("sect113r2", SecObjectIdentifiers.SecT113r2, Sect113r2Holder.Instance); + DefineCurve("sect131r1", SecObjectIdentifiers.SecT131r1, Sect131r1Holder.Instance); + DefineCurve("sect131r2", SecObjectIdentifiers.SecT131r2, Sect131r2Holder.Instance); + DefineCurve("sect163k1", SecObjectIdentifiers.SecT163k1, Sect163k1Holder.Instance); + DefineCurve("sect163r1", SecObjectIdentifiers.SecT163r1, Sect163r1Holder.Instance); + DefineCurve("sect163r2", SecObjectIdentifiers.SecT163r2, Sect163r2Holder.Instance); + DefineCurve("sect193r1", SecObjectIdentifiers.SecT193r1, Sect193r1Holder.Instance); + DefineCurve("sect193r2", SecObjectIdentifiers.SecT193r2, Sect193r2Holder.Instance); + DefineCurve("sect233k1", SecObjectIdentifiers.SecT233k1, Sect233k1Holder.Instance); + DefineCurve("sect233r1", SecObjectIdentifiers.SecT233r1, Sect233r1Holder.Instance); + DefineCurve("sect239k1", SecObjectIdentifiers.SecT239k1, Sect239k1Holder.Instance); + DefineCurve("sect283k1", SecObjectIdentifiers.SecT283k1, Sect283k1Holder.Instance); + DefineCurve("sect283r1", SecObjectIdentifiers.SecT283r1, Sect283r1Holder.Instance); + DefineCurve("sect409k1", SecObjectIdentifiers.SecT409k1, Sect409k1Holder.Instance); + DefineCurve("sect409r1", SecObjectIdentifiers.SecT409r1, Sect409r1Holder.Instance); + DefineCurve("sect571k1", SecObjectIdentifiers.SecT571k1, Sect571k1Holder.Instance); + DefineCurve("sect571r1", SecObjectIdentifiers.SecT571r1, Sect571r1Holder.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs.meta new file mode 100644 index 00000000..1e840984 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df576bb36e3e9f247a0482cd1a9971d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECNamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs new file mode 100644 index 00000000..9a6dcc61 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec +{ + public abstract class SecObjectIdentifiers + { + /** + * EllipticCurve OBJECT IDENTIFIER ::= { + * iso(1) identified-organization(3) certicom(132) curve(0) + * } + */ + public static readonly DerObjectIdentifier EllipticCurve = new DerObjectIdentifier("1.3.132.0"); + + public static readonly DerObjectIdentifier SecT163k1 = new DerObjectIdentifier(EllipticCurve + ".1"); + public static readonly DerObjectIdentifier SecT163r1 = new DerObjectIdentifier(EllipticCurve + ".2"); + public static readonly DerObjectIdentifier SecT239k1 = new DerObjectIdentifier(EllipticCurve + ".3"); + public static readonly DerObjectIdentifier SecT113r1 = new DerObjectIdentifier(EllipticCurve + ".4"); + public static readonly DerObjectIdentifier SecT113r2 = new DerObjectIdentifier(EllipticCurve + ".5"); + public static readonly DerObjectIdentifier SecP112r1 = new DerObjectIdentifier(EllipticCurve + ".6"); + public static readonly DerObjectIdentifier SecP112r2 = new DerObjectIdentifier(EllipticCurve + ".7"); + public static readonly DerObjectIdentifier SecP160r1 = new DerObjectIdentifier(EllipticCurve + ".8"); + public static readonly DerObjectIdentifier SecP160k1 = new DerObjectIdentifier(EllipticCurve + ".9"); + public static readonly DerObjectIdentifier SecP256k1 = new DerObjectIdentifier(EllipticCurve + ".10"); + public static readonly DerObjectIdentifier SecT163r2 = new DerObjectIdentifier(EllipticCurve + ".15"); + public static readonly DerObjectIdentifier SecT283k1 = new DerObjectIdentifier(EllipticCurve + ".16"); + public static readonly DerObjectIdentifier SecT283r1 = new DerObjectIdentifier(EllipticCurve + ".17"); + public static readonly DerObjectIdentifier SecT131r1 = new DerObjectIdentifier(EllipticCurve + ".22"); + public static readonly DerObjectIdentifier SecT131r2 = new DerObjectIdentifier(EllipticCurve + ".23"); + public static readonly DerObjectIdentifier SecT193r1 = new DerObjectIdentifier(EllipticCurve + ".24"); + public static readonly DerObjectIdentifier SecT193r2 = new DerObjectIdentifier(EllipticCurve + ".25"); + public static readonly DerObjectIdentifier SecT233k1 = new DerObjectIdentifier(EllipticCurve + ".26"); + public static readonly DerObjectIdentifier SecT233r1 = new DerObjectIdentifier(EllipticCurve + ".27"); + public static readonly DerObjectIdentifier SecP128r1 = new DerObjectIdentifier(EllipticCurve + ".28"); + public static readonly DerObjectIdentifier SecP128r2 = new DerObjectIdentifier(EllipticCurve + ".29"); + public static readonly DerObjectIdentifier SecP160r2 = new DerObjectIdentifier(EllipticCurve + ".30"); + public static readonly DerObjectIdentifier SecP192k1 = new DerObjectIdentifier(EllipticCurve + ".31"); + public static readonly DerObjectIdentifier SecP224k1 = new DerObjectIdentifier(EllipticCurve + ".32"); + public static readonly DerObjectIdentifier SecP224r1 = new DerObjectIdentifier(EllipticCurve + ".33"); + public static readonly DerObjectIdentifier SecP384r1 = new DerObjectIdentifier(EllipticCurve + ".34"); + public static readonly DerObjectIdentifier SecP521r1 = new DerObjectIdentifier(EllipticCurve + ".35"); + public static readonly DerObjectIdentifier SecT409k1 = new DerObjectIdentifier(EllipticCurve + ".36"); + public static readonly DerObjectIdentifier SecT409r1 = new DerObjectIdentifier(EllipticCurve + ".37"); + public static readonly DerObjectIdentifier SecT571k1 = new DerObjectIdentifier(EllipticCurve + ".38"); + public static readonly DerObjectIdentifier SecT571r1 = new DerObjectIdentifier(EllipticCurve + ".39"); + + public static readonly DerObjectIdentifier SecP192r1 = X9ObjectIdentifiers.Prime192v1; + public static readonly DerObjectIdentifier SecP256r1 = X9ObjectIdentifiers.Prime256v1; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs.meta new file mode 100644 index 00000000..3db80ac5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3f1b3aedfec42bd43856c0cd99dd1523 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/sec/SECObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime.meta new file mode 100644 index 00000000..ff07a4c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3cd50e8c7e8bedd44aad19925927bae8 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs new file mode 100644 index 00000000..341c8f92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + public abstract class SmimeAttributes + { + public static readonly DerObjectIdentifier SmimeCapabilities = PkcsObjectIdentifiers.Pkcs9AtSmimeCapabilities; + public static readonly DerObjectIdentifier EncrypKeyPref = PkcsObjectIdentifiers.IdAAEncrypKeyPref; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs.meta new file mode 100644 index 00000000..3044d410 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f5de6cadf43fdfc4c940567a6e5eddd4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEAttributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs new file mode 100644 index 00000000..cbf4baa2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs @@ -0,0 +1,113 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + /** + * Handler class for dealing with S/MIME Capabilities + */ + public class SmimeCapabilities + : Asn1Encodable + { + /** + * general preferences + */ + public static readonly DerObjectIdentifier PreferSignedData = PkcsObjectIdentifiers.PreferSignedData; + public static readonly DerObjectIdentifier CannotDecryptAny = PkcsObjectIdentifiers.CannotDecryptAny; + public static readonly DerObjectIdentifier SmimeCapabilitesVersions = PkcsObjectIdentifiers.SmimeCapabilitiesVersions; + + /** + * encryption algorithms preferences + */ + public static readonly DerObjectIdentifier Aes256Cbc = NistObjectIdentifiers.IdAes256Cbc; + public static readonly DerObjectIdentifier Aes192Cbc = NistObjectIdentifiers.IdAes192Cbc; + public static readonly DerObjectIdentifier Aes128Cbc = NistObjectIdentifiers.IdAes128Cbc; + public static readonly DerObjectIdentifier IdeaCbc = new DerObjectIdentifier("1.3.6.1.4.1.188.7.1.1.2"); + public static readonly DerObjectIdentifier Cast5Cbc = new DerObjectIdentifier("1.2.840.113533.7.66.10"); + public static readonly DerObjectIdentifier DesCbc = new DerObjectIdentifier("1.3.14.3.2.7"); + public static readonly DerObjectIdentifier DesEde3Cbc = PkcsObjectIdentifiers.DesEde3Cbc; + public static readonly DerObjectIdentifier RC2Cbc = PkcsObjectIdentifiers.RC2Cbc; + + private Asn1Sequence capabilities; + + /** + * return an Attr object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static SmimeCapabilities GetInstance( + object obj) + { + if (obj == null || obj is SmimeCapabilities) + { + return (SmimeCapabilities) obj; + } + + if (obj is Asn1Sequence) + { + return new SmimeCapabilities((Asn1Sequence) obj); + } + + if (obj is AttributeX509) + { + return new SmimeCapabilities( + (Asn1Sequence)(((AttributeX509) obj).AttrValues[0])); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public SmimeCapabilities( + Asn1Sequence seq) + { + capabilities = seq; + } + + /** + * returns an ArrayList with 0 or more objects of all the capabilities + * matching the passed in capability Oid. If the Oid passed is null the + * entire set is returned. + */ + public IList GetCapabilitiesForOid(DerObjectIdentifier capability) + { + var list = new List(); + DoGetCapabilitiesForOid(capability, list); + return list; + } + + private void DoGetCapabilitiesForOid(DerObjectIdentifier capability, IList list) + { + foreach (object o in capabilities) + { + SmimeCapability cap = SmimeCapability.GetInstance(o); + + if (capability == null || capability.Equals(cap.CapabilityID)) + { + list.Add(cap); + } + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * SMIMECapabilities ::= Sequence OF SMIMECapability
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return capabilities; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs.meta new file mode 100644 index 00000000..f2658a0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8048b881c91172a4e922d21cd020ae40 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs new file mode 100644 index 00000000..5addcb2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + public class SmimeCapabilitiesAttribute + : AttributeX509 + { + public SmimeCapabilitiesAttribute( + SmimeCapabilityVector capabilities) + : base(SmimeAttributes.SmimeCapabilities, + new DerSet(new DerSequence(capabilities.ToAsn1EncodableVector()))) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs.meta new file mode 100644 index 00000000..65ca167f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c62062cde496d8c4b857ddecfb5ff8c0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilitiesAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs new file mode 100644 index 00000000..da5f4d13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + public class SmimeCapability + : Asn1Encodable + { + /** + * general preferences + */ + public static readonly DerObjectIdentifier PreferSignedData = PkcsObjectIdentifiers.PreferSignedData; + public static readonly DerObjectIdentifier CannotDecryptAny = PkcsObjectIdentifiers.CannotDecryptAny; + public static readonly DerObjectIdentifier SmimeCapabilitiesVersions = PkcsObjectIdentifiers.SmimeCapabilitiesVersions; + + /** + * encryption algorithms preferences + */ + public static readonly DerObjectIdentifier DesCbc = new DerObjectIdentifier("1.3.14.3.2.7"); + public static readonly DerObjectIdentifier DesEde3Cbc = PkcsObjectIdentifiers.DesEde3Cbc; + public static readonly DerObjectIdentifier RC2Cbc = PkcsObjectIdentifiers.RC2Cbc; + + private DerObjectIdentifier capabilityID; + private Asn1Object parameters; + + public SmimeCapability( + Asn1Sequence seq) + { + capabilityID = (DerObjectIdentifier) seq[0].ToAsn1Object(); + + if (seq.Count > 1) + { + parameters = seq[1].ToAsn1Object(); + } + } + + public SmimeCapability( + DerObjectIdentifier capabilityID, + Asn1Encodable parameters) + { + if (capabilityID == null) + throw new ArgumentNullException("capabilityID"); + + this.capabilityID = capabilityID; + + if (parameters != null) + { + this.parameters = parameters.ToAsn1Object(); + } + } + + public static SmimeCapability GetInstance( + object obj) + { + if (obj == null || obj is SmimeCapability) + { + return (SmimeCapability) obj; + } + + if (obj is Asn1Sequence) + { + return new SmimeCapability((Asn1Sequence) obj); + } + + throw new ArgumentException("Invalid SmimeCapability"); + } + + public DerObjectIdentifier CapabilityID + { + get { return capabilityID; } + } + + public Asn1Object Parameters + { + get { return parameters; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * SMIMECapability ::= Sequence {
+         *     capabilityID OBJECT IDENTIFIER,
+         *     parameters ANY DEFINED BY capabilityID OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(capabilityID); + v.AddOptional(parameters); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs.meta new file mode 100644 index 00000000..9a50f7e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f18e8231ef7af74479774360d10af8eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapability.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs new file mode 100644 index 00000000..34a81e10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs @@ -0,0 +1,41 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + /** + * Handler for creating a vector S/MIME Capabilities + */ + public class SmimeCapabilityVector + { + private readonly Asn1EncodableVector capabilities = new Asn1EncodableVector(); + + public void AddCapability( + DerObjectIdentifier capability) + { + capabilities.Add(new DerSequence(capability)); + } + + public void AddCapability( + DerObjectIdentifier capability, + int value) + { + capabilities.Add(new DerSequence(capability, new DerInteger(value))); + } + + public void AddCapability( + DerObjectIdentifier capability, + Asn1Encodable parameters) + { + capabilities.Add(new DerSequence(capability, parameters)); + } + + public Asn1EncodableVector ToAsn1EncodableVector() + { + return capabilities; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs.meta new file mode 100644 index 00000000..3c100318 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 219a06bd3673c4044948b9dfb5f49b75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMECapabilityVector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs new file mode 100644 index 00000000..604570b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Smime +{ + /** + * The SmimeEncryptionKeyPreference object. + *
+     * SmimeEncryptionKeyPreference ::= CHOICE {
+     *     issuerAndSerialNumber   [0] IssuerAndSerialNumber,
+     *     receipentKeyId          [1] RecipientKeyIdentifier,
+     *     subjectAltKeyIdentifier [2] SubjectKeyIdentifier
+     * }
+     * 
+ */ + public class SmimeEncryptionKeyPreferenceAttribute + : AttributeX509 + { + public SmimeEncryptionKeyPreferenceAttribute( + IssuerAndSerialNumber issAndSer) + : base(SmimeAttributes.EncrypKeyPref, + new DerSet(new DerTaggedObject(false, 0, issAndSer))) + { + } + + public SmimeEncryptionKeyPreferenceAttribute( + RecipientKeyIdentifier rKeyID) + : base(SmimeAttributes.EncrypKeyPref, + new DerSet(new DerTaggedObject(false, 1, rKeyID))) + { + } + + /** + * @param sKeyId the subjectKeyIdentifier value (normally the X.509 one) + */ + public SmimeEncryptionKeyPreferenceAttribute( + Asn1OctetString sKeyID) + : base(SmimeAttributes.EncrypKeyPref, + new DerSet(new DerTaggedObject(false, 2, sKeyID))) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs.meta new file mode 100644 index 00000000..82025370 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d5b356023dc59d741b035778944ac47e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/smime/SMIMEEncryptionKeyPreferenceAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust.meta new file mode 100644 index 00000000..bfe1db04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 30f0aab5c588b124d968e0b9cfc7924b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs new file mode 100644 index 00000000..b82591bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs @@ -0,0 +1,557 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust +{ + /// Elliptic curve registry for curves defined in "ECC Brainpool Standard Curves and Curve Generation" + /// http://www.ecc-brainpool.org/download/draft_pkix_additional_ecc_dp.txt . + public static class TeleTrusTNamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class BrainpoolP160r1Holder + : X9ECParametersHolder + { + private BrainpoolP160r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP160r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("E95E4A5F737059DC60DF5991D45029409E60FC09"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("E95E4A5F737059DC60DFC7AD95B3D8139515620F"), // q + FromHex("340E7BE2A280EB74E2BE61BADA745D97E8F7C300"), // a + FromHex("1E589A8595423412134FAA2DBDEC95C8D8675E58"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04BED5AF16EA3F6A4F62938C4631EB5AF7BDBCDBC31667CB477A1A8EC338F94741669C976316DA6321"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP160t1Holder + : X9ECParametersHolder + { + private BrainpoolP160t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP160t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("E95E4A5F737059DC60DF5991D45029409E60FC09"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("24DBFF5DEC9B986BBFE5295A29BFBAE45E0F5D0B"), // Z + FromHex("E95E4A5F737059DC60DFC7AD95B3D8139515620F"), // q + FromHex("E95E4A5F737059DC60DFC7AD95B3D8139515620C"), // a + FromHex("7A556B6DAE535B7B51ED2C4D7DAA7A0B5C55F380"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04B199B13B9B34EFC1397E64BAEB05ACC265FF2378ADD6718B7C7C1961F0991B842443772152C9E0AD"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP192r1Holder + : X9ECParametersHolder + { + private BrainpoolP192r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP192r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297"), // q + FromHex("6A91174076B1E0E19C39C031FE8685C1CAE040E5C69A28EF"), // a + FromHex("469A28EF7C28CCA3DC721D044F4496BCCA7EF4146FBF25C9"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04C0A0647EAAB6A48753B033C56CB0F0900A2F5C4853375FD614B690866ABD5BB88B5F4828C1490002E6773FA2FA299B8F"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP192t1Holder + : X9ECParametersHolder + { + private BrainpoolP192t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP192t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("1B6F5CC8DB4DC7AF19458A9CB80DC2295E5EB9C3732104CB") // Z + FromHex("C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297"), // q + FromHex("C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86294"), // a + FromHex("13D56FFAEC78681E68F9DEB43B35BEC2FB68542E27897B79"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "043AE9E58C82F63C30282E1FE7BBF43FA72C446AF6F4618129097E2C5667C2223A902AB5CA449D0084B7E5B3DE7CCC01C9"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP224r1Holder + : X9ECParametersHolder + { + private BrainpoolP224r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP224r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF"), // q + FromHex("68A5E62CA9CE6C1C299803A6C1530B514E182AD8B0042A59CAD29F43"), // a + FromHex("2580F63CCFE44138870713B1A92369E33E2135D266DBB372386C400B"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "040D9029AD2C7E5CF4340823B2A87DC68C9E4CE3174C1E6EFDEE12C07D58AA56F772C0726F24C6B89E4ECDAC24354B9E99CAA3F6D3761402CD"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP224t1Holder + : X9ECParametersHolder + { + private BrainpoolP224t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP224t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("2DF271E14427A346910CF7A2E6CFA7B3F484E5C2CCE1C8B730E28B3F") // Z + FromHex("D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF"), // q + FromHex("D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FC"), // a + FromHex("4B337D934104CD7BEF271BF60CED1ED20DA14C08B3BB64F18A60888D"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "046AB1E344CE25FF3896424E7FFE14762ECB49F8928AC0C76029B4D5800374E9F5143E568CD23F3F4D7C0D4B1E41C8CC0D1C6ABD5F1A46DB4C"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP256r1Holder + : X9ECParametersHolder + { + private BrainpoolP256r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP256r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377"), // q + FromHex("7D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9"), // a + FromHex("26DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B6"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F046997"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP256t1Holder + : X9ECParametersHolder + { + private BrainpoolP256t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP256t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("3E2D4BD9597B58639AE7AA669CAB9837CF5CF20A2C852D10F655668DFC150EF0") // Z + FromHex("A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377"), // q + FromHex("A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5374"), // a + FromHex("662C61C430D84EA4FE66A7733D0B76B7BF93EBC4AF2F49256AE58101FEE92B04"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04A3E8EB3CC1CFE7B7732213B23A656149AFA142C47AAFBC2B79A191562E1305F42D996C823439C56D7F7B22E14644417E69BCB6DE39D027001DABE8F35B25C9BE"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP320r1Holder + : X9ECParametersHolder + { + private BrainpoolP320r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP320r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E98691555B44C59311"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412B1F1B32E27"), // q + FromHex("3EE30B568FBAB0F883CCEBD46D3F3BB8A2A73513F5EB79DA66190EB085FFA9F492F375A97D860EB4"), // a + FromHex("520883949DFDBC42D3AD198640688A6FE13F41349554B49ACC31DCCD884539816F5EB4AC8FB1F1A6"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0443BD7E9AFB53D8B85289BCC48EE5BFE6F20137D10A087EB6E7871E2A10A599C710AF8D0D39E2061114FDD05545EC1CC8AB4093247F77275E0743FFED117182EAA9C77877AAAC6AC7D35245D1692E8EE1"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP320t1Holder + : X9ECParametersHolder + { + private BrainpoolP320t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP320t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E98691555B44C59311"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("15F75CAF668077F7E85B42EB01F0A81FF56ECD6191D55CB82B7D861458A18FEFC3E5AB7496F3C7B1") // Z + FromHex("D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412B1F1B32E27"), // q + FromHex("D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412B1F1B32E24"), // a + FromHex("A7F561E038EB1ED560B3D147DB782013064C19F27ED27C6780AAF77FB8A547CEB5B4FEF422340353"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04925BE9FB01AFC6FB4D3E7D4990010F813408AB106C4F09CB7EE07868CC136FFF3357F624A21BED5263BA3A7A27483EBF6671DBEF7ABB30EBEE084E58A0B077AD42A5A0989D1EE71B1B9BC0455FB0D2C3"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP384r1Holder + : X9ECParametersHolder + { + private BrainpoolP384r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP384r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6AF6B7FC3103B883202E9046565"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901D1A71874700133107EC53"), // q + FromHex("7BC382C63D8C150C3C72080ACE05AFA0C2BEA28E4FB22787139165EFBA91F90F8AA5814A503AD4EB04A8C7DD22CE2826"), // a + FromHex("04A8C7DD22CE28268B39B55416F0447C2FB77DE107DCD2A62E880EA53EEB62D57CB4390295DBC9943AB78696FA504C11"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "041D1C64F068CF45FFA2A63A81B7C13F6B8847A3E77EF14FE3DB7FCAFE0CBD10E8E826E03436D646AAEF87B2E247D4AF1E8ABE1D7520F9C2A45CB1EB8E95CFD55262B70B29FEEC5864E19C054FF99129280E4646217791811142820341263C5315"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP384t1Holder + : X9ECParametersHolder + { + private BrainpoolP384t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP384t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6AF6B7FC3103B883202E9046565"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("41DFE8DD399331F7166A66076734A89CD0D2BCDB7D068E44E1F378F41ECBAE97D2D63DBC87BCCDDCCC5DA39E8589291C") // Z + FromHex("8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901D1A71874700133107EC53"), // q + FromHex("8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901D1A71874700133107EC50"), // a + FromHex("7F519EADA7BDA81BD826DBA647910F8C4B9346ED8CCDC64E4B1ABD11756DCE1D2074AA263B88805CED70355A33B471EE"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0418DE98B02DB9A306F2AFCD7235F72A819B80AB12EBD653172476FECD462AABFFC4FF191B946A5F54D8D0AA2F418808CC25AB056962D30651A114AFD2755AD336747F93475B7A1FCA3B88F2B6A208CCFE469408584DC2B2912675BF5B9E582928"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP512r1Holder + : X9ECParametersHolder + { + private BrainpoolP512r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP512r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3"), // q + FromHex("7830A3318B603B89E2327145AC234CC594CBDD8D3DF91610A83441CAEA9863BC2DED5D5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C1AC4D77FC94CA"), // a + FromHex("3DF91610A83441CAEA9863BC2DED5D5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C1AC4D77FC94CADC083E67984050B75EBAE5DD2809BD638016F723"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0481AEE4BDD82ED9645A21322E9C4C6A9385ED9F70B5D916C1B43B62EEF4D0098EFF3B1F78E2D0D48D50D1687B93B97D5F7C6D5047406A5E688B352209BCB9F8227DDE385D566332ECC0EABFA9CF7822FDF209F70024A57B1AA000C55B881F8111B2DCDE494A5F485E5BCA4BD88A2763AED1CA2B2FA8F0540678CD1E0F3AD80892"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + internal class BrainpoolP512t1Holder + : X9ECParametersHolder + { + private BrainpoolP512t1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new BrainpoolP512t1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + //FromHex("12EE58E6764838B69782136F0F2D3BA06E27695716054092E60A80BEDB212B64E585D90BCE13761F85C3F1D2A64E3BE8FEA2220F01EBA5EEB0F35DBD29D922AB") // Z + FromHex("AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3"), // q + FromHex("AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F0"), // a + FromHex("7CBBBCF9441CFAB76E1890E46884EAE321F70C0BCB4981527897504BEC3E36A62BCDFA2304976540F6450085F2DAE145C22553B465763689180EA2571867423E"), // b + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "04640ECE5C12788717B9C1BA06CBC2A6FEBA85842458C56DDE9DB1758D39C0313D82BA51735CDB3EA499AA77A7D6943A64F7A3F25FE26F06B51BAA2696FA9035DA5B534BD595F5AF0FA2C892376C84ACE1BB4E3019B71634C01131159CAE03CEE9D9932184BEEF216BD71DF2DADF86A627306ECFF96DBB8BACE198B61E00F8B332"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static TeleTrusTNamedCurves() + { + DefineCurve("brainpoolP160r1", TeleTrusTObjectIdentifiers.BrainpoolP160R1, BrainpoolP160r1Holder.Instance); + DefineCurve("brainpoolP160t1", TeleTrusTObjectIdentifiers.BrainpoolP160T1, BrainpoolP160t1Holder.Instance); + DefineCurve("brainpoolP192r1", TeleTrusTObjectIdentifiers.BrainpoolP192R1, BrainpoolP192r1Holder.Instance); + DefineCurve("brainpoolP192t1", TeleTrusTObjectIdentifiers.BrainpoolP192T1, BrainpoolP192t1Holder.Instance); + DefineCurve("brainpoolP224r1", TeleTrusTObjectIdentifiers.BrainpoolP224R1, BrainpoolP224r1Holder.Instance); + DefineCurve("brainpoolP224t1", TeleTrusTObjectIdentifiers.BrainpoolP224T1, BrainpoolP224t1Holder.Instance); + DefineCurve("brainpoolP256r1", TeleTrusTObjectIdentifiers.BrainpoolP256R1, BrainpoolP256r1Holder.Instance); + DefineCurve("brainpoolP256t1", TeleTrusTObjectIdentifiers.BrainpoolP256T1, BrainpoolP256t1Holder.Instance); + DefineCurve("brainpoolP320r1", TeleTrusTObjectIdentifiers.BrainpoolP320R1, BrainpoolP320r1Holder.Instance); + DefineCurve("brainpoolP320t1", TeleTrusTObjectIdentifiers.BrainpoolP320T1, BrainpoolP320t1Holder.Instance); + DefineCurve("brainpoolP384r1", TeleTrusTObjectIdentifiers.BrainpoolP384R1, BrainpoolP384r1Holder.Instance); + DefineCurve("brainpoolP384t1", TeleTrusTObjectIdentifiers.BrainpoolP384T1, BrainpoolP384t1Holder.Instance); + DefineCurve("brainpoolP512r1", TeleTrusTObjectIdentifiers.BrainpoolP512R1, BrainpoolP512r1Holder.Instance); + DefineCurve("brainpoolP512t1", TeleTrusTObjectIdentifiers.BrainpoolP512T1, BrainpoolP512t1Holder.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs.meta new file mode 100644 index 00000000..5bbba27a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bf980e6e7cc630b4cbd0c7eae74db8a6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTNamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs new file mode 100644 index 00000000..f5e52820 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust +{ + public sealed class TeleTrusTObjectIdentifiers + { + private TeleTrusTObjectIdentifiers() + { + } + + public static readonly DerObjectIdentifier TeleTrusTAlgorithm = new DerObjectIdentifier("1.3.36.3"); + + public static readonly DerObjectIdentifier RipeMD160 = new DerObjectIdentifier(TeleTrusTAlgorithm + ".2.1"); + public static readonly DerObjectIdentifier RipeMD128 = new DerObjectIdentifier(TeleTrusTAlgorithm + ".2.2"); + public static readonly DerObjectIdentifier RipeMD256 = new DerObjectIdentifier(TeleTrusTAlgorithm + ".2.3"); + + public static readonly DerObjectIdentifier TeleTrusTRsaSignatureAlgorithm = new DerObjectIdentifier(TeleTrusTAlgorithm + ".3.1"); + + public static readonly DerObjectIdentifier RsaSignatureWithRipeMD160 = new DerObjectIdentifier(TeleTrusTRsaSignatureAlgorithm + ".2"); + public static readonly DerObjectIdentifier RsaSignatureWithRipeMD128 = new DerObjectIdentifier(TeleTrusTRsaSignatureAlgorithm + ".3"); + public static readonly DerObjectIdentifier RsaSignatureWithRipeMD256 = new DerObjectIdentifier(TeleTrusTRsaSignatureAlgorithm + ".4"); + + public static readonly DerObjectIdentifier ECSign = new DerObjectIdentifier(TeleTrusTAlgorithm + ".3.2"); + + public static readonly DerObjectIdentifier ECSignWithSha1 = new DerObjectIdentifier(ECSign + ".1"); + public static readonly DerObjectIdentifier ECSignWithRipeMD160 = new DerObjectIdentifier(ECSign + ".2"); + + public static readonly DerObjectIdentifier EccBrainpool = new DerObjectIdentifier(TeleTrusTAlgorithm + ".3.2.8"); + public static readonly DerObjectIdentifier EllipticCurve = new DerObjectIdentifier(EccBrainpool + ".1"); + public static readonly DerObjectIdentifier VersionOne = new DerObjectIdentifier(EllipticCurve + ".1"); + + public static readonly DerObjectIdentifier BrainpoolP160R1 = new DerObjectIdentifier(VersionOne + ".1"); + public static readonly DerObjectIdentifier BrainpoolP160T1 = new DerObjectIdentifier(VersionOne + ".2"); + public static readonly DerObjectIdentifier BrainpoolP192R1 = new DerObjectIdentifier(VersionOne + ".3"); + public static readonly DerObjectIdentifier BrainpoolP192T1 = new DerObjectIdentifier(VersionOne + ".4"); + public static readonly DerObjectIdentifier BrainpoolP224R1 = new DerObjectIdentifier(VersionOne + ".5"); + public static readonly DerObjectIdentifier BrainpoolP224T1 = new DerObjectIdentifier(VersionOne + ".6"); + public static readonly DerObjectIdentifier BrainpoolP256R1 = new DerObjectIdentifier(VersionOne + ".7"); + public static readonly DerObjectIdentifier BrainpoolP256T1 = new DerObjectIdentifier(VersionOne + ".8"); + public static readonly DerObjectIdentifier BrainpoolP320R1 = new DerObjectIdentifier(VersionOne + ".9"); + public static readonly DerObjectIdentifier BrainpoolP320T1 = new DerObjectIdentifier(VersionOne + ".10"); + public static readonly DerObjectIdentifier BrainpoolP384R1 = new DerObjectIdentifier(VersionOne + ".11"); + public static readonly DerObjectIdentifier BrainpoolP384T1 = new DerObjectIdentifier(VersionOne + ".12"); + public static readonly DerObjectIdentifier BrainpoolP512R1 = new DerObjectIdentifier(VersionOne + ".13"); + public static readonly DerObjectIdentifier BrainpoolP512T1 = new DerObjectIdentifier(VersionOne + ".14"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs.meta new file mode 100644 index 00000000..999ecf25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e8fe476de3c6ffa418ff42c80bb89a8f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/teletrust/TeleTrusTObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp.meta new file mode 100644 index 00000000..13be2e04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4b32868c42fa04148896e21f252770f3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs new file mode 100644 index 00000000..d165eb57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs @@ -0,0 +1,124 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp +{ + public class Accuracy + : Asn1Encodable + { + private readonly DerInteger seconds; + private readonly DerInteger millis; + private readonly DerInteger micros; + + // constants + protected const int MinMillis = 1; + protected const int MaxMillis = 999; + protected const int MinMicros = 1; + protected const int MaxMicros = 999; + + public Accuracy( + DerInteger seconds, + DerInteger millis, + DerInteger micros) + { + if (null != millis) + { + int millisValue = millis.IntValueExact; + if (millisValue < MinMillis || millisValue > MaxMillis) + throw new ArgumentException("Invalid millis field : not in (1..999)"); + } + if (null != micros) + { + int microsValue = micros.IntValueExact; + if (microsValue < MinMicros || microsValue > MaxMicros) + throw new ArgumentException("Invalid micros field : not in (1..999)"); + } + + this.seconds = seconds; + this.millis = millis; + this.micros = micros; + } + + private Accuracy( + Asn1Sequence seq) + { + for (int i = 0; i < seq.Count; ++i) + { + // seconds + if (seq[i] is DerInteger) + { + seconds = (DerInteger) seq[i]; + } + else if (seq[i] is Asn1TaggedObject) + { + Asn1TaggedObject extra = (Asn1TaggedObject)seq[i]; + + switch (extra.TagNo) + { + case 0: + millis = DerInteger.GetInstance(extra, false); + int millisValue = millis.IntValueExact; + if (millisValue < MinMillis || millisValue > MaxMillis) + throw new ArgumentException("Invalid millis field : not in (1..999)"); + break; + case 1: + micros = DerInteger.GetInstance(extra, false); + int microsValue = micros.IntValueExact; + if (microsValue < MinMicros || microsValue > MaxMicros) + throw new ArgumentException("Invalid micros field : not in (1..999)"); + break; + default: + throw new ArgumentException("Invalid tag number"); + } + } + } + } + + public static Accuracy GetInstance(object obj) + { + if (obj is Accuracy) + return (Accuracy)obj; + if (obj == null) + return null; + return new Accuracy(Asn1Sequence.GetInstance(obj)); + } + + public DerInteger Seconds + { + get { return seconds; } + } + + public DerInteger Millis + { + get { return millis; } + } + + public DerInteger Micros + { + get { return micros; } + } + + /** + *
+		 * Accuracy ::= SEQUENCE {
+		 *             seconds        INTEGER              OPTIONAL,
+		 *             millis     [0] INTEGER  (1..999)    OPTIONAL,
+		 *             micros     [1] INTEGER  (1..999)    OPTIONAL
+		 *             }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(seconds); + v.AddOptionalTagged(false, 0, millis); + v.AddOptionalTagged(false, 1, micros); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs.meta new file mode 100644 index 00000000..f81342be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 339f04e74f343d046bf59842f2d0d8dc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/Accuracy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs new file mode 100644 index 00000000..befb93c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp +{ + public class MessageImprint + : Asn1Encodable + { + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly byte[] hashedMessage; + + public static MessageImprint GetInstance(object obj) + { + if (obj is MessageImprint) + return (MessageImprint)obj; + if (obj == null) + return null; + return new MessageImprint(Asn1Sequence.GetInstance(obj)); + } + + private MessageImprint( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + this.hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[0]); + this.hashedMessage = Asn1OctetString.GetInstance(seq[1]).GetOctets(); + } + + public MessageImprint( + AlgorithmIdentifier hashAlgorithm, + byte[] hashedMessage) + { + this.hashAlgorithm = hashAlgorithm; + this.hashedMessage = hashedMessage; + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public byte[] GetHashedMessage() + { + return hashedMessage; + } + + /** + *
+		 *    MessageImprint ::= SEQUENCE  {
+		 *       hashAlgorithm                AlgorithmIdentifier,
+		 *       hashedMessage                OCTET STRING  }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(hashAlgorithm, new DerOctetString(hashedMessage)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs.meta new file mode 100644 index 00000000..8998c2d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 719e3daffbac95e4e8246f1394328bcb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/MessageImprint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs new file mode 100644 index 00000000..083f3589 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs @@ -0,0 +1,211 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp +{ + public class TstInfo + : Asn1Encodable + { + private readonly DerInteger version; + private readonly DerObjectIdentifier tsaPolicyId; + private readonly MessageImprint messageImprint; + private readonly DerInteger serialNumber; + private readonly Asn1GeneralizedTime genTime; + private readonly Accuracy accuracy; + private readonly DerBoolean ordering; + private readonly DerInteger nonce; + private readonly GeneralName tsa; + private readonly X509Extensions extensions; + + public static TstInfo GetInstance(object obj) + { + if (obj is TstInfo) + return (TstInfo)obj; + if (obj == null) + return null; + return new TstInfo(Asn1Sequence.GetInstance(obj)); + } + + private TstInfo(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + // version + e.MoveNext(); + version = DerInteger.GetInstance(e.Current); + + // tsaPolicy + e.MoveNext(); + tsaPolicyId = DerObjectIdentifier.GetInstance(e.Current); + + // messageImprint + e.MoveNext(); + messageImprint = MessageImprint.GetInstance(e.Current); + + // serialNumber + e.MoveNext(); + serialNumber = DerInteger.GetInstance(e.Current); + + // genTime + e.MoveNext(); + genTime = Asn1GeneralizedTime.GetInstance(e.Current); + + // default for ordering + ordering = DerBoolean.False; + + while (e.MoveNext()) + { + Asn1Object o = (Asn1Object) e.Current; + + if (o is Asn1TaggedObject) + { + DerTaggedObject tagged = (DerTaggedObject) o; + + switch (tagged.TagNo) + { + case 0: + tsa = GeneralName.GetInstance(tagged, true); + break; + case 1: + extensions = X509Extensions.GetInstance(tagged, false); + break; + default: + throw new ArgumentException("Unknown tag value " + tagged.TagNo); + } + } + + if (o is DerSequence) + { + accuracy = Accuracy.GetInstance(o); + } + + if (o is DerBoolean) + { + ordering = DerBoolean.GetInstance(o); + } + + if (o is DerInteger) + { + nonce = DerInteger.GetInstance(o); + } + } + } + + public TstInfo( + DerObjectIdentifier tsaPolicyId, + MessageImprint messageImprint, + DerInteger serialNumber, + Asn1GeneralizedTime genTime, + Accuracy accuracy, + DerBoolean ordering, + DerInteger nonce, + GeneralName tsa, + X509Extensions extensions) + { + this.version = new DerInteger(1); + this.tsaPolicyId = tsaPolicyId; + this.messageImprint = messageImprint; + this.serialNumber = serialNumber; + this.genTime = genTime; + this.accuracy = accuracy; + this.ordering = ordering; + this.nonce = nonce; + this.tsa = tsa; + this.extensions = extensions; + } + + public DerInteger Version + { + get { return version; } + } + + public MessageImprint MessageImprint + { + get { return messageImprint; } + } + + public DerObjectIdentifier Policy + { + get { return tsaPolicyId; } + } + + public DerInteger SerialNumber + { + get { return serialNumber; } + } + + public Accuracy Accuracy + { + get { return accuracy; } + } + + public Asn1GeneralizedTime GenTime + { + get { return genTime; } + } + + public DerBoolean Ordering + { + get { return ordering; } + } + + public DerInteger Nonce + { + get { return nonce; } + } + + public GeneralName Tsa + { + get { return tsa; } + } + + public X509Extensions Extensions + { + get { return extensions; } + } + + /** + *
+		 *
+		 *     TstInfo ::= SEQUENCE  {
+		 *        version                      INTEGER  { v1(1) },
+		 *        policy                       TSAPolicyId,
+		 *        messageImprint               MessageImprint,
+		 *          -- MUST have the same value as the similar field in
+		 *          -- TimeStampReq
+		 *        serialNumber                 INTEGER,
+		 *         -- Time-Stamping users MUST be ready to accommodate integers
+		 *         -- up to 160 bits.
+		 *        genTime                      GeneralizedTime,
+		 *        accuracy                     Accuracy                 OPTIONAL,
+		 *        ordering                     BOOLEAN             DEFAULT FALSE,
+		 *        nonce                        INTEGER                  OPTIONAL,
+		 *          -- MUST be present if the similar field was present
+		 *          -- in TimeStampReq.  In that case it MUST have the same value.
+		 *        tsa                          [0] GeneralName          OPTIONAL,
+		 *        extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
+		 *
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, tsaPolicyId, messageImprint, serialNumber, genTime); + v.AddOptional(accuracy); + + if (ordering != null && ordering.IsTrue) + { + v.Add(ordering); + } + + v.AddOptional(nonce); + v.AddOptionalTagged(true, 0, tsa); + v.AddOptionalTagged(false, 1, extensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs.meta new file mode 100644 index 00000000..257b5134 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c26676e066f194640955a4f6305afe44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TSTInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs new file mode 100644 index 00000000..4d93fd26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs @@ -0,0 +1,147 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp +{ + public class TimeStampReq + : Asn1Encodable + { + private readonly DerInteger version; + private readonly MessageImprint messageImprint; + private readonly DerObjectIdentifier tsaPolicy; + private readonly DerInteger nonce; + private readonly DerBoolean certReq; + private readonly X509Extensions extensions; + + public static TimeStampReq GetInstance(object obj) + { + if (obj is TimeStampReq) + return (TimeStampReq)obj; + if (obj == null) + return null; + return new TimeStampReq(Asn1Sequence.GetInstance(obj)); + } + + private TimeStampReq( + Asn1Sequence seq) + { + int nbObjects = seq.Count; + int seqStart = 0; + + // version + version = DerInteger.GetInstance(seq[seqStart++]); + + // messageImprint + messageImprint = MessageImprint.GetInstance(seq[seqStart++]); + + for (int opt = seqStart; opt < nbObjects; opt++) + { + // tsaPolicy + if (seq[opt] is DerObjectIdentifier) + { + tsaPolicy = DerObjectIdentifier.GetInstance(seq[opt]); + } + // nonce + else if (seq[opt] is DerInteger) + { + nonce = DerInteger.GetInstance(seq[opt]); + } + // certReq + else if (seq[opt] is DerBoolean) + { + certReq = DerBoolean.GetInstance(seq[opt]); + } + // extensions + else if (seq[opt] is Asn1TaggedObject) + { + Asn1TaggedObject tagged = (Asn1TaggedObject) seq[opt]; + if (tagged.TagNo == 0) + { + extensions = X509Extensions.GetInstance(tagged, false); + } + } + } + } + + public TimeStampReq( + MessageImprint messageImprint, + DerObjectIdentifier tsaPolicy, + DerInteger nonce, + DerBoolean certReq, + X509Extensions extensions) + { + // default + this.version = new DerInteger(1); + + this.messageImprint = messageImprint; + this.tsaPolicy = tsaPolicy; + this.nonce = nonce; + this.certReq = certReq; + this.extensions = extensions; + } + + public DerInteger Version + { + get { return version; } + } + + public MessageImprint MessageImprint + { + get { return messageImprint; } + } + + public DerObjectIdentifier ReqPolicy + { + get { return tsaPolicy; } + } + + public DerInteger Nonce + { + get { return nonce; } + } + + public DerBoolean CertReq + { + get { return certReq; } + } + + public X509Extensions Extensions + { + get { return extensions; } + } + + /** + *
+		 * TimeStampReq ::= SEQUENCE  {
+		 *  version                      INTEGER  { v1(1) },
+		 *  messageImprint               MessageImprint,
+		 *    --a hash algorithm OID and the hash value of the data to be
+		 *    --time-stamped
+		 *  reqPolicy             TSAPolicyId              OPTIONAL,
+		 *  nonce                 INTEGER                  OPTIONAL,
+		 *  certReq               BOOLEAN                  DEFAULT FALSE,
+		 *  extensions            [0] IMPLICIT Extensions  OPTIONAL
+		 * }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(version, messageImprint); + v.AddOptional(tsaPolicy, nonce); + + if (certReq != null && certReq.IsTrue) + { + v.Add(certReq); + } + + v.AddOptionalTagged(false, 0, extensions); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs.meta new file mode 100644 index 00000000..ddf97c1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b405c6ff9d4440344986dd831d6ee912 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampReq.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs new file mode 100644 index 00000000..e59c6b7a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp +{ + public class TimeStampResp + : Asn1Encodable + { + private readonly PkiStatusInfo pkiStatusInfo; + private readonly ContentInfo timeStampToken; + + public static TimeStampResp GetInstance(object obj) + { + if (obj is TimeStampResp) + return (TimeStampResp)obj; + if (obj == null) + return null; + return new TimeStampResp(Asn1Sequence.GetInstance(obj)); + } + + private TimeStampResp( + Asn1Sequence seq) + { + this.pkiStatusInfo = PkiStatusInfo.GetInstance(seq[0]); + + if (seq.Count > 1) + { + this.timeStampToken = ContentInfo.GetInstance(seq[1]); + } + } + + public TimeStampResp( + PkiStatusInfo pkiStatusInfo, + ContentInfo timeStampToken) + { + this.pkiStatusInfo = pkiStatusInfo; + this.timeStampToken = timeStampToken; + } + + public PkiStatusInfo Status + { + get { return pkiStatusInfo; } + } + + public ContentInfo TimeStampToken + { + get { return timeStampToken; } + } + + /** + *
+		 * TimeStampResp ::= SEQUENCE  {
+		 *   status                  PkiStatusInfo,
+		 *   timeStampToken          TimeStampToken     OPTIONAL  }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(pkiStatusInfo); + v.AddOptional(timeStampToken); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs.meta new file mode 100644 index 00000000..13f2b049 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 628c4af6da9dda340a36d4b4df1c13f5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/tsp/TimeStampResp.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua.meta new file mode 100644 index 00000000..22961c46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9bac964e8dfc2984b94b952f666de8ea +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs new file mode 100644 index 00000000..d621ff27 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA +{ + /** + * Ukrainian object identifiers + *

+ * {iso(1) member-body(2) Ukraine(804) root(2) security(1) cryptography(1) pki(1)} + *

+ * { ... pki-alg(1) pki-alg-sym(3) Dstu4145WithGost34311(1) PB(1)} + *

+ * DSTU4145 in polynomial basis has 2 oids, one for little-endian representation and one for big-endian + */ + public abstract class UAObjectIdentifiers + { + /** Base OID: 1.2.804.2.1.1.1 */ + public static readonly DerObjectIdentifier UaOid = new DerObjectIdentifier("1.2.804.2.1.1.1"); + + /** DSTU4145 Little Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1 */ + public static readonly DerObjectIdentifier dstu4145le = UaOid.Branch("1.3.1.1"); + /** DSTU4145 Big Endian presentation. OID: 1.2.804.2.1.1.1.1.3.1.1.1 */ + public static readonly DerObjectIdentifier dstu4145be = UaOid.Branch("1.3.1.1.1.1"); + + /** DSTU7564 256-bit digest presentation. */ + public static readonly DerObjectIdentifier dstu7564digest_256 = UaOid.Branch("1.2.2.1"); + /** DSTU7564 384-bit digest presentation. */ + public static readonly DerObjectIdentifier dstu7564digest_384 = UaOid.Branch("1.2.2.2"); + /** DSTU7564 512-bit digest presentation. */ + public static readonly DerObjectIdentifier dstu7564digest_512 = UaOid.Branch("1.2.2.3"); + + /** DSTU7564 256-bit mac presentation. */ + public static readonly DerObjectIdentifier dstu7564mac_256 = UaOid.Branch("1.2.2.4"); + /** DSTU7564 384-bit mac presentation. */ + public static readonly DerObjectIdentifier dstu7564mac_384 = UaOid.Branch("1.2.2.5"); + /** DSTU7564 512-bit mac presentation. */ + public static readonly DerObjectIdentifier dstu7564mac_512 = UaOid.Branch("1.2.2.6"); + + + /** DSTU7624 in ECB mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ecb_128 = UaOid.Branch("1.1.3.1.1"); + /** DSTU7624 in ECB mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ecb_256 = UaOid.Branch("1.1.3.1.2"); + /** DSTU7624 in ECB mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ecb_512 = UaOid.Branch("1.1.3.1.3"); + + /** DSTU7624 in CTR mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ctr_128 = UaOid.Branch("1.1.3.2.1"); + /** DSTU7624 in CTR mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ctr_256 = UaOid.Branch("1.1.3.2.2"); + /** DSTU7624 in CTR mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ctr_512 = UaOid.Branch("1.1.3.2.3"); + + /** DSTU7624 in CFB mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cfb_128 = UaOid.Branch("1.1.3.3.1"); + /** DSTU7624 in CFB mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cfb_256 = UaOid.Branch("1.1.3.3.2"); + /** DSTU7624 in CFB mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cfb_512 = UaOid.Branch("1.1.3.3.3"); + + /** DSTU7624 in MAC mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cmac_128 = UaOid.Branch("1.1.3.4.1"); + /** DSTU7624 in MAC mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cmac_256 = UaOid.Branch("1.1.3.4.2"); + /** DSTU7624 in MAC mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cmac_512 = UaOid.Branch("1.1.3.4.3"); + + /** DSTU7624 in CBC mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cbc_128 = UaOid.Branch("1.1.3.5.1"); + /** DSTU7624 in CBC mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cbc_256 = UaOid.Branch("1.1.3.5.2"); + /** DSTU7624 in CBC mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624cbc_512 = UaOid.Branch("1.1.3.5.3"); + + /** DSTU7624 in OFB mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ofb_128 = UaOid.Branch("1.1.3.6.1"); + /** DSTU7624 in OFB mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ofb_256 = UaOid.Branch("1.1.3.6.2"); + /** DSTU7624 in OFB mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ofb_512 = UaOid.Branch("1.1.3.6.3"); + + /** DSTU7624 in GMAC (GCM witout encryption) mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624gmac_128 = UaOid.Branch("1.1.3.7.1"); + /** DSTU7624 in GMAC (GCM witout encryption) mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624gmac_256 = UaOid.Branch("1.1.3.7.2"); + /** DSTU7624 in GMAC (GCM witout encryption) mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624gmac_512 = UaOid.Branch("1.1.3.7.3"); + + /** DSTU7624 in CCM mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ccm_128 = UaOid.Branch("1.1.3.8.1"); + /** DSTU7624 in CCM mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ccm_256 = UaOid.Branch("1.1.3.8.2"); + /** DSTU7624 in CCM mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624ccm_512 = UaOid.Branch("1.1.3.8.3"); + + /** DSTU7624 in XTS mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624xts_128 = UaOid.Branch("1.1.3.9.1"); + /** DSTU7624 in XTS mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624xts_256 = UaOid.Branch("1.1.3.9.2"); + /** DSTU7624 in XTS mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624xts_512 = UaOid.Branch("1.1.3.9.3"); + + /** DSTU7624 in key wrap (KW) mode with 128 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624kw_128 = UaOid.Branch("1.1.3.10.1"); + /** DSTU7624 in key wrap (KW) mode with 256 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624kw_256 = UaOid.Branch("1.1.3.10.2"); + /** DSTU7624 in key wrap (KW) mode with 512 bit block/key presentation */ + public static readonly DerObjectIdentifier dstu7624kw_512 = UaOid.Branch("1.1.3.10.3"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs.meta new file mode 100644 index 00000000..3f4fece7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0c5835c2e1e3934cb56b17859df57f1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/ua/UAObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util.meta new file mode 100644 index 00000000..808540dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c62b87920929c1a43b2928c37f4ce036 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs new file mode 100644 index 00000000..292fe7bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs @@ -0,0 +1,332 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities +{ + public static class Asn1Dump + { + private const string Tab = " "; + private const int SampleSize = 32; + + /** + * dump a Der object as a formatted string with indentation + * + * @param obj the Asn1Object to be dumped out. + */ + private static void AsString(string indent, bool verbose, Asn1Object obj, StringBuilder buf) + { + if (obj is Asn1Null) + { + buf.Append(indent); + buf.AppendLine("NULL"); + } + else if (obj is Asn1Sequence asn1Sequence) + { + buf.Append(indent); + + if (asn1Sequence is BerSequence) + { + buf.AppendLine("BER Sequence"); + } + else if (!(asn1Sequence is DLSequence)) + { + buf.AppendLine("DER Sequence"); + } + else + { + buf.AppendLine("Sequence"); + } + + string elementsIndent = indent + Tab; + + for (int i = 0, count = asn1Sequence.Count; i < count; ++i) + { + AsString(elementsIndent, verbose, asn1Sequence[i].ToAsn1Object(), buf); + } + } + else if (obj is Asn1Set asn1Set) + { + buf.Append(indent); + + if (asn1Set is BerSet) + { + buf.AppendLine("BER Set"); + } + else if (!(asn1Set is DLSet)) + { + buf.AppendLine("DER Set"); + } + else + { + buf.AppendLine("Set"); + } + + string elementsIndent = indent + Tab; + + for (int i = 0, count = asn1Set.Count; i < count; ++i) + { + AsString(elementsIndent, verbose, asn1Set[i].ToAsn1Object(), buf); + } + } + else if (obj is Asn1TaggedObject taggedObject) + { + buf.Append(indent); + + if (taggedObject is BerTaggedObject) + { + buf.Append("BER Tagged "); + } + else if (!(taggedObject is DLTaggedObject)) + { + buf.Append("DER Tagged "); + } + else + { + buf.Append("Tagged "); + } + + buf.Append(Asn1Utilities.GetTagText(taggedObject)); + + if (!taggedObject.IsExplicit()) + { + buf.Append(" IMPLICIT "); + } + + buf.AppendLine(); + + string baseIndent = indent + Tab; + + AsString(baseIndent, verbose, taggedObject.GetBaseObject().ToAsn1Object(), buf); + } + else if (obj is DerObjectIdentifier oid) + { + buf.Append(indent); + buf.AppendLine("ObjectIdentifier(" + oid.Id + ")"); + } + else if (obj is Asn1RelativeOid relativeOid) + { + buf.Append(indent); + buf.AppendLine("RelativeOID(" + relativeOid.Id + ")"); + } + else if (obj is DerBoolean derBoolean) + { + buf.Append(indent); + buf.AppendLine("Boolean(" + derBoolean.IsTrue + ")"); + } + else if (obj is DerInteger derInteger) + { + buf.Append(indent); + buf.AppendLine("Integer(" + derInteger.Value + ")"); + } + else if (obj is Asn1OctetString oct) + { + byte[] octets = oct.GetOctets(); + + buf.Append(indent); + + if (obj is BerOctetString) + { + buf.AppendLine("BER Octet String[" + octets.Length + "]"); + } + else + { + buf.AppendLine("DER Octet String[" + octets.Length + "]"); + } + + if (verbose) + { + DumpBinaryDataAsString(buf, indent, octets); + } + } + else if (obj is DerBitString bitString) + { + byte[] bytes = bitString.GetBytes(); + int padBits = bitString.PadBits; + + buf.Append(indent); + + if (bitString is BerBitString) + { + buf.AppendLine("BER Bit String[" + bytes.Length + ", " + padBits + "]"); + } + else if (bitString is DLBitString) + { + buf.AppendLine("DL Bit String[" + bytes.Length + ", " + padBits + "]"); + } + else + { + buf.AppendLine("DER Bit String[" + bytes.Length + ", " + padBits + "]"); + } + + if (verbose) + { + DumpBinaryDataAsString(buf, indent, bytes); + } + } + else if (obj is DerIA5String ia5String) + { + buf.Append(indent); + buf.AppendLine("IA5String(" + ia5String.GetString() + ")"); + } + else if (obj is DerUtf8String utf8String) + { + buf.Append(indent); + buf.AppendLine("UTF8String(" + utf8String.GetString() + ")"); + } + else if (obj is DerPrintableString printableString) + { + buf.Append(indent); + buf.AppendLine("PrintableString(" + printableString.GetString() + ")"); + } + else if (obj is DerVisibleString visibleString) + { + buf.Append(indent); + buf.AppendLine("VisibleString(" + visibleString.GetString() + ")"); + } + else if (obj is DerBmpString bmpString) + { + buf.Append(indent); + buf.AppendLine("BMPString(" + bmpString.GetString() + ")"); + } + else if (obj is DerT61String t61String) + { + buf.Append(indent); + buf.AppendLine("T61String(" + t61String.GetString() + ")"); + } + else if (obj is DerGraphicString graphicString) + { + buf.Append(indent); + buf.AppendLine("GraphicString(" + graphicString.GetString() + ")"); + } + else if (obj is DerVideotexString videotexString) + { + buf.Append(indent); + buf.AppendLine("VideotexString(" + videotexString.GetString() + ")"); + } + else if (obj is Asn1UtcTime utcTime) + { + buf.Append(indent); + buf.AppendLine("UTCTime(" + utcTime.TimeString + ")"); + } + else if (obj is Asn1GeneralizedTime generalizedTime) + { + buf.Append(indent); + buf.AppendLine("GeneralizedTime(" + generalizedTime.TimeString + ")"); + } + else if (obj is DerEnumerated en) + { + buf.Append(indent); + buf.AppendLine("DER Enumerated(" + en.Value + ")"); + } + else if (obj is DerExternal ext) + { + buf.Append(indent); + buf.AppendLine("External "); + string tab = indent + Tab; + + if (ext.DirectReference != null) + { + buf.Append(tab); + buf.AppendLine("Direct Reference: " + ext.DirectReference.Id); + } + if (ext.IndirectReference != null) + { + buf.Append(tab); + buf.AppendLine("Indirect Reference: " + ext.IndirectReference.ToString()); + } + if (ext.DataValueDescriptor != null) + { + AsString(tab, verbose, ext.DataValueDescriptor, buf); + } + buf.Append(tab); + buf.AppendLine("Encoding: " + ext.Encoding); + AsString(tab, verbose, ext.ExternalContent, buf); + } + else + { + buf.Append(indent); + buf.Append(obj); + buf.AppendLine(); + } + } + + ///

Parse ASN.1 objects from input , and write them to the output. + public static void Dump(Stream input, TextWriter output) + { + Asn1InputStream asn1InputStream = new Asn1InputStream(input); + Asn1Object asn1Object; + while ((asn1Object = asn1InputStream.ReadObject()) != null) + { + output.Write(DumpAsString(asn1Object)); + } + } + + /** + * dump out a DER object as a formatted string, in non-verbose mode + * + * @param obj the Asn1Encodable to be dumped out. + * @return the resulting string. + */ + public static string DumpAsString(Asn1Encodable obj) + { + return DumpAsString(obj, false); + } + + /** + * Dump out the object as a string + * + * @param obj the Asn1Encodable to be dumped out. + * @param verbose if true, dump out the contents of octet and bit strings. + * @return the resulting string. + */ + public static string DumpAsString(Asn1Encodable obj, bool verbose) + { + StringBuilder buf = new StringBuilder(); + AsString("", verbose, obj.ToAsn1Object(), buf); + return buf.ToString(); + } + + private static void DumpBinaryDataAsString(StringBuilder buf, string indent, byte[] bytes) + { + if (bytes.Length < 1) + return; + + indent += Tab; + + for (int i = 0; i < bytes.Length; i += SampleSize) + { + int remaining = bytes.Length - i; + int chunk = System.Math.Min(remaining, SampleSize); + + buf.Append(indent); + buf.Append(Hex.ToHexString(bytes, i, chunk)); + for (int j = chunk; j < SampleSize; ++j) + { + buf.Append(" "); + } + buf.Append(Tab); + AppendAscString(buf, bytes, i, chunk); + buf.AppendLine(); + } + } + + private static void AppendAscString(StringBuilder buf, byte[] bytes, int off, int len) + { + for (int i = off; i != off + len; i++) + { + char c = (char)bytes[i]; + if (c >= ' ' && c <= '~') + { + buf.Append(c); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs.meta new file mode 100644 index 00000000..3ad63e91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b6295c1d96b6f4e429c48163b62660e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/Asn1Dump.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs.meta new file mode 100644 index 00000000..04395b34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9e6c11a66c2cb2f4db32dc7bd287591c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/util/FilterStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500.meta new file mode 100644 index 00000000..d09071c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: baced376d4dd5b74cbbb6a71f406bb34 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs new file mode 100644 index 00000000..d2f3515c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500 +{ + /** + * Holding class for the AttributeTypeAndValue structures that make up an RDN. + */ + public class AttributeTypeAndValue + : Asn1Encodable + { + private readonly DerObjectIdentifier type; + private readonly Asn1Encodable value; + + private AttributeTypeAndValue(Asn1Sequence seq) + { + type = (DerObjectIdentifier)seq[0]; + value = seq[1]; + } + + public static AttributeTypeAndValue GetInstance(object obj) + { + if (obj is AttributeTypeAndValue) + return (AttributeTypeAndValue)obj; + if (null != obj) + return new AttributeTypeAndValue(Asn1Sequence.GetInstance(obj)); + throw new ArgumentNullException("obj"); + } + + public AttributeTypeAndValue( + DerObjectIdentifier type, + Asn1Encodable value) + { + this.type = type; + this.value = value; + } + + public virtual DerObjectIdentifier Type + { + get { return type; } + } + + public virtual Asn1Encodable Value + { + get { return value; } + } + + /** + *
+         * AttributeTypeAndValue ::= SEQUENCE {
+         *           type         OBJECT IDENTIFIER,
+         *           value        ANY DEFINED BY type }
+         * 
+ * @return a basic ASN.1 object representation. + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(type, value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs.meta new file mode 100644 index 00000000..51f07de3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec72e2419cbf80c4a8b3b767174970e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/AttributeTypeAndValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs new file mode 100644 index 00000000..18504385 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500 +{ + public class DirectoryString + : Asn1Encodable, IAsn1Choice, IAsn1String + { + private readonly DerStringBase str; + + public static DirectoryString GetInstance(object obj) + { + if (obj == null || obj is DirectoryString) + return (DirectoryString) obj; + + if (obj is DerStringBase) + { + if (obj is DerT61String + || obj is DerPrintableString + || obj is DerUniversalString + || obj is DerUtf8String + || obj is DerBmpString) + { + return new DirectoryString((DerStringBase) obj); + } + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static DirectoryString GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + if (!isExplicit) + throw new ArgumentException("choice item must be explicitly tagged"); + + return GetInstance(obj.GetObject()); + } + + private DirectoryString( + DerStringBase str) + { + this.str = str; + } + + public DirectoryString( + string str) + { + this.str = new DerUtf8String(str); + } + + public string GetString() + { + return str.GetString(); + } + + /** + *
+		 *  DirectoryString ::= CHOICE {
+		 *    teletexString               TeletexString (SIZE (1..MAX)),
+		 *    printableString             PrintableString (SIZE (1..MAX)),
+		 *    universalString             UniversalString (SIZE (1..MAX)),
+		 *    utf8String                  UTF8String (SIZE (1..MAX)),
+		 *    bmpString                   BMPString (SIZE (1..MAX))  }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + return str.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs.meta new file mode 100644 index 00000000..1982e8fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 712a6b0b73b040d45af691d2b5994481 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/DirectoryString.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs new file mode 100644 index 00000000..b09b41e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500 +{ + /** + * Holding class for a single Relative Distinguished Name (RDN). + */ + public class Rdn + : Asn1Encodable + { + private readonly Asn1Set values; + + private Rdn(Asn1Set values) + { + this.values = values; + } + + public static Rdn GetInstance(object obj) + { + if (obj is Rdn) + return (Rdn)obj; + if (null != obj) + return new Rdn(Asn1Set.GetInstance(obj)); + return null; + } + + /** + * Create a single valued RDN. + * + * @param oid RDN type. + * @param value RDN value. + */ + public Rdn(DerObjectIdentifier oid, Asn1Encodable value) + { + this.values = new DerSet(new DerSequence(oid, value)); + } + + public Rdn(AttributeTypeAndValue attrTAndV) + { + this.values = new DerSet(attrTAndV); + } + + /** + * Create a multi-valued RDN. + * + * @param aAndVs attribute type/value pairs making up the RDN + */ + public Rdn(AttributeTypeAndValue[] aAndVs) + { + this.values = new DerSet(aAndVs); + } + + public virtual bool IsMultiValued + { + get { return this.values.Count > 1; } + } + + /** + * Return the number of AttributeTypeAndValue objects in this RDN, + * + * @return size of RDN, greater than 1 if multi-valued. + */ + public virtual int Count + { + get { return this.values.Count; } + } + + public virtual AttributeTypeAndValue GetFirst() + { + if (this.values.Count == 0) + return null; + + return AttributeTypeAndValue.GetInstance(this.values[0]); + } + + public virtual AttributeTypeAndValue[] GetTypesAndValues() + { + AttributeTypeAndValue[] tmp = new AttributeTypeAndValue[values.Count]; + + for (int i = 0; i < tmp.Length; ++i) + { + tmp[i] = AttributeTypeAndValue.GetInstance(values[i]); + } + + return tmp; + } + + /** + *
+         * RelativeDistinguishedName ::=
+         *                     SET OF AttributeTypeAndValue
+
+         * AttributeTypeAndValue ::= SEQUENCE {
+         *        type     AttributeType,
+         *        value    AttributeValue }
+         * 
+ * @return this object as its ASN1Primitive type + */ + public override Asn1Object ToAsn1Object() + { + return values; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs.meta new file mode 100644 index 00000000..9b8b57e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ffeede4586076d543a4ea41223b97e68 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/Rdn.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style.meta new file mode 100644 index 00000000..cac818fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d72e089432704404a86a3b3ce80102c7 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs new file mode 100644 index 00000000..b42a3a49 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs @@ -0,0 +1,217 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Style +{ + public abstract class IetfUtilities + { + public static string ValueToString(Asn1Encodable value) + { + StringBuilder vBuf = new StringBuilder(); + + if (value is IAsn1String && !(value is DerUniversalString)) + { + string v = ((IAsn1String)value).GetString(); + if (v.Length > 0 && v[0] == '#') + { + vBuf.Append('\\'); + } + + vBuf.Append(v); + } + else + { + try + { + vBuf.Append('#'); + vBuf.Append(Hex.ToHexString(value.ToAsn1Object().GetEncoded(Asn1Encodable.Der))); + } + catch (IOException e) + { + throw new ArgumentException("Other value has no encoded form", e); + } + } + + int end = vBuf.Length; + int index = 0; + + if (vBuf.Length >= 2 && vBuf[0] == '\\' && vBuf[1] == '#') + { + index += 2; + } + + while (index != end) + { + switch (vBuf[index]) + { + case ',': + case '"': + case '\\': + case '+': + case '=': + case '<': + case '>': + case ';': + { + vBuf.Insert(index, "\\"); + index += 2; + ++end; + break; + } + default: + { + ++index; + break; + } + } + } + + int start = 0; + if (vBuf.Length > 0) + { + while (vBuf.Length > start && vBuf[start] == ' ') + { + vBuf.Insert(start, "\\"); + start += 2; + } + } + + int endBuf = vBuf.Length - 1; + + while (endBuf >= 0 && vBuf[endBuf] == ' ') + { + vBuf.Insert(endBuf, "\\"); + endBuf--; + } + + return vBuf.ToString(); + } + + public static string Canonicalize(string s) + { + string value = s.ToLowerInvariant(); + + if (value.Length > 0 && value[0] == '#') + { + Asn1Object obj = DecodeObject(value); + + if (obj is IAsn1String str) + { + value = str.GetString().ToLowerInvariant(); + } + } + + if (value.Length > 1) + { + int start = 0; + while (start + 1 < value.Length && value[start] == '\\' && value[start + 1] == ' ') + { + start += 2; + } + + int end = value.Length - 1; + while (end - 1 > 0 && value[end - 1] == '\\' && value[end] == ' ') + { + end -= 2; + } + + if (start > 0 || end < value.Length - 1) + { + value = value.Substring(start, end + 1 - start); + } + } + + return StripInternalSpaces(value); + } + + public static string CanonicalString(Asn1Encodable value) + { + return Canonicalize(ValueToString(value)); + } + + private static Asn1Object DecodeObject(string oValue) + { + try + { + return Asn1Object.FromByteArray(Hex.DecodeStrict(oValue, 1, oValue.Length - 1)); + } + catch (IOException e) + { + throw new InvalidOperationException("unknown encoding in name: " + e); + } + } + + public static string StripInternalSpaces(string str) + { + if (str.IndexOf(" ") < 0) + return str; + + StringBuilder res = new StringBuilder(); + + char c1 = str[0]; + res.Append(c1); + + for (int k = 1; k < str.Length; k++) + { + char c2 = str[k]; + if (!(' ' == c1 && ' ' == c2)) + { + res.Append(c2); + c1 = c2; + } + } + + return res.ToString(); + } + + public static bool RdnAreEqual(Rdn rdn1, Rdn rdn2) + { + if (rdn1.Count != rdn2.Count) + return false; + + AttributeTypeAndValue[] atvs1 = rdn1.GetTypesAndValues(); + AttributeTypeAndValue[] atvs2 = rdn2.GetTypesAndValues(); + + if (atvs1.Length != atvs2.Length) + return false; + + for (int i = 0; i != atvs1.Length; i++) + { + if (!AtvAreEqual(atvs1[i], atvs2[i])) + return false; + } + + return true; + } + + private static bool AtvAreEqual(AttributeTypeAndValue atv1, AttributeTypeAndValue atv2) + { + if (atv1 == atv2) + return true; + if (null == atv1 || null == atv2) + return false; + + DerObjectIdentifier o1 = atv1.Type; + DerObjectIdentifier o2 = atv2.Type; + + if (!o1.Equals(o2)) + return false; + + string v1 = CanonicalString(atv1.Value); + string v2 = CanonicalString(atv2.Value); + + if (!v1.Equals(v2)) + return false; + + return true; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs.meta new file mode 100644 index 00000000..10e59a5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7f254832f89711c4db98be84d9496672 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x500/style/IetfUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509.meta new file mode 100644 index 00000000..85f0b51b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 306c046cdd23316419e25d4556b48737 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs new file mode 100644 index 00000000..91bddafb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The AccessDescription object. + *
+	 * AccessDescription  ::=  SEQUENCE {
+	 *       accessMethod          OBJECT IDENTIFIER,
+	 *       accessLocation        GeneralName  }
+	 * 
+ */ + public class AccessDescription + : Asn1Encodable + { + public readonly static DerObjectIdentifier IdADCAIssuers = new DerObjectIdentifier("1.3.6.1.5.5.7.48.2"); + public readonly static DerObjectIdentifier IdADOcsp = new DerObjectIdentifier("1.3.6.1.5.5.7.48.1"); + + private readonly DerObjectIdentifier accessMethod; + private readonly GeneralName accessLocation; + + public static AccessDescription GetInstance( + object obj) + { + if (obj is AccessDescription) + return (AccessDescription) obj; + + if (obj is Asn1Sequence) + return new AccessDescription((Asn1Sequence) obj); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private AccessDescription( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("wrong number of elements in sequence"); + + accessMethod = DerObjectIdentifier.GetInstance(seq[0]); + accessLocation = GeneralName.GetInstance(seq[1]); + } + + /** + * create an AccessDescription with the oid and location provided. + */ + public AccessDescription( + DerObjectIdentifier oid, + GeneralName location) + { + accessMethod = oid; + accessLocation = location; + } + + /** + * + * @return the access method. + */ + public DerObjectIdentifier AccessMethod + { + get { return accessMethod; } + } + + /** + * + * @return the access location + */ + public GeneralName AccessLocation + { + get { return accessLocation; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(accessMethod, accessLocation); + } + + public override string ToString() + { + return "AccessDescription: Oid(" + this.accessMethod.Id + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs.meta new file mode 100644 index 00000000..fb6257fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6fc6b1bce31c4b74183cccf0528a1e92 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AccessDescription.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs new file mode 100644 index 00000000..b56016ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AlgorithmIdentifier + : Asn1Encodable + { + private readonly DerObjectIdentifier algorithm; + private readonly Asn1Encodable parameters; + + public static AlgorithmIdentifier GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static AlgorithmIdentifier GetInstance( + object obj) + { + if (obj == null) + return null; + if (obj is AlgorithmIdentifier) + return (AlgorithmIdentifier)obj; + return new AlgorithmIdentifier(Asn1Sequence.GetInstance(obj)); + } + + public AlgorithmIdentifier( + DerObjectIdentifier algorithm) + { + this.algorithm = algorithm; + } + + public AlgorithmIdentifier( + DerObjectIdentifier algorithm, + Asn1Encodable parameters) + { + this.algorithm = algorithm; + this.parameters = parameters; + } + + internal AlgorithmIdentifier( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + this.algorithm = DerObjectIdentifier.GetInstance(seq[0]); + this.parameters = seq.Count < 2 ? null : seq[1]; + } + + /// + /// Return the OID in the Algorithm entry of this identifier. + /// + public virtual DerObjectIdentifier Algorithm + { + get { return algorithm; } + } + + /// + /// Return the parameters structure in the Parameters entry of this identifier. + /// + public virtual Asn1Encodable Parameters + { + get { return parameters; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *      AlgorithmIdentifier ::= Sequence {
+         *                            algorithm OBJECT IDENTIFIER,
+         *                            parameters ANY DEFINED BY algorithm OPTIONAL }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(algorithm); + v.AddOptional(parameters); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs.meta new file mode 100644 index 00000000..595bd953 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74d1f42dee5b53647bd71386bdbc95b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AlgorithmIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs new file mode 100644 index 00000000..2b4c1b8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttCertIssuer + : Asn1Encodable, IAsn1Choice + { + internal readonly Asn1Encodable obj; + internal readonly Asn1Object choiceObj; + + public static AttCertIssuer GetInstance( + object obj) + { + if (obj is AttCertIssuer) + { + return (AttCertIssuer)obj; + } + else if (obj is V2Form) + { + return new AttCertIssuer(V2Form.GetInstance(obj)); + } + else if (obj is GeneralNames) + { + return new AttCertIssuer((GeneralNames)obj); + } + else if (obj is Asn1TaggedObject) + { + return new AttCertIssuer(V2Form.GetInstance((Asn1TaggedObject)obj, false)); + } + else if (obj is Asn1Sequence) + { + return new AttCertIssuer(GeneralNames.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static AttCertIssuer GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(obj.GetObject()); // must be explictly tagged + } + + /// + /// Don't use this one if you are trying to be RFC 3281 compliant. + /// Use it for v1 attribute certificates only. + /// + /// Our GeneralNames structure + public AttCertIssuer( + GeneralNames names) + { + obj = names; + choiceObj = obj.ToAsn1Object(); + } + + public AttCertIssuer( + V2Form v2Form) + { + obj = v2Form; + choiceObj = new DerTaggedObject(false, 0, obj); + } + + public Asn1Encodable Issuer + { + get { return obj; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  AttCertIssuer ::= CHOICE {
+         *       v1Form   GeneralNames,  -- MUST NOT be used in this
+         *                               -- profile
+         *       v2Form   [0] V2Form     -- v2 only
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return choiceObj; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs.meta new file mode 100644 index 00000000..3cb448e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 24c98319223cbc0488b4a6521e795dc6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertIssuer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs new file mode 100644 index 00000000..887e8957 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs @@ -0,0 +1,82 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttCertValidityPeriod + : Asn1Encodable + { + private readonly Asn1GeneralizedTime notBeforeTime; + private readonly Asn1GeneralizedTime notAfterTime; + + public static AttCertValidityPeriod GetInstance( + object obj) + { + if (obj is AttCertValidityPeriod || obj == null) + { + return (AttCertValidityPeriod) obj; + } + + if (obj is Asn1Sequence) + { + return new AttCertValidityPeriod((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static AttCertValidityPeriod GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + private AttCertValidityPeriod( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + notBeforeTime = Asn1GeneralizedTime.GetInstance(seq[0]); + notAfterTime = Asn1GeneralizedTime.GetInstance(seq[1]); + } + + public AttCertValidityPeriod( + Asn1GeneralizedTime notBeforeTime, + Asn1GeneralizedTime notAfterTime) + { + this.notBeforeTime = notBeforeTime; + this.notAfterTime = notAfterTime; + } + + public Asn1GeneralizedTime NotBeforeTime + { + get { return notBeforeTime; } + } + + public Asn1GeneralizedTime NotAfterTime + { + get { return notAfterTime; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  AttCertValidityPeriod  ::= Sequence {
+         *       notBeforeTime  GeneralizedTime,
+         *       notAfterTime   GeneralizedTime
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(notBeforeTime, notAfterTime); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs.meta new file mode 100644 index 00000000..b1d316b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5321f2cb782e44043b4fa49060cbae5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttCertValidityPeriod.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs new file mode 100644 index 00000000..b9fa88de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttributeX509 + : Asn1Encodable + { + private readonly DerObjectIdentifier attrType; + private readonly Asn1Set attrValues; + + /** + * return an Attr object from the given object. + * + * @param o the object we want converted. + * @exception ArgumentException if the object cannot be converted. + */ + public static AttributeX509 GetInstance( + object obj) + { + if (obj == null || obj is AttributeX509) + { + return (AttributeX509) obj; + } + + if (obj is Asn1Sequence) + { + return new AttributeX509((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private AttributeX509( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + attrType = DerObjectIdentifier.GetInstance(seq[0]); + attrValues = Asn1Set.GetInstance(seq[1]); + } + + public AttributeX509( + DerObjectIdentifier attrType, + Asn1Set attrValues) + { + this.attrType = attrType; + this.attrValues = attrValues; + } + + public DerObjectIdentifier AttrType + { + get { return attrType; } + } + + public Asn1Encodable[] GetAttributeValues() + { + return attrValues.ToArray(); + } + + public Asn1Set AttrValues + { + get { return attrValues; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Attr ::= Sequence {
+         *     attrType OBJECT IDENTIFIER,
+         *     attrValues Set OF AttributeValue
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(attrType, attrValues); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs.meta new file mode 100644 index 00000000..703355b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1e4913ceea3f4294b888f419274a1a78 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Attribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs new file mode 100644 index 00000000..07bb214c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttributeCertificate + : Asn1Encodable + { + private readonly AttributeCertificateInfo acinfo; + private readonly AlgorithmIdentifier signatureAlgorithm; + private readonly DerBitString signatureValue; + + /** + * @param obj + * @return + */ + public static AttributeCertificate GetInstance( + object obj) + { + if (obj is AttributeCertificate) + return (AttributeCertificate) obj; + + if (obj != null) + return new AttributeCertificate(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public AttributeCertificate( + AttributeCertificateInfo acinfo, + AlgorithmIdentifier signatureAlgorithm, + DerBitString signatureValue) + { + this.acinfo = acinfo; + this.signatureAlgorithm = signatureAlgorithm; + this.signatureValue = signatureValue; + } + + private AttributeCertificate( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + this.acinfo = AttributeCertificateInfo.GetInstance(seq[0]); + this.signatureAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + this.signatureValue = DerBitString.GetInstance(seq[2]); + } + + public AttributeCertificateInfo ACInfo + { + get { return acinfo; } + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return signatureAlgorithm; } + } + + public DerBitString SignatureValue + { + get { return signatureValue; } + } + + public byte[] GetSignatureOctets() + { + return signatureValue.GetOctets(); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  AttributeCertificate ::= Sequence {
+         *       acinfo               AttributeCertificateInfo,
+         *       signatureAlgorithm   AlgorithmIdentifier,
+         *       signatureValue       BIT STRING
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(acinfo, signatureAlgorithm, signatureValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs.meta new file mode 100644 index 00000000..faff559d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a575c445db2d2146bb19447baf9a5bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs new file mode 100644 index 00000000..1d8f922f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttributeCertificateInfo + : Asn1Encodable + { + internal readonly DerInteger version; + internal readonly Holder holder; + internal readonly AttCertIssuer issuer; + internal readonly AlgorithmIdentifier signature; + internal readonly DerInteger serialNumber; + internal readonly AttCertValidityPeriod attrCertValidityPeriod; + internal readonly Asn1Sequence attributes; + internal readonly DerBitString issuerUniqueID; + internal readonly X509Extensions extensions; + + public static AttributeCertificateInfo GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static AttributeCertificateInfo GetInstance( + object obj) + { + if (obj is AttributeCertificateInfo) + { + return (AttributeCertificateInfo) obj; + } + + if (obj is Asn1Sequence) + { + return new AttributeCertificateInfo((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private AttributeCertificateInfo( + Asn1Sequence seq) + { + if (seq.Count < 6 || seq.Count > 9) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + int start; + if (seq[0] is DerInteger) // in version 1 certs version is DEFAULT v1(0) + { + this.version = DerInteger.GetInstance(seq[0]); + start = 1; + } + else + { + this.version = new DerInteger(0); + start = 0; + } + + this.holder = Holder.GetInstance(seq[start]); + this.issuer = AttCertIssuer.GetInstance(seq[start + 1]); + this.signature = AlgorithmIdentifier.GetInstance(seq[start + 2]); + this.serialNumber = DerInteger.GetInstance(seq[start + 3]); + this.attrCertValidityPeriod = AttCertValidityPeriod.GetInstance(seq[start + 4]); + this.attributes = Asn1Sequence.GetInstance(seq[start + 5]); + + for (int i = start + 6; i < seq.Count; i++) + { + Asn1Encodable obj = (Asn1Encodable) seq[i]; + + if (obj is DerBitString) + { + this.issuerUniqueID = DerBitString.GetInstance(seq[i]); + } + else if (obj is Asn1Sequence || obj is X509Extensions) + { + this.extensions = X509Extensions.GetInstance(seq[i]); + } + } + } + + public DerInteger Version + { + get { return version; } + } + + public Holder Holder + { + get { return holder; } + } + + public AttCertIssuer Issuer + { + get { return issuer; } + } + + public AlgorithmIdentifier Signature + { + get { return signature; } + } + + public DerInteger SerialNumber + { + get { return serialNumber; } + } + + public AttCertValidityPeriod AttrCertValidityPeriod + { + get { return attrCertValidityPeriod; } + } + + public Asn1Sequence Attributes + { + get { return attributes; } + } + + public DerBitString IssuerUniqueID + { + get { return issuerUniqueID; } + } + + public X509Extensions Extensions + { + get { return extensions; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  AttributeCertificateInfo ::= Sequence {
+         *       version              AttCertVersion -- version is v2,
+         *       holder               Holder,
+         *       issuer               AttCertIssuer,
+         *       signature            AlgorithmIdentifier,
+         *       serialNumber         CertificateSerialNumber,
+         *       attrCertValidityPeriod   AttCertValidityPeriod,
+         *       attributes           Sequence OF Attr,
+         *       issuerUniqueID       UniqueIdentifier OPTIONAL,
+         *       extensions           Extensions OPTIONAL
+         *  }
+         *
+         *  AttCertVersion ::= Integer { v2(1) }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(9); + + if (!version.HasValue(0)) + { + v.Add(version); + } + + v.Add(holder, issuer, signature, serialNumber, attrCertValidityPeriod, attributes); + v.AddOptional(issuerUniqueID, extensions); + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs.meta new file mode 100644 index 00000000..34e24776 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d9ead0124c35704286b318f293a6640 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeCertificateInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs new file mode 100644 index 00000000..e6124d99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class AttributeTable + { + private readonly IDictionary m_attributes; + + public AttributeTable(IDictionary attrs) + { + m_attributes = new Dictionary(attrs); + } + + public AttributeTable(Asn1EncodableVector v) + { + m_attributes = new Dictionary(v.Count); + + for (int i = 0; i != v.Count; i++) + { + AttributeX509 a = AttributeX509.GetInstance(v[i]); + + m_attributes.Add(a.AttrType, a); + } + } + + public AttributeTable(Asn1Set s) + { + m_attributes = new Dictionary(s.Count); + + for (int i = 0; i != s.Count; i++) + { + AttributeX509 a = AttributeX509.GetInstance(s[i]); + + m_attributes.Add(a.AttrType, a); + } + } + + public AttributeX509 Get(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(m_attributes, oid); + } + + public IDictionary ToDictionary() + { + return new Dictionary(m_attributes); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs.meta new file mode 100644 index 00000000..581d892d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 862496a230ee1e644baeda9d3c583189 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AttributeTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs new file mode 100644 index 00000000..40e603bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs @@ -0,0 +1,111 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The AuthorityInformationAccess object. + *
+     * id-pe-authorityInfoAccess OBJECT IDENTIFIER ::= { id-pe 1 }
+     *
+     * AuthorityInfoAccessSyntax  ::=
+     *      Sequence SIZE (1..MAX) OF AccessDescription
+     * AccessDescription  ::=  Sequence {
+     *       accessMethod          OBJECT IDENTIFIER,
+     *       accessLocation        GeneralName  }
+     *
+     * id-ad OBJECT IDENTIFIER ::= { id-pkix 48 }
+     * id-ad-caIssuers OBJECT IDENTIFIER ::= { id-ad 2 }
+     * id-ad-ocsp OBJECT IDENTIFIER ::= { id-ad 1 }
+     * 
+ */ + public class AuthorityInformationAccess + : Asn1Encodable + { + private static AccessDescription[] Copy(AccessDescription[] descriptions) + { + return (AccessDescription[])descriptions.Clone(); + } + + public static AuthorityInformationAccess GetInstance(object obj) + { + if (obj is AuthorityInformationAccess) + return (AuthorityInformationAccess)obj; + if (obj == null) + return null; + return new AuthorityInformationAccess(Asn1Sequence.GetInstance(obj)); + } + + public static AuthorityInformationAccess FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.AuthorityInfoAccess)); + } + + private readonly AccessDescription[] descriptions; + + private AuthorityInformationAccess( + Asn1Sequence seq) + { + if (seq.Count < 1) + throw new ArgumentException("sequence may not be empty"); + + this.descriptions = new AccessDescription[seq.Count]; + + for (int i = 0; i < seq.Count; ++i) + { + descriptions[i] = AccessDescription.GetInstance(seq[i]); + } + } + + public AuthorityInformationAccess( + AccessDescription description) + { + this.descriptions = new AccessDescription[]{ description }; + } + + public AuthorityInformationAccess( + AccessDescription[] descriptions) + { + this.descriptions = Copy(descriptions); + } + + /** + * create an AuthorityInformationAccess with the oid and location provided. + */ + public AuthorityInformationAccess(DerObjectIdentifier oid, GeneralName location) + : this(new AccessDescription(oid, location)) + { + } + + public AccessDescription[] GetAccessDescriptions() + { + return Copy(descriptions); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(descriptions); + } + + public override string ToString() + { + //return "AuthorityInformationAccess: Oid(" + this.descriptions[0].AccessMethod.Id + ")"; + + StringBuilder buf = new StringBuilder(); + buf.AppendLine("AuthorityInformationAccess:"); + foreach (AccessDescription description in descriptions) + { + buf.Append(" ") + .Append(description) + .AppendLine(); + } + return buf.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs.meta new file mode 100644 index 00000000..293d0652 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f412afbd6f3fa64a904932848e473da +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityInformationAccess.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs new file mode 100644 index 00000000..00b0ddc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The AuthorityKeyIdentifier object. + *
+     * id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 35 }
+     *
+     *   AuthorityKeyIdentifier ::= Sequence {
+     *      keyIdentifier             [0] IMPLICIT KeyIdentifier           OPTIONAL,
+     *      authorityCertIssuer       [1] IMPLICIT GeneralNames            OPTIONAL,
+     *      authorityCertSerialNumber [2] IMPLICIT CertificateSerialNumber OPTIONAL  }
+     *
+     *   KeyIdentifier ::= OCTET STRING
+     * 
+ * + */ + public class AuthorityKeyIdentifier + : Asn1Encodable + { + public static AuthorityKeyIdentifier GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static AuthorityKeyIdentifier GetInstance(object obj) + { + if (obj is AuthorityKeyIdentifier) + return (AuthorityKeyIdentifier)obj; + if (obj is X509Extension) + return GetInstance(X509Extension.ConvertValueToObject((X509Extension)obj)); + if (obj == null) + return null; + return new AuthorityKeyIdentifier(Asn1Sequence.GetInstance(obj)); + } + + public static AuthorityKeyIdentifier FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.AuthorityKeyIdentifier)); + } + + private readonly Asn1OctetString keyidentifier; + private readonly GeneralNames certissuer; + private readonly DerInteger certserno; + + protected internal AuthorityKeyIdentifier( + Asn1Sequence seq) + { + foreach (Asn1Encodable element in seq) + { + Asn1TaggedObject obj = Asn1TaggedObject.GetInstance(element); + + switch (obj.TagNo) + { + case 0: + this.keyidentifier = Asn1OctetString.GetInstance(obj, false); + break; + case 1: + this.certissuer = GeneralNames.GetInstance(obj, false); + break; + case 2: + this.certserno = DerInteger.GetInstance(obj, false); + break; + default: + throw new ArgumentException("illegal tag"); + } + } + } + + /** + * + * Calulates the keyidentifier using a SHA1 hash over the BIT STRING + * from SubjectPublicKeyInfo as defined in RFC2459. + * + * Example of making a AuthorityKeyIdentifier: + *
+	     *   SubjectPublicKeyInfo apki = new SubjectPublicKeyInfo((ASN1Sequence)new ASN1InputStream(
+		 *       publicKey.getEncoded()).readObject());
+         *   AuthorityKeyIdentifier aki = new AuthorityKeyIdentifier(apki);
+         * 
+ * + **/ + public AuthorityKeyIdentifier( + SubjectPublicKeyInfo spki) + : this(spki, null, null) + { + } + + /** + * create an AuthorityKeyIdentifier with the GeneralNames tag and + * the serial number provided as well. + */ + public AuthorityKeyIdentifier( + SubjectPublicKeyInfo spki, + GeneralNames name, + BigInteger serialNumber) + { + IDigest digest = new Sha1Digest(); + byte[] resBuf = new byte[digest.GetDigestSize()]; + byte[] bytes = spki.PublicKeyData.GetBytes(); + digest.BlockUpdate(bytes, 0, bytes.Length); + digest.DoFinal(resBuf, 0); + + this.keyidentifier = new DerOctetString(resBuf); + this.certissuer = name; + this.certserno = serialNumber == null ? null : new DerInteger(serialNumber); + } + + /** + * create an AuthorityKeyIdentifier with the GeneralNames tag and + * the serial number provided. + */ + public AuthorityKeyIdentifier( + GeneralNames name, + BigInteger serialNumber) + : this((byte[])null, name, serialNumber) + { + } + + /** + * create an AuthorityKeyIdentifier with a precomputed key identifier + */ + public AuthorityKeyIdentifier( + byte[] keyIdentifier) + : this(keyIdentifier, null, null) + { + } + + /** + * create an AuthorityKeyIdentifier with a precomupted key identifier + * and the GeneralNames tag and the serial number provided as well. + */ + public AuthorityKeyIdentifier( + byte[] keyIdentifier, + GeneralNames name, + BigInteger serialNumber) + { + this.keyidentifier = keyIdentifier == null ? null : new DerOctetString(keyIdentifier); + this.certissuer = name; + this.certserno = serialNumber == null ? null : new DerInteger(serialNumber); + } + + public byte[] GetKeyIdentifier() + { + return keyidentifier == null ? null : keyidentifier.GetOctets(); + } + + public GeneralNames AuthorityCertIssuer + { + get { return certissuer; } + } + + public BigInteger AuthorityCertSerialNumber + { + get { return certserno == null ? null : certserno.Value; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, keyidentifier); + v.AddOptionalTagged(false, 1, certissuer); + v.AddOptionalTagged(false, 2, certserno); + return new DerSequence(v); + } + + public override string ToString() + { + string keyID = (keyidentifier != null) ? Hex.ToHexString(keyidentifier.GetOctets()) : "null"; + + return "AuthorityKeyIdentifier: KeyID(" + keyID + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs.meta new file mode 100644 index 00000000..83c902cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7af7f9bc1136f524b82aab10b4d1a5af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/AuthorityKeyIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs new file mode 100644 index 00000000..9c27deff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class BasicConstraints + : Asn1Encodable + { + public static BasicConstraints GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static BasicConstraints GetInstance(object obj) + { + if (obj is BasicConstraints) + return (BasicConstraints)obj; + if (obj is X509Extension) + return GetInstance(X509Extension.ConvertValueToObject((X509Extension)obj)); + if (obj == null) + return null; + return new BasicConstraints(Asn1Sequence.GetInstance(obj)); + } + + public static BasicConstraints FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.BasicConstraints)); + } + + private readonly DerBoolean cA; + private readonly DerInteger pathLenConstraint; + + private BasicConstraints( + Asn1Sequence seq) + { + if (seq.Count > 0) + { + if (seq[0] is DerBoolean) + { + this.cA = DerBoolean.GetInstance(seq[0]); + } + else + { + this.pathLenConstraint = DerInteger.GetInstance(seq[0]); + } + + if (seq.Count > 1) + { + if (this.cA == null) + throw new ArgumentException("wrong sequence in constructor", "seq"); + + this.pathLenConstraint = DerInteger.GetInstance(seq[1]); + } + } + } + + public BasicConstraints( + bool cA) + { + if (cA) + { + this.cA = DerBoolean.True; + } + } + + /** + * create a cA=true object for the given path length constraint. + * + * @param pathLenConstraint + */ + public BasicConstraints( + int pathLenConstraint) + { + this.cA = DerBoolean.True; + this.pathLenConstraint = new DerInteger(pathLenConstraint); + } + + public bool IsCA() + { + return cA != null && cA.IsTrue; + } + + public BigInteger PathLenConstraint + { + get { return pathLenConstraint == null ? null : pathLenConstraint.Value; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * BasicConstraints := Sequence {
+         *    cA                  Boolean DEFAULT FALSE,
+         *    pathLenConstraint   Integer (0..MAX) OPTIONAL
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(2); + v.AddOptional(cA, + pathLenConstraint); // yes some people actually do this when cA is false... + return new DerSequence(v); + } + + public override string ToString() + { + if (pathLenConstraint == null) + { + return "BasicConstraints: isCa(" + this.IsCA() + ")"; + } + + return "BasicConstraints: isCa(" + this.IsCA() + "), pathLenConstraint = " + pathLenConstraint.Value; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs.meta new file mode 100644 index 00000000..6e2e292b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 787b8a9978024a34096c163bb28d54a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/BasicConstraints.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs new file mode 100644 index 00000000..03aeedeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class CrlDistPoint + : Asn1Encodable + { + public static CrlDistPoint GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static CrlDistPoint GetInstance(object obj) + { + if (obj is CrlDistPoint) + return (CrlDistPoint)obj; + if (obj == null) + return null; + return new CrlDistPoint(Asn1Sequence.GetInstance(obj)); + } + + public static CrlDistPoint FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.CrlDistributionPoints)); + } + + internal readonly Asn1Sequence seq; + + private CrlDistPoint( + Asn1Sequence seq) + { + this.seq = seq; + } + + public CrlDistPoint( + DistributionPoint[] points) + { + seq = new DerSequence(points); + } + + /** + * Return the distribution points making up the sequence. + * + * @return DistributionPoint[] + */ + public DistributionPoint[] GetDistributionPoints() + { + DistributionPoint[] dp = new DistributionPoint[seq.Count]; + + for (int i = 0; i != seq.Count; ++i) + { + dp[i] = DistributionPoint.GetInstance(seq[i]); + } + + return dp; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * CrlDistPoint ::= Sequence SIZE {1..MAX} OF DistributionPoint
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return seq; + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.AppendLine("CRLDistPoint:"); + foreach (DistributionPoint dp in GetDistributionPoints()) + { + buf.Append(" ") + .Append(dp) + .AppendLine(); + } + return buf.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs.meta new file mode 100644 index 00000000..08a5d3a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66ab97eed8aa93248a3aead3651345f3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLDistPoint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs new file mode 100644 index 00000000..c7d31188 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The CRLNumber object. + *
+     * CRLNumber::= Integer(0..MAX)
+     * 
+ */ + public class CrlNumber + : DerInteger + { + public CrlNumber( + BigInteger number) + : base(number) + { + } + + public BigInteger Number + { + get { return PositiveValue; } + } + + public override string ToString() + { + return "CRLNumber: " + Number; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs.meta new file mode 100644 index 00000000..8ac23967 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2aeadd31e511fd243b3812ae888042e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLNumber.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs new file mode 100644 index 00000000..0fc1f934 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The CRLReason enumeration. + *
+     * CRLReason ::= Enumerated {
+     *  unspecified             (0),
+     *  keyCompromise           (1),
+     *  cACompromise            (2),
+     *  affiliationChanged      (3),
+     *  superseded              (4),
+     *  cessationOfOperation    (5),
+     *  certificateHold         (6),
+     *  removeFromCRL           (8),
+     *  privilegeWithdrawn      (9),
+     *  aACompromise           (10)
+     * }
+     * 
+ */ + public class CrlReason + : DerEnumerated + { + public const int Unspecified = 0; + public const int KeyCompromise = 1; + public const int CACompromise = 2; + public const int AffiliationChanged = 3; + public const int Superseded = 4; + public const int CessationOfOperation = 5; + public const int CertificateHold = 6; + // 7 -> Unknown + public const int RemoveFromCrl = 8; + public const int PrivilegeWithdrawn = 9; + public const int AACompromise = 10; + + private static readonly string[] ReasonString = new string[] + { + "Unspecified", "KeyCompromise", "CACompromise", "AffiliationChanged", + "Superseded", "CessationOfOperation", "CertificateHold", "Unknown", + "RemoveFromCrl", "PrivilegeWithdrawn", "AACompromise" + }; + + public CrlReason( + int reason) + : base(reason) + { + } + + public CrlReason(DerEnumerated reason) + : base(reason.IntValueExact) + { + } + + public override string ToString() + { + int reason = IntValueExact; + string str = (reason < 0 || reason > 10) ? "Invalid" : ReasonString[reason]; + return "CrlReason: " + str; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs.meta new file mode 100644 index 00000000..8e3fdcd8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 56f50d8d8cd7a9d429273a7af62d9268 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CRLReason.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs new file mode 100644 index 00000000..88efb5d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * CertPolicyId, used in the CertificatePolicies and PolicyMappings + * X509V3 Extensions. + * + *
+     *     CertPolicyId ::= OBJECT IDENTIFIER
+     * 
+ */ + public class CertPolicyID + : DerObjectIdentifier + { + public CertPolicyID( + string id) + : base(id) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs.meta new file mode 100644 index 00000000..5afc57c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43004b73691902a4aa4115eb853a654d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertPolicyId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs new file mode 100644 index 00000000..45299692 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * PKIX RFC-2459 + * + * The X.509 v2 CRL syntax is as follows. For signature calculation, + * the data that is to be signed is ASN.1 Der encoded. + * + *
+     * CertificateList  ::=  Sequence  {
+     *      tbsCertList          TbsCertList,
+     *      signatureAlgorithm   AlgorithmIdentifier,
+     *      signatureValue       BIT STRING  }
+     * 
+ */ + public class CertificateList + : Asn1Encodable + { + private readonly TbsCertificateList tbsCertList; + private readonly AlgorithmIdentifier sigAlgID; + private readonly DerBitString sig; + + public static CertificateList GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static CertificateList GetInstance( + object obj) + { + if (obj is CertificateList) + return (CertificateList) obj; + + if (obj != null) + return new CertificateList(Asn1Sequence.GetInstance(obj)); + + return null; + } + + private CertificateList( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("sequence wrong size for CertificateList", "seq"); + + tbsCertList = TbsCertificateList.GetInstance(seq[0]); + sigAlgID = AlgorithmIdentifier.GetInstance(seq[1]); + sig = DerBitString.GetInstance(seq[2]); + } + + public TbsCertificateList TbsCertList + { + get { return tbsCertList; } + } + + public CrlEntry[] GetRevokedCertificates() + { + return tbsCertList.GetRevokedCertificates(); + } + + public IEnumerable GetRevokedCertificateEnumeration() + { + return tbsCertList.GetRevokedCertificateEnumeration(); + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return sigAlgID; } + } + + public DerBitString Signature + { + get { return sig; } + } + + public byte[] GetSignatureOctets() + { + return sig.GetOctets(); + } + + public int Version + { + get { return tbsCertList.Version; } + } + + public X509Name Issuer + { + get { return tbsCertList.Issuer; } + } + + public Time ThisUpdate + { + get { return tbsCertList.ThisUpdate; } + } + + public Time NextUpdate + { + get { return tbsCertList.NextUpdate; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(tbsCertList, sigAlgID, sig); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs.meta new file mode 100644 index 00000000..19407a5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c53a73fa90f59cb42bab3d969bb427e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificateList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs new file mode 100644 index 00000000..2e3fc4d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs @@ -0,0 +1,157 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * This class helps to support crossCerfificatePairs in a LDAP directory + * according RFC 2587 + * + *
+	*     crossCertificatePairATTRIBUTE::={
+	*       WITH SYNTAX   CertificatePair
+	*       EQUALITY MATCHING RULE certificatePairExactMatch
+	*       ID joint-iso-ccitt(2) ds(5) attributeType(4) crossCertificatePair(40)}
+	* 
+ * + *
The forward elements of the crossCertificatePair attribute of a + * CA's directory entry shall be used to store all, except self-issued + * certificates issued to this CA. Optionally, the reverse elements of the + * crossCertificatePair attribute, of a CA's directory entry may contain a + * subset of certificates issued by this CA to other CAs. When both the forward + * and the reverse elements are present in a single attribute value, issuer name + * in one certificate shall match the subject name in the other and vice versa, + * and the subject public key in one certificate shall be capable of verifying + * the digital signature on the other certificate and vice versa. + * + * When a reverse element is present, the forward element value and the reverse + * element value need not be stored in the same attribute value; in other words, + * they can be stored in either a single attribute value or two attribute + * values.
+ * + *
+	*       CertificatePair ::= SEQUENCE {
+	*         forward		[0]	Certificate OPTIONAL,
+	*         reverse		[1]	Certificate OPTIONAL,
+	*         -- at least one of the pair shall be present -- }
+	* 
+ */ + public class CertificatePair + : Asn1Encodable + { + private X509CertificateStructure forward, reverse; + + public static CertificatePair GetInstance( + object obj) + { + if (obj == null || obj is CertificatePair) + { + return (CertificatePair) obj; + } + + if (obj is Asn1Sequence) + { + return new CertificatePair((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type CertificatePair: + *

+ *

+		*       CertificatePair ::= SEQUENCE {
+		*         forward		[0]	Certificate OPTIONAL,
+		*         reverse		[1]	Certificate OPTIONAL,
+		*         -- at least one of the pair shall be present -- }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private CertificatePair( + Asn1Sequence seq) + { + if (seq.Count != 1 && seq.Count != 2) + { + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + } + + foreach (object obj in seq) + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(obj); + if (o.TagNo == 0) + { + forward = X509CertificateStructure.GetInstance(o, true); + } + else if (o.TagNo == 1) + { + reverse = X509CertificateStructure.GetInstance(o, true); + } + else + { + throw new ArgumentException("Bad tag number: " + o.TagNo); + } + } + } + + /** + * Constructor from a given details. + * + * @param forward Certificates issued to this CA. + * @param reverse Certificates issued by this CA to other CAs. + */ + public CertificatePair( + X509CertificateStructure forward, + X509CertificateStructure reverse) + { + this.forward = forward; + this.reverse = reverse; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*       CertificatePair ::= SEQUENCE {
+		*         forward		[0]	Certificate OPTIONAL,
+		*         reverse		[1]	Certificate OPTIONAL,
+		*         -- at least one of the pair shall be present -- }
+		* 
+ * + * @return a DERObject + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, forward); + v.AddOptionalTagged(true, 1, reverse); + return new DerSequence(v); + } + + /** + * @return Returns the forward. + */ + public X509CertificateStructure Forward + { + get { return forward; } + } + + /** + * @return Returns the reverse. + */ + public X509CertificateStructure Reverse + { + get { return reverse; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs.meta new file mode 100644 index 00000000..926c88e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2f3cfe718f865494c83c11c3102faa73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePair.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs new file mode 100644 index 00000000..7306f82e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs @@ -0,0 +1,109 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class CertificatePolicies + : Asn1Encodable + { + private static PolicyInformation[] Copy(PolicyInformation[] policyInfo) + { + return (PolicyInformation[])policyInfo.Clone(); + } + + public static CertificatePolicies GetInstance(object obj) + { + if (obj is CertificatePolicies) + return (CertificatePolicies)obj; + if (obj == null) + return null; + return new CertificatePolicies(Asn1Sequence.GetInstance(obj)); + } + + public static CertificatePolicies GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static CertificatePolicies FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.CertificatePolicies)); + } + + private readonly PolicyInformation[] policyInformation; + + /** + * Construct a CertificatePolicies object containing one PolicyInformation. + * + * @param name the name to be contained. + */ + public CertificatePolicies(PolicyInformation name) + { + this.policyInformation = new PolicyInformation[] { name }; + } + + public CertificatePolicies(PolicyInformation[] policyInformation) + { + this.policyInformation = Copy(policyInformation); + } + + private CertificatePolicies(Asn1Sequence seq) + { + this.policyInformation = new PolicyInformation[seq.Count]; + + for (int i = 0; i < seq.Count; ++i) + { + policyInformation[i] = PolicyInformation.GetInstance(seq[i]); + } + } + + public virtual PolicyInformation[] GetPolicyInformation() + { + return Copy(policyInformation); + } + + public virtual PolicyInformation GetPolicyInformation(DerObjectIdentifier policyIdentifier) + { + for (int i = 0; i != policyInformation.Length; i++) + { + if (policyIdentifier.Equals(policyInformation[i].PolicyIdentifier)) + { + return policyInformation[i]; + } + } + + return null; + } + + /** + * Produce an object suitable for an ASN1OutputStream. + *
+         * CertificatePolicies ::= SEQUENCE SIZE {1..MAX} OF PolicyInformation
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(policyInformation); + } + + public override string ToString() + { + StringBuilder sb = new StringBuilder("CertificatePolicies:"); + if (policyInformation != null && policyInformation.Length > 0) + { + sb.Append(' '); + sb.Append(policyInformation[0]); + for (int i = 1; i < policyInformation.Length; ++i) + { + sb.Append(", "); + sb.Append(policyInformation[i]); + } + } + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs.meta new file mode 100644 index 00000000..7123c858 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ba4f8c889517a9f479e56b776d1a1d91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/CertificatePolicies.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs new file mode 100644 index 00000000..66e3ffa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class DsaParameter + : Asn1Encodable + { + internal readonly DerInteger p, q, g; + + public static DsaParameter GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static DsaParameter GetInstance( + object obj) + { + if(obj == null || obj is DsaParameter) + { + return (DsaParameter) obj; + } + + if(obj is Asn1Sequence) + { + return new DsaParameter((Asn1Sequence) obj); + } + + throw new ArgumentException("Invalid DsaParameter: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public DsaParameter( + BigInteger p, + BigInteger q, + BigInteger g) + { + this.p = new DerInteger(p); + this.q = new DerInteger(q); + this.g = new DerInteger(g); + } + + private DsaParameter( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.p = DerInteger.GetInstance(seq[0]); + this.q = DerInteger.GetInstance(seq[1]); + this.g = DerInteger.GetInstance(seq[2]); + } + + public BigInteger P + { + get { return p.PositiveValue; } + } + + public BigInteger Q + { + get { return q.PositiveValue; } + } + + public BigInteger G + { + get { return g.PositiveValue; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(p, q, g); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs.meta new file mode 100644 index 00000000..e179f7a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0df53db1cbafa134987d7c3f98d2eac1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DSAParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs new file mode 100644 index 00000000..1c699f41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The DigestInfo object. + *
+     * DigestInfo::=Sequence{
+     *          digestAlgorithm  AlgorithmIdentifier,
+     *          digest OCTET STRING }
+     * 
+ */ + public class DigestInfo + : Asn1Encodable + { + private readonly byte[] digest; + private readonly AlgorithmIdentifier algID; + + public static DigestInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static DigestInfo GetInstance( + object obj) + { + if (obj is DigestInfo) + { + return (DigestInfo) obj; + } + + if (obj is Asn1Sequence) + { + return new DigestInfo((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public DigestInfo( + AlgorithmIdentifier algID, + byte[] digest) + { + this.digest = digest; + this.algID = algID; + } + + private DigestInfo( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Wrong number of elements in sequence", "seq"); + + algID = AlgorithmIdentifier.GetInstance(seq[0]); + digest = Asn1OctetString.GetInstance(seq[1]).GetOctets(); + } + + public AlgorithmIdentifier AlgorithmID + { + get { return algID; } + } + + public byte[] GetDigest() + { + return digest; + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(algID, new DerOctetString(digest)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs.meta new file mode 100644 index 00000000..aa2be6cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 689c30e3590b6d140b51038ff73c8c69 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DigestInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs new file mode 100644 index 00000000..607af44d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs @@ -0,0 +1,178 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * DisplayText class, used in + * CertificatePolicies X509 V3 extensions (in policy qualifiers). + * + *

It stores a string in a chosen encoding. + *

+	 * DisplayText ::= CHOICE {
+	 *      ia5String        IA5String      (SIZE (1..200)),
+	 *      visibleString    VisibleString  (SIZE (1..200)),
+	 *      bmpString        BMPString      (SIZE (1..200)),
+	 *      utf8String       UTF8String     (SIZE (1..200)) }
+	 * 

+ * @see PolicyQualifierInfo + * @see PolicyInformation + */ + public class DisplayText + : Asn1Encodable, IAsn1Choice + { + /** + * Constant corresponding to ia5String encoding. + * + */ + public const int ContentTypeIA5String = 0; + /** + * Constant corresponding to bmpString encoding. + * + */ + public const int ContentTypeBmpString = 1; + /** + * Constant corresponding to utf8String encoding. + * + */ + public const int ContentTypeUtf8String = 2; + /** + * Constant corresponding to visibleString encoding. + * + */ + public const int ContentTypeVisibleString = 3; + /** + * Describe constant DisplayTextMaximumSize here. + * + */ + public const int DisplayTextMaximumSize = 200; + + internal readonly int contentType; + internal readonly IAsn1String contents; + + /** + * Creates a new DisplayText instance. + * + * @param type the desired encoding type for the text. + * @param text the text to store. Strings longer than 200 + * characters are truncated. + */ + public DisplayText( + int type, + string text) + { + if (text.Length > DisplayTextMaximumSize) + { + // RFC3280 limits these strings to 200 chars + // truncate the string + text = text.Substring(0, DisplayTextMaximumSize); + } + + contentType = type; + switch (type) + { + case ContentTypeIA5String: + contents = (IAsn1String)new DerIA5String (text); + break; + case ContentTypeUtf8String: + contents = (IAsn1String)new DerUtf8String(text); + break; + case ContentTypeVisibleString: + contents = (IAsn1String)new DerVisibleString(text); + break; + case ContentTypeBmpString: + contents = (IAsn1String)new DerBmpString(text); + break; + default: + contents = (IAsn1String)new DerUtf8String(text); + break; + } + } + +// /** +// * return true if the passed in string can be represented without +// * loss as a PrintableString, false otherwise. +// */ +// private bool CanBePrintable( +// string str) +// { +// for (int i = str.Length - 1; i >= 0; i--) +// { +// if (str[i] > 0x007f) +// { +// return false; +// } +// } +// +// return true; +// } + + /** + * Creates a new DisplayText instance. + * + * @param text the text to encapsulate. Strings longer than 200 + * characters are truncated. + */ + public DisplayText( + string text) + { + // by default use UTF8String + if (text.Length > DisplayTextMaximumSize) + { + text = text.Substring(0, DisplayTextMaximumSize); + } + + contentType = ContentTypeUtf8String; + contents = new DerUtf8String(text); + } + + /** + * Creates a new DisplayText instance. + *

Useful when reading back a DisplayText class + * from it's Asn1Encodable form.

+ * + * @param contents an Asn1Encodable instance. + */ + public DisplayText( + IAsn1String contents) + { + this.contents = contents; + } + + public static DisplayText GetInstance( + object obj) + { + if (obj is IAsn1String) + { + return new DisplayText((IAsn1String) obj); + } + + if (obj is DisplayText) + { + return (DisplayText) obj; + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public override Asn1Object ToAsn1Object() + { + return (Asn1Object) contents; + } + + /** + * Returns the stored string object. + * + * @return the stored text as a string. + */ + public string GetString() + { + return contents.GetString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs.meta new file mode 100644 index 00000000..a6ad14c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 344ca49bedc8874459e689116ee08f35 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DisplayText.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs new file mode 100644 index 00000000..cbc84268 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs @@ -0,0 +1,143 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The DistributionPoint object. + *
+     * DistributionPoint ::= Sequence {
+     *      distributionPoint [0] DistributionPointName OPTIONAL,
+     *      reasons           [1] ReasonFlags OPTIONAL,
+     *      cRLIssuer         [2] GeneralNames OPTIONAL
+     * }
+     * 
+ */ + public class DistributionPoint + : Asn1Encodable + { + internal readonly DistributionPointName distributionPoint; + internal readonly ReasonFlags reasons; + internal readonly GeneralNames cRLIssuer; + + public static DistributionPoint GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static DistributionPoint GetInstance( + object obj) + { + if(obj == null || obj is DistributionPoint) + { + return (DistributionPoint) obj; + } + + if(obj is Asn1Sequence) + { + return new DistributionPoint((Asn1Sequence) obj); + } + + throw new ArgumentException("Invalid DistributionPoint: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + private DistributionPoint( + Asn1Sequence seq) + { + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject t = Asn1TaggedObject.GetInstance(seq[i]); + + switch (t.TagNo) + { + case 0: + distributionPoint = DistributionPointName.GetInstance(t, true); + break; + case 1: + reasons = new ReasonFlags(DerBitString.GetInstance(t, false)); + break; + case 2: + cRLIssuer = GeneralNames.GetInstance(t, false); + break; + } + } + } + + public DistributionPoint( + DistributionPointName distributionPointName, + ReasonFlags reasons, + GeneralNames crlIssuer) + { + this.distributionPoint = distributionPointName; + this.reasons = reasons; + this.cRLIssuer = crlIssuer; + } + + public DistributionPointName DistributionPointName + { + get { return distributionPoint; } + } + + public ReasonFlags Reasons + { + get { return reasons; } + } + + public GeneralNames CrlIssuer + { + get { return cRLIssuer; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + // As this is a CHOICE it must be explicitly tagged + v.AddOptionalTagged(true, 0, distributionPoint); + + v.AddOptionalTagged(false, 1, reasons); + v.AddOptionalTagged(false, 2, cRLIssuer); + return new DerSequence(v); + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.AppendLine("DistributionPoint: ["); + if (distributionPoint != null) + { + AppendObject(buf, "distributionPoint", distributionPoint.ToString()); + } + if (reasons != null) + { + AppendObject(buf, "reasons", reasons.ToString()); + } + if (cRLIssuer != null) + { + AppendObject(buf, "cRLIssuer", cRLIssuer.ToString()); + } + buf.AppendLine("]"); + return buf.ToString(); + } + + private void AppendObject(StringBuilder buf, string name, string val) + { + string indent = " "; + buf.Append(indent); + buf.Append(name); + buf.AppendLine(":"); + buf.Append(indent); + buf.Append(indent); + buf.Append(val); + buf.AppendLine(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs.meta new file mode 100644 index 00000000..b1d9f7c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e885999cc3e152947ab893f8f57a8e0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPoint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs new file mode 100644 index 00000000..b915a479 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs @@ -0,0 +1,125 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The DistributionPointName object. + *
+     * DistributionPointName ::= CHOICE {
+     *     fullName                 [0] GeneralNames,
+     *     nameRelativeToCRLIssuer  [1] RDN
+     * }
+     * 
+ */ + public class DistributionPointName + : Asn1Encodable, IAsn1Choice + { + internal readonly Asn1Encodable name; + internal readonly int type; + + public const int FullName = 0; + public const int NameRelativeToCrlIssuer = 1; + + public static DistributionPointName GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1TaggedObject.GetInstance(obj, true)); + } + + public static DistributionPointName GetInstance( + object obj) + { + if (obj == null || obj is DistributionPointName) + { + return (DistributionPointName) obj; + } + + if (obj is Asn1TaggedObject) + { + return new DistributionPointName((Asn1TaggedObject) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public DistributionPointName( + int type, + Asn1Encodable name) + { + this.type = type; + this.name = name; + } + + public DistributionPointName( + GeneralNames name) + : this(FullName, name) + { + } + + public int PointType + { + get { return type; } + } + + public Asn1Encodable Name + { + get { return name; } + } + + public DistributionPointName( + Asn1TaggedObject obj) + { + this.type = obj.TagNo; + + if (type == FullName) + { + this.name = GeneralNames.GetInstance(obj, false); + } + else + { + this.name = Asn1Set.GetInstance(obj, false); + } + } + + public override Asn1Object ToAsn1Object() + { + return new DerTaggedObject(false, type, name); + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.AppendLine("DistributionPointName: ["); + if (type == FullName) + { + AppendObject(buf, "fullName", name.ToString()); + } + else + { + AppendObject(buf, "nameRelativeToCRLIssuer", name.ToString()); + } + buf.AppendLine("]"); + return buf.ToString(); + } + + private void AppendObject(StringBuilder buf, string name, string val) + { + string indent = " "; + buf.Append(indent); + buf.Append(name); + buf.AppendLine(":"); + buf.Append(indent); + buf.Append(indent); + buf.Append(val); + buf.AppendLine(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs.meta new file mode 100644 index 00000000..ec7ba0ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f9c30e3e050194f438209cb9f2513aef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/DistributionPointName.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs new file mode 100644 index 00000000..a287fccd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The extendedKeyUsage object. + *
+     *      extendedKeyUsage ::= Sequence SIZE (1..MAX) OF KeyPurposeId
+     * 
+ */ + public class ExtendedKeyUsage + : Asn1Encodable + { + public static ExtendedKeyUsage GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static ExtendedKeyUsage GetInstance( + object obj) + { + if (obj is ExtendedKeyUsage) + return (ExtendedKeyUsage)obj; + if (obj is X509Extension) + return GetInstance(X509Extension.ConvertValueToObject((X509Extension)obj)); + if (obj == null) + return null; + return new ExtendedKeyUsage(Asn1Sequence.GetInstance(obj)); + } + + public static ExtendedKeyUsage FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.ExtendedKeyUsage)); + } + + internal readonly ISet m_usageTable = new HashSet(); + internal readonly Asn1Sequence seq; + + private ExtendedKeyUsage(Asn1Sequence seq) + { + this.seq = seq; + + foreach (Asn1Encodable element in seq) + { + DerObjectIdentifier oid = DerObjectIdentifier.GetInstance(element); + + m_usageTable.Add(oid); + } + } + + public ExtendedKeyUsage(params KeyPurposeID[] usages) + { + this.seq = new DerSequence(usages); + + foreach (KeyPurposeID usage in usages) + { + m_usageTable.Add(usage); + } + } + + public ExtendedKeyUsage(IEnumerable usages) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + foreach (object usage in usages) + { + DerObjectIdentifier oid = DerObjectIdentifier.GetInstance(usage); + + v.Add(oid); + m_usageTable.Add(oid); + } + + this.seq = new DerSequence(v); + } + + public bool HasKeyPurposeId(KeyPurposeID keyPurposeId) + { + return m_usageTable.Contains(keyPurposeId); + } + + /** + * Returns all extended key usages. + * The returned ArrayList contains DerObjectIdentifier instances. + * @return An ArrayList with all key purposes. + */ + public IList GetAllUsages() + { + return new List(m_usageTable); + } + + public int Count + { + get { return m_usageTable.Count; } + } + + public override Asn1Object ToAsn1Object() + { + return seq; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs.meta new file mode 100644 index 00000000..e3915471 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e1913c7df77aefb428f36b84750ec38d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ExtendedKeyUsage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs new file mode 100644 index 00000000..8974ac84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs @@ -0,0 +1,427 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Globalization; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using NetUtils = Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The GeneralName object. + *
+     * GeneralName ::= CHOICE {
+     *      otherName                       [0]     OtherName,
+     *      rfc822Name                      [1]     IA5String,
+     *      dNSName                         [2]     IA5String,
+     *      x400Address                     [3]     ORAddress,
+     *      directoryName                   [4]     Name,
+     *      ediPartyName                    [5]     EDIPartyName,
+     *      uniformResourceIdentifier       [6]     IA5String,
+     *      iPAddress                       [7]     OCTET STRING,
+     *      registeredID                    [8]     OBJECT IDENTIFIER}
+     *
+     * OtherName ::= Sequence {
+     *      type-id    OBJECT IDENTIFIER,
+     *      value      [0] EXPLICIT ANY DEFINED BY type-id }
+     *
+     * EDIPartyName ::= Sequence {
+     *      nameAssigner            [0]     DirectoryString OPTIONAL,
+     *      partyName               [1]     DirectoryString }
+     * 
+ */ + public class GeneralName + : Asn1Encodable, IAsn1Choice + { + public const int OtherName = 0; + public const int Rfc822Name = 1; + public const int DnsName = 2; + public const int X400Address = 3; + public const int DirectoryName = 4; + public const int EdiPartyName = 5; + public const int UniformResourceIdentifier = 6; + public const int IPAddress = 7; + public const int RegisteredID = 8; + + internal readonly Asn1Encodable obj; + internal readonly int tag; + + public GeneralName( + X509Name directoryName) + { + this.obj = directoryName; + this.tag = 4; + } + + /** + * When the subjectAltName extension contains an Internet mail address, + * the address MUST be included as an rfc822Name. The format of an + * rfc822Name is an "addr-spec" as defined in RFC 822 [RFC 822]. + * + * When the subjectAltName extension contains a domain name service + * label, the domain name MUST be stored in the dNSName (an IA5String). + * The name MUST be in the "preferred name syntax," as specified by RFC + * 1034 [RFC 1034]. + * + * When the subjectAltName extension contains a URI, the name MUST be + * stored in the uniformResourceIdentifier (an IA5String). The name MUST + * be a non-relative URL, and MUST follow the URL syntax and encoding + * rules specified in [RFC 1738]. The name must include both a scheme + * (e.g., "http" or "ftp") and a scheme-specific-part. The scheme- + * specific-part must include a fully qualified domain name or IP + * address as the host. + * + * When the subjectAltName extension contains a iPAddress, the address + * MUST be stored in the octet string in "network byte order," as + * specified in RFC 791 [RFC 791]. The least significant bit (LSB) of + * each octet is the LSB of the corresponding byte in the network + * address. For IP Version 4, as specified in RFC 791, the octet string + * MUST contain exactly four octets. For IP Version 6, as specified in + * RFC 1883, the octet string MUST contain exactly sixteen octets [RFC + * 1883]. + */ + public GeneralName( + Asn1Object name, + int tag) + { + this.obj = name; + this.tag = tag; + } + + public GeneralName( + int tag, + Asn1Encodable name) + { + this.obj = name; + this.tag = tag; + } + + /** + * Create a GeneralName for the given tag from the passed in string. + *

+ * This constructor can handle: + *

    + *
  • rfc822Name
  • + *
  • iPAddress
  • + *
  • directoryName
  • + *
  • dNSName
  • + *
  • uniformResourceIdentifier
  • + *
  • registeredID
  • + *
+ * For x400Address, otherName and ediPartyName there is no common string + * format defined. + *

+ * Note: A directory name can be encoded in different ways into a byte + * representation. Be aware of this if the byte representation is used for + * comparing results. + *

+ * + * @param tag tag number + * @param name string representation of name + * @throws ArgumentException if the string encoding is not correct or + * not supported. + */ + public GeneralName( + int tag, + string name) + { + this.tag = tag; + + if (tag == Rfc822Name || tag == DnsName || tag == UniformResourceIdentifier) + { + this.obj = new DerIA5String(name); + } + else if (tag == RegisteredID) + { + this.obj = new DerObjectIdentifier(name); + } + else if (tag == DirectoryName) + { + this.obj = new X509Name(name); + } + else if (tag == IPAddress) + { + byte[] enc = toGeneralNameEncoding(name); + if (enc == null) + throw new ArgumentException("IP Address is invalid", "name"); + + this.obj = new DerOctetString(enc); + } + else + { + throw new ArgumentException("can't process string for tag: " + tag, "tag"); + } + } + + public static GeneralName GetInstance( + object obj) + { + if (obj == null || obj is GeneralName) + { + return (GeneralName) obj; + } + + if (obj is Asn1TaggedObject) + { + Asn1TaggedObject tagObj = (Asn1TaggedObject) obj; + int tag = tagObj.TagNo; + + switch (tag) + { + case EdiPartyName: + case OtherName: + case X400Address: + return new GeneralName(tag, Asn1Sequence.GetInstance(tagObj, false)); + + case DnsName: + case Rfc822Name: + case UniformResourceIdentifier: + return new GeneralName(tag, DerIA5String.GetInstance(tagObj, false)); + + case DirectoryName: + return new GeneralName(tag, X509Name.GetInstance(tagObj, true)); + case IPAddress: + return new GeneralName(tag, Asn1OctetString.GetInstance(tagObj, false)); + case RegisteredID: + return new GeneralName(tag, DerObjectIdentifier.GetInstance(tagObj, false)); + + default: + throw new ArgumentException("unknown tag: " + tag); + } + } + + if (obj is byte[]) + { + try + { + return GetInstance(Asn1Object.FromByteArray((byte[])obj)); + } + catch (IOException) + { + throw new ArgumentException("unable to parse encoded general name"); + } + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static GeneralName GetInstance( + Asn1TaggedObject tagObj, + bool explicitly) + { + return GetInstance(Asn1TaggedObject.GetInstance(tagObj, true)); + } + + public int TagNo + { + get { return tag; } + } + + public Asn1Encodable Name + { + get { return obj; } + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.Append(tag); + buf.Append(": "); + + switch (tag) + { + case Rfc822Name: + case DnsName: + case UniformResourceIdentifier: + buf.Append(DerIA5String.GetInstance(obj).GetString()); + break; + case DirectoryName: + buf.Append(X509Name.GetInstance(obj).ToString()); + break; + default: + buf.Append(obj.ToString()); + break; + } + + return buf.ToString(); + } + + private byte[] toGeneralNameEncoding( + string ip) + { + if (NetUtils.IPAddress.IsValidIPv6WithNetmask(ip) || NetUtils.IPAddress.IsValidIPv6(ip)) + { + int slashIndex = ip.IndexOf('/'); + + if (slashIndex < 0) + { + byte[] addr = new byte[16]; + int[] parsedIp = parseIPv6(ip); + copyInts(parsedIp, addr, 0); + + return addr; + } + else + { + byte[] addr = new byte[32]; + int[] parsedIp = parseIPv6(ip.Substring(0, slashIndex)); + copyInts(parsedIp, addr, 0); + string mask = ip.Substring(slashIndex + 1); + if (mask.IndexOf(':') > 0) + { + parsedIp = parseIPv6(mask); + } + else + { + parsedIp = parseMask(mask); + } + copyInts(parsedIp, addr, 16); + + return addr; + } + } + else if (NetUtils.IPAddress.IsValidIPv4WithNetmask(ip) || NetUtils.IPAddress.IsValidIPv4(ip)) + { + int slashIndex = ip.IndexOf('/'); + + if (slashIndex < 0) + { + byte[] addr = new byte[4]; + + parseIPv4(ip, addr, 0); + + return addr; + } + else + { + byte[] addr = new byte[8]; + + parseIPv4(ip.Substring(0, slashIndex), addr, 0); + + string mask = ip.Substring(slashIndex + 1); + if (mask.IndexOf('.') > 0) + { + parseIPv4(mask, addr, 4); + } + else + { + parseIPv4Mask(mask, addr, 4); + } + + return addr; + } + } + + return null; + } + + private void parseIPv4Mask(string mask, byte[] addr, int offset) + { + int maskVal = int.Parse(mask); + + for (int i = 0; i != maskVal; i++) + { + addr[(i / 8) + offset] |= (byte)(1 << (i % 8)); + } + } + + private void parseIPv4(string ip, byte[] addr, int offset) + { + foreach (string token in ip.Split('.', '/')) + { + addr[offset++] = (byte)int.Parse(token); + } + } + + private int[] parseMask(string mask) + { + int[] res = new int[8]; + int maskVal = int.Parse(mask); + + for (int i = 0; i != maskVal; i++) + { + res[i / 16] |= 1 << (i % 16); + } + return res; + } + + private void copyInts(int[] parsedIp, byte[] addr, int offSet) + { + for (int i = 0; i != parsedIp.Length; i++) + { + addr[(i * 2) + offSet] = (byte)(parsedIp[i] >> 8); + addr[(i * 2 + 1) + offSet] = (byte)parsedIp[i]; + } + } + + private int[] parseIPv6(string ip) + { + if (Org.BouncyCastle.Utilities.Platform.StartsWith(ip, "::")) + { + ip = ip.Substring(1); + } + else if (Org.BouncyCastle.Utilities.Platform.EndsWith(ip, "::")) + { + ip = ip.Substring(0, ip.Length - 1); + } + + IEnumerable split = ip.Split(':'); + var sEnum = split.GetEnumerator(); + + int index = 0; + int[] val = new int[8]; + + int doubleColon = -1; + + while (sEnum.MoveNext()) + { + string e = sEnum.Current; + + if (e.Length == 0) + { + doubleColon = index; + val[index++] = 0; + } + else + { + if (e.IndexOf('.') < 0) + { + val[index++] = int.Parse(e, NumberStyles.AllowHexSpecifier); + } + else + { + string[] tokens = e.Split('.'); + + val[index++] = (int.Parse(tokens[0]) << 8) | int.Parse(tokens[1]); + val[index++] = (int.Parse(tokens[2]) << 8) | int.Parse(tokens[3]); + } + } + } + + if (index != val.Length) + { + Array.Copy(val, doubleColon, val, val.Length - (index - doubleColon), index - doubleColon); + for (int i = doubleColon; i != val.Length - (index - doubleColon); i++) + { + val[i] = 0; + } + } + + return val; + } + + public override Asn1Object ToAsn1Object() + { + // directoryName is explicitly tagged as it is a CHOICE + bool isExplicit = (tag == DirectoryName); + + return new DerTaggedObject(isExplicit, tag, obj); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs.meta new file mode 100644 index 00000000..0d77a1fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f4b6d66f1447ffc478cc6d4c16a67b06 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralName.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs new file mode 100644 index 00000000..3535b29e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class GeneralNames + : Asn1Encodable + { + private static GeneralName[] Copy(GeneralName[] names) + { + return (GeneralName[])names.Clone(); + } + + public static GeneralNames GetInstance(object obj) + { + if (obj is GeneralNames) + return (GeneralNames)obj; + if (obj == null) + return null; + return new GeneralNames(Asn1Sequence.GetInstance(obj)); + } + + public static GeneralNames GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static GeneralNames FromExtensions(X509Extensions extensions, DerObjectIdentifier extOid) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, extOid)); + } + + private readonly GeneralName[] names; + + /// Construct a GeneralNames object containing one GeneralName. + /// The name to be contained. + public GeneralNames( + GeneralName name) + { + names = new GeneralName[]{ name }; + } + + public GeneralNames( + GeneralName[] names) + { + this.names = Copy(names); + } + + private GeneralNames( + Asn1Sequence seq) + { + this.names = new GeneralName[seq.Count]; + + for (int i = 0; i != seq.Count; i++) + { + names[i] = GeneralName.GetInstance(seq[i]); + } + } + + public GeneralName[] GetNames() + { + return Copy(names); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+		 * GeneralNames ::= Sequence SIZE {1..MAX} OF GeneralName
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(names); + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.AppendLine("GeneralNames:"); + foreach (GeneralName name in names) + { + buf.Append(" ") + .Append(name) + .AppendLine(); + } + return buf.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs.meta new file mode 100644 index 00000000..8637f51f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 62b8cbb97ae194e4d95690a4f7e9d87d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralNames.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs new file mode 100644 index 00000000..4f2eeac6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs @@ -0,0 +1,189 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Class for containing a restriction object subtrees in NameConstraints. See + * RFC 3280. + * + *
+	 *
+	 *       GeneralSubtree ::= SEQUENCE
+	 *       {
+	 *         baseName                    GeneralName,
+	 *         minimum         [0]     BaseDistance DEFAULT 0,
+	 *         maximum         [1]     BaseDistance OPTIONAL
+	 *       }
+	 * 
+ * + * @see org.bouncycastle.asn1.x509.NameConstraints + * + */ + public class GeneralSubtree + : Asn1Encodable + { + private readonly GeneralName baseName; + private readonly DerInteger minimum; + private readonly DerInteger maximum; + + private GeneralSubtree( + Asn1Sequence seq) + { + baseName = GeneralName.GetInstance(seq[0]); + + switch (seq.Count) + { + case 1: + break; + case 2: + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(seq[1]); + switch (o.TagNo) + { + case 0: + minimum = DerInteger.GetInstance(o, false); + break; + case 1: + maximum = DerInteger.GetInstance(o, false); + break; + default: + throw new ArgumentException("Bad tag number: " + o.TagNo); + } + break; + } + case 3: + { + { + Asn1TaggedObject oMin = Asn1TaggedObject.GetInstance(seq[1]); + if (oMin.TagNo != 0) + throw new ArgumentException("Bad tag number for 'minimum': " + oMin.TagNo); + minimum = DerInteger.GetInstance(oMin, false); + } + + { + Asn1TaggedObject oMax = Asn1TaggedObject.GetInstance(seq[2]); + if (oMax.TagNo != 1) + throw new ArgumentException("Bad tag number for 'maximum': " + oMax.TagNo); + maximum = DerInteger.GetInstance(oMax, false); + } + + break; + } + default: + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + } + + /** + * Constructor from a given details. + * + * According RFC 3280, the minimum and maximum fields are not used with any + * name forms, thus minimum MUST be zero, and maximum MUST be absent. + *

+ * If minimum is null, zero is assumed, if + * maximum is null, maximum is absent.

+ * + * @param baseName + * A restriction. + * @param minimum + * Minimum + * + * @param maximum + * Maximum + */ + public GeneralSubtree( + GeneralName baseName, + BigInteger minimum, + BigInteger maximum) + { + this.baseName = baseName; + if (minimum != null) + { + this.minimum = new DerInteger(minimum); + } + if (maximum != null) + { + this.maximum = new DerInteger(maximum); + } + } + + public GeneralSubtree( + GeneralName baseName) + : this(baseName, null, null) + { + } + + public static GeneralSubtree GetInstance( + Asn1TaggedObject o, + bool isExplicit) + { + return new GeneralSubtree(Asn1Sequence.GetInstance(o, isExplicit)); + } + + public static GeneralSubtree GetInstance( + object obj) + { + if (obj == null) + { + return null; + } + + if (obj is GeneralSubtree) + { + return (GeneralSubtree) obj; + } + + return new GeneralSubtree(Asn1Sequence.GetInstance(obj)); + } + + public GeneralName Base + { + get { return baseName; } + } + + public BigInteger Minimum + { + get { return minimum == null ? BigInteger.Zero : minimum.Value; } + } + + public BigInteger Maximum + { + get { return maximum == null ? null : maximum.Value; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + * Returns: + * + *
+		 *       GeneralSubtree ::= SEQUENCE
+		 *       {
+		 *         baseName                    GeneralName,
+		 *         minimum         [0]     BaseDistance DEFAULT 0,
+		 *         maximum         [1]     BaseDistance OPTIONAL
+		 *       }
+		 * 
+ * + * @return a DERObject + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(baseName); + + if (minimum != null && !minimum.HasValue(0)) + { + v.Add(new DerTaggedObject(false, 0, minimum)); + } + + v.AddOptionalTagged(false, 1, maximum); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs.meta new file mode 100644 index 00000000..14013f6b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 26ba6b294d0437245a0732c51a1ea924 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/GeneralSubtree.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs new file mode 100644 index 00000000..784b3dc0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs @@ -0,0 +1,250 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The Holder object. + *

+ * For an v2 attribute certificate this is: + * + *

+	 *            Holder ::= SEQUENCE {
+	 *                  baseCertificateID   [0] IssuerSerial OPTIONAL,
+	 *                           -- the issuer and serial number of
+	 *                           -- the holder's Public Key Certificate
+	 *                  entityName          [1] GeneralNames OPTIONAL,
+	 *                           -- the name of the claimant or role
+	 *                  objectDigestInfo    [2] ObjectDigestInfo OPTIONAL
+	 *                           -- used to directly authenticate the holder,
+	 *                           -- for example, an executable
+	 *            }
+	 * 
+ *

+ *

+ * For an v1 attribute certificate this is: + * + *

+	 *         subject CHOICE {
+	 *          baseCertificateID [0] EXPLICIT IssuerSerial,
+	 *          -- associated with a Public Key Certificate
+	 *          subjectName [1] EXPLICIT GeneralNames },
+	 *          -- associated with a name
+	 * 
+ *

+ */ + public class Holder + : Asn1Encodable + { + internal readonly IssuerSerial baseCertificateID; + internal readonly GeneralNames entityName; + internal readonly ObjectDigestInfo objectDigestInfo; + private readonly int version; + + public static Holder GetInstance( + object obj) + { + if (obj is Holder) + { + return (Holder) obj; + } + + if (obj is Asn1Sequence) + { + return new Holder((Asn1Sequence) obj); + } + + if (obj is Asn1TaggedObject) + { + return new Holder((Asn1TaggedObject) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor for a holder for an v1 attribute certificate. + * + * @param tagObj The ASN.1 tagged holder object. + */ + public Holder( + Asn1TaggedObject tagObj) + { + switch (tagObj.TagNo) + { + case 0: + baseCertificateID = IssuerSerial.GetInstance(tagObj, true); + break; + case 1: + entityName = GeneralNames.GetInstance(tagObj, true); + break; + default: + throw new ArgumentException("unknown tag in Holder"); + } + + this.version = 0; + } + + /** + * Constructor for a holder for an v2 attribute certificate. * + * + * @param seq The ASN.1 sequence. + */ + private Holder( + Asn1Sequence seq) + { + if (seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject tObj = Asn1TaggedObject.GetInstance(seq[i]); + + switch (tObj.TagNo) + { + case 0: + baseCertificateID = IssuerSerial.GetInstance(tObj, false); + break; + case 1: + entityName = GeneralNames.GetInstance(tObj, false); + break; + case 2: + objectDigestInfo = ObjectDigestInfo.GetInstance(tObj, false); + break; + default: + throw new ArgumentException("unknown tag in Holder"); + } + } + + this.version = 1; + } + + public Holder( + IssuerSerial baseCertificateID) + : this(baseCertificateID, 1) + { + } + + /** + * Constructs a holder from a IssuerSerial. + * @param baseCertificateID The IssuerSerial. + * @param version The version of the attribute certificate. + */ + public Holder( + IssuerSerial baseCertificateID, + int version) + { + this.baseCertificateID = baseCertificateID; + this.version = version; + } + + /** + * Returns 1 for v2 attribute certificates or 0 for v1 attribute + * certificates. + * @return The version of the attribute certificate. + */ + public int Version + { + get { return version; } + } + + /** + * Constructs a holder with an entityName for v2 attribute certificates or + * with a subjectName for v1 attribute certificates. + * + * @param entityName The entity or subject name. + */ + public Holder( + GeneralNames entityName) + : this(entityName, 1) + { + } + + /** + * Constructs a holder with an entityName for v2 attribute certificates or + * with a subjectName for v1 attribute certificates. + * + * @param entityName The entity or subject name. + * @param version The version of the attribute certificate. + */ + public Holder( + GeneralNames entityName, + int version) + { + this.entityName = entityName; + this.version = version; + } + + /** + * Constructs a holder from an object digest info. + * + * @param objectDigestInfo The object digest info object. + */ + public Holder( + ObjectDigestInfo objectDigestInfo) + { + this.objectDigestInfo = objectDigestInfo; + this.version = 1; + } + + public IssuerSerial BaseCertificateID + { + get { return baseCertificateID; } + } + + /** + * Returns the entityName for an v2 attribute certificate or the subjectName + * for an v1 attribute certificate. + * + * @return The entityname or subjectname. + */ + public GeneralNames EntityName + { + get { return entityName; } + } + + public ObjectDigestInfo ObjectDigestInfo + { + get { return objectDigestInfo; } + } + + /** + * The Holder object. + *
+         *  Holder ::= Sequence {
+         *        baseCertificateID   [0] IssuerSerial OPTIONAL,
+         *                 -- the issuer and serial number of
+         *                 -- the holder's Public Key Certificate
+         *        entityName          [1] GeneralNames OPTIONAL,
+         *                 -- the name of the claimant or role
+         *        objectDigestInfo    [2] ObjectDigestInfo OPTIONAL
+         *                 -- used to directly authenticate the holder,
+         *                 -- for example, an executable
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + if (version == 1) + { + Asn1EncodableVector v = new Asn1EncodableVector(3); + v.AddOptionalTagged(false, 0, baseCertificateID); + v.AddOptionalTagged(false, 1, entityName); + v.AddOptionalTagged(false, 2, objectDigestInfo); + return new DerSequence(v); + } + + if (entityName != null) + { + return new DerTaggedObject(true, 1, entityName); + } + + return new DerTaggedObject(true, 0, baseCertificateID); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs.meta new file mode 100644 index 00000000..70589454 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 87729a565cf00014a8d55f27e4fdd8c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Holder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs new file mode 100644 index 00000000..675ff437 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs @@ -0,0 +1,156 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Implementation of IetfAttrSyntax as specified by RFC3281. + */ + public class IetfAttrSyntax + : Asn1Encodable + { + public const int ValueOctets = 1; + public const int ValueOid = 2; + public const int ValueUtf8 = 3; + + internal readonly GeneralNames policyAuthority; + internal readonly Asn1EncodableVector values = new Asn1EncodableVector(); + + internal int valueChoice = -1; + + /** + * + */ + public IetfAttrSyntax( + Asn1Sequence seq) + { + int i = 0; + + if (seq[0] is Asn1TaggedObject) + { + policyAuthority = GeneralNames.GetInstance(((Asn1TaggedObject)seq[0]), false); + i++; + } + else if (seq.Count == 2) + { // VOMS fix + policyAuthority = GeneralNames.GetInstance(seq[0]); + i++; + } + + if (!(seq[i] is Asn1Sequence)) + { + throw new ArgumentException("Non-IetfAttrSyntax encoding"); + } + + seq = (Asn1Sequence) seq[i]; + + foreach (Asn1Object obj in seq) + { + int type; + + if (obj is DerObjectIdentifier) + { + type = ValueOid; + } + else if (obj is DerUtf8String) + { + type = ValueUtf8; + } + else if (obj is DerOctetString) + { + type = ValueOctets; + } + else + { + throw new ArgumentException("Bad value type encoding IetfAttrSyntax"); + } + + if (valueChoice < 0) + { + valueChoice = type; + } + + if (type != valueChoice) + { + throw new ArgumentException("Mix of value types in IetfAttrSyntax"); + } + + values.Add(obj); + } + } + + public GeneralNames PolicyAuthority + { + get { return policyAuthority; } + } + + public int ValueType + { + get { return valueChoice; } + } + + public object[] GetValues() + { + if (this.ValueType == ValueOctets) + { + Asn1OctetString[] tmp = new Asn1OctetString[values.Count]; + + for (int i = 0; i != tmp.Length; i++) + { + tmp[i] = (Asn1OctetString) values[i]; + } + + return tmp; + } + + if (this.ValueType == ValueOid) + { + DerObjectIdentifier[] tmp = new DerObjectIdentifier[values.Count]; + + for (int i = 0; i != tmp.Length; i++) + { + tmp[i] = (DerObjectIdentifier) values[i]; + } + + return tmp; + } + + { + DerUtf8String[] tmp = new DerUtf8String[values.Count]; + + for (int i = 0; i != tmp.Length; i++) + { + tmp[i] = (DerUtf8String) values[i]; + } + + return tmp; + } + } + + /** + * + *
+         *
+         *  IetfAttrSyntax ::= Sequence {
+         *    policyAuthority [0] GeneralNames OPTIONAL,
+         *    values Sequence OF CHOICE {
+         *      octets OCTET STRING,
+         *      oid OBJECT IDENTIFIER,
+         *      string UTF8String
+         *    }
+         *  }
+         *
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(true, 0, policyAuthority); + v.Add(new DerSequence(values)); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs.meta new file mode 100644 index 00000000..476cf099 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8fd2111883da7e247add4fa9224dd419 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IetfAttrSyntax.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs new file mode 100644 index 00000000..77279907 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class IssuerSerial + : Asn1Encodable + { + internal readonly GeneralNames issuer; + internal readonly DerInteger serial; + internal readonly DerBitString issuerUid; + + public static IssuerSerial GetInstance( + object obj) + { + if (obj == null || obj is IssuerSerial) + { + return (IssuerSerial) obj; + } + + if (obj is Asn1Sequence) + { + return new IssuerSerial((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static IssuerSerial GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + private IssuerSerial( + Asn1Sequence seq) + { + if (seq.Count != 2 && seq.Count != 3) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + issuer = GeneralNames.GetInstance(seq[0]); + serial = DerInteger.GetInstance(seq[1]); + + if (seq.Count == 3) + { + issuerUid = DerBitString.GetInstance(seq[2]); + } + } + + public IssuerSerial( + GeneralNames issuer, + DerInteger serial) + { + this.issuer = issuer; + this.serial = serial; + } + + public GeneralNames Issuer + { + get { return issuer; } + } + + public DerInteger Serial + { + get { return serial; } + } + + public DerBitString IssuerUid + { + get { return issuerUid; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  IssuerSerial  ::=  Sequence {
+         *       issuer         GeneralNames,
+         *       serial         CertificateSerialNumber,
+         *       issuerUid      UniqueIdentifier OPTIONAL
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(issuer, serial); + v.AddOptional(issuerUid); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs.meta new file mode 100644 index 00000000..cd949741 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9309f0a3bd9c834479ae668b0b8d31a7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuerSerial.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs new file mode 100644 index 00000000..49bdafa8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs @@ -0,0 +1,241 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + *
+	 * IssuingDistributionPoint ::= SEQUENCE { 
+	 *   distributionPoint          [0] DistributionPointName OPTIONAL, 
+	 *   onlyContainsUserCerts      [1] BOOLEAN DEFAULT FALSE, 
+	 *   onlyContainsCACerts        [2] BOOLEAN DEFAULT FALSE, 
+	 *   onlySomeReasons            [3] ReasonFlags OPTIONAL, 
+	 *   indirectCRL                [4] BOOLEAN DEFAULT FALSE,
+	 *   onlyContainsAttributeCerts [5] BOOLEAN DEFAULT FALSE }
+	 * 
+ */ + public class IssuingDistributionPoint + : Asn1Encodable + { + private readonly DistributionPointName _distributionPoint; + private readonly bool _onlyContainsUserCerts; + private readonly bool _onlyContainsCACerts; + private readonly ReasonFlags _onlySomeReasons; + private readonly bool _indirectCRL; + private readonly bool _onlyContainsAttributeCerts; + + private readonly Asn1Sequence seq; + + public static IssuingDistributionPoint GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static IssuingDistributionPoint GetInstance( + object obj) + { + if (obj == null || obj is IssuingDistributionPoint) + { + return (IssuingDistributionPoint) obj; + } + + if (obj is Asn1Sequence) + { + return new IssuingDistributionPoint((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from given details. + * + * @param distributionPoint + * May contain an URI as pointer to most current CRL. + * @param onlyContainsUserCerts Covers revocation information for end certificates. + * @param onlyContainsCACerts Covers revocation information for CA certificates. + * + * @param onlySomeReasons + * Which revocation reasons does this point cover. + * @param indirectCRL + * If true then the CRL contains revocation + * information about certificates ssued by other CAs. + * @param onlyContainsAttributeCerts Covers revocation information for attribute certificates. + */ + public IssuingDistributionPoint( + DistributionPointName distributionPoint, + bool onlyContainsUserCerts, + bool onlyContainsCACerts, + ReasonFlags onlySomeReasons, + bool indirectCRL, + bool onlyContainsAttributeCerts) + { + this._distributionPoint = distributionPoint; + this._indirectCRL = indirectCRL; + this._onlyContainsAttributeCerts = onlyContainsAttributeCerts; + this._onlyContainsCACerts = onlyContainsCACerts; + this._onlyContainsUserCerts = onlyContainsUserCerts; + this._onlySomeReasons = onlySomeReasons; + + Asn1EncodableVector vec = new Asn1EncodableVector(); + if (distributionPoint != null) + { // CHOICE item so explicitly tagged + vec.Add(new DerTaggedObject(true, 0, distributionPoint)); + } + if (onlyContainsUserCerts) + { + vec.Add(new DerTaggedObject(false, 1, DerBoolean.True)); + } + if (onlyContainsCACerts) + { + vec.Add(new DerTaggedObject(false, 2, DerBoolean.True)); + } + if (onlySomeReasons != null) + { + vec.Add(new DerTaggedObject(false, 3, onlySomeReasons)); + } + if (indirectCRL) + { + vec.Add(new DerTaggedObject(false, 4, DerBoolean.True)); + } + if (onlyContainsAttributeCerts) + { + vec.Add(new DerTaggedObject(false, 5, DerBoolean.True)); + } + + seq = new DerSequence(vec); + } + + /** + * Constructor from Asn1Sequence + */ + private IssuingDistributionPoint( + Asn1Sequence seq) + { + this.seq = seq; + + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(seq[i]); + + switch (o.TagNo) + { + case 0: + // CHOICE so explicit + _distributionPoint = DistributionPointName.GetInstance(o, true); + break; + case 1: + _onlyContainsUserCerts = DerBoolean.GetInstance(o, false).IsTrue; + break; + case 2: + _onlyContainsCACerts = DerBoolean.GetInstance(o, false).IsTrue; + break; + case 3: + _onlySomeReasons = new ReasonFlags(ReasonFlags.GetInstance(o, false)); + break; + case 4: + _indirectCRL = DerBoolean.GetInstance(o, false).IsTrue; + break; + case 5: + _onlyContainsAttributeCerts = DerBoolean.GetInstance(o, false).IsTrue; + break; + default: + throw new ArgumentException("unknown tag in IssuingDistributionPoint"); + } + } + } + + public bool OnlyContainsUserCerts + { + get { return _onlyContainsUserCerts; } + } + + public bool OnlyContainsCACerts + { + get { return _onlyContainsCACerts; } + } + + public bool IsIndirectCrl + { + get { return _indirectCRL; } + } + + public bool OnlyContainsAttributeCerts + { + get { return _onlyContainsAttributeCerts; } + } + + /** + * @return Returns the distributionPoint. + */ + public DistributionPointName DistributionPoint + { + get { return _distributionPoint; } + } + + /** + * @return Returns the onlySomeReasons. + */ + public ReasonFlags OnlySomeReasons + { + get { return _onlySomeReasons; } + } + + public override Asn1Object ToAsn1Object() + { + return seq; + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + buf.AppendLine("IssuingDistributionPoint: ["); + if (_distributionPoint != null) + { + AppendObject(buf, "distributionPoint", _distributionPoint.ToString()); + } + if (_onlyContainsUserCerts) + { + AppendObject(buf, "onlyContainsUserCerts", _onlyContainsUserCerts.ToString()); + } + if (_onlyContainsCACerts) + { + AppendObject(buf, "onlyContainsCACerts", _onlyContainsCACerts.ToString()); + } + if (_onlySomeReasons != null) + { + AppendObject(buf, "onlySomeReasons", _onlySomeReasons.ToString()); + } + if (_onlyContainsAttributeCerts) + { + AppendObject(buf, "onlyContainsAttributeCerts", _onlyContainsAttributeCerts.ToString()); + } + if (_indirectCRL) + { + AppendObject(buf, "indirectCRL", _indirectCRL.ToString()); + } + buf.AppendLine("]"); + return buf.ToString(); + } + + private void AppendObject(StringBuilder buf, string name, string val) + { + string indent = " "; + buf.Append(indent); + buf.Append(name); + buf.AppendLine(":"); + buf.Append(indent); + buf.Append(indent); + buf.Append(val); + buf.AppendLine(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs.meta new file mode 100644 index 00000000..29826c64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3c820e26e3cf663498bd64c4625d8a44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/IssuingDistributionPoint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs new file mode 100644 index 00000000..a938edb6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The KeyPurposeID object. + *
+     *     KeyPurposeID ::= OBJECT IDENTIFIER
+     * 
+ */ + public sealed class KeyPurposeID + : DerObjectIdentifier + { + private const string id_kp = "1.3.6.1.5.5.7.3"; + + private KeyPurposeID(string id) + : base(id) + { + } + + public static readonly KeyPurposeID AnyExtendedKeyUsage = new KeyPurposeID(X509Extensions.ExtendedKeyUsage.Id + ".0"); + + public static readonly KeyPurposeID id_kp_serverAuth = new KeyPurposeID(id_kp + ".1"); + public static readonly KeyPurposeID id_kp_clientAuth = new KeyPurposeID(id_kp + ".2"); + public static readonly KeyPurposeID id_kp_codeSigning = new KeyPurposeID(id_kp + ".3"); + public static readonly KeyPurposeID id_kp_emailProtection = new KeyPurposeID(id_kp + ".4"); + public static readonly KeyPurposeID id_kp_ipsecEndSystem = new KeyPurposeID(id_kp + ".5"); + public static readonly KeyPurposeID id_kp_ipsecTunnel = new KeyPurposeID(id_kp + ".6"); + public static readonly KeyPurposeID id_kp_ipsecUser = new KeyPurposeID(id_kp + ".7"); + public static readonly KeyPurposeID id_kp_timeStamping = new KeyPurposeID(id_kp + ".8"); + public static readonly KeyPurposeID id_kp_OCSPSigning = new KeyPurposeID(id_kp + ".9"); + public static readonly KeyPurposeID id_kp_dvcs = new KeyPurposeID(id_kp + ".10"); + public static readonly KeyPurposeID id_kp_sbgpCertAAServerAuth = new KeyPurposeID(id_kp + ".11"); + public static readonly KeyPurposeID id_kp_scvp_responder = new KeyPurposeID(id_kp + ".12"); + public static readonly KeyPurposeID id_kp_eapOverPPP = new KeyPurposeID(id_kp + ".13"); + public static readonly KeyPurposeID id_kp_eapOverLAN = new KeyPurposeID(id_kp + ".14"); + public static readonly KeyPurposeID id_kp_scvpServer = new KeyPurposeID(id_kp + ".15"); + public static readonly KeyPurposeID id_kp_scvpClient = new KeyPurposeID(id_kp + ".16"); + public static readonly KeyPurposeID id_kp_ipsecIKE = new KeyPurposeID(id_kp + ".17"); + public static readonly KeyPurposeID id_kp_capwapAC = new KeyPurposeID(id_kp + ".18"); + public static readonly KeyPurposeID id_kp_capwapWTP = new KeyPurposeID(id_kp + ".19"); + + public static readonly KeyPurposeID id_kp_cmcCA = new KeyPurposeID(id_kp + ".27"); + public static readonly KeyPurposeID id_kp_cmcRA = new KeyPurposeID(id_kp + ".28"); + public static readonly KeyPurposeID id_kp_cmKGA = new KeyPurposeID(id_kp + ".32"); + + // + // microsoft key purpose ids + // + public static readonly KeyPurposeID id_kp_smartcardlogon = new KeyPurposeID("1.3.6.1.4.1.311.20.2.2"); + + public static readonly KeyPurposeID id_kp_macAddress = new KeyPurposeID("1.3.6.1.1.1.1.22"); + + /// Microsoft Server Gated Crypto (msSGC). + /// see https://www.alvestrand.no/objectid/1.3.6.1.4.1.311.10.3.3.html + public static readonly KeyPurposeID id_kp_msSGC = new KeyPurposeID("1.3.6.1.4.1.311.10.3.3"); + + private const string id_pkinit = "1.3.6.1.5.2.3"; + + public static readonly KeyPurposeID scSysNodeNumber = new KeyPurposeID(id_pkinit + ".0"); + public static readonly KeyPurposeID id_pkinit_authData = new KeyPurposeID(id_pkinit + ".1"); + public static readonly KeyPurposeID id_pkinit_DHKeyData = new KeyPurposeID(id_pkinit + ".2"); + public static readonly KeyPurposeID id_pkinit_rkeyData = new KeyPurposeID(id_pkinit + ".3"); + public static readonly KeyPurposeID keyPurposeClientAuth = new KeyPurposeID(id_pkinit + ".4"); + public static readonly KeyPurposeID keyPurposeKdc = new KeyPurposeID(id_pkinit + ".5"); + + /// Netscape Server Gated Crypto (nsSGC). + /// see https://www.alvestrand.no/objectid/2.16.840.1.113730.4.1.html + public static readonly KeyPurposeID id_kp_nsSGC = new KeyPurposeID("2.16.840.1.113730.4.1"); + + + public static readonly KeyPurposeID IdKPServerAuth = id_kp_serverAuth; + + public static readonly KeyPurposeID IdKPClientAuth = id_kp_clientAuth; + + public static readonly KeyPurposeID IdKPCodeSigning = id_kp_codeSigning; + + public static readonly KeyPurposeID IdKPEmailProtection = id_kp_emailProtection; + + public static readonly KeyPurposeID IdKPIpsecEndSystem = id_kp_ipsecEndSystem; + + public static readonly KeyPurposeID IdKPIpsecTunnel = id_kp_ipsecTunnel; + + public static readonly KeyPurposeID IdKPIpsecUser = id_kp_ipsecUser; + + public static readonly KeyPurposeID IdKPTimeStamping = id_kp_timeStamping; + + public static readonly KeyPurposeID IdKPOcspSigning = id_kp_OCSPSigning; + + + public static readonly KeyPurposeID IdKPSmartCardLogon = id_kp_smartcardlogon; + + + public static readonly KeyPurposeID IdKPMacAddress = id_kp_macAddress; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs.meta new file mode 100644 index 00000000..3892f74e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 794f2c0ca74648a4e9adf54c1c131ee0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyPurposeId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs new file mode 100644 index 00000000..be965674 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs @@ -0,0 +1,82 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The KeyUsage object. + *
+     *    id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 }
+     *
+     *    KeyUsage ::= BIT STRING {
+     *         digitalSignature        (0),
+     *         nonRepudiation          (1),
+     *         keyEncipherment         (2),
+     *         dataEncipherment        (3),
+     *         keyAgreement            (4),
+     *         keyCertSign             (5),
+     *         cRLSign                 (6),
+     *         encipherOnly            (7),
+     *         decipherOnly            (8) }
+     * 
+ */ + public class KeyUsage + : DerBitString + { + public const int DigitalSignature = (1 << 7); + public const int NonRepudiation = (1 << 6); + public const int KeyEncipherment = (1 << 5); + public const int DataEncipherment = (1 << 4); + public const int KeyAgreement = (1 << 3); + public const int KeyCertSign = (1 << 2); + public const int CrlSign = (1 << 1); + public const int EncipherOnly = (1 << 0); + public const int DecipherOnly = (1 << 15); + + public static new KeyUsage GetInstance(object obj) + { + if (obj is KeyUsage) + return (KeyUsage)obj; + if (obj is X509Extension) + return GetInstance(X509Extension.ConvertValueToObject((X509Extension)obj)); + if (obj == null) + return null; + return new KeyUsage(DerBitString.GetInstance(obj)); + } + + public static KeyUsage FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.KeyUsage)); + } + + /** + * Basic constructor. + * + * @param usage - the bitwise OR of the Key Usage flags giving the + * allowed uses for the key. + * e.g. (KeyUsage.keyEncipherment | KeyUsage.dataEncipherment) + */ + public KeyUsage(int usage) + : base(usage) + { + } + + private KeyUsage( + DerBitString usage) + : base(usage.GetBytes(), usage.PadBits) + { + } + + public override string ToString() + { + byte[] data = GetBytes(); + if (data.Length == 1) + { + return "KeyUsage: 0x" + (data[0] & 0xff).ToString("X"); + } + + return "KeyUsage: 0x" + ((data[1] & 0xff) << 8 | (data[0] & 0xff)).ToString("X"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs.meta new file mode 100644 index 00000000..14649d18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 109e5f5c22da9a645b078b26ac284d8b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/KeyUsage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs new file mode 100644 index 00000000..9cac4813 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs @@ -0,0 +1,105 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class NameConstraints + : Asn1Encodable + { + private Asn1Sequence permitted, excluded; + + public static NameConstraints GetInstance( + object obj) + { + if (obj == null || obj is NameConstraints) + { + return (NameConstraints) obj; + } + + if (obj is Asn1Sequence) + { + return new NameConstraints((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public NameConstraints( + Asn1Sequence seq) + { + foreach (Asn1TaggedObject o in seq) + { + switch (o.TagNo) + { + case 0: + permitted = Asn1Sequence.GetInstance(o, false); + break; + case 1: + excluded = Asn1Sequence.GetInstance(o, false); + break; + } + } + } + + /** + * Constructor from a given details. + * + *

permitted and excluded are Vectors of GeneralSubtree objects.

+ * + * @param permitted Permitted subtrees + * @param excluded Excluded subtrees + */ + public NameConstraints( + IList permitted, + IList excluded) + { + if (permitted != null) + { + this.permitted = CreateSequence(permitted); + } + + if (excluded != null) + { + this.excluded = CreateSequence(excluded); + } + } + + private DerSequence CreateSequence(IList subtrees) + { + GeneralSubtree[] gsts = new GeneralSubtree[subtrees.Count]; + for (int i = 0; i < subtrees.Count; ++i) + { + gsts[i] = subtrees[i]; + } + return new DerSequence(gsts); + } + + public Asn1Sequence PermittedSubtrees + { + get { return permitted; } + } + + public Asn1Sequence ExcludedSubtrees + { + get { return excluded; } + } + + /* + * NameConstraints ::= SEQUENCE { permittedSubtrees [0] GeneralSubtrees + * OPTIONAL, excludedSubtrees [1] GeneralSubtrees OPTIONAL } + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, permitted); + v.AddOptionalTagged(false, 1, excluded); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs.meta new file mode 100644 index 00000000..170e97e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1742cc96c071e6f4098f85e6da1a8a6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NameConstraints.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs new file mode 100644 index 00000000..ce0ef26e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs @@ -0,0 +1,147 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * NoticeReference class, used in + * CertificatePolicies X509 V3 extensions + * (in policy qualifiers). + * + *
+     *  NoticeReference ::= Sequence {
+     *      organization     DisplayText,
+     *      noticeNumbers    Sequence OF Integer }
+     *
+     * 
+ * + * @see PolicyQualifierInfo + * @see PolicyInformation + */ + public class NoticeReference + : Asn1Encodable + { + private readonly DisplayText organization; + private readonly Asn1Sequence noticeNumbers; + + private static Asn1EncodableVector ConvertVector(IList numbers) + { + Asn1EncodableVector av = new Asn1EncodableVector(); + + foreach (object o in numbers) + { + DerInteger di; + + if (o is BigInteger) + { + di = new DerInteger((BigInteger)o); + } + else if (o is int) + { + di = new DerInteger((int)o); + } + else + { + throw new ArgumentException(); + } + + av.Add(di); + } + return av; + } + + /** + * Creates a new NoticeReference instance. + * + * @param organization a String value + * @param numbers a Vector value + */ + public NoticeReference(string organization, IList numbers) + : this(organization, ConvertVector(numbers)) + { + } + + /** + * Creates a new NoticeReference instance. + * + * @param organization a String value + * @param noticeNumbers an ASN1EncodableVector value + */ + public NoticeReference(string organization, Asn1EncodableVector noticeNumbers) + : this(new DisplayText(organization), noticeNumbers) + { + } + + /** + * Creates a new NoticeReference instance. + * + * @param organization displayText + * @param noticeNumbers an ASN1EncodableVector value + */ + public NoticeReference(DisplayText organization, Asn1EncodableVector noticeNumbers) + { + this.organization = organization; + this.noticeNumbers = new DerSequence(noticeNumbers); + } + + /** + * Creates a new NoticeReference instance. + *

Useful for reconstructing a NoticeReference + * instance from its encodable/encoded form.

+ * + * @param as an Asn1Sequence value obtained from either + * calling @{link ToAsn1Object()} for a NoticeReference + * instance or from parsing it from a Der-encoded stream. + */ + private NoticeReference(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + organization = DisplayText.GetInstance(seq[0]); + noticeNumbers = Asn1Sequence.GetInstance(seq[1]); + } + + public static NoticeReference GetInstance(object obj) + { + if (obj is NoticeReference) + return (NoticeReference)obj; + if (obj == null) + return null; + return new NoticeReference(Asn1Sequence.GetInstance(obj)); + } + + public virtual DisplayText Organization + { + get { return organization; } + } + + public virtual DerInteger[] GetNoticeNumbers() + { + DerInteger[] tmp = new DerInteger[noticeNumbers.Count]; + + for (int i = 0; i != noticeNumbers.Count; ++i) + { + tmp[i] = DerInteger.GetInstance(noticeNumbers[i]); + } + + return tmp; + } + + /** + * Describe ToAsn1Object method here. + * + * @return a Asn1Object value + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(organization, noticeNumbers); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs.meta new file mode 100644 index 00000000..12db49ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 877f7a64335a78a43a721cf38f293056 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/NoticeReference.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs new file mode 100644 index 00000000..68d4ef5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs @@ -0,0 +1,177 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * ObjectDigestInfo ASN.1 structure used in v2 attribute certificates. + * + *
+	 *  
+	 *    ObjectDigestInfo ::= SEQUENCE {
+	 *         digestedObjectType  ENUMERATED {
+	 *                 publicKey            (0),
+	 *                 publicKeyCert        (1),
+	 *                 otherObjectTypes     (2) },
+	 *                         -- otherObjectTypes MUST NOT
+	 *                         -- be used in this profile
+	 *         otherObjectTypeID   OBJECT IDENTIFIER OPTIONAL,
+	 *         digestAlgorithm     AlgorithmIdentifier,
+	 *         objectDigest        BIT STRING
+	 *    }
+	 *   
+	 * 
+ * + */ + public class ObjectDigestInfo + : Asn1Encodable + { + /** + * The public key is hashed. + */ + public const int PublicKey = 0; + + /** + * The public key certificate is hashed. + */ + public const int PublicKeyCert = 1; + + /** + * An other object is hashed. + */ + public const int OtherObjectDigest = 2; + + internal readonly DerEnumerated digestedObjectType; + internal readonly DerObjectIdentifier otherObjectTypeID; + internal readonly AlgorithmIdentifier digestAlgorithm; + internal readonly DerBitString objectDigest; + + public static ObjectDigestInfo GetInstance( + object obj) + { + if (obj == null || obj is ObjectDigestInfo) + { + return (ObjectDigestInfo) obj; + } + + if (obj is Asn1Sequence) + { + return new ObjectDigestInfo((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public static ObjectDigestInfo GetInstance( + Asn1TaggedObject obj, + bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + /** + * Constructor from given details. + *

+ * If digestedObjectType is not {@link #publicKeyCert} or + * {@link #publicKey} otherObjectTypeID must be given, + * otherwise it is ignored.

+ * + * @param digestedObjectType The digest object type. + * @param otherObjectTypeID The object type ID for + * otherObjectDigest. + * @param digestAlgorithm The algorithm identifier for the hash. + * @param objectDigest The hash value. + */ + public ObjectDigestInfo( + int digestedObjectType, + string otherObjectTypeID, + AlgorithmIdentifier digestAlgorithm, + byte[] objectDigest) + { + this.digestedObjectType = new DerEnumerated(digestedObjectType); + + if (digestedObjectType == OtherObjectDigest) + { + this.otherObjectTypeID = new DerObjectIdentifier(otherObjectTypeID); + } + + this.digestAlgorithm = digestAlgorithm; + + this.objectDigest = new DerBitString(objectDigest); + } + + private ObjectDigestInfo( + Asn1Sequence seq) + { + if (seq.Count > 4 || seq.Count < 3) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + digestedObjectType = DerEnumerated.GetInstance(seq[0]); + + int offset = 0; + + if (seq.Count == 4) + { + otherObjectTypeID = DerObjectIdentifier.GetInstance(seq[1]); + offset++; + } + + digestAlgorithm = AlgorithmIdentifier.GetInstance(seq[1 + offset]); + objectDigest = DerBitString.GetInstance(seq[2 + offset]); + } + + public DerEnumerated DigestedObjectType + { + get { return digestedObjectType; } + } + + public DerObjectIdentifier OtherObjectTypeID + { + get { return otherObjectTypeID; } + } + + public AlgorithmIdentifier DigestAlgorithm + { + get { return digestAlgorithm; } + } + + public DerBitString ObjectDigest + { + get { return objectDigest; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + *
+		 *  
+		 *    ObjectDigestInfo ::= SEQUENCE {
+		 *         digestedObjectType  ENUMERATED {
+		 *                 publicKey            (0),
+		 *                 publicKeyCert        (1),
+		 *                 otherObjectTypes     (2) },
+		 *                         -- otherObjectTypes MUST NOT
+		 *                         -- be used in this profile
+		 *         otherObjectTypeID   OBJECT IDENTIFIER OPTIONAL,
+		 *         digestAlgorithm     AlgorithmIdentifier,
+		 *         objectDigest        BIT STRING
+		 *    }
+		 *   
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(digestedObjectType); + v.AddOptional(otherObjectTypeID); + v.Add(digestAlgorithm, objectDigest); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs.meta new file mode 100644 index 00000000..f3b4cbc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a9bb1fd989a68b6419e3961c4ef4aba8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ObjectDigestInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs new file mode 100644 index 00000000..6749743b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The OtherName object. + *
+     * OtherName ::= SEQUENCE {
+     *      type-id    OBJECT IDENTIFIER,
+     *      value      [0] EXPLICIT ANY DEFINED BY type-id }
+     * 
+ */ + public class OtherName + : Asn1Encodable + { + private readonly DerObjectIdentifier typeID; + private readonly Asn1Encodable value; + + /** + * OtherName factory method. + * @param obj the object used to construct an instance of + * OtherName. It must be an instance of OtherName + * or ASN1Sequence. + * @return the instance of OtherName built from the + * supplied object. + * @throws java.lang.IllegalArgumentException if the object passed + * to the factory is not an instance of OtherName or something that + * can be converted into an appropriate ASN1Sequence. + */ + public static OtherName GetInstance(object obj) + { + if (obj is OtherName) + return (OtherName)obj; + if (obj == null) + return null; + return new OtherName(Asn1Sequence.GetInstance(obj)); + } + + /** + * Base constructor. + * @param typeID the type of the other name. + * @param value the ANY object that represents the value. + */ + public OtherName(DerObjectIdentifier typeID, Asn1Encodable value) + { + this.typeID = typeID; + this.value = value; + } + + private OtherName(Asn1Sequence seq) + { + this.typeID = DerObjectIdentifier.GetInstance(seq[0]); + this.value = DerTaggedObject.GetInstance(seq[1]).GetObject(); // explicitly tagged + } + + public virtual DerObjectIdentifier TypeID + { + get { return typeID; } + } + + public Asn1Encodable Value + { + get { return value; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(typeID, new DerTaggedObject(true, 0, value)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs.meta new file mode 100644 index 00000000..fc6e64d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4029718e1f966e34ab87198e9729d02e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/OtherName.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs new file mode 100644 index 00000000..19dfefc3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class PolicyInformation + : Asn1Encodable + { + private readonly DerObjectIdentifier policyIdentifier; + private readonly Asn1Sequence policyQualifiers; + + private PolicyInformation( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + policyIdentifier = DerObjectIdentifier.GetInstance(seq[0]); + + if (seq.Count > 1) + { + policyQualifiers = Asn1Sequence.GetInstance(seq[1]); + } + } + + public PolicyInformation( + DerObjectIdentifier policyIdentifier) + { + this.policyIdentifier = policyIdentifier; + } + + public PolicyInformation( + DerObjectIdentifier policyIdentifier, + Asn1Sequence policyQualifiers) + { + this.policyIdentifier = policyIdentifier; + this.policyQualifiers = policyQualifiers; + } + + public static PolicyInformation GetInstance( + object obj) + { + if (obj == null || obj is PolicyInformation) + { + return (PolicyInformation) obj; + } + + return new PolicyInformation(Asn1Sequence.GetInstance(obj)); + } + + public DerObjectIdentifier PolicyIdentifier + { + get { return policyIdentifier; } + } + + public Asn1Sequence PolicyQualifiers + { + get { return policyQualifiers; } + } + + /* + * PolicyInformation ::= Sequence { + * policyIdentifier CertPolicyId, + * policyQualifiers Sequence SIZE (1..MAX) OF + * PolicyQualifierInfo OPTIONAL } + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(policyIdentifier); + v.AddOptional(policyQualifiers); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs.meta new file mode 100644 index 00000000..c71209b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4fde026e7283aaf469e8ffa39f27a34e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs new file mode 100644 index 00000000..891d2541 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * PolicyMappings V3 extension, described in RFC3280. + *
+	 *    PolicyMappings ::= Sequence SIZE (1..MAX) OF Sequence {
+	 *      issuerDomainPolicy      CertPolicyId,
+	 *      subjectDomainPolicy     CertPolicyId }
+	 * 
+ * + * @see RFC 3280, section 4.2.1.6 + */ + public class PolicyMappings + : Asn1Encodable + { + private readonly Asn1Sequence seq; + + /** + * Creates a new PolicyMappings instance. + * + * @param seq an Asn1Sequence constructed as specified + * in RFC 3280 + */ + public PolicyMappings( + Asn1Sequence seq) + { + this.seq = seq; + } + + /** + * Creates a new PolicyMappings instance. + * + * @param mappings a HashMap value that maps + * string oids + * to other string oids. + */ + public PolicyMappings(IDictionary mappings) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + foreach (var entry in mappings) + { + string idp = entry.Key; + string sdp = entry.Value; + + v.Add( + new DerSequence( + new DerObjectIdentifier(idp), + new DerObjectIdentifier(sdp))); + } + + seq = new DerSequence(v); + } + + public override Asn1Object ToAsn1Object() + { + return seq; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs.meta new file mode 100644 index 00000000..ef80c158 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79e3f73ba2740c14b84ce885cb40a4ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyMappings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs new file mode 100644 index 00000000..a401f3bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * PolicyQualifierId, used in the CertificatePolicies + * X509V3 extension. + * + *
+	 *    id-qt          OBJECT IDENTIFIER ::=  { id-pkix 2 }
+	 *    id-qt-cps      OBJECT IDENTIFIER ::=  { id-qt 1 }
+	 *    id-qt-unotice  OBJECT IDENTIFIER ::=  { id-qt 2 }
+	 *  PolicyQualifierId ::=
+	 *       OBJECT IDENTIFIER ( id-qt-cps | id-qt-unotice )
+	 * 
+ */ + public sealed class PolicyQualifierID : DerObjectIdentifier + { + private const string IdQt = "1.3.6.1.5.5.7.2"; + + private PolicyQualifierID( + string id) + : base(id) + { + } + + public static readonly PolicyQualifierID IdQtCps = new PolicyQualifierID(IdQt + ".1"); + public static readonly PolicyQualifierID IdQtUnotice = new PolicyQualifierID(IdQt + ".2"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs.meta new file mode 100644 index 00000000..3d8ed326 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 603b3a74f16f32d45aa6e6343fae7e51 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs new file mode 100644 index 00000000..d39eff1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Policy qualifiers, used in the X509V3 CertificatePolicies + * extension. + * + *
+     *   PolicyQualifierInfo ::= Sequence {
+     *       policyQualifierId  PolicyQualifierId,
+     *       qualifier          ANY DEFINED BY policyQualifierId }
+     * 
+ */ + public class PolicyQualifierInfo + : Asn1Encodable + { + private readonly DerObjectIdentifier policyQualifierId; + private readonly Asn1Encodable qualifier; + + /** + * Creates a new PolicyQualifierInfo instance. + * + * @param policyQualifierId a PolicyQualifierId value + * @param qualifier the qualifier, defined by the above field. + */ + public PolicyQualifierInfo( + DerObjectIdentifier policyQualifierId, + Asn1Encodable qualifier) + { + this.policyQualifierId = policyQualifierId; + this.qualifier = qualifier; + } + + /** + * Creates a new PolicyQualifierInfo containing a + * cPSuri qualifier. + * + * @param cps the CPS (certification practice statement) uri as a + * string. + */ + public PolicyQualifierInfo( + string cps) + { + policyQualifierId = PolicyQualifierID.IdQtCps; + qualifier = new DerIA5String(cps); + } + + /** + * Creates a new PolicyQualifierInfo instance. + * + * @param as PolicyQualifierInfo X509 structure + * encoded as an Asn1Sequence. + */ + private PolicyQualifierInfo( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + policyQualifierId = DerObjectIdentifier.GetInstance(seq[0]); + qualifier = seq[1]; + } + + public static PolicyQualifierInfo GetInstance( + object obj) + { + if (obj is PolicyQualifierInfo) + return (PolicyQualifierInfo)obj; + if (obj == null) + return null; + return new PolicyQualifierInfo(Asn1Sequence.GetInstance(obj)); + } + + public virtual DerObjectIdentifier PolicyQualifierId + { + get { return policyQualifierId; } + } + + public virtual Asn1Encodable Qualifier + { + get { return qualifier; } + } + + /** + * Returns a Der-encodable representation of this instance. + * + * @return a Asn1Object value + */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(policyQualifierId, qualifier); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs.meta new file mode 100644 index 00000000..794a84b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5432c3ce43f6ca34bac84a4b39169d19 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PolicyQualifierInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs new file mode 100644 index 00000000..a709c694 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /// + ///
+	/// PrivateKeyUsagePeriod ::= SEQUENCE
+	/// {
+	/// notBefore       [0]     GeneralizedTime OPTIONAL,
+	/// notAfter        [1]     GeneralizedTime OPTIONAL }
+	/// 
+ ///
+ public class PrivateKeyUsagePeriod + : Asn1Encodable + { + public static PrivateKeyUsagePeriod GetInstance( + object obj) + { + if (obj is PrivateKeyUsagePeriod) + { + return (PrivateKeyUsagePeriod) obj; + } + + if (obj is Asn1Sequence) + { + return new PrivateKeyUsagePeriod((Asn1Sequence) obj); + } + + if (obj is X509Extension) + { + return GetInstance(X509Extension.ConvertValueToObject((X509Extension) obj)); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private Asn1GeneralizedTime _notBefore, _notAfter; + + private PrivateKeyUsagePeriod( + Asn1Sequence seq) + { + foreach (Asn1TaggedObject tObj in seq) + { + if (tObj.TagNo == 0) + { + _notBefore = Asn1GeneralizedTime.GetInstance(tObj, false); + } + else if (tObj.TagNo == 1) + { + _notAfter = Asn1GeneralizedTime.GetInstance(tObj, false); + } + } + } + + public Asn1GeneralizedTime NotBefore + { + get { return _notBefore; } + } + + public Asn1GeneralizedTime NotAfter + { + get { return _notAfter; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, _notBefore); + v.AddOptionalTagged(false, 1, _notAfter); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs.meta new file mode 100644 index 00000000..e5f552ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8dfe6e64c057fd42a93d7bd397946e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/PrivateKeyUsagePeriod.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs new file mode 100644 index 00000000..b848e00a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class RsaPublicKeyStructure + : Asn1Encodable + { + private BigInteger modulus; + private BigInteger publicExponent; + + public static RsaPublicKeyStructure GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static RsaPublicKeyStructure GetInstance( + object obj) + { + if (obj == null || obj is RsaPublicKeyStructure) + { + return (RsaPublicKeyStructure) obj; + } + + if (obj is Asn1Sequence) + { + return new RsaPublicKeyStructure((Asn1Sequence) obj); + } + + throw new ArgumentException("Invalid RsaPublicKeyStructure: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + public RsaPublicKeyStructure( + BigInteger modulus, + BigInteger publicExponent) + { + if (modulus == null) + throw new ArgumentNullException("modulus"); + if (publicExponent == null) + throw new ArgumentNullException("publicExponent"); + if (modulus.SignValue <= 0) + throw new ArgumentException("Not a valid RSA modulus", "modulus"); + if (publicExponent.SignValue <= 0) + throw new ArgumentException("Not a valid RSA public exponent", "publicExponent"); + + this.modulus = modulus; + this.publicExponent = publicExponent; + } + + private RsaPublicKeyStructure( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + // Note: we are accepting technically incorrect (i.e. negative) values here + modulus = DerInteger.GetInstance(seq[0]).PositiveValue; + publicExponent = DerInteger.GetInstance(seq[1]).PositiveValue; + } + + public BigInteger Modulus + { + get { return modulus; } + } + + public BigInteger PublicExponent + { + get { return publicExponent; } + } + + /** + * This outputs the key in Pkcs1v2 format. + *
+         *      RSAPublicKey ::= Sequence {
+         *                          modulus Integer, -- n
+         *                          publicExponent Integer, -- e
+         *                      }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence( + new DerInteger(Modulus), + new DerInteger(PublicExponent)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs.meta new file mode 100644 index 00000000..d7299f93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e69185bf5672f942bc90bd2fd5c8dcc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RSAPublicKeyStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs new file mode 100644 index 00000000..ea756ef2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The ReasonFlags object. + *
+     * ReasonFlags ::= BIT STRING {
+     *    unused(0),
+     *    keyCompromise(1),
+     *    cACompromise(2),
+     *    affiliationChanged(3),
+     *    superseded(4),
+     *    cessationOfOperation(5),
+     *    certficateHold(6)
+     * }
+     * 
+ */ + public class ReasonFlags + : DerBitString + { + public const int Unused = (1 << 7); + public const int KeyCompromise = (1 << 6); + public const int CACompromise = (1 << 5); + public const int AffiliationChanged = (1 << 4); + public const int Superseded = (1 << 3); + public const int CessationOfOperation = (1 << 2); + public const int CertificateHold = (1 << 1); + public const int PrivilegeWithdrawn = (1 << 0); + public const int AACompromise = (1 << 15); + + /** + * @param reasons - the bitwise OR of the Key Reason flags giving the + * allowed uses for the key. + */ + public ReasonFlags(int reasons) + : base(reasons) + { + } + + public ReasonFlags( + DerBitString reasons) + : base(reasons.GetBytes(), reasons.PadBits) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs.meta new file mode 100644 index 00000000..09e99c74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2a7df27c00f970a4abf5b2d0a8b87f42 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/ReasonFlags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs new file mode 100644 index 00000000..46c6e0e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs @@ -0,0 +1,228 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Implementation of the RoleSyntax object as specified by the RFC3281. + * + *
+	* RoleSyntax ::= SEQUENCE {
+	*                 roleAuthority  [0] GeneralNames OPTIONAL,
+	*                 roleName       [1] GeneralName
+	*           }
+	* 
+ */ + public class RoleSyntax + : Asn1Encodable + { + private readonly GeneralNames roleAuthority; + private readonly GeneralName roleName; + + /** + * RoleSyntax factory method. + * @param obj the object used to construct an instance of + * RoleSyntax. It must be an instance of RoleSyntax + * or Asn1Sequence. + * @return the instance of RoleSyntax built from the + * supplied object. + * @throws java.lang.ArgumentException if the object passed + * to the factory is not an instance of RoleSyntax or + * Asn1Sequence. + */ + public static RoleSyntax GetInstance( + object obj) + { + if (obj is RoleSyntax) + return (RoleSyntax)obj; + + if (obj != null) + return new RoleSyntax(Asn1Sequence.GetInstance(obj)); + + return null; + } + + /** + * Constructor. + * @param roleAuthority the role authority of this RoleSyntax. + * @param roleName the role name of this RoleSyntax. + */ + public RoleSyntax( + GeneralNames roleAuthority, + GeneralName roleName) + { + if (roleName == null + || roleName.TagNo != GeneralName.UniformResourceIdentifier + || ((IAsn1String) roleName.Name).GetString().Equals("")) + { + throw new ArgumentException("the role name MUST be non empty and MUST " + + "use the URI option of GeneralName"); + } + + this.roleAuthority = roleAuthority; + this.roleName = roleName; + } + + /** + * Constructor. Invoking this constructor is the same as invoking + * new RoleSyntax(null, roleName). + * @param roleName the role name of this RoleSyntax. + */ + public RoleSyntax( + GeneralName roleName) + : this(null, roleName) + { + } + + /** + * Utility constructor. Takes a string argument representing + * the role name, builds a GeneralName to hold the role name + * and calls the constructor that takes a GeneralName. + * @param roleName + */ + public RoleSyntax( + string roleName) + : this(new GeneralName(GeneralName.UniformResourceIdentifier, + (roleName == null)? "": roleName)) + { + } + + /** + * Constructor that builds an instance of RoleSyntax by + * extracting the encoded elements from the Asn1Sequence + * object supplied. + * @param seq an instance of Asn1Sequence that holds + * the encoded elements used to build this RoleSyntax. + */ + private RoleSyntax( + Asn1Sequence seq) + { + if (seq.Count < 1 || seq.Count > 2) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + for (int i = 0; i != seq.Count; i++) + { + Asn1TaggedObject taggedObject = Asn1TaggedObject.GetInstance(seq[i]); + switch (taggedObject.TagNo) + { + case 0: + roleAuthority = GeneralNames.GetInstance(taggedObject, false); + break; + case 1: + roleName = GeneralName.GetInstance(taggedObject, true); + break; + default: + throw new ArgumentException("Unknown tag in RoleSyntax"); + } + } + } + + /** + * Gets the role authority of this RoleSyntax. + * @return an instance of GeneralNames holding the + * role authority of this RoleSyntax. + */ + public GeneralNames RoleAuthority + { + get { return this.roleAuthority; } + } + + /** + * Gets the role name of this RoleSyntax. + * @return an instance of GeneralName holding the + * role name of this RoleSyntax. + */ + public GeneralName RoleName + { + get { return this.roleName; } + } + + /** + * Gets the role name as a java.lang.string object. + * @return the role name of this RoleSyntax represented as a + * string object. + */ + public string GetRoleNameAsString() + { + return ((IAsn1String) this.roleName.Name).GetString(); + } + + /** + * Gets the role authority as a string[] object. + * @return the role authority of this RoleSyntax represented as a + * string[] array. + */ + public string[] GetRoleAuthorityAsString() + { + if (roleAuthority == null) + { + return new string[0]; + } + + GeneralName[] names = roleAuthority.GetNames(); + string[] namesString = new string[names.Length]; + for(int i = 0; i < names.Length; i++) + { + Asn1Encodable asn1Value = names[i].Name; + if (asn1Value is IAsn1String) + { + namesString[i] = ((IAsn1String) asn1Value).GetString(); + } + else + { + namesString[i] = asn1Value.ToString(); + } + } + + return namesString; + } + + /** + * Implementation of the method ToAsn1Object as + * required by the superclass ASN1Encodable. + * + *
+		* RoleSyntax ::= SEQUENCE {
+		*                 roleAuthority  [0] GeneralNames OPTIONAL,
+		*                 roleName       [1] GeneralName
+		*           }
+		* 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptionalTagged(false, 0, roleAuthority); + v.Add(new DerTaggedObject(true, 1, roleName)); + return new DerSequence(v); + } + + public override string ToString() + { + StringBuilder buff = new StringBuilder("Name: " + this.GetRoleNameAsString() + + " - Auth: "); + + if (this.roleAuthority == null || roleAuthority.GetNames().Length == 0) + { + buff.Append("N/A"); + } + else + { + string[] names = this.GetRoleAuthorityAsString(); + buff.Append('[').Append(names[0]); + for(int i = 1; i < names.Length; i++) + { + buff.Append(", ").Append(names[i]); + } + buff.Append(']'); + } + + return buff.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs.meta new file mode 100644 index 00000000..6fd57ed6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d84b92d4f55d51d4cbba5f4886693fe8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/RoleSyntax.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs new file mode 100644 index 00000000..1f266610 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs @@ -0,0 +1,137 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * This extension may contain further X.500 attributes of the subject. See also + * RFC 3039. + * + *
+	 *     SubjectDirectoryAttributes ::= Attributes
+	 *     Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
+	 *     Attribute ::= SEQUENCE
+	 *     {
+	 *       type AttributeType
+	 *       values SET OF AttributeValue
+	 *     }
+	 *
+	 *     AttributeType ::= OBJECT IDENTIFIER
+	 *     AttributeValue ::= ANY DEFINED BY AttributeType
+	 * 
+ * + * @see org.bouncycastle.asn1.x509.X509Name for AttributeType ObjectIdentifiers. + */ + public class SubjectDirectoryAttributes + : Asn1Encodable + { + private readonly IList m_attributes; + + public static SubjectDirectoryAttributes GetInstance( + object obj) + { + if (obj == null || obj is SubjectDirectoryAttributes) + { + return (SubjectDirectoryAttributes) obj; + } + + if (obj is Asn1Sequence) + { + return new SubjectDirectoryAttributes((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + * + * The sequence is of type SubjectDirectoryAttributes: + * + *
+		 *      SubjectDirectoryAttributes ::= Attributes
+		 *      Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
+		 *      Attribute ::= SEQUENCE
+		 *      {
+		 *        type AttributeType
+		 *        values SET OF AttributeValue
+		 *      }
+		 *
+		 *      AttributeType ::= OBJECT IDENTIFIER
+		 *      AttributeValue ::= ANY DEFINED BY AttributeType
+		 * 
+ * + * @param seq + * The ASN.1 sequence. + */ + private SubjectDirectoryAttributes( + Asn1Sequence seq) + { + m_attributes = new List(); + + foreach (object o in seq) + { + Asn1Sequence s = Asn1Sequence.GetInstance(o); + m_attributes.Add(AttributeX509.GetInstance(s)); + } + } + + /** + * Constructor from an ArrayList of attributes. + * + * The ArrayList consists of attributes of type {@link Attribute Attribute} + * + * @param attributes The attributes. + * + */ + public SubjectDirectoryAttributes(IList attributes) + { + m_attributes = new List(attributes); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + * Returns: + * + *
+		 *      SubjectDirectoryAttributes ::= Attributes
+		 *      Attributes ::= SEQUENCE SIZE (1..MAX) OF Attribute
+		 *      Attribute ::= SEQUENCE
+		 *      {
+		 *        type AttributeType
+		 *        values SET OF AttributeValue
+		 *      }
+		 *
+		 *      AttributeType ::= OBJECT IDENTIFIER
+		 *      AttributeValue ::= ANY DEFINED BY AttributeType
+		 * 
+ * + * @return a DERObject + */ + public override Asn1Object ToAsn1Object() + { + AttributeX509[] v = new AttributeX509[m_attributes.Count]; + for (int i = 0; i < m_attributes.Count; ++i) + { + v[i] = m_attributes[i]; + } + return new DerSequence(v); + } + + /** + * @return Returns the attributes. + */ + public IEnumerable Attributes + { + get { return CollectionUtilities.Proxy(m_attributes); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs.meta new file mode 100644 index 00000000..198c4b80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e63f3e4524e010544b8d379637ab3a11 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectDirectoryAttributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs new file mode 100644 index 00000000..13818cab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The SubjectKeyIdentifier object. + *
+     * SubjectKeyIdentifier::= OCTET STRING
+     * 
+ */ + public class SubjectKeyIdentifier + : Asn1Encodable + { + public static SubjectKeyIdentifier GetInstance(Asn1TaggedObject obj, bool explicitly) + { + return GetInstance(Asn1OctetString.GetInstance(obj, explicitly)); + } + + public static SubjectKeyIdentifier GetInstance(object obj) + { + if (obj is SubjectKeyIdentifier) + return (SubjectKeyIdentifier)obj; + if (obj is SubjectPublicKeyInfo) + return new SubjectKeyIdentifier((SubjectPublicKeyInfo)obj); + if (obj is X509Extension) + return GetInstance(X509Extension.ConvertValueToObject((X509Extension)obj)); + if (obj == null) + return null; + return new SubjectKeyIdentifier(Asn1OctetString.GetInstance(obj)); + } + + public static SubjectKeyIdentifier FromExtensions(X509Extensions extensions) + { + return GetInstance(X509Extensions.GetExtensionParsedValue(extensions, X509Extensions.SubjectKeyIdentifier)); + } + + private readonly byte[] keyIdentifier; + + public SubjectKeyIdentifier( + byte[] keyID) + { + if (keyID == null) + throw new ArgumentNullException("keyID"); + + this.keyIdentifier = Arrays.Clone(keyID); + } + + public SubjectKeyIdentifier( + Asn1OctetString keyID) + : this(keyID.GetOctets()) + { + } + + /** + * Calculates the keyIdentifier using a SHA1 hash over the BIT STRING + * from SubjectPublicKeyInfo as defined in RFC3280. + * + * @param spki the subject public key info. + */ + public SubjectKeyIdentifier( + SubjectPublicKeyInfo spki) + { + this.keyIdentifier = GetDigest(spki); + } + + public byte[] GetKeyIdentifier() + { + return Arrays.Clone(keyIdentifier); + } + + public override Asn1Object ToAsn1Object() + { + return new DerOctetString(GetKeyIdentifier()); + } + + /** + * Return a RFC 3280 type 1 key identifier. As in: + *
+		 * (1) The keyIdentifier is composed of the 160-bit SHA-1 hash of the
+		 * value of the BIT STRING subjectPublicKey (excluding the tag,
+		 * length, and number of unused bits).
+		 * 
+ * @param keyInfo the key info object containing the subjectPublicKey field. + * @return the key identifier. + */ + public static SubjectKeyIdentifier CreateSha1KeyIdentifier( + SubjectPublicKeyInfo keyInfo) + { + return new SubjectKeyIdentifier(keyInfo); + } + + /** + * Return a RFC 3280 type 2 key identifier. As in: + *
+		 * (2) The keyIdentifier is composed of a four bit type field with
+		 * the value 0100 followed by the least significant 60 bits of the
+		 * SHA-1 hash of the value of the BIT STRING subjectPublicKey.
+		 * 
+ * @param keyInfo the key info object containing the subjectPublicKey field. + * @return the key identifier. + */ + public static SubjectKeyIdentifier CreateTruncatedSha1KeyIdentifier( + SubjectPublicKeyInfo keyInfo) + { + byte[] dig = GetDigest(keyInfo); + byte[] id = new byte[8]; + + Array.Copy(dig, dig.Length - 8, id, 0, id.Length); + + id[0] &= 0x0f; + id[0] |= 0x40; + + return new SubjectKeyIdentifier(id); + } + + private static byte[] GetDigest( + SubjectPublicKeyInfo spki) + { + IDigest digest = new Sha1Digest(); + byte[] resBuf = new byte[digest.GetDigestSize()]; + + byte[] bytes = spki.PublicKeyData.GetBytes(); + digest.BlockUpdate(bytes, 0, bytes.Length); + digest.DoFinal(resBuf, 0); + return resBuf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs.meta new file mode 100644 index 00000000..b303433a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10e4966ea65e15f488280b6f40d23903 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectKeyIdentifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs new file mode 100644 index 00000000..26c90d76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs @@ -0,0 +1,105 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The object that contains the public key stored in a certficate. + *

+ * The GetEncoded() method in the public keys in the JCE produces a DER + * encoded one of these.

+ */ + public class SubjectPublicKeyInfo + : Asn1Encodable + { + private readonly AlgorithmIdentifier algID; + private readonly DerBitString keyData; + + public static SubjectPublicKeyInfo GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static SubjectPublicKeyInfo GetInstance( + object obj) + { + if (obj is SubjectPublicKeyInfo) + return (SubjectPublicKeyInfo) obj; + + if (obj != null) + return new SubjectPublicKeyInfo(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public SubjectPublicKeyInfo( + AlgorithmIdentifier algID, + Asn1Encodable publicKey) + { + this.keyData = new DerBitString(publicKey); + this.algID = algID; + } + + public SubjectPublicKeyInfo( + AlgorithmIdentifier algID, + byte[] publicKey) + { + this.keyData = new DerBitString(publicKey); + this.algID = algID; + } + + private SubjectPublicKeyInfo( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.algID = AlgorithmIdentifier.GetInstance(seq[0]); + this.keyData = DerBitString.GetInstance(seq[1]); + } + + public AlgorithmIdentifier AlgorithmID + { + get { return algID; } + } + + /** + * for when the public key is an encoded object - if the bitstring + * can't be decoded this routine raises an IOException. + * + * @exception IOException - if the bit string doesn't represent a Der + * encoded object. + */ + public Asn1Object ParsePublicKey() + { + return Asn1Object.FromByteArray(keyData.GetOctets()); + } + + /** + * for when the public key is raw bits... + */ + public DerBitString PublicKeyData + { + get { return keyData; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * SubjectPublicKeyInfo ::= Sequence {
+         *                          algorithm AlgorithmIdentifier,
+         *                          publicKey BIT STRING }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(algID, keyData); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs.meta new file mode 100644 index 00000000..29433c17 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dbbb93bf96759c44c9a717aeae4fdd73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/SubjectPublicKeyInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs new file mode 100644 index 00000000..37178d25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs @@ -0,0 +1,285 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class CrlEntry + : Asn1Encodable + { + internal Asn1Sequence seq; + internal DerInteger userCertificate; + internal Time revocationDate; + internal X509Extensions crlEntryExtensions; + + public CrlEntry(Asn1Sequence seq) + { + if (seq.Count < 2 || seq.Count > 3) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + this.seq = seq; + + userCertificate = DerInteger.GetInstance(seq[0]); + revocationDate = Time.GetInstance(seq[1]); + } + + public DerInteger UserCertificate + { + get { return userCertificate; } + } + + public Time RevocationDate + { + get { return revocationDate; } + } + + public X509Extensions Extensions + { + get + { + if (crlEntryExtensions == null && seq.Count == 3) + { + crlEntryExtensions = X509Extensions.GetInstance(seq[2]); + } + + return crlEntryExtensions; + } + } + + public override Asn1Object ToAsn1Object() + { + return seq; + } + } + + /** + * PKIX RFC-2459 - TbsCertList object. + *
+     * TbsCertList  ::=  Sequence  {
+     *      version                 Version OPTIONAL,
+     *                                   -- if present, shall be v2
+     *      signature               AlgorithmIdentifier,
+     *      issuer                  Name,
+     *      thisUpdate              Time,
+     *      nextUpdate              Time OPTIONAL,
+     *      revokedCertificates     Sequence OF Sequence  {
+     *           userCertificate         CertificateSerialNumber,
+     *           revocationDate          Time,
+     *           crlEntryExtensions      Extensions OPTIONAL
+     *                                         -- if present, shall be v2
+     *                                }  OPTIONAL,
+     *      crlExtensions           [0]  EXPLICIT Extensions OPTIONAL
+     *                                         -- if present, shall be v2
+     *                                }
+     * 
+ */ + public class TbsCertificateList + : Asn1Encodable + { + private class RevokedCertificatesEnumeration + : IEnumerable + { + private readonly IEnumerable en; + + internal RevokedCertificatesEnumeration(IEnumerable en) + { + this.en = en; + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public IEnumerator GetEnumerator() + { + return new RevokedCertificatesEnumerator(en.GetEnumerator()); + } + + private class RevokedCertificatesEnumerator + : IEnumerator + { + private readonly IEnumerator e; + + internal RevokedCertificatesEnumerator(IEnumerator e) + { + this.e = e; + } + + public virtual void Dispose() + { + } + + public bool MoveNext() + { + return e.MoveNext(); + } + + public void Reset() + { + e.Reset(); + } + + object System.Collections.IEnumerator.Current + { + get { return Current; } + } + + public CrlEntry Current + { + get { return new CrlEntry(Asn1Sequence.GetInstance(e.Current)); } + } + } + } + + internal Asn1Sequence seq; + internal DerInteger version; + internal AlgorithmIdentifier signature; + internal X509Name issuer; + internal Time thisUpdate; + internal Time nextUpdate; + internal Asn1Sequence revokedCertificates; + internal X509Extensions crlExtensions; + + public static TbsCertificateList GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static TbsCertificateList GetInstance( + object obj) + { + TbsCertificateList list = obj as TbsCertificateList; + + if (obj == null || list != null) + { + return list; + } + + if (obj is Asn1Sequence) + { + return new TbsCertificateList((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + internal TbsCertificateList( + Asn1Sequence seq) + { + if (seq.Count < 3 || seq.Count > 7) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + int seqPos = 0; + + this.seq = seq; + + if (seq[seqPos] is DerInteger) + { + version = DerInteger.GetInstance(seq[seqPos++]); + } + else + { + version = new DerInteger(0); + } + + signature = AlgorithmIdentifier.GetInstance(seq[seqPos++]); + issuer = X509Name.GetInstance(seq[seqPos++]); + thisUpdate = Time.GetInstance(seq[seqPos++]); + + if (seqPos < seq.Count + && (seq[seqPos] is Asn1UtcTime + || seq[seqPos] is Asn1GeneralizedTime + || seq[seqPos] is Time)) + { + nextUpdate = Time.GetInstance(seq[seqPos++]); + } + + if (seqPos < seq.Count + && !(seq[seqPos] is Asn1TaggedObject)) + { + revokedCertificates = Asn1Sequence.GetInstance(seq[seqPos++]); + } + + if (seqPos < seq.Count + && seq[seqPos] is Asn1TaggedObject) + { + crlExtensions = X509Extensions.GetInstance(seq[seqPos]); + } + } + + public int Version + { + get { return version.IntValueExact + 1; } + } + + public DerInteger VersionNumber + { + get { return version; } + } + + public AlgorithmIdentifier Signature + { + get { return signature; } + } + + public X509Name Issuer + { + get { return issuer; } + } + + public Time ThisUpdate + { + get { return thisUpdate; } + } + + public Time NextUpdate + { + get { return nextUpdate; } + } + + public CrlEntry[] GetRevokedCertificates() + { + if (revokedCertificates == null) + { + return new CrlEntry[0]; + } + + CrlEntry[] entries = new CrlEntry[revokedCertificates.Count]; + + for (int i = 0; i < entries.Length; i++) + { + entries[i] = new CrlEntry(Asn1Sequence.GetInstance(revokedCertificates[i])); + } + + return entries; + } + + public IEnumerable GetRevokedCertificateEnumeration() + { + if (revokedCertificates == null) + return new List(0); + + return new RevokedCertificatesEnumeration(revokedCertificates); + } + + public X509Extensions Extensions + { + get { return crlExtensions; } + } + + public override Asn1Object ToAsn1Object() + { + return seq; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs.meta new file mode 100644 index 00000000..ced363f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c1511051cab8c684f8babf210ce65f01 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs new file mode 100644 index 00000000..05e3c87c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs @@ -0,0 +1,260 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The TbsCertificate object. + *
+     * TbsCertificate ::= Sequence {
+     *      version          [ 0 ]  Version DEFAULT v1(0),
+     *      serialNumber            CertificateSerialNumber,
+     *      signature               AlgorithmIdentifier,
+     *      issuer                  Name,
+     *      validity                Validity,
+     *      subject                 Name,
+     *      subjectPublicKeyInfo    SubjectPublicKeyInfo,
+     *      issuerUniqueID    [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
+     *      subjectUniqueID   [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
+     *      extensions        [ 3 ] Extensions OPTIONAL
+     *      }
+     * 
+ *

+ * Note: issuerUniqueID and subjectUniqueID are both deprecated by the IETF. This class + * will parse them, but you really shouldn't be creating new ones.

+ */ + public class TbsCertificateStructure + : Asn1Encodable + { + internal Asn1Sequence seq; + internal DerInteger version; + internal DerInteger serialNumber; + internal AlgorithmIdentifier signature; + internal X509Name issuer; + internal Time startDate, endDate; + internal X509Name subject; + internal SubjectPublicKeyInfo subjectPublicKeyInfo; + internal DerBitString issuerUniqueID; + internal DerBitString subjectUniqueID; + internal X509Extensions extensions; + + public static TbsCertificateStructure GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static TbsCertificateStructure GetInstance( + object obj) + { + if (obj is TbsCertificateStructure) + return (TbsCertificateStructure) obj; + + if (obj != null) + return new TbsCertificateStructure(Asn1Sequence.GetInstance(obj)); + + return null; + } + + internal TbsCertificateStructure( + Asn1Sequence seq) + { + int seqStart = 0; + + this.seq = seq; + + // + // some certficates don't include a version number - we assume v1 + // + if (seq[0] is Asn1TaggedObject) + { + version = DerInteger.GetInstance((Asn1TaggedObject)seq[0], true); + } + else + { + seqStart = -1; // field 0 is missing! + version = new DerInteger(0); + } + + bool isV1 = false; + bool isV2 = false; + + if (version.HasValue(0)) + { + isV1 = true; + } + else if (version.HasValue(1)) + { + isV2 = true; + } + else if (!version.HasValue(2)) + { + throw new ArgumentException("version number not recognised"); + } + + serialNumber = DerInteger.GetInstance(seq[seqStart + 1]); + + signature = AlgorithmIdentifier.GetInstance(seq[seqStart + 2]); + issuer = X509Name.GetInstance(seq[seqStart + 3]); + + // + // before and after dates + // + Asn1Sequence dates = (Asn1Sequence)seq[seqStart + 4]; + + startDate = Time.GetInstance(dates[0]); + endDate = Time.GetInstance(dates[1]); + + subject = X509Name.GetInstance(seq[seqStart + 5]); + + // + // public key info. + // + subjectPublicKeyInfo = SubjectPublicKeyInfo.GetInstance(seq[seqStart + 6]); + + int extras = seq.Count - (seqStart + 6) - 1; + if (extras != 0 && isV1) + throw new ArgumentException("version 1 certificate contains extra data"); + + while (extras > 0) + { + Asn1TaggedObject extra = Asn1TaggedObject.GetInstance(seq[seqStart + 6 + extras]); + switch (extra.TagNo) + { + case 1: + { + issuerUniqueID = DerBitString.GetInstance(extra, false); + break; + } + case 2: + { + subjectUniqueID = DerBitString.GetInstance(extra, false); + break; + } + case 3: + { + if (isV2) + throw new ArgumentException("version 2 certificate cannot contain extensions"); + + extensions = X509Extensions.GetInstance(Asn1Sequence.GetInstance(extra, true)); + break; + } + default: + { + throw new ArgumentException("Unknown tag encountered in structure: " + extra.TagNo); + } + } + extras--; + } + } + + public int Version + { + get { return version.IntValueExact + 1; } + } + + public DerInteger VersionNumber + { + get { return version; } + } + + public DerInteger SerialNumber + { + get { return serialNumber; } + } + + public AlgorithmIdentifier Signature + { + get { return signature; } + } + + public X509Name Issuer + { + get { return issuer; } + } + + public Time StartDate + { + get { return startDate; } + } + + public Time EndDate + { + get { return endDate; } + } + + public X509Name Subject + { + get { return subject; } + } + + public SubjectPublicKeyInfo SubjectPublicKeyInfo + { + get { return subjectPublicKeyInfo; } + } + + public DerBitString IssuerUniqueID + { + get { return issuerUniqueID; } + } + + public DerBitString SubjectUniqueID + { + get { return subjectUniqueID; } + } + + public X509Extensions Extensions + { + get { return extensions; } + } + + public override Asn1Object ToAsn1Object() + { + string property = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable("Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Allow_Non-DER_TBSCert"); + if (null == property || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("true", property)) + return seq; + + Asn1EncodableVector v = new Asn1EncodableVector(); + + // DEFAULT Zero + if (!version.HasValue(0)) + { + v.Add(new DerTaggedObject(true, 0, version)); + } + + v.Add(serialNumber, signature, issuer); + + // + // before and after dates + // + v.Add(new DerSequence(startDate, endDate)); + + if (subject != null) + { + v.Add(subject); + } + else + { + v.Add(DerSequence.Empty); + } + + v.Add(subjectPublicKeyInfo); + + // Note: implicit tag + v.AddOptionalTagged(false, 1, issuerUniqueID); + + // Note: implicit tag + v.AddOptionalTagged(false, 2, subjectUniqueID); + + v.AddOptionalTagged(true, 3, extensions); + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs.meta new file mode 100644 index 00000000..c43f191e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d3e198666d87c8f40baffa2ebdc1bcfc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TBSCertificateStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs new file mode 100644 index 00000000..ff481fe1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Target structure used in target information extension for attribute + * certificates from RFC 3281. + * + *
+	 *     Target  ::= CHOICE {
+	 *       targetName          [0] GeneralName,
+	 *       targetGroup         [1] GeneralName,
+	 *       targetCert          [2] TargetCert
+	 *     }
+	 * 
+ * + *

+ * The targetCert field is currently not supported and must not be used + * according to RFC 3281.

+ */ + public class Target + : Asn1Encodable, IAsn1Choice + { + public enum Choice + { + Name = 0, + Group = 1 + }; + + private readonly GeneralName targetName; + private readonly GeneralName targetGroup; + + /** + * Creates an instance of a Target from the given object. + *

+ * obj can be a Target or a {@link Asn1TaggedObject}

+ * + * @param obj The object. + * @return A Target instance. + * @throws ArgumentException if the given object cannot be + * interpreted as Target. + */ + public static Target GetInstance( + object obj) + { + if (obj is Target) + { + return (Target) obj; + } + + if (obj is Asn1TaggedObject) + { + return new Target((Asn1TaggedObject) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1TaggedObject. + * + * @param tagObj The tagged object. + * @throws ArgumentException if the encoding is wrong. + */ + private Target( + Asn1TaggedObject tagObj) + { + switch ((Choice) tagObj.TagNo) + { + case Choice.Name: // GeneralName is already a choice so explicit + targetName = GeneralName.GetInstance(tagObj, true); + break; + case Choice.Group: + targetGroup = GeneralName.GetInstance(tagObj, true); + break; + default: + throw new ArgumentException("unknown tag: " + tagObj.TagNo); + } + } + + /** + * Constructor from given details. + *

+ * Exactly one of the parameters must be not null.

+ * + * @param type the choice type to apply to the name. + * @param name the general name. + * @throws ArgumentException if type is invalid. + */ + public Target( + Choice type, + GeneralName name) + : this(new DerTaggedObject((int) type, name)) + { + } + + /** + * @return Returns the targetGroup. + */ + public virtual GeneralName TargetGroup + { + get { return targetGroup; } + } + + /** + * @return Returns the targetName. + */ + public virtual GeneralName TargetName + { + get { return targetName; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + * Returns: + * + *
+		 *     Target  ::= CHOICE {
+		 *       targetName          [0] GeneralName,
+		 *       targetGroup         [1] GeneralName,
+		 *       targetCert          [2] TargetCert
+		 *     }
+		 * 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + // GeneralName is a choice already so most be explicitly tagged + if (targetName != null) + { + return new DerTaggedObject(true, 0, targetName); + } + + return new DerTaggedObject(true, 1, targetGroup); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs.meta new file mode 100644 index 00000000..65c800e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7141fee3cd8dc574aa45fc18314aca83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Target.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs new file mode 100644 index 00000000..df7bb9a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs @@ -0,0 +1,129 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Target information extension for attributes certificates according to RFC + * 3281. + * + *
+	 *           SEQUENCE OF Targets
+	 * 
+ * + */ + public class TargetInformation + : Asn1Encodable + { + private readonly Asn1Sequence targets; + + /** + * Creates an instance of a TargetInformation from the given object. + *

+ * obj can be a TargetInformation or a {@link Asn1Sequence}

+ * + * @param obj The object. + * @return A TargetInformation instance. + * @throws ArgumentException if the given object cannot be interpreted as TargetInformation. + */ + public static TargetInformation GetInstance( + object obj) + { + if (obj is TargetInformation) + { + return (TargetInformation) obj; + } + + if (obj is Asn1Sequence) + { + return new TargetInformation((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from a Asn1Sequence. + * + * @param seq The Asn1Sequence. + * @throws ArgumentException if the sequence does not contain + * correctly encoded Targets elements. + */ + private TargetInformation( + Asn1Sequence targets) + { + this.targets = targets; + } + + /** + * Returns the targets in this target information extension. + *

+ * The ArrayList is cloned before it is returned.

+ * + * @return Returns the targets. + */ + public virtual Targets[] GetTargetsObjects() + { + Targets[] result = new Targets[targets.Count]; + + for (int i = 0; i < targets.Count; ++i) + { + result[i] = Targets.GetInstance(targets[i]); + } + + return result; + } + + /** + * Constructs a target information from a single targets element. + * According to RFC 3281 only one targets element must be produced. + * + * @param targets A Targets instance. + */ + public TargetInformation( + Targets targets) + { + this.targets = new DerSequence(targets); + } + + /** + * According to RFC 3281 only one targets element must be produced. If + * multiple targets are given they must be merged in + * into one targets element. + * + * @param targets An array with {@link Targets}. + */ + public TargetInformation( + Target[] targets) + : this(new Targets(targets)) + { + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + * Returns: + * + *
+		 *          SEQUENCE OF Targets
+		 * 
+ * + *

+ * According to RFC 3281 only one targets element must be produced. If + * multiple targets are given in the constructor they are merged into one + * targets element. If this was produced from a + * {@link Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Asn1Sequence} the encoding is kept.

+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return targets; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs.meta new file mode 100644 index 00000000..993f2f3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 60045f003b5ce444f98ac7ba555a1a24 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/TargetInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs new file mode 100644 index 00000000..c30754b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs @@ -0,0 +1,127 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Targets structure used in target information extension for attribute + * certificates from RFC 3281. + * + *
+	 *            Targets ::= SEQUENCE OF Target
+	 *           
+	 *            Target  ::= CHOICE {
+	 *              targetName          [0] GeneralName,
+	 *              targetGroup         [1] GeneralName,
+	 *              targetCert          [2] TargetCert
+	 *            }
+	 *           
+	 *            TargetCert  ::= SEQUENCE {
+	 *              targetCertificate    IssuerSerial,
+	 *              targetName           GeneralName OPTIONAL,
+	 *              certDigestInfo       ObjectDigestInfo OPTIONAL
+	 *            }
+	 * 
+ * + * @see org.bouncycastle.asn1.x509.Target + * @see org.bouncycastle.asn1.x509.TargetInformation + */ + public class Targets + : Asn1Encodable + { + private readonly Asn1Sequence targets; + + /** + * Creates an instance of a Targets from the given object. + *

+ * obj can be a Targets or a {@link Asn1Sequence}

+ * + * @param obj The object. + * @return A Targets instance. + * @throws ArgumentException if the given object cannot be interpreted as Target. + */ + public static Targets GetInstance( + object obj) + { + if (obj is Targets) + { + return (Targets) obj; + } + + if (obj is Asn1Sequence) + { + return new Targets((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + * + * @param targets The ASN.1 SEQUENCE. + * @throws ArgumentException if the contents of the sequence are + * invalid. + */ + private Targets( + Asn1Sequence targets) + { + this.targets = targets; + } + + /** + * Constructor from given targets. + *

+ * The ArrayList is copied.

+ * + * @param targets An ArrayList of {@link Target}s. + * @see Target + * @throws ArgumentException if the ArrayList contains not only Targets. + */ + public Targets( + Target[] targets) + { + this.targets = new DerSequence(targets); + } + + /** + * Returns the targets in an ArrayList. + *

+ * The ArrayList is cloned before it is returned.

+ * + * @return Returns the targets. + */ + public virtual Target[] GetTargets() + { + Target[] result = new Target[targets.Count]; + + for (int i = 0; i < targets.Count; ++i) + { + result[i] = Target.GetInstance(targets[i]); + } + + return result; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + * + * Returns: + * + *
+		 *            Targets ::= SEQUENCE OF Target
+		 * 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + return targets; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs.meta new file mode 100644 index 00000000..672e7286 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0cbe878092175ba47acf851f396ef177 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Targets.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs new file mode 100644 index 00000000..d7b063ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class Time + : Asn1Encodable, IAsn1Choice + { + public static Time GetInstance(object obj) + { + if (obj == null) + return null; + if (obj is Time time) + return time; + if (obj is Asn1UtcTime utcTime) + return new Time(utcTime); + if (obj is Asn1GeneralizedTime generalizedTime) + return new Time(generalizedTime); + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), nameof(obj)); + } + + public static Time GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return GetInstance(taggedObject.GetObject()); + } + + private readonly Asn1Object m_timeObject; + + public Time(Asn1GeneralizedTime generalizedTime) + { + this.m_timeObject = generalizedTime ?? throw new ArgumentNullException(nameof(generalizedTime)); + } + + public Time(Asn1UtcTime utcTime) + { + if (utcTime == null) + throw new ArgumentNullException(nameof(utcTime)); + + // Validate utcTime is in the appropriate year range + utcTime.ToDateTime(2049); + + this.m_timeObject = utcTime; + } + + /** + * creates a time object from a given date - if the date is between 1950 + * and 2049 a UTCTime object is Generated, otherwise a GeneralizedTime + * is used. + */ + public Time(DateTime date) + { + DateTime utc = date.ToUniversalTime(); + + if (utc.Year < 1950 || utc.Year > 2049) + { + m_timeObject = new DerGeneralizedTime(utc); + } + else + { + m_timeObject = new DerUtcTime(utc, 2049); + } + } + + /// + /// Return our time as DateTime. + /// + /// A date time. + public DateTime ToDateTime() + { + try + { + if (m_timeObject is Asn1UtcTime utcTime) + return utcTime.ToDateTime(2049); + + return ((Asn1GeneralizedTime)m_timeObject).ToDateTime(); + } + catch (FormatException e) + { + // this should never happen + throw new InvalidOperationException("invalid date string: " + e.Message); + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Time ::= CHOICE {
+         *             utcTime        UTCTime,
+         *             generalTime    GeneralizedTime }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return m_timeObject; + } + + public override string ToString() + { + if (m_timeObject is Asn1UtcTime utcTime) + return utcTime.ToDateTime(2049).ToString(@"yyyyMMddHHmmssK", DateTimeFormatInfo.InvariantInfo); + + if (m_timeObject is Asn1GeneralizedTime generalizedTime) + return generalizedTime.ToDateTime().ToString(@"yyyyMMddHHmmss.FFFFFFFK", DateTimeFormatInfo.InvariantInfo); + + throw new InvalidOperationException(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs.meta new file mode 100644 index 00000000..361f766d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7661a3e009296174483a3aefb74dffd4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/Time.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs new file mode 100644 index 00000000..b65f677f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs @@ -0,0 +1,113 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * UserNotice class, used in + * CertificatePolicies X509 extensions (in policy + * qualifiers). + *
+     * UserNotice ::= Sequence {
+     *      noticeRef        NoticeReference OPTIONAL,
+     *      explicitText     DisplayText OPTIONAL}
+     *
+     * 
+ * + * @see PolicyQualifierId + * @see PolicyInformation + */ + public class UserNotice + : Asn1Encodable + { + private readonly NoticeReference noticeRef; + private readonly DisplayText explicitText; + + /** + * Creates a new UserNotice instance. + * + * @param noticeRef a NoticeReference value + * @param explicitText a DisplayText value + */ + public UserNotice( + NoticeReference noticeRef, + DisplayText explicitText) + { + this.noticeRef = noticeRef; + this.explicitText = explicitText; + } + + /** + * Creates a new UserNotice instance. + * + * @param noticeRef a NoticeReference value + * @param str the explicitText field as a string. + */ + public UserNotice( + NoticeReference noticeRef, + string str) + : this(noticeRef, new DisplayText(str)) + { + } + + private UserNotice(Asn1Sequence seq) + { + if (seq.Count == 2) + { + noticeRef = NoticeReference.GetInstance(seq[0]); + explicitText = DisplayText.GetInstance(seq[1]); + } + else if (seq.Count == 1) + { + if (seq[0].ToAsn1Object() is Asn1Sequence) + { + noticeRef = NoticeReference.GetInstance(seq[0]); + explicitText = null; + } + else + { + noticeRef = null; + explicitText = DisplayText.GetInstance(seq[0]); + } + } + else if (seq.Count == 0) + { + noticeRef = null; // neither field set! + explicitText = null; + } + else + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + } + + public static UserNotice GetInstance(object obj) + { + if (obj is UserNotice) + return (UserNotice)obj; + if (obj == null) + return null; + return new UserNotice(Asn1Sequence.GetInstance(obj)); + } + + public virtual NoticeReference NoticeRef + { + get { return noticeRef; } + } + + public virtual DisplayText ExplicitText + { + get { return explicitText; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(noticeRef, explicitText); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs.meta new file mode 100644 index 00000000..7478cd7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed355fb2578b781478b5022c8c8d232d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/UserNotice.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs new file mode 100644 index 00000000..400eaed0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Generator for Version 1 TbsCertificateStructures. + *
+     * TbsCertificate ::= Sequence {
+     *      version          [ 0 ]  Version DEFAULT v1(0),
+     *      serialNumber            CertificateSerialNumber,
+     *      signature               AlgorithmIdentifier,
+     *      issuer                  Name,
+     *      validity                Validity,
+     *      subject                 Name,
+     *      subjectPublicKeyInfo    SubjectPublicKeyInfo,
+     *      }
+     * 
+ * + */ + public class V1TbsCertificateGenerator + { + internal DerTaggedObject version = new DerTaggedObject(0, new DerInteger(0)); + internal DerInteger serialNumber; + internal AlgorithmIdentifier signature; + internal X509Name issuer; + internal Time startDate, endDate; + internal X509Name subject; + internal SubjectPublicKeyInfo subjectPublicKeyInfo; + + public V1TbsCertificateGenerator() + { + } + + public void SetSerialNumber( + DerInteger serialNumber) + { + this.serialNumber = serialNumber; + } + + public void SetSignature( + AlgorithmIdentifier signature) + { + this.signature = signature; + } + + public void SetIssuer( + X509Name issuer) + { + this.issuer = issuer; + } + + public void SetStartDate( + Time startDate) + { + this.startDate = startDate; + } + + public void SetStartDate( + Asn1UtcTime startDate) + { + this.startDate = new Time(startDate); + } + + public void SetEndDate( + Time endDate) + { + this.endDate = endDate; + } + + public void SetEndDate( + Asn1UtcTime endDate) + { + this.endDate = new Time(endDate); + } + + public void SetSubject( + X509Name subject) + { + this.subject = subject; + } + + public void SetSubjectPublicKeyInfo( + SubjectPublicKeyInfo pubKeyInfo) + { + this.subjectPublicKeyInfo = pubKeyInfo; + } + + public TbsCertificateStructure GenerateTbsCertificate() + { + if ((serialNumber == null) || (signature == null) + || (issuer == null) || (startDate == null) || (endDate == null) + || (subject == null) || (subjectPublicKeyInfo == null)) + { + throw new InvalidOperationException("not all mandatory fields set in V1 TBScertificate generator"); + } + + return new TbsCertificateStructure( + new DerSequence( + //version, - not required as default value + serialNumber, + signature, + issuer, + new DerSequence(startDate, endDate), // before and after dates + subject, + subjectPublicKeyInfo)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs.meta new file mode 100644 index 00000000..93e833bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66dd8d3eaa645fe4ca5723179f994b8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V1TBSCertificateGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs new file mode 100644 index 00000000..1e31ba19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs @@ -0,0 +1,143 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Generator for Version 2 AttributeCertificateInfo + *
+     * AttributeCertificateInfo ::= Sequence {
+     *       version              AttCertVersion -- version is v2,
+     *       holder               Holder,
+     *       issuer               AttCertIssuer,
+     *       signature            AlgorithmIdentifier,
+     *       serialNumber         CertificateSerialNumber,
+     *       attrCertValidityPeriod   AttCertValidityPeriod,
+     *       attributes           Sequence OF Attr,
+     *       issuerUniqueID       UniqueIdentifier OPTIONAL,
+     *       extensions           Extensions OPTIONAL
+     * }
+     * 
+ * + */ + public class V2AttributeCertificateInfoGenerator + { + internal DerInteger version; + internal Holder holder; + internal AttCertIssuer issuer; + internal AlgorithmIdentifier signature; + internal DerInteger serialNumber; + internal Asn1EncodableVector attributes; + internal DerBitString issuerUniqueID; + internal X509Extensions extensions; + + // Note: validity period start/end dates stored directly + //internal AttCertValidityPeriod attrCertValidityPeriod; + internal Asn1GeneralizedTime startDate, endDate; + + public V2AttributeCertificateInfoGenerator() + { + this.version = new DerInteger(1); + attributes = new Asn1EncodableVector(); + } + + public void SetHolder( + Holder holder) + { + this.holder = holder; + } + + public void AddAttribute( + string oid, + Asn1Encodable value) + { + attributes.Add(new AttributeX509(new DerObjectIdentifier(oid), new DerSet(value))); + } + + /** + * @param attribute + */ + public void AddAttribute(AttributeX509 attribute) + { + attributes.Add(attribute); + } + + public void SetSerialNumber( + DerInteger serialNumber) + { + this.serialNumber = serialNumber; + } + + public void SetSignature( + AlgorithmIdentifier signature) + { + this.signature = signature; + } + + public void SetIssuer( + AttCertIssuer issuer) + { + this.issuer = issuer; + } + + public void SetStartDate( + Asn1GeneralizedTime startDate) + { + this.startDate = startDate; + } + + public void SetEndDate( + Asn1GeneralizedTime endDate) + { + this.endDate = endDate; + } + + public void SetIssuerUniqueID( + DerBitString issuerUniqueID) + { + this.issuerUniqueID = issuerUniqueID; + } + + public void SetExtensions( + X509Extensions extensions) + { + this.extensions = extensions; + } + + public AttributeCertificateInfo GenerateAttributeCertificateInfo() + { + if ((serialNumber == null) || (signature == null) + || (issuer == null) || (startDate == null) || (endDate == null) + || (holder == null) || (attributes == null)) + { + throw new InvalidOperationException("not all mandatory fields set in V2 AttributeCertificateInfo generator"); + } + + Asn1EncodableVector v = new Asn1EncodableVector( + version, holder, issuer, signature, serialNumber); + + // + // before and after dates => AttCertValidityPeriod + // + v.Add(new AttCertValidityPeriod(startDate, endDate)); + + // Attributes + v.Add(new DerSequence(attributes)); + + if (issuerUniqueID != null) + { + v.Add(issuerUniqueID); + } + + if (extensions != null) + { + v.Add(extensions); + } + + return AttributeCertificateInfo.GetInstance(new DerSequence(v)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs.meta new file mode 100644 index 00000000..238f3156 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0574b095a71a78f4dafa86f5a7656927 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2AttributeCertificateInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs new file mode 100644 index 00000000..2b0ddfd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class V2Form + : Asn1Encodable + { + internal GeneralNames issuerName; + internal IssuerSerial baseCertificateID; + internal ObjectDigestInfo objectDigestInfo; + + public static V2Form GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static V2Form GetInstance(object obj) + { + if (obj is V2Form) + return (V2Form)obj; + if (obj != null) + return new V2Form(Asn1Sequence.GetInstance(obj)); + return null; + } + + public V2Form(GeneralNames issuerName) + : this(issuerName, null, null) + { + } + + public V2Form(GeneralNames issuerName, IssuerSerial baseCertificateID) + : this(issuerName, baseCertificateID, null) + { + } + + public V2Form(GeneralNames issuerName, ObjectDigestInfo objectDigestInfo) + : this(issuerName, null, objectDigestInfo) + { + } + + public V2Form( + GeneralNames issuerName, + IssuerSerial baseCertificateID, + ObjectDigestInfo objectDigestInfo) + { + this.issuerName = issuerName; + this.baseCertificateID = baseCertificateID; + this.objectDigestInfo = objectDigestInfo; + } + + private V2Form( + Asn1Sequence seq) + { + if (seq.Count > 3) + { + throw new ArgumentException("Bad sequence size: " + seq.Count); + } + + int index = 0; + + if (!(seq[0] is Asn1TaggedObject)) + { + index++; + this.issuerName = GeneralNames.GetInstance(seq[0]); + } + + for (int i = index; i != seq.Count; i++) + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(seq[i]); + if (o.TagNo == 0) + { + baseCertificateID = IssuerSerial.GetInstance(o, false); + } + else if (o.TagNo == 1) + { + objectDigestInfo = ObjectDigestInfo.GetInstance(o, false); + } + else + { + throw new ArgumentException("Bad tag number: " + o.TagNo); + } + } + } + + public GeneralNames IssuerName + { + get { return issuerName; } + } + + public IssuerSerial BaseCertificateID + { + get { return baseCertificateID; } + } + + public ObjectDigestInfo ObjectDigestInfo + { + get { return objectDigestInfo; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  V2Form ::= Sequence {
+         *       issuerName            GeneralNames  OPTIONAL,
+         *       baseCertificateID     [0] IssuerSerial  OPTIONAL,
+         *       objectDigestInfo      [1] ObjectDigestInfo  OPTIONAL
+         *         -- issuerName MUST be present in this profile
+         *         -- baseCertificateID and objectDigestInfo MUST NOT
+         *         -- be present in this profile
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(issuerName); + v.AddOptionalTagged(false, 0, baseCertificateID); + v.AddOptionalTagged(false, 1, objectDigestInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs.meta new file mode 100644 index 00000000..76500075 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 49b4c62e22194cd48b7dc576bf0aa814 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2Form.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs new file mode 100644 index 00000000..08207e81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs @@ -0,0 +1,198 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Generator for Version 2 TbsCertList structures. + *
+     *  TbsCertList  ::=  Sequence  {
+     *       version                 Version OPTIONAL,
+     *                                    -- if present, shall be v2
+     *       signature               AlgorithmIdentifier,
+     *       issuer                  Name,
+     *       thisUpdate              Time,
+     *       nextUpdate              Time OPTIONAL,
+     *       revokedCertificates     Sequence OF Sequence  {
+     *            userCertificate         CertificateSerialNumber,
+     *            revocationDate          Time,
+     *            crlEntryExtensions      Extensions OPTIONAL
+     *                                          -- if present, shall be v2
+     *                                 }  OPTIONAL,
+     *       crlExtensions           [0]  EXPLICIT Extensions OPTIONAL
+     *                                          -- if present, shall be v2
+     *                                 }
+     * 
+ * + * Note: This class may be subject to change + */ + public class V2TbsCertListGenerator + { + private DerInteger version = new DerInteger(1); + private AlgorithmIdentifier signature; + private X509Name issuer; + private Time thisUpdate, nextUpdate; + private X509Extensions extensions; + private List crlEntries; + + public V2TbsCertListGenerator() + { + } + + public void SetSignature( + AlgorithmIdentifier signature) + { + this.signature = signature; + } + + public void SetIssuer( + X509Name issuer) + { + this.issuer = issuer; + } + + public void SetThisUpdate( + Asn1UtcTime thisUpdate) + { + this.thisUpdate = new Time(thisUpdate); + } + + public void SetNextUpdate( + Asn1UtcTime nextUpdate) + { + this.nextUpdate = (nextUpdate != null) + ? new Time(nextUpdate) + : null; + } + + public void SetThisUpdate( + Time thisUpdate) + { + this.thisUpdate = thisUpdate; + } + + public void SetNextUpdate( + Time nextUpdate) + { + this.nextUpdate = nextUpdate; + } + + public void AddCrlEntry(Asn1Sequence crlEntry) + { + if (crlEntries == null) + { + crlEntries = new List(); + } + + crlEntries.Add(crlEntry); + } + + public void AddCrlEntry(DerInteger userCertificate, Asn1UtcTime revocationDate, int reason) + { + AddCrlEntry(userCertificate, new Time(revocationDate), reason); + } + + public void AddCrlEntry(DerInteger userCertificate, Time revocationDate, int reason) + { + AddCrlEntry(userCertificate, revocationDate, reason, null); + } + + public void AddCrlEntry(DerInteger userCertificate, Time revocationDate, int reason, + Asn1GeneralizedTime invalidityDate) + { + var extOids = new List(); + var extValues = new List(); + + if (reason != 0) + { + CrlReason crlReason = new CrlReason(reason); + + try + { + extOids.Add(X509Extensions.ReasonCode); + extValues.Add(new X509Extension(false, new DerOctetString(crlReason.GetEncoded()))); + } + catch (IOException e) + { + throw new ArgumentException("error encoding reason: " + e); + } + } + + if (invalidityDate != null) + { + try + { + extOids.Add(X509Extensions.InvalidityDate); + extValues.Add(new X509Extension(false, new DerOctetString(invalidityDate.GetEncoded()))); + } + catch (IOException e) + { + throw new ArgumentException("error encoding invalidityDate: " + e); + } + } + + if (extOids.Count != 0) + { + AddCrlEntry(userCertificate, revocationDate, new X509Extensions(extOids, extValues)); + } + else + { + AddCrlEntry(userCertificate, revocationDate, null); + } + } + + public void AddCrlEntry(DerInteger userCertificate, Time revocationDate, X509Extensions extensions) + { + Asn1EncodableVector v = new Asn1EncodableVector(userCertificate, revocationDate); + + if (extensions != null) + { + v.Add(extensions); + } + + AddCrlEntry(new DerSequence(v)); + } + + public void SetExtensions( + X509Extensions extensions) + { + this.extensions = extensions; + } + + public TbsCertificateList GenerateTbsCertList() + { + if ((signature == null) || (issuer == null) || (thisUpdate == null)) + { + throw new InvalidOperationException("Not all mandatory fields set in V2 TbsCertList generator."); + } + + Asn1EncodableVector v = new Asn1EncodableVector( + version, signature, issuer, thisUpdate); + + if (nextUpdate != null) + { + v.Add(nextUpdate); + } + + // Add CRLEntries if they exist + if (crlEntries != null) + { + v.Add(new DerSequence(crlEntries.ToArray())); + } + + if (extensions != null) + { + v.Add(new DerTaggedObject(0, extensions)); + } + + return new TbsCertificateList(new DerSequence(v)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs.meta new file mode 100644 index 00000000..900e6ebb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a7ca53cfbe95c048baef0e7bcbc29c2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V2TBSCertListGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs new file mode 100644 index 00000000..9d893857 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs @@ -0,0 +1,172 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * Generator for Version 3 TbsCertificateStructures. + *
+     * TbsCertificate ::= Sequence {
+     *      version          [ 0 ]  Version DEFAULT v1(0),
+     *      serialNumber            CertificateSerialNumber,
+     *      signature               AlgorithmIdentifier,
+     *      issuer                  Name,
+     *      validity                Validity,
+     *      subject                 Name,
+     *      subjectPublicKeyInfo    SubjectPublicKeyInfo,
+     *      issuerUniqueID    [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
+     *      subjectUniqueID   [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
+     *      extensions        [ 3 ] Extensions OPTIONAL
+     *      }
+     * 
+ * + */ + public class V3TbsCertificateGenerator + { + internal DerTaggedObject version = new DerTaggedObject(0, new DerInteger(2)); + internal DerInteger serialNumber; + internal AlgorithmIdentifier signature; + internal X509Name issuer; + internal Time startDate, endDate; + internal X509Name subject; + internal SubjectPublicKeyInfo subjectPublicKeyInfo; + internal X509Extensions extensions; + + private bool altNamePresentAndCritical; + private DerBitString issuerUniqueID; + private DerBitString subjectUniqueID; + + public V3TbsCertificateGenerator() + { + } + + public void SetSerialNumber( + DerInteger serialNumber) + { + this.serialNumber = serialNumber; + } + + public void SetSignature( + AlgorithmIdentifier signature) + { + this.signature = signature; + } + + public void SetIssuer( + X509Name issuer) + { + this.issuer = issuer; + } + + public void SetStartDate( + Asn1UtcTime startDate) + { + this.startDate = new Time(startDate); + } + + public void SetStartDate( + Time startDate) + { + this.startDate = startDate; + } + + public void SetEndDate( + Asn1UtcTime endDate) + { + this.endDate = new Time(endDate); + } + + public void SetEndDate( + Time endDate) + { + this.endDate = endDate; + } + + public void SetSubject( + X509Name subject) + { + this.subject = subject; + } + + public void SetIssuerUniqueID( + DerBitString uniqueID) + { + this.issuerUniqueID = uniqueID; + } + + public void SetSubjectUniqueID( + DerBitString uniqueID) + { + this.subjectUniqueID = uniqueID; + } + + public void SetSubjectPublicKeyInfo( + SubjectPublicKeyInfo pubKeyInfo) + { + this.subjectPublicKeyInfo = pubKeyInfo; + } + + public void SetExtensions( + X509Extensions extensions) + { + this.extensions = extensions; + + if (extensions != null) + { + X509Extension altName = extensions.GetExtension(X509Extensions.SubjectAlternativeName); + + if (altName != null && altName.IsCritical) + { + altNamePresentAndCritical = true; + } + } + } + + public TbsCertificateStructure GenerateTbsCertificate() + { + if ((serialNumber == null) || (signature == null) + || (issuer == null) || (startDate == null) || (endDate == null) + || (subject == null && !altNamePresentAndCritical) + || (subjectPublicKeyInfo == null)) + { + throw new InvalidOperationException("not all mandatory fields set in V3 TBScertificate generator"); + } + + DerSequence validity = new DerSequence(startDate, endDate); // before and after dates + + Asn1EncodableVector v = new Asn1EncodableVector( + version, serialNumber, signature, issuer, validity); + + if (subject != null) + { + v.Add(subject); + } + else + { + v.Add(DerSequence.Empty); + } + + v.Add(subjectPublicKeyInfo); + + if (issuerUniqueID != null) + { + v.Add(new DerTaggedObject(false, 1, issuerUniqueID)); + } + + if (subjectUniqueID != null) + { + v.Add(new DerTaggedObject(false, 2, subjectUniqueID)); + } + + if (extensions != null) + { + v.Add(new DerTaggedObject(3, extensions)); + } + + return new TbsCertificateStructure(new DerSequence(v)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs.meta new file mode 100644 index 00000000..d7bb52b6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7ed4aecf1b1dfb469a950c561665b5f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/V3TBSCertificateGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs new file mode 100644 index 00000000..27cdc3ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class X509Attributes + { + public static readonly DerObjectIdentifier RoleSyntax = new DerObjectIdentifier("2.5.4.72"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs.meta new file mode 100644 index 00000000..47d64ebd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a77ebbd08f8b65249ba6c9226337ec4c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Attributes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs new file mode 100644 index 00000000..64fb07c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * an X509Certificate structure. + *
+     *  Certificate ::= Sequence {
+     *      tbsCertificate          TbsCertificate,
+     *      signatureAlgorithm      AlgorithmIdentifier,
+     *      signature               BIT STRING
+     *  }
+     * 
+ */ + public class X509CertificateStructure + : Asn1Encodable + { + private readonly TbsCertificateStructure tbsCert; + private readonly AlgorithmIdentifier sigAlgID; + private readonly DerBitString sig; + + public static X509CertificateStructure GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static X509CertificateStructure GetInstance( + object obj) + { + if (obj is X509CertificateStructure) + return (X509CertificateStructure)obj; + if (obj == null) + return null; + return new X509CertificateStructure(Asn1Sequence.GetInstance(obj)); + } + + public X509CertificateStructure( + TbsCertificateStructure tbsCert, + AlgorithmIdentifier sigAlgID, + DerBitString sig) + { + if (tbsCert == null) + throw new ArgumentNullException("tbsCert"); + if (sigAlgID == null) + throw new ArgumentNullException("sigAlgID"); + if (sig == null) + throw new ArgumentNullException("sig"); + + this.tbsCert = tbsCert; + this.sigAlgID = sigAlgID; + this.sig = sig; + } + + private X509CertificateStructure( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("sequence wrong size for a certificate", "seq"); + + // + // correct x509 certficate + // + tbsCert = TbsCertificateStructure.GetInstance(seq[0]); + sigAlgID = AlgorithmIdentifier.GetInstance(seq[1]); + sig = DerBitString.GetInstance(seq[2]); + } + + public TbsCertificateStructure TbsCertificate + { + get { return tbsCert; } + } + + public int Version + { + get { return tbsCert.Version; } + } + + public DerInteger SerialNumber + { + get { return tbsCert.SerialNumber; } + } + + public X509Name Issuer + { + get { return tbsCert.Issuer; } + } + + public Time StartDate + { + get { return tbsCert.StartDate; } + } + + public Time EndDate + { + get { return tbsCert.EndDate; } + } + + public X509Name Subject + { + get { return tbsCert.Subject; } + } + + public SubjectPublicKeyInfo SubjectPublicKeyInfo + { + get { return tbsCert.SubjectPublicKeyInfo; } + } + + public AlgorithmIdentifier SignatureAlgorithm + { + get { return sigAlgID; } + } + + public DerBitString Signature + { + get { return sig; } + } + + public byte[] GetSignatureOctets() + { + return sig.GetOctets(); + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(tbsCert, sigAlgID, sig); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs.meta new file mode 100644 index 00000000..327bab87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a1b7ba340db0eab4c853597fdf44f32a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509CertificateStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs new file mode 100644 index 00000000..e54256ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * The default converter for X509 DN entries when going from their + * string value to ASN.1 strings. + */ + public class X509DefaultEntryConverter + : X509NameEntryConverter + { + /** + * Apply default conversion for the given value depending on the oid + * and the character range of the value. + * + * @param oid the object identifier for the DN entry + * @param value the value associated with it + * @return the ASN.1 equivalent for the string value. + */ + public override Asn1Object GetConvertedValue( + DerObjectIdentifier oid, + string value) + { + if (value.Length != 0 && value[0] == '#') + { + try + { + return ConvertHexEncoded(value, 1); + } + catch (IOException) + { + throw new Exception("can't recode value for oid " + oid.Id); + } + } + + if (value.Length != 0 && value[0] == '\\') + { + value = value.Substring(1); + } + + if (oid.Equals(X509Name.EmailAddress) || oid.Equals(X509Name.DC)) + { + return new DerIA5String(value); + } + + if (oid.Equals(X509Name.DateOfBirth)) // accept time string as well as # (for compatibility) + { + return new Asn1GeneralizedTime(value); + } + + if (oid.Equals(X509Name.C) + || oid.Equals(X509Name.SerialNumber) + || oid.Equals(X509Name.DnQualifier) + || oid.Equals(X509Name.TelephoneNumber)) + { + return new DerPrintableString(value); + } + + return new DerUtf8String(value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs.meta new file mode 100644 index 00000000..919d7f46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9ba516d10fcdab542bd987b4599c2036 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509DefaultEntryConverter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs new file mode 100644 index 00000000..2eaa9565 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * an object for the elements in the X.509 V3 extension block. + */ + public class X509Extension + { + internal bool critical; + internal Asn1OctetString value; + + public X509Extension( + DerBoolean critical, + Asn1OctetString value) + { + if (critical == null) + { + throw new ArgumentNullException("critical"); + } + + this.critical = critical.IsTrue; + this.value = value; + } + + public X509Extension( + bool critical, + Asn1OctetString value) + { + this.critical = critical; + this.value = value; + } + + public bool IsCritical { get { return critical; } } + + public Asn1OctetString Value { get { return value; } } + + public Asn1Encodable GetParsedValue() + { + return ConvertValueToObject(this); + } + + public override int GetHashCode() + { + int vh = this.Value.GetHashCode(); + + return IsCritical ? vh : ~vh; + } + + public override bool Equals( + object obj) + { + X509Extension other = obj as X509Extension; + if (other == null) + { + return false; + } + + return Value.Equals(other.Value) && IsCritical == other.IsCritical; + } + + /// Convert the value of the passed in extension to an object. + /// The extension to parse. + /// The object the value string contains. + /// If conversion is not possible. + public static Asn1Object ConvertValueToObject( + X509Extension ext) + { + try + { + return Asn1Object.FromByteArray(ext.Value.GetOctets()); + } + catch (Exception e) + { + throw new ArgumentException("can't convert extension", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs.meta new file mode 100644 index 00000000..46d8fc9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d0552081f622a68459b9f814ce8d2e84 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extension.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs new file mode 100644 index 00000000..8dc388fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs @@ -0,0 +1,401 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public class X509Extensions + : Asn1Encodable + { + /** + * Subject Directory Attributes + */ + public static readonly DerObjectIdentifier SubjectDirectoryAttributes = new DerObjectIdentifier("2.5.29.9"); + + /** + * Subject Key Identifier + */ + public static readonly DerObjectIdentifier SubjectKeyIdentifier = new DerObjectIdentifier("2.5.29.14"); + + /** + * Key Usage + */ + public static readonly DerObjectIdentifier KeyUsage = new DerObjectIdentifier("2.5.29.15"); + + /** + * Private Key Usage Period + */ + public static readonly DerObjectIdentifier PrivateKeyUsagePeriod = new DerObjectIdentifier("2.5.29.16"); + + /** + * Subject Alternative Name + */ + public static readonly DerObjectIdentifier SubjectAlternativeName = new DerObjectIdentifier("2.5.29.17"); + + /** + * Issuer Alternative Name + */ + public static readonly DerObjectIdentifier IssuerAlternativeName = new DerObjectIdentifier("2.5.29.18"); + + /** + * Basic Constraints + */ + public static readonly DerObjectIdentifier BasicConstraints = new DerObjectIdentifier("2.5.29.19"); + + /** + * CRL Number + */ + public static readonly DerObjectIdentifier CrlNumber = new DerObjectIdentifier("2.5.29.20"); + + /** + * Reason code + */ + public static readonly DerObjectIdentifier ReasonCode = new DerObjectIdentifier("2.5.29.21"); + + /** + * Hold Instruction Code + */ + public static readonly DerObjectIdentifier InstructionCode = new DerObjectIdentifier("2.5.29.23"); + + /** + * Invalidity Date + */ + public static readonly DerObjectIdentifier InvalidityDate = new DerObjectIdentifier("2.5.29.24"); + + /** + * Delta CRL indicator + */ + public static readonly DerObjectIdentifier DeltaCrlIndicator = new DerObjectIdentifier("2.5.29.27"); + + /** + * Issuing Distribution Point + */ + public static readonly DerObjectIdentifier IssuingDistributionPoint = new DerObjectIdentifier("2.5.29.28"); + + /** + * Certificate Issuer + */ + public static readonly DerObjectIdentifier CertificateIssuer = new DerObjectIdentifier("2.5.29.29"); + + /** + * Name Constraints + */ + public static readonly DerObjectIdentifier NameConstraints = new DerObjectIdentifier("2.5.29.30"); + + /** + * CRL Distribution Points + */ + public static readonly DerObjectIdentifier CrlDistributionPoints = new DerObjectIdentifier("2.5.29.31"); + + /** + * Certificate Policies + */ + public static readonly DerObjectIdentifier CertificatePolicies = new DerObjectIdentifier("2.5.29.32"); + + /** + * Policy Mappings + */ + public static readonly DerObjectIdentifier PolicyMappings = new DerObjectIdentifier("2.5.29.33"); + + /** + * Authority Key Identifier + */ + public static readonly DerObjectIdentifier AuthorityKeyIdentifier = new DerObjectIdentifier("2.5.29.35"); + + /** + * Policy Constraints + */ + public static readonly DerObjectIdentifier PolicyConstraints = new DerObjectIdentifier("2.5.29.36"); + + /** + * Extended Key Usage + */ + public static readonly DerObjectIdentifier ExtendedKeyUsage = new DerObjectIdentifier("2.5.29.37"); + + /** + * Freshest CRL + */ + public static readonly DerObjectIdentifier FreshestCrl = new DerObjectIdentifier("2.5.29.46"); + + /** + * Inhibit Any Policy + */ + public static readonly DerObjectIdentifier InhibitAnyPolicy = new DerObjectIdentifier("2.5.29.54"); + + /** + * Authority Info Access + */ + public static readonly DerObjectIdentifier AuthorityInfoAccess = new DerObjectIdentifier("1.3.6.1.5.5.7.1.1"); + + /** + * Subject Info Access + */ + public static readonly DerObjectIdentifier SubjectInfoAccess = new DerObjectIdentifier("1.3.6.1.5.5.7.1.11"); + + /** + * Logo Type + */ + public static readonly DerObjectIdentifier LogoType = new DerObjectIdentifier("1.3.6.1.5.5.7.1.12"); + + /** + * BiometricInfo + */ + public static readonly DerObjectIdentifier BiometricInfo = new DerObjectIdentifier("1.3.6.1.5.5.7.1.2"); + + /** + * QCStatements + */ + public static readonly DerObjectIdentifier QCStatements = new DerObjectIdentifier("1.3.6.1.5.5.7.1.3"); + + /** + * Audit identity extension in attribute certificates. + */ + public static readonly DerObjectIdentifier AuditIdentity = new DerObjectIdentifier("1.3.6.1.5.5.7.1.4"); + + /** + * NoRevAvail extension in attribute certificates. + */ + public static readonly DerObjectIdentifier NoRevAvail = new DerObjectIdentifier("2.5.29.56"); + + /** + * TargetInformation extension in attribute certificates. + */ + public static readonly DerObjectIdentifier TargetInformation = new DerObjectIdentifier("2.5.29.55"); + + /** + * Expired Certificates on CRL extension + */ + public static readonly DerObjectIdentifier ExpiredCertsOnCrl = new DerObjectIdentifier("2.5.29.60"); + + private readonly Dictionary m_extensions = + new Dictionary(); + private readonly List m_ordering; + + public static X509Extension GetExtension(X509Extensions extensions, DerObjectIdentifier oid) + { + return null == extensions ? null : extensions.GetExtension(oid); + } + + public static Asn1Encodable GetExtensionParsedValue(X509Extensions extensions, DerObjectIdentifier oid) + { + return null == extensions ? null : extensions.GetExtensionParsedValue(oid); + } + + public static X509Extensions GetInstance(Asn1TaggedObject taggedObject, bool declaredExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(taggedObject, declaredExplicit)); + } + + public static X509Extensions GetInstance( + object obj) + { + if (obj == null || obj is X509Extensions) + { + return (X509Extensions) obj; + } + + if (obj is Asn1Sequence) + { + return new X509Extensions((Asn1Sequence) obj); + } + + if (obj is Asn1TaggedObject) + { + return GetInstance(((Asn1TaggedObject) obj).GetObject()); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + * + * the extensions are a list of constructed sequences, either with (Oid, OctetString) or (Oid, Boolean, OctetString) + */ + private X509Extensions(Asn1Sequence seq) + { + m_ordering = new List(); + + foreach (Asn1Encodable ae in seq) + { + Asn1Sequence s = Asn1Sequence.GetInstance(ae.ToAsn1Object()); + + if (s.Count < 2 || s.Count > 3) + throw new ArgumentException("Bad sequence size: " + s.Count); + + DerObjectIdentifier oid = DerObjectIdentifier.GetInstance(s[0].ToAsn1Object()); + + bool isCritical = s.Count == 3 + && DerBoolean.GetInstance(s[1].ToAsn1Object()).IsTrue; + + Asn1OctetString octets = Asn1OctetString.GetInstance(s[s.Count - 1].ToAsn1Object()); + + if (m_extensions.ContainsKey(oid)) + throw new ArgumentException("repeated extension found: " + oid); + + m_extensions.Add(oid, new X509Extension(isCritical, octets)); + m_ordering.Add(oid); + } + } + + /** + * constructor from a table of extensions. + *

+ * it's is assumed the table contains Oid/string pairs.

+ */ + public X509Extensions(IDictionary extensions) + : this(null, extensions) + { + } + + /** + * Constructor from a table of extensions with ordering. + *

+ * It's is assumed the table contains Oid/string pairs.

+ */ + public X509Extensions(IList ordering, + IDictionary extensions) + { + if (ordering == null) + { + m_ordering = new List(extensions.Keys); + } + else + { + m_ordering = new List(ordering); + } + + foreach (DerObjectIdentifier oid in m_ordering) + { + m_extensions.Add(oid, extensions[oid]); + } + } + + /** + * Constructor from two vectors + * + * @param objectIDs an ArrayList of the object identifiers. + * @param values an ArrayList of the extension values. + */ + public X509Extensions(IList oids, IList values) + { + m_ordering = new List(oids); + + int count = 0; + foreach (DerObjectIdentifier oid in m_ordering) + { + m_extensions.Add(oid, values[count++]); + } + } + + /** + * return an Enumeration of the extension field's object ids. + */ + public IEnumerable ExtensionOids + { + get { return CollectionUtilities.Proxy(m_ordering); } + } + + /** + * return the extension represented by the object identifier + * passed in. + * + * @return the extension if it's present, null otherwise. + */ + public X509Extension GetExtension(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(m_extensions, oid); + } + + /** + * return the parsed value of the extension represented by the object identifier + * passed in. + * + * @return the parsed value of the extension if it's present, null otherwise. + */ + public Asn1Encodable GetExtensionParsedValue(DerObjectIdentifier oid) + { + return GetExtension(oid)?.GetParsedValue(); + } + + /** + *
+		 *     Extensions        ::=   SEQUENCE SIZE (1..MAX) OF Extension
+		 *
+		 *     Extension         ::=   SEQUENCE {
+		 *        extnId            EXTENSION.&id ({ExtensionSet}),
+		 *        critical          BOOLEAN DEFAULT FALSE,
+		 *        extnValue         OCTET STRING }
+		 * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(m_ordering.Count); + + foreach (DerObjectIdentifier oid in m_ordering) + { + X509Extension ext = m_extensions[oid]; + if (ext.IsCritical) + { + v.Add(new DerSequence(oid, DerBoolean.True, ext.Value)); + } + else + { + v.Add(new DerSequence(oid, ext.Value)); + } + } + + return new DerSequence(v); + } + + public bool Equivalent(X509Extensions other) + { + if (m_extensions.Count != other.m_extensions.Count) + return false; + + foreach (var entry in m_extensions) + { + if (!entry.Value.Equals(other.GetExtension(entry.Key))) + return false; + } + + return true; + } + + public DerObjectIdentifier[] GetExtensionOids() + { + return m_ordering.ToArray(); + } + + public DerObjectIdentifier[] GetNonCriticalExtensionOids() + { + return GetExtensionOids(false); + } + + public DerObjectIdentifier[] GetCriticalExtensionOids() + { + return GetExtensionOids(true); + } + + private DerObjectIdentifier[] GetExtensionOids(bool isCritical) + { + var oids = new List(); + + foreach (DerObjectIdentifier oid in m_ordering) + { + if (m_extensions[oid].IsCritical == isCritical) + { + oids.Add(oid); + } + } + + return oids.ToArray(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs.meta new file mode 100644 index 00000000..5f2800a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 446fac1bb12ed14439cb65d7c6f8b9cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Extensions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs new file mode 100644 index 00000000..ce1568db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /// Generator for X.509 extensions + public class X509ExtensionsGenerator + { + private Dictionary m_extensions = + new Dictionary(); + private List m_ordering = new List(); + + private static readonly ISet m_dupsAllowed = new HashSet() + { + X509Extensions.SubjectAlternativeName, + X509Extensions.IssuerAlternativeName, + X509Extensions.SubjectDirectoryAttributes, + X509Extensions.CertificateIssuer + }; + + /// Reset the generator + public void Reset() + { + m_extensions = new Dictionary(); + m_ordering = new List(); + } + + /// + /// Add an extension with the given oid and the passed in value to be included + /// in the OCTET STRING associated with the extension. + /// + /// OID for the extension. + /// True if critical, false otherwise. + /// The ASN.1 object to be included in the extension. + public void AddExtension(DerObjectIdentifier oid, bool critical, Asn1Encodable extValue) + { + byte[] encoded; + try + { + encoded = extValue.GetDerEncoded(); + } + catch (Exception e) + { + throw new ArgumentException("error encoding value: " + e); + } + + this.AddExtension(oid, critical, encoded); + } + + /// + /// Add an extension with the given oid and the passed in byte array to be wrapped + /// in the OCTET STRING associated with the extension. + /// + /// OID for the extension. + /// True if critical, false otherwise. + /// The byte array to be wrapped. + public void AddExtension(DerObjectIdentifier oid, bool critical, byte[] extValue) + { + if (m_extensions.TryGetValue(oid, out X509Extension existingExtension)) + { + if (!m_dupsAllowed.Contains(oid)) + throw new ArgumentException("extension " + oid + " already added"); + + Asn1Sequence seq1 = Asn1Sequence.GetInstance( + Asn1OctetString.GetInstance(existingExtension.Value).GetOctets()); + Asn1EncodableVector items = Asn1EncodableVector.FromEnumerable(seq1); + Asn1Sequence seq2 = Asn1Sequence.GetInstance(extValue); + + foreach (Asn1Encodable enc in seq2) + { + items.Add(enc); + } + + m_extensions[oid] = new X509Extension(existingExtension.IsCritical, + new DerOctetString(new DerSequence(items).GetEncoded())); + } + else + { + m_ordering.Add(oid); + m_extensions.Add(oid, new X509Extension(critical, new DerOctetString(extValue))); + } + } + + public void AddExtensions(X509Extensions extensions) + { + foreach (DerObjectIdentifier ident in extensions.ExtensionOids) + { + X509Extension ext = extensions.GetExtension(ident); + AddExtension(ident, ext.critical, ext.Value.GetOctets()); + } + } + + + + /// Return true if there are no extension present in this generator. + /// True if empty, false otherwise + public bool IsEmpty + { + get { return m_ordering.Count < 1; } + } + + /// Generate an X509Extensions object based on the current state of the generator. + /// An X509Extensions object + public X509Extensions Generate() + { + return new X509Extensions(m_ordering, m_extensions); + } + + internal void AddExtension(DerObjectIdentifier oid, X509Extension x509Extension) + { + if (m_extensions.ContainsKey(oid)) + throw new ArgumentException("extension " + oid + " already added"); + + m_ordering.Add(oid); + m_extensions.Add(oid, x509Extension); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs.meta new file mode 100644 index 00000000..3e083284 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3dcba2e7590f6024fa685d94dd0fd19b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ExtensionsGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs new file mode 100644 index 00000000..1d7d6091 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs @@ -0,0 +1,1024 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Text; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + *
+    *     RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
+    *
+    *     RelativeDistinguishedName ::= SET SIZE (1..MAX) OF AttributeTypeAndValue
+    *
+    *     AttributeTypeAndValue ::= SEQUENCE {
+    *                                   type  OBJECT IDENTIFIER,
+    *                                   value ANY }
+    * 
+ */ + public class X509Name + : Asn1Encodable + { + /** + * country code - StringType(SIZE(2)) + */ + public static readonly DerObjectIdentifier C = new DerObjectIdentifier("2.5.4.6"); + + /** + * organization - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier O = new DerObjectIdentifier("2.5.4.10"); + + /** + * organizational unit name - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier OU = new DerObjectIdentifier("2.5.4.11"); + + /** + * Title + */ + public static readonly DerObjectIdentifier T = new DerObjectIdentifier("2.5.4.12"); + + /** + * common name - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier CN = new DerObjectIdentifier("2.5.4.3"); + + /** + * street - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier Street = new DerObjectIdentifier("2.5.4.9"); + + /** + * device serial number name - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier SerialNumber = new DerObjectIdentifier("2.5.4.5"); + + /** + * locality name - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier L = new DerObjectIdentifier("2.5.4.7"); + + /** + * state, or province name - StringType(SIZE(1..64)) + */ + public static readonly DerObjectIdentifier ST = new DerObjectIdentifier("2.5.4.8"); + + /** + * Naming attributes of type X520name + */ + public static readonly DerObjectIdentifier Surname = new DerObjectIdentifier("2.5.4.4"); + public static readonly DerObjectIdentifier GivenName = new DerObjectIdentifier("2.5.4.42"); + public static readonly DerObjectIdentifier Initials = new DerObjectIdentifier("2.5.4.43"); + public static readonly DerObjectIdentifier Generation = new DerObjectIdentifier("2.5.4.44"); + public static readonly DerObjectIdentifier UniqueIdentifier = new DerObjectIdentifier("2.5.4.45"); + + /** + * businessCategory - DirectoryString(SIZE(1..128) + */ + public static readonly DerObjectIdentifier BusinessCategory = new DerObjectIdentifier( + "2.5.4.15"); + + /** + * postalCode - DirectoryString(SIZE(1..40) + */ + public static readonly DerObjectIdentifier PostalCode = new DerObjectIdentifier( + "2.5.4.17"); + + /** + * dnQualifier - DirectoryString(SIZE(1..64) + */ + public static readonly DerObjectIdentifier DnQualifier = new DerObjectIdentifier( + "2.5.4.46"); + + /** + * RFC 3039 Pseudonym - DirectoryString(SIZE(1..64) + */ + public static readonly DerObjectIdentifier Pseudonym = new DerObjectIdentifier( + "2.5.4.65"); + + /** + * RFC 3039 DateOfBirth - GeneralizedTime - YYYYMMDD000000Z + */ + public static readonly DerObjectIdentifier DateOfBirth = new DerObjectIdentifier( + "1.3.6.1.5.5.7.9.1"); + + /** + * RFC 3039 PlaceOfBirth - DirectoryString(SIZE(1..128) + */ + public static readonly DerObjectIdentifier PlaceOfBirth = new DerObjectIdentifier( + "1.3.6.1.5.5.7.9.2"); + + /** + * RFC 3039 DateOfBirth - PrintableString (SIZE(1)) -- "M", "F", "m" or "f" + */ + public static readonly DerObjectIdentifier Gender = new DerObjectIdentifier( + "1.3.6.1.5.5.7.9.3"); + + /** + * RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166 + * codes only + */ + public static readonly DerObjectIdentifier CountryOfCitizenship = new DerObjectIdentifier( + "1.3.6.1.5.5.7.9.4"); + + /** + * RFC 3039 CountryOfCitizenship - PrintableString (SIZE (2)) -- ISO 3166 + * codes only + */ + public static readonly DerObjectIdentifier CountryOfResidence = new DerObjectIdentifier( + "1.3.6.1.5.5.7.9.5"); + + /** + * ISIS-MTT NameAtBirth - DirectoryString(SIZE(1..64) + */ + public static readonly DerObjectIdentifier NameAtBirth = new DerObjectIdentifier("1.3.36.8.3.14"); + + /** + * RFC 3039 PostalAddress - SEQUENCE SIZE (1..6) OF + * DirectoryString(SIZE(1..30)) + */ + public static readonly DerObjectIdentifier PostalAddress = new DerObjectIdentifier("2.5.4.16"); + + /** + * RFC 2256 dmdName + */ + public static readonly DerObjectIdentifier DmdName = new DerObjectIdentifier("2.5.4.54"); + + /** + * id-at-telephoneNumber + */ + public static readonly DerObjectIdentifier TelephoneNumber = X509ObjectIdentifiers.id_at_telephoneNumber; + + /** + * id-at-organizationIdentifier + */ + public static readonly DerObjectIdentifier OrganizationIdentifier = X509ObjectIdentifiers.id_at_organizationIdentifier; + + /** + * id-at-name + */ + public static readonly DerObjectIdentifier Name = X509ObjectIdentifiers.id_at_name; + + /** + * Email address (RSA PKCS#9 extension) - IA5String. + *

Note: if you're trying to be ultra orthodox, don't use this! It shouldn't be in here.

+ */ + public static readonly DerObjectIdentifier EmailAddress = PkcsObjectIdentifiers.Pkcs9AtEmailAddress; + + /** + * more from PKCS#9 + */ + public static readonly DerObjectIdentifier UnstructuredName = PkcsObjectIdentifiers.Pkcs9AtUnstructuredName; + public static readonly DerObjectIdentifier UnstructuredAddress = PkcsObjectIdentifiers.Pkcs9AtUnstructuredAddress; + + /** + * email address in Verisign certificates + */ + public static readonly DerObjectIdentifier E = EmailAddress; + + /* + * others... + */ + public static readonly DerObjectIdentifier DC = new DerObjectIdentifier("0.9.2342.19200300.100.1.25"); + + /** + * LDAP User id. + */ + public static readonly DerObjectIdentifier UID = new DerObjectIdentifier("0.9.2342.19200300.100.1.1"); + + /** + * determines whether or not strings should be processed and printed + * from back to front. + */ + public static bool DefaultReverse + { + get { lock (defaultReverse) return defaultReverse[0]; } + set { lock (defaultReverse) defaultReverse[0] = value; } + } + + private static readonly bool[] defaultReverse = { false }; + + /** + * default look up table translating OID values into their common symbols following + * the convention in RFC 2253 with a few extras + */ + private static readonly IDictionary DefaultSymbolsInternal = + new Dictionary(); + public static readonly IDictionary DefaultSymbols = + CollectionUtilities.ReadOnly(DefaultSymbolsInternal); + + /** + * look up table translating OID values into their common symbols following the convention in RFC 2253 + */ + private static readonly IDictionary RFC2253SymbolsInternal = + new Dictionary(); + public static readonly IDictionary RFC2253Symbols = + CollectionUtilities.ReadOnly(RFC2253SymbolsInternal); + + /** + * look up table translating OID values into their common symbols following the convention in RFC 1779 + * + */ + private static readonly IDictionary RFC1779SymbolsInternal = + new Dictionary(); + public static readonly IDictionary RFC1779Symbols = + CollectionUtilities.ReadOnly(RFC1779SymbolsInternal); + + /** + * look up table translating common symbols into their OIDS. + */ + private static readonly IDictionary DefaultLookupInternal = + new Dictionary(StringComparer.OrdinalIgnoreCase); + public static readonly IDictionary DefaultLookup = + CollectionUtilities.ReadOnly(DefaultLookupInternal); + + static X509Name() + { + DefaultSymbolsInternal.Add(C, "C"); + DefaultSymbolsInternal.Add(O, "O"); + DefaultSymbolsInternal.Add(T, "T"); + DefaultSymbolsInternal.Add(OU, "OU"); + DefaultSymbolsInternal.Add(CN, "CN"); + DefaultSymbolsInternal.Add(L, "L"); + DefaultSymbolsInternal.Add(ST, "ST"); + DefaultSymbolsInternal.Add(SerialNumber, "SERIALNUMBER"); + DefaultSymbolsInternal.Add(EmailAddress, "E"); + DefaultSymbolsInternal.Add(DC, "DC"); + DefaultSymbolsInternal.Add(UID, "UID"); + DefaultSymbolsInternal.Add(Street, "STREET"); + DefaultSymbolsInternal.Add(Surname, "SURNAME"); + DefaultSymbolsInternal.Add(GivenName, "GIVENNAME"); + DefaultSymbolsInternal.Add(Initials, "INITIALS"); + DefaultSymbolsInternal.Add(Generation, "GENERATION"); + DefaultSymbolsInternal.Add(UnstructuredAddress, "unstructuredAddress"); + DefaultSymbolsInternal.Add(UnstructuredName, "unstructuredName"); + DefaultSymbolsInternal.Add(UniqueIdentifier, "UniqueIdentifier"); + DefaultSymbolsInternal.Add(DnQualifier, "DN"); + DefaultSymbolsInternal.Add(Pseudonym, "Pseudonym"); + DefaultSymbolsInternal.Add(PostalAddress, "PostalAddress"); + DefaultSymbolsInternal.Add(NameAtBirth, "NameAtBirth"); + DefaultSymbolsInternal.Add(CountryOfCitizenship, "CountryOfCitizenship"); + DefaultSymbolsInternal.Add(CountryOfResidence, "CountryOfResidence"); + DefaultSymbolsInternal.Add(Gender, "Gender"); + DefaultSymbolsInternal.Add(PlaceOfBirth, "PlaceOfBirth"); + DefaultSymbolsInternal.Add(DateOfBirth, "DateOfBirth"); + DefaultSymbolsInternal.Add(PostalCode, "PostalCode"); + DefaultSymbolsInternal.Add(BusinessCategory, "BusinessCategory"); + DefaultSymbolsInternal.Add(TelephoneNumber, "TelephoneNumber"); + + RFC2253SymbolsInternal.Add(C, "C"); + RFC2253SymbolsInternal.Add(O, "O"); + RFC2253SymbolsInternal.Add(OU, "OU"); + RFC2253SymbolsInternal.Add(CN, "CN"); + RFC2253SymbolsInternal.Add(L, "L"); + RFC2253SymbolsInternal.Add(ST, "ST"); + RFC2253SymbolsInternal.Add(Street, "STREET"); + RFC2253SymbolsInternal.Add(DC, "DC"); + RFC2253SymbolsInternal.Add(UID, "UID"); + + RFC1779SymbolsInternal.Add(C, "C"); + RFC1779SymbolsInternal.Add(O, "O"); + RFC1779SymbolsInternal.Add(OU, "OU"); + RFC1779SymbolsInternal.Add(CN, "CN"); + RFC1779SymbolsInternal.Add(L, "L"); + RFC1779SymbolsInternal.Add(ST, "ST"); + RFC1779SymbolsInternal.Add(Street, "STREET"); + + DefaultLookupInternal.Add("c", C); + DefaultLookupInternal.Add("o", O); + DefaultLookupInternal.Add("t", T); + DefaultLookupInternal.Add("ou", OU); + DefaultLookupInternal.Add("cn", CN); + DefaultLookupInternal.Add("l", L); + DefaultLookupInternal.Add("st", ST); + DefaultLookupInternal.Add("serialnumber", SerialNumber); + DefaultLookupInternal.Add("street", Street); + DefaultLookupInternal.Add("emailaddress", E); + DefaultLookupInternal.Add("dc", DC); + DefaultLookupInternal.Add("e", E); + DefaultLookupInternal.Add("uid", UID); + DefaultLookupInternal.Add("surname", Surname); + DefaultLookupInternal.Add("givenname", GivenName); + DefaultLookupInternal.Add("initials", Initials); + DefaultLookupInternal.Add("generation", Generation); + DefaultLookupInternal.Add("unstructuredaddress", UnstructuredAddress); + DefaultLookupInternal.Add("unstructuredname", UnstructuredName); + DefaultLookupInternal.Add("uniqueidentifier", UniqueIdentifier); + DefaultLookupInternal.Add("dn", DnQualifier); + DefaultLookupInternal.Add("pseudonym", Pseudonym); + DefaultLookupInternal.Add("postaladdress", PostalAddress); + DefaultLookupInternal.Add("nameofbirth", NameAtBirth); + DefaultLookupInternal.Add("countryofcitizenship", CountryOfCitizenship); + DefaultLookupInternal.Add("countryofresidence", CountryOfResidence); + DefaultLookupInternal.Add("gender", Gender); + DefaultLookupInternal.Add("placeofbirth", PlaceOfBirth); + DefaultLookupInternal.Add("dateofbirth", DateOfBirth); + DefaultLookupInternal.Add("postalcode", PostalCode); + DefaultLookupInternal.Add("businesscategory", BusinessCategory); + DefaultLookupInternal.Add("telephonenumber", TelephoneNumber); + } + + private readonly List ordering = new List(); + private readonly X509NameEntryConverter converter; + + private IList values = new List(); + private IList added = new List(); + private Asn1Sequence seq; + + /** + * Return a X509Name based on the passed in tagged object. + * + * @param obj tag object holding name. + * @param explicitly true if explicitly tagged false otherwise. + * @return the X509Name + */ + public static X509Name GetInstance( + Asn1TaggedObject obj, + bool explicitly) + { + return GetInstance(Asn1Sequence.GetInstance(obj, explicitly)); + } + + public static X509Name GetInstance( + object obj) + { + if (obj is X509Name) + return (X509Name)obj; + if (obj == null) + return null; + return new X509Name(Asn1Sequence.GetInstance(obj)); + } + + protected X509Name() + { + } + + /** + * Constructor from Asn1Sequence + * + * the principal will be a list of constructed sets, each containing an (OID, string) pair. + */ + protected X509Name(Asn1Sequence seq) + { + this.seq = seq; + + foreach (Asn1Encodable asn1Obj in seq) + { + Asn1Set asn1Set = Asn1Set.GetInstance(asn1Obj.ToAsn1Object()); + + for (int i = 0; i < asn1Set.Count; i++) + { + Asn1Sequence s = Asn1Sequence.GetInstance(asn1Set[i].ToAsn1Object()); + + if (s.Count != 2) + throw new ArgumentException("badly sized pair"); + + ordering.Add(DerObjectIdentifier.GetInstance(s[0].ToAsn1Object())); + + Asn1Object derValue = s[1].ToAsn1Object(); + if (derValue is IAsn1String && !(derValue is DerUniversalString)) + { + string v = ((IAsn1String)derValue).GetString(); +#if NET_STANDARD_2_1 + if (v.StartsWith('#')) +#else + if (v.StartsWith("#")) +#endif + { + v = "\\" + v; + } + + values.Add(v); + } + else + { + values.Add("#" + Hex.ToHexString(derValue.GetEncoded())); + } + + added.Add(i != 0); + } + } + } + + /** + * Constructor from a table of attributes with ordering. + *

+ * it's is assumed the table contains OID/string pairs, and the contents + * of the table are copied into an internal table as part of the + * construction process. The ordering ArrayList should contain the OIDs + * in the order they are meant to be encoded or printed in ToString.

+ */ + public X509Name( + IList ordering, + IDictionary attributes) + : this(ordering, attributes, new X509DefaultEntryConverter()) + { + } + + /** + * Constructor from a table of attributes with ordering. + *

+ * it's is assumed the table contains OID/string pairs, and the contents + * of the table are copied into an internal table as part of the + * construction process. The ordering ArrayList should contain the OIDs + * in the order they are meant to be encoded or printed in ToString.

+ *

+ * The passed in converter will be used to convert the strings into their + * ASN.1 counterparts.

+ */ + public X509Name( + IList ordering, + IDictionary attributes, + X509NameEntryConverter converter) + { + this.converter = converter; + + foreach (DerObjectIdentifier oid in ordering) + { + if (!attributes.TryGetValue(oid, out var attribute)) + throw new ArgumentException("No attribute for object id - " + oid + " - passed to distinguished name"); + + //object attribute = attributes[oid]; + //if (attribute == null) + //{ + // throw new ArgumentException("No attribute for object id - " + oid + " - passed to distinguished name"); + //} + + this.ordering.Add(oid); + this.added.Add(false); + this.values.Add(attribute); // copy the hash table + } + } + + /** + * Takes two vectors one of the oids and the other of the values. + */ + public X509Name(IList oids, IList values) + : this(oids, values, new X509DefaultEntryConverter()) + { + } + + /** + * Takes two vectors one of the oids and the other of the values. + *

+ * The passed in converter will be used to convert the strings into their + * ASN.1 counterparts.

+ */ + public X509Name(IList oids, IList values, X509NameEntryConverter converter) + { + this.converter = converter; + + if (oids.Count != values.Count) + throw new ArgumentException("'oids' must be same length as 'values'."); + + for (int i = 0; i < oids.Count; i++) + { + this.ordering.Add(oids[i]); + this.values.Add(values[i]); + this.added.Add(false); + } + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes. + */ + public X509Name(string dirName) + : this(DefaultReverse, DefaultLookup, dirName) + { + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes with each + * string value being converted to its associated ASN.1 type using the passed + * in converter. + */ + public X509Name(string dirName, X509NameEntryConverter converter) + : this(DefaultReverse, DefaultLookup, dirName, converter) + { + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes. If reverse + * is true, create the encoded version of the sequence starting from the + * last element in the string. + */ + public X509Name(bool reverse, string dirName) + : this(reverse, DefaultLookup, dirName) + { + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes with each + * string value being converted to its associated ASN.1 type using the passed + * in converter. If reverse is true the ASN.1 sequence representing the DN will + * be built by starting at the end of the string, rather than the start. + */ + public X509Name(bool reverse, string dirName, X509NameEntryConverter converter) + : this(reverse, DefaultLookup, dirName, converter) + { + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes. lookUp + * should provide a table of lookups, indexed by lowercase only strings and + * yielding a DerObjectIdentifier, other than that OID. and numeric oids + * will be processed automatically. + *
+ * If reverse is true, create the encoded version of the sequence + * starting from the last element in the string. + * @param reverse true if we should start scanning from the end (RFC 2553). + * @param lookUp table of names and their oids. + * @param dirName the X.500 string to be parsed. + */ + public X509Name(bool reverse, IDictionary lookup, string dirName) + : this(reverse, lookup, dirName, new X509DefaultEntryConverter()) + { + } + + private DerObjectIdentifier DecodeOid(string name, IDictionary lookup) + { + if (name.StartsWith("OID.", StringComparison.OrdinalIgnoreCase)) + return new DerObjectIdentifier(name.Substring("OID.".Length)); + + if (name[0] >= '0' && name[0] <= '9') + return new DerObjectIdentifier(name); + + if (lookup.TryGetValue(name, out var oid)) + return oid; + + throw new ArgumentException("Unknown object id - " + name + " - passed to distinguished name"); + } + + /** + * Takes an X509 dir name as a string of the format "C=AU, ST=Victoria", or + * some such, converting it into an ordered set of name attributes. lookUp + * should provide a table of lookups, indexed by lowercase only strings and + * yielding a DerObjectIdentifier, other than that OID. and numeric oids + * will be processed automatically. The passed in converter is used to convert the + * string values to the right of each equals sign to their ASN.1 counterparts. + *
+ * @param reverse true if we should start scanning from the end, false otherwise. + * @param lookUp table of names and oids. + * @param dirName the string dirName + * @param converter the converter to convert string values into their ASN.1 equivalents + */ + public X509Name(bool reverse, IDictionary lookup, string dirName, + X509NameEntryConverter converter) + { + this.converter = converter; + X509NameTokenizer nTok = new X509NameTokenizer(dirName); + + while (nTok.HasMoreTokens()) + { + string token = nTok.NextToken(); + int index = token.IndexOf('='); + + if (index == -1) + throw new ArgumentException("badly formated directory string"); + + string name = token.Substring(0, index); + string value = token.Substring(index + 1); + DerObjectIdentifier oid = DecodeOid(name, lookup); + + if (value.IndexOf('+') > 0) + { + X509NameTokenizer vTok = new X509NameTokenizer(value, '+'); + string v = vTok.NextToken(); + + this.ordering.Add(oid); + this.values.Add(v); + this.added.Add(false); + + while (vTok.HasMoreTokens()) + { + string sv = vTok.NextToken(); + int ndx = sv.IndexOf('='); + + string nm = sv.Substring(0, ndx); + string vl = sv.Substring(ndx + 1); + this.ordering.Add(DecodeOid(nm, lookup)); + this.values.Add(vl); + this.added.Add(true); + } + } + else + { + this.ordering.Add(oid); + this.values.Add(value); + this.added.Add(false); + } + } + + if (reverse) + { +// this.ordering.Reverse(); +// this.values.Reverse(); +// this.added.Reverse(); + var o = new List(); + var v = new List(); + var a = new List(); + int count = 1; + + for (int i = 0; i < this.ordering.Count; i++) + { + if (!((bool) this.added[i])) + { + count = 0; + } + + int index = count++; + + o.Insert(index, this.ordering[i]); + v.Insert(index, this.values[i]); + a.Insert(index, this.added[i]); + } + + this.ordering = o; + this.values = v; + this.added = a; + } + } + + /** + * return an IList of the oids in the name, in the order they were found. + */ + public IList GetOidList() + { + return new List(ordering); + } + + /** + * return an IList of the values found in the name, in the order they + * were found. + */ + public IList GetValueList() + { + return GetValueList(null); + } + + /** + * return an IList of the values found in the name, in the order they + * were found, with the DN label corresponding to passed in oid. + */ + public IList GetValueList(DerObjectIdentifier oid) + { + var v = new List(); + for (int i = 0; i != values.Count; i++) + { + if (null == oid || oid.Equals(ordering[i])) + { + string val = (string)values[i]; + if (val.StartsWith("\\#", StringComparison.OrdinalIgnoreCase)) + { + val = val.Substring(1); + } + + v.Add(val); + } + } + return v; + } + + public override Asn1Object ToAsn1Object() + { + if (seq == null) + { + Asn1EncodableVector vec = new Asn1EncodableVector(); + Asn1EncodableVector sVec = new Asn1EncodableVector(); + DerObjectIdentifier lstOid = null; + + for (int i = 0; i != ordering.Count; i++) + { + DerObjectIdentifier oid = (DerObjectIdentifier)ordering[i]; + string str = (string)values[i]; + + if (lstOid == null + || ((bool)this.added[i])) + { + } + else + { + vec.Add(new DerSet(sVec)); + sVec = new Asn1EncodableVector(); + } + + sVec.Add( + new DerSequence( + oid, + converter.GetConvertedValue(oid, str))); + + lstOid = oid; + } + + vec.Add(new DerSet(sVec)); + + seq = new DerSequence(vec); + } + + return seq; + } + + /// The X509Name object to test equivalency against. + /// If true, the order of elements must be the same, + /// as well as the values associated with each element. + public bool Equivalent( + X509Name other, + bool inOrder) + { + if (!inOrder) + return this.Equivalent(other); + + if (other == null) + return false; + + if (other == this) + return true; + + int orderingSize = ordering.Count; + + if (orderingSize != other.ordering.Count) + return false; + + for (int i = 0; i < orderingSize; i++) + { + DerObjectIdentifier oid = (DerObjectIdentifier) ordering[i]; + DerObjectIdentifier oOid = (DerObjectIdentifier) other.ordering[i]; + + if (!oid.Equals(oOid)) + return false; + + string val = (string) values[i]; + string oVal = (string) other.values[i]; + + if (!EquivalentStrings(val, oVal)) + return false; + } + + return true; + } + + /** + * test for equivalence - note: case is ignored. + */ + public bool Equivalent( + X509Name other) + { + if (other == null) + return false; + + if (other == this) + return true; + + int orderingSize = ordering.Count; + + if (orderingSize != other.ordering.Count) + { + return false; + } + + bool[] indexes = new bool[orderingSize]; + int start, end, delta; + + if (ordering[0].Equals(other.ordering[0])) // guess forward + { + start = 0; + end = orderingSize; + delta = 1; + } + else // guess reversed - most common problem + { + start = orderingSize - 1; + end = -1; + delta = -1; + } + + for (int i = start; i != end; i += delta) + { + bool found = false; + DerObjectIdentifier oid = (DerObjectIdentifier)ordering[i]; + string value = (string)values[i]; + + for (int j = 0; j < orderingSize; j++) + { + if (indexes[j]) + { + continue; + } + + DerObjectIdentifier oOid = (DerObjectIdentifier)other.ordering[j]; + + if (oid.Equals(oOid)) + { + string oValue = (string)other.values[j]; + + if (EquivalentStrings(value, oValue)) + { + indexes[j] = true; + found = true; + break; + } + } + } + + if (!found) + { + return false; + } + } + + return true; + } + + private static bool EquivalentStrings(string s1, string s2) + { + string v1 = Canonicalize(s1); + string v2 = Canonicalize(s2); + + if (!v1.Equals(v2)) + { + v1 = StripInternalSpaces(v1); + v2 = StripInternalSpaces(v2); + + if (!v1.Equals(v2)) + return false; + } + + return true; + } + + private static string Canonicalize(string s) + { + string v = s.ToLowerInvariant().Trim(); + +#if NET_STANDARD_2_1 + if (v.StartsWith('#')) +#else + if (v.StartsWith("#")) +#endif + { + Asn1Object obj = DecodeObject(v); + if (obj is IAsn1String str) + { + v = str.GetString().ToLowerInvariant().Trim(); + } + } + + return v; + } + + private static Asn1Object DecodeObject(string v) + { + try + { + return Asn1Object.FromByteArray(Hex.DecodeStrict(v, 1, v.Length - 1)); + } + catch (IOException e) + { + throw new InvalidOperationException("unknown encoding in name: " + e.Message, e); + } + } + + private static string StripInternalSpaces(string str) + { + StringBuilder res = new StringBuilder(); + + if (str.Length != 0) + { + char c1 = str[0]; + + res.Append(c1); + + for (int k = 1; k < str.Length; k++) + { + char c2 = str[k]; + if (!(c1 == ' ' && c2 == ' ')) + { + res.Append(c2); + } + c1 = c2; + } + } + + return res.ToString(); + } + + private void AppendValue(StringBuilder buf, IDictionary oidSymbols, + DerObjectIdentifier oid, string val) + { + if (oidSymbols.TryGetValue(oid, out var sym)) + { + buf.Append(sym); + } + else + { + buf.Append(oid.Id); + } + + buf.Append('='); + + int index = buf.Length; + + buf.Append(val); + + int end = buf.Length; + + if (val.StartsWith("\\#", StringComparison.OrdinalIgnoreCase)) + { + index += 2; + } + + while (index != end) + { + if ((buf[index] == ',') + || (buf[index] == '"') + || (buf[index] == '\\') + || (buf[index] == '+') + || (buf[index] == '=') + || (buf[index] == '<') + || (buf[index] == '>') + || (buf[index] == ';')) + { + buf.Insert(index++, "\\"); + end++; + } + + index++; + } + } + + /** + * convert the structure to a string - if reverse is true the + * oids and values are listed out starting with the last element + * in the sequence (ala RFC 2253), otherwise the string will begin + * with the first element of the structure. If no string definition + * for the oid is found in oidSymbols the string value of the oid is + * added. Two standard symbol tables are provided DefaultSymbols, and + * RFC2253Symbols as part of this class. + * + * @param reverse if true start at the end of the sequence and work back. + * @param oidSymbols look up table strings for oids. + */ + public string ToString(bool reverse, IDictionary oidSymbols) + { + var components = new List(); + + StringBuilder ava = null; + + for (int i = 0; i < ordering.Count; i++) + { + if (added[i]) + { + ava.Append('+'); + AppendValue(ava, oidSymbols, ordering[i], values[i]); + } + else + { + ava = StringBuilderPool.Get(0); //new StringBuilder(); + AppendValue(ava, oidSymbols, ordering[i], values[i]); + components.Add(ava); + } + } + + if (reverse) + { + components.Reverse(); + } + + StringBuilder buf = StringBuilderPool.Get(components.Count); //new StringBuilder(); + + if (components.Count > 0) + { + buf.Append(StringBuilderPool.ReleaseAndGrab(components[0])); + + for (int i = 1; i < components.Count; ++i) + { + buf.Append(','); + buf.Append(StringBuilderPool.ReleaseAndGrab(components[i])); + } + } + + return StringBuilderPool.ReleaseAndGrab(buf); + } + + string cachedStrRepresentation = null; + public override string ToString() + { + return cachedStrRepresentation ?? (cachedStrRepresentation = ToString(DefaultReverse, DefaultSymbols)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs.meta new file mode 100644 index 00000000..6ae858d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6bd851c7853c88a468bc4a70c5ea30a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509Name.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs new file mode 100644 index 00000000..62856f1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * It turns out that the number of standard ways the fields in a DN should be + * encoded into their ASN.1 counterparts is rapidly approaching the + * number of machines on the internet. By default the X509Name class + * will produce UTF8Strings in line with the current recommendations (RFC 3280). + *

+ * An example of an encoder look like below: + *

+     * public class X509DirEntryConverter
+     *     : X509NameEntryConverter
+     * {
+     *     public Asn1Object GetConvertedValue(
+     *         DerObjectIdentifier  oid,
+     *         string               value)
+     *     {
+     *         if (str.Length() != 0 && str.charAt(0) == '#')
+     *         {
+     *             return ConvertHexEncoded(str, 1);
+     *         }
+     *         if (oid.Equals(EmailAddress))
+     *         {
+     *             return new DerIA5String(str);
+     *         }
+     *         else if (CanBePrintable(str))
+     *         {
+     *             return new DerPrintableString(str);
+     *         }
+     *         else if (CanBeUTF8(str))
+     *         {
+     *             return new DerUtf8String(str);
+     *         }
+     *         else
+     *         {
+     *             return new DerBmpString(str);
+     *         }
+     *     }
+     * }
+	 * 
+ *

+ */ + public abstract class X509NameEntryConverter + { + /** + * Convert an inline encoded hex string rendition of an ASN.1 + * object back into its corresponding ASN.1 object. + * + * @param str the hex encoded object + * @param off the index at which the encoding starts + * @return the decoded object + */ + protected Asn1Object ConvertHexEncoded( + string hexString, + int offset) + { + return Asn1Object.FromByteArray(Hex.DecodeStrict(hexString, offset, hexString.Length - offset)); + } + + /** + * return true if the passed in string can be represented without + * loss as a PrintableString, false otherwise. + */ + protected bool CanBePrintable( + string str) + { + return DerPrintableString.IsPrintableString(str); + } + + /** + * Convert the passed in string value into the appropriate ASN.1 + * encoded object. + * + * @param oid the oid associated with the value in the DN. + * @param value the value of the particular DN component. + * @return the ASN.1 equivalent for the value. + */ + public abstract Asn1Object GetConvertedValue(DerObjectIdentifier oid, string value); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs.meta new file mode 100644 index 00000000..83378c34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a20f605828dc624ca5c51be8147130c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameEntryConverter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs new file mode 100644 index 00000000..8356435d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + /** + * class for breaking up an X500 Name into it's component tokens, ala + * java.util.StringTokenizer. We need this class as some of the + * lightweight Java environment don't support classes like + * StringTokenizer. + */ + public class X509NameTokenizer + { + private string value; + private int index; + private char separator; + private StringBuilder buffer = new StringBuilder(); + + public X509NameTokenizer( + string oid) + : this(oid, ',') + { + } + + public X509NameTokenizer( + string oid, + char separator) + { + this.value = oid; + this.index = -1; + this.separator = separator; + } + + public bool HasMoreTokens() + { + return index != value.Length; + } + + public string NextToken() + { + if (index == value.Length) + { + return null; + } + + int end = index + 1; + bool quoted = false; + bool escaped = false; + + buffer.Remove(0, buffer.Length); + + while (end != value.Length) + { + char c = value[end]; + + if (c == '"') + { + if (!escaped) + { + quoted = !quoted; + } + else + { + buffer.Append(c); + escaped = false; + } + } + else + { + if (escaped || quoted) + { + if (c == '#' && buffer[buffer.Length - 1] == '=') + { + buffer.Append('\\'); + } + else if (c == '+' && separator != '+') + { + buffer.Append('\\'); + } + buffer.Append(c); + escaped = false; + } + else if (c == '\\') + { + escaped = true; + } + else if (c == separator) + { + break; + } + else + { + buffer.Append(c); + } + } + + end++; + } + + index = end; + + return buffer.ToString().Trim(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs.meta new file mode 100644 index 00000000..80401958 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ce038e76e5511145b67464ee68cfb09 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509NameTokenizer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs new file mode 100644 index 00000000..e37f0be1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509 +{ + public abstract class X509ObjectIdentifiers + { + // + // base id + // + internal const string ID = "2.5.4"; + + public static readonly DerObjectIdentifier CommonName = new DerObjectIdentifier(ID + ".3"); + public static readonly DerObjectIdentifier CountryName = new DerObjectIdentifier(ID + ".6"); + public static readonly DerObjectIdentifier LocalityName = new DerObjectIdentifier(ID + ".7"); + public static readonly DerObjectIdentifier StateOrProvinceName = new DerObjectIdentifier(ID + ".8"); + public static readonly DerObjectIdentifier Organization = new DerObjectIdentifier(ID + ".10"); + public static readonly DerObjectIdentifier OrganizationalUnitName = new DerObjectIdentifier(ID + ".11"); + + public static readonly DerObjectIdentifier id_at_telephoneNumber = new DerObjectIdentifier(ID + ".20"); + public static readonly DerObjectIdentifier id_at_name = new DerObjectIdentifier(ID + ".41"); + + public static readonly DerObjectIdentifier id_at_organizationIdentifier = new DerObjectIdentifier("2.5.4.97"); + + // id-SHA1 OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } // + public static readonly DerObjectIdentifier IdSha1 = new DerObjectIdentifier("1.3.14.3.2.26"); + + // + // ripemd160 OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) TeleTrust(36) algorithm(3) hashAlgorithm(2) RipeMD-160(1)} + // + public static readonly DerObjectIdentifier RipeMD160 = new DerObjectIdentifier("1.3.36.3.2.1"); + + // + // ripemd160WithRSAEncryption OBJECT IDENTIFIER ::= + // {iso(1) identified-organization(3) TeleTrust(36) algorithm(3) signatureAlgorithm(3) rsaSignature(1) rsaSignatureWithripemd160(2) } + // + public static readonly DerObjectIdentifier RipeMD160WithRsaEncryption = new DerObjectIdentifier("1.3.36.3.3.1.2"); + + public static readonly DerObjectIdentifier IdEARsa = new DerObjectIdentifier("2.5.8.1.1"); + + // id-pkix + public static readonly DerObjectIdentifier IdPkix = new DerObjectIdentifier("1.3.6.1.5.5.7"); + + // + // private internet extensions + // + public static readonly DerObjectIdentifier IdPE = new DerObjectIdentifier(IdPkix + ".1"); + + // + // authority information access + // + public static readonly DerObjectIdentifier IdAD = new DerObjectIdentifier(IdPkix + ".48"); + public static readonly DerObjectIdentifier IdADCAIssuers = new DerObjectIdentifier(IdAD + ".2"); + public static readonly DerObjectIdentifier IdADOcsp = new DerObjectIdentifier(IdAD + ".1"); + + // + // OID for ocsp and crl uri in AuthorityInformationAccess extension + // + public static readonly DerObjectIdentifier OcspAccessMethod = IdADOcsp; + public static readonly DerObjectIdentifier CrlAccessMethod = IdADCAIssuers; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs.meta new file mode 100644 index 00000000..d77a9a26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8eacb57f0a2c51a4190b15e89c7932b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/X509ObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified.meta new file mode 100644 index 00000000..714e4c0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9007b8e3f3e77524798fb96616406909 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs new file mode 100644 index 00000000..46695be0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The BiometricData object. + *
+    * BiometricData  ::=  SEQUENCE {
+    *       typeOfBiometricData  TypeOfBiometricData,
+    *       hashAlgorithm        AlgorithmIdentifier,
+    *       biometricDataHash    OCTET STRING,
+    *       sourceDataUri        IA5String OPTIONAL  }
+    * 
+ */ + public class BiometricData + : Asn1Encodable + { + private readonly TypeOfBiometricData typeOfBiometricData; + private readonly AlgorithmIdentifier hashAlgorithm; + private readonly Asn1OctetString biometricDataHash; + private readonly DerIA5String sourceDataUri; + + public static BiometricData GetInstance( + object obj) + { + if (obj == null || obj is BiometricData) + { + return (BiometricData)obj; + } + + if (obj is Asn1Sequence) + { + return new BiometricData(Asn1Sequence.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private BiometricData( + Asn1Sequence seq) + { + typeOfBiometricData = TypeOfBiometricData.GetInstance(seq[0]); + hashAlgorithm = AlgorithmIdentifier.GetInstance(seq[1]); + biometricDataHash = Asn1OctetString.GetInstance(seq[2]); + + if (seq.Count > 3) + { + sourceDataUri = DerIA5String.GetInstance(seq[3]); + } + } + + public BiometricData( + TypeOfBiometricData typeOfBiometricData, + AlgorithmIdentifier hashAlgorithm, + Asn1OctetString biometricDataHash, + DerIA5String sourceDataUri) + { + this.typeOfBiometricData = typeOfBiometricData; + this.hashAlgorithm = hashAlgorithm; + this.biometricDataHash = biometricDataHash; + this.sourceDataUri = sourceDataUri; + } + + public BiometricData( + TypeOfBiometricData typeOfBiometricData, + AlgorithmIdentifier hashAlgorithm, + Asn1OctetString biometricDataHash) + { + this.typeOfBiometricData = typeOfBiometricData; + this.hashAlgorithm = hashAlgorithm; + this.biometricDataHash = biometricDataHash; + this.sourceDataUri = null; + } + + public TypeOfBiometricData TypeOfBiometricData + { + get { return typeOfBiometricData; } + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return hashAlgorithm; } + } + + public Asn1OctetString BiometricDataHash + { + get { return biometricDataHash; } + } + + public DerIA5String SourceDataUri + { + get { return sourceDataUri; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(typeOfBiometricData, hashAlgorithm, biometricDataHash); + v.AddOptional(sourceDataUri); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs.meta new file mode 100644 index 00000000..28d05c2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6a8793459291904c8ecd9efafd0e7ef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/BiometricData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs new file mode 100644 index 00000000..6e80966a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + public abstract class EtsiQCObjectIdentifiers + { + // + // base id + // + public static readonly DerObjectIdentifier IdEtsiQcs = new DerObjectIdentifier("0.4.0.1862.1"); + + public static readonly DerObjectIdentifier IdEtsiQcsQcCompliance = new DerObjectIdentifier(IdEtsiQcs+".1"); + public static readonly DerObjectIdentifier IdEtsiQcsLimitValue = new DerObjectIdentifier(IdEtsiQcs+".2"); + public static readonly DerObjectIdentifier IdEtsiQcsRetentionPeriod = new DerObjectIdentifier(IdEtsiQcs+".3"); + public static readonly DerObjectIdentifier IdEtsiQcsQcSscd = new DerObjectIdentifier(IdEtsiQcs+".4"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs.meta new file mode 100644 index 00000000..85d8bfb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: da4f80eaa524cd34c932b9932eda0969 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/ETSIQCObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs new file mode 100644 index 00000000..166da759 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs @@ -0,0 +1,88 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The Iso4217CurrencyCode object. + *
+    * Iso4217CurrencyCode  ::=  CHOICE {
+    *       alphabetic              PrintableString (SIZE 3), --Recommended
+    *       numeric              INTEGER (1..999) }
+    * -- Alphabetic or numeric currency code as defined in ISO 4217
+    * -- It is recommended that the Alphabetic form is used
+    * 
+ */ + public class Iso4217CurrencyCode + : Asn1Encodable, IAsn1Choice + { + internal const int AlphabeticMaxSize = 3; + internal const int NumericMinSize = 1; + internal const int NumericMaxSize = 999; + + internal Asn1Encodable obj; +// internal int numeric; + + public static Iso4217CurrencyCode GetInstance( + object obj) + { + if (obj == null || obj is Iso4217CurrencyCode) + { + return (Iso4217CurrencyCode) obj; + } + + if (obj is DerInteger) + { + DerInteger numericobj = DerInteger.GetInstance(obj); + int numeric = numericobj.IntValueExact; + return new Iso4217CurrencyCode(numeric); + } + + if (obj is DerPrintableString) + { + DerPrintableString alphabetic = DerPrintableString.GetInstance(obj); + return new Iso4217CurrencyCode(alphabetic.GetString()); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public Iso4217CurrencyCode( + int numeric) + { + if (numeric > NumericMaxSize || numeric < NumericMinSize) + { + throw new ArgumentException("wrong size in numeric code : not in (" + NumericMinSize + ".." + NumericMaxSize + ")"); + } + + obj = new DerInteger(numeric); + } + + public Iso4217CurrencyCode( + string alphabetic) + { + if (alphabetic.Length > AlphabeticMaxSize) + { + throw new ArgumentException("wrong size in alphabetic code : max size is " + AlphabeticMaxSize); + } + + obj = new DerPrintableString(alphabetic); + } + + public bool IsAlphabetic { get { return obj is DerPrintableString; } } + + public string Alphabetic { get { return ((DerPrintableString) obj).GetString(); } } + + public int Numeric { get { return ((DerInteger)obj).IntValueExact; } } + + public override Asn1Object ToAsn1Object() + { + return obj.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs.meta new file mode 100644 index 00000000..a6b8cb04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ddb09902663cdcd40bcd66ff40319dbe +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/Iso4217CurrencyCode.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs new file mode 100644 index 00000000..98664ffa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The MonetaryValue object. + *
+    * MonetaryValue  ::=  SEQUENCE {
+    *       currency              Iso4217CurrencyCode,
+    *       amount               INTEGER,
+    *       exponent             INTEGER }
+    * -- value = amount * 10^exponent
+    * 
+ */ + public class MonetaryValue + : Asn1Encodable + { + internal Iso4217CurrencyCode currency; + internal DerInteger amount; + internal DerInteger exponent; + + public static MonetaryValue GetInstance( + object obj) + { + if (obj == null || obj is MonetaryValue) + { + return (MonetaryValue) obj; + } + + if (obj is Asn1Sequence) + { + return new MonetaryValue(Asn1Sequence.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private MonetaryValue( + Asn1Sequence seq) + { + if (seq.Count != 3) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + currency = Iso4217CurrencyCode.GetInstance(seq[0]); + amount = DerInteger.GetInstance(seq[1]); + exponent = DerInteger.GetInstance(seq[2]); + } + + public MonetaryValue( + Iso4217CurrencyCode currency, + int amount, + int exponent) + { + this.currency = currency; + this.amount = new DerInteger(amount); + this.exponent = new DerInteger(exponent); + } + + public Iso4217CurrencyCode Currency + { + get { return currency; } + } + + public BigInteger Amount + { + get { return amount.Value; } + } + + public BigInteger Exponent + { + get { return exponent.Value; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(currency, amount, exponent); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs.meta new file mode 100644 index 00000000..0bdad043 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05abe8d6890993045b707154d57aadf3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/MonetaryValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs new file mode 100644 index 00000000..f748b803 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The QCStatement object. + *
+    * QCStatement ::= SEQUENCE {
+    *   statementId        OBJECT IDENTIFIER,
+    *   statementInfo      ANY DEFINED BY statementId OPTIONAL}
+    * 
+ */ + public class QCStatement + : Asn1Encodable + { + private readonly DerObjectIdentifier qcStatementId; + private readonly Asn1Encodable qcStatementInfo; + + public static QCStatement GetInstance( + object obj) + { + if (obj == null || obj is QCStatement) + { + return (QCStatement) obj; + } + + if (obj is Asn1Sequence) + { + return new QCStatement(Asn1Sequence.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + private QCStatement( + Asn1Sequence seq) + { + qcStatementId = DerObjectIdentifier.GetInstance(seq[0]); + + if (seq.Count > 1) + { + qcStatementInfo = seq[1]; + } + } + + public QCStatement( + DerObjectIdentifier qcStatementId) + { + this.qcStatementId = qcStatementId; + } + + public QCStatement( + DerObjectIdentifier qcStatementId, + Asn1Encodable qcStatementInfo) + { + this.qcStatementId = qcStatementId; + this.qcStatementInfo = qcStatementInfo; + } + + public DerObjectIdentifier StatementId + { + get { return qcStatementId; } + } + + public Asn1Encodable StatementInfo + { + get { return qcStatementInfo; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(qcStatementId); + v.AddOptional(qcStatementInfo); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs.meta new file mode 100644 index 00000000..e397fe40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41a0d27afe0848742a7c80f859960316 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/QCStatement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs new file mode 100644 index 00000000..4d805128 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + public sealed class Rfc3739QCObjectIdentifiers + { + private Rfc3739QCObjectIdentifiers() + { + } + + // + // base id + // + public static readonly DerObjectIdentifier IdQcs = new DerObjectIdentifier("1.3.6.1.5.5.7.11"); + + public static readonly DerObjectIdentifier IdQcsPkixQCSyntaxV1 = new DerObjectIdentifier(IdQcs+".1"); + public static readonly DerObjectIdentifier IdQcsPkixQCSyntaxV2 = new DerObjectIdentifier(IdQcs+".2"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs.meta new file mode 100644 index 00000000..d4b32581 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f985485487d36054ca5b6aff696d9355 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/RFC3739QCObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs new file mode 100644 index 00000000..b9586475 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The SemanticsInformation object. + *
+    *       SemanticsInformation ::= SEQUENCE {
+    *         semanticsIdentifier        OBJECT IDENTIFIER   OPTIONAL,
+    *         nameRegistrationAuthorities NameRegistrationAuthorities
+    *                                                         OPTIONAL }
+    *         (WITH COMPONENTS {..., semanticsIdentifier PRESENT}|
+    *          WITH COMPONENTS {..., nameRegistrationAuthorities PRESENT})
+    *
+    *     NameRegistrationAuthorities ::=  SEQUENCE SIZE (1..MAX) OF
+    *         GeneralName
+    * 
+ */ + public class SemanticsInformation + : Asn1Encodable + { + private readonly DerObjectIdentifier semanticsIdentifier; + private readonly GeneralName[] nameRegistrationAuthorities; + + public static SemanticsInformation GetInstance( + object obj) + { + if (obj == null || obj is SemanticsInformation) + { + return (SemanticsInformation) obj; + } + + if (obj is Asn1Sequence) + { + return new SemanticsInformation(Asn1Sequence.GetInstance(obj)); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public SemanticsInformation(Asn1Sequence seq) + { + if (seq.Count < 1) + throw new ArgumentException("no objects in SemanticsInformation"); + + var e = seq.GetEnumerator(); + e.MoveNext(); + var obj = e.Current; + if (obj is DerObjectIdentifier oid) + { + semanticsIdentifier = oid; + if (e.MoveNext()) + { + obj = e.Current; + } + else + { + obj = null; + } + } + + if (obj != null) + { + Asn1Sequence generalNameSeq = Asn1Sequence.GetInstance(obj); + nameRegistrationAuthorities = new GeneralName[generalNameSeq.Count]; + for (int i= 0; i < generalNameSeq.Count; i++) + { + nameRegistrationAuthorities[i] = GeneralName.GetInstance(generalNameSeq[i]); + } + } + } + + public SemanticsInformation( + DerObjectIdentifier semanticsIdentifier, + GeneralName[] generalNames) + { + this.semanticsIdentifier = semanticsIdentifier; + this.nameRegistrationAuthorities = generalNames; + } + + public SemanticsInformation( + DerObjectIdentifier semanticsIdentifier) + { + this.semanticsIdentifier = semanticsIdentifier; + } + + public SemanticsInformation( + GeneralName[] generalNames) + { + this.nameRegistrationAuthorities = generalNames; + } + + public DerObjectIdentifier SemanticsIdentifier + { + get { return semanticsIdentifier; } + } + + public GeneralName[] GetNameRegistrationAuthorities() + { + return nameRegistrationAuthorities; + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + v.AddOptional(semanticsIdentifier); + + if (null != nameRegistrationAuthorities) + { + v.Add(new DerSequence(nameRegistrationAuthorities)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs.meta new file mode 100644 index 00000000..df6ce417 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1a5f3c1135d04c4384ff3698fbcfdb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/SemanticsInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs new file mode 100644 index 00000000..a8768123 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.Qualified +{ + /** + * The TypeOfBiometricData object. + *
+    * TypeOfBiometricData ::= CHOICE {
+    *   predefinedBiometricType   PredefinedBiometricType,
+    *   biometricDataOid          OBJECT IDENTIFIER }
+    *
+    * PredefinedBiometricType ::= INTEGER {
+    *   picture(0),handwritten-signature(1)}
+    *   (picture|handwritten-signature)
+    * 
+ */ + public class TypeOfBiometricData + : Asn1Encodable, IAsn1Choice + { + public const int Picture = 0; + public const int HandwrittenSignature = 1; + + internal Asn1Encodable obj; + + public static TypeOfBiometricData GetInstance( + object obj) + { + if (obj == null || obj is TypeOfBiometricData) + { + return (TypeOfBiometricData) obj; + } + + if (obj is DerInteger) + { + DerInteger predefinedBiometricTypeObj = DerInteger.GetInstance(obj); + int predefinedBiometricType = predefinedBiometricTypeObj.IntValueExact; + + return new TypeOfBiometricData(predefinedBiometricType); + } + + if (obj is DerObjectIdentifier) + { + DerObjectIdentifier BiometricDataOid = DerObjectIdentifier.GetInstance(obj); + return new TypeOfBiometricData(BiometricDataOid); + } + + throw new ArgumentException("unknown object in GetInstance: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public TypeOfBiometricData( + int predefinedBiometricType) + { + if (predefinedBiometricType == Picture || predefinedBiometricType == HandwrittenSignature) + { + obj = new DerInteger(predefinedBiometricType); + } + else + { + throw new ArgumentException("unknow PredefinedBiometricType : " + predefinedBiometricType); + } + } + + public TypeOfBiometricData( + DerObjectIdentifier biometricDataOid) + { + obj = biometricDataOid; + } + + public bool IsPredefined + { + get { return obj is DerInteger; } + } + + public int PredefinedBiometricType + { + get { return ((DerInteger)obj).IntValueExact; } + } + + public DerObjectIdentifier BiometricDataOid + { + get { return (DerObjectIdentifier) obj; } + } + + public override Asn1Object ToAsn1Object() + { + return obj.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs.meta new file mode 100644 index 00000000..d82c5aff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0848196121a8fe64c8e774c5e762c232 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/qualified/TypeOfBiometricData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi.meta new file mode 100644 index 00000000..ff1bcd31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 82ee6990e8783a642a7603bac2a1be5c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs new file mode 100644 index 00000000..26af19fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI +{ + /** + * Structure for a name or pseudonym. + * + *
+	*       NameOrPseudonym ::= CHOICE {
+	*     	   surAndGivenName SEQUENCE {
+	*     	     surName DirectoryString,
+	*     	     givenName SEQUENCE OF DirectoryString 
+	*         },
+	*     	   pseudonym DirectoryString 
+	*       }
+	* 
+ * + * @see org.bouncycastle.asn1.x509.sigi.PersonalData + * + */ + public class NameOrPseudonym + : Asn1Encodable, IAsn1Choice + { + private readonly DirectoryString pseudonym; + private readonly DirectoryString surname; + private readonly Asn1Sequence givenName; + + public static NameOrPseudonym GetInstance( + object obj) + { + if (obj == null || obj is NameOrPseudonym) + { + return (NameOrPseudonym)obj; + } + + if (obj is IAsn1String) + { + return new NameOrPseudonym(DirectoryString.GetInstance(obj)); + } + + if (obj is Asn1Sequence) + { + return new NameOrPseudonym((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from DERString. + *

+ * The sequence is of type NameOrPseudonym: + *

+ *

+		*       NameOrPseudonym ::= CHOICE {
+		*     	   surAndGivenName SEQUENCE {
+		*     	     surName DirectoryString,
+		*     	     givenName SEQUENCE OF DirectoryString
+		*         },
+		*     	   pseudonym DirectoryString
+		*       }
+		* 
+ * @param pseudonym pseudonym value to use. + */ + public NameOrPseudonym( + DirectoryString pseudonym) + { + this.pseudonym = pseudonym; + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type NameOrPseudonym: + *

+ *

+		*       NameOrPseudonym ::= CHOICE {
+		*     	   surAndGivenName SEQUENCE {
+		*     	     surName DirectoryString,
+		*     	     givenName SEQUENCE OF DirectoryString
+		*         },
+		*     	   pseudonym DirectoryString
+		*       }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private NameOrPseudonym( + Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + if (!(seq[0] is IAsn1String)) + throw new ArgumentException("Bad object encountered: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(seq[0])); + + surname = DirectoryString.GetInstance(seq[0]); + givenName = Asn1Sequence.GetInstance(seq[1]); + } + + /** + * Constructor from a given details. + * + * @param pseudonym The pseudonym. + */ + public NameOrPseudonym( + string pseudonym) + : this(new DirectoryString(pseudonym)) + { + } + + /** + * Constructor from a given details. + * + * @param surname The surname. + * @param givenName A sequence of directory strings making up the givenName + */ + public NameOrPseudonym( + DirectoryString surname, + Asn1Sequence givenName) + { + this.surname = surname; + this.givenName = givenName; + } + + public DirectoryString Pseudonym + { + get { return pseudonym; } + } + + public DirectoryString Surname + { + get { return surname; } + } + + public DirectoryString[] GetGivenName() + { + DirectoryString[] items = new DirectoryString[givenName.Count]; + int count = 0; + foreach (object o in givenName) + { + items[count++] = DirectoryString.GetInstance(o); + } + return items; + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*       NameOrPseudonym ::= CHOICE {
+		*     	   surAndGivenName SEQUENCE {
+		*     	     surName DirectoryString,
+		*     	     givenName SEQUENCE OF DirectoryString
+		*         },
+		*     	   pseudonym DirectoryString
+		*       }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + if (pseudonym != null) + { + return pseudonym.ToAsn1Object(); + } + + return new DerSequence(surname, givenName); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs.meta new file mode 100644 index 00000000..361bb09a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6ab8cce8fbab2247afdf6cb57a1ac37 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/NameOrPseudonym.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs new file mode 100644 index 00000000..e6e86eb2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs @@ -0,0 +1,207 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI +{ + /** + * Contains personal data for the otherName field in the subjectAltNames + * extension. + *

+ *

+	*     PersonalData ::= SEQUENCE {
+	*       nameOrPseudonym NameOrPseudonym,
+	*       nameDistinguisher [0] INTEGER OPTIONAL,
+	*       dateOfBirth [1] GeneralizedTime OPTIONAL,
+	*       placeOfBirth [2] DirectoryString OPTIONAL,
+	*       gender [3] PrintableString OPTIONAL,
+	*       postalAddress [4] DirectoryString OPTIONAL
+	*       }
+	* 
+ * + * @see org.bouncycastle.asn1.x509.sigi.NameOrPseudonym + * @see org.bouncycastle.asn1.x509.sigi.SigIObjectIdentifiers + */ + public class PersonalData + : Asn1Encodable + { + private readonly NameOrPseudonym nameOrPseudonym; + private readonly BigInteger nameDistinguisher; + private readonly Asn1GeneralizedTime dateOfBirth; + private readonly DirectoryString placeOfBirth; + private readonly string gender; + private readonly DirectoryString postalAddress; + + public static PersonalData GetInstance( + object obj) + { + if (obj == null || obj is PersonalData) + { + return (PersonalData) obj; + } + + if (obj is Asn1Sequence) + { + return new PersonalData((Asn1Sequence) obj); + } + + throw new ArgumentException("unknown object in factory: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + /** + * Constructor from Asn1Sequence. + *

+ * The sequence is of type NameOrPseudonym: + *

+ *

+		*     PersonalData ::= SEQUENCE {
+		*       nameOrPseudonym NameOrPseudonym,
+		*       nameDistinguisher [0] INTEGER OPTIONAL,
+		*       dateOfBirth [1] GeneralizedTime OPTIONAL,
+		*       placeOfBirth [2] DirectoryString OPTIONAL,
+		*       gender [3] PrintableString OPTIONAL,
+		*       postalAddress [4] DirectoryString OPTIONAL
+		*       }
+		* 
+ * + * @param seq The ASN.1 sequence. + */ + private PersonalData(Asn1Sequence seq) + { + if (seq.Count < 1) + throw new ArgumentException("Bad sequence size: " + seq.Count); + + var e = seq.GetEnumerator(); + e.MoveNext(); + + nameOrPseudonym = NameOrPseudonym.GetInstance(e.Current); + + while (e.MoveNext()) + { + Asn1TaggedObject o = Asn1TaggedObject.GetInstance(e.Current); + int tag = o.TagNo; + switch (tag) + { + case 0: + nameDistinguisher = DerInteger.GetInstance(o, false).Value; + break; + case 1: + dateOfBirth = Asn1GeneralizedTime.GetInstance(o, false); + break; + case 2: + placeOfBirth = DirectoryString.GetInstance(o, true); + break; + case 3: + gender = DerPrintableString.GetInstance(o, false).GetString(); + break; + case 4: + postalAddress = DirectoryString.GetInstance(o, true); + break; + default: + throw new ArgumentException("Bad tag number: " + o.TagNo); + } + } + } + + /** + * Constructor from a given details. + * + * @param nameOrPseudonym Name or pseudonym. + * @param nameDistinguisher Name distinguisher. + * @param dateOfBirth Date of birth. + * @param placeOfBirth Place of birth. + * @param gender Gender. + * @param postalAddress Postal Address. + */ + public PersonalData( + NameOrPseudonym nameOrPseudonym, + BigInteger nameDistinguisher, + Asn1GeneralizedTime dateOfBirth, + DirectoryString placeOfBirth, + string gender, + DirectoryString postalAddress) + { + this.nameOrPseudonym = nameOrPseudonym; + this.dateOfBirth = dateOfBirth; + this.gender = gender; + this.nameDistinguisher = nameDistinguisher; + this.postalAddress = postalAddress; + this.placeOfBirth = placeOfBirth; + } + + public NameOrPseudonym NameOrPseudonym + { + get { return nameOrPseudonym; } + } + + public BigInteger NameDistinguisher + { + get { return nameDistinguisher; } + } + + public Asn1GeneralizedTime DateOfBirth + { + get { return dateOfBirth; } + } + + public DirectoryString PlaceOfBirth + { + get { return placeOfBirth; } + } + + public string Gender + { + get { return gender; } + } + + public DirectoryString PostalAddress + { + get { return postalAddress; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *

+ * Returns: + *

+ *

+		*     PersonalData ::= SEQUENCE {
+		*       nameOrPseudonym NameOrPseudonym,
+		*       nameDistinguisher [0] INTEGER OPTIONAL,
+		*       dateOfBirth [1] GeneralizedTime OPTIONAL,
+		*       placeOfBirth [2] DirectoryString OPTIONAL,
+		*       gender [3] PrintableString OPTIONAL,
+		*       postalAddress [4] DirectoryString OPTIONAL
+		*       }
+		* 
+ * + * @return an Asn1Object + */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(nameOrPseudonym); + + if (null != nameDistinguisher) + { + v.Add(new DerTaggedObject(false, 0, new DerInteger(nameDistinguisher))); + } + + v.AddOptionalTagged(false, 1, dateOfBirth); + v.AddOptionalTagged(true, 2, placeOfBirth); + + if (null != gender) + { + v.Add(new DerTaggedObject(false, 3, new DerPrintableString(gender, true))); + } + + v.AddOptionalTagged(true, 4, postalAddress); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs.meta new file mode 100644 index 00000000..40992e78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb40b2cdcd82538449afb5bf1df67cf1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/PersonalData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs new file mode 100644 index 00000000..2f65ad3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509.SigI +{ + /** + * Object Identifiers of SigI specifciation (German Signature Law + * Interoperability specification). + */ + public sealed class SigIObjectIdentifiers + { + private SigIObjectIdentifiers() + { + } + + public readonly static DerObjectIdentifier IdSigI = new DerObjectIdentifier("1.3.36.8"); + + /** + * Key purpose IDs for German SigI (Signature Interoperability + * Specification) + */ + public readonly static DerObjectIdentifier IdSigIKP = new DerObjectIdentifier(IdSigI + ".2"); + + /** + * Certificate policy IDs for German SigI (Signature Interoperability + * Specification) + */ + public readonly static DerObjectIdentifier IdSigICP = new DerObjectIdentifier(IdSigI + ".1"); + + /** + * Other Name IDs for German SigI (Signature Interoperability Specification) + */ + public readonly static DerObjectIdentifier IdSigION = new DerObjectIdentifier(IdSigI + ".4"); + + /** + * To be used for for the generation of directory service certificates. + */ + public static readonly DerObjectIdentifier IdSigIKPDirectoryService = new DerObjectIdentifier(IdSigIKP + ".1"); + + /** + * ID for PersonalData + */ + public static readonly DerObjectIdentifier IdSigIONPersonalData = new DerObjectIdentifier(IdSigION + ".1"); + + /** + * Certificate is conform to german signature law. + */ + public static readonly DerObjectIdentifier IdSigICPSigConform = new DerObjectIdentifier(IdSigICP + ".1"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs.meta new file mode 100644 index 00000000..07f4daa9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 67cf617aa948be344a1413e290314180 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x509/sigi/SigIObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9.meta new file mode 100644 index 00000000..d92de059 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8f387346e4cb2d1478f0304ac7cf4c63 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs new file mode 100644 index 00000000..26708aee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public class DHDomainParameters + : Asn1Encodable + { + private readonly DerInteger p, g, q, j; + private readonly DHValidationParms validationParms; + + public static DHDomainParameters GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static DHDomainParameters GetInstance(object obj) + { + if (obj == null || obj is DHDomainParameters) + return (DHDomainParameters)obj; + + if (obj is Asn1Sequence) + return new DHDomainParameters((Asn1Sequence)obj); + + throw new ArgumentException("Invalid DHDomainParameters: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public DHDomainParameters(DerInteger p, DerInteger g, DerInteger q, DerInteger j, + DHValidationParms validationParms) + { + if (p == null) + throw new ArgumentNullException("p"); + if (g == null) + throw new ArgumentNullException("g"); + if (q == null) + throw new ArgumentNullException("q"); + + this.p = p; + this.g = g; + this.q = q; + this.j = j; + this.validationParms = validationParms; + } + + private DHDomainParameters(Asn1Sequence seq) + { + if (seq.Count < 3 || seq.Count > 5) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + var e = seq.GetEnumerator(); + this.p = DerInteger.GetInstance(GetNext(e)); + this.g = DerInteger.GetInstance(GetNext(e)); + this.q = DerInteger.GetInstance(GetNext(e)); + + Asn1Encodable next = GetNext(e); + + if (next != null && next is DerInteger) + { + this.j = DerInteger.GetInstance(next); + next = GetNext(e); + } + + if (next != null) + { + this.validationParms = DHValidationParms.GetInstance(next.ToAsn1Object()); + } + } + + private static Asn1Encodable GetNext(IEnumerator e) + { + return e.MoveNext() ? (Asn1Encodable)e.Current : null; + } + + public DerInteger P + { + get { return this.p; } + } + + public DerInteger G + { + get { return this.g; } + } + + public DerInteger Q + { + get { return this.q; } + } + + public DerInteger J + { + get { return this.j; } + } + + public DHValidationParms ValidationParms + { + get { return this.validationParms; } + } + + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(p, g, q); + v.AddOptional(j, validationParms); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs.meta new file mode 100644 index 00000000..0284ad6a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8abddd5c60d99094c97eb6a91e6f4722 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHDomainParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs new file mode 100644 index 00000000..0160326d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public class DHPublicKey + : Asn1Encodable + { + private readonly DerInteger y; + + public static DHPublicKey GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(DerInteger.GetInstance(obj, isExplicit)); + } + + public static DHPublicKey GetInstance(object obj) + { + if (obj == null || obj is DHPublicKey) + return (DHPublicKey)obj; + + if (obj is DerInteger) + return new DHPublicKey((DerInteger)obj); + + throw new ArgumentException("Invalid DHPublicKey: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public DHPublicKey(DerInteger y) + { + if (y == null) + throw new ArgumentNullException("y"); + + this.y = y; + } + + public DerInteger Y + { + get { return this.y; } + } + + public override Asn1Object ToAsn1Object() + { + return this.y; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs.meta new file mode 100644 index 00000000..30f15223 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ca804dc18294264b91512f870334b63 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHPublicKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs new file mode 100644 index 00000000..39208542 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs @@ -0,0 +1,68 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public class DHValidationParms + : Asn1Encodable + { + private readonly DerBitString seed; + private readonly DerInteger pgenCounter; + + public static DHValidationParms GetInstance(Asn1TaggedObject obj, bool isExplicit) + { + return GetInstance(Asn1Sequence.GetInstance(obj, isExplicit)); + } + + public static DHValidationParms GetInstance(object obj) + { + if (obj == null || obj is DHValidationParms) + return (DHValidationParms)obj; + + if (obj is Asn1Sequence) + return new DHValidationParms((Asn1Sequence)obj); + + throw new ArgumentException("Invalid DHValidationParms: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj), "obj"); + } + + public DHValidationParms(DerBitString seed, DerInteger pgenCounter) + { + if (seed == null) + throw new ArgumentNullException("seed"); + if (pgenCounter == null) + throw new ArgumentNullException("pgenCounter"); + + this.seed = seed; + this.pgenCounter = pgenCounter; + } + + private DHValidationParms(Asn1Sequence seq) + { + if (seq.Count != 2) + throw new ArgumentException("Bad sequence size: " + seq.Count, "seq"); + + this.seed = DerBitString.GetInstance(seq[0]); + this.pgenCounter = DerInteger.GetInstance(seq[1]); + } + + public DerBitString Seed + { + get { return this.seed; } + } + + public DerInteger PgenCounter + { + get { return this.pgenCounter; } + } + + public override Asn1Object ToAsn1Object() + { + return new DerSequence(seed, pgenCounter); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs.meta new file mode 100644 index 00000000..f5e1521d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b9d7fbb7b559f64789c0233158c7d80 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/DHValidationParms.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs new file mode 100644 index 00000000..5725b390 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Anssi; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /// A unified elliptic curve registry of the various standard-specific registries. + public class ECNamedCurveTable + { + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + X9ECParameters ecP = X962NamedCurves.GetByName(name); + if (ecP == null) + { + ecP = SecNamedCurves.GetByName(name); + } + if (ecP == null) + { + ecP = NistNamedCurves.GetByName(name); + } + if (ecP == null) + { + ecP = TeleTrusTNamedCurves.GetByName(name); + } + if (ecP == null) + { + ecP = AnssiNamedCurves.GetByName(name); + } + if (ecP == null) + { + ecP = ECGost3410NamedCurves.GetByName(name); + } + if (ecP == null) + { + ecP = GMNamedCurves.GetByName(name); + } + return ecP; + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of + /// the full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + X9ECParametersHolder holder = X962NamedCurves.GetByNameLazy(name); + if (null == holder) + { + holder = SecNamedCurves.GetByNameLazy(name); + } + if (null == holder) + { + holder = NistNamedCurves.GetByNameLazy(name); + } + if (null == holder) + { + holder = TeleTrusTNamedCurves.GetByNameLazy(name); + } + if (null == holder) + { + holder = AnssiNamedCurves.GetByNameLazy(name); + } + if (null == holder) + { + holder = ECGost3410NamedCurves.GetByNameLazy(name); + } + if (null == holder) + { + holder = GMNamedCurves.GetByNameLazy(name); + } + return holder; + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + X9ECParameters ecP = X962NamedCurves.GetByOid(oid); + if (ecP == null) + { + ecP = SecNamedCurves.GetByOid(oid); + } + + // NOTE: All the NIST curves are currently from SEC, so no point in redundant OID lookup + + if (ecP == null) + { + ecP = TeleTrusTNamedCurves.GetByOid(oid); + } + if (ecP == null) + { + ecP = AnssiNamedCurves.GetByOid(oid); + } + if (ecP == null) + { + ecP = ECGost3410NamedCurves.GetByOid(oid); + } + if (ecP == null) + { + ecP = GMNamedCurves.GetByOid(oid); + } + return ecP; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of + /// the full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + X9ECParametersHolder holder = X962NamedCurves.GetByOidLazy(oid); + if (null == holder) + { + holder = SecNamedCurves.GetByOidLazy(oid); + } + + // NOTE: All the NIST curves are currently from SEC, so no point in redundant OID lookup + + if (null == holder) + { + holder = TeleTrusTNamedCurves.GetByOidLazy(oid); + } + if (null == holder) + { + holder = AnssiNamedCurves.GetByOidLazy(oid); + } + if (null == holder) + { + holder = ECGost3410NamedCurves.GetByOidLazy(oid); + } + if (null == holder) + { + holder = GMNamedCurves.GetByOidLazy(oid); + } + return holder; + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + string name = X962NamedCurves.GetName(oid); + if (name == null) + { + name = SecNamedCurves.GetName(oid); + } + if (name == null) + { + name = NistNamedCurves.GetName(oid); + } + if (name == null) + { + name = TeleTrusTNamedCurves.GetName(oid); + } + if (name == null) + { + name = AnssiNamedCurves.GetName(oid); + } + if (name == null) + { + name = ECGost3410NamedCurves.GetName(oid); + } + if (name == null) + { + name = GMNamedCurves.GetName(oid); + } + return name; + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + DerObjectIdentifier oid = X962NamedCurves.GetOid(name); + if (oid == null) + { + oid = SecNamedCurves.GetOid(name); + } + if (oid == null) + { + oid = NistNamedCurves.GetOid(name); + } + if (oid == null) + { + oid = TeleTrusTNamedCurves.GetOid(name); + } + if (oid == null) + { + oid = AnssiNamedCurves.GetOid(name); + } + if (oid == null) + { + oid = ECGost3410NamedCurves.GetOid(name); + } + if (oid == null) + { + oid = GMNamedCurves.GetOid(name); + } + return oid; + } + + /// Enumerate the available curve names in all the registries. + public static IEnumerable Names + { + get + { + var result = new List(); + result.AddRange(X962NamedCurves.Names); + result.AddRange(SecNamedCurves.Names); + result.AddRange(NistNamedCurves.Names); + result.AddRange(TeleTrusTNamedCurves.Names); + result.AddRange(AnssiNamedCurves.Names); + result.AddRange(ECGost3410NamedCurves.Names); + result.AddRange(GMNamedCurves.Names); + return result; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs.meta new file mode 100644 index 00000000..2986693d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ef707e98faa62d4b9ff0a2661d09be2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/ECNamedCurveTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs new file mode 100644 index 00000000..27631560 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * ASN.1 def for Diffie-Hellman key exchange KeySpecificInfo structure. See + * RFC 2631, or X9.42, for further details. + */ + public class KeySpecificInfo + : Asn1Encodable + { + private DerObjectIdentifier algorithm; + private Asn1OctetString counter; + + public KeySpecificInfo( + DerObjectIdentifier algorithm, + Asn1OctetString counter) + { + this.algorithm = algorithm; + this.counter = counter; + } + + public KeySpecificInfo(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + algorithm = (DerObjectIdentifier)e.Current; + e.MoveNext(); + counter = (Asn1OctetString)e.Current; + } + + public DerObjectIdentifier Algorithm + { + get { return algorithm; } + } + + public Asn1OctetString Counter + { + get { return counter; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  KeySpecificInfo ::= Sequence {
+         *      algorithm OBJECT IDENTIFIER,
+         *      counter OCTET STRING SIZE (4..4)
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(algorithm, counter); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs.meta new file mode 100644 index 00000000..08ea7e64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ae2146f35a96e774182e1e3ac7aecc34 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/KeySpecificInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs new file mode 100644 index 00000000..224fe71f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * ANS.1 def for Diffie-Hellman key exchange OtherInfo structure. See + * RFC 2631, or X9.42, for further details. + */ + public class OtherInfo + : Asn1Encodable + { + private KeySpecificInfo keyInfo; + private Asn1OctetString partyAInfo; + private Asn1OctetString suppPubInfo; + + public OtherInfo( + KeySpecificInfo keyInfo, + Asn1OctetString partyAInfo, + Asn1OctetString suppPubInfo) + { + this.keyInfo = keyInfo; + this.partyAInfo = partyAInfo; + this.suppPubInfo = suppPubInfo; + } + + public OtherInfo(Asn1Sequence seq) + { + var e = seq.GetEnumerator(); + + e.MoveNext(); + keyInfo = new KeySpecificInfo((Asn1Sequence)e.Current); + + while (e.MoveNext()) + { + Asn1TaggedObject o = (Asn1TaggedObject)e.Current; + + if (o.TagNo == 0) + { + partyAInfo = (Asn1OctetString)o.GetObject(); + } + else if ((int) o.TagNo == 2) + { + suppPubInfo = (Asn1OctetString)o.GetObject(); + } + } + } + + public KeySpecificInfo KeyInfo + { + get { return keyInfo; } + } + + public Asn1OctetString PartyAInfo + { + get { return partyAInfo; } + } + + public Asn1OctetString SuppPubInfo + { + get { return suppPubInfo; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  OtherInfo ::= Sequence {
+         *      keyInfo KeySpecificInfo,
+         *      partyAInfo [0] OCTET STRING OPTIONAL,
+         *      suppPubInfo [2] OCTET STRING
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(keyInfo); + v.AddOptionalTagged(true, 0, partyAInfo); + v.Add(new DerTaggedObject(2, suppPubInfo)); + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs.meta new file mode 100644 index 00000000..f7e9d18e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 04bfdb3f609c0ef45b4d49bdde370acb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/OtherInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs new file mode 100644 index 00000000..8e526510 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs @@ -0,0 +1,866 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /// Elliptic curve registry for the curves defined in X.962 EC-DSA. + public static class X962NamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + internal class Prime192v1Holder + : X9ECParametersHolder + { + private Prime192v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime192v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("ffffffffffffffffffffffff99def836146bc9b1b4d22831"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF"), + FromHex("fffffffffffffffffffffffffffffffefffffffffffffffc"), + FromHex("64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("3045AE6FC8422f64ED579528D38120EAE12196D5"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime192v2Holder + : X9ECParametersHolder + { + private Prime192v2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime192v2Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("fffffffffffffffffffffffe5fb1a724dc80418648d8dd31"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF"), + FromHex("fffffffffffffffffffffffffffffffefffffffffffffffc"), + FromHex("cc22d6dfb95c6b25e49c0d6364a4e5980c393aa21668d953"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("31a92ee2029fd10d901b113e990710f0d21ac6b6"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "03eea2bae7e1497842f2de7769cfe9c989c072ad696f48034a"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime192v3Holder + : X9ECParametersHolder + { + private Prime192v3Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime192v3Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("ffffffffffffffffffffffff7a62d031c83f4294f640ec13"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + FromHex("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF"), + FromHex("fffffffffffffffffffffffffffffffefffffffffffffffc"), + FromHex("22123dc2395a05caa7423daeccc94760a7d462256bd56916"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("c469684435deb378c4b65ca9591e2a5763059a2e"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "027d29778100c65a1da1783716588dce2b8b4aee8e228f1896"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime239v1Holder + : X9ECParametersHolder + { + private Prime239v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime239v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("7fffffffffffffffffffffff7fffff9e5e9a9f5d9071fbd1522688909d0b"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), + FromHex("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc"), + FromHex("6b016c3bdcf18941d0d654921475ca71a9db2fb27d1d37796185c2942c0a"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("e43bb460f0b80cc0c0b075798e948060f8321b7d"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "020ffa963cdca8816ccc33b8642bedf905c3d358573d3f27fbbd3b3cb9aaaf"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime239v2Holder + : X9ECParametersHolder + { + private Prime239v2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime239v2Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("7fffffffffffffffffffffff800000cfa7e8594377d414c03821bc582063"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), + FromHex("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc"), + FromHex("617fab6832576cbbfed50d99f0249c3fee58b94ba0038c7ae84c8c832f2c"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("e8b4011604095303ca3b8099982be09fcb9ae616"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0238af09d98727705120c921bb5e9e26296a3cdcf2f35757a0eafd87b830e7"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime239v3Holder + : X9ECParametersHolder + { + private Prime239v3Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime239v3Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("7fffffffffffffffffffffff7fffff975deb41b3a6057c3c432146526551"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), + FromHex("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc"), + FromHex("255705fa2a306654b1f4cb03d6a750a30c250102d4988717d9ba15ab6d3e"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("7d7374168ffe3471b60a857686a19475d3bfa2ff"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "036768ae8e18bb92cfcf005c949aa2c6d94853d0e660bbf854b1c9505fe95a"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class Prime256v1Holder + : X9ECParametersHolder + { + private Prime256v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new Prime256v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551"); + BigInteger h = BigInteger.One; + + return ConfigureCurve(new FpCurve( + new BigInteger("115792089210356248762697446949407573530086143415290314195533631308867097853951"), + FromHex("ffffffff00000001000000000000000000000000fffffffffffffffffffffffc"), + FromHex("5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b"), + n, h, true)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("c49d360886e704936a6678e1139d26b7819f7e90"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "036b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb163v1Holder + : X9ECParametersHolder + { + private C2pnb163v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb163v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0400000000000000000001E60FC8821CC74DAEAFC1"); + BigInteger h = BigInteger.Two; + + return ConfigureCurve(new F2mCurve( + 163, + 1, 2, 8, + FromHex("072546B5435234A422E0789675F432C89435DE5242"), + FromHex("00C9517D06D5240D3CFF38C74B20B6CD4D6F9DD4D9"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("D2C0FB15760860DEF1EEF4D696E6768756151754"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0307AF69989546103D79329FCC3D74880F33BBE803CB"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb163v2Holder + : X9ECParametersHolder + { + private C2pnb163v2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb163v2Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("03FFFFFFFFFFFFFFFFFFFDF64DE1151ADBB78F10A7"); + BigInteger h = BigInteger.Two; + + return ConfigureCurve(new F2mCurve( + 163, + 1, 2, 8, + FromHex("0108B39E77C4B108BED981ED0E890E117C511CF072"), + FromHex("0667ACEB38AF4E488C407433FFAE4F1C811638DF20"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "030024266E4EB5106D0A964D92C4860E2671DB9B6CC5"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb163v3Holder + : X9ECParametersHolder + { + private C2pnb163v3Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb163v3Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("03FFFFFFFFFFFFFFFFFFFE1AEE140F110AFF961309"); + BigInteger h = BigInteger.Two; + + return ConfigureCurve(new F2mCurve( + 163, + 1, 2, 8, + FromHex("07A526C63D3E25A256A007699F5447E32AE456B50E"), + FromHex("03F7061798EB99E238FD6F1BF95B48FEEB4854252B"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0202F9F87B7C574D0BDECF8A22E6524775F98CDEBDCB"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb176w1Holder + : X9ECParametersHolder + { + private C2pnb176w1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb176w1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("010092537397ECA4F6145799D62B0A19CE06FE26AD"); + BigInteger h = BigInteger.ValueOf(0xFF6E); + + return ConfigureCurve(new F2mCurve( + 176, + 1, 2, 43, + FromHex("E4E6DB2995065C407D9D39B8D0967B96704BA8E9C90B"), + FromHex("5DDA470ABE6414DE8EC133AE28E9BBD7FCEC0AE0FFF2"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "038D16C2866798B600F9F08BB4A8E860F3298CE04A5798"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb191v1Holder + : X9ECParametersHolder + { + private C2tnb191v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb191v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("40000000000000000000000004A20E90C39067C893BBB9A5"); + BigInteger h = BigInteger.Two; + + return ConfigureCurve(new F2mCurve( + 191, + 9, + FromHex("2866537B676752636A68F56554E12640276B649EF7526267"), + FromHex("2E45EF571F00786F67B0081B9495A3D95462F5DE0AA185EC"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("4E13CA542744D696E67687561517552F279A8C84"); + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0236B3DAF8A23206F9C4F299D7B21A9C369137F2C84AE1AA0D"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb191v2Holder + : X9ECParametersHolder + { + private C2tnb191v2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb191v2Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("20000000000000000000000050508CB89F652824E06B8173"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve( + 191, + 9, + FromHex("401028774D7777C7B7666D1366EA432071274F89FF01E718"), + FromHex("0620048D28BCBD03B6249C99182B7C8CD19700C362C46A01"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "023809B2B7CC1B28CC5A87926AAD83FD28789E81E2C9E3BF10"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb191v3Holder + : X9ECParametersHolder + { + private C2tnb191v3Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb191v3Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("155555555555555555555555610C0B196812BFB6288A3EA3"); + BigInteger h = BigInteger.ValueOf(6); + + return ConfigureCurve(new F2mCurve( + 191, + 9, + FromHex("6C01074756099122221056911C77D77E77A777E7E7E77FCB"), + FromHex("71FE1AF926CF847989EFEF8DB459F66394D90F32AD3F15E8"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "03375D4CE24FDE434489DE8746E71786015009E66E38A926DD"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb208w1Holder + : X9ECParametersHolder + { + private C2pnb208w1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb208w1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0101BAF95C9723C57B6C21DA2EFF2D5ED588BDD5717E212F9D"); + BigInteger h = BigInteger.ValueOf(0xFE48); + + return ConfigureCurve(new F2mCurve( + 208, + 1, 2, 83, + BigInteger.Zero, + FromHex("C8619ED45A62E6212E1160349E2BFA844439FAFC2A3FD1638F9E"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0289FDFBE4ABE193DF9559ECF07AC0CE78554E2784EB8C1ED1A57A"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb239v1Holder + : X9ECParametersHolder + { + private C2tnb239v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb239v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("2000000000000000000000000000000F4D42FFE1492A4993F1CAD666E447"); + BigInteger h = BigInteger.ValueOf(4); + + return ConfigureCurve(new F2mCurve( + 239, + 36, + FromHex("32010857077C5431123A46B808906756F543423E8D27877578125778AC76"), + FromHex("790408F2EEDAF392B012EDEFB3392F30F4327C0CA3F31FC383C422AA8C16"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0257927098FA932E7C0A96D3FD5B706EF7E5F5C156E16B7E7C86038552E91D"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb239v2Holder + : X9ECParametersHolder + { + private C2tnb239v2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb239v2Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("1555555555555555555555555555553C6F2885259C31E3FCDF154624522D"); + BigInteger h = BigInteger.ValueOf(6); + + return ConfigureCurve(new F2mCurve( + 239, + 36, + FromHex("4230017757A767FAE42398569B746325D45313AF0766266479B75654E65F"), + FromHex("5037EA654196CFF0CD82B2C14A2FCF2E3FF8775285B545722F03EACDB74B"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0228F9D04E900069C8DC47A08534FE76D2B900B7D7EF31F5709F200C4CA205"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb239v3Holder + : X9ECParametersHolder + { + private C2tnb239v3Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb239v3Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0CCCCCCCCCCCCCCCCCCCCCCCCCCCCCAC4912D2D9DF903EF9888B8A0E4CFF"); + BigInteger h = BigInteger.ValueOf(10); + + return ConfigureCurve(new F2mCurve( + 239, + 36, + FromHex("01238774666A67766D6676F778E676B66999176666E687666D8766C66A9F"), + FromHex("6A941977BA9F6A435199ACFC51067ED587F519C5ECB541B8E44111DE1D40"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "0370F6E9D04D289C4E89913CE3530BFDE903977D42B146D539BF1BDE4E9C92"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb272w1Holder + : X9ECParametersHolder + { + private C2pnb272w1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb272w1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0100FAF51354E0E39E4892DF6E319C72C8161603FA45AA7B998A167B8F1E629521"); + BigInteger h = BigInteger.ValueOf(0xFF06); + + return ConfigureCurve(new F2mCurve( + 272, + 1, 3, 56, + FromHex("91A091F03B5FBA4AB2CCF49C4EDD220FB028712D42BE752B2C40094DBACDB586FB20"), + FromHex("7167EFC92BB2E3CE7C8AAAFF34E12A9C557003D7C73A6FAF003F99F6CC8482E540F7"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "026108BABB2CEEBCF787058A056CBE0CFE622D7723A289E08A07AE13EF0D10D171DD8D"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb304w1Holder + : X9ECParametersHolder + { + private C2pnb304w1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb304w1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0101D556572AABAC800101D556572AABAC8001022D5C91DD173F8FB561DA6899164443051D"); + BigInteger h = BigInteger.ValueOf(0xFE2E); + + return ConfigureCurve(new F2mCurve( + 304, + 1, 2, 11, + FromHex("FD0D693149A118F651E6DCE6802085377E5F882D1B510B44160074C1288078365A0396C8E681"), + FromHex("BDDB97E555A50A908E43B01C798EA5DAA6788F1EA2794EFCF57166B8C14039601E55827340BE"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "02197B07845E9BE2D96ADB0F5F3C7F2CFFBD7A3EB8B6FEC35C7FD67F26DDF6285A644F740A2614"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb359v1Holder + : X9ECParametersHolder + { + private C2tnb359v1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb359v1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("01AF286BCA1AF286BCA1AF286BCA1AF286BCA1AF286BC9FB8F6B85C556892C20A7EB964FE7719E74F490758D3B"); + BigInteger h = BigInteger.ValueOf(0x4C); + + return ConfigureCurve(new F2mCurve( + 359, + 68, + FromHex("5667676A654B20754F356EA92017D946567C46675556F19556A04616B567D223A5E05656FB549016A96656A557"), + FromHex("2472E2D0197C49363F1FE7F5B6DB075D52B6947D135D8CA445805D39BC345626089687742B6329E70680231988"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "033C258EF3047767E7EDE0F1FDAA79DAEE3841366A132E163ACED4ED2401DF9C6BDCDE98E8E707C07A2239B1B097"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2pnb368w1Holder + : X9ECParametersHolder + { + private C2pnb368w1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2pnb368w1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("010090512DA9AF72B08349D98A5DD4C7B0532ECA51CE03E2D10F3B7AC579BD87E909AE40A6F131E9CFCE5BD967"); + BigInteger h = BigInteger.ValueOf(0xFF70); + + return ConfigureCurve(new F2mCurve( + 368, + 1, 2, 85, + FromHex("E0D2EE25095206F5E2A4F9ED229F1F256E79A0E2B455970D8D0D865BD94778C576D62F0AB7519CCD2A1A906AE30D"), + FromHex("FC1217D4320A90452C760A58EDCD30C8DD069B3C34453837A34ED50CB54917E1C2112D84D164F444F8F74786046A"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "021085E2755381DCCCE3C1557AFA10C2F0C0C2825646C5B34A394CBCFA8BC16B22E7E789E927BE216F02E1FB136A5F"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class C2tnb431r1Holder + : X9ECParametersHolder + { + private C2tnb431r1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new C2tnb431r1Holder(); + + protected override ECCurve CreateCurve() + { + BigInteger n = FromHex("0340340340340340340340340340340340340340340340340340340323C313FAB50589703B5EC68D3587FEC60D161CC149C1AD4A91"); + BigInteger h = BigInteger.ValueOf(0x2760); + + return ConfigureCurve(new F2mCurve( + 431, + 120, + FromHex("1A827EF00DD6FC0E234CAF046C6A5D8A85395B236CC4AD2CF32A0CADBDC9DDF620B0EB9906D0957F6C6FEACD615468DF104DE296CD8F"), + FromHex("10D9B4A3D9047D8B154359ABFB1B7F5485B04CEB868237DDC9DEDA982A679A5A919B626D4E50A8DD731B107A9962381FB5D807BF2618"), + n, h)); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + + X9ECPoint G = ConfigureBasepoint(curve, + "02120FC05D3C67A99DE161D2F4092622FECA701BE4F50F4758714E8A87BBF2A658EF8C21E7C5EFE965361F6C2999C0C247B0DBD70CE6B7"); + + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + static X962NamedCurves() + { + DefineCurve("prime192v1", X9ObjectIdentifiers.Prime192v1, Prime192v1Holder.Instance); + DefineCurve("prime192v2", X9ObjectIdentifiers.Prime192v2, Prime192v2Holder.Instance); + DefineCurve("prime192v3", X9ObjectIdentifiers.Prime192v3, Prime192v3Holder.Instance); + DefineCurve("prime239v1", X9ObjectIdentifiers.Prime239v1, Prime239v1Holder.Instance); + DefineCurve("prime239v2", X9ObjectIdentifiers.Prime239v2, Prime239v2Holder.Instance); + DefineCurve("prime239v3", X9ObjectIdentifiers.Prime239v3, Prime239v3Holder.Instance); + DefineCurve("prime256v1", X9ObjectIdentifiers.Prime256v1, Prime256v1Holder.Instance); + DefineCurve("c2pnb163v1", X9ObjectIdentifiers.C2Pnb163v1, C2pnb163v1Holder.Instance); + DefineCurve("c2pnb163v2", X9ObjectIdentifiers.C2Pnb163v2, C2pnb163v2Holder.Instance); + DefineCurve("c2pnb163v3", X9ObjectIdentifiers.C2Pnb163v3, C2pnb163v3Holder.Instance); + DefineCurve("c2pnb176w1", X9ObjectIdentifiers.C2Pnb176w1, C2pnb176w1Holder.Instance); + DefineCurve("c2tnb191v1", X9ObjectIdentifiers.C2Tnb191v1, C2tnb191v1Holder.Instance); + DefineCurve("c2tnb191v2", X9ObjectIdentifiers.C2Tnb191v2, C2tnb191v2Holder.Instance); + DefineCurve("c2tnb191v3", X9ObjectIdentifiers.C2Tnb191v3, C2tnb191v3Holder.Instance); + DefineCurve("c2pnb208w1", X9ObjectIdentifiers.C2Pnb208w1, C2pnb208w1Holder.Instance); + DefineCurve("c2tnb239v1", X9ObjectIdentifiers.C2Tnb239v1, C2tnb239v1Holder.Instance); + DefineCurve("c2tnb239v2", X9ObjectIdentifiers.C2Tnb239v2, C2tnb239v2Holder.Instance); + DefineCurve("c2tnb239v3", X9ObjectIdentifiers.C2Tnb239v3, C2tnb239v3Holder.Instance); + DefineCurve("c2pnb272w1", X9ObjectIdentifiers.C2Pnb272w1, C2pnb272w1Holder.Instance); + DefineCurve("c2pnb304w1", X9ObjectIdentifiers.C2Pnb304w1, C2pnb304w1Holder.Instance); + DefineCurve("c2tnb359v1", X9ObjectIdentifiers.C2Tnb359v1, C2tnb359v1Holder.Instance); + DefineCurve("c2pnb368w1", X9ObjectIdentifiers.C2Pnb368w1, C2pnb368w1Holder.Instance); + DefineCurve("c2tnb431r1", X9ObjectIdentifiers.C2Tnb431r1, C2tnb431r1Holder.Instance); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs.meta new file mode 100644 index 00000000..d397033b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0521d3266cf319469437cb894183b5c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962NamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs new file mode 100644 index 00000000..11a63a2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs @@ -0,0 +1,97 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public class X962Parameters + : Asn1Encodable, IAsn1Choice + { + private readonly Asn1Object _params; + + public static X962Parameters GetInstance( + object obj) + { + if (obj == null || obj is X962Parameters) + { + return (X962Parameters)obj; + } + + if (obj is Asn1Object) + { + return new X962Parameters((Asn1Object)obj); + } + + if (obj is byte[]) + { + try + { + return new X962Parameters(Asn1Object.FromByteArray((byte[])obj)); + } + catch (Exception e) + { + throw new ArgumentException("unable to parse encoded data: " + e.Message, e); + } + } + + throw new ArgumentException("unknown object in getInstance()"); + } + + public X962Parameters( + X9ECParameters ecParameters) + { + this._params = ecParameters.ToAsn1Object(); + } + + public X962Parameters( + DerObjectIdentifier namedCurve) + { + this._params = namedCurve; + } + + public X962Parameters( + Asn1Null obj) + { + this._params = obj; + } + + private X962Parameters(Asn1Object obj) + { + this._params = obj; + } + + public bool IsNamedCurve + { + get { return (_params is DerObjectIdentifier); } + } + + public bool IsImplicitlyCA + { + get { return (_params is Asn1Null); } + } + + public Asn1Object Parameters + { + get { return _params; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         * Parameters ::= CHOICE {
+         *    ecParameters ECParameters,
+         *    namedCurve   CURVES.&id({CurveNames}),
+         *    implicitlyCA Null
+         * }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return _params; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs.meta new file mode 100644 index 00000000..f9b5f062 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8e60703378e65eb4b8964d7c819ddbd2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X962Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs new file mode 100644 index 00000000..c6c045bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs @@ -0,0 +1,151 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * ASN.1 def for Elliptic-Curve Curve structure. See + * X9.62, for further details. + */ + public class X9Curve + : Asn1Encodable + { + private readonly ECCurve curve; + private readonly byte[] seed; + private readonly DerObjectIdentifier fieldIdentifier; + + public X9Curve( + ECCurve curve) + : this(curve, null) + { + } + + public X9Curve( + ECCurve curve, + byte[] seed) + { + if (curve == null) + throw new ArgumentNullException("curve"); + + this.curve = curve; + this.seed = Arrays.Clone(seed); + + if (ECAlgorithms.IsFpCurve(curve)) + { + this.fieldIdentifier = X9ObjectIdentifiers.PrimeField; + } + else if (ECAlgorithms.IsF2mCurve(curve)) + { + this.fieldIdentifier = X9ObjectIdentifiers.CharacteristicTwoField; + } + else + { + throw new ArgumentException("This type of ECCurve is not implemented"); + } + } + + public X9Curve( + X9FieldID fieldID, + BigInteger order, + BigInteger cofactor, + Asn1Sequence seq) + { + if (fieldID == null) + throw new ArgumentNullException("fieldID"); + if (seq == null) + throw new ArgumentNullException("seq"); + + this.fieldIdentifier = fieldID.Identifier; + + if (fieldIdentifier.Equals(X9ObjectIdentifiers.PrimeField)) + { + BigInteger p = ((DerInteger)fieldID.Parameters).Value; + BigInteger A = new BigInteger(1, Asn1OctetString.GetInstance(seq[0]).GetOctets()); + BigInteger B = new BigInteger(1, Asn1OctetString.GetInstance(seq[1]).GetOctets()); + curve = new FpCurve(p, A, B, order, cofactor); + } + else if (fieldIdentifier.Equals(X9ObjectIdentifiers.CharacteristicTwoField)) + { + // Characteristic two field + DerSequence parameters = (DerSequence)fieldID.Parameters; + int m = ((DerInteger)parameters[0]).IntValueExact; + DerObjectIdentifier representation = (DerObjectIdentifier)parameters[1]; + + int k1 = 0; + int k2 = 0; + int k3 = 0; + if (representation.Equals(X9ObjectIdentifiers.TPBasis)) + { + // Trinomial basis representation + k1 = ((DerInteger)parameters[2]).IntValueExact; + } + else + { + // Pentanomial basis representation + DerSequence pentanomial = (DerSequence) parameters[2]; + k1 = ((DerInteger)pentanomial[0]).IntValueExact; + k2 = ((DerInteger)pentanomial[1]).IntValueExact; + k3 = ((DerInteger)pentanomial[2]).IntValueExact; + } + BigInteger A = new BigInteger(1, Asn1OctetString.GetInstance(seq[0]).GetOctets()); + BigInteger B = new BigInteger(1, Asn1OctetString.GetInstance(seq[1]).GetOctets()); + curve = new F2mCurve(m, k1, k2, k3, A, B, order, cofactor); + } + else + { + throw new ArgumentException("This type of ECCurve is not implemented"); + } + + if (seq.Count == 3) + { + seed = ((DerBitString)seq[2]).GetBytes(); + } + } + + public ECCurve Curve + { + get { return curve; } + } + + public byte[] GetSeed() + { + return Arrays.Clone(seed); + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  Curve ::= Sequence {
+         *      a               FieldElement,
+         *      b               FieldElement,
+         *      seed            BIT STRING      OPTIONAL
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + if (fieldIdentifier.Equals(X9ObjectIdentifiers.PrimeField) + || fieldIdentifier.Equals(X9ObjectIdentifiers.CharacteristicTwoField)) + { + v.Add(new X9FieldElement(curve.A).ToAsn1Object()); + v.Add(new X9FieldElement(curve.B).ToAsn1Object()); + } + + if (seed != null) + { + v.Add(new DerBitString(seed)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs.meta new file mode 100644 index 00000000..5f22f970 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43714f898930c7f4d849ef473c1358fd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs new file mode 100644 index 00000000..316d79b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs @@ -0,0 +1,215 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * ASN.1 def for Elliptic-Curve ECParameters structure. See + * X9.62, for further details. + */ + public class X9ECParameters + : Asn1Encodable + { + private X9FieldID fieldID; + private ECCurve curve; + private X9ECPoint g; + private BigInteger n; + private BigInteger h; + private byte[] seed; + + public static X9ECParameters GetInstance(object obj) + { + if (obj is X9ECParameters) + return (X9ECParameters)obj; + + if (obj != null) + return new X9ECParameters(Asn1Sequence.GetInstance(obj)); + + return null; + } + + public X9ECParameters( + Asn1Sequence seq) + { + if (!(seq[0] is DerInteger) + || !((DerInteger)seq[0]).HasValue(1)) + { + throw new ArgumentException("bad version in X9ECParameters"); + } + + this.n = ((DerInteger)seq[4]).Value; + + if (seq.Count == 6) + { + this.h = ((DerInteger)seq[5]).Value; + } + + X9Curve x9c = new X9Curve( + X9FieldID.GetInstance(seq[1]), n, h, + Asn1Sequence.GetInstance(seq[2])); + + this.curve = x9c.Curve; + object p = seq[3]; + + if (p is X9ECPoint) + { + this.g = (X9ECPoint)p; + } + else + { + this.g = new X9ECPoint(curve, (Asn1OctetString)p); + } + + this.seed = x9c.GetSeed(); + } + + public X9ECParameters( + ECCurve curve, + X9ECPoint g, + BigInteger n) + : this(curve, g, n, null, null) + { + } + + public X9ECParameters( + ECCurve curve, + X9ECPoint g, + BigInteger n, + BigInteger h) + : this(curve, g, n, h, null) + { + } + + public X9ECParameters( + ECCurve curve, + X9ECPoint g, + BigInteger n, + BigInteger h, + byte[] seed) + { + this.curve = curve; + this.g = g; + this.n = n; + this.h = h; + this.seed = seed; + + if (ECAlgorithms.IsFpCurve(curve)) + { + this.fieldID = new X9FieldID(curve.Field.Characteristic); + } + else if (ECAlgorithms.IsF2mCurve(curve)) + { + IPolynomialExtensionField field = (IPolynomialExtensionField)curve.Field; + int[] exponents = field.MinimalPolynomial.GetExponentsPresent(); + if (exponents.Length == 3) + { + this.fieldID = new X9FieldID(exponents[2], exponents[1]); + } + else if (exponents.Length == 5) + { + this.fieldID = new X9FieldID(exponents[4], exponents[1], exponents[2], exponents[3]); + } + else + { + throw new ArgumentException("Only trinomial and pentomial curves are supported"); + } + } + else + { + throw new ArgumentException("'curve' is of an unsupported type"); + } + } + + public ECCurve Curve + { + get { return curve; } + } + + public ECPoint G + { + get { return g.Point; } + } + + public BigInteger N + { + get { return n; } + } + + public BigInteger H + { + get { return h; } + } + + public byte[] GetSeed() + { + return seed; + } + + /** + * Return the ASN.1 entry representing the Curve. + * + * @return the X9Curve for the curve in these parameters. + */ + public X9Curve CurveEntry + { + get { return new X9Curve(curve, seed); } + } + + /** + * Return the ASN.1 entry representing the FieldID. + * + * @return the X9FieldID for the FieldID in these parameters. + */ + public X9FieldID FieldIDEntry + { + get { return fieldID; } + } + + /** + * Return the ASN.1 entry representing the base point G. + * + * @return the X9ECPoint for the base point in these parameters. + */ + public X9ECPoint BaseEntry + { + get { return g; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  ECParameters ::= Sequence {
+         *      version         Integer { ecpVer1(1) } (ecpVer1),
+         *      fieldID         FieldID {{FieldTypes}},
+         *      curve           X9Curve,
+         *      base            X9ECPoint,
+         *      order           Integer,
+         *      cofactor        Integer OPTIONAL
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + Asn1EncodableVector v = new Asn1EncodableVector( + new DerInteger(BigInteger.One), + fieldID, + new X9Curve(curve, seed), + g, + new DerInteger(n)); + + if (h != null) + { + v.Add(new DerInteger(h)); + } + + return new DerSequence(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs.meta new file mode 100644 index 00000000..71a45d33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3d36db2fddc293f448a749a23a74b090 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs new file mode 100644 index 00000000..4d5b7b5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public abstract class X9ECParametersHolder + { + private ECCurve m_curve; + private X9ECParameters m_parameters; + + public ECCurve Curve + { + get + { + lock (this) + { + if (m_curve == null) + { + m_curve = CreateCurve(); + } + + return m_curve; + } + } + } + + public X9ECParameters Parameters + { + get + { + lock (this) + { + if (m_parameters == null) + { + m_parameters = CreateParameters(); + } + + return m_parameters; + } + } + } + + protected virtual ECCurve CreateCurve() + { + return CreateParameters().Curve; + } + + protected abstract X9ECParameters CreateParameters(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs.meta new file mode 100644 index 00000000..62c55e56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f9087f34f38c5e344bcb031600c3e7b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECParametersHolder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs new file mode 100644 index 00000000..660546f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * class for describing an ECPoint as a Der object. + */ + public class X9ECPoint + : Asn1Encodable + { + private readonly Asn1OctetString encoding; + + private ECCurve c; + private ECPoint p; + + public X9ECPoint(ECPoint p, bool compressed) + { + this.p = p.Normalize(); + this.encoding = new DerOctetString(p.GetEncoded(compressed)); + } + + public X9ECPoint(ECCurve c, byte[] encoding) + { + this.c = c; + this.encoding = new DerOctetString(Arrays.Clone(encoding)); + } + + public X9ECPoint(ECCurve c, Asn1OctetString s) + : this(c, s.GetOctets()) + { + } + + public byte[] GetPointEncoding() + { + return Arrays.Clone(encoding.GetOctets()); + } + + public ECPoint Point + { + get + { + if (p == null) + { + p = c.DecodePoint(encoding.GetOctets()).Normalize(); + } + + return p; + } + } + + public bool IsPointCompressed + { + get + { + byte[] octets = encoding.GetOctets(); + return octets != null && octets.Length > 0 && (octets[0] == 2 || octets[0] == 3); + } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  ECPoint ::= OCTET STRING
+         * 
+ *

+ * Octet string produced using ECPoint.GetEncoded().

+ */ + public override Asn1Object ToAsn1Object() + { + return encoding; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs.meta new file mode 100644 index 00000000..171bc193 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb799dd6e0a957945b44491bdc9d1e23 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ECPoint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs new file mode 100644 index 00000000..6ca4885d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * Class for processing an ECFieldElement as a DER object. + */ + public class X9FieldElement + : Asn1Encodable + { + private ECFieldElement f; + + public X9FieldElement( + ECFieldElement f) + { + this.f = f; + } + + public ECFieldElement Value + { + get { return f; } + } + + /** + * Produce an object suitable for an Asn1OutputStream. + *
+         *  FieldElement ::= OCTET STRING
+         * 
+ *

+ *

    + *
  1. if q is an odd prime then the field element is + * processed as an Integer and converted to an octet string + * according to x 9.62 4.3.1.
  2. + *
  3. if q is 2m then the bit string + * contained in the field element is converted into an octet + * string with the same ordering padded at the front if necessary. + *
  4. + *
+ *

+ */ + public override Asn1Object ToAsn1Object() + { + int byteCount = X9IntegerConverter.GetByteLength(f); + byte[] paddedBigInteger = X9IntegerConverter.IntegerToBytes(f.ToBigInteger(), byteCount); + + return new DerOctetString(paddedBigInteger); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs.meta new file mode 100644 index 00000000..c7571419 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0314589f21ded704b8eed94852256818 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs new file mode 100644 index 00000000..450a52ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + /** + * ASN.1 def for Elliptic-Curve Field ID structure. See + * X9.62, for further details. + */ + public class X9FieldID + : Asn1Encodable + { + private readonly DerObjectIdentifier id; + private readonly Asn1Object parameters; + + /** + * Constructor for elliptic curves over prime fields + * F2. + * @param primeP The prime p defining the prime field. + */ + public X9FieldID( + BigInteger primeP) + { + this.id = X9ObjectIdentifiers.PrimeField; + this.parameters = new DerInteger(primeP); + } + + /** + * Constructor for elliptic curves over binary fields + * F2m. + * @param m The exponent m of + * F2m. + * @param k1 The integer k1 where xm + + * xk1 + 1 + * represents the reduction polynomial f(z). + */ + public X9FieldID(int m, int k1) + : this(m, k1, 0, 0) + { + } + + /** + * Constructor for elliptic curves over binary fields + * F2m. + * @param m The exponent m of + * F2m. + * @param k1 The integer k1 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k2 The integer k2 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k3 The integer k3 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).. + */ + public X9FieldID( + int m, + int k1, + int k2, + int k3) + { + this.id = X9ObjectIdentifiers.CharacteristicTwoField; + + Asn1EncodableVector fieldIdParams = new Asn1EncodableVector(new DerInteger(m)); + + if (k2 == 0) + { + if (k3 != 0) + throw new ArgumentException("inconsistent k values"); + + fieldIdParams.Add( + X9ObjectIdentifiers.TPBasis, + new DerInteger(k1)); + } + else + { + if (k2 <= k1 || k3 <= k2) + throw new ArgumentException("inconsistent k values"); + + fieldIdParams.Add( + X9ObjectIdentifiers.PPBasis, + new DerSequence( + new DerInteger(k1), + new DerInteger(k2), + new DerInteger(k3))); + } + + this.parameters = new DerSequence(fieldIdParams); + } + + private X9FieldID(Asn1Sequence seq) + { + this.id = DerObjectIdentifier.GetInstance(seq[0]); + this.parameters = seq[1].ToAsn1Object(); + } + + public static X9FieldID GetInstance(object obj) + { + if (obj is X9FieldID) + return (X9FieldID)obj; + if (obj == null) + return null; + return new X9FieldID(Asn1Sequence.GetInstance(obj)); + } + + public DerObjectIdentifier Identifier + { + get { return id; } + } + + public Asn1Object Parameters + { + get { return parameters; } + } + + /** + * Produce a Der encoding of the following structure. + *
+         *  FieldID ::= Sequence {
+         *      fieldType       FIELD-ID.&id({IOSet}),
+         *      parameters      FIELD-ID.&Type({IOSet}{@fieldType})
+         *  }
+         * 
+ */ + public override Asn1Object ToAsn1Object() + { + return new DerSequence(id, parameters); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs.meta new file mode 100644 index 00000000..5bae6292 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 95a5e4d382eb29b45b39b6da740a4fc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9FieldID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs new file mode 100644 index 00000000..ff4895fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public abstract class X9IntegerConverter + { + public static int GetByteLength(ECFieldElement fe) + { + return (fe.FieldSize + 7) / 8; + } + + public static int GetByteLength(ECCurve c) + { + return (c.FieldSize + 7) / 8; + } + + public static byte[] IntegerToBytes(BigInteger s, int qLength) + { + byte[] bytes = s.ToByteArrayUnsigned(); + + if (qLength < bytes.Length) + { + byte[] tmp = new byte[qLength]; + Array.Copy(bytes, bytes.Length - tmp.Length, tmp, 0, tmp.Length); + return tmp; + } + else if (qLength > bytes.Length) + { + byte[] tmp = new byte[qLength]; + Array.Copy(bytes, 0, tmp, tmp.Length - bytes.Length, bytes.Length); + return tmp; + } + + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs.meta new file mode 100644 index 00000000..f6faa731 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c8d8bbe58cf32c041bb340c35ccb68ef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9IntegerConverter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs new file mode 100644 index 00000000..312db164 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs @@ -0,0 +1,135 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9 +{ + public abstract class X9ObjectIdentifiers + { + // + // X9.62 + // + // ansi-X9-62 OBJECT IDENTIFIER ::= { iso(1) member-body(2) + // us(840) ansi-x962(10045) } + // + + public static readonly DerObjectIdentifier ansi_X9_62 = new DerObjectIdentifier("1.2.840.10045"); + + public static readonly DerObjectIdentifier IdFieldType = ansi_X9_62.Branch("1"); + + public static readonly DerObjectIdentifier PrimeField = IdFieldType.Branch("1"); + public static readonly DerObjectIdentifier CharacteristicTwoField = IdFieldType.Branch("2"); + + public static readonly DerObjectIdentifier GNBasis = CharacteristicTwoField.Branch("3.1"); + public static readonly DerObjectIdentifier TPBasis = CharacteristicTwoField.Branch("3.2"); + public static readonly DerObjectIdentifier PPBasis = CharacteristicTwoField.Branch("3.3"); + + public static readonly DerObjectIdentifier id_ecSigType = ansi_X9_62.Branch("4"); + + public static readonly DerObjectIdentifier ECDsaWithSha1 = id_ecSigType.Branch("1"); + + public static readonly DerObjectIdentifier id_publicKeyType = ansi_X9_62.Branch("2"); + + public static readonly DerObjectIdentifier IdECPublicKey = id_publicKeyType.Branch("1"); + + public static readonly DerObjectIdentifier ECDsaWithSha2 = id_ecSigType.Branch("3"); + + public static readonly DerObjectIdentifier ECDsaWithSha224 = ECDsaWithSha2.Branch("1"); + public static readonly DerObjectIdentifier ECDsaWithSha256 = ECDsaWithSha2.Branch("2"); + public static readonly DerObjectIdentifier ECDsaWithSha384 = ECDsaWithSha2.Branch("3"); + public static readonly DerObjectIdentifier ECDsaWithSha512 = ECDsaWithSha2.Branch("4"); + + + // + // named curves + // + public static readonly DerObjectIdentifier EllipticCurve = ansi_X9_62.Branch("3"); + + // + // Two Curves + // + public static readonly DerObjectIdentifier CTwoCurve = EllipticCurve.Branch("0"); + + public static readonly DerObjectIdentifier C2Pnb163v1 = CTwoCurve.Branch("1"); + public static readonly DerObjectIdentifier C2Pnb163v2 = CTwoCurve.Branch("2"); + public static readonly DerObjectIdentifier C2Pnb163v3 = CTwoCurve.Branch("3"); + public static readonly DerObjectIdentifier C2Pnb176w1 = CTwoCurve.Branch("4"); + public static readonly DerObjectIdentifier C2Tnb191v1 = CTwoCurve.Branch("5"); + public static readonly DerObjectIdentifier C2Tnb191v2 = CTwoCurve.Branch("6"); + public static readonly DerObjectIdentifier C2Tnb191v3 = CTwoCurve.Branch("7"); + public static readonly DerObjectIdentifier C2Onb191v4 = CTwoCurve.Branch("8"); + public static readonly DerObjectIdentifier C2Onb191v5 = CTwoCurve.Branch("9"); + public static readonly DerObjectIdentifier C2Pnb208w1 = CTwoCurve.Branch("10"); + public static readonly DerObjectIdentifier C2Tnb239v1 = CTwoCurve.Branch("11"); + public static readonly DerObjectIdentifier C2Tnb239v2 = CTwoCurve.Branch("12"); + public static readonly DerObjectIdentifier C2Tnb239v3 = CTwoCurve.Branch("13"); + public static readonly DerObjectIdentifier C2Onb239v4 = CTwoCurve.Branch("14"); + public static readonly DerObjectIdentifier C2Onb239v5 = CTwoCurve.Branch("15"); + public static readonly DerObjectIdentifier C2Pnb272w1 = CTwoCurve.Branch("16"); + public static readonly DerObjectIdentifier C2Pnb304w1 = CTwoCurve.Branch("17"); + public static readonly DerObjectIdentifier C2Tnb359v1 = CTwoCurve.Branch("18"); + public static readonly DerObjectIdentifier C2Pnb368w1 = CTwoCurve.Branch("19"); + public static readonly DerObjectIdentifier C2Tnb431r1 = CTwoCurve.Branch("20"); + + // + // Prime + // + public static readonly DerObjectIdentifier PrimeCurve = EllipticCurve.Branch("1"); + + public static readonly DerObjectIdentifier Prime192v1 = PrimeCurve.Branch("1"); + public static readonly DerObjectIdentifier Prime192v2 = PrimeCurve.Branch("2"); + public static readonly DerObjectIdentifier Prime192v3 = PrimeCurve.Branch("3"); + public static readonly DerObjectIdentifier Prime239v1 = PrimeCurve.Branch("4"); + public static readonly DerObjectIdentifier Prime239v2 = PrimeCurve.Branch("5"); + public static readonly DerObjectIdentifier Prime239v3 = PrimeCurve.Branch("6"); + public static readonly DerObjectIdentifier Prime256v1 = PrimeCurve.Branch("7"); + + // + // DSA + // + // dsapublicnumber OBJECT IDENTIFIER ::= { iso(1) member-body(2) + // us(840) ansi-x957(10040) number-type(4) 1 } + public static readonly DerObjectIdentifier IdDsa = new DerObjectIdentifier("1.2.840.10040.4.1"); + + /** + * id-dsa-with-sha1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) + * us(840) x9-57 (10040) x9cm(4) 3 } + */ + public static readonly DerObjectIdentifier IdDsaWithSha1 = new DerObjectIdentifier("1.2.840.10040.4.3"); + + /** + * X9.63 + */ + public static readonly DerObjectIdentifier X9x63Scheme = new DerObjectIdentifier("1.3.133.16.840.63.0"); + public static readonly DerObjectIdentifier DHSinglePassStdDHSha1KdfScheme = X9x63Scheme.Branch("2"); + public static readonly DerObjectIdentifier DHSinglePassCofactorDHSha1KdfScheme = X9x63Scheme.Branch("3"); + public static readonly DerObjectIdentifier MqvSinglePassSha1KdfScheme = X9x63Scheme.Branch("16"); + + /** + * X9.42 + */ + + public static readonly DerObjectIdentifier ansi_x9_42 = new DerObjectIdentifier("1.2.840.10046"); + + // + // Diffie-Hellman + // + // dhpublicnumber OBJECT IDENTIFIER ::= { iso(1) member-body(2) + // us(840) ansi-x942(10046) number-type(2) 1 } + // + public static readonly DerObjectIdentifier DHPublicNumber = ansi_x9_42.Branch("2.1"); + + public static readonly DerObjectIdentifier X9x42Schemes = ansi_x9_42.Branch("2.3"); + + public static readonly DerObjectIdentifier DHStatic = X9x42Schemes.Branch("1"); + public static readonly DerObjectIdentifier DHEphem = X9x42Schemes.Branch("2"); + public static readonly DerObjectIdentifier DHOneFlow = X9x42Schemes.Branch("3"); + public static readonly DerObjectIdentifier DHHybrid1 = X9x42Schemes.Branch("4"); + public static readonly DerObjectIdentifier DHHybrid2 = X9x42Schemes.Branch("5"); + public static readonly DerObjectIdentifier DHHybridOneFlow = X9x42Schemes.Branch("6"); + public static readonly DerObjectIdentifier Mqv2 = X9x42Schemes.Branch("7"); + public static readonly DerObjectIdentifier Mqv1 = X9x42Schemes.Branch("8"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs.meta new file mode 100644 index 00000000..ae7ecbae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 670f9d39edf0d194887b3dc5dbe03827 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/asn1/x9/X9ObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg.meta new file mode 100644 index 00000000..9f41e9de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: eefc7a37e9c6c8348a9ca1c5aa7986f2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs new file mode 100644 index 00000000..27b93e88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs @@ -0,0 +1,531 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * reader for Base64 armored objects - read the headers and then start returning + * bytes when the data is reached. An IOException is thrown if the CRC check + * is detected and fails. + *

+ * By default a missing CRC will not cause an exception. To force CRC detection use: + *

+     *     ArmoredInputStream aIn = ...
+     *
+     *     aIn.setDetectMissingCRC(true);
+     * 
+ *

+ */ + public class ArmoredInputStream + : BaseInputStream + { + /* + * set up the decoding table. + */ + private readonly static byte[] decodingTable; + static ArmoredInputStream() + { + decodingTable = new byte[128]; + Arrays.Fill(decodingTable, 0xff); + for (int i = 'A'; i <= 'Z'; i++) + { + decodingTable[i] = (byte)(i - 'A'); + } + for (int i = 'a'; i <= 'z'; i++) + { + decodingTable[i] = (byte)(i - 'a' + 26); + } + for (int i = '0'; i <= '9'; i++) + { + decodingTable[i] = (byte)(i - '0' + 52); + } + decodingTable['+'] = 62; + decodingTable['/'] = 63; + } + + /** + * decode the base 64 encoded input data. + * + * @return the offset the data starts in out. + */ + private static int Decode(int in0, int in1, int in2, int in3, int[] result) + { + if (in3 < 0) + throw new EndOfStreamException("unexpected end of file in armored stream."); + + int b1, b2, b3, b4; + if (in2 == '=') + { + b1 = decodingTable[in0]; + b2 = decodingTable[in1]; + if ((b1 | b2) >= 128) + throw new IOException("invalid armor"); + + result[2] = ((b1 << 2) | (b2 >> 4)) & 0xff; + return 2; + } + else if (in3 == '=') + { + b1 = decodingTable[in0]; + b2 = decodingTable[in1]; + b3 = decodingTable[in2]; + if ((b1 | b2 | b3) >= 128) + throw new IOException("invalid armor"); + + result[1] = ((b1 << 2) | (b2 >> 4)) & 0xff; + result[2] = ((b2 << 4) | (b3 >> 2)) & 0xff; + return 1; + } + else + { + b1 = decodingTable[in0]; + b2 = decodingTable[in1]; + b3 = decodingTable[in2]; + b4 = decodingTable[in3]; + if ((b1 | b2 | b3 | b4) >= 128) + throw new IOException("invalid armor"); + + result[0] = ((b1 << 2) | (b2 >> 4)) & 0xff; + result[1] = ((b2 << 4) | (b3 >> 2)) & 0xff; + result[2] = ((b3 << 6) | b4) & 0xff; + return 0; + } + } + + /* + * Ignore missing CRC checksums. + * https://tests.sequoia-pgp.org/#ASCII_Armor suggests that missing CRC sums do not invalidate the message. + */ + private bool detectMissingChecksum = false; + + Stream input; + bool start = true; + int[] outBuf = new int[3]; + int bufPtr = 3; + Crc24 crc = new Crc24(); + bool crcFound = false; + bool hasHeaders = true; + string header = null; + bool newLineFound = false; + bool clearText = false; + bool restart = false; + IList headerList = new List(); + int lastC = 0; + bool isEndOfStream; + + /** + * Create a stream for reading a PGP armoured message, parsing up to a header + * and then reading the data that follows. + * + * @param input + */ + public ArmoredInputStream(Stream input) + : this(input, true) + { + } + + /** + * Create an armoured input stream which will assume the data starts + * straight away, or parse for headers first depending on the value of + * hasHeaders. + * + * @param input + * @param hasHeaders true if headers are to be looked for, false otherwise. + */ + public ArmoredInputStream(Stream input, bool hasHeaders) + { + this.input = input; + this.hasHeaders = hasHeaders; + + if (hasHeaders) + { + ParseHeaders(); + } + + start = false; + } + + private bool ParseHeaders() + { + header = null; + + int c; + int last = 0; + bool headerFound = false; + + headerList = new List(); + + // + // if restart we already have a header + // + if (restart) + { + headerFound = true; + } + else + { + while ((c = input.ReadByte()) >= 0) + { + if (c == '-' && (last == 0 || last == '\n' || last == '\r')) + { + headerFound = true; + break; + } + + last = c; + } + } + + if (headerFound) + { + StringBuilder buf = new StringBuilder("-"); + bool eolReached = false; + bool crLf = false; + + if (restart) // we've had to look ahead two '-' + { + buf.Append('-'); + } + + while ((c = input.ReadByte()) >= 0) + { + if (last == '\r' && c == '\n') + { + crLf = true; + } + if (eolReached && (last != '\r' && c == '\n')) + { + break; + } + if (eolReached && c == '\r') + { + break; + } + if (c == '\r' || (last != '\r' && c == '\n')) + { + string line = buf.ToString(); + if (line.Trim().Length < 1) + break; + + if (headerList.Count > 0 && line.IndexOf(':') < 0) + throw new IOException("invalid armor header"); + + headerList.Add(line); + buf.Length = 0; + } + + if (c != '\n' && c != '\r') + { + buf.Append((char)c); + eolReached = false; + } + else + { + if (c == '\r' || (last != '\r' && c == '\n')) + { + eolReached = true; + } + } + + last = c; + } + + if (crLf) + { + input.ReadByte(); // skip last \n + } + } + + if (headerList.Count > 0) + { + header = (string)headerList[0]; + } + + clearText = "-----BEGIN PGP SIGNED MESSAGE-----".Equals(header); + newLineFound = true; + + return headerFound; + } + + /** + * @return true if we are inside the clear text section of a PGP + * signed message. + */ + public bool IsClearText() + { + return clearText; + } + + /** + * @return true if the stream is actually at end of file. + */ + public bool IsEndOfStream() + { + return isEndOfStream; + } + + /** + * Return the armor header line (if there is one) + * @return the armor header line, null if none present. + */ + public string GetArmorHeaderLine() + { + return header; + } + + /** + * Return the armor headers (the lines after the armor header line), + * @return an array of armor headers, null if there aren't any. + */ + public string[] GetArmorHeaders() + { + if (headerList.Count <= 1) + return null; + + string[] hdrs = new string[headerList.Count - 1]; + for (int i = 0; i != hdrs.Length; i++) + { + hdrs[i] = (string)headerList[i + 1]; + } + + return hdrs; + } + + private int ReadIgnoreSpace() + { + int c; + do + { + c = input.ReadByte(); + } + while (c == ' ' || c == '\t' || c == '\f' || c == '\u000B') ; // \u000B ~ \v + + if (c >= 128) + throw new IOException("invalid armor"); + + return c; + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + /* + * TODO Currently can't return partial data when exception thrown (breaking test case), so we don't inherit + * the base class implementation. Probably the reason is that throws don't mark this instance as 'failed'. + */ + int pos = 0; + while (pos < count) + { + int b = ReadByte(); + if (b < 0) + break; + + buffer[offset + pos++] = (byte)b; + } + return pos; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + /* + * TODO Currently can't return partial data when exception thrown (breaking test case), so we don't inherit + * the base class implementation. Probably the reason is that throws don't mark this instance as 'failed'. + */ + int pos = 0; + while (pos < buffer.Length) + { + int b = ReadByte(); + if (b < 0) + break; + + buffer[pos++] = (byte)b; + } + return pos; + } +#endif + + public override int ReadByte() + { + if (start) + { + if (hasHeaders) + { + ParseHeaders(); + } + + crc.Reset(); + start = false; + } + + int c; + + if (clearText) + { + c = input.ReadByte(); + + if (c == '\r' || (c == '\n' && lastC != '\r')) + { + newLineFound = true; + } + else if (newLineFound && c == '-') + { + c = input.ReadByte(); + if (c == '-') // a header, not dash escaped + { + clearText = false; + start = true; + restart = true; + } + else // a space - must be a dash escape + { + c = input.ReadByte(); + } + newLineFound = false; + } + else + { + if (c != '\n' && lastC != '\r') + { + newLineFound = false; + } + } + + lastC = c; + + if (c < 0) + { + isEndOfStream = true; + } + + return c; + } + + if (bufPtr > 2 || crcFound) + { + c = ReadIgnoreSpace(); + + if (c == '\r' || c == '\n') + { + c = ReadIgnoreSpace(); + + while (c == '\n' || c == '\r') + { + c = ReadIgnoreSpace(); + } + + if (c < 0) // EOF + { + isEndOfStream = true; + return -1; + } + + if (c == '=') // crc reached + { + bufPtr = Decode(ReadIgnoreSpace(), ReadIgnoreSpace(), ReadIgnoreSpace(), ReadIgnoreSpace(), outBuf); + if (bufPtr == 0) + { + int i = ((outBuf[0] & 0xff) << 16) + | ((outBuf[1] & 0xff) << 8) + | (outBuf[2] & 0xff); + + crcFound = true; + + if (i != crc.Value) + { + throw new IOException("crc check failed in armored message."); + } + return ReadByte(); + } + else + { + if (detectMissingChecksum) + { + throw new IOException("no crc found in armored message"); + } + } + } + else if (c == '-') // end of record reached + { + while ((c = input.ReadByte()) >= 0) + { + if (c == '\n' || c == '\r') + { + break; + } + } + + if (!crcFound && detectMissingChecksum) + { + throw new IOException("crc check not found"); + } + + crcFound = false; + start = true; + bufPtr = 3; + + if (c < 0) + { + isEndOfStream = true; + } + + return -1; + } + else // data + { + bufPtr = Decode(c, ReadIgnoreSpace(), ReadIgnoreSpace(), ReadIgnoreSpace(), outBuf); + } + } + else + { + if (c >= 0) + { + bufPtr = Decode(c, ReadIgnoreSpace(), ReadIgnoreSpace(), ReadIgnoreSpace(), outBuf); + } + else + { + isEndOfStream = true; + return -1; + } + } + } + + c = outBuf[bufPtr++]; + + crc.Update(c); + + return c; + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + input.Dispose(); + } + base.Dispose(disposing); + } + + /** + * Change how the stream should react if it encounters missing CRC checksum. + * The default value is false (ignore missing CRC checksums). If the behavior is set to true, + * an {@link IOException} will be thrown if a missing CRC checksum is encountered. + * + * @param detectMissing ignore missing CRC sums + */ + public virtual void SetDetectMissingCrc(bool detectMissing) + { + this.detectMissingChecksum = detectMissing; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs.meta new file mode 100644 index 00000000..ede0224a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4f854216f212a344e9c4cad23e971ad5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs new file mode 100644 index 00000000..64905758 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs @@ -0,0 +1,402 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Diagnostics; +using System.IO; +using System.Reflection; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic output stream. + */ + public class ArmoredOutputStream + : BaseOutputStream + { + public static readonly string HeaderVersion = "Version"; + + private static readonly byte[] encodingTable = + { + (byte)'A', (byte)'B', (byte)'C', (byte)'D', (byte)'E', (byte)'F', (byte)'G', + (byte)'H', (byte)'I', (byte)'J', (byte)'K', (byte)'L', (byte)'M', (byte)'N', + (byte)'O', (byte)'P', (byte)'Q', (byte)'R', (byte)'S', (byte)'T', (byte)'U', + (byte)'V', (byte)'W', (byte)'X', (byte)'Y', (byte)'Z', + (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f', (byte)'g', + (byte)'h', (byte)'i', (byte)'j', (byte)'k', (byte)'l', (byte)'m', (byte)'n', + (byte)'o', (byte)'p', (byte)'q', (byte)'r', (byte)'s', (byte)'t', (byte)'u', + (byte)'v', + (byte)'w', (byte)'x', (byte)'y', (byte)'z', + (byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', + (byte)'7', (byte)'8', (byte)'9', + (byte)'+', (byte)'/' + }; + + /** + * encode the input data producing a base 64 encoded byte array. + */ + private static void Encode( + Stream outStream, + int[] data, + int len) + { + Debug.Assert(len > 0); + Debug.Assert(len < 4); + + byte[] bs = new byte[4]; + int d1 = data[0]; + bs[0] = encodingTable[(d1 >> 2) & 0x3f]; + + switch (len) + { + case 1: + { + bs[1] = encodingTable[(d1 << 4) & 0x3f]; + bs[2] = (byte)'='; + bs[3] = (byte)'='; + break; + } + case 2: + { + int d2 = data[1]; + bs[1] = encodingTable[((d1 << 4) | (d2 >> 4)) & 0x3f]; + bs[2] = encodingTable[(d2 << 2) & 0x3f]; + bs[3] = (byte)'='; + break; + } + case 3: + { + int d2 = data[1]; + int d3 = data[2]; + bs[1] = encodingTable[((d1 << 4) | (d2 >> 4)) & 0x3f]; + bs[2] = encodingTable[((d2 << 2) | (d3 >> 6)) & 0x3f]; + bs[3] = encodingTable[d3 & 0x3f]; + break; + } + } + + outStream.Write(bs, 0, bs.Length); + } + + private readonly Stream outStream; + private int[] buf = new int[3]; + private int bufPtr = 0; + private Crc24 crc = new Crc24(); + private int chunkCount = 0; + private int lastb; + + private bool start = true; + private bool clearText = false; + private bool newLine = false; + + private string type; + + private static readonly string NewLine = Environment.NewLine; + private static readonly string headerStart = "-----BEGIN PGP "; + private static readonly string headerTail = "-----"; + private static readonly string footerStart = "-----END PGP "; + private static readonly string footerTail = "-----"; + + private static string CreateVersion() + { + var assembly = Assembly.GetExecutingAssembly(); + var title = assembly.GetCustomAttribute().Title; + var version = assembly.GetCustomAttribute().InformationalVersion; + return title + " v" + version; + } + + private static readonly string Version = CreateVersion(); + + private readonly IDictionary> m_headers; + + public ArmoredOutputStream(Stream outStream) + { + this.outStream = outStream; + this.m_headers = new Dictionary>(1); + SetHeader(HeaderVersion, Version); + } + + public ArmoredOutputStream(Stream outStream, IDictionary headers) + : this(outStream) + { + foreach (var header in headers) + { + var headerList = new List(1); + headerList.Add(header.Value); + + m_headers[header.Key] = headerList; + } + } + + /** + * Set an additional header entry. Any current value(s) under the same name will be + * replaced by the new one. A null value will clear the entry for name. * + * @param name the name of the header entry. + * @param v the value of the header entry. + */ + public void SetHeader(string name, string val) + { + if (val == null) + { + this.m_headers.Remove(name); + return; + } + + if (m_headers.TryGetValue(name, out var valueList)) + { + valueList.Clear(); + } + else + { + valueList = new List(1); + m_headers[name] = valueList; + } + + valueList.Add(val); + } + + /** + * Set an additional header entry. The current value(s) will continue to exist together + * with the new one. Adding a null value has no effect. + * + * @param name the name of the header entry. + * @param value the value of the header entry. + */ + public void AddHeader(string name, string val) + { + if (val == null || name == null) + return; + + if (!m_headers.TryGetValue(name, out var valueList)) + { + valueList = new List(1); + m_headers[name] = valueList; + } + + valueList.Add(val); + } + + /** + * Reset the headers to only contain a Version string (if one is present). + */ + public void ResetHeaders() + { + var versions = CollectionUtilities.GetValueOrNull(m_headers, HeaderVersion); + + m_headers.Clear(); + + if (versions != null) + { + m_headers[HeaderVersion] = versions; + } + } + + /** + * Start a clear text signed message. + * @param hashAlgorithm + */ + public void BeginClearText( + HashAlgorithmTag hashAlgorithm) + { + string hash; + + switch (hashAlgorithm) + { + case HashAlgorithmTag.Sha1: + hash = "SHA1"; + break; + case HashAlgorithmTag.Sha256: + hash = "SHA256"; + break; + case HashAlgorithmTag.Sha384: + hash = "SHA384"; + break; + case HashAlgorithmTag.Sha512: + hash = "SHA512"; + break; + case HashAlgorithmTag.MD2: + hash = "MD2"; + break; + case HashAlgorithmTag.MD5: + hash = "MD5"; + break; + case HashAlgorithmTag.RipeMD160: + hash = "RIPEMD160"; + break; + default: + throw new IOException("unknown hash algorithm tag in beginClearText: " + hashAlgorithm); + } + + DoWrite("-----BEGIN PGP SIGNED MESSAGE-----" + NewLine); + DoWrite("Hash: " + hash + NewLine + NewLine); + + clearText = true; + newLine = true; + lastb = 0; + } + + public void EndClearText() + { + clearText = false; + } + + public override void WriteByte(byte value) + { + if (clearText) + { + outStream.WriteByte(value); + + if (newLine) + { + if (!(value == '\n' && lastb == '\r')) + { + newLine = false; + } + if (value == '-') + { + outStream.WriteByte((byte)' '); + outStream.WriteByte((byte)'-'); // dash escape + } + } + if (value == '\r' || (value == '\n' && lastb != '\r')) + { + newLine = true; + } + lastb = value; + return; + } + + if (start) + { + bool newPacket = (value & 0x40) != 0; + + int tag; + if (newPacket) + { + tag = value & 0x3f; + } + else + { + tag = (value & 0x3f) >> 2; + } + + switch ((PacketTag)tag) + { + case PacketTag.PublicKey: + type = "PUBLIC KEY BLOCK"; + break; + case PacketTag.SecretKey: + type = "PRIVATE KEY BLOCK"; + break; + case PacketTag.Signature: + type = "SIGNATURE"; + break; + default: + type = "MESSAGE"; + break; + } + + DoWrite(headerStart + type + headerTail + NewLine); + + if (m_headers.TryGetValue(HeaderVersion, out var versionHeaders)) + { + WriteHeaderEntry(HeaderVersion, versionHeaders[0]); + } + + foreach (var de in m_headers) + { + string k = de.Key; + if (k != HeaderVersion) + { + foreach (string v in de.Value) + { + WriteHeaderEntry(k, v); + } + } + } + + DoWrite(NewLine); + + start = false; + } + + if (bufPtr == 3) + { + Encode(outStream, buf, bufPtr); + bufPtr = 0; + if ((++chunkCount & 0xf) == 0) + { + DoWrite(NewLine); + } + } + + crc.Update(value); + buf[bufPtr++] = value & 0xff; + } + + /** + * Note: Close() does not close the underlying stream. So it is possible to write + * multiple objects using armoring to a single stream. + */ + protected override void Dispose(bool disposing) + { + if (disposing) + { + if (type != null) + { + DoClose(); + + type = null; + start = true; + } + } + base.Dispose(disposing); + } + + private void DoClose() + { + if (bufPtr > 0) + { + Encode(outStream, buf, bufPtr); + } + + DoWrite(NewLine + '='); + + int crcV = crc.Value; + + buf[0] = ((crcV >> 16) & 0xff); + buf[1] = ((crcV >> 8) & 0xff); + buf[2] = (crcV & 0xff); + + Encode(outStream, buf, 3); + + DoWrite(NewLine); + DoWrite(footerStart); + DoWrite(type); + DoWrite(footerTail); + DoWrite(NewLine); + + outStream.Flush(); + } + + private void WriteHeaderEntry( + string name, + string v) + { + DoWrite(name + ": " + v + NewLine); + } + + private void DoWrite( + string s) + { + byte[] bs = Strings.ToAsciiByteArray(s); + outStream.Write(bs, 0, bs.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs.meta new file mode 100644 index 00000000..a01095c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8fed80424e08ad04da99e5334edd57b8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ArmoredOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs new file mode 100644 index 00000000..40a2977b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs @@ -0,0 +1,402 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Reader for PGP objects. + public class BcpgInputStream + : BaseInputStream + { + private Stream m_in; + private bool next = false; + private int nextB; + + internal static BcpgInputStream Wrap( + Stream inStr) + { + if (inStr is BcpgInputStream) + { + return (BcpgInputStream) inStr; + } + + return new BcpgInputStream(inStr); + } + + private BcpgInputStream( + Stream inputStream) + { + this.m_in = inputStream; + } + + public override int ReadByte() + { + if (next) + { + next = false; + return nextB; + } + + return m_in.ReadByte(); + } + + public override int Read(byte[] buffer, int offset, int count) + { + if (!next) + return m_in.Read(buffer, offset, count); + + Streams.ValidateBufferArguments(buffer, offset, count); + + if (nextB < 0) + return 0; + + buffer[offset] = (byte)nextB; + next = false; + return 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (!next) + return m_in.Read(buffer); + + if (nextB < 0) + return 0; + + buffer[0] = (byte)nextB; + next = false; + return 1; + } +#endif + + public byte[] ReadAll() + { + return Streams.ReadAll(this); + } + + public void ReadFully(byte[] buffer, int offset, int count) + { + if (Streams.ReadFully(this, buffer, offset, count) < count) + throw new EndOfStreamException(); + } + + public void ReadFully(byte[] buffer) + { + ReadFully(buffer, 0, buffer.Length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ReadFully(Span buffer) + { + if (Streams.ReadFully(this, buffer) < buffer.Length) + throw new EndOfStreamException(); + } +#endif + + /// Returns the next packet tag in the stream. + public PacketTag NextPacketTag() + { + if (!next) + { + try + { + nextB = m_in.ReadByte(); + } + catch (EndOfStreamException) + { + nextB = -1; + } + + next = true; + } + + if (nextB < 0) + return (PacketTag)nextB; + + int maskB = nextB & 0x3f; + if ((nextB & 0x40) == 0) // old + { + maskB >>= 2; + } + return (PacketTag)maskB; + } + + public Packet ReadPacket() + { + int hdr = this.ReadByte(); + + if (hdr < 0) + { + return null; + } + + if ((hdr & 0x80) == 0) + { + throw new IOException("invalid header encountered"); + } + + bool newPacket = (hdr & 0x40) != 0; + PacketTag tag = 0; + int bodyLen = 0; + bool partial = false; + + if (newPacket) + { + tag = (PacketTag)(hdr & 0x3f); + + int l = this.ReadByte(); + + if (l < 192) + { + bodyLen = l; + } + else if (l <= 223) + { + int b = m_in.ReadByte(); + bodyLen = ((l - 192) << 8) + (b) + 192; + } + else if (l == 255) + { + bodyLen = (m_in.ReadByte() << 24) | (m_in.ReadByte() << 16) + | (m_in.ReadByte() << 8) | m_in.ReadByte(); + } + else + { + partial = true; + bodyLen = 1 << (l & 0x1f); + } + } + else + { + int lengthType = hdr & 0x3; + + tag = (PacketTag)((hdr & 0x3f) >> 2); + + switch (lengthType) + { + case 0: + bodyLen = this.ReadByte(); + break; + case 1: + bodyLen = (this.ReadByte() << 8) | this.ReadByte(); + break; + case 2: + bodyLen = (this.ReadByte() << 24) | (this.ReadByte() << 16) + | (this.ReadByte() << 8) | this.ReadByte(); + break; + case 3: + partial = true; + break; + default: + throw new IOException("unknown length type encountered"); + } + } + + BcpgInputStream objStream; + if (bodyLen == 0 && partial) + { + objStream = this; + } + else + { + PartialInputStream pis = new PartialInputStream(this, partial, bodyLen); + Stream buf = new BufferedStream(pis); + objStream = new BcpgInputStream(buf); + } + + switch (tag) + { + case PacketTag.Reserved: + return new InputStreamPacket(objStream); + case PacketTag.PublicKeyEncryptedSession: + return new PublicKeyEncSessionPacket(objStream); + case PacketTag.Signature: + return new SignaturePacket(objStream); + case PacketTag.SymmetricKeyEncryptedSessionKey: + return new SymmetricKeyEncSessionPacket(objStream); + case PacketTag.OnePassSignature: + return new OnePassSignaturePacket(objStream); + case PacketTag.SecretKey: + return new SecretKeyPacket(objStream); + case PacketTag.PublicKey: + return new PublicKeyPacket(objStream); + case PacketTag.SecretSubkey: + return new SecretSubkeyPacket(objStream); + case PacketTag.CompressedData: + return new CompressedDataPacket(objStream); + case PacketTag.SymmetricKeyEncrypted: + return new SymmetricEncDataPacket(objStream); + case PacketTag.Marker: + return new MarkerPacket(objStream); + case PacketTag.LiteralData: + return new LiteralDataPacket(objStream); + case PacketTag.Trust: + return new TrustPacket(objStream); + case PacketTag.UserId: + return new UserIdPacket(objStream); + case PacketTag.UserAttribute: + return new UserAttributePacket(objStream); + case PacketTag.PublicSubkey: + return new PublicSubkeyPacket(objStream); + case PacketTag.SymmetricEncryptedIntegrityProtected: + return new SymmetricEncIntegrityPacket(objStream); + case PacketTag.ModificationDetectionCode: + return new ModDetectionCodePacket(objStream); + case PacketTag.Experimental1: + case PacketTag.Experimental2: + case PacketTag.Experimental3: + case PacketTag.Experimental4: + return new ExperimentalPacket(tag, objStream); + default: + throw new IOException("unknown packet type encountered: " + tag); + } + } + + public PacketTag SkipMarkerPackets() + { + PacketTag tag; + while ((tag = NextPacketTag()) == PacketTag.Marker) + { + ReadPacket(); + } + + return tag; + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + m_in.Dispose(); + } + base.Dispose(disposing); + } + + /// + /// A stream that overlays our input stream, allowing the user to only read a segment of it. + /// NB: dataLength will be negative if the segment length is in the upper range above 2**31. + /// + private class PartialInputStream + : BaseInputStream + { + private BcpgInputStream m_in; + private bool partial; + private int dataLength; + + internal PartialInputStream( + BcpgInputStream bcpgIn, + bool partial, + int dataLength) + { + this.m_in = bcpgIn; + this.partial = partial; + this.dataLength = dataLength; + } + + public override int ReadByte() + { + do + { + if (dataLength != 0) + { + int ch = m_in.ReadByte(); + if (ch < 0) + { + throw new EndOfStreamException("Premature end of stream in PartialInputStream"); + } + dataLength--; + return ch; + } + } + while (partial && ReadPartialDataLength() >= 0); + + return -1; + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + do + { + if (dataLength != 0) + { + int readLen = (dataLength > count || dataLength < 0) ? count : dataLength; + int len = m_in.Read(buffer, offset, readLen); + if (len < 1) + throw new EndOfStreamException("Premature end of stream in PartialInputStream"); + + dataLength -= len; + return len; + } + } + while (partial && ReadPartialDataLength() >= 0); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + do + { + if (dataLength != 0) + { + int count = buffer.Length; + int readLen = (dataLength > count || dataLength < 0) ? count : dataLength; + int len = m_in.Read(buffer[..readLen]); + if (len < 1) + throw new EndOfStreamException("Premature end of stream in PartialInputStream"); + + dataLength -= len; + return len; + } + } + while (partial && ReadPartialDataLength() >= 0); + + return 0; + } +#endif + + private int ReadPartialDataLength() + { + int l = m_in.ReadByte(); + + if (l < 0) + { + return -1; + } + + partial = false; + + if (l < 192) + { + dataLength = l; + } + else if (l <= 223) + { + dataLength = ((l - 192) << 8) + (m_in.ReadByte()) + 192; + } + else if (l == 255) + { + dataLength = (m_in.ReadByte() << 24) | (m_in.ReadByte() << 16) + | (m_in.ReadByte() << 8) | m_in.ReadByte(); + } + else + { + partial = true; + dataLength = 1 << (l & 0x1f); + } + + return 0; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs.meta new file mode 100644 index 00000000..442f1b2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e95c8e5704bee9b479c7e9004e8549a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs new file mode 100644 index 00000000..d75bcafc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for a PGP object. + public abstract class BcpgObject + { + public virtual byte[] GetEncoded() + { + MemoryStream bOut = new MemoryStream(); + BcpgOutputStream pOut = new BcpgOutputStream(bOut); + + pOut.WriteObject(this); + + return bOut.ToArray(); + } + + public abstract void Encode(BcpgOutputStream bcpgOut); + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs.meta new file mode 100644 index 00000000..b37318f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6db13f919dfa07b4ba1dc034bc4dab83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs new file mode 100644 index 00000000..51489f45 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs @@ -0,0 +1,446 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic output stream. + public class BcpgOutputStream + : BaseOutputStream + { + internal static BcpgOutputStream Wrap( + Stream outStr) + { + if (outStr is BcpgOutputStream) + { + return (BcpgOutputStream) outStr; + } + + return new BcpgOutputStream(outStr); + } + + private Stream outStr; + private byte[] partialBuffer; + private int partialBufferLength; + private int partialPower; + private int partialOffset; + private const int BufferSizePower = 16; // 2^16 size buffer on long files + + /// Create a stream representing a general packet. + /// Output stream to write to. + public BcpgOutputStream( + Stream outStr) + { + if (outStr == null) + throw new ArgumentNullException("outStr"); + + this.outStr = outStr; + } + + /// Create a stream representing an old style partial object. + /// Output stream to write to. + /// The packet tag for the object. + public BcpgOutputStream( + Stream outStr, + PacketTag tag) + { + if (outStr == null) + throw new ArgumentNullException("outStr"); + + this.outStr = outStr; + this.WriteHeader(tag, true, true, 0); + } + + /// Create a stream representing a general packet. + /// Output stream to write to. + /// Packet tag. + /// Size of chunks making up the packet. + /// If true, the header is written out in old format. + public BcpgOutputStream( + Stream outStr, + PacketTag tag, + long length, + bool oldFormat) + { + if (outStr == null) + throw new ArgumentNullException("outStr"); + + this.outStr = outStr; + + if (length > 0xFFFFFFFFL) + { + this.WriteHeader(tag, false, true, 0); + this.partialBufferLength = 1 << BufferSizePower; + this.partialBuffer = new byte[partialBufferLength]; + this.partialPower = BufferSizePower; + this.partialOffset = 0; + } + else + { + this.WriteHeader(tag, oldFormat, false, length); + } + } + + /// Create a new style partial input stream buffered into chunks. + /// Output stream to write to. + /// Packet tag. + /// Size of chunks making up the packet. + public BcpgOutputStream( + Stream outStr, + PacketTag tag, + long length) + { + if (outStr == null) + throw new ArgumentNullException("outStr"); + + this.outStr = outStr; + this.WriteHeader(tag, false, false, length); + } + + /// Create a new style partial input stream buffered into chunks. + /// Output stream to write to. + /// Packet tag. + /// Buffer to use for collecting chunks. + public BcpgOutputStream( + Stream outStr, + PacketTag tag, + byte[] buffer) + { + if (outStr == null) + throw new ArgumentNullException("outStr"); + + this.outStr = outStr; + this.WriteHeader(tag, false, true, 0); + + this.partialBuffer = buffer; + + uint length = (uint) partialBuffer.Length; + for (partialPower = 0; length != 1; partialPower++) + { + length >>= 1; + } + + if (partialPower > 30) + { + throw new IOException("Buffer cannot be greater than 2^30 in length."); + } + this.partialBufferLength = 1 << partialPower; + this.partialOffset = 0; + } + + private void WriteNewPacketLength( + long bodyLen) + { + if (bodyLen < 192) + { + outStr.WriteByte((byte)bodyLen); + } + else if (bodyLen <= 8383) + { + bodyLen -= 192; + + outStr.WriteByte((byte)(((bodyLen >> 8) & 0xff) + 192)); + outStr.WriteByte((byte)bodyLen); + } + else + { + outStr.WriteByte(0xff); + outStr.WriteByte((byte)(bodyLen >> 24)); + outStr.WriteByte((byte)(bodyLen >> 16)); + outStr.WriteByte((byte)(bodyLen >> 8)); + outStr.WriteByte((byte)bodyLen); + } + } + + private void WriteHeader( + PacketTag tag, + bool oldPackets, + bool partial, + long bodyLen) + { + int hdr = 0x80; + + if (partialBuffer != null) + { + PartialFlushLast(); + partialBuffer = null; + } + + if (oldPackets) + { + hdr |= ((int) tag) << 2; + + if (partial) + { + this.WriteByte((byte)(hdr | 0x03)); + } + else + { + if (bodyLen <= 0xff) + { + this.WriteByte((byte) hdr); + this.WriteByte((byte)bodyLen); + } + else if (bodyLen <= 0xffff) + { + this.WriteByte((byte)(hdr | 0x01)); + this.WriteByte((byte)(bodyLen >> 8)); + this.WriteByte((byte)(bodyLen)); + } + else + { + this.WriteByte((byte)(hdr | 0x02)); + this.WriteByte((byte)(bodyLen >> 24)); + this.WriteByte((byte)(bodyLen >> 16)); + this.WriteByte((byte)(bodyLen >> 8)); + this.WriteByte((byte)bodyLen); + } + } + } + else + { + hdr |= 0x40 | (int) tag; + this.WriteByte((byte) hdr); + + if (partial) + { + partialOffset = 0; + } + else + { + this.WriteNewPacketLength(bodyLen); + } + } + } + + private void PartialFlush() + { + outStr.WriteByte((byte)(0xE0 | partialPower)); + outStr.Write(partialBuffer, 0, partialBufferLength); + partialOffset = 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void PartialFlush(ref ReadOnlySpan buffer) + { + outStr.WriteByte((byte)(0xE0 | partialPower)); + outStr.Write(buffer[..partialBufferLength]); + buffer = buffer[partialBufferLength..]; + } +#endif + + private void PartialFlushLast() + { + WriteNewPacketLength(partialOffset); + outStr.Write(partialBuffer, 0, partialOffset); + partialOffset = 0; + } + + private void PartialWrite(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + PartialWrite(buffer.AsSpan(offset, count)); +#else + if (partialOffset == partialBufferLength) + { + PartialFlush(); + } + + if (count <= (partialBufferLength - partialOffset)) + { + Array.Copy(buffer, offset, partialBuffer, partialOffset, count); + partialOffset += count; + return; + } + + int diff = partialBufferLength - partialOffset; + Array.Copy(buffer, offset, partialBuffer, partialOffset, diff); + offset += diff; + count -= diff; + PartialFlush(); + while (count > partialBufferLength) + { + Array.Copy(buffer, offset, partialBuffer, 0, partialBufferLength); + offset += partialBufferLength; + count -= partialBufferLength; + PartialFlush(); + } + Array.Copy(buffer, offset, partialBuffer, 0, count); + partialOffset = count; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void PartialWrite(ReadOnlySpan buffer) + { + if (partialOffset == partialBufferLength) + { + PartialFlush(); + } + + if (buffer.Length <= (partialBufferLength - partialOffset)) + { + buffer.CopyTo(partialBuffer.AsSpan(partialOffset)); + partialOffset += buffer.Length; + return; + } + + int diff = partialBufferLength - partialOffset; + buffer[..diff].CopyTo(partialBuffer.AsSpan(partialOffset)); + buffer = buffer[diff..]; + PartialFlush(); + while (buffer.Length > partialBufferLength) + { + PartialFlush(ref buffer); + } + buffer.CopyTo(partialBuffer); + partialOffset = buffer.Length; + } +#endif + + private void PartialWriteByte(byte value) + { + if (partialOffset == partialBufferLength) + { + PartialFlush(); + } + + partialBuffer[partialOffset++] = value; + } + + public override void Write(byte[] buffer, int offset, int count) + { + if (partialBuffer != null) + { + PartialWrite(buffer, offset, count); + } + else + { + outStr.Write(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (partialBuffer != null) + { + PartialWrite(buffer); + } + else + { + outStr.Write(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + if (partialBuffer != null) + { + PartialWriteByte(value); + } + else + { + outStr.WriteByte(value); + } + } + + // Additional helper methods to write primitive types + internal virtual void WriteShort( + short n) + { + this.Write( + (byte)(n >> 8), + (byte)n); + } + internal virtual void WriteInt( + int n) + { + this.Write( + (byte)(n >> 24), + (byte)(n >> 16), + (byte)(n >> 8), + (byte)n); + } + internal virtual void WriteLong( + long n) + { + this.Write( + (byte)(n >> 56), + (byte)(n >> 48), + (byte)(n >> 40), + (byte)(n >> 32), + (byte)(n >> 24), + (byte)(n >> 16), + (byte)(n >> 8), + (byte)n); + } + + public void WritePacket( + ContainedPacket p) + { + p.Encode(this); + } + + internal void WritePacket( + PacketTag tag, + byte[] body, + bool oldFormat) + { + this.WriteHeader(tag, oldFormat, false, body.Length); + this.Write(body); + } + + public void WriteObject( + BcpgObject bcpgObject) + { + bcpgObject.Encode(this); + } + + public void WriteObjects( + params BcpgObject[] v) + { + foreach (BcpgObject o in v) + { + o.Encode(this); + } + } + + /// Flush the underlying stream. + public override void Flush() + { + outStr.Flush(); + } + + /// Finish writing out the current packet without closing the underlying stream. + public void Finish() + { + if (partialBuffer != null) + { + PartialFlushLast(); + Array.Clear(partialBuffer, 0, partialBuffer.Length); + partialBuffer = null; + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + this.Finish(); + outStr.Flush(); + outStr.Dispose(); + } + base.Dispose(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs.meta new file mode 100644 index 00000000..9a10791f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ad3f23730b822694fbd2acdfc5d002cd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/BcpgOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs new file mode 100644 index 00000000..df139061 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Generic compressed data object. + public class CompressedDataPacket + : InputStreamPacket + { + private readonly CompressionAlgorithmTag algorithm; + + internal CompressedDataPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + this.algorithm = (CompressionAlgorithmTag) bcpgIn.ReadByte(); + } + + /// The algorithm tag value. + public CompressionAlgorithmTag Algorithm + { + get { return algorithm; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs.meta new file mode 100644 index 00000000..c3f96743 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6a458ffe5901b8d4b8f38f11460abe45 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressedDataPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs new file mode 100644 index 00000000..d90636ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic tags for compression algorithms. + public enum CompressionAlgorithmTag + { + Uncompressed = 0, // Uncompressed + Zip = 1, // ZIP (RFC 1951) + ZLib = 2, // ZLIB (RFC 1950) + BZip2 = 3, // BZ2 + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs.meta new file mode 100644 index 00000000..b8fece19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a01318b463e16f74eb1466a80b6217c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/CompressionAlgorithmTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs new file mode 100644 index 00000000..7653bb70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic type for a PGP packet. + public abstract class ContainedPacket + : Packet + { + public byte[] GetEncoded() + { + MemoryStream bOut = new MemoryStream(); + BcpgOutputStream pOut = new BcpgOutputStream(bOut); + + pOut.WritePacket(this); + + return bOut.ToArray(); + } + + public abstract void Encode(BcpgOutputStream bcpgOut); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs.meta new file mode 100644 index 00000000..64f64318 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4db8b93d06f008459a950dec7a51129 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ContainedPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs new file mode 100644 index 00000000..a99b840c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public class Crc24 + { + private const int Crc24Init = 0x0b704ce; + private const int Crc24Poly = 0x1864cfb; + + private int crc = Crc24Init; + + public Crc24() + { + } + + public void Update( + int b) + { + crc ^= b << 16; + for (int i = 0; i < 8; i++) + { + crc <<= 1; + if ((crc & 0x1000000) != 0) + { + crc ^= Crc24Poly; + } + } + } + + public int Value + { + get { return crc; } + } + + public void Reset() + { + crc = Crc24Init; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs.meta new file mode 100644 index 00000000..f6ad3b74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e046176ec3927c4cb0a8d7c03e6d182 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Crc24.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs new file mode 100644 index 00000000..b59cb1dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for a DSA public key. + public class DsaPublicBcpgKey + : BcpgObject, IBcpgKey + { + private readonly MPInteger p, q, g, y; + + /// The stream to read the packet from. + public DsaPublicBcpgKey( + BcpgInputStream bcpgIn) + { + this.p = new MPInteger(bcpgIn); + this.q = new MPInteger(bcpgIn); + this.g = new MPInteger(bcpgIn); + this.y = new MPInteger(bcpgIn); + } + + public DsaPublicBcpgKey( + BigInteger p, + BigInteger q, + BigInteger g, + BigInteger y) + { + this.p = new MPInteger(p); + this.q = new MPInteger(q); + this.g = new MPInteger(g); + this.y = new MPInteger(y); + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObjects(p, q, g, y); + } + + public BigInteger G + { + get { return g.Value; } + } + + public BigInteger P + { + get { return p.Value; } + } + + public BigInteger Q + { + get { return q.Value; } + } + + public BigInteger Y + { + get { return y.Value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs.meta new file mode 100644 index 00000000..78d782b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c5da13fa2e61d6143bdaf8f70a4cfa69 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaPublicBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs new file mode 100644 index 00000000..69941562 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for a DSA secret key. + public class DsaSecretBcpgKey + : BcpgObject, IBcpgKey + { + internal MPInteger x; + + /** + * @param in + */ + public DsaSecretBcpgKey( + BcpgInputStream bcpgIn) + { + this.x = new MPInteger(bcpgIn); + } + + public DsaSecretBcpgKey( + BigInteger x) + { + this.x = new MPInteger(x); + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObject(x); + } + + /** + * @return x + */ + public BigInteger X + { + get { return x.Value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs.meta new file mode 100644 index 00000000..78a4af69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 277f88a9a00aa1d48b7b952ecc615e65 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/DsaSecretBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs new file mode 100644 index 00000000..0d51f863 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs @@ -0,0 +1,125 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an ECDH Public Key. + public class ECDHPublicBcpgKey + : ECPublicBcpgKey + { + private byte reserved; + private HashAlgorithmTag hashFunctionId; + private SymmetricKeyAlgorithmTag symAlgorithmId; + + /// The stream to read the packet from. + public ECDHPublicBcpgKey(BcpgInputStream bcpgIn) + : base(bcpgIn) + { + int length = bcpgIn.ReadByte(); + if (length != 3) + throw new InvalidOperationException("KDF parameters size of 3 expected."); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span kdfParameters = stackalloc byte[3]; +#else + byte[] kdfParameters = new byte[3]; +#endif + bcpgIn.ReadFully(kdfParameters); + + reserved = kdfParameters[0]; + hashFunctionId = (HashAlgorithmTag)kdfParameters[1]; + symAlgorithmId = (SymmetricKeyAlgorithmTag)kdfParameters[2]; + + VerifyHashAlgorithm(); + VerifySymmetricKeyAlgorithm(); + } + + public ECDHPublicBcpgKey( + DerObjectIdentifier oid, + ECPoint point, + HashAlgorithmTag hashAlgorithm, + SymmetricKeyAlgorithmTag symmetricKeyAlgorithm) + : base(oid, point) + { + reserved = 1; + hashFunctionId = hashAlgorithm; + symAlgorithmId = symmetricKeyAlgorithm; + + VerifyHashAlgorithm(); + VerifySymmetricKeyAlgorithm(); + } + + public ECDHPublicBcpgKey( + DerObjectIdentifier oid, + BigInteger point, + HashAlgorithmTag hashAlgorithm, + SymmetricKeyAlgorithmTag symmetricKeyAlgorithm) + : base(oid, point) + { + reserved = 1; + hashFunctionId = hashAlgorithm; + symAlgorithmId = symmetricKeyAlgorithm; + + VerifyHashAlgorithm(); + VerifySymmetricKeyAlgorithm(); + } + + public virtual byte Reserved + { + get { return reserved; } + } + + public virtual HashAlgorithmTag HashAlgorithm + { + get { return hashFunctionId; } + } + + public virtual SymmetricKeyAlgorithmTag SymmetricKeyAlgorithm + { + get { return symAlgorithmId; } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + base.Encode(bcpgOut); + bcpgOut.WriteByte(0x3); + bcpgOut.WriteByte(reserved); + bcpgOut.WriteByte((byte)hashFunctionId); + bcpgOut.WriteByte((byte)symAlgorithmId); + } + + private void VerifyHashAlgorithm() + { + switch (hashFunctionId) + { + case HashAlgorithmTag.Sha256: + case HashAlgorithmTag.Sha384: + case HashAlgorithmTag.Sha512: + break; + default: + throw new InvalidOperationException("Hash algorithm must be SHA-256 or stronger."); + } + } + + private void VerifySymmetricKeyAlgorithm() + { + switch (symAlgorithmId) + { + case SymmetricKeyAlgorithmTag.Aes128: + case SymmetricKeyAlgorithmTag.Aes192: + case SymmetricKeyAlgorithmTag.Aes256: + break; + default: + throw new InvalidOperationException("Symmetric key algorithm must be AES-128 or stronger."); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs.meta new file mode 100644 index 00000000..9ba93829 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 48f95fe26306d6b45bbd3899d4c609e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDHPublicBCPGKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs new file mode 100644 index 00000000..18444d40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an ECDSA Public Key. + public class ECDsaPublicBcpgKey + : ECPublicBcpgKey + { + /// The stream to read the packet from. + protected internal ECDsaPublicBcpgKey( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + } + + public ECDsaPublicBcpgKey( + DerObjectIdentifier oid, + ECPoint point) + : base(oid, point) + { + } + + public ECDsaPublicBcpgKey( + DerObjectIdentifier oid, + BigInteger encodedPoint) + : base(oid, encodedPoint) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs.meta new file mode 100644 index 00000000..3604cb89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df337537e86460f4f86d35cacf8ea369 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECDsaPublicBCPGKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs new file mode 100644 index 00000000..6eaef22f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs @@ -0,0 +1,103 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an EC Public Key. + public abstract class ECPublicBcpgKey + : BcpgObject, IBcpgKey + { + internal DerObjectIdentifier oid; + internal BigInteger point; + + /// The stream to read the packet from. + protected ECPublicBcpgKey( + BcpgInputStream bcpgIn) + { + this.oid = DerObjectIdentifier.GetInstance(Asn1Object.FromByteArray(ReadBytesOfEncodedLength(bcpgIn))); + this.point = new MPInteger(bcpgIn).Value; + } + + protected ECPublicBcpgKey( + DerObjectIdentifier oid, + ECPoint point) + { + this.point = MPInteger.ToMpiBigInteger(point); + this.oid = oid; + } + + protected ECPublicBcpgKey( + DerObjectIdentifier oid, + BigInteger encodedPoint) + { + this.point = encodedPoint; + this.oid = oid; + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (IOException) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + byte[] oid = this.oid.GetEncoded(); + bcpgOut.Write(oid, 1, oid.Length - 1); + + MPInteger point = new MPInteger(this.point); + bcpgOut.WriteObject(point); + } + + public virtual BigInteger EncodedPoint + { + get { return point; } + } + + public virtual DerObjectIdentifier CurveOid + { + get { return oid; } + } + + protected static byte[] ReadBytesOfEncodedLength( + BcpgInputStream bcpgIn) + { + int length = bcpgIn.ReadByte(); + if (length < 0) + throw new EndOfStreamException(); + if (length == 0 || length == 0xFF) + throw new IOException("future extensions not yet implemented"); + if (length > 127) + throw new IOException("unsupported OID"); + + byte[] buffer = new byte[length + 2]; + bcpgIn.ReadFully(buffer, 2, buffer.Length - 2); + buffer[0] = (byte)0x06; + buffer[1] = (byte)length; + + return buffer; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs.meta new file mode 100644 index 00000000..1b3e6b79 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9152380635704394a9d5f55bd5542690 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECPublicBCPGKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs new file mode 100644 index 00000000..d7402ba6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an EC Secret Key. + public class ECSecretBcpgKey + : BcpgObject, IBcpgKey + { + internal readonly MPInteger m_x; + + public ECSecretBcpgKey( + BcpgInputStream bcpgIn) + { + m_x = new MPInteger(bcpgIn); + } + + public ECSecretBcpgKey( + BigInteger x) + { + m_x = new MPInteger(x); + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObject(m_x); + } + + public virtual BigInteger X + { + get { return m_x.Value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs.meta new file mode 100644 index 00000000..775219eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8852ae292af4645488b2914fcf6b6896 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ECSecretBCPGKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs new file mode 100644 index 00000000..44b664ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public sealed class EdDsaPublicBcpgKey + : ECPublicBcpgKey + { + internal EdDsaPublicBcpgKey(BcpgInputStream bcpgIn) + : base(bcpgIn) + { + } + + public EdDsaPublicBcpgKey(DerObjectIdentifier oid, ECPoint point) + : base(oid, point) + { + } + + public EdDsaPublicBcpgKey(DerObjectIdentifier oid, BigInteger encodedPoint) + : base(oid, encodedPoint) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs.meta new file mode 100644 index 00000000..4a671107 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b4f71b110466fa448eea3e9eede364b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdDsaPublicBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs new file mode 100644 index 00000000..714414f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public sealed class EdSecretBcpgKey + : BcpgObject, IBcpgKey + { + internal readonly MPInteger m_x; + + public EdSecretBcpgKey(BcpgInputStream bcpgIn) + { + m_x = new MPInteger(bcpgIn); + } + + public EdSecretBcpgKey(BigInteger x) + { + m_x = new MPInteger(x); + } + + public string Format => "PGP"; + + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode(BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObject(m_x); + } + + public BigInteger X => m_x.Value; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs.meta new file mode 100644 index 00000000..8359282f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2994b77f4235fb245afa99febf1c75f9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/EdSecretBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs new file mode 100644 index 00000000..306ba589 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an ElGamal public key. + public class ElGamalPublicBcpgKey + : BcpgObject, IBcpgKey + { + internal MPInteger p, g, y; + + public ElGamalPublicBcpgKey( + BcpgInputStream bcpgIn) + { + this.p = new MPInteger(bcpgIn); + this.g = new MPInteger(bcpgIn); + this.y = new MPInteger(bcpgIn); + } + + public ElGamalPublicBcpgKey( + BigInteger p, + BigInteger g, + BigInteger y) + { + this.p = new MPInteger(p); + this.g = new MPInteger(g); + this.y = new MPInteger(y); + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public BigInteger P + { + get { return p.Value; } + } + + public BigInteger G + { + get { return g.Value; } + } + + public BigInteger Y + { + get { return y.Value; } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObjects(p, g, y); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs.meta new file mode 100644 index 00000000..3df9d1e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 646b30dce331c0542b449d70077f6efb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalPublicBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs new file mode 100644 index 00000000..6c6a3d3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an ElGamal secret key. + public class ElGamalSecretBcpgKey + : BcpgObject, IBcpgKey + { + internal MPInteger x; + + /** + * @param in + */ + public ElGamalSecretBcpgKey( + BcpgInputStream bcpgIn) + { + this.x = new MPInteger(bcpgIn); + } + + /** + * @param x + */ + public ElGamalSecretBcpgKey( + BigInteger x) + { + this.x = new MPInteger(x); + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + public BigInteger X + { + get { return x.Value; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObject(x); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs.meta new file mode 100644 index 00000000..6316fe28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a9388c1980e6b084ea3925333a6f8202 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ElGamalSecretBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs new file mode 100644 index 00000000..84a5c0a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for an experimental packet. + public class ExperimentalPacket + : ContainedPacket //, PublicKeyAlgorithmTag + { + private readonly PacketTag tag; + private readonly byte[] contents; + + internal ExperimentalPacket( + PacketTag tag, + BcpgInputStream bcpgIn) + { + this.tag = tag; + + this.contents = bcpgIn.ReadAll(); + } + + public PacketTag Tag + { + get { return tag; } + } + + public byte[] GetContents() + { + return (byte[]) contents.Clone(); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(tag, contents, true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs.meta new file mode 100644 index 00000000..f29a5ec4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9825d8b263536d64a9eedfeacd96fb4c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ExperimentalPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs new file mode 100644 index 00000000..7d953dd7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic tags for hash algorithms. + public enum HashAlgorithmTag + { + MD5 = 1, // MD5 + Sha1 = 2, // SHA-1 + RipeMD160 = 3, // RIPE-MD/160 + DoubleSha = 4, // Reserved for double-width SHA (experimental) + MD2 = 5, // MD2 + Tiger192 = 6, // Reserved for TIGER/192 + Haval5pass160 = 7, // Reserved for HAVAL (5 pass, 160-bit) + + Sha256 = 8, // SHA-256 + Sha384 = 9, // SHA-384 + Sha512 = 10, // SHA-512 + Sha224 = 11, // SHA-224 + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs.meta new file mode 100644 index 00000000..7000499c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 89f7d4dd018e75449b51a41b8196971c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/HashAlgorithmTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs new file mode 100644 index 00000000..bf135a15 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base interface for a PGP key. + public interface IBcpgKey + { + /// + /// The base format for this key - in the case of the symmetric keys it will generally + /// be raw indicating that the key is just a straight byte representation, for an asymmetric + /// key the format will be PGP, indicating the key is a string of MPIs encoded in PGP format. + /// + /// "RAW" or "PGP". + string Format { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs.meta new file mode 100644 index 00000000..7069939b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 08ef0211bbbb6fa43a9303ecd1615b44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/IBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs new file mode 100644 index 00000000..f04abe62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public class InputStreamPacket + : Packet + { + private readonly BcpgInputStream bcpgIn; + + public InputStreamPacket( + BcpgInputStream bcpgIn) + { + this.bcpgIn = bcpgIn; + } + + /// Note: you can only read from this once... + public BcpgInputStream GetInputStream() + { + return bcpgIn; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs.meta new file mode 100644 index 00000000..62934b0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92d44224faa00ce428599f2d34ebd8cd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/InputStreamPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs new file mode 100644 index 00000000..24844437 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Generic literal data packet. + public class LiteralDataPacket + : InputStreamPacket + { + private int format; + private byte[] fileName; + private long modDate; + + internal LiteralDataPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + format = bcpgIn.ReadByte(); + int len = bcpgIn.ReadByte(); + + fileName = new byte[len]; + for (int i = 0; i != len; ++i) + { + int ch = bcpgIn.ReadByte(); + if (ch < 0) + throw new IOException("literal data truncated in header"); + + fileName[i] = (byte)ch; + } + + modDate = (((uint)bcpgIn.ReadByte() << 24) + | ((uint)bcpgIn.ReadByte() << 16) + | ((uint)bcpgIn.ReadByte() << 8) + | (uint)bcpgIn.ReadByte()) * 1000L; + } + + /// The format tag value. + public int Format + { + get { return format; } + } + + /// The modification time of the file in milli-seconds (since Jan 1, 1970 UTC) + public long ModificationTime + { + get { return modDate; } + } + + public string FileName + { + get { return Strings.FromUtf8ByteArray(fileName); } + } + + public byte[] GetRawFileName() + { + return Arrays.Clone(fileName); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs.meta new file mode 100644 index 00000000..d5862cba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a6bfdfd1329a25246b1620d14e42847d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/LiteralDataPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs new file mode 100644 index 00000000..ac43e623 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// A multiple precision integer + public sealed class MPInteger + : BcpgObject + { + private readonly BigInteger m_val; + + public MPInteger(BcpgInputStream bcpgIn) + { + if (bcpgIn == null) + throw new ArgumentNullException(nameof(bcpgIn)); + + int lengthInBits = (bcpgIn.ReadByte() << 8) | bcpgIn.ReadByte(); + int lengthInBytes = (lengthInBits + 7) / 8; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = lengthInBytes <= 512 + ? stackalloc byte[lengthInBytes] + : new byte[lengthInBytes]; +#else + byte[] bytes = new byte[lengthInBytes]; +#endif + + bcpgIn.ReadFully(bytes); + m_val = new BigInteger(1, bytes); + } + + public MPInteger(BigInteger val) + { + if (val == null) + throw new ArgumentNullException(nameof(val)); + if (val.SignValue < 0) + throw new ArgumentException("Values must be positive", nameof(val)); + + m_val = val; + } + + public BigInteger Value => m_val; + + public override void Encode(BcpgOutputStream bcpgOut) + { + bcpgOut.WriteShort((short)m_val.BitLength); + bcpgOut.Write(m_val.ToByteArrayUnsigned()); + } + + internal static BigInteger ToMpiBigInteger(ECPoint point) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int encodedLength = point.GetEncodedLength(false); + Span encoding = encodedLength <= 512 + ? stackalloc byte[encodedLength] + : new byte[encodedLength]; + point.EncodeTo(false, encoding); +#else + byte[] encoding = point.GetEncoded(false); +#endif + return new BigInteger(1, encoding); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs.meta new file mode 100644 index 00000000..09eb05a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 737dcd1ffc625d444b47620d9f795737 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MPInteger.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs new file mode 100644 index 00000000..ed727dd2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic type for a marker packet. + public class MarkerPacket + : ContainedPacket + { + // "PGP" + byte[] marker = { (byte)0x50, (byte)0x47, (byte)0x50 }; + + public MarkerPacket( + BcpgInputStream bcpgIn) + { + bcpgIn.ReadFully(marker); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.Marker, marker, true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs.meta new file mode 100644 index 00000000..bebae757 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6e3235a18c73c3a439eb8851044ccd88 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/MarkerPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs new file mode 100644 index 00000000..03df24cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a modification detection code packet. + public class ModDetectionCodePacket + : ContainedPacket + { + private readonly byte[] digest; + + internal ModDetectionCodePacket( + BcpgInputStream bcpgIn) + { + if (bcpgIn == null) + throw new ArgumentNullException("bcpgIn"); + + this.digest = new byte[20]; + bcpgIn.ReadFully(this.digest); + } + + public ModDetectionCodePacket( + byte[] digest) + { + if (digest == null) + throw new ArgumentNullException("digest"); + + this.digest = (byte[]) digest.Clone(); + } + + public byte[] GetDigest() + { + return (byte[]) digest.Clone(); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.ModificationDetectionCode, digest, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs.meta new file mode 100644 index 00000000..f3dfac92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bf4d8a9df12618e4f8b3c70281158477 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/ModDetectionCodePacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs new file mode 100644 index 00000000..45b6582c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Generic signature object + public class OnePassSignaturePacket + : ContainedPacket + { + private int version; + private int sigType; + private HashAlgorithmTag hashAlgorithm; + private PublicKeyAlgorithmTag keyAlgorithm; + private long keyId; + private int nested; + + internal OnePassSignaturePacket( + BcpgInputStream bcpgIn) + { + version = bcpgIn.ReadByte(); + sigType = bcpgIn.ReadByte(); + hashAlgorithm = (HashAlgorithmTag) bcpgIn.ReadByte(); + keyAlgorithm = (PublicKeyAlgorithmTag) bcpgIn.ReadByte(); + + keyId |= (long)bcpgIn.ReadByte() << 56; + keyId |= (long)bcpgIn.ReadByte() << 48; + keyId |= (long)bcpgIn.ReadByte() << 40; + keyId |= (long)bcpgIn.ReadByte() << 32; + keyId |= (long)bcpgIn.ReadByte() << 24; + keyId |= (long)bcpgIn.ReadByte() << 16; + keyId |= (long)bcpgIn.ReadByte() << 8; + keyId |= (uint)bcpgIn.ReadByte(); + + nested = bcpgIn.ReadByte(); + } + + public OnePassSignaturePacket( + int sigType, + HashAlgorithmTag hashAlgorithm, + PublicKeyAlgorithmTag keyAlgorithm, + long keyId, + bool isNested) + { + this.version = 3; + this.sigType = sigType; + this.hashAlgorithm = hashAlgorithm; + this.keyAlgorithm = keyAlgorithm; + this.keyId = keyId; + this.nested = (isNested) ? 0 : 1; + } + + public int SignatureType + { + get { return sigType; } + } + + /// The encryption algorithm tag. + public PublicKeyAlgorithmTag KeyAlgorithm + { + get { return keyAlgorithm; } + } + + /// The hash algorithm tag. + public HashAlgorithmTag HashAlgorithm + { + get { return hashAlgorithm; } + } + + public long KeyId + { + get { return keyId; } + } + + public override void Encode(BcpgOutputStream bcpgOut) + { + MemoryStream bOut = new MemoryStream(); + using (var pOut = new BcpgOutputStream(bOut)) + { + pOut.Write((byte)version, (byte)sigType, (byte)hashAlgorithm, (byte)keyAlgorithm); + pOut.WriteLong(keyId); + pOut.WriteByte((byte)nested); + } + + bcpgOut.WritePacket(PacketTag.OnePassSignature, bOut.ToArray(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs.meta new file mode 100644 index 00000000..a5626eb2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f97afbe97bff78b43bf951a9bef26c8a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OnePassSignaturePacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs new file mode 100644 index 00000000..f32366c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public abstract class OutputStreamPacket + { + private readonly BcpgOutputStream bcpgOut; + + internal OutputStreamPacket( + BcpgOutputStream bcpgOut) + { + if (bcpgOut == null) + throw new ArgumentNullException("bcpgOut"); + + this.bcpgOut = bcpgOut; + } + + public abstract BcpgOutputStream Open(); + + public abstract void Close(); + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs.meta new file mode 100644 index 00000000..eab59d69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d6dbe852f2e343d45b606409fd4b9dcb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/OutputStreamPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs new file mode 100644 index 00000000..bc751825 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs @@ -0,0 +1,11 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public class Packet + //: PacketTag + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs.meta new file mode 100644 index 00000000..1c7e1ed6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 80bf5f849e9569745b0273e7afdfb04d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/Packet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs new file mode 100644 index 00000000..c1f56c93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic PGP packet tag types. + public enum PacketTag + { + Reserved = 0, // Reserved - a packet tag must not have this value + PublicKeyEncryptedSession = 1, // Public-Key Encrypted Session Key Packet + Signature = 2, // Signature Packet + SymmetricKeyEncryptedSessionKey = 3, // Symmetric-Key Encrypted Session Key Packet + OnePassSignature = 4, // One-Pass Signature Packet + SecretKey = 5, // Secret Key Packet + PublicKey = 6, // Public Key Packet + SecretSubkey = 7, // Secret Subkey Packet + CompressedData = 8, // Compressed Data Packet + SymmetricKeyEncrypted = 9, // Symmetrically Encrypted Data Packet + Marker = 10, // Marker Packet + LiteralData = 11, // Literal Data Packet + Trust = 12, // Trust Packet + UserId = 13, // User ID Packet + PublicSubkey = 14, // Public Subkey Packet + UserAttribute = 17, // User attribute + SymmetricEncryptedIntegrityProtected = 18, // Symmetric encrypted, integrity protected + ModificationDetectionCode = 19, // Modification detection code + + Experimental1 = 60, // Private or Experimental Values + Experimental2 = 61, + Experimental3 = 62, + Experimental4 = 63 + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs.meta new file mode 100644 index 00000000..06fb3b75 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30eb025740057cb45acf3197d4f2006d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PacketTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs new file mode 100644 index 00000000..8d5ee3fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Public Key Algorithm tag numbers. + public enum PublicKeyAlgorithmTag + { + RsaGeneral = 1, // RSA (Encrypt or Sign) + RsaEncrypt = 2, // RSA Encrypt-Only + RsaSign = 3, // RSA Sign-Only + ElGamalEncrypt = 16, // Elgamal (Encrypt-Only), see [ELGAMAL] + Dsa = 17, // DSA (Digital Signature Standard) + ECDH = 18, // Reserved for Elliptic Curve (actual algorithm name) + ECDsa = 19, // Reserved for ECDSA + ElGamalGeneral = 20, // Elgamal (Encrypt or Sign) + DiffieHellman = 21, // Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME) + EdDsa = 22, // EdDSA - (internet draft, but appearing in use) + + Experimental_1 = 100, + Experimental_2 = 101, + Experimental_3 = 102, + Experimental_4 = 103, + Experimental_5 = 104, + Experimental_6 = 105, + Experimental_7 = 106, + Experimental_8 = 107, + Experimental_9 = 108, + Experimental_10 = 109, + Experimental_11 = 110, + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs.meta new file mode 100644 index 00000000..a7379126 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c3aaeffc9a873f14ab42a1c9cf9021b9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyAlgorithmTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs new file mode 100644 index 00000000..6a3af73c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a PGP public key. + public class PublicKeyEncSessionPacket + : ContainedPacket //, PublicKeyAlgorithmTag + { + private int version; + private long keyId; + private PublicKeyAlgorithmTag algorithm; + private byte[][] data; + + internal PublicKeyEncSessionPacket( + BcpgInputStream bcpgIn) + { + version = bcpgIn.ReadByte(); + + keyId |= (long)bcpgIn.ReadByte() << 56; + keyId |= (long)bcpgIn.ReadByte() << 48; + keyId |= (long)bcpgIn.ReadByte() << 40; + keyId |= (long)bcpgIn.ReadByte() << 32; + keyId |= (long)bcpgIn.ReadByte() << 24; + keyId |= (long)bcpgIn.ReadByte() << 16; + keyId |= (long)bcpgIn.ReadByte() << 8; + keyId |= (uint)bcpgIn.ReadByte(); + + algorithm = (PublicKeyAlgorithmTag) bcpgIn.ReadByte(); + + switch ((PublicKeyAlgorithmTag) algorithm) + { + case PublicKeyAlgorithmTag.RsaEncrypt: + case PublicKeyAlgorithmTag.RsaGeneral: + data = new byte[][]{ new MPInteger(bcpgIn).GetEncoded() }; + break; + case PublicKeyAlgorithmTag.ElGamalEncrypt: + case PublicKeyAlgorithmTag.ElGamalGeneral: + MPInteger p = new MPInteger(bcpgIn); + MPInteger g = new MPInteger(bcpgIn); + data = new byte[][]{ + p.GetEncoded(), + g.GetEncoded(), + }; + break; + case PublicKeyAlgorithmTag.ECDH: + data = new byte[][]{ Streams.ReadAll(bcpgIn) }; + break; + default: + throw new IOException("unknown PGP public key algorithm encountered"); + } + } + + public PublicKeyEncSessionPacket( + long keyId, + PublicKeyAlgorithmTag algorithm, + byte[][] data) + { + this.version = 3; + this.keyId = keyId; + this.algorithm = algorithm; + this.data = new byte[data.Length][]; + for (int i = 0; i < data.Length; ++i) + { + this.data[i] = Arrays.Clone(data[i]); + } + } + + public int Version + { + get { return version; } + } + + public long KeyId + { + get { return keyId; } + } + + public PublicKeyAlgorithmTag Algorithm + { + get { return algorithm; } + } + + public byte[][] GetEncSessionKey() + { + return data; + } + + public override void Encode(BcpgOutputStream bcpgOut) + { + MemoryStream bOut = new MemoryStream(); + using (var pOut = new BcpgOutputStream(bOut)) + { + pOut.WriteByte((byte)version); + pOut.WriteLong(keyId); + pOut.WriteByte((byte)algorithm); + + for (int i = 0; i < data.Length; ++i) + { + pOut.Write(data[i]); + } + } + + bcpgOut.WritePacket(PacketTag.PublicKeyEncryptedSession, bOut.ToArray(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs.meta new file mode 100644 index 00000000..303cc6da --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aaf75d3e9e7860b48a6584841d4dfeed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyEncSessionPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs new file mode 100644 index 00000000..00ceb610 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a PGP public key. + public class PublicKeyPacket + : ContainedPacket //, PublicKeyAlgorithmTag + { + private int version; + private long time; + private int validDays; + private PublicKeyAlgorithmTag algorithm; + private IBcpgKey key; + + internal PublicKeyPacket( + BcpgInputStream bcpgIn) + { + version = bcpgIn.ReadByte(); + + time = ((uint)bcpgIn.ReadByte() << 24) | ((uint)bcpgIn.ReadByte() << 16) + | ((uint)bcpgIn.ReadByte() << 8) | (uint)bcpgIn.ReadByte(); + + if (version <= 3) + { + validDays = (bcpgIn.ReadByte() << 8) | bcpgIn.ReadByte(); + } + + algorithm = (PublicKeyAlgorithmTag)bcpgIn.ReadByte(); + + switch (algorithm) + { + case PublicKeyAlgorithmTag.RsaEncrypt: + case PublicKeyAlgorithmTag.RsaGeneral: + case PublicKeyAlgorithmTag.RsaSign: + key = new RsaPublicBcpgKey(bcpgIn); + break; + case PublicKeyAlgorithmTag.Dsa: + key = new DsaPublicBcpgKey(bcpgIn); + break; + case PublicKeyAlgorithmTag.ElGamalEncrypt: + case PublicKeyAlgorithmTag.ElGamalGeneral: + key = new ElGamalPublicBcpgKey(bcpgIn); + break; + case PublicKeyAlgorithmTag.ECDH: + key = new ECDHPublicBcpgKey(bcpgIn); + break; + case PublicKeyAlgorithmTag.ECDsa: + key = new ECDsaPublicBcpgKey(bcpgIn); + break; + case PublicKeyAlgorithmTag.EdDsa: + key = new EdDsaPublicBcpgKey(bcpgIn); + break; + default: + throw new IOException("unknown PGP public key algorithm encountered"); + } + } + + /// Construct a version 4 public key packet. + public PublicKeyPacket( + PublicKeyAlgorithmTag algorithm, + DateTime time, + IBcpgKey key) + { + this.version = 4; + this.time = DateTimeUtilities.DateTimeToUnixMs(time) / 1000L; + this.algorithm = algorithm; + this.key = key; + } + + public virtual int Version + { + get { return version; } + } + + public virtual PublicKeyAlgorithmTag Algorithm + { + get { return algorithm; } + } + + public virtual int ValidDays + { + get { return validDays; } + } + + public virtual DateTime GetTime() + { + return DateTimeUtilities.UnixMsToDateTime(time * 1000L); + } + + public virtual IBcpgKey Key + { + get { return key; } + } + + public virtual byte[] GetEncodedContents() + { + MemoryStream bOut = new MemoryStream(); + BcpgOutputStream pOut = new BcpgOutputStream(bOut); + + pOut.WriteByte((byte) version); + pOut.WriteInt((int) time); + + if (version <= 3) + { + pOut.WriteShort((short) validDays); + } + + pOut.WriteByte((byte) algorithm); + + pOut.WriteObject((BcpgObject)key); + + return bOut.ToArray(); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.PublicKey, GetEncodedContents(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs.meta new file mode 100644 index 00000000..08347d4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3a04c4e2840f831408de91bd773329b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicKeyPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs new file mode 100644 index 00000000..29308cb9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a PGP public subkey + public class PublicSubkeyPacket + : PublicKeyPacket + { + internal PublicSubkeyPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + } + + /// Construct a version 4 public subkey packet. + public PublicSubkeyPacket( + PublicKeyAlgorithmTag algorithm, + DateTime time, + IBcpgKey key) + : base(algorithm, time, key) + { + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.PublicSubkey, GetEncodedContents(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs.meta new file mode 100644 index 00000000..b5f6284c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db6a16a0801baca45bdfc41795b48d55 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/PublicSubkeyPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs new file mode 100644 index 00000000..da5c2ff2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an RSA public key. + public class RsaPublicBcpgKey + : BcpgObject, IBcpgKey + { + private readonly MPInteger n, e; + + /// Construct an RSA public key from the passed in stream. + public RsaPublicBcpgKey( + BcpgInputStream bcpgIn) + { + this.n = new MPInteger(bcpgIn); + this.e = new MPInteger(bcpgIn); + } + + /// The modulus. + /// The public exponent. + public RsaPublicBcpgKey( + BigInteger n, + BigInteger e) + { + this.n = new MPInteger(n); + this.e = new MPInteger(e); + } + + public BigInteger PublicExponent + { + get { return e.Value; } + } + + public BigInteger Modulus + { + get { return n.Value; } + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObjects(n, e); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs.meta new file mode 100644 index 00000000..79ec0373 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5af2d3c3d0700d74bbf0dd31e59dfe95 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaPublicBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs new file mode 100644 index 00000000..3db66df7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs @@ -0,0 +1,119 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Base class for an RSA secret (or priate) key. + public class RsaSecretBcpgKey + : BcpgObject, IBcpgKey + { + private readonly MPInteger d, p, q, u; + private readonly BigInteger expP, expQ, crt; + + public RsaSecretBcpgKey( + BcpgInputStream bcpgIn) + { + this.d = new MPInteger(bcpgIn); + this.p = new MPInteger(bcpgIn); + this.q = new MPInteger(bcpgIn); + this.u = new MPInteger(bcpgIn); + + this.expP = d.Value.Remainder(p.Value.Subtract(BigInteger.One)); + this.expQ = d.Value.Remainder(q.Value.Subtract(BigInteger.One)); + this.crt = BigIntegers.ModOddInverse(p.Value, q.Value); + } + + public RsaSecretBcpgKey( + BigInteger d, + BigInteger p, + BigInteger q) + { + // PGP requires (p < q) + int cmp = p.CompareTo(q); + if (cmp >= 0) + { + if (cmp == 0) + throw new ArgumentException("p and q cannot be equal"); + + BigInteger tmp = p; + p = q; + q = tmp; + } + + this.d = new MPInteger(d); + this.p = new MPInteger(p); + this.q = new MPInteger(q); + this.u = new MPInteger(BigIntegers.ModOddInverse(q, p)); + + this.expP = d.Remainder(p.Subtract(BigInteger.One)); + this.expQ = d.Remainder(q.Subtract(BigInteger.One)); + this.crt = BigIntegers.ModOddInverse(p, q); + } + + public BigInteger Modulus + { + get { return p.Value.Multiply(q.Value); } + } + + public BigInteger PrivateExponent + { + get { return d.Value; } + } + + public BigInteger PrimeP + { + get { return p.Value; } + } + + public BigInteger PrimeQ + { + get { return q.Value; } + } + + public BigInteger PrimeExponentP + { + get { return expP; } + } + + public BigInteger PrimeExponentQ + { + get { return expQ; } + } + + public BigInteger CrtCoefficient + { + get { return crt; } + } + + /// The format, as a string, always "PGP". + public string Format + { + get { return "PGP"; } + } + + /// Return the standard PGP encoding of the key. + public override byte[] GetEncoded() + { + try + { + return base.GetEncoded(); + } + catch (Exception) + { + return null; + } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteObjects(d, p, q, u); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs.meta new file mode 100644 index 00000000..1bd0c64f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 663613503a8b47f4aa45ad4be5ad1274 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/RsaSecretBcpgKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs new file mode 100644 index 00000000..a9c0816a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs @@ -0,0 +1,147 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// The string to key specifier class. + public class S2k + : BcpgObject + { + private const int ExpBias = 6; + + public const int Simple = 0; + public const int Salted = 1; + public const int SaltedAndIterated = 3; + public const int GnuDummyS2K = 101; + public const int GnuProtectionModeNoPrivateKey = 1; + public const int GnuProtectionModeDivertToCard = 2; + + internal int type; + internal HashAlgorithmTag algorithm; + internal byte[] iv; + internal int itCount = -1; + internal int protectionMode = -1; + + internal S2k( + Stream inStr) + { + type = inStr.ReadByte(); + algorithm = (HashAlgorithmTag) inStr.ReadByte(); + + // + // if this happens we have a dummy-S2k packet. + // + if (type != GnuDummyS2K) + { + if (type != 0) + { + iv = new byte[8]; + if (Streams.ReadFully(inStr, iv, 0, iv.Length) < iv.Length) + throw new EndOfStreamException(); + + if (type == 3) + { + itCount = inStr.ReadByte(); + } + } + } + else + { + inStr.ReadByte(); // G + inStr.ReadByte(); // N + inStr.ReadByte(); // U + protectionMode = inStr.ReadByte(); // protection mode + } + } + + public S2k( + HashAlgorithmTag algorithm) + { + this.type = 0; + this.algorithm = algorithm; + } + + public S2k( + HashAlgorithmTag algorithm, + byte[] iv) + { + this.type = 1; + this.algorithm = algorithm; + this.iv = iv; + } + + public S2k( + HashAlgorithmTag algorithm, + byte[] iv, + int itCount) + { + this.type = 3; + this.algorithm = algorithm; + this.iv = iv; + this.itCount = itCount; + } + + public virtual int Type + { + get { return type; } + } + + /// The hash algorithm. + public virtual HashAlgorithmTag HashAlgorithm + { + get { return algorithm; } + } + + /// The IV for the key generation algorithm. + public virtual byte[] GetIV() + { + return Arrays.Clone(iv); + } + + /// The iteration count + public virtual long IterationCount + { + get { return (16 + (itCount & 15)) << ((itCount >> 4) + ExpBias); } + } + + /// The protection mode - only if GnuDummyS2K + public virtual int ProtectionMode + { + get { return protectionMode; } + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WriteByte((byte) type); + bcpgOut.WriteByte((byte) algorithm); + + if (type != GnuDummyS2K) + { + if (type != 0) + { + bcpgOut.Write(iv); + } + + if (type == 3) + { + bcpgOut.WriteByte((byte) itCount); + } + } + else + { + bcpgOut.WriteByte((byte) 'G'); + bcpgOut.WriteByte((byte) 'N'); + bcpgOut.WriteByte((byte) 'U'); + bcpgOut.WriteByte((byte) protectionMode); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs.meta new file mode 100644 index 00000000..d71a03bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5622a8ea224edd149aa89c841326803c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/S2k.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs new file mode 100644 index 00000000..bcd2c341 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a PGP secret key. + public class SecretKeyPacket + : ContainedPacket //, PublicKeyAlgorithmTag + { + public const int UsageNone = 0x00; + public const int UsageChecksum = 0xff; + public const int UsageSha1 = 0xfe; + + private PublicKeyPacket pubKeyPacket; + private readonly byte[] secKeyData; + private int s2kUsage; + private SymmetricKeyAlgorithmTag encAlgorithm; + private S2k s2k; + private byte[] iv; + + internal SecretKeyPacket( + BcpgInputStream bcpgIn) + { + if (this is SecretSubkeyPacket) + { + pubKeyPacket = new PublicSubkeyPacket(bcpgIn); + } + else + { + pubKeyPacket = new PublicKeyPacket(bcpgIn); + } + + s2kUsage = bcpgIn.ReadByte(); + + if (s2kUsage == UsageChecksum || s2kUsage == UsageSha1) + { + encAlgorithm = (SymmetricKeyAlgorithmTag) bcpgIn.ReadByte(); + s2k = new S2k(bcpgIn); + } + else + { + encAlgorithm = (SymmetricKeyAlgorithmTag) s2kUsage; + } + + if (!(s2k != null && s2k.Type == S2k.GnuDummyS2K && s2k.ProtectionMode == 0x01)) + { + if (s2kUsage != 0) + { + if (((int) encAlgorithm) < 7) + { + iv = new byte[8]; + } + else + { + iv = new byte[16]; + } + bcpgIn.ReadFully(iv); + } + } + + secKeyData = bcpgIn.ReadAll(); + } + + public SecretKeyPacket( + PublicKeyPacket pubKeyPacket, + SymmetricKeyAlgorithmTag encAlgorithm, + S2k s2k, + byte[] iv, + byte[] secKeyData) + { + this.pubKeyPacket = pubKeyPacket; + this.encAlgorithm = encAlgorithm; + + if (encAlgorithm != SymmetricKeyAlgorithmTag.Null) + { + this.s2kUsage = UsageChecksum; + } + else + { + this.s2kUsage = UsageNone; + } + + this.s2k = s2k; + this.iv = Arrays.Clone(iv); + this.secKeyData = secKeyData; + } + + public SecretKeyPacket( + PublicKeyPacket pubKeyPacket, + SymmetricKeyAlgorithmTag encAlgorithm, + int s2kUsage, + S2k s2k, + byte[] iv, + byte[] secKeyData) + { + this.pubKeyPacket = pubKeyPacket; + this.encAlgorithm = encAlgorithm; + this.s2kUsage = s2kUsage; + this.s2k = s2k; + this.iv = Arrays.Clone(iv); + this.secKeyData = secKeyData; + } + + public SymmetricKeyAlgorithmTag EncAlgorithm + { + get { return encAlgorithm; } + } + + public int S2kUsage + { + get { return s2kUsage; } + } + + public byte[] GetIV() + { + return Arrays.Clone(iv); + } + + public S2k S2k + { + get { return s2k; } + } + + public PublicKeyPacket PublicKeyPacket + { + get { return pubKeyPacket; } + } + + public byte[] GetSecretKeyData() + { + return secKeyData; + } + + public byte[] GetEncodedContents() + { + MemoryStream bOut = new MemoryStream(); + BcpgOutputStream pOut = new BcpgOutputStream(bOut); + + pOut.Write(pubKeyPacket.GetEncodedContents()); + + pOut.WriteByte((byte) s2kUsage); + + if (s2kUsage == UsageChecksum || s2kUsage == UsageSha1) + { + pOut.WriteByte((byte) encAlgorithm); + pOut.WriteObject(s2k); + } + + if (iv != null) + { + pOut.Write(iv); + } + + if (secKeyData != null && secKeyData.Length > 0) + { + pOut.Write(secKeyData); + } + + return bOut.ToArray(); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.SecretKey, GetEncodedContents(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs.meta new file mode 100644 index 00000000..01d2dccb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c1ae9ad4dbd8e4c419c88ce46a7f58a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretKeyPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs new file mode 100644 index 00000000..0077d35c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic packet for a PGP secret key. + public class SecretSubkeyPacket + : SecretKeyPacket + { + internal SecretSubkeyPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + } + + public SecretSubkeyPacket( + PublicKeyPacket pubKeyPacket, + SymmetricKeyAlgorithmTag encAlgorithm, + S2k s2k, + byte[] iv, + byte[] secKeyData) + : base(pubKeyPacket, encAlgorithm, s2k, iv, secKeyData) + { + } + + public SecretSubkeyPacket( + PublicKeyPacket pubKeyPacket, + SymmetricKeyAlgorithmTag encAlgorithm, + int s2kUsage, + S2k s2k, + byte[] iv, + byte[] secKeyData) + : base(pubKeyPacket, encAlgorithm, s2kUsage, s2k, iv, secKeyData) + { + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.SecretSubkey, GetEncodedContents(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs.meta new file mode 100644 index 00000000..af1e1410 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d6c5dd2f6ba2b54ca9ef9eaf6938d9b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SecretSubkeyPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs new file mode 100644 index 00000000..c8008011 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs @@ -0,0 +1,466 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Generic signature packet. + public class SignaturePacket + : ContainedPacket + { + private int version; + private int signatureType; + private long creationTime; + private long keyId; + private PublicKeyAlgorithmTag keyAlgorithm; + private HashAlgorithmTag hashAlgorithm; + private MPInteger[] signature; + private byte[] fingerprint; + private SignatureSubpacket[] hashedData; + private SignatureSubpacket[] unhashedData; + private byte[] signatureEncoding; + + internal SignaturePacket( + BcpgInputStream bcpgIn) + { + version = bcpgIn.ReadByte(); + + if (version == 3 || version == 2) + { +// int l = + bcpgIn.ReadByte(); + + signatureType = bcpgIn.ReadByte(); + creationTime = (((long)bcpgIn.ReadByte() << 24) | ((long)bcpgIn.ReadByte() << 16) + | ((long)bcpgIn.ReadByte() << 8) | (uint)bcpgIn.ReadByte()) * 1000L; + + keyId |= (long)bcpgIn.ReadByte() << 56; + keyId |= (long)bcpgIn.ReadByte() << 48; + keyId |= (long)bcpgIn.ReadByte() << 40; + keyId |= (long)bcpgIn.ReadByte() << 32; + keyId |= (long)bcpgIn.ReadByte() << 24; + keyId |= (long)bcpgIn.ReadByte() << 16; + keyId |= (long)bcpgIn.ReadByte() << 8; + keyId |= (uint)bcpgIn.ReadByte(); + + keyAlgorithm = (PublicKeyAlgorithmTag) bcpgIn.ReadByte(); + hashAlgorithm = (HashAlgorithmTag) bcpgIn.ReadByte(); + } + else if (version == 4) + { + signatureType = bcpgIn.ReadByte(); + keyAlgorithm = (PublicKeyAlgorithmTag) bcpgIn.ReadByte(); + hashAlgorithm = (HashAlgorithmTag) bcpgIn.ReadByte(); + + int hashedLength = (bcpgIn.ReadByte() << 8) | bcpgIn.ReadByte(); + byte[] hashed = new byte[hashedLength]; + + bcpgIn.ReadFully(hashed); + + // + // read the signature sub packet data. + // + SignatureSubpacketsParser sIn = new SignatureSubpacketsParser( + new MemoryStream(hashed, false)); + + var v = new List(); + + SignatureSubpacket sub; + while ((sub = sIn.ReadPacket()) != null) + { + v.Add(sub); + } + + hashedData = v.ToArray(); + + foreach (var p in hashedData) + { + if (p is IssuerKeyId issuerKeyId) + { + keyId = issuerKeyId.KeyId; + } + else if (p is SignatureCreationTime sigCreationTime) + { + creationTime = DateTimeUtilities.DateTimeToUnixMs(sigCreationTime.GetTime()); + } + } + + int unhashedLength = (bcpgIn.ReadByte() << 8) | bcpgIn.ReadByte(); + byte[] unhashed = new byte[unhashedLength]; + + bcpgIn.ReadFully(unhashed); + + sIn = new SignatureSubpacketsParser(new MemoryStream(unhashed, false)); + + v.Clear(); + + while ((sub = sIn.ReadPacket()) != null) + { + v.Add(sub); + } + + unhashedData = v.ToArray(); + + foreach (var p in unhashedData) + { + if (p is IssuerKeyId issuerKeyId) + { + keyId = issuerKeyId.KeyId; + } + } + } + else + { + Streams.Drain(bcpgIn); + + throw new UnsupportedPacketVersionException("unsupported version: " + version); + } + + fingerprint = new byte[2]; + bcpgIn.ReadFully(fingerprint); + + switch (keyAlgorithm) + { + case PublicKeyAlgorithmTag.RsaGeneral: + case PublicKeyAlgorithmTag.RsaSign: + MPInteger v = new MPInteger(bcpgIn); + signature = new MPInteger[1]{ v }; + break; + case PublicKeyAlgorithmTag.Dsa: + MPInteger r = new MPInteger(bcpgIn); + MPInteger s = new MPInteger(bcpgIn); + signature = new MPInteger[2]{ r, s }; + break; + case PublicKeyAlgorithmTag.ElGamalEncrypt: // yep, this really does happen sometimes. + case PublicKeyAlgorithmTag.ElGamalGeneral: + MPInteger p = new MPInteger(bcpgIn); + MPInteger g = new MPInteger(bcpgIn); + MPInteger y = new MPInteger(bcpgIn); + signature = new MPInteger[3]{ p, g, y }; + break; + case PublicKeyAlgorithmTag.ECDsa: + case PublicKeyAlgorithmTag.EdDsa: + MPInteger ecR = new MPInteger(bcpgIn); + MPInteger ecS = new MPInteger(bcpgIn); + signature = new MPInteger[2]{ ecR, ecS }; + break; + default: + if (keyAlgorithm < PublicKeyAlgorithmTag.Experimental_1 || keyAlgorithm > PublicKeyAlgorithmTag.Experimental_11) + throw new IOException("unknown signature key algorithm: " + keyAlgorithm); + + signature = null; + MemoryStream bOut = new MemoryStream(); + int ch; + while ((ch = bcpgIn.ReadByte()) >= 0) + { + bOut.WriteByte((byte) ch); + } + signatureEncoding = bOut.ToArray(); + break; + } + } + + /** + * Generate a version 4 signature packet. + * + * @param signatureType + * @param keyAlgorithm + * @param hashAlgorithm + * @param hashedData + * @param unhashedData + * @param fingerprint + * @param signature + */ + public SignaturePacket( + int signatureType, + long keyId, + PublicKeyAlgorithmTag keyAlgorithm, + HashAlgorithmTag hashAlgorithm, + SignatureSubpacket[] hashedData, + SignatureSubpacket[] unhashedData, + byte[] fingerprint, + MPInteger[] signature) + : this(4, signatureType, keyId, keyAlgorithm, hashAlgorithm, hashedData, unhashedData, fingerprint, signature) + { + } + + /** + * Generate a version 2/3 signature packet. + * + * @param signatureType + * @param keyAlgorithm + * @param hashAlgorithm + * @param fingerprint + * @param signature + */ + public SignaturePacket( + int version, + int signatureType, + long keyId, + PublicKeyAlgorithmTag keyAlgorithm, + HashAlgorithmTag hashAlgorithm, + long creationTime, + byte[] fingerprint, + MPInteger[] signature) + : this(version, signatureType, keyId, keyAlgorithm, hashAlgorithm, null, null, fingerprint, signature) + { + this.creationTime = creationTime; + } + + public SignaturePacket( + int version, + int signatureType, + long keyId, + PublicKeyAlgorithmTag keyAlgorithm, + HashAlgorithmTag hashAlgorithm, + SignatureSubpacket[] hashedData, + SignatureSubpacket[] unhashedData, + byte[] fingerprint, + MPInteger[] signature) + { + this.version = version; + this.signatureType = signatureType; + this.keyId = keyId; + this.keyAlgorithm = keyAlgorithm; + this.hashAlgorithm = hashAlgorithm; + this.hashedData = hashedData; + this.unhashedData = unhashedData; + this.fingerprint = fingerprint; + this.signature = signature; + + if (hashedData != null) + { + SetCreationTime(); + } + } + + public int Version + { + get { return version; } + } + + public int SignatureType + { + get { return signatureType; } + } + + /** + * return the keyId + * @return the keyId that created the signature. + */ + public long KeyId + { + get { return keyId; } + } + + /** + * return the signature trailer that must be included with the data + * to reconstruct the signature + * + * @return byte[] + */ + public byte[] GetSignatureTrailer() + { + if (version == 3) + { + long time = creationTime / 1000L; + + byte[] trailer = new byte[5]; + trailer[0] = (byte)signatureType; + trailer[1] = (byte)(time >> 24); + trailer[2] = (byte)(time >> 16); + trailer[3] = (byte)(time >> 8); + trailer[4] = (byte)(time ); + return trailer; + } + + MemoryStream sOut = new MemoryStream(); + + sOut.WriteByte((byte)Version); + sOut.WriteByte((byte)SignatureType); + sOut.WriteByte((byte)KeyAlgorithm); + sOut.WriteByte((byte)HashAlgorithm); + + // Mark position an reserve two bytes for length + long lengthPosition = sOut.Position; + sOut.WriteByte(0x00); + sOut.WriteByte(0x00); + + SignatureSubpacket[] hashed = GetHashedSubPackets(); + for (int i = 0; i != hashed.Length; i++) + { + hashed[i].Encode(sOut); + } + + ushort dataLength = Convert.ToUInt16(sOut.Position - lengthPosition - 2); + uint hDataLength = Convert.ToUInt32(sOut.Position); + + sOut.WriteByte((byte)Version); + sOut.WriteByte(0xff); + sOut.WriteByte((byte)(hDataLength >> 24)); + sOut.WriteByte((byte)(hDataLength >> 16)); + sOut.WriteByte((byte)(hDataLength >> 8)); + sOut.WriteByte((byte)(hDataLength )); + + // Reset position and fill in length + sOut.Position = lengthPosition; + sOut.WriteByte((byte)(dataLength >> 8)); + sOut.WriteByte((byte)(dataLength )); + + return sOut.ToArray(); + } + + public PublicKeyAlgorithmTag KeyAlgorithm + { + get { return keyAlgorithm; } + } + + public HashAlgorithmTag HashAlgorithm + { + get { return hashAlgorithm; } + } + + /** + * return the signature as a set of integers - note this is normalised to be the + * ASN.1 encoding of what appears in the signature packet. + */ + public MPInteger[] GetSignature() + { + return signature; + } + + /** + * Return the byte encoding of the signature section. + * @return uninterpreted signature bytes. + */ + public byte[] GetSignatureBytes() + { + if (signatureEncoding != null) + { + return (byte[]) signatureEncoding.Clone(); + } + + MemoryStream bOut = new MemoryStream(); + BcpgOutputStream bcOut = new BcpgOutputStream(bOut); + + foreach (MPInteger sigObj in signature) + { + try + { + bcOut.WriteObject(sigObj); + } + catch (IOException e) + { + throw new Exception("internal error: " + e); + } + } + + return bOut.ToArray(); + } + + public SignatureSubpacket[] GetHashedSubPackets() + { + return hashedData; + } + + public SignatureSubpacket[] GetUnhashedSubPackets() + { + return unhashedData; + } + + /// Return the creation time in milliseconds since 1 Jan., 1970 UTC. + public long CreationTime + { + get { return creationTime; } + } + + public override void Encode(BcpgOutputStream bcpgOut) + { + MemoryStream bOut = new MemoryStream(); + using (var pOut = new BcpgOutputStream(bOut)) + { + pOut.WriteByte((byte)version); + + if (version == 3 || version == 2) + { + byte nextBlockLength = 5; + pOut.Write(nextBlockLength, (byte)signatureType); + pOut.WriteInt((int)(creationTime / 1000L)); + pOut.WriteLong(keyId); + pOut.Write((byte)keyAlgorithm, (byte)hashAlgorithm); + } + else if (version == 4) + { + pOut.Write((byte)signatureType, (byte)keyAlgorithm, (byte)hashAlgorithm); + EncodeLengthAndData(pOut, GetEncodedSubpackets(hashedData)); + EncodeLengthAndData(pOut, GetEncodedSubpackets(unhashedData)); + } + else + { + throw new IOException("unknown version: " + version); + } + + pOut.Write(fingerprint); + + if (signature != null) + { + pOut.WriteObjects(signature); + } + else + { + pOut.Write(signatureEncoding); + } + } + + bcpgOut.WritePacket(PacketTag.Signature, bOut.ToArray(), true); + } + + private static void EncodeLengthAndData( + BcpgOutputStream pOut, + byte[] data) + { + pOut.WriteShort((short) data.Length); + pOut.Write(data); + } + + private static byte[] GetEncodedSubpackets( + SignatureSubpacket[] ps) + { + MemoryStream sOut = new MemoryStream(); + + foreach (SignatureSubpacket p in ps) + { + p.Encode(sOut); + } + + return sOut.ToArray(); + } + + private void SetCreationTime() + { + foreach (SignatureSubpacket p in hashedData) + { + if (p is SignatureCreationTime signatureCreationTime) + { + creationTime = DateTimeUtilities.DateTimeToUnixMs(signatureCreationTime.GetTime()); + break; + } + } + } + + public static SignaturePacket FromByteArray(byte[] data) + { + BcpgInputStream input = BcpgInputStream.Wrap(new MemoryStream(data)); + + return new SignaturePacket(input); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs.meta new file mode 100644 index 00000000..efeec8bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 01fea7fe290c18b44a44318b802b517e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignaturePacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs new file mode 100644 index 00000000..a610e81a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs @@ -0,0 +1,119 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic type for a PGP Signature sub-packet. + public class SignatureSubpacket + { + private readonly SignatureSubpacketTag type; + private readonly bool critical; + private readonly bool isLongLength; + internal byte[] data; + + protected internal SignatureSubpacket( + SignatureSubpacketTag type, + bool critical, + bool isLongLength, + byte[] data) + { + this.type = type; + this.critical = critical; + this.isLongLength = isLongLength; + this.data = data; + } + + public SignatureSubpacketTag SubpacketType + { + get { return type; } + } + + public bool IsCritical() + { + return critical; + } + + public bool IsLongLength() + { + return isLongLength; + } + + /// Return the generic data making up the packet. + public byte[] GetData() + { + return (byte[]) data.Clone(); + } + + public void Encode( + Stream os) + { + int bodyLen = data.Length + 1; + + if (isLongLength) + { + os.WriteByte(0xff); + os.WriteByte((byte)(bodyLen >> 24)); + os.WriteByte((byte)(bodyLen >> 16)); + os.WriteByte((byte)(bodyLen >> 8)); + os.WriteByte((byte)bodyLen); + } + else + { + if (bodyLen < 192) + { + os.WriteByte((byte)bodyLen); + } + else if (bodyLen <= 8383) + { + bodyLen -= 192; + + os.WriteByte((byte)(((bodyLen >> 8) & 0xff) + 192)); + os.WriteByte((byte)bodyLen); + } + else + { + os.WriteByte(0xff); + os.WriteByte((byte)(bodyLen >> 24)); + os.WriteByte((byte)(bodyLen >> 16)); + os.WriteByte((byte)(bodyLen >> 8)); + os.WriteByte((byte)bodyLen); + } + } + + if (critical) + { + os.WriteByte((byte)(0x80 | (int) type)); + } + else + { + os.WriteByte((byte) type); + } + + os.Write(data, 0, data.Length); + } + + public override int GetHashCode() + { + return (critical ? 1 : 0) + 7 * (int)type + 49 * Arrays.GetHashCode(data); + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + + SignatureSubpacket other = obj as SignatureSubpacket; + if (null == other) + return false; + + return this.type == other.type + && this.critical == other.critical + && Arrays.AreEqual(this.data, other.data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs.meta new file mode 100644 index 00000000..8131e163 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d4ca6b5e61584a49925b22db4611d5f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs new file mode 100644 index 00000000..260f5a98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic PGP signature sub-packet tag types. + */ + public enum SignatureSubpacketTag + { + CreationTime = 2, // signature creation time + ExpireTime = 3, // signature expiration time + Exportable = 4, // exportable certification + TrustSig = 5, // trust signature + RegExp = 6, // regular expression + Revocable = 7, // revocable + KeyExpireTime = 9, // key expiration time + Placeholder = 10, // placeholder for backward compatibility + PreferredSymmetricAlgorithms = 11, // preferred symmetric algorithms + RevocationKey = 12, // revocation key + IssuerKeyId = 16, // issuer key ID + NotationData = 20, // notation data + PreferredHashAlgorithms = 21, // preferred hash algorithms + PreferredCompressionAlgorithms = 22, // preferred compression algorithms + KeyServerPreferences = 23, // key server preferences + PreferredKeyServer = 24, // preferred key server + PrimaryUserId = 25, // primary user id + PolicyUrl = 26, // policy URL + KeyFlags = 27, // key flags + SignerUserId = 28, // signer's user id + RevocationReason = 29, // reason for revocation + Features = 30, // features + SignatureTarget = 31, // signature target + EmbeddedSignature = 32 // embedded signature + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs.meta new file mode 100644 index 00000000..2fca2831 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4761e1348659584395f45b598fb12a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs new file mode 100644 index 00000000..c2ac7451 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs @@ -0,0 +1,139 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * reader for signature sub-packets + */ + public class SignatureSubpacketsParser + { + private readonly Stream input; + + public SignatureSubpacketsParser( + Stream input) + { + this.input = input; + } + + public SignatureSubpacket ReadPacket() + { + int l = input.ReadByte(); + if (l < 0) + return null; + + int bodyLen = 0; + bool isLongLength = false; + + if (l < 192) + { + bodyLen = l; + } + else if (l <= 223) + { + bodyLen = ((l - 192) << 8) + (input.ReadByte()) + 192; + } + else if (l == 255) + { + isLongLength = true; + bodyLen = (input.ReadByte() << 24) | (input.ReadByte() << 16) + | (input.ReadByte() << 8) | input.ReadByte(); + } + else + { + throw new IOException("unexpected length header"); + } + + int tag = input.ReadByte(); + if (tag < 0) + throw new EndOfStreamException("unexpected EOF reading signature sub packet"); + + if (bodyLen <= 0) + throw new EndOfStreamException("out of range data found in signature sub packet"); + + byte[] data = new byte[bodyLen - 1]; + + // + // this may seem a bit strange but it turns out some applications miscode the length + // in fixed length fields, so we check the length we do get, only throwing an exception if + // we really cannot continue + // + int bytesRead = Streams.ReadFully(input, data); + + bool isCritical = ((tag & 0x80) != 0); + SignatureSubpacketTag type = (SignatureSubpacketTag)(tag & 0x7f); + + if (bytesRead != data.Length) + { + switch (type) + { + case SignatureSubpacketTag.CreationTime: + data = CheckData(data, 4, bytesRead, "Signature Creation Time"); + break; + case SignatureSubpacketTag.IssuerKeyId: + data = CheckData(data, 8, bytesRead, "Issuer"); + break; + case SignatureSubpacketTag.KeyExpireTime: + data = CheckData(data, 4, bytesRead, "Signature Key Expiration Time"); + break; + case SignatureSubpacketTag.ExpireTime: + data = CheckData(data, 4, bytesRead, "Signature Expiration Time"); + break; + default: + throw new EndOfStreamException("truncated subpacket data."); + } + } + + switch (type) + { + case SignatureSubpacketTag.CreationTime: + return new SignatureCreationTime(isCritical, isLongLength, data); + case SignatureSubpacketTag.KeyExpireTime: + return new KeyExpirationTime(isCritical, isLongLength, data); + case SignatureSubpacketTag.ExpireTime: + return new SignatureExpirationTime(isCritical, isLongLength, data); + case SignatureSubpacketTag.Revocable: + return new Revocable(isCritical, isLongLength, data); + case SignatureSubpacketTag.Exportable: + return new Exportable(isCritical, isLongLength, data); + case SignatureSubpacketTag.IssuerKeyId: + return new IssuerKeyId(isCritical, isLongLength, data); + case SignatureSubpacketTag.TrustSig: + return new TrustSignature(isCritical, isLongLength, data); + case SignatureSubpacketTag.PreferredCompressionAlgorithms: + case SignatureSubpacketTag.PreferredHashAlgorithms: + case SignatureSubpacketTag.PreferredSymmetricAlgorithms: + return new PreferredAlgorithms(type, isCritical, isLongLength, data); + case SignatureSubpacketTag.KeyFlags: + return new KeyFlags(isCritical, isLongLength, data); + case SignatureSubpacketTag.PrimaryUserId: + return new PrimaryUserId(isCritical, isLongLength, data); + case SignatureSubpacketTag.SignerUserId: + return new SignerUserId(isCritical, isLongLength, data); + case SignatureSubpacketTag.NotationData: + return new NotationData(isCritical, isLongLength, data); + case SignatureSubpacketTag.RevocationReason: + return new RevocationReason(isCritical, isLongLength, data); + case SignatureSubpacketTag.RevocationKey: + return new RevocationKey(isCritical, isLongLength, data); + } + return new SignatureSubpacket(type, isCritical, isLongLength, data); + } + + private byte[] CheckData(byte[] data, int expected, int bytesRead, string name) + { + if (bytesRead != expected) + throw new EndOfStreamException("truncated " + name + " subpacket data."); + + return Arrays.CopyOfRange(data, 0, expected); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs.meta new file mode 100644 index 00000000..37e50282 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1bb70575f3b10d64a96f7e3ba7c0a18b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SignatureSubpacketsReader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs new file mode 100644 index 00000000..307d6ca0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic type for a symmetric key encrypted packet. + public class SymmetricEncDataPacket + : InputStreamPacket + { + public SymmetricEncDataPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs.meta new file mode 100644 index 00000000..c5aa6941 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a53de8170e2074e42a01b497d0930150 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncDataPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs new file mode 100644 index 00000000..874a4a74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public class SymmetricEncIntegrityPacket + : InputStreamPacket + { + internal readonly int version; + + internal SymmetricEncIntegrityPacket( + BcpgInputStream bcpgIn) + : base(bcpgIn) + { + version = bcpgIn.ReadByte(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs.meta new file mode 100644 index 00000000..f5b64bfd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1dee308a32afd3045bb9d8f6d67fcac2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricEncIntegrityPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs new file mode 100644 index 00000000..2c121be1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic tags for symmetric key algorithms + */ + public enum SymmetricKeyAlgorithmTag + { + Null = 0, // Plaintext or unencrypted data + Idea = 1, // IDEA [IDEA] + TripleDes = 2, // Triple-DES (DES-EDE, as per spec -168 bit key derived from 192) + Cast5 = 3, // Cast5 (128 bit key, as per RFC 2144) + Blowfish = 4, // Blowfish (128 bit key, 16 rounds) [Blowfish] + Safer = 5, // Safer-SK128 (13 rounds) [Safer] + Des = 6, // Reserved for DES/SK + Aes128 = 7, // Reserved for AES with 128-bit key + Aes192 = 8, // Reserved for AES with 192-bit key + Aes256 = 9, // Reserved for AES with 256-bit key + Twofish = 10, // Reserved for Twofish + Camellia128 = 11, // Reserved for AES with 128-bit key + Camellia192 = 12, // Reserved for AES with 192-bit key + Camellia256 = 13 // Reserved for AES with 256-bit key + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs.meta new file mode 100644 index 00000000..7b8264fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 559ac8492fe031947b8d156f323da164 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyAlgorithmTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs new file mode 100644 index 00000000..76deae3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic type for a symmetric encrypted session key packet + */ + public class SymmetricKeyEncSessionPacket + : ContainedPacket + { + private int version; + private SymmetricKeyAlgorithmTag encAlgorithm; + private S2k s2k; + private readonly byte[] secKeyData; + + public SymmetricKeyEncSessionPacket( + BcpgInputStream bcpgIn) + { + version = bcpgIn.ReadByte(); + encAlgorithm = (SymmetricKeyAlgorithmTag) bcpgIn.ReadByte(); + + s2k = new S2k(bcpgIn); + + secKeyData = bcpgIn.ReadAll(); + } + + public SymmetricKeyEncSessionPacket( + SymmetricKeyAlgorithmTag encAlgorithm, + S2k s2k, + byte[] secKeyData) + { + this.version = 4; + this.encAlgorithm = encAlgorithm; + this.s2k = s2k; + this.secKeyData = secKeyData; + } + + /** + * @return int + */ + public SymmetricKeyAlgorithmTag EncAlgorithm + { + get { return encAlgorithm; } + } + + /** + * @return S2k + */ + public S2k S2k + { + get { return s2k; } + } + + /** + * @return byte[] + */ + public byte[] GetSecKeyData() + { + return secKeyData; + } + + /** + * @return int + */ + public int Version + { + get { return version; } + } + + public override void Encode(BcpgOutputStream bcpgOut) + { + MemoryStream bOut = new MemoryStream(); + using (var pOut = new BcpgOutputStream(bOut)) + { + pOut.Write((byte)version, (byte)encAlgorithm); + pOut.WriteObject(s2k); + + if (secKeyData != null && secKeyData.Length > 0) + { + pOut.Write(secKeyData); + } + } + + bcpgOut.WritePacket(PacketTag.SymmetricKeyEncryptedSessionKey, bOut.ToArray(), true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs.meta new file mode 100644 index 00000000..a5e051c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3eda3480061c500408c28492110bf9f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/SymmetricKeyEncSessionPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs new file mode 100644 index 00000000..43f04bd0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// Basic type for a trust packet. + public class TrustPacket + : ContainedPacket + { + private readonly byte[] levelAndTrustAmount; + + public TrustPacket( + BcpgInputStream bcpgIn) + { + MemoryStream bOut = new MemoryStream(); + + int ch; + while ((ch = bcpgIn.ReadByte()) >= 0) + { + bOut.WriteByte((byte) ch); + } + + levelAndTrustAmount = bOut.ToArray(); + } + + public TrustPacket( + int trustCode) + { + this.levelAndTrustAmount = new byte[]{ (byte) trustCode }; + } + + public byte[] GetLevelAndTrustAmount() + { + return (byte[]) levelAndTrustAmount.Clone(); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.Trust, levelAndTrustAmount, true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs.meta new file mode 100644 index 00000000..aa0d5ce8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35d75de07bce12c4dbaaccfa0286cea2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/TrustPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs new file mode 100644 index 00000000..f1f3bf21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + [Serializable] + public class UnsupportedPacketVersionException + : Exception + { + public UnsupportedPacketVersionException() + : base() + { + } + + public UnsupportedPacketVersionException(string message) + : base(message) + { + } + + public UnsupportedPacketVersionException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected UnsupportedPacketVersionException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs.meta new file mode 100644 index 00000000..8ae6a266 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a7673f24a0a7b96449cbed2749525aa0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UnsupportedPacketVersionException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs new file mode 100644 index 00000000..829dcbbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic type for a user attribute packet. + */ + public class UserAttributePacket + : ContainedPacket + { + private readonly UserAttributeSubpacket[] subpackets; + + public UserAttributePacket( + BcpgInputStream bcpgIn) + { + UserAttributeSubpacketsParser sIn = new UserAttributeSubpacketsParser(bcpgIn); + UserAttributeSubpacket sub; + + var v = new List(); + while ((sub = sIn.ReadPacket()) != null) + { + v.Add(sub); + } + + subpackets = v.ToArray(); + } + + public UserAttributePacket( + UserAttributeSubpacket[] subpackets) + { + this.subpackets = subpackets; + } + + public UserAttributeSubpacket[] GetSubpackets() + { + return subpackets; + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + MemoryStream bOut = new MemoryStream(); + + for (int i = 0; i != subpackets.Length; i++) + { + subpackets[i].Encode(bOut); + } + + bcpgOut.WritePacket(PacketTag.UserAttribute, bOut.ToArray(), false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs.meta new file mode 100644 index 00000000..9bff346a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f196fde1153e6ce4d9ed71483d5badb1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributePacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs new file mode 100644 index 00000000..cc14b632 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic type for a user attribute sub-packet. + */ + public class UserAttributeSubpacket + { + internal readonly UserAttributeSubpacketTag type; + private readonly bool longLength; // we preserve this as not everyone encodes length properly. + protected readonly byte[] data; + + protected internal UserAttributeSubpacket(UserAttributeSubpacketTag type, byte[] data) + : this(type, false, data) + { + } + + protected internal UserAttributeSubpacket(UserAttributeSubpacketTag type, bool forceLongLength, byte[] data) + { + this.type = type; + this.longLength = forceLongLength; + this.data = data; + } + + public virtual UserAttributeSubpacketTag SubpacketType + { + get { return type; } + } + + /** + * return the generic data making up the packet. + */ + public virtual byte[] GetData() + { + return data; + } + + public virtual void Encode(Stream os) + { + int bodyLen = data.Length + 1; + + if (bodyLen < 192 && !longLength) + { + os.WriteByte((byte)bodyLen); + } + else if (bodyLen <= 8383 && !longLength) + { + bodyLen -= 192; + + os.WriteByte((byte)(((bodyLen >> 8) & 0xff) + 192)); + os.WriteByte((byte)bodyLen); + } + else + { + os.WriteByte(0xff); + os.WriteByte((byte)(bodyLen >> 24)); + os.WriteByte((byte)(bodyLen >> 16)); + os.WriteByte((byte)(bodyLen >> 8)); + os.WriteByte((byte)bodyLen); + } + + os.WriteByte((byte) type); + os.Write(data, 0, data.Length); + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + UserAttributeSubpacket other = obj as UserAttributeSubpacket; + + if (other == null) + return false; + + return type == other.type + && Arrays.AreEqual(data, other.data); + } + + public override int GetHashCode() + { + return type.GetHashCode() ^ Arrays.GetHashCode(data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs.meta new file mode 100644 index 00000000..b6bd0b80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05f1693521fe2e9478a664609ddc18d3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs new file mode 100644 index 00000000..0b084f99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic PGP user attribute sub-packet tag types. + */ + public enum UserAttributeSubpacketTag + { + ImageAttribute = 1 + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs.meta new file mode 100644 index 00000000..f2e6517f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d123c060383f9cc48af34adcdebf375b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs new file mode 100644 index 00000000..d0e4b9fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Attr; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * reader for user attribute sub-packets + */ + public class UserAttributeSubpacketsParser + { + private readonly Stream input; + + public UserAttributeSubpacketsParser( + Stream input) + { + this.input = input; + } + + public virtual UserAttributeSubpacket ReadPacket() + { + int l = input.ReadByte(); + if (l < 0) + return null; + + int bodyLen = 0; + bool longLength = false; + if (l < 192) + { + bodyLen = l; + } + else if (l <= 223) + { + bodyLen = ((l - 192) << 8) + (input.ReadByte()) + 192; + } + else if (l == 255) + { + bodyLen = (input.ReadByte() << 24) | (input.ReadByte() << 16) + | (input.ReadByte() << 8) | input.ReadByte(); + longLength = true; + } + else + { + throw new IOException("unrecognised length reading user attribute sub packet"); + } + + int tag = input.ReadByte(); + if (tag < 0) + throw new EndOfStreamException("unexpected EOF reading user attribute sub packet"); + + byte[] data = new byte[bodyLen - 1]; + if (Streams.ReadFully(input, data) < data.Length) + throw new EndOfStreamException(); + + UserAttributeSubpacketTag type = (UserAttributeSubpacketTag) tag; + switch (type) + { + case UserAttributeSubpacketTag.ImageAttribute: + return new ImageAttrib(longLength, data); + } + return new UserAttributeSubpacket(type, longLength, data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs.meta new file mode 100644 index 00000000..bae91f1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 61f1b231b7fcc9641b148b386ca02927 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserAttributeSubpacketsReader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs new file mode 100644 index 00000000..84c799f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs @@ -0,0 +1,41 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /** + * Basic type for a user ID packet. + */ + public class UserIdPacket + : ContainedPacket + { + private readonly byte[] idData; + + public UserIdPacket( + BcpgInputStream bcpgIn) + { + this.idData = bcpgIn.ReadAll(); + } + + public UserIdPacket( + string id) + { + this.idData = Encoding.UTF8.GetBytes(id); + } + + public string GetId() + { + return Encoding.UTF8.GetString(idData, 0, idData.Length); + } + + public override void Encode( + BcpgOutputStream bcpgOut) + { + bcpgOut.WritePacket(PacketTag.UserId, idData, true); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs.meta new file mode 100644 index 00000000..6e769550 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25f95cc8864f6e04188a279b78a44f39 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/UserIdPacket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr.meta new file mode 100644 index 00000000..037f3f82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8a2eb9bf6275a5a4d92c84a3a3e1d676 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs new file mode 100644 index 00000000..c2c959ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Attr +{ + /// Basic type for a image attribute packet. + public class ImageAttrib + : UserAttributeSubpacket + { + public enum Format : byte + { + Jpeg = 1 + } + + private static readonly byte[] Zeroes = new byte[12]; + + private int hdrLength; + private int _version; + private int _encoding; + private byte[] imageData; + + public ImageAttrib(byte[] data) + : this(false, data) + { + } + + public ImageAttrib(bool forceLongLength, byte[] data) + : base(UserAttributeSubpacketTag.ImageAttribute, forceLongLength, data) + { + hdrLength = ((data[1] & 0xff) << 8) | (data[0] & 0xff); + _version = data[2] & 0xff; + _encoding = data[3] & 0xff; + + imageData = new byte[data.Length - hdrLength]; + Array.Copy(data, hdrLength, imageData, 0, imageData.Length); + } + + public ImageAttrib( + Format imageType, + byte[] imageData) + : this(ToByteArray(imageType, imageData)) + { + } + + private static byte[] ToByteArray( + Format imageType, + byte[] imageData) + { + MemoryStream bOut = new MemoryStream(); + bOut.WriteByte(0x10); bOut.WriteByte(0x00); bOut.WriteByte(0x01); + bOut.WriteByte((byte) imageType); + bOut.Write(Zeroes, 0, Zeroes.Length); + bOut.Write(imageData, 0, imageData.Length); + return bOut.ToArray(); + } + + public virtual int Version + { + get { return _version; } + } + + public virtual int Encoding + { + get { return _encoding; } + } + + public virtual byte[] GetImageData() + { + return imageData; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs.meta new file mode 100644 index 00000000..8c55f710 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69861bbe2f76e164e92119b90586e67f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/attr/ImageAttrib.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig.meta new file mode 100644 index 00000000..496488f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e817b1e6d6079c9438c31bf392d37b86 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs new file mode 100644 index 00000000..4b126837 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * Packet embedded signature + */ + public class EmbeddedSignature + : SignatureSubpacket + { + public EmbeddedSignature( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.EmbeddedSignature, critical, isLongLength, data) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs.meta new file mode 100644 index 00000000..d77cc1a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 826ff03cd85cf9e48ae06cb9dc9aff70 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/EmbeddedSignature.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs new file mode 100644 index 00000000..2ee4ee19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature creation time. + */ + public class Exportable + : SignatureSubpacket + { + private static byte[] BooleanToByteArray(bool val) + { + return new byte[1]{ Convert.ToByte(val) }; + } + + public Exportable( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.Exportable, critical, isLongLength, data) + { + } + + public Exportable( + bool critical, + bool isExportable) + : base(SignatureSubpacketTag.Exportable, critical, false, BooleanToByteArray(isExportable)) + { + } + + public bool IsExportable() + { + return data[0] != 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs.meta new file mode 100644 index 00000000..5ab41d0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 581fe417e1b5a0a45ac67acb2e0efecd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Exportable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs new file mode 100644 index 00000000..b8498481 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature expiration time. + */ + public class Features + : SignatureSubpacket + { + /** Identifier for the Modification Detection (packets 18 and 19) */ + public static readonly byte FEATURE_MODIFICATION_DETECTION = 0x01; + /** Identifier for the AEAD Encrypted Data Packet (packet 20) and version 5 + Symmetric-Key Encrypted Session Key Packets (packet 3) */ + public static readonly byte FEATURE_AEAD_ENCRYPTED_DATA = 0x02; + /** Identifier for the Version 5 Public-Key Packet format and corresponding new + fingerprint format */ + public static readonly byte FEATURE_VERSION_5_PUBLIC_KEY = 0x04; + + private static byte[] FeatureToByteArray(byte feature) + { + return new byte[1]{ feature }; + } + + public Features( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.Features, critical, isLongLength, data) + { + } + + public Features(bool critical, byte features): this(critical, false, FeatureToByteArray(features)) + { + } + + public Features(bool critical, int features): this(critical, false, FeatureToByteArray((byte)features)) + { + } + + /** + * Returns if modification detection is supported. + */ + public bool SupportsModificationDetection + { + get { return SupportsFeature(FEATURE_MODIFICATION_DETECTION); } + } + + /** + * Returns if a particular feature is supported. + */ + public bool SupportsFeature(byte feature) + { + return (data[0] & feature) != 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs.meta new file mode 100644 index 00000000..0d31f5c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2696c28036ba71a44a5bd4b7c8a9a4d2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Features.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs new file mode 100644 index 00000000..0fe23a2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature creation time. + */ + public class IssuerKeyId + : SignatureSubpacket + { + protected static byte[] KeyIdToBytes(long keyId) + { + return Pack.UInt64_To_BE((ulong)keyId); + } + + public IssuerKeyId( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.IssuerKeyId, critical, isLongLength, data) + { + } + + public IssuerKeyId( + bool critical, + long keyId) + : base(SignatureSubpacketTag.IssuerKeyId, critical, false, KeyIdToBytes(keyId)) + { + } + + public long KeyId => (long)Pack.BE_To_UInt64(data); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs.meta new file mode 100644 index 00000000..18c6ade1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 694260a3c3a2414409ca33e092da7b6a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/IssuerKeyId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs new file mode 100644 index 00000000..36a3a4bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving time after creation at which the key expires. + */ + public class KeyExpirationTime + : SignatureSubpacket + { + protected static byte[] TimeToBytes(long t) + { + return Pack.UInt32_To_BE((uint)t); + } + + public KeyExpirationTime( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.KeyExpireTime, critical, isLongLength, data) + { + } + + public KeyExpirationTime( + bool critical, + long seconds) + : base(SignatureSubpacketTag.KeyExpireTime, critical, false, TimeToBytes(seconds)) + { + } + + /** + * Return the number of seconds after creation time a key is valid for. + * + * @return second count for key validity. + */ + public long Time => (long)Pack.BE_To_UInt32(data); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs.meta new file mode 100644 index 00000000..cd48f91c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5549f1242cf947640b8fb17e7a0be5f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyExpirationTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs new file mode 100644 index 00000000..72be5b7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * Packet holding the key flag values. + */ + public class KeyFlags + : SignatureSubpacket + { + public const int CertifyOther = 0x01; + public const int SignData = 0x02; + public const int EncryptComms = 0x04; + public const int EncryptStorage = 0x08; + public const int Split = 0x10; + public const int Authentication = 0x20; + public const int Shared = 0x80; + + private static byte[] IntToByteArray( + int v) + { + byte[] tmp = new byte[4]; + int size = 0; + + for (int i = 0; i != 4; i++) + { + tmp[i] = (byte)(v >> (i * 8)); + if (tmp[i] != 0) + { + size = i; + } + } + + byte[] data = new byte[size + 1]; + Array.Copy(tmp, 0, data, 0, data.Length); + return data; + } + + public KeyFlags( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.KeyFlags, critical, isLongLength, data) + { + } + + public KeyFlags( + bool critical, + int flags) + : base(SignatureSubpacketTag.KeyFlags, critical, false, IntToByteArray(flags)) + { + } + + /// + /// Return the flag values contained in the first 4 octets (note: at the moment + /// the standard only uses the first one). + /// + public int Flags + { + get + { + int flags = 0; + + for (int i = 0; i != data.Length; i++) + { + flags |= (data[i] & 0xff) << (i * 8); + } + + return flags; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs.meta new file mode 100644 index 00000000..81deae08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6e84bad17972773488dbe07547a99912 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/KeyFlags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs new file mode 100644 index 00000000..fec7c546 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs @@ -0,0 +1,117 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * Class provided a NotationData object according to + * RFC2440, Chapter 5.2.3.15. Notation Data + */ + public class NotationData + : SignatureSubpacket + { + public const int HeaderFlagLength = 4; + public const int HeaderNameLength = 2; + public const int HeaderValueLength = 2; + + public NotationData( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.NotationData, critical, isLongLength, data) + { + } + + public NotationData( + bool critical, + bool humanReadable, + string notationName, + string notationValue) + : base(SignatureSubpacketTag.NotationData, critical, false, + CreateData(humanReadable, notationName, notationValue)) + { + } + + private static byte[] CreateData( + bool humanReadable, + string notationName, + string notationValue) + { + MemoryStream os = new MemoryStream(); + + // (4 octets of flags, 2 octets of name length (M), + // 2 octets of value length (N), + // M octets of name data, + // N octets of value data) + + // flags + os.WriteByte(humanReadable ? (byte)0x80 : (byte)0x00); + os.WriteByte(0x0); + os.WriteByte(0x0); + os.WriteByte(0x0); + + byte[] nameData, valueData = null; + int nameLength, valueLength; + + nameData = Encoding.UTF8.GetBytes(notationName); + nameLength = System.Math.Min(nameData.Length, 0xFF); + + valueData = Encoding.UTF8.GetBytes(notationValue); + valueLength = System.Math.Min(valueData.Length, 0xFF); + + // name length + os.WriteByte((byte)(nameLength >> 8)); + os.WriteByte((byte)(nameLength >> 0)); + + // value length + os.WriteByte((byte)(valueLength >> 8)); + os.WriteByte((byte)(valueLength >> 0)); + + // name + os.Write(nameData, 0, nameLength); + + // value + os.Write(valueData, 0, valueLength); + + return os.ToArray(); + } + + public bool IsHumanReadable + { + get { return data[0] == 0x80; } + } + + public string GetNotationName() + { + int nameLength = ((data[HeaderFlagLength] << 8) + (data[HeaderFlagLength + 1] << 0)); + int namePos = HeaderFlagLength + HeaderNameLength + HeaderValueLength; + + return Encoding.UTF8.GetString(data, namePos, nameLength); + } + + public string GetNotationValue() + { + int nameLength = ((data[HeaderFlagLength] << 8) + (data[HeaderFlagLength + 1] << 0)); + int valueLength = ((data[HeaderFlagLength + HeaderNameLength] << 8) + (data[HeaderFlagLength + HeaderNameLength + 1] << 0)); + int valuePos = HeaderFlagLength + HeaderNameLength + HeaderValueLength + nameLength; + + return Encoding.UTF8.GetString(data, valuePos, valueLength); + } + + public byte[] GetNotationValueBytes() + { + int nameLength = ((data[HeaderFlagLength] << 8) + (data[HeaderFlagLength + 1] << 0)); + int valueLength = ((data[HeaderFlagLength + HeaderNameLength] << 8) + (data[HeaderFlagLength + HeaderNameLength + 1] << 0)); + int valuePos = HeaderFlagLength + HeaderNameLength + HeaderValueLength + nameLength; + + byte[] bytes = new byte[valueLength]; + Array.Copy(data, valuePos, bytes, 0, valueLength); + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs.meta new file mode 100644 index 00000000..03962da8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 81ad0e2ea94abef40a6e574dfbe58cb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/NotationData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs new file mode 100644 index 00000000..d4c9b6cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature creation time. + */ + public class PreferredAlgorithms + : SignatureSubpacket + { + private static byte[] IntToByteArray( + int[] v) + { + byte[] data = new byte[v.Length]; + + for (int i = 0; i != v.Length; i++) + { + data[i] = (byte)v[i]; + } + + return data; + } + + public PreferredAlgorithms( + SignatureSubpacketTag type, + bool critical, + bool isLongLength, + byte[] data) + : base(type, critical, isLongLength, data) + { + } + + public PreferredAlgorithms( + SignatureSubpacketTag type, + bool critical, + int[] preferences) + : base(type, critical, false, IntToByteArray(preferences)) + { + } + + public int[] GetPreferences() + { + int[] v = new int[data.Length]; + + for (int i = 0; i != v.Length; i++) + { + v[i] = data[i] & 0xff; + } + + return v; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs.meta new file mode 100644 index 00000000..dd362698 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ff240d30792bb948baa99025e3a8e45 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PreferredAlgorithms.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs new file mode 100644 index 00000000..ae411d70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving whether or not the signature is signed using the primary user ID for the key. + */ + public class PrimaryUserId + : SignatureSubpacket + { + private static byte[] BooleanToByteArray(bool val) + { + return new byte[1]{ Convert.ToByte(val) }; + } + + public PrimaryUserId( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.PrimaryUserId, critical, isLongLength, data) + { + } + + public PrimaryUserId( + bool critical, + bool isPrimaryUserId) + : base(SignatureSubpacketTag.PrimaryUserId, critical, false, BooleanToByteArray(isPrimaryUserId)) + { + } + + public bool IsPrimaryUserId() + { + return data[0] != 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs.meta new file mode 100644 index 00000000..9163bec0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 02f54dbba8c88794cac57757f58388d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/PrimaryUserId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs new file mode 100644 index 00000000..1fd103f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving whether or not is revocable. + */ + public class Revocable + : SignatureSubpacket + { + private static byte[] BooleanToByteArray(bool value) + { + return new byte[1]{ Convert.ToByte(value) }; + } + + public Revocable( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.Revocable, critical, isLongLength, data) + { + } + + public Revocable( + bool critical, + bool isRevocable) + : base(SignatureSubpacketTag.Revocable, critical, false, BooleanToByteArray(isRevocable)) + { + } + + public bool IsRevocable() + { + return data[0] != 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs.meta new file mode 100644 index 00000000..7db3cb3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1c5e4322da8e984d8ceddeadafde509 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/Revocable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs new file mode 100644 index 00000000..fd3e6e42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// + /// Represents revocation key OpenPGP signature sub packet. + /// + public class RevocationKey + : SignatureSubpacket + { + // 1 octet of class, + // 1 octet of public-key algorithm ID, + // 20 octets of fingerprint + public RevocationKey( + bool isCritical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.RevocationKey, isCritical, isLongLength, data) + { + } + + public RevocationKey( + bool isCritical, + RevocationKeyTag signatureClass, + PublicKeyAlgorithmTag keyAlgorithm, + byte[] fingerprint) + : base(SignatureSubpacketTag.RevocationKey, isCritical, false, + CreateData(signatureClass, keyAlgorithm, fingerprint)) + { + } + + private static byte[] CreateData( + RevocationKeyTag signatureClass, + PublicKeyAlgorithmTag keyAlgorithm, + byte[] fingerprint) + { + byte[] data = new byte[2 + fingerprint.Length]; + data[0] = (byte)signatureClass; + data[1] = (byte)keyAlgorithm; + Array.Copy(fingerprint, 0, data, 2, fingerprint.Length); + return data; + } + + public virtual RevocationKeyTag SignatureClass + { + get { return (RevocationKeyTag)this.GetData()[0]; } + } + + public virtual PublicKeyAlgorithmTag Algorithm + { + get { return (PublicKeyAlgorithmTag)this.GetData()[1]; } + } + + public virtual byte[] GetFingerprint() + { + byte[] data = this.GetData(); + byte[] fingerprint = new byte[data.Length - 2]; + Array.Copy(data, 2, fingerprint, 0, fingerprint.Length); + return fingerprint; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs.meta new file mode 100644 index 00000000..181b0ae2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f9eaf5618aa97844784334746109bbae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs new file mode 100644 index 00000000..45c0fbda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public enum RevocationKeyTag + : byte + { + ClassDefault = 0x80, + ClassSensitive = 0x40 + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs.meta new file mode 100644 index 00000000..e9aed5b1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e1338967dd169249b5b7bc5386e27f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationKeyTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs new file mode 100644 index 00000000..1db5d5ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + /// + /// Represents revocation reason OpenPGP signature sub packet. + /// + public class RevocationReason + : SignatureSubpacket + { + public RevocationReason(bool isCritical, bool isLongLength, byte[] data) + : base(SignatureSubpacketTag.RevocationReason, isCritical, isLongLength, data) + { + } + + public RevocationReason( + bool isCritical, + RevocationReasonTag reason, + string description) + : base(SignatureSubpacketTag.RevocationReason, isCritical, false, CreateData(reason, description)) + { + } + + private static byte[] CreateData( + RevocationReasonTag reason, + string description) + { + byte[] descriptionBytes = Strings.ToUtf8ByteArray(description); + byte[] data = new byte[1 + descriptionBytes.Length]; + + data[0] = (byte)reason; + Array.Copy(descriptionBytes, 0, data, 1, descriptionBytes.Length); + + return data; + } + + public virtual RevocationReasonTag GetRevocationReason() + { + return (RevocationReasonTag)GetData()[0]; + } + + public virtual string GetRevocationDescription() + { + byte[] data = GetData(); + if (data.Length == 1) + return string.Empty; + + byte[] description = new byte[data.Length - 1]; + Array.Copy(data, 1, description, 0, description.Length); + + return Strings.FromUtf8ByteArray(description); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs.meta new file mode 100644 index 00000000..4b09b74d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c90f793064eac8c49b88ec465e9e4801 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReason.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs new file mode 100644 index 00000000..19ee4e4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg +{ + public enum RevocationReasonTag + : byte + { + NoReason = 0, // No reason specified (key revocations or cert revocations) + KeySuperseded = 1, // Key is superseded (key revocations) + KeyCompromised = 2, // Key material has been compromised (key revocations) + KeyRetired = 3, // Key is retired and no longer used (key revocations) + UserNoLongerValid = 32, // User ID information is no longer valid (cert revocations) + + // 100-110 - Private Use + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs.meta new file mode 100644 index 00000000..b96a2260 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2cef5753ad3f65047a1b282c84764d3a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/RevocationReasonTags.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs new file mode 100644 index 00000000..9e3c9d62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature creation time. + */ + public class SignatureCreationTime + : SignatureSubpacket + { + protected static byte[] TimeToBytes(DateTime time) + { + long t = DateTimeUtilities.DateTimeToUnixMs(time) / 1000L; + return Pack.UInt32_To_BE((uint)t); + } + + public SignatureCreationTime(bool critical, bool isLongLength, byte[] data) + : base(SignatureSubpacketTag.CreationTime, critical, isLongLength, data) + { + } + + public SignatureCreationTime(bool critical, DateTime date) + : base(SignatureSubpacketTag.CreationTime, critical, false, TimeToBytes(date)) + { + } + + public DateTime GetTime() + { + uint time = Pack.BE_To_UInt32(data, 0); + return DateTimeUtilities.UnixMsToDateTime(time * 1000L); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs.meta new file mode 100644 index 00000000..81e469bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc33b36b4be60784aa69a717fa1cec23 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureCreationTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs new file mode 100644 index 00000000..fde2a445 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving signature expiration time. + */ + public class SignatureExpirationTime + : SignatureSubpacket + { + protected static byte[] TimeToBytes(long t) + { + return Pack.UInt32_To_BE((uint)t); + } + + public SignatureExpirationTime(bool critical, bool isLongLength, byte[] data) + : base(SignatureSubpacketTag.ExpireTime, critical, isLongLength, data) + { + } + + public SignatureExpirationTime(bool critical, long seconds) + : base(SignatureSubpacketTag.ExpireTime, critical, false, TimeToBytes(seconds)) + { + } + + /** + * return time in seconds before signature expires after creation time. + */ + public long Time => Pack.BE_To_UInt32(data, 0); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs.meta new file mode 100644 index 00000000..1ae8135d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e5470a08723646a4ebe1b4dddb7af999 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignatureExpirationTime.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs new file mode 100644 index 00000000..556e1c48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving the User ID of the signer. + */ + public class SignerUserId + : SignatureSubpacket + { + private static byte[] UserIdToBytes( + string id) + { + byte[] idData = new byte[id.Length]; + + for (int i = 0; i != id.Length; i++) + { + idData[i] = (byte)id[i]; + } + + return idData; + } + + public SignerUserId( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.SignerUserId, critical, isLongLength, data) + { + } + + public SignerUserId( + bool critical, + string userId) + : base(SignatureSubpacketTag.SignerUserId, critical, false, UserIdToBytes(userId)) + { + } + + public string GetId() + { + char[] chars = new char[data.Length]; + + for (int i = 0; i != chars.Length; i++) + { + chars[i] = (char)(data[i] & 0xff); + } + + return new string(chars); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs.meta new file mode 100644 index 00000000..a7f1f334 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f72fc08b5dfd3e4b99640a0365a108a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/SignerUserId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs new file mode 100644 index 00000000..b6fd7a2b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Bcpg.Sig +{ + /** + * packet giving trust. + */ + public class TrustSignature + : SignatureSubpacket + { + private static byte[] IntToByteArray( + int v1, + int v2) + { + return new byte[]{ (byte)v1, (byte)v2 }; + } + + public TrustSignature( + bool critical, + bool isLongLength, + byte[] data) + : base(SignatureSubpacketTag.TrustSig, critical, isLongLength, data) + { + } + + public TrustSignature( + bool critical, + int depth, + int trustAmount) + : base(SignatureSubpacketTag.TrustSig, critical, false, IntToByteArray(depth, trustAmount)) + { + } + + public int Depth + { + get { return data[0] & 0xff; } + } + + public int TrustAmount + { + get { return data[1] & 0xff; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs.meta new file mode 100644 index 00000000..04954ba7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25abbc01b4edc0440a4b6ef04b9ba858 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/bcpg/sig/TrustSignature.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp.meta new file mode 100644 index 00000000..8840baa1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 343736f8718a3894e83955651210ce80 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs new file mode 100644 index 00000000..98d65da5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public class CertificateConfirmationContent + { + private readonly DefaultDigestAlgorithmIdentifierFinder m_digestAlgFinder; + private readonly CertConfirmContent m_content; + + public CertificateConfirmationContent(CertConfirmContent content) + { + this.m_content = content; + } + + public CertificateConfirmationContent(CertConfirmContent content, + DefaultDigestAlgorithmIdentifierFinder digestAlgFinder) + { + this.m_content = content; + this.m_digestAlgFinder = digestAlgFinder; + } + + public CertConfirmContent ToAsn1Structure() + { + return m_content; + } + + public CertificateStatus[] GetStatusMessages() + { + CertStatus[] statusArray = m_content.ToCertStatusArray(); + CertificateStatus[] ret = new CertificateStatus[statusArray.Length]; + for (int i = 0; i != ret.Length; i++) + { + ret[i] = new CertificateStatus(m_digestAlgFinder, statusArray[i]); + } + + return ret; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs.meta new file mode 100644 index 00000000..43821434 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2788473a184b6ce42814d5edb36f2c3b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs new file mode 100644 index 00000000..7817be57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public sealed class CertificateConfirmationContentBuilder + { + private static readonly DefaultSignatureAlgorithmIdentifierFinder SigAlgFinder = + new DefaultSignatureAlgorithmIdentifierFinder(); + + private readonly DefaultDigestAlgorithmIdentifierFinder m_digestAlgFinder; + private readonly IList m_acceptedCerts = new List(); + private readonly IList m_acceptedReqIDs = new List(); + + public CertificateConfirmationContentBuilder() + : this(new DefaultDigestAlgorithmIdentifierFinder()) + { + } + + public CertificateConfirmationContentBuilder(DefaultDigestAlgorithmIdentifierFinder digestAlgFinder) + { + this.m_digestAlgFinder = digestAlgFinder; + } + + public CertificateConfirmationContentBuilder AddAcceptedCertificate(X509Certificate certHolder, + BigInteger certReqId) + { + m_acceptedCerts.Add(certHolder); + m_acceptedReqIDs.Add(certReqId); + return this; + } + + public CertificateConfirmationContent Build() + { + Asn1EncodableVector v = new Asn1EncodableVector(); + for (int i = 0; i != m_acceptedCerts.Count; i++) + { + X509Certificate cert = m_acceptedCerts[i]; + BigInteger reqID = m_acceptedReqIDs[i]; + + AlgorithmIdentifier algorithmIdentifier = SigAlgFinder.Find(cert.SigAlgName); + if (null == algorithmIdentifier) + throw new CmpException("cannot find algorithm identifier for signature name"); + + AlgorithmIdentifier digAlg = m_digestAlgFinder.Find(algorithmIdentifier); + if (null == digAlg) + throw new CmpException("cannot find algorithm for digest from signature"); + + byte[] digest = DigestUtilities.CalculateDigest(digAlg.Algorithm, cert.GetEncoded()); + + v.Add(new CertStatus(digest, reqID)); + } + + return new CertificateConfirmationContent(CertConfirmContent.GetInstance(new DerSequence(v)), + m_digestAlgFinder); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs.meta new file mode 100644 index 00000000..b07f104d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 398e30ef376af0a44b34abe52c7c77a9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateConfirmationContentBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs new file mode 100644 index 00000000..de54ebb9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public class CertificateStatus + { + private static readonly DefaultSignatureAlgorithmIdentifierFinder sigAlgFinder = new DefaultSignatureAlgorithmIdentifierFinder(); + + private readonly DefaultDigestAlgorithmIdentifierFinder digestAlgFinder; + private readonly CertStatus certStatus; + + public CertificateStatus(DefaultDigestAlgorithmIdentifierFinder digestAlgFinder, CertStatus certStatus) + { + this.digestAlgFinder = digestAlgFinder; + this.certStatus = certStatus; + } + + public virtual PkiStatusInfo StatusInfo => certStatus.StatusInfo; + + public virtual BigInteger CertRequestID => certStatus.CertReqID.Value; + + public virtual bool IsVerified(X509Certificate cert) + { + AlgorithmIdentifier digAlg = digestAlgFinder.Find(sigAlgFinder.Find(cert.SigAlgName)); + if (null == digAlg) + throw new CmpException("cannot find algorithm for digest from signature " + cert.SigAlgName); + + byte[] digest = DigestUtilities.CalculateDigest(digAlg.Algorithm, cert.GetEncoded()); + + return Arrays.ConstantTimeAreEqual(certStatus.CertHash.GetOctets(), digest); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs.meta new file mode 100644 index 00000000..de43f1bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 098228ed45f1a3b4daaca3d1bfa19cd7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CertificateStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs new file mode 100644 index 00000000..0e088230 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + [Serializable] + public class CmpException + : Exception + { + public CmpException() + : base() + { + } + + public CmpException(string message) + : base(message) + { + } + + public CmpException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CmpException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs.meta new file mode 100644 index 00000000..eca582c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: beb021ea72727bd4cb72ab1f465f5e69 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/CmpException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs new file mode 100644 index 00000000..0f810700 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public class GeneralPkiMessage + { + private readonly PkiMessage m_pkiMessage; + + private static PkiMessage ParseBytes(byte[] encoding) + { + return PkiMessage.GetInstance(Asn1Object.FromByteArray(encoding)); + } + + /// + /// Wrap a PKIMessage ASN.1 structure. + /// + /// PKI message. + public GeneralPkiMessage(PkiMessage pkiMessage) + { + this.m_pkiMessage = pkiMessage; + } + + /// + /// Create a PKIMessage from the passed in bytes. + /// + /// BER/DER encoding of the PKIMessage + public GeneralPkiMessage(byte[] encoding) + : this(ParseBytes(encoding)) + { + } + + public virtual PkiHeader Header => m_pkiMessage.Header; + + public virtual PkiBody Body => m_pkiMessage.Body; + + /// + /// Return true if this message has protection bits on it. A return value of true + /// indicates the message can be used to construct a ProtectedPKIMessage. + /// + public virtual bool HasProtection => m_pkiMessage.Protection != null; + + public virtual PkiMessage ToAsn1Structure() => m_pkiMessage; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs.meta new file mode 100644 index 00000000..7b992682 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 205b2017d47f7384db6a5cbbf4ea48a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/GeneralPkiMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs new file mode 100644 index 00000000..5c828f3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs @@ -0,0 +1,141 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + /// + /// Wrapper for a PKIMessage with protection attached to it. + /// + public class ProtectedPkiMessage + { + private readonly PkiMessage m_pkiMessage; + + /// + /// Wrap a general message. + /// + /// If the general message does not have protection. + /// The General message + public ProtectedPkiMessage(GeneralPkiMessage pkiMessage) + { + if (!pkiMessage.HasProtection) + throw new ArgumentException("GeneralPkiMessage not protected"); + + this.m_pkiMessage = pkiMessage.ToAsn1Structure(); + } + + // TODO[cmp] Make internal? (Has test that uses it) + /// + /// Wrap a PKI message. + /// + /// If the PKI message does not have protection. + /// The PKI message + public ProtectedPkiMessage(PkiMessage pkiMessage) + { + if (null == pkiMessage.Header.ProtectionAlg) + throw new ArgumentException("PkiMessage not protected"); + + this.m_pkiMessage = pkiMessage; + } + + /// Message header + public virtual PkiHeader Header => m_pkiMessage.Header; + + /// Message body + public virtual PkiBody Body => m_pkiMessage.Body; + + /// + /// Return the underlying ASN.1 structure contained in this object. + /// + /// PkiMessage structure + public virtual PkiMessage ToAsn1Message() => m_pkiMessage; + + /// + /// Determine whether the message is protected by a password based MAC. Use verify(PKMACBuilder, char[]) + /// to verify the message if this method returns true. + /// + /// true if protection MAC PBE based, false otherwise. + public virtual bool HasPasswordBasedMacProtected + { + get { return CmpObjectIdentifiers.passwordBasedMac.Equals(Header.ProtectionAlg.Algorithm); } + } + + /// + /// Return the extra certificates associated with this message. + /// + /// an array of extra certificates, zero length if none present. + public virtual X509Certificate[] GetCertificates() + { + CmpCertificate[] certs = m_pkiMessage.GetExtraCerts(); + if (null == certs) + return new X509Certificate[0]; + + X509Certificate[] result = new X509Certificate[certs.Length]; + for (int t = 0; t < certs.Length; t++) + { + result[t] = new X509Certificate(certs[t].X509v3PKCert); + } + return result; + } + + /// + /// Verify a message with a public key based signature attached. + /// + /// a factory of signature verifiers. + /// true if the provider is able to create a verifier that validates the signature, false otherwise. + public virtual bool Verify(IVerifierFactory verifierFactory) + { + IStreamCalculator streamCalculator = verifierFactory.CreateCalculator(); + + IVerifier result = Process(streamCalculator); + + return result.IsVerified(m_pkiMessage.Protection.GetBytes()); + } + + /// + /// Verify a message with password based MAC protection. + /// + /// MAC builder that can be used to construct the appropriate MacCalculator + /// the MAC password + /// true if the passed in password and MAC builder verify the message, false otherwise. + /// if algorithm not MAC based, or an exception is thrown verifying the MAC. + public virtual bool Verify(PKMacBuilder pkMacBuilder, char[] password) + { + if (!CmpObjectIdentifiers.passwordBasedMac.Equals(m_pkiMessage.Header.ProtectionAlg.Algorithm)) + throw new InvalidOperationException("protection algorithm is not mac based"); + + PbmParameter parameter = PbmParameter.GetInstance(m_pkiMessage.Header.ProtectionAlg.Parameters); + + pkMacBuilder.SetParameters(parameter); + + IBlockResult result = Process(pkMacBuilder.Build(password).CreateCalculator()); + + return Arrays.ConstantTimeAreEqual(result.Collect(), m_pkiMessage.Protection.GetBytes()); + } + + private TResult Process(IStreamCalculator streamCalculator) + { + Asn1EncodableVector avec = new Asn1EncodableVector(); + avec.Add(m_pkiMessage.Header); + avec.Add(m_pkiMessage.Body); + byte[] enc = new DerSequence(avec).GetDerEncoded(); + + using (var stream = streamCalculator.Stream) + { + stream.Write(enc, 0, enc.Length); + } + + return streamCalculator.GetResult(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs.meta new file mode 100644 index 00000000..ffe11b8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c178fd8d77199344db95c59459b20470 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs new file mode 100644 index 00000000..d9779570 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs @@ -0,0 +1,161 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public sealed class ProtectedPkiMessageBuilder + { + private readonly PkiHeaderBuilder m_hdrBuilder; + private PkiBody body; + private readonly List generalInfos = new List(); + private readonly List extraCerts = new List(); + + public ProtectedPkiMessageBuilder(GeneralName sender, GeneralName recipient) + : this(PkiHeader.CMP_2000, sender, recipient) + { + } + + public ProtectedPkiMessageBuilder(int pvno, GeneralName sender, GeneralName recipient) + { + m_hdrBuilder = new PkiHeaderBuilder(pvno, sender, recipient); + } + + public ProtectedPkiMessageBuilder SetTransactionId(byte[] tid) + { + m_hdrBuilder.SetTransactionID(tid); + return this; + } + + public ProtectedPkiMessageBuilder SetFreeText(PkiFreeText freeText) + { + m_hdrBuilder.SetFreeText(freeText); + return this; + } + + public ProtectedPkiMessageBuilder AddGeneralInfo(InfoTypeAndValue genInfo) + { + generalInfos.Add(genInfo); + return this; + } + + public ProtectedPkiMessageBuilder SetMessageTime(DateTime time) + { + m_hdrBuilder.SetMessageTime(new Asn1GeneralizedTime(time)); + return this; + } + + public ProtectedPkiMessageBuilder SetMessageTime(Asn1GeneralizedTime generalizedTime) + { + m_hdrBuilder.SetMessageTime(generalizedTime); + return this; + } + + public ProtectedPkiMessageBuilder SetRecipKID(byte[] id) + { + m_hdrBuilder.SetRecipKID(id); + return this; + } + + public ProtectedPkiMessageBuilder SetRecipNonce(byte[] nonce) + { + m_hdrBuilder.SetRecipNonce(nonce); + return this; + } + + public ProtectedPkiMessageBuilder SetSenderKID(byte[] id) + { + m_hdrBuilder.SetSenderKID(id); + return this; + } + + public ProtectedPkiMessageBuilder SetSenderNonce(byte[] nonce) + { + m_hdrBuilder.SetSenderNonce(nonce); + return this; + } + + public ProtectedPkiMessageBuilder SetBody(PkiBody body) + { + this.body = body; + return this; + } + + public ProtectedPkiMessageBuilder AddCmpCertificate(X509Certificate certificate) + { + extraCerts.Add(certificate); + return this; + } + + public ProtectedPkiMessage Build(ISignatureFactory signatureFactory) + { + if (null == body) + throw new InvalidOperationException("body must be set before building"); + + IStreamCalculator calculator = signatureFactory.CreateCalculator(); + + if (!(signatureFactory.AlgorithmDetails is AlgorithmIdentifier algorithmDetails)) + throw new ArgumentException("AlgorithmDetails is not AlgorithmIdentifier"); + + FinalizeHeader(algorithmDetails); + PkiHeader header = m_hdrBuilder.Build(); + DerBitString protection = new DerBitString(CalculateSignature(calculator, header, body)); + return FinalizeMessage(header, protection); + } + + public ProtectedPkiMessage Build(IMacFactory macFactory) + { + if (null == body) + throw new InvalidOperationException("body must be set before building"); + + IStreamCalculator calculator = macFactory.CreateCalculator(); + + if (!(macFactory.AlgorithmDetails is AlgorithmIdentifier algorithmDetails)) + throw new ArgumentException("AlgorithmDetails is not AlgorithmIdentifier"); + + FinalizeHeader(algorithmDetails); + PkiHeader header = m_hdrBuilder.Build(); + DerBitString protection = new DerBitString(CalculateSignature(calculator, header, body)); + return FinalizeMessage(header, protection); + } + + private void FinalizeHeader(AlgorithmIdentifier algorithmIdentifier) + { + m_hdrBuilder.SetProtectionAlg(algorithmIdentifier); + if (generalInfos.Count > 0) + { + m_hdrBuilder.SetGeneralInfo(generalInfos.ToArray()); + } + } + + private ProtectedPkiMessage FinalizeMessage(PkiHeader header, DerBitString protection) + { + if (extraCerts.Count < 1) + return new ProtectedPkiMessage(new PkiMessage(header, body, protection)); + + CmpCertificate[] cmpCertificates = new CmpCertificate[extraCerts.Count]; + for (int i = 0; i < cmpCertificates.Length; i++) + { + cmpCertificates[i] = new CmpCertificate(extraCerts[i].CertificateStructure); + } + + return new ProtectedPkiMessage(new PkiMessage(header, body, protection, cmpCertificates)); + } + + private byte[] CalculateSignature(IStreamCalculator signer, PkiHeader header, PkiBody body) + { + new DerSequence(header, body).EncodeTo(signer.Stream); + return signer.GetResult().Collect(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs.meta new file mode 100644 index 00000000..1ae5b0d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e845f0c5f946f5c4a963c1248a54d4e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/ProtectedPkiMessageBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs new file mode 100644 index 00000000..beb018e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public struct RevocationDetails + { + private readonly RevDetails m_revDetails; + + public RevocationDetails(RevDetails revDetails) + { + m_revDetails = revDetails; + } + + public X509Name Subject => m_revDetails.CertDetails.Subject; + + public X509Name Issuer => m_revDetails.CertDetails.Issuer; + + public BigInteger SerialNumber => m_revDetails.CertDetails.SerialNumber.Value; + + public RevDetails ToASN1Structure() => m_revDetails; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs.meta new file mode 100644 index 00000000..e804f029 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3d0c2445323acf640a683170c1ebfca9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetails.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs new file mode 100644 index 00000000..c8c13494 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cmp +{ + public sealed class RevocationDetailsBuilder + { + private readonly CertTemplateBuilder m_templateBuilder = new CertTemplateBuilder(); + + public RevocationDetailsBuilder SetPublicKey(SubjectPublicKeyInfo publicKey) + { + if (publicKey != null) + { + m_templateBuilder.SetPublicKey(publicKey); + } + + return this; + } + + public RevocationDetailsBuilder SetIssuer(X509Name issuer) + { + if (issuer != null) + { + m_templateBuilder.SetIssuer(issuer); + } + + return this; + } + + public RevocationDetailsBuilder SetSerialNumber(BigInteger serialNumber) + { + if (serialNumber != null) + { + m_templateBuilder.SetSerialNumber(new DerInteger(serialNumber)); + } + + return this; + } + + public RevocationDetailsBuilder SetSubject(X509Name subject) + { + if (subject != null) + { + m_templateBuilder.SetSubject(subject); + } + + return this; + } + + public RevocationDetails Build() + { + return new RevocationDetails(new RevDetails(m_templateBuilder.Build())); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs.meta new file mode 100644 index 00000000..4ace6946 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d14c516adf92b364b97f4dddf11682f7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cmp/RevocationDetailsBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms.meta new file mode 100644 index 00000000..d95a753b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e75b247d29b8e864c871bad07686a49a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs new file mode 100644 index 00000000..2fe1c58d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class BaseDigestCalculator + : IDigestCalculator + { + private readonly byte[] digest; + + internal BaseDigestCalculator( + byte[] digest) + { + this.digest = digest; + } + + public byte[] GetDigest() + { + return Arrays.Clone(digest); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs.meta new file mode 100644 index 00000000..4c2d650b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25b797bbb5f0cec4b9424af88238f8a9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/BaseDigestCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs new file mode 100644 index 00000000..4fcf5111 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + [Serializable] + public class CmsAttributeTableGenerationException + : CmsException + { + public CmsAttributeTableGenerationException() + : base() + { + } + + public CmsAttributeTableGenerationException(string message) + : base(message) + { + } + + public CmsAttributeTableGenerationException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CmsAttributeTableGenerationException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs.meta new file mode 100644 index 00000000..901b6e23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 46626ac766c635e45bd283536f377deb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerationException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs new file mode 100644 index 00000000..6d7d040a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /// + /// The 'Signature' parameter is only available when generating unsigned attributes. + /// + public enum CmsAttributeTableParameter + { +// const string ContentType = "contentType"; +// const string Digest = "digest"; +// const string Signature = "encryptedDigest"; +// const string DigestAlgorithmIdentifier = "digestAlgID"; + + ContentType, Digest, Signature, DigestAlgorithmIdentifier + } + + public interface CmsAttributeTableGenerator + { + AttributeTable GetAttributes(IDictionary parameters); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs.meta new file mode 100644 index 00000000..f06d3951 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 45919a9f8c14ac2469ff35536c71e341 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAttributeTableGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs new file mode 100644 index 00000000..23a1e1c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * containing class for an CMS AuthEnveloped Data object + */ + internal class CmsAuthEnvelopedData + { + internal RecipientInformationStore recipientInfoStore; + internal ContentInfo contentInfo; + + private OriginatorInfo originator; + private AlgorithmIdentifier authEncAlg; + private Asn1Set authAttrs; + private byte[] mac; + private Asn1Set unauthAttrs; + + public CmsAuthEnvelopedData( + byte[] authEnvData) + : this(CmsUtilities.ReadContentInfo(authEnvData)) + { + } + + public CmsAuthEnvelopedData( + Stream authEnvData) + : this(CmsUtilities.ReadContentInfo(authEnvData)) + { + } + + public CmsAuthEnvelopedData( + ContentInfo contentInfo) + { + this.contentInfo = contentInfo; + + AuthEnvelopedData authEnvData = AuthEnvelopedData.GetInstance(contentInfo.Content); + + this.originator = authEnvData.OriginatorInfo; + + // + // read the recipients + // + Asn1Set recipientInfos = authEnvData.RecipientInfos; + + // + // read the auth-encrypted content info + // + EncryptedContentInfo authEncInfo = authEnvData.AuthEncryptedContentInfo; + this.authEncAlg = authEncInfo.ContentEncryptionAlgorithm; + CmsSecureReadable secureReadable = new AuthEnvelopedSecureReadable(this); + + // + // build the RecipientInformationStore + // + this.recipientInfoStore = CmsEnvelopedHelper.BuildRecipientInformationStore( + recipientInfos, secureReadable); + + // FIXME These need to be passed to the AEAD cipher as AAD (Additional Authenticated Data) + this.authAttrs = authEnvData.AuthAttrs; + this.mac = authEnvData.Mac.GetOctets(); + this.unauthAttrs = authEnvData.UnauthAttrs; + } + + private class AuthEnvelopedSecureReadable : CmsSecureReadable + { + private readonly CmsAuthEnvelopedData parent; + + internal AuthEnvelopedSecureReadable(CmsAuthEnvelopedData parent) + { + this.parent = parent; + } + + public AlgorithmIdentifier Algorithm + { + get { return parent.authEncAlg; } + } + + public object CryptoObject + { + get { return null; } + } + + public CmsReadable GetReadable(KeyParameter key) + { + // TODO Create AEAD cipher instance to decrypt and calculate tag ( MAC) + throw new CmsException("AuthEnveloped data decryption not yet implemented"); + +// RFC 5084 ASN.1 Module +// -- Parameters for AlgorithmIdentifier +// +// CCMParameters ::= SEQUENCE { +// aes-nonce OCTET STRING (SIZE(7..13)), +// aes-ICVlen AES-CCM-ICVlen DEFAULT 12 } +// +// AES-CCM-ICVlen ::= INTEGER (4 | 6 | 8 | 10 | 12 | 14 | 16) +// +// GCMParameters ::= SEQUENCE { +// aes-nonce OCTET STRING, -- recommended size is 12 octets +// aes-ICVlen AES-GCM-ICVlen DEFAULT 12 } +// +// AES-GCM-ICVlen ::= INTEGER (12 | 13 | 14 | 15 | 16) + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs.meta new file mode 100644 index 00000000..3d3bbb56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c03cf7a4f84a0446950125453eda54f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs new file mode 100644 index 00000000..e7ed3820 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class CmsAuthEnvelopedGenerator + { + public static readonly string Aes128Ccm = NistObjectIdentifiers.IdAes128Ccm.Id; + public static readonly string Aes192Ccm = NistObjectIdentifiers.IdAes192Ccm.Id; + public static readonly string Aes256Ccm = NistObjectIdentifiers.IdAes256Ccm.Id; + public static readonly string Aes128Gcm = NistObjectIdentifiers.IdAes128Gcm.Id; + public static readonly string Aes192Gcm = NistObjectIdentifiers.IdAes192Gcm.Id; + public static readonly string Aes256Gcm = NistObjectIdentifiers.IdAes256Gcm.Id; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs.meta new file mode 100644 index 00000000..d449f44f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e3c9aa2fd5925b40960a8b8312f78db +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthEnvelopedGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs new file mode 100644 index 00000000..468b6773 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs @@ -0,0 +1,140 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * containing class for an CMS Authenticated Data object + */ + public class CmsAuthenticatedData + { + internal RecipientInformationStore recipientInfoStore; + internal ContentInfo contentInfo; + + private AlgorithmIdentifier macAlg; + private Asn1Set authAttrs; + private Asn1Set unauthAttrs; + private byte[] mac; + + public CmsAuthenticatedData( + byte[] authData) + : this(CmsUtilities.ReadContentInfo(authData)) + { + } + + public CmsAuthenticatedData( + Stream authData) + : this(CmsUtilities.ReadContentInfo(authData)) + { + } + + public CmsAuthenticatedData( + ContentInfo contentInfo) + { + this.contentInfo = contentInfo; + + AuthenticatedData authData = AuthenticatedData.GetInstance(contentInfo.Content); + + // + // read the recipients + // + Asn1Set recipientInfos = authData.RecipientInfos; + + this.macAlg = authData.MacAlgorithm; + + // + // read the authenticated content info + // + ContentInfo encInfo = authData.EncapsulatedContentInfo; + CmsReadable readable = new CmsProcessableByteArray( + Asn1OctetString.GetInstance(encInfo.Content).GetOctets()); + CmsSecureReadable secureReadable = new CmsEnvelopedHelper.CmsAuthenticatedSecureReadable( + this.macAlg, readable); + + // + // build the RecipientInformationStore + // + this.recipientInfoStore = CmsEnvelopedHelper.BuildRecipientInformationStore( + recipientInfos, secureReadable); + + this.authAttrs = authData.AuthAttrs; + this.mac = authData.Mac.GetOctets(); + this.unauthAttrs = authData.UnauthAttrs; + } + + public byte[] GetMac() + { + return Arrays.Clone(mac); + } + + public AlgorithmIdentifier MacAlgorithmID + { + get { return macAlg; } + } + + /** + * return the object identifier for the content MAC algorithm. + */ + public string MacAlgOid + { + get { return macAlg.Algorithm.Id; } + } + + /** + * return a store of the intended recipients for this message + */ + public RecipientInformationStore GetRecipientInfos() + { + return recipientInfoStore; + } + + /** + * return the ContentInfo + */ + public ContentInfo ContentInfo + { + get { return contentInfo; } + } + + /** + * return a table of the digested attributes indexed by + * the OID of the attribute. + */ + public Asn1.Cms.AttributeTable GetAuthAttrs() + { + if (authAttrs == null) + return null; + + return new Asn1.Cms.AttributeTable(authAttrs); + } + + /** + * return a table of the undigested attributes indexed by + * the OID of the attribute. + */ + public Asn1.Cms.AttributeTable GetUnauthAttrs() + { + if (unauthAttrs == null) + return null; + + return new Asn1.Cms.AttributeTable(unauthAttrs); + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return contentInfo.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs.meta new file mode 100644 index 00000000..fc945e15 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fece474f8ec8d75459c46825516c7b72 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs new file mode 100644 index 00000000..7da47df9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs @@ -0,0 +1,150 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a CMS authenticated-data message. + * + * A simple example of usage. + * + *
+	 *      CMSAuthenticatedDataGenerator  fact = new CMSAuthenticatedDataGenerator();
+	 *
+	 *      fact.addKeyTransRecipient(cert);
+	 *
+	 *      CMSAuthenticatedData         data = fact.generate(content, algorithm, "BC");
+	 * 
+ */ + public class CmsAuthenticatedDataGenerator + : CmsAuthenticatedGenerator + { + public CmsAuthenticatedDataGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsAuthenticatedDataGenerator(SecureRandom random) + : base(random) + { + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data + * object using the given provider and the passed in key generator. + */ + private CmsAuthenticatedData Generate( + CmsProcessable content, + string macOid, + CipherKeyGenerator keyGen) + { + AlgorithmIdentifier macAlgId; + KeyParameter encKey; + Asn1OctetString encContent; + Asn1OctetString macResult; + + try + { + // FIXME Will this work for macs? + byte[] encKeyBytes = keyGen.GenerateKey(); + encKey = ParameterUtilities.CreateKeyParameter(macOid, encKeyBytes); + + Asn1Encodable asn1Params = GenerateAsn1Parameters(macOid, encKeyBytes); + + macAlgId = GetAlgorithmIdentifier(macOid, encKey, asn1Params, out var cipherParameters); + + IMac mac = MacUtilities.GetMac(macOid); + // TODO Confirm no ParametersWithRandom needed + // FIXME Only passing key at the moment +// mac.Init(cipherParameters); + mac.Init(encKey); + + var bOut = new MemoryStream(); + using (var mOut = new TeeOutputStream(bOut, new MacSink(mac))) + { + content.Write(mOut); + } + + encContent = new BerOctetString(bOut.ToArray()); + + byte[] macOctets = MacUtilities.DoFinal(mac); + macResult = new DerOctetString(macOctets); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("exception decoding algorithm parameters.", e); + } + + var recipientInfos = new Asn1EncodableVector(); + + foreach (RecipientInfoGenerator rig in recipientInfoGenerators) + { + try + { + recipientInfos.Add(rig.Generate(encKey, m_random)); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for algorithm.", e); + } + catch (GeneralSecurityException e) + { + throw new CmsException("error making encrypted content.", e); + } + } + + var eci = new ContentInfo(CmsObjectIdentifiers.Data, encContent); + + var contentInfo = new ContentInfo( + CmsObjectIdentifiers.AuthenticatedData, + new AuthenticatedData(null, new DerSet(recipientInfos), macAlgId, null, eci, null, macResult, null)); + + return new CmsAuthenticatedData(contentInfo); + } + + /** + * generate an authenticated object that contains an CMS Authenticated Data object + */ + public CmsAuthenticatedData Generate( + CmsProcessable content, + string encryptionOid) + { + try + { + // FIXME Will this work for macs? + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keyGen.DefaultStrength)); + + return Generate(content, encryptionOid, keyGen); + } + catch (SecurityUtilityException e) + { + throw new CmsException("can't find key generation algorithm.", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs.meta new file mode 100644 index 00000000..c9279bde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25d23bbd7823f1e42a742e064f9050b0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs new file mode 100644 index 00000000..f2b4a0ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs @@ -0,0 +1,217 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Parsing class for an CMS Authenticated Data object from an input stream. + *

+ * Note: that because we are in a streaming mode only one recipient can be tried and it is important + * that the methods on the parser are called in the appropriate order. + *

+ *

+ * Example of use - assuming the first recipient matches the private key we have. + *

+	*      CMSAuthenticatedDataParser     ad = new CMSAuthenticatedDataParser(inputStream);
+	*
+	*      RecipientInformationStore  recipients = ad.getRecipientInfos();
+	*
+	*      Collection  c = recipients.getRecipients();
+	*      Iterator    it = c.iterator();
+	*
+	*      if (it.hasNext())
+	*      {
+	*          RecipientInformation   recipient = (RecipientInformation)it.next();
+	*
+	*          CMSTypedStream recData = recipient.getContentStream(privateKey, "BC");
+	*
+	*          processDataStream(recData.getContentStream());
+	*
+	*          if (!Arrays.equals(ad.getMac(), recipient.getMac())
+	*          {
+	*              System.err.println("Data corrupted!!!!");
+	*          }
+	*      }
+	*  
+ * Note: this class does not introduce buffering - if you are processing large files you should create + * the parser with: + *
+	*          CMSAuthenticatedDataParser     ep = new CMSAuthenticatedDataParser(new BufferedInputStream(inputStream, bufSize));
+	*  
+ * where bufSize is a suitably large buffer size. + *

+ */ + public class CmsAuthenticatedDataParser + : CmsContentInfoParser + { + internal RecipientInformationStore _recipientInfoStore; + internal AuthenticatedDataParser authData; + + private AlgorithmIdentifier macAlg; + private byte[] mac; + private Asn1.Cms.AttributeTable authAttrs; + private Asn1.Cms.AttributeTable unauthAttrs; + + private bool authAttrNotRead; + private bool unauthAttrNotRead; + + public CmsAuthenticatedDataParser( + byte[] envelopedData) + : this(new MemoryStream(envelopedData, false)) + { + } + + public CmsAuthenticatedDataParser( + Stream envelopedData) + : base(envelopedData) + { + this.authAttrNotRead = true; + this.authData = new AuthenticatedDataParser( + (Asn1SequenceParser)contentInfo.GetContent(Asn1Tags.Sequence)); + + // TODO Validate version? + //DerInteger version = this.authData.getVersion(); + + // + // read the recipients + // + Asn1Set recipientInfos = Asn1Set.GetInstance(authData.GetRecipientInfos().ToAsn1Object()); + + this.macAlg = authData.GetMacAlgorithm(); + + // + // read the authenticated content info + // + ContentInfoParser data = authData.GetEnapsulatedContentInfo(); + CmsReadable readable = new CmsProcessableInputStream( + ((Asn1OctetStringParser)data.GetContent(Asn1Tags.OctetString)).GetOctetStream()); + CmsSecureReadable secureReadable = new CmsEnvelopedHelper.CmsAuthenticatedSecureReadable( + this.macAlg, readable); + + // + // build the RecipientInformationStore + // + this._recipientInfoStore = CmsEnvelopedHelper.BuildRecipientInformationStore( + recipientInfos, secureReadable); + } + + public AlgorithmIdentifier MacAlgorithmID + { + get { return macAlg; } + } + + /** + * return the object identifier for the mac algorithm. + */ + public string MacAlgOid + { + get { return macAlg.Algorithm.Id; } + } + + + /** + * return the ASN.1 encoded encryption algorithm parameters, or null if + * there aren't any. + */ + public Asn1Object MacAlgParams + { + get + { + Asn1Encodable ae = macAlg.Parameters; + + return ae == null ? null : ae.ToAsn1Object(); + } + } + + /** + * return a store of the intended recipients for this message + */ + public RecipientInformationStore GetRecipientInfos() + { + return _recipientInfoStore; + } + + public byte[] GetMac() + { + if (mac == null) + { + GetAuthAttrs(); + mac = authData.GetMac().GetOctets(); + } + return Arrays.Clone(mac); + } + + /** + * return a table of the unauthenticated attributes indexed by + * the OID of the attribute. + * @exception java.io.IOException + */ + public Asn1.Cms.AttributeTable GetAuthAttrs() + { + if (authAttrs == null && authAttrNotRead) + { + Asn1SetParser s = authData.GetAuthAttrs(); + + authAttrNotRead = false; + + if (s != null) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + IAsn1Convertible o; + while ((o = s.ReadObject()) != null) + { + Asn1SequenceParser seq = (Asn1SequenceParser)o; + + v.Add(seq.ToAsn1Object()); + } + + authAttrs = new Asn1.Cms.AttributeTable(new DerSet(v)); + } + } + + return authAttrs; + } + + /** + * return a table of the unauthenticated attributes indexed by + * the OID of the attribute. + * @exception java.io.IOException + */ + public Asn1.Cms.AttributeTable GetUnauthAttrs() + { + if (unauthAttrs == null && unauthAttrNotRead) + { + Asn1SetParser s = authData.GetUnauthAttrs(); + + unauthAttrNotRead = false; + + if (s != null) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + IAsn1Convertible o; + while ((o = s.ReadObject()) != null) + { + Asn1SequenceParser seq = (Asn1SequenceParser)o; + + v.Add(seq.ToAsn1Object()); + } + + unauthAttrs = new Asn1.Cms.AttributeTable(new DerSet(v)); + } + } + + return unauthAttrs; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs.meta new file mode 100644 index 00000000..34f53775 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 95648b9b5236b4b4aa03f9b0c3a75f88 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs new file mode 100644 index 00000000..72d1346f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs @@ -0,0 +1,278 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a CMS authenticated-data message stream. + *

+ * A simple example of usage. + *

+	*      CMSAuthenticatedDataStreamGenerator edGen = new CMSAuthenticatedDataStreamGenerator();
+	*
+	*      edGen.addKeyTransRecipient(cert);
+	*
+	*      ByteArrayOutputStream  bOut = new ByteArrayOutputStream();
+	*
+	*      OutputStream out = edGen.open(
+	*                              bOut, CMSAuthenticatedDataGenerator.AES128_CBC, "BC");*
+	*      out.write(data);
+	*
+	*      out.close();
+	* 
+ *

+ */ + public class CmsAuthenticatedDataStreamGenerator + : CmsAuthenticatedGenerator + { + // TODO Add support +// private object _originatorInfo = null; +// private object _unprotectedAttributes = null; + private int _bufferSize; + private bool _berEncodeRecipientSet; + + public CmsAuthenticatedDataStreamGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsAuthenticatedDataStreamGenerator(SecureRandom random) + : base(random) + { + } + + /** + * Set the underlying string size for encapsulated data + * + * @param bufferSize length of octet strings to buffer the data. + */ + public void SetBufferSize( + int bufferSize) + { + _bufferSize = bufferSize; + } + + /** + * Use a BER Set to store the recipient information + */ + public void SetBerEncodeRecipients( + bool berEncodeRecipientSet) + { + _berEncodeRecipientSet = berEncodeRecipientSet; + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data + * object using the given provider and the passed in key generator. + * @throws java.io.IOException + */ + private Stream Open( + Stream outStr, + string macOid, + CipherKeyGenerator keyGen) + { + // FIXME Will this work for macs? + byte[] encKeyBytes = keyGen.GenerateKey(); + KeyParameter encKey = ParameterUtilities.CreateKeyParameter(macOid, encKeyBytes); + + Asn1Encodable asn1Params = GenerateAsn1Parameters(macOid, encKeyBytes); + + ICipherParameters cipherParameters; + AlgorithmIdentifier macAlgId = GetAlgorithmIdentifier( + macOid, encKey, asn1Params, out cipherParameters); + + Asn1EncodableVector recipientInfos = new Asn1EncodableVector(); + + foreach (RecipientInfoGenerator rig in recipientInfoGenerators) + { + try + { + recipientInfos.Add(rig.Generate(encKey, m_random)); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for algorithm.", e); + } + catch (GeneralSecurityException e) + { + throw new CmsException("error making encrypted content.", e); + } + } + + // FIXME Only passing key at the moment +// return Open(outStr, macAlgId, cipherParameters, recipientInfos); + return Open(outStr, macAlgId, encKey, recipientInfos); + } + + protected Stream Open( + Stream outStr, + AlgorithmIdentifier macAlgId, + ICipherParameters cipherParameters, + Asn1EncodableVector recipientInfos) + { + try + { + // + // ContentInfo + // + BerSequenceGenerator cGen = new BerSequenceGenerator(outStr); + + cGen.AddObject(CmsObjectIdentifiers.AuthenticatedData); + + // + // Authenticated Data + // + BerSequenceGenerator authGen = new BerSequenceGenerator( + cGen.GetRawOutputStream(), 0, true); + + authGen.AddObject(new DerInteger(AuthenticatedData.CalculateVersion(null))); + + Stream authRaw = authGen.GetRawOutputStream(); + Asn1Generator recipGen = _berEncodeRecipientSet + ? (Asn1Generator) new BerSetGenerator(authRaw) + : new DerSetGenerator(authRaw); + + foreach (Asn1Encodable ae in recipientInfos) + { + recipGen.AddObject(ae); + } + + recipGen.Close(); + + authGen.AddObject(macAlgId); + + BerSequenceGenerator eiGen = new BerSequenceGenerator(authRaw); + eiGen.AddObject(CmsObjectIdentifiers.Data); + + Stream octetOutputStream = CmsUtilities.CreateBerOctetOutputStream( + eiGen.GetRawOutputStream(), 0, true, _bufferSize); + + IMac mac = MacUtilities.GetMac(macAlgId.Algorithm); + // TODO Confirm no ParametersWithRandom needed + mac.Init(cipherParameters); + Stream mOut = new TeeOutputStream(octetOutputStream, new MacSink(mac)); + + return new CmsAuthenticatedDataOutputStream(mOut, mac, cGen, authGen, eiGen); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("exception decoding algorithm parameters.", e); + } + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data object + */ + public Stream Open( + Stream outStr, + string encryptionOid) + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keyGen.DefaultStrength)); + + return Open(outStr, encryptionOid, keyGen); + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data object + */ + public Stream Open( + Stream outStr, + string encryptionOid, + int keySize) + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keySize)); + + return Open(outStr, encryptionOid, keyGen); + } + + private class CmsAuthenticatedDataOutputStream + : BaseOutputStream + { + private readonly Stream macStream; + private readonly IMac mac; + private readonly BerSequenceGenerator cGen; + private readonly BerSequenceGenerator authGen; + private readonly BerSequenceGenerator eiGen; + + public CmsAuthenticatedDataOutputStream( + Stream macStream, + IMac mac, + BerSequenceGenerator cGen, + BerSequenceGenerator authGen, + BerSequenceGenerator eiGen) + { + this.macStream = macStream; + this.mac = mac; + this.cGen = cGen; + this.authGen = authGen; + this.eiGen = eiGen; + } + + public override void Write(byte[] buffer, int offset, int count) + { + macStream.Write(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + macStream.Write(buffer); + } +#endif + + public override void WriteByte(byte value) + { + macStream.WriteByte(value); + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + macStream.Dispose(); + + // TODO Parent context(s) should really be be closed explicitly + + eiGen.Close(); + + // [TODO] auth attributes go here + byte[] macOctets = MacUtilities.DoFinal(mac); + authGen.AddObject(new DerOctetString(macOctets)); + // [TODO] unauth attributes go here + + authGen.Close(); + cGen.Close(); + } + base.Dispose(disposing); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs.meta new file mode 100644 index 00000000..0bbaeae5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6fb5b483ab0440249a2819f3563513cd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedDataStreamGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs new file mode 100644 index 00000000..fa34c7cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class CmsAuthenticatedGenerator + : CmsEnvelopedGenerator + { + public CmsAuthenticatedGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsAuthenticatedGenerator(SecureRandom random) + : base(random) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs.meta new file mode 100644 index 00000000..4a4ea710 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 53a33dbe3f29a674d874fd853b9f018a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSAuthenticatedGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs new file mode 100644 index 00000000..6b102536 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Compression; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * containing class for an CMS Compressed Data object + */ + public class CmsCompressedData + { + internal ContentInfo contentInfo; + + public CmsCompressedData( + byte[] compressedData) + : this(CmsUtilities.ReadContentInfo(compressedData)) + { + } + + public CmsCompressedData( + Stream compressedDataStream) + : this(CmsUtilities.ReadContentInfo(compressedDataStream)) + { + } + + public CmsCompressedData( + ContentInfo contentInfo) + { + this.contentInfo = contentInfo; + } + + /** + * Return the uncompressed content. + * + * @return the uncompressed content + * @throws CmsException if there is an exception uncompressing the data. + */ + public byte[] GetContent() + { + CompressedData comData = CompressedData.GetInstance(contentInfo.Content); + ContentInfo content = comData.EncapContentInfo; + + Asn1OctetString bytes = (Asn1OctetString) content.Content; + Stream zIn = ZLib.DecompressInput(bytes.GetOctetStream()); + + try + { + return CmsUtilities.StreamToByteArray(zIn); + } + catch (IOException e) + { + throw new CmsException("exception reading compressed stream.", e); + } + finally + { + zIn.Dispose(); + } + } + + /** + * Return the uncompressed content, throwing an exception if the data size + * is greater than the passed in limit. If the content is exceeded getCause() + * on the CMSException will contain a StreamOverflowException + * + * @param limit maximum number of bytes to read + * @return the content read + * @throws CMSException if there is an exception uncompressing the data. + */ + public byte[] GetContent(int limit) + { + CompressedData comData = CompressedData.GetInstance(contentInfo.Content); + ContentInfo content = comData.EncapContentInfo; + + Asn1OctetString bytes = (Asn1OctetString)content.Content; + Stream zIn = ZLib.DecompressInput(bytes.GetOctetStream()); + + try + { + return CmsUtilities.StreamToByteArray(zIn, limit); + } + catch (IOException e) + { + throw new CmsException("exception reading compressed stream.", e); + } + } + + /** + * return the ContentInfo + */ + public ContentInfo ContentInfo + { + get { return contentInfo; } + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return contentInfo.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs.meta new file mode 100644 index 00000000..7c6944ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10f6e517565a097428e368254f0aad47 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs new file mode 100644 index 00000000..7ea6d916 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a compressed CMS message. + *

+ * A simple example of usage.

+ *

+ *

+    *      CMSCompressedDataGenerator fact = new CMSCompressedDataGenerator();
+    *      CMSCompressedData data = fact.Generate(content, algorithm);
+    * 
+ *

+ */ + public class CmsCompressedDataGenerator + { + public static readonly string ZLib = CmsObjectIdentifiers.ZlibCompress.Id; + + public CmsCompressedDataGenerator() + { + } + + /** + * Generate an object that contains an CMS Compressed Data + */ + public CmsCompressedData Generate(CmsProcessable content, string compressionOid) + { + if (ZLib != compressionOid) + throw new ArgumentException("Unsupported compression algorithm: " + compressionOid, + nameof(compressionOid)); + + AlgorithmIdentifier comAlgId; + Asn1OctetString comOcts; + + try + { + MemoryStream bOut = new MemoryStream(); + + using (var zOut = Utilities.IO.Compression.ZLib.CompressOutput(bOut, -1)) + { + content.Write(zOut); + } + + comAlgId = new AlgorithmIdentifier(CmsObjectIdentifiers.ZlibCompress); + comOcts = new BerOctetString(bOut.ToArray()); + } + catch (IOException e) + { + throw new CmsException("exception encoding data.", e); + } + + ContentInfo comContent = new ContentInfo(CmsObjectIdentifiers.Data, comOcts); + ContentInfo contentInfo = new ContentInfo( + CmsObjectIdentifiers.CompressedData, + new CompressedData(comAlgId, comContent)); + + return new CmsCompressedData(contentInfo); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs.meta new file mode 100644 index 00000000..75f108fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 158de0bc0c369f54b99e9d3e3f175d99 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs new file mode 100644 index 00000000..6ce9cef3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Compression; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Class for reading a CMS Compressed Data stream. + *
+    *     CMSCompressedDataParser cp = new CMSCompressedDataParser(inputStream);
+    *
+    *     process(cp.GetContent().GetContentStream());
+    * 
+ * Note: this class does not introduce buffering - if you are processing large files you should create + * the parser with: + *
+    *      CMSCompressedDataParser     ep = new CMSCompressedDataParser(new BufferedInputStream(inputStream, bufSize));
+    *  
+ * where bufSize is a suitably large buffer size. + */ + public class CmsCompressedDataParser + : CmsContentInfoParser + { + public CmsCompressedDataParser( + byte[] compressedData) + : this(new MemoryStream(compressedData, false)) + { + } + + public CmsCompressedDataParser( + Stream compressedData) + : base(compressedData) + { + } + + public CmsTypedStream GetContent() + { + try + { + CompressedDataParser comData = new CompressedDataParser((Asn1SequenceParser)this.contentInfo.GetContent(Asn1Tags.Sequence)); + ContentInfoParser content = comData.GetEncapContentInfo(); + + Asn1OctetStringParser bytes = (Asn1OctetStringParser)content.GetContent(Asn1Tags.OctetString); + Stream zIn = ZLib.DecompressInput(bytes.GetOctetStream()); + + return new CmsTypedStream(content.ContentType.ToString(), zIn); + } + catch (IOException e) + { + throw new CmsException("IOException reading compressed content.", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs.meta new file mode 100644 index 00000000..7a3988db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: be730886476da2f49814420c94394e91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs new file mode 100644 index 00000000..3390410c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs @@ -0,0 +1,154 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a compressed CMS message stream. + *

+ * A simple example of usage. + *

+ *
+	*      CMSCompressedDataStreamGenerator gen = new CMSCompressedDataStreamGenerator();
+	*
+	*      Stream cOut = gen.Open(outputStream, CMSCompressedDataStreamGenerator.ZLIB);
+	*
+	*      cOut.Write(data);
+	*
+	*      cOut.Close();
+	* 
+ */ + public class CmsCompressedDataStreamGenerator + { + public static readonly string ZLib = CmsObjectIdentifiers.ZlibCompress.Id; + + private int _bufferSize; + + /** + * base constructor + */ + public CmsCompressedDataStreamGenerator() + { + } + + /** + * Set the underlying string size for encapsulated data + * + * @param bufferSize length of octet strings to buffer the data. + */ + public void SetBufferSize(int bufferSize) + { + _bufferSize = bufferSize; + } + + public Stream Open(Stream outStream) + { + return Open(outStream, CmsObjectIdentifiers.Data.Id, ZLib); + } + + public Stream Open(Stream outStream, string compressionOid) + { + return Open(outStream, CmsObjectIdentifiers.Data.Id, compressionOid); + } + + public Stream Open(Stream outStream, string contentOid, string compressionOid) + { + if (ZLib != compressionOid) + throw new ArgumentException("Unsupported compression algorithm: " + compressionOid, + nameof(compressionOid)); + + BerSequenceGenerator sGen = new BerSequenceGenerator(outStream); + + sGen.AddObject(CmsObjectIdentifiers.CompressedData); + + // + // Compressed Data + // + BerSequenceGenerator cGen = new BerSequenceGenerator( + sGen.GetRawOutputStream(), 0, true); + + // CMSVersion + cGen.AddObject(new DerInteger(0)); + + // CompressionAlgorithmIdentifier + cGen.AddObject(new AlgorithmIdentifier(CmsObjectIdentifiers.ZlibCompress)); + + // + // Encapsulated ContentInfo + // + BerSequenceGenerator eiGen = new BerSequenceGenerator(cGen.GetRawOutputStream()); + + eiGen.AddObject(new DerObjectIdentifier(contentOid)); + + Stream octetStream = CmsUtilities.CreateBerOctetOutputStream( + eiGen.GetRawOutputStream(), 0, true, _bufferSize); + + return new CmsCompressedOutputStream( + Utilities.IO.Compression.ZLib.CompressOutput(octetStream, -1), sGen, cGen, eiGen); + } + + private class CmsCompressedOutputStream + : BaseOutputStream + { + private Stream _out; + private BerSequenceGenerator _sGen; + private BerSequenceGenerator _cGen; + private BerSequenceGenerator _eiGen; + + internal CmsCompressedOutputStream( + Stream outStream, + BerSequenceGenerator sGen, + BerSequenceGenerator cGen, + BerSequenceGenerator eiGen) + { + _out = outStream; + _sGen = sGen; + _cGen = cGen; + _eiGen = eiGen; + } + + public override void Write(byte[] buffer, int offset, int count) + { + _out.Write(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + _out.Write(buffer); + } +#endif + + public override void WriteByte(byte value) + { + _out.WriteByte(value); + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + _out.Dispose(); + + // TODO Parent context(s) should really be be closed explicitly + + _eiGen.Close(); + _cGen.Close(); + _sGen.Close(); + } + base.Dispose(disposing); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs.meta new file mode 100644 index 00000000..4e123fbe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9facf6599405875498d185ce4a1100c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSCompressedDataStreamGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs new file mode 100644 index 00000000..51549c21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs @@ -0,0 +1,52 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class CmsContentInfoParser + { + protected ContentInfoParser contentInfo; + protected Stream data; + + protected CmsContentInfoParser( + Stream data) + { + if (data == null) + throw new ArgumentNullException("data"); + + this.data = data; + + try + { + Asn1StreamParser inStream = new Asn1StreamParser(data); + + this.contentInfo = new ContentInfoParser((Asn1SequenceParser)inStream.ReadObject()); + } + catch (IOException e) + { + throw new CmsException("IOException reading content.", e); + } + catch (InvalidCastException e) + { + throw new CmsException("Unexpected object reading content.", e); + } + } + + /** + * Close the underlying data stream. + * @throws IOException if the close fails. + */ + public void Close() + { + data.Dispose(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs.meta new file mode 100644 index 00000000..f31236cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32f14f09031fe3e419292433deeebad6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSContentInfoParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs new file mode 100644 index 00000000..c76d2b6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * containing class for an CMS Enveloped Data object + */ + public class CmsEnvelopedData + { + internal RecipientInformationStore recipientInfoStore; + internal ContentInfo contentInfo; + + private AlgorithmIdentifier encAlg; + private Asn1Set unprotectedAttributes; + + public CmsEnvelopedData( + byte[] envelopedData) + : this(CmsUtilities.ReadContentInfo(envelopedData)) + { + } + + public CmsEnvelopedData( + Stream envelopedData) + : this(CmsUtilities.ReadContentInfo(envelopedData)) + { + } + + public CmsEnvelopedData( + ContentInfo contentInfo) + { + this.contentInfo = contentInfo; + + EnvelopedData envData = EnvelopedData.GetInstance(contentInfo.Content); + + // + // read the recipients + // + Asn1Set recipientInfos = envData.RecipientInfos; + + // + // read the encrypted content info + // + EncryptedContentInfo encInfo = envData.EncryptedContentInfo; + this.encAlg = encInfo.ContentEncryptionAlgorithm; + CmsReadable readable = new CmsProcessableByteArray(encInfo.EncryptedContent.GetOctets()); + CmsSecureReadable secureReadable = new CmsEnvelopedHelper.CmsEnvelopedSecureReadable( + this.encAlg, readable); + + // + // build the RecipientInformationStore + // + this.recipientInfoStore = CmsEnvelopedHelper.BuildRecipientInformationStore( + recipientInfos, secureReadable); + + this.unprotectedAttributes = envData.UnprotectedAttrs; + } + + public AlgorithmIdentifier EncryptionAlgorithmID + { + get { return encAlg; } + } + + /** + * return the object identifier for the content encryption algorithm. + */ + public string EncryptionAlgOid + { + get { return encAlg.Algorithm.Id; } + } + + /** + * return a store of the intended recipients for this message + */ + public RecipientInformationStore GetRecipientInfos() + { + return recipientInfoStore; + } + + /** + * return the ContentInfo + */ + public ContentInfo ContentInfo + { + get { return contentInfo; } + } + + /** + * return a table of the unprotected attributes indexed by + * the OID of the attribute. + */ + public Asn1.Cms.AttributeTable GetUnprotectedAttributes() + { + if (unprotectedAttributes == null) + return null; + + return new Asn1.Cms.AttributeTable(unprotectedAttributes); + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return contentInfo.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs.meta new file mode 100644 index 00000000..45cf3dde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79a5a0a284b681541ab4989a779016bf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs new file mode 100644 index 00000000..ebfeaa04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs @@ -0,0 +1,246 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /// + /// General class for generating a CMS enveloped-data message. + /// + /// A simple example of usage. + /// + ///
+    ///      CmsEnvelopedDataGenerator  fact = new CmsEnvelopedDataGenerator();
+    ///
+    ///      fact.AddKeyTransRecipient(cert);
+    ///
+    ///      CmsEnvelopedData         data = fact.Generate(content, algorithm);
+    /// 
+ ///
+ public class CmsEnvelopedDataGenerator + : CmsEnvelopedGenerator + { + public CmsEnvelopedDataGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsEnvelopedDataGenerator(SecureRandom random) + : base(random) + { + } + + /// + /// Generate an enveloped object that contains a CMS Enveloped Data + /// object using the passed in key generator. + /// + private CmsEnvelopedData Generate( + CmsProcessable content, + string encryptionOid, + CipherKeyGenerator keyGen) + { + AlgorithmIdentifier encAlgId = null; + KeyParameter encKey; + Asn1OctetString encContent; + + try + { + byte[] encKeyBytes = keyGen.GenerateKey(); + encKey = ParameterUtilities.CreateKeyParameter(encryptionOid, encKeyBytes); + + Asn1Encodable asn1Params = GenerateAsn1Parameters(encryptionOid, encKeyBytes); + + ICipherParameters cipherParameters; + encAlgId = GetAlgorithmIdentifier( + encryptionOid, encKey, asn1Params, out cipherParameters); + + IBufferedCipher cipher = CipherUtilities.GetCipher(encryptionOid); + cipher.Init(true, new ParametersWithRandom(cipherParameters, m_random)); + + MemoryStream bOut = new MemoryStream(); + using (var cOut = new CipherStream(bOut, null, cipher)) + { + content.Write(cOut); + } + + encContent = new BerOctetString(bOut.ToArray()); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("exception decoding algorithm parameters.", e); + } + + + Asn1EncodableVector recipientInfos = new Asn1EncodableVector(); + + foreach (RecipientInfoGenerator rig in recipientInfoGenerators) + { + try + { + recipientInfos.Add(rig.Generate(encKey, m_random)); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for algorithm.", e); + } + catch (GeneralSecurityException e) + { + throw new CmsException("error making encrypted content.", e); + } + } + + EncryptedContentInfo eci = new EncryptedContentInfo( + CmsObjectIdentifiers.Data, + encAlgId, + encContent); + + Asn1Set unprotectedAttrSet = null; + if (unprotectedAttributeGenerator != null) + { + Asn1.Cms.AttributeTable attrTable = unprotectedAttributeGenerator.GetAttributes( + new Dictionary()); + + unprotectedAttrSet = new BerSet(attrTable.ToAsn1EncodableVector()); + } + + ContentInfo contentInfo = new ContentInfo( + CmsObjectIdentifiers.EnvelopedData, + new EnvelopedData(null, new DerSet(recipientInfos), eci, unprotectedAttrSet)); + + return new CmsEnvelopedData(contentInfo); + } + + /// Generate an enveloped object that contains an CMS Enveloped Data object. + public CmsEnvelopedData Generate( + CmsProcessable content, + string encryptionOid) + { + try + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keyGen.DefaultStrength)); + + return Generate(content, encryptionOid, keyGen); + } + catch (SecurityUtilityException e) + { + throw new CmsException("can't find key generation algorithm.", e); + } + } + + + public CmsEnvelopedData Generate(CmsProcessable content, ICipherBuilderWithKey cipherBuilder) + { + //AlgorithmIdentifier encAlgId = null; + KeyParameter encKey; + Asn1OctetString encContent; + + try + { + encKey = (KeyParameter) cipherBuilder.Key; + + MemoryStream collector = new MemoryStream(); + var cipher = cipherBuilder.BuildCipher(collector); + using (var bOut = cipher.Stream) + { + content.Write(bOut); + } + + encContent = new BerOctetString(collector.ToArray()); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("exception decoding algorithm parameters.", e); + } + + + Asn1EncodableVector recipientInfos = new Asn1EncodableVector(); + + foreach (RecipientInfoGenerator rig in recipientInfoGenerators) + { + try + { + recipientInfos.Add(rig.Generate(encKey, m_random)); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for algorithm.", e); + } + catch (GeneralSecurityException e) + { + throw new CmsException("error making encrypted content.", e); + } + } + + EncryptedContentInfo eci = new EncryptedContentInfo( + CmsObjectIdentifiers.Data, + (AlgorithmIdentifier) cipherBuilder.AlgorithmDetails, + encContent); + + Asn1Set unprotectedAttrSet = null; + if (unprotectedAttributeGenerator != null) + { + Asn1.Cms.AttributeTable attrTable = unprotectedAttributeGenerator.GetAttributes( + new Dictionary()); + + unprotectedAttrSet = new BerSet(attrTable.ToAsn1EncodableVector()); + } + + ContentInfo contentInfo = new ContentInfo( + CmsObjectIdentifiers.EnvelopedData, + new EnvelopedData(null, new DerSet(recipientInfos), eci, unprotectedAttrSet)); + + return new CmsEnvelopedData(contentInfo); + } + + /// Generate an enveloped object that contains an CMS Enveloped Data object. + public CmsEnvelopedData Generate( + CmsProcessable content, + string encryptionOid, + int keySize) + { + try + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keySize)); + + return Generate(content, encryptionOid, keyGen); + } + catch (SecurityUtilityException e) + { + throw new CmsException("can't find key generation algorithm.", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs.meta new file mode 100644 index 00000000..2fa06233 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 84cd9ec96847d5c4f955b9c64028b1c8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs new file mode 100644 index 00000000..03c054a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Parsing class for an CMS Enveloped Data object from an input stream. + *

+ * Note: that because we are in a streaming mode only one recipient can be tried and it is important + * that the methods on the parser are called in the appropriate order. + *

+ *

+ * Example of use - assuming the first recipient matches the private key we have. + *

+	*      CmsEnvelopedDataParser     ep = new CmsEnvelopedDataParser(inputStream);
+	*
+	*      RecipientInformationStore  recipients = ep.GetRecipientInfos();
+	*
+	*      Collection  c = recipients.getRecipients();
+	*      Iterator    it = c.iterator();
+	*
+	*      if (it.hasNext())
+	*      {
+	*          RecipientInformation   recipient = (RecipientInformation)it.next();
+	*
+	*          CMSTypedStream recData = recipient.getContentStream(privateKey);
+	*
+	*          processDataStream(recData.getContentStream());
+	*      }
+	*  
+ * Note: this class does not introduce buffering - if you are processing large files you should create + * the parser with: + *
+	*          CmsEnvelopedDataParser     ep = new CmsEnvelopedDataParser(new BufferedInputStream(inputStream, bufSize));
+	*  
+ * where bufSize is a suitably large buffer size. + *

+ */ + public class CmsEnvelopedDataParser + : CmsContentInfoParser + { + internal RecipientInformationStore recipientInfoStore; + internal EnvelopedDataParser envelopedData; + + private AlgorithmIdentifier _encAlg; + private Asn1.Cms.AttributeTable _unprotectedAttributes; + private bool _attrNotRead; + + public CmsEnvelopedDataParser( + byte[] envelopedData) + : this(new MemoryStream(envelopedData, false)) + { + } + + public CmsEnvelopedDataParser( + Stream envelopedData) + : base(envelopedData) + { + this._attrNotRead = true; + this.envelopedData = new EnvelopedDataParser( + (Asn1SequenceParser)this.contentInfo.GetContent(Asn1Tags.Sequence)); + + // TODO Validate version? + //DerInteger version = this.envelopedData.Version; + + // + // read the recipients + // + Asn1Set recipientInfos = Asn1Set.GetInstance(this.envelopedData.GetRecipientInfos().ToAsn1Object()); + + // + // read the encrypted content info + // + EncryptedContentInfoParser encInfo = this.envelopedData.GetEncryptedContentInfo(); + this._encAlg = encInfo.ContentEncryptionAlgorithm; + CmsReadable readable = new CmsProcessableInputStream( + ((Asn1OctetStringParser)encInfo.GetEncryptedContent(Asn1Tags.OctetString)).GetOctetStream()); + CmsSecureReadable secureReadable = new CmsEnvelopedHelper.CmsEnvelopedSecureReadable( + this._encAlg, readable); + + // + // build the RecipientInformationStore + // + this.recipientInfoStore = CmsEnvelopedHelper.BuildRecipientInformationStore( + recipientInfos, secureReadable); + } + + public AlgorithmIdentifier EncryptionAlgorithmID + { + get { return _encAlg; } + } + + /** + * return the object identifier for the content encryption algorithm. + */ + public string EncryptionAlgOid + { + get { return _encAlg.Algorithm.Id; } + } + + /** + * return the ASN.1 encoded encryption algorithm parameters, or null if + * there aren't any. + */ + public Asn1Object EncryptionAlgParams + { + get + { + Asn1Encodable ae = _encAlg.Parameters; + + return ae == null ? null : ae.ToAsn1Object(); + } + } + + /** + * return a store of the intended recipients for this message + */ + public RecipientInformationStore GetRecipientInfos() + { + return this.recipientInfoStore; + } + + /** + * return a table of the unprotected attributes indexed by + * the OID of the attribute. + * @throws IOException + */ + public Asn1.Cms.AttributeTable GetUnprotectedAttributes() + { + if (_unprotectedAttributes == null && _attrNotRead) + { + Asn1SetParser asn1Set = this.envelopedData.GetUnprotectedAttrs(); + + _attrNotRead = false; + + if (asn1Set != null) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + IAsn1Convertible o; + + while ((o = asn1Set.ReadObject()) != null) + { + Asn1SequenceParser seq = (Asn1SequenceParser)o; + + v.Add(seq.ToAsn1Object()); + } + + _unprotectedAttributes = new Asn1.Cms.AttributeTable(new DerSet(v)); + } + } + + return _unprotectedAttributes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs.meta new file mode 100644 index 00000000..54cd68cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: accc6770066b7214c803b0d593600a71 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs new file mode 100644 index 00000000..ad4ecdb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs @@ -0,0 +1,286 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a CMS enveloped-data message stream. + *

+ * A simple example of usage. + *

+	*      CmsEnvelopedDataStreamGenerator edGen = new CmsEnvelopedDataStreamGenerator();
+	*
+	*      edGen.AddKeyTransRecipient(cert);
+	*
+	*      MemoryStream  bOut = new MemoryStream();
+	*
+	*      Stream out = edGen.Open(
+	*                              bOut, CMSEnvelopedDataGenerator.AES128_CBC);*
+	*      out.Write(data);
+	*
+	*      out.Close();
+	* 
+ *

+ */ + public class CmsEnvelopedDataStreamGenerator + : CmsEnvelopedGenerator + { + private object _originatorInfo = null; + private object _unprotectedAttributes = null; + private int _bufferSize; + private bool _berEncodeRecipientSet; + + public CmsEnvelopedDataStreamGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsEnvelopedDataStreamGenerator(SecureRandom random) + : base(random) + { + } + + /// Set the underlying string size for encapsulated data. + /// Length of octet strings to buffer the data. + public void SetBufferSize( + int bufferSize) + { + _bufferSize = bufferSize; + } + + /// Use a BER Set to store the recipient information. + public void SetBerEncodeRecipients( + bool berEncodeRecipientSet) + { + _berEncodeRecipientSet = berEncodeRecipientSet; + } + + private DerInteger Version + { + get + { + int version = (_originatorInfo != null || _unprotectedAttributes != null) + ? 2 + : 0; + + return new DerInteger(version); + } + } + + /// + /// Generate an enveloped object that contains an CMS Enveloped Data + /// object using the passed in key generator. + /// + private Stream Open( + Stream outStream, + string encryptionOid, + CipherKeyGenerator keyGen) + { + byte[] encKeyBytes = keyGen.GenerateKey(); + KeyParameter encKey = ParameterUtilities.CreateKeyParameter(encryptionOid, encKeyBytes); + + Asn1Encodable asn1Params = GenerateAsn1Parameters(encryptionOid, encKeyBytes); + + ICipherParameters cipherParameters; + AlgorithmIdentifier encAlgID = GetAlgorithmIdentifier( + encryptionOid, encKey, asn1Params, out cipherParameters); + + Asn1EncodableVector recipientInfos = new Asn1EncodableVector(); + + foreach (RecipientInfoGenerator rig in recipientInfoGenerators) + { + try + { + recipientInfos.Add(rig.Generate(encKey, m_random)); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for algorithm.", e); + } + catch (GeneralSecurityException e) + { + throw new CmsException("error making encrypted content.", e); + } + } + + return Open(outStream, encAlgID, cipherParameters, recipientInfos); + } + + private Stream Open( + Stream outStream, + AlgorithmIdentifier encAlgID, + ICipherParameters cipherParameters, + Asn1EncodableVector recipientInfos) + { + try + { + // + // ContentInfo + // + BerSequenceGenerator cGen = new BerSequenceGenerator(outStream); + + cGen.AddObject(CmsObjectIdentifiers.EnvelopedData); + + // + // Encrypted Data + // + BerSequenceGenerator envGen = new BerSequenceGenerator( + cGen.GetRawOutputStream(), 0, true); + + envGen.AddObject(this.Version); + + Stream envRaw = envGen.GetRawOutputStream(); + Asn1Generator recipGen = _berEncodeRecipientSet + ? (Asn1Generator) new BerSetGenerator(envRaw) + : new DerSetGenerator(envRaw); + + foreach (Asn1Encodable ae in recipientInfos) + { + recipGen.AddObject(ae); + } + + recipGen.Close(); + + BerSequenceGenerator eiGen = new BerSequenceGenerator(envRaw); + eiGen.AddObject(CmsObjectIdentifiers.Data); + eiGen.AddObject(encAlgID); + + Stream octetOutputStream = CmsUtilities.CreateBerOctetOutputStream( + eiGen.GetRawOutputStream(), 0, false, _bufferSize); + + IBufferedCipher cipher = CipherUtilities.GetCipher(encAlgID.Algorithm); + cipher.Init(true, new ParametersWithRandom(cipherParameters, m_random)); + CipherStream cOut = new CipherStream(octetOutputStream, null, cipher); + + return new CmsEnvelopedDataOutputStream(this, cOut, cGen, envGen, eiGen); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("exception decoding algorithm parameters.", e); + } + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data object + * @throws IOException + */ + public Stream Open( + Stream outStream, + string encryptionOid) + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keyGen.DefaultStrength)); + + return Open(outStream, encryptionOid, keyGen); + } + + /** + * generate an enveloped object that contains an CMS Enveloped Data object + * @throws IOException + */ + public Stream Open( + Stream outStream, + string encryptionOid, + int keySize) + { + CipherKeyGenerator keyGen = GeneratorUtilities.GetKeyGenerator(encryptionOid); + + keyGen.Init(new KeyGenerationParameters(m_random, keySize)); + + return Open(outStream, encryptionOid, keyGen); + } + + private class CmsEnvelopedDataOutputStream + : BaseOutputStream + { + private readonly CmsEnvelopedGenerator _outer; + + private readonly CipherStream _out; + private readonly BerSequenceGenerator _cGen; + private readonly BerSequenceGenerator _envGen; + private readonly BerSequenceGenerator _eiGen; + + public CmsEnvelopedDataOutputStream( + CmsEnvelopedGenerator outer, + CipherStream outStream, + BerSequenceGenerator cGen, + BerSequenceGenerator envGen, + BerSequenceGenerator eiGen) + { + _outer = outer; + _out = outStream; + _cGen = cGen; + _envGen = envGen; + _eiGen = eiGen; + } + + public override void Write(byte[] buffer, int offset, int count) + { + _out.Write(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + _out.Write(buffer); + } +#endif + + public override void WriteByte(byte value) + { + _out.WriteByte(value); + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + _out.Dispose(); + + // TODO Parent context(s) should really be closed explicitly + + _eiGen.Close(); + + if (_outer.unprotectedAttributeGenerator != null) + { + Asn1.Cms.AttributeTable attrTable = _outer.unprotectedAttributeGenerator.GetAttributes( + new Dictionary()); + + Asn1Set unprotectedAttrs = new BerSet(attrTable.ToAsn1EncodableVector()); + + _envGen.AddObject(new DerTaggedObject(false, 1, unprotectedAttrs)); + } + + _envGen.Close(); + _cGen.Close(); + } + base.Dispose(disposing); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs.meta new file mode 100644 index 00000000..7923b885 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6a6f248b0ebc050428a4172e4f7a95b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedDataStreamGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs new file mode 100644 index 00000000..d136ef4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs @@ -0,0 +1,343 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a CMS enveloped-data message. + * + * A simple example of usage. + * + *
+	*      CMSEnvelopedDataGenerator  fact = new CMSEnvelopedDataGenerator();
+	*
+	*      fact.addKeyTransRecipient(cert);
+	*
+	*      CMSEnvelopedData         data = fact.generate(content, algorithm, "BC");
+	* 
+ */ + public abstract class CmsEnvelopedGenerator + { + // Note: These tables are complementary: If rc2Table[i]==j, then rc2Ekb[j]==i + internal static readonly short[] rc2Table = + { + 0xbd, 0x56, 0xea, 0xf2, 0xa2, 0xf1, 0xac, 0x2a, 0xb0, 0x93, 0xd1, 0x9c, 0x1b, 0x33, 0xfd, 0xd0, + 0x30, 0x04, 0xb6, 0xdc, 0x7d, 0xdf, 0x32, 0x4b, 0xf7, 0xcb, 0x45, 0x9b, 0x31, 0xbb, 0x21, 0x5a, + 0x41, 0x9f, 0xe1, 0xd9, 0x4a, 0x4d, 0x9e, 0xda, 0xa0, 0x68, 0x2c, 0xc3, 0x27, 0x5f, 0x80, 0x36, + 0x3e, 0xee, 0xfb, 0x95, 0x1a, 0xfe, 0xce, 0xa8, 0x34, 0xa9, 0x13, 0xf0, 0xa6, 0x3f, 0xd8, 0x0c, + 0x78, 0x24, 0xaf, 0x23, 0x52, 0xc1, 0x67, 0x17, 0xf5, 0x66, 0x90, 0xe7, 0xe8, 0x07, 0xb8, 0x60, + 0x48, 0xe6, 0x1e, 0x53, 0xf3, 0x92, 0xa4, 0x72, 0x8c, 0x08, 0x15, 0x6e, 0x86, 0x00, 0x84, 0xfa, + 0xf4, 0x7f, 0x8a, 0x42, 0x19, 0xf6, 0xdb, 0xcd, 0x14, 0x8d, 0x50, 0x12, 0xba, 0x3c, 0x06, 0x4e, + 0xec, 0xb3, 0x35, 0x11, 0xa1, 0x88, 0x8e, 0x2b, 0x94, 0x99, 0xb7, 0x71, 0x74, 0xd3, 0xe4, 0xbf, + 0x3a, 0xde, 0x96, 0x0e, 0xbc, 0x0a, 0xed, 0x77, 0xfc, 0x37, 0x6b, 0x03, 0x79, 0x89, 0x62, 0xc6, + 0xd7, 0xc0, 0xd2, 0x7c, 0x6a, 0x8b, 0x22, 0xa3, 0x5b, 0x05, 0x5d, 0x02, 0x75, 0xd5, 0x61, 0xe3, + 0x18, 0x8f, 0x55, 0x51, 0xad, 0x1f, 0x0b, 0x5e, 0x85, 0xe5, 0xc2, 0x57, 0x63, 0xca, 0x3d, 0x6c, + 0xb4, 0xc5, 0xcc, 0x70, 0xb2, 0x91, 0x59, 0x0d, 0x47, 0x20, 0xc8, 0x4f, 0x58, 0xe0, 0x01, 0xe2, + 0x16, 0x38, 0xc4, 0x6f, 0x3b, 0x0f, 0x65, 0x46, 0xbe, 0x7e, 0x2d, 0x7b, 0x82, 0xf9, 0x40, 0xb5, + 0x1d, 0x73, 0xf8, 0xeb, 0x26, 0xc7, 0x87, 0x97, 0x25, 0x54, 0xb1, 0x28, 0xaa, 0x98, 0x9d, 0xa5, + 0x64, 0x6d, 0x7a, 0xd4, 0x10, 0x81, 0x44, 0xef, 0x49, 0xd6, 0xae, 0x2e, 0xdd, 0x76, 0x5c, 0x2f, + 0xa7, 0x1c, 0xc9, 0x09, 0x69, 0x9a, 0x83, 0xcf, 0x29, 0x39, 0xb9, 0xe9, 0x4c, 0xff, 0x43, 0xab + }; + +// internal static readonly short[] rc2Ekb = +// { +// 0x5d, 0xbe, 0x9b, 0x8b, 0x11, 0x99, 0x6e, 0x4d, 0x59, 0xf3, 0x85, 0xa6, 0x3f, 0xb7, 0x83, 0xc5, +// 0xe4, 0x73, 0x6b, 0x3a, 0x68, 0x5a, 0xc0, 0x47, 0xa0, 0x64, 0x34, 0x0c, 0xf1, 0xd0, 0x52, 0xa5, +// 0xb9, 0x1e, 0x96, 0x43, 0x41, 0xd8, 0xd4, 0x2c, 0xdb, 0xf8, 0x07, 0x77, 0x2a, 0xca, 0xeb, 0xef, +// 0x10, 0x1c, 0x16, 0x0d, 0x38, 0x72, 0x2f, 0x89, 0xc1, 0xf9, 0x80, 0xc4, 0x6d, 0xae, 0x30, 0x3d, +// 0xce, 0x20, 0x63, 0xfe, 0xe6, 0x1a, 0xc7, 0xb8, 0x50, 0xe8, 0x24, 0x17, 0xfc, 0x25, 0x6f, 0xbb, +// 0x6a, 0xa3, 0x44, 0x53, 0xd9, 0xa2, 0x01, 0xab, 0xbc, 0xb6, 0x1f, 0x98, 0xee, 0x9a, 0xa7, 0x2d, +// 0x4f, 0x9e, 0x8e, 0xac, 0xe0, 0xc6, 0x49, 0x46, 0x29, 0xf4, 0x94, 0x8a, 0xaf, 0xe1, 0x5b, 0xc3, +// 0xb3, 0x7b, 0x57, 0xd1, 0x7c, 0x9c, 0xed, 0x87, 0x40, 0x8c, 0xe2, 0xcb, 0x93, 0x14, 0xc9, 0x61, +// 0x2e, 0xe5, 0xcc, 0xf6, 0x5e, 0xa8, 0x5c, 0xd6, 0x75, 0x8d, 0x62, 0x95, 0x58, 0x69, 0x76, 0xa1, +// 0x4a, 0xb5, 0x55, 0x09, 0x78, 0x33, 0x82, 0xd7, 0xdd, 0x79, 0xf5, 0x1b, 0x0b, 0xde, 0x26, 0x21, +// 0x28, 0x74, 0x04, 0x97, 0x56, 0xdf, 0x3c, 0xf0, 0x37, 0x39, 0xdc, 0xff, 0x06, 0xa4, 0xea, 0x42, +// 0x08, 0xda, 0xb4, 0x71, 0xb0, 0xcf, 0x12, 0x7a, 0x4e, 0xfa, 0x6c, 0x1d, 0x84, 0x00, 0xc8, 0x7f, +// 0x91, 0x45, 0xaa, 0x2b, 0xc2, 0xb1, 0x8f, 0xd5, 0xba, 0xf2, 0xad, 0x19, 0xb2, 0x67, 0x36, 0xf7, +// 0x0f, 0x0a, 0x92, 0x7d, 0xe3, 0x9d, 0xe9, 0x90, 0x3e, 0x23, 0x27, 0x66, 0x13, 0xec, 0x81, 0x15, +// 0xbd, 0x22, 0xbf, 0x9f, 0x7e, 0xa9, 0x51, 0x4b, 0x4c, 0xfb, 0x02, 0xd3, 0x70, 0x86, 0x31, 0xe7, +// 0x3b, 0x05, 0x03, 0x54, 0x60, 0x48, 0x65, 0x18, 0xd2, 0xcd, 0x5f, 0x32, 0x88, 0x0e, 0x35, 0xfd +// }; + + + // TODO Create named constants for all of these + public static readonly string DesEde3Cbc = PkcsObjectIdentifiers.DesEde3Cbc.Id; + public static readonly string RC2Cbc = PkcsObjectIdentifiers.RC2Cbc.Id; + public const string IdeaCbc = "1.3.6.1.4.1.188.7.1.1.2"; + public const string Cast5Cbc = "1.2.840.113533.7.66.10"; + public static readonly string Aes128Cbc = NistObjectIdentifiers.IdAes128Cbc.Id; + public static readonly string Aes192Cbc = NistObjectIdentifiers.IdAes192Cbc.Id; + public static readonly string Aes256Cbc = NistObjectIdentifiers.IdAes256Cbc.Id; + public static readonly string Camellia128Cbc = NttObjectIdentifiers.IdCamellia128Cbc.Id; + public static readonly string Camellia192Cbc = NttObjectIdentifiers.IdCamellia192Cbc.Id; + public static readonly string Camellia256Cbc = NttObjectIdentifiers.IdCamellia256Cbc.Id; + public static readonly string SeedCbc = KisaObjectIdentifiers.IdSeedCbc.Id; + + public static readonly string DesEde3Wrap = PkcsObjectIdentifiers.IdAlgCms3DesWrap.Id; + public static readonly string Aes128Wrap = NistObjectIdentifiers.IdAes128Wrap.Id; + public static readonly string Aes192Wrap = NistObjectIdentifiers.IdAes192Wrap.Id; + public static readonly string Aes256Wrap = NistObjectIdentifiers.IdAes256Wrap.Id; + public static readonly string Camellia128Wrap = NttObjectIdentifiers.IdCamellia128Wrap.Id; + public static readonly string Camellia192Wrap = NttObjectIdentifiers.IdCamellia192Wrap.Id; + public static readonly string Camellia256Wrap = NttObjectIdentifiers.IdCamellia256Wrap.Id; + public static readonly string SeedWrap = KisaObjectIdentifiers.IdNpkiAppCmsSeedWrap.Id; + + public static readonly string ECDHSha1Kdf = X9ObjectIdentifiers.DHSinglePassStdDHSha1KdfScheme.Id; + public static readonly string ECMqvSha1Kdf = X9ObjectIdentifiers.MqvSinglePassSha1KdfScheme.Id; + + internal readonly IList recipientInfoGenerators = new List(); + internal readonly SecureRandom m_random; + + internal CmsAttributeTableGenerator unprotectedAttributeGenerator = null; + + protected CmsEnvelopedGenerator() + : this(CryptoServicesRegistrar.GetSecureRandom()) + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + protected CmsEnvelopedGenerator(SecureRandom random) + { + if (random == null) + throw new ArgumentNullException(nameof(random)); + + m_random = random; + } + + public CmsAttributeTableGenerator UnprotectedAttributeGenerator + { + get { return this.unprotectedAttributeGenerator; } + set { this.unprotectedAttributeGenerator = value; } + } + + /** + * add a recipient. + * + * @param cert recipient's public key certificate + * @exception ArgumentException if there is a problem with the certificate + */ + public void AddKeyTransRecipient( + X509Certificate cert) + { + TbsCertificateStructure recipientTbsCert = CmsUtilities.GetTbsCertificateStructure(cert); + SubjectPublicKeyInfo info = recipientTbsCert.SubjectPublicKeyInfo; + this.AddRecipientInfoGenerator(new KeyTransRecipientInfoGenerator(cert, new Asn1KeyWrapper(info.AlgorithmID.Algorithm, info.AlgorithmID.Parameters, cert))); + } + + /** + * add a recipient + * + * @param key the public key used by the recipient + * @param subKeyId the identifier for the recipient's public key + * @exception ArgumentException if there is a problem with the key + */ + public void AddKeyTransRecipient( + AsymmetricKeyParameter pubKey, + byte[] subKeyId) + { + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pubKey); + this.AddRecipientInfoGenerator(new KeyTransRecipientInfoGenerator(subKeyId, new Asn1KeyWrapper(info.AlgorithmID.Algorithm, info.AlgorithmID.Parameters, pubKey))); + } + + /** + * add a KEK recipient. + * @param key the secret key to use for wrapping + * @param keyIdentifier the byte string that identifies the key + */ + public void AddKekRecipient( + string keyAlgorithm, // TODO Remove need for this parameter + KeyParameter key, + byte[] keyIdentifier) + { + AddKekRecipient(keyAlgorithm, key, new KekIdentifier(keyIdentifier, null, null)); + } + + /** + * add a KEK recipient. + * @param key the secret key to use for wrapping + * @param keyIdentifier the byte string that identifies the key + */ + public void AddKekRecipient( + string keyAlgorithm, // TODO Remove need for this parameter + KeyParameter key, + KekIdentifier kekIdentifier) + { + KekRecipientInfoGenerator kekrig = new KekRecipientInfoGenerator(); + kekrig.KekIdentifier = kekIdentifier; + kekrig.KeyEncryptionKeyOID = keyAlgorithm; + kekrig.KeyEncryptionKey = key; + + recipientInfoGenerators.Add(kekrig); + } + + public void AddPasswordRecipient( + CmsPbeKey pbeKey, + string kekAlgorithmOid) + { + Pbkdf2Params p = new Pbkdf2Params(pbeKey.Salt, pbeKey.IterationCount); + + PasswordRecipientInfoGenerator prig = new PasswordRecipientInfoGenerator(); + prig.KeyDerivationAlgorithm = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdPbkdf2, p); + prig.KeyEncryptionKeyOID = kekAlgorithmOid; + prig.KeyEncryptionKey = pbeKey.GetEncoded(kekAlgorithmOid); + + recipientInfoGenerators.Add(prig); + } + + /** + * Add a key agreement based recipient. + * + * @param agreementAlgorithm key agreement algorithm to use. + * @param senderPrivateKey private key to initialise sender side of agreement with. + * @param senderPublicKey sender public key to include with message. + * @param recipientCert recipient's public key certificate. + * @param cekWrapAlgorithm OID for key wrapping algorithm to use. + * @exception SecurityUtilityException if the algorithm requested cannot be found + * @exception InvalidKeyException if the keys are inappropriate for the algorithm specified + */ + public void AddKeyAgreementRecipient( + string agreementAlgorithm, + AsymmetricKeyParameter senderPrivateKey, + AsymmetricKeyParameter senderPublicKey, + X509Certificate recipientCert, + string cekWrapAlgorithm) + { + var recipientCerts = new List(1); + recipientCerts.Add(recipientCert); + + AddKeyAgreementRecipients(agreementAlgorithm, senderPrivateKey, senderPublicKey, + recipientCerts, cekWrapAlgorithm); + } + + /** + * Add multiple key agreement based recipients (sharing a single KeyAgreeRecipientInfo structure). + * + * @param agreementAlgorithm key agreement algorithm to use. + * @param senderPrivateKey private key to initialise sender side of agreement with. + * @param senderPublicKey sender public key to include with message. + * @param recipientCerts recipients' public key certificates. + * @param cekWrapAlgorithm OID for key wrapping algorithm to use. + * @exception SecurityUtilityException if the algorithm requested cannot be found + * @exception InvalidKeyException if the keys are inappropriate for the algorithm specified + */ + public void AddKeyAgreementRecipients( + string agreementAlgorithm, + AsymmetricKeyParameter senderPrivateKey, + AsymmetricKeyParameter senderPublicKey, + IEnumerable recipientCerts, + string cekWrapAlgorithm) + { + if (!senderPrivateKey.IsPrivate) + throw new ArgumentException("Expected private key", "senderPrivateKey"); + if (senderPublicKey.IsPrivate) + throw new ArgumentException("Expected public key", "senderPublicKey"); + + /* TODO + * "a recipient X.509 version 3 certificate that contains a key usage extension MUST + * assert the keyAgreement bit." + */ + + KeyAgreeRecipientInfoGenerator karig = new KeyAgreeRecipientInfoGenerator(); + karig.KeyAgreementOID = new DerObjectIdentifier(agreementAlgorithm); + karig.KeyEncryptionOID = new DerObjectIdentifier(cekWrapAlgorithm); + karig.RecipientCerts = new List(recipientCerts); + karig.SenderKeyPair = new AsymmetricCipherKeyPair(senderPublicKey, senderPrivateKey); + + recipientInfoGenerators.Add(karig); + } + + /// + /// Add a generator to produce the recipient info required. + /// + /// a generator of a recipient info object. + public void AddRecipientInfoGenerator(RecipientInfoGenerator recipientInfoGenerator) + { + recipientInfoGenerators.Add(recipientInfoGenerator); + } + + + protected internal virtual AlgorithmIdentifier GetAlgorithmIdentifier( + string encryptionOid, + KeyParameter encKey, + Asn1Encodable asn1Params, + out ICipherParameters cipherParameters) + { + Asn1Object asn1Object; + if (asn1Params != null) + { + asn1Object = asn1Params.ToAsn1Object(); + cipherParameters = ParameterUtilities.GetCipherParameters( + encryptionOid, encKey, asn1Object); + } + else + { + asn1Object = DerNull.Instance; + cipherParameters = encKey; + } + + return new AlgorithmIdentifier( + new DerObjectIdentifier(encryptionOid), + asn1Object); + } + + protected internal virtual Asn1Encodable GenerateAsn1Parameters( + string encryptionOid, + byte[] encKeyBytes) + { + Asn1Encodable asn1Params = null; + + try + { + if (encryptionOid.Equals(RC2Cbc)) + { + byte[] iv = new byte[8]; + m_random.NextBytes(iv); + + // TODO Is this detailed repeat of Java version really necessary? + int effKeyBits = encKeyBytes.Length * 8; + int parameterVersion; + + if (effKeyBits < 256) + { + parameterVersion = rc2Table[effKeyBits]; + } + else + { + parameterVersion = effKeyBits; + } + + asn1Params = new RC2CbcParameter(parameterVersion, iv); + } + else + { + asn1Params = ParameterUtilities.GenerateParameters(encryptionOid, m_random); + } + } + catch (SecurityUtilityException) + { + // No problem... no parameters generated + } + + return asn1Params; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs.meta new file mode 100644 index 00000000..9210593d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7791d23915f27c348bf8347b7f5d8461 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs new file mode 100644 index 00000000..c971347b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs @@ -0,0 +1,311 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + class CmsEnvelopedHelper + { + internal static readonly CmsEnvelopedHelper Instance = new CmsEnvelopedHelper(); + + private static readonly IDictionary KeySizes = new Dictionary(); + private static readonly IDictionary BaseCipherNames = new Dictionary(); + + static CmsEnvelopedHelper() + { + KeySizes.Add(CmsEnvelopedGenerator.DesEde3Cbc, 192); + KeySizes.Add(CmsEnvelopedGenerator.Aes128Cbc, 128); + KeySizes.Add(CmsEnvelopedGenerator.Aes192Cbc, 192); + KeySizes.Add(CmsEnvelopedGenerator.Aes256Cbc, 256); + + BaseCipherNames.Add(CmsEnvelopedGenerator.DesEde3Cbc, "DESEDE"); + BaseCipherNames.Add(CmsEnvelopedGenerator.Aes128Cbc, "AES"); + BaseCipherNames.Add(CmsEnvelopedGenerator.Aes192Cbc, "AES"); + BaseCipherNames.Add(CmsEnvelopedGenerator.Aes256Cbc, "AES"); + } + + private string GetAsymmetricEncryptionAlgName( + string encryptionAlgOid) + { + if (Asn1.Pkcs.PkcsObjectIdentifiers.RsaEncryption.Id.Equals(encryptionAlgOid)) + { + return "RSA/ECB/PKCS1Padding"; + } + + return encryptionAlgOid; + } + + internal IBufferedCipher CreateAsymmetricCipher( + string encryptionOid) + { + string asymName = GetAsymmetricEncryptionAlgName(encryptionOid); + if (!asymName.Equals(encryptionOid)) + { + try + { + return CipherUtilities.GetCipher(asymName); + } + catch (SecurityUtilityException) + { + // Ignore + } + } + return CipherUtilities.GetCipher(encryptionOid); + } + + internal IWrapper CreateWrapper( + string encryptionOid) + { + try + { + return WrapperUtilities.GetWrapper(encryptionOid); + } + catch (SecurityUtilityException) + { + return WrapperUtilities.GetWrapper(GetAsymmetricEncryptionAlgName(encryptionOid)); + } + } + + internal string GetRfc3211WrapperName(string oid) + { + if (oid == null) + throw new ArgumentNullException(nameof(oid)); + + if (!BaseCipherNames.TryGetValue(oid, out var alg)) + throw new ArgumentException("no name for " + oid, nameof(oid)); + + return alg + "RFC3211Wrap"; + } + + internal int GetKeySize(string oid) + { + if (oid == null) + throw new ArgumentNullException(nameof(oid)); + + if (!KeySizes.TryGetValue(oid, out var keySize)) + throw new ArgumentException("no keysize for " + oid, "oid"); + + return keySize; + } + + internal static RecipientInformationStore BuildRecipientInformationStore( + Asn1Set recipientInfos, CmsSecureReadable secureReadable) + { + var infos = new List(); + for (int i = 0; i != recipientInfos.Count; i++) + { + RecipientInfo info = RecipientInfo.GetInstance(recipientInfos[i]); + + ReadRecipientInfo(infos, info, secureReadable); + } + return new RecipientInformationStore(infos); + } + + private static void ReadRecipientInfo(IList infos, RecipientInfo info, + CmsSecureReadable secureReadable) + { + Asn1Encodable recipInfo = info.Info; + if (recipInfo is KeyTransRecipientInfo keyTransRecipientInfo) + { + infos.Add(new KeyTransRecipientInformation(keyTransRecipientInfo, secureReadable)); + } + else if (recipInfo is KekRecipientInfo kekRecipientInfo) + { + infos.Add(new KekRecipientInformation(kekRecipientInfo, secureReadable)); + } + else if (recipInfo is KeyAgreeRecipientInfo keyAgreeRecipientInfo) + { + KeyAgreeRecipientInformation.ReadRecipientInfo(infos, keyAgreeRecipientInfo, secureReadable); + } + else if (recipInfo is PasswordRecipientInfo passwordRecipientInfo) + { + infos.Add(new PasswordRecipientInformation(passwordRecipientInfo, secureReadable)); + } + } + + internal class CmsAuthenticatedSecureReadable : CmsSecureReadable + { + private AlgorithmIdentifier algorithm; + private IMac mac; + private CmsReadable readable; + + internal CmsAuthenticatedSecureReadable(AlgorithmIdentifier algorithm, CmsReadable readable) + { + this.algorithm = algorithm; + this.readable = readable; + } + + public AlgorithmIdentifier Algorithm + { + get { return this.algorithm; } + } + + public object CryptoObject + { + get { return this.mac; } + } + + public CmsReadable GetReadable(KeyParameter sKey) + { + string macAlg = this.algorithm.Algorithm.Id; +// Asn1Object sParams = this.algorithm.Parameters.ToAsn1Object(); + + try + { + this.mac = MacUtilities.GetMac(macAlg); + + // FIXME Support for MAC algorithm parameters similar to cipher parameters +// ASN1Object sParams = (ASN1Object)macAlg.getParameters(); +// +// if (sParams != null && !(sParams instanceof ASN1Null)) +// { +// AlgorithmParameters params = CMSEnvelopedHelper.INSTANCE.createAlgorithmParameters(macAlg.getObjectId().getId(), provider); +// +// params.init(sParams.getEncoded(), "ASN.1"); +// +// mac.init(sKey, params.getParameterSpec(IvParameterSpec.class)); +// } +// else + { + mac.Init(sKey); + } + +// Asn1Object asn1Params = asn1Enc == null ? null : asn1Enc.ToAsn1Object(); +// +// ICipherParameters cipherParameters = sKey; +// +// if (asn1Params != null && !(asn1Params is Asn1Null)) +// { +// cipherParameters = ParameterUtilities.GetCipherParameters( +// macAlg.Algorithm, cipherParameters, asn1Params); +// } +// else +// { +// string alg = macAlg.Algorithm.Id; +// if (alg.Equals(CmsEnvelopedDataGenerator.DesEde3Cbc) +// || alg.Equals(CmsEnvelopedDataGenerator.IdeaCbc) +// || alg.Equals(CmsEnvelopedDataGenerator.Cast5Cbc)) +// { +// cipherParameters = new ParametersWithIV(cipherParameters, new byte[8]); +// } +// } +// +// mac.Init(cipherParameters); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("error decoding algorithm parameters.", e); + } + + try + { + return new CmsProcessableInputStream( + new TeeInputStream( + readable.GetInputStream(), + new MacSink(this.mac))); + } + catch (IOException e) + { + throw new CmsException("error reading content.", e); + } + } + } + + internal class CmsEnvelopedSecureReadable : CmsSecureReadable + { + private AlgorithmIdentifier algorithm; + private IBufferedCipher cipher; + private CmsReadable readable; + + internal CmsEnvelopedSecureReadable(AlgorithmIdentifier algorithm, CmsReadable readable) + { + this.algorithm = algorithm; + this.readable = readable; + } + + public AlgorithmIdentifier Algorithm + { + get { return this.algorithm; } + } + + public object CryptoObject + { + get { return this.cipher; } + } + + public CmsReadable GetReadable(KeyParameter sKey) + { + try + { + this.cipher = CipherUtilities.GetCipher(this.algorithm.Algorithm); + + Asn1Encodable asn1Enc = this.algorithm.Parameters; + Asn1Object asn1Params = asn1Enc == null ? null : asn1Enc.ToAsn1Object(); + + ICipherParameters cipherParameters = sKey; + + if (asn1Params != null && !(asn1Params is Asn1Null)) + { + cipherParameters = ParameterUtilities.GetCipherParameters( + this.algorithm.Algorithm, cipherParameters, asn1Params); + } + else + { + string alg = this.algorithm.Algorithm.Id; + if (alg.Equals(CmsEnvelopedDataGenerator.DesEde3Cbc) + || alg.Equals(CmsEnvelopedDataGenerator.IdeaCbc) + || alg.Equals(CmsEnvelopedDataGenerator.Cast5Cbc)) + { + cipherParameters = new ParametersWithIV(cipherParameters, new byte[8]); + } + } + + cipher.Init(false, cipherParameters); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (IOException e) + { + throw new CmsException("error decoding algorithm parameters.", e); + } + + try + { + return new CmsProcessableInputStream( + new CipherStream(readable.GetInputStream(), cipher, null)); + } + catch (IOException e) + { + throw new CmsException("error reading content.", e); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs.meta new file mode 100644 index 00000000..65116941 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b5fd7830c09c36949974afa7f8e45572 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSEnvelopedHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs new file mode 100644 index 00000000..2fd19814 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + [Serializable] + public class CmsException + : Exception + { + public CmsException() + : base() + { + } + + public CmsException(string message) + : base(message) + { + } + + public CmsException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CmsException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs.meta new file mode 100644 index 00000000..c34c6bee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c2bc77783fed2ca45a91bd003c2b327d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs new file mode 100644 index 00000000..1f2c5881 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +//import javax.crypto.interfaces.PBEKey; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public abstract class CmsPbeKey + // TODO Create an equivalent interface somewhere? + // : PBEKey + : ICipherParameters + { + internal readonly char[] password; + internal readonly byte[] salt; + internal readonly int iterationCount; + + public CmsPbeKey( + char[] password, + byte[] salt, + int iterationCount) + { + this.password = (char[])password.Clone(); + this.salt = Arrays.Clone(salt); + this.iterationCount = iterationCount; + } + + public CmsPbeKey( + char[] password, + AlgorithmIdentifier keyDerivationAlgorithm) + { + if (!keyDerivationAlgorithm.Algorithm.Equals(PkcsObjectIdentifiers.IdPbkdf2)) + throw new ArgumentException("Unsupported key derivation algorithm: " + + keyDerivationAlgorithm.Algorithm); + + Pbkdf2Params kdfParams = Pbkdf2Params.GetInstance( + keyDerivationAlgorithm.Parameters.ToAsn1Object()); + + this.password = (char[])password.Clone(); + this.salt = kdfParams.GetSalt(); + this.iterationCount = kdfParams.IterationCount.IntValue; + } + + ~CmsPbeKey() + { + Array.Clear(this.password, 0, this.password.Length); + } + + public byte[] Salt + { + get { return Arrays.Clone(salt); } + } + + public int IterationCount + { + get { return iterationCount; } + } + + public string Algorithm + { + get { return "PKCS5S2"; } + } + + public string Format + { + get { return "RAW"; } + } + + public byte[] GetEncoded() + { + return null; + } + + internal abstract KeyParameter GetEncoded(string algorithmOid); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs.meta new file mode 100644 index 00000000..2804af88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b05e45fedfaf80f4fa683646991ae9b9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSPBEKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs new file mode 100644 index 00000000..d07e7cc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public interface CmsProcessable + { + /// + /// Generic routine to copy out the data we want processed. + /// + /// + /// This routine may be called multiple times. + /// + void Write(Stream outStream); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs.meta new file mode 100644 index 00000000..e481fe42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4358bc653572b7c4a82a0968ec3633bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs new file mode 100644 index 00000000..997a27eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * a holding class for a byte array of data to be processed. + */ + public class CmsProcessableByteArray + : CmsProcessable, CmsReadable + { + private readonly DerObjectIdentifier type; + private readonly byte[] bytes; + + public CmsProcessableByteArray(byte[] bytes) + { + type = CmsObjectIdentifiers.Data; + this.bytes = bytes; + } + + public CmsProcessableByteArray(DerObjectIdentifier type, byte[] bytes) + { + this.bytes = bytes; + this.type = type; + } + + public DerObjectIdentifier Type + { + get { return type; } + } + + public virtual Stream GetInputStream() + { + return new MemoryStream(bytes, false); + } + + public virtual void Write(Stream zOut) + { + zOut.Write(bytes, 0, bytes.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs.meta new file mode 100644 index 00000000..c4234fd0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 21a35a48c87e93345870416e086fd4f1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableByteArray.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs new file mode 100644 index 00000000..6c325e93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * a holding class for a file of data to be processed. + */ + public class CmsProcessableFile + : CmsProcessable, CmsReadable + { + private const int DefaultBufSize = 32 * 1024; + + private readonly FileInfo _file; + private readonly int _bufSize; + + public CmsProcessableFile(FileInfo file) + : this(file, DefaultBufSize) + { + } + + public CmsProcessableFile(FileInfo file, int bufSize) + { + _file = file; + _bufSize = bufSize; + } + + public virtual Stream GetInputStream() + { + return new FileStream(_file.FullName, FileMode.Open, FileAccess.Read, FileShare.Read, _bufSize); + } + + public virtual void Write(Stream zOut) + { + using (var inStr = _file.OpenRead()) + { + Streams.PipeAll(inStr, zOut, _bufSize); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs.meta new file mode 100644 index 00000000..a3fec00c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79cc23ee91e127148885bc967538c814 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableFile.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs new file mode 100644 index 00000000..382bd948 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class CmsProcessableInputStream + : CmsProcessable, CmsReadable + { + private readonly Stream input; + + private bool used = false; + + public CmsProcessableInputStream(Stream input) + { + this.input = input; + } + + public virtual Stream GetInputStream() + { + CheckSingleUsage(); + + return input; + } + + public virtual void Write(Stream output) + { + CheckSingleUsage(); + + Streams.PipeAll(input, output); + input.Dispose(); + } + + protected virtual void CheckSingleUsage() + { + lock (this) + { + if (used) + throw new InvalidOperationException("CmsProcessableInputStream can only be used once"); + + used = true; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs.meta new file mode 100644 index 00000000..2d3690db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c67c8e6ccc2fd564fac66019e0aa1004 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSProcessableInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs new file mode 100644 index 00000000..84649f81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public interface CmsReadable + { + Stream GetInputStream(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs.meta new file mode 100644 index 00000000..d5440227 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d8a564e36797c4d46b1acefec1b50471 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSReadable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs new file mode 100644 index 00000000..04b4d41b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal interface CmsSecureReadable + { + AlgorithmIdentifier Algorithm { get; } + object CryptoObject { get; } + CmsReadable GetReadable(KeyParameter key); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs.meta new file mode 100644 index 00000000..11467f21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 923dd0564294e6649b0ae0fd20b9396e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSecureReadable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs new file mode 100644 index 00000000..48667ba0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs @@ -0,0 +1,415 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * general class for handling a pkcs7-signature message. + * + * A simple example of usage - note, in the example below the validity of + * the certificate isn't verified, just the fact that one of the certs + * matches the given signer... + * + *
+	*  IX509Store              certs = s.GetCertificates();
+	*  SignerInformationStore  signers = s.GetSignerInfos();
+	*
+	*  foreach (SignerInformation signer in signers.GetSigners())
+	*  {
+	*      ArrayList       certList = new ArrayList(certs.GetMatches(signer.SignerID));
+	*      X509Certificate cert = (X509Certificate) certList[0];
+	*
+	*      if (signer.Verify(cert.GetPublicKey()))
+	*      {
+	*          verified++;
+	*      }
+	*  }
+	* 
+ */ + public class CmsSignedData + { + private static readonly CmsSignedHelper Helper = CmsSignedHelper.Instance; + + private readonly CmsProcessable signedContent; + private SignedData signedData; + private ContentInfo contentInfo; + private SignerInformationStore signerInfoStore; + private IDictionary m_hashes; + + private CmsSignedData(CmsSignedData c) + { + this.signedData = c.signedData; + this.contentInfo = c.contentInfo; + this.signedContent = c.signedContent; + this.signerInfoStore = c.signerInfoStore; + } + + public CmsSignedData(byte[] sigBlock) + : this(CmsUtilities.ReadContentInfo(new MemoryStream(sigBlock, false))) + { + } + + public CmsSignedData(CmsProcessable signedContent, byte[] sigBlock) + : this(signedContent, CmsUtilities.ReadContentInfo(new MemoryStream(sigBlock, false))) + { + } + + /** + * Content with detached signature, digests precomputed + * + * @param hashes a map of precomputed digests for content indexed by name of hash. + * @param sigBlock the signature object. + */ + public CmsSignedData(IDictionary hashes, byte[] sigBlock) + : this(hashes, CmsUtilities.ReadContentInfo(sigBlock)) + { + } + + /** + * base constructor - content with detached signature. + * + * @param signedContent the content that was signed. + * @param sigData the signature object. + */ + public CmsSignedData(CmsProcessable signedContent, Stream sigData) + : this(signedContent, CmsUtilities.ReadContentInfo(sigData)) + { + } + + /** + * base constructor - with encapsulated content + */ + public CmsSignedData(Stream sigData) + : this(CmsUtilities.ReadContentInfo(sigData)) + { + } + + public CmsSignedData(CmsProcessable signedContent, ContentInfo sigData) + { + this.signedContent = signedContent; + this.contentInfo = sigData; + this.signedData = SignedData.GetInstance(contentInfo.Content); + } + + public CmsSignedData(IDictionary hashes, ContentInfo sigData) + { + this.m_hashes = hashes; + this.contentInfo = sigData; + this.signedData = SignedData.GetInstance(contentInfo.Content); + } + + public CmsSignedData(ContentInfo sigData) + { + this.contentInfo = sigData; + this.signedData = SignedData.GetInstance(contentInfo.Content); + + // + // this can happen if the signed message is sent simply to send a + // certificate chain. + // + if (signedData.EncapContentInfo.Content != null) + { + this.signedContent = new CmsProcessableByteArray( + ((Asn1OctetString)(signedData.EncapContentInfo.Content)).GetOctets()); + } +// else +// { +// this.signedContent = null; +// } + } + + /// Return the version number for this object. + public int Version + { + get { return signedData.Version.IntValueExact; } + } + + /** + * return the collection of signers that are associated with the + * signatures for the message. + */ + public SignerInformationStore GetSignerInfos() + { + if (signerInfoStore == null) + { + var signerInfos = new List(); + Asn1Set s = signedData.SignerInfos; + + foreach (object obj in s) + { + SignerInfo info = SignerInfo.GetInstance(obj); + DerObjectIdentifier contentType = signedData.EncapContentInfo.ContentType; + + if (m_hashes == null) + { + signerInfos.Add(new SignerInformation(info, contentType, signedContent, null)); + } + else if (m_hashes.TryGetValue(info.DigestAlgorithm.Algorithm.Id, out var hash)) + { + signerInfos.Add(new SignerInformation(info, contentType, null, new BaseDigestCalculator(hash))); + } + else + { + throw new InvalidOperationException(); + } + } + + signerInfoStore = new SignerInformationStore(signerInfos); + } + + return signerInfoStore; + } + + /** + * return a X509Store containing the attribute certificates, if any, contained + * in this message. + * + * @param type type of store to create + * @return a store of attribute certificates + * @exception NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetAttributeCertificates() + { + return Helper.GetAttributeCertificates(signedData.Certificates); + } + + /** + * return a X509Store containing the public key certificates, if any, contained in this message. + * + * @return a store of public key certificates + * @exception NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetCertificates() + { + return Helper.GetCertificates(signedData.Certificates); + } + + /** + * return a X509Store containing CRLs, if any, contained in this message. + * + * @return a store of CRLs + * @exception NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetCrls() + { + return Helper.GetCrls(signedData.CRLs); + } + + public IStore GetOtherRevInfos(DerObjectIdentifier otherRevInfoFormat) + { + return Helper.GetOtherRevInfos(signedData.CRLs, otherRevInfoFormat); + } + + /// + /// Return the DerObjectIdentifier associated with the encapsulated + /// content info structure carried in the signed data. + /// + public DerObjectIdentifier SignedContentType + { + get { return signedData.EncapContentInfo.ContentType; } + } + + public CmsProcessable SignedContent + { + get { return signedContent; } + } + + /** + * return the ContentInfo + */ + public ContentInfo ContentInfo + { + get { return contentInfo; } + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return contentInfo.GetEncoded(); + } + + /** + * return the ASN.1 encoded representation of this object using the specified encoding. + * + * @param encoding the ASN.1 encoding format to use ("BER" or "DER"). + */ + public byte[] GetEncoded(string encoding) + { + return contentInfo.GetEncoded(encoding); + } + + /** + * Replace the signerinformation store associated with this + * CmsSignedData object with the new one passed in. You would + * probably only want to do this if you wanted to change the unsigned + * attributes associated with a signer, or perhaps delete one. + * + * @param signedData the signed data object to be used as a base. + * @param signerInformationStore the new signer information store to use. + * @return a new signed data object. + */ + public static CmsSignedData ReplaceSigners( + CmsSignedData signedData, + SignerInformationStore signerInformationStore) + { + // + // copy + // + CmsSignedData cms = new CmsSignedData(signedData); + + // + // replace the store + // + cms.signerInfoStore = signerInformationStore; + + // + // replace the signers in the SignedData object + // + Asn1EncodableVector digestAlgs = new Asn1EncodableVector(); + Asn1EncodableVector vec = new Asn1EncodableVector(); + + foreach (SignerInformation signer in signerInformationStore.GetSigners()) + { + digestAlgs.Add(Helper.FixAlgID(signer.DigestAlgorithmID)); + vec.Add(signer.ToSignerInfo()); + } + + Asn1Set digests = new DerSet(digestAlgs); + Asn1Set signers = new DerSet(vec); + Asn1Sequence sD = (Asn1Sequence)signedData.signedData.ToAsn1Object(); + + // + // signers are the last item in the sequence. + // + vec = new Asn1EncodableVector( + sD[0], // version + digests); + + for (int i = 2; i != sD.Count - 1; i++) + { + vec.Add(sD[i]); + } + + vec.Add(signers); + + cms.signedData = SignedData.GetInstance(new BerSequence(vec)); + + // + // replace the contentInfo with the new one + // + cms.contentInfo = new ContentInfo(cms.contentInfo.ContentType, cms.signedData); + + return cms; + } + + /** + * Replace the certificate and CRL information associated with this + * CmsSignedData object with the new one passed in. + * + * @param signedData the signed data object to be used as a base. + * @param x509Certs the new certificates to be used. + * @param x509Crls the new CRLs to be used. + * @return a new signed data object. + * @exception CmsException if there is an error processing the stores + */ + public static CmsSignedData ReplaceCertificatesAndCrls(CmsSignedData signedData, + IStore x509Certs, IStore x509Crls) + { + return ReplaceCertificatesAndRevocations(signedData, x509Certs, x509Crls, null, null); + } + + public static CmsSignedData ReplaceCertificatesAndCrls(CmsSignedData signedData, + IStore x509Certs, IStore x509Crls, + IStore x509AttrCerts) + { + return ReplaceCertificatesAndRevocations(signedData, x509Certs, x509Crls, x509AttrCerts, null); + } + + public static CmsSignedData ReplaceCertificatesAndRevocations(CmsSignedData signedData, + IStore x509Certs, IStore x509Crls, + IStore x509AttrCerts, IStore otherRevocationInfos) + { + // + // copy + // + CmsSignedData cms = new CmsSignedData(signedData); + + // + // replace the certs and crls in the SignedData object + // + Asn1Set certSet = null; + Asn1Set revocationSet = null; + + if (x509Certs != null || x509AttrCerts != null) + { + var certificates = new List(); + if (x509Certs != null) + { + certificates.AddRange(CmsUtilities.GetCertificatesFromStore(x509Certs)); + } + if (x509AttrCerts != null) + { + certificates.AddRange(CmsUtilities.GetAttributeCertificatesFromStore(x509AttrCerts)); + } + + Asn1Set berSet = CmsUtilities.CreateBerSetFromList(certificates); + if (berSet.Count > 0) + { + certSet = berSet; + } + } + + if (x509Crls != null || otherRevocationInfos != null) + { + var revocations = new List(); + if (x509Crls != null) + { + revocations.AddRange(CmsUtilities.GetCrlsFromStore(x509Crls)); + } + if (otherRevocationInfos != null) + { + revocations.AddRange(CmsUtilities.GetOtherRevocationInfosFromStore(otherRevocationInfos)); + } + + Asn1Set berSet = CmsUtilities.CreateBerSetFromList(revocations); + if (berSet.Count > 0) + { + revocationSet = berSet; + } + } + + // + // replace the CMS structure. + // + SignedData old = signedData.signedData; + cms.signedData = new SignedData( + old.DigestAlgorithms, + old.EncapContentInfo, + certSet, + revocationSet, + old.SignerInfos); + + // + // replace the contentInfo with the new one + // + cms.contentInfo = new ContentInfo(cms.contentInfo.ContentType, cms.signedData); + + return cms; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs.meta new file mode 100644 index 00000000..3ef023bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a562c0b42d3154640bbd1b68310b34eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs new file mode 100644 index 00000000..79873be0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs @@ -0,0 +1,581 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * general class for generating a pkcs7-signature message. + *

+ * A simple example of usage. + * + *

+     *      IX509Store certs...
+     *      IX509Store crls...
+     *      CmsSignedDataGenerator gen = new CmsSignedDataGenerator();
+     *
+     *      gen.AddSigner(privKey, cert, CmsSignedGenerator.DigestSha1);
+     *      gen.AddCertificates(certs);
+     *      gen.AddCrls(crls);
+     *
+     *      CmsSignedData data = gen.Generate(content);
+     * 
+ *

+ */ + public class CmsSignedDataGenerator + : CmsSignedGenerator + { + private static readonly CmsSignedHelper Helper = CmsSignedHelper.Instance; + + private readonly IList signerInfs = new List(); + + private class SignerInf + { + private readonly CmsSignedGenerator outer; + + private readonly ISignatureFactory sigCalc; + private readonly SignerIdentifier signerIdentifier; + private readonly string digestOID; + private readonly string encOID; + private readonly CmsAttributeTableGenerator sAttr; + private readonly CmsAttributeTableGenerator unsAttr; + private readonly Asn1.Cms.AttributeTable baseSignedTable; + + internal SignerInf( + CmsSignedGenerator outer, + AsymmetricKeyParameter key, + SecureRandom random, + SignerIdentifier signerIdentifier, + string digestOID, + string encOID, + CmsAttributeTableGenerator sAttr, + CmsAttributeTableGenerator unsAttr, + Asn1.Cms.AttributeTable baseSignedTable) + { + string digestName = Helper.GetDigestAlgName(digestOID); + + string signatureName = digestName + "with" + Helper.GetEncryptionAlgName(encOID); + + this.outer = outer; + this.sigCalc = new Asn1SignatureFactory(signatureName, key, random); + this.signerIdentifier = signerIdentifier; + this.digestOID = digestOID; + this.encOID = encOID; + this.sAttr = sAttr; + this.unsAttr = unsAttr; + this.baseSignedTable = baseSignedTable; + } + + internal SignerInf( + CmsSignedGenerator outer, + ISignatureFactory sigCalc, + SignerIdentifier signerIdentifier, + CmsAttributeTableGenerator sAttr, + CmsAttributeTableGenerator unsAttr, + Asn1.Cms.AttributeTable baseSignedTable) + { + this.outer = outer; + this.sigCalc = sigCalc; + this.signerIdentifier = signerIdentifier; + this.digestOID = new DefaultDigestAlgorithmIdentifierFinder().Find( + (AlgorithmIdentifier)sigCalc.AlgorithmDetails).Algorithm.Id; + this.encOID = ((AlgorithmIdentifier)sigCalc.AlgorithmDetails).Algorithm.Id; + this.sAttr = sAttr; + this.unsAttr = unsAttr; + this.baseSignedTable = baseSignedTable; + } + + internal AlgorithmIdentifier DigestAlgorithmID + { + get { return new AlgorithmIdentifier(new DerObjectIdentifier(digestOID), DerNull.Instance); } + } + + internal CmsAttributeTableGenerator SignedAttributes + { + get { return sAttr; } + } + + internal CmsAttributeTableGenerator UnsignedAttributes + { + get { return unsAttr; } + } + + internal SignerInfo ToSignerInfo(DerObjectIdentifier contentType, CmsProcessable content) + { + AlgorithmIdentifier digAlgId = DigestAlgorithmID; + string digestName = Helper.GetDigestAlgName(digestOID); + + string signatureName = digestName + "with" + Helper.GetEncryptionAlgName(encOID); + + if (!outer.m_digests.TryGetValue(digestOID, out var hash)) + { + IDigest dig = Helper.GetDigestInstance(digestName); + if (content != null) + { + content.Write(new DigestSink(dig)); + } + hash = DigestUtilities.DoFinal(dig); + outer.m_digests.Add(digestOID, (byte[])hash.Clone()); + } + + Asn1Set signedAttr = null; + + IStreamCalculator calculator = sigCalc.CreateCalculator(); + using (Stream sigStr = calculator.Stream) + { + if (sAttr != null) + { + var parameters = outer.GetBaseParameters(contentType, digAlgId, hash); + + //Asn1.Cms.AttributeTable signed = sAttr.GetAttributes(Collections.unmodifiableMap(parameters)); + Asn1.Cms.AttributeTable signed = sAttr.GetAttributes(parameters); + + if (contentType == null) //counter signature + { + if (signed != null && signed[CmsAttributes.ContentType] != null) + { + signed = signed.Remove(CmsAttributes.ContentType); + } + } + + // TODO Validate proposed signed attributes + + signedAttr = outer.GetAttributeSet(signed); + + // sig must be composed from the DER encoding. + signedAttr.EncodeTo(sigStr, Asn1Encodable.Der); + } + else if (content != null) + { + // TODO Use raw signature of the hash value instead + content.Write(sigStr); + } + } + + byte[] sigBytes = calculator.GetResult().Collect(); + + Asn1Set unsignedAttr = null; + if (unsAttr != null) + { + var baseParameters = outer.GetBaseParameters(contentType, digAlgId, hash); + baseParameters[CmsAttributeTableParameter.Signature] = sigBytes.Clone(); + +// Asn1.Cms.AttributeTable unsigned = unsAttr.GetAttributes(Collections.unmodifiableMap(baseParameters)); + Asn1.Cms.AttributeTable unsigned = unsAttr.GetAttributes(baseParameters); + + // TODO Validate proposed unsigned attributes + + unsignedAttr = outer.GetAttributeSet(unsigned); + } + + // TODO[RSAPSS] Need the ability to specify non-default parameters + Asn1Encodable sigX509Parameters = SignerUtilities.GetDefaultX509Parameters(signatureName); + AlgorithmIdentifier encAlgId = Helper.GetEncAlgorithmIdentifier( + new DerObjectIdentifier(encOID), sigX509Parameters); + + return new SignerInfo(signerIdentifier, digAlgId, + signedAttr, encAlgId, new DerOctetString(sigBytes), unsignedAttr); + } + } + + public CmsSignedDataGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsSignedDataGenerator(SecureRandom random) + : base(random) + { + } + + /** + * add a signer - no attributes other than the default ones will be + * provided here. + * + * @param key signing key to use + * @param cert certificate containing corresponding public key + * @param digestOID digest algorithm OID + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOID) + { + AddSigner(privateKey, cert, Helper.GetEncOid(privateKey, digestOID), digestOID); + } + + /** + * add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be + * provided here. + * + * @param key signing key to use + * @param cert certificate containing corresponding public key + * @param encryptionOID digest encryption algorithm OID + * @param digestOID digest algorithm OID + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOID, + string digestOID) + { + doAddSigner(privateKey, GetSignerIdentifier(cert), encryptionOID, digestOID, + new DefaultSignedAttributeTableGenerator(), null, null); + } + + /** + * add a signer - no attributes other than the default ones will be + * provided here. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOID) + { + AddSigner(privateKey, subjectKeyID, Helper.GetEncOid(privateKey, digestOID), digestOID); + } + + /** + * add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be + * provided here. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string encryptionOID, + string digestOID) + { + doAddSigner(privateKey, GetSignerIdentifier(subjectKeyID), encryptionOID, digestOID, + new DefaultSignedAttributeTableGenerator(), null, null); + } + + /** + * add a signer with extra signed/unsigned attributes. + * + * @param key signing key to use + * @param cert certificate containing corresponding public key + * @param digestOID digest algorithm OID + * @param signedAttr table of attributes to be included in signature + * @param unsignedAttr table of attributes to be included as unsigned + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + AddSigner(privateKey, cert, Helper.GetEncOid(privateKey, digestOID), digestOID, + signedAttr, unsignedAttr); + } + + /** + * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes. + * + * @param key signing key to use + * @param cert certificate containing corresponding public key + * @param encryptionOID digest encryption algorithm OID + * @param digestOID digest algorithm OID + * @param signedAttr table of attributes to be included in signature + * @param unsignedAttr table of attributes to be included as unsigned + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOID, + string digestOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + doAddSigner(privateKey, GetSignerIdentifier(cert), encryptionOID, digestOID, + new DefaultSignedAttributeTableGenerator(signedAttr), + new SimpleAttributeTableGenerator(unsignedAttr), + signedAttr); + } + + /** + * add a signer with extra signed/unsigned attributes. + * + * @param key signing key to use + * @param subjectKeyID subjectKeyID of corresponding public key + * @param digestOID digest algorithm OID + * @param signedAttr table of attributes to be included in signature + * @param unsignedAttr table of attributes to be included as unsigned + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + AddSigner(privateKey, subjectKeyID, Helper.GetEncOid(privateKey, digestOID), digestOID, + signedAttr, unsignedAttr); + } + + /** + * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes. + * + * @param key signing key to use + * @param subjectKeyID subjectKeyID of corresponding public key + * @param encryptionOID digest encryption algorithm OID + * @param digestOID digest algorithm OID + * @param signedAttr table of attributes to be included in signature + * @param unsignedAttr table of attributes to be included as unsigned + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string encryptionOID, + string digestOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + doAddSigner(privateKey, GetSignerIdentifier(subjectKeyID), encryptionOID, digestOID, + new DefaultSignedAttributeTableGenerator(signedAttr), + new SimpleAttributeTableGenerator(unsignedAttr), + signedAttr); + } + + /** + * add a signer with extra signed/unsigned attributes based on generators. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOID, + CmsAttributeTableGenerator signedAttrGen, + CmsAttributeTableGenerator unsignedAttrGen) + { + AddSigner(privateKey, cert, Helper.GetEncOid(privateKey, digestOID), digestOID, + signedAttrGen, unsignedAttrGen); + } + + /** + * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes based on generators. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOID, + string digestOID, + CmsAttributeTableGenerator signedAttrGen, + CmsAttributeTableGenerator unsignedAttrGen) + { + doAddSigner(privateKey, GetSignerIdentifier(cert), encryptionOID, digestOID, signedAttrGen, + unsignedAttrGen, null); + } + + /** + * add a signer with extra signed/unsigned attributes based on generators. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOID, + CmsAttributeTableGenerator signedAttrGen, + CmsAttributeTableGenerator unsignedAttrGen) + { + AddSigner(privateKey, subjectKeyID, Helper.GetEncOid(privateKey, digestOID), digestOID, + signedAttrGen, unsignedAttrGen); + } + + /** + * add a signer, including digest encryption algorithm, with extra signed/unsigned attributes based on generators. + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string encryptionOID, + string digestOID, + CmsAttributeTableGenerator signedAttrGen, + CmsAttributeTableGenerator unsignedAttrGen) + { + doAddSigner(privateKey, GetSignerIdentifier(subjectKeyID), encryptionOID, digestOID, + signedAttrGen, unsignedAttrGen, null); + } + + public void AddSignerInfoGenerator(SignerInfoGenerator signerInfoGenerator) + { + signerInfs.Add(new SignerInf(this, signerInfoGenerator.contentSigner, signerInfoGenerator.sigId, + signerInfoGenerator.signedGen, signerInfoGenerator.unsignedGen, null)); + } + + private void doAddSigner( + AsymmetricKeyParameter privateKey, + SignerIdentifier signerIdentifier, + string encryptionOID, + string digestOID, + CmsAttributeTableGenerator signedAttrGen, + CmsAttributeTableGenerator unsignedAttrGen, + Asn1.Cms.AttributeTable baseSignedTable) + { + signerInfs.Add(new SignerInf(this, privateKey, m_random, signerIdentifier, digestOID, encryptionOID, + signedAttrGen, unsignedAttrGen, baseSignedTable)); + } + + /** + * generate a signed object that for a CMS Signed Data object + */ + public CmsSignedData Generate( + CmsProcessable content) + { + return Generate(content, false); + } + + /** + * generate a signed object that for a CMS Signed Data + * object - if encapsulate is true a copy + * of the message will be included in the signature. The content type + * is set according to the OID represented by the string signedContentType. + */ + public CmsSignedData Generate( + string signedContentType, + // FIXME Avoid accessing more than once to support CmsProcessableInputStream + CmsProcessable content, + bool encapsulate) + { + Asn1EncodableVector digestAlgs = new Asn1EncodableVector(); + Asn1EncodableVector signerInfos = new Asn1EncodableVector(); + + m_digests.Clear(); // clear the current preserved digest state + + // + // add the precalculated SignerInfo objects. + // + foreach (SignerInformation signer in _signers) + { + digestAlgs.Add(Helper.FixAlgID(signer.DigestAlgorithmID)); + + // TODO Verify the content type and calculated digest match the precalculated SignerInfo + signerInfos.Add(signer.ToSignerInfo()); + } + + // + // add the SignerInfo objects + // + bool isCounterSignature = (signedContentType == null); + + DerObjectIdentifier contentTypeOid = isCounterSignature + ? null + : new DerObjectIdentifier(signedContentType); + + foreach (SignerInf signer in signerInfs) + { + try + { + digestAlgs.Add(signer.DigestAlgorithmID); + signerInfos.Add(signer.ToSignerInfo(contentTypeOid, content)); + } + catch (IOException e) + { + throw new CmsException("encoding error.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key inappropriate for signature.", e); + } + catch (SignatureException e) + { + throw new CmsException("error creating signature.", e); + } + catch (CertificateEncodingException e) + { + throw new CmsException("error creating sid.", e); + } + } + + Asn1Set certificates = null; + + if (_certs.Count != 0) + { + certificates = UseDerForCerts + ? CmsUtilities.CreateDerSetFromList(_certs) + : CmsUtilities.CreateBerSetFromList(_certs); + } + + Asn1Set certrevlist = null; + + if (_crls.Count != 0) + { + certrevlist = UseDerForCrls + ? CmsUtilities.CreateDerSetFromList(_crls) + : CmsUtilities.CreateBerSetFromList(_crls); + } + + Asn1OctetString octs = null; + if (encapsulate) + { + MemoryStream bOut = new MemoryStream(); + if (content != null) + { + try + { + content.Write(bOut); + } + catch (IOException e) + { + throw new CmsException("encapsulation error.", e); + } + } + octs = new BerOctetString(bOut.ToArray()); + } + + ContentInfo encInfo = new ContentInfo(contentTypeOid, octs); + + SignedData sd = new SignedData( + new DerSet(digestAlgs), + encInfo, + certificates, + certrevlist, + new DerSet(signerInfos)); + + ContentInfo contentInfo = new ContentInfo(CmsObjectIdentifiers.SignedData, sd); + + return new CmsSignedData(content, contentInfo); + } + + /** + * generate a signed object that for a CMS Signed Data + * object - if encapsulate is true a copy + * of the message will be included in the signature with the + * default content type "data". + */ + public CmsSignedData Generate( + CmsProcessable content, + bool encapsulate) + { + return this.Generate(Data, content, encapsulate); + } + + /** + * generate a set of one or more SignerInformation objects representing counter signatures on + * the passed in SignerInformation object. + * + * @param signer the signer to be countersigned + * @param sigProvider the provider to be used for counter signing. + * @return a store containing the signers. + */ + public SignerInformationStore GenerateCounterSigners( + SignerInformation signer) + { + return this.Generate(null, new CmsProcessableByteArray(signer.GetSignature()), false).GetSignerInfos(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs.meta new file mode 100644 index 00000000..2904db8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07bf1667fd94e7546831682ce07d3f91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs new file mode 100644 index 00000000..4f4e79b6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs @@ -0,0 +1,435 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Parsing class for an CMS Signed Data object from an input stream. + *

+ * Note: that because we are in a streaming mode only one signer can be tried and it is important + * that the methods on the parser are called in the appropriate order. + *

+ *

+ * A simple example of usage for an encapsulated signature. + *

+ *

+ * Two notes: first, in the example below the validity of + * the certificate isn't verified, just the fact that one of the certs + * matches the given signer, and, second, because we are in a streaming + * mode the order of the operations is important. + *

+ *
+	*      CmsSignedDataParser     sp = new CmsSignedDataParser(encapSigData);
+	*
+	*      sp.GetSignedContent().Drain();
+	*
+	*      IX509Store              certs = sp.GetCertificates();
+	*      SignerInformationStore  signers = sp.GetSignerInfos();
+	*
+	*      foreach (SignerInformation signer in signers.GetSigners())
+	*      {
+	*          ArrayList       certList = new ArrayList(certs.GetMatches(signer.SignerID));
+	*          X509Certificate cert = (X509Certificate) certList[0];
+	*
+	*          Console.WriteLine("verify returns: " + signer.Verify(cert));
+	*      }
+	* 
+ * Note also: this class does not introduce buffering - if you are processing large files you should create + * the parser with: + *
+	*          CmsSignedDataParser     ep = new CmsSignedDataParser(new BufferedInputStream(encapSigData, bufSize));
+	*  
+ * where bufSize is a suitably large buffer size. + */ + public class CmsSignedDataParser + : CmsContentInfoParser + { + private static readonly CmsSignedHelper Helper = CmsSignedHelper.Instance; + + private SignedDataParser _signedData; + private DerObjectIdentifier _signedContentType; + private CmsTypedStream _signedContent; + private IDictionary m_digests; + private HashSet _digestOids; + + private SignerInformationStore _signerInfoStore; + private Asn1Set _certSet, _crlSet; + private bool _isCertCrlParsed; + + public CmsSignedDataParser( + byte[] sigBlock) + : this(new MemoryStream(sigBlock, false)) + { + } + + public CmsSignedDataParser( + CmsTypedStream signedContent, + byte[] sigBlock) + : this(signedContent, new MemoryStream(sigBlock, false)) + { + } + + /** + * base constructor - with encapsulated content + */ + public CmsSignedDataParser( + Stream sigData) + : this(null, sigData) + { + } + + /** + * base constructor + * + * @param signedContent the content that was signed. + * @param sigData the signature object. + */ + public CmsSignedDataParser( + CmsTypedStream signedContent, + Stream sigData) + : base(sigData) + { + try + { + this._signedContent = signedContent; + this._signedData = SignedDataParser.GetInstance(this.contentInfo.GetContent(Asn1Tags.Sequence)); + this.m_digests = new Dictionary(StringComparer.OrdinalIgnoreCase); + this._digestOids = new HashSet(); + + Asn1SetParser digAlgs = _signedData.GetDigestAlgorithms(); + IAsn1Convertible o; + + while ((o = digAlgs.ReadObject()) != null) + { + AlgorithmIdentifier id = AlgorithmIdentifier.GetInstance(o.ToAsn1Object()); + + try + { + string digestOid = id.Algorithm.Id; + string digestName = Helper.GetDigestAlgName(digestOid); + + if (!this.m_digests.ContainsKey(digestName)) + { + this.m_digests[digestName] = Helper.GetDigestInstance(digestName); + this._digestOids.Add(digestOid); + } + } + catch (SecurityUtilityException) + { + // TODO Should do something other than ignore it + } + } + + // + // If the message is simply a certificate chain message GetContent() may return null. + // + ContentInfoParser cont = _signedData.GetEncapContentInfo(); + Asn1OctetStringParser octs = (Asn1OctetStringParser) + cont.GetContent(Asn1Tags.OctetString); + + if (octs != null) + { + CmsTypedStream ctStr = new CmsTypedStream( + cont.ContentType.Id, octs.GetOctetStream()); + + if (_signedContent == null) + { + this._signedContent = ctStr; + } + else + { + // + // content passed in, need to read past empty encapsulated content info object if present + // + ctStr.Drain(); + } + } + + _signedContentType = _signedContent == null + ? cont.ContentType + : new DerObjectIdentifier(_signedContent.ContentType); + } + catch (IOException e) + { + throw new CmsException("io exception: " + e.Message, e); + } + } + + /** + * Return the version number for the SignedData object + * + * @return the version number + */ + public int Version + { + get { return _signedData.Version.IntValueExact; } + } + + public ISet DigestOids + { + get { return new HashSet(_digestOids); } + } + + /** + * return the collection of signers that are associated with the + * signatures for the message. + * @throws CmsException + */ + public SignerInformationStore GetSignerInfos() + { + if (_signerInfoStore == null) + { + PopulateCertCrlSets(); + + var signerInfos = new List(); + var hashes = new Dictionary(StringComparer.OrdinalIgnoreCase); + + foreach (var digest in m_digests) + { + hashes[digest.Key] = DigestUtilities.DoFinal(digest.Value); + } + + try + { + Asn1SetParser s = _signedData.GetSignerInfos(); + IAsn1Convertible o; + + while ((o = s.ReadObject()) != null) + { + SignerInfo info = SignerInfo.GetInstance(o.ToAsn1Object()); + string digestName = Helper.GetDigestAlgName(info.DigestAlgorithm.Algorithm.Id); + + byte[] hash = hashes[digestName]; + + signerInfos.Add(new SignerInformation(info, _signedContentType, null, new BaseDigestCalculator(hash))); + } + } + catch (IOException e) + { + throw new CmsException("io exception: " + e.Message, e); + } + + _signerInfoStore = new SignerInformationStore(signerInfos); + } + + return _signerInfoStore; + } + + /** + * return a X509Store containing the attribute certificates, if any, contained + * in this message. + * + * @param type type of store to create + * @return a store of attribute certificates + * @exception org.bouncycastle.x509.NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetAttributeCertificates() + { + PopulateCertCrlSets(); + + return Helper.GetAttributeCertificates(_certSet); + } + + /** + * return a X509Store containing the public key certificates, if any, contained + * in this message. + * + * @param type type of store to create + * @return a store of public key certificates + * @exception NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetCertificates() + { + PopulateCertCrlSets(); + + return Helper.GetCertificates(_certSet); + } + + /** + * return a X509Store containing CRLs, if any, contained + * in this message. + * + * @param type type of store to create + * @return a store of CRLs + * @exception NoSuchStoreException if the store type isn't available. + * @exception CmsException if a general exception prevents creation of the X509Store + */ + public IStore GetCrls() + { + PopulateCertCrlSets(); + + return Helper.GetCrls(_crlSet); + } + + public IStore GetOtherRevInfos(DerObjectIdentifier otherRevInfoFormat) + { + PopulateCertCrlSets(); + + return Helper.GetOtherRevInfos(_crlSet, otherRevInfoFormat); + } + + private void PopulateCertCrlSets() + { + if (_isCertCrlParsed) + return; + + _isCertCrlParsed = true; + + try + { + // care! Streaming - Must process the GetCertificates() result before calling GetCrls() + _certSet = GetAsn1Set(_signedData.GetCertificates()); + _crlSet = GetAsn1Set(_signedData.GetCrls()); + } + catch (IOException e) + { + throw new CmsException("problem parsing cert/crl sets", e); + } + } + + /// + /// Return the DerObjectIdentifier associated with the encapsulated + /// content info structure carried in the signed data. + /// + public DerObjectIdentifier SignedContentType + { + get { return _signedContentType; } + } + + public CmsTypedStream GetSignedContent() + { + if (_signedContent == null) + { + return null; + } + + Stream digStream = _signedContent.ContentStream; + + foreach (var digest in m_digests.Values) + { + digStream = new DigestStream(digStream, digest, null); + } + + return new CmsTypedStream(_signedContent.ContentType, digStream); + } + + /** + * Replace the signerinformation store associated with the passed + * in message contained in the stream original with the new one passed in. + * You would probably only want to do this if you wanted to change the unsigned + * attributes associated with a signer, or perhaps delete one. + *

+ * The output stream is returned unclosed. + *

+ * @param original the signed data stream to be used as a base. + * @param signerInformationStore the new signer information store to use. + * @param out the stream to Write the new signed data object to. + * @return out. + */ + public static Stream ReplaceSigners( + Stream original, + SignerInformationStore signerInformationStore, + Stream outStr) + { + // NB: SecureRandom would be ignored since using existing signatures only + CmsSignedDataStreamGenerator gen = new CmsSignedDataStreamGenerator(); + CmsSignedDataParser parser = new CmsSignedDataParser(original); + +// gen.AddDigests(parser.DigestOids); + gen.AddSigners(signerInformationStore); + + CmsTypedStream signedContent = parser.GetSignedContent(); + bool encapsulate = (signedContent != null); + Stream contentOut = gen.Open(outStr, parser.SignedContentType.Id, encapsulate); + if (encapsulate) + { + Streams.PipeAll(signedContent.ContentStream, contentOut); + } + + gen.AddAttributeCertificates(parser.GetAttributeCertificates()); + gen.AddCertificates(parser.GetCertificates()); + gen.AddCrls(parser.GetCrls()); + +// gen.AddSigners(parser.GetSignerInfos()); + + contentOut.Dispose(); + + return outStr; + } + + /** + * Replace the certificate and CRL information associated with this + * CMSSignedData object with the new one passed in. + *

+ * The output stream is returned unclosed. + *

+ * @param original the signed data stream to be used as a base. + * @param certsAndCrls the new certificates and CRLs to be used. + * @param out the stream to Write the new signed data object to. + * @return out. + * @exception CmsException if there is an error processing the CertStore + */ + public static Stream ReplaceCertificatesAndCrls(Stream original, IStore x509Certs, + IStore x509Crls, IStore x509AttrCerts, Stream outStr) + { + // NB: SecureRandom would be ignored since using existing signatures only + CmsSignedDataStreamGenerator gen = new CmsSignedDataStreamGenerator(); + CmsSignedDataParser parser = new CmsSignedDataParser(original); + + gen.AddDigests(parser.DigestOids); + + CmsTypedStream signedContent = parser.GetSignedContent(); + bool encapsulate = (signedContent != null); + Stream contentOut = gen.Open(outStr, parser.SignedContentType.Id, encapsulate); + if (encapsulate) + { + Streams.PipeAll(signedContent.ContentStream, contentOut); + } + + if (x509AttrCerts != null) + { + gen.AddAttributeCertificates(x509AttrCerts); + } + if (x509Certs != null) + { + gen.AddCertificates(x509Certs); + } + if (x509Crls != null) + { + gen.AddCrls(x509Crls); + } + + gen.AddSigners(parser.GetSignerInfos()); + + contentOut.Dispose(); + + return outStr; + } + + private static Asn1Set GetAsn1Set( + Asn1SetParser asn1SetParser) + { + return asn1SetParser == null + ? null + : Asn1Set.GetInstance(asn1SetParser.ToAsn1Object()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs.meta new file mode 100644 index 00000000..42b03fcc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 03d2a1ea40fe43a42bd98d82936b65c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs new file mode 100644 index 00000000..69cbf8a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs @@ -0,0 +1,913 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * General class for generating a pkcs7-signature message stream. + *

+ * A simple example of usage. + *

+ *
+    *      IX509Store                   certs...
+    *      CmsSignedDataStreamGenerator gen = new CmsSignedDataStreamGenerator();
+    *
+    *      gen.AddSigner(privateKey, cert, CmsSignedDataStreamGenerator.DIGEST_SHA1);
+    *
+    *      gen.AddCertificates(certs);
+    *
+    *      Stream sigOut = gen.Open(bOut);
+    *
+    *      sigOut.Write(Encoding.UTF8.GetBytes("Hello World!"));
+    *
+    *      sigOut.Close();
+    * 
+ */ + public class CmsSignedDataStreamGenerator + : CmsSignedGenerator + { + private static readonly CmsSignedHelper Helper = CmsSignedHelper.Instance; + + private readonly IList _signerInfs = + new List(); + private readonly HashSet _messageDigestOids = new HashSet(); + private readonly IDictionary m_messageDigests = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private readonly IDictionary m_messageHashes = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private bool _messageDigestsLocked; + private int _bufferSize; + + private class DigestAndSignerInfoGeneratorHolder + { + internal readonly ISignerInfoGenerator signerInf; + internal readonly string digestOID; + + internal DigestAndSignerInfoGeneratorHolder(ISignerInfoGenerator signerInf, string digestOID) + { + this.signerInf = signerInf; + this.digestOID = digestOID; + } + + internal AlgorithmIdentifier DigestAlgorithm + { + get { return new AlgorithmIdentifier(new DerObjectIdentifier(this.digestOID), DerNull.Instance); } + } + } + + private class SignerInfoGeneratorImpl : ISignerInfoGenerator + { + private readonly CmsSignedDataStreamGenerator outer; + + private readonly SignerIdentifier _signerIdentifier; + private readonly string _digestOID; + private readonly string _encOID; + private readonly CmsAttributeTableGenerator _sAttr; + private readonly CmsAttributeTableGenerator _unsAttr; + private readonly string _encName; + private readonly ISigner _sig; + + internal SignerInfoGeneratorImpl( + CmsSignedDataStreamGenerator outer, + AsymmetricKeyParameter key, + SignerIdentifier signerIdentifier, + string digestOID, + string encOID, + CmsAttributeTableGenerator sAttr, + CmsAttributeTableGenerator unsAttr) + { + this.outer = outer; + + _signerIdentifier = signerIdentifier; + _digestOID = digestOID; + _encOID = encOID; + _sAttr = sAttr; + _unsAttr = unsAttr; + _encName = Helper.GetEncryptionAlgName(_encOID); + + string digestName = Helper.GetDigestAlgName(_digestOID); + string signatureName = digestName + "with" + _encName; + + if (_sAttr != null) + { + _sig = Helper.GetSignatureInstance(signatureName); + } + else + { + // Note: Need to use raw signatures here since we have already calculated the digest + if (_encName.Equals("RSA")) + { + _sig = Helper.GetSignatureInstance("RSA"); + } + else if (_encName.Equals("DSA")) + { + _sig = Helper.GetSignatureInstance("NONEwithDSA"); + } + // TODO Add support for raw PSS +// else if (_encName.equals("RSAandMGF1")) +// { +// _sig = CMSSignedHelper.INSTANCE.getSignatureInstance("NONEWITHRSAPSS", _sigProvider); +// try +// { +// // Init the params this way to avoid having a 'raw' version of each PSS algorithm +// Signature sig2 = CMSSignedHelper.INSTANCE.getSignatureInstance(signatureName, _sigProvider); +// PSSParameterSpec spec = (PSSParameterSpec)sig2.getParameters().getParameterSpec(PSSParameterSpec.class); +// _sig.setParameter(spec); +// } +// catch (Exception e) +// { +// throw new SignatureException("algorithm: " + _encName + " could not be configured."); +// } +// } + else + { + throw new SignatureException("algorithm: " + _encName + " not supported in base signatures."); + } + } + + _sig.Init(true, new ParametersWithRandom(key, outer.m_random)); + } + + public SignerInfo Generate(DerObjectIdentifier contentType, AlgorithmIdentifier digestAlgorithm, + byte[] calculatedDigest) + { + try + { + string digestName = Helper.GetDigestAlgName(_digestOID); + string signatureName = digestName + "with" + _encName; + +// AlgorithmIdentifier digAlgId = DigestAlgorithmID; +// +// byte[] hash = (byte[])outer._messageHashes[Helper.GetDigestAlgName(this._digestOID)]; +// outer._digests[_digestOID] = hash.Clone(); + + byte[] bytesToSign = calculatedDigest; + + /* RFC 3852 5.4 + * The result of the message digest calculation process depends on + * whether the signedAttrs field is present. When the field is absent, + * the result is just the message digest of the content as described + * + * above. When the field is present, however, the result is the message + * digest of the complete DER encoding of the SignedAttrs value + * contained in the signedAttrs field. + */ + Asn1Set signedAttr = null; + if (_sAttr != null) + { + var parameters = outer.GetBaseParameters(contentType, digestAlgorithm, calculatedDigest); + +// Asn1.Cms.AttributeTable signed = _sAttr.GetAttributes(Collections.unmodifiableMap(parameters)); + Asn1.Cms.AttributeTable signed = _sAttr.GetAttributes(parameters); + + if (contentType == null) //counter signature + { + if (signed != null && signed[CmsAttributes.ContentType] != null) + { + signed = signed.Remove(CmsAttributes.ContentType); + } + } + + signedAttr = outer.GetAttributeSet(signed); + + // sig must be composed from the DER encoding. + bytesToSign = signedAttr.GetEncoded(Asn1Encodable.Der); + } + else + { + // Note: Need to use raw signatures here since we have already calculated the digest + if (_encName.Equals("RSA")) + { + DigestInfo dInfo = new DigestInfo(digestAlgorithm, calculatedDigest); + bytesToSign = dInfo.GetEncoded(Asn1Encodable.Der); + } + } + + _sig.BlockUpdate(bytesToSign, 0, bytesToSign.Length); + byte[] sigBytes = _sig.GenerateSignature(); + + Asn1Set unsignedAttr = null; + if (_unsAttr != null) + { + var parameters = outer.GetBaseParameters(contentType, digestAlgorithm, calculatedDigest); + parameters[CmsAttributeTableParameter.Signature] = sigBytes.Clone(); + +// Asn1.Cms.AttributeTable unsigned = _unsAttr.getAttributes(Collections.unmodifiableMap(parameters)); + Asn1.Cms.AttributeTable unsigned = _unsAttr.GetAttributes(parameters); + + unsignedAttr = outer.GetAttributeSet(unsigned); + } + + // TODO[RSAPSS] Need the ability to specify non-default parameters + Asn1Encodable sigX509Parameters = SignerUtilities.GetDefaultX509Parameters(signatureName); + AlgorithmIdentifier digestEncryptionAlgorithm = Helper.GetEncAlgorithmIdentifier( + new DerObjectIdentifier(_encOID), sigX509Parameters); + + return new SignerInfo(_signerIdentifier, digestAlgorithm, + signedAttr, digestEncryptionAlgorithm, new DerOctetString(sigBytes), unsignedAttr); + } + catch (IOException e) + { + throw new CmsStreamException("encoding error.", e); + } + catch (SignatureException e) + { + throw new CmsStreamException("error creating signature.", e); + } + } + } + + public CmsSignedDataStreamGenerator() + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + public CmsSignedDataStreamGenerator(SecureRandom random) + : base(random) + { + } + + /** + * Set the underlying string size for encapsulated data + * + * @param bufferSize length of octet strings to buffer the data. + */ + public void SetBufferSize(int bufferSize) + { + _bufferSize = bufferSize; + } + + public void AddDigests(params string[] digestOids) + { + foreach (string digestOid in digestOids) + { + ConfigureDigest(digestOid); + } + } + + public void AddDigests(IEnumerable digestOids) + { + foreach (string digestOid in digestOids) + { + ConfigureDigest(digestOid); + } + } + + /** + * add a signer - no attributes other than the default ones will be + * provided here. + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOid) + { + AddSigner(privateKey, cert, digestOid, + new DefaultSignedAttributeTableGenerator(), null); + } + + /** + * add a signer, specifying the digest encryption algorithm - no attributes other than the default ones will be + * provided here. + * @throws NoSuchProviderException + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOid, + string digestOid) + { + AddSigner(privateKey, cert, encryptionOid, digestOid, + new DefaultSignedAttributeTableGenerator(), + (CmsAttributeTableGenerator)null); + } + + /** + * add a signer with extra signed/unsigned attributes. + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOid, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + AddSigner(privateKey, cert, digestOid, + new DefaultSignedAttributeTableGenerator(signedAttr), + new SimpleAttributeTableGenerator(unsignedAttr)); + } + + /** + * add a signer with extra signed/unsigned attributes - specifying digest + * encryption algorithm. + * @throws NoSuchProviderException + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOid, + string digestOid, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + AddSigner(privateKey, cert, encryptionOid, digestOid, + new DefaultSignedAttributeTableGenerator(signedAttr), + new SimpleAttributeTableGenerator(unsignedAttr)); + } + + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string digestOid, + CmsAttributeTableGenerator signedAttrGenerator, + CmsAttributeTableGenerator unsignedAttrGenerator) + { + AddSigner(privateKey, cert, Helper.GetEncOid(privateKey, digestOid), digestOid, + signedAttrGenerator, unsignedAttrGenerator); + } + + public void AddSigner( + AsymmetricKeyParameter privateKey, + X509Certificate cert, + string encryptionOid, + string digestOid, + CmsAttributeTableGenerator signedAttrGenerator, + CmsAttributeTableGenerator unsignedAttrGenerator) + { + DoAddSigner(privateKey, GetSignerIdentifier(cert), encryptionOid, digestOid, + signedAttrGenerator, unsignedAttrGenerator); + } + + /** + * add a signer - no attributes other than the default ones will be + * provided here. + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOid) + { + AddSigner(privateKey, subjectKeyID, digestOid, new DefaultSignedAttributeTableGenerator(), + (CmsAttributeTableGenerator)null); + } + + /** + * add a signer - no attributes other than the default ones will be + * provided here. + * @throws NoSuchProviderException + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string encryptionOid, + string digestOid) + { + AddSigner(privateKey, subjectKeyID, encryptionOid, digestOid, + new DefaultSignedAttributeTableGenerator(), + (CmsAttributeTableGenerator)null); + } + + /** + * add a signer with extra signed/unsigned attributes. + * @throws NoSuchAlgorithmException + * @throws InvalidKeyException + */ + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOid, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + AddSigner(privateKey, subjectKeyID, digestOid, + new DefaultSignedAttributeTableGenerator(signedAttr), + new SimpleAttributeTableGenerator(unsignedAttr)); + } + + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string digestOid, + CmsAttributeTableGenerator signedAttrGenerator, + CmsAttributeTableGenerator unsignedAttrGenerator) + { + AddSigner(privateKey, subjectKeyID, Helper.GetEncOid(privateKey, digestOid), + digestOid, signedAttrGenerator, unsignedAttrGenerator); + } + + public void AddSigner( + AsymmetricKeyParameter privateKey, + byte[] subjectKeyID, + string encryptionOid, + string digestOid, + CmsAttributeTableGenerator signedAttrGenerator, + CmsAttributeTableGenerator unsignedAttrGenerator) + { + DoAddSigner(privateKey, GetSignerIdentifier(subjectKeyID), encryptionOid, digestOid, + signedAttrGenerator, unsignedAttrGenerator); + } + + private void DoAddSigner( + AsymmetricKeyParameter privateKey, + SignerIdentifier signerIdentifier, + string encryptionOid, + string digestOid, + CmsAttributeTableGenerator signedAttrGenerator, + CmsAttributeTableGenerator unsignedAttrGenerator) + { + ConfigureDigest(digestOid); + + SignerInfoGeneratorImpl signerInf = new SignerInfoGeneratorImpl(this, privateKey, + signerIdentifier, digestOid, encryptionOid, signedAttrGenerator, unsignedAttrGenerator); + + _signerInfs.Add(new DigestAndSignerInfoGeneratorHolder(signerInf, digestOid)); + } + + internal override void AddSignerCallback( + SignerInformation si) + { + // FIXME If there were parameters in si.DigestAlgorithmID.Parameters, they are lost + // NB: Would need to call FixAlgID on the DigestAlgorithmID + + // For precalculated signers, just need to register the algorithm, not configure a digest + RegisterDigestOid(si.DigestAlgorithmID.Algorithm.Id); + } + + /** + * generate a signed object that for a CMS Signed Data object + */ + public Stream Open( + Stream outStream) + { + return Open(outStream, false); + } + + /** + * generate a signed object that for a CMS Signed Data + * object - if encapsulate is true a copy + * of the message will be included in the signature with the + * default content type "data". + */ + public Stream Open( + Stream outStream, + bool encapsulate) + { + return Open(outStream, Data, encapsulate); + } + + /** + * generate a signed object that for a CMS Signed Data + * object using the given provider - if encapsulate is true a copy + * of the message will be included in the signature with the + * default content type "data". If dataOutputStream is non null the data + * being signed will be written to the stream as it is processed. + * @param out stream the CMS object is to be written to. + * @param encapsulate true if data should be encapsulated. + * @param dataOutputStream output stream to copy the data being signed to. + */ + public Stream Open( + Stream outStream, + bool encapsulate, + Stream dataOutputStream) + { + return Open(outStream, Data, encapsulate, dataOutputStream); + } + + /** + * generate a signed object that for a CMS Signed Data + * object - if encapsulate is true a copy + * of the message will be included in the signature. The content type + * is set according to the OID represented by the string signedContentType. + */ + public Stream Open( + Stream outStream, + string signedContentType, + bool encapsulate) + { + return Open(outStream, signedContentType, encapsulate, null); + } + + /** + * generate a signed object that for a CMS Signed Data + * object using the given provider - if encapsulate is true a copy + * of the message will be included in the signature. The content type + * is set according to the OID represented by the string signedContentType. + * @param out stream the CMS object is to be written to. + * @param signedContentType OID for data to be signed. + * @param encapsulate true if data should be encapsulated. + * @param dataOutputStream output stream to copy the data being signed to. + */ + public Stream Open( + Stream outStream, + string signedContentType, + bool encapsulate, + Stream dataOutputStream) + { + if (outStream == null) + throw new ArgumentNullException("outStream"); + if (!outStream.CanWrite) + throw new ArgumentException("Expected writeable stream", "outStream"); + if (dataOutputStream != null && !dataOutputStream.CanWrite) + throw new ArgumentException("Expected writeable stream", "dataOutputStream"); + + _messageDigestsLocked = true; + + // + // ContentInfo + // + BerSequenceGenerator sGen = new BerSequenceGenerator(outStream); + + sGen.AddObject(CmsObjectIdentifiers.SignedData); + + // + // Signed Data + // + BerSequenceGenerator sigGen = new BerSequenceGenerator( + sGen.GetRawOutputStream(), 0, true); + + bool isCounterSignature = (signedContentType == null); + + DerObjectIdentifier contentTypeOid = isCounterSignature + ? null + : new DerObjectIdentifier(signedContentType); + + sigGen.AddObject(CalculateVersion(contentTypeOid)); + + Asn1EncodableVector digestAlgs = new Asn1EncodableVector(); + + foreach (string digestOid in _messageDigestOids) + { + digestAlgs.Add(new AlgorithmIdentifier(new DerObjectIdentifier(digestOid), DerNull.Instance)); + } + + new DerSet(digestAlgs).EncodeTo(sigGen.GetRawOutputStream()); + + BerSequenceGenerator eiGen = new BerSequenceGenerator(sigGen.GetRawOutputStream()); + eiGen.AddObject(contentTypeOid); + + // If encapsulating, add the data as an octet string in the sequence + Stream encapStream = encapsulate + ? CmsUtilities.CreateBerOctetOutputStream(eiGen.GetRawOutputStream(), 0, true, _bufferSize) + : null; + + // Also send the data to 'dataOutputStream' if necessary + Stream teeStream = GetSafeTeeOutputStream(dataOutputStream, encapStream); + + // Let all the digests see the data as it is written + Stream digStream = AttachDigestsToOutputStream(m_messageDigests.Values, teeStream); + + return new CmsSignedDataOutputStream(this, digStream, signedContentType, sGen, sigGen, eiGen); + } + + private void RegisterDigestOid( + string digestOid) + { + if (_messageDigestsLocked) + { + if (!_messageDigestOids.Contains(digestOid)) + throw new InvalidOperationException("Cannot register new digest OIDs after the data stream is opened"); + } + else + { + _messageDigestOids.Add(digestOid); + } + } + + private void ConfigureDigest(string digestOid) + { + RegisterDigestOid(digestOid); + + string digestName = Helper.GetDigestAlgName(digestOid); + + if (!m_messageDigests.ContainsKey(digestName)) + { + if (_messageDigestsLocked) + throw new InvalidOperationException("Cannot configure new digests after the data stream is opened"); + + m_messageDigests[digestName] = Helper.GetDigestInstance(digestName); + } + } + + // TODO Make public? + internal void Generate( + Stream outStream, + string eContentType, + bool encapsulate, + Stream dataOutputStream, + CmsProcessable content) + { + using (var signedOut = Open(outStream, eContentType, encapsulate, dataOutputStream)) + { + if (content != null) + { + content.Write(signedOut); + } + } + } + + // RFC3852, section 5.1: + // IF ((certificates is present) AND + // (any certificates with a type of other are present)) OR + // ((crls is present) AND + // (any crls with a type of other are present)) + // THEN version MUST be 5 + // ELSE + // IF (certificates is present) AND + // (any version 2 attribute certificates are present) + // THEN version MUST be 4 + // ELSE + // IF ((certificates is present) AND + // (any version 1 attribute certificates are present)) OR + // (any SignerInfo structures are version 3) OR + // (encapContentInfo eContentType is other than id-data) + // THEN version MUST be 3 + // ELSE version MUST be 1 + // + private DerInteger CalculateVersion( + DerObjectIdentifier contentOid) + { + bool otherCert = false; + bool otherCrl = false; + bool attrCertV1Found = false; + bool attrCertV2Found = false; + + if (_certs != null) + { + foreach (object obj in _certs) + { + if (obj is Asn1TaggedObject tagged) + { + if (tagged.TagNo == 1) + { + attrCertV1Found = true; + } + else if (tagged.TagNo == 2) + { + attrCertV2Found = true; + } + else if (tagged.TagNo == 3) + { + otherCert = true; + break; + } + } + } + } + + if (otherCert) + { + return new DerInteger(5); + } + + if (_crls != null) + { + foreach (object obj in _crls) + { + if (obj is Asn1TaggedObject) + { + otherCrl = true; + break; + } + } + } + + if (otherCrl) + { + return new DerInteger(5); + } + + if (attrCertV2Found) + { + return new DerInteger(4); + } + + if (attrCertV1Found || !CmsObjectIdentifiers.Data.Equals(contentOid) || CheckForVersion3(_signers)) + { + return new DerInteger(3); + } + + return new DerInteger(1); + } + + private bool CheckForVersion3(IList signerInfos) + { + foreach (SignerInformation si in signerInfos) + { + SignerInfo s = SignerInfo.GetInstance(si.ToSignerInfo()); + + if (s.Version.IntValueExact == 3) + return true; + } + + return false; + } + + private static Stream AttachDigestsToOutputStream(IEnumerable digests, Stream s) + { + Stream result = s; + foreach (IDigest digest in digests) + { + result = GetSafeTeeOutputStream(result, new DigestSink(digest)); + } + return result; + } + + private static Stream GetSafeOutputStream(Stream s) + { + return s ?? Stream.Null; + } + + private static Stream GetSafeTeeOutputStream(Stream s1, Stream s2) + { + if (s1 == null) + return GetSafeOutputStream(s2); + if (s2 == null) + return GetSafeOutputStream(s1); + return new TeeOutputStream(s1, s2); + } + + private class CmsSignedDataOutputStream + : BaseOutputStream + { + private readonly CmsSignedDataStreamGenerator outer; + + private Stream _out; + private DerObjectIdentifier _contentOID; + private BerSequenceGenerator _sGen; + private BerSequenceGenerator _sigGen; + private BerSequenceGenerator _eiGen; + + public CmsSignedDataOutputStream( + CmsSignedDataStreamGenerator outer, + Stream outStream, + string contentOID, + BerSequenceGenerator sGen, + BerSequenceGenerator sigGen, + BerSequenceGenerator eiGen) + { + this.outer = outer; + + _out = outStream; + _contentOID = new DerObjectIdentifier(contentOID); + _sGen = sGen; + _sigGen = sigGen; + _eiGen = eiGen; + } + + public override void Write(byte[] buffer, int offset, int count) + { + _out.Write(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + _out.Write(buffer); + } +#endif + + public override void WriteByte(byte value) + { + _out.WriteByte(value); + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + DoClose(); + } + base.Dispose(disposing); + } + + private void DoClose() + { + _out.Dispose(); + + // TODO Parent context(s) should really be be closed explicitly + + _eiGen.Close(); + + outer.m_digests.Clear(); // clear the current preserved digest state + + if (outer._certs.Count > 0) + { + Asn1Set certs = outer.UseDerForCerts + ? CmsUtilities.CreateDerSetFromList(outer._certs) + : CmsUtilities.CreateBerSetFromList(outer._certs); + + WriteToGenerator(_sigGen, new BerTaggedObject(false, 0, certs)); + } + + if (outer._crls.Count > 0) + { + Asn1Set crls = outer.UseDerForCrls + ? CmsUtilities.CreateDerSetFromList(outer._crls) + : CmsUtilities.CreateBerSetFromList(outer._crls); + + WriteToGenerator(_sigGen, new BerTaggedObject(false, 1, crls)); + } + + // + // Calculate the digest hashes + // + foreach (var de in outer.m_messageDigests) + { + outer.m_messageHashes.Add(de.Key, DigestUtilities.DoFinal(de.Value)); + } + + // TODO If the digest OIDs for precalculated signers weren't mixed in with + // the others, we could fill in outer._digests here, instead of SignerInfoGenerator.Generate + + // + // collect all the SignerInfo objects + // + Asn1EncodableVector signerInfos = new Asn1EncodableVector(); + + // + // add the generated SignerInfo objects + // + { + foreach (DigestAndSignerInfoGeneratorHolder holder in outer._signerInfs) + { + AlgorithmIdentifier digestAlgorithm = holder.DigestAlgorithm; + + byte[] calculatedDigest = outer.m_messageHashes[ + Helper.GetDigestAlgName(holder.digestOID)]; + outer.m_digests[holder.digestOID] = (byte[])calculatedDigest.Clone(); + + signerInfos.Add(holder.signerInf.Generate(_contentOID, digestAlgorithm, calculatedDigest)); + } + } + + // + // add the precalculated SignerInfo objects. + // + { + foreach (SignerInformation signer in outer._signers) + { + // TODO Verify the content type and calculated digest match the precalculated SignerInfo +// if (!signer.ContentType.Equals(_contentOID)) +// { +// // TODO The precalculated content type did not match - error? +// } +// +// byte[] calculatedDigest = (byte[])outer._digests[signer.DigestAlgOid]; +// if (calculatedDigest == null) +// { +// // TODO We can't confirm this digest because we didn't calculate it - error? +// } +// else +// { +// if (!Arrays.AreEqual(signer.GetContentDigest(), calculatedDigest)) +// { +// // TODO The precalculated digest did not match - error? +// } +// } + + signerInfos.Add(signer.ToSignerInfo()); + } + } + + WriteToGenerator(_sigGen, new DerSet(signerInfos)); + + _sigGen.Close(); + _sGen.Close(); + } + + private static void WriteToGenerator(Asn1Generator ag, Asn1Encodable ae) + { + ae.EncodeTo(ag.GetRawOutputStream()); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs.meta new file mode 100644 index 00000000..c9c08acb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9d28396cf720f5459e6a61ff640cf8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedDataStreamGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs new file mode 100644 index 00000000..c3b7a130 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs @@ -0,0 +1,664 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class DefaultSignatureAlgorithmIdentifierFinder + { + private static readonly IDictionary m_algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly HashSet noParams = new HashSet(); + private static readonly IDictionary m_params = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly HashSet pkcs15RsaEncryption = new HashSet(); + private static readonly IDictionary m_digestOids = + new Dictionary(); + + //private static readonly DerObjectIdentifier ENCRYPTION_RSA = PkcsObjectIdentifiers.RsaEncryption; + //private static readonly DerObjectIdentifier ENCRYPTION_DSA = X9ObjectIdentifiers.IdDsaWithSha1; + //private static readonly DerObjectIdentifier ENCRYPTION_ECDSA = X9ObjectIdentifiers.ECDsaWithSha1; + //private static readonly DerObjectIdentifier ENCRYPTION_RSA_PSS = PkcsObjectIdentifiers.IdRsassaPss; + //private static readonly DerObjectIdentifier ENCRYPTION_GOST3410 = CryptoProObjectIdentifiers.GostR3410x94; + //private static readonly DerObjectIdentifier ENCRYPTION_ECGOST3410 = CryptoProObjectIdentifiers.GostR3410x2001; + //private static readonly DerObjectIdentifier ENCRYPTION_ECGOST3410_2012_256 = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256; + //private static readonly DerObjectIdentifier ENCRYPTION_ECGOST3410_2012_512 = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512; + + static DefaultSignatureAlgorithmIdentifierFinder() + { + m_algorithms["MD2WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.MD2WithRsaEncryption; + m_algorithms["MD2WITHRSA"] = PkcsObjectIdentifiers.MD2WithRsaEncryption; + m_algorithms["MD5WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.MD5WithRsaEncryption; + m_algorithms["MD5WITHRSA"] = PkcsObjectIdentifiers.MD5WithRsaEncryption; + m_algorithms["SHA1WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha1WithRsaEncryption; + m_algorithms["SHA-1WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha1WithRsaEncryption; + m_algorithms["SHA1WITHRSA"] = PkcsObjectIdentifiers.Sha1WithRsaEncryption; + m_algorithms["SHA-1WITHRSA"] = PkcsObjectIdentifiers.Sha1WithRsaEncryption; + m_algorithms["SHA224WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha224WithRsaEncryption; + m_algorithms["SHA-224WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha224WithRsaEncryption; + m_algorithms["SHA224WITHRSA"] = PkcsObjectIdentifiers.Sha224WithRsaEncryption; + m_algorithms["SHA-224WITHRSA"] = PkcsObjectIdentifiers.Sha224WithRsaEncryption; + m_algorithms["SHA256WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha256WithRsaEncryption; + m_algorithms["SHA-256WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha256WithRsaEncryption; + m_algorithms["SHA256WITHRSA"] = PkcsObjectIdentifiers.Sha256WithRsaEncryption; + m_algorithms["SHA-256WITHRSA"] = PkcsObjectIdentifiers.Sha256WithRsaEncryption; + m_algorithms["SHA384WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha384WithRsaEncryption; + m_algorithms["SHA-384WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha384WithRsaEncryption; + m_algorithms["SHA384WITHRSA"] = PkcsObjectIdentifiers.Sha384WithRsaEncryption; + m_algorithms["SHA-384WITHRSA"] = PkcsObjectIdentifiers.Sha384WithRsaEncryption; + m_algorithms["SHA512WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512WithRsaEncryption; + m_algorithms["SHA-512WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512WithRsaEncryption; + m_algorithms["SHA512WITHRSA"] = PkcsObjectIdentifiers.Sha512WithRsaEncryption; + m_algorithms["SHA-512WITHRSA"] = PkcsObjectIdentifiers.Sha512WithRsaEncryption; + m_algorithms["SHA512(224)WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512_224WithRSAEncryption; + m_algorithms["SHA-512(224)WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512_224WithRSAEncryption; + m_algorithms["SHA512(224)WITHRSA"] = PkcsObjectIdentifiers.Sha512_224WithRSAEncryption; + m_algorithms["SHA-512(224)WITHRSA"] = PkcsObjectIdentifiers.Sha512_224WithRSAEncryption; + m_algorithms["SHA512(256)WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512_256WithRSAEncryption; + m_algorithms["SHA-512(256)WITHRSAENCRYPTION"] = PkcsObjectIdentifiers.Sha512_256WithRSAEncryption; + m_algorithms["SHA512(256)WITHRSA"] = PkcsObjectIdentifiers.Sha512_256WithRSAEncryption; + m_algorithms["SHA-512(256)WITHRSA"] = PkcsObjectIdentifiers.Sha512_256WithRSAEncryption; + m_algorithms["SHA1WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA224WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA256WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA384WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA512WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA3-224WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA3-256WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA3-384WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["SHA3-512WITHRSAANDMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + m_algorithms["RIPEMD160WITHRSAENCRYPTION"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160; + m_algorithms["RIPEMD160WITHRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160; + m_algorithms["RIPEMD128WITHRSAENCRYPTION"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128; + m_algorithms["RIPEMD128WITHRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128; + m_algorithms["RIPEMD256WITHRSAENCRYPTION"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256; + m_algorithms["RIPEMD256WITHRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256; + m_algorithms["SHA1WITHDSA"] = X9ObjectIdentifiers.IdDsaWithSha1; + m_algorithms["SHA-1WITHDSA"] = X9ObjectIdentifiers.IdDsaWithSha1; + m_algorithms["DSAWITHSHA1"] = X9ObjectIdentifiers.IdDsaWithSha1; + m_algorithms["SHA224WITHDSA"] = NistObjectIdentifiers.DsaWithSha224; + m_algorithms["SHA256WITHDSA"] = NistObjectIdentifiers.DsaWithSha256; + m_algorithms["SHA384WITHDSA"] = NistObjectIdentifiers.DsaWithSha384; + m_algorithms["SHA512WITHDSA"] = NistObjectIdentifiers.DsaWithSha512; + m_algorithms["SHA3-224WITHDSA"] = NistObjectIdentifiers.IdDsaWithSha3_224; + m_algorithms["SHA3-256WITHDSA"] = NistObjectIdentifiers.IdDsaWithSha3_256; + m_algorithms["SHA3-384WITHDSA"] = NistObjectIdentifiers.IdDsaWithSha3_384; + m_algorithms["SHA3-512WITHDSA"] = NistObjectIdentifiers.IdDsaWithSha3_512; + m_algorithms["SHA3-224WITHECDSA"] = NistObjectIdentifiers.IdEcdsaWithSha3_224; + m_algorithms["SHA3-256WITHECDSA"] = NistObjectIdentifiers.IdEcdsaWithSha3_256; + m_algorithms["SHA3-384WITHECDSA"] = NistObjectIdentifiers.IdEcdsaWithSha3_384; + m_algorithms["SHA3-512WITHECDSA"] = NistObjectIdentifiers.IdEcdsaWithSha3_512; + m_algorithms["SHA3-224WITHRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224; + m_algorithms["SHA3-256WITHRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256; + m_algorithms["SHA3-384WITHRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384; + m_algorithms["SHA3-512WITHRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512; + m_algorithms["SHA3-224WITHRSAENCRYPTION"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224; + m_algorithms["SHA3-256WITHRSAENCRYPTION"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256; + m_algorithms["SHA3-384WITHRSAENCRYPTION"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384; + m_algorithms["SHA3-512WITHRSAENCRYPTION"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512; + m_algorithms["SHA1WITHECDSA"] = X9ObjectIdentifiers.ECDsaWithSha1; + m_algorithms["ECDSAWITHSHA1"] = X9ObjectIdentifiers.ECDsaWithSha1; + m_algorithms["SHA224WITHECDSA"] = X9ObjectIdentifiers.ECDsaWithSha224; + m_algorithms["SHA256WITHECDSA"] = X9ObjectIdentifiers.ECDsaWithSha256; + m_algorithms["SHA384WITHECDSA"] = X9ObjectIdentifiers.ECDsaWithSha384; + m_algorithms["SHA512WITHECDSA"] = X9ObjectIdentifiers.ECDsaWithSha512; + + + m_algorithms["GOST3411WITHGOST3410"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94; + m_algorithms["GOST3411WITHGOST3410-94"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94; + m_algorithms["GOST3411WITHECGOST3410"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001; + m_algorithms["GOST3411WITHECGOST3410-2001"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001; + m_algorithms["GOST3411WITHGOST3410-2001"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001; + m_algorithms["GOST3411WITHECGOST3410-2012-256"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256; + m_algorithms["GOST3411WITHECGOST3410-2012-512"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512; + m_algorithms["GOST3411-2012-256WITHECGOST3410"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256; + m_algorithms["GOST3411-2012-256WITHECGOST3410-2012-256"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256; + m_algorithms["GOST3411-2012-512WITHECGOST3410"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512; + m_algorithms["GOST3411-2012-512WITHECGOST3410-2012-512"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512; + m_algorithms["SHA1WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA1; + m_algorithms["SHA224WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA224; + m_algorithms["SHA256WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA256; + m_algorithms["SHA384WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA384; + m_algorithms["SHA512WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA512; + m_algorithms["RIPEMD160WITHPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_RIPEMD160; + m_algorithms["SHA1WITHCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_1; + m_algorithms["SHA224WITHCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_224; + m_algorithms["SHA256WITHCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_256; + m_algorithms["SHA384WITHCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_384; + m_algorithms["SHA512WITHCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_512; + m_algorithms["SHA3-512WITHSPHINCS256"] = BCObjectIdentifiers.sphincs256_with_SHA3_512; + m_algorithms["SHA512WITHSPHINCS256"] = BCObjectIdentifiers.sphincs256_with_SHA512; + + m_algorithms["SHA256WITHSM2"] = GMObjectIdentifiers.sm2sign_with_sha256; + m_algorithms["SM3WITHSM2"] = GMObjectIdentifiers.sm2sign_with_sm3; + + m_algorithms["SHA256WITHXMSS"] = BCObjectIdentifiers.xmss_with_SHA256; + m_algorithms["SHA512WITHXMSS"] = BCObjectIdentifiers.xmss_with_SHA512; + m_algorithms["SHAKE128WITHXMSS"] = BCObjectIdentifiers.xmss_with_SHAKE128; + m_algorithms["SHAKE256WITHXMSS"] = BCObjectIdentifiers.xmss_with_SHAKE256; + + m_algorithms["SHA256WITHXMSSMT"] = BCObjectIdentifiers.xmss_mt_with_SHA256; + m_algorithms["SHA512WITHXMSSMT"] = BCObjectIdentifiers.xmss_mt_with_SHA512; + m_algorithms["SHAKE128WITHXMSSMT"] = BCObjectIdentifiers.xmss_mt_with_SHAKE128; + m_algorithms["SHAKE256WITHXMSSMT"] = BCObjectIdentifiers.xmss_mt_with_SHAKE256; + + + // + // According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) omit the parameters field. + // The parameters field SHALL be NULL for RSA based signature algorithms. + // + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha1); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha224); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha256); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha384); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha512); + noParams.Add(X9ObjectIdentifiers.IdDsaWithSha1); + noParams.Add(NistObjectIdentifiers.DsaWithSha224); + noParams.Add(NistObjectIdentifiers.DsaWithSha256); + noParams.Add(NistObjectIdentifiers.DsaWithSha384); + noParams.Add(NistObjectIdentifiers.DsaWithSha512); + noParams.Add(NistObjectIdentifiers.IdDsaWithSha3_224); + noParams.Add(NistObjectIdentifiers.IdDsaWithSha3_256); + noParams.Add(NistObjectIdentifiers.IdDsaWithSha3_384); + noParams.Add(NistObjectIdentifiers.IdDsaWithSha3_512); + noParams.Add(NistObjectIdentifiers.IdEcdsaWithSha3_224); + noParams.Add(NistObjectIdentifiers.IdEcdsaWithSha3_256); + noParams.Add(NistObjectIdentifiers.IdEcdsaWithSha3_384); + noParams.Add(NistObjectIdentifiers.IdEcdsaWithSha3_512); + + + // + // RFC 4491 + // + noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + noParams.Add(RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256); + noParams.Add(RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512); + + // + // SPHINCS-256 + // + noParams.Add(BCObjectIdentifiers.sphincs256_with_SHA512); + noParams.Add(BCObjectIdentifiers.sphincs256_with_SHA3_512); + + // + // XMSS + // + noParams.Add(BCObjectIdentifiers.xmss_with_SHA256); + noParams.Add(BCObjectIdentifiers.xmss_with_SHA512); + noParams.Add(BCObjectIdentifiers.xmss_with_SHAKE128); + noParams.Add(BCObjectIdentifiers.xmss_with_SHAKE256); + noParams.Add(BCObjectIdentifiers.xmss_mt_with_SHA256); + noParams.Add(BCObjectIdentifiers.xmss_mt_with_SHA512); + noParams.Add(BCObjectIdentifiers.xmss_mt_with_SHAKE128); + noParams.Add(BCObjectIdentifiers.xmss_mt_with_SHAKE256); + + // + // SM2 + // + noParams.Add(GMObjectIdentifiers.sm2sign_with_sha256); + noParams.Add(GMObjectIdentifiers.sm2sign_with_sm3); + + // + // PKCS 1.5 encrypted algorithms + // + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha1WithRsaEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha224WithRsaEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha256WithRsaEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha384WithRsaEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha512WithRsaEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + pkcs15RsaEncryption.Add(PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + pkcs15RsaEncryption.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + pkcs15RsaEncryption.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + pkcs15RsaEncryption.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + pkcs15RsaEncryption.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224); + pkcs15RsaEncryption.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256); + pkcs15RsaEncryption.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384); + pkcs15RsaEncryption.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512); + + // + // explicit params + // + AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + m_params["SHA1WITHRSAANDMGF1"] = CreatePssParams(sha1AlgId, 20); + + AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha224, DerNull.Instance); + m_params["SHA224WITHRSAANDMGF1"] = CreatePssParams(sha224AlgId, 28); + + AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance); + m_params["SHA256WITHRSAANDMGF1"] = CreatePssParams(sha256AlgId, 32); + + AlgorithmIdentifier sha384AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance); + m_params["SHA384WITHRSAANDMGF1"] = CreatePssParams(sha384AlgId, 48); + + AlgorithmIdentifier sha512AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance); + m_params["SHA512WITHRSAANDMGF1"] = CreatePssParams(sha512AlgId, 64); + + AlgorithmIdentifier sha3_224AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha3_224, DerNull.Instance); + m_params["SHA3-224WITHRSAANDMGF1"] = CreatePssParams(sha3_224AlgId, 28); + + AlgorithmIdentifier sha3_256AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha3_256, DerNull.Instance); + m_params["SHA3-256WITHRSAANDMGF1"] = CreatePssParams(sha3_256AlgId, 32); + + AlgorithmIdentifier sha3_384AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha3_384, DerNull.Instance); + m_params["SHA3-384WITHRSAANDMGF1"] = CreatePssParams(sha3_384AlgId, 48); + + AlgorithmIdentifier sha3_512AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha3_512, DerNull.Instance); + m_params["SHA3-512WITHRSAANDMGF1"] = CreatePssParams(sha3_512AlgId, 64); + + // + // digests + // + m_digestOids[PkcsObjectIdentifiers.Sha224WithRsaEncryption] = NistObjectIdentifiers.IdSha224; + m_digestOids[PkcsObjectIdentifiers.Sha256WithRsaEncryption] = NistObjectIdentifiers.IdSha256; + m_digestOids[PkcsObjectIdentifiers.Sha384WithRsaEncryption] = NistObjectIdentifiers.IdSha384; + m_digestOids[PkcsObjectIdentifiers.Sha512WithRsaEncryption] = NistObjectIdentifiers.IdSha512; + m_digestOids[PkcsObjectIdentifiers.Sha512_224WithRSAEncryption] = NistObjectIdentifiers.IdSha512_224; + m_digestOids[PkcsObjectIdentifiers.Sha512_256WithRSAEncryption] = NistObjectIdentifiers.IdSha512_256; + m_digestOids[NistObjectIdentifiers.DsaWithSha224] = NistObjectIdentifiers.IdSha224; + m_digestOids[NistObjectIdentifiers.DsaWithSha256] = NistObjectIdentifiers.IdSha256; + m_digestOids[NistObjectIdentifiers.DsaWithSha384] = NistObjectIdentifiers.IdSha384; + m_digestOids[NistObjectIdentifiers.DsaWithSha512] = NistObjectIdentifiers.IdSha512; + m_digestOids[NistObjectIdentifiers.IdDsaWithSha3_224] = NistObjectIdentifiers.IdSha3_224; + m_digestOids[NistObjectIdentifiers.IdDsaWithSha3_256] = NistObjectIdentifiers.IdSha3_256; + m_digestOids[NistObjectIdentifiers.IdDsaWithSha3_384] = NistObjectIdentifiers.IdSha3_384; + m_digestOids[NistObjectIdentifiers.IdDsaWithSha3_512] = NistObjectIdentifiers.IdSha3_512; + m_digestOids[NistObjectIdentifiers.IdEcdsaWithSha3_224] = NistObjectIdentifiers.IdSha3_224; + m_digestOids[NistObjectIdentifiers.IdEcdsaWithSha3_256] = NistObjectIdentifiers.IdSha3_256; + m_digestOids[NistObjectIdentifiers.IdEcdsaWithSha3_384] = NistObjectIdentifiers.IdSha3_384; + m_digestOids[NistObjectIdentifiers.IdEcdsaWithSha3_512] = NistObjectIdentifiers.IdSha3_512; + m_digestOids[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224] = NistObjectIdentifiers.IdSha3_224; + m_digestOids[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256] = NistObjectIdentifiers.IdSha3_256; + m_digestOids[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384] = NistObjectIdentifiers.IdSha3_384; + m_digestOids[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512] = NistObjectIdentifiers.IdSha3_512; + + m_digestOids[PkcsObjectIdentifiers.MD2WithRsaEncryption] = PkcsObjectIdentifiers.MD2; + m_digestOids[PkcsObjectIdentifiers.MD4WithRsaEncryption] = PkcsObjectIdentifiers.MD4; + m_digestOids[PkcsObjectIdentifiers.MD5WithRsaEncryption] = PkcsObjectIdentifiers.MD5; + m_digestOids[PkcsObjectIdentifiers.Sha1WithRsaEncryption] = OiwObjectIdentifiers.IdSha1; + m_digestOids[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128] = TeleTrusTObjectIdentifiers.RipeMD128; + m_digestOids[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160] = TeleTrusTObjectIdentifiers.RipeMD160; + m_digestOids[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256] = TeleTrusTObjectIdentifiers.RipeMD256; + m_digestOids[CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94] = CryptoProObjectIdentifiers.GostR3411; + m_digestOids[CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001] = CryptoProObjectIdentifiers.GostR3411; + m_digestOids[RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256] = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256; + m_digestOids[RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512] = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512; + + m_digestOids[GMObjectIdentifiers.sm2sign_with_sha256] = NistObjectIdentifiers.IdSha256; + m_digestOids[GMObjectIdentifiers.sm2sign_with_sm3] = GMObjectIdentifiers.sm3; + } + + private static AlgorithmIdentifier Generate(string signatureAlgorithm) + { + AlgorithmIdentifier sigAlgId; + //AlgorithmIdentifier encAlgId; + //AlgorithmIdentifier digAlgId; + + if (!m_algorithms.TryGetValue(signatureAlgorithm, out var sigOid)) + throw new ArgumentException("Unknown signature type requested: " + signatureAlgorithm); + + if (noParams.Contains(sigOid)) + { + sigAlgId = new AlgorithmIdentifier(sigOid); + } + else if (m_params.TryGetValue(signatureAlgorithm, out var explicitParameters)) + { + sigAlgId = new AlgorithmIdentifier(sigOid, explicitParameters); + } + else + { + sigAlgId = new AlgorithmIdentifier(sigOid, DerNull.Instance); + } + + //if (pkcs15RsaEncryption.Contains(sigOid)) + //{ + // encAlgId = new AlgorithmIdentifier(PkcsObjectIdentifiers.RsaEncryption, DerNull.Instance); + //} + //else + //{ + // encAlgId = sigAlgId; + //} + + //if (sigAlgId.Algorithm.Equals(PkcsObjectIdentifiers.IdRsassaPss)) + //{ + // digAlgId = ((RsassaPssParameters)sigAlgId.Parameters).HashAlgorithm; + //} + //else + //{ + // digAlgId = new AlgorithmIdentifier(m_digestOids[sigOid], DerNull.Instance); + //} + + return sigAlgId; + } + + private static RsassaPssParameters CreatePssParams(AlgorithmIdentifier hashAlgId, int saltSize) + { + return new RsassaPssParameters( + hashAlgId, + new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, hashAlgId), + new DerInteger(saltSize), + new DerInteger(1)); + } + + public AlgorithmIdentifier Find(string sigAlgName) + { + return Generate(sigAlgName); + } + } + + public class DefaultDigestAlgorithmIdentifierFinder + { + private static readonly IDictionary m_digestOids = + new Dictionary(); + private static readonly IDictionary m_digestNameToOids = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static DefaultDigestAlgorithmIdentifierFinder() + { + // + // digests + // + m_digestOids.Add(OiwObjectIdentifiers.MD4WithRsaEncryption, PkcsObjectIdentifiers.MD4); + m_digestOids.Add(OiwObjectIdentifiers.MD4WithRsa, PkcsObjectIdentifiers.MD4); + m_digestOids.Add(OiwObjectIdentifiers.MD5WithRsa, PkcsObjectIdentifiers.MD5); + m_digestOids.Add(OiwObjectIdentifiers.Sha1WithRsa, OiwObjectIdentifiers.IdSha1); + m_digestOids.Add(OiwObjectIdentifiers.DsaWithSha1, OiwObjectIdentifiers.IdSha1); + + m_digestOids.Add(PkcsObjectIdentifiers.Sha224WithRsaEncryption, NistObjectIdentifiers.IdSha224); + m_digestOids.Add(PkcsObjectIdentifiers.Sha256WithRsaEncryption, NistObjectIdentifiers.IdSha256); + m_digestOids.Add(PkcsObjectIdentifiers.Sha384WithRsaEncryption, NistObjectIdentifiers.IdSha384); + m_digestOids.Add(PkcsObjectIdentifiers.Sha512WithRsaEncryption, NistObjectIdentifiers.IdSha512); + m_digestOids.Add(PkcsObjectIdentifiers.Sha512_224WithRSAEncryption, NistObjectIdentifiers.IdSha512_224); + m_digestOids.Add(PkcsObjectIdentifiers.Sha512_256WithRSAEncryption, NistObjectIdentifiers.IdSha512_256); + + m_digestOids.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224, NistObjectIdentifiers.IdSha3_224); + m_digestOids.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256, NistObjectIdentifiers.IdSha3_256); + m_digestOids.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384, NistObjectIdentifiers.IdSha3_384); + m_digestOids.Add(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512, NistObjectIdentifiers.IdSha3_512); + + m_digestOids.Add(PkcsObjectIdentifiers.MD2WithRsaEncryption, PkcsObjectIdentifiers.MD2); + m_digestOids.Add(PkcsObjectIdentifiers.MD4WithRsaEncryption, PkcsObjectIdentifiers.MD4); + m_digestOids.Add(PkcsObjectIdentifiers.MD5WithRsaEncryption, PkcsObjectIdentifiers.MD5); + m_digestOids.Add(PkcsObjectIdentifiers.Sha1WithRsaEncryption, OiwObjectIdentifiers.IdSha1); + + m_digestOids.Add(X9ObjectIdentifiers.ECDsaWithSha1, OiwObjectIdentifiers.IdSha1); + m_digestOids.Add(X9ObjectIdentifiers.ECDsaWithSha224, NistObjectIdentifiers.IdSha224); + m_digestOids.Add(X9ObjectIdentifiers.ECDsaWithSha256, NistObjectIdentifiers.IdSha256); + m_digestOids.Add(X9ObjectIdentifiers.ECDsaWithSha384, NistObjectIdentifiers.IdSha384); + m_digestOids.Add(X9ObjectIdentifiers.ECDsaWithSha512, NistObjectIdentifiers.IdSha512); + m_digestOids.Add(X9ObjectIdentifiers.IdDsaWithSha1, OiwObjectIdentifiers.IdSha1); + + m_digestOids.Add(NistObjectIdentifiers.DsaWithSha224, NistObjectIdentifiers.IdSha224); + m_digestOids.Add(NistObjectIdentifiers.DsaWithSha256, NistObjectIdentifiers.IdSha256); + m_digestOids.Add(NistObjectIdentifiers.DsaWithSha384, NistObjectIdentifiers.IdSha384); + m_digestOids.Add(NistObjectIdentifiers.DsaWithSha512, NistObjectIdentifiers.IdSha512); + + m_digestOids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128, TeleTrusTObjectIdentifiers.RipeMD128); + m_digestOids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160, TeleTrusTObjectIdentifiers.RipeMD160); + m_digestOids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256, TeleTrusTObjectIdentifiers.RipeMD256); + + m_digestOids.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94, CryptoProObjectIdentifiers.GostR3411); + m_digestOids.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001, CryptoProObjectIdentifiers.GostR3411); + + m_digestNameToOids.Add("SHA-1", OiwObjectIdentifiers.IdSha1); + m_digestNameToOids.Add("SHA-224", NistObjectIdentifiers.IdSha224); + m_digestNameToOids.Add("SHA-256", NistObjectIdentifiers.IdSha256); + m_digestNameToOids.Add("SHA-384", NistObjectIdentifiers.IdSha384); + m_digestNameToOids.Add("SHA-512", NistObjectIdentifiers.IdSha512); + m_digestNameToOids.Add("SHA-512/224", NistObjectIdentifiers.IdSha512_224); + m_digestNameToOids.Add("SHA-512(224)", NistObjectIdentifiers.IdSha512_224); + m_digestNameToOids.Add("SHA-512/256", NistObjectIdentifiers.IdSha512_256); + m_digestNameToOids.Add("SHA-512(256)", NistObjectIdentifiers.IdSha512_256); + + m_digestNameToOids.Add("SHA1", OiwObjectIdentifiers.IdSha1); + m_digestNameToOids.Add("SHA224", NistObjectIdentifiers.IdSha224); + m_digestNameToOids.Add("SHA256", NistObjectIdentifiers.IdSha256); + m_digestNameToOids.Add("SHA384", NistObjectIdentifiers.IdSha384); + m_digestNameToOids.Add("SHA512", NistObjectIdentifiers.IdSha512); + m_digestNameToOids.Add("SHA512/224", NistObjectIdentifiers.IdSha512_224); + m_digestNameToOids.Add("SHA512(224)", NistObjectIdentifiers.IdSha512_224); + m_digestNameToOids.Add("SHA512/256", NistObjectIdentifiers.IdSha512_256); + m_digestNameToOids.Add("SHA512(256)", NistObjectIdentifiers.IdSha512_256); + + m_digestNameToOids.Add("SHA3-224", NistObjectIdentifiers.IdSha3_224); + m_digestNameToOids.Add("SHA3-256", NistObjectIdentifiers.IdSha3_256); + m_digestNameToOids.Add("SHA3-384", NistObjectIdentifiers.IdSha3_384); + m_digestNameToOids.Add("SHA3-512", NistObjectIdentifiers.IdSha3_512); + + m_digestNameToOids.Add("SHAKE-128", NistObjectIdentifiers.IdShake128); + m_digestNameToOids.Add("SHAKE-256", NistObjectIdentifiers.IdShake256); + + m_digestNameToOids.Add("GOST3411", CryptoProObjectIdentifiers.GostR3411); + + m_digestNameToOids.Add("MD2", PkcsObjectIdentifiers.MD2); + m_digestNameToOids.Add("MD4", PkcsObjectIdentifiers.MD4); + m_digestNameToOids.Add("MD5", PkcsObjectIdentifiers.MD5); + + m_digestNameToOids.Add("RIPEMD128", TeleTrusTObjectIdentifiers.RipeMD128); + m_digestNameToOids.Add("RIPEMD160", TeleTrusTObjectIdentifiers.RipeMD160); + m_digestNameToOids.Add("RIPEMD256", TeleTrusTObjectIdentifiers.RipeMD256); + } + + public AlgorithmIdentifier Find(AlgorithmIdentifier sigAlgId) + { + AlgorithmIdentifier digAlgId; + + if (sigAlgId.Algorithm.Equals(PkcsObjectIdentifiers.IdRsassaPss)) + { + digAlgId = RsassaPssParameters.GetInstance(sigAlgId.Parameters).HashAlgorithm; + } + else + { + digAlgId = new AlgorithmIdentifier(m_digestOids[sigAlgId.Algorithm], DerNull.Instance); + } + + return digAlgId; + } + + public AlgorithmIdentifier Find(string digAlgName) + { + return new AlgorithmIdentifier(m_digestNameToOids[digAlgName], DerNull.Instance); + } + } + + public abstract class CmsSignedGenerator + { + /** + * Default type for the signed data. + */ + public static readonly string Data = CmsObjectIdentifiers.Data.Id; + + public static readonly string DigestSha1 = OiwObjectIdentifiers.IdSha1.Id; + public static readonly string DigestSha224 = NistObjectIdentifiers.IdSha224.Id; + public static readonly string DigestSha256 = NistObjectIdentifiers.IdSha256.Id; + public static readonly string DigestSha384 = NistObjectIdentifiers.IdSha384.Id; + public static readonly string DigestSha512 = NistObjectIdentifiers.IdSha512.Id; + public static readonly string DigestSha512_224 = NistObjectIdentifiers.IdSha512_224.Id; + public static readonly string DigestSha512_256 = NistObjectIdentifiers.IdSha512_256.Id; + public static readonly string DigestMD5 = PkcsObjectIdentifiers.MD5.Id; + public static readonly string DigestGost3411 = CryptoProObjectIdentifiers.GostR3411.Id; + public static readonly string DigestRipeMD128 = TeleTrusTObjectIdentifiers.RipeMD128.Id; + public static readonly string DigestRipeMD160 = TeleTrusTObjectIdentifiers.RipeMD160.Id; + public static readonly string DigestRipeMD256 = TeleTrusTObjectIdentifiers.RipeMD256.Id; + + public static readonly string EncryptionRsa = PkcsObjectIdentifiers.RsaEncryption.Id; + public static readonly string EncryptionDsa = X9ObjectIdentifiers.IdDsaWithSha1.Id; + public static readonly string EncryptionECDsa = X9ObjectIdentifiers.ECDsaWithSha1.Id; + public static readonly string EncryptionRsaPss = PkcsObjectIdentifiers.IdRsassaPss.Id; + public static readonly string EncryptionGost3410 = CryptoProObjectIdentifiers.GostR3410x94.Id; + public static readonly string EncryptionECGost3410 = CryptoProObjectIdentifiers.GostR3410x2001.Id; + public static readonly string EncryptionECGost3410_2012_256 = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256.Id; + public static readonly string EncryptionECGost3410_2012_512 = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512.Id; + + internal List _certs = new List(); + internal List _crls = new List(); + internal IList _signers = new List(); + internal IDictionary m_digests = + new Dictionary(StringComparer.OrdinalIgnoreCase); + internal bool _useDerForCerts = false; + internal bool _useDerForCrls = false; + + protected readonly SecureRandom m_random; + + protected CmsSignedGenerator() + : this(CryptoServicesRegistrar.GetSecureRandom()) + { + } + + /// Constructor allowing specific source of randomness + /// Instance of SecureRandom to use. + protected CmsSignedGenerator(SecureRandom random) + { + if (random == null) + throw new ArgumentNullException(nameof(random)); + + m_random = random; + } + + internal protected virtual IDictionary GetBaseParameters( + DerObjectIdentifier contentType, AlgorithmIdentifier digAlgId, byte[] hash) + { + var param = new Dictionary(); + + if (contentType != null) + { + param[CmsAttributeTableParameter.ContentType] = contentType; + } + + param[CmsAttributeTableParameter.DigestAlgorithmIdentifier] = digAlgId; + param[CmsAttributeTableParameter.Digest] = hash.Clone(); + + return param; + } + + internal protected virtual Asn1Set GetAttributeSet( + Asn1.Cms.AttributeTable attr) + { + return attr == null + ? null + : new DerSet(attr.ToAsn1EncodableVector()); + } + + public void AddAttributeCertificate(X509V2AttributeCertificate attrCert) + { + _certs.Add(new DerTaggedObject(false, 2, attrCert.AttributeCertificate)); + } + + public void AddAttributeCertificates(IStore attrCertStore) + { + _certs.AddRange(CmsUtilities.GetAttributeCertificatesFromStore(attrCertStore)); + } + + public void AddCertificate(X509Certificate cert) + { + _certs.Add(cert.CertificateStructure); + } + + public void AddCertificates(IStore certStore) + { + _certs.AddRange(CmsUtilities.GetCertificatesFromStore(certStore)); + } + + public void AddCrl(X509Crl crl) + { + _crls.Add(crl.CertificateList); + } + + public void AddCrls(IStore crlStore) + { + _crls.AddRange(CmsUtilities.GetCrlsFromStore(crlStore)); + } + + public void AddOtherRevocationInfo(OtherRevocationInfoFormat otherRevocationInfo) + { + CmsUtilities.ValidateOtherRevocationInfo(otherRevocationInfo); + _crls.Add(new DerTaggedObject(false, 1, otherRevocationInfo)); + } + + public void AddOtherRevocationInfos(IStore otherRevocationInfoStore) + { + _crls.AddRange(CmsUtilities.GetOtherRevocationInfosFromStore(otherRevocationInfoStore)); + } + + public void AddOtherRevocationInfos(DerObjectIdentifier otherRevInfoFormat, + IStore otherRevInfoStore) + { + _crls.AddRange(CmsUtilities.GetOtherRevocationInfosFromStore(otherRevInfoStore, otherRevInfoFormat)); + } + + /** + * Add a store of precalculated signers to the generator. + * + * @param signerStore store of signers + */ + public void AddSigners(SignerInformationStore signerStore) + { + foreach (SignerInformation o in signerStore.GetSigners()) + { + _signers.Add(o); + AddSignerCallback(o); + } + } + + /** + * Return a map of oids and byte arrays representing the digests calculated on the content during + * the last generate. + * + * @return a map of oids (as string objects) and byte[] representing digests. + */ + public IDictionary GetGeneratedDigests() + { + return new Dictionary(m_digests, StringComparer.OrdinalIgnoreCase); + } + + public bool UseDerForCerts + { + get { return _useDerForCerts; } + set { this._useDerForCerts = value; } + } + + public bool UseDerForCrls + { + get { return _useDerForCrls; } + set { this._useDerForCrls = value; } + } + + internal virtual void AddSignerCallback( + SignerInformation si) + { + } + + internal static SignerIdentifier GetSignerIdentifier(X509Certificate cert) + { + return new SignerIdentifier(CmsUtilities.GetIssuerAndSerialNumber(cert)); + } + + internal static SignerIdentifier GetSignerIdentifier(byte[] subjectKeyIdentifier) + { + return new SignerIdentifier(new DerOctetString(subjectKeyIdentifier)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs.meta new file mode 100644 index 00000000..bfbcc66c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d7ef495bfe713f469f58b2b99f520c8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs new file mode 100644 index 00000000..af672da2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs @@ -0,0 +1,382 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Esf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class CmsSignedHelper + { + internal static readonly CmsSignedHelper Instance = new CmsSignedHelper(); + + private static readonly string EncryptionECDsaWithSha1 = X9ObjectIdentifiers.ECDsaWithSha1.Id; + private static readonly string EncryptionECDsaWithSha224 = X9ObjectIdentifiers.ECDsaWithSha224.Id; + private static readonly string EncryptionECDsaWithSha256 = X9ObjectIdentifiers.ECDsaWithSha256.Id; + private static readonly string EncryptionECDsaWithSha384 = X9ObjectIdentifiers.ECDsaWithSha384.Id; + private static readonly string EncryptionECDsaWithSha512 = X9ObjectIdentifiers.ECDsaWithSha512.Id; + + private static readonly IDictionary m_encryptionAlgs = new Dictionary(); + private static readonly IDictionary m_digestAlgs = new Dictionary(); + private static readonly IDictionary m_digestAliases = new Dictionary(); + + private static readonly HashSet noParams = new HashSet(); + private static readonly IDictionary m_ecAlgorithms = new Dictionary(); + + private static void AddEntries(DerObjectIdentifier oid, string digest, string encryption) + { + string alias = oid.Id; + m_digestAlgs.Add(alias, digest); + m_encryptionAlgs.Add(alias, encryption); + } + + static CmsSignedHelper() + { + AddEntries(NistObjectIdentifiers.DsaWithSha224, "SHA224", "DSA"); + AddEntries(NistObjectIdentifiers.DsaWithSha256, "SHA256", "DSA"); + AddEntries(NistObjectIdentifiers.DsaWithSha384, "SHA384", "DSA"); + AddEntries(NistObjectIdentifiers.DsaWithSha512, "SHA512", "DSA"); + AddEntries(OiwObjectIdentifiers.DsaWithSha1, "SHA1", "DSA"); + AddEntries(OiwObjectIdentifiers.MD4WithRsa, "MD4", "RSA"); + AddEntries(OiwObjectIdentifiers.MD4WithRsaEncryption, "MD4", "RSA"); + AddEntries(OiwObjectIdentifiers.MD5WithRsa, "MD5", "RSA"); + AddEntries(OiwObjectIdentifiers.Sha1WithRsa, "SHA1", "RSA"); + AddEntries(PkcsObjectIdentifiers.MD2WithRsaEncryption, "MD2", "RSA"); + AddEntries(PkcsObjectIdentifiers.MD4WithRsaEncryption, "MD4", "RSA"); + AddEntries(PkcsObjectIdentifiers.MD5WithRsaEncryption, "MD5", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha1WithRsaEncryption, "SHA1", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha224WithRsaEncryption, "SHA224", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha256WithRsaEncryption, "SHA256", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha384WithRsaEncryption, "SHA384", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha512WithRsaEncryption, "SHA512", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha512_224WithRSAEncryption, "SHA512(224)", "RSA"); + AddEntries(PkcsObjectIdentifiers.Sha512_256WithRSAEncryption, "SHA512(256)", "RSA"); + AddEntries(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224, "SHA3-224", "RSA"); + AddEntries(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256, "SHA3-256", "RSA"); + AddEntries(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384, "SHA3-384", "RSA"); + AddEntries(NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512, "SHA3-512", "RSA"); + AddEntries(X9ObjectIdentifiers.ECDsaWithSha1, "SHA1", "ECDSA"); + AddEntries(X9ObjectIdentifiers.ECDsaWithSha224, "SHA224", "ECDSA"); + AddEntries(X9ObjectIdentifiers.ECDsaWithSha256, "SHA256", "ECDSA"); + AddEntries(X9ObjectIdentifiers.ECDsaWithSha384, "SHA384", "ECDSA"); + AddEntries(X9ObjectIdentifiers.ECDsaWithSha512, "SHA512", "ECDSA"); + AddEntries(X9ObjectIdentifiers.IdDsaWithSha1, "SHA1", "DSA"); + AddEntries(EacObjectIdentifiers.id_TA_ECDSA_SHA_1, "SHA1", "ECDSA"); + AddEntries(EacObjectIdentifiers.id_TA_ECDSA_SHA_224, "SHA224", "ECDSA"); + AddEntries(EacObjectIdentifiers.id_TA_ECDSA_SHA_256, "SHA256", "ECDSA"); + AddEntries(EacObjectIdentifiers.id_TA_ECDSA_SHA_384, "SHA384", "ECDSA"); + AddEntries(EacObjectIdentifiers.id_TA_ECDSA_SHA_512, "SHA512", "ECDSA"); + AddEntries(EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_1, "SHA1", "RSA"); + AddEntries(EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_256, "SHA256", "RSA"); + AddEntries(EacObjectIdentifiers.id_TA_RSA_PSS_SHA_1, "SHA1", "RSAandMGF1"); + AddEntries(EacObjectIdentifiers.id_TA_RSA_PSS_SHA_256, "SHA256", "RSAandMGF1"); + AddEntries(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94, "GOST3411", "GOST3410"); + AddEntries(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001, "GOST3411", "ECGOST3410"); + AddEntries(RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256, "GOST3411-2012-256", "ECGOST3410"); + AddEntries(RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512, "GOST3411-2012-512", "ECGOST3410"); + + m_encryptionAlgs.Add(X9ObjectIdentifiers.IdDsa.Id, "DSA"); + m_encryptionAlgs.Add(PkcsObjectIdentifiers.RsaEncryption.Id, "RSA"); + m_encryptionAlgs.Add(TeleTrusTObjectIdentifiers.TeleTrusTRsaSignatureAlgorithm.Id, "RSA"); + m_encryptionAlgs.Add(X509ObjectIdentifiers.IdEARsa.Id, "RSA"); + m_encryptionAlgs.Add(CmsSignedGenerator.EncryptionRsaPss, "RSAandMGF1"); + m_encryptionAlgs.Add(CryptoProObjectIdentifiers.GostR3410x94.Id, "GOST3410"); + m_encryptionAlgs.Add(CryptoProObjectIdentifiers.GostR3410x2001.Id, "ECGOST3410"); + m_encryptionAlgs.Add(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256.Id, "ECGOST3410"); + m_encryptionAlgs.Add(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512.Id, "ECGOST3410"); + m_encryptionAlgs.Add("1.3.6.1.4.1.5849.1.6.2", "ECGOST3410"); + m_encryptionAlgs.Add("1.3.6.1.4.1.5849.1.1.5", "GOST3410"); + + m_digestAlgs.Add(PkcsObjectIdentifiers.MD2.Id, "MD2"); + m_digestAlgs.Add(PkcsObjectIdentifiers.MD4.Id, "MD4"); + m_digestAlgs.Add(PkcsObjectIdentifiers.MD5.Id, "MD5"); + m_digestAlgs.Add(OiwObjectIdentifiers.IdSha1.Id, "SHA1"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha224.Id, "SHA224"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha256.Id, "SHA256"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha384.Id, "SHA384"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha512.Id, "SHA512"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha512_224.Id, "SHA512(224)"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha512_256.Id, "SHA512(256)"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha3_224.Id, "SHA3-224"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha3_256.Id, "SHA3-256"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha3_384.Id, "SHA3-384"); + m_digestAlgs.Add(NistObjectIdentifiers.IdSha3_512.Id, "SHA3-512"); + m_digestAlgs.Add(TeleTrusTObjectIdentifiers.RipeMD128.Id, "RIPEMD128"); + m_digestAlgs.Add(TeleTrusTObjectIdentifiers.RipeMD160.Id, "RIPEMD160"); + m_digestAlgs.Add(TeleTrusTObjectIdentifiers.RipeMD256.Id, "RIPEMD256"); + m_digestAlgs.Add(CryptoProObjectIdentifiers.GostR3411.Id, "GOST3411"); + m_digestAlgs.Add("1.3.6.1.4.1.5849.1.2.1", "GOST3411"); + m_digestAlgs.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Id, "GOST3411-2012-256"); + m_digestAlgs.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Id, "GOST3411-2012-512"); + + m_digestAliases.Add("SHA1", new string[]{ "SHA-1" }); + m_digestAliases.Add("SHA224", new string[]{ "SHA-224" }); + m_digestAliases.Add("SHA256", new string[]{ "SHA-256" }); + m_digestAliases.Add("SHA384", new string[]{ "SHA-384" }); + m_digestAliases.Add("SHA512", new string[]{ "SHA-512" }); + + noParams.Add(CmsSignedGenerator.EncryptionDsa); + //noParams.Add(EncryptionECDsa); + noParams.Add(EncryptionECDsaWithSha1); + noParams.Add(EncryptionECDsaWithSha224); + noParams.Add(EncryptionECDsaWithSha256); + noParams.Add(EncryptionECDsaWithSha384); + noParams.Add(EncryptionECDsaWithSha512); + + m_ecAlgorithms.Add(CmsSignedGenerator.DigestSha1, EncryptionECDsaWithSha1); + m_ecAlgorithms.Add(CmsSignedGenerator.DigestSha224, EncryptionECDsaWithSha224); + m_ecAlgorithms.Add(CmsSignedGenerator.DigestSha256, EncryptionECDsaWithSha256); + m_ecAlgorithms.Add(CmsSignedGenerator.DigestSha384, EncryptionECDsaWithSha384); + m_ecAlgorithms.Add(CmsSignedGenerator.DigestSha512, EncryptionECDsaWithSha512); + } + + /** + * Return the digest algorithm using one of the standard JCA string + * representations rather than the algorithm identifier (if possible). + */ + internal string GetDigestAlgName(string digestAlgOid) + { + return m_digestAlgs.TryGetValue(digestAlgOid, out var algName) ? algName : digestAlgOid; + } + + internal AlgorithmIdentifier GetEncAlgorithmIdentifier(DerObjectIdentifier encOid, + Asn1Encodable sigX509Parameters) + { + if (noParams.Contains(encOid.Id)) + { + return new AlgorithmIdentifier(encOid); + } + + return new AlgorithmIdentifier(encOid, sigX509Parameters); + } + + internal string[] GetDigestAliases(string algName) + { + return m_digestAliases.TryGetValue(algName, out var aliases) ? (string[])aliases.Clone() : new string[0]; + } + + /** + * Return the digest encryption algorithm using one of the standard + * JCA string representations rather than the algorithm identifier (if + * possible). + */ + internal string GetEncryptionAlgName(string encryptionAlgOid) + { + return m_encryptionAlgs.TryGetValue(encryptionAlgOid, out var algName) ? algName : encryptionAlgOid; + } + + internal IDigest GetDigestInstance( + string algorithm) + { + try + { + return DigestUtilities.GetDigest(algorithm); + } + catch (SecurityUtilityException e) + { + // This is probably superfluous on C#, since no provider infrastructure, + // assuming DigestUtilities already knows all the aliases + foreach (string alias in GetDigestAliases(algorithm)) + { + try { return DigestUtilities.GetDigest(alias); } + catch (SecurityUtilityException) {} + } + throw e; + } + } + + internal ISigner GetSignatureInstance( + string algorithm) + { + return SignerUtilities.GetSigner(algorithm); + } + + internal AlgorithmIdentifier FixAlgID( + AlgorithmIdentifier algId) + { + if (algId.Parameters == null) + return new AlgorithmIdentifier(algId.Algorithm, DerNull.Instance); + + return algId; + } + + internal string GetEncOid( + AsymmetricKeyParameter key, + string digestOID) + { + string encOID = null; + + if (key is RsaKeyParameters rsaKeyParameters) + { + if (!rsaKeyParameters.IsPrivate) + throw new ArgumentException("Expected RSA private key"); + + encOID = CmsSignedGenerator.EncryptionRsa; + } + else if (key is DsaPrivateKeyParameters) + { + if (digestOID.Equals(CmsSignedGenerator.DigestSha1)) + { + encOID = CmsSignedGenerator.EncryptionDsa; + } + else if (digestOID.Equals(CmsSignedGenerator.DigestSha224)) + { + encOID = NistObjectIdentifiers.DsaWithSha224.Id; + } + else if (digestOID.Equals(CmsSignedGenerator.DigestSha256)) + { + encOID = NistObjectIdentifiers.DsaWithSha256.Id; + } + else if (digestOID.Equals(CmsSignedGenerator.DigestSha384)) + { + encOID = NistObjectIdentifiers.DsaWithSha384.Id; + } + else if (digestOID.Equals(CmsSignedGenerator.DigestSha512)) + { + encOID = NistObjectIdentifiers.DsaWithSha512.Id; + } + else + { + throw new ArgumentException("can't mix DSA with anything but SHA1/SHA2"); + } + } + else if (key is ECPrivateKeyParameters ecPrivKey) + { + string algName = ecPrivKey.AlgorithmName; + + if (algName == "ECGOST3410") + { + encOID = CmsSignedGenerator.EncryptionECGost3410; + } + else if (ecPrivKey.Parameters is ECGost3410Parameters ecGost3410Parameters) + { + var digestParamSet = ecGost3410Parameters.DigestParamSet; + if (digestParamSet.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256)) + { + encOID = CmsSignedGenerator.EncryptionECGost3410_2012_256; + } + else if (digestParamSet.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512)) + { + encOID = CmsSignedGenerator.EncryptionECGost3410_2012_512; + } + else + { + throw new ArgumentException("can't determine GOST3410 algorithm"); + } + } + else + { + // TODO Should we insist on algName being one of "EC" or "ECDSA", as Java does? + if (!m_ecAlgorithms.TryGetValue(digestOID, out encOID)) + throw new ArgumentException("can't mix ECDSA with anything but SHA family digests"); + } + } + else if (key is Gost3410PrivateKeyParameters) + { + encOID = CmsSignedGenerator.EncryptionGost3410; + } + else + { + throw new ArgumentException("Unknown algorithm in CmsSignedGenerator.GetEncOid"); + } + + return encOID; + } + + internal IStore GetAttributeCertificates(Asn1Set attrCertSet) + { + var contents = new List(); + if (attrCertSet != null) + { + foreach (Asn1Encodable ae in attrCertSet) + { + if (ae != null && ae.ToAsn1Object() is Asn1TaggedObject t) + { + if (t.HasContextTag(2)) + { + Asn1Sequence s = Asn1Sequence.GetInstance(t, false); + + contents.Add(new X509V2AttributeCertificate(AttributeCertificate.GetInstance(s))); + } + } + } + } + return CollectionUtilities.CreateStore(contents); + } + + internal IStore GetCertificates(Asn1Set certSet) + { + var contents = new List(); + if (certSet != null) + { + foreach (Asn1Encodable ae in certSet) + { + if (ae != null && ae.ToAsn1Object() is Asn1Sequence s) + { + contents.Add(new X509Certificate(X509CertificateStructure.GetInstance(s))); + } + } + } + return CollectionUtilities.CreateStore(contents); + } + + internal IStore GetCrls(Asn1Set crlSet) + { + var contents = new List(); + if (crlSet != null) + { + foreach (Asn1Encodable ae in crlSet) + { + if (ae != null && ae.ToAsn1Object() is Asn1Sequence s) + { + contents.Add(new X509Crl(CertificateList.GetInstance(s))); + } + } + } + return CollectionUtilities.CreateStore(contents); + } + + internal IStore GetOtherRevInfos(Asn1Set crlSet, DerObjectIdentifier otherRevInfoFormat) + { + var contents = new List(); + if (crlSet != null && otherRevInfoFormat != null) + { + foreach (Asn1Encodable ae in crlSet) + { + if (ae != null && ae.ToAsn1Object() is Asn1TaggedObject taggedObject) + { + if (taggedObject.HasContextTag(1)) + { + var otherRevocationInfo = OtherRevocationInfoFormat.GetInstance(taggedObject, false); + + if (otherRevInfoFormat.Equals(otherRevocationInfo.InfoFormat)) + { + contents.Add(otherRevocationInfo.Info); + } + } + } + } + } + return CollectionUtilities.CreateStore(contents); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs.meta new file mode 100644 index 00000000..abab575d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e006d8537754eef4e9e09e27787fb577 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSSignedHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs new file mode 100644 index 00000000..fd957fd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + [Serializable] + public class CmsStreamException + : IOException + { + public CmsStreamException() + : base() + { + } + + public CmsStreamException(string message) + : base(message) + { + } + + public CmsStreamException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CmsStreamException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs.meta new file mode 100644 index 00000000..92b43ee3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dddf2b8e4c25def419fd533bfbf88be4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSStreamException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs new file mode 100644 index 00000000..a7451e7c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class CmsTypedStream + { + private const int BufferSize = 32 * 1024; + + private readonly string _oid; + private readonly Stream _in; + + public CmsTypedStream( + Stream inStream) + : this(PkcsObjectIdentifiers.Data.Id, inStream, BufferSize) + { + } + + public CmsTypedStream( + string oid, + Stream inStream) + : this(oid, inStream, BufferSize) + { + } + + public CmsTypedStream( + string oid, + Stream inStream, + int bufSize) + { + _oid = oid; + _in = new FullReaderStream(new BufferedStream(inStream, bufSize)); + } + + public string ContentType + { + get { return _oid; } + } + + public Stream ContentStream + { + get { return _in; } + } + + public void Drain() + { + Streams.Drain(_in); + _in.Dispose(); + } + + private class FullReaderStream : FilterStream + { + internal FullReaderStream(Stream input) + : base(input) + { + } + + public override int Read(byte[] buf, int off, int len) + { + return Streams.ReadFully(s, buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + return Streams.ReadFully(s, buffer); + } +#endif + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs.meta new file mode 100644 index 00000000..af27db65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 065c5a100b9fa974fb357d1a1e8e0804 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSTypedStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs new file mode 100644 index 00000000..41cd5933 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs @@ -0,0 +1,211 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class CmsUtilities + { + // TODO Is there a .NET equivalent to this? +// private static readonly Runtime RUNTIME = Runtime.getRuntime(); + + internal static int MaximumMemory + { + get + { + // TODO Is there a .NET equivalent to this? + long maxMem = int.MaxValue;//RUNTIME.maxMemory(); + + if (maxMem > int.MaxValue) + { + return int.MaxValue; + } + + return (int)maxMem; + } + } + + internal static ContentInfo ReadContentInfo( + byte[] input) + { + // enforce limit checking as from a byte array + return ReadContentInfo(new Asn1InputStream(input)); + } + + internal static ContentInfo ReadContentInfo( + Stream input) + { + // enforce some limit checking + return ReadContentInfo(new Asn1InputStream(input, MaximumMemory)); + } + + private static ContentInfo ReadContentInfo( + Asn1InputStream aIn) + { + try + { + return ContentInfo.GetInstance(aIn.ReadObject()); + } + catch (IOException e) + { + throw new CmsException("IOException reading content.", e); + } + catch (InvalidCastException e) + { + throw new CmsException("Malformed content.", e); + } + catch (ArgumentException e) + { + throw new CmsException("Malformed content.", e); + } + } + + internal static byte[] StreamToByteArray(Stream inStream) + { + return Streams.ReadAll(inStream); + } + + internal static byte[] StreamToByteArray(Stream inStream, int limit) + { + return Streams.ReadAllLimited(inStream, limit); + } + + internal static List GetAttributeCertificatesFromStore( + IStore attrCertStore) + { + var result = new List(); + if (attrCertStore != null) + { + foreach (var attrCert in attrCertStore.EnumerateMatches(null)) + { + result.Add(new DerTaggedObject(false, 2, attrCert.AttributeCertificate)); + } + } + return result; + } + + internal static List GetCertificatesFromStore(IStore certStore) + { + var result = new List(); + if (certStore != null) + { + foreach (var cert in certStore.EnumerateMatches(null)) + { + result.Add(cert.CertificateStructure); + } + } + return result; + } + + internal static List GetCrlsFromStore(IStore crlStore) + { + var result = new List(); + if (crlStore != null) + { + foreach (var crl in crlStore.EnumerateMatches(null)) + { + result.Add(crl.CertificateList); + } + } + return result; + } + + internal static List GetOtherRevocationInfosFromStore( + IStore otherRevocationInfoStore) + { + var result = new List(); + if (otherRevocationInfoStore != null) + { + foreach (var otherRevocationInfo in otherRevocationInfoStore.EnumerateMatches(null)) + { + ValidateOtherRevocationInfo(otherRevocationInfo); + + result.Add(new DerTaggedObject(false, 1, otherRevocationInfo)); + } + } + return result; + } + + internal static List GetOtherRevocationInfosFromStore(IStore otherRevInfoStore, + DerObjectIdentifier otherRevInfoFormat) + { + var result = new List(); + if (otherRevInfoStore != null && otherRevInfoFormat != null) + { + foreach (var otherRevInfo in otherRevInfoStore.EnumerateMatches(null)) + { + var otherRevocationInfo = new OtherRevocationInfoFormat(otherRevInfoFormat, otherRevInfo); + + ValidateOtherRevocationInfo(otherRevocationInfo); + + result.Add(new DerTaggedObject(false, 1, otherRevocationInfo)); + } + } + return result; + } + + internal static Asn1Set CreateBerSetFromList(IEnumerable elements) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + foreach (Asn1Encodable element in elements) + { + v.Add(element); + } + + return new BerSet(v); + } + + internal static Asn1Set CreateDerSetFromList(IEnumerable elements) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + + foreach (Asn1Encodable element in elements) + { + v.Add(element); + } + + return new DerSet(v); + } + + internal static Stream CreateBerOctetOutputStream(Stream s, int tagNo, bool isExplicit, int bufferSize) + { + BerOctetStringGenerator octGen = new BerOctetStringGenerator(s, tagNo, isExplicit); + return octGen.GetOctetOutputStream(bufferSize); + } + + internal static TbsCertificateStructure GetTbsCertificateStructure(X509Certificate cert) + { + return TbsCertificateStructure.GetInstance(Asn1Object.FromByteArray(cert.GetTbsCertificate())); + } + + internal static IssuerAndSerialNumber GetIssuerAndSerialNumber(X509Certificate cert) + { + TbsCertificateStructure tbsCert = GetTbsCertificateStructure(cert); + return new IssuerAndSerialNumber(tbsCert.Issuer, tbsCert.SerialNumber.Value); + } + + internal static void ValidateOtherRevocationInfo(OtherRevocationInfoFormat otherRevocationInfo) + { + if (CmsObjectIdentifiers.id_ri_ocsp_response.Equals(otherRevocationInfo.InfoFormat)) + { + OcspResponse ocspResponse = OcspResponse.GetInstance(otherRevocationInfo.Info); + + if (OcspResponseStatus.Successful != ocspResponse.ResponseStatus.IntValueExact) + throw new ArgumentException("cannot add unsuccessful OCSP response to CMS SignedData"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs.meta new file mode 100644 index 00000000..1629fd6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3c7c340603ef28340a5a61793d0e6d03 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CMSUtils.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs new file mode 100644 index 00000000..c5cfdd79 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class CounterSignatureDigestCalculator + : IDigestCalculator + { + private readonly string alg; + private readonly byte[] data; + + internal CounterSignatureDigestCalculator( + string alg, + byte[] data) + { + this.alg = alg; + this.data = data; + } + + public byte[] GetDigest() + { + IDigest digest = CmsSignedHelper.Instance.GetDigestInstance(alg); + return DigestUtilities.DoFinal(digest, data); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs.meta new file mode 100644 index 00000000..40b04e18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43b8256f949232e4780bee8e58a16812 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/CounterSignatureDigestCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs new file mode 100644 index 00000000..937ea958 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Default authenticated attributes generator. + */ + public class DefaultAuthenticatedAttributeTableGenerator + : CmsAttributeTableGenerator + { + private readonly IDictionary m_table; + + /** + * Initialise to use all defaults + */ + public DefaultAuthenticatedAttributeTableGenerator() + { + m_table = new Dictionary(); + } + + /** + * Initialise with some extra attributes or overrides. + * + * @param attributeTable initial attribute table to use. + */ + public DefaultAuthenticatedAttributeTableGenerator( + AttributeTable attributeTable) + { + if (attributeTable != null) + { + m_table = attributeTable.ToDictionary(); + } + else + { + m_table = new Dictionary(); + } + } + + /** + * Create a standard attribute table from the passed in parameters - this will + * normally include contentType and messageDigest. If the constructor + * using an AttributeTable was used, entries in it for contentType and + * messageDigest will override the generated ones. + * + * @param parameters source parameters for table generation. + * + * @return a filled in IDictionary of attributes. + */ + protected virtual IDictionary CreateStandardAttributeTable( + IDictionary parameters) + { + var std = new Dictionary(m_table); + + if (!std.ContainsKey(CmsAttributes.ContentType)) + { + DerObjectIdentifier contentType = (DerObjectIdentifier) + parameters[CmsAttributeTableParameter.ContentType]; + Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute(CmsAttributes.ContentType, + new DerSet(contentType)); + std[attr.AttrType] = attr; + } + + if (!std.ContainsKey(CmsAttributes.MessageDigest)) + { + byte[] messageDigest = (byte[])parameters[CmsAttributeTableParameter.Digest]; + Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute(CmsAttributes.MessageDigest, + new DerSet(new DerOctetString(messageDigest))); + std[attr.AttrType] = attr; + } + + return std; + } + + /** + * @param parameters source parameters + * @return the populated attribute table + */ + public virtual AttributeTable GetAttributes(IDictionary parameters) + { + var table = CreateStandardAttributeTable(parameters); + return new AttributeTable(table); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs.meta new file mode 100644 index 00000000..fcb87215 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 82cc4104f4d6e0f4dbba58eb8894d2de +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultAuthenticatedAttributeTableGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs new file mode 100644 index 00000000..ea83f0fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Default signed attributes generator. + */ + public class DefaultSignedAttributeTableGenerator + : CmsAttributeTableGenerator + { + private readonly IDictionary m_table; + + /** + * Initialise to use all defaults + */ + public DefaultSignedAttributeTableGenerator() + { + m_table = new Dictionary(); + } + + /** + * Initialise with some extra attributes or overrides. + * + * @param attributeTable initial attribute table to use. + */ + public DefaultSignedAttributeTableGenerator(AttributeTable attributeTable) + { + if (attributeTable != null) + { + m_table = attributeTable.ToDictionary(); + } + else + { + m_table = new Dictionary(); + } + } + + /** + * Create a standard attribute table from the passed in parameters - this will + * normally include contentType, signingTime, and messageDigest. If the constructor + * using an AttributeTable was used, entries in it for contentType, signingTime, and + * messageDigest will override the generated ones. + * + * @param parameters source parameters for table generation. + * + * @return a filled in Dictionary of attributes. + */ + protected virtual IDictionary CreateStandardAttributeTable( + IDictionary parameters) + { + var std = new Dictionary(m_table); + DoCreateStandardAttributeTable(parameters, std); + return std; + } + + private void DoCreateStandardAttributeTable(IDictionary parameters, + IDictionary std) + { + // contentType will be absent if we're trying to generate a counter signature. + + if (parameters.ContainsKey(CmsAttributeTableParameter.ContentType)) + { + if (!std.ContainsKey(CmsAttributes.ContentType)) + { + DerObjectIdentifier contentType = (DerObjectIdentifier) + parameters[CmsAttributeTableParameter.ContentType]; + Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute(CmsAttributes.ContentType, + new DerSet(contentType)); + std[attr.AttrType] = attr; + } + } + + if (!std.ContainsKey(CmsAttributes.SigningTime)) + { + Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute(CmsAttributes.SigningTime, + new DerSet(new Time(DateTime.UtcNow))); + std[attr.AttrType] = attr; + } + + if (!std.ContainsKey(CmsAttributes.MessageDigest)) + { + byte[] messageDigest = (byte[])parameters[CmsAttributeTableParameter.Digest]; + Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute(CmsAttributes.MessageDigest, + new DerSet(new DerOctetString(messageDigest))); + std[attr.AttrType] = attr; + } + } + + /** + * @param parameters source parameters + * @return the populated attribute table + */ + public virtual AttributeTable GetAttributes(IDictionary parameters) + { + var table = CreateStandardAttributeTable(parameters); + return new AttributeTable(table); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs.meta new file mode 100644 index 00000000..5462b340 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7839ca1562e01ef478893a60e702efc7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/DefaultSignedAttributeTableGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs new file mode 100644 index 00000000..7e1eb126 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class EnvelopedDataHelper + { + //private static readonly IDictionary BaseCipherNames = + // new Dictionary(); + //private static readonly IDictionary MacAlgNames = + // new Dictionary(); + //private static readonly IDictionary PrfDigests = + // new Dictionary(); + + //static EnvelopedDataHelper() + //{ + // PrfDigests.Add(PkcsObjectIdentifiers.IdHmacWithSha1, "SHA-1"); + // PrfDigests.Add(PkcsObjectIdentifiers.IdHmacWithSha224, "SHA-224"); + // PrfDigests.Add(PkcsObjectIdentifiers.IdHmacWithSha256, "SHA-256"); + // PrfDigests.Add(PkcsObjectIdentifiers.IdHmacWithSha384, "SHA-384"); + // PrfDigests.Add(PkcsObjectIdentifiers.IdHmacWithSha512, "SHA-512"); + + // BaseCipherNames.Add(PkcsObjectIdentifiers.DesEde3Cbc, "DESEDE"); + // BaseCipherNames.Add(NistObjectIdentifiers.IdAes128Cbc, "AES"); + // BaseCipherNames.Add(NistObjectIdentifiers.IdAes192Cbc, "AES"); + // BaseCipherNames.Add(NistObjectIdentifiers.IdAes256Cbc, "AES"); + + // MacAlgNames.Add(PkcsObjectIdentifiers.DesEde3Cbc, "DESEDEMac"); + // MacAlgNames.Add(NistObjectIdentifiers.IdAes128Cbc, "AESMac"); + // MacAlgNames.Add(NistObjectIdentifiers.IdAes192Cbc, "AESMac"); + // MacAlgNames.Add(NistObjectIdentifiers.IdAes256Cbc, "AESMac"); + // MacAlgNames.Add(PkcsObjectIdentifiers.RC2Cbc, "RC2Mac"); + //} + + //internal static IDigest GetPrf(AlgorithmIdentifier algID) + //{ + // string digestName = (string)PrfDigests[algID]; + + // return DigestUtilities.GetDigest(digestName); + //} + + //internal static IWrapper CreateRfc3211Wrapper(DerObjectIdentifier algorithm) + //{ + // if (NistObjectIdentifiers.IdAes128Cbc.Equals(algorithm) + // || NistObjectIdentifiers.IdAes192Cbc.Equals(algorithm) + // || NistObjectIdentifiers.IdAes256Cbc.Equals(algorithm)) + // { + // return new Rfc3211WrapEngine(AesUtilities.CreateEngine()); + // } + // else if (PkcsObjectIdentifiers.DesEde3Cbc.Equals(algorithm)) + // { + // return new Rfc3211WrapEngine(new DesEdeEngine()); + // } + // else if (OiwObjectIdentifiers.DesCbc.Equals(algorithm)) + // { + // return new Rfc3211WrapEngine(new DesEngine()); + // } + // else if (PkcsObjectIdentifiers.RC2Cbc.Equals(algorithm)) + // { + // return new Rfc3211WrapEngine(new RC2Engine()); + // } + // else + // { + // throw new CmsException("cannot recognise wrapper: " + algorithm); + // } + //} + + public static object CreateContentCipher(bool forEncryption, ICipherParameters encKey, + AlgorithmIdentifier encryptionAlgID) + { + return CipherFactory.CreateContentCipher(forEncryption, encKey, encryptionAlgID); + } + + public AlgorithmIdentifier GenerateEncryptionAlgID(DerObjectIdentifier encryptionOID, KeyParameter encKey, + SecureRandom random) + { + return AlgorithmIdentifierFactory.GenerateEncryptionAlgID(encryptionOID, encKey.GetKey().Length * 8, random); + } + + public CipherKeyGenerator CreateKeyGenerator(DerObjectIdentifier algorithm, SecureRandom random) + { + return CipherKeyGeneratorFactory.CreateKeyGenerator(algorithm, random); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs.meta new file mode 100644 index 00000000..71f31afe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 706e6ef1ca078cc448c5f7992a25d79d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/EnvelopedDataHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs new file mode 100644 index 00000000..de4e1761 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal interface IDigestCalculator + { + byte[] GetDigest(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs.meta new file mode 100644 index 00000000..f304a2a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7c9062bf4a39754597b1d8fc8bbbe5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/IDigestCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs new file mode 100644 index 00000000..ed9a6967 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs @@ -0,0 +1,142 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class KekRecipientInfoGenerator : RecipientInfoGenerator + { + private static readonly CmsEnvelopedHelper Helper = CmsEnvelopedHelper.Instance; + + private KeyParameter keyEncryptionKey; + // TODO Can get this from keyEncryptionKey? + private string keyEncryptionKeyOID; + private KekIdentifier kekIdentifier; + + // Derived + private AlgorithmIdentifier keyEncryptionAlgorithm; + + internal KekRecipientInfoGenerator() + { + } + + internal KekIdentifier KekIdentifier + { + set { this.kekIdentifier = value; } + } + + internal KeyParameter KeyEncryptionKey + { + set + { + this.keyEncryptionKey = value; + this.keyEncryptionAlgorithm = DetermineKeyEncAlg(keyEncryptionKeyOID, keyEncryptionKey); + } + } + + internal string KeyEncryptionKeyOID + { + set { this.keyEncryptionKeyOID = value; } + } + + public RecipientInfo Generate(KeyParameter contentEncryptionKey, SecureRandom random) + { + byte[] keyBytes = contentEncryptionKey.GetKey(); + + IWrapper keyWrapper = Helper.CreateWrapper(keyEncryptionAlgorithm.Algorithm.Id); + keyWrapper.Init(true, new ParametersWithRandom(keyEncryptionKey, random)); + Asn1OctetString encryptedKey = new DerOctetString( + keyWrapper.Wrap(keyBytes, 0, keyBytes.Length)); + + return new RecipientInfo(new KekRecipientInfo(kekIdentifier, keyEncryptionAlgorithm, encryptedKey)); + } + + private static AlgorithmIdentifier DetermineKeyEncAlg( + string algorithm, KeyParameter key) + { + if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "DES")) + { + return new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdAlgCms3DesWrap, + DerNull.Instance); + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "RC2")) + { + return new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdAlgCmsRC2Wrap, + new DerInteger(58)); + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "AES")) + { + int length = key.GetKey().Length * 8; + DerObjectIdentifier wrapOid; + + if (length == 128) + { + wrapOid = NistObjectIdentifiers.IdAes128Wrap; + } + else if (length == 192) + { + wrapOid = NistObjectIdentifiers.IdAes192Wrap; + } + else if (length == 256) + { + wrapOid = NistObjectIdentifiers.IdAes256Wrap; + } + else + { + throw new ArgumentException("illegal keysize in AES"); + } + + return new AlgorithmIdentifier(wrapOid); // parameters absent + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "SEED")) + { + // parameters absent + return new AlgorithmIdentifier(KisaObjectIdentifiers.IdNpkiAppCmsSeedWrap); + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "CAMELLIA")) + { + int length = key.GetKey().Length * 8; + DerObjectIdentifier wrapOid; + + if (length == 128) + { + wrapOid = NttObjectIdentifiers.IdCamellia128Wrap; + } + else if (length == 192) + { + wrapOid = NttObjectIdentifiers.IdCamellia192Wrap; + } + else if (length == 256) + { + wrapOid = NttObjectIdentifiers.IdCamellia256Wrap; + } + else + { + throw new ArgumentException("illegal keysize in Camellia"); + } + + return new AlgorithmIdentifier(wrapOid); // parameters must be absent + } + else + { + throw new ArgumentException("unknown algorithm"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..55d95cd5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 59c356f2cc0fb8141a10153085effffc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs new file mode 100644 index 00000000..c9899124 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * the RecipientInfo class for a recipient who has been sent a message + * encrypted using a secret key known to the other side. + */ + public class KekRecipientInformation + : RecipientInformation + { + private KekRecipientInfo info; + + internal KekRecipientInformation( + KekRecipientInfo info, + CmsSecureReadable secureReadable) + : base(info.KeyEncryptionAlgorithm, secureReadable) + { + this.info = info; + this.rid = new RecipientID(); + + KekIdentifier kekId = info.KekID; + + rid.KeyIdentifier = kekId.KeyIdentifier.GetOctets(); + } + + /** + * decrypt the content and return an input stream. + */ + public override CmsTypedStream GetContentStream( + ICipherParameters key) + { + try + { + byte[] encryptedKey = info.EncryptedKey.GetOctets(); + IWrapper keyWrapper = WrapperUtilities.GetWrapper(keyEncAlg.Algorithm.Id); + + keyWrapper.Init(false, key); + + KeyParameter sKey = ParameterUtilities.CreateKeyParameter( + GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length)); + + return GetContentFromSessionKey(sKey); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs.meta new file mode 100644 index 00000000..ac55c3ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35712e8cda7538948b0b56181e714d0c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KEKRecipientInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs new file mode 100644 index 00000000..613084ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class KeyAgreeRecipientInfoGenerator : RecipientInfoGenerator + { + private static readonly CmsEnvelopedHelper Helper = CmsEnvelopedHelper.Instance; + + private DerObjectIdentifier keyAgreementOID; + private DerObjectIdentifier keyEncryptionOID; + private IList recipientCerts; + private AsymmetricCipherKeyPair senderKeyPair; + + internal KeyAgreeRecipientInfoGenerator() + { + } + + internal DerObjectIdentifier KeyAgreementOID + { + set { this.keyAgreementOID = value; } + } + + internal DerObjectIdentifier KeyEncryptionOID + { + set { this.keyEncryptionOID = value; } + } + + internal IEnumerable RecipientCerts + { + set { this.recipientCerts = new List(value); } + } + + internal AsymmetricCipherKeyPair SenderKeyPair + { + set { this.senderKeyPair = value; } + } + + public RecipientInfo Generate(KeyParameter contentEncryptionKey, SecureRandom random) + { + byte[] keyBytes = contentEncryptionKey.GetKey(); + + AsymmetricKeyParameter senderPublicKey = senderKeyPair.Public; + ICipherParameters senderPrivateParams = senderKeyPair.Private; + + + OriginatorIdentifierOrKey originator; + try + { + originator = new OriginatorIdentifierOrKey( + CreateOriginatorPublicKey(senderPublicKey)); + } + catch (IOException e) + { + throw new InvalidKeyException("cannot extract originator public key: " + e); + } + + + Asn1OctetString ukm = null; + if (keyAgreementOID.Id.Equals(CmsEnvelopedGenerator.ECMqvSha1Kdf)) + { + try + { + IAsymmetricCipherKeyPairGenerator ephemKPG = + GeneratorUtilities.GetKeyPairGenerator(keyAgreementOID); + ephemKPG.Init( + ((ECPublicKeyParameters)senderPublicKey).CreateKeyGenerationParameters(random)); + + AsymmetricCipherKeyPair ephemKP = ephemKPG.GenerateKeyPair(); + + ukm = new DerOctetString( + new MQVuserKeyingMaterial( + CreateOriginatorPublicKey(ephemKP.Public), null)); + + senderPrivateParams = new MqvPrivateParameters( + (ECPrivateKeyParameters)senderPrivateParams, + (ECPrivateKeyParameters)ephemKP.Private, + (ECPublicKeyParameters)ephemKP.Public); + } + catch (IOException e) + { + throw new InvalidKeyException("cannot extract MQV ephemeral public key: " + e); + } + catch (SecurityUtilityException e) + { + throw new InvalidKeyException("cannot determine MQV ephemeral key pair parameters from public key: " + e); + } + } + + + DerSequence paramSeq = new DerSequence( + keyEncryptionOID, + DerNull.Instance); + AlgorithmIdentifier keyEncAlg = new AlgorithmIdentifier(keyAgreementOID, paramSeq); + + + Asn1EncodableVector recipientEncryptedKeys = new Asn1EncodableVector(); + foreach (X509Certificate recipientCert in recipientCerts) + { + TbsCertificateStructure tbsCert; + try + { + tbsCert = TbsCertificateStructure.GetInstance( + Asn1Object.FromByteArray(recipientCert.GetTbsCertificate())); + } + catch (Exception) + { + throw new ArgumentException("can't extract TBS structure from certificate"); + } + + // TODO Should there be a SubjectKeyIdentifier-based alternative? + IssuerAndSerialNumber issuerSerial = new IssuerAndSerialNumber( + tbsCert.Issuer, tbsCert.SerialNumber.Value); + KeyAgreeRecipientIdentifier karid = new KeyAgreeRecipientIdentifier(issuerSerial); + + ICipherParameters recipientPublicParams = recipientCert.GetPublicKey(); + if (keyAgreementOID.Id.Equals(CmsEnvelopedGenerator.ECMqvSha1Kdf)) + { + recipientPublicParams = new MqvPublicParameters( + (ECPublicKeyParameters)recipientPublicParams, + (ECPublicKeyParameters)recipientPublicParams); + } + + // Use key agreement to choose a wrap key for this recipient + IBasicAgreement keyAgreement = AgreementUtilities.GetBasicAgreementWithKdf( + keyAgreementOID, keyEncryptionOID.Id); + keyAgreement.Init(new ParametersWithRandom(senderPrivateParams, random)); + BigInteger agreedValue = keyAgreement.CalculateAgreement(recipientPublicParams); + + int keyEncryptionKeySize = GeneratorUtilities.GetDefaultKeySize(keyEncryptionOID) / 8; + byte[] keyEncryptionKeyBytes = X9IntegerConverter.IntegerToBytes(agreedValue, keyEncryptionKeySize); + KeyParameter keyEncryptionKey = ParameterUtilities.CreateKeyParameter( + keyEncryptionOID, keyEncryptionKeyBytes); + + // Wrap the content encryption key with the agreement key + IWrapper keyWrapper = Helper.CreateWrapper(keyEncryptionOID.Id); + keyWrapper.Init(true, new ParametersWithRandom(keyEncryptionKey, random)); + byte[] encryptedKeyBytes = keyWrapper.Wrap(keyBytes, 0, keyBytes.Length); + + Asn1OctetString encryptedKey = new DerOctetString(encryptedKeyBytes); + + recipientEncryptedKeys.Add(new RecipientEncryptedKey(karid, encryptedKey)); + } + + return new RecipientInfo(new KeyAgreeRecipientInfo(originator, ukm, keyEncAlg, + new DerSequence(recipientEncryptedKeys))); + } + + private static OriginatorPublicKey CreateOriginatorPublicKey( + AsymmetricKeyParameter publicKey) + { + SubjectPublicKeyInfo spki = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey); + return new OriginatorPublicKey( + new AlgorithmIdentifier(spki.AlgorithmID.Algorithm, DerNull.Instance), + spki.PublicKeyData.GetBytes()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..b42d8614 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 389c79ce37e58ca4881324c03d343922 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs new file mode 100644 index 00000000..5bdf297b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs @@ -0,0 +1,226 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.Ecc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * the RecipientInfo class for a recipient who has been sent a message + * encrypted using key agreement. + */ + public class KeyAgreeRecipientInformation + : RecipientInformation + { + private KeyAgreeRecipientInfo info; + private Asn1OctetString encryptedKey; + + internal static void ReadRecipientInfo(IList infos, KeyAgreeRecipientInfo info, + CmsSecureReadable secureReadable) + { + try + { + foreach (Asn1Encodable rek in info.RecipientEncryptedKeys) + { + RecipientEncryptedKey id = RecipientEncryptedKey.GetInstance(rek.ToAsn1Object()); + + RecipientID rid = new RecipientID(); + + Asn1.Cms.KeyAgreeRecipientIdentifier karid = id.Identifier; + + Asn1.Cms.IssuerAndSerialNumber iAndSN = karid.IssuerAndSerialNumber; + if (iAndSN != null) + { + rid.Issuer = iAndSN.Name; + rid.SerialNumber = iAndSN.SerialNumber.Value; + } + else + { + Asn1.Cms.RecipientKeyIdentifier rKeyID = karid.RKeyID; + + // Note: 'date' and 'other' fields of RecipientKeyIdentifier appear to be only informational + + rid.SubjectKeyIdentifier = rKeyID.SubjectKeyIdentifier.GetOctets(); + } + + infos.Add(new KeyAgreeRecipientInformation(info, rid, id.EncryptedKey, + secureReadable)); + } + } + catch (IOException e) + { + throw new ArgumentException("invalid rid in KeyAgreeRecipientInformation", e); + } + } + + internal KeyAgreeRecipientInformation( + KeyAgreeRecipientInfo info, + RecipientID rid, + Asn1OctetString encryptedKey, + CmsSecureReadable secureReadable) + : base(info.KeyEncryptionAlgorithm, secureReadable) + { + this.info = info; + this.rid = rid; + this.encryptedKey = encryptedKey; + } + + private AsymmetricKeyParameter GetSenderPublicKey( + AsymmetricKeyParameter receiverPrivateKey, + OriginatorIdentifierOrKey originator) + { + OriginatorPublicKey opk = originator.OriginatorPublicKey; + if (opk != null) + { + return GetPublicKeyFromOriginatorPublicKey(receiverPrivateKey, opk); + } + + OriginatorID origID = new OriginatorID(); + + Asn1.Cms.IssuerAndSerialNumber iAndSN = originator.IssuerAndSerialNumber; + if (iAndSN != null) + { + origID.Issuer = iAndSN.Name; + origID.SerialNumber = iAndSN.SerialNumber.Value; + } + else + { + SubjectKeyIdentifier ski = originator.SubjectKeyIdentifier; + + origID.SubjectKeyIdentifier = ski.GetKeyIdentifier(); + } + + return GetPublicKeyFromOriginatorID(origID); + } + + private AsymmetricKeyParameter GetPublicKeyFromOriginatorPublicKey( + AsymmetricKeyParameter receiverPrivateKey, + OriginatorPublicKey originatorPublicKey) + { + PrivateKeyInfo privInfo = PrivateKeyInfoFactory.CreatePrivateKeyInfo(receiverPrivateKey); + SubjectPublicKeyInfo pubInfo = new SubjectPublicKeyInfo( + privInfo.PrivateKeyAlgorithm, + originatorPublicKey.PublicKey.GetBytes()); + return PublicKeyFactory.CreateKey(pubInfo); + } + + private AsymmetricKeyParameter GetPublicKeyFromOriginatorID( + OriginatorID origID) + { + // TODO Support all alternatives for OriginatorIdentifierOrKey + // see RFC 3852 6.2.2 + throw new CmsException("No support for 'originator' as IssuerAndSerialNumber or SubjectKeyIdentifier"); + } + + private KeyParameter CalculateAgreedWrapKey( + string wrapAlg, + AsymmetricKeyParameter senderPublicKey, + AsymmetricKeyParameter receiverPrivateKey) + { + DerObjectIdentifier agreeAlgID = keyEncAlg.Algorithm; + + ICipherParameters senderPublicParams = senderPublicKey; + ICipherParameters receiverPrivateParams = receiverPrivateKey; + + if (agreeAlgID.Id.Equals(CmsEnvelopedGenerator.ECMqvSha1Kdf)) + { + byte[] ukmEncoding = info.UserKeyingMaterial.GetOctets(); + MQVuserKeyingMaterial ukm = MQVuserKeyingMaterial.GetInstance( + Asn1Object.FromByteArray(ukmEncoding)); + + AsymmetricKeyParameter ephemeralKey = GetPublicKeyFromOriginatorPublicKey( + receiverPrivateKey, ukm.EphemeralPublicKey); + + senderPublicParams = new MqvPublicParameters( + (ECPublicKeyParameters)senderPublicParams, + (ECPublicKeyParameters)ephemeralKey); + receiverPrivateParams = new MqvPrivateParameters( + (ECPrivateKeyParameters)receiverPrivateParams, + (ECPrivateKeyParameters)receiverPrivateParams); + } + + IBasicAgreement agreement = AgreementUtilities.GetBasicAgreementWithKdf( + agreeAlgID, wrapAlg); + agreement.Init(receiverPrivateParams); + BigInteger agreedValue = agreement.CalculateAgreement(senderPublicParams); + + int wrapKeySize = GeneratorUtilities.GetDefaultKeySize(wrapAlg) / 8; + byte[] wrapKeyBytes = X9IntegerConverter.IntegerToBytes(agreedValue, wrapKeySize); + return ParameterUtilities.CreateKeyParameter(wrapAlg, wrapKeyBytes); + } + + private KeyParameter UnwrapSessionKey( + string wrapAlg, + KeyParameter agreedKey) + { + byte[] encKeyOctets = encryptedKey.GetOctets(); + + IWrapper keyCipher = WrapperUtilities.GetWrapper(wrapAlg); + keyCipher.Init(false, agreedKey); + byte[] sKeyBytes = keyCipher.Unwrap(encKeyOctets, 0, encKeyOctets.Length); + return ParameterUtilities.CreateKeyParameter(GetContentAlgorithmName(), sKeyBytes); + } + + internal KeyParameter GetSessionKey( + AsymmetricKeyParameter receiverPrivateKey) + { + try + { + string wrapAlg = DerObjectIdentifier.GetInstance( + Asn1Sequence.GetInstance(keyEncAlg.Parameters)[0]).Id; + + AsymmetricKeyParameter senderPublicKey = GetSenderPublicKey( + receiverPrivateKey, info.Originator); + + KeyParameter agreedWrapKey = CalculateAgreedWrapKey(wrapAlg, + senderPublicKey, receiverPrivateKey); + + return UnwrapSessionKey(wrapAlg, agreedWrapKey); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + catch (Exception e) + { + throw new CmsException("originator key invalid.", e); + } + } + + /** + * decrypt the content and return an input stream. + */ + public override CmsTypedStream GetContentStream( + ICipherParameters key) + { + if (!(key is AsymmetricKeyParameter receiverPrivateKey)) + throw new ArgumentException("KeyAgreement requires asymmetric key", "key"); + + if (!receiverPrivateKey.IsPrivate) + throw new ArgumentException("Expected private key", "key"); + + KeyParameter sKey = GetSessionKey(receiverPrivateKey); + + return GetContentFromSessionKey(sKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs.meta new file mode 100644 index 00000000..5c41cb0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ef11ac1d046f235478c6e890226211ae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyAgreeRecipientInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs new file mode 100644 index 00000000..06b0a424 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class KeyTransRecipientInfoGenerator + : RecipientInfoGenerator + { + private readonly IKeyWrapper m_keyWrapper; + + private IssuerAndSerialNumber m_issuerAndSerialNumber; + private Asn1OctetString m_subjectKeyIdentifier; + + public KeyTransRecipientInfoGenerator(X509Certificate recipCert, IKeyWrapper keyWrapper) + : this(new IssuerAndSerialNumber(recipCert.IssuerDN, new DerInteger(recipCert.SerialNumber)), keyWrapper) + { + } + + public KeyTransRecipientInfoGenerator(IssuerAndSerialNumber issuerAndSerial, IKeyWrapper keyWrapper) + { + m_issuerAndSerialNumber = issuerAndSerial; + m_keyWrapper = keyWrapper; + } + + public KeyTransRecipientInfoGenerator(byte[] subjectKeyID, IKeyWrapper keyWrapper) + { + m_subjectKeyIdentifier = new DerOctetString(subjectKeyID); + m_keyWrapper = keyWrapper; + } + + public RecipientInfo Generate(KeyParameter contentEncryptionKey, SecureRandom random) + { + AlgorithmIdentifier keyEncryptionAlgorithm = AlgorithmDetails; + + byte[] encryptedKeyBytes = GenerateWrappedKey(contentEncryptionKey); + + RecipientIdentifier recipId; + if (m_issuerAndSerialNumber != null) + { + recipId = new RecipientIdentifier(m_issuerAndSerialNumber); + } + else + { + recipId = new RecipientIdentifier(m_subjectKeyIdentifier); + } + + return new RecipientInfo(new KeyTransRecipientInfo(recipId, keyEncryptionAlgorithm, + new DerOctetString(encryptedKeyBytes))); + } + + protected virtual AlgorithmIdentifier AlgorithmDetails + { + get { return (AlgorithmIdentifier)m_keyWrapper.AlgorithmDetails; } + } + + protected virtual byte[] GenerateWrappedKey(KeyParameter contentEncryptionKey) + { + return m_keyWrapper.Wrap(contentEncryptionKey.GetKey()).Collect(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..1063ff20 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b53f760267c3db4e9cd7a00a09173af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs new file mode 100644 index 00000000..b7c0b0d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Asn1Pkcs = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * the KeyTransRecipientInformation class for a recipient who has been sent a secret + * key encrypted using their public key that needs to be used to + * extract the message. + */ + public class KeyTransRecipientInformation + : RecipientInformation + { + private KeyTransRecipientInfo info; + + internal KeyTransRecipientInformation( + KeyTransRecipientInfo info, + CmsSecureReadable secureReadable) + : base(info.KeyEncryptionAlgorithm, secureReadable) + { + this.info = info; + this.rid = new RecipientID(); + + RecipientIdentifier r = info.RecipientIdentifier; + + try + { + if (r.IsTagged) + { + Asn1OctetString octs = Asn1OctetString.GetInstance(r.ID); + + rid.SubjectKeyIdentifier = octs.GetOctets(); + } + else + { + Asn1.Cms.IssuerAndSerialNumber iAnds = Asn1.Cms.IssuerAndSerialNumber.GetInstance(r.ID); + + rid.Issuer = iAnds.Name; + rid.SerialNumber = iAnds.SerialNumber.Value; + } + } + catch (IOException) + { + throw new ArgumentException("invalid rid in KeyTransRecipientInformation"); + } + } + + private string GetExchangeEncryptionAlgorithmName( + AlgorithmIdentifier algo) + { + DerObjectIdentifier oid = algo.Algorithm; + + if (Asn1Pkcs.PkcsObjectIdentifiers.RsaEncryption.Equals(oid)) + { + return "RSA//PKCS1Padding"; + } else if (Asn1Pkcs.PkcsObjectIdentifiers.IdRsaesOaep.Equals(oid)) + { + Asn1Pkcs.RsaesOaepParameters rsaParams = Asn1Pkcs.RsaesOaepParameters.GetInstance(algo.Parameters); + return "RSA//OAEPWITH"+DigestUtilities.GetAlgorithmName(rsaParams.HashAlgorithm.Algorithm)+"ANDMGF1Padding"; + } + + return oid.Id; + } + + internal KeyParameter UnwrapKey(ICipherParameters key) + { + byte[] encryptedKey = info.EncryptedKey.GetOctets(); + + + try + { + if (keyEncAlg.Algorithm.Equals(PkcsObjectIdentifiers.IdRsaesOaep)) + { + IKeyUnwrapper keyWrapper = new Asn1KeyUnwrapper(keyEncAlg.Algorithm, keyEncAlg.Parameters, key); + + return ParameterUtilities.CreateKeyParameter( + GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length).Collect()); + } + else + { + string keyExchangeAlgorithm = GetExchangeEncryptionAlgorithmName(keyEncAlg); + IWrapper keyWrapper = WrapperUtilities.GetWrapper(keyExchangeAlgorithm); + keyWrapper.Init(false, key); + + // FIXME Support for MAC algorithm parameters similar to cipher parameters + return ParameterUtilities.CreateKeyParameter( + GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length)); + } + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } +// catch (IllegalBlockSizeException e) + catch (DataLengthException e) + { + throw new CmsException("illegal blocksize in message.", e); + } +// catch (BadPaddingException e) + catch (InvalidCipherTextException e) + { + throw new CmsException("bad padding in message.", e); + } + } + + /** + * decrypt the content and return it as a byte array. + */ + public override CmsTypedStream GetContentStream( + ICipherParameters key) + { + KeyParameter sKey = UnwrapKey(key); + + return GetContentFromSessionKey(sKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs.meta new file mode 100644 index 00000000..1b4c2c39 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6e99fa40e95a9dc46b65d48061929e6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/KeyTransRecipientInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs new file mode 100644 index 00000000..9bf76a37 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * a basic index for an originator. + */ + public class OriginatorID + : X509CertStoreSelector + { + public override int GetHashCode() + { + int code = Arrays.GetHashCode(this.SubjectKeyIdentifier); + + BigInteger serialNumber = this.SerialNumber; + if (serialNumber != null) + { + code ^= serialNumber.GetHashCode(); + } + + X509Name issuer = this.Issuer; + if (issuer != null) + { + code ^= issuer.GetHashCode(); + } + + return code; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return false; + + OriginatorID id = obj as OriginatorID; + + if (id == null) + return false; + + return Arrays.AreEqual(SubjectKeyIdentifier, id.SubjectKeyIdentifier) + && Org.BouncyCastle.Utilities.Platform.Equals(SerialNumber, id.SerialNumber) + && IssuersMatch(Issuer, id.Issuer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs.meta new file mode 100644 index 00000000..48301f9c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7851ca60e95b7b941a236ae9a3478cdc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs new file mode 100644 index 00000000..f11358de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class OriginatorInfoGenerator + { + private readonly List origCerts; + private readonly List origCrls; + + public OriginatorInfoGenerator(X509Certificate origCert) + { + this.origCerts = new List{ origCert.CertificateStructure }; + this.origCrls = null; + } + + public OriginatorInfoGenerator(IStore x509Certs) + : this(x509Certs, null, null, null) + { + } + + public OriginatorInfoGenerator(IStore x509Certs, IStore x509Crls) + : this(x509Certs, x509Crls, null, null) + { + } + + public OriginatorInfoGenerator(IStore x509Certs, IStore x509Crls, + IStore x509AttrCerts, IStore otherRevocationInfos) + { + List certificates = null; + if (x509Certs != null || x509AttrCerts != null) + { + certificates = new List(); + if (x509Certs != null) + { + certificates.AddRange(CmsUtilities.GetCertificatesFromStore(x509Certs)); + } + if (x509AttrCerts != null) + { + certificates.AddRange(CmsUtilities.GetAttributeCertificatesFromStore(x509AttrCerts)); + } + } + + List revocations = null; + if (x509Crls != null || otherRevocationInfos != null) + { + revocations = new List(); + if (x509Crls != null) + { + revocations.AddRange(CmsUtilities.GetCrlsFromStore(x509Crls)); + } + if (otherRevocationInfos != null) + { + revocations.AddRange(CmsUtilities.GetOtherRevocationInfosFromStore(otherRevocationInfos)); + } + } + + this.origCerts = certificates; + this.origCrls = revocations; + } + + public virtual OriginatorInfo Generate() + { + Asn1Set certSet = origCerts == null ? null : CmsUtilities.CreateDerSetFromList(origCerts); + Asn1Set crlSet = origCrls == null ? null : CmsUtilities.CreateDerSetFromList(origCrls); + return new OriginatorInfo(certSet, crlSet); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs.meta new file mode 100644 index 00000000..b580081c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 479c0dbce70a9384d8c78a131010ca98 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs new file mode 100644 index 00000000..655682be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs @@ -0,0 +1,52 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class OriginatorInformation + { + private readonly OriginatorInfo originatorInfo; + + internal OriginatorInformation(OriginatorInfo originatorInfo) + { + this.originatorInfo = originatorInfo; + } + + /** + * Return the certificates stored in the underlying OriginatorInfo object. + * + * @return a Store of X509CertificateHolder objects. + */ + public virtual IStore GetCertificates() + { + return CmsSignedHelper.Instance.GetCertificates(originatorInfo.Certificates); + } + + /** + * Return the CRLs stored in the underlying OriginatorInfo object. + * + * @return a Store of X509CRLHolder objects. + */ + public virtual IStore GetCrls() + { + return CmsSignedHelper.Instance.GetCrls(originatorInfo.Crls); + } + + /** + * Return the underlying ASN.1 object defining this SignerInformation object. + * + * @return a OriginatorInfo. + */ + public virtual OriginatorInfo ToAsn1Structure() + { + return originatorInfo; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs.meta new file mode 100644 index 00000000..19a0a7ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7e0fb8c1ef936d6489df56ee1a9902ac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/OriginatorInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs new file mode 100644 index 00000000..b91f752d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /// + /// PKCS5 scheme-2 - password converted to bytes assuming ASCII. + /// + public class Pkcs5Scheme2PbeKey + : CmsPbeKey + { + public Pkcs5Scheme2PbeKey( + char[] password, + byte[] salt, + int iterationCount) + : base(password, salt, iterationCount) + { + } + + public Pkcs5Scheme2PbeKey( + char[] password, + AlgorithmIdentifier keyDerivationAlgorithm) + : base(password, keyDerivationAlgorithm) + { + } + + internal override KeyParameter GetEncoded( + string algorithmOid) + { + Pkcs5S2ParametersGenerator gen = new Pkcs5S2ParametersGenerator(); + + gen.Init( + PbeParametersGenerator.Pkcs5PasswordToBytes(password), + salt, + iterationCount); + + return (KeyParameter) gen.GenerateDerivedParameters( + algorithmOid, + CmsEnvelopedHelper.Instance.GetKeySize(algorithmOid)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs.meta new file mode 100644 index 00000000..95f33b38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db87fb77c83fe5e4f92ec11f9237603e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2PBEKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs new file mode 100644 index 00000000..a255711f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * PKCS5 scheme-2 - password converted to bytes using UTF-8. + */ + public class Pkcs5Scheme2Utf8PbeKey + : CmsPbeKey + { + public Pkcs5Scheme2Utf8PbeKey( + char[] password, + byte[] salt, + int iterationCount) + : base(password, salt, iterationCount) + { + } + + public Pkcs5Scheme2Utf8PbeKey( + char[] password, + AlgorithmIdentifier keyDerivationAlgorithm) + : base(password, keyDerivationAlgorithm) + { + } + + internal override KeyParameter GetEncoded( + string algorithmOid) + { + Pkcs5S2ParametersGenerator gen = new Pkcs5S2ParametersGenerator(); + + gen.Init( + PbeParametersGenerator.Pkcs5PasswordToUtf8Bytes(password), + salt, + iterationCount); + + return (KeyParameter) gen.GenerateDerivedParameters( + algorithmOid, + CmsEnvelopedHelper.Instance.GetKeySize(algorithmOid)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs.meta new file mode 100644 index 00000000..5f14ac08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69ecc2bd537aa374aa456aef7b7e3827 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PKCS5Scheme2UTF8PBEKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs new file mode 100644 index 00000000..c184daac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs @@ -0,0 +1,74 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal class PasswordRecipientInfoGenerator : RecipientInfoGenerator + { + private static readonly CmsEnvelopedHelper Helper = CmsEnvelopedHelper.Instance; + + private AlgorithmIdentifier keyDerivationAlgorithm; + private KeyParameter keyEncryptionKey; + // TODO Can get this from keyEncryptionKey? + private string keyEncryptionKeyOID; + + internal PasswordRecipientInfoGenerator() + { + } + + internal AlgorithmIdentifier KeyDerivationAlgorithm + { + set { this.keyDerivationAlgorithm = value; } + } + + internal KeyParameter KeyEncryptionKey + { + set { this.keyEncryptionKey = value; } + } + + internal string KeyEncryptionKeyOID + { + set { this.keyEncryptionKeyOID = value; } + } + + public RecipientInfo Generate(KeyParameter contentEncryptionKey, SecureRandom random) + { + byte[] keyBytes = contentEncryptionKey.GetKey(); + + string rfc3211WrapperName = Helper.GetRfc3211WrapperName(keyEncryptionKeyOID); + IWrapper keyWrapper = Helper.CreateWrapper(rfc3211WrapperName); + + // Note: In Java build, the IV is automatically generated in JCE layer + int ivLength = Org.BouncyCastle.Utilities.Platform.StartsWith(rfc3211WrapperName, "DESEDE") ? 8 : 16; + byte[] iv = new byte[ivLength]; + random.NextBytes(iv); + + ICipherParameters parameters = new ParametersWithIV(keyEncryptionKey, iv); + keyWrapper.Init(true, new ParametersWithRandom(parameters, random)); + Asn1OctetString encryptedKey = new DerOctetString( + keyWrapper.Wrap(keyBytes, 0, keyBytes.Length)); + + DerSequence seq = new DerSequence( + new DerObjectIdentifier(keyEncryptionKeyOID), + new DerOctetString(iv)); + + AlgorithmIdentifier keyEncryptionAlgorithm = new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdAlgPwriKek, seq); + + return new RecipientInfo(new PasswordRecipientInfo( + keyDerivationAlgorithm, keyEncryptionAlgorithm, encryptedKey)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..caf10a8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07fa27a44e07f9441bb0fb9630b156c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs new file mode 100644 index 00000000..2e179dde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * the RecipientInfo class for a recipient who has been sent a message + * encrypted using a password. + */ + public class PasswordRecipientInformation + : RecipientInformation + { + private readonly PasswordRecipientInfo info; + + internal PasswordRecipientInformation( + PasswordRecipientInfo info, + CmsSecureReadable secureReadable) + : base(info.KeyEncryptionAlgorithm, secureReadable) + { + this.info = info; + this.rid = new RecipientID(); + } + + /** + * return the object identifier for the key derivation algorithm, or null + * if there is none present. + * + * @return OID for key derivation algorithm, if present. + */ + public virtual AlgorithmIdentifier KeyDerivationAlgorithm + { + get { return info.KeyDerivationAlgorithm; } + } + + /** + * decrypt the content and return an input stream. + */ + public override CmsTypedStream GetContentStream( + ICipherParameters key) + { + try + { + AlgorithmIdentifier kekAlg = AlgorithmIdentifier.GetInstance(info.KeyEncryptionAlgorithm); + Asn1Sequence kekAlgParams = (Asn1Sequence)kekAlg.Parameters; + byte[] encryptedKey = info.EncryptedKey.GetOctets(); + string kekAlgName = DerObjectIdentifier.GetInstance(kekAlgParams[0]).Id; + string cName = CmsEnvelopedHelper.Instance.GetRfc3211WrapperName(kekAlgName); + IWrapper keyWrapper = WrapperUtilities.GetWrapper(cName); + + byte[] iv = Asn1OctetString.GetInstance(kekAlgParams[1]).GetOctets(); + + ICipherParameters parameters = ((CmsPbeKey)key).GetEncoded(kekAlgName); + parameters = new ParametersWithIV(parameters, iv); + + keyWrapper.Init(false, parameters); + + KeyParameter sKey = ParameterUtilities.CreateKeyParameter( + GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length)); + + return GetContentFromSessionKey(sKey); + } + catch (SecurityUtilityException e) + { + throw new CmsException("couldn't create cipher.", e); + } + catch (InvalidKeyException e) + { + throw new CmsException("key invalid in message.", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs.meta new file mode 100644 index 00000000..d01d2a99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: caace69a107151d4b9a89ffd20353408 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/PasswordRecipientInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs new file mode 100644 index 00000000..03762af1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class RecipientID + : X509CertStoreSelector + { + private byte[] keyIdentifier; + + public byte[] KeyIdentifier + { + get { return Arrays.Clone(keyIdentifier); } + set { keyIdentifier = Arrays.Clone(value); } + } + + public override int GetHashCode() + { + int code = Arrays.GetHashCode(keyIdentifier) + ^ Arrays.GetHashCode(this.SubjectKeyIdentifier); + + BigInteger serialNumber = this.SerialNumber; + if (serialNumber != null) + { + code ^= serialNumber.GetHashCode(); + } + + X509Name issuer = this.Issuer; + if (issuer != null) + { + code ^= issuer.GetHashCode(); + } + + return code; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + RecipientID id = obj as RecipientID; + + if (id == null) + return false; + + return Arrays.AreEqual(keyIdentifier, id.keyIdentifier) + && Arrays.AreEqual(SubjectKeyIdentifier, id.SubjectKeyIdentifier) + && Org.BouncyCastle.Utilities.Platform.Equals(SerialNumber, id.SerialNumber) + && IssuersMatch(Issuer, id.Issuer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs.meta new file mode 100644 index 00000000..aa17b4df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e0f3e45231680a744848ddfdcf9af153 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs new file mode 100644 index 00000000..3b85f653 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public interface RecipientInfoGenerator + { + /// + /// Generate a RecipientInfo object for the given key. + /// + /// + /// A + /// + /// + /// A + /// + /// + /// A + /// + /// + RecipientInfo Generate(KeyParameter contentEncryptionKey, SecureRandom random); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..512e2027 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db0be6d2492b98d4ca1c04309981713f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs new file mode 100644 index 00000000..cf9da6ae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs @@ -0,0 +1,130 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public abstract class RecipientInformation + { + internal RecipientID rid = new RecipientID(); + internal AlgorithmIdentifier keyEncAlg; + internal CmsSecureReadable secureReadable; + + private byte[] resultMac; + + internal RecipientInformation( + AlgorithmIdentifier keyEncAlg, + CmsSecureReadable secureReadable) + { + this.keyEncAlg = keyEncAlg; + this.secureReadable = secureReadable; + } + + internal string GetContentAlgorithmName() + { + AlgorithmIdentifier algorithm = secureReadable.Algorithm; +// return CmsEnvelopedHelper.Instance.GetSymmetricCipherName(algorithm.Algorithm.Id); + return algorithm.Algorithm.Id; + } + + public RecipientID RecipientID + { + get { return rid; } + } + + public AlgorithmIdentifier KeyEncryptionAlgorithmID + { + get { return keyEncAlg; } + } + + /** + * return the object identifier for the key encryption algorithm. + * + * @return OID for key encryption algorithm. + */ + public string KeyEncryptionAlgOid + { + get { return keyEncAlg.Algorithm.Id; } + } + + /** + * return the ASN.1 encoded key encryption algorithm parameters, or null if + * there aren't any. + * + * @return ASN.1 encoding of key encryption algorithm parameters. + */ + public Asn1Object KeyEncryptionAlgParams + { + get + { + Asn1Encodable ae = keyEncAlg.Parameters; + + return ae == null ? null : ae.ToAsn1Object(); + } + } + + internal CmsTypedStream GetContentFromSessionKey( + KeyParameter sKey) + { + CmsReadable readable = secureReadable.GetReadable(sKey); + + try + { + return new CmsTypedStream(readable.GetInputStream()); + } + catch (IOException e) + { + throw new CmsException("error getting .", e); + } + } + + public byte[] GetContent( + ICipherParameters key) + { + try + { + return CmsUtilities.StreamToByteArray(GetContentStream(key).ContentStream); + } + catch (IOException e) + { + throw new Exception("unable to parse internal stream: " + e); + } + } + + /** + * Return the MAC calculated for the content stream. Note: this call is only meaningful once all + * the content has been read. + * + * @return byte array containing the mac. + */ + public byte[] GetMac() + { + if (resultMac == null) + { + object cryptoObject = secureReadable.CryptoObject; + if (cryptoObject is IMac mac) + { + resultMac = MacUtilities.DoFinal(mac); + } + } + + return Arrays.Clone(resultMac); + } + + public abstract CmsTypedStream GetContentStream(ICipherParameters key); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs.meta new file mode 100644 index 00000000..bd97b5c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d65120930b18eb4fa0aae911ffc25cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs new file mode 100644 index 00000000..d8c53e76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class RecipientInformationStore + { + private readonly IList m_all; + private readonly IDictionary> m_table = + new Dictionary>(); + + public RecipientInformationStore(IEnumerable recipientInfos) + { + foreach (RecipientInformation recipientInformation in recipientInfos) + { + RecipientID rid = recipientInformation.RecipientID; + + if (!m_table.TryGetValue(rid, out var list)) + { + m_table[rid] = list = new List(1); + } + + list.Add(recipientInformation); + } + + this.m_all = new List(recipientInfos); + } + + public RecipientInformation this[RecipientID selector] + { + get { return GetFirstRecipient(selector); } + } + + /** + * Return the first RecipientInformation object that matches the + * passed in selector. Null if there are no matches. + * + * @param selector to identify a recipient + * @return a single RecipientInformation object. Null if none matches. + */ + public RecipientInformation GetFirstRecipient(RecipientID selector) + { + if (!m_table.TryGetValue(selector, out var list)) + return null; + + return list[0]; + } + + /** + * Return the number of recipients in the collection. + * + * @return number of recipients identified. + */ + public int Count + { + get { return m_all.Count; } + } + + /** + * Return all recipients in the collection + * + * @return a collection of recipients. + */ + public IList GetRecipients() + { + return new List(m_all); + } + + /** + * Return possible empty collection with recipients matching the passed in RecipientID + * + * @param selector a recipient id to select against. + * @return a collection of RecipientInformation objects. + */ + public IList GetRecipients(RecipientID selector) + { + if (!m_table.TryGetValue(selector, out var list)) + return new List(0); + + return new List(list); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs.meta new file mode 100644 index 00000000..bdf9d64e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f1f35505c20e2848aad933c9d43af28 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/RecipientInformationStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs new file mode 100644 index 00000000..67ebce51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * a basic index for a signer. + */ + public class SignerID + : X509CertStoreSelector + { + public override int GetHashCode() + { + int code = Arrays.GetHashCode(this.SubjectKeyIdentifier); + + BigInteger serialNumber = this.SerialNumber; + if (serialNumber != null) + { + code ^= serialNumber.GetHashCode(); + } + + X509Name issuer = this.Issuer; + if (issuer != null) + { + code ^= issuer.GetHashCode(); + } + + return code; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return false; + + SignerID id = obj as SignerID; + + if (id == null) + return false; + + return Arrays.AreEqual(SubjectKeyIdentifier, id.SubjectKeyIdentifier) + && Org.BouncyCastle.Utilities.Platform.Equals(SerialNumber, id.SerialNumber) + && IssuersMatch(Issuer, id.Issuer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs.meta new file mode 100644 index 00000000..7c783e4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd3b9b22004a9f24293c3250d8b72e08 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerId.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs new file mode 100644 index 00000000..604cfe8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + internal interface ISignerInfoGenerator + { + SignerInfo Generate(DerObjectIdentifier contentType, AlgorithmIdentifier digestAlgorithm, + byte[] calculatedDigest); + } + + public class SignerInfoGenerator + { + internal X509Certificate certificate; + internal ISignatureFactory contentSigner; + internal SignerIdentifier sigId; + internal CmsAttributeTableGenerator signedGen; + internal CmsAttributeTableGenerator unsignedGen; + private bool isDirectSignature; + + internal SignerInfoGenerator(SignerIdentifier sigId, ISignatureFactory signerFactory): this(sigId, signerFactory, false) + { + + } + + internal SignerInfoGenerator(SignerIdentifier sigId, ISignatureFactory signerFactory, bool isDirectSignature) + { + this.sigId = sigId; + this.contentSigner = signerFactory; + this.isDirectSignature = isDirectSignature; + if (this.isDirectSignature) + { + this.signedGen = null; + this.unsignedGen = null; + } + else + { + this.signedGen = new DefaultSignedAttributeTableGenerator(); + this.unsignedGen = null; + } + } + + internal SignerInfoGenerator(SignerIdentifier sigId, ISignatureFactory contentSigner, CmsAttributeTableGenerator signedGen, CmsAttributeTableGenerator unsignedGen) + { + this.sigId = sigId; + this.contentSigner = contentSigner; + this.signedGen = signedGen; + this.unsignedGen = unsignedGen; + this.isDirectSignature = false; + } + + internal void setAssociatedCertificate(X509Certificate certificate) + { + this.certificate = certificate; + } + + public SignerInfoGeneratorBuilder NewBuilder() + { + SignerInfoGeneratorBuilder builder = new SignerInfoGeneratorBuilder(); + builder.WithSignedAttributeGenerator(signedGen); + builder.WithUnsignedAttributeGenerator(unsignedGen); + builder.SetDirectSignature(isDirectSignature); + return builder; + } + + } + + public class SignerInfoGeneratorBuilder + { + private bool directSignature; + private CmsAttributeTableGenerator signedGen; + private CmsAttributeTableGenerator unsignedGen; + + public SignerInfoGeneratorBuilder() + { + } + + + /** + * If the passed in flag is true, the signer signature will be based on the data, not + * a collection of signed attributes, and no signed attributes will be included. + * + * @return the builder object + */ + public SignerInfoGeneratorBuilder SetDirectSignature(bool hasNoSignedAttributes) + { + this.directSignature = hasNoSignedAttributes; + + return this; + } + + /** + * Provide a custom signed attribute generator. + * + * @param signedGen a generator of signed attributes. + * @return the builder object + */ + public SignerInfoGeneratorBuilder WithSignedAttributeGenerator(CmsAttributeTableGenerator signedGen) + { + this.signedGen = signedGen; + + return this; + } + + /** + * Provide a generator of unsigned attributes. + * + * @param unsignedGen a generator for signed attributes. + * @return the builder object + */ + public SignerInfoGeneratorBuilder WithUnsignedAttributeGenerator(CmsAttributeTableGenerator unsignedGen) + { + this.unsignedGen = unsignedGen; + + return this; + } + + /** + * Build a generator with the passed in X.509 certificate issuer and serial number as the signerIdentifier. + * + * @param contentSigner operator for generating the final signature in the SignerInfo with. + * @param certificate X.509 certificate related to the contentSigner. + * @return a SignerInfoGenerator + * @throws OperatorCreationException if the generator cannot be built. + */ + public SignerInfoGenerator Build(ISignatureFactory contentSigner, X509Certificate certificate) + { + SignerIdentifier sigId = new SignerIdentifier(new IssuerAndSerialNumber(certificate.IssuerDN, new DerInteger(certificate.SerialNumber))); + + SignerInfoGenerator sigInfoGen = CreateGenerator(contentSigner, sigId); + + sigInfoGen.setAssociatedCertificate(certificate); + + return sigInfoGen; + } + + /** + * Build a generator with the passed in subjectKeyIdentifier as the signerIdentifier. If used you should + * try to follow the calculation described in RFC 5280 section 4.2.1.2. + * + * @param signerFactory operator factory for generating the final signature in the SignerInfo with. + * @param subjectKeyIdentifier key identifier to identify the public key for verifying the signature. + * @return a SignerInfoGenerator + */ + public SignerInfoGenerator Build(ISignatureFactory signerFactory, byte[] subjectKeyIdentifier) + { + SignerIdentifier sigId = new SignerIdentifier(new DerOctetString(subjectKeyIdentifier)); + + return CreateGenerator(signerFactory, sigId); + } + + private SignerInfoGenerator CreateGenerator(ISignatureFactory contentSigner, SignerIdentifier sigId) + { + if (directSignature) + { + return new SignerInfoGenerator(sigId, contentSigner, true); + } + + if (signedGen != null || unsignedGen != null) + { + if (signedGen == null) + { + signedGen = new DefaultSignedAttributeTableGenerator(); + } + + return new SignerInfoGenerator(sigId, contentSigner, signedGen, unsignedGen); + } + + return new SignerInfoGenerator(sigId, contentSigner); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs.meta new file mode 100644 index 00000000..4bbfdb8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d071d502475b02f40bef27b9fcef6231 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs new file mode 100644 index 00000000..84f32951 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs @@ -0,0 +1,813 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * an expanded SignerInfo block from a CMS Signed message + */ + public class SignerInformation + { + private static readonly CmsSignedHelper Helper = CmsSignedHelper.Instance; + + private SignerID sid; + + private CmsProcessable content; + private byte[] signature; + private DerObjectIdentifier contentType; + private byte[] calculatedDigest; + private byte[] resultDigest; + + // Derived + private Asn1.Cms.AttributeTable signedAttributeTable; + private Asn1.Cms.AttributeTable unsignedAttributeTable; + private readonly bool isCounterSignature; + + protected SignerInfo info; + protected AlgorithmIdentifier digestAlgorithm; + protected AlgorithmIdentifier encryptionAlgorithm; + protected readonly Asn1Set signedAttributeSet; + protected readonly Asn1Set unsignedAttributeSet; + + internal SignerInformation( + SignerInfo info, + DerObjectIdentifier contentType, + CmsProcessable content, + IDigestCalculator digestCalculator) + { + this.info = info; + this.sid = new SignerID(); + this.contentType = contentType; + this.isCounterSignature = contentType == null; + + try + { + SignerIdentifier s = info.SignerID; + + if (s.IsTagged) + { + Asn1OctetString octs = Asn1OctetString.GetInstance(s.ID); + + sid.SubjectKeyIdentifier = octs.GetEncoded(); + } + else + { + Asn1.Cms.IssuerAndSerialNumber iAnds = + Asn1.Cms.IssuerAndSerialNumber.GetInstance(s.ID); + + sid.Issuer = iAnds.Name; + sid.SerialNumber = iAnds.SerialNumber.Value; + } + } + catch (IOException) + { + throw new ArgumentException("invalid sid in SignerInfo"); + } + + this.digestAlgorithm = info.DigestAlgorithm; + this.signedAttributeSet = info.AuthenticatedAttributes; + this.unsignedAttributeSet = info.UnauthenticatedAttributes; + this.encryptionAlgorithm = info.DigestEncryptionAlgorithm; + this.signature = (byte[])info.EncryptedDigest.GetOctets().Clone(); + + this.content = content; + this.calculatedDigest = (digestCalculator != null) ? digestCalculator.GetDigest() : null; + } + + /** + * Protected constructor. In some cases clients have their own idea about how to encode + * the signed attributes and calculate the signature. This constructor is to allow developers + * to deal with that by extending off the class and overriding e.g. SignedAttributes property. + * + * @param baseInfo the SignerInformation to base this one on. + */ + protected SignerInformation(SignerInformation baseInfo) + { + this.info = baseInfo.info; + this.content = baseInfo.content; + this.contentType = baseInfo.contentType; + this.isCounterSignature = baseInfo.IsCounterSignature; + this.sid = baseInfo.sid; + this.digestAlgorithm = info.DigestAlgorithm; + this.signedAttributeSet = info.AuthenticatedAttributes; + this.unsignedAttributeSet = info.UnauthenticatedAttributes; + this.encryptionAlgorithm = info.DigestEncryptionAlgorithm; + this.signature = (byte[])info.EncryptedDigest.GetOctets().Clone(); + + this.calculatedDigest = baseInfo.calculatedDigest; + this.signedAttributeTable = baseInfo.signedAttributeTable; + this.unsignedAttributeTable = baseInfo.unsignedAttributeTable; + } + + public bool IsCounterSignature + { + get { return isCounterSignature; } + } + + public DerObjectIdentifier ContentType + { + get { return contentType; } + } + + public SignerID SignerID + { + get { return sid; } + } + + /** + * return the version number for this objects underlying SignerInfo structure. + */ + public int Version + { + get { return info.Version.IntValueExact; } + } + + public AlgorithmIdentifier DigestAlgorithmID + { + get { return digestAlgorithm; } + } + + /** + * return the object identifier for the signature. + */ + public string DigestAlgOid + { + get { return digestAlgorithm.Algorithm.Id; } + } + + /** + * return the signature parameters, or null if there aren't any. + */ + public Asn1Object DigestAlgParams + { + get + { + Asn1Encodable ae = digestAlgorithm.Parameters; + + return ae == null ? null : ae.ToAsn1Object(); + } + } + + /** + * return the content digest that was calculated during verification. + */ + public byte[] GetContentDigest() + { + if (resultDigest == null) + { + throw new InvalidOperationException("method can only be called after verify."); + } + + return (byte[])resultDigest.Clone(); + } + + public AlgorithmIdentifier EncryptionAlgorithmID + { + get { return encryptionAlgorithm; } + } + + /** + * return the object identifier for the signature. + */ + public string EncryptionAlgOid + { + get { return encryptionAlgorithm.Algorithm.Id; } + } + + /** + * return the signature/encryption algorithm parameters, or null if + * there aren't any. + */ + public Asn1Object EncryptionAlgParams + { + get + { + Asn1Encodable ae = encryptionAlgorithm.Parameters; + + return ae == null ? null : ae.ToAsn1Object(); + } + } + + /** + * return a table of the signed attributes - indexed by + * the OID of the attribute. + */ + public Asn1.Cms.AttributeTable SignedAttributes + { + get + { + if (signedAttributeSet != null && signedAttributeTable == null) + { + signedAttributeTable = new Asn1.Cms.AttributeTable(signedAttributeSet); + } + return signedAttributeTable; + } + } + + /** + * return a table of the unsigned attributes indexed by + * the OID of the attribute. + */ + public Asn1.Cms.AttributeTable UnsignedAttributes + { + get + { + if (unsignedAttributeSet != null && unsignedAttributeTable == null) + { + unsignedAttributeTable = new Asn1.Cms.AttributeTable(unsignedAttributeSet); + } + return unsignedAttributeTable; + } + } + + /** + * return the encoded signature + */ + public byte[] GetSignature() + { + return (byte[]) signature.Clone(); + } + + /** + * Return a SignerInformationStore containing the counter signatures attached to this + * signer. If no counter signatures are present an empty store is returned. + */ + public SignerInformationStore GetCounterSignatures() + { + // TODO There are several checks implied by the RFC3852 comments that are missing + + /* + The countersignature attribute MUST be an unsigned attribute; it MUST + NOT be a signed attribute, an authenticated attribute, an + unauthenticated attribute, or an unprotected attribute. + */ + Asn1.Cms.AttributeTable unsignedAttributeTable = UnsignedAttributes; + if (unsignedAttributeTable == null) + { + return new SignerInformationStore(new List(0)); + } + + var counterSignatures = new List(); + + /* + The UnsignedAttributes syntax is defined as a SET OF Attributes. The + UnsignedAttributes in a signerInfo may include multiple instances of + the countersignature attribute. + */ + Asn1EncodableVector allCSAttrs = unsignedAttributeTable.GetAll(CmsAttributes.CounterSignature); + + foreach (Asn1.Cms.Attribute counterSignatureAttribute in allCSAttrs) + { + /* + A countersignature attribute can have multiple attribute values. The + syntax is defined as a SET OF AttributeValue, and there MUST be one + or more instances of AttributeValue present. + */ + Asn1Set values = counterSignatureAttribute.AttrValues; + if (values.Count < 1) + { + // TODO Throw an appropriate exception? + } + + foreach (Asn1Encodable asn1Obj in values) + { + /* + Countersignature values have the same meaning as SignerInfo values + for ordinary signatures, except that: + + 1. The signedAttributes field MUST NOT contain a content-type + attribute; there is no content type for countersignatures. + + 2. The signedAttributes field MUST contain a message-digest + attribute if it contains any other attributes. + + 3. The input to the message-digesting process is the contents + octets of the DER encoding of the signatureValue field of the + SignerInfo value with which the attribute is associated. + */ + SignerInfo si = SignerInfo.GetInstance(asn1Obj.ToAsn1Object()); + + string digestName = CmsSignedHelper.Instance.GetDigestAlgName(si.DigestAlgorithm.Algorithm.Id); + + counterSignatures.Add(new SignerInformation(si, null, null, new CounterSignatureDigestCalculator(digestName, GetSignature()))); + } + } + + return new SignerInformationStore(counterSignatures); + } + + /** + * return the DER encoding of the signed attributes. + * @throws IOException if an encoding error occurs. + */ + public virtual byte[] GetEncodedSignedAttributes() + { + return signedAttributeSet == null + ? null + : signedAttributeSet.GetEncoded(Asn1Encodable.Der); + } + + private bool DoVerify( + AsymmetricKeyParameter key) + { + DerObjectIdentifier sigAlgOid = this.encryptionAlgorithm.Algorithm; + Asn1Encodable sigParams = this.encryptionAlgorithm.Parameters; + string digestName = Helper.GetDigestAlgName(this.EncryptionAlgOid); + + if (digestName.Equals(sigAlgOid.Id)) + { + digestName = Helper.GetDigestAlgName(this.DigestAlgOid); + } + + IDigest digest = Helper.GetDigestInstance(digestName); + ISigner sig; + + if (sigAlgOid.Equals(Asn1.Pkcs.PkcsObjectIdentifiers.IdRsassaPss)) + { + // RFC 4056 2.2 + // When the id-RSASSA-PSS algorithm identifier is used for a signature, + // the AlgorithmIdentifier parameters field MUST contain RSASSA-PSS-params. + if (sigParams == null) + throw new CmsException("RSASSA-PSS signature must specify algorithm parameters"); + + try + { + // TODO Provide abstract configuration mechanism + // (via alternate SignerUtilities.GetSigner method taking ASN.1 params) + + Asn1.Pkcs.RsassaPssParameters pss = Asn1.Pkcs.RsassaPssParameters.GetInstance( + sigParams.ToAsn1Object()); + + if (!pss.HashAlgorithm.Algorithm.Equals(this.digestAlgorithm.Algorithm)) + throw new CmsException("RSASSA-PSS signature parameters specified incorrect hash algorithm"); + if (!pss.MaskGenAlgorithm.Algorithm.Equals(Asn1.Pkcs.PkcsObjectIdentifiers.IdMgf1)) + throw new CmsException("RSASSA-PSS signature parameters specified unknown MGF"); + + IDigest pssDigest = DigestUtilities.GetDigest(pss.HashAlgorithm.Algorithm); + int saltLength = pss.SaltLength.IntValueExact; + + // RFC 4055 3.1 + // The value MUST be 1, which represents the trailer field with hexadecimal value 0xBC + if (!Asn1.Pkcs.RsassaPssParameters.DefaultTrailerField.Equals(pss.TrailerField)) + throw new CmsException("RSASSA-PSS signature parameters must have trailerField of 1"); + + IAsymmetricBlockCipher rsa = new RsaBlindedEngine(); + + if (signedAttributeSet == null && calculatedDigest != null) + { + sig = PssSigner.CreateRawSigner(rsa, pssDigest, pssDigest, saltLength, PssSigner.TrailerImplicit); + } + else + { + sig = new PssSigner(rsa, pssDigest, saltLength); + } + } + catch (Exception e) + { + throw new CmsException("failed to set RSASSA-PSS signature parameters", e); + } + } + else + { + // TODO Probably too strong a check at the moment + // if (sigParams != null) + // throw new CmsException("unrecognised signature parameters provided"); + + string signatureName = digestName + "with" + Helper.GetEncryptionAlgName(this.EncryptionAlgOid); + + sig = Helper.GetSignatureInstance(signatureName); + + //sig = Helper.GetSignatureInstance(this.EncryptionAlgOid); + //sig = SignerUtilities.GetSigner(sigAlgOid); + } + + try + { + if (calculatedDigest != null) + { + resultDigest = calculatedDigest; + } + else + { + if (content != null) + { + content.Write(new DigestSink(digest)); + } + else if (signedAttributeSet == null) + { + // TODO Get rid of this exception and just treat content==null as empty not missing? + throw new CmsException("data not encapsulated in signature - use detached constructor."); + } + + resultDigest = DigestUtilities.DoFinal(digest); + } + } + catch (IOException e) + { + throw new CmsException("can't process mime object to create signature.", e); + } + + // RFC 3852 11.1 Check the content-type attribute is correct + { + Asn1Object validContentType = GetSingleValuedSignedAttribute( + CmsAttributes.ContentType, "content-type"); + if (validContentType == null) + { + if (!isCounterSignature && signedAttributeSet != null) + throw new CmsException("The content-type attribute type MUST be present whenever signed attributes are present in signed-data"); + } + else + { + if (isCounterSignature) + throw new CmsException("[For counter signatures,] the signedAttributes field MUST NOT contain a content-type attribute"); + + if (!(validContentType is DerObjectIdentifier signedContentType)) + throw new CmsException("content-type attribute value not of ASN.1 type 'OBJECT IDENTIFIER'"); + + if (!signedContentType.Equals(contentType)) + throw new CmsException("content-type attribute value does not match eContentType"); + } + } + + // RFC 3852 11.2 Check the message-digest attribute is correct + { + Asn1Object validMessageDigest = GetSingleValuedSignedAttribute( + CmsAttributes.MessageDigest, "message-digest"); + if (validMessageDigest == null) + { + if (signedAttributeSet != null) + throw new CmsException("the message-digest signed attribute type MUST be present when there are any signed attributes present"); + } + else + { + if (!(validMessageDigest is Asn1OctetString signedMessageDigest)) + throw new CmsException("message-digest attribute value not of ASN.1 type 'OCTET STRING'"); + + if (!Arrays.AreEqual(resultDigest, signedMessageDigest.GetOctets())) + throw new CmsException("message-digest attribute value does not match calculated value"); + } + } + + // RFC 3852 11.4 Validate countersignature attribute(s) + { + Asn1.Cms.AttributeTable signedAttrTable = this.SignedAttributes; + if (signedAttrTable != null + && signedAttrTable.GetAll(CmsAttributes.CounterSignature).Count > 0) + { + throw new CmsException("A countersignature attribute MUST NOT be a signed attribute"); + } + + Asn1.Cms.AttributeTable unsignedAttrTable = this.UnsignedAttributes; + if (unsignedAttrTable != null) + { + foreach (Asn1.Cms.Attribute csAttr in unsignedAttrTable.GetAll(CmsAttributes.CounterSignature)) + { + if (csAttr.AttrValues.Count < 1) + throw new CmsException("A countersignature attribute MUST contain at least one AttributeValue"); + + // Note: We don't recursively validate the countersignature value + } + } + } + + try + { + sig.Init(false, key); + + if (signedAttributeSet == null) + { + if (calculatedDigest != null) + { + if (sig is PssSigner) + { + sig.BlockUpdate(resultDigest, 0, resultDigest.Length); + } + else + { + // need to decrypt signature and check message bytes + return VerifyDigest(resultDigest, key, this.GetSignature()); + } + } + else if (content != null) + { + try + { + // TODO Use raw signature of the hash value instead + content.Write(new SignerSink(sig)); + } + catch (SignatureException e) + { + throw new CmsStreamException("signature problem: " + e); + } + } + } + else + { + byte[] tmp = this.GetEncodedSignedAttributes(); + sig.BlockUpdate(tmp, 0, tmp.Length); + } + + return sig.VerifySignature(this.GetSignature()); + } + catch (InvalidKeyException e) + { + throw new CmsException("key not appropriate to signature in message.", e); + } + catch (IOException e) + { + throw new CmsException("can't process mime object to create signature.", e); + } + catch (SignatureException e) + { + throw new CmsException("invalid signature format in message: " + e.Message, e); + } + } + + private bool IsNull( + Asn1Encodable o) + { + return (o is Asn1Null) || (o == null); + } + + private DigestInfo DerDecode( + byte[] encoding) + { + if (encoding[0] != (int)(Asn1Tags.Constructed | Asn1Tags.Sequence)) + { + throw new IOException("not a digest info object"); + } + + DigestInfo digInfo = DigestInfo.GetInstance(Asn1Object.FromByteArray(encoding)); + + // length check to avoid Bleichenbacher vulnerability + + if (digInfo.GetEncoded().Length != encoding.Length) + { + throw new CmsException("malformed RSA signature"); + } + + return digInfo; + } + + private bool VerifyDigest( + byte[] digest, + AsymmetricKeyParameter key, + byte[] signature) + { + string algorithm = Helper.GetEncryptionAlgName(this.EncryptionAlgOid); + + try + { + if (algorithm.Equals("RSA")) + { + IBufferedCipher c = CmsEnvelopedHelper.Instance.CreateAsymmetricCipher("RSA/ECB/PKCS1Padding"); + + c.Init(false, key); + + byte[] decrypt = c.DoFinal(signature); + + DigestInfo digInfo = DerDecode(decrypt); + + if (!digInfo.AlgorithmID.Algorithm.Equals(digestAlgorithm.Algorithm)) + { + return false; + } + + if (!IsNull(digInfo.AlgorithmID.Parameters)) + { + return false; + } + + byte[] sigHash = digInfo.GetDigest(); + + return Arrays.ConstantTimeAreEqual(digest, sigHash); + } + else if (algorithm.Equals("DSA")) + { + ISigner sig = SignerUtilities.GetSigner("NONEwithDSA"); + + sig.Init(false, key); + + sig.BlockUpdate(digest, 0, digest.Length); + + return sig.VerifySignature(signature); + } + else + { + throw new CmsException("algorithm: " + algorithm + " not supported in base signatures."); + } + } + catch (SecurityUtilityException e) + { + throw e; + } + catch (GeneralSecurityException e) + { + throw new CmsException("Exception processing signature: " + e, e); + } + catch (IOException e) + { + throw new CmsException("Exception decoding signature: " + e, e); + } + } + + /** + * verify that the given public key successfully handles and confirms the + * signature associated with this signer. + */ + public bool Verify( + AsymmetricKeyParameter pubKey) + { + if (pubKey.IsPrivate) + throw new ArgumentException("Expected public key", "pubKey"); + + // Optional, but still need to validate if present + GetSigningTime(); + + return DoVerify(pubKey); + } + + /** + * verify that the given certificate successfully handles and confirms + * the signature associated with this signer and, if a signingTime + * attribute is available, that the certificate was valid at the time the + * signature was generated. + */ + public bool Verify( + X509Certificate cert) + { + Asn1.Cms.Time signingTime = GetSigningTime(); + if (signingTime != null) + { + cert.CheckValidity(signingTime.ToDateTime()); + } + + return DoVerify(cert.GetPublicKey()); + } + + /** + * Return the base ASN.1 CMS structure that this object contains. + * + * @return an object containing a CMS SignerInfo structure. + */ + public SignerInfo ToSignerInfo() + { + return info; + } + + private Asn1Object GetSingleValuedSignedAttribute( + DerObjectIdentifier attrOID, string printableName) + { + + Asn1.Cms.AttributeTable unsignedAttrTable = this.UnsignedAttributes; + if (unsignedAttrTable != null + && unsignedAttrTable.GetAll(attrOID).Count > 0) + { + throw new CmsException("The " + printableName + + " attribute MUST NOT be an unsigned attribute"); + } + + Asn1.Cms.AttributeTable signedAttrTable = this.SignedAttributes; + if (signedAttrTable == null) + { + return null; + } + + Asn1EncodableVector v = signedAttrTable.GetAll(attrOID); + switch (v.Count) + { + case 0: + return null; + case 1: + Asn1.Cms.Attribute t = (Asn1.Cms.Attribute) v[0]; + Asn1Set attrValues = t.AttrValues; + + if (attrValues.Count != 1) + throw new CmsException("A " + printableName + + " attribute MUST have a single attribute value"); + + return attrValues[0].ToAsn1Object(); + default: + throw new CmsException("The SignedAttributes in a signerInfo MUST NOT include multiple instances of the " + + printableName + " attribute"); + } + } + + private Asn1.Cms.Time GetSigningTime() + { + Asn1Object validSigningTime = GetSingleValuedSignedAttribute( + CmsAttributes.SigningTime, "signing-time"); + + if (validSigningTime == null) + return null; + + try + { + return Asn1.Cms.Time.GetInstance(validSigningTime); + } + catch (ArgumentException) + { + throw new CmsException("signing-time attribute value not a valid 'Time' structure"); + } + } + + /** + * Return a signer information object with the passed in unsigned + * attributes replacing the ones that are current associated with + * the object passed in. + * + * @param signerInformation the signerInfo to be used as the basis. + * @param unsignedAttributes the unsigned attributes to add. + * @return a copy of the original SignerInformationObject with the changed attributes. + */ + public static SignerInformation ReplaceUnsignedAttributes( + SignerInformation signerInformation, + Asn1.Cms.AttributeTable unsignedAttributes) + { + SignerInfo sInfo = signerInformation.info; + Asn1Set unsignedAttr = null; + + if (unsignedAttributes != null) + { + unsignedAttr = new DerSet(unsignedAttributes.ToAsn1EncodableVector()); + } + + return new SignerInformation( + new SignerInfo( + sInfo.SignerID, + sInfo.DigestAlgorithm, + sInfo.AuthenticatedAttributes, + sInfo.DigestEncryptionAlgorithm, + sInfo.EncryptedDigest, + unsignedAttr), + signerInformation.contentType, + signerInformation.content, + null); + } + + /** + * Return a signer information object with passed in SignerInformationStore representing counter + * signatures attached as an unsigned attribute. + * + * @param signerInformation the signerInfo to be used as the basis. + * @param counterSigners signer info objects carrying counter signature. + * @return a copy of the original SignerInformationObject with the changed attributes. + */ + public static SignerInformation AddCounterSigners( + SignerInformation signerInformation, + SignerInformationStore counterSigners) + { + // TODO Perform checks from RFC 3852 11.4 + + SignerInfo sInfo = signerInformation.info; + Asn1.Cms.AttributeTable unsignedAttr = signerInformation.UnsignedAttributes; + Asn1EncodableVector v; + + if (unsignedAttr != null) + { + v = unsignedAttr.ToAsn1EncodableVector(); + } + else + { + v = new Asn1EncodableVector(); + } + + Asn1EncodableVector sigs = new Asn1EncodableVector(); + + foreach (SignerInformation sigInf in counterSigners.GetSigners()) + { + sigs.Add(sigInf.ToSignerInfo()); + } + + v.Add(new Asn1.Cms.Attribute(CmsAttributes.CounterSignature, new DerSet(sigs))); + + return new SignerInformation( + new SignerInfo( + sInfo.SignerID, + sInfo.DigestAlgorithm, + sInfo.AuthenticatedAttributes, + sInfo.DigestEncryptionAlgorithm, + sInfo.EncryptedDigest, + new DerSet(v)), + signerInformation.contentType, + signerInformation.content, + null); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs.meta new file mode 100644 index 00000000..9daf63ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d0319ef465c4934fba3e0d76844a54c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs new file mode 100644 index 00000000..eeaf7f88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + public class SignerInformationStore + { + private readonly IList all; + private readonly IDictionary> m_table = + new Dictionary>(); + + /** + * Create a store containing a single SignerInformation object. + * + * @param signerInfo the signer information to contain. + */ + public SignerInformationStore(SignerInformation signerInfo) + { + this.all = new List(1); + this.all.Add(signerInfo); + + SignerID sid = signerInfo.SignerID; + + m_table[sid] = all; + } + + /** + * Create a store containing a collection of SignerInformation objects. + * + * @param signerInfos a collection signer information objects to contain. + */ + public SignerInformationStore(IEnumerable signerInfos) + { + foreach (SignerInformation signer in signerInfos) + { + SignerID sid = signer.SignerID; + + if (!m_table.TryGetValue(sid, out var list)) + { + m_table[sid] = list = new List(1); + } + + list.Add(signer); + } + + this.all = new List(signerInfos); + } + + /** + * Return the first SignerInformation object that matches the + * passed in selector. Null if there are no matches. + * + * @param selector to identify a signer + * @return a single SignerInformation object. Null if none matches. + */ + public SignerInformation GetFirstSigner(SignerID selector) + { + if (m_table.TryGetValue(selector, out var list)) + return list[0]; + + return null; + } + + /// The number of signers in the collection. + public int Count + { + get { return all.Count; } + } + + /// An ICollection of all signers in the collection + public IList GetSigners() + { + return new List(all); + } + + /** + * Return possible empty collection with signers matching the passed in SignerID + * + * @param selector a signer id to select against. + * @return a collection of SignerInformation objects. + */ + public IList GetSigners(SignerID selector) + { + if (m_table.TryGetValue(selector, out var list)) + return new List(list); + + return new List(0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs.meta new file mode 100644 index 00000000..7756f443 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5ba039a9acd935747923420757ec522b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SignerInformationStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs new file mode 100644 index 00000000..22b07d97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms +{ + /** + * Basic generator that just returns a preconstructed attribute table + */ + public class SimpleAttributeTableGenerator + : CmsAttributeTableGenerator + { + private readonly AttributeTable attributes; + + public SimpleAttributeTableGenerator( + AttributeTable attributes) + { + this.attributes = attributes; + } + + public virtual AttributeTable GetAttributes(IDictionary parameters) + { + return attributes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs.meta new file mode 100644 index 00000000..ae8b9a26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 71d80158100e5ec44ae71489e2ea49b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/cms/SimpleAttributeTableGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf.meta new file mode 100644 index 00000000..eb2d1132 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6d5a4558e22771047af6c012a5fb1609 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs new file mode 100644 index 00000000..ef5baac2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + /// + /// Carrier for an authenticator control. + /// + public class AuthenticatorControl + : IControl + { + private static readonly DerObjectIdentifier type = CrmfObjectIdentifiers.id_regCtrl_authenticator; + + private readonly DerUtf8String token; + + /// + /// Basic constructor - build from a UTF-8 string representing the token. + /// + /// UTF-8 string representing the token. + public AuthenticatorControl(DerUtf8String token) + { + this.token = token; + } + + /// + /// Basic constructor - build from a string representing the token. + /// + /// string representing the token. + public AuthenticatorControl(string token) + { + this.token = new DerUtf8String(token); + } + + /// + /// Return the type of this control. + /// + public DerObjectIdentifier Type + { + get { return type; } + } + + /// + /// Return the token associated with this control (a UTF8String). + /// + public Asn1Encodable Value + { + get { return token; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs.meta new file mode 100644 index 00000000..1782d026 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2fc43f51bfdc5fb4cb29c5aadac986ac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/AuthenticatorControl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs new file mode 100644 index 00000000..a36f82ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs @@ -0,0 +1,233 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class CertificateRequestMessage + { + public static readonly int popRaVerified = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.TYPE_RA_VERIFIED; + public static readonly int popSigningKey = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.TYPE_SIGNING_KEY; + public static readonly int popKeyEncipherment = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.TYPE_KEY_ENCIPHERMENT; + public static readonly int popKeyAgreement = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf.ProofOfPossession.TYPE_KEY_AGREEMENT; + + private readonly CertReqMsg certReqMsg; + private readonly Controls controls; + + private static CertReqMsg ParseBytes(byte[] encoding) + { + return CertReqMsg.GetInstance(encoding); + } + + /// + /// Create a CertificateRequestMessage from the passed in bytes. + /// + /// BER/DER encoding of the CertReqMsg structure. + public CertificateRequestMessage(byte[] encoded) + : this(CertReqMsg.GetInstance(encoded)) + { + } + + public CertificateRequestMessage(CertReqMsg certReqMsg) + { + this.certReqMsg = certReqMsg; + this.controls = certReqMsg.CertReq.Controls; + } + + /// + /// Return the underlying ASN.1 object defining this CertificateRequestMessage object. + /// + /// A CertReqMsg + public CertReqMsg ToAsn1Structure() + { + return certReqMsg; + } + + /// + /// Return the certificate template contained in this message. + /// + /// a CertTemplate structure. + public CertTemplate GetCertTemplate() + { + return this.certReqMsg.CertReq.CertTemplate; + } + + /// + /// Return whether or not this request has control values associated with it. + /// + /// true if there are control values present, false otherwise. + public bool HasControls + { + get { return controls != null; } + } + + /// + /// Return whether or not this request has a specific type of control value. + /// + /// the type OID for the control value we are checking for. + /// true if a control value of type is present, false otherwise. + public bool HasControl(DerObjectIdentifier objectIdentifier) + { + return FindControl(objectIdentifier) != null; + } + + /// + /// Return a control value of the specified type. + /// + /// the type OID for the control value we are checking for. + /// the control value if present, null otherwise. + public IControl GetControl(DerObjectIdentifier type) + { + AttributeTypeAndValue found = FindControl(type); + if (found != null) + { + if (found.Type.Equals(CrmfObjectIdentifiers.id_regCtrl_pkiArchiveOptions)) + { + return new PkiArchiveControl(PkiArchiveOptions.GetInstance(found.Value)); + } + + if (found.Type.Equals(CrmfObjectIdentifiers.id_regCtrl_regToken)) + { + return new RegTokenControl(DerUtf8String.GetInstance(found.Value)); + } + + if (found.Type.Equals(CrmfObjectIdentifiers.id_regCtrl_authenticator)) + { + return new AuthenticatorControl(DerUtf8String.GetInstance(found.Value)); + } + } + return null; + } + + public AttributeTypeAndValue FindControl(DerObjectIdentifier type) + { + if (controls == null) + { + return null; + } + + AttributeTypeAndValue[] tAndV = controls.ToAttributeTypeAndValueArray(); + AttributeTypeAndValue found = null; + + for (int i = 0; i < tAndV.Length; i++) + { + if (tAndV[i].Type.Equals(type)) + { + found = tAndV[i]; + break; + } + } + + return found; + } + + /// + /// Return whether or not this request message has a proof-of-possession field in it. + /// + /// true if proof-of-possession is present, false otherwise. + public bool HasProofOfPossession + { + get { return certReqMsg.Popo != null; } + } + + /// + /// Return the type of the proof-of-possession this request message provides. + /// + /// one of: popRaVerified, popSigningKey, popKeyEncipherment, popKeyAgreement + public int ProofOfPossession + { + get { return certReqMsg.Popo.Type; } + } + + /// + /// Return whether or not the proof-of-possession (POP) is of the type popSigningKey and + /// it has a public key MAC associated with it. + /// + /// true if POP is popSigningKey and a PKMAC is present, false otherwise. + public bool HasSigningKeyProofOfPossessionWithPkMac + { + get + { + ProofOfPossession pop = certReqMsg.Popo; + + if (pop.Type == popSigningKey) + { + PopoSigningKey popoSign = PopoSigningKey.GetInstance(pop.Object); + + return popoSign.PoposkInput.PublicKeyMac != null; + } + + return false; + } + } + + /// + /// Return whether or not a signing key proof-of-possession (POP) is valid. + /// + /// a provider that can produce content verifiers for the signature contained in this POP. + /// true if the POP is valid, false otherwise. + /// if there is a problem in verification or content verifier creation. + /// if POP not appropriate. + public bool IsValidSigningKeyPop(IVerifierFactoryProvider verifierProvider) + { + ProofOfPossession pop = certReqMsg.Popo; + if (pop.Type == popSigningKey) + { + PopoSigningKey popoSign = PopoSigningKey.GetInstance(pop.Object); + if (popoSign.PoposkInput != null && popoSign.PoposkInput.PublicKeyMac != null) + { + throw new InvalidOperationException("verification requires password check"); + } + return verifySignature(verifierProvider, popoSign); + } + + throw new InvalidOperationException("not Signing Key type of proof of possession"); + } + + private bool verifySignature(IVerifierFactoryProvider verifierFactoryProvider, PopoSigningKey signKey) + { + IVerifierFactory verifer; + IStreamCalculator calculator; + try + { + verifer = verifierFactoryProvider.CreateVerifierFactory(signKey.AlgorithmIdentifier); + calculator = verifer.CreateCalculator(); + } + catch (Exception ex) + { + throw new CrmfException("unable to create verifier: " + ex.Message, ex); + } + + if (signKey.PoposkInput != null) + { + byte[] b = signKey.GetDerEncoded(); + calculator.Stream.Write(b, 0, b.Length); + } + else + { + byte[] b = certReqMsg.CertReq.GetDerEncoded(); + calculator.Stream.Write(b, 0, b.Length); + } + + IVerifier result = calculator.GetResult(); + + return result.IsVerified(signKey.Signature.GetBytes()); + } + + /// + /// Return the ASN.1 encoding of the certReqMsg we wrap. + /// + /// a byte array containing the binary encoding of the certReqMsg. + public byte[] GetEncoded() + { + return certReqMsg.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs.meta new file mode 100644 index 00000000..ddf8c93f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9e1dcc6feb75e7544a92516cf72eafd1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs new file mode 100644 index 00000000..d9f3addf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs @@ -0,0 +1,269 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class CertificateRequestMessageBuilder + { + private readonly BigInteger _certReqId; + private X509ExtensionsGenerator _extGenerator; + private CertTemplateBuilder _templateBuilder; + private IList m_controls = new List(); + private ISignatureFactory _popSigner; + private PKMacBuilder _pkMacBuilder; + private char[] _password; + private GeneralName _sender; + private int _popoType = ProofOfPossession.TYPE_KEY_ENCIPHERMENT; + private PopoPrivKey _popoPrivKey; + private Asn1Null _popRaVerified; + private PKMacValue _agreeMac; + + public CertificateRequestMessageBuilder(BigInteger certReqId) + { + this._certReqId = certReqId; + this._extGenerator = new X509ExtensionsGenerator(); + this._templateBuilder = new CertTemplateBuilder(); + } + + public CertificateRequestMessageBuilder SetPublicKey(SubjectPublicKeyInfo publicKeyInfo) + { + if (publicKeyInfo != null) + { + _templateBuilder.SetPublicKey(publicKeyInfo); + } + + return this; + } + + public CertificateRequestMessageBuilder SetIssuer(X509Name issuer) + { + if (issuer != null) + { + _templateBuilder.SetIssuer(issuer); + } + + return this; + } + + public CertificateRequestMessageBuilder SetSubject(X509Name subject) + { + if (subject != null) + { + _templateBuilder.SetSubject(subject); + } + + return this; + } + + public CertificateRequestMessageBuilder SetSerialNumber(BigInteger serialNumber) + { + if (serialNumber != null) + { + _templateBuilder.SetSerialNumber(new DerInteger(serialNumber)); + } + + return this; + } + + public CertificateRequestMessageBuilder SetValidity(DateTime? notBefore, DateTime? notAfter) + { + _templateBuilder.SetValidity(new OptionalValidity(CreateTime(notBefore), CreateTime(notAfter))); + return this; + } + + public CertificateRequestMessageBuilder AddExtension(DerObjectIdentifier oid, bool critical, + Asn1Encodable value) + { + _extGenerator.AddExtension(oid, critical, value); + return this; + } + + public CertificateRequestMessageBuilder AddExtension(DerObjectIdentifier oid, bool critical, + byte[] value) + { + _extGenerator.AddExtension(oid, critical, value); + return this; + } + + public CertificateRequestMessageBuilder AddControl(IControl control) + { + m_controls.Add(control); + return this; + } + + public CertificateRequestMessageBuilder SetProofOfPossessionSignKeySigner(ISignatureFactory popoSignatureFactory) + { + if (_popoPrivKey != null || _popRaVerified != null || _agreeMac != null) + { + throw new InvalidOperationException("only one proof of possession is allowed."); + } + + this._popSigner = popoSignatureFactory; + + return this; + } + + public CertificateRequestMessageBuilder SetProofOfPossessionSubsequentMessage(SubsequentMessage msg) + { + if (_popoPrivKey != null || _popRaVerified != null || _agreeMac != null) + { + throw new InvalidOperationException("only one proof of possession is allowed."); + } + + this._popoType = ProofOfPossession.TYPE_KEY_ENCIPHERMENT; + this._popoPrivKey = new PopoPrivKey(msg); + + return this; + } + + + public CertificateRequestMessageBuilder SetProofOfPossessionSubsequentMessage(int type, SubsequentMessage msg) + { + if (_popoPrivKey != null || _popRaVerified != null || _agreeMac != null) + { + throw new InvalidOperationException("only one proof of possession is allowed."); + } + + if (type != ProofOfPossession.TYPE_KEY_ENCIPHERMENT && type != ProofOfPossession.TYPE_KEY_AGREEMENT) + { + throw new ArgumentException("type must be ProofOfPossession.TYPE_KEY_ENCIPHERMENT || ProofOfPossession.TYPE_KEY_AGREEMENT"); + } + + this._popoType = type; + this._popoPrivKey = new PopoPrivKey(msg); + return this; + } + + public CertificateRequestMessageBuilder SetProofOfPossessionAgreeMac(PKMacValue macValue) + { + if (_popSigner != null || _popRaVerified != null || _popoPrivKey != null) + { + throw new InvalidOperationException("only one proof of possession allowed"); + } + + this._agreeMac = macValue; + return this; + } + + public CertificateRequestMessageBuilder SetProofOfPossessionRaVerified() + { + if (_popSigner != null || _popoPrivKey != null) + { + throw new InvalidOperationException("only one proof of possession allowed"); + } + + this._popRaVerified = DerNull.Instance; + + return this; + } + + public CertificateRequestMessageBuilder SetAuthInfoPKMAC(PKMacBuilder pkmacFactory, char[] password) + { + this._pkMacBuilder = pkmacFactory; + this._password = password; + + return this; + } + + public CertificateRequestMessageBuilder SetAuthInfoSender(X509Name sender) + { + return SetAuthInfoSender(new GeneralName(sender)); + } + + public CertificateRequestMessageBuilder SetAuthInfoSender(GeneralName sender) + { + this._sender = sender; + return this; + } + + public CertificateRequestMessage Build() + { + Asn1EncodableVector v = new Asn1EncodableVector(new DerInteger(this._certReqId)); + + if (!this._extGenerator.IsEmpty) + { + this._templateBuilder.SetExtensions(_extGenerator.Generate()); + } + + v.Add(_templateBuilder.Build()); + + if (m_controls.Count > 0) + { + Asn1EncodableVector controlV = new Asn1EncodableVector(); + + foreach (var control in m_controls) + { + controlV.Add(new AttributeTypeAndValue(control.Type, control.Value)); + } + + v.Add(new DerSequence(controlV)); + } + + CertRequest request = CertRequest.GetInstance(new DerSequence(v)); + + v = new Asn1EncodableVector(request); + + if (_popSigner != null) + { + CertTemplate template = request.CertTemplate; + + if (template.Subject == null || template.PublicKey == null) + { + SubjectPublicKeyInfo pubKeyInfo = request.CertTemplate.PublicKey; + + ProofOfPossessionSigningKeyBuilder builder = new ProofOfPossessionSigningKeyBuilder(pubKeyInfo); + + if (_sender != null) + { + builder.SetSender(_sender); + } + else + { + //PKMACValueGenerator pkmacGenerator = new PKMACValueGenerator(_pkmacBuilder); + + builder.SetPublicKeyMac(_pkMacBuilder, _password); + } + + v.Add(new ProofOfPossession(builder.Build(_popSigner))); + } + else + { + ProofOfPossessionSigningKeyBuilder builder = new ProofOfPossessionSigningKeyBuilder(request); + + v.Add(new ProofOfPossession(builder.Build(_popSigner))); + } + } + else if (_popoPrivKey != null) + { + v.Add(new ProofOfPossession(_popoType, _popoPrivKey)); + } + else if (_agreeMac != null) + { + v.Add(new ProofOfPossession(ProofOfPossession.TYPE_KEY_AGREEMENT, + PopoPrivKey.GetInstance(new DerTaggedObject(false, PopoPrivKey.agreeMAC, _agreeMac), true))); + + } + else if (_popRaVerified != null) + { + v.Add(new ProofOfPossession()); + } + + return new CertificateRequestMessage(CertReqMsg.GetInstance(new DerSequence(v))); + } + + private static Time CreateTime(DateTime? dateTime) + { + return dateTime == null ? null : new Time(dateTime.Value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs.meta new file mode 100644 index 00000000..3dc1b0b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c30a75aaaaa5fc24381fe16e163d9af0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CertificateRequestMessageBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs new file mode 100644 index 00000000..f6df059b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + [Serializable] + public class CrmfException + : Exception + { + public CrmfException() + : base() + { + } + + public CrmfException(string message) + : base(message) + { + } + + public CrmfException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CrmfException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs.meta new file mode 100644 index 00000000..ccd92304 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dca4e2ba6c79c444aa8f3589f00c9125 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/CrmfException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs new file mode 100644 index 00000000..60980cbf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class DefaultPKMacPrimitivesProvider + : IPKMacPrimitivesProvider + { + public IDigest CreateDigest(AlgorithmIdentifier digestAlg) + { + return DigestUtilities.GetDigest(digestAlg.Algorithm); + } + + public IMac CreateMac(AlgorithmIdentifier macAlg) + { + return MacUtilities.GetMac(macAlg.Algorithm); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs.meta new file mode 100644 index 00000000..f1074317 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 06b582b434459d242be3875ab28bfc00 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/DefaultPKMacPrimitivesProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs new file mode 100644 index 00000000..d1dfbbd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class EncryptedValueBuilder + { + private readonly IKeyWrapper wrapper; + private readonly ICipherBuilderWithKey encryptor; + private readonly IEncryptedValuePadder padder; + + /// + /// Create a builder that makes EncryptedValue structures. + /// + /// wrapper a wrapper for key used to encrypt the actual data contained in the EncryptedValue. + /// encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue. + /// + public EncryptedValueBuilder(IKeyWrapper wrapper, ICipherBuilderWithKey encryptor) + : this(wrapper, encryptor, null) + { + } + + /// + /// Create a builder that makes EncryptedValue structures with fixed length blocks padded using the passed in padder. + /// + /// a wrapper for key used to encrypt the actual data contained in the EncryptedValue. + /// encryptor an output encryptor to encrypt the actual data contained in the EncryptedValue. + /// padder a padder to ensure that the EncryptedValue created will always be a constant length. + /// + public EncryptedValueBuilder(IKeyWrapper wrapper, ICipherBuilderWithKey encryptor, IEncryptedValuePadder padder) + { + this.wrapper = wrapper; + this.encryptor = encryptor; + this.padder = padder; + } + + /// + /// Build an EncryptedValue structure containing the passed in pass phrase. + /// + /// a revocation pass phrase. + ///an EncryptedValue containing the encrypted pass phrase. + /// + public EncryptedValue Build(char[] revocationPassphrase) + { + return EncryptData(PadData(Strings.ToUtf8ByteArray(revocationPassphrase))); + } + + /// + /// Build an EncryptedValue structure containing the certificate contained in + /// the passed in holder. + /// + /// a holder containing a certificate. + /// an EncryptedValue containing the encrypted certificate. + /// on a failure to encrypt the data, or wrap the symmetric key for this value. + /// + public EncryptedValue Build(X509Certificate holder) + { + try + { + return EncryptData(PadData(holder.GetEncoded())); + } + catch (IOException e) + { + throw new CrmfException("cannot encode certificate: " + e.Message, e); + } + } + + /// + /// Build an EncryptedValue structure containing the private key contained in + /// the passed info structure. + /// + /// a PKCS#8 private key info structure. + /// an EncryptedValue containing an EncryptedPrivateKeyInfo structure. + /// on a failure to encrypt the data, or wrap the symmetric key for this value. + /// + public EncryptedValue Build(PrivateKeyInfo privateKeyInfo) + { + Pkcs8EncryptedPrivateKeyInfoBuilder encInfoBldr = new Pkcs8EncryptedPrivateKeyInfoBuilder(privateKeyInfo); + + AlgorithmIdentifier intendedAlg = privateKeyInfo.PrivateKeyAlgorithm; + AlgorithmIdentifier symmAlg = (AlgorithmIdentifier)encryptor.AlgorithmDetails; + DerBitString encSymmKey; + + try + { + Pkcs8EncryptedPrivateKeyInfo encInfo = encInfoBldr.Build(encryptor); + + encSymmKey = new DerBitString(wrapper.Wrap(((KeyParameter)encryptor.Key).GetKey()).Collect()); + + AlgorithmIdentifier keyAlg = (AlgorithmIdentifier)wrapper.AlgorithmDetails; + Asn1OctetString valueHint = null; + + return new EncryptedValue(intendedAlg, symmAlg, encSymmKey, keyAlg, valueHint, new DerBitString(encInfo.GetEncryptedData())); + } + catch (Exception e) + { + throw new CrmfException("cannot wrap key: " + e.Message, e); + } + } + + private EncryptedValue EncryptData(byte[] data) + { + MemoryOutputStream bOut = new MemoryOutputStream(); + var cipher = encryptor.BuildCipher(bOut); + + try + { + using (var eOut = cipher.Stream) + { + eOut.Write(data, 0, data.Length); + } + } + catch (IOException e) + { + throw new CrmfException("cannot process data: " + e.Message, e); + } + + AlgorithmIdentifier intendedAlg = null; + AlgorithmIdentifier symmAlg = (AlgorithmIdentifier)encryptor.AlgorithmDetails; + + DerBitString encSymmKey; + try + { + encSymmKey = new DerBitString(wrapper.Wrap(((KeyParameter)encryptor.Key).GetKey()).Collect()); + } + catch (Exception e) + { + throw new CrmfException("cannot wrap key: " + e.Message, e); + } + + AlgorithmIdentifier keyAlg = (AlgorithmIdentifier)wrapper.AlgorithmDetails; + Asn1OctetString valueHint = null; + DerBitString encValue = new DerBitString(bOut.ToArray()); + + return new EncryptedValue(intendedAlg, symmAlg, encSymmKey, keyAlg, valueHint, encValue); + } + + private byte[] PadData(byte[] data) + { + if (padder != null) + { + return padder.GetPaddedData(data); + } + + return data; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs.meta new file mode 100644 index 00000000..fd7d081f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 22f87f9c3421c2a47886e2acdf796e02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/EncryptedValueBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs new file mode 100644 index 00000000..28bfaa86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + /// + /// Generic interface for a CertificateRequestMessage control value. + /// + public interface IControl + { + /// + /// Return the type of this control. + /// + DerObjectIdentifier Type { get; } + + /// + /// Return the value contained in this control object. + /// + Asn1Encodable Value { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs.meta new file mode 100644 index 00000000..20feda82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b00034a3dd18dc442824e896efb1555b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IControl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs new file mode 100644 index 00000000..5e16f911 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + /// + /// An encrypted value padder is used to make sure that prior to a value been + /// encrypted the data is padded to a standard length. + /// + public interface IEncryptedValuePadder + { + /// + /// Return a byte array of padded data. + /// + /// the data to be padded. + /// a padded byte array containing data. + /// + byte[] GetPaddedData(byte[] data); + + /// + /// Return a byte array of with padding removed. + /// + /// the data to be padded. + /// an array containing the original unpadded data. + /// + byte[] GetUnpaddedData(byte[] paddedData); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs.meta new file mode 100644 index 00000000..7daddb48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f415ed6c0ecac59408387f5b468b9720 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IEncryptedValuePadder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs new file mode 100644 index 00000000..7c0ccaf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public interface IPKMacPrimitivesProvider + { + IDigest CreateDigest(AlgorithmIdentifier digestAlg); + + IMac CreateMac(AlgorithmIdentifier macAlg); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs.meta new file mode 100644 index 00000000..e0f6f95d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6423ca87a6962d4992afd25d7477f8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/IPKMacPrimitivesProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs new file mode 100644 index 00000000..a874631f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs @@ -0,0 +1,290 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Iana; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + internal class PKMacStreamCalculator + : IStreamCalculator + { + private readonly MacSink _stream; + + public PKMacStreamCalculator(IMac mac) + { + _stream = new MacSink(mac); + } + + public Stream Stream + { + get { return _stream; } + } + + public DefaultPKMacResult GetResult() + { + return new DefaultPKMacResult(_stream.Mac); + } + } + + internal class PKMacFactory + : IMacFactory + { + protected readonly PbmParameter parameters; + private readonly byte[] key; + + public PKMacFactory(byte[] key, PbmParameter parameters) + { + this.key = Arrays.Clone(key); + this.parameters = parameters; + } + + public virtual object AlgorithmDetails + { + get { return new AlgorithmIdentifier(CmpObjectIdentifiers.passwordBasedMac, parameters); } + } + + public virtual IStreamCalculator CreateCalculator() + { + IMac mac = MacUtilities.GetMac(parameters.Mac.Algorithm); + mac.Init(new KeyParameter(key)); + return new PKMacStreamCalculator(mac); + } + } + + internal class DefaultPKMacResult + : IBlockResult + { + private readonly IMac mac; + + public DefaultPKMacResult(IMac mac) + { + this.mac = mac; + } + + public byte[] Collect() + { + byte[] res = new byte[mac.GetMacSize()]; + mac.DoFinal(res, 0); + return res; + } + + public int Collect(byte[] sig, int sigOff) + { + byte[] signature = Collect(); + signature.CopyTo(sig, sigOff); + return signature.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Collect(Span destination) + { + byte[] result = Collect(); + result.CopyTo(destination); + return result.Length; + } +#endif + } + + public class PKMacBuilder + { + private AlgorithmIdentifier owf; + private AlgorithmIdentifier mac; + private IPKMacPrimitivesProvider provider; + private SecureRandom random; + private PbmParameter parameters; + private int iterationCount; + private int saltLength = 20; + private int maxIterations; + + /// + /// Default, IterationCount = 1000, OIW=IdSha1, Mac=HmacSHA1 + /// + public PKMacBuilder() : + this(new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1), 1000, new AlgorithmIdentifier(IanaObjectIdentifiers.HmacSha1, DerNull.Instance), new DefaultPKMacPrimitivesProvider()) + { + } + + /// + /// Defaults with IPKMacPrimitivesProvider + /// + /// + public PKMacBuilder(IPKMacPrimitivesProvider provider) : + this(new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1), 1000, new AlgorithmIdentifier(IanaObjectIdentifiers.HmacSha1, DerNull.Instance), provider) + { + } + + /// + /// Create. + /// + /// The Mac provider + /// Digest Algorithm Id + /// Mac Algorithm Id + public PKMacBuilder(IPKMacPrimitivesProvider provider, AlgorithmIdentifier digestAlgorithmIdentifier, AlgorithmIdentifier macAlgorithmIdentifier) : + this(digestAlgorithmIdentifier, 1000, macAlgorithmIdentifier, provider) + { + } + + /// + /// Create a PKMAC builder enforcing a ceiling on the maximum iteration count. + /// + /// supporting calculator + /// max allowable value for iteration count. + public PKMacBuilder(IPKMacPrimitivesProvider provider, int maxIterations) + { + this.provider = provider; + this.maxIterations = maxIterations; + } + + private PKMacBuilder(AlgorithmIdentifier digestAlgorithmIdentifier, int iterationCount, AlgorithmIdentifier macAlgorithmIdentifier, IPKMacPrimitivesProvider provider) + { + this.iterationCount = iterationCount; + this.mac = macAlgorithmIdentifier; + this.owf = digestAlgorithmIdentifier; + this.provider = provider; + } + + /** + * Set the salt length in octets. + * + * @param saltLength length in octets of the salt to be generated. + * @return the generator + */ + public PKMacBuilder SetSaltLength(int saltLength) + { + if (saltLength < 8) + throw new ArgumentException("salt length must be at least 8 bytes"); + + this.saltLength = saltLength; + + return this; + } + + /// + /// Set the iteration count. + /// + /// the iteration count. + /// this + /// if iteration count is less than 100 + public PKMacBuilder SetIterationCount(int iterationCount) + { + if (iterationCount < 100) + throw new ArgumentException("iteration count must be at least 100"); + + CheckIterationCountCeiling(iterationCount); + + this.iterationCount = iterationCount; + + return this; + } + + /// + /// Set PbmParameters + /// + /// The parameters. + /// this + public PKMacBuilder SetParameters(PbmParameter parameters) + { + CheckIterationCountCeiling(parameters.IterationCount.IntValueExact); + + this.parameters = parameters; + + return this; + } + + /// + /// The Secure random + /// + /// The random. + /// this + public PKMacBuilder SetSecureRandom(SecureRandom random) + { + this.random = random; + + return this; + } + + /// + /// Build an IMacFactory. + /// + /// The password. + /// IMacFactory + public IMacFactory Build(char[] password) + { + if (parameters != null) + return GenCalculator(parameters, password); + + byte[] salt = new byte[saltLength]; + + this.random = CryptoServicesRegistrar.GetSecureRandom(random); + + random.NextBytes(salt); + + return GenCalculator(new PbmParameter(salt, owf, iterationCount, mac), password); + } + + private void CheckIterationCountCeiling(int iterationCount) + { + if (maxIterations > 0 && iterationCount > maxIterations) + throw new ArgumentException("iteration count exceeds limit (" + iterationCount + " > " + maxIterations + ")"); + } + + private IMacFactory GenCalculator(PbmParameter parameters, char[] password) + { + // From RFC 4211 + // + // 1. Generate a random salt value S + // + // 2. Append the salt to the pw. K = pw || salt. + // + // 3. Hash the value of K. K = HASH(K) + // + // 4. Iter = Iter - 1. If Iter is greater than zero. Goto step 3. + // + // 5. Compute an HMAC as documented in [HMAC]. + // + // MAC = HASH( K XOR opad, HASH( K XOR ipad, data) ) + // + // Where opad and ipad are defined in [HMAC]. + byte[] pw = Strings.ToUtf8ByteArray(password); + byte[] salt = parameters.Salt.GetOctets(); + byte[] K = new byte[pw.Length + salt.Length]; + + Array.Copy(pw, 0, K, 0, pw.Length); + Array.Copy(salt, 0, K, pw.Length, salt.Length); + + IDigest digest = provider.CreateDigest(parameters.Owf); + + int iter = parameters.IterationCount.IntValueExact; + + digest.BlockUpdate(K, 0, K.Length); + + K = new byte[digest.GetDigestSize()]; + + digest.DoFinal(K, 0); + + while (--iter > 0) + { + digest.BlockUpdate(K, 0, K.Length); + + digest.DoFinal(K, 0); + } + + byte[] key = K; + + return new PKMacFactory(key, parameters); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs.meta new file mode 100644 index 00000000..5f66cd82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 37d27ecdc931b7444b4c863807b15daf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PKMacBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs new file mode 100644 index 00000000..c8e76adb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class PkiArchiveControl + : IControl + { + public static readonly int encryptedPrivKey = PkiArchiveOptions.encryptedPrivKey; + public static readonly int keyGenParameters = PkiArchiveOptions.keyGenParameters; + public static readonly int archiveRemGenPrivKey = PkiArchiveOptions.archiveRemGenPrivKey; + + private static readonly DerObjectIdentifier type = CrmfObjectIdentifiers.id_regCtrl_pkiArchiveOptions; + + private readonly PkiArchiveOptions pkiArchiveOptions; + + /// + /// Basic constructor - build from an PKIArchiveOptions structure. + /// + /// the ASN.1 structure that will underlie this control. + public PkiArchiveControl(PkiArchiveOptions pkiArchiveOptions) + { + this.pkiArchiveOptions = pkiArchiveOptions; + } + + /// + /// Return the type of this control. + /// + /// CRMFObjectIdentifiers.id_regCtrl_pkiArchiveOptions + public DerObjectIdentifier Type + { + + get { return type; } + } + + /// + /// Return the underlying ASN.1 object. + /// + /// a PKIArchiveOptions structure. + public Asn1Encodable Value + { + get { return pkiArchiveOptions; } + } + + /// + /// Return the archive control type, one of: encryptedPrivKey,keyGenParameters,or archiveRemGenPrivKey. + /// + /// the archive control type. + public int ArchiveType + { + get { return pkiArchiveOptions.Type; } + } + + /// + /// Return whether this control contains enveloped data. + /// + /// true if the control contains enveloped data, false otherwise. + public bool EnvelopedData + { + get + { + EncryptedKey encKey = EncryptedKey.GetInstance(pkiArchiveOptions.Value); + return !encKey.IsEncryptedValue; + } + } + + /// + /// Return the enveloped data structure contained in this control. + /// + /// a CMSEnvelopedData object. + public CmsEnvelopedData GetEnvelopedData() + { + try + { + EncryptedKey encKey = EncryptedKey.GetInstance(pkiArchiveOptions.Value); + EnvelopedData data = Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms.EnvelopedData.GetInstance(encKey.Value); + + return new CmsEnvelopedData(new ContentInfo(CmsObjectIdentifiers.EnvelopedData, data)); + } + catch (CmsException e) + { + throw new CrmfException("CMS parsing error: " + e.Message, e); + } + catch (Exception e) + { + throw new CrmfException("CRMF parsing error: " + e.Message, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs.meta new file mode 100644 index 00000000..a7c21e9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 21ea31839bba51c44b662887ebd18a29 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs new file mode 100644 index 00000000..9b7b6376 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class PkiArchiveControlBuilder + { + private CmsEnvelopedDataGenerator envGen; + private CmsProcessableByteArray keyContent; + + /// + ///Basic constructor - specify the contents of the PKIArchiveControl structure. + /// + /// the private key to be archived. + /// the general name to be associated with the private key. + /// + public PkiArchiveControlBuilder(PrivateKeyInfo privateKeyInfo, GeneralName generalName) + { + EncKeyWithID encKeyWithID = new EncKeyWithID(privateKeyInfo, generalName); + + try + { + this.keyContent = new CmsProcessableByteArray(CrmfObjectIdentifiers.id_ct_encKeyWithID, encKeyWithID.GetEncoded()); + } + catch (IOException e) + { + throw new InvalidOperationException("unable to encode key and general name info", e); + } + + this.envGen = new CmsEnvelopedDataGenerator(); + } + + ///Add a recipient generator to this control. + /// recipient generator created for a specific recipient. + ///this builder object. + public PkiArchiveControlBuilder AddRecipientGenerator(RecipientInfoGenerator recipientGen) + { + envGen.AddRecipientInfoGenerator(recipientGen); + return this; + } + + /// Build the PKIArchiveControl using the passed in encryptor to encrypt its contents. + /// a suitable content encryptor. + /// a PKIArchiveControl object. + public PkiArchiveControl Build(ICipherBuilderWithKey contentEncryptor) + { + CmsEnvelopedData envContent = envGen.Generate(keyContent, contentEncryptor); + EnvelopedData envD = EnvelopedData.GetInstance(envContent.ContentInfo.Content); + return new PkiArchiveControl(new PkiArchiveOptions(new EncryptedKey(envD))); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs.meta new file mode 100644 index 00000000..8a97ba1c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: da6ebcc18775261429dbb617bfd159f9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/PkiArchiveControlBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs new file mode 100644 index 00000000..42045485 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class ProofOfPossessionSigningKeyBuilder + { + private CertRequest _certRequest; + private SubjectPublicKeyInfo _pubKeyInfo; + private GeneralName _name; + private PKMacValue _publicKeyMAC; + + public ProofOfPossessionSigningKeyBuilder(CertRequest certRequest) + { + this._certRequest = certRequest; + } + + public ProofOfPossessionSigningKeyBuilder(SubjectPublicKeyInfo pubKeyInfo) + { + this._pubKeyInfo = pubKeyInfo; + } + + public ProofOfPossessionSigningKeyBuilder SetSender(GeneralName name) + { + this._name = name; + + return this; + } + + public ProofOfPossessionSigningKeyBuilder SetPublicKeyMac(PKMacBuilder generator, char[] password) + { + IMacFactory fact = generator.Build(password); + + byte[] d = _pubKeyInfo.GetDerEncoded(); + + IStreamCalculator calc = fact.CreateCalculator(); + using (var stream = calc.Stream) + { + stream.Write(d, 0, d.Length); + } + + this._publicKeyMAC = new PKMacValue( + (AlgorithmIdentifier)fact.AlgorithmDetails, + new DerBitString(calc.GetResult().Collect())); + + return this; + } + + public PopoSigningKey Build(ISignatureFactory signer) + { + if (_name != null && _publicKeyMAC != null) + { + throw new InvalidOperationException("name and publicKeyMAC cannot both be set."); + } + + PopoSigningKeyInput popo; + + IStreamCalculator calc = signer.CreateCalculator(); + using (Stream sigStream = calc.Stream) + { + if (_certRequest != null) + { + popo = null; + _certRequest.EncodeTo(sigStream, Asn1Encodable.Der); + } + else if (_name != null) + { + popo = new PopoSigningKeyInput(_name, _pubKeyInfo); + popo.EncodeTo(sigStream, Asn1Encodable.Der); + } + else + { + popo = new PopoSigningKeyInput(_publicKeyMAC, _pubKeyInfo); + popo.EncodeTo(sigStream, Asn1Encodable.Der); + } + } + + var signature = calc.GetResult().Collect(); + + return new PopoSigningKey(popo, (AlgorithmIdentifier)signer.AlgorithmDetails, new DerBitString(signature)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs.meta new file mode 100644 index 00000000..1dc2bc19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e7a25c78cc8b8341a7f836c8b1c7bb7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/ProofOfPossessionSigningKeyBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs new file mode 100644 index 00000000..9bd7fd00 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Crmf; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crmf +{ + public class RegTokenControl + : IControl + { + private static readonly DerObjectIdentifier type = CrmfObjectIdentifiers.id_regCtrl_regToken; + + private readonly DerUtf8String token; + + /// + /// Basic constructor - build from a UTF-8 string representing the token. + /// + /// UTF-8 string representing the token. + public RegTokenControl(DerUtf8String token) + { + this.token = token; + } + + /// + /// Basic constructor - build from a string representing the token. + /// + /// string representing the token. + public RegTokenControl(string token) + { + this.token = new DerUtf8String(token); + } + + /// + /// Return the type of this control. + /// + /// CRMFObjectIdentifiers.id_regCtrl_regToken + public DerObjectIdentifier Type + { + get { return type; } + } + + /// + /// Return the token associated with this control (a UTF8String). + /// + /// a UTF8String. + public Asn1Encodable Value + { + get { return token; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs.meta new file mode 100644 index 00000000..224fba3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 01a298ff8549cdc49846aeb52a678a3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crmf/RegTokenControl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto.meta new file mode 100644 index 00000000..34088a20 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c08a97b917fc6bf4ba9ca54bcad16806 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs new file mode 100644 index 00000000..19c598eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public static class AesUtilities + { + public static IBlockCipher CreateEngine() + { +#if NETCOREAPP3_0_OR_GREATER + if (AesEngine_X86.IsSupported) + return new AesEngine_X86(); +#endif + + return new AesEngine(); + } + +#if NETCOREAPP3_0_OR_GREATER + public static bool IsHardwareAccelerated => AesEngine_X86.IsSupported; +#else + public static bool IsHardwareAccelerated => false; +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs.meta new file mode 100644 index 00000000..0ae6bb52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 39e4a36182134e84c93f2cddf6bae8b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AesUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs new file mode 100644 index 00000000..e7657b36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * a holding class for public/private parameter pairs. + */ + public class AsymmetricCipherKeyPair + { + private readonly AsymmetricKeyParameter publicParameter; + private readonly AsymmetricKeyParameter privateParameter; + + /** + * basic constructor. + * + * @param publicParam a public key parameters object. + * @param privateParam the corresponding private key parameters. + */ + public AsymmetricCipherKeyPair( + AsymmetricKeyParameter publicParameter, + AsymmetricKeyParameter privateParameter) + { + if (publicParameter.IsPrivate) + throw new ArgumentException("Expected a public key", "publicParameter"); + if (!privateParameter.IsPrivate) + throw new ArgumentException("Expected a private key", "privateParameter"); + + this.publicParameter = publicParameter; + this.privateParameter = privateParameter; + } + + /** + * return the public key parameters. + * + * @return the public key parameters. + */ + public AsymmetricKeyParameter Public + { + get { return publicParameter; } + } + + /** + * return the private key parameters. + * + * @return the private key parameters. + */ + public AsymmetricKeyParameter Private + { + get { return privateParameter; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs.meta new file mode 100644 index 00000000..24390448 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7e9f77dd7bb2c8a4da52acbc1b27e58c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricCipherKeyPair.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs new file mode 100644 index 00000000..9fa8b8ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public abstract class AsymmetricKeyParameter + : ICipherParameters + { + private readonly bool privateKey; + + protected AsymmetricKeyParameter( + bool privateKey) + { + this.privateKey = privateKey; + } + + public bool IsPrivate + { + get { return privateKey; } + } + + public override bool Equals( + object obj) + { + AsymmetricKeyParameter other = obj as AsymmetricKeyParameter; + + if (other == null) + { + return false; + } + + return Equals(other); + } + + protected bool Equals( + AsymmetricKeyParameter other) + { + return privateKey == other.privateKey; + } + + public override int GetHashCode() + { + return privateKey.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs.meta new file mode 100644 index 00000000..0ef4315a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1bb84d19520655641ab21e0b05b78a42 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/AsymmetricKeyParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs new file mode 100644 index 00000000..6295a590 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs @@ -0,0 +1,276 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * The AEAD block ciphers already handle buffering internally, so this class + * just takes care of implementing IBufferedCipher methods. + */ + public class BufferedAeadBlockCipher + : BufferedCipherBase + { + private readonly IAeadBlockCipher cipher; + + public BufferedAeadBlockCipher( + IAeadBlockCipher cipher) + { + if (cipher == null) + throw new ArgumentNullException("cipher"); + + this.cipher = cipher; + } + + public override string AlgorithmName + { + get { return cipher.AlgorithmName; } + } + + /** + * initialise the cipher. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public override void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + cipher.Init(forEncryption, parameters); + } + + /** + * return the blocksize for the underlying cipher. + * + * @return the blocksize for the underlying cipher. + */ + public override int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + /** + * return the size of the output buffer required for an update + * an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update + * with len bytes of input. + */ + public override int GetUpdateOutputSize( + int length) + { + return cipher.GetUpdateOutputSize(length); + } + + /** + * return the size of the output buffer required for an update plus a + * doFinal with an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update and doFinal + * with len bytes of input. + */ + public override int GetOutputSize( + int length) + { + return cipher.GetOutputSize(length); + } + + /** + * process a single byte, producing an output block if necessary. + * + * @param in the input byte. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessByte(byte input, byte[] output, int outOff) + { + return cipher.ProcessByte(input, output, outOff); + } + + public override byte[] ProcessByte( + byte input) + { + int outLength = GetUpdateOutputSize(1); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessByte(input, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + return cipher.ProcessByte(input, output); + } +#endif + + public override byte[] ProcessBytes( + byte[] input, + int inOff, + int length) + { + if (input == null) + throw new ArgumentNullException("input"); + if (length < 1) + return null; + + int outLength = GetUpdateOutputSize(length); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessBytes(input, inOff, length, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + /** + * process an array of bytes, producing output if necessary. + * + * @param in the input byte array. + * @param inOff the offset at which the input data starts. + * @param len the number of bytes to be copied out of the input array. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessBytes( + byte[] input, + int inOff, + int length, + byte[] output, + int outOff) + { + return cipher.ProcessBytes(input, inOff, length, output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + return cipher.ProcessBytes(input, output); + } +#endif + + public override byte[] DoFinal() + { + byte[] outBytes = new byte[GetOutputSize(0)]; + + int pos = DoFinal(outBytes, 0); + + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + public override byte[] DoFinal( + byte[] input, + int inOff, + int inLen) + { + if (input == null) + throw new ArgumentNullException("input"); + + byte[] outBytes = new byte[GetOutputSize(inLen)]; + + int pos = (inLen > 0) + ? ProcessBytes(input, inOff, inLen, outBytes, 0) + : 0; + + pos += DoFinal(outBytes, pos); + + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + /** + * Process the last block in the buffer. + * + * @param out the array the block currently being held is copied into. + * @param outOff the offset at which the copying starts. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there is insufficient space in out for + * the output, or the input is not block size aligned and should be. + * @exception InvalidOperationException if the underlying cipher is not + * initialised. + * @exception InvalidCipherTextException if padding is expected and not found. + * @exception DataLengthException if the input is not block size + * aligned. + */ + public override int DoFinal( + byte[] output, + int outOff) + { + return cipher.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + return cipher.DoFinal(output); + } + + public override int DoFinal(ReadOnlySpan input, Span output) + { + int len = cipher.ProcessBytes(input, output); + len += cipher.DoFinal(output[len..]); + return len; + } +#endif + + /** + * Reset the buffer and cipher. After resetting the object is in the same + * state as it was after the last init (if there was one). + */ + public override void Reset() + { + cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs.meta new file mode 100644 index 00000000..14b2e3ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 503b54f1dbdc4e047a3d79a588191e10 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs new file mode 100644 index 00000000..54872d70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs @@ -0,0 +1,275 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * The AEAD ciphers already handle buffering internally, so this class + * just takes care of implementing IBufferedCipher methods. + */ + public class BufferedAeadCipher + : BufferedCipherBase + { + private readonly IAeadCipher cipher; + + public BufferedAeadCipher(IAeadCipher cipher) + { + if (cipher == null) + throw new ArgumentNullException("cipher"); + + this.cipher = cipher; + } + + public override string AlgorithmName + { + get { return cipher.AlgorithmName; } + } + + /** + * initialise the cipher. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public override void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom)parameters).Parameters; + } + + cipher.Init(forEncryption, parameters); + } + + /** + * return the blocksize for the underlying cipher. + * + * @return the blocksize for the underlying cipher. + */ + public override int GetBlockSize() + { + return 0; + } + + /** + * return the size of the output buffer required for an update + * an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update + * with len bytes of input. + */ + public override int GetUpdateOutputSize( + int length) + { + return cipher.GetUpdateOutputSize(length); + } + + /** + * return the size of the output buffer required for an update plus a + * doFinal with an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update and doFinal + * with len bytes of input. + */ + public override int GetOutputSize( + int length) + { + return cipher.GetOutputSize(length); + } + + /** + * process a single byte, producing an output block if necessary. + * + * @param in the input byte. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessByte(byte input, byte[] output, int outOff) + { + return cipher.ProcessByte(input, output, outOff); + } + + public override byte[] ProcessByte( + byte input) + { + int outLength = GetUpdateOutputSize(1); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessByte(input, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + return cipher.ProcessByte(input, output); + } +#endif + + public override byte[] ProcessBytes( + byte[] input, + int inOff, + int length) + { + if (input == null) + throw new ArgumentNullException("input"); + if (length < 1) + return null; + + int outLength = GetUpdateOutputSize(length); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessBytes(input, inOff, length, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + /** + * process an array of bytes, producing output if necessary. + * + * @param in the input byte array. + * @param inOff the offset at which the input data starts. + * @param len the number of bytes to be copied out of the input array. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessBytes( + byte[] input, + int inOff, + int length, + byte[] output, + int outOff) + { + return cipher.ProcessBytes(input, inOff, length, output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + return cipher.ProcessBytes(input, output); + } +#endif + + public override byte[] DoFinal() + { + byte[] outBytes = new byte[GetOutputSize(0)]; + + int pos = DoFinal(outBytes, 0); + + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + public override byte[] DoFinal( + byte[] input, + int inOff, + int inLen) + { + if (input == null) + throw new ArgumentNullException("input"); + + byte[] outBytes = new byte[GetOutputSize(inLen)]; + + int pos = (inLen > 0) + ? ProcessBytes(input, inOff, inLen, outBytes, 0) + : 0; + + pos += DoFinal(outBytes, pos); + + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + /** + * Process the last block in the buffer. + * + * @param out the array the block currently being held is copied into. + * @param outOff the offset at which the copying starts. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there is insufficient space in out for + * the output, or the input is not block size aligned and should be. + * @exception InvalidOperationException if the underlying cipher is not + * initialised. + * @exception InvalidCipherTextException if padding is expected and not found. + * @exception DataLengthException if the input is not block size + * aligned. + */ + public override int DoFinal( + byte[] output, + int outOff) + { + return cipher.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + return cipher.DoFinal(output); + } + + public override int DoFinal(ReadOnlySpan input, Span output) + { + int len = cipher.ProcessBytes(input, output); + len += cipher.DoFinal(output[len..]); + return len; + } +#endif + + /** + * Reset the buffer and cipher. After resetting the object is in the same + * state as it was after the last init (if there was one). + */ + public override void Reset() + { + cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs.meta new file mode 100644 index 00000000..1ccfd120 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9cbe18fb27e3c2d4ba5f8d79a74d5d59 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAeadCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs new file mode 100644 index 00000000..31c42845 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs @@ -0,0 +1,201 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * a buffer wrapper for an asymmetric block cipher, allowing input + * to be accumulated in a piecemeal fashion until final processing. + */ + public class BufferedAsymmetricBlockCipher + : BufferedCipherBase + { + private readonly IAsymmetricBlockCipher cipher; + + private byte[] buffer; + private int bufOff; + + /** + * base constructor. + * + * @param cipher the cipher this buffering object wraps. + */ + public BufferedAsymmetricBlockCipher( + IAsymmetricBlockCipher cipher) + { + this.cipher = cipher; + } + + /** + * return the amount of data sitting in the buffer. + * + * @return the amount of data sitting in the buffer. + */ + internal int GetBufferPosition() + { + return bufOff; + } + + public override string AlgorithmName + { + get { return cipher.AlgorithmName; } + } + + public override int GetBlockSize() + { + return cipher.GetInputBlockSize(); + } + + public override int GetOutputSize( + int length) + { + return cipher.GetOutputBlockSize(); + } + + public override int GetUpdateOutputSize( + int length) + { + return 0; + } + + /** + * initialise the buffer and the underlying cipher. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + */ + public override void Init( + bool forEncryption, + ICipherParameters parameters) + { + Reset(); + + cipher.Init(forEncryption, parameters); + + // + // we allow for an extra byte where people are using their own padding + // mechanisms on a raw cipher. + // + this.buffer = new byte[cipher.GetInputBlockSize() + (forEncryption ? 1 : 0)]; + this.bufOff = 0; + } + + public override byte[] ProcessByte( + byte input) + { + if (bufOff >= buffer.Length) + throw new DataLengthException("attempt to process message too long for cipher"); + + buffer[bufOff++] = input; + return null; + } + + public override int ProcessByte(byte input, byte[] output, int outOff) + { + if (bufOff >= buffer.Length) + throw new DataLengthException("attempt to process message too long for cipher"); + + buffer[bufOff++] = input; + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + if (bufOff >= buffer.Length) + throw new DataLengthException("attempt to process message too long for cipher"); + + buffer[bufOff++] = input; + return 0; + } +#endif + + public override byte[] ProcessBytes( + byte[] input, + int inOff, + int length) + { + if (length < 1) + return null; + + if (input == null) + throw new ArgumentNullException("input"); + if (bufOff + length > buffer.Length) + throw new DataLengthException("attempt to process message too long for cipher"); + + Array.Copy(input, inOff, buffer, bufOff, length); + bufOff += length; + return null; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + Check.DataLength(input, buffer.Length - bufOff, "attempt to process message too long for cipher"); + + input.CopyTo(buffer.AsSpan(bufOff)); + bufOff += input.Length; + return 0; + } +#endif + + /** + * process the contents of the buffer using the underlying + * cipher. + * + * @return the result of the encryption/decryption process on the + * buffer. + * @exception InvalidCipherTextException if we are given a garbage block. + */ + public override byte[] DoFinal() + { + byte[] outBytes = bufOff > 0 + ? cipher.ProcessBlock(buffer, 0, bufOff) + : EmptyBuffer; + + Reset(); + + return outBytes; + } + + public override byte[] DoFinal( + byte[] input, + int inOff, + int length) + { + ProcessBytes(input, inOff, length); + return DoFinal(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + int result = 0; + if (bufOff > 0) + { + byte[] outBytes = cipher.ProcessBlock(buffer, 0, bufOff); + outBytes.CopyTo(output); + result = outBytes.Length; + } + + Reset(); + + return result; + } +#endif + + /// Reset the buffer + public override void Reset() + { + if (buffer != null) + { + Array.Clear(buffer, 0, buffer.Length); + bufOff = 0; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs.meta new file mode 100644 index 00000000..8822aa33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 54bb87203f6dea54bb247266d2d20fa2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedAsymmetricBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs new file mode 100644 index 00000000..e04456d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs @@ -0,0 +1,425 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * A wrapper class that allows block ciphers to be used to process data in + * a piecemeal fashion. The BufferedBlockCipher outputs a block only when the + * buffer is full and more data is being added, or on a doFinal. + *

+ * Note: in the case where the underlying cipher is either a CFB cipher or an + * OFB one the last block may not be a multiple of the block size. + *

+ */ + public class BufferedBlockCipher + : BufferedCipherBase + { + internal byte[] buf; + internal int bufOff; + internal bool forEncryption; + internal IBlockCipherMode m_cipherMode; + + /** + * constructor for subclasses + */ + protected BufferedBlockCipher() + { + } + + public BufferedBlockCipher(IBlockCipher cipher) + : this(EcbBlockCipher.GetBlockCipherMode(cipher)) + { + } + + /** + * Create a buffered block cipher without padding. + * + * @param cipher the underlying block cipher this buffering object wraps. + * false otherwise. + */ + public BufferedBlockCipher(IBlockCipherMode cipherMode) + { + if (cipherMode == null) + throw new ArgumentNullException(nameof(cipherMode)); + + m_cipherMode = cipherMode; + buf = new byte[cipherMode.GetBlockSize()]; + bufOff = 0; + } + + public override string AlgorithmName + { + get { return m_cipherMode.AlgorithmName; } + } + + /** + * initialise the cipher. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + // Note: This doubles as the Init in the event that this cipher is being used as an IWrapper + public override void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + if (parameters is ParametersWithRandom withRandom) + { + parameters = withRandom.Parameters; + } + + Reset(); + + m_cipherMode.Init(forEncryption, parameters); + } + + /** + * return the blocksize for the underlying cipher. + * + * @return the blocksize for the underlying cipher. + */ + public override int GetBlockSize() + { + return m_cipherMode.GetBlockSize(); + } + + /** + * return the size of the output buffer required for an update + * an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update + * with len bytes of input. + */ + public override int GetUpdateOutputSize(int length) + { + int total = length + bufOff; + int leftOver = total % buf.Length; + return total - leftOver; + } + + /** + * return the size of the output buffer required for an update plus a + * doFinal with an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update and doFinal + * with len bytes of input. + */ + public override int GetOutputSize(int length) + { + // Note: Can assume IsPartialBlockOkay is true for purposes of this calculation + return length + bufOff; + } + + /** + * process a single byte, producing an output block if necessary. + * + * @param in the input byte. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessByte(byte input, byte[] output, int outOff) + { + buf[bufOff++] = input; + + if (bufOff == buf.Length) + { + if ((outOff + buf.Length) > output.Length) + throw new DataLengthException("output buffer too short"); + + bufOff = 0; + return m_cipherMode.ProcessBlock(buf, 0, output, outOff); + } + + return 0; + } + + public override byte[] ProcessByte(byte input) + { + int outLength = GetUpdateOutputSize(1); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessByte(input, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + buf[bufOff++] = input; + + if (bufOff == buf.Length) + { + Check.OutputLength(output, buf.Length, "output buffer too short"); + + bufOff = 0; + return m_cipherMode.ProcessBlock(buf, output); + } + + return 0; + } +#endif + + public override byte[] ProcessBytes(byte[] input, int inOff, int length) + { + if (input == null) + throw new ArgumentNullException(nameof(input)); + if (length < 1) + return null; + + int outLength = GetUpdateOutputSize(length); + + byte[] outBytes = outLength > 0 ? new byte[outLength] : null; + + int pos = ProcessBytes(input, inOff, length, outBytes, 0); + + if (outLength > 0 && pos < outLength) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + + return outBytes; + } + + /** + * process an array of bytes, producing output if necessary. + * + * @param in the input byte array. + * @param inOff the offset at which the input data starts. + * @param len the number of bytes to be copied out of the input array. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff) + { + if (length < 1) + { + if (length < 0) + throw new ArgumentException("Can't have a negative input length!"); + + return 0; + } + + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(length); + + if (outLength > 0) + { + Check.OutputLength(output, outOff, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + if (length >= gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + bufOff = 0; + length -= gapLen; + inOff += gapLen; + while (length >= buf.Length) + { + resultLen += m_cipherMode.ProcessBlock(input, inOff, output, outOff + resultLen); + length -= blockSize; + inOff += blockSize; + } + } + Array.Copy(input, inOff, buf, bufOff, length); + bufOff += length; + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + if (input.IsEmpty) + return 0; + + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(input.Length); + + if (outLength > 0) + { + Check.OutputLength(output, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + if (input.Length >= gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + resultLen = m_cipherMode.ProcessBlock(buf, output); + bufOff = 0; + input = input[gapLen..]; + while (input.Length >= buf.Length) + { + resultLen += m_cipherMode.ProcessBlock(input, output[resultLen..]); + input = input[blockSize..]; + } + } + input.CopyTo(buf.AsSpan(bufOff)); + bufOff += input.Length; + return resultLen; + } +#endif + + public override byte[] DoFinal() + { + byte[] outBytes = EmptyBuffer; + + int length = GetOutputSize(0); + if (length > 0) + { + outBytes = new byte[length]; + + int pos = DoFinal(outBytes, 0); + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + } + else + { + Reset(); + } + + return outBytes; + } + + public override byte[] DoFinal(byte[] input, int inOff, int inLen) + { + if (input == null) + throw new ArgumentNullException(nameof(input)); + + int length = GetOutputSize(inLen); + + byte[] outBytes = EmptyBuffer; + + if (length > 0) + { + outBytes = new byte[length]; + + int pos = (inLen > 0) + ? ProcessBytes(input, inOff, inLen, outBytes, 0) + : 0; + + pos += DoFinal(outBytes, pos); + + if (pos < outBytes.Length) + { + byte[] tmp = new byte[pos]; + Array.Copy(outBytes, 0, tmp, 0, pos); + outBytes = tmp; + } + } + else + { + Reset(); + } + + return outBytes; + } + + /** + * Process the last block in the buffer. + * + * @param out the array the block currently being held is copied into. + * @param outOff the offset at which the copying starts. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there is insufficient space in out for + * the output, or the input is not block size aligned and should be. + * @exception InvalidOperationException if the underlying cipher is not + * initialised. + * @exception InvalidCipherTextException if padding is expected and not found. + * @exception DataLengthException if the input is not block size + * aligned. + */ + public override int DoFinal(byte[] output, int outOff) + { + try + { + if (bufOff != 0) + { + Check.DataLength(!m_cipherMode.IsPartialBlockOkay, "data not block size aligned"); + Check.OutputLength(output, outOff, bufOff, "output buffer too short for DoFinal()"); + + // NB: Can't copy directly, or we may write too much output + m_cipherMode.ProcessBlock(buf, 0, buf, 0); + Array.Copy(buf, 0, output, outOff, bufOff); + } + + return bufOff; + } + finally + { + Reset(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + try + { + if (bufOff != 0) + { + Check.DataLength(!m_cipherMode.IsPartialBlockOkay, "data not block size aligned"); + Check.OutputLength(output, bufOff, "output buffer too short for DoFinal()"); + + // NB: Can't copy directly, or we may write too much output + m_cipherMode.ProcessBlock(buf, buf); + buf.AsSpan(0, bufOff).CopyTo(output); + } + + return bufOff; + } + finally + { + Reset(); + } + } +#endif + + /** + * Reset the buffer and cipher. After resetting the object is in the same + * state as it was after the last init (if there was one). + */ + public override void Reset() + { + Array.Clear(buf, 0, buf.Length); + bufOff = 0; + + m_cipherMode.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs.meta new file mode 100644 index 00000000..2ecf3235 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f06047c62ef2344f8edbef0751ed3f5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs new file mode 100644 index 00000000..a0cb700a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public abstract class BufferedCipherBase + : IBufferedCipher + { + protected static readonly byte[] EmptyBuffer = new byte[0]; + + public abstract string AlgorithmName { get; } + + public abstract void Init(bool forEncryption, ICipherParameters parameters); + + public abstract int GetBlockSize(); + + public abstract int GetOutputSize(int inputLen); + public abstract int GetUpdateOutputSize(int inputLen); + + public abstract byte[] ProcessByte(byte input); + + public virtual int ProcessByte( + byte input, + byte[] output, + int outOff) + { + byte[] outBytes = ProcessByte(input); + if (outBytes == null) + return 0; + if (outOff + outBytes.Length > output.Length) + throw new DataLengthException("output buffer too short"); + outBytes.CopyTo(output, outOff); + return outBytes.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract int ProcessByte(byte input, Span output); +#endif + + public virtual byte[] ProcessBytes( + byte[] input) + { + return ProcessBytes(input, 0, input.Length); + } + + public abstract byte[] ProcessBytes(byte[] input, int inOff, int length); + + public virtual int ProcessBytes( + byte[] input, + byte[] output, + int outOff) + { + return ProcessBytes(input, 0, input.Length, output, outOff); + } + + public virtual int ProcessBytes( + byte[] input, + int inOff, + int length, + byte[] output, + int outOff) + { + byte[] outBytes = ProcessBytes(input, inOff, length); + if (outBytes == null) + return 0; + if (outOff + outBytes.Length > output.Length) + throw new DataLengthException("output buffer too short"); + outBytes.CopyTo(output, outOff); + return outBytes.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract int ProcessBytes(ReadOnlySpan input, Span output); +#endif + + public abstract byte[] DoFinal(); + + public virtual byte[] DoFinal( + byte[] input) + { + return DoFinal(input, 0, input.Length); + } + + public abstract byte[] DoFinal( + byte[] input, + int inOff, + int length); + + public virtual int DoFinal( + byte[] output, + int outOff) + { + byte[] outBytes = DoFinal(); + if (outOff + outBytes.Length > output.Length) + throw new DataLengthException("output buffer too short"); + outBytes.CopyTo(output, outOff); + return outBytes.Length; + } + + public virtual int DoFinal( + byte[] input, + byte[] output, + int outOff) + { + return DoFinal(input, 0, input.Length, output, outOff); + } + + public virtual int DoFinal( + byte[] input, + int inOff, + int length, + byte[] output, + int outOff) + { + int len = ProcessBytes(input, inOff, length, output, outOff); + len += DoFinal(output, outOff + len); + return len; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract int DoFinal(Span output); + + public virtual int DoFinal(ReadOnlySpan input, Span output) + { + int len = ProcessBytes(input, output); + len += DoFinal(output[len..]); + return len; + } +#endif + + public abstract void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs.meta new file mode 100644 index 00000000..f58238f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 618b5c9a3310b5f4c902e7226bc44437 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedCipherBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs new file mode 100644 index 00000000..6648c847 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs @@ -0,0 +1,149 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public class BufferedIesCipher + : BufferedCipherBase + { + private readonly IesEngine engine; + private bool forEncryption; + private MemoryStream buffer = new MemoryStream(); + + public BufferedIesCipher( + IesEngine engine) + { + if (engine == null) + throw new ArgumentNullException("engine"); + + this.engine = engine; + } + + public override string AlgorithmName + { + // TODO Create IESEngine.AlgorithmName + get { return "IES"; } + } + + public override void Init( + bool forEncryption, + ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + // TODO + throw new NotImplementedException("IES"); + } + + public override int GetBlockSize() + { + return 0; + } + + public override int GetOutputSize( + int inputLen) + { + if (engine == null) + throw new InvalidOperationException("cipher not initialised"); + + int baseLen = inputLen + Convert.ToInt32(buffer.Length); + return forEncryption + ? baseLen + 20 + : baseLen - 20; + } + + public override int GetUpdateOutputSize( + int inputLen) + { + return 0; + } + + public override byte[] ProcessByte(byte input) + { + buffer.WriteByte(input); + return null; + } + + public override int ProcessByte(byte input, byte[] output, int outOff) + { + buffer.WriteByte(input); + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + buffer.WriteByte(input); + return 0; + } +#endif + + public override byte[] ProcessBytes( + byte[] input, + int inOff, + int length) + { + if (input == null) + throw new ArgumentNullException("input"); + if (inOff < 0) + throw new ArgumentException("inOff"); + if (length < 0) + throw new ArgumentException("length"); + if (inOff + length > input.Length) + throw new ArgumentException("invalid offset/length specified for input array"); + + buffer.Write(input, inOff, length); + return null; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + buffer.Write(input); + return 0; + } +#endif + + public override byte[] DoFinal() + { + byte[] buf = buffer.ToArray(); + + Reset(); + + return engine.ProcessBlock(buf, 0, buf.Length); + } + + public override byte[] DoFinal( + byte[] input, + int inOff, + int length) + { + ProcessBytes(input, inOff, length); + return DoFinal(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + byte[] buf = buffer.ToArray(); + + Reset(); + + byte[] block = engine.ProcessBlock(buf, 0, buf.Length); + block.CopyTo(output); + return block.Length; + } +#endif + + public override void Reset() + { + buffer.SetLength(0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs.meta new file mode 100644 index 00000000..c0b22c78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c44d973bfb9905f4a95bd4973945ca37 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedIesCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs new file mode 100644 index 00000000..04d832ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs @@ -0,0 +1,141 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public class BufferedStreamCipher + : BufferedCipherBase + { + private readonly IStreamCipher m_cipher; + + public BufferedStreamCipher(IStreamCipher cipher) + { + if (cipher == null) + throw new ArgumentNullException("cipher"); + + this.m_cipher = cipher; + } + + public override string AlgorithmName + { + get { return m_cipher.AlgorithmName; } + } + + public override void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is ParametersWithRandom withRandom) + { + parameters = withRandom.Parameters; + } + + m_cipher.Init(forEncryption, parameters); + } + + public override int GetBlockSize() + { + return 0; + } + + public override int GetOutputSize(int inputLen) + { + return inputLen; + } + + public override int GetUpdateOutputSize(int inputLen) + { + return inputLen; + } + + public override byte[] ProcessByte(byte input) + { + return new byte[]{ m_cipher.ReturnByte(input) }; + } + + public override int ProcessByte(byte input, byte[] output, int outOff) + { + if (outOff >= output.Length) + throw new DataLengthException("output buffer too short"); + + output[outOff] = m_cipher.ReturnByte(input); + return 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + output[0] = m_cipher.ReturnByte(input); + return 1; + } +#endif + + public override byte[] ProcessBytes(byte[] input, int inOff, int length) + { + if (length < 1) + return null; + + byte[] output = new byte[length]; + m_cipher.ProcessBytes(input, inOff, length, output, 0); + return output; + } + + public override int ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff) + { + if (length < 1) + return 0; + + m_cipher.ProcessBytes(input, inOff, length, output, outOff); + return length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + m_cipher.ProcessBytes(input, output); + return input.Length; + } +#endif + + public override byte[] DoFinal() + { + m_cipher.Reset(); + + return EmptyBuffer; + } + + public override byte[] DoFinal(byte[] input, int inOff, int length) + { + if (length < 1) + return EmptyBuffer; + + byte[] output = new byte[length]; + m_cipher.ProcessBytes(input, inOff, length, output, 0); + m_cipher.Reset(); + return output; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + m_cipher.Reset(); + return 0; + } + + public override int DoFinal(ReadOnlySpan input, Span output) + { + m_cipher.ProcessBytes(input, output); + m_cipher.Reset(); + return input.Length; + } +#endif + + public override void Reset() + { + m_cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs.meta new file mode 100644 index 00000000..f9a36539 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 38846330434ee3c40a493f9b5fc31fa4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/BufferedStreamCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs new file mode 100644 index 00000000..8ab66bd9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + internal class Check + { + internal static void DataLength(bool condition, string msg) + { + if (condition) + throw new DataLengthException(msg); + } + + internal static void DataLength(byte[] buf, int off, int len, string msg) + { + if (off > (buf.Length - len)) + throw new DataLengthException(msg); + } + + internal static void OutputLength(byte[] buf, int off, int len, string msg) + { + if (off > (buf.Length - len)) + throw new OutputLengthException(msg); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void DataLength(ReadOnlySpan input, int len, string msg) + { + if (input.Length < len) + throw new DataLengthException(msg); + } + + internal static void OutputLength(Span output, int len, string msg) + { + if (output.Length < len) + throw new OutputLengthException(msg); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs.meta new file mode 100644 index 00000000..9e482ff9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8dca854941e2542439f158d38a188b3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Check.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs new file mode 100644 index 00000000..4ab4ea0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs @@ -0,0 +1,85 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * The base class for symmetric, or secret, cipher key generators. + */ + public class CipherKeyGenerator + { + protected internal SecureRandom random; + protected internal int strength; + private bool uninitialised = true; + private int defaultStrength; + + public CipherKeyGenerator() + { + } + + internal CipherKeyGenerator( + int defaultStrength) + { + if (defaultStrength < 1) + throw new ArgumentException("strength must be a positive value", "defaultStrength"); + + this.defaultStrength = defaultStrength; + } + + public int DefaultStrength + { + get { return defaultStrength; } + } + + /** + * initialise the key generator. + * + * @param param the parameters to be used for key generation + */ + public void Init(KeyGenerationParameters parameters) + { + if (parameters == null) + throw new ArgumentNullException(nameof(parameters)); + + this.uninitialised = false; + + EngineInit(parameters); + } + + protected virtual void EngineInit(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + this.strength = (parameters.Strength + 7) / 8; + } + + /** + * Generate a secret key. + * + * @return a byte array containing the key value. + */ + public byte[] GenerateKey() + { + if (uninitialised) + { + if (defaultStrength < 1) + throw new InvalidOperationException("Generator has not been initialised"); + + uninitialised = false; + + EngineInit(new KeyGenerationParameters(CryptoServicesRegistrar.GetSecureRandom(), defaultStrength)); + } + + return EngineGenerateKey(); + } + + protected virtual byte[] EngineGenerateKey() + { + return SecureRandom.GetNextBytes(random, strength); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs.meta new file mode 100644 index 00000000..da56a762 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f652b7f5a4b69f3429872785b07b5387 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CipherKeyGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs new file mode 100644 index 00000000..0d2872a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + [Serializable] + public class CryptoException + : Exception + { + public CryptoException() + : base() + { + } + + public CryptoException(string message) + : base(message) + { + } + + public CryptoException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CryptoException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs.meta new file mode 100644 index 00000000..f912c4a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 65ba84d33f99da34da4ce99ec22494a4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs new file mode 100644 index 00000000..cd333101 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public static class CryptoServicesRegistrar + { + public static SecureRandom GetSecureRandom() + { + return new SecureRandom(); + } + + public static SecureRandom GetSecureRandom(SecureRandom secureRandom) + { + return secureRandom ?? new SecureRandom(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs.meta new file mode 100644 index 00000000..7d9d6be9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d26f0f97d9e8eb8458cce46b59a854b6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/CryptoServicesRegistrar.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs new file mode 100644 index 00000000..8a354701 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// This exception is thrown if a buffer that is meant to have output copied into it turns out to be too + /// short, or if we've been given insufficient input. + /// + /// In general this exception will get thrown rather than an . + /// + [Serializable] + public class DataLengthException + : CryptoException + { + public DataLengthException() + : base() + { + } + + public DataLengthException(string message) + : base(message) + { + } + + public DataLengthException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected DataLengthException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs.meta new file mode 100644 index 00000000..d27f92c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5089c7f473b90dc49ad619946a39695f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/DataLengthException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs new file mode 100644 index 00000000..a13c15db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ +/** + * Base interface for mapping from an alphabet to a set of indexes + * suitable for use with FPE. + */ +public interface IAlphabetMapper +{ + /// + /// Return the number of characters in the alphabet. + /// + /// the radix for the alphabet. + int Radix { get; } + + /// + /// Return the passed in char[] as a byte array of indexes (indexes + /// can be more than 1 byte) + /// + /// an index array. + /// characters to be mapped. + byte[] ConvertToIndexes(char[] input); + + /// + /// Return a char[] for this alphabet based on the indexes passed. + /// + /// an array of char corresponding to the index values. + /// input array of indexes. + char[] ConvertToChars(byte[] input); +} +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs.meta new file mode 100644 index 00000000..c8f35388 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 26c268ccd6a5ba044b3c8d82511d19e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAlphabetMapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs new file mode 100644 index 00000000..94e1e428 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// Base interface for a public/private key block cipher. + public interface IAsymmetricBlockCipher + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + /// Initialise the cipher. + /// Initialise for encryption if true, for decryption if false. + /// The key or other data required by the cipher. + void Init(bool forEncryption, ICipherParameters parameters); + + /// The maximum size, in bytes, an input block may be. + int GetInputBlockSize(); + + /// The maximum size, in bytes, an output block will be. + int GetOutputBlockSize(); + + /// Process a block. + /// The input buffer. + /// The offset into inBuf that the input block begins. + /// The length of the input block. + /// Input decrypts improperly. + /// Input is too large for the cipher. + byte[] ProcessBlock(byte[] inBuf, int inOff, int inLen); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs.meta new file mode 100644 index 00000000..357c479a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ff2f5c980ef8b9428a9f48d9ca760ec +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs new file mode 100644 index 00000000..f1019442 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * interface that a public/private key pair generator should conform to. + */ + public interface IAsymmetricCipherKeyPairGenerator + { + /** + * intialise the key pair generator. + * + * @param the parameters the key pair is to be initialised with. + */ + void Init(KeyGenerationParameters parameters); + + /** + * return an AsymmetricCipherKeyPair containing the Generated keys. + * + * @return an AsymmetricCipherKeyPair containing the Generated keys. + */ + AsymmetricCipherKeyPair GenerateKeyPair(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs.meta new file mode 100644 index 00000000..e64f8ad9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c469595ebcb261e44b889a0b7c6f7eca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IAsymmetricCipherKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs new file mode 100644 index 00000000..96219d2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * The basic interface that basic Diffie-Hellman implementations + * conforms to. + */ + public interface IBasicAgreement + { + /** + * initialise the agreement engine. + */ + void Init(ICipherParameters parameters); + + /** + * return the field size for the agreement algorithm in bytes. + */ + int GetFieldSize(); + + /** + * given a public key from a given party calculate the next + * message in the agreement sequence. + */ + BigInteger CalculateAgreement(ICipherParameters pubKey); + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs.meta new file mode 100644 index 00000000..d353ff1d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 267bfbad38a70a04cb6f2d22eb57ddb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs new file mode 100644 index 00000000..d94f1409 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// Base interface for a symmetric key block cipher. + public interface IBlockCipher + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + /// Initialise the cipher. + /// Initialise for encryption if true, for decryption if false. + /// The key or other data required by the cipher. + void Init(bool forEncryption, ICipherParameters parameters); + + /// The block size for this cipher, in bytes. + int GetBlockSize(); + + /// Process a block. + /// The input buffer. + /// The offset into inBuf that the input block begins. + /// The output buffer. + /// The offset into outBuf to write the output block. + /// If input block is wrong size, or outBuf too small. + /// The number of bytes processed and produced. + int ProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + + /// Process a block. + /// The input block as a span. + /// The output span. + /// If input block is wrong size, or output span too small. + /// The number of bytes processed and produced. + int ProcessBlock(ReadOnlySpan input, Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs.meta new file mode 100644 index 00000000..779a3625 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 40e3ab5b4ad4b924e965c58394afec9d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs new file mode 100644 index 00000000..79fba899 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Operators that reduce their input to a single block return an object + /// of this type. + /// + public interface IBlockResult + { + /// + /// Return the final result of the operation. + /// + /// A block of bytes, representing the result of an operation. + byte[] Collect(); + + /// + /// Store the final result of the operation by copying it into the destination array. + /// + /// The number of bytes copied into destination. + /// The byte array to copy the result into. + /// The offset into destination to start copying the result at. + int Collect(byte[] destination, int offset); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + /// Store the final result of the operation by copying it into the destination span. + /// + /// The number of bytes copied into destination. + /// The span to copy the result into. + int Collect(Span destination); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs.meta new file mode 100644 index 00000000..43381234 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bec86f460e8dfb24fa97e13740a12345 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBlockResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs new file mode 100644 index 00000000..c0cb1354 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// Block cipher engines are expected to conform to this interface. + public interface IBufferedCipher + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + /// Initialise the cipher. + /// If true the cipher is initialised for encryption, + /// if false for decryption. + /// The key and other data required by the cipher. + void Init(bool forEncryption, ICipherParameters parameters); + + int GetBlockSize(); + + int GetOutputSize(int inputLen); + + int GetUpdateOutputSize(int inputLen); + + byte[] ProcessByte(byte input); + int ProcessByte(byte input, byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int ProcessByte(byte input, Span output); +#endif + + byte[] ProcessBytes(byte[] input); + byte[] ProcessBytes(byte[] input, int inOff, int length); + int ProcessBytes(byte[] input, byte[] output, int outOff); + int ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int ProcessBytes(ReadOnlySpan input, Span output); +#endif + + byte[] DoFinal(); + byte[] DoFinal(byte[] input); + byte[] DoFinal(byte[] input, int inOff, int length); + int DoFinal(byte[] output, int outOff); + int DoFinal(byte[] input, byte[] output, int outOff); + int DoFinal(byte[] input, int inOff, int length, byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int DoFinal(Span output); + int DoFinal(ReadOnlySpan input, Span output); +#endif + + /// + /// Reset the cipher. After resetting the cipher is in the same state + /// as it was after the last init (if there was one). + /// + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs.meta new file mode 100644 index 00000000..b27eca65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 885f01f9511ebe24598e9678cb60cd17 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IBufferedCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs new file mode 100644 index 00000000..a0fb04f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for a ciphers that do not require data to be block aligned. + /// + /// Note: In cases where the underlying algorithm is block based, these ciphers may add or remove padding as needed. + /// + /// + public interface ICipher + { + /// + /// Return the size of the output buffer required for a Write() plus a + /// close() with the write() being passed inputLen bytes. + /// + /// The returned size may be dependent on the initialisation of this cipher + /// and may not be accurate once subsequent input data is processed as the cipher may + /// add, add or remove padding, as it sees fit. + /// + /// + /// The space required to accommodate a call to processBytes and doFinal with inputLen bytes of input. + /// The length of the expected input. + int GetMaxOutputSize(int inputLen); + + /// + /// Return the size of the output buffer required for a write() with the write() being + /// passed inputLen bytes and just updating the cipher output. + /// + /// The space required to accommodate a call to processBytes with inputLen bytes of input. + /// The length of the expected input. + int GetUpdateOutputSize(int inputLen); + + /// + /// Gets the stream for reading/writing data processed/to be processed. + /// + /// The stream associated with this cipher. + Stream Stream { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs.meta new file mode 100644 index 00000000..539492a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: efce806d70cbf184bb8e497a45dce530 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs new file mode 100644 index 00000000..6eeead7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for cipher builders. + /// + public interface ICipherBuilder + { + /// + /// Return the algorithm and parameter details associated with any cipher built. + /// + object AlgorithmDetails { get; } + + /// + /// Return the maximum output size that a given input will produce. + /// + /// the length of the expected input. + /// The maximum possible output size that can produced for the expected input length. + int GetMaxOutputSize(int inputLen); + + /// + /// Build a cipher that operates on the passed in stream. + /// + /// The stream to write/read any encrypted/decrypted data. + /// A cipher based around the given stream. + ICipher BuildCipher(Stream stream); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs.meta new file mode 100644 index 00000000..d858fa78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5fe6d1cc6c7d795468572f9dd7d6dbc0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs new file mode 100644 index 00000000..f05b8693 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// A cipher builder that can also return the key it was initialized with. + /// + public interface ICipherBuilderWithKey + : ICipherBuilder + { + /// + /// Return the key we were initialized with. + /// + ICipherParameters Key { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs.meta new file mode 100644 index 00000000..19673b8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e5b735b4fdb9db5448a3f87d2cbdab1e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherBuilderWithKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs new file mode 100644 index 00000000..ec37a51a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * all parameter classes implement this. + */ + public interface ICipherParameters + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs.meta new file mode 100644 index 00000000..2fca8af9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ce8f8b02824db1a41a3db4053309a004 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ICipherParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs new file mode 100644 index 00000000..e19d199c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// Interface for classes implementing the Digital Signature Algorithm + public interface IDsa + { + /// The algorithm name. + string AlgorithmName { get; } + + /// Initialise the signer for signature generation or signature verification. + /// true if we are generating a signature, false otherwise. + /// key parameters for signature generation. + void Init(bool forSigning, ICipherParameters parameters); + + /// Sign the passed in message (usually the output of a hash function). + /// the message to be signed. + /// two big integers representing the r and s values respectively. + BigInteger[] GenerateSignature(byte[] message); + + /// The order of the group that the r, s values in signatures belong to. + BigInteger Order { get; } + + /// Verify the message message against the signature values r and s. + /// the message that was supposed to have been signed. + /// the r signature value. + /// the s signature value. + bool VerifySignature(byte[] message, BigInteger r, BigInteger s); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs.meta new file mode 100644 index 00000000..25969322 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed08f38fc0da77040b5f7a9eab9a5c03 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDSA.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs new file mode 100644 index 00000000..954891f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Interface describing a provider of cipher builders for creating decrypting ciphers. + /// + public interface IDecryptorBuilderProvider + { + /// + /// Return a cipher builder for creating decrypting ciphers. + /// + /// The algorithm details/parameters to use to create the final cipher. + /// A new cipher builder. + ICipherBuilder CreateDecryptorBuilder(object algorithmDetails); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs.meta new file mode 100644 index 00000000..f627f4c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32fe5f1a51125b64c85a498d1f5dd647 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDecryptorBuilderProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs new file mode 100644 index 00000000..daca2200 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * base interface for general purpose byte derivation functions. + */ + public interface IDerivationFunction + { + void Init(IDerivationParameters parameters); + + /** + * return the message digest used as the basis for the function + */ + IDigest Digest { get; } + + int GenerateBytes(byte[] output, int outOff, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int GenerateBytes(Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs.meta new file mode 100644 index 00000000..6d7f65c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7896534c1fff76f4792e074c083ae8c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationFunction.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs new file mode 100644 index 00000000..cd4cad8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * Parameters for key/byte stream derivation classes + */ + public interface IDerivationParameters + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs.meta new file mode 100644 index 00000000..e0fdcc34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4afd6d569b1ce7e4b9fcb6c43ba35c8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDerivationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs new file mode 100644 index 00000000..f40ccae0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// Base interface for a message digest. + public interface IDigest + { + /// The algorithm name. + string AlgorithmName { get; } + + /// Return the size, in bytes, of the digest produced by this message digest. + /// the size, in bytes, of the digest produced by this message digest. + int GetDigestSize(); + + /// Return the size, in bytes, of the internal buffer used by this digest. + /// the size, in bytes, of the internal buffer used by this digest. + int GetByteLength(); + + /// Update the message digest with a single byte. + /// the input byte to be entered. + void Update(byte input); + + /// Update the message digest with a block of bytes. + /// the byte array containing the data. + /// the offset into the byte array where the data starts. + /// the length of the data. + void BlockUpdate(byte[] input, int inOff, int inLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Update the message digest with a span of bytes. + /// the span containing the data. + void BlockUpdate(ReadOnlySpan input); +#endif + + /// Close the digest, producing the final digest value. + /// This call leaves the digest reset. + /// the byte array the digest is to be copied into. + /// the offset into the byte array the digest is to start at. + /// the number of bytes written + int DoFinal(byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Close the digest, producing the final digest value. + /// This call leaves the digest reset. + /// the span the digest is to be copied into. + /// the number of bytes written + int DoFinal(Span output); +#endif + + /// Reset the digest back to its initial state. + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs.meta new file mode 100644 index 00000000..dc61fc73 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 11d256f9eb1352a4aa7e9573d2d624d4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs new file mode 100644 index 00000000..dabbc267 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for operator factories that create stream-based digest calculators. + /// + public interface IDigestFactory + { + /// The algorithm details object for calculators made by this factory. + object AlgorithmDetails { get ; } + + /// Return the size of the digest associated with this factory. + /// The length of the digest produced by this calculators from this factory in bytes. + int DigestLength { get; } + + /// + /// Create a stream calculator for the digest associated with this factory. The stream + /// calculator is used for the actual operation of entering the data to be digested + /// and producing the digest block. + /// + /// A calculator producing an IBlockResult with the final digest in it. + IStreamCalculator CreateCalculator(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs.meta new file mode 100644 index 00000000..6439a060 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5da2d5324b787284e847ebd6da7cb5cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IDigestFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs new file mode 100644 index 00000000..89c4d86a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IEncapsulatedSecretExtractor + { + /// + /// Generate an exchange pair based on the recipient public key. + /// + /// the encapsulated secret. + byte[] ExtractSecret(byte[] encapsulation); + + /// + /// The length in bytes of the encapsulation. + /// + int EncapsulationLength { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs.meta new file mode 100644 index 00000000..d644079b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 22f6dc4e9fa5b954bb35d72937aadc2d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretExtractor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs new file mode 100644 index 00000000..d8524503 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IEncapsulatedSecretGenerator + { + /// + /// Generate an exchange pair based on the recipient public key. + /// + /// + /// An SecretWithEncapsulation derived from the recipient public key. + ISecretWithEncapsulation GenerateEncapsulated(AsymmetricKeyParameter recipientKey); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs.meta new file mode 100644 index 00000000..5029cd7d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d0668828ad98e6e4c859e57e002be082 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEncapsulatedSecretGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs new file mode 100644 index 00000000..b150b48d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface describing an entropy source for a DRBG. + /// + public interface IEntropySource + { + /// + /// Return whether or not this entropy source is regarded as prediction resistant. + /// + /// true if this instance is prediction resistant; otherwise, false. + bool IsPredictionResistant { get; } + + /// + /// Return a byte array of entropy. + /// + /// The entropy bytes. + byte[] GetEntropy(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int GetEntropy(Span output); +#endif + + /// + /// Return the number of bits of entropy this source can produce. + /// + /// The size, in bits, of the return value of getEntropy. + int EntropySize { get; } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs.meta new file mode 100644 index 00000000..369e74ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ffa8483768f1c054193d3507ab0d90d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySource.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs new file mode 100644 index 00000000..de7595ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface describing a provider of entropy sources. + /// + public interface IEntropySourceProvider + { + /// + /// Return an entropy source providing a block of entropy. + /// + /// The size of the block of entropy required. + /// An entropy source providing bitsRequired blocks of entropy. + IEntropySource Get(int bitsRequired); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs.meta new file mode 100644 index 00000000..a1bb305a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 46664d993de51854ea742fd679c9c39b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IEntropySourceProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs new file mode 100644 index 00000000..4d5d504f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for a key unwrapper. + /// + public interface IKeyUnwrapper + { + /// + /// The parameter set used to configure this key unwrapper. + /// + object AlgorithmDetails { get; } + + /// + /// Unwrap the passed in data. + /// + /// The array containing the data to be unwrapped. + /// The offset into cipherText at which the unwrapped data starts. + /// The length of the data to be unwrapped. + /// an IBlockResult containing the unwrapped key data. + IBlockResult Unwrap(byte[] cipherText, int offset, int length); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs.meta new file mode 100644 index 00000000..3d142e25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e9e3bb33c6b2e404db6129ccbd9220c7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyUnwrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs new file mode 100644 index 00000000..a35f5fd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for a key wrapper. + /// + public interface IKeyWrapper + { + /// + /// The parameter set used to configure this key wrapper. + /// + object AlgorithmDetails { get; } + + /// + /// Wrap the passed in key data. + /// + /// The key data to be wrapped. + /// an IBlockResult containing the wrapped key data. + IBlockResult Wrap(byte[] keyData); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs.meta new file mode 100644 index 00000000..d3bbb03f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4a8d8d990cbc936419c1d996525e5e78 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IKeyWrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs new file mode 100644 index 00000000..aab953fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// The base interface for implementations of message authentication codes (MACs). + public interface IMac + { + /// Initialise the MAC. + /// The key or other data required by the MAC. + void Init(ICipherParameters parameters); + + /// The algorithm name. + string AlgorithmName { get; } + + /// Return the size, in bytes, of the MAC produced by this implementation. + /// the size, in bytes, of the MAC produced by this implementation. + int GetMacSize(); + + /// Update the MAC with a single byte. + /// the input byte to be entered. + void Update(byte input); + + /// Update the MAC with a block of bytes. + /// the byte array containing the data. + /// the offset into the byte array where the data starts. + /// the length of the data. + void BlockUpdate(byte[] input, int inOff, int inLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Update the MAC with a span of bytes. + /// the span containing the data. + void BlockUpdate(ReadOnlySpan input); +#endif + + /// Perform final calculations, producing the result MAC. + /// This call leaves the MAC reset. + /// the byte array the MAC is to be copied into. + /// the offset into the byte array the MAC is to start at. + /// the number of bytes written + int DoFinal(byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Perform final calculations, producing the result MAC. + /// This call leaves the MAC reset. + /// the span the MAC is to be copied into. + /// the number of bytes written + int DoFinal(Span output); +#endif + + /// Reset the MAC back to its initial state. + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs.meta new file mode 100644 index 00000000..8ace43d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a117b82196c3aab4f84f8bc89f4eaa94 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs new file mode 100644 index 00000000..3a994f87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs @@ -0,0 +1,12 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IMacDerivationFunction + : IDerivationFunction + { + IMac Mac { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs.meta new file mode 100644 index 00000000..0e0d4931 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2bfff58c4f64fa941acecf54c6e6873b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacDerivationFunction.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs new file mode 100644 index 00000000..d75d15e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IMacFactory + { + /// The algorithm details object for this calculator. + object AlgorithmDetails { get; } + + /// + /// Create a stream calculator for this signature calculator. The stream + /// calculator is used for the actual operation of entering the data to be signed + /// and producing the signature block. + /// + /// A calculator producing an IBlockResult with a signature in it. + IStreamCalculator CreateCalculator(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs.meta new file mode 100644 index 00000000..b90e8e0a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4b7a7c59f970b994894adf5754fa3694 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IMacFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs new file mode 100644 index 00000000..2076e942 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IRawAgreement + { + void Init(ICipherParameters parameters); + + int AgreementSize { get; } + + void CalculateAgreement(ICipherParameters publicKey, byte[] buf, int off); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void CalculateAgreement(ICipherParameters publicKey, Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs.meta new file mode 100644 index 00000000..ac993642 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f764fa0831af9cf45a11e3dd052e3aed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRawAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs new file mode 100644 index 00000000..02b99ff8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IRsa + { + void Init(bool forEncryption, ICipherParameters parameters); + int GetInputBlockSize(); + int GetOutputBlockSize(); + BigInteger ConvertInput(byte[] buf, int off, int len); + BigInteger ProcessBlock(BigInteger input); + byte[] ConvertOutput(BigInteger result); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs.meta new file mode 100644 index 00000000..637bc9b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 601634118b178b248b8f0307a8e86794 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IRsa.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs new file mode 100644 index 00000000..462587cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface ISecretWithEncapsulation + : IDisposable + { + + /// + /// Return the secret associated with the encapsulation. + /// + /// the secret the encapsulation is for. + byte[] GetSecret(); + + /// + /// Return the data that carries the secret in its encapsulated form. + /// + /// the encapsulation of the secret. + byte[] GetEncapsulation(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs.meta new file mode 100644 index 00000000..02dd5ebd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c64159ff7a19ccd4cb6b41e6a6e9396f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISecretWithEncapsulation.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs new file mode 100644 index 00000000..61817d8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for operators that serve as stream-based signature calculators. + /// + public interface ISignatureFactory + { + /// The algorithm details object for this calculator. + object AlgorithmDetails { get; } + + /// + /// Create a stream calculator for this signature calculator. The stream + /// calculator is used for the actual operation of entering the data to be signed + /// and producing the signature block. + /// + /// A calculator producing an IBlockResult with a signature in it. + IStreamCalculator CreateCalculator(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs.meta new file mode 100644 index 00000000..ff01dacd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2b2c1b5fc6afabc4a9d8516f04b0d669 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignatureFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs new file mode 100644 index 00000000..c2ab2bd9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface ISigner + { + /// The algorithm name. + string AlgorithmName { get; } + + /// Initialise the signer for signing or verification. + /// true if for signing, false otherwise. + /// necessary parameters. + void Init(bool forSigning, ICipherParameters parameters); + + /// Update the signer with a single byte. + /// the input byte to be entered. + void Update(byte input); + + /// Update the signer with a block of bytes. + /// the byte array containing the data. + /// the offset into the byte array where the data starts. + /// the length of the data. + void BlockUpdate(byte[] input, int inOff, int inLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Update the signer with a span of bytes. + /// the span containing the data. + void BlockUpdate(ReadOnlySpan input); +#endif + + /// Generate a signature for the message we've been loaded with using the key we were initialised with. + /// + /// A byte array containing the signature for the message. + byte[] GenerateSignature(); + + /// Return true if the internal state represents the signature described in the passed in array. + /// + /// an array containing the candidate signature to verify. + /// true if the internal state represents the signature described in the passed in array. + bool VerifySignature(byte[] signature); + + /// Reset the signer back to its initial state. + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs.meta new file mode 100644 index 00000000..e04c2d74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bb4d5fc37b02b014498e749eaeab56ec +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs new file mode 100644 index 00000000..f1dbc496 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs @@ -0,0 +1,41 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * Signer with message recovery. + */ + public interface ISignerWithRecovery + : ISigner + { + /** + * Returns true if the signer has recovered the full message as + * part of signature verification. + * + * @return true if full message recovered. + */ + bool HasFullMessage(); + + /** + * Returns a reference to what message was recovered (if any). + * + * @return full/partial message, null if nothing. + */ + byte[] GetRecoveredMessage(); + + /** + * Perform an update with the recovered message before adding any other data. This must + * be the first update method called, and calling it will result in the signer assuming + * that further calls to update will include message content past what is recoverable. + * + * @param signature the signature that we are in the process of verifying. + * @throws IllegalStateException + */ + void UpdateWithRecoveredMessage(byte[] signature); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs.meta new file mode 100644 index 00000000..cfccface --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5ac6d31f0215b7a43ba3aee66f7acec4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ISignerWithRecovery.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs new file mode 100644 index 00000000..f2dc9da9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for cryptographic operations such as Hashes, MACs, and Signatures which reduce a stream of data + /// to a single value. + /// + public interface IStreamCalculator + { + /// Return a "sink" stream which only exists to update the implementing object. + /// A stream to write to in order to update the implementing object. + Stream Stream { get; } + + /// + /// Return the result of processing the stream. This value is only available once the stream + /// has been closed. + /// + /// The result of processing the stream. + TResult GetResult(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs.meta new file mode 100644 index 00000000..f691ad78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7e87c533917936448aecc7afcfe3f950 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs new file mode 100644 index 00000000..69ae6251 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// The interface stream ciphers conform to. + public interface IStreamCipher + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + /// Initialise the cipher. + /// If true the cipher is initialised for encryption, + /// if false for decryption. + /// The key and other data required by the cipher. + /// + /// If the parameters argument is inappropriate. + /// + void Init(bool forEncryption, ICipherParameters parameters); + + /// encrypt/decrypt a single byte returning the result. + /// the byte to be processed. + /// the result of processing the input byte. + byte ReturnByte(byte input); + + /// + /// Process a block of bytes from , putting the result into . + /// + /// The input byte array. + /// + /// The offset into input where the data to be processed starts. + /// + /// The number of bytes to be processed. + /// The output buffer the processed bytes go into. + /// + /// The offset into output the processed data starts at. + /// + /// If the input buffer is too small. + /// If the output buffer is too small. + void ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + /// Process a block of bytes from , putting the result into . + /// + /// The input span. + /// The output span. + /// If the output span is too small. + void ProcessBytes(ReadOnlySpan input, Span output); +#endif + + /// + /// Reset the cipher to the same state as it was after the last init (if there was one). + /// + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs.meta new file mode 100644 index 00000000..be3b60d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 19a6dab5751af1548adab311028030c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IStreamCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs new file mode 100644 index 00000000..697be252 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Operators that reduce their input to the validation of a signature produce this type. + /// + public interface IVerifier + { + /// + /// Return true if the passed in data matches what is expected by the verification result. + /// + /// The bytes representing the signature. + /// true if the signature verifies, false otherwise. + bool IsVerified(byte[] data); + + /// + /// Return true if the length bytes from off in the source array match the signature + /// expected by the verification result. + /// + /// Byte array containing the signature. + /// The offset into the source array where the signature starts. + /// The number of bytes in source making up the signature. + /// true if the signature verifies, false otherwise. + bool IsVerified(byte[] source, int off, int length); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs.meta new file mode 100644 index 00000000..a81034ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fffe202054056544998c934d73e4cbc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs new file mode 100644 index 00000000..8629d884 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for operators that serve as stream-based signature verifiers. + /// + public interface IVerifierFactory + { + /// The algorithm details object for this verifier. + object AlgorithmDetails { get; } + + /// + /// Create a stream calculator for this verifier. The stream + /// calculator is used for the actual operation of entering the data to be verified + /// and producing a result which can be used to verify the original signature. + /// + /// A calculator producing an IVerifier which can verify the signature. + IStreamCalculator CreateCalculator(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs.meta new file mode 100644 index 00000000..c3b2b378 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b45c65658441194c80f4237fdf7dd5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs new file mode 100644 index 00000000..c6c66bcb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// Base interface for a provider to support the dynamic creation of signature verifiers. + /// + public interface IVerifierFactoryProvider + { + /// + /// Return a signature verfier for signature algorithm described in the passed in algorithm details object. + /// + /// The details of the signature algorithm verification is required for. + /// A new signature verifier. + IVerifierFactory CreateVerifierFactory (object algorithmDetails); + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs.meta new file mode 100644 index 00000000..b92666c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 18ecb6ac91aea8b4e9984df31c41f4e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IVerifierFactoryProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs new file mode 100644 index 00000000..81bc494f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + public interface IWrapper + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + void Init(bool forWrapping, ICipherParameters parameters); + + byte[] Wrap(byte[] input, int inOff, int length); + + byte[] Unwrap(byte[] input, int inOff, int length); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs.meta new file mode 100644 index 00000000..d0d22540 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dbea0f4b6c8c70547be13a1e2d7fcf48 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IWrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs new file mode 100644 index 00000000..74d8c404 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs @@ -0,0 +1,54 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// With FIPS PUB 202 a new kind of message digest was announced which supported extendable output, or variable digest sizes. + /// This interface provides the extra methods required to support variable output on a digest implementation. + /// + public interface IXof + : IDigest + { + /// + /// Output the results of the final calculation for this XOF to outLen number of bytes. + /// + /// output array to write the output bytes to. + /// offset to start writing the bytes at. + /// the number of output bytes requested. + /// the number of bytes written + int OutputFinal(byte[] output, int outOff, int outLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + /// Output the results of the final calculation for this XOF to fill the output span. + /// + /// span to fill with the output bytes. + /// the number of bytes written + int OutputFinal(Span output); +#endif + + /// + /// Start outputting the results of the final calculation for this XOF. Unlike DoFinal, this method + /// will continue producing output until the XOF is explicitly reset, or signals otherwise. + /// + /// output array to write the output bytes to. + /// offset to start writing the bytes at. + /// the number of output bytes requested. + /// the number of bytes written + int Output(byte[] output, int outOff, int outLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + /// Start outputting the results of the final calculation for this XOF. Unlike OutputFinal, this method + /// will continue producing output until the XOF is explicitly reset, or signals otherwise. + /// + /// span to fill with the output bytes. + /// the number of bytes written + int Output(Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs.meta new file mode 100644 index 00000000..b0ad9582 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d93e3601439c33499c24b6b79a5091e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/IXof.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs new file mode 100644 index 00000000..fef87a7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// This exception is thrown whenever we find something we don't expect in a message. + [Serializable] + public class InvalidCipherTextException + : CryptoException + { + public InvalidCipherTextException() + : base() + { + } + + public InvalidCipherTextException(string message) + : base(message) + { + } + + public InvalidCipherTextException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected InvalidCipherTextException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs.meta new file mode 100644 index 00000000..2c85cdf6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5bf5eae46c713749b2816eca8a3343a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/InvalidCipherTextException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs new file mode 100644 index 00000000..bbb554e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * The base class for parameters to key generators. + */ + public class KeyGenerationParameters + { + private SecureRandom random; + private int strength; + + /** + * initialise the generator with a source of randomness + * and a strength (in bits). + * + * @param random the random byte source. + * @param strength the size, in bits, of the keys we want to produce. + */ + public KeyGenerationParameters( + SecureRandom random, + int strength) + { + if (random == null) + throw new ArgumentNullException("random"); + if (strength < 1) + throw new ArgumentException("strength must be a positive value", "strength"); + + this.random = random; + this.strength = strength; + } + + /** + * return the random source associated with this + * generator. + * + * @return the generators random source. + */ + public SecureRandom Random + { + get { return random; } + } + + /** + * return the bit strength for keys produced by this generator, + * + * @return the strength of the keys this generator produces (in bits). + */ + public int Strength + { + get { return strength; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..db21a196 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 54756e16b9f895040bf8013e73a9646f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs new file mode 100644 index 00000000..be1a9527 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// This exception is thrown whenever a cipher requires a change of key, IV or similar after x amount of + /// bytes enciphered. + /// + [Serializable] + public class MaxBytesExceededException + : CryptoException + { + public MaxBytesExceededException() + : base() + { + } + + public MaxBytesExceededException(string message) + : base(message) + { + } + + public MaxBytesExceededException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected MaxBytesExceededException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs.meta new file mode 100644 index 00000000..83e01b5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a252e534c7ea8f044b417b6f0b644ff3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/MaxBytesExceededException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs new file mode 100644 index 00000000..754469a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + [Serializable] + public class OutputLengthException + : DataLengthException + { + public OutputLengthException() + : base() + { + } + + public OutputLengthException(string message) + : base(message) + { + } + + public OutputLengthException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected OutputLengthException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs.meta new file mode 100644 index 00000000..639ed45e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d25959987b0a9fa4daa8330829321b6a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/OutputLengthException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs new file mode 100644 index 00000000..ee7af8ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * super class for all Password Based Encyrption (Pbe) parameter generator classes. + */ + public abstract class PbeParametersGenerator + { + protected byte[] mPassword; + protected byte[] mSalt; + protected int mIterationCount; + + /** + * base constructor. + */ + protected PbeParametersGenerator() + { + } + + /** + * initialise the Pbe generator. + * + * @param password the password converted into bytes (see below). + * @param salt the salt to be mixed with the password. + * @param iterationCount the number of iterations the "mixing" function + * is to be applied for. + */ + public virtual void Init( + byte[] password, + byte[] salt, + int iterationCount) + { + if (password == null) + throw new ArgumentNullException("password"); + if (salt == null) + throw new ArgumentNullException("salt"); + + this.mPassword = Arrays.Clone(password); + this.mSalt = Arrays.Clone(salt); + this.mIterationCount = iterationCount; + } + + public virtual byte[] Password + { + get { return Arrays.Clone(mPassword); } + } + + public virtual byte[] Salt + { + get { return Arrays.Clone(mSalt); } + } + + /** + * return the iteration count. + * + * @return the iteration count. + */ + public virtual int IterationCount + { + get { return mIterationCount; } + } + + public abstract ICipherParameters GenerateDerivedParameters(string algorithm, int keySize); + public abstract ICipherParameters GenerateDerivedParameters(string algorithm, int keySize, int ivSize); + + /** + * Generate derived parameters for a key of length keySize, specifically + * for use with a MAC. + * + * @param keySize the length, in bits, of the key required. + * @return a parameters object representing a key. + */ + public abstract ICipherParameters GenerateDerivedMacParameters(int keySize); + + /** + * converts a password to a byte array according to the scheme in + * Pkcs5 (ascii, no padding) + * + * @param password a character array representing the password. + * @return a byte array representing the password. + */ + public static byte[] Pkcs5PasswordToBytes( + char[] password) + { + if (password == null) + return new byte[0]; + + return Strings.ToByteArray(password); + } + + /** + * converts a password to a byte array according to the scheme in + * PKCS5 (UTF-8, no padding) + * + * @param password a character array representing the password. + * @return a byte array representing the password. + */ + public static byte[] Pkcs5PasswordToUtf8Bytes( + char[] password) + { + if (password == null) + return new byte[0]; + + return Encoding.UTF8.GetBytes(password); + } + + /** + * converts a password to a byte array according to the scheme in + * Pkcs12 (unicode, big endian, 2 zero pad bytes at the end). + * + * @param password a character array representing the password. + * @return a byte array representing the password. + */ + public static byte[] Pkcs12PasswordToBytes( + char[] password) + { + return Pkcs12PasswordToBytes(password, false); + } + + public static byte[] Pkcs12PasswordToBytes( + char[] password, + bool wrongPkcs12Zero) + { + if (password == null || password.Length < 1) + { + return new byte[wrongPkcs12Zero ? 2 : 0]; + } + + // +1 for extra 2 pad bytes. + byte[] bytes = new byte[(password.Length + 1) * 2]; + + Encoding.BigEndianUnicode.GetBytes(password, 0, password.Length, bytes, 0); + + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs.meta new file mode 100644 index 00000000..9c209550 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cd96f9ab7f2f40d45b06da3424dace6c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/PbeParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs.meta new file mode 100644 index 00000000..aa393bfe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa5dd29ed6625944ab965bbe4e1c504a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/Security.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs new file mode 100644 index 00000000..bef2df6e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /// + /// A simple block result object which just carries a byte array. + /// + public class SimpleBlockResult + : IBlockResult + { + private readonly byte[] result; + + /// + /// Base constructor - a wrapper for the passed in byte array. + /// + /// The byte array to be wrapped. + public SimpleBlockResult(byte[] result) + { + this.result = result; + } + + /// + /// Return the number of bytes in the result + /// + /// The length of the result in bytes. + public int Length + { + get { return result.Length; } + } + + /// + /// Return the final result of the operation. + /// + /// A block of bytes, representing the result of an operation. + public byte[] Collect() + { + return result; + } + + /// + /// Store the final result of the operation by copying it into the destination array. + /// + /// The number of bytes copied into destination. + /// The byte array to copy the result into. + /// The offset into destination to start copying the result at. + public int Collect(byte[] destination, int offset) + { + Array.Copy(result, 0, destination, offset, result.Length); + + return result.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Collect(Span destination) + { + result.CopyTo(destination); + + return result.Length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs.meta new file mode 100644 index 00000000..ec951c1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5498aa7e101c9a647a3be69abec188aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/SimpleBlockResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs new file mode 100644 index 00000000..e6388cdc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto +{ + /** + * a wrapper for block ciphers with a single byte block size, so that they + * can be treated like stream ciphers. + */ + public class StreamBlockCipher + : IStreamCipher + { + private readonly IBlockCipherMode m_cipherMode; + private readonly byte[] oneByte = new byte[1]; + + /** + * basic constructor. + * + * @param cipher the block cipher to be wrapped. + * @exception ArgumentException if the cipher has a block size other than + * one. + */ + public StreamBlockCipher(IBlockCipherMode cipherMode) + { + if (cipherMode == null) + throw new ArgumentNullException(nameof(cipherMode)); + if (cipherMode.GetBlockSize() != 1) + throw new ArgumentException("block cipher block size != 1.", nameof(cipherMode)); + + m_cipherMode = cipherMode; + } + + /** + * initialise the underlying cipher. + * + * @param forEncryption true if we are setting up for encryption, false otherwise. + * @param param the necessary parameters for the underlying cipher to be initialised. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + m_cipherMode.Init(forEncryption, parameters); + } + + /** + * return the name of the algorithm we are wrapping. + * + * @return the name of the algorithm we are wrapping. + */ + public string AlgorithmName + { + get { return m_cipherMode.AlgorithmName; } + } + + /** + * encrypt/decrypt a single byte returning the result. + * + * @param in the byte to be processed. + * @return the result of processing the input byte. + */ + public byte ReturnByte(byte input) + { + oneByte[0] = input; + + m_cipherMode.ProcessBlock(oneByte, 0, oneByte, 0); + + return oneByte[0]; + } + + /** + * process a block of bytes from in putting the result into out. + * + * @param in the input byte array. + * @param inOff the offset into the in array where the data to be processed starts. + * @param len the number of bytes to be processed. + * @param out the output buffer the processed bytes go into. + * @param outOff the offset into the output byte array the processed data stars at. + * @exception DataLengthException if the output buffer is too small. + */ + public void ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff) + { + Check.DataLength(input, inOff, length, "input buffer too short"); + Check.OutputLength(output, outOff, length, "output buffer too short"); + + for (int i = 0; i != length; i++) + { + m_cipherMode.ProcessBlock(input, inOff + i, output, outOff + i); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i != input.Length; i++) + { + m_cipherMode.ProcessBlock(input[i..], output[i..]); + } + } +#endif + + /** + * reset the underlying cipher. This leaves it in the same state + * it was at after the last init (if there was one). + */ + public void Reset() + { + m_cipherMode.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs.meta new file mode 100644 index 00000000..964391b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df0c680d42975b844a7eae6adc370774 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/StreamBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement.meta new file mode 100644 index 00000000..4b426d30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 397c99204673fb542949d8cdd218c142 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs new file mode 100644 index 00000000..20ed9b37 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /** + * a Diffie-Hellman key exchange engine. + *

+ * note: This uses MTI/A0 key agreement in order to make the key agreement + * secure against passive attacks. If you're doing Diffie-Hellman and both + * parties have long term public keys you should look at using this. For + * further information have a look at RFC 2631.

+ *

+ * It's possible to extend this to more than two parties as well, for the moment + * that is left as an exercise for the reader.

+ */ + public class DHAgreement + { + private DHPrivateKeyParameters key; + private DHParameters dhParams; + private BigInteger privateValue; + private SecureRandom random; + + public void Init(ICipherParameters parameters) + { + AsymmetricKeyParameter kParam; + if (parameters is ParametersWithRandom rParam) + { + this.random = rParam.Random; + kParam = (AsymmetricKeyParameter)rParam.Parameters; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + kParam = (AsymmetricKeyParameter)parameters; + } + + if (!(kParam is DHPrivateKeyParameters dhPrivateKeyParameters)) + throw new ArgumentException("DHEngine expects DHPrivateKeyParameters"); + + this.key = dhPrivateKeyParameters; + this.dhParams = dhPrivateKeyParameters.Parameters; + } + + /** + * calculate our initial message. + */ + public BigInteger CalculateMessage() + { + DHKeyPairGenerator dhGen = new DHKeyPairGenerator(); + dhGen.Init(new DHKeyGenerationParameters(random, dhParams)); + AsymmetricCipherKeyPair dhPair = dhGen.GenerateKeyPair(); + + this.privateValue = ((DHPrivateKeyParameters)dhPair.Private).X; + + return ((DHPublicKeyParameters)dhPair.Public).Y; + } + + /** + * given a message from a given party and the corresponding public key + * calculate the next message in the agreement sequence. In this case + * this will represent the shared secret. + */ + public BigInteger CalculateAgreement( + DHPublicKeyParameters pub, + BigInteger message) + { + if (pub == null) + throw new ArgumentNullException("pub"); + if (message == null) + throw new ArgumentNullException("message"); + + if (!pub.Parameters.Equals(dhParams)) + throw new ArgumentException("Diffie-Hellman public key has wrong parameters."); + + BigInteger p = dhParams.P; + + BigInteger peerY = pub.Y; + if (peerY == null || peerY.CompareTo(BigInteger.One) <= 0 || peerY.CompareTo(p.Subtract(BigInteger.One)) >= 0) + throw new ArgumentException("Diffie-Hellman public key is weak"); + + BigInteger result = peerY.ModPow(privateValue, p); + if (result.Equals(BigInteger.One)) + throw new InvalidOperationException("Shared key can't be 1"); + + return message.ModPow(key.X, p).Multiply(result).Mod(p); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs.meta new file mode 100644 index 00000000..4f18db32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e8adac6c91a76364d9616564821b9b82 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs new file mode 100644 index 00000000..aa2ca05f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /** + * a Diffie-Hellman key agreement class. + *

+ * note: This is only the basic algorithm, it doesn't take advantage of + * long term public keys if they are available. See the DHAgreement class + * for a "better" implementation.

+ */ + public class DHBasicAgreement + : IBasicAgreement + { + private DHPrivateKeyParameters key; + private DHParameters dhParams; + + public virtual void Init( + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + if (!(parameters is DHPrivateKeyParameters)) + { + throw new ArgumentException("DHEngine expects DHPrivateKeyParameters"); + } + + this.key = (DHPrivateKeyParameters) parameters; + this.dhParams = key.Parameters; + } + + public virtual int GetFieldSize() + { + return (key.Parameters.P.BitLength + 7) / 8; + } + + /** + * given a short term public key from a given party calculate the next + * message in the agreement sequence. + */ + public virtual BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + if (this.key == null) + throw new InvalidOperationException("Agreement algorithm not initialised"); + + DHPublicKeyParameters pub = (DHPublicKeyParameters)pubKey; + + if (!pub.Parameters.Equals(dhParams)) + throw new ArgumentException("Diffie-Hellman public key has wrong parameters."); + + BigInteger p = dhParams.P; + + BigInteger peerY = pub.Y; + if (peerY == null || peerY.CompareTo(BigInteger.One) <= 0 || peerY.CompareTo(p.Subtract(BigInteger.One)) >= 0) + throw new ArgumentException("Diffie-Hellman public key is weak"); + + BigInteger result = peerY.ModPow(key.X, p); + if (result.Equals(BigInteger.One)) + throw new InvalidOperationException("Shared key can't be 1"); + + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs.meta new file mode 100644 index 00000000..dcb2b188 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dd6d7a6c5af7d4843b43ae13b6023d48 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs new file mode 100644 index 00000000..7d06f0e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs @@ -0,0 +1,253 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /// Standard Diffie-Hellman groups from various IETF specifications. + public class DHStandardGroups + { + private static readonly BigInteger Two = BigInteger.ValueOf(2); + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + private static DHParameters FromPG(string hexP, string hexG) + { + return new DHParameters(FromHex(hexP), FromHex(hexG)); + } + + private static DHParameters SafePrimeGen2(string hexP) + { + return SafePrimeGen2(hexP, 0); + } + + private static DHParameters SafePrimeGen2(string hexP, int l) + { + // NOTE: A group using a safe prime (i.e. q = (p-1)/2), and generator g = 2 + BigInteger p = FromHex(hexP); + return new DHParameters(p, Two, p.ShiftRight(1), l); + } + + /* + * RFC 2409 + */ + private static readonly string rfc2409_768_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"; + public static readonly DHParameters rfc2409_768 = SafePrimeGen2(rfc2409_768_p); + + private static readonly string rfc2409_1024_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381" + + "FFFFFFFFFFFFFFFF"; + public static readonly DHParameters rfc2409_1024 = SafePrimeGen2(rfc2409_1024_p); + + /* + * RFC 3526 + */ + private static readonly string rfc3526_1536_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_1536_l = 200; // RFC3526/RFC7919 + public static readonly DHParameters rfc3526_1536 = SafePrimeGen2(rfc3526_1536_p, rfc3526_1536_l); + + private static readonly string rfc3526_2048_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AACAA68FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_2048_l = System.Math.Max(225, 112 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHParameters rfc3526_2048 = SafePrimeGen2(rfc3526_2048_p, rfc3526_2048_l); + + private static readonly string rfc3526_3072_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_3072_l = System.Math.Max(275, 128 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHParameters rfc3526_3072 = SafePrimeGen2(rfc3526_3072_p, rfc3526_3072_l); + + private static readonly string rfc3526_4096_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" + "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" + + "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" + "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" + + "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" + "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" + + "FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_4096_l = System.Math.Max(325, 152 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHParameters rfc3526_4096 = SafePrimeGen2(rfc3526_4096_p, rfc3526_4096_l); + + private static readonly string rfc3526_6144_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + + "6DCC4024FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_6144_l = System.Math.Max(375, 176 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHParameters rfc3526_6144 = SafePrimeGen2(rfc3526_6144_p, rfc3526_6144_l); + + private static readonly string rfc3526_8192_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" + "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" + + "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" + "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" + + "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" + "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BD" + "F8FF9406AD9E530EE5DB382F413001AEB06A53ED9027D831" + + "179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B" + "DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF" + + "5983CA01C64B92ECF032EA15D1721D03F482D7CE6E74FEF6" + "D55E702F46980C82B5A84031900B1C9E59E7C97FBEC7E8F3" + + "23A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE328" + + "06A1D58BB7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55C" + "DA56C9EC2EF29632387FE8D76E3C0468043E8F663F4860EE" + + "12BF2D5B0B7474D6E694F91E6DBE115974A3926F12FEE5E4" + "38777CB6A932DF8CD8BEC4D073B931BA3BC832B68D9DD300" + + "741FA7BF8AFC47ED2576F6936BA424663AAB639C5AE4F568" + "3423B4742BF1C978238F16CBE39D652DE3FDB8BEFC848AD9" + + "22222E04A4037C0713EB57A81A23F0C73473FC646CEA306B" + "4BCBC8862F8385DDFA9D4B7FA2C087E879683303ED5BDD3A" + + "062B3CF5B3A278A66D2A13F83F44F82DDF310EE074AB6A36" + "4597E899A0255DC164F31CC50846851DF9AB48195DED7EA1" + + "B1D510BD7EE74D73FAF36BC31ECFA268359046F4EB879F92" + "4009438B481C6CD7889A002ED5EE382BC9190DA6FC026E47" + + "9558E4475677E9AA9E3050E2765694DFC81F56E880B96E71" + "60C980DD98EDD3DFFFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_8192_l = System.Math.Max(400, 200 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHParameters rfc3526_8192 = SafePrimeGen2(rfc3526_8192_p, rfc3526_8192_l); + + /* + * RFC 4306 + */ + public static readonly DHParameters rfc4306_768 = rfc2409_768; + public static readonly DHParameters rfc4306_1024 = rfc2409_1024; + + /* + * RFC 5996 + */ + public static readonly DHParameters rfc5996_768 = rfc4306_768; + public static readonly DHParameters rfc5996_1024 = rfc4306_1024; + + /* + * RFC 7919 + */ + private static readonly string rfc7919_ffdhe2048_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B423861285C97FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe2048_l = System.Math.Max(225, 112 * 2); // MAX(RFC7919,FIPS) + public static readonly DHParameters rfc7919_ffdhe2048 = SafePrimeGen2(rfc7919_ffdhe2048_p, rfc7919_ffdhe2048_l); + + private static readonly string rfc7919_ffdhe3072_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B66C62E37FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe3072_l = System.Math.Max(275, 128 * 2); // MAX(RFC7919,FIPS) + public static readonly DHParameters rfc7919_ffdhe3072 = SafePrimeGen2(rfc7919_ffdhe3072_p, rfc7919_ffdhe3072_l); + + private static readonly string rfc7919_ffdhe4096_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E655F6A" + + "FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe4096_l = System.Math.Max(325, 152 * 2); // MAX(RFC7919,FIPS) + public static readonly DHParameters rfc7919_ffdhe4096 = SafePrimeGen2(rfc7919_ffdhe4096_p, rfc7919_ffdhe4096_l); + + private static readonly string rfc7919_ffdhe6144_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E0DD902" + + "0BFD64B645036C7A4E677D2C38532A3A23BA4442CAF53EA6" + "3BB454329B7624C8917BDD64B1C0FD4CB38E8C334C701C3A" + + "CDAD0657FCCFEC719B1F5C3E4E46041F388147FB4CFDB477" + "A52471F7A9A96910B855322EDB6340D8A00EF092350511E3" + + "0ABEC1FFF9E3A26E7FB29F8C183023C3587E38DA0077D9B4" + "763E4E4B94B2BBC194C6651E77CAF992EEAAC0232A281BF6" + + "B3A739C1226116820AE8DB5847A67CBEF9C9091B462D538C" + "D72B03746AE77F5E62292C311562A846505DC82DB854338A" + + "E49F5235C95B91178CCF2DD5CACEF403EC9D1810C6272B04" + "5B3B71F9DC6B80D63FDD4A8E9ADB1E6962A69526D43161C1" + + "A41D570D7938DAD4A40E329CD0E40E65FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe6144_l = System.Math.Max(375, 176 * 2); // MAX(RFC7919,FIPS) + public static readonly DHParameters rfc7919_ffdhe6144 = SafePrimeGen2(rfc7919_ffdhe6144_p, rfc7919_ffdhe6144_l); + + private static readonly string rfc7919_ffdhe8192_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E0DD902" + + "0BFD64B645036C7A4E677D2C38532A3A23BA4442CAF53EA6" + "3BB454329B7624C8917BDD64B1C0FD4CB38E8C334C701C3A" + + "CDAD0657FCCFEC719B1F5C3E4E46041F388147FB4CFDB477" + "A52471F7A9A96910B855322EDB6340D8A00EF092350511E3" + + "0ABEC1FFF9E3A26E7FB29F8C183023C3587E38DA0077D9B4" + "763E4E4B94B2BBC194C6651E77CAF992EEAAC0232A281BF6" + + "B3A739C1226116820AE8DB5847A67CBEF9C9091B462D538C" + "D72B03746AE77F5E62292C311562A846505DC82DB854338A" + + "E49F5235C95B91178CCF2DD5CACEF403EC9D1810C6272B04" + "5B3B71F9DC6B80D63FDD4A8E9ADB1E6962A69526D43161C1" + + "A41D570D7938DAD4A40E329CCFF46AAA36AD004CF600C838" + "1E425A31D951AE64FDB23FCEC9509D43687FEB69EDD1CC5E" + + "0B8CC3BDF64B10EF86B63142A3AB8829555B2F747C932665" + "CB2C0F1CC01BD70229388839D2AF05E454504AC78B758282" + + "2846C0BA35C35F5C59160CC046FD8251541FC68C9C86B022" + "BB7099876A460E7451A8A93109703FEE1C217E6C3826E52C" + + "51AA691E0E423CFC99E9E31650C1217B624816CDAD9A95F9" + "D5B8019488D9C0A0A1FE3075A577E23183F81D4A3F2FA457" + + "1EFC8CE0BA8A4FE8B6855DFE72B0A66EDED2FBABFBE58A30" + "FAFABE1C5D71A87E2F741EF8C1FE86FEA6BBFDE530677F0D" + + "97D11D49F7A8443D0822E506A9F4614E011E2A94838FF88C" + "D68C8BB7C5C6424CFFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe8192_l = System.Math.Max(400, 200 * 2); // MAX(RFC7919,FIPS) + public static readonly DHParameters rfc7919_ffdhe8192 = SafePrimeGen2(rfc7919_ffdhe8192_p, rfc7919_ffdhe8192_l); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs.meta new file mode 100644 index 00000000..8ae06611 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0dec6331289142946bbcb9e8889a4e76 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/DHStandardGroups.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs new file mode 100644 index 00000000..32e9e050 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /** + * P1363 7.2.1 ECSVDP-DH + * + * ECSVDP-DH is Elliptic Curve Secret Value Derivation Primitive, + * Diffie-Hellman version. It is based on the work of [DH76], [Mil86], + * and [Kob87]. This primitive derives a shared secret value from one + * party's private key and another party's public key, where both have + * the same set of EC domain parameters. If two parties correctly + * execute this primitive, they will produce the same output. This + * primitive can be invoked by a scheme to derive a shared secret key; + * specifically, it may be used with the schemes ECKAS-DH1 and + * DL/ECKAS-DH2. It assumes that the input keys are valid (see also + * Section 7.2.2). + */ + public class ECDHBasicAgreement + : IBasicAgreement + { + protected internal ECPrivateKeyParameters privKey; + + public virtual void Init( + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom)parameters).Parameters; + } + + this.privKey = (ECPrivateKeyParameters)parameters; + } + + public virtual int GetFieldSize() + { + return (privKey.Parameters.Curve.FieldSize + 7) / 8; + } + + public virtual BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + ECPublicKeyParameters pub = (ECPublicKeyParameters)pubKey; + ECDomainParameters dp = privKey.Parameters; + if (!dp.Equals(pub.Parameters)) + throw new InvalidOperationException("ECDH public key has wrong domain parameters"); + + BigInteger d = privKey.D; + + // Always perform calculations on the exact curve specified by our private key's parameters + ECPoint Q = ECAlgorithms.CleanPoint(dp.Curve, pub.Q); + if (Q.IsInfinity) + throw new InvalidOperationException("Infinity is not a valid public key for ECDH"); + + BigInteger h = dp.H; + if (!h.Equals(BigInteger.One)) + { + d = dp.HInv.Multiply(d).Mod(dp.N); + Q = ECAlgorithms.ReferenceMultiply(Q, h); + } + + ECPoint P = Q.Multiply(d).Normalize(); + if (P.IsInfinity) + throw new InvalidOperationException("Infinity is not a valid agreement value for ECDH"); + + return P.AffineXCoord.ToBigInteger(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs.meta new file mode 100644 index 00000000..0efeaa2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e166bf1506f59b24b85938755856b0c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs new file mode 100644 index 00000000..1a18e23d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /** + * P1363 7.2.2 ECSVDP-DHC + * + * ECSVDP-DHC is Elliptic Curve Secret Value Derivation Primitive, + * Diffie-Hellman version with cofactor multiplication. It is based on + * the work of [DH76], [Mil86], [Kob87], [LMQ98] and [Kal98a]. This + * primitive derives a shared secret value from one party's private key + * and another party's public key, where both have the same set of EC + * domain parameters. If two parties correctly execute this primitive, + * they will produce the same output. This primitive can be invoked by a + * scheme to derive a shared secret key; specifically, it may be used + * with the schemes ECKAS-DH1 and DL/ECKAS-DH2. It does not assume the + * validity of the input public key (see also Section 7.2.1). + *

+ * Note: As stated P1363 compatibility mode with ECDH can be preset, and + * in this case the implementation doesn't have a ECDH compatibility mode + * (if you want that just use ECDHBasicAgreement and note they both implement + * BasicAgreement!).

+ */ + public class ECDHCBasicAgreement + : IBasicAgreement + { + private ECPrivateKeyParameters privKey; + + public virtual void Init( + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + this.privKey = (ECPrivateKeyParameters)parameters; + } + + public virtual int GetFieldSize() + { + return (privKey.Parameters.Curve.FieldSize + 7) / 8; + } + + public virtual BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + ECPublicKeyParameters pub = (ECPublicKeyParameters)pubKey; + ECDomainParameters dp = privKey.Parameters; + if (!dp.Equals(pub.Parameters)) + throw new InvalidOperationException("ECDHC public key has wrong domain parameters"); + + BigInteger hd = dp.H.Multiply(privKey.D).Mod(dp.N); + + // Always perform calculations on the exact curve specified by our private key's parameters + ECPoint pubPoint = ECAlgorithms.CleanPoint(dp.Curve, pub.Q); + if (pubPoint.IsInfinity) + throw new InvalidOperationException("Infinity is not a valid public key for ECDHC"); + + ECPoint P = pubPoint.Multiply(hd).Normalize(); + if (P.IsInfinity) + throw new InvalidOperationException("Infinity is not a valid agreement value for ECDHC"); + + return P.AffineXCoord.ToBigInteger(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs.meta new file mode 100644 index 00000000..0c048657 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c04de26174e51c4981fd8ee28380d6f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHCBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs new file mode 100644 index 00000000..3407a831 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + public class ECDHWithKdfBasicAgreement + : ECDHBasicAgreement + { + private readonly string algorithm; + private readonly IDerivationFunction kdf; + + public ECDHWithKdfBasicAgreement( + string algorithm, + IDerivationFunction kdf) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (kdf == null) + throw new ArgumentNullException("kdf"); + + this.algorithm = algorithm; + this.kdf = kdf; + } + + public override BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + // Note that the ec.KeyAgreement class in JCE only uses kdf in one + // of the engineGenerateSecret methods. + + BigInteger result = base.CalculateAgreement(pubKey); + + int keySize = GeneratorUtilities.GetDefaultKeySize(algorithm); + + DHKdfParameters dhKdfParams = new DHKdfParameters( + new DerObjectIdentifier(algorithm), + keySize, + BigIntToBytes(result)); + + kdf.Init(dhKdfParams); + + byte[] keyBytes = new byte[keySize / 8]; + kdf.GenerateBytes(keyBytes, 0, keyBytes.Length); + + return new BigInteger(1, keyBytes); + } + + private byte[] BigIntToBytes(BigInteger r) + { + int byteLength = X9IntegerConverter.GetByteLength(privKey.Parameters.Curve); + return X9IntegerConverter.IntegerToBytes(r, byteLength); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs.meta new file mode 100644 index 00000000..e4d4e552 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b758c6f1e001e8f42965f87ad5648014 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECDHWithKdfBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs new file mode 100644 index 00000000..202e82f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + public class ECMqvBasicAgreement + : IBasicAgreement + { + protected internal MqvPrivateParameters privParams; + + public virtual void Init( + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom)parameters).Parameters; + } + + this.privParams = (MqvPrivateParameters)parameters; + } + + public virtual int GetFieldSize() + { + return (privParams.StaticPrivateKey.Parameters.Curve.FieldSize + 7) / 8; + } + + public virtual BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + MqvPublicParameters pubParams = (MqvPublicParameters)pubKey; + + ECPrivateKeyParameters staticPrivateKey = privParams.StaticPrivateKey; + ECDomainParameters parameters = staticPrivateKey.Parameters; + + if (!parameters.Equals(pubParams.StaticPublicKey.Parameters)) + throw new InvalidOperationException("ECMQV public key components have wrong domain parameters"); + + ECPoint agreement = CalculateMqvAgreement(parameters, staticPrivateKey, + privParams.EphemeralPrivateKey, privParams.EphemeralPublicKey, + pubParams.StaticPublicKey, pubParams.EphemeralPublicKey).Normalize(); + + if (agreement.IsInfinity) + throw new InvalidOperationException("Infinity is not a valid agreement value for MQV"); + + return agreement.AffineXCoord.ToBigInteger(); + } + + // The ECMQV Primitive as described in SEC-1, 3.4 + private static ECPoint CalculateMqvAgreement( + ECDomainParameters parameters, + ECPrivateKeyParameters d1U, + ECPrivateKeyParameters d2U, + ECPublicKeyParameters Q2U, + ECPublicKeyParameters Q1V, + ECPublicKeyParameters Q2V) + { + BigInteger n = parameters.N; + int e = (n.BitLength + 1) / 2; + BigInteger powE = BigInteger.One.ShiftLeft(e); + + ECCurve curve = parameters.Curve; + + ECPoint q2u = ECAlgorithms.CleanPoint(curve, Q2U.Q); + ECPoint q1v = ECAlgorithms.CleanPoint(curve, Q1V.Q); + ECPoint q2v = ECAlgorithms.CleanPoint(curve, Q2V.Q); + + BigInteger x = q2u.AffineXCoord.ToBigInteger(); + BigInteger xBar = x.Mod(powE); + BigInteger Q2UBar = xBar.SetBit(e); + BigInteger s = d1U.D.Multiply(Q2UBar).Add(d2U.D).Mod(n); + + BigInteger xPrime = q2v.AffineXCoord.ToBigInteger(); + BigInteger xPrimeBar = xPrime.Mod(powE); + BigInteger Q2VBar = xPrimeBar.SetBit(e); + + BigInteger hs = parameters.H.Multiply(s).Mod(n); + + return ECAlgorithms.SumOfTwoMultiplies( + q1v, Q2VBar.Multiply(hs).Mod(n), q2v, hs); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs.meta new file mode 100644 index 00000000..b8c65351 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e8724404ca73f874eb3e58672f8d7059 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs new file mode 100644 index 00000000..3cba1d37 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + public class ECMqvWithKdfBasicAgreement + : ECMqvBasicAgreement + { + private readonly string algorithm; + private readonly IDerivationFunction kdf; + + public ECMqvWithKdfBasicAgreement( + string algorithm, + IDerivationFunction kdf) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (kdf == null) + throw new ArgumentNullException("kdf"); + + this.algorithm = algorithm; + this.kdf = kdf; + } + + public override BigInteger CalculateAgreement( + ICipherParameters pubKey) + { + // Note that the ec.KeyAgreement class in JCE only uses kdf in one + // of the engineGenerateSecret methods. + + BigInteger result = base.CalculateAgreement(pubKey); + + int keySize = GeneratorUtilities.GetDefaultKeySize(algorithm); + + DHKdfParameters dhKdfParams = new DHKdfParameters( + new DerObjectIdentifier(algorithm), + keySize, + BigIntToBytes(result)); + + kdf.Init(dhKdfParams); + + byte[] keyBytes = new byte[keySize / 8]; + kdf.GenerateBytes(keyBytes, 0, keyBytes.Length); + + return new BigInteger(1, keyBytes); + } + + private byte[] BigIntToBytes(BigInteger r) + { + int byteLength = X9IntegerConverter.GetByteLength(privParams.StaticPrivateKey.Parameters.Curve); + return X9IntegerConverter.IntegerToBytes(r, byteLength); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs.meta new file mode 100644 index 00000000..5f31355e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e8760aeb27a3a3a4196a76b9b928cc97 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/ECMqvWithKdfBasicAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs new file mode 100644 index 00000000..7bb9d50a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs @@ -0,0 +1,278 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + /// + /// SM2 Key Exchange protocol - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 + /// + public class SM2KeyExchange + { + private readonly IDigest mDigest; + + private byte[] mUserID; + private ECPrivateKeyParameters mStaticKey; + private ECPoint mStaticPubPoint; + private ECPoint mEphemeralPubPoint; + private ECDomainParameters mECParams; + private int mW; + private ECPrivateKeyParameters mEphemeralKey; + private bool mInitiator; + + public SM2KeyExchange() + : this(new SM3Digest()) + { + } + + public SM2KeyExchange(IDigest digest) + { + this.mDigest = digest; + } + + public virtual void Init(ICipherParameters privParam) + { + SM2KeyExchangePrivateParameters baseParam; + + if (privParam is ParametersWithID) + { + baseParam = (SM2KeyExchangePrivateParameters)((ParametersWithID)privParam).Parameters; + mUserID = ((ParametersWithID)privParam).GetID(); + } + else + { + baseParam = (SM2KeyExchangePrivateParameters)privParam; + mUserID = new byte[0]; + } + + mInitiator = baseParam.IsInitiator; + mStaticKey = baseParam.StaticPrivateKey; + mEphemeralKey = baseParam.EphemeralPrivateKey; + mECParams = mStaticKey.Parameters; + mStaticPubPoint = baseParam.StaticPublicPoint; + mEphemeralPubPoint = baseParam.EphemeralPublicPoint; + mW = mECParams.Curve.FieldSize / 2 - 1; + } + + public virtual byte[] CalculateKey(int kLen, ICipherParameters pubParam) + { + SM2KeyExchangePublicParameters otherPub; + byte[] otherUserID; + + if (pubParam is ParametersWithID) + { + otherPub = (SM2KeyExchangePublicParameters)((ParametersWithID)pubParam).Parameters; + otherUserID = ((ParametersWithID)pubParam).GetID(); + } + else + { + otherPub = (SM2KeyExchangePublicParameters)pubParam; + otherUserID = new byte[0]; + } + + byte[] za = GetZ(mDigest, mUserID, mStaticPubPoint); + byte[] zb = GetZ(mDigest, otherUserID, otherPub.StaticPublicKey.Q); + + ECPoint U = CalculateU(otherPub); + + byte[] rv; + if (mInitiator) + { + rv = Kdf(U, za, zb, kLen); + } + else + { + rv = Kdf(U, zb, za, kLen); + } + + return rv; + } + + public virtual byte[][] CalculateKeyWithConfirmation(int kLen, byte[] confirmationTag, ICipherParameters pubParam) + { + SM2KeyExchangePublicParameters otherPub; + byte[] otherUserID; + + if (pubParam is ParametersWithID) + { + otherPub = (SM2KeyExchangePublicParameters)((ParametersWithID)pubParam).Parameters; + otherUserID = ((ParametersWithID)pubParam).GetID(); + } + else + { + otherPub = (SM2KeyExchangePublicParameters)pubParam; + otherUserID = new byte[0]; + } + + if (mInitiator && confirmationTag == null) + throw new ArgumentException("if initiating, confirmationTag must be set"); + + byte[] za = GetZ(mDigest, mUserID, mStaticPubPoint); + byte[] zb = GetZ(mDigest, otherUserID, otherPub.StaticPublicKey.Q); + + ECPoint U = CalculateU(otherPub); + + byte[] rv; + if (mInitiator) + { + rv = Kdf(U, za, zb, kLen); + + byte[] inner = CalculateInnerHash(mDigest, U, za, zb, mEphemeralPubPoint, otherPub.EphemeralPublicKey.Q); + + byte[] s1 = S1(mDigest, U, inner); + + if (!Arrays.ConstantTimeAreEqual(s1, confirmationTag)) + throw new InvalidOperationException("confirmation tag mismatch"); + + return new byte[][] { rv, S2(mDigest, U, inner)}; + } + else + { + rv = Kdf(U, zb, za, kLen); + + byte[] inner = CalculateInnerHash(mDigest, U, zb, za, otherPub.EphemeralPublicKey.Q, mEphemeralPubPoint); + + return new byte[][] { rv, S1(mDigest, U, inner), S2(mDigest, U, inner) }; + } + } + + protected virtual ECPoint CalculateU(SM2KeyExchangePublicParameters otherPub) + { + ECDomainParameters dp = mStaticKey.Parameters; + + ECPoint p1 = ECAlgorithms.CleanPoint(dp.Curve, otherPub.StaticPublicKey.Q); + ECPoint p2 = ECAlgorithms.CleanPoint(dp.Curve, otherPub.EphemeralPublicKey.Q); + + BigInteger x1 = Reduce(mEphemeralPubPoint.AffineXCoord.ToBigInteger()); + BigInteger x2 = Reduce(p2.AffineXCoord.ToBigInteger()); + BigInteger tA = mStaticKey.D.Add(x1.Multiply(mEphemeralKey.D)); + BigInteger k1 = mECParams.H.Multiply(tA).Mod(mECParams.N); + BigInteger k2 = k1.Multiply(x2).Mod(mECParams.N); + + return ECAlgorithms.SumOfTwoMultiplies(p1, k1, p2, k2).Normalize(); + } + + protected virtual byte[] Kdf(ECPoint u, byte[] za, byte[] zb, int klen) + { + int digestSize = mDigest.GetDigestSize(); + byte[] buf = new byte[System.Math.Max(4, digestSize)]; + byte[] rv = new byte[(klen + 7) / 8]; + int off = 0; + + IMemoable memo = mDigest as IMemoable; + IMemoable copy = null; + + if (memo != null) + { + AddFieldElement(mDigest, u.AffineXCoord); + AddFieldElement(mDigest, u.AffineYCoord); + mDigest.BlockUpdate(za, 0, za.Length); + mDigest.BlockUpdate(zb, 0, zb.Length); + copy = memo.Copy(); + } + + uint ct = 0; + + while (off < rv.Length) + { + if (memo != null) + { + memo.Reset(copy); + } + else + { + AddFieldElement(mDigest, u.AffineXCoord); + AddFieldElement(mDigest, u.AffineYCoord); + mDigest.BlockUpdate(za, 0, za.Length); + mDigest.BlockUpdate(zb, 0, zb.Length); + } + + Pack.UInt32_To_BE(++ct, buf, 0); + mDigest.BlockUpdate(buf, 0, 4); + mDigest.DoFinal(buf, 0); + + int copyLen = System.Math.Min(digestSize, rv.Length - off); + Array.Copy(buf, 0, rv, off, copyLen); + off += copyLen; + } + + return rv; + } + + //x1~=2^w+(x1 AND (2^w-1)) + private BigInteger Reduce(BigInteger x) + { + return x.And(BigInteger.One.ShiftLeft(mW).Subtract(BigInteger.One)).SetBit(mW); + } + + private byte[] S1(IDigest digest, ECPoint u, byte[] inner) + { + digest.Update((byte)0x02); + AddFieldElement(digest, u.AffineYCoord); + digest.BlockUpdate(inner, 0, inner.Length); + + return DigestUtilities.DoFinal(digest); + } + + private byte[] CalculateInnerHash(IDigest digest, ECPoint u, byte[] za, byte[] zb, ECPoint p1, ECPoint p2) + { + AddFieldElement(digest, u.AffineXCoord); + digest.BlockUpdate(za, 0, za.Length); + digest.BlockUpdate(zb, 0, zb.Length); + AddFieldElement(digest, p1.AffineXCoord); + AddFieldElement(digest, p1.AffineYCoord); + AddFieldElement(digest, p2.AffineXCoord); + AddFieldElement(digest, p2.AffineYCoord); + + return DigestUtilities.DoFinal(digest); + } + + private byte[] S2(IDigest digest, ECPoint u, byte[] inner) + { + digest.Update((byte)0x03); + AddFieldElement(digest, u.AffineYCoord); + digest.BlockUpdate(inner, 0, inner.Length); + + return DigestUtilities.DoFinal(digest); + } + + private byte[] GetZ(IDigest digest, byte[] userID, ECPoint pubPoint) + { + AddUserID(digest, userID); + + AddFieldElement(digest, mECParams.Curve.A); + AddFieldElement(digest, mECParams.Curve.B); + AddFieldElement(digest, mECParams.G.AffineXCoord); + AddFieldElement(digest, mECParams.G.AffineYCoord); + AddFieldElement(digest, pubPoint.AffineXCoord); + AddFieldElement(digest, pubPoint.AffineYCoord); + + return DigestUtilities.DoFinal(digest); + } + + private void AddUserID(IDigest digest, byte[] userID) + { + uint len = (uint)(userID.Length * 8); + + digest.Update((byte)(len >> 8)); + digest.Update((byte)len); + digest.BlockUpdate(userID, 0, userID.Length); + } + + private void AddFieldElement(IDigest digest, ECFieldElement v) + { + byte[] p = v.GetEncoded(); + digest.BlockUpdate(p, 0, p.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs.meta new file mode 100644 index 00000000..b9fa0079 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 118adaca026b05a44a9842f407f1e076 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/SM2KeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs new file mode 100644 index 00000000..709601e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + public sealed class X25519Agreement + : IRawAgreement + { + private X25519PrivateKeyParameters m_privateKey; + + public void Init(ICipherParameters parameters) + { + m_privateKey = (X25519PrivateKeyParameters)parameters; + } + + public int AgreementSize + { + get { return X25519PrivateKeyParameters.SecretSize; } + } + + public void CalculateAgreement(ICipherParameters publicKey, byte[] buf, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + CalculateAgreement(publicKey, buf.AsSpan(off)); +#else + m_privateKey.GenerateSecret((X25519PublicKeyParameters)publicKey, buf, off); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void CalculateAgreement(ICipherParameters publicKey, Span buf) + { + m_privateKey.GenerateSecret((X25519PublicKeyParameters)publicKey, buf); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs.meta new file mode 100644 index 00000000..4d79f31e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b5273366d612f0746be590ece68e701c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X25519Agreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs new file mode 100644 index 00000000..8a890c30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement +{ + public sealed class X448Agreement + : IRawAgreement + { + private X448PrivateKeyParameters m_privateKey; + + public void Init(ICipherParameters parameters) + { + m_privateKey = (X448PrivateKeyParameters)parameters; + } + + public int AgreementSize + { + get { return X448PrivateKeyParameters.SecretSize; } + } + + public void CalculateAgreement(ICipherParameters publicKey, byte[] buf, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + CalculateAgreement(publicKey, buf.AsSpan(off)); +#else + m_privateKey.GenerateSecret((X448PublicKeyParameters)publicKey, buf, off); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void CalculateAgreement(ICipherParameters publicKey, Span buf) + { + m_privateKey.GenerateSecret((X448PublicKeyParameters)publicKey, buf); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs.meta new file mode 100644 index 00000000..fb583e97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d66ce3e4995fdf43bcdc41991f1eb78 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/X448Agreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake.meta new file mode 100644 index 00000000..0e61c4cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 129fcded50103884aacaaca2ee8f373d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs new file mode 100644 index 00000000..d0997d6b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs @@ -0,0 +1,459 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// A participant in a Password Authenticated Key Exchange by Juggling (J-PAKE) exchange. + /// + /// The J-PAKE exchange is defined by Feng Hao and Peter Ryan in the paper + /// + /// "Password Authenticated Key Exchange by Juggling, 2008." + /// + /// The J-PAKE protocol is symmetric. + /// There is no notion of a client or server, but rather just two participants. + /// An instance of JPakeParticipant represents one participant, and + /// is the primary interface for executing the exchange. + /// + /// To execute an exchange, construct a JPakeParticipant on each end, + /// and call the following 7 methods + /// (once and only once, in the given order, for each participant, sending messages between them as described): + /// + /// CreateRound1PayloadToSend() - and send the payload to the other participant + /// ValidateRound1PayloadReceived(JPakeRound1Payload) - use the payload received from the other participant + /// CreateRound2PayloadToSend() - and send the payload to the other participant + /// ValidateRound2PayloadReceived(JPakeRound2Payload) - use the payload received from the other participant + /// CalculateKeyingMaterial() + /// CreateRound3PayloadToSend(BigInteger) - and send the payload to the other participant + /// ValidateRound3PayloadReceived(JPakeRound3Payload, BigInteger) - use the payload received from the other participant + /// + /// Each side should derive a session key from the keying material returned by CalculateKeyingMaterial(). + /// The caller is responsible for deriving the session key using a secure key derivation function (KDF). + /// + /// Round 3 is an optional key confirmation process. + /// If you do not execute round 3, then there is no assurance that both participants are using the same key. + /// (i.e. if the participants used different passwords, then their session keys will differ.) + /// + /// If the round 3 validation succeeds, then the keys are guaranteed to be the same on both sides. + /// + /// The symmetric design can easily support the asymmetric cases when one party initiates the communication. + /// e.g. Sometimes the round1 payload and round2 payload may be sent in one pass. + /// Also, in some cases, the key confirmation payload can be sent together with the round2 payload. + /// These are the trivial techniques to optimize the communication. + /// + /// The key confirmation process is implemented as specified in + /// NIST SP 800-56A Revision 1, + /// Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes. + /// + /// This class is stateful and NOT threadsafe. + /// Each instance should only be used for ONE complete J-PAKE exchange + /// (i.e. a new JPakeParticipant should be constructed for each new J-PAKE exchange). + /// + public class JPakeParticipant + { + // Possible internal states. Used for state checking. + public static readonly int STATE_INITIALIZED = 0; + public static readonly int STATE_ROUND_1_CREATED = 10; + public static readonly int STATE_ROUND_1_VALIDATED = 20; + public static readonly int STATE_ROUND_2_CREATED = 30; + public static readonly int STATE_ROUND_2_VALIDATED = 40; + public static readonly int STATE_KEY_CALCULATED = 50; + public static readonly int STATE_ROUND_3_CREATED = 60; + public static readonly int STATE_ROUND_3_VALIDATED = 70; + + // Unique identifier of this participant. + // The two participants in the exchange must NOT share the same id. + private string participantId; + + // Shared secret. This only contains the secret between construction + // and the call to CalculateKeyingMaterial(). + // + // i.e. When CalculateKeyingMaterial() is called, this buffer overwritten with 0's, + // and the field is set to null. + private char[] password; + + // Digest to use during calculations. + private IDigest digest; + + // Source of secure random data. + private readonly SecureRandom random; + + private readonly BigInteger p; + private readonly BigInteger q; + private readonly BigInteger g; + + // The participantId of the other participant in this exchange. + private string partnerParticipantId; + + // Alice's x1 or Bob's x3. + private BigInteger x1; + // Alice's x2 or Bob's x4. + private BigInteger x2; + // Alice's g^x1 or Bob's g^x3. + private BigInteger gx1; + // Alice's g^x2 or Bob's g^x4. + private BigInteger gx2; + // Alice's g^x3 or Bob's g^x1. + private BigInteger gx3; + // Alice's g^x4 or Bob's g^x2. + private BigInteger gx4; + // Alice's B or Bob's A. + private BigInteger b; + + // The current state. + // See the STATE_* constants for possible values. + private int state; + + /// + /// Convenience constructor for a new JPakeParticipant that uses + /// the JPakePrimeOrderGroups#NIST_3072 prime order group, + /// a SHA-256 digest, and a default SecureRandom implementation. + /// + /// After construction, the State state will be STATE_INITIALIZED. + /// + /// Throws NullReferenceException if any argument is null. Throws + /// ArgumentException if password is empty. + /// + /// Unique identifier of this participant. + /// The two participants in the exchange must NOT share the same id. + /// Shared secret. + /// A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called). + /// Caller should clear the input password as soon as possible. + public JPakeParticipant(string participantId, char[] password) + : this(participantId, password, JPakePrimeOrderGroups.NIST_3072) { } + + /// + /// Convenience constructor for a new JPakeParticipant that uses + /// a SHA-256 digest, and a default SecureRandom implementation. + /// + /// After construction, the State state will be STATE_INITIALIZED. + /// + /// Throws NullReferenceException if any argument is null. Throws + /// ArgumentException if password is empty. + /// + /// Unique identifier of this participant. + /// The two participants in the exchange must NOT share the same id. + /// Shared secret. + /// A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called). + /// Caller should clear the input password as soon as possible. + /// Prime order group. See JPakePrimeOrderGroups for standard groups. + public JPakeParticipant(string participantId, char[] password, JPakePrimeOrderGroup group) + : this(participantId, password, group, new Sha256Digest(), CryptoServicesRegistrar.GetSecureRandom()) { } + + + /// + /// Constructor for a new JPakeParticipant. + /// + /// After construction, the State state will be STATE_INITIALIZED. + /// + /// Throws NullReferenceException if any argument is null. Throws + /// ArgumentException if password is empty. + /// + /// Unique identifier of this participant. + /// The two participants in the exchange must NOT share the same id. + /// Shared secret. + /// A defensive copy of this array is made (and cleared once CalculateKeyingMaterial() is called). + /// Caller should clear the input password as soon as possible. + /// Prime order group. See JPakePrimeOrderGroups for standard groups. + /// Digest to use during zero knowledge proofs and key confirmation + /// (SHA-256 or stronger preferred). + /// Source of secure random data for x1 and x2, and for the zero knowledge proofs. + public JPakeParticipant(string participantId, char[] password, JPakePrimeOrderGroup group, IDigest digest, + SecureRandom random) + { + JPakeUtilities.ValidateNotNull(participantId, "participantId"); + JPakeUtilities.ValidateNotNull(password, "password"); + JPakeUtilities.ValidateNotNull(group, "p"); + JPakeUtilities.ValidateNotNull(digest, "digest"); + JPakeUtilities.ValidateNotNull(random, "random"); + + if (password.Length == 0) + throw new ArgumentException("Password must not be empty."); + + this.participantId = participantId; + + // Create a defensive copy so as to fully encapsulate the password. + // + // This array will contain the password for the lifetime of this + // participant BEFORE CalculateKeyingMaterial() is called. + // + // i.e. When CalculateKeyingMaterial() is called, the array will be cleared + // in order to remove the password from memory. + // + // The caller is responsible for clearing the original password array + // given as input to this constructor. + this.password = new char[password.Length]; + Array.Copy(password, this.password, password.Length); + + this.p = group.P; + this.q = group.Q; + this.g = group.G; + + this.digest = digest; + this.random = random; + + this.state = STATE_INITIALIZED; + } + + /// + /// Gets the current state of this participant. + /// See the STATE_* constants for possible values. + /// + public virtual int State + { + get { return state; } + } + + + /// + /// Creates and returns the payload to send to the other participant during round 1. + /// + /// After execution, the State state} will be STATE_ROUND_1_CREATED}. + /// + public virtual JPakeRound1Payload CreateRound1PayloadToSend() + { + if (this.state >= STATE_ROUND_1_CREATED) + throw new InvalidOperationException("Round 1 payload already created for " + this.participantId); + + this.x1 = JPakeUtilities.GenerateX1(q, random); + this.x2 = JPakeUtilities.GenerateX2(q, random); + + this.gx1 = JPakeUtilities.CalculateGx(p, g, x1); + this.gx2 = JPakeUtilities.CalculateGx(p, g, x2); + BigInteger[] knowledgeProofForX1 = JPakeUtilities.CalculateZeroKnowledgeProof(p, q, g, gx1, x1, participantId, digest, random); + BigInteger[] knowledgeProofForX2 = JPakeUtilities.CalculateZeroKnowledgeProof(p, q, g, gx2, x2, participantId, digest, random); + + this.state = STATE_ROUND_1_CREATED; + + return new JPakeRound1Payload(participantId, gx1, gx2, knowledgeProofForX1, knowledgeProofForX2); + } + + /// + /// Validates the payload received from the other participant during round 1. + /// + /// Must be called prior to CreateRound2PayloadToSend(). + /// + /// After execution, the State state will be STATE_ROUND_1_VALIDATED. + /// + /// Throws CryptoException if validation fails. Throws InvalidOperationException + /// if called multiple times. + /// + public virtual void ValidateRound1PayloadReceived(JPakeRound1Payload round1PayloadReceived) + { + if (this.state >= STATE_ROUND_1_VALIDATED) + throw new InvalidOperationException("Validation already attempted for round 1 payload for " + this.participantId); + + this.partnerParticipantId = round1PayloadReceived.ParticipantId; + this.gx3 = round1PayloadReceived.Gx1; + this.gx4 = round1PayloadReceived.Gx2; + + BigInteger[] knowledgeProofForX3 = round1PayloadReceived.KnowledgeProofForX1; + BigInteger[] knowledgeProofForX4 = round1PayloadReceived.KnowledgeProofForX2; + + JPakeUtilities.ValidateParticipantIdsDiffer(participantId, round1PayloadReceived.ParticipantId); + JPakeUtilities.ValidateGx4(gx4); + JPakeUtilities.ValidateZeroKnowledgeProof(p, q, g, gx3, knowledgeProofForX3, round1PayloadReceived.ParticipantId, digest); + JPakeUtilities.ValidateZeroKnowledgeProof(p, q, g, gx4, knowledgeProofForX4, round1PayloadReceived.ParticipantId, digest); + this.state = STATE_ROUND_1_VALIDATED; + } + + /// + /// Creates and returns the payload to send to the other participant during round 2. + /// + /// ValidateRound1PayloadReceived(JPakeRound1Payload) must be called prior to this method. + /// + /// After execution, the State state will be STATE_ROUND_2_CREATED. + /// + /// Throws InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times + /// + public virtual JPakeRound2Payload CreateRound2PayloadToSend() + { + if (this.state >= STATE_ROUND_2_CREATED) + throw new InvalidOperationException("Round 2 payload already created for " + this.participantId); + if (this.state < STATE_ROUND_1_VALIDATED) + throw new InvalidOperationException("Round 1 payload must be validated prior to creating round 2 payload for " + this.participantId); + + BigInteger gA = JPakeUtilities.CalculateGA(p, gx1, gx3, gx4); + BigInteger s = JPakeUtilities.CalculateS(password); + BigInteger x2s = JPakeUtilities.CalculateX2s(q, x2, s); + BigInteger A = JPakeUtilities.CalculateA(p, q, gA, x2s); + BigInteger[] knowledgeProofForX2s = JPakeUtilities.CalculateZeroKnowledgeProof(p, q, gA, A, x2s, participantId, digest, random); + + this.state = STATE_ROUND_2_CREATED; + + return new JPakeRound2Payload(participantId, A, knowledgeProofForX2s); + } + + /// + /// Validates the payload received from the other participant during round 2. + /// Note that this DOES NOT detect a non-common password. + /// The only indication of a non-common password is through derivation + /// of different keys (which can be detected explicitly by executing round 3 and round 4) + /// + /// Must be called prior to CalculateKeyingMaterial(). + /// + /// After execution, the State state will be STATE_ROUND_2_VALIDATED. + /// + /// Throws CryptoException if validation fails. Throws + /// InvalidOperationException if called prior to ValidateRound1PayloadReceived(JPakeRound1Payload), or multiple times + /// + public virtual void ValidateRound2PayloadReceived(JPakeRound2Payload round2PayloadReceived) + { + if (this.state >= STATE_ROUND_2_VALIDATED) + throw new InvalidOperationException("Validation already attempted for round 2 payload for " + this.participantId); + if (this.state < STATE_ROUND_1_VALIDATED) + throw new InvalidOperationException("Round 1 payload must be validated prior to validation round 2 payload for " + this.participantId); + + BigInteger gB = JPakeUtilities.CalculateGA(p, gx3, gx1, gx2); + this.b = round2PayloadReceived.A; + BigInteger[] knowledgeProofForX4s = round2PayloadReceived.KnowledgeProofForX2s; + + JPakeUtilities.ValidateParticipantIdsDiffer(participantId, round2PayloadReceived.ParticipantId); + JPakeUtilities.ValidateParticipantIdsEqual(this.partnerParticipantId, round2PayloadReceived.ParticipantId); + JPakeUtilities.ValidateGa(gB); + JPakeUtilities.ValidateZeroKnowledgeProof(p, q, gB, b, knowledgeProofForX4s, round2PayloadReceived.ParticipantId, digest); + + this.state = STATE_ROUND_2_VALIDATED; + } + + /// + /// Calculates and returns the key material. + /// A session key must be derived from this key material using a secure key derivation function (KDF). + /// The KDF used to derive the key is handled externally (i.e. not by JPakeParticipant). + /// + /// The keying material will be identical for each participant if and only if + /// each participant's password is the same. i.e. If the participants do not + /// share the same password, then each participant will derive a different key. + /// Therefore, if you immediately start using a key derived from + /// the keying material, then you must handle detection of incorrect keys. + /// If you want to handle this detection explicitly, you can optionally perform + /// rounds 3 and 4. See JPakeParticipant for details on how to execute + /// rounds 3 and 4. + /// + /// The keying material will be in the range [0, p-1]. + /// + /// ValidateRound2PayloadReceived(JPakeRound2Payload) must be called prior to this method. + /// + /// As a side effect, the internal password array is cleared, since it is no longer needed. + /// + /// After execution, the State state will be STATE_KEY_CALCULATED. + /// + /// Throws InvalidOperationException if called prior to ValidateRound2PayloadReceived(JPakeRound2Payload), + /// or if called multiple times. + /// + public virtual BigInteger CalculateKeyingMaterial() + { + if (this.state >= STATE_KEY_CALCULATED) + throw new InvalidOperationException("Key already calculated for " + participantId); + if (this.state < STATE_ROUND_2_VALIDATED) + throw new InvalidOperationException("Round 2 payload must be validated prior to creating key for " + participantId); + + BigInteger s = JPakeUtilities.CalculateS(password); + + // Clear the password array from memory, since we don't need it anymore. + // Also set the field to null as a flag to indicate that the key has already been calculated. + Array.Clear(password, 0, password.Length); + this.password = null; + + BigInteger keyingMaterial = JPakeUtilities.CalculateKeyingMaterial(p, q, gx4, x2, s, b); + + // Clear the ephemeral private key fields as well. + // Note that we're relying on the garbage collector to do its job to clean these up. + // The old objects will hang around in memory until the garbage collector destroys them. + // + // If the ephemeral private keys x1 and x2 are leaked, + // the attacker might be able to brute-force the password. + this.x1 = null; + this.x2 = null; + this.b = null; + + // Do not clear gx* yet, since those are needed by round 3. + + this.state = STATE_KEY_CALCULATED; + + return keyingMaterial; + } + + /// + /// Creates and returns the payload to send to the other participant during round 3. + /// + /// See JPakeParticipant for more details on round 3. + /// + /// After execution, the State state} will be STATE_ROUND_3_CREATED. + /// Throws InvalidOperationException if called prior to CalculateKeyingMaterial, or multiple + /// times. + /// + /// The keying material as returned from CalculateKeyingMaterial(). + public virtual JPakeRound3Payload CreateRound3PayloadToSend(BigInteger keyingMaterial) + { + if (this.state >= STATE_ROUND_3_CREATED) + throw new InvalidOperationException("Round 3 payload already created for " + this.participantId); + if (this.state < STATE_KEY_CALCULATED) + throw new InvalidOperationException("Keying material must be calculated prior to creating round 3 payload for " + this.participantId); + + BigInteger macTag = JPakeUtilities.CalculateMacTag( + this.participantId, + this.partnerParticipantId, + this.gx1, + this.gx2, + this.gx3, + this.gx4, + keyingMaterial, + this.digest); + + this.state = STATE_ROUND_3_CREATED; + + return new JPakeRound3Payload(participantId, macTag); + } + + /// + /// Validates the payload received from the other participant during round 3. + /// + /// See JPakeParticipant for more details on round 3. + /// + /// After execution, the State state will be STATE_ROUND_3_VALIDATED. + /// + /// Throws CryptoException if validation fails. Throws InvalidOperationException if called prior to + /// CalculateKeyingMaterial or multiple times + /// + /// The round 3 payload received from the other participant. + /// The keying material as returned from CalculateKeyingMaterial(). + public virtual void ValidateRound3PayloadReceived(JPakeRound3Payload round3PayloadReceived, BigInteger keyingMaterial) + { + if (this.state >= STATE_ROUND_3_VALIDATED) + throw new InvalidOperationException("Validation already attempted for round 3 payload for " + this.participantId); + if (this.state < STATE_KEY_CALCULATED) + throw new InvalidOperationException("Keying material must be calculated prior to validating round 3 payload for " + this.participantId); + + JPakeUtilities.ValidateParticipantIdsDiffer(participantId, round3PayloadReceived.ParticipantId); + JPakeUtilities.ValidateParticipantIdsEqual(this.partnerParticipantId, round3PayloadReceived.ParticipantId); + + JPakeUtilities.ValidateMacTag( + this.participantId, + this.partnerParticipantId, + this.gx1, + this.gx2, + this.gx3, + this.gx4, + keyingMaterial, + this.digest, + round3PayloadReceived.MacTag); + + // Clear the rest of the fields. + this.gx1 = null; + this.gx2 = null; + this.gx3 = null; + this.gx4 = null; + + this.state = STATE_ROUND_3_VALIDATED; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs.meta new file mode 100644 index 00000000..2ed2d17a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a44e1a709319484fbb595c41ceae6f6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeParticipant.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs new file mode 100644 index 00000000..47b5ad63 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// A pre-computed prime order group for use during a J-PAKE exchange. + /// + /// Typically a Schnorr group is used. In general, J-PAKE can use any prime order group + /// that is suitable for public key cryptography, including elliptic curve cryptography. + /// + /// See JPakePrimeOrderGroups for convenient standard groups. + /// + /// NIST publishes + /// many groups that can be used for the desired level of security. + /// + public class JPakePrimeOrderGroup + { + private readonly BigInteger p; + private readonly BigInteger q; + private readonly BigInteger g; + + /// + /// Constructs a new JPakePrimeOrderGroup. + /// + /// In general, you should use one of the pre-approved groups from + /// JPakePrimeOrderGroups, rather than manually constructing one. + /// + /// The following basic checks are performed: + /// + /// p-1 must be evenly divisible by q + /// g must be in [2, p-1] + /// g^q mod p must equal 1 + /// p must be prime (within reasonably certainty) + /// q must be prime (within reasonably certainty) + /// + /// The prime checks are performed using BigInteger#isProbablePrime(int), + /// and are therefore subject to the same probability guarantees. + /// + /// These checks prevent trivial mistakes. + /// However, due to the small uncertainties if p and q are not prime, + /// advanced attacks are not prevented. + /// Use it at your own risk. + /// + /// Throws NullReferenceException if any argument is null. Throws + /// InvalidOperationException is any of the above validations fail. + /// + public JPakePrimeOrderGroup(BigInteger p, BigInteger q, BigInteger g) + : this(p, q, g, false) + { + // Don't skip the checks on user-specified groups. + } + + /// + /// Constructor used by the pre-approved groups in JPakePrimeOrderGroups. + /// These pre-approved groups can avoid the expensive checks. + /// User-specified groups should not use this constructor. + /// + public JPakePrimeOrderGroup(BigInteger p, BigInteger q, BigInteger g, bool skipChecks) + { + JPakeUtilities.ValidateNotNull(p, "p"); + JPakeUtilities.ValidateNotNull(q, "q"); + JPakeUtilities.ValidateNotNull(g, "g"); + + if (!skipChecks) + { + if (!p.Subtract(JPakeUtilities.One).Mod(q).Equals(JPakeUtilities.Zero)) + throw new ArgumentException("p-1 must be evenly divisible by q"); + if (g.CompareTo(BigInteger.Two) == -1 || g.CompareTo(p.Subtract(JPakeUtilities.One)) == 1) + throw new ArgumentException("g must be in [2, p-1]"); + if (!g.ModPow(q, p).Equals(JPakeUtilities.One)) + throw new ArgumentException("g^q mod p must equal 1"); + + // Note these checks do not guarantee that p and q are prime. + // We just have reasonable certainty that they are prime. + if (!p.IsProbablePrime(20)) + throw new ArgumentException("p must be prime"); + if (!q.IsProbablePrime(20)) + throw new ArgumentException("q must be prime"); + } + + this.p = p; + this.q = q; + this.g = g; + } + + public virtual BigInteger P + { + get { return p; } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public virtual BigInteger G + { + get { return g; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs.meta new file mode 100644 index 00000000..342148f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f3a2f982f4c3de4dabcd30a73afb055 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroup.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs new file mode 100644 index 00000000..51c5067e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// Standard pre-computed prime order groups for use by J-PAKE. + /// (J-PAKE can use pre-computed prime order groups, same as DSA and Diffie-Hellman.) + ///

+ /// This class contains some convenient constants for use as input for + /// constructing {@link JPAKEParticipant}s. + ///

+ /// The prime order groups below are taken from Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB), + /// and from the prime order groups + /// published by NIST. + ///

+ public class JPakePrimeOrderGroups + { + /// + /// From Sun's JDK JavaDoc (docs/guide/security/CryptoSpec.html#AppB) + /// 1024-bit p, 160-bit q and 1024-bit g for 80-bit security. + /// + public static readonly JPakePrimeOrderGroup SUN_JCE_1024 = new JPakePrimeOrderGroup( + // p + new BigInteger( + "fd7f53811d75122952df4a9c2eece4e7f611b7523cef4400c31e3f80b6512669" + + "455d402251fb593d8d58fabfc5f5ba30f6cb9b556cd7813b801d346ff26660b7" + + "6b9950a5a49f9fe8047b1022c24fbba9d7feb7c61bf83b57e7c6a8a6150f04fb" + + "83f6d3c51ec3023554135a169132f675f3ae2b61d72aeff22203199dd14801c7", 16), + // q + new BigInteger("9760508f15230bccb292b982a2eb840bf0581cf5", 16), + // g + new BigInteger( + "f7e1a085d69b3ddecbbcab5c36b857b97994afbbfa3aea82f9574c0b3d078267" + + "5159578ebad4594fe67107108180b449167123e84c281613b7cf09328cc8a6e1" + + "3c167a8b547c8d28e0a3ae1e2bb3a675916ea37f0bfa213562f1fb627a01243b" + + "cca4f1bea8519089a883dfe15ae59f06928b665e807b552564014c3bfecf492a", 16), + true + ); + + /// + /// From NIST. + /// 2048-bit p, 224-bit q and 2048-bit g for 112-bit security. + /// + public static readonly JPakePrimeOrderGroup NIST_2048 = new JPakePrimeOrderGroup( + // p + new BigInteger( + "C196BA05AC29E1F9C3C72D56DFFC6154A033F1477AC88EC37F09BE6C5BB95F51" + + "C296DD20D1A28A067CCC4D4316A4BD1DCA55ED1066D438C35AEBAABF57E7DAE4" + + "28782A95ECA1C143DB701FD48533A3C18F0FE23557EA7AE619ECACC7E0B51652" + + "A8776D02A425567DED36EABD90CA33A1E8D988F0BBB92D02D1D20290113BB562" + + "CE1FC856EEB7CDD92D33EEA6F410859B179E7E789A8F75F645FAE2E136D252BF" + + "FAFF89528945C1ABE705A38DBC2D364AADE99BE0D0AAD82E5320121496DC65B3" + + "930E38047294FF877831A16D5228418DE8AB275D7D75651CEFED65F78AFC3EA7" + + "FE4D79B35F62A0402A1117599ADAC7B269A59F353CF450E6982D3B1702D9CA83", 16), + // q + new BigInteger("90EAF4D1AF0708B1B612FF35E0A2997EB9E9D263C9CE659528945C0D", 16), + // g + new BigInteger( + "A59A749A11242C58C894E9E5A91804E8FA0AC64B56288F8D47D51B1EDC4D6544" + + "4FECA0111D78F35FC9FDD4CB1F1B79A3BA9CBEE83A3F811012503C8117F98E50" + + "48B089E387AF6949BF8784EBD9EF45876F2E6A5A495BE64B6E770409494B7FEE" + + "1DBB1E4B2BC2A53D4F893D418B7159592E4FFFDF6969E91D770DAEBD0B5CB14C" + + "00AD68EC7DC1E5745EA55C706C4A1C5C88964E34D09DEB753AD418C1AD0F4FDF" + + "D049A955E5D78491C0B7A2F1575A008CCD727AB376DB6E695515B05BD412F5B8" + + "C2F4C77EE10DA48ABD53F5DD498927EE7B692BBBCDA2FB23A516C5B4533D7398" + + "0B2A3B60E384ED200AE21B40D273651AD6060C13D97FD69AA13C5611A51B9085", 16), + true + ); + + /// + /// From NIST. + /// 3072-bit p, 256-bit q and 3072-bit g for 128-bit security. + /// + public static readonly JPakePrimeOrderGroup NIST_3072 = new JPakePrimeOrderGroup( + // p + new BigInteger( + "90066455B5CFC38F9CAA4A48B4281F292C260FEEF01FD61037E56258A7795A1C" + + "7AD46076982CE6BB956936C6AB4DCFE05E6784586940CA544B9B2140E1EB523F" + + "009D20A7E7880E4E5BFA690F1B9004A27811CD9904AF70420EEFD6EA11EF7DA1" + + "29F58835FF56B89FAA637BC9AC2EFAAB903402229F491D8D3485261CD068699B" + + "6BA58A1DDBBEF6DB51E8FE34E8A78E542D7BA351C21EA8D8F1D29F5D5D159394" + + "87E27F4416B0CA632C59EFD1B1EB66511A5A0FBF615B766C5862D0BD8A3FE7A0" + + "E0DA0FB2FE1FCB19E8F9996A8EA0FCCDE538175238FC8B0EE6F29AF7F642773E" + + "BE8CD5402415A01451A840476B2FCEB0E388D30D4B376C37FE401C2A2C2F941D" + + "AD179C540C1C8CE030D460C4D983BE9AB0B20F69144C1AE13F9383EA1C08504F" + + "B0BF321503EFE43488310DD8DC77EC5B8349B8BFE97C2C560EA878DE87C11E3D" + + "597F1FEA742D73EEC7F37BE43949EF1A0D15C3F3E3FC0A8335617055AC91328E" + + "C22B50FC15B941D3D1624CD88BC25F3E941FDDC6200689581BFEC416B4B2CB73", 16), + // q + new BigInteger("CFA0478A54717B08CE64805B76E5B14249A77A4838469DF7F7DC987EFCCFB11D", 16), + // g + new BigInteger( + "5E5CBA992E0A680D885EB903AEA78E4A45A469103D448EDE3B7ACCC54D521E37" + + "F84A4BDD5B06B0970CC2D2BBB715F7B82846F9A0C393914C792E6A923E2117AB" + + "805276A975AADB5261D91673EA9AAFFEECBFA6183DFCB5D3B7332AA19275AFA1" + + "F8EC0B60FB6F66CC23AE4870791D5982AAD1AA9485FD8F4A60126FEB2CF05DB8" + + "A7F0F09B3397F3937F2E90B9E5B9C9B6EFEF642BC48351C46FB171B9BFA9EF17" + + "A961CE96C7E7A7CC3D3D03DFAD1078BA21DA425198F07D2481622BCE45969D9C" + + "4D6063D72AB7A0F08B2F49A7CC6AF335E08C4720E31476B67299E231F8BD90B3" + + "9AC3AE3BE0C6B6CACEF8289A2E2873D58E51E029CAFBD55E6841489AB66B5B4B" + + "9BA6E2F784660896AFF387D92844CCB8B69475496DE19DA2E58259B090489AC8" + + "E62363CDF82CFD8EF2A427ABCD65750B506F56DDE3B988567A88126B914D7828" + + "E2B63A6D7ED0747EC59E0E0A23CE7D8A74C1D2C2A7AFB6A29799620F00E11C33" + + "787F7DED3B30E1A22D09F1FBDA1ABBBFBF25CAE05A13F812E34563F99410E73B", 16), + true + ); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs.meta new file mode 100644 index 00000000..09d8a168 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bbd8030d7e46ed341af2da2d455f1725 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakePrimeOrderGroups.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs new file mode 100644 index 00000000..e75ed34f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs @@ -0,0 +1,105 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// The payload sent/received during the first round of a J-PAKE exchange. + /// + /// Each JPAKEParticipant creates and sends an instance of this payload to + /// the other. The payload to send should be created via + /// JPAKEParticipant.CreateRound1PayloadToSend(). + /// + /// Each participant must also validate the payload received from the other. + /// The received payload should be validated via + /// JPAKEParticipant.ValidateRound1PayloadReceived(JPakeRound1Payload). + /// + public class JPakeRound1Payload + { + /// + /// The id of the JPAKEParticipant who created/sent this payload. + /// + private readonly string participantId; + + /// + /// The value of g^x1 + /// + private readonly BigInteger gx1; + + /// + /// The value of g^x2 + /// + private readonly BigInteger gx2; + + /// + /// The zero knowledge proof for x1. + /// + /// This is a two element array, containing {g^v, r} for x1. + /// + private readonly BigInteger[] knowledgeProofForX1; + + /// + /// The zero knowledge proof for x2. + /// + /// This is a two element array, containing {g^v, r} for x2. + /// + private readonly BigInteger[] knowledgeProofForX2; + + public JPakeRound1Payload(string participantId, BigInteger gx1, BigInteger gx2, BigInteger[] knowledgeProofForX1, BigInteger[] knowledgeProofForX2) + { + JPakeUtilities.ValidateNotNull(participantId, "participantId"); + JPakeUtilities.ValidateNotNull(gx1, "gx1"); + JPakeUtilities.ValidateNotNull(gx2, "gx2"); + JPakeUtilities.ValidateNotNull(knowledgeProofForX1, "knowledgeProofForX1"); + JPakeUtilities.ValidateNotNull(knowledgeProofForX2, "knowledgeProofForX2"); + + this.participantId = participantId; + this.gx1 = gx1; + this.gx2 = gx2; + this.knowledgeProofForX1 = new BigInteger[knowledgeProofForX1.Length]; + Array.Copy(knowledgeProofForX1, this.knowledgeProofForX1, knowledgeProofForX1.Length); + this.knowledgeProofForX2 = new BigInteger[knowledgeProofForX2.Length]; + Array.Copy(knowledgeProofForX2, this.knowledgeProofForX2, knowledgeProofForX2.Length); + } + + public virtual string ParticipantId + { + get { return participantId; } + } + + public virtual BigInteger Gx1 + { + get { return gx1; } + } + + public virtual BigInteger Gx2 + { + get { return gx2; } + } + + public virtual BigInteger[] KnowledgeProofForX1 + { + get + { + BigInteger[] kp = new BigInteger[knowledgeProofForX1.Length]; + Array.Copy(knowledgeProofForX1, kp, knowledgeProofForX1.Length); + return kp; + } + } + + public virtual BigInteger[] KnowledgeProofForX2 + { + get + { + BigInteger[] kp = new BigInteger[knowledgeProofForX2.Length]; + Array.Copy(knowledgeProofForX2, kp, knowledgeProofForX2.Length); + return kp; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs.meta new file mode 100644 index 00000000..51bff3e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa863481cc9acaa46adf027ef83a163c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound1Payload.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs new file mode 100644 index 00000000..e7059f3c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// The payload sent/received during the second round of a J-PAKE exchange. + /// + /// Each JPAKEParticipant creates and sends an instance + /// of this payload to the other JPAKEParticipant. + /// The payload to send should be created via + /// JPAKEParticipant#createRound2PayloadToSend() + /// + /// Each JPAKEParticipant must also validate the payload + /// received from the other JPAKEParticipant. + /// The received payload should be validated via + /// JPAKEParticipant#validateRound2PayloadReceived(JPakeRound2Payload) + /// + public class JPakeRound2Payload + { + /// + /// The id of the JPAKEParticipant who created/sent this payload. + /// + private readonly string participantId; + + /// + /// The value of A, as computed during round 2. + /// + private readonly BigInteger a; + + /// + /// The zero knowledge proof for x2 * s. + /// + /// This is a two element array, containing {g^v, r} for x2 * s. + /// + private readonly BigInteger[] knowledgeProofForX2s; + + public JPakeRound2Payload(string participantId, BigInteger a, BigInteger[] knowledgeProofForX2s) + { + JPakeUtilities.ValidateNotNull(participantId, "participantId"); + JPakeUtilities.ValidateNotNull(a, "a"); + JPakeUtilities.ValidateNotNull(knowledgeProofForX2s, "knowledgeProofForX2s"); + + this.participantId = participantId; + this.a = a; + this.knowledgeProofForX2s = new BigInteger[knowledgeProofForX2s.Length]; + knowledgeProofForX2s.CopyTo(this.knowledgeProofForX2s, 0); + } + + public virtual string ParticipantId + { + get { return participantId; } + } + + public virtual BigInteger A + { + get { return a; } + } + + public virtual BigInteger[] KnowledgeProofForX2s + { + get + { + BigInteger[] kp = new BigInteger[knowledgeProofForX2s.Length]; + Array.Copy(knowledgeProofForX2s, kp, knowledgeProofForX2s.Length); + return kp; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs.meta new file mode 100644 index 00000000..2526772b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d8402c23ea397d0458cccdd653d7dfa0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound2Payload.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs new file mode 100644 index 00000000..ae4d15bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// The payload sent/received during the optional third round of a J-PAKE exchange, + /// which is for explicit key confirmation. + /// + /// Each JPAKEParticipant creates and sends an instance + /// of this payload to the other JPAKEParticipant. + /// The payload to send should be created via + /// JPAKEParticipant#createRound3PayloadToSend(BigInteger) + /// + /// Eeach JPAKEParticipant must also validate the payload + /// received from the other JPAKEParticipant. + /// The received payload should be validated via + /// JPAKEParticipant#validateRound3PayloadReceived(JPakeRound3Payload, BigInteger) + /// + public class JPakeRound3Payload + { + /// + /// The id of the {@link JPAKEParticipant} who created/sent this payload. + /// + private readonly string participantId; + + /// + /// The value of MacTag, as computed by round 3. + /// + /// See JPAKEUtil#calculateMacTag(string, string, BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, org.bouncycastle.crypto.Digest) + /// + private readonly BigInteger macTag; + + public JPakeRound3Payload(string participantId, BigInteger magTag) + { + this.participantId = participantId; + this.macTag = magTag; + } + + public virtual string ParticipantId + { + get { return participantId; } + } + + public virtual BigInteger MacTag + { + get { return macTag; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs.meta new file mode 100644 index 00000000..66d5dca2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f379951a5b959e540bd121ac5d44fcef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeRound3Payload.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs new file mode 100644 index 00000000..58181bde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs @@ -0,0 +1,394 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.JPake +{ + /// + /// Primitives needed for a J-PAKE exchange. + /// + /// The recommended way to perform a J-PAKE exchange is by using + /// two JPAKEParticipants. Internally, those participants + /// call these primitive operations in JPakeUtilities. + /// + /// The primitives, however, can be used without a JPAKEParticipant if needed. + /// + public abstract class JPakeUtilities + { + public static readonly BigInteger Zero = BigInteger.Zero; + public static readonly BigInteger One = BigInteger.One; + + /// + /// Return a value that can be used as x1 or x3 during round 1. + /// The returned value is a random value in the range [0, q-1]. + /// + public static BigInteger GenerateX1(BigInteger q, SecureRandom random) + { + BigInteger min = Zero; + BigInteger max = q.Subtract(One); + return BigIntegers.CreateRandomInRange(min, max, random); + } + + /// + /// Return a value that can be used as x2 or x4 during round 1. + /// The returned value is a random value in the range [1, q-1]. + /// + public static BigInteger GenerateX2(BigInteger q, SecureRandom random) + { + BigInteger min = One; + BigInteger max = q.Subtract(One); + return BigIntegers.CreateRandomInRange(min, max, random); + } + + /// + /// Converts the given password to a BigInteger + /// for use in arithmetic calculations. + /// + public static BigInteger CalculateS(char[] password) + { + return new BigInteger(Encoding.UTF8.GetBytes(password)); + } + + /// + /// Calculate g^x mod p as done in round 1. + /// + public static BigInteger CalculateGx(BigInteger p, BigInteger g, BigInteger x) + { + return g.ModPow(x, p); + } + + /// + /// Calculate ga as done in round 2. + /// + public static BigInteger CalculateGA(BigInteger p, BigInteger gx1, BigInteger gx3, BigInteger gx4) + { + // ga = g^(x1+x3+x4) = g^x1 * g^x3 * g^x4 + return gx1.Multiply(gx3).Multiply(gx4).Mod(p); + } + + /// + /// Calculate x2 * s as done in round 2. + /// + public static BigInteger CalculateX2s(BigInteger q, BigInteger x2, BigInteger s) + { + return x2.Multiply(s).Mod(q); + } + + /// + /// Calculate A as done in round 2. + /// + public static BigInteger CalculateA(BigInteger p, BigInteger q, BigInteger gA, BigInteger x2s) + { + // A = ga^(x*s) + return gA.ModPow(x2s, p); + } + + /// + /// Calculate a zero knowledge proof of x using Schnorr's signature. + /// The returned array has two elements {g^v, r = v-x*h} for x. + /// + public static BigInteger[] CalculateZeroKnowledgeProof(BigInteger p, BigInteger q, BigInteger g, + BigInteger gx, BigInteger x, string participantId, IDigest digest, SecureRandom random) + { + /* Generate a random v, and compute g^v */ + BigInteger vMin = Zero; + BigInteger vMax = q.Subtract(One); + BigInteger v = BigIntegers.CreateRandomInRange(vMin, vMax, random); + + BigInteger gv = g.ModPow(v, p); + BigInteger h = CalculateHashForZeroKnowledgeProof(g, gv, gx, participantId, digest); // h + + return new BigInteger[] + { + gv, + v.Subtract(x.Multiply(h)).Mod(q) // r = v-x*h + }; + } + + private static BigInteger CalculateHashForZeroKnowledgeProof(BigInteger g, BigInteger gr, BigInteger gx, + string participantId, IDigest digest) + { + digest.Reset(); + + UpdateDigestIncludingSize(digest, g); + + UpdateDigestIncludingSize(digest, gr); + + UpdateDigestIncludingSize(digest, gx); + + UpdateDigestIncludingSize(digest, participantId); + + byte[] output = DigestUtilities.DoFinal(digest); + + return new BigInteger(output); + } + + /// + /// Validates that g^x4 is not 1. + /// throws CryptoException if g^x4 is 1 + /// + public static void ValidateGx4(BigInteger gx4) + { + if (gx4.Equals(One)) + throw new CryptoException("g^x validation failed. g^x should not be 1."); + } + + /// + /// Validates that ga is not 1. + /// + /// As described by Feng Hao... + /// Alice could simply check ga != 1 to ensure it is a generator. + /// In fact, as we will explain in Section 3, (x1 + x3 + x4 ) is random over Zq even in the face of active attacks. + /// Hence, the probability for ga = 1 is extremely small - on the order of 2^160 for 160-bit q. + /// + /// throws CryptoException if ga is 1 + /// + public static void ValidateGa(BigInteger ga) + { + if (ga.Equals(One)) + throw new CryptoException("ga is equal to 1. It should not be. The chances of this happening are on the order of 2^160 for a 160-bit q. Try again."); + } + + /// + /// Validates the zero knowledge proof (generated by + /// calculateZeroKnowledgeProof(BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, string, Digest, SecureRandom) + /// is correct. + /// + /// throws CryptoException if the zero knowledge proof is not correct + /// + public static void ValidateZeroKnowledgeProof(BigInteger p, BigInteger q, BigInteger g, + BigInteger gx, BigInteger[] zeroKnowledgeProof, string participantId, IDigest digest) + { + /* sig={g^v,r} */ + BigInteger gv = zeroKnowledgeProof[0]; + BigInteger r = zeroKnowledgeProof[1]; + + BigInteger h = CalculateHashForZeroKnowledgeProof(g, gv, gx, participantId, digest); + if (!(gx.CompareTo(Zero) == 1 && // g^x > 0 + gx.CompareTo(p) == -1 && // g^x < p + gx.ModPow(q, p).CompareTo(One) == 0 && // g^x^q mod q = 1 + /* + * Below, I took a straightforward way to compute g^r * g^x^h, + * which needs 2 exp. Using a simultaneous computation technique + * would only need 1 exp. + */ + g.ModPow(r, p).Multiply(gx.ModPow(h, p)).Mod(p).CompareTo(gv) == 0)) // g^v=g^r * g^x^h + { + throw new CryptoException("Zero-knowledge proof validation failed"); + } + } + + /// + /// Calculates the keying material, which can be done after round 2 has completed. + /// A session key must be derived from this key material using a secure key derivation function (KDF). + /// The KDF used to derive the key is handled externally (i.e. not by JPAKEParticipant). + /// + /// KeyingMaterial = (B/g^{x2*x4*s})^x2 + /// + public static BigInteger CalculateKeyingMaterial(BigInteger p, BigInteger q, + BigInteger gx4, BigInteger x2, BigInteger s, BigInteger B) + { + return gx4.ModPow(x2.Multiply(s).Negate().Mod(q), p).Multiply(B).ModPow(x2, p); + } + + /// + /// Validates that the given participant ids are not equal. + /// (For the J-PAKE exchange, each participant must use a unique id.) + /// + /// Throws CryptoException if the participantId strings are equal. + /// + public static void ValidateParticipantIdsDiffer(string participantId1, string participantId2) + { + if (participantId1.Equals(participantId2)) + { + throw new CryptoException( + "Both participants are using the same participantId (" + + participantId1 + + "). This is not allowed. " + + "Each participant must use a unique participantId."); + } + } + + /// + /// Validates that the given participant ids are equal. + /// This is used to ensure that the payloads received from + /// each round all come from the same participant. + /// + public static void ValidateParticipantIdsEqual(string expectedParticipantId, string actualParticipantId) + { + if (!expectedParticipantId.Equals(actualParticipantId)) + { + throw new CryptoException( + "Received payload from incorrect partner (" + + actualParticipantId + + "). Expected to receive payload from " + + expectedParticipantId + + "."); + } + } + + /// + /// Validates that the given object is not null. + /// throws NullReferenceException if the object is null. + /// + /// object in question + /// name of the object (to be used in exception message) + public static void ValidateNotNull(object obj, string description) + { + if (obj == null) + throw new ArgumentNullException(description); + } + + /// + /// Calculates the MacTag (to be used for key confirmation), as defined by + /// NIST SP 800-56A Revision 1, + /// Section 8.2 Unilateral Key Confirmation for Key Agreement Schemes. + /// + /// MacTag = HMAC(MacKey, MacLen, MacData) + /// MacKey = H(K || "JPAKE_KC") + /// MacData = "KC_1_U" || participantId || partnerParticipantId || gx1 || gx2 || gx3 || gx4 + /// + /// Note that both participants use "KC_1_U" because the sender of the round 3 message + /// is always the initiator for key confirmation. + /// + /// HMAC = {@link HMac} used with the given {@link Digest} + /// H = The given {@link Digest} + /// MacLen = length of MacTag + /// + public static BigInteger CalculateMacTag(string participantId, string partnerParticipantId, + BigInteger gx1, BigInteger gx2, BigInteger gx3, BigInteger gx4, BigInteger keyingMaterial, IDigest digest) + { + byte[] macKey = CalculateMacKey(keyingMaterial, digest); + + HMac mac = new HMac(digest); + mac.Init(new KeyParameter(macKey)); + Arrays.Fill(macKey, (byte)0); + + /* + * MacData = "KC_1_U" || participantId_Alice || participantId_Bob || gx1 || gx2 || gx3 || gx4. + */ + UpdateMac(mac, "KC_1_U"); + UpdateMac(mac, participantId); + UpdateMac(mac, partnerParticipantId); + UpdateMac(mac, gx1); + UpdateMac(mac, gx2); + UpdateMac(mac, gx3); + UpdateMac(mac, gx4); + + byte[] macOutput = MacUtilities.DoFinal(mac); + + return new BigInteger(macOutput); + } + + /// + /// Calculates the MacKey (i.e. the key to use when calculating the MagTag for key confirmation). + /// + /// MacKey = H(K || "JPAKE_KC") + /// + private static byte[] CalculateMacKey(BigInteger keyingMaterial, IDigest digest) + { + digest.Reset(); + + UpdateDigest(digest, keyingMaterial); + /* + * This constant is used to ensure that the macKey is NOT the same as the derived key. + */ + UpdateDigest(digest, "JPAKE_KC"); + + return DigestUtilities.DoFinal(digest); + } + + /// + /// Validates the MacTag received from the partner participant. + /// + /// throws CryptoException if the participantId strings are equal. + /// + public static void ValidateMacTag(string participantId, string partnerParticipantId, + BigInteger gx1, BigInteger gx2, BigInteger gx3, BigInteger gx4, + BigInteger keyingMaterial, IDigest digest, BigInteger partnerMacTag) + { + /* + * Calculate the expected MacTag using the parameters as the partner + * would have used when the partner called calculateMacTag. + * + * i.e. basically all the parameters are reversed. + * participantId <-> partnerParticipantId + * x1 <-> x3 + * x2 <-> x4 + */ + BigInteger expectedMacTag = CalculateMacTag(partnerParticipantId, participantId, gx3, gx4, gx1, gx2, keyingMaterial, digest); + + if (!expectedMacTag.Equals(partnerMacTag)) + { + throw new CryptoException( + "Partner MacTag validation failed. " + + "Therefore, the password, MAC, or digest algorithm of each participant does not match."); + } + } + + private static void UpdateDigest(IDigest digest, BigInteger bigInteger) + { + UpdateDigest(digest, BigIntegers.AsUnsignedByteArray(bigInteger)); + } + + private static void UpdateDigest(IDigest digest, string str) + { + UpdateDigest(digest, Encoding.UTF8.GetBytes(str)); + } + + private static void UpdateDigest(IDigest digest, byte[] bytes) + { + digest.BlockUpdate(bytes, 0, bytes.Length); + Arrays.Fill(bytes, (byte)0); + } + + private static void UpdateDigestIncludingSize(IDigest digest, BigInteger bigInteger) + { + UpdateDigestIncludingSize(digest, BigIntegers.AsUnsignedByteArray(bigInteger)); + } + + private static void UpdateDigestIncludingSize(IDigest digest, string str) + { + UpdateDigestIncludingSize(digest, Encoding.UTF8.GetBytes(str)); + } + + private static void UpdateDigestIncludingSize(IDigest digest, byte[] bytes) + { + digest.BlockUpdate(IntToByteArray(bytes.Length), 0, 4); + digest.BlockUpdate(bytes, 0, bytes.Length); + Arrays.Fill(bytes, (byte)0); + } + + private static void UpdateMac(IMac mac, BigInteger bigInteger) + { + UpdateMac(mac, BigIntegers.AsUnsignedByteArray(bigInteger)); + } + + private static void UpdateMac(IMac mac, string str) + { + UpdateMac(mac, Encoding.UTF8.GetBytes(str)); + } + + private static void UpdateMac(IMac mac, byte[] bytes) + { + mac.BlockUpdate(bytes, 0, bytes.Length); + Arrays.Fill(bytes, (byte)0); + } + + private static byte[] IntToByteArray(int value) + { + return Pack.UInt32_To_BE((uint)value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs.meta new file mode 100644 index 00000000..6a8f6472 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 044dab773d7b78b4a890e0ed2e9f9db8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/jpake/JPakeUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf.meta new file mode 100644 index 00000000..e78f19e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c49be985df51f014b95e1156902b4d8d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs new file mode 100644 index 00000000..6d39c816 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs @@ -0,0 +1,118 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf +{ + /// Generator for Concatenation Key Derivation Function defined in NIST SP 800-56A, Sect 5.8.1 + public sealed class ConcatenationKdfGenerator + : IDerivationFunction + { + private readonly IDigest m_digest; + private readonly int m_hLen; + + private byte[] m_buffer; + + /// the digest to be used as the source of generated bytes + public ConcatenationKdfGenerator(IDigest digest) + { + m_digest = digest; + m_hLen = digest.GetDigestSize(); + } + + public void Init(IDerivationParameters param) + { + if (!(param is KdfParameters kdfParameters)) + throw new ArgumentException("KDF parameters required for ConcatenationKdfGenerator"); + + byte[] sharedSecret = kdfParameters.GetSharedSecret(); + byte[] otherInfo = kdfParameters.GetIV(); + + m_buffer = new byte[4 + sharedSecret.Length + otherInfo.Length + m_hLen]; + sharedSecret.CopyTo(m_buffer, 4); + otherInfo.CopyTo(m_buffer, 4 + sharedSecret.Length); + } + + /// the underlying digest. + public IDigest Digest => m_digest; + + /// Fill len bytes of the output buffer with bytes generated from the derivation function. + /// + public int GenerateBytes(byte[] output, int outOff, int length) + { + Check.OutputLength(output, outOff, length, "output buffer too small"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + int hashPos = m_buffer.Length - m_hLen; + uint counter = 1; + + m_digest.Reset(); + + int end = outOff + length; + int limit = end - m_hLen; + + while (outOff <= limit) + { + Pack.UInt32_To_BE(counter++, m_buffer, 0); + + m_digest.BlockUpdate(m_buffer, 0, hashPos); + m_digest.DoFinal(output, outOff); + + outOff += m_hLen; + } + + if (outOff < end) + { + Pack.UInt32_To_BE(counter, m_buffer, 0); + + m_digest.BlockUpdate(m_buffer, 0, hashPos); + m_digest.DoFinal(m_buffer, hashPos); + + Array.Copy(m_buffer, hashPos, output, outOff, end - outOff); + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int hashPos = m_buffer.Length - m_hLen; + uint counter = 1; + + m_digest.Reset(); + + int pos = 0, length = output.Length, limit = length - m_hLen; + + while (pos <= limit) + { + Pack.UInt32_To_BE(counter++, m_buffer.AsSpan()); + + m_digest.BlockUpdate(m_buffer.AsSpan(0, hashPos)); + m_digest.DoFinal(output[pos..]); + + pos += m_hLen; + } + + if (pos < length) + { + Pack.UInt32_To_BE(counter, m_buffer.AsSpan()); + + m_digest.BlockUpdate(m_buffer.AsSpan(0, hashPos)); + m_digest.DoFinal(m_buffer.AsSpan(hashPos)); + m_buffer.AsSpan(hashPos, length - pos).CopyTo(output[pos..]); + } + + return length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs.meta new file mode 100644 index 00000000..50cde62a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e8557a9f5b3111342a056dc6d2f6a673 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ConcatenationKdfGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs new file mode 100644 index 00000000..5002f5ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf +{ + public class DHKdfParameters + : IDerivationParameters + { + private readonly DerObjectIdentifier algorithm; + private readonly int keySize; + private readonly byte[] z; + private readonly byte[] extraInfo; + + public DHKdfParameters( + DerObjectIdentifier algorithm, + int keySize, + byte[] z) + : this(algorithm, keySize, z, null) + { + } + + public DHKdfParameters( + DerObjectIdentifier algorithm, + int keySize, + byte[] z, + byte[] extraInfo) + { + this.algorithm = algorithm; + this.keySize = keySize; + this.z = z; // TODO Clone? + this.extraInfo = extraInfo; + } + + public DerObjectIdentifier Algorithm + { + get { return algorithm; } + } + + public int KeySize + { + get { return keySize; } + } + + public byte[] GetZ() + { + // TODO Clone? + return z; + } + + public byte[] GetExtraInfo() + { + // TODO Clone? + return extraInfo; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs.meta new file mode 100644 index 00000000..907eacc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 63ca39658cd060b499a676c8c3fbfd2a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKdfParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs new file mode 100644 index 00000000..71d108c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf +{ + /** + * RFC 2631 Diffie-hellman KEK derivation function. + */ + public sealed class DHKekGenerator + : IDerivationFunction + { + private readonly IDigest m_digest; + + private DerObjectIdentifier algorithm; + private int keySize; + private byte[] z; + private byte[] partyAInfo; + + public DHKekGenerator(IDigest digest) + { + m_digest = digest; + } + + public void Init(IDerivationParameters param) + { + DHKdfParameters parameters = (DHKdfParameters)param; + + this.algorithm = parameters.Algorithm; + this.keySize = parameters.KeySize; + this.z = parameters.GetZ(); // TODO Clone? + this.partyAInfo = parameters.GetExtraInfo(); // TODO Clone? + } + + public IDigest Digest => m_digest; + + public int GenerateBytes(byte[] outBytes, int outOff, int length) + { + Check.OutputLength(outBytes, outOff, length, "output buffer too small"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(outBytes.AsSpan(outOff, length)); +#else + long oBytes = length; + int digestSize = m_digest.GetDigestSize(); + + // + // this is at odds with the standard implementation, the + // maximum value should be hBits * (2^32 - 1) where hBits + // is the digest output size in bits. We can't have an + // array with a long index at the moment... + // + if (oBytes > ((2L << 32) - 1)) + throw new ArgumentException("Output length too large"); + + int cThreshold = (int)((oBytes + digestSize - 1) / digestSize); + + byte[] dig = new byte[digestSize]; + + uint counter = 1; + + for (int i = 0; i < cThreshold; i++) + { + // KeySpecificInfo + DerSequence keyInfo = new DerSequence(algorithm, new DerOctetString(Pack.UInt32_To_BE(counter))); + + // OtherInfo + Asn1EncodableVector v1 = new Asn1EncodableVector(keyInfo); + + if (partyAInfo != null) + { + v1.Add(new DerTaggedObject(true, 0, new DerOctetString(partyAInfo))); + } + + v1.Add(new DerTaggedObject(true, 2, new DerOctetString(Pack.UInt32_To_BE((uint)keySize)))); + + byte[] other = new DerSequence(v1).GetDerEncoded(); + + m_digest.BlockUpdate(z, 0, z.Length); + m_digest.BlockUpdate(other, 0, other.Length); + m_digest.DoFinal(dig, 0); + + if (length > digestSize) + { + Array.Copy(dig, 0, outBytes, outOff, digestSize); + outOff += digestSize; + length -= digestSize; + } + else + { + Array.Copy(dig, 0, outBytes, outOff, length); + } + + counter++; + } + + m_digest.Reset(); + + return (int)oBytes; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + long oBytes = output.Length; + int digestSize = m_digest.GetDigestSize(); + + // + // this is at odds with the standard implementation, the + // maximum value should be hBits * (2^32 - 1) where hBits + // is the digest output size in bits. We can't have an + // array with a long index at the moment... + // + if (oBytes > ((2L << 32) - 1)) + throw new ArgumentException("Output length too large"); + + int cThreshold = (int)((oBytes + digestSize - 1) / digestSize); + + Span dig = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + + uint counter = 1; + + for (int i = 0; i < cThreshold; i++) + { + // KeySpecificInfo + DerSequence keyInfo = new DerSequence(algorithm, new DerOctetString(Pack.UInt32_To_BE(counter))); + + // OtherInfo + Asn1EncodableVector v1 = new Asn1EncodableVector(keyInfo); + + if (partyAInfo != null) + { + v1.Add(new DerTaggedObject(true, 0, new DerOctetString(partyAInfo))); + } + + v1.Add(new DerTaggedObject(true, 2, new DerOctetString(Pack.UInt32_To_BE((uint)keySize)))); + + byte[] other = new DerSequence(v1).GetDerEncoded(); + + m_digest.BlockUpdate(z); + m_digest.BlockUpdate(other); + m_digest.DoFinal(dig); + + int remaining = output.Length; + if (remaining > digestSize) + { + dig.CopyTo(output); + output = output[digestSize..]; + } + else + { + dig[..remaining].CopyTo(output); + } + + counter++; + } + + m_digest.Reset(); + + return (int)oBytes; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs.meta new file mode 100644 index 00000000..eaad7709 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 60c48eaaa5f539640a6ffb1923dc4cb7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/DHKekGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs new file mode 100644 index 00000000..061b2765 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf +{ + /** + * X9.63 based key derivation function for ECDH CMS. + */ + public sealed class ECDHKekGenerator + : IDerivationFunction + { + private readonly IDerivationFunction m_kdf; + + private DerObjectIdentifier algorithm; + private int keySize; + private byte[] z; + + public ECDHKekGenerator(IDigest digest) + { + m_kdf = new Kdf2BytesGenerator(digest); + } + + public void Init(IDerivationParameters param) + { + DHKdfParameters parameters = (DHKdfParameters)param; + + this.algorithm = parameters.Algorithm; + this.keySize = parameters.KeySize; + this.z = parameters.GetZ(); // TODO Clone? + } + + public IDigest Digest => m_kdf.Digest; + + public int GenerateBytes(byte[] outBytes, int outOff, int length) + { + Check.OutputLength(outBytes, outOff, length, "output buffer too small"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(outBytes.AsSpan(outOff, length)); +#else + // TODO Create an ASN.1 class for this (RFC3278) + // ECC-CMS-SharedInfo + DerSequence s = new DerSequence( + new AlgorithmIdentifier(algorithm, DerNull.Instance), + new DerTaggedObject(true, 2, new DerOctetString(Pack.UInt32_To_BE((uint)keySize)))); + + m_kdf.Init(new KdfParameters(z, s.GetDerEncoded())); + + return m_kdf.GenerateBytes(outBytes, outOff, length); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + // TODO Create an ASN.1 class for this (RFC3278) + // ECC-CMS-SharedInfo + DerSequence s = new DerSequence( + new AlgorithmIdentifier(algorithm, DerNull.Instance), + new DerTaggedObject(true, 2, new DerOctetString(Pack.UInt32_To_BE((uint)keySize)))); + + m_kdf.Init(new KdfParameters(z, s.GetDerEncoded())); + + return m_kdf.GenerateBytes(output); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs.meta new file mode 100644 index 00000000..fd96dc99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8a010d841cddb4448bc3f9784248d3d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/kdf/ECDHKekGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp.meta new file mode 100644 index 00000000..e3442824 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e3c09d0e66c7efd4b8f36b2bd70fa234 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs new file mode 100644 index 00000000..03723e58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs @@ -0,0 +1,168 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp +{ + /** + * Implements the client side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe. + * This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper + * "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002" + */ + public class Srp6Client + { + protected BigInteger N; + protected BigInteger g; + + protected BigInteger privA; + protected BigInteger pubA; + + protected BigInteger B; + + protected BigInteger x; + protected BigInteger u; + protected BigInteger S; + + protected BigInteger M1; + protected BigInteger M2; + protected BigInteger Key; + + protected IDigest digest; + protected SecureRandom random; + + public Srp6Client() + { + } + + /** + * Initialises the client to begin new authentication attempt + * @param N The safe prime associated with the client's verifier + * @param g The group parameter associated with the client's verifier + * @param digest The digest algorithm associated with the client's verifier + * @param random For key generation + */ + public virtual void Init(BigInteger N, BigInteger g, IDigest digest, SecureRandom random) + { + this.N = N; + this.g = g; + this.digest = digest; + this.random = random; + } + + public virtual void Init(Srp6GroupParameters group, IDigest digest, SecureRandom random) + { + Init(group.N, group.G, digest, random); + } + + /** + * Generates client's credentials given the client's salt, identity and password + * @param salt The salt used in the client's verifier. + * @param identity The user's identity (eg. username) + * @param password The user's password + * @return Client's public value to send to server + */ + public virtual BigInteger GenerateClientCredentials(byte[] salt, byte[] identity, byte[] password) + { + this.x = Srp6Utilities.CalculateX(digest, N, salt, identity, password); + this.privA = SelectPrivateValue(); + this.pubA = g.ModPow(privA, N); + + return pubA; + } + + /** + * Generates client's verification message given the server's credentials + * @param serverB The server's credentials + * @return Client's verification message for the server + * @throws CryptoException If server's credentials are invalid + */ + public virtual BigInteger CalculateSecret(BigInteger serverB) + { + this.B = Srp6Utilities.ValidatePublicValue(N, serverB); + this.u = Srp6Utilities.CalculateU(digest, N, pubA, B); + this.S = CalculateS(); + + return S; + } + + protected virtual BigInteger SelectPrivateValue() + { + return Srp6Utilities.GeneratePrivateValue(digest, N, g, random); + } + + private BigInteger CalculateS() + { + BigInteger k = Srp6Utilities.CalculateK(digest, N, g); + BigInteger exp = u.Multiply(x).Add(privA); + BigInteger tmp = g.ModPow(x, N).Multiply(k).Mod(N); + return B.Subtract(tmp).Mod(N).ModPow(exp, N); + } + + /** + * Computes the client evidence message M1 using the previously received values. + * To be called after calculating the secret S. + * @return M1: the client side generated evidence message + * @throws CryptoException + */ + public virtual BigInteger CalculateClientEvidenceMessage() + { + // Verify pre-requirements + if (this.pubA == null || this.B == null || this.S == null) + { + throw new CryptoException("Impossible to compute M1: " + + "some data are missing from the previous operations (A,B,S)"); + } + // compute the client evidence message 'M1' + this.M1 = Srp6Utilities.CalculateM1(digest, N, pubA, B, S); + return M1; + } + + /** Authenticates the server evidence message M2 received and saves it only if correct. + * @param M2: the server side generated evidence message + * @return A boolean indicating if the server message M2 was the expected one. + * @throws CryptoException + */ + public virtual bool VerifyServerEvidenceMessage(BigInteger serverM2) + { + // Verify pre-requirements + if (this.pubA == null || this.M1 == null || this.S == null) + { + throw new CryptoException("Impossible to compute and verify M2: " + + "some data are missing from the previous operations (A,M1,S)"); + } + + // Compute the own server evidence message 'M2' + BigInteger computedM2 = Srp6Utilities.CalculateM2(digest, N, pubA, M1, S); + if (computedM2.Equals(serverM2)) + { + this.M2 = serverM2; + return true; + } + return false; + } + + /** + * Computes the final session key as a result of the SRP successful mutual authentication + * To be called after verifying the server evidence message M2. + * @return Key: the mutually authenticated symmetric session key + * @throws CryptoException + */ + public virtual BigInteger CalculateSessionKey() + { + // Verify pre-requirements (here we enforce a previous calculation of M1 and M2) + if (this.S == null || this.M1 == null || this.M2 == null) + { + throw new CryptoException("Impossible to compute Key: " + + "some data are missing from the previous operations (S,M1,M2)"); + } + this.Key = Srp6Utilities.CalculateKey(digest, N, S); + return Key; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs.meta new file mode 100644 index 00000000..33d1f53a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4d9d608b0adeb74584b09b8baa01c07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Client.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs new file mode 100644 index 00000000..d734cc97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp +{ + /** + * Implements the server side SRP-6a protocol. Note that this class is stateful, and therefore NOT threadsafe. + * This implementation of SRP is based on the optimized message sequence put forth by Thomas Wu in the paper + * "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol, 2002" + */ + public class Srp6Server + { + protected BigInteger N; + protected BigInteger g; + protected BigInteger v; + + protected SecureRandom random; + protected IDigest digest; + + protected BigInteger A; + + protected BigInteger privB; + protected BigInteger pubB; + + protected BigInteger u; + protected BigInteger S; + protected BigInteger M1; + protected BigInteger M2; + protected BigInteger Key; + + public Srp6Server() + { + } + + /** + * Initialises the server to accept a new client authentication attempt + * @param N The safe prime associated with the client's verifier + * @param g The group parameter associated with the client's verifier + * @param v The client's verifier + * @param digest The digest algorithm associated with the client's verifier + * @param random For key generation + */ + public virtual void Init(BigInteger N, BigInteger g, BigInteger v, IDigest digest, SecureRandom random) + { + this.N = N; + this.g = g; + this.v = v; + + this.random = random; + this.digest = digest; + } + + public virtual void Init(Srp6GroupParameters group, BigInteger v, IDigest digest, SecureRandom random) + { + Init(group.N, group.G, v, digest, random); + } + + /** + * Generates the server's credentials that are to be sent to the client. + * @return The server's public value to the client + */ + public virtual BigInteger GenerateServerCredentials() + { + BigInteger k = Srp6Utilities.CalculateK(digest, N, g); + this.privB = SelectPrivateValue(); + this.pubB = k.Multiply(v).Mod(N).Add(g.ModPow(privB, N)).Mod(N); + + return pubB; + } + + /** + * Processes the client's credentials. If valid the shared secret is generated and returned. + * @param clientA The client's credentials + * @return A shared secret BigInteger + * @throws CryptoException If client's credentials are invalid + */ + public virtual BigInteger CalculateSecret(BigInteger clientA) + { + this.A = Srp6Utilities.ValidatePublicValue(N, clientA); + this.u = Srp6Utilities.CalculateU(digest, N, A, pubB); + this.S = CalculateS(); + + return S; + } + + protected virtual BigInteger SelectPrivateValue() + { + return Srp6Utilities.GeneratePrivateValue(digest, N, g, random); + } + + private BigInteger CalculateS() + { + return v.ModPow(u, N).Multiply(A).Mod(N).ModPow(privB, N); + } + + /** + * Authenticates the received client evidence message M1 and saves it only if correct. + * To be called after calculating the secret S. + * @param M1: the client side generated evidence message + * @return A boolean indicating if the client message M1 was the expected one. + * @throws CryptoException + */ + public virtual bool VerifyClientEvidenceMessage(BigInteger clientM1) + { + // Verify pre-requirements + if (this.A == null || this.pubB == null || this.S == null) + { + throw new CryptoException("Impossible to compute and verify M1: " + + "some data are missing from the previous operations (A,B,S)"); + } + + // Compute the own client evidence message 'M1' + BigInteger computedM1 = Srp6Utilities.CalculateM1(digest, N, A, pubB, S); + if (computedM1.Equals(clientM1)) + { + this.M1 = clientM1; + return true; + } + return false; + } + + /** + * Computes the server evidence message M2 using the previously verified values. + * To be called after successfully verifying the client evidence message M1. + * @return M2: the server side generated evidence message + * @throws CryptoException + */ + public virtual BigInteger CalculateServerEvidenceMessage() + { + // Verify pre-requirements + if (this.A == null || this.M1 == null || this.S == null) + { + throw new CryptoException("Impossible to compute M2: " + + "some data are missing from the previous operations (A,M1,S)"); + } + + // Compute the server evidence message 'M2' + this.M2 = Srp6Utilities.CalculateM2(digest, N, A, M1, S); + return M2; + } + + /** + * Computes the final session key as a result of the SRP successful mutual authentication + * To be called after calculating the server evidence message M2. + * @return Key: the mutual authenticated symmetric session key + * @throws CryptoException + */ + public virtual BigInteger CalculateSessionKey() + { + // Verify pre-requirements + if (this.S == null || this.M1 == null || this.M2 == null) + { + throw new CryptoException("Impossible to compute Key: " + + "some data are missing from the previous operations (S,M1,M2)"); + } + this.Key = Srp6Utilities.CalculateKey(digest, N, S); + return Key; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs.meta new file mode 100644 index 00000000..02c84ec2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d0e886e67aac4f644ad184673e7b20e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Server.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs new file mode 100644 index 00000000..24891e91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp +{ + public class Srp6StandardGroups + { + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + private static Srp6GroupParameters FromNG(string hexN, string hexG) + { + return new Srp6GroupParameters(FromHex(hexN), FromHex(hexG)); + } + + /* + * RFC 5054 + */ + private const string rfc5054_1024_N = "EEAF0AB9ADB38DD69C33F80AFA8FC5E86072618775FF3C0B9EA2314C" + + "9C256576D674DF7496EA81D3383B4813D692C6E0E0D5D8E250B98BE4" + + "8E495C1D6089DAD15DC7D7B46154D6B6CE8EF4AD69B15D4982559B29" + + "7BCF1885C529F566660E57EC68EDBC3C05726CC02FD4CBF4976EAA9A" + "FD5138FE8376435B9FC61D2FC0EB06E3"; + private const string rfc5054_1024_g = "02"; + public static readonly Srp6GroupParameters rfc5054_1024 = FromNG(rfc5054_1024_N, rfc5054_1024_g); + + private const string rfc5054_1536_N = "9DEF3CAFB939277AB1F12A8617A47BBBDBA51DF499AC4C80BEEEA961" + + "4B19CC4D5F4F5F556E27CBDE51C6A94BE4607A291558903BA0D0F843" + + "80B655BB9A22E8DCDF028A7CEC67F0D08134B1C8B97989149B609E0B" + + "E3BAB63D47548381DBC5B1FC764E3F4B53DD9DA1158BFD3E2B9C8CF5" + + "6EDF019539349627DB2FD53D24B7C48665772E437D6C7F8CE442734A" + + "F7CCB7AE837C264AE3A9BEB87F8A2FE9B8B5292E5A021FFF5E91479E" + + "8CE7A28C2442C6F315180F93499A234DCF76E3FED135F9BB"; + private const string rfc5054_1536_g = "02"; + public static readonly Srp6GroupParameters rfc5054_1536 = FromNG(rfc5054_1536_N, rfc5054_1536_g); + + private const string rfc5054_2048_N = "AC6BDB41324A9A9BF166DE5E1389582FAF72B6651987EE07FC319294" + + "3DB56050A37329CBB4A099ED8193E0757767A13DD52312AB4B03310D" + + "CD7F48A9DA04FD50E8083969EDB767B0CF6095179A163AB3661A05FB" + + "D5FAAAE82918A9962F0B93B855F97993EC975EEAA80D740ADBF4FF74" + + "7359D041D5C33EA71D281E446B14773BCA97B43A23FB801676BD207A" + + "436C6481F1D2B9078717461A5B9D32E688F87748544523B524B0D57D" + + "5EA77A2775D2ECFA032CFBDBF52FB3786160279004E57AE6AF874E73" + + "03CE53299CCC041C7BC308D82A5698F3A8D0C38271AE35F8E9DBFBB6" + + "94B5C803D89F7AE435DE236D525F54759B65E372FCD68EF20FA7111F" + "9E4AFF73"; + private const string rfc5054_2048_g = "02"; + public static readonly Srp6GroupParameters rfc5054_2048 = FromNG(rfc5054_2048_N, rfc5054_2048_g); + + private const string rfc5054_3072_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + "E0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"; + private const string rfc5054_3072_g = "05"; + public static readonly Srp6GroupParameters rfc5054_3072 = FromNG(rfc5054_3072_N, rfc5054_3072_g); + + private const string rfc5054_4096_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" + "FFFFFFFFFFFFFFFF"; + private const string rfc5054_4096_g = "05"; + public static readonly Srp6GroupParameters rfc5054_4096 = FromNG(rfc5054_4096_N, rfc5054_4096_g); + + private const string rfc5054_6144_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + "6DCC4024FFFFFFFFFFFFFFFF"; + private const string rfc5054_6144_g = "05"; + public static readonly Srp6GroupParameters rfc5054_6144 = FromNG(rfc5054_6144_N, rfc5054_6144_g); + + private const string rfc5054_8192_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + + "6DBE115974A3926F12FEE5E438777CB6A932DF8CD8BEC4D073B931BA" + + "3BC832B68D9DD300741FA7BF8AFC47ED2576F6936BA424663AAB639C" + + "5AE4F5683423B4742BF1C978238F16CBE39D652DE3FDB8BEFC848AD9" + + "22222E04A4037C0713EB57A81A23F0C73473FC646CEA306B4BCBC886" + + "2F8385DDFA9D4B7FA2C087E879683303ED5BDD3A062B3CF5B3A278A6" + + "6D2A13F83F44F82DDF310EE074AB6A364597E899A0255DC164F31CC5" + + "0846851DF9AB48195DED7EA1B1D510BD7EE74D73FAF36BC31ECFA268" + + "359046F4EB879F924009438B481C6CD7889A002ED5EE382BC9190DA6" + + "FC026E479558E4475677E9AA9E3050E2765694DFC81F56E880B96E71" + "60C980DD98EDD3DFFFFFFFFFFFFFFFFF"; + private const string rfc5054_8192_g = "13"; + public static readonly Srp6GroupParameters rfc5054_8192 = FromNG(rfc5054_8192_N, rfc5054_8192_g); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs.meta new file mode 100644 index 00000000..c1034b52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 639f4eb11063b374b9f415ea311f1c26 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6StandardGroups.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs new file mode 100644 index 00000000..9b657301 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs @@ -0,0 +1,222 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp +{ + public class Srp6Utilities + { + public static BigInteger CalculateK(IDigest digest, BigInteger N, BigInteger g) + { + return HashPaddedPair(digest, N, N, g); + } + + public static BigInteger CalculateU(IDigest digest, BigInteger N, BigInteger A, BigInteger B) + { + return HashPaddedPair(digest, N, A, B); + } + + public static BigInteger CalculateX(IDigest digest, BigInteger N, byte[] salt, byte[] identity, byte[] password) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return CalculateX(digest, N, salt.AsSpan(), identity.AsSpan(), password.AsSpan()); +#else + byte[] output = new byte[digest.GetDigestSize()]; + + digest.BlockUpdate(identity, 0, identity.Length); + digest.Update((byte)':'); + digest.BlockUpdate(password, 0, password.Length); + digest.DoFinal(output, 0); + + digest.BlockUpdate(salt, 0, salt.Length); + digest.BlockUpdate(output, 0, output.Length); + digest.DoFinal(output, 0); + + return new BigInteger(1, output); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static BigInteger CalculateX(IDigest digest, BigInteger N, ReadOnlySpan salt, + ReadOnlySpan identity, ReadOnlySpan password) + { + int digestSize = digest.GetDigestSize(); + Span output = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + + digest.BlockUpdate(identity); + digest.Update((byte)':'); + digest.BlockUpdate(password); + digest.DoFinal(output); + + digest.BlockUpdate(salt); + digest.BlockUpdate(output); + digest.DoFinal(output); + + return new BigInteger(1, output); + } +#endif + + public static BigInteger GeneratePrivateValue(IDigest digest, BigInteger N, BigInteger g, SecureRandom random) + { + int minBits = System.Math.Min(256, N.BitLength / 2); + BigInteger min = BigInteger.One.ShiftLeft(minBits - 1); + BigInteger max = N.Subtract(BigInteger.One); + + return BigIntegers.CreateRandomInRange(min, max, random); + } + + public static BigInteger ValidatePublicValue(BigInteger N, BigInteger val) + { + val = val.Mod(N); + + // Check that val % N != 0 + if (val.Equals(BigInteger.Zero)) + throw new CryptoException("Invalid public value: 0"); + + return val; + } + + /** + * Computes the client evidence message (M1) according to the standard routine: + * M1 = H( A | B | S ) + * @param digest The Digest used as the hashing function H + * @param N Modulus used to get the pad length + * @param A The public client value + * @param B The public server value + * @param S The secret calculated by both sides + * @return M1 The calculated client evidence message + */ + public static BigInteger CalculateM1(IDigest digest, BigInteger N, BigInteger A, BigInteger B, BigInteger S) + { + BigInteger M1 = HashPaddedTriplet(digest, N, A, B, S); + return M1; + } + + /** + * Computes the server evidence message (M2) according to the standard routine: + * M2 = H( A | M1 | S ) + * @param digest The Digest used as the hashing function H + * @param N Modulus used to get the pad length + * @param A The public client value + * @param M1 The client evidence message + * @param S The secret calculated by both sides + * @return M2 The calculated server evidence message + */ + public static BigInteger CalculateM2(IDigest digest, BigInteger N, BigInteger A, BigInteger M1, BigInteger S) + { + BigInteger M2 = HashPaddedTriplet(digest, N, A, M1, S); + return M2; + } + + /** + * Computes the final Key according to the standard routine: Key = H(S) + * @param digest The Digest used as the hashing function H + * @param N Modulus used to get the pad length + * @param S The secret calculated by both sides + * @return + */ + public static BigInteger CalculateKey(IDigest digest, BigInteger N, BigInteger S) + { + int paddedLength = (N.BitLength + 7) / 8; + int digestSize = digest.GetDigestSize(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = paddedLength <= 512 + ? stackalloc byte[paddedLength] + : new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(S, bytes); + digest.BlockUpdate(bytes); + + Span output = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + digest.DoFinal(output); +#else + byte[] bytes = new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(S, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + + byte[] output = new byte[digestSize]; + digest.DoFinal(output, 0); +#endif + + return new BigInteger(1, output); + } + + private static BigInteger HashPaddedTriplet(IDigest digest, BigInteger N, BigInteger n1, BigInteger n2, BigInteger n3) + { + int paddedLength = (N.BitLength + 7) / 8; + int digestSize = digest.GetDigestSize(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = paddedLength <= 512 + ? stackalloc byte[paddedLength] + : new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(n1, bytes); + digest.BlockUpdate(bytes); + BigIntegers.AsUnsignedByteArray(n2, bytes); + digest.BlockUpdate(bytes); + BigIntegers.AsUnsignedByteArray(n3, bytes); + digest.BlockUpdate(bytes); + + Span output = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + digest.DoFinal(output); +#else + byte[] bytes = new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(n1, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + BigIntegers.AsUnsignedByteArray(n2, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + BigIntegers.AsUnsignedByteArray(n3, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + + byte[] output = new byte[digestSize]; + digest.DoFinal(output, 0); +#endif + + return new BigInteger(1, output); + } + + private static BigInteger HashPaddedPair(IDigest digest, BigInteger N, BigInteger n1, BigInteger n2) + { + int paddedLength = (N.BitLength + 7) / 8; + int digestSize = digest.GetDigestSize(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = paddedLength <= 512 + ? stackalloc byte[paddedLength] + : new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(n1, bytes); + digest.BlockUpdate(bytes); + BigIntegers.AsUnsignedByteArray(n2, bytes); + digest.BlockUpdate(bytes); + + Span output = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + digest.DoFinal(output); +#else + byte[] bytes = new byte[paddedLength]; + BigIntegers.AsUnsignedByteArray(n1, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + BigIntegers.AsUnsignedByteArray(n2, bytes, 0, bytes.Length); + digest.BlockUpdate(bytes, 0, bytes.Length); + + byte[] output = new byte[digestSize]; + digest.DoFinal(output, 0); +#endif + + return new BigInteger(1, output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs.meta new file mode 100644 index 00000000..33938979 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bd559eae0c629b947b49355114a17f2a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6Utilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs new file mode 100644 index 00000000..771bee99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp +{ + /** + * Generates new SRP verifier for user + */ + public class Srp6VerifierGenerator + { + protected BigInteger N; + protected BigInteger g; + protected IDigest digest; + + public Srp6VerifierGenerator() + { + } + + /** + * Initialises generator to create new verifiers + * @param N The safe prime to use (see DHParametersGenerator) + * @param g The group parameter to use (see DHParametersGenerator) + * @param digest The digest to use. The same digest type will need to be used later for the actual authentication + * attempt. Also note that the final session key size is dependent on the chosen digest. + */ + public virtual void Init(BigInteger N, BigInteger g, IDigest digest) + { + this.N = N; + this.g = g; + this.digest = digest; + } + + public virtual void Init(Srp6GroupParameters group, IDigest digest) + { + Init(group.N, group.G, digest); + } + + /** + * Creates a new SRP verifier + * @param salt The salt to use, generally should be large and random + * @param identity The user's identifying information (eg. username) + * @param password The user's password + * @return A new verifier for use in future SRP authentication + */ + public virtual BigInteger GenerateVerifier(byte[] salt, byte[] identity, byte[] password) + { + BigInteger x = Srp6Utilities.CalculateX(digest, N, salt, identity, password); + + return g.ModPow(x, N); + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs.meta new file mode 100644 index 00000000..7fe5969f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cd68ce3a83ec3c946bf48a047e69fea0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/agreement/srp/SRP6VerifierGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests.meta new file mode 100644 index 00000000..d69c137c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: acf63e1fd30c65943b9d4f3b2d61d96f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs new file mode 100644 index 00000000..99ef5a94 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs @@ -0,0 +1,650 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /* The BLAKE2 cryptographic hash function was designed by Jean- + Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian + Winnerlein. + + Reference Implementation and Description can be found at: https://blake2.net/ + Internet Draft: https://tools.ietf.org/html/draft-saarinen-blake2-02 + + This implementation does not support the Tree Hashing Mode. + + For unkeyed hashing, developers adapting BLAKE2 to ASN.1 - based + message formats SHOULD use the OID tree at x = 1.3.6.1.4.1.1722.12.2. + + Algorithm | Target | Collision | Hash | Hash ASN.1 | + Identifier | Arch | Security | nn | OID Suffix | + ---------------+--------+-----------+------+------------+ + id-blake2b160 | 64-bit | 2**80 | 20 | x.1.20 | + id-blake2b256 | 64-bit | 2**128 | 32 | x.1.32 | + id-blake2b384 | 64-bit | 2**192 | 48 | x.1.48 | + id-blake2b512 | 64-bit | 2**256 | 64 | x.1.64 | + ---------------+--------+-----------+------+------------+ + */ + + /** + * Implementation of the cryptographic hash function Blake2b. + *

+ * Blake2b offers a built-in keying mechanism to be used directly + * for authentication ("Prefix-MAC") rather than a HMAC construction. + *

+ * Blake2b offers a built-in support for a salt for randomized hashing + * and a personal string for defining a unique hash function for each application. + *

+ * BLAKE2b is optimized for 64-bit platforms and produces digests of any size + * between 1 and 64 bytes. + */ + public sealed class Blake2bDigest + : IDigest + { + // Blake2b Initialization Vector: + private static readonly ulong[] blake2b_IV = + // Produced from the square root of primes 2, 3, 5, 7, 11, 13, 17, 19. + // The same as SHA-512 IV. + { + 0x6a09e667f3bcc908UL, 0xbb67ae8584caa73bUL, 0x3c6ef372fe94f82bUL, + 0xa54ff53a5f1d36f1UL, 0x510e527fade682d1UL, 0x9b05688c2b3e6c1fUL, + 0x1f83d9abfb41bd6bUL, 0x5be0cd19137e2179UL + }; + + // Message word permutations: + private static readonly byte[,] blake2b_sigma = + { + { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 }, + { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }, + { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 }, + { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 }, + { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 }, + { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 }, + { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 }, + { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 }, + { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 }, + { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 }, + { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 }, + { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } + }; + + private const int ROUNDS = 12; // to use for Catenas H' + private const int BLOCK_LENGTH_BYTES = 128;// bytes + + // General parameters: + private int digestLength = 64; // 1- 64 bytes + private int keyLength = 0; // 0 - 64 bytes for keyed hashing for MAC + private byte[] salt = null;// new byte[16]; + private byte[] personalization = null;// new byte[16]; + + // the key + private byte[] key = null; + + // Tree hashing parameters: + // Because this class does not implement the Tree Hashing Mode, + // these parameters can be treated as constants (see init() function) + /* + * private int fanout = 1; // 0-255 private int depth = 1; // 1 - 255 + * private int leafLength= 0; private long nodeOffset = 0L; private int + * nodeDepth = 0; private int innerHashLength = 0; + */ + + // whenever this buffer overflows, it will be processed + // in the Compress() function. + // For performance issues, long messages will not use this buffer. + private byte[] buffer = null;// new byte[BLOCK_LENGTH_BYTES]; + // Position of last inserted byte: + private int bufferPos = 0;// a value from 0 up to 128 + + private ulong[] internalState = new ulong[16]; // In the Blake2b paper it is + // called: v + private ulong[] chainValue = null; // state vector, in the Blake2b paper it + // is called: h + + private ulong t0 = 0UL; // holds last significant bits, counter (counts bytes) + private ulong t1 = 0UL; // counter: Length up to 2^128 are supported + private ulong f0 = 0UL; // finalization flag, for last block: ~0L + + // For Tree Hashing Mode, not used here: + // private long f1 = 0L; // finalization flag, for last node: ~0L + + public Blake2bDigest() + : this(512) + { + } + + public Blake2bDigest(Blake2bDigest digest) + { + this.bufferPos = digest.bufferPos; + this.buffer = Arrays.Clone(digest.buffer); + this.keyLength = digest.keyLength; + this.key = Arrays.Clone(digest.key); + this.digestLength = digest.digestLength; + this.chainValue = Arrays.Clone(digest.chainValue); + this.personalization = Arrays.Clone(digest.personalization); + this.salt = Arrays.Clone(digest.salt); + this.t0 = digest.t0; + this.t1 = digest.t1; + this.f0 = digest.f0; + } + + /** + * Basic sized constructor - size in bits. + * + * @param digestSize size of the digest in bits + */ + public Blake2bDigest(int digestSize) + { + if (digestSize < 8 || digestSize > 512 || digestSize % 8 != 0) + throw new ArgumentException("BLAKE2b digest bit length must be a multiple of 8 and not greater than 512"); + + buffer = new byte[BLOCK_LENGTH_BYTES]; + keyLength = 0; + this.digestLength = digestSize / 8; + Init(); + } + + /** + * Blake2b for authentication ("Prefix-MAC mode"). + * After calling the doFinal() method, the key will + * remain to be used for further computations of + * this instance. + * The key can be overwritten using the clearKey() method. + * + * @param key A key up to 64 bytes or null + */ + public Blake2bDigest(byte[] key) + { + buffer = new byte[BLOCK_LENGTH_BYTES]; + if (key != null) + { + this.key = new byte[key.Length]; + Array.Copy(key, 0, this.key, 0, key.Length); + + if (key.Length > 64) + throw new ArgumentException("Keys > 64 are not supported"); + + keyLength = key.Length; + Array.Copy(key, 0, buffer, 0, key.Length); + bufferPos = BLOCK_LENGTH_BYTES; // zero padding + } + digestLength = 64; + Init(); + } + + /** + * Blake2b with key, required digest length (in bytes), salt and personalization. + * After calling the doFinal() method, the key, the salt and the personal string + * will remain and might be used for further computations with this instance. + * The key can be overwritten using the clearKey() method, the salt (pepper) + * can be overwritten using the clearSalt() method. + * + * @param key A key up to 64 bytes or null + * @param digestLength from 1 up to 64 bytes + * @param salt 16 bytes or null + * @param personalization 16 bytes or null + */ + public Blake2bDigest(byte[] key, int digestLength, byte[] salt, byte[] personalization) + { + if (digestLength < 1 || digestLength > 64) + throw new ArgumentException("Invalid digest length (required: 1 - 64)"); + + this.digestLength = digestLength; + this.buffer = new byte[BLOCK_LENGTH_BYTES]; + + if (salt != null) + { + if (salt.Length != 16) + throw new ArgumentException("salt length must be exactly 16 bytes"); + + this.salt = new byte[16]; + Array.Copy(salt, 0, this.salt, 0, salt.Length); + } + if (personalization != null) + { + if (personalization.Length != 16) + throw new ArgumentException("personalization length must be exactly 16 bytes"); + + this.personalization = new byte[16]; + Array.Copy(personalization, 0, this.personalization, 0, personalization.Length); + } + if (key != null) + { + if (key.Length > 64) + throw new ArgumentException("Keys > 64 are not supported"); + + this.key = new byte[key.Length]; + Array.Copy(key, 0, this.key, 0, key.Length); + + keyLength = key.Length; + Array.Copy(key, 0, buffer, 0, key.Length); + bufferPos = BLOCK_LENGTH_BYTES; // zero padding + } + Init(); + } + + // initialize chainValue + private void Init() + { + if (chainValue == null) + { + chainValue = new ulong[8]; + + chainValue[0] = blake2b_IV[0] ^ (ulong)(digestLength | (keyLength << 8) | 0x1010000); + + // 0x1010000 = ((fanout << 16) | (depth << 24) | (leafLength << + // 32)); + // with fanout = 1; depth = 0; leafLength = 0; + chainValue[1] = blake2b_IV[1];// ^ nodeOffset; with nodeOffset = 0; + chainValue[2] = blake2b_IV[2];// ^ ( nodeDepth | (innerHashLength << 8) ); + // with nodeDepth = 0; innerHashLength = 0; + + chainValue[3] = blake2b_IV[3]; + + chainValue[4] = blake2b_IV[4]; + chainValue[5] = blake2b_IV[5]; + if (salt != null) + { + chainValue[4] ^= Pack.LE_To_UInt64(salt, 0); + chainValue[5] ^= Pack.LE_To_UInt64(salt, 8); + } + + chainValue[6] = blake2b_IV[6]; + chainValue[7] = blake2b_IV[7]; + if (personalization != null) + { + chainValue[6] ^= Pack.LE_To_UInt64(personalization, 0); + chainValue[7] ^= Pack.LE_To_UInt64(personalization, 8); + } + } + } + + private void InitializeInternalState() + { + // initialize v: + Array.Copy(chainValue, 0, internalState, 0, chainValue.Length); + Array.Copy(blake2b_IV, 0, internalState, chainValue.Length, 4); + internalState[12] = t0 ^ blake2b_IV[4]; + internalState[13] = t1 ^ blake2b_IV[5]; + internalState[14] = f0 ^ blake2b_IV[6]; + internalState[15] = blake2b_IV[7];// ^ f1 with f1 = 0 + } + + /** + * update the message digest with a single byte. + * + * @param b the input byte to be entered. + */ + public void Update(byte b) + { + // process the buffer if full else add to buffer: + int remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength == 0) + { // full buffer + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^64 + t1++; + } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Compress(buffer); +#else + Compress(buffer, 0); +#endif + Array.Clear(buffer, 0, buffer.Length);// clear buffer + buffer[0] = b; + bufferPos = 1; + } + else + { + buffer[bufferPos] = b; + bufferPos++; + } + } + + /** + * update the message digest with a block of bytes. + * + * @param message the byte array containing the data. + * @param offset the offset into the byte array where the data starts. + * @param len the length of the data. + */ + public void BlockUpdate(byte[] message, int offset, int len) + { + if (message == null || len == 0) + return; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(message.AsSpan(offset, len)); +#else + int remainingLength = 0; // left bytes of buffer + + if (bufferPos != 0) + { // commenced, incomplete buffer + + // complete the buffer: + remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength < len) + { // full buffer + at least 1 byte + Array.Copy(message, offset, buffer, bufferPos, remainingLength); + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^64 + t1++; + } + Compress(buffer, 0); + bufferPos = 0; + Array.Clear(buffer, 0, buffer.Length);// clear buffer + } + else + { + Array.Copy(message, offset, buffer, bufferPos, len); + bufferPos += len; + return; + } + } + + // process blocks except last block (also if last block is full) + int messagePos; + int blockWiseLastPos = offset + len - BLOCK_LENGTH_BYTES; + for (messagePos = offset + remainingLength; messagePos < blockWiseLastPos; messagePos += BLOCK_LENGTH_BYTES) + { // block wise 128 bytes + // without buffer: + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { + t1++; + } + Compress(message, messagePos); + } + + // fill the buffer with left bytes, this might be a full block + Array.Copy(message, messagePos, buffer, 0, offset + len - messagePos); + bufferPos += offset + len - messagePos; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + if (input.IsEmpty) + return; + + int remainingLength = 0; // left bytes of buffer + + if (bufferPos != 0) + { // commenced, incomplete buffer + + // complete the buffer: + remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength < input.Length) + { // full buffer + at least 1 byte + input[..remainingLength].CopyTo(buffer.AsSpan(bufferPos)); + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^64 + t1++; + } + Compress(buffer); + bufferPos = 0; + Array.Clear(buffer, 0, buffer.Length);// clear buffer + } + else + { + input.CopyTo(buffer.AsSpan(bufferPos)); + bufferPos += input.Length; + return; + } + } + + // process blocks except last block (also if last block is full) + int messagePos; + int blockWiseLastPos = input.Length - BLOCK_LENGTH_BYTES; + for (messagePos = remainingLength; messagePos < blockWiseLastPos; messagePos += BLOCK_LENGTH_BYTES) + { // block wise 128 bytes + // without buffer: + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { + t1++; + } + Compress(input[messagePos..]); + } + + // fill the buffer with left bytes, this might be a full block + input[messagePos..].CopyTo(buffer.AsSpan()); + bufferPos += input.Length - messagePos; + } +#endif + + /** + * close the digest, producing the final digest value. The doFinal + * call leaves the digest reset. + * Key, salt and personal string remain. + * + * @param out the array the digest is to be copied into. + * @param outOffset the offset into the out array the digest is to start at. + */ + public int DoFinal(byte[] output, int outOffset) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOffset)); +#else + f0 = 0xFFFFFFFFFFFFFFFFUL; + t0 += (ulong)bufferPos; + if (bufferPos > 0 && t0 == 0) + { + t1++; + } + Compress(buffer, 0); + Array.Clear(buffer, 0, buffer.Length);// Holds eventually the key if input is null + Array.Clear(internalState, 0, internalState.Length); + + int full = digestLength >> 3, partial = digestLength & 7; + Pack.UInt64_To_LE(chainValue, 0, full, output, outOffset); + if (partial > 0) + { + byte[] bytes = new byte[8]; + Pack.UInt64_To_LE(chainValue[full], bytes, 0); + Array.Copy(bytes, 0, output, outOffset + digestLength - partial, partial); + } + + Array.Clear(chainValue, 0, chainValue.Length); + + Reset(); + + return digestLength; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + f0 = 0xFFFFFFFFFFFFFFFFUL; + t0 += (ulong)bufferPos; + if (bufferPos > 0 && t0 == 0) + { + t1++; + } + Compress(buffer); + Array.Clear(buffer, 0, buffer.Length);// Holds eventually the key if input is null + Array.Clear(internalState, 0, internalState.Length); + + int full = digestLength >> 3, partial = digestLength & 7; + Pack.UInt64_To_LE(chainValue.AsSpan(0, full), output); + if (partial > 0) + { + Span bytes = stackalloc byte[8]; + Pack.UInt64_To_LE(chainValue[full], bytes); + bytes[..partial].CopyTo(output[(digestLength - partial)..]); + } + + Array.Clear(chainValue, 0, chainValue.Length); + + Reset(); + + return digestLength; + } +#endif + + /** + * Reset the digest back to it's initial state. + * The key, the salt and the personal string will + * remain for further computations. + */ + public void Reset() + { + bufferPos = 0; + f0 = 0L; + t0 = 0L; + t1 = 0L; + chainValue = null; + Array.Clear(buffer, 0, buffer.Length); + if (key != null) + { + Array.Copy(key, 0, buffer, 0, key.Length); + bufferPos = BLOCK_LENGTH_BYTES; // zero padding + } + Init(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Compress(ReadOnlySpan message) + { + InitializeInternalState(); + + Span m = stackalloc ulong[16]; + Pack.LE_To_UInt64(message, m); + + for (int round = 0; round < ROUNDS; round++) + { + // G apply to columns of internalState:m[blake2b_sigma[round][2 * blockPos]] /+1 + G(m[blake2b_sigma[round, 0]], m[blake2b_sigma[round, 1]], 0, 4, 8, 12); + G(m[blake2b_sigma[round, 2]], m[blake2b_sigma[round, 3]], 1, 5, 9, 13); + G(m[blake2b_sigma[round, 4]], m[blake2b_sigma[round, 5]], 2, 6, 10, 14); + G(m[blake2b_sigma[round, 6]], m[blake2b_sigma[round, 7]], 3, 7, 11, 15); + // G apply to diagonals of internalState: + G(m[blake2b_sigma[round, 8]], m[blake2b_sigma[round, 9]], 0, 5, 10, 15); + G(m[blake2b_sigma[round, 10]], m[blake2b_sigma[round, 11]], 1, 6, 11, 12); + G(m[blake2b_sigma[round, 12]], m[blake2b_sigma[round, 13]], 2, 7, 8, 13); + G(m[blake2b_sigma[round, 14]], m[blake2b_sigma[round, 15]], 3, 4, 9, 14); + } + + // update chain values: + for (int offset = 0; offset < chainValue.Length; offset++) + { + chainValue[offset] = chainValue[offset] ^ internalState[offset] ^ internalState[offset + 8]; + } + } +#else + private void Compress(byte[] message, int messagePos) + { + InitializeInternalState(); + + ulong[] m = new ulong[16]; + Pack.LE_To_UInt64(message, messagePos, m); + + for (int round = 0; round < ROUNDS; round++) + { + // G apply to columns of internalState:m[blake2b_sigma[round][2 * blockPos]] /+1 + G(m[blake2b_sigma[round,0]], m[blake2b_sigma[round,1]], 0, 4, 8, 12); + G(m[blake2b_sigma[round,2]], m[blake2b_sigma[round,3]], 1, 5, 9, 13); + G(m[blake2b_sigma[round,4]], m[blake2b_sigma[round,5]], 2, 6, 10, 14); + G(m[blake2b_sigma[round,6]], m[blake2b_sigma[round,7]], 3, 7, 11, 15); + // G apply to diagonals of internalState: + G(m[blake2b_sigma[round,8]], m[blake2b_sigma[round,9]], 0, 5, 10, 15); + G(m[blake2b_sigma[round,10]], m[blake2b_sigma[round,11]], 1, 6, 11, 12); + G(m[blake2b_sigma[round,12]], m[blake2b_sigma[round,13]], 2, 7, 8, 13); + G(m[blake2b_sigma[round,14]], m[blake2b_sigma[round,15]], 3, 4, 9, 14); + } + + // update chain values: + for (int offset = 0; offset < chainValue.Length; offset++) + { + chainValue[offset] = chainValue[offset] ^ internalState[offset] ^ internalState[offset + 8]; + } + } +#endif + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private void G(ulong m1, ulong m2, int posA, int posB, int posC, int posD) + { + internalState[posA] = internalState[posA] + internalState[posB] + m1; + internalState[posD] = Rotr64(internalState[posD] ^ internalState[posA], 32); + internalState[posC] = internalState[posC] + internalState[posD]; + internalState[posB] = Rotr64(internalState[posB] ^ internalState[posC], 24); // replaces 25 of BLAKE + internalState[posA] = internalState[posA] + internalState[posB] + m2; + internalState[posD] = Rotr64(internalState[posD] ^ internalState[posA], 16); + internalState[posC] = internalState[posC] + internalState[posD]; + internalState[posB] = Rotr64(internalState[posB] ^ internalState[posC], 63); // replaces 11 of BLAKE + } + + private static ulong Rotr64(ulong x, int rot) + { + return x >> rot | x << -rot; + } + + /** + * return the algorithm name + * + * @return the algorithm name + */ + public string AlgorithmName => "BLAKE2b"; + + /** + * return the size, in bytes, of the digest produced by this message digest. + * + * @return the size, in bytes, of the digest produced by this message digest. + */ + public int GetDigestSize() + { + return digestLength; + } + + /** + * Return the size in bytes of the internal buffer the digest applies it's compression + * function to. + * + * @return byte length of the digests internal buffer. + */ + public int GetByteLength() + { + return BLOCK_LENGTH_BYTES; + } + + /** + * Overwrite the key + * if it is no longer used (zeroization) + */ + public void ClearKey() + { + if (key != null) + { + Array.Clear(key, 0, key.Length); + Array.Clear(buffer, 0, buffer.Length); + } + } + + /** + * Overwrite the salt (pepper) if it + * is secret and no longer used (zeroization) + */ + public void ClearSalt() + { + if (salt != null) + { + Array.Clear(salt, 0, salt.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs.meta new file mode 100644 index 00000000..6e2072fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5c0deea8745064b488d55fa482c167c9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2bDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs new file mode 100644 index 00000000..c1122ba0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs @@ -0,0 +1,684 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /* + The BLAKE2 cryptographic hash function was designed by Jean- + Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian + Winnerlein. + + Reference Implementation and Description can be found at: https://blake2.net/ + RFC: https://tools.ietf.org/html/rfc7693 + + This implementation does not support the Tree Hashing Mode. + + For unkeyed hashing, developers adapting BLAKE2 to ASN.1 - based + message formats SHOULD use the OID tree at x = 1.3.6.1.4.1.1722.12.2. + + Algorithm | Target | Collision | Hash | Hash ASN.1 | + Identifier | Arch | Security | nn | OID Suffix | + ---------------+--------+-----------+------+------------+ + id-blake2s128 | 32-bit | 2**64 | 16 | x.2.4 | + id-blake2s160 | 32-bit | 2**80 | 20 | x.2.5 | + id-blake2s224 | 32-bit | 2**112 | 28 | x.2.7 | + id-blake2s256 | 32-bit | 2**128 | 32 | x.2.8 | + ---------------+--------+-----------+------+------------+ + */ + + /** + * Implementation of the cryptographic hash function BLAKE2s. + *

+ * BLAKE2s offers a built-in keying mechanism to be used directly + * for authentication ("Prefix-MAC") rather than a HMAC construction. + *

+ * BLAKE2s offers a built-in support for a salt for randomized hashing + * and a personal string for defining a unique hash function for each application. + *

+ * BLAKE2s is optimized for 32-bit platforms and produces digests of any size + * between 1 and 32 bytes. + */ + public sealed class Blake2sDigest + : IDigest + { + /** + * BLAKE2s Initialization Vector + **/ + private static readonly uint[] blake2s_IV = + // Produced from the square root of primes 2, 3, 5, 7, 11, 13, 17, 19. + // The same as SHA-256 IV. + { + 0x6a09e667, 0xbb67ae85, 0x3c6ef372, + 0xa54ff53a, 0x510e527f, 0x9b05688c, + 0x1f83d9ab, 0x5be0cd19 + }; + + /** + * Message word permutations + **/ + private static readonly byte[,] blake2s_sigma = + { + { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 }, + { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }, + { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 }, + { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 }, + { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 }, + { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 }, + { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 }, + { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 }, + { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 }, + { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 } + }; + + private const int ROUNDS = 10; // to use for Catenas H' + private const int BLOCK_LENGTH_BYTES = 64;// bytes + + // General parameters: + private int digestLength = 32; // 1- 32 bytes + private int keyLength = 0; // 0 - 32 bytes for keyed hashing for MAC + private byte[] salt = null; + private byte[] personalization = null; + private byte[] key = null; + + // Tree hashing parameters: + // The Tree Hashing Mode is not supported but these are used for the XOF implementation + private int fanout = 1; // 0-255 + private int depth = 1; // 0-255 + private int leafLength = 0; + private long nodeOffset = 0L; + private int nodeDepth = 0; + private int innerHashLength = 0; + + /** + * Whenever this buffer overflows, it will be processed in the Compress() + * function. For performance issues, long messages will not use this buffer. + */ + private byte[] buffer = null; + /** + * Position of last inserted byte + **/ + private int bufferPos = 0;// a value from 0 up to BLOCK_LENGTH_BYTES + + /** + * Internal state, in the BLAKE2 paper it is called v + **/ + private uint[] internalState = new uint[16]; + /** + * State vector, in the BLAKE2 paper it is called h + **/ + private uint[] chainValue = null; + + // counter (counts bytes): Length up to 2^64 are supported + /** + * holds least significant bits of counter + **/ + private uint t0 = 0; + /** + * holds most significant bits of counter + **/ + private uint t1 = 0; + /** + * finalization flag, for last block: ~0 + **/ + private uint f0 = 0; + + // For Tree Hashing Mode, not used here: + // private long f1 = 0L; // finalization flag, for last node: ~0L + + /** + * BLAKE2s-256 for hashing. + */ + public Blake2sDigest() + : this(256) + { + } + + public Blake2sDigest(Blake2sDigest digest) + { + this.bufferPos = digest.bufferPos; + this.buffer = Arrays.Clone(digest.buffer); + this.keyLength = digest.keyLength; + this.key = Arrays.Clone(digest.key); + this.digestLength = digest.digestLength; + this.internalState = Arrays.Clone(digest.internalState); + this.chainValue = Arrays.Clone(digest.chainValue); + this.t0 = digest.t0; + this.t1 = digest.t1; + this.f0 = digest.f0; + this.salt = Arrays.Clone(digest.salt); + this.personalization = Arrays.Clone(digest.personalization); + this.fanout = digest.fanout; + this.depth = digest.depth; + this.leafLength = digest.leafLength; + this.nodeOffset = digest.nodeOffset; + this.nodeDepth = digest.nodeDepth; + this.innerHashLength = digest.innerHashLength; + } + + /** + * BLAKE2s for hashing. + * + * @param digestBits the desired digest length in bits. Must be a multiple of 8 and less than 256. + */ + public Blake2sDigest(int digestBits) + { + if (digestBits < 8 || digestBits > 256 || digestBits % 8 != 0) + throw new ArgumentException("BLAKE2s digest bit length must be a multiple of 8 and not greater than 256"); + + digestLength = digestBits / 8; + + Init(null, null, null); + } + + /** + * BLAKE2s for authentication ("Prefix-MAC mode"). + *

+ * After calling the doFinal() method, the key will remain to be used for + * further computations of this instance. The key can be overwritten using + * the clearKey() method. + * + * @param key a key up to 32 bytes or null + */ + public Blake2sDigest(byte[] key) + { + Init(null, null, key); + } + + /** + * BLAKE2s with key, required digest length, salt and personalization. + *

+ * After calling the doFinal() method, the key, the salt and the personal + * string will remain and might be used for further computations with this + * instance. The key can be overwritten using the clearKey() method, the + * salt (pepper) can be overwritten using the clearSalt() method. + * + * @param key a key up to 32 bytes or null + * @param digestBytes from 1 up to 32 bytes + * @param salt 8 bytes or null + * @param personalization 8 bytes or null + */ + public Blake2sDigest(byte[] key, int digestBytes, byte[] salt, byte[] personalization) + { + if (digestBytes < 1 || digestBytes > 32) + throw new ArgumentException("Invalid digest length (required: 1 - 32)"); + + this.digestLength = digestBytes; + + Init(salt, personalization, key); + } + + // XOF root hash parameters + internal Blake2sDigest(int digestBytes, byte[] key, byte[] salt, byte[] personalization, long offset) + { + digestLength = digestBytes; + nodeOffset = offset; + + Init(salt, personalization, key); + } + + // XOF internal hash parameters + internal Blake2sDigest(int digestBytes, int hashLength, long offset) + { + digestLength = digestBytes; + nodeOffset = offset; + fanout = 0; + depth = 0; + leafLength = hashLength; + innerHashLength = hashLength; + nodeDepth = 0; + + Init(null, null, null); + } + + // initialize the digest's parameters + private void Init(byte[] salt, byte[] personalization, byte[] key) + { + buffer = new byte[BLOCK_LENGTH_BYTES]; + + if (key != null && key.Length > 0) + { + keyLength = key.Length; + if (keyLength > 32) + throw new ArgumentException("Keys > 32 bytes are not supported"); + + this.key = new byte[keyLength]; + Array.Copy(key, 0, this.key, 0, keyLength); + Array.Copy(key, 0, buffer, 0, keyLength); + bufferPos = BLOCK_LENGTH_BYTES; // zero padding + } + + if (chainValue == null) + { + chainValue = new uint[8]; + + chainValue[0] = blake2s_IV[0] + ^ (uint)(digestLength | (keyLength << 8) | ((fanout << 16) | (depth << 24))); + chainValue[1] = blake2s_IV[1] ^ (uint)leafLength; + + int nofHi = (int)(nodeOffset >> 32); + int nofLo = (int)nodeOffset; + chainValue[2] = blake2s_IV[2] ^ (uint)nofLo; + chainValue[3] = blake2s_IV[3] ^ (uint)(nofHi | (nodeDepth << 16) | (innerHashLength << 24)); + + chainValue[4] = blake2s_IV[4]; + chainValue[5] = blake2s_IV[5]; + if (salt != null) + { + if (salt.Length != 8) + throw new ArgumentException("Salt length must be exactly 8 bytes"); + + this.salt = new byte[8]; + Array.Copy(salt, 0, this.salt, 0, salt.Length); + + chainValue[4] ^= Pack.LE_To_UInt32(salt, 0); + chainValue[5] ^= Pack.LE_To_UInt32(salt, 4); + } + + chainValue[6] = blake2s_IV[6]; + chainValue[7] = blake2s_IV[7]; + if (personalization != null) + { + if (personalization.Length != 8) + throw new ArgumentException("Personalization length must be exactly 8 bytes"); + + this.personalization = new byte[8]; + Array.Copy(personalization, 0, this.personalization, 0, personalization.Length); + + chainValue[6] ^= Pack.LE_To_UInt32(personalization, 0); + chainValue[7] ^= Pack.LE_To_UInt32(personalization, 4); + } + } + } + + private void InitializeInternalState() + { + // initialize v: + Array.Copy(chainValue, 0, internalState, 0, chainValue.Length); + Array.Copy(blake2s_IV, 0, internalState, chainValue.Length, 4); + internalState[12] = t0 ^ blake2s_IV[4]; + internalState[13] = t1 ^ blake2s_IV[5]; + internalState[14] = f0 ^ blake2s_IV[6]; + internalState[15] = blake2s_IV[7];// ^ f1 with f1 = 0 + } + + /** + * Update the message digest with a single byte. + * + * @param b the input byte to be entered. + */ + public void Update(byte b) + { + // process the buffer if full else add to buffer: + int remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength == 0) + { // full buffer + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^32 + t1++; + } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Compress(buffer); +#else + Compress(buffer, 0); +#endif + Array.Clear(buffer, 0, buffer.Length);// clear buffer + buffer[0] = b; + bufferPos = 1; + } + else + { + buffer[bufferPos] = b; + bufferPos++; + } + } + + /** + * Update the message digest with a block of bytes. + * + * @param message the byte array containing the data. + * @param offset the offset into the byte array where the data starts. + * @param len the length of the data. + */ + public void BlockUpdate(byte[] message, int offset, int len) + { + if (message == null || len == 0) + return; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(message.AsSpan(offset, len)); +#else + int remainingLength = 0; // left bytes of buffer + + if (bufferPos != 0) + { // commenced, incomplete buffer + + // complete the buffer: + remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength < len) + { // full buffer + at least 1 byte + Array.Copy(message, offset, buffer, bufferPos, remainingLength); + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^32 + t1++; + } + Compress(buffer, 0); + bufferPos = 0; + Array.Clear(buffer, 0, buffer.Length);// clear buffer + } + else + { + Array.Copy(message, offset, buffer, bufferPos, len); + bufferPos += len; + return; + } + } + + // process blocks except last block (also if last block is full) + int messagePos; + int blockWiseLastPos = offset + len - BLOCK_LENGTH_BYTES; + for (messagePos = offset + remainingLength; + messagePos < blockWiseLastPos; + messagePos += BLOCK_LENGTH_BYTES) + { // block wise 64 bytes + // without buffer: + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { + t1++; + } + Compress(message, messagePos); + } + + // fill the buffer with left bytes, this might be a full block + Array.Copy(message, messagePos, buffer, 0, offset + len + - messagePos); + bufferPos += offset + len - messagePos; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + if (input.IsEmpty) + return; + + int remainingLength = 0; // left bytes of buffer + + if (bufferPos != 0) + { // commenced, incomplete buffer + + // complete the buffer: + remainingLength = BLOCK_LENGTH_BYTES - bufferPos; + if (remainingLength < input.Length) + { // full buffer + at least 1 byte + input[..remainingLength].CopyTo(buffer.AsSpan(bufferPos)); + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { // if message > 2^32 + t1++; + } + Compress(buffer); + bufferPos = 0; + Array.Clear(buffer, 0, buffer.Length);// clear buffer + } + else + { + input.CopyTo(buffer.AsSpan(bufferPos)); + bufferPos += input.Length; + return; + } + } + + // process blocks except last block (also if last block is full) + int messagePos; + int blockWiseLastPos = input.Length - BLOCK_LENGTH_BYTES; + for (messagePos = remainingLength; + messagePos < blockWiseLastPos; + messagePos += BLOCK_LENGTH_BYTES) + { // block wise 64 bytes + // without buffer: + t0 += BLOCK_LENGTH_BYTES; + if (t0 == 0) + { + t1++; + } + Compress(input[messagePos..]); + } + + // fill the buffer with left bytes, this might be a full block + input[messagePos..].CopyTo(buffer.AsSpan()); + bufferPos += input.Length - messagePos; + } +#endif + + /** + * Close the digest, producing the final digest value. The doFinal() call + * leaves the digest reset. Key, salt and personal string remain. + * + * @param out the array the digest is to be copied into. + * @param outOffset the offset into the out array the digest is to start at. + */ + public int DoFinal(byte[] output, int outOffset) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOffset)); +#else + f0 = 0xFFFFFFFFU; + t0 += (uint)bufferPos; + // bufferPos may be < 64, so (t0 == 0) does not work + // for 2^32 < message length > 2^32 - 63 + if ((t0 < 0) && (bufferPos > -t0)) + { + t1++; + } + Compress(buffer, 0); + Array.Clear(buffer, 0, buffer.Length);// Holds eventually the key if input is null + Array.Clear(internalState, 0, internalState.Length); + + int full = digestLength >> 2, partial = digestLength & 3; + Pack.UInt32_To_LE(chainValue, 0, full, output, outOffset); + if (partial > 0) + { + byte[] bytes = new byte[4]; + Pack.UInt32_To_LE(chainValue[full], bytes, 0); + Array.Copy(bytes, 0, output, outOffset + digestLength - partial, partial); + } + + Array.Clear(chainValue, 0, chainValue.Length); + + Reset(); + + return digestLength; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + f0 = 0xFFFFFFFFU; + t0 += (uint)bufferPos; + // bufferPos may be < 64, so (t0 == 0) does not work + // for 2^32 < message length > 2^32 - 63 + if ((t0 < 0) && (bufferPos > -t0)) + { + t1++; + } + Compress(buffer); + Array.Clear(buffer, 0, buffer.Length);// Holds eventually the key if input is null + Array.Clear(internalState, 0, internalState.Length); + + int full = digestLength >> 2, partial = digestLength & 3; + Pack.UInt32_To_LE(chainValue.AsSpan(0, full), output); + if (partial > 0) + { + Span bytes = stackalloc byte[4]; + Pack.UInt32_To_LE(chainValue[full], bytes); + bytes[..partial].CopyTo(output[(digestLength - partial)..]); + } + + Array.Clear(chainValue, 0, chainValue.Length); + + Reset(); + + return digestLength; + } +#endif + + /** + * Reset the digest back to its initial state. The key, the salt and the + * personal string will remain for further computations. + */ + public void Reset() + { + bufferPos = 0; + f0 = 0; + t0 = 0; + t1 = 0; + chainValue = null; + Array.Clear(buffer, 0, buffer.Length); + if (key != null) + { + Array.Copy(key, 0, buffer, 0, key.Length); + bufferPos = BLOCK_LENGTH_BYTES; // zero padding + } + + Init(this.salt, this.personalization, this.key); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Compress(ReadOnlySpan message) + { + InitializeInternalState(); + + Span m = stackalloc uint[16]; + Pack.LE_To_UInt32(message, m); + + for (int round = 0; round < ROUNDS; round++) + { + // G apply to columns of internalState: m[blake2s_sigma[round][2 * blockPos]] /+1 + G(m[blake2s_sigma[round, 0]], m[blake2s_sigma[round, 1]], 0, 4, 8, 12); + G(m[blake2s_sigma[round, 2]], m[blake2s_sigma[round, 3]], 1, 5, 9, 13); + G(m[blake2s_sigma[round, 4]], m[blake2s_sigma[round, 5]], 2, 6, 10, 14); + G(m[blake2s_sigma[round, 6]], m[blake2s_sigma[round, 7]], 3, 7, 11, 15); + // G apply to diagonals of internalState: + G(m[blake2s_sigma[round, 8]], m[blake2s_sigma[round, 9]], 0, 5, 10, 15); + G(m[blake2s_sigma[round, 10]], m[blake2s_sigma[round, 11]], 1, 6, 11, 12); + G(m[blake2s_sigma[round, 12]], m[blake2s_sigma[round, 13]], 2, 7, 8, 13); + G(m[blake2s_sigma[round, 14]], m[blake2s_sigma[round, 15]], 3, 4, 9, 14); + } + + // update chain values: + for (int offset = 0; offset < chainValue.Length; offset++) + { + chainValue[offset] = chainValue[offset] ^ internalState[offset] ^ internalState[offset + 8]; + } + } +#else + private void Compress(byte[] message, int messagePos) + { + InitializeInternalState(); + + uint[] m = new uint[16]; + Pack.LE_To_UInt32(message, messagePos, m); + + for (int round = 0; round < ROUNDS; round++) + { + // G apply to columns of internalState: m[blake2s_sigma[round][2 * blockPos]] /+1 + G(m[blake2s_sigma[round,0]], m[blake2s_sigma[round,1]], 0, 4, 8, 12); + G(m[blake2s_sigma[round,2]], m[blake2s_sigma[round,3]], 1, 5, 9, 13); + G(m[blake2s_sigma[round,4]], m[blake2s_sigma[round,5]], 2, 6, 10, 14); + G(m[blake2s_sigma[round,6]], m[blake2s_sigma[round,7]], 3, 7, 11, 15); + // G apply to diagonals of internalState: + G(m[blake2s_sigma[round,8]], m[blake2s_sigma[round,9]], 0, 5, 10, 15); + G(m[blake2s_sigma[round,10]], m[blake2s_sigma[round,11]], 1, 6, 11, 12); + G(m[blake2s_sigma[round,12]], m[blake2s_sigma[round,13]], 2, 7, 8, 13); + G(m[blake2s_sigma[round,14]], m[blake2s_sigma[round,15]], 3, 4, 9, 14); + } + + // update chain values: + for (int offset = 0; offset < chainValue.Length; offset++) + { + chainValue[offset] = chainValue[offset] ^ internalState[offset] ^ internalState[offset + 8]; + } + } +#endif + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private void G(uint m1, uint m2, int posA, int posB, int posC, int posD) + { + internalState[posA] = internalState[posA] + internalState[posB] + m1; + internalState[posD] = Integers.RotateRight(internalState[posD] ^ internalState[posA], 16); + internalState[posC] = internalState[posC] + internalState[posD]; + internalState[posB] = Integers.RotateRight(internalState[posB] ^ internalState[posC], 12); + internalState[posA] = internalState[posA] + internalState[posB] + m2; + internalState[posD] = Integers.RotateRight(internalState[posD] ^ internalState[posA], 8); + internalState[posC] = internalState[posC] + internalState[posD]; + internalState[posB] = Integers.RotateRight(internalState[posB] ^ internalState[posC], 7); + } + + /** + * Return the algorithm name. + * + * @return the algorithm name + */ + public string AlgorithmName => "BLAKE2s"; + + /** + * Return the size in bytes of the digest produced by this message digest. + * + * @return the size in bytes of the digest produced by this message digest. + */ + public int GetDigestSize() + { + return digestLength; + } + + /** + * Return the size in bytes of the internal buffer the digest applies its + * compression function to. + * + * @return byte length of the digest's internal buffer. + */ + public int GetByteLength() + { + return BLOCK_LENGTH_BYTES; + } + + /** + * Overwrite the key if it is no longer used (zeroization). + */ + public void ClearKey() + { + if (key != null) + { + Array.Clear(key, 0, key.Length); + Array.Clear(buffer, 0, buffer.Length); + } + } + + /** + * Overwrite the salt (pepper) if it is secret and no longer used + * (zeroization). + */ + public void ClearSalt() + { + if (salt != null) + { + Array.Clear(salt, 0, salt.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs.meta new file mode 100644 index 00000000..794d2583 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f38dc128cef64e749839553cc8b9473b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2sDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs new file mode 100644 index 00000000..3b7f7e95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs @@ -0,0 +1,372 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /* + The BLAKE2 cryptographic hash function was designed by Jean- + Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian + Winnerlein. + + Reference Implementation and Description can be found at: https://blake2.net/blake2x.pdf + */ + + /** + * Implementation of the eXtendable Output Function (XOF) BLAKE2xs. + *

+ * BLAKE2xs offers a built-in keying mechanism to be used directly + * for authentication ("Prefix-MAC") rather than a HMAC construction. + *

+ * BLAKE2xs offers a built-in support for a salt for randomized hashing + * and a personal string for defining a unique hash function for each application. + *

+ * BLAKE2xs is optimized for 32-bit platforms and produces digests of any size + * between 1 and 2^16-2 bytes. The length can also be unknown and then the maximum + * length will be 2^32 blocks of 32 bytes. + */ + public sealed class Blake2xsDigest + : IXof + { + /** + * Magic number to indicate an unknown length of digest + */ + public const int UnknownDigestLength = 65535; + + private const int DigestLength = 32; + private const long MaxNumberBlocks = 1L << 32; + + /** + * Expected digest length for the xof. It can be unknown. + */ + private int digestLength; + + /** + * Root hash that will take the updates + */ + private Blake2sDigest hash; + + /** + * Digest of the root hash + */ + private byte[] h0 = null; + + /** + * Digest of each round of the XOF + */ + private byte[] buf = new byte[32]; + + /** + * Current position for a round + */ + private int bufPos = 32; + + /** + * Overall position of the digest. It is useful when the length is known + * in advance to get last block length. + */ + private int digestPos = 0; + + /** + * Keep track of the round number to detect the end of the digest after + * 2^32 blocks of 32 bytes. + */ + private long blockPos = 0; + + /** + * Current node offset incremented by 1 every round. + */ + private long nodeOffset; + + /** + * BLAKE2xs for hashing with unknown digest length + */ + public Blake2xsDigest() + : this(UnknownDigestLength) + { + } + + /** + * BLAKE2xs for hashing + * + * @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1 + */ + public Blake2xsDigest(int digestBytes) + : this(digestBytes, null, null, null) + { + } + + /** + * BLAKE2xs with key + * + * @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1 + * @param key A key up to 32 bytes or null + */ + public Blake2xsDigest(int digestBytes, byte[] key) + : this(digestBytes, key, null, null) + { + } + + /** + * BLAKE2xs with key, salt and personalization + * + * @param digestBytes The desired digest length in bytes. Must be above 1 and less than 2^16-1 + * @param key A key up to 32 bytes or null + * @param salt 8 bytes or null + * @param personalization 8 bytes or null + */ + public Blake2xsDigest(int digestBytes, byte[] key, byte[] salt, byte[] personalization) + { + if (digestBytes < 1 || digestBytes > UnknownDigestLength) + throw new ArgumentException("BLAKE2xs digest length must be between 1 and 2^16-1"); + + digestLength = digestBytes; + nodeOffset = ComputeNodeOffset(); + hash = new Blake2sDigest(DigestLength, key, salt, personalization, nodeOffset); + } + + public Blake2xsDigest(Blake2xsDigest digest) + { + digestLength = digest.digestLength; + hash = new Blake2sDigest(digest.hash); + h0 = Arrays.Clone(digest.h0); + buf = Arrays.Clone(digest.buf); + bufPos = digest.bufPos; + digestPos = digest.digestPos; + blockPos = digest.blockPos; + nodeOffset = digest.nodeOffset; + } + + /** + * Return the algorithm name. + * + * @return the algorithm name + */ + public string AlgorithmName => "BLAKE2xs"; + + /** + * Return the size in bytes of the digest produced by this message digest. + * + * @return the size in bytes of the digest produced by this message digest. + */ + public int GetDigestSize() => digestLength; + + /** + * Return the size in bytes of the internal buffer the digest applies its + * compression function to. + * + * @return byte length of the digest's internal buffer. + */ + public int GetByteLength() => hash.GetByteLength(); + + /** + * Return the maximum size in bytes the digest can produce when the length + * is unknown + * + * @return byte length of the largest digest with unknown length + */ + public long GetUnknownMaxLength() + { + return MaxNumberBlocks * DigestLength; + } + + /** + * Update the message digest with a single byte. + * + * @param in the input byte to be entered. + */ + public void Update(byte b) + { + hash.Update(b); + } + + /** + * Update the message digest with a block of bytes. + * + * @param in the byte array containing the data. + * @param inOff the offset into the byte array where the data starts. + * @param len the length of the data. + */ + public void BlockUpdate(byte[] input, int inOff, int inLen) + { + hash.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + hash.BlockUpdate(input); + } +#endif + + /** + * Reset the digest back to its initial state. The key, the salt and the + * personal string will remain for further computations. + */ + public void Reset() + { + hash.Reset(); + + h0 = null; + bufPos = DigestLength; + digestPos = 0; + blockPos = 0; + nodeOffset = ComputeNodeOffset(); + } + + /** + * Close the digest, producing the final digest value. The doFinal() call + * leaves the digest reset. Key, salt and personal string remain. + * + * @param out the array the digest is to be copied into. + * @param outOffset the offset into the out array the digest is to start at. + */ + public int DoFinal(byte[] output, int outOff) + { + return OutputFinal(output, outOff, digestLength); + } + + /** + * Close the digest, producing the final digest value. The doFinal() call + * leaves the digest reset. Key, salt, personal string remain. + * + * @param out output array to write the output bytes to. + * @param outOff offset to start writing the bytes at. + * @param outLen the number of output bytes requested. + */ + public int OutputFinal(byte[] output, int outOff, int outLen) + { + int ret = Output(output, outOff, outLen); + + Reset(); + + return ret; + } + + /** + * Start outputting the results of the final calculation for this digest. Unlike doFinal, this method + * will continue producing output until the Xof is explicitly reset, or signals otherwise. + * + * @param out output array to write the output bytes to. + * @param outOff offset to start writing the bytes at. + * @param outLen the number of output bytes requested. + * @return the number of bytes written + */ + public int Output(byte[] output, int outOff, int outLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Output(output.AsSpan(outOff, outLen)); +#else + if (h0 == null) + { + h0 = new byte[hash.GetDigestSize()]; + hash.DoFinal(h0, 0); + } + + if (digestLength != UnknownDigestLength) + { + if (digestPos + outLen > digestLength) + throw new ArgumentException("Output length is above the digest length"); + } + else if (blockPos << 5 >= GetUnknownMaxLength()) + { + throw new ArgumentException("Maximum length is 2^32 blocks of 32 bytes"); + } + + for (int i = 0; i < outLen; i++) + { + if (bufPos >= DigestLength) + { + Blake2sDigest h = new Blake2sDigest(ComputeStepLength(), DigestLength, nodeOffset); + h.BlockUpdate(h0, 0, h0.Length); + + Arrays.Fill(buf, 0); + h.DoFinal(buf, 0); + bufPos = 0; + nodeOffset++; + blockPos++; + } + output[outOff + i] = buf[bufPos]; + bufPos++; + digestPos++; + } + + return outLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + return OutputFinal(output[..digestLength]); + } + + public int OutputFinal(Span output) + { + int ret = Output(output); + + Reset(); + + return ret; + } + + public int Output(Span output) + { + int outLen = output.Length; + if (h0 == null) + { + h0 = new byte[hash.GetDigestSize()]; + hash.DoFinal(h0); + } + + if (digestLength != UnknownDigestLength) + { + if (digestPos + outLen > digestLength) + throw new ArgumentException("Output length is above the digest length"); + } + else if (blockPos << 5 >= GetUnknownMaxLength()) + { + throw new ArgumentException("Maximum length is 2^32 blocks of 32 bytes"); + } + + for (int i = 0; i < outLen; i++) + { + if (bufPos >= DigestLength) + { + Blake2sDigest h = new Blake2sDigest(ComputeStepLength(), DigestLength, nodeOffset); + h.BlockUpdate(h0); + + Arrays.Fill(buf, 0); + h.DoFinal(buf); + bufPos = 0; + nodeOffset++; + blockPos++; + } + output[i] = buf[bufPos]; + bufPos++; + digestPos++; + } + + return outLen; + } +#endif + + // get the next round length. If the length is unknown, the digest length is always the maximum. + private int ComputeStepLength() + { + if (digestLength == UnknownDigestLength) + return DigestLength; + + return System.Math.Min(DigestLength, digestLength - digestPos); + } + + private long ComputeNodeOffset() + { + return digestLength * 0x100000000L; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs.meta new file mode 100644 index 00000000..d0d2acf0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f72a9edc1d4af6742be974d8134695bf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake2xsDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs new file mode 100644 index 00000000..618d45fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs @@ -0,0 +1,1051 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public sealed class Blake3Digest + : IDigest, IMemoable, IXof + { + /** + * Already outputting error. + */ + private const string ERR_OUTPUTTING = "Already outputting"; + + /** + * Number of Words. + */ + private const int NUMWORDS = 8; + + /** + * Number of Rounds. + */ + private const int ROUNDS = 7; + + /** + * Buffer length. + */ + private const int BLOCKLEN = NUMWORDS * Integers.NumBytes * 2; + + /** + * Chunk length. + */ + private const int CHUNKLEN = 1024; + + /** + * ChunkStart Flag. + */ + private const int CHUNKSTART = 1; + + /** + * ChunkEnd Flag. + */ + private const int CHUNKEND = 2; + + /** + * Parent Flag. + */ + private const int PARENT = 4; + + /** + * Root Flag. + */ + private const int ROOT = 8; + + /** + * KeyedHash Flag. + */ + private const int KEYEDHASH = 16; + + /** + * DeriveContext Flag. + */ + private const int DERIVECONTEXT = 32; + + /** + * DeriveKey Flag. + */ + private const int DERIVEKEY = 64; + + /** + * Chaining0 State Locations. + */ + private const int CHAINING0 = 0; + + /** + * Chaining1 State Location. + */ + private const int CHAINING1 = 1; + + /** + * Chaining2 State Location. + */ + private const int CHAINING2 = 2; + + /** + * Chaining3 State Location. + */ + private const int CHAINING3 = 3; + + /** + * Chaining4 State Location. + */ + private const int CHAINING4 = 4; + + /** + * Chaining5 State Location. + */ + private const int CHAINING5 = 5; + + /** + * Chaining6 State Location. + */ + private const int CHAINING6 = 6; + + /** + * Chaining7 State Location. + */ + private const int CHAINING7 = 7; + + /** + * IV0 State Locations. + */ + private const int IV0 = 8; + + /** + * IV1 State Location. + */ + private const int IV1 = 9; + + /** + * IV2 State Location. + */ + private const int IV2 = 10; + + /** + * IV3 State Location. + */ + private const int IV3 = 11; + + /** + * Count0 State Location. + */ + private const int COUNT0 = 12; + + /** + * Count1 State Location. + */ + private const int COUNT1 = 13; + + /** + * DataLen State Location. + */ + private const int DATALEN = 14; + + /** + * Flags State Location. + */ + private const int FLAGS = 15; + + /** + * Message word permutations. + */ + private static readonly byte[] SIGMA = { 2, 6, 3, 10, 7, 0, 4, 13, 1, 11, 12, 5, 9, 14, 15, 8 }; + + /** + * Blake3 Initialization Vector. + */ + private static readonly uint[] IV = { + 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 + }; + + /** + * The byte input/output buffer. + */ + private readonly byte[] m_theBuffer = new byte[BLOCKLEN]; + + /** + * The key. + */ + private readonly uint[] m_theK = new uint[NUMWORDS]; + + /** + * The chaining value. + */ + private readonly uint[] m_theChaining = new uint[NUMWORDS]; + + /** + * The state. + */ + private readonly uint[] m_theV = new uint[NUMWORDS << 1]; + + /** + * The message Buffer. + */ + private readonly uint[] m_theM = new uint[NUMWORDS << 1]; + + /** + * The indices. + */ + private readonly byte[] m_theIndices = new byte[NUMWORDS << 1]; + + /** + * The chainingStack. + */ + private readonly List m_theStack = new List(); + + /** + * The default digestLength. + */ + private readonly int m_theDigestLen; + + /** + * Are we outputting? + */ + private bool m_outputting; + + /** + * How many more bytes can we output? + */ + private long m_outputAvailable; + + /** + * The current mode. + */ + private int m_theMode; + + /** + * The output mode. + */ + private int m_theOutputMode; + + /** + * The output dataLen. + */ + private int m_theOutputDataLen; + + /** + * The block counter. + */ + private long m_theCounter; + + /** + * The # of bytes in the current block. + */ + private int m_theCurrBytes; + + /** + * The position of the next byte in the buffer. + */ + private int m_thePos; + + public Blake3Digest() + : this((BLOCKLEN >> 1) * 8) + { + } + + /// the default digest size (in bits) + public Blake3Digest(int pDigestSize) + { + m_theDigestLen = pDigestSize / 8; + + Init(null); + } + + /** + * Constructor. + * + * @param pSource the source digest. + */ + public Blake3Digest(Blake3Digest pSource) + { + /* Copy default digest length */ + m_theDigestLen = pSource.m_theDigestLen; + + /* Initialise from source */ + Reset(pSource); + } + + public int GetByteLength() => BLOCKLEN; + + public string AlgorithmName => "BLAKE3"; + + public int GetDigestSize() => m_theDigestLen; + + /** + * Initialise. + * + * @param pParams the parameters. + */ + public void Init(Blake3Parameters pParams) + { + /* Access key/context */ + byte[] myKey = pParams?.GetKey(); + byte[] myContext = pParams?.GetContext(); + + /* Reset the digest */ + Reset(); + + /* If we have a key */ + if (myKey != null) + { + /* Initialise with the key */ + InitKey(myKey); + Arrays.Fill(myKey, 0); + + /* else if we have a context */ + } + else if (myContext != null) + { + /* Initialise for deriving context */ + InitNullKey(); + m_theMode = DERIVECONTEXT; + + /* Derive key from context */ + BlockUpdate(myContext, 0, myContext.Length); + DoFinal(m_theBuffer, 0); + InitKeyFromContext(); + Reset(); + + /* Else init null key and reset mode */ + } + else + { + InitNullKey(); + m_theMode = 0; + } + } + + public void Update(byte b) + { + /* Check that we are not outputting */ + if (m_outputting) + throw new InvalidOperationException(ERR_OUTPUTTING); + + /* If the buffer is full */ + int blockLen = m_theBuffer.Length; + int remainingLength = blockLen - m_thePos; + if (remainingLength == 0) + { + /* Process the buffer */ +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + CompressBlock(m_theBuffer); +#else + CompressBlock(m_theBuffer, 0); +#endif + + /* Reset the buffer */ + Arrays.Fill(m_theBuffer, 0); + m_thePos = 0; + } + + /* Store the byte */ + m_theBuffer[m_thePos] = b; + m_thePos++; + } + + public void BlockUpdate(byte[] pMessage, int pOffset, int pLen) + { + /* Ignore null operation */ + if (pMessage == null) + return; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(pMessage.AsSpan(pOffset, pLen)); +#else + if (pLen == 0) + return; + + /* Check that we are not outputting */ + if (m_outputting) + throw new InvalidOperationException(ERR_OUTPUTTING); + + /* Process any bytes currently in the buffer */ + int remainingLen = 0; // left bytes of buffer + if (m_thePos != 0) + { + /* Calculate space remaining in the buffer */ + remainingLen = BLOCKLEN - m_thePos; + + /* If there is sufficient space in the buffer */ + if (remainingLen >= pLen) + { + /* Copy data into buffer and return */ + Array.Copy(pMessage, pOffset, m_theBuffer, m_thePos, pLen); + m_thePos += pLen; + return; + } + + /* Fill the buffer */ + Array.Copy(pMessage, pOffset, m_theBuffer, m_thePos, remainingLen); + + /* Process the buffer */ + CompressBlock(m_theBuffer, 0); + + /* Reset the buffer */ + m_thePos = 0; + Arrays.Fill(m_theBuffer, 0); + } + + /* process all blocks except the last one */ + int messagePos; + int blockWiseLastPos = pOffset + pLen - BLOCKLEN; + for (messagePos = pOffset + remainingLen; messagePos < blockWiseLastPos; messagePos += BLOCKLEN) + { + /* Process the buffer */ + CompressBlock(pMessage, messagePos); + } + + /* Fill the buffer with the remaining bytes of the message */ + int len = pLen - messagePos; + Array.Copy(pMessage, messagePos, m_theBuffer, 0, pOffset + len); + m_thePos += pOffset + len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + if (input.IsEmpty) + return; + + /* Check that we are not outputting */ + if (m_outputting) + throw new InvalidOperationException(ERR_OUTPUTTING); + + int pLen = input.Length; + + /* Process any bytes currently in the buffer */ + int remainingLen = 0; // left bytes of buffer + if (m_thePos != 0) + { + /* Calculate space remaining in the buffer */ + remainingLen = BLOCKLEN - m_thePos; + + /* If there is sufficient space in the buffer */ + if (remainingLen >= pLen) + { + /* Copy data into buffer and return */ + input.CopyTo(m_theBuffer.AsSpan(m_thePos)); + m_thePos += pLen; + return; + } + + /* Fill the buffer */ + input[..remainingLen].CopyTo(m_theBuffer.AsSpan(m_thePos)); + + /* Process the buffer */ + CompressBlock(m_theBuffer); + + /* Reset the buffer */ + m_thePos = 0; + Arrays.Fill(m_theBuffer, 0); + } + + /* process all blocks except the last one */ + int messagePos; + int blockWiseLastPos = pLen - BLOCKLEN; + for (messagePos = remainingLen; messagePos < blockWiseLastPos; messagePos += BLOCKLEN) + { + /* Process the buffer */ + CompressBlock(input[messagePos..]); + } + + /* Fill the buffer with the remaining bytes of the message */ + input[messagePos..].CopyTo(m_theBuffer); + m_thePos += pLen - messagePos; + } +#endif + + public int DoFinal(byte[] pOutput, int pOutOffset) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return OutputFinal(pOutput.AsSpan(pOutOffset, GetDigestSize())); +#else + return OutputFinal(pOutput, pOutOffset, GetDigestSize()); +#endif + } + + public int OutputFinal(byte[] pOut, int pOutOffset, int pOutLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return OutputFinal(pOut.AsSpan(pOutOffset, pOutLen)); +#else + /* Reject if we are already outputting */ + if (m_outputting) + throw new InvalidOperationException(ERR_OUTPUTTING); + + /* Build the required output */ + int length = Output(pOut, pOutOffset, pOutLen); + + /* reset the underlying digest and return the length */ + Reset(); + return length; +#endif + } + + public int Output(byte[] pOut, int pOutOffset, int pOutLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Output(pOut.AsSpan(pOutOffset, pOutLen)); +#else + /* If we have not started outputting yet */ + if (!m_outputting) + { + /* Process the buffer */ + CompressFinalBlock(m_thePos); + } + + /* Reject if there is insufficient Xof remaining */ + if (pOutLen < 0 || (m_outputAvailable >= 0 && pOutLen > m_outputAvailable)) + throw new ArgumentException("Insufficient bytes remaining"); + + /* If we have some remaining data in the current buffer */ + int dataLeft = pOutLen; + int outPos = pOutOffset; + if (m_thePos < BLOCKLEN) + { + /* Copy data from current hash */ + int dataToCopy = System.Math.Min(dataLeft, BLOCKLEN - m_thePos); + Array.Copy(m_theBuffer, m_thePos, pOut, outPos, dataToCopy); + + /* Adjust counters */ + m_thePos += dataToCopy; + outPos += dataToCopy; + dataLeft -= dataToCopy; + } + + /* Loop until we have completed the request */ + while (dataLeft > 0) + { + /* Calculate the next block */ + NextOutputBlock(); + + /* Copy data from current hash */ + int dataToCopy = System.Math.Min(dataLeft, BLOCKLEN); + Array.Copy(m_theBuffer, 0, pOut, outPos, dataToCopy); + + /* Adjust counters */ + m_thePos += dataToCopy; + outPos += dataToCopy; + dataLeft -= dataToCopy; + } + + /* Adjust outputAvailable */ + m_outputAvailable -= pOutLen; + + /* Return the number of bytes transferred */ + return pOutLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + return OutputFinal(output[..GetDigestSize()]); + } + + public int OutputFinal(Span output) + { + /* Reject if we are already outputting */ + if (m_outputting) + throw new InvalidOperationException(ERR_OUTPUTTING); + + /* Build the required output */ + int length = Output(output); + + /* reset the underlying digest and return the length */ + Reset(); + return length; + } + + public int Output(Span output) + { + /* If we have not started outputting yet */ + if (!m_outputting) + { + /* Process the buffer */ + CompressFinalBlock(m_thePos); + } + + int pOutOffset = 0, pOutLen = output.Length; + /* Reject if there is insufficient Xof remaining */ + if (pOutLen < 0 || (m_outputAvailable >= 0 && pOutLen > m_outputAvailable)) + throw new ArgumentException("Insufficient bytes remaining"); + + /* If we have some remaining data in the current buffer */ + int dataLeft = pOutLen; + int outPos = pOutOffset; + if (m_thePos < BLOCKLEN) + { + /* Copy data from current hash */ + int dataToCopy = System.Math.Min(dataLeft, BLOCKLEN - m_thePos); + m_theBuffer.AsSpan(m_thePos, dataToCopy).CopyTo(output[outPos..]); + + /* Adjust counters */ + m_thePos += dataToCopy; + outPos += dataToCopy; + dataLeft -= dataToCopy; + } + + /* Loop until we have completed the request */ + while (dataLeft > 0) + { + /* Calculate the next block */ + NextOutputBlock(); + + /* Copy data from current hash */ + int dataToCopy = System.Math.Min(dataLeft, BLOCKLEN); + m_theBuffer.AsSpan(0, dataToCopy).CopyTo(output[outPos..]); + + /* Adjust counters */ + m_thePos += dataToCopy; + outPos += dataToCopy; + dataLeft -= dataToCopy; + } + + /* Adjust outputAvailable */ + m_outputAvailable -= pOutLen; + + /* Return the number of bytes transferred */ + return pOutLen; + } +#endif + + public void Reset() + { + ResetBlockCount(); + m_thePos = 0; + m_outputting = false; + Arrays.Fill(m_theBuffer, 0); + } + + public void Reset(IMemoable pSource) + { + /* Access source */ + Blake3Digest mySource = (Blake3Digest)pSource; + + /* Reset counter */ + m_theCounter = mySource.m_theCounter; + m_theCurrBytes = mySource.m_theCurrBytes; + m_theMode = mySource.m_theMode; + + /* Reset output state */ + m_outputting = mySource.m_outputting; + m_outputAvailable = mySource.m_outputAvailable; + m_theOutputMode = mySource.m_theOutputMode; + m_theOutputDataLen = mySource.m_theOutputDataLen; + + /* Copy state */ + Array.Copy(mySource.m_theChaining, 0, m_theChaining, 0, m_theChaining.Length); + Array.Copy(mySource.m_theK, 0, m_theK, 0, m_theK.Length); + Array.Copy(mySource.m_theM, 0, m_theM, 0, m_theM.Length); + + /* Copy stack */ + m_theStack.Clear(); + foreach (var element in mySource.m_theStack) + { + m_theStack.Add(Arrays.Clone(element)); + } + + /* Copy buffer */ + Array.Copy(mySource.m_theBuffer, 0, m_theBuffer, 0, m_theBuffer.Length); + m_thePos = mySource.m_thePos; + } + + public IMemoable Copy() + { + return new Blake3Digest(this); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void CompressBlock(ReadOnlySpan block) + { + /* Initialise state and compress message */ + InitChunkBlock(BLOCKLEN, false); + InitM(block); + Compress(); + + /* Adjust stack if we have completed a block */ + if (m_theCurrBytes == 0) + { + AdjustStack(); + } + } + + private void InitM(ReadOnlySpan block) + { + /* Copy message bytes into word array */ + Pack.LE_To_UInt32(block, m_theM); + } +#else + /** + * Compress next block of the message. + * + * @param pMessage the message buffer + * @param pMsgPos the position within the message buffer + */ + private void CompressBlock(byte[] pMessage, int pMsgPos) + { + /* Initialise state and compress message */ + InitChunkBlock(BLOCKLEN, false); + InitM(pMessage, pMsgPos); + Compress(); + + /* Adjust stack if we have completed a block */ + if (m_theCurrBytes == 0) + { + AdjustStack(); + } + } + + /** + * Initialise M from message. + * + * @param pMessage the source message + * @param pMsgPos the message position + */ + private void InitM(byte[] pMessage, int pMsgPos) + { + /* Copy message bytes into word array */ + Pack.LE_To_UInt32(pMessage, pMsgPos, m_theM); + } +#endif + + /** + * Adjust the stack. + */ + private void AdjustStack() + { + /* Loop to combine blocks */ + long myCount = m_theCounter; + while (myCount > 0) + { + /* Break loop if we are not combining */ + if ((myCount & 1) == 1) + break; + + /* Build the message to be hashed */ + uint[] myLeft = m_theStack[m_theStack.Count - 1]; + m_theStack.RemoveAt(m_theStack.Count - 1); + + Array.Copy(myLeft, 0, m_theM, 0, NUMWORDS); + Array.Copy(m_theChaining, 0, m_theM, NUMWORDS, NUMWORDS); + + /* Create parent block */ + InitParentBlock(); + Compress(); + + /* Next block */ + myCount >>= 1; + } + + /* Add back to the stack */ + m_theStack.Add(Arrays.CopyOf(m_theChaining, NUMWORDS)); + } + + /** + * Compress final block. + * + * @param pDataLen the data length + */ + private void CompressFinalBlock(int pDataLen) + { + /* Initialise state and compress message */ + InitChunkBlock(pDataLen, true); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + InitM(m_theBuffer); +#else + InitM(m_theBuffer, 0); +#endif + Compress(); + + /* Finalise stack */ + ProcessStack(); + } + + /** + * Process the stack. + */ + private void ProcessStack() + { + /* Finalise stack */ + while (m_theStack.Count > 0) + { + /* Build the message to be hashed */ + uint[] myLeft = m_theStack[m_theStack.Count - 1]; + m_theStack.RemoveAt(m_theStack.Count - 1); + + Array.Copy(myLeft, 0, m_theM, 0, NUMWORDS); + Array.Copy(m_theChaining, 0, m_theM, NUMWORDS, NUMWORDS); + + /* Create parent block */ + InitParentBlock(); + if (m_theStack.Count < 1) + { + SetRoot(); + } + Compress(); + } + } + + /** + * Perform compression. + */ + private void Compress() + { + /* Initialise the buffers */ + InitIndices(); + + /* Loop through the rounds */ + for (int round = 0; round < ROUNDS - 1; round++) + { + /* Perform the round and permuteM */ + PerformRound(); + PermuteIndices(); + } + PerformRound(); + AdjustChaining(); + } + + /** + * Perform a round. + */ +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private void PerformRound() + { + /* Apply to columns of V */ + MixG(0, CHAINING0, CHAINING4, IV0, COUNT0); + MixG(1, CHAINING1, CHAINING5, IV1, COUNT1); + MixG(2, CHAINING2, CHAINING6, IV2, DATALEN); + MixG(3, CHAINING3, CHAINING7, IV3, FLAGS); + + /* Apply to diagonals of V */ + MixG(4, CHAINING0, CHAINING5, IV2, FLAGS); + MixG(5, CHAINING1, CHAINING6, IV3, COUNT0); + MixG(6, CHAINING2, CHAINING7, IV0, COUNT1); + MixG(7, CHAINING3, CHAINING4, IV1, DATALEN); + } + + /** + * Adjust Chaining after compression. + */ + private void AdjustChaining() + { + /* If we are outputting */ + if (m_outputting) + { + /* Adjust full state */ + for (int i = 0; i < NUMWORDS; i++) + { + m_theV[i] ^= m_theV[i + NUMWORDS]; + m_theV[i + NUMWORDS] ^= m_theChaining[i]; + } + + /* Output state to buffer */ + Pack.UInt32_To_LE(m_theV, m_theBuffer, 0); + m_thePos = 0; + + /* Else just build chain value */ + } + else + { + /* Combine V into Chaining */ + for (int i = 0; i < NUMWORDS; i++) + { + m_theChaining[i] = m_theV[i] ^ m_theV[i + NUMWORDS]; + } + } + } + + /** + * Mix function G. + * + * @param msgIdx the message index + * @param posA position A in V + * @param posB position B in V + * @param posC position C in V + * @param posD poistion D in V + */ +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private void MixG(int msgIdx, int posA, int posB, int posC, int posD) + { + /* Determine indices */ + int msg = msgIdx << 1; + + /* Perform the Round */ + m_theV[posA] += m_theV[posB] + m_theM[m_theIndices[msg++]]; + m_theV[posD] = Integers.RotateRight(m_theV[posD] ^ m_theV[posA], 16); + m_theV[posC] += m_theV[posD]; + m_theV[posB] = Integers.RotateRight(m_theV[posB] ^ m_theV[posC], 12); + m_theV[posA] += m_theV[posB] + m_theM[m_theIndices[msg]]; + m_theV[posD] = Integers.RotateRight(m_theV[posD] ^ m_theV[posA], 8); + m_theV[posC] += m_theV[posD]; + m_theV[posB] = Integers.RotateRight(m_theV[posB] ^ m_theV[posC], 7); + } + + /** + * initialise the indices. + */ + private void InitIndices() + { + for (byte i = 0; i < m_theIndices.Length; i++) + { + m_theIndices[i] = i; + } + } + + /** + * PermuteIndices. + */ + private void PermuteIndices() + { + for (byte i = 0; i < m_theIndices.Length; i++) + { + m_theIndices[i] = SIGMA[m_theIndices[i]]; + } + } + + /** + * Initialise null key. + */ + private void InitNullKey() + { + Array.Copy(IV, 0, m_theK, 0, NUMWORDS); + } + + /** + * Initialise key. + * + * @param pKey the keyBytes + */ + private void InitKey(byte[] pKey) + { + /* Copy message bytes into word array */ + Pack.LE_To_UInt32(pKey, 0, m_theK); + m_theMode = KEYEDHASH; + } + + /** + * Initialise key from context. + */ + private void InitKeyFromContext() + { + Array.Copy(m_theV, 0, m_theK, 0, NUMWORDS); + m_theMode = DERIVEKEY; + } + + /** + * Initialise chunk block. + * + * @param pDataLen the dataLength + * @param pFinal is this the final chunk? + */ + private void InitChunkBlock(int pDataLen, bool pFinal) + { + /* Initialise the block */ + Array.Copy(m_theCurrBytes == 0 ? m_theK : m_theChaining, 0, m_theV, 0, NUMWORDS); + Array.Copy(IV, 0, m_theV, NUMWORDS, NUMWORDS >> 1); + m_theV[COUNT0] = (uint)m_theCounter; + m_theV[COUNT1] = (uint)(m_theCounter >> Integers.NumBits); + m_theV[DATALEN] = (uint)pDataLen; + m_theV[FLAGS] = (uint)(m_theMode + + (m_theCurrBytes == 0 ? CHUNKSTART : 0) + + (pFinal ? CHUNKEND : 0)); + + /* * Adjust block count */ + m_theCurrBytes += pDataLen; + if (m_theCurrBytes >= CHUNKLEN) + { + IncrementBlockCount(); + m_theV[FLAGS] |= CHUNKEND; + } + + /* If we are single chunk */ + if (pFinal && m_theStack.Count < 1) + { + SetRoot(); + } + } + + /** + * Initialise parent block. + */ + private void InitParentBlock() + { + /* Initialise the block */ + Array.Copy(m_theK, 0, m_theV, 0, NUMWORDS); + Array.Copy(IV, 0, m_theV, NUMWORDS, NUMWORDS >> 1); + m_theV[COUNT0] = 0; + m_theV[COUNT1] = 0; + m_theV[DATALEN] = BLOCKLEN; + m_theV[FLAGS] = (uint)(m_theMode | PARENT); + } + + /** + * Initialise output block. + */ + private void NextOutputBlock() + { + /* Increment the counter */ + m_theCounter++; + + /* Initialise the block */ + Array.Copy(m_theChaining, 0, m_theV, 0, NUMWORDS); + Array.Copy(IV, 0, m_theV, NUMWORDS, NUMWORDS >> 1); + m_theV[COUNT0] = (uint)m_theCounter; + m_theV[COUNT1] = (uint)(m_theCounter >> Integers.NumBits); + m_theV[DATALEN] = (uint)m_theOutputDataLen; + m_theV[FLAGS] = (uint)m_theOutputMode; + + /* Generate output */ + Compress(); + } + + /** + * IncrementBlockCount. + */ + private void IncrementBlockCount() + { + m_theCounter++; + m_theCurrBytes = 0; + } + + /** + * ResetBlockCount. + */ + private void ResetBlockCount() + { + m_theCounter = 0; + m_theCurrBytes = 0; + } + + /** + * Set root indication. + */ + private void SetRoot() + { + m_theV[FLAGS] |= ROOT; + m_theOutputMode = (int)m_theV[FLAGS]; + m_theOutputDataLen = (int)m_theV[DATALEN]; + m_theCounter = 0; + m_outputting = true; + m_outputAvailable = -1; + Array.Copy(m_theV, 0, m_theChaining, 0, NUMWORDS); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs.meta new file mode 100644 index 00000000..c153ebf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bee07850754eaa04fa2781d2d26032fc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Blake3Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs new file mode 100644 index 00000000..5f623855 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs @@ -0,0 +1,131 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + ///

+ /// Customizable SHAKE function. + /// + public class CShakeDigest + : ShakeDigest + { + private static readonly byte[] padding = new byte[100]; + + private static byte[] EncodeString(byte[] str) + { + if (Arrays.IsNullOrEmpty(str)) + { + return XofUtilities.LeftEncode(0L); + } + + return Arrays.Concatenate(XofUtilities.LeftEncode(str.Length * 8L), str); + } + + private readonly byte[] diff; + + /// + /// Base constructor + /// + /// bit length of the underlying SHAKE function, 128 or 256. + /// the function name string, note this is reserved for use by NIST. Avoid using it if not required. + /// the customization string - available for local use. + public CShakeDigest(int bitLength, byte[] N, byte[] S) + : base(bitLength) + { + if ((N == null || N.Length == 0) && (S == null || S.Length == 0)) + { + diff = null; + } + else + { + diff = Arrays.ConcatenateAll(XofUtilities.LeftEncode(rate / 8), EncodeString(N), EncodeString(S)); + DiffPadAndAbsorb(); + } + } + + public CShakeDigest(CShakeDigest source) + : base(source) + { + this.diff = Arrays.Clone(source.diff); + } + + // bytepad in SP 800-185 + private void DiffPadAndAbsorb() + { + int blockSize = rate / 8; + Absorb(diff, 0, diff.Length); + + int delta = diff.Length % blockSize; + + // only add padding if needed + if (delta != 0) + { + int required = blockSize - delta; + + while (required > padding.Length) + { + Absorb(padding, 0, padding.Length); + required -= padding.Length; + } + + Absorb(padding, 0, required); + } + } + + public override string AlgorithmName + { + get { return "CSHAKE" + fixedOutputLength; } + } + + public override int Output(byte[] output, int outOff, int outLen) + { + if (diff == null) + { + return base.Output(output, outOff, outLen); + } + + if (!squeezing) + { + AbsorbBits(0x00, 2); + } + + Squeeze(output, outOff, ((long)outLen) << 3); + + return outLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Output(Span output) + { + if (diff == null) + { + return base.Output(output); + } + + if (!squeezing) + { + AbsorbBits(0x00, 2); + } + + Squeeze(output); + + return output.Length; + } +#endif + + public override void Reset() + { + base.Reset(); + + if (diff != null) + { + DiffPadAndAbsorb(); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs.meta new file mode 100644 index 00000000..76e1f5d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0988d25e484f83e4ab7c804e88f69c76 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/CSHAKEDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs new file mode 100644 index 00000000..0400551b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs @@ -0,0 +1,631 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of Ukrainian DSTU 7564 hash function + */ + public class Dstu7564Digest + : IDigest, IMemoable + { + private const int NB_512 = 8; //Number of 8-byte words in state for <=256-bit hash code. + private const int NB_1024 = 16; //Number of 8-byte words in state for <=512-bit hash code. + + private const int NR_512 = 10; //Number of rounds for 512-bit state. + private const int NR_1024 = 14; //Number of rounds for 1024-bit state. + + private int hashSize; + private int blockSize; + + private int columns; + private int rounds; + + private ulong[] state; + private ulong[] tempState1; + private ulong[] tempState2; + + // TODO Guard against 'inputBlocks' overflow (2^64 blocks) + private ulong inputBlocks; + private int bufOff; + private byte[] buf; + + public Dstu7564Digest(Dstu7564Digest digest) + { + CopyIn(digest); + } + + private void CopyIn(Dstu7564Digest digest) + { + this.hashSize = digest.hashSize; + this.blockSize = digest.blockSize; + + this.rounds = digest.rounds; + if (columns > 0 && columns == digest.columns) + { + Array.Copy(digest.state, 0, state, 0, columns); + Array.Copy(digest.buf, 0, buf, 0, blockSize); + } + else + { + this.columns = digest.columns; + this.state = Arrays.Clone(digest.state); + this.tempState1 = new ulong[columns]; + this.tempState2 = new ulong[columns]; + this.buf = Arrays.Clone(digest.buf); + } + + this.inputBlocks = digest.inputBlocks; + this.bufOff = digest.bufOff; + } + + public Dstu7564Digest(int hashSizeBits) + { + if (hashSizeBits == 256 || hashSizeBits == 384 || hashSizeBits == 512) + { + this.hashSize = hashSizeBits / 8; + } + else + { + throw new ArgumentException("Hash size is not recommended. Use 256/384/512 instead"); + } + + if (hashSizeBits > 256) + { + this.columns = NB_1024; + this.rounds = NR_1024; + } + else + { + this.columns = NB_512; + this.rounds = NR_512; + } + + this.blockSize = columns << 3; + + this.state = new ulong[columns]; + this.state[0] = (ulong)blockSize; + + this.tempState1 = new ulong[columns]; + this.tempState2 = new ulong[columns]; + + this.buf = new byte[blockSize]; + } + + public virtual string AlgorithmName + { + get { return "DSTU7564"; } + } + + public virtual int GetDigestSize() + { + return hashSize; + } + + public virtual int GetByteLength() + { + return blockSize; + } + + public virtual void Update(byte input) + { + buf[bufOff++] = input; + if (bufOff == blockSize) + { + ProcessBlock(buf, 0); + bufOff = 0; + ++inputBlocks; + } + } + + public virtual void BlockUpdate(byte[] input, int inOff, int length) + { + while (bufOff != 0 && length > 0) + { + Update(input[inOff++]); + --length; + } + + while (length >= blockSize) + { + ProcessBlock(input, inOff); + inOff += blockSize; + length -= blockSize; + ++inputBlocks; + } + + while (length > 0) + { + Update(input[inOff++]); + --length; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + while (bufOff != 0 && input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + + while (input.Length >= blockSize) + { + ProcessBlock(input); + input = input[blockSize..]; + ++inputBlocks; + } + + while (input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { + // Apply padding: terminator byte and 96-bit length field + { + int inputBytes = bufOff; + buf[bufOff++] = (byte)0x80; + + int lenPos = blockSize - 12; + if (bufOff > lenPos) + { + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + bufOff = 0; + ProcessBlock(buf, 0); + } + + while (bufOff < lenPos) + { + buf[bufOff++] = 0; + } + + ulong c = ((inputBlocks & 0xFFFFFFFFUL) * (ulong)blockSize + (uint)inputBytes) << 3; + Pack.UInt32_To_LE((uint)c, buf, bufOff); + bufOff += 4; + c >>= 32; + c += ((inputBlocks >> 32) * (ulong)blockSize) << 3; + Pack.UInt64_To_LE(c, buf, bufOff); + //bufOff += 8; + ProcessBlock(buf, 0); + } + + { + Array.Copy(state, 0, tempState1, 0, columns); + + P(tempState1); + + for (int col = 0; col < columns; ++col) + { + state[col] ^= tempState1[col]; + } + } + + int neededColumns = hashSize / 8; + for (int col = columns - neededColumns; col < columns; ++col) + { + Pack.UInt64_To_LE(state[col], output, outOff); + outOff += 8; + } + + Reset(); + + return hashSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + // Apply padding: terminator byte and 96-bit length field + { + int inputBytes = bufOff; + buf[bufOff++] = (byte)0x80; + + int lenPos = blockSize - 12; + if (bufOff > lenPos) + { + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + bufOff = 0; + ProcessBlock(buf, 0); + } + + while (bufOff < lenPos) + { + buf[bufOff++] = 0; + } + + ulong c = ((inputBlocks & 0xFFFFFFFFUL) * (ulong)blockSize + (uint)inputBytes) << 3; + Pack.UInt32_To_LE((uint)c, buf, bufOff); + bufOff += 4; + c >>= 32; + c += ((inputBlocks >> 32) * (ulong)blockSize) << 3; + Pack.UInt64_To_LE(c, buf, bufOff); + //bufOff += 8; + ProcessBlock(buf, 0); + } + + { + Array.Copy(state, 0, tempState1, 0, columns); + + P(tempState1); + + for (int col = 0; col < columns; ++col) + { + state[col] ^= tempState1[col]; + } + } + + int neededColumns = hashSize / 8; + for (int col = columns - neededColumns; col < columns; ++col) + { + Pack.UInt64_To_LE(state[col], output); + output = output[8..]; + } + + Reset(); + + return hashSize; + } +#endif + + public virtual void Reset() + { + Array.Clear(state, 0, state.Length); + state[0] = (ulong)blockSize; + + inputBlocks = 0; + bufOff = 0; + } + + protected virtual void ProcessBlock(byte[] input, int inOff) + { + int pos = inOff; + for (int col = 0; col < columns; ++col) + { + ulong word = Pack.LE_To_UInt64(input, pos); + pos += 8; + + tempState1[col] = state[col] ^ word; + tempState2[col] = word; + } + + P(tempState1); + Q(tempState2); + + for (int col = 0; col < columns; ++col) + { + state[col] ^= tempState1[col] ^ tempState2[col]; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected virtual void ProcessBlock(ReadOnlySpan input) + { + for (int col = 0; col < columns; ++col) + { + ulong word = Pack.LE_To_UInt64(input); + input = input[8..]; + + tempState1[col] = state[col] ^ word; + tempState2[col] = word; + } + + P(tempState1); + Q(tempState2); + + for (int col = 0; col < columns; ++col) + { + state[col] ^= tempState1[col] ^ tempState2[col]; + } + } +#endif + + private void P(ulong[] s) + { + for (int round = 0; round < rounds; ++round) + { + ulong rc = (ulong)round; + + /* AddRoundConstants */ + for (int col = 0; col < columns; ++col) + { + s[col] ^= rc; + rc += 0x10L; + } + + ShiftRows(s); + SubBytes(s); + MixColumns(s); + } + } + + private void Q(ulong[] s) + { + for (int round = 0; round < rounds; ++round) + { + /* AddRoundConstantsQ */ + ulong rc = ((ulong)(((columns - 1) << 4) ^ round) << 56) | 0x00F0F0F0F0F0F0F3UL; + + for (int col = 0; col < columns; ++col) + { + s[col] += rc; + rc -= 0x1000000000000000L; + } + + ShiftRows(s); + SubBytes(s); + MixColumns(s); + } + } + + private static ulong MixColumn(ulong c) + { + //// Calculate column multiplied by powers of 'x' + //ulong x0 = c; + //ulong x1 = ((x0 & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((x0 & 0x8080808080808080UL) >> 7) * 0x1DUL); + //ulong x2 = ((x1 & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((x1 & 0x8080808080808080UL) >> 7) * 0x1DUL); + //ulong x3 = ((x2 & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((x2 & 0x8080808080808080UL) >> 7) * 0x1DUL); + + //// Calculate products with circulant matrix from (0x01, 0x01, 0x05, 0x01, 0x08, 0x06, 0x07, 0x04) + //ulong m0 = x0; + //ulong m1 = x0; + //ulong m2 = x0 ^ x2; + //ulong m3 = x0; + //ulong m4 = x3; + //ulong m5 = x1 ^ x2; + //ulong m6 = x0 ^ x1 ^ x2; + //ulong m7 = x2; + + //// Assemble the rotated products + //return m0 + // ^ Rotate(8, m1) + // ^ Rotate(16, m2) + // ^ Rotate(24, m3) + // ^ Rotate(32, m4) + // ^ Rotate(40, m5) + // ^ Rotate(48, m6) + // ^ Rotate(56, m7); + + // Multiply elements by 'x' + ulong x1 = ((c & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((c & 0x8080808080808080UL) >> 7) * 0x1DUL); + ulong u, v; + + u = Rotate(8, c) ^ c; + u ^= Rotate(16, u); + u ^= Rotate(48, c); + + v = u ^ c ^ x1; + + // Multiply elements by 'x^2' + v = ((v & 0x3F3F3F3F3F3F3F3FUL) << 2) ^ (((v & 0x8080808080808080UL) >> 6) * 0x1DUL) ^ (((v & 0x4040404040404040UL) >> 6) * 0x1DUL); + + return u ^ Rotate(32, v) ^ Rotate(40, x1) ^ Rotate(48, x1); + } + + private void MixColumns(ulong[] s) + { + for (int col = 0; col < columns; ++col) + { + s[col] = MixColumn(s[col]); + } + } + + private static ulong Rotate(int n, ulong x) + { + return (x >> n) | (x << -n); + } + + private void ShiftRows(ulong[] s) + { + switch (columns) + { + case NB_512: + { + ulong c0 = s[0], c1 = s[1], c2 = s[2], c3 = s[3]; + ulong c4 = s[4], c5 = s[5], c6 = s[6], c7 = s[7]; + ulong d; + + d = (c0 ^ c4) & 0xFFFFFFFF00000000UL; c0 ^= d; c4 ^= d; + d = (c1 ^ c5) & 0x00FFFFFFFF000000UL; c1 ^= d; c5 ^= d; + d = (c2 ^ c6) & 0x0000FFFFFFFF0000UL; c2 ^= d; c6 ^= d; + d = (c3 ^ c7) & 0x000000FFFFFFFF00UL; c3 ^= d; c7 ^= d; + + d = (c0 ^ c2) & 0xFFFF0000FFFF0000UL; c0 ^= d; c2 ^= d; + d = (c1 ^ c3) & 0x00FFFF0000FFFF00UL; c1 ^= d; c3 ^= d; + d = (c4 ^ c6) & 0xFFFF0000FFFF0000UL; c4 ^= d; c6 ^= d; + d = (c5 ^ c7) & 0x00FFFF0000FFFF00UL; c5 ^= d; c7 ^= d; + + d = (c0 ^ c1) & 0xFF00FF00FF00FF00UL; c0 ^= d; c1 ^= d; + d = (c2 ^ c3) & 0xFF00FF00FF00FF00UL; c2 ^= d; c3 ^= d; + d = (c4 ^ c5) & 0xFF00FF00FF00FF00UL; c4 ^= d; c5 ^= d; + d = (c6 ^ c7) & 0xFF00FF00FF00FF00UL; c6 ^= d; c7 ^= d; + + s[0] = c0; s[1] = c1; s[2] = c2; s[3] = c3; + s[4] = c4; s[5] = c5; s[6] = c6; s[7] = c7; + break; + } + case NB_1024: + { + ulong c00 = s[0], c01 = s[1], c02 = s[2], c03 = s[3]; + ulong c04 = s[4], c05 = s[5], c06 = s[6], c07 = s[7]; + ulong c08 = s[8], c09 = s[9], c10 = s[10], c11 = s[11]; + ulong c12 = s[12], c13 = s[13], c14 = s[14], c15 = s[15]; + ulong d; + + // NOTE: Row 7 is shifted by 11 + + d = (c00 ^ c08) & 0xFF00000000000000UL; c00 ^= d; c08 ^= d; + d = (c01 ^ c09) & 0xFF00000000000000UL; c01 ^= d; c09 ^= d; + d = (c02 ^ c10) & 0xFFFF000000000000UL; c02 ^= d; c10 ^= d; + d = (c03 ^ c11) & 0xFFFFFF0000000000UL; c03 ^= d; c11 ^= d; + d = (c04 ^ c12) & 0xFFFFFFFF00000000UL; c04 ^= d; c12 ^= d; + d = (c05 ^ c13) & 0x00FFFFFFFF000000UL; c05 ^= d; c13 ^= d; + d = (c06 ^ c14) & 0x00FFFFFFFFFF0000UL; c06 ^= d; c14 ^= d; + d = (c07 ^ c15) & 0x00FFFFFFFFFFFF00UL; c07 ^= d; c15 ^= d; + + d = (c00 ^ c04) & 0x00FFFFFF00000000UL; c00 ^= d; c04 ^= d; + d = (c01 ^ c05) & 0xFFFFFFFFFF000000UL; c01 ^= d; c05 ^= d; + d = (c02 ^ c06) & 0xFF00FFFFFFFF0000UL; c02 ^= d; c06 ^= d; + d = (c03 ^ c07) & 0xFF0000FFFFFFFF00UL; c03 ^= d; c07 ^= d; + d = (c08 ^ c12) & 0x00FFFFFF00000000UL; c08 ^= d; c12 ^= d; + d = (c09 ^ c13) & 0xFFFFFFFFFF000000UL; c09 ^= d; c13 ^= d; + d = (c10 ^ c14) & 0xFF00FFFFFFFF0000UL; c10 ^= d; c14 ^= d; + d = (c11 ^ c15) & 0xFF0000FFFFFFFF00UL; c11 ^= d; c15 ^= d; + + d = (c00 ^ c02) & 0xFFFF0000FFFF0000UL; c00 ^= d; c02 ^= d; + d = (c01 ^ c03) & 0x00FFFF0000FFFF00UL; c01 ^= d; c03 ^= d; + d = (c04 ^ c06) & 0xFFFF0000FFFF0000UL; c04 ^= d; c06 ^= d; + d = (c05 ^ c07) & 0x00FFFF0000FFFF00UL; c05 ^= d; c07 ^= d; + d = (c08 ^ c10) & 0xFFFF0000FFFF0000UL; c08 ^= d; c10 ^= d; + d = (c09 ^ c11) & 0x00FFFF0000FFFF00UL; c09 ^= d; c11 ^= d; + d = (c12 ^ c14) & 0xFFFF0000FFFF0000UL; c12 ^= d; c14 ^= d; + d = (c13 ^ c15) & 0x00FFFF0000FFFF00UL; c13 ^= d; c15 ^= d; + + d = (c00 ^ c01) & 0xFF00FF00FF00FF00UL; c00 ^= d; c01 ^= d; + d = (c02 ^ c03) & 0xFF00FF00FF00FF00UL; c02 ^= d; c03 ^= d; + d = (c04 ^ c05) & 0xFF00FF00FF00FF00UL; c04 ^= d; c05 ^= d; + d = (c06 ^ c07) & 0xFF00FF00FF00FF00UL; c06 ^= d; c07 ^= d; + d = (c08 ^ c09) & 0xFF00FF00FF00FF00UL; c08 ^= d; c09 ^= d; + d = (c10 ^ c11) & 0xFF00FF00FF00FF00UL; c10 ^= d; c11 ^= d; + d = (c12 ^ c13) & 0xFF00FF00FF00FF00UL; c12 ^= d; c13 ^= d; + d = (c14 ^ c15) & 0xFF00FF00FF00FF00UL; c14 ^= d; c15 ^= d; + + s[0] = c00; s[1] = c01; s[2] = c02; s[3] = c03; + s[4] = c04; s[5] = c05; s[6] = c06; s[7] = c07; + s[8] = c08; s[9] = c09; s[10] = c10; s[11] = c11; + s[12] = c12; s[13] = c13; s[14] = c14; s[15] = c15; + break; + } + default: + { + throw new InvalidOperationException("unsupported state size: only 512/1024 are allowed"); + } + } + } + + private void SubBytes(ulong[] s) + { + for (int i = 0; i < columns; ++i) + { + ulong u = s[i]; + uint lo = (uint)u, hi = (uint)(u >> 32); + byte t0 = S0[lo & 0xFF]; + byte t1 = S1[(lo >> 8) & 0xFF]; + byte t2 = S2[(lo >> 16) & 0xFF]; + byte t3 = S3[lo >> 24]; + lo = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi & 0xFF]; + byte t5 = S1[(hi >> 8) & 0xFF]; + byte t6 = S2[(hi >> 16) & 0xFF]; + byte t7 = S3[hi >> 24]; + hi = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + s[i] = (ulong)lo | ((ulong)hi << 32); + } + } + + private static readonly byte[] S0 = new byte[] { + 0xa8, 0x43, 0x5f, 0x06, 0x6b, 0x75, 0x6c, 0x59, 0x71, 0xdf, 0x87, 0x95, 0x17, 0xf0, 0xd8, 0x09, + 0x6d, 0xf3, 0x1d, 0xcb, 0xc9, 0x4d, 0x2c, 0xaf, 0x79, 0xe0, 0x97, 0xfd, 0x6f, 0x4b, 0x45, 0x39, + 0x3e, 0xdd, 0xa3, 0x4f, 0xb4, 0xb6, 0x9a, 0x0e, 0x1f, 0xbf, 0x15, 0xe1, 0x49, 0xd2, 0x93, 0xc6, + 0x92, 0x72, 0x9e, 0x61, 0xd1, 0x63, 0xfa, 0xee, 0xf4, 0x19, 0xd5, 0xad, 0x58, 0xa4, 0xbb, 0xa1, + 0xdc, 0xf2, 0x83, 0x37, 0x42, 0xe4, 0x7a, 0x32, 0x9c, 0xcc, 0xab, 0x4a, 0x8f, 0x6e, 0x04, 0x27, + 0x2e, 0xe7, 0xe2, 0x5a, 0x96, 0x16, 0x23, 0x2b, 0xc2, 0x65, 0x66, 0x0f, 0xbc, 0xa9, 0x47, 0x41, + 0x34, 0x48, 0xfc, 0xb7, 0x6a, 0x88, 0xa5, 0x53, 0x86, 0xf9, 0x5b, 0xdb, 0x38, 0x7b, 0xc3, 0x1e, + 0x22, 0x33, 0x24, 0x28, 0x36, 0xc7, 0xb2, 0x3b, 0x8e, 0x77, 0xba, 0xf5, 0x14, 0x9f, 0x08, 0x55, + 0x9b, 0x4c, 0xfe, 0x60, 0x5c, 0xda, 0x18, 0x46, 0xcd, 0x7d, 0x21, 0xb0, 0x3f, 0x1b, 0x89, 0xff, + 0xeb, 0x84, 0x69, 0x3a, 0x9d, 0xd7, 0xd3, 0x70, 0x67, 0x40, 0xb5, 0xde, 0x5d, 0x30, 0x91, 0xb1, + 0x78, 0x11, 0x01, 0xe5, 0x00, 0x68, 0x98, 0xa0, 0xc5, 0x02, 0xa6, 0x74, 0x2d, 0x0b, 0xa2, 0x76, + 0xb3, 0xbe, 0xce, 0xbd, 0xae, 0xe9, 0x8a, 0x31, 0x1c, 0xec, 0xf1, 0x99, 0x94, 0xaa, 0xf6, 0x26, + 0x2f, 0xef, 0xe8, 0x8c, 0x35, 0x03, 0xd4, 0x7f, 0xfb, 0x05, 0xc1, 0x5e, 0x90, 0x20, 0x3d, 0x82, + 0xf7, 0xea, 0x0a, 0x0d, 0x7e, 0xf8, 0x50, 0x1a, 0xc4, 0x07, 0x57, 0xb8, 0x3c, 0x62, 0xe3, 0xc8, + 0xac, 0x52, 0x64, 0x10, 0xd0, 0xd9, 0x13, 0x0c, 0x12, 0x29, 0x51, 0xb9, 0xcf, 0xd6, 0x73, 0x8d, + 0x81, 0x54, 0xc0, 0xed, 0x4e, 0x44, 0xa7, 0x2a, 0x85, 0x25, 0xe6, 0xca, 0x7c, 0x8b, 0x56, 0x80 + }; + + private static readonly byte[] S1 = new byte[] { + 0xce, 0xbb, 0xeb, 0x92, 0xea, 0xcb, 0x13, 0xc1, 0xe9, 0x3a, 0xd6, 0xb2, 0xd2, 0x90, 0x17, 0xf8, + 0x42, 0x15, 0x56, 0xb4, 0x65, 0x1c, 0x88, 0x43, 0xc5, 0x5c, 0x36, 0xba, 0xf5, 0x57, 0x67, 0x8d, + 0x31, 0xf6, 0x64, 0x58, 0x9e, 0xf4, 0x22, 0xaa, 0x75, 0x0f, 0x02, 0xb1, 0xdf, 0x6d, 0x73, 0x4d, + 0x7c, 0x26, 0x2e, 0xf7, 0x08, 0x5d, 0x44, 0x3e, 0x9f, 0x14, 0xc8, 0xae, 0x54, 0x10, 0xd8, 0xbc, + 0x1a, 0x6b, 0x69, 0xf3, 0xbd, 0x33, 0xab, 0xfa, 0xd1, 0x9b, 0x68, 0x4e, 0x16, 0x95, 0x91, 0xee, + 0x4c, 0x63, 0x8e, 0x5b, 0xcc, 0x3c, 0x19, 0xa1, 0x81, 0x49, 0x7b, 0xd9, 0x6f, 0x37, 0x60, 0xca, + 0xe7, 0x2b, 0x48, 0xfd, 0x96, 0x45, 0xfc, 0x41, 0x12, 0x0d, 0x79, 0xe5, 0x89, 0x8c, 0xe3, 0x20, + 0x30, 0xdc, 0xb7, 0x6c, 0x4a, 0xb5, 0x3f, 0x97, 0xd4, 0x62, 0x2d, 0x06, 0xa4, 0xa5, 0x83, 0x5f, + 0x2a, 0xda, 0xc9, 0x00, 0x7e, 0xa2, 0x55, 0xbf, 0x11, 0xd5, 0x9c, 0xcf, 0x0e, 0x0a, 0x3d, 0x51, + 0x7d, 0x93, 0x1b, 0xfe, 0xc4, 0x47, 0x09, 0x86, 0x0b, 0x8f, 0x9d, 0x6a, 0x07, 0xb9, 0xb0, 0x98, + 0x18, 0x32, 0x71, 0x4b, 0xef, 0x3b, 0x70, 0xa0, 0xe4, 0x40, 0xff, 0xc3, 0xa9, 0xe6, 0x78, 0xf9, + 0x8b, 0x46, 0x80, 0x1e, 0x38, 0xe1, 0xb8, 0xa8, 0xe0, 0x0c, 0x23, 0x76, 0x1d, 0x25, 0x24, 0x05, + 0xf1, 0x6e, 0x94, 0x28, 0x9a, 0x84, 0xe8, 0xa3, 0x4f, 0x77, 0xd3, 0x85, 0xe2, 0x52, 0xf2, 0x82, + 0x50, 0x7a, 0x2f, 0x74, 0x53, 0xb3, 0x61, 0xaf, 0x39, 0x35, 0xde, 0xcd, 0x1f, 0x99, 0xac, 0xad, + 0x72, 0x2c, 0xdd, 0xd0, 0x87, 0xbe, 0x5e, 0xa6, 0xec, 0x04, 0xc6, 0x03, 0x34, 0xfb, 0xdb, 0x59, + 0xb6, 0xc2, 0x01, 0xf0, 0x5a, 0xed, 0xa7, 0x66, 0x21, 0x7f, 0x8a, 0x27, 0xc7, 0xc0, 0x29, 0xd7 + }; + + private static readonly byte[] S2 = new byte[] { + 0x93, 0xd9, 0x9a, 0xb5, 0x98, 0x22, 0x45, 0xfc, 0xba, 0x6a, 0xdf, 0x02, 0x9f, 0xdc, 0x51, 0x59, + 0x4a, 0x17, 0x2b, 0xc2, 0x94, 0xf4, 0xbb, 0xa3, 0x62, 0xe4, 0x71, 0xd4, 0xcd, 0x70, 0x16, 0xe1, + 0x49, 0x3c, 0xc0, 0xd8, 0x5c, 0x9b, 0xad, 0x85, 0x53, 0xa1, 0x7a, 0xc8, 0x2d, 0xe0, 0xd1, 0x72, + 0xa6, 0x2c, 0xc4, 0xe3, 0x76, 0x78, 0xb7, 0xb4, 0x09, 0x3b, 0x0e, 0x41, 0x4c, 0xde, 0xb2, 0x90, + 0x25, 0xa5, 0xd7, 0x03, 0x11, 0x00, 0xc3, 0x2e, 0x92, 0xef, 0x4e, 0x12, 0x9d, 0x7d, 0xcb, 0x35, + 0x10, 0xd5, 0x4f, 0x9e, 0x4d, 0xa9, 0x55, 0xc6, 0xd0, 0x7b, 0x18, 0x97, 0xd3, 0x36, 0xe6, 0x48, + 0x56, 0x81, 0x8f, 0x77, 0xcc, 0x9c, 0xb9, 0xe2, 0xac, 0xb8, 0x2f, 0x15, 0xa4, 0x7c, 0xda, 0x38, + 0x1e, 0x0b, 0x05, 0xd6, 0x14, 0x6e, 0x6c, 0x7e, 0x66, 0xfd, 0xb1, 0xe5, 0x60, 0xaf, 0x5e, 0x33, + 0x87, 0xc9, 0xf0, 0x5d, 0x6d, 0x3f, 0x88, 0x8d, 0xc7, 0xf7, 0x1d, 0xe9, 0xec, 0xed, 0x80, 0x29, + 0x27, 0xcf, 0x99, 0xa8, 0x50, 0x0f, 0x37, 0x24, 0x28, 0x30, 0x95, 0xd2, 0x3e, 0x5b, 0x40, 0x83, + 0xb3, 0x69, 0x57, 0x1f, 0x07, 0x1c, 0x8a, 0xbc, 0x20, 0xeb, 0xce, 0x8e, 0xab, 0xee, 0x31, 0xa2, + 0x73, 0xf9, 0xca, 0x3a, 0x1a, 0xfb, 0x0d, 0xc1, 0xfe, 0xfa, 0xf2, 0x6f, 0xbd, 0x96, 0xdd, 0x43, + 0x52, 0xb6, 0x08, 0xf3, 0xae, 0xbe, 0x19, 0x89, 0x32, 0x26, 0xb0, 0xea, 0x4b, 0x64, 0x84, 0x82, + 0x6b, 0xf5, 0x79, 0xbf, 0x01, 0x5f, 0x75, 0x63, 0x1b, 0x23, 0x3d, 0x68, 0x2a, 0x65, 0xe8, 0x91, + 0xf6, 0xff, 0x13, 0x58, 0xf1, 0x47, 0x0a, 0x7f, 0xc5, 0xa7, 0xe7, 0x61, 0x5a, 0x06, 0x46, 0x44, + 0x42, 0x04, 0xa0, 0xdb, 0x39, 0x86, 0x54, 0xaa, 0x8c, 0x34, 0x21, 0x8b, 0xf8, 0x0c, 0x74, 0x67 + }; + + private static readonly byte[] S3 = new byte[] { + 0x68, 0x8d, 0xca, 0x4d, 0x73, 0x4b, 0x4e, 0x2a, 0xd4, 0x52, 0x26, 0xb3, 0x54, 0x1e, 0x19, 0x1f, + 0x22, 0x03, 0x46, 0x3d, 0x2d, 0x4a, 0x53, 0x83, 0x13, 0x8a, 0xb7, 0xd5, 0x25, 0x79, 0xf5, 0xbd, + 0x58, 0x2f, 0x0d, 0x02, 0xed, 0x51, 0x9e, 0x11, 0xf2, 0x3e, 0x55, 0x5e, 0xd1, 0x16, 0x3c, 0x66, + 0x70, 0x5d, 0xf3, 0x45, 0x40, 0xcc, 0xe8, 0x94, 0x56, 0x08, 0xce, 0x1a, 0x3a, 0xd2, 0xe1, 0xdf, + 0xb5, 0x38, 0x6e, 0x0e, 0xe5, 0xf4, 0xf9, 0x86, 0xe9, 0x4f, 0xd6, 0x85, 0x23, 0xcf, 0x32, 0x99, + 0x31, 0x14, 0xae, 0xee, 0xc8, 0x48, 0xd3, 0x30, 0xa1, 0x92, 0x41, 0xb1, 0x18, 0xc4, 0x2c, 0x71, + 0x72, 0x44, 0x15, 0xfd, 0x37, 0xbe, 0x5f, 0xaa, 0x9b, 0x88, 0xd8, 0xab, 0x89, 0x9c, 0xfa, 0x60, + 0xea, 0xbc, 0x62, 0x0c, 0x24, 0xa6, 0xa8, 0xec, 0x67, 0x20, 0xdb, 0x7c, 0x28, 0xdd, 0xac, 0x5b, + 0x34, 0x7e, 0x10, 0xf1, 0x7b, 0x8f, 0x63, 0xa0, 0x05, 0x9a, 0x43, 0x77, 0x21, 0xbf, 0x27, 0x09, + 0xc3, 0x9f, 0xb6, 0xd7, 0x29, 0xc2, 0xeb, 0xc0, 0xa4, 0x8b, 0x8c, 0x1d, 0xfb, 0xff, 0xc1, 0xb2, + 0x97, 0x2e, 0xf8, 0x65, 0xf6, 0x75, 0x07, 0x04, 0x49, 0x33, 0xe4, 0xd9, 0xb9, 0xd0, 0x42, 0xc7, + 0x6c, 0x90, 0x00, 0x8e, 0x6f, 0x50, 0x01, 0xc5, 0xda, 0x47, 0x3f, 0xcd, 0x69, 0xa2, 0xe2, 0x7a, + 0xa7, 0xc6, 0x93, 0x0f, 0x0a, 0x06, 0xe6, 0x2b, 0x96, 0xa3, 0x1c, 0xaf, 0x6a, 0x12, 0x84, 0x39, + 0xe7, 0xb0, 0x82, 0xf7, 0xfe, 0x9d, 0x87, 0x5c, 0x81, 0x35, 0xde, 0xb4, 0xa5, 0xfc, 0x80, 0xef, + 0xcb, 0xbb, 0x6b, 0x76, 0xba, 0x5a, 0x7d, 0x78, 0x0b, 0x95, 0xe3, 0xad, 0x74, 0x98, 0x3b, 0x36, + 0x64, 0x6d, 0xdc, 0xf0, 0x59, 0xa9, 0x4c, 0x17, 0x7f, 0x91, 0xb8, 0xc9, 0x57, 0x1b, 0xe0, 0x61 + }; + + public virtual IMemoable Copy() + { + return new Dstu7564Digest(this); + } + + public virtual void Reset(IMemoable other) + { + Dstu7564Digest d = (Dstu7564Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs.meta new file mode 100644 index 00000000..23b5a616 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a03b01a2336c00343a34238ac76aff2c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/DSTU7564Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs new file mode 100644 index 00000000..6dba20a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs @@ -0,0 +1,396 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of GOST R 34.11-94 + */ + public class Gost3411Digest + : IDigest, IMemoable + { + private const int DIGEST_LENGTH = 32; + + private byte[] H = new byte[32], L = new byte[32], + M = new byte[32], Sum = new byte[32]; + private byte[][] C = MakeC(); + + private byte[] xBuf = new byte[32]; + private int xBufOff; + private ulong byteCount; + + private readonly IBlockCipher cipher = new Gost28147Engine(); + private byte[] sBox; + + private static byte[][] MakeC() + { + byte[][] c = new byte[4][]; + for (int i = 0; i < 4; ++i) + { + c[i] = new byte[32]; + } + return c; + } + + /** + * Standard constructor + */ + public Gost3411Digest() + { + sBox = Gost28147Engine.GetSBox("D-A"); + cipher.Init(true, new ParametersWithSBox(null, sBox)); + + Reset(); + } + + /** + * Constructor to allow use of a particular sbox with GOST28147 + * @see GOST28147Engine#getSBox(String) + */ + public Gost3411Digest(byte[] sBoxParam) + { + sBox = Arrays.Clone(sBoxParam); + cipher.Init(true, new ParametersWithSBox(null, sBox)); + + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Gost3411Digest(Gost3411Digest t) + { + Reset(t); + } + + public string AlgorithmName + { + get { return "Gost3411"; } + } + + public int GetDigestSize() + { + return DIGEST_LENGTH; + } + + public void Update( + byte input) + { + xBuf[xBufOff++] = input; + if (xBufOff == xBuf.Length) + { + sumByteArray(xBuf); // calc sum M + processBlock(xBuf, 0); + xBufOff = 0; + } + byteCount++; + } + + public void BlockUpdate(byte[] input, int inOff, int length) + { + while ((xBufOff != 0) && (length > 0)) + { + Update(input[inOff]); + inOff++; + length--; + } + + while (length >= xBuf.Length) + { + Array.Copy(input, inOff, xBuf, 0, xBuf.Length); + + sumByteArray(xBuf); // calc sum M + processBlock(xBuf, 0); + inOff += xBuf.Length; + length -= xBuf.Length; + byteCount += (uint)xBuf.Length; + } + + // load in the remainder. + while (length > 0) + { + Update(input[inOff]); + inOff++; + length--; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + while ((xBufOff != 0) && (input.Length > 0)) + { + Update(input[0]); + input = input[1..]; + } + + while (input.Length >= xBuf.Length) + { + input[..xBuf.Length].CopyTo(xBuf.AsSpan()); + + sumByteArray(xBuf); // calc sum M + processBlock(xBuf, 0); + input = input[xBuf.Length..]; + byteCount += (uint)xBuf.Length; + } + + // load in the remainder. + while (input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + } +#endif + + // (i + 1 + 4(k - 1)) = 8i + k i = 0-3, k = 1-8 + private byte[] K = new byte[32]; + + private byte[] P(byte[] input) + { + int fourK = 0; + for(int k = 0; k < 8; k++) + { + K[fourK++] = input[k]; + K[fourK++] = input[8 + k]; + K[fourK++] = input[16 + k]; + K[fourK++] = input[24 + k]; + } + + return K; + } + + //A (x) = (x0 ^ x1) || x3 || x2 || x1 + byte[] a = new byte[8]; + private byte[] A(byte[] input) + { + for(int j=0; j<8; j++) + { + a[j]=(byte)(input[j] ^ input[j+8]); + } + + Array.Copy(input, 8, input, 0, 24); + Array.Copy(a, 0, input, 24, 8); + + return input; + } + + //Encrypt function, ECB mode + private void E(byte[] key, byte[] s, int sOff, byte[] input, int inOff) + { + cipher.Init(true, new KeyParameter(key)); + + cipher.ProcessBlock(input, inOff, s, sOff); + } + + // (in:) n16||..||n1 ==> (out:) n1^n2^n3^n4^n13^n16||n16||..||n2 + internal short[] wS = new short[16], w_S = new short[16]; + + private void fw(byte[] input) + { + cpyBytesToShort(input, wS); + w_S[15] = (short)(wS[0] ^ wS[1] ^ wS[2] ^ wS[3] ^ wS[12] ^ wS[15]); + Array.Copy(wS, 1, w_S, 0, 15); + cpyShortToBytes(w_S, input); + } + + // block processing + internal byte[] S = new byte[32], U = new byte[32], V = new byte[32], W = new byte[32]; + + private void processBlock(byte[] input, int inOff) + { + Array.Copy(input, inOff, M, 0, 32); + + //key step 1 + + // H = h3 || h2 || h1 || h0 + // S = s3 || s2 || s1 || s0 + H.CopyTo(U, 0); + M.CopyTo(V, 0); + for (int j=0; j<32; j++) + { + W[j] = (byte)(U[j]^V[j]); + } + // Encrypt gost28147-ECB + E(P(W), S, 0, H, 0); // s0 = EK0 [h0] + + //keys step 2,3,4 + for (int i=1; i<4; i++) + { + byte[] tmpA = A(U); + for (int j=0; j<32; j++) + { + U[j] = (byte)(tmpA[j] ^ C[i][j]); + } + V = A(A(V)); + for (int j=0; j<32; j++) + { + W[j] = (byte)(U[j]^V[j]); + } + // Encrypt gost28147-ECB + E(P(W), S, i * 8, H, i * 8); // si = EKi [hi] + } + + // x(M, H) = y61(H^y(M^y12(S))) + for(int n = 0; n < 12; n++) + { + fw(S); + } + for(int n = 0; n < 32; n++) + { + S[n] = (byte)(S[n] ^ M[n]); + } + + fw(S); + + for(int n = 0; n < 32; n++) + { + S[n] = (byte)(H[n] ^ S[n]); + } + for(int n = 0; n < 61; n++) + { + fw(S); + } + Array.Copy(S, 0, H, 0, H.Length); + } + + private void Finish() + { + ulong bitCount = byteCount * 8; + Pack.UInt64_To_LE(bitCount, L); + + while (xBufOff != 0) + { + Update((byte)0); + } + + processBlock(L, 0); + processBlock(Sum, 0); + } + + public int DoFinal(byte[] output, int outOff) + { + Finish(); + + H.CopyTo(output, outOff); + + Reset(); + + return DIGEST_LENGTH; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + Finish(); + + H.CopyTo(output); + + Reset(); + + return DIGEST_LENGTH; + } +#endif + + /** + * reset the chaining variables to the IV values. + */ + private static readonly byte[] C2 = { + 0x00,(byte)0xFF,0x00,(byte)0xFF,0x00,(byte)0xFF,0x00,(byte)0xFF, + (byte)0xFF,0x00,(byte)0xFF,0x00,(byte)0xFF,0x00,(byte)0xFF,0x00, + 0x00,(byte)0xFF,(byte)0xFF,0x00,(byte)0xFF,0x00,0x00,(byte)0xFF, + (byte)0xFF,0x00,0x00,0x00,(byte)0xFF,(byte)0xFF,0x00,(byte)0xFF + }; + + public void Reset() + { + byteCount = 0; + xBufOff = 0; + + Array.Clear(H, 0, H.Length); + Array.Clear(L, 0, L.Length); + Array.Clear(M, 0, M.Length); + Array.Clear(C[1], 0, C[1].Length); // real index C = +1 because index array with 0. + Array.Clear(C[3], 0, C[3].Length); + Array.Clear(Sum, 0, Sum.Length); + Array.Clear(xBuf, 0, xBuf.Length); + + C2.CopyTo(C[2], 0); + } + + // 256 bitsblock modul -> (Sum + a mod (2^256)) + private void sumByteArray( + byte[] input) + { + int carry = 0; + + for (int i = 0; i != Sum.Length; i++) + { + int sum = (Sum[i] & 0xff) + (input[i] & 0xff) + carry; + + Sum[i] = (byte)sum; + + carry = sum >> 8; + } + } + + private static void cpyBytesToShort(byte[] S, short[] wS) + { + for(int i = 0; i < S.Length / 2; i++) + { + wS[i] = (short)(((S[i*2+1]<<8)&0xFF00)|(S[i*2]&0xFF)); + } + } + + private static void cpyShortToBytes(short[] wS, byte[] S) + { + for(int i=0; i> 8); + S[i*2] = (byte)wS[i]; + } + } + + public int GetByteLength() + { + return 32; + } + + public IMemoable Copy() + { + return new Gost3411Digest(this); + } + + public void Reset(IMemoable other) + { + Gost3411Digest t = (Gost3411Digest)other; + + this.sBox = t.sBox; + cipher.Init(true, new ParametersWithSBox(null, sBox)); + + Reset(); + + Array.Copy(t.H, 0, this.H, 0, t.H.Length); + Array.Copy(t.L, 0, this.L, 0, t.L.Length); + Array.Copy(t.M, 0, this.M, 0, t.M.Length); + Array.Copy(t.Sum, 0, this.Sum, 0, t.Sum.Length); + Array.Copy(t.C[1], 0, this.C[1], 0, t.C[1].Length); + Array.Copy(t.C[2], 0, this.C[2], 0, t.C[2].Length); + Array.Copy(t.C[3], 0, this.C[3], 0, t.C[3].Length); + Array.Copy(t.xBuf, 0, this.xBuf, 0, t.xBuf.Length); + + this.xBufOff = t.xBufOff; + this.byteCount = t.byteCount; + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs.meta new file mode 100644 index 00000000..ec55a9e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e5311e8ec7da50a49869272448d25a55 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs new file mode 100644 index 00000000..897e5981 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs @@ -0,0 +1,1096 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public abstract class Gost3411_2012Digest + : IDigest, IMemoable + { + private readonly byte[] IV = new byte[64]; + private readonly byte[] N = new byte[64]; + private readonly byte[] Sigma = new byte[64]; + private readonly byte[] Ki = new byte[64]; + private readonly byte[] m = new byte[64]; + private readonly byte[] h = new byte[64]; + + // Temporary buffers + private readonly byte[] tmp = new byte[64]; + private readonly byte[] block = new byte[64]; + + private int bOff = 64; + + protected Gost3411_2012Digest(byte[] IV) + { + Array.Copy(IV,this.IV,64); + Array.Copy(IV, h, 64); + } + + public abstract string AlgorithmName { get; } + + public abstract IMemoable Copy(); + + public virtual int DoFinal(byte[] output, int outOff) + { + int lenM = 64 - bOff; + + // At this point it is certain that lenM is smaller than 64 + for (int i = 0; i != 64 - lenM; i++) + { + m[i] = 0; + } + + m[63 - lenM] = 1; + + if (bOff != 64) + { + Array.Copy(block, bOff, m, 64 - lenM, lenM); + } + + g_N(h, N, m); + addMod512(N, lenM * 8); + addMod512(Sigma, m); + g_N(h, Zero, N); + g_N(h, Zero, Sigma); + + reverse(h, tmp); + + Array.Copy(tmp, 0, output, outOff, 64); + + Reset(); + return 64; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + int lenM = 64 - bOff; + + // At this point it is certain that lenM is smaller than 64 + for (int i = 0; i != 64 - lenM; i++) + { + m[i] = 0; + } + + m[63 - lenM] = 1; + + if (bOff != 64) + { + Array.Copy(block, bOff, m, 64 - lenM, lenM); + } + + g_N(h, N, m); + addMod512(N, lenM * 8); + addMod512(Sigma, m); + g_N(h, Zero, N); + g_N(h, Zero, Sigma); + + reverse(h, tmp); + + tmp.CopyTo(output); + + Reset(); + return 64; + } +#endif + + public int GetByteLength() + { + return 64; + } + + public abstract int GetDigestSize(); + + + public void Reset() + { + bOff = 64; + Arrays.Fill(N, (byte)0); + Arrays.Fill(Sigma, (byte)0); + Array.Copy(IV, 0, h, 0, 64); + Arrays.Fill(block, (byte)0); + } + + public void Reset(IMemoable other) + { + Gost3411_2012Digest o = (Gost3411_2012Digest)other; + + Array.Copy(o.IV, 0, this.IV, 0, 64); + Array.Copy(o.N, 0, this.N, 0, 64); + Array.Copy(o.Sigma, 0, this.Sigma, 0, 64); + Array.Copy(o.Ki, 0, this.Ki, 0, 64); + Array.Copy(o.m, 0, this.m, 0, 64); + Array.Copy(o.h, 0, this.h, 0, 64); + + Array.Copy(o.block, 0, this.block, 0, 64); + this.bOff = o.bOff; + } + + public void Update(byte input) + { + block[--bOff] = input; + if (bOff == 0) + { + g_N(h, N, block); + addMod512(N, 512); + addMod512(Sigma, block); + bOff = 64; + } + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + while (bOff != 64 && len > 0) + { + Update(input[inOff++]); + len--; + } + while (len >= 64) + { + Array.Copy(input, inOff, tmp, 0, 64); + reverse(tmp, block); + g_N(h, N, block); + addMod512(N, 512); + addMod512(Sigma, block); + + len -= 64; + inOff += 64; + } + while (len > 0) + { + Update(input[inOff++]); + len--; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + while (bOff != 64 && input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + while (input.Length >= 64) + { + input[..64].CopyTo(tmp.AsSpan()); + reverse(tmp, block); + g_N(h, N, block); + addMod512(N, 512); + addMod512(Sigma, block); + + input = input[64..]; + } + while (input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + } +#endif + + private void F(byte[] V) + { + ulong[] res = new ulong[8]; + ulong r; + + r = 0; + r ^= T[0][(V[56] & 0xFF)]; + r ^= T[1][(V[48] & 0xFF)]; + r ^= T[2][(V[40] & 0xFF)]; + r ^= T[3][(V[32] & 0xFF)]; + r ^= T[4][(V[24] & 0xFF)]; + r ^= T[5][(V[16] & 0xFF)]; + r ^= T[6][(V[8] & 0xFF)]; + r ^= T[7][(V[0] & 0xFF)]; + res[0] = r; + + r = 0; + r ^= T[0][(V[57] & 0xFF)]; + r ^= T[1][(V[49] & 0xFF)]; + r ^= T[2][(V[41] & 0xFF)]; + r ^= T[3][(V[33] & 0xFF)]; + r ^= T[4][(V[25] & 0xFF)]; + r ^= T[5][(V[17] & 0xFF)]; + r ^= T[6][(V[9] & 0xFF)]; + r ^= T[7][(V[1] & 0xFF)]; + res[1] = r; + + r = 0; + r ^= T[0][(V[58] & 0xFF)]; + r ^= T[1][(V[50] & 0xFF)]; + r ^= T[2][(V[42] & 0xFF)]; + r ^= T[3][(V[34] & 0xFF)]; + r ^= T[4][(V[26] & 0xFF)]; + r ^= T[5][(V[18] & 0xFF)]; + r ^= T[6][(V[10] & 0xFF)]; + r ^= T[7][(V[2] & 0xFF)]; + res[2] = r; + + r = 0; + r ^= T[0][(V[59] & 0xFF)]; + r ^= T[1][(V[51] & 0xFF)]; + r ^= T[2][(V[43] & 0xFF)]; + r ^= T[3][(V[35] & 0xFF)]; + r ^= T[4][(V[27] & 0xFF)]; + r ^= T[5][(V[19] & 0xFF)]; + r ^= T[6][(V[11] & 0xFF)]; + r ^= T[7][(V[3] & 0xFF)]; + res[3] = r; + + r = 0; + r ^= T[0][(V[60] & 0xFF)]; + r ^= T[1][(V[52] & 0xFF)]; + r ^= T[2][(V[44] & 0xFF)]; + r ^= T[3][(V[36] & 0xFF)]; + r ^= T[4][(V[28] & 0xFF)]; + r ^= T[5][(V[20] & 0xFF)]; + r ^= T[6][(V[12] & 0xFF)]; + r ^= T[7][(V[4] & 0xFF)]; + res[4] = r; + + r = 0; + r ^= T[0][(V[61] & 0xFF)]; + r ^= T[1][(V[53] & 0xFF)]; + r ^= T[2][(V[45] & 0xFF)]; + r ^= T[3][(V[37] & 0xFF)]; + r ^= T[4][(V[29] & 0xFF)]; + r ^= T[5][(V[21] & 0xFF)]; + r ^= T[6][(V[13] & 0xFF)]; + r ^= T[7][(V[5] & 0xFF)]; + res[5] = r; + + r = 0; + r ^= T[0][(V[62] & 0xFF)]; + r ^= T[1][(V[54] & 0xFF)]; + r ^= T[2][(V[46] & 0xFF)]; + r ^= T[3][(V[38] & 0xFF)]; + r ^= T[4][(V[30] & 0xFF)]; + r ^= T[5][(V[22] & 0xFF)]; + r ^= T[6][(V[14] & 0xFF)]; + r ^= T[7][(V[6] & 0xFF)]; + res[6] = r; + + r = 0; + r ^= T[0][(V[63] & 0xFF)]; + r ^= T[1][(V[55] & 0xFF)]; + r ^= T[2][(V[47] & 0xFF)]; + r ^= T[3][(V[39] & 0xFF)]; + r ^= T[4][(V[31] & 0xFF)]; + r ^= T[5][(V[23] & 0xFF)]; + r ^= T[6][(V[15] & 0xFF)]; + r ^= T[7][(V[7] & 0xFF)]; + res[7] = r; + + r = res[0]; + V[7] = (byte)(r >> 56); + V[6] = (byte)(r >> 48); + V[5] = (byte)(r >> 40); + V[4] = (byte)(r >> 32); + V[3] = (byte)(r >> 24); + V[2] = (byte)(r >> 16); + V[1] = (byte)(r >> 8); + V[0] = (byte)(r); + + r = res[1]; + V[15] = (byte)(r >> 56); + V[14] = (byte)(r >> 48); + V[13] = (byte)(r >> 40); + V[12] = (byte)(r >> 32); + V[11] = (byte)(r >> 24); + V[10] = (byte)(r >> 16); + V[9] = (byte)(r >> 8); + V[8] = (byte)(r); + + r = res[2]; + V[23] = (byte)(r >> 56); + V[22] = (byte)(r >> 48); + V[21] = (byte)(r >> 40); + V[20] = (byte)(r >> 32); + V[19] = (byte)(r >> 24); + V[18] = (byte)(r >> 16); + V[17] = (byte)(r >> 8); + V[16] = (byte)(r); + + r = res[3]; + V[31] = (byte)(r >> 56); + V[30] = (byte)(r >> 48); + V[29] = (byte)(r >> 40); + V[28] = (byte)(r >> 32); + V[27] = (byte)(r >> 24); + V[26] = (byte)(r >> 16); + V[25] = (byte)(r >> 8); + V[24] = (byte)(r); + + r = res[4]; + V[39] = (byte)(r >> 56); + V[38] = (byte)(r >> 48); + V[37] = (byte)(r >> 40); + V[36] = (byte)(r >> 32); + V[35] = (byte)(r >> 24); + V[34] = (byte)(r >> 16); + V[33] = (byte)(r >> 8); + V[32] = (byte)(r); + + r = res[5]; + V[47] = (byte)(r >> 56); + V[46] = (byte)(r >> 48); + V[45] = (byte)(r >> 40); + V[44] = (byte)(r >> 32); + V[43] = (byte)(r >> 24); + V[42] = (byte)(r >> 16); + V[41] = (byte)(r >> 8); + V[40] = (byte)(r); + + r = res[6]; + V[55] = (byte)(r >> 56); + V[54] = (byte)(r >> 48); + V[53] = (byte)(r >> 40); + V[52] = (byte)(r >> 32); + V[51] = (byte)(r >> 24); + V[50] = (byte)(r >> 16); + V[49] = (byte)(r >> 8); + V[48] = (byte)(r); + + r = res[7]; + V[63] = (byte)(r >> 56); + V[62] = (byte)(r >> 48); + V[61] = (byte)(r >> 40); + V[60] = (byte)(r >> 32); + V[59] = (byte)(r >> 24); + V[58] = (byte)(r >> 16); + V[57] = (byte)(r >> 8); + V[56] = (byte)(r); + } + + private void xor512(byte[] A, byte[] B) + { + for (int i = 0; i < 64; ++i) + { + A[i] ^= B[i]; + } + } + + private void E(byte[] K, byte[] m) + { + Array.Copy(K, 0, Ki, 0, 64); + xor512(K, m); + F(K); + for (int i = 0; i < 11; ++i) + { + xor512(Ki, C[i]); + F(Ki); + xor512(K, Ki); + F(K); + } + xor512(Ki, C[11]); + F(Ki); + xor512(K, Ki); + } + + private void g_N(byte[] h, byte[] N, byte[] m) + { + Array.Copy(h, 0, tmp, 0, 64); + + xor512(h, N); + F(h); + + E(h, m); + xor512(h, tmp); + xor512(h, m); + } + + private void addMod512(byte[] A, int num) + { + int c; + c = (A[63] & 0xFF) + (num & 0xFF); + A[63] = (byte)c; + + c = (A[62] & 0xFF) + ((num >> 8) & 0xFF) + (c >> 8); + A[62] = (byte)c; + + for (int i = 61; (i >= 0) && (c > 0); --i) + { + c = (A[i] & 0xFF) + (c >> 8); + A[i] = (byte)c; + } + } + + private void addMod512(byte[] A, byte[] B) + { + for (int c = 0, i = 63; i >= 0; --i) + { + c = (A[i] & 0xFF) + (B[i] & 0xFF) + (c >> 8); + A[i] = (byte)c; + } + } + + private void reverse(byte[] src, byte[] dst) + { + int len = src.Length; + for (int i = 0; i < len; i++) + { + dst[len - 1 - i] = src[i]; + } + } + + private static readonly byte[][] C = new byte[][]{ new byte[]{ + (byte)0xb1, (byte)0x08, (byte)0x5b, (byte)0xda, (byte)0x1e, (byte)0xca, (byte)0xda, (byte)0xe9, + (byte)0xeb, (byte)0xcb, (byte)0x2f, (byte)0x81, (byte)0xc0, (byte)0x65, (byte)0x7c, (byte)0x1f, + (byte)0x2f, (byte)0x6a, (byte)0x76, (byte)0x43, (byte)0x2e, (byte)0x45, (byte)0xd0, (byte)0x16, + (byte)0x71, (byte)0x4e, (byte)0xb8, (byte)0x8d, (byte)0x75, (byte)0x85, (byte)0xc4, (byte)0xfc, + (byte)0x4b, (byte)0x7c, (byte)0xe0, (byte)0x91, (byte)0x92, (byte)0x67, (byte)0x69, (byte)0x01, + (byte)0xa2, (byte)0x42, (byte)0x2a, (byte)0x08, (byte)0xa4, (byte)0x60, (byte)0xd3, (byte)0x15, + (byte)0x05, (byte)0x76, (byte)0x74, (byte)0x36, (byte)0xcc, (byte)0x74, (byte)0x4d, (byte)0x23, + (byte)0xdd, (byte)0x80, (byte)0x65, (byte)0x59, (byte)0xf2, (byte)0xa6, (byte)0x45, (byte)0x07}, + + new byte[]{ + (byte)0x6f, (byte)0xa3, (byte)0xb5, (byte)0x8a, (byte)0xa9, (byte)0x9d, (byte)0x2f, (byte)0x1a, + (byte)0x4f, (byte)0xe3, (byte)0x9d, (byte)0x46, (byte)0x0f, (byte)0x70, (byte)0xb5, (byte)0xd7, + (byte)0xf3, (byte)0xfe, (byte)0xea, (byte)0x72, (byte)0x0a, (byte)0x23, (byte)0x2b, (byte)0x98, + (byte)0x61, (byte)0xd5, (byte)0x5e, (byte)0x0f, (byte)0x16, (byte)0xb5, (byte)0x01, (byte)0x31, + (byte)0x9a, (byte)0xb5, (byte)0x17, (byte)0x6b, (byte)0x12, (byte)0xd6, (byte)0x99, (byte)0x58, + (byte)0x5c, (byte)0xb5, (byte)0x61, (byte)0xc2, (byte)0xdb, (byte)0x0a, (byte)0xa7, (byte)0xca, + (byte)0x55, (byte)0xdd, (byte)0xa2, (byte)0x1b, (byte)0xd7, (byte)0xcb, (byte)0xcd, (byte)0x56, + (byte)0xe6, (byte)0x79, (byte)0x04, (byte)0x70, (byte)0x21, (byte)0xb1, (byte)0x9b, (byte)0xb7}, + new byte[]{ + (byte)0xf5, (byte)0x74, (byte)0xdc, (byte)0xac, (byte)0x2b, (byte)0xce, (byte)0x2f, (byte)0xc7, + (byte)0x0a, (byte)0x39, (byte)0xfc, (byte)0x28, (byte)0x6a, (byte)0x3d, (byte)0x84, (byte)0x35, + (byte)0x06, (byte)0xf1, (byte)0x5e, (byte)0x5f, (byte)0x52, (byte)0x9c, (byte)0x1f, (byte)0x8b, + (byte)0xf2, (byte)0xea, (byte)0x75, (byte)0x14, (byte)0xb1, (byte)0x29, (byte)0x7b, (byte)0x7b, + (byte)0xd3, (byte)0xe2, (byte)0x0f, (byte)0xe4, (byte)0x90, (byte)0x35, (byte)0x9e, (byte)0xb1, + (byte)0xc1, (byte)0xc9, (byte)0x3a, (byte)0x37, (byte)0x60, (byte)0x62, (byte)0xdb, (byte)0x09, + (byte)0xc2, (byte)0xb6, (byte)0xf4, (byte)0x43, (byte)0x86, (byte)0x7a, (byte)0xdb, (byte)0x31, + (byte)0x99, (byte)0x1e, (byte)0x96, (byte)0xf5, (byte)0x0a, (byte)0xba, (byte)0x0a, (byte)0xb2}, + new byte[]{ + (byte)0xef, (byte)0x1f, (byte)0xdf, (byte)0xb3, (byte)0xe8, (byte)0x15, (byte)0x66, (byte)0xd2, + (byte)0xf9, (byte)0x48, (byte)0xe1, (byte)0xa0, (byte)0x5d, (byte)0x71, (byte)0xe4, (byte)0xdd, + (byte)0x48, (byte)0x8e, (byte)0x85, (byte)0x7e, (byte)0x33, (byte)0x5c, (byte)0x3c, (byte)0x7d, + (byte)0x9d, (byte)0x72, (byte)0x1c, (byte)0xad, (byte)0x68, (byte)0x5e, (byte)0x35, (byte)0x3f, + (byte)0xa9, (byte)0xd7, (byte)0x2c, (byte)0x82, (byte)0xed, (byte)0x03, (byte)0xd6, (byte)0x75, + (byte)0xd8, (byte)0xb7, (byte)0x13, (byte)0x33, (byte)0x93, (byte)0x52, (byte)0x03, (byte)0xbe, + (byte)0x34, (byte)0x53, (byte)0xea, (byte)0xa1, (byte)0x93, (byte)0xe8, (byte)0x37, (byte)0xf1, + (byte)0x22, (byte)0x0c, (byte)0xbe, (byte)0xbc, (byte)0x84, (byte)0xe3, (byte)0xd1, (byte)0x2e}, + new byte[] { + (byte)0x4b, (byte)0xea, (byte)0x6b, (byte)0xac, (byte)0xad, (byte)0x47, (byte)0x47, (byte)0x99, + (byte)0x9a, (byte)0x3f, (byte)0x41, (byte)0x0c, (byte)0x6c, (byte)0xa9, (byte)0x23, (byte)0x63, + (byte)0x7f, (byte)0x15, (byte)0x1c, (byte)0x1f, (byte)0x16, (byte)0x86, (byte)0x10, (byte)0x4a, + (byte)0x35, (byte)0x9e, (byte)0x35, (byte)0xd7, (byte)0x80, (byte)0x0f, (byte)0xff, (byte)0xbd, + (byte)0xbf, (byte)0xcd, (byte)0x17, (byte)0x47, (byte)0x25, (byte)0x3a, (byte)0xf5, (byte)0xa3, + (byte)0xdf, (byte)0xff, (byte)0x00, (byte)0xb7, (byte)0x23, (byte)0x27, (byte)0x1a, (byte)0x16, + (byte)0x7a, (byte)0x56, (byte)0xa2, (byte)0x7e, (byte)0xa9, (byte)0xea, (byte)0x63, (byte)0xf5, + (byte)0x60, (byte)0x17, (byte)0x58, (byte)0xfd, (byte)0x7c, (byte)0x6c, (byte)0xfe, (byte)0x57}, + new byte[]{ + (byte)0xae, (byte)0x4f, (byte)0xae, (byte)0xae, (byte)0x1d, (byte)0x3a, (byte)0xd3, (byte)0xd9, + (byte)0x6f, (byte)0xa4, (byte)0xc3, (byte)0x3b, (byte)0x7a, (byte)0x30, (byte)0x39, (byte)0xc0, + (byte)0x2d, (byte)0x66, (byte)0xc4, (byte)0xf9, (byte)0x51, (byte)0x42, (byte)0xa4, (byte)0x6c, + (byte)0x18, (byte)0x7f, (byte)0x9a, (byte)0xb4, (byte)0x9a, (byte)0xf0, (byte)0x8e, (byte)0xc6, + (byte)0xcf, (byte)0xfa, (byte)0xa6, (byte)0xb7, (byte)0x1c, (byte)0x9a, (byte)0xb7, (byte)0xb4, + (byte)0x0a, (byte)0xf2, (byte)0x1f, (byte)0x66, (byte)0xc2, (byte)0xbe, (byte)0xc6, (byte)0xb6, + (byte)0xbf, (byte)0x71, (byte)0xc5, (byte)0x72, (byte)0x36, (byte)0x90, (byte)0x4f, (byte)0x35, + (byte)0xfa, (byte)0x68, (byte)0x40, (byte)0x7a, (byte)0x46, (byte)0x64, (byte)0x7d, (byte)0x6e}, + new byte[] { + (byte)0xf4, (byte)0xc7, (byte)0x0e, (byte)0x16, (byte)0xee, (byte)0xaa, (byte)0xc5, (byte)0xec, + (byte)0x51, (byte)0xac, (byte)0x86, (byte)0xfe, (byte)0xbf, (byte)0x24, (byte)0x09, (byte)0x54, + (byte)0x39, (byte)0x9e, (byte)0xc6, (byte)0xc7, (byte)0xe6, (byte)0xbf, (byte)0x87, (byte)0xc9, + (byte)0xd3, (byte)0x47, (byte)0x3e, (byte)0x33, (byte)0x19, (byte)0x7a, (byte)0x93, (byte)0xc9, + (byte)0x09, (byte)0x92, (byte)0xab, (byte)0xc5, (byte)0x2d, (byte)0x82, (byte)0x2c, (byte)0x37, + (byte)0x06, (byte)0x47, (byte)0x69, (byte)0x83, (byte)0x28, (byte)0x4a, (byte)0x05, (byte)0x04, + (byte)0x35, (byte)0x17, (byte)0x45, (byte)0x4c, (byte)0xa2, (byte)0x3c, (byte)0x4a, (byte)0xf3, + (byte)0x88, (byte)0x86, (byte)0x56, (byte)0x4d, (byte)0x3a, (byte)0x14, (byte)0xd4, (byte)0x93}, + new byte[] { + (byte)0x9b, (byte)0x1f, (byte)0x5b, (byte)0x42, (byte)0x4d, (byte)0x93, (byte)0xc9, (byte)0xa7, + (byte)0x03, (byte)0xe7, (byte)0xaa, (byte)0x02, (byte)0x0c, (byte)0x6e, (byte)0x41, (byte)0x41, + (byte)0x4e, (byte)0xb7, (byte)0xf8, (byte)0x71, (byte)0x9c, (byte)0x36, (byte)0xde, (byte)0x1e, + (byte)0x89, (byte)0xb4, (byte)0x44, (byte)0x3b, (byte)0x4d, (byte)0xdb, (byte)0xc4, (byte)0x9a, + (byte)0xf4, (byte)0x89, (byte)0x2b, (byte)0xcb, (byte)0x92, (byte)0x9b, (byte)0x06, (byte)0x90, + (byte)0x69, (byte)0xd1, (byte)0x8d, (byte)0x2b, (byte)0xd1, (byte)0xa5, (byte)0xc4, (byte)0x2f, + (byte)0x36, (byte)0xac, (byte)0xc2, (byte)0x35, (byte)0x59, (byte)0x51, (byte)0xa8, (byte)0xd9, + (byte)0xa4, (byte)0x7f, (byte)0x0d, (byte)0xd4, (byte)0xbf, (byte)0x02, (byte)0xe7, (byte)0x1e}, + new byte[]{ + (byte)0x37, (byte)0x8f, (byte)0x5a, (byte)0x54, (byte)0x16, (byte)0x31, (byte)0x22, (byte)0x9b, + (byte)0x94, (byte)0x4c, (byte)0x9a, (byte)0xd8, (byte)0xec, (byte)0x16, (byte)0x5f, (byte)0xde, + (byte)0x3a, (byte)0x7d, (byte)0x3a, (byte)0x1b, (byte)0x25, (byte)0x89, (byte)0x42, (byte)0x24, + (byte)0x3c, (byte)0xd9, (byte)0x55, (byte)0xb7, (byte)0xe0, (byte)0x0d, (byte)0x09, (byte)0x84, + (byte)0x80, (byte)0x0a, (byte)0x44, (byte)0x0b, (byte)0xdb, (byte)0xb2, (byte)0xce, (byte)0xb1, + (byte)0x7b, (byte)0x2b, (byte)0x8a, (byte)0x9a, (byte)0xa6, (byte)0x07, (byte)0x9c, (byte)0x54, + (byte)0x0e, (byte)0x38, (byte)0xdc, (byte)0x92, (byte)0xcb, (byte)0x1f, (byte)0x2a, (byte)0x60, + (byte)0x72, (byte)0x61, (byte)0x44, (byte)0x51, (byte)0x83, (byte)0x23, (byte)0x5a, (byte)0xdb}, + new byte[] { + (byte)0xab, (byte)0xbe, (byte)0xde, (byte)0xa6, (byte)0x80, (byte)0x05, (byte)0x6f, (byte)0x52, + (byte)0x38, (byte)0x2a, (byte)0xe5, (byte)0x48, (byte)0xb2, (byte)0xe4, (byte)0xf3, (byte)0xf3, + (byte)0x89, (byte)0x41, (byte)0xe7, (byte)0x1c, (byte)0xff, (byte)0x8a, (byte)0x78, (byte)0xdb, + (byte)0x1f, (byte)0xff, (byte)0xe1, (byte)0x8a, (byte)0x1b, (byte)0x33, (byte)0x61, (byte)0x03, + (byte)0x9f, (byte)0xe7, (byte)0x67, (byte)0x02, (byte)0xaf, (byte)0x69, (byte)0x33, (byte)0x4b, + (byte)0x7a, (byte)0x1e, (byte)0x6c, (byte)0x30, (byte)0x3b, (byte)0x76, (byte)0x52, (byte)0xf4, + (byte)0x36, (byte)0x98, (byte)0xfa, (byte)0xd1, (byte)0x15, (byte)0x3b, (byte)0xb6, (byte)0xc3, + (byte)0x74, (byte)0xb4, (byte)0xc7, (byte)0xfb, (byte)0x98, (byte)0x45, (byte)0x9c, (byte)0xed}, + new byte[] { + (byte)0x7b, (byte)0xcd, (byte)0x9e, (byte)0xd0, (byte)0xef, (byte)0xc8, (byte)0x89, (byte)0xfb, + (byte)0x30, (byte)0x02, (byte)0xc6, (byte)0xcd, (byte)0x63, (byte)0x5a, (byte)0xfe, (byte)0x94, + (byte)0xd8, (byte)0xfa, (byte)0x6b, (byte)0xbb, (byte)0xeb, (byte)0xab, (byte)0x07, (byte)0x61, + (byte)0x20, (byte)0x01, (byte)0x80, (byte)0x21, (byte)0x14, (byte)0x84, (byte)0x66, (byte)0x79, + (byte)0x8a, (byte)0x1d, (byte)0x71, (byte)0xef, (byte)0xea, (byte)0x48, (byte)0xb9, (byte)0xca, + (byte)0xef, (byte)0xba, (byte)0xcd, (byte)0x1d, (byte)0x7d, (byte)0x47, (byte)0x6e, (byte)0x98, + (byte)0xde, (byte)0xa2, (byte)0x59, (byte)0x4a, (byte)0xc0, (byte)0x6f, (byte)0xd8, (byte)0x5d, + (byte)0x6b, (byte)0xca, (byte)0xa4, (byte)0xcd, (byte)0x81, (byte)0xf3, (byte)0x2d, (byte)0x1b}, + new byte[] { + (byte)0x37, (byte)0x8e, (byte)0xe7, (byte)0x67, (byte)0xf1, (byte)0x16, (byte)0x31, (byte)0xba, + (byte)0xd2, (byte)0x13, (byte)0x80, (byte)0xb0, (byte)0x04, (byte)0x49, (byte)0xb1, (byte)0x7a, + (byte)0xcd, (byte)0xa4, (byte)0x3c, (byte)0x32, (byte)0xbc, (byte)0xdf, (byte)0x1d, (byte)0x77, + (byte)0xf8, (byte)0x20, (byte)0x12, (byte)0xd4, (byte)0x30, (byte)0x21, (byte)0x9f, (byte)0x9b, + (byte)0x5d, (byte)0x80, (byte)0xef, (byte)0x9d, (byte)0x18, (byte)0x91, (byte)0xcc, (byte)0x86, + (byte)0xe7, (byte)0x1d, (byte)0xa4, (byte)0xaa, (byte)0x88, (byte)0xe1, (byte)0x28, (byte)0x52, + (byte)0xfa, (byte)0xf4, (byte)0x17, (byte)0xd5, (byte)0xd9, (byte)0xb2, (byte)0x1b, (byte)0x99, + (byte)0x48, (byte)0xbc, (byte)0x92, (byte)0x4a, (byte)0xf1, (byte)0x1b, (byte)0xd7, (byte)0x20} + }; + + private static readonly byte[] Zero = { + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 + }; + + private readonly static ulong[][] T = { + new ulong[] { + 0xE6F87E5C5B711FD0L, 0x258377800924FA16L, 0xC849E07E852EA4A8L, 0x5B4686A18F06C16AL, + 0x0B32E9A2D77B416EL, 0xABDA37A467815C66L, 0xF61796A81A686676L, 0xF5DC0B706391954BL, + 0x4862F38DB7E64BF1L, 0xFF5C629A68BD85C5L, 0xCB827DA6FCD75795L, 0x66D36DAF69B9F089L, + 0x356C9F74483D83B0L, 0x7CBCECB1238C99A1L, 0x36A702AC31C4708DL, 0x9EB6A8D02FBCDFD6L, + 0x8B19FA51E5B3AE37L, 0x9CCFB5408A127D0BL, 0xBC0C78B508208F5AL, 0xE533E3842288ECEDL, + 0xCEC2C7D377C15FD2L, 0xEC7817B6505D0F5EL, 0xB94CC2C08336871DL, 0x8C205DB4CB0B04ADL, + 0x763C855B28A0892FL, 0x588D1B79F6FF3257L, 0x3FECF69E4311933EL, 0x0FC0D39F803A18C9L, + 0xEE010A26F5F3AD83L, 0x10EFE8F4411979A6L, 0x5DCDA10C7DE93A10L, 0x4A1BEE1D1248E92CL, + 0x53BFF2DB21847339L, 0xB4F50CCFA6A23D09L, 0x5FB4BC9CD84798CDL, 0xE88A2D8B071C56F9L, + 0x7F7771695A756A9CL, 0xC5F02E71A0BA1EBCL, 0xA663F9AB4215E672L, 0x2EB19E22DE5FBB78L, + 0x0DB9CE0F2594BA14L, 0x82520E6397664D84L, 0x2F031E6A0208EA98L, 0x5C7F2144A1BE6BF0L, + 0x7A37CB1CD16362DBL, 0x83E08E2B4B311C64L, 0xCF70479BAB960E32L, 0x856BA986B9DEE71EL, + 0xB5478C877AF56CE9L, 0xB8FE42885F61D6FDL, 0x1BDD0156966238C8L, 0x622157923EF8A92EL, + 0xFC97FF42114476F8L, 0x9D7D350856452CEBL, 0x4C90C9B0E0A71256L, 0x2308502DFBCB016CL, + 0x2D7A03FAA7A64845L, 0xF46E8B38BFC6C4ABL, 0xBDBEF8FDD477DEBAL, 0x3AAC4CEBC8079B79L, + 0xF09CB105E8879D0CL, 0x27FA6A10AC8A58CBL, 0x8960E7C1401D0CEAL, 0x1A6F811E4A356928L, + 0x90C4FB0773D196FFL, 0x43501A2F609D0A9FL, 0xF7A516E0C63F3796L, 0x1CE4A6B3B8DA9252L, + 0x1324752C38E08A9BL, 0xA5A864733BEC154FL, 0x2BF124575549B33FL, 0xD766DB15440DC5C7L, + 0xA7D179E39E42B792L, 0xDADF151A61997FD3L, 0x86A0345EC0271423L, 0x38D5517B6DA939A4L, + 0x6518F077104003B4L, 0x02791D90A5AEA2DDL, 0x88D267899C4A5D0AL, 0x930F66DF0A2865C2L, + 0x4EE9D4204509B08BL, 0x325538916685292AL, 0x412907BFC533A842L, 0xB27E2B62544DC673L, + 0x6C5304456295E007L, 0x5AF406E95351908AL, 0x1F2F3B6BC123616FL, 0xC37B09DC5255E5C6L, + 0x3967D133B1FE6844L, 0x298839C7F0E711E2L, 0x409B87F71964F9A2L, 0xE938ADC3DB4B0719L, + 0x0C0B4E47F9C3EBF4L, 0x5534D576D36B8843L, 0x4610A05AEB8B02D8L, 0x20C3CDF58232F251L, + 0x6DE1840DBEC2B1E7L, 0xA0E8DE06B0FA1D08L, 0x7B854B540D34333BL, 0x42E29A67BCCA5B7FL, + 0xD8A6088AC437DD0EL, 0xC63BB3A9D943ED81L, 0x21714DBD5E65A3B1L, 0x6761EDE7B5EEA169L, + 0x2431F7C8D573ABF6L, 0xD51FC685E1A3671AL, 0x5E063CD40410C92DL, 0x283AB98F2CB04002L, + 0x8FEBC06CB2F2F790L, 0x17D64F116FA1D33CL, 0xE07359F1A99EE4AAL, 0x784ED68C74CDC006L, + 0x6E2A19D5C73B42DAL, 0x8712B4161C7045C3L, 0x371582E4ED93216DL, 0xACE390414939F6FCL, + 0x7EC5F12186223B7CL, 0xC0B094042BAC16FBL, 0xF9D745379A527EBFL, 0x737C3F2EA3B68168L, + 0x33E7B8D9BAD278CAL, 0xA9A32A34C22FFEBBL, 0xE48163CCFEDFBD0DL, 0x8E5940246EA5A670L, + 0x51C6EF4B842AD1E4L, 0x22BAD065279C508CL, 0xD91488C218608CEEL, 0x319EA5491F7CDA17L, + 0xD394E128134C9C60L, 0x094BF43272D5E3B3L, 0x9BF612A5A4AAD791L, 0xCCBBDA43D26FFD0FL, + 0x34DE1F3C946AD250L, 0x4F5B5468995EE16BL, 0xDF9FAF6FEA8F7794L, 0x2648EA5870DD092BL, + 0xBFC7E56D71D97C67L, 0xDDE6B2FF4F21D549L, 0x3C276B463AE86003L, 0x91767B4FAF86C71FL, + 0x68A13E7835D4B9A0L, 0xB68C115F030C9FD4L, 0x141DD2C916582001L, 0x983D8F7DDD5324ACL, + 0x64AA703FCC175254L, 0xC2C989948E02B426L, 0x3E5E76D69F46C2DEL, 0x50746F03587D8004L, + 0x45DB3D829272F1E5L, 0x60584A029B560BF3L, 0xFBAE58A73FFCDC62L, 0xA15A5E4E6CAD4CE8L, + 0x4BA96E55CE1FB8CCL, 0x08F9747AAE82B253L, 0xC102144CF7FB471BL, 0x9F042898F3EB8E36L, + 0x068B27ADF2EFFB7AL, 0xEDCA97FE8C0A5EBEL, 0x778E0513F4F7D8CFL, 0x302C2501C32B8BF7L, + 0x8D92DDFC175C554DL, 0xF865C57F46052F5FL, 0xEAF3301BA2B2F424L, 0xAA68B7ECBBD60D86L, + 0x998F0F350104754CL, 0x0000000000000000L, 0xF12E314D34D0CCECL, 0x710522BE061823B5L, + 0xAF280D9930C005C1L, 0x97FD5CE25D693C65L, 0x19A41CC633CC9A15L, 0x95844172F8C79EB8L, + 0xDC5432B7937684A9L, 0x9436C13A2490CF58L, 0x802B13F332C8EF59L, 0xC442AE397CED4F5CL, + 0xFA1CD8EFE3AB8D82L, 0xF2E5AC954D293FD1L, 0x6AD823E8907A1B7DL, 0x4D2249F83CF043B6L, + 0x03CB9DD879F9F33DL, 0xDE2D2F2736D82674L, 0x2A43A41F891EE2DFL, 0x6F98999D1B6C133AL, + 0xD4AD46CD3DF436FAL, 0xBB35DF50269825C0L, 0x964FDCAA813E6D85L, 0xEB41B0537EE5A5C4L, + 0x0540BA758B160847L, 0xA41AE43BE7BB44AFL, 0xE3B8C429D0671797L, 0x819993BBEE9FBEB9L, + 0xAE9A8DD1EC975421L, 0xF3572CDD917E6E31L, 0x6393D7DAE2AFF8CEL, 0x47A2201237DC5338L, + 0xA32343DEC903EE35L, 0x79FC56C4A89A91E6L, 0x01B28048DC5751E0L, 0x1296F564E4B7DB7BL, + 0x75F7188351597A12L, 0xDB6D9552BDCE2E33L, 0x1E9DBB231D74308FL, 0x520D7293FDD322D9L, + 0xE20A44610C304677L, 0xFEEEE2D2B4EAD425L, 0xCA30FDEE20800675L, 0x61EACA4A47015A13L, + 0xE74AFE1487264E30L, 0x2CC883B27BF119A5L, 0x1664CF59B3F682DCL, 0xA811AA7C1E78AF5BL, + 0x1D5626FB648DC3B2L, 0xB73E9117DF5BCE34L, 0xD05F7CF06AB56F5DL, 0xFD257F0ACD132718L, + 0x574DC8E676C52A9EL, 0x0739A7E52EB8AA9AL, 0x5486553E0F3CD9A3L, 0x56FF48AEAA927B7EL, + 0xBE756525AD8E2D87L, 0x7D0E6CF9FFDBC841L, 0x3B1ECCA31450CA99L, 0x6913BE30E983E840L, + 0xAD511009956EA71CL, 0xB1B5B6BA2DB4354EL, 0x4469BDCA4E25A005L, 0x15AF5281CA0F71E1L, + 0x744598CB8D0E2BF2L, 0x593F9B312AA863B7L, 0xEFB38A6E29A4FC63L, 0x6B6AA3A04C2D4A9DL, + 0x3D95EB0EE6BF31E3L, 0xA291C3961554BFD5L, 0x18169C8EEF9BCBF5L, 0x115D68BC9D4E2846L, + 0xBA875F18FACF7420L, 0xD1EDFCB8B6E23EBDL, 0xB00736F2F1E364AEL, 0x84D929CE6589B6FEL, + 0x70B7A2F6DA4F7255L, 0x0E7253D75C6D4929L, 0x04F23A3D574159A7L, 0x0A8069EA0B2C108EL, + 0x49D073C56BB11A11L, 0x8AAB7A1939E4FFD7L, 0xCD095A0B0E38ACEFL, 0xC9FB60365979F548L, + 0x92BDE697D67F3422L, 0xC78933E10514BC61L, 0xE1C1D9B975C9B54AL, 0xD2266160CF1BCD80L, + 0x9A4492ED78FD8671L, 0xB3CCAB2A881A9793L, 0x72CEBF667FE1D088L, 0xD6D45B5D985A9427L + }, + new ulong[]{ + 0xC811A8058C3F55DEL, 0x65F5B43196B50619L, 0xF74F96B1D6706E43L, 0x859D1E8BCB43D336L, + 0x5AAB8A85CCFA3D84L, 0xF9C7BF99C295FCFDL, 0xA21FD5A1DE4B630FL, 0xCDB3EF763B8B456DL, + 0x803F59F87CF7C385L, 0xB27C73BE5F31913CL, 0x98E3AC6633B04821L, 0xBF61674C26B8F818L, + 0x0FFBC995C4C130C8L, 0xAAA0862010761A98L, 0x6057F342210116AAL, 0xF63C760C0654CC35L, + 0x2DDB45CC667D9042L, 0xBCF45A964BD40382L, 0x68E8A0C3EF3C6F3DL, 0xA7BD92D269FF73BCL, + 0x290AE20201ED2287L, 0xB7DE34CDE885818FL, 0xD901EEA7DD61059BL, 0xD6FA273219A03553L, + 0xD56F1AE874CCCEC9L, 0xEA31245C2E83F554L, 0x7034555DA07BE499L, 0xCE26D2AC56E7BEF7L, + 0xFD161857A5054E38L, 0x6A0E7DA4527436D1L, 0x5BD86A381CDE9FF2L, 0xCAF7756231770C32L, + 0xB09AAED9E279C8D0L, 0x5DEF1091C60674DBL, 0x111046A2515E5045L, 0x23536CE4729802FCL, + 0xC50CBCF7F5B63CFAL, 0x73A16887CD171F03L, 0x7D2941AFD9F28DBDL, 0x3F5E3EB45A4F3B9DL, + 0x84EEFE361B677140L, 0x3DB8E3D3E7076271L, 0x1A3A28F9F20FD248L, 0x7EBC7C75B49E7627L, + 0x74E5F293C7EB565CL, 0x18DCF59E4F478BA4L, 0x0C6EF44FA9ADCB52L, 0xC699812D98DAC760L, + 0x788B06DC6E469D0EL, 0xFC65F8EA7521EC4EL, 0x30A5F7219E8E0B55L, 0x2BEC3F65BCA57B6BL, + 0xDDD04969BAF1B75EL, 0x99904CDBE394EA57L, 0x14B201D1E6EA40F6L, 0xBBB0C08241284ADDL, + 0x50F20463BF8F1DFFL, 0xE8D7F93B93CBACB8L, 0x4D8CB68E477C86E8L, 0xC1DD1B3992268E3FL, + 0x7C5AA11209D62FCBL, 0x2F3D98ABDB35C9AEL, 0x671369562BFD5FF5L, 0x15C1E16C36CEE280L, + 0x1D7EB2EDF8F39B17L, 0xDA94D37DB00DFE01L, 0x877BC3EC760B8ADAL, 0xCB8495DFE153AE44L, + 0x05A24773B7B410B3L, 0x12857B783C32ABDFL, 0x8EB770D06812513BL, 0x536739B9D2E3E665L, + 0x584D57E271B26468L, 0xD789C78FC9849725L, 0xA935BBFA7D1AE102L, 0x8B1537A3DFA64188L, + 0xD0CD5D9BC378DE7AL, 0x4AC82C9A4D80CFB7L, 0x42777F1B83BDB620L, 0x72D2883A1D33BD75L, + 0x5E7A2D4BAB6A8F41L, 0xF4DAAB6BBB1C95D9L, 0x905CFFE7FD8D31B6L, 0x83AA6422119B381FL, + 0xC0AEFB8442022C49L, 0xA0F908C663033AE3L, 0xA428AF0804938826L, 0xADE41C341A8A53C7L, + 0xAE7121EE77E6A85DL, 0xC47F5C4A25929E8CL, 0xB538E9AA55CDD863L, 0x06377AA9DAD8EB29L, + 0xA18AE87BB3279895L, 0x6EDFDA6A35E48414L, 0x6B7D9D19825094A7L, 0xD41CFA55A4E86CBFL, + 0xE5CAEDC9EA42C59CL, 0xA36C351C0E6FC179L, 0x5181E4DE6FABBF89L, 0xFFF0C530184D17D4L, + 0x9D41EB1584045892L, 0x1C0D525028D73961L, 0xF178EC180CA8856AL, 0x9A0571018EF811CDL, + 0x4091A27C3EF5EFCCL, 0x19AF15239F6329D2L, 0x347450EFF91EB990L, 0xE11B4A078DD27759L, + 0xB9561DE5FC601331L, 0x912F1F5A2DA993C0L, 0x1654DCB65BA2191AL, 0x3E2DDE098A6B99EBL, + 0x8A66D71E0F82E3FEL, 0x8C51ADB7D55A08D7L, 0x4533E50F8941FF7FL, 0x02E6DD67BD4859ECL, + 0xE068AABA5DF6D52FL, 0xC24826E3FF4A75A5L, 0x6C39070D88ACDDF8L, 0x6486548C4691A46FL, + 0xD1BEBD26135C7C0CL, 0xB30F93038F15334AL, 0x82D9849FC1BF9A69L, 0x9C320BA85420FAE4L, + 0xFA528243AFF90767L, 0x9ED4D6CFE968A308L, 0xB825FD582C44B147L, 0x9B7691BC5EDCB3BBL, + 0xC7EA619048FE6516L, 0x1063A61F817AF233L, 0x47D538683409A693L, 0x63C2CE984C6DED30L, + 0x2A9FDFD86C81D91DL, 0x7B1E3B06032A6694L, 0x666089EBFBD9FD83L, 0x0A598EE67375207BL, + 0x07449A140AFC495FL, 0x2CA8A571B6593234L, 0x1F986F8A45BBC2FBL, 0x381AA4A050B372C2L, + 0x5423A3ADD81FAF3AL, 0x17273C0B8B86BB6CL, 0xFE83258DC869B5A2L, 0x287902BFD1C980F1L, + 0xF5A94BD66B3837AFL, 0x88800A79B2CABA12L, 0x55504310083B0D4CL, 0xDF36940E07B9EEB2L, + 0x04D1A7CE6790B2C5L, 0x612413FFF125B4DCL, 0x26F12B97C52C124FL, 0x86082351A62F28ACL, + 0xEF93632F9937E5E7L, 0x3507B052293A1BE6L, 0xE72C30AE570A9C70L, 0xD3586041AE1425E0L, + 0xDE4574B3D79D4CC4L, 0x92BA228040C5685AL, 0xF00B0CA5DC8C271CL, 0xBE1287F1F69C5A6EL, + 0xF39E317FB1E0DC86L, 0x495D114020EC342DL, 0x699B407E3F18CD4BL, 0xDCA3A9D46AD51528L, + 0x0D1D14F279896924L, 0x0000000000000000L, 0x593EB75FA196C61EL, 0x2E4E78160B116BD8L, + 0x6D4AE7B058887F8EL, 0xE65FD013872E3E06L, 0x7A6DDBBBD30EC4E2L, 0xAC97FC89CAAEF1B1L, + 0x09CCB33C1E19DBE1L, 0x89F3EAC462EE1864L, 0x7770CF49AA87ADC6L, 0x56C57ECA6557F6D6L, + 0x03953DDA6D6CFB9AL, 0x36928D884456E07CL, 0x1EEB8F37959F608DL, 0x31D6179C4EAAA923L, + 0x6FAC3AD7E5C02662L, 0x43049FA653991456L, 0xABD3669DC052B8EEL, 0xAF02C153A7C20A2BL, + 0x3CCB036E3723C007L, 0x93C9C23D90E1CA2CL, 0xC33BC65E2F6ED7D3L, 0x4CFF56339758249EL, + 0xB1E94E64325D6AA6L, 0x37E16D359472420AL, 0x79F8E661BE623F78L, 0x5214D90402C74413L, + 0x482EF1FDF0C8965BL, 0x13F69BC5EC1609A9L, 0x0E88292814E592BEL, 0x4E198B542A107D72L, + 0xCCC00FCBEBAFE71BL, 0x1B49C844222B703EL, 0x2564164DA840E9D5L, 0x20C6513E1FF4F966L, + 0xBAC3203F910CE8ABL, 0xF2EDD1C261C47EF0L, 0x814CB945ACD361F3L, 0x95FEB8944A392105L, + 0x5C9CF02C1622D6ADL, 0x971865F3F77178E9L, 0xBD87BA2B9BF0A1F4L, 0x444005B259655D09L, + 0xED75BE48247FBC0BL, 0x7596122E17CFF42AL, 0xB44B091785E97A15L, 0x966B854E2755DA9FL, + 0xEEE0839249134791L, 0x32432A4623C652B9L, 0xA8465B47AD3E4374L, 0xF8B45F2412B15E8BL, + 0x2417F6F078644BA3L, 0xFB2162FE7FDDA511L, 0x4BBBCC279DA46DC1L, 0x0173E0BDD024A276L, + 0x22208C59A2BCA08AL, 0x8FC4906DB836F34DL, 0xE4B90D743A6667EAL, 0x7147B5E0705F46EFL, + 0x2782CB2A1508B039L, 0xEC065EF5F45B1E7DL, 0x21B5B183CFD05B10L, 0xDBE733C060295C77L, + 0x9FA73672394C017EL, 0xCF55321186C31C81L, 0xD8720E1A0D45A7EDL, 0x3B8F997A3DDF8958L, + 0x3AFC79C7EDFB2B2EL, 0xE9A4198643EF0ECEL, 0x5F09CDF67B4E2D37L, 0x4F6A6BE9FA34DF04L, + 0xB6ADD47038A123F9L, 0x8D224D0A057EAAA1L, 0xC96248B85C1BF7A8L, 0xE3FD9760309A2EB5L, + 0x0B2A6E5BA351820DL, 0xEB42C4E1FEA75722L, 0x948D58299A1D8373L, 0x7FCF9CC864BAD451L, + 0xA55B4FB5D4B72A50L, 0x08BF5381CE3D7997L, 0x46A6D8D5E42D04E5L, 0xD22B80FC7E308796L, + 0x57B69E77B57354A0L, 0x3969441D8097D0B4L, 0x3330CAFBF3E2F0CFL, 0xE28E77DDE0BE8CC3L, + 0x62B12E259C494F46L, 0xA6CE726FB9DBD1CAL, 0x41E242C1EED14DBAL, 0x76032FF47AA30FB0L + }, + new ulong[]{ + 0x45B268A93ACDE4CCL, 0xAF7F0BE884549D08L, 0x048354B3C1468263L, 0x925435C2C80EFED2L, + 0xEE4E37F27FDFFBA7L, 0x167A33920C60F14DL, 0xFB123B52EA03E584L, 0x4A0CAB53FDBB9007L, + 0x9DEAF6380F788A19L, 0xCB48EC558F0CB32AL, 0xB59DC4B2D6FEF7E0L, 0xDCDBCA22F4F3ECB6L, + 0x11DF5813549A9C40L, 0xE33FDEDF568ACED3L, 0xA0C1C8124322E9C3L, 0x07A56B8158FA6D0DL, + 0x77279579B1E1F3DDL, 0xD9B18B74422AC004L, 0xB8EC2D9FFFABC294L, 0xF4ACF8A82D75914FL, + 0x7BBF69B1EF2B6878L, 0xC4F62FAF487AC7E1L, 0x76CE809CC67E5D0CL, 0x6711D88F92E4C14CL, + 0x627B99D9243DEDFEL, 0x234AA5C3DFB68B51L, 0x909B1F15262DBF6DL, 0x4F66EA054B62BCB5L, + 0x1AE2CF5A52AA6AE8L, 0xBEA053FBD0CE0148L, 0xED6808C0E66314C9L, 0x43FE16CD15A82710L, + 0xCD049231A06970F6L, 0xE7BC8A6C97CC4CB0L, 0x337CE835FCB3B9C0L, 0x65DEF2587CC780F3L, + 0x52214EDE4132BB50L, 0x95F15E4390F493DFL, 0x870839625DD2E0F1L, 0x41313C1AFB8B66AFL, + 0x91720AF051B211BCL, 0x477D427ED4EEA573L, 0x2E3B4CEEF6E3BE25L, 0x82627834EB0BCC43L, + 0x9C03E3DD78E724C8L, 0x2877328AD9867DF9L, 0x14B51945E243B0F2L, 0x574B0F88F7EB97E2L, + 0x88B6FA989AA4943AL, 0x19C4F068CB168586L, 0x50EE6409AF11FAEFL, 0x7DF317D5C04EABA4L, + 0x7A567C5498B4C6A9L, 0xB6BBFB804F42188EL, 0x3CC22BCF3BC5CD0BL, 0xD04336EAAA397713L, + 0xF02FAC1BEC33132CL, 0x2506DBA7F0D3488DL, 0xD7E65D6BF2C31A1EL, 0x5EB9B2161FF820F5L, + 0x842E0650C46E0F9FL, 0x716BEB1D9E843001L, 0xA933758CAB315ED4L, 0x3FE414FDA2792265L, + 0x27C9F1701EF00932L, 0x73A4C1CA70A771BEL, 0x94184BA6E76B3D0EL, 0x40D829FF8C14C87EL, + 0x0FBEC3FAC77674CBL, 0x3616A9634A6A9572L, 0x8F139119C25EF937L, 0xF545ED4D5AEA3F9EL, + 0xE802499650BA387BL, 0x6437E7BD0B582E22L, 0xE6559F89E053E261L, 0x80AD52E305288DFCL, + 0x6DC55A23E34B9935L, 0xDE14E0F51AD0AD09L, 0xC6390578A659865EL, 0x96D7617109487CB1L, + 0xE2D6CB3A21156002L, 0x01E915E5779FAED1L, 0xADB0213F6A77DCB7L, 0x9880B76EB9A1A6ABL, + 0x5D9F8D248644CF9BL, 0xFD5E4536C5662658L, 0xF1C6B9FE9BACBDFDL, 0xEACD6341BE9979C4L, + 0xEFA7221708405576L, 0x510771ECD88E543EL, 0xC2BA51CB671F043DL, 0x0AD482AC71AF5879L, + 0xFE787A045CDAC936L, 0xB238AF338E049AEDL, 0xBD866CC94972EE26L, 0x615DA6EBBD810290L, + 0x3295FDD08B2C1711L, 0xF834046073BF0AEAL, 0xF3099329758FFC42L, 0x1CAEB13E7DCFA934L, + 0xBA2307481188832BL, 0x24EFCE42874CE65CL, 0x0E57D61FB0E9DA1AL, 0xB3D1BAD6F99B343CL, + 0xC0757B1C893C4582L, 0x2B510DB8403A9297L, 0x5C7698C1F1DB614AL, 0x3E0D0118D5E68CB4L, + 0xD60F488E855CB4CFL, 0xAE961E0DF3CB33D9L, 0x3A8E55AB14A00ED7L, 0x42170328623789C1L, + 0x838B6DD19C946292L, 0x895FEF7DED3B3AEBL, 0xCFCBB8E64E4A3149L, 0x064C7E642F65C3DCL, + 0x3D2B3E2A4C5A63DAL, 0x5BD3F340A9210C47L, 0xB474D157A1615931L, 0xAC5934DA1DE87266L, + 0x6EE365117AF7765BL, 0xC86ED36716B05C44L, 0x9BA6885C201D49C5L, 0xB905387A88346C45L, + 0x131072C4BAB9DDFFL, 0xBF49461EA751AF99L, 0xD52977BC1CE05BA1L, 0xB0F785E46027DB52L, + 0x546D30BA6E57788CL, 0x305AD707650F56AEL, 0xC987C682612FF295L, 0xA5AB8944F5FBC571L, + 0x7ED528E759F244CAL, 0x8DDCBBCE2C7DB888L, 0xAA154ABE328DB1BAL, 0x1E619BE993ECE88BL, + 0x09F2BD9EE813B717L, 0x7401AA4B285D1CB3L, 0x21858F143195CAEEL, 0x48C381841398D1B8L, + 0xFCB750D3B2F98889L, 0x39A86A998D1CE1B9L, 0x1F888E0CE473465AL, 0x7899568376978716L, + 0x02CF2AD7EE2341BFL, 0x85C713B5B3F1A14EL, 0xFF916FE12B4567E7L, 0x7C1A0230B7D10575L, + 0x0C98FCC85ECA9BA5L, 0xA3E7F720DA9E06ADL, 0x6A6031A2BBB1F438L, 0x973E74947ED7D260L, + 0x2CF4663918C0FF9AL, 0x5F50A7F368678E24L, 0x34D983B4A449D4CDL, 0x68AF1B755592B587L, + 0x7F3C3D022E6DEA1BL, 0xABFC5F5B45121F6BL, 0x0D71E92D29553574L, 0xDFFDF5106D4F03D8L, + 0x081BA87B9F8C19C6L, 0xDB7EA1A3AC0981BBL, 0xBBCA12AD66172DFAL, 0x79704366010829C7L, + 0x179326777BFF5F9CL, 0x0000000000000000L, 0xEB2476A4C906D715L, 0x724DD42F0738DF6FL, + 0xB752EE6538DDB65FL, 0x37FFBC863DF53BA3L, 0x8EFA84FCB5C157E6L, 0xE9EB5C73272596AAL, + 0x1B0BDABF2535C439L, 0x86E12C872A4D4E20L, 0x9969A28BCE3E087AL, 0xFAFB2EB79D9C4B55L, + 0x056A4156B6D92CB2L, 0x5A3AE6A5DEBEA296L, 0x22A3B026A8292580L, 0x53C85B3B36AD1581L, + 0xB11E900117B87583L, 0xC51F3A4A3FE56930L, 0xE019E1EDCF3621BDL, 0xEC811D2591FCBA18L, + 0x445B7D4C4D524A1DL, 0xA8DA6069DCAEF005L, 0x58F5CC72309DE329L, 0xD4C062596B7FF570L, + 0xCE22AD0339D59F98L, 0x591CD99747024DF8L, 0x8B90C5AA03187B54L, 0xF663D27FC356D0F0L, + 0xD8589E9135B56ED5L, 0x35309651D3D67A1CL, 0x12F96721CD26732EL, 0xD28C1C3D441A36ACL, + 0x492A946164077F69L, 0x2D1D73DC6F5F514BL, 0x6F0A70F40D68D88AL, 0x60B4B30ECA1EAC41L, + 0xD36509D83385987DL, 0x0B3D97490630F6A8L, 0x9ECCC90A96C46577L, 0xA20EE2C5AD01A87CL, + 0xE49AB55E0E70A3DEL, 0xA4429CA182646BA0L, 0xDA97B446DB962F6AL, 0xCCED87D4D7F6DE27L, + 0x2AB8185D37A53C46L, 0x9F25DCEFE15BCBA6L, 0xC19C6EF9FEA3EB53L, 0xA764A3931BD884CEL, + 0x2FD2590B817C10F4L, 0x56A21A6D80743933L, 0xE573A0BB79EF0D0FL, 0x155C0CA095DC1E23L, + 0x6C2C4FC694D437E4L, 0x10364DF623053291L, 0xDD32DFC7836C4267L, 0x03263F3299BCEF6EL, + 0x66F8CD6AE57B6F9DL, 0x8C35AE2B5BE21659L, 0x31B3C2E21290F87FL, 0x93BD2027BF915003L, + 0x69460E90220D1B56L, 0x299E276FAE19D328L, 0x63928C3C53A2432FL, 0x7082FEF8E91B9ED0L, + 0xBC6F792C3EED40F7L, 0x4C40D537D2DE53DBL, 0x75E8BFAE5FC2B262L, 0x4DA9C0D2A541FD0AL, + 0x4E8FFFE03CFD1264L, 0x2620E495696FA7E3L, 0xE1F0F408B8A98F6CL, 0xD1AA230FDDA6D9C2L, + 0xC7D0109DD1C6288FL, 0x8A79D04F7487D585L, 0x4694579BA3710BA2L, 0x38417F7CFA834F68L, + 0x1D47A4DB0A5007E5L, 0x206C9AF1460A643FL, 0xA128DDF734BD4712L, 0x8144470672B7232DL, + 0xF2E086CC02105293L, 0x182DE58DBC892B57L, 0xCAA1F9B0F8931DFBL, 0x6B892447CC2E5AE9L, + 0xF9DD11850420A43BL, 0x4BE5BEB68A243ED6L, 0x5584255F19C8D65DL, 0x3B67404E633FA006L, + 0xA68DB6766C472A1FL, 0xF78AC79AB4C97E21L, 0xC353442E1080AAECL, 0x9A4F9DB95782E714L + }, + new ulong[] { + 0x05BA7BC82C9B3220L, 0x31A54665F8B65E4FL, 0xB1B651F77547F4D4L, 0x8BFA0D857BA46682L, + 0x85A96C5AA16A98BBL, 0x990FAEF908EB79C9L, 0xA15E37A247F4A62DL, 0x76857DCD5D27741EL, + 0xF8C50B800A1820BCL, 0xBE65DCB201F7A2B4L, 0x666D1B986F9426E7L, 0x4CC921BF53C4E648L, + 0x95410A0F93D9CA42L, 0x20CDCCAA647BA4EFL, 0x429A4060890A1871L, 0x0C4EA4F69B32B38BL, + 0xCCDA362DDE354CD3L, 0x96DC23BC7C5B2FA9L, 0xC309BB68AA851AB3L, 0xD26131A73648E013L, + 0x021DC52941FC4DB2L, 0xCD5ADAB7704BE48AL, 0xA77965D984ED71E6L, 0x32386FD61734BBA4L, + 0xE82D6DD538AB7245L, 0x5C2147EA6177B4B1L, 0x5DA1AB70CF091CE8L, 0xAC907FCE72B8BDFFL, + 0x57C85DFD972278A8L, 0xA4E44C6A6B6F940DL, 0x3851995B4F1FDFE4L, 0x62578CCAED71BC9EL, + 0xD9882BB0C01D2C0AL, 0x917B9D5D113C503BL, 0xA2C31E11A87643C6L, 0xE463C923A399C1CEL, + 0xF71686C57EA876DCL, 0x87B4A973E096D509L, 0xAF0D567D9D3A5814L, 0xB40C2A3F59DCC6F4L, + 0x3602F88495D121DDL, 0xD3E1DD3D9836484AL, 0xF945E71AA46688E5L, 0x7518547EB2A591F5L, + 0x9366587450C01D89L, 0x9EA81018658C065BL, 0x4F54080CBC4603A3L, 0x2D0384C65137BF3DL, + 0xDC325078EC861E2AL, 0xEA30A8FC79573FF7L, 0x214D2030CA050CB6L, 0x65F0322B8016C30CL, + 0x69BE96DD1B247087L, 0xDB95EE9981E161B8L, 0xD1FC1814D9CA05F8L, 0x820ED2BBCC0DE729L, + 0x63D76050430F14C7L, 0x3BCCB0E8A09D3A0FL, 0x8E40764D573F54A2L, 0x39D175C1E16177BDL, + 0x12F5A37C734F1F4BL, 0xAB37C12F1FDFC26DL, 0x5648B167395CD0F1L, 0x6C04ED1537BF42A7L, + 0xED97161D14304065L, 0x7D6C67DAAB72B807L, 0xEC17FA87BA4EE83CL, 0xDFAF79CB0304FBC1L, + 0x733F060571BC463EL, 0x78D61C1287E98A27L, 0xD07CF48E77B4ADA1L, 0xB9C262536C90DD26L, + 0xE2449B5860801605L, 0x8FC09AD7F941FCFBL, 0xFAD8CEA94BE46D0EL, 0xA343F28B0608EB9FL, + 0x9B126BD04917347BL, 0x9A92874AE7699C22L, 0x1B017C42C4E69EE0L, 0x3A4C5C720EE39256L, + 0x4B6E9F5E3EA399DAL, 0x6BA353F45AD83D35L, 0xE7FEE0904C1B2425L, 0x22D009832587E95DL, + 0x842980C00F1430E2L, 0xC6B3C0A0861E2893L, 0x087433A419D729F2L, 0x341F3DADD42D6C6FL, + 0xEE0A3FAEFBB2A58EL, 0x4AEE73C490DD3183L, 0xAAB72DB5B1A16A34L, 0xA92A04065E238FDFL, + 0x7B4B35A1686B6FCCL, 0x6A23BF6EF4A6956CL, 0x191CB96B851AD352L, 0x55D598D4D6DE351AL, + 0xC9604DE5F2AE7EF3L, 0x1CA6C2A3A981E172L, 0xDE2F9551AD7A5398L, 0x3025AAFF56C8F616L, + 0x15521D9D1E2860D9L, 0x506FE31CFA45073AL, 0x189C55F12B647B0BL, 0x0180EC9AAE7EA859L, + 0x7CEC8B40050C105EL, 0x2350E5198BF94104L, 0xEF8AD33455CC0DD7L, 0x07A7BEE16D677F92L, + 0xE5E325B90DE76997L, 0x5A061591A26E637AL, 0xB611EF1618208B46L, 0x09F4DF3EB7A981ABL, + 0x1EBB078AE87DACC0L, 0xB791038CB65E231FL, 0x0FD38D4574B05660L, 0x67EDF702C1EA8EBEL, + 0xBA5F4BE0831238CDL, 0xE3C477C2CEFEBE5CL, 0x0DCE486C354C1BD2L, 0x8C5DB36416C31910L, + 0x26EA9ED1A7627324L, 0x039D29B3EF82E5EBL, 0x9F28FC82CBF2AE02L, 0xA8AAE89CF05D2786L, + 0x431AACFA2774B028L, 0xCF471F9E31B7A938L, 0x581BD0B8E3922EC8L, 0xBC78199B400BEF06L, + 0x90FB71C7BF42F862L, 0x1F3BEB1046030499L, 0x683E7A47B55AD8DEL, 0x988F4263A695D190L, + 0xD808C72A6E638453L, 0x0627527BC319D7CBL, 0xEBB04466D72997AEL, 0xE67E0C0AE2658C7CL, + 0x14D2F107B056C880L, 0x7122C32C30400B8CL, 0x8A7AE11FD5DACEDBL, 0xA0DEDB38E98A0E74L, + 0xAD109354DCC615A6L, 0x0BE91A17F655CC19L, 0x8DDD5FFEB8BDB149L, 0xBFE53028AF890AEDL, + 0xD65BA6F5B4AD7A6AL, 0x7956F0882997227EL, 0x10E8665532B352F9L, 0x0E5361DFDACEFE39L, + 0xCEC7F3049FC90161L, 0xFF62B561677F5F2EL, 0x975CCF26D22587F0L, 0x51EF0F86543BAF63L, + 0x2F1E41EF10CBF28FL, 0x52722635BBB94A88L, 0xAE8DBAE73344F04DL, 0x410769D36688FD9AL, + 0xB3AB94DE34BBB966L, 0x801317928DF1AA9BL, 0xA564A0F0C5113C54L, 0xF131D4BEBDB1A117L, + 0x7F71A2F3EA8EF5B5L, 0x40878549C8F655C3L, 0x7EF14E6944F05DECL, 0xD44663DCF55137D8L, + 0xF2ACFD0D523344FCL, 0x0000000000000000L, 0x5FBC6E598EF5515AL, 0x16CF342EF1AA8532L, + 0xB036BD6DDB395C8DL, 0x13754FE6DD31B712L, 0xBBDFA77A2D6C9094L, 0x89E7C8AC3A582B30L, + 0x3C6B0E09CDFA459DL, 0xC4AE0589C7E26521L, 0x49735A777F5FD468L, 0xCAFD64561D2C9B18L, + 0xDA1502032F9FC9E1L, 0x8867243694268369L, 0x3782141E3BAF8984L, 0x9CB5D53124704BE9L, + 0xD7DB4A6F1AD3D233L, 0xA6F989432A93D9BFL, 0x9D3539AB8A0EE3B0L, 0x53F2CAAF15C7E2D1L, + 0x6E19283C76430F15L, 0x3DEBE2936384EDC4L, 0x5E3C82C3208BF903L, 0x33B8834CB94A13FDL, + 0x6470DEB12E686B55L, 0x359FD1377A53C436L, 0x61CAA57902F35975L, 0x043A975282E59A79L, + 0xFD7F70482683129CL, 0xC52EE913699CCD78L, 0x28B9FF0E7DAC8D1DL, 0x5455744E78A09D43L, + 0xCB7D88CCB3523341L, 0x44BD121B4A13CFBAL, 0x4D49CD25FDBA4E11L, 0x3E76CB208C06082FL, + 0x3FF627BA2278A076L, 0xC28957F204FBB2EAL, 0x453DFE81E46D67E3L, 0x94C1E6953DA7621BL, + 0x2C83685CFF491764L, 0xF32C1197FC4DECA5L, 0x2B24D6BD922E68F6L, 0xB22B78449AC5113FL, + 0x48F3B6EDD1217C31L, 0x2E9EAD75BEB55AD6L, 0x174FD8B45FD42D6BL, 0x4ED4E4961238ABFAL, + 0x92E6B4EEFEBEB5D0L, 0x46A0D7320BEF8208L, 0x47203BA8A5912A51L, 0x24F75BF8E69E3E96L, + 0xF0B1382413CF094EL, 0xFEE259FBC901F777L, 0x276A724B091CDB7DL, 0xBDF8F501EE75475FL, + 0x599B3C224DEC8691L, 0x6D84018F99C1EAFEL, 0x7498B8E41CDB39ACL, 0xE0595E71217C5BB7L, + 0x2AA43A273C50C0AFL, 0xF50B43EC3F543B6EL, 0x838E3E2162734F70L, 0xC09492DB4507FF58L, + 0x72BFEA9FDFC2EE67L, 0x11688ACF9CCDFAA0L, 0x1A8190D86A9836B9L, 0x7ACBD93BC615C795L, + 0xC7332C3A286080CAL, 0x863445E94EE87D50L, 0xF6966A5FD0D6DE85L, 0xE9AD814F96D5DA1CL, + 0x70A22FB69E3EA3D5L, 0x0A69F68D582B6440L, 0xB8428EC9C2EE757FL, 0x604A49E3AC8DF12CL, + 0x5B86F90B0C10CB23L, 0xE1D9B2EB8F02F3EEL, 0x29391394D3D22544L, 0xC8E0A17F5CD0D6AAL, + 0xB58CC6A5F7A26EADL, 0x8193FB08238F02C2L, 0xD5C68F465B2F9F81L, 0xFCFF9CD288FDBAC5L, + 0x77059157F359DC47L, 0x1D262E3907FF492BL, 0xFB582233E59AC557L, 0xDDB2BCE242F8B673L, + 0x2577B76248E096CFL, 0x6F99C4A6D83DA74CL, 0xC1147E41EB795701L, 0xF48BAF76912A9337L + }, + new ulong[] { + 0x3EF29D249B2C0A19L, 0xE9E16322B6F8622FL, 0x5536994047757F7AL, 0x9F4D56D5A47B0B33L, + 0x822567466AA1174CL, 0xB8F5057DEB082FB2L, 0xCC48C10BF4475F53L, 0x373088D4275DEC3AL, + 0x968F4325180AED10L, 0x173D232CF7016151L, 0xAE4ED09F946FCC13L, 0xFD4B4741C4539873L, + 0x1B5B3F0DD9933765L, 0x2FFCB0967B644052L, 0xE02376D20A89840CL, 0xA3AE3A70329B18D7L, + 0x419CBD2335DE8526L, 0xFAFEBF115B7C3199L, 0x0397074F85AA9B0DL, 0xC58AD4FB4836B970L, + 0xBEC60BE3FC4104A8L, 0x1EFF36DC4B708772L, 0x131FDC33ED8453B6L, 0x0844E33E341764D3L, + 0x0FF11B6EAB38CD39L, 0x64351F0A7761B85AL, 0x3B5694F509CFBA0EL, 0x30857084B87245D0L, + 0x47AFB3BD2297AE3CL, 0xF2BA5C2F6F6B554AL, 0x74BDC4761F4F70E1L, 0xCFDFC64471EDC45EL, + 0xE610784C1DC0AF16L, 0x7ACA29D63C113F28L, 0x2DED411776A859AFL, 0xAC5F211E99A3D5EEL, + 0xD484F949A87EF33BL, 0x3CE36CA596E013E4L, 0xD120F0983A9D432CL, 0x6BC40464DC597563L, + 0x69D5F5E5D1956C9EL, 0x9AE95F043698BB24L, 0xC9ECC8DA66A4EF44L, 0xD69508C8A5B2EAC6L, + 0xC40C2235C0503B80L, 0x38C193BA8C652103L, 0x1CEEC75D46BC9E8FL, 0xD331011937515AD1L, + 0xD8E2E56886ECA50FL, 0xB137108D5779C991L, 0x709F3B6905CA4206L, 0x4FEB50831680CAEFL, + 0xEC456AF3241BD238L, 0x58D673AFE181ABBEL, 0x242F54E7CAD9BF8CL, 0x0211F1810DCC19FDL, + 0x90BC4DBB0F43C60AL, 0x9518446A9DA0761DL, 0xA1BFCBF13F57012AL, 0x2BDE4F8961E172B5L, + 0x27B853A84F732481L, 0xB0B1E643DF1F4B61L, 0x18CC38425C39AC68L, 0xD2B7F7D7BF37D821L, + 0x3103864A3014C720L, 0x14AA246372ABFA5CL, 0x6E600DB54EBAC574L, 0x394765740403A3F3L, + 0x09C215F0BC71E623L, 0x2A58B947E987F045L, 0x7B4CDF18B477BDD8L, 0x9709B5EB906C6FE0L, + 0x73083C268060D90BL, 0xFEDC400E41F9037EL, 0x284948C6E44BE9B8L, 0x728ECAE808065BFBL, + 0x06330E9E17492B1AL, 0x5950856169E7294EL, 0xBAE4F4FCE6C4364FL, 0xCA7BCF95E30E7449L, + 0x7D7FD186A33E96C2L, 0x52836110D85AD690L, 0x4DFAA1021B4CD312L, 0x913ABB75872544FAL, + 0xDD46ECB9140F1518L, 0x3D659A6B1E869114L, 0xC23F2CABD719109AL, 0xD713FE062DD46836L, + 0xD0A60656B2FBC1DCL, 0x221C5A79DD909496L, 0xEFD26DBCA1B14935L, 0x0E77EDA0235E4FC9L, + 0xCBFD395B6B68F6B9L, 0x0DE0EAEFA6F4D4C4L, 0x0422FF1F1A8532E7L, 0xF969B85EDED6AA94L, + 0x7F6E2007AEF28F3FL, 0x3AD0623B81A938FEL, 0x6624EE8B7AADA1A7L, 0xB682E8DDC856607BL, + 0xA78CC56F281E2A30L, 0xC79B257A45FAA08DL, 0x5B4174E0642B30B3L, 0x5F638BFF7EAE0254L, + 0x4BC9AF9C0C05F808L, 0xCE59308AF98B46AEL, 0x8FC58DA9CC55C388L, 0x803496C7676D0EB1L, + 0xF33CAAE1E70DD7BAL, 0xBB6202326EA2B4BFL, 0xD5020F87201871CBL, 0x9D5CA754A9B712CEL, + 0x841669D87DE83C56L, 0x8A6184785EB6739FL, 0x420BBA6CB0741E2BL, 0xF12D5B60EAC1CE47L, + 0x76AC35F71283691CL, 0x2C6BB7D9FECEDB5FL, 0xFCCDB18F4C351A83L, 0x1F79C012C3160582L, + 0xF0ABADAE62A74CB7L, 0xE1A5801C82EF06FCL, 0x67A21845F2CB2357L, 0x5114665F5DF04D9DL, + 0xBF40FD2D74278658L, 0xA0393D3FB73183DAL, 0x05A409D192E3B017L, 0xA9FB28CF0B4065F9L, + 0x25A9A22942BF3D7CL, 0xDB75E22703463E02L, 0xB326E10C5AB5D06CL, 0xE7968E8295A62DE6L, + 0xB973F3B3636EAD42L, 0xDF571D3819C30CE5L, 0xEE549B7229D7CBC5L, 0x12992AFD65E2D146L, + 0xF8EF4E9056B02864L, 0xB7041E134030E28BL, 0xC02EDD2ADAD50967L, 0x932B4AF48AE95D07L, + 0x6FE6FB7BC6DC4784L, 0x239AACB755F61666L, 0x401A4BEDBDB807D6L, 0x485EA8D389AF6305L, + 0xA41BC220ADB4B13DL, 0x753B32B89729F211L, 0x997E584BB3322029L, 0x1D683193CEDA1C7FL, + 0xFF5AB6C0C99F818EL, 0x16BBD5E27F67E3A1L, 0xA59D34EE25D233CDL, 0x98F8AE853B54A2D9L, + 0x6DF70AFACB105E79L, 0x795D2E99B9BBA425L, 0x8E437B6744334178L, 0x0186F6CE886682F0L, + 0xEBF092A3BB347BD2L, 0xBCD7FA62F18D1D55L, 0xADD9D7D011C5571EL, 0x0BD3E471B1BDFFDEL, + 0xAA6C2F808EEAFEF4L, 0x5EE57D31F6C880A4L, 0xF50FA47FF044FCA0L, 0x1ADDC9C351F5B595L, + 0xEA76646D3352F922L, 0x0000000000000000L, 0x85909F16F58EBEA6L, 0x46294573AAF12CCCL, + 0x0A5512BF39DB7D2EL, 0x78DBD85731DD26D5L, 0x29CFBE086C2D6B48L, 0x218B5D36583A0F9BL, + 0x152CD2ADFACD78ACL, 0x83A39188E2C795BCL, 0xC3B9DA655F7F926AL, 0x9ECBA01B2C1D89C3L, + 0x07B5F8509F2FA9EAL, 0x7EE8D6C926940DCFL, 0x36B67E1AAF3B6ECAL, 0x86079859702425ABL, + 0xFB7849DFD31AB369L, 0x4C7C57CC932A51E2L, 0xD96413A60E8A27FFL, 0x263EA566C715A671L, + 0x6C71FC344376DC89L, 0x4A4F595284637AF8L, 0xDAF314E98B20BCF2L, 0x572768C14AB96687L, + 0x1088DB7C682EC8BBL, 0x887075F9537A6A62L, 0x2E7A4658F302C2A2L, 0x619116DBE582084DL, + 0xA87DDE018326E709L, 0xDCC01A779C6997E8L, 0xEDC39C3DAC7D50C8L, 0xA60A33A1A078A8C0L, + 0xC1A82BE452B38B97L, 0x3F746BEA134A88E9L, 0xA228CCBEBAFD9A27L, 0xABEAD94E068C7C04L, + 0xF48952B178227E50L, 0x5CF48CB0FB049959L, 0x6017E0156DE48ABDL, 0x4438B4F2A73D3531L, + 0x8C528AE649FF5885L, 0xB515EF924DFCFB76L, 0x0C661C212E925634L, 0xB493195CC59A7986L, + 0x9CDA519A21D1903EL, 0x32948105B5BE5C2DL, 0x194ACE8CD45F2E98L, 0x438D4CA238129CDBL, + 0x9B6FA9CABEFE39D4L, 0x81B26009EF0B8C41L, 0xDED1EBF691A58E15L, 0x4E6DA64D9EE6481FL, + 0x54B06F8ECF13FD8AL, 0x49D85E1D01C9E1F5L, 0xAFC826511C094EE3L, 0xF698A33075EE67ADL, + 0x5AC7822EEC4DB243L, 0x8DD47C28C199DA75L, 0x89F68337DB1CE892L, 0xCDCE37C57C21DDA3L, + 0x530597DE503C5460L, 0x6A42F2AA543FF793L, 0x5D727A7E73621BA9L, 0xE232875307459DF1L, + 0x56A19E0FC2DFE477L, 0xC61DD3B4CD9C227DL, 0xE5877F03986A341BL, 0x949EB2A415C6F4EDL, + 0x6206119460289340L, 0x6380E75AE84E11B0L, 0x8BE772B6D6D0F16FL, 0x50929091D596CF6DL, + 0xE86795EC3E9EE0DFL, 0x7CF927482B581432L, 0xC86A3E14EEC26DB4L, 0x7119CDA78DACC0F6L, + 0xE40189CD100CB6EBL, 0x92ADBC3A028FDFF7L, 0xB2A017C2D2D3529CL, 0x200DABF8D05C8D6BL, + 0x34A78F9BA2F77737L, 0xE3B4719D8F231F01L, 0x45BE423C2F5BB7C1L, 0xF71E55FEFD88E55DL, + 0x6853032B59F3EE6EL, 0x65B3E9C4FF073AAAL, 0x772AC3399AE5EBECL, 0x87816E97F842A75BL, + 0x110E2DB2E0484A4BL, 0x331277CB3DD8DEDDL, 0xBD510CAC79EB9FA5L, 0x352179552A91F5C7L + }, + new ulong[] { + 0x8AB0A96846E06A6DL, 0x43C7E80B4BF0B33AL, 0x08C9B3546B161EE5L, 0x39F1C235EBA990BEL, + 0xC1BEF2376606C7B2L, 0x2C209233614569AAL, 0xEB01523B6FC3289AL, 0x946953AB935ACEDDL, + 0x272838F63E13340EL, 0x8B0455ECA12BA052L, 0x77A1B2C4978FF8A2L, 0xA55122CA13E54086L, + 0x2276135862D3F1CDL, 0xDB8DDFDE08B76CFEL, 0x5D1E12C89E4A178AL, 0x0E56816B03969867L, + 0xEE5F79953303ED59L, 0xAFED748BAB78D71DL, 0x6D929F2DF93E53EEL, 0xF5D8A8F8BA798C2AL, + 0xF619B1698E39CF6BL, 0x95DDAF2F749104E2L, 0xEC2A9C80E0886427L, 0xCE5C8FD8825B95EAL, + 0xC4E0D9993AC60271L, 0x4699C3A5173076F9L, 0x3D1B151F50A29F42L, 0x9ED505EA2BC75946L, + 0x34665ACFDC7F4B98L, 0x61B1FB53292342F7L, 0xC721C0080E864130L, 0x8693CD1696FD7B74L, + 0x872731927136B14BL, 0xD3446C8A63A1721BL, 0x669A35E8A6680E4AL, 0xCAB658F239509A16L, + 0xA4E5DE4EF42E8AB9L, 0x37A7435EE83F08D9L, 0x134E6239E26C7F96L, 0x82791A3C2DF67488L, + 0x3F6EF00A8329163CL, 0x8E5A7E42FDEB6591L, 0x5CAAEE4C7981DDB5L, 0x19F234785AF1E80DL, + 0x255DDDE3ED98BD70L, 0x50898A32A99CCCACL, 0x28CA4519DA4E6656L, 0xAE59880F4CB31D22L, + 0x0D9798FA37D6DB26L, 0x32F968F0B4FFCD1AL, 0xA00F09644F258545L, 0xFA3AD5175E24DE72L, + 0xF46C547C5DB24615L, 0x713E80FBFF0F7E20L, 0x7843CF2B73D2AAFAL, 0xBD17EA36AEDF62B4L, + 0xFD111BACD16F92CFL, 0x4ABAA7DBC72D67E0L, 0xB3416B5DAD49FAD3L, 0xBCA316B24914A88BL, + 0x15D150068AECF914L, 0xE27C1DEBE31EFC40L, 0x4FE48C759BEDA223L, 0x7EDCFD141B522C78L, + 0x4E5070F17C26681CL, 0xE696CAC15815F3BCL, 0x35D2A64B3BB481A7L, 0x800CFF29FE7DFDF6L, + 0x1ED9FAC3D5BAA4B0L, 0x6C2663A91EF599D1L, 0x03C1199134404341L, 0xF7AD4DED69F20554L, + 0xCD9D9649B61BD6ABL, 0xC8C3BDE7EADB1368L, 0xD131899FB02AFB65L, 0x1D18E352E1FAE7F1L, + 0xDA39235AEF7CA6C1L, 0xA1BBF5E0A8EE4F7AL, 0x91377805CF9A0B1EL, 0x3138716180BF8E5BL, + 0xD9F83ACBDB3CE580L, 0x0275E515D38B897EL, 0x472D3F21F0FBBCC6L, 0x2D946EB7868EA395L, + 0xBA3C248D21942E09L, 0xE7223645BFDE3983L, 0xFF64FEB902E41BB1L, 0xC97741630D10D957L, + 0xC3CB1722B58D4ECCL, 0xA27AEC719CAE0C3BL, 0x99FECB51A48C15FBL, 0x1465AC826D27332BL, + 0xE1BD047AD75EBF01L, 0x79F733AF941960C5L, 0x672EC96C41A3C475L, 0xC27FEBA6524684F3L, + 0x64EFD0FD75E38734L, 0xED9E60040743AE18L, 0xFB8E2993B9EF144DL, 0x38453EB10C625A81L, + 0x6978480742355C12L, 0x48CF42CE14A6EE9EL, 0x1CAC1FD606312DCEL, 0x7B82D6BA4792E9BBL, + 0x9D141C7B1F871A07L, 0x5616B80DC11C4A2EL, 0xB849C198F21FA777L, 0x7CA91801C8D9A506L, + 0xB1348E487EC273ADL, 0x41B20D1E987B3A44L, 0x7460AB55A3CFBBE3L, 0x84E628034576F20AL, + 0x1B87D16D897A6173L, 0x0FE27DEFE45D5258L, 0x83CDE6B8CA3DBEB7L, 0x0C23647ED01D1119L, + 0x7A362A3EA0592384L, 0xB61F40F3F1893F10L, 0x75D457D1440471DCL, 0x4558DA34237035B8L, + 0xDCA6116587FC2043L, 0x8D9B67D3C9AB26D0L, 0x2B0B5C88EE0E2517L, 0x6FE77A382AB5DA90L, + 0x269CC472D9D8FE31L, 0x63C41E46FAA8CB89L, 0xB7ABBC771642F52FL, 0x7D1DE4852F126F39L, + 0xA8C6BA3024339BA0L, 0x600507D7CEE888C8L, 0x8FEE82C61A20AFAEL, 0x57A2448926D78011L, + 0xFCA5E72836A458F0L, 0x072BCEBB8F4B4CBDL, 0x497BBE4AF36D24A1L, 0x3CAFE99BB769557DL, + 0x12FA9EBD05A7B5A9L, 0xE8C04BAA5B836BDBL, 0x4273148FAC3B7905L, 0x908384812851C121L, + 0xE557D3506C55B0FDL, 0x72FF996ACB4F3D61L, 0x3EDA0C8E64E2DC03L, 0xF0868356E6B949E9L, + 0x04EAD72ABB0B0FFCL, 0x17A4B5135967706AL, 0xE3C8E16F04D5367FL, 0xF84F30028DAF570CL, + 0x1846C8FCBD3A2232L, 0x5B8120F7F6CA9108L, 0xD46FA231ECEA3EA6L, 0x334D947453340725L, + 0x58403966C28AD249L, 0xBED6F3A79A9F21F5L, 0x68CCB483A5FE962DL, 0xD085751B57E1315AL, + 0xFED0023DE52FD18EL, 0x4B0E5B5F20E6ADDFL, 0x1A332DE96EB1AB4CL, 0xA3CE10F57B65C604L, + 0x108F7BA8D62C3CD7L, 0xAB07A3A11073D8E1L, 0x6B0DAD1291BED56CL, 0xF2F366433532C097L, + 0x2E557726B2CEE0D4L, 0x0000000000000000L, 0xCB02A476DE9B5029L, 0xE4E32FD48B9E7AC2L, + 0x734B65EE2C84F75EL, 0x6E5386BCCD7E10AFL, 0x01B4FC84E7CBCA3FL, 0xCFE8735C65905FD5L, + 0x3613BFDA0FF4C2E6L, 0x113B872C31E7F6E8L, 0x2FE18BA255052AEBL, 0xE974B72EBC48A1E4L, + 0x0ABC5641B89D979BL, 0xB46AA5E62202B66EL, 0x44EC26B0C4BBFF87L, 0xA6903B5B27A503C7L, + 0x7F680190FC99E647L, 0x97A84A3AA71A8D9CL, 0xDD12EDE16037EA7CL, 0xC554251DDD0DC84EL, + 0x88C54C7D956BE313L, 0x4D91696048662B5DL, 0xB08072CC9909B992L, 0xB5DE5962C5C97C51L, + 0x81B803AD19B637C9L, 0xB2F597D94A8230ECL, 0x0B08AAC55F565DA4L, 0xF1327FD2017283D6L, + 0xAD98919E78F35E63L, 0x6AB9519676751F53L, 0x24E921670A53774FL, 0xB9FD3D1C15D46D48L, + 0x92F66194FBDA485FL, 0x5A35DC7311015B37L, 0xDED3F4705477A93DL, 0xC00A0EB381CD0D8DL, + 0xBB88D809C65FE436L, 0x16104997BEACBA55L, 0x21B70AC95693B28CL, 0x59F4C5E225411876L, + 0xD5DB5EB50B21F499L, 0x55D7A19CF55C096FL, 0xA97246B4C3F8519FL, 0x8552D487A2BD3835L, + 0x54635D181297C350L, 0x23C2EFDC85183BF2L, 0x9F61F96ECC0C9379L, 0x534893A39DDC8FEDL, + 0x5EDF0B59AA0A54CBL, 0xAC2C6D1A9F38945CL, 0xD7AEBBA0D8AA7DE7L, 0x2ABFA00C09C5EF28L, + 0xD84CC64F3CF72FBFL, 0x2003F64DB15878B3L, 0xA724C7DFC06EC9F8L, 0x069F323F68808682L, + 0xCC296ACD51D01C94L, 0x055E2BAE5CC0C5C3L, 0x6270E2C21D6301B6L, 0x3B842720382219C0L, + 0xD2F0900E846AB824L, 0x52FC6F277A1745D2L, 0xC6953C8CE94D8B0FL, 0xE009F8FE3095753EL, + 0x655B2C7992284D0BL, 0x984A37D54347DFC4L, 0xEAB5AEBF8808E2A5L, 0x9A3FD2C090CC56BAL, + 0x9CA0E0FFF84CD038L, 0x4C2595E4AFADE162L, 0xDF6708F4B3BC6302L, 0xBF620F237D54EBCAL, + 0x93429D101C118260L, 0x097D4FD08CDDD4DAL, 0x8C2F9B572E60ECEFL, 0x708A7C7F18C4B41FL, + 0x3A30DBA4DFE9D3FFL, 0x4006F19A7FB0F07BL, 0x5F6BF7DD4DC19EF4L, 0x1F6D064732716E8FL, + 0xF9FBCC866A649D33L, 0x308C8DE567744464L, 0x8971B0F972A0292CL, 0xD61A47243F61B7D8L, + 0xEFEB8511D4C82766L, 0x961CB6BE40D147A3L, 0xAAB35F25F7B812DEL, 0x76154E407044329DL, + 0x513D76B64E570693L, 0xF3479AC7D2F90AA8L, 0x9B8B2E4477079C85L, 0x297EB99D3D85AC69L + }, + new ulong[] { + 0x7E37E62DFC7D40C3L, 0x776F25A4EE939E5BL, 0xE045C850DD8FB5ADL, 0x86ED5BA711FF1952L, + 0xE91D0BD9CF616B35L, 0x37E0AB256E408FFBL, 0x9607F6C031025A7AL, 0x0B02F5E116D23C9DL, + 0xF3D8486BFB50650CL, 0x621CFF27C40875F5L, 0x7D40CB71FA5FD34AL, 0x6DAA6616DAA29062L, + 0x9F5F354923EC84E2L, 0xEC847C3DC507C3B3L, 0x025A3668043CE205L, 0xA8BF9E6C4DAC0B19L, + 0xFA808BE2E9BEBB94L, 0xB5B99C5277C74FA3L, 0x78D9BC95F0397BCCL, 0xE332E50CDBAD2624L, + 0xC74FCE129332797EL, 0x1729ECEB2EA709ABL, 0xC2D6B9F69954D1F8L, 0x5D898CBFBAB8551AL, + 0x859A76FB17DD8ADBL, 0x1BE85886362F7FB5L, 0xF6413F8FF136CD8AL, 0xD3110FA5BBB7E35CL, + 0x0A2FEED514CC4D11L, 0xE83010EDCD7F1AB9L, 0xA1E75DE55F42D581L, 0xEEDE4A55C13B21B6L, + 0xF2F5535FF94E1480L, 0x0CC1B46D1888761EL, 0xBCE15FDB6529913BL, 0x2D25E8975A7181C2L, + 0x71817F1CE2D7A554L, 0x2E52C5CB5C53124BL, 0xF9F7A6BEEF9C281DL, 0x9E722E7D21F2F56EL, + 0xCE170D9B81DCA7E6L, 0x0E9B82051CB4941BL, 0x1E712F623C49D733L, 0x21E45CFA42F9F7DCL, + 0xCB8E7A7F8BBA0F60L, 0x8E98831A010FB646L, 0x474CCF0D8E895B23L, 0xA99285584FB27A95L, + 0x8CC2B57205335443L, 0x42D5B8E984EFF3A5L, 0x012D1B34021E718CL, 0x57A6626AAE74180BL, + 0xFF19FC06E3D81312L, 0x35BA9D4D6A7C6DFEL, 0xC9D44C178F86ED65L, 0x506523E6A02E5288L, + 0x03772D5C06229389L, 0x8B01F4FE0B691EC0L, 0xF8DABD8AED825991L, 0x4C4E3AEC985B67BEL, + 0xB10DF0827FBF96A9L, 0x6A69279AD4F8DAE1L, 0xE78689DCD3D5FF2EL, 0x812E1A2B1FA553D1L, + 0xFBAD90D6EBA0CA18L, 0x1AC543B234310E39L, 0x1604F7DF2CB97827L, 0xA6241C6951189F02L, + 0x753513CCEAAF7C5EL, 0x64F2A59FC84C4EFAL, 0x247D2B1E489F5F5AL, 0xDB64D718AB474C48L, + 0x79F4A7A1F2270A40L, 0x1573DA832A9BEBAEL, 0x3497867968621C72L, 0x514838D2A2302304L, + 0xF0AF6537FD72F685L, 0x1D06023E3A6B44BAL, 0x678588C3CE6EDD73L, 0x66A893F7CC70ACFFL, + 0xD4D24E29B5EDA9DFL, 0x3856321470EA6A6CL, 0x07C3418C0E5A4A83L, 0x2BCBB22F5635BACDL, + 0x04B46CD00878D90AL, 0x06EE5AB80C443B0FL, 0x3B211F4876C8F9E5L, 0x0958C38912EEDE98L, + 0xD14B39CDBF8B0159L, 0x397B292072F41BE0L, 0x87C0409313E168DEL, 0xAD26E98847CAA39FL, + 0x4E140C849C6785BBL, 0xD5FF551DB7F3D853L, 0xA0CA46D15D5CA40DL, 0xCD6020C787FE346FL, + 0x84B76DCF15C3FB57L, 0xDEFDA0FCA121E4CEL, 0x4B8D7B6096012D3DL, 0x9AC642AD298A2C64L, + 0x0875D8BD10F0AF14L, 0xB357C6EA7B8374ACL, 0x4D6321D89A451632L, 0xEDA96709C719B23FL, + 0xF76C24BBF328BC06L, 0xC662D526912C08F2L, 0x3CE25EC47892B366L, 0xB978283F6F4F39BDL, + 0xC08C8F9E9D6833FDL, 0x4F3917B09E79F437L, 0x593DE06FB2C08C10L, 0xD6887841B1D14BDAL, + 0x19B26EEE32139DB0L, 0xB494876675D93E2FL, 0x825937771987C058L, 0x90E9AC783D466175L, + 0xF1827E03FF6C8709L, 0x945DC0A8353EB87FL, 0x4516F9658AB5B926L, 0x3F9573987EB020EFL, + 0xB855330B6D514831L, 0x2AE6A91B542BCB41L, 0x6331E413C6160479L, 0x408F8E8180D311A0L, + 0xEFF35161C325503AL, 0xD06622F9BD9570D5L, 0x8876D9A20D4B8D49L, 0xA5533135573A0C8BL, + 0xE168D364DF91C421L, 0xF41B09E7F50A2F8FL, 0x12B09B0F24C1A12DL, 0xDA49CC2CA9593DC4L, + 0x1F5C34563E57A6BFL, 0x54D14F36A8568B82L, 0xAF7CDFE043F6419AL, 0xEA6A2685C943F8BCL, + 0xE5DCBFB4D7E91D2BL, 0xB27ADDDE799D0520L, 0x6B443CAED6E6AB6DL, 0x7BAE91C9F61BE845L, + 0x3EB868AC7CAE5163L, 0x11C7B65322E332A4L, 0xD23C1491B9A992D0L, 0x8FB5982E0311C7CAL, + 0x70AC6428E0C9D4D8L, 0x895BC2960F55FCC5L, 0x76423E90EC8DEFD7L, 0x6FF0507EDE9E7267L, + 0x3DCF45F07A8CC2EAL, 0x4AA06054941F5CB1L, 0x5810FB5BB0DEFD9CL, 0x5EFEA1E3BC9AC693L, + 0x6EDD4B4ADC8003EBL, 0x741808F8E8B10DD2L, 0x145EC1B728859A22L, 0x28BC9F7350172944L, + 0x270A06424EBDCCD3L, 0x972AEDF4331C2BF6L, 0x059977E40A66A886L, 0x2550302A4A812ED6L, + 0xDD8A8DA0A7037747L, 0xC515F87A970E9B7BL, 0x3023EAA9601AC578L, 0xB7E3AA3A73FBADA6L, + 0x0FB699311EAAE597L, 0x0000000000000000L, 0x310EF19D6204B4F4L, 0x229371A644DB6455L, + 0x0DECAF591A960792L, 0x5CA4978BB8A62496L, 0x1C2B190A38753536L, 0x41A295B582CD602CL, + 0x3279DCC16426277DL, 0xC1A194AA9F764271L, 0x139D803B26DFD0A1L, 0xAE51C4D441E83016L, + 0xD813FA44AD65DFC1L, 0xAC0BF2BC45D4D213L, 0x23BE6A9246C515D9L, 0x49D74D08923DCF38L, + 0x9D05032127D066E7L, 0x2F7FDEFF5E4D63C7L, 0xA47E2A0155247D07L, 0x99B16FF12FA8BFEDL, + 0x4661D4398C972AAFL, 0xDFD0BBC8A33F9542L, 0xDCA79694A51D06CBL, 0xB020EBB67DA1E725L, + 0xBA0F0563696DAA34L, 0xE4F1A480D5F76CA7L, 0xC438E34E9510EAF7L, 0x939E81243B64F2FCL, + 0x8DEFAE46072D25CFL, 0x2C08F3A3586FF04EL, 0xD7A56375B3CF3A56L, 0x20C947CE40E78650L, + 0x43F8A3DD86F18229L, 0x568B795EAC6A6987L, 0x8003011F1DBB225DL, 0xF53612D3F7145E03L, + 0x189F75DA300DEC3CL, 0x9570DB9C3720C9F3L, 0xBB221E576B73DBB8L, 0x72F65240E4F536DDL, + 0x443BE25188ABC8AAL, 0xE21FFE38D9B357A8L, 0xFD43CA6EE7E4F117L, 0xCAA3614B89A47EECL, + 0xFE34E732E1C6629EL, 0x83742C431B99B1D4L, 0xCF3A16AF83C2D66AL, 0xAAE5A8044990E91CL, + 0x26271D764CA3BD5FL, 0x91C4B74C3F5810F9L, 0x7C6DD045F841A2C6L, 0x7F1AFD19FE63314FL, + 0xC8F957238D989CE9L, 0xA709075D5306EE8EL, 0x55FC5402AA48FA0EL, 0x48FA563C9023BEB4L, + 0x65DFBEABCA523F76L, 0x6C877D22D8BCE1EEL, 0xCC4D3BF385E045E3L, 0xBEBB69B36115733EL, + 0x10EAAD6720FD4328L, 0xB6CEB10E71E5DC2AL, 0xBDCC44EF6737E0B7L, 0x523F158EA412B08DL, + 0x989C74C52DB6CE61L, 0x9BEB59992B945DE8L, 0x8A2CEFCA09776F4CL, 0xA3BD6B8D5B7E3784L, + 0xEB473DB1CB5D8930L, 0xC3FBA2C29B4AA074L, 0x9C28181525CE176BL, 0x683311F2D0C438E4L, + 0x5FD3BAD7BE84B71FL, 0xFC6ED15AE5FA809BL, 0x36CDB0116C5EFE77L, 0x29918447520958C8L, + 0xA29070B959604608L, 0x53120EBAA60CC101L, 0x3A0C047C74D68869L, 0x691E0AC6D2DA4968L, + 0x73DB4974E6EB4751L, 0x7A838AFDF40599C9L, 0x5A4ACD33B4E21F99L, 0x6046C94FC03497F0L, + 0xE6AB92E8D1CB8EA2L, 0x3354C7F5663856F1L, 0xD93EE170AF7BAE4DL, 0x616BD27BC22AE67CL, + 0x92B39A10397A8370L, 0xABC8B3304B8E9890L, 0xBF967287630B02B2L, 0x5B67D607B6FC6E15L + }, + new ulong[] { + 0xD031C397CE553FE6L, 0x16BA5B01B006B525L, 0xA89BADE6296E70C8L, 0x6A1F525D77D3435BL, + 0x6E103570573DFA0BL, 0x660EFB2A17FC95ABL, 0x76327A9E97634BF6L, 0x4BAD9D6462458BF5L, + 0xF1830CAEDBC3F748L, 0xC5C8F542669131FFL, 0x95044A1CDC48B0CBL, 0x892962DF3CF8B866L, + 0xB0B9E208E930C135L, 0xA14FB3F0611A767CL, 0x8D2605F21C160136L, 0xD6B71922FECC549EL, + 0x37089438A5907D8BL, 0x0B5DA38E5803D49CL, 0x5A5BCC9CEA6F3CBCL, 0xEDAE246D3B73FFE5L, + 0xD2B87E0FDE22EDCEL, 0x5E54ABB1CA8185ECL, 0x1DE7F88FE80561B9L, 0xAD5E1A870135A08CL, + 0x2F2ADBD665CECC76L, 0x5780B5A782F58358L, 0x3EDC8A2EEDE47B3FL, 0xC9D95C3506BEE70FL, + 0x83BE111D6C4E05EEL, 0xA603B90959367410L, 0x103C81B4809FDE5DL, 0x2C69B6027D0C774AL, + 0x399080D7D5C87953L, 0x09D41E16487406B4L, 0xCDD63B1826505E5FL, 0xF99DC2F49B0298E8L, + 0x9CD0540A943CB67FL, 0xBCA84B7F891F17C5L, 0x723D1DB3B78DF2A6L, 0x78AA6E71E73B4F2EL, + 0x1433E699A071670DL, 0x84F21BE454620782L, 0x98DF3327B4D20F2FL, 0xF049DCE2D3769E5CL, + 0xDB6C60199656EB7AL, 0x648746B2078B4783L, 0x32CD23598DCBADCFL, 0x1EA4955BF0C7DA85L, + 0xE9A143401B9D46B5L, 0xFD92A5D9BBEC21B8L, 0xC8138C790E0B8E1BL, 0x2EE00B9A6D7BA562L, + 0xF85712B893B7F1FCL, 0xEB28FED80BEA949DL, 0x564A65EB8A40EA4CL, 0x6C9988E8474A2823L, + 0x4535898B121D8F2DL, 0xABD8C03231ACCBF4L, 0xBA2E91CAB9867CBDL, 0x7960BE3DEF8E263AL, + 0x0C11A977602FD6F0L, 0xCB50E1AD16C93527L, 0xEAE22E94035FFD89L, 0x2866D12F5DE2CE1AL, + 0xFF1B1841AB9BF390L, 0x9F9339DE8CFE0D43L, 0x964727C8C48A0BF7L, 0x524502C6AAAE531CL, + 0x9B9C5EF3AC10B413L, 0x4FA2FA4942AB32A5L, 0x3F165A62E551122BL, 0xC74148DA76E6E3D7L, + 0x924840E5E464B2A7L, 0xD372AE43D69784DAL, 0x233B72A105E11A86L, 0xA48A04914941A638L, + 0xB4B68525C9DE7865L, 0xDDEABAACA6CF8002L, 0x0A9773C250B6BD88L, 0xC284FFBB5EBD3393L, + 0x8BA0DF472C8F6A4EL, 0x2AEF6CB74D951C32L, 0x427983722A318D41L, 0x73F7CDFFBF389BB2L, + 0x074C0AF9382C026CL, 0x8A6A0F0B243A035AL, 0x6FDAE53C5F88931FL, 0xC68B98967E538AC3L, + 0x44FF59C71AA8E639L, 0xE2FCE0CE439E9229L, 0xA20CDE2479D8CD40L, 0x19E89FA2C8EBD8E9L, + 0xF446BBCFF398270CL, 0x43B3533E2284E455L, 0xD82F0DCD8E945046L, 0x51066F12B26CE820L, + 0xE73957AF6BC5426DL, 0x081ECE5A40C16FA0L, 0x3B193D4FC5BFAB7BL, 0x7FE66488DF174D42L, + 0x0E9814EF705804D8L, 0x8137AC857C39D7C6L, 0xB1733244E185A821L, 0x695C3F896F11F867L, + 0xF6CF0657E3EFF524L, 0x1AABF276D02963D5L, 0x2DA3664E75B91E5EL, 0x0289BD981077D228L, + 0x90C1FD7DF413608FL, 0x3C5537B6FD93A917L, 0xAA12107E3919A2E0L, 0x0686DAB530996B78L, + 0xDAA6B0559EE3826EL, 0xC34E2FF756085A87L, 0x6D5358A44FFF4137L, 0xFC587595B35948ACL, + 0x7CA5095CC7D5F67EL, 0xFB147F6C8B754AC0L, 0xBFEB26AB91DDACF9L, 0x6896EFC567A49173L, + 0xCA9A31E11E7C5C33L, 0xBBE44186B13315A9L, 0x0DDB793B689ABFE4L, 0x70B4A02BA7FA208EL, + 0xE47A3A7B7307F951L, 0x8CECD5BE14A36822L, 0xEEED49B923B144D9L, 0x17708B4DB8B3DC31L, + 0x6088219F2765FED3L, 0xB3FA8FDCF1F27A09L, 0x910B2D31FCA6099BL, 0x0F52C4A378ED6DCCL, + 0x50CCBF5EBAD98134L, 0x6BD582117F662A4FL, 0x94CE9A50D4FDD9DFL, 0x2B25BCFB45207526L, + 0x67C42B661F49FCBFL, 0x492420FC723259DDL, 0x03436DD418C2BB3CL, 0x1F6E4517F872B391L, + 0xA08563BC69AF1F68L, 0xD43EA4BAEEBB86B6L, 0x01CAD04C08B56914L, 0xAC94CACB0980C998L, + 0x54C3D8739A373864L, 0x26FEC5C02DBACAC2L, 0xDEA9D778BE0D3B3EL, 0x040F672D20EEB950L, + 0xE5B0EA377BB29045L, 0xF30AB136CBB42560L, 0x62019C0737122CFBL, 0xE86B930C13282FA1L, + 0xCC1CEB542EE5374BL, 0x538FD28AA21B3A08L, 0x1B61223AD89C0AC1L, 0x36C24474AD25149FL, + 0x7A23D3E9F74C9D06L, 0xBE21F6E79968C5EDL, 0xCF5F868036278C77L, 0xF705D61BEB5A9C30L, + 0x4D2B47D152DCE08DL, 0x5F9E7BFDC234ECF8L, 0x247778583DCD18EAL, 0x867BA67C4415D5AAL, + 0x4CE1979D5A698999L, 0x0000000000000000L, 0xEC64F42133C696F1L, 0xB57C5569C16B1171L, + 0xC1C7926F467F88AFL, 0x654D96FE0F3E2E97L, 0x15F936D5A8C40E19L, 0xB8A72C52A9F1AE95L, + 0xA9517DAA21DB19DCL, 0x58D27104FA18EE94L, 0x5918A148F2AD8780L, 0x5CDD1629DAF657C4L, + 0x8274C15164FB6CFAL, 0xD1FB13DBC6E056F2L, 0x7D6FD910CF609F6AL, 0xB63F38BDD9A9AA4DL, + 0x3D9FE7FAF526C003L, 0x74BBC706871499DEL, 0xDF630734B6B8522AL, 0x3AD3ED03CD0AC26FL, + 0xFADEAF2083C023D4L, 0xC00D42234ECAE1BBL, 0x8538CBA85CD76E96L, 0xC402250E6E2458EBL, + 0x47BC3413026A5D05L, 0xAFD7A71F114272A4L, 0x978DF784CC3F62E3L, 0xB96DFC1EA144C781L, + 0x21B2CF391596C8AEL, 0x318E4E8D950916F3L, 0xCE9556CC3E92E563L, 0x385A509BDD7D1047L, + 0x358129A0B5E7AFA3L, 0xE6F387E363702B79L, 0xE0755D5653E94001L, 0x7BE903A5FFF9F412L, + 0x12B53C2C90E80C75L, 0x3307F315857EC4DBL, 0x8FAFB86A0C61D31EL, 0xD9E5DD8186213952L, + 0x77F8AAD29FD622E2L, 0x25BDA814357871FEL, 0x7571174A8FA1F0CAL, 0x137FEC60985D6561L, + 0x30449EC19DBC7FE7L, 0xA540D4DD41F4CF2CL, 0xDC206AE0AE7AE916L, 0x5B911CD0E2DA55A8L, + 0xB2305F90F947131DL, 0x344BF9ECBD52C6B7L, 0x5D17C665D2433ED0L, 0x18224FEEC05EB1FDL, + 0x9E59E992844B6457L, 0x9A568EBFA4A5DD07L, 0xA3C60E68716DA454L, 0x7E2CB4C4D7A22456L, + 0x87B176304CA0BCBEL, 0x413AEEA632F3367DL, 0x9915E36BBC67663BL, 0x40F03EEA3A465F69L, + 0x1C2D28C3E0B008ADL, 0x4E682A054A1E5BB1L, 0x05C5B761285BD044L, 0xE1BF8D1A5B5C2915L, + 0xF2C0617AC3014C74L, 0xB7F5E8F1D11CC359L, 0x63CB4C4B3FA745EFL, 0x9D1A84469C89DF6BL, + 0xE33630824B2BFB3DL, 0xD5F474F6E60EEFA2L, 0xF58C6B83FB2D4E18L, 0x4676E45F0ADF3411L, + 0x20781F751D23A1BAL, 0xBD629B3381AA7ED1L, 0xAE1D775319F71BB0L, 0xFED1C80DA32E9A84L, + 0x5509083F92825170L, 0x29AC01635557A70EL, 0xA7C9694551831D04L, 0x8E65682604D4BA0AL, + 0x11F651F8882AB749L, 0xD77DC96EF6793D8AL, 0xEF2799F52B042DCDL, 0x48EEF0B07A8730C9L, + 0x22F1A2ED0D547392L, 0x6142F1D32FD097C7L, 0x4A674D286AF0E2E1L, 0x80FD7CC9748CBED2L, + 0x717E7067AF4F499AL, 0x938290A9ECD1DBB3L, 0x88E3B293344DD172L, 0x2734158C250FA3D6L + } + }; + + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs.meta new file mode 100644 index 00000000..9451c321 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 62002e4c2dd254b47978d794ba626c57 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs new file mode 100644 index 00000000..6175f05e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public class Gost3411_2012_256Digest : Gost3411_2012Digest + { + private readonly static byte[] IV = { + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, + 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 + }; + + public override string AlgorithmName + { + get { return "GOST3411-2012-256"; } + } + + public Gost3411_2012_256Digest() : base(IV) + { + + } + + public Gost3411_2012_256Digest(Gost3411_2012_256Digest other) : base(IV) + { + Reset(other); + } + + public override int GetDigestSize() + { + return 32; + } + + public override int DoFinal(byte[] output, int outOff) + { + byte[] result = new byte[64]; + base.DoFinal(result, 0); + + Array.Copy(result, 32, output, outOff, 32); + + return 32; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Span result = stackalloc byte[64]; + base.DoFinal(result); + + result[32..].CopyTo(output); + + return 32; + } +#endif + + public override IMemoable Copy() + { + return new Gost3411_2012_256Digest(this); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs.meta new file mode 100644 index 00000000..85f7720e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 165295a43c0dbb04cb991fcdb8bf4046 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_256Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs new file mode 100644 index 00000000..38946859 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public class Gost3411_2012_512Digest:Gost3411_2012Digest + { + private readonly static byte[] IV = { + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 + }; + + public override string AlgorithmName + { + get { return "GOST3411-2012-512"; } + } + + public Gost3411_2012_512Digest():base(IV) + { + } + + public Gost3411_2012_512Digest(Gost3411_2012_512Digest other) : base(IV) + { + Reset(other); + } + + public override int GetDigestSize() + { + return 64; + } + + public override IMemoable Copy() + { + return new Gost3411_2012_512Digest(this); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs.meta new file mode 100644 index 00000000..9073be05 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa737713c49092a45894db5f7cf32869 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GOST3411_2012_512Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs new file mode 100644 index 00000000..d2c885e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * base implementation of MD4 family style digest as outlined in + * "Handbook of Applied Cryptography", pages 344 - 347. + */ + public abstract class GeneralDigest + : IDigest, IMemoable + { + private const int BYTE_LENGTH = 64; + + private byte[] xBuf; + private int xBufOff; + + private long byteCount; + + internal GeneralDigest() + { + xBuf = new byte[4]; + } + + internal GeneralDigest(GeneralDigest t) + { + xBuf = new byte[t.xBuf.Length]; + CopyIn(t); + } + + protected void CopyIn(GeneralDigest t) + { + Array.Copy(t.xBuf, 0, xBuf, 0, t.xBuf.Length); + + xBufOff = t.xBufOff; + byteCount = t.byteCount; + } + + public void Update(byte input) + { + xBuf[xBufOff++] = input; + + if (xBufOff == xBuf.Length) + { + ProcessWord(xBuf, 0); + xBufOff = 0; + } + + byteCount++; + } + + public void BlockUpdate( + byte[] input, + int inOff, + int length) + { + length = System.Math.Max(0, length); + + // + // fill the current word + // + int i = 0; + if (xBufOff != 0) + { + while (i < length) + { + xBuf[xBufOff++] = input[inOff + i++]; + if (xBufOff == 4) + { + ProcessWord(xBuf, 0); + xBufOff = 0; + break; + } + } + } + + // + // process whole words. + // + int limit = length - 3; + for (; i < limit; i += 4) + { + ProcessWord(input, inOff + i); + } + + // + // load in the remainder. + // + while (i < length) + { + xBuf[xBufOff++] = input[inOff + i++]; + } + + byteCount += length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int length = input.Length; + + // + // fill the current word + // + int i = 0; + if (xBufOff != 0) + { + while (i < length) + { + xBuf[xBufOff++] = input[i++]; + if (xBufOff == 4) + { + ProcessWord(xBuf, 0); + xBufOff = 0; + break; + } + } + } + + // + // process whole words. + // + int limit = length - 3; + for (; i < limit; i += 4) + { + ProcessWord(input.Slice(i, 4)); + } + + // + // load in the remainder. + // + while (i < length) + { + xBuf[xBufOff++] = input[i++]; + } + + byteCount += length; + } +#endif + + public void Finish() + { + long bitLength = (byteCount << 3); + + // + // add the pad bytes. + // + Update((byte)128); + + while (xBufOff != 0) Update((byte)0); + ProcessLength(bitLength); + ProcessBlock(); + } + + public virtual void Reset() + { + byteCount = 0; + xBufOff = 0; + Array.Clear(xBuf, 0, xBuf.Length); + } + + public int GetByteLength() + { + return BYTE_LENGTH; + } + + internal abstract void ProcessWord(byte[] input, int inOff); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal abstract void ProcessWord(ReadOnlySpan word); +#endif + internal abstract void ProcessLength(long bitLength); + internal abstract void ProcessBlock(); + public abstract string AlgorithmName { get; } + public abstract int GetDigestSize(); + public abstract int DoFinal(byte[] output, int outOff); + public abstract IMemoable Copy(); + public abstract void Reset(IMemoable t); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract int DoFinal(Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs.meta new file mode 100644 index 00000000..8ebeeca0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ff36403fe499a744a8b32d26de7b631 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/GeneralDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs new file mode 100644 index 00000000..3e898738 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs @@ -0,0 +1,218 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public sealed class Haraka256Digest + : HarakaBase + { + private readonly byte[] m_buf; + private int m_bufPos; + + public Haraka256Digest() + { + m_buf = new byte[32]; + m_bufPos = 0; + } + + public override string AlgorithmName => "Haraka-256"; + + public override int GetByteLength() => 32; + + public override void Update(byte input) + { + if (m_bufPos > 32 - 1) + throw new ArgumentException("total input cannot be more than 32 bytes"); + + m_buf[m_bufPos++] = input; + } + + public override void BlockUpdate(byte[] input, int inOff, int len) + { + if (m_bufPos > 32 - len) + throw new ArgumentException("total input cannot be more than 32 bytes"); + + Array.Copy(input, inOff, m_buf, m_bufPos, len); + m_bufPos += len; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void BlockUpdate(ReadOnlySpan input) + { + if (m_bufPos > 32 - input.Length) + throw new ArgumentException("total input cannot be more than 32 bytes"); + + input.CopyTo(m_buf.AsSpan(m_bufPos)); + m_bufPos += input.Length; + } +#endif + + public override int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + if (m_bufPos != 32) + throw new ArgumentException("input must be exactly 32 bytes"); + + if (output.Length - outOff < 32) + throw new ArgumentException("output too short to receive digest"); + + int rv = Haraka256256(m_buf, output, outOff); + + Reset(); + + return rv; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + if (m_bufPos != 32) + throw new ArgumentException("input must be exactly 32 bytes"); + + if (output.Length < 32) + throw new ArgumentException("output too short to receive digest"); + +#if NETCOREAPP3_0_OR_GREATER + if (Haraka256_X86.IsSupported) + { + Haraka256_X86.Hash(m_buf, output); + Reset(); + return 32; + } +#endif + + int rv = Haraka256256(m_buf, output); + + Reset(); + + return rv; + } +#endif + + public override void Reset() + { + m_bufPos = 0; + Array.Clear(m_buf, 0, 32); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Haraka256256(ReadOnlySpan msg, Span output) + { + byte[][] s1 = new byte[2][]; + s1[0] = new byte[16]; + s1[1] = new byte[16]; + byte[][] s2 = new byte[2][]; + s2[0] = new byte[16]; + s2[1] = new byte[16]; + + msg[ ..16].CopyTo(s1[0]); + msg[16..32].CopyTo(s1[1]); + + s1[0] = AesEnc(s1[0], RC[0]); + s1[1] = AesEnc(s1[1], RC[1]); + s1[0] = AesEnc(s1[0], RC[2]); + s1[1] = AesEnc(s1[1], RC[3]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[4]); + s1[1] = AesEnc(s2[1], RC[5]); + s1[0] = AesEnc(s1[0], RC[6]); + s1[1] = AesEnc(s1[1], RC[7]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[8]); + s1[1] = AesEnc(s2[1], RC[9]); + s1[0] = AesEnc(s1[0], RC[10]); + s1[1] = AesEnc(s1[1], RC[11]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[12]); + s1[1] = AesEnc(s2[1], RC[13]); + s1[0] = AesEnc(s1[0], RC[14]); + s1[1] = AesEnc(s1[1], RC[15]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[16]); + s1[1] = AesEnc(s2[1], RC[17]); + s1[0] = AesEnc(s1[0], RC[18]); + s1[1] = AesEnc(s1[1], RC[19]); + Mix256(s1, s2); + + Xor(s2[0], msg , output[ ..16]); + Xor(s2[1], msg[16..], output[16..32]); + + return DIGEST_SIZE; + } +#else + private static int Haraka256256(byte[] msg, byte[] output, int outOff) + { + byte[][] s1 = new byte[2][]; + s1[0] = new byte[16]; + s1[1] = new byte[16]; + byte[][] s2 = new byte[2][]; + s2[0] = new byte[16]; + s2[1] = new byte[16]; + + Array.Copy(msg, 0, s1[0], 0, 16); + Array.Copy(msg, 16, s1[1], 0, 16); + + s1[0] = AesEnc(s1[0], RC[0]); + s1[1] = AesEnc(s1[1], RC[1]); + s1[0] = AesEnc(s1[0], RC[2]); + s1[1] = AesEnc(s1[1], RC[3]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[4]); + s1[1] = AesEnc(s2[1], RC[5]); + s1[0] = AesEnc(s1[0], RC[6]); + s1[1] = AesEnc(s1[1], RC[7]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[8]); + s1[1] = AesEnc(s2[1], RC[9]); + s1[0] = AesEnc(s1[0], RC[10]); + s1[1] = AesEnc(s1[1], RC[11]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[12]); + s1[1] = AesEnc(s2[1], RC[13]); + s1[0] = AesEnc(s1[0], RC[14]); + s1[1] = AesEnc(s1[1], RC[15]); + Mix256(s1, s2); + + s1[0] = AesEnc(s2[0], RC[16]); + s1[1] = AesEnc(s2[1], RC[17]); + s1[0] = AesEnc(s1[0], RC[18]); + s1[1] = AesEnc(s1[1], RC[19]); + Mix256(s1, s2); + + s1[0] = Xor(s2[0], msg, 0); + s1[1] = Xor(s2[1], msg, 16); + + Array.Copy(s1[0], 0, output, outOff , 16); + Array.Copy(s1[1], 0, output, outOff + 16, 16); + + return DIGEST_SIZE; + } +#endif + + private static void Mix256(byte[][] s1, byte[][] s2) + { + Array.Copy(s1[0], 0, s2[0], 0, 4); + Array.Copy(s1[1], 0, s2[0], 4, 4); + Array.Copy(s1[0], 4, s2[0], 8, 4); + Array.Copy(s1[1], 4, s2[0], 12, 4); + + Array.Copy(s1[0], 8, s2[1], 0, 4); + Array.Copy(s1[1], 8, s2[1], 4, 4); + Array.Copy(s1[0], 12, s2[1], 8, 4); + Array.Copy(s1[1], 12, s2[1], 12, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs.meta new file mode 100644 index 00000000..e4c6716f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7c5eb74b94701ee478cb64e34260ae39 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs new file mode 100644 index 00000000..f83d17aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs @@ -0,0 +1,148 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +#if NETCOREAPP3_0_OR_GREATER +using System; +using System.Buffers.Binary; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + using Aes = System.Runtime.Intrinsics.X86.Aes; + using Sse2 = System.Runtime.Intrinsics.X86.Sse2; + + public static class Haraka256_X86 + { + public static bool IsSupported => Aes.IsSupported; + + public static void Hash(ReadOnlySpan input, Span output) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka256_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + + ImplRounds(ref s0, ref s1, Haraka512_X86.DefaultRoundConstants.AsSpan(0, 20)); + + s0 = Sse2.Xor(s0, Load128(input[ ..16])); + s1 = Sse2.Xor(s1, Load128(input[16..32])); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + } + + public static void Hash(ReadOnlySpan input, Span output, + ReadOnlySpan> roundConstants) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka256_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + + ImplRounds(ref s0, ref s1, roundConstants[..20]); + + s0 = Sse2.Xor(s0, Load128(input[ ..16])); + s1 = Sse2.Xor(s1, Load128(input[16..32])); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + } + + public static void Permute(ReadOnlySpan input, Span output) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka256_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + + ImplRounds(ref s0, ref s1, Haraka512_X86.DefaultRoundConstants.AsSpan(0, 20)); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + } + + public static void Permute(ReadOnlySpan input, Span output, + ReadOnlySpan> roundConstants) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka256_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + + ImplRounds(ref s0, ref s1, roundConstants[..20]); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplRounds(ref Vector128 s0, ref Vector128 s1, ReadOnlySpan> rc) + { + ImplRound(ref s0, ref s1, rc[ .. 4]); + ImplRound(ref s0, ref s1, rc[ 4.. 8]); + ImplRound(ref s0, ref s1, rc[ 8..12]); + ImplRound(ref s0, ref s1, rc[12..16]); + ImplRound(ref s0, ref s1, rc[16..20]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplRound(ref Vector128 s0, ref Vector128 s1, ReadOnlySpan> rc) + { + ImplAes(ref s0, ref s1, rc[..4]); + ImplMix(ref s0, ref s1); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplAes(ref Vector128 s0, ref Vector128 s1, ReadOnlySpan> rc) + { + s0 = Aes.Encrypt(s0, rc[0]); + s1 = Aes.Encrypt(s1, rc[1]); + + s0 = Aes.Encrypt(s0, rc[2]); + s1 = Aes.Encrypt(s1, rc[3]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplMix(ref Vector128 s0, ref Vector128 s1) + { + Vector128 t0 = s0.AsUInt32(); + Vector128 t1 = s1.AsUInt32(); + s0 = Sse2.UnpackLow(t0, t1).AsByte(); + s1 = Sse2.UnpackHigh(t0, t1).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(t); + + return Vector128.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[8..]) + ).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } + } +} +#endif +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs.meta new file mode 100644 index 00000000..3172aa1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec8595086a6fa294190927f533980baf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka256_X86.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs new file mode 100644 index 00000000..9fd58042 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs @@ -0,0 +1,291 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public sealed class Haraka512Digest + : HarakaBase + { + private readonly byte[] m_buf; + private int m_bufPos; + + public Haraka512Digest() + { + m_buf = new byte[64]; + m_bufPos = 0; + } + + public override string AlgorithmName => "Haraka-512"; + + public override int GetByteLength() => 64; + + public override void Update(byte input) + { + if (m_bufPos > 64 - 1) + throw new ArgumentException("total input cannot be more than 64 bytes"); + + m_buf[m_bufPos++] = input; + } + + public override void BlockUpdate(byte[] input, int inOff, int len) + { + if (m_bufPos > 64 - len) + throw new ArgumentException("total input cannot be more than 64 bytes"); + + Array.Copy(input, inOff, m_buf, m_bufPos, len); + m_bufPos += len; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void BlockUpdate(ReadOnlySpan input) + { + if (m_bufPos > 64 - input.Length) + throw new ArgumentException("total input cannot be more than 64 bytes"); + + input.CopyTo(m_buf.AsSpan(m_bufPos)); + m_bufPos += input.Length; + } +#endif + + public override int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + if (m_bufPos != 64) + throw new ArgumentException("input must be exactly 64 bytes"); + + if (output.Length - outOff < 32) + throw new ArgumentException("output too short to receive digest"); + + int rv = Haraka512256(m_buf, output, outOff); + + Reset(); + + return rv; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + if (m_bufPos != 64) + throw new ArgumentException("input must be exactly 64 bytes"); + + if (output.Length < 32) + throw new ArgumentException("output too short to receive digest"); + +#if NETCOREAPP3_0_OR_GREATER + if (Haraka512_X86.IsSupported) + { + Haraka512_X86.Hash(m_buf, output); + Reset(); + return 32; + } +#endif + + int rv = Haraka512256(m_buf, output); + + Reset(); + + return rv; + } +#endif + + public override void Reset() + { + m_bufPos = 0; + Array.Clear(m_buf, 0, 64); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Haraka512256(ReadOnlySpan msg, Span output) + { + byte[][] s1 = new byte[4][]; + s1[0] = new byte[16]; + s1[1] = new byte[16]; + s1[2] = new byte[16]; + s1[3] = new byte[16]; + byte[][] s2 = new byte[4][]; + s2[0] = new byte[16]; + s2[1] = new byte[16]; + s2[2] = new byte[16]; + s2[3] = new byte[16]; + + msg[ ..16].CopyTo(s1[0]); + msg[16..32].CopyTo(s1[1]); + msg[32..48].CopyTo(s1[2]); + msg[48..64].CopyTo(s1[3]); + + s1[0] = AesEnc(s1[0], RC[0]); + s1[1] = AesEnc(s1[1], RC[1]); + s1[2] = AesEnc(s1[2], RC[2]); + s1[3] = AesEnc(s1[3], RC[3]); + s1[0] = AesEnc(s1[0], RC[4]); + s1[1] = AesEnc(s1[1], RC[5]); + s1[2] = AesEnc(s1[2], RC[6]); + s1[3] = AesEnc(s1[3], RC[7]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[8]); + s1[1] = AesEnc(s2[1], RC[9]); + s1[2] = AesEnc(s2[2], RC[10]); + s1[3] = AesEnc(s2[3], RC[11]); + s1[0] = AesEnc(s1[0], RC[12]); + s1[1] = AesEnc(s1[1], RC[13]); + s1[2] = AesEnc(s1[2], RC[14]); + s1[3] = AesEnc(s1[3], RC[15]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[16]); + s1[1] = AesEnc(s2[1], RC[17]); + s1[2] = AesEnc(s2[2], RC[18]); + s1[3] = AesEnc(s2[3], RC[19]); + s1[0] = AesEnc(s1[0], RC[20]); + s1[1] = AesEnc(s1[1], RC[21]); + s1[2] = AesEnc(s1[2], RC[22]); + s1[3] = AesEnc(s1[3], RC[23]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[24]); + s1[1] = AesEnc(s2[1], RC[25]); + s1[2] = AesEnc(s2[2], RC[26]); + s1[3] = AesEnc(s2[3], RC[27]); + s1[0] = AesEnc(s1[0], RC[28]); + s1[1] = AesEnc(s1[1], RC[29]); + s1[2] = AesEnc(s1[2], RC[30]); + s1[3] = AesEnc(s1[3], RC[31]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[32]); + s1[1] = AesEnc(s2[1], RC[33]); + s1[2] = AesEnc(s2[2], RC[34]); + s1[3] = AesEnc(s2[3], RC[35]); + s1[0] = AesEnc(s1[0], RC[36]); + s1[1] = AesEnc(s1[1], RC[37]); + s1[2] = AesEnc(s1[2], RC[38]); + s1[3] = AesEnc(s1[3], RC[39]); + Mix512(s1, s2); + + Xor(s2[0], msg, s1[0]); + Xor(s2[1], msg[16..], s1[1]); + Xor(s2[2], msg[32..], s1[2]); + Xor(s2[3], msg[48..], s1[3]); + + s1[0].AsSpan(8, 8).CopyTo(output); + s1[1].AsSpan(8, 8).CopyTo(output[8..]); + s1[2].AsSpan(0, 8).CopyTo(output[16..]); + s1[3].AsSpan(0, 8).CopyTo(output[24..]); + + return DIGEST_SIZE; + } +#else + private static int Haraka512256(byte[] msg, byte[] output, int outOff) + { + byte[][] s1 = new byte[4][]; + s1[0] = new byte[16]; + s1[1] = new byte[16]; + s1[2] = new byte[16]; + s1[3] = new byte[16]; + byte[][] s2 = new byte[4][]; + s2[0] = new byte[16]; + s2[1] = new byte[16]; + s2[2] = new byte[16]; + s2[3] = new byte[16]; + + Array.Copy(msg, 0, s1[0], 0, 16); + Array.Copy(msg, 16, s1[1], 0, 16); + Array.Copy(msg, 32, s1[2], 0, 16); + Array.Copy(msg, 48, s1[3], 0, 16); + + s1[0] = AesEnc(s1[0], RC[0]); + s1[1] = AesEnc(s1[1], RC[1]); + s1[2] = AesEnc(s1[2], RC[2]); + s1[3] = AesEnc(s1[3], RC[3]); + s1[0] = AesEnc(s1[0], RC[4]); + s1[1] = AesEnc(s1[1], RC[5]); + s1[2] = AesEnc(s1[2], RC[6]); + s1[3] = AesEnc(s1[3], RC[7]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[8]); + s1[1] = AesEnc(s2[1], RC[9]); + s1[2] = AesEnc(s2[2], RC[10]); + s1[3] = AesEnc(s2[3], RC[11]); + s1[0] = AesEnc(s1[0], RC[12]); + s1[1] = AesEnc(s1[1], RC[13]); + s1[2] = AesEnc(s1[2], RC[14]); + s1[3] = AesEnc(s1[3], RC[15]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[16]); + s1[1] = AesEnc(s2[1], RC[17]); + s1[2] = AesEnc(s2[2], RC[18]); + s1[3] = AesEnc(s2[3], RC[19]); + s1[0] = AesEnc(s1[0], RC[20]); + s1[1] = AesEnc(s1[1], RC[21]); + s1[2] = AesEnc(s1[2], RC[22]); + s1[3] = AesEnc(s1[3], RC[23]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[24]); + s1[1] = AesEnc(s2[1], RC[25]); + s1[2] = AesEnc(s2[2], RC[26]); + s1[3] = AesEnc(s2[3], RC[27]); + s1[0] = AesEnc(s1[0], RC[28]); + s1[1] = AesEnc(s1[1], RC[29]); + s1[2] = AesEnc(s1[2], RC[30]); + s1[3] = AesEnc(s1[3], RC[31]); + Mix512(s1, s2); + + s1[0] = AesEnc(s2[0], RC[32]); + s1[1] = AesEnc(s2[1], RC[33]); + s1[2] = AesEnc(s2[2], RC[34]); + s1[3] = AesEnc(s2[3], RC[35]); + s1[0] = AesEnc(s1[0], RC[36]); + s1[1] = AesEnc(s1[1], RC[37]); + s1[2] = AesEnc(s1[2], RC[38]); + s1[3] = AesEnc(s1[3], RC[39]); + Mix512(s1, s2); + + s1[0] = Xor(s2[0], msg, 0); + s1[1] = Xor(s2[1], msg, 16); + s1[2] = Xor(s2[2], msg, 32); + s1[3] = Xor(s2[3], msg, 48); + + Array.Copy(s1[0], 8, output, outOff, 8); + Array.Copy(s1[1], 8, output, outOff + 8, 8); + Array.Copy(s1[2], 0, output, outOff + 16, 8); + Array.Copy(s1[3], 0, output, outOff + 24, 8); + + return DIGEST_SIZE; + } +#endif + + private static void Mix512(byte[][] s1, byte[][] s2) + { + Array.Copy(s1[0], 12, s2[0], 0, 4); + Array.Copy(s1[2], 12, s2[0], 4, 4); + Array.Copy(s1[1], 12, s2[0], 8, 4); + Array.Copy(s1[3], 12, s2[0], 12, 4); + + Array.Copy(s1[2], 0, s2[1], 0, 4); + Array.Copy(s1[0], 0, s2[1], 4, 4); + Array.Copy(s1[3], 0, s2[1], 8, 4); + Array.Copy(s1[1], 0, s2[1], 12, 4); + + Array.Copy(s1[2], 4, s2[2], 0, 4); + Array.Copy(s1[0], 4, s2[2], 4, 4); + Array.Copy(s1[3], 4, s2[2], 8, 4); + Array.Copy(s1[1], 4, s2[2], 12, 4); + + Array.Copy(s1[0], 8, s2[3], 0, 4); + Array.Copy(s1[2], 8, s2[3], 4, 4); + Array.Copy(s1[1], 8, s2[3], 8, 4); + Array.Copy(s1[3], 8, s2[3], 12, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs.meta new file mode 100644 index 00000000..6e7e335f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b8a8760e24c83f14eb1d631436058560 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs new file mode 100644 index 00000000..77638f4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs @@ -0,0 +1,244 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +#if NETCOREAPP3_0_OR_GREATER +using System; +using System.Buffers.Binary; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + using Aes = System.Runtime.Intrinsics.X86.Aes; + using Sse2 = System.Runtime.Intrinsics.X86.Sse2; + + public static class Haraka512_X86 + { + public static bool IsSupported => Aes.IsSupported; + + // Haraka round constants + internal static readonly Vector128[] DefaultRoundConstants = new Vector128[] + { + Vector128.Create(0x9D, 0x7B, 0x81, 0x75, 0xF0, 0xFE, 0xC5, 0xB2, 0x0A, 0xC0, 0x20, 0xE6, 0x4C, 0x70, 0x84, 0x06), + Vector128.Create(0x17, 0xF7, 0x08, 0x2F, 0xA4, 0x6B, 0x0F, 0x64, 0x6B, 0xA0, 0xF3, 0x88, 0xE1, 0xB4, 0x66, 0x8B), + Vector128.Create(0x14, 0x91, 0x02, 0x9F, 0x60, 0x9D, 0x02, 0xCF, 0x98, 0x84, 0xF2, 0x53, 0x2D, 0xDE, 0x02, 0x34), + Vector128.Create(0x79, 0x4F, 0x5B, 0xFD, 0xAF, 0xBC, 0xF3, 0xBB, 0x08, 0x4F, 0x7B, 0x2E, 0xE6, 0xEA, 0xD6, 0x0E), + Vector128.Create(0x44, 0x70, 0x39, 0xBE, 0x1C, 0xCD, 0xEE, 0x79, 0x8B, 0x44, 0x72, 0x48, 0xCB, 0xB0, 0xCF, 0xCB), + Vector128.Create(0x7B, 0x05, 0x8A, 0x2B, 0xED, 0x35, 0x53, 0x8D, 0xB7, 0x32, 0x90, 0x6E, 0xEE, 0xCD, 0xEA, 0x7E), + Vector128.Create(0x1B, 0xEF, 0x4F, 0xDA, 0x61, 0x27, 0x41, 0xE2, 0xD0, 0x7C, 0x2E, 0x5E, 0x43, 0x8F, 0xC2, 0x67), + Vector128.Create(0x3B, 0x0B, 0xC7, 0x1F, 0xE2, 0xFD, 0x5F, 0x67, 0x07, 0xCC, 0xCA, 0xAF, 0xB0, 0xD9, 0x24, 0x29), + Vector128.Create(0xEE, 0x65, 0xD4, 0xB9, 0xCA, 0x8F, 0xDB, 0xEC, 0xE9, 0x7F, 0x86, 0xE6, 0xF1, 0x63, 0x4D, 0xAB), + Vector128.Create(0x33, 0x7E, 0x03, 0xAD, 0x4F, 0x40, 0x2A, 0x5B, 0x64, 0xCD, 0xB7, 0xD4, 0x84, 0xBF, 0x30, 0x1C), + Vector128.Create(0x00, 0x98, 0xF6, 0x8D, 0x2E, 0x8B, 0x02, 0x69, 0xBF, 0x23, 0x17, 0x94, 0xB9, 0x0B, 0xCC, 0xB2), + Vector128.Create(0x8A, 0x2D, 0x9D, 0x5C, 0xC8, 0x9E, 0xAA, 0x4A, 0x72, 0x55, 0x6F, 0xDE, 0xA6, 0x78, 0x04, 0xFA), + Vector128.Create(0xD4, 0x9F, 0x12, 0x29, 0x2E, 0x4F, 0xFA, 0x0E, 0x12, 0x2A, 0x77, 0x6B, 0x2B, 0x9F, 0xB4, 0xDF), + Vector128.Create(0xEE, 0x12, 0x6A, 0xBB, 0xAE, 0x11, 0xD6, 0x32, 0x36, 0xA2, 0x49, 0xF4, 0x44, 0x03, 0xA1, 0x1E), + Vector128.Create(0xA6, 0xEC, 0xA8, 0x9C, 0xC9, 0x00, 0x96, 0x5F, 0x84, 0x00, 0x05, 0x4B, 0x88, 0x49, 0x04, 0xAF), + Vector128.Create(0xEC, 0x93, 0xE5, 0x27, 0xE3, 0xC7, 0xA2, 0x78, 0x4F, 0x9C, 0x19, 0x9D, 0xD8, 0x5E, 0x02, 0x21), + Vector128.Create(0x73, 0x01, 0xD4, 0x82, 0xCD, 0x2E, 0x28, 0xB9, 0xB7, 0xC9, 0x59, 0xA7, 0xF8, 0xAA, 0x3A, 0xBF), + Vector128.Create(0x6B, 0x7D, 0x30, 0x10, 0xD9, 0xEF, 0xF2, 0x37, 0x17, 0xB0, 0x86, 0x61, 0x0D, 0x70, 0x60, 0x62), + Vector128.Create(0xC6, 0x9A, 0xFC, 0xF6, 0x53, 0x91, 0xC2, 0x81, 0x43, 0x04, 0x30, 0x21, 0xC2, 0x45, 0xCA, 0x5A), + Vector128.Create(0x3A, 0x94, 0xD1, 0x36, 0xE8, 0x92, 0xAF, 0x2C, 0xBB, 0x68, 0x6B, 0x22, 0x3C, 0x97, 0x23, 0x92), + Vector128.Create(0xB4, 0x71, 0x10, 0xE5, 0x58, 0xB9, 0xBA, 0x6C, 0xEB, 0x86, 0x58, 0x22, 0x38, 0x92, 0xBF, 0xD3), + Vector128.Create(0x8D, 0x12, 0xE1, 0x24, 0xDD, 0xFD, 0x3D, 0x93, 0x77, 0xC6, 0xF0, 0xAE, 0xE5, 0x3C, 0x86, 0xDB), + Vector128.Create(0xB1, 0x12, 0x22, 0xCB, 0xE3, 0x8D, 0xE4, 0x83, 0x9C, 0xA0, 0xEB, 0xFF, 0x68, 0x62, 0x60, 0xBB), + Vector128.Create(0x7D, 0xF7, 0x2B, 0xC7, 0x4E, 0x1A, 0xB9, 0x2D, 0x9C, 0xD1, 0xE4, 0xE2, 0xDC, 0xD3, 0x4B, 0x73), + Vector128.Create(0x4E, 0x92, 0xB3, 0x2C, 0xC4, 0x15, 0x14, 0x4B, 0x43, 0x1B, 0x30, 0x61, 0xC3, 0x47, 0xBB, 0x43), + Vector128.Create(0x99, 0x68, 0xEB, 0x16, 0xDD, 0x31, 0xB2, 0x03, 0xF6, 0xEF, 0x07, 0xE7, 0xA8, 0x75, 0xA7, 0xDB), + Vector128.Create(0x2C, 0x47, 0xCA, 0x7E, 0x02, 0x23, 0x5E, 0x8E, 0x77, 0x59, 0x75, 0x3C, 0x4B, 0x61, 0xF3, 0x6D), + Vector128.Create(0xF9, 0x17, 0x86, 0xB8, 0xB9, 0xE5, 0x1B, 0x6D, 0x77, 0x7D, 0xDE, 0xD6, 0x17, 0x5A, 0xA7, 0xCD), + Vector128.Create(0x5D, 0xEE, 0x46, 0xA9, 0x9D, 0x06, 0x6C, 0x9D, 0xAA, 0xE9, 0xA8, 0x6B, 0xF0, 0x43, 0x6B, 0xEC), + Vector128.Create(0xC1, 0x27, 0xF3, 0x3B, 0x59, 0x11, 0x53, 0xA2, 0x2B, 0x33, 0x57, 0xF9, 0x50, 0x69, 0x1E, 0xCB), + Vector128.Create(0xD9, 0xD0, 0x0E, 0x60, 0x53, 0x03, 0xED, 0xE4, 0x9C, 0x61, 0xDA, 0x00, 0x75, 0x0C, 0xEE, 0x2C), + Vector128.Create(0x50, 0xA3, 0xA4, 0x63, 0xBC, 0xBA, 0xBB, 0x80, 0xAB, 0x0C, 0xE9, 0x96, 0xA1, 0xA5, 0xB1, 0xF0), + Vector128.Create(0x39, 0xCA, 0x8D, 0x93, 0x30, 0xDE, 0x0D, 0xAB, 0x88, 0x29, 0x96, 0x5E, 0x02, 0xB1, 0x3D, 0xAE), + Vector128.Create(0x42, 0xB4, 0x75, 0x2E, 0xA8, 0xF3, 0x14, 0x88, 0x0B, 0xA4, 0x54, 0xD5, 0x38, 0x8F, 0xBB, 0x17), + Vector128.Create(0xF6, 0x16, 0x0A, 0x36, 0x79, 0xB7, 0xB6, 0xAE, 0xD7, 0x7F, 0x42, 0x5F, 0x5B, 0x8A, 0xBB, 0x34), + Vector128.Create(0xDE, 0xAF, 0xBA, 0xFF, 0x18, 0x59, 0xCE, 0x43, 0x38, 0x54, 0xE5, 0xCB, 0x41, 0x52, 0xF6, 0x26), + Vector128.Create(0x78, 0xC9, 0x9E, 0x83, 0xF7, 0x9C, 0xCA, 0xA2, 0x6A, 0x02, 0xF3, 0xB9, 0x54, 0x9A, 0xE9, 0x4C), + Vector128.Create(0x35, 0x12, 0x90, 0x22, 0x28, 0x6E, 0xC0, 0x40, 0xBE, 0xF7, 0xDF, 0x1B, 0x1A, 0xA5, 0x51, 0xAE), + Vector128.Create(0xCF, 0x59, 0xA6, 0x48, 0x0F, 0xBC, 0x73, 0xC1, 0x2B, 0xD2, 0x7E, 0xBA, 0x3C, 0x61, 0xC1, 0xA0), + Vector128.Create(0xA1, 0x9D, 0xC5, 0xE9, 0xFD, 0xBD, 0xD6, 0x4A, 0x88, 0x82, 0x28, 0x02, 0x03, 0xCC, 0x6A, 0x75), + }; + + public static void Hash(ReadOnlySpan input, Span output) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka512_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + var s2 = Load128(input[32..48]); + var s3 = Load128(input[48..64]); + + ImplRounds(ref s0, ref s1, ref s2, ref s3, DefaultRoundConstants.AsSpan(0, 40)); + + s0 = Sse2.Xor(s0, Load128(input[ ..16])); + s1 = Sse2.Xor(s1, Load128(input[16..32])); + s2 = Sse2.Xor(s2, Load128(input[32..48])); + s3 = Sse2.Xor(s3, Load128(input[48..64])); + + Store64(s0.GetUpper(), output[ .. 8]); + Store64(s1.GetUpper(), output[ 8..16]); + Store64(s2.GetLower(), output[16..24]); + Store64(s3.GetLower(), output[24..32]); + } + + public static void Hash(ReadOnlySpan input, Span output, + ReadOnlySpan> roundConstants) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka512_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + var s2 = Load128(input[32..48]); + var s3 = Load128(input[48..64]); + + ImplRounds(ref s0, ref s1, ref s2, ref s3, roundConstants[..40]); + + s0 = Sse2.Xor(s0, Load128(input[ ..16])); + s1 = Sse2.Xor(s1, Load128(input[16..32])); + s2 = Sse2.Xor(s2, Load128(input[32..48])); + s3 = Sse2.Xor(s3, Load128(input[48..64])); + + Store64(s0.GetUpper(), output[ .. 8]); + Store64(s1.GetUpper(), output[ 8..16]); + Store64(s2.GetLower(), output[16..24]); + Store64(s3.GetLower(), output[24..32]); + } + + public static void Permute(ReadOnlySpan input, Span output) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka512_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + var s2 = Load128(input[32..48]); + var s3 = Load128(input[48..64]); + + ImplRounds(ref s0, ref s1, ref s2, ref s3, DefaultRoundConstants.AsSpan(0, 40)); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + Store128(s2, output[32..48]); + Store128(s3, output[48..64]); + } + + public static void Permute(ReadOnlySpan input, Span output, + ReadOnlySpan> roundConstants) + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(Haraka512_X86)); + + var s0 = Load128(input[ ..16]); + var s1 = Load128(input[16..32]); + var s2 = Load128(input[32..48]); + var s3 = Load128(input[48..64]); + + ImplRounds(ref s0, ref s1, ref s2, ref s3, roundConstants[..40]); + + Store128(s0, output[ ..16]); + Store128(s1, output[16..32]); + Store128(s2, output[32..48]); + Store128(s3, output[48..64]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplRounds(ref Vector128 s0, ref Vector128 s1, ref Vector128 s2, + ref Vector128 s3, ReadOnlySpan> rc) + { + ImplRound(ref s0, ref s1, ref s2, ref s3, rc[ .. 8]); + ImplRound(ref s0, ref s1, ref s2, ref s3, rc[ 8..16]); + ImplRound(ref s0, ref s1, ref s2, ref s3, rc[16..24]); + ImplRound(ref s0, ref s1, ref s2, ref s3, rc[24..32]); + ImplRound(ref s0, ref s1, ref s2, ref s3, rc[32..40]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplRound(ref Vector128 s0, ref Vector128 s1, ref Vector128 s2, + ref Vector128 s3, ReadOnlySpan> rc) + { + ImplAes(ref s0, ref s1, ref s2, ref s3, rc[..8]); + ImplMix(ref s0, ref s1, ref s2, ref s3); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplAes(ref Vector128 s0, ref Vector128 s1, ref Vector128 s2, + ref Vector128 s3, ReadOnlySpan> rc) + { + s0 = Aes.Encrypt(s0, rc[0]); + s1 = Aes.Encrypt(s1, rc[1]); + s2 = Aes.Encrypt(s2, rc[2]); + s3 = Aes.Encrypt(s3, rc[3]); + + s0 = Aes.Encrypt(s0, rc[4]); + s1 = Aes.Encrypt(s1, rc[5]); + s2 = Aes.Encrypt(s2, rc[6]); + s3 = Aes.Encrypt(s3, rc[7]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void ImplMix(ref Vector128 s0, ref Vector128 s1, ref Vector128 s2, + ref Vector128 s3) + { + var t0 = s0.AsUInt32(); + var t1 = s1.AsUInt32(); + var t2 = s2.AsUInt32(); + var t3 = s3.AsUInt32(); + + var u0 = Sse2.UnpackLow(t0, t1); + var u1 = Sse2.UnpackHigh(t0, t1); + var u2 = Sse2.UnpackLow(t2, t3); + var u3 = Sse2.UnpackHigh(t2, t3); + + s0 = Sse2.UnpackHigh(u1, u3).AsByte(); + s1 = Sse2.UnpackLow(u2, u0).AsByte(); + s2 = Sse2.UnpackHigh(u2, u0).AsByte(); + s3 = Sse2.UnpackLow(u1, u3).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(t); + + return Vector128.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[8..]) + ).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store64(Vector64 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 8) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t, u.ToScalar()); + } + } +} +#endif +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs.meta new file mode 100644 index 00000000..5c9a872d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0e537a49b8c6586488a9c4e0c1549f89 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Haraka512_X86.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs new file mode 100644 index 00000000..860c8eba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs @@ -0,0 +1,188 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public abstract class HarakaBase + : IDigest + { + internal static readonly int DIGEST_SIZE = 32; + + // Haraka round constants + internal static readonly byte[][] RC = new byte[][] + { + new byte[]{ 0x9D, 0x7B, 0x81, 0x75, 0xF0, 0xFE, 0xC5, 0xB2, 0x0A, 0xC0, 0x20, 0xE6, 0x4C, 0x70, 0x84, 0x06 }, + new byte[]{ 0x17, 0xF7, 0x08, 0x2F, 0xA4, 0x6B, 0x0F, 0x64, 0x6B, 0xA0, 0xF3, 0x88, 0xE1, 0xB4, 0x66, 0x8B }, + new byte[]{ 0x14, 0x91, 0x02, 0x9F, 0x60, 0x9D, 0x02, 0xCF, 0x98, 0x84, 0xF2, 0x53, 0x2D, 0xDE, 0x02, 0x34 }, + new byte[]{ 0x79, 0x4F, 0x5B, 0xFD, 0xAF, 0xBC, 0xF3, 0xBB, 0x08, 0x4F, 0x7B, 0x2E, 0xE6, 0xEA, 0xD6, 0x0E }, + new byte[]{ 0x44, 0x70, 0x39, 0xBE, 0x1C, 0xCD, 0xEE, 0x79, 0x8B, 0x44, 0x72, 0x48, 0xCB, 0xB0, 0xCF, 0xCB }, + new byte[]{ 0x7B, 0x05, 0x8A, 0x2B, 0xED, 0x35, 0x53, 0x8D, 0xB7, 0x32, 0x90, 0x6E, 0xEE, 0xCD, 0xEA, 0x7E }, + new byte[]{ 0x1B, 0xEF, 0x4F, 0xDA, 0x61, 0x27, 0x41, 0xE2, 0xD0, 0x7C, 0x2E, 0x5E, 0x43, 0x8F, 0xC2, 0x67 }, + new byte[]{ 0x3B, 0x0B, 0xC7, 0x1F, 0xE2, 0xFD, 0x5F, 0x67, 0x07, 0xCC, 0xCA, 0xAF, 0xB0, 0xD9, 0x24, 0x29 }, + new byte[]{ 0xEE, 0x65, 0xD4, 0xB9, 0xCA, 0x8F, 0xDB, 0xEC, 0xE9, 0x7F, 0x86, 0xE6, 0xF1, 0x63, 0x4D, 0xAB }, + new byte[]{ 0x33, 0x7E, 0x03, 0xAD, 0x4F, 0x40, 0x2A, 0x5B, 0x64, 0xCD, 0xB7, 0xD4, 0x84, 0xBF, 0x30, 0x1C }, + new byte[]{ 0x00, 0x98, 0xF6, 0x8D, 0x2E, 0x8B, 0x02, 0x69, 0xBF, 0x23, 0x17, 0x94, 0xB9, 0x0B, 0xCC, 0xB2 }, + new byte[]{ 0x8A, 0x2D, 0x9D, 0x5C, 0xC8, 0x9E, 0xAA, 0x4A, 0x72, 0x55, 0x6F, 0xDE, 0xA6, 0x78, 0x04, 0xFA }, + new byte[]{ 0xD4, 0x9F, 0x12, 0x29, 0x2E, 0x4F, 0xFA, 0x0E, 0x12, 0x2A, 0x77, 0x6B, 0x2B, 0x9F, 0xB4, 0xDF }, + new byte[]{ 0xEE, 0x12, 0x6A, 0xBB, 0xAE, 0x11, 0xD6, 0x32, 0x36, 0xA2, 0x49, 0xF4, 0x44, 0x03, 0xA1, 0x1E }, + new byte[]{ 0xA6, 0xEC, 0xA8, 0x9C, 0xC9, 0x00, 0x96, 0x5F, 0x84, 0x00, 0x05, 0x4B, 0x88, 0x49, 0x04, 0xAF }, + new byte[]{ 0xEC, 0x93, 0xE5, 0x27, 0xE3, 0xC7, 0xA2, 0x78, 0x4F, 0x9C, 0x19, 0x9D, 0xD8, 0x5E, 0x02, 0x21 }, + new byte[]{ 0x73, 0x01, 0xD4, 0x82, 0xCD, 0x2E, 0x28, 0xB9, 0xB7, 0xC9, 0x59, 0xA7, 0xF8, 0xAA, 0x3A, 0xBF }, + new byte[]{ 0x6B, 0x7D, 0x30, 0x10, 0xD9, 0xEF, 0xF2, 0x37, 0x17, 0xB0, 0x86, 0x61, 0x0D, 0x70, 0x60, 0x62 }, + new byte[]{ 0xC6, 0x9A, 0xFC, 0xF6, 0x53, 0x91, 0xC2, 0x81, 0x43, 0x04, 0x30, 0x21, 0xC2, 0x45, 0xCA, 0x5A }, + new byte[]{ 0x3A, 0x94, 0xD1, 0x36, 0xE8, 0x92, 0xAF, 0x2C, 0xBB, 0x68, 0x6B, 0x22, 0x3C, 0x97, 0x23, 0x92 }, + new byte[]{ 0xB4, 0x71, 0x10, 0xE5, 0x58, 0xB9, 0xBA, 0x6C, 0xEB, 0x86, 0x58, 0x22, 0x38, 0x92, 0xBF, 0xD3 }, + new byte[]{ 0x8D, 0x12, 0xE1, 0x24, 0xDD, 0xFD, 0x3D, 0x93, 0x77, 0xC6, 0xF0, 0xAE, 0xE5, 0x3C, 0x86, 0xDB }, + new byte[]{ 0xB1, 0x12, 0x22, 0xCB, 0xE3, 0x8D, 0xE4, 0x83, 0x9C, 0xA0, 0xEB, 0xFF, 0x68, 0x62, 0x60, 0xBB }, + new byte[]{ 0x7D, 0xF7, 0x2B, 0xC7, 0x4E, 0x1A, 0xB9, 0x2D, 0x9C, 0xD1, 0xE4, 0xE2, 0xDC, 0xD3, 0x4B, 0x73 }, + new byte[]{ 0x4E, 0x92, 0xB3, 0x2C, 0xC4, 0x15, 0x14, 0x4B, 0x43, 0x1B, 0x30, 0x61, 0xC3, 0x47, 0xBB, 0x43 }, + new byte[]{ 0x99, 0x68, 0xEB, 0x16, 0xDD, 0x31, 0xB2, 0x03, 0xF6, 0xEF, 0x07, 0xE7, 0xA8, 0x75, 0xA7, 0xDB }, + new byte[]{ 0x2C, 0x47, 0xCA, 0x7E, 0x02, 0x23, 0x5E, 0x8E, 0x77, 0x59, 0x75, 0x3C, 0x4B, 0x61, 0xF3, 0x6D }, + new byte[]{ 0xF9, 0x17, 0x86, 0xB8, 0xB9, 0xE5, 0x1B, 0x6D, 0x77, 0x7D, 0xDE, 0xD6, 0x17, 0x5A, 0xA7, 0xCD }, + new byte[]{ 0x5D, 0xEE, 0x46, 0xA9, 0x9D, 0x06, 0x6C, 0x9D, 0xAA, 0xE9, 0xA8, 0x6B, 0xF0, 0x43, 0x6B, 0xEC }, + new byte[]{ 0xC1, 0x27, 0xF3, 0x3B, 0x59, 0x11, 0x53, 0xA2, 0x2B, 0x33, 0x57, 0xF9, 0x50, 0x69, 0x1E, 0xCB }, + new byte[]{ 0xD9, 0xD0, 0x0E, 0x60, 0x53, 0x03, 0xED, 0xE4, 0x9C, 0x61, 0xDA, 0x00, 0x75, 0x0C, 0xEE, 0x2C }, + new byte[]{ 0x50, 0xA3, 0xA4, 0x63, 0xBC, 0xBA, 0xBB, 0x80, 0xAB, 0x0C, 0xE9, 0x96, 0xA1, 0xA5, 0xB1, 0xF0 }, + new byte[]{ 0x39, 0xCA, 0x8D, 0x93, 0x30, 0xDE, 0x0D, 0xAB, 0x88, 0x29, 0x96, 0x5E, 0x02, 0xB1, 0x3D, 0xAE }, + new byte[]{ 0x42, 0xB4, 0x75, 0x2E, 0xA8, 0xF3, 0x14, 0x88, 0x0B, 0xA4, 0x54, 0xD5, 0x38, 0x8F, 0xBB, 0x17 }, + new byte[]{ 0xF6, 0x16, 0x0A, 0x36, 0x79, 0xB7, 0xB6, 0xAE, 0xD7, 0x7F, 0x42, 0x5F, 0x5B, 0x8A, 0xBB, 0x34 }, + new byte[]{ 0xDE, 0xAF, 0xBA, 0xFF, 0x18, 0x59, 0xCE, 0x43, 0x38, 0x54, 0xE5, 0xCB, 0x41, 0x52, 0xF6, 0x26 }, + new byte[]{ 0x78, 0xC9, 0x9E, 0x83, 0xF7, 0x9C, 0xCA, 0xA2, 0x6A, 0x02, 0xF3, 0xB9, 0x54, 0x9A, 0xE9, 0x4C }, + new byte[]{ 0x35, 0x12, 0x90, 0x22, 0x28, 0x6E, 0xC0, 0x40, 0xBE, 0xF7, 0xDF, 0x1B, 0x1A, 0xA5, 0x51, 0xAE }, + new byte[]{ 0xCF, 0x59, 0xA6, 0x48, 0x0F, 0xBC, 0x73, 0xC1, 0x2B, 0xD2, 0x7E, 0xBA, 0x3C, 0x61, 0xC1, 0xA0 }, + new byte[]{ 0xA1, 0x9D, 0xC5, 0xE9, 0xFD, 0xBD, 0xD6, 0x4A, 0x88, 0x82, 0x28, 0x02, 0x03, 0xCC, 0x6A, 0x75 }, + }; + + private static readonly byte[,] S = + { + { 0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76 }, + { 0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0, 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0 }, + { 0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15 }, + { 0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A, 0x07, 0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75 }, + { 0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0, 0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84 }, + { 0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B, 0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF }, + { 0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85, 0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8 }, + { 0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5, 0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2 }, + { 0xCD, 0x0C, 0x13, 0xEC, 0x5F, 0x97, 0x44, 0x17, 0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73 }, + { 0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88, 0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB }, + { 0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C, 0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79 }, + { 0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9, 0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08 }, + { 0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6, 0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A }, + { 0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E, 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E }, + { 0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF }, + { 0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68, 0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16 }, + }; + + private static byte SBox(byte x) + { + return S[(uint)x >> 4, x & 0xFU]; + } + + private static byte[] SubBytes(byte[] s) + { + byte[] output = new byte[s.Length]; + for(int i = 0; i < 16; ++i) + { + output[i] = SBox(s[i]); + } + return output; + } + + private static byte[] ShiftRows(byte[] s) + { + return new byte[]{ + s[0], s[5], s[10], s[15], + s[4], s[9], s[14], s[3], + s[8], s[13], s[2], s[7], + s[12], s[1], s[6], s[11] + }; + } + + internal static byte[] AesEnc(byte[] s, byte[] rk) + { + s = SubBytes(s); + s = ShiftRows(s); + s = MixColumns(s); + XorTo(rk, s); + return s; + } + + private static byte MulX(byte p) + { + return (byte)(((p & 0x7F) << 1) ^ (((uint)p >> 7) * 0x1BU)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void Xor(ReadOnlySpan x, ReadOnlySpan y, Span z) + { + for (int i = 0; i < z.Length; i++) + { + z[i] = (byte)(x[i] ^ y[i]); + } + } +#else + internal static byte[] Xor(byte[] x, byte[] y, int yStart) + { + byte[] output = new byte[16]; + for (int i = 0; i < output.Length; i++) + { + output[i] = (byte)(x[i] ^ y[yStart++]); + } + return output; + } +#endif + + private static void XorTo(byte[] x, byte[] z) + { + for (int i = 0; i < 16; i += 4) + { + z[i + 0] ^= x[i + 0]; + z[i + 1] ^= x[i + 1]; + z[i + 2] ^= x[i + 2]; + z[i + 3] ^= x[i + 3]; + } + } + + private static byte[] MixColumns(byte[] s) + { + byte[] output = new byte[s.Length]; + int j = 0, i4; + for (int i = 0; i < 4; i++) + { + i4 = i << 2; + output[j++] = (byte)(MulX(s[i4]) ^ MulX(s[i4 + 1]) ^ s[i4 + 1] ^ s[i4 + 2] ^ s[i4 + 3]); + output[j++] = (byte)(s[i4] ^ MulX(s[i4 + 1]) ^ MulX(s[i4 + 2]) ^ s[i4 + 2] ^ s[i4 + 3]); + output[j++] = (byte)(s[i4] ^ s[i4 + 1] ^ MulX(s[i4 + 2]) ^ MulX(s[i4 + 3]) ^ s[i4 + 3]); + output[j++] = (byte)(MulX(s[i4]) ^ s[i4] ^ s[i4 + 1] ^ s[i4 + 2] ^ MulX(s[i4 + 3])); + } + + return output; + } + + public abstract string AlgorithmName { get; } + + public int GetDigestSize() + { + return DIGEST_SIZE; + } + + public abstract int GetByteLength(); + + public abstract void Update(byte input); + + public abstract void BlockUpdate(byte[] input, int inOff, int length); + + public abstract int DoFinal(byte[] output, int outOff); + + public abstract void Reset(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract void BlockUpdate(ReadOnlySpan input); + + public abstract int DoFinal(Span output); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs.meta new file mode 100644 index 00000000..f6b201c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 58663e5f241e0d6489d7ab1a31fed7da +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/HarakaBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs new file mode 100644 index 00000000..88ba20c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs @@ -0,0 +1,515 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// Implementation of Keccak based on following KeccakNISTInterface.c from http://keccak.noekeon.org/ + /// + /// + /// Following the naming conventions used in the C source code to enable easy review of the implementation. + /// + public class KeccakDigest + : IDigest, IMemoable + { + private static readonly ulong[] KeccakRoundConstants = new ulong[]{ + 0x0000000000000001UL, 0x0000000000008082UL, 0x800000000000808aUL, 0x8000000080008000UL, + 0x000000000000808bUL, 0x0000000080000001UL, 0x8000000080008081UL, 0x8000000000008009UL, + 0x000000000000008aUL, 0x0000000000000088UL, 0x0000000080008009UL, 0x000000008000000aUL, + 0x000000008000808bUL, 0x800000000000008bUL, 0x8000000000008089UL, 0x8000000000008003UL, + 0x8000000000008002UL, 0x8000000000000080UL, 0x000000000000800aUL, 0x800000008000000aUL, + 0x8000000080008081UL, 0x8000000000008080UL, 0x0000000080000001UL, 0x8000000080008008UL + }; + + private ulong[] state = new ulong[25]; + protected byte[] dataQueue = new byte[192]; + protected int rate; + protected int bitsInQueue; + protected internal int fixedOutputLength; + protected bool squeezing; + + public KeccakDigest() + : this(288) + { + } + + public KeccakDigest(int bitLength) + { + Init(bitLength); + } + + public KeccakDigest(KeccakDigest source) + { + CopyIn(source); + } + + private void CopyIn(KeccakDigest source) + { + Array.Copy(source.state, 0, this.state, 0, source.state.Length); + Array.Copy(source.dataQueue, 0, this.dataQueue, 0, source.dataQueue.Length); + this.rate = source.rate; + this.bitsInQueue = source.bitsInQueue; + this.fixedOutputLength = source.fixedOutputLength; + this.squeezing = source.squeezing; + } + + public virtual string AlgorithmName + { + get { return "Keccak-" + fixedOutputLength; } + } + + public virtual int GetDigestSize() + { + return fixedOutputLength >> 3; + } + + public virtual void Update(byte input) + { + Absorb(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int len) + { + Absorb(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + Absorb(input); + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { + Squeeze(output, outOff, fixedOutputLength); + + Reset(); + + return GetDigestSize(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + int digestSize = GetDigestSize(); + Squeeze(output[..digestSize]); + + Reset(); + + return digestSize; + } +#endif + + /* + * TODO Possible API change to support partial-byte suffixes. + */ + protected virtual int DoFinal(byte[] output, int outOff, byte partialByte, int partialBits) + { + if (partialBits > 0) + { + AbsorbBits(partialByte, partialBits); + } + + Squeeze(output, outOff, fixedOutputLength); + + Reset(); + + return GetDigestSize(); + } + + public virtual void Reset() + { + Init(fixedOutputLength); + } + + /** + * Return the size of block that the compression function is applied to in bytes. + * + * @return internal byte length of a block. + */ + public virtual int GetByteLength() + { + return rate >> 3; + } + + private void Init(int bitLength) + { + switch (bitLength) + { + case 128: + case 224: + case 256: + case 288: + case 384: + case 512: + InitSponge(1600 - (bitLength << 1)); + break; + default: + throw new ArgumentException("must be one of 128, 224, 256, 288, 384, or 512.", "bitLength"); + } + } + + private void InitSponge(int rate) + { + if (rate <= 0 || rate >= 1600 || (rate & 63) != 0) + throw new InvalidOperationException("invalid rate value"); + + this.rate = rate; + Array.Clear(state, 0, state.Length); + Arrays.Fill(this.dataQueue, (byte)0); + this.bitsInQueue = 0; + this.squeezing = false; + this.fixedOutputLength = (1600 - rate) >> 1; + } + + protected void Absorb(byte data) + { + if ((bitsInQueue & 7) != 0) + throw new InvalidOperationException("attempt to absorb with odd length queue"); + if (squeezing) + throw new InvalidOperationException("attempt to absorb while squeezing"); + + dataQueue[bitsInQueue >> 3] = data; + if ((bitsInQueue += 8) == rate) + { + KeccakAbsorb(dataQueue, 0); + bitsInQueue = 0; + } + } + + protected void Absorb(byte[] data, int off, int len) + { + if ((bitsInQueue & 7) != 0) + throw new InvalidOperationException("attempt to absorb with odd length queue"); + if (squeezing) + throw new InvalidOperationException("attempt to absorb while squeezing"); + + int bytesInQueue = bitsInQueue >> 3; + int rateBytes = rate >> 3; + + int available = rateBytes - bytesInQueue; + if (len < available) + { + Array.Copy(data, off, dataQueue, bytesInQueue, len); + this.bitsInQueue += len << 3; + return; + } + + int count = 0; + if (bytesInQueue > 0) + { + Array.Copy(data, off, dataQueue, bytesInQueue, available); + count += available; + KeccakAbsorb(dataQueue, 0); + } + + int remaining; + while ((remaining = (len - count)) >= rateBytes) + { + KeccakAbsorb(data, off + count); + count += rateBytes; + } + + Array.Copy(data, off + count, dataQueue, 0, remaining); + this.bitsInQueue = remaining << 3; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected void Absorb(ReadOnlySpan data) + { + if ((bitsInQueue & 7) != 0) + throw new InvalidOperationException("attempt to absorb with odd length queue"); + if (squeezing) + throw new InvalidOperationException("attempt to absorb while squeezing"); + + int bytesInQueue = bitsInQueue >> 3; + int rateBytes = rate >> 3; + + int len = data.Length; + int available = rateBytes - bytesInQueue; + if (len < available) + { + data.CopyTo(dataQueue.AsSpan(bytesInQueue)); + this.bitsInQueue += len << 3; + return; + } + + int count = 0; + if (bytesInQueue > 0) + { + data[..available].CopyTo(dataQueue.AsSpan(bytesInQueue)); + count += available; + KeccakAbsorb(dataQueue, 0); + } + + int remaining; + while ((remaining = len - count) >= rateBytes) + { + KeccakAbsorb(data[count..]); + count += rateBytes; + } + + data[count..].CopyTo(dataQueue.AsSpan()); + this.bitsInQueue = remaining << 3; + } +#endif + + protected void AbsorbBits(int data, int bits) + { + if (bits < 1 || bits > 7) + throw new ArgumentException("must be in the range 1 to 7", "bits"); + if ((bitsInQueue & 7) != 0) + throw new InvalidOperationException("attempt to absorb with odd length queue"); + if (squeezing) + throw new InvalidOperationException("attempt to absorb while squeezing"); + + int mask = (1 << bits) - 1; + dataQueue[bitsInQueue >> 3] = (byte)(data & mask); + + // NOTE: After this, bitsInQueue is no longer a multiple of 8, so no more absorbs will work + bitsInQueue += bits; + } + + private void PadAndSwitchToSqueezingPhase() + { + Debug.Assert(bitsInQueue < rate); + + dataQueue[bitsInQueue >> 3] |= (byte)(1 << (bitsInQueue & 7)); + + if (++bitsInQueue == rate) + { + KeccakAbsorb(dataQueue, 0); + } + else + { + int full = bitsInQueue >> 6, partial = bitsInQueue & 63; + int off = 0; + for (int i = 0; i < full; ++i) + { + state[i] ^= Pack.LE_To_UInt64(dataQueue, off); + off += 8; + } + if (partial > 0) + { + ulong mask = (1UL << partial) - 1UL; + state[full] ^= Pack.LE_To_UInt64(dataQueue, off) & mask; + } + } + + state[(rate - 1) >> 6] ^= (1UL << 63); + + bitsInQueue = 0; + squeezing = true; + } + + protected void Squeeze(byte[] output, int offset, long outputLength) + { + if (!squeezing) + { + PadAndSwitchToSqueezingPhase(); + } + if ((outputLength & 7L) != 0L) + throw new InvalidOperationException("outputLength not a multiple of 8"); + + long i = 0; + while (i < outputLength) + { + if (bitsInQueue == 0) + { + KeccakExtract(); + } + int partialBlock = (int)System.Math.Min((long)bitsInQueue, outputLength - i); + Array.Copy(dataQueue, (rate - bitsInQueue) >> 3, output, offset + (int)(i >> 3), partialBlock >> 3); + bitsInQueue -= partialBlock; + i += partialBlock; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected void Squeeze(Span output) + { + if (!squeezing) + { + PadAndSwitchToSqueezingPhase(); + } + long outputLength = (long)output.Length << 3; + + long i = 0; + while (i < outputLength) + { + if (bitsInQueue == 0) + { + KeccakExtract(); + } + int partialBlock = (int)System.Math.Min(bitsInQueue, outputLength - i); + dataQueue.AsSpan((rate - bitsInQueue) >> 3, partialBlock >> 3).CopyTo(output[(int)(i >> 3)..]); + bitsInQueue -= partialBlock; + i += partialBlock; + } + } +#endif + + private void KeccakAbsorb(byte[] data, int off) + { + int count = rate >> 6; + for (int i = 0; i < count; ++i) + { + state[i] ^= Pack.LE_To_UInt64(data, off); + off += 8; + } + + KeccakPermutation(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void KeccakAbsorb(ReadOnlySpan data) + { + int count = rate >> 6, off = 0; + for (int i = 0; i < count; ++i) + { + state[i] ^= Pack.LE_To_UInt64(data[off..]); + off += 8; + } + + KeccakPermutation(); + } +#endif + + private void KeccakExtract() + { + KeccakPermutation(); + + Pack.UInt64_To_LE(state, 0, rate >> 6, dataQueue, 0); + + this.bitsInQueue = rate; + } + + private void KeccakPermutation() + { + ulong[] A = state; + + ulong a00 = A[ 0], a01 = A[ 1], a02 = A[ 2], a03 = A[ 3], a04 = A[ 4]; + ulong a05 = A[ 5], a06 = A[ 6], a07 = A[ 7], a08 = A[ 8], a09 = A[ 9]; + ulong a10 = A[10], a11 = A[11], a12 = A[12], a13 = A[13], a14 = A[14]; + ulong a15 = A[15], a16 = A[16], a17 = A[17], a18 = A[18], a19 = A[19]; + ulong a20 = A[20], a21 = A[21], a22 = A[22], a23 = A[23], a24 = A[24]; + + for (int i = 0; i < 24; i++) + { + // theta + ulong c0 = a00 ^ a05 ^ a10 ^ a15 ^ a20; + ulong c1 = a01 ^ a06 ^ a11 ^ a16 ^ a21; + ulong c2 = a02 ^ a07 ^ a12 ^ a17 ^ a22; + ulong c3 = a03 ^ a08 ^ a13 ^ a18 ^ a23; + ulong c4 = a04 ^ a09 ^ a14 ^ a19 ^ a24; + + ulong d1 = Longs.RotateLeft(c1, 1) ^ c4; + ulong d2 = Longs.RotateLeft(c2, 1) ^ c0; + ulong d3 = Longs.RotateLeft(c3, 1) ^ c1; + ulong d4 = Longs.RotateLeft(c4, 1) ^ c2; + ulong d0 = Longs.RotateLeft(c0, 1) ^ c3; + + a00 ^= d1; a05 ^= d1; a10 ^= d1; a15 ^= d1; a20 ^= d1; + a01 ^= d2; a06 ^= d2; a11 ^= d2; a16 ^= d2; a21 ^= d2; + a02 ^= d3; a07 ^= d3; a12 ^= d3; a17 ^= d3; a22 ^= d3; + a03 ^= d4; a08 ^= d4; a13 ^= d4; a18 ^= d4; a23 ^= d4; + a04 ^= d0; a09 ^= d0; a14 ^= d0; a19 ^= d0; a24 ^= d0; + + // rho/pi + c1 = Longs.RotateLeft(a01, 1); + a01 = Longs.RotateLeft(a06, 44); + a06 = Longs.RotateLeft(a09, 20); + a09 = Longs.RotateLeft(a22, 61); + a22 = Longs.RotateLeft(a14, 39); + a14 = Longs.RotateLeft(a20, 18); + a20 = Longs.RotateLeft(a02, 62); + a02 = Longs.RotateLeft(a12, 43); + a12 = Longs.RotateLeft(a13, 25); + a13 = Longs.RotateLeft(a19, 8); + a19 = Longs.RotateLeft(a23, 56); + a23 = Longs.RotateLeft(a15, 41); + a15 = Longs.RotateLeft(a04, 27); + a04 = Longs.RotateLeft(a24, 14); + a24 = Longs.RotateLeft(a21, 2); + a21 = Longs.RotateLeft(a08, 55); + a08 = Longs.RotateLeft(a16, 45); + a16 = Longs.RotateLeft(a05, 36); + a05 = Longs.RotateLeft(a03, 28); + a03 = Longs.RotateLeft(a18, 21); + a18 = Longs.RotateLeft(a17, 15); + a17 = Longs.RotateLeft(a11, 10); + a11 = Longs.RotateLeft(a07, 6); + a07 = Longs.RotateLeft(a10, 3); + a10 = c1; + + // chi + c0 = a00 ^ (~a01 & a02); + c1 = a01 ^ (~a02 & a03); + a02 ^= ~a03 & a04; + a03 ^= ~a04 & a00; + a04 ^= ~a00 & a01; + a00 = c0; + a01 = c1; + + c0 = a05 ^ (~a06 & a07); + c1 = a06 ^ (~a07 & a08); + a07 ^= ~a08 & a09; + a08 ^= ~a09 & a05; + a09 ^= ~a05 & a06; + a05 = c0; + a06 = c1; + + c0 = a10 ^ (~a11 & a12); + c1 = a11 ^ (~a12 & a13); + a12 ^= ~a13 & a14; + a13 ^= ~a14 & a10; + a14 ^= ~a10 & a11; + a10 = c0; + a11 = c1; + + c0 = a15 ^ (~a16 & a17); + c1 = a16 ^ (~a17 & a18); + a17 ^= ~a18 & a19; + a18 ^= ~a19 & a15; + a19 ^= ~a15 & a16; + a15 = c0; + a16 = c1; + + c0 = a20 ^ (~a21 & a22); + c1 = a21 ^ (~a22 & a23); + a22 ^= ~a23 & a24; + a23 ^= ~a24 & a20; + a24 ^= ~a20 & a21; + a20 = c0; + a21 = c1; + + // iota + a00 ^= KeccakRoundConstants[i]; + } + + A[ 0] = a00; A[ 1] = a01; A[ 2] = a02; A[ 3] = a03; A[ 4] = a04; + A[ 5] = a05; A[ 6] = a06; A[ 7] = a07; A[ 8] = a08; A[ 9] = a09; + A[10] = a10; A[11] = a11; A[12] = a12; A[13] = a13; A[14] = a14; + A[15] = a15; A[16] = a16; A[17] = a17; A[18] = a18; A[19] = a19; + A[20] = a20; A[21] = a21; A[22] = a22; A[23] = a23; A[24] = a24; + } + + public virtual IMemoable Copy() + { + return new KeccakDigest(this); + } + + public virtual void Reset(IMemoable other) + { + CopyIn((KeccakDigest)other); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs.meta new file mode 100644 index 00000000..a204ccab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c192d088e0263af4d8c9ea06cd4a902c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/KeccakDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs new file mode 100644 index 00000000..c805a29a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs @@ -0,0 +1,416 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Base class for SHA-384 and SHA-512. + */ + public abstract class LongDigest + : IDigest, IMemoable + { + private int MyByteLength = 128; + + private byte[] xBuf; + private int xBufOff; + + private long byteCount1; + private long byteCount2; + + internal ulong H1, H2, H3, H4, H5, H6, H7, H8; + + private ulong[] W = new ulong[80]; + private int wOff; + + /** + * Constructor for variable length word + */ + internal LongDigest() + { + xBuf = new byte[8]; + + Reset(); + } + + /** + * Copy constructor. We are using copy constructors in place + * of the object.Clone() interface as this interface is not + * supported by J2ME. + */ + internal LongDigest( + LongDigest t) + { + xBuf = new byte[t.xBuf.Length]; + + CopyIn(t); + } + + protected void CopyIn(LongDigest t) + { + Array.Copy(t.xBuf, 0, xBuf, 0, t.xBuf.Length); + + xBufOff = t.xBufOff; + byteCount1 = t.byteCount1; + byteCount2 = t.byteCount2; + + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + H6 = t.H6; + H7 = t.H7; + H8 = t.H8; + + Array.Copy(t.W, 0, W, 0, t.W.Length); + wOff = t.wOff; + } + + public void Update( + byte input) + { + xBuf[xBufOff++] = input; + + if (xBufOff == xBuf.Length) + { + ProcessWord(xBuf, 0); + xBufOff = 0; + } + + byteCount1++; + } + + public void BlockUpdate( + byte[] input, + int inOff, + int length) + { + // + // fill the current word + // + while ((xBufOff != 0) && (length > 0)) + { + Update(input[inOff]); + + inOff++; + length--; + } + + // + // process whole words. + // + while (length >= xBuf.Length) + { + ProcessWord(input, inOff); + + inOff += xBuf.Length; + length -= xBuf.Length; + byteCount1 += xBuf.Length; + } + + // + // load in the remainder. + // + while (length > 0) + { + Update(input[inOff]); + + inOff++; + length--; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int inOff = 0; + int length = input.Length; + + // + // fill the current word + // + while ((xBufOff != 0) && (length > 0)) + { + Update(input[inOff]); + + inOff++; + length--; + } + + // + // process whole words. + // + while (length >= xBuf.Length) + { + ProcessWord(input.Slice(inOff, xBuf.Length)); + + inOff += xBuf.Length; + length -= xBuf.Length; + byteCount1 += xBuf.Length; + } + + // + // load in the remainder. + // + while (length > 0) + { + Update(input[inOff]); + + inOff++; + length--; + } + } +#endif + + public void Finish() + { + AdjustByteCounts(); + + long lowBitLength = byteCount1 << 3; + long hiBitLength = byteCount2; + + // + // add the pad bytes. + // + Update((byte)128); + + while (xBufOff != 0) + { + Update((byte)0); + } + + ProcessLength(lowBitLength, hiBitLength); + + ProcessBlock(); + } + + public virtual void Reset() + { + byteCount1 = 0; + byteCount2 = 0; + + xBufOff = 0; + for (int i = 0; i < xBuf.Length; i++) + { + xBuf[i] = 0; + } + + wOff = 0; + Array.Clear(W, 0, W.Length); + } + + internal void ProcessWord( + byte[] input, + int inOff) + { + W[wOff] = Pack.BE_To_UInt64(input, inOff); + + if (++wOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal void ProcessWord(ReadOnlySpan word) + { + W[wOff] = Pack.BE_To_UInt64(word); + + if (++wOff == 16) + { + ProcessBlock(); + } + } +#endif + + /** + * adjust the byte counts so that byteCount2 represents the + * upper long (less 3 bits) word of the byte count. + */ + private void AdjustByteCounts() + { + if (byteCount1 > 0x1fffffffffffffffL) + { + byteCount2 += (long)((ulong)byteCount1 >> 61); + byteCount1 &= 0x1fffffffffffffffL; + } + } + + internal void ProcessLength( + long lowW, + long hiW) + { + if (wOff > 14) + { + ProcessBlock(); + } + + W[14] = (ulong)hiW; + W[15] = (ulong)lowW; + } + + internal void ProcessBlock() + { + AdjustByteCounts(); + + // + // expand 16 word block into 80 word blocks. + // + for (int ti = 16; ti <= 79; ++ti) + { + W[ti] = Sigma1(W[ti - 2]) + W[ti - 7] + Sigma0(W[ti - 15]) + W[ti - 16]; + } + + // + // set up working variables. + // + ulong a = H1; + ulong b = H2; + ulong c = H3; + ulong d = H4; + ulong e = H5; + ulong f = H6; + ulong g = H7; + ulong h = H8; + + int t = 0; + for (int i = 0; i < 10; i++) + { + // t = 8 * i + h += Sum1(e) + Ch(e, f, g) + K[t] + W[t++]; + d += h; + h += Sum0(a) + Maj(a, b, c); + + // t = 8 * i + 1 + g += Sum1(d) + Ch(d, e, f) + K[t] + W[t++]; + c += g; + g += Sum0(h) + Maj(h, a, b); + + // t = 8 * i + 2 + f += Sum1(c) + Ch(c, d, e) + K[t] + W[t++]; + b += f; + f += Sum0(g) + Maj(g, h, a); + + // t = 8 * i + 3 + e += Sum1(b) + Ch(b, c, d) + K[t] + W[t++]; + a += e; + e += Sum0(f) + Maj(f, g, h); + + // t = 8 * i + 4 + d += Sum1(a) + Ch(a, b, c) + K[t] + W[t++]; + h += d; + d += Sum0(e) + Maj(e, f, g); + + // t = 8 * i + 5 + c += Sum1(h) + Ch(h, a, b) + K[t] + W[t++]; + g += c; + c += Sum0(d) + Maj(d, e, f); + + // t = 8 * i + 6 + b += Sum1(g) + Ch(g, h, a) + K[t] + W[t++]; + f += b; + b += Sum0(c) + Maj(c, d, e); + + // t = 8 * i + 7 + a += Sum1(f) + Ch(f, g, h) + K[t] + W[t++]; + e += a; + a += Sum0(b) + Maj(b, c, d); + } + + H1 += a; + H2 += b; + H3 += c; + H4 += d; + H5 += e; + H6 += f; + H7 += g; + H8 += h; + + // + // reset the offset and clean out the word buffer. + // + wOff = 0; + Array.Clear(W, 0, 16); + } + + /* SHA-384 and SHA-512 functions (as for SHA-256 but for longs) */ + private static ulong Ch(ulong x, ulong y, ulong z) + { + return (x & y) ^ (~x & z); + } + + private static ulong Maj(ulong x, ulong y, ulong z) + { + return (x & y) ^ (x & z) ^ (y & z); + } + + private static ulong Sum0(ulong x) + { + return ((x << 36) | (x >> 28)) ^ ((x << 30) | (x >> 34)) ^ ((x << 25) | (x >> 39)); + } + + private static ulong Sum1(ulong x) + { + return ((x << 50) | (x >> 14)) ^ ((x << 46) | (x >> 18)) ^ ((x << 23) | (x >> 41)); + } + + private static ulong Sigma0(ulong x) + { + return ((x << 63) | (x >> 1)) ^ ((x << 56) | (x >> 8)) ^ (x >> 7); + } + + private static ulong Sigma1(ulong x) + { + return ((x << 45) | (x >> 19)) ^ ((x << 3) | (x >> 61)) ^ (x >> 6); + } + + /* SHA-384 and SHA-512 Constants + * (represent the first 64 bits of the fractional parts of the + * cube roots of the first sixty-four prime numbers) + */ + internal static readonly ulong[] K = + { + 0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc, + 0x3956c25bf348b538, 0x59f111f1b605d019, 0x923f82a4af194f9b, 0xab1c5ed5da6d8118, + 0xd807aa98a3030242, 0x12835b0145706fbe, 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2, + 0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235, 0xc19bf174cf692694, + 0xe49b69c19ef14ad2, 0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65, + 0x2de92c6f592b0275, 0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5, + 0x983e5152ee66dfab, 0xa831c66d2db43210, 0xb00327c898fb213f, 0xbf597fc7beef0ee4, + 0xc6e00bf33da88fc2, 0xd5a79147930aa725, 0x06ca6351e003826f, 0x142929670a0e6e70, + 0x27b70a8546d22ffc, 0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df, + 0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, 0x92722c851482353b, + 0xa2bfe8a14cf10364, 0xa81a664bbc423001, 0xc24b8b70d0f89791, 0xc76c51a30654be30, + 0xd192e819d6ef5218, 0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8, + 0x19a4c116b8d2d0c8, 0x1e376c085141ab53, 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8, + 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3, + 0x748f82ee5defb2fc, 0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec, + 0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915, 0xc67178f2e372532b, + 0xca273eceea26619c, 0xd186b8c721c0c207, 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178, + 0x06f067aa72176fba, 0x0a637dc5a2c898a6, 0x113f9804bef90dae, 0x1b710b35131c471b, + 0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c, + 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817 + }; + + public int GetByteLength() + { + return MyByteLength; + } + + public abstract string AlgorithmName { get; } + public abstract int GetDigestSize(); + public abstract int DoFinal(byte[] output, int outOff); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract int DoFinal(Span output); +#endif + public abstract IMemoable Copy(); + public abstract void Reset(IMemoable t); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs.meta new file mode 100644 index 00000000..49fadc65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 22ad50beafd5a894b9c3f96b5370a0d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/LongDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs new file mode 100644 index 00000000..73d2ef46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs @@ -0,0 +1,330 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + + /** + * implementation of MD2 + * as outlined in RFC1319 by B.Kaliski from RSA Laboratories April 1992 + */ + public class MD2Digest + : IDigest, IMemoable + { + private const int DigestLength = 16; + private const int BYTE_LENGTH = 16; + + /* X buffer */ + private byte[] X = new byte[48]; + private int xOff; + + /* M buffer */ + + private byte[] M = new byte[16]; + private int mOff; + + /* check sum */ + + private byte[] C = new byte[16]; + private int COff; + + public MD2Digest() + { + Reset(); + } + + public MD2Digest(MD2Digest t) + { + CopyIn(t); + } + + private void CopyIn(MD2Digest t) + { + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + Array.Copy(t.M, 0, M, 0, t.M.Length); + mOff = t.mOff; + Array.Copy(t.C, 0, C, 0, t.C.Length); + COff = t.COff; + } + + /** + * return the algorithm name + * + * @return the algorithm name + */ + public string AlgorithmName + { + get { return "MD2"; } + } + + public int GetDigestSize() + { + return DigestLength; + } + + public int GetByteLength() + { + return BYTE_LENGTH; + } + + /** + * Close the digest, producing the final digest value. The doFinal + * call leaves the digest reset. + * + * @param out the array the digest is to be copied into. + * @param outOff the offset into the out array the digest is to start at. + */ + public int DoFinal(byte[] output, int outOff) + { + // add padding + byte paddingByte = (byte)(M.Length - mOff); + for (int i=mOff;i output) + { + // add padding + byte paddingByte = (byte)(M.Length - mOff); + for (int i = mOff; i < M.Length; i++) + { + M[i] = paddingByte; + } + //do final check sum + ProcessChecksum(M); + // do final block process + ProcessBlock(M); + + ProcessBlock(C); + + X.AsSpan(xOff, 16).CopyTo(output); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the digest back to it's initial state. + */ + public void Reset() + { + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + mOff = 0; + for (int i = 0; i != M.Length; i++) + { + M[i] = 0; + } + COff = 0; + for (int i = 0; i != C.Length; i++) + { + C[i] = 0; + } + } + /** + * update the message digest with a single byte. + * + * @param in the input byte to be entered. + */ + public void Update(byte input) + { + M[mOff++] = input; + + if (mOff == 16) + { + ProcessChecksum(M); + ProcessBlock(M); + mOff = 0; + } + } + + /** + * update the message digest with a block of bytes. + * + * @param in the byte array containing the data. + * @param inOff the offset into the byte array where the data starts. + * @param len the length of the data. + */ + public void BlockUpdate(byte[] input, int inOff, int length) + { + // + // fill the current word + // + while ((mOff != 0) && (length > 0)) + { + Update(input[inOff]); + inOff++; + length--; + } + + // + // process whole words. + // + while (length >= 16) + { + Array.Copy(input,inOff,M,0,16); + ProcessChecksum(M); + ProcessBlock(M); + length -= 16; + inOff += 16; + } + + // + // load in the remainder. + // + while (length > 0) + { + Update(input[inOff]); + inOff++; + length--; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + // + // fill the current word + // + while ((mOff != 0) && (input.Length > 0)) + { + Update(input[0]); + input = input[1..]; + } + + // + // process whole words. + // + while (input.Length >= 16) + { + input[..16].CopyTo(M); + ProcessChecksum(M); + ProcessBlock(M); + input = input[16..]; + } + + // + // load in the remainder. + // + while (input.Length > 0) + { + Update(input[0]); + input = input[1..]; + } + } +#endif + + internal void ProcessChecksum(byte[] m) + { + int L = C[15]; + for (int i=0;i<16;i++) + { + C[i] ^= S[(m[i] ^ L) & 0xff]; + L = C[i]; + } + } + internal void ProcessBlock(byte[] m) + { + for (int i=0;i<16;i++) + { + X[i+16] = m[i]; + X[i+32] = (byte)(m[i] ^ X[i]); + } + // encrypt block + int t = 0; + + for (int j=0;j<18;j++) + { + for (int k=0;k<48;k++) + { + t = X[k] ^= S[t]; + t = t & 0xff; + } + t = (t + j)%256; + } + } + + + + // 256-byte random permutation constructed from the digits of PI + private static readonly byte[] S = { + (byte)41,(byte)46,(byte)67,(byte)201,(byte)162,(byte)216,(byte)124, + (byte)1,(byte)61,(byte)54,(byte)84,(byte)161,(byte)236,(byte)240, + (byte)6,(byte)19,(byte)98,(byte)167,(byte)5,(byte)243,(byte)192, + (byte)199,(byte)115,(byte)140,(byte)152,(byte)147,(byte)43,(byte)217, + (byte)188,(byte)76,(byte)130,(byte)202,(byte)30,(byte)155,(byte)87, + (byte)60,(byte)253,(byte)212,(byte)224,(byte)22,(byte)103,(byte)66, + (byte)111,(byte)24,(byte)138,(byte)23,(byte)229,(byte)18,(byte)190, + (byte)78,(byte)196,(byte)214,(byte)218,(byte)158,(byte)222,(byte)73, + (byte)160,(byte)251,(byte)245,(byte)142,(byte)187,(byte)47,(byte)238, + (byte)122,(byte)169,(byte)104,(byte)121,(byte)145,(byte)21,(byte)178, + (byte)7,(byte)63,(byte)148,(byte)194,(byte)16,(byte)137,(byte)11, + (byte)34,(byte)95,(byte)33,(byte)128,(byte)127,(byte)93,(byte)154, + (byte)90,(byte)144,(byte)50,(byte)39,(byte)53,(byte)62,(byte)204, + (byte)231,(byte)191,(byte)247,(byte)151,(byte)3,(byte)255,(byte)25, + (byte)48,(byte)179,(byte)72,(byte)165,(byte)181,(byte)209,(byte)215, + (byte)94,(byte)146,(byte)42,(byte)172,(byte)86,(byte)170,(byte)198, + (byte)79,(byte)184,(byte)56,(byte)210,(byte)150,(byte)164,(byte)125, + (byte)182,(byte)118,(byte)252,(byte)107,(byte)226,(byte)156,(byte)116, + (byte)4,(byte)241,(byte)69,(byte)157,(byte)112,(byte)89,(byte)100, + (byte)113,(byte)135,(byte)32,(byte)134,(byte)91,(byte)207,(byte)101, + (byte)230,(byte)45,(byte)168,(byte)2,(byte)27,(byte)96,(byte)37, + (byte)173,(byte)174,(byte)176,(byte)185,(byte)246,(byte)28,(byte)70, + (byte)97,(byte)105,(byte)52,(byte)64,(byte)126,(byte)15,(byte)85, + (byte)71,(byte)163,(byte)35,(byte)221,(byte)81,(byte)175,(byte)58, + (byte)195,(byte)92,(byte)249,(byte)206,(byte)186,(byte)197,(byte)234, + (byte)38,(byte)44,(byte)83,(byte)13,(byte)110,(byte)133,(byte)40, + (byte)132, 9,(byte)211,(byte)223,(byte)205,(byte)244,(byte)65, + (byte)129,(byte)77,(byte)82,(byte)106,(byte)220,(byte)55,(byte)200, + (byte)108,(byte)193,(byte)171,(byte)250,(byte)36,(byte)225,(byte)123, + (byte)8,(byte)12,(byte)189,(byte)177,(byte)74,(byte)120,(byte)136, + (byte)149,(byte)139,(byte)227,(byte)99,(byte)232,(byte)109,(byte)233, + (byte)203,(byte)213,(byte)254,(byte)59,(byte)0,(byte)29,(byte)57, + (byte)242,(byte)239,(byte)183,(byte)14,(byte)102,(byte)88,(byte)208, + (byte)228,(byte)166,(byte)119,(byte)114,(byte)248,(byte)235,(byte)117, + (byte)75,(byte)10,(byte)49,(byte)68,(byte)80,(byte)180,(byte)143, + (byte)237,(byte)31,(byte)26,(byte)219,(byte)153,(byte)141,(byte)51, + (byte)159,(byte)17,(byte)131,(byte)20 + }; + + public IMemoable Copy() + { + return new MD2Digest(this); + } + + public void Reset(IMemoable other) + { + MD2Digest d = (MD2Digest)other; + + CopyIn(d); + } + + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs.meta new file mode 100644 index 00000000..8f125bbe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4e909e062ea7a9147877f48fde815da7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD2Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs new file mode 100644 index 00000000..1340d6ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs @@ -0,0 +1,297 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of MD4 as RFC 1320 by R. Rivest, MIT Laboratory for + * Computer Science and RSA Data Security, Inc. + *

+ * NOTE: This algorithm is only included for backwards compatibility + * with legacy applications, it's not secure, don't use it for anything new!

+ */ + public class MD4Digest + : GeneralDigest + { + private const int DigestLength = 16; + + private int H1, H2, H3, H4; // IV's + + private int[] X = new int[16]; + private int xOff; + + /** + * Standard constructor + */ + public MD4Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public MD4Digest(MD4Digest t) : base(t) + { + CopyIn(t); + } + + private void CopyIn(MD4Digest t) + { + base.CopyIn(t); + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "MD4"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff++] = (int)Pack.LE_To_UInt32(input, inOff); + + if (xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff++] = (int)Pack.LE_To_UInt32(word); + + if (xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (int)(bitLength & 0xffffffff); + X[15] = (int)((ulong) bitLength >> 32); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_LE((uint)H1, output, outOff); + Pack.UInt32_To_LE((uint)H2, output, outOff + 4); + Pack.UInt32_To_LE((uint)H3, output, outOff + 8); + Pack.UInt32_To_LE((uint)H4, output, outOff + 12); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE((uint)H1, output); + Pack.UInt32_To_LE((uint)H2, output[4..]); + Pack.UInt32_To_LE((uint)H3, output[8..]); + Pack.UInt32_To_LE((uint)H4, output[12..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables to the IV values. + */ + public override void Reset() + { + base.Reset(); + + H1 = unchecked((int) 0x67452301); + H2 = unchecked((int) 0xefcdab89); + H3 = unchecked((int) 0x98badcfe); + H4 = unchecked((int) 0x10325476); + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + // + // round 1 left rotates + // + private const int S11 = 3; + private const int S12 = 7; + private const int S13 = 11; + private const int S14 = 19; + + // + // round 2 left rotates + // + private const int S21 = 3; + private const int S22 = 5; + private const int S23 = 9; + private const int S24 = 13; + + // + // round 3 left rotates + // + private const int S31 = 3; + private const int S32 = 9; + private const int S33 = 11; + private const int S34 = 15; + + /* + * F, G, H and I are the basic MD4 functions. + */ + private int F( + int u, + int v, + int w) + { + return (u & v) | (~u & w); + } + + private int G( + int u, + int v, + int w) + { + return (u & v) | (u & w) | (v & w); + } + + private int H( + int u, + int v, + int w) + { + return u ^ v ^ w; + } + + internal override void ProcessBlock() + { + int a = H1; + int b = H2; + int c = H3; + int d = H4; + + // + // Round 1 - F cycle, 16 times. + // + a = Integers.RotateLeft((a + F(b, c, d) + X[ 0]), S11); + d = Integers.RotateLeft((d + F(a, b, c) + X[ 1]), S12); + c = Integers.RotateLeft((c + F(d, a, b) + X[ 2]), S13); + b = Integers.RotateLeft((b + F(c, d, a) + X[ 3]), S14); + a = Integers.RotateLeft((a + F(b, c, d) + X[ 4]), S11); + d = Integers.RotateLeft((d + F(a, b, c) + X[ 5]), S12); + c = Integers.RotateLeft((c + F(d, a, b) + X[ 6]), S13); + b = Integers.RotateLeft((b + F(c, d, a) + X[ 7]), S14); + a = Integers.RotateLeft((a + F(b, c, d) + X[ 8]), S11); + d = Integers.RotateLeft((d + F(a, b, c) + X[ 9]), S12); + c = Integers.RotateLeft((c + F(d, a, b) + X[10]), S13); + b = Integers.RotateLeft((b + F(c, d, a) + X[11]), S14); + a = Integers.RotateLeft((a + F(b, c, d) + X[12]), S11); + d = Integers.RotateLeft((d + F(a, b, c) + X[13]), S12); + c = Integers.RotateLeft((c + F(d, a, b) + X[14]), S13); + b = Integers.RotateLeft((b + F(c, d, a) + X[15]), S14); + + // + // Round 2 - G cycle, 16 times. + // + a = Integers.RotateLeft((a + G(b, c, d) + X[ 0] + 0x5a827999), S21); + d = Integers.RotateLeft((d + G(a, b, c) + X[ 4] + 0x5a827999), S22); + c = Integers.RotateLeft((c + G(d, a, b) + X[ 8] + 0x5a827999), S23); + b = Integers.RotateLeft((b + G(c, d, a) + X[12] + 0x5a827999), S24); + a = Integers.RotateLeft((a + G(b, c, d) + X[ 1] + 0x5a827999), S21); + d = Integers.RotateLeft((d + G(a, b, c) + X[ 5] + 0x5a827999), S22); + c = Integers.RotateLeft((c + G(d, a, b) + X[ 9] + 0x5a827999), S23); + b = Integers.RotateLeft((b + G(c, d, a) + X[13] + 0x5a827999), S24); + a = Integers.RotateLeft((a + G(b, c, d) + X[ 2] + 0x5a827999), S21); + d = Integers.RotateLeft((d + G(a, b, c) + X[ 6] + 0x5a827999), S22); + c = Integers.RotateLeft((c + G(d, a, b) + X[10] + 0x5a827999), S23); + b = Integers.RotateLeft((b + G(c, d, a) + X[14] + 0x5a827999), S24); + a = Integers.RotateLeft((a + G(b, c, d) + X[ 3] + 0x5a827999), S21); + d = Integers.RotateLeft((d + G(a, b, c) + X[ 7] + 0x5a827999), S22); + c = Integers.RotateLeft((c + G(d, a, b) + X[11] + 0x5a827999), S23); + b = Integers.RotateLeft((b + G(c, d, a) + X[15] + 0x5a827999), S24); + + // + // Round 3 - H cycle, 16 times. + // + a = Integers.RotateLeft((a + H(b, c, d) + X[ 0] + 0x6ed9eba1), S31); + d = Integers.RotateLeft((d + H(a, b, c) + X[ 8] + 0x6ed9eba1), S32); + c = Integers.RotateLeft((c + H(d, a, b) + X[ 4] + 0x6ed9eba1), S33); + b = Integers.RotateLeft((b + H(c, d, a) + X[12] + 0x6ed9eba1), S34); + a = Integers.RotateLeft((a + H(b, c, d) + X[ 2] + 0x6ed9eba1), S31); + d = Integers.RotateLeft((d + H(a, b, c) + X[10] + 0x6ed9eba1), S32); + c = Integers.RotateLeft((c + H(d, a, b) + X[ 6] + 0x6ed9eba1), S33); + b = Integers.RotateLeft((b + H(c, d, a) + X[14] + 0x6ed9eba1), S34); + a = Integers.RotateLeft((a + H(b, c, d) + X[ 1] + 0x6ed9eba1), S31); + d = Integers.RotateLeft((d + H(a, b, c) + X[ 9] + 0x6ed9eba1), S32); + c = Integers.RotateLeft((c + H(d, a, b) + X[ 5] + 0x6ed9eba1), S33); + b = Integers.RotateLeft((b + H(c, d, a) + X[13] + 0x6ed9eba1), S34); + a = Integers.RotateLeft((a + H(b, c, d) + X[ 3] + 0x6ed9eba1), S31); + d = Integers.RotateLeft((d + H(a, b, c) + X[11] + 0x6ed9eba1), S32); + c = Integers.RotateLeft((c + H(d, a, b) + X[ 7] + 0x6ed9eba1), S33); + b = Integers.RotateLeft((b + H(c, d, a) + X[15] + 0x6ed9eba1), S34); + + H1 += a; + H2 += b; + H3 += c; + H4 += d; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + public override IMemoable Copy() + { + return new MD4Digest(this); + } + + public override void Reset(IMemoable other) + { + MD4Digest d = (MD4Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs.meta new file mode 100644 index 00000000..c43985ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30103169ff457af48aeddd23381fc50c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD4Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs new file mode 100644 index 00000000..45abdd5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs @@ -0,0 +1,343 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of MD5 as outlined in "Handbook of Applied Cryptography", pages 346 - 347. + */ + public class MD5Digest + : GeneralDigest + { + private const int DigestLength = 16; + + private uint H1, H2, H3, H4; // IV's + + private uint[] X = new uint[16]; + private int xOff; + + public MD5Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public MD5Digest(MD5Digest t) + : base(t) + { + CopyIn(t); + } + + private void CopyIn(MD5Digest t) + { + base.CopyIn(t); + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "MD5"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff] = Pack.LE_To_UInt32(input, inOff); + + if (++xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff] = Pack.LE_To_UInt32(word); + + if (++xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + if (xOff == 15) + X[15] = 0; + + ProcessBlock(); + } + + for (int i = xOff; i < 14; ++i) + { + X[i] = 0; + } + + X[14] = (uint)((ulong)bitLength); + X[15] = (uint)((ulong)bitLength >> 32); + } + + public override int DoFinal( + byte[] output, + int outOff) + { + Finish(); + + Pack.UInt32_To_LE(H1, output, outOff); + Pack.UInt32_To_LE(H2, output, outOff + 4); + Pack.UInt32_To_LE(H3, output, outOff + 8); + Pack.UInt32_To_LE(H4, output, outOff + 12); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE(H1, output); + Pack.UInt32_To_LE(H2, output[4..]); + Pack.UInt32_To_LE(H3, output[8..]); + Pack.UInt32_To_LE(H4, output[12..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables to the IV values. + */ + public override void Reset() + { + base.Reset(); + + H1 = 0x67452301; + H2 = 0xefcdab89; + H3 = 0x98badcfe; + H4 = 0x10325476; + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + // + // round 1 left rotates + // + private static readonly int S11 = 7; + private static readonly int S12 = 12; + private static readonly int S13 = 17; + private static readonly int S14 = 22; + + // + // round 2 left rotates + // + private static readonly int S21 = 5; + private static readonly int S22 = 9; + private static readonly int S23 = 14; + private static readonly int S24 = 20; + + // + // round 3 left rotates + // + private static readonly int S31 = 4; + private static readonly int S32 = 11; + private static readonly int S33 = 16; + private static readonly int S34 = 23; + + // + // round 4 left rotates + // + private static readonly int S41 = 6; + private static readonly int S42 = 10; + private static readonly int S43 = 15; + private static readonly int S44 = 21; + + /* + * rotate int x left n bits. + */ + private static uint RotateLeft( + uint x, + int n) + { + return (x << n) | (x >> (32 - n)); + } + + /* + * F, G, H and I are the basic MD5 functions. + */ + private static uint F( + uint u, + uint v, + uint w) + { + return (u & v) | (~u & w); + } + + private static uint G( + uint u, + uint v, + uint w) + { + return (u & w) | (v & ~w); + } + + private static uint H( + uint u, + uint v, + uint w) + { + return u ^ v ^ w; + } + + private static uint K( + uint u, + uint v, + uint w) + { + return v ^ (u | ~w); + } + + internal override void ProcessBlock() + { + uint a = H1; + uint b = H2; + uint c = H3; + uint d = H4; + + // + // Round 1 - F cycle, 16 times. + // + a = RotateLeft((a + F(b, c, d) + X[0] + 0xd76aa478), S11) + b; + d = RotateLeft((d + F(a, b, c) + X[1] + 0xe8c7b756), S12) + a; + c = RotateLeft((c + F(d, a, b) + X[2] + 0x242070db), S13) + d; + b = RotateLeft((b + F(c, d, a) + X[3] + 0xc1bdceee), S14) + c; + a = RotateLeft((a + F(b, c, d) + X[4] + 0xf57c0faf), S11) + b; + d = RotateLeft((d + F(a, b, c) + X[5] + 0x4787c62a), S12) + a; + c = RotateLeft((c + F(d, a, b) + X[6] + 0xa8304613), S13) + d; + b = RotateLeft((b + F(c, d, a) + X[7] + 0xfd469501), S14) + c; + a = RotateLeft((a + F(b, c, d) + X[8] + 0x698098d8), S11) + b; + d = RotateLeft((d + F(a, b, c) + X[9] + 0x8b44f7af), S12) + a; + c = RotateLeft((c + F(d, a, b) + X[10] + 0xffff5bb1), S13) + d; + b = RotateLeft((b + F(c, d, a) + X[11] + 0x895cd7be), S14) + c; + a = RotateLeft((a + F(b, c, d) + X[12] + 0x6b901122), S11) + b; + d = RotateLeft((d + F(a, b, c) + X[13] + 0xfd987193), S12) + a; + c = RotateLeft((c + F(d, a, b) + X[14] + 0xa679438e), S13) + d; + b = RotateLeft((b + F(c, d, a) + X[15] + 0x49b40821), S14) + c; + + // + // Round 2 - G cycle, 16 times. + // + a = RotateLeft((a + G(b, c, d) + X[1] + 0xf61e2562), S21) + b; + d = RotateLeft((d + G(a, b, c) + X[6] + 0xc040b340), S22) + a; + c = RotateLeft((c + G(d, a, b) + X[11] + 0x265e5a51), S23) + d; + b = RotateLeft((b + G(c, d, a) + X[0] + 0xe9b6c7aa), S24) + c; + a = RotateLeft((a + G(b, c, d) + X[5] + 0xd62f105d), S21) + b; + d = RotateLeft((d + G(a, b, c) + X[10] + 0x02441453), S22) + a; + c = RotateLeft((c + G(d, a, b) + X[15] + 0xd8a1e681), S23) + d; + b = RotateLeft((b + G(c, d, a) + X[4] + 0xe7d3fbc8), S24) + c; + a = RotateLeft((a + G(b, c, d) + X[9] + 0x21e1cde6), S21) + b; + d = RotateLeft((d + G(a, b, c) + X[14] + 0xc33707d6), S22) + a; + c = RotateLeft((c + G(d, a, b) + X[3] + 0xf4d50d87), S23) + d; + b = RotateLeft((b + G(c, d, a) + X[8] + 0x455a14ed), S24) + c; + a = RotateLeft((a + G(b, c, d) + X[13] + 0xa9e3e905), S21) + b; + d = RotateLeft((d + G(a, b, c) + X[2] + 0xfcefa3f8), S22) + a; + c = RotateLeft((c + G(d, a, b) + X[7] + 0x676f02d9), S23) + d; + b = RotateLeft((b + G(c, d, a) + X[12] + 0x8d2a4c8a), S24) + c; + + // + // Round 3 - H cycle, 16 times. + // + a = RotateLeft((a + H(b, c, d) + X[5] + 0xfffa3942), S31) + b; + d = RotateLeft((d + H(a, b, c) + X[8] + 0x8771f681), S32) + a; + c = RotateLeft((c + H(d, a, b) + X[11] + 0x6d9d6122), S33) + d; + b = RotateLeft((b + H(c, d, a) + X[14] + 0xfde5380c), S34) + c; + a = RotateLeft((a + H(b, c, d) + X[1] + 0xa4beea44), S31) + b; + d = RotateLeft((d + H(a, b, c) + X[4] + 0x4bdecfa9), S32) + a; + c = RotateLeft((c + H(d, a, b) + X[7] + 0xf6bb4b60), S33) + d; + b = RotateLeft((b + H(c, d, a) + X[10] + 0xbebfbc70), S34) + c; + a = RotateLeft((a + H(b, c, d) + X[13] + 0x289b7ec6), S31) + b; + d = RotateLeft((d + H(a, b, c) + X[0] + 0xeaa127fa), S32) + a; + c = RotateLeft((c + H(d, a, b) + X[3] + 0xd4ef3085), S33) + d; + b = RotateLeft((b + H(c, d, a) + X[6] + 0x04881d05), S34) + c; + a = RotateLeft((a + H(b, c, d) + X[9] + 0xd9d4d039), S31) + b; + d = RotateLeft((d + H(a, b, c) + X[12] + 0xe6db99e5), S32) + a; + c = RotateLeft((c + H(d, a, b) + X[15] + 0x1fa27cf8), S33) + d; + b = RotateLeft((b + H(c, d, a) + X[2] + 0xc4ac5665), S34) + c; + + // + // Round 4 - K cycle, 16 times. + // + a = RotateLeft((a + K(b, c, d) + X[0] + 0xf4292244), S41) + b; + d = RotateLeft((d + K(a, b, c) + X[7] + 0x432aff97), S42) + a; + c = RotateLeft((c + K(d, a, b) + X[14] + 0xab9423a7), S43) + d; + b = RotateLeft((b + K(c, d, a) + X[5] + 0xfc93a039), S44) + c; + a = RotateLeft((a + K(b, c, d) + X[12] + 0x655b59c3), S41) + b; + d = RotateLeft((d + K(a, b, c) + X[3] + 0x8f0ccc92), S42) + a; + c = RotateLeft((c + K(d, a, b) + X[10] + 0xffeff47d), S43) + d; + b = RotateLeft((b + K(c, d, a) + X[1] + 0x85845dd1), S44) + c; + a = RotateLeft((a + K(b, c, d) + X[8] + 0x6fa87e4f), S41) + b; + d = RotateLeft((d + K(a, b, c) + X[15] + 0xfe2ce6e0), S42) + a; + c = RotateLeft((c + K(d, a, b) + X[6] + 0xa3014314), S43) + d; + b = RotateLeft((b + K(c, d, a) + X[13] + 0x4e0811a1), S44) + c; + a = RotateLeft((a + K(b, c, d) + X[4] + 0xf7537e82), S41) + b; + d = RotateLeft((d + K(a, b, c) + X[11] + 0xbd3af235), S42) + a; + c = RotateLeft((c + K(d, a, b) + X[2] + 0x2ad7d2bb), S43) + d; + b = RotateLeft((b + K(c, d, a) + X[9] + 0xeb86d391), S44) + c; + + H1 += a; + H2 += b; + H3 += c; + H4 += d; + + xOff = 0; + } + + public override IMemoable Copy() + { + return new MD5Digest(this); + } + + public override void Reset(IMemoable other) + { + MD5Digest d = (MD5Digest)other; + + CopyIn(d); + } + + } + +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs.meta new file mode 100644 index 00000000..0a28813b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b796d8fcf1612242a0a30ae4f5210a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/MD5Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs new file mode 100644 index 00000000..86606d25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Wrapper removes exposure to the IMemoable interface on an IDigest implementation. + */ + public class NonMemoableDigest + : IDigest + { + protected readonly IDigest mBaseDigest; + + /** + * Base constructor. + * + * @param baseDigest underlying digest to use. + * @exception IllegalArgumentException if baseDigest is null + */ + public NonMemoableDigest(IDigest baseDigest) + { + if (baseDigest == null) + throw new ArgumentNullException("baseDigest"); + + this.mBaseDigest = baseDigest; + } + + public virtual string AlgorithmName + { + get { return mBaseDigest.AlgorithmName; } + } + + public virtual int GetDigestSize() + { + return mBaseDigest.GetDigestSize(); + } + + public virtual void Update(byte input) + { + mBaseDigest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int len) + { + mBaseDigest.BlockUpdate(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + mBaseDigest.BlockUpdate(input); + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { + return mBaseDigest.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + return mBaseDigest.DoFinal(output); + } +#endif + + public virtual void Reset() + { + mBaseDigest.Reset(); + } + + public virtual int GetByteLength() + { + return mBaseDigest.GetByteLength(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs.meta new file mode 100644 index 00000000..cf7d33bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 82a60840f57e81049bfdaea27a443e84 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NonMemoableDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs new file mode 100644 index 00000000..e3f387f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + public class NullDigest : IDigest + { + private readonly MemoryStream bOut = new MemoryStream(); + + public string AlgorithmName + { + get { return "NULL"; } + } + + public int GetByteLength() + { + // TODO Is this okay? + return 0; + } + + public int GetDigestSize() + { + return Convert.ToInt32(bOut.Length); + } + + public void Update(byte b) + { + bOut.WriteByte(b); + } + + public void BlockUpdate(byte[] inBytes, int inOff, int len) + { + bOut.Write(inBytes, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + bOut.Write(input); + } +#endif + + public int DoFinal(byte[] outBytes, int outOff) + { + try + { + byte[] data = bOut.GetBuffer(); + int length = Convert.ToInt32(bOut.Length); + + Array.Copy(data, 0, outBytes, outOff, length); + + return length; + } + finally + { + Reset(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + try + { + byte[] data = bOut.GetBuffer(); + int length = Convert.ToInt32(bOut.Length); + + data.AsSpan(0, length).CopyTo(output); + + return length; + } + finally + { + Reset(); + } + } +#endif + + public void Reset() + { + bOut.SetLength(0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs.meta new file mode 100644 index 00000000..8cc055cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0427788772c120d4fb0f3b7fb8357cb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/NullDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs new file mode 100644 index 00000000..af0f9362 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs @@ -0,0 +1,306 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// ParallelHash - a hash designed to support the efficient hashing of very long strings, by taking advantage, + /// of the parallelism available in modern processors with an optional XOF mode. + /// + /// From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash + /// + /// + public class ParallelHash + : IXof, IDigest + { + private static readonly byte[] N_PARALLEL_HASH = Strings.ToByteArray("ParallelHash"); + + private readonly CShakeDigest cshake; + private readonly CShakeDigest compressor; + private readonly int bitLength; + private readonly int outputLength; + private readonly int B; + private readonly byte[] buffer; + private readonly byte[] compressorBuffer; + + private bool firstOutput; + private int nCount; + private int bufOff; + + /** + * Base constructor. + * + * @param bitLength bit length of the underlying SHAKE function, 128 or 256. + * @param S the customization string - available for local use. + * @param B the blocksize (in bytes) for hashing. + */ + public ParallelHash(int bitLength, byte[] S, int B) + : this(bitLength, S, B, bitLength * 2) + { + + } + + public ParallelHash(int bitLength, byte[] S, int B, int outputSize) + { + this.cshake = new CShakeDigest(bitLength, N_PARALLEL_HASH, S); + this.compressor = new CShakeDigest(bitLength, new byte[0], new byte[0]); + this.bitLength = bitLength; + this.B = B; + this.outputLength = (outputSize + 7) / 8; + this.buffer = new byte[B]; + this.compressorBuffer = new byte[bitLength * 2 / 8]; + + Reset(); + } + + public ParallelHash(ParallelHash source) + { + this.cshake = new CShakeDigest(source.cshake); + this.compressor = new CShakeDigest(source.compressor); + this.bitLength = source.bitLength; + this.B = source.B; + this.outputLength = source.outputLength; + this.buffer = Arrays.Clone(source.buffer); + this.compressorBuffer = Arrays.Clone(source.compressorBuffer); + } + + public virtual string AlgorithmName + { + get { return "ParallelHash" + cshake.AlgorithmName.Substring(6); } + } + + public virtual int GetByteLength() + { + return cshake.GetByteLength(); + } + + public virtual int GetDigestSize() + { + return outputLength; + } + + public virtual void Update(byte b) + { + buffer[bufOff++] = b; + if (bufOff == buffer.Length) + { + Compress(); + } + } + + public virtual void BlockUpdate(byte[] inBuf, int inOff, int len) + { + len = System.Math.Max(0, len); + + // + // fill the current word + // + int i = 0; + if (bufOff != 0) + { + while (i < len && bufOff != buffer.Length) + { + buffer[bufOff++] = inBuf[inOff + i++]; + } + + if (bufOff == buffer.Length) + { + Compress(); + } + } + + if (i < len) + { + while (len - i >= B) + { + Compress(inBuf, inOff + i, B); + i += B; + } + } + + while (i < len) + { + Update(inBuf[inOff + i++]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + // + // fill the current word + // + int i = 0; + if (bufOff != 0) + { + while (i < input.Length && bufOff != buffer.Length) + { + buffer[bufOff++] = input[i++]; + } + + if (bufOff == buffer.Length) + { + Compress(); + } + } + + if (i < input.Length) + { + while (input.Length - i >= B) + { + Compress(input, i, B); + i += B; + } + } + + while (i < input.Length) + { + Update(input[i++]); + } + } +#endif + + private void Compress() + { + Compress(buffer, 0, bufOff); + bufOff = 0; + } + + private void Compress(byte[] buf, int offSet, int len) + { + compressor.BlockUpdate(buf, offSet, len); + compressor.OutputFinal(compressorBuffer, 0, compressorBuffer.Length); + + cshake.BlockUpdate(compressorBuffer, 0, compressorBuffer.Length); + + nCount++; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Compress(ReadOnlySpan input, int pos, int len) + { + compressor.BlockUpdate(input.Slice(pos, len)); + compressor.OutputFinal(compressorBuffer, 0, compressorBuffer.Length); + + cshake.BlockUpdate(compressorBuffer, 0, compressorBuffer.Length); + + nCount++; + } +#endif + + private void WrapUp(int outputSize) + { + if (bufOff != 0) + { + Compress(); + } + byte[] nOut = XofUtilities.RightEncode(nCount); + byte[] encOut = XofUtilities.RightEncode(outputSize * 8); + + cshake.BlockUpdate(nOut, 0, nOut.Length); + cshake.BlockUpdate(encOut, 0, encOut.Length); + + firstOutput = false; + } + + public virtual int DoFinal(byte[] outBuf, int outOff) + { + if (firstOutput) + { + WrapUp(outputLength); + } + + int rv = cshake.DoFinal(outBuf, outOff); + + Reset(); + + return rv; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + if (firstOutput) + { + WrapUp(outputLength); + } + + int rv = cshake.DoFinal(output); + + Reset(); + + return rv; + } +#endif + + public virtual int OutputFinal(byte[] outBuf, int outOff, int outLen) + { + if (firstOutput) + { + WrapUp(outputLength); + } + + int rv = cshake.OutputFinal(outBuf, outOff, outLen); + + Reset(); + + return rv; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int OutputFinal(Span output) + { + if (firstOutput) + { + WrapUp(outputLength); + } + + int rv = cshake.OutputFinal(output); + + Reset(); + + return rv; + } +#endif + + public virtual int Output(byte[] outBuf, int outOff, int outLen) + { + if (firstOutput) + { + WrapUp(0); + } + + return cshake.Output(outBuf, outOff, outLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int Output(Span output) + { + if (firstOutput) + { + WrapUp(0); + } + + return cshake.Output(output); + } +#endif + + public virtual void Reset() + { + cshake.Reset(); + Arrays.Clear(buffer); + + byte[] hdr = XofUtilities.LeftEncode(B); + cshake.BlockUpdate(hdr, 0, hdr.Length); + + nCount = 0; + bufOff = 0; + firstOutput = true; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs.meta new file mode 100644 index 00000000..47326d14 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 98d360bb82670f245b69255d383defd3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ParallelHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs new file mode 100644 index 00000000..21a81edd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs @@ -0,0 +1,499 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of RipeMD128 + */ + public class RipeMD128Digest + : GeneralDigest + { + private const int DigestLength = 16; + + private int H0, H1, H2, H3; // IV's + + private int[] X = new int[16]; + private int xOff; + + /** + * Standard constructor + */ + public RipeMD128Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public RipeMD128Digest(RipeMD128Digest t) : base(t) + { + CopyIn(t); + } + + private void CopyIn(RipeMD128Digest t) + { + base.CopyIn(t); + + H0 = t.H0; + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "RIPEMD128"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff++] = (int)Pack.LE_To_UInt32(input, inOff); + + if (xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff++] = (int)Pack.LE_To_UInt32(word); + + if (xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (int)(bitLength & 0xffffffff); + X[15] = (int)((ulong) bitLength >> 32); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output, outOff); + Pack.UInt32_To_LE((uint)H1, output, outOff + 4); + Pack.UInt32_To_LE((uint)H2, output, outOff + 8); + Pack.UInt32_To_LE((uint)H3, output, outOff + 12); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output); + Pack.UInt32_To_LE((uint)H1, output[4..]); + Pack.UInt32_To_LE((uint)H2, output[8..]); + Pack.UInt32_To_LE((uint)H3, output[12..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables to the IV values. + */ + public override void Reset() + { + base.Reset(); + + H0 = unchecked((int) 0x67452301); + H1 = unchecked((int) 0xefcdab89); + H2 = unchecked((int) 0x98badcfe); + H3 = unchecked((int) 0x10325476); + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + /* + * rotate int x left n bits. + */ + private int RL( + int x, + int n) + { + return (x << n) | (int) ((uint) x >> (32 - n)); + } + + /* + * f1,f2,f3,f4 are the basic RipeMD128 functions. + */ + + /* + * F + */ + private int F1( + int x, + int y, + int z) + { + return x ^ y ^ z; + } + + /* + * G + */ + private int F2( + int x, + int y, + int z) + { + return (x & y) | (~x & z); + } + + /* + * H + */ + private int F3( + int x, + int y, + int z) + { + return (x | ~y) ^ z; + } + + /* + * I + */ + private int F4( + int x, + int y, + int z) + { + return (x & z) | (y & ~z); + } + + private int F1( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F1(b, c, d) + x, s); + } + + private int F2( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F2(b, c, d) + x + unchecked((int) 0x5a827999), s); + } + + private int F3( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F3(b, c, d) + x + unchecked((int) 0x6ed9eba1), s); + } + + private int F4( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F4(b, c, d) + x + unchecked((int) 0x8f1bbcdc), s); + } + + private int FF1( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F1(b, c, d) + x, s); + } + + private int FF2( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F2(b, c, d) + x + unchecked((int) 0x6d703ef3), s); + } + + private int FF3( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F3(b, c, d) + x + unchecked((int) 0x5c4dd124), s); + } + + private int FF4( + int a, + int b, + int c, + int d, + int x, + int s) + { + return RL(a + F4(b, c, d) + x + unchecked((int) 0x50a28be6), s); + } + + internal override void ProcessBlock() + { + int a, aa; + int b, bb; + int c, cc; + int d, dd; + + a = aa = H0; + b = bb = H1; + c = cc = H2; + d = dd = H3; + + // + // Round 1 + // + a = F1(a, b, c, d, X[ 0], 11); + d = F1(d, a, b, c, X[ 1], 14); + c = F1(c, d, a, b, X[ 2], 15); + b = F1(b, c, d, a, X[ 3], 12); + a = F1(a, b, c, d, X[ 4], 5); + d = F1(d, a, b, c, X[ 5], 8); + c = F1(c, d, a, b, X[ 6], 7); + b = F1(b, c, d, a, X[ 7], 9); + a = F1(a, b, c, d, X[ 8], 11); + d = F1(d, a, b, c, X[ 9], 13); + c = F1(c, d, a, b, X[10], 14); + b = F1(b, c, d, a, X[11], 15); + a = F1(a, b, c, d, X[12], 6); + d = F1(d, a, b, c, X[13], 7); + c = F1(c, d, a, b, X[14], 9); + b = F1(b, c, d, a, X[15], 8); + + // + // Round 2 + // + a = F2(a, b, c, d, X[ 7], 7); + d = F2(d, a, b, c, X[ 4], 6); + c = F2(c, d, a, b, X[13], 8); + b = F2(b, c, d, a, X[ 1], 13); + a = F2(a, b, c, d, X[10], 11); + d = F2(d, a, b, c, X[ 6], 9); + c = F2(c, d, a, b, X[15], 7); + b = F2(b, c, d, a, X[ 3], 15); + a = F2(a, b, c, d, X[12], 7); + d = F2(d, a, b, c, X[ 0], 12); + c = F2(c, d, a, b, X[ 9], 15); + b = F2(b, c, d, a, X[ 5], 9); + a = F2(a, b, c, d, X[ 2], 11); + d = F2(d, a, b, c, X[14], 7); + c = F2(c, d, a, b, X[11], 13); + b = F2(b, c, d, a, X[ 8], 12); + + // + // Round 3 + // + a = F3(a, b, c, d, X[ 3], 11); + d = F3(d, a, b, c, X[10], 13); + c = F3(c, d, a, b, X[14], 6); + b = F3(b, c, d, a, X[ 4], 7); + a = F3(a, b, c, d, X[ 9], 14); + d = F3(d, a, b, c, X[15], 9); + c = F3(c, d, a, b, X[ 8], 13); + b = F3(b, c, d, a, X[ 1], 15); + a = F3(a, b, c, d, X[ 2], 14); + d = F3(d, a, b, c, X[ 7], 8); + c = F3(c, d, a, b, X[ 0], 13); + b = F3(b, c, d, a, X[ 6], 6); + a = F3(a, b, c, d, X[13], 5); + d = F3(d, a, b, c, X[11], 12); + c = F3(c, d, a, b, X[ 5], 7); + b = F3(b, c, d, a, X[12], 5); + + // + // Round 4 + // + a = F4(a, b, c, d, X[ 1], 11); + d = F4(d, a, b, c, X[ 9], 12); + c = F4(c, d, a, b, X[11], 14); + b = F4(b, c, d, a, X[10], 15); + a = F4(a, b, c, d, X[ 0], 14); + d = F4(d, a, b, c, X[ 8], 15); + c = F4(c, d, a, b, X[12], 9); + b = F4(b, c, d, a, X[ 4], 8); + a = F4(a, b, c, d, X[13], 9); + d = F4(d, a, b, c, X[ 3], 14); + c = F4(c, d, a, b, X[ 7], 5); + b = F4(b, c, d, a, X[15], 6); + a = F4(a, b, c, d, X[14], 8); + d = F4(d, a, b, c, X[ 5], 6); + c = F4(c, d, a, b, X[ 6], 5); + b = F4(b, c, d, a, X[ 2], 12); + + // + // Parallel round 1 + // + aa = FF4(aa, bb, cc, dd, X[ 5], 8); + dd = FF4(dd, aa, bb, cc, X[14], 9); + cc = FF4(cc, dd, aa, bb, X[ 7], 9); + bb = FF4(bb, cc, dd, aa, X[ 0], 11); + aa = FF4(aa, bb, cc, dd, X[ 9], 13); + dd = FF4(dd, aa, bb, cc, X[ 2], 15); + cc = FF4(cc, dd, aa, bb, X[11], 15); + bb = FF4(bb, cc, dd, aa, X[ 4], 5); + aa = FF4(aa, bb, cc, dd, X[13], 7); + dd = FF4(dd, aa, bb, cc, X[ 6], 7); + cc = FF4(cc, dd, aa, bb, X[15], 8); + bb = FF4(bb, cc, dd, aa, X[ 8], 11); + aa = FF4(aa, bb, cc, dd, X[ 1], 14); + dd = FF4(dd, aa, bb, cc, X[10], 14); + cc = FF4(cc, dd, aa, bb, X[ 3], 12); + bb = FF4(bb, cc, dd, aa, X[12], 6); + + // + // Parallel round 2 + // + aa = FF3(aa, bb, cc, dd, X[ 6], 9); + dd = FF3(dd, aa, bb, cc, X[11], 13); + cc = FF3(cc, dd, aa, bb, X[ 3], 15); + bb = FF3(bb, cc, dd, aa, X[ 7], 7); + aa = FF3(aa, bb, cc, dd, X[ 0], 12); + dd = FF3(dd, aa, bb, cc, X[13], 8); + cc = FF3(cc, dd, aa, bb, X[ 5], 9); + bb = FF3(bb, cc, dd, aa, X[10], 11); + aa = FF3(aa, bb, cc, dd, X[14], 7); + dd = FF3(dd, aa, bb, cc, X[15], 7); + cc = FF3(cc, dd, aa, bb, X[ 8], 12); + bb = FF3(bb, cc, dd, aa, X[12], 7); + aa = FF3(aa, bb, cc, dd, X[ 4], 6); + dd = FF3(dd, aa, bb, cc, X[ 9], 15); + cc = FF3(cc, dd, aa, bb, X[ 1], 13); + bb = FF3(bb, cc, dd, aa, X[ 2], 11); + + // + // Parallel round 3 + // + aa = FF2(aa, bb, cc, dd, X[15], 9); + dd = FF2(dd, aa, bb, cc, X[ 5], 7); + cc = FF2(cc, dd, aa, bb, X[ 1], 15); + bb = FF2(bb, cc, dd, aa, X[ 3], 11); + aa = FF2(aa, bb, cc, dd, X[ 7], 8); + dd = FF2(dd, aa, bb, cc, X[14], 6); + cc = FF2(cc, dd, aa, bb, X[ 6], 6); + bb = FF2(bb, cc, dd, aa, X[ 9], 14); + aa = FF2(aa, bb, cc, dd, X[11], 12); + dd = FF2(dd, aa, bb, cc, X[ 8], 13); + cc = FF2(cc, dd, aa, bb, X[12], 5); + bb = FF2(bb, cc, dd, aa, X[ 2], 14); + aa = FF2(aa, bb, cc, dd, X[10], 13); + dd = FF2(dd, aa, bb, cc, X[ 0], 13); + cc = FF2(cc, dd, aa, bb, X[ 4], 7); + bb = FF2(bb, cc, dd, aa, X[13], 5); + + // + // Parallel round 4 + // + aa = FF1(aa, bb, cc, dd, X[ 8], 15); + dd = FF1(dd, aa, bb, cc, X[ 6], 5); + cc = FF1(cc, dd, aa, bb, X[ 4], 8); + bb = FF1(bb, cc, dd, aa, X[ 1], 11); + aa = FF1(aa, bb, cc, dd, X[ 3], 14); + dd = FF1(dd, aa, bb, cc, X[11], 14); + cc = FF1(cc, dd, aa, bb, X[15], 6); + bb = FF1(bb, cc, dd, aa, X[ 0], 14); + aa = FF1(aa, bb, cc, dd, X[ 5], 6); + dd = FF1(dd, aa, bb, cc, X[12], 9); + cc = FF1(cc, dd, aa, bb, X[ 2], 12); + bb = FF1(bb, cc, dd, aa, X[13], 9); + aa = FF1(aa, bb, cc, dd, X[ 9], 12); + dd = FF1(dd, aa, bb, cc, X[ 7], 5); + cc = FF1(cc, dd, aa, bb, X[10], 15); + bb = FF1(bb, cc, dd, aa, X[14], 8); + + dd += c + H1; // final result for H0 + + // + // combine the results + // + H1 = H2 + d + aa; + H2 = H3 + a + bb; + H3 = H0 + b + cc; + H0 = dd; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + public override IMemoable Copy() + { + return new RipeMD128Digest(this); + } + + public override void Reset(IMemoable other) + { + RipeMD128Digest d = (RipeMD128Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs.meta new file mode 100644 index 00000000..1cbb466a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 45af7eb1eb4624a47b69ef38eb873350 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD128Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs new file mode 100644 index 00000000..a02c26eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs @@ -0,0 +1,461 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of RipeMD see, + * http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html + */ + public class RipeMD160Digest + : GeneralDigest + { + private const int DigestLength = 20; + + private int H0, H1, H2, H3, H4; // IV's + + private int[] X = new int[16]; + private int xOff; + + /** + * Standard constructor + */ + public RipeMD160Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public RipeMD160Digest(RipeMD160Digest t) : base(t) + { + CopyIn(t); + } + + private void CopyIn(RipeMD160Digest t) + { + base.CopyIn(t); + + H0 = t.H0; + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "RIPEMD160"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff++] = (int)Pack.LE_To_UInt32(input, inOff); + + if (xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff++] = (int)Pack.LE_To_UInt32(word); + + if (xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (int)(bitLength & 0xffffffff); + X[15] = (int)((ulong) bitLength >> 32); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output, outOff); + Pack.UInt32_To_LE((uint)H1, output, outOff + 4); + Pack.UInt32_To_LE((uint)H2, output, outOff + 8); + Pack.UInt32_To_LE((uint)H3, output, outOff + 12); + Pack.UInt32_To_LE((uint)H4, output, outOff + 16); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output); + Pack.UInt32_To_LE((uint)H1, output[4..]); + Pack.UInt32_To_LE((uint)H2, output[8..]); + Pack.UInt32_To_LE((uint)H3, output[12..]); + Pack.UInt32_To_LE((uint)H4, output[16..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables to the IV values. + */ + public override void Reset() + { + base.Reset(); + + H0 = unchecked((int) 0x67452301); + H1 = unchecked((int) 0xefcdab89); + H2 = unchecked((int) 0x98badcfe); + H3 = unchecked((int) 0x10325476); + H4 = unchecked((int) 0xc3d2e1f0); + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + /* + * rotate int x left n bits. + */ + private int RL( + int x, + int n) + { + return (x << n) | (int) ((uint) x >> (32 - n)); + } + + /* + * f1,f2,f3,f4,f5 are the basic RipeMD160 functions. + */ + + /* + * rounds 0-15 + */ + private int F1( + int x, + int y, + int z) + { + return x ^ y ^ z; + } + + /* + * rounds 16-31 + */ + private int F2( + int x, + int y, + int z) + { + return (x & y) | (~x & z); + } + + /* + * rounds 32-47 + */ + private int F3( + int x, + int y, + int z) + { + return (x | ~y) ^ z; + } + + /* + * rounds 48-63 + */ + private int F4( + int x, + int y, + int z) + { + return (x & z) | (y & ~z); + } + + /* + * rounds 64-79 + */ + private int F5( + int x, + int y, + int z) + { + return x ^ (y | ~z); + } + + internal override void ProcessBlock() + { + int a, aa; + int b, bb; + int c, cc; + int d, dd; + int e, ee; + + a = aa = H0; + b = bb = H1; + c = cc = H2; + d = dd = H3; + e = ee = H4; + + // + // Rounds 1 - 16 + // + // left + a = RL(a + F1(b,c,d) + X[ 0], 11) + e; c = RL(c, 10); + e = RL(e + F1(a,b,c) + X[ 1], 14) + d; b = RL(b, 10); + d = RL(d + F1(e,a,b) + X[ 2], 15) + c; a = RL(a, 10); + c = RL(c + F1(d,e,a) + X[ 3], 12) + b; e = RL(e, 10); + b = RL(b + F1(c,d,e) + X[ 4], 5) + a; d = RL(d, 10); + a = RL(a + F1(b,c,d) + X[ 5], 8) + e; c = RL(c, 10); + e = RL(e + F1(a,b,c) + X[ 6], 7) + d; b = RL(b, 10); + d = RL(d + F1(e,a,b) + X[ 7], 9) + c; a = RL(a, 10); + c = RL(c + F1(d,e,a) + X[ 8], 11) + b; e = RL(e, 10); + b = RL(b + F1(c,d,e) + X[ 9], 13) + a; d = RL(d, 10); + a = RL(a + F1(b,c,d) + X[10], 14) + e; c = RL(c, 10); + e = RL(e + F1(a,b,c) + X[11], 15) + d; b = RL(b, 10); + d = RL(d + F1(e,a,b) + X[12], 6) + c; a = RL(a, 10); + c = RL(c + F1(d,e,a) + X[13], 7) + b; e = RL(e, 10); + b = RL(b + F1(c,d,e) + X[14], 9) + a; d = RL(d, 10); + a = RL(a + F1(b,c,d) + X[15], 8) + e; c = RL(c, 10); + + // right + aa = RL(aa + F5(bb,cc,dd) + X[ 5] + unchecked((int) 0x50a28be6), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa,bb,cc) + X[14] + unchecked((int) 0x50a28be6), 9) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee,aa,bb) + X[ 7] + unchecked((int) 0x50a28be6), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd,ee,aa) + X[ 0] + unchecked((int) 0x50a28be6), 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc,dd,ee) + X[ 9] + unchecked((int) 0x50a28be6), 13) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb,cc,dd) + X[ 2] + unchecked((int) 0x50a28be6), 15) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa,bb,cc) + X[11] + unchecked((int) 0x50a28be6), 15) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee,aa,bb) + X[ 4] + unchecked((int) 0x50a28be6), 5) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd,ee,aa) + X[13] + unchecked((int) 0x50a28be6), 7) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc,dd,ee) + X[ 6] + unchecked((int) 0x50a28be6), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb,cc,dd) + X[15] + unchecked((int) 0x50a28be6), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa,bb,cc) + X[ 8] + unchecked((int) 0x50a28be6), 11) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee,aa,bb) + X[ 1] + unchecked((int) 0x50a28be6), 14) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd,ee,aa) + X[10] + unchecked((int) 0x50a28be6), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc,dd,ee) + X[ 3] + unchecked((int) 0x50a28be6), 12) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb,cc,dd) + X[12] + unchecked((int) 0x50a28be6), 6) + ee; cc = RL(cc, 10); + + // + // Rounds 16-31 + // + // left + e = RL(e + F2(a,b,c) + X[ 7] + unchecked((int) 0x5a827999), 7) + d; b = RL(b, 10); + d = RL(d + F2(e,a,b) + X[ 4] + unchecked((int) 0x5a827999), 6) + c; a = RL(a, 10); + c = RL(c + F2(d,e,a) + X[13] + unchecked((int) 0x5a827999), 8) + b; e = RL(e, 10); + b = RL(b + F2(c,d,e) + X[ 1] + unchecked((int) 0x5a827999), 13) + a; d = RL(d, 10); + a = RL(a + F2(b,c,d) + X[10] + unchecked((int) 0x5a827999), 11) + e; c = RL(c, 10); + e = RL(e + F2(a,b,c) + X[ 6] + unchecked((int) 0x5a827999), 9) + d; b = RL(b, 10); + d = RL(d + F2(e,a,b) + X[15] + unchecked((int) 0x5a827999), 7) + c; a = RL(a, 10); + c = RL(c + F2(d,e,a) + X[ 3] + unchecked((int) 0x5a827999), 15) + b; e = RL(e, 10); + b = RL(b + F2(c,d,e) + X[12] + unchecked((int) 0x5a827999), 7) + a; d = RL(d, 10); + a = RL(a + F2(b,c,d) + X[ 0] + unchecked((int) 0x5a827999), 12) + e; c = RL(c, 10); + e = RL(e + F2(a,b,c) + X[ 9] + unchecked((int) 0x5a827999), 15) + d; b = RL(b, 10); + d = RL(d + F2(e,a,b) + X[ 5] + unchecked((int) 0x5a827999), 9) + c; a = RL(a, 10); + c = RL(c + F2(d,e,a) + X[ 2] + unchecked((int) 0x5a827999), 11) + b; e = RL(e, 10); + b = RL(b + F2(c,d,e) + X[14] + unchecked((int) 0x5a827999), 7) + a; d = RL(d, 10); + a = RL(a + F2(b,c,d) + X[11] + unchecked((int) 0x5a827999), 13) + e; c = RL(c, 10); + e = RL(e + F2(a,b,c) + X[ 8] + unchecked((int) 0x5a827999), 12) + d; b = RL(b, 10); + + // right + ee = RL(ee + F4(aa,bb,cc) + X[ 6] + unchecked((int) 0x5c4dd124), 9) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee,aa,bb) + X[11] + unchecked((int) 0x5c4dd124), 13) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd,ee,aa) + X[ 3] + unchecked((int) 0x5c4dd124), 15) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc,dd,ee) + X[ 7] + unchecked((int) 0x5c4dd124), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb,cc,dd) + X[ 0] + unchecked((int) 0x5c4dd124), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa,bb,cc) + X[13] + unchecked((int) 0x5c4dd124), 8) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee,aa,bb) + X[ 5] + unchecked((int) 0x5c4dd124), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd,ee,aa) + X[10] + unchecked((int) 0x5c4dd124), 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc,dd,ee) + X[14] + unchecked((int) 0x5c4dd124), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb,cc,dd) + X[15] + unchecked((int) 0x5c4dd124), 7) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa,bb,cc) + X[ 8] + unchecked((int) 0x5c4dd124), 12) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee,aa,bb) + X[12] + unchecked((int) 0x5c4dd124), 7) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd,ee,aa) + X[ 4] + unchecked((int) 0x5c4dd124), 6) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc,dd,ee) + X[ 9] + unchecked((int) 0x5c4dd124), 15) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb,cc,dd) + X[ 1] + unchecked((int) 0x5c4dd124), 13) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa,bb,cc) + X[ 2] + unchecked((int) 0x5c4dd124), 11) + dd; bb = RL(bb, 10); + + // + // Rounds 32-47 + // + // left + d = RL(d + F3(e,a,b) + X[ 3] + unchecked((int) 0x6ed9eba1), 11) + c; a = RL(a, 10); + c = RL(c + F3(d,e,a) + X[10] + unchecked((int) 0x6ed9eba1), 13) + b; e = RL(e, 10); + b = RL(b + F3(c,d,e) + X[14] + unchecked((int) 0x6ed9eba1), 6) + a; d = RL(d, 10); + a = RL(a + F3(b,c,d) + X[ 4] + unchecked((int) 0x6ed9eba1), 7) + e; c = RL(c, 10); + e = RL(e + F3(a,b,c) + X[ 9] + unchecked((int) 0x6ed9eba1), 14) + d; b = RL(b, 10); + d = RL(d + F3(e,a,b) + X[15] + unchecked((int) 0x6ed9eba1), 9) + c; a = RL(a, 10); + c = RL(c + F3(d,e,a) + X[ 8] + unchecked((int) 0x6ed9eba1), 13) + b; e = RL(e, 10); + b = RL(b + F3(c,d,e) + X[ 1] + unchecked((int) 0x6ed9eba1), 15) + a; d = RL(d, 10); + a = RL(a + F3(b,c,d) + X[ 2] + unchecked((int) 0x6ed9eba1), 14) + e; c = RL(c, 10); + e = RL(e + F3(a,b,c) + X[ 7] + unchecked((int) 0x6ed9eba1), 8) + d; b = RL(b, 10); + d = RL(d + F3(e,a,b) + X[ 0] + unchecked((int) 0x6ed9eba1), 13) + c; a = RL(a, 10); + c = RL(c + F3(d,e,a) + X[ 6] + unchecked((int) 0x6ed9eba1), 6) + b; e = RL(e, 10); + b = RL(b + F3(c,d,e) + X[13] + unchecked((int) 0x6ed9eba1), 5) + a; d = RL(d, 10); + a = RL(a + F3(b,c,d) + X[11] + unchecked((int) 0x6ed9eba1), 12) + e; c = RL(c, 10); + e = RL(e + F3(a,b,c) + X[ 5] + unchecked((int) 0x6ed9eba1), 7) + d; b = RL(b, 10); + d = RL(d + F3(e,a,b) + X[12] + unchecked((int) 0x6ed9eba1), 5) + c; a = RL(a, 10); + + // right + dd = RL(dd + F3(ee,aa,bb) + X[15] + unchecked((int) 0x6d703ef3), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd,ee,aa) + X[ 5] + unchecked((int) 0x6d703ef3), 7) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc,dd,ee) + X[ 1] + unchecked((int) 0x6d703ef3), 15) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb,cc,dd) + X[ 3] + unchecked((int) 0x6d703ef3), 11) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa,bb,cc) + X[ 7] + unchecked((int) 0x6d703ef3), 8) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee,aa,bb) + X[14] + unchecked((int) 0x6d703ef3), 6) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd,ee,aa) + X[ 6] + unchecked((int) 0x6d703ef3), 6) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc,dd,ee) + X[ 9] + unchecked((int) 0x6d703ef3), 14) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb,cc,dd) + X[11] + unchecked((int) 0x6d703ef3), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa,bb,cc) + X[ 8] + unchecked((int) 0x6d703ef3), 13) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee,aa,bb) + X[12] + unchecked((int) 0x6d703ef3), 5) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd,ee,aa) + X[ 2] + unchecked((int) 0x6d703ef3), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc,dd,ee) + X[10] + unchecked((int) 0x6d703ef3), 13) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb,cc,dd) + X[ 0] + unchecked((int) 0x6d703ef3), 13) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa,bb,cc) + X[ 4] + unchecked((int) 0x6d703ef3), 7) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee,aa,bb) + X[13] + unchecked((int) 0x6d703ef3), 5) + cc; aa = RL(aa, 10); + + // + // Rounds 48-63 + // + // left + c = RL(c + F4(d,e,a) + X[ 1] + unchecked((int) 0x8f1bbcdc), 11) + b; e = RL(e, 10); + b = RL(b + F4(c,d,e) + X[ 9] + unchecked((int) 0x8f1bbcdc), 12) + a; d = RL(d, 10); + a = RL(a + F4(b,c,d) + X[11] + unchecked((int) 0x8f1bbcdc), 14) + e; c = RL(c, 10); + e = RL(e + F4(a,b,c) + X[10] + unchecked((int) 0x8f1bbcdc), 15) + d; b = RL(b, 10); + d = RL(d + F4(e,a,b) + X[ 0] + unchecked((int) 0x8f1bbcdc), 14) + c; a = RL(a, 10); + c = RL(c + F4(d,e,a) + X[ 8] + unchecked((int) 0x8f1bbcdc), 15) + b; e = RL(e, 10); + b = RL(b + F4(c,d,e) + X[12] + unchecked((int) 0x8f1bbcdc), 9) + a; d = RL(d, 10); + a = RL(a + F4(b,c,d) + X[ 4] + unchecked((int) 0x8f1bbcdc), 8) + e; c = RL(c, 10); + e = RL(e + F4(a,b,c) + X[13] + unchecked((int) 0x8f1bbcdc), 9) + d; b = RL(b, 10); + d = RL(d + F4(e,a,b) + X[ 3] + unchecked((int) 0x8f1bbcdc), 14) + c; a = RL(a, 10); + c = RL(c + F4(d,e,a) + X[ 7] + unchecked((int) 0x8f1bbcdc), 5) + b; e = RL(e, 10); + b = RL(b + F4(c,d,e) + X[15] + unchecked((int) 0x8f1bbcdc), 6) + a; d = RL(d, 10); + a = RL(a + F4(b,c,d) + X[14] + unchecked((int) 0x8f1bbcdc), 8) + e; c = RL(c, 10); + e = RL(e + F4(a,b,c) + X[ 5] + unchecked((int) 0x8f1bbcdc), 6) + d; b = RL(b, 10); + d = RL(d + F4(e,a,b) + X[ 6] + unchecked((int) 0x8f1bbcdc), 5) + c; a = RL(a, 10); + c = RL(c + F4(d,e,a) + X[ 2] + unchecked((int) 0x8f1bbcdc), 12) + b; e = RL(e, 10); + + // right + cc = RL(cc + F2(dd,ee,aa) + X[ 8] + unchecked((int) 0x7a6d76e9), 15) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc,dd,ee) + X[ 6] + unchecked((int) 0x7a6d76e9), 5) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb,cc,dd) + X[ 4] + unchecked((int) 0x7a6d76e9), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa,bb,cc) + X[ 1] + unchecked((int) 0x7a6d76e9), 11) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee,aa,bb) + X[ 3] + unchecked((int) 0x7a6d76e9), 14) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd,ee,aa) + X[11] + unchecked((int) 0x7a6d76e9), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc,dd,ee) + X[15] + unchecked((int) 0x7a6d76e9), 6) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb,cc,dd) + X[ 0] + unchecked((int) 0x7a6d76e9), 14) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa,bb,cc) + X[ 5] + unchecked((int) 0x7a6d76e9), 6) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee,aa,bb) + X[12] + unchecked((int) 0x7a6d76e9), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd,ee,aa) + X[ 2] + unchecked((int) 0x7a6d76e9), 12) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc,dd,ee) + X[13] + unchecked((int) 0x7a6d76e9), 9) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb,cc,dd) + X[ 9] + unchecked((int) 0x7a6d76e9), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa,bb,cc) + X[ 7] + unchecked((int) 0x7a6d76e9), 5) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee,aa,bb) + X[10] + unchecked((int) 0x7a6d76e9), 15) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd,ee,aa) + X[14] + unchecked((int) 0x7a6d76e9), 8) + bb; ee = RL(ee, 10); + + // + // Rounds 64-79 + // + // left + b = RL(b + F5(c,d,e) + X[ 4] + unchecked((int) 0xa953fd4e), 9) + a; d = RL(d, 10); + a = RL(a + F5(b,c,d) + X[ 0] + unchecked((int) 0xa953fd4e), 15) + e; c = RL(c, 10); + e = RL(e + F5(a,b,c) + X[ 5] + unchecked((int) 0xa953fd4e), 5) + d; b = RL(b, 10); + d = RL(d + F5(e,a,b) + X[ 9] + unchecked((int) 0xa953fd4e), 11) + c; a = RL(a, 10); + c = RL(c + F5(d,e,a) + X[ 7] + unchecked((int) 0xa953fd4e), 6) + b; e = RL(e, 10); + b = RL(b + F5(c,d,e) + X[12] + unchecked((int) 0xa953fd4e), 8) + a; d = RL(d, 10); + a = RL(a + F5(b,c,d) + X[ 2] + unchecked((int) 0xa953fd4e), 13) + e; c = RL(c, 10); + e = RL(e + F5(a,b,c) + X[10] + unchecked((int) 0xa953fd4e), 12) + d; b = RL(b, 10); + d = RL(d + F5(e,a,b) + X[14] + unchecked((int) 0xa953fd4e), 5) + c; a = RL(a, 10); + c = RL(c + F5(d,e,a) + X[ 1] + unchecked((int) 0xa953fd4e), 12) + b; e = RL(e, 10); + b = RL(b + F5(c,d,e) + X[ 3] + unchecked((int) 0xa953fd4e), 13) + a; d = RL(d, 10); + a = RL(a + F5(b,c,d) + X[ 8] + unchecked((int) 0xa953fd4e), 14) + e; c = RL(c, 10); + e = RL(e + F5(a,b,c) + X[11] + unchecked((int) 0xa953fd4e), 11) + d; b = RL(b, 10); + d = RL(d + F5(e,a,b) + X[ 6] + unchecked((int) 0xa953fd4e), 8) + c; a = RL(a, 10); + c = RL(c + F5(d,e,a) + X[15] + unchecked((int) 0xa953fd4e), 5) + b; e = RL(e, 10); + b = RL(b + F5(c,d,e) + X[13] + unchecked((int) 0xa953fd4e), 6) + a; d = RL(d, 10); + + // right + bb = RL(bb + F1(cc,dd,ee) + X[12], 8) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb,cc,dd) + X[15], 5) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa,bb,cc) + X[10], 12) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee,aa,bb) + X[ 4], 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd,ee,aa) + X[ 1], 12) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc,dd,ee) + X[ 5], 5) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb,cc,dd) + X[ 8], 14) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa,bb,cc) + X[ 7], 6) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee,aa,bb) + X[ 6], 8) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd,ee,aa) + X[ 2], 13) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc,dd,ee) + X[13], 6) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb,cc,dd) + X[14], 5) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa,bb,cc) + X[ 0], 15) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee,aa,bb) + X[ 3], 13) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd,ee,aa) + X[ 9], 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc,dd,ee) + X[11], 11) + aa; dd = RL(dd, 10); + + dd += c + H1; + H1 = H2 + d + ee; + H2 = H3 + e + aa; + H3 = H4 + a + bb; + H4 = H0 + b + cc; + H0 = dd; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + public override IMemoable Copy() + { + return new RipeMD160Digest(this); + } + + public override void Reset(IMemoable other) + { + RipeMD160Digest d = (RipeMD160Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs.meta new file mode 100644 index 00000000..f5a08927 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fdd72432e5cbe2f44b0111376025b4ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD160Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs new file mode 100644 index 00000000..c8ab98e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs @@ -0,0 +1,452 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + ///

Implementation of RipeMD256.

+ ///

Note: this algorithm offers the same level of security as RipeMD128.

+ ///
+ public class RipeMD256Digest + : GeneralDigest + { + public override string AlgorithmName + { + get { return "RIPEMD256"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + private const int DigestLength = 32; + + private int H0, H1, H2, H3, H4, H5, H6, H7; // IV's + + private int[] X = new int[16]; + private int xOff; + + /// Standard constructor + public RipeMD256Digest() + { + Reset(); + } + + /// Copy constructor. This will copy the state of the provided + /// message digest. + /// + public RipeMD256Digest(RipeMD256Digest t):base(t) + { + CopyIn(t); + } + + private void CopyIn(RipeMD256Digest t) + { + base.CopyIn(t); + + H0 = t.H0; + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + H6 = t.H6; + H7 = t.H7; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff++] = (int)Pack.LE_To_UInt32(input, inOff); + + if (xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff++] = (int)Pack.LE_To_UInt32(word); + + if (xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (int)(bitLength & 0xffffffff); + X[15] = (int)((ulong)bitLength >> 32); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output, outOff); + Pack.UInt32_To_LE((uint)H1, output, outOff + 4); + Pack.UInt32_To_LE((uint)H2, output, outOff + 8); + Pack.UInt32_To_LE((uint)H3, output, outOff + 12); + Pack.UInt32_To_LE((uint)H4, output, outOff + 16); + Pack.UInt32_To_LE((uint)H5, output, outOff + 20); + Pack.UInt32_To_LE((uint)H6, output, outOff + 24); + Pack.UInt32_To_LE((uint)H7, output, outOff + 28); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output); + Pack.UInt32_To_LE((uint)H1, output[4..]); + Pack.UInt32_To_LE((uint)H2, output[8..]); + Pack.UInt32_To_LE((uint)H3, output[12..]); + Pack.UInt32_To_LE((uint)H4, output[16..]); + Pack.UInt32_To_LE((uint)H5, output[20..]); + Pack.UInt32_To_LE((uint)H6, output[24..]); + Pack.UInt32_To_LE((uint)H7, output[28..]); + + Reset(); + + return DigestLength; + } +#endif + + /// reset the chaining variables to the IV values. + public override void Reset() + { + base.Reset(); + + H0 = unchecked((int)0x67452301); + H1 = unchecked((int)0xefcdab89); + H2 = unchecked((int)0x98badcfe); + H3 = unchecked((int)0x10325476); + H4 = unchecked((int)0x76543210); + H5 = unchecked((int)0xFEDCBA98); + H6 = unchecked((int)0x89ABCDEF); + H7 = unchecked((int)0x01234567); + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + /* + * rotate int x left n bits. + */ + private int RL( + int x, + int n) + { + return (x << n) | (int)((uint)x >> (32 - n)); + } + + /* + * f1,f2,f3,f4 are the basic RipeMD128 functions. + */ + + /* + * F + */ + private int F1(int x, int y, int z) + { + return x ^ y ^ z; + } + + /* + * G + */ + private int F2(int x, int y, int z) + { + return (x & y) | (~ x & z); + } + + /* + * H + */ + private int F3(int x, int y, int z) + { + return (x | ~ y) ^ z; + } + + /* + * I + */ + private int F4(int x, int y, int z) + { + return (x & z) | (y & ~ z); + } + + private int F1(int a, int b, int c, int d, int x, int s) + { + return RL(a + F1(b, c, d) + x, s); + } + + private int F2(int a, int b, int c, int d, int x, int s) + { + return RL(a + F2(b, c, d) + x + unchecked((int)0x5a827999), s); + } + + private int F3(int a, int b, int c, int d, int x, int s) + { + return RL(a + F3(b, c, d) + x + unchecked((int)0x6ed9eba1), s); + } + + private int F4(int a, int b, int c, int d, int x, int s) + { + return RL(a + F4(b, c, d) + x + unchecked((int)0x8f1bbcdc), s); + } + + private int FF1(int a, int b, int c, int d, int x, int s) + { + return RL(a + F1(b, c, d) + x, s); + } + + private int FF2(int a, int b, int c, int d, int x, int s) + { + return RL(a + F2(b, c, d) + x + unchecked((int)0x6d703ef3), s); + } + + private int FF3(int a, int b, int c, int d, int x, int s) + { + return RL(a + F3(b, c, d) + x + unchecked((int)0x5c4dd124), s); + } + + private int FF4(int a, int b, int c, int d, int x, int s) + { + return RL(a + F4(b, c, d) + x + unchecked((int)0x50a28be6), s); + } + + internal override void ProcessBlock() + { + int a, aa; + int b, bb; + int c, cc; + int d, dd; + int t; + + a = H0; + b = H1; + c = H2; + d = H3; + aa = H4; + bb = H5; + cc = H6; + dd = H7; + + // + // Round 1 + // + + a = F1(a, b, c, d, X[0], 11); + d = F1(d, a, b, c, X[1], 14); + c = F1(c, d, a, b, X[2], 15); + b = F1(b, c, d, a, X[3], 12); + a = F1(a, b, c, d, X[4], 5); + d = F1(d, a, b, c, X[5], 8); + c = F1(c, d, a, b, X[6], 7); + b = F1(b, c, d, a, X[7], 9); + a = F1(a, b, c, d, X[8], 11); + d = F1(d, a, b, c, X[9], 13); + c = F1(c, d, a, b, X[10], 14); + b = F1(b, c, d, a, X[11], 15); + a = F1(a, b, c, d, X[12], 6); + d = F1(d, a, b, c, X[13], 7); + c = F1(c, d, a, b, X[14], 9); + b = F1(b, c, d, a, X[15], 8); + + aa = FF4(aa, bb, cc, dd, X[5], 8); + dd = FF4(dd, aa, bb, cc, X[14], 9); + cc = FF4(cc, dd, aa, bb, X[7], 9); + bb = FF4(bb, cc, dd, aa, X[0], 11); + aa = FF4(aa, bb, cc, dd, X[9], 13); + dd = FF4(dd, aa, bb, cc, X[2], 15); + cc = FF4(cc, dd, aa, bb, X[11], 15); + bb = FF4(bb, cc, dd, aa, X[4], 5); + aa = FF4(aa, bb, cc, dd, X[13], 7); + dd = FF4(dd, aa, bb, cc, X[6], 7); + cc = FF4(cc, dd, aa, bb, X[15], 8); + bb = FF4(bb, cc, dd, aa, X[8], 11); + aa = FF4(aa, bb, cc, dd, X[1], 14); + dd = FF4(dd, aa, bb, cc, X[10], 14); + cc = FF4(cc, dd, aa, bb, X[3], 12); + bb = FF4(bb, cc, dd, aa, X[12], 6); + + t = a; a = aa; aa = t; + + // + // Round 2 + // + a = F2(a, b, c, d, X[7], 7); + d = F2(d, a, b, c, X[4], 6); + c = F2(c, d, a, b, X[13], 8); + b = F2(b, c, d, a, X[1], 13); + a = F2(a, b, c, d, X[10], 11); + d = F2(d, a, b, c, X[6], 9); + c = F2(c, d, a, b, X[15], 7); + b = F2(b, c, d, a, X[3], 15); + a = F2(a, b, c, d, X[12], 7); + d = F2(d, a, b, c, X[0], 12); + c = F2(c, d, a, b, X[9], 15); + b = F2(b, c, d, a, X[5], 9); + a = F2(a, b, c, d, X[2], 11); + d = F2(d, a, b, c, X[14], 7); + c = F2(c, d, a, b, X[11], 13); + b = F2(b, c, d, a, X[8], 12); + + aa = FF3(aa, bb, cc, dd, X[6], 9); + dd = FF3(dd, aa, bb, cc, X[11], 13); + cc = FF3(cc, dd, aa, bb, X[3], 15); + bb = FF3(bb, cc, dd, aa, X[7], 7); + aa = FF3(aa, bb, cc, dd, X[0], 12); + dd = FF3(dd, aa, bb, cc, X[13], 8); + cc = FF3(cc, dd, aa, bb, X[5], 9); + bb = FF3(bb, cc, dd, aa, X[10], 11); + aa = FF3(aa, bb, cc, dd, X[14], 7); + dd = FF3(dd, aa, bb, cc, X[15], 7); + cc = FF3(cc, dd, aa, bb, X[8], 12); + bb = FF3(bb, cc, dd, aa, X[12], 7); + aa = FF3(aa, bb, cc, dd, X[4], 6); + dd = FF3(dd, aa, bb, cc, X[9], 15); + cc = FF3(cc, dd, aa, bb, X[1], 13); + bb = FF3(bb, cc, dd, aa, X[2], 11); + + t = b; b = bb; bb = t; + + // + // Round 3 + // + a = F3(a, b, c, d, X[3], 11); + d = F3(d, a, b, c, X[10], 13); + c = F3(c, d, a, b, X[14], 6); + b = F3(b, c, d, a, X[4], 7); + a = F3(a, b, c, d, X[9], 14); + d = F3(d, a, b, c, X[15], 9); + c = F3(c, d, a, b, X[8], 13); + b = F3(b, c, d, a, X[1], 15); + a = F3(a, b, c, d, X[2], 14); + d = F3(d, a, b, c, X[7], 8); + c = F3(c, d, a, b, X[0], 13); + b = F3(b, c, d, a, X[6], 6); + a = F3(a, b, c, d, X[13], 5); + d = F3(d, a, b, c, X[11], 12); + c = F3(c, d, a, b, X[5], 7); + b = F3(b, c, d, a, X[12], 5); + + aa = FF2(aa, bb, cc, dd, X[15], 9); + dd = FF2(dd, aa, bb, cc, X[5], 7); + cc = FF2(cc, dd, aa, bb, X[1], 15); + bb = FF2(bb, cc, dd, aa, X[3], 11); + aa = FF2(aa, bb, cc, dd, X[7], 8); + dd = FF2(dd, aa, bb, cc, X[14], 6); + cc = FF2(cc, dd, aa, bb, X[6], 6); + bb = FF2(bb, cc, dd, aa, X[9], 14); + aa = FF2(aa, bb, cc, dd, X[11], 12); + dd = FF2(dd, aa, bb, cc, X[8], 13); + cc = FF2(cc, dd, aa, bb, X[12], 5); + bb = FF2(bb, cc, dd, aa, X[2], 14); + aa = FF2(aa, bb, cc, dd, X[10], 13); + dd = FF2(dd, aa, bb, cc, X[0], 13); + cc = FF2(cc, dd, aa, bb, X[4], 7); + bb = FF2(bb, cc, dd, aa, X[13], 5); + + t = c; c = cc; cc = t; + + // + // Round 4 + // + a = F4(a, b, c, d, X[1], 11); + d = F4(d, a, b, c, X[9], 12); + c = F4(c, d, a, b, X[11], 14); + b = F4(b, c, d, a, X[10], 15); + a = F4(a, b, c, d, X[0], 14); + d = F4(d, a, b, c, X[8], 15); + c = F4(c, d, a, b, X[12], 9); + b = F4(b, c, d, a, X[4], 8); + a = F4(a, b, c, d, X[13], 9); + d = F4(d, a, b, c, X[3], 14); + c = F4(c, d, a, b, X[7], 5); + b = F4(b, c, d, a, X[15], 6); + a = F4(a, b, c, d, X[14], 8); + d = F4(d, a, b, c, X[5], 6); + c = F4(c, d, a, b, X[6], 5); + b = F4(b, c, d, a, X[2], 12); + + aa = FF1(aa, bb, cc, dd, X[8], 15); + dd = FF1(dd, aa, bb, cc, X[6], 5); + cc = FF1(cc, dd, aa, bb, X[4], 8); + bb = FF1(bb, cc, dd, aa, X[1], 11); + aa = FF1(aa, bb, cc, dd, X[3], 14); + dd = FF1(dd, aa, bb, cc, X[11], 14); + cc = FF1(cc, dd, aa, bb, X[15], 6); + bb = FF1(bb, cc, dd, aa, X[0], 14); + aa = FF1(aa, bb, cc, dd, X[5], 6); + dd = FF1(dd, aa, bb, cc, X[12], 9); + cc = FF1(cc, dd, aa, bb, X[2], 12); + bb = FF1(bb, cc, dd, aa, X[13], 9); + aa = FF1(aa, bb, cc, dd, X[9], 12); + dd = FF1(dd, aa, bb, cc, X[7], 5); + cc = FF1(cc, dd, aa, bb, X[10], 15); + bb = FF1(bb, cc, dd, aa, X[14], 8); + + t = d; d = dd; dd = t; + + H0 += a; + H1 += b; + H2 += c; + H3 += d; + H4 += aa; + H5 += bb; + H6 += cc; + H7 += dd; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + public override IMemoable Copy() + { + return new RipeMD256Digest(this); + } + + public override void Reset(IMemoable other) + { + RipeMD256Digest d = (RipeMD256Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs.meta new file mode 100644 index 00000000..05f768ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2a14f014cfc81b3408d8336c2f7e2029 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD256Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs new file mode 100644 index 00000000..59a2daf6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs @@ -0,0 +1,483 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + ///

Implementation of RipeMD 320.

+ ///

Note: this algorithm offers the same level of security as RipeMD160.

+ ///
+ public class RipeMD320Digest + : GeneralDigest + { + public override string AlgorithmName + { + get { return "RIPEMD320"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + private const int DigestLength = 40; + + private int H0, H1, H2, H3, H4, H5, H6, H7, H8, H9; // IV's + + private int[] X = new int[16]; + private int xOff; + + /// Standard constructor + public RipeMD320Digest() + { + Reset(); + } + + /// Copy constructor. This will copy the state of the provided + /// message digest. + /// + public RipeMD320Digest(RipeMD320Digest t) + : base(t) + { + CopyIn(t); + } + + private void CopyIn(RipeMD320Digest t) + { + base.CopyIn(t); + + H0 = t.H0; + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + H6 = t.H6; + H7 = t.H7; + H8 = t.H8; + H9 = t.H9; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff++] = (int)Pack.LE_To_UInt32(input, inOff); + + if (xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff++] = (int)Pack.LE_To_UInt32(word); + + if (xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (int)(bitLength & 0xffffffff); + X[15] = (int)((ulong)bitLength >> 32); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output, outOff); + Pack.UInt32_To_LE((uint)H1, output, outOff + 4); + Pack.UInt32_To_LE((uint)H2, output, outOff + 8); + Pack.UInt32_To_LE((uint)H3, output, outOff + 12); + Pack.UInt32_To_LE((uint)H4, output, outOff + 16); + Pack.UInt32_To_LE((uint)H5, output, outOff + 20); + Pack.UInt32_To_LE((uint)H6, output, outOff + 24); + Pack.UInt32_To_LE((uint)H7, output, outOff + 28); + Pack.UInt32_To_LE((uint)H8, output, outOff + 32); + Pack.UInt32_To_LE((uint)H9, output, outOff + 36); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_LE((uint)H0, output); + Pack.UInt32_To_LE((uint)H1, output[4..]); + Pack.UInt32_To_LE((uint)H2, output[8..]); + Pack.UInt32_To_LE((uint)H3, output[12..]); + Pack.UInt32_To_LE((uint)H4, output[16..]); + Pack.UInt32_To_LE((uint)H5, output[20..]); + Pack.UInt32_To_LE((uint)H6, output[24..]); + Pack.UInt32_To_LE((uint)H7, output[28..]); + Pack.UInt32_To_LE((uint)H8, output[32..]); + Pack.UInt32_To_LE((uint)H9, output[36..]); + + Reset(); + + return DigestLength; + } +#endif + + /// reset the chaining variables to the IV values. + public override void Reset() + { + base.Reset(); + + H0 = unchecked((int) 0x67452301); + H1 = unchecked((int) 0xefcdab89); + H2 = unchecked((int) 0x98badcfe); + H3 = unchecked((int) 0x10325476); + H4 = unchecked((int) 0xc3d2e1f0); + H5 = unchecked((int) 0x76543210); + H6 = unchecked((int) 0xFEDCBA98); + H7 = unchecked((int) 0x89ABCDEF); + H8 = unchecked((int) 0x01234567); + H9 = unchecked((int) 0x3C2D1E0F); + + xOff = 0; + + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + /* + * rotate int x left n bits. + */ + private int RL( + int x, + int n) + { + return (x << n) | (int)(((uint)x) >> (32 - n)); + } + + /* + * f1,f2,f3,f4,f5 are the basic RipeMD160 functions. + */ + + /* + * rounds 0-15 + */ + private int F1(int x, int y, int z) + { + return x ^ y ^ z; + } + + /* + * rounds 16-31 + */ + private int F2(int x, int y, int z) + { + return (x & y) | (~ x & z); + } + + /* + * rounds 32-47 + */ + private int F3(int x, int y, int z) + { + return (x | ~ y) ^ z; + } + + /* + * rounds 48-63 + */ + private int F4(int x, int y, int z) + { + return (x & z) | (y & ~ z); + } + + /* + * rounds 64-79 + */ + private int F5(int x, int y, int z) + { + return x ^ (y | ~z); + } + + internal override void ProcessBlock() + { + int a, aa; + int b, bb; + int c, cc; + int d, dd; + int e, ee; + int t; + + a = H0; + b = H1; + c = H2; + d = H3; + e = H4; + aa = H5; + bb = H6; + cc = H7; + dd = H8; + ee = H9; + + // + // Rounds 1 - 16 + // + // left + a = RL(a + F1(b, c, d) + X[0], 11) + e; c = RL(c, 10); + e = RL(e + F1(a, b, c) + X[1], 14) + d; b = RL(b, 10); + d = RL(d + F1(e, a, b) + X[2], 15) + c; a = RL(a, 10); + c = RL(c + F1(d, e, a) + X[3], 12) + b; e = RL(e, 10); + b = RL(b + F1(c, d, e) + X[4], 5) + a; d = RL(d, 10); + a = RL(a + F1(b, c, d) + X[5], 8) + e; c = RL(c, 10); + e = RL(e + F1(a, b, c) + X[6], 7) + d; b = RL(b, 10); + d = RL(d + F1(e, a, b) + X[7], 9) + c; a = RL(a, 10); + c = RL(c + F1(d, e, a) + X[8], 11) + b; e = RL(e, 10); + b = RL(b + F1(c, d, e) + X[9], 13) + a; d = RL(d, 10); + a = RL(a + F1(b, c, d) + X[10], 14) + e; c = RL(c, 10); + e = RL(e + F1(a, b, c) + X[11], 15) + d; b = RL(b, 10); + d = RL(d + F1(e, a, b) + X[12], 6) + c; a = RL(a, 10); + c = RL(c + F1(d, e, a) + X[13], 7) + b; e = RL(e, 10); + b = RL(b + F1(c, d, e) + X[14], 9) + a; d = RL(d, 10); + a = RL(a + F1(b, c, d) + X[15], 8) + e; c = RL(c, 10); + + // right + aa = RL(aa + F5(bb, cc, dd) + X[5] + unchecked((int)0x50a28be6), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa, bb, cc) + X[14] + unchecked((int)0x50a28be6), 9) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee, aa, bb) + X[7] + unchecked((int)0x50a28be6), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd, ee, aa) + X[0] + unchecked((int)0x50a28be6), 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc, dd, ee) + X[9] + unchecked((int)0x50a28be6), 13) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb, cc, dd) + X[2] + unchecked((int)0x50a28be6), 15) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa, bb, cc) + X[11] + unchecked((int)0x50a28be6), 15) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee, aa, bb) + X[4] + unchecked((int)0x50a28be6), 5) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd, ee, aa) + X[13] + unchecked((int)0x50a28be6), 7) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc, dd, ee) + X[6] + unchecked((int)0x50a28be6), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb, cc, dd) + X[15] + unchecked((int)0x50a28be6), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F5(aa, bb, cc) + X[8] + unchecked((int)0x50a28be6), 11) + dd; bb = RL(bb, 10); + dd = RL(dd + F5(ee, aa, bb) + X[1] + unchecked((int)0x50a28be6), 14) + cc; aa = RL(aa, 10); + cc = RL(cc + F5(dd, ee, aa) + X[10] + unchecked((int)0x50a28be6), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F5(cc, dd, ee) + X[3] + unchecked((int)0x50a28be6), 12) + aa; dd = RL(dd, 10); + aa = RL(aa + F5(bb, cc, dd) + X[12] + unchecked((int)0x50a28be6), 6) + ee; cc = RL(cc, 10); + + t = a; a = aa; aa = t; + // + // Rounds 16-31 + // + // left + e = RL(e + F2(a, b, c) + X[7] + unchecked((int)0x5a827999), 7) + d; b = RL(b, 10); + d = RL(d + F2(e, a, b) + X[4] + unchecked((int)0x5a827999), 6) + c; a = RL(a, 10); + c = RL(c + F2(d, e, a) + X[13] + unchecked((int)0x5a827999), 8) + b; e = RL(e, 10); + b = RL(b + F2(c, d, e) + X[1] + unchecked((int)0x5a827999), 13) + a; d = RL(d, 10); + a = RL(a + F2(b, c, d) + X[10] + unchecked((int)0x5a827999), 11) + e; c = RL(c, 10); + e = RL(e + F2(a, b, c) + X[6] + unchecked((int)0x5a827999), 9) + d; b = RL(b, 10); + d = RL(d + F2(e, a, b) + X[15] + unchecked((int)0x5a827999), 7) + c; a = RL(a, 10); + c = RL(c + F2(d, e, a) + X[3] + unchecked((int)0x5a827999), 15) + b; e = RL(e, 10); + b = RL(b + F2(c, d, e) + X[12] + unchecked((int)0x5a827999), 7) + a; d = RL(d, 10); + a = RL(a + F2(b, c, d) + X[0] + unchecked((int)0x5a827999), 12) + e; c = RL(c, 10); + e = RL(e + F2(a, b, c) + X[9] + unchecked((int)0x5a827999), 15) + d; b = RL(b, 10); + d = RL(d + F2(e, a, b) + X[5] + unchecked((int)0x5a827999), 9) + c; a = RL(a, 10); + c = RL(c + F2(d, e, a) + X[2] + unchecked((int)0x5a827999), 11) + b; e = RL(e, 10); + b = RL(b + F2(c, d, e) + X[14] + unchecked((int)0x5a827999), 7) + a; d = RL(d, 10); + a = RL(a + F2(b, c, d) + X[11] + unchecked((int)0x5a827999), 13) + e; c = RL(c, 10); + e = RL(e + F2(a, b, c) + X[8] + unchecked((int)0x5a827999), 12) + d; b = RL(b, 10); + + // right + ee = RL(ee + F4(aa, bb, cc) + X[6] + unchecked((int)0x5c4dd124), 9) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee, aa, bb) + X[11] + unchecked((int)0x5c4dd124), 13) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd, ee, aa) + X[3] + unchecked((int)0x5c4dd124), 15) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc, dd, ee) + X[7] + unchecked((int)0x5c4dd124), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb, cc, dd) + X[0] + unchecked((int)0x5c4dd124), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa, bb, cc) + X[13] + unchecked((int)0x5c4dd124), 8) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee, aa, bb) + X[5] + unchecked((int)0x5c4dd124), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd, ee, aa) + X[10] + unchecked((int)0x5c4dd124), 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc, dd, ee) + X[14] + unchecked((int)0x5c4dd124), 7) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb, cc, dd) + X[15] + unchecked((int)0x5c4dd124), 7) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa, bb, cc) + X[8] + unchecked((int)0x5c4dd124), 12) + dd; bb = RL(bb, 10); + dd = RL(dd + F4(ee, aa, bb) + X[12] + unchecked((int)0x5c4dd124), 7) + cc; aa = RL(aa, 10); + cc = RL(cc + F4(dd, ee, aa) + X[4] + unchecked((int)0x5c4dd124), 6) + bb; ee = RL(ee, 10); + bb = RL(bb + F4(cc, dd, ee) + X[9] + unchecked((int)0x5c4dd124), 15) + aa; dd = RL(dd, 10); + aa = RL(aa + F4(bb, cc, dd) + X[1] + unchecked((int)0x5c4dd124), 13) + ee; cc = RL(cc, 10); + ee = RL(ee + F4(aa, bb, cc) + X[2] + unchecked((int)0x5c4dd124), 11) + dd; bb = RL(bb, 10); + + t = b; b = bb; bb = t; + + // + // Rounds 32-47 + // + // left + d = RL(d + F3(e, a, b) + X[3] + unchecked((int)0x6ed9eba1), 11) + c; a = RL(a, 10); + c = RL(c + F3(d, e, a) + X[10] + unchecked((int)0x6ed9eba1), 13) + b; e = RL(e, 10); + b = RL(b + F3(c, d, e) + X[14] + unchecked((int)0x6ed9eba1), 6) + a; d = RL(d, 10); + a = RL(a + F3(b, c, d) + X[4] + unchecked((int)0x6ed9eba1), 7) + e; c = RL(c, 10); + e = RL(e + F3(a, b, c) + X[9] + unchecked((int)0x6ed9eba1), 14) + d; b = RL(b, 10); + d = RL(d + F3(e, a, b) + X[15] + unchecked((int)0x6ed9eba1), 9) + c; a = RL(a, 10); + c = RL(c + F3(d, e, a) + X[8] + unchecked((int)0x6ed9eba1), 13) + b; e = RL(e, 10); + b = RL(b + F3(c, d, e) + X[1] + unchecked((int)0x6ed9eba1), 15) + a; d = RL(d, 10); + a = RL(a + F3(b, c, d) + X[2] + unchecked((int)0x6ed9eba1), 14) + e; c = RL(c, 10); + e = RL(e + F3(a, b, c) + X[7] + unchecked((int)0x6ed9eba1), 8) + d; b = RL(b, 10); + d = RL(d + F3(e, a, b) + X[0] + unchecked((int)0x6ed9eba1), 13) + c; a = RL(a, 10); + c = RL(c + F3(d, e, a) + X[6] + unchecked((int)0x6ed9eba1), 6) + b; e = RL(e, 10); + b = RL(b + F3(c, d, e) + X[13] + unchecked((int)0x6ed9eba1), 5) + a; d = RL(d, 10); + a = RL(a + F3(b, c, d) + X[11] + unchecked((int)0x6ed9eba1), 12) + e; c = RL(c, 10); + e = RL(e + F3(a, b, c) + X[5] + unchecked((int)0x6ed9eba1), 7) + d; b = RL(b, 10); + d = RL(d + F3(e, a, b) + X[12] + unchecked((int)0x6ed9eba1), 5) + c; a = RL(a, 10); + + // right + dd = RL(dd + F3(ee, aa, bb) + X[15] + unchecked((int)0x6d703ef3), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd, ee, aa) + X[5] + unchecked((int)0x6d703ef3), 7) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc, dd, ee) + X[1] + unchecked((int)0x6d703ef3), 15) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb, cc, dd) + X[3] + unchecked((int)0x6d703ef3), 11) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa, bb, cc) + X[7] + unchecked((int)0x6d703ef3), 8) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee, aa, bb) + X[14] + unchecked((int)0x6d703ef3), 6) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd, ee, aa) + X[6] + unchecked((int)0x6d703ef3), 6) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc, dd, ee) + X[9] + unchecked((int)0x6d703ef3), 14) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb, cc, dd) + X[11] + unchecked((int)0x6d703ef3), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa, bb, cc) + X[8] + unchecked((int)0x6d703ef3), 13) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee, aa, bb) + X[12] + unchecked((int)0x6d703ef3), 5) + cc; aa = RL(aa, 10); + cc = RL(cc + F3(dd, ee, aa) + X[2] + unchecked((int)0x6d703ef3), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F3(cc, dd, ee) + X[10] + unchecked((int)0x6d703ef3), 13) + aa; dd = RL(dd, 10); + aa = RL(aa + F3(bb, cc, dd) + X[0] + unchecked((int)0x6d703ef3), 13) + ee; cc = RL(cc, 10); + ee = RL(ee + F3(aa, bb, cc) + X[4] + unchecked((int)0x6d703ef3), 7) + dd; bb = RL(bb, 10); + dd = RL(dd + F3(ee, aa, bb) + X[13] + unchecked((int)0x6d703ef3), 5) + cc; aa = RL(aa, 10); + + t = c; c = cc; cc = t; + + // + // Rounds 48-63 + // + // left + c = RL(c + F4(d, e, a) + X[1] + unchecked((int)0x8f1bbcdc), 11) + b; e = RL(e, 10); + b = RL(b + F4(c, d, e) + X[9] + unchecked((int)0x8f1bbcdc), 12) + a; d = RL(d, 10); + a = RL(a + F4(b, c, d) + X[11] + unchecked((int)0x8f1bbcdc), 14) + e; c = RL(c, 10); + e = RL(e + F4(a, b, c) + X[10] + unchecked((int)0x8f1bbcdc), 15) + d; b = RL(b, 10); + d = RL(d + F4(e, a, b) + X[0] + unchecked((int)0x8f1bbcdc), 14) + c; a = RL(a, 10); + c = RL(c + F4(d, e, a) + X[8] + unchecked((int)0x8f1bbcdc), 15) + b; e = RL(e, 10); + b = RL(b + F4(c, d, e) + X[12] + unchecked((int)0x8f1bbcdc), 9) + a; d = RL(d, 10); + a = RL(a + F4(b, c, d) + X[4] + unchecked((int)0x8f1bbcdc), 8) + e; c = RL(c, 10); + e = RL(e + F4(a, b, c) + X[13] + unchecked((int)0x8f1bbcdc), 9) + d; b = RL(b, 10); + d = RL(d + F4(e, a, b) + X[3] + unchecked((int)0x8f1bbcdc), 14) + c; a = RL(a, 10); + c = RL(c + F4(d, e, a) + X[7] + unchecked((int)0x8f1bbcdc), 5) + b; e = RL(e, 10); + b = RL(b + F4(c, d, e) + X[15] + unchecked((int)0x8f1bbcdc), 6) + a; d = RL(d, 10); + a = RL(a + F4(b, c, d) + X[14] + unchecked((int)0x8f1bbcdc), 8) + e; c = RL(c, 10); + e = RL(e + F4(a, b, c) + X[5] + unchecked((int)0x8f1bbcdc), 6) + d; b = RL(b, 10); + d = RL(d + F4(e, a, b) + X[6] + unchecked((int)0x8f1bbcdc), 5) + c; a = RL(a, 10); + c = RL(c + F4(d, e, a) + X[2] + unchecked((int)0x8f1bbcdc), 12) + b; e = RL(e, 10); + + // right + cc = RL(cc + F2(dd, ee, aa) + X[8] + unchecked((int)0x7a6d76e9), 15) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc, dd, ee) + X[6] + unchecked((int)0x7a6d76e9), 5) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb, cc, dd) + X[4] + unchecked((int)0x7a6d76e9), 8) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa, bb, cc) + X[1] + unchecked((int)0x7a6d76e9), 11) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee, aa, bb) + X[3] + unchecked((int)0x7a6d76e9), 14) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd, ee, aa) + X[11] + unchecked((int)0x7a6d76e9), 14) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc, dd, ee) + X[15] + unchecked((int)0x7a6d76e9), 6) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb, cc, dd) + X[0] + unchecked((int)0x7a6d76e9), 14) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa, bb, cc) + X[5] + unchecked((int)0x7a6d76e9), 6) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee, aa, bb) + X[12] + unchecked((int)0x7a6d76e9), 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd, ee, aa) + X[2] + unchecked((int)0x7a6d76e9), 12) + bb; ee = RL(ee, 10); + bb = RL(bb + F2(cc, dd, ee) + X[13] + unchecked((int)0x7a6d76e9), 9) + aa; dd = RL(dd, 10); + aa = RL(aa + F2(bb, cc, dd) + X[9] + unchecked((int)0x7a6d76e9), 12) + ee; cc = RL(cc, 10); + ee = RL(ee + F2(aa, bb, cc) + X[7] + unchecked((int)0x7a6d76e9), 5) + dd; bb = RL(bb, 10); + dd = RL(dd + F2(ee, aa, bb) + X[10] + unchecked((int)0x7a6d76e9), 15) + cc; aa = RL(aa, 10); + cc = RL(cc + F2(dd, ee, aa) + X[14] + unchecked((int)0x7a6d76e9), 8) + bb; ee = RL(ee, 10); + + t = d; d = dd; dd = t; + + // + // Rounds 64-79 + // + // left + b = RL(b + F5(c, d, e) + X[4] + unchecked((int)0xa953fd4e), 9) + a; d = RL(d, 10); + a = RL(a + F5(b, c, d) + X[0] + unchecked((int)0xa953fd4e), 15) + e; c = RL(c, 10); + e = RL(e + F5(a, b, c) + X[5] + unchecked((int)0xa953fd4e), 5) + d; b = RL(b, 10); + d = RL(d + F5(e, a, b) + X[9] + unchecked((int)0xa953fd4e), 11) + c; a = RL(a, 10); + c = RL(c + F5(d, e, a) + X[7] + unchecked((int)0xa953fd4e), 6) + b; e = RL(e, 10); + b = RL(b + F5(c, d, e) + X[12] + unchecked((int)0xa953fd4e), 8) + a; d = RL(d, 10); + a = RL(a + F5(b, c, d) + X[2] + unchecked((int)0xa953fd4e), 13) + e; c = RL(c, 10); + e = RL(e + F5(a, b, c) + X[10] + unchecked((int)0xa953fd4e), 12) + d; b = RL(b, 10); + d = RL(d + F5(e, a, b) + X[14] + unchecked((int)0xa953fd4e), 5) + c; a = RL(a, 10); + c = RL(c + F5(d, e, a) + X[1] + unchecked((int)0xa953fd4e), 12) + b; e = RL(e, 10); + b = RL(b + F5(c, d, e) + X[3] + unchecked((int)0xa953fd4e), 13) + a; d = RL(d, 10); + a = RL(a + F5(b, c, d) + X[8] + unchecked((int)0xa953fd4e), 14) + e; c = RL(c, 10); + e = RL(e + F5(a, b, c) + X[11] + unchecked((int)0xa953fd4e), 11) + d; b = RL(b, 10); + d = RL(d + F5(e, a, b) + X[6] + unchecked((int)0xa953fd4e), 8) + c; a = RL(a, 10); + c = RL(c + F5(d, e, a) + X[15] + unchecked((int)0xa953fd4e), 5) + b; e = RL(e, 10); + b = RL(b + F5(c, d, e) + X[13] + unchecked((int)0xa953fd4e), 6) + a; d = RL(d, 10); + + // right + bb = RL(bb + F1(cc, dd, ee) + X[12], 8) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb, cc, dd) + X[15], 5) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa, bb, cc) + X[10], 12) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee, aa, bb) + X[4], 9) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd, ee, aa) + X[1], 12) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc, dd, ee) + X[5], 5) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb, cc, dd) + X[8], 14) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa, bb, cc) + X[7], 6) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee, aa, bb) + X[6], 8) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd, ee, aa) + X[2], 13) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc, dd, ee) + X[13], 6) + aa; dd = RL(dd, 10); + aa = RL(aa + F1(bb, cc, dd) + X[14], 5) + ee; cc = RL(cc, 10); + ee = RL(ee + F1(aa, bb, cc) + X[0], 15) + dd; bb = RL(bb, 10); + dd = RL(dd + F1(ee, aa, bb) + X[3], 13) + cc; aa = RL(aa, 10); + cc = RL(cc + F1(dd, ee, aa) + X[9], 11) + bb; ee = RL(ee, 10); + bb = RL(bb + F1(cc, dd, ee) + X[11], 11) + aa; dd = RL(dd, 10); + + // + // do (e, ee) swap as part of assignment. + // + + H0 += a; + H1 += b; + H2 += c; + H3 += d; + H4 += ee; + H5 += aa; + H6 += bb; + H7 += cc; + H8 += dd; + H9 += e; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + for (int i = 0; i != X.Length; i++) + { + X[i] = 0; + } + } + + public override IMemoable Copy() + { + return new RipeMD320Digest(this); + } + + public override void Reset(IMemoable other) + { + RipeMD320Digest d = (RipeMD320Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs.meta new file mode 100644 index 00000000..5d22e384 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 476882eab702ee7499a832a4de9d851b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/RipeMD320Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs new file mode 100644 index 00000000..b30a5360 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// Implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/ + /// + /// + /// Following the naming conventions used in the C source code to enable easy review of the implementation. + /// + public class Sha3Digest + : KeccakDigest + { + private static int CheckBitLength(int bitLength) + { + switch (bitLength) + { + case 224: + case 256: + case 384: + case 512: + return bitLength; + default: + throw new ArgumentException(bitLength + " not supported for SHA-3", "bitLength"); + } + } + + public Sha3Digest() + : this(256) + { + } + + public Sha3Digest(int bitLength) + : base(CheckBitLength(bitLength)) + { + } + + public Sha3Digest(Sha3Digest source) + : base(source) + { + } + + public override string AlgorithmName + { + get { return "SHA3-" + fixedOutputLength; } + } + + public override int DoFinal(byte[] output, int outOff) + { + AbsorbBits(0x02, 2); + + return base.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + AbsorbBits(0x02, 2); + + return base.DoFinal(output); + } +#endif + + /* + * TODO Possible API change to support partial-byte suffixes. + */ + protected override int DoFinal(byte[] output, int outOff, byte partialByte, int partialBits) + { + if (partialBits < 0 || partialBits > 7) + throw new ArgumentException("must be in the range [0,7]", "partialBits"); + + int finalInput = (partialByte & ((1 << partialBits) - 1)) | (0x02 << partialBits); + Debug.Assert(finalInput >= 0); + int finalBits = partialBits + 2; + + if (finalBits >= 8) + { + Absorb((byte)finalInput); + finalBits -= 8; + finalInput >>= 8; + } + + return base.DoFinal(output, outOff, (byte)finalInput, finalBits); + } + + public override IMemoable Copy() + { + return new Sha3Digest(this); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs.meta new file mode 100644 index 00000000..e6bf99dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 88fb31baea5cef347af0fcbaa0d0cbc4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SHA3Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs new file mode 100644 index 00000000..6bac4165 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs @@ -0,0 +1,344 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + + /// + /// Implementation of Chinese SM3 digest as described at + /// http://tools.ietf.org/html/draft-shen-sm3-hash-00 + /// and at .... ( Chinese PDF ) + /// + /// + /// The specification says "process a bit stream", + /// but this is written to process bytes in blocks of 4, + /// meaning this will process 32-bit word groups. + /// But so do also most other digest specifications, + /// including the SHA-256 which was a origin for + /// this specification. + /// + public class SM3Digest + : GeneralDigest + { + private const int DIGEST_LENGTH = 32; // bytes + private const int BLOCK_SIZE = 64 / 4; // of 32 bit ints (16 ints) + + private uint[] V = new uint[DIGEST_LENGTH / 4]; // in 32 bit ints (8 ints) + private uint[] inwords = new uint[BLOCK_SIZE]; + private int xOff; + + // Work-bufs used within processBlock() + private uint[] W = new uint[68]; + + // Round constant T for processBlock() which is 32 bit integer rolled left up to (63 MOD 32) bit positions. + private static readonly uint[] T = new uint[64]; + + static SM3Digest() + { + for (int i = 0; i < 16; ++i) + { + uint t = 0x79CC4519; + T[i] = (t << i) | (t >> (32 - i)); + } + for (int i = 16; i < 64; ++i) + { + int n = i % 32; + uint t = 0x7A879D8A; + T[i] = (t << n) | (t >> (32 - n)); + } + } + + + /// + /// Standard constructor + /// + public SM3Digest() + { + Reset(); + } + + /// + /// Copy constructor. This will copy the state of the provided + /// message digest. + /// + public SM3Digest(SM3Digest t) + : base(t) + { + CopyIn(t); + } + + private void CopyIn(SM3Digest t) + { + Array.Copy(t.V, 0, this.V, 0, this.V.Length); + Array.Copy(t.inwords, 0, this.inwords, 0, this.inwords.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "SM3"; } + } + + public override int GetDigestSize() + { + return DIGEST_LENGTH; + } + + public override IMemoable Copy() + { + return new SM3Digest(this); + } + + public override void Reset(IMemoable other) + { + SM3Digest d = (SM3Digest)other; + + base.CopyIn(d); + CopyIn(d); + } + + /// + /// reset the chaining variables + /// + public override void Reset() + { + base.Reset(); + + this.V[0] = 0x7380166F; + this.V[1] = 0x4914B2B9; + this.V[2] = 0x172442D7; + this.V[3] = 0xDA8A0600; + this.V[4] = 0xA96F30BC; + this.V[5] = 0x163138AA; + this.V[6] = 0xE38DEE4D; + this.V[7] = 0xB0FB0E4E; + + this.xOff = 0; + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_BE(V, output, outOff); + + Reset(); + + return DIGEST_LENGTH; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_BE(V, output); + + Reset(); + + return DIGEST_LENGTH; + } +#endif + + internal override void ProcessWord(byte[] input, int inOff) + { + inwords[xOff++] = Pack.BE_To_UInt32(input, inOff); + + if (this.xOff >= 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + inwords[xOff++] = Pack.BE_To_UInt32(word); + + if (this.xOff >= 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength(long bitLength) + { + if (this.xOff > (BLOCK_SIZE - 2)) + { + // xOff == 15 --> can't fit the 64 bit length field at tail.. + this.inwords[this.xOff] = 0; // fill with zero + ++this.xOff; + + ProcessBlock(); + } + // Fill with zero words, until reach 2nd to last slot + while (this.xOff < (BLOCK_SIZE - 2)) + { + this.inwords[this.xOff] = 0; + ++this.xOff; + } + + // Store input data length in BITS + this.inwords[this.xOff++] = (uint)(bitLength >> 32); + this.inwords[this.xOff++] = (uint)(bitLength); + } + + /* + + 3.4.2. Constants + + + Tj = 79cc4519 when 0 < = j < = 15 + Tj = 7a879d8a when 16 < = j < = 63 + + 3.4.3. Boolean function + + + FFj(X;Y;Z) = X XOR Y XOR Z when 0 < = j < = 15 + = (X AND Y) OR (X AND Z) OR (Y AND Z) when 16 < = j < = 63 + + GGj(X;Y;Z) = X XOR Y XOR Z when 0 < = j < = 15 + = (X AND Y) OR (NOT X AND Z) when 16 < = j < = 63 + + The X, Y, Z in the fomular are words!GBP + + 3.4.4. Permutation function + + + P0(X) = X XOR (X <<< 9) XOR (X <<< 17) ## ROLL, not SHIFT + P1(X) = X XOR (X <<< 15) XOR (X <<< 23) ## ROLL, not SHIFT + + The X in the fomular are a word. + + ---------- + + Each ROLL converted to Java expression: + + ROLL 9 : ((x << 9) | (x >> (32-9)))) + ROLL 17 : ((x << 17) | (x >> (32-17))) + ROLL 15 : ((x << 15) | (x >> (32-15))) + ROLL 23 : ((x << 23) | (x >> (32-23))) + + */ + + private uint P0(uint x) + { + uint r9 = ((x << 9) | (x >> (32 - 9))); + uint r17 = ((x << 17) | (x >> (32 - 17))); + return (x ^ r9 ^ r17); + } + + private uint P1(uint x) + { + uint r15 = ((x << 15) | (x >> (32 - 15))); + uint r23 = ((x << 23) | (x >> (32 - 23))); + return (x ^ r15 ^ r23); + } + + private uint FF0(uint x, uint y, uint z) + { + return (x ^ y ^ z); + } + + private uint FF1(uint x, uint y, uint z) + { + return ((x & y) | (x & z) | (y & z)); + } + + private uint GG0(uint x, uint y, uint z) + { + return (x ^ y ^ z); + } + + private uint GG1(uint x, uint y, uint z) + { + return ((x & y) | ((~x) & z)); + } + + + internal override void ProcessBlock() + { + for (int j = 0; j < 16; ++j) + { + this.W[j] = this.inwords[j]; + } + for (int j = 16; j < 68; ++j) + { + uint wj3 = this.W[j - 3]; + uint r15 = ((wj3 << 15) | (wj3 >> (32 - 15))); + uint wj13 = this.W[j - 13]; + uint r7 = ((wj13 << 7) | (wj13 >> (32 - 7))); + this.W[j] = P1(this.W[j - 16] ^ this.W[j - 9] ^ r15) ^ r7 ^ this.W[j - 6]; + } + + uint A = this.V[0]; + uint B = this.V[1]; + uint C = this.V[2]; + uint D = this.V[3]; + uint E = this.V[4]; + uint F = this.V[5]; + uint G = this.V[6]; + uint H = this.V[7]; + + + for (int j = 0; j < 16; ++j) + { + uint a12 = ((A << 12) | (A >> (32 - 12))); + uint s1_ = a12 + E + T[j]; + uint SS1 = ((s1_ << 7) | (s1_ >> (32 - 7))); + uint SS2 = SS1 ^ a12; + uint Wj = W[j]; + uint W1j = Wj ^ W[j + 4]; + uint TT1 = FF0(A, B, C) + D + SS2 + W1j; + uint TT2 = GG0(E, F, G) + H + SS1 + Wj; + D = C; + C = ((B << 9) | (B >> (32 - 9))); + B = A; + A = TT1; + H = G; + G = ((F << 19) | (F >> (32 - 19))); + F = E; + E = P0(TT2); + } + + // Different FF,GG functions on rounds 16..63 + for (int j = 16; j < 64; ++j) + { + uint a12 = ((A << 12) | (A >> (32 - 12))); + uint s1_ = a12 + E + T[j]; + uint SS1 = ((s1_ << 7) | (s1_ >> (32 - 7))); + uint SS2 = SS1 ^ a12; + uint Wj = W[j]; + uint W1j = Wj ^ W[j + 4]; + uint TT1 = FF1(A, B, C) + D + SS2 + W1j; + uint TT2 = GG1(E, F, G) + H + SS1 + Wj; + D = C; + C = ((B << 9) | (B >> (32 - 9))); + B = A; + A = TT1; + H = G; + G = ((F << 19) | (F >> (32 - 19))); + F = E; + E = P0(TT2); + } + + this.V[0] ^= A; + this.V[1] ^= B; + this.V[2] ^= C; + this.V[3] ^= D; + this.V[4] ^= E; + this.V[5] ^= F; + this.V[6] ^= G; + this.V[7] ^= H; + + this.xOff = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs.meta new file mode 100644 index 00000000..08409440 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0589b095ef908cc4abad41f8b206686b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SM3Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs new file mode 100644 index 00000000..41b03260 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs @@ -0,0 +1,314 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + + /** + * implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349. + * + * It is interesting to ponder why the, apart from the extra IV, the other difference here from MD5 + * is the "endianness" of the word processing! + */ + public class Sha1Digest + : GeneralDigest + { + private const int DigestLength = 20; + + private uint H1, H2, H3, H4, H5; + + private uint[] X = new uint[80]; + private int xOff; + + public Sha1Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha1Digest(Sha1Digest t) + : base(t) + { + CopyIn(t); + } + + private void CopyIn(Sha1Digest t) + { + base.CopyIn(t); + + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "SHA-1"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff] = Pack.BE_To_UInt32(input, inOff); + + if (++xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff] = Pack.BE_To_UInt32(word); + + if (++xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength(long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (uint)((ulong)bitLength >> 32); + X[15] = (uint)((ulong)bitLength); + } + + public override int DoFinal( + byte[] output, + int outOff) + { + Finish(); + + Pack.UInt32_To_BE(H1, output, outOff); + Pack.UInt32_To_BE(H2, output, outOff + 4); + Pack.UInt32_To_BE(H3, output, outOff + 8); + Pack.UInt32_To_BE(H4, output, outOff + 12); + Pack.UInt32_To_BE(H5, output, outOff + 16); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_BE(H1, output); + Pack.UInt32_To_BE(H2, output[4..]); + Pack.UInt32_To_BE(H3, output[8..]); + Pack.UInt32_To_BE(H4, output[12..]); + Pack.UInt32_To_BE(H5, output[16..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + H1 = 0x67452301; + H2 = 0xefcdab89; + H3 = 0x98badcfe; + H4 = 0x10325476; + H5 = 0xc3d2e1f0; + + xOff = 0; + Array.Clear(X, 0, X.Length); + } + + // + // Additive constants + // + private const uint Y1 = 0x5a827999; + private const uint Y2 = 0x6ed9eba1; + private const uint Y3 = 0x8f1bbcdc; + private const uint Y4 = 0xca62c1d6; + + private static uint F(uint u, uint v, uint w) + { + return (u & v) | (~u & w); + } + + private static uint H(uint u, uint v, uint w) + { + return u ^ v ^ w; + } + + private static uint G(uint u, uint v, uint w) + { + return (u & v) | (u & w) | (v & w); + } + + internal override void ProcessBlock() + { + // + // expand 16 word block into 80 word block. + // + for (int i = 16; i < 80; i++) + { + uint t = X[i - 3] ^ X[i - 8] ^ X[i - 14] ^ X[i - 16]; + X[i] = t << 1 | t >> 31; + } + + // + // set up working variables. + // + uint A = H1; + uint B = H2; + uint C = H3; + uint D = H4; + uint E = H5; + + // + // round 1 + // + int idx = 0; + + for (int j = 0; j < 4; j++) + { + // E = rotateLeft(A, 5) + F(B, C, D) + E + X[idx++] + Y1 + // B = rotateLeft(B, 30) + E += (A << 5 | (A >> 27)) + F(B, C, D) + X[idx++] + Y1; + B = B << 30 | (B >> 2); + + D += (E << 5 | (E >> 27)) + F(A, B, C) + X[idx++] + Y1; + A = A << 30 | (A >> 2); + + C += (D << 5 | (D >> 27)) + F(E, A, B) + X[idx++] + Y1; + E = E << 30 | (E >> 2); + + B += (C << 5 | (C >> 27)) + F(D, E, A) + X[idx++] + Y1; + D = D << 30 | (D >> 2); + + A += (B << 5 | (B >> 27)) + F(C, D, E) + X[idx++] + Y1; + C = C << 30 | (C >> 2); + } + + // + // round 2 + // + for (int j = 0; j < 4; j++) + { + // E = rotateLeft(A, 5) + H(B, C, D) + E + X[idx++] + Y2 + // B = rotateLeft(B, 30) + E += (A << 5 | (A >> 27)) + H(B, C, D) + X[idx++] + Y2; + B = B << 30 | (B >> 2); + + D += (E << 5 | (E >> 27)) + H(A, B, C) + X[idx++] + Y2; + A = A << 30 | (A >> 2); + + C += (D << 5 | (D >> 27)) + H(E, A, B) + X[idx++] + Y2; + E = E << 30 | (E >> 2); + + B += (C << 5 | (C >> 27)) + H(D, E, A) + X[idx++] + Y2; + D = D << 30 | (D >> 2); + + A += (B << 5 | (B >> 27)) + H(C, D, E) + X[idx++] + Y2; + C = C << 30 | (C >> 2); + } + + // + // round 3 + // + for (int j = 0; j < 4; j++) + { + // E = rotateLeft(A, 5) + G(B, C, D) + E + X[idx++] + Y3 + // B = rotateLeft(B, 30) + E += (A << 5 | (A >> 27)) + G(B, C, D) + X[idx++] + Y3; + B = B << 30 | (B >> 2); + + D += (E << 5 | (E >> 27)) + G(A, B, C) + X[idx++] + Y3; + A = A << 30 | (A >> 2); + + C += (D << 5 | (D >> 27)) + G(E, A, B) + X[idx++] + Y3; + E = E << 30 | (E >> 2); + + B += (C << 5 | (C >> 27)) + G(D, E, A) + X[idx++] + Y3; + D = D << 30 | (D >> 2); + + A += (B << 5 | (B >> 27)) + G(C, D, E) + X[idx++] + Y3; + C = C << 30 | (C >> 2); + } + + // + // round 4 + // + for (int j = 0; j < 4; j++) + { + // E = rotateLeft(A, 5) + H(B, C, D) + E + X[idx++] + Y4 + // B = rotateLeft(B, 30) + E += (A << 5 | (A >> 27)) + H(B, C, D) + X[idx++] + Y4; + B = B << 30 | (B >> 2); + + D += (E << 5 | (E >> 27)) + H(A, B, C) + X[idx++] + Y4; + A = A << 30 | (A >> 2); + + C += (D << 5 | (D >> 27)) + H(E, A, B) + X[idx++] + Y4; + E = E << 30 | (E >> 2); + + B += (C << 5 | (C >> 27)) + H(D, E, A) + X[idx++] + Y4; + D = D << 30 | (D >> 2); + + A += (B << 5 | (B >> 27)) + H(C, D, E) + X[idx++] + Y4; + C = C << 30 | (C >> 2); + } + + H1 += A; + H2 += B; + H3 += C; + H4 += D; + H5 += E; + + // + // reset start of the buffer. + // + xOff = 0; + Array.Clear(X, 0, 16); + } + + public override IMemoable Copy() + { + return new Sha1Digest(this); + } + + public override void Reset(IMemoable other) + { + Sha1Digest d = (Sha1Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs.meta new file mode 100644 index 00000000..e8f27a25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41a426a9144a0d14c89f165afedfd344 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha1Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs new file mode 100644 index 00000000..fc9b3f99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs @@ -0,0 +1,319 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * SHA-224 as described in RFC 3874 + *
+     *         block  word  digest
+     * SHA-1   512    32    160
+     * SHA-224 512    32    224
+     * SHA-256 512    32    256
+     * SHA-384 1024   64    384
+     * SHA-512 1024   64    512
+     * 
+ */ + public class Sha224Digest + : GeneralDigest + { + private const int DigestLength = 28; + + private uint H1, H2, H3, H4, H5, H6, H7, H8; + + private uint[] X = new uint[64]; + private int xOff; + + /** + * Standard constructor + */ + public Sha224Digest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha224Digest( + Sha224Digest t) + : base(t) + { + CopyIn(t); + } + + private void CopyIn(Sha224Digest t) + { + base.CopyIn(t); + + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + H6 = t.H6; + H7 = t.H7; + H8 = t.H8; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "SHA-224"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff] = Pack.BE_To_UInt32(input, inOff); + + if (++xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff] = Pack.BE_To_UInt32(word); + + if (++xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (uint)((ulong)bitLength >> 32); + X[15] = (uint)((ulong)bitLength); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_BE(H1, output, outOff); + Pack.UInt32_To_BE(H2, output, outOff + 4); + Pack.UInt32_To_BE(H3, output, outOff + 8); + Pack.UInt32_To_BE(H4, output, outOff + 12); + Pack.UInt32_To_BE(H5, output, outOff + 16); + Pack.UInt32_To_BE(H6, output, outOff + 20); + Pack.UInt32_To_BE(H7, output, outOff + 24); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_BE(H1, output); + Pack.UInt32_To_BE(H2, output[4..]); + Pack.UInt32_To_BE(H3, output[8..]); + Pack.UInt32_To_BE(H4, output[12..]); + Pack.UInt32_To_BE(H5, output[16..]); + Pack.UInt32_To_BE(H6, output[20..]); + Pack.UInt32_To_BE(H7, output[24..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + /* SHA-224 initial hash value + */ + H1 = 0xc1059ed8; + H2 = 0x367cd507; + H3 = 0x3070dd17; + H4 = 0xf70e5939; + H5 = 0xffc00b31; + H6 = 0x68581511; + H7 = 0x64f98fa7; + H8 = 0xbefa4fa4; + + xOff = 0; + Array.Clear(X, 0, X.Length); + } + + internal override void ProcessBlock() + { + // + // expand 16 word block into 64 word blocks. + // + for (int ti = 16; ti <= 63; ti++) + { + X[ti] = Theta1(X[ti - 2]) + X[ti - 7] + Theta0(X[ti - 15]) + X[ti - 16]; + } + + // + // set up working variables. + // + uint a = H1; + uint b = H2; + uint c = H3; + uint d = H4; + uint e = H5; + uint f = H6; + uint g = H7; + uint h = H8; + + int t = 0; + for(int i = 0; i < 8; i ++) + { + // t = 8 * i + h += Sum1(e) + Ch(e, f, g) + K[t] + X[t]; + d += h; + h += Sum0(a) + Maj(a, b, c); + ++t; + + // t = 8 * i + 1 + g += Sum1(d) + Ch(d, e, f) + K[t] + X[t]; + c += g; + g += Sum0(h) + Maj(h, a, b); + ++t; + + // t = 8 * i + 2 + f += Sum1(c) + Ch(c, d, e) + K[t] + X[t]; + b += f; + f += Sum0(g) + Maj(g, h, a); + ++t; + + // t = 8 * i + 3 + e += Sum1(b) + Ch(b, c, d) + K[t] + X[t]; + a += e; + e += Sum0(f) + Maj(f, g, h); + ++t; + + // t = 8 * i + 4 + d += Sum1(a) + Ch(a, b, c) + K[t] + X[t]; + h += d; + d += Sum0(e) + Maj(e, f, g); + ++t; + + // t = 8 * i + 5 + c += Sum1(h) + Ch(h, a, b) + K[t] + X[t]; + g += c; + c += Sum0(d) + Maj(d, e, f); + ++t; + + // t = 8 * i + 6 + b += Sum1(g) + Ch(g, h, a) + K[t] + X[t]; + f += b; + b += Sum0(c) + Maj(c, d, e); + ++t; + + // t = 8 * i + 7 + a += Sum1(f) + Ch(f, g, h) + K[t] + X[t]; + e += a; + a += Sum0(b) + Maj(b, c, d); + ++t; + } + + H1 += a; + H2 += b; + H3 += c; + H4 += d; + H5 += e; + H6 += f; + H7 += g; + H8 += h; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + Array.Clear(X, 0, 16); + } + + /* SHA-224 functions */ + private static uint Ch(uint x, uint y, uint z) + { + return (x & y) ^ (~x & z); + } + + private static uint Maj(uint x, uint y, uint z) + { + return (x & y) ^ (x & z) ^ (y & z); + } + + private static uint Sum0(uint x) + { + return ((x >> 2) | (x << 30)) ^ ((x >> 13) | (x << 19)) ^ ((x >> 22) | (x << 10)); + } + + private static uint Sum1(uint x) + { + return ((x >> 6) | (x << 26)) ^ ((x >> 11) | (x << 21)) ^ ((x >> 25) | (x << 7)); + } + + private static uint Theta0(uint x) + { + return ((x >> 7) | (x << 25)) ^ ((x >> 18) | (x << 14)) ^ (x >> 3); + } + + private static uint Theta1(uint x) + { + return ((x >> 17) | (x << 15)) ^ ((x >> 19) | (x << 13)) ^ (x >> 10); + } + + /* SHA-224 Constants + * (represent the first 32 bits of the fractional parts of the + * cube roots of the first sixty-four prime numbers) + */ + internal static readonly uint[] K = { + 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, + 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, + 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, + 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, + 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, + 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, + 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, + 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 + }; + + public override IMemoable Copy() + { + return new Sha224Digest(this); + } + + public override void Reset(IMemoable other) + { + Sha224Digest d = (Sha224Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs.meta new file mode 100644 index 00000000..29bf6374 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 196dff09414f1c54d8fadd93e2f6f434 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha224Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs new file mode 100644 index 00000000..95e254a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs @@ -0,0 +1,349 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Draft FIPS 180-2 implementation of SHA-256. Note: As this is + * based on a draft this implementation is subject to change. + * + *
+    *         block  word  digest
+    * SHA-1   512    32    160
+    * SHA-256 512    32    256
+    * SHA-384 1024   64    384
+    * SHA-512 1024   64    512
+    * 
+ */ + public class Sha256Digest + : GeneralDigest + { + private const int DigestLength = 32; + + private uint H1, H2, H3, H4, H5, H6, H7, H8; + private uint[] X = new uint[64]; + private int xOff; + + public Sha256Digest() + { + initHs(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha256Digest(Sha256Digest t) : base(t) + { + CopyIn(t); + } + + private void CopyIn(Sha256Digest t) + { + base.CopyIn(t); + + H1 = t.H1; + H2 = t.H2; + H3 = t.H3; + H4 = t.H4; + H5 = t.H5; + H6 = t.H6; + H7 = t.H7; + H8 = t.H8; + + Array.Copy(t.X, 0, X, 0, t.X.Length); + xOff = t.xOff; + } + + public override string AlgorithmName + { + get { return "SHA-256"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + internal override void ProcessWord(byte[] input, int inOff) + { + X[xOff] = Pack.BE_To_UInt32(input, inOff); + + if (++xOff == 16) + { + ProcessBlock(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void ProcessWord(ReadOnlySpan word) + { + X[xOff] = Pack.BE_To_UInt32(word); + + if (++xOff == 16) + { + ProcessBlock(); + } + } +#endif + + internal override void ProcessLength( + long bitLength) + { + if (xOff > 14) + { + ProcessBlock(); + } + + X[14] = (uint)((ulong)bitLength >> 32); + X[15] = (uint)((ulong)bitLength); + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + Pack.UInt32_To_BE(H1, output, outOff); + Pack.UInt32_To_BE(H2, output, outOff + 4); + Pack.UInt32_To_BE(H3, output, outOff + 8); + Pack.UInt32_To_BE(H4, output, outOff + 12); + Pack.UInt32_To_BE(H5, output, outOff + 16); + Pack.UInt32_To_BE(H6, output, outOff + 20); + Pack.UInt32_To_BE(H7, output, outOff + 24); + Pack.UInt32_To_BE(H8, output, outOff + 28); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt32_To_BE(H1, output); + Pack.UInt32_To_BE(H2, output[4..]); + Pack.UInt32_To_BE(H3, output[8..]); + Pack.UInt32_To_BE(H4, output[12..]); + Pack.UInt32_To_BE(H5, output[16..]); + Pack.UInt32_To_BE(H6, output[20..]); + Pack.UInt32_To_BE(H7, output[24..]); + Pack.UInt32_To_BE(H8, output[28..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + initHs(); + + xOff = 0; + Array.Clear(X, 0, X.Length); + } + + private void initHs() + { + /* SHA-256 initial hash value + * The first 32 bits of the fractional parts of the square roots + * of the first eight prime numbers + */ + H1 = 0x6a09e667; + H2 = 0xbb67ae85; + H3 = 0x3c6ef372; + H4 = 0xa54ff53a; + H5 = 0x510e527f; + H6 = 0x9b05688c; + H7 = 0x1f83d9ab; + H8 = 0x5be0cd19; + } + + internal override void ProcessBlock() + { + // + // expand 16 word block into 64 word blocks. + // + for (int ti = 16; ti <= 63; ti++) + { + X[ti] = Theta1(X[ti - 2]) + X[ti - 7] + Theta0(X[ti - 15]) + X[ti - 16]; + } + + // + // set up working variables. + // + uint a = H1; + uint b = H2; + uint c = H3; + uint d = H4; + uint e = H5; + uint f = H6; + uint g = H7; + uint h = H8; + + int t = 0; + for(int i = 0; i < 8; ++i) + { + // t = 8 * i + h += Sum1Ch(e, f, g) + K[t] + X[t]; + d += h; + h += Sum0Maj(a, b, c); + ++t; + + // t = 8 * i + 1 + g += Sum1Ch(d, e, f) + K[t] + X[t]; + c += g; + g += Sum0Maj(h, a, b); + ++t; + + // t = 8 * i + 2 + f += Sum1Ch(c, d, e) + K[t] + X[t]; + b += f; + f += Sum0Maj(g, h, a); + ++t; + + // t = 8 * i + 3 + e += Sum1Ch(b, c, d) + K[t] + X[t]; + a += e; + e += Sum0Maj(f, g, h); + ++t; + + // t = 8 * i + 4 + d += Sum1Ch(a, b, c) + K[t] + X[t]; + h += d; + d += Sum0Maj(e, f, g); + ++t; + + // t = 8 * i + 5 + c += Sum1Ch(h, a, b) + K[t] + X[t]; + g += c; + c += Sum0Maj(d, e, f); + ++t; + + // t = 8 * i + 6 + b += Sum1Ch(g, h, a) + K[t] + X[t]; + f += b; + b += Sum0Maj(c, d, e); + ++t; + + // t = 8 * i + 7 + a += Sum1Ch(f, g, h) + K[t] + X[t]; + e += a; + a += Sum0Maj(b, c, d); + ++t; + } + + H1 += a; + H2 += b; + H3 += c; + H4 += d; + H5 += e; + H6 += f; + H7 += g; + H8 += h; + + // + // reset the offset and clean out the word buffer. + // + xOff = 0; + Array.Clear(X, 0, 16); + } + + private static uint Sum1Ch(uint x, uint y, uint z) + { +// return Sum1(x) + Ch(x, y, z); + return (((x >> 6) | (x << 26)) ^ ((x >> 11) | (x << 21)) ^ ((x >> 25) | (x << 7))) + //+ ((x & y) ^ ((~x) & z)); + + (z ^ (x & (y ^ z))); + } + + private static uint Sum0Maj(uint x, uint y, uint z) + { +// return Sum0(x) + Maj(x, y, z); + return (((x >> 2) | (x << 30)) ^ ((x >> 13) | (x << 19)) ^ ((x >> 22) | (x << 10))) + //+ ((x & y) ^ (x & z) ^ (y & z)); + + ((x & y) | (z & (x ^ y))); + } + +// /* SHA-256 functions */ +// private static uint Ch(uint x, uint y, uint z) +// { +// return (x & y) ^ ((~x) & z); +// //return z ^ (x & (y ^ z)); +// } +// +// private static uint Maj(uint x, uint y, uint z) +// { +// //return (x & y) ^ (x & z) ^ (y & z); +// return (x & y) | (z & (x ^ y)); +// } +// +// private static uint Sum0(uint x) +// { +// return ((x >> 2) | (x << 30)) ^ ((x >> 13) | (x << 19)) ^ ((x >> 22) | (x << 10)); +// } +// +// private static uint Sum1(uint x) +// { +// return ((x >> 6) | (x << 26)) ^ ((x >> 11) | (x << 21)) ^ ((x >> 25) | (x << 7)); +// } + + private static uint Theta0(uint x) + { + return ((x >> 7) | (x << 25)) ^ ((x >> 18) | (x << 14)) ^ (x >> 3); + } + + private static uint Theta1(uint x) + { + return ((x >> 17) | (x << 15)) ^ ((x >> 19) | (x << 13)) ^ (x >> 10); + } + + /* SHA-256 Constants + * (represent the first 32 bits of the fractional parts of the + * cube roots of the first sixty-four prime numbers) + */ + private static readonly uint[] K = { + 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, + 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, + 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, + 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, + 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, + 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, + 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, + 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, + 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, + 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, + 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, + 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, + 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, + 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, + 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, + 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 + }; + + public override IMemoable Copy() + { + return new Sha256Digest(this); + } + + public override void Reset(IMemoable other) + { + Sha256Digest d = (Sha256Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs.meta new file mode 100644 index 00000000..6ad6b6cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7ab212094fb3c944884279b4171f310 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha256Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs new file mode 100644 index 00000000..73bd2875 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Draft FIPS 180-2 implementation of SHA-384. Note: As this is + * based on a draft this implementation is subject to change. + * + *
+     *         block  word  digest
+     * SHA-1   512    32    160
+     * SHA-256 512    32    256
+     * SHA-384 1024   64    384
+     * SHA-512 1024   64    512
+     * 
+ */ + public class Sha384Digest + : LongDigest + { + private const int DigestLength = 48; + + public Sha384Digest() + { + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha384Digest( + Sha384Digest t) + : base(t) + { + } + + public override string AlgorithmName + { + get { return "SHA-384"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + public override int DoFinal( + byte[] output, + int outOff) + { + Finish(); + + Pack.UInt64_To_BE(H1, output, outOff); + Pack.UInt64_To_BE(H2, output, outOff + 8); + Pack.UInt64_To_BE(H3, output, outOff + 16); + Pack.UInt64_To_BE(H4, output, outOff + 24); + Pack.UInt64_To_BE(H5, output, outOff + 32); + Pack.UInt64_To_BE(H6, output, outOff + 40); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt64_To_BE(H1, output); + Pack.UInt64_To_BE(H2, output[8..]); + Pack.UInt64_To_BE(H3, output[16..]); + Pack.UInt64_To_BE(H4, output[24..]); + Pack.UInt64_To_BE(H5, output[32..]); + Pack.UInt64_To_BE(H6, output[40..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + /* SHA-384 initial hash value + * The first 64 bits of the fractional parts of the square roots + * of the 9th through 16th prime numbers + */ + H1 = 0xcbbb9d5dc1059ed8; + H2 = 0x629a292a367cd507; + H3 = 0x9159015a3070dd17; + H4 = 0x152fecd8f70e5939; + H5 = 0x67332667ffc00b31; + H6 = 0x8eb44a8768581511; + H7 = 0xdb0c2e0d64f98fa7; + H8 = 0x47b5481dbefa4fa4; + } + + public override IMemoable Copy() + { + return new Sha384Digest(this); + } + + public override void Reset(IMemoable other) + { + Sha384Digest d = (Sha384Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs.meta new file mode 100644 index 00000000..1b57b1a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7f6cc67018dd5fa4eacd17db15740561 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha384Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs new file mode 100644 index 00000000..e289bf34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs @@ -0,0 +1,127 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Draft FIPS 180-2 implementation of SHA-512. Note: As this is + * based on a draft this implementation is subject to change. + * + *
+     *         block  word  digest
+     * SHA-1   512    32    160
+     * SHA-256 512    32    256
+     * SHA-384 1024   64    384
+     * SHA-512 1024   64    512
+     * 
+ */ + public class Sha512Digest + : LongDigest + { + private const int DigestLength = 64; + + public Sha512Digest() + { + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha512Digest( + Sha512Digest t) + : base(t) + { + } + + public override string AlgorithmName + { + get { return "SHA-512"; } + } + + public override int GetDigestSize() + { + return DigestLength; + } + + public override int DoFinal( + byte[] output, + int outOff) + { + Finish(); + + Pack.UInt64_To_BE(H1, output, outOff); + Pack.UInt64_To_BE(H2, output, outOff + 8); + Pack.UInt64_To_BE(H3, output, outOff + 16); + Pack.UInt64_To_BE(H4, output, outOff + 24); + Pack.UInt64_To_BE(H5, output, outOff + 32); + Pack.UInt64_To_BE(H6, output, outOff + 40); + Pack.UInt64_To_BE(H7, output, outOff + 48); + Pack.UInt64_To_BE(H8, output, outOff + 56); + + Reset(); + + return DigestLength; + + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + Pack.UInt64_To_BE(H1, output); + Pack.UInt64_To_BE(H2, output[8..]); + Pack.UInt64_To_BE(H3, output[16..]); + Pack.UInt64_To_BE(H4, output[24..]); + Pack.UInt64_To_BE(H5, output[32..]); + Pack.UInt64_To_BE(H6, output[40..]); + Pack.UInt64_To_BE(H7, output[48..]); + Pack.UInt64_To_BE(H8, output[56..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + /* SHA-512 initial hash value + * The first 64 bits of the fractional parts of the square roots + * of the first eight prime numbers + */ + H1 = 0x6a09e667f3bcc908; + H2 = 0xbb67ae8584caa73b; + H3 = 0x3c6ef372fe94f82b; + H4 = 0xa54ff53a5f1d36f1; + H5 = 0x510e527fade682d1; + H6 = 0x9b05688c2b3e6c1f; + H7 = 0x1f83d9abfb41bd6b; + H8 = 0x5be0cd19137e2179; + } + + public override IMemoable Copy() + { + return new Sha512Digest(this); + } + + public override void Reset(IMemoable other) + { + Sha512Digest d = (Sha512Digest)other; + + CopyIn(d); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs.meta new file mode 100644 index 00000000..f1175411 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 603d234c6bf03824d9d994a78b4a9e67 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs new file mode 100644 index 00000000..dacf3d8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * FIPS 180-4 implementation of SHA-512/t + */ + public class Sha512tDigest + : LongDigest + { + private const ulong A5 = 0xa5a5a5a5a5a5a5a5UL; + + private readonly int digestLength; + + private ulong H1t, H2t, H3t, H4t, H5t, H6t, H7t, H8t; + + /** + * Standard constructor + */ + public Sha512tDigest(int bitLength) + { + if (bitLength >= 512) + throw new ArgumentException("cannot be >= 512", "bitLength"); + if (bitLength % 8 != 0) + throw new ArgumentException("needs to be a multiple of 8", "bitLength"); + if (bitLength == 384) + throw new ArgumentException("cannot be 384 use SHA384 instead", "bitLength"); + + this.digestLength = bitLength / 8; + + tIvGenerate(digestLength * 8); + + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public Sha512tDigest(Sha512tDigest t) + : base(t) + { + this.digestLength = t.digestLength; + + Reset(t); + } + + public override string AlgorithmName + { + get { return "SHA-512/" + (digestLength * 8); } + } + + public override int GetDigestSize() + { + return digestLength; + } + + public override int DoFinal(byte[] output, int outOff) + { + Finish(); + + UInt64_To_BE(H1, output, outOff, digestLength); + UInt64_To_BE(H2, output, outOff + 8, digestLength - 8); + UInt64_To_BE(H3, output, outOff + 16, digestLength - 16); + UInt64_To_BE(H4, output, outOff + 24, digestLength - 24); + UInt64_To_BE(H5, output, outOff + 32, digestLength - 32); + UInt64_To_BE(H6, output, outOff + 40, digestLength - 40); + UInt64_To_BE(H7, output, outOff + 48, digestLength - 48); + UInt64_To_BE(H8, output, outOff + 56, digestLength - 56); + + Reset(); + + return digestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + Finish(); + + UInt64_To_BE(H1, output, 0, digestLength); + UInt64_To_BE(H2, output, 8, digestLength - 8); + UInt64_To_BE(H3, output, 16, digestLength - 16); + UInt64_To_BE(H4, output, 24, digestLength - 24); + UInt64_To_BE(H5, output, 32, digestLength - 32); + UInt64_To_BE(H6, output, 40, digestLength - 40); + UInt64_To_BE(H7, output, 48, digestLength - 48); + UInt64_To_BE(H8, output, 56, digestLength - 56); + + Reset(); + + return digestLength; + } +#endif + + /** + * reset the chaining variables + */ + public override void Reset() + { + base.Reset(); + + /* + * initial hash values use the iv generation algorithm for t. + */ + H1 = H1t; + H2 = H2t; + H3 = H3t; + H4 = H4t; + H5 = H5t; + H6 = H6t; + H7 = H7t; + H8 = H8t; + } + + private void tIvGenerate(int bitLength) + { + H1 = 0x6a09e667f3bcc908UL ^ A5; + H2 = 0xbb67ae8584caa73bUL ^ A5; + H3 = 0x3c6ef372fe94f82bUL ^ A5; + H4 = 0xa54ff53a5f1d36f1UL ^ A5; + H5 = 0x510e527fade682d1UL ^ A5; + H6 = 0x9b05688c2b3e6c1fUL ^ A5; + H7 = 0x1f83d9abfb41bd6bUL ^ A5; + H8 = 0x5be0cd19137e2179UL ^ A5; + + Update(0x53); + Update(0x48); + Update(0x41); + Update(0x2D); + Update(0x35); + Update(0x31); + Update(0x32); + Update(0x2F); + + if (bitLength > 100) + { + Update((byte)(bitLength / 100 + 0x30)); + bitLength = bitLength % 100; + Update((byte)(bitLength / 10 + 0x30)); + bitLength = bitLength % 10; + Update((byte)(bitLength + 0x30)); + } + else if (bitLength > 10) + { + Update((byte)(bitLength / 10 + 0x30)); + bitLength = bitLength % 10; + Update((byte)(bitLength + 0x30)); + } + else + { + Update((byte)(bitLength + 0x30)); + } + + Finish(); + + H1t = H1; + H2t = H2; + H3t = H3; + H4t = H4; + H5t = H5; + H6t = H6; + H7t = H7; + H8t = H8; + } + + private static void UInt64_To_BE(ulong n, byte[] bs, int off, int max) + { + if (max > 0) + { + UInt32_To_BE((uint)(n >> 32), bs, off, max); + + if (max > 4) + { + UInt32_To_BE((uint)n, bs, off + 4, max - 4); + } + } + } + + private static void UInt32_To_BE(uint n, byte[] bs, int off, int max) + { + int num = System.Math.Min(4, max); + while (--num >= 0) + { + int shift = 8 * (3 - num); + bs[off + num] = (byte)(n >> shift); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void UInt64_To_BE(ulong n, Span bs, int off, int max) + { + if (max > 0) + { + UInt32_To_BE((uint)(n >> 32), bs, off, max); + + if (max > 4) + { + UInt32_To_BE((uint)n, bs, off + 4, max - 4); + } + } + } + + private static void UInt32_To_BE(uint n, Span bs, int off, int max) + { + int num = System.Math.Min(4, max); + while (--num >= 0) + { + int shift = 8 * (3 - num); + bs[off + num] = (byte)(n >> shift); + } + } +#endif + + public override IMemoable Copy() + { + return new Sha512tDigest(this); + } + + public override void Reset(IMemoable other) + { + Sha512tDigest t = (Sha512tDigest)other; + + if (this.digestLength != t.digestLength) + { + throw new MemoableResetException("digestLength inappropriate in other"); + } + + base.CopyIn(t); + + this.H1t = t.H1t; + this.H2t = t.H2t; + this.H3t = t.H3t; + this.H4t = t.H4t; + this.H5t = t.H5t; + this.H6t = t.H6t; + this.H7t = t.H7t; + this.H8t = t.H8t; + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs.meta new file mode 100644 index 00000000..5d3d1e6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 805a17d6beefcfb43bf74d7c88ce8572 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/Sha512tDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs new file mode 100644 index 00000000..7e290cc0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs @@ -0,0 +1,156 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// Implementation of SHAKE based on following KeccakNISTInterface.c from http://keccak.noekeon.org/ + /// + /// + /// Following the naming conventions used in the C source code to enable easy review of the implementation. + /// + public class ShakeDigest + : KeccakDigest, IXof + { + private static int CheckBitLength(int bitLength) + { + switch (bitLength) + { + case 128: + case 256: + return bitLength; + default: + throw new ArgumentException(bitLength + " not supported for SHAKE", "bitLength"); + } + } + + public ShakeDigest() + : this(128) + { + } + + public ShakeDigest(int bitLength) + : base(CheckBitLength(bitLength)) + { + } + + public ShakeDigest(ShakeDigest source) + : base(source) + { + } + + public override string AlgorithmName + { + get { return "SHAKE" + fixedOutputLength; } + } + + public override int GetDigestSize() + { + return fixedOutputLength >> 2; + } + + public override int DoFinal(byte[] output, int outOff) + { + return OutputFinal(output, outOff, GetDigestSize()); + } + + public virtual int OutputFinal(byte[] output, int outOff, int outLen) + { + int length = Output(output, outOff, outLen); + + Reset(); + + return length; + } + + public virtual int Output(byte[] output, int outOff, int outLen) + { + if (!squeezing) + { + AbsorbBits(0x0F, 4); + } + + Squeeze(output, outOff, (long)outLen << 3); + + return outLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + return OutputFinal(output[..GetDigestSize()]); + } + + public virtual int OutputFinal(Span output) + { + int length = Output(output); + + Reset(); + + return length; + } + + public virtual int Output(Span output) + { + if (!squeezing) + { + AbsorbBits(0x0F, 4); + } + + Squeeze(output); + + return output.Length; + } +#endif + + /* + * TODO Possible API change to support partial-byte suffixes. + */ + protected override int DoFinal(byte[] output, int outOff, byte partialByte, int partialBits) + { + return OutputFinal(output, outOff, GetDigestSize(), partialByte, partialBits); + } + + /* + * TODO Possible API change to support partial-byte suffixes. + */ + protected virtual int OutputFinal(byte[] output, int outOff, int outLen, byte partialByte, int partialBits) + { + if (partialBits < 0 || partialBits > 7) + throw new ArgumentException("must be in the range [0,7]", "partialBits"); + + int finalInput = (partialByte & ((1 << partialBits) - 1)) | (0x0F << partialBits); + Debug.Assert(finalInput >= 0); + int finalBits = partialBits + 4; + + if (finalBits >= 8) + { + Absorb((byte)finalInput); + finalBits -= 8; + finalInput >>= 8; + } + + if (finalBits > 0) + { + AbsorbBits(finalInput, finalBits); + } + + Squeeze(output, outOff, (long)outLen << 3); + + Reset(); + + return outLen; + } + + public override IMemoable Copy() + { + return new ShakeDigest(this); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs.meta new file mode 100644 index 00000000..35d2d64b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6273666f69aa67b44b94cad56baaa506 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShakeDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs new file mode 100644 index 00000000..da624bde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Wrapper class that reduces the output length of a particular digest to + * only the first n bytes of the digest function. + */ + public class ShortenedDigest + : IDigest + { + private IDigest baseDigest; + private int length; + + /** + * Base constructor. + * + * @param baseDigest underlying digest to use. + * @param length length in bytes of the output of doFinal. + * @exception ArgumentException if baseDigest is null, or length is greater than baseDigest.GetDigestSize(). + */ + public ShortenedDigest( + IDigest baseDigest, + int length) + { + if (baseDigest == null) + { + throw new ArgumentNullException("baseDigest"); + } + + if (length > baseDigest.GetDigestSize()) + { + throw new ArgumentException("baseDigest output not large enough to support length"); + } + + this.baseDigest = baseDigest; + this.length = length; + } + + public string AlgorithmName + { + get { return baseDigest.AlgorithmName + "(" + length * 8 + ")"; } + } + + public int GetDigestSize() + { + return length; + } + + public void Update(byte input) + { + baseDigest.Update(input); + } + + public void BlockUpdate(byte[] input, int inOff, int length) + { + baseDigest.BlockUpdate(input, inOff, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + baseDigest.BlockUpdate(input); + } +#endif + + public int DoFinal(byte[] output, int outOff) + { + byte[] tmp = new byte[baseDigest.GetDigestSize()]; + + baseDigest.DoFinal(tmp, 0); + + Array.Copy(tmp, 0, output, outOff, length); + + return length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + int baseDigestSize = baseDigest.GetDigestSize(); + Span tmp = baseDigestSize <= 128 + ? stackalloc byte[baseDigestSize] + : new byte[baseDigestSize]; + + baseDigest.DoFinal(tmp); + + tmp[..length].CopyTo(output); + + return length; + } +#endif + + public void Reset() + { + baseDigest.Reset(); + } + + public int GetByteLength() + { + return baseDigest.GetByteLength(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs.meta new file mode 100644 index 00000000..9f048112 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cbd0bed026d0cbf47aa6b18f2e30d58d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/ShortenedDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs new file mode 100644 index 00000000..a173928f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs @@ -0,0 +1,129 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// Implementation of the Skein parameterised hash function in 256, 512 and 1024 bit block sizes, + /// based on the Threefish tweakable block cipher. + /// + /// + /// This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3 + /// competition in October 2010. + ///

+ /// Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir + /// Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker. + /// + /// + /// + public class SkeinDigest + : IDigest, IMemoable + { + ///

+ /// 256 bit block size - Skein-256 + /// + public const int SKEIN_256 = SkeinEngine.SKEIN_256; + /// + /// 512 bit block size - Skein-512 + /// + public const int SKEIN_512 = SkeinEngine.SKEIN_512; + /// + /// 1024 bit block size - Skein-1024 + /// + public const int SKEIN_1024 = SkeinEngine.SKEIN_1024; + + private readonly SkeinEngine engine; + + /// + /// Constructs a Skein digest with an internal state size and output size. + /// + /// the internal state size in bits - one of or + /// . + /// the output/digest size to produce in bits, which must be an integral number of + /// bytes. + public SkeinDigest(int stateSizeBits, int digestSizeBits) + { + this.engine = new SkeinEngine(stateSizeBits, digestSizeBits); + Init(null); + } + + public SkeinDigest(SkeinDigest digest) + { + this.engine = new SkeinEngine(digest.engine); + } + + public void Reset(IMemoable other) + { + SkeinDigest d = (SkeinDigest)other; + engine.Reset(d.engine); + } + + public IMemoable Copy() + { + return new SkeinDigest(this); + } + + public string AlgorithmName + { + get { return "Skein-" + (engine.BlockSize * 8) + "-" + (engine.OutputSize * 8); } + } + + public int GetDigestSize() + { + return engine.OutputSize; + } + + public int GetByteLength() + { + return engine.BlockSize; + } + + /// + /// Optionally initialises the Skein digest with the provided parameters. + /// + /// See for details on the parameterisation of the Skein hash function. + /// the parameters to apply to this engine, or null to use no parameters. + public void Init(SkeinParameters parameters) + { + engine.Init(parameters); + } + + public void Reset() + { + engine.Reset(); + } + + public void Update(byte inByte) + { + engine.Update(inByte); + } + + public void BlockUpdate(byte[] inBytes, int inOff, int len) + { + engine.BlockUpdate(inBytes, inOff, len); + } + + public int DoFinal(byte[] outBytes, int outOff) + { + return engine.DoFinal(outBytes, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + engine.BlockUpdate(input); + } + + public int DoFinal(Span output) + { + return engine.DoFinal(output); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs.meta new file mode 100644 index 00000000..5199a6e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fdd2fe90256780c4088d4f2b67651b26 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs new file mode 100644 index 00000000..7fe3fd24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs @@ -0,0 +1,903 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + + /// + /// Implementation of the Skein family of parameterised hash functions in 256, 512 and 1024 bit block + /// sizes, based on the Threefish tweakable block cipher. + /// + /// + /// This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3 + /// competition in October 2010. + ///

+ /// Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir + /// Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker. + ///

+ /// This implementation is the basis for and , implementing the + /// parameter based configuration system that allows Skein to be adapted to multiple applications.
+ /// Initialising the engine with allows standard and arbitrary parameters to + /// be applied during the Skein hash function. + ///

+ /// Implemented: + ///

    + ///
  • 256, 512 and 1024 bit internal states.
  • + ///
  • Full 96 bit input length.
  • + ///
  • Parameters defined in the Skein specification, and arbitrary other pre and post message + /// parameters.
  • + ///
  • Arbitrary output size in 1 byte intervals.
  • + ///
+ ///

+ /// Not implemented: + ///

    + ///
  • Sub-byte length input (bit padding).
  • + ///
  • Tree hashing.
  • + ///
+ ///
+ /// + public class SkeinEngine + : IMemoable + { + /// + /// 256 bit block size - Skein-256 + /// + public const int SKEIN_256 = ThreefishEngine.BLOCKSIZE_256; + /// + /// 512 bit block size - Skein-512 + /// + public const int SKEIN_512 = ThreefishEngine.BLOCKSIZE_512; + /// + /// 1024 bit block size - Skein-1024 + /// + public const int SKEIN_1024 = ThreefishEngine.BLOCKSIZE_1024; + + // Minimal at present, but more complex when tree hashing is implemented + private class Configuration + { + private byte[] bytes = new byte[32]; + + public Configuration(long outputSizeBits) + { + // 0..3 = ASCII SHA3 + bytes[0] = (byte)'S'; + bytes[1] = (byte)'H'; + bytes[2] = (byte)'A'; + bytes[3] = (byte)'3'; + + // 4..5 = version number in LSB order + bytes[4] = 1; + bytes[5] = 0; + + // 8..15 = output length + Pack.UInt64_To_LE((ulong)outputSizeBits, bytes, 8); + } + + public byte[] Bytes + { + get { return bytes; } + } + + } + + public class Parameter + { + private int type; + private byte[] value; + + public Parameter(int type, byte[] value) + { + this.type = type; + this.value = value; + } + + public int Type + { + get { return type; } + } + + public byte[] Value + { + get { return value; } + } + + } + + /** + * The parameter type for the Skein key. + */ + private const int PARAM_TYPE_KEY = 0; + + /** + * The parameter type for the Skein configuration block. + */ + private const int PARAM_TYPE_CONFIG = 4; + + /** + * The parameter type for the message. + */ + private const int PARAM_TYPE_MESSAGE = 48; + + /** + * The parameter type for the output transformation. + */ + private const int PARAM_TYPE_OUTPUT = 63; + + /** + * Precalculated UBI(CFG) states for common state/output combinations without key or other + * pre-message params. + */ + private static readonly IDictionary InitialStates = new Dictionary(); + + static SkeinEngine() + { + // From Appendix C of the Skein 1.3 NIST submission + InitialState(SKEIN_256, 128, new ulong[]{ + 0xe1111906964d7260UL, + 0x883daaa77c8d811cUL, + 0x10080df491960f7aUL, + 0xccf7dde5b45bc1c2UL}); + + InitialState(SKEIN_256, 160, new ulong[]{ + 0x1420231472825e98UL, + 0x2ac4e9a25a77e590UL, + 0xd47a58568838d63eUL, + 0x2dd2e4968586ab7dUL}); + + InitialState(SKEIN_256, 224, new ulong[]{ + 0xc6098a8c9ae5ea0bUL, + 0x876d568608c5191cUL, + 0x99cb88d7d7f53884UL, + 0x384bddb1aeddb5deUL}); + + InitialState(SKEIN_256, 256, new ulong[]{ + 0xfc9da860d048b449UL, + 0x2fca66479fa7d833UL, + 0xb33bc3896656840fUL, + 0x6a54e920fde8da69UL}); + + InitialState(SKEIN_512, 128, new ulong[]{ + 0xa8bc7bf36fbf9f52UL, + 0x1e9872cebd1af0aaUL, + 0x309b1790b32190d3UL, + 0xbcfbb8543f94805cUL, + 0x0da61bcd6e31b11bUL, + 0x1a18ebead46a32e3UL, + 0xa2cc5b18ce84aa82UL, + 0x6982ab289d46982dUL}); + + InitialState(SKEIN_512, 160, new ulong[]{ + 0x28b81a2ae013bd91UL, + 0xc2f11668b5bdf78fUL, + 0x1760d8f3f6a56f12UL, + 0x4fb747588239904fUL, + 0x21ede07f7eaf5056UL, + 0xd908922e63ed70b8UL, + 0xb8ec76ffeccb52faUL, + 0x01a47bb8a3f27a6eUL}); + + InitialState(SKEIN_512, 224, new ulong[]{ + 0xccd0616248677224UL, + 0xcba65cf3a92339efUL, + 0x8ccd69d652ff4b64UL, + 0x398aed7b3ab890b4UL, + 0x0f59d1b1457d2bd0UL, + 0x6776fe6575d4eb3dUL, + 0x99fbc70e997413e9UL, + 0x9e2cfccfe1c41ef7UL}); + + InitialState(SKEIN_512, 384, new ulong[]{ + 0xa3f6c6bf3a75ef5fUL, + 0xb0fef9ccfd84faa4UL, + 0x9d77dd663d770cfeUL, + 0xd798cbf3b468fddaUL, + 0x1bc4a6668a0e4465UL, + 0x7ed7d434e5807407UL, + 0x548fc1acd4ec44d6UL, + 0x266e17546aa18ff8UL}); + + InitialState(SKEIN_512, 512, new ulong[]{ + 0x4903adff749c51ceUL, + 0x0d95de399746df03UL, + 0x8fd1934127c79bceUL, + 0x9a255629ff352cb1UL, + 0x5db62599df6ca7b0UL, + 0xeabe394ca9d5c3f4UL, + 0x991112c71a75b523UL, + 0xae18a40b660fcc33UL}); + } + + private static void InitialState(int blockSize, int outputSize, ulong[] state) + { + InitialStates.Add(VariantIdentifier(blockSize / 8, outputSize / 8), state); + } + + private static int VariantIdentifier(int blockSizeBytes, int outputSizeBytes) + { + return (outputSizeBytes << 16) | blockSizeBytes; + } + + private class UbiTweak + { + /** + * Point at which position might overflow long, so switch to add with carry logic + */ + private const ulong LOW_RANGE = ulong.MaxValue - uint.MaxValue; + + /** + * Bit 127 = final + */ + private const ulong T1_FINAL = 1UL << 63; + + /** + * Bit 126 = first + */ + private const ulong T1_FIRST = 1UL << 62; + + /** + * UBI uses a 128 bit tweak + */ + private ulong[] tweak = new ulong[2]; + + /** + * Whether 64 bit position exceeded + */ + private bool extendedPosition; + + public UbiTweak() + { + Reset(); + } + + public void Reset(UbiTweak tweak) + { + this.tweak = Arrays.Clone(tweak.tweak, this.tweak); + this.extendedPosition = tweak.extendedPosition; + } + + public void Reset() + { + tweak[0] = 0; + tweak[1] = 0; + extendedPosition = false; + First = true; + } + + public uint Type + { + get + { + return (uint)((tweak[1] >> 56) & 0x3FUL); + } + + set + { + // Bits 120..125 = type + tweak[1] = (tweak[1] & 0xFFFFFFC000000000UL) | ((value & 0x3FUL) << 56); + } + } + + public bool First + { + get + { + return ((tweak[1] & T1_FIRST) != 0); + } + set + { + if (value) + { + tweak[1] |= T1_FIRST; + } + else + { + tweak[1] &= ~T1_FIRST; + } + } + } + + public bool Final + { + get + { + return ((tweak[1] & T1_FINAL) != 0); + } + set + { + if (value) + { + tweak[1] |= T1_FINAL; + } + else + { + tweak[1] &= ~T1_FINAL; + } + } + } + + /** + * Advances the position in the tweak by the specified value. + */ + public void AdvancePosition(int advance) + { + // Bits 0..95 = position + if (extendedPosition) + { + ulong[] parts = new ulong[3]; + parts[0] = tweak[0] & 0xFFFFFFFFUL; + parts[1] = (tweak[0] >> 32) & 0xFFFFFFFFUL; + parts[2] = tweak[1] & 0xFFFFFFFFUL; + + ulong carry = (ulong)advance; + for (int i = 0; i < parts.Length; i++) + { + carry += parts[i]; + parts[i] = carry; + carry >>= 32; + } + tweak[0] = ((parts[1] & 0xFFFFFFFFUL) << 32) | (parts[0] & 0xFFFFFFFFUL); + tweak[1] = (tweak[1] & 0xFFFFFFFF00000000UL) | (parts[2] & 0xFFFFFFFFUL); + } + else + { + ulong position = tweak[0]; + position += (uint)advance; + tweak[0] = position; + if (position > LOW_RANGE) + { + extendedPosition = true; + } + } + } + + public ulong[] GetWords() + { + return tweak; + } + + public override string ToString() + { + return Type + " first: " + First + ", final: " + Final; + } + + } + + /** + * The Unique Block Iteration chaining mode. + */ + // TODO: This might be better as methods... + private class UBI + { + private readonly UbiTweak tweak = new UbiTweak(); + + private readonly SkeinEngine engine; + + /** + * Buffer for the current block of message data + */ + private byte[] currentBlock; + + /** + * Offset into the current message block + */ + private int currentOffset; + + /** + * Buffer for message words for feedback into encrypted block + */ + private ulong[] message; + + public UBI(SkeinEngine engine, int blockSize) + { + this.engine = engine; + currentBlock = new byte[blockSize]; + message = new ulong[currentBlock.Length / 8]; + } + + public void Reset(UBI ubi) + { + currentBlock = Arrays.Clone(ubi.currentBlock, currentBlock); + currentOffset = ubi.currentOffset; + message = Arrays.Clone(ubi.message, this.message); + tweak.Reset(ubi.tweak); + } + + public void Reset(int type) + { + tweak.Reset(); + tweak.Type = (uint)type; + currentOffset = 0; + } + + public void Update(byte[] value, int offset, int len, ulong[] output) + { + /* + * Buffer complete blocks for the underlying Threefish cipher, only flushing when there + * are subsequent bytes (last block must be processed in doFinal() with final=true set). + */ + int copied = 0; + while (len > copied) + { + if (currentOffset == currentBlock.Length) + { + ProcessBlock(output); + tweak.First = false; + currentOffset = 0; + } + + int toCopy = System.Math.Min(len - copied, currentBlock.Length - currentOffset); + Array.Copy(value, offset + copied, currentBlock, currentOffset, toCopy); + copied += toCopy; + currentOffset += toCopy; + tweak.AdvancePosition(toCopy); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input, ulong[] output) + { + /* + * Buffer complete blocks for the underlying Threefish cipher, only flushing when there + * are subsequent bytes (last block must be processed in doFinal() with final=true set). + */ + int copied = 0, len = input.Length; + while (len > copied) + { + if (currentOffset == currentBlock.Length) + { + ProcessBlock(output); + tweak.First = false; + currentOffset = 0; + } + + int toCopy = System.Math.Min(len - copied, currentBlock.Length - currentOffset); + input.Slice(copied, toCopy).CopyTo(currentBlock.AsSpan(currentOffset)); + copied += toCopy; + currentOffset += toCopy; + tweak.AdvancePosition(toCopy); + } + } +#endif + + private void ProcessBlock(ulong[] output) + { + engine.threefish.Init(true, engine.chain, tweak.GetWords()); + Pack.LE_To_UInt64(currentBlock, 0, message); + + engine.threefish.ProcessBlock(message, output); + + for (int i = 0; i < output.Length; i++) + { + output[i] ^= message[i]; + } + } + + public void DoFinal(ulong[] output) + { + // Pad remainder of current block with zeroes + for (int i = currentOffset; i < currentBlock.Length; i++) + { + currentBlock[i] = 0; + } + + tweak.Final = true; + ProcessBlock(output); + } + } + + /** + * Underlying Threefish tweakable block cipher + */ + private readonly ThreefishEngine threefish; + + /** + * Size of the digest output, in bytes + */ + private readonly int outputSizeBytes; + + /** + * The current chaining/state value + */ + private ulong[] chain; + + /** + * The initial state value + */ + private ulong[] initialState; + + /** + * The (optional) key parameter + */ + private byte[] key; + + /** + * Parameters to apply prior to the message + */ + private Parameter[] preMessageParameters; + + /** + * Parameters to apply after the message, but prior to output + */ + private Parameter[] postMessageParameters; + + /** + * The current UBI operation + */ + private readonly UBI ubi; + + /** + * Buffer for single byte update method + */ + private readonly byte[] singleByte = new byte[1]; + + /// + /// Constructs a Skein digest with an internal state size and output size. + /// + /// the internal state size in bits - one of or + /// . + /// the output/digest size to produce in bits, which must be an integral number of + /// bytes. + public SkeinEngine(int blockSizeBits, int outputSizeBits) + { + if (outputSizeBits % 8 != 0) + { + throw new ArgumentException("Output size must be a multiple of 8 bits. :" + outputSizeBits); + } + // TODO: Prevent digest sizes > block size? + this.outputSizeBytes = outputSizeBits / 8; + + this.threefish = new ThreefishEngine(blockSizeBits); + this.ubi = new UBI(this,threefish.GetBlockSize()); + } + + /// + /// Creates a SkeinEngine as an exact copy of an existing instance. + /// + public SkeinEngine(SkeinEngine engine) + : this(engine.BlockSize * 8, engine.OutputSize * 8) + { + CopyIn(engine); + } + + private void CopyIn(SkeinEngine engine) + { + this.ubi.Reset(engine.ubi); + this.chain = Arrays.Clone(engine.chain, this.chain); + this.initialState = Arrays.Clone(engine.initialState, this.initialState); + this.key = Arrays.Clone(engine.key, this.key); + this.preMessageParameters = Clone(engine.preMessageParameters, this.preMessageParameters); + this.postMessageParameters = Clone(engine.postMessageParameters, this.postMessageParameters); + } + + private static Parameter[] Clone(Parameter[] data, Parameter[] existing) + { + if (data == null) + { + return null; + } + if ((existing == null) || (existing.Length != data.Length)) + { + existing = new Parameter[data.Length]; + } + Array.Copy(data, 0, existing, 0, existing.Length); + return existing; + } + + public IMemoable Copy() + { + return new SkeinEngine(this); + } + + public void Reset(IMemoable other) + { + SkeinEngine s = (SkeinEngine)other; + if ((BlockSize != s.BlockSize) || (outputSizeBytes != s.outputSizeBytes)) + { + throw new MemoableResetException("Incompatible parameters in provided SkeinEngine."); + } + CopyIn(s); + } + + public int OutputSize + { + get { return outputSizeBytes; } + } + + public int BlockSize + { + get { return threefish.GetBlockSize (); } + } + + /// + /// Initialises the Skein engine with the provided parameters. See for + /// details on the parameterisation of the Skein hash function. + /// + /// the parameters to apply to this engine, or null to use no parameters. + public void Init(SkeinParameters parameters) + { + this.chain = null; + this.key = null; + this.preMessageParameters = null; + this.postMessageParameters = null; + + if (parameters != null) + { + byte[] key = parameters.GetKey(); + if (key.Length < 16) + { + throw new ArgumentException("Skein key must be at least 128 bits."); + } + InitParams(parameters.GetParameters()); + } + CreateInitialState(); + + // Initialise message block + UbiInit(PARAM_TYPE_MESSAGE); + } + + private void InitParams(IDictionary parameters) + { + //IEnumerator keys = parameters.Keys.GetEnumerator(); + var pre = new List(); + var post = new List(); + + //while (keys.MoveNext()) + foreach (var parameter in parameters) + { + int type = parameter.Key; + byte[] value = parameter.Value; + + if (type == PARAM_TYPE_KEY) + { + this.key = value; + } + else if (type < PARAM_TYPE_MESSAGE) + { + pre.Add(new Parameter(type, value)); + } + else + { + post.Add(new Parameter(type, value)); + } + } + preMessageParameters = new Parameter[pre.Count]; + pre.CopyTo(preMessageParameters, 0); + Array.Sort(preMessageParameters); + + postMessageParameters = new Parameter[post.Count]; + post.CopyTo(postMessageParameters, 0); + Array.Sort(postMessageParameters); + } + + /** + * Calculate the initial (pre message block) chaining state. + */ + private void CreateInitialState() + { + var precalc = CollectionUtilities.GetValueOrNull(InitialStates, VariantIdentifier(BlockSize, OutputSize)); + if ((key == null) && (precalc != null)) + { + // Precalculated UBI(CFG) + chain = Arrays.Clone(precalc); + } + else + { + // Blank initial state + chain = new ulong[BlockSize / 8]; + + // Process key block + if (key != null) + { + UbiComplete(SkeinParameters.PARAM_TYPE_KEY, key); + } + + // Process configuration block + UbiComplete(PARAM_TYPE_CONFIG, new Configuration(outputSizeBytes * 8).Bytes); + } + + // Process additional pre-message parameters + if (preMessageParameters != null) + { + for (int i = 0; i < preMessageParameters.Length; i++) + { + Parameter param = preMessageParameters[i]; + UbiComplete(param.Type, param.Value); + } + } + initialState = Arrays.Clone(chain); + } + + /// + /// Reset the engine to the initial state (with the key and any pre-message parameters , ready to + /// accept message input. + /// + public void Reset() + { + Array.Copy(initialState, 0, chain, 0, chain.Length); + + UbiInit(PARAM_TYPE_MESSAGE); + } + + private void UbiComplete(int type, byte[] value) + { + UbiInit(type); + this.ubi.Update(value, 0, value.Length, chain); + UbiFinal(); + } + + private void UbiInit(int type) + { + this.ubi.Reset(type); + } + + private void UbiFinal() + { + ubi.DoFinal(chain); + } + + private void CheckInitialised() + { + if (this.ubi == null) + { + throw new ArgumentException("Skein engine is not initialised."); + } + } + + public void Update(byte inByte) + { + singleByte[0] = inByte; + BlockUpdate(singleByte, 0, 1); + } + + public void BlockUpdate(byte[] inBytes, int inOff, int len) + { + CheckInitialised(); + ubi.Update(inBytes, inOff, len, chain); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + CheckInitialised(); + ubi.Update(input, chain); + } +#endif + + public int DoFinal(byte[] outBytes, int outOff) + { + CheckInitialised(); + if (outBytes.Length < (outOff + outputSizeBytes)) + { + throw new DataLengthException("Output buffer is too short to hold output"); + } + + // Finalise message block + UbiFinal(); + + // Process additional post-message parameters + if (postMessageParameters != null) + { + for (int i = 0; i < postMessageParameters.Length; i++) + { + Parameter param = postMessageParameters[i]; + UbiComplete(param.Type, param.Value); + } + } + + // Perform the output transform + int blockSize = BlockSize; + int blocksRequired = ((outputSizeBytes + blockSize - 1) / blockSize); + for (int i = 0; i < blocksRequired; i++) + { + int toWrite = System.Math.Min(blockSize, outputSizeBytes - (i * blockSize)); + Output((ulong)i, outBytes, outOff + (i * blockSize), toWrite); + } + + Reset(); + + return outputSizeBytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + CheckInitialised(); + if (output.Length < outputSizeBytes) + throw new DataLengthException("Output span is too short to hold output"); + + // Finalise message block + UbiFinal(); + + // Process additional post-message parameters + if (postMessageParameters != null) + { + for (int i = 0; i < postMessageParameters.Length; i++) + { + Parameter param = postMessageParameters[i]; + UbiComplete(param.Type, param.Value); + } + } + + // Perform the output transform + int blockSize = BlockSize; + int blocksRequired = (outputSizeBytes + blockSize - 1) / blockSize; + for (int i = 0; i < blocksRequired; i++) + { + int toWrite = System.Math.Min(blockSize, outputSizeBytes - (i * blockSize)); + //Output((ulong)i, outBytes, outOff + (i * blockSize), toWrite); + Output((ulong)i, output[(i * blockSize)..], toWrite); + } + + Reset(); + + return outputSizeBytes; + } +#endif + + private void Output(ulong outputSequence, byte[] outBytes, int outOff, int outputBytes) + { + byte[] currentBytes = new byte[8]; + Pack.UInt64_To_LE(outputSequence, currentBytes, 0); + + // Output is a sequence of UBI invocations all of which use and preserve the pre-output state + ulong[] outputWords = new ulong[chain.Length]; + UbiInit(PARAM_TYPE_OUTPUT); + this.ubi.Update(currentBytes, 0, currentBytes.Length, outputWords); + ubi.DoFinal(outputWords); + + int wordsRequired = (outputBytes + 8 - 1) / 8; + for (int i = 0; i < wordsRequired; i++) + { + int toWrite = System.Math.Min(8, outputBytes - (i * 8)); + if (toWrite == 8) + { + Pack.UInt64_To_LE(outputWords[i], outBytes, outOff + (i * 8)); + } + else + { + Pack.UInt64_To_LE(outputWords[i], currentBytes, 0); + Array.Copy(currentBytes, 0, outBytes, outOff + (i * 8), toWrite); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Output(ulong outputSequence, Span output, int outputBytes) + { + Span currentBytes = stackalloc byte[8]; + Pack.UInt64_To_LE(outputSequence, currentBytes); + + // Output is a sequence of UBI invocations all of which use and preserve the pre-output state + ulong[] outputWords = new ulong[chain.Length]; + UbiInit(PARAM_TYPE_OUTPUT); + this.ubi.Update(currentBytes, outputWords); + ubi.DoFinal(outputWords); + + int wordsRequired = (outputBytes + 8 - 1) / 8; + for (int i = 0; i < wordsRequired; i++) + { + int toWrite = System.Math.Min(8, outputBytes - (i * 8)); + if (toWrite == 8) + { + Pack.UInt64_To_LE(outputWords[i], output[(i * 8)..]); + } + else + { + Pack.UInt64_To_LE(outputWords[i], currentBytes); + currentBytes[..toWrite].CopyTo(output[(i * 8)..]); + } + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs.meta new file mode 100644 index 00000000..4ea5dfc9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5fc9ba0ef2e52a1469ef1f7e1e2b9219 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/SkeinEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs new file mode 100644 index 00000000..89b13ff6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs @@ -0,0 +1,932 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * implementation of Tiger based on: + * + * http://www.cs.technion.ac.il/~biham/Reports/Tiger + */ + public class TigerDigest + : IDigest, IMemoable + { + private const int MyByteLength = 64; + + /* + * S-Boxes. + */ + private static readonly long[] t1 = { + unchecked((long) 0x02AAB17CF7E90C5EL) /* 0 */, unchecked((long) 0xAC424B03E243A8ECL) /* 1 */, + unchecked((long) 0x72CD5BE30DD5FCD3L) /* 2 */, unchecked((long) 0x6D019B93F6F97F3AL) /* 3 */, + unchecked((long) 0xCD9978FFD21F9193L) /* 4 */, unchecked((long) 0x7573A1C9708029E2L) /* 5 */, + unchecked((long) 0xB164326B922A83C3L) /* 6 */, unchecked((long) 0x46883EEE04915870L) /* 7 */, + unchecked((long) 0xEAACE3057103ECE6L) /* 8 */, unchecked((long) 0xC54169B808A3535CL) /* 9 */, + unchecked((long) 0x4CE754918DDEC47CL) /* 10 */, unchecked((long) 0x0AA2F4DFDC0DF40CL) /* 11 */, + unchecked((long) 0x10B76F18A74DBEFAL) /* 12 */, unchecked((long) 0xC6CCB6235AD1AB6AL) /* 13 */, + unchecked((long) 0x13726121572FE2FFL) /* 14 */, unchecked((long) 0x1A488C6F199D921EL) /* 15 */, + unchecked((long) 0x4BC9F9F4DA0007CAL) /* 16 */, unchecked((long) 0x26F5E6F6E85241C7L) /* 17 */, + unchecked((long) 0x859079DBEA5947B6L) /* 18 */, unchecked((long) 0x4F1885C5C99E8C92L) /* 19 */, + unchecked((long) 0xD78E761EA96F864BL) /* 20 */, unchecked((long) 0x8E36428C52B5C17DL) /* 21 */, + unchecked((long) 0x69CF6827373063C1L) /* 22 */, unchecked((long) 0xB607C93D9BB4C56EL) /* 23 */, + unchecked((long) 0x7D820E760E76B5EAL) /* 24 */, unchecked((long) 0x645C9CC6F07FDC42L) /* 25 */, + unchecked((long) 0xBF38A078243342E0L) /* 26 */, unchecked((long) 0x5F6B343C9D2E7D04L) /* 27 */, + unchecked((long) 0xF2C28AEB600B0EC6L) /* 28 */, unchecked((long) 0x6C0ED85F7254BCACL) /* 29 */, + unchecked((long) 0x71592281A4DB4FE5L) /* 30 */, unchecked((long) 0x1967FA69CE0FED9FL) /* 31 */, + unchecked((long) 0xFD5293F8B96545DBL) /* 32 */, unchecked((long) 0xC879E9D7F2A7600BL) /* 33 */, + unchecked((long) 0x860248920193194EL) /* 34 */, unchecked((long) 0xA4F9533B2D9CC0B3L) /* 35 */, + unchecked((long) 0x9053836C15957613L) /* 36 */, unchecked((long) 0xDB6DCF8AFC357BF1L) /* 37 */, + unchecked((long) 0x18BEEA7A7A370F57L) /* 38 */, unchecked((long) 0x037117CA50B99066L) /* 39 */, + unchecked((long) 0x6AB30A9774424A35L) /* 40 */, unchecked((long) 0xF4E92F02E325249BL) /* 41 */, + unchecked((long) 0x7739DB07061CCAE1L) /* 42 */, unchecked((long) 0xD8F3B49CECA42A05L) /* 43 */, + unchecked((long) 0xBD56BE3F51382F73L) /* 44 */, unchecked((long) 0x45FAED5843B0BB28L) /* 45 */, + unchecked((long) 0x1C813D5C11BF1F83L) /* 46 */, unchecked((long) 0x8AF0E4B6D75FA169L) /* 47 */, + unchecked((long) 0x33EE18A487AD9999L) /* 48 */, unchecked((long) 0x3C26E8EAB1C94410L) /* 49 */, + unchecked((long) 0xB510102BC0A822F9L) /* 50 */, unchecked((long) 0x141EEF310CE6123BL) /* 51 */, + unchecked((long) 0xFC65B90059DDB154L) /* 52 */, unchecked((long) 0xE0158640C5E0E607L) /* 53 */, + unchecked((long) 0x884E079826C3A3CFL) /* 54 */, unchecked((long) 0x930D0D9523C535FDL) /* 55 */, + unchecked((long) 0x35638D754E9A2B00L) /* 56 */, unchecked((long) 0x4085FCCF40469DD5L) /* 57 */, + unchecked((long) 0xC4B17AD28BE23A4CL) /* 58 */, unchecked((long) 0xCAB2F0FC6A3E6A2EL) /* 59 */, + unchecked((long) 0x2860971A6B943FCDL) /* 60 */, unchecked((long) 0x3DDE6EE212E30446L) /* 61 */, + unchecked((long) 0x6222F32AE01765AEL) /* 62 */, unchecked((long) 0x5D550BB5478308FEL) /* 63 */, + unchecked((long) 0xA9EFA98DA0EDA22AL) /* 64 */, unchecked((long) 0xC351A71686C40DA7L) /* 65 */, + unchecked((long) 0x1105586D9C867C84L) /* 66 */, unchecked((long) 0xDCFFEE85FDA22853L) /* 67 */, + unchecked((long) 0xCCFBD0262C5EEF76L) /* 68 */, unchecked((long) 0xBAF294CB8990D201L) /* 69 */, + unchecked((long) 0xE69464F52AFAD975L) /* 70 */, unchecked((long) 0x94B013AFDF133E14L) /* 71 */, + unchecked((long) 0x06A7D1A32823C958L) /* 72 */, unchecked((long) 0x6F95FE5130F61119L) /* 73 */, + unchecked((long) 0xD92AB34E462C06C0L) /* 74 */, unchecked((long) 0xED7BDE33887C71D2L) /* 75 */, + unchecked((long) 0x79746D6E6518393EL) /* 76 */, unchecked((long) 0x5BA419385D713329L) /* 77 */, + unchecked((long) 0x7C1BA6B948A97564L) /* 78 */, unchecked((long) 0x31987C197BFDAC67L) /* 79 */, + unchecked((long) 0xDE6C23C44B053D02L) /* 80 */, unchecked((long) 0x581C49FED002D64DL) /* 81 */, + unchecked((long) 0xDD474D6338261571L) /* 82 */, unchecked((long) 0xAA4546C3E473D062L) /* 83 */, + unchecked((long) 0x928FCE349455F860L) /* 84 */, unchecked((long) 0x48161BBACAAB94D9L) /* 85 */, + unchecked((long) 0x63912430770E6F68L) /* 86 */, unchecked((long) 0x6EC8A5E602C6641CL) /* 87 */, + unchecked((long) 0x87282515337DDD2BL) /* 88 */, unchecked((long) 0x2CDA6B42034B701BL) /* 89 */, + unchecked((long) 0xB03D37C181CB096DL) /* 90 */, unchecked((long) 0xE108438266C71C6FL) /* 91 */, + unchecked((long) 0x2B3180C7EB51B255L) /* 92 */, unchecked((long) 0xDF92B82F96C08BBCL) /* 93 */, + unchecked((long) 0x5C68C8C0A632F3BAL) /* 94 */, unchecked((long) 0x5504CC861C3D0556L) /* 95 */, + unchecked((long) 0xABBFA4E55FB26B8FL) /* 96 */, unchecked((long) 0x41848B0AB3BACEB4L) /* 97 */, + unchecked((long) 0xB334A273AA445D32L) /* 98 */, unchecked((long) 0xBCA696F0A85AD881L) /* 99 */, + unchecked((long) 0x24F6EC65B528D56CL) /* 100 */, unchecked((long) 0x0CE1512E90F4524AL) /* 101 */, + unchecked((long) 0x4E9DD79D5506D35AL) /* 102 */, unchecked((long) 0x258905FAC6CE9779L) /* 103 */, + unchecked((long) 0x2019295B3E109B33L) /* 104 */, unchecked((long) 0xF8A9478B73A054CCL) /* 105 */, + unchecked((long) 0x2924F2F934417EB0L) /* 106 */, unchecked((long) 0x3993357D536D1BC4L) /* 107 */, + unchecked((long) 0x38A81AC21DB6FF8BL) /* 108 */, unchecked((long) 0x47C4FBF17D6016BFL) /* 109 */, + unchecked((long) 0x1E0FAADD7667E3F5L) /* 110 */, unchecked((long) 0x7ABCFF62938BEB96L) /* 111 */, + unchecked((long) 0xA78DAD948FC179C9L) /* 112 */, unchecked((long) 0x8F1F98B72911E50DL) /* 113 */, + unchecked((long) 0x61E48EAE27121A91L) /* 114 */, unchecked((long) 0x4D62F7AD31859808L) /* 115 */, + unchecked((long) 0xECEBA345EF5CEAEBL) /* 116 */, unchecked((long) 0xF5CEB25EBC9684CEL) /* 117 */, + unchecked((long) 0xF633E20CB7F76221L) /* 118 */, unchecked((long) 0xA32CDF06AB8293E4L) /* 119 */, + unchecked((long) 0x985A202CA5EE2CA4L) /* 120 */, unchecked((long) 0xCF0B8447CC8A8FB1L) /* 121 */, + unchecked((long) 0x9F765244979859A3L) /* 122 */, unchecked((long) 0xA8D516B1A1240017L) /* 123 */, + unchecked((long) 0x0BD7BA3EBB5DC726L) /* 124 */, unchecked((long) 0xE54BCA55B86ADB39L) /* 125 */, + unchecked((long) 0x1D7A3AFD6C478063L) /* 126 */, unchecked((long) 0x519EC608E7669EDDL) /* 127 */, + unchecked((long) 0x0E5715A2D149AA23L) /* 128 */, unchecked((long) 0x177D4571848FF194L) /* 129 */, + unchecked((long) 0xEEB55F3241014C22L) /* 130 */, unchecked((long) 0x0F5E5CA13A6E2EC2L) /* 131 */, + unchecked((long) 0x8029927B75F5C361L) /* 132 */, unchecked((long) 0xAD139FABC3D6E436L) /* 133 */, + unchecked((long) 0x0D5DF1A94CCF402FL) /* 134 */, unchecked((long) 0x3E8BD948BEA5DFC8L) /* 135 */, + unchecked((long) 0xA5A0D357BD3FF77EL) /* 136 */, unchecked((long) 0xA2D12E251F74F645L) /* 137 */, + unchecked((long) 0x66FD9E525E81A082L) /* 138 */, unchecked((long) 0x2E0C90CE7F687A49L) /* 139 */, + unchecked((long) 0xC2E8BCBEBA973BC5L) /* 140 */, unchecked((long) 0x000001BCE509745FL) /* 141 */, + unchecked((long) 0x423777BBE6DAB3D6L) /* 142 */, unchecked((long) 0xD1661C7EAEF06EB5L) /* 143 */, + unchecked((long) 0xA1781F354DAACFD8L) /* 144 */, unchecked((long) 0x2D11284A2B16AFFCL) /* 145 */, + unchecked((long) 0xF1FC4F67FA891D1FL) /* 146 */, unchecked((long) 0x73ECC25DCB920ADAL) /* 147 */, + unchecked((long) 0xAE610C22C2A12651L) /* 148 */, unchecked((long) 0x96E0A810D356B78AL) /* 149 */, + unchecked((long) 0x5A9A381F2FE7870FL) /* 150 */, unchecked((long) 0xD5AD62EDE94E5530L) /* 151 */, + unchecked((long) 0xD225E5E8368D1427L) /* 152 */, unchecked((long) 0x65977B70C7AF4631L) /* 153 */, + unchecked((long) 0x99F889B2DE39D74FL) /* 154 */, unchecked((long) 0x233F30BF54E1D143L) /* 155 */, + unchecked((long) 0x9A9675D3D9A63C97L) /* 156 */, unchecked((long) 0x5470554FF334F9A8L) /* 157 */, + unchecked((long) 0x166ACB744A4F5688L) /* 158 */, unchecked((long) 0x70C74CAAB2E4AEADL) /* 159 */, + unchecked((long) 0xF0D091646F294D12L) /* 160 */, unchecked((long) 0x57B82A89684031D1L) /* 161 */, + unchecked((long) 0xEFD95A5A61BE0B6BL) /* 162 */, unchecked((long) 0x2FBD12E969F2F29AL) /* 163 */, + unchecked((long) 0x9BD37013FEFF9FE8L) /* 164 */, unchecked((long) 0x3F9B0404D6085A06L) /* 165 */, + unchecked((long) 0x4940C1F3166CFE15L) /* 166 */, unchecked((long) 0x09542C4DCDF3DEFBL) /* 167 */, + unchecked((long) 0xB4C5218385CD5CE3L) /* 168 */, unchecked((long) 0xC935B7DC4462A641L) /* 169 */, + unchecked((long) 0x3417F8A68ED3B63FL) /* 170 */, unchecked((long) 0xB80959295B215B40L) /* 171 */, + unchecked((long) 0xF99CDAEF3B8C8572L) /* 172 */, unchecked((long) 0x018C0614F8FCB95DL) /* 173 */, + unchecked((long) 0x1B14ACCD1A3ACDF3L) /* 174 */, unchecked((long) 0x84D471F200BB732DL) /* 175 */, + unchecked((long) 0xC1A3110E95E8DA16L) /* 176 */, unchecked((long) 0x430A7220BF1A82B8L) /* 177 */, + unchecked((long) 0xB77E090D39DF210EL) /* 178 */, unchecked((long) 0x5EF4BD9F3CD05E9DL) /* 179 */, + unchecked((long) 0x9D4FF6DA7E57A444L) /* 180 */, unchecked((long) 0xDA1D60E183D4A5F8L) /* 181 */, + unchecked((long) 0xB287C38417998E47L) /* 182 */, unchecked((long) 0xFE3EDC121BB31886L) /* 183 */, + unchecked((long) 0xC7FE3CCC980CCBEFL) /* 184 */, unchecked((long) 0xE46FB590189BFD03L) /* 185 */, + unchecked((long) 0x3732FD469A4C57DCL) /* 186 */, unchecked((long) 0x7EF700A07CF1AD65L) /* 187 */, + unchecked((long) 0x59C64468A31D8859L) /* 188 */, unchecked((long) 0x762FB0B4D45B61F6L) /* 189 */, + unchecked((long) 0x155BAED099047718L) /* 190 */, unchecked((long) 0x68755E4C3D50BAA6L) /* 191 */, + unchecked((long) 0xE9214E7F22D8B4DFL) /* 192 */, unchecked((long) 0x2ADDBF532EAC95F4L) /* 193 */, + unchecked((long) 0x32AE3909B4BD0109L) /* 194 */, unchecked((long) 0x834DF537B08E3450L) /* 195 */, + unchecked((long) 0xFA209DA84220728DL) /* 196 */, unchecked((long) 0x9E691D9B9EFE23F7L) /* 197 */, + unchecked((long) 0x0446D288C4AE8D7FL) /* 198 */, unchecked((long) 0x7B4CC524E169785BL) /* 199 */, + unchecked((long) 0x21D87F0135CA1385L) /* 200 */, unchecked((long) 0xCEBB400F137B8AA5L) /* 201 */, + unchecked((long) 0x272E2B66580796BEL) /* 202 */, unchecked((long) 0x3612264125C2B0DEL) /* 203 */, + unchecked((long) 0x057702BDAD1EFBB2L) /* 204 */, unchecked((long) 0xD4BABB8EACF84BE9L) /* 205 */, + unchecked((long) 0x91583139641BC67BL) /* 206 */, unchecked((long) 0x8BDC2DE08036E024L) /* 207 */, + unchecked((long) 0x603C8156F49F68EDL) /* 208 */, unchecked((long) 0xF7D236F7DBEF5111L) /* 209 */, + unchecked((long) 0x9727C4598AD21E80L) /* 210 */, unchecked((long) 0xA08A0896670A5FD7L) /* 211 */, + unchecked((long) 0xCB4A8F4309EBA9CBL) /* 212 */, unchecked((long) 0x81AF564B0F7036A1L) /* 213 */, + unchecked((long) 0xC0B99AA778199ABDL) /* 214 */, unchecked((long) 0x959F1EC83FC8E952L) /* 215 */, + unchecked((long) 0x8C505077794A81B9L) /* 216 */, unchecked((long) 0x3ACAAF8F056338F0L) /* 217 */, + unchecked((long) 0x07B43F50627A6778L) /* 218 */, unchecked((long) 0x4A44AB49F5ECCC77L) /* 219 */, + unchecked((long) 0x3BC3D6E4B679EE98L) /* 220 */, unchecked((long) 0x9CC0D4D1CF14108CL) /* 221 */, + unchecked((long) 0x4406C00B206BC8A0L) /* 222 */, unchecked((long) 0x82A18854C8D72D89L) /* 223 */, + unchecked((long) 0x67E366B35C3C432CL) /* 224 */, unchecked((long) 0xB923DD61102B37F2L) /* 225 */, + unchecked((long) 0x56AB2779D884271DL) /* 226 */, unchecked((long) 0xBE83E1B0FF1525AFL) /* 227 */, + unchecked((long) 0xFB7C65D4217E49A9L) /* 228 */, unchecked((long) 0x6BDBE0E76D48E7D4L) /* 229 */, + unchecked((long) 0x08DF828745D9179EL) /* 230 */, unchecked((long) 0x22EA6A9ADD53BD34L) /* 231 */, + unchecked((long) 0xE36E141C5622200AL) /* 232 */, unchecked((long) 0x7F805D1B8CB750EEL) /* 233 */, + unchecked((long) 0xAFE5C7A59F58E837L) /* 234 */, unchecked((long) 0xE27F996A4FB1C23CL) /* 235 */, + unchecked((long) 0xD3867DFB0775F0D0L) /* 236 */, unchecked((long) 0xD0E673DE6E88891AL) /* 237 */, + unchecked((long) 0x123AEB9EAFB86C25L) /* 238 */, unchecked((long) 0x30F1D5D5C145B895L) /* 239 */, + unchecked((long) 0xBB434A2DEE7269E7L) /* 240 */, unchecked((long) 0x78CB67ECF931FA38L) /* 241 */, + unchecked((long) 0xF33B0372323BBF9CL) /* 242 */, unchecked((long) 0x52D66336FB279C74L) /* 243 */, + unchecked((long) 0x505F33AC0AFB4EAAL) /* 244 */, unchecked((long) 0xE8A5CD99A2CCE187L) /* 245 */, + unchecked((long) 0x534974801E2D30BBL) /* 246 */, unchecked((long) 0x8D2D5711D5876D90L) /* 247 */, + unchecked((long) 0x1F1A412891BC038EL) /* 248 */, unchecked((long) 0xD6E2E71D82E56648L) /* 249 */, + unchecked((long) 0x74036C3A497732B7L) /* 250 */, unchecked((long) 0x89B67ED96361F5ABL) /* 251 */, + unchecked((long) 0xFFED95D8F1EA02A2L) /* 252 */, unchecked((long) 0xE72B3BD61464D43DL) /* 253 */, + unchecked((long) 0xA6300F170BDC4820L) /* 254 */, unchecked((long) 0xEBC18760ED78A77AL) /* 255 */, + }; + + private static readonly long[] t2 = { + unchecked((long) 0xE6A6BE5A05A12138L) /* 256 */, unchecked((long) 0xB5A122A5B4F87C98L) /* 257 */, + unchecked((long) 0x563C6089140B6990L) /* 258 */, unchecked((long) 0x4C46CB2E391F5DD5L) /* 259 */, + unchecked((long) 0xD932ADDBC9B79434L) /* 260 */, unchecked((long) 0x08EA70E42015AFF5L) /* 261 */, + unchecked((long) 0xD765A6673E478CF1L) /* 262 */, unchecked((long) 0xC4FB757EAB278D99L) /* 263 */, + unchecked((long) 0xDF11C6862D6E0692L) /* 264 */, unchecked((long) 0xDDEB84F10D7F3B16L) /* 265 */, + unchecked((long) 0x6F2EF604A665EA04L) /* 266 */, unchecked((long) 0x4A8E0F0FF0E0DFB3L) /* 267 */, + unchecked((long) 0xA5EDEEF83DBCBA51L) /* 268 */, unchecked((long) 0xFC4F0A2A0EA4371EL) /* 269 */, + unchecked((long) 0xE83E1DA85CB38429L) /* 270 */, unchecked((long) 0xDC8FF882BA1B1CE2L) /* 271 */, + unchecked((long) 0xCD45505E8353E80DL) /* 272 */, unchecked((long) 0x18D19A00D4DB0717L) /* 273 */, + unchecked((long) 0x34A0CFEDA5F38101L) /* 274 */, unchecked((long) 0x0BE77E518887CAF2L) /* 275 */, + unchecked((long) 0x1E341438B3C45136L) /* 276 */, unchecked((long) 0xE05797F49089CCF9L) /* 277 */, + unchecked((long) 0xFFD23F9DF2591D14L) /* 278 */, unchecked((long) 0x543DDA228595C5CDL) /* 279 */, + unchecked((long) 0x661F81FD99052A33L) /* 280 */, unchecked((long) 0x8736E641DB0F7B76L) /* 281 */, + unchecked((long) 0x15227725418E5307L) /* 282 */, unchecked((long) 0xE25F7F46162EB2FAL) /* 283 */, + unchecked((long) 0x48A8B2126C13D9FEL) /* 284 */, unchecked((long) 0xAFDC541792E76EEAL) /* 285 */, + unchecked((long) 0x03D912BFC6D1898FL) /* 286 */, unchecked((long) 0x31B1AAFA1B83F51BL) /* 287 */, + unchecked((long) 0xF1AC2796E42AB7D9L) /* 288 */, unchecked((long) 0x40A3A7D7FCD2EBACL) /* 289 */, + unchecked((long) 0x1056136D0AFBBCC5L) /* 290 */, unchecked((long) 0x7889E1DD9A6D0C85L) /* 291 */, + unchecked((long) 0xD33525782A7974AAL) /* 292 */, unchecked((long) 0xA7E25D09078AC09BL) /* 293 */, + unchecked((long) 0xBD4138B3EAC6EDD0L) /* 294 */, unchecked((long) 0x920ABFBE71EB9E70L) /* 295 */, + unchecked((long) 0xA2A5D0F54FC2625CL) /* 296 */, unchecked((long) 0xC054E36B0B1290A3L) /* 297 */, + unchecked((long) 0xF6DD59FF62FE932BL) /* 298 */, unchecked((long) 0x3537354511A8AC7DL) /* 299 */, + unchecked((long) 0xCA845E9172FADCD4L) /* 300 */, unchecked((long) 0x84F82B60329D20DCL) /* 301 */, + unchecked((long) 0x79C62CE1CD672F18L) /* 302 */, unchecked((long) 0x8B09A2ADD124642CL) /* 303 */, + unchecked((long) 0xD0C1E96A19D9E726L) /* 304 */, unchecked((long) 0x5A786A9B4BA9500CL) /* 305 */, + unchecked((long) 0x0E020336634C43F3L) /* 306 */, unchecked((long) 0xC17B474AEB66D822L) /* 307 */, + unchecked((long) 0x6A731AE3EC9BAAC2L) /* 308 */, unchecked((long) 0x8226667AE0840258L) /* 309 */, + unchecked((long) 0x67D4567691CAECA5L) /* 310 */, unchecked((long) 0x1D94155C4875ADB5L) /* 311 */, + unchecked((long) 0x6D00FD985B813FDFL) /* 312 */, unchecked((long) 0x51286EFCB774CD06L) /* 313 */, + unchecked((long) 0x5E8834471FA744AFL) /* 314 */, unchecked((long) 0xF72CA0AEE761AE2EL) /* 315 */, + unchecked((long) 0xBE40E4CDAEE8E09AL) /* 316 */, unchecked((long) 0xE9970BBB5118F665L) /* 317 */, + unchecked((long) 0x726E4BEB33DF1964L) /* 318 */, unchecked((long) 0x703B000729199762L) /* 319 */, + unchecked((long) 0x4631D816F5EF30A7L) /* 320 */, unchecked((long) 0xB880B5B51504A6BEL) /* 321 */, + unchecked((long) 0x641793C37ED84B6CL) /* 322 */, unchecked((long) 0x7B21ED77F6E97D96L) /* 323 */, + unchecked((long) 0x776306312EF96B73L) /* 324 */, unchecked((long) 0xAE528948E86FF3F4L) /* 325 */, + unchecked((long) 0x53DBD7F286A3F8F8L) /* 326 */, unchecked((long) 0x16CADCE74CFC1063L) /* 327 */, + unchecked((long) 0x005C19BDFA52C6DDL) /* 328 */, unchecked((long) 0x68868F5D64D46AD3L) /* 329 */, + unchecked((long) 0x3A9D512CCF1E186AL) /* 330 */, unchecked((long) 0x367E62C2385660AEL) /* 331 */, + unchecked((long) 0xE359E7EA77DCB1D7L) /* 332 */, unchecked((long) 0x526C0773749ABE6EL) /* 333 */, + unchecked((long) 0x735AE5F9D09F734BL) /* 334 */, unchecked((long) 0x493FC7CC8A558BA8L) /* 335 */, + unchecked((long) 0xB0B9C1533041AB45L) /* 336 */, unchecked((long) 0x321958BA470A59BDL) /* 337 */, + unchecked((long) 0x852DB00B5F46C393L) /* 338 */, unchecked((long) 0x91209B2BD336B0E5L) /* 339 */, + unchecked((long) 0x6E604F7D659EF19FL) /* 340 */, unchecked((long) 0xB99A8AE2782CCB24L) /* 341 */, + unchecked((long) 0xCCF52AB6C814C4C7L) /* 342 */, unchecked((long) 0x4727D9AFBE11727BL) /* 343 */, + unchecked((long) 0x7E950D0C0121B34DL) /* 344 */, unchecked((long) 0x756F435670AD471FL) /* 345 */, + unchecked((long) 0xF5ADD442615A6849L) /* 346 */, unchecked((long) 0x4E87E09980B9957AL) /* 347 */, + unchecked((long) 0x2ACFA1DF50AEE355L) /* 348 */, unchecked((long) 0xD898263AFD2FD556L) /* 349 */, + unchecked((long) 0xC8F4924DD80C8FD6L) /* 350 */, unchecked((long) 0xCF99CA3D754A173AL) /* 351 */, + unchecked((long) 0xFE477BACAF91BF3CL) /* 352 */, unchecked((long) 0xED5371F6D690C12DL) /* 353 */, + unchecked((long) 0x831A5C285E687094L) /* 354 */, unchecked((long) 0xC5D3C90A3708A0A4L) /* 355 */, + unchecked((long) 0x0F7F903717D06580L) /* 356 */, unchecked((long) 0x19F9BB13B8FDF27FL) /* 357 */, + unchecked((long) 0xB1BD6F1B4D502843L) /* 358 */, unchecked((long) 0x1C761BA38FFF4012L) /* 359 */, + unchecked((long) 0x0D1530C4E2E21F3BL) /* 360 */, unchecked((long) 0x8943CE69A7372C8AL) /* 361 */, + unchecked((long) 0xE5184E11FEB5CE66L) /* 362 */, unchecked((long) 0x618BDB80BD736621L) /* 363 */, + unchecked((long) 0x7D29BAD68B574D0BL) /* 364 */, unchecked((long) 0x81BB613E25E6FE5BL) /* 365 */, + unchecked((long) 0x071C9C10BC07913FL) /* 366 */, unchecked((long) 0xC7BEEB7909AC2D97L) /* 367 */, + unchecked((long) 0xC3E58D353BC5D757L) /* 368 */, unchecked((long) 0xEB017892F38F61E8L) /* 369 */, + unchecked((long) 0xD4EFFB9C9B1CC21AL) /* 370 */, unchecked((long) 0x99727D26F494F7ABL) /* 371 */, + unchecked((long) 0xA3E063A2956B3E03L) /* 372 */, unchecked((long) 0x9D4A8B9A4AA09C30L) /* 373 */, + unchecked((long) 0x3F6AB7D500090FB4L) /* 374 */, unchecked((long) 0x9CC0F2A057268AC0L) /* 375 */, + unchecked((long) 0x3DEE9D2DEDBF42D1L) /* 376 */, unchecked((long) 0x330F49C87960A972L) /* 377 */, + unchecked((long) 0xC6B2720287421B41L) /* 378 */, unchecked((long) 0x0AC59EC07C00369CL) /* 379 */, + unchecked((long) 0xEF4EAC49CB353425L) /* 380 */, unchecked((long) 0xF450244EEF0129D8L) /* 381 */, + unchecked((long) 0x8ACC46E5CAF4DEB6L) /* 382 */, unchecked((long) 0x2FFEAB63989263F7L) /* 383 */, + unchecked((long) 0x8F7CB9FE5D7A4578L) /* 384 */, unchecked((long) 0x5BD8F7644E634635L) /* 385 */, + unchecked((long) 0x427A7315BF2DC900L) /* 386 */, unchecked((long) 0x17D0C4AA2125261CL) /* 387 */, + unchecked((long) 0x3992486C93518E50L) /* 388 */, unchecked((long) 0xB4CBFEE0A2D7D4C3L) /* 389 */, + unchecked((long) 0x7C75D6202C5DDD8DL) /* 390 */, unchecked((long) 0xDBC295D8E35B6C61L) /* 391 */, + unchecked((long) 0x60B369D302032B19L) /* 392 */, unchecked((long) 0xCE42685FDCE44132L) /* 393 */, + unchecked((long) 0x06F3DDB9DDF65610L) /* 394 */, unchecked((long) 0x8EA4D21DB5E148F0L) /* 395 */, + unchecked((long) 0x20B0FCE62FCD496FL) /* 396 */, unchecked((long) 0x2C1B912358B0EE31L) /* 397 */, + unchecked((long) 0xB28317B818F5A308L) /* 398 */, unchecked((long) 0xA89C1E189CA6D2CFL) /* 399 */, + unchecked((long) 0x0C6B18576AAADBC8L) /* 400 */, unchecked((long) 0xB65DEAA91299FAE3L) /* 401 */, + unchecked((long) 0xFB2B794B7F1027E7L) /* 402 */, unchecked((long) 0x04E4317F443B5BEBL) /* 403 */, + unchecked((long) 0x4B852D325939D0A6L) /* 404 */, unchecked((long) 0xD5AE6BEEFB207FFCL) /* 405 */, + unchecked((long) 0x309682B281C7D374L) /* 406 */, unchecked((long) 0xBAE309A194C3B475L) /* 407 */, + unchecked((long) 0x8CC3F97B13B49F05L) /* 408 */, unchecked((long) 0x98A9422FF8293967L) /* 409 */, + unchecked((long) 0x244B16B01076FF7CL) /* 410 */, unchecked((long) 0xF8BF571C663D67EEL) /* 411 */, + unchecked((long) 0x1F0D6758EEE30DA1L) /* 412 */, unchecked((long) 0xC9B611D97ADEB9B7L) /* 413 */, + unchecked((long) 0xB7AFD5887B6C57A2L) /* 414 */, unchecked((long) 0x6290AE846B984FE1L) /* 415 */, + unchecked((long) 0x94DF4CDEACC1A5FDL) /* 416 */, unchecked((long) 0x058A5BD1C5483AFFL) /* 417 */, + unchecked((long) 0x63166CC142BA3C37L) /* 418 */, unchecked((long) 0x8DB8526EB2F76F40L) /* 419 */, + unchecked((long) 0xE10880036F0D6D4EL) /* 420 */, unchecked((long) 0x9E0523C9971D311DL) /* 421 */, + unchecked((long) 0x45EC2824CC7CD691L) /* 422 */, unchecked((long) 0x575B8359E62382C9L) /* 423 */, + unchecked((long) 0xFA9E400DC4889995L) /* 424 */, unchecked((long) 0xD1823ECB45721568L) /* 425 */, + unchecked((long) 0xDAFD983B8206082FL) /* 426 */, unchecked((long) 0xAA7D29082386A8CBL) /* 427 */, + unchecked((long) 0x269FCD4403B87588L) /* 428 */, unchecked((long) 0x1B91F5F728BDD1E0L) /* 429 */, + unchecked((long) 0xE4669F39040201F6L) /* 430 */, unchecked((long) 0x7A1D7C218CF04ADEL) /* 431 */, + unchecked((long) 0x65623C29D79CE5CEL) /* 432 */, unchecked((long) 0x2368449096C00BB1L) /* 433 */, + unchecked((long) 0xAB9BF1879DA503BAL) /* 434 */, unchecked((long) 0xBC23ECB1A458058EL) /* 435 */, + unchecked((long) 0x9A58DF01BB401ECCL) /* 436 */, unchecked((long) 0xA070E868A85F143DL) /* 437 */, + unchecked((long) 0x4FF188307DF2239EL) /* 438 */, unchecked((long) 0x14D565B41A641183L) /* 439 */, + unchecked((long) 0xEE13337452701602L) /* 440 */, unchecked((long) 0x950E3DCF3F285E09L) /* 441 */, + unchecked((long) 0x59930254B9C80953L) /* 442 */, unchecked((long) 0x3BF299408930DA6DL) /* 443 */, + unchecked((long) 0xA955943F53691387L) /* 444 */, unchecked((long) 0xA15EDECAA9CB8784L) /* 445 */, + unchecked((long) 0x29142127352BE9A0L) /* 446 */, unchecked((long) 0x76F0371FFF4E7AFBL) /* 447 */, + unchecked((long) 0x0239F450274F2228L) /* 448 */, unchecked((long) 0xBB073AF01D5E868BL) /* 449 */, + unchecked((long) 0xBFC80571C10E96C1L) /* 450 */, unchecked((long) 0xD267088568222E23L) /* 451 */, + unchecked((long) 0x9671A3D48E80B5B0L) /* 452 */, unchecked((long) 0x55B5D38AE193BB81L) /* 453 */, + unchecked((long) 0x693AE2D0A18B04B8L) /* 454 */, unchecked((long) 0x5C48B4ECADD5335FL) /* 455 */, + unchecked((long) 0xFD743B194916A1CAL) /* 456 */, unchecked((long) 0x2577018134BE98C4L) /* 457 */, + unchecked((long) 0xE77987E83C54A4ADL) /* 458 */, unchecked((long) 0x28E11014DA33E1B9L) /* 459 */, + unchecked((long) 0x270CC59E226AA213L) /* 460 */, unchecked((long) 0x71495F756D1A5F60L) /* 461 */, + unchecked((long) 0x9BE853FB60AFEF77L) /* 462 */, unchecked((long) 0xADC786A7F7443DBFL) /* 463 */, + unchecked((long) 0x0904456173B29A82L) /* 464 */, unchecked((long) 0x58BC7A66C232BD5EL) /* 465 */, + unchecked((long) 0xF306558C673AC8B2L) /* 466 */, unchecked((long) 0x41F639C6B6C9772AL) /* 467 */, + unchecked((long) 0x216DEFE99FDA35DAL) /* 468 */, unchecked((long) 0x11640CC71C7BE615L) /* 469 */, + unchecked((long) 0x93C43694565C5527L) /* 470 */, unchecked((long) 0xEA038E6246777839L) /* 471 */, + unchecked((long) 0xF9ABF3CE5A3E2469L) /* 472 */, unchecked((long) 0x741E768D0FD312D2L) /* 473 */, + unchecked((long) 0x0144B883CED652C6L) /* 474 */, unchecked((long) 0xC20B5A5BA33F8552L) /* 475 */, + unchecked((long) 0x1AE69633C3435A9DL) /* 476 */, unchecked((long) 0x97A28CA4088CFDECL) /* 477 */, + unchecked((long) 0x8824A43C1E96F420L) /* 478 */, unchecked((long) 0x37612FA66EEEA746L) /* 479 */, + unchecked((long) 0x6B4CB165F9CF0E5AL) /* 480 */, unchecked((long) 0x43AA1C06A0ABFB4AL) /* 481 */, + unchecked((long) 0x7F4DC26FF162796BL) /* 482 */, unchecked((long) 0x6CBACC8E54ED9B0FL) /* 483 */, + unchecked((long) 0xA6B7FFEFD2BB253EL) /* 484 */, unchecked((long) 0x2E25BC95B0A29D4FL) /* 485 */, + unchecked((long) 0x86D6A58BDEF1388CL) /* 486 */, unchecked((long) 0xDED74AC576B6F054L) /* 487 */, + unchecked((long) 0x8030BDBC2B45805DL) /* 488 */, unchecked((long) 0x3C81AF70E94D9289L) /* 489 */, + unchecked((long) 0x3EFF6DDA9E3100DBL) /* 490 */, unchecked((long) 0xB38DC39FDFCC8847L) /* 491 */, + unchecked((long) 0x123885528D17B87EL) /* 492 */, unchecked((long) 0xF2DA0ED240B1B642L) /* 493 */, + unchecked((long) 0x44CEFADCD54BF9A9L) /* 494 */, unchecked((long) 0x1312200E433C7EE6L) /* 495 */, + unchecked((long) 0x9FFCC84F3A78C748L) /* 496 */, unchecked((long) 0xF0CD1F72248576BBL) /* 497 */, + unchecked((long) 0xEC6974053638CFE4L) /* 498 */, unchecked((long) 0x2BA7B67C0CEC4E4CL) /* 499 */, + unchecked((long) 0xAC2F4DF3E5CE32EDL) /* 500 */, unchecked((long) 0xCB33D14326EA4C11L) /* 501 */, + unchecked((long) 0xA4E9044CC77E58BCL) /* 502 */, unchecked((long) 0x5F513293D934FCEFL) /* 503 */, + unchecked((long) 0x5DC9645506E55444L) /* 504 */, unchecked((long) 0x50DE418F317DE40AL) /* 505 */, + unchecked((long) 0x388CB31A69DDE259L) /* 506 */, unchecked((long) 0x2DB4A83455820A86L) /* 507 */, + unchecked((long) 0x9010A91E84711AE9L) /* 508 */, unchecked((long) 0x4DF7F0B7B1498371L) /* 509 */, + unchecked((long) 0xD62A2EABC0977179L) /* 510 */, unchecked((long) 0x22FAC097AA8D5C0EL) /* 511 */, + }; + + private static readonly long[] t3 = { + unchecked((long) 0xF49FCC2FF1DAF39BL) /* 512 */, unchecked((long) 0x487FD5C66FF29281L) /* 513 */, + unchecked((long) 0xE8A30667FCDCA83FL) /* 514 */, unchecked((long) 0x2C9B4BE3D2FCCE63L) /* 515 */, + unchecked((long) 0xDA3FF74B93FBBBC2L) /* 516 */, unchecked((long) 0x2FA165D2FE70BA66L) /* 517 */, + unchecked((long) 0xA103E279970E93D4L) /* 518 */, unchecked((long) 0xBECDEC77B0E45E71L) /* 519 */, + unchecked((long) 0xCFB41E723985E497L) /* 520 */, unchecked((long) 0xB70AAA025EF75017L) /* 521 */, + unchecked((long) 0xD42309F03840B8E0L) /* 522 */, unchecked((long) 0x8EFC1AD035898579L) /* 523 */, + unchecked((long) 0x96C6920BE2B2ABC5L) /* 524 */, unchecked((long) 0x66AF4163375A9172L) /* 525 */, + unchecked((long) 0x2174ABDCCA7127FBL) /* 526 */, unchecked((long) 0xB33CCEA64A72FF41L) /* 527 */, + unchecked((long) 0xF04A4933083066A5L) /* 528 */, unchecked((long) 0x8D970ACDD7289AF5L) /* 529 */, + unchecked((long) 0x8F96E8E031C8C25EL) /* 530 */, unchecked((long) 0xF3FEC02276875D47L) /* 531 */, + unchecked((long) 0xEC7BF310056190DDL) /* 532 */, unchecked((long) 0xF5ADB0AEBB0F1491L) /* 533 */, + unchecked((long) 0x9B50F8850FD58892L) /* 534 */, unchecked((long) 0x4975488358B74DE8L) /* 535 */, + unchecked((long) 0xA3354FF691531C61L) /* 536 */, unchecked((long) 0x0702BBE481D2C6EEL) /* 537 */, + unchecked((long) 0x89FB24057DEDED98L) /* 538 */, unchecked((long) 0xAC3075138596E902L) /* 539 */, + unchecked((long) 0x1D2D3580172772EDL) /* 540 */, unchecked((long) 0xEB738FC28E6BC30DL) /* 541 */, + unchecked((long) 0x5854EF8F63044326L) /* 542 */, unchecked((long) 0x9E5C52325ADD3BBEL) /* 543 */, + unchecked((long) 0x90AA53CF325C4623L) /* 544 */, unchecked((long) 0xC1D24D51349DD067L) /* 545 */, + unchecked((long) 0x2051CFEEA69EA624L) /* 546 */, unchecked((long) 0x13220F0A862E7E4FL) /* 547 */, + unchecked((long) 0xCE39399404E04864L) /* 548 */, unchecked((long) 0xD9C42CA47086FCB7L) /* 549 */, + unchecked((long) 0x685AD2238A03E7CCL) /* 550 */, unchecked((long) 0x066484B2AB2FF1DBL) /* 551 */, + unchecked((long) 0xFE9D5D70EFBF79ECL) /* 552 */, unchecked((long) 0x5B13B9DD9C481854L) /* 553 */, + unchecked((long) 0x15F0D475ED1509ADL) /* 554 */, unchecked((long) 0x0BEBCD060EC79851L) /* 555 */, + unchecked((long) 0xD58C6791183AB7F8L) /* 556 */, unchecked((long) 0xD1187C5052F3EEE4L) /* 557 */, + unchecked((long) 0xC95D1192E54E82FFL) /* 558 */, unchecked((long) 0x86EEA14CB9AC6CA2L) /* 559 */, + unchecked((long) 0x3485BEB153677D5DL) /* 560 */, unchecked((long) 0xDD191D781F8C492AL) /* 561 */, + unchecked((long) 0xF60866BAA784EBF9L) /* 562 */, unchecked((long) 0x518F643BA2D08C74L) /* 563 */, + unchecked((long) 0x8852E956E1087C22L) /* 564 */, unchecked((long) 0xA768CB8DC410AE8DL) /* 565 */, + unchecked((long) 0x38047726BFEC8E1AL) /* 566 */, unchecked((long) 0xA67738B4CD3B45AAL) /* 567 */, + unchecked((long) 0xAD16691CEC0DDE19L) /* 568 */, unchecked((long) 0xC6D4319380462E07L) /* 569 */, + unchecked((long) 0xC5A5876D0BA61938L) /* 570 */, unchecked((long) 0x16B9FA1FA58FD840L) /* 571 */, + unchecked((long) 0x188AB1173CA74F18L) /* 572 */, unchecked((long) 0xABDA2F98C99C021FL) /* 573 */, + unchecked((long) 0x3E0580AB134AE816L) /* 574 */, unchecked((long) 0x5F3B05B773645ABBL) /* 575 */, + unchecked((long) 0x2501A2BE5575F2F6L) /* 576 */, unchecked((long) 0x1B2F74004E7E8BA9L) /* 577 */, + unchecked((long) 0x1CD7580371E8D953L) /* 578 */, unchecked((long) 0x7F6ED89562764E30L) /* 579 */, + unchecked((long) 0xB15926FF596F003DL) /* 580 */, unchecked((long) 0x9F65293DA8C5D6B9L) /* 581 */, + unchecked((long) 0x6ECEF04DD690F84CL) /* 582 */, unchecked((long) 0x4782275FFF33AF88L) /* 583 */, + unchecked((long) 0xE41433083F820801L) /* 584 */, unchecked((long) 0xFD0DFE409A1AF9B5L) /* 585 */, + unchecked((long) 0x4325A3342CDB396BL) /* 586 */, unchecked((long) 0x8AE77E62B301B252L) /* 587 */, + unchecked((long) 0xC36F9E9F6655615AL) /* 588 */, unchecked((long) 0x85455A2D92D32C09L) /* 589 */, + unchecked((long) 0xF2C7DEA949477485L) /* 590 */, unchecked((long) 0x63CFB4C133A39EBAL) /* 591 */, + unchecked((long) 0x83B040CC6EBC5462L) /* 592 */, unchecked((long) 0x3B9454C8FDB326B0L) /* 593 */, + unchecked((long) 0x56F56A9E87FFD78CL) /* 594 */, unchecked((long) 0x2DC2940D99F42BC6L) /* 595 */, + unchecked((long) 0x98F7DF096B096E2DL) /* 596 */, unchecked((long) 0x19A6E01E3AD852BFL) /* 597 */, + unchecked((long) 0x42A99CCBDBD4B40BL) /* 598 */, unchecked((long) 0xA59998AF45E9C559L) /* 599 */, + unchecked((long) 0x366295E807D93186L) /* 600 */, unchecked((long) 0x6B48181BFAA1F773L) /* 601 */, + unchecked((long) 0x1FEC57E2157A0A1DL) /* 602 */, unchecked((long) 0x4667446AF6201AD5L) /* 603 */, + unchecked((long) 0xE615EBCACFB0F075L) /* 604 */, unchecked((long) 0xB8F31F4F68290778L) /* 605 */, + unchecked((long) 0x22713ED6CE22D11EL) /* 606 */, unchecked((long) 0x3057C1A72EC3C93BL) /* 607 */, + unchecked((long) 0xCB46ACC37C3F1F2FL) /* 608 */, unchecked((long) 0xDBB893FD02AAF50EL) /* 609 */, + unchecked((long) 0x331FD92E600B9FCFL) /* 610 */, unchecked((long) 0xA498F96148EA3AD6L) /* 611 */, + unchecked((long) 0xA8D8426E8B6A83EAL) /* 612 */, unchecked((long) 0xA089B274B7735CDCL) /* 613 */, + unchecked((long) 0x87F6B3731E524A11L) /* 614 */, unchecked((long) 0x118808E5CBC96749L) /* 615 */, + unchecked((long) 0x9906E4C7B19BD394L) /* 616 */, unchecked((long) 0xAFED7F7E9B24A20CL) /* 617 */, + unchecked((long) 0x6509EADEEB3644A7L) /* 618 */, unchecked((long) 0x6C1EF1D3E8EF0EDEL) /* 619 */, + unchecked((long) 0xB9C97D43E9798FB4L) /* 620 */, unchecked((long) 0xA2F2D784740C28A3L) /* 621 */, + unchecked((long) 0x7B8496476197566FL) /* 622 */, unchecked((long) 0x7A5BE3E6B65F069DL) /* 623 */, + unchecked((long) 0xF96330ED78BE6F10L) /* 624 */, unchecked((long) 0xEEE60DE77A076A15L) /* 625 */, + unchecked((long) 0x2B4BEE4AA08B9BD0L) /* 626 */, unchecked((long) 0x6A56A63EC7B8894EL) /* 627 */, + unchecked((long) 0x02121359BA34FEF4L) /* 628 */, unchecked((long) 0x4CBF99F8283703FCL) /* 629 */, + unchecked((long) 0x398071350CAF30C8L) /* 630 */, unchecked((long) 0xD0A77A89F017687AL) /* 631 */, + unchecked((long) 0xF1C1A9EB9E423569L) /* 632 */, unchecked((long) 0x8C7976282DEE8199L) /* 633 */, + unchecked((long) 0x5D1737A5DD1F7ABDL) /* 634 */, unchecked((long) 0x4F53433C09A9FA80L) /* 635 */, + unchecked((long) 0xFA8B0C53DF7CA1D9L) /* 636 */, unchecked((long) 0x3FD9DCBC886CCB77L) /* 637 */, + unchecked((long) 0xC040917CA91B4720L) /* 638 */, unchecked((long) 0x7DD00142F9D1DCDFL) /* 639 */, + unchecked((long) 0x8476FC1D4F387B58L) /* 640 */, unchecked((long) 0x23F8E7C5F3316503L) /* 641 */, + unchecked((long) 0x032A2244E7E37339L) /* 642 */, unchecked((long) 0x5C87A5D750F5A74BL) /* 643 */, + unchecked((long) 0x082B4CC43698992EL) /* 644 */, unchecked((long) 0xDF917BECB858F63CL) /* 645 */, + unchecked((long) 0x3270B8FC5BF86DDAL) /* 646 */, unchecked((long) 0x10AE72BB29B5DD76L) /* 647 */, + unchecked((long) 0x576AC94E7700362BL) /* 648 */, unchecked((long) 0x1AD112DAC61EFB8FL) /* 649 */, + unchecked((long) 0x691BC30EC5FAA427L) /* 650 */, unchecked((long) 0xFF246311CC327143L) /* 651 */, + unchecked((long) 0x3142368E30E53206L) /* 652 */, unchecked((long) 0x71380E31E02CA396L) /* 653 */, + unchecked((long) 0x958D5C960AAD76F1L) /* 654 */, unchecked((long) 0xF8D6F430C16DA536L) /* 655 */, + unchecked((long) 0xC8FFD13F1BE7E1D2L) /* 656 */, unchecked((long) 0x7578AE66004DDBE1L) /* 657 */, + unchecked((long) 0x05833F01067BE646L) /* 658 */, unchecked((long) 0xBB34B5AD3BFE586DL) /* 659 */, + unchecked((long) 0x095F34C9A12B97F0L) /* 660 */, unchecked((long) 0x247AB64525D60CA8L) /* 661 */, + unchecked((long) 0xDCDBC6F3017477D1L) /* 662 */, unchecked((long) 0x4A2E14D4DECAD24DL) /* 663 */, + unchecked((long) 0xBDB5E6D9BE0A1EEBL) /* 664 */, unchecked((long) 0x2A7E70F7794301ABL) /* 665 */, + unchecked((long) 0xDEF42D8A270540FDL) /* 666 */, unchecked((long) 0x01078EC0A34C22C1L) /* 667 */, + unchecked((long) 0xE5DE511AF4C16387L) /* 668 */, unchecked((long) 0x7EBB3A52BD9A330AL) /* 669 */, + unchecked((long) 0x77697857AA7D6435L) /* 670 */, unchecked((long) 0x004E831603AE4C32L) /* 671 */, + unchecked((long) 0xE7A21020AD78E312L) /* 672 */, unchecked((long) 0x9D41A70C6AB420F2L) /* 673 */, + unchecked((long) 0x28E06C18EA1141E6L) /* 674 */, unchecked((long) 0xD2B28CBD984F6B28L) /* 675 */, + unchecked((long) 0x26B75F6C446E9D83L) /* 676 */, unchecked((long) 0xBA47568C4D418D7FL) /* 677 */, + unchecked((long) 0xD80BADBFE6183D8EL) /* 678 */, unchecked((long) 0x0E206D7F5F166044L) /* 679 */, + unchecked((long) 0xE258A43911CBCA3EL) /* 680 */, unchecked((long) 0x723A1746B21DC0BCL) /* 681 */, + unchecked((long) 0xC7CAA854F5D7CDD3L) /* 682 */, unchecked((long) 0x7CAC32883D261D9CL) /* 683 */, + unchecked((long) 0x7690C26423BA942CL) /* 684 */, unchecked((long) 0x17E55524478042B8L) /* 685 */, + unchecked((long) 0xE0BE477656A2389FL) /* 686 */, unchecked((long) 0x4D289B5E67AB2DA0L) /* 687 */, + unchecked((long) 0x44862B9C8FBBFD31L) /* 688 */, unchecked((long) 0xB47CC8049D141365L) /* 689 */, + unchecked((long) 0x822C1B362B91C793L) /* 690 */, unchecked((long) 0x4EB14655FB13DFD8L) /* 691 */, + unchecked((long) 0x1ECBBA0714E2A97BL) /* 692 */, unchecked((long) 0x6143459D5CDE5F14L) /* 693 */, + unchecked((long) 0x53A8FBF1D5F0AC89L) /* 694 */, unchecked((long) 0x97EA04D81C5E5B00L) /* 695 */, + unchecked((long) 0x622181A8D4FDB3F3L) /* 696 */, unchecked((long) 0xE9BCD341572A1208L) /* 697 */, + unchecked((long) 0x1411258643CCE58AL) /* 698 */, unchecked((long) 0x9144C5FEA4C6E0A4L) /* 699 */, + unchecked((long) 0x0D33D06565CF620FL) /* 700 */, unchecked((long) 0x54A48D489F219CA1L) /* 701 */, + unchecked((long) 0xC43E5EAC6D63C821L) /* 702 */, unchecked((long) 0xA9728B3A72770DAFL) /* 703 */, + unchecked((long) 0xD7934E7B20DF87EFL) /* 704 */, unchecked((long) 0xE35503B61A3E86E5L) /* 705 */, + unchecked((long) 0xCAE321FBC819D504L) /* 706 */, unchecked((long) 0x129A50B3AC60BFA6L) /* 707 */, + unchecked((long) 0xCD5E68EA7E9FB6C3L) /* 708 */, unchecked((long) 0xB01C90199483B1C7L) /* 709 */, + unchecked((long) 0x3DE93CD5C295376CL) /* 710 */, unchecked((long) 0xAED52EDF2AB9AD13L) /* 711 */, + unchecked((long) 0x2E60F512C0A07884L) /* 712 */, unchecked((long) 0xBC3D86A3E36210C9L) /* 713 */, + unchecked((long) 0x35269D9B163951CEL) /* 714 */, unchecked((long) 0x0C7D6E2AD0CDB5FAL) /* 715 */, + unchecked((long) 0x59E86297D87F5733L) /* 716 */, unchecked((long) 0x298EF221898DB0E7L) /* 717 */, + unchecked((long) 0x55000029D1A5AA7EL) /* 718 */, unchecked((long) 0x8BC08AE1B5061B45L) /* 719 */, + unchecked((long) 0xC2C31C2B6C92703AL) /* 720 */, unchecked((long) 0x94CC596BAF25EF42L) /* 721 */, + unchecked((long) 0x0A1D73DB22540456L) /* 722 */, unchecked((long) 0x04B6A0F9D9C4179AL) /* 723 */, + unchecked((long) 0xEFFDAFA2AE3D3C60L) /* 724 */, unchecked((long) 0xF7C8075BB49496C4L) /* 725 */, + unchecked((long) 0x9CC5C7141D1CD4E3L) /* 726 */, unchecked((long) 0x78BD1638218E5534L) /* 727 */, + unchecked((long) 0xB2F11568F850246AL) /* 728 */, unchecked((long) 0xEDFABCFA9502BC29L) /* 729 */, + unchecked((long) 0x796CE5F2DA23051BL) /* 730 */, unchecked((long) 0xAAE128B0DC93537CL) /* 731 */, + unchecked((long) 0x3A493DA0EE4B29AEL) /* 732 */, unchecked((long) 0xB5DF6B2C416895D7L) /* 733 */, + unchecked((long) 0xFCABBD25122D7F37L) /* 734 */, unchecked((long) 0x70810B58105DC4B1L) /* 735 */, + unchecked((long) 0xE10FDD37F7882A90L) /* 736 */, unchecked((long) 0x524DCAB5518A3F5CL) /* 737 */, + unchecked((long) 0x3C9E85878451255BL) /* 738 */, unchecked((long) 0x4029828119BD34E2L) /* 739 */, + unchecked((long) 0x74A05B6F5D3CECCBL) /* 740 */, unchecked((long) 0xB610021542E13ECAL) /* 741 */, + unchecked((long) 0x0FF979D12F59E2ACL) /* 742 */, unchecked((long) 0x6037DA27E4F9CC50L) /* 743 */, + unchecked((long) 0x5E92975A0DF1847DL) /* 744 */, unchecked((long) 0xD66DE190D3E623FEL) /* 745 */, + unchecked((long) 0x5032D6B87B568048L) /* 746 */, unchecked((long) 0x9A36B7CE8235216EL) /* 747 */, + unchecked((long) 0x80272A7A24F64B4AL) /* 748 */, unchecked((long) 0x93EFED8B8C6916F7L) /* 749 */, + unchecked((long) 0x37DDBFF44CCE1555L) /* 750 */, unchecked((long) 0x4B95DB5D4B99BD25L) /* 751 */, + unchecked((long) 0x92D3FDA169812FC0L) /* 752 */, unchecked((long) 0xFB1A4A9A90660BB6L) /* 753 */, + unchecked((long) 0x730C196946A4B9B2L) /* 754 */, unchecked((long) 0x81E289AA7F49DA68L) /* 755 */, + unchecked((long) 0x64669A0F83B1A05FL) /* 756 */, unchecked((long) 0x27B3FF7D9644F48BL) /* 757 */, + unchecked((long) 0xCC6B615C8DB675B3L) /* 758 */, unchecked((long) 0x674F20B9BCEBBE95L) /* 759 */, + unchecked((long) 0x6F31238275655982L) /* 760 */, unchecked((long) 0x5AE488713E45CF05L) /* 761 */, + unchecked((long) 0xBF619F9954C21157L) /* 762 */, unchecked((long) 0xEABAC46040A8EAE9L) /* 763 */, + unchecked((long) 0x454C6FE9F2C0C1CDL) /* 764 */, unchecked((long) 0x419CF6496412691CL) /* 765 */, + unchecked((long) 0xD3DC3BEF265B0F70L) /* 766 */, unchecked((long) 0x6D0E60F5C3578A9EL) /* 767 */, + }; + + private static readonly long[] t4 = { + unchecked((long) 0x5B0E608526323C55L) /* 768 */, unchecked((long) 0x1A46C1A9FA1B59F5L) /* 769 */, + unchecked((long) 0xA9E245A17C4C8FFAL) /* 770 */, unchecked((long) 0x65CA5159DB2955D7L) /* 771 */, + unchecked((long) 0x05DB0A76CE35AFC2L) /* 772 */, unchecked((long) 0x81EAC77EA9113D45L) /* 773 */, + unchecked((long) 0x528EF88AB6AC0A0DL) /* 774 */, unchecked((long) 0xA09EA253597BE3FFL) /* 775 */, + unchecked((long) 0x430DDFB3AC48CD56L) /* 776 */, unchecked((long) 0xC4B3A67AF45CE46FL) /* 777 */, + unchecked((long) 0x4ECECFD8FBE2D05EL) /* 778 */, unchecked((long) 0x3EF56F10B39935F0L) /* 779 */, + unchecked((long) 0x0B22D6829CD619C6L) /* 780 */, unchecked((long) 0x17FD460A74DF2069L) /* 781 */, + unchecked((long) 0x6CF8CC8E8510ED40L) /* 782 */, unchecked((long) 0xD6C824BF3A6ECAA7L) /* 783 */, + unchecked((long) 0x61243D581A817049L) /* 784 */, unchecked((long) 0x048BACB6BBC163A2L) /* 785 */, + unchecked((long) 0xD9A38AC27D44CC32L) /* 786 */, unchecked((long) 0x7FDDFF5BAAF410ABL) /* 787 */, + unchecked((long) 0xAD6D495AA804824BL) /* 788 */, unchecked((long) 0xE1A6A74F2D8C9F94L) /* 789 */, + unchecked((long) 0xD4F7851235DEE8E3L) /* 790 */, unchecked((long) 0xFD4B7F886540D893L) /* 791 */, + unchecked((long) 0x247C20042AA4BFDAL) /* 792 */, unchecked((long) 0x096EA1C517D1327CL) /* 793 */, + unchecked((long) 0xD56966B4361A6685L) /* 794 */, unchecked((long) 0x277DA5C31221057DL) /* 795 */, + unchecked((long) 0x94D59893A43ACFF7L) /* 796 */, unchecked((long) 0x64F0C51CCDC02281L) /* 797 */, + unchecked((long) 0x3D33BCC4FF6189DBL) /* 798 */, unchecked((long) 0xE005CB184CE66AF1L) /* 799 */, + unchecked((long) 0xFF5CCD1D1DB99BEAL) /* 800 */, unchecked((long) 0xB0B854A7FE42980FL) /* 801 */, + unchecked((long) 0x7BD46A6A718D4B9FL) /* 802 */, unchecked((long) 0xD10FA8CC22A5FD8CL) /* 803 */, + unchecked((long) 0xD31484952BE4BD31L) /* 804 */, unchecked((long) 0xC7FA975FCB243847L) /* 805 */, + unchecked((long) 0x4886ED1E5846C407L) /* 806 */, unchecked((long) 0x28CDDB791EB70B04L) /* 807 */, + unchecked((long) 0xC2B00BE2F573417FL) /* 808 */, unchecked((long) 0x5C9590452180F877L) /* 809 */, + unchecked((long) 0x7A6BDDFFF370EB00L) /* 810 */, unchecked((long) 0xCE509E38D6D9D6A4L) /* 811 */, + unchecked((long) 0xEBEB0F00647FA702L) /* 812 */, unchecked((long) 0x1DCC06CF76606F06L) /* 813 */, + unchecked((long) 0xE4D9F28BA286FF0AL) /* 814 */, unchecked((long) 0xD85A305DC918C262L) /* 815 */, + unchecked((long) 0x475B1D8732225F54L) /* 816 */, unchecked((long) 0x2D4FB51668CCB5FEL) /* 817 */, + unchecked((long) 0xA679B9D9D72BBA20L) /* 818 */, unchecked((long) 0x53841C0D912D43A5L) /* 819 */, + unchecked((long) 0x3B7EAA48BF12A4E8L) /* 820 */, unchecked((long) 0x781E0E47F22F1DDFL) /* 821 */, + unchecked((long) 0xEFF20CE60AB50973L) /* 822 */, unchecked((long) 0x20D261D19DFFB742L) /* 823 */, + unchecked((long) 0x16A12B03062A2E39L) /* 824 */, unchecked((long) 0x1960EB2239650495L) /* 825 */, + unchecked((long) 0x251C16FED50EB8B8L) /* 826 */, unchecked((long) 0x9AC0C330F826016EL) /* 827 */, + unchecked((long) 0xED152665953E7671L) /* 828 */, unchecked((long) 0x02D63194A6369570L) /* 829 */, + unchecked((long) 0x5074F08394B1C987L) /* 830 */, unchecked((long) 0x70BA598C90B25CE1L) /* 831 */, + unchecked((long) 0x794A15810B9742F6L) /* 832 */, unchecked((long) 0x0D5925E9FCAF8C6CL) /* 833 */, + unchecked((long) 0x3067716CD868744EL) /* 834 */, unchecked((long) 0x910AB077E8D7731BL) /* 835 */, + unchecked((long) 0x6A61BBDB5AC42F61L) /* 836 */, unchecked((long) 0x93513EFBF0851567L) /* 837 */, + unchecked((long) 0xF494724B9E83E9D5L) /* 838 */, unchecked((long) 0xE887E1985C09648DL) /* 839 */, + unchecked((long) 0x34B1D3C675370CFDL) /* 840 */, unchecked((long) 0xDC35E433BC0D255DL) /* 841 */, + unchecked((long) 0xD0AAB84234131BE0L) /* 842 */, unchecked((long) 0x08042A50B48B7EAFL) /* 843 */, + unchecked((long) 0x9997C4EE44A3AB35L) /* 844 */, unchecked((long) 0x829A7B49201799D0L) /* 845 */, + unchecked((long) 0x263B8307B7C54441L) /* 846 */, unchecked((long) 0x752F95F4FD6A6CA6L) /* 847 */, + unchecked((long) 0x927217402C08C6E5L) /* 848 */, unchecked((long) 0x2A8AB754A795D9EEL) /* 849 */, + unchecked((long) 0xA442F7552F72943DL) /* 850 */, unchecked((long) 0x2C31334E19781208L) /* 851 */, + unchecked((long) 0x4FA98D7CEAEE6291L) /* 852 */, unchecked((long) 0x55C3862F665DB309L) /* 853 */, + unchecked((long) 0xBD0610175D53B1F3L) /* 854 */, unchecked((long) 0x46FE6CB840413F27L) /* 855 */, + unchecked((long) 0x3FE03792DF0CFA59L) /* 856 */, unchecked((long) 0xCFE700372EB85E8FL) /* 857 */, + unchecked((long) 0xA7BE29E7ADBCE118L) /* 858 */, unchecked((long) 0xE544EE5CDE8431DDL) /* 859 */, + unchecked((long) 0x8A781B1B41F1873EL) /* 860 */, unchecked((long) 0xA5C94C78A0D2F0E7L) /* 861 */, + unchecked((long) 0x39412E2877B60728L) /* 862 */, unchecked((long) 0xA1265EF3AFC9A62CL) /* 863 */, + unchecked((long) 0xBCC2770C6A2506C5L) /* 864 */, unchecked((long) 0x3AB66DD5DCE1CE12L) /* 865 */, + unchecked((long) 0xE65499D04A675B37L) /* 866 */, unchecked((long) 0x7D8F523481BFD216L) /* 867 */, + unchecked((long) 0x0F6F64FCEC15F389L) /* 868 */, unchecked((long) 0x74EFBE618B5B13C8L) /* 869 */, + unchecked((long) 0xACDC82B714273E1DL) /* 870 */, unchecked((long) 0xDD40BFE003199D17L) /* 871 */, + unchecked((long) 0x37E99257E7E061F8L) /* 872 */, unchecked((long) 0xFA52626904775AAAL) /* 873 */, + unchecked((long) 0x8BBBF63A463D56F9L) /* 874 */, unchecked((long) 0xF0013F1543A26E64L) /* 875 */, + unchecked((long) 0xA8307E9F879EC898L) /* 876 */, unchecked((long) 0xCC4C27A4150177CCL) /* 877 */, + unchecked((long) 0x1B432F2CCA1D3348L) /* 878 */, unchecked((long) 0xDE1D1F8F9F6FA013L) /* 879 */, + unchecked((long) 0x606602A047A7DDD6L) /* 880 */, unchecked((long) 0xD237AB64CC1CB2C7L) /* 881 */, + unchecked((long) 0x9B938E7225FCD1D3L) /* 882 */, unchecked((long) 0xEC4E03708E0FF476L) /* 883 */, + unchecked((long) 0xFEB2FBDA3D03C12DL) /* 884 */, unchecked((long) 0xAE0BCED2EE43889AL) /* 885 */, + unchecked((long) 0x22CB8923EBFB4F43L) /* 886 */, unchecked((long) 0x69360D013CF7396DL) /* 887 */, + unchecked((long) 0x855E3602D2D4E022L) /* 888 */, unchecked((long) 0x073805BAD01F784CL) /* 889 */, + unchecked((long) 0x33E17A133852F546L) /* 890 */, unchecked((long) 0xDF4874058AC7B638L) /* 891 */, + unchecked((long) 0xBA92B29C678AA14AL) /* 892 */, unchecked((long) 0x0CE89FC76CFAADCDL) /* 893 */, + unchecked((long) 0x5F9D4E0908339E34L) /* 894 */, unchecked((long) 0xF1AFE9291F5923B9L) /* 895 */, + unchecked((long) 0x6E3480F60F4A265FL) /* 896 */, unchecked((long) 0xEEBF3A2AB29B841CL) /* 897 */, + unchecked((long) 0xE21938A88F91B4ADL) /* 898 */, unchecked((long) 0x57DFEFF845C6D3C3L) /* 899 */, + unchecked((long) 0x2F006B0BF62CAAF2L) /* 900 */, unchecked((long) 0x62F479EF6F75EE78L) /* 901 */, + unchecked((long) 0x11A55AD41C8916A9L) /* 902 */, unchecked((long) 0xF229D29084FED453L) /* 903 */, + unchecked((long) 0x42F1C27B16B000E6L) /* 904 */, unchecked((long) 0x2B1F76749823C074L) /* 905 */, + unchecked((long) 0x4B76ECA3C2745360L) /* 906 */, unchecked((long) 0x8C98F463B91691BDL) /* 907 */, + unchecked((long) 0x14BCC93CF1ADE66AL) /* 908 */, unchecked((long) 0x8885213E6D458397L) /* 909 */, + unchecked((long) 0x8E177DF0274D4711L) /* 910 */, unchecked((long) 0xB49B73B5503F2951L) /* 911 */, + unchecked((long) 0x10168168C3F96B6BL) /* 912 */, unchecked((long) 0x0E3D963B63CAB0AEL) /* 913 */, + unchecked((long) 0x8DFC4B5655A1DB14L) /* 914 */, unchecked((long) 0xF789F1356E14DE5CL) /* 915 */, + unchecked((long) 0x683E68AF4E51DAC1L) /* 916 */, unchecked((long) 0xC9A84F9D8D4B0FD9L) /* 917 */, + unchecked((long) 0x3691E03F52A0F9D1L) /* 918 */, unchecked((long) 0x5ED86E46E1878E80L) /* 919 */, + unchecked((long) 0x3C711A0E99D07150L) /* 920 */, unchecked((long) 0x5A0865B20C4E9310L) /* 921 */, + unchecked((long) 0x56FBFC1FE4F0682EL) /* 922 */, unchecked((long) 0xEA8D5DE3105EDF9BL) /* 923 */, + unchecked((long) 0x71ABFDB12379187AL) /* 924 */, unchecked((long) 0x2EB99DE1BEE77B9CL) /* 925 */, + unchecked((long) 0x21ECC0EA33CF4523L) /* 926 */, unchecked((long) 0x59A4D7521805C7A1L) /* 927 */, + unchecked((long) 0x3896F5EB56AE7C72L) /* 928 */, unchecked((long) 0xAA638F3DB18F75DCL) /* 929 */, + unchecked((long) 0x9F39358DABE9808EL) /* 930 */, unchecked((long) 0xB7DEFA91C00B72ACL) /* 931 */, + unchecked((long) 0x6B5541FD62492D92L) /* 932 */, unchecked((long) 0x6DC6DEE8F92E4D5BL) /* 933 */, + unchecked((long) 0x353F57ABC4BEEA7EL) /* 934 */, unchecked((long) 0x735769D6DA5690CEL) /* 935 */, + unchecked((long) 0x0A234AA642391484L) /* 936 */, unchecked((long) 0xF6F9508028F80D9DL) /* 937 */, + unchecked((long) 0xB8E319A27AB3F215L) /* 938 */, unchecked((long) 0x31AD9C1151341A4DL) /* 939 */, + unchecked((long) 0x773C22A57BEF5805L) /* 940 */, unchecked((long) 0x45C7561A07968633L) /* 941 */, + unchecked((long) 0xF913DA9E249DBE36L) /* 942 */, unchecked((long) 0xDA652D9B78A64C68L) /* 943 */, + unchecked((long) 0x4C27A97F3BC334EFL) /* 944 */, unchecked((long) 0x76621220E66B17F4L) /* 945 */, + unchecked((long) 0x967743899ACD7D0BL) /* 946 */, unchecked((long) 0xF3EE5BCAE0ED6782L) /* 947 */, + unchecked((long) 0x409F753600C879FCL) /* 948 */, unchecked((long) 0x06D09A39B5926DB6L) /* 949 */, + unchecked((long) 0x6F83AEB0317AC588L) /* 950 */, unchecked((long) 0x01E6CA4A86381F21L) /* 951 */, + unchecked((long) 0x66FF3462D19F3025L) /* 952 */, unchecked((long) 0x72207C24DDFD3BFBL) /* 953 */, + unchecked((long) 0x4AF6B6D3E2ECE2EBL) /* 954 */, unchecked((long) 0x9C994DBEC7EA08DEL) /* 955 */, + unchecked((long) 0x49ACE597B09A8BC4L) /* 956 */, unchecked((long) 0xB38C4766CF0797BAL) /* 957 */, + unchecked((long) 0x131B9373C57C2A75L) /* 958 */, unchecked((long) 0xB1822CCE61931E58L) /* 959 */, + unchecked((long) 0x9D7555B909BA1C0CL) /* 960 */, unchecked((long) 0x127FAFDD937D11D2L) /* 961 */, + unchecked((long) 0x29DA3BADC66D92E4L) /* 962 */, unchecked((long) 0xA2C1D57154C2ECBCL) /* 963 */, + unchecked((long) 0x58C5134D82F6FE24L) /* 964 */, unchecked((long) 0x1C3AE3515B62274FL) /* 965 */, + unchecked((long) 0xE907C82E01CB8126L) /* 966 */, unchecked((long) 0xF8ED091913E37FCBL) /* 967 */, + unchecked((long) 0x3249D8F9C80046C9L) /* 968 */, unchecked((long) 0x80CF9BEDE388FB63L) /* 969 */, + unchecked((long) 0x1881539A116CF19EL) /* 970 */, unchecked((long) 0x5103F3F76BD52457L) /* 971 */, + unchecked((long) 0x15B7E6F5AE47F7A8L) /* 972 */, unchecked((long) 0xDBD7C6DED47E9CCFL) /* 973 */, + unchecked((long) 0x44E55C410228BB1AL) /* 974 */, unchecked((long) 0xB647D4255EDB4E99L) /* 975 */, + unchecked((long) 0x5D11882BB8AAFC30L) /* 976 */, unchecked((long) 0xF5098BBB29D3212AL) /* 977 */, + unchecked((long) 0x8FB5EA14E90296B3L) /* 978 */, unchecked((long) 0x677B942157DD025AL) /* 979 */, + unchecked((long) 0xFB58E7C0A390ACB5L) /* 980 */, unchecked((long) 0x89D3674C83BD4A01L) /* 981 */, + unchecked((long) 0x9E2DA4DF4BF3B93BL) /* 982 */, unchecked((long) 0xFCC41E328CAB4829L) /* 983 */, + unchecked((long) 0x03F38C96BA582C52L) /* 984 */, unchecked((long) 0xCAD1BDBD7FD85DB2L) /* 985 */, + unchecked((long) 0xBBB442C16082AE83L) /* 986 */, unchecked((long) 0xB95FE86BA5DA9AB0L) /* 987 */, + unchecked((long) 0xB22E04673771A93FL) /* 988 */, unchecked((long) 0x845358C9493152D8L) /* 989 */, + unchecked((long) 0xBE2A488697B4541EL) /* 990 */, unchecked((long) 0x95A2DC2DD38E6966L) /* 991 */, + unchecked((long) 0xC02C11AC923C852BL) /* 992 */, unchecked((long) 0x2388B1990DF2A87BL) /* 993 */, + unchecked((long) 0x7C8008FA1B4F37BEL) /* 994 */, unchecked((long) 0x1F70D0C84D54E503L) /* 995 */, + unchecked((long) 0x5490ADEC7ECE57D4L) /* 996 */, unchecked((long) 0x002B3C27D9063A3AL) /* 997 */, + unchecked((long) 0x7EAEA3848030A2BFL) /* 998 */, unchecked((long) 0xC602326DED2003C0L) /* 999 */, + unchecked((long) 0x83A7287D69A94086L) /* 1000 */, unchecked((long) 0xC57A5FCB30F57A8AL) /* 1001 */, + unchecked((long) 0xB56844E479EBE779L) /* 1002 */, unchecked((long) 0xA373B40F05DCBCE9L) /* 1003 */, + unchecked((long) 0xD71A786E88570EE2L) /* 1004 */, unchecked((long) 0x879CBACDBDE8F6A0L) /* 1005 */, + unchecked((long) 0x976AD1BCC164A32FL) /* 1006 */, unchecked((long) 0xAB21E25E9666D78BL) /* 1007 */, + unchecked((long) 0x901063AAE5E5C33CL) /* 1008 */, unchecked((long) 0x9818B34448698D90L) /* 1009 */, + unchecked((long) 0xE36487AE3E1E8ABBL) /* 1010 */, unchecked((long) 0xAFBDF931893BDCB4L) /* 1011 */, + unchecked((long) 0x6345A0DC5FBBD519L) /* 1012 */, unchecked((long) 0x8628FE269B9465CAL) /* 1013 */, + unchecked((long) 0x1E5D01603F9C51ECL) /* 1014 */, unchecked((long) 0x4DE44006A15049B7L) /* 1015 */, + unchecked((long) 0xBF6C70E5F776CBB1L) /* 1016 */, unchecked((long) 0x411218F2EF552BEDL) /* 1017 */, + unchecked((long) 0xCB0C0708705A36A3L) /* 1018 */, unchecked((long) 0xE74D14754F986044L) /* 1019 */, + unchecked((long) 0xCD56D9430EA8280EL) /* 1020 */, unchecked((long) 0xC12591D7535F5065L) /* 1021 */, + unchecked((long) 0xC83223F1720AEF96L) /* 1022 */, unchecked((long) 0xC3A0396F7363A51FL) /* 1023 */ + }; + + private const int DigestLength = 24; + + // + // registers + // + private long a, b, c; + private long byteCount; + + // + // buffers + // + private byte[] m_buffer = new byte[8]; + private int bOff; + + private long[] x = new long[8]; + private int xOff; + + /** + * Standard constructor + */ + public TigerDigest() + { + Reset(); + } + + /** + * Copy constructor. This will copy the state of the provided + * message digest. + */ + public TigerDigest(TigerDigest t) + { + Reset(t); + } + + public string AlgorithmName + { + get { return "Tiger"; } + } + + public int GetDigestSize() + { + return DigestLength; + } + + public int GetByteLength() + { + return MyByteLength; + } + + private void ProcessWord(byte[] b, int off) + { + x[xOff++] = (long)Pack.LE_To_UInt64(b, off); + + if (xOff == x.Length) + { + ProcessBlock(); + } + + bOff = 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void ProcessWord(ReadOnlySpan b) + { + x[xOff++] = (long)Pack.LE_To_UInt64(b); + + if (xOff == x.Length) + { + ProcessBlock(); + } + + bOff = 0; + } +#endif + + public void Update( + byte input) + { + m_buffer[bOff++] = input; + + if (bOff == m_buffer.Length) + { + ProcessWord(m_buffer, 0); + } + + byteCount++; + } + + public void BlockUpdate( + byte[] input, + int inOff, + int length) + { + // + // fill the current word + // + while ((bOff != 0) && (length > 0)) + { + Update(input[inOff]); + + inOff++; + length--; + } + + // + // process whole words. + // + while (length >= 8) + { + ProcessWord(input, inOff); + + inOff += 8; + length -= 8; + byteCount += 8; + } + + // + // load in the remainder. + // + while (length > 0) + { + Update(input[inOff]); + + inOff++; + length--; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int inOff = 0, length = input.Length; + + // + // fill the current word + // + while ((bOff != 0) && (length > 0)) + { + Update(input[inOff]); + + inOff++; + length--; + } + + // + // process whole words. + // + while (length >= 8) + { + ProcessWord(input[inOff..]); + + inOff += 8; + length -= 8; + byteCount += 8; + } + + // + // load in the remainder. + // + while (length > 0) + { + Update(input[inOff]); + + inOff++; + length--; + } + } +#endif + + private void RoundABC( + long x, + long mul) + { + c ^= x ; + a -= t1[(int)c & 0xff] ^ t2[(int)(c >> 16) & 0xff] + ^ t3[(int)(c >> 32) & 0xff] ^ t4[(int)(c >> 48) & 0xff]; + b += t4[(int)(c >> 8) & 0xff] ^ t3[(int)(c >> 24) & 0xff] + ^ t2[(int)(c >> 40) & 0xff] ^ t1[(int)(c >> 56) & 0xff]; + b *= mul; + } + + private void RoundBCA( + long x, + long mul) + { + a ^= x ; + b -= t1[(int)a & 0xff] ^ t2[(int)(a >> 16) & 0xff] + ^ t3[(int)(a >> 32) & 0xff] ^ t4[(int)(a >> 48) & 0xff]; + c += t4[(int)(a >> 8) & 0xff] ^ t3[(int)(a >> 24) & 0xff] + ^ t2[(int)(a >> 40) & 0xff] ^ t1[(int)(a >> 56) & 0xff]; + c *= mul; + } + + private void RoundCAB( + long x, + long mul) + { + b ^= x ; + c -= t1[(int)b & 0xff] ^ t2[(int)(b >> 16) & 0xff] + ^ t3[(int)(b >> 32) & 0xff] ^ t4[(int)(b >> 48) & 0xff]; + a += t4[(int)(b >> 8) & 0xff] ^ t3[(int)(b >> 24) & 0xff] + ^ t2[(int)(b >> 40) & 0xff] ^ t1[(int)(b >> 56) & 0xff]; + a *= mul; + } + + private void KeySchedule() + { + x[0] -= x[7] ^ unchecked ((long) 0xA5A5A5A5A5A5A5A5L); + x[1] ^= x[0]; + x[2] += x[1]; + x[3] -= x[2] ^ ((~x[1]) << 19); + x[4] ^= x[3]; + x[5] += x[4]; + x[6] -= x[5] ^ (long) ((ulong) (~x[4]) >> 23); + x[7] ^= x[6]; + x[0] += x[7]; + x[1] -= x[0] ^ ((~x[7]) << 19); + x[2] ^= x[1]; + x[3] += x[2]; + x[4] -= x[3] ^ (long) ((ulong) (~x[2]) >> 23); + x[5] ^= x[4]; + x[6] += x[5]; + x[7] -= x[6] ^ 0x0123456789ABCDEFL; + } + + private void ProcessBlock() + { + // + // save abc + // + long aa = a; + long bb = b; + long cc = c; + + // + // rounds and schedule + // + RoundABC(x[0], 5); + RoundBCA(x[1], 5); + RoundCAB(x[2], 5); + RoundABC(x[3], 5); + RoundBCA(x[4], 5); + RoundCAB(x[5], 5); + RoundABC(x[6], 5); + RoundBCA(x[7], 5); + + KeySchedule(); + + RoundCAB(x[0], 7); + RoundABC(x[1], 7); + RoundBCA(x[2], 7); + RoundCAB(x[3], 7); + RoundABC(x[4], 7); + RoundBCA(x[5], 7); + RoundCAB(x[6], 7); + RoundABC(x[7], 7); + + KeySchedule(); + + RoundBCA(x[0], 9); + RoundCAB(x[1], 9); + RoundABC(x[2], 9); + RoundBCA(x[3], 9); + RoundCAB(x[4], 9); + RoundABC(x[5], 9); + RoundBCA(x[6], 9); + RoundCAB(x[7], 9); + + // + // feed forward + // + a ^= aa; + b -= bb; + c += cc; + + // + // clear the x buffer + // + xOff = 0; + for (int i = 0; i != x.Length; i++) + { + x[i] = 0; + } + } + + private void ProcessLength( + long bitLength) + { + x[7] = bitLength; + } + + private void Finish() + { + long bitLength = (byteCount << 3); + + Update((byte)0x01); + + while (bOff != 0) + { + Update((byte)0); + } + + ProcessLength(bitLength); + + ProcessBlock(); + } + + public int DoFinal( + byte[] output, + int outOff) + { + Finish(); + + Pack.UInt64_To_LE((ulong)a, output, outOff); + Pack.UInt64_To_LE((ulong)b, output, outOff + 8); + Pack.UInt64_To_LE((ulong)c, output, outOff + 16); + + Reset(); + + return DigestLength; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + Finish(); + + Pack.UInt64_To_LE((ulong)a, output); + Pack.UInt64_To_LE((ulong)b, output[8..]); + Pack.UInt64_To_LE((ulong)c, output[16..]); + + Reset(); + + return DigestLength; + } +#endif + + /** + * reset the chaining variables + */ + public void Reset() + { + a = unchecked((long) 0x0123456789ABCDEFL); + b = unchecked((long) 0xFEDCBA9876543210L); + c = unchecked((long) 0xF096A5B4C3B2E187L); + + xOff = 0; + for (int i = 0; i != x.Length; i++) + { + x[i] = 0; + } + + bOff = 0; + for (int i = 0; i != m_buffer.Length; i++) + { + m_buffer[i] = 0; + } + + byteCount = 0; + } + + public IMemoable Copy() + { + return new TigerDigest(this); + } + + public void Reset(IMemoable other) + { + TigerDigest t = (TigerDigest)other; + + a = t.a; + b = t.b; + c = t.c; + + Array.Copy(t.x, 0, x, 0, t.x.Length); + xOff = t.xOff; + + Array.Copy(t.m_buffer, 0, m_buffer, 0, t.m_buffer.Length); + bOff = t.bOff; + + byteCount = t.byteCount; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs.meta new file mode 100644 index 00000000..70e32cbe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d844a8a4d2da2bd4686ebc970d9a76ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TigerDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs new file mode 100644 index 00000000..216c7d10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs @@ -0,0 +1,165 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /// + /// TupleHash - a hash designed to simply hash a tuple of input strings, any or all of which may be empty strings, + /// in an unambiguous way with an optional XOF mode. + /// + /// From NIST Special Publication 800-185 - SHA-3 Derived Functions:cSHAKE, KMAC, TupleHash and ParallelHash + /// + /// + public class TupleHash + : IXof, IDigest + { + private static readonly byte[] N_TUPLE_HASH = Strings.ToByteArray("TupleHash"); + + private readonly CShakeDigest cshake; + private readonly int bitLength; + private readonly int outputLength; + + private bool firstOutput; + + /** + * Base constructor. + * + * @param bitLength bit length of the underlying SHAKE function, 128 or 256. + * @param S the customization string - available for local use. + */ + public TupleHash(int bitLength, byte[] S) + : this(bitLength, S, bitLength * 2) + { + + } + + public TupleHash(int bitLength, byte[] S, int outputSize) + { + this.cshake = new CShakeDigest(bitLength, N_TUPLE_HASH, S); + this.bitLength = bitLength; + this.outputLength = (outputSize + 7) / 8; + + Reset(); + } + + public TupleHash(TupleHash original) + { + this.cshake = new CShakeDigest(original.cshake); + this.bitLength = cshake.fixedOutputLength; + this.outputLength = bitLength * 2 / 8; + this.firstOutput = original.firstOutput; + } + + public virtual string AlgorithmName + { + get { return "TupleHash" + cshake.AlgorithmName.Substring(6); } + } + + public virtual int GetByteLength() + { + return cshake.GetByteLength(); + } + + public virtual int GetDigestSize() + { + return outputLength; + } + + public virtual void Update(byte b) + { + byte[] bytes = XofUtilities.Encode(b); + cshake.BlockUpdate(bytes, 0, bytes.Length); + } + + public virtual void BlockUpdate(byte[] inBuf, int inOff, int len) + { + byte[] bytes = XofUtilities.Encode(inBuf, inOff, len); + cshake.BlockUpdate(bytes, 0, bytes.Length); + } + + private void WrapUp(int outputSize) + { + byte[] encOut = XofUtilities.RightEncode(outputSize * 8); + + cshake.BlockUpdate(encOut, 0, encOut.Length); + + firstOutput = false; + } + + public virtual int DoFinal(byte[] outBuf, int outOff) + { + return OutputFinal(outBuf, outOff, GetDigestSize()); + } + + public virtual int OutputFinal(byte[] outBuf, int outOff, int outLen) + { + if (firstOutput) + { + WrapUp(GetDigestSize()); + } + + int rv = cshake.OutputFinal(outBuf, outOff, outLen); + + Reset(); + + return rv; + } + + public virtual int Output(byte[] outBuf, int outOff, int outLen) + { + if (firstOutput) + { + WrapUp(0); + } + + return cshake.Output(outBuf, outOff, outLen); + } + + public virtual void Reset() + { + cshake.Reset(); + firstOutput = true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + XofUtilities.EncodeTo(cshake, input); + } + + public virtual int DoFinal(Span output) + { + return OutputFinal(output[..GetDigestSize()]); + } + + public virtual int OutputFinal(Span output) + { + if (firstOutput) + { + WrapUp(GetDigestSize()); + } + + int rv = cshake.OutputFinal(output); + + Reset(); + + return rv; + } + + public virtual int Output(Span output) + { + if (firstOutput) + { + WrapUp(0); + } + + return cshake.Output(output); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs.meta new file mode 100644 index 00000000..d302209a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df6122cc4bf939f458500f4a09da5bb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/TupleHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs new file mode 100644 index 00000000..e04defac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs @@ -0,0 +1,386 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + /** + * Implementation of WhirlpoolDigest, based on Java source published by Barreto and Rijmen. + */ + public sealed class WhirlpoolDigest + : IDigest, IMemoable + { + private const int BITCOUNT_ARRAY_SIZE = 32; + private const int BYTE_LENGTH = 64; + private const int DIGEST_LENGTH_BYTES = 512 / 8; + private const int REDUCTION_POLYNOMIAL = 0x011d; // 2^8 + 2^4 + 2^3 + 2 + 1; + private const int ROUNDS = 10; + + private static readonly int[] SBOX = + { + 0x18, 0x23, 0xc6, 0xe8, 0x87, 0xb8, 0x01, 0x4f, 0x36, 0xa6, 0xd2, 0xf5, 0x79, 0x6f, 0x91, 0x52, + 0x60, 0xbc, 0x9b, 0x8e, 0xa3, 0x0c, 0x7b, 0x35, 0x1d, 0xe0, 0xd7, 0xc2, 0x2e, 0x4b, 0xfe, 0x57, + 0x15, 0x77, 0x37, 0xe5, 0x9f, 0xf0, 0x4a, 0xda, 0x58, 0xc9, 0x29, 0x0a, 0xb1, 0xa0, 0x6b, 0x85, + 0xbd, 0x5d, 0x10, 0xf4, 0xcb, 0x3e, 0x05, 0x67, 0xe4, 0x27, 0x41, 0x8b, 0xa7, 0x7d, 0x95, 0xd8, + 0xfb, 0xee, 0x7c, 0x66, 0xdd, 0x17, 0x47, 0x9e, 0xca, 0x2d, 0xbf, 0x07, 0xad, 0x5a, 0x83, 0x33, + 0x63, 0x02, 0xaa, 0x71, 0xc8, 0x19, 0x49, 0xd9, 0xf2, 0xe3, 0x5b, 0x88, 0x9a, 0x26, 0x32, 0xb0, + 0xe9, 0x0f, 0xd5, 0x80, 0xbe, 0xcd, 0x34, 0x48, 0xff, 0x7a, 0x90, 0x5f, 0x20, 0x68, 0x1a, 0xae, + 0xb4, 0x54, 0x93, 0x22, 0x64, 0xf1, 0x73, 0x12, 0x40, 0x08, 0xc3, 0xec, 0xdb, 0xa1, 0x8d, 0x3d, + 0x97, 0x00, 0xcf, 0x2b, 0x76, 0x82, 0xd6, 0x1b, 0xb5, 0xaf, 0x6a, 0x50, 0x45, 0xf3, 0x30, 0xef, + 0x3f, 0x55, 0xa2, 0xea, 0x65, 0xba, 0x2f, 0xc0, 0xde, 0x1c, 0xfd, 0x4d, 0x92, 0x75, 0x06, 0x8a, + 0xb2, 0xe6, 0x0e, 0x1f, 0x62, 0xd4, 0xa8, 0x96, 0xf9, 0xc5, 0x25, 0x59, 0x84, 0x72, 0x39, 0x4c, + 0x5e, 0x78, 0x38, 0x8c, 0xd1, 0xa5, 0xe2, 0x61, 0xb3, 0x21, 0x9c, 0x1e, 0x43, 0xc7, 0xfc, 0x04, + 0x51, 0x99, 0x6d, 0x0d, 0xfa, 0xdf, 0x7e, 0x24, 0x3b, 0xab, 0xce, 0x11, 0x8f, 0x4e, 0xb7, 0xeb, + 0x3c, 0x81, 0x94, 0xf7, 0xb9, 0x13, 0x2c, 0xd3, 0xe7, 0x6e, 0xc4, 0x03, 0x56, 0x44, 0x7f, 0xa9, + 0x2a, 0xbb, 0xc1, 0x53, 0xdc, 0x0b, 0x9d, 0x6c, 0x31, 0x74, 0xf6, 0x46, 0xac, 0x89, 0x14, 0xe1, + 0x16, 0x3a, 0x69, 0x09, 0x70, 0xb6, 0xd0, 0xed, 0xcc, 0x42, 0x98, 0xa4, 0x28, 0x5c, 0xf8, 0x86 + }; + + private static readonly ulong[] C0 = new ulong[256]; + private static readonly ulong[] C1 = new ulong[256]; + private static readonly ulong[] C2 = new ulong[256]; + private static readonly ulong[] C3 = new ulong[256]; + private static readonly ulong[] C4 = new ulong[256]; + private static readonly ulong[] C5 = new ulong[256]; + private static readonly ulong[] C6 = new ulong[256]; + private static readonly ulong[] C7 = new ulong[256]; + + /* + * increment() can be implemented in this way using 2 arrays or + * by having some temporary variables that are used to set the + * value provided by EIGHT[i] and carry within the loop. + * + * not having done any timing, this seems likely to be faster + * at the slight expense of 32*(sizeof short) bytes + */ + private static readonly short[] EIGHT = new short[BITCOUNT_ARRAY_SIZE]; + + static WhirlpoolDigest() + { + EIGHT[BITCOUNT_ARRAY_SIZE - 1] = 8; + + for (int i = 0; i < 256; i++) + { + int v1 = SBOX[i]; + int v2 = MulX(v1); + int v4 = MulX(v2); + int v5 = v4 ^ v1; + int v8 = MulX(v4); + int v9 = v8 ^ v1; + + C0[i] = PackIntoUInt64(v1, v1, v4, v1, v8, v5, v2, v9); + C1[i] = PackIntoUInt64(v9, v1, v1, v4, v1, v8, v5, v2); + C2[i] = PackIntoUInt64(v2, v9, v1, v1, v4, v1, v8, v5); + C3[i] = PackIntoUInt64(v5, v2, v9, v1, v1, v4, v1, v8); + C4[i] = PackIntoUInt64(v8, v5, v2, v9, v1, v1, v4, v1); + C5[i] = PackIntoUInt64(v1, v8, v5, v2, v9, v1, v1, v4); + C6[i] = PackIntoUInt64(v4, v1, v8, v5, v2, v9, v1, v1); + C7[i] = PackIntoUInt64(v1, v4, v1, v8, v5, v2, v9, v1); + } + } + + // int's are used to prevent sign extension. The values that are really being used are actually just 0..255 + private static int MulX(int input) + { + return (input << 1) ^ (-(input >> 7) & REDUCTION_POLYNOMIAL); + } + + private static ulong PackIntoUInt64(int b7, int b6, int b5, int b4, int b3, int b2, int b1, int b0) + { + return ((ulong)b7 << 56) ^ + ((ulong)b6 << 48) ^ + ((ulong)b5 << 40) ^ + ((ulong)b4 << 32) ^ + ((ulong)b3 << 24) ^ + ((ulong)b2 << 16) ^ + ((ulong)b1 << 8) ^ + (ulong)b0; + } + + private readonly ulong[] _rc = new ulong[ROUNDS + 1]; + + public WhirlpoolDigest() + { + _rc[0] = 0UL; + for (int r = 1; r <= ROUNDS; r++) + { + int i = 8 * (r - 1); + _rc[r] = + (C0[i ] & 0xff00000000000000UL) ^ + (C1[i + 1] & 0x00ff000000000000UL) ^ + (C2[i + 2] & 0x0000ff0000000000UL) ^ + (C3[i + 3] & 0x000000ff00000000UL) ^ + (C4[i + 4] & 0x00000000ff000000UL) ^ + (C5[i + 5] & 0x0000000000ff0000UL) ^ + (C6[i + 6] & 0x000000000000ff00UL) ^ + (C7[i + 7] & 0x00000000000000ffUL); + } + } + + // --------------------------------------------------------------------------------------// + + // -- buffer information -- + private byte[] _buffer = new byte[64]; + private int _bufferPos; + private short[] _bitCount = new short[BITCOUNT_ARRAY_SIZE]; + + // -- internal hash state -- + private ulong[] _hash = new ulong[8]; + private ulong[] _K = new ulong[8]; // the round key + private ulong[] _L = new ulong[8]; + private ulong[] _block = new ulong[8]; // mu (buffer) + private ulong[] _state = new ulong[8]; // the current "cipher" state + + /** + * Copy constructor. This will copy the state of the provided message digest. + */ + public WhirlpoolDigest(WhirlpoolDigest originalDigest) + { + Reset(originalDigest); + } + + public string AlgorithmName + { + get { return "Whirlpool"; } + } + + public int GetDigestSize() + { + return DIGEST_LENGTH_BYTES; + } + + public int DoFinal(byte[] output, int outOff) + { + // sets output[outOff] .. output[outOff+DIGEST_LENGTH_BYTES] + Finish(); + + Pack.UInt64_To_BE(_hash, output, outOff); + + Reset(); + + return GetDigestSize(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + // sets output[0..DIGEST_LENGTH_BYTES] + Finish(); + + Pack.UInt64_To_BE(_hash, output); + + Reset(); + + return GetDigestSize(); + } +#endif + + /** + * Reset the chaining variables + */ + public void Reset() + { + // set variables to null, blank, whatever + _bufferPos = 0; + Array.Clear(_bitCount, 0, _bitCount.Length); + Array.Clear(_buffer, 0, _buffer.Length); + Array.Clear(_hash, 0, _hash.Length); + Array.Clear(_K, 0, _K.Length); + Array.Clear(_L, 0, _L.Length); + Array.Clear(_block, 0, _block.Length); + Array.Clear(_state, 0, _state.Length); + } + + // this takes a buffer of information and fills the block + private void ProcessFilledBuffer() + { + // copies into the block... + Pack.BE_To_UInt64(_buffer, 0, _block); + ProcessBlock(); + _bufferPos = 0; + Array.Clear(_buffer, 0, _buffer.Length); + } + + private void ProcessBlock() + { + // buffer contents have been transferred to the _block[] array via ProcessFilledBuffer + + // compute and apply K^0 + for (int i = 0; i < 8; i++) + { + _state[i] = _block[i] ^ (_K[i] = _hash[i]); + } + + // iterate over the rounds + for (int round = 1; round <= ROUNDS; round++) + { + for (int i = 0; i < 8; i++) + { + _L[i] = C0[(int)(_K[(i - 0) & 7] >> 56) & 0xff]; + _L[i] ^= C1[(int)(_K[(i - 1) & 7] >> 48) & 0xff]; + _L[i] ^= C2[(int)(_K[(i - 2) & 7] >> 40) & 0xff]; + _L[i] ^= C3[(int)(_K[(i - 3) & 7] >> 32) & 0xff]; + _L[i] ^= C4[(int)(_K[(i - 4) & 7] >> 24) & 0xff]; + _L[i] ^= C5[(int)(_K[(i - 5) & 7] >> 16) & 0xff]; + _L[i] ^= C6[(int)(_K[(i - 6) & 7] >> 8) & 0xff]; + _L[i] ^= C7[(int)(_K[(i - 7) & 7]) & 0xff]; + } + + Array.Copy(_L, 0, _K, 0, _K.Length); + + _K[0] ^= _rc[round]; + + // apply the round transformation + for (int i = 0; i < 8; i++) + { + _L[i] = _K[i]; + + _L[i] ^= C0[(int)(_state[(i - 0) & 7] >> 56) & 0xff]; + _L[i] ^= C1[(int)(_state[(i - 1) & 7] >> 48) & 0xff]; + _L[i] ^= C2[(int)(_state[(i - 2) & 7] >> 40) & 0xff]; + _L[i] ^= C3[(int)(_state[(i - 3) & 7] >> 32) & 0xff]; + _L[i] ^= C4[(int)(_state[(i - 4) & 7] >> 24) & 0xff]; + _L[i] ^= C5[(int)(_state[(i - 5) & 7] >> 16) & 0xff]; + _L[i] ^= C6[(int)(_state[(i - 6) & 7] >> 8) & 0xff]; + _L[i] ^= C7[(int)(_state[(i - 7) & 7]) & 0xff]; + } + + // save the current state + Array.Copy(_L, 0, _state, 0, _state.Length); + } + + // apply Miuaguchi-Preneel compression + for (int i = 0; i < 8; i++) + { + _hash[i] ^= _state[i] ^ _block[i]; + } + } + + public void Update(byte input) + { + _buffer[_bufferPos] = input; + if (++_bufferPos == _buffer.Length) + { + ProcessFilledBuffer(); + } + + Increment(); + } + + private void Increment() + { + int carry = 0; + for (int i = _bitCount.Length - 1; i >= 0; i--) + { + int sum = (_bitCount[i] & 0xff) + EIGHT[i] + carry; + + carry = sum >> 8; + _bitCount[i] = (short)(sum & 0xff); + } + } + + public void BlockUpdate(byte[] input, int inOff, int length) + { + while (length > 0) + { + Update(input[inOff]); + ++inOff; + --length; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + for (int i = 0; i < input.Length; ++i) + { + Update(input[i]); + } + } +#endif + + private void Finish() + { + /* + * this makes a copy of the current bit length. at the expense of an + * object creation of 32 bytes rather than providing a _stopCounting + * boolean which was the alternative I could think of. + */ + byte[] bitLength = CopyBitLength(); + + _buffer[_bufferPos] |= 0x80; + if (++_bufferPos == _buffer.Length) + { + ProcessFilledBuffer(); + } + + /* + * Final block contains + * [ ... data .... ][0][0][0][ length ] + * + * if [ length ] cannot fit. Need to create a new block. + */ + if (_bufferPos > 32) + { + while (_bufferPos != 0) + { + Update((byte)0); + } + } + + while (_bufferPos <= 32) + { + Update((byte)0); + } + + // copy the length information to the final 32 bytes of the 64 byte block.... + Array.Copy(bitLength, 0, _buffer, 32, bitLength.Length); + + ProcessFilledBuffer(); + } + + private byte[] CopyBitLength() + { + byte[] rv = new byte[BITCOUNT_ARRAY_SIZE]; + for (int i = 0; i < rv.Length; i++) + { + rv[i] = (byte)(_bitCount[i] & 0xff); + } + return rv; + } + + public int GetByteLength() + { + return BYTE_LENGTH; + } + + public IMemoable Copy() + { + return new WhirlpoolDigest(this); + } + + public void Reset(IMemoable other) + { + WhirlpoolDigest originalDigest = (WhirlpoolDigest)other; + + Array.Copy(originalDigest._rc, 0, _rc, 0, _rc.Length); + + Array.Copy(originalDigest._buffer, 0, _buffer, 0, _buffer.Length); + + this._bufferPos = originalDigest._bufferPos; + Array.Copy(originalDigest._bitCount, 0, _bitCount, 0, _bitCount.Length); + + // -- internal hash state -- + Array.Copy(originalDigest._hash, 0, _hash, 0, _hash.Length); + Array.Copy(originalDigest._K, 0, _K, 0, _K.Length); + Array.Copy(originalDigest._L, 0, _L, 0, _L.Length); + Array.Copy(originalDigest._block, 0, _block, 0, _block.Length); + Array.Copy(originalDigest._state, 0, _state, 0, _state.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs.meta new file mode 100644 index 00000000..d1752777 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 18d8b02a2f6887d4e895210123d65ad1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/WhirlpoolDigest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs new file mode 100644 index 00000000..4a53ddf2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests +{ + internal class XofUtilities + { + internal static byte[] LeftEncode(long strLen) + { + byte n = 1; + + long v = strLen; + while ((v >>= 8) != 0) + { + n++; + } + + byte[] b = new byte[n + 1]; + + b[0] = n; + + for (int i = 1; i <= n; i++) + { + b[i] = (byte)(strLen >> (8 * (n - i))); + } + + return b; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static int LeftEncode(long length, Span lengthEncoding) + { + byte n = 1; + + long v = length; + while ((v >>= 8) != 0) + { + n++; + } + + lengthEncoding[0] = n; + for (int i = 1; i <= n; i++) + { + lengthEncoding[i] = (byte)(length >> (8 * (n - i))); + } + return 1 + n; + } +#endif + + internal static byte[] RightEncode(long strLen) + { + byte n = 1; + + long v = strLen; + while ((v >>= 8) != 0) + { + n++; + } + + byte[] b = new byte[n + 1]; + + b[n] = n; + + for (int i = 0; i < n; i++) + { + b[i] = (byte)(strLen >> (8 * (n - i - 1))); + } + + return b; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static int RightEncode(long length, Span lengthEncoding) + { + byte n = 1; + + long v = length; + while ((v >>= 8) != 0) + { + n++; + } + + lengthEncoding[n] = n; + for (int i = 0; i < n; i++) + { + lengthEncoding[i] = (byte)(length >> (8 * (n - i - 1))); + } + return n + 1; + } +#endif + + internal static byte[] Encode(byte X) + { + return Arrays.Concatenate(LeftEncode(8), new byte[] { X }); + } + + internal static byte[] Encode(byte[] inBuf, int inOff, int len) + { + if (inBuf.Length == len) + { + return Arrays.Concatenate(LeftEncode(len * 8), inBuf); + } + return Arrays.Concatenate(LeftEncode(len * 8), Arrays.CopyOfRange(inBuf, inOff, inOff + len)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void EncodeTo(IDigest digest, ReadOnlySpan buf) + { + Span lengthEncoding = stackalloc byte[9]; + int count = LeftEncode(buf.Length * 8, lengthEncoding); + digest.BlockUpdate(lengthEncoding[..count]); + digest.BlockUpdate(buf); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs.meta new file mode 100644 index 00000000..9fee1049 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 44b50b608bf4d5f4299319d919b9830c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/digests/XofUtils.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec.meta new file mode 100644 index 00000000..1694278c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8d74dce1b4931eb409d9dfa32041fccf +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs new file mode 100644 index 00000000..36a8e93d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs @@ -0,0 +1,925 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC +{ + /// Elliptic curve registry for various customized curve implementations. + public static class CustomNamedCurves + { + private static X9ECPoint ConfigureBasepoint(ECCurve curve, string encoding) + { + X9ECPoint G = new X9ECPoint(curve, Hex.DecodeStrict(encoding)); + WNafUtilities.ConfigureBasepoint(G.Point); + return G; + } + + private static ECCurve ConfigureCurve(ECCurve curve) + { + return curve; + } + + private static ECCurve ConfigureCurveGlv(ECCurve c, GlvTypeBParameters p) + { + return c.Configure().SetEndomorphism(new GlvTypeBEndomorphism(c, p)).Create(); + } + + internal class SecP128R1Holder + : X9ECParametersHolder + { + private SecP128R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP128R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP128R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("000E0D4D696E6768756151750CC03A4473D03679"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04161FF7528B899B2D0C28607CA52C5B86CF5AC8395BAFEB13C02DA292DDED7A83"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecP160K1Holder + : X9ECParametersHolder + { + private SecP160K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP160K1Holder(); + + protected override ECCurve CreateCurve() + { + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("9ba48cba5ebcb9b6bd33b92830b2a2e0e192f10a", 16), + new BigInteger("c39c6c3b3a36d7701b9c71a1f5804ae5d0003f4", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("9162fbe73984472a0a9e", 16), + new BigInteger("-96341f1138933bc2f505", 16) }, + new BigInteger[]{ + new BigInteger("127971af8721782ecffa3", 16), + new BigInteger("9162fbe73984472a0a9e", 16) }, + new BigInteger("9162fbe73984472a0a9d0590", 16), + new BigInteger("96341f1138933bc2f503fd44", 16), + 176)); + return ConfigureCurveGlv(new SecP160K1Curve(), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "043B4C382CE37AA192A4019E763036F4F5DD4D7EBB938CF935318FDCED6BC28286531733C3F03C4FEE"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecP160R1Holder + : X9ECParametersHolder + { + private SecP160R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP160R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP160R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("1053CDE42C14D696E67687561517533BF3F83345"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "044A96B5688EF573284664698968C38BB913CBFC8223A628553168947D59DCC912042351377AC5FB32"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecP160R2Holder + : X9ECParametersHolder + { + private SecP160R2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP160R2Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP160R2Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("B99B99B099B323E02709A4D696E6768756151751"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0452DCB034293A117E1F4FF11B30F7199D3144CE6DFEAFFEF2E331F296E071FA0DF9982CFEA7D43F2E"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecP192K1Holder + : X9ECParametersHolder + { + private SecP192K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP192K1Holder(); + + protected override ECCurve CreateCurve() + { + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("bb85691939b869c1d087f601554b96b80cb4f55b35f433c2", 16), + new BigInteger("3d84f26c12238d7b4f3d516613c1759033b1a5800175d0b1", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("71169be7330b3038edb025f1", 16), + new BigInteger("-b3fb3400dec5c4adceb8655c", 16) }, + new BigInteger[]{ + new BigInteger("12511cfe811d0f4e6bc688b4d", 16), + new BigInteger("71169be7330b3038edb025f1", 16) }, + new BigInteger("71169be7330b3038edb025f1d0f9", 16), + new BigInteger("b3fb3400dec5c4adceb8655d4c94", 16), + 208)); + return ConfigureCurveGlv(new SecP192K1Curve(), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04DB4FF10EC057E9AE26B07D0280B7F4341DA5D1B1EAE06C7D9B2F2F6D9C5628A7844163D015BE86344082AA88D95E2F9D"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP192R1Holder + : X9ECParametersHolder + { + private SecP192R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP192R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP192R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("3045AE6FC8422F64ED579528D38120EAE12196D5"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF101207192B95FFC8DA78631011ED6B24CDD573F977A11E794811"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP224K1Holder + : X9ECParametersHolder + { + private SecP224K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP224K1Holder(); + + protected override ECCurve CreateCurve() + { + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("fe0e87005b4e83761908c5131d552a850b3f58b749c37cf5b84d6768", 16), + new BigInteger("60dcd2104c4cbc0be6eeefc2bdd610739ec34e317f9b33046c9e4788", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("6b8cf07d4ca75c88957d9d670591", 16), + new BigInteger("-b8adf1378a6eb73409fa6c9c637d", 16) }, + new BigInteger[]{ + new BigInteger("1243ae1b4d71613bc9f780a03690e", 16), + new BigInteger("6b8cf07d4ca75c88957d9d670591", 16) }, + new BigInteger("6b8cf07d4ca75c88957d9d67059037a4", 16), + new BigInteger("b8adf1378a6eb73409fa6c9c637ba7f5", 16), + 240)); + return ConfigureCurveGlv(new SecP224K1Curve(), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04A1455B334DF099DF30FC28A169A467E9E47075A90F7E650EB6B7A45C7E089FED7FBA344282CAFBD6F7E319F7C0B0BD59E2CA4BDB556D61A5"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP224R1Holder + : X9ECParametersHolder + { + private SecP224R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP224R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP224R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("BD71344799D5C7FCDC45B59FA3B9AB8F6A948BC5"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP256K1Holder + : X9ECParametersHolder + { + private SecP256K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP256K1Holder(); + + protected override ECCurve CreateCurve() + { + GlvTypeBParameters glv = new GlvTypeBParameters( + new BigInteger("7ae96a2b657c07106e64479eac3434e99cf0497512f58995c1396c28719501ee", 16), + new BigInteger("5363ad4cc05c30e0a5261c028812645a122e22ea20816678df02967c1b23bd72", 16), + new ScalarSplitParameters( + new BigInteger[]{ + new BigInteger("3086d221a7d46bcde86c90e49284eb15", 16), + new BigInteger("-e4437ed6010e88286f547fa90abfe4c3", 16) }, + new BigInteger[]{ + new BigInteger("114ca50f7a8e2f3f657c1108d9d44cfd8", 16), + new BigInteger("3086d221a7d46bcde86c90e49284eb15", 16) }, + new BigInteger("3086d221a7d46bcde86c90e49284eb153dab", 16), + new BigInteger("e4437ed6010e88286f547fa90abfe4c42212", 16), + 272)); + return ConfigureCurveGlv(new SecP256K1Curve(), glv); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP256R1Holder + : X9ECParametersHolder + { + private SecP256R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP256R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP256R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("C49D360886E704936A6678E1139D26B7819F7E90"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "046B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C2964FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP384R1Holder + : X9ECParametersHolder + { + private SecP384R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP384R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP384R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("A335926AA319A27A1D00896A6773A4827ACDAC73"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7" + + "3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecP521R1Holder + : X9ECParametersHolder + { + private SecP521R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecP521R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecP521R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("D09E8800291CB85396CC6717393284AAA0DA64BA"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "00C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66" + + "011839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + internal class SecT113R1Holder + : X9ECParametersHolder + { + private SecT113R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT113R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT113R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10E723AB14D696E6768756151756FEBF8FCB49A9"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04009D73616F35F4AB1407D73562C10F00A52830277958EE84D1315ED31886"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT113R2Holder + : X9ECParametersHolder + { + private SecT113R2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT113R2Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT113R2Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10C0FB15760860DEF1EEF4D696E676875615175D"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0401A57A6A7B26CA5EF52FCDB816479700B3ADC94ED1FE674C06E695BABA1D"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT131R1Holder + : X9ECParametersHolder + { + private SecT131R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT131R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT131R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("4D696E676875615175985BD3ADBADA21B43A97E2"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "040081BAF91FDF9833C40F9C181343638399078C6E7EA38C001F73C8134B1B4EF9E150"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT131R2Holder + : X9ECParametersHolder + { + private SecT131R2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT131R2Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT131R2Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("985BD3ADBAD4D696E676875615175A21B43A97E3"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "040356DCD8F2F95031AD652D23951BB366A80648F06D867940A5366D9E265DE9EB240F"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT163K1Holder + : X9ECParametersHolder + { + private SecT163K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT163K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT163K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0402FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE80289070FB05D38FF58321F2E800536D538CCDAA3D9"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT163R1Holder + : X9ECParametersHolder + { + private SecT163R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT163R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT163R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("24B7B137C8A14D696E6768756151756FD0DA2E5C"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "040369979697AB43897789566789567F787A7876A65400435EDB42EFAFB2989D51FEFCE3C80988F41FF883"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT163R2Holder + : X9ECParametersHolder + { + private SecT163R2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT163R2Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT163R2Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("85E25BFE5C86226CDB12016F7553F9D0E693A268"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0403F0EBA16286A2D57EA0991168D4994637E8343E3600D51FBC6C71A0094FA2CDD545B11C5C0C797324F1"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT193R1Holder + : X9ECParametersHolder + { + private SecT193R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT193R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT193R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("103FAEC74D696E676875615175777FC5B191EF30"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0401F481BC5F0FF84A74AD6CDF6FDEF4BF6179625372D8C0C5E10025E399F2903712CCF3EA9E3A1AD17FB0B3201B6AF7CE1B05"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT193R2Holder + : X9ECParametersHolder + { + private SecT193R2Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT193R2Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT193R2Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("10B7B4D696E676875615175137C8A16FD0DA2211"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0400D9B67D192E0367C803F39E1A7E82CA14A651350AAE617E8F01CE94335607C304AC29E7DEFBD9CA01F596F927224CDECF6C"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT233K1Holder + : X9ECParametersHolder + { + private SecT233K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT233K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT233K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "04017232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD612601DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT233R1Holder + : X9ECParametersHolder + { + private SecT233R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT233R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT233R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("74D59FF07F6B413D0EA14B344B20A2DB049B50C3"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0400FAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B01006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT239K1Holder + : X9ECParametersHolder + { + private SecT239K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT239K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT239K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0429A0B6A887A983E9730988A68727A8B2D126C44CC2CC7B2A6555193035DC76310804F12E549BDB011C103089E73510ACB275FC312A5DC6B76553F0CA"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT283K1Holder + : X9ECParametersHolder + { + private SecT283K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT283K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT283K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC2458492836" + + "01CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD2259"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT283R1Holder + : X9ECParametersHolder + { + private SecT283R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT283R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT283R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("77E2B07370EB0F832A6DD5B62DFC88CD06BB84BE"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "05F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B12053" + + "03676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE8112F4"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT409K1Holder + : X9ECParametersHolder + { + private SecT409K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT409K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT409K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0060F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C460189EB5AAAA62EE222EB1B35540CFE9023746" + + "01E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6C42E9C55215AA9CA27A5863EC48D8E0286B"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT409R1Holder + : X9ECParametersHolder + { + private SecT409R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT409R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT409R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("4099B5A457F9D69F79213D094C4BCD4D4262210B"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "015D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A868A1180515603AEAB60794E54BB7996A7" + + "0061B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1FDF4B4F40D2181B3681C364BA0273C706"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT571K1Holder + : X9ECParametersHolder + { + private SecT571K1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT571K1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT571K1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "026EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA44370958493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C8972" + + "0349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7A3"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SecT571R1Holder + : X9ECParametersHolder + { + private SecT571R1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SecT571R1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SecT571R1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = Hex.DecodeStrict("2AA058F73A0E33AB486B0F610410C53A7F132310"); + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, "04" + + "0303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE53950F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D19" + + "037BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC15B"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + }; + + internal class SM2P256V1Holder + : X9ECParametersHolder + { + private SM2P256V1Holder() {} + + internal static readonly X9ECParametersHolder Instance = new SM2P256V1Holder(); + + protected override ECCurve CreateCurve() + { + return ConfigureCurve(new SM2P256V1Curve()); + } + + protected override X9ECParameters CreateParameters() + { + byte[] S = null; + ECCurve curve = Curve; + X9ECPoint G = ConfigureBasepoint(curve, + "0432C4AE2C1F1981195F9904466A39C9948FE30BBFF2660BE1715A4589334C74C7BC3736A2F4F6779C59BDCEE36B692153D0A9877CC62A474002DF32E52139F0A0"); + return new X9ECParameters(curve, G, curve.Order, curve.Cofactor, S); + } + } + + private static readonly Dictionary objIds = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary curves = + new Dictionary(); + private static readonly Dictionary names = + new Dictionary(); + + private static void DefineCurve(string name, DerObjectIdentifier oid, X9ECParametersHolder holder) + { + objIds.Add(name, oid); + names.Add(oid, name); + curves.Add(oid, holder); + } + + private static void DefineCurveAlias(string name, DerObjectIdentifier oid) + { + if (!curves.ContainsKey(oid)) + throw new InvalidOperationException(); + + objIds.Add(name, oid); + } + + static CustomNamedCurves() + { + //DefineCurve("secp112r1", SecObjectIdentifiers.SecP112r1, SecP112R1Holder.Instance); + //DefineCurve("secp112r2", SecObjectIdentifiers.SecP112r2, SecP112R2Holder.Instance); + DefineCurve("secp128r1", SecObjectIdentifiers.SecP128r1, SecP128R1Holder.Instance); + //DefineCurve("secp128r2", SecObjectIdentifiers.SecP128r2, SecP128R2Holder.Instance); + DefineCurve("secp160k1", SecObjectIdentifiers.SecP160k1, SecP160K1Holder.Instance); + DefineCurve("secp160r1", SecObjectIdentifiers.SecP160r1, SecP160R1Holder.Instance); + DefineCurve("secp160r2", SecObjectIdentifiers.SecP160r2, SecP160R2Holder.Instance); + DefineCurve("secp192k1", SecObjectIdentifiers.SecP192k1, SecP192K1Holder.Instance); + DefineCurve("secp192r1", SecObjectIdentifiers.SecP192r1, SecP192R1Holder.Instance); + DefineCurve("secp224k1", SecObjectIdentifiers.SecP224k1, SecP224K1Holder.Instance); + DefineCurve("secp224r1", SecObjectIdentifiers.SecP224r1, SecP224R1Holder.Instance); + DefineCurve("secp256k1", SecObjectIdentifiers.SecP256k1, SecP256K1Holder.Instance); + DefineCurve("secp256r1", SecObjectIdentifiers.SecP256r1, SecP256R1Holder.Instance); + DefineCurve("secp384r1", SecObjectIdentifiers.SecP384r1, SecP384R1Holder.Instance); + DefineCurve("secp521r1", SecObjectIdentifiers.SecP521r1, SecP521R1Holder.Instance); + + DefineCurve("sect113r1", SecObjectIdentifiers.SecT113r1, SecT113R1Holder.Instance); + DefineCurve("sect113r2", SecObjectIdentifiers.SecT113r2, SecT113R2Holder.Instance); + DefineCurve("sect131r1", SecObjectIdentifiers.SecT131r1, SecT131R1Holder.Instance); + DefineCurve("sect131r2", SecObjectIdentifiers.SecT131r2, SecT131R2Holder.Instance); + DefineCurve("sect163k1", SecObjectIdentifiers.SecT163k1, SecT163K1Holder.Instance); + DefineCurve("sect163r1", SecObjectIdentifiers.SecT163r1, SecT163R1Holder.Instance); + DefineCurve("sect163r2", SecObjectIdentifiers.SecT163r2, SecT163R2Holder.Instance); + DefineCurve("sect193r1", SecObjectIdentifiers.SecT193r1, SecT193R1Holder.Instance); + DefineCurve("sect193r2", SecObjectIdentifiers.SecT193r2, SecT193R2Holder.Instance); + DefineCurve("sect233k1", SecObjectIdentifiers.SecT233k1, SecT233K1Holder.Instance); + DefineCurve("sect233r1", SecObjectIdentifiers.SecT233r1, SecT233R1Holder.Instance); + DefineCurve("sect239k1", SecObjectIdentifiers.SecT239k1, SecT239K1Holder.Instance); + DefineCurve("sect283k1", SecObjectIdentifiers.SecT283k1, SecT283K1Holder.Instance); + DefineCurve("sect283r1", SecObjectIdentifiers.SecT283r1, SecT283R1Holder.Instance); + DefineCurve("sect409k1", SecObjectIdentifiers.SecT409k1, SecT409K1Holder.Instance); + DefineCurve("sect409r1", SecObjectIdentifiers.SecT409r1, SecT409R1Holder.Instance); + DefineCurve("sect571k1", SecObjectIdentifiers.SecT571k1, SecT571K1Holder.Instance); + DefineCurve("sect571r1", SecObjectIdentifiers.SecT571r1, SecT571R1Holder.Instance); + + DefineCurve("sm2p256v1", GMObjectIdentifiers.sm2p256v1, SM2P256V1Holder.Instance); + + DefineCurveAlias("B-163", SecObjectIdentifiers.SecT163r2); + DefineCurveAlias("B-233", SecObjectIdentifiers.SecT233r1); + DefineCurveAlias("B-283", SecObjectIdentifiers.SecT283r1); + DefineCurveAlias("B-409", SecObjectIdentifiers.SecT409r1); + DefineCurveAlias("B-571", SecObjectIdentifiers.SecT571r1); + + DefineCurveAlias("K-163", SecObjectIdentifiers.SecT163k1); + DefineCurveAlias("K-233", SecObjectIdentifiers.SecT233k1); + DefineCurveAlias("K-283", SecObjectIdentifiers.SecT283k1); + DefineCurveAlias("K-409", SecObjectIdentifiers.SecT409k1); + DefineCurveAlias("K-571", SecObjectIdentifiers.SecT571k1); + + DefineCurveAlias("P-192", SecObjectIdentifiers.SecP192r1); + DefineCurveAlias("P-224", SecObjectIdentifiers.SecP224r1); + DefineCurveAlias("P-256", SecObjectIdentifiers.SecP256r1); + DefineCurveAlias("P-384", SecObjectIdentifiers.SecP384r1); + DefineCurveAlias("P-521", SecObjectIdentifiers.SecP521r1); + } + + /// Look up the for the curve with the given name. + /// The name of the curve. + public static X9ECParameters GetByName(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOid(oid); + } + + /// Look up an for the curve with the given name. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The name of the curve. + public static X9ECParametersHolder GetByNameLazy(string name) + { + DerObjectIdentifier oid = GetOid(name); + return oid == null ? null : GetByOidLazy(oid); + } + + /// Look up the for the curve with the given + /// OID. + /// The OID for the curve. + public static X9ECParameters GetByOid(DerObjectIdentifier oid) + { + return GetByOidLazy(oid)?.Parameters; + } + + /// Look up an for the curve with the given + /// OID. + /// + /// Allows accessing the curve without necessarily triggering the creation of the + /// full . + /// + /// The OID for the curve. + public static X9ECParametersHolder GetByOidLazy(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(curves, oid); + } + + /// Look up the name of the curve with the given OID. + /// The OID for the curve. + public static string GetName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(names, oid); + } + + /// Look up the OID of the curve with the given name. + /// The name of the curve. + public static DerObjectIdentifier GetOid(string name) + { + return CollectionUtilities.GetValueOrNull(objIds, name); + } + + /// Enumerate the available curve names in this registry. + public static IEnumerable Names + { + get { return CollectionUtilities.Proxy(objIds.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs.meta new file mode 100644 index 00000000..db93f139 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aed3fda3611be5143a4274b4e7a8be66 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/ec/CustomNamedCurves.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings.meta new file mode 100644 index 00000000..671b8d4d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: dc5bd3d762ff93d4fa0244defd943e37 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs new file mode 100644 index 00000000..3533683d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs @@ -0,0 +1,267 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings +{ + /** + * ISO 9796-1 padding. Note in the light of recent results you should + * only use this with RSA (rather than the "simpler" Rabin keys) and you + * should never use it with anything other than a hash (ie. even if the + * message is small don't sign the message, sign it's hash) or some "random" + * value. See your favorite search engine for details. + */ + public class ISO9796d1Encoding + : IAsymmetricBlockCipher + { + private static readonly BigInteger Sixteen = BigInteger.ValueOf(16); + private static readonly BigInteger Six = BigInteger.ValueOf(6); + + private static readonly byte[] shadows = { 0xe, 0x3, 0x5, 0x8, 0x9, 0x4, 0x2, 0xf, + 0x0, 0xd, 0xb, 0x6, 0x7, 0xa, 0xc, 0x1 }; + private static readonly byte[] inverse = { 0x8, 0xf, 0x6, 0x1, 0x5, 0x2, 0xb, 0xc, + 0x3, 0x4, 0xd, 0xa, 0xe, 0x9, 0x0, 0x7 }; + + private readonly IAsymmetricBlockCipher engine; + private bool forEncryption; + private int bitSize; + private int padBits = 0; + private BigInteger modulus; + + public ISO9796d1Encoding(IAsymmetricBlockCipher cipher) + { + this.engine = cipher; + } + + public string AlgorithmName => engine.AlgorithmName + "/ISO9796-1Padding"; + + public IAsymmetricBlockCipher UnderlyingCipher => engine; + + public void Init(bool forEncryption, ICipherParameters parameters) + { + RsaKeyParameters kParam; + if (parameters is ParametersWithRandom withRandom) + { + kParam = (RsaKeyParameters)withRandom.Parameters; + } + else + { + kParam = (RsaKeyParameters)parameters; + } + + engine.Init(forEncryption, parameters); + + modulus = kParam.Modulus; + bitSize = modulus.BitLength; + + this.forEncryption = forEncryption; + } + + /** + * return the input block size. The largest message we can process + * is (key_size_in_bits + 3)/16, which in our world comes to + * key_size_in_bytes / 2. + */ + public int GetInputBlockSize() + { + int baseBlockSize = engine.GetInputBlockSize(); + + if (forEncryption) + { + return (baseBlockSize + 1) / 2; + } + else + { + return baseBlockSize; + } + } + + /** + * return the maximum possible size for the output. + */ + public int GetOutputBlockSize() + { + int baseBlockSize = engine.GetOutputBlockSize(); + + if (forEncryption) + { + return baseBlockSize; + } + else + { + return (baseBlockSize + 1) / 2; + } + } + + /** + * set the number of bits in the next message to be treated as + * pad bits. + */ + public void SetPadBits( + int padBits) + { + if (padBits > 7) + { + throw new ArgumentException("padBits > 7"); + } + + this.padBits = padBits; + } + + /** + * retrieve the number of pad bits in the last decoded message. + */ + public int GetPadBits() + { + return padBits; + } + + public byte[] ProcessBlock( + byte[] input, + int inOff, + int length) + { + if (forEncryption) + { + return EncodeBlock(input, inOff, length); + } + else + { + return DecodeBlock(input, inOff, length); + } + } + + private byte[] EncodeBlock( + byte[] input, + int inOff, + int inLen) + { + byte[] block = new byte[(bitSize + 7) / 8]; + int r = padBits + 1; + int z = inLen; + int t = (bitSize + 13) / 16; + + for (int i = 0; i < t; i += z) + { + if (i > t - z) + { + Array.Copy(input, inOff + inLen - (t - i), + block, block.Length - t, t - i); + } + else + { + Array.Copy(input, inOff, block, block.Length - (i + z), z); + } + } + + for (int i = block.Length - 2 * t; i != block.Length; i += 2) + { + byte val = block[block.Length - t + i / 2]; + + block[i] = (byte)((shadows[(uint) (val & 0xff) >> 4] << 4) + | shadows[val & 0x0f]); + block[i + 1] = val; + } + + block[block.Length - 2 * z] ^= (byte) r; + block[block.Length - 1] = (byte)((block[block.Length - 1] << 4) | 0x06); + + int maxBit = (8 - (bitSize - 1) % 8); + int offSet = 0; + + if (maxBit != 8) + { + block[0] &= (byte) ((ushort) 0xff >> maxBit); + block[0] |= (byte) ((ushort) 0x80 >> maxBit); + } + else + { + block[0] = 0x00; + block[1] |= 0x80; + offSet = 1; + } + + return engine.ProcessBlock(block, offSet, block.Length - offSet); + } + + /** + * @exception InvalidCipherTextException if the decrypted block is not a valid ISO 9796 bit string + */ + private byte[] DecodeBlock( + byte[] input, + int inOff, + int inLen) + { + byte[] block = engine.ProcessBlock(input, inOff, inLen); + int r = 1; + int t = (bitSize + 13) / 16; + + BigInteger iS = new BigInteger(1, block); + BigInteger iR; + if (iS.Mod(Sixteen).Equals(Six)) + { + iR = iS; + } + else + { + iR = modulus.Subtract(iS); + + if (!iR.Mod(Sixteen).Equals(Six)) + throw new InvalidCipherTextException("resulting integer iS or (modulus - iS) is not congruent to 6 mod 16"); + } + + block = iR.ToByteArrayUnsigned(); + + if ((block[block.Length - 1] & 0x0f) != 0x6) + throw new InvalidCipherTextException("invalid forcing byte in block"); + + block[block.Length - 1] = + (byte)(((ushort)(block[block.Length - 1] & 0xff) >> 4) + | ((inverse[(block[block.Length - 2] & 0xff) >> 4]) << 4)); + + block[0] = (byte)((shadows[(uint) (block[1] & 0xff) >> 4] << 4) + | shadows[block[1] & 0x0f]); + + bool boundaryFound = false; + int boundary = 0; + + for (int i = block.Length - 1; i >= block.Length - 2 * t; i -= 2) + { + int val = ((shadows[(uint) (block[i] & 0xff) >> 4] << 4) + | shadows[block[i] & 0x0f]); + + if (((block[i - 1] ^ val) & 0xff) != 0) + { + if (!boundaryFound) + { + boundaryFound = true; + r = (block[i - 1] ^ val) & 0xff; + boundary = i - 1; + } + else + { + throw new InvalidCipherTextException("invalid tsums in block"); + } + } + } + + block[boundary] = 0; + + byte[] nblock = new byte[(block.Length - boundary) / 2]; + + for (int i = 0; i < nblock.Length; i++) + { + nblock[i] = block[2 * i + boundary + 1]; + } + + padBits = r - 1; + + return nblock; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs.meta new file mode 100644 index 00000000..2e68a1e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b494ca7cbaa199f48a7c39c7516f49cd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/ISO9796d1Encoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs new file mode 100644 index 00000000..56171584 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs @@ -0,0 +1,356 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings +{ + /** + * Optimal Asymmetric Encryption Padding (OAEP) - see PKCS 1 V 2. + */ + public class OaepEncoding + : IAsymmetricBlockCipher + { + private byte[] defHash; + private IDigest mgf1Hash; + + private IAsymmetricBlockCipher engine; + private SecureRandom random; + private bool forEncryption; + + public OaepEncoding( + IAsymmetricBlockCipher cipher) + : this(cipher, new Sha1Digest(), null) + { + } + + public OaepEncoding( + IAsymmetricBlockCipher cipher, + IDigest hash) + : this(cipher, hash, null) + { + } + + public OaepEncoding( + IAsymmetricBlockCipher cipher, + IDigest hash, + byte[] encodingParams) + : this(cipher, hash, hash, encodingParams) + { + } + + public OaepEncoding( + IAsymmetricBlockCipher cipher, + IDigest hash, + IDigest mgf1Hash, + byte[] encodingParams) + { + this.engine = cipher; + this.mgf1Hash = mgf1Hash; + this.defHash = new byte[hash.GetDigestSize()]; + + hash.Reset(); + + if (encodingParams != null) + { + hash.BlockUpdate(encodingParams, 0, encodingParams.Length); + } + + hash.DoFinal(defHash, 0); + } + + public string AlgorithmName => engine.AlgorithmName + "/OAEPPadding"; + + public IAsymmetricBlockCipher UnderlyingCipher => engine; + + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is ParametersWithRandom withRandom) + { + this.random = withRandom.Random; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + + engine.Init(forEncryption, parameters); + + this.forEncryption = forEncryption; + } + + public int GetInputBlockSize() + { + int baseBlockSize = engine.GetInputBlockSize(); + + if (forEncryption) + { + return baseBlockSize - 1 - 2 * defHash.Length; + } + else + { + return baseBlockSize; + } + } + + public int GetOutputBlockSize() + { + int baseBlockSize = engine.GetOutputBlockSize(); + + if (forEncryption) + { + return baseBlockSize; + } + else + { + return baseBlockSize - 1 - 2 * defHash.Length; + } + } + + public byte[] ProcessBlock( + byte[] inBytes, + int inOff, + int inLen) + { + if (forEncryption) + { + return EncodeBlock(inBytes, inOff, inLen); + } + else + { + return DecodeBlock(inBytes, inOff, inLen); + } + } + + private byte[] EncodeBlock( + byte[] inBytes, + int inOff, + int inLen) + { + Check.DataLength(inLen > GetInputBlockSize(), "input data too long"); + + byte[] block = new byte[GetInputBlockSize() + 1 + 2 * defHash.Length]; + + // + // copy in the message + // + Array.Copy(inBytes, inOff, block, block.Length - inLen, inLen); + + // + // add sentinel + // + block[block.Length - inLen - 1] = 0x01; + + // + // as the block is already zeroed - there's no need to add PS (the >= 0 pad of 0) + // + + // + // add the hash of the encoding params. + // + Array.Copy(defHash, 0, block, defHash.Length, defHash.Length); + + // + // generate the seed. + // + byte[] seed = SecureRandom.GetNextBytes(random, defHash.Length); + + // + // mask the message block. + // + byte[] mask = MaskGeneratorFunction(seed, 0, seed.Length, block.Length - defHash.Length); + + for (int i = defHash.Length; i != block.Length; i++) + { + block[i] ^= mask[i - defHash.Length]; + } + + // + // add in the seed + // + Array.Copy(seed, 0, block, 0, defHash.Length); + + // + // mask the seed. + // + mask = MaskGeneratorFunction( + block, defHash.Length, block.Length - defHash.Length, defHash.Length); + + for (int i = 0; i != defHash.Length; i++) + { + block[i] ^= mask[i]; + } + + return engine.ProcessBlock(block, 0, block.Length); + } + + /** + * @exception InvalidCipherTextException if the decrypted block turns out to + * be badly formatted. + */ + private byte[] DecodeBlock( + byte[] inBytes, + int inOff, + int inLen) + { + byte[] data = engine.ProcessBlock(inBytes, inOff, inLen); + byte[] block = new byte[engine.GetOutputBlockSize()]; + + // + // as we may have zeros in our leading bytes for the block we produced + // on encryption, we need to make sure our decrypted block comes back + // the same size. + // + // i.e. wrong when block.length < (2 * defHash.length) + 1 + int wrongMask = (block.Length - ((2 * defHash.Length) + 1)) >> 31; + + if (data.Length <= block.Length) + { + Array.Copy(data, 0, block, block.Length - data.Length, data.Length); + } + else + { + Array.Copy(data, 0, block, 0, block.Length); + wrongMask |= 1; + } + + // + // unmask the seed. + // + byte[] mask = MaskGeneratorFunction( + block, defHash.Length, block.Length - defHash.Length, defHash.Length); + + for (int i = 0; i != defHash.Length; i++) + { + block[i] ^= mask[i]; + } + + // + // unmask the message block. + // + mask = MaskGeneratorFunction(block, 0, defHash.Length, block.Length - defHash.Length); + + for (int i = defHash.Length; i != block.Length; i++) + { + block[i] ^= mask[i - defHash.Length]; + } + + // + // check the hash of the encoding params. + // long check to try to avoid this been a source of a timing attack. + // + for (int i = 0; i != defHash.Length; i++) + { + wrongMask |= defHash[i] ^ block[defHash.Length + i]; + } + + // + // find the data block + // + int start = -1; + + for (int index = 2 * defHash.Length; index != block.Length; index++) + { + int octet = block[index]; + + // i.e. mask will be 0xFFFFFFFF if octet is non-zero and start is (still) negative, else 0. + int shouldSetMask = (-octet & start) >> 31; + + start += index & shouldSetMask; + } + + wrongMask |= start >> 31; + ++start; + wrongMask |= block[start] ^ 1; + + if (wrongMask != 0) + { + Arrays.Fill(block, 0); + throw new InvalidCipherTextException("data wrong"); + } + + ++start; + + // + // extract the data block + // + byte[] output = new byte[block.Length - start]; + + Array.Copy(block, start, output, 0, output.Length); + Array.Clear(block, 0, block.Length); + + return output; + } + + private byte[] MaskGeneratorFunction( + byte[] Z, + int zOff, + int zLen, + int length) + { + if (mgf1Hash is IXof) + { + byte[] mask = new byte[length]; + mgf1Hash.BlockUpdate(Z, zOff, zLen); + ((IXof)mgf1Hash).OutputFinal(mask, 0, mask.Length); + + return mask; + } + else + { + return MaskGeneratorFunction1(Z, zOff, zLen, length); + } + } + + /** + * mask generator function, as described in PKCS1v2. + */ + private byte[] MaskGeneratorFunction1( + byte[] Z, + int zOff, + int zLen, + int length) + { + byte[] mask = new byte[length]; + byte[] hashBuf = new byte[mgf1Hash.GetDigestSize()]; + byte[] C = new byte[4]; + int counter = 0; + + mgf1Hash.Reset(); + + while (counter < (length / hashBuf.Length)) + { + Pack.UInt32_To_BE((uint)counter, C); + + mgf1Hash.BlockUpdate(Z, zOff, zLen); + mgf1Hash.BlockUpdate(C, 0, C.Length); + mgf1Hash.DoFinal(hashBuf, 0); + + Array.Copy(hashBuf, 0, mask, counter * hashBuf.Length, hashBuf.Length); + + counter++; + } + + if ((counter * hashBuf.Length) < length) + { + Pack.UInt32_To_BE((uint)counter, C); + + mgf1Hash.BlockUpdate(Z, zOff, zLen); + mgf1Hash.BlockUpdate(C, 0, C.Length); + mgf1Hash.DoFinal(hashBuf, 0); + + Array.Copy(hashBuf, 0, mask, counter * hashBuf.Length, mask.Length - (counter * hashBuf.Length)); + } + + return mask; + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs.meta new file mode 100644 index 00000000..c10fb340 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 873572ed0f1356b488df46595d586784 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/OaepEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs new file mode 100644 index 00000000..0d62b3cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs @@ -0,0 +1,380 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings +{ + /** + * this does your basic Pkcs 1 v1.5 padding - whether or not you should be using this + * depends on your application - see Pkcs1 Version 2 for details. + */ + public class Pkcs1Encoding + : IAsymmetricBlockCipher + { + /** + * some providers fail to include the leading zero in PKCS1 encoded blocks. If you need to + * work with one of these set the system property Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs1.Strict to false. + */ + public const string StrictLengthEnabledProperty = "Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs1.Strict"; + + private const int HeaderLength = 10; + + /** + * The same effect can be achieved by setting the static property directly + *

+ * The static property is checked during construction of the encoding object, it is set to + * true by default. + *

+ */ + public static bool StrictLengthEnabled + { + get { return strictLengthEnabled[0]; } + set { strictLengthEnabled[0] = value; } + } + + private static readonly bool[] strictLengthEnabled; + + static Pkcs1Encoding() + { + string strictProperty = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(StrictLengthEnabledProperty); + + strictLengthEnabled = new bool[]{ strictProperty == null || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("true", strictProperty) }; + } + + + private SecureRandom random; + private IAsymmetricBlockCipher engine; + private bool forEncryption; + private bool forPrivateKey; + private bool useStrictLength; + private int pLen = -1; + private byte[] fallback = null; + private byte[] blockBuffer = null; + + /** + * Basic constructor. + * + * @param cipher + */ + public Pkcs1Encoding( + IAsymmetricBlockCipher cipher) + { + this.engine = cipher; + this.useStrictLength = StrictLengthEnabled; + } + + /** + * Constructor for decryption with a fixed plaintext length. + * + * @param cipher The cipher to use for cryptographic operation. + * @param pLen Length of the expected plaintext. + */ + public Pkcs1Encoding(IAsymmetricBlockCipher cipher, int pLen) + { + this.engine = cipher; + this.useStrictLength = StrictLengthEnabled; + this.pLen = pLen; + } + + /** + * Constructor for decryption with a fixed plaintext length and a fallback + * value that is returned, if the padding is incorrect. + * + * @param cipher + * The cipher to use for cryptographic operation. + * @param fallback + * The fallback value, we don't to a arraycopy here. + */ + public Pkcs1Encoding(IAsymmetricBlockCipher cipher, byte[] fallback) + { + this.engine = cipher; + this.useStrictLength = StrictLengthEnabled; + this.fallback = fallback; + this.pLen = fallback.Length; + } + + public string AlgorithmName => engine.AlgorithmName + "/PKCS1Padding"; + + public IAsymmetricBlockCipher UnderlyingCipher => engine; + + public void Init(bool forEncryption, ICipherParameters parameters) + { + AsymmetricKeyParameter kParam; + if (parameters is ParametersWithRandom withRandom) + { + this.random = withRandom.Random; + kParam = (AsymmetricKeyParameter)withRandom.Parameters; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + kParam = (AsymmetricKeyParameter)parameters; + } + + engine.Init(forEncryption, parameters); + + this.forPrivateKey = kParam.IsPrivate; + this.forEncryption = forEncryption; + this.blockBuffer = new byte[engine.GetOutputBlockSize()]; + + if (pLen > 0 && fallback == null && random == null) + throw new ArgumentException("encoder requires random"); + } + + public int GetInputBlockSize() + { + int baseBlockSize = engine.GetInputBlockSize(); + + return forEncryption + ? baseBlockSize - HeaderLength + : baseBlockSize; + } + + public int GetOutputBlockSize() + { + int baseBlockSize = engine.GetOutputBlockSize(); + + return forEncryption + ? baseBlockSize + : baseBlockSize - HeaderLength; + } + + public byte[] ProcessBlock( + byte[] input, + int inOff, + int length) + { + return forEncryption + ? EncodeBlock(input, inOff, length) + : DecodeBlock(input, inOff, length); + } + + private byte[] EncodeBlock( + byte[] input, + int inOff, + int inLen) + { + if (inLen > GetInputBlockSize()) + throw new ArgumentException("input data too large", "inLen"); + + byte[] block = new byte[engine.GetInputBlockSize()]; + + if (forPrivateKey) + { + block[0] = 0x01; // type code 1 + + for (int i = 1; i != block.Length - inLen - 1; i++) + { + block[i] = (byte)0xFF; + } + } + else + { + random.NextBytes(block); // random fill + + block[0] = 0x02; // type code 2 + + // + // a zero byte marks the end of the padding, so all + // the pad bytes must be non-zero. + // + for (int i = 1; i != block.Length - inLen - 1; i++) + { + while (block[i] == 0) + { + block[i] = (byte)random.NextInt(); + } + } + } + + block[block.Length - inLen - 1] = 0x00; // mark the end of the padding + Array.Copy(input, inOff, block, block.Length - inLen, inLen); + + return engine.ProcessBlock(block, 0, block.Length); + } + + /** + * Checks if the argument is a correctly PKCS#1.5 encoded Plaintext + * for encryption. + * + * @param encoded The Plaintext. + * @param pLen Expected length of the plaintext. + * @return Either 0, if the encoding is correct, or -1, if it is incorrect. + */ + private static int CheckPkcs1Encoding(byte[] encoded, int pLen) + { + int correct = 0; + /* + * Check if the first two bytes are 0 2 + */ + correct |= (encoded[0] ^ 2); + + /* + * Now the padding check, check for no 0 byte in the padding + */ + int plen = encoded.Length - ( + pLen /* Length of the PMS */ + + 1 /* Final 0-byte before PMS */ + ); + + for (int i = 1; i < plen; i++) + { + int tmp = encoded[i]; + tmp |= tmp >> 1; + tmp |= tmp >> 2; + tmp |= tmp >> 4; + correct |= (tmp & 1) - 1; + } + + /* + * Make sure the padding ends with a 0 byte. + */ + correct |= encoded[encoded.Length - (pLen + 1)]; + + /* + * Return 0 or 1, depending on the result. + */ + correct |= correct >> 1; + correct |= correct >> 2; + correct |= correct >> 4; + return ~((correct & 1) - 1); + } + + /** + * Decode PKCS#1.5 encoding, and return a random value if the padding is not correct. + * + * @param in The encrypted block. + * @param inOff Offset in the encrypted block. + * @param inLen Length of the encrypted block. + * @param pLen Length of the desired output. + * @return The plaintext without padding, or a random value if the padding was incorrect. + * @throws InvalidCipherTextException + */ + private byte[] DecodeBlockOrRandom(byte[] input, int inOff, int inLen) + { + if (!forPrivateKey) + throw new InvalidCipherTextException("sorry, this method is only for decryption, not for signing"); + + byte[] block = engine.ProcessBlock(input, inOff, inLen); + byte[] random; + if (this.fallback == null) + { + random = new byte[this.pLen]; + this.random.NextBytes(random); + } + else + { + random = fallback; + } + + byte[] data = (useStrictLength & (block.Length != engine.GetOutputBlockSize())) ? blockBuffer : block; + + /* + * Check the padding. + */ + int correct = CheckPkcs1Encoding(data, this.pLen); + + /* + * Now, to a constant time constant memory copy of the decrypted value + * or the random value, depending on the validity of the padding. + */ + byte[] result = new byte[this.pLen]; + for (int i = 0; i < this.pLen; i++) + { + result[i] = (byte)((data[i + (data.Length - pLen)] & (~correct)) | (random[i] & correct)); + } + + Arrays.Fill(data, 0); + + return result; + } + + /** + * @exception InvalidCipherTextException if the decrypted block is not in Pkcs1 format. + */ + private byte[] DecodeBlock( + byte[] input, + int inOff, + int inLen) + { + /* + * If the length of the expected plaintext is known, we use a constant-time decryption. + * If the decryption fails, we return a random value. + */ + if (this.pLen != -1) + { + return this.DecodeBlockOrRandom(input, inOff, inLen); + } + + byte[] block = engine.ProcessBlock(input, inOff, inLen); + bool incorrectLength = (useStrictLength & (block.Length != engine.GetOutputBlockSize())); + + byte[] data; + if (block.Length < GetOutputBlockSize()) + { + data = blockBuffer; + } + else + { + data = block; + } + + byte expectedType = (byte)(forPrivateKey ? 2 : 1); + byte type = data[0]; + + bool badType = (type != expectedType); + + // + // find and extract the message block. + // + int start = FindStart(type, data); + + start++; // data should start at the next byte + + if (badType | (start < HeaderLength)) + { + Arrays.Fill(data, 0); + throw new InvalidCipherTextException("block incorrect"); + } + + // if we get this far, it's likely to be a genuine encoding error + if (incorrectLength) + { + Arrays.Fill(data, 0); + throw new InvalidCipherTextException("block incorrect size"); + } + + byte[] result = new byte[data.Length - start]; + + Array.Copy(data, start, result, 0, result.Length); + + return result; + } + + private int FindStart(byte type, byte[] block) + { + int start = -1; + bool padErr = false; + + for (int i = 1; i != block.Length; i++) + { + byte pad = block[i]; + + if (pad == 0 & start < 0) + { + start = i; + } + padErr |= ((type == 1) & (start < 0) & (pad != (byte)0xff)); + } + + return padErr ? -1 : start; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs.meta new file mode 100644 index 00000000..482b694c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 849a220cd89229e4d985db5a20dd7598 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/encodings/Pkcs1Encoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines.meta new file mode 100644 index 00000000..b7656a4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: aee7f695759d46648b48ed5baaa724de +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs new file mode 100644 index 00000000..51af7ff2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs @@ -0,0 +1,723 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * an implementation of the AES (Rijndael), from FIPS-197. + *

+ * For further details see: http://csrc.nist.gov/encryption/aes/. + * + * This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at + * http://fp.gladman.plus.com/cryptography_technology/rijndael/ + * + * There are three levels of tradeoff of speed vs memory + * Because java has no preprocessor, they are written as three separate classes from which to choose + * + * The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption + * and 4 for decryption. + * + * The middle performance version uses only one 256 word table for each, for a total of 2Kbytes, + * adding 12 rotate operations per round to compute the values contained in the other tables from + * the contents of the first. + * + * The slowest version uses no static tables at all and computes the values in each round. + *

+ *

+ * This file contains the middle performance version with 2Kbytes of static tables for round precomputation. + *

+ */ + public sealed class AesEngine + : IBlockCipher + { + // The S box + private static readonly byte[] S = + { + 99, 124, 119, 123, 242, 107, 111, 197, + 48, 1, 103, 43, 254, 215, 171, 118, + 202, 130, 201, 125, 250, 89, 71, 240, + 173, 212, 162, 175, 156, 164, 114, 192, + 183, 253, 147, 38, 54, 63, 247, 204, + 52, 165, 229, 241, 113, 216, 49, 21, + 4, 199, 35, 195, 24, 150, 5, 154, + 7, 18, 128, 226, 235, 39, 178, 117, + 9, 131, 44, 26, 27, 110, 90, 160, + 82, 59, 214, 179, 41, 227, 47, 132, + 83, 209, 0, 237, 32, 252, 177, 91, + 106, 203, 190, 57, 74, 76, 88, 207, + 208, 239, 170, 251, 67, 77, 51, 133, + 69, 249, 2, 127, 80, 60, 159, 168, + 81, 163, 64, 143, 146, 157, 56, 245, + 188, 182, 218, 33, 16, 255, 243, 210, + 205, 12, 19, 236, 95, 151, 68, 23, + 196, 167, 126, 61, 100, 93, 25, 115, + 96, 129, 79, 220, 34, 42, 144, 136, + 70, 238, 184, 20, 222, 94, 11, 219, + 224, 50, 58, 10, 73, 6, 36, 92, + 194, 211, 172, 98, 145, 149, 228, 121, + 231, 200, 55, 109, 141, 213, 78, 169, + 108, 86, 244, 234, 101, 122, 174, 8, + 186, 120, 37, 46, 28, 166, 180, 198, + 232, 221, 116, 31, 75, 189, 139, 138, + 112, 62, 181, 102, 72, 3, 246, 14, + 97, 53, 87, 185, 134, 193, 29, 158, + 225, 248, 152, 17, 105, 217, 142, 148, + 155, 30, 135, 233, 206, 85, 40, 223, + 140, 161, 137, 13, 191, 230, 66, 104, + 65, 153, 45, 15, 176, 84, 187, 22, + }; + + // The inverse S-box + private static readonly byte[] Si = + { + 82, 9, 106, 213, 48, 54, 165, 56, + 191, 64, 163, 158, 129, 243, 215, 251, + 124, 227, 57, 130, 155, 47, 255, 135, + 52, 142, 67, 68, 196, 222, 233, 203, + 84, 123, 148, 50, 166, 194, 35, 61, + 238, 76, 149, 11, 66, 250, 195, 78, + 8, 46, 161, 102, 40, 217, 36, 178, + 118, 91, 162, 73, 109, 139, 209, 37, + 114, 248, 246, 100, 134, 104, 152, 22, + 212, 164, 92, 204, 93, 101, 182, 146, + 108, 112, 72, 80, 253, 237, 185, 218, + 94, 21, 70, 87, 167, 141, 157, 132, + 144, 216, 171, 0, 140, 188, 211, 10, + 247, 228, 88, 5, 184, 179, 69, 6, + 208, 44, 30, 143, 202, 63, 15, 2, + 193, 175, 189, 3, 1, 19, 138, 107, + 58, 145, 17, 65, 79, 103, 220, 234, + 151, 242, 207, 206, 240, 180, 230, 115, + 150, 172, 116, 34, 231, 173, 53, 133, + 226, 249, 55, 232, 28, 117, 223, 110, + 71, 241, 26, 113, 29, 41, 197, 137, + 111, 183, 98, 14, 170, 24, 190, 27, + 252, 86, 62, 75, 198, 210, 121, 32, + 154, 219, 192, 254, 120, 205, 90, 244, + 31, 221, 168, 51, 136, 7, 199, 49, + 177, 18, 16, 89, 39, 128, 236, 95, + 96, 81, 127, 169, 25, 181, 74, 13, + 45, 229, 122, 159, 147, 201, 156, 239, + 160, 224, 59, 77, 174, 42, 245, 176, + 200, 235, 187, 60, 131, 83, 153, 97, + 23, 43, 4, 126, 186, 119, 214, 38, + 225, 105, 20, 99, 85, 33, 12, 125, + }; + + // vector used in calculating key schedule (powers of x in GF(256)) + private static readonly byte[] rcon = + { + 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, + 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91 + }; + + // precomputation tables of calculations for rounds + private static readonly uint[] T0 = + { + 0xa56363c6, 0x847c7cf8, 0x997777ee, 0x8d7b7bf6, 0x0df2f2ff, + 0xbd6b6bd6, 0xb16f6fde, 0x54c5c591, 0x50303060, 0x03010102, + 0xa96767ce, 0x7d2b2b56, 0x19fefee7, 0x62d7d7b5, 0xe6abab4d, + 0x9a7676ec, 0x45caca8f, 0x9d82821f, 0x40c9c989, 0x877d7dfa, + 0x15fafaef, 0xeb5959b2, 0xc947478e, 0x0bf0f0fb, 0xecadad41, + 0x67d4d4b3, 0xfda2a25f, 0xeaafaf45, 0xbf9c9c23, 0xf7a4a453, + 0x967272e4, 0x5bc0c09b, 0xc2b7b775, 0x1cfdfde1, 0xae93933d, + 0x6a26264c, 0x5a36366c, 0x413f3f7e, 0x02f7f7f5, 0x4fcccc83, + 0x5c343468, 0xf4a5a551, 0x34e5e5d1, 0x08f1f1f9, 0x937171e2, + 0x73d8d8ab, 0x53313162, 0x3f15152a, 0x0c040408, 0x52c7c795, + 0x65232346, 0x5ec3c39d, 0x28181830, 0xa1969637, 0x0f05050a, + 0xb59a9a2f, 0x0907070e, 0x36121224, 0x9b80801b, 0x3de2e2df, + 0x26ebebcd, 0x6927274e, 0xcdb2b27f, 0x9f7575ea, 0x1b090912, + 0x9e83831d, 0x742c2c58, 0x2e1a1a34, 0x2d1b1b36, 0xb26e6edc, + 0xee5a5ab4, 0xfba0a05b, 0xf65252a4, 0x4d3b3b76, 0x61d6d6b7, + 0xceb3b37d, 0x7b292952, 0x3ee3e3dd, 0x712f2f5e, 0x97848413, + 0xf55353a6, 0x68d1d1b9, 0x00000000, 0x2cededc1, 0x60202040, + 0x1ffcfce3, 0xc8b1b179, 0xed5b5bb6, 0xbe6a6ad4, 0x46cbcb8d, + 0xd9bebe67, 0x4b393972, 0xde4a4a94, 0xd44c4c98, 0xe85858b0, + 0x4acfcf85, 0x6bd0d0bb, 0x2aefefc5, 0xe5aaaa4f, 0x16fbfbed, + 0xc5434386, 0xd74d4d9a, 0x55333366, 0x94858511, 0xcf45458a, + 0x10f9f9e9, 0x06020204, 0x817f7ffe, 0xf05050a0, 0x443c3c78, + 0xba9f9f25, 0xe3a8a84b, 0xf35151a2, 0xfea3a35d, 0xc0404080, + 0x8a8f8f05, 0xad92923f, 0xbc9d9d21, 0x48383870, 0x04f5f5f1, + 0xdfbcbc63, 0xc1b6b677, 0x75dadaaf, 0x63212142, 0x30101020, + 0x1affffe5, 0x0ef3f3fd, 0x6dd2d2bf, 0x4ccdcd81, 0x140c0c18, + 0x35131326, 0x2fececc3, 0xe15f5fbe, 0xa2979735, 0xcc444488, + 0x3917172e, 0x57c4c493, 0xf2a7a755, 0x827e7efc, 0x473d3d7a, + 0xac6464c8, 0xe75d5dba, 0x2b191932, 0x957373e6, 0xa06060c0, + 0x98818119, 0xd14f4f9e, 0x7fdcdca3, 0x66222244, 0x7e2a2a54, + 0xab90903b, 0x8388880b, 0xca46468c, 0x29eeeec7, 0xd3b8b86b, + 0x3c141428, 0x79dedea7, 0xe25e5ebc, 0x1d0b0b16, 0x76dbdbad, + 0x3be0e0db, 0x56323264, 0x4e3a3a74, 0x1e0a0a14, 0xdb494992, + 0x0a06060c, 0x6c242448, 0xe45c5cb8, 0x5dc2c29f, 0x6ed3d3bd, + 0xefacac43, 0xa66262c4, 0xa8919139, 0xa4959531, 0x37e4e4d3, + 0x8b7979f2, 0x32e7e7d5, 0x43c8c88b, 0x5937376e, 0xb76d6dda, + 0x8c8d8d01, 0x64d5d5b1, 0xd24e4e9c, 0xe0a9a949, 0xb46c6cd8, + 0xfa5656ac, 0x07f4f4f3, 0x25eaeacf, 0xaf6565ca, 0x8e7a7af4, + 0xe9aeae47, 0x18080810, 0xd5baba6f, 0x887878f0, 0x6f25254a, + 0x722e2e5c, 0x241c1c38, 0xf1a6a657, 0xc7b4b473, 0x51c6c697, + 0x23e8e8cb, 0x7cdddda1, 0x9c7474e8, 0x211f1f3e, 0xdd4b4b96, + 0xdcbdbd61, 0x868b8b0d, 0x858a8a0f, 0x907070e0, 0x423e3e7c, + 0xc4b5b571, 0xaa6666cc, 0xd8484890, 0x05030306, 0x01f6f6f7, + 0x120e0e1c, 0xa36161c2, 0x5f35356a, 0xf95757ae, 0xd0b9b969, + 0x91868617, 0x58c1c199, 0x271d1d3a, 0xb99e9e27, 0x38e1e1d9, + 0x13f8f8eb, 0xb398982b, 0x33111122, 0xbb6969d2, 0x70d9d9a9, + 0x898e8e07, 0xa7949433, 0xb69b9b2d, 0x221e1e3c, 0x92878715, + 0x20e9e9c9, 0x49cece87, 0xff5555aa, 0x78282850, 0x7adfdfa5, + 0x8f8c8c03, 0xf8a1a159, 0x80898909, 0x170d0d1a, 0xdabfbf65, + 0x31e6e6d7, 0xc6424284, 0xb86868d0, 0xc3414182, 0xb0999929, + 0x772d2d5a, 0x110f0f1e, 0xcbb0b07b, 0xfc5454a8, 0xd6bbbb6d, + 0x3a16162c + }; + + private static readonly uint[] Tinv0 = + { + 0x50a7f451, 0x5365417e, 0xc3a4171a, 0x965e273a, 0xcb6bab3b, + 0xf1459d1f, 0xab58faac, 0x9303e34b, 0x55fa3020, 0xf66d76ad, + 0x9176cc88, 0x254c02f5, 0xfcd7e54f, 0xd7cb2ac5, 0x80443526, + 0x8fa362b5, 0x495ab1de, 0x671bba25, 0x980eea45, 0xe1c0fe5d, + 0x02752fc3, 0x12f04c81, 0xa397468d, 0xc6f9d36b, 0xe75f8f03, + 0x959c9215, 0xeb7a6dbf, 0xda595295, 0x2d83bed4, 0xd3217458, + 0x2969e049, 0x44c8c98e, 0x6a89c275, 0x78798ef4, 0x6b3e5899, + 0xdd71b927, 0xb64fe1be, 0x17ad88f0, 0x66ac20c9, 0xb43ace7d, + 0x184adf63, 0x82311ae5, 0x60335197, 0x457f5362, 0xe07764b1, + 0x84ae6bbb, 0x1ca081fe, 0x942b08f9, 0x58684870, 0x19fd458f, + 0x876cde94, 0xb7f87b52, 0x23d373ab, 0xe2024b72, 0x578f1fe3, + 0x2aab5566, 0x0728ebb2, 0x03c2b52f, 0x9a7bc586, 0xa50837d3, + 0xf2872830, 0xb2a5bf23, 0xba6a0302, 0x5c8216ed, 0x2b1ccf8a, + 0x92b479a7, 0xf0f207f3, 0xa1e2694e, 0xcdf4da65, 0xd5be0506, + 0x1f6234d1, 0x8afea6c4, 0x9d532e34, 0xa055f3a2, 0x32e18a05, + 0x75ebf6a4, 0x39ec830b, 0xaaef6040, 0x069f715e, 0x51106ebd, + 0xf98a213e, 0x3d06dd96, 0xae053edd, 0x46bde64d, 0xb58d5491, + 0x055dc471, 0x6fd40604, 0xff155060, 0x24fb9819, 0x97e9bdd6, + 0xcc434089, 0x779ed967, 0xbd42e8b0, 0x888b8907, 0x385b19e7, + 0xdbeec879, 0x470a7ca1, 0xe90f427c, 0xc91e84f8, 0x00000000, + 0x83868009, 0x48ed2b32, 0xac70111e, 0x4e725a6c, 0xfbff0efd, + 0x5638850f, 0x1ed5ae3d, 0x27392d36, 0x64d90f0a, 0x21a65c68, + 0xd1545b9b, 0x3a2e3624, 0xb1670a0c, 0x0fe75793, 0xd296eeb4, + 0x9e919b1b, 0x4fc5c080, 0xa220dc61, 0x694b775a, 0x161a121c, + 0x0aba93e2, 0xe52aa0c0, 0x43e0223c, 0x1d171b12, 0x0b0d090e, + 0xadc78bf2, 0xb9a8b62d, 0xc8a91e14, 0x8519f157, 0x4c0775af, + 0xbbdd99ee, 0xfd607fa3, 0x9f2601f7, 0xbcf5725c, 0xc53b6644, + 0x347efb5b, 0x7629438b, 0xdcc623cb, 0x68fcedb6, 0x63f1e4b8, + 0xcadc31d7, 0x10856342, 0x40229713, 0x2011c684, 0x7d244a85, + 0xf83dbbd2, 0x1132f9ae, 0x6da129c7, 0x4b2f9e1d, 0xf330b2dc, + 0xec52860d, 0xd0e3c177, 0x6c16b32b, 0x99b970a9, 0xfa489411, + 0x2264e947, 0xc48cfca8, 0x1a3ff0a0, 0xd82c7d56, 0xef903322, + 0xc74e4987, 0xc1d138d9, 0xfea2ca8c, 0x360bd498, 0xcf81f5a6, + 0x28de7aa5, 0x268eb7da, 0xa4bfad3f, 0xe49d3a2c, 0x0d927850, + 0x9bcc5f6a, 0x62467e54, 0xc2138df6, 0xe8b8d890, 0x5ef7392e, + 0xf5afc382, 0xbe805d9f, 0x7c93d069, 0xa92dd56f, 0xb31225cf, + 0x3b99acc8, 0xa77d1810, 0x6e639ce8, 0x7bbb3bdb, 0x097826cd, + 0xf418596e, 0x01b79aec, 0xa89a4f83, 0x656e95e6, 0x7ee6ffaa, + 0x08cfbc21, 0xe6e815ef, 0xd99be7ba, 0xce366f4a, 0xd4099fea, + 0xd67cb029, 0xafb2a431, 0x31233f2a, 0x3094a5c6, 0xc066a235, + 0x37bc4e74, 0xa6ca82fc, 0xb0d090e0, 0x15d8a733, 0x4a9804f1, + 0xf7daec41, 0x0e50cd7f, 0x2ff69117, 0x8dd64d76, 0x4db0ef43, + 0x544daacc, 0xdf0496e4, 0xe3b5d19e, 0x1b886a4c, 0xb81f2cc1, + 0x7f516546, 0x04ea5e9d, 0x5d358c01, 0x737487fa, 0x2e410bfb, + 0x5a1d67b3, 0x52d2db92, 0x335610e9, 0x1347d66d, 0x8c61d79a, + 0x7a0ca137, 0x8e14f859, 0x893c13eb, 0xee27a9ce, 0x35c961b7, + 0xede51ce1, 0x3cb1477a, 0x59dfd29c, 0x3f73f255, 0x79ce1418, + 0xbf37c773, 0xeacdf753, 0x5baafd5f, 0x146f3ddf, 0x86db4478, + 0x81f3afca, 0x3ec468b9, 0x2c342438, 0x5f40a3c2, 0x72c31d16, + 0x0c25e2bc, 0x8b493c28, 0x41950dff, 0x7101a839, 0xdeb30c08, + 0x9ce4b4d8, 0x90c15664, 0x6184cb7b, 0x70b632d5, 0x745c6c48, + 0x4257b8d0 + }; + + private static uint Shift(uint r, int shift) + { + return (r >> shift) | (r << (32 - shift)); + } + + /* multiply four bytes in GF(2^8) by 'x' {02} in parallel */ + + private const uint m1 = 0x80808080; + private const uint m2 = 0x7f7f7f7f; + private const uint m3 = 0x0000001b; + private const uint m4 = 0xC0C0C0C0; + private const uint m5 = 0x3f3f3f3f; + + private static uint FFmulX(uint x) + { + return ((x & m2) << 1) ^ (((x & m1) >> 7) * m3); + } + + private static uint FFmulX2(uint x) + { + uint t0 = (x & m5) << 2; + uint t1 = (x & m4); + t1 ^= (t1 >> 1); + return t0 ^ (t1 >> 2) ^ (t1 >> 5); + } + + /* + The following defines provide alternative definitions of FFmulX that might + give improved performance if a fast 32-bit multiply is not available. + + private int FFmulX(int x) { int u = x & m1; u |= (u >> 1); return ((x & m2) << 1) ^ ((u >>> 3) | (u >>> 6)); } + private static final int m4 = 0x1b1b1b1b; + private int FFmulX(int x) { int u = x & m1; return ((x & m2) << 1) ^ ((u - (u >>> 7)) & m4); } + + */ + + private static uint Inv_Mcol(uint x) + { + uint t0, t1; + t0 = x; + t1 = t0 ^ Shift(t0, 8); + t0 ^= FFmulX(t1); + t1 ^= FFmulX2(t0); + t0 ^= t1 ^ Shift(t1, 16); + return t0; + } + + private static uint SubWord(uint x) + { + return (uint)S[x&255] + | (((uint)S[(x>>8)&255]) << 8) + | (((uint)S[(x>>16)&255]) << 16) + | (((uint)S[(x>>24)&255]) << 24); + } + + /** + * Calculate the necessary round keys + * The number of calculations depends on key size and block size + * AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits + * This code is written assuming those are the only possible values + */ + private uint[][] GenerateWorkingKey(byte[] key, bool forEncryption) + { + int keyLen = key.Length; + if (keyLen < 16 || keyLen > 32 || (keyLen & 7) != 0) + throw new ArgumentException("Key length not 128/192/256 bits."); + + int KC = keyLen >> 2; + this.ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block sizes + + uint[][] W = new uint[ROUNDS + 1][]; // 4 words in a block + for (int i = 0; i <= ROUNDS; ++i) + { + W[i] = new uint[4]; + } + + switch (KC) + { + case 4: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + + for (int i = 1; i <= 10; ++i) + { + uint u = SubWord(Shift(t3, 8)) ^ rcon[i - 1]; + t0 ^= u; W[i][0] = t0; + t1 ^= t0; W[i][1] = t1; + t2 ^= t1; W[i][2] = t2; + t3 ^= t2; W[i][3] = t3; + } + + break; + } + case 6: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + + uint rcon = 1; + uint u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[1][2] = t0; + t1 ^= t0; W[1][3] = t1; + t2 ^= t1; W[2][0] = t2; + t3 ^= t2; W[2][1] = t3; + t4 ^= t3; W[2][2] = t4; + t5 ^= t4; W[2][3] = t5; + + for (int i = 3; i < 12; i += 3) + { + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i ][0] = t0; + t1 ^= t0; W[i ][1] = t1; + t2 ^= t1; W[i ][2] = t2; + t3 ^= t2; W[i ][3] = t3; + t4 ^= t3; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i + 1][2] = t0; + t1 ^= t0; W[i + 1][3] = t1; + t2 ^= t1; W[i + 2][0] = t2; + t3 ^= t2; W[i + 2][1] = t3; + t4 ^= t3; W[i + 2][2] = t4; + t5 ^= t4; W[i + 2][3] = t5; + } + + u = SubWord(Shift(t5, 8)) ^ rcon; + t0 ^= u; W[12][0] = t0; + t1 ^= t0; W[12][1] = t1; + t2 ^= t1; W[12][2] = t2; + t3 ^= t2; W[12][3] = t3; + + break; + } + case 8: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + uint t6 = Pack.LE_To_UInt32(key, 24); W[1][2] = t6; + uint t7 = Pack.LE_To_UInt32(key, 28); W[1][3] = t7; + + uint u, rcon = 1; + + for (int i = 2; i < 14; i += 2) + { + u = SubWord(Shift(t7, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i ][0] = t0; + t1 ^= t0; W[i ][1] = t1; + t2 ^= t1; W[i ][2] = t2; + t3 ^= t2; W[i ][3] = t3; + u = SubWord(t3); + t4 ^= u; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + t6 ^= t5; W[i + 1][2] = t6; + t7 ^= t6; W[i + 1][3] = t7; + } + + u = SubWord(Shift(t7, 8)) ^ rcon; + t0 ^= u; W[14][0] = t0; + t1 ^= t0; W[14][1] = t1; + t2 ^= t1; W[14][2] = t2; + t3 ^= t2; W[14][3] = t3; + + break; + } + default: + { + throw new InvalidOperationException("Should never get here"); + } + } + + if (!forEncryption) + { + for (int j = 1; j < ROUNDS; j++) + { + uint[] w = W[j]; + for (int i = 0; i < 4; i++) + { + w[i] = Inv_Mcol(w[i]); + } + } + } + + return W; + } + + private int ROUNDS; + private uint[][] WorkingKey; + private bool forEncryption; + + private byte[] s; + + private const int BLOCK_SIZE = 16; + + /** + * default constructor - 128 bit block size. + */ + public AesEngine() + { + } + + /** + * initialise an AES cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to AES init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + WorkingKey = GenerateWorkingKey(keyParameter.GetKey(), forEncryption); + + this.forEncryption = forEncryption; + this.s = Arrays.Clone(forEncryption ? S : Si); + } + + public string AlgorithmName + { + get { return "AES"; } + } + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, inOff, 16, "input buffer too short"); + Check.OutputLength(output, outOff, 16, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (forEncryption) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } +#else + if (forEncryption) + { + EncryptBlock(input, inOff, output, outOff, WorkingKey); + } + else + { + DecryptBlock(input, inOff, output, outOff, WorkingKey); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, 16, "input buffer too short"); + Check.OutputLength(output, 16, "output buffer too short"); + + if (forEncryption) + { + EncryptBlock(input, output, WorkingKey); + } + else + { + DecryptBlock(input, output, WorkingKey); + } + + return BLOCK_SIZE; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void EncryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + while (r < ROUNDS - 1) + { + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r++]; + t0 = T0[r0 & 255] ^ Shift(T0[(r1 >> 8) & 255], 24) ^ Shift(T0[(r2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + t1 = T0[r1 & 255] ^ Shift(T0[(r2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(r0 >> 24) & 255], 8) ^ kw[1]; + t2 = T0[r2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(r0 >> 16) & 255], 16) ^ Shift(T0[(r1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(r0 >> 8) & 255], 24) ^ Shift(T0[(r1 >> 16) & 255], 16) ^ Shift(T0[(r2 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of S so we don't use a whole other four tables for it + + kw = KW[r]; + C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)s[r3 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } + + private void DecryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r--]; + t0 = Tinv0[r0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(r2 >> 16) & 255], 16) ^ Shift(Tinv0[(r1 >> 24) & 255], 8) ^ kw[0]; + t1 = Tinv0[r1 & 255] ^ Shift(Tinv0[(r0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(r2 >> 24) & 255], 8) ^ kw[1]; + t2 = Tinv0[r2 & 255] ^ Shift(Tinv0[(r1 >> 8) & 255], 24) ^ Shift(Tinv0[(r0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(r2 >> 8) & 255], 24) ^ Shift(Tinv0[(r1 >> 16) & 255], 16) ^ Shift(Tinv0[(r0 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[1]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of Si so we don't use a whole other four tables for it + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)s[(r3 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)s[(r2 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } +#else + private void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + while (r < ROUNDS - 1) + { + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r++]; + t0 = T0[r0 & 255] ^ Shift(T0[(r1 >> 8) & 255], 24) ^ Shift(T0[(r2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + t1 = T0[r1 & 255] ^ Shift(T0[(r2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(r0 >> 24) & 255], 8) ^ kw[1]; + t2 = T0[r2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(r0 >> 16) & 255], 16) ^ Shift(T0[(r1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(r0 >> 8) & 255], 24) ^ Shift(T0[(r1 >> 16) & 255], 16) ^ Shift(T0[(r2 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of S so we don't use a whole other four tables for it + + kw = KW[r]; + C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)s[r3 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } + + private void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r--]; + t0 = Tinv0[r0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(r2 >> 16) & 255], 16) ^ Shift(Tinv0[(r1 >> 24) & 255], 8) ^ kw[0]; + t1 = Tinv0[r1 & 255] ^ Shift(Tinv0[(r0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(r2 >> 24) & 255], 8) ^ kw[1]; + t2 = Tinv0[r2 & 255] ^ Shift(Tinv0[(r1 >> 8) & 255], 24) ^ Shift(Tinv0[(r0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(r2 >> 8) & 255], 24) ^ Shift(Tinv0[(r1 >> 16) & 255], 16) ^ Shift(Tinv0[(r0 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[1]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of Si so we don't use a whole other four tables for it + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)s[(r3 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)s[(r2 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs.meta new file mode 100644 index 00000000..f7f85983 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fafbe10fe323dff42b75958ef30fdacd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs new file mode 100644 index 00000000..7fb5572a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs @@ -0,0 +1,834 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +#if NETCOREAPP3_0_OR_GREATER +using System; +using System.Buffers.Binary; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + using Aes = System.Runtime.Intrinsics.X86.Aes; + using Sse2 = System.Runtime.Intrinsics.X86.Sse2; + + public struct AesEngine_X86 + : IBlockCipher + { + public static bool IsSupported => Aes.IsSupported; + + private static Vector128[] CreateRoundKeys(byte[] key, bool forEncryption) + { + Vector128[] K; + + switch (key.Length) + { + case 16: + { + ReadOnlySpan rcon = stackalloc byte[]{ 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36 }; + + K = new Vector128[11]; + + var s = Load128(key.AsSpan(0, 16)); + K[0] = s; + + for (int round = 0; round < 10;) + { + var t = Aes.KeygenAssist(s, rcon[round++]); + t = Sse2.Shuffle(t.AsInt32(), 0xFF).AsByte(); + s = Sse2.Xor(s, Sse2.ShiftLeftLogical128BitLane(s, 8)); + s = Sse2.Xor(s, Sse2.ShiftLeftLogical128BitLane(s, 4)); + s = Sse2.Xor(s, t); + K[round] = s; + } + + break; + } + case 24: + { + K = new Vector128[13]; + + var s1 = Load128(key.AsSpan(0, 16)); + var s2 = Load64(key.AsSpan(16, 8)).ToVector128(); + K[0] = s1; + + byte rcon = 0x01; + for (int round = 0;;) + { + var t1 = Aes.KeygenAssist(s2, rcon); rcon <<= 1; + t1 = Sse2.Shuffle(t1.AsInt32(), 0x55).AsByte(); + + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 8)); + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 4)); + s1 = Sse2.Xor(s1, t1); + + K[++round] = Sse2.Xor(s2, Sse2.ShiftLeftLogical128BitLane(s1, 8)); + + var s3 = Sse2.Xor(s2, Sse2.ShiftRightLogical128BitLane(s1, 12)); + s3 = Sse2.Xor(s3, Sse2.ShiftLeftLogical128BitLane(s3, 4)); + + K[++round] = Sse2.Xor( + Sse2.ShiftRightLogical128BitLane(s1, 8), + Sse2.ShiftLeftLogical128BitLane(s3, 8)); + + var t2 = Aes.KeygenAssist(s3, rcon); rcon <<= 1; + t2 = Sse2.Shuffle(t2.AsInt32(), 0x55).AsByte(); + + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 8)); + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 4)); + s1 = Sse2.Xor(s1, t2); + + K[++round] = s1; + + if (round == 12) + break; + + s2 = Sse2.Xor(s3, Sse2.ShiftRightLogical128BitLane(s1, 12)); + s2 = Sse2.Xor(s2, Sse2.ShiftLeftLogical128BitLane(s2, 4)); + s2 = s2.WithUpper(Vector64.Zero); + } + + break; + } + case 32: + { + K = new Vector128[15]; + + var s1 = Load128(key.AsSpan(0, 16)); + var s2 = Load128(key.AsSpan(16, 16)); + K[0] = s1; + K[1] = s2; + + byte rcon = 0x01; + for (int round = 1;;) + { + var t1 = Aes.KeygenAssist(s2, rcon); rcon <<= 1; + t1 = Sse2.Shuffle(t1.AsInt32(), 0xFF).AsByte(); + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 8)); + s1 = Sse2.Xor(s1, Sse2.ShiftLeftLogical128BitLane(s1, 4)); + s1 = Sse2.Xor(s1, t1); + K[++round] = s1; + + if (round == 14) + break; + + var t2 = Aes.KeygenAssist(s1, 0x00); + t2 = Sse2.Shuffle(t2.AsInt32(), 0xAA).AsByte(); + s2 = Sse2.Xor(s2, Sse2.ShiftLeftLogical128BitLane(s2, 8)); + s2 = Sse2.Xor(s2, Sse2.ShiftLeftLogical128BitLane(s2, 4)); + s2 = Sse2.Xor(s2, t2); + K[++round] = s2; + } + + break; + } + default: + throw new ArgumentException("Key length not 128/192/256 bits."); + } + + if (!forEncryption) + { + for (int i = 1, last = K.Length - 1; i < last; ++i) + { + K[i] = Aes.InverseMixColumns(K[i]); + } + + Array.Reverse(K); + } + + return K; + } + + private enum Mode { DEC_128, DEC_192, DEC_256, ENC_128, ENC_192, ENC_256, UNINITIALIZED }; + + private Vector128[] m_roundKeys = null; + private Mode m_mode = Mode.UNINITIALIZED; + + public AesEngine_X86() + { + if (!IsSupported) + throw new PlatformNotSupportedException(nameof(AesEngine_X86)); + } + + public string AlgorithmName => "AES"; + + public int GetBlockSize() => 16; + + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + { + ArgumentNullException.ThrowIfNull(parameters, nameof(parameters)); + throw new ArgumentException("invalid type: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), nameof(parameters)); + } + + m_roundKeys = CreateRoundKeys(keyParameter.GetKey(), forEncryption); + + if (m_roundKeys.Length == 11) + { + m_mode = forEncryption ? Mode.ENC_128 : Mode.DEC_128; + } + else if (m_roundKeys.Length == 13) + { + m_mode = forEncryption ? Mode.ENC_192 : Mode.DEC_192; + } + else + { + m_mode = forEncryption ? Mode.ENC_256 : Mode.DEC_256; + } + } + + public int ProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.DataLength(inBuf, inOff, 16, "input buffer too short"); + Check.OutputLength(outBuf, outOff, 16, "output buffer too short"); + + var state = Load128(inBuf.AsSpan(inOff, 16)); + ImplRounds(ref state); + Store128(state, outBuf.AsSpan(outOff, 16)); + return 16; + } + + public int ProcessBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, 16, "input buffer too short"); + Check.OutputLength(output, 16, "output buffer too short"); + + var state = Load128(input[..16]); + ImplRounds(ref state); + Store128(state, output[..16]); + return 16; + } + + public int ProcessFourBlocks(ReadOnlySpan input, Span output) + { + Check.DataLength(input, 64, "input buffer too short"); + Check.OutputLength(output, 64, "output buffer too short"); + + var s1 = Load128(input[..16]); + var s2 = Load128(input[16..32]); + var s3 = Load128(input[32..48]); + var s4 = Load128(input[48..64]); + ImplRounds(ref s1, ref s2, ref s3, ref s4); + Store128(s1, output[..16]); + Store128(s2, output[16..32]); + Store128(s3, output[32..48]); + Store128(s4, output[48..64]); + return 64; + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void ImplRounds(ref Vector128 state) + { + switch (m_mode) + { + case Mode.DEC_128: Decrypt128(m_roundKeys, ref state); break; + case Mode.DEC_192: Decrypt192(m_roundKeys, ref state); break; + case Mode.DEC_256: Decrypt256(m_roundKeys, ref state); break; + case Mode.ENC_128: Encrypt128(m_roundKeys, ref state); break; + case Mode.ENC_192: Encrypt192(m_roundKeys, ref state); break; + case Mode.ENC_256: Encrypt256(m_roundKeys, ref state); break; + default: throw new InvalidOperationException(nameof(AesEngine_X86) + " not initialised"); + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void ImplRounds( + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + switch (m_mode) + { + case Mode.DEC_128: DecryptFour128(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + case Mode.DEC_192: DecryptFour192(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + case Mode.DEC_256: DecryptFour256(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + case Mode.ENC_128: EncryptFour128(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + case Mode.ENC_192: EncryptFour192(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + case Mode.ENC_256: EncryptFour256(m_roundKeys, ref s1, ref s2, ref s3, ref s4); break; + default: throw new InvalidOperationException(nameof(AesEngine_X86) + " not initialised"); + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Decrypt128(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Decrypt(state, roundKeys[1]); + state = Aes.Decrypt(state, roundKeys[2]); + state = Aes.Decrypt(state, roundKeys[3]); + state = Aes.Decrypt(state, roundKeys[4]); + state = Aes.Decrypt(state, roundKeys[5]); + state = Aes.Decrypt(state, roundKeys[6]); + state = Aes.Decrypt(state, roundKeys[7]); + state = Aes.Decrypt(state, roundKeys[8]); + state = Aes.Decrypt(state, roundKeys[9]); + state = Aes.DecryptLast(state, roundKeys[10]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Decrypt192(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Decrypt(state, roundKeys[1]); + state = Aes.Decrypt(state, roundKeys[2]); + state = Aes.Decrypt(state, roundKeys[3]); + state = Aes.Decrypt(state, roundKeys[4]); + state = Aes.Decrypt(state, roundKeys[5]); + state = Aes.Decrypt(state, roundKeys[6]); + state = Aes.Decrypt(state, roundKeys[7]); + state = Aes.Decrypt(state, roundKeys[8]); + state = Aes.Decrypt(state, roundKeys[9]); + state = Aes.Decrypt(state, roundKeys[10]); + state = Aes.Decrypt(state, roundKeys[11]); + state = Aes.DecryptLast(state, roundKeys[12]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Decrypt256(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Decrypt(state, roundKeys[1]); + state = Aes.Decrypt(state, roundKeys[2]); + state = Aes.Decrypt(state, roundKeys[3]); + state = Aes.Decrypt(state, roundKeys[4]); + state = Aes.Decrypt(state, roundKeys[5]); + state = Aes.Decrypt(state, roundKeys[6]); + state = Aes.Decrypt(state, roundKeys[7]); + state = Aes.Decrypt(state, roundKeys[8]); + state = Aes.Decrypt(state, roundKeys[9]); + state = Aes.Decrypt(state, roundKeys[10]); + state = Aes.Decrypt(state, roundKeys[11]); + state = Aes.Decrypt(state, roundKeys[12]); + state = Aes.Decrypt(state, roundKeys[13]); + state = Aes.DecryptLast(state, roundKeys[14]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void DecryptFour128(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Decrypt(s1, rk[1]); + s2 = Aes.Decrypt(s2, rk[1]); + s3 = Aes.Decrypt(s3, rk[1]); + s4 = Aes.Decrypt(s4, rk[1]); + + s1 = Aes.Decrypt(s1, rk[2]); + s2 = Aes.Decrypt(s2, rk[2]); + s3 = Aes.Decrypt(s3, rk[2]); + s4 = Aes.Decrypt(s4, rk[2]); + + s1 = Aes.Decrypt(s1, rk[3]); + s2 = Aes.Decrypt(s2, rk[3]); + s3 = Aes.Decrypt(s3, rk[3]); + s4 = Aes.Decrypt(s4, rk[3]); + + s1 = Aes.Decrypt(s1, rk[4]); + s2 = Aes.Decrypt(s2, rk[4]); + s3 = Aes.Decrypt(s3, rk[4]); + s4 = Aes.Decrypt(s4, rk[4]); + + s1 = Aes.Decrypt(s1, rk[5]); + s2 = Aes.Decrypt(s2, rk[5]); + s3 = Aes.Decrypt(s3, rk[5]); + s4 = Aes.Decrypt(s4, rk[5]); + + s1 = Aes.Decrypt(s1, rk[6]); + s2 = Aes.Decrypt(s2, rk[6]); + s3 = Aes.Decrypt(s3, rk[6]); + s4 = Aes.Decrypt(s4, rk[6]); + + s1 = Aes.Decrypt(s1, rk[7]); + s2 = Aes.Decrypt(s2, rk[7]); + s3 = Aes.Decrypt(s3, rk[7]); + s4 = Aes.Decrypt(s4, rk[7]); + + s1 = Aes.Decrypt(s1, rk[8]); + s2 = Aes.Decrypt(s2, rk[8]); + s3 = Aes.Decrypt(s3, rk[8]); + s4 = Aes.Decrypt(s4, rk[8]); + + s1 = Aes.Decrypt(s1, rk[9]); + s2 = Aes.Decrypt(s2, rk[9]); + s3 = Aes.Decrypt(s3, rk[9]); + s4 = Aes.Decrypt(s4, rk[9]); + + s1 = Aes.DecryptLast(s1, rk[10]); + s2 = Aes.DecryptLast(s2, rk[10]); + s3 = Aes.DecryptLast(s3, rk[10]); + s4 = Aes.DecryptLast(s4, rk[10]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void DecryptFour192(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Decrypt(s1, rk[1]); + s2 = Aes.Decrypt(s2, rk[1]); + s3 = Aes.Decrypt(s3, rk[1]); + s4 = Aes.Decrypt(s4, rk[1]); + + s1 = Aes.Decrypt(s1, rk[2]); + s2 = Aes.Decrypt(s2, rk[2]); + s3 = Aes.Decrypt(s3, rk[2]); + s4 = Aes.Decrypt(s4, rk[2]); + + s1 = Aes.Decrypt(s1, rk[3]); + s2 = Aes.Decrypt(s2, rk[3]); + s3 = Aes.Decrypt(s3, rk[3]); + s4 = Aes.Decrypt(s4, rk[3]); + + s1 = Aes.Decrypt(s1, rk[4]); + s2 = Aes.Decrypt(s2, rk[4]); + s3 = Aes.Decrypt(s3, rk[4]); + s4 = Aes.Decrypt(s4, rk[4]); + + s1 = Aes.Decrypt(s1, rk[5]); + s2 = Aes.Decrypt(s2, rk[5]); + s3 = Aes.Decrypt(s3, rk[5]); + s4 = Aes.Decrypt(s4, rk[5]); + + s1 = Aes.Decrypt(s1, rk[6]); + s2 = Aes.Decrypt(s2, rk[6]); + s3 = Aes.Decrypt(s3, rk[6]); + s4 = Aes.Decrypt(s4, rk[6]); + + s1 = Aes.Decrypt(s1, rk[7]); + s2 = Aes.Decrypt(s2, rk[7]); + s3 = Aes.Decrypt(s3, rk[7]); + s4 = Aes.Decrypt(s4, rk[7]); + + s1 = Aes.Decrypt(s1, rk[8]); + s2 = Aes.Decrypt(s2, rk[8]); + s3 = Aes.Decrypt(s3, rk[8]); + s4 = Aes.Decrypt(s4, rk[8]); + + s1 = Aes.Decrypt(s1, rk[9]); + s2 = Aes.Decrypt(s2, rk[9]); + s3 = Aes.Decrypt(s3, rk[9]); + s4 = Aes.Decrypt(s4, rk[9]); + + s1 = Aes.Decrypt(s1, rk[10]); + s2 = Aes.Decrypt(s2, rk[10]); + s3 = Aes.Decrypt(s3, rk[10]); + s4 = Aes.Decrypt(s4, rk[10]); + + s1 = Aes.Decrypt(s1, rk[11]); + s2 = Aes.Decrypt(s2, rk[11]); + s3 = Aes.Decrypt(s3, rk[11]); + s4 = Aes.Decrypt(s4, rk[11]); + + s1 = Aes.DecryptLast(s1, rk[12]); + s2 = Aes.DecryptLast(s2, rk[12]); + s3 = Aes.DecryptLast(s3, rk[12]); + s4 = Aes.DecryptLast(s4, rk[12]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void DecryptFour256(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Decrypt(s1, rk[1]); + s2 = Aes.Decrypt(s2, rk[1]); + s3 = Aes.Decrypt(s3, rk[1]); + s4 = Aes.Decrypt(s4, rk[1]); + + s1 = Aes.Decrypt(s1, rk[2]); + s2 = Aes.Decrypt(s2, rk[2]); + s3 = Aes.Decrypt(s3, rk[2]); + s4 = Aes.Decrypt(s4, rk[2]); + + s1 = Aes.Decrypt(s1, rk[3]); + s2 = Aes.Decrypt(s2, rk[3]); + s3 = Aes.Decrypt(s3, rk[3]); + s4 = Aes.Decrypt(s4, rk[3]); + + s1 = Aes.Decrypt(s1, rk[4]); + s2 = Aes.Decrypt(s2, rk[4]); + s3 = Aes.Decrypt(s3, rk[4]); + s4 = Aes.Decrypt(s4, rk[4]); + + s1 = Aes.Decrypt(s1, rk[5]); + s2 = Aes.Decrypt(s2, rk[5]); + s3 = Aes.Decrypt(s3, rk[5]); + s4 = Aes.Decrypt(s4, rk[5]); + + s1 = Aes.Decrypt(s1, rk[6]); + s2 = Aes.Decrypt(s2, rk[6]); + s3 = Aes.Decrypt(s3, rk[6]); + s4 = Aes.Decrypt(s4, rk[6]); + + s1 = Aes.Decrypt(s1, rk[7]); + s2 = Aes.Decrypt(s2, rk[7]); + s3 = Aes.Decrypt(s3, rk[7]); + s4 = Aes.Decrypt(s4, rk[7]); + + s1 = Aes.Decrypt(s1, rk[8]); + s2 = Aes.Decrypt(s2, rk[8]); + s3 = Aes.Decrypt(s3, rk[8]); + s4 = Aes.Decrypt(s4, rk[8]); + + s1 = Aes.Decrypt(s1, rk[9]); + s2 = Aes.Decrypt(s2, rk[9]); + s3 = Aes.Decrypt(s3, rk[9]); + s4 = Aes.Decrypt(s4, rk[9]); + + s1 = Aes.Decrypt(s1, rk[10]); + s2 = Aes.Decrypt(s2, rk[10]); + s3 = Aes.Decrypt(s3, rk[10]); + s4 = Aes.Decrypt(s4, rk[10]); + + s1 = Aes.Decrypt(s1, rk[11]); + s2 = Aes.Decrypt(s2, rk[11]); + s3 = Aes.Decrypt(s3, rk[11]); + s4 = Aes.Decrypt(s4, rk[11]); + + s1 = Aes.Decrypt(s1, rk[12]); + s2 = Aes.Decrypt(s2, rk[12]); + s3 = Aes.Decrypt(s3, rk[12]); + s4 = Aes.Decrypt(s4, rk[12]); + + s1 = Aes.Decrypt(s1, rk[13]); + s2 = Aes.Decrypt(s2, rk[13]); + s3 = Aes.Decrypt(s3, rk[13]); + s4 = Aes.Decrypt(s4, rk[13]); + + s1 = Aes.DecryptLast(s1, rk[14]); + s2 = Aes.DecryptLast(s2, rk[14]); + s3 = Aes.DecryptLast(s3, rk[14]); + s4 = Aes.DecryptLast(s4, rk[14]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Encrypt128(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Encrypt(state, roundKeys[1]); + state = Aes.Encrypt(state, roundKeys[2]); + state = Aes.Encrypt(state, roundKeys[3]); + state = Aes.Encrypt(state, roundKeys[4]); + state = Aes.Encrypt(state, roundKeys[5]); + state = Aes.Encrypt(state, roundKeys[6]); + state = Aes.Encrypt(state, roundKeys[7]); + state = Aes.Encrypt(state, roundKeys[8]); + state = Aes.Encrypt(state, roundKeys[9]); + state = Aes.EncryptLast(state, roundKeys[10]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Encrypt192(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Encrypt(state, roundKeys[1]); + state = Aes.Encrypt(state, roundKeys[2]); + state = Aes.Encrypt(state, roundKeys[3]); + state = Aes.Encrypt(state, roundKeys[4]); + state = Aes.Encrypt(state, roundKeys[5]); + state = Aes.Encrypt(state, roundKeys[6]); + state = Aes.Encrypt(state, roundKeys[7]); + state = Aes.Encrypt(state, roundKeys[8]); + state = Aes.Encrypt(state, roundKeys[9]); + state = Aes.Encrypt(state, roundKeys[10]); + state = Aes.Encrypt(state, roundKeys[11]); + state = Aes.EncryptLast(state, roundKeys[12]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Encrypt256(Vector128[] roundKeys, ref Vector128 state) + { + state = Sse2.Xor(state, roundKeys[0]); + state = Aes.Encrypt(state, roundKeys[1]); + state = Aes.Encrypt(state, roundKeys[2]); + state = Aes.Encrypt(state, roundKeys[3]); + state = Aes.Encrypt(state, roundKeys[4]); + state = Aes.Encrypt(state, roundKeys[5]); + state = Aes.Encrypt(state, roundKeys[6]); + state = Aes.Encrypt(state, roundKeys[7]); + state = Aes.Encrypt(state, roundKeys[8]); + state = Aes.Encrypt(state, roundKeys[9]); + state = Aes.Encrypt(state, roundKeys[10]); + state = Aes.Encrypt(state, roundKeys[11]); + state = Aes.Encrypt(state, roundKeys[12]); + state = Aes.Encrypt(state, roundKeys[13]); + state = Aes.EncryptLast(state, roundKeys[14]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void EncryptFour128(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Encrypt(s1, rk[1]); + s2 = Aes.Encrypt(s2, rk[1]); + s3 = Aes.Encrypt(s3, rk[1]); + s4 = Aes.Encrypt(s4, rk[1]); + + s1 = Aes.Encrypt(s1, rk[2]); + s2 = Aes.Encrypt(s2, rk[2]); + s3 = Aes.Encrypt(s3, rk[2]); + s4 = Aes.Encrypt(s4, rk[2]); + + s1 = Aes.Encrypt(s1, rk[3]); + s2 = Aes.Encrypt(s2, rk[3]); + s3 = Aes.Encrypt(s3, rk[3]); + s4 = Aes.Encrypt(s4, rk[3]); + + s1 = Aes.Encrypt(s1, rk[4]); + s2 = Aes.Encrypt(s2, rk[4]); + s3 = Aes.Encrypt(s3, rk[4]); + s4 = Aes.Encrypt(s4, rk[4]); + + s1 = Aes.Encrypt(s1, rk[5]); + s2 = Aes.Encrypt(s2, rk[5]); + s3 = Aes.Encrypt(s3, rk[5]); + s4 = Aes.Encrypt(s4, rk[5]); + + s1 = Aes.Encrypt(s1, rk[6]); + s2 = Aes.Encrypt(s2, rk[6]); + s3 = Aes.Encrypt(s3, rk[6]); + s4 = Aes.Encrypt(s4, rk[6]); + + s1 = Aes.Encrypt(s1, rk[7]); + s2 = Aes.Encrypt(s2, rk[7]); + s3 = Aes.Encrypt(s3, rk[7]); + s4 = Aes.Encrypt(s4, rk[7]); + + s1 = Aes.Encrypt(s1, rk[8]); + s2 = Aes.Encrypt(s2, rk[8]); + s3 = Aes.Encrypt(s3, rk[8]); + s4 = Aes.Encrypt(s4, rk[8]); + + s1 = Aes.Encrypt(s1, rk[9]); + s2 = Aes.Encrypt(s2, rk[9]); + s3 = Aes.Encrypt(s3, rk[9]); + s4 = Aes.Encrypt(s4, rk[9]); + + s1 = Aes.EncryptLast(s1, rk[10]); + s2 = Aes.EncryptLast(s2, rk[10]); + s3 = Aes.EncryptLast(s3, rk[10]); + s4 = Aes.EncryptLast(s4, rk[10]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void EncryptFour192(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Encrypt(s1, rk[1]); + s2 = Aes.Encrypt(s2, rk[1]); + s3 = Aes.Encrypt(s3, rk[1]); + s4 = Aes.Encrypt(s4, rk[1]); + + s1 = Aes.Encrypt(s1, rk[2]); + s2 = Aes.Encrypt(s2, rk[2]); + s3 = Aes.Encrypt(s3, rk[2]); + s4 = Aes.Encrypt(s4, rk[2]); + + s1 = Aes.Encrypt(s1, rk[3]); + s2 = Aes.Encrypt(s2, rk[3]); + s3 = Aes.Encrypt(s3, rk[3]); + s4 = Aes.Encrypt(s4, rk[3]); + + s1 = Aes.Encrypt(s1, rk[4]); + s2 = Aes.Encrypt(s2, rk[4]); + s3 = Aes.Encrypt(s3, rk[4]); + s4 = Aes.Encrypt(s4, rk[4]); + + s1 = Aes.Encrypt(s1, rk[5]); + s2 = Aes.Encrypt(s2, rk[5]); + s3 = Aes.Encrypt(s3, rk[5]); + s4 = Aes.Encrypt(s4, rk[5]); + + s1 = Aes.Encrypt(s1, rk[6]); + s2 = Aes.Encrypt(s2, rk[6]); + s3 = Aes.Encrypt(s3, rk[6]); + s4 = Aes.Encrypt(s4, rk[6]); + + s1 = Aes.Encrypt(s1, rk[7]); + s2 = Aes.Encrypt(s2, rk[7]); + s3 = Aes.Encrypt(s3, rk[7]); + s4 = Aes.Encrypt(s4, rk[7]); + + s1 = Aes.Encrypt(s1, rk[8]); + s2 = Aes.Encrypt(s2, rk[8]); + s3 = Aes.Encrypt(s3, rk[8]); + s4 = Aes.Encrypt(s4, rk[8]); + + s1 = Aes.Encrypt(s1, rk[9]); + s2 = Aes.Encrypt(s2, rk[9]); + s3 = Aes.Encrypt(s3, rk[9]); + s4 = Aes.Encrypt(s4, rk[9]); + + s1 = Aes.Encrypt(s1, rk[10]); + s2 = Aes.Encrypt(s2, rk[10]); + s3 = Aes.Encrypt(s3, rk[10]); + s4 = Aes.Encrypt(s4, rk[10]); + + s1 = Aes.Encrypt(s1, rk[11]); + s2 = Aes.Encrypt(s2, rk[11]); + s3 = Aes.Encrypt(s3, rk[11]); + s4 = Aes.Encrypt(s4, rk[11]); + + s1 = Aes.EncryptLast(s1, rk[12]); + s2 = Aes.EncryptLast(s2, rk[12]); + s3 = Aes.EncryptLast(s3, rk[12]); + s4 = Aes.EncryptLast(s4, rk[12]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void EncryptFour256(Vector128[] rk, + ref Vector128 s1, ref Vector128 s2, ref Vector128 s3, ref Vector128 s4) + { + s1 = Sse2.Xor(s1, rk[0]); + s2 = Sse2.Xor(s2, rk[0]); + s3 = Sse2.Xor(s3, rk[0]); + s4 = Sse2.Xor(s4, rk[0]); + + s1 = Aes.Encrypt(s1, rk[1]); + s2 = Aes.Encrypt(s2, rk[1]); + s3 = Aes.Encrypt(s3, rk[1]); + s4 = Aes.Encrypt(s4, rk[1]); + + s1 = Aes.Encrypt(s1, rk[2]); + s2 = Aes.Encrypt(s2, rk[2]); + s3 = Aes.Encrypt(s3, rk[2]); + s4 = Aes.Encrypt(s4, rk[2]); + + s1 = Aes.Encrypt(s1, rk[3]); + s2 = Aes.Encrypt(s2, rk[3]); + s3 = Aes.Encrypt(s3, rk[3]); + s4 = Aes.Encrypt(s4, rk[3]); + + s1 = Aes.Encrypt(s1, rk[4]); + s2 = Aes.Encrypt(s2, rk[4]); + s3 = Aes.Encrypt(s3, rk[4]); + s4 = Aes.Encrypt(s4, rk[4]); + + s1 = Aes.Encrypt(s1, rk[5]); + s2 = Aes.Encrypt(s2, rk[5]); + s3 = Aes.Encrypt(s3, rk[5]); + s4 = Aes.Encrypt(s4, rk[5]); + + s1 = Aes.Encrypt(s1, rk[6]); + s2 = Aes.Encrypt(s2, rk[6]); + s3 = Aes.Encrypt(s3, rk[6]); + s4 = Aes.Encrypt(s4, rk[6]); + + s1 = Aes.Encrypt(s1, rk[7]); + s2 = Aes.Encrypt(s2, rk[7]); + s3 = Aes.Encrypt(s3, rk[7]); + s4 = Aes.Encrypt(s4, rk[7]); + + s1 = Aes.Encrypt(s1, rk[8]); + s2 = Aes.Encrypt(s2, rk[8]); + s3 = Aes.Encrypt(s3, rk[8]); + s4 = Aes.Encrypt(s4, rk[8]); + + s1 = Aes.Encrypt(s1, rk[9]); + s2 = Aes.Encrypt(s2, rk[9]); + s3 = Aes.Encrypt(s3, rk[9]); + s4 = Aes.Encrypt(s4, rk[9]); + + s1 = Aes.Encrypt(s1, rk[10]); + s2 = Aes.Encrypt(s2, rk[10]); + s3 = Aes.Encrypt(s3, rk[10]); + s4 = Aes.Encrypt(s4, rk[10]); + + s1 = Aes.Encrypt(s1, rk[11]); + s2 = Aes.Encrypt(s2, rk[11]); + s3 = Aes.Encrypt(s3, rk[11]); + s4 = Aes.Encrypt(s4, rk[11]); + + s1 = Aes.Encrypt(s1, rk[12]); + s2 = Aes.Encrypt(s2, rk[12]); + s3 = Aes.Encrypt(s3, rk[12]); + s4 = Aes.Encrypt(s4, rk[12]); + + s1 = Aes.Encrypt(s1, rk[13]); + s2 = Aes.Encrypt(s2, rk[13]); + s3 = Aes.Encrypt(s3, rk[13]); + s4 = Aes.Encrypt(s4, rk[13]); + + s1 = Aes.EncryptLast(s1, rk[14]); + s2 = Aes.EncryptLast(s2, rk[14]); + s3 = Aes.EncryptLast(s3, rk[14]); + s4 = Aes.EncryptLast(s4, rk[14]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128(ReadOnlySpan t) + { +#if NET7_0_OR_GREATER + return Vector128.Create(t); +#else + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(t); + + return Vector128.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[8..]) + ).AsByte(); +#endif + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector64 Load64(ReadOnlySpan t) + { +#if NET7_0_OR_GREATER + return Vector64.Create(t); +#else + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 8) + return MemoryMarshal.Read>(t); + + return Vector64.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]) + ).AsByte(); +#endif + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128(Vector128 s, Span t) + { +#if NET7_0_OR_GREATER + Vector128.CopyTo(s, t); +#else + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); +#endif + } + } +} +#endif +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs.meta new file mode 100644 index 00000000..054bc63a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9b6bab5c035f7c469bf54cb40312899 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesEngine_X86.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs new file mode 100644 index 00000000..3b1d777f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs @@ -0,0 +1,2 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs.meta new file mode 100644 index 00000000..a5803545 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a7a304b68d3b9cd40953469c2a58b9b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesFastEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs new file mode 100644 index 00000000..20947d17 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs @@ -0,0 +1,617 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * an implementation of the AES (Rijndael), from FIPS-197. + *

+ * For further details see: http://csrc.nist.gov/encryption/aes/. + * + * This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at + * http://fp.gladman.plus.com/cryptography_technology/rijndael/ + * + * There are three levels of tradeoff of speed vs memory + * Because java has no preprocessor, they are written as three separate classes from which to choose + * + * The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption + * and 4 for decryption. + * + * The middle performance version uses only one 256 word table for each, for a total of 2Kbytes, + * adding 12 rotate operations per round to compute the values contained in the other tables from + * the contents of the first + * + * The slowest version uses no static tables at all and computes the values + * in each round. + *

+ *

+ * This file contains the slowest performance version with no static tables + * for round precomputation, but it has the smallest foot print. + *

+ */ + public sealed class AesLightEngine + : IBlockCipher + { + // The S box + private static readonly byte[] S = + { + 99, 124, 119, 123, 242, 107, 111, 197, + 48, 1, 103, 43, 254, 215, 171, 118, + 202, 130, 201, 125, 250, 89, 71, 240, + 173, 212, 162, 175, 156, 164, 114, 192, + 183, 253, 147, 38, 54, 63, 247, 204, + 52, 165, 229, 241, 113, 216, 49, 21, + 4, 199, 35, 195, 24, 150, 5, 154, + 7, 18, 128, 226, 235, 39, 178, 117, + 9, 131, 44, 26, 27, 110, 90, 160, + 82, 59, 214, 179, 41, 227, 47, 132, + 83, 209, 0, 237, 32, 252, 177, 91, + 106, 203, 190, 57, 74, 76, 88, 207, + 208, 239, 170, 251, 67, 77, 51, 133, + 69, 249, 2, 127, 80, 60, 159, 168, + 81, 163, 64, 143, 146, 157, 56, 245, + 188, 182, 218, 33, 16, 255, 243, 210, + 205, 12, 19, 236, 95, 151, 68, 23, + 196, 167, 126, 61, 100, 93, 25, 115, + 96, 129, 79, 220, 34, 42, 144, 136, + 70, 238, 184, 20, 222, 94, 11, 219, + 224, 50, 58, 10, 73, 6, 36, 92, + 194, 211, 172, 98, 145, 149, 228, 121, + 231, 200, 55, 109, 141, 213, 78, 169, + 108, 86, 244, 234, 101, 122, 174, 8, + 186, 120, 37, 46, 28, 166, 180, 198, + 232, 221, 116, 31, 75, 189, 139, 138, + 112, 62, 181, 102, 72, 3, 246, 14, + 97, 53, 87, 185, 134, 193, 29, 158, + 225, 248, 152, 17, 105, 217, 142, 148, + 155, 30, 135, 233, 206, 85, 40, 223, + 140, 161, 137, 13, 191, 230, 66, 104, + 65, 153, 45, 15, 176, 84, 187, 22, + }; + + // The inverse S-box + private static readonly byte[] Si = + { + 82, 9, 106, 213, 48, 54, 165, 56, + 191, 64, 163, 158, 129, 243, 215, 251, + 124, 227, 57, 130, 155, 47, 255, 135, + 52, 142, 67, 68, 196, 222, 233, 203, + 84, 123, 148, 50, 166, 194, 35, 61, + 238, 76, 149, 11, 66, 250, 195, 78, + 8, 46, 161, 102, 40, 217, 36, 178, + 118, 91, 162, 73, 109, 139, 209, 37, + 114, 248, 246, 100, 134, 104, 152, 22, + 212, 164, 92, 204, 93, 101, 182, 146, + 108, 112, 72, 80, 253, 237, 185, 218, + 94, 21, 70, 87, 167, 141, 157, 132, + 144, 216, 171, 0, 140, 188, 211, 10, + 247, 228, 88, 5, 184, 179, 69, 6, + 208, 44, 30, 143, 202, 63, 15, 2, + 193, 175, 189, 3, 1, 19, 138, 107, + 58, 145, 17, 65, 79, 103, 220, 234, + 151, 242, 207, 206, 240, 180, 230, 115, + 150, 172, 116, 34, 231, 173, 53, 133, + 226, 249, 55, 232, 28, 117, 223, 110, + 71, 241, 26, 113, 29, 41, 197, 137, + 111, 183, 98, 14, 170, 24, 190, 27, + 252, 86, 62, 75, 198, 210, 121, 32, + 154, 219, 192, 254, 120, 205, 90, 244, + 31, 221, 168, 51, 136, 7, 199, 49, + 177, 18, 16, 89, 39, 128, 236, 95, + 96, 81, 127, 169, 25, 181, 74, 13, + 45, 229, 122, 159, 147, 201, 156, 239, + 160, 224, 59, 77, 174, 42, 245, 176, + 200, 235, 187, 60, 131, 83, 153, 97, + 23, 43, 4, 126, 186, 119, 214, 38, + 225, 105, 20, 99, 85, 33, 12, 125, + }; + + // vector used in calculating key schedule (powers of x in GF(256)) + private static readonly byte[] rcon = + { + 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, + 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91 + }; + + private static uint Shift(uint r, int shift) + { + return (r >> shift) | (r << (32 - shift)); + } + + /* multiply four bytes in GF(2^8) by 'x' {02} in parallel */ + + private const uint m1 = 0x80808080; + private const uint m2 = 0x7f7f7f7f; + private const uint m3 = 0x0000001b; + private const uint m4 = 0xC0C0C0C0; + private const uint m5 = 0x3f3f3f3f; + + private static uint FFmulX(uint x) + { + return ((x & m2) << 1) ^ (((x & m1) >> 7) * m3); + } + + private static uint FFmulX2(uint x) + { + uint t0 = (x & m5) << 2; + uint t1 = (x & m4); + t1 ^= (t1 >> 1); + return t0 ^ (t1 >> 2) ^ (t1 >> 5); + } + + /* + The following defines provide alternative definitions of FFmulX that might + give improved performance if a fast 32-bit multiply is not available. + + private int FFmulX(int x) { int u = x & m1; u |= (u >> 1); return ((x & m2) << 1) ^ ((u >>> 3) | (u >>> 6)); } + private static final int m4 = 0x1b1b1b1b; + private int FFmulX(int x) { int u = x & m1; return ((x & m2) << 1) ^ ((u - (u >>> 7)) & m4); } + + */ + + private static uint Mcol(uint x) + { + uint t0, t1; + t0 = Shift(x, 8); + t1 = x ^ t0; + return Shift(t1, 16) ^ t0 ^ FFmulX(t1); + } + + private static uint Inv_Mcol(uint x) + { + uint t0, t1; + t0 = x; + t1 = t0 ^ Shift(t0, 8); + t0 ^= FFmulX(t1); + t1 ^= FFmulX2(t0); + t0 ^= t1 ^ Shift(t1, 16); + return t0; + } + + private static uint SubWord(uint x) + { + return (uint)S[x&255] + | (((uint)S[(x>>8)&255]) << 8) + | (((uint)S[(x>>16)&255]) << 16) + | (((uint)S[(x>>24)&255]) << 24); + } + + /** + * Calculate the necessary round keys + * The number of calculations depends on key size and block size + * AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits + * This code is written assuming those are the only possible values + */ + private uint[][] GenerateWorkingKey(byte[] key, bool forEncryption) + { + int keyLen = key.Length; + if (keyLen < 16 || keyLen > 32 || (keyLen & 7) != 0) + throw new ArgumentException("Key length not 128/192/256 bits."); + + int KC = keyLen >> 2; + this.ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block sizes + + uint[][] W = new uint[ROUNDS + 1][]; // 4 words in a block + for (int i = 0; i <= ROUNDS; ++i) + { + W[i] = new uint[4]; + } + + switch (KC) + { + case 4: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + + for (int i = 1; i <= 10; ++i) + { + uint u = SubWord(Shift(t3, 8)) ^ rcon[i - 1]; + t0 ^= u; W[i][0] = t0; + t1 ^= t0; W[i][1] = t1; + t2 ^= t1; W[i][2] = t2; + t3 ^= t2; W[i][3] = t3; + } + + break; + } + case 6: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + + uint rcon = 1; + uint u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[1][2] = t0; + t1 ^= t0; W[1][3] = t1; + t2 ^= t1; W[2][0] = t2; + t3 ^= t2; W[2][1] = t3; + t4 ^= t3; W[2][2] = t4; + t5 ^= t4; W[2][3] = t5; + + for (int i = 3; i < 12; i += 3) + { + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i ][0] = t0; + t1 ^= t0; W[i ][1] = t1; + t2 ^= t1; W[i ][2] = t2; + t3 ^= t2; W[i ][3] = t3; + t4 ^= t3; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i + 1][2] = t0; + t1 ^= t0; W[i + 1][3] = t1; + t2 ^= t1; W[i + 2][0] = t2; + t3 ^= t2; W[i + 2][1] = t3; + t4 ^= t3; W[i + 2][2] = t4; + t5 ^= t4; W[i + 2][3] = t5; + } + + u = SubWord(Shift(t5, 8)) ^ rcon; + t0 ^= u; W[12][0] = t0; + t1 ^= t0; W[12][1] = t1; + t2 ^= t1; W[12][2] = t2; + t3 ^= t2; W[12][3] = t3; + + break; + } + case 8: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + uint t6 = Pack.LE_To_UInt32(key, 24); W[1][2] = t6; + uint t7 = Pack.LE_To_UInt32(key, 28); W[1][3] = t7; + + uint u, rcon = 1; + + for (int i = 2; i < 14; i += 2) + { + u = SubWord(Shift(t7, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i ][0] = t0; + t1 ^= t0; W[i ][1] = t1; + t2 ^= t1; W[i ][2] = t2; + t3 ^= t2; W[i ][3] = t3; + u = SubWord(t3); + t4 ^= u; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + t6 ^= t5; W[i + 1][2] = t6; + t7 ^= t6; W[i + 1][3] = t7; + } + + u = SubWord(Shift(t7, 8)) ^ rcon; + t0 ^= u; W[14][0] = t0; + t1 ^= t0; W[14][1] = t1; + t2 ^= t1; W[14][2] = t2; + t3 ^= t2; W[14][3] = t3; + + break; + } + default: + { + throw new InvalidOperationException("Should never get here"); + } + } + + if (!forEncryption) + { + for (int j = 1; j < ROUNDS; j++) + { + uint[] w = W[j]; + for (int i = 0; i < 4; i++) + { + w[i] = Inv_Mcol(w[i]); + } + } + } + + return W; + } + + private int ROUNDS; + private uint[][] WorkingKey; + private bool forEncryption; + + private const int BLOCK_SIZE = 16; + + /** + * default constructor - 128 bit block size. + */ + public AesLightEngine() + { + } + + /** + * initialise an AES cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to AES init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + WorkingKey = GenerateWorkingKey(keyParameter.GetKey(), forEncryption); + + this.forEncryption = forEncryption; + } + + public string AlgorithmName + { + get { return "AES"; } + } + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, inOff, 16, "input buffer too short"); + Check.OutputLength(output, outOff, 16, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (forEncryption) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } +#else + if (forEncryption) + { + EncryptBlock(input, inOff, output, outOff, WorkingKey); + } + else + { + DecryptBlock(input, inOff, output, outOff, WorkingKey); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, 16, "input buffer too short"); + Check.OutputLength(output, 16, "output buffer too short"); + + if (forEncryption) + { + EncryptBlock(input, output, WorkingKey); + } + else + { + DecryptBlock(input, output, WorkingKey); + } + + return BLOCK_SIZE; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void EncryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + while (r < ROUNDS - 1) + { + kw = KW[r++]; + r0 = Mcol((uint)S[t0 & 255] ^ (((uint)S[(t1 >> 8) & 255]) << 8) ^ (((uint)S[(t2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + r1 = Mcol((uint)S[t1 & 255] ^ (((uint)S[(t2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(t0 >> 24) & 255]) << 24)) ^ kw[1]; + r2 = Mcol((uint)S[t2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(t0 >> 16) & 255]) << 16) ^ (((uint)S[(t1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(t0 >> 8) & 255]) << 8) ^ (((uint)S[(t1 >> 16) & 255]) << 16) ^ (((uint)S[(t2 >> 24) & 255]) << 24)) ^ kw[3]; + kw = KW[r++]; + t0 = Mcol((uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)S[(r2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + t1 = Mcol((uint)S[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(r0 >> 24) & 255]) << 24)) ^ kw[1]; + t2 = Mcol((uint)S[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(r0 >> 8) & 255]) << 8) ^ (((uint)S[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24)) ^ kw[3]; + } + + kw = KW[r++]; + r0 = Mcol((uint)S[t0 & 255] ^ (((uint)S[(t1 >> 8) & 255]) << 8) ^ (((uint)S[(t2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + r1 = Mcol((uint)S[t1 & 255] ^ (((uint)S[(t2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(t0 >> 24) & 255]) << 24)) ^ kw[1]; + r2 = Mcol((uint)S[t2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(t0 >> 16) & 255]) << 16) ^ (((uint)S[(t1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(t0 >> 8) & 255]) << 8) ^ (((uint)S[(t1 >> 16) & 255]) << 16) ^ (((uint)S[(t2 >> 24) & 255]) << 24)) ^ kw[3]; + + // the final round is a simple function of S + + kw = KW[r]; + C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)S[(r2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)S[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(r0 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)S[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)S[r3 & 255] ^ (((uint)S[(r0 >> 8) & 255]) << 8) ^ (((uint)S[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } + + private void DecryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Inv_Mcol((uint)Si[t0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(t2 >> 16) & 255]) << 16) ^ ((uint)Si[(t1 >> 24) & 255] << 24)) ^ kw[0]; + r1 = Inv_Mcol((uint)Si[t1 & 255] ^ (((uint)Si[(t0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(t2 >> 24) & 255] << 24)) ^ kw[1]; + r2 = Inv_Mcol((uint)Si[t2 & 255] ^ (((uint)Si[(t1 >> 8) & 255]) << 8) ^ (((uint)Si[(t0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(t2 >> 8) & 255]) << 8) ^ (((uint)Si[(t1 >> 16) & 255]) << 16) ^ ((uint)Si[(t0 >> 24) & 255] << 24)) ^ kw[3]; + kw = KW[r--]; + t0 = Inv_Mcol((uint)Si[r0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(r2 >> 16) & 255]) << 16) ^ ((uint)Si[(r1 >> 24) & 255] << 24)) ^ kw[0]; + t1 = Inv_Mcol((uint)Si[r1 & 255] ^ (((uint)Si[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(r2 >> 24) & 255] << 24)) ^ kw[1]; + t2 = Inv_Mcol((uint)Si[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(r2 >> 8) & 255]) << 8) ^ (((uint)Si[(r1 >> 16) & 255]) << 16) ^ ((uint)Si[(r0 >> 24) & 255] << 24)) ^ kw[3]; + } + + kw = KW[1]; + r0 = Inv_Mcol((uint)Si[t0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(t2 >> 16) & 255]) << 16) ^ ((uint)Si[(t1 >> 24) & 255] << 24)) ^ kw[0]; + r1 = Inv_Mcol((uint)Si[t1 & 255] ^ (((uint)Si[(t0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(t2 >> 24) & 255] << 24)) ^ kw[1]; + r2 = Inv_Mcol((uint)Si[t2 & 255] ^ (((uint)Si[(t1 >> 8) & 255]) << 8) ^ (((uint)Si[(t0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(t2 >> 8) & 255]) << 8) ^ (((uint)Si[(t1 >> 16) & 255]) << 16) ^ ((uint)Si[(t0 >> 24) & 255] << 24)) ^ kw[3]; + + // the final round's table is a simple function of Si + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)Si[r1 & 255] ^ (((uint)Si[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)Si[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)Si[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)Si[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)Si[(r2 >> 8) & 255]) << 8) ^ (((uint)Si[(r1 >> 16) & 255]) << 16) ^ (((uint)Si[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } +#else + private void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + while (r < ROUNDS - 1) + { + kw = KW[r++]; + r0 = Mcol((uint)S[t0 & 255] ^ (((uint)S[(t1 >> 8) & 255]) << 8) ^ (((uint)S[(t2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + r1 = Mcol((uint)S[t1 & 255] ^ (((uint)S[(t2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(t0 >> 24) & 255]) << 24)) ^ kw[1]; + r2 = Mcol((uint)S[t2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(t0 >> 16) & 255]) << 16) ^ (((uint)S[(t1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(t0 >> 8) & 255]) << 8) ^ (((uint)S[(t1 >> 16) & 255]) << 16) ^ (((uint)S[(t2 >> 24) & 255]) << 24)) ^ kw[3]; + kw = KW[r++]; + t0 = Mcol((uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)S[(r2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + t1 = Mcol((uint)S[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(r0 >> 24) & 255]) << 24)) ^ kw[1]; + t2 = Mcol((uint)S[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(r0 >> 8) & 255]) << 8) ^ (((uint)S[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24)) ^ kw[3]; + } + + kw = KW[r++]; + r0 = Mcol((uint)S[t0 & 255] ^ (((uint)S[(t1 >> 8) & 255]) << 8) ^ (((uint)S[(t2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24)) ^ kw[0]; + r1 = Mcol((uint)S[t1 & 255] ^ (((uint)S[(t2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(t0 >> 24) & 255]) << 24)) ^ kw[1]; + r2 = Mcol((uint)S[t2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(t0 >> 16) & 255]) << 16) ^ (((uint)S[(t1 >> 24) & 255]) << 24)) ^ kw[2]; + r3 = Mcol((uint)S[r3 & 255] ^ (((uint)S[(t0 >> 8) & 255]) << 8) ^ (((uint)S[(t1 >> 16) & 255]) << 16) ^ (((uint)S[(t2 >> 24) & 255]) << 24)) ^ kw[3]; + + // the final round is a simple function of S + + kw = KW[r]; + C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)S[(r2 >> 16) & 255]) << 16) ^ (((uint)S[(r3 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)S[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)S[(r0 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)S[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)S[r3 & 255] ^ (((uint)S[(r0 >> 8) & 255]) << 8) ^ (((uint)S[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } + + private void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Inv_Mcol((uint)Si[t0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(t2 >> 16) & 255]) << 16) ^ ((uint)Si[(t1 >> 24) & 255] << 24)) ^ kw[0]; + r1 = Inv_Mcol((uint)Si[t1 & 255] ^ (((uint)Si[(t0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(t2 >> 24) & 255] << 24)) ^ kw[1]; + r2 = Inv_Mcol((uint)Si[t2 & 255] ^ (((uint)Si[(t1 >> 8) & 255]) << 8) ^ (((uint)Si[(t0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(t2 >> 8) & 255]) << 8) ^ (((uint)Si[(t1 >> 16) & 255]) << 16) ^ ((uint)Si[(t0 >> 24) & 255] << 24)) ^ kw[3]; + kw = KW[r--]; + t0 = Inv_Mcol((uint)Si[r0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(r2 >> 16) & 255]) << 16) ^ ((uint)Si[(r1 >> 24) & 255] << 24)) ^ kw[0]; + t1 = Inv_Mcol((uint)Si[r1 & 255] ^ (((uint)Si[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(r2 >> 24) & 255] << 24)) ^ kw[1]; + t2 = Inv_Mcol((uint)Si[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(r2 >> 8) & 255]) << 8) ^ (((uint)Si[(r1 >> 16) & 255]) << 16) ^ ((uint)Si[(r0 >> 24) & 255] << 24)) ^ kw[3]; + } + + kw = KW[1]; + r0 = Inv_Mcol((uint)Si[t0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(t2 >> 16) & 255]) << 16) ^ ((uint)Si[(t1 >> 24) & 255] << 24)) ^ kw[0]; + r1 = Inv_Mcol((uint)Si[t1 & 255] ^ (((uint)Si[(t0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ ((uint)Si[(t2 >> 24) & 255] << 24)) ^ kw[1]; + r2 = Inv_Mcol((uint)Si[t2 & 255] ^ (((uint)Si[(t1 >> 8) & 255]) << 8) ^ (((uint)Si[(t0 >> 16) & 255]) << 16) ^ ((uint)Si[(r3 >> 24) & 255] << 24)) ^ kw[2]; + r3 = Inv_Mcol((uint)Si[r3 & 255] ^ (((uint)Si[(t2 >> 8) & 255]) << 8) ^ (((uint)Si[(t1 >> 16) & 255]) << 16) ^ ((uint)Si[(t0 >> 24) & 255] << 24)) ^ kw[3]; + + // the final round's table is a simple function of Si + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)Si[(r3 >> 8) & 255]) << 8) ^ (((uint)Si[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)Si[r1 & 255] ^ (((uint)Si[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)Si[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)Si[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)Si[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)Si[(r2 >> 8) & 255]) << 8) ^ (((uint)Si[(r1 >> 16) & 255]) << 16) ^ (((uint)Si[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs.meta new file mode 100644 index 00000000..e24af20b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0646f3c6342a62b4e9d9e047072d0a33 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesLightEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs new file mode 100644 index 00000000..1898d86f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// An implementation of the AES Key Wrapper from the NIST Key Wrap Specification. + ///

+ /// For further details see: http://csrc.nist.gov/encryption/kms/key-wrap.pdf. + /// + public class AesWrapEngine + : Rfc3394WrapEngine + { + public AesWrapEngine() + : base(AesUtilities.CreateEngine()) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs.meta new file mode 100644 index 00000000..20277a03 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a090d0a62734c9046b5915956873d52e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AesWrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs new file mode 100644 index 00000000..cdaadeab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs @@ -0,0 +1,445 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * RFC 5794. + * + * ARIA is a 128-bit block cipher with 128-, 192-, and 256-bit keys. + */ + public class AriaEngine + : IBlockCipher + { + private static readonly byte[][] C = { Hex.DecodeStrict("517cc1b727220a94fe13abe8fa9a6ee0"), + Hex.DecodeStrict("6db14acc9e21c820ff28b1d5ef5de2b0"), Hex.DecodeStrict("db92371d2126e9700324977504e8c90e") }; + + private static readonly byte[] SB1_sbox = { (byte)0x63, (byte)0x7c, (byte)0x77, (byte)0x7b, (byte)0xf2, (byte)0x6b, + (byte)0x6f, (byte)0xc5, (byte)0x30, (byte)0x01, (byte)0x67, (byte)0x2b, (byte)0xfe, (byte)0xd7, (byte)0xab, + (byte)0x76, (byte)0xca, (byte)0x82, (byte)0xc9, (byte)0x7d, (byte)0xfa, (byte)0x59, (byte)0x47, (byte)0xf0, + (byte)0xad, (byte)0xd4, (byte)0xa2, (byte)0xaf, (byte)0x9c, (byte)0xa4, (byte)0x72, (byte)0xc0, (byte)0xb7, + (byte)0xfd, (byte)0x93, (byte)0x26, (byte)0x36, (byte)0x3f, (byte)0xf7, (byte)0xcc, (byte)0x34, (byte)0xa5, + (byte)0xe5, (byte)0xf1, (byte)0x71, (byte)0xd8, (byte)0x31, (byte)0x15, (byte)0x04, (byte)0xc7, (byte)0x23, + (byte)0xc3, (byte)0x18, (byte)0x96, (byte)0x05, (byte)0x9a, (byte)0x07, (byte)0x12, (byte)0x80, (byte)0xe2, + (byte)0xeb, (byte)0x27, (byte)0xb2, (byte)0x75, (byte)0x09, (byte)0x83, (byte)0x2c, (byte)0x1a, (byte)0x1b, + (byte)0x6e, (byte)0x5a, (byte)0xa0, (byte)0x52, (byte)0x3b, (byte)0xd6, (byte)0xb3, (byte)0x29, (byte)0xe3, + (byte)0x2f, (byte)0x84, (byte)0x53, (byte)0xd1, (byte)0x00, (byte)0xed, (byte)0x20, (byte)0xfc, (byte)0xb1, + (byte)0x5b, (byte)0x6a, (byte)0xcb, (byte)0xbe, (byte)0x39, (byte)0x4a, (byte)0x4c, (byte)0x58, (byte)0xcf, + (byte)0xd0, (byte)0xef, (byte)0xaa, (byte)0xfb, (byte)0x43, (byte)0x4d, (byte)0x33, (byte)0x85, (byte)0x45, + (byte)0xf9, (byte)0x02, (byte)0x7f, (byte)0x50, (byte)0x3c, (byte)0x9f, (byte)0xa8, (byte)0x51, (byte)0xa3, + (byte)0x40, (byte)0x8f, (byte)0x92, (byte)0x9d, (byte)0x38, (byte)0xf5, (byte)0xbc, (byte)0xb6, (byte)0xda, + (byte)0x21, (byte)0x10, (byte)0xff, (byte)0xf3, (byte)0xd2, (byte)0xcd, (byte)0x0c, (byte)0x13, (byte)0xec, + (byte)0x5f, (byte)0x97, (byte)0x44, (byte)0x17, (byte)0xc4, (byte)0xa7, (byte)0x7e, (byte)0x3d, (byte)0x64, + (byte)0x5d, (byte)0x19, (byte)0x73, (byte)0x60, (byte)0x81, (byte)0x4f, (byte)0xdc, (byte)0x22, (byte)0x2a, + (byte)0x90, (byte)0x88, (byte)0x46, (byte)0xee, (byte)0xb8, (byte)0x14, (byte)0xde, (byte)0x5e, (byte)0x0b, + (byte)0xdb, (byte)0xe0, (byte)0x32, (byte)0x3a, (byte)0x0a, (byte)0x49, (byte)0x06, (byte)0x24, (byte)0x5c, + (byte)0xc2, (byte)0xd3, (byte)0xac, (byte)0x62, (byte)0x91, (byte)0x95, (byte)0xe4, (byte)0x79, (byte)0xe7, + (byte)0xc8, (byte)0x37, (byte)0x6d, (byte)0x8d, (byte)0xd5, (byte)0x4e, (byte)0xa9, (byte)0x6c, (byte)0x56, + (byte)0xf4, (byte)0xea, (byte)0x65, (byte)0x7a, (byte)0xae, (byte)0x08, (byte)0xba, (byte)0x78, (byte)0x25, + (byte)0x2e, (byte)0x1c, (byte)0xa6, (byte)0xb4, (byte)0xc6, (byte)0xe8, (byte)0xdd, (byte)0x74, (byte)0x1f, + (byte)0x4b, (byte)0xbd, (byte)0x8b, (byte)0x8a, (byte)0x70, (byte)0x3e, (byte)0xb5, (byte)0x66, (byte)0x48, + (byte)0x03, (byte)0xf6, (byte)0x0e, (byte)0x61, (byte)0x35, (byte)0x57, (byte)0xb9, (byte)0x86, (byte)0xc1, + (byte)0x1d, (byte)0x9e, (byte)0xe1, (byte)0xf8, (byte)0x98, (byte)0x11, (byte)0x69, (byte)0xd9, (byte)0x8e, + (byte)0x94, (byte)0x9b, (byte)0x1e, (byte)0x87, (byte)0xe9, (byte)0xce, (byte)0x55, (byte)0x28, (byte)0xdf, + (byte)0x8c, (byte)0xa1, (byte)0x89, (byte)0x0d, (byte)0xbf, (byte)0xe6, (byte)0x42, (byte)0x68, (byte)0x41, + (byte)0x99, (byte)0x2d, (byte)0x0f, (byte)0xb0, (byte)0x54, (byte)0xbb, (byte)0x16 }; + + private static readonly byte[] SB2_sbox = { (byte)0xe2, (byte)0x4e, (byte)0x54, (byte)0xfc, (byte)0x94, (byte)0xc2, + (byte)0x4a, (byte)0xcc, (byte)0x62, (byte)0x0d, (byte)0x6a, (byte)0x46, (byte)0x3c, (byte)0x4d, (byte)0x8b, + (byte)0xd1, (byte)0x5e, (byte)0xfa, (byte)0x64, (byte)0xcb, (byte)0xb4, (byte)0x97, (byte)0xbe, (byte)0x2b, + (byte)0xbc, (byte)0x77, (byte)0x2e, (byte)0x03, (byte)0xd3, (byte)0x19, (byte)0x59, (byte)0xc1, (byte)0x1d, + (byte)0x06, (byte)0x41, (byte)0x6b, (byte)0x55, (byte)0xf0, (byte)0x99, (byte)0x69, (byte)0xea, (byte)0x9c, + (byte)0x18, (byte)0xae, (byte)0x63, (byte)0xdf, (byte)0xe7, (byte)0xbb, (byte)0x00, (byte)0x73, (byte)0x66, + (byte)0xfb, (byte)0x96, (byte)0x4c, (byte)0x85, (byte)0xe4, (byte)0x3a, (byte)0x09, (byte)0x45, (byte)0xaa, + (byte)0x0f, (byte)0xee, (byte)0x10, (byte)0xeb, (byte)0x2d, (byte)0x7f, (byte)0xf4, (byte)0x29, (byte)0xac, + (byte)0xcf, (byte)0xad, (byte)0x91, (byte)0x8d, (byte)0x78, (byte)0xc8, (byte)0x95, (byte)0xf9, (byte)0x2f, + (byte)0xce, (byte)0xcd, (byte)0x08, (byte)0x7a, (byte)0x88, (byte)0x38, (byte)0x5c, (byte)0x83, (byte)0x2a, + (byte)0x28, (byte)0x47, (byte)0xdb, (byte)0xb8, (byte)0xc7, (byte)0x93, (byte)0xa4, (byte)0x12, (byte)0x53, + (byte)0xff, (byte)0x87, (byte)0x0e, (byte)0x31, (byte)0x36, (byte)0x21, (byte)0x58, (byte)0x48, (byte)0x01, + (byte)0x8e, (byte)0x37, (byte)0x74, (byte)0x32, (byte)0xca, (byte)0xe9, (byte)0xb1, (byte)0xb7, (byte)0xab, + (byte)0x0c, (byte)0xd7, (byte)0xc4, (byte)0x56, (byte)0x42, (byte)0x26, (byte)0x07, (byte)0x98, (byte)0x60, + (byte)0xd9, (byte)0xb6, (byte)0xb9, (byte)0x11, (byte)0x40, (byte)0xec, (byte)0x20, (byte)0x8c, (byte)0xbd, + (byte)0xa0, (byte)0xc9, (byte)0x84, (byte)0x04, (byte)0x49, (byte)0x23, (byte)0xf1, (byte)0x4f, (byte)0x50, + (byte)0x1f, (byte)0x13, (byte)0xdc, (byte)0xd8, (byte)0xc0, (byte)0x9e, (byte)0x57, (byte)0xe3, (byte)0xc3, + (byte)0x7b, (byte)0x65, (byte)0x3b, (byte)0x02, (byte)0x8f, (byte)0x3e, (byte)0xe8, (byte)0x25, (byte)0x92, + (byte)0xe5, (byte)0x15, (byte)0xdd, (byte)0xfd, (byte)0x17, (byte)0xa9, (byte)0xbf, (byte)0xd4, (byte)0x9a, + (byte)0x7e, (byte)0xc5, (byte)0x39, (byte)0x67, (byte)0xfe, (byte)0x76, (byte)0x9d, (byte)0x43, (byte)0xa7, + (byte)0xe1, (byte)0xd0, (byte)0xf5, (byte)0x68, (byte)0xf2, (byte)0x1b, (byte)0x34, (byte)0x70, (byte)0x05, + (byte)0xa3, (byte)0x8a, (byte)0xd5, (byte)0x79, (byte)0x86, (byte)0xa8, (byte)0x30, (byte)0xc6, (byte)0x51, + (byte)0x4b, (byte)0x1e, (byte)0xa6, (byte)0x27, (byte)0xf6, (byte)0x35, (byte)0xd2, (byte)0x6e, (byte)0x24, + (byte)0x16, (byte)0x82, (byte)0x5f, (byte)0xda, (byte)0xe6, (byte)0x75, (byte)0xa2, (byte)0xef, (byte)0x2c, + (byte)0xb2, (byte)0x1c, (byte)0x9f, (byte)0x5d, (byte)0x6f, (byte)0x80, (byte)0x0a, (byte)0x72, (byte)0x44, + (byte)0x9b, (byte)0x6c, (byte)0x90, (byte)0x0b, (byte)0x5b, (byte)0x33, (byte)0x7d, (byte)0x5a, (byte)0x52, + (byte)0xf3, (byte)0x61, (byte)0xa1, (byte)0xf7, (byte)0xb0, (byte)0xd6, (byte)0x3f, (byte)0x7c, (byte)0x6d, + (byte)0xed, (byte)0x14, (byte)0xe0, (byte)0xa5, (byte)0x3d, (byte)0x22, (byte)0xb3, (byte)0xf8, (byte)0x89, + (byte)0xde, (byte)0x71, (byte)0x1a, (byte)0xaf, (byte)0xba, (byte)0xb5, (byte)0x81 }; + + private static readonly byte[] SB3_sbox = { (byte)0x52, (byte)0x09, (byte)0x6a, (byte)0xd5, (byte)0x30, (byte)0x36, + (byte)0xa5, (byte)0x38, (byte)0xbf, (byte)0x40, (byte)0xa3, (byte)0x9e, (byte)0x81, (byte)0xf3, (byte)0xd7, + (byte)0xfb, (byte)0x7c, (byte)0xe3, (byte)0x39, (byte)0x82, (byte)0x9b, (byte)0x2f, (byte)0xff, (byte)0x87, + (byte)0x34, (byte)0x8e, (byte)0x43, (byte)0x44, (byte)0xc4, (byte)0xde, (byte)0xe9, (byte)0xcb, (byte)0x54, + (byte)0x7b, (byte)0x94, (byte)0x32, (byte)0xa6, (byte)0xc2, (byte)0x23, (byte)0x3d, (byte)0xee, (byte)0x4c, + (byte)0x95, (byte)0x0b, (byte)0x42, (byte)0xfa, (byte)0xc3, (byte)0x4e, (byte)0x08, (byte)0x2e, (byte)0xa1, + (byte)0x66, (byte)0x28, (byte)0xd9, (byte)0x24, (byte)0xb2, (byte)0x76, (byte)0x5b, (byte)0xa2, (byte)0x49, + (byte)0x6d, (byte)0x8b, (byte)0xd1, (byte)0x25, (byte)0x72, (byte)0xf8, (byte)0xf6, (byte)0x64, (byte)0x86, + (byte)0x68, (byte)0x98, (byte)0x16, (byte)0xd4, (byte)0xa4, (byte)0x5c, (byte)0xcc, (byte)0x5d, (byte)0x65, + (byte)0xb6, (byte)0x92, (byte)0x6c, (byte)0x70, (byte)0x48, (byte)0x50, (byte)0xfd, (byte)0xed, (byte)0xb9, + (byte)0xda, (byte)0x5e, (byte)0x15, (byte)0x46, (byte)0x57, (byte)0xa7, (byte)0x8d, (byte)0x9d, (byte)0x84, + (byte)0x90, (byte)0xd8, (byte)0xab, (byte)0x00, (byte)0x8c, (byte)0xbc, (byte)0xd3, (byte)0x0a, (byte)0xf7, + (byte)0xe4, (byte)0x58, (byte)0x05, (byte)0xb8, (byte)0xb3, (byte)0x45, (byte)0x06, (byte)0xd0, (byte)0x2c, + (byte)0x1e, (byte)0x8f, (byte)0xca, (byte)0x3f, (byte)0x0f, (byte)0x02, (byte)0xc1, (byte)0xaf, (byte)0xbd, + (byte)0x03, (byte)0x01, (byte)0x13, (byte)0x8a, (byte)0x6b, (byte)0x3a, (byte)0x91, (byte)0x11, (byte)0x41, + (byte)0x4f, (byte)0x67, (byte)0xdc, (byte)0xea, (byte)0x97, (byte)0xf2, (byte)0xcf, (byte)0xce, (byte)0xf0, + (byte)0xb4, (byte)0xe6, (byte)0x73, (byte)0x96, (byte)0xac, (byte)0x74, (byte)0x22, (byte)0xe7, (byte)0xad, + (byte)0x35, (byte)0x85, (byte)0xe2, (byte)0xf9, (byte)0x37, (byte)0xe8, (byte)0x1c, (byte)0x75, (byte)0xdf, + (byte)0x6e, (byte)0x47, (byte)0xf1, (byte)0x1a, (byte)0x71, (byte)0x1d, (byte)0x29, (byte)0xc5, (byte)0x89, + (byte)0x6f, (byte)0xb7, (byte)0x62, (byte)0x0e, (byte)0xaa, (byte)0x18, (byte)0xbe, (byte)0x1b, (byte)0xfc, + (byte)0x56, (byte)0x3e, (byte)0x4b, (byte)0xc6, (byte)0xd2, (byte)0x79, (byte)0x20, (byte)0x9a, (byte)0xdb, + (byte)0xc0, (byte)0xfe, (byte)0x78, (byte)0xcd, (byte)0x5a, (byte)0xf4, (byte)0x1f, (byte)0xdd, (byte)0xa8, + (byte)0x33, (byte)0x88, (byte)0x07, (byte)0xc7, (byte)0x31, (byte)0xb1, (byte)0x12, (byte)0x10, (byte)0x59, + (byte)0x27, (byte)0x80, (byte)0xec, (byte)0x5f, (byte)0x60, (byte)0x51, (byte)0x7f, (byte)0xa9, (byte)0x19, + (byte)0xb5, (byte)0x4a, (byte)0x0d, (byte)0x2d, (byte)0xe5, (byte)0x7a, (byte)0x9f, (byte)0x93, (byte)0xc9, + (byte)0x9c, (byte)0xef, (byte)0xa0, (byte)0xe0, (byte)0x3b, (byte)0x4d, (byte)0xae, (byte)0x2a, (byte)0xf5, + (byte)0xb0, (byte)0xc8, (byte)0xeb, (byte)0xbb, (byte)0x3c, (byte)0x83, (byte)0x53, (byte)0x99, (byte)0x61, + (byte)0x17, (byte)0x2b, (byte)0x04, (byte)0x7e, (byte)0xba, (byte)0x77, (byte)0xd6, (byte)0x26, (byte)0xe1, + (byte)0x69, (byte)0x14, (byte)0x63, (byte)0x55, (byte)0x21, (byte)0x0c, (byte)0x7d }; + + private static readonly byte[] SB4_sbox = { (byte)0x30, (byte)0x68, (byte)0x99, (byte)0x1b, (byte)0x87, (byte)0xb9, + (byte)0x21, (byte)0x78, (byte)0x50, (byte)0x39, (byte)0xdb, (byte)0xe1, (byte)0x72, (byte)0x9, (byte)0x62, + (byte)0x3c, (byte)0x3e, (byte)0x7e, (byte)0x5e, (byte)0x8e, (byte)0xf1, (byte)0xa0, (byte)0xcc, (byte)0xa3, + (byte)0x2a, (byte)0x1d, (byte)0xfb, (byte)0xb6, (byte)0xd6, (byte)0x20, (byte)0xc4, (byte)0x8d, (byte)0x81, + (byte)0x65, (byte)0xf5, (byte)0x89, (byte)0xcb, (byte)0x9d, (byte)0x77, (byte)0xc6, (byte)0x57, (byte)0x43, + (byte)0x56, (byte)0x17, (byte)0xd4, (byte)0x40, (byte)0x1a, (byte)0x4d, (byte)0xc0, (byte)0x63, (byte)0x6c, + (byte)0xe3, (byte)0xb7, (byte)0xc8, (byte)0x64, (byte)0x6a, (byte)0x53, (byte)0xaa, (byte)0x38, (byte)0x98, + (byte)0x0c, (byte)0xf4, (byte)0x9b, (byte)0xed, (byte)0x7f, (byte)0x22, (byte)0x76, (byte)0xaf, (byte)0xdd, + (byte)0x3a, (byte)0x0b, (byte)0x58, (byte)0x67, (byte)0x88, (byte)0x06, (byte)0xc3, (byte)0x35, (byte)0x0d, + (byte)0x01, (byte)0x8b, (byte)0x8c, (byte)0xc2, (byte)0xe6, (byte)0x5f, (byte)0x02, (byte)0x24, (byte)0x75, + (byte)0x93, (byte)0x66, (byte)0x1e, (byte)0xe5, (byte)0xe2, (byte)0x54, (byte)0xd8, (byte)0x10, (byte)0xce, + (byte)0x7a, (byte)0xe8, (byte)0x08, (byte)0x2c, (byte)0x12, (byte)0x97, (byte)0x32, (byte)0xab, (byte)0xb4, + (byte)0x27, (byte)0x0a, (byte)0x23, (byte)0xdf, (byte)0xef, (byte)0xca, (byte)0xd9, (byte)0xb8, (byte)0xfa, + (byte)0xdc, (byte)0x31, (byte)0x6b, (byte)0xd1, (byte)0xad, (byte)0x19, (byte)0x49, (byte)0xbd, (byte)0x51, + (byte)0x96, (byte)0xee, (byte)0xe4, (byte)0xa8, (byte)0x41, (byte)0xda, (byte)0xff, (byte)0xcd, (byte)0x55, + (byte)0x86, (byte)0x36, (byte)0xbe, (byte)0x61, (byte)0x52, (byte)0xf8, (byte)0xbb, (byte)0x0e, (byte)0x82, + (byte)0x48, (byte)0x69, (byte)0x9a, (byte)0xe0, (byte)0x47, (byte)0x9e, (byte)0x5c, (byte)0x04, (byte)0x4b, + (byte)0x34, (byte)0x15, (byte)0x79, (byte)0x26, (byte)0xa7, (byte)0xde, (byte)0x29, (byte)0xae, (byte)0x92, + (byte)0xd7, (byte)0x84, (byte)0xe9, (byte)0xd2, (byte)0xba, (byte)0x5d, (byte)0xf3, (byte)0xc5, (byte)0xb0, + (byte)0xbf, (byte)0xa4, (byte)0x3b, (byte)0x71, (byte)0x44, (byte)0x46, (byte)0x2b, (byte)0xfc, (byte)0xeb, + (byte)0x6f, (byte)0xd5, (byte)0xf6, (byte)0x14, (byte)0xfe, (byte)0x7c, (byte)0x70, (byte)0x5a, (byte)0x7d, + (byte)0xfd, (byte)0x2f, (byte)0x18, (byte)0x83, (byte)0x16, (byte)0xa5, (byte)0x91, (byte)0x1f, (byte)0x05, + (byte)0x95, (byte)0x74, (byte)0xa9, (byte)0xc1, (byte)0x5b, (byte)0x4a, (byte)0x85, (byte)0x6d, (byte)0x13, + (byte)0x07, (byte)0x4f, (byte)0x4e, (byte)0x45, (byte)0xb2, (byte)0x0f, (byte)0xc9, (byte)0x1c, (byte)0xa6, + (byte)0xbc, (byte)0xec, (byte)0x73, (byte)0x90, (byte)0x7b, (byte)0xcf, (byte)0x59, (byte)0x8f, (byte)0xa1, + (byte)0xf9, (byte)0x2d, (byte)0xf2, (byte)0xb1, (byte)0x00, (byte)0x94, (byte)0x37, (byte)0x9f, (byte)0xd0, + (byte)0x2e, (byte)0x9c, (byte)0x6e, (byte)0x28, (byte)0x3f, (byte)0x80, (byte)0xf0, (byte)0x3d, (byte)0xd3, + (byte)0x25, (byte)0x8a, (byte)0xb5, (byte)0xe7, (byte)0x42, (byte)0xb3, (byte)0xc7, (byte)0xea, (byte)0xf7, + (byte)0x4c, (byte)0x11, (byte)0x33, (byte)0x03, (byte)0xa2, (byte)0xac, (byte)0x60 }; + + protected const int BlockSize = 16; + + private byte[][] m_roundKeys; + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + KeyParameter keyParameter = parameters as KeyParameter; + + if (keyParameter == null) + throw new ArgumentException("invalid parameter passed to ARIA init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.m_roundKeys = KeySchedule(forEncryption, keyParameter.GetKey()); + } + + public virtual string AlgorithmName + { + get { return "ARIA"; } + } + + public virtual int GetBlockSize() + { + return BlockSize; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (m_roundKeys == null) + throw new InvalidOperationException("ARIA engine not initialised"); + + Check.DataLength(input, inOff, BlockSize, "input buffer too short"); + Check.OutputLength(output, outOff, BlockSize, "output buffer too short"); + + byte[] z = new byte[BlockSize]; + Array.Copy(input, inOff, z, 0, BlockSize); + + int i = 0, rounds = m_roundKeys.Length - 3; + while (i < rounds) + { + FO(z, m_roundKeys[i++]); + FE(z, m_roundKeys[i++]); + } + + FO(z, m_roundKeys[i++]); + Xor(z, m_roundKeys[i++]); + SL2(z); + Xor(z, m_roundKeys[i]); + + Array.Copy(z, 0, output, outOff, BlockSize); + + return BlockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (m_roundKeys == null) + throw new InvalidOperationException("ARIA engine not initialised"); + + Check.DataLength(input, BlockSize, "input buffer too short"); + Check.OutputLength(output, BlockSize, "output buffer too short"); + + byte[] z = new byte[BlockSize]; + input[..BlockSize].CopyTo(z); + + int i = 0, rounds = m_roundKeys.Length - 3; + while (i < rounds) + { + FO(z, m_roundKeys[i++]); + FE(z, m_roundKeys[i++]); + } + + FO(z, m_roundKeys[i++]); + Xor(z, m_roundKeys[i++]); + SL2(z); + Xor(z, m_roundKeys[i]); + + z.CopyTo(output); + + return BlockSize; + } +#endif + + protected static void A(byte[] z) + { + byte x0 = z[0], x1 = z[1], x2 = z[2], x3 = z[3], x4 = z[4], x5 = z[5], x6 = z[6], x7 = z[7], x8 = z[8], + x9 = z[9], x10 = z[10], x11 = z[11], x12 = z[12], x13 = z[13], x14 = z[14], x15 = z[15]; + + z[0] = (byte)(x3 ^ x4 ^ x6 ^ x8 ^ x9 ^ x13 ^ x14); + z[1] = (byte)(x2 ^ x5 ^ x7 ^ x8 ^ x9 ^ x12 ^ x15); + z[2] = (byte)(x1 ^ x4 ^ x6 ^ x10 ^ x11 ^ x12 ^ x15); + z[3] = (byte)(x0 ^ x5 ^ x7 ^ x10 ^ x11 ^ x13 ^ x14); + z[4] = (byte)(x0 ^ x2 ^ x5 ^ x8 ^ x11 ^ x14 ^ x15); + z[5] = (byte)(x1 ^ x3 ^ x4 ^ x9 ^ x10 ^ x14 ^ x15); + z[6] = (byte)(x0 ^ x2 ^ x7 ^ x9 ^ x10 ^ x12 ^ x13); + z[7] = (byte)(x1 ^ x3 ^ x6 ^ x8 ^ x11 ^ x12 ^ x13); + z[8] = (byte)(x0 ^ x1 ^ x4 ^ x7 ^ x10 ^ x13 ^ x15); + z[9] = (byte)(x0 ^ x1 ^ x5 ^ x6 ^ x11 ^ x12 ^ x14); + z[10] = (byte)(x2 ^ x3 ^ x5 ^ x6 ^ x8 ^ x13 ^ x15); + z[11] = (byte)(x2 ^ x3 ^ x4 ^ x7 ^ x9 ^ x12 ^ x14); + z[12] = (byte)(x1 ^ x2 ^ x6 ^ x7 ^ x9 ^ x11 ^ x12); + z[13] = (byte)(x0 ^ x3 ^ x6 ^ x7 ^ x8 ^ x10 ^ x13); + z[14] = (byte)(x0 ^ x3 ^ x4 ^ x5 ^ x9 ^ x11 ^ x14); + z[15] = (byte)(x1 ^ x2 ^ x4 ^ x5 ^ x8 ^ x10 ^ x15); + } + + protected static void FE(byte[] D, byte[] RK) + { + Xor(D, RK); + SL2(D); + A(D); + } + + protected static void FO(byte[] D, byte[] RK) + { + Xor(D, RK); + SL1(D); + A(D); + } + + protected static byte[][] KeySchedule(bool forEncryption, byte[] K) + { + int keyLen = K.Length; + if (keyLen < 16 || keyLen > 32 || (keyLen & 7) != 0) + throw new ArgumentException("Key length not 128/192/256 bits."); + + int keyLenIdx = (keyLen >> 3) - 2; + + byte[] CK1 = C[keyLenIdx]; + byte[] CK2 = C[(keyLenIdx + 1) % 3]; + byte[] CK3 = C[(keyLenIdx + 2) % 3]; + + byte[] KL = new byte[16], KR = new byte[16]; + Array.Copy(K, 0, KL, 0, 16); + Array.Copy(K, 16, KR, 0, keyLen - 16); + + byte[] W0 = new byte[16]; + byte[] W1 = new byte[16]; + byte[] W2 = new byte[16]; + byte[] W3 = new byte[16]; + + Array.Copy(KL, 0, W0, 0, 16); + + Array.Copy(W0, 0, W1, 0, 16); + FO(W1, CK1); + Xor(W1, KR); + + Array.Copy(W1, 0, W2, 0, 16); + FE(W2, CK2); + Xor(W2, W0); + + Array.Copy(W2, 0, W3, 0, 16); + FO(W3, CK3); + Xor(W3, W1); + + int numRounds = 12 + (keyLenIdx * 2); + byte[][] rks = new byte[numRounds + 1][]; + + rks[0] = KeyScheduleRound(W0, W1, 19); + rks[1] = KeyScheduleRound(W1, W2, 19); + rks[2] = KeyScheduleRound(W2, W3, 19); + rks[3] = KeyScheduleRound(W3, W0, 19); + + rks[4] = KeyScheduleRound(W0, W1, 31); + rks[5] = KeyScheduleRound(W1, W2, 31); + rks[6] = KeyScheduleRound(W2, W3, 31); + rks[7] = KeyScheduleRound(W3, W0, 31); + + rks[8] = KeyScheduleRound(W0, W1, 67); + rks[9] = KeyScheduleRound(W1, W2, 67); + rks[10] = KeyScheduleRound(W2, W3, 67); + rks[11] = KeyScheduleRound(W3, W0, 67); + + rks[12] = KeyScheduleRound(W0, W1, 97); + if (numRounds > 12) + { + rks[13] = KeyScheduleRound(W1, W2, 97); + rks[14] = KeyScheduleRound(W2, W3, 97); + if (numRounds > 14) + { + rks[15] = KeyScheduleRound(W3, W0, 97); + + rks[16] = KeyScheduleRound(W0, W1, 109); + } + } + + if (!forEncryption) + { + ReverseKeys(rks); + + for (int i = 1; i < numRounds; ++i) + { + A(rks[i]); + } + } + + return rks; + } + + protected static byte[] KeyScheduleRound(byte[] w, byte[] wr, int n) + { + byte[] rk = new byte[16]; + + int off = n >> 3, right = n & 7, left = 8 - right; + + int hi = wr[15 - off] & 0xFF; + + for (int to = 0; to < 16; ++to) + { + int lo = wr[(to - off) & 0xF] & 0xFF; + + int b = (hi << left) | (lo >> right); + b ^= (w[to] & 0xFF); + + rk[to] = (byte)b; + + hi = lo; + } + + return rk; + } + + protected static void ReverseKeys(byte[][] keys) + { + int length = keys.Length, limit = length / 2, last = length - 1; + for (int i = 0; i < limit; ++i) + { + byte[] t = keys[i]; + keys[i] = keys[last - i]; + keys[last - i] = t; + } + } + + protected static byte SB1(byte x) + { + return SB1_sbox[x & 0xFF]; + } + + protected static byte SB2(byte x) + { + return SB2_sbox[x & 0xFF]; + } + + protected static byte SB3(byte x) + { + return SB3_sbox[x & 0xFF]; + } + + protected static byte SB4(byte x) + { + return SB4_sbox[x & 0xFF]; + } + + protected static void SL1(byte[] z) + { + z[0] = SB1(z[0]); + z[1] = SB2(z[1]); + z[2] = SB3(z[2]); + z[3] = SB4(z[3]); + z[4] = SB1(z[4]); + z[5] = SB2(z[5]); + z[6] = SB3(z[6]); + z[7] = SB4(z[7]); + z[8] = SB1(z[8]); + z[9] = SB2(z[9]); + z[10] = SB3(z[10]); + z[11] = SB4(z[11]); + z[12] = SB1(z[12]); + z[13] = SB2(z[13]); + z[14] = SB3(z[14]); + z[15] = SB4(z[15]); + } + + protected static void SL2(byte[] z) + { + z[0] = SB3(z[0]); + z[1] = SB4(z[1]); + z[2] = SB1(z[2]); + z[3] = SB2(z[3]); + z[4] = SB3(z[4]); + z[5] = SB4(z[5]); + z[6] = SB1(z[6]); + z[7] = SB2(z[7]); + z[8] = SB3(z[8]); + z[9] = SB4(z[9]); + z[10] = SB1(z[10]); + z[11] = SB2(z[11]); + z[12] = SB3(z[12]); + z[13] = SB4(z[13]); + z[14] = SB1(z[14]); + z[15] = SB2(z[15]); + } + + protected static void Xor(byte[] z, byte[] x) + { + for (int i = 0; i < 16; ++i) + { + z[i] ^= x[i]; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs.meta new file mode 100644 index 00000000..8de5bdaa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc3e3f4d64c125641b940c8844cf06f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/AriaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs new file mode 100644 index 00000000..ab4258e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs @@ -0,0 +1,604 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A class that provides Blowfish key encryption operations, + * such as encoding data and generating keys. + * All the algorithms herein are from Applied Cryptography + * and implement a simplified cryptography interface. + */ + public sealed class BlowfishEngine + : IBlockCipher + { + private readonly static uint[] KP = + { + 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, + 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89, + 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C, + 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, + 0x9216D5D9, 0x8979FB1B + }, + KS0 = + { + 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7, + 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99, + 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16, + 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E, + 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE, + 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013, + 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF, + 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E, + 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60, + 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440, + 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE, + 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A, + 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E, + 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677, + 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193, + 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032, + 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88, + 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239, + 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E, + 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0, + 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3, + 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98, + 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88, + 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE, + 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6, + 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D, + 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B, + 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7, + 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA, + 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463, + 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F, + 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09, + 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3, + 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB, + 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279, + 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8, + 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB, + 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82, + 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB, + 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573, + 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0, + 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B, + 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790, + 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8, + 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4, + 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0, + 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7, + 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C, + 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD, + 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1, + 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299, + 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9, + 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477, + 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF, + 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49, + 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF, + 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA, + 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5, + 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41, + 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915, + 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400, + 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915, + 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664, + 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A + }, + KS1 = + { + 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623, + 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266, + 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1, + 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E, + 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6, + 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1, + 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E, + 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1, + 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737, + 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8, + 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF, + 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD, + 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701, + 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7, + 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41, + 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331, + 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF, + 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF, + 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E, + 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87, + 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C, + 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2, + 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16, + 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD, + 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B, + 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509, + 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E, + 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3, + 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F, + 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A, + 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4, + 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960, + 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66, + 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28, + 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802, + 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84, + 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510, + 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF, + 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14, + 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E, + 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50, + 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7, + 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8, + 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281, + 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99, + 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696, + 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128, + 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73, + 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0, + 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0, + 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105, + 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250, + 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3, + 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285, + 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00, + 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061, + 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB, + 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E, + 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735, + 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC, + 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9, + 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340, + 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20, + 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7 + }, + KS2 = + { + 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934, + 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068, + 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF, + 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840, + 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45, + 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504, + 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A, + 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB, + 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE, + 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6, + 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42, + 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B, + 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2, + 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB, + 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527, + 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B, + 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33, + 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C, + 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3, + 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC, + 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17, + 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564, + 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B, + 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115, + 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922, + 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728, + 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0, + 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E, + 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37, + 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D, + 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804, + 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B, + 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3, + 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB, + 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D, + 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C, + 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350, + 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9, + 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A, + 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE, + 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D, + 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC, + 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F, + 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61, + 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2, + 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9, + 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2, + 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C, + 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E, + 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633, + 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10, + 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169, + 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52, + 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027, + 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5, + 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62, + 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634, + 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76, + 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24, + 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC, + 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4, + 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C, + 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837, + 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0 + }, + KS3 = + { + 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B, + 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE, + 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B, + 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4, + 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8, + 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6, + 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304, + 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22, + 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4, + 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6, + 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9, + 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59, + 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593, + 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51, + 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28, + 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C, + 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B, + 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28, + 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C, + 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD, + 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A, + 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319, + 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB, + 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F, + 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991, + 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32, + 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680, + 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166, + 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE, + 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB, + 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5, + 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47, + 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370, + 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D, + 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84, + 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048, + 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8, + 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD, + 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9, + 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7, + 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38, + 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F, + 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C, + 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525, + 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1, + 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442, + 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964, + 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E, + 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8, + 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D, + 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F, + 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299, + 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02, + 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC, + 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614, + 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A, + 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6, + 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B, + 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0, + 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060, + 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E, + 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9, + 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F, + 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6 + }; + + //==================================== + // Useful constants + //==================================== + + private static readonly int ROUNDS = 16; + private const int BLOCK_SIZE = 8; // bytes = 64 bits + private static readonly int SBOX_SK = 256; + private static readonly int P_SZ = ROUNDS+2; + + private readonly uint[] S0, S1, S2, S3; // the s-boxes + private readonly uint[] P; // the p-array + + private bool encrypting; + + private byte[] workingKey; + + public BlowfishEngine() + { + S0 = new uint[SBOX_SK]; + S1 = new uint[SBOX_SK]; + S2 = new uint[SBOX_SK]; + S3 = new uint[SBOX_SK]; + P = new uint[P_SZ]; + } + + /** + * initialise a Blowfish cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("invalid parameter passed to Blowfish init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.encrypting = forEncryption; + this.workingKey = ((KeyParameter)parameters).GetKey(); + SetKey(this.workingKey); + } + + public string AlgorithmName + { + get { return "Blowfish"; } + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("Blowfish not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (encrypting) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (encrypting) + { + EncryptBlock(input, inOff, output, outOff); + } + else + { + DecryptBlock(input, inOff, output, outOff); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("Blowfish not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (encrypting) + { + EncryptBlock(input, output); + } + else + { + DecryptBlock(input, output); + } + + return BLOCK_SIZE; + } +#endif + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + //================================== + // Private Implementation + //================================== + + private uint F(uint x) + { + return (((S0[x >> 24] + S1[(x >> 16) & 0xff]) ^ S2[(x >> 8) & 0xff]) + S3[x & 0xff]); + } + + /** + * apply the encryption cycle to each value pair in the table. + */ + private void ProcessTable( + uint xl, + uint xr, + uint[] table) + { + int size = table.Length; + + for (int s = 0; s < size; s += 2) + { + xl ^= P[0]; + + for (int i = 1; i < ROUNDS; i += 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i + 1]; + } + + xr ^= P[ROUNDS + 1]; + + table[s] = xr; + table[s + 1] = xl; + + xr = xl; // end of cycle swap + xl = table[s]; + } + } + + private void SetKey(byte[] key) + { + if (key.Length < 4 || key.Length > 56) + { + throw new ArgumentException("key length must be in range 32 to 448 bits"); + } + + /* + * - comments are from _Applied Crypto_, Schneier, p338 + * please be careful comparing the two, AC numbers the + * arrays from 1, the enclosed code from 0. + * + * (1) + * Initialise the S-boxes and the P-array, with a fixed string + * This string contains the hexadecimal digits of pi (3.141...) + */ + Array.Copy(KS0, 0, S0, 0, SBOX_SK); + Array.Copy(KS1, 0, S1, 0, SBOX_SK); + Array.Copy(KS2, 0, S2, 0, SBOX_SK); + Array.Copy(KS3, 0, S3, 0, SBOX_SK); + + Array.Copy(KP, 0, P, 0, P_SZ); + + /* + * (2) + * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the + * second 32-bits of the key, and so on for all bits of the key + * (up to P[17]). Repeatedly cycle through the key bits until the + * entire P-array has been XOR-ed with the key bits + */ + int keyLength = key.Length; + int keyIndex = 0; + + for (int i=0; i < P_SZ; i++) + { + // Get the 32 bits of the key, in 4 * 8 bit chunks + uint data = 0x0000000; + for (int j=0; j < 4; j++) + { + // create a 32 bit block + data = (data << 8) | (uint)key[keyIndex++]; + + // wrap when we get to the end of the key + if (keyIndex >= keyLength) + { + keyIndex = 0; + } + } + // XOR the newly created 32 bit chunk onto the P-array + P[i] ^= data; + } + + /* + * (3) + * Encrypt the all-zero string with the Blowfish algorithm, using + * the subkeys described in (1) and (2) + * + * (4) + * Replace P1 and P2 with the output of step (3) + * + * (5) + * Encrypt the output of step(3) using the Blowfish algorithm, + * with the modified subkeys. + * + * (6) + * Replace P3 and P4 with the output of step (5) + * + * (7) + * Continue the process, replacing all elements of the P-array + * and then all four S-boxes in order, with the output of the + * continuously changing Blowfish algorithm + */ + + ProcessTable(0, 0, P); + ProcessTable(P[P_SZ - 2], P[P_SZ - 1], S0); + ProcessTable(S0[SBOX_SK - 2], S0[SBOX_SK - 1], S1); + ProcessTable(S1[SBOX_SK - 2], S1[SBOX_SK - 1], S2); + ProcessTable(S2[SBOX_SK - 2], S2[SBOX_SK - 1], S3); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void EncryptBlock(ReadOnlySpan input, Span output) + { + uint xl = Pack.BE_To_UInt32(input); + uint xr = Pack.BE_To_UInt32(input[4..]); + + xl ^= P[0]; + + for (int i = 1; i < ROUNDS; i += 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i + 1]; + } + + xr ^= P[ROUNDS + 1]; + + Pack.UInt32_To_BE(xr, output); + Pack.UInt32_To_BE(xl, output[4..]); + } + + private void DecryptBlock(ReadOnlySpan input, Span output) + { + uint xl = Pack.BE_To_UInt32(input); + uint xr = Pack.BE_To_UInt32(input[4..]); + + xl ^= P[ROUNDS + 1]; + + for (int i = ROUNDS; i > 0; i -= 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i - 1]; + } + + xr ^= P[0]; + + Pack.UInt32_To_BE(xr, output); + Pack.UInt32_To_BE(xl, output[4..]); + } +#else + private void EncryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + uint xl = Pack.BE_To_UInt32(src, srcIndex); + uint xr = Pack.BE_To_UInt32(src, srcIndex+4); + + xl ^= P[0]; + + for (int i = 1; i < ROUNDS; i += 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i + 1]; + } + + xr ^= P[ROUNDS + 1]; + + Pack.UInt32_To_BE(xr, dst, dstIndex); + Pack.UInt32_To_BE(xl, dst, dstIndex + 4); + } + + private void DecryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + uint xl = Pack.BE_To_UInt32(src, srcIndex); + uint xr = Pack.BE_To_UInt32(src, srcIndex + 4); + + xl ^= P[ROUNDS + 1]; + + for (int i = ROUNDS; i > 0 ; i -= 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i - 1]; + } + + xr ^= P[0]; + + Pack.UInt32_To_BE(xr, dst, dstIndex); + Pack.UInt32_To_BE(xl, dst, dstIndex + 4); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs.meta new file mode 100644 index 00000000..03503900 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f08145dcbc1db324da79674306bd2b7f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/BlowfishEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs new file mode 100644 index 00000000..68e7137f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs @@ -0,0 +1,714 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Camellia - based on RFC 3713. + */ + public class CamelliaEngine + : IBlockCipher + { + private bool initialised = false; + private bool _keyIs128; + + private const int BLOCK_SIZE = 16; + + private uint[] subkey = new uint[24 * 4]; + private uint[] kw = new uint[4 * 2]; // for whitening + private uint[] ke = new uint[6 * 2]; // for FL and FL^(-1) + + private static readonly uint[] SIGMA = new uint[]{ + 0xa09e667f, 0x3bcc908b, + 0xb67ae858, 0x4caa73b2, + 0xc6ef372f, 0xe94f82be, + 0x54ff53a5, 0xf1d36f1c, + 0x10e527fa, 0xde682d1d, + 0xb05688c2, 0xb3e6c1fd + }; + + /* + * + * S-box data + * + */ + private static readonly uint[] SBOX1_1110 = new uint[]{ + 0x70707000, 0x82828200, 0x2c2c2c00, 0xececec00, 0xb3b3b300, 0x27272700, + 0xc0c0c000, 0xe5e5e500, 0xe4e4e400, 0x85858500, 0x57575700, 0x35353500, + 0xeaeaea00, 0x0c0c0c00, 0xaeaeae00, 0x41414100, 0x23232300, 0xefefef00, + 0x6b6b6b00, 0x93939300, 0x45454500, 0x19191900, 0xa5a5a500, 0x21212100, + 0xededed00, 0x0e0e0e00, 0x4f4f4f00, 0x4e4e4e00, 0x1d1d1d00, 0x65656500, + 0x92929200, 0xbdbdbd00, 0x86868600, 0xb8b8b800, 0xafafaf00, 0x8f8f8f00, + 0x7c7c7c00, 0xebebeb00, 0x1f1f1f00, 0xcecece00, 0x3e3e3e00, 0x30303000, + 0xdcdcdc00, 0x5f5f5f00, 0x5e5e5e00, 0xc5c5c500, 0x0b0b0b00, 0x1a1a1a00, + 0xa6a6a600, 0xe1e1e100, 0x39393900, 0xcacaca00, 0xd5d5d500, 0x47474700, + 0x5d5d5d00, 0x3d3d3d00, 0xd9d9d900, 0x01010100, 0x5a5a5a00, 0xd6d6d600, + 0x51515100, 0x56565600, 0x6c6c6c00, 0x4d4d4d00, 0x8b8b8b00, 0x0d0d0d00, + 0x9a9a9a00, 0x66666600, 0xfbfbfb00, 0xcccccc00, 0xb0b0b000, 0x2d2d2d00, + 0x74747400, 0x12121200, 0x2b2b2b00, 0x20202000, 0xf0f0f000, 0xb1b1b100, + 0x84848400, 0x99999900, 0xdfdfdf00, 0x4c4c4c00, 0xcbcbcb00, 0xc2c2c200, + 0x34343400, 0x7e7e7e00, 0x76767600, 0x05050500, 0x6d6d6d00, 0xb7b7b700, + 0xa9a9a900, 0x31313100, 0xd1d1d100, 0x17171700, 0x04040400, 0xd7d7d700, + 0x14141400, 0x58585800, 0x3a3a3a00, 0x61616100, 0xdedede00, 0x1b1b1b00, + 0x11111100, 0x1c1c1c00, 0x32323200, 0x0f0f0f00, 0x9c9c9c00, 0x16161600, + 0x53535300, 0x18181800, 0xf2f2f200, 0x22222200, 0xfefefe00, 0x44444400, + 0xcfcfcf00, 0xb2b2b200, 0xc3c3c300, 0xb5b5b500, 0x7a7a7a00, 0x91919100, + 0x24242400, 0x08080800, 0xe8e8e800, 0xa8a8a800, 0x60606000, 0xfcfcfc00, + 0x69696900, 0x50505000, 0xaaaaaa00, 0xd0d0d000, 0xa0a0a000, 0x7d7d7d00, + 0xa1a1a100, 0x89898900, 0x62626200, 0x97979700, 0x54545400, 0x5b5b5b00, + 0x1e1e1e00, 0x95959500, 0xe0e0e000, 0xffffff00, 0x64646400, 0xd2d2d200, + 0x10101000, 0xc4c4c400, 0x00000000, 0x48484800, 0xa3a3a300, 0xf7f7f700, + 0x75757500, 0xdbdbdb00, 0x8a8a8a00, 0x03030300, 0xe6e6e600, 0xdadada00, + 0x09090900, 0x3f3f3f00, 0xdddddd00, 0x94949400, 0x87878700, 0x5c5c5c00, + 0x83838300, 0x02020200, 0xcdcdcd00, 0x4a4a4a00, 0x90909000, 0x33333300, + 0x73737300, 0x67676700, 0xf6f6f600, 0xf3f3f300, 0x9d9d9d00, 0x7f7f7f00, + 0xbfbfbf00, 0xe2e2e200, 0x52525200, 0x9b9b9b00, 0xd8d8d800, 0x26262600, + 0xc8c8c800, 0x37373700, 0xc6c6c600, 0x3b3b3b00, 0x81818100, 0x96969600, + 0x6f6f6f00, 0x4b4b4b00, 0x13131300, 0xbebebe00, 0x63636300, 0x2e2e2e00, + 0xe9e9e900, 0x79797900, 0xa7a7a700, 0x8c8c8c00, 0x9f9f9f00, 0x6e6e6e00, + 0xbcbcbc00, 0x8e8e8e00, 0x29292900, 0xf5f5f500, 0xf9f9f900, 0xb6b6b600, + 0x2f2f2f00, 0xfdfdfd00, 0xb4b4b400, 0x59595900, 0x78787800, 0x98989800, + 0x06060600, 0x6a6a6a00, 0xe7e7e700, 0x46464600, 0x71717100, 0xbababa00, + 0xd4d4d400, 0x25252500, 0xababab00, 0x42424200, 0x88888800, 0xa2a2a200, + 0x8d8d8d00, 0xfafafa00, 0x72727200, 0x07070700, 0xb9b9b900, 0x55555500, + 0xf8f8f800, 0xeeeeee00, 0xacacac00, 0x0a0a0a00, 0x36363600, 0x49494900, + 0x2a2a2a00, 0x68686800, 0x3c3c3c00, 0x38383800, 0xf1f1f100, 0xa4a4a400, + 0x40404000, 0x28282800, 0xd3d3d300, 0x7b7b7b00, 0xbbbbbb00, 0xc9c9c900, + 0x43434300, 0xc1c1c100, 0x15151500, 0xe3e3e300, 0xadadad00, 0xf4f4f400, + 0x77777700, 0xc7c7c700, 0x80808000, 0x9e9e9e00 + }; + + private static readonly uint[] SBOX4_4404 = new uint[]{ + 0x70700070, 0x2c2c002c, 0xb3b300b3, 0xc0c000c0, 0xe4e400e4, 0x57570057, + 0xeaea00ea, 0xaeae00ae, 0x23230023, 0x6b6b006b, 0x45450045, 0xa5a500a5, + 0xeded00ed, 0x4f4f004f, 0x1d1d001d, 0x92920092, 0x86860086, 0xafaf00af, + 0x7c7c007c, 0x1f1f001f, 0x3e3e003e, 0xdcdc00dc, 0x5e5e005e, 0x0b0b000b, + 0xa6a600a6, 0x39390039, 0xd5d500d5, 0x5d5d005d, 0xd9d900d9, 0x5a5a005a, + 0x51510051, 0x6c6c006c, 0x8b8b008b, 0x9a9a009a, 0xfbfb00fb, 0xb0b000b0, + 0x74740074, 0x2b2b002b, 0xf0f000f0, 0x84840084, 0xdfdf00df, 0xcbcb00cb, + 0x34340034, 0x76760076, 0x6d6d006d, 0xa9a900a9, 0xd1d100d1, 0x04040004, + 0x14140014, 0x3a3a003a, 0xdede00de, 0x11110011, 0x32320032, 0x9c9c009c, + 0x53530053, 0xf2f200f2, 0xfefe00fe, 0xcfcf00cf, 0xc3c300c3, 0x7a7a007a, + 0x24240024, 0xe8e800e8, 0x60600060, 0x69690069, 0xaaaa00aa, 0xa0a000a0, + 0xa1a100a1, 0x62620062, 0x54540054, 0x1e1e001e, 0xe0e000e0, 0x64640064, + 0x10100010, 0x00000000, 0xa3a300a3, 0x75750075, 0x8a8a008a, 0xe6e600e6, + 0x09090009, 0xdddd00dd, 0x87870087, 0x83830083, 0xcdcd00cd, 0x90900090, + 0x73730073, 0xf6f600f6, 0x9d9d009d, 0xbfbf00bf, 0x52520052, 0xd8d800d8, + 0xc8c800c8, 0xc6c600c6, 0x81810081, 0x6f6f006f, 0x13130013, 0x63630063, + 0xe9e900e9, 0xa7a700a7, 0x9f9f009f, 0xbcbc00bc, 0x29290029, 0xf9f900f9, + 0x2f2f002f, 0xb4b400b4, 0x78780078, 0x06060006, 0xe7e700e7, 0x71710071, + 0xd4d400d4, 0xabab00ab, 0x88880088, 0x8d8d008d, 0x72720072, 0xb9b900b9, + 0xf8f800f8, 0xacac00ac, 0x36360036, 0x2a2a002a, 0x3c3c003c, 0xf1f100f1, + 0x40400040, 0xd3d300d3, 0xbbbb00bb, 0x43430043, 0x15150015, 0xadad00ad, + 0x77770077, 0x80800080, 0x82820082, 0xecec00ec, 0x27270027, 0xe5e500e5, + 0x85850085, 0x35350035, 0x0c0c000c, 0x41410041, 0xefef00ef, 0x93930093, + 0x19190019, 0x21210021, 0x0e0e000e, 0x4e4e004e, 0x65650065, 0xbdbd00bd, + 0xb8b800b8, 0x8f8f008f, 0xebeb00eb, 0xcece00ce, 0x30300030, 0x5f5f005f, + 0xc5c500c5, 0x1a1a001a, 0xe1e100e1, 0xcaca00ca, 0x47470047, 0x3d3d003d, + 0x01010001, 0xd6d600d6, 0x56560056, 0x4d4d004d, 0x0d0d000d, 0x66660066, + 0xcccc00cc, 0x2d2d002d, 0x12120012, 0x20200020, 0xb1b100b1, 0x99990099, + 0x4c4c004c, 0xc2c200c2, 0x7e7e007e, 0x05050005, 0xb7b700b7, 0x31310031, + 0x17170017, 0xd7d700d7, 0x58580058, 0x61610061, 0x1b1b001b, 0x1c1c001c, + 0x0f0f000f, 0x16160016, 0x18180018, 0x22220022, 0x44440044, 0xb2b200b2, + 0xb5b500b5, 0x91910091, 0x08080008, 0xa8a800a8, 0xfcfc00fc, 0x50500050, + 0xd0d000d0, 0x7d7d007d, 0x89890089, 0x97970097, 0x5b5b005b, 0x95950095, + 0xffff00ff, 0xd2d200d2, 0xc4c400c4, 0x48480048, 0xf7f700f7, 0xdbdb00db, + 0x03030003, 0xdada00da, 0x3f3f003f, 0x94940094, 0x5c5c005c, 0x02020002, + 0x4a4a004a, 0x33330033, 0x67670067, 0xf3f300f3, 0x7f7f007f, 0xe2e200e2, + 0x9b9b009b, 0x26260026, 0x37370037, 0x3b3b003b, 0x96960096, 0x4b4b004b, + 0xbebe00be, 0x2e2e002e, 0x79790079, 0x8c8c008c, 0x6e6e006e, 0x8e8e008e, + 0xf5f500f5, 0xb6b600b6, 0xfdfd00fd, 0x59590059, 0x98980098, 0x6a6a006a, + 0x46460046, 0xbaba00ba, 0x25250025, 0x42420042, 0xa2a200a2, 0xfafa00fa, + 0x07070007, 0x55550055, 0xeeee00ee, 0x0a0a000a, 0x49490049, 0x68680068, + 0x38380038, 0xa4a400a4, 0x28280028, 0x7b7b007b, 0xc9c900c9, 0xc1c100c1, + 0xe3e300e3, 0xf4f400f4, 0xc7c700c7, 0x9e9e009e + }; + + private static readonly uint[] SBOX2_0222 = new uint[]{ + 0x00e0e0e0, 0x00050505, 0x00585858, 0x00d9d9d9, 0x00676767, 0x004e4e4e, + 0x00818181, 0x00cbcbcb, 0x00c9c9c9, 0x000b0b0b, 0x00aeaeae, 0x006a6a6a, + 0x00d5d5d5, 0x00181818, 0x005d5d5d, 0x00828282, 0x00464646, 0x00dfdfdf, + 0x00d6d6d6, 0x00272727, 0x008a8a8a, 0x00323232, 0x004b4b4b, 0x00424242, + 0x00dbdbdb, 0x001c1c1c, 0x009e9e9e, 0x009c9c9c, 0x003a3a3a, 0x00cacaca, + 0x00252525, 0x007b7b7b, 0x000d0d0d, 0x00717171, 0x005f5f5f, 0x001f1f1f, + 0x00f8f8f8, 0x00d7d7d7, 0x003e3e3e, 0x009d9d9d, 0x007c7c7c, 0x00606060, + 0x00b9b9b9, 0x00bebebe, 0x00bcbcbc, 0x008b8b8b, 0x00161616, 0x00343434, + 0x004d4d4d, 0x00c3c3c3, 0x00727272, 0x00959595, 0x00ababab, 0x008e8e8e, + 0x00bababa, 0x007a7a7a, 0x00b3b3b3, 0x00020202, 0x00b4b4b4, 0x00adadad, + 0x00a2a2a2, 0x00acacac, 0x00d8d8d8, 0x009a9a9a, 0x00171717, 0x001a1a1a, + 0x00353535, 0x00cccccc, 0x00f7f7f7, 0x00999999, 0x00616161, 0x005a5a5a, + 0x00e8e8e8, 0x00242424, 0x00565656, 0x00404040, 0x00e1e1e1, 0x00636363, + 0x00090909, 0x00333333, 0x00bfbfbf, 0x00989898, 0x00979797, 0x00858585, + 0x00686868, 0x00fcfcfc, 0x00ececec, 0x000a0a0a, 0x00dadada, 0x006f6f6f, + 0x00535353, 0x00626262, 0x00a3a3a3, 0x002e2e2e, 0x00080808, 0x00afafaf, + 0x00282828, 0x00b0b0b0, 0x00747474, 0x00c2c2c2, 0x00bdbdbd, 0x00363636, + 0x00222222, 0x00383838, 0x00646464, 0x001e1e1e, 0x00393939, 0x002c2c2c, + 0x00a6a6a6, 0x00303030, 0x00e5e5e5, 0x00444444, 0x00fdfdfd, 0x00888888, + 0x009f9f9f, 0x00656565, 0x00878787, 0x006b6b6b, 0x00f4f4f4, 0x00232323, + 0x00484848, 0x00101010, 0x00d1d1d1, 0x00515151, 0x00c0c0c0, 0x00f9f9f9, + 0x00d2d2d2, 0x00a0a0a0, 0x00555555, 0x00a1a1a1, 0x00414141, 0x00fafafa, + 0x00434343, 0x00131313, 0x00c4c4c4, 0x002f2f2f, 0x00a8a8a8, 0x00b6b6b6, + 0x003c3c3c, 0x002b2b2b, 0x00c1c1c1, 0x00ffffff, 0x00c8c8c8, 0x00a5a5a5, + 0x00202020, 0x00898989, 0x00000000, 0x00909090, 0x00474747, 0x00efefef, + 0x00eaeaea, 0x00b7b7b7, 0x00151515, 0x00060606, 0x00cdcdcd, 0x00b5b5b5, + 0x00121212, 0x007e7e7e, 0x00bbbbbb, 0x00292929, 0x000f0f0f, 0x00b8b8b8, + 0x00070707, 0x00040404, 0x009b9b9b, 0x00949494, 0x00212121, 0x00666666, + 0x00e6e6e6, 0x00cecece, 0x00ededed, 0x00e7e7e7, 0x003b3b3b, 0x00fefefe, + 0x007f7f7f, 0x00c5c5c5, 0x00a4a4a4, 0x00373737, 0x00b1b1b1, 0x004c4c4c, + 0x00919191, 0x006e6e6e, 0x008d8d8d, 0x00767676, 0x00030303, 0x002d2d2d, + 0x00dedede, 0x00969696, 0x00262626, 0x007d7d7d, 0x00c6c6c6, 0x005c5c5c, + 0x00d3d3d3, 0x00f2f2f2, 0x004f4f4f, 0x00191919, 0x003f3f3f, 0x00dcdcdc, + 0x00797979, 0x001d1d1d, 0x00525252, 0x00ebebeb, 0x00f3f3f3, 0x006d6d6d, + 0x005e5e5e, 0x00fbfbfb, 0x00696969, 0x00b2b2b2, 0x00f0f0f0, 0x00313131, + 0x000c0c0c, 0x00d4d4d4, 0x00cfcfcf, 0x008c8c8c, 0x00e2e2e2, 0x00757575, + 0x00a9a9a9, 0x004a4a4a, 0x00575757, 0x00848484, 0x00111111, 0x00454545, + 0x001b1b1b, 0x00f5f5f5, 0x00e4e4e4, 0x000e0e0e, 0x00737373, 0x00aaaaaa, + 0x00f1f1f1, 0x00dddddd, 0x00595959, 0x00141414, 0x006c6c6c, 0x00929292, + 0x00545454, 0x00d0d0d0, 0x00787878, 0x00707070, 0x00e3e3e3, 0x00494949, + 0x00808080, 0x00505050, 0x00a7a7a7, 0x00f6f6f6, 0x00777777, 0x00939393, + 0x00868686, 0x00838383, 0x002a2a2a, 0x00c7c7c7, 0x005b5b5b, 0x00e9e9e9, + 0x00eeeeee, 0x008f8f8f, 0x00010101, 0x003d3d3d + }; + + private static readonly uint[] SBOX3_3033 = new uint[]{ + 0x38003838, 0x41004141, 0x16001616, 0x76007676, 0xd900d9d9, 0x93009393, + 0x60006060, 0xf200f2f2, 0x72007272, 0xc200c2c2, 0xab00abab, 0x9a009a9a, + 0x75007575, 0x06000606, 0x57005757, 0xa000a0a0, 0x91009191, 0xf700f7f7, + 0xb500b5b5, 0xc900c9c9, 0xa200a2a2, 0x8c008c8c, 0xd200d2d2, 0x90009090, + 0xf600f6f6, 0x07000707, 0xa700a7a7, 0x27002727, 0x8e008e8e, 0xb200b2b2, + 0x49004949, 0xde00dede, 0x43004343, 0x5c005c5c, 0xd700d7d7, 0xc700c7c7, + 0x3e003e3e, 0xf500f5f5, 0x8f008f8f, 0x67006767, 0x1f001f1f, 0x18001818, + 0x6e006e6e, 0xaf00afaf, 0x2f002f2f, 0xe200e2e2, 0x85008585, 0x0d000d0d, + 0x53005353, 0xf000f0f0, 0x9c009c9c, 0x65006565, 0xea00eaea, 0xa300a3a3, + 0xae00aeae, 0x9e009e9e, 0xec00ecec, 0x80008080, 0x2d002d2d, 0x6b006b6b, + 0xa800a8a8, 0x2b002b2b, 0x36003636, 0xa600a6a6, 0xc500c5c5, 0x86008686, + 0x4d004d4d, 0x33003333, 0xfd00fdfd, 0x66006666, 0x58005858, 0x96009696, + 0x3a003a3a, 0x09000909, 0x95009595, 0x10001010, 0x78007878, 0xd800d8d8, + 0x42004242, 0xcc00cccc, 0xef00efef, 0x26002626, 0xe500e5e5, 0x61006161, + 0x1a001a1a, 0x3f003f3f, 0x3b003b3b, 0x82008282, 0xb600b6b6, 0xdb00dbdb, + 0xd400d4d4, 0x98009898, 0xe800e8e8, 0x8b008b8b, 0x02000202, 0xeb00ebeb, + 0x0a000a0a, 0x2c002c2c, 0x1d001d1d, 0xb000b0b0, 0x6f006f6f, 0x8d008d8d, + 0x88008888, 0x0e000e0e, 0x19001919, 0x87008787, 0x4e004e4e, 0x0b000b0b, + 0xa900a9a9, 0x0c000c0c, 0x79007979, 0x11001111, 0x7f007f7f, 0x22002222, + 0xe700e7e7, 0x59005959, 0xe100e1e1, 0xda00dada, 0x3d003d3d, 0xc800c8c8, + 0x12001212, 0x04000404, 0x74007474, 0x54005454, 0x30003030, 0x7e007e7e, + 0xb400b4b4, 0x28002828, 0x55005555, 0x68006868, 0x50005050, 0xbe00bebe, + 0xd000d0d0, 0xc400c4c4, 0x31003131, 0xcb00cbcb, 0x2a002a2a, 0xad00adad, + 0x0f000f0f, 0xca00caca, 0x70007070, 0xff00ffff, 0x32003232, 0x69006969, + 0x08000808, 0x62006262, 0x00000000, 0x24002424, 0xd100d1d1, 0xfb00fbfb, + 0xba00baba, 0xed00eded, 0x45004545, 0x81008181, 0x73007373, 0x6d006d6d, + 0x84008484, 0x9f009f9f, 0xee00eeee, 0x4a004a4a, 0xc300c3c3, 0x2e002e2e, + 0xc100c1c1, 0x01000101, 0xe600e6e6, 0x25002525, 0x48004848, 0x99009999, + 0xb900b9b9, 0xb300b3b3, 0x7b007b7b, 0xf900f9f9, 0xce00cece, 0xbf00bfbf, + 0xdf00dfdf, 0x71007171, 0x29002929, 0xcd00cdcd, 0x6c006c6c, 0x13001313, + 0x64006464, 0x9b009b9b, 0x63006363, 0x9d009d9d, 0xc000c0c0, 0x4b004b4b, + 0xb700b7b7, 0xa500a5a5, 0x89008989, 0x5f005f5f, 0xb100b1b1, 0x17001717, + 0xf400f4f4, 0xbc00bcbc, 0xd300d3d3, 0x46004646, 0xcf00cfcf, 0x37003737, + 0x5e005e5e, 0x47004747, 0x94009494, 0xfa00fafa, 0xfc00fcfc, 0x5b005b5b, + 0x97009797, 0xfe00fefe, 0x5a005a5a, 0xac00acac, 0x3c003c3c, 0x4c004c4c, + 0x03000303, 0x35003535, 0xf300f3f3, 0x23002323, 0xb800b8b8, 0x5d005d5d, + 0x6a006a6a, 0x92009292, 0xd500d5d5, 0x21002121, 0x44004444, 0x51005151, + 0xc600c6c6, 0x7d007d7d, 0x39003939, 0x83008383, 0xdc00dcdc, 0xaa00aaaa, + 0x7c007c7c, 0x77007777, 0x56005656, 0x05000505, 0x1b001b1b, 0xa400a4a4, + 0x15001515, 0x34003434, 0x1e001e1e, 0x1c001c1c, 0xf800f8f8, 0x52005252, + 0x20002020, 0x14001414, 0xe900e9e9, 0xbd00bdbd, 0xdd00dddd, 0xe400e4e4, + 0xa100a1a1, 0xe000e0e0, 0x8a008a8a, 0xf100f1f1, 0xd600d6d6, 0x7a007a7a, + 0xbb00bbbb, 0xe300e3e3, 0x40004040, 0x4f004f4f + }; + + private static uint rightRotate(uint x, int s) + { + return ((x >> s) + (x << (32 - s))); + } + + private static uint leftRotate(uint x, int s) + { + return (x << s) + (x >> (32 - s)); + } + + private static void roldq(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[0 + ooff] = (ki[0 + ioff] << rot) | (ki[1 + ioff] >> (32 - rot)); + ko[1 + ooff] = (ki[1 + ioff] << rot) | (ki[2 + ioff] >> (32 - rot)); + ko[2 + ooff] = (ki[2 + ioff] << rot) | (ki[3 + ioff] >> (32 - rot)); + ko[3 + ooff] = (ki[3 + ioff] << rot) | (ki[0 + ioff] >> (32 - rot)); + ki[0 + ioff] = ko[0 + ooff]; + ki[1 + ioff] = ko[1 + ooff]; + ki[2 + ioff] = ko[2 + ooff]; + ki[3 + ioff] = ko[3 + ooff]; + } + + private static void decroldq(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[2 + ooff] = (ki[0 + ioff] << rot) | (ki[1 + ioff] >> (32 - rot)); + ko[3 + ooff] = (ki[1 + ioff] << rot) | (ki[2 + ioff] >> (32 - rot)); + ko[0 + ooff] = (ki[2 + ioff] << rot) | (ki[3 + ioff] >> (32 - rot)); + ko[1 + ooff] = (ki[3 + ioff] << rot) | (ki[0 + ioff] >> (32 - rot)); + ki[0 + ioff] = ko[2 + ooff]; + ki[1 + ioff] = ko[3 + ooff]; + ki[2 + ioff] = ko[0 + ooff]; + ki[3 + ioff] = ko[1 + ooff]; + } + + private static void roldqo32(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[0 + ooff] = (ki[1 + ioff] << (rot - 32)) | (ki[2 + ioff] >> (64 - rot)); + ko[1 + ooff] = (ki[2 + ioff] << (rot - 32)) | (ki[3 + ioff] >> (64 - rot)); + ko[2 + ooff] = (ki[3 + ioff] << (rot - 32)) | (ki[0 + ioff] >> (64 - rot)); + ko[3 + ooff] = (ki[0 + ioff] << (rot - 32)) | (ki[1 + ioff] >> (64 - rot)); + ki[0 + ioff] = ko[0 + ooff]; + ki[1 + ioff] = ko[1 + ooff]; + ki[2 + ioff] = ko[2 + ooff]; + ki[3 + ioff] = ko[3 + ooff]; + } + + private static void decroldqo32(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[2 + ooff] = (ki[1 + ioff] << (rot - 32)) | (ki[2 + ioff] >> (64 - rot)); + ko[3 + ooff] = (ki[2 + ioff] << (rot - 32)) | (ki[3 + ioff] >> (64 - rot)); + ko[0 + ooff] = (ki[3 + ioff] << (rot - 32)) | (ki[0 + ioff] >> (64 - rot)); + ko[1 + ooff] = (ki[0 + ioff] << (rot - 32)) | (ki[1 + ioff] >> (64 - rot)); + ki[0 + ioff] = ko[2 + ooff]; + ki[1 + ioff] = ko[3 + ooff]; + ki[2 + ioff] = ko[0 + ooff]; + ki[3 + ioff] = ko[1 + ooff]; + } + + private static void camelliaF2(uint[] s, uint[] skey, int keyoff) + { + uint t1, t2, u, v; + + t1 = s[0] ^ skey[0 + keyoff]; + u = SBOX4_4404[(byte)t1]; + u ^= SBOX3_3033[(byte)(t1 >> 8)]; + u ^= SBOX2_0222[(byte)(t1 >> 16)]; + u ^= SBOX1_1110[(byte)(t1 >> 24)]; + t2 = s[1] ^ skey[1 + keyoff]; + v = SBOX1_1110[(byte)t2]; + v ^= SBOX4_4404[(byte)(t2 >> 8)]; + v ^= SBOX3_3033[(byte)(t2 >> 16)]; + v ^= SBOX2_0222[(byte)(t2 >> 24)]; + + s[2] ^= u ^ v; + s[3] ^= u ^ v ^ rightRotate(u, 8); + + t1 = s[2] ^ skey[2 + keyoff]; + u = SBOX4_4404[(byte)t1]; + u ^= SBOX3_3033[(byte)(t1 >> 8)]; + u ^= SBOX2_0222[(byte)(t1 >> 16)]; + u ^= SBOX1_1110[(byte)(t1 >> 24)]; + t2 = s[3] ^ skey[3 + keyoff]; + v = SBOX1_1110[(byte)t2]; + v ^= SBOX4_4404[(byte)(t2 >> 8)]; + v ^= SBOX3_3033[(byte)(t2 >> 16)]; + v ^= SBOX2_0222[(byte)(t2 >> 24)]; + + s[0] ^= u ^ v; + s[1] ^= u ^ v ^ rightRotate(u, 8); + } + + private static void camelliaFLs(uint[] s, uint[] fkey, int keyoff) + { + + s[1] ^= leftRotate(s[0] & fkey[0 + keyoff], 1); + s[0] ^= fkey[1 + keyoff] | s[1]; + + s[2] ^= fkey[3 + keyoff] | s[3]; + s[3] ^= leftRotate(fkey[2 + keyoff] & s[2], 1); + } + + private void setKey(bool forEncryption, byte[] key) + { + uint[] k = new uint[8]; + uint[] ka = new uint[4]; + uint[] kb = new uint[4]; + uint[] t = new uint[4]; + + switch (key.Length) + { + case 16: + _keyIs128 = true; + Pack.BE_To_UInt32(key, 0, k, 0, 4); + k[4] = k[5] = k[6] = k[7] = 0; + break; + case 24: + Pack.BE_To_UInt32(key, 0, k, 0, 6); + k[6] = ~k[4]; + k[7] = ~k[5]; + _keyIs128 = false; + break; + case 32: + Pack.BE_To_UInt32(key, 0, k, 0, 8); + _keyIs128 = false; + break; + default: + throw new ArgumentException("key sizes are only 16/24/32 bytes."); + } + + for (int i = 0; i < 4; i++) + { + ka[i] = k[i] ^ k[i + 4]; + } + /* compute KA */ + camelliaF2(ka, SIGMA, 0); + for (int i = 0; i < 4; i++) + { + ka[i] ^= k[i]; + } + camelliaF2(ka, SIGMA, 4); + + if (_keyIs128) + { + if (forEncryption) + { + /* KL dependant keys */ + kw[0] = k[0]; + kw[1] = k[1]; + kw[2] = k[2]; + kw[3] = k[3]; + roldq(15, k, 0, subkey, 4); + roldq(30, k, 0, subkey, 12); + roldq(15, k, 0, t, 0); + subkey[18] = t[2]; + subkey[19] = t[3]; + roldq(17, k, 0, ke, 4); + roldq(17, k, 0, subkey, 24); + roldq(17, k, 0, subkey, 32); + /* KA dependant keys */ + subkey[0] = ka[0]; + subkey[1] = ka[1]; + subkey[2] = ka[2]; + subkey[3] = ka[3]; + roldq(15, ka, 0, subkey, 8); + roldq(15, ka, 0, ke, 0); + roldq(15, ka, 0, t, 0); + subkey[16] = t[0]; + subkey[17] = t[1]; + roldq(15, ka, 0, subkey, 20); + roldqo32(34, ka, 0, subkey, 28); + roldq(17, ka, 0, kw, 4); + + } + else + { // decryption + /* KL dependant keys */ + kw[4] = k[0]; + kw[5] = k[1]; + kw[6] = k[2]; + kw[7] = k[3]; + decroldq(15, k, 0, subkey, 28); + decroldq(30, k, 0, subkey, 20); + decroldq(15, k, 0, t, 0); + subkey[16] = t[0]; + subkey[17] = t[1]; + decroldq(17, k, 0, ke, 0); + decroldq(17, k, 0, subkey, 8); + decroldq(17, k, 0, subkey, 0); + /* KA dependant keys */ + subkey[34] = ka[0]; + subkey[35] = ka[1]; + subkey[32] = ka[2]; + subkey[33] = ka[3]; + decroldq(15, ka, 0, subkey, 24); + decroldq(15, ka, 0, ke, 4); + decroldq(15, ka, 0, t, 0); + subkey[18] = t[2]; + subkey[19] = t[3]; + decroldq(15, ka, 0, subkey, 12); + decroldqo32(34, ka, 0, subkey, 4); + roldq(17, ka, 0, kw, 0); + } + } + else + { // 192bit or 256bit + /* compute KB */ + for (int i = 0; i < 4; i++) + { + kb[i] = ka[i] ^ k[i + 4]; + } + camelliaF2(kb, SIGMA, 8); + + if (forEncryption) + { + /* KL dependant keys */ + kw[0] = k[0]; + kw[1] = k[1]; + kw[2] = k[2]; + kw[3] = k[3]; + roldqo32(45, k, 0, subkey, 16); + roldq(15, k, 0, ke, 4); + roldq(17, k, 0, subkey, 32); + roldqo32(34, k, 0, subkey, 44); + /* KR dependant keys */ + roldq(15, k, 4, subkey, 4); + roldq(15, k, 4, ke, 0); + roldq(30, k, 4, subkey, 24); + roldqo32(34, k, 4, subkey, 36); + /* KA dependant keys */ + roldq(15, ka, 0, subkey, 8); + roldq(30, ka, 0, subkey, 20); + /* 32bit rotation */ + ke[8] = ka[1]; + ke[9] = ka[2]; + ke[10] = ka[3]; + ke[11] = ka[0]; + roldqo32(49, ka, 0, subkey, 40); + + /* KB dependant keys */ + subkey[0] = kb[0]; + subkey[1] = kb[1]; + subkey[2] = kb[2]; + subkey[3] = kb[3]; + roldq(30, kb, 0, subkey, 12); + roldq(30, kb, 0, subkey, 28); + roldqo32(51, kb, 0, kw, 4); + + } + else + { // decryption + /* KL dependant keys */ + kw[4] = k[0]; + kw[5] = k[1]; + kw[6] = k[2]; + kw[7] = k[3]; + decroldqo32(45, k, 0, subkey, 28); + decroldq(15, k, 0, ke, 4); + decroldq(17, k, 0, subkey, 12); + decroldqo32(34, k, 0, subkey, 0); + /* KR dependant keys */ + decroldq(15, k, 4, subkey, 40); + decroldq(15, k, 4, ke, 8); + decroldq(30, k, 4, subkey, 20); + decroldqo32(34, k, 4, subkey, 8); + /* KA dependant keys */ + decroldq(15, ka, 0, subkey, 36); + decroldq(30, ka, 0, subkey, 24); + /* 32bit rotation */ + ke[2] = ka[1]; + ke[3] = ka[2]; + ke[0] = ka[3]; + ke[1] = ka[0]; + decroldqo32(49, ka, 0, subkey, 4); + + /* KB dependant keys */ + subkey[46] = kb[0]; + subkey[47] = kb[1]; + subkey[44] = kb[2]; + subkey[45] = kb[3]; + decroldq(30, kb, 0, subkey, 32); + decroldq(30, kb, 0, subkey, 16); + roldqo32(51, kb, 0, kw, 0); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int ProcessBlock128(ReadOnlySpan input, Span output) + { + uint[] state = new uint[4]; + Pack.BE_To_UInt32(input, state); + + state[0] ^= kw[0]; + state[1] ^= kw[1]; + state[2] ^= kw[2]; + state[3] ^= kw[3]; + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output); + Pack.UInt32_To_BE(state[3] ^ kw[5], output[4..]); + Pack.UInt32_To_BE(state[0] ^ kw[6], output[8..]); + Pack.UInt32_To_BE(state[1] ^ kw[7], output[12..]); + + return BLOCK_SIZE; + } + + private int ProcessBlock192or256(ReadOnlySpan input, Span output) + { + uint[] state = new uint[4]; + Pack.BE_To_UInt32(input, state); + + state[0] ^= kw[0]; + state[1] ^= kw[1]; + state[2] ^= kw[2]; + state[3] ^= kw[3]; + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + camelliaFLs(state, ke, 8); + camelliaF2(state, subkey, 36); + camelliaF2(state, subkey, 40); + camelliaF2(state, subkey, 44); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output); + Pack.UInt32_To_BE(state[3] ^ kw[5], output[4..]); + Pack.UInt32_To_BE(state[0] ^ kw[6], output[8..]); + Pack.UInt32_To_BE(state[1] ^ kw[7], output[12..]); + + return BLOCK_SIZE; + } +#else + private int ProcessBlock128(byte[] input, int inOff, byte[] output, int outOff) + { + uint[] state = new uint[4]; + + for (int i = 0; i < 4; i++) + { + state[i] = Pack.BE_To_UInt32(input, inOff + (i * 4)) ^ kw[i]; + } + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output, outOff); + Pack.UInt32_To_BE(state[3] ^ kw[5], output, outOff + 4); + Pack.UInt32_To_BE(state[0] ^ kw[6], output, outOff + 8); + Pack.UInt32_To_BE(state[1] ^ kw[7], output, outOff + 12); + + return BLOCK_SIZE; + } + + private int ProcessBlock192or256(byte[] input, int inOff, byte[] output, int outOff) + { + uint[] state = new uint[4]; + + for (int i = 0; i < 4; i++) + { + state[i] = Pack.BE_To_UInt32(input, inOff + (i * 4)) ^ kw[i]; + } + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + camelliaFLs(state, ke, 8); + camelliaF2(state, subkey, 36); + camelliaF2(state, subkey, 40); + camelliaF2(state, subkey, 44); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output, outOff); + Pack.UInt32_To_BE(state[3] ^ kw[5], output, outOff + 4); + Pack.UInt32_To_BE(state[0] ^ kw[6], output, outOff + 8); + Pack.UInt32_To_BE(state[1] ^ kw[7], output, outOff + 12); + + return BLOCK_SIZE; + } +#endif + + public CamelliaEngine() + { + } + + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("only simple KeyParameter expected."); + + setKey(forEncryption, ((KeyParameter)parameters).GetKey()); + + initialised = true; + } + + public virtual string AlgorithmName + { + get { return "Camellia"; } + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (!initialised) + throw new InvalidOperationException("Camellia engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (_keyIs128) + { + return ProcessBlock128(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + return ProcessBlock192or256(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (_keyIs128) + { + return ProcessBlock128(input, inOff, output, outOff); + } + else + { + return ProcessBlock192or256(input, inOff, output, outOff); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException("Camellia engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (_keyIs128) + { + return ProcessBlock128(input, output); + } + else + { + return ProcessBlock192or256(input, output); + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs.meta new file mode 100644 index 00000000..8c274224 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10254e7acb687ff4e9e90bedbdc0ab6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs new file mode 100644 index 00000000..c2a7a61c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs @@ -0,0 +1,627 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Camellia - based on RFC 3713, smaller implementation, about half the size of CamelliaEngine. + */ + public class CamelliaLightEngine + : IBlockCipher + { + private const int BLOCK_SIZE = 16; +// private const int MASK8 = 0xff; + private bool initialised; + private bool _keyis128; + + private uint[] subkey = new uint[24 * 4]; + private uint[] kw = new uint[4 * 2]; // for whitening + private uint[] ke = new uint[6 * 2]; // for FL and FL^(-1) + + private static readonly uint[] SIGMA = { + 0xa09e667f, 0x3bcc908b, + 0xb67ae858, 0x4caa73b2, + 0xc6ef372f, 0xe94f82be, + 0x54ff53a5, 0xf1d36f1c, + 0x10e527fa, 0xde682d1d, + 0xb05688c2, 0xb3e6c1fd + }; + + /* + * + * S-box data + * + */ + private static readonly byte[] SBOX1 = { + (byte)112, (byte)130, (byte)44, (byte)236, + (byte)179, (byte)39, (byte)192, (byte)229, + (byte)228, (byte)133, (byte)87, (byte)53, + (byte)234, (byte)12, (byte)174, (byte)65, + (byte)35, (byte)239, (byte)107, (byte)147, + (byte)69, (byte)25, (byte)165, (byte)33, + (byte)237, (byte)14, (byte)79, (byte)78, + (byte)29, (byte)101, (byte)146, (byte)189, + (byte)134, (byte)184, (byte)175, (byte)143, + (byte)124, (byte)235, (byte)31, (byte)206, + (byte)62, (byte)48, (byte)220, (byte)95, + (byte)94, (byte)197, (byte)11, (byte)26, + (byte)166, (byte)225, (byte)57, (byte)202, + (byte)213, (byte)71, (byte)93, (byte)61, + (byte)217, (byte)1, (byte)90, (byte)214, + (byte)81, (byte)86, (byte)108, (byte)77, + (byte)139, (byte)13, (byte)154, (byte)102, + (byte)251, (byte)204, (byte)176, (byte)45, + (byte)116, (byte)18, (byte)43, (byte)32, + (byte)240, (byte)177, (byte)132, (byte)153, + (byte)223, (byte)76, (byte)203, (byte)194, + (byte)52, (byte)126, (byte)118, (byte)5, + (byte)109, (byte)183, (byte)169, (byte)49, + (byte)209, (byte)23, (byte)4, (byte)215, + (byte)20, (byte)88, (byte)58, (byte)97, + (byte)222, (byte)27, (byte)17, (byte)28, + (byte)50, (byte)15, (byte)156, (byte)22, + (byte)83, (byte)24, (byte)242, (byte)34, + (byte)254, (byte)68, (byte)207, (byte)178, + (byte)195, (byte)181, (byte)122, (byte)145, + (byte)36, (byte)8, (byte)232, (byte)168, + (byte)96, (byte)252, (byte)105, (byte)80, + (byte)170, (byte)208, (byte)160, (byte)125, + (byte)161, (byte)137, (byte)98, (byte)151, + (byte)84, (byte)91, (byte)30, (byte)149, + (byte)224, (byte)255, (byte)100, (byte)210, + (byte)16, (byte)196, (byte)0, (byte)72, + (byte)163, (byte)247, (byte)117, (byte)219, + (byte)138, (byte)3, (byte)230, (byte)218, + (byte)9, (byte)63, (byte)221, (byte)148, + (byte)135, (byte)92, (byte)131, (byte)2, + (byte)205, (byte)74, (byte)144, (byte)51, + (byte)115, (byte)103, (byte)246, (byte)243, + (byte)157, (byte)127, (byte)191, (byte)226, + (byte)82, (byte)155, (byte)216, (byte)38, + (byte)200, (byte)55, (byte)198, (byte)59, + (byte)129, (byte)150, (byte)111, (byte)75, + (byte)19, (byte)190, (byte)99, (byte)46, + (byte)233, (byte)121, (byte)167, (byte)140, + (byte)159, (byte)110, (byte)188, (byte)142, + (byte)41, (byte)245, (byte)249, (byte)182, + (byte)47, (byte)253, (byte)180, (byte)89, + (byte)120, (byte)152, (byte)6, (byte)106, + (byte)231, (byte)70, (byte)113, (byte)186, + (byte)212, (byte)37, (byte)171, (byte)66, + (byte)136, (byte)162, (byte)141, (byte)250, + (byte)114, (byte)7, (byte)185, (byte)85, + (byte)248, (byte)238, (byte)172, (byte)10, + (byte)54, (byte)73, (byte)42, (byte)104, + (byte)60, (byte)56, (byte)241, (byte)164, + (byte)64, (byte)40, (byte)211, (byte)123, + (byte)187, (byte)201, (byte)67, (byte)193, + (byte)21, (byte)227, (byte)173, (byte)244, + (byte)119, (byte)199, (byte)128, (byte)158 + }; + + private static uint rightRotate(uint x, int s) + { + return ((x >> s) + (x << (32 - s))); + } + + private static uint leftRotate(uint x, int s) + { + return (x << s) + (x >> (32 - s)); + } + + private static void roldq(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[0 + ooff] = (ki[0 + ioff] << rot) | (ki[1 + ioff] >> (32 - rot)); + ko[1 + ooff] = (ki[1 + ioff] << rot) | (ki[2 + ioff] >> (32 - rot)); + ko[2 + ooff] = (ki[2 + ioff] << rot) | (ki[3 + ioff] >> (32 - rot)); + ko[3 + ooff] = (ki[3 + ioff] << rot) | (ki[0 + ioff] >> (32 - rot)); + ki[0 + ioff] = ko[0 + ooff]; + ki[1 + ioff] = ko[1 + ooff]; + ki[2 + ioff] = ko[2 + ooff]; + ki[3 + ioff] = ko[3 + ooff]; + } + + private static void decroldq(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[2 + ooff] = (ki[0 + ioff] << rot) | (ki[1 + ioff] >> (32 - rot)); + ko[3 + ooff] = (ki[1 + ioff] << rot) | (ki[2 + ioff] >> (32 - rot)); + ko[0 + ooff] = (ki[2 + ioff] << rot) | (ki[3 + ioff] >> (32 - rot)); + ko[1 + ooff] = (ki[3 + ioff] << rot) | (ki[0 + ioff] >> (32 - rot)); + ki[0 + ioff] = ko[2 + ooff]; + ki[1 + ioff] = ko[3 + ooff]; + ki[2 + ioff] = ko[0 + ooff]; + ki[3 + ioff] = ko[1 + ooff]; + } + + private static void roldqo32(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[0 + ooff] = (ki[1 + ioff] << (rot - 32)) | (ki[2 + ioff] >> (64 - rot)); + ko[1 + ooff] = (ki[2 + ioff] << (rot - 32)) | (ki[3 + ioff] >> (64 - rot)); + ko[2 + ooff] = (ki[3 + ioff] << (rot - 32)) | (ki[0 + ioff] >> (64 - rot)); + ko[3 + ooff] = (ki[0 + ioff] << (rot - 32)) | (ki[1 + ioff] >> (64 - rot)); + ki[0 + ioff] = ko[0 + ooff]; + ki[1 + ioff] = ko[1 + ooff]; + ki[2 + ioff] = ko[2 + ooff]; + ki[3 + ioff] = ko[3 + ooff]; + } + + private static void decroldqo32(int rot, uint[] ki, int ioff, uint[] ko, int ooff) + { + ko[2 + ooff] = (ki[1 + ioff] << (rot - 32)) | (ki[2 + ioff] >> (64 - rot)); + ko[3 + ooff] = (ki[2 + ioff] << (rot - 32)) | (ki[3 + ioff] >> (64 - rot)); + ko[0 + ooff] = (ki[3 + ioff] << (rot - 32)) | (ki[0 + ioff] >> (64 - rot)); + ko[1 + ooff] = (ki[0 + ioff] << (rot - 32)) | (ki[1 + ioff] >> (64 - rot)); + ki[0 + ioff] = ko[2 + ooff]; + ki[1 + ioff] = ko[3 + ooff]; + ki[2 + ioff] = ko[0 + ooff]; + ki[3 + ioff] = ko[1 + ooff]; + } + + private byte lRot8(byte v, int rot) + { + return (byte)(((uint)v << rot) | ((uint)v >> (8 - rot))); + } + + private uint sbox2(int x) + { + return (uint)lRot8(SBOX1[x], 1); + } + + private uint sbox3(int x) + { + return (uint)lRot8(SBOX1[x], 7); + } + + private uint sbox4(int x) + { + return (uint)SBOX1[lRot8((byte)x, 1)]; + } + + private void camelliaF2(uint[] s, uint[] skey, int keyoff) + { + uint t1, t2, u, v; + + t1 = s[0] ^ skey[0 + keyoff]; + u = sbox4((byte)t1); + u |= (sbox3((byte)(t1 >> 8)) << 8); + u |= (sbox2((byte)(t1 >> 16)) << 16); + u |= ((uint)(SBOX1[(byte)(t1 >> 24)]) << 24); + + t2 = s[1] ^ skey[1 + keyoff]; + v = (uint)SBOX1[(byte)t2]; + v |= (sbox4((byte)(t2 >> 8)) << 8); + v |= (sbox3((byte)(t2 >> 16)) << 16); + v |= (sbox2((byte)(t2 >> 24)) << 24); + + v = leftRotate(v, 8); + u ^= v; + v = leftRotate(v, 8) ^ u; + u = rightRotate(u, 8) ^ v; + s[2] ^= leftRotate(v, 16) ^ u; + s[3] ^= leftRotate(u, 8); + + t1 = s[2] ^ skey[2 + keyoff]; + u = sbox4((byte)t1); + u |= sbox3((byte)(t1 >> 8)) << 8; + u |= sbox2((byte)(t1 >> 16)) << 16; + u |= ((uint)SBOX1[(byte)(t1 >> 24)]) << 24; + + t2 = s[3] ^ skey[3 + keyoff]; + v = (uint)SBOX1[(byte)t2]; + v |= sbox4((byte)(t2 >> 8)) << 8; + v |= sbox3((byte)(t2 >> 16)) << 16; + v |= sbox2((byte)(t2 >> 24)) << 24; + + v = leftRotate(v, 8); + u ^= v; + v = leftRotate(v, 8) ^ u; + u = rightRotate(u, 8) ^ v; + s[0] ^= leftRotate(v, 16) ^ u; + s[1] ^= leftRotate(u, 8); + } + + private void camelliaFLs(uint[] s, uint[] fkey, int keyoff) + { + s[1] ^= leftRotate(s[0] & fkey[0 + keyoff], 1); + s[0] ^= fkey[1 + keyoff] | s[1]; + + s[2] ^= fkey[3 + keyoff] | s[3]; + s[3] ^= leftRotate(fkey[2 + keyoff] & s[2], 1); + } + + private void setKey(bool forEncryption, byte[] key) + { + uint[] k = new uint[8]; + uint[] ka = new uint[4]; + uint[] kb = new uint[4]; + uint[] t = new uint[4]; + + switch (key.Length) + { + case 16: + _keyis128 = true; + Pack.BE_To_UInt32(key, 0, k, 0, 4); + k[4] = k[5] = k[6] = k[7] = 0; + break; + case 24: + Pack.BE_To_UInt32(key, 0, k, 0, 6); + k[6] = ~k[4]; + k[7] = ~k[5]; + _keyis128 = false; + break; + case 32: + Pack.BE_To_UInt32(key, 0, k, 0, 8); + _keyis128 = false; + break; + default: + throw new ArgumentException("key sizes are only 16/24/32 bytes."); + } + + for (int i = 0; i < 4; i++) + { + ka[i] = k[i] ^ k[i + 4]; + } + /* compute KA */ + camelliaF2(ka, SIGMA, 0); + for (int i = 0; i < 4; i++) + { + ka[i] ^= k[i]; + } + camelliaF2(ka, SIGMA, 4); + + if (_keyis128) + { + if (forEncryption) + { + /* KL dependant keys */ + kw[0] = k[0]; + kw[1] = k[1]; + kw[2] = k[2]; + kw[3] = k[3]; + roldq(15, k, 0, subkey, 4); + roldq(30, k, 0, subkey, 12); + roldq(15, k, 0, t, 0); + subkey[18] = t[2]; + subkey[19] = t[3]; + roldq(17, k, 0, ke, 4); + roldq(17, k, 0, subkey, 24); + roldq(17, k, 0, subkey, 32); + /* KA dependant keys */ + subkey[0] = ka[0]; + subkey[1] = ka[1]; + subkey[2] = ka[2]; + subkey[3] = ka[3]; + roldq(15, ka, 0, subkey, 8); + roldq(15, ka, 0, ke, 0); + roldq(15, ka, 0, t, 0); + subkey[16] = t[0]; + subkey[17] = t[1]; + roldq(15, ka, 0, subkey, 20); + roldqo32(34, ka, 0, subkey, 28); + roldq(17, ka, 0, kw, 4); + + } + else + { // decryption + /* KL dependant keys */ + kw[4] = k[0]; + kw[5] = k[1]; + kw[6] = k[2]; + kw[7] = k[3]; + decroldq(15, k, 0, subkey, 28); + decroldq(30, k, 0, subkey, 20); + decroldq(15, k, 0, t, 0); + subkey[16] = t[0]; + subkey[17] = t[1]; + decroldq(17, k, 0, ke, 0); + decroldq(17, k, 0, subkey, 8); + decroldq(17, k, 0, subkey, 0); + /* KA dependant keys */ + subkey[34] = ka[0]; + subkey[35] = ka[1]; + subkey[32] = ka[2]; + subkey[33] = ka[3]; + decroldq(15, ka, 0, subkey, 24); + decroldq(15, ka, 0, ke, 4); + decroldq(15, ka, 0, t, 0); + subkey[18] = t[2]; + subkey[19] = t[3]; + decroldq(15, ka, 0, subkey, 12); + decroldqo32(34, ka, 0, subkey, 4); + roldq(17, ka, 0, kw, 0); + } + } + else + { // 192bit or 256bit + /* compute KB */ + for (int i = 0; i < 4; i++) + { + kb[i] = ka[i] ^ k[i + 4]; + } + camelliaF2(kb, SIGMA, 8); + + if (forEncryption) + { + /* KL dependant keys */ + kw[0] = k[0]; + kw[1] = k[1]; + kw[2] = k[2]; + kw[3] = k[3]; + roldqo32(45, k, 0, subkey, 16); + roldq(15, k, 0, ke, 4); + roldq(17, k, 0, subkey, 32); + roldqo32(34, k, 0, subkey, 44); + /* KR dependant keys */ + roldq(15, k, 4, subkey, 4); + roldq(15, k, 4, ke, 0); + roldq(30, k, 4, subkey, 24); + roldqo32(34, k, 4, subkey, 36); + /* KA dependant keys */ + roldq(15, ka, 0, subkey, 8); + roldq(30, ka, 0, subkey, 20); + /* 32bit rotation */ + ke[8] = ka[1]; + ke[9] = ka[2]; + ke[10] = ka[3]; + ke[11] = ka[0]; + roldqo32(49, ka, 0, subkey, 40); + + /* KB dependant keys */ + subkey[0] = kb[0]; + subkey[1] = kb[1]; + subkey[2] = kb[2]; + subkey[3] = kb[3]; + roldq(30, kb, 0, subkey, 12); + roldq(30, kb, 0, subkey, 28); + roldqo32(51, kb, 0, kw, 4); + + } + else + { // decryption + /* KL dependant keys */ + kw[4] = k[0]; + kw[5] = k[1]; + kw[6] = k[2]; + kw[7] = k[3]; + decroldqo32(45, k, 0, subkey, 28); + decroldq(15, k, 0, ke, 4); + decroldq(17, k, 0, subkey, 12); + decroldqo32(34, k, 0, subkey, 0); + /* KR dependant keys */ + decroldq(15, k, 4, subkey, 40); + decroldq(15, k, 4, ke, 8); + decroldq(30, k, 4, subkey, 20); + decroldqo32(34, k, 4, subkey, 8); + /* KA dependant keys */ + decroldq(15, ka, 0, subkey, 36); + decroldq(30, ka, 0, subkey, 24); + /* 32bit rotation */ + ke[2] = ka[1]; + ke[3] = ka[2]; + ke[0] = ka[3]; + ke[1] = ka[0]; + decroldqo32(49, ka, 0, subkey, 4); + + /* KB dependant keys */ + subkey[46] = kb[0]; + subkey[47] = kb[1]; + subkey[44] = kb[2]; + subkey[45] = kb[3]; + decroldq(30, kb, 0, subkey, 32); + decroldq(30, kb, 0, subkey, 16); + roldqo32(51, kb, 0, kw, 0); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int ProcessBlock128(ReadOnlySpan input, Span output) + { + uint[] state = new uint[4]; + Pack.BE_To_UInt32(input, state); + + state[0] ^= kw[0]; + state[1] ^= kw[1]; + state[2] ^= kw[2]; + state[3] ^= kw[3]; + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output); + Pack.UInt32_To_BE(state[3] ^ kw[5], output[4..]); + Pack.UInt32_To_BE(state[0] ^ kw[6], output[8..]); + Pack.UInt32_To_BE(state[1] ^ kw[7], output[12..]); + + return BLOCK_SIZE; + } + + private int ProcessBlock192or256(ReadOnlySpan input, Span output) + { + uint[] state = new uint[4]; + Pack.BE_To_UInt32(input, state); + + state[0] ^= kw[0]; + state[1] ^= kw[1]; + state[2] ^= kw[2]; + state[3] ^= kw[3]; + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + camelliaFLs(state, ke, 8); + camelliaF2(state, subkey, 36); + camelliaF2(state, subkey, 40); + camelliaF2(state, subkey, 44); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output); + Pack.UInt32_To_BE(state[3] ^ kw[5], output[4..]); + Pack.UInt32_To_BE(state[0] ^ kw[6], output[8..]); + Pack.UInt32_To_BE(state[1] ^ kw[7], output[12..]); + + return BLOCK_SIZE; + } +#else + private int ProcessBlock128(byte[] input, int inOff, byte[] output, int outOff) + { + uint[] state = new uint[4]; + + for (int i = 0; i < 4; i++) + { + state[i] = Pack.BE_To_UInt32(input, inOff + (i * 4)) ^ kw[i]; + } + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output, outOff); + Pack.UInt32_To_BE(state[3] ^ kw[5], output, outOff + 4); + Pack.UInt32_To_BE(state[0] ^ kw[6], output, outOff + 8); + Pack.UInt32_To_BE(state[1] ^ kw[7], output, outOff + 12); + + return BLOCK_SIZE; + } + + private int ProcessBlock192or256(byte[] input, int inOff, byte[] output, int outOff) + { + uint[] state = new uint[4]; + + for (int i = 0; i < 4; i++) + { + state[i] = Pack.BE_To_UInt32(input, inOff + (i * 4)) ^ kw[i]; + } + + camelliaF2(state, subkey, 0); + camelliaF2(state, subkey, 4); + camelliaF2(state, subkey, 8); + camelliaFLs(state, ke, 0); + camelliaF2(state, subkey, 12); + camelliaF2(state, subkey, 16); + camelliaF2(state, subkey, 20); + camelliaFLs(state, ke, 4); + camelliaF2(state, subkey, 24); + camelliaF2(state, subkey, 28); + camelliaF2(state, subkey, 32); + camelliaFLs(state, ke, 8); + camelliaF2(state, subkey, 36); + camelliaF2(state, subkey, 40); + camelliaF2(state, subkey, 44); + + Pack.UInt32_To_BE(state[2] ^ kw[4], output, outOff); + Pack.UInt32_To_BE(state[3] ^ kw[5], output, outOff + 4); + Pack.UInt32_To_BE(state[0] ^ kw[6], output, outOff + 8); + Pack.UInt32_To_BE(state[1] ^ kw[7], output, outOff + 12); + + return BLOCK_SIZE; + } +#endif + + public CamelliaLightEngine() + { + initialised = false; + } + + public virtual string AlgorithmName + { + get { return "Camellia"; } + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("only simple KeyParameter expected."); + + setKey(forEncryption, ((KeyParameter)parameters).GetKey()); + + initialised = true; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (!initialised) + throw new InvalidOperationException("Camellia engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (_keyis128) + { + return ProcessBlock128(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + return ProcessBlock192or256(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (_keyis128) + { + return ProcessBlock128(input, inOff, output, outOff); + } + else + { + return ProcessBlock192or256(input, inOff, output, outOff); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException("Camellia engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (_keyis128) + { + return ProcessBlock128(input, output); + } + else + { + return ProcessBlock192or256(input, output); + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs.meta new file mode 100644 index 00000000..6f8766d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7e6ab2310226ea42b90e699623352e3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaLightEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs new file mode 100644 index 00000000..33d2f23a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// An implementation of the Camellia key wrapper based on RFC 3657/RFC 3394. + ///

+ /// For further details see: http://www.ietf.org/rfc/rfc3657.txt. + /// + public class CamelliaWrapEngine + : Rfc3394WrapEngine + { + public CamelliaWrapEngine() + : base(new CamelliaEngine()) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs.meta new file mode 100644 index 00000000..db719f3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: edbca90dd47c1584ebc76d023f7f1e37 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/CamelliaWrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs new file mode 100644 index 00000000..9ebdcd00 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs @@ -0,0 +1,838 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A class that provides CAST key encryption operations, + * such as encoding data and generating keys. + * + * All the algorithms herein are from the Internet RFC's + * + * RFC2144 - Cast5 (64bit block, 40-128bit key) + * RFC2612 - CAST6 (128bit block, 128-256bit key) + * + * and implement a simplified cryptography interface. + */ + public class Cast5Engine + : IBlockCipher + { + private static readonly uint[] S1 = + { + 0x30fb40d4, 0x9fa0ff0b, 0x6beccd2f, 0x3f258c7a, 0x1e213f2f, 0x9c004dd3, 0x6003e540, 0xcf9fc949, + 0xbfd4af27, 0x88bbbdb5, 0xe2034090, 0x98d09675, 0x6e63a0e0, 0x15c361d2, 0xc2e7661d, 0x22d4ff8e, + 0x28683b6f, 0xc07fd059, 0xff2379c8, 0x775f50e2, 0x43c340d3, 0xdf2f8656, 0x887ca41a, 0xa2d2bd2d, + 0xa1c9e0d6, 0x346c4819, 0x61b76d87, 0x22540f2f, 0x2abe32e1, 0xaa54166b, 0x22568e3a, 0xa2d341d0, + 0x66db40c8, 0xa784392f, 0x004dff2f, 0x2db9d2de, 0x97943fac, 0x4a97c1d8, 0x527644b7, 0xb5f437a7, + 0xb82cbaef, 0xd751d159, 0x6ff7f0ed, 0x5a097a1f, 0x827b68d0, 0x90ecf52e, 0x22b0c054, 0xbc8e5935, + 0x4b6d2f7f, 0x50bb64a2, 0xd2664910, 0xbee5812d, 0xb7332290, 0xe93b159f, 0xb48ee411, 0x4bff345d, + 0xfd45c240, 0xad31973f, 0xc4f6d02e, 0x55fc8165, 0xd5b1caad, 0xa1ac2dae, 0xa2d4b76d, 0xc19b0c50, + 0x882240f2, 0x0c6e4f38, 0xa4e4bfd7, 0x4f5ba272, 0x564c1d2f, 0xc59c5319, 0xb949e354, 0xb04669fe, + 0xb1b6ab8a, 0xc71358dd, 0x6385c545, 0x110f935d, 0x57538ad5, 0x6a390493, 0xe63d37e0, 0x2a54f6b3, + 0x3a787d5f, 0x6276a0b5, 0x19a6fcdf, 0x7a42206a, 0x29f9d4d5, 0xf61b1891, 0xbb72275e, 0xaa508167, + 0x38901091, 0xc6b505eb, 0x84c7cb8c, 0x2ad75a0f, 0x874a1427, 0xa2d1936b, 0x2ad286af, 0xaa56d291, + 0xd7894360, 0x425c750d, 0x93b39e26, 0x187184c9, 0x6c00b32d, 0x73e2bb14, 0xa0bebc3c, 0x54623779, + 0x64459eab, 0x3f328b82, 0x7718cf82, 0x59a2cea6, 0x04ee002e, 0x89fe78e6, 0x3fab0950, 0x325ff6c2, + 0x81383f05, 0x6963c5c8, 0x76cb5ad6, 0xd49974c9, 0xca180dcf, 0x380782d5, 0xc7fa5cf6, 0x8ac31511, + 0x35e79e13, 0x47da91d0, 0xf40f9086, 0xa7e2419e, 0x31366241, 0x051ef495, 0xaa573b04, 0x4a805d8d, + 0x548300d0, 0x00322a3c, 0xbf64cddf, 0xba57a68e, 0x75c6372b, 0x50afd341, 0xa7c13275, 0x915a0bf5, + 0x6b54bfab, 0x2b0b1426, 0xab4cc9d7, 0x449ccd82, 0xf7fbf265, 0xab85c5f3, 0x1b55db94, 0xaad4e324, + 0xcfa4bd3f, 0x2deaa3e2, 0x9e204d02, 0xc8bd25ac, 0xeadf55b3, 0xd5bd9e98, 0xe31231b2, 0x2ad5ad6c, + 0x954329de, 0xadbe4528, 0xd8710f69, 0xaa51c90f, 0xaa786bf6, 0x22513f1e, 0xaa51a79b, 0x2ad344cc, + 0x7b5a41f0, 0xd37cfbad, 0x1b069505, 0x41ece491, 0xb4c332e6, 0x032268d4, 0xc9600acc, 0xce387e6d, + 0xbf6bb16c, 0x6a70fb78, 0x0d03d9c9, 0xd4df39de, 0xe01063da, 0x4736f464, 0x5ad328d8, 0xb347cc96, + 0x75bb0fc3, 0x98511bfb, 0x4ffbcc35, 0xb58bcf6a, 0xe11f0abc, 0xbfc5fe4a, 0xa70aec10, 0xac39570a, + 0x3f04442f, 0x6188b153, 0xe0397a2e, 0x5727cb79, 0x9ceb418f, 0x1cacd68d, 0x2ad37c96, 0x0175cb9d, + 0xc69dff09, 0xc75b65f0, 0xd9db40d8, 0xec0e7779, 0x4744ead4, 0xb11c3274, 0xdd24cb9e, 0x7e1c54bd, + 0xf01144f9, 0xd2240eb1, 0x9675b3fd, 0xa3ac3755, 0xd47c27af, 0x51c85f4d, 0x56907596, 0xa5bb15e6, + 0x580304f0, 0xca042cf1, 0x011a37ea, 0x8dbfaadb, 0x35ba3e4a, 0x3526ffa0, 0xc37b4d09, 0xbc306ed9, + 0x98a52666, 0x5648f725, 0xff5e569d, 0x0ced63d0, 0x7c63b2cf, 0x700b45e1, 0xd5ea50f1, 0x85a92872, + 0xaf1fbda7, 0xd4234870, 0xa7870bf3, 0x2d3b4d79, 0x42e04198, 0x0cd0ede7, 0x26470db8, 0xf881814c, + 0x474d6ad7, 0x7c0c5e5c, 0xd1231959, 0x381b7298, 0xf5d2f4db, 0xab838653, 0x6e2f1e23, 0x83719c9e, + 0xbd91e046, 0x9a56456e, 0xdc39200c, 0x20c8c571, 0x962bda1c, 0xe1e696ff, 0xb141ab08, 0x7cca89b9, + 0x1a69e783, 0x02cc4843, 0xa2f7c579, 0x429ef47d, 0x427b169c, 0x5ac9f049, 0xdd8f0f00, 0x5c8165bf + }, + S2 = + { + 0x1f201094, 0xef0ba75b, 0x69e3cf7e, 0x393f4380, 0xfe61cf7a, 0xeec5207a, 0x55889c94, 0x72fc0651, + 0xada7ef79, 0x4e1d7235, 0xd55a63ce, 0xde0436ba, 0x99c430ef, 0x5f0c0794, 0x18dcdb7d, 0xa1d6eff3, + 0xa0b52f7b, 0x59e83605, 0xee15b094, 0xe9ffd909, 0xdc440086, 0xef944459, 0xba83ccb3, 0xe0c3cdfb, + 0xd1da4181, 0x3b092ab1, 0xf997f1c1, 0xa5e6cf7b, 0x01420ddb, 0xe4e7ef5b, 0x25a1ff41, 0xe180f806, + 0x1fc41080, 0x179bee7a, 0xd37ac6a9, 0xfe5830a4, 0x98de8b7f, 0x77e83f4e, 0x79929269, 0x24fa9f7b, + 0xe113c85b, 0xacc40083, 0xd7503525, 0xf7ea615f, 0x62143154, 0x0d554b63, 0x5d681121, 0xc866c359, + 0x3d63cf73, 0xcee234c0, 0xd4d87e87, 0x5c672b21, 0x071f6181, 0x39f7627f, 0x361e3084, 0xe4eb573b, + 0x602f64a4, 0xd63acd9c, 0x1bbc4635, 0x9e81032d, 0x2701f50c, 0x99847ab4, 0xa0e3df79, 0xba6cf38c, + 0x10843094, 0x2537a95e, 0xf46f6ffe, 0xa1ff3b1f, 0x208cfb6a, 0x8f458c74, 0xd9e0a227, 0x4ec73a34, + 0xfc884f69, 0x3e4de8df, 0xef0e0088, 0x3559648d, 0x8a45388c, 0x1d804366, 0x721d9bfd, 0xa58684bb, + 0xe8256333, 0x844e8212, 0x128d8098, 0xfed33fb4, 0xce280ae1, 0x27e19ba5, 0xd5a6c252, 0xe49754bd, + 0xc5d655dd, 0xeb667064, 0x77840b4d, 0xa1b6a801, 0x84db26a9, 0xe0b56714, 0x21f043b7, 0xe5d05860, + 0x54f03084, 0x066ff472, 0xa31aa153, 0xdadc4755, 0xb5625dbf, 0x68561be6, 0x83ca6b94, 0x2d6ed23b, + 0xeccf01db, 0xa6d3d0ba, 0xb6803d5c, 0xaf77a709, 0x33b4a34c, 0x397bc8d6, 0x5ee22b95, 0x5f0e5304, + 0x81ed6f61, 0x20e74364, 0xb45e1378, 0xde18639b, 0x881ca122, 0xb96726d1, 0x8049a7e8, 0x22b7da7b, + 0x5e552d25, 0x5272d237, 0x79d2951c, 0xc60d894c, 0x488cb402, 0x1ba4fe5b, 0xa4b09f6b, 0x1ca815cf, + 0xa20c3005, 0x8871df63, 0xb9de2fcb, 0x0cc6c9e9, 0x0beeff53, 0xe3214517, 0xb4542835, 0x9f63293c, + 0xee41e729, 0x6e1d2d7c, 0x50045286, 0x1e6685f3, 0xf33401c6, 0x30a22c95, 0x31a70850, 0x60930f13, + 0x73f98417, 0xa1269859, 0xec645c44, 0x52c877a9, 0xcdff33a6, 0xa02b1741, 0x7cbad9a2, 0x2180036f, + 0x50d99c08, 0xcb3f4861, 0xc26bd765, 0x64a3f6ab, 0x80342676, 0x25a75e7b, 0xe4e6d1fc, 0x20c710e6, + 0xcdf0b680, 0x17844d3b, 0x31eef84d, 0x7e0824e4, 0x2ccb49eb, 0x846a3bae, 0x8ff77888, 0xee5d60f6, + 0x7af75673, 0x2fdd5cdb, 0xa11631c1, 0x30f66f43, 0xb3faec54, 0x157fd7fa, 0xef8579cc, 0xd152de58, + 0xdb2ffd5e, 0x8f32ce19, 0x306af97a, 0x02f03ef8, 0x99319ad5, 0xc242fa0f, 0xa7e3ebb0, 0xc68e4906, + 0xb8da230c, 0x80823028, 0xdcdef3c8, 0xd35fb171, 0x088a1bc8, 0xbec0c560, 0x61a3c9e8, 0xbca8f54d, + 0xc72feffa, 0x22822e99, 0x82c570b4, 0xd8d94e89, 0x8b1c34bc, 0x301e16e6, 0x273be979, 0xb0ffeaa6, + 0x61d9b8c6, 0x00b24869, 0xb7ffce3f, 0x08dc283b, 0x43daf65a, 0xf7e19798, 0x7619b72f, 0x8f1c9ba4, + 0xdc8637a0, 0x16a7d3b1, 0x9fc393b7, 0xa7136eeb, 0xc6bcc63e, 0x1a513742, 0xef6828bc, 0x520365d6, + 0x2d6a77ab, 0x3527ed4b, 0x821fd216, 0x095c6e2e, 0xdb92f2fb, 0x5eea29cb, 0x145892f5, 0x91584f7f, + 0x5483697b, 0x2667a8cc, 0x85196048, 0x8c4bacea, 0x833860d4, 0x0d23e0f9, 0x6c387e8a, 0x0ae6d249, + 0xb284600c, 0xd835731d, 0xdcb1c647, 0xac4c56ea, 0x3ebd81b3, 0x230eabb0, 0x6438bc87, 0xf0b5b1fa, + 0x8f5ea2b3, 0xfc184642, 0x0a036b7a, 0x4fb089bd, 0x649da589, 0xa345415e, 0x5c038323, 0x3e5d3bb9, + 0x43d79572, 0x7e6dd07c, 0x06dfdf1e, 0x6c6cc4ef, 0x7160a539, 0x73bfbe70, 0x83877605, 0x4523ecf1 + }, + S3 = + { + 0x8defc240, 0x25fa5d9f, 0xeb903dbf, 0xe810c907, 0x47607fff, 0x369fe44b, 0x8c1fc644, 0xaececa90, + 0xbeb1f9bf, 0xeefbcaea, 0xe8cf1950, 0x51df07ae, 0x920e8806, 0xf0ad0548, 0xe13c8d83, 0x927010d5, + 0x11107d9f, 0x07647db9, 0xb2e3e4d4, 0x3d4f285e, 0xb9afa820, 0xfade82e0, 0xa067268b, 0x8272792e, + 0x553fb2c0, 0x489ae22b, 0xd4ef9794, 0x125e3fbc, 0x21fffcee, 0x825b1bfd, 0x9255c5ed, 0x1257a240, + 0x4e1a8302, 0xbae07fff, 0x528246e7, 0x8e57140e, 0x3373f7bf, 0x8c9f8188, 0xa6fc4ee8, 0xc982b5a5, + 0xa8c01db7, 0x579fc264, 0x67094f31, 0xf2bd3f5f, 0x40fff7c1, 0x1fb78dfc, 0x8e6bd2c1, 0x437be59b, + 0x99b03dbf, 0xb5dbc64b, 0x638dc0e6, 0x55819d99, 0xa197c81c, 0x4a012d6e, 0xc5884a28, 0xccc36f71, + 0xb843c213, 0x6c0743f1, 0x8309893c, 0x0feddd5f, 0x2f7fe850, 0xd7c07f7e, 0x02507fbf, 0x5afb9a04, + 0xa747d2d0, 0x1651192e, 0xaf70bf3e, 0x58c31380, 0x5f98302e, 0x727cc3c4, 0x0a0fb402, 0x0f7fef82, + 0x8c96fdad, 0x5d2c2aae, 0x8ee99a49, 0x50da88b8, 0x8427f4a0, 0x1eac5790, 0x796fb449, 0x8252dc15, + 0xefbd7d9b, 0xa672597d, 0xada840d8, 0x45f54504, 0xfa5d7403, 0xe83ec305, 0x4f91751a, 0x925669c2, + 0x23efe941, 0xa903f12e, 0x60270df2, 0x0276e4b6, 0x94fd6574, 0x927985b2, 0x8276dbcb, 0x02778176, + 0xf8af918d, 0x4e48f79e, 0x8f616ddf, 0xe29d840e, 0x842f7d83, 0x340ce5c8, 0x96bbb682, 0x93b4b148, + 0xef303cab, 0x984faf28, 0x779faf9b, 0x92dc560d, 0x224d1e20, 0x8437aa88, 0x7d29dc96, 0x2756d3dc, + 0x8b907cee, 0xb51fd240, 0xe7c07ce3, 0xe566b4a1, 0xc3e9615e, 0x3cf8209d, 0x6094d1e3, 0xcd9ca341, + 0x5c76460e, 0x00ea983b, 0xd4d67881, 0xfd47572c, 0xf76cedd9, 0xbda8229c, 0x127dadaa, 0x438a074e, + 0x1f97c090, 0x081bdb8a, 0x93a07ebe, 0xb938ca15, 0x97b03cff, 0x3dc2c0f8, 0x8d1ab2ec, 0x64380e51, + 0x68cc7bfb, 0xd90f2788, 0x12490181, 0x5de5ffd4, 0xdd7ef86a, 0x76a2e214, 0xb9a40368, 0x925d958f, + 0x4b39fffa, 0xba39aee9, 0xa4ffd30b, 0xfaf7933b, 0x6d498623, 0x193cbcfa, 0x27627545, 0x825cf47a, + 0x61bd8ba0, 0xd11e42d1, 0xcead04f4, 0x127ea392, 0x10428db7, 0x8272a972, 0x9270c4a8, 0x127de50b, + 0x285ba1c8, 0x3c62f44f, 0x35c0eaa5, 0xe805d231, 0x428929fb, 0xb4fcdf82, 0x4fb66a53, 0x0e7dc15b, + 0x1f081fab, 0x108618ae, 0xfcfd086d, 0xf9ff2889, 0x694bcc11, 0x236a5cae, 0x12deca4d, 0x2c3f8cc5, + 0xd2d02dfe, 0xf8ef5896, 0xe4cf52da, 0x95155b67, 0x494a488c, 0xb9b6a80c, 0x5c8f82bc, 0x89d36b45, + 0x3a609437, 0xec00c9a9, 0x44715253, 0x0a874b49, 0xd773bc40, 0x7c34671c, 0x02717ef6, 0x4feb5536, + 0xa2d02fff, 0xd2bf60c4, 0xd43f03c0, 0x50b4ef6d, 0x07478cd1, 0x006e1888, 0xa2e53f55, 0xb9e6d4bc, + 0xa2048016, 0x97573833, 0xd7207d67, 0xde0f8f3d, 0x72f87b33, 0xabcc4f33, 0x7688c55d, 0x7b00a6b0, + 0x947b0001, 0x570075d2, 0xf9bb88f8, 0x8942019e, 0x4264a5ff, 0x856302e0, 0x72dbd92b, 0xee971b69, + 0x6ea22fde, 0x5f08ae2b, 0xaf7a616d, 0xe5c98767, 0xcf1febd2, 0x61efc8c2, 0xf1ac2571, 0xcc8239c2, + 0x67214cb8, 0xb1e583d1, 0xb7dc3e62, 0x7f10bdce, 0xf90a5c38, 0x0ff0443d, 0x606e6dc6, 0x60543a49, + 0x5727c148, 0x2be98a1d, 0x8ab41738, 0x20e1be24, 0xaf96da0f, 0x68458425, 0x99833be5, 0x600d457d, + 0x282f9350, 0x8334b362, 0xd91d1120, 0x2b6d8da0, 0x642b1e31, 0x9c305a00, 0x52bce688, 0x1b03588a, + 0xf7baefd5, 0x4142ed9c, 0xa4315c11, 0x83323ec5, 0xdfef4636, 0xa133c501, 0xe9d3531c, 0xee353783 + }, + S4 = + { + 0x9db30420, 0x1fb6e9de, 0xa7be7bef, 0xd273a298, 0x4a4f7bdb, 0x64ad8c57, 0x85510443, 0xfa020ed1, + 0x7e287aff, 0xe60fb663, 0x095f35a1, 0x79ebf120, 0xfd059d43, 0x6497b7b1, 0xf3641f63, 0x241e4adf, + 0x28147f5f, 0x4fa2b8cd, 0xc9430040, 0x0cc32220, 0xfdd30b30, 0xc0a5374f, 0x1d2d00d9, 0x24147b15, + 0xee4d111a, 0x0fca5167, 0x71ff904c, 0x2d195ffe, 0x1a05645f, 0x0c13fefe, 0x081b08ca, 0x05170121, + 0x80530100, 0xe83e5efe, 0xac9af4f8, 0x7fe72701, 0xd2b8ee5f, 0x06df4261, 0xbb9e9b8a, 0x7293ea25, + 0xce84ffdf, 0xf5718801, 0x3dd64b04, 0xa26f263b, 0x7ed48400, 0x547eebe6, 0x446d4ca0, 0x6cf3d6f5, + 0x2649abdf, 0xaea0c7f5, 0x36338cc1, 0x503f7e93, 0xd3772061, 0x11b638e1, 0x72500e03, 0xf80eb2bb, + 0xabe0502e, 0xec8d77de, 0x57971e81, 0xe14f6746, 0xc9335400, 0x6920318f, 0x081dbb99, 0xffc304a5, + 0x4d351805, 0x7f3d5ce3, 0xa6c866c6, 0x5d5bcca9, 0xdaec6fea, 0x9f926f91, 0x9f46222f, 0x3991467d, + 0xa5bf6d8e, 0x1143c44f, 0x43958302, 0xd0214eeb, 0x022083b8, 0x3fb6180c, 0x18f8931e, 0x281658e6, + 0x26486e3e, 0x8bd78a70, 0x7477e4c1, 0xb506e07c, 0xf32d0a25, 0x79098b02, 0xe4eabb81, 0x28123b23, + 0x69dead38, 0x1574ca16, 0xdf871b62, 0x211c40b7, 0xa51a9ef9, 0x0014377b, 0x041e8ac8, 0x09114003, + 0xbd59e4d2, 0xe3d156d5, 0x4fe876d5, 0x2f91a340, 0x557be8de, 0x00eae4a7, 0x0ce5c2ec, 0x4db4bba6, + 0xe756bdff, 0xdd3369ac, 0xec17b035, 0x06572327, 0x99afc8b0, 0x56c8c391, 0x6b65811c, 0x5e146119, + 0x6e85cb75, 0xbe07c002, 0xc2325577, 0x893ff4ec, 0x5bbfc92d, 0xd0ec3b25, 0xb7801ab7, 0x8d6d3b24, + 0x20c763ef, 0xc366a5fc, 0x9c382880, 0x0ace3205, 0xaac9548a, 0xeca1d7c7, 0x041afa32, 0x1d16625a, + 0x6701902c, 0x9b757a54, 0x31d477f7, 0x9126b031, 0x36cc6fdb, 0xc70b8b46, 0xd9e66a48, 0x56e55a79, + 0x026a4ceb, 0x52437eff, 0x2f8f76b4, 0x0df980a5, 0x8674cde3, 0xedda04eb, 0x17a9be04, 0x2c18f4df, + 0xb7747f9d, 0xab2af7b4, 0xefc34d20, 0x2e096b7c, 0x1741a254, 0xe5b6a035, 0x213d42f6, 0x2c1c7c26, + 0x61c2f50f, 0x6552daf9, 0xd2c231f8, 0x25130f69, 0xd8167fa2, 0x0418f2c8, 0x001a96a6, 0x0d1526ab, + 0x63315c21, 0x5e0a72ec, 0x49bafefd, 0x187908d9, 0x8d0dbd86, 0x311170a7, 0x3e9b640c, 0xcc3e10d7, + 0xd5cad3b6, 0x0caec388, 0xf73001e1, 0x6c728aff, 0x71eae2a1, 0x1f9af36e, 0xcfcbd12f, 0xc1de8417, + 0xac07be6b, 0xcb44a1d8, 0x8b9b0f56, 0x013988c3, 0xb1c52fca, 0xb4be31cd, 0xd8782806, 0x12a3a4e2, + 0x6f7de532, 0x58fd7eb6, 0xd01ee900, 0x24adffc2, 0xf4990fc5, 0x9711aac5, 0x001d7b95, 0x82e5e7d2, + 0x109873f6, 0x00613096, 0xc32d9521, 0xada121ff, 0x29908415, 0x7fbb977f, 0xaf9eb3db, 0x29c9ed2a, + 0x5ce2a465, 0xa730f32c, 0xd0aa3fe8, 0x8a5cc091, 0xd49e2ce7, 0x0ce454a9, 0xd60acd86, 0x015f1919, + 0x77079103, 0xdea03af6, 0x78a8565e, 0xdee356df, 0x21f05cbe, 0x8b75e387, 0xb3c50651, 0xb8a5c3ef, + 0xd8eeb6d2, 0xe523be77, 0xc2154529, 0x2f69efdf, 0xafe67afb, 0xf470c4b2, 0xf3e0eb5b, 0xd6cc9876, + 0x39e4460c, 0x1fda8538, 0x1987832f, 0xca007367, 0xa99144f8, 0x296b299e, 0x492fc295, 0x9266beab, + 0xb5676e69, 0x9bd3ddda, 0xdf7e052f, 0xdb25701c, 0x1b5e51ee, 0xf65324e6, 0x6afce36c, 0x0316cc04, + 0x8644213e, 0xb7dc59d0, 0x7965291f, 0xccd6fd43, 0x41823979, 0x932bcdf6, 0xb657c34d, 0x4edfd282, + 0x7ae5290c, 0x3cb9536b, 0x851e20fe, 0x9833557e, 0x13ecf0b0, 0xd3ffb372, 0x3f85c5c1, 0x0aef7ed2 + }, + S5 = + { + 0x7ec90c04, 0x2c6e74b9, 0x9b0e66df, 0xa6337911, 0xb86a7fff, 0x1dd358f5, 0x44dd9d44, 0x1731167f, + 0x08fbf1fa, 0xe7f511cc, 0xd2051b00, 0x735aba00, 0x2ab722d8, 0x386381cb, 0xacf6243a, 0x69befd7a, + 0xe6a2e77f, 0xf0c720cd, 0xc4494816, 0xccf5c180, 0x38851640, 0x15b0a848, 0xe68b18cb, 0x4caadeff, + 0x5f480a01, 0x0412b2aa, 0x259814fc, 0x41d0efe2, 0x4e40b48d, 0x248eb6fb, 0x8dba1cfe, 0x41a99b02, + 0x1a550a04, 0xba8f65cb, 0x7251f4e7, 0x95a51725, 0xc106ecd7, 0x97a5980a, 0xc539b9aa, 0x4d79fe6a, + 0xf2f3f763, 0x68af8040, 0xed0c9e56, 0x11b4958b, 0xe1eb5a88, 0x8709e6b0, 0xd7e07156, 0x4e29fea7, + 0x6366e52d, 0x02d1c000, 0xc4ac8e05, 0x9377f571, 0x0c05372a, 0x578535f2, 0x2261be02, 0xd642a0c9, + 0xdf13a280, 0x74b55bd2, 0x682199c0, 0xd421e5ec, 0x53fb3ce8, 0xc8adedb3, 0x28a87fc9, 0x3d959981, + 0x5c1ff900, 0xfe38d399, 0x0c4eff0b, 0x062407ea, 0xaa2f4fb1, 0x4fb96976, 0x90c79505, 0xb0a8a774, + 0xef55a1ff, 0xe59ca2c2, 0xa6b62d27, 0xe66a4263, 0xdf65001f, 0x0ec50966, 0xdfdd55bc, 0x29de0655, + 0x911e739a, 0x17af8975, 0x32c7911c, 0x89f89468, 0x0d01e980, 0x524755f4, 0x03b63cc9, 0x0cc844b2, + 0xbcf3f0aa, 0x87ac36e9, 0xe53a7426, 0x01b3d82b, 0x1a9e7449, 0x64ee2d7e, 0xcddbb1da, 0x01c94910, + 0xb868bf80, 0x0d26f3fd, 0x9342ede7, 0x04a5c284, 0x636737b6, 0x50f5b616, 0xf24766e3, 0x8eca36c1, + 0x136e05db, 0xfef18391, 0xfb887a37, 0xd6e7f7d4, 0xc7fb7dc9, 0x3063fcdf, 0xb6f589de, 0xec2941da, + 0x26e46695, 0xb7566419, 0xf654efc5, 0xd08d58b7, 0x48925401, 0xc1bacb7f, 0xe5ff550f, 0xb6083049, + 0x5bb5d0e8, 0x87d72e5a, 0xab6a6ee1, 0x223a66ce, 0xc62bf3cd, 0x9e0885f9, 0x68cb3e47, 0x086c010f, + 0xa21de820, 0xd18b69de, 0xf3f65777, 0xfa02c3f6, 0x407edac3, 0xcbb3d550, 0x1793084d, 0xb0d70eba, + 0x0ab378d5, 0xd951fb0c, 0xded7da56, 0x4124bbe4, 0x94ca0b56, 0x0f5755d1, 0xe0e1e56e, 0x6184b5be, + 0x580a249f, 0x94f74bc0, 0xe327888e, 0x9f7b5561, 0xc3dc0280, 0x05687715, 0x646c6bd7, 0x44904db3, + 0x66b4f0a3, 0xc0f1648a, 0x697ed5af, 0x49e92ff6, 0x309e374f, 0x2cb6356a, 0x85808573, 0x4991f840, + 0x76f0ae02, 0x083be84d, 0x28421c9a, 0x44489406, 0x736e4cb8, 0xc1092910, 0x8bc95fc6, 0x7d869cf4, + 0x134f616f, 0x2e77118d, 0xb31b2be1, 0xaa90b472, 0x3ca5d717, 0x7d161bba, 0x9cad9010, 0xaf462ba2, + 0x9fe459d2, 0x45d34559, 0xd9f2da13, 0xdbc65487, 0xf3e4f94e, 0x176d486f, 0x097c13ea, 0x631da5c7, + 0x445f7382, 0x175683f4, 0xcdc66a97, 0x70be0288, 0xb3cdcf72, 0x6e5dd2f3, 0x20936079, 0x459b80a5, + 0xbe60e2db, 0xa9c23101, 0xeba5315c, 0x224e42f2, 0x1c5c1572, 0xf6721b2c, 0x1ad2fff3, 0x8c25404e, + 0x324ed72f, 0x4067b7fd, 0x0523138e, 0x5ca3bc78, 0xdc0fd66e, 0x75922283, 0x784d6b17, 0x58ebb16e, + 0x44094f85, 0x3f481d87, 0xfcfeae7b, 0x77b5ff76, 0x8c2302bf, 0xaaf47556, 0x5f46b02a, 0x2b092801, + 0x3d38f5f7, 0x0ca81f36, 0x52af4a8a, 0x66d5e7c0, 0xdf3b0874, 0x95055110, 0x1b5ad7a8, 0xf61ed5ad, + 0x6cf6e479, 0x20758184, 0xd0cefa65, 0x88f7be58, 0x4a046826, 0x0ff6f8f3, 0xa09c7f70, 0x5346aba0, + 0x5ce96c28, 0xe176eda3, 0x6bac307f, 0x376829d2, 0x85360fa9, 0x17e3fe2a, 0x24b79767, 0xf5a96b20, + 0xd6cd2595, 0x68ff1ebf, 0x7555442c, 0xf19f06be, 0xf9e0659a, 0xeeb9491d, 0x34010718, 0xbb30cab8, + 0xe822fe15, 0x88570983, 0x750e6249, 0xda627e55, 0x5e76ffa8, 0xb1534546, 0x6d47de08, 0xefe9e7d4 + }, + S6 = + { + 0xf6fa8f9d, 0x2cac6ce1, 0x4ca34867, 0xe2337f7c, 0x95db08e7, 0x016843b4, 0xeced5cbc, 0x325553ac, + 0xbf9f0960, 0xdfa1e2ed, 0x83f0579d, 0x63ed86b9, 0x1ab6a6b8, 0xde5ebe39, 0xf38ff732, 0x8989b138, + 0x33f14961, 0xc01937bd, 0xf506c6da, 0xe4625e7e, 0xa308ea99, 0x4e23e33c, 0x79cbd7cc, 0x48a14367, + 0xa3149619, 0xfec94bd5, 0xa114174a, 0xeaa01866, 0xa084db2d, 0x09a8486f, 0xa888614a, 0x2900af98, + 0x01665991, 0xe1992863, 0xc8f30c60, 0x2e78ef3c, 0xd0d51932, 0xcf0fec14, 0xf7ca07d2, 0xd0a82072, + 0xfd41197e, 0x9305a6b0, 0xe86be3da, 0x74bed3cd, 0x372da53c, 0x4c7f4448, 0xdab5d440, 0x6dba0ec3, + 0x083919a7, 0x9fbaeed9, 0x49dbcfb0, 0x4e670c53, 0x5c3d9c01, 0x64bdb941, 0x2c0e636a, 0xba7dd9cd, + 0xea6f7388, 0xe70bc762, 0x35f29adb, 0x5c4cdd8d, 0xf0d48d8c, 0xb88153e2, 0x08a19866, 0x1ae2eac8, + 0x284caf89, 0xaa928223, 0x9334be53, 0x3b3a21bf, 0x16434be3, 0x9aea3906, 0xefe8c36e, 0xf890cdd9, + 0x80226dae, 0xc340a4a3, 0xdf7e9c09, 0xa694a807, 0x5b7c5ecc, 0x221db3a6, 0x9a69a02f, 0x68818a54, + 0xceb2296f, 0x53c0843a, 0xfe893655, 0x25bfe68a, 0xb4628abc, 0xcf222ebf, 0x25ac6f48, 0xa9a99387, + 0x53bddb65, 0xe76ffbe7, 0xe967fd78, 0x0ba93563, 0x8e342bc1, 0xe8a11be9, 0x4980740d, 0xc8087dfc, + 0x8de4bf99, 0xa11101a0, 0x7fd37975, 0xda5a26c0, 0xe81f994f, 0x9528cd89, 0xfd339fed, 0xb87834bf, + 0x5f04456d, 0x22258698, 0xc9c4c83b, 0x2dc156be, 0x4f628daa, 0x57f55ec5, 0xe2220abe, 0xd2916ebf, + 0x4ec75b95, 0x24f2c3c0, 0x42d15d99, 0xcd0d7fa0, 0x7b6e27ff, 0xa8dc8af0, 0x7345c106, 0xf41e232f, + 0x35162386, 0xe6ea8926, 0x3333b094, 0x157ec6f2, 0x372b74af, 0x692573e4, 0xe9a9d848, 0xf3160289, + 0x3a62ef1d, 0xa787e238, 0xf3a5f676, 0x74364853, 0x20951063, 0x4576698d, 0xb6fad407, 0x592af950, + 0x36f73523, 0x4cfb6e87, 0x7da4cec0, 0x6c152daa, 0xcb0396a8, 0xc50dfe5d, 0xfcd707ab, 0x0921c42f, + 0x89dff0bb, 0x5fe2be78, 0x448f4f33, 0x754613c9, 0x2b05d08d, 0x48b9d585, 0xdc049441, 0xc8098f9b, + 0x7dede786, 0xc39a3373, 0x42410005, 0x6a091751, 0x0ef3c8a6, 0x890072d6, 0x28207682, 0xa9a9f7be, + 0xbf32679d, 0xd45b5b75, 0xb353fd00, 0xcbb0e358, 0x830f220a, 0x1f8fb214, 0xd372cf08, 0xcc3c4a13, + 0x8cf63166, 0x061c87be, 0x88c98f88, 0x6062e397, 0x47cf8e7a, 0xb6c85283, 0x3cc2acfb, 0x3fc06976, + 0x4e8f0252, 0x64d8314d, 0xda3870e3, 0x1e665459, 0xc10908f0, 0x513021a5, 0x6c5b68b7, 0x822f8aa0, + 0x3007cd3e, 0x74719eef, 0xdc872681, 0x073340d4, 0x7e432fd9, 0x0c5ec241, 0x8809286c, 0xf592d891, + 0x08a930f6, 0x957ef305, 0xb7fbffbd, 0xc266e96f, 0x6fe4ac98, 0xb173ecc0, 0xbc60b42a, 0x953498da, + 0xfba1ae12, 0x2d4bd736, 0x0f25faab, 0xa4f3fceb, 0xe2969123, 0x257f0c3d, 0x9348af49, 0x361400bc, + 0xe8816f4a, 0x3814f200, 0xa3f94043, 0x9c7a54c2, 0xbc704f57, 0xda41e7f9, 0xc25ad33a, 0x54f4a084, + 0xb17f5505, 0x59357cbe, 0xedbd15c8, 0x7f97c5ab, 0xba5ac7b5, 0xb6f6deaf, 0x3a479c3a, 0x5302da25, + 0x653d7e6a, 0x54268d49, 0x51a477ea, 0x5017d55b, 0xd7d25d88, 0x44136c76, 0x0404a8c8, 0xb8e5a121, + 0xb81a928a, 0x60ed5869, 0x97c55b96, 0xeaec991b, 0x29935913, 0x01fdb7f1, 0x088e8dfa, 0x9ab6f6f5, + 0x3b4cbf9f, 0x4a5de3ab, 0xe6051d35, 0xa0e1d855, 0xd36b4cf1, 0xf544edeb, 0xb0e93524, 0xbebb8fbd, + 0xa2d762cf, 0x49c92f54, 0x38b5f331, 0x7128a454, 0x48392905, 0xa65b1db8, 0x851c97bd, 0xd675cf2f + }, + S7 = + { + 0x85e04019, 0x332bf567, 0x662dbfff, 0xcfc65693, 0x2a8d7f6f, 0xab9bc912, 0xde6008a1, 0x2028da1f, + 0x0227bce7, 0x4d642916, 0x18fac300, 0x50f18b82, 0x2cb2cb11, 0xb232e75c, 0x4b3695f2, 0xb28707de, + 0xa05fbcf6, 0xcd4181e9, 0xe150210c, 0xe24ef1bd, 0xb168c381, 0xfde4e789, 0x5c79b0d8, 0x1e8bfd43, + 0x4d495001, 0x38be4341, 0x913cee1d, 0x92a79c3f, 0x089766be, 0xbaeeadf4, 0x1286becf, 0xb6eacb19, + 0x2660c200, 0x7565bde4, 0x64241f7a, 0x8248dca9, 0xc3b3ad66, 0x28136086, 0x0bd8dfa8, 0x356d1cf2, + 0x107789be, 0xb3b2e9ce, 0x0502aa8f, 0x0bc0351e, 0x166bf52a, 0xeb12ff82, 0xe3486911, 0xd34d7516, + 0x4e7b3aff, 0x5f43671b, 0x9cf6e037, 0x4981ac83, 0x334266ce, 0x8c9341b7, 0xd0d854c0, 0xcb3a6c88, + 0x47bc2829, 0x4725ba37, 0xa66ad22b, 0x7ad61f1e, 0x0c5cbafa, 0x4437f107, 0xb6e79962, 0x42d2d816, + 0x0a961288, 0xe1a5c06e, 0x13749e67, 0x72fc081a, 0xb1d139f7, 0xf9583745, 0xcf19df58, 0xbec3f756, + 0xc06eba30, 0x07211b24, 0x45c28829, 0xc95e317f, 0xbc8ec511, 0x38bc46e9, 0xc6e6fa14, 0xbae8584a, + 0xad4ebc46, 0x468f508b, 0x7829435f, 0xf124183b, 0x821dba9f, 0xaff60ff4, 0xea2c4e6d, 0x16e39264, + 0x92544a8b, 0x009b4fc3, 0xaba68ced, 0x9ac96f78, 0x06a5b79a, 0xb2856e6e, 0x1aec3ca9, 0xbe838688, + 0x0e0804e9, 0x55f1be56, 0xe7e5363b, 0xb3a1f25d, 0xf7debb85, 0x61fe033c, 0x16746233, 0x3c034c28, + 0xda6d0c74, 0x79aac56c, 0x3ce4e1ad, 0x51f0c802, 0x98f8f35a, 0x1626a49f, 0xeed82b29, 0x1d382fe3, + 0x0c4fb99a, 0xbb325778, 0x3ec6d97b, 0x6e77a6a9, 0xcb658b5c, 0xd45230c7, 0x2bd1408b, 0x60c03eb7, + 0xb9068d78, 0xa33754f4, 0xf430c87d, 0xc8a71302, 0xb96d8c32, 0xebd4e7be, 0xbe8b9d2d, 0x7979fb06, + 0xe7225308, 0x8b75cf77, 0x11ef8da4, 0xe083c858, 0x8d6b786f, 0x5a6317a6, 0xfa5cf7a0, 0x5dda0033, + 0xf28ebfb0, 0xf5b9c310, 0xa0eac280, 0x08b9767a, 0xa3d9d2b0, 0x79d34217, 0x021a718d, 0x9ac6336a, + 0x2711fd60, 0x438050e3, 0x069908a8, 0x3d7fedc4, 0x826d2bef, 0x4eeb8476, 0x488dcf25, 0x36c9d566, + 0x28e74e41, 0xc2610aca, 0x3d49a9cf, 0xbae3b9df, 0xb65f8de6, 0x92aeaf64, 0x3ac7d5e6, 0x9ea80509, + 0xf22b017d, 0xa4173f70, 0xdd1e16c3, 0x15e0d7f9, 0x50b1b887, 0x2b9f4fd5, 0x625aba82, 0x6a017962, + 0x2ec01b9c, 0x15488aa9, 0xd716e740, 0x40055a2c, 0x93d29a22, 0xe32dbf9a, 0x058745b9, 0x3453dc1e, + 0xd699296e, 0x496cff6f, 0x1c9f4986, 0xdfe2ed07, 0xb87242d1, 0x19de7eae, 0x053e561a, 0x15ad6f8c, + 0x66626c1c, 0x7154c24c, 0xea082b2a, 0x93eb2939, 0x17dcb0f0, 0x58d4f2ae, 0x9ea294fb, 0x52cf564c, + 0x9883fe66, 0x2ec40581, 0x763953c3, 0x01d6692e, 0xd3a0c108, 0xa1e7160e, 0xe4f2dfa6, 0x693ed285, + 0x74904698, 0x4c2b0edd, 0x4f757656, 0x5d393378, 0xa132234f, 0x3d321c5d, 0xc3f5e194, 0x4b269301, + 0xc79f022f, 0x3c997e7e, 0x5e4f9504, 0x3ffafbbd, 0x76f7ad0e, 0x296693f4, 0x3d1fce6f, 0xc61e45be, + 0xd3b5ab34, 0xf72bf9b7, 0x1b0434c0, 0x4e72b567, 0x5592a33d, 0xb5229301, 0xcfd2a87f, 0x60aeb767, + 0x1814386b, 0x30bcc33d, 0x38a0c07d, 0xfd1606f2, 0xc363519b, 0x589dd390, 0x5479f8e6, 0x1cb8d647, + 0x97fd61a9, 0xea7759f4, 0x2d57539d, 0x569a58cf, 0xe84e63ad, 0x462e1b78, 0x6580f87e, 0xf3817914, + 0x91da55f4, 0x40a230f3, 0xd1988f35, 0xb6e318d2, 0x3ffa50bc, 0x3d40f021, 0xc3c0bdae, 0x4958c24c, + 0x518f36b2, 0x84b1d370, 0x0fedce83, 0x878ddada, 0xf2a279c7, 0x94e01be8, 0x90716f4b, 0x954b8aa3 + }, + S8 = + { + 0xe216300d, 0xbbddfffc, 0xa7ebdabd, 0x35648095, 0x7789f8b7, 0xe6c1121b, 0x0e241600, 0x052ce8b5, + 0x11a9cfb0, 0xe5952f11, 0xece7990a, 0x9386d174, 0x2a42931c, 0x76e38111, 0xb12def3a, 0x37ddddfc, + 0xde9adeb1, 0x0a0cc32c, 0xbe197029, 0x84a00940, 0xbb243a0f, 0xb4d137cf, 0xb44e79f0, 0x049eedfd, + 0x0b15a15d, 0x480d3168, 0x8bbbde5a, 0x669ded42, 0xc7ece831, 0x3f8f95e7, 0x72df191b, 0x7580330d, + 0x94074251, 0x5c7dcdfa, 0xabbe6d63, 0xaa402164, 0xb301d40a, 0x02e7d1ca, 0x53571dae, 0x7a3182a2, + 0x12a8ddec, 0xfdaa335d, 0x176f43e8, 0x71fb46d4, 0x38129022, 0xce949ad4, 0xb84769ad, 0x965bd862, + 0x82f3d055, 0x66fb9767, 0x15b80b4e, 0x1d5b47a0, 0x4cfde06f, 0xc28ec4b8, 0x57e8726e, 0x647a78fc, + 0x99865d44, 0x608bd593, 0x6c200e03, 0x39dc5ff6, 0x5d0b00a3, 0xae63aff2, 0x7e8bd632, 0x70108c0c, + 0xbbd35049, 0x2998df04, 0x980cf42a, 0x9b6df491, 0x9e7edd53, 0x06918548, 0x58cb7e07, 0x3b74ef2e, + 0x522fffb1, 0xd24708cc, 0x1c7e27cd, 0xa4eb215b, 0x3cf1d2e2, 0x19b47a38, 0x424f7618, 0x35856039, + 0x9d17dee7, 0x27eb35e6, 0xc9aff67b, 0x36baf5b8, 0x09c467cd, 0xc18910b1, 0xe11dbf7b, 0x06cd1af8, + 0x7170c608, 0x2d5e3354, 0xd4de495a, 0x64c6d006, 0xbcc0c62c, 0x3dd00db3, 0x708f8f34, 0x77d51b42, + 0x264f620f, 0x24b8d2bf, 0x15c1b79e, 0x46a52564, 0xf8d7e54e, 0x3e378160, 0x7895cda5, 0x859c15a5, + 0xe6459788, 0xc37bc75f, 0xdb07ba0c, 0x0676a3ab, 0x7f229b1e, 0x31842e7b, 0x24259fd7, 0xf8bef472, + 0x835ffcb8, 0x6df4c1f2, 0x96f5b195, 0xfd0af0fc, 0xb0fe134c, 0xe2506d3d, 0x4f9b12ea, 0xf215f225, + 0xa223736f, 0x9fb4c428, 0x25d04979, 0x34c713f8, 0xc4618187, 0xea7a6e98, 0x7cd16efc, 0x1436876c, + 0xf1544107, 0xbedeee14, 0x56e9af27, 0xa04aa441, 0x3cf7c899, 0x92ecbae6, 0xdd67016d, 0x151682eb, + 0xa842eedf, 0xfdba60b4, 0xf1907b75, 0x20e3030f, 0x24d8c29e, 0xe139673b, 0xefa63fb8, 0x71873054, + 0xb6f2cf3b, 0x9f326442, 0xcb15a4cc, 0xb01a4504, 0xf1e47d8d, 0x844a1be5, 0xbae7dfdc, 0x42cbda70, + 0xcd7dae0a, 0x57e85b7a, 0xd53f5af6, 0x20cf4d8c, 0xcea4d428, 0x79d130a4, 0x3486ebfb, 0x33d3cddc, + 0x77853b53, 0x37effcb5, 0xc5068778, 0xe580b3e6, 0x4e68b8f4, 0xc5c8b37e, 0x0d809ea2, 0x398feb7c, + 0x132a4f94, 0x43b7950e, 0x2fee7d1c, 0x223613bd, 0xdd06caa2, 0x37df932b, 0xc4248289, 0xacf3ebc3, + 0x5715f6b7, 0xef3478dd, 0xf267616f, 0xc148cbe4, 0x9052815e, 0x5e410fab, 0xb48a2465, 0x2eda7fa4, + 0xe87b40e4, 0xe98ea084, 0x5889e9e1, 0xefd390fc, 0xdd07d35b, 0xdb485694, 0x38d7e5b2, 0x57720101, + 0x730edebc, 0x5b643113, 0x94917e4f, 0x503c2fba, 0x646f1282, 0x7523d24a, 0xe0779695, 0xf9c17a8f, + 0x7a5b2121, 0xd187b896, 0x29263a4d, 0xba510cdf, 0x81f47c9f, 0xad1163ed, 0xea7b5965, 0x1a00726e, + 0x11403092, 0x00da6d77, 0x4a0cdd61, 0xad1f4603, 0x605bdfb0, 0x9eedc364, 0x22ebe6a8, 0xcee7d28a, + 0xa0e736a0, 0x5564a6b9, 0x10853209, 0xc7eb8f37, 0x2de705ca, 0x8951570f, 0xdf09822b, 0xbd691a6c, + 0xaa12e4f2, 0x87451c0f, 0xe0f6a27a, 0x3ada4819, 0x4cf1764f, 0x0d771c2b, 0x67cdb156, 0x350d8384, + 0x5938fa0f, 0x42399ef3, 0x36997b07, 0x0e84093d, 0x4aa93e61, 0x8360d87b, 0x1fa98b0c, 0x1149382c, + 0xe97625a5, 0x0614d1b7, 0x0e25244b, 0x0c768347, 0x589e8d82, 0x0d2059d1, 0xa466bb1e, 0xf8da0a82, + 0x04f19130, 0xba6e4ec0, 0x99265164, 0x1ee7230d, 0x50b2ad80, 0xeaee6801, 0x8db2a283, 0xea8bf59e + }; + + //==================================== + // Useful constants + //==================================== + + internal static readonly int MAX_ROUNDS = 16; + internal static readonly int RED_ROUNDS = 12; + + private const int BLOCK_SIZE = 8; // bytes = 64 bits + + private int[] _Kr = new int[17]; // the rotating round key + private uint[] _Km = new uint[17]; // the masking round key + + private bool _encrypting; + + private byte[] _workingKey; + private int _rounds = MAX_ROUNDS; + + public Cast5Engine() + { + } + + /** + * initialise a CAST cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("Invalid parameter passed to "+ AlgorithmName +" init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + _encrypting = forEncryption; + _workingKey = ((KeyParameter)parameters).GetKey(); + SetKey(_workingKey); + } + + public virtual string AlgorithmName + { + get { return "CAST5"; } + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (_workingKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + int blockSize = GetBlockSize(); + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(output, outOff, blockSize, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (_encrypting) + { + return EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + return DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (_encrypting) + { + return EncryptBlock(input, inOff, output, outOff); + } + else + { + return DecryptBlock(input, inOff, output, outOff); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (_workingKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + int blockSize = GetBlockSize(); + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + if (_encrypting) + { + return EncryptBlock(input, output); + } + else + { + return DecryptBlock(input, output); + } + } +#endif + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + //================================== + // Private Implementation + //================================== + + /* + * Creates the subkeys using the same nomenclature + * as described in RFC2144. + * + * See section 2.4 + */ + internal virtual void SetKey(byte[] key) + { + /* + * Determine the key size here, if required + * + * if keysize <= 80bits, use 12 rounds instead of 16 + * if keysize < 128bits, pad with 0 + * + * Typical key sizes => 40, 64, 80, 128 + */ + + if (key.Length < 11) + { + _rounds = RED_ROUNDS; + } + + int [] z = new int[16]; + int [] x = new int[16]; + + uint z03, z47, z8B, zCF; + uint x03, x47, x8B, xCF; + + /* copy the key into x */ + for (int i=0; i< key.Length; i++) + { + x[i] = (int)(key[i] & 0xff); + } + + /* + * This will look different because the selection of + * bytes from the input key I've already chosen the + * correct int. + */ + x03 = IntsTo32bits(x, 0x0); + x47 = IntsTo32bits(x, 0x4); + x8B = IntsTo32bits(x, 0x8); + xCF = IntsTo32bits(x, 0xC); + + z03 = x03 ^S5[x[0xD]] ^S6[x[0xF]] ^S7[x[0xC]] ^S8[x[0xE]] ^S7[x[0x8]]; + + Bits32ToInts(z03, z, 0x0); + z47 = x8B ^S5[z[0x0]] ^S6[z[0x2]] ^S7[z[0x1]] ^S8[z[0x3]] ^S8[x[0xA]]; + Bits32ToInts(z47, z, 0x4); + z8B = xCF ^S5[z[0x7]] ^S6[z[0x6]] ^S7[z[0x5]] ^S8[z[0x4]] ^S5[x[0x9]]; + Bits32ToInts(z8B, z, 0x8); + zCF = x47 ^S5[z[0xA]] ^S6[z[0x9]] ^S7[z[0xB]] ^S8[z[0x8]] ^S6[x[0xB]]; + Bits32ToInts(zCF, z, 0xC); + _Km[ 1]= S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]]; + _Km[ 2]= S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]]; + _Km[ 3]= S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]]; + _Km[ 4]= S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]]; + + z03 = IntsTo32bits(z, 0x0); + z47 = IntsTo32bits(z, 0x4); + z8B = IntsTo32bits(z, 0x8); + zCF = IntsTo32bits(z, 0xC); + x03 = z8B ^S5[z[0x5]] ^S6[z[0x7]] ^S7[z[0x4]] ^S8[z[0x6]] ^S7[z[0x0]]; + Bits32ToInts(x03, x, 0x0); + x47 = z03 ^S5[x[0x0]] ^S6[x[0x2]] ^S7[x[0x1]] ^S8[x[0x3]] ^S8[z[0x2]]; + Bits32ToInts(x47, x, 0x4); + x8B = z47 ^S5[x[0x7]] ^S6[x[0x6]] ^S7[x[0x5]] ^S8[x[0x4]] ^S5[z[0x1]]; + Bits32ToInts(x8B, x, 0x8); + xCF = zCF ^S5[x[0xA]] ^S6[x[0x9]] ^S7[x[0xB]] ^S8[x[0x8]] ^S6[z[0x3]]; + Bits32ToInts(xCF, x, 0xC); + _Km[ 5]= S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]]; + _Km[ 6]= S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]]; + _Km[ 7]= S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]]; + _Km[ 8]= S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]]; + + x03 = IntsTo32bits(x, 0x0); + x47 = IntsTo32bits(x, 0x4); + x8B = IntsTo32bits(x, 0x8); + xCF = IntsTo32bits(x, 0xC); + z03 = x03 ^S5[x[0xD]] ^S6[x[0xF]] ^S7[x[0xC]] ^S8[x[0xE]] ^S7[x[0x8]]; + Bits32ToInts(z03, z, 0x0); + z47 = x8B ^S5[z[0x0]] ^S6[z[0x2]] ^S7[z[0x1]] ^S8[z[0x3]] ^S8[x[0xA]]; + Bits32ToInts(z47, z, 0x4); + z8B = xCF ^S5[z[0x7]] ^S6[z[0x6]] ^S7[z[0x5]] ^S8[z[0x4]] ^S5[x[0x9]]; + Bits32ToInts(z8B, z, 0x8); + zCF = x47 ^S5[z[0xA]] ^S6[z[0x9]] ^S7[z[0xB]] ^S8[z[0x8]] ^S6[x[0xB]]; + Bits32ToInts(zCF, z, 0xC); + _Km[ 9]= S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]]; + _Km[10]= S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]]; + _Km[11]= S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]]; + _Km[12]= S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]]; + + z03 = IntsTo32bits(z, 0x0); + z47 = IntsTo32bits(z, 0x4); + z8B = IntsTo32bits(z, 0x8); + zCF = IntsTo32bits(z, 0xC); + x03 = z8B ^S5[z[0x5]] ^S6[z[0x7]] ^S7[z[0x4]] ^S8[z[0x6]] ^S7[z[0x0]]; + Bits32ToInts(x03, x, 0x0); + x47 = z03 ^S5[x[0x0]] ^S6[x[0x2]] ^S7[x[0x1]] ^S8[x[0x3]] ^S8[z[0x2]]; + Bits32ToInts(x47, x, 0x4); + x8B = z47 ^S5[x[0x7]] ^S6[x[0x6]] ^S7[x[0x5]] ^S8[x[0x4]] ^S5[z[0x1]]; + Bits32ToInts(x8B, x, 0x8); + xCF = zCF ^S5[x[0xA]] ^S6[x[0x9]] ^S7[x[0xB]] ^S8[x[0x8]] ^S6[z[0x3]]; + Bits32ToInts(xCF, x, 0xC); + _Km[13]= S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]]; + _Km[14]= S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]]; + _Km[15]= S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]]; + _Km[16]= S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]]; + + x03 = IntsTo32bits(x, 0x0); + x47 = IntsTo32bits(x, 0x4); + x8B = IntsTo32bits(x, 0x8); + xCF = IntsTo32bits(x, 0xC); + z03 = x03 ^S5[x[0xD]] ^S6[x[0xF]] ^S7[x[0xC]] ^S8[x[0xE]] ^S7[x[0x8]]; + Bits32ToInts(z03, z, 0x0); + z47 = x8B ^S5[z[0x0]] ^S6[z[0x2]] ^S7[z[0x1]] ^S8[z[0x3]] ^S8[x[0xA]]; + Bits32ToInts(z47, z, 0x4); + z8B = xCF ^S5[z[0x7]] ^S6[z[0x6]] ^S7[z[0x5]] ^S8[z[0x4]] ^S5[x[0x9]]; + Bits32ToInts(z8B, z, 0x8); + zCF = x47 ^S5[z[0xA]] ^S6[z[0x9]] ^S7[z[0xB]] ^S8[z[0x8]] ^S6[x[0xB]]; + Bits32ToInts(zCF, z, 0xC); + _Kr[ 1]=(int)((S5[z[0x8]]^S6[z[0x9]]^S7[z[0x7]]^S8[z[0x6]] ^ S5[z[0x2]])&0x1f); + _Kr[ 2]=(int)((S5[z[0xA]]^S6[z[0xB]]^S7[z[0x5]]^S8[z[0x4]] ^ S6[z[0x6]])&0x1f); + _Kr[ 3]=(int)((S5[z[0xC]]^S6[z[0xD]]^S7[z[0x3]]^S8[z[0x2]] ^ S7[z[0x9]])&0x1f); + _Kr[ 4]=(int)((S5[z[0xE]]^S6[z[0xF]]^S7[z[0x1]]^S8[z[0x0]] ^ S8[z[0xC]])&0x1f); + + z03 = IntsTo32bits(z, 0x0); + z47 = IntsTo32bits(z, 0x4); + z8B = IntsTo32bits(z, 0x8); + zCF = IntsTo32bits(z, 0xC); + x03 = z8B ^S5[z[0x5]] ^S6[z[0x7]] ^S7[z[0x4]] ^S8[z[0x6]] ^S7[z[0x0]]; + Bits32ToInts(x03, x, 0x0); + x47 = z03 ^S5[x[0x0]] ^S6[x[0x2]] ^S7[x[0x1]] ^S8[x[0x3]] ^S8[z[0x2]]; + Bits32ToInts(x47, x, 0x4); + x8B = z47 ^S5[x[0x7]] ^S6[x[0x6]] ^S7[x[0x5]] ^S8[x[0x4]] ^S5[z[0x1]]; + Bits32ToInts(x8B, x, 0x8); + xCF = zCF ^S5[x[0xA]] ^S6[x[0x9]] ^S7[x[0xB]] ^S8[x[0x8]] ^S6[z[0x3]]; + Bits32ToInts(xCF, x, 0xC); + _Kr[ 5]=(int)((S5[x[0x3]]^S6[x[0x2]]^S7[x[0xC]]^S8[x[0xD]]^S5[x[0x8]])&0x1f); + _Kr[ 6]=(int)((S5[x[0x1]]^S6[x[0x0]]^S7[x[0xE]]^S8[x[0xF]]^S6[x[0xD]])&0x1f); + _Kr[ 7]=(int)((S5[x[0x7]]^S6[x[0x6]]^S7[x[0x8]]^S8[x[0x9]]^S7[x[0x3]])&0x1f); + _Kr[ 8]=(int)((S5[x[0x5]]^S6[x[0x4]]^S7[x[0xA]]^S8[x[0xB]]^S8[x[0x7]])&0x1f); + + x03 = IntsTo32bits(x, 0x0); + x47 = IntsTo32bits(x, 0x4); + x8B = IntsTo32bits(x, 0x8); + xCF = IntsTo32bits(x, 0xC); + z03 = x03 ^S5[x[0xD]] ^S6[x[0xF]] ^S7[x[0xC]] ^S8[x[0xE]] ^S7[x[0x8]]; + Bits32ToInts(z03, z, 0x0); + z47 = x8B ^S5[z[0x0]] ^S6[z[0x2]] ^S7[z[0x1]] ^S8[z[0x3]] ^S8[x[0xA]]; + Bits32ToInts(z47, z, 0x4); + z8B = xCF ^S5[z[0x7]] ^S6[z[0x6]] ^S7[z[0x5]] ^S8[z[0x4]] ^S5[x[0x9]]; + Bits32ToInts(z8B, z, 0x8); + zCF = x47 ^S5[z[0xA]] ^S6[z[0x9]] ^S7[z[0xB]] ^S8[z[0x8]] ^S6[x[0xB]]; + Bits32ToInts(zCF, z, 0xC); + _Kr[ 9]=(int)((S5[z[0x3]]^S6[z[0x2]]^S7[z[0xC]]^S8[z[0xD]]^S5[z[0x9]])&0x1f); + _Kr[10]=(int)((S5[z[0x1]]^S6[z[0x0]]^S7[z[0xE]]^S8[z[0xF]]^S6[z[0xc]])&0x1f); + _Kr[11]=(int)((S5[z[0x7]]^S6[z[0x6]]^S7[z[0x8]]^S8[z[0x9]]^S7[z[0x2]])&0x1f); + _Kr[12]=(int)((S5[z[0x5]]^S6[z[0x4]]^S7[z[0xA]]^S8[z[0xB]]^S8[z[0x6]])&0x1f); + + z03 = IntsTo32bits(z, 0x0); + z47 = IntsTo32bits(z, 0x4); + z8B = IntsTo32bits(z, 0x8); + zCF = IntsTo32bits(z, 0xC); + x03 = z8B ^S5[z[0x5]] ^S6[z[0x7]] ^S7[z[0x4]] ^S8[z[0x6]] ^S7[z[0x0]]; + Bits32ToInts(x03, x, 0x0); + x47 = z03 ^S5[x[0x0]] ^S6[x[0x2]] ^S7[x[0x1]] ^S8[x[0x3]] ^S8[z[0x2]]; + Bits32ToInts(x47, x, 0x4); + x8B = z47 ^S5[x[0x7]] ^S6[x[0x6]] ^S7[x[0x5]] ^S8[x[0x4]] ^S5[z[0x1]]; + Bits32ToInts(x8B, x, 0x8); + xCF = zCF ^S5[x[0xA]] ^S6[x[0x9]] ^S7[x[0xB]] ^S8[x[0x8]] ^S6[z[0x3]]; + Bits32ToInts(xCF, x, 0xC); + _Kr[13]=(int)((S5[x[0x8]]^S6[x[0x9]]^S7[x[0x7]]^S8[x[0x6]]^S5[x[0x3]])&0x1f); + _Kr[14]=(int)((S5[x[0xA]]^S6[x[0xB]]^S7[x[0x5]]^S8[x[0x4]]^S6[x[0x7]])&0x1f); + _Kr[15]=(int)((S5[x[0xC]]^S6[x[0xD]]^S7[x[0x3]]^S8[x[0x2]]^S7[x[0x8]])&0x1f); + _Kr[16]=(int)((S5[x[0xE]]^S6[x[0xF]]^S7[x[0x1]]^S8[x[0x0]]^S8[x[0xD]])&0x1f); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal virtual int EncryptBlock(ReadOnlySpan input, Span output) + { + // process the input block + // batch the units up into a 32 bit chunk and go for it + // the array is in bytes, the increment is 8x8 bits = 64 + + uint L0 = Pack.BE_To_UInt32(input); + uint R0 = Pack.BE_To_UInt32(input[4..]); + + uint[] result = new uint[2]; + CAST_Encipher(L0, R0, result); + + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], output); + Pack.UInt32_To_BE(result[1], output[4..]); + + return BLOCK_SIZE; + } + + internal virtual int DecryptBlock(ReadOnlySpan input, Span output) + { + // process the input block + // batch the units up into a 32 bit chunk and go for it + // the array is in bytes, the increment is 8x8 bits = 64 + uint L16 = Pack.BE_To_UInt32(input); + uint R16 = Pack.BE_To_UInt32(input[4..]); + + uint[] result = new uint[2]; + CAST_Decipher(L16, R16, result); + + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], output); + Pack.UInt32_To_BE(result[1], output[4..]); + + return BLOCK_SIZE; + } +#else + internal virtual int EncryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + // process the input block + // batch the units up into a 32 bit chunk and go for it + // the array is in bytes, the increment is 8x8 bits = 64 + + uint L0 = Pack.BE_To_UInt32(src, srcIndex); + uint R0 = Pack.BE_To_UInt32(src, srcIndex + 4); + + uint[] result = new uint[2]; + CAST_Encipher(L0, R0, result); + + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], dst, dstIndex); + Pack.UInt32_To_BE(result[1], dst, dstIndex + 4); + + return BLOCK_SIZE; + } + + internal virtual int DecryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + // process the input block + // batch the units up into a 32 bit chunk and go for it + // the array is in bytes, the increment is 8x8 bits = 64 + uint L16 = Pack.BE_To_UInt32(src, srcIndex); + uint R16 = Pack.BE_To_UInt32(src, srcIndex + 4); + + uint[] result = new uint[2]; + CAST_Decipher(L16, R16, result); + + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], dst, dstIndex); + Pack.UInt32_To_BE(result[1], dst, dstIndex + 4); + + return BLOCK_SIZE; + } +#endif + + /** + * The first of the three processing functions for the + * encryption and decryption. + * + * @param D the input to be processed + * @param Kmi the mask to be used from Km[n] + * @param Kri the rotation value to be used + * + */ + internal static uint F1(uint D, uint Kmi, int Kri) + { + uint I = Kmi + D; + I = I << Kri | (I >> (32-Kri)); + return ((S1[(I>>24)&0xff]^S2[(I>>16)&0xff])-S3[(I>>8)&0xff])+S4[I&0xff]; + } + + /** + * The second of the three processing functions for the + * encryption and decryption. + * + * @param D the input to be processed + * @param Kmi the mask to be used from Km[n] + * @param Kri the rotation value to be used + * + */ + internal static uint F2(uint D, uint Kmi, int Kri) + { + uint I = Kmi ^ D; + I = I << Kri | (I >> (32-Kri)); + return ((S1[(I>>24)&0xff]-S2[(I>>16)&0xff])+S3[(I>>8)&0xff])^S4[I&0xff]; + } + + /** + * The third of the three processing functions for the + * encryption and decryption. + * + * @param D the input to be processed + * @param Kmi the mask to be used from Km[n] + * @param Kri the rotation value to be used + * + */ + internal static uint F3(uint D, uint Kmi, int Kri) + { + uint I = Kmi - D; + I = I << Kri | (I >> (32-Kri)); + return ((S1[(I>>24)&0xff]+S2[(I>>16)&0xff])^S3[(I>>8)&0xff])-S4[I&0xff]; + } + + /** + * Does the 16 rounds to encrypt the block. + * + * @param L0 the LH-32bits of the plaintext block + * @param R0 the RH-32bits of the plaintext block + */ + internal void CAST_Encipher(uint L0, uint R0, uint[] result) + { + uint Lp = L0; // the previous value, equiv to L[i-1] + uint Rp = R0; // equivalent to R[i-1] + + /* + * numbering consistent with paper to make + * checking and validating easier + */ + uint Li = L0, Ri = R0; + + for (int i = 1; i<=_rounds ; i++) + { + Lp = Li; + Rp = Ri; + + Li = Rp; + switch (i) + { + case 1: + case 4: + case 7: + case 10: + case 13: + case 16: + Ri = Lp ^ F1(Rp, _Km[i], _Kr[i]); + break; + case 2: + case 5: + case 8: + case 11: + case 14: + Ri = Lp ^ F2(Rp, _Km[i], _Kr[i]); + break; + case 3: + case 6: + case 9: + case 12: + case 15: + Ri = Lp ^ F3(Rp, _Km[i], _Kr[i]); + break; + } + } + + result[0] = Ri; + result[1] = Li; + + return; + } + + internal void CAST_Decipher(uint L16, uint R16, uint[] result) + { + uint Lp = L16; // the previous value, equiv to L[i-1] + uint Rp = R16; // equivalent to R[i-1] + + /* + * numbering consistent with paper to make + * checking and validating easier + */ + uint Li = L16, Ri = R16; + + for (int i = _rounds; i > 0; i--) + { + Lp = Li; + Rp = Ri; + + Li = Rp; + switch (i) + { + case 1: + case 4: + case 7: + case 10: + case 13: + case 16: + Ri = Lp ^ F1(Rp, _Km[i], _Kr[i]); + break; + case 2: + case 5: + case 8: + case 11: + case 14: + Ri = Lp ^ F2(Rp, _Km[i], _Kr[i]); + break; + case 3: + case 6: + case 9: + case 12: + case 15: + Ri = Lp ^ F3(Rp, _Km[i], _Kr[i]); + break; + } + } + + result[0] = Ri; + result[1] = Li; + + return; + } + + internal static void Bits32ToInts(uint inData, int[] b, int offset) + { + b[offset + 3] = (int) (inData & 0xff); + b[offset + 2] = (int) ((inData >> 8) & 0xff); + b[offset + 1] = (int) ((inData >> 16) & 0xff); + b[offset] = (int) ((inData >> 24) & 0xff); + } + + internal static uint IntsTo32bits(int[] b, int i) + { + return (uint)(((b[i] & 0xff) << 24) | + ((b[i+1] & 0xff) << 16) | + ((b[i+2] & 0xff) << 8) | + ((b[i+3] & 0xff))); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs.meta new file mode 100644 index 00000000..72857ca1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1d5ea93366634b49a08b076c20d3beb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast5Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs new file mode 100644 index 00000000..c0bdabf0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs @@ -0,0 +1,291 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A class that provides CAST6 key encryption operations, + * such as encoding data and generating keys. + * + * All the algorithms herein are from the Internet RFC + * + * RFC2612 - CAST6 (128bit block, 128-256bit key) + * + * and implement a simplified cryptography interface. + */ + public sealed class Cast6Engine + : Cast5Engine + { + //==================================== + // Useful constants + //==================================== + private const int ROUNDS = 12; + private const int BLOCK_SIZE = 16; // bytes = 128 bits + + /* + * Put the round and mask keys into an array. + * Kr0[i] => _Kr[i*4 + 0] + */ + private int []_Kr = new int[ROUNDS*4]; // the rotating round key(s) + private uint []_Km = new uint[ROUNDS*4]; // the masking round key(s) + + /* + * Key setup + */ + private int []_Tr = new int[24 * 8]; + private uint []_Tm = new uint[24 * 8]; + private uint[] _workingKey = new uint[8]; + + public Cast6Engine() + { + } + + public override string AlgorithmName + { + get { return "CAST6"; } + } + + public override int GetBlockSize() + { + return BLOCK_SIZE; + } + + //================================== + // Private Implementation + //================================== + /* + * Creates the subkeys using the same nomenclature + * as described in RFC2612. + * + * See section 2.4 + */ + internal override void SetKey( + byte[] key) + { + uint Cm = 0x5a827999; + uint Mm = 0x6ed9eba1; + int Cr = 19; + int Mr = 17; + /* + * Determine the key size here, if required + * + * if keysize < 256 bytes, pad with 0 + * + * Typical key sizes => 128, 160, 192, 224, 256 + */ + for (int i=0; i< 24; i++) + { + for (int j=0; j< 8; j++) + { + _Tm[i*8 + j] = Cm; + Cm += Mm; //mod 2^32; + _Tr[i*8 + j] = Cr; + Cr = (Cr + Mr) & 0x1f; // mod 32 + } + } + + byte[] tmpKey = new byte[64]; + key.CopyTo(tmpKey, 0); + + // now create ABCDEFGH + for (int i = 0; i < 8; i++) + { + _workingKey[i] = Pack.BE_To_UInt32(tmpKey, i*4); + } + + // Generate the key schedule + for (int i = 0; i < 12; i++) + { + // KAPPA <- W2i(KAPPA) + int i2 = i*2 *8; + _workingKey[6] ^= F1(_workingKey[7], _Tm[i2], _Tr[i2]); + _workingKey[5] ^= F2(_workingKey[6], _Tm[i2+1], _Tr[i2+1]); + _workingKey[4] ^= F3(_workingKey[5], _Tm[i2+2], _Tr[i2+2]); + _workingKey[3] ^= F1(_workingKey[4], _Tm[i2+3], _Tr[i2+3]); + _workingKey[2] ^= F2(_workingKey[3], _Tm[i2+4], _Tr[i2+4]); + _workingKey[1] ^= F3(_workingKey[2], _Tm[i2+5], _Tr[i2+5]); + _workingKey[0] ^= F1(_workingKey[1], _Tm[i2+6], _Tr[i2+6]); + _workingKey[7] ^= F2(_workingKey[0], _Tm[i2+7], _Tr[i2+7]); + // KAPPA <- W2i+1(KAPPA) + i2 = (i*2 + 1)*8; + _workingKey[6] ^= F1(_workingKey[7], _Tm[i2], _Tr[i2]); + _workingKey[5] ^= F2(_workingKey[6], _Tm[i2+1], _Tr[i2+1]); + _workingKey[4] ^= F3(_workingKey[5], _Tm[i2+2], _Tr[i2+2]); + _workingKey[3] ^= F1(_workingKey[4], _Tm[i2+3], _Tr[i2+3]); + _workingKey[2] ^= F2(_workingKey[3], _Tm[i2+4], _Tr[i2+4]); + _workingKey[1] ^= F3(_workingKey[2], _Tm[i2+5], _Tr[i2+5]); + _workingKey[0] ^= F1(_workingKey[1], _Tm[i2+6], _Tr[i2+6]); + _workingKey[7] ^= F2(_workingKey[0], _Tm[i2+7], _Tr[i2+7]); + // Kr_(i) <- KAPPA + _Kr[i*4] = (int)(_workingKey[0] & 0x1f); + _Kr[i*4 + 1] = (int)(_workingKey[2] & 0x1f); + _Kr[i*4 + 2] = (int)(_workingKey[4] & 0x1f); + _Kr[i*4 + 3] = (int)(_workingKey[6] & 0x1f); + // Km_(i) <- KAPPA + _Km[i*4] = _workingKey[7]; + _Km[i*4 + 1] = _workingKey[5]; + _Km[i*4 + 2] = _workingKey[3]; + _Km[i*4 + 3] = _workingKey[1]; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override int EncryptBlock(ReadOnlySpan input, Span output) + { + // process the input block + // batch the units up into 4x32 bit chunks and go for it + uint A = Pack.BE_To_UInt32(input); + uint B = Pack.BE_To_UInt32(input[4..]); + uint C = Pack.BE_To_UInt32(input[8..]); + uint D = Pack.BE_To_UInt32(input[12..]); + uint[] result = new uint[4]; + CAST_Encipher(A, B, C, D, result); + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], output); + Pack.UInt32_To_BE(result[1], output[4..]); + Pack.UInt32_To_BE(result[2], output[8..]); + Pack.UInt32_To_BE(result[3], output[12..]); + return BLOCK_SIZE; + } + + internal override int DecryptBlock(ReadOnlySpan input, Span output) + { + // process the input block + // batch the units up into 4x32 bit chunks and go for it + uint A = Pack.BE_To_UInt32(input); + uint B = Pack.BE_To_UInt32(input[4..]); + uint C = Pack.BE_To_UInt32(input[8..]); + uint D = Pack.BE_To_UInt32(input[12..]); + uint[] result = new uint[4]; + CAST_Decipher(A, B, C, D, result); + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], output); + Pack.UInt32_To_BE(result[1], output[4..]); + Pack.UInt32_To_BE(result[2], output[8..]); + Pack.UInt32_To_BE(result[3], output[12..]); + return BLOCK_SIZE; + } +#else + internal override int EncryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + // process the input block + // batch the units up into 4x32 bit chunks and go for it + uint A = Pack.BE_To_UInt32(src, srcIndex); + uint B = Pack.BE_To_UInt32(src, srcIndex + 4); + uint C = Pack.BE_To_UInt32(src, srcIndex + 8); + uint D = Pack.BE_To_UInt32(src, srcIndex + 12); + uint[] result = new uint[4]; + CAST_Encipher(A, B, C, D, result); + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], dst, dstIndex); + Pack.UInt32_To_BE(result[1], dst, dstIndex + 4); + Pack.UInt32_To_BE(result[2], dst, dstIndex + 8); + Pack.UInt32_To_BE(result[3], dst, dstIndex + 12); + return BLOCK_SIZE; + } + + internal override int DecryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + // process the input block + // batch the units up into 4x32 bit chunks and go for it + uint A = Pack.BE_To_UInt32(src, srcIndex); + uint B = Pack.BE_To_UInt32(src, srcIndex + 4); + uint C = Pack.BE_To_UInt32(src, srcIndex + 8); + uint D = Pack.BE_To_UInt32(src, srcIndex + 12); + uint[] result = new uint[4]; + CAST_Decipher(A, B, C, D, result); + // now stuff them into the destination block + Pack.UInt32_To_BE(result[0], dst, dstIndex); + Pack.UInt32_To_BE(result[1], dst, dstIndex + 4); + Pack.UInt32_To_BE(result[2], dst, dstIndex + 8); + Pack.UInt32_To_BE(result[3], dst, dstIndex + 12); + return BLOCK_SIZE; + } +#endif + + /** + * Does the 12 quad rounds rounds to encrypt the block. + * + * @param A the 00-31 bits of the plaintext block + * @param B the 32-63 bits of the plaintext block + * @param C the 64-95 bits of the plaintext block + * @param D the 96-127 bits of the plaintext block + * @param result the resulting ciphertext + */ + private void CAST_Encipher( + uint A, + uint B, + uint C, + uint D, + uint[] result) + { + for (int i = 0; i < 6; i++) + { + int x = i*4; + // BETA <- Qi(BETA) + C ^= F1(D, _Km[x], _Kr[x]); + B ^= F2(C, _Km[x + 1], _Kr[x + 1]); + A ^= F3(B, _Km[x + 2], _Kr[x + 2]); + D ^= F1(A, _Km[x + 3], _Kr[x + 3]); + } + for (int i = 6; i < 12; i++) + { + int x = i*4; + // BETA <- QBARi(BETA) + D ^= F1(A, _Km[x + 3], _Kr[x + 3]); + A ^= F3(B, _Km[x + 2], _Kr[x + 2]); + B ^= F2(C, _Km[x + 1], _Kr[x + 1]); + C ^= F1(D, _Km[x], _Kr[x]); + } + result[0] = A; + result[1] = B; + result[2] = C; + result[3] = D; + } + + /** + * Does the 12 quad rounds rounds to decrypt the block. + * + * @param A the 00-31 bits of the ciphertext block + * @param B the 32-63 bits of the ciphertext block + * @param C the 64-95 bits of the ciphertext block + * @param D the 96-127 bits of the ciphertext block + * @param result the resulting plaintext + */ + private void CAST_Decipher( + uint A, + uint B, + uint C, + uint D, + uint[] result) + { + for (int i = 0; i < 6; i++) + { + int x = (11-i)*4; + // BETA <- Qi(BETA) + C ^= F1(D, _Km[x], _Kr[x]); + B ^= F2(C, _Km[x + 1], _Kr[x + 1]); + A ^= F3(B, _Km[x + 2], _Kr[x + 2]); + D ^= F1(A, _Km[x + 3], _Kr[x + 3]); + } + for (int i=6; i<12; i++) + { + int x = (11-i)*4; + // BETA <- QBARi(BETA) + D ^= F1(A, _Km[x + 3], _Kr[x + 3]); + A ^= F3(B, _Km[x + 2], _Kr[x + 2]); + B ^= F2(C, _Km[x + 1], _Kr[x + 1]); + C ^= F1(D, _Km[x], _Kr[x]); + } + result[0] = A; + result[1] = B; + result[2] = C; + result[3] = D; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs.meta new file mode 100644 index 00000000..db29ea8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc43571249c7f30419bf2fe12ecc58ac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Cast6Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs new file mode 100644 index 00000000..c4443e53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs @@ -0,0 +1,525 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Buffers.Binary; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + ///

+ /// Implementation of Daniel J. Bernstein's ChaCha stream cipher. + /// + public class ChaCha7539Engine + : Salsa20Engine + { + /// + /// Creates a 20 rounds ChaCha engine. + /// + public ChaCha7539Engine() + : base() + { + } + + public override string AlgorithmName + { + get { return "ChaCha7539"; } + } + + protected override int NonceSize + { + get { return 12; } + } + + protected override void AdvanceCounter() + { + if (++engineState[12] == 0) + throw new InvalidOperationException("attempt to increase counter past 2^32."); + } + + protected override void ResetCounter() + { + engineState[12] = 0; + } + + protected override void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if (keyBytes.Length != 32) + throw new ArgumentException(AlgorithmName + " requires 256 bit key"); + + PackTauOrSigma(keyBytes.Length, engineState, 0); + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 4, 8); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 13, 3); + } + + protected override void GenerateKeyStream(byte[] output) + { + ChaChaEngine.ChachaCore(rounds, engineState, output); + } + + internal void DoFinal(byte[] inBuf, int inOff, int inLen, byte[] outBuf, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (index != 0) + throw new InvalidOperationException(AlgorithmName + " not in block-aligned state"); + + Check.DataLength(inBuf, inOff, inLen, "input buffer too short"); + Check.OutputLength(outBuf, outOff, inLen, "output buffer too short"); + + while (inLen >= 128) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlocks2(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff)); +#else + ProcessBlocks2(inBuf, inOff, outBuf, outOff); +#endif + inOff += 128; + inLen -= 128; + outOff += 128; + } + + if (inLen >= 64) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ImplProcessBlock(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff)); +#else + ImplProcessBlock(inBuf, inOff, outBuf, outOff); +#endif + inOff += 64; + inLen -= 64; + outOff += 64; + } + + if (inLen > 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + + for (int i = 0; i < inLen; ++i) + { + outBuf[outOff + i] = (byte)(inBuf[i + inOff] ^ keyStream[i]); + } + } + + engineState[12] = 0; + + // TODO Prevent re-use if encrypting + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal void ProcessBlock(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(64U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + Debug.Assert(index == 0); + + ImplProcessBlock(input, output); + } + + internal void ProcessBlocks2(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(128U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + Debug.Assert(index == 0); + +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported) + { + ImplProcessBlocks2_X86_Avx2(rounds, engineState, input, output); + return; + } + + if (Sse2.IsSupported) + { + ImplProcessBlocks2_X86_Sse2(rounds, engineState, input, output); + return; + } +#endif + + { + ImplProcessBlock(input, output); + ImplProcessBlock(input[64..], output[64..]); + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal void ImplProcessBlock(ReadOnlySpan input, Span output) + { + ChaChaEngine.ChachaCore(rounds, engineState, keyStream); + AdvanceCounter(); + + for (int i = 0; i < 64; ++i) + { + output[i] = (byte)(keyStream[i] ^ input[i]); + } + } +#else + internal void ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(64U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + Debug.Assert(index == 0); + + ImplProcessBlock(inBytes, inOff, outBytes, outOff); + } + + internal void ProcessBlocks2(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(128U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + Debug.Assert(index == 0); + + { + ImplProcessBlock(inBytes, inOff, outBytes, outOff); + ImplProcessBlock(inBytes, inOff + 64, outBytes, outOff + 64); + } + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal void ImplProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + ChaChaEngine.ChachaCore(rounds, engineState, keyStream); + AdvanceCounter(); + + for (int i = 0; i < 64; ++i) + { + outBuf[outOff + i] = (byte)(keyStream[i] ^ inBuf[inOff + i]); + } + } +#endif + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void ImplProcessBlocks2_X86_Avx2(int rounds, uint[] state, ReadOnlySpan input, + Span output) + { + if (!Avx2.IsSupported) + throw new PlatformNotSupportedException(); + + Debug.Assert(rounds % 2 == 0); + Debug.Assert(state.Length >= 16); + Debug.Assert(input.Length >= 128); + Debug.Assert(output.Length >= 128); + + var t0 = Load128_UInt32(state.AsSpan()); + var t1 = Load128_UInt32(state.AsSpan(4)); + var t2 = Load128_UInt32(state.AsSpan(8)); + var t3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + var t4 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var x0 = Vector256.Create(t0, t0); + var x1 = Vector256.Create(t1, t1); + var x2 = Vector256.Create(t2, t2); + var x3 = Vector256.Create(t3, t4); + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 16), Avx2.ShiftRightLogical(v3, 16)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 12), Avx2.ShiftRightLogical(v1, 20)); + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 8), Avx2.ShiftRightLogical(v3, 24)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 7), Avx2.ShiftRightLogical(v1, 25)); + + v1 = Avx2.Shuffle(v1, 0x39); + v2 = Avx2.Shuffle(v2, 0x4E); + v3 = Avx2.Shuffle(v3, 0x93); + + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 16), Avx2.ShiftRightLogical(v3, 16)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 12), Avx2.ShiftRightLogical(v1, 20)); + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 8), Avx2.ShiftRightLogical(v3, 24)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 7), Avx2.ShiftRightLogical(v1, 25)); + + v1 = Avx2.Shuffle(v1, 0x93); + v2 = Avx2.Shuffle(v2, 0x4E); + v3 = Avx2.Shuffle(v3, 0x39); + } + + v0 = Avx2.Add(v0, x0); + v1 = Avx2.Add(v1, x1); + v2 = Avx2.Add(v2, x2); + v3 = Avx2.Add(v3, x3); + + var n0 = Avx2.Permute2x128(v0, v1, 0x20).AsByte(); + var n1 = Avx2.Permute2x128(v2, v3, 0x20).AsByte(); + var n2 = Avx2.Permute2x128(v0, v1, 0x31).AsByte(); + var n3 = Avx2.Permute2x128(v2, v3, 0x31).AsByte(); + + n0 = Avx2.Xor(n0, Load256_Byte(input)); + n1 = Avx2.Xor(n1, Load256_Byte(input[0x20..])); + n2 = Avx2.Xor(n2, Load256_Byte(input[0x40..])); + n3 = Avx2.Xor(n3, Load256_Byte(input[0x60..])); + + Store256_Byte(n0, output); + Store256_Byte(n1, output[0x20..]); + Store256_Byte(n2, output[0x40..]); + Store256_Byte(n3, output[0x60..]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void ImplProcessBlocks2_X86_Sse2(int rounds, uint[] state, ReadOnlySpan input, + Span output) + { + if (!Sse2.IsSupported) + throw new PlatformNotSupportedException(); + + Debug.Assert(rounds % 2 == 0); + Debug.Assert(state.Length >= 16); + Debug.Assert(input.Length >= 128); + Debug.Assert(output.Length >= 128); + + var x0 = Load128_UInt32(state.AsSpan()); + var x1 = Load128_UInt32(state.AsSpan(4)); + var x2 = Load128_UInt32(state.AsSpan(8)); + var x3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + var n0 = Load128_Byte(input); + var n1 = Load128_Byte(input[0x10..]); + var n2 = Load128_Byte(input[0x20..]); + var n3 = Load128_Byte(input[0x30..]); + + n0 = Sse2.Xor(n0, v0.AsByte()); + n1 = Sse2.Xor(n1, v1.AsByte()); + n2 = Sse2.Xor(n2, v2.AsByte()); + n3 = Sse2.Xor(n3, v3.AsByte()); + + Store128_Byte(n0, output); + Store128_Byte(n1, output[0x10..]); + Store128_Byte(n2, output[0x20..]); + Store128_Byte(n3, output[0x30..]); + + x3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + v0 = x0; + v1 = x1; + v2 = x2; + v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + n0 = Load128_Byte(input[0x40..]); + n1 = Load128_Byte(input[0x50..]); + n2 = Load128_Byte(input[0x60..]); + n3 = Load128_Byte(input[0x70..]); + + n0 = Sse2.Xor(n0, v0.AsByte()); + n1 = Sse2.Xor(n1, v1.AsByte()); + n2 = Sse2.Xor(n2, v2.AsByte()); + n3 = Sse2.Xor(n3, v3.AsByte()); + + Store128_Byte(n0, output[0x40..]); + Store128_Byte(n1, output[0x50..]); + Store128_Byte(n2, output[0x60..]); + Store128_Byte(n3, output[0x70..]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_Byte(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(t); + + return Vector128.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[8..]) + ).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_UInt32(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(MemoryMarshal.AsBytes(t)); + + return Vector128.Create(t[0], t[1], t[2], t[3]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector256 Load256_Byte(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 32) + return MemoryMarshal.Read>(t); + + return Vector256.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[ 0.. 8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[ 8..16]), + BinaryPrimitives.ReadUInt64LittleEndian(t[16..24]), + BinaryPrimitives.ReadUInt64LittleEndian(t[24..32]) + ).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128_Byte(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store256_Byte(Vector256 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 32) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[ 0.. 8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[ 8..16], u.GetElement(1)); + BinaryPrimitives.WriteUInt64LittleEndian(t[16..24], u.GetElement(2)); + BinaryPrimitives.WriteUInt64LittleEndian(t[24..32], u.GetElement(3)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs.meta new file mode 100644 index 00000000..43dde4ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2965d47a019118b408c110cb6b9aa065 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaCha7539Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs new file mode 100644 index 00000000..aaba8cde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs @@ -0,0 +1,245 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Buffers.Binary; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// Implementation of Daniel J. Bernstein's ChaCha stream cipher. + /// + public class ChaChaEngine + : Salsa20Engine + { + /// + /// Creates a 20 rounds ChaCha engine. + /// + public ChaChaEngine() + { + } + + /// + /// Creates a ChaCha engine with a specific number of rounds. + /// + /// the number of rounds (must be an even number). + public ChaChaEngine(int rounds) + : base(rounds) + { + } + + public override string AlgorithmName + { + get { return "ChaCha" + rounds; } + } + + protected override void AdvanceCounter() + { + if (++engineState[12] == 0) + { + ++engineState[13]; + } + } + + protected override void ResetCounter() + { + engineState[12] = engineState[13] = 0; + } + + protected override void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if ((keyBytes.Length != 16) && (keyBytes.Length != 32)) + throw new ArgumentException(AlgorithmName + " requires 128 bit or 256 bit key"); + + PackTauOrSigma(keyBytes.Length, engineState, 0); + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 4, 4); + Pack.LE_To_UInt32(keyBytes, keyBytes.Length - 16, engineState, 8, 4); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 14, 2); + } + + protected override void GenerateKeyStream(byte[] output) + { + ChachaCore(rounds, engineState, output); + } + + internal static void ChachaCore(int rounds, uint[] input, byte[] output) + { + Debug.Assert(rounds % 2 == 0); + Debug.Assert(input.Length >= 16); + Debug.Assert(output.Length >= 64); + +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported) + { + var x0 = Load128_UInt32(input.AsSpan()); + var x1 = Load128_UInt32(input.AsSpan(4)); + var x2 = Load128_UInt32(input.AsSpan(8)); + var x3 = Load128_UInt32(input.AsSpan(12)); + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + Store128_UInt32(v0, output.AsSpan()); + Store128_UInt32(v1, output.AsSpan(0x10)); + Store128_UInt32(v2, output.AsSpan(0x20)); + Store128_UInt32(v3, output.AsSpan(0x30)); + return; + } +#endif + + { + uint x00 = input[ 0], x01 = input[ 1], x02 = input[ 2], x03 = input[ 3]; + uint x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7]; + uint x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11]; + uint x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + x00 += x04; x12 = Integers.RotateLeft(x12 ^ x00, 16); + x01 += x05; x13 = Integers.RotateLeft(x13 ^ x01, 16); + x02 += x06; x14 = Integers.RotateLeft(x14 ^ x02, 16); + x03 += x07; x15 = Integers.RotateLeft(x15 ^ x03, 16); + + x08 += x12; x04 = Integers.RotateLeft(x04 ^ x08, 12); + x09 += x13; x05 = Integers.RotateLeft(x05 ^ x09, 12); + x10 += x14; x06 = Integers.RotateLeft(x06 ^ x10, 12); + x11 += x15; x07 = Integers.RotateLeft(x07 ^ x11, 12); + + x00 += x04; x12 = Integers.RotateLeft(x12 ^ x00, 8); + x01 += x05; x13 = Integers.RotateLeft(x13 ^ x01, 8); + x02 += x06; x14 = Integers.RotateLeft(x14 ^ x02, 8); + x03 += x07; x15 = Integers.RotateLeft(x15 ^ x03, 8); + + x08 += x12; x04 = Integers.RotateLeft(x04 ^ x08, 7); + x09 += x13; x05 = Integers.RotateLeft(x05 ^ x09, 7); + x10 += x14; x06 = Integers.RotateLeft(x06 ^ x10, 7); + x11 += x15; x07 = Integers.RotateLeft(x07 ^ x11, 7); + + x00 += x05; x15 = Integers.RotateLeft(x15 ^ x00, 16); + x01 += x06; x12 = Integers.RotateLeft(x12 ^ x01, 16); + x02 += x07; x13 = Integers.RotateLeft(x13 ^ x02, 16); + x03 += x04; x14 = Integers.RotateLeft(x14 ^ x03, 16); + + x10 += x15; x05 = Integers.RotateLeft(x05 ^ x10, 12); + x11 += x12; x06 = Integers.RotateLeft(x06 ^ x11, 12); + x08 += x13; x07 = Integers.RotateLeft(x07 ^ x08, 12); + x09 += x14; x04 = Integers.RotateLeft(x04 ^ x09, 12); + + x00 += x05; x15 = Integers.RotateLeft(x15 ^ x00, 8); + x01 += x06; x12 = Integers.RotateLeft(x12 ^ x01, 8); + x02 += x07; x13 = Integers.RotateLeft(x13 ^ x02, 8); + x03 += x04; x14 = Integers.RotateLeft(x14 ^ x03, 8); + + x10 += x15; x05 = Integers.RotateLeft(x05 ^ x10, 7); + x11 += x12; x06 = Integers.RotateLeft(x06 ^ x11, 7); + x08 += x13; x07 = Integers.RotateLeft(x07 ^ x08, 7); + x09 += x14; x04 = Integers.RotateLeft(x04 ^ x09, 7); + } + + Pack.UInt32_To_LE(x00 + input[ 0], output, 0); + Pack.UInt32_To_LE(x01 + input[ 1], output, 4); + Pack.UInt32_To_LE(x02 + input[ 2], output, 8); + Pack.UInt32_To_LE(x03 + input[ 3], output, 12); + Pack.UInt32_To_LE(x04 + input[ 4], output, 16); + Pack.UInt32_To_LE(x05 + input[ 5], output, 20); + Pack.UInt32_To_LE(x06 + input[ 6], output, 24); + Pack.UInt32_To_LE(x07 + input[ 7], output, 28); + Pack.UInt32_To_LE(x08 + input[ 8], output, 32); + Pack.UInt32_To_LE(x09 + input[ 9], output, 36); + Pack.UInt32_To_LE(x10 + input[10], output, 40); + Pack.UInt32_To_LE(x11 + input[11], output, 44); + Pack.UInt32_To_LE(x12 + input[12], output, 48); + Pack.UInt32_To_LE(x13 + input[13], output, 52); + Pack.UInt32_To_LE(x14 + input[14], output, 56); + Pack.UInt32_To_LE(x15 + input[15], output, 60); + } + } + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_UInt32(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(MemoryMarshal.AsBytes(t)); + + return Vector128.Create(t[0], t[1], t[2], t[3]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128_UInt32(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs.meta new file mode 100644 index 00000000..a3d608d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 65e438836372ad84d85fe5ff83f21d8c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ChaChaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs new file mode 100644 index 00000000..4aca8cb0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs @@ -0,0 +1,133 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// A class that provides a basic DESede (or Triple DES) engine. + public class DesEdeEngine + : DesEngine + { + private int[] workingKey1, workingKey2, workingKey3; + private bool forEncryption; + + /** + * initialise a DESede cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public override void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("invalid parameter passed to DESede init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + byte[] keyMaster = ((KeyParameter)parameters).GetKey(); + if (keyMaster.Length != 24 && keyMaster.Length != 16) + throw new ArgumentException("key size must be 16 or 24 bytes."); + + this.forEncryption = forEncryption; + + byte[] key1 = new byte[8]; + Array.Copy(keyMaster, 0, key1, 0, key1.Length); + workingKey1 = GenerateWorkingKey(forEncryption, key1); + + byte[] key2 = new byte[8]; + Array.Copy(keyMaster, 8, key2, 0, key2.Length); + workingKey2 = GenerateWorkingKey(!forEncryption, key2); + + if (keyMaster.Length == 24) + { + byte[] key3 = new byte[8]; + Array.Copy(keyMaster, 16, key3, 0, key3.Length); + workingKey3 = GenerateWorkingKey(forEncryption, key3); + } + else // 16 byte key + { + workingKey3 = workingKey1; + } + } + + public override string AlgorithmName + { + get { return "DESede"; } + } + + public override int GetBlockSize() + { + return BLOCK_SIZE; + } + + public override int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey1 == null) + throw new InvalidOperationException("DESede engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + + uint hi32 = Pack.BE_To_UInt32(input, inOff); + uint lo32 = Pack.BE_To_UInt32(input, inOff + 4); + + if (forEncryption) + { + DesFunc(workingKey1, ref hi32, ref lo32); + DesFunc(workingKey2, ref hi32, ref lo32); + DesFunc(workingKey3, ref hi32, ref lo32); + } + else + { + DesFunc(workingKey3, ref hi32, ref lo32); + DesFunc(workingKey2, ref hi32, ref lo32); + DesFunc(workingKey1, ref hi32, ref lo32); + } + + Pack.UInt32_To_BE(hi32, output, outOff); + Pack.UInt32_To_BE(lo32, output, outOff + 4); + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey1 == null) + throw new InvalidOperationException("DESede engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + uint hi32 = Pack.BE_To_UInt32(input); + uint lo32 = Pack.BE_To_UInt32(input[4..]); + + if (forEncryption) + { + DesFunc(workingKey1, ref hi32, ref lo32); + DesFunc(workingKey2, ref hi32, ref lo32); + DesFunc(workingKey3, ref hi32, ref lo32); + } + else + { + DesFunc(workingKey3, ref hi32, ref lo32); + DesFunc(workingKey2, ref hi32, ref lo32); + DesFunc(workingKey1, ref hi32, ref lo32); + } + + Pack.UInt32_To_BE(hi32, output); + Pack.UInt32_To_BE(lo32, output[4..]); + + return BLOCK_SIZE; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs.meta new file mode 100644 index 00000000..eaa54ec3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b9d0b996a0682ff4d94de11de922e1b3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs new file mode 100644 index 00000000..2ba74fcd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs @@ -0,0 +1,325 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Wrap keys according to + * + * draft-ietf-smime-key-wrap-01.txt. + *

+ * Note: + *

    + *
  • this is based on a draft, and as such is subject to change - don't use this class for anything requiring long term storage.
  • + *
  • if you are using this to wrap triple-des keys you need to set the + * parity bits on the key and, if it's a two-key triple-des key, pad it + * yourself.
  • + *
+ *

+ */ + public class DesEdeWrapEngine + : IWrapper + { + /** Field engine */ + private CbcBlockCipher engine; + /** Field param */ + private KeyParameter param; + /** Field paramPlusIV */ + private ParametersWithIV paramPlusIV; + /** Field iv */ + private byte[] iv; + /** Field forWrapping */ + private bool forWrapping; + /** Field IV2 */ + private static readonly byte[] IV2 = { (byte) 0x4a, (byte) 0xdd, (byte) 0xa2, + (byte) 0x2c, (byte) 0x79, (byte) 0xe8, + (byte) 0x21, (byte) 0x05 }; + + // + // checksum digest + // + private readonly IDigest sha1 = new Sha1Digest(); + private readonly byte[] digest = new byte[20]; + + /** + * Method init + * + * @param forWrapping + * @param param + */ + public virtual void Init( + bool forWrapping, + ICipherParameters parameters) + { + this.forWrapping = forWrapping; + this.engine = new CbcBlockCipher(new DesEdeEngine()); + + SecureRandom sr; + if (parameters is ParametersWithRandom pr) + { + parameters = pr.Parameters; + sr = pr.Random; + } + else + { + sr = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (parameters is KeyParameter) + { + this.param = (KeyParameter) parameters; + if (this.forWrapping) + { + // Hm, we have no IV but we want to wrap ?!? + // well, then we have to create our own IV. + this.iv = new byte[8]; + sr.NextBytes(iv); + + this.paramPlusIV = new ParametersWithIV(this.param, this.iv); + } + } + else if (parameters is ParametersWithIV) + { + if (!forWrapping) + throw new ArgumentException("You should not supply an IV for unwrapping"); + + this.paramPlusIV = (ParametersWithIV) parameters; + this.iv = this.paramPlusIV.GetIV(); + this.param = (KeyParameter) this.paramPlusIV.Parameters; + + if (this.iv.Length != 8) + throw new ArgumentException("IV is not 8 octets", "parameters"); + } + } + + /** + * Method GetAlgorithmName + * + * @return + */ + public virtual string AlgorithmName + { + get { return "DESede"; } + } + + /** + * Method wrap + * + * @param in + * @param inOff + * @param inLen + * @return + */ + public virtual byte[] Wrap( + byte[] input, + int inOff, + int length) + { + if (!forWrapping) + { + throw new InvalidOperationException("Not initialized for wrapping"); + } + + byte[] keyToBeWrapped = new byte[length]; + Array.Copy(input, inOff, keyToBeWrapped, 0, length); + + // Compute the CMS Key Checksum, (section 5.6.1), call this CKS. + byte[] CKS = CalculateCmsKeyChecksum(keyToBeWrapped); + + // Let WKCKS = WK || CKS where || is concatenation. + byte[] WKCKS = new byte[keyToBeWrapped.Length + CKS.Length]; + Array.Copy(keyToBeWrapped, 0, WKCKS, 0, keyToBeWrapped.Length); + Array.Copy(CKS, 0, WKCKS, keyToBeWrapped.Length, CKS.Length); + + // Encrypt WKCKS in CBC mode using KEK as the key and IV as the + // initialization vector. Call the results TEMP1. + + int blockSize = engine.GetBlockSize(); + + if (WKCKS.Length % blockSize != 0) + throw new InvalidOperationException("Not multiple of block length"); + + engine.Init(true, paramPlusIV); + + byte [] TEMP1 = new byte[WKCKS.Length]; + + for (int currentBytePos = 0; currentBytePos != WKCKS.Length; currentBytePos += blockSize) + { + engine.ProcessBlock(WKCKS, currentBytePos, TEMP1, currentBytePos); + } + + // Let TEMP2 = IV || TEMP1. + byte[] TEMP2 = new byte[this.iv.Length + TEMP1.Length]; + Array.Copy(this.iv, 0, TEMP2, 0, this.iv.Length); + Array.Copy(TEMP1, 0, TEMP2, this.iv.Length, TEMP1.Length); + + // Reverse the order of the octets in TEMP2 and call the result TEMP3. + byte[] TEMP3 = reverse(TEMP2); + + // Encrypt TEMP3 in CBC mode using the KEK and an initialization vector + // of 0x 4a dd a2 2c 79 e8 21 05. The resulting cipher text is the desired + // result. It is 40 octets long if a 168 bit key is being wrapped. + ParametersWithIV param2 = new ParametersWithIV(this.param, IV2); + this.engine.Init(true, param2); + + for (int currentBytePos = 0; currentBytePos != TEMP3.Length; currentBytePos += blockSize) + { + engine.ProcessBlock(TEMP3, currentBytePos, TEMP3, currentBytePos); + } + + return TEMP3; + } + + /** + * Method unwrap + * + * @param in + * @param inOff + * @param inLen + * @return + * @throws InvalidCipherTextException + */ + public virtual byte[] Unwrap( + byte[] input, + int inOff, + int length) + { + if (forWrapping) + { + throw new InvalidOperationException("Not set for unwrapping"); + } + if (input == null) + { + throw new InvalidCipherTextException("Null pointer as ciphertext"); + } + + int blockSize = engine.GetBlockSize(); + + if (length % blockSize != 0) + { + throw new InvalidCipherTextException("Ciphertext not multiple of " + blockSize); + } + + /* + // Check if the length of the cipher text is reasonable given the key + // type. It must be 40 bytes for a 168 bit key and either 32, 40, or + // 48 bytes for a 128, 192, or 256 bit key. If the length is not supported + // or inconsistent with the algorithm for which the key is intended, + // return error. + // + // we do not accept 168 bit keys. it has to be 192 bit. + int lengthA = (estimatedKeyLengthInBit / 8) + 16; + int lengthB = estimatedKeyLengthInBit % 8; + if ((lengthA != keyToBeUnwrapped.Length) || (lengthB != 0)) { + throw new XMLSecurityException("empty"); + } + */ + + // Decrypt the cipher text with TRIPLedeS in CBC mode using the KEK + // and an initialization vector (IV) of 0x4adda22c79e82105. Call the output TEMP3. + ParametersWithIV param2 = new ParametersWithIV(this.param, IV2); + this.engine.Init(false, param2); + + byte [] TEMP3 = new byte[length]; + + for (int currentBytePos = 0; currentBytePos != TEMP3.Length; currentBytePos += blockSize) + { + engine.ProcessBlock(input, inOff + currentBytePos, TEMP3, currentBytePos); + } + + // Reverse the order of the octets in TEMP3 and call the result TEMP2. + byte[] TEMP2 = reverse(TEMP3); + + // Decompose TEMP2 into IV, the first 8 octets, and TEMP1, the remaining octets. + this.iv = new byte[8]; + byte[] TEMP1 = new byte[TEMP2.Length - 8]; + Array.Copy(TEMP2, 0, this.iv, 0, 8); + Array.Copy(TEMP2, 8, TEMP1, 0, TEMP2.Length - 8); + + // Decrypt TEMP1 using TRIPLedeS in CBC mode using the KEK and the IV + // found in the previous step. Call the result WKCKS. + this.paramPlusIV = new ParametersWithIV(this.param, this.iv); + this.engine.Init(false, this.paramPlusIV); + + byte[] WKCKS = new byte[TEMP1.Length]; + + for (int currentBytePos = 0; currentBytePos != WKCKS.Length; currentBytePos += blockSize) + { + engine.ProcessBlock(TEMP1, currentBytePos, WKCKS, currentBytePos); + } + + // Decompose WKCKS. CKS is the last 8 octets and WK, the wrapped key, are + // those octets before the CKS. + byte[] result = new byte[WKCKS.Length - 8]; + byte[] CKStoBeVerified = new byte[8]; + Array.Copy(WKCKS, 0, result, 0, WKCKS.Length - 8); + Array.Copy(WKCKS, WKCKS.Length - 8, CKStoBeVerified, 0, 8); + + // Calculate a CMS Key Checksum, (section 5.6.1), over the WK and compare + // with the CKS extracted in the above step. If they are not equal, return error. + if (!CheckCmsKeyChecksum(result, CKStoBeVerified)) { + throw new InvalidCipherTextException( + "Checksum inside ciphertext is corrupted"); + } + + // WK is the wrapped key, now extracted for use in data decryption. + return result; + } + + /** + * Some key wrap algorithms make use of the Key Checksum defined + * in CMS [CMS-Algorithms]. This is used to provide an integrity + * check value for the key being wrapped. The algorithm is + * + * - Compute the 20 octet SHA-1 hash on the key being wrapped. + * - Use the first 8 octets of this hash as the checksum value. + * + * @param key + * @return + * @throws Exception + * @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum + */ + private byte[] CalculateCmsKeyChecksum( + byte[] key) + { + sha1.BlockUpdate(key, 0, key.Length); + sha1.DoFinal(digest, 0); + + byte[] result = new byte[8]; + Array.Copy(digest, 0, result, 0, 8); + return result; + } + + /** + * @param key + * @param checksum + * @return + * @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum + */ + private bool CheckCmsKeyChecksum( + byte[] key, + byte[] checksum) + { + return Arrays.ConstantTimeAreEqual(CalculateCmsKeyChecksum(key), checksum); + } + + private static byte[] reverse(byte[] bs) + { + byte[] result = new byte[bs.Length]; + for (int i = 0; i < bs.Length; i++) + { + result[i] = bs[bs.Length - (i + 1)]; + } + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs.meta new file mode 100644 index 00000000..df16be6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ac227cca8981f48429e77f4680486f17 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEdeWrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs new file mode 100644 index 00000000..d1182739 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs @@ -0,0 +1,485 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// A class that provides a basic DES engine. + public class DesEngine + : IBlockCipher + { + internal const int BLOCK_SIZE = 8; + + private int[] workingKey; + + public virtual int[] GetWorkingKey() + { + return workingKey; + } + + /** + * initialise a DES cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to DES init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + workingKey = GenerateWorkingKey(forEncryption, keyParameter.GetKey()); + } + + public virtual string AlgorithmName + { + get { return "DES"; } + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("DES engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + + uint hi32 = Pack.BE_To_UInt32(input, inOff); + uint lo32 = Pack.BE_To_UInt32(input, inOff + 4); + + DesFunc(workingKey, ref hi32, ref lo32); + + Pack.UInt32_To_BE(hi32, output, outOff); + Pack.UInt32_To_BE(lo32, output, outOff + 4); + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("DES engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + uint hi32 = Pack.BE_To_UInt32(input); + uint lo32 = Pack.BE_To_UInt32(input[4..]); + + DesFunc(workingKey, ref hi32, ref lo32); + + Pack.UInt32_To_BE(hi32, output); + Pack.UInt32_To_BE(lo32, output[4..]); + + return BLOCK_SIZE; + } +#endif + + /** + * what follows is mainly taken from "Applied Cryptography", by + * Bruce Schneier, however it also bears great resemblance to Richard + * Outerbridge's D3DES... + */ + +// private static readonly short[] Df_Key = +// { +// 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, +// 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10, +// 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67 +// }; + + private static readonly short[] bytebit = + { + 128, 64, 32, 16, 8, 4, 2, 1 + }; + + private static readonly int[] bigbyte = + { + 0x800000, 0x400000, 0x200000, 0x100000, + 0x80000, 0x40000, 0x20000, 0x10000, + 0x8000, 0x4000, 0x2000, 0x1000, + 0x800, 0x400, 0x200, 0x100, + 0x80, 0x40, 0x20, 0x10, + 0x8, 0x4, 0x2, 0x1 + }; + + /* + * Use the key schedule specified in the Standard (ANSI X3.92-1981). + */ + private static readonly byte[] pc1 = + { + 56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17, + 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35, + 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, + 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3 + }; + + private static readonly byte[] totrot = + { + 1, 2, 4, 6, 8, 10, 12, 14, + 15, 17, 19, 21, 23, 25, 27, 28 + }; + + private static readonly byte[] pc2 = + { + 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9, + 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1, + 40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47, + 43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31 + }; + + private static readonly uint[] SP1 = + { + 0x01010400, 0x00000000, 0x00010000, 0x01010404, + 0x01010004, 0x00010404, 0x00000004, 0x00010000, + 0x00000400, 0x01010400, 0x01010404, 0x00000400, + 0x01000404, 0x01010004, 0x01000000, 0x00000004, + 0x00000404, 0x01000400, 0x01000400, 0x00010400, + 0x00010400, 0x01010000, 0x01010000, 0x01000404, + 0x00010004, 0x01000004, 0x01000004, 0x00010004, + 0x00000000, 0x00000404, 0x00010404, 0x01000000, + 0x00010000, 0x01010404, 0x00000004, 0x01010000, + 0x01010400, 0x01000000, 0x01000000, 0x00000400, + 0x01010004, 0x00010000, 0x00010400, 0x01000004, + 0x00000400, 0x00000004, 0x01000404, 0x00010404, + 0x01010404, 0x00010004, 0x01010000, 0x01000404, + 0x01000004, 0x00000404, 0x00010404, 0x01010400, + 0x00000404, 0x01000400, 0x01000400, 0x00000000, + 0x00010004, 0x00010400, 0x00000000, 0x01010004 + }; + + private static readonly uint[] SP2 = + { + 0x80108020, 0x80008000, 0x00008000, 0x00108020, + 0x00100000, 0x00000020, 0x80100020, 0x80008020, + 0x80000020, 0x80108020, 0x80108000, 0x80000000, + 0x80008000, 0x00100000, 0x00000020, 0x80100020, + 0x00108000, 0x00100020, 0x80008020, 0x00000000, + 0x80000000, 0x00008000, 0x00108020, 0x80100000, + 0x00100020, 0x80000020, 0x00000000, 0x00108000, + 0x00008020, 0x80108000, 0x80100000, 0x00008020, + 0x00000000, 0x00108020, 0x80100020, 0x00100000, + 0x80008020, 0x80100000, 0x80108000, 0x00008000, + 0x80100000, 0x80008000, 0x00000020, 0x80108020, + 0x00108020, 0x00000020, 0x00008000, 0x80000000, + 0x00008020, 0x80108000, 0x00100000, 0x80000020, + 0x00100020, 0x80008020, 0x80000020, 0x00100020, + 0x00108000, 0x00000000, 0x80008000, 0x00008020, + 0x80000000, 0x80100020, 0x80108020, 0x00108000 + }; + + private static readonly uint[] SP3 = + { + 0x00000208, 0x08020200, 0x00000000, 0x08020008, + 0x08000200, 0x00000000, 0x00020208, 0x08000200, + 0x00020008, 0x08000008, 0x08000008, 0x00020000, + 0x08020208, 0x00020008, 0x08020000, 0x00000208, + 0x08000000, 0x00000008, 0x08020200, 0x00000200, + 0x00020200, 0x08020000, 0x08020008, 0x00020208, + 0x08000208, 0x00020200, 0x00020000, 0x08000208, + 0x00000008, 0x08020208, 0x00000200, 0x08000000, + 0x08020200, 0x08000000, 0x00020008, 0x00000208, + 0x00020000, 0x08020200, 0x08000200, 0x00000000, + 0x00000200, 0x00020008, 0x08020208, 0x08000200, + 0x08000008, 0x00000200, 0x00000000, 0x08020008, + 0x08000208, 0x00020000, 0x08000000, 0x08020208, + 0x00000008, 0x00020208, 0x00020200, 0x08000008, + 0x08020000, 0x08000208, 0x00000208, 0x08020000, + 0x00020208, 0x00000008, 0x08020008, 0x00020200 + }; + + private static readonly uint[] SP4 = + { + 0x00802001, 0x00002081, 0x00002081, 0x00000080, + 0x00802080, 0x00800081, 0x00800001, 0x00002001, + 0x00000000, 0x00802000, 0x00802000, 0x00802081, + 0x00000081, 0x00000000, 0x00800080, 0x00800001, + 0x00000001, 0x00002000, 0x00800000, 0x00802001, + 0x00000080, 0x00800000, 0x00002001, 0x00002080, + 0x00800081, 0x00000001, 0x00002080, 0x00800080, + 0x00002000, 0x00802080, 0x00802081, 0x00000081, + 0x00800080, 0x00800001, 0x00802000, 0x00802081, + 0x00000081, 0x00000000, 0x00000000, 0x00802000, + 0x00002080, 0x00800080, 0x00800081, 0x00000001, + 0x00802001, 0x00002081, 0x00002081, 0x00000080, + 0x00802081, 0x00000081, 0x00000001, 0x00002000, + 0x00800001, 0x00002001, 0x00802080, 0x00800081, + 0x00002001, 0x00002080, 0x00800000, 0x00802001, + 0x00000080, 0x00800000, 0x00002000, 0x00802080 + }; + + private static readonly uint[] SP5 = + { + 0x00000100, 0x02080100, 0x02080000, 0x42000100, + 0x00080000, 0x00000100, 0x40000000, 0x02080000, + 0x40080100, 0x00080000, 0x02000100, 0x40080100, + 0x42000100, 0x42080000, 0x00080100, 0x40000000, + 0x02000000, 0x40080000, 0x40080000, 0x00000000, + 0x40000100, 0x42080100, 0x42080100, 0x02000100, + 0x42080000, 0x40000100, 0x00000000, 0x42000000, + 0x02080100, 0x02000000, 0x42000000, 0x00080100, + 0x00080000, 0x42000100, 0x00000100, 0x02000000, + 0x40000000, 0x02080000, 0x42000100, 0x40080100, + 0x02000100, 0x40000000, 0x42080000, 0x02080100, + 0x40080100, 0x00000100, 0x02000000, 0x42080000, + 0x42080100, 0x00080100, 0x42000000, 0x42080100, + 0x02080000, 0x00000000, 0x40080000, 0x42000000, + 0x00080100, 0x02000100, 0x40000100, 0x00080000, + 0x00000000, 0x40080000, 0x02080100, 0x40000100 + }; + + private static readonly uint[] SP6 = + { + 0x20000010, 0x20400000, 0x00004000, 0x20404010, + 0x20400000, 0x00000010, 0x20404010, 0x00400000, + 0x20004000, 0x00404010, 0x00400000, 0x20000010, + 0x00400010, 0x20004000, 0x20000000, 0x00004010, + 0x00000000, 0x00400010, 0x20004010, 0x00004000, + 0x00404000, 0x20004010, 0x00000010, 0x20400010, + 0x20400010, 0x00000000, 0x00404010, 0x20404000, + 0x00004010, 0x00404000, 0x20404000, 0x20000000, + 0x20004000, 0x00000010, 0x20400010, 0x00404000, + 0x20404010, 0x00400000, 0x00004010, 0x20000010, + 0x00400000, 0x20004000, 0x20000000, 0x00004010, + 0x20000010, 0x20404010, 0x00404000, 0x20400000, + 0x00404010, 0x20404000, 0x00000000, 0x20400010, + 0x00000010, 0x00004000, 0x20400000, 0x00404010, + 0x00004000, 0x00400010, 0x20004010, 0x00000000, + 0x20404000, 0x20000000, 0x00400010, 0x20004010 + }; + + private static readonly uint[] SP7 = + { + 0x00200000, 0x04200002, 0x04000802, 0x00000000, + 0x00000800, 0x04000802, 0x00200802, 0x04200800, + 0x04200802, 0x00200000, 0x00000000, 0x04000002, + 0x00000002, 0x04000000, 0x04200002, 0x00000802, + 0x04000800, 0x00200802, 0x00200002, 0x04000800, + 0x04000002, 0x04200000, 0x04200800, 0x00200002, + 0x04200000, 0x00000800, 0x00000802, 0x04200802, + 0x00200800, 0x00000002, 0x04000000, 0x00200800, + 0x04000000, 0x00200800, 0x00200000, 0x04000802, + 0x04000802, 0x04200002, 0x04200002, 0x00000002, + 0x00200002, 0x04000000, 0x04000800, 0x00200000, + 0x04200800, 0x00000802, 0x00200802, 0x04200800, + 0x00000802, 0x04000002, 0x04200802, 0x04200000, + 0x00200800, 0x00000000, 0x00000002, 0x04200802, + 0x00000000, 0x00200802, 0x04200000, 0x00000800, + 0x04000002, 0x04000800, 0x00000800, 0x00200002 + }; + + private static readonly uint[] SP8 = + { + 0x10001040, 0x00001000, 0x00040000, 0x10041040, + 0x10000000, 0x10001040, 0x00000040, 0x10000000, + 0x00040040, 0x10040000, 0x10041040, 0x00041000, + 0x10041000, 0x00041040, 0x00001000, 0x00000040, + 0x10040000, 0x10000040, 0x10001000, 0x00001040, + 0x00041000, 0x00040040, 0x10040040, 0x10041000, + 0x00001040, 0x00000000, 0x00000000, 0x10040040, + 0x10000040, 0x10001000, 0x00041040, 0x00040000, + 0x00041040, 0x00040000, 0x10041000, 0x00001000, + 0x00000040, 0x10040040, 0x00001000, 0x00041040, + 0x10001000, 0x00000040, 0x10000040, 0x10040000, + 0x10040040, 0x10000000, 0x00040000, 0x10001040, + 0x00000000, 0x10041040, 0x00040040, 0x10000040, + 0x10040000, 0x10001000, 0x10001040, 0x00000000, + 0x10041040, 0x00041000, 0x00041000, 0x00001040, + 0x00001040, 0x00040040, 0x10000000, 0x10041000 + }; + + /** + * Generate an integer based working key based on our secret key + * and what we processing we are planning to do. + * + * Acknowledgements for this routine go to James Gillogly and Phil Karn. + * (whoever, and wherever they are!). + */ + protected static int[] GenerateWorkingKey( + bool encrypting, + byte[] key) + { + int[] newKey = new int[32]; + bool[] pc1m = new bool[56]; + bool[] pcr = new bool[56]; + + for (int j = 0; j < 56; j++ ) + { + int l = pc1[j]; + + pc1m[j] = ((key[(uint) l >> 3] & bytebit[l & 07]) != 0); + } + + for (int i = 0; i < 16; i++) + { + int l, m, n; + + if (encrypting) + { + m = i << 1; + } + else + { + m = (15 - i) << 1; + } + + n = m + 1; + newKey[m] = newKey[n] = 0; + + for (int j = 0; j < 28; j++) + { + l = j + totrot[i]; + if ( l < 28 ) + { + pcr[j] = pc1m[l]; + } + else + { + pcr[j] = pc1m[l - 28]; + } + } + + for (int j = 28; j < 56; j++) + { + l = j + totrot[i]; + if (l < 56 ) + { + pcr[j] = pc1m[l]; + } + else + { + pcr[j] = pc1m[l - 28]; + } + } + + for (int j = 0; j < 24; j++) + { + if (pcr[pc2[j]]) + { + newKey[m] |= bigbyte[j]; + } + + if (pcr[pc2[j + 24]]) + { + newKey[n] |= bigbyte[j]; + } + } + } + + // + // store the processed key + // + for (int i = 0; i != 32; i += 2) + { + int i1, i2; + + i1 = newKey[i]; + i2 = newKey[i + 1]; + + newKey[i] = (int) ( (uint) ((i1 & 0x00fc0000) << 6) | + (uint) ((i1 & 0x00000fc0) << 10) | + ((uint) (i2 & 0x00fc0000) >> 10) | + ((uint) (i2 & 0x00000fc0) >> 6)); + + newKey[i + 1] = (int) ( (uint) ((i1 & 0x0003f000) << 12) | + (uint) ((i1 & 0x0000003f) << 16) | + ((uint) (i2 & 0x0003f000) >> 4) | + (uint) (i2 & 0x0000003f)); + } + + return newKey; + } + + internal static void DesFunc(int[] wKey, ref uint hi32, ref uint lo32) + { + uint left = hi32; + uint right = lo32; + uint work; + + work = ((left >> 4) ^ right) & 0x0f0f0f0f; + right ^= work; + left ^= (work << 4); + work = ((left >> 16) ^ right) & 0x0000ffff; + right ^= work; + left ^= (work << 16); + work = ((right >> 2) ^ left) & 0x33333333; + left ^= work; + right ^= (work << 2); + work = ((right >> 8) ^ left) & 0x00ff00ff; + left ^= work; + right ^= (work << 8); + right = (right << 1) | (right >> 31); + work = (left ^ right) & 0xaaaaaaaa; + left ^= work; + right ^= work; + left = (left << 1) | (left >> 31); + + for (int round = 0; round < 8; round++) + { + uint fval; + + work = (right << 28) | (right >> 4); + work ^= (uint)wKey[round * 4 + 0]; + fval = SP7[work & 0x3f]; + fval |= SP5[(work >> 8) & 0x3f]; + fval |= SP3[(work >> 16) & 0x3f]; + fval |= SP1[(work >> 24) & 0x3f]; + work = right ^ (uint)wKey[round * 4 + 1]; + fval |= SP8[ work & 0x3f]; + fval |= SP6[(work >> 8) & 0x3f]; + fval |= SP4[(work >> 16) & 0x3f]; + fval |= SP2[(work >> 24) & 0x3f]; + left ^= fval; + work = (left << 28) | (left >> 4); + work ^= (uint)wKey[round * 4 + 2]; + fval = SP7[ work & 0x3f]; + fval |= SP5[(work >> 8) & 0x3f]; + fval |= SP3[(work >> 16) & 0x3f]; + fval |= SP1[(work >> 24) & 0x3f]; + work = left ^ (uint)wKey[round * 4 + 3]; + fval |= SP8[ work & 0x3f]; + fval |= SP6[(work >> 8) & 0x3f]; + fval |= SP4[(work >> 16) & 0x3f]; + fval |= SP2[(work >> 24) & 0x3f]; + right ^= fval; + } + + right = (right << 31) | (right >> 1); + work = (left ^ right) & 0xaaaaaaaa; + left ^= work; + right ^= work; + left = (left << 31) | (left >> 1); + work = ((left >> 8) ^ right) & 0x00ff00ff; + right ^= work; + left ^= (work << 8); + work = ((left >> 2) ^ right) & 0x33333333; + right ^= work; + left ^= (work << 2); + work = ((right >> 16) ^ left) & 0x0000ffff; + left ^= work; + right ^= (work << 16); + work = ((right >> 4) ^ left) & 0x0f0f0f0f; + left ^= work; + right ^= (work << 4); + + hi32 = right; + lo32 = left; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs.meta new file mode 100644 index 00000000..bec74746 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f64e1c4494ede7341a55137f5ffa2423 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/DesEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs new file mode 100644 index 00000000..8e60d460 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs @@ -0,0 +1,1292 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * implementation of DSTU 7624 (Kalyna) + */ + public class Dstu7624Engine + : IBlockCipher + { + private ulong[] internalState; + private ulong[] workingKey; + private ulong[][] roundKeys; + + /* Number of 64-bit words in block */ + private int wordsInBlock; + + /* Number of 64-bit words in key */ + private int wordsInKey; + + /* Number of encryption rounds depending on key length */ + private const int ROUNDS_128 = 10; + private const int ROUNDS_256 = 14; + private const int ROUNDS_512 = 18; + + private int roundsAmount; + + private bool forEncryption; + + public Dstu7624Engine(int blockSizeBits) + { + /* DSTU7624 supports 128 | 256 | 512 key/block sizes */ + if (blockSizeBits != 128 && blockSizeBits != 256 && blockSizeBits != 512) + { + throw new ArgumentException("unsupported block length: only 128/256/512 are allowed"); + } + + wordsInBlock = blockSizeBits / 64; + internalState = new ulong[wordsInBlock]; + } + + #region INITIALIZATION + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("Invalid parameter passed to Dstu7624Engine Init"); + + this.forEncryption = forEncryption; + + byte[] keyBytes = ((KeyParameter)parameters).GetKey(); + int keyBitLength = keyBytes.Length << 3; + int blockBitLength = wordsInBlock << 6; + + if (keyBitLength != 128 && keyBitLength != 256 && keyBitLength != 512) + { + throw new ArgumentException("unsupported key length: only 128/256/512 are allowed"); + } + + /* Limitations on key lengths depending on block lengths. See table 6.1 in standard */ + if (keyBitLength != blockBitLength && keyBitLength != (2 * blockBitLength)) + { + throw new ArgumentException("Unsupported key length"); + } + + switch (keyBitLength) + { + case 128: + roundsAmount = ROUNDS_128; + break; + case 256: + roundsAmount = ROUNDS_256; + break; + case 512: + roundsAmount = ROUNDS_512; + break; + } + + wordsInKey = keyBitLength / 64; + + /* +1 round key as defined in standard */ + roundKeys = new ulong[roundsAmount + 1][]; + for (int roundKeyIndex = 0; roundKeyIndex < roundKeys.Length; roundKeyIndex++) + { + roundKeys[roundKeyIndex] = new ulong[wordsInBlock]; + } + + workingKey = new ulong[wordsInKey]; + + if (keyBytes.Length != wordsInKey * 8) + { + throw new ArgumentException("Invalid key parameter passed to Dstu7624Engine Init"); + } + + /* Unpack encryption key bytes to words */ + Pack.LE_To_UInt64(keyBytes, 0, workingKey); + + ulong[] tempKeys = new ulong[wordsInBlock]; + + /* KSA in DSTU7624 is strengthened to mitigate known weaknesses in AES KSA (eprint.iacr.org/2012/260.pdf) */ + WorkingKeyExpandKT(workingKey, tempKeys); + WorkingKeyExpandEven(workingKey, tempKeys); + WorkingKeyExpandOdd(); + } + + private void WorkingKeyExpandKT(ulong[] workingKey, ulong[] tempKeys) + { + ulong[] k0 = new ulong[wordsInBlock]; + ulong[] k1 = new ulong[wordsInBlock]; + + internalState = new ulong[wordsInBlock]; + internalState[0] += (ulong)(wordsInBlock + wordsInKey + 1); + + if (wordsInBlock == wordsInKey) + { + Array.Copy(workingKey, 0, k0, 0, k0.Length); + Array.Copy(workingKey, 0, k1, 0, k1.Length); + } + else + { + Array.Copy(workingKey, 0, k0, 0, wordsInBlock); + Array.Copy(workingKey, wordsInBlock, k1, 0, wordsInBlock); + } + + + for (int wordIndex = 0; wordIndex < internalState.Length; wordIndex++) + { + internalState[wordIndex] += k0[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < internalState.Length; wordIndex++) + { + internalState[wordIndex] ^= k1[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < internalState.Length; wordIndex++) + { + internalState[wordIndex] += k0[wordIndex]; + } + + EncryptionRound(); + + Array.Copy(internalState, 0, tempKeys, 0, wordsInBlock); + } + + private void WorkingKeyExpandEven(ulong[] workingKey, ulong[] tempKey) + { + ulong[] initialData = new ulong[wordsInKey]; + ulong[] tempRoundKey = new ulong[wordsInBlock]; + + int round = 0; + + Array.Copy(workingKey, 0, initialData, 0, wordsInKey); + + ulong tmv = 0x0001000100010001UL; + + while (true) + { + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + tempRoundKey[wordIndex] = tempKey[wordIndex] + tmv; + } + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] = initialData[wordIndex] + tempRoundKey[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] ^= tempRoundKey[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] += tempRoundKey[wordIndex]; + } + + Array.Copy(internalState, 0, roundKeys[round], 0, wordsInBlock); + + if (roundsAmount == round) + { + break; + } + + if (wordsInKey != wordsInBlock) + { + round += 2; + tmv <<= 1; + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + tempRoundKey[wordIndex] = tempKey[wordIndex] + tmv; + } + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] = initialData[wordsInBlock + wordIndex] + tempRoundKey[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] ^= tempRoundKey[wordIndex]; + } + + EncryptionRound(); + + for (int wordIndex = 0; wordIndex < wordsInBlock; wordIndex++) + { + internalState[wordIndex] += tempRoundKey[wordIndex]; + } + + Array.Copy(internalState, 0, roundKeys[round], 0, wordsInBlock); + + if (roundsAmount == round) + { + break; + } + } + + round += 2; + tmv <<= 1; + + ulong temp = initialData[0]; + for (int i = 1; i < initialData.Length; ++i) + { + initialData[i - 1] = initialData[i]; + } + initialData[initialData.Length - 1] = temp; + } + } + + private void WorkingKeyExpandOdd() + { + for (int roundIndex = 1; roundIndex < roundsAmount; roundIndex += 2) + { + RotateLeft(roundKeys[roundIndex - 1], roundKeys[roundIndex]); + } + } + + #endregion + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("Dstu7624Engine not initialised"); + + Check.DataLength(input, inOff, GetBlockSize(), "input buffer too short"); + Check.OutputLength(output, outOff, GetBlockSize(), "output buffer too short"); + + if (forEncryption) + { + /* Encrypt */ + switch (wordsInBlock) + { + case 2: + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + EncryptBlock_128(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + EncryptBlock_128(input, inOff, output, outOff); +#endif + break; + } + default: + { + Pack.LE_To_UInt64(input, inOff, internalState); + AddRoundKey(0); + for (int round = 0;;) + { + EncryptionRound(); + + if (++round == roundsAmount) + { + break; + } + + XorRoundKey(round); + } + AddRoundKey(roundsAmount); + Pack.UInt64_To_LE(internalState, output, outOff); + Array.Clear(internalState, 0, internalState.Length); + break; + } + } + } + else + { + /* Decrypt */ + switch (wordsInBlock) + { + case 2: + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + DecryptBlock_128(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + DecryptBlock_128(input, inOff, output, outOff); +#endif + break; + } + default: + { + Pack.LE_To_UInt64(input, inOff, internalState); + SubRoundKey(roundsAmount); + for (int round = roundsAmount;;) + { + DecryptionRound(); + + if (--round == 0) + { + break; + } + + XorRoundKey(round); + } + SubRoundKey(0); + Pack.UInt64_To_LE(internalState, output, outOff); + Array.Clear(internalState, 0, internalState.Length); + break; + } + } + } + + return GetBlockSize(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("Dstu7624Engine not initialised"); + + Check.DataLength(input, GetBlockSize(), "input buffer too short"); + Check.OutputLength(output, GetBlockSize(), "output buffer too short"); + + if (forEncryption) + { + /* Encrypt */ + switch (wordsInBlock) + { + case 2: + { + EncryptBlock_128(input, output); + break; + } + default: + { + Pack.LE_To_UInt64(input, internalState); + AddRoundKey(0); + for (int round = 0;;) + { + EncryptionRound(); + + if (++round == roundsAmount) + { + break; + } + + XorRoundKey(round); + } + AddRoundKey(roundsAmount); + Pack.UInt64_To_LE(internalState, output); + Array.Clear(internalState, 0, internalState.Length); + break; + } + } + } + else + { + /* Decrypt */ + switch (wordsInBlock) + { + case 2: + { + DecryptBlock_128(input, output); + break; + } + default: + { + Pack.LE_To_UInt64(input, internalState); + SubRoundKey(roundsAmount); + for (int round = roundsAmount;;) + { + DecryptionRound(); + + if (--round == 0) + { + break; + } + + XorRoundKey(round); + } + SubRoundKey(0); + Pack.UInt64_To_LE(internalState, output); + Array.Clear(internalState, 0, internalState.Length); + break; + } + } + } + + return GetBlockSize(); + } +#endif + + private void EncryptionRound() + { + SubBytes(); + ShiftRows(); + MixColumns(); + } + + private void DecryptionRound() + { + MixColumnsInv(); + InvShiftRows(); + InvSubBytes(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void DecryptBlock_128(ReadOnlySpan input, Span output) + { + ulong c0 = Pack.LE_To_UInt64(input); + ulong c1 = Pack.LE_To_UInt64(input[8..]); + + ulong[] roundKey = roundKeys[roundsAmount]; + c0 -= roundKey[0]; + c1 -= roundKey[1]; + + for (int round = roundsAmount; ;) + { + c0 = MixColumnInv(c0); + c1 = MixColumnInv(c1); + + uint lo0 = (uint)c0, hi0 = (uint)(c0 >> 32); + uint lo1 = (uint)c1, hi1 = (uint)(c1 >> 32); + + { + byte t0 = T0[lo0 & 0xFF]; + byte t1 = T1[(lo0 >> 8) & 0xFF]; + byte t2 = T2[(lo0 >> 16) & 0xFF]; + byte t3 = T3[lo0 >> 24]; + lo0 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = T0[hi1 & 0xFF]; + byte t5 = T1[(hi1 >> 8) & 0xFF]; + byte t6 = T2[(hi1 >> 16) & 0xFF]; + byte t7 = T3[hi1 >> 24]; + hi1 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c0 = (ulong)lo0 | ((ulong)hi1 << 32); + } + + { + byte t0 = T0[lo1 & 0xFF]; + byte t1 = T1[(lo1 >> 8) & 0xFF]; + byte t2 = T2[(lo1 >> 16) & 0xFF]; + byte t3 = T3[lo1 >> 24]; + lo1 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = T0[hi0 & 0xFF]; + byte t5 = T1[(hi0 >> 8) & 0xFF]; + byte t6 = T2[(hi0 >> 16) & 0xFF]; + byte t7 = T3[hi0 >> 24]; + hi0 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c1 = (ulong)lo1 | ((ulong)hi0 << 32); + } + + if (--round == 0) + { + break; + } + + roundKey = roundKeys[round]; + c0 ^= roundKey[0]; + c1 ^= roundKey[1]; + } + + roundKey = roundKeys[0]; + c0 -= roundKey[0]; + c1 -= roundKey[1]; + + Pack.UInt64_To_LE(c0, output); + Pack.UInt64_To_LE(c1, output[8..]); + } + + private void EncryptBlock_128(ReadOnlySpan input, Span output) + { + ulong c0 = Pack.LE_To_UInt64(input); + ulong c1 = Pack.LE_To_UInt64(input[8..]); + + ulong[] roundKey = roundKeys[0]; + c0 += roundKey[0]; + c1 += roundKey[1]; + + for (int round = 0; ;) + { + uint lo0 = (uint)c0, hi0 = (uint)(c0 >> 32); + uint lo1 = (uint)c1, hi1 = (uint)(c1 >> 32); + + { + byte t0 = S0[lo0 & 0xFF]; + byte t1 = S1[(lo0 >> 8) & 0xFF]; + byte t2 = S2[(lo0 >> 16) & 0xFF]; + byte t3 = S3[lo0 >> 24]; + lo0 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi1 & 0xFF]; + byte t5 = S1[(hi1 >> 8) & 0xFF]; + byte t6 = S2[(hi1 >> 16) & 0xFF]; + byte t7 = S3[hi1 >> 24]; + hi1 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c0 = (ulong)lo0 | ((ulong)hi1 << 32); + } + + { + byte t0 = S0[lo1 & 0xFF]; + byte t1 = S1[(lo1 >> 8) & 0xFF]; + byte t2 = S2[(lo1 >> 16) & 0xFF]; + byte t3 = S3[lo1 >> 24]; + lo1 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi0 & 0xFF]; + byte t5 = S1[(hi0 >> 8) & 0xFF]; + byte t6 = S2[(hi0 >> 16) & 0xFF]; + byte t7 = S3[hi0 >> 24]; + hi0 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c1 = (ulong)lo1 | ((ulong)hi0 << 32); + } + + c0 = MixColumn(c0); + c1 = MixColumn(c1); + + if (++round == roundsAmount) + { + break; + } + + roundKey = roundKeys[round]; + c0 ^= roundKey[0]; + c1 ^= roundKey[1]; + } + + roundKey = roundKeys[roundsAmount]; + c0 += roundKey[0]; + c1 += roundKey[1]; + + Pack.UInt64_To_LE(c0, output); + Pack.UInt64_To_LE(c1, output[8..]); + } +#else + private void DecryptBlock_128(byte[] input, int inOff, byte[] output, int outOff) + { + ulong c0 = Pack.LE_To_UInt64(input, inOff); + ulong c1 = Pack.LE_To_UInt64(input, inOff + 8); + + ulong[] roundKey = roundKeys[roundsAmount]; + c0 -= roundKey[0]; + c1 -= roundKey[1]; + + for (int round = roundsAmount;;) + { + c0 = MixColumnInv(c0); + c1 = MixColumnInv(c1); + + uint lo0 = (uint)c0, hi0 = (uint)(c0 >> 32); + uint lo1 = (uint)c1, hi1 = (uint)(c1 >> 32); + + { + byte t0 = T0[lo0 & 0xFF]; + byte t1 = T1[(lo0 >> 8) & 0xFF]; + byte t2 = T2[(lo0 >> 16) & 0xFF]; + byte t3 = T3[lo0 >> 24]; + lo0 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = T0[hi1 & 0xFF]; + byte t5 = T1[(hi1 >> 8) & 0xFF]; + byte t6 = T2[(hi1 >> 16) & 0xFF]; + byte t7 = T3[hi1 >> 24]; + hi1 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c0 = (ulong)lo0 | ((ulong)hi1 << 32); + } + + { + byte t0 = T0[lo1 & 0xFF]; + byte t1 = T1[(lo1 >> 8) & 0xFF]; + byte t2 = T2[(lo1 >> 16) & 0xFF]; + byte t3 = T3[lo1 >> 24]; + lo1 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = T0[hi0 & 0xFF]; + byte t5 = T1[(hi0 >> 8) & 0xFF]; + byte t6 = T2[(hi0 >> 16) & 0xFF]; + byte t7 = T3[hi0 >> 24]; + hi0 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c1 = (ulong)lo1 | ((ulong)hi0 << 32); + } + + if (--round == 0) + { + break; + } + + roundKey = roundKeys[round]; + c0 ^= roundKey[0]; + c1 ^= roundKey[1]; + } + + roundKey = roundKeys[0]; + c0 -= roundKey[0]; + c1 -= roundKey[1]; + + Pack.UInt64_To_LE(c0, output, outOff); + Pack.UInt64_To_LE(c1, output, outOff + 8); + } + + private void EncryptBlock_128(byte[] input, int inOff, byte[] output, int outOff) + { + ulong c0 = Pack.LE_To_UInt64(input, inOff); + ulong c1 = Pack.LE_To_UInt64(input, inOff + 8); + + ulong[] roundKey = roundKeys[0]; + c0 += roundKey[0]; + c1 += roundKey[1]; + + for (int round = 0;;) + { + uint lo0 = (uint)c0, hi0 = (uint)(c0 >> 32); + uint lo1 = (uint)c1, hi1 = (uint)(c1 >> 32); + + { + byte t0 = S0[lo0 & 0xFF]; + byte t1 = S1[(lo0 >> 8) & 0xFF]; + byte t2 = S2[(lo0 >> 16) & 0xFF]; + byte t3 = S3[lo0 >> 24]; + lo0 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi1 & 0xFF]; + byte t5 = S1[(hi1 >> 8) & 0xFF]; + byte t6 = S2[(hi1 >> 16) & 0xFF]; + byte t7 = S3[hi1 >> 24]; + hi1 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c0 = (ulong)lo0 | ((ulong)hi1 << 32); + } + + { + byte t0 = S0[lo1 & 0xFF]; + byte t1 = S1[(lo1 >> 8) & 0xFF]; + byte t2 = S2[(lo1 >> 16) & 0xFF]; + byte t3 = S3[lo1 >> 24]; + lo1 = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi0 & 0xFF]; + byte t5 = S1[(hi0 >> 8) & 0xFF]; + byte t6 = S2[(hi0 >> 16) & 0xFF]; + byte t7 = S3[hi0 >> 24]; + hi0 = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + c1 = (ulong)lo1 | ((ulong)hi0 << 32); + } + + c0 = MixColumn(c0); + c1 = MixColumn(c1); + + if (++round == roundsAmount) + { + break; + } + + roundKey = roundKeys[round]; + c0 ^= roundKey[0]; + c1 ^= roundKey[1]; + } + + roundKey = roundKeys[roundsAmount]; + c0 += roundKey[0]; + c1 += roundKey[1]; + + Pack.UInt64_To_LE(c0, output, outOff); + Pack.UInt64_To_LE(c1, output, outOff + 8); + } +#endif + + private void SubBytes() + { + for (int i = 0; i < wordsInBlock; i++) + { + ulong u = internalState[i]; + uint lo = (uint)u, hi = (uint)(u >> 32); + byte t0 = S0[lo & 0xFF]; + byte t1 = S1[(lo >> 8) & 0xFF]; + byte t2 = S2[(lo >> 16) & 0xFF]; + byte t3 = S3[lo >> 24]; + lo = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = S0[hi & 0xFF]; + byte t5 = S1[(hi >> 8) & 0xFF]; + byte t6 = S2[(hi >> 16) & 0xFF]; + byte t7 = S3[hi >> 24]; + hi = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + internalState[i] = (ulong)lo | ((ulong)hi << 32); + } + } + + private void InvSubBytes() + { + for (int i = 0; i < wordsInBlock; i++) + { + ulong u = internalState[i]; + uint lo = (uint)u, hi = (uint)(u >> 32); + byte t0 = T0[lo & 0xFF]; + byte t1 = T1[(lo >> 8) & 0xFF]; + byte t2 = T2[(lo >> 16) & 0xFF]; + byte t3 = T3[lo >> 24]; + lo = (uint)t0 | ((uint)t1 << 8) | ((uint)t2 << 16) | ((uint)t3 << 24); + byte t4 = T0[hi & 0xFF]; + byte t5 = T1[(hi >> 8) & 0xFF]; + byte t6 = T2[(hi >> 16) & 0xFF]; + byte t7 = T3[hi >> 24]; + hi = (uint)t4 | ((uint)t5 << 8) | ((uint)t6 << 16) | ((uint)t7 << 24); + internalState[i] = (ulong)lo | ((ulong)hi << 32); + } + } + + private void ShiftRows() + { + switch (wordsInBlock) + { + case 2: + { + ulong c0 = internalState[0], c1 = internalState[1]; + ulong d; + + d = (c0 ^ c1) & 0xFFFFFFFF00000000UL; c0 ^= d; c1 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + break; + } + case 4: + { + ulong c0 = internalState[0], c1 = internalState[1], c2 = internalState[2], c3 = internalState[3]; + ulong d; + + d = (c0 ^ c2) & 0xFFFFFFFF00000000UL; c0 ^= d; c2 ^= d; + d = (c1 ^ c3) & 0x0000FFFFFFFF0000UL; c1 ^= d; c3 ^= d; + + d = (c0 ^ c1) & 0xFFFF0000FFFF0000UL; c0 ^= d; c1 ^= d; + d = (c2 ^ c3) & 0xFFFF0000FFFF0000UL; c2 ^= d; c3 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + internalState[2] = c2; + internalState[3] = c3; + break; + } + case 8: + { + ulong c0 = internalState[0], c1 = internalState[1], c2 = internalState[2], c3 = internalState[3]; + ulong c4 = internalState[4], c5 = internalState[5], c6 = internalState[6], c7 = internalState[7]; + ulong d; + + d = (c0 ^ c4) & 0xFFFFFFFF00000000UL; c0 ^= d; c4 ^= d; + d = (c1 ^ c5) & 0x00FFFFFFFF000000UL; c1 ^= d; c5 ^= d; + d = (c2 ^ c6) & 0x0000FFFFFFFF0000UL; c2 ^= d; c6 ^= d; + d = (c3 ^ c7) & 0x000000FFFFFFFF00UL; c3 ^= d; c7 ^= d; + + d = (c0 ^ c2) & 0xFFFF0000FFFF0000UL; c0 ^= d; c2 ^= d; + d = (c1 ^ c3) & 0x00FFFF0000FFFF00UL; c1 ^= d; c3 ^= d; + d = (c4 ^ c6) & 0xFFFF0000FFFF0000UL; c4 ^= d; c6 ^= d; + d = (c5 ^ c7) & 0x00FFFF0000FFFF00UL; c5 ^= d; c7 ^= d; + + d = (c0 ^ c1) & 0xFF00FF00FF00FF00UL; c0 ^= d; c1 ^= d; + d = (c2 ^ c3) & 0xFF00FF00FF00FF00UL; c2 ^= d; c3 ^= d; + d = (c4 ^ c5) & 0xFF00FF00FF00FF00UL; c4 ^= d; c5 ^= d; + d = (c6 ^ c7) & 0xFF00FF00FF00FF00UL; c6 ^= d; c7 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + internalState[2] = c2; + internalState[3] = c3; + internalState[4] = c4; + internalState[5] = c5; + internalState[6] = c6; + internalState[7] = c7; + break; + } + default: + { + throw new InvalidOperationException("unsupported block length: only 128/256/512 are allowed"); + } + } + } + + private void InvShiftRows() + { + switch (wordsInBlock) + { + case 2: + { + ulong c0 = internalState[0], c1 = internalState[1]; + ulong d; + + d = (c0 ^ c1) & 0xFFFFFFFF00000000UL; c0 ^= d; c1 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + break; + } + case 4: + { + ulong c0 = internalState[0], c1 = internalState[1], c2 = internalState[2], c3 = internalState[3]; + ulong d; + + d = (c0 ^ c1) & 0xFFFF0000FFFF0000UL; c0 ^= d; c1 ^= d; + d = (c2 ^ c3) & 0xFFFF0000FFFF0000UL; c2 ^= d; c3 ^= d; + + d = (c0 ^ c2) & 0xFFFFFFFF00000000UL; c0 ^= d; c2 ^= d; + d = (c1 ^ c3) & 0x0000FFFFFFFF0000UL; c1 ^= d; c3 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + internalState[2] = c2; + internalState[3] = c3; + break; + } + case 8: + { + ulong c0 = internalState[0], c1 = internalState[1], c2 = internalState[2], c3 = internalState[3]; + ulong c4 = internalState[4], c5 = internalState[5], c6 = internalState[6], c7 = internalState[7]; + ulong d; + + d = (c0 ^ c1) & 0xFF00FF00FF00FF00UL; c0 ^= d; c1 ^= d; + d = (c2 ^ c3) & 0xFF00FF00FF00FF00UL; c2 ^= d; c3 ^= d; + d = (c4 ^ c5) & 0xFF00FF00FF00FF00UL; c4 ^= d; c5 ^= d; + d = (c6 ^ c7) & 0xFF00FF00FF00FF00UL; c6 ^= d; c7 ^= d; + + d = (c0 ^ c2) & 0xFFFF0000FFFF0000UL; c0 ^= d; c2 ^= d; + d = (c1 ^ c3) & 0x00FFFF0000FFFF00UL; c1 ^= d; c3 ^= d; + d = (c4 ^ c6) & 0xFFFF0000FFFF0000UL; c4 ^= d; c6 ^= d; + d = (c5 ^ c7) & 0x00FFFF0000FFFF00UL; c5 ^= d; c7 ^= d; + + d = (c0 ^ c4) & 0xFFFFFFFF00000000UL; c0 ^= d; c4 ^= d; + d = (c1 ^ c5) & 0x00FFFFFFFF000000UL; c1 ^= d; c5 ^= d; + d = (c2 ^ c6) & 0x0000FFFFFFFF0000UL; c2 ^= d; c6 ^= d; + d = (c3 ^ c7) & 0x000000FFFFFFFF00UL; c3 ^= d; c7 ^= d; + + internalState[0] = c0; + internalState[1] = c1; + internalState[2] = c2; + internalState[3] = c3; + internalState[4] = c4; + internalState[5] = c5; + internalState[6] = c6; + internalState[7] = c7; + break; + } + default: + { + throw new InvalidOperationException("unsupported block length: only 128/256/512 are allowed"); + } + } + } + + private void AddRoundKey(int round) + { + ulong[] roundKey = roundKeys[round]; + for (int i = 0; i < wordsInBlock; ++i) + { + internalState[i] += roundKey[i]; + } + } + + private void SubRoundKey(int round) + { + ulong[] roundKey = roundKeys[round]; + for (int i = 0; i < wordsInBlock; ++i) + { + internalState[i] -= roundKey[i]; + } + } + + private void XorRoundKey(int round) + { + ulong[] roundKey = roundKeys[round]; + for (int i = 0; i < wordsInBlock; i++) + { + internalState[i] ^= roundKey[i]; + } + } + + private static ulong MixColumn(ulong c) + { + //// Calculate column multiplied by powers of 'x' + //ulong x0 = c; + //ulong x1 = MulX(x0); + //ulong x2 = MulX(x1); + //ulong x3 = MulX(x2); + + //// Calculate products with circulant matrix from (0x01, 0x01, 0x05, 0x01, 0x08, 0x06, 0x07, 0x04) + //ulong m0 = x0; + //ulong m1 = x0; + //ulong m2 = x0 ^ x2; + //ulong m3 = x0; + //ulong m4 = x3; + //ulong m5 = x1 ^ x2; + //ulong m6 = x0 ^ x1 ^ x2; + //ulong m7 = x2; + + //// Assemble the rotated products + //return m0 + // ^ Rotate(8, m1) + // ^ Rotate(16, m2) + // ^ Rotate(24, m3) + // ^ Rotate(32, m4) + // ^ Rotate(40, m5) + // ^ Rotate(48, m6) + // ^ Rotate(56, m7); + + ulong x1 = MulX(c); + ulong u, v; + + u = Rotate(8, c) ^ c; + u ^= Rotate(16, u); + u ^= Rotate(48, c); + + v = MulX2(u ^ c ^ x1); + + return u ^ Rotate(32, v) ^ Rotate(40, x1) ^ Rotate(48, x1); + } + + private void MixColumns() + { + for (int col = 0; col < wordsInBlock; ++col) + { + internalState[col] = MixColumn(internalState[col]); + } + } + + private static ulong MixColumnInv(ulong c) + { +/* + // Calculate column multiplied by powers of 'x' + ulong x0 = c; + ulong x1 = MulX(x0); + ulong x2 = MulX(x1); + ulong x3 = MulX(x2); + ulong x4 = MulX(x3); + ulong x5 = MulX(x4); + ulong x6 = MulX(x5); + ulong x7 = MulX(x6); + + // Calculate products with circulant matrix from (0xAD,0x95,0x76,0xA8,0x2F,0x49,0xD7,0xCA) + //long m0 = x0 ^ x2 ^ x3 ^ x5 ^ x7; + //long m1 = x0 ^ x2 ^ x4 ^ x7; + //long m2 = x1 ^ x2 ^ x4 ^ x5 ^ x6; + //long m3 = x3 ^ x5 ^ x7; + //long m4 = x0 ^ x1 ^ x2 ^ x3 ^ x5; + //long m5 = x0 ^ x3 ^ x6; + //long m6 = x0 ^ x1 ^ x2 ^ x4 ^ x6 ^ x7; + //long m7 = x1 ^ x3 ^ x6 ^ x7; + + ulong m5 = x0 ^ x3 ^ x6; + x0 ^= x2; + ulong m3 = x3 ^ x5 ^ x7; + ulong m0 = m3 ^ x0; + ulong m6 = x0 ^ x4; + ulong m1 = m6 ^ x7; + x5 ^= x1; + x7 ^= x1 ^ x6; + ulong m2 = x2 ^ x4 ^ x5 ^ x6; + ulong m4 = x0 ^ x3 ^ x5; + m6 ^= x7; + ulong m7 = x3 ^ x7; + + // Assemble the rotated products + return m0 + ^ Rotate(8, m1) + ^ Rotate(16, m2) + ^ Rotate(24, m3) + ^ Rotate(32, m4) + ^ Rotate(40, m5) + ^ Rotate(48, m6) + ^ Rotate(56, m7); +*/ + + ulong u0 = c; + u0 ^= Rotate( 8, u0); + u0 ^= Rotate(32, u0); + u0 ^= Rotate(48, c); + + ulong t = u0 ^ c; + + ulong c48 = Rotate(48, c); + ulong c56 = Rotate(56, c); + + ulong u7 = t ^ c56; + ulong u6 = Rotate(56, t); + u6 ^= MulX(u7); + ulong u5 = Rotate(16, t) ^ c; + u5 ^= Rotate(40, MulX(u6) ^ c); + ulong u4 = t ^ c48; + u4 ^= MulX(u5); + ulong u3 = Rotate(16, u0); + u3 ^= MulX(u4); + ulong u2 = t ^ Rotate(24, c) ^ c48 ^ c56; + u2 ^= MulX(u3); + ulong u1 = Rotate(32, t) ^ c ^ c56; + u1 ^= MulX(u2); + u0 ^= MulX(Rotate(40, u1)); + + return u0; + } + + private void MixColumnsInv() + { + for (int col = 0; col < wordsInBlock; ++col) + { + internalState[col] = MixColumnInv(internalState[col]); + } + } + + private static ulong MulX(ulong n) + { + return ((n & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((n & 0x8080808080808080UL) >> 7) * 0x1DUL); + } + + private static ulong MulX2(ulong n) + { + return ((n & 0x3F3F3F3F3F3F3F3FUL) << 2) ^ (((n & 0x8080808080808080UL) >> 6) * 0x1DUL) ^ (((n & 0x4040404040404040UL) >> 6) * 0x1DUL); + } + + //private static ulong MulX4(ulong n) + //{ + // ulong u = n & 0xF0F0F0F0F0F0F0F0UL; + // return ((n & 0x0F0F0F0F0F0F0F0FUL) << 4) ^ u ^ (u >> 1) ^ (u >> 2) ^ (u >> 4); + //} + + /* + * Pair-wise modular multiplication of 8 byte-pairs. + * + * REDUCTION_POLYNOMIAL is x^8 + x^4 + x^3 + x^2 + 1 + */ + //private static ulong MultiplyGFx8(ulong u, ulong v, int vMaxDegree) + //{ + // ulong r = u & ((v & 0x0101010101010101UL) * 0xFFUL); + // for (int i = 1; i <= vMaxDegree; ++i) + // { + // u = ((u & 0x7F7F7F7F7F7F7F7FUL) << 1) ^ (((u >> 7) & 0x0101010101010101UL) * 0x1DUL); + // v >>= 1; + + // r ^= u & ((v & 0x0101010101010101UL) * 0xFFUL); + // } + + // return r; + //} + + //private static ulong MultiplyMds(ulong u) + //{ + // ulong r = 0, s = 0, t = (u >> 8); + // r ^= u & 0x0000001F00000000UL; r <<= 1; + // s ^= t & 0x00000000E0000000UL; s <<= 1; + // r ^= u & 0x3F3F3F00003F0000UL; r <<= 1; + // s ^= t & 0x00C0C0C00000C000UL; s <<= 1; + // r ^= u & 0x007F7F0000000000UL; r <<= 1; + // s ^= t & 0x0000808000000000UL; s <<= 1; + // r ^= u & 0x00FF0000FFFFFFFFUL; + // r ^= s ^ (s << 2) ^ (s << 3) ^ (s << 4); + // return r; + //} + + private static ulong Rotate(int n, ulong x) + { + return (x >> n) | (x << -n); + } + + private void RotateLeft(ulong[] x, ulong[] z) + { + switch (wordsInBlock) + { + case 2: + { + ulong x0 = x[0], x1 = x[1]; + z[0] = (x0 >> 56) | (x1 << 8); + z[1] = (x1 >> 56) | (x0 << 8); + break; + } + case 4: + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + z[0] = (x1 >> 24) | (x2 << 40); + z[1] = (x2 >> 24) | (x3 << 40); + z[2] = (x3 >> 24) | (x0 << 40); + z[3] = (x0 >> 24) | (x1 << 40); + break; + } + case 8: + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + ulong x4 = x[4], x5 = x[5], x6 = x[6], x7 = x[7]; + z[0] = (x2 >> 24) | (x3 << 40); + z[1] = (x3 >> 24) | (x4 << 40); + z[2] = (x4 >> 24) | (x5 << 40); + z[3] = (x5 >> 24) | (x6 << 40); + z[4] = (x6 >> 24) | (x7 << 40); + z[5] = (x7 >> 24) | (x0 << 40); + z[6] = (x0 >> 24) | (x1 << 40); + z[7] = (x1 >> 24) | (x2 << 40); + break; + } + default: + { + throw new InvalidOperationException("unsupported block length: only 128/256/512 are allowed"); + } + } + } + +#region TABLES AND S-BOXES + + private const ulong mdsMatrix = 0x0407060801050101UL; + private const ulong mdsInvMatrix = 0xCAD7492FA87695ADUL; + + private static readonly byte[] S0 = new byte[]{ + 0xa8, 0x43, 0x5f, 0x06, 0x6b, 0x75, 0x6c, 0x59, 0x71, 0xdf, 0x87, 0x95, 0x17, 0xf0, 0xd8, 0x09, + 0x6d, 0xf3, 0x1d, 0xcb, 0xc9, 0x4d, 0x2c, 0xaf, 0x79, 0xe0, 0x97, 0xfd, 0x6f, 0x4b, 0x45, 0x39, + 0x3e, 0xdd, 0xa3, 0x4f, 0xb4, 0xb6, 0x9a, 0x0e, 0x1f, 0xbf, 0x15, 0xe1, 0x49, 0xd2, 0x93, 0xc6, + 0x92, 0x72, 0x9e, 0x61, 0xd1, 0x63, 0xfa, 0xee, 0xf4, 0x19, 0xd5, 0xad, 0x58, 0xa4, 0xbb, 0xa1, + 0xdc, 0xf2, 0x83, 0x37, 0x42, 0xe4, 0x7a, 0x32, 0x9c, 0xcc, 0xab, 0x4a, 0x8f, 0x6e, 0x04, 0x27, + 0x2e, 0xe7, 0xe2, 0x5a, 0x96, 0x16, 0x23, 0x2b, 0xc2, 0x65, 0x66, 0x0f, 0xbc, 0xa9, 0x47, 0x41, + 0x34, 0x48, 0xfc, 0xb7, 0x6a, 0x88, 0xa5, 0x53, 0x86, 0xf9, 0x5b, 0xdb, 0x38, 0x7b, 0xc3, 0x1e, + 0x22, 0x33, 0x24, 0x28, 0x36, 0xc7, 0xb2, 0x3b, 0x8e, 0x77, 0xba, 0xf5, 0x14, 0x9f, 0x08, 0x55, + 0x9b, 0x4c, 0xfe, 0x60, 0x5c, 0xda, 0x18, 0x46, 0xcd, 0x7d, 0x21, 0xb0, 0x3f, 0x1b, 0x89, 0xff, + 0xeb, 0x84, 0x69, 0x3a, 0x9d, 0xd7, 0xd3, 0x70, 0x67, 0x40, 0xb5, 0xde, 0x5d, 0x30, 0x91, 0xb1, + 0x78, 0x11, 0x01, 0xe5, 0x00, 0x68, 0x98, 0xa0, 0xc5, 0x02, 0xa6, 0x74, 0x2d, 0x0b, 0xa2, 0x76, + 0xb3, 0xbe, 0xce, 0xbd, 0xae, 0xe9, 0x8a, 0x31, 0x1c, 0xec, 0xf1, 0x99, 0x94, 0xaa, 0xf6, 0x26, + 0x2f, 0xef, 0xe8, 0x8c, 0x35, 0x03, 0xd4, 0x7f, 0xfb, 0x05, 0xc1, 0x5e, 0x90, 0x20, 0x3d, 0x82, + 0xf7, 0xea, 0x0a, 0x0d, 0x7e, 0xf8, 0x50, 0x1a, 0xc4, 0x07, 0x57, 0xb8, 0x3c, 0x62, 0xe3, 0xc8, + 0xac, 0x52, 0x64, 0x10, 0xd0, 0xd9, 0x13, 0x0c, 0x12, 0x29, 0x51, 0xb9, 0xcf, 0xd6, 0x73, 0x8d, + 0x81, 0x54, 0xc0, 0xed, 0x4e, 0x44, 0xa7, 0x2a, 0x85, 0x25, 0xe6, 0xca, 0x7c, 0x8b, 0x56, 0x80 + }; + + private static readonly byte[] S1 = new byte[]{ + 0xce, 0xbb, 0xeb, 0x92, 0xea, 0xcb, 0x13, 0xc1, 0xe9, 0x3a, 0xd6, 0xb2, 0xd2, 0x90, 0x17, 0xf8, + 0x42, 0x15, 0x56, 0xb4, 0x65, 0x1c, 0x88, 0x43, 0xc5, 0x5c, 0x36, 0xba, 0xf5, 0x57, 0x67, 0x8d, + 0x31, 0xf6, 0x64, 0x58, 0x9e, 0xf4, 0x22, 0xaa, 0x75, 0x0f, 0x02, 0xb1, 0xdf, 0x6d, 0x73, 0x4d, + 0x7c, 0x26, 0x2e, 0xf7, 0x08, 0x5d, 0x44, 0x3e, 0x9f, 0x14, 0xc8, 0xae, 0x54, 0x10, 0xd8, 0xbc, + 0x1a, 0x6b, 0x69, 0xf3, 0xbd, 0x33, 0xab, 0xfa, 0xd1, 0x9b, 0x68, 0x4e, 0x16, 0x95, 0x91, 0xee, + 0x4c, 0x63, 0x8e, 0x5b, 0xcc, 0x3c, 0x19, 0xa1, 0x81, 0x49, 0x7b, 0xd9, 0x6f, 0x37, 0x60, 0xca, + 0xe7, 0x2b, 0x48, 0xfd, 0x96, 0x45, 0xfc, 0x41, 0x12, 0x0d, 0x79, 0xe5, 0x89, 0x8c, 0xe3, 0x20, + 0x30, 0xdc, 0xb7, 0x6c, 0x4a, 0xb5, 0x3f, 0x97, 0xd4, 0x62, 0x2d, 0x06, 0xa4, 0xa5, 0x83, 0x5f, + 0x2a, 0xda, 0xc9, 0x00, 0x7e, 0xa2, 0x55, 0xbf, 0x11, 0xd5, 0x9c, 0xcf, 0x0e, 0x0a, 0x3d, 0x51, + 0x7d, 0x93, 0x1b, 0xfe, 0xc4, 0x47, 0x09, 0x86, 0x0b, 0x8f, 0x9d, 0x6a, 0x07, 0xb9, 0xb0, 0x98, + 0x18, 0x32, 0x71, 0x4b, 0xef, 0x3b, 0x70, 0xa0, 0xe4, 0x40, 0xff, 0xc3, 0xa9, 0xe6, 0x78, 0xf9, + 0x8b, 0x46, 0x80, 0x1e, 0x38, 0xe1, 0xb8, 0xa8, 0xe0, 0x0c, 0x23, 0x76, 0x1d, 0x25, 0x24, 0x05, + 0xf1, 0x6e, 0x94, 0x28, 0x9a, 0x84, 0xe8, 0xa3, 0x4f, 0x77, 0xd3, 0x85, 0xe2, 0x52, 0xf2, 0x82, + 0x50, 0x7a, 0x2f, 0x74, 0x53, 0xb3, 0x61, 0xaf, 0x39, 0x35, 0xde, 0xcd, 0x1f, 0x99, 0xac, 0xad, + 0x72, 0x2c, 0xdd, 0xd0, 0x87, 0xbe, 0x5e, 0xa6, 0xec, 0x04, 0xc6, 0x03, 0x34, 0xfb, 0xdb, 0x59, + 0xb6, 0xc2, 0x01, 0xf0, 0x5a, 0xed, 0xa7, 0x66, 0x21, 0x7f, 0x8a, 0x27, 0xc7, 0xc0, 0x29, 0xd7 + }; + + private static readonly byte[] S2 = new byte[]{ + 0x93, 0xd9, 0x9a, 0xb5, 0x98, 0x22, 0x45, 0xfc, 0xba, 0x6a, 0xdf, 0x02, 0x9f, 0xdc, 0x51, 0x59, + 0x4a, 0x17, 0x2b, 0xc2, 0x94, 0xf4, 0xbb, 0xa3, 0x62, 0xe4, 0x71, 0xd4, 0xcd, 0x70, 0x16, 0xe1, + 0x49, 0x3c, 0xc0, 0xd8, 0x5c, 0x9b, 0xad, 0x85, 0x53, 0xa1, 0x7a, 0xc8, 0x2d, 0xe0, 0xd1, 0x72, + 0xa6, 0x2c, 0xc4, 0xe3, 0x76, 0x78, 0xb7, 0xb4, 0x09, 0x3b, 0x0e, 0x41, 0x4c, 0xde, 0xb2, 0x90, + 0x25, 0xa5, 0xd7, 0x03, 0x11, 0x00, 0xc3, 0x2e, 0x92, 0xef, 0x4e, 0x12, 0x9d, 0x7d, 0xcb, 0x35, + 0x10, 0xd5, 0x4f, 0x9e, 0x4d, 0xa9, 0x55, 0xc6, 0xd0, 0x7b, 0x18, 0x97, 0xd3, 0x36, 0xe6, 0x48, + 0x56, 0x81, 0x8f, 0x77, 0xcc, 0x9c, 0xb9, 0xe2, 0xac, 0xb8, 0x2f, 0x15, 0xa4, 0x7c, 0xda, 0x38, + 0x1e, 0x0b, 0x05, 0xd6, 0x14, 0x6e, 0x6c, 0x7e, 0x66, 0xfd, 0xb1, 0xe5, 0x60, 0xaf, 0x5e, 0x33, + 0x87, 0xc9, 0xf0, 0x5d, 0x6d, 0x3f, 0x88, 0x8d, 0xc7, 0xf7, 0x1d, 0xe9, 0xec, 0xed, 0x80, 0x29, + 0x27, 0xcf, 0x99, 0xa8, 0x50, 0x0f, 0x37, 0x24, 0x28, 0x30, 0x95, 0xd2, 0x3e, 0x5b, 0x40, 0x83, + 0xb3, 0x69, 0x57, 0x1f, 0x07, 0x1c, 0x8a, 0xbc, 0x20, 0xeb, 0xce, 0x8e, 0xab, 0xee, 0x31, 0xa2, + 0x73, 0xf9, 0xca, 0x3a, 0x1a, 0xfb, 0x0d, 0xc1, 0xfe, 0xfa, 0xf2, 0x6f, 0xbd, 0x96, 0xdd, 0x43, + 0x52, 0xb6, 0x08, 0xf3, 0xae, 0xbe, 0x19, 0x89, 0x32, 0x26, 0xb0, 0xea, 0x4b, 0x64, 0x84, 0x82, + 0x6b, 0xf5, 0x79, 0xbf, 0x01, 0x5f, 0x75, 0x63, 0x1b, 0x23, 0x3d, 0x68, 0x2a, 0x65, 0xe8, 0x91, + 0xf6, 0xff, 0x13, 0x58, 0xf1, 0x47, 0x0a, 0x7f, 0xc5, 0xa7, 0xe7, 0x61, 0x5a, 0x06, 0x46, 0x44, + 0x42, 0x04, 0xa0, 0xdb, 0x39, 0x86, 0x54, 0xaa, 0x8c, 0x34, 0x21, 0x8b, 0xf8, 0x0c, 0x74, 0x67 + }; + + private static readonly byte[] S3 = new byte[]{ + 0x68, 0x8d, 0xca, 0x4d, 0x73, 0x4b, 0x4e, 0x2a, 0xd4, 0x52, 0x26, 0xb3, 0x54, 0x1e, 0x19, 0x1f, + 0x22, 0x03, 0x46, 0x3d, 0x2d, 0x4a, 0x53, 0x83, 0x13, 0x8a, 0xb7, 0xd5, 0x25, 0x79, 0xf5, 0xbd, + 0x58, 0x2f, 0x0d, 0x02, 0xed, 0x51, 0x9e, 0x11, 0xf2, 0x3e, 0x55, 0x5e, 0xd1, 0x16, 0x3c, 0x66, + 0x70, 0x5d, 0xf3, 0x45, 0x40, 0xcc, 0xe8, 0x94, 0x56, 0x08, 0xce, 0x1a, 0x3a, 0xd2, 0xe1, 0xdf, + 0xb5, 0x38, 0x6e, 0x0e, 0xe5, 0xf4, 0xf9, 0x86, 0xe9, 0x4f, 0xd6, 0x85, 0x23, 0xcf, 0x32, 0x99, + 0x31, 0x14, 0xae, 0xee, 0xc8, 0x48, 0xd3, 0x30, 0xa1, 0x92, 0x41, 0xb1, 0x18, 0xc4, 0x2c, 0x71, + 0x72, 0x44, 0x15, 0xfd, 0x37, 0xbe, 0x5f, 0xaa, 0x9b, 0x88, 0xd8, 0xab, 0x89, 0x9c, 0xfa, 0x60, + 0xea, 0xbc, 0x62, 0x0c, 0x24, 0xa6, 0xa8, 0xec, 0x67, 0x20, 0xdb, 0x7c, 0x28, 0xdd, 0xac, 0x5b, + 0x34, 0x7e, 0x10, 0xf1, 0x7b, 0x8f, 0x63, 0xa0, 0x05, 0x9a, 0x43, 0x77, 0x21, 0xbf, 0x27, 0x09, + 0xc3, 0x9f, 0xb6, 0xd7, 0x29, 0xc2, 0xeb, 0xc0, 0xa4, 0x8b, 0x8c, 0x1d, 0xfb, 0xff, 0xc1, 0xb2, + 0x97, 0x2e, 0xf8, 0x65, 0xf6, 0x75, 0x07, 0x04, 0x49, 0x33, 0xe4, 0xd9, 0xb9, 0xd0, 0x42, 0xc7, + 0x6c, 0x90, 0x00, 0x8e, 0x6f, 0x50, 0x01, 0xc5, 0xda, 0x47, 0x3f, 0xcd, 0x69, 0xa2, 0xe2, 0x7a, + 0xa7, 0xc6, 0x93, 0x0f, 0x0a, 0x06, 0xe6, 0x2b, 0x96, 0xa3, 0x1c, 0xaf, 0x6a, 0x12, 0x84, 0x39, + 0xe7, 0xb0, 0x82, 0xf7, 0xfe, 0x9d, 0x87, 0x5c, 0x81, 0x35, 0xde, 0xb4, 0xa5, 0xfc, 0x80, 0xef, + 0xcb, 0xbb, 0x6b, 0x76, 0xba, 0x5a, 0x7d, 0x78, 0x0b, 0x95, 0xe3, 0xad, 0x74, 0x98, 0x3b, 0x36, + 0x64, 0x6d, 0xdc, 0xf0, 0x59, 0xa9, 0x4c, 0x17, 0x7f, 0x91, 0xb8, 0xc9, 0x57, 0x1b, 0xe0, 0x61 + }; + + private static readonly byte[] T0 = new byte[]{ + 0xa4, 0xa2, 0xa9, 0xc5, 0x4e, 0xc9, 0x03, 0xd9, 0x7e, 0x0f, 0xd2, 0xad, 0xe7, 0xd3, 0x27, 0x5b, + 0xe3, 0xa1, 0xe8, 0xe6, 0x7c, 0x2a, 0x55, 0x0c, 0x86, 0x39, 0xd7, 0x8d, 0xb8, 0x12, 0x6f, 0x28, + 0xcd, 0x8a, 0x70, 0x56, 0x72, 0xf9, 0xbf, 0x4f, 0x73, 0xe9, 0xf7, 0x57, 0x16, 0xac, 0x50, 0xc0, + 0x9d, 0xb7, 0x47, 0x71, 0x60, 0xc4, 0x74, 0x43, 0x6c, 0x1f, 0x93, 0x77, 0xdc, 0xce, 0x20, 0x8c, + 0x99, 0x5f, 0x44, 0x01, 0xf5, 0x1e, 0x87, 0x5e, 0x61, 0x2c, 0x4b, 0x1d, 0x81, 0x15, 0xf4, 0x23, + 0xd6, 0xea, 0xe1, 0x67, 0xf1, 0x7f, 0xfe, 0xda, 0x3c, 0x07, 0x53, 0x6a, 0x84, 0x9c, 0xcb, 0x02, + 0x83, 0x33, 0xdd, 0x35, 0xe2, 0x59, 0x5a, 0x98, 0xa5, 0x92, 0x64, 0x04, 0x06, 0x10, 0x4d, 0x1c, + 0x97, 0x08, 0x31, 0xee, 0xab, 0x05, 0xaf, 0x79, 0xa0, 0x18, 0x46, 0x6d, 0xfc, 0x89, 0xd4, 0xc7, + 0xff, 0xf0, 0xcf, 0x42, 0x91, 0xf8, 0x68, 0x0a, 0x65, 0x8e, 0xb6, 0xfd, 0xc3, 0xef, 0x78, 0x4c, + 0xcc, 0x9e, 0x30, 0x2e, 0xbc, 0x0b, 0x54, 0x1a, 0xa6, 0xbb, 0x26, 0x80, 0x48, 0x94, 0x32, 0x7d, + 0xa7, 0x3f, 0xae, 0x22, 0x3d, 0x66, 0xaa, 0xf6, 0x00, 0x5d, 0xbd, 0x4a, 0xe0, 0x3b, 0xb4, 0x17, + 0x8b, 0x9f, 0x76, 0xb0, 0x24, 0x9a, 0x25, 0x63, 0xdb, 0xeb, 0x7a, 0x3e, 0x5c, 0xb3, 0xb1, 0x29, + 0xf2, 0xca, 0x58, 0x6e, 0xd8, 0xa8, 0x2f, 0x75, 0xdf, 0x14, 0xfb, 0x13, 0x49, 0x88, 0xb2, 0xec, + 0xe4, 0x34, 0x2d, 0x96, 0xc6, 0x3a, 0xed, 0x95, 0x0e, 0xe5, 0x85, 0x6b, 0x40, 0x21, 0x9b, 0x09, + 0x19, 0x2b, 0x52, 0xde, 0x45, 0xa3, 0xfa, 0x51, 0xc2, 0xb5, 0xd1, 0x90, 0xb9, 0xf3, 0x37, 0xc1, + 0x0d, 0xba, 0x41, 0x11, 0x38, 0x7b, 0xbe, 0xd0, 0xd5, 0x69, 0x36, 0xc8, 0x62, 0x1b, 0x82, 0x8f + }; + + private static readonly byte[] T1 = new byte[]{ + 0x83, 0xf2, 0x2a, 0xeb, 0xe9, 0xbf, 0x7b, 0x9c, 0x34, 0x96, 0x8d, 0x98, 0xb9, 0x69, 0x8c, 0x29, + 0x3d, 0x88, 0x68, 0x06, 0x39, 0x11, 0x4c, 0x0e, 0xa0, 0x56, 0x40, 0x92, 0x15, 0xbc, 0xb3, 0xdc, + 0x6f, 0xf8, 0x26, 0xba, 0xbe, 0xbd, 0x31, 0xfb, 0xc3, 0xfe, 0x80, 0x61, 0xe1, 0x7a, 0x32, 0xd2, + 0x70, 0x20, 0xa1, 0x45, 0xec, 0xd9, 0x1a, 0x5d, 0xb4, 0xd8, 0x09, 0xa5, 0x55, 0x8e, 0x37, 0x76, + 0xa9, 0x67, 0x10, 0x17, 0x36, 0x65, 0xb1, 0x95, 0x62, 0x59, 0x74, 0xa3, 0x50, 0x2f, 0x4b, 0xc8, + 0xd0, 0x8f, 0xcd, 0xd4, 0x3c, 0x86, 0x12, 0x1d, 0x23, 0xef, 0xf4, 0x53, 0x19, 0x35, 0xe6, 0x7f, + 0x5e, 0xd6, 0x79, 0x51, 0x22, 0x14, 0xf7, 0x1e, 0x4a, 0x42, 0x9b, 0x41, 0x73, 0x2d, 0xc1, 0x5c, + 0xa6, 0xa2, 0xe0, 0x2e, 0xd3, 0x28, 0xbb, 0xc9, 0xae, 0x6a, 0xd1, 0x5a, 0x30, 0x90, 0x84, 0xf9, + 0xb2, 0x58, 0xcf, 0x7e, 0xc5, 0xcb, 0x97, 0xe4, 0x16, 0x6c, 0xfa, 0xb0, 0x6d, 0x1f, 0x52, 0x99, + 0x0d, 0x4e, 0x03, 0x91, 0xc2, 0x4d, 0x64, 0x77, 0x9f, 0xdd, 0xc4, 0x49, 0x8a, 0x9a, 0x24, 0x38, + 0xa7, 0x57, 0x85, 0xc7, 0x7c, 0x7d, 0xe7, 0xf6, 0xb7, 0xac, 0x27, 0x46, 0xde, 0xdf, 0x3b, 0xd7, + 0x9e, 0x2b, 0x0b, 0xd5, 0x13, 0x75, 0xf0, 0x72, 0xb6, 0x9d, 0x1b, 0x01, 0x3f, 0x44, 0xe5, 0x87, + 0xfd, 0x07, 0xf1, 0xab, 0x94, 0x18, 0xea, 0xfc, 0x3a, 0x82, 0x5f, 0x05, 0x54, 0xdb, 0x00, 0x8b, + 0xe3, 0x48, 0x0c, 0xca, 0x78, 0x89, 0x0a, 0xff, 0x3e, 0x5b, 0x81, 0xee, 0x71, 0xe2, 0xda, 0x2c, + 0xb8, 0xb5, 0xcc, 0x6e, 0xa8, 0x6b, 0xad, 0x60, 0xc6, 0x08, 0x04, 0x02, 0xe8, 0xf5, 0x4f, 0xa4, + 0xf3, 0xc0, 0xce, 0x43, 0x25, 0x1c, 0x21, 0x33, 0x0f, 0xaf, 0x47, 0xed, 0x66, 0x63, 0x93, 0xaa + }; + + private static readonly byte[] T2 = new byte[]{ + 0x45, 0xd4, 0x0b, 0x43, 0xf1, 0x72, 0xed, 0xa4, 0xc2, 0x38, 0xe6, 0x71, 0xfd, 0xb6, 0x3a, 0x95, + 0x50, 0x44, 0x4b, 0xe2, 0x74, 0x6b, 0x1e, 0x11, 0x5a, 0xc6, 0xb4, 0xd8, 0xa5, 0x8a, 0x70, 0xa3, + 0xa8, 0xfa, 0x05, 0xd9, 0x97, 0x40, 0xc9, 0x90, 0x98, 0x8f, 0xdc, 0x12, 0x31, 0x2c, 0x47, 0x6a, + 0x99, 0xae, 0xc8, 0x7f, 0xf9, 0x4f, 0x5d, 0x96, 0x6f, 0xf4, 0xb3, 0x39, 0x21, 0xda, 0x9c, 0x85, + 0x9e, 0x3b, 0xf0, 0xbf, 0xef, 0x06, 0xee, 0xe5, 0x5f, 0x20, 0x10, 0xcc, 0x3c, 0x54, 0x4a, 0x52, + 0x94, 0x0e, 0xc0, 0x28, 0xf6, 0x56, 0x60, 0xa2, 0xe3, 0x0f, 0xec, 0x9d, 0x24, 0x83, 0x7e, 0xd5, + 0x7c, 0xeb, 0x18, 0xd7, 0xcd, 0xdd, 0x78, 0xff, 0xdb, 0xa1, 0x09, 0xd0, 0x76, 0x84, 0x75, 0xbb, + 0x1d, 0x1a, 0x2f, 0xb0, 0xfe, 0xd6, 0x34, 0x63, 0x35, 0xd2, 0x2a, 0x59, 0x6d, 0x4d, 0x77, 0xe7, + 0x8e, 0x61, 0xcf, 0x9f, 0xce, 0x27, 0xf5, 0x80, 0x86, 0xc7, 0xa6, 0xfb, 0xf8, 0x87, 0xab, 0x62, + 0x3f, 0xdf, 0x48, 0x00, 0x14, 0x9a, 0xbd, 0x5b, 0x04, 0x92, 0x02, 0x25, 0x65, 0x4c, 0x53, 0x0c, + 0xf2, 0x29, 0xaf, 0x17, 0x6c, 0x41, 0x30, 0xe9, 0x93, 0x55, 0xf7, 0xac, 0x68, 0x26, 0xc4, 0x7d, + 0xca, 0x7a, 0x3e, 0xa0, 0x37, 0x03, 0xc1, 0x36, 0x69, 0x66, 0x08, 0x16, 0xa7, 0xbc, 0xc5, 0xd3, + 0x22, 0xb7, 0x13, 0x46, 0x32, 0xe8, 0x57, 0x88, 0x2b, 0x81, 0xb2, 0x4e, 0x64, 0x1c, 0xaa, 0x91, + 0x58, 0x2e, 0x9b, 0x5c, 0x1b, 0x51, 0x73, 0x42, 0x23, 0x01, 0x6e, 0xf3, 0x0d, 0xbe, 0x3d, 0x0a, + 0x2d, 0x1f, 0x67, 0x33, 0x19, 0x7b, 0x5e, 0xea, 0xde, 0x8b, 0xcb, 0xa9, 0x8c, 0x8d, 0xad, 0x49, + 0x82, 0xe4, 0xba, 0xc3, 0x15, 0xd1, 0xe0, 0x89, 0xfc, 0xb1, 0xb9, 0xb5, 0x07, 0x79, 0xb8, 0xe1 + }; + + private static readonly byte[] T3 = new byte[]{ + 0xb2, 0xb6, 0x23, 0x11, 0xa7, 0x88, 0xc5, 0xa6, 0x39, 0x8f, 0xc4, 0xe8, 0x73, 0x22, 0x43, 0xc3, + 0x82, 0x27, 0xcd, 0x18, 0x51, 0x62, 0x2d, 0xf7, 0x5c, 0x0e, 0x3b, 0xfd, 0xca, 0x9b, 0x0d, 0x0f, + 0x79, 0x8c, 0x10, 0x4c, 0x74, 0x1c, 0x0a, 0x8e, 0x7c, 0x94, 0x07, 0xc7, 0x5e, 0x14, 0xa1, 0x21, + 0x57, 0x50, 0x4e, 0xa9, 0x80, 0xd9, 0xef, 0x64, 0x41, 0xcf, 0x3c, 0xee, 0x2e, 0x13, 0x29, 0xba, + 0x34, 0x5a, 0xae, 0x8a, 0x61, 0x33, 0x12, 0xb9, 0x55, 0xa8, 0x15, 0x05, 0xf6, 0x03, 0x06, 0x49, + 0xb5, 0x25, 0x09, 0x16, 0x0c, 0x2a, 0x38, 0xfc, 0x20, 0xf4, 0xe5, 0x7f, 0xd7, 0x31, 0x2b, 0x66, + 0x6f, 0xff, 0x72, 0x86, 0xf0, 0xa3, 0x2f, 0x78, 0x00, 0xbc, 0xcc, 0xe2, 0xb0, 0xf1, 0x42, 0xb4, + 0x30, 0x5f, 0x60, 0x04, 0xec, 0xa5, 0xe3, 0x8b, 0xe7, 0x1d, 0xbf, 0x84, 0x7b, 0xe6, 0x81, 0xf8, + 0xde, 0xd8, 0xd2, 0x17, 0xce, 0x4b, 0x47, 0xd6, 0x69, 0x6c, 0x19, 0x99, 0x9a, 0x01, 0xb3, 0x85, + 0xb1, 0xf9, 0x59, 0xc2, 0x37, 0xe9, 0xc8, 0xa0, 0xed, 0x4f, 0x89, 0x68, 0x6d, 0xd5, 0x26, 0x91, + 0x87, 0x58, 0xbd, 0xc9, 0x98, 0xdc, 0x75, 0xc0, 0x76, 0xf5, 0x67, 0x6b, 0x7e, 0xeb, 0x52, 0xcb, + 0xd1, 0x5b, 0x9f, 0x0b, 0xdb, 0x40, 0x92, 0x1a, 0xfa, 0xac, 0xe4, 0xe1, 0x71, 0x1f, 0x65, 0x8d, + 0x97, 0x9e, 0x95, 0x90, 0x5d, 0xb7, 0xc1, 0xaf, 0x54, 0xfb, 0x02, 0xe0, 0x35, 0xbb, 0x3a, 0x4d, + 0xad, 0x2c, 0x3d, 0x56, 0x08, 0x1b, 0x4a, 0x93, 0x6a, 0xab, 0xb8, 0x7a, 0xf2, 0x7d, 0xda, 0x3f, + 0xfe, 0x3e, 0xbe, 0xea, 0xaa, 0x44, 0xc6, 0xd0, 0x36, 0x48, 0x70, 0x96, 0x77, 0x24, 0x53, 0xdf, + 0xf3, 0x83, 0x28, 0x32, 0x45, 0x1e, 0xa4, 0xd3, 0xa2, 0x46, 0x6e, 0x9c, 0xdd, 0x63, 0xd4, 0x9d + }; + +#endregion + + public virtual string AlgorithmName + { + get { return "DSTU7624"; } + } + + public virtual int GetBlockSize() + { + return wordsInBlock << 3; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs.meta new file mode 100644 index 00000000..6961a559 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a37d3ab8260c4ab4691df35eea1003e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs new file mode 100644 index 00000000..707451f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs @@ -0,0 +1,220 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public class Dstu7624WrapEngine + : IWrapper + { + private KeyParameter param; + private Dstu7624Engine engine; + private bool forWrapping; + private int blockSize; + + public Dstu7624WrapEngine(int blockSizeBits) + { + engine = new Dstu7624Engine(blockSizeBits); + param = null; + + blockSize = blockSizeBits / 8; + } + + public string AlgorithmName + { + get { return "Dstu7624WrapEngine"; } + } + + public void Init(bool forWrapping, ICipherParameters parameters) + { + this.forWrapping = forWrapping; + + if (parameters is KeyParameter) + { + this.param = (KeyParameter)parameters; + + engine.Init(forWrapping, param); + } + else + { + throw new ArgumentException("Bad parameters passed to Dstu7624WrapEngine"); + } + } + + public byte[] Wrap(byte[] input, int inOff, int length) + { + if (!forWrapping) + throw new InvalidOperationException("Not set for wrapping"); + + if (length % blockSize != 0) + throw new ArgumentException("Padding not supported"); + + int n = 2 * (1 + length / blockSize); + int V = (n - 1) * 6; + + byte[] buffer = new byte[length + blockSize]; + Array.Copy(input, inOff, buffer, 0, length); + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + + byte[] B = new byte[blockSize / 2]; + Array.Copy(buffer, 0, B, 0, blockSize / 2); + //Console.WriteLine("B0: "+ Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B)); + + var bTemp = new List(); + int bHalfBlocksLen = buffer.Length - blockSize / 2; + int bufOff = blockSize / 2; + while (bHalfBlocksLen != 0) + { + byte[] temp = new byte[blockSize / 2]; + Array.Copy(buffer, bufOff, temp, 0, blockSize / 2); + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + //Console.WriteLine(buffer.Length); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(temp)); + + bTemp.Add(temp); + + bHalfBlocksLen -= blockSize / 2; + bufOff += blockSize / 2; + } + + for (int j = 0; j < V; j++) + { + Array.Copy(B, 0, buffer, 0, blockSize / 2); + Array.Copy(bTemp[0], 0, buffer, blockSize / 2, blockSize / 2); + + engine.ProcessBlock(buffer, 0, buffer, 0); + + byte[] intArray = Pack.UInt32_To_LE((uint)(j + 1)); + for (int byteNum = 0; byteNum < intArray.Length; byteNum++) + { + buffer[byteNum + blockSize / 2] ^= intArray[byteNum]; + } + + Array.Copy(buffer, blockSize / 2, B, 0, blockSize / 2); + + for (int i = 2; i < n; i++) + { + Array.Copy(bTemp[i - 1], 0, bTemp[i - 2], 0, blockSize / 2); + } + + Array.Copy(buffer, 0, bTemp[n - 2], 0, blockSize / 2); + + //Console.WriteLine("B" + j.ToString() + ": " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B)); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[0])); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[1])); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[2])); + + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + } + + Array.Copy(B, 0, buffer, 0, blockSize / 2); + bufOff = blockSize / 2; + + for (int i = 0; i < n - 1; i++) + { + Array.Copy((byte[])bTemp[i], 0, buffer, bufOff, blockSize / 2); + bufOff += blockSize / 2; + } + + return buffer; + } + + public byte[] Unwrap(byte[] input, int inOff, int length) + { + if (forWrapping) + throw new InvalidOperationException("not set for unwrapping"); + + if (length % blockSize != 0) + throw new ArgumentException("Padding not supported"); + + int n = 2 * length / blockSize; + int V = (n - 1) * 6; + + byte[] buffer = new byte[length]; + Array.Copy(input, inOff, buffer, 0, length); + + byte[] B = new byte[blockSize / 2]; + Array.Copy(buffer, 0, B, 0, blockSize / 2); + //Console.WriteLine("B18: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B)); + + var bTemp = new List(); + + int bHalfBlocksLen = buffer.Length - blockSize / 2; + int bufOff = blockSize / 2; + while (bHalfBlocksLen != 0) + { + byte[] temp = new byte[blockSize / 2]; + Array.Copy(buffer, bufOff, temp, 0, blockSize / 2); + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + //Console.WriteLine(buffer.Length); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(temp)); + + bTemp.Add(temp); + + bHalfBlocksLen -= blockSize / 2; + bufOff += blockSize / 2; + } + + for (int j = 0; j < V; j++) + { + Array.Copy(bTemp[n - 2], 0, buffer, 0, blockSize / 2); + Array.Copy(B, 0, buffer, blockSize / 2, blockSize / 2); + + byte[] intArray = Pack.UInt32_To_LE((uint)(V - j)); + for (int byteNum = 0; byteNum < intArray.Length; byteNum++) + { + buffer[byteNum + blockSize / 2] ^= intArray[byteNum]; + } + + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + + engine.ProcessBlock(buffer, 0, buffer, 0); + + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + + Array.Copy(buffer, 0, B, 0, blockSize / 2); + + for (int i = 2; i < n; i++) + { + Array.Copy(bTemp[n - i - 1], 0, bTemp[n - i], 0, blockSize / 2); + } + + Array.Copy(buffer, blockSize / 2, bTemp[0], 0, blockSize / 2); + + //Console.WriteLine("B" + (V - j - 1).ToString() + ": " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(B)); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[0])); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[1])); + //Console.WriteLine("b: " + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(bTemp[2])); + + //Console.WriteLine(Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders.Hex.ToHexString(buffer)); + } + + Array.Copy(B, 0, buffer, 0, blockSize / 2); + bufOff = blockSize / 2; + + for (int i = 0; i < n - 1; i++) + { + Array.Copy(bTemp[i], 0, buffer, bufOff, blockSize / 2); + bufOff += blockSize / 2; + } + + byte diff = 0; + for (int i = buffer.Length - blockSize; i < buffer.Length; ++i) + { + diff |= buffer[i]; + } + + if (diff != 0) + throw new InvalidCipherTextException("checksum failed"); + + return Arrays.CopyOfRange(buffer, 0, buffer.Length - blockSize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs.meta new file mode 100644 index 00000000..19a588b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c25d6f2f18628440944a37eeb445662 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Dstu7624WrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs new file mode 100644 index 00000000..df6cfb13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * this does your basic ElGamal algorithm. + */ + public class ElGamalEngine + : IAsymmetricBlockCipher + { + private ElGamalKeyParameters key; + private SecureRandom random; + private bool forEncryption; + private int bitSize; + + public virtual string AlgorithmName + { + get { return "ElGamal"; } + } + + /** + * initialise the ElGamal engine. + * + * @param forEncryption true if we are encrypting, false otherwise. + * @param param the necessary ElGamal key parameters. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is ParametersWithRandom withRandom) + { + this.key = (ElGamalKeyParameters)withRandom.Parameters; + this.random = withRandom.Random; + } + else + { + this.key = (ElGamalKeyParameters)parameters; + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + + this.forEncryption = forEncryption; + this.bitSize = key.Parameters.P.BitLength; + + if (forEncryption) + { + if (!(key is ElGamalPublicKeyParameters)) + throw new ArgumentException("ElGamalPublicKeyParameters are required for encryption."); + } + else + { + if (!(key is ElGamalPrivateKeyParameters)) + throw new ArgumentException("ElGamalPrivateKeyParameters are required for decryption."); + } + } + + /** + * Return the maximum size for an input block to this engine. + * For ElGamal this is always one byte less than the size of P on + * encryption, and twice the length as the size of P on decryption. + * + * @return maximum size for an input block. + */ + public virtual int GetInputBlockSize() + { + if (forEncryption) + { + return (bitSize - 1) / 8; + } + + return 2 * ((bitSize + 7) / 8); + } + + /** + * Return the maximum size for an output block to this engine. + * For ElGamal this is always one byte less than the size of P on + * decryption, and twice the length as the size of P on encryption. + * + * @return maximum size for an output block. + */ + public virtual int GetOutputBlockSize() + { + if (forEncryption) + { + return 2 * ((bitSize + 7) / 8); + } + + return (bitSize - 1) / 8; + } + + /** + * Process a single block using the basic ElGamal algorithm. + * + * @param in the input array. + * @param inOff the offset into the input buffer where the data starts. + * @param length the length of the data to be processed. + * @return the result of the ElGamal process. + * @exception DataLengthException the input block is too large. + */ + public virtual byte[] ProcessBlock( + byte[] input, + int inOff, + int length) + { + if (key == null) + throw new InvalidOperationException("ElGamal engine not initialised"); + + int maxLength = forEncryption + ? (bitSize - 1 + 7) / 8 + : GetInputBlockSize(); + + if (length > maxLength) + throw new DataLengthException("input too large for ElGamal cipher.\n"); + + BigInteger p = key.Parameters.P; + + byte[] output; + if (key is ElGamalPrivateKeyParameters) // decryption + { + int halfLength = length / 2; + BigInteger gamma = new BigInteger(1, input, inOff, halfLength); + BigInteger phi = new BigInteger(1, input, inOff + halfLength, halfLength); + + ElGamalPrivateKeyParameters priv = (ElGamalPrivateKeyParameters) key; + + // a shortcut, which generally relies on p being prime amongst other things. + // if a problem with this shows up, check the p and g values! + BigInteger m = gamma.ModPow(p.Subtract(BigInteger.One).Subtract(priv.X), p).Multiply(phi).Mod(p); + + output = m.ToByteArrayUnsigned(); + } + else // encryption + { + BigInteger tmp = new BigInteger(1, input, inOff, length); + + if (tmp.BitLength >= p.BitLength) + throw new DataLengthException("input too large for ElGamal cipher.\n"); + + + ElGamalPublicKeyParameters pub = (ElGamalPublicKeyParameters) key; + + BigInteger pSub2 = p.Subtract(BigInteger.Two); + + // TODO In theory, a series of 'k', 'g.ModPow(k, p)' and 'y.ModPow(k, p)' can be pre-calculated + BigInteger k; + do + { + k = new BigInteger(p.BitLength, random); + } + while (k.SignValue == 0 || k.CompareTo(pSub2) > 0); + + BigInteger g = key.Parameters.G; + BigInteger gamma = g.ModPow(k, p); + BigInteger phi = tmp.Multiply(pub.Y.ModPow(k, p)).Mod(p); + + output = new byte[this.GetOutputBlockSize()]; + + // TODO Add methods to allow writing BigInteger to existing byte array? + byte[] out1 = gamma.ToByteArrayUnsigned(); + byte[] out2 = phi.ToByteArrayUnsigned(); + out1.CopyTo(output, output.Length / 2 - out1.Length); + out2.CopyTo(output, output.Length - out2.Length); + } + + return output; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs.meta new file mode 100644 index 00000000..542438d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b48ee2c2b53e0384582a6c21e3386d2f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ElGamalEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs new file mode 100644 index 00000000..95acff10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs @@ -0,0 +1,408 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * implementation of GOST 28147-89 + */ + public class Gost28147Engine + : IBlockCipher + { + private const int BlockSize = 8; + private int[] workingKey = null; + private bool forEncryption; + + private byte[] S = Sbox_Default; + + // these are the S-boxes given in Applied Cryptography 2nd Ed., p. 333 + // This is default S-box! + private static readonly byte[] Sbox_Default = { + 0x4,0xA,0x9,0x2,0xD,0x8,0x0,0xE,0x6,0xB,0x1,0xC,0x7,0xF,0x5,0x3, + 0xE,0xB,0x4,0xC,0x6,0xD,0xF,0xA,0x2,0x3,0x8,0x1,0x0,0x7,0x5,0x9, + 0x5,0x8,0x1,0xD,0xA,0x3,0x4,0x2,0xE,0xF,0xC,0x7,0x6,0x0,0x9,0xB, + 0x7,0xD,0xA,0x1,0x0,0x8,0x9,0xF,0xE,0x4,0x6,0xC,0xB,0x2,0x5,0x3, + 0x6,0xC,0x7,0x1,0x5,0xF,0xD,0x8,0x4,0xA,0x9,0xE,0x0,0x3,0xB,0x2, + 0x4,0xB,0xA,0x0,0x7,0x2,0x1,0xD,0x3,0x6,0x8,0x5,0x9,0xC,0xF,0xE, + 0xD,0xB,0x4,0x1,0x3,0xF,0x5,0x9,0x0,0xA,0xE,0x7,0x6,0x8,0x2,0xC, + 0x1,0xF,0xD,0x0,0x5,0x7,0xA,0x4,0x9,0x2,0x3,0xE,0x6,0xB,0x8,0xC + }; + + /* + * class content S-box parameters for encrypting + * getting from, see: http://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-01.txt + * http://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-02.txt + */ + private static readonly byte[] ESbox_Test = { + 0x4,0x2,0xF,0x5,0x9,0x1,0x0,0x8,0xE,0x3,0xB,0xC,0xD,0x7,0xA,0x6, + 0xC,0x9,0xF,0xE,0x8,0x1,0x3,0xA,0x2,0x7,0x4,0xD,0x6,0x0,0xB,0x5, + 0xD,0x8,0xE,0xC,0x7,0x3,0x9,0xA,0x1,0x5,0x2,0x4,0x6,0xF,0x0,0xB, + 0xE,0x9,0xB,0x2,0x5,0xF,0x7,0x1,0x0,0xD,0xC,0x6,0xA,0x4,0x3,0x8, + 0x3,0xE,0x5,0x9,0x6,0x8,0x0,0xD,0xA,0xB,0x7,0xC,0x2,0x1,0xF,0x4, + 0x8,0xF,0x6,0xB,0x1,0x9,0xC,0x5,0xD,0x3,0x7,0xA,0x0,0xE,0x2,0x4, + 0x9,0xB,0xC,0x0,0x3,0x6,0x7,0x5,0x4,0x8,0xE,0xF,0x1,0xA,0x2,0xD, + 0xC,0x6,0x5,0x2,0xB,0x0,0x9,0xD,0x3,0xE,0x7,0xA,0xF,0x4,0x1,0x8 + }; + + private static readonly byte[] ESbox_A = { + 0x9,0x6,0x3,0x2,0x8,0xB,0x1,0x7,0xA,0x4,0xE,0xF,0xC,0x0,0xD,0x5, + 0x3,0x7,0xE,0x9,0x8,0xA,0xF,0x0,0x5,0x2,0x6,0xC,0xB,0x4,0xD,0x1, + 0xE,0x4,0x6,0x2,0xB,0x3,0xD,0x8,0xC,0xF,0x5,0xA,0x0,0x7,0x1,0x9, + 0xE,0x7,0xA,0xC,0xD,0x1,0x3,0x9,0x0,0x2,0xB,0x4,0xF,0x8,0x5,0x6, + 0xB,0x5,0x1,0x9,0x8,0xD,0xF,0x0,0xE,0x4,0x2,0x3,0xC,0x7,0xA,0x6, + 0x3,0xA,0xD,0xC,0x1,0x2,0x0,0xB,0x7,0x5,0x9,0x4,0x8,0xF,0xE,0x6, + 0x1,0xD,0x2,0x9,0x7,0xA,0x6,0x0,0x8,0xC,0x4,0x5,0xF,0x3,0xB,0xE, + 0xB,0xA,0xF,0x5,0x0,0xC,0xE,0x8,0x6,0x2,0x3,0x9,0x1,0x7,0xD,0x4 + }; + + private static readonly byte[] ESbox_B = { + 0x8,0x4,0xB,0x1,0x3,0x5,0x0,0x9,0x2,0xE,0xA,0xC,0xD,0x6,0x7,0xF, + 0x0,0x1,0x2,0xA,0x4,0xD,0x5,0xC,0x9,0x7,0x3,0xF,0xB,0x8,0x6,0xE, + 0xE,0xC,0x0,0xA,0x9,0x2,0xD,0xB,0x7,0x5,0x8,0xF,0x3,0x6,0x1,0x4, + 0x7,0x5,0x0,0xD,0xB,0x6,0x1,0x2,0x3,0xA,0xC,0xF,0x4,0xE,0x9,0x8, + 0x2,0x7,0xC,0xF,0x9,0x5,0xA,0xB,0x1,0x4,0x0,0xD,0x6,0x8,0xE,0x3, + 0x8,0x3,0x2,0x6,0x4,0xD,0xE,0xB,0xC,0x1,0x7,0xF,0xA,0x0,0x9,0x5, + 0x5,0x2,0xA,0xB,0x9,0x1,0xC,0x3,0x7,0x4,0xD,0x0,0x6,0xF,0x8,0xE, + 0x0,0x4,0xB,0xE,0x8,0x3,0x7,0x1,0xA,0x2,0x9,0x6,0xF,0xD,0x5,0xC + }; + + private static readonly byte[] ESbox_C = { + 0x1,0xB,0xC,0x2,0x9,0xD,0x0,0xF,0x4,0x5,0x8,0xE,0xA,0x7,0x6,0x3, + 0x0,0x1,0x7,0xD,0xB,0x4,0x5,0x2,0x8,0xE,0xF,0xC,0x9,0xA,0x6,0x3, + 0x8,0x2,0x5,0x0,0x4,0x9,0xF,0xA,0x3,0x7,0xC,0xD,0x6,0xE,0x1,0xB, + 0x3,0x6,0x0,0x1,0x5,0xD,0xA,0x8,0xB,0x2,0x9,0x7,0xE,0xF,0xC,0x4, + 0x8,0xD,0xB,0x0,0x4,0x5,0x1,0x2,0x9,0x3,0xC,0xE,0x6,0xF,0xA,0x7, + 0xC,0x9,0xB,0x1,0x8,0xE,0x2,0x4,0x7,0x3,0x6,0x5,0xA,0x0,0xF,0xD, + 0xA,0x9,0x6,0x8,0xD,0xE,0x2,0x0,0xF,0x3,0x5,0xB,0x4,0x1,0xC,0x7, + 0x7,0x4,0x0,0x5,0xA,0x2,0xF,0xE,0xC,0x6,0x1,0xB,0xD,0x9,0x3,0x8 + }; + + private static readonly byte[] ESbox_D = { + 0xF,0xC,0x2,0xA,0x6,0x4,0x5,0x0,0x7,0x9,0xE,0xD,0x1,0xB,0x8,0x3, + 0xB,0x6,0x3,0x4,0xC,0xF,0xE,0x2,0x7,0xD,0x8,0x0,0x5,0xA,0x9,0x1, + 0x1,0xC,0xB,0x0,0xF,0xE,0x6,0x5,0xA,0xD,0x4,0x8,0x9,0x3,0x7,0x2, + 0x1,0x5,0xE,0xC,0xA,0x7,0x0,0xD,0x6,0x2,0xB,0x4,0x9,0x3,0xF,0x8, + 0x0,0xC,0x8,0x9,0xD,0x2,0xA,0xB,0x7,0x3,0x6,0x5,0x4,0xE,0xF,0x1, + 0x8,0x0,0xF,0x3,0x2,0x5,0xE,0xB,0x1,0xA,0x4,0x7,0xC,0x9,0xD,0x6, + 0x3,0x0,0x6,0xF,0x1,0xE,0x9,0x2,0xD,0x8,0xC,0x4,0xB,0xA,0x5,0x7, + 0x1,0xA,0x6,0x8,0xF,0xB,0x0,0x4,0xC,0x3,0x5,0x9,0x7,0xD,0x2,0xE + }; + + //S-box for digest + private static readonly byte[] DSbox_Test = { + 0x4,0xA,0x9,0x2,0xD,0x8,0x0,0xE,0x6,0xB,0x1,0xC,0x7,0xF,0x5,0x3, + 0xE,0xB,0x4,0xC,0x6,0xD,0xF,0xA,0x2,0x3,0x8,0x1,0x0,0x7,0x5,0x9, + 0x5,0x8,0x1,0xD,0xA,0x3,0x4,0x2,0xE,0xF,0xC,0x7,0x6,0x0,0x9,0xB, + 0x7,0xD,0xA,0x1,0x0,0x8,0x9,0xF,0xE,0x4,0x6,0xC,0xB,0x2,0x5,0x3, + 0x6,0xC,0x7,0x1,0x5,0xF,0xD,0x8,0x4,0xA,0x9,0xE,0x0,0x3,0xB,0x2, + 0x4,0xB,0xA,0x0,0x7,0x2,0x1,0xD,0x3,0x6,0x8,0x5,0x9,0xC,0xF,0xE, + 0xD,0xB,0x4,0x1,0x3,0xF,0x5,0x9,0x0,0xA,0xE,0x7,0x6,0x8,0x2,0xC, + 0x1,0xF,0xD,0x0,0x5,0x7,0xA,0x4,0x9,0x2,0x3,0xE,0x6,0xB,0x8,0xC + }; + + private static readonly byte[] DSbox_A = { + 0xA,0x4,0x5,0x6,0x8,0x1,0x3,0x7,0xD,0xC,0xE,0x0,0x9,0x2,0xB,0xF, + 0x5,0xF,0x4,0x0,0x2,0xD,0xB,0x9,0x1,0x7,0x6,0x3,0xC,0xE,0xA,0x8, + 0x7,0xF,0xC,0xE,0x9,0x4,0x1,0x0,0x3,0xB,0x5,0x2,0x6,0xA,0x8,0xD, + 0x4,0xA,0x7,0xC,0x0,0xF,0x2,0x8,0xE,0x1,0x6,0x5,0xD,0xB,0x9,0x3, + 0x7,0x6,0x4,0xB,0x9,0xC,0x2,0xA,0x1,0x8,0x0,0xE,0xF,0xD,0x3,0x5, + 0x7,0x6,0x2,0x4,0xD,0x9,0xF,0x0,0xA,0x1,0x5,0xB,0x8,0xE,0xC,0x3, + 0xD,0xE,0x4,0x1,0x7,0x0,0x5,0xA,0x3,0xC,0x8,0xF,0x6,0x2,0x9,0xB, + 0x1,0x3,0xA,0x9,0x5,0xB,0x4,0xF,0x8,0x6,0x7,0xE,0xD,0x0,0x2,0xC + }; + + // + // pre-defined sbox table + // + private static readonly Dictionary m_sBoxes = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static Gost28147Engine() + { + AddSBox("Default", Sbox_Default); + AddSBox("E-TEST", ESbox_Test); + AddSBox("E-A", ESbox_A); + AddSBox("E-B", ESbox_B); + AddSBox("E-C", ESbox_C); + AddSBox("E-D", ESbox_D); + AddSBox("D-TEST", DSbox_Test); + AddSBox("D-A", DSbox_A); + } + + private static void AddSBox(string sBoxName, byte[] sBox) + { + m_sBoxes.Add(sBoxName, sBox); + } + + /** + * standard constructor. + */ + public Gost28147Engine() + { + } + + /** + * initialise an Gost28147 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is ParametersWithSBox param) + { + // + // Set the S-Box + // + byte[] sBox = param.GetSBox(); + if (sBox.Length != Sbox_Default.Length) + throw new ArgumentException("invalid S-box passed to GOST28147 init"); + + this.S = Arrays.Clone(sBox); + + // + // set key if there is one + // + if (param.Parameters != null) + { + workingKey = GenerateWorkingKey(forEncryption, ((KeyParameter)param.Parameters).GetKey()); + } + } + else if (parameters is KeyParameter keyParameter) + { + workingKey = GenerateWorkingKey(forEncryption, keyParameter.GetKey()); + } + else if (parameters != null) + { + throw new ArgumentException("invalid parameter passed to Gost28147 init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + } + + public virtual string AlgorithmName + { + get { return "Gost28147"; } + } + + public virtual int GetBlockSize() + { + return BlockSize; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("Gost28147 engine not initialised"); + + Check.DataLength(input, inOff, BlockSize, "input buffer too short"); + Check.OutputLength(output, outOff, BlockSize, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Gost28147Func(workingKey, input.AsSpan(inOff), output.AsSpan(outOff)); +#else + Gost28147Func(workingKey, input, inOff, output, outOff); +#endif + + return BlockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("Gost28147 engine not initialised"); + + Check.DataLength(input, BlockSize, "input buffer too short"); + Check.OutputLength(output, BlockSize, "output buffer too short"); + + Gost28147Func(workingKey, input, output); + + return BlockSize; + } +#endif + + private int[] GenerateWorkingKey(bool forEncryption, byte[] userKey) + { + this.forEncryption = forEncryption; + + if (userKey.Length != 32) + throw new ArgumentException("Key length invalid. Key needs to be 32 byte - 256 bit!!!"); + + int[] key = new int[8]; + for(int i=0; i != 8; i++) + { + key[i] = (int)Pack.LE_To_UInt32(userKey, i * 4); + } + + return key; + } + + private int Gost28147_mainStep(int n1, int key) + { + int cm = (key + n1); // CM1 + + // S-box replacing + + int om = S[ 0 + ((cm >> (0 * 4)) & 0xF)] << (0 * 4); + om += S[ 16 + ((cm >> (1 * 4)) & 0xF)] << (1 * 4); + om += S[ 32 + ((cm >> (2 * 4)) & 0xF)] << (2 * 4); + om += S[ 48 + ((cm >> (3 * 4)) & 0xF)] << (3 * 4); + om += S[ 64 + ((cm >> (4 * 4)) & 0xF)] << (4 * 4); + om += S[ 80 + ((cm >> (5 * 4)) & 0xF)] << (5 * 4); + om += S[ 96 + ((cm >> (6 * 4)) & 0xF)] << (6 * 4); + om += S[112 + ((cm >> (7 * 4)) & 0xF)] << (7 * 4); + +// return om << 11 | om >>> (32-11); // 11-leftshift + int omLeft = om << 11; + int omRight = (int)(((uint) om) >> (32 - 11)); // Note: Casts required to get unsigned bit rotation + + return omLeft | omRight; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Gost28147Func(int[] workingKey, ReadOnlySpan input, Span output) + { + int N1 = (int)Pack.LE_To_UInt32(input); + int N2 = (int)Pack.LE_To_UInt32(input[4..]); + int tmp; //tmp -> for saving N1 + + if (this.forEncryption) + { + for(int k = 0; k < 3; k++) // 1-24 steps + { + for(int j = 0; j < 8; j++) + { + tmp = N1; + int step = Gost28147_mainStep(N1, workingKey[j]); + N1 = N2 ^ step; // CM2 + N2 = tmp; + } + } + for(int j = 7; j > 0; j--) // 25-31 steps + { + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + } + else //decrypt + { + for(int j = 0; j < 8; j++) // 1-8 steps + { + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + for(int k = 0; k < 3; k++) //9-31 steps + { + for(int j = 7; j >= 0; j--) + { + if ((k == 2) && (j==0)) + { + break; // break 32 step + } + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + } + } + + N2 = N2 ^ Gost28147_mainStep(N1, workingKey[0]); // 32 step (N1=N1) + + Pack.UInt32_To_LE((uint)N1, output); + Pack.UInt32_To_LE((uint)N2, output[4..]); + } +#else + private void Gost28147Func(int[] workingKey, byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + int N1 = (int)Pack.LE_To_UInt32(inBytes, inOff); + int N2 = (int)Pack.LE_To_UInt32(inBytes, inOff + 4); + int tmp; //tmp -> for saving N1 + + if (this.forEncryption) + { + for(int k = 0; k < 3; k++) // 1-24 steps + { + for(int j = 0; j < 8; j++) + { + tmp = N1; + int step = Gost28147_mainStep(N1, workingKey[j]); + N1 = N2 ^ step; // CM2 + N2 = tmp; + } + } + for(int j = 7; j > 0; j--) // 25-31 steps + { + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + } + else //decrypt + { + for(int j = 0; j < 8; j++) // 1-8 steps + { + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + for(int k = 0; k < 3; k++) //9-31 steps + { + for(int j = 7; j >= 0; j--) + { + if ((k == 2) && (j==0)) + { + break; // break 32 step + } + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + } + } + + N2 = N2 ^ Gost28147_mainStep(N1, workingKey[0]); // 32 step (N1=N1) + + Pack.UInt32_To_LE((uint)N1, outBytes, outOff); + Pack.UInt32_To_LE((uint)N2, outBytes, outOff + 4); + } +#endif + + /** + * Return the S-Box associated with SBoxName + * @param sBoxName name of the S-Box + * @return byte array representing the S-Box + */ + public static byte[] GetSBox(string sBoxName) + { + if (!m_sBoxes.TryGetValue(sBoxName, out var sBox)) + { + throw new ArgumentException("Unknown S-Box - possible types: " + + "\"Default\", \"E-Test\", \"E-A\", \"E-B\", \"E-C\", \"E-D\", \"D-Test\", \"D-A\"."); + } + + return Arrays.Clone(sBox); + } + + public static string GetSBoxName(byte[] sBox) + { + foreach (var entry in m_sBoxes) + { + if (Arrays.AreEqual(entry.Value, sBox)) + return entry.Key; + } + + throw new ArgumentException("SBOX provided did not map to a known one"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs.meta new file mode 100644 index 00000000..591d794b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b53ae0fb8b5a1443ab7e30617094995 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/GOST28147Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs new file mode 100644 index 00000000..04e6df9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs @@ -0,0 +1,568 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public sealed class Grain128AeadEngine + : IAeadCipher + { + /** + * Constants + */ + private static readonly int STATE_SIZE = 4; + + /** + * Variables to hold the state of the engine during encryption and + * decryption + */ + private byte[] workingKey; + private byte[] workingIV; + private uint[] lfsr; + private uint[] nfsr; + private uint[] authAcc; + private uint[] authSr; + + private bool initialised = false; + private bool aadFinished = false; + private MemoryStream aadData = new MemoryStream(); + + private byte[] mac; + + public string AlgorithmName => "Grain-128AEAD"; + + /** + * Initialize a Grain-128AEAD cipher. + * + * @param forEncryption Whether or not we are for encryption. + * @param param The parameters required to set up the cipher. + * @throws ArgumentException If the params argument is inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters param) + { + /* + * Grain encryption and decryption is completely symmetrical, so the + * 'forEncryption' is irrelevant. + */ + if (!(param is ParametersWithIV ivParams)) + throw new ArgumentException("Grain-128AEAD Init parameters must include an IV"); + + byte[] iv = ivParams.GetIV(); + + if (iv == null || iv.Length != 12) + throw new ArgumentException("Grain-128AEAD requires exactly 12 bytes of IV"); + + if (!(ivParams.Parameters is KeyParameter key)) + throw new ArgumentException("Grain-128AEAD Init parameters must include a key"); + + byte[] keyBytes = key.GetKey(); + if (keyBytes.Length != 16) + throw new ArgumentException("Grain-128AEAD key must be 128 bits long"); + + /* + * Initialize variables. + */ + workingIV = new byte[keyBytes.Length]; + workingKey = keyBytes; + lfsr = new uint[STATE_SIZE]; + nfsr = new uint[STATE_SIZE]; + authAcc = new uint[2]; + authSr = new uint[2]; + + Array.Copy(iv, 0, workingIV, 0, iv.Length); + + Reset(); + } + + /** + * 320 clocks initialization phase. + */ + private void InitGrain() + { + for (int i = 0; i < 320; ++i) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0] ^ outputZ) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR() ^ outputZ) & 1); + } + for (int quotient = 0; quotient < 8; ++quotient) + { + for (int remainder = 0; remainder < 8; ++remainder) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0] ^ outputZ ^ (uint)((workingKey[quotient]) >> remainder)) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR() ^ outputZ ^ (uint)((workingKey[quotient + 8]) >> remainder)) & 1); + } + } + for (int quotient = 0; quotient < 2; ++quotient) + { + for (int remainder = 0; remainder < 32; ++remainder) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + authAcc[quotient] |= outputZ << remainder; + } + } + for (int quotient = 0; quotient < 2; ++quotient) + { + for (int remainder = 0; remainder < 32; ++remainder) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + authSr[quotient] |= outputZ << remainder; + } + } + initialised = true; + } + + /** + * Get output from non-linear function g(x). + * + * @return Output from NFSR. + */ + private uint GetOutputNFSR() + { + uint b0 = nfsr[0]; + uint b3 = nfsr[0] >> 3; + uint b11 = nfsr[0] >> 11; + uint b13 = nfsr[0] >> 13; + uint b17 = nfsr[0] >> 17; + uint b18 = nfsr[0] >> 18; + uint b22 = nfsr[0] >> 22; + uint b24 = nfsr[0] >> 24; + uint b25 = nfsr[0] >> 25; + uint b26 = nfsr[0] >> 26; + uint b27 = nfsr[0] >> 27; + uint b40 = nfsr[1] >> 8; + uint b48 = nfsr[1] >> 16; + uint b56 = nfsr[1] >> 24; + uint b59 = nfsr[1] >> 27; + uint b61 = nfsr[1] >> 29; + uint b65 = nfsr[2] >> 1; + uint b67 = nfsr[2] >> 3; + uint b68 = nfsr[2] >> 4; + uint b70 = nfsr[2] >> 6; + uint b78 = nfsr[2] >> 14; + uint b82 = nfsr[2] >> 18; + uint b84 = nfsr[2] >> 20; + uint b88 = nfsr[2] >> 24; + uint b91 = nfsr[2] >> 27; + uint b92 = nfsr[2] >> 28; + uint b93 = nfsr[2] >> 29; + uint b95 = nfsr[2] >> 31; + uint b96 = nfsr[3]; + + return (b0 ^ b26 ^ b56 ^ b91 ^ b96 ^ b3 & b67 ^ b11 & b13 ^ b17 & b18 + ^ b27 & b59 ^ b40 & b48 ^ b61 & b65 ^ b68 & b84 ^ b22 & b24 & b25 ^ b70 & b78 & b82 ^ b88 & b92 & b93 & b95) & 1; + } + + /** + * Get output from linear function f(x). + * + * @return Output from LFSR. + */ + private uint GetOutputLFSR() + { + uint s0 = lfsr[0]; + uint s7 = lfsr[0] >> 7; + uint s38 = lfsr[1] >> 6; + uint s70 = lfsr[2] >> 6; + uint s81 = lfsr[2] >> 17; + uint s96 = lfsr[3]; + + return (s0 ^ s7 ^ s38 ^ s70 ^ s81 ^ s96) & 1; + } + + /** + * Get output from output function h(x). + * + * @return y_t. + */ + private uint GetOutput() + { + uint b2 = nfsr[0] >> 2; + uint b12 = nfsr[0] >> 12; + uint b15 = nfsr[0] >> 15; + uint b36 = nfsr[1] >> 4; + uint b45 = nfsr[1] >> 13; + uint b64 = nfsr[2]; + uint b73 = nfsr[2] >> 9; + uint b89 = nfsr[2] >> 25; + uint b95 = nfsr[2] >> 31; + uint s8 = lfsr[0] >> 8; + uint s13 = lfsr[0] >> 13; + uint s20 = lfsr[0] >> 20; + uint s42 = lfsr[1] >> 10; + uint s60 = lfsr[1] >> 28; + uint s79 = lfsr[2] >> 15; + uint s93 = lfsr[2] >> 29; + uint s94 = lfsr[2] >> 30; + + return ((b12 & s8) ^ (s13 & s20) ^ (b95 & s42) ^ (s60 & s79) ^ (b12 & b95 & s94) ^ s93 + ^ b2 ^ b15 ^ b36 ^ b45 ^ b64 ^ b73 ^ b89) & 1; + } + + /** + * Shift array 1 bit and add val to index.Length - 1. + * + * @param array The array to shift. + * @param val The value to shift in. + * @return The shifted array with val added to index.Length - 1. + */ + private uint[] Shift(uint[] array, uint val) + { + array[0] = (array[0] >> 1) | (array[1] << 31); + array[1] = (array[1] >> 1) | (array[2] << 31); + array[2] = (array[2] >> 1) | (array[3] << 31); + array[3] = (array[3] >> 1) | (val << 31); + return array; + } + + /** + * Set keys, reset cipher. + * + * @param keyBytes The key. + * @param ivBytes The IV. + */ + private void SetKey(byte[] keyBytes, byte[] ivBytes) + { + ivBytes[12] = 0xFF; + ivBytes[13] = 0xFF; + ivBytes[14] = 0xFF; + ivBytes[15] = 0x7F; + workingKey = keyBytes; + workingIV = ivBytes; + + /* + * Load NFSR and LFSR + */ + Pack.LE_To_UInt32(workingKey, 0, nfsr); + Pack.LE_To_UInt32(workingIV, 0, lfsr); + } + + public int ProcessBytes(byte[] input, int inOff, int len, byte[] output, int outOff) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(input.AsSpan(inOff, len), output.AsSpan(outOff)); +#else + if (!initialised) + throw new ArgumentException(AlgorithmName + " not initialised"); + + if (!aadFinished) + { + DoProcessAADBytes(aadData.GetBuffer(), 0, (int)aadData.Length); + aadFinished = true; + } + + GetKeyStream(input, inOff, len, output, outOff); + return len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBytes(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + if (!initialised) + throw new ArgumentException(AlgorithmName + " not initialised"); + + if (!aadFinished) + { + DoProcessAADBytes(aadData.GetBuffer(), 0, (int)aadData.Length); + aadFinished = true; + } + + GetKeyStream(input, output); + return input.Length; + } +#endif + + public void Reset() + { + Reset(true); + } + + private void Reset(bool clearMac) + { + if (clearMac) + { + this.mac = null; + } + this.aadData.SetLength(0); + this.aadFinished = false; + + SetKey(workingKey, workingIV); + InitGrain(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void GetKeyStream(ReadOnlySpan input, Span output) + { + int len = input.Length; + for (int i = 0; i < len; ++i) + { + uint cc = 0, input_i = input[i]; + for (int j = 0; j < 8; ++j) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + + uint input_i_j = (input_i >> j) & 1U; + cc |= (input_i_j ^ outputZ) << j; + + //if (input_i_j != 0) + //{ + // Accumulate(); + //} + uint mask = 0U - input_i_j; + authAcc[0] ^= authSr[0] & mask; + authAcc[1] ^= authSr[1] & mask; + + AuthShift(GetOutput()); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + } + output[i] = (byte)cc; + } + } +#else + private void GetKeyStream(byte[] input, int inOff, int len, byte[] ciphertext, int outOff) + { + for (int i = 0; i < len; ++i) + { + uint cc = 0, input_i = input[inOff + i]; + for (int j = 0; j < 8; ++j) + { + uint outputZ = GetOutput(); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + + uint input_i_j = (input_i >> j) & 1U; + cc |= (input_i_j ^ outputZ) << j; + + //if (input_i_j != 0) + //{ + // Accumulate(); + //} + uint mask = 0U - input_i_j; + authAcc[0] ^= authSr[0] & mask; + authAcc[1] ^= authSr[1] & mask; + + AuthShift(GetOutput()); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + } + ciphertext[outOff + i] = (byte)cc; + } + } +#endif + + public byte ReturnByte(byte input) + { + if (!initialised) + throw new ArgumentException(AlgorithmName + " not initialised"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span plaintext = stackalloc byte[1]{ input }; + Span ciphertext = stackalloc byte[1]; + GetKeyStream(plaintext, ciphertext); + return ciphertext[0]; +#else + byte[] plaintext = new byte[1]{ input }; + byte[] ciphertext = new byte[1]; + GetKeyStream(plaintext, 0, 1, ciphertext, 0); + return ciphertext[0]; +#endif + } + + public void ProcessAadByte(byte input) + { + if (aadFinished) + throw new ArgumentException("associated data must be added before plaintext/ciphertext"); + + aadData.WriteByte(input); + } + + public void ProcessAadBytes(byte[] input, int inOff, int len) + { + if (aadFinished) + throw new ArgumentException("associated data must be added before plaintext/ciphertext"); + + aadData.Write(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ProcessAadBytes(ReadOnlySpan input) + { + if (aadFinished) + throw new ArgumentException("associated data must be added before plaintext/ciphertext"); + + aadData.Write(input); + } +#endif + + private void Accumulate() + { + authAcc[0] ^= authSr[0]; + authAcc[1] ^= authSr[1]; + } + + private void AuthShift(uint val) + { + authSr[0] = (authSr[0] >> 1) | (authSr[1] << 31); + authSr[1] = (authSr[1] >> 1) | (val << 31); + } + + public int ProcessByte(byte input, byte[] output, int outOff) + { + return ProcessBytes(new byte[]{ input }, 0, 1, output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessByte(byte input, Span output) + { + return ProcessBytes(stackalloc byte[1]{ input }, output); + } +#endif + + private void DoProcessAADBytes(byte[] input, int inOff, int len) + { + byte[] ader; + int aderlen; + //encodeDer + if (len < 128) + { + ader = new byte[1 + len]; + ader[0] = (byte)len; + aderlen = 0; + } + else + { + // aderlen is the highest bit position divided by 8 + aderlen = LenLength(len); + ader = new byte[aderlen + 1 + len]; + ader[0] = (byte)(0x80 | (uint)aderlen); + uint tmp = (uint)len; + for (int i = 0; i < aderlen; ++i) + { + ader[1 + i] = (byte)tmp; + tmp >>= 8; + } + } + for (int i = 0; i < len; ++i) + { + ader[1 + aderlen + i] = input[inOff + i]; + } + + for (int i = 0; i < ader.Length; ++i) + { + uint ader_i = ader[i]; + for (int j = 0; j < 8; ++j) + { + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + + uint ader_i_j = (ader_i >> j) & 1U; + //if (ader_i_j != 0) + //{ + // Accumulate(); + //} + uint mask = 0U - ader_i_j; + authAcc[0] ^= authSr[0] & mask; + authAcc[1] ^= authSr[1] & mask; + + AuthShift(GetOutput()); + nfsr = Shift(nfsr, (GetOutputNFSR() ^ lfsr[0]) & 1); + lfsr = Shift(lfsr, (GetOutputLFSR()) & 1); + } + } + } + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + if (!aadFinished) + { + DoProcessAADBytes(aadData.GetBuffer(), 0, (int)aadData.Length); + aadFinished = true; + } + + Accumulate(); + + this.mac = Pack.UInt32_To_LE(authAcc); + + Array.Copy(mac, 0, output, outOff, mac.Length); + + Reset(false); + + return mac.Length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + if (!aadFinished) + { + DoProcessAADBytes(aadData.GetBuffer(), 0, (int)aadData.Length); + aadFinished = true; + } + + Accumulate(); + + this.mac = Pack.UInt32_To_LE(authAcc); + + mac.CopyTo(output); + + Reset(false); + + return mac.Length; + } +#endif + + public byte[] GetMac() + { + return mac; + } + + public int GetUpdateOutputSize(int len) + { + return len; + } + + public int GetOutputSize(int len) + { + return len + 8; + } + + private static int LenLength(int v) + { + if ((v & 0xff) == v) + return 1; + + if ((v & 0xffff) == v) + return 2; + + if ((v & 0xffffff) == v) + return 3; + + return 4; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs.meta new file mode 100644 index 00000000..1d2ebce0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa1295d600718c34fa3ae69a2816e467 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Grain128AEADEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs new file mode 100644 index 00000000..ea9235d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs @@ -0,0 +1,254 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * HC-128 is a software-efficient stream cipher created by Hongjun Wu. It + * generates keystream from a 128-bit secret key and a 128-bit initialization + * vector. + *

+ * http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc128_p3.pdf + *

+ * It is a third phase candidate in the eStream contest, and is patent-free. + * No attacks are known as of today (April 2007). See + * + * http://www.ecrypt.eu.org/stream/hcp3.html + *

+ */ + public class HC128Engine + : IStreamCipher + { + private uint[] p = new uint[512]; + private uint[] q = new uint[512]; + private uint cnt = 0; + + private static uint F1(uint x) + { + return RotateRight(x, 7) ^ RotateRight(x, 18) ^ (x >> 3); + } + + private static uint F2(uint x) + { + return RotateRight(x, 17) ^ RotateRight(x, 19) ^ (x >> 10); + } + + private uint G1(uint x, uint y, uint z) + { + return (RotateRight(x, 10) ^ RotateRight(z, 23)) + RotateRight(y, 8); + } + + private uint G2(uint x, uint y, uint z) + { + return (RotateLeft(x, 10) ^ RotateLeft(z, 23)) + RotateLeft(y, 8); + } + + private static uint RotateLeft(uint x, int bits) + { + return (x << bits) | (x >> -bits); + } + + private static uint RotateRight(uint x, int bits) + { + return (x >> bits) | (x << -bits); + } + + private uint H1(uint x) + { + return q[x & 0xFF] + q[((x >> 16) & 0xFF) + 256]; + } + + private uint H2(uint x) + { + return p[x & 0xFF] + p[((x >> 16) & 0xFF) + 256]; + } + + private static uint Mod1024(uint x) + { + return x & 0x3FF; + } + + private static uint Mod512(uint x) + { + return x & 0x1FF; + } + + private static uint Dim(uint x, uint y) + { + return Mod512(x - y); + } + + private uint Step() + { + uint j = Mod512(cnt); + uint ret; + if (cnt < 512) + { + p[j] += G1(p[Dim(j, 3)], p[Dim(j, 10)], p[Dim(j, 511)]); + ret = H1(p[Dim(j, 12)]) ^ p[j]; + } + else + { + q[j] += G2(q[Dim(j, 3)], q[Dim(j, 10)], q[Dim(j, 511)]); + ret = H2(q[Dim(j, 12)]) ^ q[j]; + } + cnt = Mod1024(cnt + 1); + return ret; + } + + private byte[] key, iv; + private bool initialised; + + private void Init() + { + if (key.Length != 16) + throw new ArgumentException("The key must be 128 bits long"); + + idx = 0; + cnt = 0; + + uint[] w = new uint[1280]; + + for (int i = 0; i < 16; i++) + { + w[i >> 2] |= ((uint)key[i] << (8 * (i & 0x3))); + } + Array.Copy(w, 0, w, 4, 4); + + for (int i = 0; i < iv.Length && i < 16; i++) + { + w[(i >> 2) + 8] |= ((uint)iv[i] << (8 * (i & 0x3))); + } + Array.Copy(w, 8, w, 12, 4); + + for (uint i = 16; i < 1280; i++) + { + w[i] = F2(w[i - 2]) + w[i - 7] + F1(w[i - 15]) + w[i - 16] + i; + } + + Array.Copy(w, 256, p, 0, 512); + Array.Copy(w, 768, q, 0, 512); + + for (int i = 0; i < 512; i++) + { + p[i] = Step(); + } + for (int i = 0; i < 512; i++) + { + q[i] = Step(); + } + + cnt = 0; + } + + public virtual string AlgorithmName + { + get { return "HC-128"; } + } + + /** + * Initialise a HC-128 cipher. + * + * @param forEncryption whether or not we are for encryption. Irrelevant, as + * encryption and decryption are the same. + * @param params the parameters required to set up the cipher. + * @throws ArgumentException if the params argument is + * inappropriate (ie. the key is not 128 bit long). + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + ICipherParameters keyParam = parameters; + + if (parameters is ParametersWithIV) + { + iv = ((ParametersWithIV)parameters).GetIV(); + keyParam = ((ParametersWithIV)parameters).Parameters; + } + else + { + iv = new byte[0]; + } + + if (keyParam is KeyParameter) + { + key = ((KeyParameter)keyParam).GetKey(); + Init(); + } + else + { + throw new ArgumentException( + "Invalid parameter passed to HC128 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), + "parameters"); + } + + initialised = true; + } + + private byte[] buf = new byte[4]; + private int idx = 0; + + private byte GetByte() + { + if (idx == 0) + { + Pack.UInt32_To_LE(Step(), buf); + } + byte ret = buf[idx]; + idx = idx + 1 & 0x3; + return ret; + } + + public virtual void ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] output, + int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + + for (int i = 0; i < len; i++) + { + output[outOff + i] = (byte)(input[inOff + i] ^ GetByte()); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; i++) + { + output[i] = (byte)(input[i] ^ GetByte()); + } + } +#endif + + public virtual void Reset() + { + Init(); + } + + public virtual byte ReturnByte(byte input) + { + return (byte)(input ^ GetByte()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs.meta new file mode 100644 index 00000000..e8e37fbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f44bda56ad69a045bff41a813713e60 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC128Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs new file mode 100644 index 00000000..4c8bc330 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs @@ -0,0 +1,243 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * HC-256 is a software-efficient stream cipher created by Hongjun Wu. It + * generates keystream from a 256-bit secret key and a 256-bit initialization + * vector. + *

+ * http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc256_p3.pdf + *

+ * Its brother, HC-128, is a third phase candidate in the eStream contest. + * The algorithm is patent-free. No attacks are known as of today (April 2007). + * See + * + * http://www.ecrypt.eu.org/stream/hcp3.html + *

+ */ + public class HC256Engine + : IStreamCipher + { + private uint[] p = new uint[1024]; + private uint[] q = new uint[1024]; + private uint cnt = 0; + + private uint Step() + { + uint j = cnt & 0x3FF; + uint ret; + if (cnt < 1024) + { + uint x = p[(j - 3 & 0x3FF)]; + uint y = p[(j - 1023 & 0x3FF)]; + p[j] += p[(j - 10 & 0x3FF)] + + (RotateRight(x, 10) ^ RotateRight(y, 23)) + + q[((x ^ y) & 0x3FF)]; + + x = p[(j - 12 & 0x3FF)]; + ret = (q[x & 0xFF] + q[((x >> 8) & 0xFF) + 256] + + q[((x >> 16) & 0xFF) + 512] + q[((x >> 24) & 0xFF) + 768]) + ^ p[j]; + } + else + { + uint x = q[(j - 3 & 0x3FF)]; + uint y = q[(j - 1023 & 0x3FF)]; + q[j] += q[(j - 10 & 0x3FF)] + + (RotateRight(x, 10) ^ RotateRight(y, 23)) + + p[((x ^ y) & 0x3FF)]; + + x = q[(j - 12 & 0x3FF)]; + ret = (p[x & 0xFF] + p[((x >> 8) & 0xFF) + 256] + + p[((x >> 16) & 0xFF) + 512] + p[((x >> 24) & 0xFF) + 768]) + ^ q[j]; + } + cnt = cnt + 1 & 0x7FF; + return ret; + } + + private byte[] key, iv; + private bool initialised; + + private void Init() + { + if (key.Length != 32 && key.Length != 16) + throw new ArgumentException("The key must be 128/256 bits long"); + + if (iv.Length < 16) + throw new ArgumentException("The IV must be at least 128 bits long"); + + if (key.Length != 32) + { + byte[] k = new byte[32]; + + Array.Copy(key, 0, k, 0, key.Length); + Array.Copy(key, 0, k, 16, key.Length); + + key = k; + } + + if (iv.Length < 32) + { + byte[] newIV = new byte[32]; + + Array.Copy(iv, 0, newIV, 0, iv.Length); + Array.Copy(iv, 0, newIV, iv.Length, newIV.Length - iv.Length); + + iv = newIV; + } + + idx = 0; + cnt = 0; + + uint[] w = new uint[2560]; + + for (int i = 0; i < 32; i++) + { + w[i >> 2] |= ((uint)key[i] << (8 * (i & 0x3))); + } + + for (int i = 0; i < 32; i++) + { + w[(i >> 2) + 8] |= ((uint)iv[i] << (8 * (i & 0x3))); + } + + for (uint i = 16; i < 2560; i++) + { + uint x = w[i - 2]; + uint y = w[i - 15]; + w[i] = (RotateRight(x, 17) ^ RotateRight(x, 19) ^ (x >> 10)) + + w[i - 7] + + (RotateRight(y, 7) ^ RotateRight(y, 18) ^ (y >> 3)) + + w[i - 16] + i; + } + + Array.Copy(w, 512, p, 0, 1024); + Array.Copy(w, 1536, q, 0, 1024); + + for (int i = 0; i < 4096; i++) + { + Step(); + } + + cnt = 0; + } + + public virtual string AlgorithmName + { + get { return "HC-256"; } + } + + /** + * Initialise a HC-256 cipher. + * + * @param forEncryption whether or not we are for encryption. Irrelevant, as + * encryption and decryption are the same. + * @param params the parameters required to set up the cipher. + * @throws ArgumentException if the params argument is + * inappropriate (ie. the key is not 256 bit long). + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + ICipherParameters keyParam = parameters; + + if (parameters is ParametersWithIV) + { + iv = ((ParametersWithIV)parameters).GetIV(); + keyParam = ((ParametersWithIV)parameters).Parameters; + } + else + { + iv = new byte[0]; + } + + if (keyParam is KeyParameter) + { + key = ((KeyParameter)keyParam).GetKey(); + Init(); + } + else + { + throw new ArgumentException( + "Invalid parameter passed to HC256 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), + "parameters"); + } + + initialised = true; + } + + private byte[] buf = new byte[4]; + private int idx = 0; + + private byte GetByte() + { + if (idx == 0) + { + Pack.UInt32_To_LE(Step(), buf); + } + byte ret = buf[idx]; + idx = idx + 1 & 0x3; + return ret; + } + + public virtual void ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] output, + int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + + for (int i = 0; i < len; i++) + { + output[outOff + i] = (byte)(input[inOff + i] ^ GetByte()); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; i++) + { + output[i] = (byte)(input[i] ^ GetByte()); + } + } +#endif + + public virtual void Reset() + { + Init(); + } + + public virtual byte ReturnByte(byte input) + { + return (byte)(input ^ GetByte()); + } + + private static uint RotateRight(uint x, int bits) + { + return (x >> bits) | (x << -bits); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs.meta new file mode 100644 index 00000000..6b1f251d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df13794ef78e91b4893f4474bf7aa5c5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/HC256Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs new file mode 100644 index 00000000..67e3543b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Implementation of Bob Jenkin's ISAAC (Indirection Shift Accumulate Add and Count). + * see: http://www.burtleburtle.net/bob/rand/isaacafa.html + */ + public class IsaacEngine + : IStreamCipher + { + // Constants + private static readonly int sizeL = 8, + stateArraySize = sizeL<<5; // 256 + + // Cipher's internal state + private uint[] engineState = null, // mm + results = null; // randrsl + private uint a = 0, b = 0, c = 0; + + // Engine state + private int index = 0; + private byte[] keyStream = new byte[stateArraySize<<2], // results expanded into bytes + workingKey = null; + private bool initialised = false; + + /** + * initialise an ISAAC cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param params the parameters required to set up the cipher. + * @exception ArgumentException if the params argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException( + "invalid parameter passed to ISAAC Init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), + "parameters"); + + /* + * ISAAC encryption and decryption is completely + * symmetrical, so the 'forEncryption' is + * irrelevant. + */ + KeyParameter p = (KeyParameter) parameters; + setKey(p.GetKey()); + } + + public virtual byte ReturnByte( + byte input) + { + if (index == 0) + { + isaac(); + keyStream = Pack.UInt32_To_BE(results); + } + + byte output = (byte)(keyStream[index]^input); + index = (index + 1) & 1023; + + return output; + } + + public virtual void ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] output, + int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + + for (int i = 0; i < len; i++) + { + if (index == 0) + { + isaac(); + keyStream = Pack.UInt32_To_BE(results); + } + output[i+outOff] = (byte)(keyStream[index]^input[i+inOff]); + index = (index + 1) & 1023; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; i++) + { + if (index == 0) + { + isaac(); + keyStream = Pack.UInt32_To_BE(results); + } + output[i] = (byte)(keyStream[index++] ^ input[i]); + index &= 1023; + } + } +#endif + + public virtual string AlgorithmName + { + get { return "ISAAC"; } + } + + public virtual void Reset() + { + setKey(workingKey); + } + + // Private implementation + private void setKey( + byte[] keyBytes) + { + workingKey = keyBytes; + + if (engineState == null) + { + engineState = new uint[stateArraySize]; + } + + if (results == null) + { + results = new uint[stateArraySize]; + } + + int i, j, k; + + // Reset state + for (i = 0; i < stateArraySize; i++) + { + engineState[i] = results[i] = 0; + } + a = b = c = 0; + + // Reset index counter for output + index = 0; + + // Convert the key bytes to ints and put them into results[] for initialization + byte[] t = new byte[keyBytes.Length + (keyBytes.Length & 3)]; + Array.Copy(keyBytes, 0, t, 0, keyBytes.Length); + for (i = 0; i < t.Length; i+=4) + { + results[i >> 2] = Pack.LE_To_UInt32(t, i); + } + + // It has begun? + uint[] abcdefgh = new uint[sizeL]; + + for (i = 0; i < sizeL; i++) + { + abcdefgh[i] = 0x9e3779b9; // Phi (golden ratio) + } + + for (i = 0; i < 4; i++) + { + mix(abcdefgh); + } + + for (i = 0; i < 2; i++) + { + for (j = 0; j < stateArraySize; j+=sizeL) + { + for (k = 0; k < sizeL; k++) + { + abcdefgh[k] += (i<1) ? results[j+k] : engineState[j+k]; + } + + mix(abcdefgh); + + for (k = 0; k < sizeL; k++) + { + engineState[j+k] = abcdefgh[k]; + } + } + } + + isaac(); + + initialised = true; + } + + private void isaac() + { + uint x, y; + + b += ++c; + for (int i = 0; i < stateArraySize; i++) + { + x = engineState[i]; + switch (i & 3) + { + case 0: a ^= (a << 13); break; + case 1: a ^= (a >> 6); break; + case 2: a ^= (a << 2); break; + case 3: a ^= (a >> 16); break; + } + a += engineState[(i+128) & 0xFF]; + engineState[i] = y = engineState[(int)((uint)x >> 2) & 0xFF] + a + b; + results[i] = b = engineState[(int)((uint)y >> 10) & 0xFF] + x; + } + } + + private void mix(uint[] x) + { + x[0]^=x[1]<< 11; x[3]+=x[0]; x[1]+=x[2]; + x[1]^=x[2]>> 2; x[4]+=x[1]; x[2]+=x[3]; + x[2]^=x[3]<< 8; x[5]+=x[2]; x[3]+=x[4]; + x[3]^=x[4]>> 16; x[6]+=x[3]; x[4]+=x[5]; + x[4]^=x[5]<< 10; x[7]+=x[4]; x[5]+=x[6]; + x[5]^=x[6]>> 4; x[0]+=x[5]; x[6]+=x[7]; + x[6]^=x[7]<< 8; x[1]+=x[6]; x[7]+=x[0]; + x[7]^=x[0]>> 9; x[2]+=x[7]; x[0]+=x[1]; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs.meta new file mode 100644 index 00000000..1890f170 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b98839b43ea6fe4ca137cc72b6756ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ISAACEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs new file mode 100644 index 00000000..36a08d5b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs @@ -0,0 +1,381 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A class that provides a basic International Data Encryption Algorithm (IDEA) engine. + *

+ * This implementation is based on the "HOWTO: INTERNATIONAL DATA ENCRYPTION ALGORITHM" + * implementation summary by Fauzan Mirza (F.U.Mirza@sheffield.ac.uk). (barring 1 typo at the + * end of the MulInv function!). + *

+ *

+ * It can be found at ftp://ftp.funet.fi/pub/crypt/cryptography/symmetric/idea/ + *

+ *

+ * Note: This algorithm was patented in the USA, Japan and Europe. These patents expired in 2011/2012. + *

+ */ + public class IdeaEngine + : IBlockCipher + { + private const int BLOCK_SIZE = 8; + private int[] workingKey; + /** + * standard constructor. + */ + public IdeaEngine() + { + } + /** + * initialise an IDEA cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("invalid parameter passed to IDEA init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + workingKey = GenerateWorkingKey(forEncryption, + ((KeyParameter)parameters).GetKey()); + } + + public virtual string AlgorithmName + { + get { return "IDEA"; } + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("IDEA engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + IdeaFunc(workingKey, input.AsSpan(inOff), output.AsSpan(outOff)); +#else + IdeaFunc(workingKey, input, inOff, output, outOff); +#endif + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("IDEA engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + IdeaFunc(workingKey, input, output); + return BLOCK_SIZE; + } +#endif + + private static readonly int MASK = 0xffff; + private static readonly int BASE = 0x10001; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int BytesToWord(ReadOnlySpan input) + { + return ((input[0] << 8) & 0xff00) + (input[1] & 0xff); + } + + private void WordToBytes(int word, Span output) + { + output[0] = (byte)((uint)word >> 8); + output[1] = (byte)word; + } +#else + private int BytesToWord(byte[] input, int inOff) + { + return ((input[inOff] << 8) & 0xff00) + (input[inOff + 1] & 0xff); + } + + private void WordToBytes(int word, byte[] outBytes, int outOff) + { + outBytes[outOff] = (byte)((uint) word >> 8); + outBytes[outOff + 1] = (byte)word; + } +#endif + + /** + * return x = x * y where the multiplication is done modulo + * 65537 (0x10001) (as defined in the IDEA specification) and + * a zero input is taken to be 65536 (0x10000). + * + * @param x the x value + * @param y the y value + * @return x = x * y + */ + private int Mul( + int x, + int y) + { + if (x == 0) + { + x = (BASE - y); + } + else if (y == 0) + { + x = (BASE - x); + } + else + { + int p = x * y; + y = p & MASK; + x = (int) ((uint) p >> 16); + x = y - x + ((y < x) ? 1 : 0); + } + return x & MASK; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void IdeaFunc(int[] workingKey, ReadOnlySpan input, Span output) + { + int x0 = BytesToWord(input); + int x1 = BytesToWord(input[2..]); + int x2 = BytesToWord(input[4..]); + int x3 = BytesToWord(input[6..]); + int keyOff = 0, t0, t1; + for (int round = 0; round < 8; round++) + { + x0 = Mul(x0, workingKey[keyOff++]); + x1 += workingKey[keyOff++]; + x1 &= MASK; + x2 += workingKey[keyOff++]; + x2 &= MASK; + x3 = Mul(x3, workingKey[keyOff++]); + t0 = x1; + t1 = x2; + x2 ^= x0; + x1 ^= x3; + x2 = Mul(x2, workingKey[keyOff++]); + x1 += x2; + x1 &= MASK; + x1 = Mul(x1, workingKey[keyOff++]); + x2 += x1; + x2 &= MASK; + x0 ^= x1; + x3 ^= x2; + x1 ^= t1; + x2 ^= t0; + } + WordToBytes(Mul(x0, workingKey[keyOff++]), output); + WordToBytes(x2 + workingKey[keyOff++], output[2..]); /* NB: Order */ + WordToBytes(x1 + workingKey[keyOff++], output[4..]); + WordToBytes(Mul(x3, workingKey[keyOff]), output[6..]); + } +#else + private void IdeaFunc(int[] workingKey, byte[] input, int inOff, byte[] outBytes, int outOff) + { + int x0 = BytesToWord(input, inOff); + int x1 = BytesToWord(input, inOff + 2); + int x2 = BytesToWord(input, inOff + 4); + int x3 = BytesToWord(input, inOff + 6); + int keyOff = 0, t0, t1; + for (int round = 0; round < 8; round++) + { + x0 = Mul(x0, workingKey[keyOff++]); + x1 += workingKey[keyOff++]; + x1 &= MASK; + x2 += workingKey[keyOff++]; + x2 &= MASK; + x3 = Mul(x3, workingKey[keyOff++]); + t0 = x1; + t1 = x2; + x2 ^= x0; + x1 ^= x3; + x2 = Mul(x2, workingKey[keyOff++]); + x1 += x2; + x1 &= MASK; + x1 = Mul(x1, workingKey[keyOff++]); + x2 += x1; + x2 &= MASK; + x0 ^= x1; + x3 ^= x2; + x1 ^= t1; + x2 ^= t0; + } + WordToBytes(Mul(x0, workingKey[keyOff++]), outBytes, outOff); + WordToBytes(x2 + workingKey[keyOff++], outBytes, outOff + 2); /* NB: Order */ + WordToBytes(x1 + workingKey[keyOff++], outBytes, outOff + 4); + WordToBytes(Mul(x3, workingKey[keyOff]), outBytes, outOff + 6); + } +#endif + + /** + * The following function is used to expand the user key to the encryption + * subkey. The first 16 bytes are the user key, and the rest of the subkey + * is calculated by rotating the previous 16 bytes by 25 bits to the left, + * and so on until the subkey is completed. + */ + private int[] ExpandKey(byte[] uKey) + { + int[] key = new int[52]; + if (uKey.Length < 16) + { + byte[] tmp = new byte[16]; + Array.Copy(uKey, 0, tmp, tmp.Length - uKey.Length, uKey.Length); + uKey = tmp; + } + for (int i = 0; i < 8; i++) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + key[i] = BytesToWord(uKey[(i * 2)..]); +#else + key[i] = BytesToWord(uKey, i * 2); +#endif + } + for (int i = 8; i < 52; i++) + { + if ((i & 7) < 6) + { + key[i] = ((key[i - 7] & 127) << 9 | key[i - 6] >> 7) & MASK; + } + else if ((i & 7) == 6) + { + key[i] = ((key[i - 7] & 127) << 9 | key[i - 14] >> 7) & MASK; + } + else + { + key[i] = ((key[i - 15] & 127) << 9 | key[i - 14] >> 7) & MASK; + } + } + return key; + } + /** + * This function computes multiplicative inverse using Euclid's Greatest + * Common Divisor algorithm. Zero and one are self inverse. + *

+ * i.e. x * MulInv(x) == 1 (modulo BASE) + *

+ */ + private int MulInv( + int x) + { + int t0, t1, q, y; + + if (x < 2) + { + return x; + } + t0 = 1; + t1 = BASE / x; + y = BASE % x; + while (y != 1) + { + q = x / y; + x = x % y; + t0 = (t0 + (t1 * q)) & MASK; + if (x == 1) + { + return t0; + } + q = y / x; + y = y % x; + t1 = (t1 + (t0 * q)) & MASK; + } + return (1 - t1) & MASK; + } + /** + * Return the additive inverse of x. + *

+ * i.e. x + AddInv(x) == 0 + *

+ */ + int AddInv( + int x) + { + return (0 - x) & MASK; + } + + /** + * The function to invert the encryption subkey to the decryption subkey. + * It also involves the multiplicative inverse and the additive inverse functions. + */ + private int[] InvertKey( + int[] inKey) + { + int t1, t2, t3, t4; + int p = 52; /* We work backwards */ + int[] key = new int[52]; + int inOff = 0; + + t1 = MulInv(inKey[inOff++]); + t2 = AddInv(inKey[inOff++]); + t3 = AddInv(inKey[inOff++]); + t4 = MulInv(inKey[inOff++]); + key[--p] = t4; + key[--p] = t3; + key[--p] = t2; + key[--p] = t1; + + for (int round = 1; round < 8; round++) + { + t1 = inKey[inOff++]; + t2 = inKey[inOff++]; + key[--p] = t2; + key[--p] = t1; + + t1 = MulInv(inKey[inOff++]); + t2 = AddInv(inKey[inOff++]); + t3 = AddInv(inKey[inOff++]); + t4 = MulInv(inKey[inOff++]); + key[--p] = t4; + key[--p] = t2; /* NB: Order */ + key[--p] = t3; + key[--p] = t1; + } + t1 = inKey[inOff++]; + t2 = inKey[inOff++]; + key[--p] = t2; + key[--p] = t1; + + t1 = MulInv(inKey[inOff++]); + t2 = AddInv(inKey[inOff++]); + t3 = AddInv(inKey[inOff++]); + t4 = MulInv(inKey[inOff]); + key[--p] = t4; + key[--p] = t3; + key[--p] = t2; + key[--p] = t1; + return key; + } + + private int[] GenerateWorkingKey( + bool forEncryption, + byte[] userKey) + { + if (forEncryption) + { + return ExpandKey(userKey); + } + else + { + return InvertKey(ExpandKey(userKey)); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs.meta new file mode 100644 index 00000000..70517121 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4cd0d95613058e4489ba02ec1fc3e945 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IdeaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs new file mode 100644 index 00000000..e81e399b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs @@ -0,0 +1,247 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * support class for constructing intergrated encryption ciphers + * for doing basic message exchanges on top of key agreement ciphers + */ + public class IesEngine + { + private readonly IBasicAgreement agree; + private readonly IDerivationFunction kdf; + private readonly IMac mac; + private readonly BufferedBlockCipher cipher; + private readonly byte[] macBuf; + + private bool forEncryption; + private ICipherParameters privParam, pubParam; + private IesParameters param; + + /** + * set up for use with stream mode, where the key derivation function + * is used to provide a stream of bytes to xor with the message. + * + * @param agree the key agreement used as the basis for the encryption + * @param kdf the key derivation function used for byte generation + * @param mac the message authentication code generator for the message + */ + public IesEngine( + IBasicAgreement agree, + IDerivationFunction kdf, + IMac mac) + { + this.agree = agree; + this.kdf = kdf; + this.mac = mac; + this.macBuf = new byte[mac.GetMacSize()]; +// this.cipher = null; + } + + /** + * set up for use in conjunction with a block cipher to handle the + * message. + * + * @param agree the key agreement used as the basis for the encryption + * @param kdf the key derivation function used for byte generation + * @param mac the message authentication code generator for the message + * @param cipher the cipher to used for encrypting the message + */ + public IesEngine( + IBasicAgreement agree, + IDerivationFunction kdf, + IMac mac, + BufferedBlockCipher cipher) + { + this.agree = agree; + this.kdf = kdf; + this.mac = mac; + this.macBuf = new byte[mac.GetMacSize()]; + this.cipher = cipher; + } + + /** + * Initialise the encryptor. + * + * @param forEncryption whether or not this is encryption/decryption. + * @param privParam our private key parameters + * @param pubParam the recipient's/sender's public key parameters + * @param param encoding and derivation parameters. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters privParameters, + ICipherParameters pubParameters, + ICipherParameters iesParameters) + { + this.forEncryption = forEncryption; + this.privParam = privParameters; + this.pubParam = pubParameters; + this.param = (IesParameters)iesParameters; + } + + private byte[] DecryptBlock( + byte[] in_enc, + int inOff, + int inLen, + byte[] z) + { + byte[] M = null; + KeyParameter macKey = null; + KdfParameters kParam = new KdfParameters(z, param.GetDerivationV()); + int macKeySize = param.MacKeySize; + + kdf.Init(kParam); + + // Ensure that the length of the input is greater than the MAC in bytes + if (inLen < mac.GetMacSize()) + throw new InvalidCipherTextException("Length of input must be greater than the MAC"); + + inLen -= mac.GetMacSize(); + + if (cipher == null) // stream mode + { + byte[] Buffer = GenerateKdfBytes(kParam, inLen + (macKeySize / 8)); + + M = new byte[inLen]; + + for (int i = 0; i != inLen; i++) + { + M[i] = (byte)(in_enc[inOff + i] ^ Buffer[i]); + } + + macKey = new KeyParameter(Buffer, inLen, (macKeySize / 8)); + } + else + { + int cipherKeySize = ((IesWithCipherParameters)param).CipherKeySize; + byte[] Buffer = GenerateKdfBytes(kParam, (cipherKeySize / 8) + (macKeySize / 8)); + + cipher.Init(false, new KeyParameter(Buffer, 0, (cipherKeySize / 8))); + + M = cipher.DoFinal(in_enc, inOff, inLen); + + macKey = new KeyParameter(Buffer, (cipherKeySize / 8), (macKeySize / 8)); + } + + byte[] macIV = param.GetEncodingV(); + + mac.Init(macKey); + mac.BlockUpdate(in_enc, inOff, inLen); + mac.BlockUpdate(macIV, 0, macIV.Length); + mac.DoFinal(macBuf, 0); + + inOff += inLen; + + byte[] T1 = Arrays.CopyOfRange(in_enc, inOff, inOff + macBuf.Length); + + if (!Arrays.ConstantTimeAreEqual(T1, macBuf)) + throw (new InvalidCipherTextException("Invalid MAC.")); + + return M; + } + + private byte[] EncryptBlock( + byte[] input, + int inOff, + int inLen, + byte[] z) + { + byte[] C = null; + KeyParameter macKey = null; + KdfParameters kParam = new KdfParameters(z, param.GetDerivationV()); + int c_text_length = 0; + int macKeySize = param.MacKeySize; + + if (cipher == null) // stream mode + { + byte[] Buffer = GenerateKdfBytes(kParam, inLen + (macKeySize / 8)); + + C = new byte[inLen + mac.GetMacSize()]; + c_text_length = inLen; + + for (int i = 0; i != inLen; i++) + { + C[i] = (byte)(input[inOff + i] ^ Buffer[i]); + } + + macKey = new KeyParameter(Buffer, inLen, (macKeySize / 8)); + } + else + { + int cipherKeySize = ((IesWithCipherParameters)param).CipherKeySize; + byte[] Buffer = GenerateKdfBytes(kParam, (cipherKeySize / 8) + (macKeySize / 8)); + + cipher.Init(true, new KeyParameter(Buffer, 0, (cipherKeySize / 8))); + + c_text_length = cipher.GetOutputSize(inLen); + byte[] tmp = new byte[c_text_length]; + + int len = cipher.ProcessBytes(input, inOff, inLen, tmp, 0); + len += cipher.DoFinal(tmp, len); + + C = new byte[len + mac.GetMacSize()]; + c_text_length = len; + + Array.Copy(tmp, 0, C, 0, len); + + macKey = new KeyParameter(Buffer, (cipherKeySize / 8), (macKeySize / 8)); + } + + byte[] macIV = param.GetEncodingV(); + + mac.Init(macKey); + mac.BlockUpdate(C, 0, c_text_length); + mac.BlockUpdate(macIV, 0, macIV.Length); + // + // return the message and it's MAC + // + mac.DoFinal(C, c_text_length); + return C; + } + + private byte[] GenerateKdfBytes( + KdfParameters kParam, + int length) + { + byte[] buf = new byte[length]; + + kdf.Init(kParam); + + kdf.GenerateBytes(buf, 0, buf.Length); + + return buf; + } + + public virtual byte[] ProcessBlock( + byte[] input, + int inOff, + int inLen) + { + agree.Init(privParam); + + BigInteger z = agree.CalculateAgreement(pubParam); + + byte[] zBytes = BigIntegers.AsUnsignedByteArray(agree.GetFieldSize(), z); + + try + { + return forEncryption + ? EncryptBlock(input, inOff, inLen, zBytes) + : DecryptBlock(input, inOff, inLen, zBytes); + } + finally + { + Array.Clear(zBytes, 0, zBytes.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs.meta new file mode 100644 index 00000000..23e2a6d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c6099a03c3ca89459f45b5a11447705 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/IesEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs new file mode 100644 index 00000000..edea2325 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs @@ -0,0 +1,352 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * NaccacheStern Engine. For details on this cipher, please see + * http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf + */ + public class NaccacheSternEngine + : IAsymmetricBlockCipher + { + private bool forEncryption; + + private NaccacheSternKeyParameters key; + + private IList[] lookup = null; + + public string AlgorithmName + { + get { return "NaccacheStern"; } + } + + /** + * Initializes this algorithm. Must be called before all other Functions. + * + * @see org.bouncycastle.crypto.AsymmetricBlockCipher#init(bool, + * org.bouncycastle.crypto.CipherParameters) + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + key = (NaccacheSternKeyParameters)parameters; + + // construct lookup table for faster decryption if necessary + if (!this.forEncryption) + { + NaccacheSternPrivateKeyParameters priv = (NaccacheSternPrivateKeyParameters)key; + var primes = priv.SmallPrimesList; + lookup = new IList[primes.Count]; + for (int i = 0; i < primes.Count; i++) + { + BigInteger actualPrime = primes[i]; + int actualPrimeValue = actualPrime.IntValue; + + lookup[i] = new List(actualPrimeValue); + lookup[i].Add(BigInteger.One); + + BigInteger accJ = BigInteger.Zero; + for (int j = 1; j < actualPrimeValue; j++) + { + accJ = accJ.Add(priv.PhiN); + BigInteger comp = accJ.Divide(actualPrime); + lookup[i].Add(priv.G.ModPow(comp, priv.Modulus)); + } + } + } + } + + /** + * Returns the input block size of this algorithm. + * + * @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetInputBlockSize() + */ + public virtual int GetInputBlockSize() + { + if (forEncryption) + { + // We can only encrypt values up to lowerSigmaBound + return (key.LowerSigmaBound + 7) / 8 - 1; + } + else + { + // We pad to modulus-size bytes for easier decryption. +// return key.Modulus.ToByteArray().Length; + return key.Modulus.BitLength / 8 + 1; + } + } + + /** + * Returns the output block size of this algorithm. + * + * @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetOutputBlockSize() + */ + public virtual int GetOutputBlockSize() + { + if (forEncryption) + { + // encrypted Data is always padded up to modulus size +// return key.Modulus.ToByteArray().Length; + return key.Modulus.BitLength / 8 + 1; + } + else + { + // decrypted Data has upper limit lowerSigmaBound + return (key.LowerSigmaBound + 7) / 8 - 1; + } + } + + /** + * Process a single Block using the Naccache-Stern algorithm. + * + * @see org.bouncycastle.crypto.AsymmetricBlockCipher#ProcessBlock(byte[], + * int, int) + */ + public virtual byte[] ProcessBlock( + byte[] inBytes, + int inOff, + int length) + { + if (key == null) + throw new InvalidOperationException("NaccacheStern engine not initialised"); + if (length > (GetInputBlockSize() + 1)) + throw new DataLengthException("input too large for Naccache-Stern cipher.\n"); + + if (!forEncryption) + { + // At decryption make sure that we receive padded data blocks + if (length < GetInputBlockSize()) + { + throw new InvalidCipherTextException("BlockLength does not match modulus for Naccache-Stern cipher.\n"); + } + } + + // transform input into BigInteger + BigInteger input = new BigInteger(1, inBytes, inOff, length); + + byte[] output; + if (forEncryption) + { + output = Encrypt(input); + } + else + { + var plain = new List(); + NaccacheSternPrivateKeyParameters priv = (NaccacheSternPrivateKeyParameters)key; + var primes = priv.SmallPrimesList; + // Get Chinese Remainders of CipherText + for (int i = 0; i < primes.Count; i++) + { + BigInteger exp = input.ModPow(priv.PhiN.Divide((BigInteger)primes[i]), priv.Modulus); + var al = lookup[i]; + if (lookup[i].Count != primes[i].IntValue) + { + throw new InvalidCipherTextException("Error in lookup Array for " + + primes[i].IntValue + + ": Size mismatch. Expected ArrayList with length " + + primes[i].IntValue + " but found ArrayList of length " + + lookup[i].Count); + } + int lookedup = al.IndexOf(exp); + + if (lookedup == -1) + throw new InvalidCipherTextException("Lookup failed"); + + plain.Add(BigInteger.ValueOf(lookedup)); + } + BigInteger test = ChineseRemainder(plain, primes); + + // Should not be used as an oracle, so reencrypt output to see + // if it corresponds to input + + // this breaks probabilisic encryption, so disable it. Anyway, we do + // use the first n primes for key generation, so it is pretty easy + // to guess them. But as stated in the paper, this is not a security + // breach. So we can just work with the correct sigma. + + // if ((key.G.ModPow(test, key.Modulus)).Equals(input)) { + // output = test.ToByteArray(); + // } else { + // output = null; + // } + + output = test.ToByteArray(); + } + + return output; + } + + /** + * Encrypts a BigInteger aka Plaintext with the public key. + * + * @param plain + * The BigInteger to encrypt + * @return The byte[] representation of the encrypted BigInteger (i.e. + * crypted.toByteArray()) + */ + public virtual byte[] Encrypt( + BigInteger plain) + { + // Always return modulus size values 0-padded at the beginning + // 0-padding at the beginning is correctly parsed by BigInteger :) +// byte[] output = key.Modulus.ToByteArray(); +// Array.Clear(output, 0, output.Length); + byte[] output = new byte[key.Modulus.BitLength / 8 + 1]; + + byte[] tmp = key.G.ModPow(plain, key.Modulus).ToByteArray(); + Array.Copy(tmp, 0, output, output.Length - tmp.Length, tmp.Length); + return output; + } + + /** + * Adds the contents of two encrypted blocks mod sigma + * + * @param block1 + * the first encrypted block + * @param block2 + * the second encrypted block + * @return encrypt((block1 + block2) mod sigma) + * @throws InvalidCipherTextException + */ + public virtual byte[] AddCryptedBlocks( + byte[] block1, + byte[] block2) + { + // check for correct blocksize + if (forEncryption) + { + if ((block1.Length > GetOutputBlockSize()) + || (block2.Length > GetOutputBlockSize())) + { + throw new InvalidCipherTextException( + "BlockLength too large for simple addition.\n"); + } + } + else + { + if ((block1.Length > GetInputBlockSize()) + || (block2.Length > GetInputBlockSize())) + { + throw new InvalidCipherTextException( + "BlockLength too large for simple addition.\n"); + } + } + + // calculate resulting block + BigInteger m1Crypt = new BigInteger(1, block1); + BigInteger m2Crypt = new BigInteger(1, block2); + BigInteger m1m2Crypt = m1Crypt.Multiply(m2Crypt); + m1m2Crypt = m1m2Crypt.Mod(key.Modulus); + + //byte[] output = key.Modulus.ToByteArray(); + //Array.Clear(output, 0, output.Length); + byte[] output = new byte[key.Modulus.BitLength / 8 + 1]; + + byte[] m1m2CryptBytes = m1m2Crypt.ToByteArray(); + Array.Copy(m1m2CryptBytes, 0, output, + output.Length - m1m2CryptBytes.Length, m1m2CryptBytes.Length); + + return output; + } + + /** + * Convenience Method for data exchange with the cipher. + * + * Determines blocksize and splits data to blocksize. + * + * @param data the data to be processed + * @return the data after it went through the NaccacheSternEngine. + * @throws InvalidCipherTextException + */ + public virtual byte[] ProcessData( + byte[] data) + { + if (data.Length > GetInputBlockSize()) + { + int inBlocksize = GetInputBlockSize(); + int outBlocksize = GetOutputBlockSize(); + int datapos = 0; + int retpos = 0; + byte[] retval = new byte[(data.Length / inBlocksize + 1) * outBlocksize]; + while (datapos < data.Length) + { + byte[] tmp; + if (datapos + inBlocksize < data.Length) + { + tmp = ProcessBlock(data, datapos, inBlocksize); + datapos += inBlocksize; + } + else + { + tmp = ProcessBlock(data, datapos, data.Length - datapos); + datapos += data.Length - datapos; + } + if (tmp != null) + { + tmp.CopyTo(retval, retpos); + retpos += tmp.Length; + } + else + { + throw new InvalidCipherTextException("cipher returned null"); + } + } + byte[] ret = new byte[retpos]; + Array.Copy(retval, 0, ret, 0, retpos); + return ret; + } + else + { + return ProcessBlock(data, 0, data.Length); + } + } + + /** + * Computes the integer x that is expressed through the given primes and the + * congruences with the chinese remainder theorem (CRT). + * + * @param congruences + * the congruences c_i + * @param primes + * the primes p_i + * @return an integer x for that x % p_i == c_i + */ + private static BigInteger ChineseRemainder(IList congruences, IList primes) + { + BigInteger retval = BigInteger.Zero; + BigInteger all = BigInteger.One; + for (int i = 0; i < primes.Count; i++) + { + all = all.Multiply(primes[i]); + } + for (int i = 0; i < primes.Count; i++) + { + BigInteger a = primes[i]; + BigInteger b = all.Divide(a); + BigInteger b2 = b.ModInverse(a); + BigInteger tmp = b.Multiply(b2); + tmp = tmp.Multiply(congruences[i]); + retval = retval.Add(tmp); + } + + return retval.Mod(all); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs.meta new file mode 100644 index 00000000..84699141 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4f4d7516337f74b46b83119aed1c7184 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NaccacheSternEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs new file mode 100644 index 00000000..2a257344 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs @@ -0,0 +1,414 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A Noekeon engine, using direct-key mode. + */ + public class NoekeonEngine + : IBlockCipher + { + // Block and key size, as well as the amount of rounds. + private const int Size = 16; + + private static readonly byte[] RoundConstants = { 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, + 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4 }; + + private readonly uint[] k = new uint[4]; + + private bool _initialised, _forEncryption; + + /** + * Create an instance of the Noekeon encryption algorithm + * and set some defaults + */ + public NoekeonEngine() + { + _initialised = false; + } + + public virtual string AlgorithmName + { + get { return "Noekeon"; } + } + + public virtual int GetBlockSize() + { + return Size; + } + + /** + * initialise + * + * @param forEncryption whether or not we are for encryption. + * @param params the parameters required to set up the cipher. + * @exception ArgumentException if the params argument is + * inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("Invalid parameters passed to Noekeon init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), "parameters"); + + KeyParameter p = (KeyParameter) parameters; + byte[] key = p.GetKey(); + if (key.Length != 16) + throw new ArgumentException("Key length not 128 bits."); + + Pack.BE_To_UInt32(key, 0, k, 0, 4); + + if (!forEncryption) + { + // theta(k, new uint[]{ 0x00, 0x00, 0x00, 0x00 }); + { + uint a0 = k[0], a1 = k[1], a2 = k[2], a3 = k[3]; + + uint t02 = a0 ^ a2; + t02 ^= Integers.RotateLeft(t02, 8) ^ Integers.RotateLeft(t02, 24); + + uint t13 = a1 ^ a3; + t13 ^= Integers.RotateLeft(t13, 8) ^ Integers.RotateLeft(t13, 24); + + a0 ^= t13; + a1 ^= t02; + a2 ^= t13; + a3 ^= t02; + + k[0] = a0; k[1] = a1; k[2] = a2; k[3] = a3; + } + } + + this._forEncryption = forEncryption; + this._initialised = true; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, inOff, Size, "input buffer too short"); + Check.OutputLength(output, outOff, Size, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return _forEncryption + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return _forEncryption + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, Size, "input buffer too short"); + Check.OutputLength(output, Size, "output buffer too short"); + + return _forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + uint a0 = Pack.BE_To_UInt32(input); + uint a1 = Pack.BE_To_UInt32(input[4..]); + uint a2 = Pack.BE_To_UInt32(input[8..]); + uint a3 = Pack.BE_To_UInt32(input[12..]); + + uint k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3]; + + int round = 0; + for (;;) + { + a0 ^= RoundConstants[round]; + + // theta(a, k); + { + uint t02 = a0 ^ a2; + t02 ^= Integers.RotateLeft(t02, 8) ^ Integers.RotateLeft(t02, 24); + + a0 ^= k0; + a1 ^= k1; + a2 ^= k2; + a3 ^= k3; + + uint t13 = a1 ^ a3; + t13 ^= Integers.RotateLeft(t13, 8) ^ Integers.RotateLeft(t13, 24); + + a0 ^= t13; + a1 ^= t02; + a2 ^= t13; + a3 ^= t02; + } + + if (++round > Size) + break; + + // pi1(a); + { + a1 = Integers.RotateLeft(a1, 1); + a2 = Integers.RotateLeft(a2, 5); + a3 = Integers.RotateLeft(a3, 2); + } + + // gamma(a); + { + uint t = a3; + a1 ^= a3 | a2; + a3 = a0 ^ (a2 & ~a1); + + a2 = t ^ ~a1 ^ a2 ^ a3; + + a1 ^= a3 | a2; + a0 = t ^ (a2 & a1); + } + + // pi2(a); + { + a1 = Integers.RotateLeft(a1, 31); + a2 = Integers.RotateLeft(a2, 27); + a3 = Integers.RotateLeft(a3, 30); + } + } + + Pack.UInt32_To_BE(a0, output); + Pack.UInt32_To_BE(a1, output[4..]); + Pack.UInt32_To_BE(a2, output[8..]); + Pack.UInt32_To_BE(a3, output[12..]); + + return Size; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + uint a0 = Pack.BE_To_UInt32(input); + uint a1 = Pack.BE_To_UInt32(input[4..]); + uint a2 = Pack.BE_To_UInt32(input[8..]); + uint a3 = Pack.BE_To_UInt32(input[12..]); + + uint k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3]; + + int round = Size; + for (;;) + { + // theta(a, k); + { + uint t02 = a0 ^ a2; + t02 ^= Integers.RotateLeft(t02, 8) ^ Integers.RotateLeft(t02, 24); + + a0 ^= k0; + a1 ^= k1; + a2 ^= k2; + a3 ^= k3; + + uint t13 = a1 ^ a3; + t13 ^= Integers.RotateLeft(t13, 8) ^ Integers.RotateLeft(t13, 24); + + a0 ^= t13; + a1 ^= t02; + a2 ^= t13; + a3 ^= t02; + } + + a0 ^= RoundConstants[round]; + + if (--round < 0) + break; + + // pi1(a); + { + a1 = Integers.RotateLeft(a1, 1); + a2 = Integers.RotateLeft(a2, 5); + a3 = Integers.RotateLeft(a3, 2); + } + + // gamma(a); + { + uint t = a3; + a1 ^= a3 | a2; + a3 = a0 ^ (a2 & ~a1); + + a2 = t ^ ~a1 ^ a2 ^ a3; + + a1 ^= a3 | a2; + a0 = t ^ (a2 & a1); + } + + // pi2(a); + { + a1 = Integers.RotateLeft(a1, 31); + a2 = Integers.RotateLeft(a2, 27); + a3 = Integers.RotateLeft(a3, 30); + } + } + + Pack.UInt32_To_BE(a0, output); + Pack.UInt32_To_BE(a1, output[4..]); + Pack.UInt32_To_BE(a2, output[8..]); + Pack.UInt32_To_BE(a3, output[12..]); + + return Size; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + uint a0 = Pack.BE_To_UInt32(input, inOff); + uint a1 = Pack.BE_To_UInt32(input, inOff + 4); + uint a2 = Pack.BE_To_UInt32(input, inOff + 8); + uint a3 = Pack.BE_To_UInt32(input, inOff + 12); + + uint k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3]; + + int round = 0; + for (;;) + { + a0 ^= RoundConstants[round]; + + // theta(a, k); + { + uint t02 = a0 ^ a2; + t02 ^= Integers.RotateLeft(t02, 8) ^ Integers.RotateLeft(t02, 24); + + a0 ^= k0; + a1 ^= k1; + a2 ^= k2; + a3 ^= k3; + + uint t13 = a1 ^ a3; + t13 ^= Integers.RotateLeft(t13, 8) ^ Integers.RotateLeft(t13, 24); + + a0 ^= t13; + a1 ^= t02; + a2 ^= t13; + a3 ^= t02; + } + + if (++round > Size) + break; + + // pi1(a); + { + a1 = Integers.RotateLeft(a1, 1); + a2 = Integers.RotateLeft(a2, 5); + a3 = Integers.RotateLeft(a3, 2); + } + + // gamma(a); + { + uint t = a3; + a1 ^= a3 | a2; + a3 = a0 ^ (a2 & ~a1); + + a2 = t ^ ~a1 ^ a2 ^ a3; + + a1 ^= a3 | a2; + a0 = t ^ (a2 & a1); + } + + // pi2(a); + { + a1 = Integers.RotateLeft(a1, 31); + a2 = Integers.RotateLeft(a2, 27); + a3 = Integers.RotateLeft(a3, 30); + } + } + + Pack.UInt32_To_BE(a0, output, outOff); + Pack.UInt32_To_BE(a1, output, outOff + 4); + Pack.UInt32_To_BE(a2, output, outOff + 8); + Pack.UInt32_To_BE(a3, output, outOff + 12); + + return Size; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + uint a0 = Pack.BE_To_UInt32(input, inOff); + uint a1 = Pack.BE_To_UInt32(input, inOff + 4); + uint a2 = Pack.BE_To_UInt32(input, inOff + 8); + uint a3 = Pack.BE_To_UInt32(input, inOff + 12); + + uint k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3]; + + int round = Size; + for (;;) + { + // theta(a, k); + { + uint t02 = a0 ^ a2; + t02 ^= Integers.RotateLeft(t02, 8) ^ Integers.RotateLeft(t02, 24); + + a0 ^= k0; + a1 ^= k1; + a2 ^= k2; + a3 ^= k3; + + uint t13 = a1 ^ a3; + t13 ^= Integers.RotateLeft(t13, 8) ^ Integers.RotateLeft(t13, 24); + + a0 ^= t13; + a1 ^= t02; + a2 ^= t13; + a3 ^= t02; + } + + a0 ^= RoundConstants[round]; + + if (--round < 0) + break; + + // pi1(a); + { + a1 = Integers.RotateLeft(a1, 1); + a2 = Integers.RotateLeft(a2, 5); + a3 = Integers.RotateLeft(a3, 2); + } + + // gamma(a); + { + uint t = a3; + a1 ^= a3 | a2; + a3 = a0 ^ (a2 & ~a1); + + a2 = t ^ ~a1 ^ a2 ^ a3; + + a1 ^= a3 | a2; + a0 = t ^ (a2 & a1); + } + + // pi2(a); + { + a1 = Integers.RotateLeft(a1, 31); + a2 = Integers.RotateLeft(a2, 27); + a3 = Integers.RotateLeft(a3, 30); + } + } + + Pack.UInt32_To_BE(a0, output, outOff); + Pack.UInt32_To_BE(a1, output, outOff + 4); + Pack.UInt32_To_BE(a2, output, outOff + 8); + Pack.UInt32_To_BE(a3, output, outOff + 12); + + return Size; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs.meta new file mode 100644 index 00000000..6af8af06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 164c8b2d9ea43184a834ee4c7118963d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NoekeonEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs new file mode 100644 index 00000000..3b1d777f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs @@ -0,0 +1,2 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs.meta new file mode 100644 index 00000000..dddaf047 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5c0eb676404b00b4eb58a10223d7faf3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/NullEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs new file mode 100644 index 00000000..9c2dfa72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs @@ -0,0 +1,433 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * an implementation of RC2 as described in RFC 2268 + * "A Description of the RC2(r) Encryption Algorithm" R. Rivest. + */ + public class RC2Engine + : IBlockCipher + { + // + // the values we use for key expansion (based on the digits of PI) + // + private static readonly byte[] piTable = + { + (byte)0xd9, (byte)0x78, (byte)0xf9, (byte)0xc4, (byte)0x19, (byte)0xdd, (byte)0xb5, (byte)0xed, + (byte)0x28, (byte)0xe9, (byte)0xfd, (byte)0x79, (byte)0x4a, (byte)0xa0, (byte)0xd8, (byte)0x9d, + (byte)0xc6, (byte)0x7e, (byte)0x37, (byte)0x83, (byte)0x2b, (byte)0x76, (byte)0x53, (byte)0x8e, + (byte)0x62, (byte)0x4c, (byte)0x64, (byte)0x88, (byte)0x44, (byte)0x8b, (byte)0xfb, (byte)0xa2, + (byte)0x17, (byte)0x9a, (byte)0x59, (byte)0xf5, (byte)0x87, (byte)0xb3, (byte)0x4f, (byte)0x13, + (byte)0x61, (byte)0x45, (byte)0x6d, (byte)0x8d, (byte)0x9, (byte)0x81, (byte)0x7d, (byte)0x32, + (byte)0xbd, (byte)0x8f, (byte)0x40, (byte)0xeb, (byte)0x86, (byte)0xb7, (byte)0x7b, (byte)0xb, + (byte)0xf0, (byte)0x95, (byte)0x21, (byte)0x22, (byte)0x5c, (byte)0x6b, (byte)0x4e, (byte)0x82, + (byte)0x54, (byte)0xd6, (byte)0x65, (byte)0x93, (byte)0xce, (byte)0x60, (byte)0xb2, (byte)0x1c, + (byte)0x73, (byte)0x56, (byte)0xc0, (byte)0x14, (byte)0xa7, (byte)0x8c, (byte)0xf1, (byte)0xdc, + (byte)0x12, (byte)0x75, (byte)0xca, (byte)0x1f, (byte)0x3b, (byte)0xbe, (byte)0xe4, (byte)0xd1, + (byte)0x42, (byte)0x3d, (byte)0xd4, (byte)0x30, (byte)0xa3, (byte)0x3c, (byte)0xb6, (byte)0x26, + (byte)0x6f, (byte)0xbf, (byte)0xe, (byte)0xda, (byte)0x46, (byte)0x69, (byte)0x7, (byte)0x57, + (byte)0x27, (byte)0xf2, (byte)0x1d, (byte)0x9b, (byte)0xbc, (byte)0x94, (byte)0x43, (byte)0x3, + (byte)0xf8, (byte)0x11, (byte)0xc7, (byte)0xf6, (byte)0x90, (byte)0xef, (byte)0x3e, (byte)0xe7, + (byte)0x6, (byte)0xc3, (byte)0xd5, (byte)0x2f, (byte)0xc8, (byte)0x66, (byte)0x1e, (byte)0xd7, + (byte)0x8, (byte)0xe8, (byte)0xea, (byte)0xde, (byte)0x80, (byte)0x52, (byte)0xee, (byte)0xf7, + (byte)0x84, (byte)0xaa, (byte)0x72, (byte)0xac, (byte)0x35, (byte)0x4d, (byte)0x6a, (byte)0x2a, + (byte)0x96, (byte)0x1a, (byte)0xd2, (byte)0x71, (byte)0x5a, (byte)0x15, (byte)0x49, (byte)0x74, + (byte)0x4b, (byte)0x9f, (byte)0xd0, (byte)0x5e, (byte)0x4, (byte)0x18, (byte)0xa4, (byte)0xec, + (byte)0xc2, (byte)0xe0, (byte)0x41, (byte)0x6e, (byte)0xf, (byte)0x51, (byte)0xcb, (byte)0xcc, + (byte)0x24, (byte)0x91, (byte)0xaf, (byte)0x50, (byte)0xa1, (byte)0xf4, (byte)0x70, (byte)0x39, + (byte)0x99, (byte)0x7c, (byte)0x3a, (byte)0x85, (byte)0x23, (byte)0xb8, (byte)0xb4, (byte)0x7a, + (byte)0xfc, (byte)0x2, (byte)0x36, (byte)0x5b, (byte)0x25, (byte)0x55, (byte)0x97, (byte)0x31, + (byte)0x2d, (byte)0x5d, (byte)0xfa, (byte)0x98, (byte)0xe3, (byte)0x8a, (byte)0x92, (byte)0xae, + (byte)0x5, (byte)0xdf, (byte)0x29, (byte)0x10, (byte)0x67, (byte)0x6c, (byte)0xba, (byte)0xc9, + (byte)0xd3, (byte)0x0, (byte)0xe6, (byte)0xcf, (byte)0xe1, (byte)0x9e, (byte)0xa8, (byte)0x2c, + (byte)0x63, (byte)0x16, (byte)0x1, (byte)0x3f, (byte)0x58, (byte)0xe2, (byte)0x89, (byte)0xa9, + (byte)0xd, (byte)0x38, (byte)0x34, (byte)0x1b, (byte)0xab, (byte)0x33, (byte)0xff, (byte)0xb0, + (byte)0xbb, (byte)0x48, (byte)0xc, (byte)0x5f, (byte)0xb9, (byte)0xb1, (byte)0xcd, (byte)0x2e, + (byte)0xc5, (byte)0xf3, (byte)0xdb, (byte)0x47, (byte)0xe5, (byte)0xa5, (byte)0x9c, (byte)0x77, + (byte)0xa, (byte)0xa6, (byte)0x20, (byte)0x68, (byte)0xfe, (byte)0x7f, (byte)0xc1, (byte)0xad + }; + + private const int BLOCK_SIZE = 8; + + private int[] workingKey; + private bool encrypting; + + private int[] GenerateWorkingKey( + byte[] key, + int bits) + { + int x; + int[] xKey = new int[128]; + + for (int i = 0; i != key.Length; i++) + { + xKey[i] = key[i] & 0xff; + } + + // Phase 1: Expand input key to 128 bytes + int len = key.Length; + + if (len < 128) + { + int index = 0; + + x = xKey[len - 1]; + + do + { + x = piTable[(x + xKey[index++]) & 255] & 0xff; + xKey[len++] = x; + } + while (len < 128); + } + + // Phase 2 - reduce effective key size to "bits" + len = (bits + 7) >> 3; + x = piTable[xKey[128 - len] & (255 >> (7 & -bits))] & 0xff; + xKey[128 - len] = x; + + for (int i = 128 - len - 1; i >= 0; i--) + { + x = piTable[x ^ xKey[i + len]] & 0xff; + xKey[i] = x; + } + + // Phase 3 - copy to newKey in little-endian order + int[] newKey = new int[64]; + + for (int i = 0; i != newKey.Length; i++) + { + newKey[i] = (xKey[2 * i] + (xKey[2 * i + 1] << 8)); + } + + return newKey; + } + + /** + * initialise a RC2 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + this.encrypting = forEncryption; + + if (parameters is RC2Parameters) + { + RC2Parameters param = (RC2Parameters) parameters; + + workingKey = GenerateWorkingKey(param.GetKey(), param.EffectiveKeyBits); + } + else if (parameters is KeyParameter) + { + KeyParameter param = (KeyParameter) parameters; + byte[] key = param.GetKey(); + + workingKey = GenerateWorkingKey(key, key.Length * 8); + } + else + { + throw new ArgumentException("invalid parameter passed to RC2 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + } + + public virtual string AlgorithmName + { + get { return "RC2"; } + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("RC2 engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (encrypting) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (encrypting) + { + EncryptBlock(input, inOff, output, outOff); + } + else + { + DecryptBlock(input, inOff, output, outOff); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("RC2 engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (encrypting) + { + EncryptBlock(input, output); + } + else + { + DecryptBlock(input, output); + } + + return BLOCK_SIZE; + } +#endif + + /** + * return the result rotating the 16 bit number in x left by y + */ + private static int RotateWordLeft(int x, int y) + { + x &= 0xffff; + return (x << y) | (x >> (16 - y)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void EncryptBlock(ReadOnlySpan input, Span output) + { + int x76, x54, x32, x10; + + x76 = ((input[7] & 0xff) << 8) + (input[6] & 0xff); + x54 = ((input[5] & 0xff) << 8) + (input[4] & 0xff); + x32 = ((input[3] & 0xff) << 8) + (input[2] & 0xff); + x10 = ((input[1] & 0xff) << 8) + (input[0] & 0xff); + + for (int i = 0; i <= 16; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i + 1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i + 2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i + 3], 5); + } + + x10 += workingKey[x76 & 63]; + x32 += workingKey[x10 & 63]; + x54 += workingKey[x32 & 63]; + x76 += workingKey[x54 & 63]; + + for (int i = 20; i <= 40; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i + 1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i + 2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i + 3], 5); + } + + x10 += workingKey[x76 & 63]; + x32 += workingKey[x10 & 63]; + x54 += workingKey[x32 & 63]; + x76 += workingKey[x54 & 63]; + + for (int i = 44; i < 64; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i + 1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i + 2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i + 3], 5); + } + + output[0] = (byte)x10; + output[1] = (byte)(x10 >> 8); + output[2] = (byte)x32; + output[3] = (byte)(x32 >> 8); + output[4] = (byte)x54; + output[5] = (byte)(x54 >> 8); + output[6] = (byte)x76; + output[7] = (byte)(x76 >> 8); + } + + private void DecryptBlock(ReadOnlySpan input, Span output) + { + int x76, x54, x32, x10; + + x76 = ((input[7] & 0xff) << 8) + (input[6] & 0xff); + x54 = ((input[5] & 0xff) << 8) + (input[4] & 0xff); + x32 = ((input[3] & 0xff) << 8) + (input[2] & 0xff); + x10 = ((input[1] & 0xff) << 8) + (input[0] & 0xff); + + for (int i = 60; i >= 44; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i + 3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i + 2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i + 1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i]); + } + + x76 -= workingKey[x54 & 63]; + x54 -= workingKey[x32 & 63]; + x32 -= workingKey[x10 & 63]; + x10 -= workingKey[x76 & 63]; + + for (int i = 40; i >= 20; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i + 3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i + 2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i + 1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i]); + } + + x76 -= workingKey[x54 & 63]; + x54 -= workingKey[x32 & 63]; + x32 -= workingKey[x10 & 63]; + x10 -= workingKey[x76 & 63]; + + for (int i = 16; i >= 0; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i + 3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i + 2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i + 1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i]); + } + + output[0] = (byte)x10; + output[1] = (byte)(x10 >> 8); + output[2] = (byte)x32; + output[3] = (byte)(x32 >> 8); + output[4] = (byte)x54; + output[5] = (byte)(x54 >> 8); + output[6] = (byte)x76; + output[7] = (byte)(x76 >> 8); + } +#else + private void EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int x76, x54, x32, x10; + + x76 = ((input[inOff + 7] & 0xff) << 8) + (input[inOff + 6] & 0xff); + x54 = ((input[inOff + 5] & 0xff) << 8) + (input[inOff + 4] & 0xff); + x32 = ((input[inOff + 3] & 0xff) << 8) + (input[inOff + 2] & 0xff); + x10 = ((input[inOff + 1] & 0xff) << 8) + (input[inOff + 0] & 0xff); + + for (int i = 0; i <= 16; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i ], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i+1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i+2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i+3], 5); + } + + x10 += workingKey[x76 & 63]; + x32 += workingKey[x10 & 63]; + x54 += workingKey[x32 & 63]; + x76 += workingKey[x54 & 63]; + + for (int i = 20; i <= 40; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i ], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i+1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i+2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i+3], 5); + } + + x10 += workingKey[x76 & 63]; + x32 += workingKey[x10 & 63]; + x54 += workingKey[x32 & 63]; + x76 += workingKey[x54 & 63]; + + for (int i = 44; i < 64; i += 4) + { + x10 = RotateWordLeft(x10 + (x32 & ~x76) + (x54 & x76) + workingKey[i ], 1); + x32 = RotateWordLeft(x32 + (x54 & ~x10) + (x76 & x10) + workingKey[i+1], 2); + x54 = RotateWordLeft(x54 + (x76 & ~x32) + (x10 & x32) + workingKey[i+2], 3); + x76 = RotateWordLeft(x76 + (x10 & ~x54) + (x32 & x54) + workingKey[i+3], 5); + } + + outBytes[outOff + 0] = (byte)x10; + outBytes[outOff + 1] = (byte)(x10 >> 8); + outBytes[outOff + 2] = (byte)x32; + outBytes[outOff + 3] = (byte)(x32 >> 8); + outBytes[outOff + 4] = (byte)x54; + outBytes[outOff + 5] = (byte)(x54 >> 8); + outBytes[outOff + 6] = (byte)x76; + outBytes[outOff + 7] = (byte)(x76 >> 8); + } + + private void DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int x76, x54, x32, x10; + + x76 = ((input[inOff + 7] & 0xff) << 8) + (input[inOff + 6] & 0xff); + x54 = ((input[inOff + 5] & 0xff) << 8) + (input[inOff + 4] & 0xff); + x32 = ((input[inOff + 3] & 0xff) << 8) + (input[inOff + 2] & 0xff); + x10 = ((input[inOff + 1] & 0xff) << 8) + (input[inOff + 0] & 0xff); + + for (int i = 60; i >= 44; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i+3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i+2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i+1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i ]); + } + + x76 -= workingKey[x54 & 63]; + x54 -= workingKey[x32 & 63]; + x32 -= workingKey[x10 & 63]; + x10 -= workingKey[x76 & 63]; + + for (int i = 40; i >= 20; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i+3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i+2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i+1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i ]); + } + + x76 -= workingKey[x54 & 63]; + x54 -= workingKey[x32 & 63]; + x32 -= workingKey[x10 & 63]; + x10 -= workingKey[x76 & 63]; + + for (int i = 16; i >= 0; i -= 4) + { + x76 = RotateWordLeft(x76, 11) - ((x10 & ~x54) + (x32 & x54) + workingKey[i+3]); + x54 = RotateWordLeft(x54, 13) - ((x76 & ~x32) + (x10 & x32) + workingKey[i+2]); + x32 = RotateWordLeft(x32, 14) - ((x54 & ~x10) + (x76 & x10) + workingKey[i+1]); + x10 = RotateWordLeft(x10, 15) - ((x32 & ~x76) + (x54 & x76) + workingKey[i ]); + } + + outBytes[outOff + 0] = (byte)x10; + outBytes[outOff + 1] = (byte)(x10 >> 8); + outBytes[outOff + 2] = (byte)x32; + outBytes[outOff + 3] = (byte)(x32 >> 8); + outBytes[outOff + 4] = (byte)x54; + outBytes[outOff + 5] = (byte)(x54 >> 8); + outBytes[outOff + 6] = (byte)x76; + outBytes[outOff + 7] = (byte)(x76 >> 8); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs.meta new file mode 100644 index 00000000..3132fa8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 673892226e64f09479c20f1cc717d293 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs new file mode 100644 index 00000000..67ad4496 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs @@ -0,0 +1,371 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Wrap keys according to RFC 3217 - RC2 mechanism + */ + public class RC2WrapEngine + : IWrapper + { + /** Field engine */ + private CbcBlockCipher engine; + + /** Field param */ + private ICipherParameters parameters; + + /** Field paramPlusIV */ + private ParametersWithIV paramPlusIV; + + /** Field iv */ + private byte[] iv; + + /** Field forWrapping */ + private bool forWrapping; + + private SecureRandom sr; + + /** Field IV2 */ + private static readonly byte[] IV2 = + { + (byte) 0x4a, (byte) 0xdd, (byte) 0xa2, + (byte) 0x2c, (byte) 0x79, (byte) 0xe8, + (byte) 0x21, (byte) 0x05 + }; + + // + // checksum digest + // + private readonly IDigest sha1 = new Sha1Digest(); + private readonly byte[] digest = new byte[20]; + + /** + * Method init + * + * @param forWrapping + * @param param + */ + public virtual void Init(bool forWrapping, ICipherParameters parameters) + { + this.forWrapping = forWrapping; + this.engine = new CbcBlockCipher(new RC2Engine()); + + if (parameters is ParametersWithRandom pWithR) + { + sr = pWithR.Random; + parameters = pWithR.Parameters; + } + else + { + sr = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (parameters is ParametersWithIV) + { + if (!forWrapping) + throw new ArgumentException("You should not supply an IV for unwrapping"); + + this.paramPlusIV = (ParametersWithIV)parameters; + this.iv = this.paramPlusIV.GetIV(); + this.parameters = this.paramPlusIV.Parameters; + + if (this.iv.Length != 8) + throw new ArgumentException("IV is not 8 octets"); + } + else + { + this.parameters = parameters; + + if (this.forWrapping) + { + // Hm, we have no IV but we want to wrap ?!? + // well, then we have to create our own IV. + this.iv = new byte[8]; + sr.NextBytes(iv); + this.paramPlusIV = new ParametersWithIV(this.parameters, this.iv); + } + } + } + + /** + * Method GetAlgorithmName + * + * @return + */ + public virtual string AlgorithmName + { + get { return "RC2"; } + } + + /** + * Method wrap + * + * @param in + * @param inOff + * @param inLen + * @return + */ + public virtual byte[] Wrap( + byte[] input, + int inOff, + int length) + { + if (!forWrapping) + { + throw new InvalidOperationException("Not initialized for wrapping"); + } + + int len = length + 1; + if ((len % 8) != 0) + { + len += 8 - (len % 8); + } + + byte [] keyToBeWrapped = new byte[len]; + + keyToBeWrapped[0] = (byte)length; + Array.Copy(input, inOff, keyToBeWrapped, 1, length); + + byte[] pad = new byte[keyToBeWrapped.Length - length - 1]; + + if (pad.Length > 0) + { + sr.NextBytes(pad); + Array.Copy(pad, 0, keyToBeWrapped, length + 1, pad.Length); + } + + // Compute the CMS Key Checksum, (section 5.6.1), call this CKS. + byte[] CKS = CalculateCmsKeyChecksum(keyToBeWrapped); + + // Let WKCKS = WK || CKS where || is concatenation. + byte[] WKCKS = new byte[keyToBeWrapped.Length + CKS.Length]; + + Array.Copy(keyToBeWrapped, 0, WKCKS, 0, keyToBeWrapped.Length); + Array.Copy(CKS, 0, WKCKS, keyToBeWrapped.Length, CKS.Length); + + // Encrypt WKCKS in CBC mode using KEK as the key and IV as the + // initialization vector. Call the results TEMP1. + byte [] TEMP1 = new byte[WKCKS.Length]; + + Array.Copy(WKCKS, 0, TEMP1, 0, WKCKS.Length); + + int noOfBlocks = WKCKS.Length / engine.GetBlockSize(); + int extraBytes = WKCKS.Length % engine.GetBlockSize(); + + if (extraBytes != 0) + { + throw new InvalidOperationException("Not multiple of block length"); + } + + engine.Init(true, paramPlusIV); + + for (int i = 0; i < noOfBlocks; i++) + { + int currentBytePos = i * engine.GetBlockSize(); + + engine.ProcessBlock(TEMP1, currentBytePos, TEMP1, currentBytePos); + } + + // Left TEMP2 = IV || TEMP1. + byte[] TEMP2 = new byte[this.iv.Length + TEMP1.Length]; + + Array.Copy(this.iv, 0, TEMP2, 0, this.iv.Length); + Array.Copy(TEMP1, 0, TEMP2, this.iv.Length, TEMP1.Length); + + // Reverse the order of the octets in TEMP2 and call the result TEMP3. + byte[] TEMP3 = new byte[TEMP2.Length]; + + for (int i = 0; i < TEMP2.Length; i++) + { + TEMP3[i] = TEMP2[TEMP2.Length - (i + 1)]; + } + + // Encrypt TEMP3 in CBC mode using the KEK and an initialization vector + // of 0x 4a dd a2 2c 79 e8 21 05. The resulting cipher text is the desired + // result. It is 40 octets long if a 168 bit key is being wrapped. + ParametersWithIV param2 = new ParametersWithIV(this.parameters, IV2); + + this.engine.Init(true, param2); + + for (int i = 0; i < noOfBlocks + 1; i++) + { + int currentBytePos = i * engine.GetBlockSize(); + + engine.ProcessBlock(TEMP3, currentBytePos, TEMP3, currentBytePos); + } + + return TEMP3; + } + + /** + * Method unwrap + * + * @param in + * @param inOff + * @param inLen + * @return + * @throws InvalidCipherTextException + */ + public virtual byte[] Unwrap( + byte[] input, + int inOff, + int length) + { + if (forWrapping) + { + throw new InvalidOperationException("Not set for unwrapping"); + } + + if (input == null) + { + throw new InvalidCipherTextException("Null pointer as ciphertext"); + } + + if (length % engine.GetBlockSize() != 0) + { + throw new InvalidCipherTextException("Ciphertext not multiple of " + + engine.GetBlockSize()); + } + + /* + // Check if the length of the cipher text is reasonable given the key + // type. It must be 40 bytes for a 168 bit key and either 32, 40, or + // 48 bytes for a 128, 192, or 256 bit key. If the length is not supported + // or inconsistent with the algorithm for which the key is intended, + // return error. + // + // we do not accept 168 bit keys. it has to be 192 bit. + int lengthA = (estimatedKeyLengthInBit / 8) + 16; + int lengthB = estimatedKeyLengthInBit % 8; + + if ((lengthA != keyToBeUnwrapped.Length) || (lengthB != 0)) { + throw new XMLSecurityException("empty"); + } + */ + + // Decrypt the cipher text with TRIPLedeS in CBC mode using the KEK + // and an initialization vector (IV) of 0x4adda22c79e82105. Call the output TEMP3. + ParametersWithIV param2 = new ParametersWithIV(this.parameters, IV2); + + this.engine.Init(false, param2); + + byte [] TEMP3 = new byte[length]; + + Array.Copy(input, inOff, TEMP3, 0, length); + + for (int i = 0; i < (TEMP3.Length / engine.GetBlockSize()); i++) + { + int currentBytePos = i * engine.GetBlockSize(); + + engine.ProcessBlock(TEMP3, currentBytePos, TEMP3, currentBytePos); + } + + // Reverse the order of the octets in TEMP3 and call the result TEMP2. + byte[] TEMP2 = new byte[TEMP3.Length]; + + for (int i = 0; i < TEMP3.Length; i++) + { + TEMP2[i] = TEMP3[TEMP3.Length - (i + 1)]; + } + + // Decompose TEMP2 into IV, the first 8 octets, and TEMP1, the remaining octets. + this.iv = new byte[8]; + + byte[] TEMP1 = new byte[TEMP2.Length - 8]; + + Array.Copy(TEMP2, 0, this.iv, 0, 8); + Array.Copy(TEMP2, 8, TEMP1, 0, TEMP2.Length - 8); + + // Decrypt TEMP1 using TRIPLedeS in CBC mode using the KEK and the IV + // found in the previous step. Call the result WKCKS. + this.paramPlusIV = new ParametersWithIV(this.parameters, this.iv); + + this.engine.Init(false, this.paramPlusIV); + + byte[] LCEKPADICV = new byte[TEMP1.Length]; + + Array.Copy(TEMP1, 0, LCEKPADICV, 0, TEMP1.Length); + + for (int i = 0; i < (LCEKPADICV.Length / engine.GetBlockSize()); i++) + { + int currentBytePos = i * engine.GetBlockSize(); + + engine.ProcessBlock(LCEKPADICV, currentBytePos, LCEKPADICV, currentBytePos); + } + + // Decompose LCEKPADICV. CKS is the last 8 octets and WK, the wrapped key, are + // those octets before the CKS. + byte[] result = new byte[LCEKPADICV.Length - 8]; + byte[] CKStoBeVerified = new byte[8]; + + Array.Copy(LCEKPADICV, 0, result, 0, LCEKPADICV.Length - 8); + Array.Copy(LCEKPADICV, LCEKPADICV.Length - 8, CKStoBeVerified, 0, 8); + + // Calculate a CMS Key Checksum, (section 5.6.1), over the WK and compare + // with the CKS extracted in the above step. If they are not equal, return error. + if (!CheckCmsKeyChecksum(result, CKStoBeVerified)) + { + throw new InvalidCipherTextException( + "Checksum inside ciphertext is corrupted"); + } + + if ((result.Length - ((result[0] & 0xff) + 1)) > 7) + { + throw new InvalidCipherTextException( + "too many pad bytes (" + (result.Length - ((result[0] & 0xff) + 1)) + ")"); + } + + // CEK is the wrapped key, now extracted for use in data decryption. + byte[] CEK = new byte[result[0]]; + Array.Copy(result, 1, CEK, 0, CEK.Length); + return CEK; + } + + /** + * Some key wrap algorithms make use of the Key Checksum defined + * in CMS [CMS-Algorithms]. This is used to provide an integrity + * check value for the key being wrapped. The algorithm is + * + * - Compute the 20 octet SHA-1 hash on the key being wrapped. + * - Use the first 8 octets of this hash as the checksum value. + * + * @param key + * @return + * @throws Exception + * @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum + */ + private byte[] CalculateCmsKeyChecksum( + byte[] key) + { + sha1.BlockUpdate(key, 0, key.Length); + sha1.DoFinal(digest, 0); + + byte[] result = new byte[8]; + Array.Copy(digest, 0, result, 0, 8); + return result; + } + + /** + * @param key + * @param checksum + * @return + * @see http://www.w3.org/TR/xmlenc-core/#sec-CMSKeyChecksum + */ + private bool CheckCmsKeyChecksum( + byte[] key, + byte[] checksum) + { + return Arrays.ConstantTimeAreEqual(CalculateCmsKeyChecksum(key), checksum); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs.meta new file mode 100644 index 00000000..ba9978f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: acd004a5f8a034246acc6c2aae60aa0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC2WrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs new file mode 100644 index 00000000..ef53309f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public class RC4Engine + : IStreamCipher + { + private readonly static int STATE_LENGTH = 256; + + /* + * variables to hold the state of the RC4 engine + * during encryption and decryption + */ + + private byte[] engineState; + private int x; + private int y; + private byte[] workingKey; + + /** + * initialise a RC4 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (parameters is KeyParameter) + { + /* + * RC4 encryption and decryption is completely + * symmetrical, so the 'forEncryption' is + * irrelevant. + */ + workingKey = ((KeyParameter)parameters).GetKey(); + SetKey(workingKey); + + return; + } + + throw new ArgumentException("invalid parameter passed to RC4 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + public virtual string AlgorithmName + { + get { return "RC4"; } + } + + public virtual byte ReturnByte( + byte input) + { + x = (x + 1) & 0xff; + y = (engineState[x] + y) & 0xff; + + // swap + byte tmp = engineState[x]; + engineState[x] = engineState[y]; + engineState[y] = tmp; + + // xor + return (byte)(input ^ engineState[(engineState[x] + engineState[y]) & 0xff]); + } + + public virtual void ProcessBytes( + byte[] input, + int inOff, + int length, + byte[] output, + int outOff) + { + Check.DataLength(input, inOff, length, "input buffer too short"); + Check.OutputLength(output, outOff, length, "output buffer too short"); + + for (int i = 0; i < length ; i++) + { + x = (x + 1) & 0xff; + y = (engineState[x] + y) & 0xff; + + byte sx = engineState[x]; + byte sy = engineState[y]; + + // swap + engineState[x] = sy; + engineState[y] = sx; + + // xor + output[i+outOff] = (byte)(input[i + inOff] ^ engineState[(sx + sy) & 0xff]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; i++) + { + x = (x + 1) & 0xff; + y = (engineState[x] + y) & 0xff; + + byte sx = engineState[x]; + byte sy = engineState[y]; + + // swap + engineState[x] = sy; + engineState[y] = sx; + + // xor + output[i] = (byte)(input[i] ^ engineState[(sx + sy) & 0xff]); + } + } +#endif + + public virtual void Reset() + { + SetKey(workingKey); + } + + // Private implementation + + private void SetKey( + byte[] keyBytes) + { + workingKey = keyBytes; + + // System.out.println("the key length is ; "+ workingKey.Length); + + x = 0; + y = 0; + + if (engineState == null) + { + engineState = new byte[STATE_LENGTH]; + } + + // reset the state of the engine + for (int i=0; i < STATE_LENGTH; i++) + { + engineState[i] = (byte)i; + } + + int i1 = 0; + int i2 = 0; + + for (int i=0; i < STATE_LENGTH; i++) + { + i2 = ((keyBytes[i1] & 0xff) + engineState[i] + i2) & 0xff; + // do the byte-swap inline + byte tmp = engineState[i]; + engineState[i] = engineState[i2]; + engineState[i2] = tmp; + i1 = (i1+1) % keyBytes.Length; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs.meta new file mode 100644 index 00000000..507f7bca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 457d3936f4e6c504fa7aa397f724ff68 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC4Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs new file mode 100644 index 00000000..32f62a5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs @@ -0,0 +1,254 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * The specification for RC5 came from the RC5 Encryption Algorithm + * publication in RSA CryptoBytes, Spring of 1995. + * http://www.rsasecurity.com/rsalabs/cryptobytes. + *

+ * This implementation has a word size of 32 bits.

+ */ + public class RC532Engine + : IBlockCipher + { + /* + * the number of rounds to perform + */ + private int _noRounds; + + /* + * the expanded key array of size 2*(rounds + 1) + */ + private int [] _S; + + /* + * our "magic constants" for 32 32 + * + * Pw = Odd((e-2) * 2^wordsize) + * Qw = Odd((o-2) * 2^wordsize) + * + * where e is the base of natural logarithms (2.718281828...) + * and o is the golden ratio (1.61803398...) + */ + private static readonly int P32 = unchecked((int) 0xb7e15163); + private static readonly int Q32 = unchecked((int) 0x9e3779b9); + + private bool forEncryption; + + /** + * Create an instance of the RC5 encryption algorithm + * and set some defaults + */ + public RC532Engine() + { + _noRounds = 12; // the default + } + + public virtual string AlgorithmName + { + get { return "RC5-32"; } + } + + public virtual int GetBlockSize() + { + return 2 * 4; + } + + /** + * initialise a RC5-32 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is RC5Parameters rc5Parameters) + { + _noRounds = rc5Parameters.Rounds; + + SetKey(rc5Parameters.GetKey()); + } + else if (parameters is KeyParameter keyParameter) + { + SetKey(keyParameter.GetKey()); + } + else + { + throw new ArgumentException("invalid parameter passed to RC532 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + this.forEncryption = forEncryption; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return forEncryption + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return forEncryption + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + return forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * Re-key the cipher. + * + * @param key the key to be used + */ + private void SetKey(byte[] key) + { + // + // KEY EXPANSION: + // + // There are 3 phases to the key expansion. + // + // Phase 1: + // Copy the secret key K[0...b-1] into an array L[0..c-1] of + // c = ceil(b/u), where u = 32/8 in little-endian order. + // In other words, we fill up L using u consecutive key bytes + // of K. Any unfilled byte positions in L are zeroed. In the + // case that b = c = 0, set c = 1 and L[0] = 0. + // + int[] L = new int[(key.Length + 3) / 4]; + + for (int i = 0; i != key.Length; i++) + { + L[i / 4] += (key[i] & 0xff) << (8 * (i % 4)); + } + + // + // Phase 2: + // Initialize S to a particular fixed pseudo-random bit pattern + // using an arithmetic progression modulo 2^wordsize determined + // by the magic numbers, Pw & Qw. + // + _S = new int[2*(_noRounds + 1)]; + + _S[0] = P32; + for (int i=1; i < _S.Length; i++) + { + _S[i] = (_S[i-1] + Q32); + } + + // + // Phase 3: + // Mix in the user's secret key in 3 passes over the arrays S & L. + // The max of the arrays sizes is used as the loop control + // + int iter; + + if (L.Length > _S.Length) + { + iter = 3 * L.Length; + } + else + { + iter = 3 * _S.Length; + } + + int A = 0, B = 0; + int ii = 0, jj = 0; + + for (int k = 0; k < iter; k++) + { + A = _S[ii] = Integers.RotateLeft(_S[ii] + A + B, 3); + B = L[jj] = Integers.RotateLeft(L[jj] + A + B, A + B); + ii = (ii+1) % _S.Length; + jj = (jj+1) % L.Length; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + int A = (int)Pack.LE_To_UInt32(input) + _S[0]; + int B = (int)Pack.LE_To_UInt32(input[4..]) + _S[1]; + + for (int i = 1; i <= _noRounds; i++) + { + A = Integers.RotateLeft(A ^ B, B) + _S[2*i]; + B = Integers.RotateLeft(B ^ A, A) + _S[2*i+1]; + } + + Pack.UInt32_To_LE((uint)A, output); + Pack.UInt32_To_LE((uint)B, output[4..]); + + return 8; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + int A = (int)Pack.LE_To_UInt32(input); + int B = (int)Pack.LE_To_UInt32(input[4..]); + + for (int i = _noRounds; i >= 1; i--) + { + B = Integers.RotateRight(B - _S[2*i+1], A) ^ A; + A = Integers.RotateRight(A - _S[2*i], B) ^ B; + } + + Pack.UInt32_To_LE((uint)(A - _S[0]), output); + Pack.UInt32_To_LE((uint)(B - _S[1]), output[4..]); + + return 8; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int A = (int)Pack.LE_To_UInt32(input, inOff) + _S[0]; + int B = (int)Pack.LE_To_UInt32(input, inOff + 4) + _S[1]; + + for (int i = 1; i <= _noRounds; i++) + { + A = Integers.RotateLeft(A ^ B, B) + _S[2*i]; + B = Integers.RotateLeft(B ^ A, A) + _S[2*i+1]; + } + + Pack.UInt32_To_LE((uint)A, outBytes, outOff); + Pack.UInt32_To_LE((uint)B, outBytes, outOff + 4); + + return 8; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int A = (int)Pack.LE_To_UInt32(input, inOff); + int B = (int)Pack.LE_To_UInt32(input, inOff + 4); + + for (int i = _noRounds; i >= 1; i--) + { + B = Integers.RotateRight(B - _S[2*i+1], A) ^ A; + A = Integers.RotateRight(A - _S[2*i], B) ^ B; + } + + Pack.UInt32_To_LE((uint)(A - _S[0]), outBytes, outOff); + Pack.UInt32_To_LE((uint)(B - _S[1]), outBytes, outOff + 4); + + return 8; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs.meta new file mode 100644 index 00000000..e962cc24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e806268a1f1fb8c4d9773e88008196b3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC532Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs new file mode 100644 index 00000000..7c4e72bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs @@ -0,0 +1,247 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * The specification for RC5 came from the RC5 Encryption Algorithm + * publication in RSA CryptoBytes, Spring of 1995. + * http://www.rsasecurity.com/rsalabs/cryptobytes. + *

+ * This implementation is set to work with a 64 bit word size.

+ */ + public class RC564Engine + : IBlockCipher + { + /* + * the number of rounds to perform + */ + private int _noRounds; + + /* + * the expanded key array of size 2*(rounds + 1) + */ + private long [] _S; + + /* + * our "magic constants" for wordSize 62 + * + * Pw = Odd((e-2) * 2^wordsize) + * Qw = Odd((o-2) * 2^wordsize) + * + * where e is the base of natural logarithms (2.718281828...) + * and o is the golden ratio (1.61803398...) + */ + private static readonly long P64 = unchecked( (long) 0xb7e151628aed2a6bL); + private static readonly long Q64 = unchecked( (long) 0x9e3779b97f4a7c15L); + + private bool forEncryption; + + /** + * Create an instance of the RC5 encryption algorithm + * and set some defaults + */ + public RC564Engine() + { + _noRounds = 12; +// _S = null; + } + + public virtual string AlgorithmName + { + get { return "RC5-64"; } + } + + public virtual int GetBlockSize() + { + return 16; + } + + /** + * initialise a RC5-64 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is RC5Parameters rc5Parameters)) + throw new ArgumentException("invalid parameter passed to RC564 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.forEncryption = forEncryption; + + _noRounds = rc5Parameters.Rounds; + + SetKey(rc5Parameters.GetKey()); + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return forEncryption + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return forEncryption + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + return forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * Re-key the cipher. + * + * @param key the key to be used + */ + private void SetKey(byte[] key) + { + // + // KEY EXPANSION: + // + // There are 3 phases to the key expansion. + // + // Phase 1: + // Copy the secret key K[0...b-1] into an array L[0..c-1] of + // c = ceil(b/u), where u = wordSize/8 in little-endian order. + // In other words, we fill up L using u consecutive key bytes + // of K. Any unfilled byte positions in L are zeroed. In the + // case that b = c = 0, set c = 1 and L[0] = 0. + // + long[] L = new long[(key.Length + 7) / 8]; + + for (int i = 0; i != key.Length; i++) + { + L[i / 8] += (long)(key[i] & 0xff) << (8 * (i % 8)); + } + + // + // Phase 2: + // Initialize S to a particular fixed pseudo-random bit pattern + // using an arithmetic progression modulo 2^wordsize determined + // by the magic numbers, Pw & Qw. + // + _S = new long[2*(_noRounds + 1)]; + + _S[0] = P64; + for (int i=1; i < _S.Length; i++) + { + _S[i] = (_S[i-1] + Q64); + } + + // + // Phase 3: + // Mix in the user's secret key in 3 passes over the arrays S & L. + // The max of the arrays sizes is used as the loop control + // + int iter; + + if (L.Length > _S.Length) + { + iter = 3 * L.Length; + } + else + { + iter = 3 * _S.Length; + } + + long A = 0, B = 0; + int ii = 0, jj = 0; + + for (int k = 0; k < iter; k++) + { + A = _S[ii] = Longs.RotateLeft(_S[ii] + A + B, 3); + B = L[jj] = Longs.RotateLeft(L[jj] + A + B, (int)(A + B)); + ii = (ii+1) % _S.Length; + jj = (jj+1) % L.Length; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + long A = (long)Pack.LE_To_UInt64(input) + _S[0]; + long B = (long)Pack.LE_To_UInt64(input[8..]) + _S[1]; + + for (int i = 1; i <= _noRounds; i++) + { + A = Longs.RotateLeft(A ^ B, (int)B) + _S[2*i]; + B = Longs.RotateLeft(B ^ A, (int)A) + _S[2*i+1]; + } + + Pack.UInt64_To_LE((ulong)A, output); + Pack.UInt64_To_LE((ulong)B, output[8..]); + + return 16; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + long A = (long)Pack.LE_To_UInt64(input); + long B = (long)Pack.LE_To_UInt64(input[8..]); + + for (int i = _noRounds; i >= 1; i--) + { + B = Longs.RotateRight(B - _S[2*i+1], (int)A) ^ A; + A = Longs.RotateRight(A - _S[2*i], (int)B) ^ B; + } + + Pack.UInt64_To_LE((ulong)(A - _S[0]), output); + Pack.UInt64_To_LE((ulong)(B - _S[1]), output[8..]); + + return 16; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + long A = (long)Pack.LE_To_UInt64(input, inOff) + _S[0]; + long B = (long)Pack.LE_To_UInt64(input, inOff + 8) + _S[1]; + + for (int i = 1; i <= _noRounds; i++) + { + A = Longs.RotateLeft(A ^ B, (int)B) + _S[2*i]; + B = Longs.RotateLeft(B ^ A, (int)A) + _S[2*i+1]; + } + + Pack.UInt64_To_LE((ulong)A, outBytes, outOff); + Pack.UInt64_To_LE((ulong)B, outBytes, outOff + 8); + + return 16; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + long A = (long)Pack.LE_To_UInt64(input, inOff); + long B = (long)Pack.LE_To_UInt64(input, inOff + 8); + + for (int i = _noRounds; i >= 1; i--) + { + B = Longs.RotateRight(B - _S[2*i+1], (int)A) ^ A; + A = Longs.RotateRight(A - _S[2*i], (int)B) ^ B; + } + + Pack.UInt64_To_LE((ulong)(A - _S[0]), outBytes, outOff); + Pack.UInt64_To_LE((ulong)(B - _S[1]), outBytes, outOff + 8); + + return 16; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs.meta new file mode 100644 index 00000000..6fc96dd6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 46c641fb7b1444f409874a9c65ca7acb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC564Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs new file mode 100644 index 00000000..e7c1c9d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs @@ -0,0 +1,399 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * An RC6 engine. + */ + public class RC6Engine + : IBlockCipher + { + /* + * the number of rounds to perform + */ + private static readonly int _noRounds = 20; + + /* + * the expanded key array of size 2*(rounds + 1) + */ + private int [] _S; + + /* + * our "magic constants" for wordSize 32 + * + * Pw = Odd((e-2) * 2^wordsize) + * Qw = Odd((o-2) * 2^wordsize) + * + * where e is the base of natural logarithms (2.718281828...) + * and o is the golden ratio (1.61803398...) + */ + private static readonly int P32 = unchecked((int) 0xb7e15163); + private static readonly int Q32 = unchecked((int) 0x9e3779b9); + + private static readonly int LGW = 5; // log2(32) + + private bool forEncryption; + + /** + * Create an instance of the RC6 encryption algorithm + * and set some defaults + */ + public RC6Engine() + { + } + + public virtual string AlgorithmName + { + get { return "RC6"; } + } + + public virtual int GetBlockSize() + { + return 16; + } + + /** + * initialise a RC5-32 cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to RC6 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.forEncryption = forEncryption; + + SetKey(keyParameter.GetKey()); + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (_S == null) + throw new InvalidOperationException("RC6 engine not initialised"); + + int blockSize = GetBlockSize(); + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(output, outOff, blockSize, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return forEncryption + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return forEncryption + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (_S == null) + throw new InvalidOperationException("RC6 engine not initialised"); + + int blockSize = GetBlockSize(); + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + return forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * Re-key the cipher. + * + * @param inKey the key to be used + */ + private void SetKey( + byte[] key) + { + // + // KEY EXPANSION: + // + // There are 3 phases to the key expansion. + // + // Phase 1: + // Copy the secret key K[0...b-1] into an array L[0..c-1] of + // c = ceil(b/u), where u = wordSize/8 in little-endian order. + // In other words, we fill up L using u consecutive key bytes + // of K. Any unfilled byte positions in L are zeroed. In the + // case that b = c = 0, set c = 1 and L[0] = 0. + // + // compute number of dwords + int c = (key.Length + 3) / 4; + if (c == 0) + { + c = 1; + } + int[] L = new int[(key.Length + 3) / 4]; + + // load all key bytes into array of key dwords + for (int i = key.Length - 1; i >= 0; i--) + { + L[i / 4] = (L[i / 4] << 8) + (key[i] & 0xff); + } + + // + // Phase 2: + // Key schedule is placed in a array of 2+2*ROUNDS+2 = 44 dwords. + // Initialize S to a particular fixed pseudo-random bit pattern + // using an arithmetic progression modulo 2^wordsize determined + // by the magic numbers, Pw & Qw. + // + _S = new int[2+2*_noRounds+2]; + + _S[0] = P32; + for (int i=1; i < _S.Length; i++) + { + _S[i] = (_S[i-1] + Q32); + } + + // + // Phase 3: + // Mix in the user's secret key in 3 passes over the arrays S & L. + // The max of the arrays sizes is used as the loop control + // + int iter; + + if (L.Length > _S.Length) + { + iter = 3 * L.Length; + } + else + { + iter = 3 * _S.Length; + } + + int A = 0; + int B = 0; + int ii = 0, jj = 0; + + for (int k = 0; k < iter; k++) + { + A = _S[ii] = Integers.RotateLeft(_S[ii] + A + B, 3); + B = L[jj] = Integers.RotateLeft( L[jj] + A + B, A + B); + ii = (ii+1) % _S.Length; + jj = (jj+1) % L.Length; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + // load A,B,C and D registers from in. + int A = (int)Pack.LE_To_UInt32(input); + int B = (int)Pack.LE_To_UInt32(input[4..]); + int C = (int)Pack.LE_To_UInt32(input[8..]); + int D = (int)Pack.LE_To_UInt32(input[12..]); + + // Do pseudo-round #0: pre-whitening of B and D + B += _S[0]; + D += _S[1]; + + // perform round #1,#2 ... #ROUNDS of encryption + for (int i = 1; i <= _noRounds; i++) + { + int t = 0, u = 0; + + t = B * (2 * B + 1); + t = Integers.RotateLeft(t, 5); + + u = D * (2 * D + 1); + u = Integers.RotateLeft(u, 5); + + A ^= t; + A = Integers.RotateLeft(A, u); + A += _S[2 * i]; + + C ^= u; + C = Integers.RotateLeft(C, t); + C += _S[2 * i + 1]; + + int temp = A; + A = B; + B = C; + C = D; + D = temp; + } + + // do pseudo-round #(ROUNDS+1) : post-whitening of A and C + A += _S[2 * _noRounds + 2]; + C += _S[2 * _noRounds + 3]; + + // store A, B, C and D registers to out + Pack.UInt32_To_LE((uint)A, output); + Pack.UInt32_To_LE((uint)B, output[4..]); + Pack.UInt32_To_LE((uint)C, output[8..]); + Pack.UInt32_To_LE((uint)D, output[12..]); + + return 16; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + // load A,B,C and D registers from out. + int A = (int)Pack.LE_To_UInt32(input); + int B = (int)Pack.LE_To_UInt32(input[4..]); + int C = (int)Pack.LE_To_UInt32(input[8..]); + int D = (int)Pack.LE_To_UInt32(input[12..]); + + // Undo pseudo-round #(ROUNDS+1) : post whitening of A and C + C -= _S[2 * _noRounds + 3]; + A -= _S[2 * _noRounds + 2]; + + // Undo round #ROUNDS, .., #2,#1 of encryption + for (int i = _noRounds; i >= 1; i--) + { + int t = 0, u = 0; + + int temp = D; + D = C; + C = B; + B = A; + A = temp; + + t = B * (2 * B + 1); + t = Integers.RotateLeft(t, LGW); + + u = D * (2 * D + 1); + u = Integers.RotateLeft(u, LGW); + + C -= _S[2 * i + 1]; + C = Integers.RotateRight(C, t); + C ^= u; + + A -= _S[2 * i]; + A = Integers.RotateRight(A, u); + A ^= t; + } + + // Undo pseudo-round #0: pre-whitening of B and D + D -= _S[1]; + B -= _S[0]; + + Pack.UInt32_To_LE((uint)A, output); + Pack.UInt32_To_LE((uint)B, output[4..]); + Pack.UInt32_To_LE((uint)C, output[8..]); + Pack.UInt32_To_LE((uint)D, output[12..]); + + return 16; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + // load A,B,C and D registers from in. + int A = (int)Pack.LE_To_UInt32(input, inOff); + int B = (int)Pack.LE_To_UInt32(input, inOff + 4); + int C = (int)Pack.LE_To_UInt32(input, inOff + 8); + int D = (int)Pack.LE_To_UInt32(input, inOff + 12); + + // Do pseudo-round #0: pre-whitening of B and D + B += _S[0]; + D += _S[1]; + + // perform round #1,#2 ... #ROUNDS of encryption + for (int i = 1; i <= _noRounds; i++) + { + int t = 0,u = 0; + + t = B*(2*B+1); + t = Integers.RotateLeft(t,5); + + u = D*(2*D+1); + u = Integers.RotateLeft(u,5); + + A ^= t; + A = Integers.RotateLeft(A,u); + A += _S[2*i]; + + C ^= u; + C = Integers.RotateLeft(C,t); + C += _S[2*i+1]; + + int temp = A; + A = B; + B = C; + C = D; + D = temp; + } + + // do pseudo-round #(ROUNDS+1) : post-whitening of A and C + A += _S[2*_noRounds+2]; + C += _S[2*_noRounds+3]; + + // store A, B, C and D registers to out + Pack.UInt32_To_LE((uint)A, outBytes, outOff); + Pack.UInt32_To_LE((uint)B, outBytes, outOff + 4); + Pack.UInt32_To_LE((uint)C, outBytes, outOff + 8); + Pack.UInt32_To_LE((uint)D, outBytes, outOff + 12); + + return 16; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + // load A,B,C and D registers from out. + int A = (int)Pack.LE_To_UInt32(input, inOff); + int B = (int)Pack.LE_To_UInt32(input, inOff + 4); + int C = (int)Pack.LE_To_UInt32(input, inOff + 8); + int D = (int)Pack.LE_To_UInt32(input, inOff + 12); + + // Undo pseudo-round #(ROUNDS+1) : post whitening of A and C + C -= _S[2*_noRounds+3]; + A -= _S[2*_noRounds+2]; + + // Undo round #ROUNDS, .., #2,#1 of encryption + for (int i = _noRounds; i >= 1; i--) + { + int t=0,u = 0; + + int temp = D; + D = C; + C = B; + B = A; + A = temp; + + t = B*(2*B+1); + t = Integers.RotateLeft(t, LGW); + + u = D*(2*D+1); + u = Integers.RotateLeft(u, LGW); + + C -= _S[2*i+1]; + C = Integers.RotateRight(C,t); + C ^= u; + + A -= _S[2*i]; + A = Integers.RotateRight(A,u); + A ^= t; + } + + // Undo pseudo-round #0: pre-whitening of B and D + D -= _S[1]; + B -= _S[0]; + + Pack.UInt32_To_LE((uint)A, outBytes, outOff); + Pack.UInt32_To_LE((uint)B, outBytes, outOff + 4); + Pack.UInt32_To_LE((uint)C, outBytes, outOff + 8); + Pack.UInt32_To_LE((uint)D, outBytes, outOff + 12); + + return 16; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs.meta new file mode 100644 index 00000000..00131cd5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: edff8f9ff18060e418306e90e6f68992 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RC6Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs new file mode 100644 index 00000000..78843a60 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs @@ -0,0 +1,179 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * an implementation of the RFC 3211 Key Wrap + * Specification. + */ + public class Rfc3211WrapEngine + : IWrapper + { + private CbcBlockCipher engine; + private ParametersWithIV param; + private bool forWrapping; + private SecureRandom rand; + + public Rfc3211WrapEngine( + IBlockCipher engine) + { + this.engine = new CbcBlockCipher(engine); + } + + public virtual void Init(bool forWrapping, ICipherParameters param) + { + this.forWrapping = forWrapping; + + if (param is ParametersWithRandom withRandom) + { + this.rand = withRandom.Random; + this.param = withRandom.Parameters as ParametersWithIV; + } + else + { + if (forWrapping) + { + rand = CryptoServicesRegistrar.GetSecureRandom(); + } + + this.param = param as ParametersWithIV; + } + + if (null == this.param) + throw new ArgumentException("RFC3211Wrap requires an IV", "param"); + } + + public virtual string AlgorithmName + { + get { return engine.UnderlyingCipher.AlgorithmName + "/RFC3211Wrap"; } + } + + public virtual byte[] Wrap( + byte[] inBytes, + int inOff, + int inLen) + { + if (!forWrapping) + throw new InvalidOperationException("not set for wrapping"); + if (inLen > 255 || inLen < 0) + throw new ArgumentException("input must be from 0 to 255 bytes", "inLen"); + + engine.Init(true, param); + + int blockSize = engine.GetBlockSize(); + byte[] cekBlock; + + if (inLen + 4 < blockSize * 2) + { + cekBlock = new byte[blockSize * 2]; + } + else + { + cekBlock = new byte[(inLen + 4) % blockSize == 0 ? inLen + 4 : ((inLen + 4) / blockSize + 1) * blockSize]; + } + + cekBlock[0] = (byte)inLen; + + Array.Copy(inBytes, inOff, cekBlock, 4, inLen); + + rand.NextBytes(cekBlock, inLen + 4, cekBlock.Length - inLen - 4); + + cekBlock[1] = (byte)~cekBlock[4]; + cekBlock[2] = (byte)~cekBlock[4 + 1]; + cekBlock[3] = (byte)~cekBlock[4 + 2]; + + for (int i = 0; i < cekBlock.Length; i += blockSize) + { + engine.ProcessBlock(cekBlock, i, cekBlock, i); + } + + for (int i = 0; i < cekBlock.Length; i += blockSize) + { + engine.ProcessBlock(cekBlock, i, cekBlock, i); + } + + return cekBlock; + } + + public virtual byte[] Unwrap( + byte[] inBytes, + int inOff, + int inLen) + { + if (forWrapping) + { + throw new InvalidOperationException("not set for unwrapping"); + } + + int blockSize = engine.GetBlockSize(); + + if (inLen < 2 * blockSize) + { + throw new InvalidCipherTextException("input too short"); + } + + byte[] cekBlock = new byte[inLen]; + byte[] iv = new byte[blockSize]; + + Array.Copy(inBytes, inOff, cekBlock, 0, inLen); + Array.Copy(inBytes, inOff, iv, 0, iv.Length); + + engine.Init(false, new ParametersWithIV(param.Parameters, iv)); + + for (int i = blockSize; i < cekBlock.Length; i += blockSize) + { + engine.ProcessBlock(cekBlock, i, cekBlock, i); + } + + Array.Copy(cekBlock, cekBlock.Length - iv.Length, iv, 0, iv.Length); + + engine.Init(false, new ParametersWithIV(param.Parameters, iv)); + + engine.ProcessBlock(cekBlock, 0, cekBlock, 0); + + engine.Init(false, param); + + for (int i = 0; i < cekBlock.Length; i += blockSize) + { + engine.ProcessBlock(cekBlock, i, cekBlock, i); + } + + bool invalidLength = (int)cekBlock[0] > (cekBlock.Length - 4); + + byte[] key; + if (invalidLength) + { + key = new byte[cekBlock.Length - 4]; + } + else + { + key = new byte[cekBlock[0]]; + } + + Array.Copy(cekBlock, 4, key, 0, key.Length); + + // Note: Using constant time comparison + int nonEqual = 0; + for (int i = 0; i != 3; i++) + { + byte check = (byte)~cekBlock[1 + i]; + nonEqual |= (check ^ cekBlock[4 + i]); + } + + Array.Clear(cekBlock, 0, cekBlock.Length); + + if (nonEqual != 0 | invalidLength) + throw new InvalidCipherTextException("wrapped key corrupted"); + + return key; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs.meta new file mode 100644 index 00000000..aa008e35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eec9c01abe454c04aa79b2e2d01a488e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3211WrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs new file mode 100644 index 00000000..2487c134 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs @@ -0,0 +1,182 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// An implementation of the AES Key Wrapper from the NIST Key Wrap + /// Specification as described in RFC 3394. + ///

+ /// For further details see: http://www.ietf.org/rfc/rfc3394.txt + /// and http://csrc.nist.gov/encryption/kms/key-wrap.pdf. + /// + public class Rfc3394WrapEngine + : IWrapper + { + private readonly IBlockCipher engine; + + private KeyParameter param; + private bool forWrapping; + + private byte[] iv = + { + 0xa6, 0xa6, 0xa6, 0xa6, + 0xa6, 0xa6, 0xa6, 0xa6 + }; + + public Rfc3394WrapEngine( + IBlockCipher engine) + { + this.engine = engine; + } + + public virtual void Init( + bool forWrapping, + ICipherParameters parameters) + { + this.forWrapping = forWrapping; + + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + if (parameters is KeyParameter) + { + this.param = (KeyParameter) parameters; + } + else if (parameters is ParametersWithIV) + { + ParametersWithIV pIV = (ParametersWithIV) parameters; + byte[] iv = pIV.GetIV(); + + if (iv.Length != 8) + throw new ArgumentException("IV length not equal to 8", "parameters"); + + this.iv = iv; + this.param = (KeyParameter) pIV.Parameters; + } + else + { + // TODO Throw an exception for bad parameters? + } + } + + public virtual string AlgorithmName + { + get { return engine.AlgorithmName; } + } + + public virtual byte[] Wrap( + byte[] input, + int inOff, + int inLen) + { + if (!forWrapping) + { + throw new InvalidOperationException("not set for wrapping"); + } + + int n = inLen / 8; + + if ((n * 8) != inLen) + { + throw new DataLengthException("wrap data must be a multiple of 8 bytes"); + } + + byte[] block = new byte[inLen + iv.Length]; + byte[] buf = new byte[8 + iv.Length]; + + Array.Copy(iv, 0, block, 0, iv.Length); + Array.Copy(input, inOff, block, iv.Length, inLen); + + engine.Init(true, param); + + for (int j = 0; j != 6; j++) + { + for (int i = 1; i <= n; i++) + { + Array.Copy(block, 0, buf, 0, iv.Length); + Array.Copy(block, 8 * i, buf, iv.Length, 8); + engine.ProcessBlock(buf, 0, buf, 0); + + int t = n * j + i; + for (int k = 1; t != 0; k++) + { + byte v = (byte)t; + + buf[iv.Length - k] ^= v; + t = (int) ((uint)t >> 8); + } + + Array.Copy(buf, 0, block, 0, 8); + Array.Copy(buf, 8, block, 8 * i, 8); + } + } + + return block; + } + + public virtual byte[] Unwrap( + byte[] input, + int inOff, + int inLen) + { + if (forWrapping) + { + throw new InvalidOperationException("not set for unwrapping"); + } + + int n = inLen / 8; + + if ((n * 8) != inLen) + { + throw new InvalidCipherTextException("unwrap data must be a multiple of 8 bytes"); + } + + byte[] block = new byte[inLen - iv.Length]; + byte[] a = new byte[iv.Length]; + byte[] buf = new byte[8 + iv.Length]; + + Array.Copy(input, inOff, a, 0, iv.Length); + Array.Copy(input, inOff + iv.Length, block, 0, inLen - iv.Length); + + engine.Init(false, param); + + n = n - 1; + + for (int j = 5; j >= 0; j--) + { + for (int i = n; i >= 1; i--) + { + Array.Copy(a, 0, buf, 0, iv.Length); + Array.Copy(block, 8 * (i - 1), buf, iv.Length, 8); + + int t = n * j + i; + for (int k = 1; t != 0; k++) + { + byte v = (byte)t; + + buf[iv.Length - k] ^= v; + t = (int) ((uint)t >> 8); + } + + engine.ProcessBlock(buf, 0, buf, 0); + Array.Copy(buf, 0, a, 0, 8); + Array.Copy(buf, 8, block, 8 * (i - 1), 8); + } + } + + if (!Arrays.ConstantTimeAreEqual(a, iv)) + throw new InvalidCipherTextException("checksum failed"); + + return block; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs.meta new file mode 100644 index 00000000..540fbb9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e24f6e1da23022042bec9eded6c6a965 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RFC3394WrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs new file mode 100644 index 00000000..9529128d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * this does your basic RSA algorithm with blinding + */ + public class RsaBlindedEngine + : IAsymmetricBlockCipher + { + private readonly IRsa core; + + private RsaKeyParameters key; + private SecureRandom random; + + public RsaBlindedEngine() + : this(new RsaCoreEngine()) + { + } + + public RsaBlindedEngine(IRsa rsa) + { + this.core = rsa; + } + + public virtual string AlgorithmName + { + get { return "RSA"; } + } + + /** + * initialise the RSA engine. + * + * @param forEncryption true if we are encrypting, false otherwise. + * @param param the necessary RSA key parameters. + */ + public virtual void Init(bool forEncryption, ICipherParameters param) + { + core.Init(forEncryption, param); + + if (param is ParametersWithRandom rParam) + { + this.key = (RsaKeyParameters)rParam.Parameters; + + if (key is RsaPrivateCrtKeyParameters) + { + this.random = rParam.Random; + } + else + { + this.random = null; + } + } + else + { + this.key = (RsaKeyParameters)param; + + if (key is RsaPrivateCrtKeyParameters) + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + else + { + this.random = null; + } + } + } + + /** + * Return the maximum size for an input block to this engine. + * For RSA this is always one byte less than the key size on + * encryption, and the same length as the key size on decryption. + * + * @return maximum size for an input block. + */ + public virtual int GetInputBlockSize() + { + return core.GetInputBlockSize(); + } + + /** + * Return the maximum size for an output block to this engine. + * For RSA this is always one byte less than the key size on + * decryption, and the same length as the key size on encryption. + * + * @return maximum size for an output block. + */ + public virtual int GetOutputBlockSize() + { + return core.GetOutputBlockSize(); + } + + /** + * Process a single block using the basic RSA algorithm. + * + * @param inBuf the input array. + * @param inOff the offset into the input buffer where the data starts. + * @param inLen the length of the data to be processed. + * @return the result of the RSA process. + * @exception DataLengthException the input block is too large. + */ + public virtual byte[] ProcessBlock( + byte[] inBuf, + int inOff, + int inLen) + { + if (key == null) + throw new InvalidOperationException("RSA engine not initialised"); + + BigInteger input = core.ConvertInput(inBuf, inOff, inLen); + + BigInteger result; + if (key is RsaPrivateCrtKeyParameters) + { + RsaPrivateCrtKeyParameters k = (RsaPrivateCrtKeyParameters)key; + BigInteger e = k.PublicExponent; + if (e != null) // can't do blinding without a public exponent + { + BigInteger m = k.Modulus; + BigInteger r = BigIntegers.CreateRandomInRange( + BigInteger.One, m.Subtract(BigInteger.One), random); + + BigInteger blindedInput = r.ModPow(e, m).Multiply(input).Mod(m); + BigInteger blindedResult = core.ProcessBlock(blindedInput); + + BigInteger rInv = BigIntegers.ModOddInverse(m, r); + result = blindedResult.Multiply(rInv).Mod(m); + + // defence against Arjen Lenstra�s CRT attack + if (!input.Equals(result.ModPow(e, m))) + throw new InvalidOperationException("RSA engine faulty decryption/signing detected"); + } + else + { + result = core.ProcessBlock(input); + } + } + else + { + result = core.ProcessBlock(input); + } + + return core.ConvertOutput(result); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs.meta new file mode 100644 index 00000000..da3970f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b80e1341d98fdb49851a4cd4a57eac2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindedEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs new file mode 100644 index 00000000..768ba730 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs @@ -0,0 +1,154 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * This does your basic RSA Chaum's blinding and unblinding as outlined in + * "Handbook of Applied Cryptography", page 475. You need to use this if you are + * trying to get another party to generate signatures without them being aware + * of the message they are signing. + */ + public class RsaBlindingEngine + : IAsymmetricBlockCipher + { + private readonly IRsa core; + + private RsaKeyParameters key; + private BigInteger blindingFactor; + + private bool forEncryption; + + public RsaBlindingEngine() + : this(new RsaCoreEngine()) + { + } + + public RsaBlindingEngine(IRsa rsa) + { + this.core = rsa; + } + + public virtual string AlgorithmName + { + get { return "RSA"; } + } + + /** + * Initialise the blinding engine. + * + * @param forEncryption true if we are encrypting (blinding), false otherwise. + * @param param the necessary RSA key parameters. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters param) + { + RsaBlindingParameters p; + + if (param is ParametersWithRandom) + { + ParametersWithRandom rParam = (ParametersWithRandom)param; + + p = (RsaBlindingParameters)rParam.Parameters; + } + else + { + p = (RsaBlindingParameters)param; + } + + core.Init(forEncryption, p.PublicKey); + + this.forEncryption = forEncryption; + this.key = p.PublicKey; + this.blindingFactor = p.BlindingFactor; + } + + /** + * Return the maximum size for an input block to this engine. + * For RSA this is always one byte less than the key size on + * encryption, and the same length as the key size on decryption. + * + * @return maximum size for an input block. + */ + public virtual int GetInputBlockSize() + { + return core.GetInputBlockSize(); + } + + /** + * Return the maximum size for an output block to this engine. + * For RSA this is always one byte less than the key size on + * decryption, and the same length as the key size on encryption. + * + * @return maximum size for an output block. + */ + public virtual int GetOutputBlockSize() + { + return core.GetOutputBlockSize(); + } + + /** + * Process a single block using the RSA blinding algorithm. + * + * @param in the input array. + * @param inOff the offset into the input buffer where the data starts. + * @param inLen the length of the data to be processed. + * @return the result of the RSA process. + * @throws DataLengthException the input block is too large. + */ + public virtual byte[] ProcessBlock( + byte[] inBuf, + int inOff, + int inLen) + { + BigInteger msg = core.ConvertInput(inBuf, inOff, inLen); + + if (forEncryption) + { + msg = BlindMessage(msg); + } + else + { + msg = UnblindMessage(msg); + } + + return core.ConvertOutput(msg); + } + + /* + * Blind message with the blind factor. + */ + private BigInteger BlindMessage( + BigInteger msg) + { + BigInteger blindMsg = blindingFactor; + blindMsg = msg.Multiply(blindMsg.ModPow(key.Exponent, key.Modulus)); + blindMsg = blindMsg.Mod(key.Modulus); + + return blindMsg; + } + + /* + * Unblind the message blinded with the blind factor. + */ + private BigInteger UnblindMessage( + BigInteger blindedMsg) + { + BigInteger m = key.Modulus; + BigInteger msg = blindedMsg; + BigInteger blindFactorInverse = BigIntegers.ModOddInverse(m, blindingFactor); + msg = msg.Multiply(blindFactorInverse); + msg = msg.Mod(m); + + return msg; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs.meta new file mode 100644 index 00000000..a4de5d78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d90b524dee5e7c14f9cd372f30fefb58 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSABlindingEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs new file mode 100644 index 00000000..8a2954c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * this does your basic RSA algorithm. + */ + public class RsaCoreEngine + : IRsa + { + private RsaKeyParameters key; + private bool forEncryption; + private int bitSize; + + private void CheckInitialised() + { + if (key == null) + throw new InvalidOperationException("RSA engine not initialised"); + } + + /** + * initialise the RSA engine. + * + * @param forEncryption true if we are encrypting, false otherwise. + * @param param the necessary RSA key parameters. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (parameters is ParametersWithRandom) + { + parameters = ((ParametersWithRandom) parameters).Parameters; + } + + if (!(parameters is RsaKeyParameters)) + throw new InvalidKeyException("Not an RSA key"); + + this.key = (RsaKeyParameters) parameters; + this.forEncryption = forEncryption; + this.bitSize = key.Modulus.BitLength; + } + + /** + * Return the maximum size for an input block to this engine. + * For RSA this is always one byte less than the key size on + * encryption, and the same length as the key size on decryption. + * + * @return maximum size for an input block. + */ + public virtual int GetInputBlockSize() + { + CheckInitialised(); + + if (forEncryption) + { + return (bitSize - 1) / 8; + } + + return (bitSize + 7) / 8; + } + + /** + * Return the maximum size for an output block to this engine. + * For RSA this is always one byte less than the key size on + * decryption, and the same length as the key size on encryption. + * + * @return maximum size for an output block. + */ + public virtual int GetOutputBlockSize() + { + CheckInitialised(); + + if (forEncryption) + { + return (bitSize + 7) / 8; + } + + return (bitSize - 1) / 8; + } + + public virtual BigInteger ConvertInput( + byte[] inBuf, + int inOff, + int inLen) + { + CheckInitialised(); + + int maxLength = (bitSize + 7) / 8; + + if (inLen > maxLength) + throw new DataLengthException("input too large for RSA cipher."); + + BigInteger input = new BigInteger(1, inBuf, inOff, inLen); + + if (input.CompareTo(key.Modulus) >= 0) + throw new DataLengthException("input too large for RSA cipher."); + + return input; + } + + public virtual byte[] ConvertOutput(BigInteger result) + { + CheckInitialised(); + + return forEncryption + ? BigIntegers.AsUnsignedByteArray(GetOutputBlockSize(), result) + : BigIntegers.AsUnsignedByteArray(result); + } + + public virtual BigInteger ProcessBlock( + BigInteger input) + { + CheckInitialised(); + + if (key is RsaPrivateCrtKeyParameters) + { + // + // we have the extra factors, use the Chinese Remainder Theorem - the author + // wishes to express his thanks to Dirk Bonekaemper at rtsffm.com for + // advice regarding the expression of this. + // + RsaPrivateCrtKeyParameters crtKey = (RsaPrivateCrtKeyParameters)key; + + BigInteger p = crtKey.P; + BigInteger q = crtKey.Q; + BigInteger dP = crtKey.DP; + BigInteger dQ = crtKey.DQ; + BigInteger qInv = crtKey.QInv; + + BigInteger mP, mQ, h, m; + + // mP = ((input Mod p) ^ dP)) Mod p + mP = (input.Remainder(p)).ModPow(dP, p); + + // mQ = ((input Mod q) ^ dQ)) Mod q + mQ = (input.Remainder(q)).ModPow(dQ, q); + + // h = qInv * (mP - mQ) Mod p + h = mP.Subtract(mQ); + h = h.Multiply(qInv); + h = h.Mod(p); // Mod (in Java) returns the positive residual + + // m = h * q + mQ + m = h.Multiply(q); + m = m.Add(mQ); + + return m; + } + + return input.ModPow(key.Exponent, key.Modulus); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs.meta new file mode 100644 index 00000000..e949d6d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3069653cc00071b44a1ff3745ce8a215 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RSACoreEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs new file mode 100644 index 00000000..2d080326 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs @@ -0,0 +1,795 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +#if UNITY_WSA && !UNITY_EDITOR && !ENABLE_IL2CPP +using System.TypeFix; +#endif +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * an implementation of Rijndael, based on the documentation and reference implementation + * by Paulo Barreto, Vincent Rijmen, for v2.0 August '99. + *

+ * Note: this implementation is based on information prior to readonly NIST publication. + *

+ */ + public class RijndaelEngine + : IBlockCipher + { + private static readonly int MAXROUNDS = 14; + + private static readonly int MAXKC = (256/4); + + private static readonly byte[] Logtable = + { + 0, 0, 25, 1, 50, 2, 26, 198, + 75, 199, 27, 104, 51, 238, 223, 3, + 100, 4, 224, 14, 52, 141, 129, 239, + 76, 113, 8, 200, 248, 105, 28, 193, + 125, 194, 29, 181, 249, 185, 39, 106, + 77, 228, 166, 114, 154, 201, 9, 120, + 101, 47, 138, 5, 33, 15, 225, 36, + 18, 240, 130, 69, 53, 147, 218, 142, + 150, 143, 219, 189, 54, 208, 206, 148, + 19, 92, 210, 241, 64, 70, 131, 56, + 102, 221, 253, 48, 191, 6, 139, 98, + 179, 37, 226, 152, 34, 136, 145, 16, + 126, 110, 72, 195, 163, 182, 30, 66, + 58, 107, 40, 84, 250, 133, 61, 186, + 43, 121, 10, 21, 155, 159, 94, 202, + 78, 212, 172, 229, 243, 115, 167, 87, + 175, 88, 168, 80, 244, 234, 214, 116, + 79, 174, 233, 213, 231, 230, 173, 232, + 44, 215, 117, 122, 235, 22, 11, 245, + 89, 203, 95, 176, 156, 169, 81, 160, + 127, 12, 246, 111, 23, 196, 73, 236, + 216, 67, 31, 45, 164, 118, 123, 183, + 204, 187, 62, 90, 251, 96, 177, 134, + 59, 82, 161, 108, 170, 85, 41, 157, + 151, 178, 135, 144, 97, 190, 220, 252, + 188, 149, 207, 205, 55, 63, 91, 209, + 83, 57, 132, 60, 65, 162, 109, 71, + 20, 42, 158, 93, 86, 242, 211, 171, + 68, 17, 146, 217, 35, 32, 46, 137, + 180, 124, 184, 38, 119, 153, 227, 165, + 103, 74, 237, 222, 197, 49, 254, 24, + 13, 99, 140, 128, 192, 247, 112, 7 + }; + + private static readonly byte[] Alogtable = + { + 0, 3, 5, 15, 17, 51, 85, 255, 26, 46, 114, 150, 161, 248, 19, 53, + 95, 225, 56, 72, 216, 115, 149, 164, 247, 2, 6, 10, 30, 34, 102, 170, + 229, 52, 92, 228, 55, 89, 235, 38, 106, 190, 217, 112, 144, 171, 230, 49, + 83, 245, 4, 12, 20, 60, 68, 204, 79, 209, 104, 184, 211, 110, 178, 205, + 76, 212, 103, 169, 224, 59, 77, 215, 98, 166, 241, 8, 24, 40, 120, 136, + 131, 158, 185, 208, 107, 189, 220, 127, 129, 152, 179, 206, 73, 219, 118, 154, + 181, 196, 87, 249, 16, 48, 80, 240, 11, 29, 39, 105, 187, 214, 97, 163, + 254, 25, 43, 125, 135, 146, 173, 236, 47, 113, 147, 174, 233, 32, 96, 160, + 251, 22, 58, 78, 210, 109, 183, 194, 93, 231, 50, 86, 250, 21, 63, 65, + 195, 94, 226, 61, 71, 201, 64, 192, 91, 237, 44, 116, 156, 191, 218, 117, + 159, 186, 213, 100, 172, 239, 42, 126, 130, 157, 188, 223, 122, 142, 137, 128, + 155, 182, 193, 88, 232, 35, 101, 175, 234, 37, 111, 177, 200, 67, 197, 84, + 252, 31, 33, 99, 165, 244, 7, 9, 27, 45, 119, 153, 176, 203, 70, 202, + 69, 207, 74, 222, 121, 139, 134, 145, 168, 227, 62, 66, 198, 81, 243, 14, + 18, 54, 90, 238, 41, 123, 141, 140, 143, 138, 133, 148, 167, 242, 13, 23, + 57, 75, 221, 124, 132, 151, 162, 253, 28, 36, 108, 180, 199, 82, 246, 1, + 3, 5, 15, 17, 51, 85, 255, 26, 46, 114, 150, 161, 248, 19, 53, + 95, 225, 56, 72, 216, 115, 149, 164, 247, 2, 6, 10, 30, 34, 102, 170, + 229, 52, 92, 228, 55, 89, 235, 38, 106, 190, 217, 112, 144, 171, 230, 49, + 83, 245, 4, 12, 20, 60, 68, 204, 79, 209, 104, 184, 211, 110, 178, 205, + 76, 212, 103, 169, 224, 59, 77, 215, 98, 166, 241, 8, 24, 40, 120, 136, + 131, 158, 185, 208, 107, 189, 220, 127, 129, 152, 179, 206, 73, 219, 118, 154, + 181, 196, 87, 249, 16, 48, 80, 240, 11, 29, 39, 105, 187, 214, 97, 163, + 254, 25, 43, 125, 135, 146, 173, 236, 47, 113, 147, 174, 233, 32, 96, 160, + 251, 22, 58, 78, 210, 109, 183, 194, 93, 231, 50, 86, 250, 21, 63, 65, + 195, 94, 226, 61, 71, 201, 64, 192, 91, 237, 44, 116, 156, 191, 218, 117, + 159, 186, 213, 100, 172, 239, 42, 126, 130, 157, 188, 223, 122, 142, 137, 128, + 155, 182, 193, 88, 232, 35, 101, 175, 234, 37, 111, 177, 200, 67, 197, 84, + 252, 31, 33, 99, 165, 244, 7, 9, 27, 45, 119, 153, 176, 203, 70, 202, + 69, 207, 74, 222, 121, 139, 134, 145, 168, 227, 62, 66, 198, 81, 243, 14, + 18, 54, 90, 238, 41, 123, 141, 140, 143, 138, 133, 148, 167, 242, 13, 23, + 57, 75, 221, 124, 132, 151, 162, 253, 28, 36, 108, 180, 199, 82, 246, 1, + }; + + private static readonly byte[] S = + { + 99, 124, 119, 123, 242, 107, 111, 197, 48, 1, 103, 43, 254, 215, 171, 118, + 202, 130, 201, 125, 250, 89, 71, 240, 173, 212, 162, 175, 156, 164, 114, 192, + 183, 253, 147, 38, 54, 63, 247, 204, 52, 165, 229, 241, 113, 216, 49, 21, + 4, 199, 35, 195, 24, 150, 5, 154, 7, 18, 128, 226, 235, 39, 178, 117, + 9, 131, 44, 26, 27, 110, 90, 160, 82, 59, 214, 179, 41, 227, 47, 132, + 83, 209, 0, 237, 32, 252, 177, 91, 106, 203, 190, 57, 74, 76, 88, 207, + 208, 239, 170, 251, 67, 77, 51, 133, 69, 249, 2, 127, 80, 60, 159, 168, + 81, 163, 64, 143, 146, 157, 56, 245, 188, 182, 218, 33, 16, 255, 243, 210, + 205, 12, 19, 236, 95, 151, 68, 23, 196, 167, 126, 61, 100, 93, 25, 115, + 96, 129, 79, 220, 34, 42, 144, 136, 70, 238, 184, 20, 222, 94, 11, 219, + 224, 50, 58, 10, 73, 6, 36, 92, 194, 211, 172, 98, 145, 149, 228, 121, + 231, 200, 55, 109, 141, 213, 78, 169, 108, 86, 244, 234, 101, 122, 174, 8, + 186, 120, 37, 46, 28, 166, 180, 198, 232, 221, 116, 31, 75, 189, 139, 138, + 112, 62, 181, 102, 72, 3, 246, 14, 97, 53, 87, 185, 134, 193, 29, 158, + 225, 248, 152, 17, 105, 217, 142, 148, 155, 30, 135, 233, 206, 85, 40, 223, + 140, 161, 137, 13, 191, 230, 66, 104, 65, 153, 45, 15, 176, 84, 187, 22, + }; + + private static readonly byte[] Si = + { + 82, 9, 106, 213, 48, 54, 165, 56, 191, 64, 163, 158, 129, 243, 215, 251, + 124, 227, 57, 130, 155, 47, 255, 135, 52, 142, 67, 68, 196, 222, 233, 203, + 84, 123, 148, 50, 166, 194, 35, 61, 238, 76, 149, 11, 66, 250, 195, 78, + 8, 46, 161, 102, 40, 217, 36, 178, 118, 91, 162, 73, 109, 139, 209, 37, + 114, 248, 246, 100, 134, 104, 152, 22, 212, 164, 92, 204, 93, 101, 182, 146, + 108, 112, 72, 80, 253, 237, 185, 218, 94, 21, 70, 87, 167, 141, 157, 132, + 144, 216, 171, 0, 140, 188, 211, 10, 247, 228, 88, 5, 184, 179, 69, 6, + 208, 44, 30, 143, 202, 63, 15, 2, 193, 175, 189, 3, 1, 19, 138, 107, + 58, 145, 17, 65, 79, 103, 220, 234, 151, 242, 207, 206, 240, 180, 230, 115, + 150, 172, 116, 34, 231, 173, 53, 133, 226, 249, 55, 232, 28, 117, 223, 110, + 71, 241, 26, 113, 29, 41, 197, 137, 111, 183, 98, 14, 170, 24, 190, 27, + 252, 86, 62, 75, 198, 210, 121, 32, 154, 219, 192, 254, 120, 205, 90, 244, + 31, 221, 168, 51, 136, 7, 199, 49, 177, 18, 16, 89, 39, 128, 236, 95, + 96, 81, 127, 169, 25, 181, 74, 13, 45, 229, 122, 159, 147, 201, 156, 239, + 160, 224, 59, 77, 174, 42, 245, 176, 200, 235, 187, 60, 131, 83, 153, 97, + 23, 43, 4, 126, 186, 119, 214, 38, 225, 105, 20, 99, 85, 33, 12, 125, + }; + + private static readonly byte[] rcon = + { + 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, + 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91 + }; + + static readonly byte[][] shifts0 = new byte [][] + { + new byte[]{ 0, 8, 16, 24 }, + new byte[]{ 0, 8, 16, 24 }, + new byte[]{ 0, 8, 16, 24 }, + new byte[]{ 0, 8, 16, 32 }, + new byte[]{ 0, 8, 24, 32 } + }; + + static readonly byte[][] shifts1 = + { + new byte[]{ 0, 24, 16, 8 }, + new byte[]{ 0, 32, 24, 16 }, + new byte[]{ 0, 40, 32, 24 }, + new byte[]{ 0, 48, 40, 24 }, + new byte[]{ 0, 56, 40, 32 } + }; + + /** + * multiply two elements of GF(2^m) + * needed for MixColumn and InvMixColumn + */ + private byte Mul0x2( + int b) + { + if (b != 0) + { + return Alogtable[25 + (Logtable[b] & 0xff)]; + } + else + { + return 0; + } + } + + private byte Mul0x3( + int b) + { + if (b != 0) + { + return Alogtable[1 + (Logtable[b] & 0xff)]; + } + else + { + return 0; + } + } + + private byte Mul0x9( + int b) + { + if (b >= 0) + { + return Alogtable[199 + b]; + } + else + { + return 0; + } + } + + private byte Mul0xb( + int b) + { + if (b >= 0) + { + return Alogtable[104 + b]; + } + else + { + return 0; + } + } + + private byte Mul0xd( + int b) + { + if (b >= 0) + { + return Alogtable[238 + b]; + } + else + { + return 0; + } + } + + private byte Mul0xe( + int b) + { + if (b >= 0) + { + return Alogtable[223 + b]; + } + else + { + return 0; + } + } + + /** + * xor corresponding text input and round key input bytes + */ + private void KeyAddition( + long[] rk) + { + A0 ^= rk[0]; + A1 ^= rk[1]; + A2 ^= rk[2]; + A3 ^= rk[3]; + } + + private long Shift( + long r, + int shift) + { + //return (((long)((ulong) r >> shift) | (r << (BC - shift)))) & BC_MASK; + + ulong temp = (ulong) r >> shift; + + // NB: This corrects for Mono Bug #79087 (fixed in 1.1.17) + if (shift > 31) + { + temp &= 0xFFFFFFFFUL; + } + + return ((long) temp | (r << (BC - shift))) & BC_MASK; + } + + /** + * Row 0 remains unchanged + * The other three rows are shifted a variable amount + */ + private void ShiftRow( + byte[] shiftsSC) + { + A1 = Shift(A1, shiftsSC[1]); + A2 = Shift(A2, shiftsSC[2]); + A3 = Shift(A3, shiftsSC[3]); + } + + private long ApplyS( + long r, + byte[] box) + { + long res = 0; + + for (int j = 0; j < BC; j += 8) + { + res |= (long)(box[(int)((r >> j) & 0xff)] & 0xff) << j; + } + + return res; + } + + /** + * Replace every byte of the input by the byte at that place + * in the nonlinear S-box + */ + private void Substitution( + byte[] box) + { + A0 = ApplyS(A0, box); + A1 = ApplyS(A1, box); + A2 = ApplyS(A2, box); + A3 = ApplyS(A3, box); + } + + /** + * Mix the bytes of every column in a linear way + */ + private void MixColumn() + { + long r0, r1, r2, r3; + + r0 = r1 = r2 = r3 = 0; + + for (int j = 0; j < BC; j += 8) + { + int a0 = (int)((A0 >> j) & 0xff); + int a1 = (int)((A1 >> j) & 0xff); + int a2 = (int)((A2 >> j) & 0xff); + int a3 = (int)((A3 >> j) & 0xff); + + r0 |= (long)((Mul0x2(a0) ^ Mul0x3(a1) ^ a2 ^ a3) & 0xff) << j; + + r1 |= (long)((Mul0x2(a1) ^ Mul0x3(a2) ^ a3 ^ a0) & 0xff) << j; + + r2 |= (long)((Mul0x2(a2) ^ Mul0x3(a3) ^ a0 ^ a1) & 0xff) << j; + + r3 |= (long)((Mul0x2(a3) ^ Mul0x3(a0) ^ a1 ^ a2) & 0xff) << j; + } + + A0 = r0; + A1 = r1; + A2 = r2; + A3 = r3; + } + + /** + * Mix the bytes of every column in a linear way + * This is the opposite operation of Mixcolumn + */ + private void InvMixColumn() + { + long r0, r1, r2, r3; + + r0 = r1 = r2 = r3 = 0; + for (int j = 0; j < BC; j += 8) + { + int a0 = (int)((A0 >> j) & 0xff); + int a1 = (int)((A1 >> j) & 0xff); + int a2 = (int)((A2 >> j) & 0xff); + int a3 = (int)((A3 >> j) & 0xff); + + // + // pre-lookup the log table + // + a0 = (a0 != 0) ? (Logtable[a0 & 0xff] & 0xff) : -1; + a1 = (a1 != 0) ? (Logtable[a1 & 0xff] & 0xff) : -1; + a2 = (a2 != 0) ? (Logtable[a2 & 0xff] & 0xff) : -1; + a3 = (a3 != 0) ? (Logtable[a3 & 0xff] & 0xff) : -1; + + r0 |= (long)((Mul0xe(a0) ^ Mul0xb(a1) ^ Mul0xd(a2) ^ Mul0x9(a3)) & 0xff) << j; + + r1 |= (long)((Mul0xe(a1) ^ Mul0xb(a2) ^ Mul0xd(a3) ^ Mul0x9(a0)) & 0xff) << j; + + r2 |= (long)((Mul0xe(a2) ^ Mul0xb(a3) ^ Mul0xd(a0) ^ Mul0x9(a1)) & 0xff) << j; + + r3 |= (long)((Mul0xe(a3) ^ Mul0xb(a0) ^ Mul0xd(a1) ^ Mul0x9(a2)) & 0xff) << j; + } + + A0 = r0; + A1 = r1; + A2 = r2; + A3 = r3; + } + + /** + * Calculate the necessary round keys + * The number of calculations depends on keyBits and blockBits + */ + private long[][] GenerateWorkingKey( + byte[] key) + { + int KC; + int t, rconpointer = 0; + int keyBits = key.Length * 8; + byte[,] tk = new byte[4,MAXKC]; + //long[,] W = new long[MAXROUNDS+1,4]; + long[][] W = new long[MAXROUNDS+1][]; + + for (int i = 0; i < MAXROUNDS+1; i++) W[i] = new long[4]; + + switch (keyBits) + { + case 128: + KC = 4; + break; + case 160: + KC = 5; + break; + case 192: + KC = 6; + break; + case 224: + KC = 7; + break; + case 256: + KC = 8; + break; + default : + throw new ArgumentException("Key length not 128/160/192/224/256 bits."); + } + + if (keyBits >= blockBits) + { + ROUNDS = KC + 6; + } + else + { + ROUNDS = (BC / 8) + 6; + } + + // + // copy the key into the processing area + // + int index = 0; + + for (int i = 0; i < key.Length; i++) + { + tk[i % 4,i / 4] = key[index++]; + } + + t = 0; + + // + // copy values into round key array + // + for (int j = 0; (j < KC) && (t < (ROUNDS+1)*(BC / 8)); j++, t++) + { + for (int i = 0; i < 4; i++) + { + W[t / (BC / 8)][i] |= (long)(tk[i,j] & 0xff) << ((t * 8) % BC); + } + } + + // + // while not enough round key material calculated + // calculate new values + // + while (t < (ROUNDS+1)*(BC/8)) + { + for (int i = 0; i < 4; i++) + { + tk[i,0] ^= S[tk[(i+1)%4,KC-1] & 0xff]; + } + tk[0,0] ^= (byte) rcon[rconpointer++]; + + if (KC <= 6) + { + for (int j = 1; j < KC; j++) + { + for (int i = 0; i < 4; i++) + { + tk[i,j] ^= tk[i,j-1]; + } + } + } + else + { + for (int j = 1; j < 4; j++) + { + for (int i = 0; i < 4; i++) + { + tk[i,j] ^= tk[i,j-1]; + } + } + for (int i = 0; i < 4; i++) + { + tk[i,4] ^= S[tk[i,3] & 0xff]; + } + for (int j = 5; j < KC; j++) + { + for (int i = 0; i < 4; i++) + { + tk[i,j] ^= tk[i,j-1]; + } + } + } + + // + // copy values into round key array + // + for (int j = 0; (j < KC) && (t < (ROUNDS+1)*(BC/8)); j++, t++) + { + for (int i = 0; i < 4; i++) + { + W[t / (BC/8)][i] |= (long)(tk[i,j] & 0xff) << ((t * 8) % (BC)); + } + } + } + return W; + } + + private int BC; + private long BC_MASK; + private int ROUNDS; + private int blockBits; + private long[][] workingKey; + private long A0, A1, A2, A3; + private bool forEncryption; + private byte[] shifts0SC; + private byte[] shifts1SC; + + /** + * default constructor - 128 bit block size. + */ + public RijndaelEngine() : this(128) {} + + /** + * basic constructor - set the cipher up for a given blocksize + * + * @param blocksize the blocksize in bits, must be 128, 192, or 256. + */ + public RijndaelEngine( + int blockBits) + { + switch (blockBits) + { + case 128: + BC = 32; + BC_MASK = 0xffffffffL; + shifts0SC = shifts0[0]; + shifts1SC = shifts1[0]; + break; + case 160: + BC = 40; + BC_MASK = 0xffffffffffL; + shifts0SC = shifts0[1]; + shifts1SC = shifts1[1]; + break; + case 192: + BC = 48; + BC_MASK = 0xffffffffffffL; + shifts0SC = shifts0[2]; + shifts1SC = shifts1[2]; + break; + case 224: + BC = 56; + BC_MASK = 0xffffffffffffffL; + shifts0SC = shifts0[3]; + shifts1SC = shifts1[3]; + break; + case 256: + BC = 64; + BC_MASK = unchecked( (long)0xffffffffffffffffL); + shifts0SC = shifts0[4]; + shifts1SC = shifts1[4]; + break; + default: + throw new ArgumentException("unknown blocksize to Rijndael"); + } + + this.blockBits = blockBits; + } + + /** + * initialise a Rijndael cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (typeof(KeyParameter).IsInstanceOfType(parameters)) + { + workingKey = GenerateWorkingKey(((KeyParameter)parameters).GetKey()); + this.forEncryption = forEncryption; + return; + } + + throw new ArgumentException("invalid parameter passed to Rijndael init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + public virtual string AlgorithmName + { + get { return "Rijndael"; } + } + + public virtual int GetBlockSize() + { + return BC / 2; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("Rijndael engine not initialised"); + + Check.DataLength(input, inOff, (BC / 2), "input buffer too short"); + Check.OutputLength(output, outOff, (BC / 2), "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + UnPackBlock(input.AsSpan(inOff)); +#else + UnPackBlock(input, inOff); +#endif + + if (forEncryption) + { + EncryptBlock(workingKey); + } + else + { + DecryptBlock(workingKey); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + PackBlock(output.AsSpan(outOff)); +#else + PackBlock(output, outOff); +#endif + + return BC / 2; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("Rijndael engine not initialised"); + + Check.DataLength(input, (BC / 2), "input buffer too short"); + Check.OutputLength(output, (BC / 2), "output buffer too short"); + + UnPackBlock(input); + + if (forEncryption) + { + EncryptBlock(workingKey); + } + else + { + DecryptBlock(workingKey); + } + + PackBlock(output); + + return BC / 2; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void UnPackBlock(ReadOnlySpan input) + { + int index = 0; + + A0 = (long)(input[index++] & 0xff); + A1 = (long)(input[index++] & 0xff); + A2 = (long)(input[index++] & 0xff); + A3 = (long)(input[index++] & 0xff); + + for (int j = 8; j != BC; j += 8) + { + A0 |= (long)(input[index++] & 0xff) << j; + A1 |= (long)(input[index++] & 0xff) << j; + A2 |= (long)(input[index++] & 0xff) << j; + A3 |= (long)(input[index++] & 0xff) << j; + } + } + + private void PackBlock(Span output) + { + int index = 0; + + for (int j = 0; j != BC; j += 8) + { + output[index++] = (byte)(A0 >> j); + output[index++] = (byte)(A1 >> j); + output[index++] = (byte)(A2 >> j); + output[index++] = (byte)(A3 >> j); + } + } +#else + private void UnPackBlock(byte[] bytes, int off) + { + int index = off; + + A0 = (long)(bytes[index++] & 0xff); + A1 = (long)(bytes[index++] & 0xff); + A2 = (long)(bytes[index++] & 0xff); + A3 = (long)(bytes[index++] & 0xff); + + for (int j = 8; j != BC; j += 8) + { + A0 |= (long)(bytes[index++] & 0xff) << j; + A1 |= (long)(bytes[index++] & 0xff) << j; + A2 |= (long)(bytes[index++] & 0xff) << j; + A3 |= (long)(bytes[index++] & 0xff) << j; + } + } + + private void PackBlock(byte[] bytes, int off) + { + int index = off; + + for (int j = 0; j != BC; j += 8) + { + bytes[index++] = (byte)(A0 >> j); + bytes[index++] = (byte)(A1 >> j); + bytes[index++] = (byte)(A2 >> j); + bytes[index++] = (byte)(A3 >> j); + } + } +#endif + + private void EncryptBlock( + long[][] rk) + { + int r; + + // + // begin with a key addition + // + KeyAddition(rk[0]); + + // + // ROUNDS-1 ordinary rounds + // + for (r = 1; r < ROUNDS; r++) + { + Substitution(S); + ShiftRow(shifts0SC); + MixColumn(); + KeyAddition(rk[r]); + } + + // + // Last round is special: there is no MixColumn + // + Substitution(S); + ShiftRow(shifts0SC); + KeyAddition(rk[ROUNDS]); + } + + private void DecryptBlock( + long[][] rk) + { + int r; + + // To decrypt: apply the inverse operations of the encrypt routine, + // in opposite order + // + // (KeyAddition is an involution: it 's equal to its inverse) + // (the inverse of Substitution with table S is Substitution with the inverse table of S) + // (the inverse of Shiftrow is Shiftrow over a suitable distance) + // + + // First the special round: + // without InvMixColumn + // with extra KeyAddition + // + KeyAddition(rk[ROUNDS]); + Substitution(Si); + ShiftRow(shifts1SC); + + // + // ROUNDS-1 ordinary rounds + // + for (r = ROUNDS-1; r > 0; r--) + { + KeyAddition(rk[r]); + InvMixColumn(); + Substitution(Si); + ShiftRow(shifts1SC); + } + + // + // End with the extra key addition + // + KeyAddition(rk[0]); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs.meta new file mode 100644 index 00000000..f24aa922 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4cf037396c2603a43a6a5470c1fb3798 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RijndaelEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs new file mode 100644 index 00000000..a2352d1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * this does your basic RSA algorithm. + */ + public class RsaEngine + : IAsymmetricBlockCipher + { + private readonly IRsa core; + + public RsaEngine() + : this(new RsaCoreEngine()) + { + } + + public RsaEngine(IRsa rsa) + { + this.core = rsa; + } + + public virtual string AlgorithmName + { + get { return "RSA"; } + } + + /** + * initialise the RSA engine. + * + * @param forEncryption true if we are encrypting, false otherwise. + * @param param the necessary RSA key parameters. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + core.Init(forEncryption, parameters); + } + + /** + * Return the maximum size for an input block to this engine. + * For RSA this is always one byte less than the key size on + * encryption, and the same length as the key size on decryption. + * + * @return maximum size for an input block. + */ + public virtual int GetInputBlockSize() + { + return core.GetInputBlockSize(); + } + + /** + * Return the maximum size for an output block to this engine. + * For RSA this is always one byte less than the key size on + * decryption, and the same length as the key size on encryption. + * + * @return maximum size for an output block. + */ + public virtual int GetOutputBlockSize() + { + return core.GetOutputBlockSize(); + } + + /** + * Process a single block using the basic RSA algorithm. + * + * @param inBuf the input array. + * @param inOff the offset into the input buffer where the data starts. + * @param inLen the length of the data to be processed. + * @return the result of the RSA process. + * @exception DataLengthException the input block is too large. + */ + public virtual byte[] ProcessBlock( + byte[] inBuf, + int inOff, + int inLen) + { + BigInteger input = core.ConvertInput(inBuf, inOff, inLen); + BigInteger output = core.ProcessBlock(input); + return core.ConvertOutput(output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs.meta new file mode 100644 index 00000000..8444fa0b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b8545895894aa114287ea461626c8a83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/RsaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs new file mode 100644 index 00000000..be310f51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs @@ -0,0 +1,368 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Implementation of the SEED algorithm as described in RFC 4009 + */ + public class SeedEngine + : IBlockCipher + { + private const int BlockSize = 16; + + private static readonly uint[] SS0 = + { + 0x2989a1a8, 0x05858184, 0x16c6d2d4, 0x13c3d3d0, 0x14445054, 0x1d0d111c, 0x2c8ca0ac, 0x25052124, + 0x1d4d515c, 0x03434340, 0x18081018, 0x1e0e121c, 0x11415150, 0x3cccf0fc, 0x0acac2c8, 0x23436360, + 0x28082028, 0x04444044, 0x20002020, 0x1d8d919c, 0x20c0e0e0, 0x22c2e2e0, 0x08c8c0c8, 0x17071314, + 0x2585a1a4, 0x0f8f838c, 0x03030300, 0x3b4b7378, 0x3b8bb3b8, 0x13031310, 0x12c2d2d0, 0x2ecee2ec, + 0x30407070, 0x0c8c808c, 0x3f0f333c, 0x2888a0a8, 0x32023230, 0x1dcdd1dc, 0x36c6f2f4, 0x34447074, + 0x2ccce0ec, 0x15859194, 0x0b0b0308, 0x17475354, 0x1c4c505c, 0x1b4b5358, 0x3d8db1bc, 0x01010100, + 0x24042024, 0x1c0c101c, 0x33437370, 0x18889098, 0x10001010, 0x0cccc0cc, 0x32c2f2f0, 0x19c9d1d8, + 0x2c0c202c, 0x27c7e3e4, 0x32427270, 0x03838380, 0x1b8b9398, 0x11c1d1d0, 0x06868284, 0x09c9c1c8, + 0x20406060, 0x10405050, 0x2383a3a0, 0x2bcbe3e8, 0x0d0d010c, 0x3686b2b4, 0x1e8e929c, 0x0f4f434c, + 0x3787b3b4, 0x1a4a5258, 0x06c6c2c4, 0x38487078, 0x2686a2a4, 0x12021210, 0x2f8fa3ac, 0x15c5d1d4, + 0x21416160, 0x03c3c3c0, 0x3484b0b4, 0x01414140, 0x12425250, 0x3d4d717c, 0x0d8d818c, 0x08080008, + 0x1f0f131c, 0x19899198, 0x00000000, 0x19091118, 0x04040004, 0x13435350, 0x37c7f3f4, 0x21c1e1e0, + 0x3dcdf1fc, 0x36467274, 0x2f0f232c, 0x27072324, 0x3080b0b0, 0x0b8b8388, 0x0e0e020c, 0x2b8ba3a8, + 0x2282a2a0, 0x2e4e626c, 0x13839390, 0x0d4d414c, 0x29496168, 0x3c4c707c, 0x09090108, 0x0a0a0208, + 0x3f8fb3bc, 0x2fcfe3ec, 0x33c3f3f0, 0x05c5c1c4, 0x07878384, 0x14041014, 0x3ecef2fc, 0x24446064, + 0x1eced2dc, 0x2e0e222c, 0x0b4b4348, 0x1a0a1218, 0x06060204, 0x21012120, 0x2b4b6368, 0x26466264, + 0x02020200, 0x35c5f1f4, 0x12829290, 0x0a8a8288, 0x0c0c000c, 0x3383b3b0, 0x3e4e727c, 0x10c0d0d0, + 0x3a4a7278, 0x07474344, 0x16869294, 0x25c5e1e4, 0x26062224, 0x00808080, 0x2d8da1ac, 0x1fcfd3dc, + 0x2181a1a0, 0x30003030, 0x37073334, 0x2e8ea2ac, 0x36063234, 0x15051114, 0x22022220, 0x38083038, + 0x34c4f0f4, 0x2787a3a4, 0x05454144, 0x0c4c404c, 0x01818180, 0x29c9e1e8, 0x04848084, 0x17879394, + 0x35053134, 0x0bcbc3c8, 0x0ecec2cc, 0x3c0c303c, 0x31417170, 0x11011110, 0x07c7c3c4, 0x09898188, + 0x35457174, 0x3bcbf3f8, 0x1acad2d8, 0x38c8f0f8, 0x14849094, 0x19495158, 0x02828280, 0x04c4c0c4, + 0x3fcff3fc, 0x09494148, 0x39093138, 0x27476364, 0x00c0c0c0, 0x0fcfc3cc, 0x17c7d3d4, 0x3888b0b8, + 0x0f0f030c, 0x0e8e828c, 0x02424240, 0x23032320, 0x11819190, 0x2c4c606c, 0x1bcbd3d8, 0x2484a0a4, + 0x34043034, 0x31c1f1f0, 0x08484048, 0x02c2c2c0, 0x2f4f636c, 0x3d0d313c, 0x2d0d212c, 0x00404040, + 0x3e8eb2bc, 0x3e0e323c, 0x3c8cb0bc, 0x01c1c1c0, 0x2a8aa2a8, 0x3a8ab2b8, 0x0e4e424c, 0x15455154, + 0x3b0b3338, 0x1cccd0dc, 0x28486068, 0x3f4f737c, 0x1c8c909c, 0x18c8d0d8, 0x0a4a4248, 0x16465254, + 0x37477374, 0x2080a0a0, 0x2dcde1ec, 0x06464244, 0x3585b1b4, 0x2b0b2328, 0x25456164, 0x3acaf2f8, + 0x23c3e3e0, 0x3989b1b8, 0x3181b1b0, 0x1f8f939c, 0x1e4e525c, 0x39c9f1f8, 0x26c6e2e4, 0x3282b2b0, + 0x31013130, 0x2acae2e8, 0x2d4d616c, 0x1f4f535c, 0x24c4e0e4, 0x30c0f0f0, 0x0dcdc1cc, 0x08888088, + 0x16061214, 0x3a0a3238, 0x18485058, 0x14c4d0d4, 0x22426260, 0x29092128, 0x07070304, 0x33033330, + 0x28c8e0e8, 0x1b0b1318, 0x05050104, 0x39497178, 0x10809090, 0x2a4a6268, 0x2a0a2228, 0x1a8a9298 + }; + + private static readonly uint[] SS1 = + { + 0x38380830, 0xe828c8e0, 0x2c2d0d21, 0xa42686a2, 0xcc0fcfc3, 0xdc1eced2, 0xb03383b3, 0xb83888b0, + 0xac2f8fa3, 0x60204060, 0x54154551, 0xc407c7c3, 0x44044440, 0x6c2f4f63, 0x682b4b63, 0x581b4b53, + 0xc003c3c3, 0x60224262, 0x30330333, 0xb43585b1, 0x28290921, 0xa02080a0, 0xe022c2e2, 0xa42787a3, + 0xd013c3d3, 0x90118191, 0x10110111, 0x04060602, 0x1c1c0c10, 0xbc3c8cb0, 0x34360632, 0x480b4b43, + 0xec2fcfe3, 0x88088880, 0x6c2c4c60, 0xa82888a0, 0x14170713, 0xc404c4c0, 0x14160612, 0xf434c4f0, + 0xc002c2c2, 0x44054541, 0xe021c1e1, 0xd416c6d2, 0x3c3f0f33, 0x3c3d0d31, 0x8c0e8e82, 0x98188890, + 0x28280820, 0x4c0e4e42, 0xf436c6f2, 0x3c3e0e32, 0xa42585a1, 0xf839c9f1, 0x0c0d0d01, 0xdc1fcfd3, + 0xd818c8d0, 0x282b0b23, 0x64264662, 0x783a4a72, 0x24270723, 0x2c2f0f23, 0xf031c1f1, 0x70324272, + 0x40024242, 0xd414c4d0, 0x40014141, 0xc000c0c0, 0x70334373, 0x64274763, 0xac2c8ca0, 0x880b8b83, + 0xf437c7f3, 0xac2d8da1, 0x80008080, 0x1c1f0f13, 0xc80acac2, 0x2c2c0c20, 0xa82a8aa2, 0x34340430, + 0xd012c2d2, 0x080b0b03, 0xec2ecee2, 0xe829c9e1, 0x5c1d4d51, 0x94148490, 0x18180810, 0xf838c8f0, + 0x54174753, 0xac2e8ea2, 0x08080800, 0xc405c5c1, 0x10130313, 0xcc0dcdc1, 0x84068682, 0xb83989b1, + 0xfc3fcff3, 0x7c3d4d71, 0xc001c1c1, 0x30310131, 0xf435c5f1, 0x880a8a82, 0x682a4a62, 0xb03181b1, + 0xd011c1d1, 0x20200020, 0xd417c7d3, 0x00020202, 0x20220222, 0x04040400, 0x68284860, 0x70314171, + 0x04070703, 0xd81bcbd3, 0x9c1d8d91, 0x98198991, 0x60214161, 0xbc3e8eb2, 0xe426c6e2, 0x58194951, + 0xdc1dcdd1, 0x50114151, 0x90108090, 0xdc1cccd0, 0x981a8a92, 0xa02383a3, 0xa82b8ba3, 0xd010c0d0, + 0x80018181, 0x0c0f0f03, 0x44074743, 0x181a0a12, 0xe023c3e3, 0xec2ccce0, 0x8c0d8d81, 0xbc3f8fb3, + 0x94168692, 0x783b4b73, 0x5c1c4c50, 0xa02282a2, 0xa02181a1, 0x60234363, 0x20230323, 0x4c0d4d41, + 0xc808c8c0, 0x9c1e8e92, 0x9c1c8c90, 0x383a0a32, 0x0c0c0c00, 0x2c2e0e22, 0xb83a8ab2, 0x6c2e4e62, + 0x9c1f8f93, 0x581a4a52, 0xf032c2f2, 0x90128292, 0xf033c3f3, 0x48094941, 0x78384870, 0xcc0cccc0, + 0x14150511, 0xf83bcbf3, 0x70304070, 0x74354571, 0x7c3f4f73, 0x34350531, 0x10100010, 0x00030303, + 0x64244460, 0x6c2d4d61, 0xc406c6c2, 0x74344470, 0xd415c5d1, 0xb43484b0, 0xe82acae2, 0x08090901, + 0x74364672, 0x18190911, 0xfc3ecef2, 0x40004040, 0x10120212, 0xe020c0e0, 0xbc3d8db1, 0x04050501, + 0xf83acaf2, 0x00010101, 0xf030c0f0, 0x282a0a22, 0x5c1e4e52, 0xa82989a1, 0x54164652, 0x40034343, + 0x84058581, 0x14140410, 0x88098981, 0x981b8b93, 0xb03080b0, 0xe425c5e1, 0x48084840, 0x78394971, + 0x94178793, 0xfc3cccf0, 0x1c1e0e12, 0x80028282, 0x20210121, 0x8c0c8c80, 0x181b0b13, 0x5c1f4f53, + 0x74374773, 0x54144450, 0xb03282b2, 0x1c1d0d11, 0x24250521, 0x4c0f4f43, 0x00000000, 0x44064642, + 0xec2dcde1, 0x58184850, 0x50124252, 0xe82bcbe3, 0x7c3e4e72, 0xd81acad2, 0xc809c9c1, 0xfc3dcdf1, + 0x30300030, 0x94158591, 0x64254561, 0x3c3c0c30, 0xb43686b2, 0xe424c4e0, 0xb83b8bb3, 0x7c3c4c70, + 0x0c0e0e02, 0x50104050, 0x38390931, 0x24260622, 0x30320232, 0x84048480, 0x68294961, 0x90138393, + 0x34370733, 0xe427c7e3, 0x24240420, 0xa42484a0, 0xc80bcbc3, 0x50134353, 0x080a0a02, 0x84078783, + 0xd819c9d1, 0x4c0c4c40, 0x80038383, 0x8c0f8f83, 0xcc0ecec2, 0x383b0b33, 0x480a4a42, 0xb43787b3 + }; + + private static readonly uint[] SS2 = + { + + 0xa1a82989, 0x81840585, 0xd2d416c6, 0xd3d013c3, 0x50541444, 0x111c1d0d, 0xa0ac2c8c, 0x21242505, + 0x515c1d4d, 0x43400343, 0x10181808, 0x121c1e0e, 0x51501141, 0xf0fc3ccc, 0xc2c80aca, 0x63602343, + 0x20282808, 0x40440444, 0x20202000, 0x919c1d8d, 0xe0e020c0, 0xe2e022c2, 0xc0c808c8, 0x13141707, + 0xa1a42585, 0x838c0f8f, 0x03000303, 0x73783b4b, 0xb3b83b8b, 0x13101303, 0xd2d012c2, 0xe2ec2ece, + 0x70703040, 0x808c0c8c, 0x333c3f0f, 0xa0a82888, 0x32303202, 0xd1dc1dcd, 0xf2f436c6, 0x70743444, + 0xe0ec2ccc, 0x91941585, 0x03080b0b, 0x53541747, 0x505c1c4c, 0x53581b4b, 0xb1bc3d8d, 0x01000101, + 0x20242404, 0x101c1c0c, 0x73703343, 0x90981888, 0x10101000, 0xc0cc0ccc, 0xf2f032c2, 0xd1d819c9, + 0x202c2c0c, 0xe3e427c7, 0x72703242, 0x83800383, 0x93981b8b, 0xd1d011c1, 0x82840686, 0xc1c809c9, + 0x60602040, 0x50501040, 0xa3a02383, 0xe3e82bcb, 0x010c0d0d, 0xb2b43686, 0x929c1e8e, 0x434c0f4f, + 0xb3b43787, 0x52581a4a, 0xc2c406c6, 0x70783848, 0xa2a42686, 0x12101202, 0xa3ac2f8f, 0xd1d415c5, + 0x61602141, 0xc3c003c3, 0xb0b43484, 0x41400141, 0x52501242, 0x717c3d4d, 0x818c0d8d, 0x00080808, + 0x131c1f0f, 0x91981989, 0x00000000, 0x11181909, 0x00040404, 0x53501343, 0xf3f437c7, 0xe1e021c1, + 0xf1fc3dcd, 0x72743646, 0x232c2f0f, 0x23242707, 0xb0b03080, 0x83880b8b, 0x020c0e0e, 0xa3a82b8b, + 0xa2a02282, 0x626c2e4e, 0x93901383, 0x414c0d4d, 0x61682949, 0x707c3c4c, 0x01080909, 0x02080a0a, + 0xb3bc3f8f, 0xe3ec2fcf, 0xf3f033c3, 0xc1c405c5, 0x83840787, 0x10141404, 0xf2fc3ece, 0x60642444, + 0xd2dc1ece, 0x222c2e0e, 0x43480b4b, 0x12181a0a, 0x02040606, 0x21202101, 0x63682b4b, 0x62642646, + 0x02000202, 0xf1f435c5, 0x92901282, 0x82880a8a, 0x000c0c0c, 0xb3b03383, 0x727c3e4e, 0xd0d010c0, + 0x72783a4a, 0x43440747, 0x92941686, 0xe1e425c5, 0x22242606, 0x80800080, 0xa1ac2d8d, 0xd3dc1fcf, + 0xa1a02181, 0x30303000, 0x33343707, 0xa2ac2e8e, 0x32343606, 0x11141505, 0x22202202, 0x30383808, + 0xf0f434c4, 0xa3a42787, 0x41440545, 0x404c0c4c, 0x81800181, 0xe1e829c9, 0x80840484, 0x93941787, + 0x31343505, 0xc3c80bcb, 0xc2cc0ece, 0x303c3c0c, 0x71703141, 0x11101101, 0xc3c407c7, 0x81880989, + 0x71743545, 0xf3f83bcb, 0xd2d81aca, 0xf0f838c8, 0x90941484, 0x51581949, 0x82800282, 0xc0c404c4, + 0xf3fc3fcf, 0x41480949, 0x31383909, 0x63642747, 0xc0c000c0, 0xc3cc0fcf, 0xd3d417c7, 0xb0b83888, + 0x030c0f0f, 0x828c0e8e, 0x42400242, 0x23202303, 0x91901181, 0x606c2c4c, 0xd3d81bcb, 0xa0a42484, + 0x30343404, 0xf1f031c1, 0x40480848, 0xc2c002c2, 0x636c2f4f, 0x313c3d0d, 0x212c2d0d, 0x40400040, + 0xb2bc3e8e, 0x323c3e0e, 0xb0bc3c8c, 0xc1c001c1, 0xa2a82a8a, 0xb2b83a8a, 0x424c0e4e, 0x51541545, + 0x33383b0b, 0xd0dc1ccc, 0x60682848, 0x737c3f4f, 0x909c1c8c, 0xd0d818c8, 0x42480a4a, 0x52541646, + 0x73743747, 0xa0a02080, 0xe1ec2dcd, 0x42440646, 0xb1b43585, 0x23282b0b, 0x61642545, 0xf2f83aca, + 0xe3e023c3, 0xb1b83989, 0xb1b03181, 0x939c1f8f, 0x525c1e4e, 0xf1f839c9, 0xe2e426c6, 0xb2b03282, + 0x31303101, 0xe2e82aca, 0x616c2d4d, 0x535c1f4f, 0xe0e424c4, 0xf0f030c0, 0xc1cc0dcd, 0x80880888, + 0x12141606, 0x32383a0a, 0x50581848, 0xd0d414c4, 0x62602242, 0x21282909, 0x03040707, 0x33303303, + 0xe0e828c8, 0x13181b0b, 0x01040505, 0x71783949, 0x90901080, 0x62682a4a, 0x22282a0a, 0x92981a8a + }; + + private static readonly uint[] SS3 = + { + + 0x08303838, 0xc8e0e828, 0x0d212c2d, 0x86a2a426, 0xcfc3cc0f, 0xced2dc1e, 0x83b3b033, 0x88b0b838, + 0x8fa3ac2f, 0x40606020, 0x45515415, 0xc7c3c407, 0x44404404, 0x4f636c2f, 0x4b63682b, 0x4b53581b, + 0xc3c3c003, 0x42626022, 0x03333033, 0x85b1b435, 0x09212829, 0x80a0a020, 0xc2e2e022, 0x87a3a427, + 0xc3d3d013, 0x81919011, 0x01111011, 0x06020406, 0x0c101c1c, 0x8cb0bc3c, 0x06323436, 0x4b43480b, + 0xcfe3ec2f, 0x88808808, 0x4c606c2c, 0x88a0a828, 0x07131417, 0xc4c0c404, 0x06121416, 0xc4f0f434, + 0xc2c2c002, 0x45414405, 0xc1e1e021, 0xc6d2d416, 0x0f333c3f, 0x0d313c3d, 0x8e828c0e, 0x88909818, + 0x08202828, 0x4e424c0e, 0xc6f2f436, 0x0e323c3e, 0x85a1a425, 0xc9f1f839, 0x0d010c0d, 0xcfd3dc1f, + 0xc8d0d818, 0x0b23282b, 0x46626426, 0x4a72783a, 0x07232427, 0x0f232c2f, 0xc1f1f031, 0x42727032, + 0x42424002, 0xc4d0d414, 0x41414001, 0xc0c0c000, 0x43737033, 0x47636427, 0x8ca0ac2c, 0x8b83880b, + 0xc7f3f437, 0x8da1ac2d, 0x80808000, 0x0f131c1f, 0xcac2c80a, 0x0c202c2c, 0x8aa2a82a, 0x04303434, + 0xc2d2d012, 0x0b03080b, 0xcee2ec2e, 0xc9e1e829, 0x4d515c1d, 0x84909414, 0x08101818, 0xc8f0f838, + 0x47535417, 0x8ea2ac2e, 0x08000808, 0xc5c1c405, 0x03131013, 0xcdc1cc0d, 0x86828406, 0x89b1b839, + 0xcff3fc3f, 0x4d717c3d, 0xc1c1c001, 0x01313031, 0xc5f1f435, 0x8a82880a, 0x4a62682a, 0x81b1b031, + 0xc1d1d011, 0x00202020, 0xc7d3d417, 0x02020002, 0x02222022, 0x04000404, 0x48606828, 0x41717031, + 0x07030407, 0xcbd3d81b, 0x8d919c1d, 0x89919819, 0x41616021, 0x8eb2bc3e, 0xc6e2e426, 0x49515819, + 0xcdd1dc1d, 0x41515011, 0x80909010, 0xccd0dc1c, 0x8a92981a, 0x83a3a023, 0x8ba3a82b, 0xc0d0d010, + 0x81818001, 0x0f030c0f, 0x47434407, 0x0a12181a, 0xc3e3e023, 0xcce0ec2c, 0x8d818c0d, 0x8fb3bc3f, + 0x86929416, 0x4b73783b, 0x4c505c1c, 0x82a2a022, 0x81a1a021, 0x43636023, 0x03232023, 0x4d414c0d, + 0xc8c0c808, 0x8e929c1e, 0x8c909c1c, 0x0a32383a, 0x0c000c0c, 0x0e222c2e, 0x8ab2b83a, 0x4e626c2e, + 0x8f939c1f, 0x4a52581a, 0xc2f2f032, 0x82929012, 0xc3f3f033, 0x49414809, 0x48707838, 0xccc0cc0c, + 0x05111415, 0xcbf3f83b, 0x40707030, 0x45717435, 0x4f737c3f, 0x05313435, 0x00101010, 0x03030003, + 0x44606424, 0x4d616c2d, 0xc6c2c406, 0x44707434, 0xc5d1d415, 0x84b0b434, 0xcae2e82a, 0x09010809, + 0x46727436, 0x09111819, 0xcef2fc3e, 0x40404000, 0x02121012, 0xc0e0e020, 0x8db1bc3d, 0x05010405, + 0xcaf2f83a, 0x01010001, 0xc0f0f030, 0x0a22282a, 0x4e525c1e, 0x89a1a829, 0x46525416, 0x43434003, + 0x85818405, 0x04101414, 0x89818809, 0x8b93981b, 0x80b0b030, 0xc5e1e425, 0x48404808, 0x49717839, + 0x87939417, 0xccf0fc3c, 0x0e121c1e, 0x82828002, 0x01212021, 0x8c808c0c, 0x0b13181b, 0x4f535c1f, + 0x47737437, 0x44505414, 0x82b2b032, 0x0d111c1d, 0x05212425, 0x4f434c0f, 0x00000000, 0x46424406, + 0xcde1ec2d, 0x48505818, 0x42525012, 0xcbe3e82b, 0x4e727c3e, 0xcad2d81a, 0xc9c1c809, 0xcdf1fc3d, + 0x00303030, 0x85919415, 0x45616425, 0x0c303c3c, 0x86b2b436, 0xc4e0e424, 0x8bb3b83b, 0x4c707c3c, + 0x0e020c0e, 0x40505010, 0x09313839, 0x06222426, 0x02323032, 0x84808404, 0x49616829, 0x83939013, + 0x07333437, 0xc7e3e427, 0x04202424, 0x84a0a424, 0xcbc3c80b, 0x43535013, 0x0a02080a, 0x87838407, + 0xc9d1d819, 0x4c404c0c, 0x83838003, 0x8f838c0f, 0xcec2cc0e, 0x0b33383b, 0x4a42480a, 0x87b3b437 + }; + + private static readonly uint[] KC = + { + 0x9e3779b9, 0x3c6ef373, 0x78dde6e6, 0xf1bbcdcc, + 0xe3779b99, 0xc6ef3733, 0x8dde6e67, 0x1bbcdccf, + 0x3779b99e, 0x6ef3733c, 0xdde6e678, 0xbbcdccf1, + 0x779b99e3, 0xef3733c6, 0xde6e678d, 0xbcdccf1b + }; + + private int[] wKey; + private bool forEncryption; + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + wKey = CreateWorkingKey(((KeyParameter)parameters).GetKey()); + } + + public virtual string AlgorithmName + { + get { return "SEED"; } + } + + public virtual int GetBlockSize() + { + return BlockSize; + } + + public virtual int ProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + if (wKey == null) + throw new InvalidOperationException("SEED engine not initialised"); + + Check.DataLength(inBuf, inOff, BlockSize, "input buffer too short"); + Check.OutputLength(outBuf, outOff, BlockSize, "output buffer too short"); + + long l = (long)Pack.BE_To_UInt64(inBuf, inOff + 0); + long r = (long)Pack.BE_To_UInt64(inBuf, inOff + 8); + + if (forEncryption) + { + for (int i = 0; i < 16; i++) + { + long nl = r; + + r = l ^ F(wKey[2 * i], wKey[(2 * i) + 1], r); + l = nl; + } + } + else + { + for (int i = 15; i >= 0; i--) + { + long nl = r; + + r = l ^ F(wKey[2 * i], wKey[(2 * i) + 1], r); + l = nl; + } + } + + Pack.UInt64_To_BE((ulong)r, outBuf, outOff + 0); + Pack.UInt64_To_BE((ulong)l, outBuf, outOff + 8); + + return BlockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (wKey == null) + throw new InvalidOperationException("SEED engine not initialised"); + + Check.DataLength(input, BlockSize, "input buffer too short"); + Check.OutputLength(output, BlockSize, "output buffer too short"); + + long l = (long)Pack.BE_To_UInt64(input); + long r = (long)Pack.BE_To_UInt64(input[8..]); + + if (forEncryption) + { + for (int i = 0; i < 16; i++) + { + long nl = r; + + r = l ^ F(wKey[2 * i], wKey[(2 * i) + 1], r); + l = nl; + } + } + else + { + for (int i = 15; i >= 0; i--) + { + long nl = r; + + r = l ^ F(wKey[2 * i], wKey[(2 * i) + 1], r); + l = nl; + } + } + + Pack.UInt64_To_BE((ulong)r, output); + Pack.UInt64_To_BE((ulong)l, output[8..]); + + return BlockSize; + } +#endif + + private int[] CreateWorkingKey(byte[] inKey) + { + if (inKey.Length != 16) + throw new ArgumentException("key size must be 128 bits"); + + int[] key = new int[32]; + long lower = (long)Pack.BE_To_UInt64(inKey, 0); + long upper = (long)Pack.BE_To_UInt64(inKey, 8); + + int key0 = extractW0(lower); + int key1 = extractW1(lower); + int key2 = extractW0(upper); + int key3 = extractW1(upper); + + for (int i = 0; i < 16; i++) + { + key[2 * i] = G(key0 + key2 - (int)KC[i]); + key[2 * i + 1] = G(key1 - key3 + (int)KC[i]); + + if (i % 2 == 0) + { + lower = rotateRight8(lower); + key0 = extractW0(lower); + key1 = extractW1(lower); + } + else + { + upper = rotateLeft8(upper); + key2 = extractW0(upper); + key3 = extractW1(upper); + } + } + + return key; + } + + private int extractW1( + long lVal) + { + return (int)lVal; + } + + private int extractW0( + long lVal) + { + return (int)(lVal >> 32); + } + + private long rotateLeft8( + long x) + { + return (x << 8) | ((long)((ulong) x >> 56)); + } + + private long rotateRight8( + long x) + { + return ((long)((ulong) x >> 8)) | (x << 56); + } + + private int G( + int x) + { + return (int)(SS0[x & 0xff] ^ SS1[(x >> 8) & 0xff] ^ SS2[(x >> 16) & 0xff] ^ SS3[(x >> 24) & 0xff]); + } + + private long F( + int ki0, + int ki1, + long r) + { + int r0 = (int)(r >> 32); + int r1 = (int)r; + int rd1 = phaseCalc2(r0, ki0, r1, ki1); + int rd0 = rd1 + phaseCalc1(r0, ki0, r1, ki1); + + return ((long)rd0 << 32) | (rd1 & 0xffffffffL); + } + + private int phaseCalc1( + int r0, + int ki0, + int r1, + int ki1) + { + return G(G((r0 ^ ki0) ^ (r1 ^ ki1)) + (r0 ^ ki0)); + } + + private int phaseCalc2( + int r0, + int ki0, + int r1, + int ki1) + { + return G(phaseCalc1(r0, ki0, r1, ki1) + G((r0 ^ ki0) ^ (r1 ^ ki1))); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs.meta new file mode 100644 index 00000000..20f4e326 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e755da8b639e8c84d86ad30a0d844389 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs new file mode 100644 index 00000000..63e6dd19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// An implementation of the SEED key wrapper based on RFC 4010/RFC 3394. + ///

+ /// For further details see: http://www.ietf.org/rfc/rfc4010.txt. + /// + public class SeedWrapEngine + : Rfc3394WrapEngine + { + public SeedWrapEngine() + : base(new SeedEngine()) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs.meta new file mode 100644 index 00000000..a94d8c12 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69ade6b85be88c64699697ac1b03a8be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SEEDWrapEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs new file mode 100644 index 00000000..783b4d40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs @@ -0,0 +1,456 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + ///

+ /// SM2 public key encryption engine - based on https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02. + /// + public class SM2Engine + { + public enum Mode + { + C1C2C3, C1C3C2 + } + + private readonly IDigest mDigest; + private readonly Mode mMode; + + private bool mForEncryption; + private ECKeyParameters mECKey; + private ECDomainParameters mECParams; + private int mCurveLength; + private SecureRandom mRandom; + + public SM2Engine() + : this(new SM3Digest()) + { + } + + public SM2Engine(Mode mode) + : this(new SM3Digest(), mode) + { + } + + public SM2Engine(IDigest digest) + : this(digest, Mode.C1C2C3) + { + } + + public SM2Engine(IDigest digest, Mode mode) + { + mDigest = digest; + mMode = mode; + } + + public virtual void Init(bool forEncryption, ICipherParameters param) + { + this.mForEncryption = forEncryption; + + if (forEncryption) + { + ParametersWithRandom rParam = (ParametersWithRandom)param; + + mECKey = (ECKeyParameters)rParam.Parameters; + mECParams = mECKey.Parameters; + + ECPoint s = ((ECPublicKeyParameters)mECKey).Q.Multiply(mECParams.H); + if (s.IsInfinity) + throw new ArgumentException("invalid key: [h]Q at infinity"); + + mRandom = rParam.Random; + } + else + { + mECKey = (ECKeyParameters)param; + mECParams = mECKey.Parameters; + } + + mCurveLength = (mECParams.Curve.FieldSize + 7) / 8; + } + + public virtual byte[] ProcessBlock(byte[] input, int inOff, int inLen) + { + if ((inOff + inLen) > input.Length || inLen == 0) + throw new DataLengthException("input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBlock(input.AsSpan(inOff, inLen)); +#else + if (mForEncryption) + { + return Encrypt(input, inOff, inLen); + } + else + { + return Decrypt(input, inOff, inLen); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual byte[] ProcessBlock(ReadOnlySpan input) + { + if (input.Length == 0) + throw new DataLengthException("input buffer too short"); + + if (mForEncryption) + { + return Encrypt(input); + } + else + { + return Decrypt(input); + } + } +#endif + + protected virtual ECMultiplier CreateBasePointMultiplier() + { + return new FixedPointCombMultiplier(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private byte[] Encrypt(ReadOnlySpan input) + { + byte[] c2 = input.ToArray(); + + ECMultiplier multiplier = CreateBasePointMultiplier(); + + BigInteger k; + ECPoint kPB; + do + { + k = NextK(); + kPB = ((ECPublicKeyParameters)mECKey).Q.Multiply(k).Normalize(); + + Kdf(mDigest, kPB, c2); + } + while (NotEncrypted(c2, input)); + + ECPoint c1P = multiplier.Multiply(mECParams.G, k).Normalize(); + + int c1PEncodedLength = c1P.GetEncodedLength(false); + Span c1 = c1PEncodedLength <= 512 + ? stackalloc byte[c1PEncodedLength] + : new byte[c1PEncodedLength]; + c1P.EncodeTo(false, c1); + + AddFieldElement(mDigest, kPB.AffineXCoord); + mDigest.BlockUpdate(input); + AddFieldElement(mDigest, kPB.AffineYCoord); + + int digestSize = mDigest.GetDigestSize(); + Span c3 = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + mDigest.DoFinal(c3); + + switch (mMode) + { + case Mode.C1C3C2: + return Arrays.Concatenate(c1, c3, c2); + default: + return Arrays.Concatenate(c1, c2, c3); + } + } + + private byte[] Decrypt(ReadOnlySpan input) + { + int c1Length = mCurveLength * 2 + 1; + ECPoint c1P = mECParams.Curve.DecodePoint(input[..c1Length]); + + ECPoint s = c1P.Multiply(mECParams.H); + if (s.IsInfinity) + throw new InvalidCipherTextException("[h]C1 at infinity"); + + c1P = c1P.Multiply(((ECPrivateKeyParameters)mECKey).D).Normalize(); + + int digestSize = mDigest.GetDigestSize(); + int c2Length = input.Length - c1Length - digestSize; + byte[] c2 = new byte[c2Length]; + + if (mMode == Mode.C1C3C2) + { + input[(c1Length + digestSize)..].CopyTo(c2); + } + else + { + input[c1Length..(c1Length + c2Length)].CopyTo(c2); + } + + Kdf(mDigest, c1P, c2); + + AddFieldElement(mDigest, c1P.AffineXCoord); + mDigest.BlockUpdate(c2); + AddFieldElement(mDigest, c1P.AffineYCoord); + + Span c3 = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + mDigest.DoFinal(c3); + + int check = 0; + if (mMode == Mode.C1C3C2) + { + for (int i = 0; i != c3.Length; i++) + { + check |= c3[i] ^ input[c1Length + i]; + } + } + else + { + for (int i = 0; i != c3.Length; i++) + { + check |= c3[i] ^ input[c1Length + c2.Length + i]; + } + } + + c3.Fill(0); + + if (check != 0) + { + Arrays.Fill(c2, 0); + throw new InvalidCipherTextException("invalid cipher text"); + } + + return c2; + } + + private bool NotEncrypted(ReadOnlySpan encData, ReadOnlySpan input) + { + for (int i = 0; i != encData.Length; i++) + { + if (encData[i] != input[i]) + return false; + } + + return true; + } +#else + private byte[] Encrypt(byte[] input, int inOff, int inLen) + { + byte[] c2 = new byte[inLen]; + + Array.Copy(input, inOff, c2, 0, c2.Length); + + ECMultiplier multiplier = CreateBasePointMultiplier(); + + BigInteger k; + ECPoint kPB; + do + { + k = NextK(); + kPB = ((ECPublicKeyParameters)mECKey).Q.Multiply(k).Normalize(); + + Kdf(mDigest, kPB, c2); + } + while (NotEncrypted(c2, input, inOff)); + + ECPoint c1P = multiplier.Multiply(mECParams.G, k).Normalize(); + + byte[] c1 = c1P.GetEncoded(false); + + AddFieldElement(mDigest, kPB.AffineXCoord); + mDigest.BlockUpdate(input, inOff, inLen); + AddFieldElement(mDigest, kPB.AffineYCoord); + + byte[] c3 = DigestUtilities.DoFinal(mDigest); + + switch (mMode) + { + case Mode.C1C3C2: + return Arrays.ConcatenateAll(c1, c3, c2); + default: + return Arrays.ConcatenateAll(c1, c2, c3); + } + } + + private byte[] Decrypt(byte[] input, int inOff, int inLen) + { + byte[] c1 = new byte[mCurveLength * 2 + 1]; + + Array.Copy(input, inOff, c1, 0, c1.Length); + + ECPoint c1P = mECParams.Curve.DecodePoint(c1); + + ECPoint s = c1P.Multiply(mECParams.H); + if (s.IsInfinity) + throw new InvalidCipherTextException("[h]C1 at infinity"); + + c1P = c1P.Multiply(((ECPrivateKeyParameters)mECKey).D).Normalize(); + + int digestSize = mDigest.GetDigestSize(); + byte[] c2 = new byte[inLen - c1.Length - digestSize]; + + if (mMode == Mode.C1C3C2) + { + Array.Copy(input, inOff + c1.Length + digestSize, c2, 0, c2.Length); + } + else + { + Array.Copy(input, inOff + c1.Length, c2, 0, c2.Length); + } + + Kdf(mDigest, c1P, c2); + + AddFieldElement(mDigest, c1P.AffineXCoord); + mDigest.BlockUpdate(c2, 0, c2.Length); + AddFieldElement(mDigest, c1P.AffineYCoord); + + byte[] c3 = DigestUtilities.DoFinal(mDigest); + + int check = 0; + if (mMode == Mode.C1C3C2) + { + for (int i = 0; i != c3.Length; i++) + { + check |= c3[i] ^ input[inOff + c1.Length + i]; + } + } + else + { + for (int i = 0; i != c3.Length; i++) + { + check |= c3[i] ^ input[inOff + c1.Length + c2.Length + i]; + } + } + + Arrays.Fill(c1, 0); + Arrays.Fill(c3, 0); + + if (check != 0) + { + Arrays.Fill(c2, 0); + throw new InvalidCipherTextException("invalid cipher text"); + } + + return c2; + } + + private bool NotEncrypted(byte[] encData, byte[] input, int inOff) + { + for (int i = 0; i != encData.Length; i++) + { + if (encData[i] != input[inOff + i]) + return false; + } + + return true; + } +#endif + + private void Kdf(IDigest digest, ECPoint c1, byte[] encData) + { + int digestSize = digest.GetDigestSize(); + int bufSize = System.Math.Max(4, digestSize); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span buf = bufSize <= 128 + ? stackalloc byte[bufSize] + : new byte[bufSize]; +#else + byte[] buf = new byte[bufSize]; +#endif + int off = 0; + + IMemoable memo = digest as IMemoable; + IMemoable copy = null; + + if (memo != null) + { + AddFieldElement(digest, c1.AffineXCoord); + AddFieldElement(digest, c1.AffineYCoord); + copy = memo.Copy(); + } + + uint ct = 0; + + while (off < encData.Length) + { + if (memo != null) + { + memo.Reset(copy); + } + else + { + AddFieldElement(digest, c1.AffineXCoord); + AddFieldElement(digest, c1.AffineYCoord); + } + + int xorLen = System.Math.Min(digestSize, encData.Length - off); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Pack.UInt32_To_BE(++ct, buf); + digest.BlockUpdate(buf[..4]); + digest.DoFinal(buf); + Xor(encData.AsSpan(off, xorLen), buf); +#else + Pack.UInt32_To_BE(++ct, buf, 0); + digest.BlockUpdate(buf, 0, 4); + digest.DoFinal(buf, 0); + Xor(encData, buf, off, xorLen); +#endif + off += xorLen; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Xor(Span data, ReadOnlySpan kdfOut) + { + for (int i = 0; i != data.Length; i++) + { + data[i] ^= kdfOut[i]; + } + } +#else + private void Xor(byte[] data, byte[] kdfOut, int dOff, int dRemaining) + { + for (int i = 0; i != dRemaining; i++) + { + data[dOff + i] ^= kdfOut[i]; + } + } +#endif + + private BigInteger NextK() + { + int qBitLength = mECParams.N.BitLength; + + BigInteger k; + do + { + k = new BigInteger(qBitLength, mRandom); + } + while (k.SignValue == 0 || k.CompareTo(mECParams.N) >= 0); + + return k; + } + + private void AddFieldElement(IDigest digest, ECFieldElement v) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int encodedLength = v.GetEncodedLength(); + Span p = encodedLength <= 128 + ? stackalloc byte[encodedLength] + : new byte[encodedLength]; + v.EncodeTo(p); + digest.BlockUpdate(p); +#else + byte[] p = v.GetEncoded(); + digest.BlockUpdate(p, 0, p.Length); +#endif + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs.meta new file mode 100644 index 00000000..90eea9ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9c18320ad9da1a74a9f2c28a40df4089 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM2Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs new file mode 100644 index 00000000..8e2622c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs @@ -0,0 +1,215 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// SM4 Block Cipher - SM4 is a 128 bit block cipher with a 128 bit key. + /// + /// The implementation here is based on the document http://eprint.iacr.org/2008/329.pdf + /// by Whitfield Diffie and George Ledin, which is a translation of Prof. LU Shu-wang's original standard. + /// + public class SM4Engine + : IBlockCipher + { + private const int BlockSize = 16; + + private static readonly byte[] Sbox = + { + 0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7, 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05, + 0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3, 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99, + 0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62, + 0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95, 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6, + 0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba, 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8, + 0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b, 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35, + 0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87, + 0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52, 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e, + 0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5, 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1, + 0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55, 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3, + 0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60, 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f, + 0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f, 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51, + 0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f, 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8, + 0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd, 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0, + 0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e, 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84, + 0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20, 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48 + }; + + private static readonly uint[] CK = + { + 0x00070e15, 0x1c232a31, 0x383f464d, 0x545b6269, + 0x70777e85, 0x8c939aa1, 0xa8afb6bd, 0xc4cbd2d9, + 0xe0e7eef5, 0xfc030a11, 0x181f262d, 0x343b4249, + 0x50575e65, 0x6c737a81, 0x888f969d, 0xa4abb2b9, + 0xc0c7ced5, 0xdce3eaf1, 0xf8ff060d, 0x141b2229, + 0x30373e45, 0x4c535a61, 0x686f767d, 0x848b9299, + 0xa0a7aeb5, 0xbcc3cad1, 0xd8dfe6ed, 0xf4fb0209, + 0x10171e25, 0x2c333a41, 0x484f565d, 0x646b7279 + }; + + private static readonly uint[] FK = + { + 0xa3b1bac6, 0x56aa3350, 0x677d9197, 0xb27022dc + }; + + private uint[] rk; + + // non-linear substitution tau. + private static uint tau(uint A) + { + uint b0 = Sbox[A >> 24]; + uint b1 = Sbox[(A >> 16) & 0xFF]; + uint b2 = Sbox[(A >> 8) & 0xFF]; + uint b3 = Sbox[A & 0xFF]; + + return (b0 << 24) | (b1 << 16) | (b2 << 8) | b3; + } + + private static uint L_ap(uint B) + { + return B ^ Integers.RotateLeft(B, 13) ^ Integers.RotateLeft(B, 23); + } + + private uint T_ap(uint Z) + { + return L_ap(tau(Z)); + } + + // Key expansion + private void ExpandKey(bool forEncryption, byte[] key) + { + uint K0 = Pack.BE_To_UInt32(key, 0) ^ FK[0]; + uint K1 = Pack.BE_To_UInt32(key, 4) ^ FK[1]; + uint K2 = Pack.BE_To_UInt32(key, 8) ^ FK[2]; + uint K3 = Pack.BE_To_UInt32(key, 12) ^ FK[3]; + + if (forEncryption) + { + rk[0] = K0 ^ T_ap(K1 ^ K2 ^ K3 ^ CK[0]); + rk[1] = K1 ^ T_ap(K2 ^ K3 ^ rk[0] ^ CK[1]); + rk[2] = K2 ^ T_ap(K3 ^ rk[0] ^ rk[1] ^ CK[2]); + rk[3] = K3 ^ T_ap(rk[0] ^ rk[1] ^ rk[2] ^ CK[3]); + for (int i = 4; i < 32; ++i) + { + rk[i] = rk[i - 4] ^ T_ap(rk[i - 3] ^ rk[i - 2] ^ rk[i - 1] ^ CK[i]); + } + } + else + { + rk[31] = K0 ^ T_ap(K1 ^ K2 ^ K3 ^ CK[0]); + rk[30] = K1 ^ T_ap(K2 ^ K3 ^ rk[31] ^ CK[1]); + rk[29] = K2 ^ T_ap(K3 ^ rk[31] ^ rk[30] ^ CK[2]); + rk[28] = K3 ^ T_ap(rk[31] ^ rk[30] ^ rk[29] ^ CK[3]); + for (int i = 27; i >= 0; --i) + { + rk[i] = rk[i + 4] ^ T_ap(rk[i + 3] ^ rk[i + 2] ^ rk[i + 1] ^ CK[31 - i]); + } + } + } + + // Linear substitution L + private static uint L(uint B) + { + return B ^ Integers.RotateLeft(B, 2) ^ Integers.RotateLeft(B, 10) ^ Integers.RotateLeft(B, 18) ^ Integers.RotateLeft(B, 24); + } + + // Mixer-substitution T + private static uint T(uint Z) + { + return L(tau(Z)); + } + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + KeyParameter keyParameter = parameters as KeyParameter; + if (null == keyParameter) + throw new ArgumentException("invalid parameter passed to SM4 init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters), "parameters"); + + byte[] key = keyParameter.GetKey(); + if (key.Length != 16) + throw new ArgumentException("SM4 requires a 128 bit key", "parameters"); + + if (null == rk) + { + rk = new uint[32]; + } + + ExpandKey(forEncryption, key); + } + + public virtual string AlgorithmName + { + get { return "SM4"; } + } + + public virtual int GetBlockSize() + { + return BlockSize; + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (null == rk) + throw new InvalidOperationException("SM4 not initialised"); + + Check.DataLength(input, inOff, BlockSize, "input buffer too short"); + Check.OutputLength(output, outOff, BlockSize, "output buffer too short"); + + uint X0 = Pack.BE_To_UInt32(input, inOff); + uint X1 = Pack.BE_To_UInt32(input, inOff + 4); + uint X2 = Pack.BE_To_UInt32(input, inOff + 8); + uint X3 = Pack.BE_To_UInt32(input, inOff + 12); + + for (int i = 0; i < 32; i += 4) + { + X0 ^= T(X1 ^ X2 ^ X3 ^ rk[i ]); // F0 + X1 ^= T(X2 ^ X3 ^ X0 ^ rk[i + 1]); // F1 + X2 ^= T(X3 ^ X0 ^ X1 ^ rk[i + 2]); // F2 + X3 ^= T(X0 ^ X1 ^ X2 ^ rk[i + 3]); // F3 + } + + Pack.UInt32_To_BE(X3, output, outOff); + Pack.UInt32_To_BE(X2, output, outOff + 4); + Pack.UInt32_To_BE(X1, output, outOff + 8); + Pack.UInt32_To_BE(X0, output, outOff + 12); + + return BlockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (null == rk) + throw new InvalidOperationException("SM4 not initialised"); + + Check.DataLength(input, BlockSize, "input buffer too short"); + Check.OutputLength(output, BlockSize, "output buffer too short"); + + uint X0 = Pack.BE_To_UInt32(input); + uint X1 = Pack.BE_To_UInt32(input[4..]); + uint X2 = Pack.BE_To_UInt32(input[8..]); + uint X3 = Pack.BE_To_UInt32(input[12..]); + + for (int i = 0; i < 32; i += 4) + { + X0 ^= T(X1 ^ X2 ^ X3 ^ rk[i ]); // F0 + X1 ^= T(X2 ^ X3 ^ X0 ^ rk[i + 1]); // F1 + X2 ^= T(X3 ^ X0 ^ X1 ^ rk[i + 2]); // F2 + X3 ^= T(X0 ^ X1 ^ X2 ^ rk[i + 3]); // F3 + } + + Pack.UInt32_To_BE(X3, output); + Pack.UInt32_To_BE(X2, output[4..]); + Pack.UInt32_To_BE(X1, output[8..]); + Pack.UInt32_To_BE(X0, output[12..]); + + return BlockSize; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs.meta new file mode 100644 index 00000000..61f0ecd9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 48e0155581320e94d9f238d5f3a684f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SM4Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs new file mode 100644 index 00000000..45ec27dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs @@ -0,0 +1,512 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// Implementation of Daniel J. Bernstein's Salsa20 stream cipher, Snuffle 2005 + /// + public class Salsa20Engine + : IStreamCipher + { + public static readonly int DEFAULT_ROUNDS = 20; + + /** Constants */ + private const int StateSize = 16; // 16, 32 bit ints = 64 bytes + + private readonly static uint[] TAU_SIGMA = Pack.LE_To_UInt32(Strings.ToAsciiByteArray("expand 16-byte k" + "expand 32-byte k"), 0, 8); + + internal void PackTauOrSigma(int keyLength, uint[] state, int stateOffset) + { + int tsOff = (keyLength - 16) / 4; + state[stateOffset] = TAU_SIGMA[tsOff]; + state[stateOffset + 1] = TAU_SIGMA[tsOff + 1]; + state[stateOffset + 2] = TAU_SIGMA[tsOff + 2]; + state[stateOffset + 3] = TAU_SIGMA[tsOff + 3]; + } + + protected int rounds; + + /* + * variables to hold the state of the engine + * during encryption and decryption + */ + internal int index = 0; + internal uint[] engineState = new uint[StateSize]; // state + internal uint[] x = new uint[StateSize]; // internal buffer + internal byte[] keyStream = new byte[StateSize * 4]; // expanded state, 64 bytes + internal bool initialised = false; + + /* + * internal counter + */ + private uint cW0, cW1, cW2; + + /// + /// Creates a 20 round Salsa20 engine. + /// + public Salsa20Engine() + : this(DEFAULT_ROUNDS) + { + } + + /// + /// Creates a Salsa20 engine with a specific number of rounds. + /// + /// the number of rounds (must be an even number). + public Salsa20Engine(int rounds) + { + if (rounds <= 0 || (rounds & 1) != 0) + { + throw new ArgumentException("'rounds' must be a positive, even number"); + } + + this.rounds = rounds; + } + + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + /* + * Salsa20 encryption and decryption is completely + * symmetrical, so the 'forEncryption' is + * irrelevant. (Like 90% of stream ciphers) + */ + + ParametersWithIV ivParams = parameters as ParametersWithIV; + if (ivParams == null) + throw new ArgumentException(AlgorithmName + " Init requires an IV", "parameters"); + + byte[] iv = ivParams.GetIV(); + if (iv == null || iv.Length != NonceSize) + throw new ArgumentException(AlgorithmName + " requires exactly " + NonceSize + " bytes of IV"); + + ICipherParameters keyParam = ivParams.Parameters; + if (keyParam == null) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " KeyParameter can not be null for first initialisation"); + + SetKey(null, iv); + } + else if (keyParam is KeyParameter) + { + SetKey(((KeyParameter)keyParam).GetKey(), iv); + } + else + { + throw new ArgumentException(AlgorithmName + " Init parameters must contain a KeyParameter (or null for re-init)"); + } + + Reset(); + initialised = true; + } + + protected virtual int NonceSize + { + get { return 8; } + } + + public virtual string AlgorithmName + { + get + { + string name = "Salsa20"; + if (rounds != DEFAULT_ROUNDS) + { + name += "/" + rounds; + } + return name; + } + } + + public virtual byte ReturnByte( + byte input) + { + if (LimitExceeded()) + { + throw new MaxBytesExceededException("2^70 byte limit per IV; Change IV"); + } + + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + } + + byte output = (byte)(keyStream[index] ^ input); + index = (index + 1) & 63; + + return output; + } + + protected virtual void AdvanceCounter() + { + if (++engineState[8] == 0) + { + ++engineState[9]; + } + } + + public virtual void ProcessBytes( + byte[] inBytes, + int inOff, + int len, + byte[] outBytes, + int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(inBytes, inOff, len, "input buffer too short"); + Check.OutputLength(outBytes, outOff, len, "output buffer too short"); + + if (LimitExceeded((uint)len)) + throw new MaxBytesExceededException("2^70 byte limit per IV would be exceeded; Change IV"); + + for (int i = 0; i < len; i++) + { + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + } + outBytes[i+outOff] = (byte)(keyStream[index]^inBytes[i+inOff]); + index = (index + 1) & 63; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, input.Length, "output buffer too short"); + + if (LimitExceeded((uint)input.Length)) + throw new MaxBytesExceededException("2^70 byte limit per IV would be exceeded; Change IV"); + + for (int i = 0; i < input.Length; i++) + { + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + } + output[i] = (byte)(keyStream[index++] ^ input[i]); + index &= 63; + } + } +#endif + + public virtual void Reset() + { + index = 0; + ResetLimitCounter(); + ResetCounter(); + } + + protected virtual void ResetCounter() + { + engineState[8] = engineState[9] = 0; + } + + protected virtual void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if ((keyBytes.Length != 16) && (keyBytes.Length != 32)) + throw new ArgumentException(AlgorithmName + " requires 128 bit or 256 bit key"); + + int tsOff = (keyBytes.Length - 16) / 4; + engineState[0] = TAU_SIGMA[tsOff]; + engineState[5] = TAU_SIGMA[tsOff + 1]; + engineState[10] = TAU_SIGMA[tsOff + 2]; + engineState[15] = TAU_SIGMA[tsOff + 3]; + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 1, 4); + Pack.LE_To_UInt32(keyBytes, keyBytes.Length - 16, engineState, 11, 4); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 6, 2); + } + + protected virtual void GenerateKeyStream(byte[] output) + { + SalsaCore(rounds, engineState, x); + Pack.UInt32_To_LE(x, output, 0); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void SalsaCore(int rounds, ReadOnlySpan input, Span output) + { + if (input.Length < 16) + throw new ArgumentException(); + if (output.Length < 16) + throw new ArgumentException(); + if (rounds % 2 != 0) + throw new ArgumentException("Number of rounds must be even"); + +#if NETCOREAPP3_0_OR_GREATER + if (Sse41.IsSupported && BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + Vector128 b0, b1, b2, b3; + { + var I = MemoryMarshal.AsBytes(input[..16]); + var t0 = MemoryMarshal.Read>(I[0x00..0x10]); + var t1 = MemoryMarshal.Read>(I[0x10..0x20]); + var t2 = MemoryMarshal.Read>(I[0x20..0x30]); + var t3 = MemoryMarshal.Read>(I[0x30..0x40]); + + var u0 = Sse41.Blend(t0, t2, 0xF0); + var u1 = Sse41.Blend(t1, t3, 0xC3); + var u2 = Sse41.Blend(t0, t2, 0x0F); + var u3 = Sse41.Blend(t1, t3, 0x3C); + + b0 = Sse41.Blend(u0, u1, 0xCC).AsUInt32(); + b1 = Sse41.Blend(u0, u1, 0x33).AsUInt32(); + b2 = Sse41.Blend(u2, u3, 0xCC).AsUInt32(); + b3 = Sse41.Blend(u2, u3, 0x33).AsUInt32(); + } + + var c0 = b0; + var c1 = b1; + var c2 = b2; + var c3 = b3; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound_Sse2(ref c0, ref c3, ref c2, ref c1); + QuarterRound_Sse2(ref c0, ref c1, ref c2, ref c3); + } + + b0 = Sse2.Add(b0, c0); + b1 = Sse2.Add(b1, c1); + b2 = Sse2.Add(b2, c2); + b3 = Sse2.Add(b3, c3); + + { + var t0 = b0.AsUInt16(); + var t1 = b1.AsUInt16(); + var t2 = b2.AsUInt16(); + var t3 = b3.AsUInt16(); + + var u0 = Sse41.Blend(t0, t1, 0xCC); + var u1 = Sse41.Blend(t0, t1, 0x33); + var u2 = Sse41.Blend(t2, t3, 0xCC); + var u3 = Sse41.Blend(t2, t3, 0x33); + + var v0 = Sse41.Blend(u0, u2, 0xF0); + var v1 = Sse41.Blend(u1, u3, 0xC3); + var v2 = Sse41.Blend(u0, u2, 0x0F); + var v3 = Sse41.Blend(u1, u3, 0x3C); + + var X = MemoryMarshal.AsBytes(output[..16]); + MemoryMarshal.Write(X[0x00..0x10], ref v0); + MemoryMarshal.Write(X[0x10..0x20], ref v1); + MemoryMarshal.Write(X[0x20..0x30], ref v2); + MemoryMarshal.Write(X[0x30..0x40], ref v3); + } + return; + } +#endif + + uint x00 = input[ 0]; + uint x01 = input[ 1]; + uint x02 = input[ 2]; + uint x03 = input[ 3]; + uint x04 = input[ 4]; + uint x05 = input[ 5]; + uint x06 = input[ 6]; + uint x07 = input[ 7]; + uint x08 = input[ 8]; + uint x09 = input[ 9]; + uint x10 = input[10]; + uint x11 = input[11]; + uint x12 = input[12]; + uint x13 = input[13]; + uint x14 = input[14]; + uint x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound(ref x00, ref x04, ref x08, ref x12); + QuarterRound(ref x05, ref x09, ref x13, ref x01); + QuarterRound(ref x10, ref x14, ref x02, ref x06); + QuarterRound(ref x15, ref x03, ref x07, ref x11); + + QuarterRound(ref x00, ref x01, ref x02, ref x03); + QuarterRound(ref x05, ref x06, ref x07, ref x04); + QuarterRound(ref x10, ref x11, ref x08, ref x09); + QuarterRound(ref x15, ref x12, ref x13, ref x14); + } + + output[ 0] = x00 + input[ 0]; + output[ 1] = x01 + input[ 1]; + output[ 2] = x02 + input[ 2]; + output[ 3] = x03 + input[ 3]; + output[ 4] = x04 + input[ 4]; + output[ 5] = x05 + input[ 5]; + output[ 6] = x06 + input[ 6]; + output[ 7] = x07 + input[ 7]; + output[ 8] = x08 + input[ 8]; + output[ 9] = x09 + input[ 9]; + output[10] = x10 + input[10]; + output[11] = x11 + input[11]; + output[12] = x12 + input[12]; + output[13] = x13 + input[13]; + output[14] = x14 + input[14]; + output[15] = x15 + input[15]; + } +#else + internal static void SalsaCore(int rounds, uint[] input, uint[] output) + { + if (input.Length < 16) + throw new ArgumentException(); + if (output.Length < 16) + throw new ArgumentException(); + if (rounds % 2 != 0) + throw new ArgumentException("Number of rounds must be even"); + + uint x00 = input[ 0]; + uint x01 = input[ 1]; + uint x02 = input[ 2]; + uint x03 = input[ 3]; + uint x04 = input[ 4]; + uint x05 = input[ 5]; + uint x06 = input[ 6]; + uint x07 = input[ 7]; + uint x08 = input[ 8]; + uint x09 = input[ 9]; + uint x10 = input[10]; + uint x11 = input[11]; + uint x12 = input[12]; + uint x13 = input[13]; + uint x14 = input[14]; + uint x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound(ref x00, ref x04, ref x08, ref x12); + QuarterRound(ref x05, ref x09, ref x13, ref x01); + QuarterRound(ref x10, ref x14, ref x02, ref x06); + QuarterRound(ref x15, ref x03, ref x07, ref x11); + + QuarterRound(ref x00, ref x01, ref x02, ref x03); + QuarterRound(ref x05, ref x06, ref x07, ref x04); + QuarterRound(ref x10, ref x11, ref x08, ref x09); + QuarterRound(ref x15, ref x12, ref x13, ref x14); + } + + output[ 0] = x00 + input[ 0]; + output[ 1] = x01 + input[ 1]; + output[ 2] = x02 + input[ 2]; + output[ 3] = x03 + input[ 3]; + output[ 4] = x04 + input[ 4]; + output[ 5] = x05 + input[ 5]; + output[ 6] = x06 + input[ 6]; + output[ 7] = x07 + input[ 7]; + output[ 8] = x08 + input[ 8]; + output[ 9] = x09 + input[ 9]; + output[10] = x10 + input[10]; + output[11] = x11 + input[11]; + output[12] = x12 + input[12]; + output[13] = x13 + input[13]; + output[14] = x14 + input[14]; + output[15] = x15 + input[15]; + } +#endif + + internal void ResetLimitCounter() + { + cW0 = 0; + cW1 = 0; + cW2 = 0; + } + + internal bool LimitExceeded() + { + if (++cW0 == 0) + { + if (++cW1 == 0) + { + return (++cW2 & 0x20) != 0; // 2^(32 + 32 + 6) + } + } + + return false; + } + + /* + * this relies on the fact len will always be positive. + */ + internal bool LimitExceeded( + uint len) + { + uint old = cW0; + cW0 += len; + if (cW0 < old) + { + if (++cW1 == 0) + { + return (++cW2 & 0x20) != 0; // 2^(32 + 32 + 6) + } + } + + return false; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private static void QuarterRound(ref uint a, ref uint b, ref uint c, ref uint d) + { + b ^= Integers.RotateLeft(a + d, 7); + c ^= Integers.RotateLeft(b + a, 9); + d ^= Integers.RotateLeft(c + b, 13); + a ^= Integers.RotateLeft(d + c, 18); + } + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void QuarterRound_Sse2(ref Vector128 a, ref Vector128 b, ref Vector128 c, + ref Vector128 d) + { + b = Sse2.Xor(b, Rotate_Sse2(Sse2.Add(a, d), 7)); + c = Sse2.Xor(c, Rotate_Sse2(Sse2.Add(b, a), 9)); + d = Sse2.Xor(d, Rotate_Sse2(Sse2.Add(c, b), 13)); + a = Sse2.Xor(a, Rotate_Sse2(Sse2.Add(d, c), 18)); + + b = Sse2.Shuffle(b, 0x93); + c = Sse2.Shuffle(c, 0x4E); + d = Sse2.Shuffle(d, 0x39); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Rotate_Sse2(Vector128 x, byte sl) + { + byte sr = (byte)(32 - sl); + return Sse2.Xor(Sse2.ShiftLeftLogical(x, sl), Sse2.ShiftRightLogical(x, sr)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs.meta new file mode 100644 index 00000000..acf0be64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 45a640781b0ce9e429cc6f2d8cbceadd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/Salsa20Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs new file mode 100644 index 00000000..703d13f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs @@ -0,0 +1,405 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Serpent is a 128-bit 32-round block cipher with variable key lengths, + * including 128, 192 and 256 bit keys conjectured to be at least as + * secure as three-key triple-DES. + *

+ * Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen as a + * candidate algorithm for the NIST AES Quest. + *

+ *

+ * For full details see The Serpent home page + *

+ */ + public sealed class SerpentEngine + : SerpentEngineBase + { + /** + * Expand a user-supplied key material into a session key. + * + * @param key The user-key bytes (multiples of 4) to use. + * @exception ArgumentException + */ + internal override int[] MakeWorkingKey(byte[] key) + { + // + // pad key to 256 bits + // + int[] kPad = new int[16]; + int off = 0; + int length = 0; + + for (off = 0; (off + 4) < key.Length; off += 4) + { + kPad[length++] = (int)Pack.LE_To_UInt32(key, off); + } + + if (off % 4 == 0) + { + kPad[length++] = (int)Pack.LE_To_UInt32(key, off); + if (length < 8) + { + kPad[length] = 1; + } + } + else + { + throw new ArgumentException("key must be a multiple of 4 bytes"); + } + + // + // expand the padded key up to 33 x 128 bits of key material + // + int amount = (ROUNDS + 1) * 4; + int[] w = new int[amount]; + + // + // compute w0 to w7 from w-8 to w-1 + // + for (int i = 8; i < 16; i++) + { + kPad[i] = Integers.RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ PHI ^ (i - 8), 11); + } + + Array.Copy(kPad, 8, w, 0, 8); + + // + // compute w8 to w136 + // + for (int i = 8; i < amount; i++) + { + w[i] = Integers.RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ PHI ^ i, 11); + } + + // + // create the working keys by processing w with the Sbox and IP + // + Sb3(w[0], w[1], w[2], w[3]); + w[0] = X0; w[1] = X1; w[2] = X2; w[3] = X3; + Sb2(w[4], w[5], w[6], w[7]); + w[4] = X0; w[5] = X1; w[6] = X2; w[7] = X3; + Sb1(w[8], w[9], w[10], w[11]); + w[8] = X0; w[9] = X1; w[10] = X2; w[11] = X3; + Sb0(w[12], w[13], w[14], w[15]); + w[12] = X0; w[13] = X1; w[14] = X2; w[15] = X3; + Sb7(w[16], w[17], w[18], w[19]); + w[16] = X0; w[17] = X1; w[18] = X2; w[19] = X3; + Sb6(w[20], w[21], w[22], w[23]); + w[20] = X0; w[21] = X1; w[22] = X2; w[23] = X3; + Sb5(w[24], w[25], w[26], w[27]); + w[24] = X0; w[25] = X1; w[26] = X2; w[27] = X3; + Sb4(w[28], w[29], w[30], w[31]); + w[28] = X0; w[29] = X1; w[30] = X2; w[31] = X3; + Sb3(w[32], w[33], w[34], w[35]); + w[32] = X0; w[33] = X1; w[34] = X2; w[35] = X3; + Sb2(w[36], w[37], w[38], w[39]); + w[36] = X0; w[37] = X1; w[38] = X2; w[39] = X3; + Sb1(w[40], w[41], w[42], w[43]); + w[40] = X0; w[41] = X1; w[42] = X2; w[43] = X3; + Sb0(w[44], w[45], w[46], w[47]); + w[44] = X0; w[45] = X1; w[46] = X2; w[47] = X3; + Sb7(w[48], w[49], w[50], w[51]); + w[48] = X0; w[49] = X1; w[50] = X2; w[51] = X3; + Sb6(w[52], w[53], w[54], w[55]); + w[52] = X0; w[53] = X1; w[54] = X2; w[55] = X3; + Sb5(w[56], w[57], w[58], w[59]); + w[56] = X0; w[57] = X1; w[58] = X2; w[59] = X3; + Sb4(w[60], w[61], w[62], w[63]); + w[60] = X0; w[61] = X1; w[62] = X2; w[63] = X3; + Sb3(w[64], w[65], w[66], w[67]); + w[64] = X0; w[65] = X1; w[66] = X2; w[67] = X3; + Sb2(w[68], w[69], w[70], w[71]); + w[68] = X0; w[69] = X1; w[70] = X2; w[71] = X3; + Sb1(w[72], w[73], w[74], w[75]); + w[72] = X0; w[73] = X1; w[74] = X2; w[75] = X3; + Sb0(w[76], w[77], w[78], w[79]); + w[76] = X0; w[77] = X1; w[78] = X2; w[79] = X3; + Sb7(w[80], w[81], w[82], w[83]); + w[80] = X0; w[81] = X1; w[82] = X2; w[83] = X3; + Sb6(w[84], w[85], w[86], w[87]); + w[84] = X0; w[85] = X1; w[86] = X2; w[87] = X3; + Sb5(w[88], w[89], w[90], w[91]); + w[88] = X0; w[89] = X1; w[90] = X2; w[91] = X3; + Sb4(w[92], w[93], w[94], w[95]); + w[92] = X0; w[93] = X1; w[94] = X2; w[95] = X3; + Sb3(w[96], w[97], w[98], w[99]); + w[96] = X0; w[97] = X1; w[98] = X2; w[99] = X3; + Sb2(w[100], w[101], w[102], w[103]); + w[100] = X0; w[101] = X1; w[102] = X2; w[103] = X3; + Sb1(w[104], w[105], w[106], w[107]); + w[104] = X0; w[105] = X1; w[106] = X2; w[107] = X3; + Sb0(w[108], w[109], w[110], w[111]); + w[108] = X0; w[109] = X1; w[110] = X2; w[111] = X3; + Sb7(w[112], w[113], w[114], w[115]); + w[112] = X0; w[113] = X1; w[114] = X2; w[115] = X3; + Sb6(w[116], w[117], w[118], w[119]); + w[116] = X0; w[117] = X1; w[118] = X2; w[119] = X3; + Sb5(w[120], w[121], w[122], w[123]); + w[120] = X0; w[121] = X1; w[122] = X2; w[123] = X3; + Sb4(w[124], w[125], w[126], w[127]); + w[124] = X0; w[125] = X1; w[126] = X2; w[127] = X3; + Sb3(w[128], w[129], w[130], w[131]); + w[128] = X0; w[129] = X1; w[130] = X2; w[131] = X3; + + return w; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void EncryptBlock(ReadOnlySpan input, Span output) + { + X0 = (int)Pack.LE_To_UInt32(input); + X1 = (int)Pack.LE_To_UInt32(input[4..]); + X2 = (int)Pack.LE_To_UInt32(input[8..]); + X3 = (int)Pack.LE_To_UInt32(input[12..]); + + Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT(); + Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT(); + Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT(); + Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT(); + Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT(); + Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT(); + Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT(); + Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT(); + Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT(); + Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT(); + Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT(); + Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT(); + Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT(); + Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT(); + Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT(); + Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT(); + Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT(); + Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT(); + Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT(); + Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT(); + Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT(); + Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT(); + Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT(); + Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT(); + Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT(); + Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT(); + Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT(); + Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT(); + Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT(); + Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT(); + Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT(); + Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3); + + Pack.UInt32_To_LE((uint)(wKey[128] ^ X0), output); + Pack.UInt32_To_LE((uint)(wKey[129] ^ X1), output[4..]); + Pack.UInt32_To_LE((uint)(wKey[130] ^ X2), output[8..]); + Pack.UInt32_To_LE((uint)(wKey[131] ^ X3), output[12..]); + } + + internal override void DecryptBlock(ReadOnlySpan input, Span output) + { + X0 = wKey[128] ^ (int)Pack.LE_To_UInt32(input); + X1 = wKey[129] ^ (int)Pack.LE_To_UInt32(input[4..]); + X2 = wKey[130] ^ (int)Pack.LE_To_UInt32(input[8..]); + X3 = wKey[131] ^ (int)Pack.LE_To_UInt32(input[12..]); + + Ib7(X0, X1, X2, X3); + X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7]; + InverseLT(); Ib0(X0, X1, X2, X3); + + Pack.UInt32_To_LE((uint)(X0 ^ wKey[0]), output); + Pack.UInt32_To_LE((uint)(X1 ^ wKey[1]), output[4..]); + Pack.UInt32_To_LE((uint)(X2 ^ wKey[2]), output[8..]); + Pack.UInt32_To_LE((uint)(X3 ^ wKey[3]), output[12..]); + } +#else + internal override void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + X0 = (int)Pack.LE_To_UInt32(input, inOff); + X1 = (int)Pack.LE_To_UInt32(input, inOff + 4); + X2 = (int)Pack.LE_To_UInt32(input, inOff + 8); + X3 = (int)Pack.LE_To_UInt32(input, inOff + 12); + + Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT(); + Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT(); + Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT(); + Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT(); + Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT(); + Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT(); + Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT(); + Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT(); + Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT(); + Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT(); + Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT(); + Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT(); + Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT(); + Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT(); + Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT(); + Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT(); + Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT(); + Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT(); + Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT(); + Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT(); + Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT(); + Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT(); + Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT(); + Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT(); + Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT(); + Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT(); + Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT(); + Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT(); + Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT(); + Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT(); + Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT(); + Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3); + + Pack.UInt32_To_LE((uint)(wKey[128] ^ X0), output, outOff); + Pack.UInt32_To_LE((uint)(wKey[129] ^ X1), output, outOff + 4); + Pack.UInt32_To_LE((uint)(wKey[130] ^ X2), output, outOff + 8); + Pack.UInt32_To_LE((uint)(wKey[131] ^ X3), output, outOff + 12); + } + + internal override void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + X0 = wKey[128] ^ (int)Pack.LE_To_UInt32(input, inOff); + X1 = wKey[129] ^ (int)Pack.LE_To_UInt32(input, inOff + 4); + X2 = wKey[130] ^ (int)Pack.LE_To_UInt32(input, inOff + 8); + X3 = wKey[131] ^ (int)Pack.LE_To_UInt32(input, inOff + 12); + + Ib7(X0, X1, X2, X3); + X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7]; + InverseLT(); Ib0(X0, X1, X2, X3); + + Pack.UInt32_To_LE((uint)(X0 ^ wKey[0]), output, outOff); + Pack.UInt32_To_LE((uint)(X1 ^ wKey[1]), output, outOff + 4); + Pack.UInt32_To_LE((uint)(X2 ^ wKey[2]), output, outOff + 8); + Pack.UInt32_To_LE((uint)(X3 ^ wKey[3]), output, outOff + 12); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs.meta new file mode 100644 index 00000000..c23e834d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ac17de8597ec6214f8cdd5d47aa35e13 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs new file mode 100644 index 00000000..8166a7e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs @@ -0,0 +1,491 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public abstract class SerpentEngineBase + : IBlockCipher + { + protected static readonly int BlockSize = 16; + + internal const int ROUNDS = 32; + internal const int PHI = unchecked((int)0x9E3779B9); // (sqrt(5) - 1) * 2**31 + + protected bool encrypting; + protected int[] wKey; + + protected int X0, X1, X2, X3; // registers + + internal SerpentEngineBase() + { + } + + /** + * initialise a Serpent cipher. + * + * @param encrypting whether or not we are for encryption. + * @param params the parameters required to set up the cipher. + * @throws IllegalArgumentException if the params argument is + * inappropriate. + */ + public virtual void Init(bool encrypting, ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("invalid parameter passed to " + AlgorithmName + " init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.encrypting = encrypting; + this.wKey = MakeWorkingKey(((KeyParameter)parameters).GetKey()); + } + + public virtual string AlgorithmName + { + get { return "Serpent"; } + } + + public virtual int GetBlockSize() + { + return BlockSize; + } + + /** + * Process one block of input from the array in and write it to + * the out array. + * + * @param in the array containing the input data. + * @param inOff offset into the in array the data starts at. + * @param out the array the output data will be copied into. + * @param outOff the offset into the out array the output will start at. + * @return the number of bytes processed and produced. + * @throws DataLengthException if there isn't enough data in in, or + * space in out. + * @throws IllegalStateException if the cipher isn't initialised. + */ + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (wKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, inOff, BlockSize, "input buffer too short"); + Check.OutputLength(output, outOff, BlockSize, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (encrypting) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (encrypting) + { + EncryptBlock(input, inOff, output, outOff); + } + else + { + DecryptBlock(input, inOff, output, outOff); + } +#endif + + return BlockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (wKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, BlockSize, "input buffer too short"); + Check.OutputLength(output, BlockSize, "output buffer too short"); + + if (encrypting) + { + EncryptBlock(input, output); + } + else + { + DecryptBlock(input, output); + } + + return BlockSize; + } +#endif + + /* + * The sboxes below are based on the work of Brian Gladman and + * Sam Simpson, whose original notice appears below. + *

+ * For further details see: + * http://fp.gladman.plus.com/cryptography_technology/serpent/ + *

+ */ + + /* Partially optimised Serpent S Box boolean functions derived */ + /* using a recursive descent analyser but without a full search */ + /* of all subtrees. This set of S boxes is the result of work */ + /* by Sam Simpson and Brian Gladman using the spare time on a */ + /* cluster of high capacity servers to search for S boxes with */ + /* this customised search engine. There are now an average of */ + /* 15.375 terms per S box. */ + /* */ + /* Copyright: Dr B. R Gladman (gladman@seven77.demon.co.uk) */ + /* and Sam Simpson (s.simpson@mia.co.uk) */ + /* 17th December 1998 */ + /* */ + /* We hereby give permission for information in this file to be */ + /* used freely subject only to acknowledgement of its origin. */ + + /* + * S0 - { 3, 8,15, 1,10, 6, 5,11,14,13, 4, 2, 7, 0, 9,12 } - 15 terms. + */ + protected void Sb0(int a, int b, int c, int d) + { + int t1 = a ^ d; + int t3 = c ^ t1; + int t4 = b ^ t3; + X3 = (a & d) ^ t4; + int t7 = a ^ (b & t1); + X2 = t4 ^ (c | t7); + int t12 = X3 & (t3 ^ t7); + X1 = (~t3) ^ t12; + X0 = t12 ^ (~t7); + } + + /** + * InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms. + */ + protected void Ib0(int a, int b, int c, int d) + { + int t1 = ~a; + int t2 = a ^ b; + int t4 = d ^ (t1 | t2); + int t5 = c ^ t4; + X2 = t2 ^ t5; + int t8 = t1 ^ (d & t2); + X1 = t4 ^ (X2 & t8); + X3 = (a & t4) ^ (t5 | X1); + X0 = X3 ^ (t5 ^ t8); + } + + /** + * S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms. + */ + protected void Sb1(int a, int b, int c, int d) + { + int t2 = b ^ (~a); + int t5 = c ^ (a | t2); + X2 = d ^ t5; + int t7 = b ^ (d | t2); + int t8 = t2 ^ X2; + X3 = t8 ^ (t5 & t7); + int t11 = t5 ^ t7; + X1 = X3 ^ t11; + X0 = t5 ^ (t8 & t11); + } + + /** + * InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps. + */ + protected void Ib1(int a, int b, int c, int d) + { + int t1 = b ^ d; + int t3 = a ^ (b & t1); + int t4 = t1 ^ t3; + X3 = c ^ t4; + int t7 = b ^ (t1 & t3); + int t8 = X3 | t7; + X1 = t3 ^ t8; + int t10 = ~X1; + int t11 = X3 ^ t7; + X0 = t10 ^ t11; + X2 = t4 ^ (t10 | t11); + } + + /** + * S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms. + */ + protected void Sb2(int a, int b, int c, int d) + { + int t1 = ~a; + int t2 = b ^ d; + int t3 = c & t1; + X0 = t2 ^ t3; + int t5 = c ^ t1; + int t6 = c ^ X0; + int t7 = b & t6; + X3 = t5 ^ t7; + X2 = a ^ ((d | t7) & (X0 | t5)); + X1 = (t2 ^ X3) ^ (X2 ^ (d | t1)); + } + + /** + * InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps. + */ + protected void Ib2(int a, int b, int c, int d) + { + int t1 = b ^ d; + int t2 = ~t1; + int t3 = a ^ c; + int t4 = c ^ t1; + int t5 = b & t4; + X0 = t3 ^ t5; + int t7 = a | t2; + int t8 = d ^ t7; + int t9 = t3 | t8; + X3 = t1 ^ t9; + int t11 = ~t4; + int t12 = X0 | X3; + X1 = t11 ^ t12; + X2 = (d & t11) ^ (t3 ^ t12); + } + + /** + * S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms. + */ + protected void Sb3(int a, int b, int c, int d) + { + int t1 = a ^ b; + int t2 = a & c; + int t3 = a | d; + int t4 = c ^ d; + int t5 = t1 & t3; + int t6 = t2 | t5; + X2 = t4 ^ t6; + int t8 = b ^ t3; + int t9 = t6 ^ t8; + int t10 = t4 & t9; + X0 = t1 ^ t10; + int t12 = X2 & X0; + X1 = t9 ^ t12; + X3 = (b | d) ^ (t4 ^ t12); + } + + /** + * InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms + */ + protected void Ib3(int a, int b, int c, int d) + { + int t1 = a | b; + int t2 = b ^ c; + int t3 = b & t2; + int t4 = a ^ t3; + int t5 = c ^ t4; + int t6 = d | t4; + X0 = t2 ^ t6; + int t8 = t2 | t6; + int t9 = d ^ t8; + X2 = t5 ^ t9; + int t11 = t1 ^ t9; + int t12 = X0 & t11; + X3 = t4 ^ t12; + X1 = X3 ^ (X0 ^ t11); + } + + /** + * S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms. + */ + protected void Sb4(int a, int b, int c, int d) + { + int t1 = a ^ d; + int t2 = d & t1; + int t3 = c ^ t2; + int t4 = b | t3; + X3 = t1 ^ t4; + int t6 = ~b; + int t7 = t1 | t6; + X0 = t3 ^ t7; + int t9 = a & X0; + int t10 = t1 ^ t6; + int t11 = t4 & t10; + X2 = t9 ^ t11; + X1 = (a ^ t3) ^ (t10 & X2); + } + + /** + * InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms. + */ + protected void Ib4(int a, int b, int c, int d) + { + int t1 = c | d; + int t2 = a & t1; + int t3 = b ^ t2; + int t4 = a & t3; + int t5 = c ^ t4; + X1 = d ^ t5; + int t7 = ~a; + int t8 = t5 & X1; + X3 = t3 ^ t8; + int t10 = X1 | t7; + int t11 = d ^ t10; + X0 = X3 ^ t11; + X2 = (t3 & t11) ^ (X1 ^ t7); + } + + /** + * S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms. + */ + protected void Sb5(int a, int b, int c, int d) + { + int t1 = ~a; + int t2 = a ^ b; + int t3 = a ^ d; + int t4 = c ^ t1; + int t5 = t2 | t3; + X0 = t4 ^ t5; + int t7 = d & X0; + int t8 = t2 ^ X0; + X1 = t7 ^ t8; + int t10 = t1 | X0; + int t11 = t2 | t7; + int t12 = t3 ^ t10; + X2 = t11 ^ t12; + X3 = (b ^ t7) ^ (X1 & t12); + } + + /** + * InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms. + */ + protected void Ib5(int a, int b, int c, int d) + { + int t1 = ~c; + int t2 = b & t1; + int t3 = d ^ t2; + int t4 = a & t3; + int t5 = b ^ t1; + X3 = t4 ^ t5; + int t7 = b | X3; + int t8 = a & t7; + X1 = t3 ^ t8; + int t10 = a | d; + int t11 = t1 ^ t7; + X0 = t10 ^ t11; + X2 = (b & t10) ^ (t4 | (a ^ c)); + } + + /** + * S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms. + */ + protected void Sb6(int a, int b, int c, int d) + { + int t1 = ~a; + int t2 = a ^ d; + int t3 = b ^ t2; + int t4 = t1 | t2; + int t5 = c ^ t4; + X1 = b ^ t5; + int t7 = t2 | X1; + int t8 = d ^ t7; + int t9 = t5 & t8; + X2 = t3 ^ t9; + int t11 = t5 ^ t8; + X0 = X2 ^ t11; + X3 = (~t5) ^ (t3 & t11); + } + + /** + * InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms. + */ + protected void Ib6(int a, int b, int c, int d) + { + int t1 = ~a; + int t2 = a ^ b; + int t3 = c ^ t2; + int t4 = c | t1; + int t5 = d ^ t4; + X1 = t3 ^ t5; + int t7 = t3 & t5; + int t8 = t2 ^ t7; + int t9 = b | t8; + X3 = t5 ^ t9; + int t11 = b | X3; + X0 = t8 ^ t11; + X2 = (d & t1) ^ (t3 ^ t11); + } + + /** + * S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms. + */ + protected void Sb7(int a, int b, int c, int d) + { + int t1 = b ^ c; + int t2 = c & t1; + int t3 = d ^ t2; + int t4 = a ^ t3; + int t5 = d | t1; + int t6 = t4 & t5; + X1 = b ^ t6; + int t8 = t3 | X1; + int t9 = a & t4; + X3 = t1 ^ t9; + int t11 = t4 ^ t8; + int t12 = X3 & t11; + X2 = t3 ^ t12; + X0 = (~t11) ^ (X3 & X2); + } + + /** + * InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms. + */ + protected void Ib7(int a, int b, int c, int d) + { + int t3 = c | (a & b); + int t4 = d & (a | b); + X3 = t3 ^ t4; + int t6 = ~d; + int t7 = b ^ t4; + int t9 = t7 | (X3 ^ t6); + X1 = a ^ t9; + X0 = (c ^ t7) ^ (d | X1); + X2 = (t3 ^ X1) ^ (X0 ^ (a & X3)); + } + + /** + * Apply the linear transformation to the register set. + */ + protected void LT() + { + int x0 = Integers.RotateLeft(X0, 13); + int x2 = Integers.RotateLeft(X2, 3); + int x1 = X1 ^ x0 ^ x2; + int x3 = X3 ^ x2 ^ x0 << 3; + + X1 = Integers.RotateLeft(x1, 1); + X3 = Integers.RotateLeft(x3, 7); + X0 = Integers.RotateLeft(x0 ^ X1 ^ X3, 5); + X2 = Integers.RotateLeft(x2 ^ X3 ^ (X1 << 7), 22); + } + + /** + * Apply the inverse of the linear transformation to the register set. + */ + protected void InverseLT() + { + int x2 = Integers.RotateRight(X2, 22) ^ X3 ^ (X1 << 7); + int x0 = Integers.RotateRight(X0, 5) ^ X1 ^ X3; + int x3 = Integers.RotateRight(X3, 7); + int x1 = Integers.RotateRight(X1, 1); + X3 = x3 ^ x2 ^ x0 << 3; + X1 = x1 ^ x0 ^ x2; + X2 = Integers.RotateRight(x2, 3); + X0 = Integers.RotateRight(x0, 13); + } + + internal abstract int[] MakeWorkingKey(byte[] key); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal abstract void EncryptBlock(ReadOnlySpan input, Span output); + internal abstract void DecryptBlock(ReadOnlySpan input, Span output); +#else + internal abstract void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff); + internal abstract void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs.meta new file mode 100644 index 00000000..f86256ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9268488c378289645a98f18bb453e7f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SerpentEngineBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs new file mode 100644 index 00000000..bc2fefb5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs @@ -0,0 +1,355 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * a class that provides a basic SKIPJACK engine. + */ + public sealed class SkipjackEngine + : IBlockCipher + { + private const int BLOCK_SIZE = 8; + + private static readonly short[] ftable = + { + 0xa3, 0xd7, 0x09, 0x83, 0xf8, 0x48, 0xf6, 0xf4, 0xb3, 0x21, 0x15, 0x78, 0x99, 0xb1, 0xaf, 0xf9, + 0xe7, 0x2d, 0x4d, 0x8a, 0xce, 0x4c, 0xca, 0x2e, 0x52, 0x95, 0xd9, 0x1e, 0x4e, 0x38, 0x44, 0x28, + 0x0a, 0xdf, 0x02, 0xa0, 0x17, 0xf1, 0x60, 0x68, 0x12, 0xb7, 0x7a, 0xc3, 0xe9, 0xfa, 0x3d, 0x53, + 0x96, 0x84, 0x6b, 0xba, 0xf2, 0x63, 0x9a, 0x19, 0x7c, 0xae, 0xe5, 0xf5, 0xf7, 0x16, 0x6a, 0xa2, + 0x39, 0xb6, 0x7b, 0x0f, 0xc1, 0x93, 0x81, 0x1b, 0xee, 0xb4, 0x1a, 0xea, 0xd0, 0x91, 0x2f, 0xb8, + 0x55, 0xb9, 0xda, 0x85, 0x3f, 0x41, 0xbf, 0xe0, 0x5a, 0x58, 0x80, 0x5f, 0x66, 0x0b, 0xd8, 0x90, + 0x35, 0xd5, 0xc0, 0xa7, 0x33, 0x06, 0x65, 0x69, 0x45, 0x00, 0x94, 0x56, 0x6d, 0x98, 0x9b, 0x76, + 0x97, 0xfc, 0xb2, 0xc2, 0xb0, 0xfe, 0xdb, 0x20, 0xe1, 0xeb, 0xd6, 0xe4, 0xdd, 0x47, 0x4a, 0x1d, + 0x42, 0xed, 0x9e, 0x6e, 0x49, 0x3c, 0xcd, 0x43, 0x27, 0xd2, 0x07, 0xd4, 0xde, 0xc7, 0x67, 0x18, + 0x89, 0xcb, 0x30, 0x1f, 0x8d, 0xc6, 0x8f, 0xaa, 0xc8, 0x74, 0xdc, 0xc9, 0x5d, 0x5c, 0x31, 0xa4, + 0x70, 0x88, 0x61, 0x2c, 0x9f, 0x0d, 0x2b, 0x87, 0x50, 0x82, 0x54, 0x64, 0x26, 0x7d, 0x03, 0x40, + 0x34, 0x4b, 0x1c, 0x73, 0xd1, 0xc4, 0xfd, 0x3b, 0xcc, 0xfb, 0x7f, 0xab, 0xe6, 0x3e, 0x5b, 0xa5, + 0xad, 0x04, 0x23, 0x9c, 0x14, 0x51, 0x22, 0xf0, 0x29, 0x79, 0x71, 0x7e, 0xff, 0x8c, 0x0e, 0xe2, + 0x0c, 0xef, 0xbc, 0x72, 0x75, 0x6f, 0x37, 0xa1, 0xec, 0xd3, 0x8e, 0x62, 0x8b, 0x86, 0x10, 0xe8, + 0x08, 0x77, 0x11, 0xbe, 0x92, 0x4f, 0x24, 0xc5, 0x32, 0x36, 0x9d, 0xcf, 0xf3, 0xa6, 0xbb, 0xac, + 0x5e, 0x6c, 0xa9, 0x13, 0x57, 0x25, 0xb5, 0xe3, 0xbd, 0xa8, 0x3a, 0x01, 0x05, 0x59, 0x2a, 0x46 + }; + + private int[] key0, key1, key2, key3; + private bool encrypting; + + /** + * initialise a SKIPJACK cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to SKIPJACK init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + byte[] keyBytes = keyParameter.GetKey(); + + this.encrypting = forEncryption; + this.key0 = new int[32]; + this.key1 = new int[32]; + this.key2 = new int[32]; + this.key3 = new int[32]; + + // + // expand the key to 128 bytes in 4 parts (saving us a modulo, multiply + // and an addition). + // + for (int i = 0; i < 32; i++) + { + key0[i] = keyBytes[(i * 4 + 0) % 10]; + key1[i] = keyBytes[(i * 4 + 1) % 10]; + key2[i] = keyBytes[(i * 4 + 2) % 10]; + key3[i] = keyBytes[(i * 4 + 3) % 10]; + } + } + + public string AlgorithmName + { + get { return "SKIPJACK"; } + } + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (key1 == null) + throw new InvalidOperationException("SKIPJACK engine not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (encrypting) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (encrypting) + { + EncryptBlock(input, inOff, output, outOff); + } + else + { + DecryptBlock(input, inOff, output, outOff); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (key1 == null) + throw new InvalidOperationException("SKIPJACK engine not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (encrypting) + { + EncryptBlock(input, output); + } + else + { + DecryptBlock(input, output); + } + + return BLOCK_SIZE; + } +#endif + + /** + * The G permutation + */ + private int G( + int k, + int w) + { + int g1, g2, g3, g4, g5, g6; + + g1 = (w >> 8) & 0xff; + g2 = w & 0xff; + + g3 = ftable[g2 ^ key0[k]] ^ g1; + g4 = ftable[g3 ^ key1[k]] ^ g2; + g5 = ftable[g4 ^ key2[k]] ^ g3; + g6 = ftable[g5 ^ key3[k]] ^ g4; + + return ((g5 << 8) + g6); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + int w1 = (input[0] << 8) + (input[1] & 0xff); + int w2 = (input[2] << 8) + (input[3] & 0xff); + int w3 = (input[4] << 8) + (input[5] & 0xff); + int w4 = (input[6] << 8) + (input[7] & 0xff); + + int k = 0; + + for (int t = 0; t < 2; t++) + { + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w2; + w2 = G(k, w1); + w1 = w2 ^ tmp ^ (k + 1); + k++; + } + + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w1 ^ w2 ^ (k + 1); + w2 = G(k, w1); + w1 = tmp; + k++; + } + } + + output[0] = (byte)((w1 >> 8)); + output[1] = (byte)(w1); + output[2] = (byte)((w2 >> 8)); + output[3] = (byte)(w2); + output[4] = (byte)((w3 >> 8)); + output[5] = (byte)(w3); + output[6] = (byte)((w4 >> 8)); + output[7] = (byte)(w4); + + return BLOCK_SIZE; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + int w2 = (input[0] << 8) + (input[1] & 0xff); + int w1 = (input[2] << 8) + (input[3] & 0xff); + int w4 = (input[4] << 8) + (input[5] & 0xff); + int w3 = (input[6] << 8) + (input[7] & 0xff); + + int k = 31; + + for (int t = 0; t < 2; t++) + { + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w2; + w2 = H(k, w1); + w1 = w2 ^ tmp ^ (k + 1); + k--; + } + + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w1 ^ w2 ^ (k + 1); + w2 = H(k, w1); + w1 = tmp; + k--; + } + } + + output[0] = (byte)((w2 >> 8)); + output[1] = (byte)(w2); + output[2] = (byte)((w1 >> 8)); + output[3] = (byte)(w1); + output[4] = (byte)((w4 >> 8)); + output[5] = (byte)(w4); + output[6] = (byte)((w3 >> 8)); + output[7] = (byte)(w3); + + return BLOCK_SIZE; + } + +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int w1 = (input[inOff + 0] << 8) + (input[inOff + 1] & 0xff); + int w2 = (input[inOff + 2] << 8) + (input[inOff + 3] & 0xff); + int w3 = (input[inOff + 4] << 8) + (input[inOff + 5] & 0xff); + int w4 = (input[inOff + 6] << 8) + (input[inOff + 7] & 0xff); + + int k = 0; + + for (int t = 0; t < 2; t++) + { + for(int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w2; + w2 = G(k, w1); + w1 = w2 ^ tmp ^ (k + 1); + k++; + } + + for(int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w1 ^ w2 ^ (k + 1); + w2 = G(k, w1); + w1 = tmp; + k++; + } + } + + outBytes[outOff + 0] = (byte)((w1 >> 8)); + outBytes[outOff + 1] = (byte)(w1); + outBytes[outOff + 2] = (byte)((w2 >> 8)); + outBytes[outOff + 3] = (byte)(w2); + outBytes[outOff + 4] = (byte)((w3 >> 8)); + outBytes[outOff + 5] = (byte)(w3); + outBytes[outOff + 6] = (byte)((w4 >> 8)); + outBytes[outOff + 7] = (byte)(w4); + + return BLOCK_SIZE; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + int w2 = (input[inOff + 0] << 8) + (input[inOff + 1] & 0xff); + int w1 = (input[inOff + 2] << 8) + (input[inOff + 3] & 0xff); + int w4 = (input[inOff + 4] << 8) + (input[inOff + 5] & 0xff); + int w3 = (input[inOff + 6] << 8) + (input[inOff + 7] & 0xff); + + int k = 31; + + for (int t = 0; t < 2; t++) + { + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w2; + w2 = H(k, w1); + w1 = w2 ^ tmp ^ (k + 1); + k--; + } + + for (int i = 0; i < 8; i++) + { + int tmp = w4; + w4 = w3; + w3 = w1 ^ w2 ^ (k + 1); + w2 = H(k, w1); + w1 = tmp; + k--; + } + } + + outBytes[outOff + 0] = (byte)((w2 >> 8)); + outBytes[outOff + 1] = (byte)(w2); + outBytes[outOff + 2] = (byte)((w1 >> 8)); + outBytes[outOff + 3] = (byte)(w1); + outBytes[outOff + 4] = (byte)((w4 >> 8)); + outBytes[outOff + 5] = (byte)(w4); + outBytes[outOff + 6] = (byte)((w3 >> 8)); + outBytes[outOff + 7] = (byte)(w3); + + return BLOCK_SIZE; + } +#endif + + /** + * the inverse of the G permutation. + */ + private int H(int k, int w) + { + int h1 = w & 0xff; + int h2 = (w >> 8) & 0xff; + + int h3 = ftable[h2 ^ key3[k]] ^ h1; + int h4 = ftable[h3 ^ key2[k]] ^ h2; + int h5 = ftable[h4 ^ key1[k]] ^ h3; + int h6 = ftable[h5 ^ key0[k]] ^ h4; + + return (h6 << 8) + h5; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs.meta new file mode 100644 index 00000000..50ff55e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f88729dcc308f2f46a159ba191cad62b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/SkipjackEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs new file mode 100644 index 00000000..2de79e8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs @@ -0,0 +1,209 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * An TEA engine. + */ + public class TeaEngine + : IBlockCipher + { + private const int + rounds = 32, + block_size = 8; +// key_size = 16, + + private const uint + delta = 0x9E3779B9, + d_sum = 0xC6EF3720; // sum on decrypt + + /* + * the expanded key array of 4 subkeys + */ + private uint _a, _b, _c, _d; + private bool _initialised; + private bool _forEncryption; + + /** + * Create an instance of the TEA encryption algorithm + * and set some defaults + */ + public TeaEngine() + { + _initialised = false; + } + + public virtual string AlgorithmName + { + get { return "TEA"; } + } + + public virtual int GetBlockSize() + { + return block_size; + } + + /** + * initialise + * + * @param forEncryption whether or not we are for encryption. + * @param params the parameters required to set up the cipher. + * @exception ArgumentException if the params argument is + * inappropriate. + */ + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + { + throw new ArgumentException("invalid parameter passed to TEA init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + _forEncryption = forEncryption; + _initialised = true; + + SetKey(keyParameter.GetKey()); + } + + public virtual int ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(inBytes, inOff, block_size, "input buffer too short"); + Check.OutputLength(outBytes, outOff, block_size, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return _forEncryption + ? EncryptBlock(inBytes.AsSpan(inOff), outBytes.AsSpan(outOff)) + : DecryptBlock(inBytes.AsSpan(inOff), outBytes.AsSpan(outOff)); +#else + return _forEncryption + ? EncryptBlock(inBytes, inOff, outBytes, outOff) + : DecryptBlock(inBytes, inOff, outBytes, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, block_size, "input buffer too short"); + Check.OutputLength(output, block_size, "output buffer too short"); + + return _forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * Re-key the cipher. + * + * @param key the key to be used + */ + private void SetKey(byte[] key) + { + _a = Pack.BE_To_UInt32(key, 0); + _b = Pack.BE_To_UInt32(key, 4); + _c = Pack.BE_To_UInt32(key, 8); + _d = Pack.BE_To_UInt32(key, 12); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(input); + uint v1 = Pack.BE_To_UInt32(input[4..]); + + uint sum = 0; + + for (int i = 0; i != rounds; i++) + { + sum += delta; + v0 += ((v1 << 4) + _a) ^ (v1 + sum) ^ ((v1 >> 5) + _b); + v1 += ((v0 << 4) + _c) ^ (v0 + sum) ^ ((v0 >> 5) + _d); + } + + Pack.UInt32_To_BE(v0, output); + Pack.UInt32_To_BE(v1, output[4..]); + + return block_size; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(input); + uint v1 = Pack.BE_To_UInt32(input[4..]); + + uint sum = d_sum; + + for (int i = 0; i != rounds; i++) + { + v1 -= ((v0 << 4) + _c) ^ (v0 + sum) ^ ((v0 >> 5) + _d); + v0 -= ((v1 << 4) + _a) ^ (v1 + sum) ^ ((v1 >> 5) + _b); + sum -= delta; + } + + Pack.UInt32_To_BE(v0, output); + Pack.UInt32_To_BE(v1, output[4..]); + + return block_size; + } +#else + private int EncryptBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(inBytes, inOff); + uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); + + uint sum = 0; + + for (int i = 0; i != rounds; i++) + { + sum += delta; + v0 += ((v1 << 4) + _a) ^ (v1 + sum) ^ ((v1 >> 5) + _b); + v1 += ((v0 << 4) + _c) ^ (v0 + sum) ^ ((v0 >> 5) + _d); + } + + Pack.UInt32_To_BE(v0, outBytes, outOff); + Pack.UInt32_To_BE(v1, outBytes, outOff + 4); + + return block_size; + } + + private int DecryptBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(inBytes, inOff); + uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); + + uint sum = d_sum; + + for (int i = 0; i != rounds; i++) + { + v1 -= ((v0 << 4) + _c) ^ (v0 + sum) ^ ((v0 >> 5) + _d); + v0 -= ((v1 << 4) + _a) ^ (v1 + sum) ^ ((v1 >> 5) + _b); + sum -= delta; + } + + Pack.UInt32_To_BE(v0, outBytes, outOff); + Pack.UInt32_To_BE(v1, outBytes, outOff + 4); + + return block_size; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs.meta new file mode 100644 index 00000000..3d054f08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e32fc12bef50d324583779df69fbbec7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TEAEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs new file mode 100644 index 00000000..9be30b2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs @@ -0,0 +1,1430 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// Implementation of the Threefish tweakable large block cipher in 256, 512 and 1024 bit block + /// sizes. + /// + /// + /// This is the 1.3 version of Threefish defined in the Skein hash function submission to the NIST + /// SHA-3 competition in October 2010. + ///

+ /// Threefish was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir + /// Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker. + ///

+ /// This implementation inlines all round functions, unrolls 8 rounds, and uses 1.2k of static tables + /// to speed up key schedule injection.
+ /// 2 x block size state is retained by each cipher instance. + /// + public class ThreefishEngine + : IBlockCipher + { + ///

+ /// 256 bit block size - Threefish-256 + /// + public const int BLOCKSIZE_256 = 256; + /// + /// 512 bit block size - Threefish-512 + /// + public const int BLOCKSIZE_512 = 512; + /// + /// 1024 bit block size - Threefish-1024 + /// + public const int BLOCKSIZE_1024 = 1024; + + /** + * Size of the tweak in bytes (always 128 bit/16 bytes) + */ + private const int TWEAK_SIZE_BYTES = 16; + private const int TWEAK_SIZE_WORDS = TWEAK_SIZE_BYTES / 8; + + /** + * Rounds in Threefish-256 + */ + private const int ROUNDS_256 = 72; + /** + * Rounds in Threefish-512 + */ + private const int ROUNDS_512 = 72; + /** + * Rounds in Threefish-1024 + */ + private const int ROUNDS_1024 = 80; + + /** + * Max rounds of any of the variants + */ + private const int MAX_ROUNDS = ROUNDS_1024; + + /** + * Key schedule parity constant + */ + private const ulong C_240 = 0x1BD11BDAA9FC1A22L; + + /* Pre-calculated modulo arithmetic tables for key schedule lookups */ + private static readonly int[] MOD9 = new int[MAX_ROUNDS]; + private static readonly int[] MOD17 = new int[MOD9.Length]; + private static readonly int[] MOD5 = new int[MOD9.Length]; + private static readonly int[] MOD3 = new int[MOD9.Length]; + + static ThreefishEngine() + { + for (int i = 0; i < MOD9.Length; i++) + { + MOD17[i] = i % 17; + MOD9[i] = i % 9; + MOD5[i] = i % 5; + MOD3[i] = i % 3; + } + } + + /** + * Block size in bytes + */ + private readonly int blocksizeBytes; + + /** + * Block size in 64 bit words + */ + private readonly int blocksizeWords; + + /** + * Buffer for byte oriented processBytes to call internal word API + */ + private readonly ulong[] currentBlock; + + /** + * Tweak bytes (2 byte t1,t2, calculated t3 and repeat of t1,t2 for modulo free lookup + */ + private readonly ulong[] t = new ulong[5]; + + /** + * Key schedule words + */ + private readonly ulong[] kw; + + /** + * The internal cipher implementation (varies by blocksize) + */ + private readonly ThreefishCipher cipher; + + private bool forEncryption; + + /// + /// Constructs a new Threefish cipher, with a specified block size. + /// + /// the block size in bits, one of , , + /// . + public ThreefishEngine(int blocksizeBits) + { + this.blocksizeBytes = (blocksizeBits / 8); + this.blocksizeWords = (this.blocksizeBytes / 8); + this.currentBlock = new ulong[blocksizeWords]; + + /* + * Provide room for original key words, extended key word and repeat of key words for modulo + * free lookup of key schedule words. + */ + this.kw = new ulong[2 * blocksizeWords + 1]; + + switch (blocksizeBits) + { + case BLOCKSIZE_256: + cipher = new Threefish256Cipher(kw, t); + break; + case BLOCKSIZE_512: + cipher = new Threefish512Cipher(kw, t); + break; + case BLOCKSIZE_1024: + cipher = new Threefish1024Cipher(kw, t); + break; + default: + throw new ArgumentException("Invalid blocksize - Threefish is defined with block size of 256, 512, or 1024 bits"); + } + } + + /// + /// Initialise the engine. + /// + /// Initialise for encryption if true, for decryption if false. + /// an instance of or (to + /// use a 0 tweak) + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + byte[] keyBytes; + byte[] tweakBytes; + + if (parameters is TweakableBlockCipherParameters) + { + TweakableBlockCipherParameters tParams = (TweakableBlockCipherParameters)parameters; + keyBytes = tParams.Key.GetKey(); + tweakBytes = tParams.Tweak; + } + else if (parameters is KeyParameter) + { + keyBytes = ((KeyParameter)parameters).GetKey(); + tweakBytes = null; + } + else + { + throw new ArgumentException("Invalid parameter passed to Threefish init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + ulong[] keyWords = null; + ulong[] tweakWords = null; + + if (keyBytes != null) + { + if (keyBytes.Length != this.blocksizeBytes) + { + throw new ArgumentException("Threefish key must be same size as block (" + blocksizeBytes + + " bytes)"); + } + keyWords = new ulong[blocksizeWords]; + Pack.LE_To_UInt64(keyBytes, 0, keyWords); + } + if (tweakBytes != null) + { + if (tweakBytes.Length != TWEAK_SIZE_BYTES) + { + throw new ArgumentException("Threefish tweak must be " + TWEAK_SIZE_BYTES + " bytes"); + } + tweakWords = new ulong[2]; + Pack.LE_To_UInt64(tweakBytes, 0, tweakWords); + } + Init(forEncryption, keyWords, tweakWords); + } + + /// + /// Initialise the engine, specifying the key and tweak directly. + /// + /// the cipher mode. + /// the words of the key, or null to use the current key. + /// the 2 word (128 bit) tweak, or null to use the current tweak. + internal void Init(bool forEncryption, ulong[] key, ulong[] tweak) + { + this.forEncryption = forEncryption; + if (key != null) + { + SetKey(key); + } + if (tweak != null) + { + SetTweak(tweak); + } + } + + private void SetKey(ulong[] key) + { + if (key.Length != this.blocksizeWords) + { + throw new ArgumentException("Threefish key must be same size as block (" + blocksizeWords + + " words)"); + } + + /* + * Full subkey schedule is deferred to execution to avoid per cipher overhead (10k for 512, + * 20k for 1024). + * + * Key and tweak word sequences are repeated, and static MOD17/MOD9/MOD5/MOD3 calculations + * used, to avoid expensive mod computations during cipher operation. + */ + + ulong knw = C_240; + for (int i = 0; i < blocksizeWords; i++) + { + kw[i] = key[i]; + knw = knw ^ kw[i]; + } + kw[blocksizeWords] = knw; + Array.Copy(kw, 0, kw, blocksizeWords + 1, blocksizeWords); + } + + private void SetTweak(ulong[] tweak) + { + if (tweak.Length != TWEAK_SIZE_WORDS) + { + throw new ArgumentException("Tweak must be " + TWEAK_SIZE_WORDS + " words."); + } + + /* + * Tweak schedule partially repeated to avoid mod computations during cipher operation + */ + t[0] = tweak[0]; + t[1] = tweak[1]; + t[2] = t[0] ^ t[1]; + t[3] = t[0]; + t[4] = t[1]; + } + + public virtual string AlgorithmName + { + get { return "Threefish-" + (blocksizeBytes * 8); } + } + + public virtual int GetBlockSize() + { + return blocksizeBytes; + } + + public virtual int ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(inBytes, inOff, blocksizeBytes, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blocksizeBytes, "output buffer too short"); + + Pack.LE_To_UInt64(inBytes, inOff, currentBlock); + ProcessBlock(this.currentBlock, this.currentBlock); + Pack.UInt64_To_LE(currentBlock, outBytes, outOff); + return blocksizeBytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blocksizeBytes, "input buffer too short"); + Check.OutputLength(output, blocksizeBytes, "output buffer too short"); + + Pack.LE_To_UInt64(input, currentBlock); + ProcessBlock(this.currentBlock, this.currentBlock); + Pack.UInt64_To_LE(currentBlock, output); + return blocksizeBytes; + } +#endif + + /// + /// Process a block of data represented as 64 bit words. + /// + /// the number of 8 byte words processed (which will be the same as the block size). + /// a block sized buffer of words to process. + /// a block sized buffer of words to receive the output of the operation. + /// if either the input or output is not block sized + /// if this engine is not initialised + internal int ProcessBlock(ulong[] inWords, ulong[] outWords) + { + if (kw[blocksizeWords] == 0) + { + throw new InvalidOperationException("Threefish engine not initialised"); + } + + if (inWords.Length != blocksizeWords) + throw new DataLengthException("input buffer too short"); + if (outWords.Length != blocksizeWords) + throw new OutputLengthException("output buffer too short"); + + if (forEncryption) + { + cipher.EncryptBlock(inWords, outWords); + } + else + { + cipher.DecryptBlock(inWords, outWords); + } + + return blocksizeWords; + } + + /** + * Rotate left + xor part of the mix operation. + */ + private static ulong RotlXor(ulong x, int n, ulong xor) + { + return ((x << n) | (x >> (64 - n))) ^ xor; + } + + /** + * Rotate xor + rotate right part of the unmix operation. + */ + private static ulong XorRotr(ulong x, int n, ulong xor) + { + ulong xored = x ^ xor; + return (xored >> n) | (xored << (64 - n)); + } + + private abstract class ThreefishCipher + { + /** + * The extended + repeated tweak words + */ + protected readonly ulong[] t; + /** + * The extended + repeated key words + */ + protected readonly ulong[] kw; + + protected ThreefishCipher(ulong[] kw, ulong[] t) + { + this.kw = kw; + this.t = t; + } + + internal abstract void EncryptBlock(ulong[] block, ulong[] outWords); + + internal abstract void DecryptBlock(ulong[] block, ulong[] outWords); + + } + + private sealed class Threefish256Cipher + : ThreefishCipher + { + /** + * Mix rotation constants defined in Skein 1.3 specification + */ + private const int ROTATION_0_0 = 14, ROTATION_0_1 = 16; + private const int ROTATION_1_0 = 52, ROTATION_1_1 = 57; + private const int ROTATION_2_0 = 23, ROTATION_2_1 = 40; + private const int ROTATION_3_0 = 5, ROTATION_3_1 = 37; + + private const int ROTATION_4_0 = 25, ROTATION_4_1 = 33; + private const int ROTATION_5_0 = 46, ROTATION_5_1 = 12; + private const int ROTATION_6_0 = 58, ROTATION_6_1 = 22; + private const int ROTATION_7_0 = 32, ROTATION_7_1 = 32; + + public Threefish256Cipher(ulong[] kw, ulong[] t) + : base(kw, t) + { + } + + internal override void EncryptBlock(ulong[] block, ulong[] outWords) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod5 = MOD5; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 9) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + /* + * Read 4 words of plaintext data, not using arrays for cipher state + */ + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + + /* + * First subkey injection. + */ + b0 += kw[0]; + b1 += kw[1] + t[0]; + b2 += kw[2] + t[1]; + b3 += kw[3]; + + /* + * Rounds loop, unrolled to 8 rounds per iteration. + * + * Unrolling to multiples of 4 avoids the mod 4 check for key injection, and allows + * inlining of the permutations, which cycle every of 2 rounds (avoiding array + * index/lookup). + * + * Unrolling to multiples of 8 avoids the mod 8 rotation constant lookup, and allows + * inlining constant rotation values (avoiding array index/lookup). + */ + + for (int d = 1; d < (ROUNDS_256 / 4); d += 2) + { + int dm5 = mod5[d]; + int dm3 = mod3[d]; + + /* + * 4 rounds of mix and permute. + * + * Permute schedule has a 2 round cycle, so permutes are inlined in the mix + * operations in each 4 round block. + */ + b1 = RotlXor(b1, ROTATION_0_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_0_1, b2 += b3); + + b3 = RotlXor(b3, ROTATION_1_0, b0 += b3); + b1 = RotlXor(b1, ROTATION_1_1, b2 += b1); + + b1 = RotlXor(b1, ROTATION_2_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_2_1, b2 += b3); + + b3 = RotlXor(b3, ROTATION_3_0, b0 += b3); + b1 = RotlXor(b1, ROTATION_3_1, b2 += b1); + + /* + * Subkey injection for first 4 rounds. + */ + b0 += kw[dm5]; + b1 += kw[dm5 + 1] + t[dm3]; + b2 += kw[dm5 + 2] + t[dm3 + 1]; + b3 += kw[dm5 + 3] + (uint)d; + + /* + * 4 more rounds of mix/permute + */ + b1 = RotlXor(b1, ROTATION_4_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_4_1, b2 += b3); + + b3 = RotlXor(b3, ROTATION_5_0, b0 += b3); + b1 = RotlXor(b1, ROTATION_5_1, b2 += b1); + + b1 = RotlXor(b1, ROTATION_6_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_6_1, b2 += b3); + + b3 = RotlXor(b3, ROTATION_7_0, b0 += b3); + b1 = RotlXor(b1, ROTATION_7_1, b2 += b1); + + /* + * Subkey injection for next 4 rounds. + */ + b0 += kw[dm5 + 1]; + b1 += kw[dm5 + 2] + t[dm3 + 1]; + b2 += kw[dm5 + 3] + t[dm3 + 2]; + b3 += kw[dm5 + 4] + (uint)d + 1; + } + + /* + * Output cipher state. + */ + outWords[0] = b0; + outWords[1] = b1; + outWords[2] = b2; + outWords[3] = b3; + } + + internal override void DecryptBlock(ulong[] block, ulong[] state) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod5 = MOD5; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 9) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + + for (int d = (ROUNDS_256 / 4) - 1; d >= 1; d -= 2) + { + int dm5 = mod5[d]; + int dm3 = mod3[d]; + + /* Reverse key injection for second 4 rounds */ + b0 -= kw[dm5 + 1]; + b1 -= kw[dm5 + 2] + t[dm3 + 1]; + b2 -= kw[dm5 + 3] + t[dm3 + 2]; + b3 -= kw[dm5 + 4] + (uint)d + 1; + + /* Reverse second 4 mix/permute rounds */ + + b3 = XorRotr(b3, ROTATION_7_0, b0); + b0 -= b3; + b1 = XorRotr(b1, ROTATION_7_1, b2); + b2 -= b1; + + b1 = XorRotr(b1, ROTATION_6_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_6_1, b2); + b2 -= b3; + + b3 = XorRotr(b3, ROTATION_5_0, b0); + b0 -= b3; + b1 = XorRotr(b1, ROTATION_5_1, b2); + b2 -= b1; + + b1 = XorRotr(b1, ROTATION_4_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_4_1, b2); + b2 -= b3; + + /* Reverse key injection for first 4 rounds */ + b0 -= kw[dm5]; + b1 -= kw[dm5 + 1] + t[dm3]; + b2 -= kw[dm5 + 2] + t[dm3 + 1]; + b3 -= kw[dm5 + 3] + (uint)d; + + /* Reverse first 4 mix/permute rounds */ + b3 = XorRotr(b3, ROTATION_3_0, b0); + b0 -= b3; + b1 = XorRotr(b1, ROTATION_3_1, b2); + b2 -= b1; + + b1 = XorRotr(b1, ROTATION_2_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_2_1, b2); + b2 -= b3; + + b3 = XorRotr(b3, ROTATION_1_0, b0); + b0 -= b3; + b1 = XorRotr(b1, ROTATION_1_1, b2); + b2 -= b1; + + b1 = XorRotr(b1, ROTATION_0_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_0_1, b2); + b2 -= b3; + } + + /* + * First subkey uninjection. + */ + b0 -= kw[0]; + b1 -= kw[1] + t[0]; + b2 -= kw[2] + t[1]; + b3 -= kw[3]; + + /* + * Output cipher state. + */ + state[0] = b0; + state[1] = b1; + state[2] = b2; + state[3] = b3; + } + + } + + private sealed class Threefish512Cipher + : ThreefishCipher + { + /** + * Mix rotation constants defined in Skein 1.3 specification + */ + private const int ROTATION_0_0 = 46, ROTATION_0_1 = 36, ROTATION_0_2 = 19, ROTATION_0_3 = 37; + private const int ROTATION_1_0 = 33, ROTATION_1_1 = 27, ROTATION_1_2 = 14, ROTATION_1_3 = 42; + private const int ROTATION_2_0 = 17, ROTATION_2_1 = 49, ROTATION_2_2 = 36, ROTATION_2_3 = 39; + private const int ROTATION_3_0 = 44, ROTATION_3_1 = 9, ROTATION_3_2 = 54, ROTATION_3_3 = 56; + + private const int ROTATION_4_0 = 39, ROTATION_4_1 = 30, ROTATION_4_2 = 34, ROTATION_4_3 = 24; + private const int ROTATION_5_0 = 13, ROTATION_5_1 = 50, ROTATION_5_2 = 10, ROTATION_5_3 = 17; + private const int ROTATION_6_0 = 25, ROTATION_6_1 = 29, ROTATION_6_2 = 39, ROTATION_6_3 = 43; + private const int ROTATION_7_0 = 8, ROTATION_7_1 = 35, ROTATION_7_2 = 56, ROTATION_7_3 = 22; + + internal Threefish512Cipher(ulong[] kw, ulong[] t) + : base(kw, t) + { + } + + internal override void EncryptBlock(ulong[] block, ulong[] outWords) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod9 = MOD9; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 17) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + /* + * Read 8 words of plaintext data, not using arrays for cipher state + */ + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + ulong b4 = block[4]; + ulong b5 = block[5]; + ulong b6 = block[6]; + ulong b7 = block[7]; + + /* + * First subkey injection. + */ + b0 += kw[0]; + b1 += kw[1]; + b2 += kw[2]; + b3 += kw[3]; + b4 += kw[4]; + b5 += kw[5] + t[0]; + b6 += kw[6] + t[1]; + b7 += kw[7]; + + /* + * Rounds loop, unrolled to 8 rounds per iteration. + * + * Unrolling to multiples of 4 avoids the mod 4 check for key injection, and allows + * inlining of the permutations, which cycle every of 4 rounds (avoiding array + * index/lookup). + * + * Unrolling to multiples of 8 avoids the mod 8 rotation constant lookup, and allows + * inlining constant rotation values (avoiding array index/lookup). + */ + + for (int d = 1; d < (ROUNDS_512 / 4); d += 2) + { + int dm9 = mod9[d]; + int dm3 = mod3[d]; + + /* + * 4 rounds of mix and permute. + * + * Permute schedule has a 4 round cycle, so permutes are inlined in the mix + * operations in each 4 round block. + */ + b1 = RotlXor(b1, ROTATION_0_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_0_1, b2 += b3); + b5 = RotlXor(b5, ROTATION_0_2, b4 += b5); + b7 = RotlXor(b7, ROTATION_0_3, b6 += b7); + + b1 = RotlXor(b1, ROTATION_1_0, b2 += b1); + b7 = RotlXor(b7, ROTATION_1_1, b4 += b7); + b5 = RotlXor(b5, ROTATION_1_2, b6 += b5); + b3 = RotlXor(b3, ROTATION_1_3, b0 += b3); + + b1 = RotlXor(b1, ROTATION_2_0, b4 += b1); + b3 = RotlXor(b3, ROTATION_2_1, b6 += b3); + b5 = RotlXor(b5, ROTATION_2_2, b0 += b5); + b7 = RotlXor(b7, ROTATION_2_3, b2 += b7); + + b1 = RotlXor(b1, ROTATION_3_0, b6 += b1); + b7 = RotlXor(b7, ROTATION_3_1, b0 += b7); + b5 = RotlXor(b5, ROTATION_3_2, b2 += b5); + b3 = RotlXor(b3, ROTATION_3_3, b4 += b3); + + /* + * Subkey injection for first 4 rounds. + */ + b0 += kw[dm9]; + b1 += kw[dm9 + 1]; + b2 += kw[dm9 + 2]; + b3 += kw[dm9 + 3]; + b4 += kw[dm9 + 4]; + b5 += kw[dm9 + 5] + t[dm3]; + b6 += kw[dm9 + 6] + t[dm3 + 1]; + b7 += kw[dm9 + 7] + (uint)d; + + /* + * 4 more rounds of mix/permute + */ + b1 = RotlXor(b1, ROTATION_4_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_4_1, b2 += b3); + b5 = RotlXor(b5, ROTATION_4_2, b4 += b5); + b7 = RotlXor(b7, ROTATION_4_3, b6 += b7); + + b1 = RotlXor(b1, ROTATION_5_0, b2 += b1); + b7 = RotlXor(b7, ROTATION_5_1, b4 += b7); + b5 = RotlXor(b5, ROTATION_5_2, b6 += b5); + b3 = RotlXor(b3, ROTATION_5_3, b0 += b3); + + b1 = RotlXor(b1, ROTATION_6_0, b4 += b1); + b3 = RotlXor(b3, ROTATION_6_1, b6 += b3); + b5 = RotlXor(b5, ROTATION_6_2, b0 += b5); + b7 = RotlXor(b7, ROTATION_6_3, b2 += b7); + + b1 = RotlXor(b1, ROTATION_7_0, b6 += b1); + b7 = RotlXor(b7, ROTATION_7_1, b0 += b7); + b5 = RotlXor(b5, ROTATION_7_2, b2 += b5); + b3 = RotlXor(b3, ROTATION_7_3, b4 += b3); + + /* + * Subkey injection for next 4 rounds. + */ + b0 += kw[dm9 + 1]; + b1 += kw[dm9 + 2]; + b2 += kw[dm9 + 3]; + b3 += kw[dm9 + 4]; + b4 += kw[dm9 + 5]; + b5 += kw[dm9 + 6] + t[dm3 + 1]; + b6 += kw[dm9 + 7] + t[dm3 + 2]; + b7 += kw[dm9 + 8] + (uint)d + 1; + } + + /* + * Output cipher state. + */ + outWords[0] = b0; + outWords[1] = b1; + outWords[2] = b2; + outWords[3] = b3; + outWords[4] = b4; + outWords[5] = b5; + outWords[6] = b6; + outWords[7] = b7; + } + + internal override void DecryptBlock(ulong[] block, ulong[] state) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod9 = MOD9; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 17) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + ulong b4 = block[4]; + ulong b5 = block[5]; + ulong b6 = block[6]; + ulong b7 = block[7]; + + for (int d = (ROUNDS_512 / 4) - 1; d >= 1; d -= 2) + { + int dm9 = mod9[d]; + int dm3 = mod3[d]; + + /* Reverse key injection for second 4 rounds */ + b0 -= kw[dm9 + 1]; + b1 -= kw[dm9 + 2]; + b2 -= kw[dm9 + 3]; + b3 -= kw[dm9 + 4]; + b4 -= kw[dm9 + 5]; + b5 -= kw[dm9 + 6] + t[dm3 + 1]; + b6 -= kw[dm9 + 7] + t[dm3 + 2]; + b7 -= kw[dm9 + 8] + (uint)d + 1; + + /* Reverse second 4 mix/permute rounds */ + + b1 = XorRotr(b1, ROTATION_7_0, b6); + b6 -= b1; + b7 = XorRotr(b7, ROTATION_7_1, b0); + b0 -= b7; + b5 = XorRotr(b5, ROTATION_7_2, b2); + b2 -= b5; + b3 = XorRotr(b3, ROTATION_7_3, b4); + b4 -= b3; + + b1 = XorRotr(b1, ROTATION_6_0, b4); + b4 -= b1; + b3 = XorRotr(b3, ROTATION_6_1, b6); + b6 -= b3; + b5 = XorRotr(b5, ROTATION_6_2, b0); + b0 -= b5; + b7 = XorRotr(b7, ROTATION_6_3, b2); + b2 -= b7; + + b1 = XorRotr(b1, ROTATION_5_0, b2); + b2 -= b1; + b7 = XorRotr(b7, ROTATION_5_1, b4); + b4 -= b7; + b5 = XorRotr(b5, ROTATION_5_2, b6); + b6 -= b5; + b3 = XorRotr(b3, ROTATION_5_3, b0); + b0 -= b3; + + b1 = XorRotr(b1, ROTATION_4_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_4_1, b2); + b2 -= b3; + b5 = XorRotr(b5, ROTATION_4_2, b4); + b4 -= b5; + b7 = XorRotr(b7, ROTATION_4_3, b6); + b6 -= b7; + + /* Reverse key injection for first 4 rounds */ + b0 -= kw[dm9]; + b1 -= kw[dm9 + 1]; + b2 -= kw[dm9 + 2]; + b3 -= kw[dm9 + 3]; + b4 -= kw[dm9 + 4]; + b5 -= kw[dm9 + 5] + t[dm3]; + b6 -= kw[dm9 + 6] + t[dm3 + 1]; + b7 -= kw[dm9 + 7] + (uint)d; + + /* Reverse first 4 mix/permute rounds */ + b1 = XorRotr(b1, ROTATION_3_0, b6); + b6 -= b1; + b7 = XorRotr(b7, ROTATION_3_1, b0); + b0 -= b7; + b5 = XorRotr(b5, ROTATION_3_2, b2); + b2 -= b5; + b3 = XorRotr(b3, ROTATION_3_3, b4); + b4 -= b3; + + b1 = XorRotr(b1, ROTATION_2_0, b4); + b4 -= b1; + b3 = XorRotr(b3, ROTATION_2_1, b6); + b6 -= b3; + b5 = XorRotr(b5, ROTATION_2_2, b0); + b0 -= b5; + b7 = XorRotr(b7, ROTATION_2_3, b2); + b2 -= b7; + + b1 = XorRotr(b1, ROTATION_1_0, b2); + b2 -= b1; + b7 = XorRotr(b7, ROTATION_1_1, b4); + b4 -= b7; + b5 = XorRotr(b5, ROTATION_1_2, b6); + b6 -= b5; + b3 = XorRotr(b3, ROTATION_1_3, b0); + b0 -= b3; + + b1 = XorRotr(b1, ROTATION_0_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_0_1, b2); + b2 -= b3; + b5 = XorRotr(b5, ROTATION_0_2, b4); + b4 -= b5; + b7 = XorRotr(b7, ROTATION_0_3, b6); + b6 -= b7; + } + + /* + * First subkey uninjection. + */ + b0 -= kw[0]; + b1 -= kw[1]; + b2 -= kw[2]; + b3 -= kw[3]; + b4 -= kw[4]; + b5 -= kw[5] + t[0]; + b6 -= kw[6] + t[1]; + b7 -= kw[7]; + + /* + * Output cipher state. + */ + state[0] = b0; + state[1] = b1; + state[2] = b2; + state[3] = b3; + state[4] = b4; + state[5] = b5; + state[6] = b6; + state[7] = b7; + } + } + + private sealed class Threefish1024Cipher + : ThreefishCipher + { + /** + * Mix rotation constants defined in Skein 1.3 specification + */ + private const int ROTATION_0_0 = 24, ROTATION_0_1 = 13, ROTATION_0_2 = 8, ROTATION_0_3 = 47; + private const int ROTATION_0_4 = 8, ROTATION_0_5 = 17, ROTATION_0_6 = 22, ROTATION_0_7 = 37; + private const int ROTATION_1_0 = 38, ROTATION_1_1 = 19, ROTATION_1_2 = 10, ROTATION_1_3 = 55; + private const int ROTATION_1_4 = 49, ROTATION_1_5 = 18, ROTATION_1_6 = 23, ROTATION_1_7 = 52; + private const int ROTATION_2_0 = 33, ROTATION_2_1 = 4, ROTATION_2_2 = 51, ROTATION_2_3 = 13; + private const int ROTATION_2_4 = 34, ROTATION_2_5 = 41, ROTATION_2_6 = 59, ROTATION_2_7 = 17; + private const int ROTATION_3_0 = 5, ROTATION_3_1 = 20, ROTATION_3_2 = 48, ROTATION_3_3 = 41; + private const int ROTATION_3_4 = 47, ROTATION_3_5 = 28, ROTATION_3_6 = 16, ROTATION_3_7 = 25; + + private const int ROTATION_4_0 = 41, ROTATION_4_1 = 9, ROTATION_4_2 = 37, ROTATION_4_3 = 31; + private const int ROTATION_4_4 = 12, ROTATION_4_5 = 47, ROTATION_4_6 = 44, ROTATION_4_7 = 30; + private const int ROTATION_5_0 = 16, ROTATION_5_1 = 34, ROTATION_5_2 = 56, ROTATION_5_3 = 51; + private const int ROTATION_5_4 = 4, ROTATION_5_5 = 53, ROTATION_5_6 = 42, ROTATION_5_7 = 41; + private const int ROTATION_6_0 = 31, ROTATION_6_1 = 44, ROTATION_6_2 = 47, ROTATION_6_3 = 46; + private const int ROTATION_6_4 = 19, ROTATION_6_5 = 42, ROTATION_6_6 = 44, ROTATION_6_7 = 25; + private const int ROTATION_7_0 = 9, ROTATION_7_1 = 48, ROTATION_7_2 = 35, ROTATION_7_3 = 52; + private const int ROTATION_7_4 = 23, ROTATION_7_5 = 31, ROTATION_7_6 = 37, ROTATION_7_7 = 20; + + public Threefish1024Cipher(ulong[] kw, ulong[] t) + : base(kw, t) + { + } + + internal override void EncryptBlock(ulong[] block, ulong[] outWords) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod17 = MOD17; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 33) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + /* + * Read 16 words of plaintext data, not using arrays for cipher state + */ + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + ulong b4 = block[4]; + ulong b5 = block[5]; + ulong b6 = block[6]; + ulong b7 = block[7]; + ulong b8 = block[8]; + ulong b9 = block[9]; + ulong b10 = block[10]; + ulong b11 = block[11]; + ulong b12 = block[12]; + ulong b13 = block[13]; + ulong b14 = block[14]; + ulong b15 = block[15]; + + /* + * First subkey injection. + */ + b0 += kw[0]; + b1 += kw[1]; + b2 += kw[2]; + b3 += kw[3]; + b4 += kw[4]; + b5 += kw[5]; + b6 += kw[6]; + b7 += kw[7]; + b8 += kw[8]; + b9 += kw[9]; + b10 += kw[10]; + b11 += kw[11]; + b12 += kw[12]; + b13 += kw[13] + t[0]; + b14 += kw[14] + t[1]; + b15 += kw[15]; + + /* + * Rounds loop, unrolled to 8 rounds per iteration. + * + * Unrolling to multiples of 4 avoids the mod 4 check for key injection, and allows + * inlining of the permutations, which cycle every of 4 rounds (avoiding array + * index/lookup). + * + * Unrolling to multiples of 8 avoids the mod 8 rotation constant lookup, and allows + * inlining constant rotation values (avoiding array index/lookup). + */ + + for (int d = 1; d < (ROUNDS_1024 / 4); d += 2) + { + int dm17 = mod17[d]; + int dm3 = mod3[d]; + + /* + * 4 rounds of mix and permute. + * + * Permute schedule has a 4 round cycle, so permutes are inlined in the mix + * operations in each 4 round block. + */ + b1 = RotlXor(b1, ROTATION_0_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_0_1, b2 += b3); + b5 = RotlXor(b5, ROTATION_0_2, b4 += b5); + b7 = RotlXor(b7, ROTATION_0_3, b6 += b7); + b9 = RotlXor(b9, ROTATION_0_4, b8 += b9); + b11 = RotlXor(b11, ROTATION_0_5, b10 += b11); + b13 = RotlXor(b13, ROTATION_0_6, b12 += b13); + b15 = RotlXor(b15, ROTATION_0_7, b14 += b15); + + b9 = RotlXor(b9, ROTATION_1_0, b0 += b9); + b13 = RotlXor(b13, ROTATION_1_1, b2 += b13); + b11 = RotlXor(b11, ROTATION_1_2, b6 += b11); + b15 = RotlXor(b15, ROTATION_1_3, b4 += b15); + b7 = RotlXor(b7, ROTATION_1_4, b10 += b7); + b3 = RotlXor(b3, ROTATION_1_5, b12 += b3); + b5 = RotlXor(b5, ROTATION_1_6, b14 += b5); + b1 = RotlXor(b1, ROTATION_1_7, b8 += b1); + + b7 = RotlXor(b7, ROTATION_2_0, b0 += b7); + b5 = RotlXor(b5, ROTATION_2_1, b2 += b5); + b3 = RotlXor(b3, ROTATION_2_2, b4 += b3); + b1 = RotlXor(b1, ROTATION_2_3, b6 += b1); + b15 = RotlXor(b15, ROTATION_2_4, b12 += b15); + b13 = RotlXor(b13, ROTATION_2_5, b14 += b13); + b11 = RotlXor(b11, ROTATION_2_6, b8 += b11); + b9 = RotlXor(b9, ROTATION_2_7, b10 += b9); + + b15 = RotlXor(b15, ROTATION_3_0, b0 += b15); + b11 = RotlXor(b11, ROTATION_3_1, b2 += b11); + b13 = RotlXor(b13, ROTATION_3_2, b6 += b13); + b9 = RotlXor(b9, ROTATION_3_3, b4 += b9); + b1 = RotlXor(b1, ROTATION_3_4, b14 += b1); + b5 = RotlXor(b5, ROTATION_3_5, b8 += b5); + b3 = RotlXor(b3, ROTATION_3_6, b10 += b3); + b7 = RotlXor(b7, ROTATION_3_7, b12 += b7); + + /* + * Subkey injection for first 4 rounds. + */ + b0 += kw[dm17]; + b1 += kw[dm17 + 1]; + b2 += kw[dm17 + 2]; + b3 += kw[dm17 + 3]; + b4 += kw[dm17 + 4]; + b5 += kw[dm17 + 5]; + b6 += kw[dm17 + 6]; + b7 += kw[dm17 + 7]; + b8 += kw[dm17 + 8]; + b9 += kw[dm17 + 9]; + b10 += kw[dm17 + 10]; + b11 += kw[dm17 + 11]; + b12 += kw[dm17 + 12]; + b13 += kw[dm17 + 13] + t[dm3]; + b14 += kw[dm17 + 14] + t[dm3 + 1]; + b15 += kw[dm17 + 15] + (uint)d; + + /* + * 4 more rounds of mix/permute + */ + b1 = RotlXor(b1, ROTATION_4_0, b0 += b1); + b3 = RotlXor(b3, ROTATION_4_1, b2 += b3); + b5 = RotlXor(b5, ROTATION_4_2, b4 += b5); + b7 = RotlXor(b7, ROTATION_4_3, b6 += b7); + b9 = RotlXor(b9, ROTATION_4_4, b8 += b9); + b11 = RotlXor(b11, ROTATION_4_5, b10 += b11); + b13 = RotlXor(b13, ROTATION_4_6, b12 += b13); + b15 = RotlXor(b15, ROTATION_4_7, b14 += b15); + + b9 = RotlXor(b9, ROTATION_5_0, b0 += b9); + b13 = RotlXor(b13, ROTATION_5_1, b2 += b13); + b11 = RotlXor(b11, ROTATION_5_2, b6 += b11); + b15 = RotlXor(b15, ROTATION_5_3, b4 += b15); + b7 = RotlXor(b7, ROTATION_5_4, b10 += b7); + b3 = RotlXor(b3, ROTATION_5_5, b12 += b3); + b5 = RotlXor(b5, ROTATION_5_6, b14 += b5); + b1 = RotlXor(b1, ROTATION_5_7, b8 += b1); + + b7 = RotlXor(b7, ROTATION_6_0, b0 += b7); + b5 = RotlXor(b5, ROTATION_6_1, b2 += b5); + b3 = RotlXor(b3, ROTATION_6_2, b4 += b3); + b1 = RotlXor(b1, ROTATION_6_3, b6 += b1); + b15 = RotlXor(b15, ROTATION_6_4, b12 += b15); + b13 = RotlXor(b13, ROTATION_6_5, b14 += b13); + b11 = RotlXor(b11, ROTATION_6_6, b8 += b11); + b9 = RotlXor(b9, ROTATION_6_7, b10 += b9); + + b15 = RotlXor(b15, ROTATION_7_0, b0 += b15); + b11 = RotlXor(b11, ROTATION_7_1, b2 += b11); + b13 = RotlXor(b13, ROTATION_7_2, b6 += b13); + b9 = RotlXor(b9, ROTATION_7_3, b4 += b9); + b1 = RotlXor(b1, ROTATION_7_4, b14 += b1); + b5 = RotlXor(b5, ROTATION_7_5, b8 += b5); + b3 = RotlXor(b3, ROTATION_7_6, b10 += b3); + b7 = RotlXor(b7, ROTATION_7_7, b12 += b7); + + /* + * Subkey injection for next 4 rounds. + */ + b0 += kw[dm17 + 1]; + b1 += kw[dm17 + 2]; + b2 += kw[dm17 + 3]; + b3 += kw[dm17 + 4]; + b4 += kw[dm17 + 5]; + b5 += kw[dm17 + 6]; + b6 += kw[dm17 + 7]; + b7 += kw[dm17 + 8]; + b8 += kw[dm17 + 9]; + b9 += kw[dm17 + 10]; + b10 += kw[dm17 + 11]; + b11 += kw[dm17 + 12]; + b12 += kw[dm17 + 13]; + b13 += kw[dm17 + 14] + t[dm3 + 1]; + b14 += kw[dm17 + 15] + t[dm3 + 2]; + b15 += kw[dm17 + 16] + (uint)d + 1; + + } + + /* + * Output cipher state. + */ + outWords[0] = b0; + outWords[1] = b1; + outWords[2] = b2; + outWords[3] = b3; + outWords[4] = b4; + outWords[5] = b5; + outWords[6] = b6; + outWords[7] = b7; + outWords[8] = b8; + outWords[9] = b9; + outWords[10] = b10; + outWords[11] = b11; + outWords[12] = b12; + outWords[13] = b13; + outWords[14] = b14; + outWords[15] = b15; + } + + internal override void DecryptBlock(ulong[] block, ulong[] state) + { + ulong[] kw = this.kw; + ulong[] t = this.t; + int[] mod17 = MOD17; + int[] mod3 = MOD3; + + /* Help the JIT avoid index bounds checks */ + if (kw.Length != 33) + { + throw new ArgumentException(); + } + if (t.Length != 5) + { + throw new ArgumentException(); + } + + ulong b0 = block[0]; + ulong b1 = block[1]; + ulong b2 = block[2]; + ulong b3 = block[3]; + ulong b4 = block[4]; + ulong b5 = block[5]; + ulong b6 = block[6]; + ulong b7 = block[7]; + ulong b8 = block[8]; + ulong b9 = block[9]; + ulong b10 = block[10]; + ulong b11 = block[11]; + ulong b12 = block[12]; + ulong b13 = block[13]; + ulong b14 = block[14]; + ulong b15 = block[15]; + + for (int d = (ROUNDS_1024 / 4) - 1; d >= 1; d -= 2) + { + int dm17 = mod17[d]; + int dm3 = mod3[d]; + + /* Reverse key injection for second 4 rounds */ + b0 -= kw[dm17 + 1]; + b1 -= kw[dm17 + 2]; + b2 -= kw[dm17 + 3]; + b3 -= kw[dm17 + 4]; + b4 -= kw[dm17 + 5]; + b5 -= kw[dm17 + 6]; + b6 -= kw[dm17 + 7]; + b7 -= kw[dm17 + 8]; + b8 -= kw[dm17 + 9]; + b9 -= kw[dm17 + 10]; + b10 -= kw[dm17 + 11]; + b11 -= kw[dm17 + 12]; + b12 -= kw[dm17 + 13]; + b13 -= kw[dm17 + 14] + t[dm3 + 1]; + b14 -= kw[dm17 + 15] + t[dm3 + 2]; + b15 -= kw[dm17 + 16] + (uint)d + 1; + + /* Reverse second 4 mix/permute rounds */ + b15 = XorRotr(b15, ROTATION_7_0, b0); + b0 -= b15; + b11 = XorRotr(b11, ROTATION_7_1, b2); + b2 -= b11; + b13 = XorRotr(b13, ROTATION_7_2, b6); + b6 -= b13; + b9 = XorRotr(b9, ROTATION_7_3, b4); + b4 -= b9; + b1 = XorRotr(b1, ROTATION_7_4, b14); + b14 -= b1; + b5 = XorRotr(b5, ROTATION_7_5, b8); + b8 -= b5; + b3 = XorRotr(b3, ROTATION_7_6, b10); + b10 -= b3; + b7 = XorRotr(b7, ROTATION_7_7, b12); + b12 -= b7; + + b7 = XorRotr(b7, ROTATION_6_0, b0); + b0 -= b7; + b5 = XorRotr(b5, ROTATION_6_1, b2); + b2 -= b5; + b3 = XorRotr(b3, ROTATION_6_2, b4); + b4 -= b3; + b1 = XorRotr(b1, ROTATION_6_3, b6); + b6 -= b1; + b15 = XorRotr(b15, ROTATION_6_4, b12); + b12 -= b15; + b13 = XorRotr(b13, ROTATION_6_5, b14); + b14 -= b13; + b11 = XorRotr(b11, ROTATION_6_6, b8); + b8 -= b11; + b9 = XorRotr(b9, ROTATION_6_7, b10); + b10 -= b9; + + b9 = XorRotr(b9, ROTATION_5_0, b0); + b0 -= b9; + b13 = XorRotr(b13, ROTATION_5_1, b2); + b2 -= b13; + b11 = XorRotr(b11, ROTATION_5_2, b6); + b6 -= b11; + b15 = XorRotr(b15, ROTATION_5_3, b4); + b4 -= b15; + b7 = XorRotr(b7, ROTATION_5_4, b10); + b10 -= b7; + b3 = XorRotr(b3, ROTATION_5_5, b12); + b12 -= b3; + b5 = XorRotr(b5, ROTATION_5_6, b14); + b14 -= b5; + b1 = XorRotr(b1, ROTATION_5_7, b8); + b8 -= b1; + + b1 = XorRotr(b1, ROTATION_4_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_4_1, b2); + b2 -= b3; + b5 = XorRotr(b5, ROTATION_4_2, b4); + b4 -= b5; + b7 = XorRotr(b7, ROTATION_4_3, b6); + b6 -= b7; + b9 = XorRotr(b9, ROTATION_4_4, b8); + b8 -= b9; + b11 = XorRotr(b11, ROTATION_4_5, b10); + b10 -= b11; + b13 = XorRotr(b13, ROTATION_4_6, b12); + b12 -= b13; + b15 = XorRotr(b15, ROTATION_4_7, b14); + b14 -= b15; + + /* Reverse key injection for first 4 rounds */ + b0 -= kw[dm17]; + b1 -= kw[dm17 + 1]; + b2 -= kw[dm17 + 2]; + b3 -= kw[dm17 + 3]; + b4 -= kw[dm17 + 4]; + b5 -= kw[dm17 + 5]; + b6 -= kw[dm17 + 6]; + b7 -= kw[dm17 + 7]; + b8 -= kw[dm17 + 8]; + b9 -= kw[dm17 + 9]; + b10 -= kw[dm17 + 10]; + b11 -= kw[dm17 + 11]; + b12 -= kw[dm17 + 12]; + b13 -= kw[dm17 + 13] + t[dm3]; + b14 -= kw[dm17 + 14] + t[dm3 + 1]; + b15 -= kw[dm17 + 15] + (uint)d; + + /* Reverse first 4 mix/permute rounds */ + b15 = XorRotr(b15, ROTATION_3_0, b0); + b0 -= b15; + b11 = XorRotr(b11, ROTATION_3_1, b2); + b2 -= b11; + b13 = XorRotr(b13, ROTATION_3_2, b6); + b6 -= b13; + b9 = XorRotr(b9, ROTATION_3_3, b4); + b4 -= b9; + b1 = XorRotr(b1, ROTATION_3_4, b14); + b14 -= b1; + b5 = XorRotr(b5, ROTATION_3_5, b8); + b8 -= b5; + b3 = XorRotr(b3, ROTATION_3_6, b10); + b10 -= b3; + b7 = XorRotr(b7, ROTATION_3_7, b12); + b12 -= b7; + + b7 = XorRotr(b7, ROTATION_2_0, b0); + b0 -= b7; + b5 = XorRotr(b5, ROTATION_2_1, b2); + b2 -= b5; + b3 = XorRotr(b3, ROTATION_2_2, b4); + b4 -= b3; + b1 = XorRotr(b1, ROTATION_2_3, b6); + b6 -= b1; + b15 = XorRotr(b15, ROTATION_2_4, b12); + b12 -= b15; + b13 = XorRotr(b13, ROTATION_2_5, b14); + b14 -= b13; + b11 = XorRotr(b11, ROTATION_2_6, b8); + b8 -= b11; + b9 = XorRotr(b9, ROTATION_2_7, b10); + b10 -= b9; + + b9 = XorRotr(b9, ROTATION_1_0, b0); + b0 -= b9; + b13 = XorRotr(b13, ROTATION_1_1, b2); + b2 -= b13; + b11 = XorRotr(b11, ROTATION_1_2, b6); + b6 -= b11; + b15 = XorRotr(b15, ROTATION_1_3, b4); + b4 -= b15; + b7 = XorRotr(b7, ROTATION_1_4, b10); + b10 -= b7; + b3 = XorRotr(b3, ROTATION_1_5, b12); + b12 -= b3; + b5 = XorRotr(b5, ROTATION_1_6, b14); + b14 -= b5; + b1 = XorRotr(b1, ROTATION_1_7, b8); + b8 -= b1; + + b1 = XorRotr(b1, ROTATION_0_0, b0); + b0 -= b1; + b3 = XorRotr(b3, ROTATION_0_1, b2); + b2 -= b3; + b5 = XorRotr(b5, ROTATION_0_2, b4); + b4 -= b5; + b7 = XorRotr(b7, ROTATION_0_3, b6); + b6 -= b7; + b9 = XorRotr(b9, ROTATION_0_4, b8); + b8 -= b9; + b11 = XorRotr(b11, ROTATION_0_5, b10); + b10 -= b11; + b13 = XorRotr(b13, ROTATION_0_6, b12); + b12 -= b13; + b15 = XorRotr(b15, ROTATION_0_7, b14); + b14 -= b15; + } + + /* + * First subkey uninjection. + */ + b0 -= kw[0]; + b1 -= kw[1]; + b2 -= kw[2]; + b3 -= kw[3]; + b4 -= kw[4]; + b5 -= kw[5]; + b6 -= kw[6]; + b7 -= kw[7]; + b8 -= kw[8]; + b9 -= kw[9]; + b10 -= kw[10]; + b11 -= kw[11]; + b12 -= kw[12]; + b13 -= kw[13] + t[0]; + b14 -= kw[14] + t[1]; + b15 -= kw[15]; + + /* + * Output cipher state. + */ + state[0] = b0; + state[1] = b1; + state[2] = b2; + state[3] = b3; + state[4] = b4; + state[5] = b5; + state[6] = b6; + state[7] = b7; + state[8] = b8; + state[9] = b9; + state[10] = b10; + state[11] = b11; + state[12] = b12; + state[13] = b13; + state[14] = b14; + state[15] = b15; + } + + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs.meta new file mode 100644 index 00000000..69b575bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dfdd769734cb7e646bea4b5f9f8bc6a7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/ThreefishEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs new file mode 100644 index 00000000..3e7eb1c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs @@ -0,0 +1,412 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * Tnepres is a 128-bit 32-round block cipher with variable key lengths, + * including 128, 192 and 256 bit keys conjectured to be at least as + * secure as three-key triple-DES. + *

+ * Tnepres is based on Serpent which was designed by Ross Anderson, Eli Biham and Lars Knudsen as a + * candidate algorithm for the NIST AES Quest. Unfortunately there was an endianness issue + * with test vectors in the AES submission and the resulting confusion lead to the Tnepres cipher + * as well, which is a byte swapped version of Serpent. + *

+ *

+ * For full details see The Serpent home page + *

+ */ + public sealed class TnepresEngine + : SerpentEngineBase + { + public override string AlgorithmName + { + get { return "Tnepres"; } + } + + /** + * Expand a user-supplied key material into a session key. + * + * @param key The user-key bytes (multiples of 4) to use. + * @exception ArgumentException + */ + internal override int[] MakeWorkingKey(byte[] key) + { + // + // pad key to 256 bits + // + int[] kPad = new int[16]; + int off = 0; + int length = 0; + + for (off = key.Length - 4; off > 0; off -= 4) + { + kPad[length++] = (int)Pack.BE_To_UInt32(key, off); + } + + if (off == 0) + { + kPad[length++] = (int)Pack.BE_To_UInt32(key, 0); + if (length < 8) + { + kPad[length] = 1; + } + } + else + { + throw new ArgumentException("key must be a multiple of 4 bytes"); + } + + // + // expand the padded key up to 33 x 128 bits of key material + // + int amount = (ROUNDS + 1) * 4; + int[] w = new int[amount]; + + // + // compute w0 to w7 from w-8 to w-1 + // + for (int i = 8; i < 16; i++) + { + kPad[i] = Integers.RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ PHI ^ (i - 8), 11); + } + + Array.Copy(kPad, 8, w, 0, 8); + + // + // compute w8 to w136 + // + for (int i = 8; i < amount; i++) + { + w[i] = Integers.RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ PHI ^ i, 11); + } + + // + // create the working keys by processing w with the Sbox and IP + // + Sb3(w[0], w[1], w[2], w[3]); + w[0] = X0; w[1] = X1; w[2] = X2; w[3] = X3; + Sb2(w[4], w[5], w[6], w[7]); + w[4] = X0; w[5] = X1; w[6] = X2; w[7] = X3; + Sb1(w[8], w[9], w[10], w[11]); + w[8] = X0; w[9] = X1; w[10] = X2; w[11] = X3; + Sb0(w[12], w[13], w[14], w[15]); + w[12] = X0; w[13] = X1; w[14] = X2; w[15] = X3; + Sb7(w[16], w[17], w[18], w[19]); + w[16] = X0; w[17] = X1; w[18] = X2; w[19] = X3; + Sb6(w[20], w[21], w[22], w[23]); + w[20] = X0; w[21] = X1; w[22] = X2; w[23] = X3; + Sb5(w[24], w[25], w[26], w[27]); + w[24] = X0; w[25] = X1; w[26] = X2; w[27] = X3; + Sb4(w[28], w[29], w[30], w[31]); + w[28] = X0; w[29] = X1; w[30] = X2; w[31] = X3; + Sb3(w[32], w[33], w[34], w[35]); + w[32] = X0; w[33] = X1; w[34] = X2; w[35] = X3; + Sb2(w[36], w[37], w[38], w[39]); + w[36] = X0; w[37] = X1; w[38] = X2; w[39] = X3; + Sb1(w[40], w[41], w[42], w[43]); + w[40] = X0; w[41] = X1; w[42] = X2; w[43] = X3; + Sb0(w[44], w[45], w[46], w[47]); + w[44] = X0; w[45] = X1; w[46] = X2; w[47] = X3; + Sb7(w[48], w[49], w[50], w[51]); + w[48] = X0; w[49] = X1; w[50] = X2; w[51] = X3; + Sb6(w[52], w[53], w[54], w[55]); + w[52] = X0; w[53] = X1; w[54] = X2; w[55] = X3; + Sb5(w[56], w[57], w[58], w[59]); + w[56] = X0; w[57] = X1; w[58] = X2; w[59] = X3; + Sb4(w[60], w[61], w[62], w[63]); + w[60] = X0; w[61] = X1; w[62] = X2; w[63] = X3; + Sb3(w[64], w[65], w[66], w[67]); + w[64] = X0; w[65] = X1; w[66] = X2; w[67] = X3; + Sb2(w[68], w[69], w[70], w[71]); + w[68] = X0; w[69] = X1; w[70] = X2; w[71] = X3; + Sb1(w[72], w[73], w[74], w[75]); + w[72] = X0; w[73] = X1; w[74] = X2; w[75] = X3; + Sb0(w[76], w[77], w[78], w[79]); + w[76] = X0; w[77] = X1; w[78] = X2; w[79] = X3; + Sb7(w[80], w[81], w[82], w[83]); + w[80] = X0; w[81] = X1; w[82] = X2; w[83] = X3; + Sb6(w[84], w[85], w[86], w[87]); + w[84] = X0; w[85] = X1; w[86] = X2; w[87] = X3; + Sb5(w[88], w[89], w[90], w[91]); + w[88] = X0; w[89] = X1; w[90] = X2; w[91] = X3; + Sb4(w[92], w[93], w[94], w[95]); + w[92] = X0; w[93] = X1; w[94] = X2; w[95] = X3; + Sb3(w[96], w[97], w[98], w[99]); + w[96] = X0; w[97] = X1; w[98] = X2; w[99] = X3; + Sb2(w[100], w[101], w[102], w[103]); + w[100] = X0; w[101] = X1; w[102] = X2; w[103] = X3; + Sb1(w[104], w[105], w[106], w[107]); + w[104] = X0; w[105] = X1; w[106] = X2; w[107] = X3; + Sb0(w[108], w[109], w[110], w[111]); + w[108] = X0; w[109] = X1; w[110] = X2; w[111] = X3; + Sb7(w[112], w[113], w[114], w[115]); + w[112] = X0; w[113] = X1; w[114] = X2; w[115] = X3; + Sb6(w[116], w[117], w[118], w[119]); + w[116] = X0; w[117] = X1; w[118] = X2; w[119] = X3; + Sb5(w[120], w[121], w[122], w[123]); + w[120] = X0; w[121] = X1; w[122] = X2; w[123] = X3; + Sb4(w[124], w[125], w[126], w[127]); + w[124] = X0; w[125] = X1; w[126] = X2; w[127] = X3; + Sb3(w[128], w[129], w[130], w[131]); + w[128] = X0; w[129] = X1; w[130] = X2; w[131] = X3; + + return w; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal override void EncryptBlock(ReadOnlySpan input, Span output) + { + X3 = (int)Pack.BE_To_UInt32(input); + X2 = (int)Pack.BE_To_UInt32(input[4..]); + X1 = (int)Pack.BE_To_UInt32(input[8..]); + X0 = (int)Pack.BE_To_UInt32(input[12..]); + + Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT(); + Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT(); + Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT(); + Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT(); + Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT(); + Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT(); + Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT(); + Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT(); + Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT(); + Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT(); + Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT(); + Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT(); + Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT(); + Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT(); + Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT(); + Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT(); + Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT(); + Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT(); + Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT(); + Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT(); + Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT(); + Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT(); + Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT(); + Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT(); + Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT(); + Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT(); + Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT(); + Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT(); + Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT(); + Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT(); + Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT(); + Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3); + + Pack.UInt32_To_BE((uint)(wKey[131] ^ X3), output); + Pack.UInt32_To_BE((uint)(wKey[130] ^ X2), output[4..]); + Pack.UInt32_To_BE((uint)(wKey[129] ^ X1), output[8..]); + Pack.UInt32_To_BE((uint)(wKey[128] ^ X0), output[12..]); + } + + internal override void DecryptBlock(ReadOnlySpan input, Span output) + { + X3 = wKey[131] ^ (int)Pack.BE_To_UInt32(input); + X2 = wKey[130] ^ (int)Pack.BE_To_UInt32(input[4..]); + X1 = wKey[129] ^ (int)Pack.BE_To_UInt32(input[8..]); + X0 = wKey[128] ^ (int)Pack.BE_To_UInt32(input[12..]); + + Ib7(X0, X1, X2, X3); + X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7]; + InverseLT(); Ib0(X0, X1, X2, X3); + + Pack.UInt32_To_BE((uint)(X3 ^ wKey[3]), output); + Pack.UInt32_To_BE((uint)(X2 ^ wKey[2]), output[4..]); + Pack.UInt32_To_BE((uint)(X1 ^ wKey[1]), output[8..]); + Pack.UInt32_To_BE((uint)(X0 ^ wKey[0]), output[12..]); + } +#else + internal override void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + X3 = (int)Pack.BE_To_UInt32(input, inOff); + X2 = (int)Pack.BE_To_UInt32(input, inOff + 4); + X1 = (int)Pack.BE_To_UInt32(input, inOff + 8); + X0 = (int)Pack.BE_To_UInt32(input, inOff + 12); + + Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT(); + Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT(); + Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT(); + Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT(); + Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT(); + Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT(); + Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT(); + Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT(); + Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT(); + Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT(); + Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT(); + Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT(); + Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT(); + Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT(); + Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT(); + Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT(); + Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT(); + Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT(); + Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT(); + Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT(); + Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT(); + Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT(); + Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT(); + Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT(); + Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT(); + Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT(); + Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT(); + Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT(); + Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT(); + Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT(); + Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT(); + Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3); + + Pack.UInt32_To_BE((uint)(wKey[131] ^ X3), output, outOff); + Pack.UInt32_To_BE((uint)(wKey[130] ^ X2), output, outOff + 4); + Pack.UInt32_To_BE((uint)(wKey[129] ^ X1), output, outOff + 8); + Pack.UInt32_To_BE((uint)(wKey[128] ^ X0), output, outOff + 12); + } + + internal override void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff) + { + X3 = wKey[131] ^ (int)Pack.BE_To_UInt32(input, inOff); + X2 = wKey[130] ^ (int)Pack.BE_To_UInt32(input, inOff + 4); + X1 = wKey[129] ^ (int)Pack.BE_To_UInt32(input, inOff + 8); + X0 = wKey[128] ^ (int)Pack.BE_To_UInt32(input, inOff + 12); + + Ib7(X0, X1, X2, X3); + X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39]; + InverseLT(); Ib0(X0, X1, X2, X3); + X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35]; + InverseLT(); Ib7(X0, X1, X2, X3); + X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31]; + InverseLT(); Ib6(X0, X1, X2, X3); + X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27]; + InverseLT(); Ib5(X0, X1, X2, X3); + X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23]; + InverseLT(); Ib4(X0, X1, X2, X3); + X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19]; + InverseLT(); Ib3(X0, X1, X2, X3); + X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15]; + InverseLT(); Ib2(X0, X1, X2, X3); + X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11]; + InverseLT(); Ib1(X0, X1, X2, X3); + X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7]; + InverseLT(); Ib0(X0, X1, X2, X3); + + Pack.UInt32_To_BE((uint)(X3 ^ wKey[3]), output, outOff); + Pack.UInt32_To_BE((uint)(X2 ^ wKey[2]), output, outOff + 4); + Pack.UInt32_To_BE((uint)(X1 ^ wKey[1]), output, outOff + 8); + Pack.UInt32_To_BE((uint)(X0 ^ wKey[0]), output, outOff + 12); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs.meta new file mode 100644 index 00000000..c6d4ca8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0d80feca5224db4aab72440f4aa82ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TnepresEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs new file mode 100644 index 00000000..f99214ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs @@ -0,0 +1,746 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * A class that provides Twofish encryption operations. + * + * This Java implementation is based on the Java reference + * implementation provided by Bruce Schneier and developed + * by Raif S. Naffah. + */ + public sealed class TwofishEngine + : IBlockCipher + { + private static readonly byte[,] P = { + { // p0 + (byte) 0xA9, (byte) 0x67, (byte) 0xB3, (byte) 0xE8, + (byte) 0x04, (byte) 0xFD, (byte) 0xA3, (byte) 0x76, + (byte) 0x9A, (byte) 0x92, (byte) 0x80, (byte) 0x78, + (byte) 0xE4, (byte) 0xDD, (byte) 0xD1, (byte) 0x38, + (byte) 0x0D, (byte) 0xC6, (byte) 0x35, (byte) 0x98, + (byte) 0x18, (byte) 0xF7, (byte) 0xEC, (byte) 0x6C, + (byte) 0x43, (byte) 0x75, (byte) 0x37, (byte) 0x26, + (byte) 0xFA, (byte) 0x13, (byte) 0x94, (byte) 0x48, + (byte) 0xF2, (byte) 0xD0, (byte) 0x8B, (byte) 0x30, + (byte) 0x84, (byte) 0x54, (byte) 0xDF, (byte) 0x23, + (byte) 0x19, (byte) 0x5B, (byte) 0x3D, (byte) 0x59, + (byte) 0xF3, (byte) 0xAE, (byte) 0xA2, (byte) 0x82, + (byte) 0x63, (byte) 0x01, (byte) 0x83, (byte) 0x2E, + (byte) 0xD9, (byte) 0x51, (byte) 0x9B, (byte) 0x7C, + (byte) 0xA6, (byte) 0xEB, (byte) 0xA5, (byte) 0xBE, + (byte) 0x16, (byte) 0x0C, (byte) 0xE3, (byte) 0x61, + (byte) 0xC0, (byte) 0x8C, (byte) 0x3A, (byte) 0xF5, + (byte) 0x73, (byte) 0x2C, (byte) 0x25, (byte) 0x0B, + (byte) 0xBB, (byte) 0x4E, (byte) 0x89, (byte) 0x6B, + (byte) 0x53, (byte) 0x6A, (byte) 0xB4, (byte) 0xF1, + (byte) 0xE1, (byte) 0xE6, (byte) 0xBD, (byte) 0x45, + (byte) 0xE2, (byte) 0xF4, (byte) 0xB6, (byte) 0x66, + (byte) 0xCC, (byte) 0x95, (byte) 0x03, (byte) 0x56, + (byte) 0xD4, (byte) 0x1C, (byte) 0x1E, (byte) 0xD7, + (byte) 0xFB, (byte) 0xC3, (byte) 0x8E, (byte) 0xB5, + (byte) 0xE9, (byte) 0xCF, (byte) 0xBF, (byte) 0xBA, + (byte) 0xEA, (byte) 0x77, (byte) 0x39, (byte) 0xAF, + (byte) 0x33, (byte) 0xC9, (byte) 0x62, (byte) 0x71, + (byte) 0x81, (byte) 0x79, (byte) 0x09, (byte) 0xAD, + (byte) 0x24, (byte) 0xCD, (byte) 0xF9, (byte) 0xD8, + (byte) 0xE5, (byte) 0xC5, (byte) 0xB9, (byte) 0x4D, + (byte) 0x44, (byte) 0x08, (byte) 0x86, (byte) 0xE7, + (byte) 0xA1, (byte) 0x1D, (byte) 0xAA, (byte) 0xED, + (byte) 0x06, (byte) 0x70, (byte) 0xB2, (byte) 0xD2, + (byte) 0x41, (byte) 0x7B, (byte) 0xA0, (byte) 0x11, + (byte) 0x31, (byte) 0xC2, (byte) 0x27, (byte) 0x90, + (byte) 0x20, (byte) 0xF6, (byte) 0x60, (byte) 0xFF, + (byte) 0x96, (byte) 0x5C, (byte) 0xB1, (byte) 0xAB, + (byte) 0x9E, (byte) 0x9C, (byte) 0x52, (byte) 0x1B, + (byte) 0x5F, (byte) 0x93, (byte) 0x0A, (byte) 0xEF, + (byte) 0x91, (byte) 0x85, (byte) 0x49, (byte) 0xEE, + (byte) 0x2D, (byte) 0x4F, (byte) 0x8F, (byte) 0x3B, + (byte) 0x47, (byte) 0x87, (byte) 0x6D, (byte) 0x46, + (byte) 0xD6, (byte) 0x3E, (byte) 0x69, (byte) 0x64, + (byte) 0x2A, (byte) 0xCE, (byte) 0xCB, (byte) 0x2F, + (byte) 0xFC, (byte) 0x97, (byte) 0x05, (byte) 0x7A, + (byte) 0xAC, (byte) 0x7F, (byte) 0xD5, (byte) 0x1A, + (byte) 0x4B, (byte) 0x0E, (byte) 0xA7, (byte) 0x5A, + (byte) 0x28, (byte) 0x14, (byte) 0x3F, (byte) 0x29, + (byte) 0x88, (byte) 0x3C, (byte) 0x4C, (byte) 0x02, + (byte) 0xB8, (byte) 0xDA, (byte) 0xB0, (byte) 0x17, + (byte) 0x55, (byte) 0x1F, (byte) 0x8A, (byte) 0x7D, + (byte) 0x57, (byte) 0xC7, (byte) 0x8D, (byte) 0x74, + (byte) 0xB7, (byte) 0xC4, (byte) 0x9F, (byte) 0x72, + (byte) 0x7E, (byte) 0x15, (byte) 0x22, (byte) 0x12, + (byte) 0x58, (byte) 0x07, (byte) 0x99, (byte) 0x34, + (byte) 0x6E, (byte) 0x50, (byte) 0xDE, (byte) 0x68, + (byte) 0x65, (byte) 0xBC, (byte) 0xDB, (byte) 0xF8, + (byte) 0xC8, (byte) 0xA8, (byte) 0x2B, (byte) 0x40, + (byte) 0xDC, (byte) 0xFE, (byte) 0x32, (byte) 0xA4, + (byte) 0xCA, (byte) 0x10, (byte) 0x21, (byte) 0xF0, + (byte) 0xD3, (byte) 0x5D, (byte) 0x0F, (byte) 0x00, + (byte) 0x6F, (byte) 0x9D, (byte) 0x36, (byte) 0x42, + (byte) 0x4A, (byte) 0x5E, (byte) 0xC1, (byte) 0xE0 }, + { // p1 + (byte) 0x75, (byte) 0xF3, (byte) 0xC6, (byte) 0xF4, + (byte) 0xDB, (byte) 0x7B, (byte) 0xFB, (byte) 0xC8, + (byte) 0x4A, (byte) 0xD3, (byte) 0xE6, (byte) 0x6B, + (byte) 0x45, (byte) 0x7D, (byte) 0xE8, (byte) 0x4B, + (byte) 0xD6, (byte) 0x32, (byte) 0xD8, (byte) 0xFD, + (byte) 0x37, (byte) 0x71, (byte) 0xF1, (byte) 0xE1, + (byte) 0x30, (byte) 0x0F, (byte) 0xF8, (byte) 0x1B, + (byte) 0x87, (byte) 0xFA, (byte) 0x06, (byte) 0x3F, + (byte) 0x5E, (byte) 0xBA, (byte) 0xAE, (byte) 0x5B, + (byte) 0x8A, (byte) 0x00, (byte) 0xBC, (byte) 0x9D, + (byte) 0x6D, (byte) 0xC1, (byte) 0xB1, (byte) 0x0E, + (byte) 0x80, (byte) 0x5D, (byte) 0xD2, (byte) 0xD5, + (byte) 0xA0, (byte) 0x84, (byte) 0x07, (byte) 0x14, + (byte) 0xB5, (byte) 0x90, (byte) 0x2C, (byte) 0xA3, + (byte) 0xB2, (byte) 0x73, (byte) 0x4C, (byte) 0x54, + (byte) 0x92, (byte) 0x74, (byte) 0x36, (byte) 0x51, + (byte) 0x38, (byte) 0xB0, (byte) 0xBD, (byte) 0x5A, + (byte) 0xFC, (byte) 0x60, (byte) 0x62, (byte) 0x96, + (byte) 0x6C, (byte) 0x42, (byte) 0xF7, (byte) 0x10, + (byte) 0x7C, (byte) 0x28, (byte) 0x27, (byte) 0x8C, + (byte) 0x13, (byte) 0x95, (byte) 0x9C, (byte) 0xC7, + (byte) 0x24, (byte) 0x46, (byte) 0x3B, (byte) 0x70, + (byte) 0xCA, (byte) 0xE3, (byte) 0x85, (byte) 0xCB, + (byte) 0x11, (byte) 0xD0, (byte) 0x93, (byte) 0xB8, + (byte) 0xA6, (byte) 0x83, (byte) 0x20, (byte) 0xFF, + (byte) 0x9F, (byte) 0x77, (byte) 0xC3, (byte) 0xCC, + (byte) 0x03, (byte) 0x6F, (byte) 0x08, (byte) 0xBF, + (byte) 0x40, (byte) 0xE7, (byte) 0x2B, (byte) 0xE2, + (byte) 0x79, (byte) 0x0C, (byte) 0xAA, (byte) 0x82, + (byte) 0x41, (byte) 0x3A, (byte) 0xEA, (byte) 0xB9, + (byte) 0xE4, (byte) 0x9A, (byte) 0xA4, (byte) 0x97, + (byte) 0x7E, (byte) 0xDA, (byte) 0x7A, (byte) 0x17, + (byte) 0x66, (byte) 0x94, (byte) 0xA1, (byte) 0x1D, + (byte) 0x3D, (byte) 0xF0, (byte) 0xDE, (byte) 0xB3, + (byte) 0x0B, (byte) 0x72, (byte) 0xA7, (byte) 0x1C, + (byte) 0xEF, (byte) 0xD1, (byte) 0x53, (byte) 0x3E, + (byte) 0x8F, (byte) 0x33, (byte) 0x26, (byte) 0x5F, + (byte) 0xEC, (byte) 0x76, (byte) 0x2A, (byte) 0x49, + (byte) 0x81, (byte) 0x88, (byte) 0xEE, (byte) 0x21, + (byte) 0xC4, (byte) 0x1A, (byte) 0xEB, (byte) 0xD9, + (byte) 0xC5, (byte) 0x39, (byte) 0x99, (byte) 0xCD, + (byte) 0xAD, (byte) 0x31, (byte) 0x8B, (byte) 0x01, + (byte) 0x18, (byte) 0x23, (byte) 0xDD, (byte) 0x1F, + (byte) 0x4E, (byte) 0x2D, (byte) 0xF9, (byte) 0x48, + (byte) 0x4F, (byte) 0xF2, (byte) 0x65, (byte) 0x8E, + (byte) 0x78, (byte) 0x5C, (byte) 0x58, (byte) 0x19, + (byte) 0x8D, (byte) 0xE5, (byte) 0x98, (byte) 0x57, + (byte) 0x67, (byte) 0x7F, (byte) 0x05, (byte) 0x64, + (byte) 0xAF, (byte) 0x63, (byte) 0xB6, (byte) 0xFE, + (byte) 0xF5, (byte) 0xB7, (byte) 0x3C, (byte) 0xA5, + (byte) 0xCE, (byte) 0xE9, (byte) 0x68, (byte) 0x44, + (byte) 0xE0, (byte) 0x4D, (byte) 0x43, (byte) 0x69, + (byte) 0x29, (byte) 0x2E, (byte) 0xAC, (byte) 0x15, + (byte) 0x59, (byte) 0xA8, (byte) 0x0A, (byte) 0x9E, + (byte) 0x6E, (byte) 0x47, (byte) 0xDF, (byte) 0x34, + (byte) 0x35, (byte) 0x6A, (byte) 0xCF, (byte) 0xDC, + (byte) 0x22, (byte) 0xC9, (byte) 0xC0, (byte) 0x9B, + (byte) 0x89, (byte) 0xD4, (byte) 0xED, (byte) 0xAB, + (byte) 0x12, (byte) 0xA2, (byte) 0x0D, (byte) 0x52, + (byte) 0xBB, (byte) 0x02, (byte) 0x2F, (byte) 0xA9, + (byte) 0xD7, (byte) 0x61, (byte) 0x1E, (byte) 0xB4, + (byte) 0x50, (byte) 0x04, (byte) 0xF6, (byte) 0xC2, + (byte) 0x16, (byte) 0x25, (byte) 0x86, (byte) 0x56, + (byte) 0x55, (byte) 0x09, (byte) 0xBE, (byte) 0x91 } + }; + + /** + * Define the fixed p0/p1 permutations used in keyed S-box lookup. + * By changing the following constant definitions, the S-boxes will + * automatically Get changed in the Twofish engine. + */ + private const int P_00 = 1; + private const int P_01 = 0; + private const int P_02 = 0; + private const int P_03 = P_01 ^ 1; + private const int P_04 = 1; + + private const int P_10 = 0; + private const int P_11 = 0; + private const int P_12 = 1; + private const int P_13 = P_11 ^ 1; + private const int P_14 = 0; + + private const int P_20 = 1; + private const int P_21 = 1; + private const int P_22 = 0; + private const int P_23 = P_21 ^ 1; + private const int P_24 = 0; + + private const int P_30 = 0; + private const int P_31 = 1; + private const int P_32 = 1; + private const int P_33 = P_31 ^ 1; + private const int P_34 = 1; + + /* Primitive polynomial for GF(256) */ + private const int GF256_FDBK = 0x169; + private const int GF256_FDBK_2 = GF256_FDBK / 2; + private const int GF256_FDBK_4 = GF256_FDBK / 4; + + private const int RS_GF_FDBK = 0x14D; // field generator + + //==================================== + // Useful constants + //==================================== + + private const int ROUNDS = 16; + private const int MAX_ROUNDS = 16; // bytes = 128 bits + private const int BLOCK_SIZE = 16; // bytes = 128 bits + private const int MAX_KEY_BITS = 256; + + private const int INPUT_WHITEN=0; + private const int OUTPUT_WHITEN=INPUT_WHITEN+BLOCK_SIZE/4; // 4 + private const int ROUND_SUBKEYS=OUTPUT_WHITEN+BLOCK_SIZE/4;// 8 + + private const int TOTAL_SUBKEYS=ROUND_SUBKEYS+2*MAX_ROUNDS;// 40 + + private const int SK_STEP = 0x02020202; + private const int SK_BUMP = 0x01010101; + private const int SK_ROTL = 9; + + private bool encrypting; + + private int[] gMDS0 = new int[MAX_KEY_BITS]; + private int[] gMDS1 = new int[MAX_KEY_BITS]; + private int[] gMDS2 = new int[MAX_KEY_BITS]; + private int[] gMDS3 = new int[MAX_KEY_BITS]; + + /** + * gSubKeys[] and gSBox[] are eventually used in the + * encryption and decryption methods. + */ + private int[] gSubKeys; + private int[] gSBox; + + private int k64Cnt; + + private byte[] workingKey; + + public TwofishEngine() + { + // calculate the MDS matrix + int[] m1 = new int[2]; + int[] mX = new int[2]; + int[] mY = new int[2]; + int j; + + for (int i=0; i< MAX_KEY_BITS ; i++) + { + j = P[0,i] & 0xff; + m1[0] = j; + mX[0] = Mx_X(j) & 0xff; + mY[0] = Mx_Y(j) & 0xff; + + j = P[1,i] & 0xff; + m1[1] = j; + mX[1] = Mx_X(j) & 0xff; + mY[1] = Mx_Y(j) & 0xff; + + gMDS0[i] = m1[P_00] | mX[P_00] << 8 | + mY[P_00] << 16 | mY[P_00] << 24; + + gMDS1[i] = mY[P_10] | mY[P_10] << 8 | + mX[P_10] << 16 | m1[P_10] << 24; + + gMDS2[i] = mX[P_20] | mY[P_20] << 8 | + m1[P_20] << 16 | mY[P_20] << 24; + + gMDS3[i] = mX[P_30] | m1[P_30] << 8 | + mY[P_30] << 16 | mX[P_30] << 24; + } + } + + /** + * initialise a Twofish cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + throw new ArgumentException("invalid parameter passed to Twofish init - " + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + this.encrypting = forEncryption; + this.workingKey = ((KeyParameter)parameters).GetKey(); + + int keyBits = this.workingKey.Length * 8; + switch (keyBits) + { + case 128: + case 192: + case 256: + break; + default: + throw new ArgumentException("Key length not 128/192/256 bits."); + } + + this.k64Cnt = this.workingKey.Length / 8; + SetKey(this.workingKey); + } + + public string AlgorithmName + { + get { return "Twofish"; } + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (workingKey == null) + throw new InvalidOperationException("Twofish not initialised"); + + Check.DataLength(input, inOff, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, outOff, BLOCK_SIZE, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (encrypting) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); + } +#else + if (encrypting) + { + EncryptBlock(input, inOff, output, outOff); + } + else + { + DecryptBlock(input, inOff, output, outOff); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + if (workingKey == null) + throw new InvalidOperationException("Twofish not initialised"); + + Check.DataLength(input, BLOCK_SIZE, "input buffer too short"); + Check.OutputLength(output, BLOCK_SIZE, "output buffer too short"); + + if (encrypting) + { + EncryptBlock(input, output); + } + else + { + DecryptBlock(input, output); + } + + return BLOCK_SIZE; + } +#endif + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + //================================== + // Private Implementation + //================================== + + private void SetKey(byte[] key) + { + int[] k32e = new int[MAX_KEY_BITS/64]; // 4 + int[] k32o = new int[MAX_KEY_BITS/64]; // 4 + + int[] sBoxKeys = new int[MAX_KEY_BITS/64]; // 4 + gSubKeys = new int[TOTAL_SUBKEYS]; + + /* + * k64Cnt is the number of 8 byte blocks (64 chunks) that are in the input key. + * The input key is 16, 24 or 32 bytes, so the range for k64Cnt is 2..4 + */ + for (int i = 0; i < k64Cnt; i++) + { + int p = i * 8; + + k32e[i] = (int)Pack.LE_To_UInt32(key, p); + k32o[i] = (int)Pack.LE_To_UInt32(key, p + 4); + + sBoxKeys[k64Cnt-1-i] = RS_MDS_Encode(k32e[i], k32o[i]); + } + + int q,A,B; + for (int i=0; i < TOTAL_SUBKEYS / 2 ; i++) + { + q = i*SK_STEP; + A = F32(q, k32e); + B = F32(q+SK_BUMP, k32o); + B = Integers.RotateLeft(B, 8); + A += B; + gSubKeys[i*2] = A; + A += B; + gSubKeys[i*2 + 1] = Integers.RotateLeft(A, SK_ROTL); + } + + /* + * fully expand the table for speed + */ + int k0 = sBoxKeys[0]; + int k1 = sBoxKeys[1]; + int k2 = sBoxKeys[2]; + int k3 = sBoxKeys[3]; + int b0, b1, b2, b3; + gSBox = new int[4*MAX_KEY_BITS]; + for (int i=0; i input, Span output) + { + int x0 = (int)Pack.LE_To_UInt32(input) ^ gSubKeys[INPUT_WHITEN]; + int x1 = (int)Pack.LE_To_UInt32(input[4..]) ^ gSubKeys[INPUT_WHITEN + 1]; + int x2 = (int)Pack.LE_To_UInt32(input[8..]) ^ gSubKeys[INPUT_WHITEN + 2]; + int x3 = (int)Pack.LE_To_UInt32(input[12..]) ^ gSubKeys[INPUT_WHITEN + 3]; + + int k = ROUND_SUBKEYS; + int t0, t1; + for (int r = 0; r < ROUNDS; r +=2) + { + t0 = Fe32_0(x0); + t1 = Fe32_3(x1); + x2 ^= t0 + t1 + gSubKeys[k++]; + x2 = Integers.RotateRight(x2, 1); + x3 = Integers.RotateLeft(x3, 1) ^ (t0 + 2*t1 + gSubKeys[k++]); + + t0 = Fe32_0(x2); + t1 = Fe32_3(x3); + x0 ^= t0 + t1 + gSubKeys[k++]; + x0 = Integers.RotateRight(x0, 1); + x1 = Integers.RotateLeft(x1, 1) ^ (t0 + 2*t1 + gSubKeys[k++]); + } + + Pack.UInt32_To_LE((uint)(x2 ^ gSubKeys[OUTPUT_WHITEN]), output); + Pack.UInt32_To_LE((uint)(x3 ^ gSubKeys[OUTPUT_WHITEN + 1]), output[4..]); + Pack.UInt32_To_LE((uint)(x0 ^ gSubKeys[OUTPUT_WHITEN + 2]), output[8..]); + Pack.UInt32_To_LE((uint)(x1 ^ gSubKeys[OUTPUT_WHITEN + 3]), output[12..]); + } + + /** + * Decrypt the given input starting at the given offset and place + * the result in the provided buffer starting at the given offset. + * The input will be an exact multiple of our blocksize. + */ + private void DecryptBlock(ReadOnlySpan input, Span output) + { + int x2 = (int)Pack.LE_To_UInt32(input) ^ gSubKeys[OUTPUT_WHITEN]; + int x3 = (int)Pack.LE_To_UInt32(input[4..]) ^ gSubKeys[OUTPUT_WHITEN + 1]; + int x0 = (int)Pack.LE_To_UInt32(input[8..]) ^ gSubKeys[OUTPUT_WHITEN + 2]; + int x1 = (int)Pack.LE_To_UInt32(input[12..]) ^ gSubKeys[OUTPUT_WHITEN + 3]; + + int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; + int t0, t1; + for (int r = 0; r< ROUNDS ; r +=2) + { + t0 = Fe32_0(x2); + t1 = Fe32_3(x3); + x1 ^= t0 + 2*t1 + gSubKeys[k--]; + x0 = Integers.RotateLeft(x0, 1) ^ (t0 + t1 + gSubKeys[k--]); + x1 = Integers.RotateRight(x1, 1); + + t0 = Fe32_0(x0); + t1 = Fe32_3(x1); + x3 ^= t0 + 2*t1 + gSubKeys[k--]; + x2 = Integers.RotateLeft(x2, 1) ^ (t0 + t1 + gSubKeys[k--]); + x3 = Integers.RotateRight(x3, 1); + } + + Pack.UInt32_To_LE((uint)(x0 ^ gSubKeys[INPUT_WHITEN]), output); + Pack.UInt32_To_LE((uint)(x1 ^ gSubKeys[INPUT_WHITEN + 1]), output[4..]); + Pack.UInt32_To_LE((uint)(x2 ^ gSubKeys[INPUT_WHITEN + 2]), output[8..]); + Pack.UInt32_To_LE((uint)(x3 ^ gSubKeys[INPUT_WHITEN + 3]), output[12..]); + } +#else + /** + * Encrypt the given input starting at the given offset and place + * the result in the provided buffer starting at the given offset. + * The input will be an exact multiple of our blocksize. + * + * encryptBlock uses the pre-calculated gSBox[] and subKey[] + * arrays. + */ + private void EncryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + int x0 = (int)Pack.LE_To_UInt32(src, srcIndex) ^ gSubKeys[INPUT_WHITEN]; + int x1 = (int)Pack.LE_To_UInt32(src, srcIndex + 4) ^ gSubKeys[INPUT_WHITEN + 1]; + int x2 = (int)Pack.LE_To_UInt32(src, srcIndex + 8) ^ gSubKeys[INPUT_WHITEN + 2]; + int x3 = (int)Pack.LE_To_UInt32(src, srcIndex + 12) ^ gSubKeys[INPUT_WHITEN + 3]; + + int k = ROUND_SUBKEYS; + int t0, t1; + for (int r = 0; r < ROUNDS; r +=2) + { + t0 = Fe32_0(x0); + t1 = Fe32_3(x1); + x2 ^= t0 + t1 + gSubKeys[k++]; + x2 = Integers.RotateRight(x2, 1); + x3 = Integers.RotateLeft(x3, 1) ^ (t0 + 2*t1 + gSubKeys[k++]); + + t0 = Fe32_0(x2); + t1 = Fe32_3(x3); + x0 ^= t0 + t1 + gSubKeys[k++]; + x0 = Integers.RotateRight(x0, 1); + x1 = Integers.RotateLeft(x1, 1) ^ (t0 + 2*t1 + gSubKeys[k++]); + } + + Pack.UInt32_To_LE((uint)(x2 ^ gSubKeys[OUTPUT_WHITEN]), dst, dstIndex); + Pack.UInt32_To_LE((uint)(x3 ^ gSubKeys[OUTPUT_WHITEN + 1]), dst, dstIndex + 4); + Pack.UInt32_To_LE((uint)(x0 ^ gSubKeys[OUTPUT_WHITEN + 2]), dst, dstIndex + 8); + Pack.UInt32_To_LE((uint)(x1 ^ gSubKeys[OUTPUT_WHITEN + 3]), dst, dstIndex + 12); + } + + /** + * Decrypt the given input starting at the given offset and place + * the result in the provided buffer starting at the given offset. + * The input will be an exact multiple of our blocksize. + */ + private void DecryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) + { + int x2 = (int)Pack.LE_To_UInt32(src, srcIndex) ^ gSubKeys[OUTPUT_WHITEN]; + int x3 = (int)Pack.LE_To_UInt32(src, srcIndex + 4) ^ gSubKeys[OUTPUT_WHITEN + 1]; + int x0 = (int)Pack.LE_To_UInt32(src, srcIndex + 8) ^ gSubKeys[OUTPUT_WHITEN + 2]; + int x1 = (int)Pack.LE_To_UInt32(src, srcIndex + 12) ^ gSubKeys[OUTPUT_WHITEN + 3]; + + int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; + int t0, t1; + for (int r = 0; r < ROUNDS ; r += 2) + { + t0 = Fe32_0(x2); + t1 = Fe32_3(x3); + x1 ^= t0 + 2*t1 + gSubKeys[k--]; + x0 = Integers.RotateLeft(x0, 1) ^ (t0 + t1 + gSubKeys[k--]); + x1 = Integers.RotateRight(x1, 1); + + t0 = Fe32_0(x0); + t1 = Fe32_3(x1); + x3 ^= t0 + 2*t1 + gSubKeys[k--]; + x2 = Integers.RotateLeft(x2, 1) ^ (t0 + t1 + gSubKeys[k--]); + x3 = Integers.RotateRight(x3, 1); + } + + Pack.UInt32_To_LE((uint)(x0 ^ gSubKeys[INPUT_WHITEN]), dst, dstIndex); + Pack.UInt32_To_LE((uint)(x1 ^ gSubKeys[INPUT_WHITEN + 1]), dst, dstIndex + 4); + Pack.UInt32_To_LE((uint)(x2 ^ gSubKeys[INPUT_WHITEN + 2]), dst, dstIndex + 8); + Pack.UInt32_To_LE((uint)(x3 ^ gSubKeys[INPUT_WHITEN + 3]), dst, dstIndex + 12); + } +#endif + + /* + * TODO: This can be optimised and made cleaner by combining + * the functionality in this function and applying it appropriately + * to the creation of the subkeys during key setup. + */ + private int F32(int x, int[] k32) + { + int b0 = M_b0(x); + int b1 = M_b1(x); + int b2 = M_b2(x); + int b3 = M_b3(x); + int k0 = k32[0]; + int k1 = k32[1]; + int k2 = k32[2]; + int k3 = k32[3]; + + int result = 0; + switch (k64Cnt & 3) + { + case 1: + result = gMDS0[(P[P_01,b0] & 0xff) ^ M_b0(k0)] ^ + gMDS1[(P[P_11,b1] & 0xff) ^ M_b1(k0)] ^ + gMDS2[(P[P_21,b2] & 0xff) ^ M_b2(k0)] ^ + gMDS3[(P[P_31,b3] & 0xff) ^ M_b3(k0)]; + break; + case 0: /* 256 bits of key */ + b0 = (P[P_04,b0] & 0xff) ^ M_b0(k3); + b1 = (P[P_14,b1] & 0xff) ^ M_b1(k3); + b2 = (P[P_24,b2] & 0xff) ^ M_b2(k3); + b3 = (P[P_34,b3] & 0xff) ^ M_b3(k3); + goto case 3; + case 3: + b0 = (P[P_03,b0] & 0xff) ^ M_b0(k2); + b1 = (P[P_13,b1] & 0xff) ^ M_b1(k2); + b2 = (P[P_23,b2] & 0xff) ^ M_b2(k2); + b3 = (P[P_33,b3] & 0xff) ^ M_b3(k2); + goto case 2; + case 2: + result = + gMDS0[(P[P_01,(P[P_02,b0]&0xff)^M_b0(k1)]&0xff)^M_b0(k0)] ^ + gMDS1[(P[P_11,(P[P_12,b1]&0xff)^M_b1(k1)]&0xff)^M_b1(k0)] ^ + gMDS2[(P[P_21,(P[P_22,b2]&0xff)^M_b2(k1)]&0xff)^M_b2(k0)] ^ + gMDS3[(P[P_31,(P[P_32,b3]&0xff)^M_b3(k1)]&0xff)^M_b3(k0)]; + break; + } + return result; + } + + /** + * Use (12, 8) Reed-Solomon code over GF(256) to produce + * a key S-box 32-bit entity from 2 key material 32-bit + * entities. + * + * @param k0 first 32-bit entity + * @param k1 second 32-bit entity + * @return Remainder polynomial Generated using RS code + */ + private int RS_MDS_Encode(int k0, int k1) + { + int r = k1; + for (int i = 0 ; i < 4 ; i++) // shift 1 byte at a time + { + r = RS_rem(r); + } + r ^= k0; + for (int i=0 ; i < 4 ; i++) + { + r = RS_rem(r); + } + + return r; + } + + /** + * Reed-Solomon code parameters: (12,8) reversible code: + *

+ *

+        * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
+        * 
+ * where a = primitive root of field generator 0x14D + *

+ */ + private int RS_rem(int x) + { + int b = (int) (((uint)x >> 24) & 0xff); + int g2 = ((b << 1) ^ + ((b & 0x80) != 0 ? RS_GF_FDBK : 0)) & 0xff; + int g3 = ( (int)((uint)b >> 1) ^ + ((b & 0x01) != 0 ? (int)((uint)RS_GF_FDBK >> 1) : 0)) ^ g2 ; + return ((x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b); + } + + private int LFSR1(int x) + { + return (x >> 1) ^ + (((x & 0x01) != 0) ? GF256_FDBK_2 : 0); + } + + private int LFSR2(int x) + { + return (x >> 2) ^ + (((x & 0x02) != 0) ? GF256_FDBK_2 : 0) ^ + (((x & 0x01) != 0) ? GF256_FDBK_4 : 0); + } + + private int Mx_X(int x) + { + return x ^ LFSR2(x); + } // 5B + + private int Mx_Y(int x) + { + return x ^ LFSR1(x) ^ LFSR2(x); + } // EF + + private int M_b0(int x) + { + return x & 0xff; + } + + private int M_b1(int x) + { + return (int)((uint)x >> 8) & 0xff; + } + + private int M_b2(int x) + { + return (int)((uint)x >> 16) & 0xff; + } + + private int M_b3(int x) + { + return (int)((uint)x >> 24) & 0xff; + } + + private int Fe32_0(int x) + { + return gSBox[ 0x000 + 2*(x & 0xff) ] ^ + gSBox[ 0x001 + 2*((int)((uint)x >> 8) & 0xff) ] ^ + gSBox[ 0x200 + 2*((int)((uint)x >> 16) & 0xff) ] ^ + gSBox[ 0x201 + 2*((int)((uint)x >> 24) & 0xff) ]; + } + + private int Fe32_3(int x) + { + return gSBox[ 0x000 + 2*((int)((uint)x >> 24) & 0xff) ] ^ + gSBox[ 0x001 + 2*(x & 0xff) ] ^ + gSBox[ 0x200 + 2*((int)((uint)x >> 8) & 0xff) ] ^ + gSBox[ 0x201 + 2*((int)((uint)x >> 16) & 0xff) ]; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs.meta new file mode 100644 index 00000000..8b507395 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9af5a4f6d08424842b0758cf0d6d85cb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/TwofishEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs new file mode 100644 index 00000000..633598cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs @@ -0,0 +1,160 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public class VmpcEngine + : IStreamCipher + { + /* + * variables to hold the state of the VMPC engine during encryption and + * decryption + */ + protected byte n = 0; + protected byte[] P = null; + protected byte s = 0; + + protected byte[] workingIV; + protected byte[] workingKey; + + public virtual string AlgorithmName + { + get { return "VMPC"; } + } + + /** + * initialise a VMPC cipher. + * + * @param forEncryption + * whether or not we are for encryption. + * @param params + * the parameters required to set up the cipher. + * @exception ArgumentException + * if the params argument is inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is ParametersWithIV)) + throw new ArgumentException("VMPC Init parameters must include an IV"); + + ParametersWithIV ivParams = (ParametersWithIV) parameters; + + if (!(ivParams.Parameters is KeyParameter)) + throw new ArgumentException("VMPC Init parameters must include a key"); + + KeyParameter key = (KeyParameter)ivParams.Parameters; + + this.workingIV = ivParams.GetIV(); + + if (workingIV == null || workingIV.Length < 1 || workingIV.Length > 768) + throw new ArgumentException("VMPC requires 1 to 768 bytes of IV"); + + this.workingKey = key.GetKey(); + + InitKey(this.workingKey, this.workingIV); + } + + protected virtual void InitKey( + byte[] keyBytes, + byte[] ivBytes) + { + s = 0; + P = new byte[256]; + for (int i = 0; i < 256; i++) + { + P[i] = (byte) i; + } + + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + keyBytes[m % keyBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + ivBytes[m % ivBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + n = 0; + } + + public virtual void ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] output, + int outOff) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + + for (int i = 0; i < len; i++) + { + byte pn = P[n]; + s = P[(s + pn) & 0xff]; + byte ps = P[s]; + byte z = P[(P[ps] + 1) & 0xff]; + // encryption + P[n] = ps; + P[s] = pn; + n = (byte)(n + 1); + + // xor + output[i + outOff] = (byte)(input[i + inOff] ^ z); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; i++) + { + byte pn = P[n]; + s = P[(s + pn) & 0xff]; + byte ps = P[s]; + byte z = P[(P[ps] + 1) & 0xff]; + // encryption + P[n] = ps; + P[s] = pn; + n = (byte)(n + 1); + + // xor + output[i] = (byte)(input[i] ^ z); + } + } +#endif + + public virtual void Reset() + { + InitKey(this.workingKey, this.workingIV); + } + + public virtual byte ReturnByte( + byte input) + { + s = P[(s + P[n & 0xff]) & 0xff]; + byte z = P[(P[(P[s & 0xff]) & 0xff] + 1) & 0xff]; + // encryption + byte temp = P[n & 0xff]; + P[n & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + n = (byte) ((n + 1) & 0xff); + + // xor + return (byte) (input ^ z); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs.meta new file mode 100644 index 00000000..211bf763 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43029add2a40bcc4d985432dc9cfdbd8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs new file mode 100644 index 00000000..e090d184 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + public class VmpcKsa3Engine + : VmpcEngine + { + public override string AlgorithmName + { + get { return "VMPC-KSA3"; } + } + + protected override void InitKey( + byte[] keyBytes, + byte[] ivBytes) + { + s = 0; + P = new byte[256]; + for (int i = 0; i < 256; i++) + { + P[i] = (byte) i; + } + + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + keyBytes[m % keyBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + ivBytes[m % ivBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + keyBytes[m % keyBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + n = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs.meta new file mode 100644 index 00000000..9ab29428 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91e177c19e3ae4d40812835c5966d29b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/VMPCKSA3Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs new file mode 100644 index 00000000..df7769b1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs @@ -0,0 +1,68 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /// + /// Implementation of Daniel J. Bernstein's XSalsa20 stream cipher - Salsa20 with an extended nonce. + /// + /// + /// XSalsa20 requires a 256 bit key, and a 192 bit nonce. + /// + public class XSalsa20Engine + : Salsa20Engine + { + public override string AlgorithmName + { + get { return "XSalsa20"; } + } + + protected override int NonceSize + { + get { return 24; } + } + + /// + /// XSalsa20 key generation: process 256 bit input key and 128 bits of the input nonce + /// using a core Salsa20 function without input addition to produce 256 bit working key + /// and use that with the remaining 64 bits of nonce to initialize a standard Salsa20 engine state. + /// + protected override void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes == null) + throw new ArgumentException(AlgorithmName + " doesn't support re-init with null key"); + + if (keyBytes.Length != 32) + throw new ArgumentException(AlgorithmName + " requires a 256 bit key"); + + // Set key for HSalsa20 + base.SetKey(keyBytes, ivBytes); + + // Pack next 64 bits of IV into engine state instead of counter + Pack.LE_To_UInt32(ivBytes, 8, engineState, 8, 2); + + // Process engine state to generate Salsa20 key + uint[] hsalsa20Out = new uint[engineState.Length]; + SalsaCore(20, engineState, hsalsa20Out); + + // Set new key, removing addition in last round of salsaCore + engineState[1] = hsalsa20Out[0] - engineState[0]; + engineState[2] = hsalsa20Out[5] - engineState[5]; + engineState[3] = hsalsa20Out[10] - engineState[10]; + engineState[4] = hsalsa20Out[15] - engineState[15]; + + engineState[11] = hsalsa20Out[6] - engineState[6]; + engineState[12] = hsalsa20Out[7] - engineState[7]; + engineState[13] = hsalsa20Out[8] - engineState[8]; + engineState[14] = hsalsa20Out[9] - engineState[9]; + + // Last 64 bits of input IV + Pack.LE_To_UInt32(ivBytes, 16, engineState, 6, 2); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs.meta new file mode 100644 index 00000000..3c189af0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3f8f6965f1ecb4f4ea1ddd361c65d600 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XSalsa20Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs new file mode 100644 index 00000000..d63216c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs @@ -0,0 +1,207 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines +{ + /** + * An XTEA engine. + */ + public class XteaEngine + : IBlockCipher + { + private const int + rounds = 32, + block_size = 8, +// key_size = 16, + delta = unchecked((int) 0x9E3779B9); + + /* + * the expanded key array of 4 subkeys + */ + private uint[] _S = new uint[4], + _sum0 = new uint[32], + _sum1 = new uint[32]; + private bool _initialised, _forEncryption; + + /** + * Create an instance of the TEA encryption algorithm + * and set some defaults + */ + public XteaEngine() + { + _initialised = false; + } + + public virtual string AlgorithmName + { + get { return "XTEA"; } + } + + public virtual int GetBlockSize() + { + return block_size; + } + + /** + * initialise + * + * @param forEncryption whether or not we are for encryption. + * @param params the parameters required to set up the cipher. + * @exception ArgumentException if the params argument is + * inappropriate. + */ + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + if (!(parameters is KeyParameter)) + { + throw new ArgumentException("invalid parameter passed to TEA init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + + _forEncryption = forEncryption; + _initialised = true; + + KeyParameter p = (KeyParameter) parameters; + + setKey(p.GetKey()); + } + + public virtual int ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(inBytes, inOff, block_size, "input buffer too short"); + Check.OutputLength(outBytes, outOff, block_size, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return _forEncryption + ? EncryptBlock(inBytes.AsSpan(inOff), outBytes.AsSpan(outOff)) + : DecryptBlock(inBytes.AsSpan(inOff), outBytes.AsSpan(outOff)); +#else + return _forEncryption + ? EncryptBlock(inBytes, inOff, outBytes, outOff) + : DecryptBlock(inBytes, inOff, outBytes, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + if (!_initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(input, block_size, "input buffer too short"); + Check.OutputLength(output, block_size, "output buffer too short"); + + return _forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * Re-key the cipher. + * + * @param key the key to be used + */ + private void setKey( + byte[] key) + { + int i, j; + for (i = j = 0; i < 4; i++,j+=4) + { + _S[i] = Pack.BE_To_UInt32(key, j); + } + + for (i = j = 0; i < rounds; i++) + { + _sum0[i] = ((uint)j + _S[j & 3]); + j += delta; + _sum1[i] = ((uint)j + _S[j >> 11 & 3]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(input); + uint v1 = Pack.BE_To_UInt32(input[4..]); + + for (int i = 0; i < rounds; i++) + { + v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; + v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; + } + + Pack.UInt32_To_BE(v0, output); + Pack.UInt32_To_BE(v1, output[4..]); + + return block_size; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(input); + uint v1 = Pack.BE_To_UInt32(input[4..]); + + for (int i = rounds - 1; i >= 0; i--) + { + v1 -= ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; + v0 -= ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; + } + + Pack.UInt32_To_BE(v0, output); + Pack.UInt32_To_BE(v1, output[4..]); + + return block_size; + } +#else + private int EncryptBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + uint v0 = Pack.BE_To_UInt32(inBytes, inOff); + uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); + + for (int i = 0; i < rounds; i++) + { + v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; + v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; + } + + Pack.UInt32_To_BE(v0, outBytes, outOff); + Pack.UInt32_To_BE(v1, outBytes, outOff + 4); + + return block_size; + } + + private int DecryptBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + // Pack bytes into integers + uint v0 = Pack.BE_To_UInt32(inBytes, inOff); + uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); + + for (int i = rounds-1; i >= 0; i--) + { + v1 -= ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; + v0 -= ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; + } + + Pack.UInt32_To_BE(v0, outBytes, outOff); + Pack.UInt32_To_BE(v1, outBytes, outOff + 4); + + return block_size; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs.meta new file mode 100644 index 00000000..910ccd64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d0de81fad0d5cd14b8444c776ca62984 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/engines/XTEAEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe.meta new file mode 100644 index 00000000..cce3e940 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5c130981bdc88dc48aba9689ba026fff +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs new file mode 100644 index 00000000..7a0cd7ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe +{ + /// Base class for format-preserving encryption. + public abstract class FpeEngine + { + protected readonly IBlockCipher baseCipher; + + protected bool forEncryption; + protected FpeParameters fpeParameters; + + protected FpeEngine(IBlockCipher baseCipher) + { + this.baseCipher = baseCipher; + } + + /// + /// Process length bytes from inBuf, writing the output to outBuf. + /// + /// number of bytes output. + /// input data. + /// offset in input data to start at. + /// number of bytes to process. + /// destination buffer. + /// offset to start writing at in destination buffer. + public virtual int ProcessBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff) + { + if (fpeParameters == null) + throw new InvalidOperationException("FPE engine not initialized"); + if (length < 0) + throw new ArgumentException("cannot be negative", "length"); + if (inBuf == null) + throw new ArgumentNullException("inBuf"); + if (outBuf == null) + throw new ArgumentNullException("outBuf"); + + Check.DataLength(inBuf, inOff, length, "input buffer too short"); + Check.OutputLength(outBuf, outOff, length, "output buffer too short"); + + if (forEncryption) + { + return EncryptBlock(inBuf, inOff, length, outBuf, outOff); + } + else + { + return DecryptBlock(inBuf, inOff, length, outBuf, outOff); + } + } + + protected static bool IsOverrideSet(string propName) + { + string propValue = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(propName); + + return propValue != null && Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("true", propValue); + } + + /// + /// Initialize the FPE engine for encryption/decryption. + /// + /// number of bytes output. + /// true if initialising for encryption, false otherwise. + /// the key and other parameters to use to set the engine up. + public abstract void Init(bool forEncryption, ICipherParameters parameters); + + protected abstract int EncryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff); + + protected abstract int DecryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs.meta new file mode 100644 index 00000000..63b39e85 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c09add2853d8f06428bcf7939e06e656 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs new file mode 100644 index 00000000..b4985752 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe +{ + public class FpeFf1Engine + : FpeEngine + { + public FpeFf1Engine() + : this(AesUtilities.CreateEngine()) + { + } + + public FpeFf1Engine(IBlockCipher baseCipher) + : base(baseCipher) + { + if (IsOverrideSet(SP80038G.FPE_DISABLED) || + IsOverrideSet(SP80038G.FF1_DISABLED)) + { + throw new InvalidOperationException("FF1 encryption disabled"); + } + } + + public override void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + this.fpeParameters = (FpeParameters)parameters; + + baseCipher.Init(!fpeParameters.UseInverseFunction, fpeParameters.Key); + } + + protected override int EncryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff) + { + byte[] enc; + + if (fpeParameters.Radix > 256) + { + if ((length & 1) != 0) + throw new ArgumentException("input must be an even number of bytes for a wide radix"); + + ushort[] u16In = Pack.BE_To_UInt16(inBuf, inOff, length); + ushort[] u16Out = SP80038G.EncryptFF1w(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), + u16In, 0, u16In.Length); + enc = Pack.UInt16_To_BE(u16Out, 0, u16Out.Length); + } + else + { + enc = SP80038G.EncryptFF1(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), inBuf, inOff, length); + } + + Array.Copy(enc, 0, outBuf, outOff, length); + + return length; + } + + protected override int DecryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff) + { + byte[] dec; + + if (fpeParameters.Radix > 256) + { + if ((length & 1) != 0) + throw new ArgumentException("input must be an even number of bytes for a wide radix"); + + ushort[] u16In = Pack.BE_To_UInt16(inBuf, inOff, length); + ushort[] u16Out = SP80038G.DecryptFF1w(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), + u16In, 0, u16In.Length); + dec = Pack.UInt16_To_BE(u16Out, 0, u16Out.Length); + } + else + { + dec = SP80038G.DecryptFF1(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), inBuf, inOff, length); + } + + Array.Copy(dec, 0, outBuf, outOff, length); + + return length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs.meta new file mode 100644 index 00000000..2aa868a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb7969d19010ba949b601c92fefb1dd4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf1Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs new file mode 100644 index 00000000..4b169667 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe +{ + public class FpeFf3_1Engine + : FpeEngine + { + public FpeFf3_1Engine() + : this(AesUtilities.CreateEngine()) + { + } + + public FpeFf3_1Engine(IBlockCipher baseCipher) + : base(baseCipher) + { + if (IsOverrideSet(SP80038G.FPE_DISABLED)) + { + throw new InvalidOperationException("FPE disabled"); + } + } + + public override void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + this.fpeParameters = (FpeParameters)parameters; + + baseCipher.Init(!fpeParameters.UseInverseFunction, new KeyParameter(Arrays.Reverse(fpeParameters.Key.GetKey()))); + + if (fpeParameters.GetTweak().Length != 7) + throw new ArgumentException("tweak should be 56 bits"); + } + + protected override int EncryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff) + { + byte[] enc; + + if (fpeParameters.Radix > 256) + { + if ((length & 1) != 0) + throw new ArgumentException("input must be an even number of bytes for a wide radix"); + + ushort[] u16In = Pack.BE_To_UInt16(inBuf, inOff, length); + ushort[] u16Out = SP80038G.EncryptFF3_1w(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), + u16In, 0, u16In.Length); + enc = Pack.UInt16_To_BE(u16Out, 0, u16Out.Length); + } + else + { + enc = SP80038G.EncryptFF3_1(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), inBuf, inOff, length); + } + + Array.Copy(enc, 0, outBuf, outOff, length); + + return length; + } + + protected override int DecryptBlock(byte[] inBuf, int inOff, int length, byte[] outBuf, int outOff) + { + byte[] dec; + + if (fpeParameters.Radix > 256) + { + if ((length & 1) != 0) + throw new ArgumentException("input must be an even number of bytes for a wide radix"); + + ushort[] u16In = Pack.BE_To_UInt16(inBuf, inOff, length); + ushort[] u16Out = SP80038G.DecryptFF3_1w(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), + u16In, 0, u16In.Length); + dec = Pack.UInt16_To_BE(u16Out, 0, u16Out.Length); + } + else + { + dec = SP80038G.DecryptFF3_1(baseCipher, fpeParameters.Radix, fpeParameters.GetTweak(), inBuf, inOff, length); + } + + Array.Copy(dec, 0, outBuf, outOff, length); + + return length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs.meta new file mode 100644 index 00000000..7de547a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fedb43d857f75ca41982635c3f8b841d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/FpeFf3_1Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs new file mode 100644 index 00000000..0d5225d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs @@ -0,0 +1,653 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Fpe +{ + /* + * SP800-38G Format-Preserving Encryption + * + * TODOs + * - Initialize the cipher internally or externally? + * 1. Algs 7-10 don't appear to require forward vs. inverse transform, although sample data is forward. + * 2. Algs 9-10 specify reversal of the cipher key! + * - Separate construction/initialization stage for "prerequisites" + */ + internal class SP80038G + { + internal static readonly string FPE_DISABLED = "Best.HTTP.SecureProtocol.Org.BouncyCastle.Fpe.Disable"; + internal static readonly string FF1_DISABLED = "Best.HTTP.SecureProtocol.Org.BouncyCastle.Fpe.Disable_Ff1"; + + protected static readonly int BLOCK_SIZE = 16; + protected static readonly double LOG2 = System.Math.Log(2.0); + protected static readonly double TWO_TO_96 = System.Math.Pow(2, 96); + + public static byte[] DecryptFF1(IBlockCipher cipher, int radix, byte[] tweak, byte[] buf, int off, int len) + { + checkArgs(cipher, true, radix, buf, off, len); + + // Algorithm 8 + int n = len; + int u = n / 2, v = n - u; + + ushort[] A = toShort(buf, off, u); + ushort[] B = toShort(buf, off + u, v); + + ushort[] rv = decFF1(cipher, radix, tweak, n, u, v, A, B); + + return toByte(rv); + } + + public static ushort[] DecryptFF1w(IBlockCipher cipher, int radix, byte[] tweak, ushort[] buf, int off, int len) + { + checkArgs(cipher, true, radix, buf, off, len); + + // Algorithm 8 + int n = len; + int u = n / 2, v = n - u; + + ushort[] A = new ushort[u]; + ushort[] B = new ushort[v]; + + Array.Copy(buf, off, A, 0, u); + Array.Copy(buf, off + u, B, 0, v); + + return decFF1(cipher, radix, tweak, n, u, v, A, B); + } + + private static ushort[] decFF1(IBlockCipher cipher, int radix, byte[] T, int n, int u, int v, ushort[] A, ushort[] B) + { + int t = T.Length; + int b = ((int)Ceil(System.Math.Log((double)radix) * (double)v / LOG2) + 7) / 8; + int d = (((b + 3) / 4) * 4) + 4; + + byte[] P = calculateP_FF1(radix, (byte)u, n, t); + + BigInteger bigRadix = BigInteger.ValueOf(radix); + BigInteger[] modUV = calculateModUV(bigRadix, u, v); + + int m = u; + + for (int i = 9; i >= 0; --i) + { + // i. - iv. + BigInteger y = calculateY_FF1(cipher, bigRadix, T, b, d, i, P, A); + + // v. + m = n - m; + BigInteger modulus = modUV[i & 1]; + + // vi. + BigInteger c = num(bigRadix, B).Subtract(y).Mod(modulus); + + // vii. - ix. + ushort[] C = B; + B = A; + A = C; + str(bigRadix, c, m, C, 0); + } + + return Arrays.Concatenate(A, B); + } + + public static byte[] DecryptFF3(IBlockCipher cipher, int radix, byte[] tweak64, byte[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak64.Length != 8) + { + throw new ArgumentException(); + } + + return implDecryptFF3(cipher, radix, tweak64, buf, off, len); + } + + public static byte[] DecryptFF3_1(IBlockCipher cipher, int radix, byte[] tweak56, byte[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak56.Length != 7) + { + throw new ArgumentException("tweak should be 56 bits"); + } + + byte[] tweak64 = calculateTweak64_FF3_1(tweak56); + + return implDecryptFF3(cipher, radix, tweak64, buf, off, len); + } + + public static ushort[] DecryptFF3_1w(IBlockCipher cipher, int radix, byte[] tweak56, ushort[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak56.Length != 7) + { + throw new ArgumentException("tweak should be 56 bits"); + } + + byte[] tweak64 = calculateTweak64_FF3_1(tweak56); + + return implDecryptFF3w(cipher, radix, tweak64, buf, off, len); + } + + public static byte[] EncryptFF1(IBlockCipher cipher, int radix, byte[] tweak, byte[] buf, int off, int len) + { + checkArgs(cipher, true, radix, buf, off, len); + + // Algorithm 7 + int n = len; + int u = n / 2, v = n - u; + + ushort[] A = toShort(buf, off, u); + ushort[] B = toShort(buf, off + u, v); + + return toByte(encFF1(cipher, radix, tweak, n, u, v, A, B)); + } + + public static ushort[] EncryptFF1w(IBlockCipher cipher, int radix, byte[] tweak, ushort[] buf, int off, int len) + { + checkArgs(cipher, true, radix, buf, off, len); + + // Algorithm 7 + int n = len; + int u = n / 2, v = n - u; + + ushort[] A = new ushort[u]; + ushort[] B = new ushort[v]; + + Array.Copy(buf, off, A, 0, u); + Array.Copy(buf, off + u, B, 0, v); + + return encFF1(cipher, radix, tweak, n, u, v, A, B); + } + + private static ushort[] encFF1(IBlockCipher cipher, int radix, byte[] T, int n, int u, int v, ushort[] A, ushort[] B) + { + int t = T.Length; + + int b = ((int)Ceil(System.Math.Log((double)radix) * (double)v / LOG2) + 7) / 8; + int d = (((b + 3) / 4) * 4) + 4; + + byte[] P = calculateP_FF1(radix, (byte)u, n, t); + + BigInteger bigRadix = BigInteger.ValueOf(radix); + BigInteger[] modUV = calculateModUV(bigRadix, u, v); + + int m = v; + + for (int i = 0; i < 10; ++i) + { + // i. - iv. + BigInteger y = calculateY_FF1(cipher, bigRadix, T, b, d, i, P, B); + + // v. + m = n - m; + BigInteger modulus = modUV[i & 1]; + + // vi. + BigInteger c = num(bigRadix, A).Add(y).Mod(modulus); + + // vii. - ix. + ushort[] C = A; + A = B; + B = C; + str(bigRadix, c, m, C, 0); + } + + return Arrays.Concatenate(A, B); + } + + public static byte[] EncryptFF3(IBlockCipher cipher, int radix, byte[] tweak64, byte[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak64.Length != 8) + { + throw new ArgumentException(); + } + + return implEncryptFF3(cipher, radix, tweak64, buf, off, len); + } + + public static ushort[] EncryptFF3w(IBlockCipher cipher, int radix, byte[] tweak64, ushort[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak64.Length != 8) + { + throw new ArgumentException(); + } + + return implEncryptFF3w(cipher, radix, tweak64, buf, off, len); + } + + public static ushort[] EncryptFF3_1w(IBlockCipher cipher, int radix, byte[] tweak56, ushort[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak56.Length != 7) + { + throw new ArgumentException("tweak should be 56 bits"); + } + byte[] tweak64 = calculateTweak64_FF3_1(tweak56); + + return EncryptFF3w(cipher, radix, tweak64, buf, off, len); + } + + public static byte[] EncryptFF3_1(IBlockCipher cipher, int radix, byte[] tweak56, byte[] buf, int off, int len) + { + checkArgs(cipher, false, radix, buf, off, len); + + if (tweak56.Length != 7) + { + throw new ArgumentException("tweak should be 56 bits"); + } + + byte[] tweak64 = calculateTweak64_FF3_1(tweak56); + + return EncryptFF3(cipher, radix, tweak64, buf, off, len); + } + + protected static BigInteger[] calculateModUV(BigInteger bigRadix, int u, int v) + { + BigInteger[] modUV = new BigInteger[2]; + modUV[0] = bigRadix.Pow(u); + modUV[1] = modUV[0]; + if (v != u) + { + modUV[1] = modUV[1].Multiply(bigRadix); + } + return modUV; + } + + protected static byte[] calculateP_FF1(int radix, byte uLow, int n, int t) + { + byte[] P = new byte[BLOCK_SIZE]; + P[0] = 1; + P[1] = 2; + P[2] = 1; + + // Radix + P[3] = 0; + P[4] = (byte)(radix >> 8); + P[5] = (byte)radix; + + P[6] = 10; + P[7] = uLow; + Pack.UInt32_To_BE((uint)n, P, 8); + Pack.UInt32_To_BE((uint)t, P, 12); + return P; + } + + protected static byte[] calculateTweak64_FF3_1(byte[] tweak56) + { + byte[] tweak64 = new byte[8]; + tweak64[0] = tweak56[0]; + tweak64[1] = tweak56[1]; + tweak64[2] = tweak56[2]; + tweak64[3] = (byte)(tweak56[3] & 0xF0); + tweak64[4] = tweak56[4]; + tweak64[5] = tweak56[5]; + tweak64[6] = tweak56[6]; + tweak64[7] = (byte)(tweak56[3] << 4); + + return tweak64; + } + + protected static BigInteger calculateY_FF1(IBlockCipher cipher, BigInteger bigRadix, byte[] T, int b, int d, int round, byte[] P, ushort[] AB) + { + int t = T.Length; + + // i. + int zeroes = -(t + b + 1) & 15; + byte[] Q = new byte[t + zeroes + 1 + b]; + Array.Copy(T, 0, Q, 0, t); + Q[t + zeroes] = (byte)round; + + BigInteger numAB = num(bigRadix, AB); + BigIntegers.AsUnsignedByteArray(numAB, Q, Q.Length - b, b); + + // ii. + byte[] R = prf(cipher, Arrays.Concatenate(P, Q)); + + // iii. + byte[] sBlocks = R; + if (d > BLOCK_SIZE) + { + int sBlocksLen = (d + BLOCK_SIZE - 1) / BLOCK_SIZE; + sBlocks = new byte[sBlocksLen * BLOCK_SIZE]; + + uint j0 = Pack.BE_To_UInt32(R, BLOCK_SIZE - 4); + Array.Copy(R, 0, sBlocks, 0, BLOCK_SIZE); + + for (uint j = 1; j < sBlocksLen; ++j) + { + int sOff = (int)(j * BLOCK_SIZE); + + Array.Copy(R, 0, sBlocks, sOff, BLOCK_SIZE - 4); + Pack.UInt32_To_BE(j0 ^ j, sBlocks, sOff + BLOCK_SIZE - 4); + + cipher.ProcessBlock(sBlocks, sOff, sBlocks, sOff); + } + } + + // iv. + return new BigInteger(1, sBlocks, 0, d); + } + + protected static BigInteger calculateY_FF3(IBlockCipher cipher, BigInteger bigRadix, byte[] T, int wOff, + uint round, ushort[] AB) + { + // ii. + byte[] P = new byte[BLOCK_SIZE]; + Pack.UInt32_To_BE(Pack.BE_To_UInt32(T, wOff) ^ round, P, 0); + + BigInteger numAB = num(bigRadix, AB); + BigIntegers.AsUnsignedByteArray(numAB, P, 4, BLOCK_SIZE - 4); + + // iii. + Array.Reverse(P); + cipher.ProcessBlock(P, 0, P, 0); + Array.Reverse(P); + byte[] S = P; + + // iv. + return new BigInteger(1, S); + } + + protected static void checkArgs(IBlockCipher cipher, bool isFF1, int radix, ushort[] buf, int off, int len) + { + checkCipher(cipher); + if (radix < 2 || radix > (1 << 16)) + { + throw new ArgumentException(); + } + checkData(isFF1, radix, buf, off, len); + } + + protected static void checkArgs(IBlockCipher cipher, bool isFF1, int radix, byte[] buf, int off, int len) + { + checkCipher(cipher); + if (radix < 2 || radix > (1 << 8)) + { + throw new ArgumentException(); + } + checkData(isFF1, radix, buf, off, len); + } + + protected static void checkCipher(IBlockCipher cipher) + { + if (BLOCK_SIZE != cipher.GetBlockSize()) + { + throw new ArgumentException(); + } + } + + protected static void checkData(bool isFF1, int radix, ushort[] buf, int off, int len) + { + checkLength(isFF1, radix, len); + for (int i = 0; i < len; ++i) + { + int b = buf[off + i] & 0xFFFF; + if (b >= radix) + { + throw new ArgumentException("input data outside of radix"); + } + } + } + + protected static void checkData(bool isFF1, int radix, byte[] buf, int off, int len) + { + checkLength(isFF1, radix, len); + for (int i = 0; i < len; ++i) + { + int b = buf[off + i] & 0xFF; + if (b >= radix) + { + throw new ArgumentException("input data outside of radix"); + } + } + } + + private static void checkLength(bool isFF1, int radix, int len) + { + if (len < 2 || System.Math.Pow(radix, len) < 1000000) + { + throw new ArgumentException("input too short"); + } + if (!isFF1) + { + int maxLen = 2 * (int)(System.Math.Floor(System.Math.Log(TWO_TO_96) / System.Math.Log(radix))); + if (len > maxLen) + { + throw new ArgumentException("maximum input length is " + maxLen); + } + } + } + + protected static byte[] implDecryptFF3(IBlockCipher cipher, int radix, byte[] tweak64, byte[] buf, int off, int len) + { + // Algorithm 10 + byte[] T = tweak64; + int n = len; + int v = n / 2, u = n - v; + + ushort[] A = toShort(buf, off, u); + ushort[] B = toShort(buf, off + u, v); + + ushort[] rv = decFF3_1(cipher, radix, T, n, v, u, A, B); + + return toByte(rv); + } + + protected static ushort[] implDecryptFF3w(IBlockCipher cipher, int radix, byte[] tweak64, ushort[] buf, int off, int len) + { + // Algorithm 10 + byte[] T = tweak64; + int n = len; + int v = n / 2, u = n - v; + + ushort[] A = new ushort[u]; + ushort[] B = new ushort[v]; + + Array.Copy(buf, off, A, 0, u); + Array.Copy(buf, off + u, B, 0, v); + + return decFF3_1(cipher, radix, T, n, v, u, A, B); + } + + private static ushort[] decFF3_1(IBlockCipher cipher, int radix, byte[] T, int n, int v, int u, ushort[] A, ushort[] B) + { + BigInteger bigRadix = BigInteger.ValueOf(radix); + BigInteger[] modVU = calculateModUV(bigRadix, v, u); + + int m = u; + + // Note we keep A, B in reverse order throughout + Array.Reverse(A); + Array.Reverse(B); + + for (int i = 7; i >= 0; --i) + { + // i. + m = n - m; + BigInteger modulus = modVU[1 - (i & 1)]; + int wOff = 4 - ((i & 1) * 4); + + // ii. - iv. + BigInteger y = calculateY_FF3(cipher, bigRadix, T, wOff, (uint)i, A); + + // v. + BigInteger c = num(bigRadix, B).Subtract(y).Mod(modulus); + + // vi. - viii. + ushort[] C = B; + B = A; + A = C; + str(bigRadix, c, m, C, 0); + } + + Array.Reverse(A); + Array.Reverse(B); + + return Arrays.Concatenate(A, B); + } + + protected static byte[] implEncryptFF3(IBlockCipher cipher, int radix, byte[] tweak64, byte[] buf, int off, int len) + { + // Algorithm 9 + byte[] T = tweak64; + int n = len; + int v = n / 2, u = n - v; + + ushort[] A = toShort(buf, off, u); + ushort[] B = toShort(buf, off + u, v); + + ushort[] rv = encFF3_1(cipher, radix, T, n, v, u, A, B); + + return toByte(rv); + } + + protected static ushort[] implEncryptFF3w(IBlockCipher cipher, int radix, byte[] tweak64, ushort[] buf, int off, int len) + { + // Algorithm 9 + byte[] T = tweak64; + int n = len; + int v = n / 2, u = n - v; + + ushort[] A = new ushort[u]; + ushort[] B = new ushort[v]; + + Array.Copy(buf, off, A, 0, u); + Array.Copy(buf, off + u, B, 0, v); + + return encFF3_1(cipher, radix, T, n, v, u, A, B); + } + + private static ushort[] encFF3_1(IBlockCipher cipher, int radix, byte[] t, int n, int v, int u, ushort[] a, ushort[] b) + { + BigInteger bigRadix = BigInteger.ValueOf(radix); + BigInteger[] modVU = calculateModUV(bigRadix, v, u); + + int m = v; + + // Note we keep A, B in reverse order throughout + Array.Reverse(a); + Array.Reverse(b); + + for (uint i = 0; i < 8; ++i) + { + // i. + m = n - m; + BigInteger modulus = modVU[1 - (i & 1)]; + int wOff = 4 - (int)((i & 1) * 4); + + // ii. - iv. + BigInteger y = calculateY_FF3(cipher, bigRadix, t, wOff, i, b); + + // v. + BigInteger c = num(bigRadix, a).Add(y).Mod(modulus); + + // vi. - viii. + ushort[] C = a; + a = b; + b = C; + str(bigRadix, c, m, C, 0); + } + + Array.Reverse(a); + Array.Reverse(b); + + return Arrays.Concatenate(a, b); + } + + protected static BigInteger num(BigInteger R, ushort[] x) + { + BigInteger result = BigInteger.Zero; + for (int i = 0; i < x.Length; ++i) + { + result = result.Multiply(R).Add(BigInteger.ValueOf(x[i] & 0xFFFF)); + } + return result; + } + + protected static byte[] prf(IBlockCipher c, byte[] x) + { + if ((x.Length % BLOCK_SIZE) != 0) + throw new ArgumentException(); + + int m = x.Length / BLOCK_SIZE; + byte[] y = new byte[BLOCK_SIZE]; + + for (int i = 0; i < m; ++i) + { + xor(x, i * BLOCK_SIZE, y, 0, BLOCK_SIZE); + c.ProcessBlock(y, 0, y, 0); + } + + return y; + } + + protected static void str(BigInteger R, BigInteger x, int m, ushort[] output, int off) + { + if (x.SignValue < 0) + throw new ArgumentException(); + + for (int i = 1; i <= m; ++i) + { + BigInteger[] qr = x.DivideAndRemainder(R); + output[off + m - i] = (ushort)qr[1].IntValue; + x = qr[0]; + } + if (x.SignValue != 0) + throw new ArgumentException(); + } + + protected static void xor(byte[] x, int xOff, byte[] y, int yOff, int len) + { + for (int i = 0; i < len; ++i) + { + y[yOff + i] ^= x[xOff + i]; + } + } + + private static byte[] toByte(ushort[] buf) + { + byte[] s = new byte[buf.Length]; + + for (int i = 0; i != s.Length; i++) + { + s[i] = (byte)buf[i]; + } + + return s; + } + + private static ushort[] toShort(byte[] buf, int off, int len) + { + ushort[] s = new ushort[len]; + + for (int i = 0; i != s.Length; i++) + { + s[i] = (ushort)(buf[off + i] & 0xFF); + } + + return s; + } + + private static int Ceil(double v) + { + int rv = (int)v; + if ((double)rv < v) + return rv + 1; + + return rv; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs.meta new file mode 100644 index 00000000..0b6cf72e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 414cea656d7fa6b4ba145845b3310803 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/fpe/SP80038G.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators.meta new file mode 100644 index 00000000..81e1c765 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3d415064f13e7cf488dac98ea02fa24b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs new file mode 100644 index 00000000..49d60ccb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs @@ -0,0 +1,632 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Core of password hashing scheme Bcrypt, + * designed by Niels Provos and David Mazières, + * corresponds to the C reference implementation. + *

+ * This implementation does not correspondent to the 1999 published paper + * "A Future-Adaptable Password Scheme" of Niels Provos and David Mazières, + * see: https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node1.html. + * In contrast to the paper, the order of key setup and salt setup is reversed: + * state <- ExpandKey(state, 0, key) + * state %lt;- ExpandKey(state, 0, salt) + * This corresponds to the OpenBSD reference implementation of Bcrypt. + *

+ * Note: + * There is no successful cryptanalysis (status 2015), but + * the amount of memory and the band width of Bcrypt + * may be insufficient to effectively prevent attacks + * with custom hardware like FPGAs, ASICs + *

+ * This implementation uses some parts of Bouncy Castle's BlowfishEngine. + *

+ */ + public sealed class BCrypt + { + // magic String "OrpheanBeholderScryDoubt" is used as clear text for encryption + private static readonly uint[] MAGIC_STRING = + { + 0x4F727068, 0x65616E42, 0x65686F6C, + 0x64657253, 0x63727944, 0x6F756274 + }; + + internal const int MAGIC_STRING_LENGTH = 6; + + private static readonly uint[] + KP = { + 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, + 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89, + 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C, + 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, + 0x9216D5D9, 0x8979FB1B + }, + + KS0 = { + 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7, + 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99, + 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16, + 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E, + 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE, + 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013, + 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF, + 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E, + 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60, + 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440, + 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE, + 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A, + 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E, + 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677, + 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193, + 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032, + 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88, + 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239, + 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E, + 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0, + 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3, + 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98, + 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88, + 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE, + 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6, + 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D, + 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B, + 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7, + 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA, + 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463, + 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F, + 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09, + 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3, + 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB, + 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279, + 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8, + 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB, + 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82, + 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB, + 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573, + 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0, + 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B, + 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790, + 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8, + 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4, + 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0, + 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7, + 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C, + 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD, + 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1, + 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299, + 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9, + 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477, + 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF, + 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49, + 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF, + 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA, + 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5, + 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41, + 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915, + 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400, + 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915, + 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664, + 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A + }, + + KS1 = { + 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623, + 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266, + 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1, + 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E, + 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6, + 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1, + 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E, + 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1, + 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737, + 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8, + 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF, + 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD, + 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701, + 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7, + 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41, + 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331, + 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF, + 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF, + 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E, + 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87, + 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C, + 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2, + 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16, + 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD, + 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B, + 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509, + 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E, + 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3, + 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F, + 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A, + 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4, + 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960, + 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66, + 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28, + 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802, + 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84, + 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510, + 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF, + 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14, + 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E, + 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50, + 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7, + 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8, + 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281, + 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99, + 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696, + 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128, + 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73, + 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0, + 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0, + 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105, + 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250, + 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3, + 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285, + 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00, + 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061, + 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB, + 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E, + 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735, + 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC, + 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9, + 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340, + 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20, + 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7 + }, + + KS2 = { + 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934, + 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068, + 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF, + 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840, + 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45, + 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504, + 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A, + 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB, + 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE, + 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6, + 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42, + 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B, + 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2, + 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB, + 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527, + 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B, + 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33, + 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C, + 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3, + 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC, + 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17, + 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564, + 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B, + 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115, + 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922, + 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728, + 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0, + 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E, + 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37, + 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D, + 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804, + 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B, + 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3, + 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB, + 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D, + 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C, + 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350, + 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9, + 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A, + 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE, + 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D, + 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC, + 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F, + 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61, + 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2, + 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9, + 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2, + 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C, + 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E, + 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633, + 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10, + 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169, + 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52, + 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027, + 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5, + 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62, + 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634, + 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76, + 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24, + 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC, + 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4, + 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C, + 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837, + 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0 + }, + + KS3 = { + 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B, + 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE, + 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B, + 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4, + 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8, + 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6, + 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304, + 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22, + 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4, + 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6, + 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9, + 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59, + 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593, + 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51, + 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28, + 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C, + 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B, + 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28, + 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C, + 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD, + 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A, + 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319, + 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB, + 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F, + 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991, + 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32, + 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680, + 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166, + 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE, + 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB, + 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5, + 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47, + 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370, + 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D, + 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84, + 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048, + 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8, + 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD, + 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9, + 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7, + 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38, + 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F, + 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C, + 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525, + 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1, + 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442, + 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964, + 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E, + 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8, + 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D, + 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F, + 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299, + 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02, + 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC, + 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614, + 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A, + 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6, + 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B, + 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0, + 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060, + 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E, + 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9, + 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F, + 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6 + }; + + //==================================== + // Useful constants + //==================================== + + private const int ROUNDS = 16; + private const int SBOX_SK = 256; + private const int SBOX_SK2 = SBOX_SK * 2; + private const int SBOX_SK3 = SBOX_SK * 3; + private const int P_SZ = ROUNDS + 2; + + private readonly uint[] S; // the s-boxes + private readonly uint[] P; // the p-array + + private BCrypt() + { + S = new uint[SBOX_SK * 4]; + P = new uint[P_SZ]; + } + + //================================== + // Private Implementation + //================================== + + private uint F(uint x) + { + return (((S[(x >> 24)] + S[SBOX_SK + ((x >> 16) & 0xff)]) + ^ S[SBOX_SK2 + ((x >> 8) & 0xff)]) + S[SBOX_SK3 + (x & 0xff)]); + } + + /* + * apply the encryption cycle to each value pair in the table. + */ + private void ProcessTable(uint xl, uint xr, uint[] table) + { + int size = table.Length; + + for (int s = 0; s < size; s += 2) + { + xl ^= P[0]; + + for (int i = 1; i < ROUNDS; i += 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i + 1]; + } + + xr ^= P[ROUNDS + 1]; + + table[s] = xr; + table[s + 1] = xl; + + xr = xl; // end of cycle swap + xl = table[s]; + } + } + + /* + * Initialize the S-boxes and the P-array, with a fixed string + * This string contains the hexadecimal digits of pi (3.141...) + */ + private void InitState() + { + Array.Copy(KS0, 0, S, 0, SBOX_SK); + Array.Copy(KS1, 0, S, SBOX_SK, SBOX_SK); + Array.Copy(KS2, 0, S, SBOX_SK2, SBOX_SK); + Array.Copy(KS3, 0, S, SBOX_SK3, SBOX_SK); + + Array.Copy(KP, 0, P, 0, P_SZ); + } + + /* + * XOR P with key cyclic. + * This is the first part of ExpandKey function + */ + private void CyclicXorKey(byte[] key) + { + int keyLength = key.Length; + int keyIndex = 0; + + for (int i = 0; i < P_SZ; i++) + { + // get the 32 bits of the key, in 4 * 8 bit chunks + uint data = 0x0000000; + for (int j = 0; j < 4; j++) + { + // create a 32 bit block + data = (data << 8) | key[keyIndex]; + + // wrap when we get to the end of the key + if (++keyIndex >= keyLength) + { + keyIndex = 0; + } + } + // XOR the newly created 32 bit chunk onto the P-array + P[i] ^= data; + } + } + + + /* + * encrypt magic String 64 times in ECB + */ + private byte[] EncryptMagicString() + { + uint[] text = { + MAGIC_STRING[0], MAGIC_STRING[1], + MAGIC_STRING[2], MAGIC_STRING[3], + MAGIC_STRING[4], MAGIC_STRING[5] + }; + for (int i = 0; i < 64; i++) + { + for (int j = 0; j < MAGIC_STRING_LENGTH; j += 2) + { + uint left = text[j]; + uint right = text[j + 1]; + + left ^= P[0]; + for (int k = 1; k < ROUNDS; k += 2) + { + right ^= F(left) ^ P[k]; + left ^= F(right) ^ P[k + 1]; + } + right ^= P[ROUNDS + 1]; + // swap values: + text[j] = right; + text[j + 1] = left; + } + } + byte[] result = new byte[24]; // holds 192 bit key + Pack.UInt32_To_BE(text, result, 0); + Array.Clear(text, 0, text.Length); + Array.Clear(P, 0, P.Length); + Array.Clear(S, 0, S.Length); + + return result; + } + + /* + * This is a part of Eksblowfish function + * + * @param table: sub-keys or working key + * @param salt32Bit: a 16 byte salt as two 32 bit words + * @param iv1: value from last proceeded table + * @param iv2: value from last proceeded table + */ + private void ProcessTableWithSalt(uint[] table, uint[] salt32Bit, uint iv1, uint iv2) + { + uint xl = iv1 ^ salt32Bit[0]; + uint xr = iv2 ^ salt32Bit[1]; + + uint yl; + uint yr; + int size = table.Length; + + for (int s = 0; s < size; s += 4) + { + xl ^= P[0]; + for (int i = 1; i < ROUNDS; i += 2) + { + xr ^= F(xl) ^ P[i]; + xl ^= F(xr) ^ P[i + 1]; + } + xr ^= P[ROUNDS + 1]; + + table[s] = xr; + table[s + 1] = xl; + + yl = salt32Bit[2] ^ xr; + yr = salt32Bit[3] ^ xl; + + if (s + 2 >= size) // P holds 18 values + { + break; + } + + yl ^= P[0]; + for (int i = 1; i < ROUNDS; i += 2) + { + yr ^= F(yl) ^ P[i]; + yl ^= F(yr) ^ P[i + 1]; + } + yr ^= P[ROUNDS + 1]; + + table[s + 2] = yr; + table[s + 3] = yl; + + xl = salt32Bit[0] ^ yr; + xr = salt32Bit[1] ^ yl; + } + } + + /** + * Derives a raw 192 bit Bcrypt key + * + * @param cost the cost factor, treated as an exponent of 2 + * @param salt a 16 byte salt + * @param psw the password + * @return a 192 bit key + */ + private byte[] DeriveRawKey(int cost, byte[] salt, byte[] psw) + { + if (salt.Length != 16) + throw new DataLengthException("Invalid salt size: 16 bytes expected."); + if (cost < 4 || cost > 31) + throw new ArgumentException("Illegal cost factor: 4 - 31 expected.", "cost"); + + if (psw.Length == 0) + { + psw = new byte[4]; + } + + // state <- InitState() + InitState(); + + uint[] salt32Bit = new uint[4]; // holds 16 byte salt + Pack.BE_To_UInt32(salt, 0, salt32Bit); + + uint[] salt32Bit2 = new uint[salt.Length]; // swapped values + salt32Bit2[0] = salt32Bit[2]; + salt32Bit2[1] = salt32Bit[3]; + salt32Bit2[2] = salt32Bit[0]; + salt32Bit2[3] = salt32Bit[1]; + + // ExpandKey( state, salt, key): + CyclicXorKey(psw); + ProcessTableWithSalt(P, salt32Bit, 0, 0); + Array.Clear(salt32Bit, 0, salt32Bit.Length); + ProcessTableWithSalt(S, salt32Bit2, P[P.Length - 2], P[P.Length - 1]); + Array.Clear(salt32Bit2, 0, salt32Bit2.Length); + + int rounds = 1 << cost; + for (int i = 0; i != rounds; i++) // rounds may be negative if cost is 31 + { + // state <- ExpandKey(state, 0, key); + CyclicXorKey(psw); + ProcessTable(0, 0, P); + ProcessTable(P[P_SZ - 2], P[P_SZ - 1], S); + + // state <- ExpandKey(state, 0, salt); + CyclicXorKey(salt); + ProcessTable(0, 0, P); + ProcessTable(P[P_SZ - 2], P[P_SZ - 1], S); + } + + // encrypt magicString 64 times + return EncryptMagicString(); + } + + /** + * Size of the salt parameter in bytes + */ + internal const int SALT_SIZE_BYTES = 16; + + /** + * Minimum value of cost parameter, equal to log2(bytes of salt) + */ + internal const int MIN_COST = 4; + + /** + * Maximum value of cost parameter (31 == 2,147,483,648) + */ + internal const int MAX_COST = 31; + + /** + * Maximum size of password == max (unrestricted) size of Blowfish key + */ + // Blowfish spec limits keys to 448bit/56 bytes to ensure all bits of key affect all ciphertext + // bits, but technically algorithm handles 72 byte keys and most implementations support this. + internal const int MAX_PASSWORD_BYTES = 72; + + /** + * Converts a character password to bytes incorporating the required trailing zero byte. + * + * @param password the password to be encoded. + * @return a byte representation of the password in UTF8 + trailing zero. + */ + public static byte[] PasswordToByteArray(char[] password) + { + return Arrays.Append(Strings.ToUtf8ByteArray(password), 0); + } + + /** + * Calculates the bcrypt hash of a password. + *

+ * This implements the raw bcrypt function as defined in the bcrypt specification, not + * the crypt encoded version implemented in OpenBSD. + *

+ * @param password the password bytes (up to 72 bytes) to use for this invocation. + * @param salt the 128 bit salt to use for this invocation. + * @param cost the bcrypt cost parameter. The cost of the bcrypt function grows as + * 2^cost. Legal values are 4..31 inclusive. + * @return the output of the raw bcrypt operation: a 192 bit (24 byte) hash. + */ + public static byte[] Generate(byte[] password, byte[] salt, int cost) + { + if (password == null) + throw new ArgumentNullException("password"); + if (password.Length > MAX_PASSWORD_BYTES) + throw new ArgumentException("BCrypt password must be <= 72 bytes", "password"); + if (salt == null) + throw new ArgumentNullException("salt"); + if (salt.Length != SALT_SIZE_BYTES) + throw new ArgumentException("BCrypt salt must be 128 bits", "salt"); + if (cost < MIN_COST || cost > MAX_COST) + throw new ArgumentException("BCrypt cost must be from 4..31", "cost"); + + return new BCrypt().DeriveRawKey(cost, salt, password); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs.meta new file mode 100644 index 00000000..8a596c79 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6023682d710547a4db596e974c58e5bd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BCrypt.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs new file mode 100644 index 00000000..6591bfeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs @@ -0,0 +1,194 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Basic KDF generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033 + *
+ * This implementation is based on ISO 18033/P1363a. + */ + public abstract class BaseKdfBytesGenerator + : IDerivationFunction + { + private int counterStart; + private IDigest digest; + private byte[] shared; + private byte[] iv; + + /** + * Construct a KDF Parameters generator. + * + * @param counterStart value of counter. + * @param digest the digest to be used as the source of derived keys. + */ + protected BaseKdfBytesGenerator(int counterStart, IDigest digest) + { + this.counterStart = counterStart; + this.digest = digest; + } + + public void Init(IDerivationParameters parameters) + { + if (parameters is KdfParameters kdfParameters) + { + shared = kdfParameters.GetSharedSecret(); + iv = kdfParameters.GetIV(); + } + else if (parameters is Iso18033KdfParameters iso18033KdfParameters) + { + shared = iso18033KdfParameters.GetSeed(); + iv = null; + } + else + { + throw new ArgumentException("KDF parameters required for KDF Generator"); + } + } + + /** + * return the underlying digest. + */ + public IDigest Digest => digest; + + /** + * fill len bytes of the output buffer with bytes generated from + * the derivation function. + * + * @throws ArgumentException if the size of the request will cause an overflow. + * @throws DataLengthException if the out buffer is too small. + */ + public int GenerateBytes(byte[] output, int outOff, int length) + { + Check.OutputLength(output, outOff, length, "output buffer too small"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + long oBytes = length; + int digestSize = digest.GetDigestSize(); + + // + // this is at odds with the standard implementation, the + // maximum value should be hBits * (2^32 - 1) where hBits + // is the digest output size in bits. We can't have an + // array with a long index at the moment... + // + if (oBytes > ((2L << 32) - 1)) + throw new ArgumentException("Output length too large"); + + int cThreshold = (int)((oBytes + digestSize - 1) / digestSize); + + byte[] dig = new byte[digestSize]; + + byte[] C = new byte[4]; + Pack.UInt32_To_BE((uint)counterStart, C, 0); + + uint counterBase = (uint)(counterStart & ~0xFF); + + for (int i = 0; i < cThreshold; i++) + { + digest.BlockUpdate(shared, 0, shared.Length); + digest.BlockUpdate(C, 0, 4); + + if (iv != null) + { + digest.BlockUpdate(iv, 0, iv.Length); + } + + digest.DoFinal(dig, 0); + + if (length > digestSize) + { + Array.Copy(dig, 0, output, outOff, digestSize); + outOff += digestSize; + length -= digestSize; + } + else + { + Array.Copy(dig, 0, output, outOff, length); + } + + if (++C[3] == 0) + { + counterBase += 0x100; + Pack.UInt32_To_BE(counterBase, C, 0); + } + } + + digest.Reset(); + + return (int)oBytes; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + long oBytes = output.Length; + int digestSize = digest.GetDigestSize(); + + // + // this is at odds with the standard implementation, the + // maximum value should be hBits * (2^32 - 1) where hBits + // is the digest output size in bits. We can't have an + // array with a long index at the moment... + // + if (oBytes > ((2L << 32) - 1)) + throw new ArgumentException("Output length too large"); + + int cThreshold = (int)((oBytes + digestSize - 1) / digestSize); + + Span dig = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + + Span C = stackalloc byte[4]; + Pack.UInt32_To_BE((uint)counterStart, C); + + uint counterBase = (uint)(counterStart & ~0xFF); + + for (int i = 0; i < cThreshold; i++) + { + digest.BlockUpdate(shared); + digest.BlockUpdate(C); + + if (iv != null) + { + digest.BlockUpdate(iv); + } + + digest.DoFinal(dig); + + int remaining = output.Length; + if (remaining > digestSize) + { + dig.CopyTo(output); + output = output[digestSize..]; + } + else + { + dig[..remaining].CopyTo(output); + } + + if (++C[3] == 0) + { + counterBase += 0x100; + Pack.UInt32_To_BE(counterBase, C); + } + } + + digest.Reset(); + + return (int)oBytes; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs.meta new file mode 100644 index 00000000..b9da983b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3439e9d02faadfd4b96c0da140cc3051 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/BaseKdfBytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs new file mode 100644 index 00000000..0d415407 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * a basic Diffie-Hellman key pair generator. + * + * This generates keys consistent for use with the basic algorithm for + * Diffie-Hellman. + */ + public class DHBasicKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private DHKeyGenerationParameters param; + + public virtual void Init( + KeyGenerationParameters parameters) + { + this.param = (DHKeyGenerationParameters)parameters; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + DHKeyGeneratorHelper helper = DHKeyGeneratorHelper.Instance; + DHParameters dhp = param.Parameters; + + BigInteger x = helper.CalculatePrivate(dhp, param.Random); + BigInteger y = helper.CalculatePublic(dhp, x); + + return new AsymmetricCipherKeyPair( + new DHPublicKeyParameters(y, dhp), + new DHPrivateKeyParameters(x, dhp)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs.meta new file mode 100644 index 00000000..ed3a671f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7987a02369f45bf46be2bd071b00bd3a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHBasicKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs new file mode 100644 index 00000000..3a9221f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + class DHKeyGeneratorHelper + { + internal static readonly DHKeyGeneratorHelper Instance = new DHKeyGeneratorHelper(); + + private DHKeyGeneratorHelper() + { + } + + internal BigInteger CalculatePrivate( + DHParameters dhParams, + SecureRandom random) + { + int limit = dhParams.L; + + if (limit != 0) + { + int minWeight = limit >> 2; + for (;;) + { + BigInteger x = new BigInteger(limit, random).SetBit(limit - 1); + if (WNafUtilities.GetNafWeight(x) >= minWeight) + { + return x; + } + } + } + + BigInteger min = BigInteger.Two; + int m = dhParams.M; + if (m != 0) + { + min = BigInteger.One.ShiftLeft(m - 1); + } + + BigInteger q = dhParams.Q; + if (q == null) + { + q = dhParams.P; + } + BigInteger max = q.Subtract(BigInteger.Two); + + { + int minWeight = max.BitLength >> 2; + for (;;) + { + BigInteger x = BigIntegers.CreateRandomInRange(min, max, random); + if (WNafUtilities.GetNafWeight(x) >= minWeight) + { + return x; + } + } + } + } + + internal BigInteger CalculatePublic( + DHParameters dhParams, + BigInteger x) + { + return dhParams.G.ModPow(x, dhParams.P); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs.meta new file mode 100644 index 00000000..5f328054 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 607f394ddbca4cd458888bdefd99ead6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyGeneratorHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs new file mode 100644 index 00000000..61d282e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * a Diffie-Hellman key pair generator. + * + * This generates keys consistent for use in the MTI/A0 key agreement protocol + * as described in "Handbook of Applied Cryptography", Pages 516-519. + */ + public class DHKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private DHKeyGenerationParameters param; + + public virtual void Init( + KeyGenerationParameters parameters) + { + this.param = (DHKeyGenerationParameters)parameters; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + DHKeyGeneratorHelper helper = DHKeyGeneratorHelper.Instance; + DHParameters dhp = param.Parameters; + + BigInteger x = helper.CalculatePrivate(dhp, param.Random); + BigInteger y = helper.CalculatePublic(dhp, x); + + return new AsymmetricCipherKeyPair( + new DHPublicKeyParameters(y, dhp), + new DHPrivateKeyParameters(x, dhp)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs.meta new file mode 100644 index 00000000..d8d42ac0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6fc29e9fe66ed4e4c9b1fc1e27d211e3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs new file mode 100644 index 00000000..ccbbb33d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class DHParametersGenerator + { + private int size; + private int certainty; + private SecureRandom random; + + public virtual void Init( + int size, + int certainty, + SecureRandom random) + { + this.size = size; + this.certainty = certainty; + this.random = random; + } + + /** + * which Generates the p and g values from the given parameters, + * returning the DHParameters object. + *

+ * Note: can take a while...

+ */ + public virtual DHParameters GenerateParameters() + { + // + // find a safe prime p where p = 2*q + 1, where p and q are prime. + // + BigInteger[] safePrimes = DHParametersHelper.GenerateSafePrimes(size, certainty, random); + + BigInteger p = safePrimes[0]; + BigInteger q = safePrimes[1]; + BigInteger g = DHParametersHelper.SelectGenerator(p, q, random); + + return new DHParameters(p, g, q, BigInteger.Two, null); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs.meta new file mode 100644 index 00000000..c4fc4385 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 462a00ee0abde8b44abc08366c0e7cb8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs new file mode 100644 index 00000000..693bc49f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs @@ -0,0 +1,160 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + internal class DHParametersHelper + { + private static readonly BigInteger Six = BigInteger.ValueOf(6); + + private static readonly int[][] primeLists = BigInteger.primeLists; + private static readonly int[] primeProducts = BigInteger.primeProducts; + private static readonly BigInteger[] BigPrimeProducts = ConstructBigPrimeProducts(primeProducts); + + private static BigInteger[] ConstructBigPrimeProducts(int[] primeProducts) + { + BigInteger[] bpp = new BigInteger[primeProducts.Length]; + for (int i = 0; i < bpp.Length; ++i) + { + bpp[i] = BigInteger.ValueOf(primeProducts[i]); + } + return bpp; + } + + /* + * Finds a pair of prime BigInteger's {p, q: p = 2q + 1} + * + * (see: Handbook of Applied Cryptography 4.86) + */ + internal static BigInteger[] GenerateSafePrimes(int size, int certainty, SecureRandom random) + { + BigInteger p, q; + int qLength = size - 1; + int minWeight = size >> 2; + + if (size <= 32) + { + for (;;) + { + q = new BigInteger(qLength, 2, random); + + p = q.ShiftLeft(1).Add(BigInteger.One); + + if (!p.IsProbablePrime(certainty, true)) + continue; + + if (certainty > 2 && !q.IsProbablePrime(certainty, true)) + continue; + + break; + } + } + else + { + // Note: Modified from Java version for speed + for (;;) + { + q = new BigInteger(qLength, 0, random); + + retry: + for (int i = 0; i < primeLists.Length; ++i) + { + int test = q.Remainder(BigPrimeProducts[i]).IntValue; + + if (i == 0) + { + int rem3 = test % 3; + if (rem3 != 2) + { + int diff = 2 * rem3 + 2; + q = q.Add(BigInteger.ValueOf(diff)); + test = (test + diff) % primeProducts[i]; + } + } + + int[] primeList = primeLists[i]; + for (int j = 0; j < primeList.Length; ++j) + { + int prime = primeList[j]; + int qRem = test % prime; + if (qRem == 0 || qRem == (prime >> 1)) + { + q = q.Add(Six); + goto retry; + } + } + } + + if (q.BitLength != qLength) + continue; + + if (!q.RabinMillerTest(2, random, true)) + continue; + + p = q.ShiftLeft(1).Add(BigInteger.One); + + if (!p.RabinMillerTest(certainty, random, true)) + continue; + + if (certainty > 2 && !q.RabinMillerTest(certainty - 2, random, true)) + continue; + + /* + * Require a minimum weight of the NAF representation, since low-weight primes may be + * weak against a version of the number-field-sieve for the discrete-logarithm-problem. + * + * See "The number field sieve for integers of low weight", Oliver Schirokauer. + */ + if (WNafUtilities.GetNafWeight(p) < minWeight) + continue; + + break; + } + } + + return new BigInteger[] { p, q }; + } + + /* + * Select a high order element of the multiplicative group Zp* + * + * p and q must be s.t. p = 2*q + 1, where p and q are prime (see generateSafePrimes) + */ + internal static BigInteger SelectGenerator(BigInteger p, BigInteger q, SecureRandom random) + { + BigInteger pMinusTwo = p.Subtract(BigInteger.Two); + BigInteger g; + + /* + * (see: Handbook of Applied Cryptography 4.80) + */ +// do +// { +// g = BigIntegers.CreateRandomInRange(BigInteger.Two, pMinusTwo, random); +// } +// while (g.ModPow(BigInteger.Two, p).Equals(BigInteger.One) +// || g.ModPow(q, p).Equals(BigInteger.One)); + + /* + * RFC 2631 2.2.1.2 (and see: Handbook of Applied Cryptography 4.81) + */ + do + { + BigInteger h = BigIntegers.CreateRandomInRange(BigInteger.Two, pMinusTwo, random); + + g = h.ModPow(BigInteger.Two, p); + } + while (g.Equals(BigInteger.One)); + + return g; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs.meta new file mode 100644 index 00000000..300a6515 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: feb64c5411c6a6944b3cbf866130ab0d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DHParametersHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs new file mode 100644 index 00000000..acee25b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class DesEdeKeyGenerator + : DesKeyGenerator + { + public DesEdeKeyGenerator() + { + } + + internal DesEdeKeyGenerator( + int defaultStrength) + : base(defaultStrength) + { + } + + /** + * initialise the key generator - if strength is set to zero + * the key Generated will be 192 bits in size, otherwise + * strength can be 128 or 192 (or 112 or 168 if you don't count + * parity bits), depending on whether you wish to do 2-key or 3-key + * triple DES. + * + * @param param the parameters to be used for key generation + */ + protected override void EngineInit(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + this.strength = (parameters.Strength + 7) / 8; + + if (strength == 0 || strength == (168 / 8)) + { + strength = DesEdeParameters.DesEdeKeyLength; + } + else if (strength == (112 / 8)) + { + strength = 2 * DesEdeParameters.DesKeyLength; + } + else if (strength != DesEdeParameters.DesEdeKeyLength + && strength != (2 * DesEdeParameters.DesKeyLength)) + { + throw new ArgumentException("DESede key must be " + + (DesEdeParameters.DesEdeKeyLength * 8) + " or " + + (2 * 8 * DesEdeParameters.DesKeyLength) + + " bits long."); + } + } + + protected override byte[] EngineGenerateKey() + { + byte[] newKey = new byte[strength]; + + do + { + random.NextBytes(newKey); + DesEdeParameters.SetOddParity(newKey); + } + while (DesEdeParameters.IsWeakKey(newKey, 0, newKey.Length) || !DesEdeParameters.IsRealEdeKey(newKey, 0)); + + return newKey; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs.meta new file mode 100644 index 00000000..a97f77cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd71f83ea2b09164bb2499d7f019ebf0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesEdeKeyGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs new file mode 100644 index 00000000..30b0aa96 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class DesKeyGenerator + : CipherKeyGenerator + { + public DesKeyGenerator() + { + } + + internal DesKeyGenerator( + int defaultStrength) + : base(defaultStrength) + { + } + + /** + * initialise the key generator - if strength is set to zero + * the key generated will be 64 bits in size, otherwise + * strength can be 64 or 56 bits (if you don't count the parity bits). + * + * @param param the parameters to be used for key generation + */ + protected override void EngineInit(KeyGenerationParameters parameters) + { + base.EngineInit(parameters); + + if (strength == 0 || strength == (56 / 8)) + { + strength = DesParameters.DesKeyLength; + } + else if (strength != DesParameters.DesKeyLength) + { + throw new ArgumentException( + "DES key must be " + (DesParameters.DesKeyLength * 8) + " bits long."); + } + } + + protected override byte[] EngineGenerateKey() + { + byte[] newKey = new byte[DesParameters.DesKeyLength]; + + do + { + random.NextBytes(newKey); + DesParameters.SetOddParity(newKey); + } + while (DesParameters.IsWeakKey(newKey, 0)); + + return newKey; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs.meta new file mode 100644 index 00000000..6278c32c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7bd86a459e7b0794c8e95b09994cb052 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DesKeyGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs new file mode 100644 index 00000000..9333a1a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * a DSA key pair generator. + * + * This Generates DSA keys in line with the method described + * in FIPS 186-3 B.1 FFC Key Pair Generation. + */ + public class DsaKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private static readonly BigInteger One = BigInteger.One; + + private DsaKeyGenerationParameters param; + + public void Init( + KeyGenerationParameters parameters) + { + if (parameters == null) + throw new ArgumentNullException("parameters"); + + // Note: If we start accepting instances of KeyGenerationParameters, + // must apply constraint checking on strength (see DsaParametersGenerator.Init) + + this.param = (DsaKeyGenerationParameters) parameters; + } + + public AsymmetricCipherKeyPair GenerateKeyPair() + { + DsaParameters dsaParams = param.Parameters; + + BigInteger x = GeneratePrivateKey(dsaParams.Q, param.Random); + BigInteger y = CalculatePublicKey(dsaParams.P, dsaParams.G, x); + + return new AsymmetricCipherKeyPair( + new DsaPublicKeyParameters(y, dsaParams), + new DsaPrivateKeyParameters(x, dsaParams)); + } + + private static BigInteger GeneratePrivateKey(BigInteger q, SecureRandom random) + { + // B.1.2 Key Pair Generation by Testing Candidates + int minWeight = q.BitLength >> 2; + for (;;) + { + // TODO Prefer this method? (change test cases that used fixed random) + // B.1.1 Key Pair Generation Using Extra Random Bits + //BigInteger x = new BigInteger(q.BitLength + 64, random).Mod(q.Subtract(One)).Add(One); + + BigInteger x = BigIntegers.CreateRandomInRange(One, q.Subtract(One), random); + if (WNafUtilities.GetNafWeight(x) >= minWeight) + { + return x; + } + } + } + + private static BigInteger CalculatePublicKey(BigInteger p, BigInteger g, BigInteger x) + { + return g.ModPow(x, p); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs.meta new file mode 100644 index 00000000..7c3b9e3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d7a9505dee25094a95be5c48c579f41 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs new file mode 100644 index 00000000..c1c0227a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs @@ -0,0 +1,359 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Generate suitable parameters for DSA, in line with FIPS 186-2, or FIPS 186-3. + */ + public class DsaParametersGenerator + { + private IDigest digest; + private int L, N; + private int certainty; + private SecureRandom random; + private bool use186_3; + private int usageIndex; + + public DsaParametersGenerator() + : this(new Sha1Digest()) + { + } + + public DsaParametersGenerator(IDigest digest) + { + this.digest = digest; + } + + /// Initialise the generator + /// This form can only be used for older DSA (pre-DSA2) parameters + /// the size of keys in bits (from 512 up to 1024, and a multiple of 64) + /// measure of robustness of primes (at least 80 for FIPS 186-2 compliance) + /// the source of randomness to use + public virtual void Init( + int size, + int certainty, + SecureRandom random) + { + if (!IsValidDsaStrength(size)) + throw new ArgumentException("size must be from 512 - 1024 and a multiple of 64", "size"); + + this.use186_3 = false; + this.L = size; + this.N = GetDefaultN(size); + this.certainty = certainty; + this.random = random; + } + + /// Initialise the generator for DSA 2 + /// You must use this Init method if you need to generate parameters for DSA 2 keys + /// An instance of DsaParameterGenerationParameters used to configure this generator + public virtual void Init(DsaParameterGenerationParameters parameters) + { + // TODO Should we enforce the minimum 'certainty' values as per C.3 Table C.1? + this.use186_3 = true; + this.L = parameters.L; + this.N = parameters.N; + this.certainty = parameters.Certainty; + this.random = parameters.Random; + this.usageIndex = parameters.UsageIndex; + + if ((L < 1024 || L > 3072) || L % 1024 != 0) + throw new ArgumentException("Values must be between 1024 and 3072 and a multiple of 1024", "L"); + if (L == 1024 && N != 160) + throw new ArgumentException("N must be 160 for L = 1024"); + if (L == 2048 && (N != 224 && N != 256)) + throw new ArgumentException("N must be 224 or 256 for L = 2048"); + if (L == 3072 && N != 256) + throw new ArgumentException("N must be 256 for L = 3072"); + + if (digest.GetDigestSize() * 8 < N) + throw new InvalidOperationException("Digest output size too small for value of N"); + } + + /// Generates a set of DsaParameters + /// Can take a while... + public virtual DsaParameters GenerateParameters() + { + return use186_3 + ? GenerateParameters_FIPS186_3() + : GenerateParameters_FIPS186_2(); + } + + protected virtual DsaParameters GenerateParameters_FIPS186_2() + { + byte[] seed = new byte[20]; + byte[] part1 = new byte[20]; + byte[] part2 = new byte[20]; + byte[] u = new byte[20]; + int n = (L - 1) / 160; + byte[] w = new byte[L / 8]; + + if (!(digest is Sha1Digest)) + throw new InvalidOperationException("can only use SHA-1 for generating FIPS 186-2 parameters"); + + for (;;) + { + random.NextBytes(seed); + + Hash(digest, seed, part1); + Array.Copy(seed, 0, part2, 0, seed.Length); + Inc(part2); + Hash(digest, part2, part2); + + for (int i = 0; i != u.Length; i++) + { + u[i] = (byte)(part1[i] ^ part2[i]); + } + + u[0] |= (byte)0x80; + u[19] |= (byte)0x01; + + BigInteger q = new BigInteger(1, u); + + if (!q.IsProbablePrime(certainty)) + continue; + + byte[] offset = Arrays.Clone(seed); + Inc(offset); + + for (int counter = 0; counter < 4096; ++counter) + { + for (int k = 0; k < n; k++) + { + Inc(offset); + Hash(digest, offset, part1); + Array.Copy(part1, 0, w, w.Length - (k + 1) * part1.Length, part1.Length); + } + + Inc(offset); + Hash(digest, offset, part1); + Array.Copy(part1, part1.Length - ((w.Length - (n) * part1.Length)), w, 0, w.Length - n * part1.Length); + + w[0] |= (byte)0x80; + + BigInteger x = new BigInteger(1, w); + + BigInteger c = x.Mod(q.ShiftLeft(1)); + + BigInteger p = x.Subtract(c.Subtract(BigInteger.One)); + + if (p.BitLength != L) + continue; + + if (p.IsProbablePrime(certainty)) + { + BigInteger g = CalculateGenerator_FIPS186_2(p, q, random); + + return new DsaParameters(p, q, g, new DsaValidationParameters(seed, counter)); + } + } + } + } + + protected virtual BigInteger CalculateGenerator_FIPS186_2(BigInteger p, BigInteger q, SecureRandom r) + { + BigInteger e = p.Subtract(BigInteger.One).Divide(q); + BigInteger pSub2 = p.Subtract(BigInteger.Two); + + for (;;) + { + BigInteger h = BigIntegers.CreateRandomInRange(BigInteger.Two, pSub2, r); + BigInteger g = h.ModPow(e, p); + + if (g.BitLength > 1) + return g; + } + } + + /** + * generate suitable parameters for DSA, in line with + * FIPS 186-3 A.1 Generation of the FFC Primes p and q. + */ + protected virtual DsaParameters GenerateParameters_FIPS186_3() + { +// A.1.1.2 Generation of the Probable Primes p and q Using an Approved Hash Function + IDigest d = digest; + int outlen = d.GetDigestSize() * 8; + +// 1. Check that the (L, N) pair is in the list of acceptable (L, N pairs) (see Section 4.2). If +// the pair is not in the list, then return INVALID. + // Note: checked at initialisation + +// 2. If (seedlen < N), then return INVALID. + // FIXME This should be configurable (must be >= N) + int seedlen = N; + byte[] seed = new byte[seedlen / 8]; + +// 3. n = ceiling(L ⁄ outlen) – 1. + int n = (L - 1) / outlen; + +// 4. b = L – 1 – (n ∗ outlen). + int b = (L - 1) % outlen; + + byte[] output = new byte[d.GetDigestSize()]; + for (;;) + { +// 5. Get an arbitrary sequence of seedlen bits as the domain_parameter_seed. + random.NextBytes(seed); + +// 6. U = Hash (domain_parameter_seed) mod 2^(N–1). + Hash(d, seed, output); + BigInteger U = new BigInteger(1, output).Mod(BigInteger.One.ShiftLeft(N - 1)); + +// 7. q = 2^(N–1) + U + 1 – ( U mod 2). + BigInteger q = U.SetBit(0).SetBit(N - 1); + +// 8. Test whether or not q is prime as specified in Appendix C.3. + // TODO Review C.3 for primality checking + if (!q.IsProbablePrime(certainty)) + { +// 9. If q is not a prime, then go to step 5. + continue; + } + +// 10. offset = 1. + // Note: 'offset' value managed incrementally + byte[] offset = Arrays.Clone(seed); + +// 11. For counter = 0 to (4L – 1) do + int counterLimit = 4 * L; + for (int counter = 0; counter < counterLimit; ++counter) + { +// 11.1 For j = 0 to n do +// Vj = Hash ((domain_parameter_seed + offset + j) mod 2^seedlen). +// 11.2 W = V0 + (V1 ∗ 2^outlen) + ... + (V^(n–1) ∗ 2^((n–1) ∗ outlen)) + ((Vn mod 2^b) ∗ 2^(n ∗ outlen)). + // TODO Assemble w as a byte array + BigInteger W = BigInteger.Zero; + for (int j = 0, exp = 0; j <= n; ++j, exp += outlen) + { + Inc(offset); + Hash(d, offset, output); + + BigInteger Vj = new BigInteger(1, output); + if (j == n) + { + Vj = Vj.Mod(BigInteger.One.ShiftLeft(b)); + } + + W = W.Add(Vj.ShiftLeft(exp)); + } + +// 11.3 X = W + 2^(L–1). Comment: 0 ≤ W < 2L–1; hence, 2L–1 ≤ X < 2L. + BigInteger X = W.Add(BigInteger.One.ShiftLeft(L - 1)); + +// 11.4 c = X mod 2q. + BigInteger c = X.Mod(q.ShiftLeft(1)); + +// 11.5 p = X - (c - 1). Comment: p ≡ 1 (mod 2q). + BigInteger p = X.Subtract(c.Subtract(BigInteger.One)); + + // 11.6 If (p < 2^(L - 1)), then go to step 11.9 + if (p.BitLength != L) + continue; + +// 11.7 Test whether or not p is prime as specified in Appendix C.3. + // TODO Review C.3 for primality checking + if (p.IsProbablePrime(certainty)) + { +// 11.8 If p is determined to be prime, then return VALID and the values of p, q and +// (optionally) the values of domain_parameter_seed and counter. + // TODO Make configurable (8-bit unsigned)? + + if (usageIndex >= 0) + { + BigInteger g = CalculateGenerator_FIPS186_3_Verifiable(d, p, q, seed, usageIndex); + if (g != null) + return new DsaParameters(p, q, g, new DsaValidationParameters(seed, counter, usageIndex)); + } + + { + BigInteger g = CalculateGenerator_FIPS186_3_Unverifiable(p, q, random); + + return new DsaParameters(p, q, g, new DsaValidationParameters(seed, counter)); + } + } + +// 11.9 offset = offset + n + 1. Comment: Increment offset; then, as part of +// the loop in step 11, increment counter; if +// counter < 4L, repeat steps 11.1 through 11.8. + // Note: 'offset' value already incremented in inner loop + } +// 12. Go to step 5. + } + } + + protected virtual BigInteger CalculateGenerator_FIPS186_3_Unverifiable(BigInteger p, BigInteger q, + SecureRandom r) + { + return CalculateGenerator_FIPS186_2(p, q, r); + } + + protected virtual BigInteger CalculateGenerator_FIPS186_3_Verifiable(IDigest d, BigInteger p, BigInteger q, + byte[] seed, int index) + { + // A.2.3 Verifiable Canonical Generation of the Generator g + BigInteger e = p.Subtract(BigInteger.One).Divide(q); + byte[] ggen = Hex.DecodeStrict("6767656E"); + + // 7. U = domain_parameter_seed || "ggen" || index || count. + byte[] U = new byte[seed.Length + ggen.Length + 1 + 2]; + Array.Copy(seed, 0, U, 0, seed.Length); + Array.Copy(ggen, 0, U, seed.Length, ggen.Length); + U[U.Length - 3] = (byte)index; + + byte[] w = new byte[d.GetDigestSize()]; + for (int count = 1; count < (1 << 16); ++count) + { + Inc(U); + Hash(d, U, w); + BigInteger W = new BigInteger(1, w); + BigInteger g = W.ModPow(e, p); + + if (g.CompareTo(BigInteger.Two) >= 0) + return g; + } + + return null; + } + + private static bool IsValidDsaStrength( + int strength) + { + return strength >= 512 && strength <= 1024 && strength % 64 == 0; + } + + protected static void Hash(IDigest d, byte[] input, byte[] output) + { + d.BlockUpdate(input, 0, input.Length); + d.DoFinal(output, 0); + } + + private static int GetDefaultN(int L) + { + return L > 1024 ? 256 : 160; + } + + protected static void Inc(byte[] buf) + { + for (int i = buf.Length - 1; i >= 0; --i) + { + byte b = (byte)(buf[i] + 1); + buf[i] = b; + + if (b != 0) + break; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs.meta new file mode 100644 index 00000000..77bced8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b909747924741146803cbe3be2e7280 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/DsaParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs new file mode 100644 index 00000000..33b6cb6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs @@ -0,0 +1,190 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class ECKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private readonly string algorithm; + + private ECDomainParameters parameters; + private DerObjectIdentifier publicKeyParamSet; + private SecureRandom random; + + public ECKeyPairGenerator() + : this("EC") + { + } + + public ECKeyPairGenerator( + string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + + this.algorithm = ECKeyParameters.VerifyAlgorithmName(algorithm); + } + + public void Init( + KeyGenerationParameters parameters) + { + if (parameters is ECKeyGenerationParameters) + { + ECKeyGenerationParameters ecP = (ECKeyGenerationParameters) parameters; + + this.publicKeyParamSet = ecP.PublicKeyParamSet; + this.parameters = ecP.DomainParameters; + } + else + { + DerObjectIdentifier oid; + switch (parameters.Strength) + { + case 192: + oid = X9ObjectIdentifiers.Prime192v1; + break; + case 224: + oid = SecObjectIdentifiers.SecP224r1; + break; + case 239: + oid = X9ObjectIdentifiers.Prime239v1; + break; + case 256: + oid = X9ObjectIdentifiers.Prime256v1; + break; + case 384: + oid = SecObjectIdentifiers.SecP384r1; + break; + case 521: + oid = SecObjectIdentifiers.SecP521r1; + break; + default: + throw new InvalidParameterException("unknown key size."); + } + + X9ECParameters ecps = FindECCurveByOid(oid); + + this.publicKeyParamSet = oid; + this.parameters = new ECDomainParameters( + ecps.Curve, ecps.G, ecps.N, ecps.H, ecps.GetSeed()); + } + + this.random = parameters.Random; + + if (this.random == null) + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + } + + /** + * Given the domain parameters this routine generates an EC key + * pair in accordance with X9.62 section 5.2.1 pages 26, 27. + */ + public AsymmetricCipherKeyPair GenerateKeyPair() + { + BigInteger n = parameters.N; + BigInteger d; + int minWeight = n.BitLength >> 2; + + for (;;) + { + d = new BigInteger(n.BitLength, random); + + if (d.CompareTo(BigInteger.One) < 0 || d.CompareTo(n) >= 0) + continue; + + if (WNafUtilities.GetNafWeight(d) < minWeight) + continue; + + break; + } + + ECPoint q = CreateBasePointMultiplier().Multiply(parameters.G, d); + + if (publicKeyParamSet != null) + { + return new AsymmetricCipherKeyPair( + new ECPublicKeyParameters(algorithm, q, publicKeyParamSet), + new ECPrivateKeyParameters(algorithm, d, publicKeyParamSet)); + } + + return new AsymmetricCipherKeyPair( + new ECPublicKeyParameters(algorithm, q, parameters), + new ECPrivateKeyParameters(algorithm, d, parameters)); + } + + protected virtual ECMultiplier CreateBasePointMultiplier() + { + return new FixedPointCombMultiplier(); + } + + internal static X9ECParameters FindECCurveByName(string name) + { + X9ECParameters ecP = CustomNamedCurves.GetByName(name); + if (ecP == null) + { + ecP = ECNamedCurveTable.GetByName(name); + } + return ecP; + } + + internal static X9ECParametersHolder FindECCurveByNameLazy(string name) + { + X9ECParametersHolder holder = CustomNamedCurves.GetByNameLazy(name); + if (holder == null) + { + holder = ECNamedCurveTable.GetByNameLazy(name); + } + return holder; + } + + internal static X9ECParameters FindECCurveByOid(DerObjectIdentifier oid) + { + X9ECParameters ecP = CustomNamedCurves.GetByOid(oid); + if (ecP == null) + { + ecP = ECNamedCurveTable.GetByOid(oid); + } + return ecP; + } + + internal static X9ECParametersHolder FindECCurveByOidLazy(DerObjectIdentifier oid) + { + X9ECParametersHolder holder = CustomNamedCurves.GetByOidLazy(oid); + if (holder == null) + { + holder = ECNamedCurveTable.GetByOidLazy(oid); + } + return holder; + } + + internal static ECPublicKeyParameters GetCorrespondingPublicKey( + ECPrivateKeyParameters privKey) + { + ECDomainParameters ec = privKey.Parameters; + ECPoint q = new FixedPointCombMultiplier().Multiply(ec.G, privKey.D); + + if (privKey.PublicKeyParamSet != null) + { + return new ECPublicKeyParameters(privKey.AlgorithmName, q, privKey.PublicKeyParamSet); + } + + return new ECPublicKeyParameters(privKey.AlgorithmName, q, ec); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs.meta new file mode 100644 index 00000000..375c8660 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e92a9e0fd2d687a4ab1287c7157ec5a3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ECKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs new file mode 100644 index 00000000..e80681a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class Ed25519KeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private SecureRandom random; + + public virtual void Init(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + Ed25519PrivateKeyParameters privateKey = new Ed25519PrivateKeyParameters(random); + Ed25519PublicKeyParameters publicKey = privateKey.GeneratePublicKey(); + return new AsymmetricCipherKeyPair(publicKey, privateKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs.meta new file mode 100644 index 00000000..f89bfbaa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05a4d5644f5c6e64f85d8825a8bb766c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed25519KeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs new file mode 100644 index 00000000..cfec5c76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class Ed448KeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private SecureRandom random; + + public virtual void Init(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + Ed448PrivateKeyParameters privateKey = new Ed448PrivateKeyParameters(random); + Ed448PublicKeyParameters publicKey = privateKey.GeneratePublicKey(); + return new AsymmetricCipherKeyPair(publicKey, privateKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs.meta new file mode 100644 index 00000000..3587e8d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 226ca45f4849c5344b748d2d66f408ff +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Ed448KeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs new file mode 100644 index 00000000..ef780a84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * a ElGamal key pair generator. + *

+ * This Generates keys consistent for use with ElGamal as described in + * page 164 of "Handbook of Applied Cryptography".

+ */ + public class ElGamalKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private ElGamalKeyGenerationParameters param; + + public void Init( + KeyGenerationParameters parameters) + { + this.param = (ElGamalKeyGenerationParameters) parameters; + } + + public AsymmetricCipherKeyPair GenerateKeyPair() + { + DHKeyGeneratorHelper helper = DHKeyGeneratorHelper.Instance; + ElGamalParameters egp = param.Parameters; + DHParameters dhp = new DHParameters(egp.P, egp.G, null, 0, egp.L); + + BigInteger x = helper.CalculatePrivate(dhp, param.Random); + BigInteger y = helper.CalculatePublic(dhp, x); + + return new AsymmetricCipherKeyPair( + new ElGamalPublicKeyParameters(y, egp), + new ElGamalPrivateKeyParameters(x, egp)); + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs.meta new file mode 100644 index 00000000..658484a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8cdb2b6491a41e14c9390d896b88a607 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs new file mode 100644 index 00000000..12499b5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class ElGamalParametersGenerator + { + private int size; + private int certainty; + private SecureRandom random; + + public void Init( + int size, + int certainty, + SecureRandom random) + { + this.size = size; + this.certainty = certainty; + this.random = random; + } + + /** + * which Generates the p and g values from the given parameters, + * returning the ElGamalParameters object. + *

+ * Note: can take a while... + *

+ */ + public ElGamalParameters GenerateParameters() + { + // + // find a safe prime p where p = 2*q + 1, where p and q are prime. + // + BigInteger[] safePrimes = DHParametersHelper.GenerateSafePrimes(size, certainty, random); + + BigInteger p = safePrimes[0]; + BigInteger q = safePrimes[1]; + BigInteger g = DHParametersHelper.SelectGenerator(p, q, random); + + return new ElGamalParameters(p, g); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs.meta new file mode 100644 index 00000000..5f78366c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d37f120fe9417b489fddcaf24464bcf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/ElGamalParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs new file mode 100644 index 00000000..78ebbfb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * a GOST3410 key pair generator. + * This generates GOST3410 keys in line with the method described + * in GOST R 34.10-94. + */ + public class Gost3410KeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private Gost3410KeyGenerationParameters param; + + public void Init( + KeyGenerationParameters parameters) + { + if (parameters is Gost3410KeyGenerationParameters) + { + this.param = (Gost3410KeyGenerationParameters) parameters; + } + else + { + Gost3410KeyGenerationParameters kgp = new Gost3410KeyGenerationParameters( + parameters.Random, + CryptoProObjectIdentifiers.GostR3410x94CryptoProA); + + if (parameters.Strength != kgp.Parameters.P.BitLength - 1) + { + // TODO Should we complain? + } + + this.param = kgp; + } + } + + public AsymmetricCipherKeyPair GenerateKeyPair() + { + SecureRandom random = param.Random; + Gost3410Parameters gost3410Params = param.Parameters; + + BigInteger q = gost3410Params.Q, x; + + int minWeight = 64; + for (;;) + { + x = new BigInteger(256, random); + + if (x.SignValue < 1 || x.CompareTo(q) >= 0) + continue; + + if (WNafUtilities.GetNafWeight(x) < minWeight) + continue; + + break; + } + + BigInteger p = gost3410Params.P; + BigInteger a = gost3410Params.A; + + // calculate the public key. + BigInteger y = a.ModPow(x, p); + + if (param.PublicKeyParamSet != null) + { + return new AsymmetricCipherKeyPair( + new Gost3410PublicKeyParameters(y, param.PublicKeyParamSet), + new Gost3410PrivateKeyParameters(x, param.PublicKeyParamSet)); + } + + return new AsymmetricCipherKeyPair( + new Gost3410PublicKeyParameters(y, gost3410Params), + new Gost3410PrivateKeyParameters(x, gost3410Params)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs.meta new file mode 100644 index 00000000..67fa41ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a0d6deb37aecdd74681d22229adbb1f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410KeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs new file mode 100644 index 00000000..97b55fcc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs @@ -0,0 +1,534 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * generate suitable parameters for GOST3410. + */ + public class Gost3410ParametersGenerator + { + private int size; + private int typeproc; + private SecureRandom init_random; + + /** + * initialise the key generator. + * + * @param size size of the key + * @param typeProcedure type procedure A,B = 1; A',B' - else + * @param random random byte source. + */ + public void Init( + int size, + int typeProcedure, + SecureRandom random) + { + this.size = size; + this.typeproc = typeProcedure; + this.init_random = random; + } + + //Procedure A + private int procedure_A(int x0, int c, BigInteger[] pq, int size) + { + //Verify and perform condition: 065536) + { + x0 = init_random.NextInt()/32768; + } + + while((c<0 || c>65536) || (c/2==0)) + { + c = init_random.NextInt()/32768 + 1; + } + + BigInteger C = BigInteger.ValueOf(c); + BigInteger constA16 = BigInteger.ValueOf(19381); + + //step1 + BigInteger[] y = new BigInteger[1]; // begin length = 1 + y[0] = BigInteger.ValueOf(x0); + + //step 2 + int[] t = new int[1]; // t - orders; begin length = 1 + t[0] = size; + int s = 0; + for (int i=0; t[i]>=17; i++) + { + // extension array t + int[] tmp_t = new int[t.Length + 1]; /////////////// + Array.Copy(t,0,tmp_t,0,t.Length); // extension + t = new int[tmp_t.Length]; // array t + Array.Copy(tmp_t, 0, t, 0, tmp_t.Length); /////////////// + + t[i+1] = t[i]/2; + s = i+1; + } + + //step3 + BigInteger[] p = new BigInteger[s+1]; + p[s] = new BigInteger("8003",16); //set min prime number length 16 bit + + int m = s-1; //step4 + + for (int i=0; i t[m]) + { + goto step6; //step 12 + } + + p[m] = NByLastP.Add(BigInteger.One); + + //step13 + if (BigInteger.Two.ModPow(NByLastP, p[m]).CompareTo(BigInteger.One) == 0 + && BigInteger.Two.ModPow(N, p[m]).CompareTo(BigInteger.One) != 0) + { + break; + } + + N = N.Add(BigInteger.Two); + } + + if (--m < 0) + { + pq[0] = p[0]; + pq[1] = p[1]; + return y[0].IntValue; //return for procedure B step 2 + } + + break; //step 14 + } + } + return y[0].IntValue; + } + + //Procedure A' + private long procedure_Aa(long x0, long c, BigInteger[] pq, int size) + { + //Verify and perform condition: 04294967296L) + { + x0 = init_random.NextInt()*2; + } + + while((c<0 || c>4294967296L) || (c/2==0)) + { + c = init_random.NextInt()*2+1; + } + + BigInteger C = BigInteger.ValueOf(c); + BigInteger constA32 = BigInteger.ValueOf(97781173); + + //step1 + BigInteger[] y = new BigInteger[1]; // begin length = 1 + y[0] = BigInteger.ValueOf(x0); + + //step 2 + int[] t = new int[1]; // t - orders; begin length = 1 + t[0] = size; + int s = 0; + for (int i=0; t[i]>=33; i++) + { + // extension array t + int[] tmp_t = new int[t.Length + 1]; /////////////// + Array.Copy(t,0,tmp_t,0,t.Length); // extension + t = new int[tmp_t.Length]; // array t + Array.Copy(tmp_t, 0, t, 0, tmp_t.Length); /////////////// + + t[i+1] = t[i]/2; + s = i+1; + } + + //step3 + BigInteger[] p = new BigInteger[s+1]; + p[s] = new BigInteger("8000000B",16); //set min prime number length 32 bit + + int m = s-1; //step4 + + for (int i=0; i t[m]) + { + goto step6; //step 12 + } + + p[m] = NByLastP.Add(BigInteger.One); + + //step13 + if (BigInteger.Two.ModPow(NByLastP, p[m]).CompareTo(BigInteger.One) == 0 + && BigInteger.Two.ModPow(N, p[m]).CompareTo(BigInteger.One) != 0) + { + break; + } + + N = N.Add(BigInteger.Two); + } + + if (--m < 0) + { + pq[0] = p[0]; + pq[1] = p[1]; + return y[0].LongValue; //return for procedure B' step 2 + } + + break; //step 14 + } + } + return y[0].LongValue; + } + + //Procedure B + private void procedure_B(int x0, int c, BigInteger[] pq) + { + //Verify and perform condition: 065536) + { + x0 = init_random.NextInt()/32768; + } + + while((c<0 || c>65536) || (c/2==0)) + { + c = init_random.NextInt()/32768 + 1; + } + + BigInteger [] qp = new BigInteger[2]; + BigInteger q = null, Q = null, p = null; + BigInteger C = BigInteger.ValueOf(c); + BigInteger constA16 = BigInteger.ValueOf(19381); + + //step1 + x0 = procedure_A(x0, c, qp, 256); + q = qp[0]; + + //step2 + x0 = procedure_A(x0, c, qp, 512); + Q = qp[0]; + + BigInteger[] y = new BigInteger[65]; + y[0] = BigInteger.ValueOf(x0); + + const int tp = 1024; + + BigInteger qQ = q.Multiply(Q); + +step3: + for(;;) + { + //step 3 + for (int j=0; j<64; j++) + { + y[j+1] = (y[j].Multiply(constA16).Add(C)).Mod(BigInteger.Two.Pow(16)); + } + + //step 4 + BigInteger Y = BigInteger.Zero; + + for (int j=0; j<64; j++) + { + Y = Y.Add(y[j].ShiftLeft(16*j)); + } + + y[0] = y[64]; //step 5 + + //step 6 + BigInteger N = BigInteger.One.ShiftLeft(tp-1).Divide(qQ).Add( + Y.ShiftLeft(tp-1).Divide(qQ.ShiftLeft(1024))); + + if (N.TestBit(0)) + { + N = N.Add(BigInteger.One); + } + + //step 7 + + for(;;) + { + //step 11 + BigInteger qQN = qQ.Multiply(N); + + if (qQN.BitLength > tp) + { + goto step3; //step 9 + } + + p = qQN.Add(BigInteger.One); + + //step10 + if (BigInteger.Two.ModPow(qQN, p).CompareTo(BigInteger.One) == 0 + && BigInteger.Two.ModPow(q.Multiply(N), p).CompareTo(BigInteger.One) != 0) + { + pq[0] = p; + pq[1] = q; + return; + } + + N = N.Add(BigInteger.Two); + } + } + } + + //Procedure B' + private void procedure_Bb(long x0, long c, BigInteger[] pq) + { + //Verify and perform condition: 04294967296L) + { + x0 = init_random.NextInt()*2; + } + + while((c<0 || c>4294967296L) || (c/2==0)) + { + c = init_random.NextInt()*2+1; + } + + BigInteger [] qp = new BigInteger[2]; + BigInteger q = null, Q = null, p = null; + BigInteger C = BigInteger.ValueOf(c); + BigInteger constA32 = BigInteger.ValueOf(97781173); + + //step1 + x0 = procedure_Aa(x0, c, qp, 256); + q = qp[0]; + + //step2 + x0 = procedure_Aa(x0, c, qp, 512); + Q = qp[0]; + + BigInteger[] y = new BigInteger[33]; + y[0] = BigInteger.ValueOf(x0); + + const int tp = 1024; + + BigInteger qQ = q.Multiply(Q); + +step3: + for(;;) + { + //step 3 + for (int j=0; j<32; j++) + { + y[j+1] = (y[j].Multiply(constA32).Add(C)).Mod(BigInteger.Two.Pow(32)); + } + + //step 4 + BigInteger Y = BigInteger.Zero; + for (int j=0; j<32; j++) + { + Y = Y.Add(y[j].ShiftLeft(32*j)); + } + + y[0] = y[32]; //step 5 + + //step 6 + BigInteger N = BigInteger.One.ShiftLeft(tp-1).Divide(qQ).Add( + Y.ShiftLeft(tp-1).Divide(qQ.ShiftLeft(1024))); + + if (N.TestBit(0)) + { + N = N.Add(BigInteger.One); + } + + //step 7 + + for(;;) + { + //step 11 + BigInteger qQN = qQ.Multiply(N); + + if (qQN.BitLength > tp) + { + goto step3; //step 9 + } + + p = qQN.Add(BigInteger.One); + + //step10 + if (BigInteger.Two.ModPow(qQN, p).CompareTo(BigInteger.One) == 0 + && BigInteger.Two.ModPow(q.Multiply(N), p).CompareTo(BigInteger.One) != 0) + { + pq[0] = p; + pq[1] = q; + return; + } + + N = N.Add(BigInteger.Two); + } + } + } + + + /** + * Procedure C + * procedure generates the a value from the given p,q, + * returning the a value. + */ + private BigInteger procedure_C(BigInteger p, BigInteger q) + { + BigInteger pSub1 = p.Subtract(BigInteger.One); + BigInteger pSub1Divq = pSub1.Divide(q); + + for(;;) + { + BigInteger d = new BigInteger(p.BitLength, init_random); + + // 1 < d < p-1 + if (d.CompareTo(BigInteger.One) > 0 && d.CompareTo(pSub1) < 0) + { + BigInteger a = d.ModPow(pSub1Divq, p); + + if (a.CompareTo(BigInteger.One) != 0) + { + return a; + } + } + } + } + + /** + * which generates the p , q and a values from the given parameters, + * returning the Gost3410Parameters object. + */ + public Gost3410Parameters GenerateParameters() + { + BigInteger [] pq = new BigInteger[2]; + BigInteger q = null, p = null, a = null; + + int x0, c; + long x0L, cL; + + if (typeproc==1) + { + x0 = init_random.NextInt(); + c = init_random.NextInt(); + + switch(size) + { + case 512: + procedure_A(x0, c, pq, 512); + break; + case 1024: + procedure_B(x0, c, pq); + break; + default: + throw new ArgumentException("Ooops! key size 512 or 1024 bit."); + } + p = pq[0]; q = pq[1]; + a = procedure_C(p, q); + //System.out.println("p:"+p.toString(16)+"\n"+"q:"+q.toString(16)+"\n"+"a:"+a.toString(16)); + //System.out.println("p:"+p+"\n"+"q:"+q+"\n"+"a:"+a); + return new Gost3410Parameters(p, q, a, new Gost3410ValidationParameters(x0, c)); + } + else + { + x0L = init_random.NextLong(); + cL = init_random.NextLong(); + + switch(size) + { + case 512: + procedure_Aa(x0L, cL, pq, 512); + break; + case 1024: + procedure_Bb(x0L, cL, pq); + break; + default: + throw new InvalidOperationException("Ooops! key size 512 or 1024 bit."); + } + p = pq[0]; q = pq[1]; + a = procedure_C(p, q); + //System.out.println("p:"+p.toString(16)+"\n"+"q:"+q.toString(16)+"\n"+"a:"+a.toString(16)); + //System.out.println("p:"+p+"\n"+"q:"+q+"\n"+"a:"+a); + return new Gost3410Parameters(p, q, a, new Gost3410ValidationParameters(x0L, cL)); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs.meta new file mode 100644 index 00000000..52b391ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 85de73367cf272f47b6a49d02a0536b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/GOST3410ParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs new file mode 100644 index 00000000..0622fb49 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs @@ -0,0 +1,180 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented + * according to IETF RFC 5869, May 2010 as specified by H. Krawczyk, IBM + * Research & P. Eronen, Nokia. It uses a HMac internally to compute de OKM + * (output keying material) and is likely to have better security properties + * than KDF's based on just a hash function. + */ + public sealed class HkdfBytesGenerator + : IDerivationFunction + { + private HMac hMacHash; + private int hashLen; + + private byte[] info; + private byte[] currentT; + + private int generatedBytes; + + /** + * Creates a HKDFBytesGenerator based on the given hash function. + * + * @param hash the digest to be used as the source of generatedBytes bytes + */ + public HkdfBytesGenerator(IDigest hash) + { + this.hMacHash = new HMac(hash); + this.hashLen = hash.GetDigestSize(); + } + + public void Init(IDerivationParameters parameters) + { + if (!(parameters is HkdfParameters hkdfParameters)) + throw new ArgumentException("HKDF parameters required for HkdfBytesGenerator", "parameters"); + + if (hkdfParameters.SkipExtract) + { + // use IKM directly as PRK + hMacHash.Init(new KeyParameter(hkdfParameters.GetIkm())); + } + else + { + hMacHash.Init(Extract(hkdfParameters.GetSalt(), hkdfParameters.GetIkm())); + } + + info = hkdfParameters.GetInfo(); + + generatedBytes = 0; + currentT = new byte[hashLen]; + } + + /** + * Performs the extract part of the key derivation function. + * + * @param salt the salt to use + * @param ikm the input keying material + * @return the PRK as KeyParameter + */ + private KeyParameter Extract(byte[] salt, byte[] ikm) + { + if (salt == null) + { + // TODO check if hashLen is indeed same as HMAC size + hMacHash.Init(new KeyParameter(new byte[hashLen])); + } + else + { + hMacHash.Init(new KeyParameter(salt)); + } + + hMacHash.BlockUpdate(ikm, 0, ikm.Length); + + byte[] prk = new byte[hashLen]; + hMacHash.DoFinal(prk, 0); + return new KeyParameter(prk); + } + + /** + * Performs the expand part of the key derivation function, using currentT + * as input and output buffer. + * + * @throws DataLengthException if the total number of bytes generated is larger than the one + * specified by RFC 5869 (255 * HashLen) + */ + private void ExpandNext() + { + int n = generatedBytes / hashLen + 1; + if (n >= 256) + { + throw new DataLengthException( + "HKDF cannot generate more than 255 blocks of HashLen size"); + } + // special case for T(0): T(0) is empty, so no update + if (generatedBytes != 0) + { + hMacHash.BlockUpdate(currentT, 0, hashLen); + } + hMacHash.BlockUpdate(info, 0, info.Length); + hMacHash.Update((byte)n); + hMacHash.DoFinal(currentT, 0); + } + + public IDigest Digest => hMacHash.GetUnderlyingDigest(); + + public int GenerateBytes(byte[] output, int outOff, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + if (generatedBytes > 255 * hashLen - length) + throw new DataLengthException("HKDF may only be used for 255 * HashLen bytes of output"); + + int toGenerate = length; + int posInT = generatedBytes % hashLen; + if (posInT != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(hashLen - posInT, toGenerate); + Array.Copy(currentT, posInT, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + while (toGenerate > 0) + { + ExpandNext(); + int toCopy = System.Math.Min(hashLen, toGenerate); + Array.Copy(currentT, 0, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int length = output.Length; + if (generatedBytes > 255 * hashLen - length) + throw new DataLengthException("HKDF may only be used for 255 * HashLen bytes of output"); + + int posInT = generatedBytes % hashLen; + if (posInT != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(hashLen - posInT, output.Length); + currentT.AsSpan(posInT, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + while (!output.IsEmpty) + { + ExpandNext(); + int toCopy = System.Math.Min(hashLen, output.Length); + currentT.AsSpan(0, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + return length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs.meta new file mode 100644 index 00000000..2823f2de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5dc8bb4a7ea06e64ca30ed36950729de +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/HKDFBytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs new file mode 100644 index 00000000..3c02f755 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs @@ -0,0 +1,166 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public sealed class KdfCounterBytesGenerator + : IMacDerivationFunction + { + private readonly IMac prf; + private readonly int h; + + private byte[] fixedInputDataCtrPrefix; + private byte[] fixedInputData_afterCtr; + private int maxSizeExcl; + // ios is i defined as an octet string (the binary representation) + private byte[] ios; + + // operational + private int generatedBytes; + // k is used as buffer for all K(i) values + private byte[] k; + + public KdfCounterBytesGenerator(IMac prf) + { + this.prf = prf; + this.h = prf.GetMacSize(); + this.k = new byte[h]; + } + + public void Init(IDerivationParameters param) + { + if (!(param is KdfCounterParameters kdfParams)) + throw new ArgumentException("Wrong type of arguments given"); + + // --- init mac based PRF --- + + this.prf.Init(new KeyParameter(kdfParams.Ki)); + + // --- set arguments --- + + this.fixedInputDataCtrPrefix = kdfParams.FixedInputDataCounterPrefix; + this.fixedInputData_afterCtr = kdfParams.FixedInputDataCounterSuffix; + + int r = kdfParams.R; + this.ios = new byte[r / 8]; + + BigInteger maxSize = BigInteger.One.ShiftLeft(r).Multiply(BigInteger.ValueOf(h)); + this.maxSizeExcl = maxSize.BitLength > 31 ? int.MaxValue : maxSize.IntValueExact; + + // --- set operational state --- + + generatedBytes = 0; + } + + public IMac Mac => prf; + + public IDigest Digest + { + get { return (prf as HMac)?.GetUnderlyingDigest(); } + } + + public int GenerateBytes(byte[] output, int outOff, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int toGenerate = length; + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(h - posInK, toGenerate); + Array.Copy(k, posInK, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + while (toGenerate > 0) + { + GenerateNext(); + int toCopy = System.Math.Min(h, toGenerate); + Array.Copy(k, 0, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int length = output.Length; + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(h - posInK, output.Length); + k.AsSpan(posInK, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + while (!output.IsEmpty) + { + GenerateNext(); + int toCopy = System.Math.Min(h, output.Length); + k.AsSpan(0, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + return length; + } +#endif + + private void GenerateNext() + { + int i = generatedBytes / h + 1; + + // encode i into counter buffer + switch (ios.Length) + { + case 4: + ios[0] = (byte)(i >> 24); + // fall through + goto case 3; + case 3: + ios[ios.Length - 3] = (byte)(i >> 16); + // fall through + goto case 2; + case 2: + ios[ios.Length - 2] = (byte)(i >> 8); + // fall through + goto case 1; + case 1: + ios[ios.Length - 1] = (byte)i; + break; + default: + throw new InvalidOperationException("Unsupported size of counter i"); + } + + // special case for K(0): K(0) is empty, so no update + prf.BlockUpdate(fixedInputDataCtrPrefix, 0, fixedInputDataCtrPrefix.Length); + prf.BlockUpdate(ios, 0, ios.Length); + prf.BlockUpdate(fixedInputData_afterCtr, 0, fixedInputData_afterCtr.Length); + prf.DoFinal(k, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs.meta new file mode 100644 index 00000000..77ee22b1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc39111d8cdbba34ebdc8e5e74231af5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFCounterBytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs new file mode 100644 index 00000000..1d6cb634 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs @@ -0,0 +1,197 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public sealed class KdfDoublePipelineIterationBytesGenerator + : IMacDerivationFunction + { + // fields set by the constructor + private readonly IMac prf; + private readonly int h; + + // fields set by init + private byte[] fixedInputData; + private int maxSizeExcl; + // ios is i defined as an octet string (the binary representation) + private byte[] ios; + private bool useCounter; + + // operational + private int generatedBytes; + // k is used as buffer for all K(i) values + private byte[] a; + private byte[] k; + + public KdfDoublePipelineIterationBytesGenerator(IMac prf) + { + this.prf = prf; + this.h = prf.GetMacSize(); + this.a = new byte[h]; + this.k = new byte[h]; + } + + public void Init(IDerivationParameters parameters) + { + if (!(parameters is KdfDoublePipelineIterationParameters dpiParams)) + throw new ArgumentException("Wrong type of arguments given"); + + // --- init mac based PRF --- + + this.prf.Init(new KeyParameter(dpiParams.Ki)); + + // --- set arguments --- + + this.fixedInputData = dpiParams.FixedInputData; + + int r = dpiParams.R; + this.ios = new byte[r / 8]; + + if (dpiParams.UseCounter) + { + // this is more conservative than the spec + BigInteger maxSize = BigInteger.One.ShiftLeft(r).Multiply(BigInteger.ValueOf(h)); + this.maxSizeExcl = maxSize.BitLength > 31 ? int.MaxValue : maxSize.IntValueExact; + } + else + { + this.maxSizeExcl = int.MaxValue; + } + + this.useCounter = dpiParams.UseCounter; + + // --- set operational state --- + + generatedBytes = 0; + } + + private void GenerateNext() + { + if (generatedBytes == 0) + { + // --- step 4 --- + prf.BlockUpdate(fixedInputData, 0, fixedInputData.Length); + prf.DoFinal(a, 0); + } + else + { + // --- step 5a --- + prf.BlockUpdate(a, 0, a.Length); + prf.DoFinal(a, 0); + } + + // --- step 5b --- + prf.BlockUpdate(a, 0, a.Length); + + if (useCounter) + { + int i = generatedBytes / h + 1; + + // encode i into counter buffer + switch (ios.Length) + { + case 4: + ios[0] = (byte)(i >> 24); + // fall through + goto case 3; + case 3: + ios[ios.Length - 3] = (byte)(i >> 16); + // fall through + goto case 2; + case 2: + ios[ios.Length - 2] = (byte)(i >> 8); + // fall through + goto case 1; + case 1: + ios[ios.Length - 1] = (byte)i; + break; + default: + throw new InvalidOperationException("Unsupported size of counter i"); + } + prf.BlockUpdate(ios, 0, ios.Length); + } + + prf.BlockUpdate(fixedInputData, 0, fixedInputData.Length); + prf.DoFinal(k, 0); + } + + public IDigest Digest + { + get { return (prf as HMac)?.GetUnderlyingDigest(); } + } + + public int GenerateBytes(byte[] output, int outOff, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int toGenerate = length; + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(h - posInK, toGenerate); + Array.Copy(k, posInK, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + while (toGenerate > 0) + { + GenerateNext(); + int toCopy = System.Math.Min(h, toGenerate); + Array.Copy(k, 0, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int length = output.Length; + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + GenerateNext(); + int toCopy = System.Math.Min(h - posInK, output.Length); + k.AsSpan(posInK, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + while (!output.IsEmpty) + { + GenerateNext(); + int toCopy = System.Math.Min(h, output.Length); + k.AsSpan(0, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + return length; + } +#endif + + public IMac Mac => prf; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs.meta new file mode 100644 index 00000000..cfa49a7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb0bf8409b479ee47a685ff2f36a07f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFDoublePipelineIterationBytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs new file mode 100644 index 00000000..35c5e1cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs @@ -0,0 +1,193 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public sealed class KdfFeedbackBytesGenerator + : IMacDerivationFunction + { + // please refer to the standard for the meaning of the variable names + // all field lengths are in bytes, not in bits as specified by the standard + + // fields set by the constructor + private readonly IMac prf; + private readonly int h; + + // fields set by init + private byte[] fixedInputData; + private int maxSizeExcl; + // ios is i defined as an octet string (the binary representation) + private byte[] ios; + private byte[] iv; + private bool useCounter; + + // operational + private int generatedBytes; + // k is used as buffer for all K(i) values + private byte[] k; + + public KdfFeedbackBytesGenerator(IMac prf) + { + this.prf = prf; + this.h = prf.GetMacSize(); + this.k = new byte[h]; + } + + public void Init(IDerivationParameters parameters) + { + if (!(parameters is KdfFeedbackParameters feedbackParams)) + throw new ArgumentException("Wrong type of arguments given"); + + // --- init mac based PRF --- + + this.prf.Init(new KeyParameter(feedbackParams.Ki)); + + // --- set arguments --- + + this.fixedInputData = feedbackParams.FixedInputData; + + int r = feedbackParams.R; + this.ios = new byte[r / 8]; + + if (feedbackParams.UseCounter) + { + // this is more conservative than the spec + BigInteger maxSize = BigInteger.One.ShiftLeft(r).Multiply(BigInteger.ValueOf(h)); + this.maxSizeExcl = maxSize.BitLength > 31 ? int.MaxValue : maxSize.IntValueExact; + } + else + { + this.maxSizeExcl = int.MaxValue; + } + + this.iv = feedbackParams.Iv; + this.useCounter = feedbackParams.UseCounter; + + // --- set operational state --- + + generatedBytes = 0; + } + + public IDigest Digest + { + get { return (prf as HMac)?.GetUnderlyingDigest(); } + } + + public int GenerateBytes(byte[] output, int outOff, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int toGenerate = length; + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(h - posInK, toGenerate); + Array.Copy(k, posInK, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + while (toGenerate > 0) + { + GenerateNext(); + int toCopy = System.Math.Min(h, toGenerate); + Array.Copy(k, 0, output, outOff, toCopy); + generatedBytes += toCopy; + toGenerate -= toCopy; + outOff += toCopy; + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int length = output.Length; + if (generatedBytes >= maxSizeExcl - length) + throw new DataLengthException("Current KDFCTR may only be used for " + maxSizeExcl + " bytes"); + + int posInK = generatedBytes % h; + if (posInK != 0) + { + // copy what is left in the currentT (1..hash + int toCopy = System.Math.Min(h - posInK, output.Length); + k.AsSpan(posInK, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + while (!output.IsEmpty) + { + GenerateNext(); + int toCopy = System.Math.Min(h, output.Length); + k.AsSpan(0, toCopy).CopyTo(output); + generatedBytes += toCopy; + output = output[toCopy..]; + } + + return length; + } +#endif + + private void GenerateNext() + { + // TODO enable IV + if (generatedBytes == 0) + { + prf.BlockUpdate(iv, 0, iv.Length); + } + else + { + prf.BlockUpdate(k, 0, k.Length); + } + + if (useCounter) + { + int i = generatedBytes / h + 1; + + // encode i into counter buffer + switch (ios.Length) + { + case 4: + ios[0] = (byte)(i >> 24); + // fall through + goto case 3; + case 3: + ios[ios.Length - 3] = (byte)(i >> 16); + // fall through + goto case 2; + case 2: + ios[ios.Length - 2] = (byte)(i >> 8); + // fall through + goto case 1; + case 1: + ios[ios.Length - 1] = (byte)i; + break; + default: + throw new InvalidOperationException("Unsupported size of counter i"); + } + prf.BlockUpdate(ios, 0, ios.Length); + } + + prf.BlockUpdate(fixedInputData, 0, fixedInputData.Length); + prf.DoFinal(k, 0); + } + + public IMac Mac => prf; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs.meta new file mode 100644 index 00000000..10c699ae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 58963baccfc1e0f4fbca340b6726abb7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/KDFFeedbackBytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs new file mode 100644 index 00000000..92a657f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * KFD1 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033 + *
+ * This implementation is based on IEEE P1363/ISO 18033. + */ + public sealed class Kdf1BytesGenerator + : BaseKdfBytesGenerator + { + /** + * Construct a KDF1 byte generator. + * + * @param digest the digest to be used as the source of derived keys. + */ + public Kdf1BytesGenerator(IDigest digest) + : base(0, digest) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs.meta new file mode 100644 index 00000000..92f41f9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 71c746db80178644ebaf39e5b0218ead +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf1BytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs new file mode 100644 index 00000000..3ae92e5b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * KDF2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033 + *
+ * This implementation is based on IEEE P1363/ISO 18033. + */ + public sealed class Kdf2BytesGenerator + : BaseKdfBytesGenerator + { + /** + * Construct a KDF2 bytes generator. Generates key material + * according to IEEE P1363 or ISO 18033 depending on the initialisation. + * + * @param digest the digest to be used as the source of derived keys. + */ + public Kdf2BytesGenerator(IDigest digest) + : base(1, digest) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs.meta new file mode 100644 index 00000000..f7c47d89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d8f69934c97758b4fbbfa9b80e47aa3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Kdf2BytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs new file mode 100644 index 00000000..11028b90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /// Generator for MGF1 as defined in Pkcs 1v2 + public sealed class Mgf1BytesGenerator + : IDerivationFunction + { + private readonly IDigest m_digest; + private readonly int m_hLen; + + private byte[] m_buffer; + + /// the digest to be used as the source of generated bytes + public Mgf1BytesGenerator(IDigest digest) + { + m_digest = digest; + m_hLen = digest.GetDigestSize(); + } + + public void Init(IDerivationParameters parameters) + { + if (!(parameters is MgfParameters mgfParameters)) + throw new ArgumentException("MGF parameters required for MGF1Generator"); + + m_buffer = new byte[mgfParameters.SeedLength + 4 + m_hLen]; + mgfParameters.GetSeed(m_buffer, 0); + } + + /// the underlying digest. + public IDigest Digest => m_digest; + + /// Fill len bytes of the output buffer with bytes generated from the derivation function. + /// + public int GenerateBytes(byte[] output, int outOff, int length) + { + Check.OutputLength(output, outOff, length, "output buffer too small"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return GenerateBytes(output.AsSpan(outOff, length)); +#else + int hashPos = m_buffer.Length - m_hLen; + int counterPos = hashPos - 4; + uint counter = 0; + + m_digest.Reset(); + + int end = outOff + length; + int limit = end - m_hLen; + + while (outOff <= limit) + { + Pack.UInt32_To_BE(counter++, m_buffer, counterPos); + + m_digest.BlockUpdate(m_buffer, 0, hashPos); + m_digest.DoFinal(output, outOff); + + outOff += m_hLen; + } + + if (outOff < end) + { + Pack.UInt32_To_BE(counter, m_buffer, counterPos); + + m_digest.BlockUpdate(m_buffer, 0, hashPos); + m_digest.DoFinal(m_buffer, hashPos); + + Array.Copy(m_buffer, hashPos, output, outOff, end - outOff); + } + + return length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int GenerateBytes(Span output) + { + int hashPos = m_buffer.Length - m_hLen; + int counterPos = hashPos - 4; + uint counter = 0; + + m_digest.Reset(); + + int pos = 0, length = output.Length, limit = length - m_hLen; + + while (pos <= limit) + { + Pack.UInt32_To_BE(counter++, m_buffer.AsSpan(counterPos)); + + m_digest.BlockUpdate(m_buffer.AsSpan(0, hashPos)); + m_digest.DoFinal(output[pos..]); + + pos += m_hLen; + } + + if (pos < length) + { + Pack.UInt32_To_BE(counter, m_buffer.AsSpan(counterPos)); + + m_digest.BlockUpdate(m_buffer.AsSpan(0, hashPos)); + m_digest.DoFinal(m_buffer.AsSpan(hashPos)); + m_buffer.AsSpan(hashPos, length - pos).CopyTo(output[pos..]); + } + + return length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs.meta new file mode 100644 index 00000000..2c9e514a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7578f8928ecb36d4186cb9e9e9248c93 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Mgf1BytesGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs new file mode 100644 index 00000000..fe85e4e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs @@ -0,0 +1,263 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Key generation parameters for NaccacheStern cipher. For details on this cipher, please see + * + * http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf + */ + public class NaccacheSternKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private static readonly int[] smallPrimes = + { + 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, + 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, 139, 149, + 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, 229, 233, + 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, 317, 331, + 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, 421, 431, + 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, 521, 523, + 541, 547, 557 + }; + + private NaccacheSternKeyGenerationParameters param; + + /* + * (non-Javadoc) + * + * @see org.bouncycastle.crypto.AsymmetricCipherKeyPairGenerator#init(org.bouncycastle.crypto.KeyGenerationParameters) + */ + public void Init(KeyGenerationParameters parameters) + { + this.param = (NaccacheSternKeyGenerationParameters)parameters; + } + + /* + * (non-Javadoc) + * + * @see org.bouncycastle.crypto.AsymmetricCipherKeyPairGenerator#generateKeyPair() + */ + public AsymmetricCipherKeyPair GenerateKeyPair() + { + int strength = param.Strength; + SecureRandom rand = param.Random; + int certainty = param.Certainty; + + var smallPrimes = FindFirstPrimes(param.CountSmallPrimes); + + smallPrimes = PermuteList(smallPrimes, rand); + + BigInteger u = BigInteger.One; + BigInteger v = BigInteger.One; + + for (int i = 0; i < smallPrimes.Count / 2; i++) + { + u = u.Multiply((BigInteger)smallPrimes[i]); + } + for (int i = smallPrimes.Count / 2; i < smallPrimes.Count; i++) + { + v = v.Multiply((BigInteger)smallPrimes[i]); + } + + BigInteger sigma = u.Multiply(v); + + // n = (2 a u _p + 1 ) ( 2 b v _q + 1) + // -> |n| = strength + // |2| = 1 in bits + // -> |a| * |b| = |n| - |u| - |v| - |_p| - |_q| - |2| -|2| + // remainingStrength = strength - sigma.bitLength() - _p.bitLength() - + // _q.bitLength() - 1 -1 + int remainingStrength = strength - sigma.BitLength - 48; + BigInteger a = GeneratePrime(remainingStrength / 2 + 1, certainty, rand); + BigInteger b = GeneratePrime(remainingStrength / 2 + 1, certainty, rand); + + BigInteger _p; + BigInteger _q; + BigInteger p; + BigInteger q; + + long tries = 0; + + BigInteger _2au = a.Multiply(u).ShiftLeft(1); + BigInteger _2bv = b.Multiply(v).ShiftLeft(1); + + for (;;) + { + tries++; + + _p = GeneratePrime(24, certainty, rand); + + p = _p.Multiply(_2au).Add(BigInteger.One); + + if (!p.IsProbablePrime(certainty, true)) + continue; + + for (;;) + { + _q = GeneratePrime(24, certainty, rand); + + if (_p.Equals(_q)) + continue; + + q = _q.Multiply(_2bv).Add(BigInteger.One); + + if (q.IsProbablePrime(certainty, true)) + break; + } + + if (!sigma.Gcd(_p.Multiply(_q)).Equals(BigInteger.One)) + { + //Console.WriteLine("sigma.gcd(_p.mult(_q)) != 1!\n _p: " + _p +"\n _q: "+ _q ); + continue; + } + + if (p.Multiply(q).BitLength < strength) + { + continue; + } + break; + } + + BigInteger n = p.Multiply(q); + BigInteger phi_n = p.Subtract(BigInteger.One).Multiply(q.Subtract(BigInteger.One)); + BigInteger g; + tries = 0; + + for (;;) + { + // TODO After the first loop, just regenerate one randomly-selected gPart each time? + var gParts = new List(); + for (int ind = 0; ind != smallPrimes.Count; ind++) + { + BigInteger i = smallPrimes[ind]; + BigInteger e = phi_n.Divide(i); + + for (;;) + { + tries++; + + g = GeneratePrime(strength, certainty, rand); + + if (!g.ModPow(e, n).Equals(BigInteger.One)) + { + gParts.Add(g); + break; + } + } + } + g = BigInteger.One; + for (int i = 0; i < smallPrimes.Count; i++) + { + BigInteger gPart = (BigInteger) gParts[i]; + BigInteger smallPrime = (BigInteger) smallPrimes[i]; + g = g.Multiply(gPart.ModPow(sigma.Divide(smallPrime), n)).Mod(n); + } + + // make sure that g is not divisible by p_i or q_i + bool divisible = false; + for (int i = 0; i < smallPrimes.Count; i++) + { + if (g.ModPow(phi_n.Divide((BigInteger)smallPrimes[i]), n).Equals(BigInteger.One)) + { + divisible = true; + break; + } + } + + if (divisible) + { + continue; + } + + // make sure that g has order > phi_n/4 + + //if (g.ModPow(phi_n.Divide(BigInteger.ValueOf(4)), n).Equals(BigInteger.One)) + if (g.ModPow(phi_n.ShiftRight(2), n).Equals(BigInteger.One)) + { + continue; + } + + if (g.ModPow(phi_n.Divide(_p), n).Equals(BigInteger.One)) + { + continue; + } + if (g.ModPow(phi_n.Divide(_q), n).Equals(BigInteger.One)) + { + continue; + } + if (g.ModPow(phi_n.Divide(a), n).Equals(BigInteger.One)) + { + continue; + } + if (g.ModPow(phi_n.Divide(b), n).Equals(BigInteger.One)) + { + continue; + } + break; + } + + return new AsymmetricCipherKeyPair(new NaccacheSternKeyParameters(false, g, n, sigma.BitLength), + new NaccacheSternPrivateKeyParameters(g, n, sigma.BitLength, smallPrimes, phi_n)); + } + + private static BigInteger GeneratePrime(int bitLength, int certainty, SecureRandom rand) + { + return new BigInteger(bitLength, certainty, rand); + } + + /** + * Generates a permuted ArrayList from the original one. The original List + * is not modified + * + * @param arr + * the ArrayList to be permuted + * @param rand + * the source of Randomness for permutation + * @return a new IList with the permuted elements. + */ + private static IList PermuteList(IList arr, SecureRandom rand) + { + // TODO Create a utility method for generating permutation of first 'n' integers + + var retval = new List(arr.Count); + + foreach (var element in arr) + { + int index = rand.Next(retval.Count + 1); + retval.Insert(index, element); + } + + return retval; + } + + /** + * Finds the first 'count' primes starting with 3 + * + * @param count + * the number of primes to find + * @return a vector containing the found primes as Integer + */ + private static IList FindFirstPrimes(int count) + { + var primes = new List(count); + + for (int i = 0; i != count; i++) + { + primes.Add(BigInteger.ValueOf(smallPrimes[i])); + } + + return primes; + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs.meta new file mode 100644 index 00000000..487e29ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c29fa55407fbbe5459cec743e9286b87 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/NaccacheSternKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs new file mode 100644 index 00000000..4d34a146 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs @@ -0,0 +1,305 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Password hashing scheme BCrypt, + * designed by Niels Provos and David Mazières, using the + * String format and the Base64 encoding + * of the reference implementation on OpenBSD + */ + public class OpenBsdBCrypt + { + private static readonly byte[] EncodingTable = // the Bcrypts encoding table for OpenBSD + { + (byte)'.', (byte)'/', (byte)'A', (byte)'B', (byte)'C', (byte)'D', + (byte)'E', (byte)'F', (byte)'G', (byte)'H', (byte)'I', (byte)'J', + (byte)'K', (byte)'L', (byte)'M', (byte)'N', (byte)'O', (byte)'P', + (byte)'Q', (byte)'R', (byte)'S', (byte)'T', (byte)'U', (byte)'V', + (byte)'W', (byte)'X', (byte)'Y', (byte)'Z', (byte)'a', (byte)'b', + (byte)'c', (byte)'d', (byte)'e', (byte)'f', (byte)'g', (byte)'h', + (byte)'i', (byte)'j', (byte)'k', (byte)'l', (byte)'m', (byte)'n', + (byte)'o', (byte)'p', (byte)'q', (byte)'r', (byte)'s', (byte)'t', + (byte)'u', (byte)'v', (byte)'w', (byte)'x', (byte)'y', (byte)'z', + (byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', + (byte)'6', (byte)'7', (byte)'8', (byte)'9' + }; + + /* + * set up the decoding table. + */ + private static readonly byte[] DecodingTable = new byte[128]; + private static readonly string DefaultVersion = "2y"; + private static readonly HashSet AllowedVersions = new HashSet(); + + static OpenBsdBCrypt() + { + // Presently just the Bcrypt versions. + AllowedVersions.Add("2a"); + AllowedVersions.Add("2y"); + AllowedVersions.Add("2b"); + + for (int i = 0; i < DecodingTable.Length; i++) + { + DecodingTable[i] = (byte)0xff; + } + + for (int i = 0; i < EncodingTable.Length; i++) + { + DecodingTable[EncodingTable[i]] = (byte)i; + } + } + + public OpenBsdBCrypt() + { + } + + /** + * Creates a 60 character Bcrypt String, including + * version, cost factor, salt and hash, separated by '$' + * + * @param version the version, 2y,2b or 2a. (2a is not backwards compatible.) + * @param cost the cost factor, treated as an exponent of 2 + * @param salt a 16 byte salt + * @param password the password + * @return a 60 character Bcrypt String + */ + private static string CreateBcryptString(string version, byte[] password, byte[] salt, int cost) + { + if (!AllowedVersions.Contains(version)) + throw new ArgumentException("Version " + version + " is not accepted by this implementation.", "version"); + + StringBuilder sb = new StringBuilder(60); + sb.Append('$'); + sb.Append(version); + sb.Append('$'); + sb.Append(cost < 10 ? ("0" + cost) : cost.ToString()); + sb.Append('$'); + sb.Append(EncodeData(salt)); + + byte[] key = BCrypt.Generate(password, salt, cost); + + sb.Append(EncodeData(key)); + + return sb.ToString(); + } + + /** + * Creates a 60 character Bcrypt String, including + * version, cost factor, salt and hash, separated by '$' using version + * '2y'. + * + * @param cost the cost factor, treated as an exponent of 2 + * @param salt a 16 byte salt + * @param password the password + * @return a 60 character Bcrypt String + */ + public static string Generate(char[] password, byte[] salt, int cost) + { + return Generate(DefaultVersion, password, salt, cost); + } + + /** + * Creates a 60 character Bcrypt String, including + * version, cost factor, salt and hash, separated by '$' + * + * @param version the version, may be 2b, 2y or 2a. (2a is not backwards compatible.) + * @param cost the cost factor, treated as an exponent of 2 + * @param salt a 16 byte salt + * @param password the password + * @return a 60 character Bcrypt String + */ + public static string Generate(string version, char[] password, byte[] salt, int cost) + { + if (!AllowedVersions.Contains(version)) + throw new ArgumentException("Version " + version + " is not accepted by this implementation.", "version"); + if (password == null) + throw new ArgumentNullException("password"); + if (salt == null) + throw new ArgumentNullException("salt"); + if (salt.Length != 16) + throw new DataLengthException("16 byte salt required: " + salt.Length); + + if (cost < 4 || cost > 31) // Minimum rounds: 16, maximum 2^31 + throw new ArgumentException("Invalid cost factor.", "cost"); + + byte[] psw = Strings.ToUtf8ByteArray(password); + + // 0 termination: + + byte[] tmp = new byte[psw.Length >= 72 ? 72 : psw.Length + 1]; + int copyLen = System.Math.Min(psw.Length, tmp.Length); + Array.Copy(psw, 0, tmp, 0, copyLen); + + Array.Clear(psw, 0, psw.Length); + + string rv = CreateBcryptString(version, tmp, salt, cost); + + Array.Clear(tmp, 0, tmp.Length); + + return rv; + } + + /** + * Checks if a password corresponds to a 60 character Bcrypt String + * + * @param bcryptString a 60 character Bcrypt String, including + * version, cost factor, salt and hash, + * separated by '$' + * @param password the password as an array of chars + * @return true if the password corresponds to the + * Bcrypt String, otherwise false + */ + public static bool CheckPassword(string bcryptString, char[] password) + { + // validate bcryptString: + if (bcryptString.Length != 60) + throw new DataLengthException("Bcrypt String length: " + bcryptString.Length + ", 60 required."); + if (bcryptString[0] != '$' || bcryptString[3] != '$' || bcryptString[6] != '$') + throw new ArgumentException("Invalid Bcrypt String format.", "bcryptString"); + + string version = bcryptString.Substring(1, 2); + if (!AllowedVersions.Contains(version)) + throw new ArgumentException("Bcrypt version '" + version + "' is not supported by this implementation", "bcryptString"); + + int cost; + try + { + cost = int.Parse(bcryptString.Substring(4, 2)); + } + catch (Exception nfe) + { + throw new ArgumentException("Invalid cost factor: " + bcryptString.Substring(4, 2), "bcryptString", nfe); + } + if (cost < 4 || cost > 31) + throw new ArgumentException("Invalid cost factor: " + cost + ", 4 < cost < 31 expected."); + + // check password: + if (password == null) + throw new ArgumentNullException("Missing password."); + + int start = bcryptString.LastIndexOf('$') + 1, end = bcryptString.Length - 31; + byte[] salt = DecodeSaltString(bcryptString.Substring(start, end - start)); + + string newBcryptString = Generate(version, password, salt, cost); + + return bcryptString.Equals(newBcryptString); + } + + /* + * encode the input data producing a Bcrypt base 64 string. + * + * @param a byte representation of the salt or the password + * @return the Bcrypt base64 string + */ + private static string EncodeData(byte[] data) + { + if (data.Length != 24 && data.Length != 16) // 192 bit key or 128 bit salt expected + throw new DataLengthException("Invalid length: " + data.Length + ", 24 for key or 16 for salt expected"); + + bool salt = false; + if (data.Length == 16)//salt + { + salt = true; + byte[] tmp = new byte[18];// zero padding + Array.Copy(data, 0, tmp, 0, data.Length); + data = tmp; + } + else // key + { + data[data.Length - 1] = (byte)0; + } + + MemoryStream mOut = new MemoryStream(); + int len = data.Length; + + uint a1, a2, a3; + int i; + for (i = 0; i < len; i += 3) + { + a1 = data[i]; + a2 = data[i + 1]; + a3 = data[i + 2]; + + mOut.WriteByte(EncodingTable[(a1 >> 2) & 0x3f]); + mOut.WriteByte(EncodingTable[((a1 << 4) | (a2 >> 4)) & 0x3f]); + mOut.WriteByte(EncodingTable[((a2 << 2) | (a3 >> 6)) & 0x3f]); + mOut.WriteByte(EncodingTable[a3 & 0x3f]); + } + + string result = Strings.FromByteArray(mOut.ToArray()); + int resultLen = salt + ? 22 // truncate padding + : result.Length - 1; + + return result.Substring(0, resultLen); + } + + + /* + * decodes the bcrypt base 64 encoded SaltString + * + * @param a 22 character Bcrypt base 64 encoded String + * @return the 16 byte salt + * @exception DataLengthException if the length + * of parameter is not 22 + * @exception InvalidArgumentException if the parameter + * contains a value other than from Bcrypts base 64 encoding table + */ + private static byte[] DecodeSaltString(string saltString) + { + char[] saltChars = saltString.ToCharArray(); + + MemoryStream mOut = new MemoryStream(16); + byte b1, b2, b3, b4; + + if (saltChars.Length != 22)// bcrypt salt must be 22 (16 bytes) + throw new DataLengthException("Invalid base64 salt length: " + saltChars.Length + " , 22 required."); + + // check string for invalid characters: + for (int i = 0; i < saltChars.Length; i++) + { + int value = saltChars[i]; + if (value > 122 || value < 46 || (value > 57 && value < 65)) + throw new ArgumentException("Salt string contains invalid character: " + value, "saltString"); + } + + // Padding: add two '\u0000' + char[] tmp = new char[22 + 2]; + Array.Copy(saltChars, 0, tmp, 0, saltChars.Length); + saltChars = tmp; + + int len = saltChars.Length; + + for (int i = 0; i < len; i += 4) + { + b1 = DecodingTable[saltChars[i]]; + b2 = DecodingTable[saltChars[i + 1]]; + b3 = DecodingTable[saltChars[i + 2]]; + b4 = DecodingTable[saltChars[i + 3]]; + + mOut.WriteByte((byte)((b1 << 2) | (b2 >> 4))); + mOut.WriteByte((byte)((b2 << 4) | (b3 >> 2))); + mOut.WriteByte((byte)((b3 << 6) | b4)); + } + + byte[] saltBytes = mOut.ToArray(); + + // truncate: + byte[] tmpSalt = new byte[16]; + Array.Copy(saltBytes, 0, tmpSalt, 0, tmpSalt.Length); + saltBytes = tmpSalt; + + return saltBytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs.meta new file mode 100644 index 00000000..da5ce820 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d2fd5c2633a8c524499774e3ee4da6c2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenBsdBCrypt.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs new file mode 100644 index 00000000..8e3be377 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /// + /// Generator for PBE derived keys and IVs as usd by OpenSSL. Originally this scheme was a simple extension of + /// PKCS 5 V2.0 Scheme 1 using MD5 with an iteration count of 1. The default digest was changed to SHA-256 with + /// OpenSSL 1.1.0. This implementation still defaults to MD5, but the digest can now be set. + /// + public class OpenSslPbeParametersGenerator + : PbeParametersGenerator + { + private readonly IDigest digest; + + /// + /// + /// Construct a OpenSSL Parameters generator - digest the original MD5. + /// + /// + public OpenSslPbeParametersGenerator() : this(new MD5Digest()) + { + } + + /// + /// + /// Construct a OpenSSL Parameters generator - digest as specified. + /// + /// the digest to use as the PRF. + /// + public OpenSslPbeParametersGenerator(IDigest digest) + { + this.digest = digest; + } + + public override void Init( + byte[] password, + byte[] salt, + int iterationCount) + { + // Ignore the provided iterationCount + base.Init(password, salt, 1); + } + + /** + * Initialise - note the iteration count for this algorithm is fixed at 1. + * + * @param password password to use. + * @param salt salt to use. + */ + public virtual void Init( + byte[] password, + byte[] salt) + { + base.Init(password, salt, 1); + } + + /** + * the derived key function, the ith hash of the password and the salt. + */ + private byte[] GenerateDerivedKey( + int bytesNeeded) + { + byte[] buf = new byte[digest.GetDigestSize()]; + byte[] key = new byte[bytesNeeded]; + int offset = 0; + + for (;;) + { + digest.BlockUpdate(mPassword, 0, mPassword.Length); + digest.BlockUpdate(mSalt, 0, mSalt.Length); + + digest.DoFinal(buf, 0); + + int len = (bytesNeeded > buf.Length) ? buf.Length : bytesNeeded; + Array.Copy(buf, 0, key, offset, len); + offset += len; + + // check if we need any more + bytesNeeded -= len; + if (bytesNeeded == 0) + { + break; + } + + // do another round + digest.Reset(); + digest.BlockUpdate(buf, 0, buf.Length); + } + + return key; + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize) + { + keySize /= 8; + + byte[] dKey = GenerateDerivedKey(keySize); + + return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize, + int ivSize) + { + keySize /= 8; + ivSize /= 8; + + byte[] dKey = GenerateDerivedKey(keySize + ivSize); + KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + + return new ParametersWithIV(key, dKey, keySize, ivSize); + } + + /** + * Generate a key parameter for use with a MAC derived from the password, + * salt, and iteration count we are currently initialised with. + * + * @param keySize the size of the key we want (in bits) + * @return a KeyParameter object. + * @exception ArgumentException if the key length larger than the base hash size. + */ + public override ICipherParameters GenerateDerivedMacParameters( + int keySize) + { + keySize = keySize / 8; + + byte[] dKey = GenerateDerivedKey(keySize); + + return new KeyParameter(dKey, 0, keySize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs.meta new file mode 100644 index 00000000..95a78afb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 44c24ce050670094cbeacc6ed9cc61f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/OpenSSLPBEParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs new file mode 100644 index 00000000..a6317bf4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs @@ -0,0 +1,207 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Generator for Pbe derived keys and ivs as defined by Pkcs 12 V1.0. + *

+ * The document this implementation is based on can be found at + * + * RSA's Pkcs12 Page + *

+ */ + public class Pkcs12ParametersGenerator + : PbeParametersGenerator + { + public const int KeyMaterial = 1; + public const int IVMaterial = 2; + public const int MacMaterial = 3; + + private readonly IDigest digest; + + private readonly int u; + private readonly int v; + + /** + * Construct a Pkcs 12 Parameters generator. + * + * @param digest the digest to be used as the source of derived keys. + * @exception ArgumentException if an unknown digest is passed in. + */ + public Pkcs12ParametersGenerator( + IDigest digest) + { + this.digest = digest; + + u = digest.GetDigestSize(); + v = digest.GetByteLength(); + } + + /** + * add a + b + 1, returning the result in a. The a value is treated + * as a BigInteger of length (b.Length * 8) bits. The result is + * modulo 2^b.Length in case of overflow. + */ + private void Adjust( + byte[] a, + int aOff, + byte[] b) + { + int x = (b[b.Length - 1] & 0xff) + (a[aOff + b.Length - 1] & 0xff) + 1; + + a[aOff + b.Length - 1] = (byte)x; + x = (int) ((uint) x >> 8); + + for (int i = b.Length - 2; i >= 0; i--) + { + x += (b[i] & 0xff) + (a[aOff + i] & 0xff); + a[aOff + i] = (byte)x; + x = (int) ((uint) x >> 8); + } + } + + /** + * generation of a derived key ala Pkcs12 V1.0. + */ + private byte[] GenerateDerivedKey( + int idByte, + int n) + { + byte[] D = new byte[v]; + byte[] dKey = new byte[n]; + + for (int i = 0; i != D.Length; i++) + { + D[i] = (byte)idByte; + } + + byte[] S; + + if ((mSalt != null) && (mSalt.Length != 0)) + { + S = new byte[v * ((mSalt.Length + v - 1) / v)]; + + for (int i = 0; i != S.Length; i++) + { + S[i] = mSalt[i % mSalt.Length]; + } + } + else + { + S = new byte[0]; + } + + byte[] P; + + if ((mPassword != null) && (mPassword.Length != 0)) + { + P = new byte[v * ((mPassword.Length + v - 1) / v)]; + + for (int i = 0; i != P.Length; i++) + { + P[i] = mPassword[i % mPassword.Length]; + } + } + else + { + P = new byte[0]; + } + + byte[] I = new byte[S.Length + P.Length]; + + Array.Copy(S, 0, I, 0, S.Length); + Array.Copy(P, 0, I, S.Length, P.Length); + + byte[] B = new byte[v]; + int c = (n + u - 1) / u; + byte[] A = new byte[u]; + + for (int i = 1; i <= c; i++) + { + digest.BlockUpdate(D, 0, D.Length); + digest.BlockUpdate(I, 0, I.Length); + digest.DoFinal(A, 0); + + for (int j = 1; j != mIterationCount; j++) + { + digest.BlockUpdate(A, 0, A.Length); + digest.DoFinal(A, 0); + } + + for (int j = 0; j != B.Length; j++) + { + B[j] = A[j % A.Length]; + } + + for (int j = 0; j != I.Length / v; j++) + { + Adjust(I, j * v, B); + } + + if (i == c) + { + Array.Copy(A, 0, dKey, (i - 1) * u, dKey.Length - ((i - 1) * u)); + } + else + { + Array.Copy(A, 0, dKey, (i - 1) * u, A.Length); + } + } + + return dKey; + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize) + { + keySize /= 8; + + byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize); + + return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize, + int ivSize) + { + keySize /= 8; + ivSize /= 8; + + byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize); + KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + + byte[] iv = GenerateDerivedKey(IVMaterial, ivSize); + + return new ParametersWithIV(key, iv, 0, ivSize); + } + + /** + * Generate a key parameter for use with a MAC derived from the password, + * salt, and iteration count we are currently initialised with. + * + * @param keySize the size of the key we want (in bits) + * @return a KeyParameter object. + */ + public override ICipherParameters GenerateDerivedMacParameters( + int keySize) + { + keySize /= 8; + + byte[] dKey = GenerateDerivedKey(MacMaterial, keySize); + + return new KeyParameter(dKey, 0, keySize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs.meta new file mode 100644 index 00000000..758460f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a87fe1cd419e1934eb8c093990d78809 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs12ParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs new file mode 100644 index 00000000..e4f1867e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 1. + * Note this generator is limited to the size of the hash produced by the + * digest used to drive it. + *

+ * The document this implementation is based on can be found at + * + * RSA's Pkcs5 Page + *

+ */ + public class Pkcs5S1ParametersGenerator + : PbeParametersGenerator + { + private readonly IDigest digest; + + /** + * Construct a Pkcs 5 Scheme 1 Parameters generator. + * + * @param digest the digest to be used as the source of derived keys. + */ + public Pkcs5S1ParametersGenerator( + IDigest digest) + { + this.digest = digest; + } + + /** + * the derived key function, the ith hash of the mPassword and the mSalt. + */ + private byte[] GenerateDerivedKey() + { + byte[] digestBytes = new byte[digest.GetDigestSize()]; + + digest.BlockUpdate(mPassword, 0, mPassword.Length); + digest.BlockUpdate(mSalt, 0, mSalt.Length); + + digest.DoFinal(digestBytes, 0); + for (int i = 1; i < mIterationCount; i++) + { + digest.BlockUpdate(digestBytes, 0, digestBytes.Length); + digest.DoFinal(digestBytes, 0); + } + + return digestBytes; + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize) + { + keySize /= 8; + + if (keySize > digest.GetDigestSize()) + { + throw new ArgumentException( + "Can't Generate a derived key " + keySize + " bytes long."); + } + + byte[] dKey = GenerateDerivedKey(); + + return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize, + int ivSize) + { + keySize /= 8; + ivSize /= 8; + + if ((keySize + ivSize) > digest.GetDigestSize()) + { + throw new ArgumentException( + "Can't Generate a derived key " + (keySize + ivSize) + " bytes long."); + } + + byte[] dKey = GenerateDerivedKey(); + KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + + return new ParametersWithIV(key, dKey, keySize, ivSize); + } + + /** + * Generate a key parameter for use with a MAC derived from the mPassword, + * mSalt, and iteration count we are currently initialised with. + * + * @param keySize the size of the key we want (in bits) + * @return a KeyParameter object. + * @exception ArgumentException if the key length larger than the base hash size. + */ + public override ICipherParameters GenerateDerivedMacParameters( + int keySize) + { + keySize /= 8; + + if (keySize > digest.GetDigestSize()) + { + throw new ArgumentException( + "Can't Generate a derived key " + keySize + " bytes long."); + } + + byte[] dKey = GenerateDerivedKey(); + + return new KeyParameter(dKey, 0, keySize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs.meta new file mode 100644 index 00000000..b84992f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 879260314ed88734c969c559f2b3b846 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S1ParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs new file mode 100644 index 00000000..fea7ddc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs @@ -0,0 +1,148 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 2. + * This generator uses a SHA-1 HMac as the calculation function. + *

+ * The document this implementation is based on can be found at + * + * RSA's Pkcs5 Page

+ */ + public class Pkcs5S2ParametersGenerator + : PbeParametersGenerator + { + private readonly IMac hMac; + private readonly byte[] state; + + /** + * construct a Pkcs5 Scheme 2 Parameters generator. + */ + public Pkcs5S2ParametersGenerator() + : this(new Sha1Digest()) + { + } + + public Pkcs5S2ParametersGenerator(IDigest digest) + { + this.hMac = new HMac(digest); + this.state = new byte[hMac.GetMacSize()]; + } + + private void F( + byte[] S, + int c, + byte[] iBuf, + byte[] outBytes, + int outOff) + { + if (c == 0) + throw new ArgumentException("iteration count must be at least 1."); + + if (S != null) + { + hMac.BlockUpdate(S, 0, S.Length); + } + + hMac.BlockUpdate(iBuf, 0, iBuf.Length); + hMac.DoFinal(state, 0); + + Array.Copy(state, 0, outBytes, outOff, state.Length); + + for (int count = 1; count < c; ++count) + { + hMac.BlockUpdate(state, 0, state.Length); + hMac.DoFinal(state, 0); + + for (int j = 0; j < state.Length; ++j) + { + outBytes[outOff + j] ^= state[j]; + } + } + } + + private byte[] GenerateDerivedKey( + int dkLen) + { + int hLen = hMac.GetMacSize(); + int l = (dkLen + hLen - 1) / hLen; + byte[] iBuf = new byte[4]; + byte[] outBytes = new byte[l * hLen]; + int outPos = 0; + + ICipherParameters param = new KeyParameter(mPassword); + + hMac.Init(param); + + for (int i = 1; i <= l; i++) + { + // Increment the value in 'iBuf' + int pos = 3; + while (++iBuf[pos] == 0) + { + --pos; + } + + F(mSalt, mIterationCount, iBuf, outBytes, outPos); + outPos += hLen; + } + + return outBytes; + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize) + { + keySize /= 8; + + byte[] dKey = GenerateDerivedKey(keySize); + + return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + } + + public override ICipherParameters GenerateDerivedParameters( + string algorithm, + int keySize, + int ivSize) + { + keySize /= 8; + ivSize /= 8; + + byte[] dKey = GenerateDerivedKey(keySize + ivSize); + KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize); + + return new ParametersWithIV(key, dKey, keySize, ivSize); + } + + /** + * Generate a key parameter for use with a MAC derived from the password, + * salt, and iteration count we are currently initialised with. + * + * @param keySize the size of the key we want (in bits) + * @return a KeyParameter object. + */ + public override ICipherParameters GenerateDerivedMacParameters( + int keySize) + { + keySize /= 8; + + byte[] dKey = GenerateDerivedKey(keySize); + + return new KeyParameter(dKey, 0, keySize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs.meta new file mode 100644 index 00000000..89b9797e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1734f017d19ae4945b8c2694150c953a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Pkcs5S2ParametersGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs new file mode 100644 index 00000000..d0412174 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs @@ -0,0 +1,120 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /// + /// Generates keys for the Poly1305 MAC. + /// + /// + /// Poly1305 keys are 256 bit keys consisting of a 128 bit secret key used for the underlying block + /// cipher followed by a 128 bit {@code r} value used for the polynomial portion of the Mac.
+ /// The {@code r} value has a specific format with some bits required to be cleared, resulting in an + /// effective 106 bit key.
+ /// A separately generated 256 bit key can be modified to fit the Poly1305 key format by using the + /// {@link #clamp(byte[])} method to clear the required bits. + ///
+ /// + public class Poly1305KeyGenerator + : CipherKeyGenerator + { + private const byte R_MASK_LOW_2 = (byte)0xFC; + private const byte R_MASK_HIGH_4 = (byte)0x0F; + + /// + /// Initialises the key generator. + /// + /// + /// Poly1305 keys are always 256 bits, so the key length in the provided parameters is ignored. + /// + protected override void EngineInit(KeyGenerationParameters param) + { + // Poly1305 keys are always 256 bits + this.random = param.Random; + this.strength = 32; + } + + /// + /// Generates a 256 bit key in the format required for Poly1305 - e.g. + /// k[0] ... k[15], r[0] ... r[15] with the required bits in r cleared + /// as per . + /// + protected override byte[] EngineGenerateKey() + { + byte[] key = base.EngineGenerateKey(); + Clamp(key); + return key; + } + + /// + /// Modifies an existing 32 byte key value to comply with the requirements of the Poly1305 key by + /// clearing required bits in the r (second 16 bytes) portion of the key.
+ /// Specifically: + ///
    + ///
  • r[3], r[7], r[11], r[15] have top four bits clear (i.e., are {0, 1, . . . , 15})
  • + ///
  • r[4], r[8], r[12] have bottom two bits clear (i.e., are in {0, 4, 8, . . . , 252})
  • + ///
+ ///
+ /// a 32 byte key value k[0] ... k[15], r[0] ... r[15] + public static void Clamp(byte[] key) + { + /* + * Key is k[0] ... k[15], r[0] ... r[15] as per poly1305_aes_clamp in ref impl. + */ + if (key.Length != 32) + throw new ArgumentException("Poly1305 key must be 256 bits."); + + /* + * r[3], r[7], r[11], r[15] have top four bits clear (i.e., are {0, 1, . . . , 15}) + */ + key[3] &= R_MASK_HIGH_4; + key[7] &= R_MASK_HIGH_4; + key[11] &= R_MASK_HIGH_4; + key[15] &= R_MASK_HIGH_4; + + /* + * r[4], r[8], r[12] have bottom two bits clear (i.e., are in {0, 4, 8, . . . , 252}). + */ + key[4] &= R_MASK_LOW_2; + key[8] &= R_MASK_LOW_2; + key[12] &= R_MASK_LOW_2; + } + + /// + /// Checks a 32 byte key for compliance with the Poly1305 key requirements, e.g. + /// k[0] ... k[15], r[0] ... r[15] with the required bits in r cleared + /// as per . + /// + /// Key. + /// if the key is of the wrong length, or has invalid bits set + /// in the r portion of the key. + public static void CheckKey(byte[] key) + { + if (key.Length != 32) + throw new ArgumentException("Poly1305 key must be 256 bits."); + + CheckMask(key[3], R_MASK_HIGH_4); + CheckMask(key[7], R_MASK_HIGH_4); + CheckMask(key[11], R_MASK_HIGH_4); + CheckMask(key[15], R_MASK_HIGH_4); + + CheckMask(key[4], R_MASK_LOW_2); + CheckMask(key[8], R_MASK_LOW_2); + CheckMask(key[12], R_MASK_LOW_2); + } + + private static void CheckMask(byte b, byte mask) + { + if ((b & (~mask)) != 0) + throw new ArgumentException("Invalid format for r portion of Poly1305 key."); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs.meta new file mode 100644 index 00000000..1bc05c92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7cdc89ee4e677e24fb9024bb1979fa6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/Poly1305KeyGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs new file mode 100644 index 00000000..f74a26e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * Generate a random factor suitable for use with RSA blind signatures + * as outlined in Chaum's blinding and unblinding as outlined in + * "Handbook of Applied Cryptography", page 475. + */ + public class RsaBlindingFactorGenerator + { + private RsaKeyParameters key; + private SecureRandom random; + + /** + * Initialise the factor generator + * + * @param param the necessary RSA key parameters. + */ + public void Init(ICipherParameters param) + { + if (param is ParametersWithRandom rParam) + { + key = (RsaKeyParameters)rParam.Parameters; + random = rParam.Random; + } + else + { + key = (RsaKeyParameters)param; + random = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (key.IsPrivate) + throw new ArgumentException("generator requires RSA public key"); + } + + /** + * Generate a suitable blind factor for the public key the generator was initialised with. + * + * @return a random blind factor + */ + public BigInteger GenerateBlindingFactor() + { + if (key == null) + throw new InvalidOperationException("generator not initialised"); + + BigInteger m = key.Modulus; + int length = m.BitLength - 1; // must be less than m.BitLength + BigInteger factor; + BigInteger gcd; + + do + { + factor = new BigInteger(length, random); + gcd = factor.Gcd(m); + } + while (factor.SignValue == 0 || factor.Equals(BigInteger.One) || !gcd.Equals(BigInteger.One)); + + return factor; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs.meta new file mode 100644 index 00000000..c42e8341 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8ea6007ca73d3104e99c0a18f45e9079 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RSABlindingFactorGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs new file mode 100644 index 00000000..1e34b953 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /** + * an RSA key pair generator. + */ + public class RsaKeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private static readonly int[] SPECIAL_E_VALUES = new int[]{ 3, 5, 17, 257, 65537 }; + private static readonly int SPECIAL_E_HIGHEST = SPECIAL_E_VALUES[SPECIAL_E_VALUES.Length - 1]; + private static readonly int SPECIAL_E_BITS = BigInteger.ValueOf(SPECIAL_E_HIGHEST).BitLength; + + protected static readonly BigInteger One = BigInteger.One; + protected static readonly BigInteger DefaultPublicExponent = BigInteger.ValueOf(0x10001); + protected const int DefaultTests = 100; + + protected RsaKeyGenerationParameters parameters; + + public virtual void Init( + KeyGenerationParameters parameters) + { + if (parameters is RsaKeyGenerationParameters) + { + this.parameters = (RsaKeyGenerationParameters)parameters; + } + else + { + this.parameters = new RsaKeyGenerationParameters( + DefaultPublicExponent, parameters.Random, parameters.Strength, DefaultTests); + } + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + for (;;) + { + // + // p and q values should have a length of half the strength in bits + // + int strength = parameters.Strength; + int pBitlength = (strength + 1) / 2; + int qBitlength = strength - pBitlength; + int mindiffbits = strength / 3; + int minWeight = strength >> 2; + + BigInteger e = parameters.PublicExponent; + + // TODO Consider generating safe primes for p, q (see DHParametersHelper.generateSafePrimes) + // (then p-1 and q-1 will not consist of only small factors - see "Pollard's algorithm") + + BigInteger p = ChooseRandomPrime(pBitlength, e); + BigInteger q, n; + + // + // generate a modulus of the required length + // + for (;;) + { + q = ChooseRandomPrime(qBitlength, e); + + // p and q should not be too close together (or equal!) + BigInteger diff = q.Subtract(p).Abs(); + if (diff.BitLength < mindiffbits) + continue; + + // + // calculate the modulus + // + n = p.Multiply(q); + + if (n.BitLength != strength) + { + // + // if we get here our primes aren't big enough, make the largest + // of the two p and try again + // + p = p.Max(q); + continue; + } + + /* + * Require a minimum weight of the NAF representation, since low-weight composites may + * be weak against a version of the number-field-sieve for factoring. + * + * See "The number field sieve for integers of low weight", Oliver Schirokauer. + */ + if (WNafUtilities.GetNafWeight(n) < minWeight) + { + p = ChooseRandomPrime(pBitlength, e); + continue; + } + + break; + } + + if (p.CompareTo(q) < 0) + { + BigInteger tmp = p; + p = q; + q = tmp; + } + + BigInteger pSub1 = p.Subtract(One); + BigInteger qSub1 = q.Subtract(One); + //BigInteger phi = pSub1.Multiply(qSub1); + BigInteger gcd = pSub1.Gcd(qSub1); + BigInteger lcm = pSub1.Divide(gcd).Multiply(qSub1); + + // + // calculate the private exponent + // + BigInteger d = e.ModInverse(lcm); + + if (d.BitLength <= qBitlength) + continue; + + // + // calculate the CRT factors + // + BigInteger dP = d.Remainder(pSub1); + BigInteger dQ = d.Remainder(qSub1); + BigInteger qInv = BigIntegers.ModOddInverse(p, q); + + return new AsymmetricCipherKeyPair( + new RsaKeyParameters(false, n, e), + new RsaPrivateCrtKeyParameters(n, e, d, p, q, dP, dQ, qInv)); + } + } + + /// Choose a random prime value for use with RSA + /// the bit-length of the returned prime + /// the RSA public exponent + /// a prime p, with (p-1) relatively prime to e + protected virtual BigInteger ChooseRandomPrime(int bitlength, BigInteger e) + { + bool eIsKnownOddPrime = (e.BitLength <= SPECIAL_E_BITS) && Arrays.Contains(SPECIAL_E_VALUES, e.IntValue); + + for (;;) + { + BigInteger p = new BigInteger(bitlength, 1, parameters.Random); + + if (p.Mod(e).Equals(One)) + continue; + + if (!p.IsProbablePrime(parameters.Certainty, true)) + continue; + + if (!eIsKnownOddPrime && !e.Gcd(p.Subtract(One)).Equals(One)) + continue; + + return p; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs.meta new file mode 100644 index 00000000..19b13fb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5e558ccd1a254f649a6d7b6a46ce918f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/RsaKeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs new file mode 100644 index 00000000..09afa333 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs @@ -0,0 +1,276 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + /// Implementation of the scrypt a password-based key derivation function. + /// + /// Scrypt was created by Colin Percival and is specified in + /// draft-josefsson-scrypt-kd. + /// + public class SCrypt + { + /// Generate a key using the scrypt key derivation function. + /// the bytes of the pass phrase. + /// the salt to use for this invocation. + /// CPU/Memory cost parameter. Must be larger than 1, a power of 2 and less than + /// 2^(128 * r / 8). + /// the block size, must be >= 1. + /// Parallelization parameter. Must be a positive integer less than or equal to + /// int.MaxValue / (128 * r * 8). + /// the length of the key to generate. + /// the generated key. + public static byte[] Generate(byte[] P, byte[] S, int N, int r, int p, int dkLen) + { + if (P == null) + throw new ArgumentNullException("Passphrase P must be provided."); + if (S == null) + throw new ArgumentNullException("Salt S must be provided."); + if (N <= 1 || !IsPowerOf2(N)) + throw new ArgumentException("Cost parameter N must be > 1 and a power of 2."); + // Only value of r that cost (as an int) could be exceeded for is 1 + if (r == 1 && N >= 65536) + throw new ArgumentException("Cost parameter N must be > 1 and < 65536."); + if (r < 1) + throw new ArgumentException("Block size r must be >= 1."); + int maxParallel = int.MaxValue / (128 * r * 8); + if (p < 1 || p > maxParallel) + { + throw new ArgumentException("Parallelisation parameter p must be >= 1 and <= " + maxParallel + + " (based on block size r of " + r + ")"); + } + if (dkLen < 1) + throw new ArgumentException("Generated key length dkLen must be >= 1."); + + return MFcrypt(P, S, N, r, p, dkLen); + } + + private static byte[] MFcrypt(byte[] P, byte[] S, int N, int r, int p, int dkLen) + { + int MFLenBytes = r * 128; + byte[] bytes = SingleIterationPBKDF2(P, S, p * MFLenBytes); + + uint[] B = null; + + try + { + int BLen = bytes.Length >> 2; + B = new uint[BLen]; + + Pack.LE_To_UInt32(bytes, 0, B); + + /* + * Chunk memory allocations; We choose 'd' so that there will be 2**d chunks, each not + * larger than 32KiB, except that the minimum chunk size is 2 * r * 32. + */ + int d = 0, total = N * r; + while ((N - d) > 2 && total > (1 << 10)) + { + ++d; + total >>= 1; + } + + int MFLenWords = MFLenBytes >> 2; + for (int BOff = 0; BOff < BLen; BOff += MFLenWords) + { + // TODO These can be done in parallel threads + SMix(B, BOff, N, d, r); + } + + Pack.UInt32_To_LE(B, bytes, 0); + + return SingleIterationPBKDF2(P, bytes, dkLen); + } + finally + { + ClearAll(bytes, B); + } + } + + private static byte[] SingleIterationPBKDF2(byte[] P, byte[] S, int dkLen) + { + PbeParametersGenerator pGen = new Pkcs5S2ParametersGenerator(new Sha256Digest()); + pGen.Init(P, S, 1); + KeyParameter key = (KeyParameter)pGen.GenerateDerivedMacParameters(dkLen * 8); + return key.GetKey(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void SMix(uint[] B, int BOff, int N, int d, int r) + { + int powN = Integers.NumberOfTrailingZeros(N); + int blocksPerChunk = N >> d; + int chunkCount = 1 << d, chunkMask = blocksPerChunk - 1, chunkPow = powN - d; + + int BCount = r * 32; + + uint[] blockY = new uint[BCount]; + + uint[][] VV = new uint[chunkCount][]; + + try + { + var X = B.AsSpan(BOff, BCount); + + for (int c = 0; c < chunkCount; ++c) + { + uint[] V = new uint[blocksPerChunk * BCount]; + VV[c] = V; + + Nat.Copy(BCount, X, V); + int off = 0; + for (int i = 1; i < blocksPerChunk; ++i) + { + BlockMix(V.AsSpan(off, BCount), V.AsSpan(off + BCount)); + off += BCount; + } + BlockMix(V.AsSpan()[^BCount..], X); + } + + uint mask = (uint)N - 1; + for (int i = 0; i < N; ++i) + { + int j = (int)(X[BCount - 16] & mask); + uint[] V = VV[j >> chunkPow]; + int VOff = (j & chunkMask) * BCount; + Nat.Xor(BCount, V.AsSpan(VOff), X, blockY); + BlockMix(blockY, X); + } + } + finally + { + ClearAll(VV); + Clear(blockY); + } + } + + private static void BlockMix(Span B, Span Y) + { + int BCount = B.Length; + int half = BCount >> 1; + var y1 = B[^16..]; + + for (int pos = 0; pos < BCount; pos += 32) + { + var b0 = B[pos..]; + var y0 = Y[(pos >> 1)..]; + Nat512.Xor(y1, b0, y0); + Salsa20Engine.SalsaCore(8, y0, y0); + + var b1 = b0[16..]; + y1 = y0[half..]; + Nat512.Xor(y0, b1, y1); + Salsa20Engine.SalsaCore(8, y1, y1); + } + } +#else + private static void SMix(uint[] B, int BOff, int N, int d, int r) + { + int powN = Integers.NumberOfTrailingZeros(N); + int blocksPerChunk = N >> d; + int chunkCount = 1 << d, chunkMask = blocksPerChunk - 1, chunkPow = powN - d; + + int BCount = r * 32; + + uint[] blockX1 = new uint[16]; + uint[] blockY = new uint[BCount]; + + uint[] X = new uint[BCount]; + uint[][] VV = new uint[chunkCount][]; + + try + { + Array.Copy(B, BOff, X, 0, BCount); + + for (int c = 0; c < chunkCount; ++c) + { + uint[] V = new uint[blocksPerChunk * BCount]; + VV[c] = V; + + int off = 0; + for (int i = 0; i < blocksPerChunk; i += 2) + { + Array.Copy(X, 0, V, off, BCount); + off += BCount; + BlockMix(X, blockX1, blockY, r); + Array.Copy(blockY, 0, V, off, BCount); + off += BCount; + BlockMix(blockY, blockX1, X, r); + } + } + + uint mask = (uint)N - 1; + for (int i = 0; i < N; ++i) + { + int j = (int)(X[BCount - 16] & mask); + uint[] V = VV[j >> chunkPow]; + int VOff = (j & chunkMask) * BCount; + Nat.Xor(BCount, V, VOff, X, 0, blockY, 0); + + BlockMix(blockY, blockX1, X, r); + } + + Array.Copy(X, 0, B, BOff, BCount); + } + finally + { + ClearAll(VV); + ClearAll(X, blockX1, blockY); + } + } + + private static void BlockMix(uint[] B, uint[] X1, uint[] Y, int r) + { + Array.Copy(B, B.Length - 16, X1, 0, 16); + + int BOff = 0, YOff = 0, halfLen = B.Length >> 1; + + for (int i = 2 * r; i > 0; --i) + { + Nat512.XorTo(B, BOff, X1, 0); + + Salsa20Engine.SalsaCore(8, X1, X1); + Array.Copy(X1, 0, Y, YOff, 16); + + YOff = halfLen + BOff - YOff; + BOff += 16; + } + } +#endif + + private static void Clear(Array array) + { + if (array != null) + { + Array.Clear(array, 0, array.Length); + } + } + + private static void ClearAll(params Array[] arrays) + { + foreach (Array array in arrays) + { + Clear(array); + } + } + + // note: we know X is non-zero + private static bool IsPowerOf2(int x) + { + Debug.Assert(x != 0); + + return (x & (x - 1)) == 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs.meta new file mode 100644 index 00000000..5270093a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 810ca4047bb07d94fb6b01735a6f373b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/SCrypt.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs new file mode 100644 index 00000000..c1fddb1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class X25519KeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private SecureRandom random; + + public virtual void Init(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + X25519PrivateKeyParameters privateKey = new X25519PrivateKeyParameters(random); + X25519PublicKeyParameters publicKey = privateKey.GeneratePublicKey(); + return new AsymmetricCipherKeyPair(publicKey, privateKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs.meta new file mode 100644 index 00000000..f4ba0d1d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b43e76289d056544f8e8535095496a95 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X25519KeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs new file mode 100644 index 00000000..bfa79e6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators +{ + public class X448KeyPairGenerator + : IAsymmetricCipherKeyPairGenerator + { + private SecureRandom random; + + public virtual void Init(KeyGenerationParameters parameters) + { + this.random = parameters.Random; + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + X448PrivateKeyParameters privateKey = new X448PrivateKeyParameters(random); + X448PublicKeyParameters publicKey = privateKey.GeneratePublicKey(); + return new AsymmetricCipherKeyPair(publicKey, privateKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs.meta new file mode 100644 index 00000000..3f5e738d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f00986353db0fca488b921e47e7029cb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/generators/X448KeyPairGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io.meta new file mode 100644 index 00000000..a10406c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 66b4fcad74a0a7f49983e7e56bedd70f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs new file mode 100644 index 00000000..00ad1e3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs @@ -0,0 +1,329 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP1_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers; +#endif +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class CipherStream + : Stream + { + private readonly Stream m_stream; + private readonly IBufferedCipher m_readCipher, m_writeCipher; + + private byte[] m_readBuf; + private int m_readBufPos; + private bool m_readEnded; + + public CipherStream(Stream stream, IBufferedCipher readCipher, IBufferedCipher writeCipher) + { + m_stream = stream; + + if (readCipher != null) + { + m_readCipher = readCipher; + m_readBuf = null; + } + + if (writeCipher != null) + { + m_writeCipher = writeCipher; + } + } + + public IBufferedCipher ReadCipher => m_readCipher; + + public IBufferedCipher WriteCipher => m_writeCipher; + + public override bool CanRead + { + get { return m_stream.CanRead; } + } + + public sealed override bool CanSeek + { + get { return false; } + } + + public override bool CanWrite + { + get { return m_stream.CanWrite; } + } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + if (m_readCipher == null) + { + m_stream.CopyTo(destination, bufferSize); + } + else + { + base.CopyTo(destination, bufferSize); + } + } +#endif + + public override void Flush() + { + m_stream.Flush(); + } + + public sealed override long Length + { + get { throw new NotSupportedException(); } + } + + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + if (m_readCipher == null) + return m_stream.Read(buffer, offset, count); + + Streams.ValidateBufferArguments(buffer, offset, count); + + int num = 0; + while (num < count) + { + if (m_readBuf == null || m_readBufPos >= m_readBuf.Length) + { + if (!FillInBuf()) + break; + } + + int numToCopy = System.Math.Min(count - num, m_readBuf.Length - m_readBufPos); + Array.Copy(m_readBuf, m_readBufPos, buffer, offset + num, numToCopy); + m_readBufPos += numToCopy; + num += numToCopy; + } + + return num; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (buffer.IsEmpty) + return 0; + + if (m_readCipher == null) + return m_stream.Read(buffer); + + int num = 0; + while (num < buffer.Length) + { + if (m_readBuf == null || m_readBufPos >= m_readBuf.Length) + { + if (!FillInBuf()) + break; + } + + int numToCopy = System.Math.Min(buffer.Length - num, m_readBuf.Length - m_readBufPos); + m_readBuf.AsSpan(m_readBufPos, numToCopy).CopyTo(buffer[num..]); + + m_readBufPos += numToCopy; + num += numToCopy; + } + + return num; + } +#endif + + public override int ReadByte() + { + if (m_readCipher == null) + return m_stream.ReadByte(); + + if (m_readBuf == null || m_readBufPos >= m_readBuf.Length) + { + if (!FillInBuf()) + return -1; + } + + return m_readBuf[m_readBufPos++]; + } + + public sealed override long Seek(long offset, SeekOrigin origin) + { + throw new NotSupportedException(); + } + + public sealed override void SetLength(long length) + { + throw new NotSupportedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + if (m_writeCipher == null) + { + m_stream.Write(buffer, offset, count); + return; + } + + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { +#if NETCOREAPP1_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int outputSize = m_writeCipher.GetUpdateOutputSize(count); + byte[] output = outputSize > 0 ? ArrayPool.Shared.Rent(outputSize) : null; + try + { + int length = m_writeCipher.ProcessBytes(buffer, offset, count, output, 0); + if (length > 0) + { + m_stream.Write(output, 0, length); + } + } + finally + { + if (output != null) + { + ArrayPool.Shared.Return(output); + } + } +#else + byte[] output = m_writeCipher.ProcessBytes(buffer, offset, count); + if (output != null) + { + m_stream.Write(output, 0, output.Length); + } +#endif + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (buffer.IsEmpty) + return; + + if (m_writeCipher == null) + { + m_stream.Write(buffer); + return; + } + + int outputSize = m_writeCipher.GetUpdateOutputSize(buffer.Length); + byte[] output = outputSize > 0 ? ArrayPool.Shared.Rent(outputSize) : null; + try + { + int length = m_writeCipher.ProcessBytes(buffer, Spans.FromNullable(output)); + if (length > 0) + { + m_stream.Write(output[..length]); + } + } + finally + { + if (output != null) + { + ArrayPool.Shared.Return(output); + } + } + } +#endif + + public override void WriteByte(byte value) + { + if (m_writeCipher == null) + { + m_stream.WriteByte(value); + return; + } + + byte[] data = m_writeCipher.ProcessByte(value); + if (data != null) + { + m_stream.Write(data, 0, data.Length); + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + if (m_writeCipher != null) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int outputSize = m_writeCipher.GetOutputSize(0); + Span output = outputSize <= 256 + ? stackalloc byte[outputSize] + : new byte[outputSize]; + int len = m_writeCipher.DoFinal(output); + m_stream.Write(output[..len]); +#else + byte[] data = m_writeCipher.DoFinal(); + m_stream.Write(data, 0, data.Length); +#endif + } + m_stream.Dispose(); + } + base.Dispose(disposing); + } + + private bool FillInBuf() + { + if (m_readEnded) + return false; + + m_readBufPos = 0; + + do + { + m_readBuf = ReadAndProcessBlock(); + } + while (!m_readEnded && m_readBuf == null); + + return m_readBuf != null; + } + + private byte[] ReadAndProcessBlock() + { + int blockSize = m_readCipher.GetBlockSize(); + int readSize = blockSize == 0 ? 256 : blockSize; + + byte[] block = new byte[readSize]; + int numRead = 0; + do + { + int count = m_stream.Read(block, numRead, block.Length - numRead); + if (count < 1) + { + m_readEnded = true; + break; + } + numRead += count; + } + while (numRead < block.Length); + + Debug.Assert(m_readEnded || numRead == block.Length); + + byte[] bytes = m_readEnded + ? m_readCipher.DoFinal(block, 0, numRead) + : m_readCipher.ProcessBytes(block); + + if (bytes != null && bytes.Length == 0) + { + bytes = null; + } + + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs.meta new file mode 100644 index 00000000..e7202781 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 363771abfdeee354d896e6e401cadc64 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/CipherStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs new file mode 100644 index 00000000..52e2d7d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class DigestSink + : BaseOutputStream + { + private readonly IDigest m_digest; + + public DigestSink(IDigest digest) + { + m_digest = digest; + } + + public IDigest Digest => m_digest; + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { + m_digest.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (!buffer.IsEmpty) + { + m_digest.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_digest.Update(value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs.meta new file mode 100644 index 00000000..f5e0aba7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f48e10bd08f18a34ebfdb18f16c9225c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestSink.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs new file mode 100644 index 00000000..60944cff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs @@ -0,0 +1,164 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class DigestStream + : Stream + { + private readonly Stream m_stream; + private readonly IDigest m_readDigest; + private readonly IDigest m_writeDigest; + + public DigestStream(Stream stream, IDigest readDigest, IDigest writeDigest) + { + m_stream = stream; + m_readDigest = readDigest; + m_writeDigest = writeDigest; + } + + public IDigest ReadDigest => m_readDigest; + + public IDigest WriteDigest => m_writeDigest; + + public override bool CanRead + { + get { return m_stream.CanRead; } + } + + public sealed override bool CanSeek + { + get { return false; } + } + + public override bool CanWrite + { + get { return m_stream.CanWrite; } + } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + if (m_readDigest == null) + { + m_stream.CopyTo(destination, bufferSize); + } + else + { + base.CopyTo(destination, bufferSize); + } + } +#endif + + public override void Flush() + { + m_stream.Flush(); + } + + public sealed override long Length + { + get { throw new NotSupportedException(); } + } + + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + int n = m_stream.Read(buffer, offset, count); + + if (m_readDigest != null && n > 0) + { + m_readDigest.BlockUpdate(buffer, offset, n); + } + + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int n = m_stream.Read(buffer); + + if (m_readDigest != null && n > 0) + { + m_readDigest.BlockUpdate(buffer[..n]); + } + + return n; + } +#endif + + public override int ReadByte() + { + int b = m_stream.ReadByte(); + + if (m_readDigest != null && b >= 0) + { + m_readDigest.Update((byte)b); + } + + return b; + } + + public sealed override long Seek(long offset, SeekOrigin origin) + { + throw new NotSupportedException(); + } + + public sealed override void SetLength(long length) + { + throw new NotSupportedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + m_stream.Write(buffer, offset, count); + + if (m_writeDigest != null && count > 0) + { + m_writeDigest.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + m_stream.Write(buffer); + + if (m_writeDigest != null && !buffer.IsEmpty) + { + m_writeDigest.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_stream.WriteByte(value); + + if (m_writeDigest != null) + { + m_writeDigest.Update(value); + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + m_stream.Dispose(); + } + base.Dispose(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs.meta new file mode 100644 index 00000000..1389dd92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 45d9c6fd7124af04c96034082dd6b9de +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/DigestStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs new file mode 100644 index 00000000..c0262ad9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class MacSink + : BaseOutputStream + { + private readonly IMac m_mac; + + public MacSink(IMac mac) + { + m_mac = mac; + } + + public IMac Mac => m_mac; + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { + m_mac.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (!buffer.IsEmpty) + { + m_mac.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_mac.Update(value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs.meta new file mode 100644 index 00000000..3d18e474 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 72a51315443a8e343b34f8bf21998b70 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacSink.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs new file mode 100644 index 00000000..f7d7210a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs @@ -0,0 +1,164 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class MacStream + : Stream + { + private readonly Stream m_stream; + private readonly IMac m_readMac; + private readonly IMac m_writeMac; + + public MacStream(Stream stream, IMac readMac, IMac writeMac) + { + m_stream = stream; + m_readMac = readMac; + m_writeMac = writeMac; + } + + public IMac ReadMac => m_readMac; + + public IMac WriteMac => m_writeMac; + + public override bool CanRead + { + get { return m_stream.CanRead; } + } + + public sealed override bool CanSeek + { + get { return false; } + } + + public override bool CanWrite + { + get { return m_stream.CanWrite; } + } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + if (m_readMac == null) + { + m_stream.CopyTo(destination, bufferSize); + } + else + { + base.CopyTo(destination, bufferSize); + } + } +#endif + + public override void Flush() + { + m_stream.Flush(); + } + + public sealed override long Length + { + get { throw new NotSupportedException(); } + } + + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + int n = m_stream.Read(buffer, offset, count); + + if (m_readMac != null && n > 0) + { + m_readMac.BlockUpdate(buffer, offset, n); + } + + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int n = m_stream.Read(buffer); + + if (m_readMac != null && n > 0) + { + m_readMac.BlockUpdate(buffer[..n]); + } + + return n; + } +#endif + + public override int ReadByte() + { + int b = m_stream.ReadByte(); + + if (m_readMac != null && b >= 0) + { + m_readMac.Update((byte)b); + } + + return b; + } + + public sealed override long Seek(long offset, SeekOrigin origin) + { + throw new NotSupportedException(); + } + + public sealed override void SetLength(long length) + { + throw new NotSupportedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + m_stream.Write(buffer, offset, count); + + if (m_writeMac != null && count > 0) + { + m_writeMac.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + m_stream.Write(buffer); + + if (m_writeMac != null && !buffer.IsEmpty) + { + m_writeMac.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_stream.WriteByte(value); + + if (m_writeMac != null) + { + m_writeMac.Update(value); + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + m_stream.Dispose(); + } + base.Dispose(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs.meta new file mode 100644 index 00000000..eabf6db0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d0c074d8940c48459ba755661880b01 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/MacStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs new file mode 100644 index 00000000..967ae38a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class SignerSink + : BaseOutputStream + { + private readonly ISigner m_signer; + + public SignerSink(ISigner signer) + { + m_signer = signer; + } + + public ISigner Signer => m_signer; + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { + m_signer.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (!buffer.IsEmpty) + { + m_signer.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_signer.Update(value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs.meta new file mode 100644 index 00000000..404762dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 51f8063ec36701c489b27c93b03f7beb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerSink.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs new file mode 100644 index 00000000..cfa275a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs @@ -0,0 +1,164 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO +{ + public sealed class SignerStream + : Stream + { + private readonly Stream stream; + private readonly ISigner inSigner; + private readonly ISigner outSigner; + + public SignerStream(Stream stream, ISigner readSigner, ISigner writeSigner) + { + this.stream = stream; + this.inSigner = readSigner; + this.outSigner = writeSigner; + } + + public ISigner ReadSigner => inSigner; + + public ISigner WriteSigner => outSigner; + + public override bool CanRead + { + get { return stream.CanRead; } + } + + public sealed override bool CanSeek + { + get { return false; } + } + + public override bool CanWrite + { + get { return stream.CanWrite; } + } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + if (inSigner == null) + { + stream.CopyTo(destination, bufferSize); + } + else + { + base.CopyTo(destination, bufferSize); + } + } +#endif + + public override void Flush() + { + stream.Flush(); + } + + public sealed override long Length + { + get { throw new NotSupportedException(); } + } + + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + int n = stream.Read(buffer, offset, count); + + if (inSigner != null && n > 0) + { + inSigner.BlockUpdate(buffer, offset, n); + } + + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int n = stream.Read(buffer); + + if (inSigner != null && n > 0) + { + inSigner.BlockUpdate(buffer[..n]); + } + + return n; + } +#endif + + public override int ReadByte() + { + int b = stream.ReadByte(); + + if (inSigner != null && b >= 0) + { + inSigner.Update((byte)b); + } + + return b; + } + + public sealed override long Seek(long offset, SeekOrigin origin) + { + throw new NotSupportedException(); + } + + public sealed override void SetLength(long length) + { + throw new NotSupportedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + stream.Write(buffer, offset, count); + + if (outSigner != null && count > 0) + { + outSigner.BlockUpdate(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + stream.Write(buffer); + + if (outSigner != null && !buffer.IsEmpty) + { + outSigner.BlockUpdate(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + stream.WriteByte(value); + + if (outSigner != null) + { + outSigner.Update(value); + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + stream.Dispose(); + } + base.Dispose(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs.meta new file mode 100644 index 00000000..0ba955bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 72d1fff68451d4042be44c5d24c1b086 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/io/SignerStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs.meta new file mode 100644 index 00000000..308ef9ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 97e46dc3f4844d54c9c26175845be5ad +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs new file mode 100644 index 00000000..1fb90f61 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs @@ -0,0 +1,321 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * CMAC - as specified at www.nuee.nagoya-u.ac.jp/labs/tiwata/omac/omac.html + *

+ * CMAC is analogous to OMAC1 - see also en.wikipedia.org/wiki/CMAC + *

+ * CMAC is a NIST recomendation - see + * csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38B.pdf + *

+ * CMAC/OMAC1 is a blockcipher-based message authentication code designed and + * analyzed by Tetsu Iwata and Kaoru Kurosawa. + *

+ * CMAC/OMAC1 is a simple variant of the CBC MAC (Cipher Block Chaining Message + * Authentication Code). OMAC stands for One-Key CBC MAC. + *

+ * It supports 128- or 64-bits block ciphers, with any key size, and returns + * a MAC with dimension less or equal to the block size of the underlying + * cipher. + *

+ */ + public class CMac + : IMac + { + private const byte CONSTANT_128 = (byte)0x87; + private const byte CONSTANT_64 = (byte)0x1b; + + private byte[] ZEROES; + + private byte[] mac; + + private byte[] buf; + private int bufOff; + private IBlockCipherMode m_cipherMode; + + private int macSize; + + private byte[] L, Lu, Lu2; + + /** + * create a standard MAC based on a CBC block cipher (64 or 128 bit block). + * This will produce an authentication code the length of the block size + * of the cipher. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + */ + public CMac( + IBlockCipher cipher) + : this(cipher, cipher.GetBlockSize() * 8) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + * + * @param cipher the cipher to be used as the basis of the MAC generation. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8 and @lt;= 128. + */ + public CMac( + IBlockCipher cipher, + int macSizeInBits) + { + if ((macSizeInBits % 8) != 0) + throw new ArgumentException("MAC size must be multiple of 8"); + + if (macSizeInBits > (cipher.GetBlockSize() * 8)) + { + throw new ArgumentException( + "MAC size must be less or equal to " + + (cipher.GetBlockSize() * 8)); + } + + if (cipher.GetBlockSize() != 8 && cipher.GetBlockSize() != 16) + { + throw new ArgumentException( + "Block size must be either 64 or 128 bits"); + } + + m_cipherMode = new CbcBlockCipher(cipher); + this.macSize = macSizeInBits / 8; + + mac = new byte[cipher.GetBlockSize()]; + + buf = new byte[cipher.GetBlockSize()]; + + ZEROES = new byte[cipher.GetBlockSize()]; + + bufOff = 0; + } + + public string AlgorithmName + { + get { return m_cipherMode.AlgorithmName; } + } + + private static int ShiftLeft(byte[] block, byte[] output) + { + int i = block.Length; + uint bit = 0; + while (--i >= 0) + { + uint b = block[i]; + output[i] = (byte)((b << 1) | bit); + bit = (b >> 7) & 1; + } + return (int)bit; + } + + private static byte[] DoubleLu(byte[] input) + { + byte[] ret = new byte[input.Length]; + int carry = ShiftLeft(input, ret); + int xor = input.Length == 16 ? CONSTANT_128 : CONSTANT_64; + + /* + * NOTE: This construction is an attempt at a constant-time implementation. + */ + ret[input.Length - 1] ^= (byte)(xor >> ((1 - carry) << 3)); + + return ret; + } + + public void Init(ICipherParameters parameters) + { + if (parameters is KeyParameter) + { + m_cipherMode.Init(true, parameters); + + //initializes the L, Lu, Lu2 numbers + L = new byte[ZEROES.Length]; + m_cipherMode.ProcessBlock(ZEROES, 0, L, 0); + Lu = DoubleLu(L); + Lu2 = DoubleLu(Lu); + } + else if (parameters != null) + { + // CMAC mode does not permit IV to underlying CBC mode + throw new ArgumentException("CMac mode only permits key to be set.", "parameters"); + } + + Reset(); + } + + public int GetMacSize() + { + return macSize; + } + + public void Update(byte input) + { + if (bufOff == buf.Length) + { + m_cipherMode.ProcessBlock(buf, 0, mac, 0); + bufOff = 0; + } + + buf[bufOff++] = input; + } + + public void BlockUpdate(byte[] inBytes, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(inBytes.AsSpan(inOff, len)); +#else + int blockSize = m_cipherMode.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(inBytes, inOff, buf, bufOff, gapLen); + + m_cipherMode.ProcessBlock(buf, 0, mac, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > blockSize) + { + m_cipherMode.ProcessBlock(inBytes, inOff, mac, 0); + + len -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(inBytes, inOff, buf, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int blockSize = m_cipherMode.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + m_cipherMode.ProcessBlock(buf, mac); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > blockSize) + { + m_cipherMode.ProcessBlock(input, mac); + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + + public int DoFinal(byte[] outBytes, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(outBytes.AsSpan(outOff)); +#else + int blockSize = m_cipherMode.GetBlockSize(); + + byte[] lu; + if (bufOff == blockSize) + { + lu = Lu; + } + else + { + new ISO7816d4Padding().AddPadding(buf, bufOff); + lu = Lu2; + } + + for (int i = 0; i < mac.Length; i++) + { + buf[i] ^= lu[i]; + } + + m_cipherMode.ProcessBlock(buf, 0, mac, 0); + + Array.Copy(mac, 0, outBytes, outOff, macSize); + + Reset(); + + return macSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + int blockSize = m_cipherMode.GetBlockSize(); + + byte[] lu; + if (bufOff == blockSize) + { + lu = Lu; + } + else + { + new ISO7816d4Padding().AddPadding(buf, bufOff); + lu = Lu2; + } + + for (int i = 0; i < mac.Length; i++) + { + buf[i] ^= lu[i]; + } + + m_cipherMode.ProcessBlock(buf, mac); + + mac.AsSpan(0, macSize).CopyTo(output); + + Reset(); + + return macSize; + } +#endif + + /** + * Reset the mac generator. + */ + public void Reset() + { + /* + * clean the buffer. + */ + Array.Clear(buf, 0, buf.Length); + bufOff = 0; + + /* + * Reset the underlying cipher. + */ + m_cipherMode.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs.meta new file mode 100644 index 00000000..13bb8ec4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6692aa87b4c10614fa5f308823ecf817 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs new file mode 100644 index 00000000..fe7a6771 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs @@ -0,0 +1,276 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * standard CBC Block Cipher MAC - if no padding is specified the default of + * pad of zeroes is used. + */ + public class CbcBlockCipherMac + : IMac + { + private byte[] buf; + private int bufOff; + private IBlockCipherMode m_cipherMode; + private IBlockCipherPadding padding; + private int macSize; + + /** + * create a standard MAC based on a CBC block cipher. This will produce an + * authentication code half the length of the block size of the cipher. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + */ + public CbcBlockCipherMac( + IBlockCipher cipher) + : this(cipher, (cipher.GetBlockSize() * 8) / 2, null) + { + } + + /** + * create a standard MAC based on a CBC block cipher. This will produce an + * authentication code half the length of the block size of the cipher. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + * @param padding the padding to be used to complete the last block. + */ + public CbcBlockCipherMac( + IBlockCipher cipher, + IBlockCipherPadding padding) + : this(cipher, (cipher.GetBlockSize() * 8) / 2, padding) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses CBC mode as the basis for the + * MAC generation. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + */ + public CbcBlockCipherMac( + IBlockCipher cipher, + int macSizeInBits) + : this(cipher, macSizeInBits, null) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses CBC mode as the basis for the + * MAC generation. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + * @param padding the padding to be used to complete the last block. + */ + public CbcBlockCipherMac( + IBlockCipher cipher, + int macSizeInBits, + IBlockCipherPadding padding) + { + if ((macSizeInBits % 8) != 0) + throw new ArgumentException("MAC size must be multiple of 8"); + + this.m_cipherMode = new CbcBlockCipher(cipher); + this.padding = padding; + this.macSize = macSizeInBits / 8; + + buf = new byte[cipher.GetBlockSize()]; + bufOff = 0; + } + + public string AlgorithmName + { + get { return m_cipherMode.AlgorithmName; } + } + + public void Init(ICipherParameters parameters) + { + Reset(); + + m_cipherMode.Init(true, parameters); + } + + public int GetMacSize() + { + return macSize; + } + + public void Update(byte input) + { + if (bufOff == buf.Length) + { + m_cipherMode.ProcessBlock(buf, 0, buf, 0); + bufOff = 0; + } + + buf[bufOff++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int blockSize = m_cipherMode.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + m_cipherMode.ProcessBlock(buf, 0, buf, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > blockSize) + { + m_cipherMode.ProcessBlock(input, inOff, buf, 0); + + len -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int blockSize = m_cipherMode.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + m_cipherMode.ProcessBlock(buf, buf); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > blockSize) + { + m_cipherMode.ProcessBlock(input, buf); + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + int blockSize = m_cipherMode.GetBlockSize(); + + if (padding == null) + { + // pad with zeroes + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + } + else + { + if (bufOff == blockSize) + { + m_cipherMode.ProcessBlock(buf, 0, buf, 0); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + } + + m_cipherMode.ProcessBlock(buf, 0, buf, 0); + + Array.Copy(buf, 0, output, outOff, macSize); + + Reset(); + + return macSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + int blockSize = m_cipherMode.GetBlockSize(); + + if (padding == null) + { + // pad with zeroes + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + } + else + { + if (bufOff == blockSize) + { + m_cipherMode.ProcessBlock(buf, buf); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + } + + m_cipherMode.ProcessBlock(buf, buf); + + buf.AsSpan(0, macSize).CopyTo(output); + + Reset(); + + return macSize; + } +#endif + + /** + * Reset the mac generator. + */ + public void Reset() + { + // Clear the buffer. + Array.Clear(buf, 0, buf.Length); + bufOff = 0; + + // Reset the underlying cipher. + m_cipherMode.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs.meta new file mode 100644 index 00000000..b20c1d94 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 19806d27dc742d54da8db87992df211b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CbcBlockCipherMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs new file mode 100644 index 00000000..a69481e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs @@ -0,0 +1,434 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. + */ + internal class MacCfbBlockCipher + : IBlockCipherMode + { + private byte[] IV; + private byte[] cfbV; + private byte[] cfbOutV; + + private readonly int blockSize; + private readonly IBlockCipher cipher; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * feedback mode. + * @param blockSize the block size in bits (note: a multiple of 8) + */ + public MacCfbBlockCipher( + IBlockCipher cipher, + int bitBlockSize) + { + this.cipher = cipher; + this.blockSize = bitBlockSize / 8; + + this.IV = new byte[cipher.GetBlockSize()]; + this.cfbV = new byte[cipher.GetBlockSize()]; + this.cfbOutV = new byte[cipher.GetBlockSize()]; + } + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (parameters is ParametersWithIV ivParam) + { + byte[] iv = ivParam.GetIV(); + + if (iv.Length < IV.Length) + { + Array.Copy(iv, 0, IV, IV.Length - iv.Length, iv.Length); + } + else + { + Array.Copy(iv, 0, IV, 0, IV.Length); + } + + parameters = ivParam.Parameters; + } + + Reset(); + + cipher.Init(true, parameters); + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/CFB" + * and the block size in bits. + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/CFB" + (blockSize * 8); } + } + + public IBlockCipher UnderlyingCipher => cipher; + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at. + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return blockSize; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, 0, cfbOutV, 0); + + // + // XOR the cfbV with the plaintext producing the cipher text + // + for (int i = 0; i < blockSize; i++) + { + outBytes[outOff + i] = (byte)(cfbOutV[i] ^ input[inOff + i]); + } + + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + Array.Copy(outBytes, outOff, cfbV, cfbV.Length - blockSize, blockSize); + + return blockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, cfbOutV); + + // + // XOR the cfbV with the plaintext producing the cipher text + // + for (int i = 0; i < blockSize; i++) + { + output[i] = (byte)(cfbOutV[i] ^ input[i]); + } + + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + output[..blockSize].CopyTo(cfbV.AsSpan(cfbV.Length - blockSize)); + + return blockSize; + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + IV.CopyTo(cfbV, 0); + } + + public void GetMacBlock( + byte[] mac) + { + cipher.ProcessBlock(cfbV, 0, mac, 0); + } + } + + public class CfbBlockCipherMac + : IMac + { + private byte[] mac; + private byte[] Buffer; + private int bufOff; + private MacCfbBlockCipher cipher; + private IBlockCipherPadding padding; + private int macSize; + + /** + * create a standard MAC based on a CFB block cipher. This will produce an + * authentication code half the length of the block size of the cipher, with + * the CFB mode set to 8 bits. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + */ + public CfbBlockCipherMac( + IBlockCipher cipher) + : this(cipher, 8, (cipher.GetBlockSize() * 8) / 2, null) + { + } + + /** + * create a standard MAC based on a CFB block cipher. This will produce an + * authentication code half the length of the block size of the cipher, with + * the CFB mode set to 8 bits. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + * @param padding the padding to be used. + */ + public CfbBlockCipherMac( + IBlockCipher cipher, + IBlockCipherPadding padding) + : this(cipher, 8, (cipher.GetBlockSize() * 8) / 2, padding) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses CFB mode as the basis for the + * MAC generation. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param cfbBitSize the size of an output block produced by the CFB mode. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + */ + public CfbBlockCipherMac( + IBlockCipher cipher, + int cfbBitSize, + int macSizeInBits) + : this(cipher, cfbBitSize, macSizeInBits, null) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses CFB mode as the basis for the + * MAC generation. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param cfbBitSize the size of an output block produced by the CFB mode. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + * @param padding a padding to be used. + */ + public CfbBlockCipherMac( + IBlockCipher cipher, + int cfbBitSize, + int macSizeInBits, + IBlockCipherPadding padding) + { + if ((macSizeInBits % 8) != 0) + throw new ArgumentException("MAC size must be multiple of 8"); + + mac = new byte[cipher.GetBlockSize()]; + + this.cipher = new MacCfbBlockCipher(cipher, cfbBitSize); + this.padding = padding; + this.macSize = macSizeInBits / 8; + + Buffer = new byte[this.cipher.GetBlockSize()]; + bufOff = 0; + } + + public string AlgorithmName + { + get { return cipher.AlgorithmName; } + } + + public void Init(ICipherParameters parameters) + { + Reset(); + + cipher.Init(true, parameters); + } + + public int GetMacSize() + { + return macSize; + } + + public void Update(byte input) + { + if (bufOff == Buffer.Length) + { + cipher.ProcessBlock(Buffer, 0, mac, 0); + bufOff = 0; + } + + Buffer[bufOff++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int blockSize = cipher.GetBlockSize(); + int resultLen = 0; + int gapLen = blockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, Buffer, bufOff, gapLen); + + resultLen += cipher.ProcessBlock(Buffer, 0, mac, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > blockSize) + { + resultLen += cipher.ProcessBlock(input, inOff, mac, 0); + + len -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, Buffer, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int blockSize = cipher.GetBlockSize(); + int resultLen = 0; + int gapLen = blockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(Buffer.AsSpan(bufOff)); + + resultLen += cipher.ProcessBlock(Buffer, mac); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > blockSize) + { + resultLen += cipher.ProcessBlock(input, mac); + input = input[blockSize..]; + } + } + + input.CopyTo(Buffer.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + int blockSize = cipher.GetBlockSize(); + + // pad with zeroes + if (this.padding == null) + { + while (bufOff < blockSize) + { + Buffer[bufOff++] = 0; + } + } + else + { + padding.AddPadding(Buffer, bufOff); + } + + cipher.ProcessBlock(Buffer, 0, mac, 0); + + cipher.GetMacBlock(mac); + + Array.Copy(mac, 0, output, outOff, macSize); + + Reset(); + + return macSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + int blockSize = cipher.GetBlockSize(); + + // pad with zeroes + if (this.padding == null) + { + while (bufOff < blockSize) + { + Buffer[bufOff++] = 0; + } + } + else + { + padding.AddPadding(Buffer, bufOff); + } + + cipher.ProcessBlock(Buffer, 0, mac, 0); + + cipher.GetMacBlock(mac); + + mac.AsSpan(0, macSize).CopyTo(output); + + Reset(); + + return macSize; + } +#endif + + /** + * Reset the mac generator. + */ + public void Reset() + { + // Clear the buffer. + Array.Clear(Buffer, 0, Buffer.Length); + bufOff = 0; + + // Reset the underlying cipher. + cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs.meta new file mode 100644 index 00000000..9427e93f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eda695edc8c92264c99fbb1a922d249b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/CfbBlockCipherMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs new file mode 100644 index 00000000..27e1df72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs @@ -0,0 +1,176 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /// + /// Implementation of DSTU7564 mac mode + /// + public class Dstu7564Mac + : IMac + { + private Dstu7564Digest engine; + private int macSize; + + private ulong inputLength; + + byte[] paddedKey; + byte[] invertedKey; + + public string AlgorithmName + { + get { return "DSTU7564Mac"; } + } + + public Dstu7564Mac(int macSizeBits) + { + engine = new Dstu7564Digest(macSizeBits); + macSize = macSizeBits / 8; + } + + public void Init(ICipherParameters parameters) + { + if (parameters is KeyParameter) + { + byte[] key = ((KeyParameter)parameters).GetKey(); + + invertedKey = new byte[key.Length]; + + paddedKey = PadKey(key); + + for (int byteIndex = 0; byteIndex < invertedKey.Length; byteIndex++) + { + invertedKey[byteIndex] = (byte)(key[byteIndex] ^ (byte)0xFF); + } + } + else + { + throw new ArgumentException("Bad parameter passed"); + } + + engine.BlockUpdate(paddedKey, 0, paddedKey.Length); + } + + public int GetMacSize() + { + return macSize; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + + if (paddedKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + engine.BlockUpdate(input, inOff, len); + inputLength += (ulong)len; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + if (paddedKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + engine.BlockUpdate(input); + inputLength += (ulong)input.Length; + } +#endif + + public void Update(byte input) + { + engine.Update(input); + inputLength++; + } + + public int DoFinal(byte[] output, int outOff) + { + if (paddedKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, outOff, macSize, "output buffer too short"); + + Pad(); + + engine.BlockUpdate(invertedKey, 0, invertedKey.Length); + + inputLength = 0; + + return engine.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + if (paddedKey == null) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, macSize, "output buffer too short"); + + Pad(); + + engine.BlockUpdate(invertedKey); + + inputLength = 0; + + return engine.DoFinal(output); + } +#endif + + public void Reset() + { + inputLength = 0; + engine.Reset(); + if (paddedKey != null) + { + engine.BlockUpdate(paddedKey, 0, paddedKey.Length); + } + } + + private void Pad() + { + int extra = engine.GetByteLength() - (int)(inputLength % (ulong)engine.GetByteLength()); + if (extra < 13) // terminator byte + 96 bits of length + { + extra += engine.GetByteLength(); + } + + byte[] padded = new byte[extra]; + + padded[0] = (byte)0x80; // Defined in standard; + + // Defined in standard; + Pack.UInt64_To_LE(inputLength * 8, padded, padded.Length - 12); + + engine.BlockUpdate(padded, 0, padded.Length); + } + + private byte[] PadKey(byte[] input) + { + int paddedLen = ((input.Length + engine.GetByteLength() - 1) / engine.GetByteLength()) * engine.GetByteLength(); + + int extra = engine.GetByteLength() - (int)(input.Length % engine.GetByteLength()); + if (extra < 13) // terminator byte + 96 bits of length + { + paddedLen += engine.GetByteLength(); + } + + byte[] padded = new byte[paddedLen]; + + Array.Copy(input, 0, padded, 0, input.Length); + + padded[input.Length] = (byte)0x80; // Defined in standard; + Pack.UInt32_To_LE((uint)(input.Length * 8), padded, padded.Length - 12); // Defined in standard; + + return padded; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs.meta new file mode 100644 index 00000000..5592e40c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d69d09dd7ad9f9443b87e0241938ac0d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7564Mac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs new file mode 100644 index 00000000..865f81d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs @@ -0,0 +1,225 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * implementation of DSTU 7624 MAC + */ + public class Dstu7624Mac : IMac + { + private int macSize; + + private Dstu7624Engine engine; + private int blockSize; + + private byte[] c, cTemp, kDelta; + private byte[] buf; + private int bufOff; + + public Dstu7624Mac(int blockSizeBits, int q) + { + engine = new Dstu7624Engine(blockSizeBits); + + blockSize = blockSizeBits / 8; + + macSize = q / 8; + + c = new byte[blockSize]; + + cTemp = new byte[blockSize]; + + kDelta = new byte[blockSize]; + buf = new byte[blockSize]; + } + + public void Init(ICipherParameters parameters) + { + if (parameters is KeyParameter) + { + engine.Init(true, (KeyParameter)parameters); + + engine.ProcessBlock(kDelta, 0, kDelta, 0); + } + else + { + throw new ArgumentException("invalid parameter passed to Dstu7624Mac init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + } + + public string AlgorithmName + { + get { return "Dstu7624Mac"; } + } + + public int GetMacSize() + { + return macSize; + } + + public void Update(byte input) + { + if (bufOff == buf.Length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlock(buf); +#else + ProcessBlock(buf, 0); +#endif + bufOff = 0; + } + + buf[bufOff++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int blockSize = engine.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + ProcessBlock(buf, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > blockSize) + { + ProcessBlock(input, inOff); + + len -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int blockSize = engine.GetBlockSize(); + int gapLen = blockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + ProcessBlock(buf); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > blockSize) + { + ProcessBlock(input); + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void ProcessBlock(ReadOnlySpan input) + { + Xor(c, input, cTemp); + + engine.ProcessBlock(cTemp, c); + } + + private void Xor(ReadOnlySpan c, ReadOnlySpan input, Span xorResult) + { + for (int byteIndex = 0; byteIndex < blockSize; byteIndex++) + { + xorResult[byteIndex] = (byte)(c[byteIndex] ^ input[byteIndex]); + } + } +#else + private void ProcessBlock(byte[] input, int inOff) + { + Xor(c, 0, input, inOff, cTemp); + + engine.ProcessBlock(cTemp, 0, c, 0); + } +#endif + + private void Xor(byte[] c, int cOff, byte[] input, int inOff, byte[] xorResult) + { + for (int byteIndex = 0; byteIndex < blockSize; byteIndex++) + { + xorResult[byteIndex] = (byte)(c[byteIndex + cOff] ^ input[byteIndex + inOff]); + } + } + + public int DoFinal(byte[] output, int outOff) + { + if (bufOff % buf.Length != 0) + throw new DataLengthException("Input must be a multiple of blocksize"); + + Check.OutputLength(output, outOff, macSize, "output buffer too short"); + + //Last block + Xor(c, 0, buf, 0, cTemp); + Xor(cTemp, 0, kDelta, 0, c); + engine.ProcessBlock(c, 0, c, 0); + + Array.Copy(c, 0, output, outOff, macSize); + + return macSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + if (bufOff % buf.Length != 0) + throw new DataLengthException("Input must be a multiple of blocksize"); + + Check.OutputLength(output, macSize, "output buffer too short"); + + //Last block + Xor(c, 0, buf, 0, cTemp); + Xor(cTemp, 0, kDelta, 0, c); + engine.ProcessBlock(c, c); + + c.AsSpan(0, macSize).CopyTo(output); + + return macSize; + } +#endif + + public void Reset() + { + Arrays.Fill(c, (byte)0x00); + Arrays.Fill(cTemp, (byte)0x00); + Arrays.Fill(kDelta, (byte)0x00); + Arrays.Fill(buf, (byte)0x00); + engine.ProcessBlock(kDelta, 0, kDelta, 0); + bufOff = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs.meta new file mode 100644 index 00000000..b56b0b8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b0f68b471781c64c913bb2d4613a223 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/DSTU7624Mac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs new file mode 100644 index 00000000..c15ce4eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs @@ -0,0 +1,133 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /// + /// The GMAC specialisation of Galois/Counter mode (GCM) detailed in NIST Special Publication + /// 800-38D. + /// + /// + /// GMac is an invocation of the GCM mode where no data is encrypted (i.e. all input data to the Mac + /// is processed as additional authenticated data with the underlying GCM block cipher). + /// + public class GMac + : IMac + { + private readonly GcmBlockCipher cipher; + private readonly int macSizeBits; + + /// + /// Creates a GMAC based on the operation of a block cipher in GCM mode. + /// + /// + /// This will produce an authentication code the length of the block size of the cipher. + /// + /// the cipher to be used in GCM mode to generate the MAC. + public GMac(GcmBlockCipher cipher) + : this(cipher, 128) + { + } + + /// + /// Creates a GMAC based on the operation of a 128 bit block cipher in GCM mode. + /// + /// + /// This will produce an authentication code the length of the block size of the cipher. + /// + /// the cipher to be used in GCM mode to generate the MAC. + /// the mac size to generate, in bits. Must be a multiple of 8, between 32 and 128 (inclusive). + /// Sizes less than 96 are not recommended, but are supported for specialized applications. + public GMac(GcmBlockCipher cipher, int macSizeBits) + { + this.cipher = cipher; + this.macSizeBits = macSizeBits; + } + + /// + /// Initialises the GMAC - requires a + /// providing a and a nonce. + /// + public void Init(ICipherParameters parameters) + { + if (parameters is ParametersWithIV param) + { + byte[] iv = param.GetIV(); + KeyParameter keyParam = (KeyParameter)param.Parameters; + + // GCM is always operated in encrypt mode to calculate MAC + cipher.Init(true, new AeadParameters(keyParam, macSizeBits, iv)); + } + else + { + throw new ArgumentException("GMAC requires ParametersWithIV"); + } + } + + public string AlgorithmName + { + get { return cipher.UnderlyingCipher.AlgorithmName + "-GMAC"; } + } + + public int GetMacSize() + { + return macSizeBits / 8; + } + + public void Update(byte input) + { + cipher.ProcessAadByte(input); + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + cipher.ProcessAadBytes(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + cipher.ProcessAadBytes(input); + } +#endif + + public int DoFinal(byte[] output, int outOff) + { + try + { + return cipher.DoFinal(output, outOff); + } + catch (InvalidCipherTextException e) + { + // Impossible in encrypt mode + throw new InvalidOperationException(e.ToString()); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + try + { + return cipher.DoFinal(output); + } + catch (InvalidCipherTextException e) + { + // Impossible in encrypt mode + throw new InvalidOperationException(e.ToString()); + } + } +#endif + + public void Reset() + { + cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs.meta new file mode 100644 index 00000000..b3a86b2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74f56097d40442c4bb5949c185df0607 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs new file mode 100644 index 00000000..03fd2441 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs @@ -0,0 +1,377 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * implementation of GOST 28147-89 MAC + */ + public class Gost28147Mac + : IMac + { + private const int BlockSize = 8; + private const int MacSize = 4; + private int bufOff; + private byte[] buf; + private byte[] mac; + private bool firstStep = true; + private int[] workingKey; + private byte[] macIV = null; + + // + // This is default S-box - E_A. + private byte[] S = + { + 0x9,0x6,0x3,0x2,0x8,0xB,0x1,0x7,0xA,0x4,0xE,0xF,0xC,0x0,0xD,0x5, + 0x3,0x7,0xE,0x9,0x8,0xA,0xF,0x0,0x5,0x2,0x6,0xC,0xB,0x4,0xD,0x1, + 0xE,0x4,0x6,0x2,0xB,0x3,0xD,0x8,0xC,0xF,0x5,0xA,0x0,0x7,0x1,0x9, + 0xE,0x7,0xA,0xC,0xD,0x1,0x3,0x9,0x0,0x2,0xB,0x4,0xF,0x8,0x5,0x6, + 0xB,0x5,0x1,0x9,0x8,0xD,0xF,0x0,0xE,0x4,0x2,0x3,0xC,0x7,0xA,0x6, + 0x3,0xA,0xD,0xC,0x1,0x2,0x0,0xB,0x7,0x5,0x9,0x4,0x8,0xF,0xE,0x6, + 0x1,0xD,0x2,0x9,0x7,0xA,0x6,0x0,0x8,0xC,0x4,0x5,0xF,0x3,0xB,0xE, + 0xB,0xA,0xF,0x5,0x0,0xC,0xE,0x8,0x6,0x2,0x3,0x9,0x1,0x7,0xD,0x4 + }; + + public Gost28147Mac() + { + mac = new byte[BlockSize]; + buf = new byte[BlockSize]; + bufOff = 0; + } + + private static int[] GenerateWorkingKey( + byte[] userKey) + { + if (userKey.Length != 32) + throw new ArgumentException("Key length invalid. Key needs to be 32 byte - 256 bit!!!"); + + int[] key = new int[8]; + for(int i=0; i!=8; i++) + { + key[i] = (int)Pack.LE_To_UInt32(userKey, i * 4); + } + + return key; + } + + public void Init(ICipherParameters parameters) + { + Reset(); + buf = new byte[BlockSize]; + macIV = null; + if (parameters is ParametersWithSBox param) + { + // + // Set the S-Box + // + param.GetSBox().CopyTo(this.S, 0); + + // + // set key if there is one + // + if (param.Parameters != null) + { + workingKey = GenerateWorkingKey(((KeyParameter)param.Parameters).GetKey()); + } + } + else if (parameters is KeyParameter keyParameter) + { + workingKey = GenerateWorkingKey(keyParameter.GetKey()); + } + else if (parameters is ParametersWithIV ivParam) + { + workingKey = GenerateWorkingKey(((KeyParameter)ivParam.Parameters).GetKey()); + macIV = ivParam.GetIV(); // don't skip the initial CM5Func + Array.Copy(macIV, 0, mac, 0, mac.Length); + } + else + { + throw new ArgumentException("invalid parameter passed to Gost28147 init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + } + + public string AlgorithmName + { + get { return "Gost28147Mac"; } + } + + public int GetMacSize() + { + return MacSize; + } + + private int Gost28147_mainStep(int n1, int key) + { + int cm = (key + n1); // CM1 + + // S-box replacing + + int om = S[ 0 + ((cm >> (0 * 4)) & 0xF)] << (0 * 4); + om += S[ 16 + ((cm >> (1 * 4)) & 0xF)] << (1 * 4); + om += S[ 32 + ((cm >> (2 * 4)) & 0xF)] << (2 * 4); + om += S[ 48 + ((cm >> (3 * 4)) & 0xF)] << (3 * 4); + om += S[ 64 + ((cm >> (4 * 4)) & 0xF)] << (4 * 4); + om += S[ 80 + ((cm >> (5 * 4)) & 0xF)] << (5 * 4); + om += S[ 96 + ((cm >> (6 * 4)) & 0xF)] << (6 * 4); + om += S[112 + ((cm >> (7 * 4)) & 0xF)] << (7 * 4); + +// return om << 11 | om >>> (32-11); // 11-leftshift + int omLeft = om << 11; + int omRight = (int)(((uint) om) >> (32 - 11)); // Note: Casts required to get unsigned bit rotation + + return omLeft | omRight; + } + + private void Gost28147MacFunc( + int[] workingKey, + byte[] input, + int inOff, + byte[] output, + int outOff) + { + int N1 = (int)Pack.LE_To_UInt32(input, inOff); + int N2 = (int)Pack.LE_To_UInt32(input, inOff + 4); + int tmp; //tmp -> for saving N1 + + for (int k = 0; k < 2; k++) // 1-16 steps + { + for (int j = 0; j < 8; j++) + { + tmp = N1; + N1 = N2 ^ Gost28147_mainStep(N1, workingKey[j]); // CM2 + N2 = tmp; + } + } + + Pack.UInt32_To_LE((uint)N1, output, outOff); + Pack.UInt32_To_LE((uint)N2, output, outOff + 4); + } + + public void Update(byte input) + { + if (bufOff == buf.Length) + { + byte[] sum = new byte[buf.Length]; + if (firstStep) + { + firstStep = false; + if (macIV != null) + { + Cm5Func(buf, 0, macIV, sum); + } + else + { + Array.Copy(buf, 0, sum, 0, mac.Length); + } + } + else + { + Cm5Func(buf, 0, mac, sum); + } + + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + bufOff = 0; + } + + buf[bufOff++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int gapLen = BlockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + byte[] sum = new byte[buf.Length]; + if (firstStep) + { + firstStep = false; + if (macIV != null) + { + Cm5Func(buf, 0, macIV, sum); + } + else + { + Array.Copy(buf, 0, sum, 0, mac.Length); + } + } + else + { + Cm5Func(buf, 0, mac, sum); + } + + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > BlockSize) + { + Cm5Func(input, inOff, mac, sum); + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + len -= BlockSize; + inOff += BlockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int gapLen = BlockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + byte[] sum = new byte[buf.Length]; + if (firstStep) + { + firstStep = false; + if (macIV != null) + { + Cm5Func(buf, macIV, sum); + } + else + { + Array.Copy(buf, 0, sum, 0, mac.Length); + } + } + else + { + Cm5Func(buf, mac, sum); + } + + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > BlockSize) + { + Cm5Func(input, mac, sum); + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + input = input[BlockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + //padding with zero + while (bufOff < BlockSize) + { + buf[bufOff++] = 0; + } + + byte[] sum = new byte[buf.Length]; + if (firstStep) + { + firstStep = false; + Array.Copy(buf, 0, sum, 0, mac.Length); + } + else + { + Cm5Func(buf, 0, mac, sum); + } + + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + Array.Copy(mac, (mac.Length/2)-MacSize, output, outOff, MacSize); + + Reset(); + + return MacSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + //padding with zero + while (bufOff < BlockSize) + { + buf[bufOff++] = 0; + } + + byte[] sum = new byte[buf.Length]; + if (firstStep) + { + firstStep = false; + Array.Copy(buf, 0, sum, 0, mac.Length); + } + else + { + Cm5Func(buf, 0, mac, sum); + } + + Gost28147MacFunc(workingKey, sum, 0, mac, 0); + + mac.AsSpan((mac.Length / 2) - MacSize, MacSize).CopyTo(output); + + Reset(); + + return MacSize; + } +#endif + + public void Reset() + { + // Clear the buffer. + Array.Clear(buf, 0, buf.Length); + bufOff = 0; + + firstStep = true; + } + + private static void Cm5Func(byte[] buf, int bufOff, byte[] mac, byte[] sum) + { + for (int i = 0; i < BlockSize; ++i) + { + sum[i] = (byte)(buf[bufOff + i] ^ mac[i]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Cm5Func(ReadOnlySpan buffer, ReadOnlySpan mac, Span sum) + { + for (int i = 0; i < BlockSize; ++i) + { + sum[i] = (byte)(buffer[i] ^ mac[i]); + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs.meta new file mode 100644 index 00000000..cc0fd72d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1424cc0877fe23443afdd4c15f39f69a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/GOST28147Mac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs new file mode 100644 index 00000000..354e985c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs @@ -0,0 +1,203 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * HMAC implementation based on RFC2104 + * + * H(K XOR opad, H(K XOR ipad, text)) + */ + public class HMac + : IMac + { + private const byte IPAD = (byte)0x36; + private const byte OPAD = (byte)0x5C; + + private readonly IDigest digest; + private readonly int digestSize; + private readonly int blockLength; + private IMemoable ipadState; + private IMemoable opadState; + + private readonly byte[] inputPad; + private readonly byte[] outputBuf; + + public HMac(IDigest digest) + { + this.digest = digest; + this.digestSize = digest.GetDigestSize(); + this.blockLength = digest.GetByteLength(); + this.inputPad = new byte[blockLength]; + this.outputBuf = new byte[blockLength + digestSize]; + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "/HMAC"; } + } + + public virtual IDigest GetUnderlyingDigest() + { + return digest; + } + + public virtual void Init(ICipherParameters parameters) + { + digest.Reset(); + + byte[] key = ((KeyParameter)parameters).GetKey(); + int keyLength = key.Length; + + if (keyLength > blockLength) + { + digest.BlockUpdate(key, 0, keyLength); + digest.DoFinal(inputPad, 0); + + keyLength = digestSize; + } + else + { + Array.Copy(key, 0, inputPad, 0, keyLength); + } + + Array.Clear(inputPad, keyLength, blockLength - keyLength); + Array.Copy(inputPad, 0, outputBuf, 0, blockLength); + + XorPad(inputPad, blockLength, IPAD); + XorPad(outputBuf, blockLength, OPAD); + + if (digest is IMemoable) + { + opadState = ((IMemoable)digest).Copy(); + + ((IDigest)opadState).BlockUpdate(outputBuf, 0, blockLength); + } + + digest.BlockUpdate(inputPad, 0, inputPad.Length); + + if (digest is IMemoable) + { + ipadState = ((IMemoable)digest).Copy(); + } + } + + public virtual int GetMacSize() + { + return digestSize; + } + + public virtual void Update(byte input) + { + digest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int len) + { + digest.BlockUpdate(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + digest.DoFinal(outputBuf, blockLength); + + if (opadState != null) + { + ((IMemoable)digest).Reset(opadState); + digest.BlockUpdate(outputBuf, blockLength, digestSize); + } + else + { + digest.BlockUpdate(outputBuf, 0, outputBuf.Length); + } + + int len = digest.DoFinal(output, outOff); + + Array.Clear(outputBuf, blockLength, digestSize); + + if (ipadState != null) + { + ((IMemoable)digest).Reset(ipadState); + } + else + { + digest.BlockUpdate(inputPad, 0, inputPad.Length); + } + + return len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + digest.DoFinal(outputBuf.AsSpan(blockLength)); + + if (opadState != null) + { + ((IMemoable)digest).Reset(opadState); + digest.BlockUpdate(outputBuf.AsSpan(blockLength, digestSize)); + } + else + { + digest.BlockUpdate(outputBuf); + } + + int len = digest.DoFinal(output); + + Array.Clear(outputBuf, blockLength, digestSize); + + if (ipadState != null) + { + ((IMemoable)digest).Reset(ipadState); + } + else + { + digest.BlockUpdate(inputPad); + } + + return len; + } +#endif + + /** + * Reset the mac generator. + */ + public virtual void Reset() + { + if (ipadState != null) + { + ((IMemoable)digest).Reset(ipadState); + } + else + { + digest.Reset(); + digest.BlockUpdate(inputPad, 0, inputPad.Length); + } + } + + private static void XorPad(byte[] pad, int len, byte n) + { + for (int i = 0; i < len; ++i) + { + pad[i] ^= n; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs.meta new file mode 100644 index 00000000..8133bcc0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35157fb4c25da3d49b28598eaf8c169e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/HMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs new file mode 100644 index 00000000..c16cf966 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs @@ -0,0 +1,353 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /** + * DES based CBC Block Cipher MAC according to ISO9797, algorithm 3 (ANSI X9.19 Retail MAC) + * + * This could as well be derived from CBCBlockCipherMac, but then the property mac in the base + * class must be changed to protected + */ + public class ISO9797Alg3Mac + : IMac + { + private byte[] mac; + private byte[] buf; + private int bufOff; + private IBlockCipher cipher; + private IBlockCipherPadding padding; + private int macSize; + private KeyParameter lastKey2; + private KeyParameter lastKey3; + + /** + * create a Retail-MAC based on a CBC block cipher. This will produce an + * authentication code of the length of the block size of the cipher. + * + * @param cipher the cipher to be used as the basis of the MAC generation. This must + * be DESEngine. + */ + public ISO9797Alg3Mac( + IBlockCipher cipher) + : this(cipher, cipher.GetBlockSize() * 8, null) + { + } + + /** + * create a Retail-MAC based on a CBC block cipher. This will produce an + * authentication code of the length of the block size of the cipher. + * + * @param cipher the cipher to be used as the basis of the MAC generation. + * @param padding the padding to be used to complete the last block. + */ + public ISO9797Alg3Mac( + IBlockCipher cipher, + IBlockCipherPadding padding) + : this(cipher, cipher.GetBlockSize() * 8, padding) + { + } + + /** + * create a Retail-MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses single DES CBC mode as the basis for the + * MAC generation. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + */ + public ISO9797Alg3Mac( + IBlockCipher cipher, + int macSizeInBits) + : this(cipher, macSizeInBits, null) + { + } + + /** + * create a standard MAC based on a block cipher with the size of the + * MAC been given in bits. This class uses single DES CBC mode as the basis for the + * MAC generation. The final block is decrypted and then encrypted using the + * middle and right part of the key. + *

+ * Note: the size of the MAC must be at least 24 bits (FIPS Publication 81), + * or 16 bits if being used as a data authenticator (FIPS Publication 113), + * and in general should be less than the size of the block cipher as it reduces + * the chance of an exhaustive attack (see Handbook of Applied Cryptography). + *

+ * @param cipher the cipher to be used as the basis of the MAC generation. + * @param macSizeInBits the size of the MAC in bits, must be a multiple of 8. + * @param padding the padding to be used to complete the last block. + */ + public ISO9797Alg3Mac( + IBlockCipher cipher, + int macSizeInBits, + IBlockCipherPadding padding) + { + if ((macSizeInBits % 8) != 0) + throw new ArgumentException("MAC size must be multiple of 8"); + + if (!(cipher is DesEngine)) + throw new ArgumentException("cipher must be instance of DesEngine"); + + this.cipher = new CbcBlockCipher(cipher); + this.padding = padding; + this.macSize = macSizeInBits / 8; + + mac = new byte[cipher.GetBlockSize()]; + buf = new byte[cipher.GetBlockSize()]; + bufOff = 0; + } + + public string AlgorithmName + { + get { return "ISO9797Alg3"; } + } + + public void Init( + ICipherParameters parameters) + { + Reset(); + + if (!(parameters is KeyParameter || parameters is ParametersWithIV)) + throw new ArgumentException("parameters must be an instance of KeyParameter or ParametersWithIV"); + + // KeyParameter must contain a double or triple length DES key, + // however the underlying cipher is a single DES. The middle and + // right key are used only in the final step. + + KeyParameter kp; + if (parameters is KeyParameter) + { + kp = (KeyParameter)parameters; + } + else + { + kp = (KeyParameter)((ParametersWithIV)parameters).Parameters; + } + + KeyParameter key1; + byte[] keyvalue = kp.GetKey(); + + if (keyvalue.Length == 16) + { // Double length DES key + key1 = new KeyParameter(keyvalue, 0, 8); + this.lastKey2 = new KeyParameter(keyvalue, 8, 8); + this.lastKey3 = key1; + } + else if (keyvalue.Length == 24) + { // Triple length DES key + key1 = new KeyParameter(keyvalue, 0, 8); + this.lastKey2 = new KeyParameter(keyvalue, 8, 8); + this.lastKey3 = new KeyParameter(keyvalue, 16, 8); + } + else + { + throw new ArgumentException("Key must be either 112 or 168 bit long"); + } + + if (parameters is ParametersWithIV) + { + cipher.Init(true, new ParametersWithIV(key1, ((ParametersWithIV)parameters).GetIV())); + } + else + { + cipher.Init(true, key1); + } + } + + public int GetMacSize() + { + return macSize; + } + + public void Update( + byte input) + { + if (bufOff == buf.Length) + { + cipher.ProcessBlock(buf, 0, mac, 0); + bufOff = 0; + } + + buf[bufOff++] = input; + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (len < 0) + throw new ArgumentException("Can't have a negative input length!"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int blockSize = cipher.GetBlockSize(); + int resultLen = 0; + int gapLen = blockSize - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + resultLen += cipher.ProcessBlock(buf, 0, mac, 0); + + bufOff = 0; + len -= gapLen; + inOff += gapLen; + + while (len > blockSize) + { + resultLen += cipher.ProcessBlock(input, inOff, mac, 0); + + len -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, len); + + bufOff += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int blockSize = cipher.GetBlockSize(); + int resultLen = 0; + int gapLen = blockSize - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + resultLen += cipher.ProcessBlock(buf, mac); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > blockSize) + { + resultLen += cipher.ProcessBlock(input, mac); + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + int blockSize = cipher.GetBlockSize(); + + if (padding == null) + { + // pad with zeroes + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + } + else + { + if (bufOff == blockSize) + { + cipher.ProcessBlock(buf, 0, mac, 0); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + } + + cipher.ProcessBlock(buf, 0, mac, 0); + + // Added to code from base class + DesEngine deseng = new DesEngine(); + + deseng.Init(false, this.lastKey2); + deseng.ProcessBlock(mac, 0, mac, 0); + + deseng.Init(true, this.lastKey3); + deseng.ProcessBlock(mac, 0, mac, 0); + // **** + + Array.Copy(mac, 0, output, outOff, macSize); + + Reset(); + + return macSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + int blockSize = cipher.GetBlockSize(); + + if (padding == null) + { + // pad with zeroes + while (bufOff < blockSize) + { + buf[bufOff++] = 0; + } + } + else + { + if (bufOff == blockSize) + { + cipher.ProcessBlock(buf, mac); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + } + + cipher.ProcessBlock(buf, mac); + + // Added to code from base class + DesEngine deseng = new DesEngine(); + + deseng.Init(false, this.lastKey2); + deseng.ProcessBlock(mac, mac); + + deseng.Init(true, this.lastKey3); + deseng.ProcessBlock(mac, mac); + // **** + + mac.AsSpan(0, macSize).CopyTo(output); + + Reset(); + + return macSize; + } +#endif + + /** + * Reset the mac generator. + */ + public void Reset() + { + Array.Clear(buf, 0, buf.Length); + bufOff = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs.meta new file mode 100644 index 00000000..63ccc988 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f825c88aa1ba0144e848b1ce6908b60e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/ISO9797Alg3Mac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs new file mode 100644 index 00000000..b00c6d07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs @@ -0,0 +1,248 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + public class KMac + : IMac, IXof + { + private static readonly byte[] padding = new byte[100]; + + private readonly CShakeDigest cshake; + private readonly int bitLength; + private readonly int outputLength; + + private byte[] key; + private bool initialised; + private bool firstOutput; + + public KMac(int bitLength, byte[] S) + { + this.cshake = new CShakeDigest(bitLength, Strings.ToAsciiByteArray("KMAC"), S); + this.bitLength = bitLength; + this.outputLength = bitLength * 2 / 8; + } + + public string AlgorithmName + { + get { return "KMAC" + cshake.AlgorithmName.Substring(6); } + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + cshake.BlockUpdate(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + cshake.BlockUpdate(input); + } +#endif + + public int DoFinal(byte[] output, int outOff) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + byte[] encOut = XofUtilities.RightEncode(GetMacSize() * 8); + + cshake.BlockUpdate(encOut, 0, encOut.Length); + } + + int rv = cshake.OutputFinal(output, outOff, GetMacSize()); + + Reset(); + + return rv; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + Span lengthEncoding = stackalloc byte[9]; + int count = XofUtilities.RightEncode(GetMacSize() * 8, lengthEncoding); + cshake.BlockUpdate(lengthEncoding[..count]); + } + + int rv = cshake.OutputFinal(output[..GetMacSize()]); + + Reset(); + + return rv; + } +#endif + + public int OutputFinal(byte[] output, int outOff, int outLen) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + byte[] encOut = XofUtilities.RightEncode(outLen * 8); + + cshake.BlockUpdate(encOut, 0, encOut.Length); + } + + int rv = cshake.OutputFinal(output, outOff, outLen); + + Reset(); + + return rv; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int OutputFinal(Span output) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + Span lengthEncoding = stackalloc byte[9]; + int count = XofUtilities.RightEncode(output.Length * 8, lengthEncoding); + cshake.BlockUpdate(lengthEncoding[..count]); + } + + int rv = cshake.OutputFinal(output); + + Reset(); + + return rv; + } +#endif + + public int Output(byte[] output, int outOff, int outLen) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + byte[] encOut = XofUtilities.RightEncode(0); + + cshake.BlockUpdate(encOut, 0, encOut.Length); + + firstOutput = false; + } + + return cshake.Output(output, outOff, outLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Output(Span output) + { + if (firstOutput) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + Span lengthEncoding = stackalloc byte[9]; + int count = XofUtilities.RightEncode(0, lengthEncoding); + cshake.BlockUpdate(lengthEncoding[..count]); + + firstOutput = false; + } + + return cshake.Output(output); + } +#endif + + public int GetByteLength() + { + return cshake.GetByteLength(); + } + + public int GetDigestSize() + { + return outputLength; + } + + public int GetMacSize() + { + return outputLength; + } + + public void Init(ICipherParameters parameters) + { + KeyParameter kParam = (KeyParameter)parameters; + this.key = Arrays.Clone(kParam.GetKey()); + this.initialised = true; + Reset(); + } + + public void Reset() + { + cshake.Reset(); + + if (key != null) + { + if (bitLength == 128) + { + bytePad(key, 168); + } + else + { + bytePad(key, 136); + } + } + + firstOutput = true; + } + + private void bytePad(byte[] X, int w) + { + byte[] bytes = XofUtilities.LeftEncode(w); + BlockUpdate(bytes, 0, bytes.Length); + byte[] encX = encode(X); + BlockUpdate(encX, 0, encX.Length); + + int required = w - ((bytes.Length + encX.Length) % w); + + if (required > 0 && required != w) + { + while (required > padding.Length) + { + BlockUpdate(padding, 0, padding.Length); + required -= padding.Length; + } + + BlockUpdate(padding, 0, required); + } + } + + private static byte[] encode(byte[] X) + { + return Arrays.Concatenate(XofUtilities.LeftEncode(X.Length * 8), X); + } + + public void Update(byte input) + { + if (!initialised) + throw new InvalidOperationException("KMAC not initialized"); + + cshake.Update(input); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs.meta new file mode 100644 index 00000000..4a9d482b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f1ea65adc1855c4e9fc3cf3a6ecc454 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/KMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs new file mode 100644 index 00000000..d9829f23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs @@ -0,0 +1,387 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.CompilerServices; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + + /// + /// Poly1305 message authentication code, designed by D. J. Bernstein. + /// + /// + /// Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key + /// consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106 + /// effective key bits) used in the authenticator. + /// + /// The polynomial calculation in this implementation is adapted from the public domain poly1305-donna-unrolled C implementation + /// by Andrew M (@floodyberry). + /// + /// + public class Poly1305 + : IMac + { + private const int BlockSize = 16; + + private readonly IBlockCipher cipher; + + // Initialised state + + /** Polynomial key */ + private uint r0, r1, r2, r3, r4; + + /** Precomputed 5 * r[1..4] */ + private uint s1, s2, s3, s4; + + /** Encrypted nonce */ + private uint k0, k1, k2, k3; + + // Accumulating state + + /** Current block of buffered input */ + private byte[] currentBlock = new byte[BlockSize]; + + /** Current offset in input buffer */ + private int currentBlockOffset = 0; + + /** Polynomial accumulator */ + private uint h0, h1, h2, h3, h4; + + /** + * Constructs a Poly1305 MAC, where the key passed to init() will be used directly. + */ + public Poly1305() + { + this.cipher = null; + } + + /** + * Constructs a Poly1305 MAC, using a 128 bit block cipher. + */ + public Poly1305(IBlockCipher cipher) + { + if (cipher.GetBlockSize() != BlockSize) + { + throw new ArgumentException("Poly1305 requires a 128 bit block cipher."); + } + this.cipher = cipher; + } + + /// + /// Initialises the Poly1305 MAC. + /// + /// a {@link ParametersWithIV} containing a 128 bit nonce and a {@link KeyParameter} with + /// a 256 bit key complying to the {@link Poly1305KeyGenerator Poly1305 key format}. + public void Init(ICipherParameters parameters) + { + byte[] nonce = null; + + if (cipher != null) + { + if (!(parameters is ParametersWithIV)) + throw new ArgumentException("Poly1305 requires an IV when used with a block cipher.", "parameters"); + + ParametersWithIV ivParams = (ParametersWithIV)parameters; + nonce = ivParams.GetIV(); + parameters = ivParams.Parameters; + } + + if (!(parameters is KeyParameter)) + throw new ArgumentException("Poly1305 requires a key."); + + KeyParameter keyParams = (KeyParameter)parameters; + + SetKey(keyParams.GetKey(), nonce); + + Reset(); + } + + private void SetKey(byte[] key, byte[] nonce) + { + if (key.Length != 32) + throw new ArgumentException("Poly1305 key must be 256 bits."); + + if (cipher != null && (nonce == null || nonce.Length != BlockSize)) + throw new ArgumentException("Poly1305 requires a 128 bit IV."); + + // Extract r portion of key (and "clamp" the values) + uint t0 = Pack.LE_To_UInt32(key, 0); + uint t1 = Pack.LE_To_UInt32(key, 4); + uint t2 = Pack.LE_To_UInt32(key, 8); + uint t3 = Pack.LE_To_UInt32(key, 12); + + // NOTE: The masks perform the key "clamping" implicitly + r0 = t0 & 0x03FFFFFFU; + r1 = ((t0 >> 26) | (t1 << 6)) & 0x03FFFF03U; + r2 = ((t1 >> 20) | (t2 << 12)) & 0x03FFC0FFU; + r3 = ((t2 >> 14) | (t3 << 18)) & 0x03F03FFFU; + r4 = (t3 >> 8) & 0x000FFFFFU; + + // Precompute multipliers + s1 = r1 * 5; + s2 = r2 * 5; + s3 = r3 * 5; + s4 = r4 * 5; + + byte[] kBytes; + int kOff; + + if (cipher == null) + { + kBytes = key; + kOff = BlockSize; + } + else + { + // Compute encrypted nonce + kBytes = new byte[BlockSize]; + kOff = 0; + + cipher.Init(true, new KeyParameter(key, BlockSize, BlockSize)); + cipher.ProcessBlock(nonce, 0, kBytes, 0); + } + + k0 = Pack.LE_To_UInt32(kBytes, kOff + 0); + k1 = Pack.LE_To_UInt32(kBytes, kOff + 4); + k2 = Pack.LE_To_UInt32(kBytes, kOff + 8); + k3 = Pack.LE_To_UInt32(kBytes, kOff + 12); + } + + public string AlgorithmName + { + get { return cipher == null ? "Poly1305" : "Poly1305-" + cipher.AlgorithmName; } + } + + public int GetMacSize() + { + return BlockSize; + } + + public void Update(byte input) + { + currentBlock[currentBlockOffset++] = input; + if (currentBlockOffset == BlockSize) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlock(currentBlock); +#else + ProcessBlock(currentBlock, 0); +#endif + currentBlockOffset = 0; + } + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int available = BlockSize - currentBlockOffset; + if (len < available) + { + Array.Copy(input, inOff, currentBlock, currentBlockOffset, len); + currentBlockOffset += len; + return; + } + + int pos = 0; + if (currentBlockOffset > 0) + { + Array.Copy(input, inOff, currentBlock, currentBlockOffset, available); + pos = available; + ProcessBlock(currentBlock, 0); + } + + int remaining; + while ((remaining = len - pos) >= BlockSize) + { + ProcessBlock(input, inOff + pos); + pos += BlockSize; + } + + Array.Copy(input, inOff + pos, currentBlock, 0, remaining); + currentBlockOffset = remaining; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + int available = BlockSize - currentBlockOffset; + if (input.Length < available) + { + input.CopyTo(currentBlock.AsSpan(currentBlockOffset)); + currentBlockOffset += input.Length; + return; + } + + int pos = 0; + if (currentBlockOffset > 0) + { + input[..available].CopyTo(currentBlock.AsSpan(currentBlockOffset)); + pos = available; + ProcessBlock(currentBlock); + } + + int remaining; + while ((remaining = input.Length - pos) >= BlockSize) + { + ProcessBlock(input[pos..]); + pos += BlockSize; + } + + input[pos..].CopyTo(currentBlock); + currentBlockOffset = remaining; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void ProcessBlock(ReadOnlySpan block) + { + uint t0 = Pack.LE_To_UInt32(block); + uint t1 = Pack.LE_To_UInt32(block[4..]); + uint t2 = Pack.LE_To_UInt32(block[8..]); + uint t3 = Pack.LE_To_UInt32(block[12..]); +#else + private void ProcessBlock(byte[] buf, int off) + { + uint t0 = Pack.LE_To_UInt32(buf, off + 0); + uint t1 = Pack.LE_To_UInt32(buf, off + 4); + uint t2 = Pack.LE_To_UInt32(buf, off + 8); + uint t3 = Pack.LE_To_UInt32(buf, off + 12); +#endif + + h0 += t0 & 0x3ffffffU; + h1 += ((t1 << 6) | (t0 >> 26)) & 0x3ffffffU; + h2 += ((t2 << 12) | (t1 >> 20)) & 0x3ffffffU; + h3 += ((t3 << 18) | (t2 >> 14)) & 0x3ffffffU; + h4 += ( 1 << 24) | (t3 >> 8); + + ulong tp0 = (ulong)h0 * r0 + (ulong)h1 * s4 + (ulong)h2 * s3 + (ulong)h3 * s2 + (ulong)h4 * s1; + ulong tp1 = (ulong)h0 * r1 + (ulong)h1 * r0 + (ulong)h2 * s4 + (ulong)h3 * s3 + (ulong)h4 * s2; + ulong tp2 = (ulong)h0 * r2 + (ulong)h1 * r1 + (ulong)h2 * r0 + (ulong)h3 * s4 + (ulong)h4 * s3; + ulong tp3 = (ulong)h0 * r3 + (ulong)h1 * r2 + (ulong)h2 * r1 + (ulong)h3 * r0 + (ulong)h4 * s4; + ulong tp4 = (ulong)h0 * r4 + (ulong)h1 * r3 + (ulong)h2 * r2 + (ulong)h3 * r1 + (ulong)h4 * r0; + + h0 = (uint)tp0 & 0x3ffffff; tp1 += (tp0 >> 26); + h1 = (uint)tp1 & 0x3ffffff; tp2 += (tp1 >> 26); + h2 = (uint)tp2 & 0x3ffffff; tp3 += (tp2 >> 26); + h3 = (uint)tp3 & 0x3ffffff; tp4 += (tp3 >> 26); + h4 = (uint)tp4 & 0x3ffffff; + h0 += (uint)(tp4 >> 26) * 5; + h1 += h0 >> 26; h0 &= 0x3ffffff; + } + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + Check.OutputLength(output, outOff, BlockSize, "output buffer is too short."); + + if (currentBlockOffset > 0) + { + // Process padded block + if (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 1; + while (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 0; + } + + h4 -= (1 << 24); + } + + ProcessBlock(currentBlock, 0); + } + + Debug.Assert(h4 >> 26 == 0); + + //h0 += (h4 >> 26) * 5U + 5U; h4 &= 0x3ffffff; + h0 += 5U; + h1 += h0 >> 26; h0 &= 0x3ffffff; + h2 += h1 >> 26; h1 &= 0x3ffffff; + h3 += h2 >> 26; h2 &= 0x3ffffff; + h4 += h3 >> 26; h3 &= 0x3ffffff; + + long c = ((int)(h4 >> 26) - 1) * 5; + c += (long)k0 + ((h0 ) | (h1 << 26)); + Pack.UInt32_To_LE((uint)c, output, outOff ); c >>= 32; + c += (long)k1 + ((h1 >> 6) | (h2 << 20)); + Pack.UInt32_To_LE((uint)c, output, outOff + 4); c >>= 32; + c += (long)k2 + ((h2 >> 12) | (h3 << 14)); + Pack.UInt32_To_LE((uint)c, output, outOff + 8); c >>= 32; + c += (long)k3 + ((h3 >> 18) | (h4 << 8)); + Pack.UInt32_To_LE((uint)c, output, outOff + 12); + + Reset(); + return BlockSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + Check.OutputLength(output, BlockSize, "output buffer is too short."); + + if (currentBlockOffset > 0) + { + // Process padded block + if (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 1; + while (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 0; + } + + h4 -= (1 << 24); + } + + ProcessBlock(currentBlock); + } + + Debug.Assert(h4 >> 26 == 0); + + //h0 += (h4 >> 26) * 5U + 5U; h4 &= 0x3ffffff; + h0 += 5U; + h1 += h0 >> 26; h0 &= 0x3ffffff; + h2 += h1 >> 26; h1 &= 0x3ffffff; + h3 += h2 >> 26; h2 &= 0x3ffffff; + h4 += h3 >> 26; h3 &= 0x3ffffff; + + long c = ((int)(h4 >> 26) - 1) * 5; + c += (long)k0 + ((h0) | (h1 << 26)); + Pack.UInt32_To_LE((uint)c, output); c >>= 32; + c += (long)k1 + ((h1 >> 6) | (h2 << 20)); + Pack.UInt32_To_LE((uint)c, output[4..]); c >>= 32; + c += (long)k2 + ((h2 >> 12) | (h3 << 14)); + Pack.UInt32_To_LE((uint)c, output[8..]); c >>= 32; + c += (long)k3 + ((h3 >> 18) | (h4 << 8)); + Pack.UInt32_To_LE((uint)c, output[12..]); + + Reset(); + return BlockSize; + } +#endif + + public void Reset() + { + currentBlockOffset = 0; + + h0 = h1 = h2 = h3 = h4 = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs.meta new file mode 100644 index 00000000..48b833c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d56577fc790bfba40b34bc7555228089 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/Poly1305.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs new file mode 100644 index 00000000..2af19cc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs @@ -0,0 +1,258 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + /// + /// Implementation of SipHash as specified in "SipHash: a fast short-input PRF", by Jean-Philippe + /// Aumasson and Daniel J. Bernstein (https://131002.net/siphash/siphash.pdf). + /// + /// + /// "SipHash is a family of PRFs SipHash-c-d where the integer parameters c and d are the number of + /// compression rounds and the number of finalization rounds. A compression round is identical to a + /// finalization round and this round function is called SipRound. Given a 128-bit key k and a + /// (possibly empty) byte string m, SipHash-c-d returns a 64-bit value..." + /// + public class SipHash + : IMac + { + protected readonly int c, d; + + protected long k0, k1; + protected long v0, v1, v2, v3; + + protected long m = 0; + protected int wordPos = 0; + protected int wordCount = 0; + + /// SipHash-2-4 + public SipHash() + : this(2, 4) + { + } + + /// SipHash-c-d + /// the number of compression rounds + /// the number of finalization rounds + public SipHash(int c, int d) + { + this.c = c; + this.d = d; + } + + public virtual string AlgorithmName + { + get { return "SipHash-" + c + "-" + d; } + } + + public virtual int GetMacSize() + { + return 8; + } + + public virtual void Init(ICipherParameters parameters) + { + KeyParameter keyParameter = parameters as KeyParameter; + if (keyParameter == null) + throw new ArgumentException("must be an instance of KeyParameter", "parameters"); + byte[] key = keyParameter.GetKey(); + if (key.Length != 16) + throw new ArgumentException("must be a 128-bit key", "parameters"); + + this.k0 = (long)Pack.LE_To_UInt64(key, 0); + this.k1 = (long)Pack.LE_To_UInt64(key, 8); + + Reset(); + } + + public virtual void Update(byte input) + { + m = (long)(((ulong)m >> 8) | ((ulong)input << 56)); + + if (++wordPos == 8) + { + ProcessMessageWord(); + wordPos = 0; + } + } + + public virtual void BlockUpdate(byte[] input, int offset, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(offset, length)); +#else + int i = 0, fullWords = length & ~7; + if (wordPos == 0) + { + for (; i < fullWords; i += 8) + { + m = (long)Pack.LE_To_UInt64(input, offset + i); + ProcessMessageWord(); + } + for (; i < length; ++i) + { + m = (long)(((ulong)m >> 8) | ((ulong)input[offset + i] << 56)); + } + wordPos = length - fullWords; + } + else + { + int bits = wordPos << 3; + for (; i < fullWords; i += 8) + { + ulong n = Pack.LE_To_UInt64(input, offset + i); + m = (long)((n << bits) | ((ulong)m >> -bits)); + ProcessMessageWord(); + m = (long)n; + } + for (; i < length; ++i) + { + m = (long)(((ulong)m >> 8) | ((ulong)input[offset + i] << 56)); + + if (++wordPos == 8) + { + ProcessMessageWord(); + wordPos = 0; + } + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + int length = input.Length; + int i = 0, fullWords = length & ~7; + if (wordPos == 0) + { + for (; i < fullWords; i += 8) + { + m = (long)Pack.LE_To_UInt64(input[i..]); + ProcessMessageWord(); + } + for (; i < length; ++i) + { + m = (long)(((ulong)m >> 8) | ((ulong)input[i] << 56)); + } + wordPos = length - fullWords; + } + else + { + int bits = wordPos << 3; + for (; i < fullWords; i += 8) + { + ulong n = Pack.LE_To_UInt64(input[i..]); + m = (long)((n << bits) | ((ulong)m >> -bits)); + ProcessMessageWord(); + m = (long)n; + } + for (; i < length; ++i) + { + m = (long)(((ulong)m >> 8) | ((ulong)input[i] << 56)); + + if (++wordPos == 8) + { + ProcessMessageWord(); + wordPos = 0; + } + } + } + } +#endif + + public virtual long DoFinal() + { + // NOTE: 2 distinct shifts to avoid "64-bit shift" when wordPos == 0 + m = (long)((ulong)m >> ((7 - wordPos) << 3)); + m = (long)((ulong)m >> 8); + m = (long)((ulong)m | ((ulong)((wordCount << 3) + wordPos) << 56)); + + ProcessMessageWord(); + + v2 ^= 0xffL; + + ApplySipRounds(d); + + long result = v0 ^ v1 ^ v2 ^ v3; + + Reset(); + + return result; + } + + public virtual int DoFinal(byte[] output, int outOff) + { + long result = DoFinal(); + Pack.UInt64_To_LE((ulong)result, output, outOff); + return 8; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + long result = DoFinal(); + Pack.UInt64_To_LE((ulong)result, output); + return 8; + } +#endif + + public virtual void Reset() + { + v0 = k0 ^ 0x736f6d6570736575L; + v1 = k1 ^ 0x646f72616e646f6dL; + v2 = k0 ^ 0x6c7967656e657261L; + v3 = k1 ^ 0x7465646279746573L; + + m = 0; + wordPos = 0; + wordCount = 0; + } + + protected virtual void ProcessMessageWord() + { + ++wordCount; + v3 ^= m; + ApplySipRounds(c); + v0 ^= m; + } + + protected virtual void ApplySipRounds(int n) + { + long r0 = v0, r1 = v1, r2 = v2, r3 = v3; + + for (int r = 0; r < n; ++r) + { + r0 += r1; + r2 += r3; + r1 = RotateLeft(r1, 13); + r3 = RotateLeft(r3, 16); + r1 ^= r0; + r3 ^= r2; + r0 = RotateLeft(r0, 32); + r2 += r1; + r0 += r3; + r1 = RotateLeft(r1, 17); + r3 = RotateLeft(r3, 21); + r1 ^= r2; + r3 ^= r0; + r2 = RotateLeft(r2, 32); + } + + v0 = r0; v1 = r1; v2 = r2; v3 = r3; + } + + protected static long RotateLeft(long x, int n) + { + ulong ux = (ulong)x; + ux = (ux << n) | (ux >> -n); + return (long)ux; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs.meta new file mode 100644 index 00000000..de1dd0fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b3e8cb0bdb193da438a939f63d803762 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SipHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs new file mode 100644 index 00000000..54d9c3e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs @@ -0,0 +1,135 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + + /// + /// Implementation of the Skein parameterised MAC function in 256, 512 and 1024 bit block sizes, + /// based on the Threefish tweakable block cipher. + /// + /// + /// This is the 1.3 version of Skein defined in the Skein hash function submission to the NIST SHA-3 + /// competition in October 2010. + ///

+ /// Skein was designed by Niels Ferguson - Stefan Lucks - Bruce Schneier - Doug Whiting - Mihir + /// Bellare - Tadayoshi Kohno - Jon Callas - Jesse Walker. + /// + /// + /// + public class SkeinMac + : IMac + { + ///

+ /// 256 bit block size - Skein-256 + /// + public const int SKEIN_256 = SkeinEngine.SKEIN_256; + /// + /// 512 bit block size - Skein-512 + /// + public const int SKEIN_512 = SkeinEngine.SKEIN_512; + /// + /// 1024 bit block size - Skein-1024 + /// + public const int SKEIN_1024 = SkeinEngine.SKEIN_1024; + + private readonly SkeinEngine engine; + + /// + /// Constructs a Skein MAC with an internal state size and output size. + /// + /// the internal state size in bits - one of or + /// . + /// the output/MAC size to produce in bits, which must be an integral number of + /// bytes. + public SkeinMac(int stateSizeBits, int digestSizeBits) + { + this.engine = new SkeinEngine(stateSizeBits, digestSizeBits); + } + + public SkeinMac(SkeinMac mac) + { + this.engine = new SkeinEngine(mac.engine); + } + + public string AlgorithmName + { + get { return "Skein-MAC-" + (engine.BlockSize * 8) + "-" + (engine.OutputSize * 8); } + } + + /// + /// Optionally initialises the Skein digest with the provided parameters. + /// + /// See for details on the parameterisation of the Skein hash function. + /// the parameters to apply to this engine, or null to use no parameters. + public void Init(ICipherParameters parameters) + { + SkeinParameters skeinParameters; + if (parameters is SkeinParameters) + { + skeinParameters = (SkeinParameters)parameters; + } + else if (parameters is KeyParameter) + { + skeinParameters = new SkeinParameters.Builder().SetKey(((KeyParameter)parameters).GetKey()).Build(); + } + else + { + throw new ArgumentException("Invalid parameter passed to Skein MAC init - " + + Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + } + if (skeinParameters.GetKey() == null) + { + throw new ArgumentException("Skein MAC requires a key parameter."); + } + engine.Init(skeinParameters); + } + + public int GetMacSize() + { + return engine.OutputSize; + } + + public void Reset() + { + engine.Reset(); + } + + public void Update(byte inByte) + { + engine.Update(inByte); + } + + public void BlockUpdate(byte[] input, int inOff, int len) + { + engine.BlockUpdate(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void BlockUpdate(ReadOnlySpan input) + { + engine.BlockUpdate(input); + } +#endif + + public int DoFinal(byte[] output, int outOff) + { + return engine.DoFinal(output, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + return engine.DoFinal(output); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs.meta new file mode 100644 index 00000000..d255030a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4950b87ce259bcd428f78591cb0c52ca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/SkeinMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs new file mode 100644 index 00000000..9cc9488b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs @@ -0,0 +1,242 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs +{ + public class VmpcMac + : IMac + { + private byte g; + + private byte n = 0; + private byte[] P = null; + private byte s = 0; + + private byte[] T; + private byte[] workingIV; + + private byte[] workingKey; + + private byte x1, x2, x3, x4; + + public virtual int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + // Execute the Post-Processing Phase + for (int r = 1; r < 25; r++) + { + s = P[(s + P[n & 0xff]) & 0xff]; + + x4 = P[(x4 + x3 + r) & 0xff]; + x3 = P[(x3 + x2 + r) & 0xff]; + x2 = P[(x2 + x1 + r) & 0xff]; + x1 = P[(x1 + s + r) & 0xff]; + T[g & 0x1f] = (byte) (T[g & 0x1f] ^ x1); + T[(g + 1) & 0x1f] = (byte) (T[(g + 1) & 0x1f] ^ x2); + T[(g + 2) & 0x1f] = (byte) (T[(g + 2) & 0x1f] ^ x3); + T[(g + 3) & 0x1f] = (byte) (T[(g + 3) & 0x1f] ^ x4); + g = (byte) ((g + 4) & 0x1f); + + byte temp = P[n & 0xff]; + P[n & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + n = (byte) ((n + 1) & 0xff); + } + + // Input T to the IV-phase of the VMPC KSA + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + T[m & 0x1f]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + // Store 20 new outputs of the VMPC Stream Cipher input table M + byte[] M = new byte[20]; + for (int i = 0; i < 20; i++) + { + s = P[(s + P[i & 0xff]) & 0xff]; + M[i] = P[(P[(P[s & 0xff]) & 0xff] + 1) & 0xff]; + + byte temp = P[i & 0xff]; + P[i & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + Array.Copy(M, 0, output, outOff, M.Length); + Reset(); + + return M.Length; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + // Execute the Post-Processing Phase + for (int r = 1; r < 25; r++) + { + s = P[(s + P[n & 0xff]) & 0xff]; + + x4 = P[(x4 + x3 + r) & 0xff]; + x3 = P[(x3 + x2 + r) & 0xff]; + x2 = P[(x2 + x1 + r) & 0xff]; + x1 = P[(x1 + s + r) & 0xff]; + T[g & 0x1f] = (byte)(T[g & 0x1f] ^ x1); + T[(g + 1) & 0x1f] = (byte)(T[(g + 1) & 0x1f] ^ x2); + T[(g + 2) & 0x1f] = (byte)(T[(g + 2) & 0x1f] ^ x3); + T[(g + 3) & 0x1f] = (byte)(T[(g + 3) & 0x1f] ^ x4); + g = (byte)((g + 4) & 0x1f); + + byte temp = P[n & 0xff]; + P[n & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + n = (byte)((n + 1) & 0xff); + } + + // Input T to the IV-phase of the VMPC KSA + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + T[m & 0x1f]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + // Store 20 new outputs of the VMPC Stream Cipher input table M + byte[] M = new byte[20]; + for (int i = 0; i < 20; i++) + { + s = P[(s + P[i & 0xff]) & 0xff]; + M[i] = P[(P[(P[s & 0xff]) & 0xff] + 1) & 0xff]; + + byte temp = P[i & 0xff]; + P[i & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + + M.CopyTo(output); + Reset(); + + return M.Length; + } +#endif + + public virtual string AlgorithmName + { + get { return "VMPC-MAC"; } + } + + public virtual int GetMacSize() + { + return 20; + } + + public virtual void Init(ICipherParameters parameters) + { + if (!(parameters is ParametersWithIV)) + throw new ArgumentException("VMPC-MAC Init parameters must include an IV", "parameters"); + + ParametersWithIV ivParams = (ParametersWithIV) parameters; + KeyParameter key = (KeyParameter) ivParams.Parameters; + + if (!(ivParams.Parameters is KeyParameter)) + throw new ArgumentException("VMPC-MAC Init parameters must include a key", "parameters"); + + this.workingIV = ivParams.GetIV(); + + if (workingIV == null || workingIV.Length < 1 || workingIV.Length > 768) + throw new ArgumentException("VMPC-MAC requires 1 to 768 bytes of IV", "parameters"); + + this.workingKey = key.GetKey(); + + Reset(); + + } + + private void initKey(byte[] keyBytes, byte[] ivBytes) + { + s = 0; + P = new byte[256]; + for (int i = 0; i < 256; i++) + { + P[i] = (byte) i; + } + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + keyBytes[m % keyBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + for (int m = 0; m < 768; m++) + { + s = P[(s + P[m & 0xff] + ivBytes[m % ivBytes.Length]) & 0xff]; + byte temp = P[m & 0xff]; + P[m & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + } + n = 0; + } + + public virtual void Reset() + { + initKey(this.workingKey, this.workingIV); + g = x1 = x2 = x3 = x4 = n = 0; + T = new byte[32]; + for (int i = 0; i < 32; i++) + { + T[i] = 0; + } + } + + public virtual void Update(byte input) + { + s = P[(s + P[n & 0xff]) & 0xff]; + byte c = (byte) (input ^ P[(P[(P[s & 0xff]) & 0xff] + 1) & 0xff]); + + x4 = P[(x4 + x3) & 0xff]; + x3 = P[(x3 + x2) & 0xff]; + x2 = P[(x2 + x1) & 0xff]; + x1 = P[(x1 + s + c) & 0xff]; + T[g & 0x1f] = (byte) (T[g & 0x1f] ^ x1); + T[(g + 1) & 0x1f] = (byte) (T[(g + 1) & 0x1f] ^ x2); + T[(g + 2) & 0x1f] = (byte) (T[(g + 2) & 0x1f] ^ x3); + T[(g + 3) & 0x1f] = (byte) (T[(g + 3) & 0x1f] ^ x4); + g = (byte) ((g + 4) & 0x1f); + + byte temp = P[n & 0xff]; + P[n & 0xff] = P[s & 0xff]; + P[s & 0xff] = temp; + n = (byte) ((n + 1) & 0xff); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + Check.DataLength(input, inOff, inLen, "input buffer too short"); + + for (int i = 0; i < inLen; i++) + { + Update(input[inOff + i]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + for (int i = 0; i < input.Length; i++) + { + Update(input[i]); + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs.meta new file mode 100644 index 00000000..69c7ae9e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cfd7f83b18ecf2a49b9d69a9cecd38c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/macs/VMPCMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes.meta new file mode 100644 index 00000000..787084df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: cd0a73c100843c243af23310f1965a02 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs new file mode 100644 index 00000000..59c5b306 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs @@ -0,0 +1,221 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher. + */ + public sealed class CbcBlockCipher + : IBlockCipherMode + { + private byte[] IV, cbcV, cbcNextV; + private int blockSize; + private IBlockCipher cipher; + private bool encrypting; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of chaining. + */ + public CbcBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + this.blockSize = cipher.GetBlockSize(); + + this.IV = new byte[blockSize]; + this.cbcV = new byte[blockSize]; + this.cbcNextV = new byte[blockSize]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + bool oldEncrypting = this.encrypting; + + this.encrypting = forEncryption; + + if (parameters is ParametersWithIV ivParam) + { + byte[] iv = ivParam.GetIV(); + + if (iv.Length != blockSize) + throw new ArgumentException("initialisation vector must be the same length as block size"); + + Array.Copy(iv, 0, IV, 0, iv.Length); + + parameters = ivParam.Parameters; + } + + Reset(); + + // if null it's an IV changed only. + if (parameters != null) + { + cipher.Init(encrypting, parameters); + } + else if (oldEncrypting != encrypting) + { + throw new ArgumentException("cannot change encrypting state without providing key."); + } + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/CBC". + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/CBC"; } + } + + public bool IsPartialBlockOkay + { + get { return false; } + } + + /** + * return the block size of the underlying cipher. + * + * @return the block size of the underlying cipher. + */ + public int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return encrypting + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return encrypting + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + return encrypting + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + Array.Copy(IV, 0, cbcV, 0, IV.Length); + Array.Clear(cbcNextV, 0, cbcNextV.Length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + for (int i = 0; i < blockSize; i++) + { + cbcV[i] ^= input[i]; + } + + int length = cipher.ProcessBlock(cbcV, output); + + output[..blockSize].CopyTo(cbcV); + + return length; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + input[..blockSize].CopyTo(cbcNextV); + + int length = cipher.ProcessBlock(input, output); + + for (int i = 0; i < blockSize; i++) + { + output[i] ^= cbcV[i]; + } + + byte[] tmp = cbcV; + cbcV = cbcNextV; + cbcNextV = tmp; + + return length; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + for (int i = 0; i < blockSize; i++) + { + cbcV[i] ^= input[inOff + i]; + } + + int length = cipher.ProcessBlock(cbcV, 0, outBytes, outOff); + + Array.Copy(outBytes, outOff, cbcV, 0, cbcV.Length); + + return length; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + Array.Copy(input, inOff, cbcNextV, 0, blockSize); + + int length = cipher.ProcessBlock(input, inOff, outBytes, outOff); + + for (int i = 0; i < blockSize; i++) + { + outBytes[outOff + i] ^= cbcV[i]; + } + + byte[] tmp = cbcV; + cbcV = cbcNextV; + cbcNextV = tmp; + + return length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs.meta new file mode 100644 index 00000000..161bb7e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 81829f4c01d07fb4e9361e5200b2ff07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CbcBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs new file mode 100644 index 00000000..bda9e9d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs @@ -0,0 +1,659 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in + * NIST Special Publication 800-38C. + *

+ * Note: this mode is a packet mode - it needs all the data up front. + *

+ */ + public class CcmBlockCipher + : IAeadBlockCipher + { + private static readonly int BlockSize = 16; + + private readonly IBlockCipher cipher; + private readonly byte[] macBlock; + private bool forEncryption; + private byte[] nonce; + private byte[] initialAssociatedText; + private int macSize; + private ICipherParameters keyParam; + private readonly MemoryStream associatedText = new MemoryStream(); + private readonly MemoryStream data = new MemoryStream(); + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used. + */ + public CcmBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + this.macBlock = new byte[BlockSize]; + + if (cipher.GetBlockSize() != BlockSize) + throw new ArgumentException("cipher required with a block size of " + BlockSize + "."); + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public virtual IBlockCipher UnderlyingCipher => cipher; + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + ICipherParameters cipherParameters; + if (parameters is AeadParameters aeadParameters) + { + nonce = aeadParameters.GetNonce(); + initialAssociatedText = aeadParameters.GetAssociatedText(); + macSize = GetMacSize(forEncryption, aeadParameters.MacSize); + cipherParameters = aeadParameters.Key; + } + else if (parameters is ParametersWithIV parametersWithIV) + { + nonce = parametersWithIV.GetIV(); + initialAssociatedText = null; + macSize = GetMacSize(forEncryption, 64); + cipherParameters = parametersWithIV.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to CCM"); + } + + // NOTE: Very basic support for key re-use, but no performance gain from it + if (cipherParameters != null) + { + keyParam = cipherParameters; + } + + if (nonce == null || nonce.Length < 7 || nonce.Length > 13) + throw new ArgumentException("nonce must have length from 7 to 13 octets"); + + Reset(); + } + + public virtual string AlgorithmName => cipher.AlgorithmName + "/CCM"; + + public virtual int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public virtual void ProcessAadByte(byte input) + { + associatedText.WriteByte(input); + } + + public virtual void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { + // TODO: Process AAD online + associatedText.Write(inBytes, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + // TODO: Process AAD online + associatedText.Write(input); + } +#endif + + public virtual int ProcessByte(byte input, byte[] outBytes, int outOff) + { + data.WriteByte(input); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + data.WriteByte(input); + + return 0; + } +#endif + + public virtual int ProcessBytes(byte[] inBytes, int inOff, int inLen, byte[] outBytes, int outOff) + { + Check.DataLength(inBytes, inOff, inLen, "input buffer too short"); + + data.Write(inBytes, inOff, inLen); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + data.Write(input); + + return 0; + } +#endif + + public virtual int DoFinal(byte[] outBytes, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(outBytes.AsSpan(outOff)); +#else + byte[] input = data.GetBuffer(); + int inLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(input, 0, inLen, outBytes, outOff); + + Reset(); + + return len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + byte[] input = data.GetBuffer(); + int inLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(input.AsSpan(0, inLen), output); + + Reset(); + + return len; + } +#endif + + public virtual void Reset() + { + associatedText.SetLength(0); + data.SetLength(0); + } + + /** + * Returns a byte array containing the mac calculated as part of the + * last encrypt or decrypt operation. + * + * @return the last mac calculated. + */ + public virtual byte[] GetMac() + { + return Arrays.CopyOfRange(macBlock, 0, macSize); + } + + public virtual int GetUpdateOutputSize(int len) + { + return 0; + } + + public virtual int GetOutputSize(int len) + { + int totalData = Convert.ToInt32(data.Length) + len; + + if (forEncryption) + { + return totalData + macSize; + } + + return totalData < macSize ? 0 : totalData - macSize; + } + + /** + * Process a packet of data for either CCM decryption or encryption. + * + * @param in data for processing. + * @param inOff offset at which data starts in the input array. + * @param inLen length of the data in the input array. + * @return a byte array containing the processed input.. + * @throws IllegalStateException if the cipher is not appropriately set up. + * @throws InvalidCipherTextException if the input data is truncated or the mac check fails. + */ + public virtual byte[] ProcessPacket(byte[] input, int inOff, int inLen) + { + byte[] output; + + if (forEncryption) + { + output = new byte[inLen + macSize]; + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + output = new byte[inLen - macSize]; + } + + ProcessPacket(input, inOff, inLen, output, 0); + + return output; + } + + /** + * Process a packet of data for either CCM decryption or encryption. + * + * @param in data for processing. + * @param inOff offset at which data starts in the input array. + * @param inLen length of the data in the input array. + * @param output output array. + * @param outOff offset into output array to start putting processed bytes. + * @return the number of bytes added to output. + * @throws IllegalStateException if the cipher is not appropriately set up. + * @throws InvalidCipherTextException if the input data is truncated or the mac check fails. + * @throws DataLengthException if output buffer too short. + */ + public virtual int ProcessPacket(byte[] input, int inOff, int inLen, byte[] output, int outOff) + { + // TODO: handle null keyParam (e.g. via RepeatedKeySpec) + // Need to keep the CTR and CBC Mac parts around and reset + if (keyParam == null) + throw new InvalidOperationException("CCM cipher unitialized."); + + int n = nonce.Length; + int q = 15 - n; + if (q < 4) + { + int limitLen = 1 << (8 * q); + if (inLen >= limitLen) + throw new InvalidOperationException("CCM packet too large for choice of q."); + } + + byte[] iv = new byte[BlockSize]; + iv[0] = (byte)((q - 1) & 0x7); + nonce.CopyTo(iv, 1); + + IBlockCipher ctrCipher = new SicBlockCipher(cipher); + ctrCipher.Init(forEncryption, new ParametersWithIV(keyParam, iv)); + + int outputLen; + int inIndex = inOff; + int outIndex = outOff; + + if (forEncryption) + { + outputLen = inLen + macSize; + Check.OutputLength(output, outOff, outputLen, "Output buffer too short."); + + CalculateMac(input, inOff, inLen, macBlock); + + byte[] encMac = new byte[BlockSize]; + ctrCipher.ProcessBlock(macBlock, 0, encMac, 0); // S0 + + while (inIndex < (inOff + inLen - BlockSize)) // S1... + { + ctrCipher.ProcessBlock(input, inIndex, output, outIndex); + outIndex += BlockSize; + inIndex += BlockSize; + } + + byte[] block = new byte[BlockSize]; + + Array.Copy(input, inIndex, block, 0, inLen + inOff - inIndex); + + ctrCipher.ProcessBlock(block, 0, block, 0); + + Array.Copy(block, 0, output, outIndex, inLen + inOff - inIndex); + + Array.Copy(encMac, 0, output, outOff + inLen, macSize); + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + outputLen = inLen - macSize; + Check.OutputLength(output, outOff, outputLen, "Output buffer too short."); + + Array.Copy(input, inOff + outputLen, macBlock, 0, macSize); + + ctrCipher.ProcessBlock(macBlock, 0, macBlock, 0); + + for (int i = macSize; i != macBlock.Length; i++) + { + macBlock[i] = 0; + } + + while (inIndex < (inOff + outputLen - BlockSize)) + { + ctrCipher.ProcessBlock(input, inIndex, output, outIndex); + outIndex += BlockSize; + inIndex += BlockSize; + } + + byte[] block = new byte[BlockSize]; + + Array.Copy(input, inIndex, block, 0, outputLen - (inIndex - inOff)); + + ctrCipher.ProcessBlock(block, 0, block, 0); + + Array.Copy(block, 0, output, outIndex, outputLen - (inIndex - inOff)); + + byte[] calculatedMacBlock = new byte[BlockSize]; + + CalculateMac(output, outOff, outputLen, calculatedMacBlock); + + if (!Arrays.ConstantTimeAreEqual(macBlock, calculatedMacBlock)) + throw new InvalidCipherTextException("mac check in CCM failed"); + } + + return outputLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessPacket(ReadOnlySpan input, Span output) + { + int inLen = input.Length; + + // TODO: handle null keyParam (e.g. via RepeatedKeySpec) + // Need to keep the CTR and CBC Mac parts around and reset + if (keyParam == null) + throw new InvalidOperationException("CCM cipher unitialized."); + + int n = nonce.Length; + int q = 15 - n; + if (q < 4) + { + int limitLen = 1 << (8 * q); + if (inLen >= limitLen) + throw new InvalidOperationException("CCM packet too large for choice of q."); + } + + byte[] iv = new byte[BlockSize]; + iv[0] = (byte)((q - 1) & 0x7); + nonce.CopyTo(iv, 1); + + IBlockCipher ctrCipher = new SicBlockCipher(cipher); + ctrCipher.Init(forEncryption, new ParametersWithIV(keyParam, iv)); + + int outputLen; + int index = 0; + Span block = stackalloc byte[BlockSize]; + + if (forEncryption) + { + outputLen = inLen + macSize; + Check.OutputLength(output, outputLen, "output buffer too short"); + + CalculateMac(input, macBlock); + + byte[] encMac = new byte[BlockSize]; + ctrCipher.ProcessBlock(macBlock, encMac); // S0 + + while (index < (inLen - BlockSize)) // S1... + { + ctrCipher.ProcessBlock(input[index..], output[index..]); + index += BlockSize; + } + + input[index..].CopyTo(block); + + ctrCipher.ProcessBlock(block, block); + + block[..(inLen - index)].CopyTo(output[index..]); + + encMac.AsSpan(0, macSize).CopyTo(output[inLen..]); + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + outputLen = inLen - macSize; + Check.OutputLength(output, outputLen, "output buffer too short"); + + input[outputLen..].CopyTo(macBlock); + + ctrCipher.ProcessBlock(macBlock, macBlock); + + for (int i = macSize; i != macBlock.Length; i++) + { + macBlock[i] = 0; + } + + while (index < (outputLen - BlockSize)) + { + ctrCipher.ProcessBlock(input[index..], output[index..]); + index += BlockSize; + } + + input[index..outputLen].CopyTo(block); + + ctrCipher.ProcessBlock(block, block); + + block[..(outputLen - index)].CopyTo(output[index..]); + + Span calculatedMacBlock = stackalloc byte[BlockSize]; + + CalculateMac(output[..outputLen], calculatedMacBlock); + + if (!Arrays.ConstantTimeAreEqual(macBlock, calculatedMacBlock)) + throw new InvalidCipherTextException("mac check in CCM failed"); + } + + return outputLen; + } +#endif + + private int CalculateMac(byte[] data, int dataOff, int dataLen, byte[] macBlock) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return CalculateMac(data.AsSpan(dataOff, dataLen), macBlock); +#else + IMac cMac = new CbcBlockCipherMac(cipher, macSize * 8); + + cMac.Init(keyParam); + + // + // build b0 + // + byte[] b0 = new byte[16]; + + if (HasAssociatedText()) + { + b0[0] |= 0x40; + } + + b0[0] |= (byte)((((cMac.GetMacSize() - 2) / 2) & 0x7) << 3); + + b0[0] |= (byte)(((15 - nonce.Length) - 1) & 0x7); + + Array.Copy(nonce, 0, b0, 1, nonce.Length); + + int q = dataLen; + int count = 1; + while (q > 0) + { + b0[b0.Length - count] = (byte)(q & 0xff); + q >>= 8; + count++; + } + + cMac.BlockUpdate(b0, 0, b0.Length); + + // + // process associated text + // + if (HasAssociatedText()) + { + int extra; + + int textLength = GetAssociatedTextLength(); + if (textLength < ((1 << 16) - (1 << 8))) + { + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 2; + } + else // can't go any higher than 2^32 + { + cMac.Update((byte)0xff); + cMac.Update((byte)0xfe); + cMac.Update((byte)(textLength >> 24)); + cMac.Update((byte)(textLength >> 16)); + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 6; + } + + if (initialAssociatedText != null) + { + cMac.BlockUpdate(initialAssociatedText, 0, initialAssociatedText.Length); + } + if (associatedText.Length > 0) + { + byte[] input = associatedText.GetBuffer(); + int len = Convert.ToInt32(associatedText.Length); + + cMac.BlockUpdate(input, 0, len); + } + + extra = (extra + textLength) % 16; + if (extra != 0) + { + for (int i = extra; i < 16; ++i) + { + cMac.Update((byte)0x00); + } + } + } + + // + // add the text + // + cMac.BlockUpdate(data, dataOff, dataLen); + + return cMac.DoFinal(macBlock, 0); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int CalculateMac(ReadOnlySpan data, Span macBlock) + { + IMac cMac = new CbcBlockCipherMac(cipher, macSize * 8); + + cMac.Init(keyParam); + + // + // build b0 + // + byte[] b0 = new byte[16]; + + if (HasAssociatedText()) + { + b0[0] |= 0x40; + } + + b0[0] |= (byte)((((cMac.GetMacSize() - 2) / 2) & 0x7) << 3); + + b0[0] |= (byte)(((15 - nonce.Length) - 1) & 0x7); + + Array.Copy(nonce, 0, b0, 1, nonce.Length); + + int q = data.Length; + int count = 1; + while (q > 0) + { + b0[b0.Length - count] = (byte)(q & 0xff); + q >>= 8; + count++; + } + + cMac.BlockUpdate(b0, 0, b0.Length); + + // + // process associated text + // + if (HasAssociatedText()) + { + int extra; + + int textLength = GetAssociatedTextLength(); + if (textLength < ((1 << 16) - (1 << 8))) + { + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 2; + } + else // can't go any higher than 2^32 + { + cMac.Update((byte)0xff); + cMac.Update((byte)0xfe); + cMac.Update((byte)(textLength >> 24)); + cMac.Update((byte)(textLength >> 16)); + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 6; + } + + if (initialAssociatedText != null) + { + cMac.BlockUpdate(initialAssociatedText, 0, initialAssociatedText.Length); + } + if (associatedText.Length > 0) + { + byte[] input = associatedText.GetBuffer(); + int len = Convert.ToInt32(associatedText.Length); + + cMac.BlockUpdate(input, 0, len); + } + + extra = (extra + textLength) % 16; + if (extra != 0) + { + for (int i = extra; i < 16; ++i) + { + cMac.Update((byte)0x00); + } + } + } + + // + // add the text + // + cMac.BlockUpdate(data); + + return cMac.DoFinal(macBlock); + } +#endif + + private int GetMacSize(bool forEncryption, int requestedMacBits) + { + if (forEncryption && (requestedMacBits < 32 || requestedMacBits > 128 || 0 != (requestedMacBits & 15))) + throw new ArgumentException("tag length in octets must be one of {4,6,8,10,12,14,16}"); + + return requestedMacBits >> 3; + } + + private int GetAssociatedTextLength() + { + return Convert.ToInt32(associatedText.Length) + + (initialAssociatedText == null ? 0 : initialAssociatedText.Length); + } + + private bool HasAssociatedText() + { + return GetAssociatedTextLength() > 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs.meta new file mode 100644 index 00000000..46cba0d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8187e045871283546af80d98e405ac4a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CcmBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs new file mode 100644 index 00000000..5090f63c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs @@ -0,0 +1,230 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. + */ + public class CfbBlockCipher + : IBlockCipherMode + { + private byte[] IV; + private byte[] cfbV; + private byte[] cfbOutV; + private bool encrypting; + + private readonly int blockSize; + private readonly IBlockCipher cipher; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * feedback mode. + * @param blockSize the block size in bits (note: a multiple of 8) + */ + public CfbBlockCipher( + IBlockCipher cipher, + int bitBlockSize) + { + if (bitBlockSize < 8 || (bitBlockSize & 7) != 0) + throw new ArgumentException("CFB" + bitBlockSize + " not supported", "bitBlockSize"); + + this.cipher = cipher; + this.blockSize = bitBlockSize / 8; + this.IV = new byte[cipher.GetBlockSize()]; + this.cfbV = new byte[cipher.GetBlockSize()]; + this.cfbOutV = new byte[cipher.GetBlockSize()]; + } + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init( + bool forEncryption, + ICipherParameters parameters) + { + this.encrypting = forEncryption; + if (parameters is ParametersWithIV) + { + ParametersWithIV ivParam = (ParametersWithIV) parameters; + byte[] iv = ivParam.GetIV(); + int diff = IV.Length - iv.Length; + Array.Copy(iv, 0, IV, diff, iv.Length); + Array.Clear(IV, 0, diff); + + parameters = ivParam.Parameters; + } + Reset(); + + // if it's null, key is to be reused. + if (parameters != null) + { + cipher.Init(true, parameters); + } + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/CFB" + * and the block size in bits. + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/CFB" + (blockSize * 8); } + } + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at. + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return blockSize; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return encrypting + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return encrypting + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + return encrypting + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, cfbOutV); + // + // XOR the cfbV with the plaintext producing the ciphertext + // + for (int i = 0; i < blockSize; i++) + { + output[i] = (byte)(cfbOutV[i] ^ input[i]); + } + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + output[..blockSize].CopyTo(cfbV.AsSpan(cfbV.Length - blockSize)); + return blockSize; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, 0, cfbOutV, 0); + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + input[..blockSize].CopyTo(cfbV.AsSpan(cfbV.Length - blockSize)); + // + // XOR the cfbV with the ciphertext producing the plaintext + // + for (int i = 0; i < blockSize; i++) + { + output[i] = (byte)(cfbOutV[i] ^ input[i]); + } + return blockSize; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, 0, cfbOutV, 0); + // + // XOR the cfbV with the plaintext producing the ciphertext + // + for (int i = 0; i < blockSize; i++) + { + outBytes[outOff + i] = (byte)(cfbOutV[i] ^ input[inOff + i]); + } + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + Array.Copy(outBytes, outOff, cfbV, cfbV.Length - blockSize, blockSize); + return blockSize; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + cipher.ProcessBlock(cfbV, 0, cfbOutV, 0); + // + // change over the input block. + // + Array.Copy(cfbV, blockSize, cfbV, 0, cfbV.Length - blockSize); + Array.Copy(input, inOff, cfbV, cfbV.Length - blockSize, blockSize); + // + // XOR the cfbV with the ciphertext producing the plaintext + // + for (int i = 0; i < blockSize; i++) + { + outBytes[outOff + i] = (byte)(cfbOutV[i] ^ input[inOff + i]); + } + return blockSize; + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + Array.Copy(IV, 0, cfbV, 0, IV.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs.meta new file mode 100644 index 00000000..d10d18f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8bbdd28dbb8de4d458aa27f9def26c73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CfbBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs new file mode 100644 index 00000000..03623c38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs @@ -0,0 +1,905 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + public class ChaCha20Poly1305 + : IAeadCipher + { + private enum State + { + Uninitialized = 0, + EncInit = 1, + EncAad = 2, + EncData = 3, + EncFinal = 4, + DecInit = 5, + DecAad = 6, + DecData = 7, + DecFinal = 8, + } + + private const int BufSize = 64; + private const int KeySize = 32; + private const int NonceSize = 12; + private const int MacSize = 16; + private static readonly byte[] Zeroes = new byte[MacSize - 1]; + + private const ulong AadLimit = ulong.MaxValue; + private const ulong DataLimit = ((1UL << 32) - 1) * 64; + + private readonly ChaCha7539Engine mChacha20; + private readonly IMac mPoly1305; + + private readonly byte[] mKey = new byte[KeySize]; + private readonly byte[] mNonce = new byte[NonceSize]; + private readonly byte[] mBuf = new byte[BufSize + MacSize]; + private readonly byte[] mMac = new byte[MacSize]; + + private byte[] mInitialAad; + + private ulong mAadCount; + private ulong mDataCount; + private State mState = State.Uninitialized; + private int mBufPos; + + public ChaCha20Poly1305() + : this(new Poly1305()) + { + } + + public ChaCha20Poly1305(IMac poly1305) + { + if (null == poly1305) + throw new ArgumentNullException("poly1305"); + if (MacSize != poly1305.GetMacSize()) + throw new ArgumentException("must be a 128-bit MAC", "poly1305"); + + this.mChacha20 = new ChaCha7539Engine(); + this.mPoly1305 = poly1305; + } + + public virtual string AlgorithmName + { + get { return "ChaCha20Poly1305"; } + } + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + KeyParameter initKeyParam; + byte[] initNonce; + ICipherParameters chacha20Params; + + if (parameters is AeadParameters) + { + AeadParameters aeadParams = (AeadParameters)parameters; + + int macSizeBits = aeadParams.MacSize; + if ((MacSize * 8) != macSizeBits) + throw new ArgumentException("Invalid value for MAC size: " + macSizeBits); + + initKeyParam = aeadParams.Key; + initNonce = aeadParams.GetNonce(); + chacha20Params = new ParametersWithIV(initKeyParam, initNonce); + + this.mInitialAad = aeadParams.GetAssociatedText(); + } + else if (parameters is ParametersWithIV) + { + ParametersWithIV ivParams = (ParametersWithIV)parameters; + + initKeyParam = (KeyParameter)ivParams.Parameters; + initNonce = ivParams.GetIV(); + chacha20Params = ivParams; + + this.mInitialAad = null; + } + else + { + throw new ArgumentException("invalid parameters passed to ChaCha20Poly1305", "parameters"); + } + + // Validate key + if (null == initKeyParam) + { + if (State.Uninitialized == mState) + throw new ArgumentException("Key must be specified in initial init"); + } + else + { + if (KeySize != initKeyParam.GetKey().Length) + throw new ArgumentException("Key must be 256 bits"); + } + + // Validate nonce + if (null == initNonce || NonceSize != initNonce.Length) + throw new ArgumentException("Nonce must be 96 bits"); + + // Check for encryption with reused nonce + if (State.Uninitialized != mState && forEncryption && Arrays.AreEqual(mNonce, initNonce)) + { + if (null == initKeyParam || Arrays.AreEqual(mKey, initKeyParam.GetKey())) + throw new ArgumentException("cannot reuse nonce for ChaCha20Poly1305 encryption"); + } + + if (null != initKeyParam) + { + Array.Copy(initKeyParam.GetKey(), 0, mKey, 0, KeySize); + } + + Array.Copy(initNonce, 0, mNonce, 0, NonceSize); + + mChacha20.Init(true, chacha20Params); + + this.mState = forEncryption ? State.EncInit : State.DecInit; + + Reset(true, false); + } + + public virtual int GetOutputSize(int len) + { + int total = System.Math.Max(0, len) + mBufPos; + + switch (mState) + { + case State.DecInit: + case State.DecAad: + case State.DecData: + return System.Math.Max(0, total - MacSize); + case State.EncInit: + case State.EncAad: + case State.EncData: + return total + MacSize; + default: + throw new InvalidOperationException(); + } + } + + public virtual int GetUpdateOutputSize(int len) + { + int total = System.Math.Max(0, len) + mBufPos; + + switch (mState) + { + case State.DecInit: + case State.DecAad: + case State.DecData: + total = System.Math.Max(0, total - MacSize); + break; + case State.EncInit: + case State.EncAad: + case State.EncData: + break; + default: + throw new InvalidOperationException(); + } + + return total - (total % BufSize); + } + + public virtual void ProcessAadByte(byte input) + { + CheckAad(); + + this.mAadCount = IncrementCount(mAadCount, 1, AadLimit); + mPoly1305.Update(input); + } + + public virtual void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { + if (null == inBytes) + throw new ArgumentNullException("inBytes"); + if (inOff < 0) + throw new ArgumentException("cannot be negative", "inOff"); + if (len < 0) + throw new ArgumentException("cannot be negative", "len"); + Check.DataLength(inBytes, inOff, len, "input buffer too short"); + + CheckAad(); + + if (len > 0) + { + this.mAadCount = IncrementCount(mAadCount, (uint)len, AadLimit); + mPoly1305.BlockUpdate(inBytes, inOff, len); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + CheckAad(); + + if (!input.IsEmpty) + { + this.mAadCount = IncrementCount(mAadCount, (uint)input.Length, AadLimit); + mPoly1305.BlockUpdate(input); + } + } +#endif + + public virtual int ProcessByte(byte input, byte[] outBytes, int outOff) + { + CheckData(); + + switch (mState) + { + case State.DecData: + { + mBuf[mBufPos] = input; + if (++mBufPos == mBuf.Length) + { + mPoly1305.BlockUpdate(mBuf, 0, BufSize); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlock(mBuf, outBytes.AsSpan(outOff)); +#else + ProcessBlock(mBuf, 0, outBytes, outOff); +#endif + Array.Copy(mBuf, BufSize, mBuf, 0, MacSize); + this.mBufPos = MacSize; + return BufSize; + } + + return 0; + } + case State.EncData: + { + mBuf[mBufPos] = input; + if (++mBufPos == BufSize) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlock(mBuf, outBytes.AsSpan(outOff)); +#else + ProcessBlock(mBuf, 0, outBytes, outOff); +#endif + mPoly1305.BlockUpdate(outBytes, outOff, BufSize); + this.mBufPos = 0; + return BufSize; + } + + return 0; + } + default: + throw new InvalidOperationException(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + CheckData(); + + switch (mState) + { + case State.DecData: + { + mBuf[mBufPos] = input; + if (++mBufPos == mBuf.Length) + { + mPoly1305.BlockUpdate(mBuf.AsSpan(0, BufSize)); + ProcessBlock(mBuf, output); + Array.Copy(mBuf, BufSize, mBuf, 0, MacSize); + this.mBufPos = MacSize; + return BufSize; + } + + return 0; + } + case State.EncData: + { + mBuf[mBufPos] = input; + if (++mBufPos == BufSize) + { + ProcessBlock(mBuf, output); + mPoly1305.BlockUpdate(output[..BufSize]); + this.mBufPos = 0; + return BufSize; + } + + return 0; + } + default: + throw new InvalidOperationException(); + } + } +#endif + + public virtual int ProcessBytes(byte[] inBytes, int inOff, int len, byte[] outBytes, int outOff) + { + if (null == inBytes) + throw new ArgumentNullException("inBytes"); + /* + * Following bc-java, we allow null when no output is expected (e.g. based on a + * GetUpdateOutputSize call). + */ + if (null == outBytes) + { + //throw new ArgumentNullException("outBytes"); + } + if (inOff < 0) + throw new ArgumentException("cannot be negative", "inOff"); + if (len < 0) + throw new ArgumentException("cannot be negative", "len"); + Check.DataLength(inBytes, inOff, len, "input buffer too short"); + if (outOff < 0) + throw new ArgumentException("cannot be negative", "outOff"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(inBytes.AsSpan(inOff, len), Spans.FromNullable(outBytes, outOff)); +#else + CheckData(); + + int resultLen = 0; + + switch (mState) + { + case State.DecData: + { + int available = mBuf.Length - mBufPos; + if (len < available) + { + Array.Copy(inBytes, inOff, mBuf, mBufPos, len); + mBufPos += len; + break; + } + + if (mBufPos >= BufSize) + { + mPoly1305.BlockUpdate(mBuf, 0, BufSize); + ProcessBlock(mBuf, 0, outBytes, outOff); + Array.Copy(mBuf, BufSize, mBuf, 0, mBufPos -= BufSize); + resultLen = BufSize; + + available += BufSize; + if (len < available) + { + Array.Copy(inBytes, inOff, mBuf, mBufPos, len); + mBufPos += len; + break; + } + } + + int inLimit1 = inOff + len - mBuf.Length; + int inLimit2 = inLimit1 - BufSize; + + available = BufSize - mBufPos; + Array.Copy(inBytes, inOff, mBuf, mBufPos, available); + mPoly1305.BlockUpdate(mBuf, 0, BufSize); + ProcessBlock(mBuf, 0, outBytes, outOff + resultLen); + inOff += available; + resultLen += BufSize; + + while (inOff <= inLimit2) + { + mPoly1305.BlockUpdate(inBytes, inOff, BufSize * 2); + ProcessBlocks2(inBytes, inOff, outBytes, outOff + resultLen); + inOff += BufSize * 2; + resultLen += BufSize * 2; + } + + if (inOff <= inLimit1) + { + mPoly1305.BlockUpdate(inBytes, inOff, BufSize); + ProcessBlock(inBytes, inOff, outBytes, outOff + resultLen); + inOff += BufSize; + resultLen += BufSize; + } + + mBufPos = mBuf.Length + inLimit1 - inOff; + Array.Copy(inBytes, inOff, mBuf, 0, mBufPos); + break; + } + case State.EncData: + { + int available = BufSize - mBufPos; + if (len < available) + { + Array.Copy(inBytes, inOff, mBuf, mBufPos, len); + mBufPos += len; + break; + } + + int inLimit1 = inOff + len - BufSize; + int inLimit2 = inLimit1 - BufSize; + + if (mBufPos > 0) + { + Array.Copy(inBytes, inOff, mBuf, mBufPos, available); + ProcessBlock(mBuf, 0, outBytes, outOff); + inOff += available; + resultLen = BufSize; + } + + while (inOff <= inLimit2) + { + ProcessBlocks2(inBytes, inOff, outBytes, outOff + resultLen); + inOff += BufSize * 2; + resultLen += BufSize * 2; + } + + if (inOff <= inLimit1) + { + ProcessBlock(inBytes, inOff, outBytes, outOff + resultLen); + inOff += BufSize; + resultLen += BufSize; + } + + mPoly1305.BlockUpdate(outBytes, outOff, resultLen); + + mBufPos = BufSize + inLimit1 - inOff; + Array.Copy(inBytes, inOff, mBuf, 0, mBufPos); + break; + } + default: + throw new InvalidOperationException(); + } + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + CheckData(); + + int resultLen = 0; + + switch (mState) + { + case State.DecData: + { + int available = mBuf.Length - mBufPos; + if (input.Length < available) + { + input.CopyTo(mBuf.AsSpan(mBufPos)); + mBufPos += input.Length; + break; + } + + if (mBufPos >= BufSize) + { + mPoly1305.BlockUpdate(mBuf.AsSpan(0, BufSize)); + ProcessBlock(mBuf, output); + Array.Copy(mBuf, BufSize, mBuf, 0, mBufPos -= BufSize); + resultLen = BufSize; + + available += BufSize; + if (input.Length < available) + { + input.CopyTo(mBuf.AsSpan(mBufPos)); + mBufPos += input.Length; + break; + } + } + + int inLimit1 = mBuf.Length; + int inLimit2 = inLimit1 + BufSize; + + available = BufSize - mBufPos; + input[..available].CopyTo(mBuf.AsSpan(mBufPos)); + mPoly1305.BlockUpdate(mBuf.AsSpan(0, BufSize)); + ProcessBlock(mBuf, output[resultLen..]); + input = input[available..]; + resultLen += BufSize; + + while (input.Length >= inLimit2) + { + mPoly1305.BlockUpdate(input[..(BufSize * 2)]); + ProcessBlocks2(input, output[resultLen..]); + input = input[(BufSize * 2)..]; + resultLen += BufSize * 2; + } + + if (input.Length >= inLimit1) + { + mPoly1305.BlockUpdate(input[..BufSize]); + ProcessBlock(input, output[resultLen..]); + input = input[BufSize..]; + resultLen += BufSize; + } + + mBufPos = input.Length; + input.CopyTo(mBuf); + break; + } + case State.EncData: + { + int available = BufSize - mBufPos; + if (input.Length < available) + { + input.CopyTo(mBuf.AsSpan(mBufPos)); + mBufPos += input.Length; + break; + } + + if (mBufPos > 0) + { + input[..available].CopyTo(mBuf.AsSpan(mBufPos)); + ProcessBlock(mBuf, output); + input = input[available..]; + resultLen = BufSize; + } + + while (input.Length >= BufSize * 2) + { + ProcessBlocks2(input, output[resultLen..]); + input = input[(BufSize * 2)..]; + resultLen += BufSize * 2; + } + + if (input.Length >= BufSize) + { + ProcessBlock(input, output[resultLen..]); + input = input[BufSize..]; + resultLen += BufSize; + } + + mPoly1305.BlockUpdate(output[..resultLen]); + + mBufPos = input.Length; + input.CopyTo(mBuf); + break; + } + default: + throw new InvalidOperationException(); + } + + return resultLen; + } +#endif + + public virtual int DoFinal(byte[] outBytes, int outOff) + { + if (null == outBytes) + throw new ArgumentNullException("outBytes"); + if (outOff < 0) + throw new ArgumentException("cannot be negative", "outOff"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(outBytes.AsSpan(outOff)); +#else + CheckData(); + + Array.Clear(mMac, 0, MacSize); + + int resultLen = 0; + + switch (mState) + { + case State.DecData: + { + if (mBufPos < MacSize) + throw new InvalidCipherTextException("data too short"); + + resultLen = mBufPos - MacSize; + + Check.OutputLength(outBytes, outOff, resultLen, "output buffer too short"); + + if (resultLen > 0) + { + mPoly1305.BlockUpdate(mBuf, 0, resultLen); + ProcessData(mBuf, 0, resultLen, outBytes, outOff); + } + + FinishData(State.DecFinal); + + if (!Arrays.ConstantTimeAreEqual(MacSize, mMac, 0, mBuf, resultLen)) + throw new InvalidCipherTextException("mac check in ChaCha20Poly1305 failed"); + + break; + } + case State.EncData: + { + resultLen = mBufPos + MacSize; + + Check.OutputLength(outBytes, outOff, resultLen, "output buffer too short"); + + if (mBufPos > 0) + { + ProcessData(mBuf, 0, mBufPos, outBytes, outOff); + mPoly1305.BlockUpdate(outBytes, outOff, mBufPos); + } + + FinishData(State.EncFinal); + + Array.Copy(mMac, 0, outBytes, outOff + mBufPos, MacSize); + break; + } + default: + throw new InvalidOperationException(); + } + + Reset(false, true); + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + CheckData(); + + Array.Clear(mMac, 0, MacSize); + + int resultLen = 0; + + switch (mState) + { + case State.DecData: + { + if (mBufPos < MacSize) + throw new InvalidCipherTextException("data too short"); + + resultLen = mBufPos - MacSize; + + Check.OutputLength(output, resultLen, "output buffer too short"); + + if (resultLen > 0) + { + mPoly1305.BlockUpdate(mBuf, 0, resultLen); + ProcessData(mBuf.AsSpan(0, resultLen), output); + } + + FinishData(State.DecFinal); + + if (!Arrays.ConstantTimeAreEqual(MacSize, mMac, 0, mBuf, resultLen)) + throw new InvalidCipherTextException("mac check in ChaCha20Poly1305 failed"); + + break; + } + case State.EncData: + { + resultLen = mBufPos + MacSize; + + Check.OutputLength(output, resultLen, "output buffer too short"); + + if (mBufPos > 0) + { + ProcessData(mBuf.AsSpan(0, mBufPos), output); + mPoly1305.BlockUpdate(output[..mBufPos]); + } + + FinishData(State.EncFinal); + + mMac.AsSpan(0, MacSize).CopyTo(output[mBufPos..]); + break; + } + default: + throw new InvalidOperationException(); + } + + Reset(false, true); + + return resultLen; + } +#endif + + public virtual byte[] GetMac() + { + return Arrays.Clone(mMac); + } + + public virtual void Reset() + { + Reset(true, true); + } + + private void CheckAad() + { + switch (mState) + { + case State.DecInit: + this.mState = State.DecAad; + break; + case State.EncInit: + this.mState = State.EncAad; + break; + case State.DecAad: + case State.EncAad: + break; + case State.EncFinal: + throw new InvalidOperationException("ChaCha20Poly1305 cannot be reused for encryption"); + default: + throw new InvalidOperationException(); + } + } + + private void CheckData() + { + switch (mState) + { + case State.DecInit: + case State.DecAad: + FinishAad(State.DecData); + break; + case State.EncInit: + case State.EncAad: + FinishAad(State.EncData); + break; + case State.DecData: + case State.EncData: + break; + case State.EncFinal: + throw new InvalidOperationException("ChaCha20Poly1305 cannot be reused for encryption"); + default: + throw new InvalidOperationException(); + } + } + + private void FinishAad(State nextState) + { + PadMac(mAadCount); + + this.mState = nextState; + } + + private void FinishData(State nextState) + { + PadMac(mDataCount); + + byte[] lengths = new byte[16]; + Pack.UInt64_To_LE(mAadCount, lengths, 0); + Pack.UInt64_To_LE(mDataCount, lengths, 8); + mPoly1305.BlockUpdate(lengths, 0, 16); + + mPoly1305.DoFinal(mMac, 0); + + this.mState = nextState; + } + + private ulong IncrementCount(ulong count, uint increment, ulong limit) + { + if (count > (limit - increment)) + throw new InvalidOperationException ("Limit exceeded"); + + return count + increment; + } + + private void InitMac() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span firstBlock = stackalloc byte[64]; + try + { + mChacha20.ProcessBytes(firstBlock, firstBlock); + mPoly1305.Init(new KeyParameter(firstBlock[..32])); + } + finally + { + firstBlock.Fill(0x00); + } +#else + byte[] firstBlock = new byte[64]; + try + { + mChacha20.ProcessBytes(firstBlock, 0, 64, firstBlock, 0); + mPoly1305.Init(new KeyParameter(firstBlock, 0, 32)); + } + finally + { + Array.Clear(firstBlock, 0, 64); + } +#endif + } + + private void PadMac(ulong count) + { + int partial = (int)count & (MacSize - 1); + if (0 != partial) + { + mPoly1305.BlockUpdate(Zeroes, 0, MacSize - partial); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void ProcessBlock(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, 64, "output buffer too short"); + + mChacha20.ProcessBlock(input, output); + + this.mDataCount = IncrementCount(mDataCount, 64U, DataLimit); + } + + private void ProcessBlocks2(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, 128, "output buffer too short"); + + mChacha20.ProcessBlocks2(input, output); + + this.mDataCount = IncrementCount(mDataCount, 128U, DataLimit); + } + + private void ProcessData(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + mChacha20.ProcessBytes(input, output); + + this.mDataCount = IncrementCount(mDataCount, (uint)input.Length, DataLimit); + } +#else + private void ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + Check.OutputLength(outBytes, outOff, 64, "output buffer too short"); + + mChacha20.ProcessBlock(inBytes, inOff, outBytes, outOff); + + this.mDataCount = IncrementCount(mDataCount, 64U, DataLimit); + } + + private void ProcessBlocks2(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + Check.OutputLength(outBytes, outOff, 128, "output buffer too short"); + + mChacha20.ProcessBlocks2(inBytes, inOff, outBytes, outOff); + + this.mDataCount = IncrementCount(mDataCount, 128U, DataLimit); + } + + private void ProcessData(byte[] inBytes, int inOff, int inLen, byte[] outBytes, int outOff) + { + Check.OutputLength(outBytes, outOff, inLen, "output buffer too short"); + + mChacha20.ProcessBytes(inBytes, inOff, inLen, outBytes, outOff); + + this.mDataCount = IncrementCount(mDataCount, (uint)inLen, DataLimit); + } +#endif + + private void Reset(bool clearMac, bool resetCipher) + { + Array.Clear(mBuf, 0, mBuf.Length); + + if (clearMac) + { + Array.Clear(mMac, 0, mMac.Length); + } + + this.mAadCount = 0UL; + this.mDataCount = 0UL; + this.mBufPos = 0; + + switch (mState) + { + case State.DecInit: + case State.EncInit: + break; + case State.DecAad: + case State.DecData: + case State.DecFinal: + this.mState = State.DecInit; + break; + case State.EncAad: + case State.EncData: + case State.EncFinal: + this.mState = State.EncFinal; + return; + default: + throw new InvalidOperationException(); + } + + if (resetCipher) + { + mChacha20.Reset(); + } + + InitMac(); + + if (null != mInitialAad) + { + ProcessAadBytes(mInitialAad, 0, mInitialAad.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs.meta new file mode 100644 index 00000000..d7f4e1ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2cd8d80304a90214292a351a3fe3e2b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/ChaCha20Poly1305.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs new file mode 100644 index 00000000..faed9cda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs @@ -0,0 +1,353 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to + * be used to produce cipher text which is the same outLength as the plain text. + */ + public class CtsBlockCipher + : BufferedBlockCipher + { + private readonly int blockSize; + + public CtsBlockCipher(IBlockCipher cipher) + : this(EcbBlockCipher.GetBlockCipherMode(cipher)) + { + } + + /** + * Create a buffered block cipher that uses Cipher Text Stealing + * + * @param cipher the underlying block cipher this buffering object wraps. + */ + public CtsBlockCipher(IBlockCipherMode cipherMode) + { + if (!(cipherMode is CbcBlockCipher || cipherMode is EcbBlockCipher)) + throw new ArgumentException("CtsBlockCipher can only accept ECB, or CBC ciphers"); + + m_cipherMode = cipherMode; + + blockSize = cipherMode.GetBlockSize(); + + buf = new byte[blockSize * 2]; + bufOff = 0; + } + + /** + * return the size of the output buffer required for an update of 'length' bytes. + * + * @param length the outLength of the input. + * @return the space required to accommodate a call to update + * with length bytes of input. + */ + public override int GetUpdateOutputSize( + int length) + { + int total = length + bufOff; + int leftOver = total % buf.Length; + + if (leftOver == 0) + { + return total - buf.Length; + } + + return total - leftOver; + } + + /** + * return the size of the output buffer required for an update plus a + * doFinal with an input of length bytes. + * + * @param length the outLength of the input. + * @return the space required to accommodate a call to update and doFinal + * with length bytes of input. + */ + public override int GetOutputSize( + int length) + { + return length + bufOff; + } + + /** + * process a single byte, producing an output block if necessary. + * + * @param in the input byte. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessByte(byte input, byte[] output, int outOff) + { + int resultLen = 0; + + if (bufOff == buf.Length) + { + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + Debug.Assert(resultLen == blockSize); + + Array.Copy(buf, blockSize, buf, 0, blockSize); + bufOff = blockSize; + } + + buf[bufOff++] = input; + + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + int resultLen = 0; + + if (bufOff == buf.Length) + { + resultLen = m_cipherMode.ProcessBlock(buf, output); + Debug.Assert(resultLen == blockSize); + + Array.Copy(buf, blockSize, buf, 0, blockSize); + bufOff = blockSize; + } + + buf[bufOff++] = input; + + return resultLen; + } +#endif + + /** + * process an array of bytes, producing output if necessary. + * + * @param in the input byte array. + * @param inOff the offset at which the input data starts. + * @param length the number of bytes to be copied out of the input array. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff) + { + if (length < 0) + throw new ArgumentException("Can't have a negative input length!"); + + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(length); + + if (outLength > 0) + { + Check.OutputLength(output, outOff, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + + if (length > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + Array.Copy(buf, blockSize, buf, 0, blockSize); + + bufOff = blockSize; + + length -= gapLen; + inOff += gapLen; + + while (length > blockSize) + { + Array.Copy(input, inOff, buf, bufOff, blockSize); + resultLen += m_cipherMode.ProcessBlock(buf, 0, output, outOff + resultLen); + Array.Copy(buf, blockSize, buf, 0, blockSize); + + length -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, length); + + bufOff += length; + + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(input.Length); + + if (outLength > 0) + { + Check.OutputLength(output, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + resultLen = m_cipherMode.ProcessBlock(buf, output); + Array.Copy(buf, blockSize, buf, 0, blockSize); + + bufOff = blockSize; + + input = input[gapLen..]; + + while (input.Length > blockSize) + { + input[..blockSize].CopyTo(buf.AsSpan(bufOff)); + resultLen += m_cipherMode.ProcessBlock(buf, output[resultLen..]); + Array.Copy(buf, blockSize, buf, 0, blockSize); + + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + + return resultLen; + } +#endif + + /** + * Process the last block in the buffer. + * + * @param out the array the block currently being held is copied into. + * @param outOff the offset at which the copying starts. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there is insufficient space in out for + * the output. + * @exception InvalidOperationException if the underlying cipher is not + * initialised. + * @exception InvalidCipherTextException if cipher text decrypts wrongly (in + * case the exception will never Get thrown). + */ + public override int DoFinal(byte[] output, int outOff) + { + if (bufOff + outOff > output.Length) + throw new DataLengthException("output buffer too small in DoFinal"); + + int blockSize = m_cipherMode.GetBlockSize(); + int length = bufOff - blockSize; + byte[] block = new byte[blockSize]; + + if (forEncryption) + { + m_cipherMode.ProcessBlock(buf, 0, block, 0); + + if (bufOff < blockSize) + throw new DataLengthException("need at least one block of input for CTS"); + + for (int i = bufOff; i != buf.Length; i++) + { + buf[i] = block[i - blockSize]; + } + + for (int i = blockSize; i != bufOff; i++) + { + buf[i] ^= block[i - blockSize]; + } + + m_cipherMode.UnderlyingCipher.ProcessBlock(buf, blockSize, output, outOff); + + Array.Copy(block, 0, output, outOff + blockSize, length); + } + else + { + byte[] lastBlock = new byte[blockSize]; + + m_cipherMode.UnderlyingCipher.ProcessBlock(buf, 0, block, 0); + + for (int i = blockSize; i != bufOff; i++) + { + lastBlock[i - blockSize] = (byte)(block[i - blockSize] ^ buf[i]); + } + + Array.Copy(buf, blockSize, block, 0, length); + + m_cipherMode.ProcessBlock(block, 0, output, outOff); + Array.Copy(lastBlock, 0, output, outOff + blockSize, length); + } + + int offset = bufOff; + + Reset(); + + return offset; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + if (bufOff > output.Length) + throw new DataLengthException("output buffer too small in DoFinal"); + + int blockSize = m_cipherMode.GetBlockSize(); + int length = bufOff - blockSize; + Span block = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + if (forEncryption) + { + m_cipherMode.ProcessBlock(buf, block); + + if (bufOff < blockSize) + throw new DataLengthException("need at least one block of input for CTS"); + + for (int i = bufOff; i != buf.Length; i++) + { + buf[i] = block[i - blockSize]; + } + + for (int i = blockSize; i != bufOff; i++) + { + buf[i] ^= block[i - blockSize]; + } + + m_cipherMode.UnderlyingCipher.ProcessBlock(buf.AsSpan(blockSize), output); + + block[..length].CopyTo(output[blockSize..]); + } + else + { + Span lastBlock = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + m_cipherMode.UnderlyingCipher.ProcessBlock(buf, block); + + for (int i = blockSize; i != bufOff; i++) + { + lastBlock[i - blockSize] = (byte)(block[i - blockSize] ^ buf[i]); + } + + buf.AsSpan(blockSize, length).CopyTo(block); + + m_cipherMode.ProcessBlock(block, output); + lastBlock[..length].CopyTo(output[blockSize..]); + } + + int offset = bufOff; + + Reset(); + + return offset; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs.meta new file mode 100644 index 00000000..64975e0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e40dd04cc8a1228489faa2810ffae5c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/CtsBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs new file mode 100644 index 00000000..fd193c30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs @@ -0,0 +1,506 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and + * Efficiency - by M. Bellare, P. Rogaway, D. Wagner. + * + * http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf + * + * EAX is an AEAD scheme based on CTR and OMAC1/CMAC, that uses a single block + * cipher to encrypt and authenticate data. It's on-line (the length of a + * message isn't needed to begin processing it), has good performances, it's + * simple and provably secure (provided the underlying block cipher is secure). + * + * Of course, this implementations is NOT thread-safe. + */ + public class EaxBlockCipher + : IAeadBlockCipher + { + private enum Tag : byte { N, H, C }; + + private SicBlockCipher cipher; + + private bool forEncryption; + + private int blockSize; + + private IMac mac; + + private byte[] nonceMac; + private byte[] associatedTextMac; + private byte[] macBlock; + + private int macSize; + private byte[] bufBlock; + private int bufOff; + + private bool cipherInitialized; + private byte[] initialAssociatedText; + + /** + * Constructor that accepts an instance of a block cipher engine. + * + * @param cipher the engine to use + */ + public EaxBlockCipher( + IBlockCipher cipher) + { + blockSize = cipher.GetBlockSize(); + mac = new CMac(cipher); + macBlock = new byte[blockSize]; + associatedTextMac = new byte[mac.GetMacSize()]; + nonceMac = new byte[mac.GetMacSize()]; + this.cipher = new SicBlockCipher(cipher); + } + + public virtual string AlgorithmName => cipher.UnderlyingCipher.AlgorithmName + "/EAX"; + + public virtual IBlockCipher UnderlyingCipher => cipher; + + public virtual int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + byte[] nonce; + ICipherParameters keyParam; + + if (parameters is AeadParameters aeadParameters) + { + nonce = aeadParameters.GetNonce(); + initialAssociatedText = aeadParameters.GetAssociatedText(); + macSize = aeadParameters.MacSize / 8; + keyParam = aeadParameters.Key; + } + else if (parameters is ParametersWithIV parametersWithIV) + { + nonce = parametersWithIV.GetIV(); + initialAssociatedText = null; + macSize = mac.GetMacSize() / 2; + keyParam = parametersWithIV.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to EAX"); + } + + bufBlock = new byte[forEncryption ? blockSize : (blockSize + macSize)]; + + byte[] tag = new byte[blockSize]; + + // Key reuse implemented in CBC mode of underlying CMac + mac.Init(keyParam); + + tag[blockSize - 1] = (byte)Tag.N; + mac.BlockUpdate(tag, 0, blockSize); + mac.BlockUpdate(nonce, 0, nonce.Length); + mac.DoFinal(nonceMac, 0); + + // Same BlockCipher underlies this and the mac, so reuse last key on cipher + cipher.Init(true, new ParametersWithIV(null, nonceMac)); + + Reset(); + } + + private void InitCipher() + { + if (cipherInitialized) + { + return; + } + + cipherInitialized = true; + + mac.DoFinal(associatedTextMac, 0); + + byte[] tag = new byte[blockSize]; + tag[blockSize - 1] = (byte)Tag.C; + mac.BlockUpdate(tag, 0, blockSize); + } + + private void CalculateMac() + { + byte[] outC = new byte[blockSize]; + mac.DoFinal(outC, 0); + + for (int i = 0; i < macBlock.Length; i++) + { + macBlock[i] = (byte)(nonceMac[i] ^ associatedTextMac[i] ^ outC[i]); + } + } + + public virtual void Reset() + { + Reset(true); + } + + private void Reset( + bool clearMac) + { + cipher.Reset(); // TODO Redundant since the mac will reset it? + mac.Reset(); + + bufOff = 0; + Array.Clear(bufBlock, 0, bufBlock.Length); + + if (clearMac) + { + Array.Clear(macBlock, 0, macBlock.Length); + } + + byte[] tag = new byte[blockSize]; + tag[blockSize - 1] = (byte)Tag.H; + mac.BlockUpdate(tag, 0, blockSize); + + cipherInitialized = false; + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + public virtual void ProcessAadByte(byte input) + { + if (cipherInitialized) + { + throw new InvalidOperationException("AAD data cannot be added after encryption/decryption processing has begun."); + } + mac.Update(input); + } + + public virtual void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { + if (cipherInitialized) + throw new InvalidOperationException("AAD data cannot be added after encryption/decryption processing has begun."); + + mac.BlockUpdate(inBytes, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + if (cipherInitialized) + throw new InvalidOperationException("AAD data cannot be added after encryption/decryption processing has begun."); + + mac.BlockUpdate(input); + } +#endif + + public virtual int ProcessByte(byte input, byte[] outBytes, int outOff) + { + InitCipher(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Process(input, Spans.FromNullable(outBytes, outOff)); +#else + return Process(input, outBytes, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + InitCipher(); + + return Process(input, output); + } +#endif + + public virtual int ProcessBytes(byte[] inBytes, int inOff, int len, byte[] outBytes, int outOff) + { + InitCipher(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(inBytes.AsSpan(inOff, len), Spans.FromNullable(outBytes, outOff)); +#else + int resultLen = 0; + + for (int i = 0; i != len; i++) + { + resultLen += Process(inBytes[inOff + i], outBytes, outOff + resultLen); + } + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + InitCipher(); + + int len = input.Length; + int resultLen = 0; + + for (int i = 0; i != len; i++) + { + resultLen += Process(input[i], output[resultLen..]); + } + + return resultLen; + } +#endif + + public virtual int DoFinal(byte[] outBytes, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(outBytes.AsSpan(outOff)); +#else + InitCipher(); + + int extra = bufOff; + byte[] tmp = new byte[bufBlock.Length]; + + bufOff = 0; + + if (forEncryption) + { + Check.OutputLength(outBytes, outOff, extra + macSize, "output buffer too short"); + + cipher.ProcessBlock(bufBlock, 0, tmp, 0); + + Array.Copy(tmp, 0, outBytes, outOff, extra); + + mac.BlockUpdate(tmp, 0, extra); + + CalculateMac(); + + Array.Copy(macBlock, 0, outBytes, outOff + extra, macSize); + + Reset(false); + + return extra + macSize; + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + Check.OutputLength(outBytes, outOff, extra - macSize, "output buffer too short"); + + if (extra > macSize) + { + mac.BlockUpdate(bufBlock, 0, extra - macSize); + + cipher.ProcessBlock(bufBlock, 0, tmp, 0); + + Array.Copy(tmp, 0, outBytes, outOff, extra - macSize); + } + + CalculateMac(); + + if (!VerifyMac(bufBlock, extra - macSize)) + throw new InvalidCipherTextException("mac check in EAX failed"); + + Reset(false); + + return extra - macSize; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + InitCipher(); + + int extra = bufOff; + int tmpLength = bufBlock.Length; + + Span tmp = tmpLength <= 128 + ? stackalloc byte[tmpLength] + : new byte[tmpLength]; + + bufOff = 0; + + if (forEncryption) + { + Check.OutputLength(output, extra + macSize, "output buffer too short"); + + cipher.ProcessBlock(bufBlock, tmp); + + tmp[..extra].CopyTo(output); + + mac.BlockUpdate(tmp[..extra]); + + CalculateMac(); + + macBlock.AsSpan(0, macSize).CopyTo(output[extra..]); + + Reset(false); + + return extra + macSize; + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + Check.OutputLength(output, extra - macSize, "output buffer too short"); + + if (extra > macSize) + { + mac.BlockUpdate(bufBlock.AsSpan(0, extra - macSize)); + + cipher.ProcessBlock(bufBlock, tmp); + + tmp[..(extra - macSize)].CopyTo(output); + } + + CalculateMac(); + + if (!VerifyMac(bufBlock, extra - macSize)) + throw new InvalidCipherTextException("mac check in EAX failed"); + + Reset(false); + + return extra - macSize; + } + } +#endif + + public virtual byte[] GetMac() + { + byte[] mac = new byte[macSize]; + + Array.Copy(macBlock, 0, mac, 0, macSize); + + return mac; + } + + public virtual int GetUpdateOutputSize( + int len) + { + int totalData = len + bufOff; + if (!forEncryption) + { + if (totalData < macSize) + { + return 0; + } + totalData -= macSize; + } + return totalData - totalData % blockSize; + } + + public virtual int GetOutputSize( + int len) + { + int totalData = len + bufOff; + + if (forEncryption) + { + return totalData + macSize; + } + + return totalData < macSize ? 0 : totalData - macSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int Process(byte b, Span output) + { + bufBlock[bufOff++] = b; + + if (bufOff == bufBlock.Length) + { + Check.OutputLength(output, blockSize, "output buffer too short"); + + // TODO Could move the ProcessByte(s) calls to here + //InitCipher(); + + int size; + + if (forEncryption) + { + size = cipher.ProcessBlock(bufBlock, output); + + mac.BlockUpdate(output[..blockSize]); + } + else + { + mac.BlockUpdate(bufBlock.AsSpan(0, blockSize)); + + size = cipher.ProcessBlock(bufBlock, output); + } + + bufOff = 0; + if (!forEncryption) + { + Array.Copy(bufBlock, blockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + + return size; + } + + return 0; + } +#else + private int Process(byte b, byte[] outBytes, int outOff) + { + bufBlock[bufOff++] = b; + + if (bufOff == bufBlock.Length) + { + Check.OutputLength(outBytes, outOff, blockSize, "Output buffer is too short"); + + // TODO Could move the ProcessByte(s) calls to here +// InitCipher(); + + int size; + + if (forEncryption) + { + size = cipher.ProcessBlock(bufBlock, 0, outBytes, outOff); + + mac.BlockUpdate(outBytes, outOff, blockSize); + } + else + { + mac.BlockUpdate(bufBlock, 0, blockSize); + + size = cipher.ProcessBlock(bufBlock, 0, outBytes, outOff); + } + + bufOff = 0; + if (!forEncryption) + { + Array.Copy(bufBlock, blockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + + return size; + } + + return 0; + } +#endif + + private bool VerifyMac(byte[] mac, int off) + { + int nonEqual = 0; + + for (int i = 0; i < macSize; i++) + { + nonEqual |= (macBlock[i] ^ mac[off + i]); + } + + return nonEqual == 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs.meta new file mode 100644 index 00000000..6d868f7a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 611d91847a15dff4ebc2fe9f3326559f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EAXBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs new file mode 100644 index 00000000..665138c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + public class EcbBlockCipher + : IBlockCipherMode + { + internal static IBlockCipherMode GetBlockCipherMode(IBlockCipher blockCipher) + { + if (blockCipher is IBlockCipherMode blockCipherMode) + return blockCipherMode; + + return new EcbBlockCipher(blockCipher); + } + + private readonly IBlockCipher m_cipher; + + public EcbBlockCipher(IBlockCipher cipher) + { + if (cipher == null) + throw new ArgumentNullException(nameof(cipher)); + + m_cipher = cipher; + } + + public bool IsPartialBlockOkay => false; + + public string AlgorithmName => m_cipher.AlgorithmName + "/ECB"; + + public int GetBlockSize() + { + return m_cipher.GetBlockSize(); + } + + public IBlockCipher UnderlyingCipher => m_cipher; + + public void Init(bool forEncryption, ICipherParameters parameters) + { + m_cipher.Init(forEncryption, parameters); + } + + public int ProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + return m_cipher.ProcessBlock(inBuf, inOff, outBuf, outOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + return m_cipher.ProcessBlock(input, output); + } +#endif + + public void Reset() + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs.meta new file mode 100644 index 00000000..912b1e0a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 50e8f0b9b9ecb034bb7aad3b1fb61e75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/EcbBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs new file mode 100644 index 00000000..004e124c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs @@ -0,0 +1,1505 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /// + /// Implements the Galois/Counter mode (GCM) detailed in NIST Special Publication 800-38D. + /// + public sealed class GcmBlockCipher + : IAeadBlockCipher + { + private static IGcmMultiplier CreateGcmMultiplier() + { +#if NETCOREAPP3_0_OR_GREATER + // TODO Prefer more tightly coupled test + if (Pclmulqdq.IsSupported) + { + return new BasicGcmMultiplier(); + } +#endif + + return new Tables4kGcmMultiplier(); + } + + private const int BlockSize = 16; + byte[] ctrBlock = new byte[BlockSize]; + + private readonly IBlockCipher cipher; + private readonly IGcmMultiplier multiplier; + private IGcmExponentiator exp; + + // These fields are set by Init and not modified by processing + private bool forEncryption; + private bool initialised; + private int macSize; + private byte[] lastKey; + private byte[] nonce; + private byte[] initialAssociatedText; + private byte[] H; + private byte[] J0; + + // These fields are modified during processing + private byte[] bufBlock; + private byte[] macBlock; + private byte[] S, S_at, S_atPre; + private byte[] counter; + private uint counter32; + private uint blocksRemaining; + private int bufOff; + private ulong totalLength; + private byte[] atBlock; + private int atBlockPos; + private ulong atLength; + private ulong atLengthPre; + + public GcmBlockCipher( + IBlockCipher c) + : this(c, null) + { + } + + public GcmBlockCipher( + IBlockCipher c, + IGcmMultiplier m) + { + if (c.GetBlockSize() != BlockSize) + throw new ArgumentException("cipher required with a block size of " + BlockSize + "."); + + if (m == null) + { + m = CreateGcmMultiplier(); + } + + this.cipher = c; + this.multiplier = m; + } + + public string AlgorithmName => cipher.AlgorithmName + "/GCM"; + + public IBlockCipher UnderlyingCipher => cipher; + + public int GetBlockSize() + { + return BlockSize; + } + + /// + /// MAC sizes from 32 bits to 128 bits (must be a multiple of 8) are supported. The default is 128 bits. + /// Sizes less than 96 are not recommended, but are supported for specialized applications. + /// + public void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + this.macBlock = null; + this.initialised = true; + + KeyParameter keyParam; + byte[] newNonce; + + if (parameters is AeadParameters) + { + AeadParameters param = (AeadParameters)parameters; + + newNonce = param.GetNonce(); + initialAssociatedText = param.GetAssociatedText(); + + int macSizeBits = param.MacSize; + if (macSizeBits < 32 || macSizeBits > 128 || macSizeBits % 8 != 0) + { + throw new ArgumentException("Invalid value for MAC size: " + macSizeBits); + } + + macSize = macSizeBits / 8; + keyParam = param.Key; + } + else if (parameters is ParametersWithIV) + { + ParametersWithIV param = (ParametersWithIV)parameters; + + newNonce = param.GetIV(); + initialAssociatedText = null; + macSize = 16; + keyParam = (KeyParameter)param.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to GCM"); + } + + int bufLength = forEncryption ? BlockSize : (BlockSize + macSize); + this.bufBlock = new byte[bufLength]; + + if (newNonce == null || newNonce.Length < 1) + { + throw new ArgumentException("IV must be at least 1 byte"); + } + + if (forEncryption) + { + if (nonce != null && Arrays.AreEqual(nonce, newNonce)) + { + if (keyParam == null) + { + throw new ArgumentException("cannot reuse nonce for GCM encryption"); + } + if (lastKey != null && Arrays.AreEqual(lastKey, keyParam.GetKey())) + { + throw new ArgumentException("cannot reuse nonce for GCM encryption"); + } + } + } + + nonce = newNonce; + if (keyParam != null) + { + lastKey = keyParam.GetKey(); + } + + // TODO Restrict macSize to 16 if nonce length not 12? + + // Cipher always used in forward mode + // if keyParam is null we're reusing the last key. + if (keyParam != null) + { + cipher.Init(true, keyParam); + + this.H = new byte[BlockSize]; + cipher.ProcessBlock(H, 0, H, 0); + + // if keyParam is null we're reusing the last key and the multiplier doesn't need re-init + multiplier.Init(H); + exp = null; + } + else if (this.H == null) + { + throw new ArgumentException("Key must be specified in initial init"); + } + + this.J0 = new byte[BlockSize]; + + if (nonce.Length == 12) + { + Array.Copy(nonce, 0, J0, 0, nonce.Length); + this.J0[BlockSize - 1] = 0x01; + } + else + { + gHASH(J0, nonce, nonce.Length); + byte[] X = new byte[BlockSize]; + Pack.UInt64_To_BE((ulong)nonce.Length * 8UL, X, 8); + gHASHBlock(J0, X); + } + + this.S = new byte[BlockSize]; + this.S_at = new byte[BlockSize]; + this.S_atPre = new byte[BlockSize]; + this.atBlock = new byte[BlockSize]; + this.atBlockPos = 0; + this.atLength = 0; + this.atLengthPre = 0; + this.counter = Arrays.Clone(J0); + this.counter32 = Pack.BE_To_UInt32(counter, 12); + this.blocksRemaining = uint.MaxValue - 1; // page 8, len(P) <= 2^39 - 256, 1 block used by tag + this.bufOff = 0; + this.totalLength = 0; + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + public byte[] GetMac() + { + return macBlock == null + ? new byte[macSize] + : Arrays.Clone(macBlock); + } + + public int GetOutputSize(int len) + { + int totalData = len + bufOff; + + if (forEncryption) + { + return totalData + macSize; + } + + return totalData < macSize ? 0 : totalData - macSize; + } + + public int GetUpdateOutputSize(int len) + { + int totalData = len + bufOff; + if (!forEncryption) + { + if (totalData < macSize) + { + return 0; + } + totalData -= macSize; + } + return totalData - totalData % BlockSize; + } + + public void ProcessAadByte(byte input) + { + CheckStatus(); + + atBlock[atBlockPos] = input; + if (++atBlockPos == BlockSize) + { + // Hash each block as it fills + gHASHBlock(S_at, atBlock); + atBlockPos = 0; + atLength += BlockSize; + } + } + + public void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessAadBytes(inBytes.AsSpan(inOff, len)); +#else + CheckStatus(); + + if (atBlockPos > 0) + { + int available = BlockSize - atBlockPos; + if (len < available) + { + Array.Copy(inBytes, inOff, atBlock, atBlockPos, len); + atBlockPos += len; + return; + } + + Array.Copy(inBytes, inOff, atBlock, atBlockPos, available); + gHASHBlock(S_at, atBlock); + atLength += BlockSize; + inOff += available; + len -= available; + //atBlockPos = 0; + } + + int inLimit = inOff + len - BlockSize; + + while (inOff <= inLimit) + { + gHASHBlock(S_at, inBytes, inOff); + atLength += BlockSize; + inOff += BlockSize; + } + + atBlockPos = BlockSize + inLimit - inOff; + Array.Copy(inBytes, inOff, atBlock, 0, atBlockPos); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ProcessAadBytes(ReadOnlySpan input) + { + CheckStatus(); + + if (atBlockPos > 0) + { + int available = BlockSize - atBlockPos; + if (input.Length < available) + { + input.CopyTo(atBlock.AsSpan(atBlockPos)); + atBlockPos += input.Length; + return; + } + + input[..available].CopyTo(atBlock.AsSpan(atBlockPos)); + gHASHBlock(S_at, atBlock); + atLength += BlockSize; + input = input[available..]; + //atBlockPos = 0; + } + + while (input.Length >= BlockSize) + { + gHASHBlock(S_at, input); + atLength += BlockSize; + input = input[BlockSize..]; + } + + input.CopyTo(atBlock); + atBlockPos = input.Length; + } +#endif + + private void InitCipher() + { + if (atLength > 0) + { + Array.Copy(S_at, 0, S_atPre, 0, BlockSize); + atLengthPre = atLength; + } + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_atPre, atBlock, 0, atBlockPos); + atLengthPre += (uint)atBlockPos; + } + + if (atLengthPre > 0) + { + Array.Copy(S_atPre, 0, S, 0, BlockSize); + } + } + + public int ProcessByte(byte input, byte[] output, int outOff) + { + CheckStatus(); + + bufBlock[bufOff] = input; + if (++bufOff == bufBlock.Length) + { + if (forEncryption) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + EncryptBlock(bufBlock, output.AsSpan(outOff)); +#else + EncryptBlock(bufBlock, 0, output, outOff); +#endif + bufOff = 0; + } + else + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + DecryptBlock(bufBlock, output.AsSpan(outOff)); +#else + DecryptBlock(bufBlock, 0, output, outOff); +#endif + Array.Copy(bufBlock, BlockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + return BlockSize; + } + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessByte(byte input, Span output) + { + CheckStatus(); + + bufBlock[bufOff] = input; + if (++bufOff == bufBlock.Length) + { + if (forEncryption) + { + EncryptBlock(bufBlock, output); + bufOff = 0; + } + else + { + DecryptBlock(bufBlock, output); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + return BlockSize; + } + return 0; + } +#endif + + public int ProcessBytes(byte[] input, int inOff, int len, byte[] output, int outOff) + { + CheckStatus(); + + Check.DataLength(input, inOff, len, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(input.AsSpan(inOff, len), Spans.FromNullable(output, outOff)); +#else + int resultLen = 0; + + if (forEncryption) + { + if (bufOff > 0) + { + int available = BlockSize - bufOff; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return 0; + } + + Array.Copy(input, inOff, bufBlock, bufOff, available); + EncryptBlock(bufBlock, 0, output, outOff); + inOff += available; + len -= available; + resultLen = BlockSize; + //bufOff = 0; + } + + int inLimit1 = inOff + len - BlockSize; + int inLimit2 = inLimit1 - BlockSize; + + while (inOff <= inLimit2) + { + EncryptBlocks2(input, inOff, output, outOff + resultLen); + inOff += BlockSize * 2; + resultLen += BlockSize * 2; + } + + if (inOff <= inLimit1) + { + EncryptBlock(input, inOff, output, outOff + resultLen); + inOff += BlockSize; + resultLen += BlockSize; + } + + bufOff = BlockSize + inLimit1 - inOff; + Array.Copy(input, inOff, bufBlock, 0, bufOff); + } + else + { + int available = bufBlock.Length - bufOff; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return 0; + } + + if (bufOff >= BlockSize) + { + DecryptBlock(bufBlock, 0, output, outOff); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, bufOff -= BlockSize); + resultLen = BlockSize; + + available += BlockSize; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return resultLen; + } + } + + int inLimit1 = inOff + len - bufBlock.Length; + int inLimit2 = inLimit1 - BlockSize; + + available = BlockSize - bufOff; + Array.Copy(input, inOff, bufBlock, bufOff, available); + DecryptBlock(bufBlock, 0, output, outOff + resultLen); + inOff += available; + resultLen += BlockSize; + //bufOff = 0; + + while (inOff <= inLimit2) + { + DecryptBlocks2(input, inOff, output, outOff + resultLen); + inOff += BlockSize * 2; + resultLen += BlockSize * 2; + } + + if (inOff <= inLimit1) + { + DecryptBlock(input, inOff, output, outOff + resultLen); + inOff += BlockSize; + resultLen += BlockSize; + } + + bufOff = bufBlock.Length + inLimit1 - inOff; + Array.Copy(input, inOff, bufBlock, 0, bufOff); + } + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBytes(ReadOnlySpan input, Span output) + { + CheckStatus(); + + int resultLen = 0; + + if (forEncryption) + { + if (bufOff > 0) + { + int available = BlockSize - bufOff; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return 0; + } + + input[..available].CopyTo(bufBlock.AsSpan(bufOff)); + EncryptBlock(bufBlock, output); + input = input[available..]; + resultLen = BlockSize; + //bufOff = 0; + } + + while (input.Length >= BlockSize * 2) + { + EncryptBlocks2(input, output[resultLen..]); + input = input[(BlockSize * 2)..]; + resultLen += BlockSize * 2; + } + + if (input.Length >= BlockSize) + { + EncryptBlock(input, output[resultLen..]); + input = input[BlockSize..]; + resultLen += BlockSize; + } + + bufOff = input.Length; + input.CopyTo(bufBlock); + } + else + { + int available = bufBlock.Length - bufOff; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return 0; + } + + if (bufOff >= BlockSize) + { + DecryptBlock(bufBlock, output); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, bufOff -= BlockSize); + resultLen = BlockSize; + + available += BlockSize; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return resultLen; + } + } + + int inLimit1 = bufBlock.Length; + int inLimit2 = inLimit1 + BlockSize; + + available = BlockSize - bufOff; + input[..available].CopyTo(bufBlock.AsSpan(bufOff)); + DecryptBlock(bufBlock, output[resultLen..]); + input = input[available..]; + resultLen += BlockSize; + //bufOff = 0; + + while (input.Length >= inLimit2) + { + DecryptBlocks2(input, output[resultLen..]); + input = input[(BlockSize * 2)..]; + resultLen += BlockSize * 2; + } + + if (input.Length >= inLimit1) + { + DecryptBlock(input, output[resultLen..]); + input = input[BlockSize..]; + resultLen += BlockSize; + } + + bufOff = input.Length; + input.CopyTo(bufBlock); + } + + return resultLen; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + CheckStatus(); + + if (totalLength == 0) + { + InitCipher(); + } + + int extra = bufOff; + + if (forEncryption) + { + Check.OutputLength(output, outOff, extra + macSize, "output buffer too short"); + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + extra -= macSize; + + Check.OutputLength(output, outOff, extra, "output buffer too short"); + } + + if (extra > 0) + { + ProcessPartial(bufBlock, 0, extra, output, outOff); + } + + atLength += (uint)atBlockPos; + + if (atLength > atLengthPre) + { + /* + * Some AAD was sent after the cipher started. We determine the difference b/w the hash value + * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at). + * Then we carry this difference forward by multiplying by H^c, where c is the number of (full or + * partial) cipher-text blocks produced, and adjust the current hash. + */ + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_at, atBlock, 0, atBlockPos); + } + + // Find the difference between the AAD hashes + if (atLengthPre > 0) + { + GcmUtilities.Xor(S_at, S_atPre); + } + + // Number of cipher-text blocks produced + long c = (long)(((totalLength * 8) + 127) >> 7); + + // Calculate the adjustment factor + byte[] H_c = new byte[16]; + if (exp == null) + { + exp = new BasicGcmExponentiator(); + exp.Init(H); + } + exp.ExponentiateX(c, H_c); + + // Carry the difference forward + GcmUtilities.Multiply(S_at, H_c); + + // Adjust the current hash + GcmUtilities.Xor(S, S_at); + } + + // Final gHASH + byte[] X = new byte[BlockSize]; + Pack.UInt64_To_BE(atLength * 8UL, X, 0); + Pack.UInt64_To_BE(totalLength * 8UL, X, 8); + + gHASHBlock(S, X); + + // T = MSBt(GCTRk(J0,S)) + byte[] tag = new byte[BlockSize]; + cipher.ProcessBlock(J0, 0, tag, 0); + GcmUtilities.Xor(tag, S); + + int resultLen = extra; + + // We place into macBlock our calculated value for T + this.macBlock = new byte[macSize]; + Array.Copy(tag, 0, macBlock, 0, macSize); + + if (forEncryption) + { + // Append T to the message + Array.Copy(macBlock, 0, output, outOff + bufOff, macSize); + resultLen += macSize; + } + else + { + // Retrieve the T value from the message and compare to calculated one + byte[] msgMac = new byte[macSize]; + Array.Copy(bufBlock, extra, msgMac, 0, macSize); + if (!Arrays.ConstantTimeAreEqual(this.macBlock, msgMac)) + throw new InvalidCipherTextException("mac check in GCM failed"); + } + + Reset(false); + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + CheckStatus(); + + if (totalLength == 0) + { + InitCipher(); + } + + int extra = bufOff; + + if (forEncryption) + { + Check.OutputLength(output, extra + macSize, "output buffer too short"); + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + extra -= macSize; + + Check.OutputLength(output, extra, "output buffer too short"); + } + + if (extra > 0) + { + ProcessPartial(bufBlock.AsSpan(0, extra), output); + } + + atLength += (uint)atBlockPos; + + if (atLength > atLengthPre) + { + /* + * Some AAD was sent after the cipher started. We determine the difference b/w the hash value + * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at). + * Then we carry this difference forward by multiplying by H^c, where c is the number of (full or + * partial) cipher-text blocks produced, and adjust the current hash. + */ + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_at, atBlock, 0, atBlockPos); + } + + // Find the difference between the AAD hashes + if (atLengthPre > 0) + { + GcmUtilities.Xor(S_at, S_atPre); + } + + // Number of cipher-text blocks produced + long c = (long)(((totalLength * 8) + 127) >> 7); + + // Calculate the adjustment factor + byte[] H_c = new byte[16]; + if (exp == null) + { + exp = new BasicGcmExponentiator(); + exp.Init(H); + } + exp.ExponentiateX(c, H_c); + + // Carry the difference forward + GcmUtilities.Multiply(S_at, H_c); + + // Adjust the current hash + GcmUtilities.Xor(S, S_at); + } + + // Final gHASH + Span X = stackalloc byte[BlockSize]; + Pack.UInt64_To_BE(atLength * 8UL, X); + Pack.UInt64_To_BE(totalLength * 8UL, X[8..]); + + gHASHBlock(S, X); + + // T = MSBt(GCTRk(J0,S)) + Span tag = stackalloc byte[BlockSize]; + cipher.ProcessBlock(J0, tag); + GcmUtilities.Xor(tag, S); + + int resultLen = extra; + + // We place into macBlock our calculated value for T + this.macBlock = new byte[macSize]; + tag[..macSize].CopyTo(macBlock); + + if (forEncryption) + { + // Append T to the message + macBlock.CopyTo(output[bufOff..]); + resultLen += macSize; + } + else + { + // Retrieve the T value from the message and compare to calculated one + Span msgMac = stackalloc byte[macSize]; + bufBlock.AsSpan(extra, macSize).CopyTo(msgMac); + if (!Arrays.ConstantTimeAreEqual(this.macBlock, msgMac)) + throw new InvalidCipherTextException("mac check in GCM failed"); + } + + Reset(false); + + return resultLen; + } +#endif + + public void Reset() + { + Reset(true); + } + + private void Reset(bool clearMac) + { + // note: we do not reset the nonce. + + S = new byte[BlockSize]; + S_at = new byte[BlockSize]; + S_atPre = new byte[BlockSize]; + atBlock = new byte[BlockSize]; + atBlockPos = 0; + atLength = 0; + atLengthPre = 0; + counter = Arrays.Clone(J0); + counter32 = Pack.BE_To_UInt32(counter, 12); + blocksRemaining = uint.MaxValue - 1; + bufOff = 0; + totalLength = 0; + + if (bufBlock != null) + { + Arrays.Fill(bufBlock, 0); + } + + if (clearMac) + { + macBlock = null; + } + + if (forEncryption) + { + initialised = false; + } + else + { + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void DecryptBlock(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t0); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + output[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + output[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + output[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void DecryptBlocks2(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize * 2, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t0); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + output[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + output[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + output[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + input = input[BlockSize..]; + output = output[BlockSize..]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t0); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + output[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + output[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + output[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void EncryptBlock(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void EncryptBlocks2(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + input = input[BlockSize..]; + output = output[BlockSize..]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void GetNextCtrBlock(Span block) + { + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + + Pack.UInt32_To_BE(++counter32, counter, 12); + + cipher.ProcessBlock(counter, block); + } + + private void ProcessPartial(Span partialBlock, Span output) + { + Span ctrBlock = stackalloc byte[BlockSize]; + GetNextCtrBlock(ctrBlock); + + if (forEncryption) + { + GcmUtilities.Xor(partialBlock, ctrBlock, partialBlock.Length); + gHASHPartial(S, partialBlock); + } + else + { + gHASHPartial(S, partialBlock); + GcmUtilities.Xor(partialBlock, ctrBlock, partialBlock.Length); + } + + partialBlock.CopyTo(output); + totalLength += (uint)partialBlock.Length; + } +#else + private void DecryptBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void DecryptBlocks2(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + inOff += BlockSize; + outOff += BlockSize; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void EncryptBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void EncryptBlocks2(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + inOff += BlockSize; + outOff += BlockSize; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void GetNextCtrBlock(byte[] block) + { + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + + Pack.UInt32_To_BE(++counter32, counter, 12); + + cipher.ProcessBlock(counter, 0, block, 0); + } + + private void ProcessPartial(byte[] buf, int off, int len, byte[] output, int outOff) + { + //byte[] ctrBlock = new byte[BlockSize]; + GetNextCtrBlock(ctrBlock); + + if (forEncryption) + { + GcmUtilities.Xor(buf, off, ctrBlock, 0, len); + gHASHPartial(S, buf, off, len); + } + else + { + gHASHPartial(S, buf, off, len); + GcmUtilities.Xor(buf, off, ctrBlock, 0, len); + } + + Array.Copy(buf, off, output, outOff, len); + totalLength += (uint)len; + } +#endif + + private void gHASH(byte[] Y, byte[] b, int len) + { + for (int pos = 0; pos < len; pos += BlockSize) + { + int num = System.Math.Min(len - pos, BlockSize); + gHASHPartial(Y, b, pos, num); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void gHASHBlock(byte[] Y, ReadOnlySpan b) + { + GcmUtilities.Xor(Y, b); + multiplier.MultiplyH(Y); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void gHASHPartial(byte[] Y, ReadOnlySpan b) + { + GcmUtilities.Xor(Y, b, b.Length); + multiplier.MultiplyH(Y); + } +#else + private void gHASHBlock(byte[] Y, byte[] b) + { + GcmUtilities.Xor(Y, b); + multiplier.MultiplyH(Y); + } + + private void gHASHBlock(byte[] Y, byte[] b, int off) + { + GcmUtilities.Xor(Y, b, off); + multiplier.MultiplyH(Y); + } +#endif + + private void gHASHPartial(byte[] Y, byte[] b, int off, int len) + { + GcmUtilities.Xor(Y, b, off, len); + multiplier.MultiplyH(Y); + } + + private void CheckStatus() + { + if (!initialised) + { + if (forEncryption) + { + throw new InvalidOperationException("GCM cipher cannot be reused for encryption"); + } + throw new InvalidOperationException("GCM cipher needs to be initialised"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs.meta new file mode 100644 index 00000000..43369eb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ab9d7d1ff514d9479d1a3bca307ff13 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GCMBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs new file mode 100644 index 00000000..02f24e23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs @@ -0,0 +1,234 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * implements the GOST 28147 OFB counter mode (GCTR). + */ + public class GOfbBlockCipher + : IBlockCipherMode + { + private byte[] IV; + private byte[] ofbV; + private byte[] ofbOutV; + + private readonly int blockSize; + private readonly IBlockCipher cipher; + + bool firstStep = true; + int N3; + int N4; + const int C1 = 16843012; //00000001000000010000000100000100 + const int C2 = 16843009; //00000001000000010000000100000001 + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * counter mode (must have a 64 bit block size). + */ + public GOfbBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + this.blockSize = cipher.GetBlockSize(); + + if (blockSize != 8) + { + throw new ArgumentException("GCTR only for 64 bit block ciphers"); + } + + this.IV = new byte[cipher.GetBlockSize()]; + this.ofbV = new byte[cipher.GetBlockSize()]; + this.ofbOutV = new byte[cipher.GetBlockSize()]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param encrypting if true the cipher is initialised for + * encryption, if false for decryption. + * @param parameters the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is inappropriate. + */ + public void Init( + bool forEncryption, //ignored by this CTR mode + ICipherParameters parameters) + { + firstStep = true; + N3 = 0; + N4 = 0; + + if (parameters is ParametersWithIV) + { + ParametersWithIV ivParam = (ParametersWithIV)parameters; + byte[] iv = ivParam.GetIV(); + + if (iv.Length < IV.Length) + { + // prepend the supplied IV with zeros (per FIPS PUB 81) + Array.Copy(iv, 0, IV, IV.Length - iv.Length, iv.Length); + for (int i = 0; i < IV.Length - iv.Length; i++) + { + IV[i] = 0; + } + } + else + { + Array.Copy(iv, 0, IV, 0, IV.Length); + } + + parameters = ivParam.Parameters; + } + + Reset(); + + // if it's null, key is to be reused. + if (parameters != null) + { + cipher.Init(true, parameters); + } + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/GCTR" + * and the block size in bits + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/GCTR"; } + } + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at (in bytes). + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return blockSize; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(output, outOff, blockSize, "output buffer too short"); + + if (firstStep) + { + firstStep = false; + cipher.ProcessBlock(ofbV, 0, ofbOutV, 0); + N3 = (int)Pack.LE_To_UInt32(ofbOutV, 0); + N4 = (int)Pack.LE_To_UInt32(ofbOutV, 4); + } + N3 += C2; + N4 += C1; + if (N4 < C1) // addition is mod (2**32 - 1) + { + if (N4 > 0) + { + N4++; + } + } + Pack.UInt32_To_LE((uint)N3, ofbV, 0); + Pack.UInt32_To_LE((uint)N4, ofbV, 4); + + cipher.ProcessBlock(ofbV, 0, ofbOutV, 0); + + // + // XOR the ofbV with the plaintext producing the cipher text (and + // the next input block). + // + for (int i = 0; i < blockSize; i++) + { + output[outOff + i] = (byte)(ofbOutV[i] ^ input[inOff + i]); + } + + // + // change over the input block. + // + Array.Copy(ofbV, blockSize, ofbV, 0, ofbV.Length - blockSize); + Array.Copy(ofbOutV, 0, ofbV, ofbV.Length - blockSize, blockSize); + + return blockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + if (firstStep) + { + firstStep = false; + cipher.ProcessBlock(ofbV, ofbOutV); + N3 = (int)Pack.LE_To_UInt32(ofbOutV, 0); + N4 = (int)Pack.LE_To_UInt32(ofbOutV, 4); + } + N3 += C2; + N4 += C1; + if (N4 < C1) // addition is mod (2**32 - 1) + { + if (N4 > 0) + { + N4++; + } + } + Pack.UInt32_To_LE((uint)N3, ofbV, 0); + Pack.UInt32_To_LE((uint)N4, ofbV, 4); + + cipher.ProcessBlock(ofbV, ofbOutV); + + // + // XOR the ofbV with the plaintext producing the cipher text (and + // the next input block). + // + for (int i = 0; i < blockSize; i++) + { + output[i] = (byte)(ofbOutV[i] ^ input[i]); + } + + // + // change over the input block. + // + Array.Copy(ofbV, blockSize, ofbV, 0, ofbV.Length - blockSize); + Array.Copy(ofbOutV, 0, ofbV, ofbV.Length - blockSize, blockSize); + + return blockSize; + } +#endif + + /** + * reset the feedback vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + Array.Copy(IV, 0, ofbV, 0, IV.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs.meta new file mode 100644 index 00000000..e90d2442 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bba6a24ff3c75d94eabc433ea5f09f6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GOFBBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs new file mode 100644 index 00000000..abfcec75 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs @@ -0,0 +1,1075 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * GCM-SIV Mode. + *

It should be noted that the specified limit of 236 bytes is not supported. This is because all bytes are + * cached in a ByteArrayOutputStream object (which has a limit of a little less than 231 bytes), + * and are output on the DoFinal() call (which can only process a maximum of 231 bytes).

+ *

The practical limit of 231 - 24 bytes is policed, and attempts to breach the limit will be rejected

+ *

In order to properly support the higher limit, an extended form of ByteArrayOutputStream would be needed + * which would use multiple arrays to store the data. In addition, a new doOutput method would be required (similar + * to that in XOF digests), which would allow the data to be output over multiple calls. Alternatively an extended + * form of ByteArrayInputStream could be used to deliver the data.

+ */ + public class GcmSivBlockCipher + : IAeadBlockCipher + { + /// The buffer length. + private static readonly int BUFLEN = 16; + + /// The halfBuffer length. + private static readonly int HALFBUFLEN = BUFLEN >> 1; + + /// The nonce length. + private static readonly int NONCELEN = 12; + + /** + * The maximum data length (AEAD/PlainText). Due to implementation constraints this is restricted to the maximum + * array length (https://programming.guide/java/array-maximum-length.html) minus the BUFLEN to allow for the MAC + */ + private static readonly int MAX_DATALEN = int.MaxValue - 8 - BUFLEN; + + /** + * The top bit mask. + */ + private static readonly byte MASK = 0x80; + + /** + * The addition constant. + */ + private static readonly byte ADD = 0xE1; + + /** + * The initialisation flag. + */ + private static readonly int INIT = 1; + + /** + * The aeadComplete flag. + */ + private static readonly int AEAD_COMPLETE = 2; + + /** + * The cipher. + */ + private readonly IBlockCipher theCipher; + + /** + * The multiplier. + */ + private readonly IGcmMultiplier theMultiplier; + + /** + * The gHash buffer. + */ + internal readonly byte[] theGHash = new byte[BUFLEN]; + + /** + * The reverse buffer. + */ + internal readonly byte[] theReverse = new byte[BUFLEN]; + + /** + * The aeadHasher. + */ + private readonly GcmSivHasher theAEADHasher; + + /** + * The dataHasher. + */ + private readonly GcmSivHasher theDataHasher; + + /** + * The plainDataStream. + */ + private GcmSivCache thePlain; + + /** + * The encryptedDataStream (decryption only). + */ + private GcmSivCache theEncData; + + /** + * Are we encrypting? + */ + private bool forEncryption; + + /** + * The initialAEAD. + */ + private byte[] theInitialAEAD; + + /** + * The nonce. + */ + private byte[] theNonce; + + /** + * The flags. + */ + private int theFlags; + + /** + * Constructor. + */ + public GcmSivBlockCipher() + : this(AesUtilities.CreateEngine()) + { + } + + /** + * Constructor. + * @param pCipher the underlying cipher + */ + public GcmSivBlockCipher(IBlockCipher pCipher) + : this(pCipher, new Tables4kGcmMultiplier()) + { + } + + /** + * Constructor. + * @param pCipher the underlying cipher + * @param pMultiplier the multiplier + */ + public GcmSivBlockCipher(IBlockCipher pCipher, IGcmMultiplier pMultiplier) + { + /* Ensure that the cipher is the correct size */ + if (pCipher.GetBlockSize() != BUFLEN) + throw new ArgumentException("Cipher required with a block size of " + BUFLEN + "."); + + /* Store parameters */ + theCipher = pCipher; + theMultiplier = pMultiplier; + + /* Create the hashers */ + theAEADHasher = new GcmSivHasher(this); + theDataHasher = new GcmSivHasher(this); + } + + public virtual IBlockCipher UnderlyingCipher => theCipher; + + public virtual int GetBlockSize() + { + return theCipher.GetBlockSize(); + } + + public virtual void Init(bool pEncrypt, ICipherParameters cipherParameters) + { + /* Set defaults */ + byte[] myInitialAEAD = null; + byte[] myNonce; + KeyParameter myKey; + + /* Access parameters */ + if (cipherParameters is AeadParameters) + { + AeadParameters myAEAD = (AeadParameters)cipherParameters; + myInitialAEAD = myAEAD.GetAssociatedText(); + myNonce = myAEAD.GetNonce(); + myKey = myAEAD.Key; + } + else if (cipherParameters is ParametersWithIV) + { + ParametersWithIV myParms = (ParametersWithIV)cipherParameters; + myNonce = myParms.GetIV(); + myKey = (KeyParameter)myParms.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to GCM_SIV"); + } + + /* Check nonceSize */ + if (myNonce == null || myNonce.Length != NONCELEN) + { + throw new ArgumentException("Invalid nonce"); + } + + /* Check keysize */ + if (myKey == null) + { + throw new ArgumentException("Invalid key"); + } + + byte[] k = myKey.GetKey(); + + if (k.Length != BUFLEN && k.Length != (BUFLEN << 1)) + { + throw new ArgumentException("Invalid key"); + } + + /* Reset details */ + forEncryption = pEncrypt; + theInitialAEAD = myInitialAEAD; + theNonce = myNonce; + + /* Initialise the keys */ + DeriveKeys(myKey); + ResetStreams(); + } + + public virtual string AlgorithmName => theCipher.AlgorithmName + "-GCM-SIV"; + + /** + * check AEAD status. + * @param pLen the aeadLength + */ + private void CheckAeadStatus(int pLen) + { + /* Check we are initialised */ + if ((theFlags & INIT) == 0) + { + throw new InvalidOperationException("Cipher is not initialised"); + } + + /* Check AAD is allowed */ + if ((theFlags & AEAD_COMPLETE) != 0) + { + throw new InvalidOperationException("AEAD data cannot be processed after ordinary data"); + } + + /* Make sure that we haven't breached AEAD data limit */ + if ((long)theAEADHasher.getBytesProcessed() + long.MinValue > (MAX_DATALEN - pLen) + long.MinValue) + { + throw new InvalidOperationException("AEAD byte count exceeded"); + } + } + + /** + * check status. + * @param pLen the dataLength + */ + private void CheckStatus(int pLen) + { + /* Check we are initialised */ + if ((theFlags & INIT) == 0) + { + throw new InvalidOperationException("Cipher is not initialised"); + } + + /* Complete the AEAD section if this is the first data */ + if ((theFlags & AEAD_COMPLETE) == 0) + { + theAEADHasher.completeHash(); + theFlags |= AEAD_COMPLETE; + } + + /* Make sure that we haven't breached data limit */ + long dataLimit = MAX_DATALEN; + long currBytes = thePlain.Length; + if (!forEncryption) + { + dataLimit += BUFLEN; + currBytes = theEncData.Length; + } + if (currBytes + long.MinValue > (dataLimit - pLen) + long.MinValue) + { + throw new InvalidOperationException("byte count exceeded"); + } + } + + public virtual void ProcessAadByte(byte pByte) + { + /* Check that we can supply AEAD */ + CheckAeadStatus(1); + + /* Process the aead */ + theAEADHasher.UpdateHash(pByte); + } + + public virtual void ProcessAadBytes(byte[] pData, int pOffset, int pLen) + { + Check.DataLength(pData, pOffset, pLen, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessAadBytes(pData.AsSpan(pOffset, pLen)); +#else + /* Check that we can supply AEAD */ + CheckAeadStatus(pLen); + + /* Process the aead */ + theAEADHasher.UpdateHash(pData, pOffset, pLen); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + /* Check that we can supply AEAD */ + CheckAeadStatus(input.Length); + + /* Process the aead */ + theAEADHasher.UpdateHash(input); + } +#endif + + public virtual int ProcessByte(byte pByte, byte[] pOutput, int pOutOffset) + { + /* Check that we have initialised */ + CheckStatus(1); + + /* Store the data */ + if (forEncryption) + { + thePlain.WriteByte(pByte); + theDataHasher.UpdateHash(pByte); + } + else + { + theEncData.WriteByte(pByte); + } + + /* No data returned */ + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + /* Check that we have initialised */ + CheckStatus(1); + + /* Store the data */ + if (forEncryption) + { + thePlain.WriteByte(input); + theDataHasher.UpdateHash(input); + } + else + { + theEncData.WriteByte(input); + } + + /* No data returned */ + return 0; + } +#endif + + public virtual int ProcessBytes(byte[] pData, int pOffset, int pLen, byte[] pOutput, int pOutOffset) + { + Check.DataLength(pData, pOffset, pLen, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(pData.AsSpan(pOffset, pLen), Spans.FromNullable(pOutput, pOutOffset)); +#else + /* Check that we have initialised */ + CheckStatus(pLen); + + /* Store the data */ + if (forEncryption) + { + thePlain.Write(pData, pOffset, pLen); + theDataHasher.UpdateHash(pData, pOffset, pLen); + } + else + { + theEncData.Write(pData, pOffset, pLen); + } + + /* No data returned */ + return 0; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + /* Check that we have initialised */ + CheckStatus(input.Length); + + /* Store the data */ + if (forEncryption) + { + thePlain.Write(input); + theDataHasher.UpdateHash(input); + } + else + { + theEncData.Write(input); + } + + /* No data returned */ + return 0; + } +#endif + + public virtual int DoFinal(byte[] pOutput, int pOffset) + { + Check.OutputLength(pOutput, pOffset, GetOutputSize(0), "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(pOutput.AsSpan(pOffset)); +#else + /* Check that we have initialised */ + CheckStatus(0); + + /* If we are encrypting */ + if (forEncryption) + { + /* Derive the tag */ + byte[] myTag = CalculateTag(); + + /* encrypt the plain text */ + int myDataLen = BUFLEN + EncryptPlain(myTag, pOutput, pOffset); + + /* Add the tag to the output */ + Array.Copy(myTag, 0, pOutput, pOffset + Convert.ToInt32(thePlain.Length), BUFLEN); + + /* Reset the streams */ + ResetStreams(); + return myDataLen; + + /* else we are decrypting */ + } + else + { + /* decrypt to plain text */ + DecryptPlain(); + + /* Release plain text */ + int myDataLen = Streams.WriteBufTo(thePlain, pOutput, pOffset); + + /* Reset the streams */ + ResetStreams(); + return myDataLen; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + /* Check that we have initialised */ + CheckStatus(0); + + Check.OutputLength(output, GetOutputSize(0), "output buffer too short"); + + /* If we are encrypting */ + if (forEncryption) + { + /* Derive the tag */ + byte[] myTag = CalculateTag(); + + /* encrypt the plain text */ + int myDataLen = BUFLEN + EncryptPlain(myTag, output); + + /* Add the tag to the output */ + myTag.AsSpan(0, BUFLEN).CopyTo(output[Convert.ToInt32(thePlain.Length)..]); + + /* Reset the streams */ + ResetStreams(); + return myDataLen; + + /* else we are decrypting */ + } + else + { + /* decrypt to plain text */ + DecryptPlain(); + + /* Release plain text */ + if (!thePlain.TryGetBuffer(out var buffer)) + throw new InvalidOperationException(); + + buffer.AsSpan().CopyTo(output); + int myDataLen = buffer.Count; + + /* Reset the streams */ + ResetStreams(); + return myDataLen; + } + } +#endif + + public virtual byte[] GetMac() + { + throw new InvalidOperationException(); + } + + public virtual int GetUpdateOutputSize(int pLen) + { + return 0; + } + + public virtual int GetOutputSize(int pLen) + { + if (forEncryption) + { + return pLen + Convert.ToInt32(thePlain.Length) + BUFLEN; + } + int myCurr = pLen + Convert.ToInt32(theEncData.Length); + return myCurr > BUFLEN ? myCurr - BUFLEN : 0; + } + + public virtual void Reset() + { + ResetStreams(); + } + + /** + * Reset Streams. + */ + private void ResetStreams() + { + /* Clear the plainText buffer */ + if (thePlain != null) + { + int count = Convert.ToInt32(thePlain.Length); + Array.Clear(thePlain.GetBuffer(), 0, count); + thePlain.SetLength(0); + } + + /* Reset hashers */ + theAEADHasher.Reset(); + theDataHasher.Reset(); + + /* Recreate streams (to release memory) */ + thePlain = new GcmSivCache(); + theEncData = forEncryption ? null : new GcmSivCache(); + + /* Initialise AEAD if required */ + theFlags &= ~AEAD_COMPLETE; + Arrays.Fill(theGHash, (byte)0); + if (theInitialAEAD != null) + { + theAEADHasher.UpdateHash(theInitialAEAD, 0, theInitialAEAD.Length); + } + } + + /** + * Obtain buffer length (allowing for null). + * @param pBuffer the buffere + * @return the length + */ + private static int bufLength(byte[] pBuffer) + { + return pBuffer == null ? 0 : pBuffer.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptPlain(byte[] pCounter, Span target) + { + byte[] thePlainBuf = thePlain.GetBuffer(); + int thePlainLen = Convert.ToInt32(thePlain.Length); + + byte[] mySrc = thePlainBuf; + byte[] myCounter = Arrays.Clone(pCounter); + myCounter[BUFLEN - 1] |= MASK; + byte[] myMask = new byte[BUFLEN]; + long myRemaining = thePlainLen; + int myOff = 0; + + /* While we have data to process */ + while (myRemaining > 0) + { + /* Generate the next mask */ + theCipher.ProcessBlock(myCounter, 0, myMask, 0); + + /* Xor data into mask */ + int myLen = (int)System.Math.Min(BUFLEN, myRemaining); + xorBlock(myMask, mySrc, myOff, myLen); + + /* Copy encrypted data to output */ + myMask.AsSpan(0, myLen).CopyTo(target[myOff..]); + + /* Adjust counters */ + myRemaining -= myLen; + myOff += myLen; + incrementCounter(myCounter); + } + + /* Return the amount of data processed */ + return thePlainLen; + } +#else + private int EncryptPlain(byte[] pCounter, byte[] pTarget, int pOffset) + { + byte[] thePlainBuf = thePlain.GetBuffer(); + int thePlainLen = Convert.ToInt32(thePlain.Length); + + byte[] mySrc = thePlainBuf; + byte[] myCounter = Arrays.Clone(pCounter); + myCounter[BUFLEN - 1] |= MASK; + byte[] myMask = new byte[BUFLEN]; + long myRemaining = thePlainLen; + int myOff = 0; + + /* While we have data to process */ + while (myRemaining > 0) + { + /* Generate the next mask */ + theCipher.ProcessBlock(myCounter, 0, myMask, 0); + + /* Xor data into mask */ + int myLen = (int)System.Math.Min(BUFLEN, myRemaining); + xorBlock(myMask, mySrc, myOff, myLen); + + /* Copy encrypted data to output */ + Array.Copy(myMask, 0, pTarget, pOffset + myOff, myLen); + + /* Adjust counters */ + myRemaining -= myLen; + myOff += myLen; + incrementCounter(myCounter); + } + + /* Return the amount of data processed */ + return thePlainLen; + } +#endif + + private void DecryptPlain() + { + byte[] theEncDataBuf = theEncData.GetBuffer(); + int theEncDataLen = Convert.ToInt32(theEncData.Length); + + byte[] mySrc = theEncDataBuf; + int myRemaining = theEncDataLen - BUFLEN; + + /* Check for insufficient data */ + if (myRemaining < 0) + { + throw new InvalidCipherTextException("Data too short"); + } + + /* Access counter */ + byte[] myExpected = Arrays.CopyOfRange(mySrc, myRemaining, myRemaining + BUFLEN); + byte[] myCounter = Arrays.Clone(myExpected); + myCounter[BUFLEN - 1] |= MASK; + byte[] myMask = new byte[BUFLEN]; + int myOff = 0; + + /* While we have data to process */ + while (myRemaining > 0) + { + /* Generate the next mask */ + theCipher.ProcessBlock(myCounter, 0, myMask, 0); + + /* Xor data into mask */ + int myLen = System.Math.Min(BUFLEN, myRemaining); + xorBlock(myMask, mySrc, myOff, myLen); + + /* Write data to plain dataStream */ + thePlain.Write(myMask, 0, myLen); + theDataHasher.UpdateHash(myMask, 0, myLen); + + /* Adjust counters */ + myRemaining -= myLen; + myOff += myLen; + incrementCounter(myCounter); + } + + /* Derive and check the tag */ + byte[] myTag = CalculateTag(); + if (!Arrays.ConstantTimeAreEqual(myTag, myExpected)) + { + Reset(); + throw new InvalidCipherTextException("mac check failed"); + } + } + + /** + * calculate tag. + * @return the calculated tag + */ + private byte[] CalculateTag() + { + /* Complete the hash */ + theDataHasher.completeHash(); + byte[] myPolyVal = completePolyVal(); + + /* calculate polyVal */ + byte[] myResult = new byte[BUFLEN]; + + /* Fold in the nonce */ + for (int i = 0; i < NONCELEN; i++) + { + myPolyVal[i] ^= theNonce[i]; + } + + /* Clear top bit */ + myPolyVal[BUFLEN - 1] &= (byte)(MASK - 1); + + /* Calculate tag and return it */ + theCipher.ProcessBlock(myPolyVal, 0, myResult, 0); + return myResult; + } + + /** + * complete polyVAL. + * @return the calculated value + */ + private byte[] completePolyVal() + { + /* Build the polyVal result */ + byte[] myResult = new byte[BUFLEN]; + gHashLengths(); + fillReverse(theGHash, 0, BUFLEN, myResult); + return myResult; + } + + /** + * process lengths. + */ + private void gHashLengths() + { + /* Create reversed bigEndian buffer to keep it simple */ + byte[] myIn = new byte[BUFLEN]; + Pack.UInt64_To_BE((ulong)Bytes.NumBits * theDataHasher.getBytesProcessed(), myIn, 0); + Pack.UInt64_To_BE((ulong)Bytes.NumBits * theAEADHasher.getBytesProcessed(), myIn, Longs.NumBytes); + + /* hash value */ + gHASH(myIn); + } + + /** + * perform the next GHASH step. + * @param pNext the next value + */ + private void gHASH(byte[] pNext) + { + xorBlock(theGHash, pNext); + theMultiplier.MultiplyH(theGHash); + } + + private static void fillReverse(byte[] pInput, int pOffset, int pLength, byte[] pOutput) + { + /* Loop through the buffer */ + for (int i = 0, j = BUFLEN - 1; i < pLength; i++, j--) + { + /* Copy byte */ + pOutput[j] = pInput[pOffset + i]; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void fillReverse(ReadOnlySpan input, Span output) + { + /* Loop through the buffer */ + for (int i = 0, j = BUFLEN - 1; i < input.Length; i++, j--) + { + /* Copy byte */ + output[j] = input[i]; + } + } +#endif + + /** + * xor a full block buffer. + * @param pLeft the left operand and result + * @param pRight the right operand + */ + private static void xorBlock(byte[] pLeft, byte[] pRight) + { + /* Loop through the bytes */ + for (int i = 0; i < BUFLEN; i++) + { + pLeft[i] ^= pRight[i]; + } + } + + /** + * xor a partial block buffer. + * @param pLeft the left operand and result + * @param pRight the right operand + * @param pOffset the offset in the right operand + * @param pLength the length of data in the right operand + */ + private static void xorBlock(byte[] pLeft, byte[] pRight, int pOffset, int pLength) + { + /* Loop through the bytes */ + for (int i = 0; i < pLength; i++) + { + pLeft[i] ^= pRight[i + pOffset]; + } + } + + /** + * increment the counter. + * @param pCounter the counter to increment + */ + private static void incrementCounter(byte[] pCounter) + { + /* Loop through the bytes incrementing counter */ + for (int i = 0; i < Integers.NumBytes; i++) + { + if (++pCounter[i] != 0) + { + break; + } + } + } + + /** + * multiply by X. + * @param pValue the value to adjust + */ + private static void mulX(byte[] pValue) + { + /* Loop through the bytes */ + byte myMask = (byte)0; + for (int i = 0; i < BUFLEN; i++) + { + byte myValue = pValue[i]; + pValue[i] = (byte)(((myValue >> 1) & ~MASK) | myMask); + myMask = (byte)((myValue & 1) == 0 ? (byte)0 : MASK); + } + + /* Xor in addition if last bit was set */ + if (myMask != 0) + { + pValue[0] ^= ADD; + } + } + + /** + * Derive Keys. + * @param pKey the keyGeneration key + */ + private void DeriveKeys(KeyParameter pKey) + { + /* Create the buffers */ + byte[] myIn = new byte[BUFLEN]; + byte[] myOut = new byte[BUFLEN]; + byte[] myResult = new byte[BUFLEN]; + byte[] myEncKey = new byte[pKey.GetKey().Length]; + + /* Prepare for encryption */ + Array.Copy(theNonce, 0, myIn, BUFLEN - NONCELEN, NONCELEN); + theCipher.Init(true, pKey); + + /* Derive authentication key */ + int myOff = 0; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myResult, myOff, HALFBUFLEN); + myIn[0]++; + myOff += HALFBUFLEN; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myResult, myOff, HALFBUFLEN); + + /* Derive encryption key */ + myIn[0]++; + myOff = 0; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myEncKey, myOff, HALFBUFLEN); + myIn[0]++; + myOff += HALFBUFLEN; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myEncKey, myOff, HALFBUFLEN); + + /* If we have a 32byte key */ + if (myEncKey.Length == BUFLEN << 1) + { + /* Derive remainder of encryption key */ + myIn[0]++; + myOff += HALFBUFLEN; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myEncKey, myOff, HALFBUFLEN); + myIn[0]++; + myOff += HALFBUFLEN; + theCipher.ProcessBlock(myIn, 0, myOut, 0); + Array.Copy(myOut, 0, myEncKey, myOff, HALFBUFLEN); + } + + /* Initialise the Cipher */ + theCipher.Init(true, new KeyParameter(myEncKey)); + + /* Initialise the multiplier */ + fillReverse(myResult, 0, BUFLEN, myOut); + mulX(myOut); + theMultiplier.Init(myOut); + theFlags |= INIT; + } + + private class GcmSivCache + : MemoryStream + { + internal GcmSivCache() + { + } + } + + /** + * Hash Control. + */ + private class GcmSivHasher + { + /** + * Cache. + */ + private readonly byte[] theBuffer = new byte[BUFLEN]; + + /** + * Single byte cache. + */ + private readonly byte[] theByte = new byte[1]; + + /** + * Count of active bytes in cache. + */ + private int numActive; + + /** + * Count of hashed bytes. + */ + private ulong numHashed; + + private readonly GcmSivBlockCipher parent; + + internal GcmSivHasher(GcmSivBlockCipher parent) + { + this.parent = parent; + } + + /** + * Obtain the count of bytes hashed. + * @return the count + */ + internal ulong getBytesProcessed() + { + return numHashed; + } + + /** + * Reset the hasher. + */ + internal void Reset() + { + numActive = 0; + numHashed = 0; + } + + /** + * update hash. + * @param pByte the byte + */ + internal void UpdateHash(byte pByte) + { + theByte[0] = pByte; + UpdateHash(theByte, 0, 1); + } + + /** + * update hash. + * @param pBuffer the buffer + * @param pOffset the offset within the buffer + * @param pLen the length of data + */ + internal void UpdateHash(byte[] pBuffer, int pOffset, int pLen) + { + /* If we should process the cache */ + int mySpace = BUFLEN - numActive; + int numProcessed = 0; + int myRemaining = pLen; + if (numActive > 0 && pLen >= mySpace) + { + /* Copy data into the cache and hash it */ + Array.Copy(pBuffer, pOffset, theBuffer, numActive, mySpace); + fillReverse(theBuffer, 0, BUFLEN, parent.theReverse); + parent.gHASH(parent.theReverse); + + /* Adjust counters */ + numProcessed += mySpace; + myRemaining -= mySpace; + numActive = 0; + } + + /* While we have full blocks */ + while (myRemaining >= BUFLEN) + { + /* Access the next data */ + fillReverse(pBuffer, pOffset + numProcessed, BUFLEN, parent.theReverse); + parent.gHASH(parent.theReverse); + + /* Adjust counters */ + numProcessed += BUFLEN; + myRemaining -= BUFLEN; + } + + /* If we have remaining data */ + if (myRemaining > 0) + { + /* Copy data into the cache */ + Array.Copy(pBuffer, pOffset + numProcessed, theBuffer, numActive, myRemaining); + numActive += myRemaining; + } + + /* Adjust the number of bytes processed */ + numHashed += (ulong)pLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal void UpdateHash(ReadOnlySpan buffer) + { + int pLen = buffer.Length; + + /* If we should process the cache */ + int mySpace = BUFLEN - numActive; + if (numActive > 0 && buffer.Length >= mySpace) + { + /* Copy data into the cache and hash it */ + buffer[..mySpace].CopyTo(theBuffer.AsSpan(numActive)); + fillReverse(theBuffer, parent.theReverse); + parent.gHASH(parent.theReverse); + + /* Adjust counters */ + buffer = buffer[mySpace..]; + numActive = 0; + } + + /* While we have full blocks */ + while (buffer.Length >= BUFLEN) + { + /* Access the next data */ + fillReverse(buffer[..BUFLEN], parent.theReverse); + parent.gHASH(parent.theReverse); + + /* Adjust counters */ + buffer = buffer[BUFLEN..]; + } + + /* If we have remaining data */ + if (!buffer.IsEmpty) + { + /* Copy data into the cache */ + buffer.CopyTo(theBuffer.AsSpan(numActive)); + numActive += buffer.Length; + } + + /* Adjust the number of bytes processed */ + numHashed += (ulong)pLen; + } +#endif + + /** + * complete hash. + */ + internal void completeHash() + { + /* If we have remaining data */ + if (numActive > 0) + { + /* Access the next data */ + Arrays.Fill(parent.theReverse, (byte)0); + fillReverse(theBuffer, 0, numActive, parent.theReverse); + + /* hash value */ + parent.gHASH(parent.theReverse); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs.meta new file mode 100644 index 00000000..c9e14568 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bde795fc81d90214ca49145d8d4266c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/GcmSivBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs new file mode 100644 index 00000000..279b620b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /// An IAeadCipher based on an IBlockCipher. + public interface IAeadBlockCipher + : IAeadCipher + { + /// The block size for this cipher, in bytes. + int GetBlockSize(); + + /// The block cipher underlying this algorithm. + IBlockCipher UnderlyingCipher { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs.meta new file mode 100644 index 00000000..e37edeb0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 721d46b2e82841d418e36512a8e3c356 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs new file mode 100644 index 00000000..fe1898be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /// + /// A cipher mode that includes authenticated encryption with a streaming mode and optional + /// associated data. + /// + /// + /// Implementations of this interface may operate in a packet mode (where all input data is + /// buffered and processed during the call to DoFinal, or in a streaming mode (where output + /// data is incrementally produced with each call to ProcessByte or ProcessBytes. This is + /// important to consider during decryption: in a streaming mode, unauthenticated plaintext + /// data may be output prior to the call to DoFinal that results in an authentication failure. + /// The higher level protocol utilising this cipher must ensure the plaintext data is handled + /// appropriately until the end of data is reached and the entire ciphertext is authenticated. + /// + /// + public interface IAeadCipher + { + /// The name of the algorithm this cipher implements. + string AlgorithmName { get; } + + /// Initialise the cipher. + /// Parameter can either be an AeadParameters or a ParametersWithIV object. + /// Initialise for encryption if true, for decryption if false. + /// The key or other data required by the cipher. + void Init(bool forEncryption, ICipherParameters parameters); + + /// Add a single byte to the associated data check. + /// If the implementation supports it, this will be an online operation and will not retain the associated data. + /// The byte to be processed. + void ProcessAadByte(byte input); + + /// Add a sequence of bytes to the associated data check. + /// If the implementation supports it, this will be an online operation and will not retain the associated data. + /// The input byte array. + /// The offset into the input array where the data to be processed starts. + /// The number of bytes to be processed. + void ProcessAadBytes(byte[] inBytes, int inOff, int len); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Add a span of bytes to the associated data check. + /// If the implementation supports it, this will be an online operation and will not retain the associated data. + /// the span containing the data. + void ProcessAadBytes(ReadOnlySpan input); +#endif + + /** + * Encrypt/decrypt a single byte. + * + * @param input the byte to be processed. + * @param outBytes the output buffer the processed byte goes into. + * @param outOff the offset into the output byte array the processed data starts at. + * @return the number of bytes written to out. + * @exception DataLengthException if the output buffer is too small. + */ + int ProcessByte(byte input, byte[] outBytes, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int ProcessByte(byte input, Span output); +#endif + + /** + * Process a block of bytes from in putting the result into out. + * + * @param inBytes the input byte array. + * @param inOff the offset into the in array where the data to be processed starts. + * @param len the number of bytes to be processed. + * @param outBytes the output buffer the processed bytes go into. + * @param outOff the offset into the output byte array the processed data starts at. + * @return the number of bytes written to out. + * @exception DataLengthException if the output buffer is too small. + */ + int ProcessBytes(byte[] inBytes, int inOff, int len, byte[] outBytes, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int ProcessBytes(ReadOnlySpan input, Span output); +#endif + + /** + * Finish the operation either appending or verifying the MAC at the end of the data. + * + * @param outBytes space for any resulting output data. + * @param outOff offset into out to start copying the data at. + * @return number of bytes written into out. + * @throws InvalidOperationException if the cipher is in an inappropriate state. + * @throws InvalidCipherTextException if the MAC fails to match. + */ + int DoFinal(byte[] outBytes, int outOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int DoFinal(Span output); +#endif + + /** + * Return the value of the MAC associated with the last stream processed. + * + * @return MAC for plaintext data. + */ + byte[] GetMac(); + + /** + * Return the size of the output buffer required for a ProcessBytes + * an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to ProcessBytes + * with len bytes of input. + */ + int GetUpdateOutputSize(int len); + + /** + * Return the size of the output buffer required for a ProcessBytes plus a + * DoFinal with an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to ProcessBytes and DoFinal + * with len bytes of input. + */ + int GetOutputSize(int len); + + /// + /// Reset the cipher to the same state as it was after the last init (if there was one). + /// + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs.meta new file mode 100644 index 00000000..ad593c4b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a148e28c828dee1469495b92e57c9700 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IAeadCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs new file mode 100644 index 00000000..e5529e9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + public interface IBlockCipherMode + : IBlockCipher + { + /// Return the underlying this cipher mode. + IBlockCipher UnderlyingCipher { get; } + + /// Indicates whether this cipher mode can handle partial blocks. + bool IsPartialBlockOkay { get; } + + /// + /// Reset the cipher mode to the same state as it was after the last init (if there was one). + /// + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs.meta new file mode 100644 index 00000000..a28e7ffb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c1ac4125e3c2b46449b20e6f96891d36 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/IBlockCipherMode.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs new file mode 100644 index 00000000..8104bd7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs @@ -0,0 +1,668 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + public class KCcmBlockCipher + : IAeadBlockCipher + { + private static readonly int BYTES_IN_INT = 4; + private static readonly int BITS_IN_BYTE = 8; + + private static readonly int MAX_MAC_BIT_LENGTH = 512; + private static readonly int MIN_MAC_BIT_LENGTH = 64; + + private IBlockCipher engine; + + private int macSize; + private bool forEncryption; + + private byte[] initialAssociatedText; + private byte[] mac; + private byte[] macBlock; + + private byte[] nonce; + + private byte[] G1; + private byte[] buffer; + + private byte[] s; + private byte[] counter; + + private readonly MemoryStream associatedText = new MemoryStream(); + private readonly MemoryStream data = new MemoryStream(); + + /* + * + * + */ + private int Nb_ = 4; + + private void setNb(int Nb) + { + if (Nb == 4 || Nb == 6 || Nb == 8) + { + Nb_ = Nb; + } + else + { + throw new ArgumentException("Nb = 4 is recommended by DSTU7624 but can be changed to only 6 or 8 in this implementation"); + } + } + + /// + /// Base constructor. Nb value is set to 4. + /// + /// base cipher to use under CCM. + public KCcmBlockCipher(IBlockCipher engine): this(engine, 4) + { + } + + /// + /// Constructor allowing Nb configuration. + /// + /// Nb is a parameter specified in CCM mode of DSTU7624 standard. + /// This parameter specifies maximum possible length of input.It should + /// be calculated as follows: Nb = 1 / 8 * (-3 + log[2]Nmax) + 1, + /// where Nmax - length of input message in bits.For practical reasons + /// Nmax usually less than 4Gb, e.g. for Nmax = 2^32 - 1, Nb = 4. + /// + /// base cipher to use under CCM. + /// Nb value to use. + public KCcmBlockCipher(IBlockCipher engine, int Nb) + { + this.engine = engine; + this.macSize = engine.GetBlockSize(); + this.nonce = new byte[engine.GetBlockSize()]; + this.initialAssociatedText = new byte[engine.GetBlockSize()]; + this.mac = new byte[engine.GetBlockSize()]; + this.macBlock = new byte[engine.GetBlockSize()]; + this.G1 = new byte[engine.GetBlockSize()]; + this.buffer = new byte[engine.GetBlockSize()]; + this.s = new byte[engine.GetBlockSize()]; + this.counter = new byte[engine.GetBlockSize()]; + setNb(Nb); + } + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + + ICipherParameters cipherParameters; + if (parameters is AeadParameters) + { + + AeadParameters param = (AeadParameters)parameters; + + if (param.MacSize > MAX_MAC_BIT_LENGTH || param.MacSize < MIN_MAC_BIT_LENGTH || param.MacSize % 8 != 0) + { + throw new ArgumentException("Invalid mac size specified"); + } + + nonce = param.GetNonce(); + macSize = param.MacSize / BITS_IN_BYTE; + initialAssociatedText = param.GetAssociatedText(); + cipherParameters = param.Key; + } + else if (parameters is ParametersWithIV) + { + nonce = ((ParametersWithIV)parameters).GetIV(); + macSize = engine.GetBlockSize(); // use default blockSize for MAC if it is not specified + initialAssociatedText = null; + cipherParameters = ((ParametersWithIV)parameters).Parameters; + } + else + { + throw new ArgumentException("Invalid parameters specified"); + } + + this.mac = new byte[macSize]; + this.forEncryption = forEncryption; + engine.Init(true, cipherParameters); + + counter[0] = 0x01; // defined in standard + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + public virtual string AlgorithmName => engine.AlgorithmName + "/KCCM"; + + public virtual int GetBlockSize() + { + return engine.GetBlockSize(); + } + + public virtual IBlockCipher UnderlyingCipher => engine; + + public virtual void ProcessAadByte(byte input) + { + associatedText.WriteByte(input); + } + + public virtual void ProcessAadBytes(byte[] input, int inOff, int len) + { + associatedText.Write(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + associatedText.Write(input); + } +#endif + + private void ProcessAAD(byte[] assocText, int assocOff, int assocLen, int dataLen) + { + if (assocLen - assocOff < engine.GetBlockSize()) + { + throw new ArgumentException("authText buffer too short"); + } + if (assocLen % engine.GetBlockSize() != 0) + { + throw new ArgumentException("padding not supported"); + } + + Array.Copy(nonce, 0, G1, 0, nonce.Length - Nb_ - 1); + + intToBytes(dataLen, buffer, 0); // for G1 + + Array.Copy(buffer, 0, G1, nonce.Length - Nb_ - 1, BYTES_IN_INT); + + G1[G1.Length - 1] = getFlag(true, macSize); + + engine.ProcessBlock(G1, 0, macBlock, 0); + + intToBytes(assocLen, buffer, 0); // for G2 + + if (assocLen <= engine.GetBlockSize() - Nb_) + { + for (int byteIndex = 0; byteIndex < assocLen; byteIndex++) + { + buffer[byteIndex + Nb_] ^= assocText[assocOff + byteIndex]; + } + + for (int byteIndex = 0; byteIndex < engine.GetBlockSize(); byteIndex++) + { + macBlock[byteIndex] ^= buffer[byteIndex]; + } + + engine.ProcessBlock(macBlock, 0, macBlock, 0); + + return; + } + + for (int byteIndex = 0; byteIndex < engine.GetBlockSize(); byteIndex++) + { + macBlock[byteIndex] ^= buffer[byteIndex]; + } + + engine.ProcessBlock(macBlock, 0, macBlock, 0); + + int authLen = assocLen; + while (authLen != 0) + { + for (int byteIndex = 0; byteIndex < engine.GetBlockSize(); byteIndex++) + { + macBlock[byteIndex] ^= assocText[byteIndex + assocOff]; + } + + engine.ProcessBlock(macBlock, 0, macBlock, 0); + + assocOff += engine.GetBlockSize(); + authLen -= engine.GetBlockSize(); + } + } + + public virtual int ProcessByte(byte input, byte[] output, int outOff) + { + data.WriteByte(input); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + data.WriteByte(input); + + return 0; + } +#endif + + public virtual int ProcessBytes(byte[] input, int inOff, int inLen, byte[] output, int outOff) + { + Check.DataLength(input, inOff, inLen, "input buffer too short"); + + data.Write(input, inOff, inLen); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + data.Write(input); + + return 0; + } +#endif + + public int ProcessPacket(byte[] input, int inOff, int len, byte[] output, int outOff) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessPacket(input.AsSpan(inOff, len), output.AsSpan(outOff)); +#else + if (associatedText.Length > 0) + { + byte[] aad = associatedText.GetBuffer(); + int aadLen = Convert.ToInt32(associatedText.Length); + + int dataLen = Convert.ToInt32(data.Length) - (forEncryption ? 0 : macSize); + + ProcessAAD(aad, 0, aadLen, dataLen); + } + + if (forEncryption) + { + Check.DataLength(len % engine.GetBlockSize() != 0, "partial blocks not supported"); + + CalculateMac(input, inOff, len); + engine.ProcessBlock(nonce, 0, s, 0); + + int totalLength = len; + while (totalLength > 0) + { + ProcessBlock(input, inOff, output, outOff); + totalLength -= engine.GetBlockSize(); + inOff += engine.GetBlockSize(); + outOff += engine.GetBlockSize(); + } + + for (int byteIndex = 0; byteIndex inOff) + { + for (int byteIndex = 0; byteIndex input, Span output) + { + int len = input.Length; + Check.OutputLength(output, len, "output buffer too short"); + + if (associatedText.Length > 0) + { + byte[] aad = associatedText.GetBuffer(); + int aadLen = Convert.ToInt32(associatedText.Length); + + int dataLen = Convert.ToInt32(data.Length) - (forEncryption ? 0 : macSize); + + ProcessAAD(aad, 0, aadLen, dataLen); + } + + int blockSize = engine.GetBlockSize(), index = 0; + if (forEncryption) + { + Check.DataLength(len % blockSize != 0, "partial blocks not supported"); + + CalculateMac(input); + engine.ProcessBlock(nonce, s); + + int totalLength = len; + while (totalLength > 0) + { + ProcessBlock(input[index..], output[index..]); + totalLength -= blockSize; + index += blockSize; + } + + for (int byteIndex = 0; byteIndex < counter.Length; byteIndex++) + { + s[byteIndex] += counter[byteIndex]; + } + + engine.ProcessBlock(s, buffer); + + for (int byteIndex = 0; byteIndex < macSize; byteIndex++) + { + output[index + byteIndex] = (byte)(buffer[byteIndex] ^ macBlock[byteIndex]); + } + + Array.Copy(macBlock, 0, mac, 0, macSize); + + Reset(); + + return len + macSize; + } + else + { + Check.DataLength((len - macSize) % blockSize != 0, "partial blocks not supported"); + + engine.ProcessBlock(nonce, 0, s, 0); + + int blocks = len / engine.GetBlockSize(); + + for (int blockNum = 0; blockNum < blocks; blockNum++) + { + ProcessBlock(input[index..], output[index..]); + index += blockSize; + } + + if (len > index) + { + for (int byteIndex = 0; byteIndex < counter.Length; byteIndex++) + { + s[byteIndex] += counter[byteIndex]; + } + + engine.ProcessBlock(s, buffer); + + for (int byteIndex = 0; byteIndex < macSize; byteIndex++) + { + output[index + byteIndex] = (byte)(buffer[byteIndex] ^ input[index + byteIndex]); + } + index += macSize; + } + + for (int byteIndex = 0; byteIndex < counter.Length; byteIndex++) + { + s[byteIndex] += counter[byteIndex]; + } + + engine.ProcessBlock(s, buffer); + + output[(index - macSize)..index].CopyTo(buffer); + + CalculateMac(output[..(index - macSize)]); + + Array.Copy(macBlock, 0, mac, 0, macSize); + + Span calculatedMac = macSize <= 64 + ? stackalloc byte[macSize] + : new byte[macSize]; + + calculatedMac.CopyFrom(buffer); + + if (!Arrays.ConstantTimeAreEqual(mac.AsSpan(0, macSize), calculatedMac)) + throw new InvalidCipherTextException("mac check failed"); + + Reset(); + + return len - macSize; + } + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void CalculateMac(ReadOnlySpan authText) + { + int blockSize = engine.GetBlockSize(); + + while (!authText.IsEmpty) + { + for (int byteIndex = 0; byteIndex < blockSize; byteIndex++) + { + macBlock[byteIndex] ^= authText[byteIndex]; + } + + engine.ProcessBlock(macBlock, macBlock); + + authText = authText[blockSize..]; + } + } + + private void ProcessBlock(ReadOnlySpan input, Span output) + { + for (int byteIndex = 0; byteIndex < counter.Length; byteIndex++) + { + s[byteIndex] += counter[byteIndex]; + } + + engine.ProcessBlock(s, buffer); + + int blockSize = engine.GetBlockSize(); + for (int byteIndex = 0; byteIndex < blockSize; byteIndex++) + { + output[byteIndex] = (byte)(buffer[byteIndex] ^ input[byteIndex]); + } + } +#else + private void CalculateMac(byte[] authText, int authOff, int len) + { + int blockSize = engine.GetBlockSize(); + int totalLen = len; + while (totalLen > 0) + { + for (int byteIndex = 0; byteIndex < blockSize; byteIndex++) + { + macBlock[byteIndex] ^= authText[authOff + byteIndex]; + } + + engine.ProcessBlock(macBlock, 0, macBlock, 0); + + totalLen -= blockSize; + authOff += blockSize; + } + } + + private void ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + + for (int byteIndex = 0; byteIndex < counter.Length; byteIndex++) + { + s[byteIndex] += counter[byteIndex]; + } + + engine.ProcessBlock(s, 0, buffer, 0); + + for (int byteIndex = 0; byteIndex < engine.GetBlockSize(); byteIndex++) + { + output[outOff + byteIndex] = (byte)(buffer[byteIndex] ^ input[inOff + byteIndex]); + } + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + byte[] buf = data.GetBuffer(); + int bufLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(buf, 0, bufLen, output, outOff); + + Reset(); + + return len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + byte[] buf = data.GetBuffer(); + int bufLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(buf.AsSpan(0, bufLen), output); + + Reset(); + + return len; + } +#endif + + public virtual byte[] GetMac() + { + return Arrays.Clone(mac); + } + + public virtual int GetUpdateOutputSize(int len) + { + return len; + } + + public virtual int GetOutputSize(int len) + { + return len + macSize; + } + + public virtual void Reset() + { + Arrays.Fill(G1, (byte)0); + Arrays.Fill(buffer, (byte)0); + Arrays.Fill(counter, (byte)0); + Arrays.Fill(macBlock, (byte)0); + + counter[0] = 0x01; + data.SetLength(0); + associatedText.SetLength(0); + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + private void intToBytes( + int num, + byte[] outBytes, + int outOff) + { + outBytes[outOff + 3] = (byte)(num >> 24); + outBytes[outOff + 2] = (byte)(num >> 16); + outBytes[outOff + 1] = (byte)(num >> 8); + outBytes[outOff] = (byte)num; + } + + private byte getFlag(bool authTextPresents, int macSize) + { + StringBuilder flagByte = new StringBuilder(); + + if (authTextPresents) + { + flagByte.Append("1"); + } + else + { + flagByte.Append("0"); + } + + + switch (macSize) + { + case 8: + flagByte.Append("010"); // binary 2 + break; + case 16: + flagByte.Append("011"); // binary 3 + break; + case 32: + flagByte.Append("100"); // binary 4 + break; + case 48: + flagByte.Append("101"); // binary 5 + break; + case 64: + flagByte.Append("110"); // binary 6 + break; + } + + string binaryNb = Convert.ToString(Nb_ - 1, 2); + while (binaryNb.Length < 4) + { + binaryNb = new StringBuilder(binaryNb).Insert(0, "0").ToString(); + } + + flagByte.Append(binaryNb); + + return (byte)Convert.ToInt32(flagByte.ToString(), 2); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs.meta new file mode 100644 index 00000000..1ea79692 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10ee1b085eab17c499ed6a8b5e685402 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCcmBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs new file mode 100644 index 00000000..589a2428 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs @@ -0,0 +1,250 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * Implements a Gamming or Counter (CTR) mode on top of a DSTU 7624 block cipher. + */ + public class KCtrBlockCipher + : IStreamCipher, IBlockCipherMode + { + private byte[] IV; + private byte[] ofbV; + private byte[] ofbOutV; + private bool initialised; + + private int byteCount; + + private readonly int blockSize; + private readonly IBlockCipher cipher; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * feedback mode. + */ + public KCtrBlockCipher(IBlockCipher cipher) + { + this.cipher = cipher; + this.IV = new byte[cipher.GetBlockSize()]; + this.blockSize = cipher.GetBlockSize(); + + this.ofbV = new byte[cipher.GetBlockSize()]; + this.ofbOutV = new byte[cipher.GetBlockSize()]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init( + bool forEncryption, + ICipherParameters parameters) + { + this.initialised = true; + if (parameters is ParametersWithIV) + { + ParametersWithIV ivParam = (ParametersWithIV)parameters; + byte[] iv = ivParam.GetIV(); + int diff = IV.Length - iv.Length; + + Array.Clear(IV, 0, IV.Length); + Array.Copy(iv, 0, IV, diff, iv.Length); + + parameters = ivParam.Parameters; + } + else + { + throw new ArgumentException("Invalid parameter passed"); + } + + // if it's null, key is to be reused. + if (parameters != null) + { + cipher.Init(true, parameters); + } + + Reset(); + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/KCTR" + * and the block size in bits. + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/KCTR"; } + } + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at. + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public byte ReturnByte(byte input) + { + return CalculateByte(input); + } + + public void ProcessBytes(byte[] input, int inOff, int len, byte[] output, int outOff) + { + Check.DataLength(input, inOff, len, "input buffer too small"); + Check.OutputLength(output, outOff, len, "output buffer too short"); + + int inStart = inOff; + int inEnd = inOff + len; + int outStart = outOff; + + while (inStart < inEnd) + { + output[outStart++] = CalculateByte(input[inStart++]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ProcessBytes(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, input.Length, "output buffer too short"); + + for (int i = 0; i < input.Length; ++i) + { + output[i] = CalculateByte(input[i]); + } + } +#endif + + protected byte CalculateByte(byte b) + { + if (byteCount == 0) + { + incrementCounterAt(0); + + checkCounter(); + + cipher.ProcessBlock(ofbV, 0, ofbOutV, 0); + + return (byte)(ofbOutV[byteCount++] ^ b); + } + + byte rv = (byte)(ofbOutV[byteCount++] ^ b); + + if (byteCount == ofbV.Length) + { + byteCount = 0; + } + + return rv; + } + + /** + * Process one block of input from the array in and write it to + * the out array. + * + * @param input the array containing the input data. + * @param inOff offset into the in array the data starts at. + * @param output the array the output data will be copied into. + * @param outOff the offset into the out array the output will start at. + * @exception DataLengthException if there isn't enough data in in, or + * space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + * @return the number of bytes processed and produced. + */ + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + int blockSize = GetBlockSize(); + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(output, outOff, blockSize, "output buffer too short"); + + ProcessBytes(input, inOff, blockSize, output, outOff); + + return blockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + int blockSize = GetBlockSize(); + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + ProcessBytes(input[..blockSize], output); + + return blockSize; + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + if (initialised) + { + cipher.ProcessBlock(IV, 0, ofbV, 0); + } + byteCount = 0; + } + + private void incrementCounterAt(int pos) + { + int i = pos; + while (i < ofbV.Length) + { + if (++ofbV[i++] != 0) + { + break; + } + } + } + + private void checkCounter() + { + // TODO: + // if the IV is the same as the blocksize we assume the user knows what they are doing + // if (IV.length < ofbV.length) + // { + // for (int i = 0; i != IV.length; i++) + // { + // if (ofbV[i] != IV[i]) + // { + // throw new IllegalStateException("Counter in KCTR mode out of range."); + // } + // } + // } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs.meta new file mode 100644 index 00000000..0e7fea92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b0202ca81530df4b96670290d02e774 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/KCtrBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs new file mode 100644 index 00000000..93409488 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs @@ -0,0 +1,734 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /// An implementation of RFC 7253 on The OCB + /// Authenticated-Encryption Algorithm. + /// + /// For those still concerned about the original patents around this, please see: + /// https://mailarchive.ietf.org/arch/msg/cfrg/qLTveWOdTJcLn4HP3ev-vrj05Vg/ + /// Text reproduced below: + /// + /// Phillip Rogaway<rogaway@cs.ucdavis.edu> Sat, 27 February 2021 02:46 UTC + /// + /// I can confirm that I have abandoned all OCB patents and placed into the public domain all OCB-related IP of + /// mine. While I have been telling people this for quite some time, I don't think I ever made a proper announcement + /// to the CFRG or on the OCB webpage. Consider that done. + /// + /// + public class OcbBlockCipher + : IAeadBlockCipher + { + private const int BLOCK_SIZE = 16; + + private readonly IBlockCipher hashCipher; + private readonly IBlockCipher mainCipher; + + /* + * CONFIGURATION + */ + private bool forEncryption; + private int macSize; + private byte[] initialAssociatedText; + + /* + * KEY-DEPENDENT + */ + // NOTE: elements are lazily calculated + private IList L; + private byte[] L_Asterisk, L_Dollar; + + /* + * NONCE-DEPENDENT + */ + private byte[] KtopInput = null; + private byte[] Stretch = new byte[24]; + private byte[] OffsetMAIN_0 = new byte[16]; + + /* + * PER-ENCRYPTION/DECRYPTION + */ + private byte[] hashBlock, mainBlock; + private int hashBlockPos, mainBlockPos; + private long hashBlockCount, mainBlockCount; + private byte[] OffsetHASH; + private byte[] Sum; + private byte[] OffsetMAIN = new byte[16]; + private byte[] Checksum; + + // NOTE: The MAC value is preserved after doFinal + private byte[] macBlock; + + public OcbBlockCipher(IBlockCipher hashCipher, IBlockCipher mainCipher) + { + if (hashCipher == null) + throw new ArgumentNullException("hashCipher"); + if (hashCipher.GetBlockSize() != BLOCK_SIZE) + throw new ArgumentException("must have a block size of " + BLOCK_SIZE, "hashCipher"); + if (mainCipher == null) + throw new ArgumentNullException("mainCipher"); + if (mainCipher.GetBlockSize() != BLOCK_SIZE) + throw new ArgumentException("must have a block size of " + BLOCK_SIZE, "mainCipher"); + + if (!hashCipher.AlgorithmName.Equals(mainCipher.AlgorithmName)) + throw new ArgumentException("'hashCipher' and 'mainCipher' must be the same algorithm"); + + this.hashCipher = hashCipher; + this.mainCipher = mainCipher; + } + + public virtual string AlgorithmName => mainCipher.AlgorithmName + "/OCB"; + + public virtual IBlockCipher UnderlyingCipher => mainCipher; + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + bool oldForEncryption = this.forEncryption; + this.forEncryption = forEncryption; + this.macBlock = null; + + KeyParameter keyParameter; + + byte[] N; + if (parameters is AeadParameters aeadParameters) + { + N = aeadParameters.GetNonce(); + initialAssociatedText = aeadParameters.GetAssociatedText(); + + int macSizeBits = aeadParameters.MacSize; + if (macSizeBits < 64 || macSizeBits > 128 || macSizeBits % 8 != 0) + throw new ArgumentException("Invalid value for MAC size: " + macSizeBits); + + macSize = macSizeBits / 8; + keyParameter = aeadParameters.Key; + } + else if (parameters is ParametersWithIV parametersWithIV) + { + N = parametersWithIV.GetIV(); + initialAssociatedText = null; + macSize = 16; + keyParameter = (KeyParameter) parametersWithIV.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to OCB"); + } + + this.hashBlock = new byte[16]; + this.mainBlock = new byte[forEncryption ? BLOCK_SIZE : (BLOCK_SIZE + macSize)]; + + if (N == null) + { + N = new byte[0]; + } + + if (N.Length > 15) + { + throw new ArgumentException("IV must be no more than 15 bytes"); + } + + /* + * KEY-DEPENDENT INITIALISATION + */ + + if (keyParameter != null) + { + // hashCipher always used in forward mode + hashCipher.Init(true, keyParameter); + mainCipher.Init(forEncryption, keyParameter); + KtopInput = null; + } + else if (oldForEncryption != forEncryption) + { + throw new ArgumentException("cannot change encrypting state without providing key."); + } + + this.L_Asterisk = new byte[16]; + hashCipher.ProcessBlock(L_Asterisk, 0, L_Asterisk, 0); + + this.L_Dollar = OCB_double(L_Asterisk); + + this.L = new List(); + this.L.Add(OCB_double(L_Dollar)); + + /* + * NONCE-DEPENDENT AND PER-ENCRYPTION/DECRYPTION INITIALISATION + */ + + int bottom = ProcessNonce(N); + + int bits = bottom % 8, bytes = bottom / 8; + if (bits == 0) + { + Array.Copy(Stretch, bytes, OffsetMAIN_0, 0, 16); + } + else + { + for (int i = 0; i < 16; ++i) + { + uint b1 = Stretch[bytes]; + uint b2 = Stretch[++bytes]; + this.OffsetMAIN_0[i] = (byte) ((b1 << bits) | (b2 >> (8 - bits))); + } + } + + this.hashBlockPos = 0; + this.mainBlockPos = 0; + + this.hashBlockCount = 0; + this.mainBlockCount = 0; + + this.OffsetHASH = new byte[16]; + this.Sum = new byte[16]; + Array.Copy(OffsetMAIN_0, 0, OffsetMAIN, 0, 16); + this.Checksum = new byte[16]; + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + protected virtual int ProcessNonce(byte[] N) + { + byte[] nonce = new byte[16]; + Array.Copy(N, 0, nonce, nonce.Length - N.Length, N.Length); + nonce[0] = (byte)(macSize << 4); + nonce[15 - N.Length] |= 1; + + int bottom = nonce[15] & 0x3F; + nonce[15] &= 0xC0; + + /* + * When used with incrementing nonces, the cipher is only applied once every 64 inits. + */ + if (KtopInput == null || !Arrays.AreEqual(nonce, KtopInput)) + { + byte[] Ktop = new byte[16]; + KtopInput = nonce; + hashCipher.ProcessBlock(KtopInput, 0, Ktop, 0); + Array.Copy(Ktop, 0, Stretch, 0, 16); + for (int i = 0; i < 8; ++i) + { + Stretch[16 + i] = (byte)(Ktop[i] ^ Ktop[i + 1]); + } + } + + return bottom; + } + + public virtual int GetBlockSize() + { + return BLOCK_SIZE; + } + + public virtual byte[] GetMac() + { + return macBlock == null + ? new byte[macSize] + : Arrays.Clone(macBlock); + } + + public virtual int GetOutputSize(int len) + { + int totalData = len + mainBlockPos; + if (forEncryption) + { + return totalData + macSize; + } + return totalData < macSize ? 0 : totalData - macSize; + } + + public virtual int GetUpdateOutputSize(int len) + { + int totalData = len + mainBlockPos; + if (!forEncryption) + { + if (totalData < macSize) + { + return 0; + } + totalData -= macSize; + } + return totalData - totalData % BLOCK_SIZE; + } + + public virtual void ProcessAadByte(byte input) + { + hashBlock[hashBlockPos] = input; + if (++hashBlockPos == hashBlock.Length) + { + ProcessHashBlock(); + } + } + + public virtual void ProcessAadBytes(byte[] input, int off, int len) + { + for (int i = 0; i < len; ++i) + { + hashBlock[hashBlockPos] = input[off + i]; + if (++hashBlockPos == hashBlock.Length) + { + ProcessHashBlock(); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + for (int i = 0; i < input.Length; ++i) + { + hashBlock[hashBlockPos] = input[i]; + if (++hashBlockPos == hashBlock.Length) + { + ProcessHashBlock(); + } + } + } +#endif + + public virtual int ProcessByte(byte input, byte[] output, int outOff) + { + mainBlock[mainBlockPos] = input; + if (++mainBlockPos == mainBlock.Length) + { + ProcessMainBlock(output, outOff); + return BLOCK_SIZE; + } + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + mainBlock[mainBlockPos] = input; + if (++mainBlockPos == mainBlock.Length) + { + ProcessMainBlock(output); + return BLOCK_SIZE; + } + return 0; + } +#endif + + public virtual int ProcessBytes(byte[] input, int inOff, int len, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(input.AsSpan(inOff, len), Spans.FromNullable(output, outOff)); +#else + int resultLen = 0; + + for (int i = 0; i < len; ++i) + { + mainBlock[mainBlockPos] = input[inOff + i]; + if (++mainBlockPos == mainBlock.Length) + { + ProcessMainBlock(output, outOff + resultLen); + resultLen += BLOCK_SIZE; + } + } + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + int len = input.Length; + int resultLen = 0; + + for (int i = 0; i < len; ++i) + { + mainBlock[mainBlockPos] = input[i]; + if (++mainBlockPos == mainBlock.Length) + { + ProcessMainBlock(output[resultLen..]); + resultLen += BLOCK_SIZE; + } + } + + return resultLen; + } +#endif + + public virtual int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + /* + * For decryption, get the tag from the end of the message + */ + byte[] tag = null; + if (!forEncryption) { + if (mainBlockPos < macSize) + throw new InvalidCipherTextException("data too short"); + + mainBlockPos -= macSize; + tag = new byte[macSize]; + Array.Copy(mainBlock, mainBlockPos, tag, 0, macSize); + } + + /* + * HASH: Process any final partial block; compute final hash value + */ + if (hashBlockPos > 0) + { + OCB_extend(hashBlock, hashBlockPos); + UpdateHASH(L_Asterisk); + } + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Process any final partial block + */ + if (mainBlockPos > 0) + { + if (forEncryption) + { + OCB_extend(mainBlock, mainBlockPos); + Xor(Checksum, mainBlock); + } + + Xor(OffsetMAIN, L_Asterisk); + + byte[] Pad = new byte[16]; + hashCipher.ProcessBlock(OffsetMAIN, 0, Pad, 0); + + Xor(mainBlock, Pad); + + Check.OutputLength(output, outOff, mainBlockPos, "output buffer too short"); + Array.Copy(mainBlock, 0, output, outOff, mainBlockPos); + + if (!forEncryption) + { + OCB_extend(mainBlock, mainBlockPos); + Xor(Checksum, mainBlock); + } + } + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Compute raw tag + */ + Xor(Checksum, OffsetMAIN); + Xor(Checksum, L_Dollar); + hashCipher.ProcessBlock(Checksum, 0, Checksum, 0); + Xor(Checksum, Sum); + + this.macBlock = new byte[macSize]; + Array.Copy(Checksum, 0, macBlock, 0, macSize); + + /* + * Validate or append tag and reset this cipher for the next run + */ + int resultLen = mainBlockPos; + + if (forEncryption) + { + Check.OutputLength(output, outOff, resultLen + macSize, "output buffer too short"); + + // Append tag to the message + Array.Copy(macBlock, 0, output, outOff + resultLen, macSize); + resultLen += macSize; + } + else + { + // Compare the tag from the message with the calculated one + if (!Arrays.ConstantTimeAreEqual(macBlock, tag)) + throw new InvalidCipherTextException("mac check in OCB failed"); + } + + Reset(false); + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + /* + * For decryption, get the tag from the end of the message + */ + byte[] tag = null; + if (!forEncryption) + { + if (mainBlockPos < macSize) + throw new InvalidCipherTextException("data too short"); + + mainBlockPos -= macSize; + tag = new byte[macSize]; + Array.Copy(mainBlock, mainBlockPos, tag, 0, macSize); + } + + /* + * HASH: Process any final partial block; compute final hash value + */ + if (hashBlockPos > 0) + { + OCB_extend(hashBlock, hashBlockPos); + UpdateHASH(L_Asterisk); + } + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Process any final partial block + */ + if (mainBlockPos > 0) + { + if (forEncryption) + { + OCB_extend(mainBlock, mainBlockPos); + Xor(Checksum, mainBlock); + } + + Xor(OffsetMAIN, L_Asterisk); + + byte[] Pad = new byte[16]; + hashCipher.ProcessBlock(OffsetMAIN, 0, Pad, 0); + + Xor(mainBlock, Pad); + + Check.OutputLength(output, mainBlockPos, "output buffer too short"); + mainBlock.AsSpan(0, mainBlockPos).CopyTo(output); + + if (!forEncryption) + { + OCB_extend(mainBlock, mainBlockPos); + Xor(Checksum, mainBlock); + } + } + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Compute raw tag + */ + Xor(Checksum, OffsetMAIN); + Xor(Checksum, L_Dollar); + hashCipher.ProcessBlock(Checksum, 0, Checksum, 0); + Xor(Checksum, Sum); + + this.macBlock = new byte[macSize]; + Array.Copy(Checksum, 0, macBlock, 0, macSize); + + /* + * Validate or append tag and reset this cipher for the next run + */ + int resultLen = mainBlockPos; + + if (forEncryption) + { + // Append tag to the message + Check.OutputLength(output, resultLen + macSize, "output buffer too short"); + macBlock.AsSpan(0, macSize).CopyTo(output[resultLen..]); + resultLen += macSize; + } + else + { + // Compare the tag from the message with the calculated one + if (!Arrays.ConstantTimeAreEqual(macBlock, tag)) + throw new InvalidCipherTextException("mac check in OCB failed"); + } + + Reset(false); + + return resultLen; + } +#endif + + public virtual void Reset() + { + Reset(true); + } + + protected virtual void Clear(byte[] bs) + { + if (bs != null) + { + Array.Clear(bs, 0, bs.Length); + } + } + + protected virtual byte[] GetLSub(int n) + { + while (n >= L.Count) + { + L.Add(OCB_double(L[L.Count - 1])); + } + return L[n]; + } + + protected virtual void ProcessHashBlock() + { + /* + * HASH: Process any whole blocks + */ + UpdateHASH(GetLSub(OCB_ntz(++hashBlockCount))); + hashBlockPos = 0; + } + + protected virtual void ProcessMainBlock(byte[] output, int outOff) + { + Check.DataLength(output, outOff, BLOCK_SIZE, "Output buffer too short"); + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Process any whole blocks + */ + + if (forEncryption) + { + Xor(Checksum, mainBlock); + mainBlockPos = 0; + } + + Xor(OffsetMAIN, GetLSub(OCB_ntz(++mainBlockCount))); + + Xor(mainBlock, OffsetMAIN); + mainCipher.ProcessBlock(mainBlock, 0, mainBlock, 0); + Xor(mainBlock, OffsetMAIN); + + Array.Copy(mainBlock, 0, output, outOff, 16); + + if (!forEncryption) + { + Xor(Checksum, mainBlock); + Array.Copy(mainBlock, BLOCK_SIZE, mainBlock, 0, macSize); + mainBlockPos = macSize; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected virtual void ProcessMainBlock(Span output) + { + Check.DataLength(output, BLOCK_SIZE, "output buffer too short"); + + /* + * OCB-ENCRYPT/OCB-DECRYPT: Process any whole blocks + */ + + if (forEncryption) + { + Xor(Checksum, mainBlock); + mainBlockPos = 0; + } + + Xor(OffsetMAIN, GetLSub(OCB_ntz(++mainBlockCount))); + + Xor(mainBlock, OffsetMAIN); + mainCipher.ProcessBlock(mainBlock, 0, mainBlock, 0); + Xor(mainBlock, OffsetMAIN); + + mainBlock.AsSpan(0, BLOCK_SIZE).CopyTo(output); + + if (!forEncryption) + { + Xor(Checksum, mainBlock); + Array.Copy(mainBlock, BLOCK_SIZE, mainBlock, 0, macSize); + mainBlockPos = macSize; + } + } +#endif + + protected virtual void Reset(bool clearMac) + { + Clear(hashBlock); + Clear(mainBlock); + + hashBlockPos = 0; + mainBlockPos = 0; + + hashBlockCount = 0; + mainBlockCount = 0; + + Clear(OffsetHASH); + Clear(Sum); + Array.Copy(OffsetMAIN_0, 0, OffsetMAIN, 0, 16); + Clear(Checksum); + + if (clearMac) + { + macBlock = null; + } + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + protected virtual void UpdateHASH(byte[] LSub) + { + Xor(OffsetHASH, LSub); + Xor(hashBlock, OffsetHASH); + hashCipher.ProcessBlock(hashBlock, 0, hashBlock, 0); + Xor(Sum, hashBlock); + } + + protected static byte[] OCB_double(byte[] block) + { + byte[] result = new byte[16]; + int carry = ShiftLeft(block, result); + + /* + * NOTE: This construction is an attempt at a constant-time implementation. + */ + result[15] ^= (byte)(0x87 >> ((1 - carry) << 3)); + + return result; + } + + protected static void OCB_extend(byte[] block, int pos) + { + block[pos] = (byte) 0x80; + while (++pos < 16) + { + block[pos] = 0; + } + } + + protected static int OCB_ntz(long x) + { + if (x == 0) + { + return 64; + } + + int n = 0; + ulong ux = (ulong)x; + while ((ux & 1UL) == 0UL) + { + ++n; + ux >>= 1; + } + return n; + } + + protected static int ShiftLeft(byte[] block, byte[] output) + { + int i = 16; + uint bit = 0; + while (--i >= 0) + { + uint b = block[i]; + output[i] = (byte) ((b << 1) | bit); + bit = (b >> 7) & 1; + } + return (int)bit; + } + + protected static void Xor(byte[] block, byte[] val) + { + for (int i = 15; i >= 0; --i) + { + block[i] ^= val[i]; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs.meta new file mode 100644 index 00000000..2e379c36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2230f3f7676b64c429e0e63970bc1554 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OCBBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs new file mode 100644 index 00000000..bca54036 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs @@ -0,0 +1,182 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * implements a Output-FeedBack (OFB) mode on top of a simple cipher. + */ + public class OfbBlockCipher + : IBlockCipherMode + { + private byte[] IV; + private byte[] ofbV; + private byte[] ofbOutV; + + private readonly int blockSize; + private readonly IBlockCipher cipher; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * feedback mode. + * @param blockSize the block size in bits (note: a multiple of 8) + */ + public OfbBlockCipher( + IBlockCipher cipher, + int blockSize) + { + this.cipher = cipher; + this.blockSize = blockSize / 8; + + this.IV = new byte[cipher.GetBlockSize()]; + this.ofbV = new byte[cipher.GetBlockSize()]; + this.ofbOutV = new byte[cipher.GetBlockSize()]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init( + bool forEncryption, //ignored by this OFB mode + ICipherParameters parameters) + { + if (parameters is ParametersWithIV ivParam) + { + byte[] iv = ivParam.GetIV(); + + if (iv.Length < IV.Length) + { + // prepend the supplied IV with zeros (per FIPS PUB 81) + Array.Copy(iv, 0, IV, IV.Length - iv.Length, iv.Length); + for (int i = 0; i < IV.Length - iv.Length; i++) + { + IV[i] = 0; + } + } + else + { + Array.Copy(iv, 0, IV, 0, IV.Length); + } + + parameters = ivParam.Parameters; + } + + Reset(); + + // if it's null, key is to be reused. + if (parameters != null) + { + cipher.Init(true, parameters); + } + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/OFB" + * and the block size in bits + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/OFB" + (blockSize * 8); } + } + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at (in bytes). + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return blockSize; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(output, outOff, blockSize, "output buffer too short"); + + cipher.ProcessBlock(ofbV, 0, ofbOutV, 0); + + // + // XOR the ofbV with the plaintext producing the cipher text (and + // the next input block). + // + for (int i = 0; i < blockSize; i++) + { + output[outOff + i] = (byte)(ofbOutV[i] ^ input[inOff + i]); + } + + // + // change over the input block. + // + Array.Copy(ofbV, blockSize, ofbV, 0, ofbV.Length - blockSize); + Array.Copy(ofbOutV, 0, ofbV, ofbV.Length - blockSize, blockSize); + + return blockSize; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + cipher.ProcessBlock(ofbV, ofbOutV); + + // + // XOR the ofbV with the plaintext producing the cipher text (and + // the next input block). + // + for (int i = 0; i < blockSize; i++) + { + output[i] = (byte)(ofbOutV[i] ^ input[i]); + } + + // + // change over the input block. + // + Array.Copy(ofbV, blockSize, ofbV, 0, ofbV.Length - blockSize); + Array.Copy(ofbOutV, 0, ofbV, ofbV.Length - blockSize, blockSize); + + return blockSize; + } +#endif + + /** + * reset the feedback vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + Array.Copy(IV, 0, ofbV, 0, IV.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs.meta new file mode 100644 index 00000000..8314a07a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 155ab1dea42532a47bb238a7232b5908 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OfbBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs new file mode 100644 index 00000000..c3ff3a5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs @@ -0,0 +1,409 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * Implements OpenPGP's rather strange version of Cipher-FeedBack (CFB) mode + * on top of a simple cipher. This class assumes the IV has been prepended + * to the data stream already, and just accomodates the reset after + * (blockSize + 2) bytes have been read. + *

+ * For further info see RFC 2440. + *

+ */ + public class OpenPgpCfbBlockCipher + : IBlockCipherMode + { + private byte[] IV; + private byte[] FR; + private byte[] FRE; + + private readonly IBlockCipher cipher; + private readonly int blockSize; + + private int count; + private bool forEncryption; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of the + * feedback mode. + */ + public OpenPgpCfbBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + + this.blockSize = cipher.GetBlockSize(); + this.IV = new byte[blockSize]; + this.FR = new byte[blockSize]; + this.FRE = new byte[blockSize]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/PGPCFB" + * and the block size in bits. + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/OpenPGPCFB"; } + } + + public bool IsPartialBlockOkay + { + get { return true; } + } + + /** + * return the block size we are operating at. + * + * @return the block size we are operating at (in bytes). + */ + public int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return forEncryption + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return forEncryption + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + return forEncryption + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + count = 0; + + Array.Copy(IV, 0, FR, 0, FR.Length); + } + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * An IV which is too short is handled in FIPS compliant fashion. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param parameters the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + if (parameters is ParametersWithIV ivParam) + { + byte[] iv = ivParam.GetIV(); + + if (iv.Length < IV.Length) + { + // prepend the supplied IV with zeros (per FIPS PUB 81) + Array.Copy(iv, 0, IV, IV.Length - iv.Length, iv.Length); + for (int i = 0; i < IV.Length - iv.Length; i++) + { + IV[i] = 0; + } + } + else + { + Array.Copy(iv, 0, IV, 0, IV.Length); + } + + parameters = ivParam.Parameters; + } + + Reset(); + + cipher.Init(true, parameters); + } + + /** + * Encrypt one byte of data according to CFB mode. + * @param data the byte to encrypt + * @param blockOff offset in the current block + * @returns the encrypted byte + */ + private byte EncryptByte(byte data, int blockOff) + { + return (byte)(FRE[blockOff] ^ data); + } + + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + if (count > blockSize) + { + FR[blockSize - 2] = output[0] = EncryptByte(input[0], blockSize - 2); + FR[blockSize - 1] = output[1] = EncryptByte(input[1], blockSize - 1); + + cipher.ProcessBlock(FR, FRE); + + for (int n = 2; n < blockSize; n++) + { + FR[n - 2] = output[n] = EncryptByte(input[n], n - 2); + } + } + else if (count == 0) + { + cipher.ProcessBlock(FR, FRE); + + for (int n = 0; n < blockSize; n++) + { + FR[n] = output[n] = EncryptByte(input[n], n); + } + + count += blockSize; + } + else if (count == blockSize) + { + cipher.ProcessBlock(FR, FRE); + + output[0] = EncryptByte(input[0], 0); + output[1] = EncryptByte(input[1], 1); + + // + // do reset + // + Array.Copy(FR, 2, FR, 0, blockSize - 2); + output[..2].CopyTo(FR.AsSpan(blockSize - 2)); + + cipher.ProcessBlock(FR, FRE); + + for (int n = 2; n < blockSize; n++) + { + FR[n - 2] = output[n] = EncryptByte(input[n], n - 2); + } + + count += blockSize; + } + + return blockSize; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + if (count > blockSize) + { + byte inVal = input[0]; + FR[blockSize - 2] = inVal; + output[0] = EncryptByte(inVal, blockSize - 2); + + inVal = input[1]; + FR[blockSize - 1] = inVal; + output[1] = EncryptByte(inVal, blockSize - 1); + + cipher.ProcessBlock(FR, FRE); + + for (int n = 2; n < blockSize; n++) + { + inVal = input[n]; + FR[n - 2] = inVal; + output[n] = EncryptByte(inVal, n - 2); + } + } + else if (count == 0) + { + cipher.ProcessBlock(FR, FRE); + + for (int n = 0; n < blockSize; n++) + { + FR[n] = input[n]; + output[n] = EncryptByte(input[n], n); + } + + count += blockSize; + } + else if (count == blockSize) + { + cipher.ProcessBlock(FR, 0, FRE, 0); + + byte inVal1 = input[0]; + byte inVal2 = input[1]; + output[0] = EncryptByte(inVal1, 0); + output[1] = EncryptByte(inVal2, 1); + + Array.Copy(FR, 2, FR, 0, blockSize - 2); + + FR[blockSize - 2] = inVal1; + FR[blockSize - 1] = inVal2; + + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 2; n < blockSize; n++) + { + byte inVal = input[n]; + FR[n - 2] = inVal; + output[n] = EncryptByte(inVal, n - 2); + } + + count += blockSize; + } + + return blockSize; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + if (count > blockSize) + { + FR[blockSize - 2] = outBytes[outOff] = EncryptByte(input[inOff], blockSize - 2); + FR[blockSize - 1] = outBytes[outOff + 1] = EncryptByte(input[inOff + 1], blockSize - 1); + + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 2; n < blockSize; n++) + { + FR[n - 2] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n - 2); + } + } + else if (count == 0) + { + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 0; n < blockSize; n++) + { + FR[n] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n); + } + + count += blockSize; + } + else if (count == blockSize) + { + cipher.ProcessBlock(FR, 0, FRE, 0); + + outBytes[outOff] = EncryptByte(input[inOff], 0); + outBytes[outOff + 1] = EncryptByte(input[inOff + 1], 1); + + // + // do reset + // + Array.Copy(FR, 2, FR, 0, blockSize - 2); + Array.Copy(outBytes, outOff, FR, blockSize - 2, 2); + + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 2; n < blockSize; n++) + { + FR[n - 2] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n - 2); + } + + count += blockSize; + } + + return blockSize; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + if (count > blockSize) + { + byte inVal = input[inOff]; + FR[blockSize - 2] = inVal; + outBytes[outOff] = EncryptByte(inVal, blockSize - 2); + + inVal = input[inOff + 1]; + FR[blockSize - 1] = inVal; + outBytes[outOff + 1] = EncryptByte(inVal, blockSize - 1); + + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 2; n < blockSize; n++) + { + inVal = input[inOff + n]; + FR[n - 2] = inVal; + outBytes[outOff + n] = EncryptByte(inVal, n - 2); + } + } + else if (count == 0) + { + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 0; n < blockSize; n++) + { + FR[n] = input[inOff + n]; + outBytes[outOff + n] = EncryptByte(input[inOff + n], n); + } + + count += blockSize; + } + else if (count == blockSize) + { + cipher.ProcessBlock(FR, 0, FRE, 0); + + byte inVal1 = input[inOff]; + byte inVal2 = input[inOff + 1]; + outBytes[outOff ] = EncryptByte(inVal1, 0); + outBytes[outOff + 1] = EncryptByte(inVal2, 1); + + Array.Copy(FR, 2, FR, 0, blockSize - 2); + + FR[blockSize - 2] = inVal1; + FR[blockSize - 1] = inVal2; + + cipher.ProcessBlock(FR, 0, FRE, 0); + + for (int n = 2; n < blockSize; n++) + { + byte inVal = input[inOff + n]; + FR[n - 2] = inVal; + outBytes[outOff + n] = EncryptByte(inVal, n - 2); + } + + count += blockSize; + } + + return blockSize; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs.meta new file mode 100644 index 00000000..01669ae7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5cda7b7eef6b9442b7823faaccbbd70 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/OpenPgpCfbBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs new file mode 100644 index 00000000..7b48ba86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs @@ -0,0 +1,139 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes +{ + /** + * Implements the Segmented Integer Counter (SIC) mode on top of a simple + * block cipher. + */ + public class SicBlockCipher + : IBlockCipherMode + { + private readonly IBlockCipher cipher; + private readonly int blockSize; + private readonly byte[] counter; + private readonly byte[] counterOut; + private byte[] IV; + + /** + * Basic constructor. + * + * @param c the block cipher to be used. + */ + public SicBlockCipher(IBlockCipher cipher) + { + this.cipher = cipher; + this.blockSize = cipher.GetBlockSize(); + this.counter = new byte[blockSize]; + this.counterOut = new byte[blockSize]; + this.IV = new byte[blockSize]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + public virtual void Init( + bool forEncryption, //ignored by this CTR mode + ICipherParameters parameters) + { + ParametersWithIV ivParam = parameters as ParametersWithIV; + if (ivParam == null) + throw new ArgumentException("CTR/SIC mode requires ParametersWithIV", "parameters"); + + this.IV = Arrays.Clone(ivParam.GetIV()); + + if (blockSize < IV.Length) + throw new ArgumentException("CTR/SIC mode requires IV no greater than: " + blockSize + " bytes."); + + int maxCounterSize = System.Math.Min(8, blockSize / 2); + if (blockSize - IV.Length > maxCounterSize) + throw new ArgumentException("CTR/SIC mode requires IV of at least: " + (blockSize - maxCounterSize) + " bytes."); + + // if null it's an IV changed only. + if (ivParam.Parameters != null) + { + cipher.Init(true, ivParam.Parameters); + } + + Reset(); + } + + public virtual string AlgorithmName + { + get { return cipher.AlgorithmName + "/SIC"; } + } + + public virtual bool IsPartialBlockOkay + { + get { return true; } + } + + public virtual int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + cipher.ProcessBlock(counter, 0, counterOut, 0); + + // + // XOR the counterOut with the plaintext producing the cipher text + // + for (int i = 0; i < counterOut.Length; i++) + { + output[outOff + i] = (byte)(counterOut[i] ^ input[inOff + i]); + } + + // Increment the counter + int j = counter.Length; + while (--j >= 0 && ++counter[j] == 0) + { + } + + return counter.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + cipher.ProcessBlock(counter, 0, counterOut, 0); + + // + // XOR the counterOut with the plaintext producing the cipher text + // + for (int i = 0; i < counterOut.Length; i++) + { + output[i] = (byte)(counterOut[i] ^ input[i]); + } + + // Increment the counter + int j = counter.Length; + while (--j >= 0 && ++counter[j] == 0) + { + } + + return counter.Length; + } +#endif + + public virtual void Reset() + { + Arrays.Fill(counter, (byte)0); + Array.Copy(IV, 0, counter, 0, IV.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs.meta new file mode 100644 index 00000000..ff2e7239 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e5d0376c6b84f343ae4ebb978626670 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/SicBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm.meta new file mode 100644 index 00000000..e609c2c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7ff0bc1a8cbd285449fb86b525082d47 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs new file mode 100644 index 00000000..ca6f943d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public class BasicGcmExponentiator + : IGcmExponentiator + { + private GcmUtilities.FieldElement x; + + public void Init(byte[] x) + { + GcmUtilities.AsFieldElement(x, out this.x); + } + + public void ExponentiateX(long pow, byte[] output) + { + GcmUtilities.FieldElement y; + GcmUtilities.One(out y); + + if (pow > 0) + { + GcmUtilities.FieldElement powX = x; + do + { + if ((pow & 1L) != 0) + { + GcmUtilities.Multiply(ref y, ref powX); + } + GcmUtilities.Square(ref powX); + pow >>= 1; + } + while (pow > 0); + } + + GcmUtilities.AsBytes(ref y, output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs.meta new file mode 100644 index 00000000..3fb5b068 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32321bd134c65cc4cac0fb4bde7e360d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmExponentiator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs new file mode 100644 index 00000000..74705c10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public class BasicGcmMultiplier + : IGcmMultiplier + { + private GcmUtilities.FieldElement H; + + public void Init(byte[] H) + { + GcmUtilities.AsFieldElement(H, out this.H); + } + + public void MultiplyH(byte[] x) + { + GcmUtilities.AsFieldElement(x, out var T); + GcmUtilities.Multiply(ref T, ref H); + GcmUtilities.AsBytes(ref T, x); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs.meta new file mode 100644 index 00000000..b137f609 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3f85532d10251c946bc54a31bd727126 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/BasicGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs new file mode 100644 index 00000000..afc3dced --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs @@ -0,0 +1,302 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + internal abstract class GcmUtilities + { + internal struct FieldElement + { + internal ulong n0, n1; + } + + private const uint E1 = 0xe1000000; + private const ulong E1UL = (ulong)E1 << 32; + + internal static void One(out FieldElement x) + { + x.n0 = 1UL << 63; + x.n1 = 0UL; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static void AsBytes(ulong x0, ulong x1, byte[] z) + { + Pack.UInt64_To_BE(x0, z, 0); + Pack.UInt64_To_BE(x1, z, 8); + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static void AsBytes(ref FieldElement x, byte[] z) + { + AsBytes(x.n0, x.n1, z); + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static void AsFieldElement(byte[] x, out FieldElement z) + { + z.n0 = Pack.BE_To_UInt64(x, 0); + z.n1 = Pack.BE_To_UInt64(x, 8); + } + + internal static void DivideP(ref FieldElement x, out FieldElement z) + { + ulong x0 = x.n0, x1 = x.n1; + ulong m = (ulong)((long)x0 >> 63); + x0 ^= (m & E1UL); + z.n0 = (x0 << 1) | (x1 >> 63); + z.n1 = (x1 << 1) | (ulong)(-(long)m); + } + + internal static void Multiply(byte[] x, byte[] y) + { + AsFieldElement(x, out FieldElement X); + AsFieldElement(y, out FieldElement Y); + Multiply(ref X, ref Y); + AsBytes(ref X, x); + } + + internal static void Multiply(ref FieldElement x, ref FieldElement y) + { + ulong z0, z1, z2, z3; + +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X = Vector128.Create(x.n1, x.n0); + var Y = Vector128.Create(y.n1, y.n0); + + var Z0 = Pclmulqdq.CarrylessMultiply(X, Y, 0x00); + var Z1 = Sse2.Xor( + Pclmulqdq.CarrylessMultiply(X, Y, 0x01), + Pclmulqdq.CarrylessMultiply(X, Y, 0x10)); + var Z2 = Pclmulqdq.CarrylessMultiply(X, Y, 0x11); + + ulong t3 = Z0.GetElement(0); + ulong t2 = Z0.GetElement(1) ^ Z1.GetElement(0); + ulong t1 = Z2.GetElement(0) ^ Z1.GetElement(1); + ulong t0 = Z2.GetElement(1); + + z0 = (t0 << 1) | (t1 >> 63); + z1 = (t1 << 1) | (t2 >> 63); + z2 = (t2 << 1) | (t3 >> 63); + z3 = (t3 << 1); + } + else +#endif + { + /* + * "Three-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + * + * Without access to the high part of a 64x64 product x * y, we use a bit reversal to calculate it: + * rev(x) * rev(y) == rev((x * y) << 1) + */ + + ulong x0 = x.n0, x1 = x.n1; + ulong y0 = y.n0, y1 = y.n1; + ulong x0r = Longs.Reverse(x0), x1r = Longs.Reverse(x1); + ulong y0r = Longs.Reverse(y0), y1r = Longs.Reverse(y1); + + ulong h0 = Longs.Reverse(ImplMul64(x0r, y0r)); + ulong h1 = ImplMul64(x0, y0) << 1; + ulong h2 = Longs.Reverse(ImplMul64(x1r, y1r)); + ulong h3 = ImplMul64(x1, y1) << 1; + ulong h4 = Longs.Reverse(ImplMul64(x0r ^ x1r, y0r ^ y1r)); + ulong h5 = ImplMul64(x0 ^ x1, y0 ^ y1) << 1; + + z0 = h0; + z1 = h1 ^ h0 ^ h2 ^ h4; + z2 = h2 ^ h1 ^ h3 ^ h5; + z3 = h3; + } + + Debug.Assert(z3 << 63 == 0); + + z1 ^= z3 ^ (z3 >> 1) ^ (z3 >> 2) ^ (z3 >> 7); +// z2 ^= (z3 << 63) ^ (z3 << 62) ^ (z3 << 57); + z2 ^= (z3 << 62) ^ (z3 << 57); + + z0 ^= z2 ^ (z2 >> 1) ^ (z2 >> 2) ^ (z2 >> 7); + z1 ^= (z2 << 63) ^ (z2 << 62) ^ (z2 << 57); + + x.n0 = z0; + x.n1 = z1; + } + + internal static void MultiplyP7(ref FieldElement x) + { + ulong x0 = x.n0, x1 = x.n1; + ulong c = x1 << 57; + x.n0 = (x0 >> 7) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + x.n1 = (x1 >> 7) | (x0 << 57); + } + + internal static void MultiplyP8(ref FieldElement x) + { + ulong x0 = x.n0, x1 = x.n1; + ulong c = x1 << 56; + x.n0 = (x0 >> 8) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + x.n1 = (x1 >> 8) | (x0 << 56); + } + + internal static void MultiplyP8(ref FieldElement x, out FieldElement y) + { + ulong x0 = x.n0, x1 = x.n1; + ulong c = x1 << 56; + y.n0 = (x0 >> 8) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + y.n1 = (x1 >> 8) | (x0 << 56); + } + + internal static void MultiplyP16(ref FieldElement x) + { + ulong x0 = x.n0, x1 = x.n1; + ulong c = x1 << 48; + x.n0 = (x0 >> 16) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + x.n1 = (x1 >> 16) | (x0 << 48); + } + + internal static void Square(ref FieldElement x) + { + ulong z1 = Interleave.Expand64To128Rev(x.n0, out ulong z0); + ulong z3 = Interleave.Expand64To128Rev(x.n1, out ulong z2); + + Debug.Assert(z3 << 63 == 0); + + z1 ^= z3 ^ (z3 >> 1) ^ (z3 >> 2) ^ (z3 >> 7); +// z2 ^= (z3 << 63) ^ (z3 << 62) ^ (z3 << 57); + z2 ^= (z3 << 62) ^ (z3 << 57); + + Debug.Assert(z2 << 63 == 0); + + z0 ^= z2 ^ (z2 >> 1) ^ (z2 >> 2) ^ (z2 >> 7); +// z1 ^= (z2 << 63) ^ (z2 << 62) ^ (z2 << 57); + z1 ^= (z2 << 62) ^ (z2 << 57); + + x.n0 = z0; + x.n1 = z1; + } + + internal static void Xor(byte[] x, byte[] y) + { + int i = 0; + do + { + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + } + while (i < 16); + } + + internal static void Xor(byte[] x, byte[] y, int yOff) + { + int i = 0; + do + { + x[i] ^= y[yOff + i]; ++i; + x[i] ^= y[yOff + i]; ++i; + x[i] ^= y[yOff + i]; ++i; + x[i] ^= y[yOff + i]; ++i; + } + while (i < 16); + } + + internal static void Xor(byte[] x, byte[] y, int yOff, int yLen) + { + while (--yLen >= 0) + { + x[yLen] ^= y[yOff + yLen]; + } + } + + internal static void Xor(byte[] x, int xOff, byte[] y, int yOff, int len) + { + while (--len >= 0) + { + x[xOff + len] ^= y[yOff + len]; + } + } + + internal static void Xor(ref FieldElement x, ref FieldElement y) + { + x.n0 ^= y.n0; + x.n1 ^= y.n1; + } + + internal static void Xor(ref FieldElement x, ref FieldElement y, out FieldElement z) + { + z.n0 = x.n0 ^ y.n0; + z.n1 = x.n1 ^ y.n1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void Xor(Span x, ReadOnlySpan y) + { + int i = 0; + do + { + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + x[i] ^= y[i]; ++i; + } + while (i < 16); + } + + internal static void Xor(Span x, ReadOnlySpan y, int len) + { + for (int i = 0; i < len; ++i) + { + x[i] ^= y[i]; + } + } +#endif + + private static ulong ImplMul64(ulong x, ulong y) + { + ulong x0 = x & 0x1111111111111111UL; + ulong x1 = x & 0x2222222222222222UL; + ulong x2 = x & 0x4444444444444444UL; + ulong x3 = x & 0x8888888888888888UL; + + ulong y0 = y & 0x1111111111111111UL; + ulong y1 = y & 0x2222222222222222UL; + ulong y2 = y & 0x4444444444444444UL; + ulong y3 = y & 0x8888888888888888UL; + + ulong z0 = (x0 * y0) ^ (x1 * y3) ^ (x2 * y2) ^ (x3 * y1); + ulong z1 = (x0 * y1) ^ (x1 * y0) ^ (x2 * y3) ^ (x3 * y2); + ulong z2 = (x0 * y2) ^ (x1 * y1) ^ (x2 * y0) ^ (x3 * y3); + ulong z3 = (x0 * y3) ^ (x1 * y2) ^ (x2 * y1) ^ (x3 * y0); + + z0 &= 0x1111111111111111UL; + z1 &= 0x2222222222222222UL; + z2 &= 0x4444444444444444UL; + z3 &= 0x8888888888888888UL; + + return z0 | z1 | z2 | z3; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs.meta new file mode 100644 index 00000000..df5a4b99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b541d643c97f0db4c8ac41882cf50f7a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/GcmUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs new file mode 100644 index 00000000..cba70a52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public interface IGcmExponentiator + { + void Init(byte[] x); + void ExponentiateX(long pow, byte[] output); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs.meta new file mode 100644 index 00000000..769e4726 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a73c4e1c5866f746971e04ec6972cf8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmExponentiator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs new file mode 100644 index 00000000..620c27ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public interface IGcmMultiplier + { + void Init(byte[] H); + void MultiplyH(byte[] x); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs.meta new file mode 100644 index 00000000..effb9dbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d084b7e75aa6eda4bbd8804fad7c3c98 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/IGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs new file mode 100644 index 00000000..23da3e84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public class Tables1kGcmExponentiator + : IGcmExponentiator + { + // A lookup table of the power-of-two powers of 'x' + // - lookupPowX2[i] = x^(2^i) + private IList lookupPowX2; + + public void Init(byte[] x) + { + GcmUtilities.FieldElement y; + GcmUtilities.AsFieldElement(x, out y); + if (lookupPowX2 != null && y.Equals(lookupPowX2[0])) + return; + + lookupPowX2 = new List(8); + lookupPowX2.Add(y); + } + + public void ExponentiateX(long pow, byte[] output) + { + GcmUtilities.FieldElement y; + GcmUtilities.One(out y); + int bit = 0; + while (pow > 0) + { + if ((pow & 1L) != 0) + { + EnsureAvailable(bit); + GcmUtilities.FieldElement powX2 = (GcmUtilities.FieldElement)lookupPowX2[bit]; + GcmUtilities.Multiply(ref y, ref powX2); + } + ++bit; + pow >>= 1; + } + + GcmUtilities.AsBytes(ref y, output); + } + + private void EnsureAvailable(int bit) + { + int count = lookupPowX2.Count; + if (count <= bit) + { + GcmUtilities.FieldElement powX2 = (GcmUtilities.FieldElement)lookupPowX2[count - 1]; + do + { + GcmUtilities.Square(ref powX2); + lookupPowX2.Add(powX2); + } + while (++count <= bit); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs.meta new file mode 100644 index 00000000..3244b72c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 292216b0bad4fea4d9a088d66834fbb9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables1kGcmExponentiator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs new file mode 100644 index 00000000..86bc1598 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public class Tables4kGcmMultiplier + : IGcmMultiplier + { + private byte[] H; + private GcmUtilities.FieldElement[] T; + + public void Init(byte[] H) + { + if (T == null) + { + T = new GcmUtilities.FieldElement[256]; + } + else if (Arrays.AreEqual(this.H, H)) + { + return; + } + + this.H = Arrays.Clone(H); + + // T[0] = 0 + + // T[1] = H.p^7 + GcmUtilities.AsFieldElement(this.H, out T[1]); + GcmUtilities.MultiplyP7(ref T[1]); + + for (int n = 1; n < 128; ++n) + { + // T[2.n] = T[n].p^-1 + GcmUtilities.DivideP(ref T[n], out T[n << 1]); + + // T[2.n + 1] = T[2.n] + T[1] + GcmUtilities.Xor(ref T[n << 1], ref T[1], out T[(n << 1) + 1]); + } + } + + public void MultiplyH(byte[] x) + { + //GcmUtilities.FieldElement z = T[x[15]]; + //for (int i = 14; i >= 0; --i) + //{ + // GcmUtilities.MultiplyP8(ref z); + // GcmUtilities.Xor(ref z, ref T[x[i]]); + //} + //GcmUtilities.AsBytes(ref z, x); + + int pos = x[15]; + ulong z0 = T[pos].n0, z1 = T[pos].n1; + + for (int i = 14; i >= 0; --i) + { + pos = x[i]; + + ulong c = z1 << 56; + z1 = T[pos].n1 ^ ((z1 >> 8) | (z0 << 56)); + z0 = T[pos].n0 ^ (z0 >> 8) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + } + + GcmUtilities.AsBytes(z0, z1, x); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs.meta new file mode 100644 index 00000000..5aae988f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5498d1413e74d74e8430fe02dbf6d89 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables4kGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs new file mode 100644 index 00000000..9fed6bb4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public class Tables64kGcmMultiplier + : IGcmMultiplier + { + private byte[] H; + private GcmUtilities.FieldElement[][] T; + + public void Init(byte[] H) + { + if (T == null) + { + T = new GcmUtilities.FieldElement[16][]; + } + else if (Arrays.AreEqual(this.H, H)) + { + return; + } + + this.H = Arrays.Clone(H); + + for (int i = 0; i < 16; ++i) + { + GcmUtilities.FieldElement[] t = T[i] = new GcmUtilities.FieldElement[256]; + + // t[0] = 0 + + if (i == 0) + { + // t[1] = H.p^7 + GcmUtilities.AsFieldElement(this.H, out t[1]); + GcmUtilities.MultiplyP7(ref t[1]); + } + else + { + // t[1] = T[i-1][1].p^8 + GcmUtilities.MultiplyP8(ref T[i - 1][1], out t[1]); + } + + for (int n = 1; n < 128; ++n) + { + // t[2.n] = t[n].p^-1 + GcmUtilities.DivideP(ref t[n], out t[n << 1]); + + // t[2.n + 1] = t[2.n] + t[1] + GcmUtilities.Xor(ref t[n << 1], ref t[1], out t[(n << 1) + 1]); + } + } + } + + public void MultiplyH(byte[] x) + { + //GcmUtilities.FieldElement z = T[15][x[15]]; + //for (int i = 14; i >= 0; --i) + //{ + // GcmUtilities.Xor(ref z, ref T[i][x[i]]); + //} + //GcmUtilities.AsBytes(ref z, x); + + GcmUtilities.FieldElement[] t = T[15]; + int tPos = x[15]; + ulong z0 = t[tPos].n0, z1 = t[tPos].n1; + + for (int i = 14; i >= 0; --i) + { + t = T[i]; + tPos = x[i]; + z0 ^= t[tPos].n0; + z1 ^= t[tPos].n1; + } + + GcmUtilities.AsBytes(z0, z1, x); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs.meta new file mode 100644 index 00000000..e9a3b5e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2bc5f428ffb5c774eacfa6b8f8fc91f1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables64kGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs new file mode 100644 index 00000000..39cc3753 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm +{ + public sealed class Tables8kGcmMultiplier + : IGcmMultiplier + { + private byte[] H; + private GcmUtilities.FieldElement[][] T; + + public void Init(byte[] H) + { + if (T == null) + { + T = new GcmUtilities.FieldElement[2][]; + } + else if (Arrays.AreEqual(this.H, H)) + { + return; + } + + this.H = Arrays.Clone(H); + + for (int i = 0; i < 2; ++i) + { + GcmUtilities.FieldElement[] t = T[i] = new GcmUtilities.FieldElement[256]; + + // t[0] = 0 + + if (i == 0) + { + // t[1] = H.p^7 + GcmUtilities.AsFieldElement(this.H, out t[1]); + GcmUtilities.MultiplyP7(ref t[1]); + } + else + { + // t[1] = T[i-1][1].p^8 + GcmUtilities.MultiplyP8(ref T[i - 1][1], out t[1]); + } + + for (int n = 1; n < 128; ++n) + { + // t[2.n] = t[n].p^-1 + GcmUtilities.DivideP(ref t[n], out t[n << 1]); + + // t[2.n + 1] = t[2.n] + t[1] + GcmUtilities.Xor(ref t[n << 1], ref t[1], out t[(n << 1) + 1]); + } + } + } + uint[] z = new uint[4]; + + public void MultiplyH(byte[] x) + { + GcmUtilities.FieldElement[] T0 = T[0], T1 = T[1]; + + //GcmUtilities.FieldElement z; + //GcmUtilities.Xor(ref T0[x[14]], ref T1[x[15]], out z); + //for (int i = 12; i >= 0; i -= 2) + //{ + // GcmUtilities.MultiplyP16(ref z); + // GcmUtilities.Xor(ref z, ref T0[x[i]]); + // GcmUtilities.Xor(ref z, ref T1[x[i + 1]]); + //} + //GcmUtilities.AsBytes(ref z, x); + + int vPos = x[15]; + int uPos = x[14]; + ulong z1 = T0[uPos].n1 ^ T1[vPos].n1; + ulong z0 = T0[uPos].n0 ^ T1[vPos].n0; + + for (int i = 12; i >= 0; i -= 2) + { + vPos = x[i + 1]; + uPos = x[i]; + + ulong c = z1 << 48; + z1 = T0[uPos].n1 ^ T1[vPos].n1 ^ ((z1 >> 16) | (z0 << 48)); + z0 = T0[uPos].n0 ^ T1[vPos].n0 ^ (z0 >> 16) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + } + + GcmUtilities.AsBytes(z0, z1, x); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs.meta new file mode 100644 index 00000000..7a551963 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: af0e47802908a1e4686d49b38f408d0d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/modes/gcm/Tables8kGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators.meta new file mode 100644 index 00000000..3b0eca1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: fa0b374b00c071b4b95adf7c9c12bbc6 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs new file mode 100644 index 00000000..7e8a7bf4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs @@ -0,0 +1,97 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class Asn1CipherBuilderWithKey : ICipherBuilderWithKey + { + private readonly KeyParameter encKey; + private AlgorithmIdentifier algorithmIdentifier; + + public Asn1CipherBuilderWithKey(DerObjectIdentifier encryptionOID, int keySize, SecureRandom random) + { + random = CryptoServicesRegistrar.GetSecureRandom(random); + + CipherKeyGenerator keyGen = CipherKeyGeneratorFactory.CreateKeyGenerator(encryptionOID, random); + + encKey = new KeyParameter(keyGen.GenerateKey()); + algorithmIdentifier = AlgorithmIdentifierFactory.GenerateEncryptionAlgID(encryptionOID, encKey.GetKey().Length * 8, random); + } + + public object AlgorithmDetails + { + get { return algorithmIdentifier; } + } + + public int GetMaxOutputSize(int inputLen) + { + throw new NotImplementedException(); + } + + public ICipher BuildCipher(Stream stream) + { + object cipher = EnvelopedDataHelper.CreateContentCipher(true, encKey, algorithmIdentifier); + + // + // BufferedBlockCipher + // IStreamCipher + // + + if (cipher is IStreamCipher) + { + cipher = new BufferedStreamCipher((IStreamCipher)cipher); + } + + if (stream == null) + { + stream = new MemoryStream(); + } + + return new BufferedCipherWrapper((IBufferedCipher)cipher, stream); + } + + public ICipherParameters Key + { + get { return encKey; } + } + } + + public class BufferedCipherWrapper : ICipher + { + private readonly IBufferedCipher bufferedCipher; + private readonly CipherStream stream; + + public BufferedCipherWrapper(IBufferedCipher bufferedCipher, Stream source) + { + this.bufferedCipher = bufferedCipher; + stream = new CipherStream(source, bufferedCipher, bufferedCipher); + } + + public int GetMaxOutputSize(int inputLen) + { + return bufferedCipher.GetOutputSize(inputLen); + } + + public int GetUpdateOutputSize(int inputLen) + { + return bufferedCipher.GetUpdateOutputSize(inputLen); + } + + public Stream Stream + { + get { return stream; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs.meta new file mode 100644 index 00000000..1f816ac7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d89fe368529c9b6458fae30b91d4c33f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1CipherBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs new file mode 100644 index 00000000..49278871 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class Asn1DigestFactory + : IDigestFactory + { + public static Asn1DigestFactory Get(DerObjectIdentifier oid) + { + return new Asn1DigestFactory(DigestUtilities.GetDigest(oid), oid); + } + + public static Asn1DigestFactory Get(string mechanism) + { + DerObjectIdentifier oid = DigestUtilities.GetObjectIdentifier(mechanism); + return new Asn1DigestFactory(DigestUtilities.GetDigest(oid), oid); + } + + private readonly IDigest mDigest; + private readonly DerObjectIdentifier mOid; + + public Asn1DigestFactory(IDigest digest, DerObjectIdentifier oid) + { + this.mDigest = digest; + this.mOid = oid; + } + + public virtual object AlgorithmDetails + { + get { return new AlgorithmIdentifier(mOid); } + } + + public virtual int DigestLength + { + get { return mDigest.GetDigestSize(); } + } + + public virtual IStreamCalculator CreateCalculator() + { + return new DfDigestStream(mDigest); + } + } + + internal class DfDigestStream + : IStreamCalculator + { + private readonly DigestSink mStream; + + public DfDigestStream(IDigest digest) + { + this.mStream = new DigestSink(digest); + } + + public Stream Stream + { + get { return mStream; } + } + + public SimpleBlockResult GetResult() + { + byte[] result = new byte[mStream.Digest.GetDigestSize()]; + mStream.Digest.DoFinal(result, 0); + return new SimpleBlockResult(result); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs.meta new file mode 100644 index 00000000..562da1c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d3925190f0b3cdb4485785fb81e2ada9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1DigestFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs new file mode 100644 index 00000000..5c05daa4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs @@ -0,0 +1,318 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class Asn1KeyWrapper + : IKeyWrapper + { + private string algorithm; + private IKeyWrapper wrapper; + + public Asn1KeyWrapper(string algorithm, X509Certificate cert) + { + this.algorithm = algorithm; + wrapper = KeyWrapperUtil.WrapperForName(algorithm, cert.GetPublicKey()); + } + + public Asn1KeyWrapper(DerObjectIdentifier algorithm, X509Certificate cert) + : this(algorithm, cert.GetPublicKey()) + { + } + + public Asn1KeyWrapper(DerObjectIdentifier algorithm, ICipherParameters key) + : this(algorithm, null, key) + { + } + + public Asn1KeyWrapper(DerObjectIdentifier algorithm, Asn1Encodable parameters, X509Certificate cert) + :this(algorithm, parameters, cert.GetPublicKey()) + { + } + + public Asn1KeyWrapper(DerObjectIdentifier algorithm, Asn1Encodable parameters, ICipherParameters key) + { + this.algorithm = algorithm.Id; + if (algorithm.Equals(PkcsObjectIdentifiers.IdRsaesOaep)) + { + RsaesOaepParameters oaepParams = RsaesOaepParameters.GetInstance(parameters); + WrapperProvider provider; + if (oaepParams.MaskGenAlgorithm.Algorithm.Equals(PkcsObjectIdentifiers.IdMgf1)) + { + AlgorithmIdentifier digAlg = AlgorithmIdentifier.GetInstance(oaepParams.MaskGenAlgorithm.Parameters); + + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, digAlg.Algorithm); + } + else + { + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, oaepParams.MaskGenAlgorithm.Algorithm); + } + wrapper = (IKeyWrapper)provider.CreateWrapper(true, key); + } + else if (algorithm.Equals(PkcsObjectIdentifiers.RsaEncryption)) + { + wrapper = (IKeyWrapper)new RsaPkcs1Wrapper(true, key); + } + else + { + throw new ArgumentException("unknown algorithm: " + algorithm.Id); + } + } + + public object AlgorithmDetails + { + get { return wrapper.AlgorithmDetails; } + } + + public IBlockResult Wrap(byte[] keyData) + { + return wrapper.Wrap(keyData); + } + } + + public class Asn1KeyUnwrapper + : IKeyUnwrapper + { + private string algorithm; + private IKeyUnwrapper wrapper; + + public Asn1KeyUnwrapper(string algorithm, ICipherParameters key) + { + this.algorithm = algorithm; + wrapper = KeyWrapperUtil.UnwrapperForName(algorithm, key); + } + + public Asn1KeyUnwrapper(DerObjectIdentifier algorithm, ICipherParameters key) + : this(algorithm, null, key) + { + } + + public Asn1KeyUnwrapper(DerObjectIdentifier algorithm, Asn1Encodable parameters, ICipherParameters key) + { + this.algorithm = algorithm.Id; + if (algorithm.Equals(PkcsObjectIdentifiers.IdRsaesOaep)) + { + RsaesOaepParameters oaepParams = RsaesOaepParameters.GetInstance(parameters); + WrapperProvider provider; + if (oaepParams.MaskGenAlgorithm.Algorithm.Equals(PkcsObjectIdentifiers.IdMgf1)) + { + AlgorithmIdentifier digAlg = AlgorithmIdentifier.GetInstance(oaepParams.MaskGenAlgorithm.Parameters); + + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, digAlg.Algorithm); + } + else + { + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, oaepParams.MaskGenAlgorithm.Algorithm); + } + wrapper = (IKeyUnwrapper)provider.CreateWrapper(false, key); + } + else if (algorithm.Equals(PkcsObjectIdentifiers.RsaEncryption)) + { + RsaesOaepParameters oaepParams = RsaesOaepParameters.GetInstance(parameters); + WrapperProvider provider; + if (oaepParams.MaskGenAlgorithm.Algorithm.Equals(PkcsObjectIdentifiers.IdMgf1)) + { + AlgorithmIdentifier digAlg = AlgorithmIdentifier.GetInstance(oaepParams.MaskGenAlgorithm.Parameters); + + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, digAlg.Algorithm); + } + else + { + provider = new RsaOaepWrapperProvider(oaepParams.HashAlgorithm.Algorithm, oaepParams.MaskGenAlgorithm.Algorithm); + } + wrapper = (IKeyUnwrapper)new RsaPkcs1Wrapper(false, key); + } + else + { + throw new ArgumentException("unknown algorithm: " + algorithm.Id); + } + } + + public object AlgorithmDetails + { + get { return wrapper.AlgorithmDetails; } + } + + public IBlockResult Unwrap(byte[] keyData, int offSet, int length) + { + return wrapper.Unwrap(keyData, offSet, length); + } + } + + internal class KeyWrapperUtil + { + // + // Provider + // + private static readonly Dictionary m_providerMap = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static KeyWrapperUtil() + { + m_providerMap.Add("RSA/ECB/PKCS1PADDING", new RsaOaepWrapperProvider(OiwObjectIdentifiers.IdSha1)); + m_providerMap.Add("RSA/NONE/PKCS1PADDING", new RsaOaepWrapperProvider(OiwObjectIdentifiers.IdSha1)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA1ANDMGF1PADDING", new RsaOaepWrapperProvider(OiwObjectIdentifiers.IdSha1)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA224ANDMGF1PADDING", new RsaOaepWrapperProvider(NistObjectIdentifiers.IdSha224)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA256ANDMGF1PADDING", new RsaOaepWrapperProvider(NistObjectIdentifiers.IdSha256)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA384ANDMGF1PADDING", new RsaOaepWrapperProvider(NistObjectIdentifiers.IdSha384)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA512ANDMGF1PADDING", new RsaOaepWrapperProvider(NistObjectIdentifiers.IdSha512)); + m_providerMap.Add("RSA/NONE/OAEPWITHSHA256ANDMGF1WITHSHA1PADDING", new RsaOaepWrapperProvider(NistObjectIdentifiers.IdSha256, OiwObjectIdentifiers.IdSha1)); + } + + public static IKeyWrapper WrapperForName(string algorithm, ICipherParameters parameters) + { + if (!m_providerMap.TryGetValue(algorithm, out var provider)) + throw new ArgumentException("could not resolve " + algorithm + " to a KeyWrapper"); + + return (IKeyWrapper)provider.CreateWrapper(true, parameters); + } + + public static IKeyUnwrapper UnwrapperForName(string algorithm, ICipherParameters parameters) + { + if (!m_providerMap.TryGetValue(algorithm, out var provider)) + throw new ArgumentException("could not resolve " + algorithm + " to a KeyUnwrapper"); + + return (IKeyUnwrapper)provider.CreateWrapper(false, parameters); + } + } + + internal interface WrapperProvider + { + object CreateWrapper(bool forWrapping, ICipherParameters parameters); + } + + internal class RsaPkcs1Wrapper : IKeyWrapper, IKeyUnwrapper + { + private readonly AlgorithmIdentifier algId; + private readonly IAsymmetricBlockCipher engine; + + public RsaPkcs1Wrapper(bool forWrapping, ICipherParameters parameters) + { + this.algId = new AlgorithmIdentifier( + PkcsObjectIdentifiers.RsaEncryption, + DerNull.Instance); + + this.engine = new Pkcs1Encoding(new RsaBlindedEngine()); + this.engine.Init(forWrapping, parameters); + } + + public object AlgorithmDetails + { + get { return algId; } + } + + public IBlockResult Unwrap(byte[] cipherText, int offset, int length) + { + return new SimpleBlockResult(engine.ProcessBlock(cipherText, offset, length)); + } + + public IBlockResult Wrap(byte[] keyData) + { + return new SimpleBlockResult(engine.ProcessBlock(keyData, 0, keyData.Length)); + } + } + + internal class RsaPkcs1WrapperProvider + : WrapperProvider + { + internal RsaPkcs1WrapperProvider() + { + } + + object WrapperProvider.CreateWrapper(bool forWrapping, ICipherParameters parameters) + { + return new RsaPkcs1Wrapper(forWrapping, parameters); + } + } + + internal class RsaOaepWrapper : IKeyWrapper, IKeyUnwrapper + { + private readonly AlgorithmIdentifier algId; + private readonly IAsymmetricBlockCipher engine; + + public RsaOaepWrapper(bool forWrapping, ICipherParameters parameters, DerObjectIdentifier digestOid) + : this(forWrapping, parameters, digestOid, digestOid) + { + } + + public RsaOaepWrapper(bool forWrapping, ICipherParameters parameters, DerObjectIdentifier digestOid, DerObjectIdentifier mgfOid) + { + AlgorithmIdentifier digestAlgId = new AlgorithmIdentifier(digestOid, DerNull.Instance); + + if (mgfOid.Equals(NistObjectIdentifiers.IdShake128) || mgfOid.Equals(NistObjectIdentifiers.IdShake256)) + { + this.algId = new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdRsaesOaep, + new RsaesOaepParameters( + digestAlgId, + new AlgorithmIdentifier(mgfOid), + RsaesOaepParameters.DefaultPSourceAlgorithm)); + } + else + { + this.algId = new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdRsaesOaep, + new RsaesOaepParameters( + digestAlgId, + new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, new AlgorithmIdentifier(mgfOid, DerNull.Instance)), + RsaesOaepParameters.DefaultPSourceAlgorithm)); + } + + this.engine = new OaepEncoding(new RsaBlindedEngine(), DigestUtilities.GetDigest(digestOid), DigestUtilities.GetDigest(mgfOid), null); + this.engine.Init(forWrapping, parameters); + } + + public object AlgorithmDetails + { + get { return algId; } + } + + public IBlockResult Unwrap(byte[] cipherText, int offset, int length) + { + return new SimpleBlockResult(engine.ProcessBlock(cipherText, offset, length)); + } + + public IBlockResult Wrap(byte[] keyData) + { + return new SimpleBlockResult(engine.ProcessBlock(keyData, 0, keyData.Length)); + } + } + + internal class RsaOaepWrapperProvider + : WrapperProvider + { + private readonly DerObjectIdentifier digestOid; + private readonly DerObjectIdentifier mgfOid; + + internal RsaOaepWrapperProvider(DerObjectIdentifier digestOid) + { + this.digestOid = digestOid; + this.mgfOid = digestOid; + } + + internal RsaOaepWrapperProvider(DerObjectIdentifier digestOid, DerObjectIdentifier mgfOid) + { + this.digestOid = digestOid; + this.mgfOid = mgfOid; + } + + object WrapperProvider.CreateWrapper(bool forWrapping, ICipherParameters parameters) + { + return new RsaOaepWrapper(forWrapping, parameters, digestOid, mgfOid); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs.meta new file mode 100644 index 00000000..200d9383 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79910083773a90945ae630475a9fc516 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1KeyWrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs new file mode 100644 index 00000000..4a978c4d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs @@ -0,0 +1,421 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + internal class X509Utilities + { + private static readonly IDictionary m_algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary m_exParams = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly HashSet noParams = new HashSet(); + + static X509Utilities() + { + m_algorithms.Add("MD2WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD2WITHRSA", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD5WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("MD5WITHRSA", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA3-224WITHRSAENCRYPTION", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224); + m_algorithms.Add("SHA3-256WITHRSAENCRYPTION", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256); + m_algorithms.Add("SHA3-384WITHRSAENCRYPTION", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384); + m_algorithms.Add("SHA3-512WITHRSAENCRYPTION", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512); + m_algorithms.Add("SHA3-224WITHRSA", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224); + m_algorithms.Add("SHA3-256WITHRSA", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256); + m_algorithms.Add("SHA3-384WITHRSA", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384); + m_algorithms.Add("SHA3-512WITHRSA", NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512); + m_algorithms.Add("SHA1WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA224WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA256WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA384WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA512WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("RIPEMD160WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD160WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD128WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD128WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD256WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("RIPEMD256WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("SHA1WITHDSA", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("DSAWITHSHA1", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("SHA224WITHDSA", NistObjectIdentifiers.DsaWithSha224); + m_algorithms.Add("SHA256WITHDSA", NistObjectIdentifiers.DsaWithSha256); + m_algorithms.Add("SHA384WITHDSA", NistObjectIdentifiers.DsaWithSha384); + m_algorithms.Add("SHA512WITHDSA", NistObjectIdentifiers.DsaWithSha512); + m_algorithms.Add("SHA1WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("ECDSAWITHSHA1", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("SHA224WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha224); + m_algorithms.Add("SHA256WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha256); + m_algorithms.Add("SHA384WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha384); + m_algorithms.Add("SHA512WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha512); + m_algorithms.Add("GOST3411WITHGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3411WITHGOST3410-94", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3411WITHECGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHECGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411-2012-256WITHECGOST3410", RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256); + m_algorithms.Add("GOST3411-2012-256WITHECGOST3410-2012-256", RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256); + m_algorithms.Add("GOST3411-2012-512WITHECGOST3410", RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512); + m_algorithms.Add("GOST3411-2012-512WITHECGOST3410-2012-512", RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512); + + // + // According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) omit the parameters field. + // The parameters field SHALL be NULL for RSA based signature algorithms. + // + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha1); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha224); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha256); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha384); + noParams.Add(X9ObjectIdentifiers.ECDsaWithSha512); + noParams.Add(X9ObjectIdentifiers.IdDsaWithSha1); + noParams.Add(OiwObjectIdentifiers.DsaWithSha1); + noParams.Add(NistObjectIdentifiers.DsaWithSha224); + noParams.Add(NistObjectIdentifiers.DsaWithSha256); + noParams.Add(NistObjectIdentifiers.DsaWithSha384); + noParams.Add(NistObjectIdentifiers.DsaWithSha512); + + // + // RFC 4491 + // + noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + + // + // explicit params + // + AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + m_exParams.Add("SHA1WITHRSAANDMGF1", CreatePssParams(sha1AlgId, 20)); + + AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha224, DerNull.Instance); + m_exParams.Add("SHA224WITHRSAANDMGF1", CreatePssParams(sha224AlgId, 28)); + + AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance); + m_exParams.Add("SHA256WITHRSAANDMGF1", CreatePssParams(sha256AlgId, 32)); + + AlgorithmIdentifier sha384AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance); + m_exParams.Add("SHA384WITHRSAANDMGF1", CreatePssParams(sha384AlgId, 48)); + + AlgorithmIdentifier sha512AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance); + m_exParams.Add("SHA512WITHRSAANDMGF1", CreatePssParams(sha512AlgId, 64)); + } + + /** + * Return the digest algorithm using one of the standard JCA string + * representations rather than the algorithm identifier (if possible). + */ + private static string GetDigestAlgName( + DerObjectIdentifier digestAlgOID) + { + if (PkcsObjectIdentifiers.MD5.Equals(digestAlgOID)) + { + return "MD5"; + } + else if (OiwObjectIdentifiers.IdSha1.Equals(digestAlgOID)) + { + return "SHA1"; + } + else if (NistObjectIdentifiers.IdSha224.Equals(digestAlgOID)) + { + return "SHA224"; + } + else if (NistObjectIdentifiers.IdSha256.Equals(digestAlgOID)) + { + return "SHA256"; + } + else if (NistObjectIdentifiers.IdSha384.Equals(digestAlgOID)) + { + return "SHA384"; + } + else if (NistObjectIdentifiers.IdSha512.Equals(digestAlgOID)) + { + return "SHA512"; + } + else if (NistObjectIdentifiers.IdSha512_224.Equals(digestAlgOID)) + { + return "SHA512(224)"; + } + else if (NistObjectIdentifiers.IdSha512_256.Equals(digestAlgOID)) + { + return "SHA512(256)"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD128.Equals(digestAlgOID)) + { + return "RIPEMD128"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD160.Equals(digestAlgOID)) + { + return "RIPEMD160"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD256.Equals(digestAlgOID)) + { + return "RIPEMD256"; + } + else if (CryptoProObjectIdentifiers.GostR3411.Equals(digestAlgOID)) + { + return "GOST3411"; + } + else if (RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Equals(digestAlgOID)) + { + return "GOST3411-2012-256"; + } + else if (RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Equals(digestAlgOID)) + { + return "GOST3411-2012-512"; + } + else + { + return digestAlgOID.Id; + } + } + + internal static string GetSignatureName(AlgorithmIdentifier sigAlgId) + { + Asn1Encodable parameters = sigAlgId.Parameters; + + if (parameters != null && !DerNull.Instance.Equals(parameters)) + { + if (sigAlgId.Algorithm.Equals(PkcsObjectIdentifiers.IdRsassaPss)) + { + RsassaPssParameters rsaParams = RsassaPssParameters.GetInstance(parameters); + + return GetDigestAlgName(rsaParams.HashAlgorithm.Algorithm) + "withRSAandMGF1"; + } + if (sigAlgId.Algorithm.Equals(X9ObjectIdentifiers.ECDsaWithSha2)) + { + Asn1Sequence ecDsaParams = Asn1Sequence.GetInstance(parameters); + + return GetDigestAlgName((DerObjectIdentifier)ecDsaParams[0]) + "withECDSA"; + } + } + + return sigAlgId.Algorithm.Id; + } + + private static RsassaPssParameters CreatePssParams( + AlgorithmIdentifier hashAlgId, + int saltSize) + { + return new RsassaPssParameters( + hashAlgId, + new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, hashAlgId), + new DerInteger(saltSize), + new DerInteger(1)); + } + + internal static DerObjectIdentifier GetAlgorithmOid(string algorithmName) + { + if (m_algorithms.TryGetValue(algorithmName, out var oid)) + return oid; + + return new DerObjectIdentifier(algorithmName); + } + + internal static AlgorithmIdentifier GetSigAlgID(DerObjectIdentifier sigOid, string algorithmName) + { + if (noParams.Contains(sigOid)) + return new AlgorithmIdentifier(sigOid); + + if (m_exParams.TryGetValue(algorithmName, out var explicitParameters)) + return new AlgorithmIdentifier(sigOid, explicitParameters); + + return new AlgorithmIdentifier(sigOid, DerNull.Instance); + } + + internal static IEnumerable GetAlgNames() + { + return CollectionUtilities.Proxy(m_algorithms.Keys); + } + } + + + + /// + /// Calculator factory class for signature generation in ASN.1 based profiles that use an AlgorithmIdentifier to preserve + /// signature algorithm details. + /// + public class Asn1SignatureFactory + : ISignatureFactory + { + private readonly AlgorithmIdentifier algID; + private readonly string algorithm; + private readonly AsymmetricKeyParameter privateKey; + private readonly SecureRandom random; + + /// + /// Base constructor. + /// + /// The name of the signature algorithm to use. + /// The private key to be used in the signing operation. + public Asn1SignatureFactory (string algorithm, AsymmetricKeyParameter privateKey) + : this(algorithm, privateKey, null) + { + } + + /// + /// Constructor which also specifies a source of randomness to be used if one is required. + /// + /// The name of the signature algorithm to use. + /// The private key to be used in the signing operation. + /// The source of randomness to be used in signature calculation. + public Asn1SignatureFactory(string algorithm, AsymmetricKeyParameter privateKey, SecureRandom random) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (privateKey == null) + throw new ArgumentNullException("privateKey"); + if (!privateKey.IsPrivate) + throw new ArgumentException("Key for signing must be private", "privateKey"); + + DerObjectIdentifier sigOid = X509Utilities.GetAlgorithmOid(algorithm); + + this.algorithm = algorithm; + this.privateKey = privateKey; + this.random = random; + this.algID = X509Utilities.GetSigAlgID(sigOid, algorithm); + } + + public object AlgorithmDetails + { + get { return this.algID; } + } + + public IStreamCalculator CreateCalculator() + { + ISigner signer = SignerUtilities.InitSigner(algorithm, true, privateKey, random); + + return new DefaultSignatureCalculator(signer); + } + + /// + /// Allows enumeration of the signature names supported by the verifier provider. + /// + public static IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } + + /// + /// Verifier class for signature verification in ASN.1 based profiles that use an AlgorithmIdentifier to preserve + /// signature algorithm details. + /// + public class Asn1VerifierFactory + : IVerifierFactory + { + private readonly AlgorithmIdentifier algID; + private readonly AsymmetricKeyParameter publicKey; + + /// + /// Base constructor. + /// + /// The name of the signature algorithm to use. + /// The public key to be used in the verification operation. + public Asn1VerifierFactory(string algorithm, AsymmetricKeyParameter publicKey) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (publicKey == null) + throw new ArgumentNullException("publicKey"); + if (publicKey.IsPrivate) + throw new ArgumentException("Key for verifying must be public", "publicKey"); + + DerObjectIdentifier sigOid = X509Utilities.GetAlgorithmOid(algorithm); + + this.publicKey = publicKey; + this.algID = X509Utilities.GetSigAlgID(sigOid, algorithm); + } + + public Asn1VerifierFactory(AlgorithmIdentifier algorithm, AsymmetricKeyParameter publicKey) + { + this.publicKey = publicKey; + this.algID = algorithm; + } + + public object AlgorithmDetails + { + get { return this.algID; } + } + + public IStreamCalculator CreateCalculator() + { + ISigner verifier = SignerUtilities.InitSigner(X509Utilities.GetSignatureName(algID), false, publicKey, null); + + return new DefaultVerifierCalculator(verifier); + } + } + + /// + /// Provider class which supports dynamic creation of signature verifiers. + /// + public class Asn1VerifierFactoryProvider: IVerifierFactoryProvider + { + private readonly AsymmetricKeyParameter publicKey; + + /// + /// Base constructor - specify the public key to be used in verification. + /// + /// The public key to be used in creating verifiers provided by this object. + public Asn1VerifierFactoryProvider(AsymmetricKeyParameter publicKey) + { + this.publicKey = publicKey; + } + + public IVerifierFactory CreateVerifierFactory(object algorithmDetails) + { + return new Asn1VerifierFactory((AlgorithmIdentifier)algorithmDetails, publicKey); + } + + /// + /// Allows enumeration of the signature names supported by the verifier provider. + /// + public IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs.meta new file mode 100644 index 00000000..1c8f23a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 669c608b479683645946ae90e8249f53 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/Asn1Signature.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs new file mode 100644 index 00000000..46590767 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Operators +{ + public class CmsContentEncryptorBuilder + { + private static readonly IDictionary KeySizes = + new Dictionary(); + + static CmsContentEncryptorBuilder() + { + KeySizes[NistObjectIdentifiers.IdAes128Cbc] = 128; + KeySizes[NistObjectIdentifiers.IdAes192Cbc] = 192; + KeySizes[NistObjectIdentifiers.IdAes256Cbc] = 256; + + KeySizes[NttObjectIdentifiers.IdCamellia128Cbc] = 128; + KeySizes[NttObjectIdentifiers.IdCamellia192Cbc] = 192; + KeySizes[NttObjectIdentifiers.IdCamellia256Cbc] = 256; + } + + private static int GetKeySize(DerObjectIdentifier oid) + { + return KeySizes.TryGetValue(oid, out var keySize) ? keySize : -1; + } + + private readonly DerObjectIdentifier encryptionOID; + private readonly int keySize; + + private readonly EnvelopedDataHelper helper = new EnvelopedDataHelper(); + //private SecureRandom random; + + public CmsContentEncryptorBuilder(DerObjectIdentifier encryptionOID) + : this(encryptionOID, GetKeySize(encryptionOID)) + { + } + + public CmsContentEncryptorBuilder(DerObjectIdentifier encryptionOID, int keySize) + { + this.encryptionOID = encryptionOID; + this.keySize = keySize; + } + + public ICipherBuilderWithKey Build() + { + //return new Asn1CipherBuilderWithKey(encryptionOID, keySize, random); + return new Asn1CipherBuilderWithKey(encryptionOID, keySize, null); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs.meta new file mode 100644 index 00000000..90144cac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7f51c38d59535c4a9c834a0b14d39d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsContentEncryptorBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs new file mode 100644 index 00000000..8b14ac35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Operators +{ + /// Use KeyTransRecipientInfoGenerator + public class CmsKeyTransRecipientInfoGenerator + : KeyTransRecipientInfoGenerator + { + public CmsKeyTransRecipientInfoGenerator(X509Certificate recipCert, IKeyWrapper keyWrapper) + : base(new Asn1.Cms.IssuerAndSerialNumber(recipCert.IssuerDN, new DerInteger(recipCert.SerialNumber)), keyWrapper) + { + } + + public CmsKeyTransRecipientInfoGenerator(IssuerAndSerialNumber issuerAndSerial, IKeyWrapper keyWrapper) + : base(issuerAndSerial, keyWrapper) + { + } + + public CmsKeyTransRecipientInfoGenerator(byte[] subjectKeyID, IKeyWrapper keyWrapper) : base(subjectKeyID, keyWrapper) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs.meta new file mode 100644 index 00000000..e300888a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 08cdce98bc25d844a9b641acdce1dcd5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/CmsKeyTransRecipientInfoGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs new file mode 100644 index 00000000..6ea01e14 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class DefaultSignatureCalculator + : IStreamCalculator + { + private readonly SignerSink mSignerSink; + + public DefaultSignatureCalculator(ISigner signer) + { + this.mSignerSink = new SignerSink(signer); + } + + public Stream Stream + { + get { return mSignerSink; } + } + + public IBlockResult GetResult() + { + return new DefaultSignatureResult(mSignerSink.Signer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs.meta new file mode 100644 index 00000000..f88e1c4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b7e0d64f42c7674f9a6c61d3bc522a9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs new file mode 100644 index 00000000..cb0419e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class DefaultSignatureResult + : IBlockResult + { + private readonly ISigner mSigner; + + public DefaultSignatureResult(ISigner signer) + { + this.mSigner = signer; + } + + public byte[] Collect() + { + return mSigner.GenerateSignature(); + } + + public int Collect(byte[] sig, int sigOff) + { + byte[] signature = Collect(); + signature.CopyTo(sig, sigOff); + return signature.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Collect(Span destination) + { + byte[] result = Collect(); + result.CopyTo(destination); + return result.Length; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs.meta new file mode 100644 index 00000000..0d1821e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 18e6fc5e606f7224288826aa8f27858a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultSignatureResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs new file mode 100644 index 00000000..8e6a5d84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class DefaultVerifierCalculator + : IStreamCalculator + { + private readonly SignerSink mSignerSink; + + public DefaultVerifierCalculator(ISigner signer) + { + this.mSignerSink = new SignerSink(signer); + } + + public Stream Stream + { + get { return mSignerSink; } + } + + public IVerifier GetResult() + { + return new DefaultVerifierResult(mSignerSink.Signer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs.meta new file mode 100644 index 00000000..d734599d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 89a4491c375b08c4f9603effdd075d93 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs new file mode 100644 index 00000000..6e8095a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class DefaultVerifierResult + : IVerifier + { + private readonly ISigner mSigner; + + public DefaultVerifierResult(ISigner signer) + { + this.mSigner = signer; + } + + public bool IsVerified(byte[] signature) + { + return mSigner.VerifySignature(signature); + } + + public bool IsVerified(byte[] sig, int sigOff, int sigLen) + { + byte[] signature = Arrays.CopyOfRange(sig, sigOff, sigOff + sigLen); + + return IsVerified(signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs.meta new file mode 100644 index 00000000..71ec01f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9969699bdddfa3e43bfb48f74bed62ae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/DefaultVerifierResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs new file mode 100644 index 00000000..91a9c92e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators +{ + public class GenericKey + { + private readonly AlgorithmIdentifier algorithmIdentifier; + private readonly object representation; + + public GenericKey(object representation) + { + this.algorithmIdentifier = null; + this.representation = representation; + } + + public GenericKey(AlgorithmIdentifier algorithmIdentifier, byte[] representation) + { + this.algorithmIdentifier = algorithmIdentifier; + this.representation = representation; + } + + public GenericKey(AlgorithmIdentifier algorithmIdentifier, object representation) + { + this.algorithmIdentifier = algorithmIdentifier; + this.representation = representation; + } + + public AlgorithmIdentifier AlgorithmIdentifier + { + get { return algorithmIdentifier; } + } + + public object Representation + { + get { return representation; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs.meta new file mode 100644 index 00000000..6e938d2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 49b5df0387026814e93adf97bafc27b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/operators/GenericKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings.meta new file mode 100644 index 00000000..b2beeaf3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 95d372c807caaf149a4f4e004fc325ac +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs.meta new file mode 100644 index 00000000..e3a7a698 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e483ada875227e2498f60f353f72564e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/BlockCipherPadding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs new file mode 100644 index 00000000..66331b08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + /// Block cipher padders are expected to conform to this interface. + public interface IBlockCipherPadding + { + /// Initialise the padder. + /// A source of randomness, if any required. + void Init(SecureRandom random); + + /// The name of the algorithm this padder implements. + string PaddingName { get; } + + /// Add padding to the passed in block. + /// the block to add padding to. + /// the offset into the block the padding is to start at. + /// the number of bytes of padding added. + int AddPadding(byte[] input, int inOff); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Add padding to the passed in block. + /// the block to add padding to. + /// the offset into the block the padding is to start at. + /// the number of bytes of padding added. + int AddPadding(Span block, int position); +#endif + + /// Determine the length of padding present in the passed in block. + /// the block to check padding for. + /// the number of bytes of padding present. + int PadCount(byte[] input); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// Determine the length of padding present in the passed in block. + /// the block to check padding for. + /// the number of bytes of padding present. + int PadCount(ReadOnlySpan block); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs.meta new file mode 100644 index 00000000..5c4fb594 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e0fc6a16df807e345a633a1bb6708455 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/IBlockCipherPadding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs new file mode 100644 index 00000000..1dfb70b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + + /** + * A padder that adds ISO10126-2 padding to a block. + */ + public class ISO10126d2Padding: IBlockCipherPadding + { + private SecureRandom random; + + /** + * Initialise the padder. + * + * @param random a SecureRandom if available. + */ + public void Init( + SecureRandom random) + //throws ArgumentException + { + this.random = CryptoServicesRegistrar.GetSecureRandom(random); + } + + /** + * Return the name of the algorithm the cipher implements. + * + * @return the name of the algorithm the cipher implements. + */ + public string PaddingName + { + get { return "ISO10126-2"; } + } + + public int AddPadding(byte[] input, int inOff) + { + int count = input.Length - inOff; + if (count > 1) + { + random.NextBytes(input, inOff, count - 1); + } + input[input.Length - 1] = (byte)count; + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int AddPadding(Span block, int position) + { + int count = block.Length - position; + if (count > 1) + { + random.NextBytes(block[position..(block.Length - 1)]); + } + block[block.Length - 1] = (byte)count; + + return count; + } +#endif + + public int PadCount(byte[] input) + { + int count = input[input.Length -1]; + int position = input.Length - count; + + int failed = (position | (count - 1)) >> 31; + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int PadCount(ReadOnlySpan block) + { + int count = block[block.Length - 1]; + int position = block.Length - count; + + int failed = (position | (count - 1)) >> 31; + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs.meta new file mode 100644 index 00000000..079d50ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fe1558dfd56858f43a505b6d9c5f3a33 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO10126d2Padding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs new file mode 100644 index 00000000..eefe3564 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + /** + * A padder that adds the padding according to the scheme referenced in + * ISO 7814-4 - scheme 2 from ISO 9797-1. The first byte is 0x80, rest is 0x00 + */ + public class ISO7816d4Padding + : IBlockCipherPadding + { + /** + * Initialise the padder. + * + * @param random - a SecureRandom if available. + */ + public void Init( + SecureRandom random) + { + // nothing to do. + } + + /** + * Return the name of the algorithm the padder implements. + * + * @return the name of the algorithm the padder implements. + */ + public string PaddingName + { + get { return "ISO7816-4"; } + } + + public int AddPadding(byte[] input, int inOff) + { + int count = input.Length - inOff; + + input[inOff]= 0x80; + while (++inOff < input.Length) + { + input[inOff] = 0x00; + } + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int AddPadding(Span block, int position) + { + int count = block.Length - position; + block[position++] = 0x80; + block[position..].Fill(0x00); + return count; + } +#endif + + public int PadCount(byte[] input) + { + int position = -1, still00Mask = -1; + int i = input.Length; + while (--i >= 0) + { + int next = input[i]; + int match00Mask = ((next ^ 0x00) - 1) >> 31; + int match80Mask = ((next ^ 0x80) - 1) >> 31; + position ^= (i ^ position) & still00Mask & match80Mask; + still00Mask &= match00Mask; + } + if (position < 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return input.Length - position; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int PadCount(ReadOnlySpan block) + { + int position = -1, still00Mask = -1; + int i = block.Length; + while (--i >= 0) + { + int next = block[i]; + int match00Mask = ((next ^ 0x00) - 1) >> 31; + int match80Mask = ((next ^ 0x80) - 1) >> 31; + position ^= (i ^ position) & still00Mask & match80Mask; + still00Mask &= match00Mask; + } + if (position < 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return block.Length - position; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs.meta new file mode 100644 index 00000000..56117a19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 929db33ee95478f4d82801656a2be80d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ISO7816d4Padding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs new file mode 100644 index 00000000..f352a880 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs @@ -0,0 +1,388 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + /** + * A wrapper class that allows block ciphers to be used to process data in + * a piecemeal fashion with padding. The PaddedBufferedBlockCipher + * outputs a block only when the buffer is full and more data is being added, + * or on a doFinal (unless the current block in the buffer is a pad block). + * The default padding mechanism used is the one outlined in Pkcs5/Pkcs7. + */ + public class PaddedBufferedBlockCipher + : BufferedBlockCipher + { + private readonly IBlockCipherPadding padding; + + public PaddedBufferedBlockCipher(IBlockCipher cipher, IBlockCipherPadding padding) + : this(EcbBlockCipher.GetBlockCipherMode(cipher), padding) + { + } + + /** + * Create a buffered block cipher with the desired padding. + * + * @param cipher the underlying block cipher this buffering object wraps. + * @param padding the padding type. + */ + public PaddedBufferedBlockCipher(IBlockCipherMode cipherMode, IBlockCipherPadding padding) + { + m_cipherMode = cipherMode; + this.padding = padding; + + buf = new byte[m_cipherMode.GetBlockSize()]; + bufOff = 0; + } + + /** + * Create a buffered block cipher Pkcs7 padding + * + * @param cipher the underlying block cipher this buffering object wraps. + */ + public PaddedBufferedBlockCipher(IBlockCipherMode cipherMode) + : this(cipherMode, new Pkcs7Padding()) + { + } + + /** + * initialise the cipher. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public override void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + SecureRandom initRandom = null; + if (parameters is ParametersWithRandom withRandom) + { + initRandom = withRandom.Random; + parameters = withRandom.Parameters; + } + + Reset(); + padding.Init(initRandom); + m_cipherMode.Init(forEncryption, parameters); + } + + /** + * return the minimum size of the output buffer required for an update + * plus a doFinal with an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update and doFinal + * with len bytes of input. + */ + public override int GetOutputSize( + int length) + { + int total = length + bufOff; + int leftOver = total % buf.Length; + + if (leftOver == 0) + { + if (forEncryption) + { + return total + buf.Length; + } + + return total; + } + + return total - leftOver + buf.Length; + } + + /** + * return the size of the output buffer required for an update + * an input of len bytes. + * + * @param len the length of the input. + * @return the space required to accommodate a call to update + * with len bytes of input. + */ + public override int GetUpdateOutputSize( + int length) + { + int total = length + bufOff; + int leftOver = total % buf.Length; + + if (leftOver == 0) + { + return total - buf.Length; + } + + return total - leftOver; + } + + /** + * process a single byte, producing an output block if necessary. + * + * @param in the input byte. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessByte(byte input, byte[] output, int outOff) + { + int resultLen = 0; + + if (bufOff == buf.Length) + { + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + bufOff = 0; + } + + buf[bufOff++] = input; + + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessByte(byte input, Span output) + { + int resultLen = 0; + + if (bufOff == buf.Length) + { + resultLen = m_cipherMode.ProcessBlock(buf, output); + bufOff = 0; + } + + buf[bufOff++] = input; + + return resultLen; + } +#endif + + /** + * process an array of bytes, producing output if necessary. + * + * @param in the input byte array. + * @param inOff the offset at which the input data starts. + * @param len the number of bytes to be copied out of the input array. + * @param out the space for any output that might be produced. + * @param outOff the offset from which the output will be copied. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there isn't enough space in out. + * @exception InvalidOperationException if the cipher isn't initialised. + */ + public override int ProcessBytes(byte[] input, int inOff, int length, byte[] output, int outOff) + { + if (length < 0) + throw new ArgumentException("Can't have a negative input length!"); + + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(length); + + if (outLength > 0) + { + Check.OutputLength(output, outOff, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + + if (length > gapLen) + { + Array.Copy(input, inOff, buf, bufOff, gapLen); + + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + + bufOff = 0; + length -= gapLen; + inOff += gapLen; + + while (length > buf.Length) + { + resultLen += m_cipherMode.ProcessBlock(input, inOff, output, outOff + resultLen); + + length -= blockSize; + inOff += blockSize; + } + } + + Array.Copy(input, inOff, buf, bufOff, length); + + bufOff += length; + + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int ProcessBytes(ReadOnlySpan input, Span output) + { + int blockSize = GetBlockSize(); + int outLength = GetUpdateOutputSize(input.Length); + + if (outLength > 0) + { + Check.OutputLength(output, outLength, "output buffer too short"); + } + + int resultLen = 0; + int gapLen = buf.Length - bufOff; + + if (input.Length > gapLen) + { + input[..gapLen].CopyTo(buf.AsSpan(bufOff)); + + resultLen = m_cipherMode.ProcessBlock(buf, output); + + bufOff = 0; + input = input[gapLen..]; + + while (input.Length > buf.Length) + { + resultLen += m_cipherMode.ProcessBlock(input, output[resultLen..]); + + input = input[blockSize..]; + } + } + + input.CopyTo(buf.AsSpan(bufOff)); + + bufOff += input.Length; + + return resultLen; + } +#endif + + /** + * Process the last block in the buffer. If the buffer is currently + * full and padding needs to be added a call to doFinal will produce + * 2 * GetBlockSize() bytes. + * + * @param out the array the block currently being held is copied into. + * @param outOff the offset at which the copying starts. + * @return the number of output bytes copied to out. + * @exception DataLengthException if there is insufficient space in out for + * the output or we are decrypting and the input is not block size aligned. + * @exception InvalidOperationException if the underlying cipher is not + * initialised. + * @exception InvalidCipherTextException if padding is expected and not found. + */ + public override int DoFinal(byte[] output, int outOff) + { + int blockSize = m_cipherMode.GetBlockSize(); + int resultLen = 0; + + if (forEncryption) + { + if (bufOff == blockSize) + { + if ((outOff + 2 * blockSize) > output.Length) + { + Reset(); + + throw new OutputLengthException("output buffer too short"); + } + + resultLen = m_cipherMode.ProcessBlock(buf, 0, output, outOff); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + + resultLen += m_cipherMode.ProcessBlock(buf, 0, output, outOff + resultLen); + + Reset(); + } + else + { + if (bufOff == blockSize) + { + resultLen = m_cipherMode.ProcessBlock(buf, 0, buf, 0); + bufOff = 0; + } + else + { + Reset(); + + throw new DataLengthException("last block incomplete in decryption"); + } + + try + { + resultLen -= padding.PadCount(buf); + + Array.Copy(buf, 0, output, outOff, resultLen); + } + finally + { + Reset(); + } + } + + return resultLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int DoFinal(Span output) + { + int blockSize = m_cipherMode.GetBlockSize(); + int resultLen = 0; + + if (forEncryption) + { + if (bufOff == blockSize) + { + if ((2 * blockSize) > output.Length) + { + Reset(); + + throw new OutputLengthException("output buffer too short"); + } + + resultLen = m_cipherMode.ProcessBlock(buf, output); + bufOff = 0; + } + + padding.AddPadding(buf, bufOff); + + resultLen += m_cipherMode.ProcessBlock(buf, output[resultLen..]); + + Reset(); + } + else + { + if (bufOff != blockSize) + { + Reset(); + + throw new DataLengthException("last block incomplete in decryption"); + } + + resultLen = m_cipherMode.ProcessBlock(buf, buf); + bufOff = 0; + + try + { + resultLen -= padding.PadCount(buf); + + buf.AsSpan(0, resultLen).CopyTo(output); + } + finally + { + Reset(); + } + } + + return resultLen; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs.meta new file mode 100644 index 00000000..1d776640 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 14b87b703dc44394c9429b41e7d5fe27 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/PaddedBufferedBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs new file mode 100644 index 00000000..5369def4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + /** + * A padder that adds Pkcs7/Pkcs5 padding to a block. + */ + public class Pkcs7Padding + : IBlockCipherPadding + { + /** + * Initialise the padder. + * + * @param random - a SecureRandom if available. + */ + public void Init( + SecureRandom random) + { + // nothing to do. + } + + /** + * Return the name of the algorithm the cipher implements. + * + * @return the name of the algorithm the cipher implements. + */ + public string PaddingName + { + get { return "PKCS7"; } + } + + public int AddPadding(byte[] input, int inOff) + { + int count = input.Length - inOff; + byte padValue = (byte)count; + + while (inOff < input.Length) + { + input[inOff++] = padValue; + } + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int AddPadding(Span block, int position) + { + int count = block.Length - position; + byte padValue = (byte)count; + block[position..].Fill(padValue); + return count; + } +#endif + + public int PadCount(byte[] input) + { + byte padValue = input[input.Length - 1]; + int count = padValue; + int position = input.Length - count; + + int failed = (position | (count - 1)) >> 31; + for (int i = 0; i < input.Length; ++i) + { + failed |= (input[i] ^ padValue) & ~((i - position) >> 31); + } + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int PadCount(ReadOnlySpan block) + { + byte padValue = block[block.Length - 1]; + int count = padValue; + int position = block.Length - count; + + int failed = (position | (count - 1)) >> 31; + for (int i = 0; i < block.Length; ++i) + { + failed |= (block[i] ^ padValue) & ~((i - position) >> 31); + } + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs.meta new file mode 100644 index 00000000..52c9d0f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a8a5b6cb1eae8a4ebf73109d8a79ebc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/Pkcs7Padding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs new file mode 100644 index 00000000..7d591aba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs @@ -0,0 +1,105 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + + /// A padder that adds Trailing-Bit-Compliment padding to a block. + ///

+ /// This padding pads the block out compliment of the last bit + /// of the plain text. + ///

+ ///
+ public class TbcPadding + : IBlockCipherPadding + { + /// Return the name of the algorithm the cipher implements. + /// the name of the algorithm the cipher implements. + /// + public string PaddingName + { + get { return "TBC"; } + } + + /// Initialise the padder. + /// - a SecureRandom if available. + /// + public virtual void Init(SecureRandom random) + { + // nothing to do. + } + + /// add the pad bytes to the passed in block, returning the number of bytes added. + /// + /// This assumes that the last block of plain text is always passed to it inside . + /// i.e. if is zero, indicating the padding will fill the entire block,the value of + /// should be the same as the last block of plain text. + /// + public virtual int AddPadding(byte[] input, int inOff) + { + int count = input.Length - inOff; + byte lastByte = inOff > 0 ? input[inOff - 1] : input[input.Length - 1]; + byte padValue = (byte)((lastByte & 1) - 1); + + while (inOff < input.Length) + { + input[inOff++] = padValue; + } + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// add the pad bytes to the passed in block, returning the number of bytes added. + /// + /// This assumes that the last block of plain text is always passed to it inside . + /// i.e. if is zero, indicating the padding will fill the entire block,the value of + /// should be the same as the last block of plain text. + /// + public virtual int AddPadding(Span block, int position) + { + byte lastByte = position > 0 ? block[position - 1] : block[block.Length - 1]; + byte padValue = (byte)((lastByte & 1) - 1); + + var padding = block[position..]; + padding.Fill(padValue); + return padding.Length; + } +#endif + + public virtual int PadCount(byte[] input) + { + int i = input.Length; + int code = input[--i], count = 1, countingMask = -1; + while (--i >= 0) + { + int next = input[i]; + int matchMask = ((next ^ code) - 1) >> 31; + countingMask &= matchMask; + count -= countingMask; + } + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int PadCount(ReadOnlySpan block) + { + int i = block.Length; + int code = block[--i], count = 1, countingMask = -1; + while (--i >= 0) + { + int next = block[i]; + int matchMask = ((next ^ code) - 1) >> 31; + countingMask &= matchMask; + count -= countingMask; + } + return count; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs.meta new file mode 100644 index 00000000..d94f6fe8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e31faf0c613de74baf79100a792b443 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/TbcPadding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs new file mode 100644 index 00000000..ade3d0ae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs @@ -0,0 +1,107 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + /** + * A padder that adds X9.23 padding to a block - if a SecureRandom is + * passed in random padding is assumed, otherwise padding with zeros is used. + */ + public class X923Padding + : IBlockCipherPadding + { + private SecureRandom random; + + /** + * Initialise the padder. + * + * @param random a SecureRandom if one is available. + */ + public void Init( + SecureRandom random) + { + this.random = random; + } + + /** + * Return the name of the algorithm the cipher implements. + * + * @return the name of the algorithm the cipher implements. + */ + public string PaddingName + { + get { return "X9.23"; } + } + + public int AddPadding(byte[] input, int inOff) + { + int count = input.Length - inOff; + if (count > 1) + { + if (random == null) + { + Arrays.Fill(input, inOff, input.Length - 1, 0x00); + } + else + { + random.NextBytes(input, inOff, count - 1); + } + } + input[input.Length - 1] = (byte)count; + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int AddPadding(Span block, int position) + { + int count = block.Length - position; + if (count > 1) + { + var body = block[position..(block.Length - 1)]; + if (random == null) + { + body.Fill(0x00); + } + else + { + random.NextBytes(body); + } + } + block[block.Length - 1] = (byte)count; + return count; + } +#endif + + public int PadCount(byte[] input) + { + int count = input[input.Length - 1]; + int position = input.Length - count; + + int failed = (position | (count - 1)) >> 31; + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int PadCount(ReadOnlySpan block) + { + int count = block[block.Length - 1]; + int position = block.Length - count; + + int failed = (position | (count - 1)) >> 31; + if (failed != 0) + throw new InvalidCipherTextException("pad block corrupted"); + + return count; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs.meta new file mode 100644 index 00000000..be60e765 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 11591317706d1fd4088d96933bcd7c48 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/X923Padding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs new file mode 100644 index 00000000..e8f50b07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings +{ + + /// A padder that adds Null byte padding to a block. + public class ZeroBytePadding : IBlockCipherPadding + { + /// Return the name of the algorithm the cipher implements. + /// + /// + /// the name of the algorithm the cipher implements. + /// + public string PaddingName + { + get { return "ZeroBytePadding"; } + } + + /// Initialise the padder. + /// + /// + /// - a SecureRandom if available. + /// + public void Init(SecureRandom random) + { + // nothing to do. + } + + public int AddPadding(byte[] input, int inOff) + { + int added = input.Length - inOff; + + while (inOff < input.Length) + { + input[inOff++] = 0x00; + } + + return added; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int AddPadding(Span block, int position) + { + int count = block.Length - position; + block[position..].Fill(0x00); + return count; + } +#endif + + public int PadCount(byte[] input) + { + int count = 0, still00Mask = -1; + int i = input.Length; + while (--i >= 0) + { + int next = input[i]; + int match00Mask = ((next ^ 0x00) - 1) >> 31; + still00Mask &= match00Mask; + count -= still00Mask; + } + return count; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int PadCount(ReadOnlySpan block) + { + int count = 0, still00Mask = -1; + int i = block.Length; + while (--i >= 0) + { + int next = block[i]; + int match00Mask = ((next ^ 0x00) - 1) >> 31; + still00Mask &= match00Mask; + count -= still00Mask; + } + return count; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs.meta new file mode 100644 index 00000000..ae42b57d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7f58f8fba737414894011d0f9a4e0de +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/paddings/ZeroBytePadding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters.meta new file mode 100644 index 00000000..88f15a66 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ebd0ed2cca847e44498dc0603272bb3d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs new file mode 100644 index 00000000..8e25e1d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class AeadParameters + : ICipherParameters + { + private readonly byte[] associatedText; + private readonly byte[] nonce; + private readonly KeyParameter key; + private readonly int macSize; + + /** + * Base constructor. + * + * @param key key to be used by underlying cipher + * @param macSize macSize in bits + * @param nonce nonce to be used + */ + public AeadParameters(KeyParameter key, int macSize, byte[] nonce) + : this(key, macSize, nonce, null) + { + } + + /** + * Base constructor. + * + * @param key key to be used by underlying cipher + * @param macSize macSize in bits + * @param nonce nonce to be used + * @param associatedText associated text, if any + */ + public AeadParameters( + KeyParameter key, + int macSize, + byte[] nonce, + byte[] associatedText) + { + this.key = key; + this.nonce = nonce; + this.macSize = macSize; + this.associatedText = associatedText; + } + + public virtual KeyParameter Key + { + get { return key; } + } + + public virtual int MacSize + { + get { return macSize; } + } + + public virtual byte[] GetAssociatedText() + { + return associatedText; + } + + public virtual byte[] GetNonce() + { + return nonce; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs.meta new file mode 100644 index 00000000..71a51849 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 02ea42e19df577c44977d97e7ae26c23 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/AEADParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs new file mode 100644 index 00000000..1ec504d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /// Blake3 Parameters. + public sealed class Blake3Parameters + : ICipherParameters + { + private const int KeyLen = 32; + + private byte[] m_theKey; + private byte[] m_theContext; + + /// Create a key parameter. + /// the context + /// the parameter + public static Blake3Parameters Context(byte[] pContext) + { + if (pContext == null) + throw new ArgumentNullException(nameof(pContext)); + + Blake3Parameters myParams = new Blake3Parameters(); + myParams.m_theContext = Arrays.Clone(pContext); + return myParams; + } + + /// Create a key parameter. + /// the key + /// the parameter + public static Blake3Parameters Key(byte[] pKey) + { + if (pKey == null) + throw new ArgumentNullException(nameof(pKey)); + if (pKey.Length != KeyLen) + throw new ArgumentException("Invalid key length", nameof(pKey)); + + Blake3Parameters myParams = new Blake3Parameters(); + myParams.m_theKey = Arrays.Clone(pKey); + return myParams; + } + + /// Obtain the key. + /// the key + public byte[] GetKey() => Arrays.Clone(m_theKey); + + /// Clear the key bytes. + public void ClearKey() + { + Arrays.Fill(m_theKey, 0); + } + + /// Obtain the salt. + /// the salt + public byte[] GetContext() => Arrays.Clone(m_theContext); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs.meta new file mode 100644 index 00000000..e76c0bbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2db7a9cd5ada5e24e974e87b0d2c7240 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Blake3Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs new file mode 100644 index 00000000..b0760509 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHKeyGenerationParameters + : KeyGenerationParameters + { + private readonly DHParameters parameters; + + public DHKeyGenerationParameters( + SecureRandom random, + DHParameters parameters) + : base(random, GetStrength(parameters)) + { + this.parameters = parameters; + } + + public DHParameters Parameters + { + get { return parameters; } + } + + internal static int GetStrength( + DHParameters parameters) + { + return parameters.L != 0 ? parameters.L : parameters.P.BitLength; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..79ebaf09 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5046fc87c33be424cb316fb38b301bc0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs new file mode 100644 index 00000000..b2e1aef0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHKeyParameters + : AsymmetricKeyParameter + { + private readonly DHParameters parameters; + private readonly DerObjectIdentifier algorithmOid; + + protected DHKeyParameters( + bool isPrivate, + DHParameters parameters) + : this(isPrivate, parameters, PkcsObjectIdentifiers.DhKeyAgreement) + { + } + + protected DHKeyParameters( + bool isPrivate, + DHParameters parameters, + DerObjectIdentifier algorithmOid) + : base(isPrivate) + { + // TODO Should we allow parameters to be null? + this.parameters = parameters; + this.algorithmOid = algorithmOid; + } + + public DHParameters Parameters + { + get { return parameters; } + } + + public DerObjectIdentifier AlgorithmOid + { + get { return algorithmOid; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DHKeyParameters other = obj as DHKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DHKeyParameters other) + { + return Org.BouncyCastle.Utilities.Platform.Equals(parameters, other.parameters) + && base.Equals(other); + } + + public override int GetHashCode() + { + int hc = base.GetHashCode(); + + if (parameters != null) + { + hc ^= parameters.GetHashCode(); + } + + return hc; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs.meta new file mode 100644 index 00000000..380811d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 452ba3b66b459c148a9e30087dfc5cdb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs new file mode 100644 index 00000000..eeba31c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs @@ -0,0 +1,189 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHParameters + : ICipherParameters + { + private const int DefaultMinimumLength = 160; + + private readonly BigInteger p, g, q, j; + private readonly int m, l; + private readonly DHValidationParameters validation; + + private static int GetDefaultMParam( + int lParam) + { + if (lParam == 0) + return DefaultMinimumLength; + + return System.Math.Min(lParam, DefaultMinimumLength); + } + + public DHParameters( + BigInteger p, + BigInteger g) + : this(p, g, null, 0) + { + } + + public DHParameters( + BigInteger p, + BigInteger g, + BigInteger q) + : this(p, g, q, 0) + { + } + + public DHParameters( + BigInteger p, + BigInteger g, + BigInteger q, + int l) + : this(p, g, q, GetDefaultMParam(l), l, null, null) + { + } + + public DHParameters( + BigInteger p, + BigInteger g, + BigInteger q, + int m, + int l) + : this(p, g, q, m, l, null, null) + { + } + + public DHParameters( + BigInteger p, + BigInteger g, + BigInteger q, + BigInteger j, + DHValidationParameters validation) + : this(p, g, q, DefaultMinimumLength, 0, j, validation) + { + } + + public DHParameters( + BigInteger p, + BigInteger g, + BigInteger q, + int m, + int l, + BigInteger j, + DHValidationParameters validation) + { + if (p == null) + throw new ArgumentNullException("p"); + if (g == null) + throw new ArgumentNullException("g"); + if (!p.TestBit(0)) + throw new ArgumentException("field must be an odd prime", "p"); + if (g.CompareTo(BigInteger.Two) < 0 + || g.CompareTo(p.Subtract(BigInteger.Two)) > 0) + throw new ArgumentException("generator must in the range [2, p - 2]", "g"); + if (q != null && q.BitLength >= p.BitLength) + throw new ArgumentException("q too big to be a factor of (p-1)", "q"); + if (m >= p.BitLength) + throw new ArgumentException("m value must be < bitlength of p", "m"); + if (l != 0) + { + // TODO Check this against the Java version, which has 'l > p.BitLength' here + if (l >= p.BitLength) + throw new ArgumentException("when l value specified, it must be less than bitlength(p)", "l"); + if (l < m) + throw new ArgumentException("when l value specified, it may not be less than m value", "l"); + } + if (j != null && j.CompareTo(BigInteger.Two) < 0) + throw new ArgumentException("subgroup factor must be >= 2", "j"); + + // TODO If q, j both provided, validate p = jq + 1 ? + + this.p = p; + this.g = g; + this.q = q; + this.m = m; + this.l = l; + this.j = j; + this.validation = validation; + } + + public BigInteger P + { + get { return p; } + } + + public BigInteger G + { + get { return g; } + } + + public BigInteger Q + { + get { return q; } + } + + public BigInteger J + { + get { return j; } + } + + /// The minimum bitlength of the private value. + public int M + { + get { return m; } + } + + /// The bitlength of the private value. + public int L + { + get { return l; } + } + + public DHValidationParameters ValidationParameters + { + get { return validation; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DHParameters other = obj as DHParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected virtual bool Equals( + DHParameters other) + { + return p.Equals(other.p) + && g.Equals(other.g) + && Org.BouncyCastle.Utilities.Platform.Equals(q, other.q); + } + + public override int GetHashCode() + { + int hc = p.GetHashCode() ^ g.GetHashCode(); + + if (q != null) + { + hc ^= q.GetHashCode(); + } + + return hc; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs.meta new file mode 100644 index 00000000..12129689 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e33a656f0bf94b046960f491bb05f828 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs new file mode 100644 index 00000000..8141d4a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHPrivateKeyParameters + : DHKeyParameters + { + private readonly BigInteger x; + + public DHPrivateKeyParameters( + BigInteger x, + DHParameters parameters) + : base(true, parameters) + { + this.x = x; + } + + public DHPrivateKeyParameters( + BigInteger x, + DHParameters parameters, + DerObjectIdentifier algorithmOid) + : base(true, parameters, algorithmOid) + { + this.x = x; + } + + public BigInteger X + { + get { return x; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DHPrivateKeyParameters other = obj as DHPrivateKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DHPrivateKeyParameters other) + { + return x.Equals(other.x) && base.Equals(other); + } + + public override int GetHashCode() + { + return x.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs.meta new file mode 100644 index 00000000..a3786e4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 48fe2ffab16272d4791dbc01a9bd79fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs new file mode 100644 index 00000000..f459cdb0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs @@ -0,0 +1,171 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHPublicKeyParameters + : DHKeyParameters + { + private static BigInteger Validate(BigInteger y, DHParameters dhParams) + { + if (y == null) + throw new ArgumentNullException("y"); + + BigInteger p = dhParams.P; + + // TLS check + if (y.CompareTo(BigInteger.Two) < 0 || y.CompareTo(p.Subtract(BigInteger.Two)) > 0) + throw new ArgumentException("invalid DH public key", "y"); + + BigInteger q = dhParams.Q; + + // We can't validate without Q. + if (q == null) + return y; + + if (p.TestBit(0) + && p.BitLength - 1 == q.BitLength + && p.ShiftRight(1).Equals(q)) + { + // Safe prime case + if (1 == Legendre(y, p)) + return y; + } + else + { + if (BigInteger.One.Equals(y.ModPow(q, p))) + return y; + } + + throw new ArgumentException("value does not appear to be in correct group", "y"); + } + + private readonly BigInteger y; + + public DHPublicKeyParameters( + BigInteger y, + DHParameters parameters) + : base(false, parameters) + { + this.y = Validate(y, parameters); + } + + public DHPublicKeyParameters( + BigInteger y, + DHParameters parameters, + DerObjectIdentifier algorithmOid) + : base(false, parameters, algorithmOid) + { + this.y = Validate(y, parameters); + } + + public virtual BigInteger Y + { + get { return y; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DHPublicKeyParameters other = obj as DHPublicKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DHPublicKeyParameters other) + { + return y.Equals(other.y) && base.Equals(other); + } + + public override int GetHashCode() + { + return y.GetHashCode() ^ base.GetHashCode(); + } + + private static int Legendre(BigInteger a, BigInteger b) + { + //int r = 0, bits = b.IntValue; + + //for (;;) + //{ + // int lowestSetBit = a.GetLowestSetBit(); + // a = a.ShiftRight(lowestSetBit); + // r ^= (bits ^ (bits >> 1)) & (lowestSetBit << 1); + + // int cmp = a.CompareTo(b); + // if (cmp == 0) + // break; + + // if (cmp < 0) + // { + // BigInteger t = a; a = b; b = t; + + // int oldBits = bits; + // bits = b.IntValue; + // r ^= oldBits & bits; + // } + + // a = a.Subtract(b); + //} + + //return BigInteger.One.Equals(b) ? (1 - (r & 2)) : 0; + + int bitLength = b.BitLength; + uint[] A = Nat.FromBigInteger(bitLength, a); + uint[] B = Nat.FromBigInteger(bitLength, b); + + int r = 0; + + int len = B.Length; + for (;;) + { + while (A[0] == 0) + { + Nat.ShiftDownWord(len, A, 0); + } + + int shift = Integers.NumberOfTrailingZeros((int)A[0]); + if (shift > 0) + { + Nat.ShiftDownBits(len, A, shift, 0); + int bits = (int)B[0]; + r ^= (bits ^ (bits >> 1)) & (shift << 1); + } + + int cmp = Nat.Compare(len, A, B); + if (cmp == 0) + break; + + if (cmp < 0) + { + r ^= (int)(A[0] & B[0]); + uint[] t = A; A = B; B = t; + } + + while (A[len - 1] == 0) + { + len = len - 1; + } + + Nat.Sub(len, A, B, A); + } + + return Nat.IsOne(len, B) ? (1 - (r & 2)) : 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs.meta new file mode 100644 index 00000000..428cac81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 04f5f7feccc128d4db02735df3512cf4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHPublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs new file mode 100644 index 00000000..9b08bbf0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DHValidationParameters + { + private readonly byte[] seed; + private readonly int counter; + + public DHValidationParameters( + byte[] seed, + int counter) + { + if (seed == null) + throw new ArgumentNullException("seed"); + + this.seed = (byte[]) seed.Clone(); + this.counter = counter; + } + + public byte[] GetSeed() + { + return (byte[]) seed.Clone(); + } + + public int Counter + { + get { return counter; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DHValidationParameters other = obj as DHValidationParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DHValidationParameters other) + { + return counter == other.counter + && Arrays.AreEqual(this.seed, other.seed); + } + + public override int GetHashCode() + { + return counter.GetHashCode() ^ Arrays.GetHashCode(seed); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs.meta new file mode 100644 index 00000000..65a466fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ade7a28f8b712574ab48a733a6a4a8f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DHValidationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs new file mode 100644 index 00000000..190b2c9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs @@ -0,0 +1,78 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaParameterGenerationParameters + { + public const int DigitalSignatureUsage = 1; + public const int KeyEstablishmentUsage = 2; + + private readonly int l; + private readonly int n; + private readonly int certainty; + private readonly SecureRandom random; + private readonly int usageIndex; + + /** + * Construct without a usage index, this will do a random construction of G. + * + * @param L desired length of prime P in bits (the effective key size). + * @param N desired length of prime Q in bits. + * @param certainty certainty level for prime number generation. + * @param random the source of randomness to use. + */ + public DsaParameterGenerationParameters(int L, int N, int certainty, SecureRandom random) + : this(L, N, certainty, random, -1) + { + } + + /** + * Construct for a specific usage index - this has the effect of using verifiable canonical generation of G. + * + * @param L desired length of prime P in bits (the effective key size). + * @param N desired length of prime Q in bits. + * @param certainty certainty level for prime number generation. + * @param random the source of randomness to use. + * @param usageIndex a valid usage index. + */ + public DsaParameterGenerationParameters(int L, int N, int certainty, SecureRandom random, int usageIndex) + { + this.l = L; + this.n = N; + this.certainty = certainty; + this.random = random; + this.usageIndex = usageIndex; + } + + public virtual int L + { + get { return l; } + } + + public virtual int N + { + get { return n; } + } + + public virtual int UsageIndex + { + get { return usageIndex; } + } + + public virtual int Certainty + { + get { return certainty; } + } + + public virtual SecureRandom Random + { + get { return random; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs.meta new file mode 100644 index 00000000..916676c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 00c9484962292a9448a3af0bc5aca7f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DSAParameterGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs new file mode 100644 index 00000000..a3b9e36f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DesEdeParameters + : DesParameters + { + /* + * DES-EDE Key length in bytes. + */ + public const int DesEdeKeyLength = 24; + + private static byte[] FixKey( + byte[] key, + int keyOff, + int keyLen) + { + byte[] tmp = new byte[24]; + + switch (keyLen) + { + case 16: + Array.Copy(key, keyOff, tmp, 0, 16); + Array.Copy(key, keyOff, tmp, 16, 8); + break; + case 24: + Array.Copy(key, keyOff, tmp, 0, 24); + break; + default: + throw new ArgumentException("Bad length for DESede key: " + keyLen, "keyLen"); + } + + if (IsWeakKey(tmp)) + throw new ArgumentException("attempt to create weak DESede key"); + + return tmp; + } + + public DesEdeParameters( + byte[] key) + : base(FixKey(key, 0, key.Length)) + { + } + + public DesEdeParameters( + byte[] key, + int keyOff, + int keyLen) + : base(FixKey(key, keyOff, keyLen)) + { + } + + /** + * return true if the passed in key is a DES-EDE weak key. + * + * @param key bytes making up the key + * @param offset offset into the byte array the key starts at + * @param length number of bytes making up the key + */ + public static bool IsWeakKey( + byte[] key, + int offset, + int length) + { + for (int i = offset; i < length; i += DesKeyLength) + { + if (DesParameters.IsWeakKey(key, i)) + { + return true; + } + } + + return false; + } + + /** + * return true if the passed in key is a DES-EDE weak key. + * + * @param key bytes making up the key + * @param offset offset into the byte array the key starts at + */ + public static new bool IsWeakKey( + byte[] key, + int offset) + { + return IsWeakKey(key, offset, key.Length - offset); + } + + public static new bool IsWeakKey( + byte[] key) + { + return IsWeakKey(key, 0, key.Length); + } + + /** + * return true if the passed in key is a real 2/3 part DES-EDE key. + * + * @param key bytes making up the key + * @param offset offset into the byte array the key starts at + */ + public static bool IsRealEdeKey(byte[] key, int offset) + { + return key.Length == 16 ? IsReal2Key(key, offset) : IsReal3Key(key, offset); + } + + /** + * return true if the passed in key is a real 2 part DES-EDE key. + * + * @param key bytes making up the key + * @param offset offset into the byte array the key starts at + */ + public static bool IsReal2Key(byte[] key, int offset) + { + bool isValid = false; + for (int i = offset; i != offset + 8; i++) + { + isValid |= (key[i] != key[i + 8]); + } + return isValid; + } + + /** + * return true if the passed in key is a real 3 part DES-EDE key. + * + * @param key bytes making up the key + * @param offset offset into the byte array the key starts at + */ + public static bool IsReal3Key(byte[] key, int offset) + { + bool diff12 = false, diff13 = false, diff23 = false; + for (int i = offset; i != offset + 8; i++) + { + diff12 |= (key[i] != key[i + 8]); + diff13 |= (key[i] != key[i + 16]); + diff23 |= (key[i + 8] != key[i + 16]); + } + return diff12 && diff13 && diff23; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs.meta new file mode 100644 index 00000000..e8656d87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 33e292373b4fa564dbabdf56717f5037 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesEdeParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs new file mode 100644 index 00000000..62a3ca82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs @@ -0,0 +1,153 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DesParameters + : KeyParameter + { + public DesParameters( + byte[] key) + : base(key) + { + if (IsWeakKey(key)) + throw new ArgumentException("attempt to create weak DES key"); + } + + public DesParameters( + byte[] key, + int keyOff, + int keyLen) + : base(key, keyOff, keyLen) + { + if (IsWeakKey(key, keyOff)) + throw new ArgumentException("attempt to create weak DES key"); + } + + /* + * DES Key Length in bytes. + */ + public const int DesKeyLength = 8; + + /* + * Table of weak and semi-weak keys taken from Schneier pp281 + */ + private const int N_DES_WEAK_KEYS = 16; + + private static readonly byte[] DES_weak_keys = + { + /* weak keys */ + (byte)0x01,(byte)0x01,(byte)0x01,(byte)0x01, (byte)0x01,(byte)0x01,(byte)0x01,(byte)0x01, + (byte)0x1f,(byte)0x1f,(byte)0x1f,(byte)0x1f, (byte)0x0e,(byte)0x0e,(byte)0x0e,(byte)0x0e, + (byte)0xe0,(byte)0xe0,(byte)0xe0,(byte)0xe0, (byte)0xf1,(byte)0xf1,(byte)0xf1,(byte)0xf1, + (byte)0xfe,(byte)0xfe,(byte)0xfe,(byte)0xfe, (byte)0xfe,(byte)0xfe,(byte)0xfe,(byte)0xfe, + + /* semi-weak keys */ + (byte)0x01,(byte)0xfe,(byte)0x01,(byte)0xfe, (byte)0x01,(byte)0xfe,(byte)0x01,(byte)0xfe, + (byte)0x1f,(byte)0xe0,(byte)0x1f,(byte)0xe0, (byte)0x0e,(byte)0xf1,(byte)0x0e,(byte)0xf1, + (byte)0x01,(byte)0xe0,(byte)0x01,(byte)0xe0, (byte)0x01,(byte)0xf1,(byte)0x01,(byte)0xf1, + (byte)0x1f,(byte)0xfe,(byte)0x1f,(byte)0xfe, (byte)0x0e,(byte)0xfe,(byte)0x0e,(byte)0xfe, + (byte)0x01,(byte)0x1f,(byte)0x01,(byte)0x1f, (byte)0x01,(byte)0x0e,(byte)0x01,(byte)0x0e, + (byte)0xe0,(byte)0xfe,(byte)0xe0,(byte)0xfe, (byte)0xf1,(byte)0xfe,(byte)0xf1,(byte)0xfe, + (byte)0xfe,(byte)0x01,(byte)0xfe,(byte)0x01, (byte)0xfe,(byte)0x01,(byte)0xfe,(byte)0x01, + (byte)0xe0,(byte)0x1f,(byte)0xe0,(byte)0x1f, (byte)0xf1,(byte)0x0e,(byte)0xf1,(byte)0x0e, + (byte)0xe0,(byte)0x01,(byte)0xe0,(byte)0x01, (byte)0xf1,(byte)0x01,(byte)0xf1,(byte)0x01, + (byte)0xfe,(byte)0x1f,(byte)0xfe,(byte)0x1f, (byte)0xfe,(byte)0x0e,(byte)0xfe,(byte)0x0e, + (byte)0x1f,(byte)0x01,(byte)0x1f,(byte)0x01, (byte)0x0e,(byte)0x01,(byte)0x0e,(byte)0x01, + (byte)0xfe,(byte)0xe0,(byte)0xfe,(byte)0xe0, (byte)0xfe,(byte)0xf1,(byte)0xfe,(byte)0xf1 + }; + + /** + * DES has 16 weak keys. This method will check + * if the given DES key material is weak or semi-weak. + * Key material that is too short is regarded as weak. + *

+ * See "Applied + * Cryptography" by Bruce Schneier for more information. + *

+ * @return true if the given DES key material is weak or semi-weak, + * false otherwise. + */ + public static bool IsWeakKey( + byte[] key, + int offset) + { + if (key.Length - offset < DesKeyLength) + throw new ArgumentException("key material too short."); + + //nextkey: + for (int i = 0; i < N_DES_WEAK_KEYS; i++) + { + bool unmatch = false; + for (int j = 0; j < DesKeyLength; j++) + { + if (key[j + offset] != DES_weak_keys[i * DesKeyLength + j]) + { + //continue nextkey; + unmatch = true; + break; + } + } + + if (!unmatch) + { + return true; + } + } + + return false; + } + + public static bool IsWeakKey( + byte[] key) + { + return IsWeakKey(key, 0); + } + + public static byte SetOddParity(byte b) + { + uint parity = b ^ 1U; + parity ^= (parity >> 4); + parity ^= (parity >> 2); + parity ^= (parity >> 1); + parity &= 1U; + + return (byte)(b ^ parity); + } + + /** + * DES Keys use the LSB as the odd parity bit. This can + * be used to check for corrupt keys. + * + * @param bytes the byte array to set the parity on. + */ + public static void SetOddParity(byte[] bytes) + { + for (int i = 0; i < bytes.Length; i++) + { + bytes[i] = SetOddParity(bytes[i]); + } + } + + public static void SetOddParity(byte[] bytes, int off, int len) + { + for (int i = 0; i < len; i++) + { + bytes[off + i] = SetOddParity(bytes[off + i]); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void SetOddParity(Span bytes) + { + for (int i = 0; i < bytes.Length; i++) + { + bytes[i] = SetOddParity(bytes[i]); + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs.meta new file mode 100644 index 00000000..b24cfefc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed1acf68a2d39a84db0419ba2242da6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DesParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs new file mode 100644 index 00000000..e207ce2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaKeyGenerationParameters + : KeyGenerationParameters + { + private readonly DsaParameters parameters; + + public DsaKeyGenerationParameters( + SecureRandom random, + DsaParameters parameters) + : base(random, parameters.P.BitLength - 1) + { + this.parameters = parameters; + } + + public DsaParameters Parameters + { + get { return parameters; } + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..f6a7f9e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3388e3f46009aa04ab63d742a4d7ec5b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs new file mode 100644 index 00000000..def59fa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public abstract class DsaKeyParameters + : AsymmetricKeyParameter + { + private readonly DsaParameters parameters; + + protected DsaKeyParameters( + bool isPrivate, + DsaParameters parameters) + : base(isPrivate) + { + // Note: parameters may be null + this.parameters = parameters; + } + + public DsaParameters Parameters + { + get { return parameters; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DsaKeyParameters other = obj as DsaKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DsaKeyParameters other) + { + return Org.BouncyCastle.Utilities.Platform.Equals(parameters, other.parameters) + && base.Equals(other); + } + + public override int GetHashCode() + { + int hc = base.GetHashCode(); + + if (parameters != null) + { + hc ^= parameters.GetHashCode(); + } + + return hc; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs.meta new file mode 100644 index 00000000..4bd47023 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 52229c7d1596b2e4583acc0f3100c03e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs new file mode 100644 index 00000000..7585a0dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaParameters + : ICipherParameters + { + private readonly BigInteger p, q , g; + private readonly DsaValidationParameters validation; + + public DsaParameters( + BigInteger p, + BigInteger q, + BigInteger g) + : this(p, q, g, null) + { + } + + public DsaParameters( + BigInteger p, + BigInteger q, + BigInteger g, + DsaValidationParameters parameters) + { + if (p == null) + throw new ArgumentNullException("p"); + if (q == null) + throw new ArgumentNullException("q"); + if (g == null) + throw new ArgumentNullException("g"); + + this.p = p; + this.q = q; + this.g = g; + this.validation = parameters; + } + + public BigInteger P + { + get { return p; } + } + + public BigInteger Q + { + get { return q; } + } + + public BigInteger G + { + get { return g; } + } + + public DsaValidationParameters ValidationParameters + { + get { return validation; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DsaParameters other = obj as DsaParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DsaParameters other) + { + return p.Equals(other.p) && q.Equals(other.q) && g.Equals(other.g); + } + + public override int GetHashCode() + { + return p.GetHashCode() ^ q.GetHashCode() ^ g.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs.meta new file mode 100644 index 00000000..bbfe96a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3849c5db5ffe55d4ba1eeac4d2b80120 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs new file mode 100644 index 00000000..cf204b4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaPrivateKeyParameters + : DsaKeyParameters + { + private readonly BigInteger x; + + public DsaPrivateKeyParameters( + BigInteger x, + DsaParameters parameters) + : base(true, parameters) + { + if (x == null) + throw new ArgumentNullException("x"); + + this.x = x; + } + + public BigInteger X + { + get { return x; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DsaPrivateKeyParameters other = obj as DsaPrivateKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DsaPrivateKeyParameters other) + { + return x.Equals(other.x) && base.Equals(other); + } + + public override int GetHashCode() + { + return x.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs.meta new file mode 100644 index 00000000..5411506c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 743ebf6feb08d9f488e3a2664940201e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs new file mode 100644 index 00000000..02e05b3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaPublicKeyParameters + : DsaKeyParameters + { + private static BigInteger Validate(BigInteger y, DsaParameters parameters) + { + // we can't validate without params, fortunately we can't use the key either... + if (parameters != null) + { + if (y.CompareTo(BigInteger.Two) < 0 + || y.CompareTo(parameters.P.Subtract(BigInteger.Two)) > 0 + || !y.ModPow(parameters.Q, parameters.P).Equals(BigInteger.One)) + { + throw new ArgumentException("y value does not appear to be in correct group"); + } + } + + return y; + } + + private readonly BigInteger y; + + public DsaPublicKeyParameters( + BigInteger y, + DsaParameters parameters) + : base(false, parameters) + { + if (y == null) + throw new ArgumentNullException("y"); + + this.y = Validate(y, parameters); + } + + public BigInteger Y + { + get { return y; } + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + + DsaPublicKeyParameters other = obj as DsaPublicKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + DsaPublicKeyParameters other) + { + return y.Equals(other.y) && base.Equals(other); + } + + public override int GetHashCode() + { + return y.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs.meta new file mode 100644 index 00000000..9932a44f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66fa72f172abdc848aaf070bac718cad +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaPublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs new file mode 100644 index 00000000..23ed291a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class DsaValidationParameters + { + private readonly byte[] seed; + private readonly int counter; + private readonly int usageIndex; + + public DsaValidationParameters(byte[] seed, int counter) + : this(seed, counter, -1) + { + } + + public DsaValidationParameters( + byte[] seed, + int counter, + int usageIndex) + { + if (seed == null) + throw new ArgumentNullException("seed"); + + this.seed = (byte[]) seed.Clone(); + this.counter = counter; + this.usageIndex = usageIndex; + } + + public virtual byte[] GetSeed() + { + return (byte[]) seed.Clone(); + } + + public virtual int Counter + { + get { return counter; } + } + + public virtual int UsageIndex + { + get { return usageIndex; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + DsaValidationParameters other = obj as DsaValidationParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected virtual bool Equals( + DsaValidationParameters other) + { + return counter == other.counter + && Arrays.AreEqual(seed, other.seed); + } + + public override int GetHashCode() + { + return counter.GetHashCode() ^ Arrays.GetHashCode(seed); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs.meta new file mode 100644 index 00000000..9bc337c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fca71d5da02303b4e94a16c18ef0ee8f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/DsaValidationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs new file mode 100644 index 00000000..1a0aa072 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECDomainParameters + { + private readonly ECCurve curve; + private readonly byte[] seed; + private readonly ECPoint g; + private readonly BigInteger n; + private readonly BigInteger h; + + private BigInteger hInv; + + public ECDomainParameters(X9ECParameters x9) + : this(x9.Curve, x9.G, x9.N, x9.H, x9.GetSeed()) + { + } + + public ECDomainParameters( + ECCurve curve, + ECPoint g, + BigInteger n) + : this(curve, g, n, BigInteger.One, null) + { + } + + public ECDomainParameters( + ECCurve curve, + ECPoint g, + BigInteger n, + BigInteger h) + : this(curve, g, n, h, null) + { + } + + public ECDomainParameters( + ECCurve curve, + ECPoint g, + BigInteger n, + BigInteger h, + byte[] seed) + { + if (curve == null) + throw new ArgumentNullException("curve"); + if (g == null) + throw new ArgumentNullException("g"); + if (n == null) + throw new ArgumentNullException("n"); + // we can't check for h == null here as h is optional in X9.62 as it is not required for ECDSA + + this.curve = curve; + this.g = ValidatePublicPoint(curve, g); + this.n = n; + this.h = h; + this.seed = Arrays.Clone(seed); + } + + public ECCurve Curve + { + get { return curve; } + } + + public ECPoint G + { + get { return g; } + } + + public BigInteger N + { + get { return n; } + } + + public BigInteger H + { + get { return h; } + } + + public BigInteger HInv + { + get + { + lock (this) + { + if (hInv == null) + { + hInv = BigIntegers.ModOddInverseVar(n, h); + } + return hInv; + } + } + } + + public byte[] GetSeed() + { + return Arrays.Clone(seed); + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ECDomainParameters other = obj as ECDomainParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected virtual bool Equals( + ECDomainParameters other) + { + return curve.Equals(other.curve) + && g.Equals(other.g) + && n.Equals(other.n); + } + + public override int GetHashCode() + { + //return Arrays.GetHashCode(new object[]{ curve, g, n }); + int hc = 4; + hc *= 257; + hc ^= curve.GetHashCode(); + hc *= 257; + hc ^= g.GetHashCode(); + hc *= 257; + hc ^= n.GetHashCode(); + return hc; + } + + public BigInteger ValidatePrivateScalar(BigInteger d) + { + if (null == d) + throw new ArgumentNullException("d", "Scalar cannot be null"); + + if (d.CompareTo(BigInteger.One) < 0 || (d.CompareTo(N) >= 0)) + throw new ArgumentException("Scalar is not in the interval [1, n - 1]", "d"); + + return d; + } + + public ECPoint ValidatePublicPoint(ECPoint q) + { + return ValidatePublicPoint(Curve, q); + } + + internal static ECPoint ValidatePublicPoint(ECCurve c, ECPoint q) + { + if (null == q) + throw new ArgumentNullException("q", "Point cannot be null"); + + q = ECAlgorithms.ImportPoint(c, q).Normalize(); + + if (q.IsInfinity) + throw new ArgumentException("Point at infinity", "q"); + + if (!q.IsValid()) + throw new ArgumentException("Point not on curve", "q"); + + return q; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs.meta new file mode 100644 index 00000000..060e071a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ae5b01638798984f9a2713b2889de3e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECDomainParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs new file mode 100644 index 00000000..2c1a72a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECGost3410Parameters + : ECNamedDomainParameters + { + private readonly DerObjectIdentifier _publicKeyParamSet; + private readonly DerObjectIdentifier _digestParamSet; + private readonly DerObjectIdentifier _encryptionParamSet; + + public DerObjectIdentifier PublicKeyParamSet + { + get { return _publicKeyParamSet; } + } + + public DerObjectIdentifier DigestParamSet + { + get { return _digestParamSet; } + } + + public DerObjectIdentifier EncryptionParamSet + { + get { return _encryptionParamSet; } + } + + public ECGost3410Parameters( + ECNamedDomainParameters dp, + DerObjectIdentifier publicKeyParamSet, + DerObjectIdentifier digestParamSet, + DerObjectIdentifier encryptionParamSet) + : base(dp.Name, dp.Curve, dp.G, dp.N, dp.H, dp.GetSeed()) + { + this._publicKeyParamSet = publicKeyParamSet; + this._digestParamSet = digestParamSet; + this._encryptionParamSet = encryptionParamSet; + } + + public ECGost3410Parameters(ECDomainParameters dp, DerObjectIdentifier publicKeyParamSet, + DerObjectIdentifier digestParamSet, + DerObjectIdentifier encryptionParamSet) + : base(publicKeyParamSet, dp.Curve, dp.G, dp.N, dp.H, dp.GetSeed()) + { + this._publicKeyParamSet = publicKeyParamSet; + this._digestParamSet = digestParamSet; + this._encryptionParamSet = encryptionParamSet; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs.meta new file mode 100644 index 00000000..acf344b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d889c6f2ebb73eb4bb1d6d8275a6b086 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECGOST3410Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs new file mode 100644 index 00000000..70ebdd57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECKeyGenerationParameters + : KeyGenerationParameters + { + private readonly ECDomainParameters domainParams; + private readonly DerObjectIdentifier publicKeyParamSet; + + public ECKeyGenerationParameters( + ECDomainParameters domainParameters, + SecureRandom random) + : base(random, domainParameters.N.BitLength) + { + this.domainParams = domainParameters; + } + + public ECKeyGenerationParameters( + DerObjectIdentifier publicKeyParamSet, + SecureRandom random) + : this(ECKeyParameters.LookupParameters(publicKeyParamSet), random) + { + this.publicKeyParamSet = publicKeyParamSet; + } + + public ECDomainParameters DomainParameters + { + get { return domainParams; } + } + + public DerObjectIdentifier PublicKeyParamSet + { + get { return publicKeyParamSet; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..bad9fe4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66a2dda7956d7864592a62e141c5fd40 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs new file mode 100644 index 00000000..0f58e4d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs @@ -0,0 +1,138 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public abstract class ECKeyParameters + : AsymmetricKeyParameter + { + // NB: Use a Dictionary so we can lookup the upper case version + private static readonly Dictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase) + { + { "EC", "EC" }, + { "ECDSA", "ECDSA" }, + { "ECDH", "ECDH" }, + { "ECDHC", "ECDHC" }, + { "ECGOST3410", "ECGOST3410" }, + { "ECMQV", "ECMQV" }, + }; + + private readonly string algorithm; + private readonly ECDomainParameters parameters; + private readonly DerObjectIdentifier publicKeyParamSet; + + protected ECKeyParameters( + string algorithm, + bool isPrivate, + ECDomainParameters parameters) + : base(isPrivate) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (parameters == null) + throw new ArgumentNullException("parameters"); + + this.algorithm = VerifyAlgorithmName(algorithm); + this.parameters = parameters; + } + + protected ECKeyParameters( + string algorithm, + bool isPrivate, + DerObjectIdentifier publicKeyParamSet) + : base(isPrivate) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (publicKeyParamSet == null) + throw new ArgumentNullException("publicKeyParamSet"); + + this.algorithm = VerifyAlgorithmName(algorithm); + this.parameters = LookupParameters(publicKeyParamSet); + this.publicKeyParamSet = publicKeyParamSet; + } + + public string AlgorithmName + { + get { return algorithm; } + } + + public ECDomainParameters Parameters + { + get { return parameters; } + } + + public DerObjectIdentifier PublicKeyParamSet + { + get { return publicKeyParamSet; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ECDomainParameters other = obj as ECDomainParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ECKeyParameters other) + { + return parameters.Equals(other.parameters) && base.Equals(other); + } + + public override int GetHashCode() + { + return parameters.GetHashCode() ^ base.GetHashCode(); + } + + internal ECKeyGenerationParameters CreateKeyGenerationParameters( + SecureRandom random) + { + if (publicKeyParamSet != null) + { + return new ECKeyGenerationParameters(publicKeyParamSet, random); + } + + return new ECKeyGenerationParameters(parameters, random); + } + + internal static string VerifyAlgorithmName(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var upper)) + throw new ArgumentException("unrecognised algorithm: " + algorithm, nameof(algorithm)); + + return upper; + } + + internal static ECDomainParameters LookupParameters( + DerObjectIdentifier publicKeyParamSet) + { + if (publicKeyParamSet == null) + throw new ArgumentNullException("publicKeyParamSet"); + + X9ECParameters x9 = ECKeyPairGenerator.FindECCurveByOid(publicKeyParamSet); + + if (x9 == null) + throw new ArgumentException("OID is not a valid public key parameter set", "publicKeyParamSet"); + + return new ECDomainParameters(x9); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs.meta new file mode 100644 index 00000000..287bd7d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6a1dbe9ca49ab3d41a44a888f507d915 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs new file mode 100644 index 00000000..b7e10ece --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECNamedDomainParameters + : ECDomainParameters + { + private readonly DerObjectIdentifier name; + + public DerObjectIdentifier Name + { + get { return name; } + } + + public ECNamedDomainParameters(DerObjectIdentifier name, ECDomainParameters dp) + : this(name, dp.Curve, dp.G, dp.N, dp.H, dp.GetSeed()) + { + } + + public ECNamedDomainParameters(DerObjectIdentifier name, X9ECParameters x9) + : base(x9) + { + this.name = name; + } + + public ECNamedDomainParameters(DerObjectIdentifier name, ECCurve curve, ECPoint g, BigInteger n) + : base(curve, g, n) + { + this.name = name; + } + + public ECNamedDomainParameters(DerObjectIdentifier name, ECCurve curve, ECPoint g, BigInteger n, BigInteger h) + : base(curve, g, n, h) + { + this.name = name; + } + + public ECNamedDomainParameters(DerObjectIdentifier name, ECCurve curve, ECPoint g, BigInteger n, BigInteger h, byte[] seed) + : base(curve, g, n, h, seed) + { + this.name = name; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs.meta new file mode 100644 index 00000000..0875d6e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dcf55207868bbff43ab5326a8190c90e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECNamedDomainParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs new file mode 100644 index 00000000..dcd7fca0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECPrivateKeyParameters + : ECKeyParameters + { + private readonly BigInteger d; + + public ECPrivateKeyParameters( + BigInteger d, + ECDomainParameters parameters) + : this("EC", d, parameters) + { + } + + public ECPrivateKeyParameters( + string algorithm, + BigInteger d, + ECDomainParameters parameters) + : base(algorithm, true, parameters) + { + this.d = Parameters.ValidatePrivateScalar(d); + } + + public ECPrivateKeyParameters( + string algorithm, + BigInteger d, + DerObjectIdentifier publicKeyParamSet) + : base(algorithm, true, publicKeyParamSet) + { + this.d = Parameters.ValidatePrivateScalar(d); + } + + public BigInteger D + { + get { return d; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ECPrivateKeyParameters other = obj as ECPrivateKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ECPrivateKeyParameters other) + { + return d.Equals(other.d) && base.Equals(other); + } + + public override int GetHashCode() + { + return d.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs.meta new file mode 100644 index 00000000..5d557542 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2f7a2bfcdc2089e458399197163fd571 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs new file mode 100644 index 00000000..e7e8d4ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs @@ -0,0 +1,72 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ECPublicKeyParameters + : ECKeyParameters + { + private readonly ECPoint q; + + public ECPublicKeyParameters( + ECPoint q, + ECDomainParameters parameters) + : this("EC", q, parameters) + { + } + + public ECPublicKeyParameters( + string algorithm, + ECPoint q, + ECDomainParameters parameters) + : base(algorithm, false, parameters) + { + this.q = ECDomainParameters.ValidatePublicPoint(Parameters.Curve, q); + } + + public ECPublicKeyParameters( + string algorithm, + ECPoint q, + DerObjectIdentifier publicKeyParamSet) + : base(algorithm, false, publicKeyParamSet) + { + this.q = ECDomainParameters.ValidatePublicPoint(Parameters.Curve, q); + } + + public ECPoint Q + { + get { return q; } + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + + ECPublicKeyParameters other = obj as ECPublicKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ECPublicKeyParameters other) + { + return q.Equals(other.q) && base.Equals(other); + } + + public override int GetHashCode() + { + return q.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs.meta new file mode 100644 index 00000000..cdd422ae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7092367b0170a3344992fc8394490b16 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ECPublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs new file mode 100644 index 00000000..86507f18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Ed25519KeyGenerationParameters + : KeyGenerationParameters + { + public Ed25519KeyGenerationParameters(SecureRandom random) + : base(random, 256) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..be32cf2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e5a92b404b3ae164cbf754bc6cbd2d02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs new file mode 100644 index 00000000..849f439e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class Ed25519PrivateKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = Ed25519.SecretKeySize; + public static readonly int SignatureSize = Ed25519.SignatureSize; + + private readonly byte[] data = new byte[KeySize]; + + private Ed25519PublicKeyParameters cachedPublicKey; + + public Ed25519PrivateKeyParameters(SecureRandom random) + : base(true) + { + Ed25519.GeneratePrivateKey(random, data); + } + + public Ed25519PrivateKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public Ed25519PrivateKeyParameters(byte[] buf, int off) + : base(true) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public Ed25519PrivateKeyParameters(ReadOnlySpan buf) + : base(true) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public Ed25519PrivateKeyParameters(Stream input) + : base(true) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of Ed25519 private key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + public Ed25519PublicKeyParameters GeneratePublicKey() + { + lock (data) + { + if (null == cachedPublicKey) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span publicKey = stackalloc byte[Ed25519.PublicKeySize]; + Ed25519.GeneratePublicKey(data, publicKey); + cachedPublicKey = new Ed25519PublicKeyParameters(publicKey); +#else + byte[] publicKey = new byte[Ed25519.PublicKeySize]; + Ed25519.GeneratePublicKey(data, 0, publicKey, 0); + cachedPublicKey = new Ed25519PublicKeyParameters(publicKey, 0); +#endif + } + + return cachedPublicKey; + } + } + + public void Sign(Ed25519.Algorithm algorithm, byte[] ctx, byte[] msg, int msgOff, int msgLen, + byte[] sig, int sigOff) + { + Ed25519PublicKeyParameters publicKey = GeneratePublicKey(); + + byte[] pk = new byte[Ed25519.PublicKeySize]; + publicKey.Encode(pk, 0); + + switch (algorithm) + { + case Ed25519.Algorithm.Ed25519: + { + if (null != ctx) + throw new ArgumentException("ctx"); + + Ed25519.Sign(data, 0, pk, 0, msg, msgOff, msgLen, sig, sigOff); + break; + } + case Ed25519.Algorithm.Ed25519ctx: + { + Ed25519.Sign(data, 0, pk, 0, ctx, msg, msgOff, msgLen, sig, sigOff); + break; + } + case Ed25519.Algorithm.Ed25519ph: + { + if (Ed25519.PrehashSize != msgLen) + throw new ArgumentException("msgLen"); + + Ed25519.SignPrehash(data, 0, pk, 0, ctx, msg, msgOff, sig, sigOff); + break; + } + default: + { + throw new ArgumentException("algorithm"); + } + } + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs.meta new file mode 100644 index 00000000..81838707 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 774836637c2d0c44cb845ee36c553e38 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs new file mode 100644 index 00000000..f8a3d1d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class Ed25519PublicKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = Ed25519.PublicKeySize; + + private readonly byte[] data = new byte[KeySize]; + + public Ed25519PublicKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public Ed25519PublicKeyParameters(byte[] buf, int off) + : base(false) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public Ed25519PublicKeyParameters(ReadOnlySpan buf) + : base(false) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public Ed25519PublicKeyParameters(Stream input) + : base(false) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of Ed25519 public key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs.meta new file mode 100644 index 00000000..a1464ea3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 00027de267dcb674aaf6ee71fc7355d7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed25519PublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs new file mode 100644 index 00000000..e811a25e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Ed448KeyGenerationParameters + : KeyGenerationParameters + { + public Ed448KeyGenerationParameters(SecureRandom random) + : base(random, 448) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..098e123d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ca183f3e8332e2c4f9f2937aafc74f14 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs new file mode 100644 index 00000000..a696a296 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs @@ -0,0 +1,136 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class Ed448PrivateKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = Ed448.SecretKeySize; + public static readonly int SignatureSize = Ed448.SignatureSize; + + private readonly byte[] data = new byte[KeySize]; + + private Ed448PublicKeyParameters cachedPublicKey; + + public Ed448PrivateKeyParameters(SecureRandom random) + : base(true) + { + Ed448.GeneratePrivateKey(random, data); + } + + public Ed448PrivateKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public Ed448PrivateKeyParameters(byte[] buf, int off) + : base(true) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public Ed448PrivateKeyParameters(ReadOnlySpan buf) + : base(true) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public Ed448PrivateKeyParameters(Stream input) + : base(true) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of Ed448 private key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + public Ed448PublicKeyParameters GeneratePublicKey() + { + lock (data) + { + if (null == cachedPublicKey) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span publicKey = stackalloc byte[Ed448.PublicKeySize]; + Ed448.GeneratePublicKey(data, publicKey); + cachedPublicKey = new Ed448PublicKeyParameters(publicKey); +#else + byte[] publicKey = new byte[Ed448.PublicKeySize]; + Ed448.GeneratePublicKey(data, 0, publicKey, 0); + cachedPublicKey = new Ed448PublicKeyParameters(publicKey, 0); +#endif + } + + return cachedPublicKey; + } + } + + public void Sign(Ed448.Algorithm algorithm, byte[] ctx, byte[] msg, int msgOff, int msgLen, + byte[] sig, int sigOff) + { + Ed448PublicKeyParameters publicKey = GeneratePublicKey(); + + byte[] pk = new byte[Ed448.PublicKeySize]; + publicKey.Encode(pk, 0); + + switch (algorithm) + { + case Ed448.Algorithm.Ed448: + { + Ed448.Sign(data, 0, pk, 0, ctx, msg, msgOff, msgLen, sig, sigOff); + break; + } + case Ed448.Algorithm.Ed448ph: + { + if (Ed448.PrehashSize != msgLen) + throw new ArgumentException("msgLen"); + + Ed448.SignPrehash(data, 0, pk, 0, ctx, msg, msgOff, sig, sigOff); + break; + } + default: + { + throw new ArgumentException("algorithm"); + } + } + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs.meta new file mode 100644 index 00000000..5073cb3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e80c036f0ed1150468d988bccd9bf6e8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs new file mode 100644 index 00000000..bf7a9db7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class Ed448PublicKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = Ed448.PublicKeySize; + + private readonly byte[] data = new byte[KeySize]; + + public Ed448PublicKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public Ed448PublicKeyParameters(byte[] buf, int off) + : base(false) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public Ed448PublicKeyParameters(ReadOnlySpan buf) + : base(false) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public Ed448PublicKeyParameters(Stream input) + : base(false) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of Ed448 public key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs.meta new file mode 100644 index 00000000..aa46f5b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d41d849b6de39ab4097a0118070a6501 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Ed448PublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs new file mode 100644 index 00000000..12b9de32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ElGamalKeyGenerationParameters + : KeyGenerationParameters + { + private readonly ElGamalParameters parameters; + + public ElGamalKeyGenerationParameters( + SecureRandom random, + ElGamalParameters parameters) + : base(random, GetStrength(parameters)) + { + this.parameters = parameters; + } + + public ElGamalParameters Parameters + { + get { return parameters; } + } + + internal static int GetStrength( + ElGamalParameters parameters) + { + return parameters.L != 0 ? parameters.L : parameters.P.BitLength; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..4ebeefc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0cbe76ca416d843408bdcf7cb97e7e26 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs new file mode 100644 index 00000000..02397f9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ElGamalKeyParameters + : AsymmetricKeyParameter + { + private readonly ElGamalParameters parameters; + + protected ElGamalKeyParameters( + bool isPrivate, + ElGamalParameters parameters) + : base(isPrivate) + { + // TODO Should we allow 'parameters' to be null? + this.parameters = parameters; + } + + public ElGamalParameters Parameters + { + get { return parameters; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ElGamalKeyParameters other = obj as ElGamalKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ElGamalKeyParameters other) + { + return Org.BouncyCastle.Utilities.Platform.Equals(parameters, other.parameters) + && base.Equals(other); + } + + public override int GetHashCode() + { + int hc = base.GetHashCode(); + + if (parameters != null) + { + hc ^= parameters.GetHashCode(); + } + + return hc; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs.meta new file mode 100644 index 00000000..7963acfc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c5f8fc98b8b5b6040b86e89ee29cd13e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs new file mode 100644 index 00000000..ed3528fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs @@ -0,0 +1,85 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ElGamalParameters + : ICipherParameters + { + private readonly BigInteger p, g; + private readonly int l; + + public ElGamalParameters( + BigInteger p, + BigInteger g) + : this(p, g, 0) + { + } + + public ElGamalParameters( + BigInteger p, + BigInteger g, + int l) + { + if (p == null) + throw new ArgumentNullException("p"); + if (g == null) + throw new ArgumentNullException("g"); + + this.p = p; + this.g = g; + this.l = l; + } + + public BigInteger P + { + get { return p; } + } + + /** + * return the generator - g + */ + public BigInteger G + { + get { return g; } + } + + /** + * return private value limit - l + */ + public int L + { + get { return l; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ElGamalParameters other = obj as ElGamalParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ElGamalParameters other) + { + return p.Equals(other.p) && g.Equals(other.g) && l == other.l; + } + + public override int GetHashCode() + { + return p.GetHashCode() ^ g.GetHashCode() ^ l; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs.meta new file mode 100644 index 00000000..1a48425e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f82b60239473f6c4eaf26fe31a2769ae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs new file mode 100644 index 00000000..e4e73267 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ElGamalPrivateKeyParameters + : ElGamalKeyParameters + { + private readonly BigInteger x; + + public ElGamalPrivateKeyParameters( + BigInteger x, + ElGamalParameters parameters) + : base(true, parameters) + { + if (x == null) + throw new ArgumentNullException("x"); + + this.x = x; + } + + public BigInteger X + { + get { return x; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ElGamalPrivateKeyParameters other = obj as ElGamalPrivateKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ElGamalPrivateKeyParameters other) + { + return other.x.Equals(x) && base.Equals(other); + } + + public override int GetHashCode() + { + return x.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs.meta new file mode 100644 index 00000000..e232dfc6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8376daa59333e74da0e0e318afe938c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs new file mode 100644 index 00000000..ba935057 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ElGamalPublicKeyParameters + : ElGamalKeyParameters + { + private readonly BigInteger y; + + public ElGamalPublicKeyParameters( + BigInteger y, + ElGamalParameters parameters) + : base(false, parameters) + { + if (y == null) + throw new ArgumentNullException("y"); + + this.y = y; + } + + public BigInteger Y + { + get { return y; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + ElGamalPublicKeyParameters other = obj as ElGamalPublicKeyParameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + ElGamalPublicKeyParameters other) + { + return y.Equals(other.y) && base.Equals(other); + } + + public override int GetHashCode() + { + return y.GetHashCode() ^ base.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs.meta new file mode 100644 index 00000000..675492ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9cbffddbeeb8e6d4688e77ee8f55859c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ElGamalPublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs new file mode 100644 index 00000000..7457287a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ +public sealed class FpeParameters + : ICipherParameters +{ + private readonly KeyParameter key; + private readonly int radix; + private readonly byte[] tweak; + private readonly bool useInverse; + + public FpeParameters(KeyParameter key, int radix, byte[] tweak): this(key, radix, tweak, false) + { + + } + + public FpeParameters(KeyParameter key, int radix, byte[] tweak, bool useInverse) + { + this.key = key; + this.radix = radix; + this.tweak = Arrays.Clone(tweak); + this.useInverse = useInverse; + } + + public KeyParameter Key + { + get { return key; } + } + + public int Radix + { + get { return radix; } + } + + public bool UseInverseFunction + { + get { return useInverse; } + } + + public byte[] GetTweak() + { + return Arrays.Clone(tweak); + } +} +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs.meta new file mode 100644 index 00000000..7d8701cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0cf0e065190672743a91d89fe20f38aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/FpeParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs new file mode 100644 index 00000000..a4bfcd44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Gost3410KeyGenerationParameters + : KeyGenerationParameters + { + private readonly Gost3410Parameters parameters; + private readonly DerObjectIdentifier publicKeyParamSet; + + public Gost3410KeyGenerationParameters( + SecureRandom random, + Gost3410Parameters parameters) + : base(random, parameters.P.BitLength - 1) + { + this.parameters = parameters; + } + + public Gost3410KeyGenerationParameters( + SecureRandom random, + DerObjectIdentifier publicKeyParamSet) + : this(random, LookupParameters(publicKeyParamSet)) + { + this.publicKeyParamSet = publicKeyParamSet; + } + + public Gost3410Parameters Parameters + { + get { return parameters; } + } + + public DerObjectIdentifier PublicKeyParamSet + { + get { return publicKeyParamSet; } + } + + private static Gost3410Parameters LookupParameters( + DerObjectIdentifier publicKeyParamSet) + { + if (publicKeyParamSet == null) + throw new ArgumentNullException("publicKeyParamSet"); + + Gost3410ParamSetParameters p = Gost3410NamedParameters.GetByOid(publicKeyParamSet); + + if (p == null) + throw new ArgumentException("OID is not a valid CryptoPro public key parameter set", "publicKeyParamSet"); + + return new Gost3410Parameters(p.P, p.Q, p.A); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..bdfa5c76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa2bcc504b468e1448e19e919827c4f3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs new file mode 100644 index 00000000..baf6be17 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public abstract class Gost3410KeyParameters + : AsymmetricKeyParameter + { + private readonly Gost3410Parameters parameters; + private readonly DerObjectIdentifier publicKeyParamSet; + + protected Gost3410KeyParameters( + bool isPrivate, + Gost3410Parameters parameters) + : base(isPrivate) + { + this.parameters = parameters; + } + + protected Gost3410KeyParameters( + bool isPrivate, + DerObjectIdentifier publicKeyParamSet) + : base(isPrivate) + { + this.parameters = LookupParameters(publicKeyParamSet); + this.publicKeyParamSet = publicKeyParamSet; + } + + public Gost3410Parameters Parameters + { + get { return parameters; } + } + + public DerObjectIdentifier PublicKeyParamSet + { + get { return publicKeyParamSet; } + } + + // TODO Implement Equals/GetHashCode + + private static Gost3410Parameters LookupParameters( + DerObjectIdentifier publicKeyParamSet) + { + if (publicKeyParamSet == null) + throw new ArgumentNullException("publicKeyParamSet"); + + Gost3410ParamSetParameters p = Gost3410NamedParameters.GetByOid(publicKeyParamSet); + + if (p == null) + throw new ArgumentException("OID is not a valid CryptoPro public key parameter set", "publicKeyParamSet"); + + return new Gost3410Parameters(p.P, p.Q, p.A); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs.meta new file mode 100644 index 00000000..a02ea1c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9bce9018e6fa82c46971a8d7c758ceae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410KeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs new file mode 100644 index 00000000..ca6f9ef4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Gost3410Parameters + : ICipherParameters + { + private readonly BigInteger p, q, a; + private readonly Gost3410ValidationParameters validation; + + public Gost3410Parameters( + BigInteger p, + BigInteger q, + BigInteger a) + : this(p, q, a, null) + { + } + + public Gost3410Parameters( + BigInteger p, + BigInteger q, + BigInteger a, + Gost3410ValidationParameters validation) + { + if (p == null) + throw new ArgumentNullException("p"); + if (q == null) + throw new ArgumentNullException("q"); + if (a == null) + throw new ArgumentNullException("a"); + + this.p = p; + this.q = q; + this.a = a; + this.validation = validation; + } + + public BigInteger P + { + get { return p; } + } + + public BigInteger Q + { + get { return q; } + } + + public BigInteger A + { + get { return a; } + } + + public Gost3410ValidationParameters ValidationParameters + { + get { return validation; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + Gost3410Parameters other = obj as Gost3410Parameters; + + if (other == null) + return false; + + return Equals(other); + } + + protected bool Equals( + Gost3410Parameters other) + { + return p.Equals(other.p) && q.Equals(other.q) && a.Equals(other.a); + } + + public override int GetHashCode() + { + return p.GetHashCode() ^ q.GetHashCode() ^ a.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs.meta new file mode 100644 index 00000000..3a14f558 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c76b526088c176142b7a57dc7fc287ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs new file mode 100644 index 00000000..f13f06c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Gost3410PrivateKeyParameters + : Gost3410KeyParameters + { + private readonly BigInteger x; + + public Gost3410PrivateKeyParameters( + BigInteger x, + Gost3410Parameters parameters) + : base(true, parameters) + { + if (x.SignValue < 1 || x.BitLength > 256 || x.CompareTo(Parameters.Q) >= 0) + throw new ArgumentException("Invalid x for GOST3410 private key", "x"); + + this.x = x; + } + + public Gost3410PrivateKeyParameters( + BigInteger x, + DerObjectIdentifier publicKeyParamSet) + : base(true, publicKeyParamSet) + { + if (x.SignValue < 1 || x.BitLength > 256 || x.CompareTo(Parameters.Q) >= 0) + throw new ArgumentException("Invalid x for GOST3410 private key", "x"); + + this.x = x; + } + + public BigInteger X + { + get { return x; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs.meta new file mode 100644 index 00000000..50ec6fbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fced898f49591d54e900e6aeca0edf70 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs new file mode 100644 index 00000000..0a1c07f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Gost3410PublicKeyParameters + : Gost3410KeyParameters + { + private readonly BigInteger y; + + public Gost3410PublicKeyParameters( + BigInteger y, + Gost3410Parameters parameters) + : base(false, parameters) + { + if (y.SignValue < 1 || y.CompareTo(Parameters.P) >= 0) + throw new ArgumentException("Invalid y for GOST3410 public key", "y"); + + this.y = y; + } + + public Gost3410PublicKeyParameters( + BigInteger y, + DerObjectIdentifier publicKeyParamSet) + : base(false, publicKeyParamSet) + { + if (y.SignValue < 1 || y.CompareTo(Parameters.P) >= 0) + throw new ArgumentException("Invalid y for GOST3410 public key", "y"); + + this.y = y; + } + + public BigInteger Y + { + get { return y; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs.meta new file mode 100644 index 00000000..35e485bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea3b8a6815e38384a8268540bc923098 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410PublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs new file mode 100644 index 00000000..992dde4b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class Gost3410ValidationParameters + { + private int x0; + private int c; + private long x0L; + private long cL; + + public Gost3410ValidationParameters( + int x0, + int c) + { + this.x0 = x0; + this.c = c; + } + + public Gost3410ValidationParameters( + long x0L, + long cL) + { + this.x0L = x0L; + this.cL = cL; + } + + public int C { get { return c; } } + public int X0 { get { return x0; } } + public long CL { get { return cL; } } + public long X0L { get { return x0L; } } + + public override bool Equals( + object obj) + { + Gost3410ValidationParameters other = obj as Gost3410ValidationParameters; + + return other != null + && other.c == this.c + && other.x0 == this.x0 + && other.cL == this.cL + && other.x0L == this.x0L; + } + + public override int GetHashCode() + { + return c.GetHashCode() ^ x0.GetHashCode() ^ cL.GetHashCode() ^ x0L.GetHashCode(); + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs.meta new file mode 100644 index 00000000..9d91ff9b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb8255e8c52a110438fe7242f1d219bb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/GOST3410ValidationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs new file mode 100644 index 00000000..1a6d50d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs @@ -0,0 +1,123 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * Parameter class for the HkdfBytesGenerator class. + */ + public class HkdfParameters + : IDerivationParameters + { + private readonly byte[] ikm; + private readonly bool skipExpand; + private readonly byte[] salt; + private readonly byte[] info; + + private HkdfParameters(byte[] ikm, bool skip, byte[] salt, byte[] info) + { + if (ikm == null) + throw new ArgumentNullException("ikm"); + + this.ikm = Arrays.Clone(ikm); + this.skipExpand = skip; + + if (salt == null || salt.Length == 0) + { + this.salt = null; + } + else + { + this.salt = Arrays.Clone(salt); + } + + if (info == null) + { + this.info = new byte[0]; + } + else + { + this.info = Arrays.Clone(info); + } + } + + /** + * Generates parameters for HKDF, specifying both the optional salt and + * optional info. Step 1: Extract won't be skipped. + * + * @param ikm the input keying material or seed + * @param salt the salt to use, may be null for a salt for hashLen zeros + * @param info the info to use, may be null for an info field of zero bytes + */ + public HkdfParameters(byte[] ikm, byte[] salt, byte[] info) + : this(ikm, false, salt, info) + { + } + + /** + * Factory method that makes the HKDF skip the extract part of the key + * derivation function. + * + * @param ikm the input keying material or seed, directly used for step 2: + * Expand + * @param info the info to use, may be null for an info field of zero bytes + * @return HKDFParameters that makes the implementation skip step 1 + */ + public static HkdfParameters SkipExtractParameters(byte[] ikm, byte[] info) + { + return new HkdfParameters(ikm, true, null, info); + } + + public static HkdfParameters DefaultParameters(byte[] ikm) + { + return new HkdfParameters(ikm, false, null, null); + } + + /** + * Returns the input keying material or seed. + * + * @return the keying material + */ + public virtual byte[] GetIkm() + { + return Arrays.Clone(ikm); + } + + /** + * Returns if step 1: extract has to be skipped or not + * + * @return true for skipping, false for no skipping of step 1 + */ + public virtual bool SkipExtract + { + get { return skipExpand; } + } + + /** + * Returns the salt, or null if the salt should be generated as a byte array + * of HashLen zeros. + * + * @return the salt, or null + */ + public virtual byte[] GetSalt() + { + return Arrays.Clone(salt); + } + + /** + * Returns the info field, which may be empty (null is converted to empty). + * + * @return the info field, never null + */ + public virtual byte[] GetInfo() + { + return Arrays.Clone(info); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs.meta new file mode 100644 index 00000000..ccadb947 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 618066ec4d1149247b2627394c92c7c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/HKDFParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs new file mode 100644 index 00000000..8aa715ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * parameters for Key derivation functions for ISO-18033 + */ + public class Iso18033KdfParameters + : IDerivationParameters + { + byte[] seed; + + public Iso18033KdfParameters( + byte[] seed) + { + this.seed = seed; + } + + public byte[] GetSeed() + { + return seed; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs.meta new file mode 100644 index 00000000..69ec38af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bb1c0ce7c88f0ab42a3b1173a3fd0155 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ISO18033KDFParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs new file mode 100644 index 00000000..a3c09d6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * parameters for using an integrated cipher in stream mode. + */ + public class IesParameters : ICipherParameters + { + private byte[] derivation; + private byte[] encoding; + private int macKeySize; + + /** + * @param derivation the derivation parameter for the KDF function. + * @param encoding the encoding parameter for the KDF function. + * @param macKeySize the size of the MAC key (in bits). + */ + public IesParameters( + byte[] derivation, + byte[] encoding, + int macKeySize) + { + this.derivation = derivation; + this.encoding = encoding; + this.macKeySize = macKeySize; + } + + public byte[] GetDerivationV() + { + return derivation; + } + + public byte[] GetEncodingV() + { + return encoding; + } + + public int MacKeySize + { + get + { + return macKeySize; + } + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs.meta new file mode 100644 index 00000000..c529ed0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 13b5c4ee94d0a304daec7d5d3c6fa887 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs new file mode 100644 index 00000000..f1667a4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class IesWithCipherParameters : IesParameters + { + private int cipherKeySize; + + /** + * @param derivation the derivation parameter for the KDF function. + * @param encoding the encoding parameter for the KDF function. + * @param macKeySize the size of the MAC key (in bits). + * @param cipherKeySize the size of the associated Cipher key (in bits). + */ + public IesWithCipherParameters( + byte[] derivation, + byte[] encoding, + int macKeySize, + int cipherKeySize) : base(derivation, encoding, macKeySize) + { + this.cipherKeySize = cipherKeySize; + } + + public int CipherKeySize + { + get + { + return cipherKeySize; + } + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs.meta new file mode 100644 index 00000000..2f6fc3d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c95875d41a1abe049a44781c61cbceee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/IesWithCipherParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs new file mode 100644 index 00000000..16ab0546 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs @@ -0,0 +1,96 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class KdfCounterParameters : IDerivationParameters + { + private byte[] ki; + private byte[] fixedInputDataCounterPrefix; + private byte[] fixedInputDataCounterSuffix; + private int r; + + /// + /// Base constructor - suffix fixed input data only. + /// + /// the KDF seed + /// fixed input data to follow counter. + /// length of the counter in bits + public KdfCounterParameters(byte[] ki, byte[] fixedInputDataCounterSuffix, int r) : this(ki, null, fixedInputDataCounterSuffix, r) + { + } + + + + /// + /// Base constructor - prefix and suffix fixed input data. + /// + /// the KDF seed + /// fixed input data to precede counter + /// fixed input data to follow counter. + /// length of the counter in bits. + public KdfCounterParameters(byte[] ki, byte[] fixedInputDataCounterPrefix, byte[] fixedInputDataCounterSuffix, int r) + { + if (ki == null) + { + throw new ArgumentException("A KDF requires Ki (a seed) as input"); + } + this.ki = Arrays.Clone(ki); + + if (fixedInputDataCounterPrefix == null) + { + this.fixedInputDataCounterPrefix = new byte[0]; + } + else + { + this.fixedInputDataCounterPrefix = Arrays.Clone(fixedInputDataCounterPrefix); + } + + if (fixedInputDataCounterSuffix == null) + { + this.fixedInputDataCounterSuffix = new byte[0]; + } + else + { + this.fixedInputDataCounterSuffix = Arrays.Clone(fixedInputDataCounterSuffix); + } + + if (r != 8 && r != 16 && r != 24 && r != 32) + { + throw new ArgumentException("Length of counter should be 8, 16, 24 or 32"); + } + this.r = r; + } + + public byte[] Ki + { + get { return ki; } + } + + public byte[] FixedInputData + { + get { return Arrays.Clone(fixedInputDataCounterSuffix); } + } + + public byte[] FixedInputDataCounterPrefix + { + get { return Arrays.Clone(fixedInputDataCounterPrefix); } + + } + + public byte[] FixedInputDataCounterSuffix + { + get { return Arrays.Clone(fixedInputDataCounterSuffix); } + } + + public int R + { + get { return r; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs.meta new file mode 100644 index 00000000..cd42e8ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b1c331d894cfb24dab25bdf2cd012b4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFCounterParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs new file mode 100644 index 00000000..dfbdb5e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class KdfDoublePipelineIterationParameters : IDerivationParameters + { + // could be any valid value, using 32, don't know why + private static readonly int UNUSED_R = 32; + + private readonly byte[] ki; + private readonly bool useCounter; + private readonly int r; + private readonly byte[] fixedInputData; + + private KdfDoublePipelineIterationParameters(byte[] ki, byte[] fixedInputData, int r, bool useCounter) + { + if (ki == null) + { + throw new ArgumentException("A KDF requires Ki (a seed) as input"); + } + + this.ki = Arrays.Clone(ki); + + if (fixedInputData == null) + { + this.fixedInputData = new byte[0]; + } + else + { + this.fixedInputData = Arrays.Clone(fixedInputData); + } + + if (r != 8 && r != 16 && r != 24 && r != 32) + { + throw new ArgumentException("Length of counter should be 8, 16, 24 or 32"); + } + + this.r = r; + + this.useCounter = useCounter; + } + + public static KdfDoublePipelineIterationParameters CreateWithCounter( + byte[] ki, byte[] fixedInputData, int r) + { + return new KdfDoublePipelineIterationParameters(ki, fixedInputData, r, true); + } + + public static KdfDoublePipelineIterationParameters CreateWithoutCounter( + byte[] ki, byte[] fixedInputData) + { + return new KdfDoublePipelineIterationParameters(ki, fixedInputData, UNUSED_R, false); + } + + public byte[] Ki + { + get { return Arrays.Clone(ki); } + } + + public bool UseCounter + { + get { return useCounter; } + } + + public int R + { + get { return r; } + } + + public byte[] FixedInputData + { + get { return Arrays.Clone(fixedInputData); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs.meta new file mode 100644 index 00000000..22ea893b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b0f484687c01d6479fba10e557737e2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFDoublePipelineIterationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs new file mode 100644 index 00000000..848eea9e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs @@ -0,0 +1,96 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class KdfFeedbackParameters : IDerivationParameters + { + // could be any valid value, using 32, don't know why + private static readonly int UNUSED_R = -1; + + private readonly byte[] ki; + private readonly byte[] iv; + private readonly bool useCounter; + private readonly int r; + private readonly byte[] fixedInputData; + + private KdfFeedbackParameters(byte[] ki, byte[] iv, byte[] fixedInputData, int r, bool useCounter) + { + if (ki == null) + { + throw new ArgumentException("A KDF requires Ki (a seed) as input"); + } + + this.ki = Arrays.Clone(ki); + + if (fixedInputData == null) + { + this.fixedInputData = new byte[0]; + } + else + { + this.fixedInputData = Arrays.Clone(fixedInputData); + } + + this.r = r; + + if (iv == null) + { + this.iv = new byte[0]; + } + else + { + this.iv = Arrays.Clone(iv); + } + + this.useCounter = useCounter; + } + + public static KdfFeedbackParameters CreateWithCounter( + byte[] ki, byte[] iv, byte[] fixedInputData, int r) + { + if (r != 8 && r != 16 && r != 24 && r != 32) + { + throw new ArgumentException("Length of counter should be 8, 16, 24 or 32"); + } + + return new KdfFeedbackParameters(ki, iv, fixedInputData, r, true); + } + + public static KdfFeedbackParameters CreateWithoutCounter( + byte[] ki, byte[] iv, byte[] fixedInputData) + { + return new KdfFeedbackParameters(ki, iv, fixedInputData, UNUSED_R, false); + } + + public byte[] Ki + { + get { return Arrays.Clone(ki); } + } + + public byte[] Iv + { + get { return Arrays.Clone(iv); } + } + + public bool UseCounter + { + get { return useCounter; } + } + + public int R + { + get { return r; } + } + + public byte[] FixedInputData + { + get { return Arrays.Clone(fixedInputData); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs.meta new file mode 100644 index 00000000..5c708d80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 75e9f629f8000fa4b849c630e7fabc63 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KDFFeedbackParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs new file mode 100644 index 00000000..4d6bf6bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * parameters for Key derivation functions for IEEE P1363a + */ + public class KdfParameters + : IDerivationParameters + { + private readonly byte[] m_iv; + private readonly byte[] m_shared; + + public KdfParameters(byte[] shared, byte[] iv) + { + m_shared = shared; + m_iv = iv; + } + + public byte[] GetSharedSecret() + { + return m_shared; + } + + public byte[] GetIV() + { + return m_iv; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs.meta new file mode 100644 index 00000000..3999be9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 06b2e18be3f3dd94e9a2cf97336c13d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KdfParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs new file mode 100644 index 00000000..00779438 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class KeyParameter + : ICipherParameters + { + private readonly byte[] m_key; + + public KeyParameter(byte[] key) + { + if (key == null) + throw new ArgumentNullException(nameof(key)); + + m_key = (byte[])key.Clone(); + } + + public KeyParameter(byte[] key, int keyOff, int keyLen) + { + if (key == null) + throw new ArgumentNullException(nameof(key)); + if (keyOff < 0 || keyOff > key.Length) + throw new ArgumentOutOfRangeException(nameof(keyOff)); + if (keyLen < 0 || keyLen > (key.Length - keyOff)) + throw new ArgumentOutOfRangeException(nameof(keyLen)); + + m_key = new byte[keyLen]; + Array.Copy(key, keyOff, m_key, 0, keyLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public KeyParameter(ReadOnlySpan key) + { + m_key = key.ToArray(); + } +#endif + + public byte[] GetKey() + { + return (byte[])m_key.Clone(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs.meta new file mode 100644 index 00000000..0a8c44b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9086b3004fc855545afd394d9652c357 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/KeyParameter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs new file mode 100644 index 00000000..b439956f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /// Parameters for mask derivation functions. + public sealed class MgfParameters + : IDerivationParameters + { + private readonly byte[] m_seed; + + public MgfParameters(byte[] seed) + : this(seed, 0, seed.Length) + { + } + + public MgfParameters(byte[] seed, int off, int len) + { + m_seed = Arrays.CopyOfRange(seed, off, len); + } + + public byte[] GetSeed() + { + return (byte[])m_seed.Clone(); + } + + public void GetSeed(byte[] buffer, int offset) + { + m_seed.CopyTo(buffer, offset); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void GetSeed(Span output) + { + m_seed.CopyTo(output); + } +#endif + + public int SeedLength => m_seed.Length; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs.meta new file mode 100644 index 00000000..3315016b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4e7fc1e9b693e824bb3bf63a0aa24405 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MgfParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs new file mode 100644 index 00000000..3bc02ef9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class MqvPrivateParameters + : ICipherParameters + { + private readonly ECPrivateKeyParameters staticPrivateKey; + private readonly ECPrivateKeyParameters ephemeralPrivateKey; + private readonly ECPublicKeyParameters ephemeralPublicKey; + + public MqvPrivateParameters( + ECPrivateKeyParameters staticPrivateKey, + ECPrivateKeyParameters ephemeralPrivateKey) + : this(staticPrivateKey, ephemeralPrivateKey, null) + { + } + + public MqvPrivateParameters( + ECPrivateKeyParameters staticPrivateKey, + ECPrivateKeyParameters ephemeralPrivateKey, + ECPublicKeyParameters ephemeralPublicKey) + { + if (staticPrivateKey == null) + throw new ArgumentNullException("staticPrivateKey"); + if (ephemeralPrivateKey == null) + throw new ArgumentNullException("ephemeralPrivateKey"); + + ECDomainParameters parameters = staticPrivateKey.Parameters; + if (!parameters.Equals(ephemeralPrivateKey.Parameters)) + throw new ArgumentException("Static and ephemeral private keys have different domain parameters"); + + if (ephemeralPublicKey == null) + { + ECPoint q = new FixedPointCombMultiplier().Multiply(parameters.G, ephemeralPrivateKey.D); + + ephemeralPublicKey = new ECPublicKeyParameters(q, parameters); + } + else if (!parameters.Equals(ephemeralPublicKey.Parameters)) + { + throw new ArgumentException("Ephemeral public key has different domain parameters"); + } + + this.staticPrivateKey = staticPrivateKey; + this.ephemeralPrivateKey = ephemeralPrivateKey; + this.ephemeralPublicKey = ephemeralPublicKey; + } + + public virtual ECPrivateKeyParameters StaticPrivateKey + { + get { return staticPrivateKey; } + } + + public virtual ECPrivateKeyParameters EphemeralPrivateKey + { + get { return ephemeralPrivateKey; } + } + + public virtual ECPublicKeyParameters EphemeralPublicKey + { + get { return ephemeralPublicKey; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs.meta new file mode 100644 index 00000000..0cec0f2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ca7a8b2c4f984de43ba4390e3de2fe02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPrivateParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs new file mode 100644 index 00000000..4b60c0f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class MqvPublicParameters + : ICipherParameters + { + private readonly ECPublicKeyParameters staticPublicKey; + private readonly ECPublicKeyParameters ephemeralPublicKey; + + public MqvPublicParameters( + ECPublicKeyParameters staticPublicKey, + ECPublicKeyParameters ephemeralPublicKey) + { + if (staticPublicKey == null) + throw new ArgumentNullException("staticPublicKey"); + if (ephemeralPublicKey == null) + throw new ArgumentNullException("ephemeralPublicKey"); + if (!staticPublicKey.Parameters.Equals(ephemeralPublicKey.Parameters)) + throw new ArgumentException("Static and ephemeral public keys have different domain parameters"); + + this.staticPublicKey = staticPublicKey; + this.ephemeralPublicKey = ephemeralPublicKey; + } + + public virtual ECPublicKeyParameters StaticPublicKey + { + get { return staticPublicKey; } + } + + public virtual ECPublicKeyParameters EphemeralPublicKey + { + get { return ephemeralPublicKey; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs.meta new file mode 100644 index 00000000..0a12225f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1d844ed6650c96a4387ad7c284aed698 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/MqvPublicParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs new file mode 100644 index 00000000..cc0ef523 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * Parameters for NaccacheStern public private key generation. For details on + * this cipher, please see + * + * http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf + */ + public class NaccacheSternKeyGenerationParameters : KeyGenerationParameters + { + // private BigInteger publicExponent; + private readonly int certainty; + private readonly int countSmallPrimes; + + /** + * Parameters for generating a NaccacheStern KeyPair. + * + * @param random + * The source of randomness + * @param strength + * The desired strength of the Key in Bits + * @param certainty + * the probability that the generated primes are not really prime + * as integer: 2^(-certainty) is then the probability + * @param countSmallPrimes + * How many small key factors are desired + */ + public NaccacheSternKeyGenerationParameters( + SecureRandom random, + int strength, + int certainty, + int countSmallPrimes) + : base(random, strength) + { + if (countSmallPrimes % 2 == 1) + throw new ArgumentException("countSmallPrimes must be a multiple of 2"); + if (countSmallPrimes < 30) + throw new ArgumentException("countSmallPrimes must be >= 30 for security reasons"); + + this.certainty = certainty; + this.countSmallPrimes = countSmallPrimes; + } + + /** + * @return Returns the certainty. + */ + public int Certainty + { + get { return certainty; } + } + + /** + * @return Returns the countSmallPrimes. + */ + public int CountSmallPrimes + { + get { return countSmallPrimes; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..4695f8f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c65c4a58fea020146817113ec7cd310c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs new file mode 100644 index 00000000..39b2f69d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * Public key parameters for NaccacheStern cipher. For details on this cipher, + * please see + * + * http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf + */ + public class NaccacheSternKeyParameters : AsymmetricKeyParameter + { + private readonly BigInteger g, n; + private readonly int lowerSigmaBound; + + /** + * @param privateKey + */ + public NaccacheSternKeyParameters(bool privateKey, BigInteger g, BigInteger n, int lowerSigmaBound) + : base(privateKey) + { + this.g = g; + this.n = n; + this.lowerSigmaBound = lowerSigmaBound; + } + + /** + * @return Returns the g. + */ + public BigInteger G { get { return g; } } + + /** + * @return Returns the lowerSigmaBound. + */ + public int LowerSigmaBound { get { return lowerSigmaBound; } } + + /** + * @return Returns the n. + */ + public BigInteger Modulus { get { return n; } } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs.meta new file mode 100644 index 00000000..4d639155 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4b8a27d9adde9924aac37f0940320104 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs new file mode 100644 index 00000000..5e59f3db --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /** + * Private key parameters for NaccacheStern cipher. For details on this cipher, + * please see + * + * http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf + */ + public class NaccacheSternPrivateKeyParameters : NaccacheSternKeyParameters + { + private readonly BigInteger phiN; + private readonly IList smallPrimes; + + /** + * Constructs a NaccacheSternPrivateKey + * + * @param g + * the public enryption parameter g + * @param n + * the public modulus n = p*q + * @param lowerSigmaBound + * the public lower sigma bound up to which data can be encrypted + * @param smallPrimes + * the small primes, of which sigma is constructed in the right + * order + * @param phi_n + * the private modulus phi(n) = (p-1)(q-1) + */ + public NaccacheSternPrivateKeyParameters( + BigInteger g, + BigInteger n, + int lowerSigmaBound, + IList smallPrimes, + BigInteger phiN) + : base(true, g, n, lowerSigmaBound) + { + this.smallPrimes = smallPrimes; + this.phiN = phiN; + } + + public BigInteger PhiN + { + get { return phiN; } + } + + public IList SmallPrimesList + { + get { return smallPrimes; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs.meta new file mode 100644 index 00000000..355e9bbf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0ff0c674c9b83ab4c910f7410f151f61 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/NaccacheSternPrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs new file mode 100644 index 00000000..9e34e4c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ParametersWithID + : ICipherParameters + { + private readonly ICipherParameters m_parameters; + private readonly byte[] m_id; + + public ParametersWithID(ICipherParameters parameters, byte[] id) + : this(parameters, id, 0, id.Length) + { + } + + public ParametersWithID(ICipherParameters parameters, byte[] id, int idOff, int idLen) + { + m_parameters = parameters; + m_id = Arrays.CopyOfRange(id, idOff, idOff + idLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public ParametersWithID(ICipherParameters parameters, ReadOnlySpan id) + { + m_parameters = parameters; + m_id = id.ToArray(); + } +#endif + + public byte[] GetID() + { + return m_id; + } + + public ICipherParameters Parameters => m_parameters; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs.meta new file mode 100644 index 00000000..1559f852 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d58e655e6f4bc7d47a42119e00ccf643 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs new file mode 100644 index 00000000..bcb08d98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ParametersWithIV + : ICipherParameters + { + private readonly ICipherParameters m_parameters; + private readonly byte[] m_iv; + + public ParametersWithIV(ICipherParameters parameters, byte[] iv) + : this(parameters, iv, 0, iv.Length) + { + } + + public ParametersWithIV(ICipherParameters parameters, byte[] iv, int ivOff, int ivLen) + { + m_parameters = parameters; + m_iv = Arrays.CopyOfRange(iv, ivOff, ivOff + ivLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public ParametersWithIV(ICipherParameters parameters, ReadOnlySpan iv) + { + m_parameters = parameters; + m_iv = iv.ToArray(); + } +#endif + + public byte[] GetIV() + { + return (byte[])m_iv.Clone(); + } + + public ICipherParameters Parameters => m_parameters; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs.meta new file mode 100644 index 00000000..c3c73c19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f5e5df077fcfde5449840ec995865550 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithIV.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs new file mode 100644 index 00000000..42e25a51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ParametersWithRandom + : ICipherParameters + { + private readonly ICipherParameters m_parameters; + private readonly SecureRandom m_random; + + public ParametersWithRandom(ICipherParameters parameters) + : this(parameters, CryptoServicesRegistrar.GetSecureRandom()) + { + } + + public ParametersWithRandom(ICipherParameters parameters, SecureRandom random) + { + if (parameters == null) + throw new ArgumentNullException(nameof(parameters)); + if (random == null) + throw new ArgumentNullException(nameof(random)); + + m_parameters = parameters; + m_random = random; + } + + public ICipherParameters Parameters => m_parameters; + + public SecureRandom Random => m_random; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs.meta new file mode 100644 index 00000000..21d31295 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ca26bf22f37b5f4f81746e2c2f2d08c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithRandom.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs new file mode 100644 index 00000000..d369c65a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class ParametersWithSBox : ICipherParameters + { + private ICipherParameters parameters; + private byte[] sBox; + + public ParametersWithSBox( + ICipherParameters parameters, + byte[] sBox) + { + this.parameters = parameters; + this.sBox = sBox; + } + + public byte[] GetSBox() { return sBox; } + + public ICipherParameters Parameters { get { return parameters; } } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs.meta new file mode 100644 index 00000000..45db1a3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 092ec338a2e73f947ad258da0aa1e0fd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSBox.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs new file mode 100644 index 00000000..1437c880 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + + /// Cipher parameters with a fixed salt value associated with them. + public class ParametersWithSalt + : ICipherParameters + { + private readonly ICipherParameters m_parameters; + private readonly byte[] m_salt; + + public ParametersWithSalt(ICipherParameters parameters, byte[] salt) + : this(parameters, salt, 0, salt.Length) + { + } + + public ParametersWithSalt(ICipherParameters parameters, byte[] salt, int saltOff, int saltLen) + { + m_parameters = parameters; + m_salt = Arrays.CopyOfRange(salt, saltOff, saltOff + saltLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public ParametersWithSalt(ICipherParameters parameters, ReadOnlySpan salt) + { + m_parameters = parameters; + m_salt = salt.ToArray(); + } +#endif + + public byte[] GetSalt() + { + return m_salt; + } + + public ICipherParameters Parameters => m_parameters; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs.meta new file mode 100644 index 00000000..a90df34e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 801814d1ac299474aa342a51d9a818e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/ParametersWithSalt.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs new file mode 100644 index 00000000..1344fc19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RC2Parameters + : KeyParameter + { + private readonly int bits; + + public RC2Parameters( + byte[] key) + : this(key, (key.Length > 128) ? 1024 : (key.Length * 8)) + { + } + + public RC2Parameters( + byte[] key, + int keyOff, + int keyLen) + : this(key, keyOff, keyLen, (keyLen > 128) ? 1024 : (keyLen * 8)) + { + } + + public RC2Parameters( + byte[] key, + int bits) + : base(key) + { + this.bits = bits; + } + + public RC2Parameters( + byte[] key, + int keyOff, + int keyLen, + int bits) + : base(key, keyOff, keyLen) + { + this.bits = bits; + } + + public int EffectiveKeyBits + { + get { return bits; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs.meta new file mode 100644 index 00000000..6ffd8952 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92db6e5e2158ce2418b89e4374e61ea5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC2Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs new file mode 100644 index 00000000..0348920f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RC5Parameters + : KeyParameter + { + private readonly int rounds; + + public RC5Parameters( + byte[] key, + int rounds) + : base(key) + { + if (key.Length > 255) + throw new ArgumentException("RC5 key length can be no greater than 255"); + + this.rounds = rounds; + } + + public int Rounds + { + get { return rounds; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs.meta new file mode 100644 index 00000000..9463d6c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e15b66b26be982f4691f723c2b30848b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RC5Parameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs new file mode 100644 index 00000000..3284ac3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RsaBlindingParameters + : ICipherParameters + { + private readonly RsaKeyParameters publicKey; + private readonly BigInteger blindingFactor; + + public RsaBlindingParameters( + RsaKeyParameters publicKey, + BigInteger blindingFactor) + { + if (publicKey.IsPrivate) + throw new ArgumentException("RSA parameters should be for a public key"); + + this.publicKey = publicKey; + this.blindingFactor = blindingFactor; + } + + public RsaKeyParameters PublicKey + { + get { return publicKey; } + } + + public BigInteger BlindingFactor + { + get { return blindingFactor; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs.meta new file mode 100644 index 00000000..dba867fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bcb683dade2bc5e4a9ab0b126e330081 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RSABlindingParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs new file mode 100644 index 00000000..99c4225e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RsaKeyGenerationParameters + : KeyGenerationParameters + { + private readonly BigInteger publicExponent; + private readonly int certainty; + + public RsaKeyGenerationParameters( + BigInteger publicExponent, + SecureRandom random, + int strength, + int certainty) + : base(random, strength) + { + this.publicExponent = publicExponent; + this.certainty = certainty; + } + + public BigInteger PublicExponent + { + get { return publicExponent; } + } + + public int Certainty + { + get { return certainty; } + } + + public override bool Equals( + object obj) + { + RsaKeyGenerationParameters other = obj as RsaKeyGenerationParameters; + + if (other == null) + { + return false; + } + + return certainty == other.certainty + && publicExponent.Equals(other.publicExponent); + } + + public override int GetHashCode() + { + return certainty.GetHashCode() ^ publicExponent.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs.meta new file mode 100644 index 00000000..790af499 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 04fe8e6f276b3dc4f8883a9cdc97a282 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs new file mode 100644 index 00000000..cfd24675 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RsaKeyParameters + : AsymmetricKeyParameter + { + // Hexadecimal value of the product of the 131 smallest odd primes from 3 to 743 + private static readonly BigInteger SmallPrimesProduct = new BigInteger( + "8138e8a0fcf3a4e84a771d40fd305d7f4aa59306d7251de54d98af8fe95729a1f" + + "73d893fa424cd2edc8636a6c3285e022b0e3866a565ae8108eed8591cd4fe8d2" + + "ce86165a978d719ebf647f362d33fca29cd179fb42401cbaf3df0c614056f9c8" + + "f3cfd51e474afb6bc6974f78db8aba8e9e517fded658591ab7502bd41849462f", + 16); + + private static BigInteger Validate(BigInteger modulus) + { + if ((modulus.IntValue & 1) == 0) + throw new ArgumentException("RSA modulus is even", "modulus"); + if (!modulus.Gcd(SmallPrimesProduct).Equals(BigInteger.One)) + throw new ArgumentException("RSA modulus has a small prime factor"); + + int maxBitLength = AsInteger("Best.HTTP.SecureProtocol.Org.BouncyCastle.Rsa.MaxSize", 15360); + + int modBitLength = modulus.BitLength; + if (maxBitLength < modBitLength) + { + throw new ArgumentException("modulus value out of range"); + } + + // TODO: add additional primePower/Composite test - expensive!! + + return modulus; + } + + private readonly BigInteger modulus; + private readonly BigInteger exponent; + + public RsaKeyParameters( + bool isPrivate, + BigInteger modulus, + BigInteger exponent) + : base(isPrivate) + { + if (modulus == null) + throw new ArgumentNullException("modulus"); + if (exponent == null) + throw new ArgumentNullException("exponent"); + if (modulus.SignValue <= 0) + throw new ArgumentException("Not a valid RSA modulus", "modulus"); + if (exponent.SignValue <= 0) + throw new ArgumentException("Not a valid RSA exponent", "exponent"); + if (!isPrivate && (exponent.IntValue & 1) == 0) + throw new ArgumentException("RSA publicExponent is even", "exponent"); + + this.modulus = Validate(modulus); + this.exponent = exponent; + } + + public BigInteger Modulus + { + get { return modulus; } + } + + public BigInteger Exponent + { + get { return exponent; } + } + + public override bool Equals( + object obj) + { + RsaKeyParameters kp = obj as RsaKeyParameters; + + if (kp == null) + { + return false; + } + + return kp.IsPrivate == this.IsPrivate + && kp.Modulus.Equals(this.modulus) + && kp.Exponent.Equals(this.exponent); + } + + public override int GetHashCode() + { + return modulus.GetHashCode() ^ exponent.GetHashCode() ^ IsPrivate.GetHashCode(); + } + + internal static int AsInteger(string envVariable, int defaultValue) + { + string v = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(envVariable); + + if (v == null) + { + return defaultValue; + } + + return int.Parse(v); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs.meta new file mode 100644 index 00000000..9c51b8a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d18f7f6dc8976b746a8c00bd0a4c82d3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs new file mode 100644 index 00000000..0c564c21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class RsaPrivateCrtKeyParameters + : RsaKeyParameters + { + private readonly BigInteger e, p, q, dP, dQ, qInv; + + public RsaPrivateCrtKeyParameters( + BigInteger modulus, + BigInteger publicExponent, + BigInteger privateExponent, + BigInteger p, + BigInteger q, + BigInteger dP, + BigInteger dQ, + BigInteger qInv) + : base(true, modulus, privateExponent) + { + ValidateValue(publicExponent, "publicExponent", "exponent"); + ValidateValue(p, "p", "P value"); + ValidateValue(q, "q", "Q value"); + ValidateValue(dP, "dP", "DP value"); + ValidateValue(dQ, "dQ", "DQ value"); + ValidateValue(qInv, "qInv", "InverseQ value"); + + this.e = publicExponent; + this.p = p; + this.q = q; + this.dP = dP; + this.dQ = dQ; + this.qInv = qInv; + } + + public RsaPrivateCrtKeyParameters(RsaPrivateKeyStructure rsaPrivateKey) + : this( + rsaPrivateKey.Modulus, + rsaPrivateKey.PublicExponent, + rsaPrivateKey.PrivateExponent, + rsaPrivateKey.Prime1, + rsaPrivateKey.Prime2, + rsaPrivateKey.Exponent1, + rsaPrivateKey.Exponent2, + rsaPrivateKey.Coefficient) + { + } + + public BigInteger PublicExponent + { + get { return e; } + } + + public BigInteger P + { + get { return p; } + } + + public BigInteger Q + { + get { return q; } + } + + public BigInteger DP + { + get { return dP; } + } + + public BigInteger DQ + { + get { return dQ; } + } + + public BigInteger QInv + { + get { return qInv; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + RsaPrivateCrtKeyParameters kp = obj as RsaPrivateCrtKeyParameters; + + if (kp == null) + return false; + + return kp.DP.Equals(dP) + && kp.DQ.Equals(dQ) + && kp.Exponent.Equals(this.Exponent) + && kp.Modulus.Equals(this.Modulus) + && kp.P.Equals(p) + && kp.Q.Equals(q) + && kp.PublicExponent.Equals(e) + && kp.QInv.Equals(qInv); + } + + public override int GetHashCode() + { + return DP.GetHashCode() ^ DQ.GetHashCode() ^ Exponent.GetHashCode() ^ Modulus.GetHashCode() + ^ P.GetHashCode() ^ Q.GetHashCode() ^ PublicExponent.GetHashCode() ^ QInv.GetHashCode(); + } + + private static void ValidateValue(BigInteger x, string name, string desc) + { + if (x == null) + throw new ArgumentNullException(name); + if (x.SignValue <= 0) + throw new ArgumentException("Not a valid RSA " + desc, name); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs.meta new file mode 100644 index 00000000..580e6cbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e11db295c57890b45a8386ae375cc66b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/RsaPrivateCrtKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs new file mode 100644 index 00000000..6d36bde8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /// Private parameters for an SM2 key exchange. + /// The ephemeralPrivateKey is used to calculate the random point used in the algorithm. + public class SM2KeyExchangePrivateParameters + : ICipherParameters + { + private readonly bool mInitiator; + private readonly ECPrivateKeyParameters mStaticPrivateKey; + private readonly ECPoint mStaticPublicPoint; + private readonly ECPrivateKeyParameters mEphemeralPrivateKey; + private readonly ECPoint mEphemeralPublicPoint; + + public SM2KeyExchangePrivateParameters( + bool initiator, + ECPrivateKeyParameters staticPrivateKey, + ECPrivateKeyParameters ephemeralPrivateKey) + { + if (staticPrivateKey == null) + throw new ArgumentNullException("staticPrivateKey"); + if (ephemeralPrivateKey == null) + throw new ArgumentNullException("ephemeralPrivateKey"); + + ECDomainParameters parameters = staticPrivateKey.Parameters; + if (!parameters.Equals(ephemeralPrivateKey.Parameters)) + throw new ArgumentException("Static and ephemeral private keys have different domain parameters"); + + ECMultiplier m = new FixedPointCombMultiplier(); + + this.mInitiator = initiator; + this.mStaticPrivateKey = staticPrivateKey; + this.mStaticPublicPoint = m.Multiply(parameters.G, staticPrivateKey.D).Normalize(); + this.mEphemeralPrivateKey = ephemeralPrivateKey; + this.mEphemeralPublicPoint = m.Multiply(parameters.G, ephemeralPrivateKey.D).Normalize(); + } + + public virtual bool IsInitiator + { + get { return mInitiator; } + } + + public virtual ECPrivateKeyParameters StaticPrivateKey + { + get { return mStaticPrivateKey; } + } + + public virtual ECPoint StaticPublicPoint + { + get { return mStaticPublicPoint; } + } + + public virtual ECPrivateKeyParameters EphemeralPrivateKey + { + get { return mEphemeralPrivateKey; } + } + + public virtual ECPoint EphemeralPublicPoint + { + get { return mEphemeralPublicPoint; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs.meta new file mode 100644 index 00000000..3f07db2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30a4431e7e54d384dac6a6295545b0a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePrivateParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs new file mode 100644 index 00000000..21e90b2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + /// Public parameters for an SM2 key exchange. + /// In this case the ephemeralPublicKey provides the random point used in the algorithm. + public class SM2KeyExchangePublicParameters + : ICipherParameters + { + private readonly ECPublicKeyParameters mStaticPublicKey; + private readonly ECPublicKeyParameters mEphemeralPublicKey; + + public SM2KeyExchangePublicParameters( + ECPublicKeyParameters staticPublicKey, + ECPublicKeyParameters ephemeralPublicKey) + { + if (staticPublicKey == null) + throw new ArgumentNullException("staticPublicKey"); + if (ephemeralPublicKey == null) + throw new ArgumentNullException("ephemeralPublicKey"); + if (!staticPublicKey.Parameters.Equals(ephemeralPublicKey.Parameters)) + throw new ArgumentException("Static and ephemeral public keys have different domain parameters"); + + this.mStaticPublicKey = staticPublicKey; + this.mEphemeralPublicKey = ephemeralPublicKey; + } + + public virtual ECPublicKeyParameters StaticPublicKey + { + get { return mStaticPublicKey; } + } + + public virtual ECPublicKeyParameters EphemeralPublicKey + { + get { return mEphemeralPublicKey; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs.meta new file mode 100644 index 00000000..a1a9302b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7867f6d8209d04342a94acc2f7804c8b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SM2KeyExchangePublicParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs new file mode 100644 index 00000000..a573d31c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs @@ -0,0 +1,282 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Globalization; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + + /// + /// Parameters for the Skein hash function - a series of byte[] strings identified by integer tags. + /// + /// + /// Parameterised Skein can be used for: + ///
    + ///
  • MAC generation, by providing a key.
  • + ///
  • Randomised hashing, by providing a nonce.
  • + ///
  • A hash function for digital signatures, associating a + /// public key with the message digest.
  • + ///
  • A key derivation function, by providing a + /// key identifier.
  • + ///
  • Personalised hashing, by providing a + /// recommended format or + /// arbitrary personalisation string.
  • + ///
+ ///
+ /// + /// + /// + public class SkeinParameters + : ICipherParameters + { + /// + /// The parameter type for a secret key, supporting MAC or KDF functions: 0 + /// + public const int PARAM_TYPE_KEY = 0; + + /// + /// The parameter type for the Skein configuration block: 4 + /// + public const int PARAM_TYPE_CONFIG = 4; + + /// + /// The parameter type for a personalisation string: 8 + /// + public const int PARAM_TYPE_PERSONALISATION = 8; + + /// + /// The parameter type for a public key: 12 + /// + public const int PARAM_TYPE_PUBLIC_KEY = 12; + + /// + /// The parameter type for a key identifier string: 16 + /// + public const int PARAM_TYPE_KEY_IDENTIFIER = 16; + + /// + /// The parameter type for a nonce: 20 + /// + public const int PARAM_TYPE_NONCE = 20; + + /// + /// The parameter type for the message: 48 + /// + public const int PARAM_TYPE_MESSAGE = 48; + + /// + /// The parameter type for the output transformation: 63 + /// + public const int PARAM_TYPE_OUTPUT = 63; + + private IDictionary m_parameters; + + public SkeinParameters() + : this(new Dictionary()) + { + } + + private SkeinParameters(IDictionary parameters) + { + this.m_parameters = parameters; + } + + /// + /// Obtains a map of type (int) to value (byte[]) for the parameters tracked in this object. + /// + public IDictionary GetParameters() + { + return m_parameters; + } + + /// + /// Obtains the value of the key parameter, or null if not + /// set. + /// + /// The key. + public byte[] GetKey() + { + return CollectionUtilities.GetValueOrNull(m_parameters, PARAM_TYPE_KEY); + } + + /// + /// Obtains the value of the personalisation parameter, or + /// null if not set. + /// + public byte[] GetPersonalisation() + { + return CollectionUtilities.GetValueOrNull(m_parameters, PARAM_TYPE_PERSONALISATION); + } + + /// + /// Obtains the value of the public key parameter, or + /// null if not set. + /// + public byte[] GetPublicKey() + { + return CollectionUtilities.GetValueOrNull(m_parameters, PARAM_TYPE_PUBLIC_KEY); + } + + /// + /// Obtains the value of the key identifier parameter, or + /// null if not set. + /// + public byte[] GetKeyIdentifier() + { + return CollectionUtilities.GetValueOrNull(m_parameters, PARAM_TYPE_KEY_IDENTIFIER); + } + + /// + /// Obtains the value of the nonce parameter, or null if + /// not set. + /// + public byte[] GetNonce() + { + return CollectionUtilities.GetValueOrNull(m_parameters, PARAM_TYPE_NONCE); + } + + /// + /// A builder for . + /// + public class Builder + { + private Dictionary m_parameters; + + public Builder() + { + m_parameters = new Dictionary(); + } + + public Builder(IDictionary paramsMap) + { + m_parameters = new Dictionary(paramsMap); + } + + public Builder(SkeinParameters parameters) + : this(parameters.m_parameters) + { + } + + /// + /// Sets a parameters to apply to the Skein hash function. + /// + /// + /// Parameter types must be in the range 0,5..62, and cannot use the value 48 + /// (reserved for message body). + ///

+ /// Parameters with type < 48 are processed before + /// the message content, parameters with type > 48 + /// are processed after the message and prior to output. + /// + /// the type of the parameter, in the range 5..62. + /// the byte sequence of the parameter. + public Builder Set(int type, byte[] value) + { + if (value == null) + { + throw new ArgumentException("Parameter value must not be null."); + } + if ((type != PARAM_TYPE_KEY) + && (type <= PARAM_TYPE_CONFIG || type >= PARAM_TYPE_OUTPUT || type == PARAM_TYPE_MESSAGE)) + { + throw new ArgumentException("Parameter types must be in the range 0,5..47,49..62."); + } + if (type == PARAM_TYPE_CONFIG) + { + throw new ArgumentException("Parameter type " + PARAM_TYPE_CONFIG + + " is reserved for internal use."); + } + m_parameters.Add(type, value); + return this; + } + + ///

+ /// Sets the parameter. + /// + public Builder SetKey(byte[] key) + { + return Set(PARAM_TYPE_KEY, key); + } + + /// + /// Sets the parameter. + /// + public Builder SetPersonalisation(byte[] personalisation) + { + return Set(PARAM_TYPE_PERSONALISATION, personalisation); + } + + /// + /// Implements the recommended personalisation format for Skein defined in Section 4.11 of + /// the Skein 1.3 specification. + /// + /// + /// The format is YYYYMMDD email@address distinguisher, encoded to a byte + /// sequence using UTF-8 encoding. + /// + /// the date the personalised application of the Skein was defined. + /// the email address of the creation of the personalised application. + /// an arbitrary personalisation string distinguishing the application. + public Builder SetPersonalisation(DateTime date, string emailAddress, string distinguisher) + { + try + { + MemoryStream bout = new MemoryStream(); + using (var outBytes = new StreamWriter(bout, System.Text.Encoding.UTF8)) + { + outBytes.Write(date.ToString("YYYYMMDD", CultureInfo.InvariantCulture)); + outBytes.Write(" "); + outBytes.Write(emailAddress); + outBytes.Write(" "); + outBytes.Write(distinguisher); + } + return Set(PARAM_TYPE_PERSONALISATION, bout.ToArray()); + } + catch (IOException e) + { + throw new InvalidOperationException("Byte I/O failed.", e); + } + } + + /// + /// Sets the parameter. + /// + public Builder SetPublicKey(byte[] publicKey) + { + return Set(PARAM_TYPE_PUBLIC_KEY, publicKey); + } + + /// + /// Sets the parameter. + /// + public Builder SetKeyIdentifier(byte[] keyIdentifier) + { + return Set(PARAM_TYPE_KEY_IDENTIFIER, keyIdentifier); + } + + /// + /// Sets the parameter. + /// + public Builder SetNonce(byte[] nonce) + { + return Set(PARAM_TYPE_NONCE, nonce); + } + + /// + /// Constructs a new instance with the parameters provided to this + /// builder. + /// + public SkeinParameters Build() + { + return new SkeinParameters(m_parameters); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs.meta new file mode 100644 index 00000000..41ae9550 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8dee20c7fb968d849b88b5cb583852d2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/SkeinParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs new file mode 100644 index 00000000..f763f932 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class Srp6GroupParameters + { + private readonly BigInteger n, g; + + public Srp6GroupParameters(BigInteger N, BigInteger g) + { + this.n = N; + this.g = g; + } + + public BigInteger G + { + get { return g; } + } + + public BigInteger N + { + get { return n; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs.meta new file mode 100644 index 00000000..e9c6ee43 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 857840c2edaa65244a92af6737ddb4bf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/Srp6GroupParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs new file mode 100644 index 00000000..fe373585 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + + /// + /// Parameters for tweakable block ciphers. + /// + public class TweakableBlockCipherParameters + : ICipherParameters + { + private readonly byte[] tweak; + private readonly KeyParameter key; + + public TweakableBlockCipherParameters(KeyParameter key, byte[] tweak) + { + this.key = key; + this.tweak = Arrays.Clone(tweak); + } + + /// + /// Gets the key. + /// + /// the key to use, or null to use the current key. + public KeyParameter Key + { + get { return key; } + } + + /// + /// Gets the tweak value. + /// + /// The tweak to use, or null to use the current tweak. + public byte[] Tweak + { + get { return tweak; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs.meta new file mode 100644 index 00000000..937a58a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 29fe60767cd66464e9ad177dc847ecbb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/TweakableBlockCipherParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs new file mode 100644 index 00000000..f3fced26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class X25519KeyGenerationParameters + : KeyGenerationParameters + { + public X25519KeyGenerationParameters(SecureRandom random) + : base(random, 255) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..517599af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4ff4c5787de8bdb4c9120da31870918d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs new file mode 100644 index 00000000..3566b610 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs @@ -0,0 +1,118 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class X25519PrivateKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = X25519.ScalarSize; + public static readonly int SecretSize = X25519.PointSize; + + private readonly byte[] data = new byte[KeySize]; + + public X25519PrivateKeyParameters(SecureRandom random) + : base(true) + { + X25519.GeneratePrivateKey(random, data); + } + + public X25519PrivateKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public X25519PrivateKeyParameters(byte[] buf, int off) + : base(true) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public X25519PrivateKeyParameters(ReadOnlySpan buf) + : base(true) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public X25519PrivateKeyParameters(Stream input) + : base(true) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of X25519 private key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + public X25519PublicKeyParameters GeneratePublicKey() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span publicKey = stackalloc byte[X25519.PointSize]; + X25519.GeneratePublicKey(data, publicKey); + return new X25519PublicKeyParameters(publicKey); +#else + byte[] publicKey = new byte[X25519.PointSize]; + X25519.GeneratePublicKey(data, 0, publicKey, 0); + return new X25519PublicKeyParameters(publicKey, 0); +#endif + } + + public void GenerateSecret(X25519PublicKeyParameters publicKey, byte[] buf, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + GenerateSecret(publicKey, buf.AsSpan(off)); +#else + byte[] encoded = new byte[X25519.PointSize]; + publicKey.Encode(encoded, 0); + if (!X25519.CalculateAgreement(data, 0, encoded, 0, buf, off)) + throw new InvalidOperationException("X25519 agreement failed"); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void GenerateSecret(X25519PublicKeyParameters publicKey, Span buf) + { + Span encoded = stackalloc byte[X25519.PointSize]; + publicKey.Encode(encoded); + if (!X25519.CalculateAgreement(data, encoded, buf)) + throw new InvalidOperationException("X25519 agreement failed"); + } +#endif + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs.meta new file mode 100644 index 00000000..c597f651 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42a993aeb45514841b0b449d92c7dfb1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs new file mode 100644 index 00000000..25bd6fa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class X25519PublicKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = X25519.PointSize; + + private readonly byte[] data = new byte[KeySize]; + + public X25519PublicKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public X25519PublicKeyParameters(byte[] buf, int off) + : base(false) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public X25519PublicKeyParameters(ReadOnlySpan buf) + : base(false) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public X25519PublicKeyParameters(Stream input) + : base(false) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of X25519 public key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs.meta new file mode 100644 index 00000000..0ea8f03b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 719dfc56a22b100408a7d64e93146ecf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X25519PublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs new file mode 100644 index 00000000..11f96ed4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public class X448KeyGenerationParameters + : KeyGenerationParameters + { + public X448KeyGenerationParameters(SecureRandom random) + : base(random, 448) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs.meta new file mode 100644 index 00000000..40ae9e30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb8d0faf01e4721428ef31726a97645b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448KeyGenerationParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs new file mode 100644 index 00000000..a9eccf08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs @@ -0,0 +1,118 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class X448PrivateKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = X448.ScalarSize; + public static readonly int SecretSize = X448.PointSize; + + private readonly byte[] data = new byte[KeySize]; + + public X448PrivateKeyParameters(SecureRandom random) + : base(true) + { + X448.GeneratePrivateKey(random, data); + } + + public X448PrivateKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public X448PrivateKeyParameters(byte[] buf, int off) + : base(true) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public X448PrivateKeyParameters(ReadOnlySpan buf) + : base(true) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public X448PrivateKeyParameters(Stream input) + : base(true) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of X448 private key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + public X448PublicKeyParameters GeneratePublicKey() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span publicKey = stackalloc byte[X448.PointSize]; + X448.GeneratePublicKey(data, publicKey); + return new X448PublicKeyParameters(publicKey); +#else + byte[] publicKey = new byte[X448.PointSize]; + X448.GeneratePublicKey(data, 0, publicKey, 0); + return new X448PublicKeyParameters(publicKey, 0); +#endif + } + + public void GenerateSecret(X448PublicKeyParameters publicKey, byte[] buf, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + GenerateSecret(publicKey, buf.AsSpan(off)); +#else + byte[] encoded = new byte[X448.PointSize]; + publicKey.Encode(encoded, 0); + if (!X448.CalculateAgreement(data, 0, encoded, 0, buf, off)) + throw new InvalidOperationException("X448 agreement failed"); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void GenerateSecret(X448PublicKeyParameters publicKey, Span buf) + { + Span encoded = stackalloc byte[X448.PointSize]; + publicKey.Encode(encoded); + if (!X448.CalculateAgreement(data, encoded, buf)) + throw new InvalidOperationException("X448 agreement failed"); + } +#endif + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs.meta new file mode 100644 index 00000000..f4bc09e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f312e45ad3e6b643958f08cb49900ef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PrivateKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs new file mode 100644 index 00000000..ed9fd9c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters +{ + public sealed class X448PublicKeyParameters + : AsymmetricKeyParameter + { + public static readonly int KeySize = X448.PointSize; + + private readonly byte[] data = new byte[KeySize]; + + public X448PublicKeyParameters(byte[] buf) + : this(Validate(buf), 0) + { + } + + public X448PublicKeyParameters(byte[] buf, int off) + : base(false) + { + Array.Copy(buf, off, data, 0, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public X448PublicKeyParameters(ReadOnlySpan buf) + : base(false) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + buf.CopyTo(data); + } +#endif + + public X448PublicKeyParameters(Stream input) + : base(false) + { + if (KeySize != Streams.ReadFully(input, data)) + throw new EndOfStreamException("EOF encountered in middle of X448 public key"); + } + + public void Encode(byte[] buf, int off) + { + Array.Copy(data, 0, buf, off, KeySize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Encode(Span buf) + { + data.CopyTo(buf); + } +#endif + + public byte[] GetEncoded() + { + return Arrays.Clone(data); + } + + private static byte[] Validate(byte[] buf) + { + if (buf.Length != KeySize) + throw new ArgumentException("must have length " + KeySize, nameof(buf)); + + return buf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs.meta new file mode 100644 index 00000000..86b20fbb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7c9e871601880ef46b6f4597825d4cea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/parameters/X448PublicKeyParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng.meta new file mode 100644 index 00000000..1d606937 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ba8b6f890211cdd48a00902789273c14 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs new file mode 100644 index 00000000..a8bc03a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + /** + * An EntropySourceProvider where entropy generation is based on a SecureRandom output using SecureRandom.generateSeed(). + */ + public class BasicEntropySourceProvider + : IEntropySourceProvider + { + private readonly SecureRandom mSecureRandom; + private readonly bool mPredictionResistant; + + /** + * Create a entropy source provider based on the passed in SecureRandom. + * + * @param secureRandom the SecureRandom to base EntropySource construction on. + * @param isPredictionResistant boolean indicating if the SecureRandom is based on prediction resistant entropy or not (true if it is). + */ + public BasicEntropySourceProvider(SecureRandom secureRandom, bool isPredictionResistant) + { + if (secureRandom == null) + throw new ArgumentNullException(nameof(secureRandom)); + + mSecureRandom = secureRandom; + mPredictionResistant = isPredictionResistant; + } + + /** + * Return an entropy source that will create bitsRequired bits of entropy on + * each invocation of getEntropy(). + * + * @param bitsRequired size (in bits) of entropy to be created by the provided source. + * @return an EntropySource that generates bitsRequired bits of entropy on each call to its getEntropy() method. + */ + public IEntropySource Get(int bitsRequired) + { + return new BasicEntropySource(mSecureRandom, mPredictionResistant, bitsRequired); + } + + private class BasicEntropySource + : IEntropySource + { + private readonly SecureRandom mSecureRandom; + private readonly bool mPredictionResistant; + private readonly int mEntropySize; + + internal BasicEntropySource(SecureRandom secureRandom, bool predictionResistant, int entropySize) + { + if (secureRandom == null) + throw new ArgumentNullException(nameof(secureRandom)); + + this.mSecureRandom = secureRandom; + this.mPredictionResistant = predictionResistant; + this.mEntropySize = entropySize; + } + + bool IEntropySource.IsPredictionResistant + { + get { return mPredictionResistant; } + } + + byte[] IEntropySource.GetEntropy() + { + // TODO[FIPS] Not all SecureRandom implementations are considered valid entropy sources + return SecureRandom.GetNextBytes(mSecureRandom, (mEntropySize + 7) / 8); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int IEntropySource.GetEntropy(Span output) + { + int length = (mEntropySize + 7) / 8; + mSecureRandom.NextBytes(output[..length]); + return length; + } +#endif + + int IEntropySource.EntropySize + { + get { return mEntropySize; } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs.meta new file mode 100644 index 00000000..94de166a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cb455ad34ed0d474d845cc23f0a2fbf0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/BasicEntropySourceProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs new file mode 100644 index 00000000..a9488b43 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Security.Cryptography; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public class CryptoApiEntropySourceProvider + : IEntropySourceProvider + { + private readonly RandomNumberGenerator mRng; + private readonly bool mPredictionResistant; + + public CryptoApiEntropySourceProvider() + : this(RandomNumberGenerator.Create(), true) + { + } + + public CryptoApiEntropySourceProvider(RandomNumberGenerator rng, bool isPredictionResistant) + { + if (rng == null) + throw new ArgumentNullException("rng"); + + mRng = rng; + mPredictionResistant = isPredictionResistant; + } + + public IEntropySource Get(int bitsRequired) + { + return new CryptoApiEntropySource(mRng, mPredictionResistant, bitsRequired); + } + + private class CryptoApiEntropySource + : IEntropySource + { + private readonly RandomNumberGenerator mRng; + private readonly bool mPredictionResistant; + private readonly int mEntropySize; + + internal CryptoApiEntropySource(RandomNumberGenerator rng, bool predictionResistant, int entropySize) + { + this.mRng = rng; + this.mPredictionResistant = predictionResistant; + this.mEntropySize = entropySize; + } + + #region IEntropySource Members + + bool IEntropySource.IsPredictionResistant + { + get { return mPredictionResistant; } + } + + byte[] IEntropySource.GetEntropy() + { + byte[] result = new byte[(mEntropySize + 7) / 8]; + mRng.GetBytes(result); + return result; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int IEntropySource.GetEntropy(Span output) + { + int length = (mEntropySize + 7) / 8; + mRng.GetBytes(output[..length]); + return length; + } +#endif + + int IEntropySource.EntropySize + { + get { return mEntropySize; } + } + + #endregion + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs.meta new file mode 100644 index 00000000..dbd34105 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 98f1d87eb3d920a43b46bc92a02aa02e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiEntropySourceProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs new file mode 100644 index 00000000..82d78305 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Security.Cryptography; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + /// + /// Uses RandomNumberGenerator.Create() to get randomness generator + /// + public sealed class CryptoApiRandomGenerator + : IRandomGenerator, IDisposable + { + private readonly RandomNumberGenerator m_randomNumberGenerator; + + public CryptoApiRandomGenerator() + : this(RandomNumberGenerator.Create()) + { + } + + public CryptoApiRandomGenerator(RandomNumberGenerator randomNumberGenerator) + { + m_randomNumberGenerator = randomNumberGenerator ?? + throw new ArgumentNullException(nameof(randomNumberGenerator)); + } + + #region IRandomGenerator Members + + public void AddSeedMaterial(byte[] seed) + { + // We don't care about the seed + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void AddSeedMaterial(ReadOnlySpan inSeed) + { + // We don't care about the seed + } +#endif + + public void AddSeedMaterial(long seed) + { + // We don't care about the seed + } + + public void NextBytes(byte[] bytes) + { + m_randomNumberGenerator.GetBytes(bytes); + } + + public void NextBytes(byte[] bytes, int start, int len) + { +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_0_OR_GREATER + m_randomNumberGenerator.GetBytes(bytes, start, len); +#else + if (start < 0) + throw new ArgumentException("Start offset cannot be negative", "start"); + if (bytes.Length < (start + len)) + throw new ArgumentException("Byte array too small for requested offset and length"); + + if (bytes.Length == len && start == 0) + { + NextBytes(bytes); + } + else + { + byte[] tmpBuf = new byte[len]; + NextBytes(tmpBuf); + Array.Copy(tmpBuf, 0, bytes, start, len); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void NextBytes(Span bytes) + { + m_randomNumberGenerator.GetBytes(bytes); + } +#endif + + #endregion + + #region IDisposable Members + + public void Dispose() + { + m_randomNumberGenerator.Dispose(); + } + + #endregion + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs.meta new file mode 100644 index 00000000..97d3425b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f3caaf979811f624b974ab1d665a661e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/CryptoApiRandomGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs new file mode 100644 index 00000000..22647b3c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + /** + * Random generation based on the digest with counter. Calling AddSeedMaterial will + * always increase the entropy of the hash. + *

+ * Internal access to the digest is synchronized so a single one of these can be shared. + *

+ */ + public sealed class DigestRandomGenerator + : IRandomGenerator + { + private const long CYCLE_COUNT = 10; + + private long stateCounter; + private long seedCounter; + private IDigest digest; + private byte[] state; + private byte[] seed; + + public DigestRandomGenerator(IDigest digest) + { + this.digest = digest; + + this.seed = new byte[digest.GetDigestSize()]; + this.seedCounter = 1; + + this.state = new byte[digest.GetDigestSize()]; + this.stateCounter = 1; + } + + public void AddSeedMaterial(byte[] inSeed) + { + lock (this) + { + if (!Arrays.IsNullOrEmpty(inSeed)) + { + DigestUpdate(inSeed); + } + DigestUpdate(seed); + DigestDoFinal(seed); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void AddSeedMaterial(ReadOnlySpan inSeed) + { + lock (this) + { + if (!inSeed.IsEmpty) + { + DigestUpdate(inSeed); + } + DigestUpdate(seed); + DigestDoFinal(seed); + } + } +#endif + + public void AddSeedMaterial(long rSeed) + { + lock (this) + { + DigestAddCounter(rSeed); + DigestUpdate(seed); + DigestDoFinal(seed); + } + } + + public void NextBytes(byte[] bytes) + { + NextBytes(bytes, 0, bytes.Length); + } + + public void NextBytes(byte[] bytes, int start, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + NextBytes(bytes.AsSpan(start, len)); +#else + lock (this) + { + int stateOff = 0; + + GenerateState(); + + int end = start + len; + for (int i = start; i < end; ++i) + { + if (stateOff == state.Length) + { + GenerateState(); + stateOff = 0; + } + bytes[i] = state[stateOff++]; + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void NextBytes(Span bytes) + { + lock (this) + { + int stateOff = 0; + + GenerateState(); + + for (int i = 0; i < bytes.Length; ++i) + { + if (stateOff == state.Length) + { + GenerateState(); + stateOff = 0; + } + bytes[i] = state[stateOff++]; + } + } + } +#endif + + private void CycleSeed() + { + DigestUpdate(seed); + DigestAddCounter(seedCounter++); + DigestDoFinal(seed); + } + + private void GenerateState() + { + DigestAddCounter(stateCounter++); + DigestUpdate(state); + DigestUpdate(seed); + DigestDoFinal(state); + + if ((stateCounter % CYCLE_COUNT) == 0) + { + CycleSeed(); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void DigestAddCounter(long seedVal) + { + Span bytes = stackalloc byte[8]; + Pack.UInt64_To_LE((ulong)seedVal, bytes); + digest.BlockUpdate(bytes); + } + + private void DigestUpdate(ReadOnlySpan inSeed) + { + digest.BlockUpdate(inSeed); + } + + private void DigestDoFinal(Span result) + { + digest.DoFinal(result); + } +#else + private void DigestAddCounter(long seedVal) + { + byte[] bytes = new byte[8]; + Pack.UInt64_To_LE((ulong)seedVal, bytes); + digest.BlockUpdate(bytes, 0, bytes.Length); + } + + private void DigestUpdate(byte[] inSeed) + { + digest.BlockUpdate(inSeed, 0, inSeed.Length); + } + + private void DigestDoFinal(byte[] result) + { + digest.DoFinal(result, 0); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs.meta new file mode 100644 index 00000000..4f12d817 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7816f1b03e8a4154085c3dd6c3ee115f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/DigestRandomGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs new file mode 100644 index 00000000..1ad6a65b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public abstract class EntropyUtilities + { + /** + * Generate numBytes worth of entropy from the passed in entropy source. + * + * @param entropySource the entropy source to request the data from. + * @param numBytes the number of bytes of entropy requested. + * @return a byte array populated with the random data. + */ + public static byte[] GenerateSeed(IEntropySource entropySource, int numBytes) + { + byte[] bytes = new byte[numBytes]; + int count = 0; + while (count < numBytes) + { + byte[] entropy = entropySource.GetEntropy(); + int toCopy = System.Math.Min(bytes.Length, numBytes - count); + Array.Copy(entropy, 0, bytes, count, toCopy); + count += toCopy; + } + return bytes; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs.meta new file mode 100644 index 00000000..240484c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b9987c57d8739434c94cec3a72c2e62f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/EntropyUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs new file mode 100644 index 00000000..6db9d771 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + internal interface IDrbgProvider + { + ISP80090Drbg Get(IEntropySource entropySource); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs.meta new file mode 100644 index 00000000..9330de5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e23783c6ef2676c468b3c5ae42a5f29e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IDrbgProvider.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs new file mode 100644 index 00000000..0e6c73d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + /// Generic interface for objects generating random bytes. + public interface IRandomGenerator + { + /// Add more seed material to the generator. + /// A byte array to be mixed into the generator's state. + void AddSeedMaterial(byte[] seed); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void AddSeedMaterial(ReadOnlySpan seed); +#endif + + /// Add more seed material to the generator. + /// A long value to be mixed into the generator's state. + void AddSeedMaterial(long seed); + + /// Fill byte array with random values. + /// Array to be filled. + void NextBytes(byte[] bytes); + + /// Fill byte array with random values. + /// Array to receive bytes. + /// Index to start filling at. + /// Length of segment to fill. + void NextBytes(byte[] bytes, int start, int len); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void NextBytes(Span bytes); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs.meta new file mode 100644 index 00000000..c01ca7e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1501d9a297438c547ac3f782a85f3796 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/IRandomGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs new file mode 100644 index 00000000..3b1d777f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs @@ -0,0 +1,2 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs.meta new file mode 100644 index 00000000..c994f585 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ff89dbb06ce62b4f94d8f8556629e2b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/ReversedWindowGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs new file mode 100644 index 00000000..56c662c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs @@ -0,0 +1,135 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public class SP800SecureRandom + : SecureRandom + { + private readonly IDrbgProvider mDrbgProvider; + private readonly bool mPredictionResistant; + private readonly SecureRandom mRandomSource; + private readonly IEntropySource mEntropySource; + + private ISP80090Drbg mDrbg; + + internal SP800SecureRandom(SecureRandom randomSource, IEntropySource entropySource, IDrbgProvider drbgProvider, + bool predictionResistant) + : base(null) + { + this.mRandomSource = randomSource; + this.mEntropySource = entropySource; + this.mDrbgProvider = drbgProvider; + this.mPredictionResistant = predictionResistant; + } + + public override void SetSeed(byte[] seed) + { + lock (this) + { + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void SetSeed(Span seed) + { + lock (this) + { + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } +#endif + + public override void SetSeed(long seed) + { + lock (this) + { + // this will happen when SecureRandom() is created + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } + + public override void NextBytes(byte[] bytes) + { + NextBytes(bytes, 0, bytes.Length); + } + + public override void NextBytes(byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + NextBytes(buf.AsSpan(off, len)); +#else + lock (this) + { + if (mDrbg == null) + { + mDrbg = mDrbgProvider.Get(mEntropySource); + } + + // check if a reseed is required... + if (mDrbg.Generate(buf, off, len, null, mPredictionResistant) < 0) + { + mDrbg.Reseed(null); + mDrbg.Generate(buf, off, len, null, mPredictionResistant); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void NextBytes(Span buffer) + { + lock (this) + { + if (mDrbg == null) + { + mDrbg = mDrbgProvider.Get(mEntropySource); + } + + // check if a reseed is required... + if (mDrbg.Generate(buffer, mPredictionResistant) < 0) + { + mDrbg.Reseed(ReadOnlySpan.Empty); + mDrbg.Generate(buffer, mPredictionResistant); + } + } + } +#endif + + public override byte[] GenerateSeed(int numBytes) + { + return EntropyUtilities.GenerateSeed(mEntropySource, numBytes); + } + + /// Force a reseed of the DRBG. + /// optional additional input + public virtual void Reseed(byte[] additionalInput) + { + lock (this) + { + if (mDrbg == null) + { + mDrbg = mDrbgProvider.Get(mEntropySource); + } + + mDrbg.Reseed(additionalInput); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs.meta new file mode 100644 index 00000000..5e69c118 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2af845dab91a6114b94dcf61aafb387c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandom.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs new file mode 100644 index 00000000..1a486e64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs @@ -0,0 +1,215 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + /** + * Builder class for making SecureRandom objects based on SP 800-90A Deterministic Random Bit Generators (DRBG). + */ + public class SP800SecureRandomBuilder + { + private readonly SecureRandom mRandom; + private readonly IEntropySourceProvider mEntropySourceProvider; + + private byte[] mPersonalizationString = null; + private int mSecurityStrength = 256; + private int mEntropyBitsRequired = 256; + + /** + * Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with + * predictionResistant set to false. + *

+ * Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if + * the default SecureRandom does for its generateSeed() call. + *

+ */ + public SP800SecureRandomBuilder() + : this(CryptoServicesRegistrar.GetSecureRandom(), false) + { + } + + /** + * Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value + * for prediction resistance. + *

+ * Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if + * the passed in SecureRandom does for its generateSeed() call. + *

+ * @param entropySource + * @param predictionResistant + */ + public SP800SecureRandomBuilder(SecureRandom entropySource, bool predictionResistant) + { + if (entropySource == null) + throw new ArgumentNullException(nameof(entropySource)); + + this.mRandom = entropySource; + this.mEntropySourceProvider = new BasicEntropySourceProvider(entropySource, predictionResistant); + } + + /** + * Create a builder which makes creates the SecureRandom objects from a specified entropy source provider. + *

+ * Note: If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored. + *

+ * @param entropySourceProvider a provider of EntropySource objects. + */ + public SP800SecureRandomBuilder(IEntropySourceProvider entropySourceProvider) + { + this.mRandom = null; + this.mEntropySourceProvider = entropySourceProvider; + } + + /** + * Set the personalization string for DRBG SecureRandoms created by this builder + * @param personalizationString the personalisation string for the underlying DRBG. + * @return the current builder. + */ + public SP800SecureRandomBuilder SetPersonalizationString(byte[] personalizationString) + { + this.mPersonalizationString = personalizationString; + return this; + } + + /** + * Set the security strength required for DRBGs used in building SecureRandom objects. + * + * @param securityStrength the security strength (in bits) + * @return the current builder. + */ + public SP800SecureRandomBuilder SetSecurityStrength(int securityStrength) + { + this.mSecurityStrength = securityStrength; + return this; + } + + /** + * Set the amount of entropy bits required for seeding and reseeding DRBGs used in building SecureRandom objects. + * + * @param entropyBitsRequired the number of bits of entropy to be requested from the entropy source on each seed/reseed. + * @return the current builder. + */ + public SP800SecureRandomBuilder SetEntropyBitsRequired(int entropyBitsRequired) + { + this.mEntropyBitsRequired = entropyBitsRequired; + return this; + } + + /** + * Build a SecureRandom based on a SP 800-90A Hash DRBG. + * + * @param digest digest algorithm to use in the DRBG underneath the SecureRandom. + * @param nonce nonce value to use in DRBG construction. + * @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes. + * @return a SecureRandom supported by a Hash DRBG. + */ + public SP800SecureRandom BuildHash(IDigest digest, byte[] nonce, bool predictionResistant) + { + return new SP800SecureRandom(mRandom, mEntropySourceProvider.Get(mEntropyBitsRequired), + new HashDrbgProvider(digest, nonce, mPersonalizationString, mSecurityStrength), predictionResistant); + } + + /** + * Build a SecureRandom based on a SP 800-90A CTR DRBG. + * + * @param cipher the block cipher to base the DRBG on. + * @param keySizeInBits key size in bits to be used with the block cipher. + * @param nonce nonce value to use in DRBG construction. + * @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes. + * @return a SecureRandom supported by a CTR DRBG. + */ + public SP800SecureRandom BuildCtr(IBlockCipher cipher, int keySizeInBits, byte[] nonce, bool predictionResistant) + { + return new SP800SecureRandom(mRandom, mEntropySourceProvider.Get(mEntropyBitsRequired), + new CtrDrbgProvider(cipher, keySizeInBits, nonce, mPersonalizationString, mSecurityStrength), predictionResistant); + } + + /** + * Build a SecureRandom based on a SP 800-90A HMAC DRBG. + * + * @param hMac HMAC algorithm to use in the DRBG underneath the SecureRandom. + * @param nonce nonce value to use in DRBG construction. + * @param predictionResistant specify whether the underlying DRBG in the resulting SecureRandom should reseed on each request for bytes. + * @return a SecureRandom supported by a HMAC DRBG. + */ + public SP800SecureRandom BuildHMac(IMac hMac, byte[] nonce, bool predictionResistant) + { + return new SP800SecureRandom(mRandom, mEntropySourceProvider.Get(mEntropyBitsRequired), + new HMacDrbgProvider(hMac, nonce, mPersonalizationString, mSecurityStrength), predictionResistant); + } + + private class HashDrbgProvider + : IDrbgProvider + { + private readonly IDigest mDigest; + private readonly byte[] mNonce; + private readonly byte[] mPersonalizationString; + private readonly int mSecurityStrength; + + public HashDrbgProvider(IDigest digest, byte[] nonce, byte[] personalizationString, int securityStrength) + { + this.mDigest = digest; + this.mNonce = nonce; + this.mPersonalizationString = personalizationString; + this.mSecurityStrength = securityStrength; + } + + public ISP80090Drbg Get(IEntropySource entropySource) + { + return new HashSP800Drbg(mDigest, mSecurityStrength, entropySource, mPersonalizationString, mNonce); + } + } + + private class HMacDrbgProvider + : IDrbgProvider + { + private readonly IMac mHMac; + private readonly byte[] mNonce; + private readonly byte[] mPersonalizationString; + private readonly int mSecurityStrength; + + public HMacDrbgProvider(IMac hMac, byte[] nonce, byte[] personalizationString, int securityStrength) + { + this.mHMac = hMac; + this.mNonce = nonce; + this.mPersonalizationString = personalizationString; + this.mSecurityStrength = securityStrength; + } + + public ISP80090Drbg Get(IEntropySource entropySource) + { + return new HMacSP800Drbg(mHMac, mSecurityStrength, entropySource, mPersonalizationString, mNonce); + } + } + + private class CtrDrbgProvider + : IDrbgProvider + { + private readonly IBlockCipher mBlockCipher; + private readonly int mKeySizeInBits; + private readonly byte[] mNonce; + private readonly byte[] mPersonalizationString; + private readonly int mSecurityStrength; + + public CtrDrbgProvider(IBlockCipher blockCipher, int keySizeInBits, byte[] nonce, byte[] personalizationString, int securityStrength) + { + this.mBlockCipher = blockCipher; + this.mKeySizeInBits = keySizeInBits; + this.mNonce = nonce; + this.mPersonalizationString = personalizationString; + this.mSecurityStrength = securityStrength; + } + + public ISP80090Drbg Get(IEntropySource entropySource) + { + return new CtrSP800Drbg(mBlockCipher, mKeySizeInBits, mSecurityStrength, entropySource, mPersonalizationString, mNonce); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs.meta new file mode 100644 index 00000000..78f76b36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c68208041500178428c38d37e6d6b3e4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/SP800SecureRandomBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs new file mode 100644 index 00000000..0170cd82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public sealed class VmpcRandomGenerator + : IRandomGenerator + { + /// + /// Permutation generated by code: + /// + /// // First 1850 fractional digit of Pi number. + /// byte[] key = new BigInteger("14159265358979323846...5068006422512520511").ToByteArray(); + /// s = 0; + /// P = new byte[256]; + /// for (int i = 0; i < 256; i++) + /// { + /// P[i] = (byte) i; + /// } + /// for (int m = 0; m < 768; m++) + /// { + /// s = P[(s + P[m & 0xff] + key[m % key.length]) & 0xff]; + /// byte temp = P[m & 0xff]; + /// P[m & 0xff] = P[s & 0xff]; + /// P[s & 0xff] = temp; + /// } + /// + private readonly byte[] P = + { + 0xbb, 0x2c, 0x62, 0x7f, 0xb5, 0xaa, 0xd4, 0x0d, 0x81, 0xfe, 0xb2, 0x82, 0xcb, 0xa0, 0xa1, 0x08, + 0x18, 0x71, 0x56, 0xe8, 0x49, 0x02, 0x10, 0xc4, 0xde, 0x35, 0xa5, 0xec, 0x80, 0x12, 0xb8, 0x69, + 0xda, 0x2f, 0x75, 0xcc, 0xa2, 0x09, 0x36, 0x03, 0x61, 0x2d, 0xfd, 0xe0, 0xdd, 0x05, 0x43, 0x90, + 0xad, 0xc8, 0xe1, 0xaf, 0x57, 0x9b, 0x4c, 0xd8, 0x51, 0xae, 0x50, 0x85, 0x3c, 0x0a, 0xe4, 0xf3, + 0x9c, 0x26, 0x23, 0x53, 0xc9, 0x83, 0x97, 0x46, 0xb1, 0x99, 0x64, 0x31, 0x77, 0xd5, 0x1d, 0xd6, + 0x78, 0xbd, 0x5e, 0xb0, 0x8a, 0x22, 0x38, 0xf8, 0x68, 0x2b, 0x2a, 0xc5, 0xd3, 0xf7, 0xbc, 0x6f, + 0xdf, 0x04, 0xe5, 0x95, 0x3e, 0x25, 0x86, 0xa6, 0x0b, 0x8f, 0xf1, 0x24, 0x0e, 0xd7, 0x40, 0xb3, + 0xcf, 0x7e, 0x06, 0x15, 0x9a, 0x4d, 0x1c, 0xa3, 0xdb, 0x32, 0x92, 0x58, 0x11, 0x27, 0xf4, 0x59, + 0xd0, 0x4e, 0x6a, 0x17, 0x5b, 0xac, 0xff, 0x07, 0xc0, 0x65, 0x79, 0xfc, 0xc7, 0xcd, 0x76, 0x42, + 0x5d, 0xe7, 0x3a, 0x34, 0x7a, 0x30, 0x28, 0x0f, 0x73, 0x01, 0xf9, 0xd1, 0xd2, 0x19, 0xe9, 0x91, + 0xb9, 0x5a, 0xed, 0x41, 0x6d, 0xb4, 0xc3, 0x9e, 0xbf, 0x63, 0xfa, 0x1f, 0x33, 0x60, 0x47, 0x89, + 0xf0, 0x96, 0x1a, 0x5f, 0x93, 0x3d, 0x37, 0x4b, 0xd9, 0xa8, 0xc1, 0x1b, 0xf6, 0x39, 0x8b, 0xb7, + 0x0c, 0x20, 0xce, 0x88, 0x6e, 0xb6, 0x74, 0x8e, 0x8d, 0x16, 0x29, 0xf2, 0x87, 0xf5, 0xeb, 0x70, + 0xe3, 0xfb, 0x55, 0x9f, 0xc6, 0x44, 0x4a, 0x45, 0x7d, 0xe2, 0x6b, 0x5c, 0x6c, 0x66, 0xa9, 0x8c, + 0xee, 0x84, 0x13, 0xa7, 0x1e, 0x9d, 0xdc, 0x67, 0x48, 0xba, 0x2e, 0xe6, 0xa4, 0xab, 0x7c, 0x94, + 0x00, 0x21, 0xef, 0xea, 0xbe, 0xca, 0x72, 0x4f, 0x52, 0x98, 0x3f, 0xc2, 0x14, 0x7b, 0x3b, 0x54, + }; + + /// Value generated in the same way as P. + private byte s = 0xbe; + private byte n = 0; + + public VmpcRandomGenerator() + { + } + + public void AddSeedMaterial(byte[] seed) + { + for (int m = 0; m < seed.Length; m++) + { + byte pn = P[n]; + s = P[(s + pn + seed[m]) & 0xff]; + P[n] = P[s]; + P[s] = pn; + n = (byte)(n + 1); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void AddSeedMaterial(ReadOnlySpan seed) + { + for (int m = 0; m < seed.Length; m++) + { + byte pn = P[n]; + s = P[(s + pn + seed[m]) & 0xff]; + P[n] = P[s]; + P[s] = pn; + n = (byte)(n + 1); + } + } +#endif + + public void AddSeedMaterial(long seed) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = stackalloc byte[8]; + Pack.UInt64_To_BE((ulong)seed, bytes); + AddSeedMaterial(bytes); +#else + AddSeedMaterial(Pack.UInt64_To_BE((ulong)seed)); +#endif + } + + public void NextBytes(byte[] bytes) + { + NextBytes(bytes, 0, bytes.Length); + } + + public void NextBytes(byte[] bytes, int start, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + NextBytes(bytes.AsSpan(start, len)); +#else + lock (P) + { + int end = start + len; + for (int i = start; i != end; i++) + { + byte pn = P[n]; + s = P[(s + pn) & 0xFF]; + byte ps = P[s]; + bytes[i] = P[(P[ps] + 1) & 0xFF]; + P[s] = pn; + P[n] = ps; + n = (byte)(n + 1); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void NextBytes(Span bytes) + { + lock (P) + { + for (int i = 0; i < bytes.Length; ++i) + { + byte pn = P[n]; + s = P[(s + pn) & 0xFF]; + byte ps = P[s]; + bytes[i] = P[(P[ps] + 1) & 0xFF]; + P[s] = pn; + P[n] = ps; + n = (byte)(n + 1); + } + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs.meta new file mode 100644 index 00000000..372fb5cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0a086195f427d344a93a2bb16650895 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/VMPCRandomGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs new file mode 100644 index 00000000..5b77851f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs @@ -0,0 +1,206 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + internal class X931Rng + { + private const long BLOCK64_RESEED_MAX = 1L << (16 - 1); + private const long BLOCK128_RESEED_MAX = 1L << (24 - 1); + private const int BLOCK64_MAX_BITS_REQUEST = 1 << (13 - 1); + private const int BLOCK128_MAX_BITS_REQUEST = 1 << (19 - 1); + + private readonly IBlockCipher mEngine; + private readonly IEntropySource mEntropySource; + + private readonly byte[] mDT; + private readonly byte[] mI; + private readonly byte[] mR; + + private byte[] mV; + + private long mReseedCounter = 1; + + /** + * + * @param engine + * @param entropySource + */ + internal X931Rng(IBlockCipher engine, byte[] dateTimeVector, IEntropySource entropySource) + { + this.mEngine = engine; + this.mEntropySource = entropySource; + + this.mDT = new byte[engine.GetBlockSize()]; + + Array.Copy(dateTimeVector, 0, mDT, 0, mDT.Length); + + this.mI = new byte[engine.GetBlockSize()]; + this.mR = new byte[engine.GetBlockSize()]; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal int Generate(Span output, bool predictionResistant) + { + int outputLen = output.Length; + + if (mR.Length == 8) // 64 bit block size + { + if (mReseedCounter > BLOCK64_RESEED_MAX) + return -1; + + if (outputLen > BLOCK64_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + BLOCK64_MAX_BITS_REQUEST, "output"); + } + else + { + if (mReseedCounter > BLOCK128_RESEED_MAX) + return -1; + + if (outputLen > BLOCK128_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + BLOCK128_MAX_BITS_REQUEST, "output"); + } + + if (predictionResistant || mV == null) + { + mV = mEntropySource.GetEntropy(); + if (mV.Length != mEngine.GetBlockSize()) + throw new InvalidOperationException("Insufficient entropy returned"); + } + + int m = outputLen / mR.Length; + + for (int i = 0; i < m; i++) + { + mEngine.ProcessBlock(mDT, mI); + Process(mR, mI, mV); + Process(mV, mR, mI); + + mR.CopyTo(output[(i * mR.Length)..]); + + Increment(mDT); + } + + int bytesToCopy = outputLen - m * mR.Length; + + if (bytesToCopy > 0) + { + mEngine.ProcessBlock(mDT, mI); + Process(mR, mI, mV); + Process(mV, mR, mI); + + mR.AsSpan(0, bytesToCopy).CopyTo(output[(m * mR.Length)..]); + + Increment(mDT); + } + + mReseedCounter++; + + return outputLen * 8; + } +#else + /** + * Populate a passed in array with random data. + * + * @param output output array for generated bits. + * @param predictionResistant true if a reseed should be forced, false otherwise. + * + * @return number of bits generated, -1 if a reseed required. + */ + internal int Generate(byte[] output, int outputOff, int outputLen, bool predictionResistant) + { + if (mR.Length == 8) // 64 bit block size + { + if (mReseedCounter > BLOCK64_RESEED_MAX) + return -1; + + if (outputLen > BLOCK64_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + BLOCK64_MAX_BITS_REQUEST, "output"); + } + else + { + if (mReseedCounter > BLOCK128_RESEED_MAX) + return -1; + + if (outputLen > BLOCK128_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + BLOCK128_MAX_BITS_REQUEST, "output"); + } + + if (predictionResistant || mV == null) + { + mV = mEntropySource.GetEntropy(); + if (mV.Length != mEngine.GetBlockSize()) + throw new InvalidOperationException("Insufficient entropy returned"); + } + + int m = outputLen / mR.Length; + + for (int i = 0; i < m; i++) + { + mEngine.ProcessBlock(mDT, 0, mI, 0); + Process(mR, mI, mV); + Process(mV, mR, mI); + + Array.Copy(mR, 0, output, outputOff + i * mR.Length, mR.Length); + + Increment(mDT); + } + + int bytesToCopy = outputLen - m * mR.Length; + + if (bytesToCopy > 0) + { + mEngine.ProcessBlock(mDT, 0, mI, 0); + Process(mR, mI, mV); + Process(mV, mR, mI); + + Array.Copy(mR, 0, output, outputOff + m * mR.Length, bytesToCopy); + + Increment(mDT); + } + + mReseedCounter++; + + return outputLen * 8; + } +#endif + + /** + * Reseed the RNG. + */ + internal void Reseed() + { + mV = mEntropySource.GetEntropy(); + if (mV.Length != mEngine.GetBlockSize()) + throw new InvalidOperationException("Insufficient entropy returned"); + mReseedCounter = 1; + } + + internal IEntropySource EntropySource + { + get { return mEntropySource; } + } + + private void Process(byte[] res, byte[] a, byte[] b) + { + for (int i = 0; i != res.Length; i++) + { + res[i] = (byte)(a[i] ^ b[i]); + } + + mEngine.ProcessBlock(res, 0, res, 0); + } + + private void Increment(byte[] val) + { + for (int i = val.Length - 1; i >= 0; i--) + { + if (++val[i] != 0) + break; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs.meta new file mode 100644 index 00000000..e6e2f595 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b5c39730f073604498d1d749ac3d680 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931Rng.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs new file mode 100644 index 00000000..33cb6554 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public class X931SecureRandom + : SecureRandom + { + private readonly bool mPredictionResistant; + private readonly SecureRandom mRandomSource; + private readonly X931Rng mDrbg; + + internal X931SecureRandom(SecureRandom randomSource, X931Rng drbg, bool predictionResistant) + : base(null) + { + this.mRandomSource = randomSource; + this.mDrbg = drbg; + this.mPredictionResistant = predictionResistant; + } + + public override void SetSeed(byte[] seed) + { + lock (this) + { + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void SetSeed(Span seed) + { + lock (this) + { + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } +#endif + + public override void SetSeed(long seed) + { + lock (this) + { + // this will happen when SecureRandom() is created + if (mRandomSource != null) + { + this.mRandomSource.SetSeed(seed); + } + } + } + + public override void NextBytes(byte[] bytes) + { + NextBytes(bytes, 0, bytes.Length); + } + + public override void NextBytes(byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + NextBytes(buf.AsSpan(off, len)); +#else + lock (this) + { + // check if a reseed is required... + if (mDrbg.Generate(buf, off, len, mPredictionResistant) < 0) + { + mDrbg.Reseed(); + mDrbg.Generate(buf, off, len, mPredictionResistant); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void NextBytes(Span buffer) + { + lock (this) + { + // check if a reseed is required... + if (mDrbg.Generate(buffer, mPredictionResistant) < 0) + { + mDrbg.Reseed(); + mDrbg.Generate(buffer, mPredictionResistant); + } + } + } +#endif + + public override byte[] GenerateSeed(int numBytes) + { + return EntropyUtilities.GenerateSeed(mDrbg.EntropySource, numBytes); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs.meta new file mode 100644 index 00000000..57618477 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 80ec4ccddf3d5ca47a23f1689dca826b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandom.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs new file mode 100644 index 00000000..c8ec4f13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng +{ + public class X931SecureRandomBuilder + { + private readonly SecureRandom mRandom; // JDK 1.1 complains on final. + + private IEntropySourceProvider mEntropySourceProvider; + private byte[] mDateTimeVector; + + /** + * Basic constructor, creates a builder using an EntropySourceProvider based on the default SecureRandom with + * predictionResistant set to false. + *

+ * Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if + * the default SecureRandom does for its generateSeed() call. + *

+ */ + public X931SecureRandomBuilder() + : this(CryptoServicesRegistrar.GetSecureRandom(), false) + { + } + + /** + * Construct a builder with an EntropySourceProvider based on the passed in SecureRandom and the passed in value + * for prediction resistance. + *

+ * Any SecureRandom created from a builder constructed like this will make use of input passed to SecureRandom.setSeed() if + * the passed in SecureRandom does for its generateSeed() call. + *

+ * @param entropySource + * @param predictionResistant + */ + public X931SecureRandomBuilder(SecureRandom entropySource, bool predictionResistant) + { + if (entropySource == null) + throw new ArgumentNullException(nameof(entropySource)); + + this.mRandom = entropySource; + this.mEntropySourceProvider = new BasicEntropySourceProvider(mRandom, predictionResistant); + } + + /** + * Create a builder which makes creates the SecureRandom objects from a specified entropy source provider. + *

+ * Note: If this constructor is used any calls to setSeed() in the resulting SecureRandom will be ignored. + *

+ * @param entropySourceProvider a provider of EntropySource objects. + */ + public X931SecureRandomBuilder(IEntropySourceProvider entropySourceProvider) + { + this.mRandom = null; + this.mEntropySourceProvider = entropySourceProvider; + } + + public X931SecureRandomBuilder SetDateTimeVector(byte[] dateTimeVector) + { + this.mDateTimeVector = dateTimeVector; + return this; + } + + /** + * Construct a X9.31 secure random generator using the passed in engine and key. If predictionResistant is true the + * generator will be reseeded on each request. + * + * @param engine a block cipher to use as the operator. + * @param key the block cipher key to initialise engine with. + * @param predictionResistant true if engine to be reseeded on each use, false otherwise. + * @return a SecureRandom. + */ + public X931SecureRandom Build(IBlockCipher engine, KeyParameter key, bool predictionResistant) + { + if (mDateTimeVector == null) + { + mDateTimeVector = new byte[engine.GetBlockSize()]; + Pack.UInt64_To_BE((ulong)DateTimeUtilities.CurrentUnixMs(), mDateTimeVector, 0); + } + + engine.Init(true, key); + + return new X931SecureRandom(mRandom, new X931Rng(engine, mDateTimeVector, mEntropySourceProvider.Get(engine.GetBlockSize() * 8)), predictionResistant); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs.meta new file mode 100644 index 00000000..740e929f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4989e991238339740be31b78063f178a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/X931SecureRandomBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg.meta new file mode 100644 index 00000000..b90ee3ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 43e04952d1da85f438aed0991c0b3edd +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs new file mode 100644 index 00000000..cce870e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs @@ -0,0 +1,775 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg +{ + /** + * A SP800-90A CTR DRBG. + */ + public sealed class CtrSP800Drbg + : ISP80090Drbg + { + private static readonly long TDEA_RESEED_MAX = 1L << (32 - 1); + private static readonly long AES_RESEED_MAX = 1L << (48 - 1); + private static readonly int TDEA_MAX_BITS_REQUEST = 1 << (13 - 1); + private static readonly int AES_MAX_BITS_REQUEST = 1 << (19 - 1); + + private readonly IEntropySource mEntropySource; + private readonly IBlockCipher mEngine; + private readonly int mKeySizeInBits; + private readonly int mSeedLength; + private readonly int mSecurityStrength; + + // internal state + private byte[] mKey; + private byte[] mV; + private long mReseedCounter = 0; + private bool mIsTdea = false; + + /** + * Construct a SP800-90A CTR DRBG. + *

+ * Minimum entropy requirement is the security strength requested. + *

+ * @param engine underlying block cipher to use to support DRBG + * @param keySizeInBits size of the key to use with the block cipher. + * @param securityStrength security strength required (in bits) + * @param entropySource source of entropy to use for seeding/reseeding. + * @param personalizationString personalization string to distinguish this DRBG (may be null). + * @param nonce nonce to further distinguish this DRBG (may be null). + */ + public CtrSP800Drbg(IBlockCipher engine, int keySizeInBits, int securityStrength, IEntropySource entropySource, + byte[] personalizationString, byte[] nonce) + { + if (securityStrength > 256) + throw new ArgumentException("Requested security strength is not supported by the derivation function"); + if (GetMaxSecurityStrength(engine, keySizeInBits) < securityStrength) + throw new ArgumentException("Requested security strength is not supported by block cipher and key size"); + if (entropySource.EntropySize < securityStrength) + throw new ArgumentException("Not enough entropy for security strength required"); + + mEntropySource = entropySource; + mEngine = engine; + + mKeySizeInBits = keySizeInBits; + mSecurityStrength = securityStrength; + mSeedLength = keySizeInBits + engine.GetBlockSize() * 8; + mIsTdea = IsTdea(engine); + + CTR_DRBG_Instantiate_algorithm(nonce, personalizationString); + } + + private void CTR_DRBG_Instantiate_algorithm(byte[] nonce, byte[] personalisationString) + { + byte[] entropy = GetEntropy(); // Get_entropy_input + byte[] seedMaterial = Arrays.ConcatenateAll(entropy, nonce, personalisationString); + byte[] seed = BlockCipherDF(seedMaterial, mSeedLength / 8); + + int blockSize = mEngine.GetBlockSize(); + + mKey = new byte[(mKeySizeInBits + 7) / 8]; + mV = new byte[blockSize]; + + // mKey & mV are modified by this call + CTR_DRBG_Update(seed, mKey, mV); + + mReseedCounter = 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void CTR_DRBG_Update(ReadOnlySpan seed, Span key, Span v) + { + int seedLength = seed.Length; + Span temp = seedLength <= 256 + ? stackalloc byte[seedLength] + : new byte[seedLength]; + + int blockSize = mEngine.GetBlockSize(); + Span block = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + mEngine.Init(true, ExpandToKeyParameter(key)); + for (int i = 0; i * blockSize < seed.Length; ++i) + { + AddOneTo(v); + mEngine.ProcessBlock(v, block); + + int bytesToCopy = System.Math.Min(blockSize, temp.Length - i * blockSize); + block[..bytesToCopy].CopyTo(temp[(i * blockSize)..]); + } + + XorWith(seed, temp); + + key.CopyFrom(temp); + v.CopyFrom(temp[key.Length..]); + } +#else + private void CTR_DRBG_Update(byte[] seed, byte[] key, byte[] v) + { + byte[] temp = new byte[seed.Length]; + byte[] outputBlock = new byte[mEngine.GetBlockSize()]; + + int i = 0; + int outLen = mEngine.GetBlockSize(); + + mEngine.Init(true, ExpandToKeyParameter(key)); + while (i * outLen < seed.Length) + { + AddOneTo(v); + mEngine.ProcessBlock(v, 0, outputBlock, 0); + + int bytesToCopy = System.Math.Min(outLen, temp.Length - i * outLen); + Array.Copy(outputBlock, 0, temp, i * outLen, bytesToCopy); + ++i; + } + + Xor(temp, seed, temp, 0); + + Array.Copy(temp, 0, key, 0, key.Length); + Array.Copy(temp, key.Length, v, 0, v.Length); + } +#endif + + private void CTR_DRBG_Reseed_algorithm(byte[] additionalInput) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + CTR_DRBG_Reseed_algorithm(Spans.FromNullableReadOnly(additionalInput)); +#else + byte[] seedMaterial = Arrays.Concatenate(GetEntropy(), additionalInput); + + seedMaterial = BlockCipherDF(seedMaterial, mSeedLength / 8); + + CTR_DRBG_Update(seedMaterial, mKey, mV); + + mReseedCounter = 1; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void CTR_DRBG_Reseed_algorithm(ReadOnlySpan additionalInput) + { + int entropyLength = GetEntropyLength(); + int seedLength = entropyLength + additionalInput.Length; + + Span seedMaterial = seedLength <= 256 + ? stackalloc byte[seedLength] + : new byte[seedLength]; + + GetEntropy(seedMaterial[..entropyLength]); + additionalInput.CopyTo(seedMaterial[entropyLength..]); + + seedMaterial = BlockCipherDF(seedMaterial, mSeedLength / 8); + + CTR_DRBG_Update(seedMaterial, mKey, mV); + + mReseedCounter = 1; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Xor(ReadOnlySpan x, ReadOnlySpan y, Span z) + { + for (int i = 0; i < z.Length; ++i) + { + z[i] = (byte)(x[i] ^ y[i]); + } + } + + private void XorWith(ReadOnlySpan x, Span z) + { + for (int i = 0; i < z.Length; ++i) + { + z[i] ^= x[i]; + } + } +#else + private void Xor(byte[] output, byte[] a, byte[] b, int bOff) + { + for (int i = 0; i < output.Length; i++) + { + output[i] = (byte)(a[i] ^ b[bOff + i]); + } + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void AddOneTo(Span longer) +#else + private void AddOneTo(byte[] longer) +#endif + { + uint carry = 1; + int i = longer.Length; + while (--i >= 0) + { + carry += longer[i]; + longer[i] = (byte)carry; + carry >>= 8; + } + } + + private byte[] GetEntropy() + { + byte[] entropy = mEntropySource.GetEntropy(); + if (entropy.Length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return entropy; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int GetEntropy(Span output) + { + int length = mEntropySource.GetEntropy(output); + if (length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return length; + } + + private int GetEntropyLength() + { + return (mEntropySource.EntropySize + 7) / 8; + } +#endif + + // -- Internal state migration --- + + private static readonly byte[] K_BITS = Hex.DecodeStrict( + "000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"); + + // 1. If (number_of_bits_to_return > max_number_of_bits), then return an + // ERROR_FLAG. + // 2. L = len (input_string)/8. + // 3. N = number_of_bits_to_return/8. + // Comment: L is the bitstring represention of + // the integer resulting from len (input_string)/8. + // L shall be represented as a 32-bit integer. + // + // Comment : N is the bitstring represention of + // the integer resulting from + // number_of_bits_to_return/8. N shall be + // represented as a 32-bit integer. + // + // 4. S = L || N || input_string || 0x80. + // 5. While (len (S) mod outlen) + // Comment : Pad S with zeros, if necessary. + // 0, S = S || 0x00. + // + // Comment : Compute the starting value. + // 6. temp = the Null string. + // 7. i = 0. + // 8. K = Leftmost keylen bits of 0x00010203...1D1E1F. + // 9. While len (temp) < keylen + outlen, do + // + // IV = i || 0outlen - len (i). + // + // 9.1 + // + // temp = temp || BCC (K, (IV || S)). + // + // 9.2 + // + // i = i + 1. + // + // 9.3 + // + // Comment : i shall be represented as a 32-bit + // integer, i.e., len (i) = 32. + // + // Comment: The 32-bit integer represenation of + // i is padded with zeros to outlen bits. + // + // Comment: Compute the requested number of + // bits. + // + // 10. K = Leftmost keylen bits of temp. + // + // 11. X = Next outlen bits of temp. + // + // 12. temp = the Null string. + // + // 13. While len (temp) < number_of_bits_to_return, do + // + // 13.1 X = Block_Encrypt (K, X). + // + // 13.2 temp = temp || X. + // + // 14. requested_bits = Leftmost number_of_bits_to_return of temp. + // + // 15. Return SUCCESS and requested_bits. + private byte[] BlockCipherDF(byte[] input, int N) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BlockCipherDF(input.AsSpan(), N); +#else + int outLen = mEngine.GetBlockSize(); + int L = input.Length; // already in bytes + // 4 S = L || N || input || 0x80 + int sLen = 4 + 4 + L + 1; + int blockLen = ((sLen + outLen - 1) / outLen) * outLen; + byte[] S = new byte[blockLen]; + Pack.UInt32_To_BE((uint)L, S, 0); + Pack.UInt32_To_BE((uint)N, S, 4); + Array.Copy(input, 0, S, 8, L); + S[8 + L] = 0x80; + // S already padded with zeros + + byte[] temp = new byte[mKeySizeInBits / 8 + outLen]; + byte[] bccOut = new byte[outLen]; + + byte[] IV = new byte[outLen]; + + int i = 0; + byte[] K = new byte[mKeySizeInBits / 8]; + Array.Copy(K_BITS, 0, K, 0, K.Length); + var K1 = ExpandToKeyParameter(K); + mEngine.Init(true, K1); + + while (i*outLen*8 < mKeySizeInBits + outLen *8) + { + Pack.UInt32_To_BE((uint)i, IV, 0); + BCC(bccOut, IV, S); + + int bytesToCopy = System.Math.Min(outLen, temp.Length - i * outLen); + Array.Copy(bccOut, 0, temp, i * outLen, bytesToCopy); + ++i; + } + + byte[] X = new byte[outLen]; + Array.Copy(temp, 0, K, 0, K.Length); + Array.Copy(temp, K.Length, X, 0, X.Length); + + temp = new byte[N]; + + i = 0; + mEngine.Init(true, ExpandToKeyParameter(K)); + + while (i * outLen < temp.Length) + { + mEngine.ProcessBlock(X, 0, X, 0); + + int bytesToCopy = System.Math.Min(outLen, temp.Length - i * outLen); + Array.Copy(X, 0, temp, i * outLen, bytesToCopy); + i++; + } + + return temp; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private byte[] BlockCipherDF(ReadOnlySpan input, int N) + { + int blockSize = mEngine.GetBlockSize(); + int L = input.Length; // already in bytes + // 4 S = L || N || input || 0x80 + int sLen = 4 + 4 + L + 1; + int blockLen = ((sLen + blockSize - 1) / blockSize) * blockSize; + Span S = blockLen <= 256 + ? stackalloc byte[blockLen] + : new byte[blockLen]; + Pack.UInt32_To_BE((uint)L, S); + Pack.UInt32_To_BE((uint)N, S[4..]); + input.CopyTo(S[8..]); + S[8 + L] = 0x80; + // S already padded with zeros + + int keySize = mKeySizeInBits / 8; + int tempSize = keySize + blockSize; + Span temp = tempSize <= 128 + ? stackalloc byte[tempSize] + : new byte[tempSize]; + + Span bccOut = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + Span IV = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + var K1 = ExpandToKeyParameter(K_BITS.AsSpan(0, keySize)); + mEngine.Init(true, K1); + + for (int i = 0; i * blockSize < tempSize; ++i) + { + Pack.UInt32_To_BE((uint)i, IV); + BCC(bccOut, IV, S); + + int bytesToCopy = System.Math.Min(blockSize, tempSize - i * blockSize); + bccOut[..bytesToCopy].CopyTo(temp[(i * blockSize)..]); + } + + var K2 = ExpandToKeyParameter(temp[..keySize]); + mEngine.Init(true, K2); + var X = temp[keySize..]; + + byte[] result = new byte[N]; + for (int i = 0; i * blockSize < result.Length; ++i) + { + mEngine.ProcessBlock(X, X); + + int bytesToCopy = System.Math.Min(blockSize, result.Length - i * blockSize); + X[..bytesToCopy].CopyTo(result.AsSpan(i * blockSize)); + } + return result; + } +#endif + + /* + * 1. chaining_value = 0^outlen + * . Comment: Set the first chaining value to outlen zeros. + * 2. n = len (data)/outlen. + * 3. Starting with the leftmost bits of data, split the data into n blocks of outlen bits + * each, forming block(1) to block(n). + * 4. For i = 1 to n do + * 4.1 input_block = chaining_value ^ block(i) . + * 4.2 chaining_value = Block_Encrypt (Key, input_block). + * 5. output_block = chaining_value. + * 6. Return output_block. + */ +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void BCC(Span bccOut, ReadOnlySpan iV, ReadOnlySpan data) + { + int blockSize = mEngine.GetBlockSize(); + + Span chainingValue = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + Span inputBlock = blockSize <= 64 + ? stackalloc byte[blockSize] + : new byte[blockSize]; + + mEngine.ProcessBlock(iV, chainingValue); + + int n = data.Length / blockSize; + for (int i = 0; i < n; i++) + { + Xor(chainingValue, data[(i * blockSize)..], inputBlock); + mEngine.ProcessBlock(inputBlock, chainingValue); + } + + bccOut.CopyFrom(chainingValue); + } +#else + private void BCC(byte[] bccOut, byte[] iV, byte[] data) + { + int outlen = mEngine.GetBlockSize(); + byte[] chainingValue = new byte[outlen]; // initial values = 0 + int n = data.Length / outlen; + + byte[] inputBlock = new byte[outlen]; + + mEngine.ProcessBlock(iV, 0, chainingValue, 0); + + for (int i = 0; i < n; i++) + { + Xor(inputBlock, chainingValue, data, i*outlen); + mEngine.ProcessBlock(inputBlock, 0, chainingValue, 0); + } + + Array.Copy(chainingValue, 0, bccOut, 0, bccOut.Length); + } +#endif + + /** + * Return the block size (in bits) of the DRBG. + * + * @return the number of bits produced on each internal round of the DRBG. + */ + public int BlockSize + { + get { return mV.Length * 8; } + } + + /** + * Populate a passed in array with random data. + * + * @param output output array for generated bits. + * @param additionalInput additional input to be added to the DRBG in this step. + * @param predictionResistant true if a reseed should be forced, false otherwise. + * + * @return number of bits generated, -1 if a reseed required. + */ + public int Generate(byte[] output, int outputOff, int outputLen, byte[] additionalInput, + bool predictionResistant) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return additionalInput == null + ? Generate(output.AsSpan(outputOff, outputLen), predictionResistant) + : GenerateWithInput(output.AsSpan(outputOff, outputLen), additionalInput.AsSpan(), predictionResistant); +#else + if (mIsTdea) + { + if (mReseedCounter > TDEA_RESEED_MAX) + return -1; + + if (outputLen > TDEA_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + TDEA_MAX_BITS_REQUEST, "output"); + } + else + { + if (mReseedCounter > AES_RESEED_MAX) + return -1; + + if (outputLen > AES_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + AES_MAX_BITS_REQUEST, "output"); + } + + if (predictionResistant) + { + CTR_DRBG_Reseed_algorithm(additionalInput); + additionalInput = null; + } + + if (additionalInput != null) + { + additionalInput = BlockCipherDF(additionalInput, mSeedLength / 8); + CTR_DRBG_Update(additionalInput, mKey, mV); + } + else + { + additionalInput = new byte[mSeedLength]; + } + + byte[] tmp = new byte[mV.Length]; + + mEngine.Init(true, ExpandToKeyParameter(mKey)); + + for (int i = 0, limit = outputLen / tmp.Length; i <= limit; i++) + { + int bytesToCopy = System.Math.Min(tmp.Length, outputLen - i * tmp.Length); + + if (bytesToCopy != 0) + { + AddOneTo(mV); + + mEngine.ProcessBlock(mV, 0, tmp, 0); + + Array.Copy(tmp, 0, output, outputOff + i * tmp.Length, bytesToCopy); + } + } + + CTR_DRBG_Update(additionalInput, mKey, mV); + + mReseedCounter++; + + return outputLen * 8; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Generate(Span output, bool predictionResistant) + { + int outputLen = output.Length; + if (mIsTdea) + { + if (mReseedCounter > TDEA_RESEED_MAX) + return -1; + + if (outputLen > TDEA_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + TDEA_MAX_BITS_REQUEST, "output"); + } + else + { + if (mReseedCounter > AES_RESEED_MAX) + return -1; + + if (outputLen > AES_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + AES_MAX_BITS_REQUEST, "output"); + } + + if (predictionResistant) + { + CTR_DRBG_Reseed_algorithm(ReadOnlySpan.Empty); + } + + byte[] seed = new byte[mSeedLength / 8]; + + return ImplGenerate(seed, output); + } + + public int GenerateWithInput(Span output, ReadOnlySpan additionalInput, bool predictionResistant) + { + int outputLen = output.Length; + if (mIsTdea) + { + if (mReseedCounter > TDEA_RESEED_MAX) + return -1; + + if (outputLen > TDEA_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + TDEA_MAX_BITS_REQUEST, "output"); + } + else + { + if (mReseedCounter > AES_RESEED_MAX) + return -1; + + if (outputLen > AES_MAX_BITS_REQUEST / 8) + throw new ArgumentException("Number of bits per request limited to " + AES_MAX_BITS_REQUEST, "output"); + } + + int seedLength = mSeedLength / 8; + byte[] seed; + if (predictionResistant) + { + CTR_DRBG_Reseed_algorithm(additionalInput); + seed = new byte[seedLength]; + } + else + { + seed = BlockCipherDF(additionalInput, seedLength); + CTR_DRBG_Update(seed, mKey, mV); + } + + return ImplGenerate(seed, output); + } + + private int ImplGenerate(ReadOnlySpan seed, Span output) + { + byte[] tmp = new byte[mV.Length]; + + mEngine.Init(true, ExpandToKeyParameter(mKey)); + + int outputLen = output.Length; + for (int i = 0, limit = outputLen / tmp.Length; i <= limit; i++) + { + int bytesToCopy = System.Math.Min(tmp.Length, outputLen - i * tmp.Length); + + if (bytesToCopy != 0) + { + AddOneTo(mV); + + mEngine.ProcessBlock(mV, 0, tmp, 0); + + tmp[..bytesToCopy].CopyTo(output[(i * tmp.Length)..]); + } + } + + CTR_DRBG_Update(seed, mKey, mV); + + mReseedCounter++; + + return outputLen * 8; + } +#endif + + /** + * Reseed the DRBG. + * + * @param additionalInput additional input to be added to the DRBG in this step. + */ + public void Reseed(byte[] additionalInput) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Reseed(Spans.FromNullableReadOnly(additionalInput)); +#else + CTR_DRBG_Reseed_algorithm(additionalInput); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Reseed(ReadOnlySpan additionalInput) + { + CTR_DRBG_Reseed_algorithm(additionalInput); + } +#endif + + private bool IsTdea(IBlockCipher cipher) + { + return cipher.AlgorithmName.Equals("DESede") || cipher.AlgorithmName.Equals("TDEA"); + } + + private int GetMaxSecurityStrength(IBlockCipher cipher, int keySizeInBits) + { + if (IsTdea(cipher) && keySizeInBits == 168) + { + return 112; + } + if (cipher.AlgorithmName.Equals("AES")) + { + return keySizeInBits; + } + + return -1; + } + + private KeyParameter ExpandToKeyParameter(byte[] key) + { + if (!mIsTdea) + return new KeyParameter(key); + + // expand key to 192 bits. + byte[] tmp = new byte[24]; + + PadKey(key, 0, tmp, 0); + PadKey(key, 7, tmp, 8); + PadKey(key, 14, tmp, 16); + + return new KeyParameter(tmp); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private KeyParameter ExpandToKeyParameter(ReadOnlySpan key) + { + if (!mIsTdea) + return new KeyParameter(key); + + // expand key to 192 bits. + Span tmp = stackalloc byte[24]; + + PadKey(key, tmp); + PadKey(key[7..], tmp[8..]); + PadKey(key[14..], tmp[16..]); + + return new KeyParameter(tmp); + } +#endif + + /** + * Pad out a key for TDEA, setting odd parity for each byte. + * + * @param keyMaster + * @param keyOff + * @param tmp + * @param tmpOff + */ + private void PadKey(byte[] keyMaster, int keyOff, byte[] tmp, int tmpOff) + { + tmp[tmpOff + 0] = (byte)(keyMaster[keyOff + 0] & 0xfe); + tmp[tmpOff + 1] = (byte)((keyMaster[keyOff + 0] << 7) | ((keyMaster[keyOff + 1] & 0xfc) >> 1)); + tmp[tmpOff + 2] = (byte)((keyMaster[keyOff + 1] << 6) | ((keyMaster[keyOff + 2] & 0xf8) >> 2)); + tmp[tmpOff + 3] = (byte)((keyMaster[keyOff + 2] << 5) | ((keyMaster[keyOff + 3] & 0xf0) >> 3)); + tmp[tmpOff + 4] = (byte)((keyMaster[keyOff + 3] << 4) | ((keyMaster[keyOff + 4] & 0xe0) >> 4)); + tmp[tmpOff + 5] = (byte)((keyMaster[keyOff + 4] << 3) | ((keyMaster[keyOff + 5] & 0xc0) >> 5)); + tmp[tmpOff + 6] = (byte)((keyMaster[keyOff + 5] << 2) | ((keyMaster[keyOff + 6] & 0x80) >> 6)); + tmp[tmpOff + 7] = (byte)(keyMaster[keyOff + 6] << 1); + + DesParameters.SetOddParity(tmp, tmpOff, 8); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void PadKey(ReadOnlySpan keyMaster, Span tmp) + { + tmp[0] = (byte)(keyMaster[0] & 0xFE); + tmp[1] = (byte)((keyMaster[0] << 7) | ((keyMaster[1] & 0xfc) >> 1)); + tmp[2] = (byte)((keyMaster[1] << 6) | ((keyMaster[2] & 0xf8) >> 2)); + tmp[3] = (byte)((keyMaster[2] << 5) | ((keyMaster[3] & 0xf0) >> 3)); + tmp[4] = (byte)((keyMaster[3] << 4) | ((keyMaster[4] & 0xe0) >> 4)); + tmp[5] = (byte)((keyMaster[4] << 3) | ((keyMaster[5] & 0xc0) >> 5)); + tmp[6] = (byte)((keyMaster[5] << 2) | ((keyMaster[6] & 0x80) >> 6)); + tmp[7] = (byte)(keyMaster[6] << 1); + + DesParameters.SetOddParity(tmp[..8]); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs.meta new file mode 100644 index 00000000..e2b5ac50 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74a60b4f0c626d946a8f1cd50fd12295 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/CtrSP800Drbg.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs new file mode 100644 index 00000000..b0618c0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg +{ + internal class DrbgUtilities + { + private static readonly IDictionary MaxSecurityStrengths = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static DrbgUtilities() + { + MaxSecurityStrengths.Add("SHA-1", 128); + + MaxSecurityStrengths.Add("SHA-224", 192); + MaxSecurityStrengths.Add("SHA-256", 256); + MaxSecurityStrengths.Add("SHA-384", 256); + MaxSecurityStrengths.Add("SHA-512", 256); + + MaxSecurityStrengths.Add("SHA-512/224", 192); + MaxSecurityStrengths.Add("SHA-512/256", 256); + } + + internal static int GetMaxSecurityStrength(IDigest d) + { + return MaxSecurityStrengths[d.AlgorithmName]; + } + + internal static int GetMaxSecurityStrength(IMac m) + { + string name = m.AlgorithmName; + + return MaxSecurityStrengths[name.Substring(0, name.IndexOf("/"))]; + } + + /** + * Used by both Dual EC and Hash. + */ +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void HashDF(IDigest digest, ReadOnlySpan seedMaterial, int seedLength, Span output) +#else + internal static void HashDF(IDigest digest, byte[] seedMaterial, int seedLength, byte[] output) +#endif + { + // 1. temp = the Null string. + // 2. . + // 3. counter = an 8-bit binary value representing the integer "1". + // 4. For i = 1 to len do + // Comment : In step 4.1, no_of_bits_to_return + // is used as a 32-bit string. + // 4.1 temp = temp || Hash (counter || no_of_bits_to_return || + // input_string). + // 4.2 counter = counter + 1. + // 5. requested_bits = Leftmost (no_of_bits_to_return) of temp. + // 6. Return SUCCESS and requested_bits. + int outputLength = (seedLength + 7) / 8; + + int digestSize = digest.GetDigestSize(); + int len = outputLength / digestSize; + int counter = 1; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span dig = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + Span header = stackalloc byte[5]; + Pack.UInt32_To_BE((uint)seedLength, header[1..]); +#else + byte[] dig = new byte[digestSize]; + byte[] header = new byte[5]; + Pack.UInt32_To_BE((uint)seedLength, header, 1); +#endif + + for (int i = 0; i <= len; i++, counter++) + { + header[0] = (byte)counter; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + digest.BlockUpdate(header); + digest.BlockUpdate(seedMaterial); + digest.DoFinal(dig); + + int bytesToCopy = System.Math.Min(digestSize, outputLength - i * digestSize); + dig[..bytesToCopy].CopyTo(output[(i * digestSize)..]); +#else + digest.BlockUpdate(header, 0, header.Length); + digest.BlockUpdate(seedMaterial, 0, seedMaterial.Length); + digest.DoFinal(dig, 0); + + int bytesToCopy = System.Math.Min(digestSize, outputLength - i * digestSize); + Array.Copy(dig, 0, output, i * digestSize, bytesToCopy); +#endif + } + + // do a left shift to get rid of excess bits. + if (seedLength % 8 != 0) + { + int shift = 8 - (seedLength % 8); + uint carry = 0; + + for (int i = 0; i != outputLength; i++) + { + uint b = output[i]; + output[i] = (byte)((b >> shift) | (carry << (8 - shift))); + carry = b; + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs.meta new file mode 100644 index 00000000..3f9fc10d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 37ddcc3b4b61995479b0c93d93b23359 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/DrbgUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs new file mode 100644 index 00000000..8c8b3de0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs @@ -0,0 +1,351 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg +{ + /** + * A SP800-90A HMAC DRBG. + */ + public sealed class HMacSP800Drbg + : ISP80090Drbg + { + private readonly static long RESEED_MAX = 1L << (48 - 1); + private readonly static int MAX_BITS_REQUEST = 1 << (19 - 1); + + private readonly byte[] mK; + private readonly byte[] mV; + private readonly IEntropySource mEntropySource; + private readonly IMac mHMac; + private readonly int mSecurityStrength; + + private long mReseedCounter; + + /** + * Construct a SP800-90A Hash DRBG. + *

+ * Minimum entropy requirement is the security strength requested. + *

+ * @param hMac Hash MAC to base the DRBG on. + * @param securityStrength security strength required (in bits) + * @param entropySource source of entropy to use for seeding/reseeding. + * @param personalizationString personalization string to distinguish this DRBG (may be null). + * @param nonce nonce to further distinguish this DRBG (may be null). + */ + public HMacSP800Drbg(IMac hMac, int securityStrength, IEntropySource entropySource, + byte[] personalizationString, byte[] nonce) + { + if (securityStrength > DrbgUtilities.GetMaxSecurityStrength(hMac)) + throw new ArgumentException("Requested security strength is not supported by the derivation function"); + if (entropySource.EntropySize < securityStrength) + throw new ArgumentException("Not enough entropy for security strength required"); + + mHMac = hMac; + mSecurityStrength = securityStrength; + mEntropySource = entropySource; + + byte[] entropy = GetEntropy(); + byte[] seedMaterial = Arrays.ConcatenateAll(entropy, nonce, personalizationString); + + mK = new byte[hMac.GetMacSize()]; + mV = new byte[mK.Length]; + Arrays.Fill(mV, (byte)1); + + hmac_DRBG_Update(seedMaterial); + + mReseedCounter = 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void hmac_DRBG_Update() + { + hmac_DRBG_Update_Func(ReadOnlySpan.Empty, 0x00); + } + + private void hmac_DRBG_Update(ReadOnlySpan seedMaterial) + { + hmac_DRBG_Update_Func(seedMaterial, 0x00); + hmac_DRBG_Update_Func(seedMaterial, 0x01); + } + + private void hmac_DRBG_Update_Func(ReadOnlySpan seedMaterial, byte vValue) + { + mHMac.Init(new KeyParameter(mK)); + + mHMac.BlockUpdate(mV); + mHMac.Update(vValue); + if (!seedMaterial.IsEmpty) + { + mHMac.BlockUpdate(seedMaterial); + } + mHMac.DoFinal(mK); + + mHMac.Init(new KeyParameter(mK)); + mHMac.BlockUpdate(mV); + mHMac.DoFinal(mV); + } +#else + private void hmac_DRBG_Update(byte[] seedMaterial) + { + hmac_DRBG_Update_Func(seedMaterial, 0x00); + if (seedMaterial != null) + { + hmac_DRBG_Update_Func(seedMaterial, 0x01); + } + } + + private void hmac_DRBG_Update_Func(byte[] seedMaterial, byte vValue) + { + mHMac.Init(new KeyParameter(mK)); + + mHMac.BlockUpdate(mV, 0, mV.Length); + mHMac.Update(vValue); + + if (seedMaterial != null) + { + mHMac.BlockUpdate(seedMaterial, 0, seedMaterial.Length); + } + + mHMac.DoFinal(mK, 0); + + mHMac.Init(new KeyParameter(mK)); + mHMac.BlockUpdate(mV, 0, mV.Length); + + mHMac.DoFinal(mV, 0); + } +#endif + + /** + * Return the block size (in bits) of the DRBG. + * + * @return the number of bits produced on each round of the DRBG. + */ + public int BlockSize + { + get { return mV.Length * 8; } + } + + /** + * Populate a passed in array with random data. + * + * @param output output array for generated bits. + * @param additionalInput additional input to be added to the DRBG in this step. + * @param predictionResistant true if a reseed should be forced, false otherwise. + * + * @return number of bits generated, -1 if a reseed required. + */ + public int Generate(byte[] output, int outputOff, int outputLen, byte[] additionalInput, + bool predictionResistant) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return additionalInput == null + ? Generate(output.AsSpan(outputOff, outputLen), predictionResistant) + : GenerateWithInput(output.AsSpan(outputOff, outputLen), additionalInput.AsSpan(), predictionResistant); +#else + int numberOfBits = outputLen * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(additionalInput); + additionalInput = null; + } + + // 2. + if (additionalInput != null) + { + hmac_DRBG_Update(additionalInput); + } + + // 3. + byte[] rv = new byte[outputLen]; + + int m = outputLen / mV.Length; + + mHMac.Init(new KeyParameter(mK)); + + for (int i = 0; i < m; i++) + { + mHMac.BlockUpdate(mV, 0, mV.Length); + mHMac.DoFinal(mV, 0); + + Array.Copy(mV, 0, rv, i * mV.Length, mV.Length); + } + + if (m * mV.Length < rv.Length) + { + mHMac.BlockUpdate(mV, 0, mV.Length); + mHMac.DoFinal(mV, 0); + + Array.Copy(mV, 0, rv, m * mV.Length, rv.Length - (m * mV.Length)); + } + + hmac_DRBG_Update(additionalInput); + + mReseedCounter++; + + Array.Copy(rv, 0, output, outputOff, outputLen); + + return numberOfBits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Generate(Span output, bool predictionResistant) + { + int numberOfBits = output.Length * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(ReadOnlySpan.Empty); + } + + // 3. + ImplGenerate(output); + + hmac_DRBG_Update(); + + mReseedCounter++; + + return numberOfBits; + } + + public int GenerateWithInput(Span output, ReadOnlySpan additionalInput, bool predictionResistant) + { + int numberOfBits = output.Length * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(additionalInput); + } + else + { + // 2. + hmac_DRBG_Update(additionalInput); + } + + // 3. + ImplGenerate(output); + + if (predictionResistant) + { + hmac_DRBG_Update(); + } + else + { + hmac_DRBG_Update(additionalInput); + } + + mReseedCounter++; + + return numberOfBits; + } + + private void ImplGenerate(Span output) + { + int outputLen = output.Length; + int m = outputLen / mV.Length; + + mHMac.Init(new KeyParameter(mK)); + + for (int i = 0; i < m; i++) + { + mHMac.BlockUpdate(mV); + mHMac.DoFinal(mV); + + mV.CopyTo(output[(i * mV.Length)..]); + } + + int remaining = outputLen - m * mV.Length; + if (remaining > 0) + { + mHMac.BlockUpdate(mV); + mHMac.DoFinal(mV); + + mV[..remaining].CopyTo(output[(m * mV.Length)..]); + } + } +#endif + + /** + * Reseed the DRBG. + * + * @param additionalInput additional input to be added to the DRBG in this step. + */ + public void Reseed(byte[] additionalInput) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Reseed(Spans.FromNullableReadOnly(additionalInput)); +#else + byte[] entropy = GetEntropy(); + byte[] seedMaterial = Arrays.Concatenate(entropy, additionalInput); + + hmac_DRBG_Update(seedMaterial); + + mReseedCounter = 1; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Reseed(ReadOnlySpan additionalInput) + { + int entropyLength = GetEntropyLength(); + int seedMaterialLength = entropyLength + additionalInput.Length; + Span seedMaterial = seedMaterialLength <= 256 + ? stackalloc byte[seedMaterialLength] + : new byte[seedMaterialLength]; + GetEntropy(seedMaterial); + additionalInput.CopyTo(seedMaterial[entropyLength..]); + + hmac_DRBG_Update(seedMaterial); + + mReseedCounter = 1; + } +#endif + + private byte[] GetEntropy() + { + byte[] entropy = mEntropySource.GetEntropy(); + if (entropy.Length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return entropy; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int GetEntropy(Span output) + { + int length = mEntropySource.GetEntropy(output); + if (length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return length; + } + + private int GetEntropyLength() + { + return (mEntropySource.EntropySize + 7) / 8; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs.meta new file mode 100644 index 00000000..e7c5bb82 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5e1b0fc602d5dfe4493f15095e54e608 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HMacSP800Drbg.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs new file mode 100644 index 00000000..85b7a39a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs @@ -0,0 +1,502 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg +{ + /** + * A SP800-90A Hash DRBG. + */ + public sealed class HashSP800Drbg + : ISP80090Drbg + { + private readonly static byte[] ONE = { 0x01 }; + + private readonly static long RESEED_MAX = 1L << (48 - 1); + private readonly static int MAX_BITS_REQUEST = 1 << (19 - 1); + + private static readonly IDictionary SeedLens = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static HashSP800Drbg() + { + SeedLens.Add("SHA-1", 440); + SeedLens.Add("SHA-224", 440); + SeedLens.Add("SHA-256", 440); + SeedLens.Add("SHA-512/256", 440); + SeedLens.Add("SHA-512/224", 440); + SeedLens.Add("SHA-384", 888); + SeedLens.Add("SHA-512", 888); + } + + private readonly IDigest mDigest; + private readonly IEntropySource mEntropySource; + private readonly int mSecurityStrength; + private readonly int mSeedLength; + + private byte[] mV; + private byte[] mC; + private long mReseedCounter; + + /** + * Construct a SP800-90A Hash DRBG. + *

+ * Minimum entropy requirement is the security strength requested. + *

+ * @param digest source digest to use for DRB stream. + * @param securityStrength security strength required (in bits) + * @param entropySource source of entropy to use for seeding/reseeding. + * @param personalizationString personalization string to distinguish this DRBG (may be null). + * @param nonce nonce to further distinguish this DRBG (may be null). + */ + public HashSP800Drbg(IDigest digest, int securityStrength, IEntropySource entropySource, byte[] personalizationString, byte[] nonce) + { + if (securityStrength > DrbgUtilities.GetMaxSecurityStrength(digest)) + throw new ArgumentException("Requested security strength is not supported by the derivation function"); + if (entropySource.EntropySize < securityStrength) + throw new ArgumentException("Not enough entropy for security strength required"); + + mDigest = digest; + mEntropySource = entropySource; + mSecurityStrength = securityStrength; + mSeedLength = SeedLens[digest.AlgorithmName]; + + // 1. seed_material = entropy_input || nonce || personalization_string. + // 2. seed = Hash_df (seed_material, seedlen). + // 3. V = seed. + // 4. C = Hash_df ((0x00 || V), seedlen). Comment: Preceed V with a byte + // of zeros. + // 5. reseed_counter = 1. + // 6. Return V, C, and reseed_counter as the initial_working_state + + byte[] entropy = GetEntropy(); + byte[] seedMaterial = Arrays.ConcatenateAll(entropy, nonce, personalizationString); + mV = new byte[(mSeedLength + 7) / 8]; + DrbgUtilities.HashDF(mDigest, seedMaterial, mSeedLength, mV); + + byte[] subV = new byte[mV.Length + 1]; + Array.Copy(mV, 0, subV, 1, mV.Length); + mC = new byte[(mSeedLength + 7) / 8]; + DrbgUtilities.HashDF(mDigest, subV, mSeedLength, mC); + + mReseedCounter = 1; + } + + /** + * Return the block size (in bits) of the DRBG. + * + * @return the number of bits produced on each internal round of the DRBG. + */ + public int BlockSize + { + get { return mDigest.GetDigestSize() * 8; } + } + + /** + * Populate a passed in array with random data. + * + * @param output output array for generated bits. + * @param additionalInput additional input to be added to the DRBG in this step. + * @param predictionResistant true if a reseed should be forced, false otherwise. + * + * @return number of bits generated, -1 if a reseed required. + */ + public int Generate(byte[] output, int outputOff, int outputLen, byte[] additionalInput, + bool predictionResistant) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return additionalInput == null + ? Generate(output.AsSpan(outputOff, outputLen), predictionResistant) + : GenerateWithInput(output.AsSpan(outputOff, outputLen), additionalInput.AsSpan(), predictionResistant); +#else + // 1. If reseed_counter > reseed_interval, then return an indication that a + // reseed is required. + // 2. If (additional_input != Null), then do + // 2.1 w = Hash (0x02 || V || additional_input). + // 2.2 V = (V + w) mod 2^seedlen + // . + // 3. (returned_bits) = Hashgen (requested_number_of_bits, V). + // 4. H = Hash (0x03 || V). + // 5. V = (V + H + C + reseed_counter) mod 2^seedlen + // . + // 6. reseed_counter = reseed_counter + 1. + // 7. Return SUCCESS, returned_bits, and the new values of V, C, and + // reseed_counter for the new_working_state. + int numberOfBits = outputLen * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(additionalInput); + additionalInput = null; + } + + // 2. + if (additionalInput != null) + { + byte[] newInput = new byte[1 + mV.Length + additionalInput.Length]; + newInput[0] = 0x02; + Array.Copy(mV, 0, newInput, 1, mV.Length); + Array.Copy(additionalInput, 0, newInput, 1 + mV.Length, additionalInput.Length); + byte[] w = Hash(newInput); + + AddTo(mV, w); + } + + // 3. + byte[] rv = Hashgen(mV, outputLen); + + // 4. + byte[] subH = new byte[mV.Length + 1]; + Array.Copy(mV, 0, subH, 1, mV.Length); + subH[0] = 0x03; + + byte[] H = Hash(subH); + + // 5. + AddTo(mV, H); + AddTo(mV, mC); + + byte[] c = new byte[4]; + Pack.UInt32_To_BE((uint)mReseedCounter, c); + + AddTo(mV, c); + + mReseedCounter++; + + Array.Copy(rv, 0, output, outputOff, outputLen); + + return numberOfBits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Generate(Span output, bool predictionResistant) + { + // 1. If reseed_counter > reseed_interval, then return an indication that a + // reseed is required. + // 2. If (additional_input != Null), then do + // 2.1 w = Hash (0x02 || V || additional_input). + // 2.2 V = (V + w) mod 2^seedlen + // . + // 3. (returned_bits) = Hashgen (requested_number_of_bits, V). + // 4. H = Hash (0x03 || V). + // 5. V = (V + H + C + reseed_counter) mod 2^seedlen + // . + // 6. reseed_counter = reseed_counter + 1. + // 7. Return SUCCESS, returned_bits, and the new values of V, C, and + // reseed_counter for the new_working_state. + int numberOfBits = output.Length * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(ReadOnlySpan.Empty); + } + + return ImplGenerate(output); + } + + public int GenerateWithInput(Span output, ReadOnlySpan additionalInput, bool predictionResistant) + { + // 1. If reseed_counter > reseed_interval, then return an indication that a + // reseed is required. + // 2. If (additional_input != Null), then do + // 2.1 w = Hash (0x02 || V || additional_input). + // 2.2 V = (V + w) mod 2^seedlen + // . + // 3. (returned_bits) = Hashgen (requested_number_of_bits, V). + // 4. H = Hash (0x03 || V). + // 5. V = (V + H + C + reseed_counter) mod 2^seedlen + // . + // 6. reseed_counter = reseed_counter + 1. + // 7. Return SUCCESS, returned_bits, and the new values of V, C, and + // reseed_counter for the new_working_state. + int numberOfBits = output.Length * 8; + + if (numberOfBits > MAX_BITS_REQUEST) + throw new ArgumentException("Number of bits per request limited to " + MAX_BITS_REQUEST, "output"); + + if (mReseedCounter > RESEED_MAX) + return -1; + + if (predictionResistant) + { + Reseed(additionalInput); + } + else + { + // 2. + mDigest.Update(0x02); + mDigest.BlockUpdate(mV); + mDigest.BlockUpdate(additionalInput); + + int digestSize = mDigest.GetDigestSize(); + Span w = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + mDigest.DoFinal(w); + + AddTo(mV, w); + } + + return ImplGenerate(output); + } + + private int ImplGenerate(Span output) + { + // 3. + Hashgen(mV, output); + + // 4. + mDigest.Update(0x03); + mDigest.BlockUpdate(mV); + + int digestSize = mDigest.GetDigestSize(); + Span H = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + mDigest.DoFinal(H); + + // 5. + AddTo(mV, H); + AddTo(mV, mC); + + Span c = stackalloc byte[4]; + Pack.UInt32_To_BE((uint)mReseedCounter, c); + + AddTo(mV, c); + + mReseedCounter++; + + return output.Length * 8; + } +#endif + + private byte[] GetEntropy() + { + byte[] entropy = mEntropySource.GetEntropy(); + if (entropy.Length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return entropy; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int GetEntropy(Span output) + { + int length = mEntropySource.GetEntropy(output); + if (length < (mSecurityStrength + 7) / 8) + throw new InvalidOperationException("Insufficient entropy provided by entropy source"); + return length; + } + + private int GetEntropyLength() + { + return (mEntropySource.EntropySize + 7) / 8; + } +#endif + + // this will always add the shorter length byte array mathematically to the + // longer length byte array. + // be careful.... +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void AddTo(Span longer, ReadOnlySpan shorter) +#else + private void AddTo(byte[] longer, byte[] shorter) +#endif + { + int off = longer.Length - shorter.Length; + + uint carry = 0; + int i = shorter.Length; + while (--i >= 0) + { + carry += (uint)longer[off + i] + shorter[i]; + longer[off + i] = (byte)carry; + carry >>= 8; + } + + i = off; + while (--i >= 0) + { + carry += longer[i]; + longer[i] = (byte)carry; + carry >>= 8; + } + } + + /** + * Reseed the DRBG. + * + * @param additionalInput additional input to be added to the DRBG in this step. + */ + public void Reseed(byte[] additionalInput) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Reseed(Spans.FromNullableReadOnly(additionalInput)); +#else + // 1. seed_material = 0x01 || V || entropy_input || additional_input. + // + // 2. seed = Hash_df (seed_material, seedlen). + // + // 3. V = seed. + // + // 4. C = Hash_df ((0x00 || V), seedlen). + // + // 5. reseed_counter = 1. + // + // 6. Return V, C, and reseed_counter for the new_working_state. + // + // Comment: Precede with a byte of all zeros. + byte[] entropy = GetEntropy(); + byte[] seedMaterial = Arrays.ConcatenateAll(ONE, mV, entropy, additionalInput); + DrbgUtilities.HashDF(mDigest, seedMaterial, mSeedLength, mV); + + byte[] subV = new byte[mV.Length + 1]; + subV[0] = 0x00; + Array.Copy(mV, 0, subV, 1, mV.Length); + DrbgUtilities.HashDF(mDigest, subV, mSeedLength, mC); + + mReseedCounter = 1; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Reseed(ReadOnlySpan additionalInput) + { + // 1. seed_material = 0x01 || V || entropy_input || additional_input. + // + // 2. seed = Hash_df (seed_material, seedlen). + // + // 3. V = seed. + // + // 4. C = Hash_df ((0x00 || V), seedlen). + // + // 5. reseed_counter = 1. + // + // 6. Return V, C, and reseed_counter for the new_working_state. + // + // Comment: Precede with a byte of all zeros. + int entropyLength = GetEntropyLength(); + + int seedMaterialLength = 1 + mV.Length + entropyLength + additionalInput.Length; + Span seedMaterial = seedMaterialLength <= 256 + ? stackalloc byte[seedMaterialLength] + : new byte[seedMaterialLength]; + + seedMaterial[0] = 0x01; + mV.CopyTo(seedMaterial[1..]); + GetEntropy(seedMaterial[(1 + mV.Length)..]); + additionalInput.CopyTo(seedMaterial[(1 + mV.Length + entropyLength)..]); + + DrbgUtilities.HashDF(mDigest, seedMaterial, mSeedLength, mV); + + int subVLength = 1 + mV.Length; + Span subV = subVLength <= 128 + ? stackalloc byte[subVLength] + : new byte[subVLength]; + subV[0] = 0x00; + mV.CopyTo(subV[1..]); + + DrbgUtilities.HashDF(mDigest, subV, mSeedLength, mC); + + mReseedCounter = 1; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void DoHash(ReadOnlySpan input, Span output) + { + mDigest.BlockUpdate(input); + mDigest.DoFinal(output); + } +#else + private void DoHash(byte[] input, byte[] output) + { + mDigest.BlockUpdate(input, 0, input.Length); + mDigest.DoFinal(output, 0); + } + + private byte[] Hash(byte[] input) + { + byte[] hash = new byte[mDigest.GetDigestSize()]; + DoHash(input, hash); + return hash; + } +#endif + + // 1. m = [requested_number_of_bits / outlen] + // 2. data = V. + // 3. W = the Null string. + // 4. For i = 1 to m + // 4.1 wi = Hash (data). + // 4.2 W = W || wi. + // 4.3 data = (data + 1) mod 2^seedlen + // . + // 5. returned_bits = Leftmost (requested_no_of_bits) bits of W. +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void Hashgen(ReadOnlySpan input, Span output) + { + int digestSize = mDigest.GetDigestSize(); + int m = output.Length / digestSize; + + int dataSize = input.Length; + Span data = dataSize <= 256 + ? stackalloc byte[input.Length] + : new byte[input.Length]; + input.CopyTo(data); + + Span dig = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + + for (int i = 0; i <= m; i++) + { + DoHash(data, dig); + + int bytesToCopy = System.Math.Min(digestSize, output.Length - i * digestSize); + dig[..bytesToCopy].CopyTo(output[(i * digestSize)..]); + AddTo(data, ONE); + } + } +#else + private byte[] Hashgen(byte[] input, int length) + { + int digestSize = mDigest.GetDigestSize(); + int m = length / digestSize; + + byte[] data = (byte[])input.Clone(); + byte[] W = new byte[length]; + + byte[] dig = new byte[digestSize]; + for (int i = 0; i <= m; i++) + { + DoHash(data, dig); + + int bytesToCopy = System.Math.Min(digestSize, length - i * digestSize); + Array.Copy(dig, 0, W, i * digestSize, bytesToCopy); + + AddTo(data, ONE); + } + + return W; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs.meta new file mode 100644 index 00000000..60e2abdb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0107b79a063371b4e81b74d67d109eb0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/HashSP800Drbg.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs new file mode 100644 index 00000000..a4601a44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg +{ + /** + * Interface to SP800-90A deterministic random bit generators. + */ + public interface ISP80090Drbg + { + /** + * Return the block size of the DRBG. + * + * @return the block size (in bits) produced by each round of the DRBG. + */ + int BlockSize { get; } + + /** + * Populate a passed in array with random data. + * + * @param output output array for generated bits. + * @param additionalInput additional input to be added to the DRBG in this step. + * @param predictionResistant true if a reseed should be forced, false otherwise. + * + * @return number of bits generated, -1 if a reseed required. + */ + int Generate(byte[] output, int outputOff, int outputLen, byte[] additionalInput, bool predictionResistant); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int Generate(Span output, bool predictionResistant); + + int GenerateWithInput(Span output, ReadOnlySpan additionalInput, bool predictionResistant); +#endif + + /** + * Reseed the DRBG. + * + * @param additionalInput additional input to be added to the DRBG in this step. + */ + void Reseed(byte[] additionalInput); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void Reseed(ReadOnlySpan additionalInput); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs.meta new file mode 100644 index 00000000..c02e38a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b5b62d297e2ef945ab39de2e2f84832 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/prng/drbg/ISP80090Drbg.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers.meta new file mode 100644 index 00000000..bcb61a98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: af77bffa24e90dc46920e412c098fda4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs new file mode 100644 index 00000000..b5f91ed0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs @@ -0,0 +1,130 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class DsaDigestSigner + : ISigner + { + private readonly IDsa dsa; + private readonly IDigest digest; + private readonly IDsaEncoding encoding; + private bool forSigning; + + public DsaDigestSigner(IDsa dsa, IDigest digest) + : this(dsa, digest, StandardDsaEncoding.Instance) + { + } + + public DsaDigestSigner(IDsa dsa, IDigest digest, IDsaEncoding encoding) + { + this.dsa = dsa; + this.digest = digest; + this.encoding = encoding; + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "with" + dsa.AlgorithmName; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + AsymmetricKeyParameter k; + if (parameters is ParametersWithRandom withRandom) + { + k = (AsymmetricKeyParameter)withRandom.Parameters; + } + else + { + k = (AsymmetricKeyParameter)parameters; + } + + if (forSigning && !k.IsPrivate) + throw new InvalidKeyException("Signing Requires Private Key."); + + if (!forSigning && k.IsPrivate) + throw new InvalidKeyException("Verification Requires Public Key."); + + Reset(); + + dsa.Init(forSigning, parameters); + } + + public virtual void Update(byte input) + { + digest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning) + throw new InvalidOperationException("DSADigestSigner not initialised for signature generation."); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + BigInteger[] sig = dsa.GenerateSignature(hash); + + try + { + return encoding.Encode(GetOrder(), sig[0], sig[1]); + } + catch (Exception) + { + throw new InvalidOperationException("unable to encode signature"); + } + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning) + throw new InvalidOperationException("DSADigestSigner not initialised for verification"); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + try + { + BigInteger[] sig = encoding.Decode(GetOrder(), signature); + + return dsa.VerifySignature(hash, sig[0], sig[1]); + } + catch (Exception) + { + return false; + } + } + + public virtual void Reset() + { + digest.Reset(); + } + + protected virtual BigInteger GetOrder() + { + return dsa.Order; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs.meta new file mode 100644 index 00000000..3387090a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 487af9cbb3780ce4391f6b50a2ef029b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaDigestSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs new file mode 100644 index 00000000..a616105d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs @@ -0,0 +1,165 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * The Digital Signature Algorithm - as described in "Handbook of Applied + * Cryptography", pages 452 - 453. + */ + public class DsaSigner + : IDsa + { + protected readonly IDsaKCalculator kCalculator; + + protected DsaKeyParameters key = null; + protected SecureRandom random = null; + + /** + * Default configuration, random K values. + */ + public DsaSigner() + { + this.kCalculator = new RandomDsaKCalculator(); + } + + /** + * Configuration with an alternate, possibly deterministic calculator of K. + * + * @param kCalculator a K value calculator. + */ + public DsaSigner(IDsaKCalculator kCalculator) + { + this.kCalculator = kCalculator; + } + + public virtual string AlgorithmName + { + get { return "DSA"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + SecureRandom providedRandom = null; + + if (forSigning) + { + if (parameters is ParametersWithRandom) + { + ParametersWithRandom rParam = (ParametersWithRandom)parameters; + + providedRandom = rParam.Random; + parameters = rParam.Parameters; + } + + if (!(parameters is DsaPrivateKeyParameters)) + throw new InvalidKeyException("DSA private key required for signing"); + + this.key = (DsaPrivateKeyParameters)parameters; + } + else + { + if (!(parameters is DsaPublicKeyParameters)) + throw new InvalidKeyException("DSA public key required for verification"); + + this.key = (DsaPublicKeyParameters)parameters; + } + + this.random = InitSecureRandom(forSigning && !kCalculator.IsDeterministic, providedRandom); + } + + public virtual BigInteger Order + { + get { return key.Parameters.Q; } + } + + /** + * Generate a signature for the given message using the key we were + * initialised with. For conventional DSA the message should be a SHA-1 + * hash of the message of interest. + * + * @param message the message that will be verified later. + */ + public virtual BigInteger[] GenerateSignature(byte[] message) + { + DsaParameters parameters = key.Parameters; + BigInteger q = parameters.Q; + BigInteger m = CalculateE(q, message); + BigInteger x = ((DsaPrivateKeyParameters)key).X; + + if (kCalculator.IsDeterministic) + { + kCalculator.Init(q, x, message); + } + else + { + kCalculator.Init(q, random); + } + + BigInteger k = kCalculator.NextK(); + + BigInteger r = parameters.G.ModPow(k, parameters.P).Mod(q); + + k = BigIntegers.ModOddInverse(q, k).Multiply(m.Add(x.Multiply(r))); + + BigInteger s = k.Mod(q); + + return new BigInteger[]{ r, s }; + } + + /** + * return true if the value r and s represent a DSA signature for + * the passed in message for standard DSA the message should be a + * SHA-1 hash of the real message to be verified. + */ + public virtual bool VerifySignature(byte[] message, BigInteger r, BigInteger s) + { + DsaParameters parameters = key.Parameters; + BigInteger q = parameters.Q; + BigInteger m = CalculateE(q, message); + + if (r.SignValue <= 0 || q.CompareTo(r) <= 0) + { + return false; + } + + if (s.SignValue <= 0 || q.CompareTo(s) <= 0) + { + return false; + } + + BigInteger w = BigIntegers.ModOddInverseVar(q, s); + + BigInteger u1 = m.Multiply(w).Mod(q); + BigInteger u2 = r.Multiply(w).Mod(q); + + BigInteger p = parameters.P; + u1 = parameters.G.ModPow(u1, p); + u2 = ((DsaPublicKeyParameters)key).Y.ModPow(u2, p); + + BigInteger v = u1.Multiply(u2).Mod(p).Mod(q); + + return v.Equals(r); + } + + protected virtual BigInteger CalculateE(BigInteger n, byte[] message) + { + int length = System.Math.Min(message.Length, n.BitLength / 8); + + return new BigInteger(1, message, 0, length); + } + + protected virtual SecureRandom InitSecureRandom(bool needed, SecureRandom provided) + { + return !needed ? null : CryptoServicesRegistrar.GetSecureRandom(provided); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs.meta new file mode 100644 index 00000000..153631a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 016fe8d4eaf679243a116a20525e9388 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/DsaSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs new file mode 100644 index 00000000..e2815594 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * EC-DSA as described in X9.62 + */ + public class ECDsaSigner + : IDsa + { + private static readonly BigInteger Eight = BigInteger.ValueOf(8); + + protected readonly IDsaKCalculator kCalculator; + + protected ECKeyParameters key = null; + protected SecureRandom random = null; + + /** + * Default configuration, random K values. + */ + public ECDsaSigner() + { + this.kCalculator = new RandomDsaKCalculator(); + } + + /** + * Configuration with an alternate, possibly deterministic calculator of K. + * + * @param kCalculator a K value calculator. + */ + public ECDsaSigner(IDsaKCalculator kCalculator) + { + this.kCalculator = kCalculator; + } + + public virtual string AlgorithmName + { + get { return "ECDSA"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + SecureRandom providedRandom = null; + + if (forSigning) + { + if (parameters is ParametersWithRandom) + { + ParametersWithRandom rParam = (ParametersWithRandom)parameters; + + providedRandom = rParam.Random; + parameters = rParam.Parameters; + } + + if (!(parameters is ECPrivateKeyParameters)) + throw new InvalidKeyException("EC private key required for signing"); + + this.key = (ECPrivateKeyParameters)parameters; + } + else + { + if (!(parameters is ECPublicKeyParameters)) + throw new InvalidKeyException("EC public key required for verification"); + + this.key = (ECPublicKeyParameters)parameters; + } + + this.random = InitSecureRandom(forSigning && !kCalculator.IsDeterministic, providedRandom); + } + + public virtual BigInteger Order + { + get { return key.Parameters.N; } + } + + // 5.3 pg 28 + /** + * Generate a signature for the given message using the key we were + * initialised with. For conventional DSA the message should be a SHA-1 + * hash of the message of interest. + * + * @param message the message that will be verified later. + */ + public virtual BigInteger[] GenerateSignature(byte[] message) + { + ECDomainParameters ec = key.Parameters; + BigInteger n = ec.N; + BigInteger e = CalculateE(n, message); + BigInteger d = ((ECPrivateKeyParameters)key).D; + + if (kCalculator.IsDeterministic) + { + kCalculator.Init(n, d, message); + } + else + { + kCalculator.Init(n, random); + } + + BigInteger r, s; + + ECMultiplier basePointMultiplier = CreateBasePointMultiplier(); + + // 5.3.2 + do // Generate s + { + BigInteger k; + do // Generate r + { + k = kCalculator.NextK(); + + ECPoint p = basePointMultiplier.Multiply(ec.G, k).Normalize(); + + // 5.3.3 + r = p.AffineXCoord.ToBigInteger().Mod(n); + } + while (r.SignValue == 0); + + s = BigIntegers.ModOddInverse(n, k).Multiply(e.Add(d.Multiply(r))).Mod(n); + } + while (s.SignValue == 0); + + return new BigInteger[]{ r, s }; + } + + // 5.4 pg 29 + /** + * return true if the value r and s represent a DSA signature for + * the passed in message (for standard DSA the message should be + * a SHA-1 hash of the real message to be verified). + */ + public virtual bool VerifySignature(byte[] message, BigInteger r, BigInteger s) + { + BigInteger n = key.Parameters.N; + + // r and s should both in the range [1,n-1] + if (r.SignValue < 1 || s.SignValue < 1 + || r.CompareTo(n) >= 0 || s.CompareTo(n) >= 0) + { + return false; + } + + BigInteger e = CalculateE(n, message); + BigInteger c = BigIntegers.ModOddInverseVar(n, s); + + BigInteger u1 = e.Multiply(c).Mod(n); + BigInteger u2 = r.Multiply(c).Mod(n); + + ECPoint G = key.Parameters.G; + ECPoint Q = ((ECPublicKeyParameters) key).Q; + + ECPoint point = ECAlgorithms.SumOfTwoMultiplies(G, u1, Q, u2); + + if (point.IsInfinity) + return false; + + /* + * If possible, avoid normalizing the point (to save a modular inversion in the curve field). + * + * There are ~cofactor elements of the curve field that reduce (modulo the group order) to 'r'. + * If the cofactor is known and small, we generate those possible field values and project each + * of them to the same "denominator" (depending on the particular projective coordinates in use) + * as the calculated point.X. If any of the projected values matches point.X, then we have: + * (point.X / Denominator mod p) mod n == r + * as required, and verification succeeds. + * + * Based on an original idea by Gregory Maxwell (https://github.com/gmaxwell), as implemented in + * the libsecp256k1 project (https://github.com/bitcoin/secp256k1). + */ + ECCurve curve = point.Curve; + if (curve != null) + { + BigInteger cofactor = curve.Cofactor; + if (cofactor != null && cofactor.CompareTo(Eight) <= 0) + { + ECFieldElement D = GetDenominator(curve.CoordinateSystem, point); + if (D != null && !D.IsZero) + { + ECFieldElement X = point.XCoord; + while (curve.IsValidFieldElement(r)) + { + ECFieldElement R = curve.FromBigInteger(r).Multiply(D); + if (R.Equals(X)) + { + return true; + } + r = r.Add(n); + } + return false; + } + } + } + + BigInteger v = point.Normalize().AffineXCoord.ToBigInteger().Mod(n); + return v.Equals(r); + } + + protected virtual BigInteger CalculateE(BigInteger n, byte[] message) + { + int messageBitLength = message.Length * 8; + BigInteger trunc = new BigInteger(1, message); + + if (n.BitLength < messageBitLength) + { + trunc = trunc.ShiftRight(messageBitLength - n.BitLength); + } + + return trunc; + } + + protected virtual ECMultiplier CreateBasePointMultiplier() + { + return new FixedPointCombMultiplier(); + } + + protected virtual ECFieldElement GetDenominator(int coordinateSystem, ECPoint p) + { + switch (coordinateSystem) + { + case ECCurve.COORD_HOMOGENEOUS: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + case ECCurve.COORD_SKEWED: + return p.GetZCoord(0); + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_JACOBIAN_CHUDNOVSKY: + case ECCurve.COORD_JACOBIAN_MODIFIED: + return p.GetZCoord(0).Square(); + default: + return null; + } + } + + protected virtual SecureRandom InitSecureRandom(bool needed, SecureRandom provided) + { + return !needed ? null : CryptoServicesRegistrar.GetSecureRandom(provided); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs.meta new file mode 100644 index 00000000..537bcd52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 553f34bfb968d9e458a9810e771b2acf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECDsaSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs new file mode 100644 index 00000000..ee8cbb5a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * GOST R 34.10-2001 Signature Algorithm + */ + public class ECGost3410Signer + : IDsa + { + private ECKeyParameters key; + private SecureRandom random; + private bool forSigning; + + public virtual string AlgorithmName + { + get { return key.AlgorithmName; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + if (parameters is ParametersWithRandom rParam) + { + this.random = rParam.Random; + parameters = rParam.Parameters; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (!(parameters is ECPrivateKeyParameters ecPrivateKeyParameters)) + throw new InvalidKeyException("EC private key required for signing"); + + this.key = ecPrivateKeyParameters; + } + else + { + if (!(parameters is ECPublicKeyParameters ecPublicKeyParameters)) + throw new InvalidKeyException("EC public key required for verification"); + + this.key = ecPublicKeyParameters; + } + } + + public virtual BigInteger Order => key.Parameters.N; + + /** + * generate a signature for the given message using the key we were + * initialised with. For conventional GOST3410 the message should be a GOST3411 + * hash of the message of interest. + * + * @param message the message that will be verified later. + */ + public virtual BigInteger[] GenerateSignature(byte[] message) + { + if (!forSigning) + throw new InvalidOperationException("not initialized for signing"); + + byte[] mRev = Arrays.Reverse(message); // conversion is little-endian + BigInteger e = new BigInteger(1, mRev); + + ECDomainParameters ec = key.Parameters; + BigInteger n = ec.N; + BigInteger d = ((ECPrivateKeyParameters)key).D; + + BigInteger r, s; + + ECMultiplier basePointMultiplier = CreateBasePointMultiplier(); + + do // generate s + { + BigInteger k; + do // generate r + { + do + { + k = BigIntegers.CreateRandomBigInteger(n.BitLength, random); + } + while (k.SignValue == 0); + + ECPoint p = basePointMultiplier.Multiply(ec.G, k).Normalize(); + + r = p.AffineXCoord.ToBigInteger().Mod(n); + } + while (r.SignValue == 0); + + s = k.Multiply(e).Add(d.Multiply(r)).Mod(n); + } + while (s.SignValue == 0); + + return new BigInteger[]{ r, s }; + } + + /** + * return true if the value r and s represent a GOST3410 signature for + * the passed in message (for standard GOST3410 the message should be + * a GOST3411 hash of the real message to be verified). + */ + public virtual bool VerifySignature(byte[] message, BigInteger r, BigInteger s) + { + if (forSigning) + throw new InvalidOperationException("not initialized for verification"); + + byte[] mRev = Arrays.Reverse(message); // conversion is little-endian + BigInteger e = new BigInteger(1, mRev); + BigInteger n = key.Parameters.N; + + // r in the range [1,n-1] + if (r.CompareTo(BigInteger.One) < 0 || r.CompareTo(n) >= 0) + return false; + + // s in the range [1,n-1] + if (s.CompareTo(BigInteger.One) < 0 || s.CompareTo(n) >= 0) + return false; + + BigInteger v = BigIntegers.ModOddInverseVar(n, e); + + BigInteger z1 = s.Multiply(v).Mod(n); + BigInteger z2 = n.Subtract(r).Multiply(v).Mod(n); + + ECPoint G = key.Parameters.G; // P + ECPoint Q = ((ECPublicKeyParameters)key).Q; + + ECPoint point = ECAlgorithms.SumOfTwoMultiplies(G, z1, Q, z2).Normalize(); + + if (point.IsInfinity) + return false; + + BigInteger R = point.AffineXCoord.ToBigInteger().Mod(n); + + return R.Equals(r); + } + + protected virtual ECMultiplier CreateBasePointMultiplier() + { + return new FixedPointCombMultiplier(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs.meta new file mode 100644 index 00000000..b2fe5581 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4a99f6c7425d04f43abde96df9a1c8e0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECGOST3410Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs new file mode 100644 index 00000000..108846b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs @@ -0,0 +1,193 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * EC-NR as described in IEEE 1363-2000 + */ + public class ECNRSigner + : IDsa + { + private bool forSigning; + private ECKeyParameters key; + private SecureRandom random; + + public virtual string AlgorithmName + { + get { return "ECNR"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + if (parameters is ParametersWithRandom rParam) + { + this.random = rParam.Random; + parameters = rParam.Parameters; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (!(parameters is ECPrivateKeyParameters)) + throw new InvalidKeyException("EC private key required for signing"); + + this.key = (ECPrivateKeyParameters) parameters; + } + else + { + if (!(parameters is ECPublicKeyParameters)) + throw new InvalidKeyException("EC public key required for verification"); + + this.key = (ECPublicKeyParameters) parameters; + } + } + + public virtual BigInteger Order + { + get { return key.Parameters.N; } + } + + // Section 7.2.5 ECSP-NR, pg 34 + /** + * generate a signature for the given message using the key we were + * initialised with. Generally, the order of the curve should be at + * least as long as the hash of the message of interest, and with + * ECNR it *must* be at least as long. + * + * @param digest the digest to be signed. + * @exception DataLengthException if the digest is longer than the key allows + */ + public virtual BigInteger[] GenerateSignature( + byte[] message) + { + if (!this.forSigning) + { + // not properly initilaized... deal with it + throw new InvalidOperationException("not initialised for signing"); + } + + BigInteger n = Order; + int nBitLength = n.BitLength; + + BigInteger e = new BigInteger(1, message); + int eBitLength = e.BitLength; + + ECPrivateKeyParameters privKey = (ECPrivateKeyParameters)key; + + if (eBitLength > nBitLength) + { + throw new DataLengthException("input too large for ECNR key."); + } + + BigInteger r = null; + BigInteger s = null; + + AsymmetricCipherKeyPair tempPair; + do // generate r + { + // generate another, but very temporary, key pair using + // the same EC parameters + ECKeyPairGenerator keyGen = new ECKeyPairGenerator(); + + keyGen.Init(new ECKeyGenerationParameters(privKey.Parameters, this.random)); + + tempPair = keyGen.GenerateKeyPair(); + + // BigInteger Vx = tempPair.getPublic().getW().getAffineX(); + ECPublicKeyParameters V = (ECPublicKeyParameters) tempPair.Public; // get temp's public key + BigInteger Vx = V.Q.AffineXCoord.ToBigInteger(); // get the point's x coordinate + + r = Vx.Add(e).Mod(n); + } + while (r.SignValue == 0); + + // generate s + BigInteger x = privKey.D; // private key value + BigInteger u = ((ECPrivateKeyParameters) tempPair.Private).D; // temp's private key value + s = u.Subtract(r.Multiply(x)).Mod(n); + + return new BigInteger[]{ r, s }; + } + + // Section 7.2.6 ECVP-NR, pg 35 + /** + * return true if the value r and s represent a signature for the + * message passed in. Generally, the order of the curve should be at + * least as long as the hash of the message of interest, and with + * ECNR, it *must* be at least as long. But just in case the signer + * applied mod(n) to the longer digest, this implementation will + * apply mod(n) during verification. + * + * @param digest the digest to be verified. + * @param r the r value of the signature. + * @param s the s value of the signature. + * @exception DataLengthException if the digest is longer than the key allows + */ + public virtual bool VerifySignature( + byte[] message, + BigInteger r, + BigInteger s) + { + if (this.forSigning) + { + // not properly initilaized... deal with it + throw new InvalidOperationException("not initialised for verifying"); + } + + ECPublicKeyParameters pubKey = (ECPublicKeyParameters)key; + BigInteger n = pubKey.Parameters.N; + int nBitLength = n.BitLength; + + BigInteger e = new BigInteger(1, message); + int eBitLength = e.BitLength; + + if (eBitLength > nBitLength) + { + throw new DataLengthException("input too large for ECNR key."); + } + + // r in the range [1,n-1] + if (r.CompareTo(BigInteger.One) < 0 || r.CompareTo(n) >= 0) + { + return false; + } + + // s in the range [0,n-1] NB: ECNR spec says 0 + if (s.CompareTo(BigInteger.Zero) < 0 || s.CompareTo(n) >= 0) + { + return false; + } + + // compute P = sG + rW + + ECPoint G = pubKey.Parameters.G; + ECPoint W = pubKey.Q; + // calculate P using Bouncy math + ECPoint P = ECAlgorithms.SumOfTwoMultiplies(G, s, W, r).Normalize(); + + if (P.IsInfinity) + return false; + + BigInteger x = P.AffineXCoord.ToBigInteger(); + BigInteger t = r.Subtract(x).Mod(n); + + return t.Equals(e); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs.meta new file mode 100644 index 00000000..2958acaf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a94d3c3fe5827ec489261fe5d6504965 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/ECNRSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs new file mode 100644 index 00000000..5c8b089d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Ed25519Signer + : ISigner + { + private readonly Buffer buffer = new Buffer(); + + private bool forSigning; + private Ed25519PrivateKeyParameters privateKey; + private Ed25519PublicKeyParameters publicKey; + + public Ed25519Signer() + { + } + + public virtual string AlgorithmName + { + get { return "Ed25519"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + this.privateKey = (Ed25519PrivateKeyParameters)parameters; + this.publicKey = null; + } + else + { + this.privateKey = null; + this.publicKey = (Ed25519PublicKeyParameters)parameters; + } + + Reset(); + } + + public virtual void Update(byte b) + { + buffer.WriteByte(b); + } + + public virtual void BlockUpdate(byte[] buf, int off, int len) + { + buffer.Write(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + buffer.Write(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning || null == privateKey) + throw new InvalidOperationException("Ed25519Signer not initialised for signature generation."); + + return buffer.GenerateSignature(privateKey); + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning || null == publicKey) + throw new InvalidOperationException("Ed25519Signer not initialised for verification"); + + return buffer.VerifySignature(publicKey, signature); + } + + public virtual void Reset() + { + buffer.Reset(); + } + + private class Buffer : MemoryStream + { + internal byte[] GenerateSignature(Ed25519PrivateKeyParameters privateKey) + { + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] signature = new byte[Ed25519PrivateKeyParameters.SignatureSize]; + privateKey.Sign(Ed25519.Algorithm.Ed25519, null, buf, 0, count, signature, 0); + Reset(); + return signature; + } + } + + internal bool VerifySignature(Ed25519PublicKeyParameters publicKey, byte[] signature) + { + if (Ed25519.SignatureSize != signature.Length) + { + Reset(); + return false; + } + + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] pk = publicKey.GetEncoded(); + bool result = Ed25519.Verify(signature, 0, pk, 0, buf, 0, count); + Reset(); + return result; + } + } + + internal void Reset() + { + lock (this) + { + int count = Convert.ToInt32(Length); + Array.Clear(GetBuffer(), 0, count); + SetLength(0); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs.meta new file mode 100644 index 00000000..a0c0ea3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0935cb761421a742a943902beecf5bd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs new file mode 100644 index 00000000..8aec0a54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs @@ -0,0 +1,137 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Ed25519ctxSigner + : ISigner + { + private readonly Buffer buffer = new Buffer(); + private readonly byte[] context; + + private bool forSigning; + private Ed25519PrivateKeyParameters privateKey; + private Ed25519PublicKeyParameters publicKey; + + public Ed25519ctxSigner(byte[] context) + { + this.context = Arrays.Clone(context); + } + + public virtual string AlgorithmName + { + get { return "Ed25519ctx"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + this.privateKey = (Ed25519PrivateKeyParameters)parameters; + this.publicKey = null; + } + else + { + this.privateKey = null; + this.publicKey = (Ed25519PublicKeyParameters)parameters; + } + + Reset(); + } + + public virtual void Update(byte b) + { + buffer.WriteByte(b); + } + + public virtual void BlockUpdate(byte[] buf, int off, int len) + { + buffer.Write(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + buffer.Write(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning || null == privateKey) + throw new InvalidOperationException("Ed25519ctxSigner not initialised for signature generation."); + + return buffer.GenerateSignature(privateKey, context); + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning || null == publicKey) + throw new InvalidOperationException("Ed25519ctxSigner not initialised for verification"); + + return buffer.VerifySignature(publicKey, context, signature); + } + + public virtual void Reset() + { + buffer.Reset(); + } + + private class Buffer : MemoryStream + { + internal byte[] GenerateSignature(Ed25519PrivateKeyParameters privateKey, byte[] ctx) + { + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] signature = new byte[Ed25519PrivateKeyParameters.SignatureSize]; + privateKey.Sign(Ed25519.Algorithm.Ed25519ctx, ctx, buf, 0, count, signature, 0); + Reset(); + return signature; + } + } + + internal bool VerifySignature(Ed25519PublicKeyParameters publicKey, byte[] ctx, byte[] signature) + { + if (Ed25519.SignatureSize != signature.Length) + { + Reset(); + return false; + } + + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] pk = publicKey.GetEncoded(); + bool result = Ed25519.Verify(signature, 0, pk, 0, ctx, buf, 0, count); + Reset(); + return result; + } + } + + internal void Reset() + { + lock (this) + { + int count = Convert.ToInt32(Length); + Array.Clear(GetBuffer(), 0, count); + SetLength(0); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs.meta new file mode 100644 index 00000000..425c12e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a4a91712f2dcf604a9fa460bf6159551 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519ctxSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs new file mode 100644 index 00000000..6bb52e49 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs @@ -0,0 +1,102 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Ed25519phSigner + : ISigner + { + private readonly IDigest prehash = Ed25519.CreatePrehash(); + private readonly byte[] context; + + private bool forSigning; + private Ed25519PrivateKeyParameters privateKey; + private Ed25519PublicKeyParameters publicKey; + + public Ed25519phSigner(byte[] context) + { + this.context = Arrays.Clone(context); + } + + public virtual string AlgorithmName + { + get { return "Ed25519ph"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + this.privateKey = (Ed25519PrivateKeyParameters)parameters; + this.publicKey = null; + } + else + { + this.privateKey = null; + this.publicKey = (Ed25519PublicKeyParameters)parameters; + } + + Reset(); + } + + public virtual void Update(byte b) + { + prehash.Update(b); + } + + public virtual void BlockUpdate(byte[] buf, int off, int len) + { + prehash.BlockUpdate(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + prehash.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning || null == privateKey) + throw new InvalidOperationException("Ed25519phSigner not initialised for signature generation."); + + byte[] msg = new byte[Ed25519.PrehashSize]; + if (Ed25519.PrehashSize != prehash.DoFinal(msg, 0)) + throw new InvalidOperationException("Prehash digest failed"); + + byte[] signature = new byte[Ed25519PrivateKeyParameters.SignatureSize]; + privateKey.Sign(Ed25519.Algorithm.Ed25519ph, context, msg, 0, Ed25519.PrehashSize, signature, 0); + return signature; + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning || null == publicKey) + throw new InvalidOperationException("Ed25519phSigner not initialised for verification"); + if (Ed25519.SignatureSize != signature.Length) + { + prehash.Reset(); + return false; + } + + byte[] pk = publicKey.GetEncoded(); + return Ed25519.VerifyPrehash(signature, 0, pk, 0, context, prehash); + } + + public void Reset() + { + prehash.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs.meta new file mode 100644 index 00000000..d8ae9381 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1afa3f95612dbd94e819615aa0720877 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed25519phSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs new file mode 100644 index 00000000..78d62237 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs @@ -0,0 +1,137 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Ed448Signer + : ISigner + { + private readonly Buffer buffer = new Buffer(); + private readonly byte[] context; + + private bool forSigning; + private Ed448PrivateKeyParameters privateKey; + private Ed448PublicKeyParameters publicKey; + + public Ed448Signer(byte[] context) + { + this.context = Arrays.Clone(context); + } + + public virtual string AlgorithmName + { + get { return "Ed448"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + this.privateKey = (Ed448PrivateKeyParameters)parameters; + this.publicKey = null; + } + else + { + this.privateKey = null; + this.publicKey = (Ed448PublicKeyParameters)parameters; + } + + Reset(); + } + + public virtual void Update(byte b) + { + buffer.WriteByte(b); + } + + public virtual void BlockUpdate(byte[] buf, int off, int len) + { + buffer.Write(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + buffer.Write(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning || null == privateKey) + throw new InvalidOperationException("Ed448Signer not initialised for signature generation."); + + return buffer.GenerateSignature(privateKey, context); + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning || null == publicKey) + throw new InvalidOperationException("Ed448Signer not initialised for verification"); + + return buffer.VerifySignature(publicKey, context, signature); + } + + public virtual void Reset() + { + buffer.Reset(); + } + + private class Buffer : MemoryStream + { + internal byte[] GenerateSignature(Ed448PrivateKeyParameters privateKey, byte[] ctx) + { + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] signature = new byte[Ed448PrivateKeyParameters.SignatureSize]; + privateKey.Sign(Ed448.Algorithm.Ed448, ctx, buf, 0, count, signature, 0); + Reset(); + return signature; + } + } + + internal bool VerifySignature(Ed448PublicKeyParameters publicKey, byte[] ctx, byte[] signature) + { + if (Ed448.SignatureSize != signature.Length) + { + Reset(); + return false; + } + + lock (this) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + byte[] pk = publicKey.GetEncoded(); + bool result = Ed448.Verify(signature, 0, pk, 0, ctx, buf, 0, count); + Reset(); + return result; + } + } + + internal void Reset() + { + lock (this) + { + int count = Convert.ToInt32(Length); + Array.Clear(GetBuffer(), 0, count); + SetLength(0); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs.meta new file mode 100644 index 00000000..b3666be4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9b8bb0258b551114893b817b5671ebed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs new file mode 100644 index 00000000..19efc3c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs @@ -0,0 +1,102 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Ed448phSigner + : ISigner + { + private readonly IXof prehash = Ed448.CreatePrehash(); + private readonly byte[] context; + + private bool forSigning; + private Ed448PrivateKeyParameters privateKey; + private Ed448PublicKeyParameters publicKey; + + public Ed448phSigner(byte[] context) + { + this.context = Arrays.Clone(context); + } + + public virtual string AlgorithmName + { + get { return "Ed448ph"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + if (forSigning) + { + this.privateKey = (Ed448PrivateKeyParameters)parameters; + this.publicKey = null; + } + else + { + this.privateKey = null; + this.publicKey = (Ed448PublicKeyParameters)parameters; + } + + Reset(); + } + + public virtual void Update(byte b) + { + prehash.Update(b); + } + + public virtual void BlockUpdate(byte[] buf, int off, int len) + { + prehash.BlockUpdate(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + prehash.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning || null == privateKey) + throw new InvalidOperationException("Ed448phSigner not initialised for signature generation."); + + byte[] msg = new byte[Ed448.PrehashSize]; + if (Ed448.PrehashSize != prehash.OutputFinal(msg, 0, Ed448.PrehashSize)) + throw new InvalidOperationException("Prehash digest failed"); + + byte[] signature = new byte[Ed448PrivateKeyParameters.SignatureSize]; + privateKey.Sign(Ed448.Algorithm.Ed448ph, context, msg, 0, Ed448.PrehashSize, signature, 0); + return signature; + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning || null == publicKey) + throw new InvalidOperationException("Ed448phSigner not initialised for verification"); + if (Ed448.SignatureSize != signature.Length) + { + prehash.Reset(); + return false; + } + + byte[] pk = publicKey.GetEncoded(); + return Ed448.VerifyPrehash(signature, 0, pk, 0, context, prehash); + } + + public void Reset() + { + prehash.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs.meta new file mode 100644 index 00000000..d9c5e25d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 12fe22a83e9cad34ab8654655b71a93b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Ed448phSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs new file mode 100644 index 00000000..4e699659 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs @@ -0,0 +1,137 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class Gost3410DigestSigner + : ISigner + { + private readonly IDigest digest; + private readonly IDsa dsaSigner; + private readonly int size; + private int halfSize; + private bool forSigning; + + public Gost3410DigestSigner(IDsa signer, IDigest digest) + { + this.dsaSigner = signer; + this.digest = digest; + + halfSize = digest.GetDigestSize(); + this.size = halfSize * 2; + + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "with" + dsaSigner.AlgorithmName; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + AsymmetricKeyParameter k; + if (parameters is ParametersWithRandom) + { + k = (AsymmetricKeyParameter)((ParametersWithRandom)parameters).Parameters; + } + else + { + k = (AsymmetricKeyParameter)parameters; + } + + if (forSigning && !k.IsPrivate) + { + throw new InvalidKeyException("Signing Requires Private Key."); + } + + if (!forSigning && k.IsPrivate) + { + throw new InvalidKeyException("Verification Requires Public Key."); + } + + + Reset(); + + dsaSigner.Init(forSigning, parameters); + } + + public virtual void Update(byte input) + { + digest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning) + throw new InvalidOperationException("GOST3410DigestSigner not initialised for signature generation."); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + try + { + BigInteger[] sig = dsaSigner.GenerateSignature(hash); + byte[] sigBytes = new byte[size]; + + // TODO Add methods to allow writing BigInteger to existing byte array? + byte[] r = sig[0].ToByteArrayUnsigned(); + byte[] s = sig[1].ToByteArrayUnsigned(); + s.CopyTo(sigBytes, halfSize - s.Length); + r.CopyTo(sigBytes, size - r.Length); + return sigBytes; + } + catch (Exception e) + { + throw new SignatureException(e.Message, e); + } + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning) + throw new InvalidOperationException("DSADigestSigner not initialised for verification"); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + BigInteger R, S; + try + { + R = new BigInteger(1, signature, halfSize, halfSize); + S = new BigInteger(1, signature, 0, halfSize); + } + catch (Exception e) + { + throw new SignatureException("error decoding signature bytes.", e); + } + + return dsaSigner.VerifySignature(hash, R, S); + } + + public virtual void Reset() + { + digest.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs.meta new file mode 100644 index 00000000..e1a4f641 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ce97acf4153cf643b9786312fcdd2d3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410DigestSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs new file mode 100644 index 00000000..663cf886 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * Gost R 34.10-94 Signature Algorithm + */ + public class Gost3410Signer + : IDsa + { + private Gost3410KeyParameters key; + private SecureRandom random; + + public virtual string AlgorithmName + { + get { return "GOST3410"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + if (forSigning) + { + if (parameters is ParametersWithRandom rParam) + { + this.random = rParam.Random; + parameters = rParam.Parameters; + } + else + { + this.random = CryptoServicesRegistrar.GetSecureRandom(); + } + + if (!(parameters is Gost3410PrivateKeyParameters)) + throw new InvalidKeyException("GOST3410 private key required for signing"); + + this.key = (Gost3410PrivateKeyParameters) parameters; + } + else + { + if (!(parameters is Gost3410PublicKeyParameters)) + throw new InvalidKeyException("GOST3410 public key required for signing"); + + this.key = (Gost3410PublicKeyParameters) parameters; + } + } + + public virtual BigInteger Order + { + get { return key.Parameters.Q; } + } + + /** + * generate a signature for the given message using the key we were + * initialised with. For conventional Gost3410 the message should be a Gost3411 + * hash of the message of interest. + * + * @param message the message that will be verified later. + */ + public virtual BigInteger[] GenerateSignature( + byte[] message) + { + byte[] mRev = Arrays.Reverse(message); // conversion is little-endian + BigInteger m = new BigInteger(1, mRev); + Gost3410Parameters parameters = key.Parameters; + BigInteger k; + + do + { + k = new BigInteger(parameters.Q.BitLength, random); + } + while (k.CompareTo(parameters.Q) >= 0); + + BigInteger r = parameters.A.ModPow(k, parameters.P).Mod(parameters.Q); + + BigInteger s = k.Multiply(m). + Add(((Gost3410PrivateKeyParameters)key).X.Multiply(r)). + Mod(parameters.Q); + + return new BigInteger[]{ r, s }; + } + + /** + * return true if the value r and s represent a Gost3410 signature for + * the passed in message for standard Gost3410 the message should be a + * Gost3411 hash of the real message to be verified. + */ + public virtual bool VerifySignature( + byte[] message, + BigInteger r, + BigInteger s) + { + byte[] mRev = Arrays.Reverse(message); // conversion is little-endian + BigInteger m = new BigInteger(1, mRev); + Gost3410Parameters parameters = key.Parameters; + + if (r.SignValue < 0 || parameters.Q.CompareTo(r) <= 0) + { + return false; + } + + if (s.SignValue < 0 || parameters.Q.CompareTo(s) <= 0) + { + return false; + } + + BigInteger v = m.ModPow(parameters.Q.Subtract(BigInteger.Two), parameters.Q); + + BigInteger z1 = s.Multiply(v).Mod(parameters.Q); + BigInteger z2 = (parameters.Q.Subtract(r)).Multiply(v).Mod(parameters.Q); + + z1 = parameters.A.ModPow(z1, parameters.P); + z2 = ((Gost3410PublicKeyParameters)key).Y.ModPow(z2, parameters.P); + + BigInteger u = z1.Multiply(z2).Mod(parameters.P).Mod(parameters.Q); + + return u.Equals(r); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs.meta new file mode 100644 index 00000000..f7f479c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fe6a597729247cd4a9ff4c882f553f79 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GOST3410Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs new file mode 100644 index 00000000..45dad03b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs @@ -0,0 +1,127 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class GenericSigner + : ISigner + { + private readonly IAsymmetricBlockCipher engine; + private readonly IDigest digest; + private bool forSigning; + + public GenericSigner( + IAsymmetricBlockCipher engine, + IDigest digest) + { + this.engine = engine; + this.digest = digest; + } + + public virtual string AlgorithmName + { + get { return "Generic(" + engine.AlgorithmName + "/" + digest.AlgorithmName + ")"; } + } + + /** + * initialise the signer for signing or verification. + * + * @param forSigning + * true if for signing, false otherwise + * @param parameters + * necessary parameters. + */ + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + this.forSigning = forSigning; + + AsymmetricKeyParameter k; + if (parameters is ParametersWithRandom) + { + k = (AsymmetricKeyParameter)((ParametersWithRandom)parameters).Parameters; + } + else + { + k = (AsymmetricKeyParameter)parameters; + } + + if (forSigning && !k.IsPrivate) + throw new InvalidKeyException("Signing requires private key."); + + if (!forSigning && k.IsPrivate) + throw new InvalidKeyException("Verification requires public key."); + + Reset(); + + engine.Init(forSigning, parameters); + } + + public virtual void Update(byte input) + { + digest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning) + throw new InvalidOperationException("GenericSigner not initialised for signature generation."); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + return engine.ProcessBlock(hash, 0, hash.Length); + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning) + throw new InvalidOperationException("GenericSigner not initialised for verification"); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + try + { + byte[] sig = engine.ProcessBlock(signature, 0, signature.Length); + + // Extend with leading zeroes to match the digest size, if necessary. + if (sig.Length < hash.Length) + { + byte[] tmp = new byte[hash.Length]; + Array.Copy(sig, 0, tmp, tmp.Length - sig.Length, sig.Length); + sig = tmp; + } + + return Arrays.ConstantTimeAreEqual(sig, hash); + } + catch (Exception) + { + return false; + } + } + + public virtual void Reset() + { + digest.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs.meta new file mode 100644 index 00000000..a794457b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41a534d5ac923ca41994ba43c95d82aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/GenericSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs new file mode 100644 index 00000000..39434e06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs @@ -0,0 +1,169 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * A deterministic K calculator based on the algorithm in section 3.2 of RFC 6979. + */ + public class HMacDsaKCalculator + : IDsaKCalculator + { + private readonly HMac hMac; + private readonly byte[] K; + private readonly byte[] V; + + private BigInteger n; + + /** + * Base constructor. + * + * @param digest digest to build the HMAC on. + */ + public HMacDsaKCalculator(IDigest digest) + { + this.hMac = new HMac(digest); + this.V = new byte[hMac.GetMacSize()]; + this.K = new byte[hMac.GetMacSize()]; + } + + public virtual bool IsDeterministic + { + get { return true; } + } + + public virtual void Init(BigInteger n, SecureRandom random) + { + throw new InvalidOperationException("Operation not supported"); + } + + public void Init(BigInteger n, BigInteger d, byte[] message) + { + this.n = n; + + Arrays.Fill(V, 0x01); + Arrays.Fill(K, 0); + + BigInteger mInt = BitsToInt(message); + if (mInt.CompareTo(n) >= 0) + { + mInt = mInt.Subtract(n); + } + + int size = BigIntegers.GetUnsignedByteLength(n); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int xmSize = size * 2; + Span xm = xmSize <= 512 + ? stackalloc byte[xmSize] + : new byte[xmSize]; + BigIntegers.AsUnsignedByteArray(d, xm[..size]); + BigIntegers.AsUnsignedByteArray(mInt, xm[size..]); +#else + byte[] x = BigIntegers.AsUnsignedByteArray(size, d); + byte[] m = BigIntegers.AsUnsignedByteArray(size, mInt); +#endif + + hMac.Init(new KeyParameter(K)); + + hMac.BlockUpdate(V, 0, V.Length); + hMac.Update(0x00); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + hMac.BlockUpdate(xm); +#else + hMac.BlockUpdate(x, 0, x.Length); + hMac.BlockUpdate(m, 0, m.Length); +#endif + InitAdditionalInput0(hMac); + hMac.DoFinal(K, 0); + + hMac.Init(new KeyParameter(K)); + hMac.BlockUpdate(V, 0, V.Length); + hMac.DoFinal(V, 0); + + hMac.BlockUpdate(V, 0, V.Length); + hMac.Update(0x01); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + hMac.BlockUpdate(xm); +#else + hMac.BlockUpdate(x, 0, x.Length); + hMac.BlockUpdate(m, 0, m.Length); +#endif + hMac.DoFinal(K, 0); + + hMac.Init(new KeyParameter(K)); + hMac.BlockUpdate(V, 0, V.Length); + hMac.DoFinal(V, 0); + } + + public virtual BigInteger NextK() + { + byte[] t = new byte[BigIntegers.GetUnsignedByteLength(n)]; + + for (;;) + { + int tOff = 0; + + while (tOff < t.Length) + { + hMac.BlockUpdate(V, 0, V.Length); + hMac.DoFinal(V, 0); + + int len = System.Math.Min(t.Length - tOff, V.Length); + Array.Copy(V, 0, t, tOff, len); + tOff += len; + } + + BigInteger k = BitsToInt(t); + + if (k.SignValue > 0 && k.CompareTo(n) < 0) + return k; + + hMac.BlockUpdate(V, 0, V.Length); + hMac.Update(0x00); + hMac.DoFinal(K, 0); + + hMac.Init(new KeyParameter(K)); + hMac.BlockUpdate(V, 0, V.Length); + hMac.DoFinal(V, 0); + } + } + + /// Supports use of additional input. + /// + /// RFC 6979 3.6. Additional data may be added to the input of HMAC [..]. A use case may be a protocol that + /// requires a non-deterministic signature algorithm on a system that does not have access to a high-quality + /// random source. It suffices that the additional data[..] is non-repeating(e.g., a signature counter or a + /// monotonic clock) to ensure "random-looking" signatures are indistinguishable, in a cryptographic way, from + /// plain (EC)DSA signatures. + /// + /// By default there is no additional input. Override this method to supply additional input, bearing in mind + /// that this calculator may be used for many signatures. + /// + /// The to which the additional input should be added. + protected virtual void InitAdditionalInput0(HMac hmac0) + { + } + + private BigInteger BitsToInt(byte[] t) + { + BigInteger v = new BigInteger(1, t); + + if (t.Length * 8 > n.BitLength) + { + v = v.ShiftRight(t.Length * 8 - n.BitLength); + } + + return v; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs.meta new file mode 100644 index 00000000..1953763d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 969291a7bd4e5d245b4e357074ec29c6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/HMacDsaKCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs new file mode 100644 index 00000000..57873f6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /// + /// An interface for different encoding formats for DSA signatures. + /// + public interface IDsaEncoding + { + /// Decode the (r, s) pair of a DSA signature. + /// The order of the group that r, s belong to. + /// An encoding of the (r, s) pair of a DSA signature. + /// The (r, s) of a DSA signature, stored in an array of exactly two elements, r followed by s. + BigInteger[] Decode(BigInteger n, byte[] encoding); + + /// Encode the (r, s) pair of a DSA signature. + /// The order of the group that r, s belong to. + /// The r value of a DSA signature. + /// The s value of a DSA signature. + /// An encoding of the DSA signature given by the provided (r, s) pair. + byte[] Encode(BigInteger n, BigInteger r, BigInteger s); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs.meta new file mode 100644 index 00000000..8900397b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 16af24b9a2f88be4c8db714458e9b414 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs new file mode 100644 index 00000000..5271d3a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * Interface define calculators of K values for DSA/ECDSA. + */ + public interface IDsaKCalculator + { + /** + * Return true if this calculator is deterministic, false otherwise. + * + * @return true if deterministic, otherwise false. + */ + bool IsDeterministic { get; } + + /** + * Non-deterministic initialiser. + * + * @param n the order of the DSA group. + * @param random a source of randomness. + */ + void Init(BigInteger n, SecureRandom random); + + /** + * Deterministic initialiser. + * + * @param n the order of the DSA group. + * @param d the DSA private value. + * @param message the message being signed. + */ + void Init(BigInteger n, BigInteger d, byte[] message); + + /** + * Return the next valid value of K. + * + * @return a K value. + */ + BigInteger NextK(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs.meta new file mode 100644 index 00000000..7bc70c72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8e5243a39b34b0c4baecc8dd9f340769 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IDsaKCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs new file mode 100644 index 00000000..010d14a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs @@ -0,0 +1,617 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /// ISO9796-2 - mechanism using a hash function with recovery (scheme 2 and 3). + ///

+ /// Note: the usual length for the salt is the length of the hash + /// function used in bytes.

+ ///
+ public class Iso9796d2PssSigner + : ISignerWithRecovery + { + /// + /// Return a reference to the recoveredMessage message. + /// + /// The full/partial recoveredMessage message. + /// + public byte[] GetRecoveredMessage() + { + return recoveredMessage; + } + + private IDigest digest; + private IAsymmetricBlockCipher cipher; + + private SecureRandom random; + private byte[] standardSalt; + + private int hLen; + private int trailer; + private int keyBits; + private byte[] block; + private byte[] mBuf; + private int messageLength; + private readonly int saltLength; + private bool fullMessage; + private byte[] recoveredMessage; + + private byte[] preSig; + private byte[] preBlock; + private int preMStart; + private int preTLength; + + /// + /// Generate a signer with either implicit or explicit trailers for ISO9796-2, scheme 2 or 3. + /// + /// base cipher to use for signature creation/verification + /// digest to use. + /// length of salt in bytes. + /// whether or not the trailer is implicit or gives the hash. + public Iso9796d2PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest, + int saltLength, + bool isImplicit) + { + this.cipher = cipher; + this.digest = digest; + this.hLen = digest.GetDigestSize(); + this.saltLength = saltLength; + + if (isImplicit) + { + trailer = IsoTrailers.TRAILER_IMPLICIT; + } + else if (IsoTrailers.NoTrailerAvailable(digest)) + { + throw new ArgumentException("no valid trailer", "digest"); + } + else + { + trailer = IsoTrailers.GetTrailer(digest); + } + } + + /// Constructor for a signer with an explicit digest trailer. + /// + /// + /// cipher to use. + /// + /// digest to sign with. + /// + /// length of salt in bytes. + /// + public Iso9796d2PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest, + int saltLength) + : this(cipher, digest, saltLength, false) + { + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "with" + "ISO9796-2S2"; } + } + + /// Initialise the signer. + /// true if for signing, false if for verification. + /// parameters for signature generation/verification. If the + /// parameters are for generation they should be a ParametersWithRandom, + /// a ParametersWithSalt, or just an RsaKeyParameters object. If RsaKeyParameters + /// are passed in a SecureRandom will be created. + /// + /// if wrong parameter type or a fixed + /// salt is passed in which is the wrong length. + /// + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + RsaKeyParameters kParam; + if (parameters is ParametersWithRandom withRandom) + { + kParam = (RsaKeyParameters)withRandom.Parameters; + + if (forSigning) + { + random = withRandom.Random; + } + } + else if (parameters is ParametersWithSalt withSalt) + { + if (!forSigning) + throw new ArgumentException("ParametersWithSalt only valid for signing", nameof(parameters)); + + kParam = (RsaKeyParameters)withSalt.Parameters; + standardSalt = withSalt.GetSalt(); + + if (standardSalt.Length != saltLength) + throw new ArgumentException("Fixed salt is of wrong length"); + } + else + { + kParam = (RsaKeyParameters)parameters; + + if (forSigning) + { + random = CryptoServicesRegistrar.GetSecureRandom(); + } + } + + cipher.Init(forSigning, kParam); + + keyBits = kParam.Modulus.BitLength; + + block = new byte[(keyBits + 7) / 8]; + + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + mBuf = new byte[block.Length - digest.GetDigestSize() - saltLength - 1 - 1]; + } + else + { + mBuf = new byte[block.Length - digest.GetDigestSize() - saltLength - 1 - 2]; + } + + Reset(); + } + + /// compare two byte arrays - constant time. + private bool IsSameAs(byte[] a, byte[] b) + { + if (messageLength != b.Length) + { + return false; + } + + bool isOkay = true; + + for (int i = 0; i != b.Length; i++) + { + if (a[i] != b[i]) + { + isOkay = false; + } + } + + return isOkay; + } + + /// clear possible sensitive data + private void ClearBlock( + byte[] block) + { + Array.Clear(block, 0, block.Length); + } + + public virtual void UpdateWithRecoveredMessage( + byte[] signature) + { + byte[] block = cipher.ProcessBlock(signature, 0, signature.Length); + + // + // adjust block size for leading zeroes if necessary + // + if (block.Length < (keyBits + 7) / 8) + { + byte[] tmp = new byte[(keyBits + 7) / 8]; + + Array.Copy(block, 0, tmp, tmp.Length - block.Length, block.Length); + ClearBlock(block); + block = tmp; + } + + int tLength; + + if (((block[block.Length - 1] & 0xFF) ^ 0xBC) == 0) + { + tLength = 1; + } + else + { + int sigTrail = ((block[block.Length - 2] & 0xFF) << 8) | (block[block.Length - 1] & 0xFF); + + if (IsoTrailers.NoTrailerAvailable(digest)) + throw new ArgumentException("unrecognised hash in signature"); + + if (sigTrail != IsoTrailers.GetTrailer(digest)) + throw new InvalidOperationException("signer initialised with wrong digest for trailer " + sigTrail); + + tLength = 2; + } + + // + // calculate H(m2) + // + byte[] m2Hash = new byte[hLen]; + digest.DoFinal(m2Hash, 0); + + // + // remove the mask + // + byte[] dbMask = MaskGeneratorFunction1(block, block.Length - hLen - tLength, hLen, block.Length - hLen - tLength); + for (int i = 0; i != dbMask.Length; i++) + { + block[i] ^= dbMask[i]; + } + + block[0] &= 0x7f; + + // + // find out how much padding we've got + // + int mStart = 0; + + while (mStart < block.Length) + { + if (block[mStart++] == 0x01) + break; + } + + if (mStart >= block.Length) + { + ClearBlock(block); + } + + fullMessage = (mStart > 1); + + recoveredMessage = new byte[dbMask.Length - mStart - saltLength]; + + Array.Copy(block, mStart, recoveredMessage, 0, recoveredMessage.Length); + recoveredMessage.CopyTo(mBuf, 0); + + preSig = signature; + preBlock = block; + preMStart = mStart; + preTLength = tLength; + } + + /// update the internal digest with the byte b + public virtual void Update( + byte input) + { + if (preSig == null && messageLength < mBuf.Length) + { + mBuf[messageLength++] = input; + } + else + { + digest.Update(input); + } + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, inLen)); +#else + if (preSig == null) + { + while (inLen > 0 && messageLength < mBuf.Length) + { + this.Update(input[inOff]); + inOff++; + inLen--; + } + } + + if (inLen > 0) + { + digest.BlockUpdate(input, inOff, inLen); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + if (preSig == null) + { + while (!input.IsEmpty && messageLength < mBuf.Length) + { + this.Update(input[0]); + input = input[1..]; + } + } + + if (!input.IsEmpty) + { + digest.BlockUpdate(input); + } + } +#endif + + /// reset the internal state + public virtual void Reset() + { + digest.Reset(); + messageLength = 0; + if (mBuf != null) + { + ClearBlock(mBuf); + } + if (recoveredMessage != null) + { + ClearBlock(recoveredMessage); + recoveredMessage = null; + } + fullMessage = false; + if (preSig != null) + { + preSig = null; + ClearBlock(preBlock); + preBlock = null; + } + } + + /// Generate a signature for the loaded message using the key we were + /// initialised with. + /// + public virtual byte[] GenerateSignature() + { + int digSize = digest.GetDigestSize(); + byte[] m2Hash = new byte[digSize]; + digest.DoFinal(m2Hash, 0); + + byte[] C = new byte[8]; + LtoOSP(messageLength * 8, C); + + digest.BlockUpdate(C, 0, C.Length); + digest.BlockUpdate(mBuf, 0, messageLength); + digest.BlockUpdate(m2Hash, 0, m2Hash.Length); + + byte[] salt; + if (standardSalt != null) + { + salt = standardSalt; + } + else + { + salt = new byte[saltLength]; + random.NextBytes(salt); + } + + digest.BlockUpdate(salt, 0, salt.Length); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + int tLength = 2; + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + tLength = 1; + } + + int off = block.Length - messageLength - salt.Length - hLen - tLength - 1; + + block[off] = (byte) (0x01); + + Array.Copy(mBuf, 0, block, off + 1, messageLength); + Array.Copy(salt, 0, block, off + 1 + messageLength, salt.Length); + + byte[] dbMask = MaskGeneratorFunction1(hash, 0, hash.Length, block.Length - hLen - tLength); + for (int i = 0; i != dbMask.Length; i++) + { + block[i] ^= dbMask[i]; + } + + Array.Copy(hash, 0, block, block.Length - hLen - tLength, hLen); + + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + block[block.Length - 1] = (byte)IsoTrailers.TRAILER_IMPLICIT; + } + else + { + block[block.Length - 2] = (byte) ((uint)trailer >> 8); + block[block.Length - 1] = (byte) trailer; + } + + block[0] &= (byte) (0x7f); + + byte[] b = cipher.ProcessBlock(block, 0, block.Length); + + ClearBlock(mBuf); + ClearBlock(block); + messageLength = 0; + + return b; + } + + /// return true if the signature represents a ISO9796-2 signature + /// for the passed in message. + /// + public virtual bool VerifySignature( + byte[] signature) + { + // + // calculate H(m2) + // + byte[] m2Hash = new byte[hLen]; + digest.DoFinal(m2Hash, 0); + + byte[] block; + int tLength; + int mStart = 0; + + if (preSig == null) + { + try + { + UpdateWithRecoveredMessage(signature); + } + catch (Exception) + { + return false; + } + } + else + { + if (!Arrays.AreEqual(preSig, signature)) + { + throw new InvalidOperationException("UpdateWithRecoveredMessage called on different signature"); + } + } + + block = preBlock; + mStart = preMStart; + tLength = preTLength; + + preSig = null; + preBlock = null; + + // + // check the hashes + // + byte[] C = new byte[8]; + LtoOSP(recoveredMessage.Length * 8, C); + + digest.BlockUpdate(C, 0, C.Length); + + if (recoveredMessage.Length != 0) + { + digest.BlockUpdate(recoveredMessage, 0, recoveredMessage.Length); + } + + digest.BlockUpdate(m2Hash, 0, m2Hash.Length); + + // Update for the salt + if (standardSalt != null) + { + digest.BlockUpdate(standardSalt, 0, standardSalt.Length); + } + else + { + digest.BlockUpdate(block, mStart + recoveredMessage.Length, saltLength); + } + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + int off = block.Length - tLength - hash.Length; + + bool isOkay = true; + + for (int i = 0; i != hash.Length; i++) + { + if (hash[i] != block[off + i]) + { + isOkay = false; + } + } + + ClearBlock(block); + ClearBlock(hash); + + if (!isOkay) + { + fullMessage = false; + messageLength = 0; + ClearBlock(recoveredMessage); + return false; + } + + // + // if they've input a message check what we've recovered against + // what was input. + // + if (messageLength != 0) + { + if (!IsSameAs(mBuf, recoveredMessage)) + { + messageLength = 0; + ClearBlock(mBuf); + return false; + } + } + + messageLength = 0; + + ClearBlock(mBuf); + return true; + } + + /// + /// Return true if the full message was recoveredMessage. + /// + /// true on full message recovery, false otherwise, or if not sure. + /// + public virtual bool HasFullMessage() + { + return fullMessage; + } + + /// int to octet string. + /// int to octet string. + private void ItoOSP( + int i, + byte[] sp) + { + sp[0] = (byte)((uint)i >> 24); + sp[1] = (byte)((uint)i >> 16); + sp[2] = (byte)((uint)i >> 8); + sp[3] = (byte)((uint)i >> 0); + } + + /// long to octet string. + private void LtoOSP(long l, byte[] sp) + { + sp[0] = (byte)((ulong)l >> 56); + sp[1] = (byte)((ulong)l >> 48); + sp[2] = (byte)((ulong)l >> 40); + sp[3] = (byte)((ulong)l >> 32); + sp[4] = (byte)((ulong)l >> 24); + sp[5] = (byte)((ulong)l >> 16); + sp[6] = (byte)((ulong)l >> 8); + sp[7] = (byte)((ulong)l >> 0); + } + + /// mask generator function, as described in Pkcs1v2. + private byte[] MaskGeneratorFunction1( + byte[] Z, + int zOff, + int zLen, + int length) + { + byte[] mask = new byte[length]; + byte[] hashBuf = new byte[hLen]; + byte[] C = new byte[4]; + int counter = 0; + + digest.Reset(); + + do + { + ItoOSP(counter, C); + + digest.BlockUpdate(Z, zOff, zLen); + digest.BlockUpdate(C, 0, C.Length); + digest.DoFinal(hashBuf, 0); + + Array.Copy(hashBuf, 0, mask, counter * hLen, hLen); + } + while (++counter < (length / hLen)); + + if ((counter * hLen) < length) + { + ItoOSP(counter, C); + + digest.BlockUpdate(Z, zOff, zLen); + digest.BlockUpdate(C, 0, C.Length); + digest.DoFinal(hashBuf, 0); + + Array.Copy(hashBuf, 0, mask, counter * hLen, mask.Length - (counter * hLen)); + } + + return mask; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs.meta new file mode 100644 index 00000000..447d5baf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 31b913e780f036440a7f9c54f0cdf1fc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2PssSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs new file mode 100644 index 00000000..c331dc3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs @@ -0,0 +1,554 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /// ISO9796-2 - mechanism using a hash function with recovery (scheme 1) + public class Iso9796d2Signer : ISignerWithRecovery + { + /// + /// Return a reference to the recoveredMessage message. + /// + /// The full/partial recoveredMessage message. + /// + public byte[] GetRecoveredMessage() + { + return recoveredMessage; + } + + private IDigest digest; + private IAsymmetricBlockCipher cipher; + + private int trailer; + private int keyBits; + private byte[] block; + private byte[] mBuf; + private int messageLength; + private bool fullMessage; + private byte[] recoveredMessage; + + private byte[] preSig; + private byte[] preBlock; + + /// + /// Generate a signer with either implicit or explicit trailers for ISO9796-2. + /// + /// base cipher to use for signature creation/verification + /// digest to use. + /// whether or not the trailer is implicit or gives the hash. + public Iso9796d2Signer( + IAsymmetricBlockCipher cipher, + IDigest digest, + bool isImplicit) + { + this.cipher = cipher; + this.digest = digest; + + if (isImplicit) + { + trailer = IsoTrailers.TRAILER_IMPLICIT; + } + else if (IsoTrailers.NoTrailerAvailable(digest)) + { + throw new ArgumentException("no valid trailer", "digest"); + } + else + { + trailer = IsoTrailers.GetTrailer(digest); + } + } + + /// Constructor for a signer with an explicit digest trailer. + /// + /// + /// cipher to use. + /// + /// digest to sign with. + /// + public Iso9796d2Signer(IAsymmetricBlockCipher cipher, IDigest digest) + : this(cipher, digest, false) + { + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "with" + "ISO9796-2S1"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + RsaKeyParameters kParam = (RsaKeyParameters) parameters; + + cipher.Init(forSigning, kParam); + + keyBits = kParam.Modulus.BitLength; + + block = new byte[(keyBits + 7) / 8]; + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + mBuf = new byte[block.Length - digest.GetDigestSize() - 2]; + } + else + { + mBuf = new byte[block.Length - digest.GetDigestSize() - 3]; + } + + Reset(); + } + + /// compare two byte arrays - constant time. + private bool IsSameAs(byte[] a, byte[] b) + { + int checkLen; + if (messageLength > mBuf.Length) + { + if (mBuf.Length > b.Length) + { + return false; + } + + checkLen = mBuf.Length; + } + else + { + if (messageLength != b.Length) + { + return false; + } + + checkLen = b.Length; + } + + bool isOkay = true; + + for (int i = 0; i != checkLen; i++) + { + if (a[i] != b[i]) + { + isOkay = false; + } + } + + return isOkay; + } + + /// clear possible sensitive data + private void ClearBlock( + byte[] block) + { + Array.Clear(block, 0, block.Length); + } + + public virtual void UpdateWithRecoveredMessage( + byte[] signature) + { + byte[] block = cipher.ProcessBlock(signature, 0, signature.Length); + + if (((block[0] & 0xC0) ^ 0x40) != 0) + throw new InvalidCipherTextException("malformed signature"); + + if (((block[block.Length - 1] & 0xF) ^ 0xC) != 0) + throw new InvalidCipherTextException("malformed signature"); + + int delta = 0; + + if (((block[block.Length - 1] & 0xFF) ^ 0xBC) == 0) + { + delta = 1; + } + else + { + int sigTrail = ((block[block.Length - 2] & 0xFF) << 8) | (block[block.Length - 1] & 0xFF); + + if (IsoTrailers.NoTrailerAvailable(digest)) + throw new ArgumentException("unrecognised hash in signature"); + + if (sigTrail != IsoTrailers.GetTrailer(digest)) + throw new InvalidOperationException("signer initialised with wrong digest for trailer " + sigTrail); + + delta = 2; + } + + // + // find out how much padding we've got + // + int mStart = 0; + + for (mStart = 0; mStart != block.Length; mStart++) + { + if (((block[mStart] & 0x0f) ^ 0x0a) == 0) + break; + } + + mStart++; + + int off = block.Length - delta - digest.GetDigestSize(); + + // + // there must be at least one byte of message string + // + if ((off - mStart) <= 0) + throw new InvalidCipherTextException("malformed block"); + + // + // if we contain the whole message as well, check the hash of that. + // + if ((block[0] & 0x20) == 0) + { + fullMessage = true; + + recoveredMessage = new byte[off - mStart]; + Array.Copy(block, mStart, recoveredMessage, 0, recoveredMessage.Length); + } + else + { + fullMessage = false; + + recoveredMessage = new byte[off - mStart]; + Array.Copy(block, mStart, recoveredMessage, 0, recoveredMessage.Length); + } + + preSig = signature; + preBlock = block; + + digest.BlockUpdate(recoveredMessage, 0, recoveredMessage.Length); + messageLength = recoveredMessage.Length; + recoveredMessage.CopyTo(mBuf, 0); + } + + public virtual void Update(byte input) + { + digest.Update(input); + + if (messageLength < mBuf.Length) + { + mBuf[messageLength] = input; + } + + messageLength++; + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, inLen)); +#else + while (inLen > 0 && messageLength < mBuf.Length) + { + this.Update(input[inOff]); + inOff++; + inLen--; + } + + if (inLen > 0) + { + digest.BlockUpdate(input, inOff, inLen); + messageLength += inLen; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + while (!input.IsEmpty && messageLength < mBuf.Length) + { + this.Update(input[0]); + input = input[1..]; + } + + if (!input.IsEmpty) + { + digest.BlockUpdate(input); + messageLength += input.Length; + } + } +#endif + + /// reset the internal state + public virtual void Reset() + { + digest.Reset(); + messageLength = 0; + ClearBlock(mBuf); + + if (recoveredMessage != null) + { + ClearBlock(recoveredMessage); + } + + recoveredMessage = null; + fullMessage = false; + + if (preSig != null) + { + preSig = null; + ClearBlock(preBlock); + preBlock = null; + } + } + + /// Generate a signature for the loaded message using the key we were + /// initialised with. + /// + public virtual byte[] GenerateSignature() + { + int digSize = digest.GetDigestSize(); + + int t = 0; + int delta = 0; + + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + t = 8; + delta = block.Length - digSize - 1; + digest.DoFinal(block, delta); + block[block.Length - 1] = (byte)IsoTrailers.TRAILER_IMPLICIT; + } + else + { + t = 16; + delta = block.Length - digSize - 2; + digest.DoFinal(block, delta); + block[block.Length - 2] = (byte) ((uint)trailer >> 8); + block[block.Length - 1] = (byte) trailer; + } + + byte header = 0; + int x = (digSize + messageLength) * 8 + t + 4 - keyBits; + + if (x > 0) + { + int mR = messageLength - ((x + 7) / 8); + header = (byte) (0x60); + + delta -= mR; + + Array.Copy(mBuf, 0, block, delta, mR); + } + else + { + header = (byte) (0x40); + delta -= messageLength; + + Array.Copy(mBuf, 0, block, delta, messageLength); + } + + if ((delta - 1) > 0) + { + for (int i = delta - 1; i != 0; i--) + { + block[i] = (byte) 0xbb; + } + block[delta - 1] ^= (byte) 0x01; + block[0] = (byte) 0x0b; + block[0] |= header; + } + else + { + block[0] = (byte) 0x0a; + block[0] |= header; + } + + byte[] b = cipher.ProcessBlock(block, 0, block.Length); + + messageLength = 0; + + ClearBlock(mBuf); + ClearBlock(block); + + return b; + } + + /// return true if the signature represents a ISO9796-2 signature + /// for the passed in message. + /// + public virtual bool VerifySignature(byte[] signature) + { + byte[] block; + + if (preSig == null) + { + try + { + block = cipher.ProcessBlock(signature, 0, signature.Length); + } + catch (Exception) + { + return false; + } + } + else + { + if (!Arrays.AreEqual(preSig, signature)) + throw new InvalidOperationException("updateWithRecoveredMessage called on different signature"); + + block = preBlock; + + preSig = null; + preBlock = null; + } + + if (((block[0] & 0xC0) ^ 0x40) != 0) + return ReturnFalse(block); + + if (((block[block.Length - 1] & 0xF) ^ 0xC) != 0) + return ReturnFalse(block); + + int delta = 0; + + if (((block[block.Length - 1] & 0xFF) ^ 0xBC) == 0) + { + delta = 1; + } + else + { + int sigTrail = ((block[block.Length - 2] & 0xFF) << 8) | (block[block.Length - 1] & 0xFF); + + if (IsoTrailers.NoTrailerAvailable(digest)) + throw new ArgumentException("unrecognised hash in signature"); + + if (sigTrail != IsoTrailers.GetTrailer(digest)) + throw new InvalidOperationException("signer initialised with wrong digest for trailer " + sigTrail); + + delta = 2; + } + + // + // find out how much padding we've got + // + int mStart = 0; + for (; mStart != block.Length; mStart++) + { + if (((block[mStart] & 0x0f) ^ 0x0a) == 0) + { + break; + } + } + + mStart++; + + // + // check the hashes + // + byte[] hash = new byte[digest.GetDigestSize()]; + + int off = block.Length - delta - hash.Length; + + // + // there must be at least one byte of message string + // + if ((off - mStart) <= 0) + { + return ReturnFalse(block); + } + + // + // if we contain the whole message as well, check the hash of that. + // + if ((block[0] & 0x20) == 0) + { + fullMessage = true; + + // check right number of bytes passed in. + if (messageLength > off - mStart) + { + return ReturnFalse(block); + } + + digest.Reset(); + digest.BlockUpdate(block, mStart, off - mStart); + digest.DoFinal(hash, 0); + + bool isOkay = true; + + for (int i = 0; i != hash.Length; i++) + { + block[off + i] ^= hash[i]; + if (block[off + i] != 0) + { + isOkay = false; + } + } + + if (!isOkay) + { + return ReturnFalse(block); + } + + recoveredMessage = new byte[off - mStart]; + Array.Copy(block, mStart, recoveredMessage, 0, recoveredMessage.Length); + } + else + { + fullMessage = false; + + digest.DoFinal(hash, 0); + + bool isOkay = true; + + for (int i = 0; i != hash.Length; i++) + { + block[off + i] ^= hash[i]; + if (block[off + i] != 0) + { + isOkay = false; + } + } + + if (!isOkay) + { + return ReturnFalse(block); + } + + recoveredMessage = new byte[off - mStart]; + Array.Copy(block, mStart, recoveredMessage, 0, recoveredMessage.Length); + } + + // + // if they've input a message check what we've recovered against + // what was input. + // + if (messageLength != 0) + { + if (!IsSameAs(mBuf, recoveredMessage)) + { + return ReturnFalse(block); + } + } + + ClearBlock(mBuf); + ClearBlock(block); + + messageLength = 0; + + return true; + } + + private bool ReturnFalse(byte[] block) + { + messageLength = 0; + + ClearBlock(mBuf); + ClearBlock(block); + + return false; + } + + /// + /// Return true if the full message was recoveredMessage. + /// + /// true on full message recovery, false otherwise. + /// + public virtual bool HasFullMessage() + { + return fullMessage; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs.meta new file mode 100644 index 00000000..ab3f85fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f46652d751b6c574a94a6d0562824920 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/Iso9796d2Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs new file mode 100644 index 00000000..447c0df6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class IsoTrailers + { + public const int TRAILER_IMPLICIT = 0xBC; + public const int TRAILER_RIPEMD160 = 0x31CC; + public const int TRAILER_RIPEMD128 = 0x32CC; + public const int TRAILER_SHA1 = 0x33CC; + public const int TRAILER_SHA256 = 0x34CC; + public const int TRAILER_SHA512 = 0x35CC; + public const int TRAILER_SHA384 = 0x36CC; + public const int TRAILER_WHIRLPOOL = 0x37CC; + public const int TRAILER_SHA224 = 0x38CC; + public const int TRAILER_SHA512_224 = 0x39CC; + public const int TRAILER_SHA512_256 = 0x40CC; + + private static IDictionary CreateTrailerMap() + { + var trailers = new Dictionary(StringComparer.OrdinalIgnoreCase); + + trailers.Add("RIPEMD128", TRAILER_RIPEMD128); + trailers.Add("RIPEMD160", TRAILER_RIPEMD160); + + trailers.Add("SHA-1", TRAILER_SHA1); + trailers.Add("SHA-224", TRAILER_SHA224); + trailers.Add("SHA-256", TRAILER_SHA256); + trailers.Add("SHA-384", TRAILER_SHA384); + trailers.Add("SHA-512", TRAILER_SHA512); + trailers.Add("SHA-512/224", TRAILER_SHA512_224); + trailers.Add("SHA-512/256", TRAILER_SHA512_256); + + trailers.Add("Whirlpool", TRAILER_WHIRLPOOL); + + return trailers; + } + + // IDictionary is (string -> Int32) + private static readonly IDictionary TrailerMap = CreateTrailerMap(); + + public static int GetTrailer(IDigest digest) + { + return TrailerMap[digest.AlgorithmName]; + } + + public static bool NoTrailerAvailable(IDigest digest) + { + return !TrailerMap.ContainsKey(digest.AlgorithmName); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs.meta new file mode 100644 index 00000000..457d04e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f9896fcb1ac70f46bcc315f89776165 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/IsoTrailers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs new file mode 100644 index 00000000..de58ac20 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs @@ -0,0 +1,62 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class PlainDsaEncoding + : IDsaEncoding + { + public static readonly PlainDsaEncoding Instance = new PlainDsaEncoding(); + + public virtual BigInteger[] Decode(BigInteger n, byte[] encoding) + { + int valueLength = BigIntegers.GetUnsignedByteLength(n); + if (encoding.Length != valueLength * 2) + throw new ArgumentException("Encoding has incorrect length", "encoding"); + + return new BigInteger[] { + DecodeValue(n, encoding, 0, valueLength), + DecodeValue(n, encoding, valueLength, valueLength), + }; + } + + public virtual byte[] Encode(BigInteger n, BigInteger r, BigInteger s) + { + int valueLength = BigIntegers.GetUnsignedByteLength(n); + byte[] result = new byte[valueLength * 2]; + EncodeValue(n, r, result, 0, valueLength); + EncodeValue(n, s, result, valueLength, valueLength); + return result; + } + + protected virtual BigInteger CheckValue(BigInteger n, BigInteger x) + { + if (x.SignValue < 0 || x.CompareTo(n) >= 0) + throw new ArgumentException("Value out of range", "x"); + + return x; + } + + protected virtual BigInteger DecodeValue(BigInteger n, byte[] buf, int off, int len) + { + return CheckValue(n, new BigInteger(1, buf, off, len)); + } + + protected virtual void EncodeValue(BigInteger n, BigInteger x, byte[] buf, int off, int len) + { + byte[] bs = CheckValue(n, x).ToByteArrayUnsigned(); + int bsOff = System.Math.Max(0, bs.Length - len); + int bsLen = bs.Length - bsOff; + + int pos = len - bsLen; + Arrays.Fill(buf, off, off + pos, 0); + Array.Copy(bs, bsOff, buf, off + pos, bsLen); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs.meta new file mode 100644 index 00000000..94bbaa13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc62c655d2ab26447a76733af7743e3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PlainDsaEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs new file mode 100644 index 00000000..4c8a8356 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs @@ -0,0 +1,411 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /// RSA-PSS as described in Pkcs# 1 v 2.1. + ///

+ /// Note: the usual value for the salt length is the number of + /// bytes in the hash function.

+ ///
+ public class PssSigner + : ISigner + { + public const byte TrailerImplicit = 0xBC; + + private readonly IDigest contentDigest1, contentDigest2; + private readonly IDigest mgfDigest; + private readonly IAsymmetricBlockCipher cipher; + + private SecureRandom random; + + private int hLen; + private int mgfhLen; + private int sLen; + private bool sSet; + private int emBits; + private byte[] salt; + private byte[] mDash; + private byte[] block; + private byte trailer; + + public static PssSigner CreateRawSigner(IAsymmetricBlockCipher cipher, IDigest digest) + { + return new PssSigner(cipher, new NullDigest(), digest, digest, digest.GetDigestSize(), null, TrailerImplicit); + } + + public static PssSigner CreateRawSigner(IAsymmetricBlockCipher cipher, IDigest contentDigest, IDigest mgfDigest, + int saltLen, byte trailer) + { + return new PssSigner(cipher, new NullDigest(), contentDigest, mgfDigest, saltLen, null, trailer); + } + + public static PssSigner CreateRawSigner(IAsymmetricBlockCipher cipher, IDigest contentDigest, IDigest mgfDigest, + byte[] salt, byte trailer) + { + return new PssSigner(cipher, new NullDigest(), contentDigest, mgfDigest, salt.Length, salt, trailer); + } + + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest) + : this(cipher, digest, digest.GetDigestSize()) + { + } + + /// Basic constructor + /// the asymmetric cipher to use. + /// the digest to use. + /// the length of the salt to use (in bytes). + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest, + int saltLen) + : this(cipher, digest, saltLen, TrailerImplicit) + { + } + + /// Basic constructor + /// the asymmetric cipher to use. + /// the digest to use. + /// the fixed salt to be used. + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest, + byte[] salt) + : this(cipher, digest, digest, digest, salt.Length, salt, TrailerImplicit) + { + } + + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest contentDigest, + IDigest mgfDigest, + int saltLen) + : this(cipher, contentDigest, mgfDigest, saltLen, TrailerImplicit) + { + } + + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest contentDigest, + IDigest mgfDigest, + byte[] salt) + : this(cipher, contentDigest, contentDigest, mgfDigest, salt.Length, salt, TrailerImplicit) + { + } + + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest digest, + int saltLen, + byte trailer) + : this(cipher, digest, digest, saltLen, trailer) + { + } + + public PssSigner( + IAsymmetricBlockCipher cipher, + IDigest contentDigest, + IDigest mgfDigest, + int saltLen, + byte trailer) + : this(cipher, contentDigest, contentDigest, mgfDigest, saltLen, null, trailer) + { + } + + private PssSigner( + IAsymmetricBlockCipher cipher, + IDigest contentDigest1, + IDigest contentDigest2, + IDigest mgfDigest, + int saltLen, + byte[] salt, + byte trailer) + { + this.cipher = cipher; + this.contentDigest1 = contentDigest1; + this.contentDigest2 = contentDigest2; + this.mgfDigest = mgfDigest; + this.hLen = contentDigest2.GetDigestSize(); + this.mgfhLen = mgfDigest.GetDigestSize(); + this.sLen = saltLen; + this.sSet = salt != null; + if (sSet) + { + this.salt = salt; + } + else + { + this.salt = new byte[saltLen]; + } + this.mDash = new byte[8 + saltLen + hLen]; + this.trailer = trailer; + } + + public virtual string AlgorithmName + { + get { return mgfDigest.AlgorithmName + "withRSAandMGF1"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + if (parameters is ParametersWithRandom withRandom) + { + parameters = withRandom.Parameters; + random = withRandom.Random; + } + else + { + if (forSigning) + { + random = CryptoServicesRegistrar.GetSecureRandom(); + } + } + + cipher.Init(forSigning, parameters); + + RsaKeyParameters kParam; + if (parameters is RsaBlindingParameters) + { + kParam = ((RsaBlindingParameters)parameters).PublicKey; + } + else + { + kParam = (RsaKeyParameters)parameters; + } + + emBits = kParam.Modulus.BitLength - 1; + + if (emBits < (8 * hLen + 8 * sLen + 9)) + throw new ArgumentException("key too small for specified hash and salt lengths"); + + block = new byte[(emBits + 7) / 8]; + } + + /// clear possible sensitive data + private void ClearBlock( + byte[] block) + { + Array.Clear(block, 0, block.Length); + } + + public virtual void Update(byte input) + { + contentDigest1.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + contentDigest1.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + contentDigest1.BlockUpdate(input); + } +#endif + + public virtual void Reset() + { + contentDigest1.Reset(); + } + + public virtual byte[] GenerateSignature() + { + if (contentDigest1.GetDigestSize() != hLen) + throw new InvalidOperationException(); + + contentDigest1.DoFinal(mDash, mDash.Length - hLen - sLen); + + if (sLen != 0) + { + if (!sSet) + { + random.NextBytes(salt); + } + salt.CopyTo(mDash, mDash.Length - sLen); + } + + byte[] h = new byte[hLen]; + + contentDigest2.BlockUpdate(mDash, 0, mDash.Length); + + contentDigest2.DoFinal(h, 0); + + block[block.Length - sLen - 1 - hLen - 1] = (byte) (0x01); + salt.CopyTo(block, block.Length - sLen - hLen - 1); + + byte[] dbMask = MaskGeneratorFunction(h, 0, h.Length, block.Length - hLen - 1); + for (int i = 0; i != dbMask.Length; i++) + { + block[i] ^= dbMask[i]; + } + + h.CopyTo(block, block.Length - hLen - 1); + + uint firstByteMask = 0xFFU >> ((block.Length * 8) - emBits); + + block[0] &= (byte)firstByteMask; + block[block.Length - 1] = trailer; + + byte[] b = cipher.ProcessBlock(block, 0, block.Length); + + ClearBlock(block); + + return b; + } + + public virtual bool VerifySignature(byte[] signature) + { + if (contentDigest1.GetDigestSize() != hLen) + throw new InvalidOperationException(); + + contentDigest1.DoFinal(mDash, mDash.Length - hLen - sLen); + + byte[] b = cipher.ProcessBlock(signature, 0, signature.Length); + Arrays.Fill(block, 0, block.Length - b.Length, 0); + b.CopyTo(block, block.Length - b.Length); + + uint firstByteMask = 0xFFU >> ((block.Length * 8) - emBits); + + if (block[0] != (byte)(block[0] & firstByteMask) + || block[block.Length - 1] != trailer) + { + ClearBlock(block); + return false; + } + + byte[] dbMask = MaskGeneratorFunction(block, block.Length - hLen - 1, hLen, block.Length - hLen - 1); + + for (int i = 0; i != dbMask.Length; i++) + { + block[i] ^= dbMask[i]; + } + + block[0] &= (byte)firstByteMask; + + for (int i = 0; i != block.Length - hLen - sLen - 2; i++) + { + if (block[i] != 0) + { + ClearBlock(block); + return false; + } + } + + if (block[block.Length - hLen - sLen - 2] != 0x01) + { + ClearBlock(block); + return false; + } + + if (sSet) + { + Array.Copy(salt, 0, mDash, mDash.Length - sLen, sLen); + } + else + { + Array.Copy(block, block.Length - sLen - hLen - 1, mDash, mDash.Length - sLen, sLen); + } + + contentDigest2.BlockUpdate(mDash, 0, mDash.Length); + contentDigest2.DoFinal(mDash, mDash.Length - hLen); + + for (int i = block.Length - hLen - 1, j = mDash.Length - hLen; j != mDash.Length; i++, j++) + { + if ((block[i] ^ mDash[j]) != 0) + { + ClearBlock(mDash); + ClearBlock(block); + return false; + } + } + + ClearBlock(mDash); + ClearBlock(block); + + return true; + } + + /// int to octet string. + private void ItoOSP( + int i, + byte[] sp) + { + sp[0] = (byte)((uint) i >> 24); + sp[1] = (byte)((uint) i >> 16); + sp[2] = (byte)((uint) i >> 8); + sp[3] = (byte)((uint) i >> 0); + } + + private byte[] MaskGeneratorFunction( + byte[] Z, + int zOff, + int zLen, + int length) + { + if (mgfDigest is IXof) + { + byte[] mask = new byte[length]; + mgfDigest.BlockUpdate(Z, zOff, zLen); + ((IXof)mgfDigest).OutputFinal(mask, 0, mask.Length); + + return mask; + } + else + { + return MaskGeneratorFunction1(Z, zOff, zLen, length); + } + } + + /// mask generator function, as described in Pkcs1v2. + private byte[] MaskGeneratorFunction1( + byte[] Z, + int zOff, + int zLen, + int length) + { + byte[] mask = new byte[length]; + byte[] hashBuf = new byte[mgfhLen]; + byte[] C = new byte[4]; + int counter = 0; + + mgfDigest.Reset(); + + while (counter < (length / mgfhLen)) + { + ItoOSP(counter, C); + + mgfDigest.BlockUpdate(Z, zOff, zLen); + mgfDigest.BlockUpdate(C, 0, C.Length); + mgfDigest.DoFinal(hashBuf, 0); + + hashBuf.CopyTo(mask, counter * mgfhLen); + ++counter; + } + + if ((counter * mgfhLen) < length) + { + ItoOSP(counter, C); + + mgfDigest.BlockUpdate(Z, zOff, zLen); + mgfDigest.BlockUpdate(C, 0, C.Length); + mgfDigest.DoFinal(hashBuf, 0); + + Array.Copy(hashBuf, 0, mask, counter * mgfhLen, mask.Length - (counter * mgfhLen)); + } + + return mask; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs.meta new file mode 100644 index 00000000..2087dbab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1a3a3873d9ad8a438605da6d3c12377 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/PssSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs new file mode 100644 index 00000000..1f35d1f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class RandomDsaKCalculator + : IDsaKCalculator + { + private BigInteger q; + private SecureRandom random; + + public virtual bool IsDeterministic + { + get { return false; } + } + + public virtual void Init(BigInteger n, SecureRandom random) + { + this.q = n; + this.random = random; + } + + public virtual void Init(BigInteger n, BigInteger d, byte[] message) + { + throw new InvalidOperationException("Operation not supported"); + } + + public virtual BigInteger NextK() + { + int qBitLength = q.BitLength; + + BigInteger k; + do + { + k = new BigInteger(qBitLength, random); + } + while (k.SignValue < 1 || k.CompareTo(q) >= 0); + + return k; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs.meta new file mode 100644 index 00000000..5edb6b81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fc80a8ca3e7289e4d95d20449fe315b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RandomDsaKCalculator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs new file mode 100644 index 00000000..448646e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs @@ -0,0 +1,229 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class RsaDigestSigner + : ISigner + { + private readonly IAsymmetricBlockCipher rsaEngine; + private readonly AlgorithmIdentifier algId; + private readonly IDigest digest; + private bool forSigning; + + private static readonly IDictionary OidMap = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + /// + /// Load oid table. + /// + static RsaDigestSigner() + { + OidMap["RIPEMD128"] = TeleTrusTObjectIdentifiers.RipeMD128; + OidMap["RIPEMD160"] = TeleTrusTObjectIdentifiers.RipeMD160; + OidMap["RIPEMD256"] = TeleTrusTObjectIdentifiers.RipeMD256; + + OidMap["SHA-1"] = X509ObjectIdentifiers.IdSha1; + OidMap["SHA-224"] = NistObjectIdentifiers.IdSha224; + OidMap["SHA-256"] = NistObjectIdentifiers.IdSha256; + OidMap["SHA-384"] = NistObjectIdentifiers.IdSha384; + OidMap["SHA-512"] = NistObjectIdentifiers.IdSha512; + OidMap["SHA-512/224"] = NistObjectIdentifiers.IdSha512_224; + OidMap["SHA-512/256"] = NistObjectIdentifiers.IdSha512_256; + OidMap["SHA3-224"] = NistObjectIdentifiers.IdSha3_224; + OidMap["SHA3-256"] = NistObjectIdentifiers.IdSha3_256; + OidMap["SHA3-384"] = NistObjectIdentifiers.IdSha3_384; + OidMap["SHA3-512"] = NistObjectIdentifiers.IdSha3_512; + + OidMap["MD2"] = PkcsObjectIdentifiers.MD2; + OidMap["MD4"] = PkcsObjectIdentifiers.MD4; + OidMap["MD5"] = PkcsObjectIdentifiers.MD5; + } + + public RsaDigestSigner(IDigest digest) + : this(digest, CollectionUtilities.GetValueOrNull(OidMap, digest.AlgorithmName)) + { + } + + public RsaDigestSigner(IDigest digest, DerObjectIdentifier digestOid) + : this(digest, new AlgorithmIdentifier(digestOid, DerNull.Instance)) + { + } + + public RsaDigestSigner(IDigest digest, AlgorithmIdentifier algId) + : this(new RsaCoreEngine(), digest, algId) + { + } + + public RsaDigestSigner(IRsa rsa, IDigest digest, DerObjectIdentifier digestOid) + : this(rsa, digest, new AlgorithmIdentifier(digestOid, DerNull.Instance)) + { + } + + public RsaDigestSigner(IRsa rsa, IDigest digest, AlgorithmIdentifier algId) + : this(new RsaBlindedEngine(rsa), digest, algId) + { + } + + public RsaDigestSigner(IAsymmetricBlockCipher rsaEngine, IDigest digest, AlgorithmIdentifier algId) + { + this.rsaEngine = new Pkcs1Encoding(rsaEngine); + this.digest = digest; + this.algId = algId; + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "withRSA"; } + } + + /** + * Initialise the signer for signing or verification. + * + * @param forSigning true if for signing, false otherwise + * @param param necessary parameters. + */ + public virtual void Init( + bool forSigning, + ICipherParameters parameters) + { + this.forSigning = forSigning; + AsymmetricKeyParameter k; + + if (parameters is ParametersWithRandom) + { + k = (AsymmetricKeyParameter)((ParametersWithRandom)parameters).Parameters; + } + else + { + k = (AsymmetricKeyParameter)parameters; + } + + if (forSigning && !k.IsPrivate) + throw new InvalidKeyException("Signing requires private key."); + + if (!forSigning && k.IsPrivate) + throw new InvalidKeyException("Verification requires public key."); + + Reset(); + + rsaEngine.Init(forSigning, parameters); + } + + public virtual void Update(byte input) + { + digest.Update(input); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual byte[] GenerateSignature() + { + if (!forSigning) + throw new InvalidOperationException("RsaDigestSigner not initialised for signature generation."); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + byte[] data = DerEncode(hash); + return rsaEngine.ProcessBlock(data, 0, data.Length); + } + + public virtual bool VerifySignature(byte[] signature) + { + if (forSigning) + throw new InvalidOperationException("RsaDigestSigner not initialised for verification"); + + byte[] hash = new byte[digest.GetDigestSize()]; + digest.DoFinal(hash, 0); + + byte[] sig; + byte[] expected; + + try + { + sig = rsaEngine.ProcessBlock(signature, 0, signature.Length); + expected = DerEncode(hash); + } + catch (Exception) + { + return false; + } + + if (sig.Length == expected.Length) + { + return Arrays.ConstantTimeAreEqual(sig, expected); + } + else if (sig.Length == expected.Length - 2) // NULL left out + { + int sigOffset = sig.Length - hash.Length - 2; + int expectedOffset = expected.Length - hash.Length - 2; + + expected[1] -= 2; // adjust lengths + expected[3] -= 2; + + int nonEqual = 0; + + for (int i = 0; i < hash.Length; i++) + { + nonEqual |= (sig[sigOffset + i] ^ expected[expectedOffset + i]); + } + + for (int i = 0; i < sigOffset; i++) + { + nonEqual |= (sig[i] ^ expected[i]); // check header less NULL + } + + return nonEqual == 0; + } + else + { + return false; + } + } + + public virtual void Reset() + { + digest.Reset(); + } + + private byte[] DerEncode(byte[] hash) + { + if (algId == null) + { + // For raw RSA, the DigestInfo must be prepared externally + return hash; + } + + DigestInfo dInfo = new DigestInfo(algId, hash); + + return dInfo.GetDerEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs.meta new file mode 100644 index 00000000..18ef4519 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bca2abdd4279913468bd3fe2c52b2e1d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/RsaDigestSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs new file mode 100644 index 00000000..6b8b047f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs @@ -0,0 +1,268 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /// The SM2 Digital Signature algorithm. + public class SM2Signer + : ISigner + { + private readonly IDsaKCalculator kCalculator = new RandomDsaKCalculator(); + private readonly IDigest digest; + private readonly IDsaEncoding encoding; + + private ECDomainParameters ecParams; + private ECPoint pubPoint; + private ECKeyParameters ecKey; + private byte[] z; + + public SM2Signer() + : this(StandardDsaEncoding.Instance, new SM3Digest()) + { + } + + public SM2Signer(IDigest digest) + : this(StandardDsaEncoding.Instance, digest) + { + } + + public SM2Signer(IDsaEncoding encoding) + : this(encoding, new SM3Digest()) + { + } + + public SM2Signer(IDsaEncoding encoding, IDigest digest) + { + this.encoding = encoding; + this.digest = digest; + } + + public virtual string AlgorithmName + { + get { return "SM2Sign"; } + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + ICipherParameters baseParam; + byte[] userID; + + if (parameters is ParametersWithID) + { + baseParam = ((ParametersWithID)parameters).Parameters; + userID = ((ParametersWithID)parameters).GetID(); + + if (userID.Length >= 8192) + throw new ArgumentException("SM2 user ID must be less than 2^16 bits long"); + } + else + { + baseParam = parameters; + // the default value, string value is "1234567812345678" + userID = Hex.DecodeStrict("31323334353637383132333435363738"); + } + + if (forSigning) + { + if (baseParam is ParametersWithRandom rParam) + { + ecKey = (ECKeyParameters)rParam.Parameters; + ecParams = ecKey.Parameters; + kCalculator.Init(ecParams.N, rParam.Random); + } + else + { + ecKey = (ECKeyParameters)baseParam; + ecParams = ecKey.Parameters; + kCalculator.Init(ecParams.N, CryptoServicesRegistrar.GetSecureRandom()); + } + pubPoint = CreateBasePointMultiplier().Multiply(ecParams.G, ((ECPrivateKeyParameters)ecKey).D).Normalize(); + } + else + { + ecKey = (ECKeyParameters)baseParam; + ecParams = ecKey.Parameters; + pubPoint = ((ECPublicKeyParameters)ecKey).Q; + } + + digest.Reset(); + z = GetZ(userID); + + digest.BlockUpdate(z, 0, z.Length); + } + + public virtual void Update(byte b) + { + digest.Update(b); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual bool VerifySignature(byte[] signature) + { + try + { + BigInteger[] rs = encoding.Decode(ecParams.N, signature); + + return VerifySignature(rs[0], rs[1]); + } + catch (Exception) + { + } + + return false; + } + + public virtual void Reset() + { + if (z != null) + { + digest.Reset(); + digest.BlockUpdate(z, 0, z.Length); + } + } + + public virtual byte[] GenerateSignature() + { + byte[] eHash = DigestUtilities.DoFinal(digest); + + BigInteger n = ecParams.N; + BigInteger e = CalculateE(n, eHash); + BigInteger d = ((ECPrivateKeyParameters)ecKey).D; + + BigInteger r, s; + + ECMultiplier basePointMultiplier = CreateBasePointMultiplier(); + + // 5.2.1 Draft RFC: SM2 Public Key Algorithms + do // generate s + { + BigInteger k; + do // generate r + { + // A3 + k = kCalculator.NextK(); + + // A4 + ECPoint p = basePointMultiplier.Multiply(ecParams.G, k).Normalize(); + + // A5 + r = e.Add(p.AffineXCoord.ToBigInteger()).Mod(n); + } + while (r.SignValue == 0 || r.Add(k).Equals(n)); + + // A6 + BigInteger dPlus1ModN = BigIntegers.ModOddInverse(n, d.Add(BigIntegers.One)); + + s = k.Subtract(r.Multiply(d)).Mod(n); + s = dPlus1ModN.Multiply(s).Mod(n); + } + while (s.SignValue == 0); + + // A7 + try + { + return encoding.Encode(ecParams.N, r, s); + } + catch (Exception ex) + { + throw new CryptoException("unable to encode signature: " + ex.Message, ex); + } + } + + private bool VerifySignature(BigInteger r, BigInteger s) + { + BigInteger n = ecParams.N; + + // 5.3.1 Draft RFC: SM2 Public Key Algorithms + // B1 + if (r.CompareTo(BigInteger.One) < 0 || r.CompareTo(n) >= 0) + return false; + + // B2 + if (s.CompareTo(BigInteger.One) < 0 || s.CompareTo(n) >= 0) + return false; + + // B3 + byte[] eHash = DigestUtilities.DoFinal(digest); + + // B4 + BigInteger e = CalculateE(n, eHash); + + // B5 + BigInteger t = r.Add(s).Mod(n); + if (t.SignValue == 0) + return false; + + // B6 + ECPoint q = ((ECPublicKeyParameters)ecKey).Q; + ECPoint x1y1 = ECAlgorithms.SumOfTwoMultiplies(ecParams.G, s, q, t).Normalize(); + if (x1y1.IsInfinity) + return false; + + // B7 + return r.Equals(e.Add(x1y1.AffineXCoord.ToBigInteger()).Mod(n)); + } + + private byte[] GetZ(byte[] userID) + { + AddUserID(digest, userID); + + AddFieldElement(digest, ecParams.Curve.A); + AddFieldElement(digest, ecParams.Curve.B); + AddFieldElement(digest, ecParams.G.AffineXCoord); + AddFieldElement(digest, ecParams.G.AffineYCoord); + AddFieldElement(digest, pubPoint.AffineXCoord); + AddFieldElement(digest, pubPoint.AffineYCoord); + + return DigestUtilities.DoFinal(digest); + } + + private void AddUserID(IDigest digest, byte[] userID) + { + int len = userID.Length * 8; + digest.Update((byte)(len >> 8)); + digest.Update((byte)len); + digest.BlockUpdate(userID, 0, userID.Length); + } + + private void AddFieldElement(IDigest digest, ECFieldElement v) + { + byte[] p = v.GetEncoded(); + digest.BlockUpdate(p, 0, p.Length); + } + + protected virtual BigInteger CalculateE(BigInteger n, byte[] message) + { + // TODO Should hashes larger than the order be truncated as with ECDSA? + return new BigInteger(1, message); + } + + protected virtual ECMultiplier CreateBasePointMultiplier() + { + return new FixedPointCombMultiplier(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs.meta new file mode 100644 index 00000000..1bf4b076 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2bfbdd48354892d4e970fde72c4c1f37 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/SM2Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs new file mode 100644 index 00000000..160f95a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + public class StandardDsaEncoding + : IDsaEncoding + { + public static readonly StandardDsaEncoding Instance = new StandardDsaEncoding(); + + public virtual BigInteger[] Decode(BigInteger n, byte[] encoding) + { + Asn1Sequence seq = (Asn1Sequence)Asn1Object.FromByteArray(encoding); + if (seq.Count == 2) + { + BigInteger r = DecodeValue(n, seq, 0); + BigInteger s = DecodeValue(n, seq, 1); + + byte[] expectedEncoding = Encode(n, r, s); + if (Arrays.AreEqual(expectedEncoding, encoding)) + return new BigInteger[]{ r, s }; + } + + throw new ArgumentException("Malformed signature", "encoding"); + } + + public virtual byte[] Encode(BigInteger n, BigInteger r, BigInteger s) + { + return new DerSequence( + EncodeValue(n, r), + EncodeValue(n, s) + ).GetEncoded(Asn1Encodable.Der); + } + + protected virtual BigInteger CheckValue(BigInteger n, BigInteger x) + { + if (x.SignValue < 0 || (null != n && x.CompareTo(n) >= 0)) + throw new ArgumentException("Value out of range", "x"); + + return x; + } + + protected virtual BigInteger DecodeValue(BigInteger n, Asn1Sequence s, int pos) + { + return CheckValue(n, ((DerInteger)s[pos]).Value); + } + + protected virtual DerInteger EncodeValue(BigInteger n, BigInteger x) + { + return new DerInteger(CheckValue(n, x)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs.meta new file mode 100644 index 00000000..3a7d3c0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fbd5ad9390c76364e81c5f06a30b8577 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/StandardDsaEncoding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs new file mode 100644 index 00000000..34863f1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs @@ -0,0 +1,203 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers +{ + /** + * X9.31-1998 - signing using a hash. + *

+ * The message digest hash, H, is encapsulated to form a byte string as follows + *

+ *
+     * EB = 06 || PS || 0xBA || H || TRAILER
+     * 
+ * where PS is a string of bytes all of value 0xBB of length such that |EB|=|n|, and TRAILER is the ISO/IEC 10118 part number† for the digest. The byte string, EB, is converted to an integer value, the message representative, f. + */ + public class X931Signer + : ISigner + { + private IDigest digest; + private IAsymmetricBlockCipher cipher; + private RsaKeyParameters kParam; + + private int trailer; + private int keyBits; + private byte[] block; + + /** + * Generate a signer with either implicit or explicit trailers for X9.31. + * + * @param cipher base cipher to use for signature creation/verification + * @param digest digest to use. + * @param implicit whether or not the trailer is implicit or gives the hash. + */ + public X931Signer(IAsymmetricBlockCipher cipher, IDigest digest, bool isImplicit) + { + this.cipher = cipher; + this.digest = digest; + + if (isImplicit) + { + trailer = IsoTrailers.TRAILER_IMPLICIT; + } + else if (IsoTrailers.NoTrailerAvailable(digest)) + { + throw new ArgumentException("no valid trailer", "digest"); + } + else + { + trailer = IsoTrailers.GetTrailer(digest); + } + } + + public virtual string AlgorithmName + { + get { return digest.AlgorithmName + "with" + cipher.AlgorithmName + "/X9.31"; } + } + + /** + * Constructor for a signer with an explicit digest trailer. + * + * @param cipher cipher to use. + * @param digest digest to sign with. + */ + public X931Signer(IAsymmetricBlockCipher cipher, IDigest digest) + : this(cipher, digest, false) + { + } + + public virtual void Init(bool forSigning, ICipherParameters parameters) + { + kParam = (RsaKeyParameters)parameters; + + cipher.Init(forSigning, kParam); + + keyBits = kParam.Modulus.BitLength; + + block = new byte[(keyBits + 7) / 8]; + + Reset(); + } + + public virtual void Update(byte b) + { + digest.Update(b); + } + + public virtual void BlockUpdate(byte[] input, int inOff, int inLen) + { + digest.BlockUpdate(input, inOff, inLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void BlockUpdate(ReadOnlySpan input) + { + digest.BlockUpdate(input); + } +#endif + + public virtual void Reset() + { + digest.Reset(); + } + + public virtual byte[] GenerateSignature() + { + CreateSignatureBlock(); + + BigInteger t = new BigInteger(1, cipher.ProcessBlock(block, 0, block.Length)); + Arrays.Fill(block, 0x00); + + t = t.Min(kParam.Modulus.Subtract(t)); + + int size = BigIntegers.GetUnsignedByteLength(kParam.Modulus); + return BigIntegers.AsUnsignedByteArray(size, t); + } + + private void CreateSignatureBlock() + { + int digSize = digest.GetDigestSize(); + + int delta; + if (trailer == IsoTrailers.TRAILER_IMPLICIT) + { + delta = block.Length - digSize - 1; + digest.DoFinal(block, delta); + block[block.Length - 1] = (byte)IsoTrailers.TRAILER_IMPLICIT; + } + else + { + delta = block.Length - digSize - 2; + digest.DoFinal(block, delta); + block[block.Length - 2] = (byte)(trailer >> 8); + block[block.Length - 1] = (byte)trailer; + } + + block[0] = 0x6b; + for (int i = delta - 2; i != 0; i--) + { + block[i] = (byte)0xbb; + } + block[delta - 1] = (byte)0xba; + } + + public virtual bool VerifySignature(byte[] signature) + { + try + { + block = cipher.ProcessBlock(signature, 0, signature.Length); + } + catch (Exception) + { + return false; + } + + BigInteger t = new BigInteger(1, block); + BigInteger f; + + if ((t.IntValue & 15) == 12) + { + f = t; + } + else + { + t = kParam.Modulus.Subtract(t); + if ((t.IntValue & 15) == 12) + { + f = t; + } + else + { + return false; + } + } + + CreateSignatureBlock(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int fBlockSize = block.Length; + Span fBlock = fBlockSize <= 512 + ? stackalloc byte[fBlockSize] + : new byte[fBlockSize]; + BigIntegers.AsUnsignedByteArray(f, fBlock); +#else + byte[] fBlock = BigIntegers.AsUnsignedByteArray(block.Length, f); +#endif + + bool rv = Arrays.ConstantTimeAreEqual(block, fBlock); + + Arrays.Fill(block, 0x00); + Arrays.Fill(fBlock, 0x00); + + return rv; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs.meta new file mode 100644 index 00000000..b39fb029 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7c5139c4f29214e4dba5ffe2640d10e0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/signers/X931Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util.meta new file mode 100644 index 00000000..2022eb69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 92c07bda0e26a0f49b796b4fe37db70b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs new file mode 100644 index 00000000..6b456bf3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities +{ + public class AlgorithmIdentifierFactory + { + public static readonly DerObjectIdentifier IDEA_CBC = new DerObjectIdentifier("1.3.6.1.4.1.188.7.1.1.2"); + public static readonly DerObjectIdentifier CAST5_CBC = new DerObjectIdentifier("1.2.840.113533.7.66.10"); + + private static readonly short[] rc2Table = { + 0xbd, 0x56, 0xea, 0xf2, 0xa2, 0xf1, 0xac, 0x2a, 0xb0, 0x93, 0xd1, 0x9c, 0x1b, 0x33, 0xfd, 0xd0, + 0x30, 0x04, 0xb6, 0xdc, 0x7d, 0xdf, 0x32, 0x4b, 0xf7, 0xcb, 0x45, 0x9b, 0x31, 0xbb, 0x21, 0x5a, + 0x41, 0x9f, 0xe1, 0xd9, 0x4a, 0x4d, 0x9e, 0xda, 0xa0, 0x68, 0x2c, 0xc3, 0x27, 0x5f, 0x80, 0x36, + 0x3e, 0xee, 0xfb, 0x95, 0x1a, 0xfe, 0xce, 0xa8, 0x34, 0xa9, 0x13, 0xf0, 0xa6, 0x3f, 0xd8, 0x0c, + 0x78, 0x24, 0xaf, 0x23, 0x52, 0xc1, 0x67, 0x17, 0xf5, 0x66, 0x90, 0xe7, 0xe8, 0x07, 0xb8, 0x60, + 0x48, 0xe6, 0x1e, 0x53, 0xf3, 0x92, 0xa4, 0x72, 0x8c, 0x08, 0x15, 0x6e, 0x86, 0x00, 0x84, 0xfa, + 0xf4, 0x7f, 0x8a, 0x42, 0x19, 0xf6, 0xdb, 0xcd, 0x14, 0x8d, 0x50, 0x12, 0xba, 0x3c, 0x06, 0x4e, + 0xec, 0xb3, 0x35, 0x11, 0xa1, 0x88, 0x8e, 0x2b, 0x94, 0x99, 0xb7, 0x71, 0x74, 0xd3, 0xe4, 0xbf, + 0x3a, 0xde, 0x96, 0x0e, 0xbc, 0x0a, 0xed, 0x77, 0xfc, 0x37, 0x6b, 0x03, 0x79, 0x89, 0x62, 0xc6, + 0xd7, 0xc0, 0xd2, 0x7c, 0x6a, 0x8b, 0x22, 0xa3, 0x5b, 0x05, 0x5d, 0x02, 0x75, 0xd5, 0x61, 0xe3, + 0x18, 0x8f, 0x55, 0x51, 0xad, 0x1f, 0x0b, 0x5e, 0x85, 0xe5, 0xc2, 0x57, 0x63, 0xca, 0x3d, 0x6c, + 0xb4, 0xc5, 0xcc, 0x70, 0xb2, 0x91, 0x59, 0x0d, 0x47, 0x20, 0xc8, 0x4f, 0x58, 0xe0, 0x01, 0xe2, + 0x16, 0x38, 0xc4, 0x6f, 0x3b, 0x0f, 0x65, 0x46, 0xbe, 0x7e, 0x2d, 0x7b, 0x82, 0xf9, 0x40, 0xb5, + 0x1d, 0x73, 0xf8, 0xeb, 0x26, 0xc7, 0x87, 0x97, 0x25, 0x54, 0xb1, 0x28, 0xaa, 0x98, 0x9d, 0xa5, + 0x64, 0x6d, 0x7a, 0xd4, 0x10, 0x81, 0x44, 0xef, 0x49, 0xd6, 0xae, 0x2e, 0xdd, 0x76, 0x5c, 0x2f, + 0xa7, 0x1c, 0xc9, 0x09, 0x69, 0x9a, 0x83, 0xcf, 0x29, 0x39, 0xb9, 0xe9, 0x4c, 0xff, 0x43, 0xab + }; + + + /** + * Create an AlgorithmIdentifier for the passed in encryption algorithm. + * + * @param encryptionOID OID for the encryption algorithm + * @param keySize key size in bits (-1 if unknown) + * @param random SecureRandom to use for parameter generation. + * @return a full AlgorithmIdentifier including parameters + * @throws IllegalArgumentException if encryptionOID cannot be matched + */ + public static AlgorithmIdentifier GenerateEncryptionAlgID(DerObjectIdentifier encryptionOID, int keySize, SecureRandom random) + + { + if (encryptionOID.Equals(NistObjectIdentifiers.IdAes128Cbc) + || encryptionOID.Equals(NistObjectIdentifiers.IdAes192Cbc) + || encryptionOID.Equals(NistObjectIdentifiers.IdAes256Cbc) + || encryptionOID.Equals(NttObjectIdentifiers.IdCamellia128Cbc) + || encryptionOID.Equals(NttObjectIdentifiers.IdCamellia192Cbc) + || encryptionOID.Equals(NttObjectIdentifiers.IdCamellia256Cbc) + || encryptionOID.Equals(KisaObjectIdentifiers.IdSeedCbc)) + { + byte[] iv = new byte[16]; + + random.NextBytes(iv); + + return new AlgorithmIdentifier(encryptionOID, new DerOctetString(iv)); + } + else if (encryptionOID.Equals(PkcsObjectIdentifiers.DesEde3Cbc) + || encryptionOID.Equals(IDEA_CBC) + || encryptionOID.Equals(OiwObjectIdentifiers.DesCbc)) + { + byte[] iv = new byte[8]; + + random.NextBytes(iv); + + return new AlgorithmIdentifier(encryptionOID, new DerOctetString(iv)); + } + else if (encryptionOID.Equals(CAST5_CBC)) + { + byte[] iv = new byte[8]; + + random.NextBytes(iv); + + Cast5CbcParameters cbcParams = new Cast5CbcParameters(iv, keySize); + + return new AlgorithmIdentifier(encryptionOID, cbcParams); + } + else if (encryptionOID.Equals(PkcsObjectIdentifiers.rc4)) + { + return new AlgorithmIdentifier(encryptionOID, DerNull.Instance); + } + else if (encryptionOID.Equals(PkcsObjectIdentifiers.RC2Cbc)) + { + byte[] iv = new byte[8]; + + random.NextBytes(iv); + + RC2CbcParameter cbcParams = new RC2CbcParameter(rc2Table[128], iv); + + return new AlgorithmIdentifier(encryptionOID, cbcParams); + } + else + { + throw new InvalidOperationException("unable to match algorithm"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs.meta new file mode 100644 index 00000000..1e1d1485 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d9d23d4907245041a87a26c0795cea2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/AlgorithmIdentifierFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs new file mode 100644 index 00000000..65bdecb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities +{ + /** + * A basic alphabet mapper that just creates a mapper based on the + * passed in array of characters. + */ + public class BasicAlphabetMapper + : IAlphabetMapper + { + private readonly IDictionary m_indexMap = new Dictionary(); + private readonly IList m_charMap = new List(); + + /** + * Base constructor. + * + * @param alphabet a string of characters making up the alphabet. + */ + public BasicAlphabetMapper(string alphabet) : + this(alphabet.ToCharArray()) + { + } + + /** + * Base constructor. + * + * @param alphabet an array of characters making up the alphabet. + */ + public BasicAlphabetMapper(char[] alphabet) + { + for (int i = 0; i != alphabet.Length; i++) + { + if (m_indexMap.ContainsKey(alphabet[i])) + throw new ArgumentException("duplicate key detected in alphabet: " + alphabet[i]); + + m_indexMap.Add(alphabet[i], i); + m_charMap.Add(alphabet[i]); + } + } + + public int Radix + { + get { return m_charMap.Count; } + } + + public byte[] ConvertToIndexes(char[] input) + { + byte[] outBuf; + + if (m_charMap.Count <= 256) + { + outBuf = new byte[input.Length]; + for (int i = 0; i != input.Length; i++) + { + if (!m_indexMap.TryGetValue(input[i], out var idx)) + throw new InvalidOperationException(); + + outBuf[i] = (byte)idx; + } + } + else + { + outBuf = new byte[input.Length * 2]; + for (int i = 0; i != input.Length; i++) + { + if (!m_indexMap.TryGetValue(input[i], out var idx)) + throw new InvalidOperationException(); + + outBuf[i * 2 + 0] = (byte)(idx >> 8); + outBuf[i * 2 + 1] = (byte)idx; + } + } + + return outBuf; + } + + public char[] ConvertToChars(byte[] input) + { + char[] outBuf; + + if (m_charMap.Count <= 256) + { + outBuf = new char[input.Length]; + for (int i = 0; i != input.Length; i++) + { + outBuf[i] = m_charMap[input[i]]; + } + } + else + { + if ((input.Length & 0x1) != 0) + { + throw new ArgumentException("two byte radix and input string odd.Length"); + } + + outBuf = new char[input.Length / 2]; + for (int i = 0; i != input.Length; i += 2) + { + outBuf[i / 2] = m_charMap[(input[i] << 8) | input[i + 1]]; + } + } + + return outBuf; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs.meta new file mode 100644 index 00000000..da2915e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f4148365d0789f143810f079bab7ca3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/BasicAlphabetMapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs new file mode 100644 index 00000000..3582a4ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs @@ -0,0 +1,149 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities +{ + public class CipherFactory + { + private CipherFactory() + { + } + + private static readonly short[] rc2Ekb = + { + 0x5d, 0xbe, 0x9b, 0x8b, 0x11, 0x99, 0x6e, 0x4d, 0x59, 0xf3, 0x85, 0xa6, 0x3f, 0xb7, 0x83, 0xc5, + 0xe4, 0x73, 0x6b, 0x3a, 0x68, 0x5a, 0xc0, 0x47, 0xa0, 0x64, 0x34, 0x0c, 0xf1, 0xd0, 0x52, 0xa5, + 0xb9, 0x1e, 0x96, 0x43, 0x41, 0xd8, 0xd4, 0x2c, 0xdb, 0xf8, 0x07, 0x77, 0x2a, 0xca, 0xeb, 0xef, + 0x10, 0x1c, 0x16, 0x0d, 0x38, 0x72, 0x2f, 0x89, 0xc1, 0xf9, 0x80, 0xc4, 0x6d, 0xae, 0x30, 0x3d, + 0xce, 0x20, 0x63, 0xfe, 0xe6, 0x1a, 0xc7, 0xb8, 0x50, 0xe8, 0x24, 0x17, 0xfc, 0x25, 0x6f, 0xbb, + 0x6a, 0xa3, 0x44, 0x53, 0xd9, 0xa2, 0x01, 0xab, 0xbc, 0xb6, 0x1f, 0x98, 0xee, 0x9a, 0xa7, 0x2d, + 0x4f, 0x9e, 0x8e, 0xac, 0xe0, 0xc6, 0x49, 0x46, 0x29, 0xf4, 0x94, 0x8a, 0xaf, 0xe1, 0x5b, 0xc3, + 0xb3, 0x7b, 0x57, 0xd1, 0x7c, 0x9c, 0xed, 0x87, 0x40, 0x8c, 0xe2, 0xcb, 0x93, 0x14, 0xc9, 0x61, + 0x2e, 0xe5, 0xcc, 0xf6, 0x5e, 0xa8, 0x5c, 0xd6, 0x75, 0x8d, 0x62, 0x95, 0x58, 0x69, 0x76, 0xa1, + 0x4a, 0xb5, 0x55, 0x09, 0x78, 0x33, 0x82, 0xd7, 0xdd, 0x79, 0xf5, 0x1b, 0x0b, 0xde, 0x26, 0x21, + 0x28, 0x74, 0x04, 0x97, 0x56, 0xdf, 0x3c, 0xf0, 0x37, 0x39, 0xdc, 0xff, 0x06, 0xa4, 0xea, 0x42, + 0x08, 0xda, 0xb4, 0x71, 0xb0, 0xcf, 0x12, 0x7a, 0x4e, 0xfa, 0x6c, 0x1d, 0x84, 0x00, 0xc8, 0x7f, + 0x91, 0x45, 0xaa, 0x2b, 0xc2, 0xb1, 0x8f, 0xd5, 0xba, 0xf2, 0xad, 0x19, 0xb2, 0x67, 0x36, 0xf7, + 0x0f, 0x0a, 0x92, 0x7d, 0xe3, 0x9d, 0xe9, 0x90, 0x3e, 0x23, 0x27, 0x66, 0x13, 0xec, 0x81, 0x15, + 0xbd, 0x22, 0xbf, 0x9f, 0x7e, 0xa9, 0x51, 0x4b, 0x4c, 0xfb, 0x02, 0xd3, 0x70, 0x86, 0x31, 0xe7, + 0x3b, 0x05, 0x03, 0x54, 0x60, 0x48, 0x65, 0x18, 0xd2, 0xcd, 0x5f, 0x32, 0x88, 0x0e, 0x35, 0xfd + }; + + public static object CreateContentCipher(bool forEncryption, ICipherParameters encKey, + AlgorithmIdentifier encryptionAlgID) + { + DerObjectIdentifier encAlg = encryptionAlgID.Algorithm; + + if (encAlg.Equals(PkcsObjectIdentifiers.rc4)) + { + IStreamCipher cipher = new RC4Engine(); + cipher.Init(forEncryption, encKey); + return cipher; + } + else + { + BufferedBlockCipher cipher = CreateCipher(encryptionAlgID.Algorithm); + Asn1Object sParams = encryptionAlgID.Parameters.ToAsn1Object(); + + if (sParams != null && !(sParams is DerNull)) + { + if (encAlg.Equals(PkcsObjectIdentifiers.DesEde3Cbc) + || encAlg.Equals(AlgorithmIdentifierFactory.IDEA_CBC) + || encAlg.Equals(NistObjectIdentifiers.IdAes128Cbc) + || encAlg.Equals(NistObjectIdentifiers.IdAes192Cbc) + || encAlg.Equals(NistObjectIdentifiers.IdAes256Cbc) + || encAlg.Equals(NttObjectIdentifiers.IdCamellia128Cbc) + || encAlg.Equals(NttObjectIdentifiers.IdCamellia192Cbc) + || encAlg.Equals(NttObjectIdentifiers.IdCamellia256Cbc) + || encAlg.Equals(KisaObjectIdentifiers.IdSeedCbc) + || encAlg.Equals(OiwObjectIdentifiers.DesCbc)) + { + cipher.Init(forEncryption, new ParametersWithIV(encKey, + Asn1OctetString.GetInstance(sParams).GetOctets())); + } + else if (encAlg.Equals(AlgorithmIdentifierFactory.CAST5_CBC)) + { + Cast5CbcParameters cbcParams = Cast5CbcParameters.GetInstance(sParams); + + cipher.Init(forEncryption, new ParametersWithIV(encKey, cbcParams.GetIV())); + } + else if (encAlg.Equals(PkcsObjectIdentifiers.RC2Cbc)) + { + RC2CbcParameter cbcParams = RC2CbcParameter.GetInstance(sParams); + + cipher.Init(forEncryption, new ParametersWithIV(new RC2Parameters(((KeyParameter)encKey).GetKey(), rc2Ekb[cbcParams.RC2ParameterVersion.IntValue]), cbcParams.GetIV())); + } + else + { + throw new InvalidOperationException("cannot match parameters"); + } + } + else + { + if (encAlg.Equals(PkcsObjectIdentifiers.DesEde3Cbc) + || encAlg.Equals(AlgorithmIdentifierFactory.IDEA_CBC) + || encAlg.Equals(AlgorithmIdentifierFactory.CAST5_CBC)) + { + cipher.Init(forEncryption, new ParametersWithIV(encKey, new byte[8])); + } + else + { + cipher.Init(forEncryption, encKey); + } + } + + return cipher; + } + } + + private static BufferedBlockCipher CreateCipher(DerObjectIdentifier algorithm) + { + IBlockCipherMode cipher; + + if (NistObjectIdentifiers.IdAes128Cbc.Equals(algorithm) + || NistObjectIdentifiers.IdAes192Cbc.Equals(algorithm) + || NistObjectIdentifiers.IdAes256Cbc.Equals(algorithm)) + { + cipher = new CbcBlockCipher(AesUtilities.CreateEngine()); + } + else if (PkcsObjectIdentifiers.DesEde3Cbc.Equals(algorithm)) + { + cipher = new CbcBlockCipher(new DesEdeEngine()); + } + else if (OiwObjectIdentifiers.DesCbc.Equals(algorithm)) + { + cipher = new CbcBlockCipher(new DesEngine()); + } + else if (PkcsObjectIdentifiers.RC2Cbc.Equals(algorithm)) + { + cipher = new CbcBlockCipher(new RC2Engine()); + } + else if (MiscObjectIdentifiers.cast5CBC.Equals(algorithm)) + { + cipher = new CbcBlockCipher(new Cast5Engine()); + } + else + { + throw new InvalidOperationException("cannot recognise cipher: " + algorithm); + } + + return new PaddedBufferedBlockCipher(cipher, new Pkcs7Padding()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs.meta new file mode 100644 index 00000000..c6a49655 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f98da949918d7e48bbc642576f52373 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs new file mode 100644 index 00000000..f04784a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities +{ + public static class CipherKeyGeneratorFactory + { + /** + * Create a key generator for the passed in Object Identifier. + * + * @param algorithm the Object Identifier indicating the algorithn the generator is for. + * @param random a source of random to initialise the generator with. + * @return an initialised CipherKeyGenerator. + * @throws IllegalArgumentException if the algorithm cannot be identified. + */ + public static CipherKeyGenerator CreateKeyGenerator(DerObjectIdentifier algorithm, SecureRandom random) + { + if (NistObjectIdentifiers.IdAes128Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else if (NistObjectIdentifiers.IdAes192Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 192); + } + else if (NistObjectIdentifiers.IdAes256Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 256); + } + else if (PkcsObjectIdentifiers.DesEde3Cbc.Equals(algorithm)) + { + DesEdeKeyGenerator keyGen = new DesEdeKeyGenerator(); + keyGen.Init(new KeyGenerationParameters(random, 192)); + return keyGen; + } + else if (NttObjectIdentifiers.IdCamellia128Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else if (NttObjectIdentifiers.IdCamellia192Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 192); + } + else if (NttObjectIdentifiers.IdCamellia256Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 256); + } + else if (KisaObjectIdentifiers.IdSeedCbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else if (AlgorithmIdentifierFactory.CAST5_CBC.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else if (OiwObjectIdentifiers.DesCbc.Equals(algorithm)) + { + DesKeyGenerator keyGen = new DesKeyGenerator(); + keyGen.Init(new KeyGenerationParameters(random, 64)); + return keyGen; + } + else if (PkcsObjectIdentifiers.rc4.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else if (PkcsObjectIdentifiers.RC2Cbc.Equals(algorithm)) + { + return CreateCipherKeyGenerator(random, 128); + } + else + { + throw new InvalidOperationException("cannot recognise cipher: " + algorithm); + } + } + + private static CipherKeyGenerator CreateCipherKeyGenerator(SecureRandom random, int keySize) + { + CipherKeyGenerator keyGen = new CipherKeyGenerator(); + keyGen.Init(new KeyGenerationParameters(random, keySize)); + return keyGen; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs.meta new file mode 100644 index 00000000..2eac26d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd8ebdb99f9824346b8a6814ae72f7d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/CipherKeyGeneratorFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs new file mode 100644 index 00000000..bca1842f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs @@ -0,0 +1,760 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +#endif +using System.Diagnostics; +using System.Runtime.CompilerServices; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities +{ + internal static class Pack + { + internal static void UInt16_To_BE(ushort n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt16BigEndian(bs, n); +#else + bs[0] = (byte)(n >> 8); + bs[1] = (byte)n; +#endif + } + + internal static void UInt16_To_BE(ushort n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt16BigEndian(bs.AsSpan(off), n); +#else + bs[off] = (byte)(n >> 8); + bs[off + 1] = (byte)n; +#endif + } + + internal static void UInt16_To_BE(ushort[] ns, byte[] bs, int off) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt16_To_BE(ns[i], bs, off); + off += 2; + } + } + + internal static void UInt16_To_BE(ushort[] ns, int nsOff, int nsLen, byte[] bs, int bsOff) + { + for (int i = 0; i < nsLen; ++i) + { + UInt16_To_BE(ns[nsOff + i], bs, bsOff); + bsOff += 2; + } + } + + internal static byte[] UInt16_To_BE(ushort n) + { + byte[] bs = new byte[2]; + UInt16_To_BE(n, bs, 0); + return bs; + } + + internal static byte[] UInt16_To_BE(ushort[] ns) + { + return UInt16_To_BE(ns, 0, ns.Length); + } + + internal static byte[] UInt16_To_BE(ushort[] ns, int nsOff, int nsLen) + { + byte[] bs = new byte[2 * nsLen]; + UInt16_To_BE(ns, nsOff, nsLen, bs, 0); + return bs; + } + + internal static ushort BE_To_UInt16(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt16BigEndian(bs.AsSpan(off)); +#else + uint n = (uint)bs[off] << 8 + | bs[off + 1]; + return (ushort)n; +#endif + } + + internal static void BE_To_UInt16(byte[] bs, int bsOff, ushort[] ns, int nsOff) + { + ns[nsOff] = BE_To_UInt16(bs, bsOff); + } + + internal static ushort[] BE_To_UInt16(byte[] bs) + { + return BE_To_UInt16(bs, 0, bs.Length); + } + + internal static ushort[] BE_To_UInt16(byte[] bs, int off, int len) + { + if ((len & 1) != 0) + throw new ArgumentException("must be a multiple of 2", "len"); + + ushort[] ns = new ushort[len / 2]; + for (int i = 0; i < len; i += 2) + { + BE_To_UInt16(bs, off + i, ns, i >> 1); + } + return ns; + } + + internal static void UInt32_To_BE(uint n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32BigEndian(bs, n); +#else + bs[0] = (byte)(n >> 24); + bs[1] = (byte)(n >> 16); + bs[2] = (byte)(n >> 8); + bs[3] = (byte)n; +#endif + } + + internal static void UInt32_To_BE(uint n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32BigEndian(bs.AsSpan(off), n); +#else + bs[off] = (byte)(n >> 24); + bs[off + 1] = (byte)(n >> 16); + bs[off + 2] = (byte)(n >> 8); + bs[off + 3] = (byte)n; +#endif + } + + internal static void UInt32_To_BE(uint[] ns, byte[] bs, int off) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt32_To_BE(ns[i], bs, off); + off += 4; + } + } + + internal static void UInt32_To_BE(uint[] ns, int nsOff, int nsLen, byte[] bs, int bsOff) + { + for (int i = 0; i < nsLen; ++i) + { + UInt32_To_BE(ns[nsOff + i], bs, bsOff); + bsOff += 4; + } + } + + internal static byte[] UInt32_To_BE(uint n) + { + byte[] bs = new byte[4]; + UInt32_To_BE(n, bs, 0); + return bs; + } + + internal static byte[] UInt32_To_BE(uint[] ns) + { + byte[] bs = new byte[4 * ns.Length]; + UInt32_To_BE(ns, bs, 0); + return bs; + } + + internal static uint BE_To_UInt32(byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt32BigEndian(bs); +#else + return (uint)bs[0] << 24 + | (uint)bs[1] << 16 + | (uint)bs[2] << 8 + | bs[3]; +#endif + } + + internal static uint BE_To_UInt32(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt32BigEndian(bs.AsSpan(off)); +#else + return (uint)bs[off] << 24 + | (uint)bs[off + 1] << 16 + | (uint)bs[off + 2] << 8 + | bs[off + 3]; +#endif + } + + internal static uint BE_To_UInt32_Partial(byte[] bs, int off, int len) + { + Debug.Assert(1 <= len && len <= 4); + + uint result = bs[off]; + for (int i = 1; i < len; ++i) + { + result <<= 8; + result |= bs[off + i]; + } + return result; + } + + internal static void BE_To_UInt32(byte[] bs, int off, uint[] ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = BE_To_UInt32(bs, off); + off += 4; + } + } + + internal static void BE_To_UInt32(byte[] bs, int bsOff, uint[] ns, int nsOff, int nsLen) + { + for (int i = 0; i < nsLen; ++i) + { + ns[nsOff + i] = BE_To_UInt32(bs, bsOff); + bsOff += 4; + } + } + + internal static byte[] UInt64_To_BE(ulong n) + { + byte[] bs = new byte[8]; + UInt64_To_BE(n, bs, 0); + return bs; + } + + internal static void UInt64_To_BE(ulong n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt64BigEndian(bs, n); +#else + UInt32_To_BE((uint)(n >> 32), bs); + UInt32_To_BE((uint)n, bs, 4); +#endif + } + + internal static void UInt64_To_BE(ulong n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt64BigEndian(bs.AsSpan(off), n); +#else + UInt32_To_BE((uint)(n >> 32), bs, off); + UInt32_To_BE((uint)n, bs, off + 4); +#endif + } + + internal static byte[] UInt64_To_BE(ulong[] ns) + { + byte[] bs = new byte[8 * ns.Length]; + UInt64_To_BE(ns, bs, 0); + return bs; + } + + internal static void UInt64_To_BE(ulong[] ns, byte[] bs, int off) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt64_To_BE(ns[i], bs, off); + off += 8; + } + } + + internal static void UInt64_To_BE(ulong[] ns, int nsOff, int nsLen, byte[] bs, int bsOff) + { + for (int i = 0; i < nsLen; ++i) + { + UInt64_To_BE(ns[nsOff + i], bs, bsOff); + bsOff += 8; + } + } + + internal static ulong BE_To_UInt64(byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt64BigEndian(bs); +#else + uint hi = BE_To_UInt32(bs); + uint lo = BE_To_UInt32(bs, 4); + return ((ulong)hi << 32) | (ulong)lo; +#endif + } + + internal static ulong BE_To_UInt64(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt64BigEndian(bs.AsSpan(off)); +#else + uint hi = BE_To_UInt32(bs, off); + uint lo = BE_To_UInt32(bs, off + 4); + return ((ulong)hi << 32) | (ulong)lo; +#endif + } + + internal static ulong BE_To_UInt64_Partial(byte[] bs, int off, int len) + { + Debug.Assert(1 <= len && len <= 8); + + ulong result = bs[off]; + for (int i = 1; i < len; ++i) + { + result <<= 8; + result |= bs[off + i]; + } + return result; + } + + internal static void BE_To_UInt64(byte[] bs, int off, ulong[] ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = BE_To_UInt64(bs, off); + off += 8; + } + } + + internal static void BE_To_UInt64(byte[] bs, int bsOff, ulong[] ns, int nsOff, int nsLen) + { + for (int i = 0; i < nsLen; ++i) + { + ns[nsOff + i] = BE_To_UInt64(bs, bsOff); + bsOff += 8; + } + } + + internal static void UInt16_To_LE(ushort n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt16LittleEndian(bs, n); +#else + bs[0] = (byte)n; + bs[1] = (byte)(n >> 8); +#endif + } + + internal static void UInt16_To_LE(ushort n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt16LittleEndian(bs.AsSpan(off), n); +#else + bs[off] = (byte)n; + bs[off + 1] = (byte)(n >> 8); +#endif + } + + internal static byte[] UInt16_To_LE(ushort n) + { + byte[] bs = new byte[2]; + UInt16_To_LE(n, bs, 0); + return bs; + } + + internal static ushort LE_To_UInt16(byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt16LittleEndian(bs); +#else + uint n = bs[0] + | (uint)bs[1] << 8; + return (ushort)n; +#endif + } + + internal static ushort LE_To_UInt16(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt16LittleEndian(bs.AsSpan(off)); +#else + uint n = bs[off] + | (uint)bs[off + 1] << 8; + return (ushort)n; +#endif + } + + internal static byte[] UInt32_To_LE(uint n) + { + byte[] bs = new byte[4]; + UInt32_To_LE(n, bs, 0); + return bs; + } + + internal static void UInt32_To_LE(uint n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32LittleEndian(bs, n); +#else + bs[0] = (byte)n; + bs[1] = (byte)(n >> 8); + bs[2] = (byte)(n >> 16); + bs[3] = (byte)(n >> 24); +#endif + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt32_To_LE(uint n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32LittleEndian(bs.AsSpan(off), n); +#else + bs[off] = (byte)n; + bs[off + 1] = (byte)(n >> 8); + bs[off + 2] = (byte)(n >> 16); + bs[off + 3] = (byte)(n >> 24); +#endif + } + + internal static byte[] UInt32_To_LE(uint[] ns) + { + byte[] bs = new byte[4 * ns.Length]; + UInt32_To_LE(ns, bs, 0); + return bs; + } + + internal static void UInt32_To_LE(uint[] ns, byte[] bs, int off) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt32_To_LE(ns[i], bs, off); + off += 4; + } + } + + internal static void UInt32_To_LE(uint[] ns, int nsOff, int nsLen, byte[] bs, int bsOff) + { + for (int i = 0; i < nsLen; ++i) + { + UInt32_To_LE(ns[nsOff + i], bs, bsOff); + bsOff += 4; + } + } + + internal static uint LE_To_UInt24(byte[] bs, int off) + { + return bs[off] + | (uint)bs[off + 1] << 8 + | (uint)bs[off + 2] << 16; + } + + internal static uint LE_To_UInt32(byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt32LittleEndian(bs); +#else + return bs[0] + | (uint)bs[1] << 8 + | (uint)bs[2] << 16 + | (uint)bs[3] << 24; +#endif + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static uint LE_To_UInt32(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt32LittleEndian(bs.AsSpan(off)); +#else + return bs[off] + | (uint)bs[off + 1] << 8 + | (uint)bs[off + 2] << 16 + | (uint)bs[off + 3] << 24; +#endif + } + + internal static void LE_To_UInt32(byte[] bs, int off, uint[] ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = LE_To_UInt32(bs, off); + off += 4; + } + } + + internal static void LE_To_UInt32(byte[] bs, int bOff, uint[] ns, int nOff, int count) + { + for (int i = 0; i < count; ++i) + { + ns[nOff + i] = LE_To_UInt32(bs, bOff); + bOff += 4; + } + } + + internal static uint[] LE_To_UInt32(byte[] bs, int off, int count) + { + uint[] ns = new uint[count]; + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = LE_To_UInt32(bs, off); + off += 4; + } + return ns; + } + + internal static byte[] UInt64_To_LE(ulong n) + { + byte[] bs = new byte[8]; + UInt64_To_LE(n, bs, 0); + return bs; + } + + internal static void UInt64_To_LE(ulong n, byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt64LittleEndian(bs, n); +#else + UInt32_To_LE((uint)n, bs); + UInt32_To_LE((uint)(n >> 32), bs, 4); +#endif + } + + internal static void UInt64_To_LE(ulong n, byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt64LittleEndian(bs.AsSpan(off), n); +#else + UInt32_To_LE((uint)n, bs, off); + UInt32_To_LE((uint)(n >> 32), bs, off + 4); +#endif + } + + internal static byte[] UInt64_To_LE(ulong[] ns) + { + byte[] bs = new byte[8 * ns.Length]; + UInt64_To_LE(ns, bs, 0); + return bs; + } + + internal static void UInt64_To_LE(ulong[] ns, byte[] bs, int off) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt64_To_LE(ns[i], bs, off); + off += 8; + } + } + + internal static void UInt64_To_LE(ulong[] ns, int nsOff, int nsLen, byte[] bs, int bsOff) + { + for (int i = 0; i < nsLen; ++i) + { + UInt64_To_LE(ns[nsOff + i], bs, bsOff); + bsOff += 8; + } + } + + internal static ulong LE_To_UInt64(byte[] bs) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt64LittleEndian(bs); +#else + uint lo = LE_To_UInt32(bs); + uint hi = LE_To_UInt32(bs, 4); + return ((ulong)hi << 32) | (ulong)lo; +#endif + } + + internal static ulong LE_To_UInt64(byte[] bs, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReadUInt64LittleEndian(bs.AsSpan(off)); +#else + uint lo = LE_To_UInt32(bs, off); + uint hi = LE_To_UInt32(bs, off + 4); + return ((ulong)hi << 32) | (ulong)lo; +#endif + } + + internal static void LE_To_UInt64(byte[] bs, int off, ulong[] ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = LE_To_UInt64(bs, off); + off += 8; + } + } + + internal static void LE_To_UInt64(byte[] bs, int bsOff, ulong[] ns, int nsOff, int nsLen) + { + for (int i = 0; i < nsLen; ++i) + { + ns[nsOff + i] = LE_To_UInt64(bs, bsOff); + bsOff += 8; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static uint BE_To_UInt32(ReadOnlySpan bs) + { + return BinaryPrimitives.ReadUInt32BigEndian(bs); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void BE_To_UInt32(ReadOnlySpan bs, Span ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = BE_To_UInt32(bs); + bs = bs[4..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static uint BE_To_UInt32_Partial(ReadOnlySpan bs) + { + int len = bs.Length; + Debug.Assert(1 <= len && len <= 4); + + uint result = bs[0]; + for (int i = 1; i < len; ++i) + { + result <<= 8; + result |= bs[i]; + } + return result; + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ulong BE_To_UInt64(ReadOnlySpan bs) + { + return BinaryPrimitives.ReadUInt64BigEndian(bs); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void BE_To_UInt64(ReadOnlySpan bs, Span ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = BE_To_UInt64(bs); + bs = bs[8..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ulong BE_To_UInt64_Partial(ReadOnlySpan bs) + { + int len = bs.Length; + Debug.Assert(1 <= len && len <= 8); + + ulong result = bs[0]; + for (int i = 1; i < len; ++i) + { + result <<= 8; + result |= bs[i]; + } + return result; + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ushort LE_To_UInt16(ReadOnlySpan bs) + { + return BinaryPrimitives.ReadUInt16LittleEndian(bs); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static uint LE_To_UInt32(ReadOnlySpan bs) + { + return BinaryPrimitives.ReadUInt32LittleEndian(bs); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void LE_To_UInt32(ReadOnlySpan bs, Span ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = LE_To_UInt32(bs); + bs = bs[4..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ulong LE_To_UInt64(ReadOnlySpan bs) + { + return BinaryPrimitives.ReadUInt64LittleEndian(bs); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void LE_To_UInt64(ReadOnlySpan bs, Span ns) + { + for (int i = 0; i < ns.Length; ++i) + { + ns[i] = LE_To_UInt64(bs); + bs = bs[8..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt16_To_BE(ushort n, Span bs) + { + BinaryPrimitives.WriteUInt16BigEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt16_To_LE(ushort n, Span bs) + { + BinaryPrimitives.WriteUInt16LittleEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt32_To_BE(uint n, Span bs) + { + BinaryPrimitives.WriteUInt32BigEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt32_To_BE(ReadOnlySpan ns, Span bs) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt32_To_BE(ns[i], bs); + bs = bs[4..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt32_To_LE(uint n, Span bs) + { + BinaryPrimitives.WriteUInt32LittleEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt32_To_LE(ReadOnlySpan ns, Span bs) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt32_To_LE(ns[i], bs); + bs = bs[4..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt64_To_BE(ulong n, Span bs) + { + BinaryPrimitives.WriteUInt64BigEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt64_To_BE(ReadOnlySpan ns, Span bs) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt64_To_BE(ns[i], bs); + bs = bs[8..]; + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt64_To_LE(ulong n, Span bs) + { + BinaryPrimitives.WriteUInt64LittleEndian(bs, n); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void UInt64_To_LE(ReadOnlySpan ns, Span bs) + { + for (int i = 0; i < ns.Length; ++i) + { + UInt64_To_LE(ns[i], bs); + bs = bs[8..]; + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs.meta new file mode 100644 index 00000000..6ff43dbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1c2ac9bc12a27b64b876a7edeb5623d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/crypto/util/Pack.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math.meta new file mode 100644 index 00000000..fd0904c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4f975f0a08f4fa54c9e9e721efc35d94 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs new file mode 100644 index 00000000..b88bb6c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs @@ -0,0 +1,3803 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Diagnostics; +using System.Globalization; +#if NETCOREAPP3_0_OR_GREATER +using System.Numerics; +#endif +using System.Runtime.Serialization; +using System.Text; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math +{ + [Serializable] + public sealed class BigInteger + : IComparable, IEquatable + { + // The first few odd primes + /* + 3 5 7 11 13 17 19 23 29 + 31 37 41 43 47 53 59 61 67 71 + 73 79 83 89 97 101 103 107 109 113 + 127 131 137 139 149 151 157 163 167 173 + 179 181 191 193 197 199 211 223 227 229 + 233 239 241 251 257 263 269 271 277 281 + 283 293 307 311 313 317 331 337 347 349 + 353 359 367 373 379 383 389 397 401 409 + 419 421 431 433 439 443 449 457 461 463 + 467 479 487 491 499 503 509 521 523 541 + 547 557 563 569 571 577 587 593 599 601 + 607 613 617 619 631 641 643 647 653 659 + 661 673 677 683 691 701 709 719 727 733 + 739 743 751 757 761 769 773 787 797 809 + 811 821 823 827 829 839 853 857 859 863 + 877 881 883 887 907 911 919 929 937 941 + 947 953 967 971 977 983 991 997 1009 + 1013 1019 1021 1031 1033 1039 1049 1051 + 1061 1063 1069 1087 1091 1093 1097 1103 + 1109 1117 1123 1129 1151 1153 1163 1171 + 1181 1187 1193 1201 1213 1217 1223 1229 + 1231 1237 1249 1259 1277 1279 1283 1289 + */ + + // Each list has a product < 2^31 + internal static readonly int[][] primeLists = new int[][] + { + new int[]{ 3, 5, 7, 11, 13, 17, 19, 23 }, + new int[]{ 29, 31, 37, 41, 43 }, + new int[]{ 47, 53, 59, 61, 67 }, + new int[]{ 71, 73, 79, 83 }, + new int[]{ 89, 97, 101, 103 }, + + new int[]{ 107, 109, 113, 127 }, + new int[]{ 131, 137, 139, 149 }, + new int[]{ 151, 157, 163, 167 }, + new int[]{ 173, 179, 181, 191 }, + new int[]{ 193, 197, 199, 211 }, + + new int[]{ 223, 227, 229 }, + new int[]{ 233, 239, 241 }, + new int[]{ 251, 257, 263 }, + new int[]{ 269, 271, 277 }, + new int[]{ 281, 283, 293 }, + + new int[]{ 307, 311, 313 }, + new int[]{ 317, 331, 337 }, + new int[]{ 347, 349, 353 }, + new int[]{ 359, 367, 373 }, + new int[]{ 379, 383, 389 }, + + new int[]{ 397, 401, 409 }, + new int[]{ 419, 421, 431 }, + new int[]{ 433, 439, 443 }, + new int[]{ 449, 457, 461 }, + new int[]{ 463, 467, 479 }, + + new int[]{ 487, 491, 499 }, + new int[]{ 503, 509, 521 }, + new int[]{ 523, 541, 547 }, + new int[]{ 557, 563, 569 }, + new int[]{ 571, 577, 587 }, + + new int[]{ 593, 599, 601 }, + new int[]{ 607, 613, 617 }, + new int[]{ 619, 631, 641 }, + new int[]{ 643, 647, 653 }, + new int[]{ 659, 661, 673 }, + + new int[]{ 677, 683, 691 }, + new int[]{ 701, 709, 719 }, + new int[]{ 727, 733, 739 }, + new int[]{ 743, 751, 757 }, + new int[]{ 761, 769, 773 }, + + new int[]{ 787, 797, 809 }, + new int[]{ 811, 821, 823 }, + new int[]{ 827, 829, 839 }, + new int[]{ 853, 857, 859 }, + new int[]{ 863, 877, 881 }, + + new int[]{ 883, 887, 907 }, + new int[]{ 911, 919, 929 }, + new int[]{ 937, 941, 947 }, + new int[]{ 953, 967, 971 }, + new int[]{ 977, 983, 991 }, + + new int[]{ 997, 1009, 1013 }, + new int[]{ 1019, 1021, 1031 }, + new int[]{ 1033, 1039, 1049 }, + new int[]{ 1051, 1061, 1063 }, + new int[]{ 1069, 1087, 1091 }, + + new int[]{ 1093, 1097, 1103 }, + new int[]{ 1109, 1117, 1123 }, + new int[]{ 1129, 1151, 1153 }, + new int[]{ 1163, 1171, 1181 }, + new int[]{ 1187, 1193, 1201 }, + + new int[]{ 1213, 1217, 1223 }, + new int[]{ 1229, 1231, 1237 }, + new int[]{ 1249, 1259, 1277 }, + new int[]{ 1279, 1283, 1289 }, + }; + + internal static readonly int[] primeProducts; + + private const long IMASK = 0xFFFFFFFFL; + private const ulong UIMASK = 0xFFFFFFFFUL; + + private static readonly int[] ZeroMagnitude = new int[0]; + private static readonly byte[] ZeroEncoding = new byte[0]; + + private static readonly BigInteger[] SMALL_CONSTANTS = new BigInteger[17]; + public static readonly BigInteger Zero; + public static readonly BigInteger One; + public static readonly BigInteger Two; + public static readonly BigInteger Three; + public static readonly BigInteger Four; + public static readonly BigInteger Ten; + +#if !NETCOREAPP3_0_OR_GREATER + private readonly static byte[] BitLengthTable = + { + 0, 1, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4, 4, 4, 4, 4, + 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, + 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, + 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, + 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, + 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, + 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, + 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, + 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8, 8 + }; +#endif + + // TODO Parse radix-2 64 bits at a time and radix-8 63 bits at a time + private const int chunk2 = 1, chunk8 = 1, chunk10 = 19, chunk16 = 16; + private static readonly BigInteger radix2, radix2E, radix8, radix8E, radix10, radix10E, radix16, radix16E; + + /* + * These are the threshold bit-lengths (of an exponent) where we increase the window size. + * They are calculated according to the expected savings in multiplications. + * Some squares will also be saved on average, but we offset these against the extra storage costs. + */ + private static readonly int[] ExpWindowThresholds = { 7, 25, 81, 241, 673, 1793, 4609, int.MaxValue }; + + private const int BitsPerByte = 8; + private const int BitsPerInt = 32; + private const int BytesPerInt = 4; + + static BigInteger() + { + Zero = new BigInteger(0, ZeroMagnitude, false); + Zero.nBits = 0; Zero.nBitLength = 0; + + SMALL_CONSTANTS[0] = Zero; + for (uint i = 1; i < SMALL_CONSTANTS.Length; ++i) + { + SMALL_CONSTANTS[i] = CreateUValueOf(i); + } + + One = SMALL_CONSTANTS[1]; + Two = SMALL_CONSTANTS[2]; + Three = SMALL_CONSTANTS[3]; + Four = SMALL_CONSTANTS[4]; + Ten = SMALL_CONSTANTS[10]; + + radix2 = ValueOf(2); + radix2E = radix2.Pow(chunk2); + + radix8 = ValueOf(8); + radix8E = radix8.Pow(chunk8); + + radix10 = ValueOf(10); + radix10E = radix10.Pow(chunk10); + + radix16 = ValueOf(16); + radix16E = radix16.Pow(chunk16); + + primeProducts = new int[primeLists.Length]; + + for (int i = 0; i < primeLists.Length; ++i) + { + int[] primeList = primeLists[i]; + int product = primeList[0]; + for (int j = 1; j < primeList.Length; ++j) + { + product *= primeList[j]; + } + primeProducts[i] = product; + } + } + + private int[] magnitude; // array of ints with [0] being the most significant + private int sign; // -1 means -ve; +1 means +ve; 0 means 0; + + [NonSerialized] + private int nBits = -1; // cache BitCount() value + [NonSerialized] + private int nBitLength = -1; // cache BitLength() value + + [OnDeserialized] + private void OnDeserialized(StreamingContext context) + { + this.nBits = -1; + this.nBitLength = -1; + } + + private static int GetByteLength(int nBits) + { + return (nBits + BitsPerByte - 1) / BitsPerByte; + } + + public static BigInteger Arbitrary(int sizeInBits) + { + return new BigInteger(sizeInBits, SecureRandom.ArbitraryRandom); + } + + private BigInteger( + int signum, + int[] mag, + bool checkMag) + { + if (checkMag) + { + int i = 0; + while (i < mag.Length && mag[i] == 0) + { + ++i; + } + + if (i == mag.Length) + { + this.sign = 0; + this.magnitude = ZeroMagnitude; + } + else + { + this.sign = signum; + + if (i == 0) + { + this.magnitude = mag; + } + else + { + // strip leading 0 words + this.magnitude = new int[mag.Length - i]; + Array.Copy(mag, i, this.magnitude, 0, this.magnitude.Length); + } + } + } + else + { + this.sign = signum; + this.magnitude = mag; + } + } + + public BigInteger( + string value) + : this(value, 10) + { + } + + public BigInteger( + string str, + int radix) + { + if (str.Length == 0) + throw new FormatException("Zero length BigInteger"); + + NumberStyles style; + int chunk; + BigInteger r; + BigInteger rE; + + switch (radix) + { + case 2: + // Is there anyway to restrict to binary digits? + style = NumberStyles.Integer; + chunk = chunk2; + r = radix2; + rE = radix2E; + break; + case 8: + // Is there anyway to restrict to octal digits? + style = NumberStyles.Integer; + chunk = chunk8; + r = radix8; + rE = radix8E; + break; + case 10: + // This style seems to handle spaces and minus sign already (our processing redundant?) + style = NumberStyles.Integer; + chunk = chunk10; + r = radix10; + rE = radix10E; + break; + case 16: + // TODO Should this be HexNumber? + style = NumberStyles.AllowHexSpecifier; + chunk = chunk16; + r = radix16; + rE = radix16E; + break; + default: + throw new FormatException("Only bases 2, 8, 10, or 16 allowed"); + } + + + int index = 0; + sign = 1; + + if (str[0] == '-') + { + if (str.Length == 1) + throw new FormatException("Zero length BigInteger"); + + sign = -1; + index = 1; + } + + // strip leading zeros from the string str + while (index < str.Length && int.Parse(str[index].ToString(), style) == 0) + { + index++; + } + + if (index >= str.Length) + { + // zero value - we're done + sign = 0; + magnitude = ZeroMagnitude; + return; + } + + ////// + // could we work out the max number of ints required to store + // str.Length digits in the given base, then allocate that + // storage in one hit?, then Generate the magnitude in one hit too? + ////// + + BigInteger b = Zero; + + + int next = index + chunk; + + if (next <= str.Length) + { + do + { + string s = str.Substring(index, chunk); + ulong i = ulong.Parse(s, style); + BigInteger bi = CreateUValueOf(i); + + switch (radix) + { + case 2: + // TODO Need this because we are parsing in radix 10 above + if (i >= 2) + throw new FormatException("Bad character in radix 2 string: " + s); + + // TODO Parse 64 bits at a time + b = b.ShiftLeft(1); + break; + case 8: + // TODO Need this because we are parsing in radix 10 above + if (i >= 8) + throw new FormatException("Bad character in radix 8 string: " + s); + + // TODO Parse 63 bits at a time + b = b.ShiftLeft(3); + break; + case 16: + b = b.ShiftLeft(64); + break; + default: + b = b.Multiply(rE); + break; + } + + b = b.Add(bi); + + index = next; + next += chunk; + } + while (next <= str.Length); + } + + if (index < str.Length) + { + string s = str.Substring(index); + ulong i = ulong.Parse(s, style); + BigInteger bi = CreateUValueOf(i); + + if (b.sign > 0) + { + if (radix == 2) + { + // NB: Can't reach here since we are parsing one char at a time + Debug.Assert(false); + + // TODO Parse all bits at once +// b = b.ShiftLeft(s.Length); + } + else if (radix == 8) + { + // NB: Can't reach here since we are parsing one char at a time + Debug.Assert(false); + + // TODO Parse all bits at once +// b = b.ShiftLeft(s.Length * 3); + } + else if (radix == 16) + { + b = b.ShiftLeft(s.Length << 2); + } + else + { + b = b.Multiply(r.Pow(s.Length)); + } + + b = b.Add(bi); + } + else + { + b = bi; + } + } + + // Note: This is the previous (slower) algorithm +// while (index < value.Length) +// { +// char c = value[index]; +// string s = c.ToString(); +// int i = int.Parse(s, style); +// +// b = b.Multiply(r).Add(ValueOf(i)); +// index++; +// } + + magnitude = b.magnitude; + } + + public BigInteger( + byte[] bytes) + : this(bytes, 0, bytes.Length) + { + } + + public BigInteger( + byte[] bytes, + int offset, + int length) + { + if (length == 0) + throw new FormatException("Zero length BigInteger"); + + // TODO Move this processing into MakeMagnitude (provide sign argument) + if ((sbyte)bytes[offset] < 0) + { + this.sign = -1; + + int end = offset + length; + + int iBval; + // strip leading sign bytes + for (iBval = offset; iBval < end && ((sbyte)bytes[iBval] == -1); iBval++) + { + } + + if (iBval >= end) + { + this.magnitude = One.magnitude; + } + else + { + int numBytes = end - iBval; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span inverse = numBytes <= 512 + ? stackalloc byte[numBytes] + : new byte[numBytes]; +#else + byte[] inverse = new byte[numBytes]; +#endif + + int index = 0; + while (index < numBytes) + { + inverse[index++] = (byte)~bytes[iBval++]; + } + + Debug.Assert(iBval == end); + + while (inverse[--index] == byte.MaxValue) + { + inverse[index] = byte.MinValue; + } + + inverse[index]++; + + this.magnitude = MakeMagnitude(inverse); + } + } + else + { + // strip leading zero bytes and return magnitude bytes + this.magnitude = MakeMagnitude(bytes, offset, length); + this.sign = this.magnitude.Length > 0 ? 1 : 0; + } + } + + private static int[] MakeMagnitude(byte[] bytes) + { + return MakeMagnitude(bytes, 0, bytes.Length); + } + + private static int[] MakeMagnitude(byte[] bytes, int offset, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return MakeMagnitude(bytes.AsSpan(offset, length)); +#else + int end = offset + length; + + // strip leading zeros + int firstSignificant; + for (firstSignificant = offset; firstSignificant < end && bytes[firstSignificant] == 0; firstSignificant++) + { + } + + if (firstSignificant >= end) + return ZeroMagnitude; + + int nInts = (end - firstSignificant + 3) / BytesPerInt; + int bCount = (end - firstSignificant) % BytesPerInt; + if (bCount == 0) + { + bCount = BytesPerInt; + } + + if (nInts < 1) + return ZeroMagnitude; + + int[] mag = new int[nInts]; + + int v = 0; + int magnitudeIndex = 0; + for (int i = firstSignificant; i < end; ++i) + { + v <<= 8; + v |= bytes[i] & 0xff; + bCount--; + if (bCount <= 0) + { + mag[magnitudeIndex] = v; + magnitudeIndex++; + bCount = BytesPerInt; + v = 0; + } + } + + if (magnitudeIndex < mag.Length) + { + mag[magnitudeIndex] = v; + } + + return mag; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int[] MakeMagnitude(ReadOnlySpan bytes) + { + int end = bytes.Length; + + // strip leading zeros + int firstSignificant; + for (firstSignificant = 0; firstSignificant < end && bytes[firstSignificant] == 0; firstSignificant++) + { + } + + if (firstSignificant >= end) + return ZeroMagnitude; + + int nInts = (end - firstSignificant + 3) / BytesPerInt; + int bCount = (end - firstSignificant) % BytesPerInt; + if (bCount == 0) + { + bCount = BytesPerInt; + } + + if (nInts < 1) + return ZeroMagnitude; + + int[] mag = new int[nInts]; + + int v = 0; + int magnitudeIndex = 0; + for (int i = firstSignificant; i < end; ++i) + { + v <<= 8; + v |= bytes[i] & 0xff; + bCount--; + if (bCount <= 0) + { + mag[magnitudeIndex] = v; + magnitudeIndex++; + bCount = BytesPerInt; + v = 0; + } + } + + if (magnitudeIndex < mag.Length) + { + mag[magnitudeIndex] = v; + } + + return mag; + } +#endif + + public BigInteger(int sign, byte[] bytes) + : this(sign, bytes, 0, bytes.Length) + { + } + + public BigInteger(int sign, byte[] bytes, int offset, int length) + { + if (sign < -1 || sign > 1) + throw new FormatException("Invalid sign value"); + + if (sign == 0) + { + this.sign = 0; + this.magnitude = ZeroMagnitude; + } + else + { + // copy bytes + this.magnitude = MakeMagnitude(bytes, offset, length); + this.sign = this.magnitude.Length < 1 ? 0 : sign; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public BigInteger(int sign, ReadOnlySpan bytes) + { + if (sign < -1 || sign > 1) + throw new FormatException("Invalid sign value"); + + if (sign == 0) + { + this.sign = 0; + this.magnitude = ZeroMagnitude; + } + else + { + // copy bytes + this.magnitude = MakeMagnitude(bytes); + this.sign = this.magnitude.Length < 1 ? 0 : sign; + } + } +#endif + + public BigInteger( + int sizeInBits, + Random random) + { + if (sizeInBits < 0) + throw new ArgumentException("sizeInBits must be non-negative"); + + this.nBits = -1; + this.nBitLength = -1; + + if (sizeInBits == 0) + { + this.sign = 0; + this.magnitude = ZeroMagnitude; + return; + } + + int nBytes = GetByteLength(sizeInBits); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span b = nBytes <= 512 + ? stackalloc byte[nBytes] + : new byte[nBytes]; +#else + byte[] b = new byte[nBytes]; +#endif + random.NextBytes(b); + + // strip off any excess bits in the MSB + int xBits = BitsPerByte * nBytes - sizeInBits; + b[0] &= (byte)(255U >> xBits); + + this.magnitude = MakeMagnitude(b); + this.sign = this.magnitude.Length < 1 ? 0 : 1; + } + + public BigInteger( + int bitLength, + int certainty, + Random random) + { + if (bitLength < 2) + throw new ArithmeticException("bitLength < 2"); + + this.sign = 1; + this.nBitLength = bitLength; + + if (bitLength == 2) + { + this.magnitude = random.Next(2) == 0 + ? Two.magnitude + : Three.magnitude; + return; + } + + int nBytes = GetByteLength(bitLength); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span b = nBytes <= 512 + ? stackalloc byte[nBytes] + : new byte[nBytes]; +#else + byte[] b = new byte[nBytes]; +#endif + + int xBits = BitsPerByte * nBytes - bitLength; + byte mask = (byte)(255U >> xBits); + byte lead = (byte)(1 << (7 - xBits)); + + for (;;) + { + random.NextBytes(b); + + // strip off any excess bits in the MSB + b[0] &= mask; + + // ensure the leading bit is 1 (to meet the strength requirement) + b[0] |= lead; + + // ensure the trailing bit is 1 (i.e. must be odd) + b[nBytes - 1] |= 1; + + this.magnitude = MakeMagnitude(b); + this.nBits = -1; + + if (certainty < 1) + break; + + if (CheckProbablePrime(certainty, random, true)) + break; + + for (int j = 1; j < (magnitude.Length - 1); ++j) + { + this.magnitude[j] ^= random.Next(); + + if (CheckProbablePrime(certainty, random, true)) + return; + } + } + } + + public BigInteger Abs() + { + return sign >= 0 ? this : Negate(); + } + + /** + * return a = a + b - b preserved. + */ + private static int[] AddMagnitudes( + int[] a, + int[] b) + { + int tI = a.Length - 1; + int vI = b.Length - 1; + long m = 0; + + while (vI >= 0) + { + m += ((long)(uint)a[tI] + (long)(uint)b[vI--]); + a[tI--] = (int)m; + m = (long)((ulong)m >> 32); + } + + if (m != 0) + { + while (tI >= 0 && ++a[tI--] == 0) + { + } + } + + return a; + } + + public BigInteger Add( + BigInteger value) + { + if (this.sign == 0) + return value; + + if (this.sign != value.sign) + { + if (value.sign == 0) + return this; + + if (value.sign < 0) + return Subtract(value.Negate()); + + return value.Subtract(Negate()); + } + + return AddToMagnitude(value.magnitude); + } + + private BigInteger AddToMagnitude( + int[] magToAdd) + { + int[] big, small; + if (this.magnitude.Length < magToAdd.Length) + { + big = magToAdd; + small = this.magnitude; + } + else + { + big = this.magnitude; + small = magToAdd; + } + + // Conservatively avoid over-allocation when no overflow possible + uint limit = uint.MaxValue; + if (big.Length == small.Length) + limit -= (uint) small[0]; + + bool possibleOverflow = (uint) big[0] >= limit; + + int[] bigCopy; + if (possibleOverflow) + { + bigCopy = new int[big.Length + 1]; + big.CopyTo(bigCopy, 1); + } + else + { + bigCopy = (int[]) big.Clone(); + } + + bigCopy = AddMagnitudes(bigCopy, small); + + return new BigInteger(this.sign, bigCopy, possibleOverflow); + } + + public BigInteger And( + BigInteger value) + { + if (this.sign == 0 || value.sign == 0) + { + return Zero; + } + + int[] aMag = this.sign > 0 + ? this.magnitude + : Add(One).magnitude; + + int[] bMag = value.sign > 0 + ? value.magnitude + : value.Add(One).magnitude; + + bool resultNeg = sign < 0 && value.sign < 0; + int resultLength = System.Math.Max(aMag.Length, bMag.Length); + int[] resultMag = new int[resultLength]; + + int aStart = resultMag.Length - aMag.Length; + int bStart = resultMag.Length - bMag.Length; + + for (int i = 0; i < resultMag.Length; ++i) + { + int aWord = i >= aStart ? aMag[i - aStart] : 0; + int bWord = i >= bStart ? bMag[i - bStart] : 0; + + if (this.sign < 0) + { + aWord = ~aWord; + } + + if (value.sign < 0) + { + bWord = ~bWord; + } + + resultMag[i] = aWord & bWord; + + if (resultNeg) + { + resultMag[i] = ~resultMag[i]; + } + } + + BigInteger result = new BigInteger(1, resultMag, true); + + // TODO Optimise this case + if (resultNeg) + { + result = result.Not(); + } + + return result; + } + + public BigInteger AndNot( + BigInteger val) + { + return And(val.Not()); + } + + public int BitCount + { + get + { + if (nBits == -1) + { + if (sign < 0) + { + // TODO Optimise this case + nBits = Not().BitCount; + } + else + { + int sum = 0; + for (int i = 0; i < magnitude.Length; ++i) + { + sum += BitCnt(magnitude[i]); + } + nBits = sum; + } + } + + return nBits; + } + } + + public static int BitCnt(int i) + { +#if NETCOREAPP3_0_OR_GREATER + return BitOperations.PopCount((uint)i); +#else + uint u = (uint)i; + u = u - ((u >> 1) & 0x55555555); + u = (u & 0x33333333) + ((u >> 2) & 0x33333333); + u = (u + (u >> 4)) & 0x0f0f0f0f; + u += (u >> 8); + u += (u >> 16); + u &= 0x3f; + return (int)u; +#endif + } + + private static int CalcBitLength(int sign, int indx, int[] mag) + { + for (;;) + { + if (indx >= mag.Length) + return 0; + + if (mag[indx] != 0) + break; + + ++indx; + } + + // bit length for everything after the first int + int bitLength = 32 * ((mag.Length - indx) - 1); + + // and determine bitlength of first int + int firstMag = mag[indx]; + bitLength += BitLen(firstMag); + + // Check for negative powers of two + if (sign < 0 && ((firstMag & -firstMag) == firstMag)) + { + do + { + if (++indx >= mag.Length) + { + --bitLength; + break; + } + } + while (mag[indx] == 0); + } + + return bitLength; + } + + public int BitLength + { + get + { + if (nBitLength == -1) + { + nBitLength = sign == 0 + ? 0 + : CalcBitLength(sign, 0, magnitude); + } + + return nBitLength; + } + } + + private static int BitLen(byte b) + { +#if NETCOREAPP3_0_OR_GREATER + return 32 - BitOperations.LeadingZeroCount((uint)b); +#else + return BitLengthTable[b]; +#endif + } + + private static int BitLen(int w) + { +#if NETCOREAPP3_0_OR_GREATER + return 32 - BitOperations.LeadingZeroCount((uint)w); +#else + uint v = (uint)w; + uint t = v >> 24; + if (t != 0) + return 24 + BitLengthTable[t]; + t = v >> 16; + if (t != 0) + return 16 + BitLengthTable[t]; + t = v >> 8; + if (t != 0) + return 8 + BitLengthTable[t]; + return BitLengthTable[v]; +#endif + } + + private bool QuickPow2Check() + { + return sign > 0 && nBits == 1; + } + + public int CompareTo(BigInteger other) + { + if (other == null) + return 1; + + return sign < other.sign + ? -1 + : sign > other.sign + ? 1 + : sign == 0 + ? 0 + : sign * CompareNoLeadingZeroes(0, magnitude, 0, other.magnitude); + } + + /** + * unsigned comparison on two arrays - note the arrays may + * start with leading zeros. + */ + private static int CompareTo( + int xIndx, + int[] x, + int yIndx, + int[] y) + { + while (xIndx != x.Length && x[xIndx] == 0) + { + xIndx++; + } + + while (yIndx != y.Length && y[yIndx] == 0) + { + yIndx++; + } + + return CompareNoLeadingZeroes(xIndx, x, yIndx, y); + } + + private static int CompareNoLeadingZeroes( + int xIndx, + int[] x, + int yIndx, + int[] y) + { + int diff = (x.Length - y.Length) - (xIndx - yIndx); + + if (diff != 0) + { + return diff < 0 ? -1 : 1; + } + + // lengths of magnitudes the same, test the magnitude values + + while (xIndx < x.Length) + { + uint v1 = (uint)x[xIndx++]; + uint v2 = (uint)y[yIndx++]; + + if (v1 != v2) + return v1 < v2 ? -1 : 1; + } + + return 0; + } + + /** + * return z = x / y - done in place (z value preserved, x contains the + * remainder) + */ + private int[] Divide( + int[] x, + int[] y) + { + int xStart = 0; + while (xStart < x.Length && x[xStart] == 0) + { + ++xStart; + } + + int yStart = 0; + while (yStart < y.Length && y[yStart] == 0) + { + ++yStart; + } + + Debug.Assert(yStart < y.Length); + + int xyCmp = CompareNoLeadingZeroes(xStart, x, yStart, y); + int[] count; + + if (xyCmp > 0) + { + int yBitLength = CalcBitLength(1, yStart, y); + int xBitLength = CalcBitLength(1, xStart, x); + int shift = xBitLength - yBitLength; + + int[] iCount; + int iCountStart = 0; + + int[] c; + int cStart = 0; + int cBitLength = yBitLength; + if (shift > 0) + { +// iCount = ShiftLeft(One.magnitude, shift); + iCount = new int[(shift >> 5) + 1]; + iCount[0] = 1 << (shift % 32); + + c = ShiftLeft(y, shift); + cBitLength += shift; + } + else + { + iCount = new int[] { 1 }; + + int len = y.Length - yStart; + c = new int[len]; + Array.Copy(y, yStart, c, 0, len); + } + + count = new int[iCount.Length]; + + for (;;) + { + if (cBitLength < xBitLength + || CompareNoLeadingZeroes(xStart, x, cStart, c) >= 0) + { + Subtract(xStart, x, cStart, c); + AddMagnitudes(count, iCount); + + while (x[xStart] == 0) + { + if (++xStart == x.Length) + return count; + } + + //xBitLength = CalcBitLength(xStart, x); + xBitLength = 32 * (x.Length - xStart - 1) + BitLen(x[xStart]); + + if (xBitLength <= yBitLength) + { + if (xBitLength < yBitLength) + return count; + + xyCmp = CompareNoLeadingZeroes(xStart, x, yStart, y); + + if (xyCmp <= 0) + break; + } + } + + shift = cBitLength - xBitLength; + + // NB: The case where c[cStart] is 1-bit is harmless + if (shift == 1) + { + uint firstC = (uint) c[cStart] >> 1; + uint firstX = (uint) x[xStart]; + if (firstC > firstX) + ++shift; + } + + if (shift < 2) + { + ShiftRightOneInPlace(cStart, c); + --cBitLength; + ShiftRightOneInPlace(iCountStart, iCount); + } + else + { + ShiftRightInPlace(cStart, c, shift); + cBitLength -= shift; + ShiftRightInPlace(iCountStart, iCount, shift); + } + + //cStart = c.Length - ((cBitLength + 31) / 32); + while (c[cStart] == 0) + { + ++cStart; + } + + while (iCount[iCountStart] == 0) + { + ++iCountStart; + } + } + } + else + { + count = new int[1]; + } + + if (xyCmp == 0) + { + AddMagnitudes(count, One.magnitude); + Array.Clear(x, xStart, x.Length - xStart); + } + + return count; + } + + public BigInteger Divide( + BigInteger val) + { + if (val.sign == 0) + throw new ArithmeticException("Division by zero error"); + + if (sign == 0) + return Zero; + + if (val.QuickPow2Check()) // val is power of two + { + BigInteger result = this.Abs().ShiftRight(val.Abs().BitLength - 1); + return val.sign == this.sign ? result : result.Negate(); + } + + int[] mag = (int[]) this.magnitude.Clone(); + + return new BigInteger(this.sign * val.sign, Divide(mag, val.magnitude), true); + } + + public BigInteger[] DivideAndRemainder( + BigInteger val) + { + if (val.sign == 0) + throw new ArithmeticException("Division by zero error"); + + BigInteger[] biggies = new BigInteger[2]; + + if (sign == 0) + { + biggies[0] = Zero; + biggies[1] = Zero; + } + else if (val.QuickPow2Check()) // val is power of two + { + int e = val.Abs().BitLength - 1; + BigInteger quotient = this.Abs().ShiftRight(e); + int[] remainder = this.LastNBits(e); + + biggies[0] = val.sign == this.sign ? quotient : quotient.Negate(); + biggies[1] = new BigInteger(this.sign, remainder, true); + } + else + { + int[] remainder = (int[]) this.magnitude.Clone(); + int[] quotient = Divide(remainder, val.magnitude); + + biggies[0] = new BigInteger(this.sign * val.sign, quotient, true); + biggies[1] = new BigInteger(this.sign, remainder, true); + } + + return biggies; + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + if (!(obj is BigInteger biggie)) + return false; + + return sign == biggie.sign && IsEqualMagnitude(biggie); + } + + public bool Equals(BigInteger other) + { + if (other == this) + return true; + if (other == null) + return false; + + return sign == other.sign && IsEqualMagnitude(other); + } + + private bool IsEqualMagnitude(BigInteger x) + { + int[] xMag = x.magnitude; + if (magnitude.Length != x.magnitude.Length) + return false; + for (int i = 0; i < magnitude.Length; i++) + { + if (magnitude[i] != x.magnitude[i]) + return false; + } + return true; + } + + public BigInteger Gcd( + BigInteger value) + { + if (value.sign == 0) + return Abs(); + + if (sign == 0) + return value.Abs(); + + BigInteger r; + BigInteger u = this; + BigInteger v = value; + + while (v.sign != 0) + { + r = u.Mod(v); + u = v; + v = r; + } + + return u; + } + + public override int GetHashCode() + { + int hc = magnitude.Length; + if (magnitude.Length > 0) + { + hc ^= magnitude[0]; + + if (magnitude.Length > 1) + { + hc ^= magnitude[magnitude.Length - 1]; + } + } + + return sign < 0 ? ~hc : hc; + } + + // TODO Make public? + private BigInteger Inc() + { + if (this.sign == 0) + return One; + + if (this.sign < 0) + return new BigInteger(-1, doSubBigLil(this.magnitude, One.magnitude), true); + + return AddToMagnitude(One.magnitude); + } + + public int IntValue + { + get + { + if (sign == 0) + return 0; + + int n = magnitude.Length; + + int v = magnitude[n - 1]; + + return sign < 0 ? -v : v; + } + } + + public int IntValueExact + { + get + { + if (BitLength > 31) + throw new ArithmeticException("BigInteger out of int range"); + + return IntValue; + } + } + + /** + * return whether or not a BigInteger is probably prime with a + * probability of 1 - (1/2)**certainty. + *

From Knuth Vol 2, pg 395.

+ */ + public bool IsProbablePrime(int certainty) + { + return IsProbablePrime(certainty, false); + } + + internal bool IsProbablePrime(int certainty, bool randomlySelected) + { + if (certainty <= 0) + return true; + + BigInteger n = Abs(); + + if (!n.TestBit(0)) + return n.Equals(Two); + + if (n.Equals(One)) + return false; + + return n.CheckProbablePrime(certainty, SecureRandom.ArbitraryRandom, randomlySelected); + } + + private bool CheckProbablePrime(int certainty, Random random, bool randomlySelected) + { + Debug.Assert(certainty > 0); + Debug.Assert(CompareTo(Two) > 0); + Debug.Assert(TestBit(0)); + + + // Try to reduce the penalty for really small numbers + int numLists = System.Math.Min(BitLength - 1, primeLists.Length); + + for (int i = 0; i < numLists; ++i) + { + int test = Remainder(primeProducts[i]); + + int[] primeList = primeLists[i]; + for (int j = 0; j < primeList.Length; ++j) + { + int prime = primeList[j]; + int qRem = test % prime; + if (qRem == 0) + { + // We may find small numbers in the list + return BitLength < 16 && IntValue == prime; + } + } + } + + + // TODO Special case for < 10^16 (RabinMiller fixed list) +// if (BitLength < 30) +// { +// RabinMiller against 2, 3, 5, 7, 11, 13, 23 is sufficient +// } + + + // TODO Is it worth trying to create a hybrid of these two? + return RabinMillerTest(certainty, random, randomlySelected); +// return SolovayStrassenTest(certainty, random); + +// bool rbTest = RabinMillerTest(certainty, random); +// bool ssTest = SolovayStrassenTest(certainty, random); +// +// Debug.Assert(rbTest == ssTest); +// +// return rbTest; + } + + public bool RabinMillerTest(int certainty, Random random) + { + return RabinMillerTest(certainty, random, false); + } + + internal bool RabinMillerTest(int certainty, Random random, bool randomlySelected) + { + int bits = BitLength; + + Debug.Assert(certainty > 0); + Debug.Assert(bits > 2); + Debug.Assert(TestBit(0)); + + int iterations = ((certainty - 1) / 2) + 1; + if (randomlySelected) + { + int itersFor100Cert = bits >= 1024 ? 4 + : bits >= 512 ? 8 + : bits >= 256 ? 16 + : 50; + + if (certainty < 100) + { + iterations = System.Math.Min(itersFor100Cert, iterations); + } + else + { + iterations -= 50; + iterations += itersFor100Cert; + } + } + + // let n = 1 + d . 2^s + BigInteger n = this; + int s = n.GetLowestSetBitMaskFirst(-1 << 1); + Debug.Assert(s >= 1); + BigInteger r = n.ShiftRight(s); + + // NOTE: Avoid conversion to/from Montgomery form and check for R/-R as result instead + + BigInteger montRadix = One.ShiftLeft(32 * n.magnitude.Length).Remainder(n); + BigInteger minusMontRadix = n.Subtract(montRadix); + + do + { + BigInteger a; + do + { + a = new BigInteger(n.BitLength, random); + } + while (a.sign == 0 || a.CompareTo(n) >= 0 + || a.IsEqualMagnitude(montRadix) || a.IsEqualMagnitude(minusMontRadix)); + + BigInteger y = ModPowMonty(a, r, n, false); + + if (!y.Equals(montRadix)) + { + int j = 0; + while (!y.Equals(minusMontRadix)) + { + if (++j == s) + return false; + + y = ModPowMonty(y, Two, n, false); + + if (y.Equals(montRadix)) + return false; + } + } + } + while (--iterations > 0); + + return true; + } + +// private bool SolovayStrassenTest( +// int certainty, +// Random random) +// { +// Debug.Assert(certainty > 0); +// Debug.Assert(CompareTo(Two) > 0); +// Debug.Assert(TestBit(0)); +// +// BigInteger n = this; +// BigInteger nMinusOne = n.Subtract(One); +// BigInteger e = nMinusOne.ShiftRight(1); +// +// do +// { +// BigInteger a; +// do +// { +// a = new BigInteger(nBitLength, random); +// } +// // NB: Spec says 0 < x < n, but 1 is trivial +// while (a.CompareTo(One) <= 0 || a.CompareTo(n) >= 0); +// +// +// // TODO Check this is redundant given the way Jacobi() works? +//// if (!a.Gcd(n).Equals(One)) +//// return false; +// +// int x = Jacobi(a, n); +// +// if (x == 0) +// return false; +// +// BigInteger check = a.ModPow(e, n); +// +// if (x == 1 && !check.Equals(One)) +// return false; +// +// if (x == -1 && !check.Equals(nMinusOne)) +// return false; +// +// --certainty; +// } +// while (certainty > 0); +// +// return true; +// } +// +// private static int Jacobi( +// BigInteger a, +// BigInteger b) +// { +// Debug.Assert(a.sign >= 0); +// Debug.Assert(b.sign > 0); +// Debug.Assert(b.TestBit(0)); +// Debug.Assert(a.CompareTo(b) < 0); +// +// int totalS = 1; +// for (;;) +// { +// if (a.sign == 0) +// return 0; +// +// if (a.Equals(One)) +// break; +// +// int e = a.GetLowestSetBit(); +// +// int bLsw = b.magnitude[b.magnitude.Length - 1]; +// if ((e & 1) != 0 && ((bLsw & 7) == 3 || (bLsw & 7) == 5)) +// totalS = -totalS; +// +// // TODO Confirm this is faster than later a1.Equals(One) test +// if (a.BitLength == e + 1) +// break; +// BigInteger a1 = a.ShiftRight(e); +//// if (a1.Equals(One)) +//// break; +// +// int a1Lsw = a1.magnitude[a1.magnitude.Length - 1]; +// if ((bLsw & 3) == 3 && (a1Lsw & 3) == 3) +// totalS = -totalS; +// +//// a = b.Mod(a1); +// a = b.Remainder(a1); +// b = a1; +// } +// return totalS; +// } + + public long LongValue + { + get + { + if (sign == 0) + return 0; + + int n = magnitude.Length; + + long v = magnitude[n - 1] & IMASK; + if (n > 1) + { + v |= (magnitude[n - 2] & IMASK) << 32; + } + + return sign < 0 ? -v : v; + } + } + + public long LongValueExact + { + get + { + if (BitLength > 63) + throw new ArithmeticException("BigInteger out of long range"); + + return LongValue; + } + } + + public BigInteger Max( + BigInteger value) + { + return CompareTo(value) > 0 ? this : value; + } + + public BigInteger Min( + BigInteger value) + { + return CompareTo(value) < 0 ? this : value; + } + + public BigInteger Mod( + BigInteger m) + { + if (m.sign < 1) + throw new ArithmeticException("Modulus must be positive"); + + BigInteger biggie = Remainder(m); + + return (biggie.sign >= 0 ? biggie : biggie.Add(m)); + } + + public BigInteger ModInverse( + BigInteger m) + { + if (m.sign < 1) + throw new ArithmeticException("Modulus must be positive"); + + // TODO Too slow at the moment +// // "Fast Key Exchange with Elliptic Curve Systems" R.Schoeppel +// if (m.TestBit(0)) +// { +// //The Almost Inverse Algorithm +// int k = 0; +// BigInteger B = One, C = Zero, F = this, G = m, tmp; +// +// for (;;) +// { +// // While F is even, do F=F/u, C=C*u, k=k+1. +// int zeroes = F.GetLowestSetBit(); +// if (zeroes > 0) +// { +// F = F.ShiftRight(zeroes); +// C = C.ShiftLeft(zeroes); +// k += zeroes; +// } +// +// // If F = 1, then return B,k. +// if (F.Equals(One)) +// { +// BigInteger half = m.Add(One).ShiftRight(1); +// BigInteger halfK = half.ModPow(ValueOf(k), m); +// return B.Multiply(halfK).Mod(m); +// } +// +// if (F.CompareTo(G) < 0) +// { +// tmp = G; G = F; F = tmp; +// tmp = B; B = C; C = tmp; +// } +// +// F = F.Add(G); +// B = B.Add(C); +// } +// } + + if (m.QuickPow2Check()) + { + return ModInversePow2(m); + } + + BigInteger d = this.Remainder(m); + BigInteger x; + BigInteger gcd = ExtEuclid(d, m, out x); + + if (!gcd.Equals(One)) + throw new ArithmeticException("Numbers not relatively prime."); + + if (x.sign < 0) + { + x = x.Add(m); + } + + return x; + } + + private BigInteger ModInversePow2(BigInteger m) + { + Debug.Assert(m.SignValue > 0); + Debug.Assert(m.BitCount == 1); + + if (!TestBit(0)) + { + throw new ArithmeticException("Numbers not relatively prime."); + } + + int pow = m.BitLength - 1; + + long inv64 = (long)Raw.Mod.Inverse64((ulong)LongValue); + if (pow < 64) + { + inv64 &= ((1L << pow) - 1); + } + + BigInteger x = ValueOf(inv64); + + if (pow > 64) + { + BigInteger d = this.Remainder(m); + int bitsCorrect = 64; + + do + { + BigInteger t = x.Multiply(d).Remainder(m); + x = x.Multiply(Two.Subtract(t)).Remainder(m); + bitsCorrect <<= 1; + } + while (bitsCorrect < pow); + } + + if (x.sign < 0) + { + x = x.Add(m); + } + + return x; + } + + /** + * Calculate the numbers u1, u2, and u3 such that: + * + * u1 * a + u2 * b = u3 + * + * where u3 is the greatest common divider of a and b. + * a and b using the extended Euclid algorithm (refer p. 323 + * of The Art of Computer Programming vol 2, 2nd ed). + * This also seems to have the side effect of calculating + * some form of multiplicative inverse. + * + * @param a First number to calculate gcd for + * @param b Second number to calculate gcd for + * @param u1Out the return object for the u1 value + * @return The greatest common divisor of a and b + */ + private static BigInteger ExtEuclid(BigInteger a, BigInteger b, out BigInteger u1Out) + { + BigInteger u1 = One, v1 = Zero; + BigInteger u3 = a, v3 = b; + + if (v3.sign > 0) + { + for (;;) + { + BigInteger[] q = u3.DivideAndRemainder(v3); + u3 = v3; + v3 = q[1]; + + BigInteger oldU1 = u1; + u1 = v1; + + if (v3.sign <= 0) + break; + + v1 = oldU1.Subtract(v1.Multiply(q[0])); + } + } + + u1Out = u1; + + return u3; + } + + private static void ZeroOut( + int[] x) + { + Array.Clear(x, 0, x.Length); + } + + public BigInteger ModPow(BigInteger e, BigInteger m) + { + if (m.sign < 1) + throw new ArithmeticException("Modulus must be positive"); + + if (m.Equals(One)) + return Zero; + + if (e.sign == 0) + return One; + + if (sign == 0) + return Zero; + + bool negExp = e.sign < 0; + if (negExp) + e = e.Negate(); + + BigInteger result = this.Mod(m); + if (!e.Equals(One)) + { + if ((m.magnitude[m.magnitude.Length - 1] & 1) == 0) + { + result = ModPowBarrett(result, e, m); + } + else + { + result = ModPowMonty(result, e, m, true); + } + } + + if (negExp) + result = result.ModInverse(m); + + return result; + } + + private static BigInteger ModPowBarrett(BigInteger b, BigInteger e, BigInteger m) + { + int k = m.magnitude.Length; + BigInteger mr = One.ShiftLeft((k + 1) << 5); + BigInteger yu = One.ShiftLeft(k << 6).Divide(m); + + // Sliding window from MSW to LSW + int extraBits = 0, expLength = e.BitLength; + while (expLength > ExpWindowThresholds[extraBits]) + { + ++extraBits; + } + + int numPowers = 1 << extraBits; + BigInteger[] oddPowers = new BigInteger[numPowers]; + oddPowers[0] = b; + + BigInteger b2 = ReduceBarrett(b.Square(), m, mr, yu); + + for (int i = 1; i < numPowers; ++i) + { + oddPowers[i] = ReduceBarrett(oddPowers[i - 1].Multiply(b2), m, mr, yu); + } + + int[] windowList = GetWindowList(e.magnitude, extraBits); + Debug.Assert(windowList.Length > 0); + + int window = windowList[0]; + int mult = window & 0xFF, lastZeroes = window >> 8; + + BigInteger y; + if (mult == 1) + { + y = b2; + --lastZeroes; + } + else + { + y = oddPowers[mult >> 1]; + } + + int windowPos = 1; + while ((window = windowList[windowPos++]) != -1) + { + mult = window & 0xFF; + + int bits = lastZeroes + BitLen((byte)mult); + for (int j = 0; j < bits; ++j) + { + y = ReduceBarrett(y.Square(), m, mr, yu); + } + + y = ReduceBarrett(y.Multiply(oddPowers[mult >> 1]), m, mr, yu); + + lastZeroes = window >> 8; + } + + for (int i = 0; i < lastZeroes; ++i) + { + y = ReduceBarrett(y.Square(), m, mr, yu); + } + + return y; + } + + private static BigInteger ReduceBarrett(BigInteger x, BigInteger m, BigInteger mr, BigInteger yu) + { + int xLen = x.BitLength, mLen = m.BitLength; + if (xLen < mLen) + return x; + + if (xLen - mLen > 1) + { + int k = m.magnitude.Length; + + BigInteger q1 = x.DivideWords(k - 1); + BigInteger q2 = q1.Multiply(yu); // TODO Only need partial multiplication here + BigInteger q3 = q2.DivideWords(k + 1); + + BigInteger r1 = x.RemainderWords(k + 1); + BigInteger r2 = q3.Multiply(m); // TODO Only need partial multiplication here + BigInteger r3 = r2.RemainderWords(k + 1); + + x = r1.Subtract(r3); + if (x.sign < 0) + { + x = x.Add(mr); + } + } + + while (x.CompareTo(m) >= 0) + { + x = x.Subtract(m); + } + + return x; + } + + private static BigInteger ModPowMonty(BigInteger b, BigInteger e, BigInteger m, bool convert) + { + int n = m.magnitude.Length; + int powR = 32 * n; + bool smallMontyModulus = m.BitLength + 2 <= powR; + uint mDash = (uint)m.GetMQuote(); + + // tmp = this * R mod m + if (convert) + { + b = b.ShiftLeft(powR).Remainder(m); + } + + int[] yAccum = new int[n + 1]; + + int[] zVal = b.magnitude; + Debug.Assert(zVal.Length <= n); + if (zVal.Length < n) + { + int[] tmp = new int[n]; + zVal.CopyTo(tmp, n - zVal.Length); + zVal = tmp; + } + + // Sliding window from MSW to LSW + + int extraBits = 0; + + // Filter the common case of small RSA exponents with few bits set + if (e.magnitude.Length > 1 || e.BitCount > 2) + { + int expLength = e.BitLength; + while (expLength > ExpWindowThresholds[extraBits]) + { + ++extraBits; + } + } + + int numPowers = 1 << extraBits; + int[][] oddPowers = new int[numPowers][]; + oddPowers[0] = zVal; + + int[] zSquared = Arrays.Clone(zVal); + SquareMonty(yAccum, zSquared, m.magnitude, mDash, smallMontyModulus); + + for (int i = 1; i < numPowers; ++i) + { + oddPowers[i] = Arrays.Clone(oddPowers[i - 1]); + MultiplyMonty(yAccum, oddPowers[i], zSquared, m.magnitude, mDash, smallMontyModulus); + } + + int[] windowList = GetWindowList(e.magnitude, extraBits); + Debug.Assert(windowList.Length > 1); + + int window = windowList[0]; + int mult = window & 0xFF, lastZeroes = window >> 8; + + int[] yVal; + if (mult == 1) + { + yVal = zSquared; + --lastZeroes; + } + else + { + yVal = Arrays.Clone(oddPowers[mult >> 1]); + } + + int windowPos = 1; + while ((window = windowList[windowPos++]) != -1) + { + mult = window & 0xFF; + + int bits = lastZeroes + BitLen((byte)mult); + for (int j = 0; j < bits; ++j) + { + SquareMonty(yAccum, yVal, m.magnitude, mDash, smallMontyModulus); + } + + MultiplyMonty(yAccum, yVal, oddPowers[mult >> 1], m.magnitude, mDash, smallMontyModulus); + + lastZeroes = window >> 8; + } + + for (int i = 0; i < lastZeroes; ++i) + { + SquareMonty(yAccum, yVal, m.magnitude, mDash, smallMontyModulus); + } + + if (convert) + { + // Return y * R^(-1) mod m + MontgomeryReduce(yVal, m.magnitude, mDash); + } + else if (smallMontyModulus && CompareTo(0, yVal, 0, m.magnitude) >= 0) + { + Subtract(0, yVal, 0, m.magnitude); + } + + return new BigInteger(1, yVal, true); + } + + private static int[] GetWindowList(int[] mag, int extraBits) + { + int v = mag[0]; + Debug.Assert(v != 0); + + int leadingBits = BitLen(v); + + int resultSize = (((mag.Length - 1) << 5) + leadingBits) / (1 + extraBits) + 2; + int[] result = new int[resultSize]; + int resultPos = 0; + + int bitPos = 33 - leadingBits; + v <<= bitPos; + + int mult = 1, multLimit = 1 << extraBits; + int zeroes = 0; + + int i = 0; + for (; ; ) + { + for (; bitPos < 32; ++bitPos) + { + if (mult < multLimit) + { + mult = (mult << 1) | (int)((uint)v >> 31); + } + else if (v < 0) + { + result[resultPos++] = CreateWindowEntry(mult, zeroes); + mult = 1; + zeroes = 0; + } + else + { + ++zeroes; + } + + v <<= 1; + } + + if (++i == mag.Length) + { + result[resultPos++] = CreateWindowEntry(mult, zeroes); + break; + } + + v = mag[i]; + bitPos = 0; + } + + result[resultPos] = -1; + return result; + } + + private static int CreateWindowEntry(int mult, int zeroes) + { + Debug.Assert(mult > 0); + +#if NETCOREAPP3_0_OR_GREATER + int tz = BitOperations.TrailingZeroCount(mult); + mult >>= tz; + zeroes += tz; +#else + while ((mult & 1) == 0) + { + mult >>= 1; + ++zeroes; + } +#endif + + return mult | (zeroes << 8); + } + + /** + * return w with w = x * x - w is assumed to have enough space. + */ + private static int[] Square( + int[] w, + int[] x) + { + // Note: this method allows w to be only (2 * x.Length - 1) words if result will fit +// if (w.Length != 2 * x.Length) +// throw new ArgumentException("no I don't think so..."); + + ulong c; + + int wBase = w.Length - 1; + + for (int i = x.Length - 1; i > 0; --i) + { + ulong v = (uint)x[i]; + + c = v * v + (uint)w[wBase]; + w[wBase] = (int)c; + c >>= 32; + + for (int j = i - 1; j >= 0; --j) + { + ulong prod = v * (uint)x[j]; + + c += ((uint)w[--wBase] & UIMASK) + ((uint)prod << 1); + w[wBase] = (int)c; + c = (c >> 32) + (prod >> 31); + } + + c += (uint)w[--wBase]; + w[wBase] = (int)c; + + if (--wBase >= 0) + { + w[wBase] = (int)(c >> 32); + } + else + { + Debug.Assert((c >> 32) == 0); + } + + wBase += i; + } + + c = (uint)x[0]; + + c = c * c + (uint)w[wBase]; + w[wBase] = (int)c; + + if (--wBase >= 0) + { + w[wBase] += (int)(c >> 32); + } + else + { + Debug.Assert((c >> 32) == 0); + } + + return w; + } + + /** + * return x with x = y * z - x is assumed to have enough space. + */ + private static int[] Multiply(int[] x, int[] y, int[] z) + { + int i = z.Length; + + if (i < 1) + return x; + + int xBase = x.Length - y.Length; + + do + { + long a = z[--i] & IMASK; + long val = 0; + + if (a != 0) + { + for (int j = y.Length - 1; j >= 0; j--) + { + val += a * (y[j] & IMASK) + (x[xBase + j] & IMASK); + + x[xBase + j] = (int)val; + + val = (long)((ulong)val >> 32); + } + } + + --xBase; + + if (xBase >= 0) + { + x[xBase] = (int)val; + } + else + { + Debug.Assert(val == 0); + } + } + while (i > 0); + + return x; + } + + /** + * Calculate mQuote = -m^(-1) mod b with b = 2^32 (32 = word size) + */ + private int GetMQuote() + { + Debug.Assert(this.sign > 0); + + int d = -magnitude[magnitude.Length - 1]; + + Debug.Assert((d & 1) != 0); + + return (int)Raw.Mod.Inverse32((uint)d); + } + + private static void MontgomeryReduce(int[] x, int[] m, uint mDash) // mDash = -m^(-1) mod b + { + // NOTE: Not a general purpose reduction (which would allow x up to twice the bitlength of m) + Debug.Assert(x.Length == m.Length); + + int n = m.Length; + + for (int i = n - 1; i >= 0; --i) + { + uint x0 = (uint)x[n - 1]; + ulong t = x0 * mDash; + + ulong carry = t * (uint)m[n - 1] + x0; + Debug.Assert((uint)carry == 0); + carry >>= 32; + + for (int j = n - 2; j >= 0; --j) + { + carry += t * (uint)m[j] + (uint)x[j]; + x[j + 1] = (int)carry; + carry >>= 32; + } + + x[0] = (int)carry; + Debug.Assert(carry >> 32 == 0); + } + + if (CompareTo(0, x, 0, m) >= 0) + { + Subtract(0, x, 0, m); + } + } + + /** + * Montgomery multiplication: a = x * y * R^(-1) mod m + *
+ * Based algorithm 14.36 of Handbook of Applied Cryptography. + *
+ *
  • m, x, y should have length n
  • + *
  • a should have length (n + 1)
  • + *
  • b = 2^32, R = b^n
  • + *
    + * The result is put in x + *
    + * NOTE: the indices of x, y, m, a different in HAC and in Java + */ + private static void MultiplyMonty(int[] a, int[] x, int[] y, int[] m, uint mDash, bool smallMontyModulus) + // mDash = -m^(-1) mod b + { + int n = m.Length; + + if (n == 1) + { + x[0] = (int)MultiplyMontyNIsOne((uint)x[0], (uint)y[0], (uint)m[0], mDash); + return; + } + + uint y0 = (uint)y[n - 1]; + int aMax; + + { + ulong xi = (uint)x[n - 1]; + + ulong carry = xi * y0; + ulong t = (uint)carry * mDash; + + ulong prod2 = t * (uint)m[n - 1]; + carry += (uint)prod2; + Debug.Assert((uint)carry == 0); + carry = (carry >> 32) + (prod2 >> 32); + + for (int j = n - 2; j >= 0; --j) + { + ulong prod1 = xi * (uint)y[j]; + prod2 = t * (uint)m[j]; + + carry += (prod1 & UIMASK) + (uint)prod2; + a[j + 2] = (int)carry; + carry = (carry >> 32) + (prod1 >> 32) + (prod2 >> 32); + } + + a[1] = (int)carry; + aMax = (int)(carry >> 32); + } + + for (int i = n - 2; i >= 0; --i) + { + uint a0 = (uint)a[n]; + ulong xi = (uint)x[i]; + + ulong prod1 = xi * y0; + ulong carry = (prod1 & UIMASK) + a0; + ulong t = (uint)carry * mDash; + + ulong prod2 = t * (uint)m[n - 1]; + carry += (uint)prod2; + Debug.Assert((uint)carry == 0); + carry = (carry >> 32) + (prod1 >> 32) + (prod2 >> 32); + + for (int j = n - 2; j >= 0; --j) + { + prod1 = xi * (uint)y[j]; + prod2 = t * (uint)m[j]; + + carry += (prod1 & UIMASK) + (uint)prod2 + (uint)a[j + 1]; + a[j + 2] = (int)carry; + carry = (carry >> 32) + (prod1 >> 32) + (prod2 >> 32); + } + + carry += (uint)aMax; + a[1] = (int)carry; + aMax = (int)(carry >> 32); + } + + a[0] = aMax; + + if (!smallMontyModulus && CompareTo(0, a, 0, m) >= 0) + { + Subtract(0, a, 0, m); + } + + Array.Copy(a, 1, x, 0, n); + } + + private static void SquareMonty(int[] a, int[] x, int[] m, uint mDash, bool smallMontyModulus) + // mDash = -m^(-1) mod b + { + int n = m.Length; + + if (n == 1) + { + uint xVal = (uint)x[0]; + x[0] = (int)MultiplyMontyNIsOne(xVal, xVal, (uint)m[0], mDash); + return; + } + + ulong x0 = (uint)x[n - 1]; + int aMax; + + { + ulong carry = x0 * x0; + ulong t = (uint)carry * mDash; + + ulong prod2 = t * (uint)m[n - 1]; + carry += (uint)prod2; + Debug.Assert((uint)carry == 0); + carry = (carry >> 32) + (prod2 >> 32); + + for (int j = n - 2; j >= 0; --j) + { + ulong prod1 = x0 * (uint)x[j]; + prod2 = t * (uint)m[j]; + + carry += (prod2 & UIMASK) + ((uint)prod1 << 1); + a[j + 2] = (int)carry; + carry = (carry >> 32) + (prod1 >> 31) + (prod2 >> 32); + } + + a[1] = (int)carry; + aMax = (int)(carry >> 32); + } + + for (int i = n - 2; i >= 0; --i) + { + uint a0 = (uint)a[n]; + ulong t = a0 * mDash; + + ulong carry = t * (uint)m[n - 1] + a0; + Debug.Assert((uint)carry == 0); + carry >>= 32; + + for (int j = n - 2; j > i; --j) + { + carry += t * (uint)m[j] + (uint)a[j + 1]; + a[j + 2] = (int)carry; + carry >>= 32; + } + + ulong xi = (uint)x[i]; + + { + ulong prod1 = xi * xi; + ulong prod2 = t * (uint)m[i]; + + carry += (prod1 & UIMASK) + (uint)prod2 + (uint)a[i + 1]; + a[i + 2] = (int)carry; + carry = (carry >> 32) + (prod1 >> 32) + (prod2 >> 32); + } + + for (int j = i - 1; j >= 0; --j) + { + ulong prod1 = xi * (uint)x[j]; + ulong prod2 = t * (uint)m[j]; + + carry += (prod2 & UIMASK) + ((uint)prod1 << 1) + (uint)a[j + 1]; + a[j + 2] = (int)carry; + carry = (carry >> 32) + (prod1 >> 31) + (prod2 >> 32); + } + + carry += (uint)aMax; + a[1] = (int)carry; + aMax = (int)(carry >> 32); + } + + a[0] = aMax; + + if (!smallMontyModulus && CompareTo(0, a, 0, m) >= 0) + { + Subtract(0, a, 0, m); + } + + Array.Copy(a, 1, x, 0, n); + } + + private static uint MultiplyMontyNIsOne(uint x, uint y, uint m, uint mDash) + { + ulong carry = (ulong)x * y; + uint t = (uint)carry * mDash; + ulong um = m; + ulong prod2 = um * t; + carry += (uint)prod2; + Debug.Assert((uint)carry == 0); + carry = (carry >> 32) + (prod2 >> 32); + if (carry > um) + { + carry -= um; + } + Debug.Assert(carry < um); + return (uint)carry; + } + + public BigInteger Multiply( + BigInteger val) + { + if (val == this) + return Square(); + + if ((sign & val.sign) == 0) + return Zero; + + if (val.QuickPow2Check()) // val is power of two + { + BigInteger result = this.ShiftLeft(val.Abs().BitLength - 1); + return val.sign > 0 ? result : result.Negate(); + } + + if (this.QuickPow2Check()) // this is power of two + { + BigInteger result = val.ShiftLeft(this.Abs().BitLength - 1); + return this.sign > 0 ? result : result.Negate(); + } + + int resLength = magnitude.Length + val.magnitude.Length; + int[] res = new int[resLength]; + + Multiply(res, this.magnitude, val.magnitude); + + int resSign = sign ^ val.sign ^ 1; + return new BigInteger(resSign, res, true); + } + + public BigInteger Square() + { + if (sign == 0) + return Zero; + if (this.QuickPow2Check()) + return ShiftLeft(Abs().BitLength - 1); + int resLength = magnitude.Length << 1; + if ((uint)magnitude[0] >> 16 == 0) + --resLength; + int[] res = new int[resLength]; + Square(res, magnitude); + return new BigInteger(1, res, false); + } + + public BigInteger Negate() + { + if (sign == 0) + return this; + + return new BigInteger(-sign, magnitude, false); + } + + public BigInteger NextProbablePrime() + { + if (sign < 0) + throw new ArithmeticException("Cannot be called on value < 0"); + + if (CompareTo(Two) < 0) + return Two; + + BigInteger n = Inc().SetBit(0); + + while (!n.CheckProbablePrime(100, SecureRandom.ArbitraryRandom, false)) + { + n = n.Add(Two); + } + + return n; + } + + public BigInteger Not() + { + return Inc().Negate(); + } + + public BigInteger Pow(int exp) + { + if (exp <= 0) + { + if (exp < 0) + throw new ArithmeticException("Negative exponent"); + + return One; + } + + if (sign == 0) + { + return this; + } + + if (QuickPow2Check()) + { + long powOf2 = (long)exp * (BitLength - 1); + if (powOf2 > int.MaxValue) + { + throw new ArithmeticException("Result too large"); + } + return One.ShiftLeft((int)powOf2); + } + + BigInteger y = One; + BigInteger z = this; + + for (;;) + { + if ((exp & 0x1) == 1) + { + y = y.Multiply(z); + } + exp >>= 1; + if (exp == 0) break; + z = z.Multiply(z); + } + + return y; + } + + public static BigInteger ProbablePrime( + int bitLength, + Random random) + { + return new BigInteger(bitLength, 100, random); + } + + private int Remainder( + int m) + { + Debug.Assert(m > 0); + + long acc = 0; + for (int pos = 0; pos < magnitude.Length; ++pos) + { + long posVal = (uint) magnitude[pos]; + acc = (acc << 32 | posVal) % m; + } + + return (int) acc; + } + + /** + * return x = x % y - done in place (y value preserved) + */ + private static int[] Remainder( + int[] x, + int[] y) + { + int xStart = 0; + while (xStart < x.Length && x[xStart] == 0) + { + ++xStart; + } + + int yStart = 0; + while (yStart < y.Length && y[yStart] == 0) + { + ++yStart; + } + + Debug.Assert(yStart < y.Length); + + int xyCmp = CompareNoLeadingZeroes(xStart, x, yStart, y); + + if (xyCmp > 0) + { + int yBitLength = CalcBitLength(1, yStart, y); + int xBitLength = CalcBitLength(1, xStart, x); + int shift = xBitLength - yBitLength; + + int[] c; + int cStart = 0; + int cBitLength = yBitLength; + if (shift > 0) + { + c = ShiftLeft(y, shift); + cBitLength += shift; + Debug.Assert(c[0] != 0); + } + else + { + int len = y.Length - yStart; + c = new int[len]; + Array.Copy(y, yStart, c, 0, len); + } + + for (;;) + { + if (cBitLength < xBitLength + || CompareNoLeadingZeroes(xStart, x, cStart, c) >= 0) + { + Subtract(xStart, x, cStart, c); + + while (x[xStart] == 0) + { + if (++xStart == x.Length) + return x; + } + + //xBitLength = CalcBitLength(xStart, x); + xBitLength = 32 * (x.Length - xStart - 1) + BitLen(x[xStart]); + + if (xBitLength <= yBitLength) + { + if (xBitLength < yBitLength) + return x; + + xyCmp = CompareNoLeadingZeroes(xStart, x, yStart, y); + + if (xyCmp <= 0) + break; + } + } + + shift = cBitLength - xBitLength; + + // NB: The case where c[cStart] is 1-bit is harmless + if (shift == 1) + { + uint firstC = (uint) c[cStart] >> 1; + uint firstX = (uint) x[xStart]; + if (firstC > firstX) + ++shift; + } + + if (shift < 2) + { + ShiftRightOneInPlace(cStart, c); + --cBitLength; + } + else + { + ShiftRightInPlace(cStart, c, shift); + cBitLength -= shift; + } + + //cStart = c.Length - ((cBitLength + 31) / 32); + while (c[cStart] == 0) + { + ++cStart; + } + } + } + + if (xyCmp == 0) + { + Array.Clear(x, xStart, x.Length - xStart); + } + + return x; + } + + public BigInteger Remainder( + BigInteger n) + { + if (n.sign == 0) + throw new ArithmeticException("Division by zero error"); + + if (this.sign == 0) + return Zero; + + // For small values, use fast remainder method + if (n.magnitude.Length == 1) + { + int val = n.magnitude[0]; + + if (val > 0) + { + if (val == 1) + return Zero; + + // TODO Make this func work on uint, and handle val == 1? + int rem = Remainder(val); + + return rem == 0 + ? Zero + : new BigInteger(sign, new int[]{ rem }, false); + } + } + + if (CompareNoLeadingZeroes(0, magnitude, 0, n.magnitude) < 0) + return this; + + int[] result; + if (n.QuickPow2Check()) // n is power of two + { + // TODO Move before small values branch above? + result = LastNBits(n.Abs().BitLength - 1); + } + else + { + result = (int[]) this.magnitude.Clone(); + result = Remainder(result, n.magnitude); + } + + return new BigInteger(sign, result, true); + } + + private int[] LastNBits( + int n) + { + if (n < 1) + return ZeroMagnitude; + + int numWords = (n + BitsPerInt - 1) / BitsPerInt; + numWords = System.Math.Min(numWords, this.magnitude.Length); + int[] result = new int[numWords]; + + Array.Copy(this.magnitude, this.magnitude.Length - numWords, result, 0, numWords); + + int excessBits = (numWords << 5) - n; + if (excessBits > 0) + { + result[0] &= (int)(uint.MaxValue >> excessBits); + } + + return result; + } + + private BigInteger DivideWords(int w) + { + Debug.Assert(w >= 0); + int n = magnitude.Length; + if (w >= n) + return Zero; + int[] mag = new int[n - w]; + Array.Copy(magnitude, 0, mag, 0, n - w); + return new BigInteger(sign, mag, false); + } + + private BigInteger RemainderWords(int w) + { + Debug.Assert(w >= 0); + int n = magnitude.Length; + if (w >= n) + return this; + int[] mag = new int[w]; + Array.Copy(magnitude, n - w, mag, 0, w); + return new BigInteger(sign, mag, false); + } + + /** + * do a left shift - this returns a new array. + */ + private static int[] ShiftLeft( + int[] mag, + int n) + { + int nInts = (int)((uint)n >> 5); + int nBits = n & 0x1f; + int magLen = mag.Length; + int[] newMag; + + if (nBits == 0) + { + newMag = new int[magLen + nInts]; + mag.CopyTo(newMag, 0); + } + else + { + int i = 0; + int nBits2 = 32 - nBits; + int highBits = (int)((uint)mag[0] >> nBits2); + + if (highBits != 0) + { + newMag = new int[magLen + nInts + 1]; + newMag[i++] = highBits; + } + else + { + newMag = new int[magLen + nInts]; + } + + int m = mag[0]; + for (int j = 0; j < magLen - 1; j++) + { + int next = mag[j + 1]; + + newMag[i++] = (m << nBits) | (int)((uint)next >> nBits2); + m = next; + } + + newMag[i] = mag[magLen - 1] << nBits; + } + + return newMag; + } + + private static int ShiftLeftOneInPlace(int[] x, int carry) + { + Debug.Assert(carry == 0 || carry == 1); + int pos = x.Length; + while (--pos >= 0) + { + uint val = (uint)x[pos]; + x[pos] = (int)(val << 1) | carry; + carry = (int)(val >> 31); + } + return carry; + } + + public BigInteger ShiftLeft( + int n) + { + if (sign == 0 || magnitude.Length == 0) + return Zero; + + if (n == 0) + return this; + + if (n < 0) + return ShiftRight(-n); + + BigInteger result = new BigInteger(sign, ShiftLeft(magnitude, n), true); + + if (this.nBits != -1) + { + result.nBits = sign > 0 + ? this.nBits + : this.nBits + n; + } + + if (this.nBitLength != -1) + { + result.nBitLength = this.nBitLength + n; + } + + return result; + } + + /** + * do a right shift - this does it in place. + */ + private static void ShiftRightInPlace( + int start, + int[] mag, + int n) + { + int nInts = (int)((uint)n >> 5) + start; + int nBits = n & 0x1f; + int magEnd = mag.Length - 1; + + if (nInts != start) + { + int delta = (nInts - start); + + for (int i = magEnd; i >= nInts; i--) + { + mag[i] = mag[i - delta]; + } + for (int i = nInts - 1; i >= start; i--) + { + mag[i] = 0; + } + } + + if (nBits != 0) + { + int nBits2 = 32 - nBits; + int m = mag[magEnd]; + + for (int i = magEnd; i > nInts; --i) + { + int next = mag[i - 1]; + + mag[i] = (int)((uint)m >> nBits) | (next << nBits2); + m = next; + } + + mag[nInts] = (int)((uint)mag[nInts] >> nBits); + } + } + + /** + * do a right shift by one - this does it in place. + */ + private static void ShiftRightOneInPlace( + int start, + int[] mag) + { + int i = mag.Length; + int m = mag[i - 1]; + + while (--i > start) + { + int next = mag[i - 1]; + mag[i] = ((int)((uint)m >> 1)) | (next << 31); + m = next; + } + + mag[start] = (int)((uint)mag[start] >> 1); + } + + public BigInteger ShiftRight( + int n) + { + if (n == 0) + return this; + + if (n < 0) + return ShiftLeft(-n); + + if (n >= BitLength) + return (this.sign < 0 ? One.Negate() : Zero); + +// int[] res = (int[]) this.magnitude.Clone(); +// +// ShiftRightInPlace(0, res, n); +// +// return new BigInteger(this.sign, res, true); + + int resultLength = (BitLength - n + 31) >> 5; + int[] res = new int[resultLength]; + + int numInts = n >> 5; + int numBits = n & 31; + + if (numBits == 0) + { + Array.Copy(this.magnitude, 0, res, 0, res.Length); + } + else + { + int numBits2 = 32 - numBits; + + int magPos = this.magnitude.Length - 1 - numInts; + for (int i = resultLength - 1; i >= 0; --i) + { + res[i] = (int)((uint) this.magnitude[magPos--] >> numBits); + + if (magPos >= 0) + { + res[i] |= this.magnitude[magPos] << numBits2; + } + } + } + + Debug.Assert(res[0] != 0); + + return new BigInteger(this.sign, res, false); + } + + public int SignValue + { + get { return sign; } + } + + /** + * returns x = x - y - we assume x is >= y + */ + private static int[] Subtract( + int xStart, + int[] x, + int yStart, + int[] y) + { + Debug.Assert(yStart < y.Length); + Debug.Assert(x.Length - xStart >= y.Length - yStart); + + int iT = x.Length; + int iV = y.Length; + long m; + int borrow = 0; + + do + { + m = (x[--iT] & IMASK) - (y[--iV] & IMASK) + borrow; + x[iT] = (int) m; + +// borrow = (m < 0) ? -1 : 0; + borrow = (int)(m >> 63); + } + while (iV > yStart); + + if (borrow != 0) + { + while (--x[--iT] == -1) + { + } + } + + return x; + } + + public BigInteger Subtract( + BigInteger n) + { + if (n.sign == 0) + return this; + + if (this.sign == 0) + return n.Negate(); + + if (this.sign != n.sign) + return Add(n.Negate()); + + int compare = CompareNoLeadingZeroes(0, magnitude, 0, n.magnitude); + if (compare == 0) + return Zero; + + BigInteger bigun, lilun; + if (compare < 0) + { + bigun = n; + lilun = this; + } + else + { + bigun = this; + lilun = n; + } + + return new BigInteger(this.sign * compare, doSubBigLil(bigun.magnitude, lilun.magnitude), true); + } + + private static int[] doSubBigLil( + int[] bigMag, + int[] lilMag) + { + int[] res = (int[]) bigMag.Clone(); + + return Subtract(0, res, 0, lilMag); + } + + public int GetLengthofByteArray() + { + return GetByteLength(BitLength + 1); + } + + public int GetLengthofByteArrayUnsigned() + { + return GetByteLength(sign < 0 ? BitLength + 1 : BitLength); + } + + public byte[] ToByteArray() + { + return ToByteArray(false); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ToByteArray(Span output) + { + ToByteArray(false, output); + } +#endif + + public byte[] ToByteArrayUnsigned() + { + return ToByteArray(true); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ToByteArrayUnsigned(Span output) + { + ToByteArray(true, output); + } +#endif + + private byte[] ToByteArray(bool unsigned) + { + if (sign == 0) + return unsigned ? ZeroEncoding : new byte[1]; + + int nBits = (unsigned && sign > 0) + ? BitLength + : BitLength + 1; + + int nBytes = GetByteLength(nBits); + byte[] bytes = new byte[nBytes]; + + int magIndex = magnitude.Length; + int bytesIndex = bytes.Length; + + if (sign > 0) + { + while (magIndex > 1) + { + uint mag = (uint) magnitude[--magIndex]; + bytesIndex -= 4; + Pack.UInt32_To_BE(mag, bytes, bytesIndex); + } + + uint lastMag = (uint) magnitude[0]; + while (lastMag > byte.MaxValue) + { + bytes[--bytesIndex] = (byte) lastMag; + lastMag >>= 8; + } + + bytes[--bytesIndex] = (byte) lastMag; + } + else // sign < 0 + { + bool carry = true; + + while (magIndex > 1) + { + uint mag = ~((uint) magnitude[--magIndex]); + + if (carry) + { + carry = (++mag == uint.MinValue); + } + + bytesIndex -= 4; + Pack.UInt32_To_BE(mag, bytes, bytesIndex); + } + + uint lastMag = (uint) magnitude[0]; + + if (carry) + { + // Never wraps because magnitude[0] != 0 + --lastMag; + } + + while (lastMag > byte.MaxValue) + { + bytes[--bytesIndex] = (byte) ~lastMag; + lastMag >>= 8; + } + + bytes[--bytesIndex] = (byte) ~lastMag; + + if (bytesIndex > 0) + { + bytes[--bytesIndex] = byte.MaxValue; + } + } + + return bytes; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void ToByteArray(bool unsigned, Span output) + { + if (sign == 0) + { + if (!unsigned) + { + output[0] = 0; + } + return; + } + + int nBits = (unsigned && sign > 0) ? BitLength : BitLength + 1; + + int nBytes = GetByteLength(nBits); + if (nBytes > output.Length) + throw new ArgumentException("insufficient space", nameof(output)); + + int magIndex = magnitude.Length; + int bytesIndex = nBytes; + + if (sign > 0) + { + while (magIndex > 1) + { + uint mag = (uint) magnitude[--magIndex]; + bytesIndex -= 4; + Pack.UInt32_To_BE(mag, output[bytesIndex..]); + } + + uint lastMag = (uint)magnitude[0]; + while (lastMag > byte.MaxValue) + { + output[--bytesIndex] = (byte)lastMag; + lastMag >>= 8; + } + + output[--bytesIndex] = (byte)lastMag; + } + else // sign < 0 + { + bool carry = true; + + while (magIndex > 1) + { + uint mag = ~((uint)magnitude[--magIndex]); + + if (carry) + { + carry = (++mag == uint.MinValue); + } + + bytesIndex -= 4; + Pack.UInt32_To_BE(mag, output[bytesIndex..]); + } + + uint lastMag = (uint)magnitude[0]; + + if (carry) + { + // Never wraps because magnitude[0] != 0 + --lastMag; + } + + while (lastMag > byte.MaxValue) + { + output[--bytesIndex] = (byte)~lastMag; + lastMag >>= 8; + } + + output[--bytesIndex] = (byte)~lastMag; + + if (bytesIndex > 0) + { + output[--bytesIndex] = byte.MaxValue; + } + } + } +#endif + + public override string ToString() + { + return ToString(10); + } + + public string ToString(int radix) + { + // TODO Make this method work for other radices (ideally 2 <= radix <= 36 as in Java) + + switch (radix) + { + case 2: + case 8: + case 10: + case 16: + break; + default: + throw new FormatException("Only bases 2, 8, 10, 16 are allowed"); + } + + // NB: Can only happen to internally managed instances + if (magnitude == null) + return "null"; + + if (sign == 0) + return "0"; + + + // NOTE: This *should* be unnecessary, since the magnitude *should* never have leading zero digits + int firstNonZero = 0; + while (firstNonZero < magnitude.Length) + { + if (magnitude[firstNonZero] != 0) + { + break; + } + ++firstNonZero; + } + + if (firstNonZero == magnitude.Length) + { + return "0"; + } + + + StringBuilder sb = new StringBuilder(); + if (sign == -1) + { + sb.Append('-'); + } + + switch (radix) + { + case 2: + { + int pos = firstNonZero; + sb.Append(Convert.ToString(magnitude[pos], 2)); + while (++pos < magnitude.Length) + { + AppendZeroExtendedString(sb, Convert.ToString(magnitude[pos], 2), 32); + } + break; + } + case 8: + { + int mask = (1 << 30) - 1; + BigInteger u = this.Abs(); + int bits = u.BitLength; + var S = new List(); + while (bits > 30) + { + S.Add(Convert.ToString(u.IntValue & mask, 8)); + u = u.ShiftRight(30); + bits -= 30; + } + sb.Append(Convert.ToString(u.IntValue, 8)); + for (int i = S.Count - 1; i >= 0; --i) + { + AppendZeroExtendedString(sb, S[i], 10); + } + break; + } + case 16: + { + int pos = firstNonZero; + sb.Append(Convert.ToString(magnitude[pos], 16)); + while (++pos < magnitude.Length) + { + AppendZeroExtendedString(sb, Convert.ToString(magnitude[pos], 16), 8); + } + break; + } + // TODO This could work for other radices if there is an alternative to Convert.ToString method + //default: + case 10: + { + BigInteger q = this.Abs(); + if (q.BitLength < 64) + { + sb.Append(Convert.ToString(q.LongValue, radix)); + break; + } + + // TODO Could cache the moduli for each radix (soft reference?) + var moduli = new List(); + BigInteger R = ValueOf(radix); + while (R.CompareTo(q) <= 0) + { + moduli.Add(R); + R = R.Square(); + } + + int scale = moduli.Count; + sb.EnsureCapacity(sb.Length + (1 << scale)); + + ToString(sb, radix, moduli, scale, q); + + break; + } + } + + return sb.ToString(); + } + + private static void ToString(StringBuilder sb, int radix, IList moduli, int scale, BigInteger pos) + { + if (pos.BitLength < 64) + { + string s = Convert.ToString(pos.LongValue, radix); + if (sb.Length > 1 || (sb.Length == 1 && sb[0] != '-')) + { + AppendZeroExtendedString(sb, s, 1 << scale); + } + else if (pos.SignValue != 0) + { + sb.Append(s); + } + return; + } + + BigInteger[] qr = pos.DivideAndRemainder(moduli[--scale]); + + ToString(sb, radix, moduli, scale, qr[0]); + ToString(sb, radix, moduli, scale, qr[1]); + } + + private static void AppendZeroExtendedString(StringBuilder sb, string s, int minLength) + { + for (int len = s.Length; len < minLength; ++len) + { + sb.Append('0'); + } + sb.Append(s); + } + + private static BigInteger CreateUValueOf( + ulong value) + { + int msw = (int)(value >> 32); + int lsw = (int)value; + + if (msw != 0) + return new BigInteger(1, new int[] { msw, lsw }, false); + + if (lsw != 0) + { + BigInteger n = new BigInteger(1, new int[] { lsw }, false); + // Check for a power of two + if ((lsw & -lsw) == lsw) + { + n.nBits = 1; + } + return n; + } + + return Zero; + } + + private static BigInteger CreateValueOf( + long value) + { + if (value < 0) + { + if (value == long.MinValue) + return CreateValueOf(~value).Not(); + + return CreateValueOf(-value).Negate(); + } + + return CreateUValueOf((ulong)value); + } + + public static BigInteger ValueOf( + long value) + { + if (value >= 0 && value < SMALL_CONSTANTS.Length) + { + return SMALL_CONSTANTS[value]; + } + + return CreateValueOf(value); + } + + public int GetLowestSetBit() + { + if (this.sign == 0) + return -1; + + return GetLowestSetBitMaskFirst(-1); + } + + private int GetLowestSetBitMaskFirst(int firstWordMask) + { + int w = magnitude.Length, offset = 0; + + uint word = (uint)(magnitude[--w] & firstWordMask); + Debug.Assert(magnitude[0] != 0); + + while (word == 0) + { + word = (uint)magnitude[--w]; + offset += 32; + } + +#if NETCOREAPP3_0_OR_GREATER + offset += BitOperations.TrailingZeroCount(word); +#else + while ((word & 0xFF) == 0) + { + word >>= 8; + offset += 8; + } + + while ((word & 1) == 0) + { + word >>= 1; + ++offset; + } + +#endif + return offset; + } + + public bool TestBit( + int n) + { + if (n < 0) + throw new ArithmeticException("Bit position must not be negative"); + + if (sign < 0) + return !Not().TestBit(n); + + int wordNum = n / 32; + if (wordNum >= magnitude.Length) + return false; + + int word = magnitude[magnitude.Length - 1 - wordNum]; + return ((word >> (n % 32)) & 1) > 0; + } + + public BigInteger Or( + BigInteger value) + { + if (this.sign == 0) + return value; + + if (value.sign == 0) + return this; + + int[] aMag = this.sign > 0 + ? this.magnitude + : Add(One).magnitude; + + int[] bMag = value.sign > 0 + ? value.magnitude + : value.Add(One).magnitude; + + bool resultNeg = sign < 0 || value.sign < 0; + int resultLength = System.Math.Max(aMag.Length, bMag.Length); + int[] resultMag = new int[resultLength]; + + int aStart = resultMag.Length - aMag.Length; + int bStart = resultMag.Length - bMag.Length; + + for (int i = 0; i < resultMag.Length; ++i) + { + int aWord = i >= aStart ? aMag[i - aStart] : 0; + int bWord = i >= bStart ? bMag[i - bStart] : 0; + + if (this.sign < 0) + { + aWord = ~aWord; + } + + if (value.sign < 0) + { + bWord = ~bWord; + } + + resultMag[i] = aWord | bWord; + + if (resultNeg) + { + resultMag[i] = ~resultMag[i]; + } + } + + BigInteger result = new BigInteger(1, resultMag, true); + + // TODO Optimise this case + if (resultNeg) + { + result = result.Not(); + } + + return result; + } + + public BigInteger Xor( + BigInteger value) + { + if (this.sign == 0) + return value; + + if (value.sign == 0) + return this; + + int[] aMag = this.sign > 0 + ? this.magnitude + : Add(One).magnitude; + + int[] bMag = value.sign > 0 + ? value.magnitude + : value.Add(One).magnitude; + + // TODO Can just replace with sign != value.sign? + bool resultNeg = (sign < 0 && value.sign >= 0) || (sign >= 0 && value.sign < 0); + int resultLength = System.Math.Max(aMag.Length, bMag.Length); + int[] resultMag = new int[resultLength]; + + int aStart = resultMag.Length - aMag.Length; + int bStart = resultMag.Length - bMag.Length; + + for (int i = 0; i < resultMag.Length; ++i) + { + int aWord = i >= aStart ? aMag[i - aStart] : 0; + int bWord = i >= bStart ? bMag[i - bStart] : 0; + + if (this.sign < 0) + { + aWord = ~aWord; + } + + if (value.sign < 0) + { + bWord = ~bWord; + } + + resultMag[i] = aWord ^ bWord; + + if (resultNeg) + { + resultMag[i] = ~resultMag[i]; + } + } + + BigInteger result = new BigInteger(1, resultMag, true); + + // TODO Optimise this case + if (resultNeg) + { + result = result.Not(); + } + + return result; + } + + public BigInteger SetBit( + int n) + { + if (n < 0) + throw new ArithmeticException("Bit address less than zero"); + + if (TestBit(n)) + return this; + + // TODO Handle negative values and zero + if (sign > 0 && n < (BitLength - 1)) + return FlipExistingBit(n); + + return Or(One.ShiftLeft(n)); + } + + public BigInteger ClearBit( + int n) + { + if (n < 0) + throw new ArithmeticException("Bit address less than zero"); + + if (!TestBit(n)) + return this; + + // TODO Handle negative values + if (sign > 0 && n < (BitLength - 1)) + return FlipExistingBit(n); + + return AndNot(One.ShiftLeft(n)); + } + + public BigInteger FlipBit( + int n) + { + if (n < 0) + throw new ArithmeticException("Bit address less than zero"); + + // TODO Handle negative values and zero + if (sign > 0 && n < (BitLength - 1)) + return FlipExistingBit(n); + + return Xor(One.ShiftLeft(n)); + } + + private BigInteger FlipExistingBit( + int n) + { + Debug.Assert(sign > 0); + Debug.Assert(n >= 0); + Debug.Assert(n < BitLength - 1); + + int[] mag = (int[]) this.magnitude.Clone(); + mag[mag.Length - 1 - (n >> 5)] ^= (1 << (n & 31)); // Flip bit + return new BigInteger(this.sign, mag, false); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs.meta new file mode 100644 index 00000000..7b48fdcc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4645d113ee97e234fb0513cc83566abc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/BigInteger.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs new file mode 100644 index 00000000..4aa33d9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs @@ -0,0 +1,548 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math +{ + /// Utility methods for generating primes and testing for primality. + public static class Primes + { + public static readonly int SmallFactorLimit = 211; + + private static readonly BigInteger One = BigInteger.One; + private static readonly BigInteger Two = BigInteger.Two; + private static readonly BigInteger Three = BigInteger.Three; + + /// Used to return the output from the + /// + /// Enhanced Miller-Rabin Probabilistic Primality Test + public sealed class MROutput + { + internal static MROutput ProbablyPrime() + { + return new MROutput(false, null); + } + + internal static MROutput ProvablyCompositeWithFactor(BigInteger factor) + { + return new MROutput(true, factor); + } + + internal static MROutput ProvablyCompositeNotPrimePower() + { + return new MROutput(true, null); + } + + private readonly bool m_provablyComposite; + private readonly BigInteger m_factor; + + private MROutput(bool provablyComposite, BigInteger factor) + { + m_provablyComposite = provablyComposite; + m_factor = factor; + } + + public BigInteger Factor => m_factor; + + public bool IsProvablyComposite => m_provablyComposite; + + public bool IsNotPrimePower => m_provablyComposite && m_factor == null; + } + + /// Used to return the output from the + /// Shawe-Taylor Random_Prime Routine + public sealed class STOutput + { + private readonly BigInteger m_prime; + private readonly byte[] m_primeSeed; + private readonly int m_primeGenCounter; + + internal STOutput(BigInteger prime, byte[] primeSeed, int primeGenCounter) + { + m_prime = prime; + m_primeSeed = primeSeed; + m_primeGenCounter = primeGenCounter; + } + + public BigInteger Prime => m_prime; + + public byte[] PrimeSeed => m_primeSeed; + + public int PrimeGenCounter => m_primeGenCounter; + } + + /// FIPS 186-4 C.6 Shawe-Taylor Random_Prime Routine. + /// Construct a provable prime number using a hash function. + /// The instance to use (as "Hash()"). Cannot be null. + /// The length (in bits) of the prime to be generated. Must be at least 2. + /// The seed to be used for the generation of the requested prime. Cannot be null or + /// empty. + /// An instance containing the requested prime. + public static STOutput GenerateSTRandomPrime(IDigest hash, int length, byte[] inputSeed) + { + if (hash == null) + throw new ArgumentNullException(nameof(hash)); + if (length < 2) + throw new ArgumentException("must be >= 2", nameof(length)); + if (inputSeed == null) + throw new ArgumentNullException(nameof(inputSeed)); + if (inputSeed.Length == 0) + throw new ArgumentException("cannot be empty", nameof(inputSeed)); + + return ImplSTRandomPrime(hash, length, Arrays.Clone(inputSeed)); + } + + /// FIPS 186-4 C.3.2 Enhanced Miller-Rabin Probabilistic Primality Test. + /// + /// Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases. This is an alternative to + /// that provides more information about a + /// composite candidate, which may be useful when generating or validating RSA moduli. + /// + /// The instance to test for primality. + /// The source of randomness to use to choose bases. + /// The number of randomly-chosen bases to perform the test for. + /// An instance that can be further queried for details. + public static MROutput EnhancedMRProbablePrimeTest(BigInteger candidate, SecureRandom random, int iterations) + { + CheckCandidate(candidate, nameof(candidate)); + + if (random == null) + throw new ArgumentNullException(nameof(random)); + if (iterations < 1) + throw new ArgumentException("must be > 0", nameof(iterations)); + + if (candidate.BitLength == 2) + return MROutput.ProbablyPrime(); + + if (!candidate.TestBit(0)) + return MROutput.ProvablyCompositeWithFactor(Two); + + BigInteger w = candidate; + BigInteger wSubOne = candidate.Subtract(One); + BigInteger wSubTwo = candidate.Subtract(Two); + + int a = wSubOne.GetLowestSetBit(); + BigInteger m = wSubOne.ShiftRight(a); + + for (int i = 0; i < iterations; ++i) + { + BigInteger b = BigIntegers.CreateRandomInRange(Two, wSubTwo, random); + BigInteger g = b.Gcd(w); + + if (g.CompareTo(One) > 0) + return MROutput.ProvablyCompositeWithFactor(g); + + BigInteger z = b.ModPow(m, w); + + if (z.Equals(One) || z.Equals(wSubOne)) + continue; + + bool primeToBase = false; + + BigInteger x = z; + for (int j = 1; j < a; ++j) + { + z = z.Square().Mod(w); + + if (z.Equals(wSubOne)) + { + primeToBase = true; + break; + } + + if (z.Equals(One)) + break; + + x = z; + } + + if (!primeToBase) + { + if (!z.Equals(One)) + { + x = z; + z = z.Square().Mod(w); + + if (!z.Equals(One)) + { + x = z; + } + } + + g = x.Subtract(One).Gcd(w); + + if (g.CompareTo(One) > 0) + return MROutput.ProvablyCompositeWithFactor(g); + + return MROutput.ProvablyCompositeNotPrimePower(); + } + } + + return MROutput.ProbablyPrime(); + } + + /// A fast check for small divisors, up to some implementation-specific limit. + /// The instance to test for division by small factors. + /// true if the candidate is found to have any small factors, false otherwise. + public static bool HasAnySmallFactors(BigInteger candidate) + { + CheckCandidate(candidate, nameof(candidate)); + + return ImplHasAnySmallFactors(candidate); + } + + /// FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test. + /// Run several iterations of the Miller-Rabin algorithm with randomly-chosen bases. + /// The instance to test for primality. + /// The source of randomness to use to choose bases. + /// The number of randomly-chosen bases to perform the test for. + /// + /// false if any witness to compositeness is found amongst the chosen bases (so + /// is definitely NOT prime), or else true (indicating primality with some + /// probability dependent on the number of iterations that were performed). + /// + public static bool IsMRProbablePrime(BigInteger candidate, SecureRandom random, int iterations) + { + CheckCandidate(candidate, nameof(candidate)); + + if (random == null) + throw new ArgumentException("cannot be null", nameof(random)); + if (iterations < 1) + throw new ArgumentException("must be > 0", nameof(iterations)); + + if (candidate.BitLength == 2) + return true; + if (!candidate.TestBit(0)) + return false; + + BigInteger w = candidate; + BigInteger wSubOne = candidate.Subtract(One); + BigInteger wSubTwo = candidate.Subtract(Two); + + int a = wSubOne.GetLowestSetBit(); + BigInteger m = wSubOne.ShiftRight(a); + + for (int i = 0; i < iterations; ++i) + { + BigInteger b = BigIntegers.CreateRandomInRange(Two, wSubTwo, random); + + if (!ImplMRProbablePrimeToBase(w, wSubOne, m, a, b)) + return false; + } + + return true; + } + + /// FIPS 186-4 C.3.1 Miller-Rabin Probabilistic Primality Test (to a fixed base). + /// Run a single iteration of the Miller-Rabin algorithm against the specified base. + /// The instance to test for primality. + /// The base value to use for this iteration. + /// false if is a witness to compositeness (so + /// is definitely NOT prime), or else true. + public static bool IsMRProbablePrimeToBase(BigInteger candidate, BigInteger baseValue) + { + CheckCandidate(candidate, nameof(candidate)); + CheckCandidate(baseValue, nameof(baseValue)); + + if (baseValue.CompareTo(candidate.Subtract(One)) >= 0) + throw new ArgumentException("must be < ('candidate' - 1)", nameof(baseValue)); + + if (candidate.BitLength == 2) + return true; + + BigInteger w = candidate; + BigInteger wSubOne = candidate.Subtract(One); + + int a = wSubOne.GetLowestSetBit(); + BigInteger m = wSubOne.ShiftRight(a); + + return ImplMRProbablePrimeToBase(w, wSubOne, m, a, baseValue); + } + + private static void CheckCandidate(BigInteger n, string name) + { + if (n == null || n.SignValue < 1 || n.BitLength < 2) + throw new ArgumentException("must be non-null and >= 2", name); + } + + private static bool ImplHasAnySmallFactors(BigInteger x) + { + /* + * Bundle trial divisors into ~32-bit moduli then use fast tests on the ~32-bit remainders. + */ + int m = 2 * 3 * 5 * 7 * 11 * 13 * 17 * 19 * 23; + int r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 2) == 0 || (r % 3) == 0 || (r % 5) == 0 || (r % 7) == 0 || (r % 11) == 0 || (r % 13) == 0 + || (r % 17) == 0 || (r % 19) == 0 || (r % 23) == 0) + { + return true; + } + + m = 29 * 31 * 37 * 41 * 43; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 29) == 0 || (r % 31) == 0 || (r % 37) == 0 || (r % 41) == 0 || (r % 43) == 0) + { + return true; + } + + m = 47 * 53 * 59 * 61 * 67; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 47) == 0 || (r % 53) == 0 || (r % 59) == 0 || (r % 61) == 0 || (r % 67) == 0) + { + return true; + } + + m = 71 * 73 * 79 * 83; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 71) == 0 || (r % 73) == 0 || (r % 79) == 0 || (r % 83) == 0) + { + return true; + } + + m = 89 * 97 * 101 * 103; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 89) == 0 || (r % 97) == 0 || (r % 101) == 0 || (r % 103) == 0) + { + return true; + } + + m = 107 * 109 * 113 * 127; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 107) == 0 || (r % 109) == 0 || (r % 113) == 0 || (r % 127) == 0) + { + return true; + } + + m = 131 * 137 * 139 * 149; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 131) == 0 || (r % 137) == 0 || (r % 139) == 0 || (r % 149) == 0) + { + return true; + } + + m = 151 * 157 * 163 * 167; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 151) == 0 || (r % 157) == 0 || (r % 163) == 0 || (r % 167) == 0) + { + return true; + } + + m = 173 * 179 * 181 * 191; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 173) == 0 || (r % 179) == 0 || (r % 181) == 0 || (r % 191) == 0) + { + return true; + } + + m = 193 * 197 * 199 * 211; + r = x.Mod(BigInteger.ValueOf(m)).IntValue; + if ((r % 193) == 0 || (r % 197) == 0 || (r % 199) == 0 || (r % 211) == 0) + { + return true; + } + + /* + * NOTE: Unit tests depend on SMALL_FACTOR_LIMIT matching the + * highest small factor tested here. + */ + return false; + } + + private static bool ImplMRProbablePrimeToBase(BigInteger w, BigInteger wSubOne, BigInteger m, int a, BigInteger b) + { + BigInteger z = b.ModPow(m, w); + + if (z.Equals(One) || z.Equals(wSubOne)) + return true; + + for (int j = 1; j < a; ++j) + { + z = z.Square().Mod(w); + + if (z.Equals(wSubOne)) + return true; + + if (z.Equals(One)) + return false; + } + + return false; + } + + private static STOutput ImplSTRandomPrime(IDigest d, int length, byte[] primeSeed) + { + int dLen = d.GetDigestSize(); + int cLen = System.Math.Max(4, dLen); + + if (length < 33) + { + int primeGenCounter = 0; + + byte[] c0 = new byte[cLen]; + byte[] c1 = new byte[cLen]; + + for (;;) + { + Hash(d, primeSeed, c0, cLen - dLen); + Inc(primeSeed, 1); + + Hash(d, primeSeed, c1, cLen - dLen); + Inc(primeSeed, 1); + + uint c = Pack.BE_To_UInt32(c0, cLen - 4) + ^ Pack.BE_To_UInt32(c1, cLen - 4); + c &= uint.MaxValue >> (32 - length); + c |= (1U << (length - 1)) | 1U; + + ++primeGenCounter; + + if (IsPrime32(c)) + return new STOutput(BigInteger.ValueOf(c), primeSeed, primeGenCounter); + + if (primeGenCounter > (4 * length)) + throw new InvalidOperationException("Too many iterations in Shawe-Taylor Random_Prime Routine"); + } + } + + STOutput rec = ImplSTRandomPrime(d, (length + 3)/2, primeSeed); + + { + BigInteger c0 = rec.Prime; + primeSeed = rec.PrimeSeed; + int primeGenCounter = rec.PrimeGenCounter; + + int outlen = 8 * dLen; + int iterations = (length - 1)/outlen; + + int oldCounter = primeGenCounter; + + BigInteger x = HashGen(d, primeSeed, iterations + 1); + x = x.Mod(One.ShiftLeft(length - 1)).SetBit(length - 1); + + BigInteger c0x2 = c0.ShiftLeft(1); + BigInteger tx2 = x.Subtract(One).Divide(c0x2).Add(One).ShiftLeft(1); + int dt = 0; + + BigInteger c = tx2.Multiply(c0).Add(One); + + /* + * TODO Since the candidate primes are generated by constant steps ('c0x2'), + * sieving could be used here in place of the 'HasAnySmallFactors' approach. + */ + for (;;) + { + if (c.BitLength > length) + { + tx2 = One.ShiftLeft(length - 1).Subtract(One).Divide(c0x2).Add(One).ShiftLeft(1); + c = tx2.Multiply(c0).Add(One); + } + + ++primeGenCounter; + + /* + * This is an optimization of the original algorithm, using trial division to screen out + * many non-primes quickly. + * + * NOTE: 'primeSeed' is still incremented as if we performed the full check! + */ + if (ImplHasAnySmallFactors(c)) + { + Inc(primeSeed, iterations + 1); + } + else + { + BigInteger a = HashGen(d, primeSeed, iterations + 1); + a = a.Mod(c.Subtract(Three)).Add(Two); + + tx2 = tx2.Add(BigInteger.ValueOf(dt)); + dt = 0; + + BigInteger z = a.ModPow(tx2, c); + + if (c.Gcd(z.Subtract(One)).Equals(One) && z.ModPow(c0, c).Equals(One)) + return new STOutput(c, primeSeed, primeGenCounter); + } + + if (primeGenCounter >= ((4 * length) + oldCounter)) + throw new InvalidOperationException("Too many iterations in Shawe-Taylor Random_Prime Routine"); + + dt += 2; + c = c.Add(c0x2); + } + } + } + + private static void Hash(IDigest d, byte[] input, byte[] output, int outPos) + { + d.BlockUpdate(input, 0, input.Length); + d.DoFinal(output, outPos); + } + + private static BigInteger HashGen(IDigest d, byte[] seed, int count) + { + int dLen = d.GetDigestSize(); + int pos = count * dLen; + byte[] buf = new byte[pos]; + for (int i = 0; i < count; ++i) + { + pos -= dLen; + Hash(d, seed, buf, pos); + Inc(seed, 1); + } + return new BigInteger(1, buf); + } + + private static void Inc(byte[] seed, int c) + { + int pos = seed.Length; + while (c > 0 && --pos >= 0) + { + c += seed[pos]; + seed[pos] = (byte)c; + c >>= 8; + } + } + + private static bool IsPrime32(uint x) + { + /* + * Use wheel factorization with 2, 3, 5 to select trial divisors. + */ + + if (x < 32) + return ((1 << (int)x) & 0b0010_0000_1000_1010_0010_1000_1010_1100) != 0; + + if (((1 << (int)(x % 30U)) & 0b1010_0000_1000_1010_0010_1000_1000_0010U) == 0) + return false; + + uint[] ds = new uint[]{ 1, 7, 11, 13, 17, 19, 23, 29 }; + uint b = 0; + for (int pos = 1;; pos = 0) + { + /* + * Trial division by wheel-selected divisors + */ + while (pos < ds.Length) + { + uint d = b + ds[pos]; + if (x % d == 0) + return false; + + ++pos; + } + + b += 30; + + if ((b >> 16 != 0) || (b * b >= x)) + return true; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs.meta new file mode 100644 index 00000000..2834eee8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5da79a24be1ef4b40809aebe1ba8ae56 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/Primes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec.meta new file mode 100644 index 00000000..a37cd07b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2d682907ead3519499093552ee6fc81a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs new file mode 100644 index 00000000..a5303d7f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public abstract class AbstractECLookupTable + : ECLookupTable + { + public abstract ECPoint Lookup(int index); + public abstract int Size { get; } + + public virtual ECPoint LookupVar(int index) + { + return Lookup(index); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs.meta new file mode 100644 index 00000000..dde66db4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa97236b24249ae4ca288b20818a7f16 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/AbstractECLookupTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs new file mode 100644 index 00000000..19db9253 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs @@ -0,0 +1,614 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class ECAlgorithms + { + public static bool IsF2mCurve(ECCurve c) + { + return IsF2mField(c.Field); + } + + public static bool IsF2mField(IFiniteField field) + { + return field.Dimension > 1 && field.Characteristic.Equals(BigInteger.Two) + && field is IPolynomialExtensionField; + } + + public static bool IsFpCurve(ECCurve c) + { + return IsFpField(c.Field); + } + + public static bool IsFpField(IFiniteField field) + { + return field.Dimension == 1; + } + + public static ECPoint SumOfMultiplies(ECPoint[] ps, BigInteger[] ks) + { + if (ps == null || ks == null || ps.Length != ks.Length || ps.Length < 1) + throw new ArgumentException("point and scalar arrays should be non-null, and of equal, non-zero, length"); + + int count = ps.Length; + switch (count) + { + case 1: + return ps[0].Multiply(ks[0]); + case 2: + return SumOfTwoMultiplies(ps[0], ks[0], ps[1], ks[1]); + default: + break; + } + + ECPoint p = ps[0]; + ECCurve c = p.Curve; + + ECPoint[] imported = new ECPoint[count]; + imported[0] = p; + for (int i = 1; i < count; ++i) + { + imported[i] = ImportPoint(c, ps[i]); + } + + GlvEndomorphism glvEndomorphism = c.GetEndomorphism() as GlvEndomorphism; + if (glvEndomorphism != null) + { + return ImplCheckResult(ImplSumOfMultipliesGlv(imported, ks, glvEndomorphism)); + } + + return ImplCheckResult(ImplSumOfMultiplies(imported, ks)); + } + + public static ECPoint SumOfTwoMultiplies(ECPoint P, BigInteger a, ECPoint Q, BigInteger b) + { + ECCurve cp = P.Curve; + Q = ImportPoint(cp, Q); + + // Point multiplication for Koblitz curves (using WTNAF) beats Shamir's trick + { + AbstractF2mCurve f2mCurve = cp as AbstractF2mCurve; + if (f2mCurve != null && f2mCurve.IsKoblitz) + { + return ImplCheckResult(P.Multiply(a).Add(Q.Multiply(b))); + } + } + + GlvEndomorphism glvEndomorphism = cp.GetEndomorphism() as GlvEndomorphism; + if (glvEndomorphism != null) + { + return ImplCheckResult( + ImplSumOfMultipliesGlv(new ECPoint[] { P, Q }, new BigInteger[] { a, b }, glvEndomorphism)); + } + + return ImplCheckResult(ImplShamirsTrickWNaf(P, a, Q, b)); + } + + /* + * "Shamir's Trick", originally due to E. G. Straus + * (Addition chains of vectors. American Mathematical Monthly, + * 71(7):806-808, Aug./Sept. 1964) + * + * Input: The points P, Q, scalar k = (km?, ... , k1, k0) + * and scalar l = (lm?, ... , l1, l0). + * Output: R = k * P + l * Q. + * 1: Z <- P + Q + * 2: R <- O + * 3: for i from m-1 down to 0 do + * 4: R <- R + R {point doubling} + * 5: if (ki = 1) and (li = 0) then R <- R + P end if + * 6: if (ki = 0) and (li = 1) then R <- R + Q end if + * 7: if (ki = 1) and (li = 1) then R <- R + Z end if + * 8: end for + * 9: return R + */ + public static ECPoint ShamirsTrick(ECPoint P, BigInteger k, ECPoint Q, BigInteger l) + { + ECCurve cp = P.Curve; + Q = ImportPoint(cp, Q); + + return ImplCheckResult(ImplShamirsTrickJsf(P, k, Q, l)); + } + + public static ECPoint ImportPoint(ECCurve c, ECPoint p) + { + ECCurve cp = p.Curve; + if (!c.Equals(cp)) + throw new ArgumentException("Point must be on the same curve"); + + return c.ImportPoint(p); + } + + public static void MontgomeryTrick(ECFieldElement[] zs, int off, int len) + { + MontgomeryTrick(zs, off, len, null); + } + + public static void MontgomeryTrick(ECFieldElement[] zs, int off, int len, ECFieldElement scale) + { + /* + * Uses the "Montgomery Trick" to invert many field elements, with only a single actual + * field inversion. See e.g. the paper: + * "Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick" + * by Katsuyuki Okeya, Kouichi Sakurai. + */ + + ECFieldElement[] c = new ECFieldElement[len]; + c[0] = zs[off]; + + int i = 0; + while (++i < len) + { + c[i] = c[i - 1].Multiply(zs[off + i]); + } + + --i; + + if (scale != null) + { + c[i] = c[i].Multiply(scale); + } + + ECFieldElement u = c[i].Invert(); + + while (i > 0) + { + int j = off + i--; + ECFieldElement tmp = zs[j]; + zs[j] = c[i].Multiply(u); + u = u.Multiply(tmp); + } + + zs[off] = u; + } + + /** + * Simple shift-and-add multiplication. Serves as reference implementation to verify (possibly + * faster) implementations, and for very small scalars. CAUTION: This implementation is NOT + * constant-time in any way. It is only intended to be used for diagnostics. + * + * @param p + * The point to multiply. + * @param k + * The multiplier. + * @return The result of the point multiplication kP. + */ + public static ECPoint ReferenceMultiply(ECPoint p, BigInteger k) + { + BigInteger x = k.Abs(); + ECPoint q = p.Curve.Infinity; + int t = x.BitLength; + if (t > 0) + { + if (x.TestBit(0)) + { + q = p; + } + for (int i = 1; i < t; i++) + { + p = p.Twice(); + if (x.TestBit(i)) + { + q = q.Add(p); + } + } + } + return k.SignValue < 0 ? q.Negate() : q; + } + + public static ECPoint ValidatePoint(ECPoint p) + { + if (!p.IsValid()) + throw new InvalidOperationException("Invalid point"); + + return p; + } + + public static ECPoint CleanPoint(ECCurve c, ECPoint p) + { + ECCurve cp = p.Curve; + if (!c.Equals(cp)) + throw new ArgumentException("Point must be on the same curve", nameof(p)); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int encodedLength = p.GetEncodedLength(false); + Span encoding = encodedLength <= 512 + ? stackalloc byte[encodedLength] + : new byte[encodedLength]; + p.EncodeTo(false, encoding); + return c.DecodePoint(encoding); +#else + return c.DecodePoint(p.GetEncoded(false)); +#endif + } + + internal static ECPoint ImplCheckResult(ECPoint p) + { + if (!p.IsValidPartial()) + throw new InvalidOperationException("Invalid result"); + + return p; + } + + internal static ECPoint ImplShamirsTrickJsf(ECPoint P, BigInteger k, ECPoint Q, BigInteger l) + { + ECCurve curve = P.Curve; + ECPoint infinity = curve.Infinity; + + // TODO conjugate co-Z addition (ZADDC) can return both of these + ECPoint PaddQ = P.Add(Q); + ECPoint PsubQ = P.Subtract(Q); + + ECPoint[] points = new ECPoint[] { Q, PsubQ, P, PaddQ }; + curve.NormalizeAll(points); + + ECPoint[] table = new ECPoint[] { + points[3].Negate(), points[2].Negate(), points[1].Negate(), + points[0].Negate(), infinity, points[0], + points[1], points[2], points[3] }; + + byte[] jsf = WNafUtilities.GenerateJsf(k, l); + + ECPoint R = infinity; + + int i = jsf.Length; + while (--i >= 0) + { + int jsfi = jsf[i]; + + // NOTE: The shifting ensures the sign is extended correctly + int kDigit = ((jsfi << 24) >> 28), lDigit = ((jsfi << 28) >> 28); + + int index = 4 + (kDigit * 3) + lDigit; + R = R.TwicePlus(table[index]); + } + + return R; + } + + internal static ECPoint ImplShamirsTrickWNaf(ECPoint P, BigInteger k, + ECPoint Q, BigInteger l) + { + bool negK = k.SignValue < 0, negL = l.SignValue < 0; + + BigInteger kAbs = k.Abs(), lAbs = l.Abs(); + + int minWidthP = WNafUtilities.GetWindowSize(kAbs.BitLength, 8); + int minWidthQ = WNafUtilities.GetWindowSize(lAbs.BitLength, 8); + + WNafPreCompInfo infoP = WNafUtilities.Precompute(P, minWidthP, true); + WNafPreCompInfo infoQ = WNafUtilities.Precompute(Q, minWidthQ, true); + + // When P, Q are 'promoted' (i.e. reused several times), switch to fixed-point algorithm + { + ECCurve c = P.Curve; + int combSize = FixedPointUtilities.GetCombSize(c); + if (!negK && !negL + && k.BitLength <= combSize && l.BitLength <= combSize + && infoP.IsPromoted && infoQ.IsPromoted) + { + return ImplShamirsTrickFixedPoint(P, k, Q, l); + } + } + + int widthP = System.Math.Min(8, infoP.Width); + int widthQ = System.Math.Min(8, infoQ.Width); + + ECPoint[] preCompP = negK ? infoP.PreCompNeg : infoP.PreComp; + ECPoint[] preCompQ = negL ? infoQ.PreCompNeg : infoQ.PreComp; + ECPoint[] preCompNegP = negK ? infoP.PreComp : infoP.PreCompNeg; + ECPoint[] preCompNegQ = negL ? infoQ.PreComp : infoQ.PreCompNeg; + + byte[] wnafP = WNafUtilities.GenerateWindowNaf(widthP, kAbs); + byte[] wnafQ = WNafUtilities.GenerateWindowNaf(widthQ, lAbs); + + return ImplShamirsTrickWNaf(preCompP, preCompNegP, wnafP, preCompQ, preCompNegQ, wnafQ); + } + + internal static ECPoint ImplShamirsTrickWNaf(ECEndomorphism endomorphism, ECPoint P, BigInteger k, BigInteger l) + { + bool negK = k.SignValue < 0, negL = l.SignValue < 0; + + k = k.Abs(); + l = l.Abs(); + + int minWidth = WNafUtilities.GetWindowSize(System.Math.Max(k.BitLength, l.BitLength), 8); + + WNafPreCompInfo infoP = WNafUtilities.Precompute(P, minWidth, true); + ECPoint Q = EndoUtilities.MapPoint(endomorphism, P); + WNafPreCompInfo infoQ = WNafUtilities.PrecomputeWithPointMap(Q, endomorphism.PointMap, infoP, true); + + int widthP = System.Math.Min(8, infoP.Width); + int widthQ = System.Math.Min(8, infoQ.Width); + + ECPoint[] preCompP = negK ? infoP.PreCompNeg : infoP.PreComp; + ECPoint[] preCompQ = negL ? infoQ.PreCompNeg : infoQ.PreComp; + ECPoint[] preCompNegP = negK ? infoP.PreComp : infoP.PreCompNeg; + ECPoint[] preCompNegQ = negL ? infoQ.PreComp : infoQ.PreCompNeg; + + byte[] wnafP = WNafUtilities.GenerateWindowNaf(widthP, k); + byte[] wnafQ = WNafUtilities.GenerateWindowNaf(widthQ, l); + + return ImplShamirsTrickWNaf(preCompP, preCompNegP, wnafP, preCompQ, preCompNegQ, wnafQ); + } + + private static ECPoint ImplShamirsTrickWNaf(ECPoint[] preCompP, ECPoint[] preCompNegP, byte[] wnafP, + ECPoint[] preCompQ, ECPoint[] preCompNegQ, byte[] wnafQ) + { + int len = System.Math.Max(wnafP.Length, wnafQ.Length); + + ECCurve curve = preCompP[0].Curve; + ECPoint infinity = curve.Infinity; + + ECPoint R = infinity; + int zeroes = 0; + + for (int i = len - 1; i >= 0; --i) + { + int wiP = i < wnafP.Length ? (int)(sbyte)wnafP[i] : 0; + int wiQ = i < wnafQ.Length ? (int)(sbyte)wnafQ[i] : 0; + + if ((wiP | wiQ) == 0) + { + ++zeroes; + continue; + } + + ECPoint r = infinity; + if (wiP != 0) + { + int nP = System.Math.Abs(wiP); + ECPoint[] tableP = wiP < 0 ? preCompNegP : preCompP; + r = r.Add(tableP[nP >> 1]); + } + if (wiQ != 0) + { + int nQ = System.Math.Abs(wiQ); + ECPoint[] tableQ = wiQ < 0 ? preCompNegQ : preCompQ; + r = r.Add(tableQ[nQ >> 1]); + } + + if (zeroes > 0) + { + R = R.TimesPow2(zeroes); + zeroes = 0; + } + + R = R.TwicePlus(r); + } + + if (zeroes > 0) + { + R = R.TimesPow2(zeroes); + } + + return R; + } + + internal static ECPoint ImplSumOfMultiplies(ECPoint[] ps, BigInteger[] ks) + { + int count = ps.Length; + bool[] negs = new bool[count]; + WNafPreCompInfo[] infos = new WNafPreCompInfo[count]; + byte[][] wnafs = new byte[count][]; + + for (int i = 0; i < count; ++i) + { + BigInteger ki = ks[i]; negs[i] = ki.SignValue < 0; ki = ki.Abs(); + + int minWidth = WNafUtilities.GetWindowSize(ki.BitLength, 8); + WNafPreCompInfo info = WNafUtilities.Precompute(ps[i], minWidth, true); + + int width = System.Math.Min(8, info.Width); + + infos[i] = info; + wnafs[i] = WNafUtilities.GenerateWindowNaf(width, ki); + } + + return ImplSumOfMultiplies(negs, infos, wnafs); + } + + internal static ECPoint ImplSumOfMultipliesGlv(ECPoint[] ps, BigInteger[] ks, GlvEndomorphism glvEndomorphism) + { + BigInteger n = ps[0].Curve.Order; + + int len = ps.Length; + + BigInteger[] abs = new BigInteger[len << 1]; + for (int i = 0, j = 0; i < len; ++i) + { + BigInteger[] ab = glvEndomorphism.DecomposeScalar(ks[i].Mod(n)); + abs[j++] = ab[0]; + abs[j++] = ab[1]; + } + + if (glvEndomorphism.HasEfficientPointMap) + { + return ImplSumOfMultiplies(glvEndomorphism, ps, abs); + } + + ECPoint[] pqs = new ECPoint[len << 1]; + for (int i = 0, j = 0; i < len; ++i) + { + ECPoint p = ps[i]; + ECPoint q = EndoUtilities.MapPoint(glvEndomorphism, p); + pqs[j++] = p; + pqs[j++] = q; + } + + return ImplSumOfMultiplies(pqs, abs); + } + + internal static ECPoint ImplSumOfMultiplies(ECEndomorphism endomorphism, ECPoint[] ps, BigInteger[] ks) + { + int halfCount = ps.Length, fullCount = halfCount << 1; + + bool[] negs = new bool[fullCount]; + WNafPreCompInfo[] infos = new WNafPreCompInfo[fullCount]; + byte[][] wnafs = new byte[fullCount][]; + + ECPointMap pointMap = endomorphism.PointMap; + + for (int i = 0; i < halfCount; ++i) + { + int j0 = i << 1, j1 = j0 + 1; + + BigInteger kj0 = ks[j0]; negs[j0] = kj0.SignValue < 0; kj0 = kj0.Abs(); + BigInteger kj1 = ks[j1]; negs[j1] = kj1.SignValue < 0; kj1 = kj1.Abs(); + + int minWidth = WNafUtilities.GetWindowSize(System.Math.Max(kj0.BitLength, kj1.BitLength), 8); + + ECPoint P = ps[i]; + WNafPreCompInfo infoP = WNafUtilities.Precompute(P, minWidth, true); + ECPoint Q = EndoUtilities.MapPoint(endomorphism, P); + WNafPreCompInfo infoQ = WNafUtilities.PrecomputeWithPointMap(Q, pointMap, infoP, true); + + int widthP = System.Math.Min(8, infoP.Width); + int widthQ = System.Math.Min(8, infoQ.Width); + + infos[j0] = infoP; + infos[j1] = infoQ; + wnafs[j0] = WNafUtilities.GenerateWindowNaf(widthP, kj0); + wnafs[j1] = WNafUtilities.GenerateWindowNaf(widthQ, kj1); + } + + return ImplSumOfMultiplies(negs, infos, wnafs); + } + + private static ECPoint ImplSumOfMultiplies(bool[] negs, WNafPreCompInfo[] infos, byte[][] wnafs) + { + int len = 0, count = wnafs.Length; + for (int i = 0; i < count; ++i) + { + len = System.Math.Max(len, wnafs[i].Length); + } + + ECCurve curve = infos[0].PreComp[0].Curve; + ECPoint infinity = curve.Infinity; + + ECPoint R = infinity; + int zeroes = 0; + + for (int i = len - 1; i >= 0; --i) + { + ECPoint r = infinity; + + for (int j = 0; j < count; ++j) + { + byte[] wnaf = wnafs[j]; + int wi = i < wnaf.Length ? (int)(sbyte)wnaf[i] : 0; + if (wi != 0) + { + int n = System.Math.Abs(wi); + WNafPreCompInfo info = infos[j]; + ECPoint[] table = (wi < 0 == negs[j]) ? info.PreComp : info.PreCompNeg; + r = r.Add(table[n >> 1]); + } + } + + if (r == infinity) + { + ++zeroes; + continue; + } + + if (zeroes > 0) + { + R = R.TimesPow2(zeroes); + zeroes = 0; + } + + R = R.TwicePlus(r); + } + + if (zeroes > 0) + { + R = R.TimesPow2(zeroes); + } + + return R; + } + + private static ECPoint ImplShamirsTrickFixedPoint(ECPoint p, BigInteger k, ECPoint q, BigInteger l) + { + ECCurve c = p.Curve; + int combSize = FixedPointUtilities.GetCombSize(c); + + if (k.BitLength > combSize || l.BitLength > combSize) + { + /* + * TODO The comb works best when the scalars are less than the (possibly unknown) order. + * Still, if we want to handle larger scalars, we could allow customization of the comb + * size, or alternatively we could deal with the 'extra' bits either by running the comb + * multiple times as necessary, or by using an alternative multiplier as prelude. + */ + throw new InvalidOperationException("fixed-point comb doesn't support scalars larger than the curve order"); + } + + FixedPointPreCompInfo infoP = FixedPointUtilities.Precompute(p); + FixedPointPreCompInfo infoQ = FixedPointUtilities.Precompute(q); + + ECLookupTable lookupTableP = infoP.LookupTable; + ECLookupTable lookupTableQ = infoQ.LookupTable; + + int widthP = infoP.Width; + int widthQ = infoQ.Width; + + // TODO This shouldn't normally happen, but a better "solution" is desirable anyway + if (widthP != widthQ) + { + FixedPointCombMultiplier m = new FixedPointCombMultiplier(); + ECPoint r1 = m.Multiply(p, k); + ECPoint r2 = m.Multiply(q, l); + return r1.Add(r2); + } + + int width = widthP; + + int d = (combSize + width - 1) / width; + + ECPoint R = c.Infinity; + + int fullComb = d * width; + uint[] K = Nat.FromBigInteger(fullComb, k); + uint[] L = Nat.FromBigInteger(fullComb, l); + + int top = fullComb - 1; + for (int i = 0; i < d; ++i) + { + uint secretIndexK = 0, secretIndexL = 0; + + for (int j = top - i; j >= 0; j -= d) + { + uint secretBitK = K[j >> 5] >> (j & 0x1F); + secretIndexK ^= secretBitK >> 1; + secretIndexK <<= 1; + secretIndexK ^= secretBitK; + + uint secretBitL = L[j >> 5] >> (j & 0x1F); + secretIndexL ^= secretBitL >> 1; + secretIndexL <<= 1; + secretIndexL ^= secretBitL; + } + + ECPoint addP = lookupTableP.LookupVar((int)secretIndexK); + ECPoint addQ = lookupTableQ.LookupVar((int)secretIndexL); + + ECPoint T = addP.Add(addQ); + + R = R.TwicePlus(T); + } + + return R.Add(infoP.Offset).Add(infoQ.Offset); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs.meta new file mode 100644 index 00000000..bee457b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 24a43583bbe553f49b0863fe2329819c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECAlgorithms.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs new file mode 100644 index 00000000..23a8a37c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs @@ -0,0 +1,1518 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + /// Base class for an elliptic curve. + public abstract class ECCurve + { + public const int COORD_AFFINE = 0; + public const int COORD_HOMOGENEOUS = 1; + public const int COORD_JACOBIAN = 2; + public const int COORD_JACOBIAN_CHUDNOVSKY = 3; + public const int COORD_JACOBIAN_MODIFIED = 4; + public const int COORD_LAMBDA_AFFINE = 5; + public const int COORD_LAMBDA_PROJECTIVE = 6; + public const int COORD_SKEWED = 7; + + public static int[] GetAllCoordinateSystems() + { + return new int[]{ COORD_AFFINE, COORD_HOMOGENEOUS, COORD_JACOBIAN, COORD_JACOBIAN_CHUDNOVSKY, + COORD_JACOBIAN_MODIFIED, COORD_LAMBDA_AFFINE, COORD_LAMBDA_PROJECTIVE, COORD_SKEWED }; + } + + public class Config + { + protected ECCurve outer; + protected int coord; + protected ECEndomorphism endomorphism; + protected ECMultiplier multiplier; + + internal Config(ECCurve outer, int coord, ECEndomorphism endomorphism, ECMultiplier multiplier) + { + this.outer = outer; + this.coord = coord; + this.endomorphism = endomorphism; + this.multiplier = multiplier; + } + + public Config SetCoordinateSystem(int coord) + { + this.coord = coord; + return this; + } + + public Config SetEndomorphism(ECEndomorphism endomorphism) + { + this.endomorphism = endomorphism; + return this; + } + + public Config SetMultiplier(ECMultiplier multiplier) + { + this.multiplier = multiplier; + return this; + } + + public ECCurve Create() + { + if (!outer.SupportsCoordinateSystem(coord)) + { + throw new InvalidOperationException("unsupported coordinate system"); + } + + ECCurve c = outer.CloneCurve(); + if (c == outer) + { + throw new InvalidOperationException("implementation returned current curve"); + } + + c.m_coord = coord; + c.m_endomorphism = endomorphism; + c.m_multiplier = multiplier; + + return c; + } + } + + protected readonly IFiniteField m_field; + protected ECFieldElement m_a, m_b; + protected BigInteger m_order, m_cofactor; + + protected int m_coord = COORD_AFFINE; + protected ECEndomorphism m_endomorphism = null; + protected ECMultiplier m_multiplier = null; + + protected ECCurve(IFiniteField field) + { + this.m_field = field; + } + + public abstract int FieldSize { get; } + public abstract ECFieldElement FromBigInteger(BigInteger x); + public abstract bool IsValidFieldElement(BigInteger x); + + public abstract ECFieldElement RandomFieldElement(SecureRandom r); + + public abstract ECFieldElement RandomFieldElementMult(SecureRandom r); + + public virtual Config Configure() + { + return new Config(this, this.m_coord, this.m_endomorphism, this.m_multiplier); + } + + public virtual ECPoint ValidatePoint(BigInteger x, BigInteger y) + { + ECPoint p = CreatePoint(x, y); + if (!p.IsValid()) + throw new ArgumentException("Invalid point coordinates"); + + return p; + } + + public virtual ECPoint CreatePoint(BigInteger x, BigInteger y) + { + return CreateRawPoint(FromBigInteger(x), FromBigInteger(y)); + } + + protected abstract ECCurve CloneCurve(); + + protected internal abstract ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y); + + protected internal abstract ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs); + + protected virtual ECMultiplier CreateDefaultMultiplier() + { + GlvEndomorphism glvEndomorphism = m_endomorphism as GlvEndomorphism; + if (glvEndomorphism != null) + { + return new GlvMultiplier(this, glvEndomorphism); + } + + return new WNafL2RMultiplier(); + } + + public virtual bool SupportsCoordinateSystem(int coord) + { + return coord == COORD_AFFINE; + } + + public virtual PreCompInfo GetPreCompInfo(ECPoint point, string name) + { + CheckPoint(point); + + IDictionary table; + lock (point) + { + table = point.m_preCompTable; + } + + if (null == table) + return null; + + lock (table) + { + return table.TryGetValue(name, out var preCompInfo) ? preCompInfo : null; + } + } + + /** + * Compute a PreCompInfo for a point on this curve, under a given name. Used by + * ECMultipliers to save the precomputation for this ECPoint for use + * by subsequent multiplication. + * + * @param point + * The ECPoint to store precomputations for. + * @param name + * A String used to index precomputations of different types. + * @param callback + * Called to calculate the PreCompInfo. + */ + public virtual PreCompInfo Precompute(ECPoint point, string name, IPreCompCallback callback) + { + CheckPoint(point); + + IDictionary table; + lock (point) + { + table = point.m_preCompTable; + if (null == table) + { + point.m_preCompTable = table = new Dictionary(); + } + } + + lock (table) + { + PreCompInfo existing = table.TryGetValue(name, out var preCompInfo) ? preCompInfo : null; + PreCompInfo result = callback.Precompute(existing); + + if (result != existing) + { + table[name] = result; + } + + return result; + } + } + + public virtual ECPoint ImportPoint(ECPoint p) + { + if (this == p.Curve) + { + return p; + } + if (p.IsInfinity) + { + return Infinity; + } + + // TODO Default behaviour could be improved if the two curves have the same coordinate system by copying any Z coordinates. + p = p.Normalize(); + + return CreatePoint(p.XCoord.ToBigInteger(), p.YCoord.ToBigInteger()); + } + + /** + * Normalization ensures that any projective coordinate is 1, and therefore that the x, y + * coordinates reflect those of the equivalent point in an affine coordinate system. Where more + * than one point is to be normalized, this method will generally be more efficient than + * normalizing each point separately. + * + * @param points + * An array of points that will be updated in place with their normalized versions, + * where necessary + */ + public virtual void NormalizeAll(ECPoint[] points) + { + NormalizeAll(points, 0, points.Length, null); + } + + /** + * Normalization ensures that any projective coordinate is 1, and therefore that the x, y + * coordinates reflect those of the equivalent point in an affine coordinate system. Where more + * than one point is to be normalized, this method will generally be more efficient than + * normalizing each point separately. An (optional) z-scaling factor can be applied; effectively + * each z coordinate is scaled by this value prior to normalization (but only one + * actual multiplication is needed). + * + * @param points + * An array of points that will be updated in place with their normalized versions, + * where necessary + * @param off + * The start of the range of points to normalize + * @param len + * The length of the range of points to normalize + * @param iso + * The (optional) z-scaling factor - can be null + */ + public virtual void NormalizeAll(ECPoint[] points, int off, int len, ECFieldElement iso) + { + CheckPoints(points, off, len); + + switch (this.CoordinateSystem) + { + case ECCurve.COORD_AFFINE: + case ECCurve.COORD_LAMBDA_AFFINE: + { + if (iso != null) + throw new ArgumentException("not valid for affine coordinates", "iso"); + + return; + } + } + + /* + * Figure out which of the points actually need to be normalized + */ + ECFieldElement[] zs = new ECFieldElement[len]; + int[] indices = new int[len]; + int count = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + if (null != p && (iso != null || !p.IsNormalized())) + { + zs[count] = p.GetZCoord(0); + indices[count++] = off + i; + } + } + + if (count == 0) + { + return; + } + + ECAlgorithms.MontgomeryTrick(zs, 0, count, iso); + + for (int j = 0; j < count; ++j) + { + int index = indices[j]; + points[index] = points[index].Normalize(zs[j]); + } + } + + public abstract ECPoint Infinity { get; } + + public virtual IFiniteField Field + { + get { return m_field; } + } + + public virtual ECFieldElement A + { + get { return m_a; } + } + + public virtual ECFieldElement B + { + get { return m_b; } + } + + public virtual BigInteger Order + { + get { return m_order; } + } + + public virtual BigInteger Cofactor + { + get { return m_cofactor; } + } + + public virtual int CoordinateSystem + { + get { return m_coord; } + } + + /** + * Create a cache-safe lookup table for the specified sequence of points. All the points MUST + * belong to this ECCurve instance, and MUST already be normalized. + */ + public virtual ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + int FE_BYTES = (FieldSize + 7) / 8; + byte[] table = new byte[len * FE_BYTES * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + byte[] px = p.RawXCoord.ToBigInteger().ToByteArray(); + byte[] py = p.RawYCoord.ToBigInteger().ToByteArray(); + + int pxStart = px.Length > FE_BYTES ? 1 : 0, pxLen = px.Length - pxStart; + int pyStart = py.Length > FE_BYTES ? 1 : 0, pyLen = py.Length - pyStart; + + Array.Copy(px, pxStart, table, pos + FE_BYTES - pxLen, pxLen); pos += FE_BYTES; + Array.Copy(py, pyStart, table, pos + FE_BYTES - pyLen, pyLen); pos += FE_BYTES; + } + } + + return new DefaultLookupTable(this, table, len); + } + + protected virtual void CheckPoint(ECPoint point) + { + if (null == point || (this != point.Curve)) + throw new ArgumentException("must be non-null and on this curve", "point"); + } + + protected virtual void CheckPoints(ECPoint[] points) + { + CheckPoints(points, 0, points.Length); + } + + protected virtual void CheckPoints(ECPoint[] points, int off, int len) + { + if (points == null) + throw new ArgumentNullException("points"); + if (off < 0 || len < 0 || (off > (points.Length - len))) + throw new ArgumentException("invalid range specified", "points"); + + for (int i = 0; i < len; ++i) + { + ECPoint point = points[off + i]; + if (null != point && this != point.Curve) + throw new ArgumentException("entries must be null or on this curve", "points"); + } + } + + public virtual bool Equals(ECCurve other) + { + if (this == other) + return true; + if (null == other) + return false; + return Field.Equals(other.Field) + && A.ToBigInteger().Equals(other.A.ToBigInteger()) + && B.ToBigInteger().Equals(other.B.ToBigInteger()); + } + + public override bool Equals(object obj) + { + return Equals(obj as ECCurve); + } + + public override int GetHashCode() + { + return Field.GetHashCode() + ^ Integers.RotateLeft(A.ToBigInteger().GetHashCode(), 8) + ^ Integers.RotateLeft(B.ToBigInteger().GetHashCode(), 16); + } + + protected abstract ECPoint DecompressPoint(int yTilde, BigInteger X1); + + public virtual ECEndomorphism GetEndomorphism() + { + return m_endomorphism; + } + + /** + * Sets the default ECMultiplier, unless already set. + * + * We avoid locking for performance reasons, so there is no uniqueness guarantee. + */ + public virtual ECMultiplier GetMultiplier() + { + if (this.m_multiplier == null) + { + this.m_multiplier = CreateDefaultMultiplier(); + } + return this.m_multiplier; + } + + /** + * Decode a point on this curve from its ASN.1 encoding. The different + * encodings are taken account of, including point compression for + * Fp (X9.62 s 4.2.1 pg 17). + * @return The decoded point. + */ + public virtual ECPoint DecodePoint(byte[] encoded) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DecodePoint(encoded.AsSpan()); +#else + ECPoint p; + int expectedLength = (FieldSize + 7) / 8; + + byte type = encoded[0]; + switch (type) + { + case 0x00: // infinity + { + if (encoded.Length != 1) + throw new ArgumentException("Incorrect length for infinity encoding", "encoded"); + + p = Infinity; + break; + } + + case 0x02: // compressed + case 0x03: // compressed + { + if (encoded.Length != (expectedLength + 1)) + throw new ArgumentException("Incorrect length for compressed encoding", "encoded"); + + int yTilde = type & 1; + BigInteger X = new BigInteger(1, encoded, 1, expectedLength); + + p = DecompressPoint(yTilde, X); + if (!p.ImplIsValid(true, true)) + throw new ArgumentException("Invalid point"); + + break; + } + + case 0x04: // uncompressed + { + if (encoded.Length != (2 * expectedLength + 1)) + throw new ArgumentException("Incorrect length for uncompressed encoding", "encoded"); + + BigInteger X = new BigInteger(1, encoded, 1, expectedLength); + BigInteger Y = new BigInteger(1, encoded, 1 + expectedLength, expectedLength); + + p = ValidatePoint(X, Y); + break; + } + + case 0x06: // hybrid + case 0x07: // hybrid + { + if (encoded.Length != (2 * expectedLength + 1)) + throw new ArgumentException("Incorrect length for hybrid encoding", "encoded"); + + BigInteger X = new BigInteger(1, encoded, 1, expectedLength); + BigInteger Y = new BigInteger(1, encoded, 1 + expectedLength, expectedLength); + + if (Y.TestBit(0) != (type == 0x07)) + throw new ArgumentException("Inconsistent Y coordinate in hybrid encoding", "encoded"); + + p = ValidatePoint(X, Y); + break; + } + + default: + throw new FormatException("Invalid point encoding " + type); + } + + if (type != 0x00 && p.IsInfinity) + throw new ArgumentException("Invalid infinity encoding", "encoded"); + + return p; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual ECPoint DecodePoint(ReadOnlySpan encoded) + { + ECPoint p; + int expectedLength = (FieldSize + 7) / 8; + + byte type = encoded[0]; + switch (type) + { + case 0x00: // infinity + { + if (encoded.Length != 1) + throw new ArgumentException("Incorrect length for infinity encoding", "encoded"); + + p = Infinity; + break; + } + + case 0x02: // compressed + case 0x03: // compressed + { + if (encoded.Length != (expectedLength + 1)) + throw new ArgumentException("Incorrect length for compressed encoding", "encoded"); + + int yTilde = type & 1; + BigInteger X = new BigInteger(1, encoded[1..]); + + p = DecompressPoint(yTilde, X); + if (!p.ImplIsValid(true, true)) + throw new ArgumentException("Invalid point"); + + break; + } + + case 0x04: // uncompressed + { + if (encoded.Length != (2 * expectedLength + 1)) + throw new ArgumentException("Incorrect length for uncompressed encoding", "encoded"); + + BigInteger X = new BigInteger(1, encoded[1..(1 + expectedLength)]); + BigInteger Y = new BigInteger(1, encoded[(1 + expectedLength)..]); + + p = ValidatePoint(X, Y); + break; + } + + case 0x06: // hybrid + case 0x07: // hybrid + { + if (encoded.Length != (2 * expectedLength + 1)) + throw new ArgumentException("Incorrect length for hybrid encoding", "encoded"); + + BigInteger X = new BigInteger(1, encoded[1..(1 + expectedLength)]); + BigInteger Y = new BigInteger(1, encoded[(1 + expectedLength)..]); + + if (Y.TestBit(0) != (type == 0x07)) + throw new ArgumentException("Inconsistent Y coordinate in hybrid encoding", "encoded"); + + p = ValidatePoint(X, Y); + break; + } + + default: + throw new FormatException("Invalid point encoding " + type); + } + + if (type != 0x00 && p.IsInfinity) + throw new ArgumentException("Invalid infinity encoding", "encoded"); + + return p; + } +#endif + + private class DefaultLookupTable + : AbstractECLookupTable + { + private readonly ECCurve m_outer; + private readonly byte[] m_table; + private readonly int m_size; + + internal DefaultLookupTable(ECCurve outer, byte[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + int FE_BYTES = (m_outer.FieldSize + 7) / 8; + byte[] x = new byte[FE_BYTES], y = new byte[FE_BYTES]; + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + byte MASK = (byte)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < FE_BYTES; ++j) + { + x[j] ^= (byte)(m_table[pos + j] & MASK); + y[j] ^= (byte)(m_table[pos + FE_BYTES + j] & MASK); + } + + pos += (FE_BYTES * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + int FE_BYTES = (m_outer.FieldSize + 7) / 8; + byte[] x = new byte[FE_BYTES], y = new byte[FE_BYTES]; + int pos = index * FE_BYTES * 2; + + for (int j = 0; j < FE_BYTES; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + FE_BYTES + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(byte[] x, byte[] y) + { + ECFieldElement X = m_outer.FromBigInteger(new BigInteger(1, x)); + ECFieldElement Y = m_outer.FromBigInteger(new BigInteger(1, y)); + return m_outer.CreateRawPoint(X, Y); + } + } + } + + public abstract class AbstractFpCurve + : ECCurve + { + protected AbstractFpCurve(BigInteger q) + : base(FiniteFields.GetPrimeField(q)) + { + } + + public override bool IsValidFieldElement(BigInteger x) + { + return x != null && x.SignValue >= 0 && x.CompareTo(Field.Characteristic) < 0; + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + /* + * NOTE: BigInteger comparisons in the rejection sampling are not constant-time, so we + * use the product of two independent elements to mitigate side-channels. + */ + BigInteger p = Field.Characteristic; + ECFieldElement fe1 = FromBigInteger(ImplRandomFieldElement(r, p)); + ECFieldElement fe2 = FromBigInteger(ImplRandomFieldElement(r, p)); + return fe1.Multiply(fe2); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + /* + * NOTE: BigInteger comparisons in the rejection sampling are not constant-time, so we + * use the product of two independent elements to mitigate side-channels. + */ + BigInteger p = Field.Characteristic; + ECFieldElement fe1 = FromBigInteger(ImplRandomFieldElementMult(r, p)); + ECFieldElement fe2 = FromBigInteger(ImplRandomFieldElementMult(r, p)); + return fe1.Multiply(fe2); + } + + protected override ECPoint DecompressPoint(int yTilde, BigInteger X1) + { + ECFieldElement x = FromBigInteger(X1); + ECFieldElement rhs = x.Square().Add(A).Multiply(x).Add(B); + ECFieldElement y = rhs.Sqrt(); + + /* + * If y is not a square, then we haven't got a point on the curve + */ + if (y == null) + throw new ArgumentException("Invalid point compression"); + + if (y.TestBitZero() != (yTilde == 1)) + { + // Use the other root + y = y.Negate(); + } + + return CreateRawPoint(x, y); + } + + private static BigInteger ImplRandomFieldElement(SecureRandom r, BigInteger p) + { + BigInteger x; + do + { + x = BigIntegers.CreateRandomBigInteger(p.BitLength, r); + } + while (x.CompareTo(p) >= 0); + return x; + } + + private static BigInteger ImplRandomFieldElementMult(SecureRandom r, BigInteger p) + { + BigInteger x; + do + { + x = BigIntegers.CreateRandomBigInteger(p.BitLength, r); + } + while (x.SignValue <= 0 || x.CompareTo(p) >= 0); + return x; + } + } + + /** + * Elliptic curve over Fp + */ + public class FpCurve + : AbstractFpCurve + { + private const int FP_DEFAULT_COORDS = COORD_JACOBIAN_MODIFIED; + + private static readonly HashSet KnownQs = new HashSet(); + + protected readonly BigInteger m_q, m_r; + protected readonly FpPoint m_infinity; + + + public FpCurve(BigInteger q, BigInteger a, BigInteger b) + : this(q, a, b, null, null) + { + } + + public FpCurve(BigInteger q, BigInteger a, BigInteger b, BigInteger order, BigInteger cofactor) + : this(q, a, b, order, cofactor, false) + { + } + + internal FpCurve(BigInteger q, BigInteger a, BigInteger b, BigInteger order, BigInteger cofactor, bool isInternal) + : base(q) + { + if (!isInternal) + { + bool unknownQ; + lock (KnownQs) unknownQ = !KnownQs.Contains(q); + + if (unknownQ) + { + int maxBitLength = AsInteger("Best.HTTP.SecureProtocol.Org.BouncyCastle.EC.Fp_MaxSize", 1042); // 2 * 521 + int certainty = AsInteger("Best.HTTP.SecureProtocol.Org.BouncyCastle.EC.Fp_Certainty", 100); + + int qBitLength = q.BitLength; + if (maxBitLength < qBitLength) + throw new ArgumentException("Fp q value out of range"); + + if (Primes.HasAnySmallFactors(q) || + !Primes.IsMRProbablePrime(q, SecureRandom.ArbitraryRandom, + GetNumberOfIterations(qBitLength, certainty))) + { + throw new ArgumentException("Fp q value not prime"); + } + } + } + + lock (KnownQs) KnownQs.Add(q); + this.m_q = q; + + this.m_r = FpFieldElement.CalculateResidue(q); + this.m_infinity = new FpPoint(this, null, null); + + this.m_a = FromBigInteger(a); + this.m_b = FromBigInteger(b); + this.m_order = order; + this.m_cofactor = cofactor; + this.m_coord = FP_DEFAULT_COORDS; + } + + internal FpCurve(BigInteger q, BigInteger r, ECFieldElement a, ECFieldElement b, BigInteger order, + BigInteger cofactor) + : base(q) + { + this.m_q = q; + this.m_r = r; + this.m_infinity = new FpPoint(this, null, null); + + this.m_a = a; + this.m_b = b; + this.m_order = order; + this.m_cofactor = cofactor; + this.m_coord = FP_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new FpCurve(m_q, m_r, m_a, m_b, m_order, m_cofactor); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_AFFINE: + case COORD_HOMOGENEOUS: + case COORD_JACOBIAN: + case COORD_JACOBIAN_MODIFIED: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return m_q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return m_q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(m_q) >= 0) + throw new ArgumentException("value invalid for Fp field element", "x"); + + return new FpFieldElement(this.m_q, this.m_r, x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new FpPoint(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new FpPoint(this, x, y, zs); + } + + public override ECPoint ImportPoint(ECPoint p) + { + if (this != p.Curve && this.CoordinateSystem == COORD_JACOBIAN && !p.IsInfinity) + { + switch (p.Curve.CoordinateSystem) + { + case COORD_JACOBIAN: + case COORD_JACOBIAN_CHUDNOVSKY: + case COORD_JACOBIAN_MODIFIED: + return new FpPoint(this, + FromBigInteger(p.RawXCoord.ToBigInteger()), + FromBigInteger(p.RawYCoord.ToBigInteger()), + new ECFieldElement[] { FromBigInteger(p.GetZCoord(0).ToBigInteger()) }); + default: + break; + } + } + + return base.ImportPoint(p); + } + + private int GetNumberOfIterations(int bits, int certainty) + { + /* + * NOTE: We enforce a minimum 'certainty' of 100 for bits >= 1024 (else 80). Where the + * certainty is higher than the FIPS 186-4 tables (C.2/C.3) cater to, extra iterations + * are added at the "worst case rate" for the excess. + */ + if (bits >= 1536) + { + return certainty <= 100 ? 3 + : certainty <= 128 ? 4 + : 4 + (certainty - 128 + 1) / 2; + } + else if (bits >= 1024) + { + return certainty <= 100 ? 4 + : certainty <= 112 ? 5 + : 5 + (certainty - 112 + 1) / 2; + } + else if (bits >= 512) + { + return certainty <= 80 ? 5 + : certainty <= 100 ? 7 + : 7 + (certainty - 100 + 1) / 2; + } + else + { + return certainty <= 80 ? 40 + : 40 + (certainty - 80 + 1) / 2; + } + } + + int AsInteger(string envVariable, int defaultValue) + { + string v = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(envVariable); + + if (v == null) + { + return defaultValue; + } + + return int.Parse(v); + } + } + + public abstract class AbstractF2mCurve + : ECCurve + { + public static BigInteger Inverse(int m, int[] ks, BigInteger x) + { + return new LongArray(x).ModInverse(m, ks).ToBigInteger(); + } + + /** + * The auxiliary values s0 and + * s1 used for partial modular reduction for + * Koblitz curves. + */ + private BigInteger[] si = null; + + private static IFiniteField BuildField(int m, int k1, int k2, int k3) + { + int[] exponents = (k2 | k3) == 0 + ? new int[]{ 0, k1, m } + : new int[]{ 0, k1, k2, k3, m }; + + return FiniteFields.GetBinaryExtensionField(exponents); + } + + protected AbstractF2mCurve(int m, int k1, int k2, int k3) + : base(BuildField(m, k1, k2, k3)) + { + } + + public override ECPoint CreatePoint(BigInteger x, BigInteger y) + { + ECFieldElement X = FromBigInteger(x), Y = FromBigInteger(y); + + switch (this.CoordinateSystem) + { + case COORD_LAMBDA_AFFINE: + case COORD_LAMBDA_PROJECTIVE: + { + if (X.IsZero) + { + if (!Y.Square().Equals(B)) + throw new ArgumentException(); + } + else + { + // Y becomes Lambda (X + Y/X) here + Y = Y.Divide(X).Add(X); + } + break; + } + default: + { + break; + } + } + + return CreateRawPoint(X, Y); + } + + public override bool IsValidFieldElement(BigInteger x) + { + return x != null && x.SignValue >= 0 && x.BitLength <= FieldSize; + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + int m = FieldSize; + return FromBigInteger(BigIntegers.CreateRandomBigInteger(m, r)); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + /* + * NOTE: BigInteger comparisons in the rejection sampling are not constant-time, so we + * use the product of two independent elements to mitigate side-channels. + */ + int m = FieldSize; + ECFieldElement fe1 = FromBigInteger(ImplRandomFieldElementMult(r, m)); + ECFieldElement fe2 = FromBigInteger(ImplRandomFieldElementMult(r, m)); + return fe1.Multiply(fe2); + } + + protected override ECPoint DecompressPoint(int yTilde, BigInteger X1) + { + ECFieldElement xp = FromBigInteger(X1), yp = null; + if (xp.IsZero) + { + yp = B.Sqrt(); + } + else + { + ECFieldElement beta = xp.Square().Invert().Multiply(B).Add(A).Add(xp); + ECFieldElement z = SolveQuadraticEquation(beta); + + if (z != null) + { + if (z.TestBitZero() != (yTilde == 1)) + { + z = z.AddOne(); + } + + switch (this.CoordinateSystem) + { + case COORD_LAMBDA_AFFINE: + case COORD_LAMBDA_PROJECTIVE: + { + yp = z.Add(xp); + break; + } + default: + { + yp = z.Multiply(xp); + break; + } + } + } + } + + if (yp == null) + throw new ArgumentException("Invalid point compression"); + + return CreateRawPoint(xp, yp); + } + + /** + * Solves a quadratic equation z2 + z = beta(X9.62 + * D.1.6) The other solution is z + 1. + * + * @param beta + * The value to solve the quadratic equation for. + * @return the solution for z2 + z = beta or + * null if no solution exists. + */ + internal ECFieldElement SolveQuadraticEquation(ECFieldElement beta) + { + AbstractF2mFieldElement betaF2m = (AbstractF2mFieldElement)beta; + + bool fastTrace = betaF2m.HasFastTrace; + if (fastTrace && 0 != betaF2m.Trace()) + return null; + + int m = FieldSize; + + // For odd m, use the half-trace + if (0 != (m & 1)) + { + ECFieldElement r = betaF2m.HalfTrace(); + if (fastTrace || r.Square().Add(r).Add(beta).IsZero) + return r; + + return null; + } + + if (beta.IsZero) + return beta; + + ECFieldElement gamma, z, zeroElement = FromBigInteger(BigInteger.Zero); + + do + { + ECFieldElement t = FromBigInteger(BigInteger.Arbitrary(m)); + z = zeroElement; + ECFieldElement w = beta; + for (int i = 1; i < m; i++) + { + ECFieldElement w2 = w.Square(); + z = z.Square().Add(w2.Multiply(t)); + w = w2.Add(beta); + } + if (!w.IsZero) + { + return null; + } + gamma = z.Square().Add(z); + } + while (gamma.IsZero); + + return z; + } + + /** + * @return the auxiliary values s0 and + * s1 used for partial modular reduction for + * Koblitz curves. + */ + internal virtual BigInteger[] GetSi() + { + if (si == null) + { + lock (this) + { + if (si == null) + { + si = Tnaf.GetSi(this); + } + } + } + return si; + } + + /** + * Returns true if this is a Koblitz curve (ABC curve). + * @return true if this is a Koblitz curve (ABC curve), false otherwise + */ + public virtual bool IsKoblitz + { + get + { + return m_order != null && m_cofactor != null && m_b.IsOne && (m_a.IsZero || m_a.IsOne); + } + } + + private static BigInteger ImplRandomFieldElementMult(SecureRandom r, int m) + { + BigInteger x; + do + { + x = BigIntegers.CreateRandomBigInteger(m, r); + } + while (x.SignValue <= 0); + return x; + } + } + + /** + * Elliptic curves over F2m. The Weierstrass equation is given by + * y2 + xy = x3 + ax2 + b. + */ + public class F2mCurve + : AbstractF2mCurve + { + private const int F2M_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + + /** + * The exponent m of F2m. + */ + private readonly int m; + + /** + * TPB: The integer k where xm + + * xk + 1 represents the reduction polynomial + * f(z).
    + * PPB: The integer k1 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + private readonly int k1; + + /** + * TPB: Always set to 0
    + * PPB: The integer k2 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + private readonly int k2; + + /** + * TPB: Always set to 0
    + * PPB: The integer k3 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + private readonly int k3; + + /** + * The point at infinity on this curve. + */ + protected readonly F2mPoint m_infinity; + + /** + * Constructor for Trinomial Polynomial Basis (TPB). + * @param m The exponent m of + * F2m. + * @param k The integer k where xm + + * xk + 1 represents the reduction + * polynomial f(z). + * @param a The coefficient a in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param b The coefficient b in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + */ + + public F2mCurve( + int m, + int k, + BigInteger a, + BigInteger b) + : this(m, k, 0, 0, a, b, null, null) + { + } + + /** + * Constructor for Trinomial Polynomial Basis (TPB). + * @param m The exponent m of + * F2m. + * @param k The integer k where xm + + * xk + 1 represents the reduction + * polynomial f(z). + * @param a The coefficient a in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param b The coefficient b in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param order The order of the main subgroup of the elliptic curve. + * @param cofactor The cofactor of the elliptic curve, i.e. + * #Ea(F2m) = h * n. + */ + public F2mCurve( + int m, + int k, + BigInteger a, + BigInteger b, + BigInteger order, + BigInteger cofactor) + : this(m, k, 0, 0, a, b, order, cofactor) + { + } + + /** + * Constructor for Pentanomial Polynomial Basis (PPB). + * @param m The exponent m of + * F2m. + * @param k1 The integer k1 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k2 The integer k2 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k3 The integer k3 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param a The coefficient a in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param b The coefficient b in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + */ + + public F2mCurve( + int m, + int k1, + int k2, + int k3, + BigInteger a, + BigInteger b) + : this(m, k1, k2, k3, a, b, null, null) + { + } + + /** + * Constructor for Pentanomial Polynomial Basis (PPB). + * @param m The exponent m of + * F2m. + * @param k1 The integer k1 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k2 The integer k2 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param k3 The integer k3 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z). + * @param a The coefficient a in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param b The coefficient b in the Weierstrass equation + * for non-supersingular elliptic curves over + * F2m. + * @param order The order of the main subgroup of the elliptic curve. + * @param cofactor The cofactor of the elliptic curve, i.e. + * #Ea(F2m) = h * n. + */ + public F2mCurve(int m, int k1, int k2, int k3, BigInteger a, BigInteger b, BigInteger order, + BigInteger cofactor) + : base(m, k1, k2, k3) + { + this.m = m; + this.k1 = k1; + this.k2 = k2; + this.k3 = k3; + this.m_order = order; + this.m_cofactor = cofactor; + this.m_infinity = new F2mPoint(this, null, null); + + this.m_a = FromBigInteger(a); + this.m_b = FromBigInteger(b); + this.m_coord = F2M_DEFAULT_COORDS; + } + + internal F2mCurve(int m, int k1, int k2, int k3, ECFieldElement a, ECFieldElement b, BigInteger order, + BigInteger cofactor) + : base(m, k1, k2, k3) + { + this.m = m; + this.k1 = k1; + this.k2 = k2; + this.k3 = k3; + this.m_order = order; + this.m_cofactor = cofactor; + this.m_infinity = new F2mPoint(this, null, null); + + this.m_a = a; + this.m_b = b; + this.m_coord = F2M_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new F2mCurve(m, k1, k2, k3, m_a, m_b, m_order, m_cofactor); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_AFFINE: + case COORD_HOMOGENEOUS: + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + if (IsKoblitz) + { + return new WTauNafMultiplier(); + } + + return base.CreateDefaultMultiplier(); + } + + public override int FieldSize + { + get { return m; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > m) + throw new ArgumentException("value invalid for F2m field element", "x"); + + int[] ks = (k2 | k3) == 0 + ? new int[]{ k1 } + : new int[]{ k1, k2, k3 }; + + return new F2mFieldElement(m, ks, new LongArray(x)); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new F2mPoint(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new F2mPoint(this, x, y, zs); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public int M + { + get { return m; } + } + + /** + * Return true if curve uses a Trinomial basis. + * + * @return true if curve Trinomial, false otherwise. + */ + public bool IsTrinomial() + { + return k2 == 0 && k3 == 0; + } + + public int K1 + { + get { return k1; } + } + + public int K2 + { + get { return k2; } + } + + public int K3 + { + get { return k3; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + int FE_LONGS = (m + 63) / 64; + + ulong[] table = new ulong[len * FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + ((F2mFieldElement)p.RawXCoord).x.CopyTo(table, pos); pos += FE_LONGS; + ((F2mFieldElement)p.RawYCoord).x.CopyTo(table, pos); pos += FE_LONGS; + } + } + + return new DefaultF2mLookupTable(this, table, len); + } + + private class DefaultF2mLookupTable + : AbstractECLookupTable + { + private readonly F2mCurve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal DefaultF2mLookupTable(F2mCurve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + int FE_LONGS = (m_outer.m + 63) / 64; + ulong[] x = new ulong[FE_LONGS], y = new ulong[FE_LONGS]; + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + FE_LONGS + j] & MASK; + } + + pos += (FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + int FE_LONGS = (m_outer.m + 63) / 64; + ulong[] x = new ulong[FE_LONGS], y = new ulong[FE_LONGS]; + int pos = index * FE_LONGS * 2; + + for (int j = 0; j < FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + int m = m_outer.m; + int[] ks = m_outer.IsTrinomial() + ? new int[]{ m_outer.k1 } + : new int[]{ m_outer.k1, m_outer.k2, m_outer.k3 }; + + ECFieldElement X = new F2mFieldElement(m, ks, new LongArray(x)); + ECFieldElement Y = new F2mFieldElement(m, ks, new LongArray(y)); + return m_outer.CreateRawPoint(X, Y); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs.meta new file mode 100644 index 00000000..6eb0ea5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a493e93085d6d242bea54d0b19ebab8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECCurve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs new file mode 100644 index 00000000..c66ba46d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs @@ -0,0 +1,945 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public abstract class ECFieldElement + { + public abstract BigInteger ToBigInteger(); + public abstract string FieldName { get; } + public abstract int FieldSize { get; } + public abstract ECFieldElement Add(ECFieldElement b); + public abstract ECFieldElement AddOne(); + public abstract ECFieldElement Subtract(ECFieldElement b); + public abstract ECFieldElement Multiply(ECFieldElement b); + public abstract ECFieldElement Divide(ECFieldElement b); + public abstract ECFieldElement Negate(); + public abstract ECFieldElement Square(); + public abstract ECFieldElement Invert(); + public abstract ECFieldElement Sqrt(); + + public virtual int BitLength + { + get { return ToBigInteger().BitLength; } + } + + public virtual bool IsOne + { + get { return BitLength == 1; } + } + + public virtual bool IsZero + { + get { return 0 == ToBigInteger().SignValue; } + } + + public virtual ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return Multiply(b).Subtract(x.Multiply(y)); + } + + public virtual ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return Multiply(b).Add(x.Multiply(y)); + } + + public virtual ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return Square().Subtract(x.Multiply(y)); + } + + public virtual ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + return Square().Add(x.Multiply(y)); + } + + public virtual ECFieldElement SquarePow(int pow) + { + ECFieldElement r = this; + for (int i = 0; i < pow; ++i) + { + r = r.Square(); + } + return r; + } + + public virtual bool TestBitZero() + { + return ToBigInteger().TestBit(0); + } + + public override bool Equals(object obj) + { + return Equals(obj as ECFieldElement); + } + + public virtual bool Equals(ECFieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return ToBigInteger().Equals(other.ToBigInteger()); + } + + public override int GetHashCode() + { + return ToBigInteger().GetHashCode(); + } + + public override string ToString() + { + return this.ToBigInteger().ToString(16); + } + + public virtual byte[] GetEncoded() + { + return BigIntegers.AsUnsignedByteArray(GetEncodedLength(), ToBigInteger()); + } + + public virtual int GetEncodedLength() + { + return (FieldSize + 7) / 8; + } + + public virtual void EncodeTo(byte[] buf, int off) + { + BigIntegers.AsUnsignedByteArray(ToBigInteger(), buf, off, GetEncodedLength()); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void EncodeTo(Span buf) + { + BigIntegers.AsUnsignedByteArray(ToBigInteger(), buf[..GetEncodedLength()]); + } +#endif + } + + public abstract class AbstractFpFieldElement + : ECFieldElement + { + } + + public class FpFieldElement + : AbstractFpFieldElement + { + private readonly BigInteger q, r, x; + + internal static BigInteger CalculateResidue(BigInteger p) + { + int bitLength = p.BitLength; + if (bitLength >= 96) + { + BigInteger firstWord = p.ShiftRight(bitLength - 64); + if (firstWord.LongValue == -1L) + { + return BigInteger.One.ShiftLeft(bitLength).Subtract(p); + } + if ((bitLength & 7) == 0) + { + return BigInteger.One.ShiftLeft(bitLength << 1).Divide(p).Negate(); + } + } + return null; + } + + internal FpFieldElement(BigInteger q, BigInteger r, BigInteger x) + { + this.q = q; + this.r = r; + this.x = x; + } + + public override BigInteger ToBigInteger() + { + return x; + } + + /** + * return the field name for this field. + * + * @return the string "Fp". + */ + public override string FieldName + { + get { return "Fp"; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public BigInteger Q + { + get { return q; } + } + + public override ECFieldElement Add( + ECFieldElement b) + { + return new FpFieldElement(q, r, ModAdd(x, b.ToBigInteger())); + } + + public override ECFieldElement AddOne() + { + BigInteger x2 = x.Add(BigInteger.One); + if (x2.CompareTo(q) == 0) + { + x2 = BigInteger.Zero; + } + return new FpFieldElement(q, r, x2); + } + + public override ECFieldElement Subtract( + ECFieldElement b) + { + return new FpFieldElement(q, r, ModSubtract(x, b.ToBigInteger())); + } + + public override ECFieldElement Multiply( + ECFieldElement b) + { + return new FpFieldElement(q, r, ModMult(x, b.ToBigInteger())); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + BigInteger ax = this.x, bx = b.ToBigInteger(), xx = x.ToBigInteger(), yx = y.ToBigInteger(); + BigInteger ab = ax.Multiply(bx); + BigInteger xy = xx.Multiply(yx); + return new FpFieldElement(q, r, ModReduce(ab.Subtract(xy))); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + BigInteger ax = this.x, bx = b.ToBigInteger(), xx = x.ToBigInteger(), yx = y.ToBigInteger(); + BigInteger ab = ax.Multiply(bx); + BigInteger xy = xx.Multiply(yx); + BigInteger sum = ab.Add(xy); + if (r != null && r.SignValue < 0 && sum.BitLength > (q.BitLength << 1)) + { + sum = sum.Subtract(q.ShiftLeft(q.BitLength)); + } + return new FpFieldElement(q, r, ModReduce(sum)); + } + + public override ECFieldElement Divide( + ECFieldElement b) + { + return new FpFieldElement(q, r, ModMult(x, ModInverse(b.ToBigInteger()))); + } + + public override ECFieldElement Negate() + { + return x.SignValue == 0 ? this : new FpFieldElement(q, r, q.Subtract(x)); + } + + public override ECFieldElement Square() + { + return new FpFieldElement(q, r, ModMult(x, x)); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + BigInteger ax = this.x, xx = x.ToBigInteger(), yx = y.ToBigInteger(); + BigInteger aa = ax.Multiply(ax); + BigInteger xy = xx.Multiply(yx); + return new FpFieldElement(q, r, ModReduce(aa.Subtract(xy))); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + BigInteger ax = this.x, xx = x.ToBigInteger(), yx = y.ToBigInteger(); + BigInteger aa = ax.Multiply(ax); + BigInteger xy = xx.Multiply(yx); + BigInteger sum = aa.Add(xy); + if (r != null && r.SignValue < 0 && sum.BitLength > (q.BitLength << 1)) + { + sum = sum.Subtract(q.ShiftLeft(q.BitLength)); + } + return new FpFieldElement(q, r, ModReduce(sum)); + } + + public override ECFieldElement Invert() + { + // TODO Modular inversion can be faster for a (Generalized) Mersenne Prime. + return new FpFieldElement(q, r, ModInverse(x)); + } + + /** + * return a sqrt root - the routine verifies that the calculation + * returns the right value - if none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + if (IsZero || IsOne) + return this; + + if (!q.TestBit(0)) + throw new NotImplementedException("even value of q"); + + if (q.TestBit(1)) // q == 4m + 3 + { + BigInteger e = q.ShiftRight(2).Add(BigInteger.One); + return CheckSqrt(new FpFieldElement(q, r, x.ModPow(e, q))); + } + + if (q.TestBit(2)) // q == 8m + 5 + { + BigInteger t1 = x.ModPow(q.ShiftRight(3), q); + BigInteger t2 = ModMult(t1, x); + BigInteger t3 = ModMult(t2, t1); + + if (t3.Equals(BigInteger.One)) + { + return CheckSqrt(new FpFieldElement(q, r, t2)); + } + + // TODO This is constant and could be precomputed + BigInteger t4 = BigInteger.Two.ModPow(q.ShiftRight(2), q); + + BigInteger y = ModMult(t2, t4); + + return CheckSqrt(new FpFieldElement(q, r, y)); + } + + // q == 8m + 1 + + BigInteger legendreExponent = q.ShiftRight(1); + if (!(x.ModPow(legendreExponent, q).Equals(BigInteger.One))) + return null; + + BigInteger X = this.x; + BigInteger fourX = ModDouble(ModDouble(X)); ; + + BigInteger k = legendreExponent.Add(BigInteger.One), qMinusOne = q.Subtract(BigInteger.One); + + BigInteger U, V; + do + { + BigInteger P; + do + { + P = BigInteger.Arbitrary(q.BitLength); + } + while (P.CompareTo(q) >= 0 + || !ModReduce(P.Multiply(P).Subtract(fourX)).ModPow(legendreExponent, q).Equals(qMinusOne)); + + BigInteger[] result = LucasSequence(P, X, k); + U = result[0]; + V = result[1]; + + if (ModMult(V, V).Equals(fourX)) + { + return new FpFieldElement(q, r, ModHalfAbs(V)); + } + } + while (U.Equals(BigInteger.One) || U.Equals(qMinusOne)); + + return null; + } + + private ECFieldElement CheckSqrt(ECFieldElement z) + { + return z.Square().Equals(this) ? z : null; + } + + private BigInteger[] LucasSequence( + BigInteger P, + BigInteger Q, + BigInteger k) + { + // TODO Research and apply "common-multiplicand multiplication here" + + int n = k.BitLength; + int s = k.GetLowestSetBit(); + + Debug.Assert(k.TestBit(s)); + + BigInteger Uh = BigInteger.One; + BigInteger Vl = BigInteger.Two; + BigInteger Vh = P; + BigInteger Ql = BigInteger.One; + BigInteger Qh = BigInteger.One; + + for (int j = n - 1; j >= s + 1; --j) + { + Ql = ModMult(Ql, Qh); + + if (k.TestBit(j)) + { + Qh = ModMult(Ql, Q); + Uh = ModMult(Uh, Vh); + Vl = ModReduce(Vh.Multiply(Vl).Subtract(P.Multiply(Ql))); + Vh = ModReduce(Vh.Multiply(Vh).Subtract(Qh.ShiftLeft(1))); + } + else + { + Qh = Ql; + Uh = ModReduce(Uh.Multiply(Vl).Subtract(Ql)); + Vh = ModReduce(Vh.Multiply(Vl).Subtract(P.Multiply(Ql))); + Vl = ModReduce(Vl.Multiply(Vl).Subtract(Ql.ShiftLeft(1))); + } + } + + Ql = ModMult(Ql, Qh); + Qh = ModMult(Ql, Q); + Uh = ModReduce(Uh.Multiply(Vl).Subtract(Ql)); + Vl = ModReduce(Vh.Multiply(Vl).Subtract(P.Multiply(Ql))); + Ql = ModMult(Ql, Qh); + + for (int j = 1; j <= s; ++j) + { + Uh = ModMult(Uh, Vl); + Vl = ModReduce(Vl.Multiply(Vl).Subtract(Ql.ShiftLeft(1))); + Ql = ModMult(Ql, Ql); + } + + return new BigInteger[] { Uh, Vl }; + } + + protected virtual BigInteger ModAdd(BigInteger x1, BigInteger x2) + { + BigInteger x3 = x1.Add(x2); + if (x3.CompareTo(q) >= 0) + { + x3 = x3.Subtract(q); + } + return x3; + } + + protected virtual BigInteger ModDouble(BigInteger x) + { + BigInteger _2x = x.ShiftLeft(1); + if (_2x.CompareTo(q) >= 0) + { + _2x = _2x.Subtract(q); + } + return _2x; + } + + protected virtual BigInteger ModHalf(BigInteger x) + { + if (x.TestBit(0)) + { + x = q.Add(x); + } + return x.ShiftRight(1); + } + + protected virtual BigInteger ModHalfAbs(BigInteger x) + { + if (x.TestBit(0)) + { + x = q.Subtract(x); + } + return x.ShiftRight(1); + } + + protected virtual BigInteger ModInverse(BigInteger x) + { + return BigIntegers.ModOddInverse(q, x); + } + + protected virtual BigInteger ModMult(BigInteger x1, BigInteger x2) + { + return ModReduce(x1.Multiply(x2)); + } + + protected virtual BigInteger ModReduce(BigInteger x) + { + if (r == null) + { + x = x.Mod(q); + } + else + { + bool negative = x.SignValue < 0; + if (negative) + { + x = x.Abs(); + } + int qLen = q.BitLength; + if (r.SignValue > 0) + { + BigInteger qMod = BigInteger.One.ShiftLeft(qLen); + bool rIsOne = r.Equals(BigInteger.One); + while (x.BitLength > (qLen + 1)) + { + BigInteger u = x.ShiftRight(qLen); + BigInteger v = x.Remainder(qMod); + if (!rIsOne) + { + u = u.Multiply(r); + } + x = u.Add(v); + } + } + else + { + int d = ((qLen - 1) & 31) + 1; + BigInteger mu = r.Negate(); + BigInteger u = mu.Multiply(x.ShiftRight(qLen - d)); + BigInteger quot = u.ShiftRight(qLen + d); + BigInteger v = quot.Multiply(q); + BigInteger bk1 = BigInteger.One.ShiftLeft(qLen + d); + v = v.Remainder(bk1); + x = x.Remainder(bk1); + x = x.Subtract(v); + if (x.SignValue < 0) + { + x = x.Add(bk1); + } + } + while (x.CompareTo(q) >= 0) + { + x = x.Subtract(q); + } + if (negative && x.SignValue != 0) + { + x = q.Subtract(x); + } + } + return x; + } + + protected virtual BigInteger ModSubtract(BigInteger x1, BigInteger x2) + { + BigInteger x3 = x1.Subtract(x2); + if (x3.SignValue < 0) + { + x3 = x3.Add(q); + } + return x3; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + FpFieldElement other = obj as FpFieldElement; + + if (other == null) + return false; + + return Equals(other); + } + + public virtual bool Equals( + FpFieldElement other) + { + return q.Equals(other.q) && base.Equals(other); + } + + public override int GetHashCode() + { + return q.GetHashCode() ^ base.GetHashCode(); + } + } + + public abstract class AbstractF2mFieldElement + : ECFieldElement + { + public virtual ECFieldElement HalfTrace() + { + int m = FieldSize; + if ((m & 1) == 0) + throw new InvalidOperationException("Half-trace only defined for odd m"); + + //ECFieldElement ht = this; + //for (int i = 1; i < m; i += 2) + //{ + // ht = ht.SquarePow(2).Add(this); + //} + + int n = (m + 1) >> 1; + int k = 31 - Integers.NumberOfLeadingZeros(n); + int nk = 1; + + ECFieldElement ht = this; + while (k > 0) + { + ht = ht.SquarePow(nk << 1).Add(ht); + nk = n >> --k; + if (0 != (nk & 1)) + { + ht = ht.SquarePow(2).Add(this); + } + } + + return ht; + } + + public virtual bool HasFastTrace + { + get { return false; } + } + + public virtual int Trace() + { + int m = FieldSize; + + //ECFieldElement tr = this; + //for (int i = 1; i < m; ++i) + //{ + // tr = tr.Square().Add(this); + //} + + int k = 31 - Integers.NumberOfLeadingZeros(m); + int mk = 1; + + ECFieldElement tr = this; + while (k > 0) + { + tr = tr.SquarePow(mk).Add(tr); + mk = m >> --k; + if (0 != (mk & 1)) + { + tr = tr.Square().Add(this); + } + } + + if (tr.IsZero) + return 0; + if (tr.IsOne) + return 1; + throw new InvalidOperationException("Internal error in trace calculation"); + } + } + + /** + * Class representing the Elements of the finite field + * F2m in polynomial basis (PB) + * representation. Both trinomial (Tpb) and pentanomial (Ppb) polynomial + * basis representations are supported. Gaussian normal basis (GNB) + * representation is not supported. + */ + public class F2mFieldElement + : AbstractF2mFieldElement + { + /** + * Indicates gaussian normal basis representation (GNB). Number chosen + * according to X9.62. GNB is not implemented at present. + */ + public const int Gnb = 1; + + /** + * Indicates trinomial basis representation (Tpb). Number chosen + * according to X9.62. + */ + public const int Tpb = 2; + + /** + * Indicates pentanomial basis representation (Ppb). Number chosen + * according to X9.62. + */ + public const int Ppb = 3; + + /** + * Tpb or Ppb. + */ + private int representation; + + /** + * The exponent m of F2m. + */ + private int m; + + private int[] ks; + + /** + * The LongArray holding the bits. + */ + internal LongArray x; + + internal F2mFieldElement(int m, int[] ks, LongArray x) + { + this.m = m; + this.representation = (ks.Length == 1) ? Tpb : Ppb; + this.ks = ks; + this.x = x; + } + + public override int BitLength + { + get { return x.Degree(); } + } + + public override bool IsOne + { + get { return x.IsOne(); } + } + + public override bool IsZero + { + get { return x.IsZero(); } + } + + public override bool TestBitZero() + { + return x.TestBitZero(); + } + + public override BigInteger ToBigInteger() + { + return x.ToBigInteger(); + } + + public override string FieldName + { + get { return "F2m"; } + } + + public override int FieldSize + { + get { return m; } + } + + /** + * Checks, if the ECFieldElements a and b + * are elements of the same field F2m + * (having the same representation). + * @param a field element. + * @param b field element to be compared. + * @throws ArgumentException if a and b + * are not elements of the same field + * F2m (having the same + * representation). + */ + public static void CheckFieldElements( + ECFieldElement a, + ECFieldElement b) + { + if (!(a is F2mFieldElement) || !(b is F2mFieldElement)) + { + throw new ArgumentException("Field elements are not " + + "both instances of F2mFieldElement"); + } + + F2mFieldElement aF2m = (F2mFieldElement)a; + F2mFieldElement bF2m = (F2mFieldElement)b; + + if (aF2m.representation != bF2m.representation) + { + // Should never occur + throw new ArgumentException("One of the F2m field elements has incorrect representation"); + } + + if ((aF2m.m != bF2m.m) || !Arrays.AreEqual(aF2m.ks, bF2m.ks)) + { + throw new ArgumentException("Field elements are not elements of the same field F2m"); + } + } + + public override ECFieldElement Add( + ECFieldElement b) + { + // No check performed here for performance reasons. Instead the + // elements involved are checked in ECPoint.F2m + // checkFieldElements(this, b); + LongArray iarrClone = this.x.Copy(); + F2mFieldElement bF2m = (F2mFieldElement)b; + iarrClone.AddShiftedByWords(bF2m.x, 0); + return new F2mFieldElement(m, ks, iarrClone); + } + + public override ECFieldElement AddOne() + { + return new F2mFieldElement(m, ks, x.AddOne()); + } + + public override ECFieldElement Subtract( + ECFieldElement b) + { + // Addition and subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply( + ECFieldElement b) + { + // Right-to-left comb multiplication in the LongArray + // Input: Binary polynomials a(z) and b(z) of degree at most m-1 + // Output: c(z) = a(z) * b(z) mod f(z) + + // No check performed here for performance reasons. Instead the + // elements involved are checked in ECPoint.F2m + // checkFieldElements(this, b); + return new F2mFieldElement(m, ks, x.ModMultiply(((F2mFieldElement)b).x, m, ks)); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + LongArray ax = this.x, bx = ((F2mFieldElement)b).x, xx = ((F2mFieldElement)x).x, yx = ((F2mFieldElement)y).x; + + LongArray ab = ax.Multiply(bx, m, ks); + LongArray xy = xx.Multiply(yx, m, ks); + + if (LongArray.AreAliased(ref ab, ref ax) || LongArray.AreAliased(ref ab, ref bx)) + { + ab = ab.Copy(); + } + + ab.AddShiftedByWords(xy, 0); + ab.Reduce(m, ks); + + return new F2mFieldElement(m, ks, ab); + } + + public override ECFieldElement Divide( + ECFieldElement b) + { + // There may be more efficient implementations + ECFieldElement bInv = b.Invert(); + return Multiply(bInv); + } + + public override ECFieldElement Negate() + { + // -x == x holds for all x in F2m + return this; + } + + public override ECFieldElement Square() + { + return new F2mFieldElement(m, ks, x.ModSquare(m, ks)); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + LongArray ax = this.x, xx = ((F2mFieldElement)x).x, yx = ((F2mFieldElement)y).x; + + LongArray aa = ax.Square(m, ks); + LongArray xy = xx.Multiply(yx, m, ks); + + if (LongArray.AreAliased(ref aa, ref ax)) + { + aa = aa.Copy(); + } + + aa.AddShiftedByWords(xy, 0); + aa.Reduce(m, ks); + + return new F2mFieldElement(m, ks, aa); + } + + public override ECFieldElement SquarePow(int pow) + { + return pow < 1 ? this : new F2mFieldElement(m, ks, x.ModSquareN(pow, m, ks)); + } + + public override ECFieldElement Invert() + { + return new F2mFieldElement(this.m, this.ks, this.x.ModInverse(m, ks)); + } + + public override ECFieldElement Sqrt() + { + return (x.IsZero() || x.IsOne()) ? this : SquarePow(m - 1); + } + + /** + * @return the representation of the field + * F2m, either of + * {@link F2mFieldElement.Tpb} (trinomial + * basis representation) or + * {@link F2mFieldElement.Ppb} (pentanomial + * basis representation). + */ + public int Representation + { + get { return this.representation; } + } + + /** + * @return the degree m of the reduction polynomial + * f(z). + */ + public int M + { + get { return this.m; } + } + + /** + * @return Tpb: The integer k where xm + + * xk + 1 represents the reduction polynomial + * f(z).
    + * Ppb: The integer k1 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + public int K1 + { + get { return this.ks[0]; } + } + + /** + * @return Tpb: Always returns 0
    + * Ppb: The integer k2 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + public int K2 + { + get { return this.ks.Length >= 2 ? this.ks[1] : 0; } + } + + /** + * @return Tpb: Always set to 0
    + * Ppb: The integer k3 where xm + + * xk3 + xk2 + xk1 + 1 + * represents the reduction polynomial f(z).
    + */ + public int K3 + { + get { return this.ks.Length >= 3 ? this.ks[2] : 0; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + F2mFieldElement other = obj as F2mFieldElement; + + if (other == null) + return false; + + return Equals(other); + } + + public virtual bool Equals( + F2mFieldElement other) + { + return ((this.m == other.m) + && (this.representation == other.representation) + && Arrays.AreEqual(this.ks, other.ks) + && (this.x.Equals(other.x))); + } + + public override int GetHashCode() + { + return x.GetHashCode() ^ m ^ Arrays.GetHashCode(ks); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs.meta new file mode 100644 index 00000000..ebf2556a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0e7279ea8f9d35049afd7737e242582f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECFieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs new file mode 100644 index 00000000..405f668e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public interface ECLookupTable + { + int Size { get; } + ECPoint Lookup(int index); + ECPoint LookupVar(int index); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs.meta new file mode 100644 index 00000000..632a4d5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: adf12a317d410364f9a01c72a93312be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECLookupTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs new file mode 100644 index 00000000..a9f4e682 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs @@ -0,0 +1,2187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + /** + * base class for points on elliptic curves. + */ + public abstract class ECPoint + { + protected static ECFieldElement[] EMPTY_ZS = new ECFieldElement[0]; + + protected static ECFieldElement[] GetInitialZCoords(ECCurve curve) + { + // Cope with null curve, most commonly used by implicitlyCa + int coord = null == curve ? ECCurve.COORD_AFFINE : curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + case ECCurve.COORD_LAMBDA_AFFINE: + return EMPTY_ZS; + default: + break; + } + + ECFieldElement one = curve.FromBigInteger(BigInteger.One); + + switch (coord) + { + case ECCurve.COORD_HOMOGENEOUS: + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + return new ECFieldElement[] { one }; + case ECCurve.COORD_JACOBIAN_CHUDNOVSKY: + return new ECFieldElement[] { one, one, one }; + case ECCurve.COORD_JACOBIAN_MODIFIED: + return new ECFieldElement[] { one, curve.A }; + default: + throw new ArgumentException("unknown coordinate system"); + } + } + + protected internal readonly ECCurve m_curve; + protected internal readonly ECFieldElement m_x, m_y; + protected internal readonly ECFieldElement[] m_zs; + + protected internal IDictionary m_preCompTable = null; + + protected ECPoint(ECCurve curve, ECFieldElement x, ECFieldElement y) + : this(curve, x, y, GetInitialZCoords(curve)) + { + } + + internal ECPoint(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + this.m_curve = curve; + this.m_x = x; + this.m_y = y; + this.m_zs = zs; + } + + protected abstract bool SatisfiesCurveEquation(); + + protected virtual bool SatisfiesOrder() + { + if (BigInteger.One.Equals(Curve.Cofactor)) + return true; + + BigInteger n = Curve.Order; + + // TODO Require order to be available for all curves + + return n == null || ECAlgorithms.ReferenceMultiply(this, n).IsInfinity; + } + + public ECPoint GetDetachedPoint() + { + return Normalize().Detach(); + } + + public virtual ECCurve Curve + { + get { return m_curve; } + } + + protected abstract ECPoint Detach(); + + protected virtual int CurveCoordinateSystem + { + get + { + // Cope with null curve, most commonly used by implicitlyCa + return null == m_curve ? ECCurve.COORD_AFFINE : m_curve.CoordinateSystem; + } + } + + /** + * Returns the affine x-coordinate after checking that this point is normalized. + * + * @return The affine x-coordinate of this point + * @throws IllegalStateException if the point is not normalized + */ + public virtual ECFieldElement AffineXCoord + { + get + { + CheckNormalized(); + return XCoord; + } + } + + /** + * Returns the affine y-coordinate after checking that this point is normalized + * + * @return The affine y-coordinate of this point + * @throws IllegalStateException if the point is not normalized + */ + public virtual ECFieldElement AffineYCoord + { + get + { + CheckNormalized(); + return YCoord; + } + } + + /** + * Returns the x-coordinate. + * + * Caution: depending on the curve's coordinate system, this may not be the same value as in an + * affine coordinate system; use Normalize() to get a point where the coordinates have their + * affine values, or use AffineXCoord if you expect the point to already have been normalized. + * + * @return the x-coordinate of this point + */ + public virtual ECFieldElement XCoord + { + get { return m_x; } + } + + /** + * Returns the y-coordinate. + * + * Caution: depending on the curve's coordinate system, this may not be the same value as in an + * affine coordinate system; use Normalize() to get a point where the coordinates have their + * affine values, or use AffineYCoord if you expect the point to already have been normalized. + * + * @return the y-coordinate of this point + */ + public virtual ECFieldElement YCoord + { + get { return m_y; } + } + + public virtual ECFieldElement GetZCoord(int index) + { + return (index < 0 || index >= m_zs.Length) ? null : m_zs[index]; + } + + public virtual ECFieldElement[] GetZCoords() + { + int zsLen = m_zs.Length; + if (zsLen == 0) + { + return m_zs; + } + ECFieldElement[] copy = new ECFieldElement[zsLen]; + Array.Copy(m_zs, 0, copy, 0, zsLen); + return copy; + } + + protected internal ECFieldElement RawXCoord + { + get { return m_x; } + } + + protected internal ECFieldElement RawYCoord + { + get { return m_y; } + } + + protected internal ECFieldElement[] RawZCoords + { + get { return m_zs; } + } + + protected virtual void CheckNormalized() + { + if (!IsNormalized()) + throw new InvalidOperationException("point not in normal form"); + } + + public virtual bool IsNormalized() + { + int coord = this.CurveCoordinateSystem; + + return coord == ECCurve.COORD_AFFINE + || coord == ECCurve.COORD_LAMBDA_AFFINE + || IsInfinity + || RawZCoords[0].IsOne; + } + + /** + * Normalization ensures that any projective coordinate is 1, and therefore that the x, y + * coordinates reflect those of the equivalent point in an affine coordinate system. + * + * @return a new ECPoint instance representing the same point, but with normalized coordinates + */ + public virtual ECPoint Normalize() + { + if (this.IsInfinity) + { + return this; + } + + switch (this.CurveCoordinateSystem) + { + case ECCurve.COORD_AFFINE: + case ECCurve.COORD_LAMBDA_AFFINE: + { + return this; + } + default: + { + ECFieldElement z = RawZCoords[0]; + if (z.IsOne) + return this; + + if (null == m_curve) + throw new InvalidOperationException("Detached points must be in affine coordinates"); + + /* + * Use blinding to avoid the side-channel leak identified and analyzed in the paper + * "Yet another GCD based inversion side-channel affecting ECC implementations" by Nir + * Drucker and Shay Gueron. + * + * To blind the calculation of z^-1, choose a multiplicative (i.e. non-zero) field + * element 'b' uniformly at random, then calculate the result instead as (z * b)^-1 * b. + * Any side-channel in the implementation of 'inverse' now only leaks information about + * the value (z * b), and no longer reveals information about 'z' itself. + */ + ECFieldElement b = m_curve.RandomFieldElementMult(SecureRandom.ArbitraryRandom); + ECFieldElement zInv = z.Multiply(b).Invert().Multiply(b); + return Normalize(zInv); + } + } + } + + internal virtual ECPoint Normalize(ECFieldElement zInv) + { + switch (this.CurveCoordinateSystem) + { + case ECCurve.COORD_HOMOGENEOUS: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + return CreateScaledPoint(zInv, zInv); + } + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_JACOBIAN_CHUDNOVSKY: + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + ECFieldElement zInv2 = zInv.Square(), zInv3 = zInv2.Multiply(zInv); + return CreateScaledPoint(zInv2, zInv3); + } + default: + { + throw new InvalidOperationException("not a projective coordinate system"); + } + } + } + + protected virtual ECPoint CreateScaledPoint(ECFieldElement sx, ECFieldElement sy) + { + return Curve.CreateRawPoint(RawXCoord.Multiply(sx), RawYCoord.Multiply(sy)); + } + + public bool IsInfinity + { + get { return m_x == null && m_y == null; } + } + + public bool IsValid() + { + return ImplIsValid(false, true); + } + + internal bool IsValidPartial() + { + return ImplIsValid(false, false); + } + + internal bool ImplIsValid(bool decompressed, bool checkOrder) + { + if (IsInfinity) + return true; + + ValidityCallback callback = new ValidityCallback(this, decompressed, checkOrder); + ValidityPreCompInfo validity = (ValidityPreCompInfo)Curve.Precompute(this, ValidityPreCompInfo.PRECOMP_NAME, callback); + return !validity.HasFailed(); + } + + public virtual ECPoint ScaleX(ECFieldElement scale) + { + return IsInfinity + ? this + : Curve.CreateRawPoint(RawXCoord.Multiply(scale), RawYCoord, RawZCoords); + } + + public virtual ECPoint ScaleXNegateY(ECFieldElement scale) + { + return IsInfinity + ? this + : Curve.CreateRawPoint(RawXCoord.Multiply(scale), RawYCoord.Negate(), RawZCoords); + } + + public virtual ECPoint ScaleY(ECFieldElement scale) + { + return IsInfinity + ? this + : Curve.CreateRawPoint(RawXCoord, RawYCoord.Multiply(scale), RawZCoords); + } + + public virtual ECPoint ScaleYNegateX(ECFieldElement scale) + { + return IsInfinity + ? this + : Curve.CreateRawPoint(RawXCoord.Negate(), RawYCoord.Multiply(scale), RawZCoords); + } + + public override bool Equals(object obj) + { + return Equals(obj as ECPoint); + } + + public virtual bool Equals(ECPoint other) + { + if (this == other) + return true; + if (null == other) + return false; + + ECCurve c1 = this.Curve, c2 = other.Curve; + bool n1 = (null == c1), n2 = (null == c2); + bool i1 = IsInfinity, i2 = other.IsInfinity; + + if (i1 || i2) + { + return (i1 && i2) && (n1 || n2 || c1.Equals(c2)); + } + + ECPoint p1 = this, p2 = other; + if (n1 && n2) + { + // Points with null curve are in affine form, so already normalized + } + else if (n1) + { + p2 = p2.Normalize(); + } + else if (n2) + { + p1 = p1.Normalize(); + } + else if (!c1.Equals(c2)) + { + return false; + } + else + { + // TODO Consider just requiring already normalized, to avoid silent performance degradation + + ECPoint[] points = new ECPoint[] { this, c1.ImportPoint(p2) }; + + // TODO This is a little strong, really only requires coZNormalizeAll to get Zs equal + c1.NormalizeAll(points); + + p1 = points[0]; + p2 = points[1]; + } + + return p1.XCoord.Equals(p2.XCoord) && p1.YCoord.Equals(p2.YCoord); + } + + public override int GetHashCode() + { + ECCurve c = this.Curve; + int hc = (null == c) ? 0 : ~c.GetHashCode(); + + if (!this.IsInfinity) + { + // TODO Consider just requiring already normalized, to avoid silent performance degradation + + ECPoint p = Normalize(); + + hc ^= p.XCoord.GetHashCode() * 17; + hc ^= p.YCoord.GetHashCode() * 257; + } + + return hc; + } + + public override string ToString() + { + if (this.IsInfinity) + { + return "INF"; + } + + StringBuilder sb = new StringBuilder(); + sb.Append('('); + sb.Append(RawXCoord); + sb.Append(','); + sb.Append(RawYCoord); + for (int i = 0; i < m_zs.Length; ++i) + { + sb.Append(','); + sb.Append(m_zs[i]); + } + sb.Append(')'); + return sb.ToString(); + } + + public virtual byte[] GetEncoded() + { + return GetEncoded(false); + } + + public abstract byte[] GetEncoded(bool compressed); + + public abstract int GetEncodedLength(bool compressed); + + public abstract void EncodeTo(bool compressed, byte[] buf, int off); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract void EncodeTo(bool compressed, Span buf); +#endif + + protected internal abstract bool CompressionYTilde { get; } + + public abstract ECPoint Add(ECPoint b); + public abstract ECPoint Subtract(ECPoint b); + public abstract ECPoint Negate(); + + public virtual ECPoint TimesPow2(int e) + { + if (e < 0) + throw new ArgumentException("cannot be negative", "e"); + + ECPoint p = this; + while (--e >= 0) + { + p = p.Twice(); + } + return p; + } + + public abstract ECPoint Twice(); + public abstract ECPoint Multiply(BigInteger b); + + public virtual ECPoint TwicePlus(ECPoint b) + { + return Twice().Add(b); + } + + public virtual ECPoint ThreeTimes() + { + return TwicePlus(this); + } + + private class ValidityCallback + : IPreCompCallback + { + private readonly ECPoint m_outer; + private readonly bool m_decompressed, m_checkOrder; + + internal ValidityCallback(ECPoint outer, bool decompressed, bool checkOrder) + { + this.m_outer = outer; + this.m_decompressed = decompressed; + this.m_checkOrder = checkOrder; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + ValidityPreCompInfo info = existing as ValidityPreCompInfo; + if (info == null) + { + info = new ValidityPreCompInfo(); + } + + if (info.HasFailed()) + return info; + + if (!info.HasCurveEquationPassed()) + { + if (!m_decompressed && !m_outer.SatisfiesCurveEquation()) + { + info.ReportFailed(); + return info; + } + info.ReportCurveEquationPassed(); + } + if (m_checkOrder && !info.HasOrderPassed()) + { + if (!m_outer.SatisfiesOrder()) + { + info.ReportFailed(); + return info; + } + info.ReportOrderPassed(); + } + return info; + } + } + } + + public abstract class ECPointBase + : ECPoint + { + protected internal ECPointBase(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + protected internal ECPointBase(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + /** + * return the field element encoded with point compression. (S 4.3.6) + */ + public override byte[] GetEncoded(bool compressed) + { + if (this.IsInfinity) + return new byte[1]; + + ECPoint normed = Normalize(); + + byte[] X = normed.XCoord.GetEncoded(); + + if (compressed) + { + byte[] PO = new byte[X.Length + 1]; + PO[0] = (byte)(normed.CompressionYTilde ? 0x03 : 0x02); + Array.Copy(X, 0, PO, 1, X.Length); + return PO; + } + + byte[] Y = normed.YCoord.GetEncoded(); + + { + byte[] PO = new byte[X.Length + Y.Length + 1]; + PO[0] = 0x04; + Array.Copy(X, 0, PO, 1, X.Length); + Array.Copy(Y, 0, PO, X.Length + 1, Y.Length); + return PO; + } + } + + public override int GetEncodedLength(bool compressed) + { + if (IsInfinity) + return 1; + + if (compressed) + return 1 + XCoord.GetEncodedLength(); + + return 1 + XCoord.GetEncodedLength() + YCoord.GetEncodedLength(); + } + + public override void EncodeTo(bool compressed, byte[] buf, int off) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + EncodeTo(compressed, buf.AsSpan(off)); +#else + if (IsInfinity) + { + buf[off] = 0x00; + return; + } + + ECPoint normed = Normalize(); + ECFieldElement X = normed.XCoord, Y = normed.YCoord; + + if (compressed) + { + buf[off] = (byte)(normed.CompressionYTilde ? 0x03 : 0x02); + X.EncodeTo(buf, off + 1); + return; + } + + buf[off] = 0x04; + X.EncodeTo(buf, off + 1); + Y.EncodeTo(buf, off + 1 + X.GetEncodedLength()); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void EncodeTo(bool compressed, Span buf) + { + if (IsInfinity) + { + buf[0] = 0x00; + return; + } + + ECPoint normed = Normalize(); + ECFieldElement X = normed.XCoord, Y = normed.YCoord; + + if (compressed) + { + buf[0] = (byte)(normed.CompressionYTilde ? 0x03 : 0x02); + X.EncodeTo(buf[1..]); + return; + } + + buf[0] = 0x04; + X.EncodeTo(buf[1..]); + Y.EncodeTo(buf[(1 + X.GetEncodedLength())..]); + } +#endif + + /** + * Multiplies this ECPoint by the given number. + * @param k The multiplicator. + * @return k * this. + */ + public override ECPoint Multiply(BigInteger k) + { + return this.Curve.GetMultiplier().Multiply(this, k); + } + } + + public abstract class AbstractFpPoint + : ECPointBase + { + protected AbstractFpPoint(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + protected AbstractFpPoint(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected internal override bool CompressionYTilde + { + get { return this.AffineYCoord.TestBitZero(); } + } + + protected override bool SatisfiesCurveEquation() + { + ECFieldElement X = this.RawXCoord, Y = this.RawYCoord, A = Curve.A, B = Curve.B; + ECFieldElement lhs = Y.Square(); + + switch (CurveCoordinateSystem) + { + case ECCurve.COORD_AFFINE: + break; + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Z = this.RawZCoords[0]; + if (!Z.IsOne) + { + ECFieldElement Z2 = Z.Square(), Z3 = Z.Multiply(Z2); + lhs = lhs.Multiply(Z); + A = A.Multiply(Z2); + B = B.Multiply(Z3); + } + break; + } + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_JACOBIAN_CHUDNOVSKY: + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + ECFieldElement Z = this.RawZCoords[0]; + if (!Z.IsOne) + { + ECFieldElement Z2 = Z.Square(), Z4 = Z2.Square(), Z6 = Z2.Multiply(Z4); + A = A.Multiply(Z4); + B = B.Multiply(Z6); + } + break; + } + default: + throw new InvalidOperationException("unsupported coordinate system"); + } + + ECFieldElement rhs = X.Square().Add(A).Multiply(X).Add(B); + return lhs.Equals(rhs); + } + + public override ECPoint Subtract(ECPoint b) + { + if (b.IsInfinity) + return this; + + // Add -b + return Add(b.Negate()); + } + } + + /** + * Elliptic curve points over Fp + */ + public class FpPoint + : AbstractFpPoint + { + internal FpPoint(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + if ((x == null) != (y == null)) + throw new ArgumentException("Exactly one of the field elements is null"); + } + + internal FpPoint(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new FpPoint(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement GetZCoord(int index) + { + if (index == 1 && ECCurve.COORD_JACOBIAN_MODIFIED == this.CurveCoordinateSystem) + { + return GetJacobianModifiedW(); + } + + return base.GetZCoord(index); + } + + // B.3 pg 62 + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + ECFieldElement X1 = this.RawXCoord, Y1 = this.RawYCoord; + ECFieldElement X2 = b.RawXCoord, Y2 = b.RawYCoord; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement dx = X2.Subtract(X1), dy = Y2.Subtract(Y1); + + if (dx.IsZero) + { + if (dy.IsZero) + { + // this == b, i.e. this must be doubled + return Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return Curve.Infinity; + } + + ECFieldElement gamma = dy.Divide(dx); + ECFieldElement X3 = gamma.Square().Subtract(X1).Subtract(X2); + ECFieldElement Y3 = gamma.Multiply(X1.Subtract(X3)).Subtract(Y1); + + return new FpPoint(Curve, X3, Y3); + } + + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Z1 = this.RawZCoords[0]; + ECFieldElement Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + bool Z2IsOne = Z2.IsOne; + + ECFieldElement u1 = Z1IsOne ? Y2 : Y2.Multiply(Z1); + ECFieldElement u2 = Z2IsOne ? Y1 : Y1.Multiply(Z2); + ECFieldElement u = u1.Subtract(u2); + ECFieldElement v1 = Z1IsOne ? X2 : X2.Multiply(Z1); + ECFieldElement v2 = Z2IsOne ? X1 : X1.Multiply(Z2); + ECFieldElement v = v1.Subtract(v2); + + // Check if b == this or b == -this + if (v.IsZero) + { + if (u.IsZero) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + // TODO Optimize for when w == 1 + ECFieldElement w = Z1IsOne ? Z2 : Z2IsOne ? Z1 : Z1.Multiply(Z2); + ECFieldElement vSquared = v.Square(); + ECFieldElement vCubed = vSquared.Multiply(v); + ECFieldElement vSquaredV2 = vSquared.Multiply(v2); + ECFieldElement A = u.Square().Multiply(w).Subtract(vCubed).Subtract(Two(vSquaredV2)); + + ECFieldElement X3 = v.Multiply(A); + ECFieldElement Y3 = vSquaredV2.Subtract(A).MultiplyMinusProduct(u, u2, vCubed); + ECFieldElement Z3 = vCubed.Multiply(w); + + return new FpPoint(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + ECFieldElement Z1 = this.RawZCoords[0]; + ECFieldElement Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + + ECFieldElement X3, Y3, Z3, Z3Squared = null; + + if (!Z1IsOne && Z1.Equals(Z2)) + { + // TODO Make this available as public method coZAdd? + + ECFieldElement dx = X1.Subtract(X2), dy = Y1.Subtract(Y2); + if (dx.IsZero) + { + if (dy.IsZero) + { + return Twice(); + } + return curve.Infinity; + } + + ECFieldElement C = dx.Square(); + ECFieldElement W1 = X1.Multiply(C), W2 = X2.Multiply(C); + ECFieldElement A1 = W1.Subtract(W2).Multiply(Y1); + + X3 = dy.Square().Subtract(W1).Subtract(W2); + Y3 = W1.Subtract(X3).Multiply(dy).Subtract(A1); + Z3 = dx; + + if (Z1IsOne) + { + Z3Squared = C; + } + else + { + Z3 = Z3.Multiply(Z1); + } + } + else + { + ECFieldElement Z1Squared, U2, S2; + if (Z1IsOne) + { + Z1Squared = Z1; U2 = X2; S2 = Y2; + } + else + { + Z1Squared = Z1.Square(); + U2 = Z1Squared.Multiply(X2); + ECFieldElement Z1Cubed = Z1Squared.Multiply(Z1); + S2 = Z1Cubed.Multiply(Y2); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement Z2Squared, U1, S1; + if (Z2IsOne) + { + Z2Squared = Z2; U1 = X1; S1 = Y1; + } + else + { + Z2Squared = Z2.Square(); + U1 = Z2Squared.Multiply(X1); + ECFieldElement Z2Cubed = Z2Squared.Multiply(Z2); + S1 = Z2Cubed.Multiply(Y1); + } + + ECFieldElement H = U1.Subtract(U2); + ECFieldElement R = S1.Subtract(S2); + + // Check if b == this or b == -this + if (H.IsZero) + { + if (R.IsZero) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + ECFieldElement HSquared = H.Square(); + ECFieldElement G = HSquared.Multiply(H); + ECFieldElement V = HSquared.Multiply(U1); + + X3 = R.Square().Add(G).Subtract(Two(V)); + Y3 = V.Subtract(X3).MultiplyMinusProduct(R, G, S1); + + Z3 = H; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + if (!Z2IsOne) + { + Z3 = Z3.Multiply(Z2); + } + + // Alternative calculation of Z3 using fast square + //X3 = four(X3); + //Y3 = eight(Y3); + //Z3 = doubleProductFromSquares(Z1, Z2, Z1Squared, Z2Squared).Multiply(H); + + if (Z3 == H) + { + Z3Squared = HSquared; + } + } + + ECFieldElement[] zs; + if (coord == ECCurve.COORD_JACOBIAN_MODIFIED) + { + // TODO If the result will only be used in a subsequent addition, we don't need W3 + ECFieldElement W3 = CalculateJacobianModifiedW(Z3, Z3Squared); + + zs = new ECFieldElement[] { Z3, W3 }; + } + else + { + zs = new ECFieldElement[] { Z3 }; + } + + return new FpPoint(curve, X3, Y3, zs); + } + + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + + // B.3 pg 62 + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + int coord = curve.CoordinateSystem; + + ECFieldElement X1 = this.RawXCoord; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement X1Squared = X1.Square(); + ECFieldElement gamma = Three(X1Squared).Add(this.Curve.A).Divide(Two(Y1)); + ECFieldElement X3 = gamma.Square().Subtract(Two(X1)); + ECFieldElement Y3 = gamma.Multiply(X1.Subtract(X3)).Subtract(Y1); + + return new FpPoint(Curve, X3, Y3); + } + + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + + // TODO Optimize for small negative a4 and -3 + ECFieldElement w = curve.A; + if (!w.IsZero && !Z1IsOne) + { + w = w.Multiply(Z1.Square()); + } + w = w.Add(Three(X1.Square())); + + ECFieldElement s = Z1IsOne ? Y1 : Y1.Multiply(Z1); + ECFieldElement t = Z1IsOne ? Y1.Square() : s.Multiply(Y1); + ECFieldElement B = X1.Multiply(t); + ECFieldElement _4B = Four(B); + ECFieldElement h = w.Square().Subtract(Two(_4B)); + + ECFieldElement _2s = Two(s); + ECFieldElement X3 = h.Multiply(_2s); + ECFieldElement _2t = Two(t); + ECFieldElement Y3 = _4B.Subtract(h).Multiply(w).Subtract(Two(_2t.Square())); + ECFieldElement _4sSquared = Z1IsOne ? Two(_2t) : _2s.Square(); + ECFieldElement Z3 = Two(_4sSquared).Multiply(s); + + return new FpPoint(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + case ECCurve.COORD_JACOBIAN: + { + ECFieldElement Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + + ECFieldElement Y1Squared = Y1.Square(); + ECFieldElement T = Y1Squared.Square(); + + ECFieldElement a4 = curve.A; + ECFieldElement a4Neg = a4.Negate(); + + ECFieldElement M, S; + if (a4Neg.ToBigInteger().Equals(BigInteger.ValueOf(3))) + { + ECFieldElement Z1Squared = Z1IsOne ? Z1 : Z1.Square(); + M = Three(X1.Add(Z1Squared).Multiply(X1.Subtract(Z1Squared))); + S = Four(Y1Squared.Multiply(X1)); + } + else + { + ECFieldElement X1Squared = X1.Square(); + M = Three(X1Squared); + if (Z1IsOne) + { + M = M.Add(a4); + } + else if (!a4.IsZero) + { + ECFieldElement Z1Squared = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement Z1Pow4 = Z1Squared.Square(); + if (a4Neg.BitLength < a4.BitLength) + { + M = M.Subtract(Z1Pow4.Multiply(a4Neg)); + } + else + { + M = M.Add(Z1Pow4.Multiply(a4)); + } + } + //S = two(doubleProductFromSquares(X1, Y1Squared, X1Squared, T)); + S = Four(X1.Multiply(Y1Squared)); + } + + ECFieldElement X3 = M.Square().Subtract(Two(S)); + ECFieldElement Y3 = S.Subtract(X3).Multiply(M).Subtract(Eight(T)); + + ECFieldElement Z3 = Two(Y1); + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + + // Alternative calculation of Z3 using fast square + //ECFieldElement Z3 = doubleProductFromSquares(Y1, Z1, Y1Squared, Z1Squared); + + return new FpPoint(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + return TwiceJacobianModified(true); + } + + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord, Y2 = b.RawYCoord; + + ECFieldElement dx = X2.Subtract(X1), dy = Y2.Subtract(Y1); + + if (dx.IsZero) + { + if (dy.IsZero) + { + // this == b i.e. the result is 3P + return ThreeTimes(); + } + + // this == -b, i.e. the result is P + return this; + } + + /* + * Optimized calculation of 2P + Q, as described in "Trading Inversions for + * Multiplications in Elliptic Curve Cryptography", by Ciet, Joye, Lauter, Montgomery. + */ + + ECFieldElement X = dx.Square(), Y = dy.Square(); + ECFieldElement d = X.Multiply(Two(X1).Add(X2)).Subtract(Y); + if (d.IsZero) + { + return Curve.Infinity; + } + + ECFieldElement D = d.Multiply(dx); + ECFieldElement I = D.Invert(); + ECFieldElement L1 = d.Multiply(I).Multiply(dy); + ECFieldElement L2 = Two(Y1).Multiply(X).Multiply(dx).Multiply(I).Subtract(L1); + ECFieldElement X4 = (L2.Subtract(L1)).Multiply(L1.Add(L2)).Add(X2); + ECFieldElement Y4 = (X1.Subtract(X4)).Multiply(L2).Subtract(Y1); + + return new FpPoint(Curve, X4, Y4); + } + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + return TwiceJacobianModified(false).Add(b); + } + default: + { + return Twice().Add(b); + } + } + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity) + return this; + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return this; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement X1 = this.RawXCoord; + + ECFieldElement _2Y1 = Two(Y1); + ECFieldElement X = _2Y1.Square(); + ECFieldElement Z = Three(X1.Square()).Add(Curve.A); + ECFieldElement Y = Z.Square(); + + ECFieldElement d = Three(X1).Multiply(X).Subtract(Y); + if (d.IsZero) + { + return Curve.Infinity; + } + + ECFieldElement D = d.Multiply(_2Y1); + ECFieldElement I = D.Invert(); + ECFieldElement L1 = d.Multiply(I).Multiply(Z); + ECFieldElement L2 = X.Square().Multiply(I).Subtract(L1); + + ECFieldElement X4 = (L2.Subtract(L1)).Multiply(L1.Add(L2)).Add(X1); + ECFieldElement Y4 = (X1.Subtract(X4)).Multiply(L2).Subtract(Y1); + return new FpPoint(Curve, X4, Y4); + } + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + return TwiceJacobianModified(false).Add(this); + } + default: + { + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + } + } + + public override ECPoint TimesPow2(int e) + { + if (e < 0) + throw new ArgumentException("cannot be negative", "e"); + if (e == 0 || this.IsInfinity) + return this; + if (e == 1) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + int coord = curve.CoordinateSystem; + + ECFieldElement W1 = curve.A; + ECFieldElement X1 = this.RawXCoord; + ECFieldElement Z1 = this.RawZCoords.Length < 1 ? curve.FromBigInteger(BigInteger.One) : this.RawZCoords[0]; + + if (!Z1.IsOne) + { + switch (coord) + { + case ECCurve.COORD_HOMOGENEOUS: + ECFieldElement Z1Sq = Z1.Square(); + X1 = X1.Multiply(Z1); + Y1 = Y1.Multiply(Z1Sq); + W1 = CalculateJacobianModifiedW(Z1, Z1Sq); + break; + case ECCurve.COORD_JACOBIAN: + W1 = CalculateJacobianModifiedW(Z1, null); + break; + case ECCurve.COORD_JACOBIAN_MODIFIED: + W1 = GetJacobianModifiedW(); + break; + } + } + + for (int i = 0; i < e; ++i) + { + if (Y1.IsZero) + return curve.Infinity; + + ECFieldElement X1Squared = X1.Square(); + ECFieldElement M = Three(X1Squared); + ECFieldElement _2Y1 = Two(Y1); + ECFieldElement _2Y1Squared = _2Y1.Multiply(Y1); + ECFieldElement S = Two(X1.Multiply(_2Y1Squared)); + ECFieldElement _4T = _2Y1Squared.Square(); + ECFieldElement _8T = Two(_4T); + + if (!W1.IsZero) + { + M = M.Add(W1); + W1 = Two(_8T.Multiply(W1)); + } + + X1 = M.Square().Subtract(Two(S)); + Y1 = M.Multiply(S.Subtract(X1)).Subtract(_8T); + Z1 = Z1.IsOne ? _2Y1 : _2Y1.Multiply(Z1); + } + + switch (coord) + { + case ECCurve.COORD_AFFINE: + ECFieldElement zInv = Z1.Invert(), zInv2 = zInv.Square(), zInv3 = zInv2.Multiply(zInv); + return new FpPoint(curve, X1.Multiply(zInv2), Y1.Multiply(zInv3)); + case ECCurve.COORD_HOMOGENEOUS: + X1 = X1.Multiply(Z1); + Z1 = Z1.Multiply(Z1.Square()); + return new FpPoint(curve, X1, Y1, new ECFieldElement[] { Z1 }); + case ECCurve.COORD_JACOBIAN: + return new FpPoint(curve, X1, Y1, new ECFieldElement[] { Z1 }); + case ECCurve.COORD_JACOBIAN_MODIFIED: + return new FpPoint(curve, X1, Y1, new ECFieldElement[] { Z1, W1 }); + default: + throw new InvalidOperationException("unsupported coordinate system"); + } + } + + protected virtual ECFieldElement Two(ECFieldElement x) + { + return x.Add(x); + } + + protected virtual ECFieldElement Three(ECFieldElement x) + { + return Two(x).Add(x); + } + + protected virtual ECFieldElement Four(ECFieldElement x) + { + return Two(Two(x)); + } + + protected virtual ECFieldElement Eight(ECFieldElement x) + { + return Four(Two(x)); + } + + protected virtual ECFieldElement DoubleProductFromSquares(ECFieldElement a, ECFieldElement b, + ECFieldElement aSquared, ECFieldElement bSquared) + { + /* + * NOTE: If squaring in the field is faster than multiplication, then this is a quicker + * way to calculate 2.A.B, if A^2 and B^2 are already known. + */ + return a.Add(b).Square().Subtract(aSquared).Subtract(bSquared); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + ECCurve curve = Curve; + int coord = curve.CoordinateSystem; + + if (ECCurve.COORD_AFFINE != coord) + { + return new FpPoint(curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + + return new FpPoint(curve, RawXCoord, RawYCoord.Negate()); + } + + protected virtual ECFieldElement CalculateJacobianModifiedW(ECFieldElement Z, ECFieldElement ZSquared) + { + ECFieldElement a4 = this.Curve.A; + if (a4.IsZero || Z.IsOne) + return a4; + + if (ZSquared == null) + { + ZSquared = Z.Square(); + } + + ECFieldElement W = ZSquared.Square(); + ECFieldElement a4Neg = a4.Negate(); + if (a4Neg.BitLength < a4.BitLength) + { + W = W.Multiply(a4Neg).Negate(); + } + else + { + W = W.Multiply(a4); + } + return W; + } + + protected virtual ECFieldElement GetJacobianModifiedW() + { + ECFieldElement[] ZZ = this.RawZCoords; + ECFieldElement W = ZZ[1]; + if (W == null) + { + // NOTE: Rarely, TwicePlus will result in the need for a lazy W1 calculation here + ZZ[1] = W = CalculateJacobianModifiedW(ZZ[0], null); + } + return W; + } + + protected virtual FpPoint TwiceJacobianModified(bool calculateW) + { + ECFieldElement X1 = this.RawXCoord, Y1 = this.RawYCoord, Z1 = this.RawZCoords[0], W1 = GetJacobianModifiedW(); + + ECFieldElement X1Squared = X1.Square(); + ECFieldElement M = Three(X1Squared).Add(W1); + ECFieldElement _2Y1 = Two(Y1); + ECFieldElement _2Y1Squared = _2Y1.Multiply(Y1); + ECFieldElement S = Two(X1.Multiply(_2Y1Squared)); + ECFieldElement X3 = M.Square().Subtract(Two(S)); + ECFieldElement _4T = _2Y1Squared.Square(); + ECFieldElement _8T = Two(_4T); + ECFieldElement Y3 = M.Multiply(S.Subtract(X3)).Subtract(_8T); + ECFieldElement W3 = calculateW ? Two(_8T.Multiply(W1)) : null; + ECFieldElement Z3 = Z1.IsOne ? _2Y1 : _2Y1.Multiply(Z1); + + return new FpPoint(this.Curve, X3, Y3, new ECFieldElement[] { Z3, W3 }); + } + } + + public abstract class AbstractF2mPoint + : ECPointBase + { + protected AbstractF2mPoint(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + protected AbstractF2mPoint(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override bool SatisfiesCurveEquation() + { + ECCurve curve = Curve; + ECFieldElement X = this.RawXCoord, Y = this.RawYCoord, A = curve.A, B = curve.B; + ECFieldElement lhs, rhs; + + int coord = curve.CoordinateSystem; + if (coord == ECCurve.COORD_LAMBDA_PROJECTIVE) + { + ECFieldElement Z = this.RawZCoords[0]; + bool ZIsOne = Z.IsOne; + + if (X.IsZero) + { + // NOTE: For x == 0, we expect the affine-y instead of the lambda-y + lhs = Y.Square(); + rhs = B; + if (!ZIsOne) + { + ECFieldElement Z2 = Z.Square(); + rhs = rhs.Multiply(Z2); + } + } + else + { + ECFieldElement L = Y, X2 = X.Square(); + if (ZIsOne) + { + lhs = L.Square().Add(L).Add(A); + rhs = X2.Square().Add(B); + } + else + { + ECFieldElement Z2 = Z.Square(), Z4 = Z2.Square(); + lhs = L.Add(Z).MultiplyPlusProduct(L, A, Z2); + // TODO If sqrt(b) is precomputed this can be simplified to a single square + rhs = X2.SquarePlusProduct(B, Z4); + } + lhs = lhs.Multiply(X2); + } + } + else + { + lhs = Y.Add(X).Multiply(Y); + + switch (coord) + { + case ECCurve.COORD_AFFINE: + break; + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Z = this.RawZCoords[0]; + if (!Z.IsOne) + { + ECFieldElement Z2 = Z.Square(), Z3 = Z.Multiply(Z2); + lhs = lhs.Multiply(Z); + A = A.Multiply(Z); + B = B.Multiply(Z3); + } + break; + } + default: + throw new InvalidOperationException("unsupported coordinate system"); + } + + rhs = X.Add(A).Multiply(X.Square()).Add(B); + } + + return lhs.Equals(rhs); + } + + protected override bool SatisfiesOrder() + { + ECCurve curve = Curve; + BigInteger cofactor = curve.Cofactor; + if (BigInteger.Two.Equals(cofactor)) + { + /* + * Check that 0 == Tr(X + A); then there exists a solution to L^2 + L = X + A, and + * so a halving is possible, so this point is the double of another. + * + * Note: Tr(A) == 1 for cofactor 2 curves. + */ + ECPoint N = this.Normalize(); + ECFieldElement X = N.AffineXCoord; + return 0 != ((AbstractF2mFieldElement)X).Trace(); + } + if (BigInteger.ValueOf(4).Equals(cofactor)) + { + /* + * Solve L^2 + L = X + A to find the half of this point, if it exists (fail if not). + * + * Note: Tr(A) == 0 for cofactor 4 curves. + */ + ECPoint N = this.Normalize(); + ECFieldElement X = N.AffineXCoord; + ECFieldElement L = ((AbstractF2mCurve)curve).SolveQuadraticEquation(X.Add(curve.A)); + if (null == L) + return false; + + /* + * A solution exists, therefore 0 == Tr(X + A) == Tr(X). + */ + ECFieldElement Y = N.AffineYCoord; + ECFieldElement T = X.Multiply(L).Add(Y); + + /* + * Either T or (T + X) is the square of a half-point's x coordinate (hx). In either + * case, the half-point can be halved again when 0 == Tr(hx + A). + * + * Note: Tr(hx + A) == Tr(hx) == Tr(hx^2) == Tr(T) == Tr(T + X) + * + * Check that 0 == Tr(T); then there exists a solution to L^2 + L = hx + A, and so a + * second halving is possible and this point is four times some other. + */ + return 0 == ((AbstractF2mFieldElement)T).Trace(); + } + + return base.SatisfiesOrder(); + } + + public override ECPoint ScaleX(ECFieldElement scale) + { + if (this.IsInfinity) + return this; + + switch (CurveCoordinateSystem) + { + case ECCurve.COORD_LAMBDA_AFFINE: + { + // Y is actually Lambda (X + Y/X) here + ECFieldElement X = RawXCoord, L = RawYCoord; + + ECFieldElement X2 = X.Multiply(scale); + ECFieldElement L2 = L.Add(X).Divide(scale).Add(X2); + + return Curve.CreateRawPoint(X, L2, RawZCoords); + } + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + // Y is actually Lambda (X + Y/X) here + ECFieldElement X = RawXCoord, L = RawYCoord, Z = RawZCoords[0]; + + // We scale the Z coordinate also, to avoid an inversion + ECFieldElement X2 = X.Multiply(scale.Square()); + ECFieldElement L2 = L.Add(X).Add(X2); + ECFieldElement Z2 = Z.Multiply(scale); + + return Curve.CreateRawPoint(X, L2, new ECFieldElement[] { Z2 }); + } + default: + { + return base.ScaleX(scale); + } + } + } + + public override ECPoint ScaleXNegateY(ECFieldElement scale) + { + return ScaleX(scale); + } + + public override ECPoint ScaleY(ECFieldElement scale) + { + if (this.IsInfinity) + return this; + + switch (CurveCoordinateSystem) + { + case ECCurve.COORD_LAMBDA_AFFINE: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + // Y is actually Lambda (X + Y/X) here + ECFieldElement L2 = L.Add(X).Multiply(scale).Add(X); + + return Curve.CreateRawPoint(X, L2, RawZCoords); + } + default: + { + return base.ScaleY(scale); + } + } + } + + public override ECPoint ScaleYNegateX(ECFieldElement scale) + { + return ScaleY(scale); + } + + public override ECPoint Subtract(ECPoint b) + { + if (b.IsInfinity) + return this; + + // Add -b + return Add(b.Negate()); + } + + public virtual AbstractF2mPoint Tau() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + ECFieldElement X1 = this.RawXCoord; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + case ECCurve.COORD_LAMBDA_AFFINE: + { + ECFieldElement Y1 = this.RawYCoord; + return (AbstractF2mPoint)curve.CreateRawPoint(X1.Square(), Y1.Square()); + } + case ECCurve.COORD_HOMOGENEOUS: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + ECFieldElement Y1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + return (AbstractF2mPoint)curve.CreateRawPoint(X1.Square(), Y1.Square(), + new ECFieldElement[] { Z1.Square() }); + } + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + + public virtual AbstractF2mPoint TauPow(int pow) + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + ECFieldElement X1 = this.RawXCoord; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + case ECCurve.COORD_LAMBDA_AFFINE: + { + ECFieldElement Y1 = this.RawYCoord; + return (AbstractF2mPoint)curve.CreateRawPoint(X1.SquarePow(pow), Y1.SquarePow(pow)); + } + case ECCurve.COORD_HOMOGENEOUS: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + ECFieldElement Y1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + return (AbstractF2mPoint)curve.CreateRawPoint(X1.SquarePow(pow), Y1.SquarePow(pow), + new ECFieldElement[] { Z1.SquarePow(pow) }); + } + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + } + + /** + * Elliptic curve points over F2m + */ + public class F2mPoint + : AbstractF2mPoint + { + internal F2mPoint(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + if ((x == null) != (y == null)) + { + throw new ArgumentException("Exactly one of the field elements is null"); + } + + if (x != null) + { + // Check if x and y are elements of the same field + F2mFieldElement.CheckFieldElements(x, y); + + // Check if x and a are elements of the same field + if (curve != null) + { + F2mFieldElement.CheckFieldElements(x, curve.A); + } + } + } + + internal F2mPoint(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new F2mPoint(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + int coord = this.CurveCoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_LAMBDA_AFFINE: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + if (ECCurve.COORD_LAMBDA_PROJECTIVE == coord) + { + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + } + return Y; + } + default: + { + return RawYCoord; + } + } + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + { + return false; + } + + ECFieldElement Y = this.RawYCoord; + + switch (this.CurveCoordinateSystem) + { + case ECCurve.COORD_LAMBDA_AFFINE: + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + default: + { + return Y.Divide(X).TestBitZero(); + } + } + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement Y1 = this.RawYCoord; + ECFieldElement Y2 = b.RawYCoord; + + ECFieldElement dx = X1.Add(X2), dy = Y1.Add(Y2); + if (dx.IsZero) + { + if (dy.IsZero) + { + return Twice(); + } + + return curve.Infinity; + } + + ECFieldElement L = dy.Divide(dx); + + ECFieldElement X3 = L.Square().Add(L).Add(dx).Add(curve.A); + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + + return new F2mPoint(curve, X3, Y3); + } + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Y1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement Y2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U1 = Y2, V1 = X2; + if (!Z1IsOne) + { + U1 = U1.Multiply(Z1); + V1 = V1.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U2 = Y1, V2 = X1; + if (!Z2IsOne) + { + U2 = U2.Multiply(Z2); + V2 = V2.Multiply(Z2); + } + + ECFieldElement U = U1.Add(U2); + ECFieldElement V = V1.Add(V2); + + if (V.IsZero) + { + if (U.IsZero) + { + return Twice(); + } + + return curve.Infinity; + } + + ECFieldElement VSq = V.Square(); + ECFieldElement VCu = VSq.Multiply(V); + ECFieldElement W = Z1IsOne ? Z2 : Z2IsOne ? Z1 : Z1.Multiply(Z2); + ECFieldElement uv = U.Add(V); + ECFieldElement A = uv.MultiplyPlusProduct(U, VSq, curve.A).Multiply(W).Add(VCu); + + ECFieldElement X3 = V.Multiply(A); + ECFieldElement VSqZ2 = Z2IsOne ? VSq : VSq.Multiply(Z2); + ECFieldElement Y3 = U.MultiplyPlusProduct(X1, V, Y1).MultiplyPlusProduct(VSqZ2, uv, A); + ECFieldElement Z3 = VCu.Multiply(W); + + return new F2mPoint(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + { + return Twice(); + } + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.RawXCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new F2mPoint(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new F2mPoint(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new F2mPoint(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + + /* (non-Javadoc) + * @see Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.ECPoint#twice() + */ + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + int coord = curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement Y1 = this.RawYCoord; + + ECFieldElement L1 = Y1.Divide(X1).Add(X1); + + ECFieldElement X3 = L1.Square().Add(L1).Add(curve.A); + ECFieldElement Y3 = X1.SquarePlusProduct(X3, L1.AddOne()); + + return new F2mPoint(curve, X3, Y3); + } + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Y1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement Y1Z1 = Z1IsOne ? Y1 : Y1.Multiply(Z1); + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement S = X1Sq.Add(Y1Z1); + ECFieldElement V = X1Z1; + ECFieldElement vSquared = V.Square(); + ECFieldElement sv = S.Add(V); + ECFieldElement h = sv.MultiplyPlusProduct(S, vSquared, curve.A); + + ECFieldElement X3 = V.Multiply(h); + ECFieldElement Y3 = X1Sq.Square().MultiplyPlusProduct(V, h, sv); + ECFieldElement Z3 = V.Multiply(vSquared); + + return new F2mPoint(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new F2mPoint(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement b = curve.B; + ECFieldElement L3; + if (b.BitLength < (curve.FieldSize >> 1)) + { + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2; + if (b.IsOne) + { + t2 = aZ1Sq.Add(Z1Sq).Square(); + } + else + { + // TODO Can be calculated with one square if we pre-compute sqrt(b) + t2 = aZ1Sq.SquarePlusProduct(b, Z1Sq.Square()); + } + L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3); + if (a.IsZero) + { + L3 = L3.Add(Z3); + } + else if (!a.IsOne) + { + L3 = L3.Add(a.AddOne().Multiply(Z3)); + } + } + else + { + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + } + + return new F2mPoint(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + int coord = curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + // NOTE: twicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + { + return b.Twice(); + } + + return curve.Infinity; + } + + if (A.IsZero) + { + return new F2mPoint(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new F2mPoint(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + default: + { + return Twice().Add(b); + } + } + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + ECCurve curve = this.Curve; + int coord = curve.CoordinateSystem; + + switch (coord) + { + case ECCurve.COORD_AFFINE: + { + ECFieldElement Y = this.RawYCoord; + return new F2mPoint(curve, X, Y.Add(X)); + } + case ECCurve.COORD_HOMOGENEOUS: + { + ECFieldElement Y = this.RawYCoord, Z = this.RawZCoords[0]; + return new F2mPoint(curve, X, Y.Add(X), new ECFieldElement[] { Z }); + } + case ECCurve.COORD_LAMBDA_AFFINE: + { + ECFieldElement L = this.RawYCoord; + return new F2mPoint(curve, X, L.AddOne()); + } + case ECCurve.COORD_LAMBDA_PROJECTIVE: + { + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new F2mPoint(curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + default: + { + throw new InvalidOperationException("unsupported coordinate system"); + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs.meta new file mode 100644 index 00000000..e91c998b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 861afbf23d5071646a7a6a84f151cc19 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPoint.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs new file mode 100644 index 00000000..8b726b81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public interface ECPointMap + { + ECPoint Map(ECPoint p); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs.meta new file mode 100644 index 00000000..0b105bd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: be28699904569fc43b4aa583b1101091 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ECPointMap.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs new file mode 100644 index 00000000..e79bb081 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs @@ -0,0 +1,1295 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + internal struct LongArray + { + internal static bool AreAliased(ref LongArray a, ref LongArray b) + { + return a.m_data == b.m_data; + } + + // TODO make m fixed for the LongArray, and hence compute T once and for all + + private ulong[] m_data; + + internal LongArray(int intLen) + { + m_data = new ulong[intLen]; + } + + internal LongArray(ulong[] data) + { + m_data = data; + } + + internal LongArray(ulong[] data, int off, int len) + { + if (off == 0 && len == data.Length) + { + m_data = data; + } + else + { + m_data = new ulong[len]; + Array.Copy(data, off, m_data, 0, len); + } + } + + internal LongArray(BigInteger bigInt) + { + if (bigInt == null || bigInt.SignValue < 0) + throw new ArgumentException("invalid F2m field value", nameof(bigInt)); + + if (bigInt.SignValue == 0) + { + m_data = new ulong[1]{ 0UL }; + return; + } + + byte[] barr = bigInt.ToByteArray(); + int barrLen = barr.Length; + int barrStart = 0; + if (barr[0] == 0) + { + // First byte is 0 to enforce highest (=sign) bit is zero. + // In this case ignore barr[0]. + barrLen--; + barrStart = 1; + } + int intLen = (barrLen + 7) / 8; + m_data = new ulong[intLen]; + + int iarrJ = intLen - 1; + int rem = barrLen % 8 + barrStart; + ulong temp = 0; + int barrI = barrStart; + if (barrStart < rem) + { + for (; barrI < rem; barrI++) + { + temp <<= 8; + uint barrBarrI = barr[barrI]; + temp |= barrBarrI; + } + m_data[iarrJ--] = temp; + } + + for (; iarrJ >= 0; iarrJ--) + { + temp = 0; + for (int i = 0; i < 8; i++) + { + temp <<= 8; + uint barrBarrI = barr[barrI++]; + temp |= barrBarrI; + } + m_data[iarrJ] = temp; + } + } + + internal void CopyTo(ulong[] z, int zOff) + { + Array.Copy(m_data, 0, z, zOff, m_data.Length); + } + + internal bool IsOne() + { + ulong[] a = m_data; + int aLen = a.Length; + if (aLen < 1 || a[0] != 1UL) + return false; + + for (int i = 1; i < aLen; ++i) + { + if (a[i] != 0UL) + return false; + } + return true; + } + + internal bool IsZero() + { + ulong[] a = m_data; + for (int i = 0; i < a.Length; ++i) + { + if (a[i] != 0UL) + return false; + } + return true; + } + + internal int GetUsedLength() + { + return GetUsedLengthFrom(m_data.Length); + } + + internal int GetUsedLengthFrom(int from) + { + ulong[] a = m_data; + from = System.Math.Min(from, a.Length); + + if (from < 1) + return 0; + + // Check if first element will act as sentinel + if (a[0] != 0UL) + { + while (a[--from] == 0UL) + { + } + return from + 1; + } + + do + { + if (a[--from] != 0UL) + { + return from + 1; + } + } + while (from > 0); + + return 0; + } + + internal int Degree() + { + int i = m_data.Length; + ulong w; + do + { + if (i == 0) + return 0; + + w = m_data[--i]; + } + while (w == 0UL); + + return (i << 6) + BitLength(w); + } + + private int DegreeFrom(int limit) + { + int i = (int)(((uint)limit + 62) >> 6); + ulong w; + do + { + if (i == 0) + return 0; + + w = m_data[--i]; + } + while (w == 0); + + return (i << 6) + BitLength(w); + } + + private static int BitLength(ulong w) + { + return 64 - Longs.NumberOfLeadingZeros((long)w); + } + + private ulong[] ResizedData(int newLen) + { + ulong[] newInts = new ulong[newLen]; + Array.Copy(m_data, 0, newInts, 0, System.Math.Min(m_data.Length, newLen)); + return newInts; + } + + internal BigInteger ToBigInteger() + { + int usedLen = GetUsedLength(); + if (usedLen == 0) + return BigInteger.Zero; + + ulong highestInt = m_data[usedLen - 1]; + byte[] temp = new byte[8]; + int barrI = 0; + bool trailingZeroBytesDone = false; + for (int j = 7; j >= 0; j--) + { + byte thisByte = (byte)(highestInt >> (8 * j)); + if (trailingZeroBytesDone || (thisByte != 0)) + { + trailingZeroBytesDone = true; + temp[barrI++] = thisByte; + } + } + + int barrLen = 8 * (usedLen - 1) + barrI; + byte[] barr = new byte[barrLen]; + for (int j = 0; j < barrI; j++) + { + barr[j] = temp[j]; + } + // Highest value int is done now + + for (int iarrJ = usedLen - 2; iarrJ >= 0; iarrJ--) + { + ulong mi = m_data[iarrJ]; + for (int j = 7; j >= 0; j--) + { + barr[barrI++] = (byte)(mi >> (8 * j)); + } + } + return new BigInteger(1, barr); + } + + private static ulong ShiftUp(ulong[] x, int xOff, int count, int shift) + { + int shiftInv = 64 - shift; + ulong prev = 0UL; + for (int i = 0; i < count; ++i) + { + ulong next = x[xOff + i]; + x[xOff + i] = (next << shift) | prev; + prev = next >> shiftInv; + } + return prev; + } + + private static ulong ShiftUp(ulong[] x, int xOff, ulong[] z, int zOff, int count, int shift) + { + int shiftInv = 64 - shift; + ulong prev = 0UL; + for (int i = 0; i < count; ++i) + { + ulong next = x[xOff + i]; + z[zOff + i] = (next << shift) | prev; + prev = next >> shiftInv; + } + return prev; + } + + internal LongArray AddOne() + { + if (m_data.Length == 0) + return new LongArray(new ulong[1]{ 1UL }); + + int resultLen = System.Math.Max(1, GetUsedLength()); + ulong[] data = ResizedData(resultLen); + data[0] ^= 1UL; + return new LongArray(data); + } + + private void AddShiftedByBitsSafe(LongArray other, int otherDegree, int bits) + { + int otherLen = (int)((uint)(otherDegree + 63) >> 6); + + int words = (int)((uint)bits >> 6); + int shift = bits & 0x3F; + + if (shift == 0) + { + Add(m_data, words, other.m_data, 0, otherLen); + return; + } + + ulong carry = AddShiftedUp(m_data, words, other.m_data, 0, otherLen, shift); + if (carry != 0UL) + { + m_data[otherLen + words] ^= carry; + } + } + + private static ulong AddShiftedUp(ulong[] x, int xOff, ulong[] y, int yOff, int count, int shift) + { + int shiftInv = 64 - shift; + ulong prev = 0; + for (int i = 0; i < count; ++i) + { + ulong next = y[yOff + i]; + x[xOff + i] ^= (next << shift) | prev; + prev = next >> shiftInv; + } + return prev; + } + + private static ulong AddShiftedDown(ulong[] x, int xOff, ulong[] y, int yOff, int count, int shift) + { + int shiftInv = 64 - shift; + ulong prev = 0; + int i = count; + while (--i >= 0) + { + ulong next = y[yOff + i]; + x[xOff + i] ^= (next >> shift) | prev; + prev = next << shiftInv; + } + return prev; + } + + internal void AddShiftedByWords(LongArray other, int words) + { + int otherUsedLen = other.GetUsedLength(); + if (otherUsedLen == 0) + return; + + int minLen = otherUsedLen + words; + if (minLen > m_data.Length) + { + m_data = ResizedData(minLen); + } + + Add(m_data, words, other.m_data, 0, otherUsedLen); + } + + private static void Add(ulong[] x, int xOff, ulong[] y, int yOff, int count) + { + Nat.XorTo64(count, y, yOff, x, xOff); + } + + private static void Add(ulong[] x, int xOff, ulong[] y, int yOff, ulong[] z, int zOff, int count) + { + Nat.Xor64(count, x, xOff, y, yOff, z, zOff); + } + + private static void AddBoth(ulong[] x, int xOff, ulong[] y1, int y1Off, ulong[] y2, int y2Off, int count) + { + for (int i = 0; i < count; ++i) + { + x[xOff + i] ^= y1[y1Off + i] ^ y2[y2Off + i]; + } + } + + private static void FlipWord(ulong[] buf, int off, int bit, ulong word) + { + int n = off + (int)((uint)bit >> 6); + int shift = bit & 0x3F; + if (shift == 0) + { + buf[n] ^= word; + } + else + { + buf[n] ^= word << shift; + word = word >> (64 - shift); + if (word != 0) + { + buf[++n] ^= word; + } + } + } + + internal bool TestBitZero() + { + return m_data.Length > 0 && (m_data[0] & 1UL) != 0; + } + + private static bool TestBit(ulong[] buf, int off, int n) + { + // theInt = n / 64 + int theInt = (int)((uint)n >> 6); + // theBit = n % 64 + int theBit = n & 0x3F; + ulong tester = 1UL << theBit; + return (buf[off + theInt] & tester) != 0UL; + } + + private static void FlipBit(ulong[] buf, int off, int n) + { + // theInt = n / 64 + int theInt = (int)((uint)n >> 6); + // theBit = n % 64 + int theBit = n & 0x3F; + ulong flipper = 1UL << theBit; + buf[off + theInt] ^= flipper; + } + + private static void MultiplyWord(ulong a, ulong[] b, int bLen, ulong[] c, int cOff) + { + if ((a & 1UL) != 0UL) + { + Add(c, cOff, b, 0, bLen); + } + int k = 1; + while ((a >>= 1) != 0UL) + { + if ((a & 1UL) != 0UL) + { + ulong carry = AddShiftedUp(c, cOff, b, 0, bLen, k); + if (carry != 0UL) + { + c[cOff + bLen] ^= carry; + } + } + ++k; + } + } + + internal LongArray ModMultiplyLD(LongArray other, int m, int[] ks) + { + /* + * Find out the degree of each argument and handle the zero cases + */ + int aDeg = Degree(); + if (aDeg == 0) + return this; + + int bDeg = other.Degree(); + if (bDeg == 0) + return other; + + /* + * Swap if necessary so that A is the smaller argument + */ + LongArray A = this, B = other; + if (aDeg > bDeg) + { + A = other; B = this; + int tmp = aDeg; aDeg = bDeg; bDeg = tmp; + } + + /* + * Establish the word lengths of the arguments and result + */ + int aLen = (int)((uint)(aDeg + 63) >> 6); + int bLen = (int)((uint)(bDeg + 63) >> 6); + int cLen = (int)((uint)(aDeg + bDeg + 62) >> 6); + + if (aLen == 1) + { + ulong a0 = A.m_data[0]; + if (a0 == 1UL) + return B; + + /* + * Fast path for small A, with performance dependent only on the number of set bits + */ + ulong[] c0 = new ulong[cLen]; + MultiplyWord(a0, B.m_data, bLen, c0, 0); + + /* + * Reduce the raw answer against the reduction coefficients + */ + return ReduceResult(c0, 0, cLen, m, ks); + } + + /* + * Determine if B will get bigger during shifting + */ + int bMax = (int)((uint)(bDeg + 7 + 63) >> 6); + + /* + * Lookup table for the offset of each B in the tables + */ + int[] ti = new int[16]; + + /* + * Precompute table of all 4-bit products of B + */ + ulong[] T0 = new ulong[bMax << 4]; + int tOff = bMax; + ti[1] = tOff; + Array.Copy(B.m_data, 0, T0, tOff, bLen); + for (int i = 2; i < 16; ++i) + { + ti[i] = (tOff += bMax); + if ((i & 1) == 0) + { + ShiftUp(T0, (int)((uint)tOff >> 1), T0, tOff, bMax, 1); + } + else + { + Add(T0, bMax, T0, tOff - bMax, T0, tOff, bMax); + } + } + + /* + * Second table with all 4-bit products of B shifted 4 bits + */ + ulong[] T1 = new ulong[T0.Length]; + ShiftUp(T0, 0, T1, 0, T0.Length, 4); + // shiftUp(T0, bMax, T1, bMax, tOff, 4); + + ulong[] a = A.m_data; + ulong[] c = new ulong[cLen]; + + uint MASK = 0xF; + + /* + * Lopez-Dahab algorithm + */ + + for (int k = 56; k >= 0; k -= 8) + { + for (int j = 1; j < aLen; j += 2) + { + uint aVal = (uint)(a[j] >> k); + uint u = aVal & MASK; + uint v = (aVal >> 4) & MASK; + AddBoth(c, j - 1, T0, ti[u], T1, ti[v], bMax); + } + ShiftUp(c, 0, cLen, 8); + } + + for (int k = 56; k >= 0; k -= 8) + { + for (int j = 0; j < aLen; j += 2) + { + uint aVal = (uint)(a[j] >> k); + uint u = aVal & MASK; + uint v = (aVal >> 4) & MASK; + AddBoth(c, j, T0, ti[u], T1, ti[v], bMax); + } + if (k > 0) + { + ShiftUp(c, 0, cLen, 8); + } + } + + /* + * Finally the raw answer is collected, reduce it against the reduction coefficients + */ + return ReduceResult(c, 0, cLen, m, ks); + } + + internal LongArray ModMultiply(LongArray other, int m, int[] ks) + { + /* + * Find out the degree of each argument and handle the zero cases + */ + int aDeg = Degree(); + if (aDeg == 0) + return this; + + int bDeg = other.Degree(); + if (bDeg == 0) + return other; + + /* + * Swap if necessary so that A is the smaller argument + */ + LongArray A = this, B = other; + if (aDeg > bDeg) + { + A = other; B = this; + int tmp = aDeg; aDeg = bDeg; bDeg = tmp; + } + + /* + * Establish the word lengths of the arguments and result + */ + int aLen = (int)((uint)(aDeg + 63) >> 6); + int bLen = (int)((uint)(bDeg + 63) >> 6); + int cLen = (int)((uint)(aDeg + bDeg + 62) >> 6); + + if (aLen == 1) + { + ulong a0 = A.m_data[0]; + if (a0 == 1UL) + return B; + + /* + * Fast path for small A, with performance dependent only on the number of set bits + */ + ulong[] c0 = new ulong[cLen]; + MultiplyWord(a0, B.m_data, bLen, c0, 0); + + /* + * Reduce the raw answer against the reduction coefficients + */ + return ReduceResult(c0, 0, cLen, m, ks); + } + + /* + * Determine if B will get bigger during shifting + */ + int bMax = (int)((uint)(bDeg + 7 + 63) >> 6); + + /* + * Lookup table for the offset of each B in the tables + */ + int[] ti = new int[16]; + + /* + * Precompute table of all 4-bit products of B + */ + ulong[] T0 = new ulong[bMax << 4]; + int tOff = bMax; + ti[1] = tOff; + Array.Copy(B.m_data, 0, T0, tOff, bLen); + for (int i = 2; i < 16; ++i) + { + tOff += bMax; + ti[i] = tOff; + if ((i & 1) == 0) + { + ShiftUp(T0, (int)((uint)tOff >> 1), T0, tOff, bMax, 1); + } + else + { + Add(T0, bMax, T0, tOff - bMax, T0, tOff, bMax); + } + } + + /* + * Second table with all 4-bit products of B shifted 4 bits + */ + ulong[] T1 = new ulong[T0.Length]; + ShiftUp(T0, 0, T1, 0, T0.Length, 4); + // ShiftUp(T0, bMax, T1, bMax, tOff, 4); + + ulong[] a = A.m_data; + ulong[] c = new ulong[cLen << 3]; + + uint MASK = 0xF; + + /* + * Lopez-Dahab (Modified) algorithm + */ + + for (int aPos = 0; aPos < aLen; ++aPos) + { + ulong aVal = a[aPos]; + int cOff = aPos; + for (;;) + { + uint u = (uint)aVal & MASK; aVal >>= 4; + uint v = (uint)aVal & MASK; aVal >>= 4; + AddBoth(c, cOff, T0, ti[u], T1, ti[v], bMax); + if (aVal == 0UL) + break; + + cOff += cLen; + } + } + + { + int cOff = c.Length; + while ((cOff -= cLen) != 0) + { + AddShiftedUp(c, cOff - cLen, c, cOff, cLen, 8); + } + } + + /* + * Finally the raw answer is collected, reduce it against the reduction coefficients + */ + return ReduceResult(c, 0, cLen, m, ks); + } + + //internal LongArray ModReduce(int m, int[] ks) + //{ + // ulong[] buf = Arrays.Clone(m_data); + // int rLen = ReduceInPlace(buf, 0, buf.Length, m, ks); + // return new LongArray(buf, 0, rLen); + //} + + internal LongArray Multiply(LongArray other, int m, int[] ks) + { + /* + * Find out the degree of each argument and handle the zero cases + */ + int aDeg = Degree(); + if (aDeg == 0) + return this; + + int bDeg = other.Degree(); + if (bDeg == 0) + return other; + + /* + * Swap if necessary so that A is the smaller argument + */ + LongArray A = this, B = other; + if (aDeg > bDeg) + { + A = other; B = this; + int tmp = aDeg; aDeg = bDeg; bDeg = tmp; + } + + /* + * Establish the word lengths of the arguments and result + */ + int aLen = (int)((uint)(aDeg + 63) >> 6); + int bLen = (int)((uint)(bDeg + 63) >> 6); + int cLen = (int)((uint)(aDeg + bDeg + 62) >> 6); + + if (aLen == 1) + { + ulong a0 = A.m_data[0]; + if (a0 == 1UL) + return B; + + /* + * Fast path for small A, with performance dependent only on the number of set bits + */ + ulong[] c0 = new ulong[cLen]; + MultiplyWord(a0, B.m_data, bLen, c0, 0); + + /* + * Reduce the raw answer against the reduction coefficients + */ + //return ReduceResult(c0, 0, cLen, m, ks); + return new LongArray(c0, 0, cLen); + } + + /* + * Determine if B will get bigger during shifting + */ + int bMax = (int)((uint)(bDeg + 7 + 63) >> 6); + + /* + * Lookup table for the offset of each B in the tables + */ + int[] ti = new int[16]; + + /* + * Precompute table of all 4-bit products of B + */ + ulong[] T0 = new ulong[bMax << 4]; + int tOff = bMax; + ti[1] = tOff; + Array.Copy(B.m_data, 0, T0, tOff, bLen); + for (int i = 2; i < 16; ++i) + { + tOff += bMax; + ti[i] = tOff; + if ((i & 1) == 0) + { + ShiftUp(T0, (int)((uint)tOff >> 1), T0, tOff, bMax, 1); + } + else + { + Add(T0, bMax, T0, tOff - bMax, T0, tOff, bMax); + } + } + + /* + * Second table with all 4-bit products of B shifted 4 bits + */ + ulong[] T1 = new ulong[T0.Length]; + ShiftUp(T0, 0, T1, 0, T0.Length, 4); + //ShiftUp(T0, bMax, T1, bMax, tOff, 4); + + ulong[] a = A.m_data; + ulong[] c = new ulong[cLen << 3]; + + uint MASK = 0xF; + + /* + * Lopez-Dahab (Modified) algorithm + */ + + for (int aPos = 0; aPos < aLen; ++aPos) + { + ulong aVal = a[aPos]; + int cOff = aPos; + for (; ; ) + { + uint u = (uint)aVal & MASK; aVal >>= 4; + uint v = (uint)aVal & MASK; aVal >>= 4; + AddBoth(c, cOff, T0, ti[u], T1, ti[v], bMax); + if (aVal == 0UL) + break; + + cOff += cLen; + } + } + + { + int cOff = c.Length; + while ((cOff -= cLen) != 0) + { + AddShiftedUp(c, cOff - cLen, c, cOff, cLen, 8); + } + } + + /* + * Finally the raw answer is collected, reduce it against the reduction coefficients + */ + //return ReduceResult(c, 0, cLen, m, ks); + return new LongArray(c, 0, cLen); + } + + internal void Reduce(int m, int[] ks) + { + ulong[] buf = m_data; + int rLen = ReduceInPlace(buf, 0, buf.Length, m, ks); + if (rLen < buf.Length) + { + m_data = new ulong[rLen]; + Array.Copy(buf, 0, m_data, 0, rLen); + } + } + + private static LongArray ReduceResult(ulong[] buf, int off, int len, int m, int[] ks) + { + int rLen = ReduceInPlace(buf, off, len, m, ks); + return new LongArray(buf, off, rLen); + } + + private static int ReduceInPlace(ulong[] buf, int off, int len, int m, int[] ks) + { + int mLen = (m + 63) >> 6; + if (len < mLen) + return len; + + int numBits = System.Math.Min(len << 6, (m << 1) - 1); // TODO use actual degree? + int excessBits = (len << 6) - numBits; + while (excessBits >= 64) + { + --len; + excessBits -= 64; + } + + int kLen = ks.Length, kMax = ks[kLen - 1], kNext = kLen > 1 ? ks[kLen - 2] : 0; + int wordWiseLimit = System.Math.Max(m, kMax + 64); + int vectorableWords = (excessBits + System.Math.Min(numBits - wordWiseLimit, m - kNext)) >> 6; + if (vectorableWords > 1) + { + int vectorWiseWords = len - vectorableWords; + ReduceVectorWise(buf, off, len, vectorWiseWords, m, ks); + while (len > vectorWiseWords) + { + buf[off + --len] = 0L; + } + numBits = vectorWiseWords << 6; + } + + if (numBits > wordWiseLimit) + { + ReduceWordWise(buf, off, len, wordWiseLimit, m, ks); + numBits = wordWiseLimit; + } + + if (numBits > m) + { + ReduceBitWise(buf, off, numBits, m, ks); + } + + return mLen; + } + + private static void ReduceBitWise(ulong[] buf, int off, int BitLength, int m, int[] ks) + { + while (--BitLength >= m) + { + if (TestBit(buf, off, BitLength)) + { + ReduceBit(buf, off, BitLength, m, ks); + } + } + } + + private static void ReduceBit(ulong[] buf, int off, int bit, int m, int[] ks) + { + FlipBit(buf, off, bit); + int n = bit - m; + int j = ks.Length; + while (--j >= 0) + { + FlipBit(buf, off, ks[j] + n); + } + FlipBit(buf, off, n); + } + + private static void ReduceWordWise(ulong[] buf, int off, int len, int toBit, int m, int[] ks) + { + int toPos = (int)((uint)toBit >> 6); + + while (--len > toPos) + { + ulong word = buf[off + len]; + if (word != 0) + { + buf[off + len] = 0UL; + ReduceWord(buf, off, (len << 6), word, m, ks); + } + } + + { + int partial = toBit & 0x3F; + ulong word = buf[off + toPos] >> partial; + if (word != 0) + { + buf[off + toPos] ^= word << partial; + ReduceWord(buf, off, toBit, word, m, ks); + } + } + } + + private static void ReduceWord(ulong[] buf, int off, int bit, ulong word, int m, int[] ks) + { + int offset = bit - m; + int j = ks.Length; + while (--j >= 0) + { + FlipWord(buf, off, offset + ks[j], word); + } + FlipWord(buf, off, offset, word); + } + + private static void ReduceVectorWise(ulong[] buf, int off, int len, int words, int m, int[] ks) + { + /* + * NOTE: It's important we go from highest coefficient to lowest, because for the highest + * one (only) we allow the ranges to partially overlap, and therefore any changes must take + * effect for the subsequent lower coefficients. + */ + int baseBit = (words << 6) - m; + int j = ks.Length; + while (--j >= 0) + { + FlipVector(buf, off, buf, off + words, len - words, baseBit + ks[j]); + } + FlipVector(buf, off, buf, off + words, len - words, baseBit); + } + + private static void FlipVector(ulong[] x, int xOff, ulong[] y, int yOff, int yLen, int bits) + { + xOff += (int)((uint)bits >> 6); + bits &= 0x3F; + + if (bits == 0) + { + Add(x, xOff, y, yOff, yLen); + } + else + { + ulong carry = AddShiftedDown(x, xOff + 1, y, yOff, yLen, 64 - bits); + x[xOff] ^= carry; + } + } + + internal LongArray ModSquare(int m, int[] ks) + { + int len = GetUsedLength(); + if (len == 0) + return this; + + ulong[] r = new ulong[len << 1]; + Interleave.Expand64To128(m_data, 0, len, r, 0); + + return new LongArray(r, 0, ReduceInPlace(r, 0, r.Length, m, ks)); + } + + internal LongArray ModSquareN(int n, int m, int[] ks) + { + int len = GetUsedLength(); + if (len == 0) + return this; + + int mLen = (m + 63) >> 6; + ulong[] r = new ulong[mLen << 1]; + Array.Copy(m_data, 0, r, 0, len); + + while (--n >= 0) + { + Interleave.Expand64To128(r, 0, len, r, 0); + len = ReduceInPlace(r, 0, r.Length, m, ks); + } + + return new LongArray(r, 0, len); + } + + internal LongArray Square(int m, int[] ks) + { + int len = GetUsedLength(); + if (len == 0) + return this; + + ulong[] r = new ulong[len << 1]; + Interleave.Expand64To128(m_data, 0, len, r, 0); + + return new LongArray(r, 0, r.Length); + } + + // private static LongArray ExpItohTsujii2(LongArray B, int n, int m, int[] ks) + // { + // LongArray t1 = B, t3 = new LongArray(new long[]{ 1L }); + // int scale = 1; + // + // int numTerms = n; + // while (numTerms > 1) + // { + // if ((numTerms & 1) != 0) + // { + // t3 = t3.ModMultiply(t1, m, ks); + // t1 = t1.modSquareN(scale, m, ks); + // } + // + // LongArray t2 = t1.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // numTerms >>>= 1; scale <<= 1; + // } + // + // return t3.ModMultiply(t1, m, ks); + // } + // + // private static LongArray ExpItohTsujii23(LongArray B, int n, int m, int[] ks) + // { + // LongArray t1 = B, t3 = new LongArray(new long[]{ 1L }); + // int scale = 1; + // + // int numTerms = n; + // while (numTerms > 1) + // { + // bool m03 = numTerms % 3 == 0; + // bool m14 = !m03 && (numTerms & 1) != 0; + // + // if (m14) + // { + // t3 = t3.ModMultiply(t1, m, ks); + // t1 = t1.modSquareN(scale, m, ks); + // } + // + // LongArray t2 = t1.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // + // if (m03) + // { + // t2 = t2.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // numTerms /= 3; scale *= 3; + // } + // else + // { + // numTerms >>>= 1; scale <<= 1; + // } + // } + // + // return t3.ModMultiply(t1, m, ks); + // } + // + // private static LongArray ExpItohTsujii235(LongArray B, int n, int m, int[] ks) + // { + // LongArray t1 = B, t4 = new LongArray(new long[]{ 1L }); + // int scale = 1; + // + // int numTerms = n; + // while (numTerms > 1) + // { + // if (numTerms % 5 == 0) + // { + //// t1 = ExpItohTsujii23(t1, 5, m, ks); + // + // LongArray t3 = t1; + // t1 = t1.modSquareN(scale, m, ks); + // + // LongArray t2 = t1.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // t2 = t1.modSquareN(scale << 1, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // + // t1 = t1.ModMultiply(t3, m, ks); + // + // numTerms /= 5; scale *= 5; + // continue; + // } + // + // bool m03 = numTerms % 3 == 0; + // bool m14 = !m03 && (numTerms & 1) != 0; + // + // if (m14) + // { + // t4 = t4.ModMultiply(t1, m, ks); + // t1 = t1.modSquareN(scale, m, ks); + // } + // + // LongArray t2 = t1.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // + // if (m03) + // { + // t2 = t2.modSquareN(scale, m, ks); + // t1 = t1.ModMultiply(t2, m, ks); + // numTerms /= 3; scale *= 3; + // } + // else + // { + // numTerms >>>= 1; scale <<= 1; + // } + // } + // + // return t4.ModMultiply(t1, m, ks); + // } + + internal LongArray ModInverse(int m, int[] ks) + { + /* + * Fermat's Little Theorem + */ + // LongArray A = this; + // LongArray B = A.modSquare(m, ks); + // LongArray R0 = B, R1 = B; + // for (int i = 2; i < m; ++i) + // { + // R1 = R1.modSquare(m, ks); + // R0 = R0.ModMultiply(R1, m, ks); + // } + // + // return R0; + + /* + * Itoh-Tsujii + */ + // LongArray B = modSquare(m, ks); + // switch (m) + // { + // case 409: + // return ExpItohTsujii23(B, m - 1, m, ks); + // case 571: + // return ExpItohTsujii235(B, m - 1, m, ks); + // case 163: + // case 233: + // case 283: + // default: + // return ExpItohTsujii2(B, m - 1, m, ks); + // } + + /* + * Inversion in F2m using the extended Euclidean algorithm + * + * Input: A nonzero polynomial a(z) of degree at most m-1 + * Output: a(z)^(-1) mod f(z) + */ + int uzDegree = Degree(); + if (uzDegree == 0) + throw new InvalidOperationException(); + + if (uzDegree == 1) + return this; + + // u(z) := a(z) + LongArray uz = Copy(); + + int t = (m + 63) >> 6; + + // v(z) := f(z) + LongArray vz = new LongArray(t); + ReduceBit(vz.m_data, 0, m, m, ks); + + // g1(z) := 1, g2(z) := 0 + LongArray g1z = new LongArray(t); + g1z.m_data[0] = 1UL; + LongArray g2z = new LongArray(t); + + int[] uvDeg = new int[]{ uzDegree, m + 1 }; + LongArray[] uv = new LongArray[]{ uz, vz }; + + int[] ggDeg = new int[]{ 1, 0 }; + LongArray[] gg = new LongArray[]{ g1z, g2z }; + + int b = 1; + int duv1 = uvDeg[b]; + int dgg1 = ggDeg[b]; + int j = duv1 - uvDeg[1 - b]; + + for (;;) + { + if (j < 0) + { + j = -j; + uvDeg[b] = duv1; + ggDeg[b] = dgg1; + b = 1 - b; + duv1 = uvDeg[b]; + dgg1 = ggDeg[b]; + } + + uv[b].AddShiftedByBitsSafe(uv[1 - b], uvDeg[1 - b], j); + + int duv2 = uv[b].DegreeFrom(duv1); + if (duv2 == 0) + return gg[1 - b]; + + { + int dgg2 = ggDeg[1 - b]; + gg[b].AddShiftedByBitsSafe(gg[1 - b], dgg2, j); + dgg2 += j; + + if (dgg2 > dgg1) + { + dgg1 = dgg2; + } + else if (dgg2 == dgg1) + { + dgg1 = gg[b].DegreeFrom(dgg1); + } + } + + j += (duv2 - duv1); + duv1 = duv2; + } + } + + public override bool Equals(object obj) + { + if (obj is LongArray longArray) + return Equals(ref longArray); + + return false; + } + + internal bool Equals(ref LongArray other) + { + if (AreAliased(ref this, ref other)) + return true; + + int usedLen = GetUsedLength(); + if (other.GetUsedLength() != usedLen) + return false; + + for (int i = 0; i < usedLen; i++) + { + if (m_data[i] != other.m_data[i]) + return false; + } + return true; + } + + public override int GetHashCode() + { + int usedLen = GetUsedLength(); + int hash = 1; + for (int i = 0; i < usedLen; i++) + { + ulong mi = m_data[i]; + hash *= 31; + hash ^= (int)mi; + hash *= 31; + hash ^= (int)(mi >> 32); + } + return hash; + } + + public LongArray Copy() + { + return new LongArray(Arrays.Clone(m_data)); + } + + public override string ToString() + { + int i = GetUsedLength(); + if (i == 0) + return "0"; + + StringBuilder sb = new StringBuilder(i * 64); + sb.Append(Convert.ToString((long)m_data[--i], 2)); + while (--i >= 0) + { + string s = Convert.ToString((long)m_data[i], 2); + + // Add leading zeroes, except for highest significant word + int len = s.Length; + if (len < 64) + { + sb.Append('0', 64 - len); + } + + sb.Append(s); + } + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs.meta new file mode 100644 index 00000000..2df56cf6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91d2514e199706046b3d7565e3e9f903 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/LongArray.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs new file mode 100644 index 00000000..6be1b800 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class ScaleXNegateYPointMap + : ECPointMap + { + protected readonly ECFieldElement scale; + + public ScaleXNegateYPointMap(ECFieldElement scale) + { + this.scale = scale; + } + + public virtual ECPoint Map(ECPoint p) + { + return p.ScaleXNegateY(scale); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs.meta new file mode 100644 index 00000000..937d6cae --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 49b9efe92f740b648ba2ab32f5bb637f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXNegateYPointMap.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs new file mode 100644 index 00000000..32e163d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class ScaleXPointMap + : ECPointMap + { + protected readonly ECFieldElement scale; + + public ScaleXPointMap(ECFieldElement scale) + { + this.scale = scale; + } + + public virtual ECPoint Map(ECPoint p) + { + return p.ScaleX(scale); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs.meta new file mode 100644 index 00000000..b93bd5b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2edd367a332fd9a449c4750d8fe17bb2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleXPointMap.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs new file mode 100644 index 00000000..96f77f75 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class ScaleYNegateXPointMap + : ECPointMap + { + protected readonly ECFieldElement scale; + + public ScaleYNegateXPointMap(ECFieldElement scale) + { + this.scale = scale; + } + + public virtual ECPoint Map(ECPoint p) + { + return p.ScaleYNegateX(scale); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs.meta new file mode 100644 index 00000000..47de35df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ae0f78241cb54647bfca2deab973260 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYNegateXPointMap.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs new file mode 100644 index 00000000..bc045288 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class ScaleYPointMap + : ECPointMap + { + protected readonly ECFieldElement scale; + + public ScaleYPointMap(ECFieldElement scale) + { + this.scale = scale; + } + + public virtual ECPoint Map(ECPoint p) + { + return p.ScaleY(scale); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs.meta new file mode 100644 index 00000000..8a55ed72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43fb8e1e3868365419a237b4f315cc1d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/ScaleYPointMap.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs new file mode 100644 index 00000000..ff64d8d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs @@ -0,0 +1,44 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC +{ + public class SimpleLookupTable + : AbstractECLookupTable + { + private static ECPoint[] Copy(ECPoint[] points, int off, int len) + { + ECPoint[] result = new ECPoint[len]; + for (int i = 0; i < len; ++i) + { + result[i] = points[off + i]; + } + return result; + } + + private readonly ECPoint[] points; + + public SimpleLookupTable(ECPoint[] points, int off, int len) + { + this.points = Copy(points, off, len); + } + + public override int Size + { + get { return points.Length; } + } + + public override ECPoint Lookup(int index) + { + throw new NotSupportedException("Constant-time lookup not supported"); + } + + public override ECPoint LookupVar(int index) + { + return points[index]; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs.meta new file mode 100644 index 00000000..37fc6a87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 16f65b99b35dba94c961af2c4295f0a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/SimpleLookupTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc.meta new file mode 100644 index 00000000..2673860f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 201ba8256b97c96479d8ae05415ac840 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs new file mode 100644 index 00000000..bf3078f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs @@ -0,0 +1,245 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc +{ + /** + * Class representing a simple version of a big decimal. A + * SimpleBigDecimal is basically a + * {@link java.math.BigInteger BigInteger} with a few digits on the right of + * the decimal point. The number of (binary) digits on the right of the decimal + * point is called the scale of the SimpleBigDecimal. + * Unlike in {@link java.math.BigDecimal BigDecimal}, the scale is not adjusted + * automatically, but must be set manually. All SimpleBigDecimals + * taking part in the same arithmetic operation must have equal scale. The + * result of a multiplication of two SimpleBigDecimals returns a + * SimpleBigDecimal with double scale. + */ + internal class SimpleBigDecimal + // : Number + { + // private static final long serialVersionUID = 1L; + + private readonly BigInteger bigInt; + private readonly int scale; + + /** + * Returns a SimpleBigDecimal representing the same numerical + * value as value. + * @param value The value of the SimpleBigDecimal to be + * created. + * @param scale The scale of the SimpleBigDecimal to be + * created. + * @return The such created SimpleBigDecimal. + */ + public static SimpleBigDecimal GetInstance(BigInteger val, int scale) + { + return new SimpleBigDecimal(val.ShiftLeft(scale), scale); + } + + /** + * Constructor for SimpleBigDecimal. The value of the + * constructed SimpleBigDecimal Equals bigInt / + * 2scale. + * @param bigInt The bigInt value parameter. + * @param scale The scale of the constructed SimpleBigDecimal. + */ + public SimpleBigDecimal(BigInteger bigInt, int scale) + { + if (scale < 0) + throw new ArgumentException("scale may not be negative"); + + this.bigInt = bigInt; + this.scale = scale; + } + + private SimpleBigDecimal(SimpleBigDecimal limBigDec) + { + bigInt = limBigDec.bigInt; + scale = limBigDec.scale; + } + + private void CheckScale(SimpleBigDecimal b) + { + if (scale != b.scale) + throw new ArgumentException("Only SimpleBigDecimal of same scale allowed in arithmetic operations"); + } + + public SimpleBigDecimal AdjustScale(int newScale) + { + if (newScale < 0) + throw new ArgumentException("scale may not be negative"); + + if (newScale == scale) + return this; + + return new SimpleBigDecimal(bigInt.ShiftLeft(newScale - scale), newScale); + } + + public SimpleBigDecimal Add(SimpleBigDecimal b) + { + CheckScale(b); + return new SimpleBigDecimal(bigInt.Add(b.bigInt), scale); + } + + public SimpleBigDecimal Add(BigInteger b) + { + return new SimpleBigDecimal(bigInt.Add(b.ShiftLeft(scale)), scale); + } + + public SimpleBigDecimal Negate() + { + return new SimpleBigDecimal(bigInt.Negate(), scale); + } + + public SimpleBigDecimal Subtract(SimpleBigDecimal b) + { + return Add(b.Negate()); + } + + public SimpleBigDecimal Subtract(BigInteger b) + { + return new SimpleBigDecimal(bigInt.Subtract(b.ShiftLeft(scale)), scale); + } + + public SimpleBigDecimal Multiply(SimpleBigDecimal b) + { + CheckScale(b); + return new SimpleBigDecimal(bigInt.Multiply(b.bigInt), scale + scale); + } + + public SimpleBigDecimal Multiply(BigInteger b) + { + return new SimpleBigDecimal(bigInt.Multiply(b), scale); + } + + public SimpleBigDecimal Divide(SimpleBigDecimal b) + { + CheckScale(b); + BigInteger dividend = bigInt.ShiftLeft(scale); + return new SimpleBigDecimal(dividend.Divide(b.bigInt), scale); + } + + public SimpleBigDecimal Divide(BigInteger b) + { + return new SimpleBigDecimal(bigInt.Divide(b), scale); + } + + public SimpleBigDecimal ShiftLeft(int n) + { + return new SimpleBigDecimal(bigInt.ShiftLeft(n), scale); + } + + public int CompareTo(SimpleBigDecimal val) + { + CheckScale(val); + return bigInt.CompareTo(val.bigInt); + } + + public int CompareTo(BigInteger val) + { + return bigInt.CompareTo(val.ShiftLeft(scale)); + } + + public BigInteger Floor() + { + return bigInt.ShiftRight(scale); + } + + public BigInteger Round() + { + SimpleBigDecimal oneHalf = new SimpleBigDecimal(BigInteger.One, 1); + return Add(oneHalf.AdjustScale(scale)).Floor(); + } + + public int IntValue + { + get { return Floor().IntValue; } + } + + public long LongValue + { + get { return Floor().LongValue; } + } + +// public double doubleValue() +// { +// return new Double(ToString()).doubleValue(); +// } +// +// public float floatValue() +// { +// return new Float(ToString()).floatValue(); +// } + + public int Scale + { + get { return scale; } + } + + public override string ToString() + { + if (scale == 0) + return bigInt.ToString(); + + BigInteger floorBigInt = Floor(); + + BigInteger fract = bigInt.Subtract(floorBigInt.ShiftLeft(scale)); + if (bigInt.SignValue < 0) + { + fract = BigInteger.One.ShiftLeft(scale).Subtract(fract); + } + + if ((floorBigInt.SignValue == -1) && (!(fract.Equals(BigInteger.Zero)))) + { + floorBigInt = floorBigInt.Add(BigInteger.One); + } + string leftOfPoint = floorBigInt.ToString(); + + char[] fractCharArr = new char[scale]; + string fractStr = fract.ToString(2); + int fractLen = fractStr.Length; + int zeroes = scale - fractLen; + for (int i = 0; i < zeroes; i++) + { + fractCharArr[i] = '0'; + } + for (int j = 0; j < fractLen; j++) + { + fractCharArr[zeroes + j] = fractStr[j]; + } + string rightOfPoint = new string(fractCharArr); + + StringBuilder sb = new StringBuilder(leftOfPoint); + sb.Append("."); + sb.Append(rightOfPoint); + + return sb.ToString(); + } + + public override bool Equals( + object obj) + { + if (this == obj) + return true; + + SimpleBigDecimal other = obj as SimpleBigDecimal; + + if (other == null) + return false; + + return bigInt.Equals(other.bigInt) + && scale == other.scale; + } + + public override int GetHashCode() + { + return bigInt.GetHashCode() ^ scale; + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs.meta new file mode 100644 index 00000000..f9ea7667 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5c5a2d39e8d1a24ea634ca29414b6a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/SimpleBigDecimal.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs new file mode 100644 index 00000000..976e03c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs @@ -0,0 +1,849 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc +{ + /** + * Class holding methods for point multiplication based on the window + * τ-adic nonadjacent form (WTNAF). The algorithms are based on the + * paper "Improved Algorithms for Arithmetic on Anomalous Binary Curves" + * by Jerome A. Solinas. The paper first appeared in the Proceedings of + * Crypto 1997. + */ + internal class Tnaf + { + private static readonly BigInteger MinusOne = BigInteger.One.Negate(); + private static readonly BigInteger MinusTwo = BigInteger.Two.Negate(); + private static readonly BigInteger MinusThree = BigInteger.Three.Negate(); + private static readonly BigInteger Four = BigInteger.ValueOf(4); + + /** + * The window width of WTNAF. The standard value of 4 is slightly less + * than optimal for running time, but keeps space requirements for + * precomputation low. For typical curves, a value of 5 or 6 results in + * a better running time. When changing this value, the + * αu's must be computed differently, see + * e.g. "Guide to Elliptic Curve Cryptography", Darrel Hankerson, + * Alfred Menezes, Scott Vanstone, Springer-Verlag New York Inc., 2004, + * p. 121-122 + */ + public const sbyte Width = 4; + + /** + * 24 + */ + public const sbyte Pow2Width = 16; + + /** + * The αu's for a=0 as an array + * of ZTauElements. + */ + public static readonly ZTauElement[] Alpha0 = + { + null, + new ZTauElement(BigInteger.One, BigInteger.Zero), null, + new ZTauElement(MinusThree, MinusOne), null, + new ZTauElement(MinusOne, MinusOne), null, + new ZTauElement(BigInteger.One, MinusOne), null + }; + + /** + * The αu's for a=0 as an array + * of TNAFs. + */ + public static readonly sbyte[][] Alpha0Tnaf = + { + null, new sbyte[]{1}, null, new sbyte[]{-1, 0, 1}, null, new sbyte[]{1, 0, 1}, null, new sbyte[]{-1, 0, 0, 1} + }; + + /** + * The αu's for a=1 as an array + * of ZTauElements. + */ + public static readonly ZTauElement[] Alpha1 = + { + null, + new ZTauElement(BigInteger.One, BigInteger.Zero), null, + new ZTauElement(MinusThree, BigInteger.One), null, + new ZTauElement(MinusOne, BigInteger.One), null, + new ZTauElement(BigInteger.One, BigInteger.One), null + }; + + /** + * The αu's for a=1 as an array + * of TNAFs. + */ + public static readonly sbyte[][] Alpha1Tnaf = + { + null, new sbyte[]{1}, null, new sbyte[]{-1, 0, 1}, null, new sbyte[]{1, 0, 1}, null, new sbyte[]{-1, 0, 0, -1} + }; + + /** + * Computes the norm of an element λ of + * Z[τ]. + * @param mu The parameter μ of the elliptic curve. + * @param lambda The element λ of + * Z[τ]. + * @return The norm of λ. + */ + public static BigInteger Norm(sbyte mu, ZTauElement lambda) + { + BigInteger norm; + + // s1 = u^2 + BigInteger s1 = lambda.u.Multiply(lambda.u); + + // s2 = u * v + BigInteger s2 = lambda.u.Multiply(lambda.v); + + // s3 = 2 * v^2 + BigInteger s3 = lambda.v.Multiply(lambda.v).ShiftLeft(1); + + if (mu == 1) + { + norm = s1.Add(s2).Add(s3); + } + else if (mu == -1) + { + norm = s1.Subtract(s2).Add(s3); + } + else + { + throw new ArgumentException("mu must be 1 or -1"); + } + + return norm; + } + + /** + * Computes the norm of an element λ of + * R[τ], where λ = u + vτ + * and u and u are real numbers (elements of + * R). + * @param mu The parameter μ of the elliptic curve. + * @param u The real part of the element λ of + * R[τ]. + * @param v The τ-adic part of the element + * λ of R[τ]. + * @return The norm of λ. + */ + public static SimpleBigDecimal Norm(sbyte mu, SimpleBigDecimal u, SimpleBigDecimal v) + { + SimpleBigDecimal norm; + + // s1 = u^2 + SimpleBigDecimal s1 = u.Multiply(u); + + // s2 = u * v + SimpleBigDecimal s2 = u.Multiply(v); + + // s3 = 2 * v^2 + SimpleBigDecimal s3 = v.Multiply(v).ShiftLeft(1); + + if (mu == 1) + { + norm = s1.Add(s2).Add(s3); + } + else if (mu == -1) + { + norm = s1.Subtract(s2).Add(s3); + } + else + { + throw new ArgumentException("mu must be 1 or -1"); + } + + return norm; + } + + /** + * Rounds an element λ of R[τ] + * to an element of Z[τ], such that their difference + * has minimal norm. λ is given as + * λ = λ0 + λ1τ. + * @param lambda0 The component λ0. + * @param lambda1 The component λ1. + * @param mu The parameter μ of the elliptic curve. Must + * equal 1 or -1. + * @return The rounded element of Z[τ]. + * @throws ArgumentException if lambda0 and + * lambda1 do not have same scale. + */ + public static ZTauElement Round(SimpleBigDecimal lambda0, + SimpleBigDecimal lambda1, sbyte mu) + { + int scale = lambda0.Scale; + if (lambda1.Scale != scale) + throw new ArgumentException("lambda0 and lambda1 do not have same scale"); + + if (!((mu == 1) || (mu == -1))) + throw new ArgumentException("mu must be 1 or -1"); + + BigInteger f0 = lambda0.Round(); + BigInteger f1 = lambda1.Round(); + + SimpleBigDecimal eta0 = lambda0.Subtract(f0); + SimpleBigDecimal eta1 = lambda1.Subtract(f1); + + // eta = 2*eta0 + mu*eta1 + SimpleBigDecimal eta = eta0.Add(eta0); + if (mu == 1) + { + eta = eta.Add(eta1); + } + else + { + // mu == -1 + eta = eta.Subtract(eta1); + } + + // check1 = eta0 - 3*mu*eta1 + // check2 = eta0 + 4*mu*eta1 + SimpleBigDecimal threeEta1 = eta1.Add(eta1).Add(eta1); + SimpleBigDecimal fourEta1 = threeEta1.Add(eta1); + SimpleBigDecimal check1; + SimpleBigDecimal check2; + if (mu == 1) + { + check1 = eta0.Subtract(threeEta1); + check2 = eta0.Add(fourEta1); + } + else + { + // mu == -1 + check1 = eta0.Add(threeEta1); + check2 = eta0.Subtract(fourEta1); + } + + sbyte h0 = 0; + sbyte h1 = 0; + + // if eta >= 1 + if (eta.CompareTo(BigInteger.One) >= 0) + { + if (check1.CompareTo(MinusOne) < 0) + { + h1 = mu; + } + else + { + h0 = 1; + } + } + else + { + // eta < 1 + if (check2.CompareTo(BigInteger.Two) >= 0) + { + h1 = mu; + } + } + + // if eta < -1 + if (eta.CompareTo(MinusOne) < 0) + { + if (check1.CompareTo(BigInteger.One) >= 0) + { + h1 = (sbyte)-mu; + } + else + { + h0 = -1; + } + } + else + { + // eta >= -1 + if (check2.CompareTo(MinusTwo) < 0) + { + h1 = (sbyte)-mu; + } + } + + BigInteger q0 = f0.Add(BigInteger.ValueOf(h0)); + BigInteger q1 = f1.Add(BigInteger.ValueOf(h1)); + return new ZTauElement(q0, q1); + } + + /** + * Approximate division by n. For an integer + * k, the value λ = s k / n is + * computed to c bits of accuracy. + * @param k The parameter k. + * @param s The curve parameter s0 or + * s1. + * @param vm The Lucas Sequence element Vm. + * @param a The parameter a of the elliptic curve. + * @param m The bit length of the finite field + * Fm. + * @param c The number of bits of accuracy, i.e. the scale of the returned + * SimpleBigDecimal. + * @return The value λ = s k / n computed to + * c bits of accuracy. + */ + public static SimpleBigDecimal ApproximateDivisionByN(BigInteger k, + BigInteger s, BigInteger vm, sbyte a, int m, int c) + { + int _k = (m + 5)/2 + c; + BigInteger ns = k.ShiftRight(m - _k - 2 + a); + + BigInteger gs = s.Multiply(ns); + + BigInteger hs = gs.ShiftRight(m); + + BigInteger js = vm.Multiply(hs); + + BigInteger gsPlusJs = gs.Add(js); + BigInteger ls = gsPlusJs.ShiftRight(_k-c); + if (gsPlusJs.TestBit(_k-c-1)) + { + // round up + ls = ls.Add(BigInteger.One); + } + + return new SimpleBigDecimal(ls, c); + } + + /** + * Computes the τ-adic NAF (non-adjacent form) of an + * element λ of Z[τ]. + * @param mu The parameter μ of the elliptic curve. + * @param lambda The element λ of + * Z[τ]. + * @return The τ-adic NAF of λ. + */ + public static sbyte[] TauAdicNaf(sbyte mu, ZTauElement lambda) + { + if (!((mu == 1) || (mu == -1))) + throw new ArgumentException("mu must be 1 or -1"); + + BigInteger norm = Norm(mu, lambda); + + // Ceiling of log2 of the norm + int log2Norm = norm.BitLength; + + // If length(TNAF) > 30, then length(TNAF) < log2Norm + 3.52 + int maxLength = log2Norm > 30 ? log2Norm + 4 : 34; + + // The array holding the TNAF + sbyte[] u = new sbyte[maxLength]; + int i = 0; + + // The actual length of the TNAF + int length = 0; + + BigInteger r0 = lambda.u; + BigInteger r1 = lambda.v; + + while(!((r0.Equals(BigInteger.Zero)) && (r1.Equals(BigInteger.Zero)))) + { + // If r0 is odd + if (r0.TestBit(0)) + { + u[i] = (sbyte) BigInteger.Two.Subtract((r0.Subtract(r1.ShiftLeft(1))).Mod(Four)).IntValue; + + // r0 = r0 - u[i] + if (u[i] == 1) + { + r0 = r0.ClearBit(0); + } + else + { + // u[i] == -1 + r0 = r0.Add(BigInteger.One); + } + length = i; + } + else + { + u[i] = 0; + } + + BigInteger t = r0; + BigInteger s = r0.ShiftRight(1); + if (mu == 1) + { + r0 = r1.Add(s); + } + else + { + // mu == -1 + r0 = r1.Subtract(s); + } + + r1 = t.ShiftRight(1).Negate(); + i++; + } + + length++; + + // Reduce the TNAF array to its actual length + sbyte[] tnaf = new sbyte[length]; + Array.Copy(u, 0, tnaf, 0, length); + return tnaf; + } + + /** + * Applies the operation τ() to an + * AbstractF2mPoint. + * @param p The AbstractF2mPoint to which τ() is applied. + * @return τ(p) + */ + public static AbstractF2mPoint Tau(AbstractF2mPoint p) + { + return p.Tau(); + } + + /** + * Returns the parameter μ of the elliptic curve. + * @param curve The elliptic curve from which to obtain μ. + * The curve must be a Koblitz curve, i.e. a Equals + * 0 or 1 and b Equals + * 1. + * @return μ of the elliptic curve. + * @throws ArgumentException if the given ECCurve is not a Koblitz + * curve. + */ + public static sbyte GetMu(AbstractF2mCurve curve) + { + BigInteger a = curve.A.ToBigInteger(); + + sbyte mu; + if (a.SignValue == 0) + { + mu = -1; + } + else if (a.Equals(BigInteger.One)) + { + mu = 1; + } + else + { + throw new ArgumentException("No Koblitz curve (ABC), TNAF multiplication not possible"); + } + return mu; + } + + public static sbyte GetMu(ECFieldElement curveA) + { + return (sbyte)(curveA.IsZero ? -1 : 1); + } + + public static sbyte GetMu(int curveA) + { + return (sbyte)(curveA == 0 ? -1 : 1); + } + + /** + * Calculates the Lucas Sequence elements Uk-1 and + * Uk or Vk-1 and + * Vk. + * @param mu The parameter μ of the elliptic curve. + * @param k The index of the second element of the Lucas Sequence to be + * returned. + * @param doV If set to true, computes Vk-1 and + * Vk, otherwise Uk-1 and + * Uk. + * @return An array with 2 elements, containing Uk-1 + * and Uk or Vk-1 + * and Vk. + */ + public static BigInteger[] GetLucas(sbyte mu, int k, bool doV) + { + if (!(mu == 1 || mu == -1)) + throw new ArgumentException("mu must be 1 or -1"); + + BigInteger u0; + BigInteger u1; + BigInteger u2; + + if (doV) + { + u0 = BigInteger.Two; + u1 = BigInteger.ValueOf(mu); + } + else + { + u0 = BigInteger.Zero; + u1 = BigInteger.One; + } + + for (int i = 1; i < k; i++) + { + // u2 = mu*u1 - 2*u0; + BigInteger s = null; + if (mu == 1) + { + s = u1; + } + else + { + // mu == -1 + s = u1.Negate(); + } + + u2 = s.Subtract(u0.ShiftLeft(1)); + u0 = u1; + u1 = u2; + // System.out.println(i + ": " + u2); + // System.out.println(); + } + + BigInteger[] retVal = {u0, u1}; + return retVal; + } + + /** + * Computes the auxiliary value tw. If the width is + * 4, then for mu = 1, tw = 6 and for + * mu = -1, tw = 10 + * @param mu The parameter μ of the elliptic curve. + * @param w The window width of the WTNAF. + * @return the auxiliary value tw + */ + public static BigInteger GetTw(sbyte mu, int w) + { + if (w == 4) + { + if (mu == 1) + { + return BigInteger.ValueOf(6); + } + else + { + // mu == -1 + return BigInteger.ValueOf(10); + } + } + else + { + // For w <> 4, the values must be computed + BigInteger[] us = GetLucas(mu, w, false); + BigInteger twoToW = BigInteger.Zero.SetBit(w); + BigInteger u1invert = us[1].ModInverse(twoToW); + BigInteger tw; + tw = BigInteger.Two.Multiply(us[0]).Multiply(u1invert).Mod(twoToW); + //System.out.println("mu = " + mu); + //System.out.println("tw = " + tw); + return tw; + } + } + + /** + * Computes the auxiliary values s0 and + * s1 used for partial modular reduction. + * @param curve The elliptic curve for which to compute + * s0 and s1. + * @throws ArgumentException if curve is not a + * Koblitz curve (Anomalous Binary Curve, ABC). + */ + public static BigInteger[] GetSi(AbstractF2mCurve curve) + { + if (!curve.IsKoblitz) + throw new ArgumentException("si is defined for Koblitz curves only"); + + int m = curve.FieldSize; + int a = curve.A.ToBigInteger().IntValue; + sbyte mu = GetMu(a); + int shifts = GetShiftsForCofactor(curve.Cofactor); + int index = m + 3 - a; + BigInteger[] ui = GetLucas(mu, index, false); + + if (mu == 1) + { + ui[0] = ui[0].Negate(); + ui[1] = ui[1].Negate(); + } + + BigInteger dividend0 = BigInteger.One.Add(ui[1]).ShiftRight(shifts); + BigInteger dividend1 = BigInteger.One.Add(ui[0]).ShiftRight(shifts).Negate(); + + return new BigInteger[] { dividend0, dividend1 }; + } + + public static BigInteger[] GetSi(int fieldSize, int curveA, BigInteger cofactor) + { + sbyte mu = GetMu(curveA); + int shifts = GetShiftsForCofactor(cofactor); + int index = fieldSize + 3 - curveA; + BigInteger[] ui = GetLucas(mu, index, false); + if (mu == 1) + { + ui[0] = ui[0].Negate(); + ui[1] = ui[1].Negate(); + } + + BigInteger dividend0 = BigInteger.One.Add(ui[1]).ShiftRight(shifts); + BigInteger dividend1 = BigInteger.One.Add(ui[0]).ShiftRight(shifts).Negate(); + + return new BigInteger[] { dividend0, dividend1 }; + } + + protected static int GetShiftsForCofactor(BigInteger h) + { + if (h != null && h.BitLength < 4) + { + int hi = h.IntValue; + if (hi == 2) + return 1; + if (hi == 4) + return 2; + } + + throw new ArgumentException("h (Cofactor) must be 2 or 4"); + } + + /** + * Partial modular reduction modulo + * m - 1)/(τ - 1). + * @param k The integer to be reduced. + * @param m The bitlength of the underlying finite field. + * @param a The parameter a of the elliptic curve. + * @param s The auxiliary values s0 and + * s1. + * @param mu The parameter μ of the elliptic curve. + * @param c The precision (number of bits of accuracy) of the partial + * modular reduction. + * @return ρ := k partmod (τm - 1)/(τ - 1) + */ + public static ZTauElement PartModReduction(BigInteger k, int m, sbyte a, + BigInteger[] s, sbyte mu, sbyte c) + { + // d0 = s[0] + mu*s[1]; mu is either 1 or -1 + BigInteger d0; + if (mu == 1) + { + d0 = s[0].Add(s[1]); + } + else + { + d0 = s[0].Subtract(s[1]); + } + + BigInteger[] v = GetLucas(mu, m, true); + BigInteger vm = v[1]; + + SimpleBigDecimal lambda0 = ApproximateDivisionByN( + k, s[0], vm, a, m, c); + + SimpleBigDecimal lambda1 = ApproximateDivisionByN( + k, s[1], vm, a, m, c); + + ZTauElement q = Round(lambda0, lambda1, mu); + + // r0 = n - d0*q0 - 2*s1*q1 + BigInteger r0 = k.Subtract(d0.Multiply(q.u)).Subtract( + BigInteger.ValueOf(2).Multiply(s[1]).Multiply(q.v)); + + // r1 = s1*q0 - s0*q1 + BigInteger r1 = s[1].Multiply(q.u).Subtract(s[0].Multiply(q.v)); + + return new ZTauElement(r0, r1); + } + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by a BigInteger using the reduced τ-adic + * NAF (RTNAF) method. + * @param p The AbstractF2mPoint to Multiply. + * @param k The BigInteger by which to Multiply p. + * @return k * p + */ + public static AbstractF2mPoint MultiplyRTnaf(AbstractF2mPoint p, BigInteger k) + { + AbstractF2mCurve curve = (AbstractF2mCurve)p.Curve; + int m = curve.FieldSize; + int a = curve.A.ToBigInteger().IntValue; + sbyte mu = GetMu(a); + BigInteger[] s = curve.GetSi(); + ZTauElement rho = PartModReduction(k, m, (sbyte)a, s, mu, (sbyte)10); + + return MultiplyTnaf(p, rho); + } + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by an element λ of Z[τ] + * using the τ-adic NAF (TNAF) method. + * @param p The AbstractF2mPoint to Multiply. + * @param lambda The element λ of + * Z[τ]. + * @return λ * p + */ + public static AbstractF2mPoint MultiplyTnaf(AbstractF2mPoint p, ZTauElement lambda) + { + AbstractF2mCurve curve = (AbstractF2mCurve)p.Curve; + sbyte mu = GetMu(curve.A); + sbyte[] u = TauAdicNaf(mu, lambda); + + AbstractF2mPoint q = MultiplyFromTnaf(p, u); + + return q; + } + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by an element λ of Z[τ] + * using the τ-adic NAF (TNAF) method, given the TNAF + * of λ. + * @param p The AbstractF2mPoint to Multiply. + * @param u The the TNAF of λ.. + * @return λ * p + */ + public static AbstractF2mPoint MultiplyFromTnaf(AbstractF2mPoint p, sbyte[] u) + { + ECCurve curve = p.Curve; + AbstractF2mPoint q = (AbstractF2mPoint)curve.Infinity; + AbstractF2mPoint pNeg = (AbstractF2mPoint)p.Negate(); + int tauCount = 0; + for (int i = u.Length - 1; i >= 0; i--) + { + ++tauCount; + sbyte ui = u[i]; + if (ui != 0) + { + q = q.TauPow(tauCount); + tauCount = 0; + + ECPoint x = ui > 0 ? p : pNeg; + q = (AbstractF2mPoint)q.Add(x); + } + } + if (tauCount > 0) + { + q = q.TauPow(tauCount); + } + return q; + } + + /** + * Computes the [τ]-adic window NAF of an element + * λ of Z[τ]. + * @param mu The parameter μ of the elliptic curve. + * @param lambda The element λ of + * Z[τ] of which to compute the + * [τ]-adic NAF. + * @param width The window width of the resulting WNAF. + * @param pow2w 2width. + * @param tw The auxiliary value tw. + * @param alpha The αu's for the window width. + * @return The [τ]-adic window NAF of + * λ. + */ + public static sbyte[] TauAdicWNaf(sbyte mu, ZTauElement lambda, + sbyte width, BigInteger pow2w, BigInteger tw, ZTauElement[] alpha) + { + if (!((mu == 1) || (mu == -1))) + throw new ArgumentException("mu must be 1 or -1"); + + BigInteger norm = Norm(mu, lambda); + + // Ceiling of log2 of the norm + int log2Norm = norm.BitLength; + + // If length(TNAF) > 30, then length(TNAF) < log2Norm + 3.52 + int maxLength = log2Norm > 30 ? log2Norm + 4 + width : 34 + width; + + // The array holding the TNAF + sbyte[] u = new sbyte[maxLength]; + + // 2^(width - 1) + BigInteger pow2wMin1 = pow2w.ShiftRight(1); + + // Split lambda into two BigIntegers to simplify calculations + BigInteger r0 = lambda.u; + BigInteger r1 = lambda.v; + int i = 0; + + // while lambda <> (0, 0) + while (!((r0.Equals(BigInteger.Zero))&&(r1.Equals(BigInteger.Zero)))) + { + // if r0 is odd + if (r0.TestBit(0)) + { + // uUnMod = r0 + r1*tw Mod 2^width + BigInteger uUnMod + = r0.Add(r1.Multiply(tw)).Mod(pow2w); + + sbyte uLocal; + // if uUnMod >= 2^(width - 1) + if (uUnMod.CompareTo(pow2wMin1) >= 0) + { + uLocal = (sbyte) uUnMod.Subtract(pow2w).IntValue; + } + else + { + uLocal = (sbyte) uUnMod.IntValue; + } + // uLocal is now in [-2^(width-1), 2^(width-1)-1] + + u[i] = uLocal; + bool s = true; + if (uLocal < 0) + { + s = false; + uLocal = (sbyte)-uLocal; + } + // uLocal is now >= 0 + + if (s) + { + r0 = r0.Subtract(alpha[uLocal].u); + r1 = r1.Subtract(alpha[uLocal].v); + } + else + { + r0 = r0.Add(alpha[uLocal].u); + r1 = r1.Add(alpha[uLocal].v); + } + } + else + { + u[i] = 0; + } + + BigInteger t = r0; + + if (mu == 1) + { + r0 = r1.Add(r0.ShiftRight(1)); + } + else + { + // mu == -1 + r0 = r1.Subtract(r0.ShiftRight(1)); + } + r1 = t.ShiftRight(1).Negate(); + i++; + } + return u; + } + + /** + * Does the precomputation for WTNAF multiplication. + * @param p The ECPoint for which to do the precomputation. + * @param a The parameter a of the elliptic curve. + * @return The precomputation array for p. + */ + public static AbstractF2mPoint[] GetPreComp(AbstractF2mPoint p, sbyte a) + { + sbyte[][] alphaTnaf = (a == 0) ? Tnaf.Alpha0Tnaf : Tnaf.Alpha1Tnaf; + + AbstractF2mPoint[] pu = new AbstractF2mPoint[(uint)(alphaTnaf.Length + 1) >> 1]; + pu[0] = p; + + uint precompLen = (uint)alphaTnaf.Length; + for (uint i = 3; i < precompLen; i += 2) + { + pu[i >> 1] = Tnaf.MultiplyFromTnaf(p, alphaTnaf[i]); + } + + p.Curve.NormalizeAll(pu); + + return pu; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs.meta new file mode 100644 index 00000000..2954414e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d4c036c1d1b5625429262c1d3a289221 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/Tnaf.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs new file mode 100644 index 00000000..c1e06949 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc +{ + /** + * Class representing an element of Z[τ]. Let + * λ be an element of Z[τ]. Then + * λ is given as λ = u + vτ. The + * components u and v may be used directly, there + * are no accessor methods. + * Immutable class. + */ + internal class ZTauElement + { + /** + * The "real" part of λ. + */ + public readonly BigInteger u; + + /** + * The "τ-adic" part of λ. + */ + public readonly BigInteger v; + + /** + * Constructor for an element λ of + * Z[τ]. + * @param u The "real" part of λ. + * @param v The "τ-adic" part of + * λ. + */ + public ZTauElement(BigInteger u, BigInteger v) + { + this.u = u; + this.v = v; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs.meta new file mode 100644 index 00000000..4dfe02b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4706243df8a836044a1ee0215cba1ffc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/abc/ZTauElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom.meta new file mode 100644 index 00000000..b2e3ab83 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 216c40b9639f37f489acda610a172e6f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb.meta new file mode 100644 index 00000000..3afd4cd9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 62f318930c856fc418115396d3c8d386 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs.meta new file mode 100644 index 00000000..34064760 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 918daba9489c9ac4a81cf8769c7c518d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs.meta new file mode 100644 index 00000000..6b760ee6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09cf8f472b66db04ebbde3a88ce37d44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/djb/Curve25519Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm.meta new file mode 100644 index 00000000..d6ae1f62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a169e85b7fbd1d34d94d1220c74f9a19 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs new file mode 100644 index 00000000..009fdd49 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM +{ + internal class SM2P256V1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SM2P256V1FieldElement.Q; + + private const int SM2P256V1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SM2P256V1_FE_INTS = 8; + private static readonly ECFieldElement[] SM2P256V1_AFFINE_ZS = new ECFieldElement[] { new SM2P256V1FieldElement(BigInteger.One) }; + + protected readonly SM2P256V1Point m_infinity; + + public SM2P256V1Curve() + : base(q) + { + this.m_infinity = new SM2P256V1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("28E9FA9E9D9F5E344D5A9E4BCF6509A7F39789F515AB8F92DDBCBD414D940E93"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFF7203DF6B21C6052B53BBF40939D54123")); + this.m_cofactor = BigInteger.One; + this.m_coord = SM2P256V1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SM2P256V1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SM2P256V1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SM2P256V1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SM2P256V1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SM2P256V1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy(((SM2P256V1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SM2P256V1_FE_INTS; + Nat256.Copy(((SM2P256V1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SM2P256V1_FE_INTS; + } + } + + return new SM2P256V1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat256.Create(); + SM2P256V1Field.Random(r, x); + return new SM2P256V1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat256.Create(); + SM2P256V1Field.RandomMult(r, x); + return new SM2P256V1FieldElement(x); + } + + private class SM2P256V1LookupTable + : AbstractECLookupTable + { + private readonly SM2P256V1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SM2P256V1LookupTable(SM2P256V1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SM2P256V1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SM2P256V1_FE_INTS + j] & MASK; + } + + pos += (SM2P256V1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = index * SM2P256V1_FE_INTS * 2; + + for (int j = 0; j < SM2P256V1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SM2P256V1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SM2P256V1FieldElement(x), new SM2P256V1FieldElement(y), SM2P256V1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs.meta new file mode 100644 index 00000000..0244fe05 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6a8d7e07e8d1c8469a394ff8a7e56b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs new file mode 100644 index 00000000..640a0a77 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs @@ -0,0 +1,349 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM +{ + internal class SM2P256V1Field + { + // 2^256 - 2^224 - 2^96 + 2^64 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFE }; + private static readonly uint[] PExt = new uint[]{ 00000001, 0x00000000, 0xFFFFFFFE, 0x00000001, 0x00000001, + 0xFFFFFFFE, 0x00000000, 0x00000002, 0xFFFFFFFE, 0xFFFFFFFD, 0x00000003, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, + 0x00000000, 0xFFFFFFFE }; + private const uint P7 = 0xFFFFFFFE; + private const uint PExt15 = 0xFFFFFFFE; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat256.Add(x, y, z); + if (c != 0 || (z[7] >= P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(16, xx, yy, zz); + if (c != 0 || (zz[15] >= PExt15 && Nat.Gte(16, zz, PExt))) + { + Nat.SubFrom(16, PExt, zz); + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(8, x, z); + if (c != 0 || (z[7] >= P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(256, x); + if (z[7] >= P7 && Nat256.Gte(z, P)) + { + Nat256.SubFrom(P, z); + } + return z; + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(8, x, 0, z); + } + else + { + uint c = Nat256.Add(x, P, z); + Nat.ShiftDownBit(8, z, c); + } + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 8; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat256.MulAddTo(x, y, zz); + if (c != 0 || (zz[15] >= PExt15 && Nat.Gte(16, zz, PExt))) + { + Nat.SubFrom(16, PExt, zz); + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat256.Sub(P, P, z); + } + else + { + Nat256.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[8 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 8); + } + while (0 == Nat.LessThan(8, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + long xx08 = xx[8], xx09 = xx[9], xx10 = xx[10], xx11 = xx[11]; + long xx12 = xx[12], xx13 = xx[13], xx14 = xx[14], xx15 = xx[15]; + + long t0 = xx08 + xx09; + long t1 = xx10 + xx11; + long t2 = xx12 + xx15; + long t3 = xx13 + xx14; + long t4 = t3 + (xx15 << 1); + + long ts = t0 + t3; + long tt = t1 + t2 + ts; + + long cc = 0; + cc += (long)xx[0] + tt + xx13 + xx14 + xx15; + z[0] = (uint)cc; + cc >>= 32; + cc += (long)xx[1] + tt - xx08 + xx14 + xx15; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)xx[2] - ts; + z[2] = (uint)cc; + cc >>= 32; + cc += (long)xx[3] + tt - xx09 - xx10 + xx13; + z[3] = (uint)cc; + cc >>= 32; + cc += (long)xx[4] + tt - t1 - xx08 + xx14; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)xx[5] + t4 + xx10; + z[5] = (uint)cc; + cc >>= 32; + cc += (long)xx[6] + xx11 + xx14 + xx15; + z[6] = (uint)cc; + cc >>= 32; + cc += (long)xx[7] + tt + t4 + xx12; + z[7] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc >= 0); + + Reduce32((uint)cc, z); + } + + public static void Reduce32(uint x, uint[] z) + { + long cc = 0; + + if (x != 0) + { + long xx08 = x; + + cc += (long)z[0] + xx08; + z[0] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[1]; + z[1] = (uint)cc; + cc >>= 32; + } + cc += (long)z[2] - xx08; + z[2] = (uint)cc; + cc >>= 32; + cc += (long)z[3] + xx08; + z[3] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[4]; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)z[5]; + z[5] = (uint)cc; + cc >>= 32; + cc += (long)z[6]; + z[6] = (uint)cc; + cc >>= 32; + } + cc += (long)z[7] + xx08; + z[7] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc == 0 || cc == 1); + } + + if (cc != 0 || (z[7] >= P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat256.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat256.Sub(x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(16, xx, yy, zz); + if (c != 0) + { + Nat.AddTo(16, PExt, zz); + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(8, x, 0, z); + if (c != 0 || (z[7] >= P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + } + c += (long)z[2] - 1; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] + 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6]; + z[6] = (uint)c; + c >>= 32; + } + c += (long)z[7] + 1; + z[7] = (uint)c; + //c >>= 32; + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + } + c += (long)z[2] + 1; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6]; + z[6] = (uint)c; + c >>= 32; + } + c += (long)z[7] - 1; + z[7] = (uint)c; + //c >>= 32; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs.meta new file mode 100644 index 00000000..d3abfb40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 641e3afe0dc583148b27346717c6c185 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs new file mode 100644 index 00000000..beefed51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs @@ -0,0 +1,216 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM +{ + internal class SM2P256V1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFF")); + + protected internal readonly uint[] x; + + public SM2P256V1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SM2P256V1FieldElement", "x"); + + this.x = SM2P256V1Field.FromBigInteger(x); + } + + public SM2P256V1FieldElement() + { + this.x = Nat256.Create(); + } + + protected internal SM2P256V1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat256.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat256.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat256.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SM2P256V1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Add(x, ((SM2P256V1FieldElement)b).x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat256.Create(); + SM2P256V1Field.AddOne(x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Subtract(x, ((SM2P256V1FieldElement)b).x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Multiply(x, ((SM2P256V1FieldElement)b).x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat256.Create(); + SM2P256V1Field.Inv(((SM2P256V1FieldElement)b).x, z); + SM2P256V1Field.Multiply(z, x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Negate(x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Square(x, z); + return new SM2P256V1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat256.Create(); + SM2P256V1Field.Inv(x, z); + return new SM2P256V1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^254 - 2^222 - 2^94 + 2^62 + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 31 1s } { 1 0s } { 128 1s } { 31 0s } { 1 1s } { 62 0s } + * + * We use an addition chain for the beginning: [1], 2, 3, 6, 12, [24], 30, [31] + */ + + uint[] x1 = this.x; + if (Nat256.IsZero(x1) || Nat256.IsOne(x1)) + { + return this; + } + + uint[] x2 = Nat256.Create(); + SM2P256V1Field.Square(x1, x2); + SM2P256V1Field.Multiply(x2, x1, x2); + uint[] x4 = Nat256.Create(); + SM2P256V1Field.SquareN(x2, 2, x4); + SM2P256V1Field.Multiply(x4, x2, x4); + uint[] x6 = Nat256.Create(); + SM2P256V1Field.SquareN(x4, 2, x6); + SM2P256V1Field.Multiply(x6, x2, x6); + uint[] x12 = x2; + SM2P256V1Field.SquareN(x6, 6, x12); + SM2P256V1Field.Multiply(x12, x6, x12); + uint[] x24 = Nat256.Create(); + SM2P256V1Field.SquareN(x12, 12, x24); + SM2P256V1Field.Multiply(x24, x12, x24); + uint[] x30 = x12; + SM2P256V1Field.SquareN(x24, 6, x30); + SM2P256V1Field.Multiply(x30, x6, x30); + uint[] x31 = x6; + SM2P256V1Field.Square(x30, x31); + SM2P256V1Field.Multiply(x31, x1, x31); + + uint[] t1 = x24; + SM2P256V1Field.SquareN(x31, 31, t1); + + uint[] x62 = x30; + SM2P256V1Field.Multiply(t1, x31, x62); + + SM2P256V1Field.SquareN(t1, 32, t1); + SM2P256V1Field.Multiply(t1, x62, t1); + SM2P256V1Field.SquareN(t1, 62, t1); + SM2P256V1Field.Multiply(t1, x62, t1); + SM2P256V1Field.SquareN(t1, 4, t1); + SM2P256V1Field.Multiply(t1, x4, t1); + SM2P256V1Field.SquareN(t1, 32, t1); + SM2P256V1Field.Multiply(t1, x1, t1); + SM2P256V1Field.SquareN(t1, 62, t1); + + uint[] t2 = x4; + SM2P256V1Field.Square(t1, t2); + + return Nat256.Eq(x1, t2) ? new SM2P256V1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SM2P256V1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SM2P256V1FieldElement); + } + + public virtual bool Equals(SM2P256V1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 8); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs.meta new file mode 100644 index 00000000..b1f43f64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 78e1ffe95a089cd41bcf8fd1fbde9440 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs new file mode 100644 index 00000000..a69ee0cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.GM +{ + internal class SM2P256V1Point + : AbstractFpPoint + { + internal SM2P256V1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SM2P256V1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SM2P256V1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SM2P256V1FieldElement X1 = (SM2P256V1FieldElement)this.RawXCoord, Y1 = (SM2P256V1FieldElement)this.RawYCoord; + SM2P256V1FieldElement X2 = (SM2P256V1FieldElement)b.RawXCoord, Y2 = (SM2P256V1FieldElement)b.RawYCoord; + + SM2P256V1FieldElement Z1 = (SM2P256V1FieldElement)this.RawZCoords[0]; + SM2P256V1FieldElement Z2 = (SM2P256V1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat256.CreateExt(); + uint[] t2 = Nat256.Create(); + uint[] t3 = Nat256.Create(); + uint[] t4 = Nat256.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SM2P256V1Field.Square(Z1.x, S2); + + U2 = t2; + SM2P256V1Field.Multiply(S2, X2.x, U2); + + SM2P256V1Field.Multiply(S2, Z1.x, S2); + SM2P256V1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SM2P256V1Field.Square(Z2.x, S1); + + U1 = tt1; + SM2P256V1Field.Multiply(S1, X1.x, U1); + + SM2P256V1Field.Multiply(S1, Z2.x, S1); + SM2P256V1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat256.Create(); + SM2P256V1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SM2P256V1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat256.IsZero(H)) + { + if (Nat256.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SM2P256V1Field.Square(H, HSquared); + + uint[] G = Nat256.Create(); + SM2P256V1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SM2P256V1Field.Multiply(HSquared, U1, V); + + SM2P256V1Field.Negate(G, G); + Nat256.Mul(S1, G, tt1); + + c = Nat256.AddBothTo(V, V, G); + SM2P256V1Field.Reduce32(c, G); + + SM2P256V1FieldElement X3 = new SM2P256V1FieldElement(t4); + SM2P256V1Field.Square(R, X3.x); + SM2P256V1Field.Subtract(X3.x, G, X3.x); + + SM2P256V1FieldElement Y3 = new SM2P256V1FieldElement(G); + SM2P256V1Field.Subtract(V, X3.x, Y3.x); + SM2P256V1Field.MultiplyAddToExt(Y3.x, R, tt1); + SM2P256V1Field.Reduce(tt1, Y3.x); + + SM2P256V1FieldElement Z3 = new SM2P256V1FieldElement(H); + if (!Z1IsOne) + { + SM2P256V1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SM2P256V1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[]{ Z3 }; + + return new SM2P256V1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SM2P256V1FieldElement Y1 = (SM2P256V1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SM2P256V1FieldElement X1 = (SM2P256V1FieldElement)this.RawXCoord, Z1 = (SM2P256V1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat256.Create(); + uint[] t2 = Nat256.Create(); + + uint[] Y1Squared = Nat256.Create(); + SM2P256V1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat256.Create(); + SM2P256V1Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SM2P256V1Field.Square(Z1.x, Z1Squared); + } + + SM2P256V1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SM2P256V1Field.Add(X1.x, Z1Squared, M); + SM2P256V1Field.Multiply(M, t1, M); + c = Nat256.AddBothTo(M, M, M); + SM2P256V1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SM2P256V1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(8, S, 2, 0); + SM2P256V1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(8, T, 3, 0, t1); + SM2P256V1Field.Reduce32(c, t1); + + SM2P256V1FieldElement X3 = new SM2P256V1FieldElement(T); + SM2P256V1Field.Square(M, X3.x); + SM2P256V1Field.Subtract(X3.x, S, X3.x); + SM2P256V1Field.Subtract(X3.x, S, X3.x); + + SM2P256V1FieldElement Y3 = new SM2P256V1FieldElement(S); + SM2P256V1Field.Subtract(S, X3.x, Y3.x); + SM2P256V1Field.Multiply(Y3.x, M, Y3.x); + SM2P256V1Field.Subtract(Y3.x, t1, Y3.x); + + SM2P256V1FieldElement Z3 = new SM2P256V1FieldElement(M); + SM2P256V1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SM2P256V1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SM2P256V1Point(curve, X3, Y3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SM2P256V1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs.meta new file mode 100644 index 00000000..88343e46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9b1d26c8aa2f6d74785ce58e201217f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/gm/SM2P256V1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec.meta new file mode 100644 index 00000000..8c8a5843 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 1ec1640b499c9e044a1564cdadc1975c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs new file mode 100644 index 00000000..7b9438c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP128R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP128R1FieldElement.Q; + + private const int SECP128R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP128R1_FE_INTS = 4; + private static readonly ECFieldElement[] SECP128R1_AFFINE_ZS = new ECFieldElement[] { new SecP128R1FieldElement(BigInteger.One) }; + + protected readonly SecP128R1Point m_infinity; + + public SecP128R1Curve() + : base(q) + { + this.m_infinity = new SecP128R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("E87579C11079F43DD824993C2CEE5ED3"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFE0000000075A30D1B9038A115")); + this.m_cofactor = BigInteger.One; + + this.m_coord = SECP128R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP128R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP128R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP128R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP128R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP128R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat128.Copy(((SecP128R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP128R1_FE_INTS; + Nat128.Copy(((SecP128R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP128R1_FE_INTS; + } + } + + return new SecP128R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat128.Create(); + SecP128R1Field.Random(r, x); + return new SecP128R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat128.Create(); + SecP128R1Field.RandomMult(r, x); + return new SecP128R1FieldElement(x); + } + + private class SecP128R1LookupTable + : AbstractECLookupTable + { + private readonly SecP128R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP128R1LookupTable(SecP128R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat128.Create(), y = Nat128.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP128R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP128R1_FE_INTS + j] & MASK; + } + + pos += (SECP128R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat128.Create(), y = Nat128.Create(); + int pos = index * SECP128R1_FE_INTS * 2; + + for (int j = 0; j < SECP128R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP128R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP128R1FieldElement(x), new SecP128R1FieldElement(y), SECP128R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs.meta new file mode 100644 index 00000000..496fab69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 89445e594db6ebf48a2bc80814ac22a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs new file mode 100644 index 00000000..1c143561 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs @@ -0,0 +1,265 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP128R1Field + { + // 2^128 - 2^97 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFD }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0x00000000, 0x00000000, 0x00000004, 0xFFFFFFFE, + 0xFFFFFFFF, 0x00000003, 0xFFFFFFFC }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFB, + 0x00000001, 0x00000000, 0xFFFFFFFC, 0x00000003 }; + private const uint P3 = 0xFFFFFFFD; + private const uint PExt7 = 0xFFFFFFFC; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat128.Add(x, y, z); + if (c != 0 || (z[3] >= P3 && Nat128.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat256.Add(xx, yy, zz); + if (c != 0 || (zz[7] >= PExt7 && Nat256.Gte(zz, PExt))) + { + Nat.AddTo(PExtInv.Length, PExtInv, zz); + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(4, x, z); + if (c != 0 || (z[3] >= P3 && Nat128.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(128, x); + if (z[3] >= P3 && Nat128.Gte(z, P)) + { + Nat128.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(4, x, 0, z); + } + else + { + uint c = Nat128.Add(x, P, z); + Nat.ShiftDownBit(4, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 4; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat128.CreateExt(); + Nat128.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat128.MulAddTo(x, y, zz); + if (c != 0 || (zz[7] >= PExt7 && Nat256.Gte(zz, PExt))) + { + Nat.AddTo(PExtInv.Length, PExtInv, zz); + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat128.Sub(P, P, z); + } + else + { + Nat128.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[4 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 4); + } + while (0 == Nat.LessThan(4, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3]; + ulong x4 = xx[4], x5 = xx[5], x6 = xx[6], x7 = xx[7]; + + x3 += x7; x6 += (x7 << 1); + x2 += x6; x5 += (x6 << 1); + x1 += x5; x4 += (x5 << 1); + x0 += x4; x3 += (x4 << 1); + + z[0] = (uint)x0; x1 += (x0 >> 32); + z[1] = (uint)x1; x2 += (x1 >> 32); + z[2] = (uint)x2; x3 += (x2 >> 32); + z[3] = (uint)x3; + + Reduce32((uint)(x3 >> 32), z); + } + + public static void Reduce32(uint x, uint[] z) + { + while (x != 0) + { + ulong c, x4 = x; + + c = (ulong)z[0] + x4; + z[0] = (uint)c; c >>= 32; + if (c != 0) + { + c += (ulong)z[1]; + z[1] = (uint)c; c >>= 32; + c += (ulong)z[2]; + z[2] = (uint)c; c >>= 32; + } + c += (ulong)z[3] + (x4 << 1); + z[3] = (uint)c; c >>= 32; + + Debug.Assert(c >= 0 && c <= 2); + + x = (uint)c; + } + + if (z[3] >= P3 && Nat128.Gte(z, P)) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat128.CreateExt(); + Nat128.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat128.CreateExt(); + Nat128.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat128.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat128.Sub(x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(10, xx, yy, zz); + if (c != 0) + { + Nat.SubFrom(PExtInv.Length, PExtInv, zz); + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(4, x, 0, z); + if (c != 0 || (z[3] >= P3 && Nat128.Gte(z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; c >>= 32; + } + c += (long)z[3] + 2; + z[3] = (uint)c; + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; c >>= 32; + } + c += (long)z[3] - 2; + z[3] = (uint)c; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs.meta new file mode 100644 index 00000000..2f95ee1c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8d3cfee2e6a54024a900a084075280c8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs new file mode 100644 index 00000000..43fcfbc7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs @@ -0,0 +1,203 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP128R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF")); + + protected internal readonly uint[] x; + + public SecP128R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP128R1FieldElement", "x"); + + this.x = SecP128R1Field.FromBigInteger(x); + } + + public SecP128R1FieldElement() + { + this.x = Nat128.Create(); + } + + protected internal SecP128R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat128.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat128.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat128.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat128.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP128R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat128.Create(); + SecP128R1Field.Add(x, ((SecP128R1FieldElement)b).x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat128.Create(); + SecP128R1Field.AddOne(x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat128.Create(); + SecP128R1Field.Subtract(x, ((SecP128R1FieldElement)b).x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat128.Create(); + SecP128R1Field.Multiply(x, ((SecP128R1FieldElement)b).x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + // return multiply(b.invert()); + uint[] z = Nat128.Create(); + SecP128R1Field.Inv(((SecP128R1FieldElement)b).x, z); + SecP128R1Field.Multiply(z, x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat128.Create(); + SecP128R1Field.Negate(x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat128.Create(); + SecP128R1Field.Square(x, z); + return new SecP128R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat128.Create(); + SecP128R1Field.Inv(x, z); + return new SecP128R1FieldElement(z); + } + + // D.1.4 91 + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^126 - 2^95 + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 31 1s } { 95 0s } + * + * Therefore we need an addition chain containing 31 (the length of the repunit) We use: + * 1, 2, 4, 8, 10, 20, 30, [31] + */ + + uint[] x1 = this.x; + if (Nat128.IsZero(x1) || Nat128.IsOne(x1)) + return this; + + uint[] x2 = Nat128.Create(); + SecP128R1Field.Square(x1, x2); + SecP128R1Field.Multiply(x2, x1, x2); + uint[] x4 = Nat128.Create(); + SecP128R1Field.SquareN(x2, 2, x4); + SecP128R1Field.Multiply(x4, x2, x4); + uint[] x8 = Nat128.Create(); + SecP128R1Field.SquareN(x4, 4, x8); + SecP128R1Field.Multiply(x8, x4, x8); + uint[] x10 = x4; + SecP128R1Field.SquareN(x8, 2, x10); + SecP128R1Field.Multiply(x10, x2, x10); + uint[] x20 = x2; + SecP128R1Field.SquareN(x10, 10, x20); + SecP128R1Field.Multiply(x20, x10, x20); + uint[] x30 = x8; + SecP128R1Field.SquareN(x20, 10, x30); + SecP128R1Field.Multiply(x30, x10, x30); + uint[] x31 = x10; + SecP128R1Field.Square(x30, x31); + SecP128R1Field.Multiply(x31, x1, x31); + + uint[] t1 = x31; + SecP128R1Field.SquareN(t1, 95, t1); + + uint[] t2 = x30; + SecP128R1Field.Square(t1, t2); + + return Nat128.Eq(x1, t2) ? new SecP128R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP128R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP128R1FieldElement); + } + + public virtual bool Equals(SecP128R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat128.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs.meta new file mode 100644 index 00000000..04e4e8a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69c28fc8275118743a6303f5213bd5ef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs new file mode 100644 index 00000000..efc6fab1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP128R1Point + : AbstractFpPoint + { + internal SecP128R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP128R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP128R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP128R1FieldElement X1 = (SecP128R1FieldElement)this.RawXCoord, Y1 = (SecP128R1FieldElement)this.RawYCoord; + SecP128R1FieldElement X2 = (SecP128R1FieldElement)b.RawXCoord, Y2 = (SecP128R1FieldElement)b.RawYCoord; + + SecP128R1FieldElement Z1 = (SecP128R1FieldElement)this.RawZCoords[0]; + SecP128R1FieldElement Z2 = (SecP128R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat128.CreateExt(); + uint[] t2 = Nat128.Create(); + uint[] t3 = Nat128.Create(); + uint[] t4 = Nat128.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP128R1Field.Square(Z1.x, S2); + + U2 = t2; + SecP128R1Field.Multiply(S2, X2.x, U2); + + SecP128R1Field.Multiply(S2, Z1.x, S2); + SecP128R1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP128R1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP128R1Field.Multiply(S1, X1.x, U1); + + SecP128R1Field.Multiply(S1, Z2.x, S1); + SecP128R1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat128.Create(); + SecP128R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP128R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat128.IsZero(H)) + { + if (Nat128.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP128R1Field.Square(H, HSquared); + + uint[] G = Nat128.Create(); + SecP128R1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP128R1Field.Multiply(HSquared, U1, V); + + SecP128R1Field.Negate(G, G); + Nat128.Mul(S1, G, tt1); + + c = Nat128.AddBothTo(V, V, G); + SecP128R1Field.Reduce32(c, G); + + SecP128R1FieldElement X3 = new SecP128R1FieldElement(t4); + SecP128R1Field.Square(R, X3.x); + SecP128R1Field.Subtract(X3.x, G, X3.x); + + SecP128R1FieldElement Y3 = new SecP128R1FieldElement(G); + SecP128R1Field.Subtract(V, X3.x, Y3.x); + SecP128R1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP128R1Field.Reduce(tt1, Y3.x); + + SecP128R1FieldElement Z3 = new SecP128R1FieldElement(H); + if (!Z1IsOne) + { + SecP128R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP128R1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[]{ Z3 }; + + return new SecP128R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP128R1FieldElement Y1 = (SecP128R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP128R1FieldElement X1 = (SecP128R1FieldElement)this.RawXCoord, Z1 = (SecP128R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat128.Create(); + uint[] t2 = Nat128.Create(); + + uint[] Y1Squared = Nat128.Create(); + SecP128R1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat128.Create(); + SecP128R1Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP128R1Field.Square(Z1.x, Z1Squared); + } + + SecP128R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP128R1Field.Add(X1.x, Z1Squared, M); + SecP128R1Field.Multiply(M, t1, M); + c = Nat128.AddBothTo(M, M, M); + SecP128R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP128R1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(4, S, 2, 0); + SecP128R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(4, T, 3, 0, t1); + SecP128R1Field.Reduce32(c, t1); + + SecP128R1FieldElement X3 = new SecP128R1FieldElement(T); + SecP128R1Field.Square(M, X3.x); + SecP128R1Field.Subtract(X3.x, S, X3.x); + SecP128R1Field.Subtract(X3.x, S, X3.x); + + SecP128R1FieldElement Y3 = new SecP128R1FieldElement(S); + SecP128R1Field.Subtract(S, X3.x, Y3.x); + SecP128R1Field.Multiply(Y3.x, M, Y3.x); + SecP128R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP128R1FieldElement Z3 = new SecP128R1FieldElement(M); + SecP128R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP128R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP128R1Point(curve, X3, Y3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between twicePlus and threeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP128R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs.meta new file mode 100644 index 00000000..c04f5a93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ede02f0086365e54584f6ee4a1ae2434 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP128R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs new file mode 100644 index 00000000..dc32a8ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs @@ -0,0 +1,172 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160K1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP160R2FieldElement.Q; + + private const int SECP160K1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP160K1_FE_INTS = 5; + private static readonly ECFieldElement[] SECP160K1_AFFINE_ZS = new ECFieldElement[] { new SecP160R2FieldElement(BigInteger.One) }; + + protected readonly SecP160K1Point m_infinity; + + public SecP160K1Curve() + : base(q) + { + this.m_infinity = new SecP160K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.ValueOf(7)); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0100000000000000000001B8FA16DFAB9ACA16B6B3")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP160K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP160K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP160R2FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP160K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP160K1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP160K1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat160.Copy(((SecP160R2FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP160K1_FE_INTS; + Nat160.Copy(((SecP160R2FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP160K1_FE_INTS; + } + } + + return new SecP160K1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R2Field.Random(r, x); + return new SecP160R2FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R2Field.RandomMult(r, x); + return new SecP160R2FieldElement(x); + } + + private class SecP160K1LookupTable + : AbstractECLookupTable + { + private readonly SecP160K1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP160K1LookupTable(SecP160K1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP160K1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP160K1_FE_INTS + j] & MASK; + } + + pos += (SECP160K1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = index * SECP160K1_FE_INTS * 2; + + for (int j = 0; j < SECP160K1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP160K1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP160R2FieldElement(x), new SecP160R2FieldElement(y), SECP160K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs.meta new file mode 100644 index 00000000..6add6c4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea8333585039e43408c80fccb422d442 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs new file mode 100644 index 00000000..f49f3ab8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs @@ -0,0 +1,238 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160K1Point + : AbstractFpPoint + { + internal SecP160K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP160K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP160K1Point(null, AffineXCoord, AffineYCoord); + } + + // B.3 pg 62 + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP160R2FieldElement X1 = (SecP160R2FieldElement)this.RawXCoord, Y1 = (SecP160R2FieldElement)this.RawYCoord; + SecP160R2FieldElement X2 = (SecP160R2FieldElement)b.RawXCoord, Y2 = (SecP160R2FieldElement)b.RawYCoord; + + SecP160R2FieldElement Z1 = (SecP160R2FieldElement)this.RawZCoords[0]; + SecP160R2FieldElement Z2 = (SecP160R2FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat160.CreateExt(); + uint[] t2 = Nat160.Create(); + uint[] t3 = Nat160.Create(); + uint[] t4 = Nat160.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP160R2Field.Square(Z1.x, S2); + + U2 = t2; + SecP160R2Field.Multiply(S2, X2.x, U2); + + SecP160R2Field.Multiply(S2, Z1.x, S2); + SecP160R2Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP160R2Field.Square(Z2.x, S1); + + U1 = tt1; + SecP160R2Field.Multiply(S1, X1.x, U1); + + SecP160R2Field.Multiply(S1, Z2.x, S1); + SecP160R2Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat160.Create(); + SecP160R2Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP160R2Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat160.IsZero(H)) + { + if (Nat160.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP160R2Field.Square(H, HSquared); + + uint[] G = Nat160.Create(); + SecP160R2Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP160R2Field.Multiply(HSquared, U1, V); + + SecP160R2Field.Negate(G, G); + Nat160.Mul(S1, G, tt1); + + c = Nat160.AddBothTo(V, V, G); + SecP160R2Field.Reduce32(c, G); + + SecP160R2FieldElement X3 = new SecP160R2FieldElement(t4); + SecP160R2Field.Square(R, X3.x); + SecP160R2Field.Subtract(X3.x, G, X3.x); + + SecP160R2FieldElement Y3 = new SecP160R2FieldElement(G); + SecP160R2Field.Subtract(V, X3.x, Y3.x); + SecP160R2Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP160R2Field.Reduce(tt1, Y3.x); + + SecP160R2FieldElement Z3 = new SecP160R2FieldElement(H); + if (!Z1IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP160K1Point(curve, X3, Y3, zs); + } + + // B.3 pg 62 + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP160R2FieldElement Y1 = (SecP160R2FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP160R2FieldElement X1 = (SecP160R2FieldElement)this.RawXCoord, Z1 = (SecP160R2FieldElement)this.RawZCoords[0]; + + uint c; + + uint[] Y1Squared = Nat160.Create(); + SecP160R2Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat160.Create(); + SecP160R2Field.Square(Y1Squared, T); + + uint[] M = Nat160.Create(); + SecP160R2Field.Square(X1.x, M); + c = Nat160.AddBothTo(M, M, M); + SecP160R2Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP160R2Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(5, S, 2, 0); + SecP160R2Field.Reduce32(c, S); + + uint[] t1 = Nat160.Create(); + c = Nat.ShiftUpBits(5, T, 3, 0, t1); + SecP160R2Field.Reduce32(c, t1); + + SecP160R2FieldElement X3 = new SecP160R2FieldElement(T); + SecP160R2Field.Square(M, X3.x); + SecP160R2Field.Subtract(X3.x, S, X3.x); + SecP160R2Field.Subtract(X3.x, S, X3.x); + + SecP160R2FieldElement Y3 = new SecP160R2FieldElement(S); + SecP160R2Field.Subtract(S, X3.x, Y3.x); + SecP160R2Field.Multiply(Y3.x, M, Y3.x); + SecP160R2Field.Subtract(Y3.x, t1, Y3.x); + + SecP160R2FieldElement Z3 = new SecP160R2FieldElement(M); + SecP160R2Field.Twice(Y1.x, Z3.x); + if (!Z1.IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP160K1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and threeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP160K1Point(Curve, this.RawXCoord, this.RawYCoord.Negate(), this.RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs.meta new file mode 100644 index 00000000..38448550 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 751987f4dd7ab91428967217a99fe3eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs new file mode 100644 index 00000000..452b2072 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP160R1FieldElement.Q; + + private const int SECP160R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP160R1_FE_INTS = 5; + private static readonly ECFieldElement[] SECP160R1_AFFINE_ZS = new ECFieldElement[] { new SecP160R1FieldElement(BigInteger.One) }; + + protected readonly SecP160R1Point m_infinity; + + public SecP160R1Curve() + : base(q) + { + this.m_infinity = new SecP160R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0100000000000000000001F4C8F927AED3CA752257")); + this.m_cofactor = BigInteger.One; + + this.m_coord = SECP160R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP160R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP160R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP160R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP160R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP160R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat160.Copy(((SecP160R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP160R1_FE_INTS; + Nat160.Copy(((SecP160R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP160R1_FE_INTS; + } + } + + return new SecP160R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R1Field.Random(r, x); + return new SecP160R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R1Field.RandomMult(r, x); + return new SecP160R1FieldElement(x); + } + + private class SecP160R1LookupTable + : AbstractECLookupTable + { + private readonly SecP160R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP160R1LookupTable(SecP160R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat160.Create(), y = Nat160.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP160R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP160R1_FE_INTS + j] & MASK; + } + + pos += (SECP160R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat160.Create(), y = Nat160.Create(); + int pos = index * SECP160R1_FE_INTS * 2; + + for (int j = 0; j < SECP160R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP160R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP160R1FieldElement(x), new SecP160R1FieldElement(y), SECP160R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs.meta new file mode 100644 index 00000000..1308e4df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2470d39d565196048b3caa3c8e57defc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs new file mode 100644 index 00000000..156eccac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs @@ -0,0 +1,228 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R1Field + { + // 2^160 - 2^31 - 1 + internal static readonly uint[] P = new uint[]{ 0x7FFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0x40000001, 0x00000000, 0x00000000, 0x00000000, + 0xFFFFFFFE, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFFFFFFF, 0xBFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0x00000001, 0x00000001 }; + private const uint P4 = 0xFFFFFFFF; + private const uint PExt9 = 0xFFFFFFFF; + private const uint PInv = 0x80000001; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat160.Add(x, y, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.AddWordTo(5, PInv, z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(10, xx, yy, zz); + if (c != 0 || (zz[9] == PExt9 && Nat.Gte(10, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(10, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(5, x, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.AddWordTo(5, PInv, z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(160, x); + if (z[4] == P4 && Nat160.Gte(z, P)) + { + Nat160.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(5, x, 0, z); + } + else + { + uint c = Nat160.Add(x, P, z); + Nat.ShiftDownBit(5, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 5; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat160.CreateExt(); + Nat160.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat160.MulAddTo(x, y, zz); + if (c != 0 || (zz[9] == PExt9 && Nat.Gte(10, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(10, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat160.Sub(P, P, z); + } + else + { + Nat160.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[5 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 5); + } + while (0 == Nat.LessThan(5, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong x5 = xx[5], x6 = xx[6], x7 = xx[7], x8 = xx[8], x9 = xx[9]; + + ulong c = 0; + c += (ulong)xx[0] + x5 + (x5 << 31); + z[0] = (uint)c; c >>= 32; + c += (ulong)xx[1] + x6 + (x6 << 31); + z[1] = (uint)c; c >>= 32; + c += (ulong)xx[2] + x7 + (x7 << 31); + z[2] = (uint)c; c >>= 32; + c += (ulong)xx[3] + x8 + (x8 << 31); + z[3] = (uint)c; c >>= 32; + c += (ulong)xx[4] + x9 + (x9 << 31); + z[4] = (uint)c; c >>= 32; + + Debug.Assert(c >> 32 == 0); + + Reduce32((uint)c, z); + } + + public static void Reduce32(uint x, uint[] z) + { + if ((x != 0 && Nat160.MulWordsAdd(PInv, x, z, 0) != 0) + || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.AddWordTo(5, PInv, z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat160.CreateExt(); + Nat160.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat160.CreateExt(); + Nat160.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat160.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat160.Sub(x, y, z); + if (c != 0) + { + Nat.SubWordFrom(5, PInv, z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(10, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(10, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(5, x, 0, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.AddWordTo(5, PInv, z); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs.meta new file mode 100644 index 00000000..fc8fbd53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 841753f0e6888334aab3a0b0c9d7a34f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs new file mode 100644 index 00000000..6e3e94e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs @@ -0,0 +1,208 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF")); + + protected internal readonly uint[] x; + + public SecP160R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP160R1FieldElement", "x"); + + this.x = SecP160R1Field.FromBigInteger(x); + } + + public SecP160R1FieldElement() + { + this.x = Nat160.Create(); + } + + protected internal SecP160R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat160.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat160.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat160.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat160.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP160R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R1Field.Add(x, ((SecP160R1FieldElement)b).x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat160.Create(); + SecP160R1Field.AddOne(x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R1Field.Subtract(x, ((SecP160R1FieldElement)b).x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R1Field.Multiply(x, ((SecP160R1FieldElement)b).x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + // return multiply(b.invert()); + uint[] z = Nat160.Create(); + SecP160R1Field.Inv(((SecP160R1FieldElement)b).x, z); + SecP160R1Field.Multiply(z, x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat160.Create(); + SecP160R1Field.Negate(x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat160.Create(); + SecP160R1Field.Square(x, z); + return new SecP160R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat160.Create(); + SecP160R1Field.Inv(x, z); + return new SecP160R1FieldElement(z); + } + + // D.1.4 91 + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^158 - 2^29 + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 129 1s } { 29 0s } + * + * Therefore we need an addition chain containing 129 (the length of the repunit) We use: + * 1, 2, 4, 8, 16, 32, 64, 128, [129] + */ + + uint[] x1 = this.x; + if (Nat160.IsZero(x1) || Nat160.IsOne(x1)) + { + return this; + } + + uint[] x2 = Nat160.Create(); + SecP160R1Field.Square(x1, x2); + SecP160R1Field.Multiply(x2, x1, x2); + uint[] x4 = Nat160.Create(); + SecP160R1Field.SquareN(x2, 2, x4); + SecP160R1Field.Multiply(x4, x2, x4); + uint[] x8 = x2; + SecP160R1Field.SquareN(x4, 4, x8); + SecP160R1Field.Multiply(x8, x4, x8); + uint[] x16 = x4; + SecP160R1Field.SquareN(x8, 8, x16); + SecP160R1Field.Multiply(x16, x8, x16); + uint[] x32 = x8; + SecP160R1Field.SquareN(x16, 16, x32); + SecP160R1Field.Multiply(x32, x16, x32); + uint[] x64 = x16; + SecP160R1Field.SquareN(x32, 32, x64); + SecP160R1Field.Multiply(x64, x32, x64); + uint[] x128 = x32; + SecP160R1Field.SquareN(x64, 64, x128); + SecP160R1Field.Multiply(x128, x64, x128); + uint[] x129 = x64; + SecP160R1Field.Square(x128, x129); + SecP160R1Field.Multiply(x129, x1, x129); + + uint[] t1 = x129; + SecP160R1Field.SquareN(t1, 29, t1); + + uint[] t2 = x128; + SecP160R1Field.Square(t1, t2); + + return Nat160.Eq(x1, t2) ? new SecP160R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP160R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP160R1FieldElement); + } + + public virtual bool Equals(SecP160R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat160.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 5); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs.meta new file mode 100644 index 00000000..1539d5eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: babb04ce52cde9d48a3badbb7728aca0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs new file mode 100644 index 00000000..d68177b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R1Point + : AbstractFpPoint + { + internal SecP160R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP160R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP160R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP160R1FieldElement X1 = (SecP160R1FieldElement)this.RawXCoord, Y1 = (SecP160R1FieldElement)this.RawYCoord; + SecP160R1FieldElement X2 = (SecP160R1FieldElement)b.RawXCoord, Y2 = (SecP160R1FieldElement)b.RawYCoord; + + SecP160R1FieldElement Z1 = (SecP160R1FieldElement)this.RawZCoords[0]; + SecP160R1FieldElement Z2 = (SecP160R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat160.CreateExt(); + uint[] t2 = Nat160.Create(); + uint[] t3 = Nat160.Create(); + uint[] t4 = Nat160.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP160R1Field.Square(Z1.x, S2); + + U2 = t2; + SecP160R1Field.Multiply(S2, X2.x, U2); + + SecP160R1Field.Multiply(S2, Z1.x, S2); + SecP160R1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP160R1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP160R1Field.Multiply(S1, X1.x, U1); + + SecP160R1Field.Multiply(S1, Z2.x, S1); + SecP160R1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat160.Create(); + SecP160R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP160R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat160.IsZero(H)) + { + if (Nat160.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP160R1Field.Square(H, HSquared); + + uint[] G = Nat160.Create(); + SecP160R1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP160R1Field.Multiply(HSquared, U1, V); + + SecP160R1Field.Negate(G, G); + Nat160.Mul(S1, G, tt1); + + c = Nat160.AddBothTo(V, V, G); + SecP160R1Field.Reduce32(c, G); + + SecP160R1FieldElement X3 = new SecP160R1FieldElement(t4); + SecP160R1Field.Square(R, X3.x); + SecP160R1Field.Subtract(X3.x, G, X3.x); + + SecP160R1FieldElement Y3 = new SecP160R1FieldElement(G); + SecP160R1Field.Subtract(V, X3.x, Y3.x); + SecP160R1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP160R1Field.Reduce(tt1, Y3.x); + + SecP160R1FieldElement Z3 = new SecP160R1FieldElement(H); + if (!Z1IsOne) + { + SecP160R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP160R1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[]{ Z3 }; + + return new SecP160R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP160R1FieldElement Y1 = (SecP160R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP160R1FieldElement X1 = (SecP160R1FieldElement)this.RawXCoord, Z1 = (SecP160R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat160.Create(); + uint[] t2 = Nat160.Create(); + + uint[] Y1Squared = Nat160.Create(); + SecP160R1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat160.Create(); + SecP160R1Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP160R1Field.Square(Z1.x, Z1Squared); + } + + SecP160R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP160R1Field.Add(X1.x, Z1Squared, M); + SecP160R1Field.Multiply(M, t1, M); + c = Nat160.AddBothTo(M, M, M); + SecP160R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP160R1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(5, S, 2, 0); + SecP160R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(5, T, 3, 0, t1); + SecP160R1Field.Reduce32(c, t1); + + SecP160R1FieldElement X3 = new SecP160R1FieldElement(T); + SecP160R1Field.Square(M, X3.x); + SecP160R1Field.Subtract(X3.x, S, X3.x); + SecP160R1Field.Subtract(X3.x, S, X3.x); + + SecP160R1FieldElement Y3 = new SecP160R1FieldElement(S); + SecP160R1Field.Subtract(S, X3.x, Y3.x); + SecP160R1Field.Multiply(Y3.x, M, Y3.x); + SecP160R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP160R1FieldElement Z3 = new SecP160R1FieldElement(M); + SecP160R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP160R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP160R1Point(curve, X3, Y3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP160R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs.meta new file mode 100644 index 00000000..cce1e869 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d5257bd5e96b8134cafbdb832c1465f0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs new file mode 100644 index 00000000..d9982684 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R2Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP160R2FieldElement.Q; + + private const int SECP160R2_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP160R2_FE_INTS = 5; + private static readonly ECFieldElement[] SECP160R2_AFFINE_ZS = new ECFieldElement[] { new SecP160R2FieldElement(BigInteger.One) }; + + protected readonly SecP160R2Point m_infinity; + + public SecP160R2Curve() + : base(q) + { + this.m_infinity = new SecP160R2Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC70"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("B4E134D3FB59EB8BAB57274904664D5AF50388BA"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0100000000000000000000351EE786A818F3A1A16B")); + this.m_cofactor = BigInteger.One; + + this.m_coord = SECP160R2_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP160R2Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP160R2FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP160R2Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP160R2Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP160R2_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat160.Copy(((SecP160R2FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP160R2_FE_INTS; + Nat160.Copy(((SecP160R2FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP160R2_FE_INTS; + } + } + + return new SecP160R2LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R2Field.Random(r, x); + return new SecP160R2FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat160.Create(); + SecP160R2Field.RandomMult(r, x); + return new SecP160R2FieldElement(x); + } + + private class SecP160R2LookupTable + : AbstractECLookupTable + { + private readonly SecP160R2Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP160R2LookupTable(SecP160R2Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat160.Create(), y = Nat160.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP160R2_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP160R2_FE_INTS + j] & MASK; + } + + pos += (SECP160R2_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat160.Create(), y = Nat160.Create(); + int pos = index * SECP160R2_FE_INTS * 2; + + for (int j = 0; j < SECP160R2_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP160R2_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP160R2FieldElement(x), new SecP160R2FieldElement(y), SECP160R2_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs.meta new file mode 100644 index 00000000..a1647736 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b6713865f83b41649a4c63d52eae94f6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs new file mode 100644 index 00000000..8298ff2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs @@ -0,0 +1,220 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R2Field + { + // 2^160 - 2^32 - 2^14 - 2^12 - 2^9 - 2^8 - 2^7 - 2^3 - 2^2 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFAC73, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x1B44BBA9, 0x0000A71A, 0x00000001, 0x00000000, 0x00000000, + 0xFFFF58E6, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xE4BB4457, 0xFFFF58E5, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0x0000A719, 0x00000002 }; + private const uint P4 = 0xFFFFFFFF; + private const uint PExt9 = 0xFFFFFFFF; + private const uint PInv33 = 0x538D; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat160.Add(x, y, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.Add33To(5, PInv33, z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(10, xx, yy, zz); + if (c != 0 || (zz[9] == PExt9 && Nat.Gte(10, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(10, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(5, x, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.Add33To(5, PInv33, z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(160, x); + if (z[4] == P4 && Nat160.Gte(z, P)) + { + Nat160.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(5, x, 0, z); + } + else + { + uint c = Nat160.Add(x, P, z); + Nat.ShiftDownBit(5, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 5; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat160.CreateExt(); + Nat160.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat160.MulAddTo(x, y, zz); + if (c != 0 || (zz[9] == PExt9 && Nat.Gte(10, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(10, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat160.Sub(P, P, z); + } + else + { + Nat160.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[5 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 5); + } + while (0 == Nat.LessThan(5, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong cc = Nat160.Mul33Add(PInv33, xx, 5, xx, 0, z, 0); + uint c = Nat160.Mul33DWordAdd(PInv33, cc, z, 0); + + Debug.Assert(c == 0 || c == 1); + + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.Add33To(5, PInv33, z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + if ((x != 0 && Nat160.Mul33WordAdd(PInv33, x, z, 0) != 0) + || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.Add33To(5, PInv33, z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat160.CreateExt(); + Nat160.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat160.CreateExt(); + Nat160.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat160.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat160.Sub(x, y, z); + if (c != 0) + { + Nat.Sub33From(5, PInv33, z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(10, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(10, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(5, x, 0, z); + if (c != 0 || (z[4] == P4 && Nat160.Gte(z, P))) + { + Nat.Add33To(5, PInv33, z); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs.meta new file mode 100644 index 00000000..b2d34eff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2390e73468d24064b83cb935831081b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs new file mode 100644 index 00000000..52edc32a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs @@ -0,0 +1,223 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R2FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73")); + + protected internal readonly uint[] x; + + public SecP160R2FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP160R2FieldElement", "x"); + + this.x = SecP160R2Field.FromBigInteger(x); + } + + public SecP160R2FieldElement() + { + this.x = Nat160.Create(); + } + + protected internal SecP160R2FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat160.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat160.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat160.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat160.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP160R2Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R2Field.Add(x, ((SecP160R2FieldElement)b).x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat160.Create(); + SecP160R2Field.AddOne(x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R2Field.Subtract(x, ((SecP160R2FieldElement)b).x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat160.Create(); + SecP160R2Field.Multiply(x, ((SecP160R2FieldElement)b).x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + // return Multiply(b.invert()); + uint[] z = Nat160.Create(); + SecP160R2Field.Inv(((SecP160R2FieldElement)b).x, z); + SecP160R2Field.Multiply(z, x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat160.Create(); + SecP160R2Field.Negate(x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat160.Create(); + SecP160R2Field.Square(x, z); + return new SecP160R2FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat160.Create(); + SecP160R2Field.Inv(x, z); + return new SecP160R2FieldElement(z); + } + + // D.1.4 91 + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^158 - 2^30 - 2^12 - 2^10 - 2^7 - 2^6 - 2^5 - 2^1 - 2^0 + * + * Breaking up the exponent's binary representation into "repunits", we get: { 127 1s } { 1 + * 0s } { 17 1s } { 1 0s } { 1 1s } { 1 0s } { 2 1s } { 3 0s } { 3 1s } { 1 0s } { 1 1s } + * + * Therefore we need an Addition chain containing 1, 2, 3, 17, 127 (the lengths of the repunits) + * We use: [1], [2], [3], 4, 7, 14, [17], 31, 62, 124, [127] + */ + + uint[] x1 = this.x; + if (Nat160.IsZero(x1) || Nat160.IsOne(x1)) + { + return this; + } + + uint[] x2 = Nat160.Create(); + SecP160R2Field.Square(x1, x2); + SecP160R2Field.Multiply(x2, x1, x2); + uint[] x3 = Nat160.Create(); + SecP160R2Field.Square(x2, x3); + SecP160R2Field.Multiply(x3, x1, x3); + uint[] x4 = Nat160.Create(); + SecP160R2Field.Square(x3, x4); + SecP160R2Field.Multiply(x4, x1, x4); + uint[] x7 = Nat160.Create(); + SecP160R2Field.SquareN(x4, 3, x7); + SecP160R2Field.Multiply(x7, x3, x7); + uint[] x14 = x4; + SecP160R2Field.SquareN(x7, 7, x14); + SecP160R2Field.Multiply(x14, x7, x14); + uint[] x17 = x7; + SecP160R2Field.SquareN(x14, 3, x17); + SecP160R2Field.Multiply(x17, x3, x17); + uint[] x31 = Nat160.Create(); + SecP160R2Field.SquareN(x17, 14, x31); + SecP160R2Field.Multiply(x31, x14, x31); + uint[] x62 = x14; + SecP160R2Field.SquareN(x31, 31, x62); + SecP160R2Field.Multiply(x62, x31, x62); + uint[] x124 = x31; + SecP160R2Field.SquareN(x62, 62, x124); + SecP160R2Field.Multiply(x124, x62, x124); + uint[] x127 = x62; + SecP160R2Field.SquareN(x124, 3, x127); + SecP160R2Field.Multiply(x127, x3, x127); + + uint[] t1 = x127; + SecP160R2Field.SquareN(t1, 18, t1); + SecP160R2Field.Multiply(t1, x17, t1); + SecP160R2Field.SquareN(t1, 2, t1); + SecP160R2Field.Multiply(t1, x1, t1); + SecP160R2Field.SquareN(t1, 3, t1); + SecP160R2Field.Multiply(t1, x2, t1); + SecP160R2Field.SquareN(t1, 6, t1); + SecP160R2Field.Multiply(t1, x3, t1); + SecP160R2Field.SquareN(t1, 2, t1); + SecP160R2Field.Multiply(t1, x1, t1); + + uint[] t2 = x2; + SecP160R2Field.Square(t1, t2); + + return Nat160.Eq(x1, t2) ? new SecP160R2FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP160R2FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP160R2FieldElement); + } + + public virtual bool Equals(SecP160R2FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat160.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 5); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs.meta new file mode 100644 index 00000000..16b607d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6dcbdbdfbeb7864479dc053e9004a4b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs new file mode 100644 index 00000000..f8f6d2fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP160R2Point + : AbstractFpPoint + { + internal SecP160R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP160R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP160R2Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP160R2FieldElement X1 = (SecP160R2FieldElement)this.RawXCoord, Y1 = (SecP160R2FieldElement)this.RawYCoord; + SecP160R2FieldElement X2 = (SecP160R2FieldElement)b.RawXCoord, Y2 = (SecP160R2FieldElement)b.RawYCoord; + + SecP160R2FieldElement Z1 = (SecP160R2FieldElement)this.RawZCoords[0]; + SecP160R2FieldElement Z2 = (SecP160R2FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat160.CreateExt(); + uint[] t2 = Nat160.Create(); + uint[] t3 = Nat160.Create(); + uint[] t4 = Nat160.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP160R2Field.Square(Z1.x, S2); + + U2 = t2; + SecP160R2Field.Multiply(S2, X2.x, U2); + + SecP160R2Field.Multiply(S2, Z1.x, S2); + SecP160R2Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP160R2Field.Square(Z2.x, S1); + + U1 = tt1; + SecP160R2Field.Multiply(S1, X1.x, U1); + + SecP160R2Field.Multiply(S1, Z2.x, S1); + SecP160R2Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat160.Create(); + SecP160R2Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP160R2Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat160.IsZero(H)) + { + if (Nat160.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP160R2Field.Square(H, HSquared); + + uint[] G = Nat160.Create(); + SecP160R2Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP160R2Field.Multiply(HSquared, U1, V); + + SecP160R2Field.Negate(G, G); + Nat160.Mul(S1, G, tt1); + + c = Nat160.AddBothTo(V, V, G); + SecP160R2Field.Reduce32(c, G); + + SecP160R2FieldElement X3 = new SecP160R2FieldElement(t4); + SecP160R2Field.Square(R, X3.x); + SecP160R2Field.Subtract(X3.x, G, X3.x); + + SecP160R2FieldElement Y3 = new SecP160R2FieldElement(G); + SecP160R2Field.Subtract(V, X3.x, Y3.x); + SecP160R2Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP160R2Field.Reduce(tt1, Y3.x); + + SecP160R2FieldElement Z3 = new SecP160R2FieldElement(H); + if (!Z1IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[]{ Z3 }; + + return new SecP160R2Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP160R2FieldElement Y1 = (SecP160R2FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP160R2FieldElement X1 = (SecP160R2FieldElement)this.RawXCoord, Z1 = (SecP160R2FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat160.Create(); + uint[] t2 = Nat160.Create(); + + uint[] Y1Squared = Nat160.Create(); + SecP160R2Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat160.Create(); + SecP160R2Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP160R2Field.Square(Z1.x, Z1Squared); + } + + SecP160R2Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP160R2Field.Add(X1.x, Z1Squared, M); + SecP160R2Field.Multiply(M, t1, M); + c = Nat160.AddBothTo(M, M, M); + SecP160R2Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP160R2Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(5, S, 2, 0); + SecP160R2Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(5, T, 3, 0, t1); + SecP160R2Field.Reduce32(c, t1); + + SecP160R2FieldElement X3 = new SecP160R2FieldElement(T); + SecP160R2Field.Square(M, X3.x); + SecP160R2Field.Subtract(X3.x, S, X3.x); + SecP160R2Field.Subtract(X3.x, S, X3.x); + + SecP160R2FieldElement Y3 = new SecP160R2FieldElement(S); + SecP160R2Field.Subtract(S, X3.x, Y3.x); + SecP160R2Field.Multiply(Y3.x, M, Y3.x); + SecP160R2Field.Subtract(Y3.x, t1, Y3.x); + + SecP160R2FieldElement Z3 = new SecP160R2FieldElement(M); + SecP160R2Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP160R2Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP160R2Point(curve, X3, Y3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP160R2Point(Curve, this.RawXCoord, this.RawYCoord.Negate(), this.RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs.meta new file mode 100644 index 00000000..f418bebc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a4cbae21702094a47bdafac12ade6c28 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP160R2Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs new file mode 100644 index 00000000..c94969bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs @@ -0,0 +1,172 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192K1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP192K1FieldElement.Q; + + private const int SECP192K1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP192K1_FE_INTS = 6; + private static readonly ECFieldElement[] SECP192K1_AFFINE_ZS = new ECFieldElement[] { new SecP192K1FieldElement(BigInteger.One) }; + + protected readonly SecP192K1Point m_infinity; + + public SecP192K1Curve() + : base(q) + { + this.m_infinity = new SecP192K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.ValueOf(3)); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8D")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP192K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP192K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP192K1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP192K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP192K1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP192K1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy(((SecP192K1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP192K1_FE_INTS; + Nat192.Copy(((SecP192K1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP192K1_FE_INTS; + } + } + + return new SecP192K1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat192.Create(); + SecP192K1Field.Random(r, x); + return new SecP192K1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat192.Create(); + SecP192K1Field.RandomMult(r, x); + return new SecP192K1FieldElement(x); + } + + private class SecP192K1LookupTable + : AbstractECLookupTable + { + private readonly SecP192K1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP192K1LookupTable(SecP192K1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat192.Create(), y = Nat192.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP192K1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP192K1_FE_INTS + j] & MASK; + } + + pos += (SECP192K1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat192.Create(), y = Nat192.Create(); + int pos = index * SECP192K1_FE_INTS * 2; + + for (int j = 0; j < SECP192K1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP192K1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP192K1FieldElement(x), new SecP192K1FieldElement(y), SECP192K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs.meta new file mode 100644 index 00000000..45d03402 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 956ec0f59602e03408afd341170ff390 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs new file mode 100644 index 00000000..ddadb34f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs @@ -0,0 +1,221 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192K1Field + { + // 2^192 - 2^32 - 2^12 - 2^8 - 2^7 - 2^6 - 2^3 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFEE37, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x013C4FD1, 0x00002392, 0x00000001, 0x00000000, 0x00000000, + 0x00000000, 0xFFFFDC6E, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xFEC3B02F, 0xFFFFDC6D, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0x00002391, 0x00000002 }; + private const uint P5 = 0xFFFFFFFF; + private const uint PExt11 = 0xFFFFFFFF; + private const uint PInv33 = 0x11C9; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat192.Add(x, y, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + Nat.Add33To(6, PInv33, z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(12, xx, yy, zz); + if (c != 0 || (zz[11] == PExt11 && Nat.Gte(12, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(12, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(6, x, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + Nat.Add33To(6, PInv33, z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(192, x); + if (z[5] == P5 && Nat192.Gte(z, P)) + { + Nat192.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(6, x, 0, z); + } + else + { + uint c = Nat192.Add(x, P, z); + Nat.ShiftDownBit(6, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 6; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat192.CreateExt(); + Nat192.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat192.MulAddTo(x, y, zz); + if (c != 0 || (zz[11] == PExt11 && Nat.Gte(12, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(12, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat192.Sub(P, P, z); + } + else + { + Nat192.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[6 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 6); + } + while (0 == Nat.LessThan(6, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong cc = Nat192.Mul33Add(PInv33, xx, 6, xx, 0, z, 0); + uint c = Nat192.Mul33DWordAdd(PInv33, cc, z, 0); + + Debug.Assert(c == 0 || c == 1); + + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + Nat.Add33To(6, PInv33, z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + if ((x != 0 && Nat192.Mul33WordAdd(PInv33, x, z, 0) != 0) + || (z[5] == P5 && Nat192.Gte(z, P))) + { + Nat.Add33To(6, PInv33, z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat192.CreateExt(); + Nat192.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat192.CreateExt(); + Nat192.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat192.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat192.Sub(x, y, z); + if (c != 0) + { + Nat.Sub33From(6, PInv33, z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(12, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(12, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(6, x, 0, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + Nat.Add33To(6, PInv33, z); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs.meta new file mode 100644 index 00000000..4cebc8f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e387de7a272f3c74cbc975cc08467172 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs new file mode 100644 index 00000000..5b087e76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs @@ -0,0 +1,218 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192K1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFEE37")); + + protected internal readonly uint[] x; + + public SecP192K1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP192K1FieldElement", "x"); + + this.x = SecP192K1Field.FromBigInteger(x); + } + + public SecP192K1FieldElement() + { + this.x = Nat192.Create(); + } + + protected internal SecP192K1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat192.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat192.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat192.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat192.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP192K1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192K1Field.Add(x, ((SecP192K1FieldElement)b).x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat192.Create(); + SecP192K1Field.AddOne(x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192K1Field.Subtract(x, ((SecP192K1FieldElement)b).x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192K1Field.Multiply(x, ((SecP192K1FieldElement)b).x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat192.Create(); + SecP192K1Field.Inv(((SecP192K1FieldElement)b).x, z); + SecP192K1Field.Multiply(z, x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat192.Create(); + SecP192K1Field.Negate(x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat192.Create(); + SecP192K1Field.Square(x, z); + return new SecP192K1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat192.Create(); + SecP192K1Field.Inv(x, z); + return new SecP192K1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^190 - 2^30 - 2^10 - 2^6 - 2^5 - 2^4 - 2^1 + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 159 1s } { 1 0s } { 19 1s } { 1 0s } { 3 1s } { 3 0s } { 3 1s } { 1 0s } + * + * Therefore we need an addition chain containing 3, 19, 159 (the lengths of the repunits) + * We use: 1, 2, [3], 6, 8, 16, [19], 35, 70, 140, [159] + */ + + uint[] x1 = this.x; + if (Nat192.IsZero(x1) || Nat192.IsOne(x1)) + return this; + + uint[] x2 = Nat192.Create(); + SecP192K1Field.Square(x1, x2); + SecP192K1Field.Multiply(x2, x1, x2); + uint[] x3 = Nat192.Create(); + SecP192K1Field.Square(x2, x3); + SecP192K1Field.Multiply(x3, x1, x3); + uint[] x6 = Nat192.Create(); + SecP192K1Field.SquareN(x3, 3, x6); + SecP192K1Field.Multiply(x6, x3, x6); + uint[] x8 = x6; + SecP192K1Field.SquareN(x6, 2, x8); + SecP192K1Field.Multiply(x8, x2, x8); + uint[] x16 = x2; + SecP192K1Field.SquareN(x8, 8, x16); + SecP192K1Field.Multiply(x16, x8, x16); + uint[] x19 = x8; + SecP192K1Field.SquareN(x16, 3, x19); + SecP192K1Field.Multiply(x19, x3, x19); + uint[] x35 = Nat192.Create(); + SecP192K1Field.SquareN(x19, 16, x35); + SecP192K1Field.Multiply(x35, x16, x35); + uint[] x70 = x16; + SecP192K1Field.SquareN(x35, 35, x70); + SecP192K1Field.Multiply(x70, x35, x70); + uint[] x140 = x35; + SecP192K1Field.SquareN(x70, 70, x140); + SecP192K1Field.Multiply(x140, x70, x140); + uint[] x159 = x70; + SecP192K1Field.SquareN(x140, 19, x159); + SecP192K1Field.Multiply(x159, x19, x159); + + uint[] t1 = x159; + SecP192K1Field.SquareN(t1, 20, t1); + SecP192K1Field.Multiply(t1, x19, t1); + SecP192K1Field.SquareN(t1, 4, t1); + SecP192K1Field.Multiply(t1, x3, t1); + SecP192K1Field.SquareN(t1, 6, t1); + SecP192K1Field.Multiply(t1, x3, t1); + SecP192K1Field.Square(t1, t1); + + uint[] t2 = x3; + SecP192K1Field.Square(t1, t2); + + return Nat192.Eq(x1, t2) ? new SecP192K1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP192K1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP192K1FieldElement); + } + + public virtual bool Equals(SecP192K1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat192.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 6); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs.meta new file mode 100644 index 00000000..60d7bf8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b4ad382e2b622e4fa7c595b129ed9d0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs new file mode 100644 index 00000000..a08c2a7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs @@ -0,0 +1,236 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192K1Point + : AbstractFpPoint + { + internal SecP192K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP192K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP192K1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP192K1FieldElement X1 = (SecP192K1FieldElement)this.RawXCoord, Y1 = (SecP192K1FieldElement)this.RawYCoord; + SecP192K1FieldElement X2 = (SecP192K1FieldElement)b.RawXCoord, Y2 = (SecP192K1FieldElement)b.RawYCoord; + + SecP192K1FieldElement Z1 = (SecP192K1FieldElement)this.RawZCoords[0]; + SecP192K1FieldElement Z2 = (SecP192K1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat192.CreateExt(); + uint[] t2 = Nat192.Create(); + uint[] t3 = Nat192.Create(); + uint[] t4 = Nat192.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP192K1Field.Square(Z1.x, S2); + + U2 = t2; + SecP192K1Field.Multiply(S2, X2.x, U2); + + SecP192K1Field.Multiply(S2, Z1.x, S2); + SecP192K1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP192K1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP192K1Field.Multiply(S1, X1.x, U1); + + SecP192K1Field.Multiply(S1, Z2.x, S1); + SecP192K1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat192.Create(); + SecP192K1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP192K1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat192.IsZero(H)) + { + if (Nat192.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP192K1Field.Square(H, HSquared); + + uint[] G = Nat192.Create(); + SecP192K1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP192K1Field.Multiply(HSquared, U1, V); + + SecP192K1Field.Negate(G, G); + Nat192.Mul(S1, G, tt1); + + c = Nat192.AddBothTo(V, V, G); + SecP192K1Field.Reduce32(c, G); + + SecP192K1FieldElement X3 = new SecP192K1FieldElement(t4); + SecP192K1Field.Square(R, X3.x); + SecP192K1Field.Subtract(X3.x, G, X3.x); + + SecP192K1FieldElement Y3 = new SecP192K1FieldElement(G); + SecP192K1Field.Subtract(V, X3.x, Y3.x); + SecP192K1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP192K1Field.Reduce(tt1, Y3.x); + + SecP192K1FieldElement Z3 = new SecP192K1FieldElement(H); + if (!Z1IsOne) + { + SecP192K1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP192K1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP192K1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP192K1FieldElement Y1 = (SecP192K1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP192K1FieldElement X1 = (SecP192K1FieldElement)this.RawXCoord, Z1 = (SecP192K1FieldElement)this.RawZCoords[0]; + + uint c; + + uint[] Y1Squared = Nat192.Create(); + SecP192K1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat192.Create(); + SecP192K1Field.Square(Y1Squared, T); + + uint[] M = Nat192.Create(); + SecP192K1Field.Square(X1.x, M); + c = Nat192.AddBothTo(M, M, M); + SecP192K1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP192K1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(6, S, 2, 0); + SecP192K1Field.Reduce32(c, S); + + uint[] t1 = Nat192.Create(); + c = Nat.ShiftUpBits(6, T, 3, 0, t1); + SecP192K1Field.Reduce32(c, t1); + + SecP192K1FieldElement X3 = new SecP192K1FieldElement(T); + SecP192K1Field.Square(M, X3.x); + SecP192K1Field.Subtract(X3.x, S, X3.x); + SecP192K1Field.Subtract(X3.x, S, X3.x); + + SecP192K1FieldElement Y3 = new SecP192K1FieldElement(S); + SecP192K1Field.Subtract(S, X3.x, Y3.x); + SecP192K1Field.Multiply(Y3.x, M, Y3.x); + SecP192K1Field.Subtract(Y3.x, t1, Y3.x); + + SecP192K1FieldElement Z3 = new SecP192K1FieldElement(M); + SecP192K1Field.Twice(Y1.x, Z3.x); + if (!Z1.IsOne) + { + SecP192K1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP192K1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP192K1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs.meta new file mode 100644 index 00000000..0cf334b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a3d1420e93e58f04a851be43a58445da +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs new file mode 100644 index 00000000..3b6c260a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP192R1FieldElement.Q; + + private const int SECP192R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP192R1_FE_INTS = 6; + private static readonly ECFieldElement[] SECP192R1_AFFINE_ZS = new ECFieldElement[] { new SecP192R1FieldElement(BigInteger.One) }; + + protected readonly SecP192R1Point m_infinity; + + public SecP192R1Curve() + : base(q) + { + this.m_infinity = new SecP192R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831")); + this.m_cofactor = BigInteger.One; + + this.m_coord = SECP192R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP192R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP192R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP192R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP192R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP192R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy(((SecP192R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP192R1_FE_INTS; + Nat192.Copy(((SecP192R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP192R1_FE_INTS; + } + } + + return new SecP192R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat192.Create(); + SecP192R1Field.Random(r, x); + return new SecP192R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat192.Create(); + SecP192R1Field.RandomMult(r, x); + return new SecP192R1FieldElement(x); + } + + private class SecP192R1LookupTable + : AbstractECLookupTable + { + private readonly SecP192R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP192R1LookupTable(SecP192R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat192.Create(), y = Nat192.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP192R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP192R1_FE_INTS + j] & MASK; + } + + pos += (SECP192R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat192.Create(), y = Nat192.Create(); + int pos = index * SECP192R1_FE_INTS * 2; + + for (int j = 0; j < SECP192R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP192R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP192R1FieldElement(x), new SecP192R1FieldElement(y), SECP192R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs.meta new file mode 100644 index 00000000..1fb08a90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 804ccccce56de074eb8ebec2c3939340 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs new file mode 100644 index 00000000..55c17764 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs @@ -0,0 +1,326 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192R1Field + { + // 2^192 - 2^64 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0x00000000, 0x00000002, 0x00000000, 0x00000001, + 0x00000000, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFF, + 0xFFFFFFFE, 0xFFFFFFFF, 0x00000001, 0x00000000, 0x00000002 }; + private const uint P5 = 0xFFFFFFFF; + private const uint PExt11 = 0xFFFFFFFF; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat192.Add(x, y, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(12, xx, yy, zz); + if (c != 0 || (zz[11] == PExt11 && Nat.Gte(12, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(12, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(6, x, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(192, x); + if (z[5] == P5 && Nat192.Gte(z, P)) + { + Nat192.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(6, x, 0, z); + } + else + { + uint c = Nat192.Add(x, P, z); + Nat.ShiftDownBit(6, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 6; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat192.CreateExt(); + Nat192.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat192.MulAddTo(x, y, zz); + if (c != 0 || (zz[11] == PExt11 && Nat.Gte(12, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(12, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat192.Sub(P, P, z); + } + else + { + Nat192.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[6 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 6); + } + while (0 == Nat.LessThan(6, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong xx06 = xx[6], xx07 = xx[7], xx08 = xx[8]; + ulong xx09 = xx[9], xx10 = xx[10], xx11 = xx[11]; + + ulong t0 = xx06 + xx10; + ulong t1 = xx07 + xx11; + + ulong cc = 0; + cc += (ulong)xx[0] + t0; + uint z0 = (uint)cc; + cc >>= 32; + cc += (ulong)xx[1] + t1; + z[1] = (uint)cc; + cc >>= 32; + + t0 += xx08; + t1 += xx09; + + cc += (ulong)xx[2] + t0; + ulong z2 = (uint)cc; + cc >>= 32; + cc += (ulong)xx[3] + t1; + z[3] = (uint)cc; + cc >>= 32; + + t0 -= xx06; + t1 -= xx07; + + cc += (ulong)xx[4] + t0; + z[4] = (uint)cc; + cc >>= 32; + cc += (ulong)xx[5] + t1; + z[5] = (uint)cc; + cc >>= 32; + + z2 += cc; + + cc += z0; + z[0] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += z[1]; + z[1] = (uint)cc; + z2 += cc >> 32; + } + z[2] = (uint)z2; + cc = z2 >> 32; + + Debug.Assert(cc == 0 || cc == 1); + + if ((cc != 0 && Nat.IncAt(6, z, 3) != 0) + || (z[5] == P5 && Nat192.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + ulong cc = 0; + + if (x != 0) + { + cc += (ulong)z[0] + x; + z[0] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (ulong)z[1]; + z[1] = (uint)cc; + cc >>= 32; + } + cc += (ulong)z[2] + x; + z[2] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc == 0 || cc == 1); + } + + if ((cc != 0 && Nat.IncAt(6, z, 3) != 0) + || (z[5] == P5 && Nat192.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat192.CreateExt(); + Nat192.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat192.CreateExt(); + Nat192.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat192.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat192.Sub(x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(12, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(12, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(6, x, 0, z); + if (c != 0 || (z[5] == P5 && Nat192.Gte(z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + } + c += (long)z[2] + 1; + z[2] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.IncAt(6, z, 3); + } + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + } + c += (long)z[2] - 1; + z[2] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.DecAt(6, z, 3); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs.meta new file mode 100644 index 00000000..a079b9c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 135629c36ebb8664584912ab9c807117 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs new file mode 100644 index 00000000..37cbcce7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs @@ -0,0 +1,193 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF")); + + protected internal readonly uint[] x; + + public SecP192R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP192R1FieldElement", "x"); + + this.x = SecP192R1Field.FromBigInteger(x); + } + + public SecP192R1FieldElement() + { + this.x = Nat192.Create(); + } + + protected internal SecP192R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat192.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat192.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat192.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat192.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP192R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192R1Field.Add(x, ((SecP192R1FieldElement)b).x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat192.Create(); + SecP192R1Field.AddOne(x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192R1Field.Subtract(x, ((SecP192R1FieldElement)b).x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat192.Create(); + SecP192R1Field.Multiply(x, ((SecP192R1FieldElement)b).x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat192.Create(); + SecP192R1Field.Inv(((SecP192R1FieldElement)b).x, z); + SecP192R1Field.Multiply(z, x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat192.Create(); + SecP192R1Field.Negate(x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat192.Create(); + SecP192R1Field.Square(x, z); + return new SecP192R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat192.Create(); + SecP192R1Field.Inv(x, z); + return new SecP192R1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + // Raise this element to the exponent 2^190 - 2^62 + + uint[] x1 = this.x; + if (Nat192.IsZero(x1) || Nat192.IsOne(x1)) + return this; + + uint[] t1 = Nat192.Create(); + uint[] t2 = Nat192.Create(); + + SecP192R1Field.Square(x1, t1); + SecP192R1Field.Multiply(t1, x1, t1); + + SecP192R1Field.SquareN(t1, 2, t2); + SecP192R1Field.Multiply(t2, t1, t2); + + SecP192R1Field.SquareN(t2, 4, t1); + SecP192R1Field.Multiply(t1, t2, t1); + + SecP192R1Field.SquareN(t1, 8, t2); + SecP192R1Field.Multiply(t2, t1, t2); + + SecP192R1Field.SquareN(t2, 16, t1); + SecP192R1Field.Multiply(t1, t2, t1); + + SecP192R1Field.SquareN(t1, 32, t2); + SecP192R1Field.Multiply(t2, t1, t2); + + SecP192R1Field.SquareN(t2, 64, t1); + SecP192R1Field.Multiply(t1, t2, t1); + + SecP192R1Field.SquareN(t1, 62, t1); + SecP192R1Field.Square(t1, t2); + + return Nat192.Eq(x1, t2) ? new SecP192R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP192R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP192R1FieldElement); + } + + public virtual bool Equals(SecP192R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat192.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 6); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs.meta new file mode 100644 index 00000000..813091e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f25dd4ee3aacb3143b980262b93981eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs new file mode 100644 index 00000000..e60171c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP192R1Point + : AbstractFpPoint + { + internal SecP192R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP192R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP192R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP192R1FieldElement X1 = (SecP192R1FieldElement)this.RawXCoord, Y1 = (SecP192R1FieldElement)this.RawYCoord; + SecP192R1FieldElement X2 = (SecP192R1FieldElement)b.RawXCoord, Y2 = (SecP192R1FieldElement)b.RawYCoord; + + SecP192R1FieldElement Z1 = (SecP192R1FieldElement)this.RawZCoords[0]; + SecP192R1FieldElement Z2 = (SecP192R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat192.CreateExt(); + uint[] t2 = Nat192.Create(); + uint[] t3 = Nat192.Create(); + uint[] t4 = Nat192.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP192R1Field.Square(Z1.x, S2); + + U2 = t2; + SecP192R1Field.Multiply(S2, X2.x, U2); + + SecP192R1Field.Multiply(S2, Z1.x, S2); + SecP192R1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP192R1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP192R1Field.Multiply(S1, X1.x, U1); + + SecP192R1Field.Multiply(S1, Z2.x, S1); + SecP192R1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat192.Create(); + SecP192R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP192R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat192.IsZero(H)) + { + if (Nat192.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP192R1Field.Square(H, HSquared); + + uint[] G = Nat192.Create(); + SecP192R1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP192R1Field.Multiply(HSquared, U1, V); + + SecP192R1Field.Negate(G, G); + Nat192.Mul(S1, G, tt1); + + c = Nat192.AddBothTo(V, V, G); + SecP192R1Field.Reduce32(c, G); + + SecP192R1FieldElement X3 = new SecP192R1FieldElement(t4); + SecP192R1Field.Square(R, X3.x); + SecP192R1Field.Subtract(X3.x, G, X3.x); + + SecP192R1FieldElement Y3 = new SecP192R1FieldElement(G); + SecP192R1Field.Subtract(V, X3.x, Y3.x); + SecP192R1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP192R1Field.Reduce(tt1, Y3.x); + + SecP192R1FieldElement Z3 = new SecP192R1FieldElement(H); + if (!Z1IsOne) + { + SecP192R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP192R1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP192R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP192R1FieldElement Y1 = (SecP192R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP192R1FieldElement X1 = (SecP192R1FieldElement)this.RawXCoord, Z1 = (SecP192R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat192.Create(); + uint[] t2 = Nat192.Create(); + + uint[] Y1Squared = Nat192.Create(); + SecP192R1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat192.Create(); + SecP192R1Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP192R1Field.Square(Z1.x, Z1Squared); + } + + SecP192R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP192R1Field.Add(X1.x, Z1Squared, M); + SecP192R1Field.Multiply(M, t1, M); + c = Nat192.AddBothTo(M, M, M); + SecP192R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP192R1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(6, S, 2, 0); + SecP192R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(6, T, 3, 0, t1); + SecP192R1Field.Reduce32(c, t1); + + SecP192R1FieldElement X3 = new SecP192R1FieldElement(T); + SecP192R1Field.Square(M, X3.x); + SecP192R1Field.Subtract(X3.x, S, X3.x); + SecP192R1Field.Subtract(X3.x, S, X3.x); + + SecP192R1FieldElement Y3 = new SecP192R1FieldElement(S); + SecP192R1Field.Subtract(S, X3.x, Y3.x); + SecP192R1Field.Multiply(Y3.x, M, Y3.x); + SecP192R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP192R1FieldElement Z3 = new SecP192R1FieldElement(M); + SecP192R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP192R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP192R1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP192R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs.meta new file mode 100644 index 00000000..b820d280 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a71d16df6540b974fb6fb1f2749ca234 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP192R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs new file mode 100644 index 00000000..04a4f6c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs @@ -0,0 +1,172 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224K1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP224K1FieldElement.Q; + + private const int SECP224K1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP224K1_FE_INTS = 7; + private static readonly ECFieldElement[] SECP224K1_AFFINE_ZS = new ECFieldElement[] { new SecP224K1FieldElement(BigInteger.One) }; + + protected readonly SecP224K1Point m_infinity; + + public SecP224K1Curve() + : base(q) + { + this.m_infinity = new SecP224K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.ValueOf(5)); + this.m_order = new BigInteger(1, Hex.DecodeStrict("010000000000000000000000000001DCE8D2EC6184CAF0A971769FB1F7")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP224K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP224K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP224K1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP224K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP224K1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP224K1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat224.Copy(((SecP224K1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP224K1_FE_INTS; + Nat224.Copy(((SecP224K1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP224K1_FE_INTS; + } + } + + return new SecP224K1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat224.Create(); + SecP224K1Field.Random(r, x); + return new SecP224K1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat224.Create(); + SecP224K1Field.RandomMult(r, x); + return new SecP224K1FieldElement(x); + } + + private class SecP224K1LookupTable + : AbstractECLookupTable + { + private readonly SecP224K1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP224K1LookupTable(SecP224K1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat224.Create(), y = Nat224.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP224K1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP224K1_FE_INTS + j] & MASK; + } + + pos += (SECP224K1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat224.Create(), y = Nat224.Create(); + int pos = index * SECP224K1_FE_INTS * 2; + + for (int j = 0; j < SECP224K1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP224K1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP224K1FieldElement(x), new SecP224K1FieldElement(y), SECP224K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs.meta new file mode 100644 index 00000000..7e3e1568 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a7cf766b4ace8a4fb7fd49941cc6656 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs new file mode 100644 index 00000000..642e947c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs @@ -0,0 +1,222 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224K1Field + { + // 2^224 - 2^32 - 2^12 - 2^11 - 2^9 - 2^7 - 2^4 - 2 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFE56D, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x02C23069, 0x00003526, 0x00000001, 0x00000000, 0x00000000, + 0x00000000, 0x00000000, 0xFFFFCADA, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF + }; + private static readonly uint[] PExtInv = new uint[]{ 0xFD3DCF97, 0xFFFFCAD9, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x00003525, 0x00000002 }; + private const uint P6 = 0xFFFFFFFF; + private const uint PExt13 = 0xFFFFFFFF; + private const uint PInv33 = 0x1A93; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat224.Add(x, y, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + Nat.Add33To(7, PInv33, z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(14, xx, yy, zz); + if (c != 0 || (zz[13] == PExt13 && Nat.Gte(14, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(14, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(7, x, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + Nat.Add33To(7, PInv33, z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(224, x); + if (z[6] == P6 && Nat224.Gte(z, P)) + { + Nat224.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(7, x, 0, z); + } + else + { + uint c = Nat224.Add(x, P, z); + Nat.ShiftDownBit(7, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 7; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat224.CreateExt(); + Nat224.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat224.MulAddTo(x, y, zz); + if (c != 0 || (zz[13] == PExt13 && Nat.Gte(14, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(14, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat224.Sub(P, P, z); + } + else + { + Nat224.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[7 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 7); + } + while (0 == Nat.LessThan(7, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong cc = Nat224.Mul33Add(PInv33, xx, 7, xx, 0, z, 0); + uint c = Nat224.Mul33DWordAdd(PInv33, cc, z, 0); + + Debug.Assert(c == 0 || c == 1); + + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + Nat.Add33To(7, PInv33, z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + if ((x != 0 && Nat224.Mul33WordAdd(PInv33, x, z, 0) != 0) + || (z[6] == P6 && Nat224.Gte(z, P))) + { + Nat.Add33To(7, PInv33, z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat224.CreateExt(); + Nat224.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat224.CreateExt(); + Nat224.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat224.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat224.Sub(x, y, z); + if (c != 0) + { + Nat.Sub33From(7, PInv33, z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(14, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(14, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(7, x, 0, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + Nat.Add33To(7, PInv33, z); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs.meta new file mode 100644 index 00000000..04f4e919 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 815a691732590d84388ed5639f9ed39e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs new file mode 100644 index 00000000..e0765587 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs @@ -0,0 +1,247 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224K1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFE56D")); + + // Calculated as BigInteger.Two.ModPow(Q.ShiftRight(2), Q) + private static readonly uint[] PRECOMP_POW2 = new uint[]{ 0x33bfd202, 0xdcfad133, 0x2287624a, 0xc3811ba8, + 0xa85558fc, 0x1eaef5d7, 0x8edf154c }; + + protected internal readonly uint[] x; + + public SecP224K1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP224K1FieldElement", "x"); + + this.x = SecP224K1Field.FromBigInteger(x); + } + + public SecP224K1FieldElement() + { + this.x = Nat224.Create(); + } + + protected internal SecP224K1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat224.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat224.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat224.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat224.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP224K1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224K1Field.Add(x, ((SecP224K1FieldElement)b).x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat224.Create(); + SecP224K1Field.AddOne(x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224K1Field.Subtract(x, ((SecP224K1FieldElement)b).x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224K1Field.Multiply(x, ((SecP224K1FieldElement)b).x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat224.Create(); + SecP224K1Field.Inv(((SecP224K1FieldElement)b).x, z); + SecP224K1Field.Multiply(z, x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat224.Create(); + SecP224K1Field.Negate(x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat224.Create(); + SecP224K1Field.Square(x, z); + return new SecP224K1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat224.Create(); + SecP224K1Field.Inv(x, z); + return new SecP224K1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Q == 8m + 5, so we use Pocklington's method for this case. + * + * First, raise this element to the exponent 2^221 - 2^29 - 2^9 - 2^8 - 2^6 - 2^4 - 2^1 (i.e. m + 1) + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 191 1s } { 1 0s } { 19 1s } { 2 0s } { 1 1s } { 1 0s } { 1 1s } { 1 0s } { 3 1s } { 1 0s } + * + * Therefore we need an addition chain containing 1, 3, 19, 191 (the lengths of the repunits) + * We use: [1], 2, [3], 4, 8, 11, [19], 23, 42, 84, 107, [191] + */ + + uint[] x1 = this.x; + if (Nat224.IsZero(x1) || Nat224.IsOne(x1)) + return this; + + uint[] x2 = Nat224.Create(); + SecP224K1Field.Square(x1, x2); + SecP224K1Field.Multiply(x2, x1, x2); + uint[] x3 = x2; + SecP224K1Field.Square(x2, x3); + SecP224K1Field.Multiply(x3, x1, x3); + uint[] x4 = Nat224.Create(); + SecP224K1Field.Square(x3, x4); + SecP224K1Field.Multiply(x4, x1, x4); + uint[] x8 = Nat224.Create(); + SecP224K1Field.SquareN(x4, 4, x8); + SecP224K1Field.Multiply(x8, x4, x8); + uint[] x11 = Nat224.Create(); + SecP224K1Field.SquareN(x8, 3, x11); + SecP224K1Field.Multiply(x11, x3, x11); + uint[] x19 = x11; + SecP224K1Field.SquareN(x11, 8, x19); + SecP224K1Field.Multiply(x19, x8, x19); + uint[] x23 = x8; + SecP224K1Field.SquareN(x19, 4, x23); + SecP224K1Field.Multiply(x23, x4, x23); + uint[] x42 = x4; + SecP224K1Field.SquareN(x23, 19, x42); + SecP224K1Field.Multiply(x42, x19, x42); + uint[] x84 = Nat224.Create(); + SecP224K1Field.SquareN(x42, 42, x84); + SecP224K1Field.Multiply(x84, x42, x84); + uint[] x107 = x42; + SecP224K1Field.SquareN(x84, 23, x107); + SecP224K1Field.Multiply(x107, x23, x107); + uint[] x191 = x23; + SecP224K1Field.SquareN(x107, 84, x191); + SecP224K1Field.Multiply(x191, x84, x191); + + uint[] t1 = x191; + SecP224K1Field.SquareN(t1, 20, t1); + SecP224K1Field.Multiply(t1, x19, t1); + SecP224K1Field.SquareN(t1, 3, t1); + SecP224K1Field.Multiply(t1, x1, t1); + SecP224K1Field.SquareN(t1, 2, t1); + SecP224K1Field.Multiply(t1, x1, t1); + SecP224K1Field.SquareN(t1, 4, t1); + SecP224K1Field.Multiply(t1, x3, t1); + SecP224K1Field.Square(t1, t1); + + uint[] t2 = x84; + SecP224K1Field.Square(t1, t2); + + if (Nat224.Eq(x1, t2)) + { + return new SecP224K1FieldElement(t1); + } + + /* + * If the first guess is incorrect, we multiply by a precomputed power of 2 to get the second guess, + * which is ((4x)^(m + 1))/2 mod Q + */ + SecP224K1Field.Multiply(t1, PRECOMP_POW2, t1); + + SecP224K1Field.Square(t1, t2); + + if (Nat224.Eq(x1, t2)) + { + return new SecP224K1FieldElement(t1); + } + + return null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP224K1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP224K1FieldElement); + } + + public virtual bool Equals(SecP224K1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat224.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 7); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs.meta new file mode 100644 index 00000000..24bf6233 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eb18e886f88cd2d40ad8a95b171b1a7f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs new file mode 100644 index 00000000..7c68ccc2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs @@ -0,0 +1,236 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224K1Point + : AbstractFpPoint + { + internal SecP224K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP224K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP224K1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP224K1FieldElement X1 = (SecP224K1FieldElement)this.RawXCoord, Y1 = (SecP224K1FieldElement)this.RawYCoord; + SecP224K1FieldElement X2 = (SecP224K1FieldElement)b.RawXCoord, Y2 = (SecP224K1FieldElement)b.RawYCoord; + + SecP224K1FieldElement Z1 = (SecP224K1FieldElement)this.RawZCoords[0]; + SecP224K1FieldElement Z2 = (SecP224K1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat224.CreateExt(); + uint[] t2 = Nat224.Create(); + uint[] t3 = Nat224.Create(); + uint[] t4 = Nat224.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP224K1Field.Square(Z1.x, S2); + + U2 = t2; + SecP224K1Field.Multiply(S2, X2.x, U2); + + SecP224K1Field.Multiply(S2, Z1.x, S2); + SecP224K1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP224K1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP224K1Field.Multiply(S1, X1.x, U1); + + SecP224K1Field.Multiply(S1, Z2.x, S1); + SecP224K1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat224.Create(); + SecP224K1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP224K1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat224.IsZero(H)) + { + if (Nat224.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP224K1Field.Square(H, HSquared); + + uint[] G = Nat224.Create(); + SecP224K1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP224K1Field.Multiply(HSquared, U1, V); + + SecP224K1Field.Negate(G, G); + Nat224.Mul(S1, G, tt1); + + c = Nat224.AddBothTo(V, V, G); + SecP224K1Field.Reduce32(c, G); + + SecP224K1FieldElement X3 = new SecP224K1FieldElement(t4); + SecP224K1Field.Square(R, X3.x); + SecP224K1Field.Subtract(X3.x, G, X3.x); + + SecP224K1FieldElement Y3 = new SecP224K1FieldElement(G); + SecP224K1Field.Subtract(V, X3.x, Y3.x); + SecP224K1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP224K1Field.Reduce(tt1, Y3.x); + + SecP224K1FieldElement Z3 = new SecP224K1FieldElement(H); + if (!Z1IsOne) + { + SecP224K1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP224K1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP224K1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP224K1FieldElement Y1 = (SecP224K1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP224K1FieldElement X1 = (SecP224K1FieldElement)this.RawXCoord, Z1 = (SecP224K1FieldElement)this.RawZCoords[0]; + + uint c; + + uint[] Y1Squared = Nat224.Create(); + SecP224K1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat224.Create(); + SecP224K1Field.Square(Y1Squared, T); + + uint[] M = Nat224.Create(); + SecP224K1Field.Square(X1.x, M); + c = Nat224.AddBothTo(M, M, M); + SecP224K1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP224K1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(7, S, 2, 0); + SecP224K1Field.Reduce32(c, S); + + uint[] t1 = Nat224.Create(); + c = Nat.ShiftUpBits(7, T, 3, 0, t1); + SecP224K1Field.Reduce32(c, t1); + + SecP224K1FieldElement X3 = new SecP224K1FieldElement(T); + SecP224K1Field.Square(M, X3.x); + SecP224K1Field.Subtract(X3.x, S, X3.x); + SecP224K1Field.Subtract(X3.x, S, X3.x); + + SecP224K1FieldElement Y3 = new SecP224K1FieldElement(S); + SecP224K1Field.Subtract(S, X3.x, Y3.x); + SecP224K1Field.Multiply(Y3.x, M, Y3.x); + SecP224K1Field.Subtract(Y3.x, t1, Y3.x); + + SecP224K1FieldElement Z3 = new SecP224K1FieldElement(M); + SecP224K1Field.Twice(Y1.x, Z3.x); + if (!Z1.IsOne) + { + SecP224K1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP224K1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP224K1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs.meta new file mode 100644 index 00000000..2aa5bd54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: da88518e11481b447952b1724b7b3aa8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs new file mode 100644 index 00000000..3d7401a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP224R1FieldElement.Q; + + private const int SECP224R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP224R1_FE_INTS = 7; + private static readonly ECFieldElement[] SECP224R1_AFFINE_ZS = new ECFieldElement[] { new SecP224R1FieldElement(BigInteger.One) }; + + protected readonly SecP224R1Point m_infinity; + + public SecP224R1Curve() + : base(q) + { + this.m_infinity = new SecP224R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D")); + this.m_cofactor = BigInteger.One; + + this.m_coord = SECP224R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP224R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP224R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP224R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP224R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP224R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat224.Copy(((SecP224R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP224R1_FE_INTS; + Nat224.Copy(((SecP224R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP224R1_FE_INTS; + } + } + + return new SecP224R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat224.Create(); + SecP224R1Field.Random(r, x); + return new SecP224R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat224.Create(); + SecP224R1Field.RandomMult(r, x); + return new SecP224R1FieldElement(x); + } + + private class SecP224R1LookupTable + : AbstractECLookupTable + { + private readonly SecP224R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP224R1LookupTable(SecP224R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat224.Create(), y = Nat224.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP224R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP224R1_FE_INTS + j] & MASK; + } + + pos += (SECP224R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat224.Create(), y = Nat224.Create(); + int pos = index * SECP224R1_FE_INTS * 2; + + for (int j = 0; j < SECP224R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP224R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP224R1FieldElement(x), new SecP224R1FieldElement(y), SECP224R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs.meta new file mode 100644 index 00000000..44bfea74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 994b1ae3b0bcbef4f835df86ca21931a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs new file mode 100644 index 00000000..2d316bac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs @@ -0,0 +1,341 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224R1Field + { + // 2^224 - 2^96 + 1 + internal static readonly uint[] P = new uint[]{ 0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0x00000000, 0x00000002, 0x00000000, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF + }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000001, + 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000001 }; + private const uint P6 = 0xFFFFFFFF; + private const uint PExt13 = 0xFFFFFFFF; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat224.Add(x, y, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(14, xx, yy, zz); + if (c != 0 || (zz[13] == PExt13 && Nat.Gte(14, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(14, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(7, x, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(224, x); + if (z[6] == P6 && Nat224.Gte(z, P)) + { + Nat224.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(7, x, 0, z); + } + else + { + uint c = Nat224.Add(x, P, z); + Nat.ShiftDownBit(7, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 7; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat224.CreateExt(); + Nat224.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat224.MulAddTo(x, y, zz); + if (c != 0 || (zz[13] == PExt13 && Nat.Gte(14, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(14, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat224.Sub(P, P, z); + } + else + { + Nat224.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[7 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 7); + } + while (0 == Nat.LessThan(7, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + long xx10 = xx[10], xx11 = xx[11], xx12 = xx[12], xx13 = xx[13]; + + const long n = 1; + + long t0 = (long)xx[7] + xx11 - n; + long t1 = (long)xx[8] + xx12; + long t2 = (long)xx[9] + xx13; + + long cc = 0; + cc += (long)xx[0] - t0; + long z0 = (uint)cc; + cc >>= 32; + cc += (long)xx[1] - t1; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)xx[2] - t2; + z[2] = (uint)cc; + cc >>= 32; + cc += (long)xx[3] + t0 - xx10; + long z3 = (uint)cc; + cc >>= 32; + cc += (long)xx[4] + t1 - xx11; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)xx[5] + t2 - xx12; + z[5] = (uint)cc; + cc >>= 32; + cc += (long)xx[6] + xx10 - xx13; + z[6] = (uint)cc; + cc >>= 32; + cc += n; + + Debug.Assert(cc >= 0); + + z3 += cc; + + z0 -= cc; + z[0] = (uint)z0; + cc = z0 >> 32; + if (cc != 0) + { + cc += (long)z[1]; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)z[2]; + z[2] = (uint)cc; + z3 += cc >> 32; + } + z[3] = (uint)z3; + cc = z3 >> 32; + + Debug.Assert(cc == 0 || cc == 1); + + if ((cc != 0 && Nat.IncAt(7, z, 4) != 0) + || (z[6] == P6 && Nat224.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + long cc = 0; + + if (x != 0) + { + long xx07 = x; + + cc += (long)z[0] - xx07; + z[0] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[1]; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)z[2]; + z[2] = (uint)cc; + cc >>= 32; + } + cc += (long)z[3] + xx07; + z[3] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc == 0 || cc == 1); + } + + if ((cc != 0 && Nat.IncAt(7, z, 4) != 0) + || (z[6] == P6 && Nat224.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat224.CreateExt(); + Nat224.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat224.CreateExt(); + Nat224.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat224.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat224.Sub(x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(14, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(14, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(7, x, 0, z); + if (c != 0 || (z[6] == P6 && Nat224.Gte(z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] + 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.IncAt(7, z, 4); + } + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] - 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.DecAt(7, z, 4); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs.meta new file mode 100644 index 00000000..5423a3ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d6a512d6eb991e4387453c92c828d27 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs new file mode 100644 index 00000000..2400c6c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs @@ -0,0 +1,275 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001")); + + protected internal readonly uint[] x; + + public SecP224R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP224R1FieldElement", "x"); + + this.x = SecP224R1Field.FromBigInteger(x); + } + + public SecP224R1FieldElement() + { + this.x = Nat224.Create(); + } + + protected internal SecP224R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat224.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat224.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat224.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat224.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP224R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224R1Field.Add(x, ((SecP224R1FieldElement)b).x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat224.Create(); + SecP224R1Field.AddOne(x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224R1Field.Subtract(x, ((SecP224R1FieldElement)b).x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat224.Create(); + SecP224R1Field.Multiply(x, ((SecP224R1FieldElement)b).x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat224.Create(); + SecP224R1Field.Inv(((SecP224R1FieldElement)b).x, z); + SecP224R1Field.Multiply(z, x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat224.Create(); + SecP224R1Field.Negate(x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat224.Create(); + SecP224R1Field.Square(x, z); + return new SecP224R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat224.Create(); + SecP224R1Field.Inv(x, z); + return new SecP224R1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + uint[] c = this.x; + if (Nat224.IsZero(c) || Nat224.IsOne(c)) + return this; + + uint[] nc = Nat224.Create(); + SecP224R1Field.Negate(c, nc); + + uint[] r = Mod.Random(SecureRandom.ArbitraryRandom, SecP224R1Field.P); + uint[] t = Nat224.Create(); + + if (!IsSquare(c)) + return null; + + while (!TrySqrt(nc, r, t)) + { + SecP224R1Field.AddOne(r, r); + } + + SecP224R1Field.Square(t, r); + + return Nat224.Eq(c, r) ? new SecP224R1FieldElement(t) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP224R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP224R1FieldElement); + } + + public virtual bool Equals(SecP224R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat224.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 7); + } + + private static bool IsSquare(uint[] x) + { + uint[] t1 = Nat224.Create(); + uint[] t2 = Nat224.Create(); + Nat224.Copy(x, t1); + + for (int i = 0; i < 7; ++i) + { + Nat224.Copy(t1, t2); + SecP224R1Field.SquareN(t1, 1 << i, t1); + SecP224R1Field.Multiply(t1, t2, t1); + } + + SecP224R1Field.SquareN(t1, 95, t1); + return Nat224.IsOne(t1); + } + + private static void RM(uint[] nc, uint[] d0, uint[] e0, uint[] d1, uint[] e1, uint[] f1, uint[] t) + { + SecP224R1Field.Multiply(e1, e0, t); + SecP224R1Field.Multiply(t, nc, t); + SecP224R1Field.Multiply(d1, d0, f1); + SecP224R1Field.Add(f1, t, f1); + SecP224R1Field.Multiply(d1, e0, t); + Nat224.Copy(f1, d1); + SecP224R1Field.Multiply(e1, d0, e1); + SecP224R1Field.Add(e1, t, e1); + SecP224R1Field.Square(e1, f1); + SecP224R1Field.Multiply(f1, nc, f1); + } + + private static void RP(uint[] nc, uint[] d1, uint[] e1, uint[] f1, uint[] t) + { + Nat224.Copy(nc, f1); + + uint[] d0 = Nat224.Create(); + uint[] e0 = Nat224.Create(); + + for (int i = 0; i < 7; ++i) + { + Nat224.Copy(d1, d0); + Nat224.Copy(e1, e0); + + int j = 1 << i; + while (--j >= 0) + { + RS(d1, e1, f1, t); + } + + RM(nc, d0, e0, d1, e1, f1, t); + } + } + + private static void RS(uint[] d, uint[] e, uint[] f, uint[] t) + { + SecP224R1Field.Multiply(e, d, e); + SecP224R1Field.Twice(e, e); + SecP224R1Field.Square(d, t); + SecP224R1Field.Add(f, t, d); + SecP224R1Field.Multiply(f, t, f); + uint c = Nat.ShiftUpBits(7, f, 2, 0); + SecP224R1Field.Reduce32(c, f); + } + + private static bool TrySqrt(uint[] nc, uint[] r, uint[] t) + { + uint[] d1 = Nat224.Create(); + Nat224.Copy(r, d1); + uint[] e1 = Nat224.Create(); + e1[0] = 1; + uint[] f1 = Nat224.Create(); + RP(nc, d1, e1, f1, t); + + uint[] d0 = Nat224.Create(); + uint[] e0 = Nat224.Create(); + + for (int k = 1; k < 96; ++k) + { + Nat224.Copy(d1, d0); + Nat224.Copy(e1, e0); + + RS(d1, e1, f1, t); + + if (Nat224.IsZero(d1)) + { + SecP224R1Field.Inv(e0, t); + SecP224R1Field.Multiply(t, d0, t); + return true; + } + } + + return false; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs.meta new file mode 100644 index 00000000..7caee64f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec09615374fd6e64bbecd69995924dbd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs new file mode 100644 index 00000000..196d9e2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP224R1Point + : AbstractFpPoint + { + internal SecP224R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP224R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP224R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP224R1FieldElement X1 = (SecP224R1FieldElement)this.RawXCoord, Y1 = (SecP224R1FieldElement)this.RawYCoord; + SecP224R1FieldElement X2 = (SecP224R1FieldElement)b.RawXCoord, Y2 = (SecP224R1FieldElement)b.RawYCoord; + + SecP224R1FieldElement Z1 = (SecP224R1FieldElement)this.RawZCoords[0]; + SecP224R1FieldElement Z2 = (SecP224R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt1 = Nat224.CreateExt(); + uint[] t2 = Nat224.Create(); + uint[] t3 = Nat224.Create(); + uint[] t4 = Nat224.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP224R1Field.Square(Z1.x, S2); + + U2 = t2; + SecP224R1Field.Multiply(S2, X2.x, U2); + + SecP224R1Field.Multiply(S2, Z1.x, S2); + SecP224R1Field.Multiply(S2, Y2.x, S2); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP224R1Field.Square(Z2.x, S1); + + U1 = tt1; + SecP224R1Field.Multiply(S1, X1.x, U1); + + SecP224R1Field.Multiply(S1, Z2.x, S1); + SecP224R1Field.Multiply(S1, Y1.x, S1); + } + + uint[] H = Nat224.Create(); + SecP224R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP224R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat224.IsZero(H)) + { + if (Nat224.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP224R1Field.Square(H, HSquared); + + uint[] G = Nat224.Create(); + SecP224R1Field.Multiply(HSquared, H, G); + + uint[] V = t3; + SecP224R1Field.Multiply(HSquared, U1, V); + + SecP224R1Field.Negate(G, G); + Nat224.Mul(S1, G, tt1); + + c = Nat224.AddBothTo(V, V, G); + SecP224R1Field.Reduce32(c, G); + + SecP224R1FieldElement X3 = new SecP224R1FieldElement(t4); + SecP224R1Field.Square(R, X3.x); + SecP224R1Field.Subtract(X3.x, G, X3.x); + + SecP224R1FieldElement Y3 = new SecP224R1FieldElement(G); + SecP224R1Field.Subtract(V, X3.x, Y3.x); + SecP224R1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP224R1Field.Reduce(tt1, Y3.x); + + SecP224R1FieldElement Z3 = new SecP224R1FieldElement(H); + if (!Z1IsOne) + { + SecP224R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + if (!Z2IsOne) + { + SecP224R1Field.Multiply(Z3.x, Z2.x, Z3.x); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP224R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP224R1FieldElement Y1 = (SecP224R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP224R1FieldElement X1 = (SecP224R1FieldElement)this.RawXCoord, Z1 = (SecP224R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] t1 = Nat224.Create(); + uint[] t2 = Nat224.Create(); + + uint[] Y1Squared = Nat224.Create(); + SecP224R1Field.Square(Y1.x, Y1Squared); + + uint[] T = Nat224.Create(); + SecP224R1Field.Square(Y1Squared, T); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP224R1Field.Square(Z1.x, Z1Squared); + } + + SecP224R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP224R1Field.Add(X1.x, Z1Squared, M); + SecP224R1Field.Multiply(M, t1, M); + c = Nat224.AddBothTo(M, M, M); + SecP224R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP224R1Field.Multiply(Y1Squared, X1.x, S); + c = Nat.ShiftUpBits(7, S, 2, 0); + SecP224R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(7, T, 3, 0, t1); + SecP224R1Field.Reduce32(c, t1); + + SecP224R1FieldElement X3 = new SecP224R1FieldElement(T); + SecP224R1Field.Square(M, X3.x); + SecP224R1Field.Subtract(X3.x, S, X3.x); + SecP224R1Field.Subtract(X3.x, S, X3.x); + + SecP224R1FieldElement Y3 = new SecP224R1FieldElement(S); + SecP224R1Field.Subtract(S, X3.x, Y3.x); + SecP224R1Field.Multiply(Y3.x, M, Y3.x); + SecP224R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP224R1FieldElement Z3 = new SecP224R1FieldElement(M); + SecP224R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP224R1Field.Multiply(Z3.x, Z1.x, Z3.x); + } + + return new SecP224R1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP224R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs.meta new file mode 100644 index 00000000..fa68eee0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e2c3ae093fd3dce48839537407abb29e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP224R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs new file mode 100644 index 00000000..a0c21318 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs @@ -0,0 +1,172 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256K1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP256K1FieldElement.Q; + + private const int SECP256K1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP256K1_FE_INTS = 8; + private static readonly ECFieldElement[] SECP256K1_AFFINE_ZS = new ECFieldElement[] { new SecP256K1FieldElement(BigInteger.One) }; + + protected readonly SecP256K1Point m_infinity; + + public SecP256K1Curve() + : base(q) + { + this.m_infinity = new SecP256K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.ValueOf(7)); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP256K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP256K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP256K1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP256K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP256K1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP256K1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy(((SecP256K1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP256K1_FE_INTS; + Nat256.Copy(((SecP256K1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP256K1_FE_INTS; + } + } + + return new SecP256K1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat256.Create(); + SecP256K1Field.Random(r, x); + return new SecP256K1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat256.Create(); + SecP256K1Field.RandomMult(r, x); + return new SecP256K1FieldElement(x); + } + + private class SecP256K1LookupTable + : AbstractECLookupTable + { + private readonly SecP256K1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP256K1LookupTable(SecP256K1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP256K1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP256K1_FE_INTS + j] & MASK; + } + + pos += (SECP256K1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = index * SECP256K1_FE_INTS * 2; + + for (int j = 0; j < SECP256K1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP256K1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP256K1FieldElement(x), new SecP256K1FieldElement(y), SECP256K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs.meta new file mode 100644 index 00000000..9b906b35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc638d3c9d333c64bad41728fe8935d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs new file mode 100644 index 00000000..722b8950 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs @@ -0,0 +1,248 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256K1Field + { + // 2^256 - 2^32 - 2^9 - 2^8 - 2^7 - 2^6 - 2^4 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFC2F, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x000E90A1, 0x000007A2, 0x00000001, 0x00000000, 0x00000000, + 0x00000000, 0x00000000, 0x00000000, 0xFFFFF85E, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFF16F5F, 0xFFFFF85D, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x000007A1, 0x00000002 }; + private const uint P7 = 0xFFFFFFFF; + private const uint PExt15 = 0xFFFFFFFF; + private const uint PInv33 = 0x3D1; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat256.Add(x, y, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + Nat.Add33To(8, PInv33, z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(16, xx, yy, zz); + if (c != 0 || (zz[15] == PExt15 && Nat.Gte(16, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(16, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(8, x, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + Nat.Add33To(8, PInv33, z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(256, x); + if (z[7] == P7 && Nat256.Gte(z, P)) + { + Nat256.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(8, x, 0, z); + } + else + { + uint c = Nat256.Add(x, P, z); + Nat.ShiftDownBit(8, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 8; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void Multiply(uint[] x, uint[] y, uint[] z, uint[] tt) + { + Nat256.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat256.MulAddTo(x, y, zz); + if (c != 0 || (zz[15] == PExt15 && Nat.Gte(16, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(16, zz, PExtInv.Length); + } + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat256.Sub(P, P, z); + } + else + { + Nat256.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[8 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 8); + } + while (0 == Nat.LessThan(8, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + ulong cc = Nat256.Mul33Add(PInv33, xx, 8, xx, 0, z, 0); + uint c = Nat256.Mul33DWordAdd(PInv33, cc, z, 0); + + Debug.Assert(c == 0 || c == 1); + + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + Nat.Add33To(8, PInv33, z); + } + } + + public static void Reduce32(uint x, uint[] z) + { + if ((x != 0 && Nat256.Mul33WordAdd(PInv33, x, z, 0) != 0) + || (z[7] == P7 && Nat256.Gte(z, P))) + { + Nat.Add33To(8, PInv33, z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + } + + public static void Square(uint[] x, uint[] z, uint[] tt) + { + Nat256.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat256.Square(z, tt); + Reduce(tt, z); + } + } + + public static void SquareN(uint[] x, int n, uint[] z, uint[] tt) + { + Debug.Assert(n > 0); + + Nat256.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat256.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat256.Sub(x, y, z); + if (c != 0) + { + Nat.Sub33From(8, PInv33, z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(16, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(16, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(8, x, 0, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + Nat.Add33To(8, PInv33, z); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs.meta new file mode 100644 index 00000000..6c4c850d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 608dda2db7c79524698c3182e0289378 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs new file mode 100644 index 00000000..080821ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs @@ -0,0 +1,220 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256K1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F")); + + protected internal readonly uint[] x; + + public SecP256K1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP256K1FieldElement", "x"); + + this.x = SecP256K1Field.FromBigInteger(x); + } + + public SecP256K1FieldElement() + { + this.x = Nat256.Create(); + } + + protected internal SecP256K1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat256.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat256.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat256.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP256K1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256K1Field.Add(x, ((SecP256K1FieldElement)b).x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat256.Create(); + SecP256K1Field.AddOne(x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256K1Field.Subtract(x, ((SecP256K1FieldElement)b).x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256K1Field.Multiply(x, ((SecP256K1FieldElement)b).x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat256.Create(); + SecP256K1Field.Inv(((SecP256K1FieldElement)b).x, z); + SecP256K1Field.Multiply(z, x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat256.Create(); + SecP256K1Field.Negate(x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat256.Create(); + SecP256K1Field.Square(x, z); + return new SecP256K1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat256.Create(); + SecP256K1Field.Inv(x, z); + return new SecP256K1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + /* + * Raise this element to the exponent 2^254 - 2^30 - 2^7 - 2^6 - 2^5 - 2^4 - 2^2 + * + * Breaking up the exponent's binary representation into "repunits", we get: + * { 223 1s } { 1 0s } { 22 1s } { 4 0s } { 2 1s } { 2 0s} + * + * Therefore we need an addition chain containing 2, 22, 223 (the lengths of the repunits) + * We use: 1, [2], 3, 6, 9, 11, [22], 44, 88, 176, 220, [223] + */ + + uint[] x1 = this.x; + if (Nat256.IsZero(x1) || Nat256.IsOne(x1)) + return this; + + uint[] tt0 = Nat256.CreateExt(); + + uint[] x2 = Nat256.Create(); + SecP256K1Field.Square(x1, x2, tt0); + SecP256K1Field.Multiply(x2, x1, x2, tt0); + uint[] x3 = Nat256.Create(); + SecP256K1Field.Square(x2, x3, tt0); + SecP256K1Field.Multiply(x3, x1, x3, tt0); + uint[] x6 = Nat256.Create(); + SecP256K1Field.SquareN(x3, 3, x6, tt0); + SecP256K1Field.Multiply(x6, x3, x6, tt0); + uint[] x9 = x6; + SecP256K1Field.SquareN(x6, 3, x9, tt0); + SecP256K1Field.Multiply(x9, x3, x9, tt0); + uint[] x11 = x9; + SecP256K1Field.SquareN(x9, 2, x11, tt0); + SecP256K1Field.Multiply(x11, x2, x11, tt0); + uint[] x22 = Nat256.Create(); + SecP256K1Field.SquareN(x11, 11, x22, tt0); + SecP256K1Field.Multiply(x22, x11, x22, tt0); + uint[] x44 = x11; + SecP256K1Field.SquareN(x22, 22, x44, tt0); + SecP256K1Field.Multiply(x44, x22, x44, tt0); + uint[] x88 = Nat256.Create(); + SecP256K1Field.SquareN(x44, 44, x88, tt0); + SecP256K1Field.Multiply(x88, x44, x88, tt0); + uint[] x176 = Nat256.Create(); + SecP256K1Field.SquareN(x88, 88, x176, tt0); + SecP256K1Field.Multiply(x176, x88, x176, tt0); + uint[] x220 = x88; + SecP256K1Field.SquareN(x176, 44, x220, tt0); + SecP256K1Field.Multiply(x220, x44, x220, tt0); + uint[] x223 = x44; + SecP256K1Field.SquareN(x220, 3, x223, tt0); + SecP256K1Field.Multiply(x223, x3, x223, tt0); + + uint[] t1 = x223; + SecP256K1Field.SquareN(t1, 23, t1, tt0); + SecP256K1Field.Multiply(t1, x22, t1, tt0); + SecP256K1Field.SquareN(t1, 6, t1, tt0); + SecP256K1Field.Multiply(t1, x2, t1, tt0); + SecP256K1Field.SquareN(t1, 2, t1, tt0); + + uint[] t2 = x2; + SecP256K1Field.Square(t1, t2, tt0); + + return Nat256.Eq(x1, t2) ? new SecP256K1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP256K1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP256K1FieldElement); + } + + public virtual bool Equals(SecP256K1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 8); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs.meta new file mode 100644 index 00000000..dc898426 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d21546ca42446f4e95c7125ef071242 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs new file mode 100644 index 00000000..6e06a293 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs @@ -0,0 +1,238 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256K1Point + : AbstractFpPoint + { + internal SecP256K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP256K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP256K1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP256K1FieldElement X1 = (SecP256K1FieldElement)this.RawXCoord, Y1 = (SecP256K1FieldElement)this.RawYCoord; + SecP256K1FieldElement X2 = (SecP256K1FieldElement)b.RawXCoord, Y2 = (SecP256K1FieldElement)b.RawYCoord; + + SecP256K1FieldElement Z1 = (SecP256K1FieldElement)this.RawZCoords[0]; + SecP256K1FieldElement Z2 = (SecP256K1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat256.CreateExt(); + uint[] tt1 = Nat256.CreateExt(); + uint[] t2 = Nat256.Create(); + uint[] t3 = Nat256.Create(); + uint[] t4 = Nat256.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP256K1Field.Square(Z1.x, S2, tt0); + + U2 = t2; + SecP256K1Field.Multiply(S2, X2.x, U2, tt0); + + SecP256K1Field.Multiply(S2, Z1.x, S2, tt0); + SecP256K1Field.Multiply(S2, Y2.x, S2, tt0); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP256K1Field.Square(Z2.x, S1, tt0); + + U1 = tt1; + SecP256K1Field.Multiply(S1, X1.x, U1, tt0); + + SecP256K1Field.Multiply(S1, Z2.x, S1, tt0); + SecP256K1Field.Multiply(S1, Y1.x, S1, tt0); + } + + uint[] H = Nat256.Create(); + SecP256K1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP256K1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat256.IsZero(H)) + { + if (Nat256.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP256K1Field.Square(H, HSquared, tt0); + + uint[] G = Nat256.Create(); + SecP256K1Field.Multiply(HSquared, H, G, tt0); + + uint[] V = t3; + SecP256K1Field.Multiply(HSquared, U1, V, tt0); + + SecP256K1Field.Negate(G, G); + Nat256.Mul(S1, G, tt1); + + c = Nat256.AddBothTo(V, V, G); + SecP256K1Field.Reduce32(c, G); + + SecP256K1FieldElement X3 = new SecP256K1FieldElement(t4); + SecP256K1Field.Square(R, X3.x, tt0); + SecP256K1Field.Subtract(X3.x, G, X3.x); + + SecP256K1FieldElement Y3 = new SecP256K1FieldElement(G); + SecP256K1Field.Subtract(V, X3.x, Y3.x); + SecP256K1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP256K1Field.Reduce(tt1, Y3.x); + + SecP256K1FieldElement Z3 = new SecP256K1FieldElement(H); + if (!Z1IsOne) + { + SecP256K1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + if (!Z2IsOne) + { + SecP256K1Field.Multiply(Z3.x, Z2.x, Z3.x, tt0); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP256K1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP256K1FieldElement Y1 = (SecP256K1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP256K1FieldElement X1 = (SecP256K1FieldElement)this.RawXCoord, Z1 = (SecP256K1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat256.CreateExt(); + + uint[] Y1Squared = Nat256.Create(); + SecP256K1Field.Square(Y1.x, Y1Squared, tt0); + + uint[] T = Nat256.Create(); + SecP256K1Field.Square(Y1Squared, T, tt0); + + uint[] M = Nat256.Create(); + SecP256K1Field.Square(X1.x, M, tt0); + c = Nat256.AddBothTo(M, M, M); + SecP256K1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP256K1Field.Multiply(Y1Squared, X1.x, S, tt0); + c = Nat.ShiftUpBits(8, S, 2, 0); + SecP256K1Field.Reduce32(c, S); + + uint[] t1 = Nat256.Create(); + c = Nat.ShiftUpBits(8, T, 3, 0, t1); + SecP256K1Field.Reduce32(c, t1); + + SecP256K1FieldElement X3 = new SecP256K1FieldElement(T); + SecP256K1Field.Square(M, X3.x, tt0); + SecP256K1Field.Subtract(X3.x, S, X3.x); + SecP256K1Field.Subtract(X3.x, S, X3.x); + + SecP256K1FieldElement Y3 = new SecP256K1FieldElement(S); + SecP256K1Field.Subtract(S, X3.x, Y3.x); + SecP256K1Field.Multiply(Y3.x, M, Y3.x, tt0); + SecP256K1Field.Subtract(Y3.x, t1, Y3.x); + + SecP256K1FieldElement Z3 = new SecP256K1FieldElement(M); + SecP256K1Field.Twice(Y1.x, Z3.x); + if (!Z1.IsOne) + { + SecP256K1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + + return new SecP256K1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP256K1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs.meta new file mode 100644 index 00000000..2bbe109a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bd0044c4ee15670419af9195db5bb384 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs new file mode 100644 index 00000000..89bc9c6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP256R1FieldElement.Q; + + private const int SECP256R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP256R1_FE_INTS = 8; + private static readonly ECFieldElement[] SECP256R1_AFFINE_ZS = new ECFieldElement[] { new SecP256R1FieldElement(BigInteger.One) }; + + protected readonly SecP256R1Point m_infinity; + + public SecP256R1Curve() + : base(q) + { + this.m_infinity = new SecP256R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP256R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP256R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP256R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP256R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP256R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP256R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy(((SecP256R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP256R1_FE_INTS; + Nat256.Copy(((SecP256R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP256R1_FE_INTS; + } + } + + return new SecP256R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat256.Create(); + SecP256R1Field.Random(r, x); + return new SecP256R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat256.Create(); + SecP256R1Field.RandomMult(r, x); + return new SecP256R1FieldElement(x); + } + + private class SecP256R1LookupTable + : AbstractECLookupTable + { + private readonly SecP256R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP256R1LookupTable(SecP256R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP256R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP256R1_FE_INTS + j] & MASK; + } + + pos += (SECP256R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat256.Create(), y = Nat256.Create(); + int pos = index * SECP256R1_FE_INTS * 2; + + for (int j = 0; j < SECP256R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP256R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP256R1FieldElement(x), new SecP256R1FieldElement(y), SECP256R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs.meta new file mode 100644 index 00000000..cdacadb1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a8aec9baf18876489e744ea976640b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs new file mode 100644 index 00000000..6af95d18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs @@ -0,0 +1,380 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256R1Field + { + // 2^256 - 2^224 + 2^192 + 2^96 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0x00000000, + 0x00000000, 0x00000001, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFE, 0x00000001, 0xFFFFFFFE, 0x00000001, 0xFFFFFFFE, 0x00000001, 0x00000001, 0xFFFFFFFE, + 0x00000002, 0xFFFFFFFE }; + private const uint P7 = 0xFFFFFFFF; + private const uint PExt15 = 0xFFFFFFFE; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat256.Add(x, y, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(16, xx, yy, zz); + if (c != 0 || (zz[15] >= PExt15 && Nat.Gte(16, zz, PExt))) + { + Nat.SubFrom(16, PExt, zz); + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(8, x, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(256, x); + if (z[7] == P7 && Nat256.Gte(z, P)) + { + Nat256.SubFrom(P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(8, x, 0, z); + } + else + { + uint c = Nat256.Add(x, P, z); + Nat.ShiftDownBit(8, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 8; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void Multiply(uint[] x, uint[] y, uint[] z, uint[] tt) + { + Nat256.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(uint[] x, uint[] y, uint[] zz) + { + uint c = Nat256.MulAddTo(x, y, zz); + if (c != 0 || (zz[15] >= PExt15 && Nat.Gte(16, zz, PExt))) + { + Nat.SubFrom(16, PExt, zz); + } + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat256.Sub(P, P, z); + } + else + { + Nat256.Sub(P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[8 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 8); + } + while (0 == Nat.LessThan(8, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + long xx08 = xx[8], xx09 = xx[9], xx10 = xx[10], xx11 = xx[11]; + long xx12 = xx[12], xx13 = xx[13], xx14 = xx[14], xx15 = xx[15]; + + const long n = 6; + + xx08 -= n; + + long t0 = xx08 + xx09; + long t1 = xx09 + xx10; + long t2 = xx10 + xx11 - xx15; + long t3 = xx11 + xx12; + long t4 = xx12 + xx13; + long t5 = xx13 + xx14; + long t6 = xx14 + xx15; + long t7 = t5 - t0; + + long cc = 0; + cc += (long)xx[0] - t3 - t7; + z[0] = (uint)cc; + cc >>= 32; + cc += (long)xx[1] + t1 - t4 - t6; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)xx[2] + t2 - t5; + z[2] = (uint)cc; + cc >>= 32; + cc += (long)xx[3] + (t3 << 1) + t7 - t6; + z[3] = (uint)cc; + cc >>= 32; + cc += (long)xx[4] + (t4 << 1) + xx14 - t1; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)xx[5] + (t5 << 1) - t2; + z[5] = (uint)cc; + cc >>= 32; + cc += (long)xx[6] + (t6 << 1) + t7; + z[6] = (uint)cc; + cc >>= 32; + cc += (long)xx[7] + (xx15 << 1) + xx08 - t2 - t4; + z[7] = (uint)cc; + cc >>= 32; + cc += n; + + Debug.Assert(cc >= 0); + + Reduce32((uint)cc, z); + } + + public static void Reduce32(uint x, uint[] z) + { + long cc = 0; + + if (x != 0) + { + long xx08 = x; + + cc += (long)z[0] + xx08; + z[0] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[1]; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)z[2]; + z[2] = (uint)cc; + cc >>= 32; + } + cc += (long)z[3] - xx08; + z[3] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[4]; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)z[5]; + z[5] = (uint)cc; + cc >>= 32; + } + cc += (long)z[6] - xx08; + z[6] = (uint)cc; + cc >>= 32; + cc += (long)z[7] + xx08; + z[7] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc == 0 || cc == 1); + } + + if (cc != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + } + + public static void Square(uint[] x, uint[] z, uint[] tt) + { + Nat256.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat256.CreateExt(); + Nat256.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat256.Square(z, tt); + Reduce(tt, z); + } + } + + public static void SquareN(uint[] x, int n, uint[] z, uint[] tt) + { + Debug.Assert(n > 0); + + Nat256.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat256.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat256.Sub(x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(16, xx, yy, zz); + if (c != 0) + { + Nat.AddTo(16, PExt, zz); + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(8, x, 0, z); + if (c != 0 || (z[7] == P7 && Nat256.Gte(z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] - 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5]; + z[5] = (uint)c; + c >>= 32; + } + c += (long)z[6] - 1; + z[6] = (uint)c; + c >>= 32; + c += (long)z[7] + 1; + z[7] = (uint)c; + //c >>= 32; + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] + 1; + z[3] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5]; + z[5] = (uint)c; + c >>= 32; + } + c += (long)z[6] + 1; + z[6] = (uint)c; + c >>= 32; + c += (long)z[7] - 1; + z[7] = (uint)c; + //c >>= 32; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs.meta new file mode 100644 index 00000000..8bb4daf7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3640e5c2b2edffa45ae0610c1b75a04c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs new file mode 100644 index 00000000..f9f3af6e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs @@ -0,0 +1,194 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF")); + + protected internal readonly uint[] x; + + public SecP256R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP256R1FieldElement", "x"); + + this.x = SecP256R1Field.FromBigInteger(x); + } + + public SecP256R1FieldElement() + { + this.x = Nat256.Create(); + } + + protected internal SecP256R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat256.IsZero(x); } + } + + public override bool IsOne + { + get { return Nat256.IsOne(x); } + } + + public override bool TestBitZero() + { + return Nat256.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger(x); + } + + public override string FieldName + { + get { return "SecP256R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256R1Field.Add(x, ((SecP256R1FieldElement)b).x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat256.Create(); + SecP256R1Field.AddOne(x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256R1Field.Subtract(x, ((SecP256R1FieldElement)b).x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat256.Create(); + SecP256R1Field.Multiply(x, ((SecP256R1FieldElement)b).x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat256.Create(); + SecP256R1Field.Inv(((SecP256R1FieldElement)b).x, z); + SecP256R1Field.Multiply(z, x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat256.Create(); + SecP256R1Field.Negate(x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat256.Create(); + SecP256R1Field.Square(x, z); + return new SecP256R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat256.Create(); + SecP256R1Field.Inv(x, z); + return new SecP256R1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + // Raise this element to the exponent 2^254 - 2^222 + 2^190 + 2^94 + + uint[] x1 = this.x; + if (Nat256.IsZero(x1) || Nat256.IsOne(x1)) + return this; + + uint[] tt0 = Nat256.CreateExt(); + uint[] t1 = Nat256.Create(); + uint[] t2 = Nat256.Create(); + + SecP256R1Field.Square(x1, t1, tt0); + SecP256R1Field.Multiply(t1, x1, t1, tt0); + + SecP256R1Field.SquareN(t1, 2, t2, tt0); + SecP256R1Field.Multiply(t2, t1, t2, tt0); + + SecP256R1Field.SquareN(t2, 4, t1, tt0); + SecP256R1Field.Multiply(t1, t2, t1, tt0); + + SecP256R1Field.SquareN(t1, 8, t2, tt0); + SecP256R1Field.Multiply(t2, t1, t2, tt0); + + SecP256R1Field.SquareN(t2, 16, t1, tt0); + SecP256R1Field.Multiply(t1, t2, t1, tt0); + + SecP256R1Field.SquareN(t1, 32, t1, tt0); + SecP256R1Field.Multiply(t1, x1, t1, tt0); + + SecP256R1Field.SquareN(t1, 96, t1, tt0); + SecP256R1Field.Multiply(t1, x1, t1, tt0); + + SecP256R1Field.SquareN(t1, 94, t1, tt0); + SecP256R1Field.Multiply(t1, t1, t2, tt0); + + return Nat256.Eq(x1, t2) ? new SecP256R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP256R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP256R1FieldElement); + } + + public virtual bool Equals(SecP256R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq(x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 8); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs.meta new file mode 100644 index 00000000..00329ffb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d8577a529c38b84438ba01a17b683c02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs new file mode 100644 index 00000000..d7fdef5a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs @@ -0,0 +1,251 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP256R1Point + : AbstractFpPoint + { + internal SecP256R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP256R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP256R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP256R1FieldElement X1 = (SecP256R1FieldElement)this.RawXCoord, Y1 = (SecP256R1FieldElement)this.RawYCoord; + SecP256R1FieldElement X2 = (SecP256R1FieldElement)b.RawXCoord, Y2 = (SecP256R1FieldElement)b.RawYCoord; + + SecP256R1FieldElement Z1 = (SecP256R1FieldElement)this.RawZCoords[0]; + SecP256R1FieldElement Z2 = (SecP256R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat256.CreateExt(); + uint[] tt1 = Nat256.CreateExt(); + uint[] t2 = Nat256.Create(); + uint[] t3 = Nat256.Create(); + uint[] t4 = Nat256.Create(); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP256R1Field.Square(Z1.x, S2, tt0); + + U2 = t2; + SecP256R1Field.Multiply(S2, X2.x, U2, tt0); + + SecP256R1Field.Multiply(S2, Z1.x, S2, tt0); + SecP256R1Field.Multiply(S2, Y2.x, S2, tt0); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP256R1Field.Square(Z2.x, S1, tt0); + + U1 = tt1; + SecP256R1Field.Multiply(S1, X1.x, U1, tt0); + + SecP256R1Field.Multiply(S1, Z2.x, S1, tt0); + SecP256R1Field.Multiply(S1, Y1.x, S1, tt0); + } + + uint[] H = Nat256.Create(); + SecP256R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP256R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat256.IsZero(H)) + { + if (Nat256.IsZero(R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP256R1Field.Square(H, HSquared, tt0); + + uint[] G = Nat256.Create(); + SecP256R1Field.Multiply(HSquared, H, G, tt0); + + uint[] V = t3; + SecP256R1Field.Multiply(HSquared, U1, V, tt0); + + SecP256R1Field.Negate(G, G); + Nat256.Mul(S1, G, tt1); + + c = Nat256.AddBothTo(V, V, G); + SecP256R1Field.Reduce32(c, G); + + SecP256R1FieldElement X3 = new SecP256R1FieldElement(t4); + SecP256R1Field.Square(R, X3.x, tt0); + SecP256R1Field.Subtract(X3.x, G, X3.x); + + SecP256R1FieldElement Y3 = new SecP256R1FieldElement(G); + SecP256R1Field.Subtract(V, X3.x, Y3.x); + SecP256R1Field.MultiplyAddToExt(Y3.x, R, tt1); + SecP256R1Field.Reduce(tt1, Y3.x); + + SecP256R1FieldElement Z3 = new SecP256R1FieldElement(H); + if (!Z1IsOne) + { + SecP256R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + if (!Z2IsOne) + { + SecP256R1Field.Multiply(Z3.x, Z2.x, Z3.x, tt0); + } + + ECFieldElement[] zs = new ECFieldElement[]{ Z3 }; + + return new SecP256R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP256R1FieldElement Y1 = (SecP256R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP256R1FieldElement X1 = (SecP256R1FieldElement)this.RawXCoord, Z1 = (SecP256R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat256.CreateExt(); + uint[] t1 = Nat256.Create(); + uint[] t2 = Nat256.Create(); + + uint[] Y1Squared = Nat256.Create(); + SecP256R1Field.Square(Y1.x, Y1Squared, tt0); + + uint[] T = Nat256.Create(); + SecP256R1Field.Square(Y1Squared, T, tt0); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP256R1Field.Square(Z1.x, Z1Squared, tt0); + } + + SecP256R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP256R1Field.Add(X1.x, Z1Squared, M); + SecP256R1Field.Multiply(M, t1, M, tt0); + c = Nat256.AddBothTo(M, M, M); + SecP256R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP256R1Field.Multiply(Y1Squared, X1.x, S, tt0); + c = Nat.ShiftUpBits(8, S, 2, 0); + SecP256R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(8, T, 3, 0, t1); + SecP256R1Field.Reduce32(c, t1); + + SecP256R1FieldElement X3 = new SecP256R1FieldElement(T); + SecP256R1Field.Square(M, X3.x, tt0); + SecP256R1Field.Subtract(X3.x, S, X3.x); + SecP256R1Field.Subtract(X3.x, S, X3.x); + + SecP256R1FieldElement Y3 = new SecP256R1FieldElement(S); + SecP256R1Field.Subtract(S, X3.x, Y3.x); + SecP256R1Field.Multiply(Y3.x, M, Y3.x, tt0); + SecP256R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP256R1FieldElement Z3 = new SecP256R1FieldElement(M); + SecP256R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP256R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + + return new SecP256R1Point(curve, X3, Y3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP256R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs.meta new file mode 100644 index 00000000..f1d6dbdd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 78fe183c245187b44a7f2614e627f658 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP256R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs new file mode 100644 index 00000000..590e900a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP384R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP384R1FieldElement.Q; + + private const int SECP384R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP384R1_FE_INTS = 12; + private static readonly ECFieldElement[] SECP384R1_AFFINE_ZS = new ECFieldElement[] { new SecP384R1FieldElement(BigInteger.One) }; + + protected readonly SecP384R1Point m_infinity; + + public SecP384R1Curve() + : base(q) + { + this.m_infinity = new SecP384R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP384R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP384R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP384R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP384R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP384R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP384R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat.Copy(SECP384R1_FE_INTS, ((SecP384R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP384R1_FE_INTS; + Nat.Copy(SECP384R1_FE_INTS, ((SecP384R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP384R1_FE_INTS; + } + } + + return new SecP384R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat.Create(12); + SecP384R1Field.Random(r, x); + return new SecP384R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat.Create(12); + SecP384R1Field.RandomMult(r, x); + return new SecP384R1FieldElement(x); + } + + private class SecP384R1LookupTable + : AbstractECLookupTable + { + private readonly SecP384R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP384R1LookupTable(SecP384R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat.Create(SECP384R1_FE_INTS), y = Nat.Create(SECP384R1_FE_INTS); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP384R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP384R1_FE_INTS + j] & MASK; + } + + pos += (SECP384R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat.Create(SECP384R1_FE_INTS), y = Nat.Create(SECP384R1_FE_INTS); + int pos = index * SECP384R1_FE_INTS * 2; + + for (int j = 0; j < SECP384R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP384R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP384R1FieldElement(x), new SecP384R1FieldElement(y), SECP384R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs.meta new file mode 100644 index 00000000..911f8f7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb0aa384df631da46ba41af8f288f320 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs new file mode 100644 index 00000000..3c7d543d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs @@ -0,0 +1,364 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP384R1Field + { + // 2^384 - 2^128 - 2^96 + 2^32 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFE, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF }; + private static readonly uint[] PExt = new uint[]{ 0x00000001, 0xFFFFFFFE, 0x00000000, 0x00000002, 0x00000000, + 0xFFFFFFFE, 0x00000000, 0x00000002, 0x00000001, 0x00000000, 0x00000000, 0x00000000, 0xFFFFFFFE, 0x00000001, + 0x00000000, 0xFFFFFFFE, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF }; + private static readonly uint[] PExtInv = new uint[]{ 0xFFFFFFFF, 0x00000001, 0xFFFFFFFF, 0xFFFFFFFD, + 0xFFFFFFFF, 0x00000001, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000001, + 0xFFFFFFFE, 0xFFFFFFFF, 0x00000001, 0x00000002 }; + private const uint P11 = 0xFFFFFFFF; + private const uint PExt23 = 0xFFFFFFFF; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat.Add(12, x, y, z); + if (c != 0 || (z[11] == P11 && Nat.Gte(12, z, P))) + { + AddPInvTo(z); + } + } + + public static void AddExt(uint[] xx, uint[] yy, uint[] zz) + { + uint c = Nat.Add(24, xx, yy, zz); + if (c != 0 || (zz[23] == PExt23 && Nat.Gte(24, zz, PExt))) + { + if (Nat.AddTo(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.IncAt(24, zz, PExtInv.Length); + } + } + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(12, x, z); + if (c != 0 || (z[11] == P11 && Nat.Gte(12, z, P))) + { + AddPInvTo(z); + } + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(384, x); + if (z[11] == P11 && Nat.Gte(12, z, P)) + { + Nat.SubFrom(12, P, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + if ((x[0] & 1) == 0) + { + Nat.ShiftDownBit(12, x, 0, z); + } + else + { + uint c = Nat.Add(12, x, P, z); + Nat.ShiftDownBit(12, z, c); + } + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 12; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat.Create(24); + Nat384.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void Multiply(uint[] x, uint[] y, uint[] z, uint[] tt) + { + Nat384.Mul(x, y, tt); + Reduce(tt, z); + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat.Sub(12, P, P, z); + } + else + { + Nat.Sub(12, P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[12 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 12); + } + while (0 == Nat.LessThan(12, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + long xx16 = xx[16], xx17 = xx[17], xx18 = xx[18], xx19 = xx[19]; + long xx20 = xx[20], xx21 = xx[21], xx22 = xx[22], xx23 = xx[23]; + + const long n = 1; + + long t0 = (long)xx[12] + xx20 - n; + long t1 = (long)xx[13] + xx22; + long t2 = (long)xx[14] + xx22 + xx23; + long t3 = (long)xx[15] + xx23; + long t4 = xx17 + xx21; + long t5 = xx21 - xx23; + long t6 = xx22 - xx23; + long t7 = t0 + t5; + + long cc = 0; + cc += (long)xx[0] + t7; + z[0] = (uint)cc; + cc >>= 32; + cc += (long)xx[1] + xx23 - t0 + t1; + z[1] = (uint)cc; + cc >>= 32; + cc += (long)xx[2] - xx21 - t1 + t2; + z[2] = (uint)cc; + cc >>= 32; + cc += (long)xx[3] - t2 + t3 + t7; + z[3] = (uint)cc; + cc >>= 32; + cc += (long)xx[4] + xx16 + xx21 + t1 - t3 + t7; + z[4] = (uint)cc; + cc >>= 32; + cc += (long)xx[5] - xx16 + t1 + t2 + t4; + z[5] = (uint)cc; + cc >>= 32; + cc += (long)xx[6] + xx18 - xx17 + t2 + t3; + z[6] = (uint)cc; + cc >>= 32; + cc += (long)xx[7] + xx16 + xx19 - xx18 + t3; + z[7] = (uint)cc; + cc >>= 32; + cc += (long)xx[8] + xx16 + xx17 + xx20 - xx19; + z[8] = (uint)cc; + cc >>= 32; + cc += (long)xx[9] + xx18 - xx20 + t4; + z[9] = (uint)cc; + cc >>= 32; + cc += (long)xx[10] + xx18 + xx19 - t5 + t6; + z[10] = (uint)cc; + cc >>= 32; + cc += (long)xx[11] + xx19 + xx20 - t6; + z[11] = (uint)cc; + cc >>= 32; + cc += n; + + Debug.Assert(cc >= 0); + + Reduce32((uint)cc, z); + } + + public static void Reduce32(uint x, uint[] z) + { + long cc = 0; + + if (x != 0) + { + long xx12 = x; + + cc += (long)z[0] + xx12; + z[0] = (uint)cc; + cc >>= 32; + cc += (long)z[1] - xx12; + z[1] = (uint)cc; + cc >>= 32; + if (cc != 0) + { + cc += (long)z[2]; + z[2] = (uint)cc; + cc >>= 32; + } + cc += (long)z[3] + xx12; + z[3] = (uint)cc; + cc >>= 32; + cc += (long)z[4] + xx12; + z[4] = (uint)cc; + cc >>= 32; + + Debug.Assert(cc == 0 || cc == 1); + } + + if ((cc != 0 && Nat.IncAt(12, z, 5) != 0) + || (z[11] == P11 && Nat.Gte(12, z, P))) + { + AddPInvTo(z); + } + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat.Create(24); + Nat384.Square(x, tt); + Reduce(tt, z); + } + + public static void Square(uint[] x, uint[] z, uint[] tt) + { + Nat384.Square(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat.Create(24); + Nat384.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat384.Square(z, tt); + Reduce(tt, z); + } + } + + public static void SquareN(uint[] x, int n, uint[] z, uint[] tt) + { + Debug.Assert(n > 0); + + Nat384.Square(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + Nat384.Square(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat.Sub(12, x, y, z); + if (c != 0) + { + SubPInvFrom(z); + } + } + + public static void SubtractExt(uint[] xx, uint[] yy, uint[] zz) + { + int c = Nat.Sub(24, xx, yy, zz); + if (c != 0) + { + if (Nat.SubFrom(PExtInv.Length, PExtInv, zz) != 0) + { + Nat.DecAt(24, zz, PExtInv.Length); + } + } + } + + public static void Twice(uint[] x, uint[] z) + { + uint c = Nat.ShiftUpBit(12, x, 0, z); + if (c != 0 || (z[11] == P11 && Nat.Gte(12, z, P))) + { + AddPInvTo(z); + } + } + + private static void AddPInvTo(uint[] z) + { + long c = (long)z[0] + 1; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - 1; + z[1] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] + 1; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] + 1; + z[4] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.IncAt(12, z, 5); + } + } + + private static void SubPInvFrom(uint[] z) + { + long c = (long)z[0] - 1; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] + 1; + z[1] = (uint)c; + c >>= 32; + if (c != 0) + { + c += (long)z[2]; + z[2] = (uint)c; + c >>= 32; + } + c += (long)z[3] - 1; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - 1; + z[4] = (uint)c; + c >>= 32; + if (c != 0) + { + Nat.DecAt(12, z, 5); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs.meta new file mode 100644 index 00000000..0aaa8ad4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fe192fdf195378545a78c6ed2bf23b78 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs new file mode 100644 index 00000000..0f10588b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs @@ -0,0 +1,216 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP384R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF")); + + protected internal readonly uint[] x; + + public SecP384R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP384R1FieldElement", "x"); + + this.x = SecP384R1Field.FromBigInteger(x); + } + + public SecP384R1FieldElement() + { + this.x = Nat.Create(12); + } + + protected internal SecP384R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat.IsZero(12, x); } + } + + public override bool IsOne + { + get { return Nat.IsOne(12, x); } + } + + public override bool TestBitZero() + { + return Nat.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat.ToBigInteger(12, x); + } + + public override string FieldName + { + get { return "SecP384R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat.Create(12); + SecP384R1Field.Add(x, ((SecP384R1FieldElement)b).x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat.Create(12); + SecP384R1Field.AddOne(x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat.Create(12); + SecP384R1Field.Subtract(x, ((SecP384R1FieldElement)b).x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat.Create(12); + SecP384R1Field.Multiply(x, ((SecP384R1FieldElement)b).x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat.Create(12); + SecP384R1Field.Inv(((SecP384R1FieldElement)b).x, z); + SecP384R1Field.Multiply(z, x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat.Create(12); + SecP384R1Field.Negate(x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat.Create(12); + SecP384R1Field.Square(x, z); + return new SecP384R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat.Create(12); + SecP384R1Field.Inv(x, z); + return new SecP384R1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + // Raise this element to the exponent 2^382 - 2^126 - 2^94 + 2^30 + + uint[] x1 = this.x; + if (Nat.IsZero(12, x1) || Nat.IsOne(12, x1)) + return this; + + uint[] tt0 = Nat.Create(24); + uint[] t1 = Nat.Create(12); + uint[] t2 = Nat.Create(12); + uint[] t3 = Nat.Create(12); + uint[] t4 = Nat.Create(12); + + SecP384R1Field.Square(x1, t1, tt0); + SecP384R1Field.Multiply(t1, x1, t1, tt0); + + SecP384R1Field.SquareN(t1, 2, t2, tt0); + SecP384R1Field.Multiply(t2, t1, t2, tt0); + + SecP384R1Field.Square(t2, t2, tt0); + SecP384R1Field.Multiply(t2, x1, t2, tt0); + + SecP384R1Field.SquareN(t2, 5, t3, tt0); + SecP384R1Field.Multiply(t3, t2, t3, tt0); + + SecP384R1Field.SquareN(t3, 5, t4, tt0); + SecP384R1Field.Multiply(t4, t2, t4, tt0); + + SecP384R1Field.SquareN(t4, 15, t2, tt0); + SecP384R1Field.Multiply(t2, t4, t2, tt0); + + SecP384R1Field.SquareN(t2, 2, t3, tt0); + SecP384R1Field.Multiply(t1, t3, t1, tt0); + + SecP384R1Field.SquareN(t3, 28, t3, tt0); + SecP384R1Field.Multiply(t2, t3, t2, tt0); + + SecP384R1Field.SquareN(t2, 60, t3, tt0); + SecP384R1Field.Multiply(t3, t2, t3, tt0); + + uint[] r = t2; + + SecP384R1Field.SquareN(t3, 120, r, tt0); + SecP384R1Field.Multiply(r, t3, r, tt0); + + SecP384R1Field.SquareN(r, 15, r, tt0); + SecP384R1Field.Multiply(r, t4, r, tt0); + + SecP384R1Field.SquareN(r, 33, r, tt0); + SecP384R1Field.Multiply(r, t1, r, tt0); + + SecP384R1Field.SquareN(r, 64, r, tt0); + SecP384R1Field.Multiply(r, x1, r, tt0); + + SecP384R1Field.SquareN(r, 30, t1, tt0); + SecP384R1Field.Square(t1, t2, tt0); + + return Nat.Eq(12, x1, t2) ? new SecP384R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP384R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP384R1FieldElement); + } + + public virtual bool Equals(SecP384R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat.Eq(12, x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 12); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs.meta new file mode 100644 index 00000000..2f7c2a36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f6d8e1f2882f3a459dfd2da3a9dd21b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs new file mode 100644 index 00000000..97bf19d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs @@ -0,0 +1,252 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP384R1Point + : AbstractFpPoint + { + internal SecP384R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP384R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP384R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP384R1FieldElement X1 = (SecP384R1FieldElement)this.RawXCoord, Y1 = (SecP384R1FieldElement)this.RawYCoord; + SecP384R1FieldElement X2 = (SecP384R1FieldElement)b.RawXCoord, Y2 = (SecP384R1FieldElement)b.RawYCoord; + + SecP384R1FieldElement Z1 = (SecP384R1FieldElement)this.RawZCoords[0]; + SecP384R1FieldElement Z2 = (SecP384R1FieldElement)b.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat.Create(24); + uint[] tt1 = Nat.Create(24); + uint[] tt2 = Nat.Create(24); + uint[] t3 = Nat.Create(12); + uint[] t4 = Nat.Create(12); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP384R1Field.Square(Z1.x, S2, tt0); + + U2 = tt2; + SecP384R1Field.Multiply(S2, X2.x, U2, tt0); + + SecP384R1Field.Multiply(S2, Z1.x, S2, tt0); + SecP384R1Field.Multiply(S2, Y2.x, S2, tt0); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP384R1Field.Square(Z2.x, S1, tt0); + + U1 = tt1; + SecP384R1Field.Multiply(S1, X1.x, U1, tt0); + + SecP384R1Field.Multiply(S1, Z2.x, S1, tt0); + SecP384R1Field.Multiply(S1, Y1.x, S1, tt0); + } + + uint[] H = Nat.Create(12); + SecP384R1Field.Subtract(U1, U2, H); + + uint[] R = Nat.Create(12); + SecP384R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat.IsZero(12, H)) + { + if (Nat.IsZero(12, R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP384R1Field.Square(H, HSquared, tt0); + + uint[] G = Nat.Create(12); + SecP384R1Field.Multiply(HSquared, H, G, tt0); + + uint[] V = t3; + SecP384R1Field.Multiply(HSquared, U1, V, tt0); + + SecP384R1Field.Negate(G, G); + Nat384.Mul(S1, G, tt1); + + c = Nat.AddBothTo(12, V, V, G); + SecP384R1Field.Reduce32(c, G); + + SecP384R1FieldElement X3 = new SecP384R1FieldElement(t4); + SecP384R1Field.Square(R, X3.x, tt0); + SecP384R1Field.Subtract(X3.x, G, X3.x); + + SecP384R1FieldElement Y3 = new SecP384R1FieldElement(G); + SecP384R1Field.Subtract(V, X3.x, Y3.x); + Nat384.Mul(Y3.x, R, tt2); + SecP384R1Field.AddExt(tt1, tt2, tt1); + SecP384R1Field.Reduce(tt1, Y3.x); + + SecP384R1FieldElement Z3 = new SecP384R1FieldElement(H); + if (!Z1IsOne) + { + SecP384R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + if (!Z2IsOne) + { + SecP384R1Field.Multiply(Z3.x, Z2.x, Z3.x, tt0); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP384R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP384R1FieldElement Y1 = (SecP384R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP384R1FieldElement X1 = (SecP384R1FieldElement)this.RawXCoord, Z1 = (SecP384R1FieldElement)this.RawZCoords[0]; + + uint c; + uint[] tt0 = Nat.Create(24); + uint[] t1 = Nat.Create(12); + uint[] t2 = Nat.Create(12); + + uint[] Y1Squared = Nat.Create(12); + SecP384R1Field.Square(Y1.x, Y1Squared, tt0); + + uint[] T = Nat.Create(12); + SecP384R1Field.Square(Y1Squared, T, tt0); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP384R1Field.Square(Z1.x, Z1Squared, tt0); + } + + SecP384R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP384R1Field.Add(X1.x, Z1Squared, M); + SecP384R1Field.Multiply(M, t1, M, tt0); + c = Nat.AddBothTo(12, M, M, M); + SecP384R1Field.Reduce32(c, M); + + uint[] S = Y1Squared; + SecP384R1Field.Multiply(Y1Squared, X1.x, S, tt0); + c = Nat.ShiftUpBits(12, S, 2, 0); + SecP384R1Field.Reduce32(c, S); + + c = Nat.ShiftUpBits(12, T, 3, 0, t1); + SecP384R1Field.Reduce32(c, t1); + + SecP384R1FieldElement X3 = new SecP384R1FieldElement(T); + SecP384R1Field.Square(M, X3.x, tt0); + SecP384R1Field.Subtract(X3.x, S, X3.x); + SecP384R1Field.Subtract(X3.x, S, X3.x); + + SecP384R1FieldElement Y3 = new SecP384R1FieldElement(S); + SecP384R1Field.Subtract(S, X3.x, Y3.x); + SecP384R1Field.Multiply(Y3.x, M, Y3.x, tt0); + SecP384R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP384R1FieldElement Z3 = new SecP384R1FieldElement(M); + SecP384R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP384R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + + return new SecP384R1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP384R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs.meta new file mode 100644 index 00000000..bf8b913b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32d0493feac8f2d4188dcdcf83da34ca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP384R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs new file mode 100644 index 00000000..d2df24ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs @@ -0,0 +1,174 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP521R1Curve + : AbstractFpCurve + { + public static readonly BigInteger q = SecP521R1FieldElement.Q; + + private const int SECP521R1_DEFAULT_COORDS = COORD_JACOBIAN; + private const int SECP521R1_FE_INTS = 17; + private static readonly ECFieldElement[] SECP521R1_AFFINE_ZS = new ECFieldElement[] { new SecP521R1FieldElement(BigInteger.One) }; + + protected readonly SecP521R1Point m_infinity; + + public SecP521R1Curve() + : base(q) + { + this.m_infinity = new SecP521R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC"))); + this.m_b = FromBigInteger(new BigInteger(1, + Hex.DecodeStrict("0051953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409")); + this.m_cofactor = BigInteger.One; + this.m_coord = SECP521R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecP521R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_JACOBIAN: + return true; + default: + return false; + } + } + + public virtual BigInteger Q + { + get { return q; } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return q.BitLength; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecP521R1FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecP521R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecP521R1Point(this, x, y, zs); + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + uint[] table = new uint[len * SECP521R1_FE_INTS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat.Copy(SECP521R1_FE_INTS, ((SecP521R1FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECP521R1_FE_INTS; + Nat.Copy(SECP521R1_FE_INTS, ((SecP521R1FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECP521R1_FE_INTS; + } + } + + return new SecP521R1LookupTable(this, table, len); + } + + public override ECFieldElement RandomFieldElement(SecureRandom r) + { + uint[] x = Nat.Create(17); + SecP521R1Field.Random(r, x); + return new SecP521R1FieldElement(x); + } + + public override ECFieldElement RandomFieldElementMult(SecureRandom r) + { + uint[] x = Nat.Create(17); + SecP521R1Field.RandomMult(r, x); + return new SecP521R1FieldElement(x); + } + + private class SecP521R1LookupTable + : AbstractECLookupTable + { + private readonly SecP521R1Curve m_outer; + private readonly uint[] m_table; + private readonly int m_size; + + internal SecP521R1LookupTable(SecP521R1Curve outer, uint[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + uint[] x = Nat.Create(SECP521R1_FE_INTS), y = Nat.Create(SECP521R1_FE_INTS); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + uint MASK = (uint)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECP521R1_FE_INTS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECP521R1_FE_INTS + j] & MASK; + } + + pos += (SECP521R1_FE_INTS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + uint[] x = Nat.Create(SECP521R1_FE_INTS), y = Nat.Create(SECP521R1_FE_INTS); + int pos = index * SECP521R1_FE_INTS * 2; + + for (int j = 0; j < SECP521R1_FE_INTS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECP521R1_FE_INTS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(uint[] x, uint[] y) + { + return m_outer.CreateRawPoint(new SecP521R1FieldElement(x), new SecP521R1FieldElement(y), SECP521R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs.meta new file mode 100644 index 00000000..992b0294 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d2d36725324678e4183b0499807af97e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs new file mode 100644 index 00000000..1a3a7feb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs @@ -0,0 +1,226 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP521R1Field + { + // 2^521 - 1 + internal static readonly uint[] P = new uint[]{ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, + 0xFFFFFFFF, 0xFFFFFFFF, 0x1FF }; + private const uint P16 = 0x1FFU; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + uint c = Nat.Add(16, x, y, z) + x[16] + y[16]; + if (c > P16 || (c == P16 && Nat.Eq(16, z, P))) + { + c += Nat.Inc(16, z); + c &= P16; + } + z[16] = c; + } + + public static void AddOne(uint[] x, uint[] z) + { + uint c = Nat.Inc(16, x, z) + x[16]; + if (c > P16 || (c == P16 && Nat.Eq(16, z, P))) + { + c += Nat.Inc(16, z); + c &= P16; + } + z[16] = c; + } + + public static uint[] FromBigInteger(BigInteger x) + { + uint[] z = Nat.FromBigInteger(521, x); + if (Nat.Eq(17, z, P)) + { + Nat.Zero(17, z); + } + return z; + } + + public static void Half(uint[] x, uint[] z) + { + uint x16 = x[16]; + uint c = Nat.ShiftDownBit(16, x, x16, z); + z[16] = (x16 >> 1) | (c >> 23); + } + + public static void Inv(uint[] x, uint[] z) + { + Mod.CheckedModOddInverse(P, x, z); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < 17; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return ((int)d - 1) >> 31; + } + + public static void Multiply(uint[] x, uint[] y, uint[] z) + { + uint[] tt = Nat.Create(33); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void Multiply(uint[] x, uint[] y, uint[] z, uint[] tt) + { + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void Negate(uint[] x, uint[] z) + { + if (0 != IsZero(x)) + { + Nat.Sub(17, P, P, z); + } + else + { + Nat.Sub(17, P, x, z); + } + } + + public static void Random(SecureRandom r, uint[] z) + { + byte[] bb = new byte[17 * 4]; + do + { + r.NextBytes(bb); + Pack.LE_To_UInt32(bb, 0, z, 0, 17); + z[16] &= P16; + } + while (0 == Nat.LessThan(17, z, P)); + } + + public static void RandomMult(SecureRandom r, uint[] z) + { + do + { + Random(r, z); + } + while (0 != IsZero(z)); + } + + public static void Reduce(uint[] xx, uint[] z) + { + Debug.Assert(xx[32] >> 18 == 0); + uint xx32 = xx[32]; + uint c = Nat.ShiftDownBits(16, xx, 16, 9, xx32, z, 0) >> 23; + c += xx32 >> 9; + c += Nat.AddTo(16, xx, z); + if (c > P16 || (c == P16 && Nat.Eq(16, z, P))) + { + c += Nat.Inc(16, z); + c &= P16; + } + z[16] = c; + } + + public static void Reduce23(uint[] z) + { + uint z16 = z[16]; + uint c = Nat.AddWordTo(16, z16 >> 9, z) + (z16 & P16); + if (c > P16 || (c == P16 && Nat.Eq(16, z, P))) + { + c += Nat.Inc(16, z); + c &= P16; + } + z[16] = c; + } + + public static void Square(uint[] x, uint[] z) + { + uint[] tt = Nat.Create(33); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void Square(uint[] x, uint[] z, uint[] tt) + { + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareN(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + uint[] tt = Nat.Create(33); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static void SquareN(uint[] x, int n, uint[] z, uint[] tt) + { + Debug.Assert(n > 0); + + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static void Subtract(uint[] x, uint[] y, uint[] z) + { + int c = Nat.Sub(16, x, y, z) + (int)(x[16] - y[16]); + if (c < 0) + { + c += Nat.Dec(16, z); + c &= (int)P16; + } + z[16] = (uint)c; + } + + public static void Twice(uint[] x, uint[] z) + { + uint x16 = x[16]; + uint c = Nat.ShiftUpBit(16, x, x16 << 23, z) | (x16 << 1); + z[16] = c & P16; + } + + protected static void ImplMultiply(uint[] x, uint[] y, uint[] zz) + { + Nat512.Mul(x, y, zz); + + uint x16 = x[16], y16 = y[16]; + zz[32] = Nat.Mul31BothAdd(16, x16, y, y16, x, zz, 16) + (x16 * y16); + } + + protected static void ImplSquare(uint[] x, uint[] zz) + { + Nat512.Square(x, zz); + + uint x16 = x[16]; + zz[32] = Nat.MulWordAddTo(16, x16 << 1, x, 0, zz, 16) + (x16 * x16); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs.meta new file mode 100644 index 00000000..2ec48fe3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bedd575ecd4645140bf18c9234a7c358 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs new file mode 100644 index 00000000..817bd318 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs @@ -0,0 +1,173 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP521R1FieldElement + : AbstractFpFieldElement + { + public static readonly BigInteger Q = new BigInteger(1, + Hex.DecodeStrict("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF")); + + protected internal readonly uint[] x; + + public SecP521R1FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.CompareTo(Q) >= 0) + throw new ArgumentException("value invalid for SecP521R1FieldElement", "x"); + + this.x = SecP521R1Field.FromBigInteger(x); + } + + public SecP521R1FieldElement() + { + this.x = Nat.Create(17); + } + + protected internal SecP521R1FieldElement(uint[] x) + { + this.x = x; + } + + public override bool IsZero + { + get { return Nat.IsZero(17, x); } + } + + public override bool IsOne + { + get { return Nat.IsOne(17, x); } + } + + public override bool TestBitZero() + { + return Nat.GetBit(x, 0) == 1; + } + + public override BigInteger ToBigInteger() + { + return Nat.ToBigInteger(17, x); + } + + public override string FieldName + { + get { return "SecP521R1Field"; } + } + + public override int FieldSize + { + get { return Q.BitLength; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + uint[] z = Nat.Create(17); + SecP521R1Field.Add(x, ((SecP521R1FieldElement)b).x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement AddOne() + { + uint[] z = Nat.Create(17); + SecP521R1Field.AddOne(x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + uint[] z = Nat.Create(17); + SecP521R1Field.Subtract(x, ((SecP521R1FieldElement)b).x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + uint[] z = Nat.Create(17); + SecP521R1Field.Multiply(x, ((SecP521R1FieldElement)b).x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + //return Multiply(b.Invert()); + uint[] z = Nat.Create(17); + SecP521R1Field.Inv(((SecP521R1FieldElement)b).x, z); + SecP521R1Field.Multiply(z, x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Negate() + { + uint[] z = Nat.Create(17); + SecP521R1Field.Negate(x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Square() + { + uint[] z = Nat.Create(17); + SecP521R1Field.Square(x, z); + return new SecP521R1FieldElement(z); + } + + public override ECFieldElement Invert() + { + uint[] z = Nat.Create(17); + SecP521R1Field.Inv(x, z); + return new SecP521R1FieldElement(z); + } + + /** + * return a sqrt root - the routine verifies that the calculation returns the right value - if + * none exists it returns null. + */ + public override ECFieldElement Sqrt() + { + // Raise this element to the exponent 2^519 + + uint[] x1 = this.x; + if (Nat.IsZero(17, x1) || Nat.IsOne(17, x1)) + return this; + + uint[] tt0 = Nat.Create(33); + uint[] t1 = Nat.Create(17); + uint[] t2 = Nat.Create(17); + + SecP521R1Field.SquareN(x1, 519, t1, tt0); + SecP521R1Field.Square(t1, t2, tt0); + + return Nat.Eq(17, x1, t2) ? new SecP521R1FieldElement(t1) : null; + } + + public override bool Equals(object obj) + { + return Equals(obj as SecP521R1FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecP521R1FieldElement); + } + + public virtual bool Equals(SecP521R1FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat.Eq(17, x, other.x); + } + + public override int GetHashCode() + { + return Q.GetHashCode() ^ Arrays.GetHashCode(x, 0, 17); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs.meta new file mode 100644 index 00000000..8a1bc3a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 73719211d2ddb71478864b545a92df18 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs new file mode 100644 index 00000000..013b8d44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs @@ -0,0 +1,247 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecP521R1Point + : AbstractFpPoint + { + internal SecP521R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecP521R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecP521R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + if (this == b) + return Twice(); + + ECCurve curve = this.Curve; + + SecP521R1FieldElement X1 = (SecP521R1FieldElement)this.RawXCoord, Y1 = (SecP521R1FieldElement)this.RawYCoord; + SecP521R1FieldElement X2 = (SecP521R1FieldElement)b.RawXCoord, Y2 = (SecP521R1FieldElement)b.RawYCoord; + + SecP521R1FieldElement Z1 = (SecP521R1FieldElement)this.RawZCoords[0]; + SecP521R1FieldElement Z2 = (SecP521R1FieldElement)b.RawZCoords[0]; + + uint[] tt0 = Nat.Create(33); + uint[] t1 = Nat.Create(17); + uint[] t2 = Nat.Create(17); + uint[] t3 = Nat.Create(17); + uint[] t4 = Nat.Create(17); + + bool Z1IsOne = Z1.IsOne; + uint[] U2, S2; + if (Z1IsOne) + { + U2 = X2.x; + S2 = Y2.x; + } + else + { + S2 = t3; + SecP521R1Field.Square(Z1.x, S2, tt0); + + U2 = t2; + SecP521R1Field.Multiply(S2, X2.x, U2, tt0); + + SecP521R1Field.Multiply(S2, Z1.x, S2, tt0); + SecP521R1Field.Multiply(S2, Y2.x, S2, tt0); + } + + bool Z2IsOne = Z2.IsOne; + uint[] U1, S1; + if (Z2IsOne) + { + U1 = X1.x; + S1 = Y1.x; + } + else + { + S1 = t4; + SecP521R1Field.Square(Z2.x, S1, tt0); + + U1 = t1; + SecP521R1Field.Multiply(S1, X1.x, U1, tt0); + + SecP521R1Field.Multiply(S1, Z2.x, S1, tt0); + SecP521R1Field.Multiply(S1, Y1.x, S1, tt0); + } + + uint[] H = Nat.Create(17); + SecP521R1Field.Subtract(U1, U2, H); + + uint[] R = t2; + SecP521R1Field.Subtract(S1, S2, R); + + // Check if b == this or b == -this + if (Nat.IsZero(17, H)) + { + if (Nat.IsZero(17, R)) + { + // this == b, i.e. this must be doubled + return this.Twice(); + } + + // this == -b, i.e. the result is the point at infinity + return curve.Infinity; + } + + uint[] HSquared = t3; + SecP521R1Field.Square(H, HSquared, tt0); + + uint[] G = Nat.Create(17); + SecP521R1Field.Multiply(HSquared, H, G, tt0); + + uint[] V = t3; + SecP521R1Field.Multiply(HSquared, U1, V, tt0); + + SecP521R1Field.Multiply(S1, G, t1, tt0); + + SecP521R1FieldElement X3 = new SecP521R1FieldElement(t4); + SecP521R1Field.Square(R, X3.x, tt0); + SecP521R1Field.Add(X3.x, G, X3.x); + SecP521R1Field.Subtract(X3.x, V, X3.x); + SecP521R1Field.Subtract(X3.x, V, X3.x); + + SecP521R1FieldElement Y3 = new SecP521R1FieldElement(G); + SecP521R1Field.Subtract(V, X3.x, Y3.x); + SecP521R1Field.Multiply(Y3.x, R, t2, tt0); + SecP521R1Field.Subtract(t2, t1, Y3.x); + + SecP521R1FieldElement Z3 = new SecP521R1FieldElement(H); + if (!Z1IsOne) + { + SecP521R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + if (!Z2IsOne) + { + SecP521R1Field.Multiply(Z3.x, Z2.x, Z3.x, tt0); + } + + ECFieldElement[] zs = new ECFieldElement[] { Z3 }; + + return new SecP521R1Point(curve, X3, Y3, zs); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecP521R1FieldElement Y1 = (SecP521R1FieldElement)this.RawYCoord; + if (Y1.IsZero) + return curve.Infinity; + + SecP521R1FieldElement X1 = (SecP521R1FieldElement)this.RawXCoord, Z1 = (SecP521R1FieldElement)this.RawZCoords[0]; + + uint[] tt0 = Nat.Create(33); + uint[] t1 = Nat.Create(17); + uint[] t2 = Nat.Create(17); + + uint[] Y1Squared = Nat.Create(17); + SecP521R1Field.Square(Y1.x, Y1Squared, tt0); + + uint[] T = Nat.Create(17); + SecP521R1Field.Square(Y1Squared, T, tt0); + + bool Z1IsOne = Z1.IsOne; + + uint[] Z1Squared = Z1.x; + if (!Z1IsOne) + { + Z1Squared = t2; + SecP521R1Field.Square(Z1.x, Z1Squared, tt0); + } + + SecP521R1Field.Subtract(X1.x, Z1Squared, t1); + + uint[] M = t2; + SecP521R1Field.Add(X1.x, Z1Squared, M); + SecP521R1Field.Multiply(M, t1, M, tt0); + Nat.AddBothTo(17, M, M, M); + SecP521R1Field.Reduce23(M); + + uint[] S = Y1Squared; + SecP521R1Field.Multiply(Y1Squared, X1.x, S, tt0); + Nat.ShiftUpBits(17, S, 2, 0); + SecP521R1Field.Reduce23(S); + + Nat.ShiftUpBits(17, T, 3, 0, t1); + SecP521R1Field.Reduce23(t1); + + SecP521R1FieldElement X3 = new SecP521R1FieldElement(T); + SecP521R1Field.Square(M, X3.x, tt0); + SecP521R1Field.Subtract(X3.x, S, X3.x); + SecP521R1Field.Subtract(X3.x, S, X3.x); + + SecP521R1FieldElement Y3 = new SecP521R1FieldElement(S); + SecP521R1Field.Subtract(S, X3.x, Y3.x); + SecP521R1Field.Multiply(Y3.x, M, Y3.x, tt0); + SecP521R1Field.Subtract(Y3.x, t1, Y3.x); + + SecP521R1FieldElement Z3 = new SecP521R1FieldElement(M); + SecP521R1Field.Twice(Y1.x, Z3.x); + if (!Z1IsOne) + { + SecP521R1Field.Multiply(Z3.x, Z1.x, Z3.x, tt0); + } + + return new SecP521R1Point(curve, X3, Y3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this == b) + return ThreeTimes(); + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECFieldElement Y1 = this.RawYCoord; + if (Y1.IsZero) + return b; + + return Twice().Add(b); + } + + public override ECPoint ThreeTimes() + { + if (this.IsInfinity || this.RawYCoord.IsZero) + return this; + + // NOTE: Be careful about recursions between TwicePlus and ThreeTimes + return Twice().Add(this); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + return new SecP521R1Point(Curve, RawXCoord, RawYCoord.Negate(), RawZCoords); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs.meta new file mode 100644 index 00000000..466294cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 77dc65b2bbfe6844998b80472bf5e90d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecP521R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs new file mode 100644 index 00000000..26061d72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs @@ -0,0 +1,268 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113Field + { + private const ulong M49 = ulong.MaxValue >> 15; + private const ulong M57 = ulong.MaxValue >> 7; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(113, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat128.CreateExt64(); + + Nat128.Copy64(x, z); + for (int i = 1; i < 113; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat128.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion + + ulong[] t0 = Nat128.Create64(); + ulong[] t1 = Nat128.Create64(); + + Square(x, t0); + Multiply(t0, x, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 3, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 7, t0); + Multiply(t0, t1, t0); + SquareN(t0, 14, t1); + Multiply(t1, t0, t1); + SquareN(t1, 28, t0); + Multiply(t0, t1, t0); + SquareN(t0, 56, t1); + Multiply(t1, t0, t1); + Square(t1, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3]; + + x1 ^= (x3 << 15) ^ (x3 << 24); + x2 ^= (x3 >> 49) ^ (x3 >> 40); + + x0 ^= (x2 << 15) ^ (x2 << 24); + x1 ^= (x2 >> 49) ^ (x2 >> 40); + + ulong t = x1 >> 49; + z[0] = x0 ^ t ^ (t << 9); + z[1] = x1 & M49; + } + + public static void Reduce15(ulong[] z, int zOff) + { + ulong z1 = z[zOff + 1], t = z1 >> 49; + z[zOff ] ^= t ^ (t << 9); + z[zOff + 1] = z1 & M49; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong c0 = Interleave.Unshuffle(x[0], x[1], out ulong e0); + + z[0] = e0 ^ (c0 << 57) ^ (c0 << 5); + z[1] = (c0 >> 7) ^ (c0 >> 59); + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat128.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat128.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat128.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0 + return (uint)(x[0]) & 1U; + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var Y01 = Vector128.Create(y[0], y[1]); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1); + return; + } +#endif + + /* + * "Three-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong f0 = x[0], f1 = x[1]; + f1 = ((f0 >> 57) ^ (f1 << 7)) & M57; + f0 &= M57; + + ulong g0 = y[0], g1 = y[1]; + g1 = ((g0 >> 57) ^ (g1 << 7)) & M57; + g0 &= M57; + + ulong[] u = zz; + ulong[] H = new ulong[6]; + + ImplMulw(u, f0, g0, H, 0); // H(0) 57/56 bits + ImplMulw(u, f1, g1, H, 2); // H(INF) 57/54 bits + ImplMulw(u, f0 ^ f1, g0 ^ g1, H, 4); // H(1) 57/56 bits + + ulong r = H[1] ^ H[2]; + ulong z0 = H[0], + z3 = H[3], + z1 = H[4] ^ z0 ^ r, + z2 = H[5] ^ z3 ^ r; + + zz[0] = z0 ^ (z1 << 57); + zz[1] = (z1 >> 7) ^ (z2 << 50); + zz[2] = (z2 >> 14) ^ (z3 << 43); + zz[3] = (z3 >> 21); + } + + protected static void ImplMulw(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 57 == 0); + Debug.Assert(y >> 57 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7]; + int k = 48; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 9) > 0); + + h ^= ((x & 0x0100804020100800UL) & (ulong)(((long)y << 7) >> 63)) >> 8; + + Debug.Assert(h >> 49 == 0); + + z[zOff ] = l & M57; + z[zOff + 1] = (l >> 57) ^ (h << 7); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 2, zz, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs.meta new file mode 100644 index 00000000..81b0effe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3eb562b46a3b97b4881a60f1e039324b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs new file mode 100644 index 00000000..0c03dd20 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT113FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 113) + throw new ArgumentException("value invalid for SecT113FieldElement", "x"); + + this.x = SecT113Field.FromBigInteger(x); + } + + public SecT113FieldElement() + { + this.x = Nat128.Create64(); + } + + protected internal SecT113FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat128.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat128.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1L) != 0L; + } + + public override BigInteger ToBigInteger() + { + return Nat128.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT113Field"; } + } + + public override int FieldSize + { + get { return 113; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat128.Create64(); + SecT113Field.Add(x, ((SecT113FieldElement)b).x, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat128.Create64(); + SecT113Field.AddOne(x, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and Subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat128.Create64(); + SecT113Field.Multiply(x, ((SecT113FieldElement)b).x, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT113FieldElement)b).x; + ulong[] xx = ((SecT113FieldElement)x).x, yx = ((SecT113FieldElement)y).x; + + ulong[] tt = Nat128.CreateExt64(); + SecT113Field.MultiplyAddToExt(ax, bx, tt); + SecT113Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat128.Create64(); + SecT113Field.Reduce(tt, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat128.Create64(); + SecT113Field.Square(x, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT113FieldElement)x).x, yx = ((SecT113FieldElement)y).x; + + ulong[] tt = Nat128.CreateExt64(); + SecT113Field.SquareAddToExt(ax, tt); + SecT113Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat128.Create64(); + SecT113Field.Reduce(tt, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat128.Create64(); + SecT113Field.SquareN(x, pow, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat128.Create64(); + SecT113Field.HalfTrace(x, z); + return new SecT113FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT113Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat128.Create64(); + SecT113Field.Invert(x, z); + return new SecT113FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat128.Create64(); + SecT113Field.Sqrt(x, z); + return new SecT113FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Tpb; } + } + + public virtual int M + { + get { return 113; } + } + + public virtual int K1 + { + get { return 9; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT113FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT113FieldElement); + } + + public virtual bool Equals(SecT113FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat128.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 113009 ^ Arrays.GetHashCode(x, 0, 2); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs.meta new file mode 100644 index 00000000..ccff1e99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a255e1868a41c71489b621c339f9efc9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs new file mode 100644 index 00000000..2e155e8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113R1Curve + : AbstractF2mCurve + { + private const int SECT113R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT113R1_FE_LONGS = 2; + private static readonly ECFieldElement[] SECT113R1_AFFINE_ZS = new ECFieldElement[] { new SecT113FieldElement(BigInteger.One) }; + + protected readonly SecT113R1Point m_infinity; + + public SecT113R1Curve() + : base(113, 9, 0, 0) + { + this.m_infinity = new SecT113R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("003088250CA6E7C7FE649CE85820F7"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("00E8BEE4D3E2260744188BE0E9C723"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0100000000000000D9CCEC8A39E56F")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT113R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT113R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 113; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT113FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT113R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT113R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 113; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 9; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT113R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat128.Copy64(((SecT113FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT113R1_FE_LONGS; + Nat128.Copy64(((SecT113FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT113R1_FE_LONGS; + } + } + + return new SecT113R1LookupTable(this, table, len); + } + + private class SecT113R1LookupTable + : AbstractECLookupTable + { + private readonly SecT113R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT113R1LookupTable(SecT113R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat128.Create64(), y = Nat128.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT113R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT113R1_FE_LONGS + j] & MASK; + } + + pos += (SECT113R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat128.Create64(), y = Nat128.Create64(); + int pos = index * SECT113R1_FE_LONGS * 2; + + for (int j = 0; j < SECT113R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT113R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT113FieldElement(x), new SecT113FieldElement(y), SECT113R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs.meta new file mode 100644 index 00000000..777e5ff3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1e0feb09d3219204ab471cb17b392ed2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs new file mode 100644 index 00000000..6420abb6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs @@ -0,0 +1,272 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113R1Point + : AbstractF2mPoint + { + internal SecT113R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT113R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT113R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT113R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT113R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT113R1Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT113R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT113R1Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT113R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT113R1Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT113R1Point(Curve, X, L.Add(Z), new ECFieldElement[]{ Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs.meta new file mode 100644 index 00000000..3ce3e2bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bf0ae970b9cc6a14e85ac795592b81c8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs new file mode 100644 index 00000000..936ffce4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113R2Curve + : AbstractF2mCurve + { + private const int SECT113R2_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT113R2_FE_LONGS = 2; + private static readonly ECFieldElement[] SECT113R2_AFFINE_ZS = new ECFieldElement[] { new SecT113FieldElement(BigInteger.One) }; + + protected readonly SecT113R2Point m_infinity; + + public SecT113R2Curve() + : base(113, 9, 0, 0) + { + this.m_infinity = new SecT113R2Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("00689918DBEC7E5A0DD6DFC0AA55C7"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0095E9A9EC9B297BD4BF36E059184F"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("010000000000000108789B2496AF93")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT113R2_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT113R2Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 113; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT113FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT113R2Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT113R2Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 113; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 9; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT113R2_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat128.Copy64(((SecT113FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT113R2_FE_LONGS; + Nat128.Copy64(((SecT113FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT113R2_FE_LONGS; + } + } + + return new SecT113R2LookupTable(this, table, len); + } + + private class SecT113R2LookupTable + : AbstractECLookupTable + { + private readonly SecT113R2Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT113R2LookupTable(SecT113R2Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat128.Create64(), y = Nat128.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT113R2_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT113R2_FE_LONGS + j] & MASK; + } + + pos += (SECT113R2_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat128.Create64(), y = Nat128.Create64(); + int pos = index * SECT113R2_FE_LONGS * 2; + + for (int j = 0; j < SECT113R2_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT113R2_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT113FieldElement(x), new SecT113FieldElement(y), SECT113R2_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs.meta new file mode 100644 index 00000000..55743ef0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 53525b2ce8b447e4e918aeb1363c87d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs new file mode 100644 index 00000000..2667e7cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs @@ -0,0 +1,282 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT113R2Point + : AbstractF2mPoint + { + internal SecT113R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT113R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT113R2Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + { + return b; + } + if (b.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT113R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT113R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT113R2Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT113R2Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT113R2Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + { + return b; + } + if (b.IsInfinity) + { + return Twice(); + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT113R2Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT113R2Point(curve, X3, L3, new ECFieldElement[]{ Z3 }); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT113R2Point(Curve, X, L.Add(Z), new ECFieldElement[]{ Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs.meta new file mode 100644 index 00000000..03aa124d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0529b745f7491f24b8fb2634906513aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT113R2Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs new file mode 100644 index 00000000..33da5a01 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs @@ -0,0 +1,380 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131Field + { + private const ulong M03 = ulong.MaxValue >> 61; + private const ulong M44 = ulong.MaxValue >> 20; + + private static readonly ulong[] ROOT_Z = new ulong[]{ 0x26BC4D789AF13523UL, 0x26BC4D789AF135E2UL, 0x6UL }; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(131, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(5); + + Nat192.Copy64(x, z); + for (int i = 1; i < 131; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat192.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion + + ulong[] t0 = Nat192.Create64(); + ulong[] t1 = Nat192.Create64(); + + Square(x, t0); + Multiply(t0, x, t0); + SquareN(t0, 2, t1); + Multiply(t1, t0, t1); + SquareN(t1, 4, t0); + Multiply(t0, t1, t0); + SquareN(t0, 8, t1); + Multiply(t1, t0, t1); + SquareN(t1, 16, t0); + Multiply(t0, t1, t0); + SquareN(t0, 32, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 65, t0); + Multiply(t0, t1, t0); + Square(t0, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3], x4 = xx[4]; + + x1 ^= (x4 << 61) ^ (x4 << 63); + x2 ^= (x4 >> 3) ^ (x4 >> 1) ^ x4 ^ (x4 << 5); + x3 ^= (x4 >> 59); + + x0 ^= (x3 << 61) ^ (x3 << 63); + x1 ^= (x3 >> 3) ^ (x3 >> 1) ^ x3 ^ (x3 << 5); + x2 ^= (x3 >> 59); + + ulong t = x2 >> 3; + z[0] = x0 ^ t ^ (t << 2) ^ (t << 3) ^ (t << 8); + z[1] = x1 ^ (t >> 56); + z[2] = x2 & M03; + } + + public static void Reduce61(ulong[] z, int zOff) + { + ulong z2 = z[zOff + 2], t = z2 >> 3; + z[zOff ] ^= t ^ (t << 2) ^ (t << 3) ^ (t << 8); + z[zOff + 1] ^= (t >> 56); + z[zOff + 2] = z2 & M03; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong[] odd = Nat192.Create64(); + + odd[0] = Interleave.Unshuffle(x[0], x[1], out ulong e0); + odd[1] = Interleave.Unshuffle(x[2] , out ulong e1); + + Multiply(odd, ROOT_Z, z); + + z[0] ^= e0; + z[1] ^= e1; + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(5); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat.Create64(5); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat.Create64(5); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 123, 129 + return (uint)(x[0] ^ (x[1] >> 59) ^ (x[2] >> 1)) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4], z5 = zz[5]; + zz[0] = z0 ^ (z1 << 44); + zz[1] = (z1 >> 20) ^ (z2 << 24); + zz[2] = (z2 >> 40) ^ (z3 << 4) + ^ (z4 << 48); + zz[3] = (z3 >> 60) ^ (z5 << 28) + ^ (z4 >> 16); + zz[4] = (z5 >> 36); + zz[5] = 0; + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X2_ = Vector128.CreateScalar(x[2]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y2_ = Vector128.CreateScalar(y[2]); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x00))); + var Z34 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x01), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x10)); + var Z4_ = Pclmulqdq.CarrylessMultiply(X2_, Y2_, 0x00); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ Z34.GetElement(0); + zz[4] = Z4_.GetElement(0) ^ Z34.GetElement(1); + return; + } +#endif + + /* + * "Five-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong f0 = x[0], f1 = x[1], f2 = x[2]; + f2 = ((f1 >> 24) ^ (f2 << 40)) & M44; + f1 = ((f0 >> 44) ^ (f1 << 20)) & M44; + f0 &= M44; + + ulong g0 = y[0], g1 = y[1], g2 = y[2]; + g2 = ((g1 >> 24) ^ (g2 << 40)) & M44; + g1 = ((g0 >> 44) ^ (g1 << 20)) & M44; + g0 &= M44; + + ulong[] u = zz; + ulong[] H = new ulong[10]; + + ImplMulw(u, f0, g0, H, 0); // H(0) 44/43 bits + ImplMulw(u, f2, g2, H, 2); // H(INF) 44/41 bits + + ulong t0 = f0 ^ f1 ^ f2; + ulong t1 = g0 ^ g1 ^ g2; + + ImplMulw(u, t0, t1, H, 4); // H(1) 44/43 bits + + ulong t2 = (f1 << 1) ^ (f2 << 2); + ulong t3 = (g1 << 1) ^ (g2 << 2); + + ImplMulw(u, f0 ^ t2, g0 ^ t3, H, 6); // H(t) 44/45 bits + ImplMulw(u, t0 ^ t2, t1 ^ t3, H, 8); // H(t + 1) 44/45 bits + + ulong t4 = H[6] ^ H[8]; + ulong t5 = H[7] ^ H[9]; + + Debug.Assert(t5 >> 44 == 0); + + // Calculate V + ulong v0 = (t4 << 1) ^ H[6]; + ulong v1 = t4 ^ (t5 << 1) ^ H[7]; + ulong v2 = t5; + + // Calculate U + ulong u0 = H[0]; + ulong u1 = H[1] ^ H[0] ^ H[4]; + ulong u2 = H[1] ^ H[5]; + + // Calculate W + ulong w0 = u0 ^ v0 ^ (H[2] << 4) ^ (H[2] << 1); + ulong w1 = u1 ^ v1 ^ (H[3] << 4) ^ (H[3] << 1); + ulong w2 = u2 ^ v2; + + // Propagate carries + w1 ^= (w0 >> 44); w0 &= M44; + w2 ^= (w1 >> 44); w1 &= M44; + + Debug.Assert((w0 & 1UL) == 0); + + // Divide W by t + + w0 = (w0 >> 1) ^ ((w1 & 1UL) << 43); + w1 = (w1 >> 1) ^ ((w2 & 1UL) << 43); + w2 = (w2 >> 1); + + // Divide W by (t + 1) + + w0 ^= (w0 << 1); + w0 ^= (w0 << 2); + w0 ^= (w0 << 4); + w0 ^= (w0 << 8); + w0 ^= (w0 << 16); + w0 ^= (w0 << 32); + + w0 &= M44; w1 ^= (w0 >> 43); + + w1 ^= (w1 << 1); + w1 ^= (w1 << 2); + w1 ^= (w1 << 4); + w1 ^= (w1 << 8); + w1 ^= (w1 << 16); + w1 ^= (w1 << 32); + + w1 &= M44; w2 ^= (w1 >> 43); + + w2 ^= (w2 << 1); + w2 ^= (w2 << 2); + w2 ^= (w2 << 4); + w2 ^= (w2 << 8); + w2 ^= (w2 << 16); + w2 ^= (w2 << 32); + + Debug.Assert(w2 >> 42 == 0); + + zz[0] = u0; + zz[1] = u1 ^ w0 ^ H[2]; + zz[2] = u2 ^ w1 ^ w0 ^ H[3]; + zz[3] = w2 ^ w1; + zz[4] = w2 ^ H[2]; + zz[5] = H[3]; + + ImplCompactExt(zz); + } + + protected static void ImplMulw(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 45 == 0); + Debug.Assert(y >> 45 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6 + ^ u[(j >> 9) & 7] << 9 + ^ u[(j >> 12) & 7] << 12; + int k = 30; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6 + ^ u[(j >> 9) & 7] << 9 + ^ u[(j >> 12) & 7] << 12; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 15) > 0); + + Debug.Assert(h >> 25 == 0); + + z[zOff ] = l & M44; + z[zOff + 1] = (l >> 44) ^ (h << 20); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 2, zz, 0); + zz[4] = Interleave.Expand8to16((uint)x[2]); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs.meta new file mode 100644 index 00000000..3b6775b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d66b34d04c4d7db4eaeab762a38ae5df +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs new file mode 100644 index 00000000..d6466cc0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT131FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 131) + throw new ArgumentException("value invalid for SecT131FieldElement", "x"); + + this.x = SecT131Field.FromBigInteger(x); + } + + public SecT131FieldElement() + { + this.x = Nat192.Create64(); + } + + protected internal SecT131FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat192.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat192.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat192.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT131Field"; } + } + + public override int FieldSize + { + get { return 131; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat192.Create64(); + SecT131Field.Add(x, ((SecT131FieldElement)b).x, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat192.Create64(); + SecT131Field.AddOne(x, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and Subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat192.Create64(); + SecT131Field.Multiply(x, ((SecT131FieldElement)b).x, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT131FieldElement)b).x; + ulong[] xx = ((SecT131FieldElement)x).x, yx = ((SecT131FieldElement)y).x; + + ulong[] tt = Nat.Create64(5); + SecT131Field.MultiplyAddToExt(ax, bx, tt); + SecT131Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat192.Create64(); + SecT131Field.Reduce(tt, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat192.Create64(); + SecT131Field.Square(x, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT131FieldElement)x).x, yx = ((SecT131FieldElement)y).x; + + ulong[] tt = Nat.Create64(5); + SecT131Field.SquareAddToExt(ax, tt); + SecT131Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat192.Create64(); + SecT131Field.Reduce(tt, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat192.Create64(); + SecT131Field.SquareN(x, pow, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat192.Create64(); + SecT131Field.HalfTrace(x, z); + return new SecT131FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT131Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat192.Create64(); + SecT131Field.Invert(x, z); + return new SecT131FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat192.Create64(); + SecT131Field.Sqrt(x, z); + return new SecT131FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Ppb; } + } + + public virtual int M + { + get { return 131; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 3; } + } + + public virtual int K3 + { + get { return 8; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT131FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT131FieldElement); + } + + public virtual bool Equals(SecT131FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat192.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 131832 ^ Arrays.GetHashCode(x, 0, 3); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs.meta new file mode 100644 index 00000000..1aa50aa9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: de24821ee75cbfc4d9c0c408109644a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs new file mode 100644 index 00000000..cc8f14b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131R1Curve + : AbstractF2mCurve + { + private const int SECT131R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT131R1_FE_LONGS = 3; + private static readonly ECFieldElement[] SECT131R1_AFFINE_ZS = new ECFieldElement[] { new SecT131FieldElement(BigInteger.One) }; + + protected readonly SecT131R1Point m_infinity; + + public SecT131R1Curve() + : base(131, 2, 3, 8) + { + this.m_infinity = new SecT131R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("07A11B09A76B562144418FF3FF8C2570B8"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0217C05610884B63B9C6C7291678F9D341"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0400000000000000023123953A9464B54D")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT131R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT131R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 131; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT131FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT131R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT131R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 131; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 3; } + } + + public virtual int K3 + { + get { return 8; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT131R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy64(((SecT131FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT131R1_FE_LONGS; + Nat192.Copy64(((SecT131FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT131R1_FE_LONGS; + } + } + + return new SecT131R1LookupTable(this, table, len); + } + + private class SecT131R1LookupTable + : AbstractECLookupTable + { + private readonly SecT131R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT131R1LookupTable(SecT131R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT131R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT131R1_FE_LONGS + j] & MASK; + } + + pos += (SECT131R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = index * SECT131R1_FE_LONGS * 2; + + for (int j = 0; j < SECT131R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT131R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT131FieldElement(x), new SecT131FieldElement(y), SECT131R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs.meta new file mode 100644 index 00000000..b750bf9c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 20ba945eb47d52f4a987159694624ec9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs new file mode 100644 index 00000000..34265639 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs @@ -0,0 +1,278 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131R1Point + : AbstractF2mPoint + { + internal SecT131R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT131R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT131R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT131R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT131R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT131R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT131R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT131R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + { + return b; + } + if (b.IsInfinity) + { + return Twice(); + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT131R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT131R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT131R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs.meta new file mode 100644 index 00000000..660b6fc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9939d6f4588c4e04194a7d82dc10cf8c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs new file mode 100644 index 00000000..3ded258d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131R2Curve + : AbstractF2mCurve + { + private const int SECT131R2_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT131R2_FE_LONGS = 3; + private static readonly ECFieldElement[] SECT131R2_AFFINE_ZS = new ECFieldElement[] { new SecT131FieldElement(BigInteger.One) }; + + protected readonly SecT131R2Point m_infinity; + + public SecT131R2Curve() + : base(131, 2, 3, 8) + { + this.m_infinity = new SecT131R2Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("03E5A88919D7CAFCBF415F07C2176573B2"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("04B8266A46C55657AC734CE38F018F2192"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("0400000000000000016954A233049BA98F")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT131R2_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT131R2Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override int FieldSize + { + get { return 131; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT131FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT131R2Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT131R2Point(this, x, y, zs); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 131; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 3; } + } + + public virtual int K3 + { + get { return 8; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT131R2_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy64(((SecT131FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT131R2_FE_LONGS; + Nat192.Copy64(((SecT131FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT131R2_FE_LONGS; + } + } + + return new SecT131R2LookupTable(this, table, len); + } + + private class SecT131R2LookupTable + : AbstractECLookupTable + { + private readonly SecT131R2Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT131R2LookupTable(SecT131R2Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT131R2_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT131R2_FE_LONGS + j] & MASK; + } + + pos += (SECT131R2_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = index * SECT131R2_FE_LONGS * 2; + + for (int j = 0; j < SECT131R2_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT131R2_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT131FieldElement(x), new SecT131FieldElement(y), SECT131R2_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs.meta new file mode 100644 index 00000000..4b56adbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 27d6ed6fb0669774d82663b329bfdab9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs new file mode 100644 index 00000000..4374fbd8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT131R2Point + : AbstractF2mPoint + { + internal SecT131R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT131R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT131R2Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT131R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT131R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT131R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT131R2Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT131R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT131R2Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT131R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT131R2Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs.meta new file mode 100644 index 00000000..7c7e2663 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c43362120ff276f4e87fc9ab6d0674d8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT131R2Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs new file mode 100644 index 00000000..72205b60 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs @@ -0,0 +1,385 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163Field + { + private const ulong M35 = ulong.MaxValue >> 29; + private const ulong M55 = ulong.MaxValue >> 9; + + private static readonly ulong[] ROOT_Z = new ulong[]{ 0xB6DB6DB6DB6DB6B0UL, 0x492492492492DB6DUL, 0x492492492UL }; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + zz[5] = xx[5] ^ yy[5]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(163, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat192.CreateExt64(); + + Nat192.Copy64(x, z); + for (int i = 1; i < 163; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat192.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion with bases { 2, 3 } + + ulong[] t0 = Nat192.Create64(); + ulong[] t1 = Nat192.Create64(); + + Square(x, t0); + + // 3 | 162 + SquareN(t0, 1, t1); + Multiply(t0, t1, t0); + SquareN(t1, 1, t1); + Multiply(t0, t1, t0); + + // 3 | 54 + SquareN(t0, 3, t1); + Multiply(t0, t1, t0); + SquareN(t1, 3, t1); + Multiply(t0, t1, t0); + + // 3 | 18 + SquareN(t0, 9, t1); + Multiply(t0, t1, t0); + SquareN(t1, 9, t1); + Multiply(t0, t1, t0); + + // 3 | 6 + SquareN(t0, 27, t1); + Multiply(t0, t1, t0); + SquareN(t1, 27, t1); + Multiply(t0, t1, t0); + + // 2 | 2 + SquareN(t0, 81, t1); + Multiply(t0, t1, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = new ulong[8]; + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3], x4 = xx[4], x5 = xx[5]; + + x2 ^= (x5 << 29) ^ (x5 << 32) ^ (x5 << 35) ^ (x5 << 36); + x3 ^= (x5 >> 35) ^ (x5 >> 32) ^ (x5 >> 29) ^ (x5 >> 28); + + x1 ^= (x4 << 29) ^ (x4 << 32) ^ (x4 << 35) ^ (x4 << 36); + x2 ^= (x4 >> 35) ^ (x4 >> 32) ^ (x4 >> 29) ^ (x4 >> 28); + + x0 ^= (x3 << 29) ^ (x3 << 32) ^ (x3 << 35) ^ (x3 << 36); + x1 ^= (x3 >> 35) ^ (x3 >> 32) ^ (x3 >> 29) ^ (x3 >> 28); + + ulong t = x2 >> 35; + z[0] = x0 ^ t ^ (t << 3) ^ (t << 6) ^ (t << 7); + z[1] = x1; + z[2] = x2 & M35; + } + + public static void Reduce29(ulong[] z, int zOff) + { + ulong z2 = z[zOff + 2], t = z2 >> 35; + z[zOff ] ^= t ^ (t << 3) ^ (t << 6) ^ (t << 7); + z[zOff + 2] = z2 & M35; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong[] odd = Nat192.Create64(); + + odd[0] = Interleave.Unshuffle(x[0], x[1], out ulong e0); + odd[1] = Interleave.Unshuffle(x[2] , out ulong e1); + + Multiply(odd, ROOT_Z, z); + + z[0] ^= e0; + z[1] ^= e1; + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat192.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat192.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat192.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 157 + return (uint)(x[0] ^ (x[2] >> 29)) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4], z5 = zz[5]; + zz[0] = z0 ^ (z1 << 55); + zz[1] = (z1 >> 9) ^ (z2 << 46); + zz[2] = (z2 >> 18) ^ (z3 << 37); + zz[3] = (z3 >> 27) ^ (z4 << 28); + zz[4] = (z4 >> 36) ^ (z5 << 19); + zz[5] = (z5 >> 45); + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X2_ = Vector128.CreateScalar(x[2]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y2_ = Vector128.CreateScalar(y[2]); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x00))); + var Z34 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x01), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x10)); + var Z45 = Pclmulqdq.CarrylessMultiply(X2_, Y2_, 0x00); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ Z34.GetElement(0); + zz[4] = Z45.GetElement(0) ^ Z34.GetElement(1); + zz[5] = Z45.GetElement(1); + return; + } +#endif + + /* + * "Five-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong f0 = x[0], f1 = x[1], f2 = x[2]; + f2 = ((f1 >> 46) ^ (f2 << 18)); + f1 = ((f0 >> 55) ^ (f1 << 9)) & M55; + f0 &= M55; + + ulong g0 = y[0], g1 = y[1], g2 = y[2]; + g2 = ((g1 >> 46) ^ (g2 << 18)); + g1 = ((g0 >> 55) ^ (g1 << 9)) & M55; + g0 &= M55; + + ulong[] u = zz; + ulong[] H = new ulong[10]; + + ImplMulw(u, f0, g0, H, 0); // H(0) 55/54 bits + ImplMulw(u, f2, g2, H, 2); // H(INF) 55/50 bits + + ulong t0 = f0 ^ f1 ^ f2; + ulong t1 = g0 ^ g1 ^ g2; + + ImplMulw(u, t0, t1, H, 4); // H(1) 55/54 bits + + ulong t2 = (f1 << 1) ^ (f2 << 2); + ulong t3 = (g1 << 1) ^ (g2 << 2); + + ImplMulw(u, f0 ^ t2, g0 ^ t3, H, 6); // H(t) 55/56 bits + ImplMulw(u, t0 ^ t2, t1 ^ t3, H, 8); // H(t + 1) 55/56 bits + + ulong t4 = H[6] ^ H[8]; + ulong t5 = H[7] ^ H[9]; + + Debug.Assert(t5 >> 55 == 0); + + // Calculate V + ulong v0 = (t4 << 1) ^ H[6]; + ulong v1 = t4 ^ (t5 << 1) ^ H[7]; + ulong v2 = t5; + + // Calculate U + ulong u0 = H[0]; + ulong u1 = H[1] ^ H[0] ^ H[4]; + ulong u2 = H[1] ^ H[5]; + + // Calculate W + ulong w0 = u0 ^ v0 ^ (H[2] << 4) ^ (H[2] << 1); + ulong w1 = u1 ^ v1 ^ (H[3] << 4) ^ (H[3] << 1); + ulong w2 = u2 ^ v2; + + // Propagate carries + w1 ^= (w0 >> 55); w0 &= M55; + w2 ^= (w1 >> 55); w1 &= M55; + + Debug.Assert((w0 & 1UL) == 0UL); + + // Divide W by t + + w0 = (w0 >> 1) ^ ((w1 & 1UL) << 54); + w1 = (w1 >> 1) ^ ((w2 & 1UL) << 54); + w2 = (w2 >> 1); + + // Divide W by (t + 1) + + w0 ^= (w0 << 1); + w0 ^= (w0 << 2); + w0 ^= (w0 << 4); + w0 ^= (w0 << 8); + w0 ^= (w0 << 16); + w0 ^= (w0 << 32); + + w0 &= M55; w1 ^= (w0 >> 54); + + w1 ^= (w1 << 1); + w1 ^= (w1 << 2); + w1 ^= (w1 << 4); + w1 ^= (w1 << 8); + w1 ^= (w1 << 16); + w1 ^= (w1 << 32); + + w1 &= M55; w2 ^= (w1 >> 54); + + w2 ^= (w2 << 1); + w2 ^= (w2 << 2); + w2 ^= (w2 << 4); + w2 ^= (w2 << 8); + w2 ^= (w2 << 16); + w2 ^= (w2 << 32); + + Debug.Assert(w2 >> 52 == 0); + + zz[0] = u0; + zz[1] = u1 ^ w0 ^ H[2]; + zz[2] = u2 ^ w1 ^ w0 ^ H[3]; + zz[3] = w2 ^ w1; + zz[4] = w2 ^ H[2]; + zz[5] = H[3]; + + ImplCompactExt(zz); + } + + protected static void ImplMulw(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 56 == 0); + Debug.Assert(y >> 56 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 3]; + int k = 47; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 9) > 0); + + Debug.Assert(h >> 47 == 0); + + z[zOff ] = l & M55; + z[zOff + 1] = (l >> 55) ^ (h << 9); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 3, zz, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs.meta new file mode 100644 index 00000000..863c189a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4f4fb74b83fa5bb4aa8155fc7a270faf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs new file mode 100644 index 00000000..e83f5616 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT163FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 163) + throw new ArgumentException("value invalid for SecT163FieldElement", "x"); + + this.x = SecT163Field.FromBigInteger(x); + } + + public SecT163FieldElement() + { + this.x = Nat192.Create64(); + } + + protected internal SecT163FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat192.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat192.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1L) != 0L; + } + + public override BigInteger ToBigInteger() + { + return Nat192.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT163Field"; } + } + + public override int FieldSize + { + get { return 163; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat192.Create64(); + SecT163Field.Add(x, ((SecT163FieldElement)b).x, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat192.Create64(); + SecT163Field.AddOne(x, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat192.Create64(); + SecT163Field.Multiply(x, ((SecT163FieldElement)b).x, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT163FieldElement)b).x; + ulong[] xx = ((SecT163FieldElement)x).x, yx = ((SecT163FieldElement)y).x; + + ulong[] tt = Nat192.CreateExt64(); + SecT163Field.MultiplyAddToExt(ax, bx, tt); + SecT163Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat192.Create64(); + SecT163Field.Reduce(tt, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat192.Create64(); + SecT163Field.Square(x, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT163FieldElement)x).x, yx = ((SecT163FieldElement)y).x; + + ulong[] tt = Nat192.CreateExt64(); + SecT163Field.SquareAddToExt(ax, tt); + SecT163Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat192.Create64(); + SecT163Field.Reduce(tt, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat192.Create64(); + SecT163Field.SquareN(x, pow, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat192.Create64(); + SecT163Field.HalfTrace(x, z); + return new SecT163FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT163Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat192.Create64(); + SecT163Field.Invert(x, z); + return new SecT163FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat192.Create64(); + SecT163Field.Sqrt(x, z); + return new SecT163FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Ppb; } + } + + public virtual int M + { + get { return 163; } + } + + public virtual int K1 + { + get { return 3; } + } + + public virtual int K2 + { + get { return 6; } + } + + public virtual int K3 + { + get { return 7; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT163FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT163FieldElement); + } + + public virtual bool Equals(SecT163FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat192.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 163763 ^ Arrays.GetHashCode(x, 0, 3); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs.meta new file mode 100644 index 00000000..b7317a4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ac8a95934acf9d94f8ffd7bb3d0eb3f5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs new file mode 100644 index 00000000..87553a71 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163K1Curve + : AbstractF2mCurve + { + private const int SECT163K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT163K1_FE_LONGS = 3; + private static readonly ECFieldElement[] SECT163K1_AFFINE_ZS = new ECFieldElement[] { new SecT163FieldElement(BigInteger.One) }; + + protected readonly SecT163K1Point m_infinity; + + public SecT163K1Curve() + : base(163, 3, 6, 7) + { + this.m_infinity = new SecT163K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = this.m_a; + this.m_order = new BigInteger(1, Hex.DecodeStrict("04000000000000000000020108A2E0CC0D99F8A5EF")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT163K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT163K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 163; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT163FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT163K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT163K1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 163; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 3; } + } + + public virtual int K2 + { + get { return 6; } + } + + public virtual int K3 + { + get { return 7; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT163K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy64(((SecT163FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT163K1_FE_LONGS; + Nat192.Copy64(((SecT163FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT163K1_FE_LONGS; + } + } + + return new SecT163K1LookupTable(this, table, len); + } + + private class SecT163K1LookupTable + : AbstractECLookupTable + { + private readonly SecT163K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT163K1LookupTable(SecT163K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT163K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT163K1_FE_LONGS + j] & MASK; + } + + pos += (SECT163K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = index * SECT163K1_FE_LONGS * 2; + + for (int j = 0; j < SECT163K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT163K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT163FieldElement(x), new SecT163FieldElement(y), SECT163K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs.meta new file mode 100644 index 00000000..c54a1054 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aeae331b7c220d74f995557a3699de39 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs new file mode 100644 index 00000000..0f2ab008 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs @@ -0,0 +1,272 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163K1Point + : AbstractF2mPoint + { + internal SecT163K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT163K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT163K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT163K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT163K1Point(curve, X3, curve.B); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT163K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T = L1.Square().Add(L1Z1).Add(Z1Sq); + if (T.IsZero) + { + return new SecT163K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(X3); + + return new SecT163K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT163K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT163K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT163K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs.meta new file mode 100644 index 00000000..9f714530 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 294acff3e45d3914ba2b03467a7f5207 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs new file mode 100644 index 00000000..906bc5cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163R1Curve + : AbstractF2mCurve + { + private const int SECT163R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT163R1_FE_LONGS = 3; + private static readonly ECFieldElement[] SECT163R1_AFFINE_ZS = new ECFieldElement[] { new SecT163FieldElement(BigInteger.One) }; + + protected readonly SecT163R1Point m_infinity; + + public SecT163R1Curve() + : base(163, 3, 6, 7) + { + this.m_infinity = new SecT163R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("07B6882CAAEFA84F9554FF8428BD88E246D2782AE2"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0713612DCDDCB40AAB946BDA29CA91F73AF958AFD9"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("03FFFFFFFFFFFFFFFFFFFF48AAB689C29CA710279B")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT163R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT163R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 163; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT163FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT163R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT163R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 163; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 3; } + } + + public virtual int K2 + { + get { return 6; } + } + + public virtual int K3 + { + get { return 7; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT163R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy64(((SecT163FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT163R1_FE_LONGS; + Nat192.Copy64(((SecT163FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT163R1_FE_LONGS; + } + } + + return new SecT163R1LookupTable(this, table, len); + } + + private class SecT163R1LookupTable + : AbstractECLookupTable + { + private readonly SecT163R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT163R1LookupTable(SecT163R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT163R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT163R1_FE_LONGS + j] & MASK; + } + + pos += (SECT163R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = index * SECT163R1_FE_LONGS * 2; + + for (int j = 0; j < SECT163R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT163R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT163FieldElement(x), new SecT163FieldElement(y), SECT163R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs.meta new file mode 100644 index 00000000..7235d109 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 699621b289f768c40a85b3859fbcc6d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs new file mode 100644 index 00000000..801fa157 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163R1Point + : AbstractF2mPoint + { + internal SecT163R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT163R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT163R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT163R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT163R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT163R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT163R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT163R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT163R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT163R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT163R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs.meta new file mode 100644 index 00000000..b57de601 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ff0d049d8b682f94aa16f8e8d1e8e100 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs new file mode 100644 index 00000000..0cab3fe7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163R2Curve + : AbstractF2mCurve + { + private const int SECT163R2_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT163R2_FE_LONGS = 3; + private static readonly ECFieldElement[] SECT163R2_AFFINE_ZS = new ECFieldElement[] { new SecT163FieldElement(BigInteger.One) }; + + protected readonly SecT163R2Point m_infinity; + + public SecT163R2Curve() + : base(163, 3, 6, 7) + { + this.m_infinity = new SecT163R2Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("020A601907B8C953CA1481EB10512F78744A3205FD"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("040000000000000000000292FE77E70C12A4234C33")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT163R2_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT163R2Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 163; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT163FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT163R2Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT163R2Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 163; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 3; } + } + + public virtual int K2 + { + get { return 6; } + } + + public virtual int K3 + { + get { return 7; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT163R2_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat192.Copy64(((SecT163FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT163R2_FE_LONGS; + Nat192.Copy64(((SecT163FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT163R2_FE_LONGS; + } + } + + return new SecT163R2LookupTable(this, table, len); + } + + private class SecT163R2LookupTable + : AbstractECLookupTable + { + private readonly SecT163R2Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT163R2LookupTable(SecT163R2Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT163R2_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT163R2_FE_LONGS + j] & MASK; + } + + pos += (SECT163R2_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat192.Create64(), y = Nat192.Create64(); + int pos = index * SECT163R2_FE_LONGS * 2; + + for (int j = 0; j < SECT163R2_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT163R2_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT163FieldElement(x), new SecT163FieldElement(y), SECT163R2_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs.meta new file mode 100644 index 00000000..27330cd9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1532cfddec611e84c8f18441cdddde03 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs new file mode 100644 index 00000000..d6f4aafc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs @@ -0,0 +1,277 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT163R2Point + : AbstractF2mPoint + { + internal SecT163R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT163R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT163R2Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + { + return Twice(); + } + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT163R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT163R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT163R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T = L1.Square().Add(L1Z1).Add(Z1Sq); + if (T.IsZero) + { + return new SecT163R2Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT163R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + { + return b; + } + if (b.IsInfinity) + { + return Twice(); + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT163R2Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT163R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT163R2Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs.meta new file mode 100644 index 00000000..cef5d6ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 13bd12e6894db0744aa8a466a32bf3d3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT163R2Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs new file mode 100644 index 00000000..2701ebee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs @@ -0,0 +1,360 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193Field + { + private const ulong M01 = 1UL; + private const ulong M49 = ulong.MaxValue >> 15; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + z[3] = x[3] ^ y[3]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + zz[5] = xx[5] ^ yy[5]; + zz[6] = xx[6] ^ yy[6]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + z[3] ^= x[3]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(193, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + + Nat256.Copy64(x, z); + for (int i = 1; i < 193; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat256.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion with bases { 2, 3 } + + ulong[] t0 = Nat256.Create64(); + ulong[] t1 = Nat256.Create64(); + + Square(x, t0); + + // 3 | 192 + SquareN(t0, 1, t1); + Multiply(t0, t1, t0); + SquareN(t1, 1, t1); + Multiply(t0, t1, t0); + + // 2 | 64 + SquareN(t0, 3, t1); + Multiply(t0, t1, t0); + + // 2 | 32 + SquareN(t0, 6, t1); + Multiply(t0, t1, t0); + + // 2 | 16 + SquareN(t0, 12, t1); + Multiply(t0, t1, t0); + + // 2 | 8 + SquareN(t0, 24, t1); + Multiply(t0, t1, t0); + + // 2 | 4 + SquareN(t0, 48, t1); + Multiply(t0, t1, t0); + + // 2 | 2 + SquareN(t0, 96, t1); + Multiply(t0, t1, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3], x4 = xx[4], x5 = xx[5], x6 = xx[6]; + + x2 ^= (x6 << 63); + x3 ^= (x6 >> 1) ^ (x6 << 14); + x4 ^= (x6 >> 50); + + x1 ^= (x5 << 63); + x2 ^= (x5 >> 1) ^ (x5 << 14); + x3 ^= (x5 >> 50); + + x0 ^= (x4 << 63); + x1 ^= (x4 >> 1) ^ (x4 << 14); + x2 ^= (x4 >> 50); + + ulong t = x3 >> 1; + z[0] = x0 ^ t ^ (t << 15); + z[1] = x1 ^ (t >> 49); + z[2] = x2; + z[3] = x3 & M01; + } + + public static void Reduce63(ulong[] z, int zOff) + { + ulong z3 = z[zOff + 3], t = z3 >> 1; + z[zOff ] ^= t ^ (t << 15); + z[zOff + 1] ^= (t >> 49); + z[zOff + 3] = z3 & M01; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong c0 = Interleave.Unshuffle(x[0], x[1], out ulong e0); + ulong c1 = Interleave.Unshuffle(x[2] , out ulong e1); + e1 ^= x[3] << 32; + + z[0] = e0 ^ (c0 << 8); + z[1] = e1 ^ (c1 << 8) ^ (c0 >> 56) ^ (c0 << 33); + z[2] = (c1 >> 56) ^ (c1 << 33) ^ (c0 >> 31); + z[3] = (c1 >> 31); + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0 + return (uint)(x[0]) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4], z5 = zz[5], z6 = zz[6], z7 = zz[7]; + zz[0] = z0 ^ (z1 << 49); + zz[1] = (z1 >> 15) ^ (z2 << 34); + zz[2] = (z2 >> 30) ^ (z3 << 19); + zz[3] = (z3 >> 45) ^ (z4 << 4) + ^ (z5 << 53); + zz[4] = (z4 >> 60) ^ (z6 << 38) + ^ (z5 >> 11); + zz[5] = (z6 >> 26) ^ (z7 << 23); + zz[6] = (z7 >> 41); + zz[7] = 0; + } + + protected static void ImplExpand(ulong[] x, ulong[] z) + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + z[0] = x0 & M49; + z[1] = ((x0 >> 49) ^ (x1 << 15)) & M49; + z[2] = ((x1 >> 34) ^ (x2 << 30)) & M49; + z[3] = ((x2 >> 19) ^ (x3 << 45)); + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X2_ = Vector128.CreateScalar(x[2]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y2_ = Vector128.CreateScalar(y[2]); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x00))); + var Z34 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y2_, 0x01), + Pclmulqdq.CarrylessMultiply(X2_, Y01, 0x10)); + var Z45 = Pclmulqdq.CarrylessMultiply(X2_, Y2_, 0x00); + + ulong X3M = 0UL - x[3]; + ulong Y3M = 0UL - y[3]; + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ Z34.GetElement(0) ^ (X3M & y[0]) ^ (x[0] & Y3M); + zz[4] = Z45.GetElement(0) ^ Z34.GetElement(1) ^ (X3M & y[1]) ^ (x[1] & Y3M); + zz[5] = Z45.GetElement(1) ^ (X3M & y[2]) ^ (x[2] & Y3M); + zz[6] = X3M & y[3]; + return; + } +#endif + + /* + * "Two-level seven-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong[] f = new ulong[4], g = new ulong[4]; + ImplExpand(x, f); + ImplExpand(y, g); + + ulong[] u = new ulong[8]; + + ImplMulwAcc(u, f[0], g[0], zz, 0); + ImplMulwAcc(u, f[1], g[1], zz, 1); + ImplMulwAcc(u, f[2], g[2], zz, 2); + ImplMulwAcc(u, f[3], g[3], zz, 3); + + // U *= (1 - t^n) + for (int i = 5; i > 0; --i) + { + zz[i] ^= zz[i - 1]; + } + + ImplMulwAcc(u, f[0] ^ f[1], g[0] ^ g[1], zz, 1); + ImplMulwAcc(u, f[2] ^ f[3], g[2] ^ g[3], zz, 3); + + // V *= (1 - t^2n) + for (int i = 7; i > 1; --i) + { + zz[i] ^= zz[i - 2]; + } + + // Double-length recursion + { + ulong c0 = f[0] ^ f[2], c1 = f[1] ^ f[3]; + ulong d0 = g[0] ^ g[2], d1 = g[1] ^ g[3]; + ImplMulwAcc(u, c0 ^ c1, d0 ^ d1, zz, 3); + ulong[] t = new ulong[3]; + ImplMulwAcc(u, c0, d0, t, 0); + ImplMulwAcc(u, c1, d1, t, 1); + ulong t0 = t[0], t1 = t[1], t2 = t[2]; + zz[2] ^= t0; + zz[3] ^= t0 ^ t1; + zz[4] ^= t2 ^ t1; + zz[5] ^= t2; + } + + ImplCompactExt(zz); + } + + protected static void ImplMulwAcc(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 49 == 0); + Debug.Assert(y >> 49 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7] + ^ (u[(j >> 3) & 7] << 3); + int k = 36; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6 + ^ u[(j >> 9) & 7] << 9 + ^ u[(j >> 12) & 7] << 12; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 15) > 0); + + Debug.Assert(h >> 33 == 0); + + z[zOff ] ^= l & M49; + z[zOff + 1] ^= (l >> 49) ^ (h << 15); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 3, zz, 0); + zz[6] = (x[3] & M01); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs.meta new file mode 100644 index 00000000..4c1a15f7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa7a7ff5e335af849be378ea6622de6b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs new file mode 100644 index 00000000..2ff2d9fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT193FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 193) + throw new ArgumentException("value invalid for SecT193FieldElement", "x"); + + this.x = SecT193Field.FromBigInteger(x); + } + + public SecT193FieldElement() + { + this.x = Nat256.Create64(); + } + + protected internal SecT193FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat256.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat256.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT193Field"; } + } + + public override int FieldSize + { + get { return 193; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT193Field.Add(x, ((SecT193FieldElement)b).x, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat256.Create64(); + SecT193Field.AddOne(x, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and Subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT193Field.Multiply(x, ((SecT193FieldElement)b).x, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT193FieldElement)b).x; + ulong[] xx = ((SecT193FieldElement)x).x, yx = ((SecT193FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT193Field.MultiplyAddToExt(ax, bx, tt); + SecT193Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT193Field.Reduce(tt, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat256.Create64(); + SecT193Field.Square(x, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT193FieldElement)x).x, yx = ((SecT193FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT193Field.SquareAddToExt(ax, tt); + SecT193Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT193Field.Reduce(tt, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat256.Create64(); + SecT193Field.SquareN(x, pow, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat256.Create64(); + SecT193Field.HalfTrace(x, z); + return new SecT193FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT193Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat256.Create64(); + SecT193Field.Invert(x, z); + return new SecT193FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat256.Create64(); + SecT193Field.Sqrt(x, z); + return new SecT193FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Tpb; } + } + + public virtual int M + { + get { return 193; } + } + + public virtual int K1 + { + get { return 15; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT193FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT193FieldElement); + } + + public virtual bool Equals(SecT193FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 1930015 ^ Arrays.GetHashCode(x, 0, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs.meta new file mode 100644 index 00000000..719bb7fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1e0f14380ca7014498d56234cb332104 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs new file mode 100644 index 00000000..e2185901 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193R1Curve + : AbstractF2mCurve + { + private const int SECT193R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT193R1_FE_LONGS = 4; + private static readonly ECFieldElement[] SECT193R1_AFFINE_ZS = new ECFieldElement[] { new SecT193FieldElement(BigInteger.One) }; + + protected readonly SecT193R1Point m_infinity; + + public SecT193R1Curve() + : base(193, 15, 0, 0) + { + this.m_infinity = new SecT193R1Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0017858FEB7A98975169E171F77B4087DE098AC8A911DF7B01"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("00FDFB49BFE6C3A89FACADAA7A1E5BBC7CC1C2E5D831478814"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("01000000000000000000000000C7F34A778F443ACC920EBA49")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT193R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT193R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 193; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT193FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT193R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT193R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 193; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 15; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT193R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy64(((SecT193FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT193R1_FE_LONGS; + Nat256.Copy64(((SecT193FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT193R1_FE_LONGS; + } + } + + return new SecT193R1LookupTable(this, table, len); + } + + private class SecT193R1LookupTable + : AbstractECLookupTable + { + private readonly SecT193R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT193R1LookupTable(SecT193R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT193R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT193R1_FE_LONGS + j] & MASK; + } + + pos += (SECT193R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = index * SECT193R1_FE_LONGS * 2; + + for (int j = 0; j < SECT193R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT193R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT193FieldElement(x), new SecT193FieldElement(y), SECT193R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs.meta new file mode 100644 index 00000000..df53903e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 16935c38d1d70fd4aa04495465d980cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs new file mode 100644 index 00000000..7ef76483 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193R1Point + : AbstractF2mPoint + { + internal SecT193R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT193R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT193R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT193R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT193R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT193R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT193R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT193R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT193R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT193R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT193R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs.meta new file mode 100644 index 00000000..30b03d7a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9efc1dc49d6438e4ea7f4d7f3106bc7d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs new file mode 100644 index 00000000..b9b1346f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193R2Curve + : AbstractF2mCurve + { + private const int SECT193R2_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT193R2_FE_LONGS = 4; + private static readonly ECFieldElement[] SECT193R2_AFFINE_ZS = new ECFieldElement[] { new SecT193FieldElement(BigInteger.One) }; + + protected readonly SecT193R2Point m_infinity; + + public SecT193R2Curve() + : base(193, 15, 0, 0) + { + this.m_infinity = new SecT193R2Point(this, null, null); + + this.m_a = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0163F35A5137C2CE3EA6ED8667190B0BC43ECD69977702709B"))); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("00C9BB9E8927D4D64C377E2AB2856A5B16E3EFB7F61D4316AE"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("010000000000000000000000015AAB561B005413CCD4EE99D5")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT193R2_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT193R2Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 193; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT193FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT193R2Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT193R2Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 193; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 15; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT193R2_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy64(((SecT193FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT193R2_FE_LONGS; + Nat256.Copy64(((SecT193FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT193R2_FE_LONGS; + } + } + + return new SecT193R2LookupTable(this, table, len); + } + + private class SecT193R2LookupTable + : AbstractECLookupTable + { + private readonly SecT193R2Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT193R2LookupTable(SecT193R2Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT193R2_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT193R2_FE_LONGS + j] & MASK; + } + + pos += (SECT193R2_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = index * SECT193R2_FE_LONGS * 2; + + for (int j = 0; j < SECT193R2_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT193R2_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT193FieldElement(x), new SecT193FieldElement(y), SECT193R2_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs.meta new file mode 100644 index 00000000..65d12607 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9c24f341e331d845bf7529be5006930 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs new file mode 100644 index 00000000..212632bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT193R2Point + : AbstractF2mPoint + { + internal SecT193R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT193R2Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT193R2Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).Add(curve.A); + if (X3.IsZero) + { + return new SecT193R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT193R2Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT193R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement a = curve.A; + ECFieldElement aZ1Sq = Z1IsOne ? a : a.Multiply(Z1Sq); + ECFieldElement T = L1.Square().Add(L1Z1).Add(aZ1Sq); + if (T.IsZero) + { + return new SecT193R2Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT193R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = curve.A.Multiply(Z1Sq).Add(L1Sq).Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = curve.A.Add(L2plus1).Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT193R2Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT193R2Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT193R2Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs.meta new file mode 100644 index 00000000..e0974f34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bacc4bde8b609044db6ca6e47a576262 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT193R2Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs new file mode 100644 index 00000000..46db20a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs @@ -0,0 +1,383 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233Field + { + private const ulong M41 = ulong.MaxValue >> 23; + private const ulong M59 = ulong.MaxValue >> 5; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + z[3] = x[3] ^ y[3]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + zz[5] = xx[5] ^ yy[5]; + zz[6] = xx[6] ^ yy[6]; + zz[7] = xx[7] ^ yy[7]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + z[3] ^= x[3]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(233, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + + Nat256.Copy64(x, z); + for (int i = 1; i < 233; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat256.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion + + ulong[] t0 = Nat256.Create64(); + ulong[] t1 = Nat256.Create64(); + + Square(x, t0); + Multiply(t0, x, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 3, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 7, t0); + Multiply(t0, t1, t0); + SquareN(t0, 14, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 29, t0); + Multiply(t0, t1, t0); + SquareN(t0, 58, t1); + Multiply(t1, t0, t1); + SquareN(t1, 116, t0); + Multiply(t0, t1, t0); + Square(t0, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3]; + ulong x4 = xx[4], x5 = xx[5], x6 = xx[6], x7 = xx[7]; + + x3 ^= (x7 << 23); + x4 ^= (x7 >> 41) ^ (x7 << 33); + x5 ^= (x7 >> 31); + + x2 ^= (x6 << 23); + x3 ^= (x6 >> 41) ^ (x6 << 33); + x4 ^= (x6 >> 31); + + x1 ^= (x5 << 23); + x2 ^= (x5 >> 41) ^ (x5 << 33); + x3 ^= (x5 >> 31); + + x0 ^= (x4 << 23); + x1 ^= (x4 >> 41) ^ (x4 << 33); + x2 ^= (x4 >> 31); + + ulong t = x3 >> 41; + z[0] = x0 ^ t; + z[1] = x1 ^ (t << 10); + z[2] = x2; + z[3] = x3 & M41; + } + + public static void Reduce23(ulong[] z, int zOff) + { + ulong z3 = z[zOff + 3], t = z3 >> 41; + z[zOff ] ^= t; + z[zOff + 1] ^= (t << 10); + z[zOff + 3] = z3 & M41; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong c0 = Interleave.Unshuffle(x[0], x[1], out ulong e0); + ulong c1 = Interleave.Unshuffle(x[2], x[3], out ulong e1); + + ulong c2; + c2 = (c1 >> 27); + c1 ^= (c0 >> 27) | (c1 << 37); + c0 ^= (c0 << 37); + + ulong[] tt = Nat256.CreateExt64(); + + int[] shifts = { 32, 117, 191 }; + for (int i = 0; i < shifts.Length; ++i) + { + int w = shifts[i] >> 6, s = shifts[i] & 63; + Debug.Assert(s != 0); + tt[w ] ^= (c0 << s); + tt[w + 1] ^= (c1 << s) | (c0 >> -s); + tt[w + 2] ^= (c2 << s) | (c1 >> -s); + tt[w + 3] ^= (c2 >> -s); + } + + Reduce(tt, z); + + z[0] ^= e0; + z[1] ^= e1; + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 159 + return (uint)(x[0] ^ (x[2] >> 31)) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4], z5 = zz[5], z6 = zz[6], z7 = zz[7]; + zz[0] = z0 ^ (z1 << 59); + zz[1] = (z1 >> 5) ^ (z2 << 54); + zz[2] = (z2 >> 10) ^ (z3 << 49); + zz[3] = (z3 >> 15) ^ (z4 << 44); + zz[4] = (z4 >> 20) ^ (z5 << 39); + zz[5] = (z5 >> 25) ^ (z6 << 34); + zz[6] = (z6 >> 30) ^ (z7 << 29); + zz[7] = (z7 >> 35); + } + + protected static void ImplExpand(ulong[] x, ulong[] z) + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + z[0] = x0 & M59; + z[1] = ((x0 >> 59) ^ (x1 << 5)) & M59; + z[2] = ((x1 >> 54) ^ (x2 << 10)) & M59; + z[3] = ((x2 >> 49) ^ (x3 << 15)); + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X23 = Vector128.Create(x[2], x[3]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y23 = Vector128.Create(y[2], y[3]); + var X03 = Sse2.Xor(X01, X23); + var Y03 = Sse2.Xor(Y01, Y23); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11); + + var Z45 = Pclmulqdq.CarrylessMultiply(X23, Y23, 0x00); + var Z56 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x01), + Pclmulqdq.CarrylessMultiply(X23, Y23, 0x10)); + var Z67 = Pclmulqdq.CarrylessMultiply(X23, Y23, 0x11); + + var K01 = Pclmulqdq.CarrylessMultiply(X03, Y03, 0x00); + var K12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X03, Y03, 0x01), + Pclmulqdq.CarrylessMultiply(X03, Y03, 0x10)); + var K23 = Pclmulqdq.CarrylessMultiply(X03, Y03, 0x11); + + K01 = Sse2.Xor(K01, Z01); + K12 = Sse2.Xor(K12, Z12); + K23 = Sse2.Xor(K23, Z23); + + K01 = Sse2.Xor(K01, Z45); + K12 = Sse2.Xor(K12, Z56); + K23 = Sse2.Xor(K23, Z67); + + Z23 = Sse2.Xor(Z23, K01); + Z45 = Sse2.Xor(Z45, K23); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ K12.GetElement(0); + zz[4] = Z45.GetElement(0) ^ K12.GetElement(1); + zz[5] = Z45.GetElement(1) ^ Z56.GetElement(0); + zz[6] = Z67.GetElement(0) ^ Z56.GetElement(1); + zz[7] = Z67.GetElement(1); + return; + } +#endif + + /* + * "Two-level seven-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong[] f = new ulong[4], g = new ulong[4]; + ImplExpand(x, f); + ImplExpand(y, g); + + ulong[] u = new ulong[8]; + + ImplMulwAcc(u, f[0], g[0], zz, 0); + ImplMulwAcc(u, f[1], g[1], zz, 1); + ImplMulwAcc(u, f[2], g[2], zz, 2); + ImplMulwAcc(u, f[3], g[3], zz, 3); + + // U *= (1 - t^n) + for (int i = 5; i > 0; --i) + { + zz[i] ^= zz[i - 1]; + } + + ImplMulwAcc(u, f[0] ^ f[1], g[0] ^ g[1], zz, 1); + ImplMulwAcc(u, f[2] ^ f[3], g[2] ^ g[3], zz, 3); + + // V *= (1 - t^2n) + for (int i = 7; i > 1; --i) + { + zz[i] ^= zz[i - 2]; + } + + // Double-length recursion + { + ulong c0 = f[0] ^ f[2], c1 = f[1] ^ f[3]; + ulong d0 = g[0] ^ g[2], d1 = g[1] ^ g[3]; + ImplMulwAcc(u, c0 ^ c1, d0 ^ d1, zz, 3); + ulong[] t = new ulong[3]; + ImplMulwAcc(u, c0, d0, t, 0); + ImplMulwAcc(u, c1, d1, t, 1); + ulong t0 = t[0], t1 = t[1], t2 = t[2]; + zz[2] ^= t0; + zz[3] ^= t0 ^ t1; + zz[4] ^= t2 ^ t1; + zz[5] ^= t2; + } + + ImplCompactExt(zz); + } + + protected static void ImplMulwAcc(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 59 == 0); + Debug.Assert(y >> 59 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7] + ^ (u[(j >> 3) & 7] << 3); + int k = 54; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 6) > 0); + + Debug.Assert(h >> 53 == 0); + + z[zOff ] ^= l & M59; + z[zOff + 1] ^= (l >> 59) ^ (h << 5); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 4, zz, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs.meta new file mode 100644 index 00000000..70ec36c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6862ef5d6ec187a4fb2d6d1d5845852f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs new file mode 100644 index 00000000..ba05a1b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT233FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 233) + throw new ArgumentException("value invalid for SecT233FieldElement", "x"); + + this.x = SecT233Field.FromBigInteger(x); + } + + public SecT233FieldElement() + { + this.x = Nat256.Create64(); + } + + protected internal SecT233FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat256.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat256.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT233Field"; } + } + + public override int FieldSize + { + get { return 233; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT233Field.Add(x, ((SecT233FieldElement)b).x, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat256.Create64(); + SecT233Field.AddOne(x, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and Subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT233Field.Multiply(x, ((SecT233FieldElement)b).x, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT233FieldElement)b).x; + ulong[] xx = ((SecT233FieldElement)x).x, yx = ((SecT233FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT233Field.MultiplyAddToExt(ax, bx, tt); + SecT233Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT233Field.Reduce(tt, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat256.Create64(); + SecT233Field.Square(x, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT233FieldElement)x).x, yx = ((SecT233FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT233Field.SquareAddToExt(ax, tt); + SecT233Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT233Field.Reduce(tt, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat256.Create64(); + SecT233Field.SquareN(x, pow, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat256.Create64(); + SecT233Field.HalfTrace(x, z); + return new SecT233FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT233Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat256.Create64(); + SecT233Field.Invert(x, z); + return new SecT233FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat256.Create64(); + SecT233Field.Sqrt(x, z); + return new SecT233FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Tpb; } + } + + public virtual int M + { + get { return 233; } + } + + public virtual int K1 + { + get { return 74; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT233FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT233FieldElement); + } + + public virtual bool Equals(SecT233FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 2330074 ^ Arrays.GetHashCode(x, 0, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs.meta new file mode 100644 index 00000000..e2deea11 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 804de02fbd3a2004190ba08e4f832e6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs new file mode 100644 index 00000000..c3e6f98d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233K1Curve + : AbstractF2mCurve + { + private const int SECT233K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT233K1_FE_LONGS = 4; + private static readonly ECFieldElement[] SECT233K1_AFFINE_ZS = new ECFieldElement[] { new SecT233FieldElement(BigInteger.One) }; + + protected readonly SecT233K1Point m_infinity; + + public SecT233K1Curve() + : base(233, 74, 0, 0) + { + this.m_infinity = new SecT233K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.One); + this.m_order = new BigInteger(1, Hex.DecodeStrict("8000000000000000000000000000069D5BB915BCD46EFB1AD5F173ABDF")); + this.m_cofactor = BigInteger.ValueOf(4); + + this.m_coord = SECT233K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT233K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override int FieldSize + { + get { return 233; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT233FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT233K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT233K1Point(this, x, y, zs); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 233; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 74; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT233K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy64(((SecT233FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT233K1_FE_LONGS; + Nat256.Copy64(((SecT233FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT233K1_FE_LONGS; + } + } + + return new SecT233K1LookupTable(this, table, len); + } + + private class SecT233K1LookupTable + : AbstractECLookupTable + { + private readonly SecT233K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT233K1LookupTable(SecT233K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT233K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT233K1_FE_LONGS + j] & MASK; + } + + pos += (SECT233K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = index * SECT233K1_FE_LONGS * 2; + + for (int j = 0; j < SECT233K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT233K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT233FieldElement(x), new SecT233FieldElement(y), SECT233K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs.meta new file mode 100644 index 00000000..a7e16ba9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5c02c84d41bf22d449d11d47b02460e6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs new file mode 100644 index 00000000..5078f3d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs @@ -0,0 +1,286 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233K1Point + : AbstractF2mPoint + { + internal SecT233K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT233K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT233K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + { + return curve.Infinity; + } + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1); + if (X3.IsZero) + { + return new SecT233K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT233K1Point(curve, X3, curve.B); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT233K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + { + return this; + } + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T; + if (Z1IsOne) + { + T = L1.Square().Add(L1); + } + else + { + T = L1.Add(Z1).Multiply(L1); + } + + if (T.IsZero) + { + return new SecT233K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2 = Z1IsOne ? Z1 : Z1Sq.Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3).Add(Z3); + + return new SecT233K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = L1Sq.Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = L2plus1.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + { + return b.Twice(); + } + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT233K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT233K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT233K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs.meta new file mode 100644 index 00000000..071c2455 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e5e3ae0a53d0d742b18333584a4885f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs new file mode 100644 index 00000000..acd7fbdf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233R1Curve + : AbstractF2mCurve + { + private const int SECT233R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT233R1_FE_LONGS = 4; + private static readonly ECFieldElement[] SECT233R1_AFFINE_ZS = new ECFieldElement[] { new SecT233FieldElement(BigInteger.One) }; + + protected readonly SecT233R1Point m_infinity; + + public SecT233R1Curve() + : base(233, 74, 0, 0) + { + this.m_infinity = new SecT233R1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0066647EDE6C332C7F8C0923BB58213B333B20E9CE4281FE115F7D8F90AD"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("01000000000000000000000000000013E974E72F8A6922031D2603CFE0D7")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT233R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT233R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 233; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT233FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT233R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT233R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 233; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 74; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT233R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy64(((SecT233FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT233R1_FE_LONGS; + Nat256.Copy64(((SecT233FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT233R1_FE_LONGS; + } + } + + return new SecT233R1LookupTable(this, table, len); + } + + private class SecT233R1LookupTable + : AbstractECLookupTable + { + private readonly SecT233R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT233R1LookupTable(SecT233R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT233R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT233R1_FE_LONGS + j] & MASK; + } + + pos += (SECT233R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = index * SECT233R1_FE_LONGS * 2; + + for (int j = 0; j < SECT233R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT233R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT233FieldElement(x), new SecT233FieldElement(y), SECT233R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs.meta new file mode 100644 index 00000000..14e26674 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f29912eabeca964083349435ee6cc8a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs new file mode 100644 index 00000000..00580eda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs @@ -0,0 +1,269 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT233R1Point + : AbstractF2mPoint + { + internal SecT233R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT233R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT233R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT233R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT233R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT233R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T = L1.Square().Add(L1Z1).Add(Z1Sq); + if (T.IsZero) + { + return new SecT233R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT233R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT233R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT233R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT233R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs.meta new file mode 100644 index 00000000..9fdeff72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1d00179163187ad47a62d6632d18718b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT233R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs new file mode 100644 index 00000000..18633d2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs @@ -0,0 +1,394 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT239Field + { + private const ulong M47 = ulong.MaxValue >> 17; + private const ulong M60 = ulong.MaxValue >> 4; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + z[3] = x[3] ^ y[3]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + zz[5] = xx[5] ^ yy[5]; + zz[6] = xx[6] ^ yy[6]; + zz[7] = xx[7] ^ yy[7]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + z[3] ^= x[3]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(239, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + + Nat256.Copy64(x, z); + for (int i = 1; i < 239; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat256.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion + + ulong[] t0 = Nat256.Create64(); + ulong[] t1 = Nat256.Create64(); + + Square(x, t0); + Multiply(t0, x, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 3, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 7, t0); + Multiply(t0, t1, t0); + SquareN(t0, 14, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 29, t0); + Multiply(t0, t1, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 59, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 119, t0); + Multiply(t0, t1, t0); + Square(t0, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3]; + ulong x4 = xx[4], x5 = xx[5], x6 = xx[6], x7 = xx[7]; + + x3 ^= (x7 << 17); + x4 ^= (x7 >> 47); + x5 ^= (x7 << 47); + x6 ^= (x7 >> 17); + + x2 ^= (x6 << 17); + x3 ^= (x6 >> 47); + x4 ^= (x6 << 47); + x5 ^= (x6 >> 17); + + x1 ^= (x5 << 17); + x2 ^= (x5 >> 47); + x3 ^= (x5 << 47); + x4 ^= (x5 >> 17); + + x0 ^= (x4 << 17); + x1 ^= (x4 >> 47); + x2 ^= (x4 << 47); + x3 ^= (x4 >> 17); + + ulong t = x3 >> 47; + z[0] = x0 ^ t; + z[1] = x1; + z[2] = x2 ^ (t << 30); + z[3] = x3 & M47; + } + + public static void Reduce17(ulong[] z, int zOff) + { + ulong z3 = z[zOff + 3], t = z3 >> 47; + z[zOff ] ^= t; + z[zOff + 2] ^= (t << 30); + z[zOff + 3] = z3 & M47; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong c0 = Interleave.Unshuffle(x[0], x[1], out ulong e0); + ulong c1 = Interleave.Unshuffle(x[2], x[3], out ulong e1); + + ulong c2, c3; + c3 = (c1 >> 49); + c2 = (c0 >> 49) | (c1 << 15); + c1 ^= (c0 << 15); + + ulong[] tt = Nat256.CreateExt64(); + + int[] shifts = { 39, 120 }; + for (int i = 0; i < shifts.Length; ++i) + { + int w = shifts[i] >> 6, s = shifts[i] & 63; + Debug.Assert(s != 0); + tt[w ] ^= (c0 << s); + tt[w + 1] ^= (c1 << s) | (c0 >> -s); + tt[w + 2] ^= (c2 << s) | (c1 >> -s); + tt[w + 3] ^= (c3 << s) | (c2 >> -s); + tt[w + 4] ^= (c3 >> -s); + } + + Reduce(tt, z); + + z[0] ^= e0; + z[1] ^= e1; + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat256.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 81, 162 + return (uint)(x[0] ^ (x[1] >> 17) ^ (x[2] >> 34)) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4], z5 = zz[5], z6 = zz[6], z7 = zz[7]; + zz[0] = z0 ^ (z1 << 60); + zz[1] = (z1 >> 4) ^ (z2 << 56); + zz[2] = (z2 >> 8) ^ (z3 << 52); + zz[3] = (z3 >> 12) ^ (z4 << 48); + zz[4] = (z4 >> 16) ^ (z5 << 44); + zz[5] = (z5 >> 20) ^ (z6 << 40); + zz[6] = (z6 >> 24) ^ (z7 << 36); + zz[7] = (z7 >> 28); + } + + protected static void ImplExpand(ulong[] x, ulong[] z) + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + z[0] = x0 & M60; + z[1] = ((x0 >> 60) ^ (x1 << 4)) & M60; + z[2] = ((x1 >> 56) ^ (x2 << 8)) & M60; + z[3] = ((x2 >> 52) ^ (x3 << 12)); + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X23 = Vector128.Create(x[2], x[3]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y23 = Vector128.Create(y[2], y[3]); + var X03 = Sse2.Xor(X01, X23); + var Y03 = Sse2.Xor(Y01, Y23); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11); + + var Z45 = Pclmulqdq.CarrylessMultiply(X23, Y23, 0x00); + var Z56 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x01), + Pclmulqdq.CarrylessMultiply(X23, Y23, 0x10)); + var Z67 = Pclmulqdq.CarrylessMultiply(X23, Y23, 0x11); + + var K01 = Pclmulqdq.CarrylessMultiply(X03, Y03, 0x00); + var K12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X03, Y03, 0x01), + Pclmulqdq.CarrylessMultiply(X03, Y03, 0x10)); + var K23 = Pclmulqdq.CarrylessMultiply(X03, Y03, 0x11); + + K01 = Sse2.Xor(K01, Z01); + K12 = Sse2.Xor(K12, Z12); + K23 = Sse2.Xor(K23, Z23); + + K01 = Sse2.Xor(K01, Z45); + K12 = Sse2.Xor(K12, Z56); + K23 = Sse2.Xor(K23, Z67); + + Z23 = Sse2.Xor(Z23, K01); + Z45 = Sse2.Xor(Z45, K23); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ K12.GetElement(0); + zz[4] = Z45.GetElement(0) ^ K12.GetElement(1); + zz[5] = Z45.GetElement(1) ^ Z56.GetElement(0); + zz[6] = Z67.GetElement(0) ^ Z56.GetElement(1); + zz[7] = Z67.GetElement(1); + return; + } +#endif + + /* + * "Two-level seven-way recursion" as described in "Batch binary Edwards", Daniel J. Bernstein. + */ + + ulong[] f = new ulong[4], g = new ulong[4]; + ImplExpand(x, f); + ImplExpand(y, g); + + ulong[] u = new ulong[8]; + + ImplMulwAcc(u, f[0], g[0], zz, 0); + ImplMulwAcc(u, f[1], g[1], zz, 1); + ImplMulwAcc(u, f[2], g[2], zz, 2); + ImplMulwAcc(u, f[3], g[3], zz, 3); + + // U *= (1 - t^n) + for (int i = 5; i > 0; --i) + { + zz[i] ^= zz[i - 1]; + } + + ImplMulwAcc(u, f[0] ^ f[1], g[0] ^ g[1], zz, 1); + ImplMulwAcc(u, f[2] ^ f[3], g[2] ^ g[3], zz, 3); + + // V *= (1 - t^2n) + for (int i = 7; i > 1; --i) + { + zz[i] ^= zz[i - 2]; + } + + // Double-length recursion + { + ulong c0 = f[0] ^ f[2], c1 = f[1] ^ f[3]; + ulong d0 = g[0] ^ g[2], d1 = g[1] ^ g[3]; + ImplMulwAcc(u, c0 ^ c1, d0 ^ d1, zz, 3); + ulong[] t = new ulong[3]; + ImplMulwAcc(u, c0, d0, t, 0); + ImplMulwAcc(u, c1, d1, t, 1); + ulong t0 = t[0], t1 = t[1], t2 = t[2]; + zz[2] ^= t0; + zz[3] ^= t0 ^ t1; + zz[4] ^= t2 ^ t1; + zz[5] ^= t2; + } + + ImplCompactExt(zz); + } + + protected static void ImplMulwAcc(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 60 == 0); + Debug.Assert(y >> 60 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7] + ^ (u[(j >> 3) & 7] << 3); + int k = 54; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 6) > 0); + + h ^= ((x & 0x0820820820820820L) & (ulong)(((long)y << 4) >> 63)) >> 5; + + Debug.Assert(h >> 55 == 0); + + z[zOff ] ^= l & M60; + z[zOff + 1] ^= (l >> 60) ^ (h << 4); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 4, zz, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs.meta new file mode 100644 index 00000000..737826a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 810836cd2b967214ea19fe3728175d40 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs new file mode 100644 index 00000000..c406aaf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT239FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT239FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 239) + throw new ArgumentException("value invalid for SecT239FieldElement", "x"); + + this.x = SecT239Field.FromBigInteger(x); + } + + public SecT239FieldElement() + { + this.x = Nat256.Create64(); + } + + protected internal SecT239FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat256.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat256.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1L) != 0L; + } + + public override BigInteger ToBigInteger() + { + return Nat256.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT239Field"; } + } + + public override int FieldSize + { + get { return 239; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT239Field.Add(x, ((SecT239FieldElement)b).x, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat256.Create64(); + SecT239Field.AddOne(x, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and Subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat256.Create64(); + SecT239Field.Multiply(x, ((SecT239FieldElement)b).x, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT239FieldElement)b).x; + ulong[] xx = ((SecT239FieldElement)x).x, yx = ((SecT239FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT239Field.MultiplyAddToExt(ax, bx, tt); + SecT239Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT239Field.Reduce(tt, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat256.Create64(); + SecT239Field.Square(x, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT239FieldElement)x).x, yx = ((SecT239FieldElement)y).x; + + ulong[] tt = Nat256.CreateExt64(); + SecT239Field.SquareAddToExt(ax, tt); + SecT239Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat256.Create64(); + SecT239Field.Reduce(tt, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat256.Create64(); + SecT239Field.SquareN(x, pow, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat256.Create64(); + SecT239Field.HalfTrace(x, z); + return new SecT239FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT239Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat256.Create64(); + SecT239Field.Invert(x, z); + return new SecT239FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat256.Create64(); + SecT239Field.Sqrt(x, z); + return new SecT239FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Tpb; } + } + + public virtual int M + { + get { return 239; } + } + + public virtual int K1 + { + get { return 158; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT239FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT239FieldElement); + } + + public virtual bool Equals(SecT239FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat256.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 23900158 ^ Arrays.GetHashCode(x, 0, 4); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs.meta new file mode 100644 index 00000000..823d6551 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f431cfc66732b7a4db5aa37a47b3e14c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs new file mode 100644 index 00000000..096e1c3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT239K1Curve + : AbstractF2mCurve + { + private const int SECT239K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT239K1_FE_LONGS = 4; + private static readonly ECFieldElement[] SECT239K1_AFFINE_ZS = new ECFieldElement[] { new SecT239FieldElement(BigInteger.One) }; + + protected readonly SecT239K1Point m_infinity; + + public SecT239K1Curve() + : base(239, 158, 0, 0) + { + this.m_infinity = new SecT239K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.One); + this.m_order = new BigInteger(1, Hex.DecodeStrict("2000000000000000000000000000005A79FEC67CB6E91F1C1DA800E478A5")); + this.m_cofactor = BigInteger.ValueOf(4); + + this.m_coord = SECT239K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT239K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 239; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT239FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT239K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT239K1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 239; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 158; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT239K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat256.Copy64(((SecT239FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT239K1_FE_LONGS; + Nat256.Copy64(((SecT239FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT239K1_FE_LONGS; + } + } + + return new SecT239K1LookupTable(this, table, len); + } + + private class SecT239K1LookupTable + : AbstractECLookupTable + { + private readonly SecT239K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT239K1LookupTable(SecT239K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT239K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT239K1_FE_LONGS + j] & MASK; + } + + pos += (SECT239K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat256.Create64(), y = Nat256.Create64(); + int pos = index * SECT239K1_FE_LONGS * 2; + + for (int j = 0; j < SECT239K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT239K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT239FieldElement(x), new SecT239FieldElement(y), SECT239K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs.meta new file mode 100644 index 00000000..c86df786 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 609eb2ec683cf784b8947ff97b33331d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs new file mode 100644 index 00000000..f0fe3a49 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs @@ -0,0 +1,281 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT239K1Point + : AbstractF2mPoint + { + internal SecT239K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT239K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT239K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1); + if (X3.IsZero) + { + return new SecT239K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT239K1Point(curve, X3, curve.B); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT239K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T; + if (Z1IsOne) + { + T = L1.Square().Add(L1); + } + else + { + T = L1.Add(Z1).Multiply(L1); + } + + if (T.IsZero) + { + return new SecT239K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2 = Z1IsOne ? Z1 : Z1Sq.Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3).Add(Z3); + + return new SecT239K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = L1Sq.Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = L2plus1.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT239K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT239K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT239K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs.meta new file mode 100644 index 00000000..494cd9fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 869f4341e71eef849b73496de1b419e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT239K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs new file mode 100644 index 00000000..2f052448 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs @@ -0,0 +1,471 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283Field + { + private const ulong M27 = ulong.MaxValue >> 37; + private const ulong M57 = ulong.MaxValue >> 7; + + private static readonly ulong[] ROOT_Z = new ulong[]{ 0x0C30C30C30C30808UL, 0x30C30C30C30C30C3UL, + 0x820820820820830CUL, 0x0820820820820820UL, 0x2082082UL }; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + z[3] = x[3] ^ y[3]; + z[4] = x[4] ^ y[4]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + zz[0] = xx[0] ^ yy[0]; + zz[1] = xx[1] ^ yy[1]; + zz[2] = xx[2] ^ yy[2]; + zz[3] = xx[3] ^ yy[3]; + zz[4] = xx[4] ^ yy[4]; + zz[5] = xx[5] ^ yy[5]; + zz[6] = xx[6] ^ yy[6]; + zz[7] = xx[7] ^ yy[7]; + zz[8] = xx[8] ^ yy[8]; + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + z[3] ^= x[3]; + z[4] ^= x[4]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(283, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(9); + + Nat320.Copy64(x, z); + for (int i = 1; i < 283; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat320.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion + + ulong[] t0 = Nat320.Create64(); + ulong[] t1 = Nat320.Create64(); + + Square(x, t0); + Multiply(t0, x, t0); + SquareN(t0, 2, t1); + Multiply(t1, t0, t1); + SquareN(t1, 4, t0); + Multiply(t0, t1, t0); + SquareN(t0, 8, t1); + Multiply(t1, t0, t1); + Square(t1, t1); + Multiply(t1, x, t1); + SquareN(t1, 17, t0); + Multiply(t0, t1, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 35, t1); + Multiply(t1, t0, t1); + SquareN(t1, 70, t0); + Multiply(t0, t1, t0); + Square(t0, t0); + Multiply(t0, x, t0); + SquareN(t0, 141, t1); + Multiply(t1, t0, t1); + Square(t1, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat320.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat320.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x0 = xx[0], x1 = xx[1], x2 = xx[2], x3 = xx[3], x4 = xx[4]; + ulong x5 = xx[5], x6 = xx[6], x7 = xx[7], x8 = xx[8]; + + x3 ^= (x8 << 37) ^ (x8 << 42) ^ (x8 << 44) ^ (x8 << 49); + x4 ^= (x8 >> 27) ^ (x8 >> 22) ^ (x8 >> 20) ^ (x8 >> 15); + + x2 ^= (x7 << 37) ^ (x7 << 42) ^ (x7 << 44) ^ (x7 << 49); + x3 ^= (x7 >> 27) ^ (x7 >> 22) ^ (x7 >> 20) ^ (x7 >> 15); + + x1 ^= (x6 << 37) ^ (x6 << 42) ^ (x6 << 44) ^ (x6 << 49); + x2 ^= (x6 >> 27) ^ (x6 >> 22) ^ (x6 >> 20) ^ (x6 >> 15); + + x0 ^= (x5 << 37) ^ (x5 << 42) ^ (x5 << 44) ^ (x5 << 49); + x1 ^= (x5 >> 27) ^ (x5 >> 22) ^ (x5 >> 20) ^ (x5 >> 15); + + ulong t = x4 >> 27; + z[0] = x0 ^ t ^ (t << 5) ^ (t << 7) ^ (t << 12); + z[1] = x1; + z[2] = x2; + z[3] = x3; + z[4] = x4 & M27; + } + + public static void Reduce37(ulong[] z, int zOff) + { + ulong z4 = z[zOff + 4], t = z4 >> 27; + z[zOff ] ^= t ^ (t << 5) ^ (t << 7) ^ (t << 12); + z[zOff + 4] = z4 & M27; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong[] odd = Nat320.Create64(); + + odd[0] = Interleave.Unshuffle(x[0], x[1], out ulong e0); + odd[1] = Interleave.Unshuffle(x[2], x[3], out ulong e1); + odd[2] = Interleave.Unshuffle(x[4] , out ulong e2); + + Multiply(odd, ROOT_Z, z); + + z[0] ^= e0; + z[1] ^= e1; + z[2] ^= e2; + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(9); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat.Create64(9); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat.Create64(9); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 271 + return (uint)(x[0] ^ (x[4] >> 15)) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z0 = zz[0], z1 = zz[1], z2 = zz[2], z3 = zz[3], z4 = zz[4]; + ulong z5 = zz[5], z6 = zz[6], z7 = zz[7], z8 = zz[8], z9 = zz[9]; + zz[0] = z0 ^ (z1 << 57); + zz[1] = (z1 >> 7) ^ (z2 << 50); + zz[2] = (z2 >> 14) ^ (z3 << 43); + zz[3] = (z3 >> 21) ^ (z4 << 36); + zz[4] = (z4 >> 28) ^ (z5 << 29); + zz[5] = (z5 >> 35) ^ (z6 << 22); + zz[6] = (z6 >> 42) ^ (z7 << 15); + zz[7] = (z7 >> 49) ^ (z8 << 8); + zz[8] = (z8 >> 56) ^ (z9 << 1); + zz[9] = (z9 >> 63); // Zero! + } + + protected static void ImplExpand(ulong[] x, ulong[] z) + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3], x4 = x[4]; + z[0] = x0 & M57; + z[1] = ((x0 >> 57) ^ (x1 << 7)) & M57; + z[2] = ((x1 >> 50) ^ (x2 << 14)) & M57; + z[3] = ((x2 >> 43) ^ (x3 << 21)) & M57; + z[4] = ((x3 >> 36) ^ (x4 << 28)); + } + + //protected static void AddMs(ulong[] zz, int zOff, ulong[] p, params int[] ms) + //{ + // ulong t0 = 0, t1 = 0; + // foreach (int m in ms) + // { + // int i = (m - 1) << 1; + // t0 ^= p[i ]; + // t1 ^= p[i + 1]; + // } + // zz[zOff ] ^= t0; + // zz[zOff + 1] ^= t1; + //} + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X01 = Vector128.Create(x[0], x[1]); + var X23 = Vector128.Create(x[2], x[3]); + var X4_ = Vector128.CreateScalar(x[4]); + var Y01 = Vector128.Create(y[0], y[1]); + var Y23 = Vector128.Create(y[2], y[3]); + var Y4_ = Vector128.CreateScalar(y[4]); + + var Z01 = Pclmulqdq.CarrylessMultiply(X01, Y01, 0x00); + var Z12 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X01, Y01, 0x10)); + var Z23 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y23, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y01, 0x11), + Pclmulqdq.CarrylessMultiply(X23, Y01, 0x00))); + var Z34 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y23, 0x01), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y23, 0x10), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y01, 0x01), + Pclmulqdq.CarrylessMultiply(X23, Y01, 0x10)))); + var Z45 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y4_, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y23, 0x11), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y01, 0x11), + Pclmulqdq.CarrylessMultiply(X4_, Y01, 0x00))))); + var Z56 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X01, Y4_, 0x01), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x01), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x10), + Pclmulqdq.CarrylessMultiply(X4_, Y01, 0x10)))); + var Z67 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y4_, 0x00), + Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y23, 0x11), + Pclmulqdq.CarrylessMultiply(X4_, Y23, 0x00))); + var Z78 = Sse2.Xor(Pclmulqdq.CarrylessMultiply(X23, Y4_, 0x01), + Pclmulqdq.CarrylessMultiply(X4_, Y23, 0x10)); + var Z89 = Pclmulqdq.CarrylessMultiply(X4_, Y4_, 0x00); + + zz[0] = Z01.GetElement(0); + zz[1] = Z01.GetElement(1) ^ Z12.GetElement(0); + zz[2] = Z23.GetElement(0) ^ Z12.GetElement(1); + zz[3] = Z23.GetElement(1) ^ Z34.GetElement(0); + zz[4] = Z45.GetElement(0) ^ Z34.GetElement(1); + zz[5] = Z45.GetElement(1) ^ Z56.GetElement(0); + zz[6] = Z67.GetElement(0) ^ Z56.GetElement(1); + zz[7] = Z67.GetElement(1) ^ Z78.GetElement(0); + zz[8] = Z89.GetElement(0) ^ Z78.GetElement(1); + zz[9] = Z89.GetElement(1); + return; + } +#endif + + /* + * Formula (17) from "Some New Results on Binary Polynomial Multiplication", + * Murat Cenk and M. Anwar Hasan. + * + * The formula as given contained an error in the term t25, as noted below + */ + ulong[] a = new ulong[5], b = new ulong[5]; + ImplExpand(x, a); + ImplExpand(y, b); + + ulong[] u = zz; + ulong[] p = new ulong[26]; + + ImplMulw(u, a[0], b[0], p, 0); // m1 + ImplMulw(u, a[1], b[1], p, 2); // m2 + ImplMulw(u, a[2], b[2], p, 4); // m3 + ImplMulw(u, a[3], b[3], p, 6); // m4 + ImplMulw(u, a[4], b[4], p, 8); // m5 + + ulong u0 = a[0] ^ a[1], v0 = b[0] ^ b[1]; + ulong u1 = a[0] ^ a[2], v1 = b[0] ^ b[2]; + ulong u2 = a[2] ^ a[4], v2 = b[2] ^ b[4]; + ulong u3 = a[3] ^ a[4], v3 = b[3] ^ b[4]; + + ImplMulw(u, u1 ^ a[3], v1 ^ b[3], p, 18); // m10 + ImplMulw(u, u2 ^ a[1], v2 ^ b[1], p, 20); // m11 + + ulong A4 = u0 ^ u3 , B4 = v0 ^ v3; + ulong A5 = A4 ^ a[2], B5 = B4 ^ b[2]; + + ImplMulw(u, A4, B4, p, 22); // m12 + ImplMulw(u, A5, B5, p, 24); // m13 + + ImplMulw(u, u0, v0, p, 10); // m6 + ImplMulw(u, u1, v1, p, 12); // m7 + ImplMulw(u, u2, v2, p, 14); // m8 + ImplMulw(u, u3, v3, p, 16); // m9 + + + // Original method, corresponding to formula (16) + //AddMs(zz, 0, p, 1); + //AddMs(zz, 1, p, 1, 2, 6); + //AddMs(zz, 2, p, 1, 2, 3, 7); + //AddMs(zz, 3, p, 1, 3, 4, 5, 8, 10, 12, 13); + //AddMs(zz, 4, p, 1, 2, 4, 5, 6, 9, 10, 11, 13); + //AddMs(zz, 5, p, 1, 2, 3, 5, 7, 11, 12, 13); + //AddMs(zz, 6, p, 3, 4, 5, 8); + //AddMs(zz, 7, p, 4, 5, 9); + //AddMs(zz, 8, p, 5); + + // Improved method factors out common single-word terms + // NOTE: p1,...,p26 in the paper maps to p[0],...,p[25] here + + zz[0] = p[ 0]; + zz[9] = p[ 9]; + + ulong t1 = p[ 0] ^ p[ 1]; + ulong t2 = t1 ^ p[ 2]; + ulong t3 = t2 ^ p[10]; + + zz[1] = t3; + + ulong t4 = p[ 3] ^ p[ 4]; + ulong t5 = p[11] ^ p[12]; + ulong t6 = t4 ^ t5; + ulong t7 = t2 ^ t6; + + zz[2] = t7; + + ulong t8 = t1 ^ t4; + ulong t9 = p[ 5] ^ p[ 6]; + ulong t10 = t8 ^ t9; + ulong t11 = t10 ^ p[ 8]; + ulong t12 = p[13] ^ p[14]; + ulong t13 = t11 ^ t12; + ulong t14 = p[18] ^ p[22]; + ulong t15 = t14 ^ p[24]; + ulong t16 = t13 ^ t15; + + zz[3] = t16; + + ulong t17 = p[ 7] ^ p[ 8]; + ulong t18 = t17 ^ p[ 9]; + ulong t19 = t18 ^ p[17]; + + zz[8] = t19; + + ulong t20 = t18 ^ t9; + ulong t21 = p[15] ^ p[16]; + ulong t22 = t20 ^ t21; + + zz[7] = t22; + + ulong t23 = t22 ^ t3; + ulong t24 = p[19] ^ p[20]; + // ulong t25 = p[23] ^ p[24]; + ulong t25 = p[25] ^ p[24]; // Fixes an error in the paper: p[23] -> p{25] + ulong t26 = p[18] ^ p[23]; + ulong t27 = t24 ^ t25; + ulong t28 = t27 ^ t26; + ulong t29 = t28 ^ t23; + + zz[4] = t29; + + ulong t30 = t7 ^ t19; + ulong t31 = t27 ^ t30; + ulong t32 = p[21] ^ p[22]; + ulong t33 = t31 ^ t32; + + zz[5] = t33; + + ulong t34 = t11 ^ p[0]; + ulong t35 = t34 ^ p[9]; + ulong t36 = t35 ^ t12; + ulong t37 = t36 ^ p[21]; + ulong t38 = t37 ^ p[23]; + ulong t39 = t38 ^ p[25]; + + zz[6] = t39; + + ImplCompactExt(zz); + } + + protected static void ImplMulw(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 57 == 0); + Debug.Assert(y >> 57 == 0); + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7]; + int k = 48; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3 + ^ u[(j >> 6) & 7] << 6; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 9) > 0); + + h ^= ((x & 0x0100804020100800L) & (ulong)(((long)y << 7) >> 63)) >> 8; + + Debug.Assert(h >> 49 == 0); + + z[zOff ] = l & M57; + z[zOff + 1] = (l >> 57) ^ (h << 7); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 4, zz, 0); + zz[8] = Interleave.Expand32to64((uint)x[4]); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs.meta new file mode 100644 index 00000000..5d1a4c1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42b699e17236249469202bd1eaf3c053 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs new file mode 100644 index 00000000..0497a2d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT283FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 283) + throw new ArgumentException("value invalid for SecT283FieldElement", "x"); + + this.x = SecT283Field.FromBigInteger(x); + } + + public SecT283FieldElement() + { + this.x = Nat320.Create64(); + } + + protected internal SecT283FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat320.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat320.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat320.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT283Field"; } + } + + public override int FieldSize + { + get { return 283; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat320.Create64(); + SecT283Field.Add(x, ((SecT283FieldElement)b).x, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat320.Create64(); + SecT283Field.AddOne(x, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat320.Create64(); + SecT283Field.Multiply(x, ((SecT283FieldElement)b).x, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT283FieldElement)b).x; + ulong[] xx = ((SecT283FieldElement)x).x, yx = ((SecT283FieldElement)y).x; + + ulong[] tt = Nat.Create64(9); + SecT283Field.MultiplyAddToExt(ax, bx, tt); + SecT283Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat320.Create64(); + SecT283Field.Reduce(tt, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat320.Create64(); + SecT283Field.Square(x, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT283FieldElement)x).x, yx = ((SecT283FieldElement)y).x; + + ulong[] tt = Nat.Create64(9); + SecT283Field.SquareAddToExt(ax, tt); + SecT283Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat320.Create64(); + SecT283Field.Reduce(tt, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat320.Create64(); + SecT283Field.SquareN(x, pow, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat320.Create64(); + SecT283Field.HalfTrace(x, z); + return new SecT283FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT283Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat320.Create64(); + SecT283Field.Invert(x, z); + return new SecT283FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat320.Create64(); + SecT283Field.Sqrt(x, z); + return new SecT283FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Ppb; } + } + + public virtual int M + { + get { return 283; } + } + + public virtual int K1 + { + get { return 5; } + } + + public virtual int K2 + { + get { return 7; } + } + + public virtual int K3 + { + get { return 12; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT283FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT283FieldElement); + } + + public virtual bool Equals(SecT283FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat320.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 2831275 ^ Arrays.GetHashCode(x, 0, 5); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs.meta new file mode 100644 index 00000000..9825d27a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 86ba56fdc0e9391489716315ed5c9754 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs new file mode 100644 index 00000000..fe1c9e9c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283K1Curve + : AbstractF2mCurve + { + private const int SECT283K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT283K1_FE_LONGS = 5; + private static readonly ECFieldElement[] SECT283K1_AFFINE_ZS = new ECFieldElement[] { new SecT283FieldElement(BigInteger.One) }; + + protected readonly SecT283K1Point m_infinity; + + public SecT283K1Curve() + : base(283, 5, 7, 12) + { + this.m_infinity = new SecT283K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.One); + this.m_order = new BigInteger(1, Hex.DecodeStrict("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE9AE2ED07577265DFF7F94451E061E163C61")); + this.m_cofactor = BigInteger.ValueOf(4); + + this.m_coord = SECT283K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT283K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 283; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT283FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT283K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT283K1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 283; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 5; } + } + + public virtual int K2 + { + get { return 7; } + } + + public virtual int K3 + { + get { return 12; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT283K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat320.Copy64(((SecT283FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT283K1_FE_LONGS; + Nat320.Copy64(((SecT283FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT283K1_FE_LONGS; + } + } + + return new SecT283K1LookupTable(this, table, len); + } + + private class SecT283K1LookupTable + : AbstractECLookupTable + { + private readonly SecT283K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT283K1LookupTable(SecT283K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat320.Create64(), y = Nat320.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT283K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT283K1_FE_LONGS + j] & MASK; + } + + pos += (SECT283K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat320.Create64(), y = Nat320.Create64(); + int pos = index * SECT283K1_FE_LONGS * 2; + + for (int j = 0; j < SECT283K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT283K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT283FieldElement(x), new SecT283FieldElement(y), SECT283K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs.meta new file mode 100644 index 00000000..15f0ffa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc6a0b4c0580ce442b1bdf2881b63276 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs new file mode 100644 index 00000000..e31b66ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs @@ -0,0 +1,280 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283K1Point + : AbstractF2mPoint + { + internal SecT283K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT283K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT283K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1); + if (X3.IsZero) + { + return new SecT283K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT283K1Point(curve, X3, curve.B); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT283K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T; + if (Z1IsOne) + { + T = L1.Square().Add(L1); + } + else + { + T = L1.Add(Z1).Multiply(L1); + } + + if (T.IsZero) + { + return new SecT283K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2 = Z1IsOne ? Z1 : Z1Sq.Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3).Add(Z3); + + return new SecT283K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = L1Sq.Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = L2plus1.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT283K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT283K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT283K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs.meta new file mode 100644 index 00000000..6b52ed60 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fc06a7b79a00b8c4d8d9252123b410a3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs new file mode 100644 index 00000000..d8ae72df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283R1Curve + : AbstractF2mCurve + { + private const int SECT283R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT283R1_FE_LONGS = 5; + private static readonly ECFieldElement[] SECT283R1_AFFINE_ZS = new ECFieldElement[] { new SecT283FieldElement(BigInteger.One) }; + + protected readonly SecT283R1Point m_infinity; + + public SecT283R1Curve() + : base(283, 5, 7, 12) + { + this.m_infinity = new SecT283R1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("027B680AC8B8596DA5A4AF8A19A0303FCA97FD7645309FA2A581485AF6263E313B79A2F5"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEF90399660FC938A90165B042A7CEFADB307")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT283R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT283R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 283; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT283FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT283R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT283R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 283; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 5; } + } + + public virtual int K2 + { + get { return 7; } + } + + public virtual int K3 + { + get { return 12; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT283R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat320.Copy64(((SecT283FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT283R1_FE_LONGS; + Nat320.Copy64(((SecT283FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT283R1_FE_LONGS; + } + } + + return new SecT283R1LookupTable(this, table, len); + } + + private class SecT283R1LookupTable + : AbstractECLookupTable + { + private readonly SecT283R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT283R1LookupTable(SecT283R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat320.Create64(), y = Nat320.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT283R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT283R1_FE_LONGS + j] & MASK; + } + + pos += (SECT283R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat320.Create64(), y = Nat320.Create64(); + int pos = index * SECT283R1_FE_LONGS * 2; + + for (int j = 0; j < SECT283R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT283R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT283FieldElement(x), new SecT283FieldElement(y), SECT283R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs.meta new file mode 100644 index 00000000..630348e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8050871c832568c4186b81745a2102e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs new file mode 100644 index 00000000..b723c0f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs @@ -0,0 +1,269 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT283R1Point + : AbstractF2mPoint + { + internal SecT283R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT283R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT283R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT283R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT283R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT283R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T = L1.Square().Add(L1Z1).Add(Z1Sq); + if (T.IsZero) + { + return new SecT283R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT283R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT283R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT283R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT283R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs.meta new file mode 100644 index 00000000..fe4cf566 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 86f6aebe68adbfa4585b63660cf8db6f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT283R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs new file mode 100644 index 00000000..14a5adf3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs @@ -0,0 +1,404 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409Field + { + private const ulong M25 = ulong.MaxValue >> 39; + private const ulong M59 = ulong.MaxValue >> 5; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + z[0] = x[0] ^ y[0]; + z[1] = x[1] ^ y[1]; + z[2] = x[2] ^ y[2]; + z[3] = x[3] ^ y[3]; + z[4] = x[4] ^ y[4]; + z[5] = x[5] ^ y[5]; + z[6] = x[6] ^ y[6]; + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + for (int i = 0; i < 13; ++i) + { + zz[i] = xx[i] ^ yy[i]; + } + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + z[6] = x[6]; + } + + private static void AddTo(ulong[] x, ulong[] z) + { + z[0] ^= x[0]; + z[1] ^= x[1]; + z[2] ^= x[2]; + z[3] ^= x[3]; + z[4] ^= x[4]; + z[5] ^= x[5]; + z[6] ^= x[6]; + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(409, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(13); + + Nat448.Copy64(x, z); + for (int i = 1; i < 409; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat448.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion with bases { 2, 3 } + + ulong[] t0 = Nat448.Create64(); + ulong[] t1 = Nat448.Create64(); + ulong[] t2 = Nat448.Create64(); + + Square(x, t0); + + // 3 | 408 + SquareN(t0, 1, t1); + Multiply(t0, t1, t0); + SquareN(t1, 1, t1); + Multiply(t0, t1, t0); + + // 2 | 136 + SquareN(t0, 3, t1); + Multiply(t0, t1, t0); + + // 2 | 68 + SquareN(t0, 6, t1); + Multiply(t0, t1, t0); + + // 2 | 34 + SquareN(t0, 12, t1); + Multiply(t0, t1, t2); + + // ! {2,3} | 17 + SquareN(t2, 24, t0); + SquareN(t0, 24, t1); + Multiply(t0, t1, t0); + + // 2 | 8 + SquareN(t0, 48, t1); + Multiply(t0, t1, t0); + + // 2 | 4 + SquareN(t0, 96, t1); + Multiply(t0, t1, t0); + + // 2 | 2 + SquareN(t0, 192, t1); + Multiply(t0, t1, t0); + + Multiply(t0, t2, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat448.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat448.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong x00 = xx[0], x01 = xx[1], x02 = xx[2], x03 = xx[3]; + ulong x04 = xx[4], x05 = xx[5], x06 = xx[6], x07 = xx[7]; + + ulong u = xx[12]; + x05 ^= (u << 39); + x06 ^= (u >> 25) ^ (u << 62); + x07 ^= (u >> 2); + + u = xx[11]; + x04 ^= (u << 39); + x05 ^= (u >> 25) ^ (u << 62); + x06 ^= (u >> 2); + + u = xx[10]; + x03 ^= (u << 39); + x04 ^= (u >> 25) ^ (u << 62); + x05 ^= (u >> 2); + + u = xx[9]; + x02 ^= (u << 39); + x03 ^= (u >> 25) ^ (u << 62); + x04 ^= (u >> 2); + + u = xx[8]; + x01 ^= (u << 39); + x02 ^= (u >> 25) ^ (u << 62); + x03 ^= (u >> 2); + + u = x07; + x00 ^= (u << 39); + x01 ^= (u >> 25) ^ (u << 62); + x02 ^= (u >> 2); + + ulong t = x06 >> 25; + z[0] = x00 ^ t; + z[1] = x01 ^ (t << 23); + z[2] = x02; + z[3] = x03; + z[4] = x04; + z[5] = x05; + z[6] = x06 & M25; + } + + public static void Reduce39(ulong[] z, int zOff) + { + ulong z6 = z[zOff + 6], t = z6 >> 25; + z[zOff ] ^= t; + z[zOff + 1] ^= (t << 23); + z[zOff + 6] = z6 & M25; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong c0 = Interleave.Unshuffle(x[0], x[1], out ulong e0); + ulong c1 = Interleave.Unshuffle(x[2], x[3], out ulong e1); + ulong c2 = Interleave.Unshuffle(x[4], x[5], out ulong e2); + ulong c3 = Interleave.Unshuffle(x[6] , out ulong e3); + + z[0] = e0 ^ (c0 << 44); + z[1] = e1 ^ (c1 << 44) ^ (c0 >> 20); + z[2] = e2 ^ (c2 << 44) ^ (c1 >> 20); + z[3] = e3 ^ (c3 << 44) ^ (c2 >> 20) ^ (c0 << 13); + z[4] = (c3 >> 20) ^ (c1 << 13) ^ (c0 >> 51); + z[5] = (c2 << 13) ^ (c1 >> 51); + z[6] = (c3 << 13) ^ (c2 >> 51); + + Debug.Assert((c3 >> 51) == 0); + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat.Create64(13); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat.Create64(13); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat.Create64(13); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0 + return (uint)(x[0]) & 1U; + } + + protected static void ImplCompactExt(ulong[] zz) + { + ulong z00 = zz[ 0], z01 = zz[ 1], z02 = zz[ 2], z03 = zz[ 3], z04 = zz[ 4], z05 = zz[ 5], z06 = zz[ 6]; + ulong z07 = zz[ 7], z08 = zz[ 8], z09 = zz[ 9], z10 = zz[10], z11 = zz[11], z12 = zz[12], z13 = zz[13]; + zz[ 0] = z00 ^ (z01 << 59); + zz[ 1] = (z01 >> 5) ^ (z02 << 54); + zz[ 2] = (z02 >> 10) ^ (z03 << 49); + zz[ 3] = (z03 >> 15) ^ (z04 << 44); + zz[ 4] = (z04 >> 20) ^ (z05 << 39); + zz[ 5] = (z05 >> 25) ^ (z06 << 34); + zz[ 6] = (z06 >> 30) ^ (z07 << 29); + zz[ 7] = (z07 >> 35) ^ (z08 << 24); + zz[ 8] = (z08 >> 40) ^ (z09 << 19); + zz[ 9] = (z09 >> 45) ^ (z10 << 14); + zz[10] = (z10 >> 50) ^ (z11 << 9); + zz[11] = (z11 >> 55) ^ (z12 << 4) + ^ (z13 << 63); + zz[12] = (z13 >> 1); + //zz[13] = 0; + } + + protected static void ImplExpand(ulong[] x, ulong[] z) + { + ulong x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3], x4 = x[4], x5 = x[5], x6 = x[6]; + z[0] = x0 & M59; + z[1] = ((x0 >> 59) ^ (x1 << 5)) & M59; + z[2] = ((x1 >> 54) ^ (x2 << 10)) & M59; + z[3] = ((x2 >> 49) ^ (x3 << 15)) & M59; + z[4] = ((x3 >> 44) ^ (x4 << 20)) & M59; + z[5] = ((x4 >> 39) ^ (x5 << 25)) & M59; + z[6] = ((x5 >> 34) ^ (x6 << 30)); + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] a = new ulong[7], b = new ulong[7]; + ImplExpand(x, a); + ImplExpand(y, b); + + ulong[] u = new ulong[8]; + for (int i = 0; i < 7; ++i) + { + ImplMulwAcc(u, a[i], b[i], zz, i << 1); + } + + ulong v0 = zz[0], v1 = zz[1]; + v0 ^= zz[ 2]; zz[1] = v0 ^ v1; v1 ^= zz[ 3]; + v0 ^= zz[ 4]; zz[2] = v0 ^ v1; v1 ^= zz[ 5]; + v0 ^= zz[ 6]; zz[3] = v0 ^ v1; v1 ^= zz[ 7]; + v0 ^= zz[ 8]; zz[4] = v0 ^ v1; v1 ^= zz[ 9]; + v0 ^= zz[10]; zz[5] = v0 ^ v1; v1 ^= zz[11]; + v0 ^= zz[12]; zz[6] = v0 ^ v1; v1 ^= zz[13]; + + ulong w = v0 ^ v1; + zz[ 7] = zz[0] ^ w; + zz[ 8] = zz[1] ^ w; + zz[ 9] = zz[2] ^ w; + zz[10] = zz[3] ^ w; + zz[11] = zz[4] ^ w; + zz[12] = zz[5] ^ w; + zz[13] = zz[6] ^ w; + + ImplMulwAcc(u, a[0] ^ a[1], b[0] ^ b[1], zz, 1); + + ImplMulwAcc(u, a[0] ^ a[2], b[0] ^ b[2], zz, 2); + + ImplMulwAcc(u, a[0] ^ a[3], b[0] ^ b[3], zz, 3); + ImplMulwAcc(u, a[1] ^ a[2], b[1] ^ b[2], zz, 3); + + ImplMulwAcc(u, a[0] ^ a[4], b[0] ^ b[4], zz, 4); + ImplMulwAcc(u, a[1] ^ a[3], b[1] ^ b[3], zz, 4); + + ImplMulwAcc(u, a[0] ^ a[5], b[0] ^ b[5], zz, 5); + ImplMulwAcc(u, a[1] ^ a[4], b[1] ^ b[4], zz, 5); + ImplMulwAcc(u, a[2] ^ a[3], b[2] ^ b[3], zz, 5); + + ImplMulwAcc(u, a[0] ^ a[6], b[0] ^ b[6], zz, 6); + ImplMulwAcc(u, a[1] ^ a[5], b[1] ^ b[5], zz, 6); + ImplMulwAcc(u, a[2] ^ a[4], b[2] ^ b[4], zz, 6); + + ImplMulwAcc(u, a[1] ^ a[6], b[1] ^ b[6], zz, 7); + ImplMulwAcc(u, a[2] ^ a[5], b[2] ^ b[5], zz, 7); + ImplMulwAcc(u, a[3] ^ a[4], b[3] ^ b[4], zz, 7); + + ImplMulwAcc(u, a[2] ^ a[6], b[2] ^ b[6], zz, 8); + ImplMulwAcc(u, a[3] ^ a[5], b[3] ^ b[5], zz, 8); + + ImplMulwAcc(u, a[3] ^ a[6], b[3] ^ b[6], zz, 9); + ImplMulwAcc(u, a[4] ^ a[5], b[4] ^ b[5], zz, 9); + + ImplMulwAcc(u, a[4] ^ a[6], b[4] ^ b[6], zz, 10); + + ImplMulwAcc(u, a[5] ^ a[6], b[5] ^ b[6], zz, 11); + + ImplCompactExt(zz); + } + + protected static void ImplMulwAcc(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { + Debug.Assert(x >> 59 == 0); + Debug.Assert(y >> 59 == 0); + +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X = Vector128.CreateScalar(x); + var Y = Vector128.CreateScalar(y); + var Z = Pclmulqdq.CarrylessMultiply(X, Y, 0x00); + ulong z0 = Z.GetElement(0); + ulong z1 = Z.GetElement(1); + z[zOff ] ^= z0 & M59; + z[zOff + 1] ^= (z0 >> 59) ^ (z1 << 5); + return; + } +#endif + + //u[0] = 0; + u[1] = y; + u[2] = u[1] << 1; + u[3] = u[2] ^ y; + u[4] = u[2] << 1; + u[5] = u[4] ^ y; + u[6] = u[3] << 1; + u[7] = u[6] ^ y; + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 7] + ^ (u[(j >> 3) & 7] << 3); + int k = 54; + do + { + j = (uint)(x >> k); + g = u[j & 7] + ^ u[(j >> 3) & 7] << 3; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 6) > 0); + + Debug.Assert(h >> 53 == 0); + + z[zOff ] ^= l & M59; + z[zOff + 1] ^= (l >> 59) ^ (h << 5); + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 6, zz, 0); + zz[12] = Interleave.Expand32to64((uint)x[6]); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs.meta new file mode 100644 index 00000000..ebbc5eb9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ccd6bfd37370764449af5bb391eaf1e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs new file mode 100644 index 00000000..20d841e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT409FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 409) + throw new ArgumentException("value invalid for SecT409FieldElement", "x"); + + this.x = SecT409Field.FromBigInteger(x); + } + + public SecT409FieldElement() + { + this.x = Nat448.Create64(); + } + + protected internal SecT409FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat448.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat448.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat448.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT409Field"; } + } + + public override int FieldSize + { + get { return 409; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat448.Create64(); + SecT409Field.Add(x, ((SecT409FieldElement)b).x, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat448.Create64(); + SecT409Field.AddOne(x, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat448.Create64(); + SecT409Field.Multiply(x, ((SecT409FieldElement)b).x, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT409FieldElement)b).x; + ulong[] xx = ((SecT409FieldElement)x).x, yx = ((SecT409FieldElement)y).x; + + ulong[] tt = Nat.Create64(13); + SecT409Field.MultiplyAddToExt(ax, bx, tt); + SecT409Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat448.Create64(); + SecT409Field.Reduce(tt, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat448.Create64(); + SecT409Field.Square(x, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT409FieldElement)x).x, yx = ((SecT409FieldElement)y).x; + + ulong[] tt = Nat.Create64(13); + SecT409Field.SquareAddToExt(ax, tt); + SecT409Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat448.Create64(); + SecT409Field.Reduce(tt, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat448.Create64(); + SecT409Field.SquareN(x, pow, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat448.Create64(); + SecT409Field.HalfTrace(x, z); + return new SecT409FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT409Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat448.Create64(); + SecT409Field.Invert(x, z); + return new SecT409FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat448.Create64(); + SecT409Field.Sqrt(x, z); + return new SecT409FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Tpb; } + } + + public virtual int M + { + get { return 409; } + } + + public virtual int K1 + { + get { return 87; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT409FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT409FieldElement); + } + + public virtual bool Equals(SecT409FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat448.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 4090087 ^ Arrays.GetHashCode(x, 0, 7); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs.meta new file mode 100644 index 00000000..668bd91e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c315e45d581e94c469afcec32a3b0384 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs new file mode 100644 index 00000000..f09c9a5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409K1Curve + : AbstractF2mCurve + { + private const int SECT409K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT409K1_FE_LONGS = 7; + private static readonly ECFieldElement[] SECT409K1_AFFINE_ZS = new ECFieldElement[] { new SecT409FieldElement(BigInteger.One) }; + + protected readonly SecT409K1Point m_infinity; + + public SecT409K1Curve() + : base(409, 87, 0, 0) + { + this.m_infinity = new SecT409K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.One); + this.m_order = new BigInteger(1, Hex.DecodeStrict("7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE5F83B2D4EA20400EC4557D5ED3E3E7CA5B4B5C83B8E01E5FCF")); + this.m_cofactor = BigInteger.ValueOf(4); + + this.m_coord = SECT409K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT409K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 409; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT409FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT409K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT409K1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 409; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 87; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT409K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat448.Copy64(((SecT409FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT409K1_FE_LONGS; + Nat448.Copy64(((SecT409FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT409K1_FE_LONGS; + } + } + + return new SecT409K1LookupTable(this, table, len); + } + + private class SecT409K1LookupTable + : AbstractECLookupTable + { + private readonly SecT409K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT409K1LookupTable(SecT409K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat448.Create64(), y = Nat448.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT409K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT409K1_FE_LONGS + j] & MASK; + } + + pos += (SECT409K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat448.Create64(), y = Nat448.Create64(); + int pos = index * SECT409K1_FE_LONGS * 2; + + for (int j = 0; j < SECT409K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT409K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT409FieldElement(x), new SecT409FieldElement(y), SECT409K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs.meta new file mode 100644 index 00000000..890d3cc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f2dfafb380c514e49bbcd437b928604f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs new file mode 100644 index 00000000..33455feb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs @@ -0,0 +1,280 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409K1Point + : AbstractF2mPoint + { + internal SecT409K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT409K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT409K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1); + if (X3.IsZero) + { + return new SecT409K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT409K1Point(curve, X3, curve.B); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT409K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T; + if (Z1IsOne) + { + T = L1.Square().Add(L1); + } + else + { + T = L1.Add(Z1).Multiply(L1); + } + + if (T.IsZero) + { + return new SecT409K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2 = Z1IsOne ? Z1 : Z1Sq.Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3).Add(Z3); + + return new SecT409K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = L1Sq.Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = L2plus1.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT409K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT409K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT409K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs.meta new file mode 100644 index 00000000..ada78f56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f2ed8ce7b9c61814c85060f322e94350 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs new file mode 100644 index 00000000..a64ec57f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409R1Curve + : AbstractF2mCurve + { + private const int SECT409R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT409R1_FE_LONGS = 7; + private static readonly ECFieldElement[] SECT409R1_AFFINE_ZS = new ECFieldElement[] { new SecT409FieldElement(BigInteger.One) }; + + protected readonly SecT409R1Point m_infinity; + + public SecT409R1Curve() + : base(409, 87, 0, 0) + { + this.m_infinity = new SecT409R1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = FromBigInteger(new BigInteger(1, Hex.DecodeStrict("0021A5C2C8EE9FEB5C4B9A753B7B476B7FD6422EF1F3DD674761FA99D6AC27C8A9A197B272822F6CD57A55AA4F50AE317B13545F"))); + this.m_order = new BigInteger(1, Hex.DecodeStrict("010000000000000000000000000000000000000000000000000001E2AAD6A612F33307BE5FA47C3C9E052F838164CD37D9A21173")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT409R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT409R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 409; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT409FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT409R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT409R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 409; } + } + + public virtual bool IsTrinomial + { + get { return true; } + } + + public virtual int K1 + { + get { return 87; } + } + + public virtual int K2 + { + get { return 0; } + } + + public virtual int K3 + { + get { return 0; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT409R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat448.Copy64(((SecT409FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT409R1_FE_LONGS; + Nat448.Copy64(((SecT409FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT409R1_FE_LONGS; + } + } + + return new SecT409R1LookupTable(this, table, len); + } + + private class SecT409R1LookupTable + : AbstractECLookupTable + { + private readonly SecT409R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT409R1LookupTable(SecT409R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat448.Create64(), y = Nat448.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT409R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT409R1_FE_LONGS + j] & MASK; + } + + pos += (SECT409R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat448.Create64(), y = Nat448.Create64(); + int pos = index * SECT409R1_FE_LONGS * 2; + + for (int j = 0; j < SECT409R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT409R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT409FieldElement(x), new SecT409FieldElement(y), SECT409R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs.meta new file mode 100644 index 00000000..41fad6cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec51ba8cda1a7a14b8050a2dd92c398d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs new file mode 100644 index 00000000..e9080e6b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs @@ -0,0 +1,269 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT409R1Point + : AbstractF2mPoint + { + internal SecT409R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT409R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT409R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + ECFieldElement X2 = b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord, Z2 = b.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement U2 = X2, S2 = L2; + if (!Z1IsOne) + { + U2 = U2.Multiply(Z1); + S2 = S2.Multiply(Z1); + } + + bool Z2IsOne = Z2.IsOne; + ECFieldElement U1 = X1, S1 = L1; + if (!Z2IsOne) + { + U1 = U1.Multiply(Z2); + S1 = S1.Multiply(Z2); + } + + ECFieldElement A = S1.Add(S2); + ECFieldElement B = U1.Add(U2); + + if (B.IsZero) + { + if (A.IsZero) + return Twice(); + + return curve.Infinity; + } + + ECFieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT409R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = Y3.Divide(X3).Add(X3); + Z3 = curve.FromBigInteger(BigInteger.One); + } + else + { + B = B.Square(); + + ECFieldElement AU1 = A.Multiply(U1); + ECFieldElement AU2 = A.Multiply(U2); + + X3 = AU1.Multiply(AU2); + if (X3.IsZero) + { + return new SecT409R1Point(curve, X3, curve.B.Sqrt()); + } + + ECFieldElement ABZ2 = A.Multiply(B); + if (!Z2IsOne) + { + ABZ2 = ABZ2.Multiply(Z2); + } + + L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + + Z3 = ABZ2; + if (!Z1IsOne) + { + Z3 = Z3.Multiply(Z1); + } + } + + return new SecT409R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement L1Z1 = Z1IsOne ? L1 : L1.Multiply(Z1); + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T = L1.Square().Add(L1Z1).Add(Z1Sq); + if (T.IsZero) + { + return new SecT409R1Point(curve, T, curve.B.Sqrt()); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement X1Z1 = Z1IsOne ? X1 : X1.Multiply(Z1); + ECFieldElement L3 = X1Z1.SquarePlusProduct(T, L1Z1).Add(X3).Add(Z3); + + return new SecT409R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT409R1Point(curve, A, curve.B.Sqrt()); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT409R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT409R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs.meta new file mode 100644 index 00000000..c509b76a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f713487268a88954fa9f3ba0f8bdf877 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT409R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs new file mode 100644 index 00000000..61f3a793 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs @@ -0,0 +1,459 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571Field + { + private const ulong M59 = ulong.MaxValue >> 5; + + private static readonly ulong[] ROOT_Z = new ulong[]{ 0x2BE1195F08CAFB99UL, 0x95F08CAF84657C23UL, + 0xCAF84657C232BE11UL, 0x657C232BE1195F08UL, 0xF84657C2308CAF84UL, 0x7C232BE1195F08CAUL, + 0xBE1195F08CAF8465UL, 0x5F08CAF84657C232UL, 0x784657C232BE119UL }; + + public static void Add(ulong[] x, ulong[] y, ulong[] z) + { + Nat.Xor64(9, x, y, z); + } + + private static void Add(ulong[] x, int xOff, ulong[] y, int yOff, ulong[] z, int zOff) + { + Nat.Xor64(9, x, xOff, y, yOff, z, zOff); + } + + public static void AddBothTo(ulong[] x, ulong[] y, ulong[] z) + { + for (int i = 0; i < 9; ++i) + { + z[i] ^= x[i] ^ y[i]; + } + } + + private static void AddBothTo(ulong[] x, int xOff, ulong[] y, int yOff, ulong[] z, int zOff) + { + for (int i = 0; i < 9; ++i) + { + z[zOff + i] ^= x[xOff + i] ^ y[yOff + i]; + } + } + + public static void AddExt(ulong[] xx, ulong[] yy, ulong[] zz) + { + Nat.Xor64(18, xx, yy, zz); + } + + public static void AddOne(ulong[] x, ulong[] z) + { + z[0] = x[0] ^ 1UL; + for (int i = 1; i < 9; ++i) + { + z[i] = x[i]; + } + } + + private static void AddTo(ulong[] x, ulong[] z) + { + Nat.XorTo64(9, x, z); + } + + public static ulong[] FromBigInteger(BigInteger x) + { + return Nat.FromBigInteger64(571, x); + } + + public static void HalfTrace(ulong[] x, ulong[] z) + { + ulong[] tt = Nat576.CreateExt64(); + + Nat576.Copy64(x, z); + for (int i = 1; i < 571; i += 2) + { + ImplSquare(z, tt); + Reduce(tt, z); + ImplSquare(z, tt); + Reduce(tt, z); + AddTo(x, z); + } + } + + public static void Invert(ulong[] x, ulong[] z) + { + if (Nat576.IsZero64(x)) + throw new InvalidOperationException(); + + // Itoh-Tsujii inversion with bases { 2, 3, 5 } + + ulong[] t0 = Nat576.Create64(); + ulong[] t1 = Nat576.Create64(); + ulong[] t2 = Nat576.Create64(); + + Square(x, t2); + + // 5 | 570 + Square(t2, t0); + Square(t0, t1); + Multiply(t0, t1, t0); + SquareN(t0, 2, t1); + Multiply(t0, t1, t0); + Multiply(t0, t2, t0); + + // 3 | 114 + SquareN(t0, 5, t1); + Multiply(t0, t1, t0); + SquareN(t1, 5, t1); + Multiply(t0, t1, t0); + + // 2 | 38 + SquareN(t0, 15, t1); + Multiply(t0, t1, t2); + + // ! {2,3,5} | 19 + SquareN(t2, 30, t0); + SquareN(t0, 30, t1); + Multiply(t0, t1, t0); + + // 3 | 9 + SquareN(t0, 60, t1); + Multiply(t0, t1, t0); + SquareN(t1, 60, t1); + Multiply(t0, t1, t0); + + // 3 | 3 + SquareN(t0, 180, t1); + Multiply(t0, t1, t0); + SquareN(t1, 180, t1); + Multiply(t0, t1, t0); + + Multiply(t0, t2, z); + } + + public static void Multiply(ulong[] x, ulong[] y, ulong[] z) + { + ulong[] tt = Nat576.CreateExt64(); + ImplMultiply(x, y, tt); + Reduce(tt, z); + } + + public static void MultiplyAddToExt(ulong[] x, ulong[] y, ulong[] zz) + { + ulong[] tt = Nat576.CreateExt64(); + ImplMultiply(x, y, tt); + AddExt(zz, tt, zz); + } + + public static void MultiplyPrecomp(ulong[] x, ulong[] precomp, ulong[] z) + { + ulong[] tt = Nat576.CreateExt64(); + ImplMultiplyPrecomp(x, precomp, tt); + Reduce(tt, z); + } + + public static void MultiplyPrecompAddToExt(ulong[] x, ulong[] precomp, ulong[] zz) + { + ulong[] tt = Nat576.CreateExt64(); + ImplMultiplyPrecomp(x, precomp, tt); + AddExt(zz, tt, zz); + } + + public static ulong[] PrecompMultiplicand(ulong[] x) + { +#if NETCOREAPP3_0_OR_GREATER + ulong[] z = Nat576.Create64(); + Nat576.Copy64(x, z); + return z; +#else + /* + * Precompute table of all 4-bit products of x (first section) + */ + int len = 9 << 4; + ulong[] t = new ulong[len << 1]; + Array.Copy(x, 0, t, 9, 9); + //Reduce5(t, 9); + int tOff = 0; + for (int i = 7; i > 0; --i) + { + tOff += 18; + Nat.ShiftUpBit64(9, t, tOff >> 1, 0UL, t, tOff); + Reduce5(t, tOff); + Add(t, 9, t, tOff, t, tOff + 9); + } + + /* + * Second section with all 4-bit products of x shifted 4 bits + */ + Nat.ShiftUpBits64(len, t, 0, 4, 0UL, t, len); + + return t; +#endif + } + + public static void Reduce(ulong[] xx, ulong[] z) + { + ulong xx09 = xx[9]; + ulong u = xx[17], v = xx09; + + xx09 = v ^ (u >> 59) ^ (u >> 57) ^ (u >> 54) ^ (u >> 49); + v = xx[8] ^ (u << 5) ^ (u << 7) ^ (u << 10) ^ (u << 15); + + for (int i = 16; i >= 10; --i) + { + u = xx[i]; + z[i - 8] = v ^ (u >> 59) ^ (u >> 57) ^ (u >> 54) ^ (u >> 49); + v = xx[i - 9] ^ (u << 5) ^ (u << 7) ^ (u << 10) ^ (u << 15); + } + + u = xx09; + z[1] = v ^ (u >> 59) ^ (u >> 57) ^ (u >> 54) ^ (u >> 49); + v = xx[0] ^ (u << 5) ^ (u << 7) ^ (u << 10) ^ (u << 15); + + ulong x08 = z[8]; + ulong t = x08 >> 59; + z[0] = v ^ t ^ (t << 2) ^ (t << 5) ^ (t << 10); + z[8] = x08 & M59; + } + + public static void Reduce5(ulong[] z, int zOff) + { + ulong z8 = z[zOff + 8], t = z8 >> 59; + z[zOff ] ^= t ^ (t << 2) ^ (t << 5) ^ (t << 10); + z[zOff + 8] = z8 & M59; + } + + public static void Sqrt(ulong[] x, ulong[] z) + { + ulong[] evn = Nat576.Create64(), odd = Nat576.Create64(); + + odd[0] = Interleave.Unshuffle(x[0], x[1], out evn[0]); + odd[1] = Interleave.Unshuffle(x[2], x[3], out evn[1]); + odd[2] = Interleave.Unshuffle(x[4], x[5], out evn[2]); + odd[3] = Interleave.Unshuffle(x[6], x[7], out evn[3]); + odd[4] = Interleave.Unshuffle(x[8] , out evn[4]); + + Multiply(odd, ROOT_Z, z); + Add(z, evn, z); + } + + public static void Square(ulong[] x, ulong[] z) + { + ulong[] tt = Nat576.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + } + + public static void SquareAddToExt(ulong[] x, ulong[] zz) + { + ulong[] tt = Nat576.CreateExt64(); + ImplSquare(x, tt); + AddExt(zz, tt, zz); + } + + public static void SquareN(ulong[] x, int n, ulong[] z) + { + Debug.Assert(n > 0); + + ulong[] tt = Nat576.CreateExt64(); + ImplSquare(x, tt); + Reduce(tt, z); + + while (--n > 0) + { + ImplSquare(z, tt); + Reduce(tt, z); + } + } + + public static uint Trace(ulong[] x) + { + // Non-zero-trace bits: 0, 561, 569 + return (uint)(x[0] ^ (x[8] >> 49) ^ (x[8] >> 57)) & 1U; + } + + protected static void ImplMultiply(ulong[] x, ulong[] y, ulong[] zz) + { + //ulong[] precomp = PrecompMultiplicand(y); + + //ImplMultiplyPrecomp(x, precomp, zz); + + ulong[] u = new ulong[16]; + for (int i = 0; i < 9; ++i) + { + ImplMulwAcc(u, x[i], y[i], zz, i << 1); + } + + ulong v0 = zz[0], v1 = zz[1]; + v0 ^= zz[ 2]; zz[1] = v0 ^ v1; v1 ^= zz[ 3]; + v0 ^= zz[ 4]; zz[2] = v0 ^ v1; v1 ^= zz[ 5]; + v0 ^= zz[ 6]; zz[3] = v0 ^ v1; v1 ^= zz[ 7]; + v0 ^= zz[ 8]; zz[4] = v0 ^ v1; v1 ^= zz[ 9]; + v0 ^= zz[10]; zz[5] = v0 ^ v1; v1 ^= zz[11]; + v0 ^= zz[12]; zz[6] = v0 ^ v1; v1 ^= zz[13]; + v0 ^= zz[14]; zz[7] = v0 ^ v1; v1 ^= zz[15]; + v0 ^= zz[16]; zz[8] = v0 ^ v1; v1 ^= zz[17]; + + ulong w = v0 ^ v1; + zz[ 9] = zz[0] ^ w; + zz[10] = zz[1] ^ w; + zz[11] = zz[2] ^ w; + zz[12] = zz[3] ^ w; + zz[13] = zz[4] ^ w; + zz[14] = zz[5] ^ w; + zz[15] = zz[6] ^ w; + zz[16] = zz[7] ^ w; + zz[17] = zz[8] ^ w; + + ImplMulwAcc(u, x[0] ^ x[1], y[0] ^ y[1], zz, 1); + + ImplMulwAcc(u, x[0] ^ x[2], y[0] ^ y[2], zz, 2); + + ImplMulwAcc(u, x[0] ^ x[3], y[0] ^ y[3], zz, 3); + ImplMulwAcc(u, x[1] ^ x[2], y[1] ^ y[2], zz, 3); + + ImplMulwAcc(u, x[0] ^ x[4], y[0] ^ y[4], zz, 4); + ImplMulwAcc(u, x[1] ^ x[3], y[1] ^ y[3], zz, 4); + + ImplMulwAcc(u, x[0] ^ x[5], y[0] ^ y[5], zz, 5); + ImplMulwAcc(u, x[1] ^ x[4], y[1] ^ y[4], zz, 5); + ImplMulwAcc(u, x[2] ^ x[3], y[2] ^ y[3], zz, 5); + + ImplMulwAcc(u, x[0] ^ x[6], y[0] ^ y[6], zz, 6); + ImplMulwAcc(u, x[1] ^ x[5], y[1] ^ y[5], zz, 6); + ImplMulwAcc(u, x[2] ^ x[4], y[2] ^ y[4], zz, 6); + + ImplMulwAcc(u, x[0] ^ x[7], y[0] ^ y[7], zz, 7); + ImplMulwAcc(u, x[1] ^ x[6], y[1] ^ y[6], zz, 7); + ImplMulwAcc(u, x[2] ^ x[5], y[2] ^ y[5], zz, 7); + ImplMulwAcc(u, x[3] ^ x[4], y[3] ^ y[4], zz, 7); + + ImplMulwAcc(u, x[0] ^ x[8], y[0] ^ y[8], zz, 8); + ImplMulwAcc(u, x[1] ^ x[7], y[1] ^ y[7], zz, 8); + ImplMulwAcc(u, x[2] ^ x[6], y[2] ^ y[6], zz, 8); + ImplMulwAcc(u, x[3] ^ x[5], y[3] ^ y[5], zz, 8); + + ImplMulwAcc(u, x[1] ^ x[8], y[1] ^ y[8], zz, 9); + ImplMulwAcc(u, x[2] ^ x[7], y[2] ^ y[7], zz, 9); + ImplMulwAcc(u, x[3] ^ x[6], y[3] ^ y[6], zz, 9); + ImplMulwAcc(u, x[4] ^ x[5], y[4] ^ y[5], zz, 9); + + ImplMulwAcc(u, x[2] ^ x[8], y[2] ^ y[8], zz, 10); + ImplMulwAcc(u, x[3] ^ x[7], y[3] ^ y[7], zz, 10); + ImplMulwAcc(u, x[4] ^ x[6], y[4] ^ y[6], zz, 10); + + ImplMulwAcc(u, x[3] ^ x[8], y[3] ^ y[8], zz, 11); + ImplMulwAcc(u, x[4] ^ x[7], y[4] ^ y[7], zz, 11); + ImplMulwAcc(u, x[5] ^ x[6], y[5] ^ y[6], zz, 11); + + ImplMulwAcc(u, x[4] ^ x[8], y[4] ^ y[8], zz, 12); + ImplMulwAcc(u, x[5] ^ x[7], y[5] ^ y[7], zz, 12); + + ImplMulwAcc(u, x[5] ^ x[8], y[5] ^ y[8], zz, 13); + ImplMulwAcc(u, x[6] ^ x[7], y[6] ^ y[7], zz, 13); + + ImplMulwAcc(u, x[6] ^ x[8], y[6] ^ y[8], zz, 14); + + ImplMulwAcc(u, x[7] ^ x[8], y[7] ^ y[8], zz, 15); + } + + protected static void ImplMultiplyPrecomp(ulong[] x, ulong[] precomp, ulong[] zz) + { +#if NETCOREAPP3_0_OR_GREATER + ImplMultiply(x, precomp, zz); +#else + uint MASK = 0xF; + + /* + * Lopez-Dahab algorithm + */ + + for (int k = 56; k >= 0; k -= 8) + { + for (int j = 1; j < 9; j += 2) + { + uint aVal = (uint)(x[j] >> k); + uint u = aVal & MASK; + uint v = (aVal >> 4) & MASK; + AddBothTo(precomp, (int)(9 * u), precomp, (int)(9 * (v + 16)), zz, j - 1); + } + Nat.ShiftUpBits64(16, zz, 0, 8, 0UL); + } + + for (int k = 56; k >= 0; k -= 8) + { + for (int j = 0; j < 9; j += 2) + { + uint aVal = (uint)(x[j] >> k); + uint u = aVal & MASK; + uint v = (aVal >> 4) & MASK; + AddBothTo(precomp, (int)(9 * u), precomp, (int)(9 * (v + 16)), zz, j); + } + if (k > 0) + { + Nat.ShiftUpBits64(18, zz, 0, 8, 0UL); + } + } +#endif + } + + protected static void ImplMulwAcc(ulong[] u, ulong x, ulong y, ulong[] z, int zOff) + { +#if NETCOREAPP3_0_OR_GREATER + if (Pclmulqdq.IsSupported) + { + var X = Vector128.CreateScalar(x); + var Y = Vector128.CreateScalar(y); + var Z = Pclmulqdq.CarrylessMultiply(X, Y, 0x00); + z[zOff ] ^= Z.GetElement(0); + z[zOff + 1] ^= Z.GetElement(1); + return; + } +#endif + + //u[0] = 0; + u[1] = y; + for (int i = 2; i < 16; i += 2) + { + u[i ] = u[i >> 1] << 1; + u[i + 1] = u[i ] ^ y; + } + + uint j = (uint)x; + ulong g, h = 0, l = u[j & 15] + ^ u[(j >> 4) & 15] << 4; + int k = 56; + do + { + j = (uint)(x >> k); + g = u[j & 15] + ^ u[(j >> 4) & 15] << 4; + l ^= (g << k); + h ^= (g >> -k); + } + while ((k -= 8) > 0); + + for (int p = 0; p < 7; ++p) + { + x = (x & 0xFEFEFEFEFEFEFEFEUL) >> 1; + h ^= x & (ulong)((long)(y << p) >> 63); + } + + Debug.Assert(h >> 63 == 0); + + z[zOff ] ^= l; + z[zOff + 1] ^= h; + } + + protected static void ImplSquare(ulong[] x, ulong[] zz) + { + Interleave.Expand64To128(x, 0, 9, zz, 0); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs.meta new file mode 100644 index 00000000..abff431a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92101d0cec31d2745b0531f6b4b3213b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs new file mode 100644 index 00000000..eb9d23e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs @@ -0,0 +1,237 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571FieldElement + : AbstractF2mFieldElement + { + protected internal readonly ulong[] x; + + public SecT571FieldElement(BigInteger x) + { + if (x == null || x.SignValue < 0 || x.BitLength > 571) + throw new ArgumentException("value invalid for SecT571FieldElement", "x"); + + this.x = SecT571Field.FromBigInteger(x); + } + + public SecT571FieldElement() + { + this.x = Nat576.Create64(); + } + + protected internal SecT571FieldElement(ulong[] x) + { + this.x = x; + } + + public override bool IsOne + { + get { return Nat576.IsOne64(x); } + } + + public override bool IsZero + { + get { return Nat576.IsZero64(x); } + } + + public override bool TestBitZero() + { + return (x[0] & 1UL) != 0UL; + } + + public override BigInteger ToBigInteger() + { + return Nat576.ToBigInteger64(x); + } + + public override string FieldName + { + get { return "SecT571Field"; } + } + + public override int FieldSize + { + get { return 571; } + } + + public override ECFieldElement Add(ECFieldElement b) + { + ulong[] z = Nat576.Create64(); + SecT571Field.Add(x, ((SecT571FieldElement)b).x, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement AddOne() + { + ulong[] z = Nat576.Create64(); + SecT571Field.AddOne(x, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement Subtract(ECFieldElement b) + { + // Addition and subtraction are the same in F2m + return Add(b); + } + + public override ECFieldElement Multiply(ECFieldElement b) + { + ulong[] z = Nat576.Create64(); + SecT571Field.Multiply(x, ((SecT571FieldElement)b).x, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement MultiplyMinusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + return MultiplyPlusProduct(b, x, y); + } + + public override ECFieldElement MultiplyPlusProduct(ECFieldElement b, ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x, bx = ((SecT571FieldElement)b).x; + ulong[] xx = ((SecT571FieldElement)x).x, yx = ((SecT571FieldElement)y).x; + + ulong[] tt = Nat576.CreateExt64(); + SecT571Field.MultiplyAddToExt(ax, bx, tt); + SecT571Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat576.Create64(); + SecT571Field.Reduce(tt, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement Divide(ECFieldElement b) + { + return Multiply(b.Invert()); + } + + public override ECFieldElement Negate() + { + return this; + } + + public override ECFieldElement Square() + { + ulong[] z = Nat576.Create64(); + SecT571Field.Square(x, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement SquareMinusProduct(ECFieldElement x, ECFieldElement y) + { + return SquarePlusProduct(x, y); + } + + public override ECFieldElement SquarePlusProduct(ECFieldElement x, ECFieldElement y) + { + ulong[] ax = this.x; + ulong[] xx = ((SecT571FieldElement)x).x, yx = ((SecT571FieldElement)y).x; + + ulong[] tt = Nat576.CreateExt64(); + SecT571Field.SquareAddToExt(ax, tt); + SecT571Field.MultiplyAddToExt(xx, yx, tt); + + ulong[] z = Nat576.Create64(); + SecT571Field.Reduce(tt, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement SquarePow(int pow) + { + if (pow < 1) + return this; + + ulong[] z = Nat576.Create64(); + SecT571Field.SquareN(x, pow, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement HalfTrace() + { + ulong[] z = Nat576.Create64(); + SecT571Field.HalfTrace(x, z); + return new SecT571FieldElement(z); + } + + public override bool HasFastTrace + { + get { return true; } + } + + public override int Trace() + { + return (int)SecT571Field.Trace(x); + } + + public override ECFieldElement Invert() + { + ulong[] z = Nat576.Create64(); + SecT571Field.Invert(x, z); + return new SecT571FieldElement(z); + } + + public override ECFieldElement Sqrt() + { + ulong[] z = Nat576.Create64(); + SecT571Field.Sqrt(x, z); + return new SecT571FieldElement(z); + } + + public virtual int Representation + { + get { return F2mFieldElement.Ppb; } + } + + public virtual int M + { + get { return 571; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 5; } + } + + public virtual int K3 + { + get { return 10; } + } + + public override bool Equals(object obj) + { + return Equals(obj as SecT571FieldElement); + } + + public override bool Equals(ECFieldElement other) + { + return Equals(other as SecT571FieldElement); + } + + public virtual bool Equals(SecT571FieldElement other) + { + if (this == other) + return true; + if (null == other) + return false; + return Nat576.Eq64(x, other.x); + } + + public override int GetHashCode() + { + return 5711052 ^ Arrays.GetHashCode(x, 0, 9); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs.meta new file mode 100644 index 00000000..80c19d6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8da1d21b3df1a094e8708a6d557ab488 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571FieldElement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs new file mode 100644 index 00000000..0bf6b6d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs @@ -0,0 +1,187 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571K1Curve + : AbstractF2mCurve + { + private const int SECT571K1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT571K1_FE_LONGS = 9; + private static readonly ECFieldElement[] SECT571K1_AFFINE_ZS = new ECFieldElement[] { new SecT571FieldElement(BigInteger.One) }; + + protected readonly SecT571K1Point m_infinity; + + public SecT571K1Curve() + : base(571, 2, 5, 10) + { + this.m_infinity = new SecT571K1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.Zero); + this.m_b = FromBigInteger(BigInteger.One); + this.m_order = new BigInteger(1, Hex.DecodeStrict("020000000000000000000000000000000000000000000000000000000000000000000000131850E1F19A63E4B391A8DB917F4138B630D84BE5D639381E91DEB45CFE778F637C1001")); + this.m_cofactor = BigInteger.ValueOf(4); + + this.m_coord = SECT571K1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT571K1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + protected override ECMultiplier CreateDefaultMultiplier() + { + return new WTauNafMultiplier(); + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 571; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT571FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT571K1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT571K1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return true; } + } + + public virtual int M + { + get { return 571; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 5; } + } + + public virtual int K3 + { + get { return 10; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT571K1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat576.Copy64(((SecT571FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT571K1_FE_LONGS; + Nat576.Copy64(((SecT571FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT571K1_FE_LONGS; + } + } + + return new SecT571K1LookupTable(this, table, len); + } + + private class SecT571K1LookupTable + : AbstractECLookupTable + { + private readonly SecT571K1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT571K1LookupTable(SecT571K1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat576.Create64(), y = Nat576.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT571K1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT571K1_FE_LONGS + j] & MASK; + } + + pos += (SECT571K1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat576.Create64(), y = Nat576.Create64(); + int pos = index * SECT571K1_FE_LONGS * 2; + + for (int j = 0; j < SECT571K1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT571K1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT571FieldElement(x), new SecT571FieldElement(y), SECT571K1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs.meta new file mode 100644 index 00000000..7b76b83f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 77a999359d57bdd428d3af8a7011dfba +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs new file mode 100644 index 00000000..f462743f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs @@ -0,0 +1,318 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571K1Point + : AbstractF2mPoint + { + internal SecT571K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT571K1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT571K1Point(null, this.AffineXCoord, this.AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecT571FieldElement X1 = (SecT571FieldElement)this.RawXCoord; + SecT571FieldElement X2 = (SecT571FieldElement)b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + SecT571FieldElement L1 = (SecT571FieldElement)this.RawYCoord, Z1 = (SecT571FieldElement)this.RawZCoords[0]; + SecT571FieldElement L2 = (SecT571FieldElement)b.RawYCoord, Z2 = (SecT571FieldElement)b.RawZCoords[0]; + + ulong[] t1 = Nat576.Create64(); + ulong[] t2 = Nat576.Create64(); + ulong[] t3 = Nat576.Create64(); + ulong[] t4 = Nat576.Create64(); + + ulong[] Z1Precomp = Z1.IsOne ? null : SecT571Field.PrecompMultiplicand(Z1.x); + ulong[] U2, S2; + if (Z1Precomp == null) + { + U2 = X2.x; + S2 = L2.x; + } + else + { + SecT571Field.MultiplyPrecomp(X2.x, Z1Precomp, U2 = t2); + SecT571Field.MultiplyPrecomp(L2.x, Z1Precomp, S2 = t4); + } + + ulong[] Z2Precomp = Z2.IsOne ? null : SecT571Field.PrecompMultiplicand(Z2.x); + ulong[] U1, S1; + if (Z2Precomp == null) + { + U1 = X1.x; + S1 = L1.x; + } + else + { + SecT571Field.MultiplyPrecomp(X1.x, Z2Precomp, U1 = t1); + SecT571Field.MultiplyPrecomp(L1.x, Z2Precomp, S1 = t3); + } + + ulong[] A = t3; + SecT571Field.Add(S1, S2, A); + + ulong[] B = t4; + SecT571Field.Add(U1, U2, B); + + if (Nat576.IsZero64(B)) + { + if (Nat576.IsZero64(A)) + return Twice(); + + return curve.Infinity; + } + + SecT571FieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = (SecT571FieldElement)p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = (SecT571FieldElement)L.Square().Add(L).Add(X1); + if (X3.IsZero) + { + return new SecT571K1Point(curve, X3, curve.B); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = (SecT571FieldElement)Y3.Divide(X3).Add(X3); + Z3 = (SecT571FieldElement)curve.FromBigInteger(BigInteger.One); + } + else + { + SecT571Field.Square(B, B); + + ulong[] APrecomp = SecT571Field.PrecompMultiplicand(A); + + ulong[] AU1 = t1; + ulong[] AU2 = t2; + + SecT571Field.MultiplyPrecomp(U1, APrecomp, AU1); + SecT571Field.MultiplyPrecomp(U2, APrecomp, AU2); + + X3 = new SecT571FieldElement(t1); + SecT571Field.Multiply(AU1, AU2, X3.x); + + if (X3.IsZero) + { + return new SecT571K1Point(curve, X3, curve.B); + } + + Z3 = new SecT571FieldElement(t3); + SecT571Field.MultiplyPrecomp(B, APrecomp, Z3.x); + + if (Z2Precomp != null) + { + SecT571Field.MultiplyPrecomp(Z3.x, Z2Precomp, Z3.x); + } + + //L3 = AU2.Add(B).SquarePlusProduct(ABZ2, L1.Add(Z1)); + ulong[] tt = Nat576.CreateExt64(); + + SecT571Field.Add(AU2, B, t4); + SecT571Field.SquareAddToExt(t4, tt); + + SecT571Field.Add(L1.x, Z1.x, t4); + SecT571Field.MultiplyAddToExt(t4, Z3.x, tt); + + L3 = new SecT571FieldElement(t4); + SecT571Field.Reduce(tt, L3.x); + + if (Z1Precomp != null) + { + SecT571Field.MultiplyPrecomp(Z3.x, Z1Precomp, Z3.x); + } + } + + return new SecT571K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + + bool Z1IsOne = Z1.IsOne; + ECFieldElement Z1Sq = Z1IsOne ? Z1 : Z1.Square(); + ECFieldElement T; + if (Z1IsOne) + { + T = L1.Square().Add(L1); + } + else + { + T = L1.Add(Z1).Multiply(L1); + } + + if (T.IsZero) + { + return new SecT571K1Point(curve, T, curve.B); + } + + ECFieldElement X3 = T.Square(); + ECFieldElement Z3 = Z1IsOne ? T : T.Multiply(Z1Sq); + + ECFieldElement t1 = L1.Add(X1).Square(); + ECFieldElement t2 = Z1IsOne ? Z1 : Z1Sq.Square(); + ECFieldElement L3 = t1.Add(T).Add(Z1Sq).Multiply(t1).Add(t2).Add(X3).Add(Z3); + + return new SecT571K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + // NOTE: TwicePlus() only optimized for lambda-affine argument + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = L1Sq.Add(L1Z1); + ECFieldElement L2plus1 = L2.AddOne(); + ECFieldElement A = L2plus1.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT571K1Point(curve, A, curve.B); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2plus1, Z3); + + return new SecT571K1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT571K1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs.meta new file mode 100644 index 00000000..ffd702a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 29c8e62b02843aa4eb9509e503de6152 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571K1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs new file mode 100644 index 00000000..db5e4726 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs @@ -0,0 +1,185 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571R1Curve + : AbstractF2mCurve + { + private const int SECT571R1_DEFAULT_COORDS = COORD_LAMBDA_PROJECTIVE; + private const int SECT571R1_FE_LONGS = 9; + private static readonly ECFieldElement[] SECT571R1_AFFINE_ZS = new ECFieldElement[] { new SecT571FieldElement(BigInteger.One) }; + + protected readonly SecT571R1Point m_infinity; + + internal static readonly SecT571FieldElement SecT571R1_B = new SecT571FieldElement( + new BigInteger(1, Hex.DecodeStrict("02F40E7E2221F295DE297117B7F3D62F5C6A97FFCB8CEFF1CD6BA8CE4A9A18AD84FFABBD8EFA59332BE7AD6756A66E294AFD185A78FF12AA520E4DE739BACA0C7FFEFF7F2955727A"))); + internal static readonly SecT571FieldElement SecT571R1_B_SQRT = (SecT571FieldElement)SecT571R1_B.Sqrt(); + + public SecT571R1Curve() + : base(571, 2, 5, 10) + { + this.m_infinity = new SecT571R1Point(this, null, null); + + this.m_a = FromBigInteger(BigInteger.One); + this.m_b = SecT571R1_B; + this.m_order = new BigInteger(1, Hex.DecodeStrict("03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE661CE18FF55987308059B186823851EC7DD9CA1161DE93D5174D66E8382E9BB2FE84E47")); + this.m_cofactor = BigInteger.Two; + + this.m_coord = SECT571R1_DEFAULT_COORDS; + } + + protected override ECCurve CloneCurve() + { + return new SecT571R1Curve(); + } + + public override bool SupportsCoordinateSystem(int coord) + { + switch (coord) + { + case COORD_LAMBDA_PROJECTIVE: + return true; + default: + return false; + } + } + + public override ECPoint Infinity + { + get { return m_infinity; } + } + + public override int FieldSize + { + get { return 571; } + } + + public override ECFieldElement FromBigInteger(BigInteger x) + { + return new SecT571FieldElement(x); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y) + { + return new SecT571R1Point(this, x, y); + } + + protected internal override ECPoint CreateRawPoint(ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + { + return new SecT571R1Point(this, x, y, zs); + } + + public override bool IsKoblitz + { + get { return false; } + } + + public virtual int M + { + get { return 571; } + } + + public virtual bool IsTrinomial + { + get { return false; } + } + + public virtual int K1 + { + get { return 2; } + } + + public virtual int K2 + { + get { return 5; } + } + + public virtual int K3 + { + get { return 10; } + } + + public override ECLookupTable CreateCacheSafeLookupTable(ECPoint[] points, int off, int len) + { + ulong[] table = new ulong[len * SECT571R1_FE_LONGS * 2]; + { + int pos = 0; + for (int i = 0; i < len; ++i) + { + ECPoint p = points[off + i]; + Nat576.Copy64(((SecT571FieldElement)p.RawXCoord).x, 0, table, pos); pos += SECT571R1_FE_LONGS; + Nat576.Copy64(((SecT571FieldElement)p.RawYCoord).x, 0, table, pos); pos += SECT571R1_FE_LONGS; + } + } + + return new SecT571R1LookupTable(this, table, len); + } + + private class SecT571R1LookupTable + : AbstractECLookupTable + { + private readonly SecT571R1Curve m_outer; + private readonly ulong[] m_table; + private readonly int m_size; + + internal SecT571R1LookupTable(SecT571R1Curve outer, ulong[] table, int size) + { + this.m_outer = outer; + this.m_table = table; + this.m_size = size; + } + + public override int Size + { + get { return m_size; } + } + + public override ECPoint Lookup(int index) + { + ulong[] x = Nat576.Create64(), y = Nat576.Create64(); + int pos = 0; + + for (int i = 0; i < m_size; ++i) + { + ulong MASK = (ulong)(long)(((i ^ index) - 1) >> 31); + + for (int j = 0; j < SECT571R1_FE_LONGS; ++j) + { + x[j] ^= m_table[pos + j] & MASK; + y[j] ^= m_table[pos + SECT571R1_FE_LONGS + j] & MASK; + } + + pos += (SECT571R1_FE_LONGS * 2); + } + + return CreatePoint(x, y); + } + + public override ECPoint LookupVar(int index) + { + ulong[] x = Nat576.Create64(), y = Nat576.Create64(); + int pos = index * SECT571R1_FE_LONGS * 2; + + for (int j = 0; j < SECT571R1_FE_LONGS; ++j) + { + x[j] = m_table[pos + j]; + y[j] = m_table[pos + SECT571R1_FE_LONGS + j]; + } + + return CreatePoint(x, y); + } + + private ECPoint CreatePoint(ulong[] x, ulong[] y) + { + return m_outer.CreateRawPoint(new SecT571FieldElement(x), new SecT571FieldElement(y), SECT571R1_AFFINE_ZS); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs.meta new file mode 100644 index 00000000..48f94bc4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c8d7f5ae3ae949e4c94174157bc7c58e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Curve.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs new file mode 100644 index 00000000..589879e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs @@ -0,0 +1,343 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Custom.Sec +{ + internal class SecT571R1Point + : AbstractF2mPoint + { + internal SecT571R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y) + : base(curve, x, y) + { + } + + internal SecT571R1Point(ECCurve curve, ECFieldElement x, ECFieldElement y, ECFieldElement[] zs) + : base(curve, x, y, zs) + { + } + + protected override ECPoint Detach() + { + return new SecT571R1Point(null, AffineXCoord, AffineYCoord); + } + + public override ECFieldElement YCoord + { + get + { + ECFieldElement X = RawXCoord, L = RawYCoord; + + if (this.IsInfinity || X.IsZero) + return L; + + // Y is actually Lambda (X + Y/X) here; convert to affine value on the fly + ECFieldElement Y = L.Add(X).Multiply(X); + + ECFieldElement Z = RawZCoords[0]; + if (!Z.IsOne) + { + Y = Y.Divide(Z); + } + + return Y; + } + } + + protected internal override bool CompressionYTilde + { + get + { + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return false; + + ECFieldElement Y = this.RawYCoord; + + // Y is actually Lambda (X + Y/X) here + return Y.TestBitZero() != X.TestBitZero(); + } + } + + public override ECPoint Add(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecT571FieldElement X1 = (SecT571FieldElement)this.RawXCoord; + SecT571FieldElement X2 = (SecT571FieldElement)b.RawXCoord; + + if (X1.IsZero) + { + if (X2.IsZero) + return curve.Infinity; + + return b.Add(this); + } + + SecT571FieldElement L1 = (SecT571FieldElement)this.RawYCoord, Z1 = (SecT571FieldElement)this.RawZCoords[0]; + SecT571FieldElement L2 = (SecT571FieldElement)b.RawYCoord, Z2 = (SecT571FieldElement)b.RawZCoords[0]; + + ulong[] t1 = Nat576.Create64(); + ulong[] t2 = Nat576.Create64(); + ulong[] t3 = Nat576.Create64(); + ulong[] t4 = Nat576.Create64(); + + ulong[] Z1Precomp = Z1.IsOne ? null : SecT571Field.PrecompMultiplicand(Z1.x); + ulong[] U2, S2; + if (Z1Precomp == null) + { + U2 = X2.x; + S2 = L2.x; + } + else + { + SecT571Field.MultiplyPrecomp(X2.x, Z1Precomp, U2 = t2); + SecT571Field.MultiplyPrecomp(L2.x, Z1Precomp, S2 = t4); + } + + ulong[] Z2Precomp = Z2.IsOne ? null : SecT571Field.PrecompMultiplicand(Z2.x); + ulong[] U1, S1; + if (Z2Precomp == null) + { + U1 = X1.x; + S1 = L1.x; + } + else + { + SecT571Field.MultiplyPrecomp(X1.x, Z2Precomp, U1 = t1); + SecT571Field.MultiplyPrecomp(L1.x, Z2Precomp, S1 = t3); + } + + ulong[] A = t3; + SecT571Field.Add(S1, S2, A); + + ulong[] B = t4; + SecT571Field.Add(U1, U2, B); + + if (Nat576.IsZero64(B)) + { + if (Nat576.IsZero64(A)) + return Twice(); + + return curve.Infinity; + } + + SecT571FieldElement X3, L3, Z3; + if (X2.IsZero) + { + // TODO This can probably be optimized quite a bit + ECPoint p = this.Normalize(); + X1 = (SecT571FieldElement)p.XCoord; + ECFieldElement Y1 = p.YCoord; + + ECFieldElement Y2 = L2; + ECFieldElement L = Y1.Add(Y2).Divide(X1); + + X3 = (SecT571FieldElement)L.Square().Add(L).Add(X1).AddOne(); + if (X3.IsZero) + { + return new SecT571R1Point(curve, X3, SecT571R1Curve.SecT571R1_B_SQRT); + } + + ECFieldElement Y3 = L.Multiply(X1.Add(X3)).Add(X3).Add(Y1); + L3 = (SecT571FieldElement)Y3.Divide(X3).Add(X3); + Z3 = (SecT571FieldElement)curve.FromBigInteger(BigInteger.One); + } + else + { + SecT571Field.Square(B, B); + + ulong[] APrecomp = SecT571Field.PrecompMultiplicand(A); + + ulong[] AU1 = t1; + ulong[] AU2 = t2; + + SecT571Field.MultiplyPrecomp(U1, APrecomp, AU1); + SecT571Field.MultiplyPrecomp(U2, APrecomp, AU2); + + X3 = new SecT571FieldElement(t1); + SecT571Field.Multiply(AU1, AU2, X3.x); + + if (X3.IsZero) + { + return new SecT571R1Point(curve, X3, SecT571R1Curve.SecT571R1_B_SQRT); + } + + Z3 = new SecT571FieldElement(t3); + SecT571Field.MultiplyPrecomp(B, APrecomp, Z3.x); + + if (Z2Precomp != null) + { + SecT571Field.MultiplyPrecomp(Z3.x, Z2Precomp, Z3.x); + } + + ulong[] tt = Nat576.CreateExt64(); + + SecT571Field.Add(AU2, B, t4); + SecT571Field.SquareAddToExt(t4, tt); + + SecT571Field.Add(L1.x, Z1.x, t4); + SecT571Field.MultiplyAddToExt(t4, Z3.x, tt); + + L3 = new SecT571FieldElement(t4); + SecT571Field.Reduce(tt, L3.x); + + if (Z1Precomp != null) + { + SecT571Field.MultiplyPrecomp(Z3.x, Z1Precomp, Z3.x); + } + } + + return new SecT571R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Twice() + { + if (this.IsInfinity) + return this; + + ECCurve curve = this.Curve; + + SecT571FieldElement X1 = (SecT571FieldElement)this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return curve.Infinity; + } + + SecT571FieldElement L1 = (SecT571FieldElement)this.RawYCoord, Z1 = (SecT571FieldElement)this.RawZCoords[0]; + + ulong[] t1 = Nat576.Create64(); + ulong[] t2 = Nat576.Create64(); + + ulong[] Z1Precomp = Z1.IsOne ? null : SecT571Field.PrecompMultiplicand(Z1.x); + ulong[] L1Z1, Z1Sq; + if (Z1Precomp == null) + { + L1Z1 = L1.x; + Z1Sq = Z1.x; + } + else + { + SecT571Field.MultiplyPrecomp(L1.x, Z1Precomp, L1Z1 = t1); + SecT571Field.Square(Z1.x, Z1Sq = t2); + } + + ulong[] T = Nat576.Create64(); + SecT571Field.Square(L1.x, T); + SecT571Field.AddBothTo(L1Z1, Z1Sq, T); + + if (Nat576.IsZero64(T)) + { + return new SecT571R1Point(curve, new SecT571FieldElement(T), SecT571R1Curve.SecT571R1_B_SQRT); + } + + ulong[] tt = Nat576.CreateExt64(); + SecT571Field.MultiplyAddToExt(T, L1Z1, tt); + + SecT571FieldElement X3 = new SecT571FieldElement(t1); + SecT571Field.Square(T, X3.x); + + SecT571FieldElement Z3 = new SecT571FieldElement(T); + if (Z1Precomp != null) + { + SecT571Field.Multiply(Z3.x, Z1Sq, Z3.x); + } + + ulong[] X1Z1; + if (Z1Precomp == null) + { + X1Z1 = X1.x; + } + else + { + SecT571Field.MultiplyPrecomp(X1.x, Z1Precomp, X1Z1 = t2); + } + + SecT571Field.SquareAddToExt(X1Z1, tt); + SecT571Field.Reduce(tt, t2); + SecT571Field.AddBothTo(X3.x, Z3.x, t2); + SecT571FieldElement L3 = new SecT571FieldElement(t2); + + return new SecT571R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint TwicePlus(ECPoint b) + { + if (this.IsInfinity) + return b; + if (b.IsInfinity) + return Twice(); + + ECCurve curve = this.Curve; + + ECFieldElement X1 = this.RawXCoord; + if (X1.IsZero) + { + // A point with X == 0 is its own additive inverse + return b; + } + + ECFieldElement X2 = b.RawXCoord, Z2 = b.RawZCoords[0]; + if (X2.IsZero || !Z2.IsOne) + { + return Twice().Add(b); + } + + ECFieldElement L1 = this.RawYCoord, Z1 = this.RawZCoords[0]; + ECFieldElement L2 = b.RawYCoord; + + ECFieldElement X1Sq = X1.Square(); + ECFieldElement L1Sq = L1.Square(); + ECFieldElement Z1Sq = Z1.Square(); + ECFieldElement L1Z1 = L1.Multiply(Z1); + + ECFieldElement T = Z1Sq.Add(L1Sq).Add(L1Z1); + ECFieldElement A = L2.Multiply(Z1Sq).Add(L1Sq).MultiplyPlusProduct(T, X1Sq, Z1Sq); + ECFieldElement X2Z1Sq = X2.Multiply(Z1Sq); + ECFieldElement B = X2Z1Sq.Add(T).Square(); + + if (B.IsZero) + { + if (A.IsZero) + return b.Twice(); + + return curve.Infinity; + } + + if (A.IsZero) + { + return new SecT571R1Point(curve, A, SecT571R1Curve.SecT571R1_B_SQRT); + } + + ECFieldElement X3 = A.Square().Multiply(X2Z1Sq); + ECFieldElement Z3 = A.Multiply(B).Multiply(Z1Sq); + ECFieldElement L3 = A.Add(B).Square().MultiplyPlusProduct(T, L2.AddOne(), Z3); + + return new SecT571R1Point(curve, X3, L3, new ECFieldElement[] { Z3 }); + } + + public override ECPoint Negate() + { + if (this.IsInfinity) + return this; + + ECFieldElement X = this.RawXCoord; + if (X.IsZero) + return this; + + // L is actually Lambda (X + Y/X) here + ECFieldElement L = this.RawYCoord, Z = this.RawZCoords[0]; + return new SecT571R1Point(Curve, X, L.Add(Z), new ECFieldElement[] { Z }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs.meta new file mode 100644 index 00000000..47ba7f32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5e64b6aee3e258343a8a96a6f5381e3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/custom/sec/SecT571R1Point.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo.meta new file mode 100644 index 00000000..5ab897a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6e80356e1db179441965253b06280be8 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs new file mode 100644 index 00000000..733c9369 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public interface ECEndomorphism + { + ECPointMap PointMap { get; } + + bool HasEfficientPointMap { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs.meta new file mode 100644 index 00000000..0f94d6a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93385e29ae2625345826e81ec706ef3d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ECEndomorphism.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs new file mode 100644 index 00000000..418c1209 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class EndoPreCompInfo + : PreCompInfo + { + protected ECEndomorphism m_endomorphism; + + protected ECPoint m_mappedPoint; + + public virtual ECEndomorphism Endomorphism + { + get { return m_endomorphism; } + set { this.m_endomorphism = value; } + } + + public virtual ECPoint MappedPoint + { + get { return m_mappedPoint; } + set { this.m_mappedPoint = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs.meta new file mode 100644 index 00000000..fea8dd32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ce9bd5de28dc93c4c998e2e785e856cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoPreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs new file mode 100644 index 00000000..054070f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public abstract class EndoUtilities + { + public static readonly string PRECOMP_NAME = "bc_endo"; + + public static BigInteger[] DecomposeScalar(ScalarSplitParameters p, BigInteger k) + { + int bits = p.Bits; + BigInteger b1 = CalculateB(k, p.G1, bits); + BigInteger b2 = CalculateB(k, p.G2, bits); + + BigInteger a = k.Subtract((b1.Multiply(p.V1A)).Add(b2.Multiply(p.V2A))); + BigInteger b = (b1.Multiply(p.V1B)).Add(b2.Multiply(p.V2B)).Negate(); + + return new BigInteger[]{ a, b }; + } + + public static ECPoint MapPoint(ECEndomorphism endomorphism, ECPoint p) + { + EndoPreCompInfo precomp = (EndoPreCompInfo)p.Curve.Precompute(p, PRECOMP_NAME, + new MapPointCallback(endomorphism, p)); + return precomp.MappedPoint; + } + + private static BigInteger CalculateB(BigInteger k, BigInteger g, int t) + { + bool negative = (g.SignValue < 0); + BigInteger b = k.Multiply(g.Abs()); + bool extra = b.TestBit(t - 1); + b = b.ShiftRight(t); + if (extra) + { + b = b.Add(BigInteger.One); + } + return negative ? b.Negate() : b; + } + + private class MapPointCallback + : IPreCompCallback + { + private readonly ECEndomorphism m_endomorphism; + private readonly ECPoint m_point; + + internal MapPointCallback(ECEndomorphism endomorphism, ECPoint point) + { + this.m_endomorphism = endomorphism; + this.m_point = point; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + EndoPreCompInfo existingEndo = existing as EndoPreCompInfo; + + if (CheckExisting(existingEndo, m_endomorphism)) + return existingEndo; + + ECPoint mappedPoint = m_endomorphism.PointMap.Map(m_point); + + EndoPreCompInfo result = new EndoPreCompInfo(); + result.Endomorphism = m_endomorphism; + result.MappedPoint = mappedPoint; + return result; + } + + private bool CheckExisting(EndoPreCompInfo existingEndo, ECEndomorphism endomorphism) + { + return null != existingEndo + && existingEndo.Endomorphism == endomorphism + && existingEndo.MappedPoint != null; + } + + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs.meta new file mode 100644 index 00000000..eb1a2837 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6838274c3fe2c5f43af09b73c6568e3a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/EndoUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs new file mode 100644 index 00000000..3235f9ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public interface GlvEndomorphism + : ECEndomorphism + { + BigInteger[] DecomposeScalar(BigInteger k); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs.meta new file mode 100644 index 00000000..bed9f87f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 36ab51057b17c4e4e9a32abcfb8009c5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvEndomorphism.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs new file mode 100644 index 00000000..c1f4c672 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class GlvTypeAEndomorphism + : GlvEndomorphism + { + protected readonly GlvTypeAParameters m_parameters; + protected readonly ECPointMap m_pointMap; + + public GlvTypeAEndomorphism(ECCurve curve, GlvTypeAParameters parameters) + { + /* + * NOTE: 'curve' MUST only be used to create a suitable ECFieldElement. Due to the way + * ECCurve configuration works, 'curve' will not be the actual instance of ECCurve that the + * endomorphism is being used with. + */ + + this.m_parameters = parameters; + this.m_pointMap = new ScaleYNegateXPointMap(curve.FromBigInteger(parameters.I)); + } + + public virtual BigInteger[] DecomposeScalar(BigInteger k) + { + return EndoUtilities.DecomposeScalar(m_parameters.SplitParams, k); + } + + public virtual ECPointMap PointMap + { + get { return m_pointMap; } + } + + public virtual bool HasEfficientPointMap + { + get { return true; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs.meta new file mode 100644 index 00000000..03ea24f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f7c44c25321a4d469d593742da9e625 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAEndomorphism.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs new file mode 100644 index 00000000..528cbc24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class GlvTypeAParameters + { + protected readonly BigInteger m_i, m_lambda; + protected readonly ScalarSplitParameters m_splitParams; + + public GlvTypeAParameters(BigInteger i, BigInteger lambda, ScalarSplitParameters splitParams) + { + this.m_i = i; + this.m_lambda = lambda; + this.m_splitParams = splitParams; + } + + public virtual BigInteger I + { + get { return m_i; } + } + + public virtual BigInteger Lambda + { + get { return m_lambda; } + } + + public virtual ScalarSplitParameters SplitParams + { + get { return m_splitParams; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs.meta new file mode 100644 index 00000000..598f994e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e2849c73ad905e649946a22820b89322 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeAParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs new file mode 100644 index 00000000..aded0232 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class GlvTypeBEndomorphism + : GlvEndomorphism + { + protected readonly GlvTypeBParameters m_parameters; + protected readonly ECPointMap m_pointMap; + + public GlvTypeBEndomorphism(ECCurve curve, GlvTypeBParameters parameters) + { + /* + * NOTE: 'curve' MUST only be used to create a suitable ECFieldElement. Due to the way + * ECCurve configuration works, 'curve' will not be the actual instance of ECCurve that the + * endomorphism is being used with. + */ + + this.m_parameters = parameters; + this.m_pointMap = new ScaleXPointMap(curve.FromBigInteger(parameters.Beta)); + } + + public virtual BigInteger[] DecomposeScalar(BigInteger k) + { + return EndoUtilities.DecomposeScalar(m_parameters.SplitParams, k); + } + + public virtual ECPointMap PointMap + { + get { return m_pointMap; } + } + + public virtual bool HasEfficientPointMap + { + get { return true; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs.meta new file mode 100644 index 00000000..6aa89950 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ae30f7f5f4ea222479a1f46ea5e50d9e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBEndomorphism.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs new file mode 100644 index 00000000..5074ba62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class GlvTypeBParameters + { + protected readonly BigInteger m_beta, m_lambda; + protected readonly ScalarSplitParameters m_splitParams; + + public GlvTypeBParameters(BigInteger beta, BigInteger lambda, ScalarSplitParameters splitParams) + { + this.m_beta = beta; + this.m_lambda = lambda; + this.m_splitParams = splitParams; + } + + public virtual BigInteger Beta + { + get { return m_beta; } + } + + public virtual BigInteger Lambda + { + get { return m_lambda; } + } + + public virtual ScalarSplitParameters SplitParams + { + get { return m_splitParams; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs.meta new file mode 100644 index 00000000..0bbbb305 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b10576d8dc860dc4f9cabc458774a32d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/GlvTypeBParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs new file mode 100644 index 00000000..637ed681 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo +{ + public class ScalarSplitParameters + { + private static void CheckVector(BigInteger[] v, string name) + { + if (v == null || v.Length != 2 || v[0] == null || v[1] == null) + throw new ArgumentException("Must consist of exactly 2 (non-null) values", name); + } + + protected readonly BigInteger m_v1A, m_v1B, m_v2A, m_v2B; + protected readonly BigInteger m_g1, m_g2; + protected readonly int m_bits; + + public ScalarSplitParameters(BigInteger[] v1, BigInteger[] v2, BigInteger g1, + BigInteger g2, int bits) + { + CheckVector(v1, "v1"); + CheckVector(v2, "v2"); + + this.m_v1A = v1[0]; + this.m_v1B = v1[1]; + this.m_v2A = v2[0]; + this.m_v2B = v2[1]; + this.m_g1 = g1; + this.m_g2 = g2; + this.m_bits = bits; + } + + public virtual BigInteger V1A + { + get { return m_v1A; } + } + + public virtual BigInteger V1B + { + get { return m_v1B; } + } + + public virtual BigInteger V2A + { + get { return m_v2A; } + } + + public virtual BigInteger V2B + { + get { return m_v2B; } + } + + public virtual BigInteger G1 + { + get { return m_g1; } + } + + public virtual BigInteger G2 + { + get { return m_g2; } + } + + public virtual int Bits + { + get { return m_bits; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs.meta new file mode 100644 index 00000000..e5fccc3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a14dfe81c3b33ca42847862950b4785c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/endo/ScalarSplitParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier.meta new file mode 100644 index 00000000..5e6964bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9cf9591e203ab824a9acd106f949e5de +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs new file mode 100644 index 00000000..ef11af42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public abstract class AbstractECMultiplier + : ECMultiplier + { + public virtual ECPoint Multiply(ECPoint p, BigInteger k) + { + int sign = k.SignValue; + if (sign == 0 || p.IsInfinity) + return p.Curve.Infinity; + + ECPoint positive = MultiplyPositive(p, k.Abs()); + ECPoint result = sign > 0 ? positive : positive.Negate(); + + /* + * Although the various multipliers ought not to produce invalid output under normal + * circumstances, a final check here is advised to guard against fault attacks. + */ + return CheckResult(result); + } + + protected abstract ECPoint MultiplyPositive(ECPoint p, BigInteger k); + + protected virtual ECPoint CheckResult(ECPoint p) + { + return ECAlgorithms.ImplCheckResult(p); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs.meta new file mode 100644 index 00000000..fa40761c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1a02407f48267dc41b4c1ad5125b5462 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/AbstractECMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs new file mode 100644 index 00000000..214755fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Interface for classes encapsulating a point multiplication algorithm + * for ECPoints. + */ + public interface ECMultiplier + { + /** + * Multiplies the ECPoint p by k, i.e. + * p is added k times to itself. + * @param p The ECPoint to be multiplied. + * @param k The factor by which p is multiplied. + * @return p multiplied by k. + */ + ECPoint Multiply(ECPoint p, BigInteger k); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs.meta new file mode 100644 index 00000000..a77a631e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f1d6c36605e51984fb5c9c08696690b6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ECMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs new file mode 100644 index 00000000..f3e26ecf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public class FixedPointCombMultiplier + : AbstractECMultiplier + { + protected override ECPoint MultiplyPositive(ECPoint p, BigInteger k) + { + ECCurve c = p.Curve; + int size = FixedPointUtilities.GetCombSize(c); + + if (k.BitLength > size) + { + /* + * TODO The comb works best when the scalars are less than the (possibly unknown) order. + * Still, if we want to handle larger scalars, we could allow customization of the comb + * size, or alternatively we could deal with the 'extra' bits either by running the comb + * multiple times as necessary, or by using an alternative multiplier as prelude. + */ + throw new InvalidOperationException("fixed-point comb doesn't support scalars larger than the curve order"); + } + + FixedPointPreCompInfo info = FixedPointUtilities.Precompute(p); + ECLookupTable lookupTable = info.LookupTable; + int width = info.Width; + + int d = (size + width - 1) / width; + int fullComb = d * width; + + ECPoint R = c.Infinity; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int KLen = Nat.GetLengthForBits(fullComb); + Span K = KLen <= 32 + ? stackalloc uint[KLen] + : new uint[KLen]; + Nat.FromBigInteger(fullComb, k, K); +#else + uint[] K = Nat.FromBigInteger(fullComb, k); +#endif + + for (int i = 1; i <= d; ++i) + { + uint secretIndex = 0; + + for (int j = fullComb - i; j >= 0; j -= d) + { + uint secretBit = K[j >> 5] >> (j & 0x1F); + secretIndex ^= secretBit >> 1; + secretIndex <<= 1; + secretIndex ^= secretBit; + } + + ECPoint add = lookupTable.Lookup((int)secretIndex); + + R = R.TwicePlus(add); + } + + return R.Add(info.Offset); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs.meta new file mode 100644 index 00000000..2e115176 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eda4bde80961d4c48b13132930eafde5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointCombMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs new file mode 100644 index 00000000..358aa98d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Class holding precomputation data for fixed-point multiplications. + */ + public class FixedPointPreCompInfo + : PreCompInfo + { + protected ECPoint m_offset = null; + + /** + * Lookup table for the precomputed ECPoints used for a fixed point multiplication. + */ + protected ECLookupTable m_lookupTable = null; + + /** + * The width used for the precomputation. If a larger width precomputation + * is already available this may be larger than was requested, so calling + * code should refer to the actual width. + */ + protected int m_width = -1; + + public virtual ECLookupTable LookupTable + { + get { return m_lookupTable; } + set { this.m_lookupTable = value; } + } + + public virtual ECPoint Offset + { + get { return m_offset; } + set { this.m_offset = value; } + } + + public virtual int Width + { + get { return m_width; } + set { this.m_width = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs.meta new file mode 100644 index 00000000..b6d6b5c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e78d035a66c7a454b99842dc4f0d6e6b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointPreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs new file mode 100644 index 00000000..d2aff428 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public class FixedPointUtilities + { + public static readonly string PRECOMP_NAME = "bc_fixed_point"; + + public static int GetCombSize(ECCurve c) + { + BigInteger order = c.Order; + return order == null ? c.FieldSize + 1 : order.BitLength; + } + + public static FixedPointPreCompInfo GetFixedPointPreCompInfo(PreCompInfo preCompInfo) + { + return preCompInfo as FixedPointPreCompInfo; + } + + public static FixedPointPreCompInfo Precompute(ECPoint p) + { + return (FixedPointPreCompInfo)p.Curve.Precompute(p, PRECOMP_NAME, new FixedPointCallback(p)); + } + + private class FixedPointCallback + : IPreCompCallback + { + private readonly ECPoint m_p; + + internal FixedPointCallback(ECPoint p) + { + this.m_p = p; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + FixedPointPreCompInfo existingFP = existing as FixedPointPreCompInfo; + + ECCurve c = m_p.Curve; + int bits = FixedPointUtilities.GetCombSize(c); + int minWidth = bits > 250 ? 6 : 5; + int n = 1 << minWidth; + + if (CheckExisting(existingFP, n)) + return existingFP; + + int d = (bits + minWidth - 1) / minWidth; + + ECPoint[] pow2Table = new ECPoint[minWidth + 1]; + pow2Table[0] = m_p; + for (int i = 1; i < minWidth; ++i) + { + pow2Table[i] = pow2Table[i - 1].TimesPow2(d); + } + + // This will be the 'offset' value + pow2Table[minWidth] = pow2Table[0].Subtract(pow2Table[1]); + + c.NormalizeAll(pow2Table); + + ECPoint[] lookupTable = new ECPoint[n]; + lookupTable[0] = pow2Table[0]; + + for (int bit = minWidth - 1; bit >= 0; --bit) + { + ECPoint pow2 = pow2Table[bit]; + + int step = 1 << bit; + for (int i = step; i < n; i += (step << 1)) + { + lookupTable[i] = lookupTable[i - step].Add(pow2); + } + } + + c.NormalizeAll(lookupTable); + + FixedPointPreCompInfo result = new FixedPointPreCompInfo(); + result.LookupTable = c.CreateCacheSafeLookupTable(lookupTable, 0, lookupTable.Length); + result.Offset = pow2Table[minWidth]; + result.Width = minWidth; + return result; + } + + private bool CheckExisting(FixedPointPreCompInfo existingFP, int n) + { + return existingFP != null && CheckTable(existingFP.LookupTable, n); + } + + private bool CheckTable(ECLookupTable table, int n) + { + return table != null && table.Size >= n; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs.meta new file mode 100644 index 00000000..b64b1c16 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f1e170e17e148a4c9464bdb52be01ff +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/FixedPointUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs new file mode 100644 index 00000000..bed418bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Endo; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public class GlvMultiplier + : AbstractECMultiplier + { + protected readonly ECCurve curve; + protected readonly GlvEndomorphism glvEndomorphism; + + public GlvMultiplier(ECCurve curve, GlvEndomorphism glvEndomorphism) + { + if (curve == null || curve.Order == null) + throw new ArgumentException("Need curve with known group order", "curve"); + + this.curve = curve; + this.glvEndomorphism = glvEndomorphism; + } + + protected override ECPoint MultiplyPositive(ECPoint p, BigInteger k) + { + if (!curve.Equals(p.Curve)) + throw new InvalidOperationException(); + + BigInteger n = p.Curve.Order; + BigInteger[] ab = glvEndomorphism.DecomposeScalar(k.Mod(n)); + BigInteger a = ab[0], b = ab[1]; + + if (glvEndomorphism.HasEfficientPointMap) + { + return ECAlgorithms.ImplShamirsTrickWNaf(glvEndomorphism, p, a, b); + } + + ECPoint q = EndoUtilities.MapPoint(glvEndomorphism, p); + + return ECAlgorithms.ImplShamirsTrickWNaf(p, a, q, b); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs.meta new file mode 100644 index 00000000..9b3974fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c4c7314cd6d2f06418c78274c5ef2e62 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/GlvMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs new file mode 100644 index 00000000..49239349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public interface IPreCompCallback + { + PreCompInfo Precompute(PreCompInfo existing); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs.meta new file mode 100644 index 00000000..7241c9ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d91b3dbf45e2b54783119024704938b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/IPreCompCallback.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs new file mode 100644 index 00000000..889ae401 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Interface for classes storing precomputation data for multiplication + * algorithms. Used as a Memento (see GOF patterns) for + * WNafMultiplier. + */ + public interface PreCompInfo + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs.meta new file mode 100644 index 00000000..26869375 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d8ee340411030e48bd15afc18fb58f5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/PreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs new file mode 100644 index 00000000..ab6b9079 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + internal class ValidityPreCompInfo + : PreCompInfo + { + internal static readonly string PRECOMP_NAME = "bc_validity"; + + private bool failed = false; + private bool curveEquationPassed = false; + private bool orderPassed = false; + + internal bool HasFailed() + { + return failed; + } + + internal void ReportFailed() + { + failed = true; + } + + internal bool HasCurveEquationPassed() + { + return curveEquationPassed; + } + + internal void ReportCurveEquationPassed() + { + curveEquationPassed = true; + } + + internal bool HasOrderPassed() + { + return orderPassed; + } + + internal void ReportOrderPassed() + { + orderPassed = true; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs.meta new file mode 100644 index 00000000..88a5f83b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d3df916ac2529814bb129cca39b3243c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/ValidityPreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs new file mode 100644 index 00000000..c0b1c6cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Class implementing the WNAF (Window Non-Adjacent Form) multiplication + * algorithm. + */ + public class WNafL2RMultiplier + : AbstractECMultiplier + { + /** + * Multiplies this by an integer k using the + * Window NAF method. + * @param k The integer by which this is multiplied. + * @return A new ECPoint which equals this + * multiplied by k. + */ + protected override ECPoint MultiplyPositive(ECPoint p, BigInteger k) + { + int minWidth = WNafUtilities.GetWindowSize(k.BitLength); + + WNafPreCompInfo info = WNafUtilities.Precompute(p, minWidth, true); + ECPoint[] preComp = info.PreComp; + ECPoint[] preCompNeg = info.PreCompNeg; + int width = info.Width; + + int[] wnaf = WNafUtilities.GenerateCompactWindowNaf(width, k); + + ECPoint R = p.Curve.Infinity; + + int i = wnaf.Length; + + /* + * NOTE: We try to optimize the first window using the precomputed points to substitute an + * addition for 2 or more doublings. + */ + if (i > 1) + { + int wi = wnaf[--i]; + int digit = wi >> 16, zeroes = wi & 0xFFFF; + + int n = System.Math.Abs(digit); + ECPoint[] table = digit < 0 ? preCompNeg : preComp; + + // Optimization can only be used for values in the lower half of the table + if ((n << 2) < (1 << width)) + { + int highest = 32 - Integers.NumberOfLeadingZeros(n); + + // TODO Get addition/doubling cost ratio from curve and compare to 'scale' to see if worth substituting? + int scale = width - highest; + int lowBits = n ^ (1 << (highest - 1)); + + int i1 = ((1 << (width - 1)) - 1); + int i2 = (lowBits << scale) + 1; + R = table[i1 >> 1].Add(table[i2 >> 1]); + + zeroes -= scale; + + //Console.WriteLine("Optimized: 2^" + scale + " * " + n + " = " + i1 + " + " + i2); + } + else + { + R = table[n >> 1]; + } + + R = R.TimesPow2(zeroes); + } + + while (i > 0) + { + int wi = wnaf[--i]; + int digit = wi >> 16, zeroes = wi & 0xFFFF; + + int n = System.Math.Abs(digit); + ECPoint[] table = digit < 0 ? preCompNeg : preComp; + ECPoint r = table[n >> 1]; + + R = R.TwicePlus(r); + R = R.TimesPow2(zeroes); + } + + return R; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs.meta new file mode 100644 index 00000000..8b89bd21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3107b79ddf993944ca337671fb2ac54d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafL2RMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs new file mode 100644 index 00000000..21107c4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Class holding precomputation data for the WNAF (Window Non-Adjacent Form) + * algorithm. + */ + public class WNafPreCompInfo + : PreCompInfo + { + internal volatile int m_promotionCountdown = 4; + + protected int m_confWidth = -1; + + /** + * Array holding the precomputed ECPoints used for a Window + * NAF multiplication. + */ + protected ECPoint[] m_preComp = null; + + /** + * Array holding the negations of the precomputed ECPoints used + * for a Window NAF multiplication. + */ + protected ECPoint[] m_preCompNeg = null; + + /** + * Holds an ECPoint representing Twice(this). Used for the + * Window NAF multiplication to create or extend the precomputed values. + */ + protected ECPoint m_twice = null; + + protected int m_width = -1; + + internal int DecrementPromotionCountdown() + { + int t = m_promotionCountdown; + if (t > 0) + { + m_promotionCountdown = --t; + } + return t; + } + + internal int PromotionCountdown + { + get { return m_promotionCountdown; } + set { this.m_promotionCountdown = value; } + } + + public virtual bool IsPromoted + { + get { return m_promotionCountdown <= 0; } + } + + public virtual int ConfWidth + { + get { return m_confWidth; } + set { this.m_confWidth = value; } + } + + public virtual ECPoint[] PreComp + { + get { return m_preComp; } + set { this.m_preComp = value; } + } + + public virtual ECPoint[] PreCompNeg + { + get { return m_preCompNeg; } + set { this.m_preCompNeg = value; } + } + + public virtual ECPoint Twice + { + get { return m_twice; } + set { this.m_twice = value; } + } + + public virtual int Width + { + get { return m_width; } + set { this.m_width = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs.meta new file mode 100644 index 00000000..11544ec7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7672118dc77b50543998724995fa50b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafPreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs new file mode 100644 index 00000000..c9361054 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs @@ -0,0 +1,759 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + public abstract class WNafUtilities + { + public static readonly string PRECOMP_NAME = "bc_wnaf"; + + private static readonly int[] DEFAULT_WINDOW_SIZE_CUTOFFS = new int[]{ 13, 41, 121, 337, 897, 2305 }; + private static readonly int MAX_WIDTH = 16; + + private static readonly ECPoint[] EMPTY_POINTS = new ECPoint[0]; + + public static void ConfigureBasepoint(ECPoint p) + { + ECCurve c = p.Curve; + if (null == c) + return; + + BigInteger n = c.Order; + int bits = (null == n) ? c.FieldSize + 1 : n.BitLength; + int confWidth = System.Math.Min(MAX_WIDTH, GetWindowSize(bits) + 3); + + c.Precompute(p, PRECOMP_NAME, new ConfigureBasepointCallback(c, confWidth)); + } + + public static int[] GenerateCompactNaf(BigInteger k) + { + if ((k.BitLength >> 16) != 0) + throw new ArgumentException("must have bitlength < 2^16", "k"); + if (k.SignValue == 0) + return Arrays.EmptyInts; + + BigInteger _3k = k.ShiftLeft(1).Add(k); + + int bits = _3k.BitLength; + int[] naf = new int[bits >> 1]; + + BigInteger diff = _3k.Xor(k); + + int highBit = bits - 1, length = 0, zeroes = 0; + for (int i = 1; i < highBit; ++i) + { + if (!diff.TestBit(i)) + { + ++zeroes; + continue; + } + + int digit = k.TestBit(i) ? -1 : 1; + naf[length++] = (digit << 16) | zeroes; + zeroes = 1; + ++i; + } + + naf[length++] = (1 << 16) | zeroes; + + if (naf.Length > length) + { + naf = Trim(naf, length); + } + + return naf; + } + + public static int[] GenerateCompactWindowNaf(int width, BigInteger k) + { + if (width == 2) + { + return GenerateCompactNaf(k); + } + + if (width < 2 || width > 16) + throw new ArgumentException("must be in the range [2, 16]", "width"); + if ((k.BitLength >> 16) != 0) + throw new ArgumentException("must have bitlength < 2^16", "k"); + if (k.SignValue == 0) + return Arrays.EmptyInts; + + int[] wnaf = new int[k.BitLength / width + 1]; + + // 2^width and a mask and sign bit set accordingly + int pow2 = 1 << width; + int mask = pow2 - 1; + int sign = pow2 >> 1; + + bool carry = false; + int length = 0, pos = 0; + + while (pos <= k.BitLength) + { + if (k.TestBit(pos) == carry) + { + ++pos; + continue; + } + + k = k.ShiftRight(pos); + + int digit = k.IntValue & mask; + if (carry) + { + ++digit; + } + + carry = (digit & sign) != 0; + if (carry) + { + digit -= pow2; + } + + int zeroes = length > 0 ? pos - 1 : pos; + wnaf[length++] = (digit << 16) | zeroes; + pos = width; + } + + // Reduce the WNAF array to its actual length + if (wnaf.Length > length) + { + wnaf = Trim(wnaf, length); + } + + return wnaf; + } + + public static byte[] GenerateJsf(BigInteger g, BigInteger h) + { + int digits = System.Math.Max(g.BitLength, h.BitLength) + 1; + byte[] jsf = new byte[digits]; + + BigInteger k0 = g, k1 = h; + int j = 0, d0 = 0, d1 = 0; + + int offset = 0; + while ((d0 | d1) != 0 || k0.BitLength > offset || k1.BitLength > offset) + { + int n0 = ((int)((uint)k0.IntValue >> offset) + d0) & 7; + int n1 = ((int)((uint)k1.IntValue >> offset) + d1) & 7; + + int u0 = n0 & 1; + if (u0 != 0) + { + u0 -= (n0 & 2); + if ((n0 + u0) == 4 && (n1 & 3) == 2) + { + u0 = -u0; + } + } + + int u1 = n1 & 1; + if (u1 != 0) + { + u1 -= (n1 & 2); + if ((n1 + u1) == 4 && (n0 & 3) == 2) + { + u1 = -u1; + } + } + + if ((d0 << 1) == 1 + u0) + { + d0 ^= 1; + } + if ((d1 << 1) == 1 + u1) + { + d1 ^= 1; + } + + if (++offset == 30) + { + offset = 0; + k0 = k0.ShiftRight(30); + k1 = k1.ShiftRight(30); + } + + jsf[j++] = (byte)((u0 << 4) | (u1 & 0xF)); + } + + // Reduce the JSF array to its actual length + if (jsf.Length > j) + { + jsf = Trim(jsf, j); + } + + return jsf; + } + + public static byte[] GenerateNaf(BigInteger k) + { + if (k.SignValue == 0) + return Arrays.EmptyBytes; + + BigInteger _3k = k.ShiftLeft(1).Add(k); + + int digits = _3k.BitLength - 1; + byte[] naf = new byte[digits]; + + BigInteger diff = _3k.Xor(k); + + for (int i = 1; i < digits; ++i) + { + if (diff.TestBit(i)) + { + naf[i - 1] = (byte)(k.TestBit(i) ? -1 : 1); + ++i; + } + } + + naf[digits - 1] = 1; + + return naf; + } + + /** + * Computes the Window NAF (non-adjacent Form) of an integer. + * @param width The width w of the Window NAF. The width is + * defined as the minimal number w, such that for any + * w consecutive digits in the resulting representation, at + * most one is non-zero. + * @param k The integer of which the Window NAF is computed. + * @return The Window NAF of the given width, such that the following holds: + * k = &sum;i=0l-1 ki2i + * , where the ki denote the elements of the + * returned byte[]. + */ + public static byte[] GenerateWindowNaf(int width, BigInteger k) + { + if (width == 2) + { + return GenerateNaf(k); + } + + if (width < 2 || width > 8) + throw new ArgumentException("must be in the range [2, 8]", "width"); + if (k.SignValue == 0) + return Arrays.EmptyBytes; + + byte[] wnaf = new byte[k.BitLength + 1]; + + // 2^width and a mask and sign bit set accordingly + int pow2 = 1 << width; + int mask = pow2 - 1; + int sign = pow2 >> 1; + + bool carry = false; + int length = 0, pos = 0; + + while (pos <= k.BitLength) + { + if (k.TestBit(pos) == carry) + { + ++pos; + continue; + } + + k = k.ShiftRight(pos); + + int digit = k.IntValue & mask; + if (carry) + { + ++digit; + } + + carry = (digit & sign) != 0; + if (carry) + { + digit -= pow2; + } + + length += (length > 0) ? pos - 1 : pos; + wnaf[length++] = (byte)digit; + pos = width; + } + + // Reduce the WNAF array to its actual length + if (wnaf.Length > length) + { + wnaf = Trim(wnaf, length); + } + + return wnaf; + } + + public static int GetNafWeight(BigInteger k) + { + if (k.SignValue == 0) + return 0; + + BigInteger _3k = k.ShiftLeft(1).Add(k); + BigInteger diff = _3k.Xor(k); + + return diff.BitCount; + } + + public static WNafPreCompInfo GetWNafPreCompInfo(ECPoint p) + { + return GetWNafPreCompInfo(p.Curve.GetPreCompInfo(p, PRECOMP_NAME)); + } + + public static WNafPreCompInfo GetWNafPreCompInfo(PreCompInfo preCompInfo) + { + return preCompInfo as WNafPreCompInfo; + } + + /** + * Determine window width to use for a scalar multiplication of the given size. + * + * @param bits the bit-length of the scalar to multiply by + * @return the window size to use + */ + public static int GetWindowSize(int bits) + { + return GetWindowSize(bits, DEFAULT_WINDOW_SIZE_CUTOFFS, MAX_WIDTH); + } + + /** + * Determine window width to use for a scalar multiplication of the given size. + * + * @param bits the bit-length of the scalar to multiply by + * @param maxWidth the maximum window width to return + * @return the window size to use + */ + public static int GetWindowSize(int bits, int maxWidth) + { + return GetWindowSize(bits, DEFAULT_WINDOW_SIZE_CUTOFFS, maxWidth); + } + + /** + * Determine window width to use for a scalar multiplication of the given size. + * + * @param bits the bit-length of the scalar to multiply by + * @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width + * @return the window size to use + */ + public static int GetWindowSize(int bits, int[] windowSizeCutoffs) + { + return GetWindowSize(bits, windowSizeCutoffs, MAX_WIDTH); + } + + /** + * Determine window width to use for a scalar multiplication of the given size. + * + * @param bits the bit-length of the scalar to multiply by + * @param windowSizeCutoffs a monotonically increasing list of bit sizes at which to increment the window width + * @param maxWidth the maximum window width to return + * @return the window size to use + */ + public static int GetWindowSize(int bits, int[] windowSizeCutoffs, int maxWidth) + { + int w = 0; + for (; w < windowSizeCutoffs.Length; ++w) + { + if (bits < windowSizeCutoffs[w]) + { + break; + } + } + + return System.Math.Max(2, System.Math.Min(maxWidth, w + 2)); + } + + public static WNafPreCompInfo Precompute(ECPoint p, int minWidth, bool includeNegated) + { + return (WNafPreCompInfo)p.Curve.Precompute(p, PRECOMP_NAME, + new PrecomputeCallback(p, minWidth, includeNegated)); + } + + public static WNafPreCompInfo PrecomputeWithPointMap(ECPoint p, ECPointMap pointMap, WNafPreCompInfo fromWNaf, + bool includeNegated) + { + return (WNafPreCompInfo)p.Curve.Precompute(p, PRECOMP_NAME, + new PrecomputeWithPointMapCallback(p, pointMap, fromWNaf, includeNegated)); + } + + private static byte[] Trim(byte[] a, int length) + { + byte[] result = new byte[length]; + Array.Copy(a, 0, result, 0, result.Length); + return result; + } + + private static int[] Trim(int[] a, int length) + { + int[] result = new int[length]; + Array.Copy(a, 0, result, 0, result.Length); + return result; + } + + private static ECPoint[] ResizeTable(ECPoint[] a, int length) + { + ECPoint[] result = new ECPoint[length]; + Array.Copy(a, 0, result, 0, a.Length); + return result; + } + + private class ConfigureBasepointCallback + : IPreCompCallback + { + private readonly ECCurve m_curve; + private readonly int m_confWidth; + + internal ConfigureBasepointCallback(ECCurve curve, int confWidth) + { + this.m_curve = curve; + this.m_confWidth = confWidth; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + WNafPreCompInfo existingWNaf = existing as WNafPreCompInfo; + + if (null != existingWNaf && existingWNaf.ConfWidth == m_confWidth) + { + existingWNaf.PromotionCountdown = 0; + return existingWNaf; + } + + WNafPreCompInfo result = new WNafPreCompInfo(); + + result.PromotionCountdown = 0; + result.ConfWidth = m_confWidth; + + if (null != existingWNaf) + { + result.PreComp = existingWNaf.PreComp; + result.PreCompNeg = existingWNaf.PreCompNeg; + result.Twice = existingWNaf.Twice; + result.Width = existingWNaf.Width; + } + + return result; + } + } + + private class MapPointCallback + : IPreCompCallback + { + private readonly WNafPreCompInfo m_infoP; + private readonly bool m_includeNegated; + private readonly ECPointMap m_pointMap; + + internal MapPointCallback(WNafPreCompInfo infoP, bool includeNegated, ECPointMap pointMap) + { + this.m_infoP = infoP; + this.m_includeNegated = includeNegated; + this.m_pointMap = pointMap; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + WNafPreCompInfo result = new WNafPreCompInfo(); + + result.ConfWidth = m_infoP.ConfWidth; + + ECPoint twiceP = m_infoP.Twice; + if (null != twiceP) + { + ECPoint twiceQ = m_pointMap.Map(twiceP); + result.Twice = twiceQ; + } + + ECPoint[] preCompP = m_infoP.PreComp; + ECPoint[] preCompQ = new ECPoint[preCompP.Length]; + for (int i = 0; i < preCompP.Length; ++i) + { + preCompQ[i] = m_pointMap.Map(preCompP[i]); + } + result.PreComp = preCompQ; + result.Width = m_infoP.Width; + + if (m_includeNegated) + { + ECPoint[] preCompNegQ = new ECPoint[preCompQ.Length]; + for (int i = 0; i < preCompNegQ.Length; ++i) + { + preCompNegQ[i] = preCompQ[i].Negate(); + } + result.PreCompNeg = preCompNegQ; + } + + return result; + } + } + + private class PrecomputeCallback + : IPreCompCallback + { + private readonly ECPoint m_p; + private readonly int m_minWidth; + private readonly bool m_includeNegated; + + internal PrecomputeCallback(ECPoint p, int minWidth, bool includeNegated) + { + this.m_p = p; + this.m_minWidth = minWidth; + this.m_includeNegated = includeNegated; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + WNafPreCompInfo existingWNaf = existing as WNafPreCompInfo; + + int width = System.Math.Max(2, System.Math.Min(MAX_WIDTH, m_minWidth)); + int reqPreCompLen = 1 << (width - 2); + + if (CheckExisting(existingWNaf, width, reqPreCompLen, m_includeNegated)) + { + existingWNaf.DecrementPromotionCountdown(); + return existingWNaf; + } + + WNafPreCompInfo result = new WNafPreCompInfo(); + + ECCurve c = m_p.Curve; + ECPoint[] preComp = null, preCompNeg = null; + ECPoint twiceP = null; + + if (null != existingWNaf) + { + int promotionCountdown = existingWNaf.DecrementPromotionCountdown(); + result.PromotionCountdown = promotionCountdown; + + int confWidth = existingWNaf.ConfWidth; + result.ConfWidth = confWidth; + + preComp = existingWNaf.PreComp; + preCompNeg = existingWNaf.PreCompNeg; + twiceP = existingWNaf.Twice; + } + + width = System.Math.Min(MAX_WIDTH, System.Math.Max(result.ConfWidth, width)); + reqPreCompLen = 1 << (width - 2); + + int iniPreCompLen = 0; + if (null == preComp) + { + preComp = EMPTY_POINTS; + } + else + { + iniPreCompLen = preComp.Length; + } + + if (iniPreCompLen < reqPreCompLen) + { + preComp = WNafUtilities.ResizeTable(preComp, reqPreCompLen); + + if (reqPreCompLen == 1) + { + preComp[0] = m_p.Normalize(); + } + else + { + int curPreCompLen = iniPreCompLen; + if (curPreCompLen == 0) + { + preComp[0] = m_p; + curPreCompLen = 1; + } + + ECFieldElement iso = null; + + if (reqPreCompLen == 2) + { + preComp[1] = m_p.ThreeTimes(); + } + else + { + ECPoint isoTwiceP = twiceP, last = preComp[curPreCompLen - 1]; + if (null == isoTwiceP) + { + isoTwiceP = preComp[0].Twice(); + twiceP = isoTwiceP; + + /* + * For Fp curves with Jacobian projective coordinates, use a (quasi-)isomorphism + * where 'twiceP' is "affine", so that the subsequent additions are cheaper. This + * also requires scaling the initial point's X, Y coordinates, and reversing the + * isomorphism as part of the subsequent normalization. + * + * NOTE: The correctness of this optimization depends on: + * 1) additions do not use the curve's A, B coefficients. + * 2) no special cases (i.e. Q +/- Q) when calculating 1P, 3P, 5P, ... + */ + if (!twiceP.IsInfinity && ECAlgorithms.IsFpCurve(c) && c.FieldSize >= 64) + { + switch (c.CoordinateSystem) + { + case ECCurve.COORD_JACOBIAN: + case ECCurve.COORD_JACOBIAN_CHUDNOVSKY: + case ECCurve.COORD_JACOBIAN_MODIFIED: + { + iso = twiceP.GetZCoord(0); + isoTwiceP = c.CreatePoint(twiceP.XCoord.ToBigInteger(), + twiceP.YCoord.ToBigInteger()); + + ECFieldElement iso2 = iso.Square(), iso3 = iso2.Multiply(iso); + last = last.ScaleX(iso2).ScaleY(iso3); + + if (iniPreCompLen == 0) + { + preComp[0] = last; + } + break; + } + } + } + } + + while (curPreCompLen < reqPreCompLen) + { + /* + * Compute the new ECPoints for the precomputation array. The values 1, 3, + * 5, ..., 2^(width-1)-1 times p are computed + */ + preComp[curPreCompLen++] = last = last.Add(isoTwiceP); + } + } + + /* + * Having oft-used operands in affine form makes operations faster. + */ + c.NormalizeAll(preComp, iniPreCompLen, reqPreCompLen - iniPreCompLen, iso); + } + } + + if (m_includeNegated) + { + int pos; + if (null == preCompNeg) + { + pos = 0; + preCompNeg = new ECPoint[reqPreCompLen]; + } + else + { + pos = preCompNeg.Length; + if (pos < reqPreCompLen) + { + preCompNeg = WNafUtilities.ResizeTable(preCompNeg, reqPreCompLen); + } + } + + while (pos < reqPreCompLen) + { + preCompNeg[pos] = preComp[pos].Negate(); + ++pos; + } + } + + result.PreComp = preComp; + result.PreCompNeg = preCompNeg; + result.Twice = twiceP; + result.Width = width; + return result; + } + + private bool CheckExisting(WNafPreCompInfo existingWNaf, int width, int reqPreCompLen, bool includeNegated) + { + return null != existingWNaf + && existingWNaf.Width >= System.Math.Max(existingWNaf.ConfWidth, width) + && CheckTable(existingWNaf.PreComp, reqPreCompLen) + && (!includeNegated || CheckTable(existingWNaf.PreCompNeg, reqPreCompLen)); + } + + private bool CheckTable(ECPoint[] table, int reqLen) + { + return null != table && table.Length >= reqLen; + } + } + + private class PrecomputeWithPointMapCallback + : IPreCompCallback + { + private readonly ECPoint m_point; + private readonly ECPointMap m_pointMap; + private readonly WNafPreCompInfo m_fromWNaf; + private readonly bool m_includeNegated; + + internal PrecomputeWithPointMapCallback(ECPoint point, ECPointMap pointMap, WNafPreCompInfo fromWNaf, + bool includeNegated) + { + this.m_point = point; + this.m_pointMap = pointMap; + this.m_fromWNaf = fromWNaf; + this.m_includeNegated = includeNegated; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + WNafPreCompInfo existingWNaf = existing as WNafPreCompInfo; + + int width = m_fromWNaf.Width; + int reqPreCompLen = m_fromWNaf.PreComp.Length; + + if (CheckExisting(existingWNaf, width, reqPreCompLen, m_includeNegated)) + { + existingWNaf.DecrementPromotionCountdown(); + return existingWNaf; + } + + /* + * TODO Ideally this method would support incremental calculation, but given the + * existing use-cases it would be of little-to-no benefit. + */ + WNafPreCompInfo result = new WNafPreCompInfo(); + + result.PromotionCountdown = m_fromWNaf.PromotionCountdown; + + ECPoint twiceFrom = m_fromWNaf.Twice; + if (null != twiceFrom) + { + ECPoint twice = m_pointMap.Map(twiceFrom); + result.Twice = twice; + } + + ECPoint[] preCompFrom = m_fromWNaf.PreComp; + ECPoint[] preComp = new ECPoint[preCompFrom.Length]; + for (int i = 0; i < preCompFrom.Length; ++i) + { + preComp[i] = m_pointMap.Map(preCompFrom[i]); + } + result.PreComp = preComp; + result.Width = width; + + if (m_includeNegated) + { + ECPoint[] preCompNeg = new ECPoint[preComp.Length]; + for (int i = 0; i < preCompNeg.Length; ++i) + { + preCompNeg[i] = preComp[i].Negate(); + } + result.PreCompNeg = preCompNeg; + } + + return result; + } + + private bool CheckExisting(WNafPreCompInfo existingWNaf, int width, int reqPreCompLen, bool includeNegated) + { + return null != existingWNaf + && existingWNaf.Width >= width + && CheckTable(existingWNaf.PreComp, reqPreCompLen) + && (!includeNegated || CheckTable(existingWNaf.PreCompNeg, reqPreCompLen)); + } + + private bool CheckTable(ECPoint[] table, int reqLen) + { + return null != table && table.Length >= reqLen; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs.meta new file mode 100644 index 00000000..28c934d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 176b8fc813ad1a542bb4cfe1d0afd8ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WNafUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs new file mode 100644 index 00000000..dce583e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs @@ -0,0 +1,142 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Abc; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Class implementing the WTNAF (Window + * τ-adic Non-Adjacent Form) algorithm. + */ + public class WTauNafMultiplier + : AbstractECMultiplier + { + // TODO Create WTauNafUtilities class and move various functionality into it + internal static readonly string PRECOMP_NAME = "bc_wtnaf"; + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by k using the reduced τ-adic NAF (RTNAF) + * method. + * @param p The AbstractF2mPoint to multiply. + * @param k The integer by which to multiply k. + * @return p multiplied by k. + */ + protected override ECPoint MultiplyPositive(ECPoint point, BigInteger k) + { + AbstractF2mPoint p = point as AbstractF2mPoint; + if (p == null) + throw new ArgumentException("Only AbstractF2mPoint can be used in WTauNafMultiplier"); + + AbstractF2mCurve curve = (AbstractF2mCurve)p.Curve; + int m = curve.FieldSize; + sbyte a = (sbyte)curve.A.ToBigInteger().IntValue; + sbyte mu = Tnaf.GetMu(a); + BigInteger[] s = curve.GetSi(); + + ZTauElement rho = Tnaf.PartModReduction(k, m, a, s, mu, (sbyte)10); + + return MultiplyWTnaf(p, rho, a, mu); + } + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by an element λ of Z[τ] using + * the τ-adic NAF (TNAF) method. + * @param p The AbstractF2mPoint to multiply. + * @param lambda The element λ of + * Z[τ] of which to compute the + * [τ]-adic NAF. + * @return p multiplied by λ. + */ + private AbstractF2mPoint MultiplyWTnaf(AbstractF2mPoint p, ZTauElement lambda, + sbyte a, sbyte mu) + { + ZTauElement[] alpha = (a == 0) ? Tnaf.Alpha0 : Tnaf.Alpha1; + + BigInteger tw = Tnaf.GetTw(mu, Tnaf.Width); + + sbyte[]u = Tnaf.TauAdicWNaf(mu, lambda, Tnaf.Width, + BigInteger.ValueOf(Tnaf.Pow2Width), tw, alpha); + + return MultiplyFromWTnaf(p, u); + } + + /** + * Multiplies a {@link org.bouncycastle.math.ec.AbstractF2mPoint AbstractF2mPoint} + * by an element λ of Z[τ] + * using the window τ-adic NAF (TNAF) method, given the + * WTNAF of λ. + * @param p The AbstractF2mPoint to multiply. + * @param u The the WTNAF of λ.. + * @return λ * p + */ + private static AbstractF2mPoint MultiplyFromWTnaf(AbstractF2mPoint p, sbyte[] u) + { + AbstractF2mCurve curve = (AbstractF2mCurve)p.Curve; + sbyte a = (sbyte)curve.A.ToBigInteger().IntValue; + + WTauNafCallback callback = new WTauNafCallback(p, a); + WTauNafPreCompInfo preCompInfo = (WTauNafPreCompInfo)curve.Precompute(p, PRECOMP_NAME, callback); + AbstractF2mPoint[] pu = preCompInfo.PreComp; + + // TODO Include negations in precomp (optionally) and use from here + AbstractF2mPoint[] puNeg = new AbstractF2mPoint[pu.Length]; + for (int i = 0; i < pu.Length; ++i) + { + puNeg[i] = (AbstractF2mPoint)pu[i].Negate(); + } + + + // q = infinity + AbstractF2mPoint q = (AbstractF2mPoint) p.Curve.Infinity; + + int tauCount = 0; + for (int i = u.Length - 1; i >= 0; i--) + { + ++tauCount; + int ui = u[i]; + if (ui != 0) + { + q = q.TauPow(tauCount); + tauCount = 0; + + ECPoint x = ui > 0 ? pu[ui >> 1] : puNeg[(-ui) >> 1]; + q = (AbstractF2mPoint)q.Add(x); + } + } + if (tauCount > 0) + { + q = q.TauPow(tauCount); + } + return q; + } + + private class WTauNafCallback + : IPreCompCallback + { + private readonly AbstractF2mPoint m_p; + private readonly sbyte m_a; + + internal WTauNafCallback(AbstractF2mPoint p, sbyte a) + { + this.m_p = p; + this.m_a = a; + } + + public PreCompInfo Precompute(PreCompInfo existing) + { + if (existing is WTauNafPreCompInfo) + return existing; + + WTauNafPreCompInfo result = new WTauNafPreCompInfo(); + result.PreComp = Tnaf.GetPreComp(m_p, m_a); + return result; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs.meta new file mode 100644 index 00000000..de8f4ee3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5facf8f0e9c80c94c806d2befb73db5f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs new file mode 100644 index 00000000..ae285db8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier +{ + /** + * Class holding precomputation data for the WTNAF (Window + * τ-adic Non-Adjacent Form) algorithm. + */ + public class WTauNafPreCompInfo + : PreCompInfo + { + /** + * Array holding the precomputed AbstractF2mPoints used for the + * WTNAF multiplication in + * {@link org.bouncycastle.math.ec.multiplier.WTauNafMultiplier.multiply() + * WTauNafMultiplier.multiply()}. + */ + protected AbstractF2mPoint[] m_preComp; + + public virtual AbstractF2mPoint[] PreComp + { + get { return m_preComp; } + set { this.m_preComp = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs.meta new file mode 100644 index 00000000..7c0d1d43 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f14b38c7241eb4a4193c1afa7bb942f9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/multiplier/WTauNafPreCompInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748.meta new file mode 100644 index 00000000..a55a0a54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b8b62a76d6e577b41a22040f3336e373 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs new file mode 100644 index 00000000..babaca8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs @@ -0,0 +1,309 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748 +{ + using F = X25519Field; + + public static class X25519 + { + public const int PointSize = 32; + public const int ScalarSize = 32; + + private const int C_A = 486662; + private const int C_A24 = (C_A + 2)/4; + + //private static readonly int[] SqrtNeg486664 = { 0x03457E06, 0x03812ABF, 0x01A82CC6, 0x028A5BE8, 0x018B43A7, + // 0x03FC4F7E, 0x02C23700, 0x006BBD27, 0x03A30500, 0x001E4DDB }; + + public static bool CalculateAgreement(byte[] k, int kOff, byte[] u, int uOff, byte[] r, int rOff) + { + ScalarMult(k, kOff, u, uOff, r, rOff); + return !Arrays.AreAllZeroes(r, rOff, PointSize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool CalculateAgreement(ReadOnlySpan k, ReadOnlySpan u, Span r) + { + ScalarMult(k, u, r); + return !Arrays.AreAllZeroes(r[..PointSize]); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } + + private static void DecodeScalar(ReadOnlySpan k, Span n) + { + for (int i = 0; i < 8; ++i) + { + n[i] = Decode32(k[(i * 4)..]); + } + + n[0] &= 0xFFFFFFF8U; + n[7] &= 0x7FFFFFFFU; + n[7] |= 0x40000000U; + } +#else + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + + private static void DecodeScalar(byte[] k, int kOff, uint[] n) + { + for (int i = 0; i < 8; ++i) + { + n[i] = Decode32(k, kOff + i * 4); + } + + n[0] &= 0xFFFFFFF8U; + n[7] &= 0x7FFFFFFFU; + n[7] |= 0x40000000U; + } +#endif + + public static void GeneratePrivateKey(SecureRandom random, byte[] k) + { + if (k.Length != ScalarSize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + + k[0] &= 0xF8; + k[ScalarSize - 1] &= 0x7F; + k[ScalarSize - 1] |= 0x40; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePrivateKey(SecureRandom random, Span k) + { + if (k.Length != ScalarSize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + + k[0] &= 0xF8; + k[ScalarSize - 1] &= 0x7F; + k[ScalarSize - 1] |= 0x40; + } +#endif + + public static void GeneratePublicKey(byte[] k, int kOff, byte[] r, int rOff) + { + ScalarMultBase(k, kOff, r, rOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePublicKey(ReadOnlySpan k, Span r) + { + ScalarMultBase(k, r); + } +#endif + + private static void PointDouble(int[] x, int[] z) + { + int[] a = F.Create(); + int[] b = F.Create(); + + F.Apm(x, z, a, b); + F.Sqr(a, a); + F.Sqr(b, b); + F.Mul(a, b, x); + F.Sub(a, b, a); + F.Mul(a, C_A24, z); + F.Add(z, b, z); + F.Mul(z, a, z); + } + + public static void Precompute() + { + Ed25519.Precompute(); + } + + public static void ScalarMult(byte[] k, int kOff, byte[] u, int uOff, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMult(k.AsSpan(kOff), u.AsSpan(uOff), r.AsSpan(rOff)); +#else + uint[] n = new uint[8]; DecodeScalar(k, kOff, n); + + int[] x1 = F.Create(); F.Decode(u, uOff, x1); + int[] x2 = F.Create(); F.Copy(x1, 0, x2, 0); + int[] z2 = F.Create(); z2[0] = 1; + int[] x3 = F.Create(); x3[0] = 1; + int[] z3 = F.Create(); + + int[] t1 = F.Create(); + int[] t2 = F.Create(); + + Debug.Assert(n[7] >> 30 == 1U); + + int bit = 254, swap = 1; + do + { + F.Apm(x3, z3, t1, x3); + F.Apm(x2, z2, z3, x2); + F.Mul(t1, x2, t1); + F.Mul(x3, z3, x3); + F.Sqr(z3, z3); + F.Sqr(x2, x2); + + F.Sub(z3, x2, t2); + F.Mul(t2, C_A24, z2); + F.Add(z2, x2, z2); + F.Mul(z2, t2, z2); + F.Mul(x2, z3, x2); + + F.Apm(t1, x3, x3, z3); + F.Sqr(x3, x3); + F.Sqr(z3, z3); + F.Mul(z3, x1, z3); + + --bit; + + int word = bit >> 5, shift = bit & 0x1F; + int kt = (int)(n[word] >> shift) & 1; + swap ^= kt; + F.CSwap(swap, x2, x3); + F.CSwap(swap, z2, z3); + swap = kt; + } + while (bit >= 3); + + Debug.Assert(swap == 0); + + for (int i = 0; i < 3; ++i) + { + PointDouble(x2, z2); + } + + F.Inv(z2, z2); + F.Mul(x2, z2, x2); + + F.Normalize(x2); + F.Encode(x2, r, rOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void ScalarMult(ReadOnlySpan k, ReadOnlySpan u, Span r) + { + uint[] n = new uint[8]; DecodeScalar(k, n); + + int[] x1 = F.Create(); F.Decode(u, x1); + int[] x2 = F.Create(); F.Copy(x1, 0, x2, 0); + int[] z2 = F.Create(); z2[0] = 1; + int[] x3 = F.Create(); x3[0] = 1; + int[] z3 = F.Create(); + + int[] t1 = F.Create(); + int[] t2 = F.Create(); + + Debug.Assert(n[7] >> 30 == 1U); + + int bit = 254, swap = 1; + do + { + F.Apm(x3, z3, t1, x3); + F.Apm(x2, z2, z3, x2); + F.Mul(t1, x2, t1); + F.Mul(x3, z3, x3); + F.Sqr(z3, z3); + F.Sqr(x2, x2); + + F.Sub(z3, x2, t2); + F.Mul(t2, C_A24, z2); + F.Add(z2, x2, z2); + F.Mul(z2, t2, z2); + F.Mul(x2, z3, x2); + + F.Apm(t1, x3, x3, z3); + F.Sqr(x3, x3); + F.Sqr(z3, z3); + F.Mul(z3, x1, z3); + + --bit; + + int word = bit >> 5, shift = bit & 0x1F; + int kt = (int)(n[word] >> shift) & 1; + swap ^= kt; + F.CSwap(swap, x2, x3); + F.CSwap(swap, z2, z3); + swap = kt; + } + while (bit >= 3); + + Debug.Assert(swap == 0); + + for (int i = 0; i < 3; ++i) + { + PointDouble(x2, z2); + } + + F.Inv(z2, z2); + F.Mul(x2, z2, x2); + + F.Normalize(x2); + F.Encode(x2, r); + } +#endif + + public static void ScalarMultBase(byte[] k, int kOff, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBase(k.AsSpan(kOff), r.AsSpan(rOff)); +#else + int[] y = F.Create(); + int[] z = F.Create(); + + Ed25519.ScalarMultBaseYZ(k, kOff, y, z); + + F.Apm(z, y, y, z); + + F.Inv(z, z); + F.Mul(y, z, y); + + F.Normalize(y); + F.Encode(y, r, rOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void ScalarMultBase(ReadOnlySpan k, Span r) + { + int[] y = F.Create(); + int[] z = F.Create(); + + Ed25519.ScalarMultBaseYZ(k, y, z); + + F.Apm(z, y, y, z); + + F.Inv(z, z); + F.Mul(y, z, y); + + F.Normalize(y); + F.Encode(y, r); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs.meta new file mode 100644 index 00000000..6130912c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6cbcc6f1d9dfcba4086e19c7b2aa7df0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs new file mode 100644 index 00000000..a7247b3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs @@ -0,0 +1,963 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748 +{ + public static class X25519Field + { + public const int Size = 10; + + private const int M24 = 0x00FFFFFF; + private const int M25 = 0x01FFFFFF; + private const int M26 = 0x03FFFFFF; + + private static readonly uint[] P32 = new uint[]{ 0xFFFFFFEDU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, + 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0x7FFFFFFFU }; + private static readonly int[] RootNegOne = { 0x020EA0B0, 0x0386C9D2, 0x00478C4E, 0x0035697F, 0x005E8630, + 0x01FBD7A7, 0x0340264F, 0x01F0B2B4, 0x00027E0E, 0x00570649 }; + + public static void Add(int[] x, int[] y, int[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = x[i] + y[i]; + } + } + + public static void AddOne(int[] z) + { + z[0] += 1; + } + + public static void AddOne(int[] z, int zOff) + { + z[zOff] += 1; + } + + public static void Apm(int[] x, int[] y, int[] zp, int[] zm) + { + for (int i = 0; i < Size; ++i) + { + int xi = x[i], yi = y[i]; + zp[i] = xi + yi; + zm[i] = xi - yi; + } + } + + public static int AreEqual(int[] x, int[] y) + { + int d = 0; + for (int i = 0; i < Size; ++i) + { + d |= x[i] ^ y[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return (d - 1) >> 31; + } + + public static bool AreEqualVar(int[] x, int[] y) + { + return 0 != AreEqual(x, y); + } + + public static void Carry(int[] z) + { + int z0 = z[0], z1 = z[1], z2 = z[2], z3 = z[3], z4 = z[4]; + int z5 = z[5], z6 = z[6], z7 = z[7], z8 = z[8], z9 = z[9]; + + z2 += (z1 >> 26); z1 &= M26; + z4 += (z3 >> 26); z3 &= M26; + z7 += (z6 >> 26); z6 &= M26; + z9 += (z8 >> 26); z8 &= M26; + + z3 += (z2 >> 25); z2 &= M25; + z5 += (z4 >> 25); z4 &= M25; + z8 += (z7 >> 25); z7 &= M25; + //z0 += (z9 >> 24) * 19; z9 &= M24; + z0 += (z9 >> 25) * 38; z9 &= M25; + + z1 += (z0 >> 26); z0 &= M26; + z6 += (z5 >> 26); z5 &= M26; + + z2 += (z1 >> 26); z1 &= M26; + z4 += (z3 >> 26); z3 &= M26; + z7 += (z6 >> 26); z6 &= M26; + z9 += (z8 >> 26); z8 &= M26; + + z[0] = z0; z[1] = z1; z[2] = z2; z[3] = z3; z[4] = z4; + z[5] = z5; z[6] = z6; z[7] = z7; z[8] = z8; z[9] = z9; + } + + public static void CMov(int cond, int[] x, int xOff, int[] z, int zOff) + { + Debug.Assert(0 == cond || -1 == cond); + + for (int i = 0; i < Size; ++i) + { + int z_i = z[zOff + i], diff = z_i ^ x[xOff + i]; + z_i ^= (diff & cond); + z[zOff + i] = z_i; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CMov(int cond, ReadOnlySpan x, Span z) + { + Debug.Assert(0 == cond || -1 == cond); + + for (int i = 0; i < Size; ++i) + { + int z_i = z[i], diff = z_i ^ x[i]; + z_i ^= (diff & cond); + z[i] = z_i; + } + } +#endif + + public static void CNegate(int negate, int[] z) + { + Debug.Assert(negate >> 1 == 0); + + int mask = 0 - negate; + for (int i = 0; i < Size; ++i) + { + z[i] = (z[i] ^ mask) - mask; + } + } + + public static void Copy(int[] x, int xOff, int[] z, int zOff) + { + for (int i = 0; i < Size; ++i) + { + z[zOff + i] = x[xOff + i]; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Copy(ReadOnlySpan x, Span z) + { + x[..Size].CopyTo(z); + } +#endif + + public static int[] Create() + { + return new int[Size]; + } + + public static int[] CreateTable(int n) + { + return new int[Size * n]; + } + + public static void CSwap(int swap, int[] a, int[] b) + { + Debug.Assert(swap >> 1 == 0); + Debug.Assert(a != b); + + int mask = 0 - swap; + for (int i = 0; i < Size; ++i) + { + int ai = a[i], bi = b[i]; + int dummy = mask & (ai ^ bi); + a[i] = ai ^ dummy; + b[i] = bi ^ dummy; + } + } + + [CLSCompliant(false)] + public static void Decode(uint[] x, int xOff, int[] z) + { + Decode128(x, xOff, z, 0); + Decode128(x, xOff + 4, z, 5); + z[9] &= M24; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [CLSCompliant(false)] + public static void Decode(ReadOnlySpan x, Span z) + { + Decode128(x, z); + Decode128(x[4..], z[5..]); + z[9] &= M24; + } +#endif + + public static void Decode(byte[] x, int xOff, int[] z) + { + Decode128(x, xOff, z, 0); + Decode128(x, xOff + 16, z, 5); + z[9] &= M24; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Decode(ReadOnlySpan x, Span z) + { + Decode128(x, z); + Decode128(x[16..], z[5..]); + z[9] &= M24; + } +#endif + + private static void Decode128(uint[] x, int xOff, int[] z, int zOff) + { + uint t0 = x[xOff + 0], t1 = x[xOff + 1], t2 = x[xOff + 2], t3 = x[xOff + 3]; + + z[zOff + 0] = (int)t0 & M26; + z[zOff + 1] = (int)((t1 << 6) | (t0 >> 26)) & M26; + z[zOff + 2] = (int)((t2 << 12) | (t1 >> 20)) & M25; + z[zOff + 3] = (int)((t3 << 19) | (t2 >> 13)) & M26; + z[zOff + 4] = (int)(t3 >> 7); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode128(ReadOnlySpan x, Span z) + { + uint t0 = x[0], t1 = x[1], t2 = x[2], t3 = x[3]; + + z[0] = (int)t0 & M26; + z[1] = (int)((t1 << 6) | (t0 >> 26)) & M26; + z[2] = (int)((t2 << 12) | (t1 >> 20)) & M25; + z[3] = (int)((t3 << 19) | (t2 >> 13)) & M26; + z[4] = (int)(t3 >> 7); + } +#endif + + private static void Decode128(byte[] bs, int off, int[] z, int zOff) + { + uint t0 = Decode32(bs, off + 0); + uint t1 = Decode32(bs, off + 4); + uint t2 = Decode32(bs, off + 8); + uint t3 = Decode32(bs, off + 12); + + z[zOff + 0] = (int)t0 & M26; + z[zOff + 1] = (int)((t1 << 6) | (t0 >> 26)) & M26; + z[zOff + 2] = (int)((t2 << 12) | (t1 >> 20)) & M25; + z[zOff + 3] = (int)((t3 << 19) | (t2 >> 13)) & M26; + z[zOff + 4] = (int)(t3 >> 7); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode128(ReadOnlySpan bs, Span z) + { + uint t0 = Decode32(bs); + uint t1 = Decode32(bs[4..]); + uint t2 = Decode32(bs[8..]); + uint t3 = Decode32(bs[12..]); + + z[0] = (int)t0 & M26; + z[1] = (int)((t1 << 6) | (t0 >> 26)) & M26; + z[2] = (int)((t2 << 12) | (t1 >> 20)) & M25; + z[3] = (int)((t3 << 19) | (t2 >> 13)) & M26; + z[4] = (int)(t3 >> 7); + } +#endif + + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } +#endif + + [CLSCompliant(false)] + public static void Encode(int[] x, uint[] z, int zOff) + { + Encode128(x, 0, z, zOff); + Encode128(x, 5, z, zOff + 4); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [CLSCompliant(false)] + public static void Encode(ReadOnlySpan x, Span z) + { + Encode128(x, z); + Encode128(x[5..], z[4..]); + } +#endif + + public static void Encode(int[] x, byte[] z, int zOff) + { + Encode128(x, 0, z, zOff); + Encode128(x, 5, z, zOff + 16); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Encode(ReadOnlySpan x, Span z) + { + Encode128(x, z); + Encode128(x[5..], z[16..]); + } +#endif + + private static void Encode128(int[] x, int xOff, uint[] z, int zOff) + { + uint x0 = (uint)x[xOff + 0], x1 = (uint)x[xOff + 1], x2 = (uint)x[xOff + 2], x3 = (uint)x[xOff + 3], + x4 = (uint)x[xOff + 4]; + + z[zOff + 0] = x0 | (x1 << 26); + z[zOff + 1] = (x1 >> 6) | (x2 << 20); + z[zOff + 2] = (x2 >> 12) | (x3 << 13); + z[zOff + 3] = (x3 >> 19) | (x4 << 7); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode128(ReadOnlySpan x, Span z) + { + uint x0 = (uint)x[0], x1 = (uint)x[1], x2 = (uint)x[2], x3 = (uint)x[3], x4 = (uint)x[4]; + + z[0] = x0 | (x1 << 26); + z[1] = (x1 >> 6) | (x2 << 20); + z[2] = (x2 >> 12) | (x3 << 13); + z[3] = (x3 >> 19) | (x4 << 7); + } +#endif + + private static void Encode128(int[] x, int xOff, byte[] bs, int off) + { + uint x0 = (uint)x[xOff + 0], x1 = (uint)x[xOff + 1], x2 = (uint)x[xOff + 2]; + uint x3 = (uint)x[xOff + 3], x4 = (uint)x[xOff + 4]; + + uint t0 = x0 | (x1 << 26); Encode32(t0, bs, off + 0); + uint t1 = (x1 >> 6) | (x2 << 20); Encode32(t1, bs, off + 4); + uint t2 = (x2 >> 12) | (x3 << 13); Encode32(t2, bs, off + 8); + uint t3 = (x3 >> 19) | (x4 << 7); Encode32(t3, bs, off + 12); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode128(ReadOnlySpan x, Span bs) + { + uint x0 = (uint)x[0], x1 = (uint)x[1], x2 = (uint)x[2]; + uint x3 = (uint)x[3], x4 = (uint)x[4]; + + uint t0 = x0 | (x1 << 26); Encode32(t0, bs); + uint t1 = (x1 >> 6) | (x2 << 20); Encode32(t1, bs[4..]); + uint t2 = (x2 >> 12) | (x3 << 13); Encode32(t2, bs[8..]); + uint t3 = (x3 >> 19) | (x4 << 7); Encode32(t3, bs[12..]); + } +#endif + + private static void Encode32(uint n, byte[] bs, int off) + { + bs[ off] = (byte)(n ); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + bs[++off] = (byte)(n >> 24); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode32(uint n, Span bs) + { + bs[0] = (byte)(n ); + bs[1] = (byte)(n >> 8); + bs[2] = (byte)(n >> 16); + bs[3] = (byte)(n >> 24); + } +#endif + + public static void Inv(int[] x, int[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Inv(x.AsSpan(), z.AsSpan()); +#else + //int[] x2 = Create(); + //int[] t = Create(); + //PowPm5d8(x, x2, t); + //Sqr(t, 3, t); + //Mul(t, x2, z); + + int[] t = Create(); + uint[] u = new uint[8]; + + Copy(x, 0, t, 0); + Normalize(t); + Encode(t, u, 0); + + Mod.ModOddInverse(P32, u, u); + + Decode(u, 0, z); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Inv(ReadOnlySpan x, Span z) + { + Span t = stackalloc int[Size]; + Span u = stackalloc uint[8]; + + Copy(x, t); + Normalize(t); + Encode(t, u); + + Mod.ModOddInverse(P32, u, u); + + Decode(u, z); + } +#endif + + public static void InvVar(int[] x, int[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + InvVar(x.AsSpan(), z.AsSpan()); +#else + int[] t = Create(); + uint[] u = new uint[8]; + + Copy(x, 0, t, 0); + Normalize(t); + Encode(t, u, 0); + + Mod.ModOddInverseVar(P32, u, u); + + Decode(u, 0, z); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void InvVar(ReadOnlySpan x, Span z) + { + Span t = stackalloc int[Size]; + Span u = stackalloc uint[8]; + + Copy(x, t); + Normalize(t); + Encode(t, u); + + Mod.ModOddInverseVar(P32, u, u); + + Decode(u, z); + } +#endif + + public static int IsOne(int[] x) + { + int d = x[0] ^ 1; + for (int i = 1; i < Size; ++i) + { + d |= x[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return (d - 1) >> 31; + } + + public static bool IsOneVar(int[] x) + { + return 0 != IsOne(x); + } + + public static int IsZero(int[] x) + { + int d = 0; + for (int i = 0; i < Size; ++i) + { + d |= x[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return (d - 1) >> 31; + } + + public static bool IsZeroVar(int[] x) + { + return 0 != IsZero(x); + } + + public static void Mul(int[] x, int y, int[] z) + { + int x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3], x4 = x[4]; + int x5 = x[5], x6 = x[6], x7 = x[7], x8 = x[8], x9 = x[9]; + long c0, c1, c2, c3; + + c0 = (long)x2 * y; x2 = (int)c0 & M25; c0 >>= 25; + c1 = (long)x4 * y; x4 = (int)c1 & M25; c1 >>= 25; + c2 = (long)x7 * y; x7 = (int)c2 & M25; c2 >>= 25; + //c3 = (long)x9 * y; x9 = (int)c3 & M24; c3 >>= 24; + //c3 *= 19; + c3 = (long)x9 * y; x9 = (int)c3 & M25; c3 >>= 25; + c3 *= 38; + + c3 += (long)x0 * y; z[0] = (int)c3 & M26; c3 >>= 26; + c1 += (long)x5 * y; z[5] = (int)c1 & M26; c1 >>= 26; + + c3 += (long)x1 * y; z[1] = (int)c3 & M26; c3 >>= 26; + c0 += (long)x3 * y; z[3] = (int)c0 & M26; c0 >>= 26; + c1 += (long)x6 * y; z[6] = (int)c1 & M26; c1 >>= 26; + c2 += (long)x8 * y; z[8] = (int)c2 & M26; c2 >>= 26; + + z[2] = x2 + (int)c3; + z[4] = x4 + (int)c0; + z[7] = x7 + (int)c1; + z[9] = x9 + (int)c2; + } + + public static void Mul(int[] x, int[] y, int[] z) + { + int x0 = x[0], y0 = y[0]; + int x1 = x[1], y1 = y[1]; + int x2 = x[2], y2 = y[2]; + int x3 = x[3], y3 = y[3]; + int x4 = x[4], y4 = y[4]; + + int u0 = x[5], v0 = y[5]; + int u1 = x[6], v1 = y[6]; + int u2 = x[7], v2 = y[7]; + int u3 = x[8], v3 = y[8]; + int u4 = x[9], v4 = y[9]; + + long a0 = (long)x0 * y0; + long a1 = (long)x0 * y1 + + (long)x1 * y0; + long a2 = (long)x0 * y2 + + (long)x1 * y1 + + (long)x2 * y0; + long a3 = (long)x1 * y2 + + (long)x2 * y1; + a3 <<= 1; + a3 += (long)x0 * y3 + + (long)x3 * y0; + long a4 = (long)x2 * y2; + a4 <<= 1; + a4 += (long)x0 * y4 + + (long)x1 * y3 + + (long)x3 * y1 + + (long)x4 * y0; + long a5 = (long)x1 * y4 + + (long)x2 * y3 + + (long)x3 * y2 + + (long)x4 * y1; + a5 <<= 1; + long a6 = (long)x2 * y4 + + (long)x4 * y2; + a6 <<= 1; + a6 += (long)x3 * y3; + long a7 = (long)x3 * y4 + + (long)x4 * y3; + long a8 = (long)x4 * y4; + a8 <<= 1; + + long b0 = (long)u0 * v0; + long b1 = (long)u0 * v1 + + (long)u1 * v0; + long b2 = (long)u0 * v2 + + (long)u1 * v1 + + (long)u2 * v0; + long b3 = (long)u1 * v2 + + (long)u2 * v1; + b3 <<= 1; + b3 += (long)u0 * v3 + + (long)u3 * v0; + long b4 = (long)u2 * v2; + b4 <<= 1; + b4 += (long)u0 * v4 + + (long)u1 * v3 + + (long)u3 * v1 + + (long)u4 * v0; + long b5 = (long)u1 * v4 + + (long)u2 * v3 + + (long)u3 * v2 + + (long)u4 * v1; + //b5 <<= 1; + long b6 = (long)u2 * v4 + + (long)u4 * v2; + b6 <<= 1; + b6 += (long)u3 * v3; + long b7 = (long)u3 * v4 + + (long)u4 * v3; + long b8 = (long)u4 * v4; + //b8 <<= 1; + + a0 -= b5 * 76; + a1 -= b6 * 38; + a2 -= b7 * 38; + a3 -= b8 * 76; + + a5 -= b0; + a6 -= b1; + a7 -= b2; + a8 -= b3; + //long a9 = -b4; + + x0 += u0; y0 += v0; + x1 += u1; y1 += v1; + x2 += u2; y2 += v2; + x3 += u3; y3 += v3; + x4 += u4; y4 += v4; + + long c0 = (long)x0 * y0; + long c1 = (long)x0 * y1 + + (long)x1 * y0; + long c2 = (long)x0 * y2 + + (long)x1 * y1 + + (long)x2 * y0; + long c3 = (long)x1 * y2 + + (long)x2 * y1; + c3 <<= 1; + c3 += (long)x0 * y3 + + (long)x3 * y0; + long c4 = (long)x2 * y2; + c4 <<= 1; + c4 += (long)x0 * y4 + + (long)x1 * y3 + + (long)x3 * y1 + + (long)x4 * y0; + long c5 = (long)x1 * y4 + + (long)x2 * y3 + + (long)x3 * y2 + + (long)x4 * y1; + c5 <<= 1; + long c6 = (long)x2 * y4 + + (long)x4 * y2; + c6 <<= 1; + c6 += (long)x3 * y3; + long c7 = (long)x3 * y4 + + (long)x4 * y3; + long c8 = (long)x4 * y4; + c8 <<= 1; + + int z8, z9; + long t; + + t = a8 + (c3 - a3); + z8 = (int)t & M26; t >>= 26; + //t += a9 + (c4 - a4); + t += (c4 - a4) - b4; + //z9 = (int)t & M24; t >>= 24; + //t = a0 + (t + ((c5 - a5) << 1)) * 19; + z9 = (int)t & M25; t >>= 25; + t = a0 + (t + c5 - a5) * 38; + z[0] = (int)t & M26; t >>= 26; + t += a1 + (c6 - a6) * 38; + z[1] = (int)t & M26; t >>= 26; + t += a2 + (c7 - a7) * 38; + z[2] = (int)t & M25; t >>= 25; + t += a3 + (c8 - a8) * 38; + z[3] = (int)t & M26; t >>= 26; + //t += a4 - a9 * 38; + t += a4 + b4 * 38; + z[4] = (int)t & M25; t >>= 25; + t += a5 + (c0 - a0); + z[5] = (int)t & M26; t >>= 26; + t += a6 + (c1 - a1); + z[6] = (int)t & M26; t >>= 26; + t += a7 + (c2 - a2); + z[7] = (int)t & M25; t >>= 25; + t += z8; + z[8] = (int)t & M26; t >>= 26; + z[9] = z9 + (int)t; + } + + public static void Negate(int[] x, int[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = -x[i]; + } + } + + public static void Normalize(int[] z) + { + int x = (z[9] >> 23) & 1; + Reduce(z, x); + Reduce(z, -x); + Debug.Assert(z[9] >> 24 == 0); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Normalize(Span z) + { + int x = (z[9] >> 23) & 1; + Reduce(z, x); + Reduce(z, -x); + Debug.Assert(z[9] >> 24 == 0); + } +#endif + + public static void One(int[] z) + { + z[0] = 1; + for (int i = 1; i < Size; ++i) + { + z[i] = 0; + } + } + + private static void PowPm5d8(int[] x, int[] rx2, int[] rz) + { + // z = x^((p-5)/8) = x^FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD + // (250 1s) (1 0s) (1 1s) + // Addition chain: [1] 2 3 5 10 15 25 50 75 125 [250] + + int[] x2 = rx2; Sqr(x, x2); Mul(x, x2, x2); + int[] x3 = Create(); Sqr(x2, x3); Mul(x, x3, x3); + int[] x5 = x3; Sqr(x3, 2, x5); Mul(x2, x5, x5); + int[] x10 = Create(); Sqr(x5, 5, x10); Mul(x5, x10, x10); + int[] x15 = Create(); Sqr(x10, 5, x15); Mul(x5, x15, x15); + int[] x25 = x5; Sqr(x15, 10, x25); Mul(x10, x25, x25); + int[] x50 = x10; Sqr(x25, 25, x50); Mul(x25, x50, x50); + int[] x75 = x15; Sqr(x50, 25, x75); Mul(x25, x75, x75); + int[] x125 = x25; Sqr(x75, 50, x125); Mul(x50, x125, x125); + int[] x250 = x50; Sqr(x125, 125, x250); Mul(x125, x250, x250); + + int[] t = x125; + Sqr(x250, 2, t); + Mul(t, x, rz); + } + + private static void Reduce(int[] z, int x) + { + int t = z[9], z9 = t & M24; + t = (t >> 24) + x; + + long cc = t * 19; + cc += z[0]; z[0] = (int)cc & M26; cc >>= 26; + cc += z[1]; z[1] = (int)cc & M26; cc >>= 26; + cc += z[2]; z[2] = (int)cc & M25; cc >>= 25; + cc += z[3]; z[3] = (int)cc & M26; cc >>= 26; + cc += z[4]; z[4] = (int)cc & M25; cc >>= 25; + cc += z[5]; z[5] = (int)cc & M26; cc >>= 26; + cc += z[6]; z[6] = (int)cc & M26; cc >>= 26; + cc += z[7]; z[7] = (int)cc & M25; cc >>= 25; + cc += z[8]; z[8] = (int)cc & M26; cc >>= 26; + z[9] = z9 + (int)cc; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Reduce(Span z, int x) + { + int t = z[9], z9 = t & M24; + t = (t >> 24) + x; + + long cc = t * 19; + cc += z[0]; z[0] = (int)cc & M26; cc >>= 26; + cc += z[1]; z[1] = (int)cc & M26; cc >>= 26; + cc += z[2]; z[2] = (int)cc & M25; cc >>= 25; + cc += z[3]; z[3] = (int)cc & M26; cc >>= 26; + cc += z[4]; z[4] = (int)cc & M25; cc >>= 25; + cc += z[5]; z[5] = (int)cc & M26; cc >>= 26; + cc += z[6]; z[6] = (int)cc & M26; cc >>= 26; + cc += z[7]; z[7] = (int)cc & M25; cc >>= 25; + cc += z[8]; z[8] = (int)cc & M26; cc >>= 26; + z[9] = z9 + (int)cc; + } +#endif + + public static void Sqr(int[] x, int[] z) + { + int x0 = x[0]; + int x1 = x[1]; + int x2 = x[2]; + int x3 = x[3]; + int x4 = x[4]; + + int u0 = x[5]; + int u1 = x[6]; + int u2 = x[7]; + int u3 = x[8]; + int u4 = x[9]; + + int x1_2 = x1 * 2; + int x2_2 = x2 * 2; + int x3_2 = x3 * 2; + int x4_2 = x4 * 2; + + long a0 = (long)x0 * x0; + long a1 = (long)x0 * x1_2; + long a2 = (long)x0 * x2_2 + + (long)x1 * x1; + long a3 = (long)x1_2 * x2_2 + + (long)x0 * x3_2; + long a4 = (long)x2 * x2_2 + + (long)x0 * x4_2 + + (long)x1 * x3_2; + long a5 = (long)x1_2 * x4_2 + + (long)x2_2 * x3_2; + long a6 = (long)x2_2 * x4_2 + + (long)x3 * x3; + long a7 = (long)x3 * x4_2; + long a8 = (long)x4 * x4_2; + + int u1_2 = u1 * 2; + int u2_2 = u2 * 2; + int u3_2 = u3 * 2; + int u4_2 = u4 * 2; + + long b0 = (long)u0 * u0; + long b1 = (long)u0 * u1_2; + long b2 = (long)u0 * u2_2 + + (long)u1 * u1; + long b3 = (long)u1_2 * u2_2 + + (long)u0 * u3_2; + long b4 = (long)u2 * u2_2 + + (long)u0 * u4_2 + + (long)u1 * u3_2; + long b5 = (long)u1_2 * u4_2 + + (long)u2_2 * u3_2; + long b6 = (long)u2_2 * u4_2 + + (long)u3 * u3; + long b7 = (long)u3 * u4_2; + long b8 = (long)u4 * u4_2; + + a0 -= b5 * 38; + a1 -= b6 * 38; + a2 -= b7 * 38; + a3 -= b8 * 38; + + a5 -= b0; + a6 -= b1; + a7 -= b2; + a8 -= b3; + //long a9 = -b4; + + x0 += u0; + x1 += u1; + x2 += u2; + x3 += u3; + x4 += u4; + + x1_2 = x1 * 2; + x2_2 = x2 * 2; + x3_2 = x3 * 2; + x4_2 = x4 * 2; + + long c0 = (long)x0 * x0; + long c1 = (long)x0 * x1_2; + long c2 = (long)x0 * x2_2 + + (long)x1 * x1; + long c3 = (long)x1_2 * x2_2 + + (long)x0 * x3_2; + long c4 = (long)x2 * x2_2 + + (long)x0 * x4_2 + + (long)x1 * x3_2; + long c5 = (long)x1_2 * x4_2 + + (long)x2_2 * x3_2; + long c6 = (long)x2_2 * x4_2 + + (long)x3 * x3; + long c7 = (long)x3 * x4_2; + long c8 = (long)x4 * x4_2; + + int z8, z9; + long t; + + t = a8 + (c3 - a3); + z8 = (int)t & M26; t >>= 26; + //t += a9 + (c4 - a4); + t += (c4 - a4) - b4; + //z9 = (int)t & M24; t >>= 24; + //t = a0 + (t + ((c5 - a5) << 1)) * 19; + z9 = (int)t & M25; t >>= 25; + t = a0 + (t + c5 - a5) * 38; + z[0] = (int)t & M26; t >>= 26; + t += a1 + (c6 - a6) * 38; + z[1] = (int)t & M26; t >>= 26; + t += a2 + (c7 - a7) * 38; + z[2] = (int)t & M25; t >>= 25; + t += a3 + (c8 - a8) * 38; + z[3] = (int)t & M26; t >>= 26; + //t += a4 - a9 * 38; + t += a4 + b4 * 38; + z[4] = (int)t & M25; t >>= 25; + t += a5 + (c0 - a0); + z[5] = (int)t & M26; t >>= 26; + t += a6 + (c1 - a1); + z[6] = (int)t & M26; t >>= 26; + t += a7 + (c2 - a2); + z[7] = (int)t & M25; t >>= 25; + t += z8; + z[8] = (int)t & M26; t >>= 26; + z[9] = z9 + (int)t; + } + + public static void Sqr(int[] x, int n, int[] z) + { + Debug.Assert(n > 0); + + Sqr(x, z); + + while (--n > 0) + { + Sqr(z, z); + } + } + + public static bool SqrtRatioVar(int[] u, int[] v, int[] z) + { + int[] uv3 = Create(); + int[] uv7 = Create(); + + Mul(u, v, uv3); + Sqr(v, uv7); + Mul(uv3, uv7, uv3); + Sqr(uv7, uv7); + Mul(uv7, uv3, uv7); + + int[] t = Create(); + int[] x = Create(); + PowPm5d8(uv7, t, x); + Mul(x, uv3, x); + + int[] vx2 = Create(); + Sqr(x, vx2); + Mul(vx2, v, vx2); + + Sub(vx2, u, t); + Normalize(t); + if (IsZeroVar(t)) + { + Copy(x, 0, z, 0); + return true; + } + + Add(vx2, u, t); + Normalize(t); + if (IsZeroVar(t)) + { + Mul(x, RootNegOne, z); + return true; + } + + return false; + } + + public static void Sub(int[] x, int[] y, int[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = x[i] - y[i]; + } + } + + public static void SubOne(int[] z) + { + z[0] -= 1; + } + + public static void Zero(int[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = 0; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs.meta new file mode 100644 index 00000000..eaf5952f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4fc5a9dad1fb4e54fb46ed3347609fcb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X25519Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs new file mode 100644 index 00000000..a7a44ada --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs @@ -0,0 +1,320 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748 +{ + using F = X448Field; + + public static class X448 + { + public const int PointSize = 56; + public const int ScalarSize = 56; + + private const uint C_A = 156326; + private const uint C_A24 = (C_A + 2)/4; + + //private static readonly uint[] Sqrt156324 = { 0x0551B193U, 0x07A21E17U, 0x0E635AD3U, 0x00812ABBU, 0x025B3F99U, 0x01605224U, + // 0x0AF8CB32U, 0x0D2E7D68U, 0x06BA50FDU, 0x08E55693U, 0x0CB08EB4U, 0x02ABEBC1U, 0x051BA0BBU, 0x02F8812EU, 0x0829B611U, + // 0x0BA4D3A0U }; + + public static bool CalculateAgreement(byte[] k, int kOff, byte[] u, int uOff, byte[] r, int rOff) + { + ScalarMult(k, kOff, u, uOff, r, rOff); + return !Arrays.AreAllZeroes(r, rOff, PointSize); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool CalculateAgreement(ReadOnlySpan k, ReadOnlySpan u, Span r) + { + ScalarMult(k, u, r); + return !Arrays.AreAllZeroes(r[..PointSize]); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } + + private static void DecodeScalar(ReadOnlySpan k, uint[] n) + { + for (int i = 0; i < 14; ++i) + { + n[i] = Decode32(k[(i * 4)..]); + } + + n[ 0] &= 0xFFFFFFFCU; + n[13] |= 0x80000000U; + } +#else + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + + private static void DecodeScalar(byte[] k, int kOff, uint[] n) + { + for (int i = 0; i < 14; ++i) + { + n[i] = Decode32(k, kOff + i * 4); + } + + n[ 0] &= 0xFFFFFFFCU; + n[13] |= 0x80000000U; + } +#endif + + public static void GeneratePrivateKey(SecureRandom random, byte[] k) + { + if (k.Length != ScalarSize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + + k[0] &= 0xFC; + k[ScalarSize - 1] |= 0x80; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePrivateKey(SecureRandom random, Span k) + { + if (k.Length != ScalarSize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + + k[0] &= 0xFC; + k[ScalarSize - 1] |= 0x80; + } +#endif + + public static void GeneratePublicKey(byte[] k, int kOff, byte[] r, int rOff) + { + ScalarMultBase(k, kOff, r, rOff); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePublicKey(ReadOnlySpan k, Span r) + { + ScalarMultBase(k, r); + } +#endif + + private static void PointDouble(uint[] x, uint[] z) + { + uint[] a = F.Create(); + uint[] b = F.Create(); + + //F.Apm(x, z, a, b); + F.Add(x, z, a); + F.Sub(x, z, b); + F.Sqr(a, a); + F.Sqr(b, b); + F.Mul(a, b, x); + F.Sub(a, b, a); + F.Mul(a, C_A24, z); + F.Add(z, b, z); + F.Mul(z, a, z); + } + + public static void Precompute() + { + Ed448.Precompute(); + } + + public static void ScalarMult(byte[] k, int kOff, byte[] u, int uOff, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMult(k.AsSpan(kOff), u.AsSpan(uOff), r.AsSpan(rOff)); +#else + uint[] n = new uint[14]; DecodeScalar(k, kOff, n); + + uint[] x1 = F.Create(); F.Decode(u, uOff, x1); + uint[] x2 = F.Create(); F.Copy(x1, 0, x2, 0); + uint[] z2 = F.Create(); z2[0] = 1; + uint[] x3 = F.Create(); x3[0] = 1; + uint[] z3 = F.Create(); + + uint[] t1 = F.Create(); + uint[] t2 = F.Create(); + + Debug.Assert(n[13] >> 31 == 1U); + + int bit = 447, swap = 1; + do + { + //F.Apm(x3, z3, t1, x3); + F.Add(x3, z3, t1); + F.Sub(x3, z3, x3); + //F.Apm(x2, z2, z3, x2); + F.Add(x2, z2, z3); + F.Sub(x2, z2, x2); + + F.Mul(t1, x2, t1); + F.Mul(x3, z3, x3); + F.Sqr(z3, z3); + F.Sqr(x2, x2); + + F.Sub(z3, x2, t2); + F.Mul(t2, C_A24, z2); + F.Add(z2, x2, z2); + F.Mul(z2, t2, z2); + F.Mul(x2, z3, x2); + + //F.Apm(t1, x3, x3, z3); + F.Sub(t1, x3, z3); + F.Add(t1, x3, x3); + F.Sqr(x3, x3); + F.Sqr(z3, z3); + F.Mul(z3, x1, z3); + + --bit; + + int word = bit >> 5, shift = bit & 0x1F; + int kt = (int)(n[word] >> shift) & 1; + swap ^= kt; + F.CSwap(swap, x2, x3); + F.CSwap(swap, z2, z3); + swap = kt; + } + while (bit >= 2); + + Debug.Assert(swap == 0); + + for (int i = 0; i < 2; ++i) + { + PointDouble(x2, z2); + } + + F.Inv(z2, z2); + F.Mul(x2, z2, x2); + + F.Normalize(x2); + F.Encode(x2, r, rOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void ScalarMult(ReadOnlySpan k, ReadOnlySpan u, Span r) + { + uint[] n = new uint[14]; DecodeScalar(k, n); + + uint[] x1 = F.Create(); F.Decode(u, x1); + uint[] x2 = F.Create(); F.Copy(x1, 0, x2, 0); + uint[] z2 = F.Create(); z2[0] = 1; + uint[] x3 = F.Create(); x3[0] = 1; + uint[] z3 = F.Create(); + + uint[] t1 = F.Create(); + uint[] t2 = F.Create(); + + Debug.Assert(n[13] >> 31 == 1U); + + int bit = 447, swap = 1; + do + { + //F.Apm(x3, z3, t1, x3); + F.Add(x3, z3, t1); + F.Sub(x3, z3, x3); + //F.Apm(x2, z2, z3, x2); + F.Add(x2, z2, z3); + F.Sub(x2, z2, x2); + + F.Mul(t1, x2, t1); + F.Mul(x3, z3, x3); + F.Sqr(z3, z3); + F.Sqr(x2, x2); + + F.Sub(z3, x2, t2); + F.Mul(t2, C_A24, z2); + F.Add(z2, x2, z2); + F.Mul(z2, t2, z2); + F.Mul(x2, z3, x2); + + //F.Apm(t1, x3, x3, z3); + F.Sub(t1, x3, z3); + F.Add(t1, x3, x3); + F.Sqr(x3, x3); + F.Sqr(z3, z3); + F.Mul(z3, x1, z3); + + --bit; + + int word = bit >> 5, shift = bit & 0x1F; + int kt = (int)(n[word] >> shift) & 1; + swap ^= kt; + F.CSwap(swap, x2, x3); + F.CSwap(swap, z2, z3); + swap = kt; + } + while (bit >= 2); + + Debug.Assert(swap == 0); + + for (int i = 0; i < 2; ++i) + { + PointDouble(x2, z2); + } + + F.Inv(z2, z2); + F.Mul(x2, z2, x2); + + F.Normalize(x2); + F.Encode(x2, r); + } +#endif + + public static void ScalarMultBase(byte[] k, int kOff, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBase(k.AsSpan(kOff), r.AsSpan(rOff)); +#else + uint[] x = F.Create(); + uint[] y = F.Create(); + + Ed448.ScalarMultBaseXY(k, kOff, x, y); + + F.Inv(x, x); + F.Mul(x, y, x); + F.Sqr(x, x); + + F.Normalize(x); + F.Encode(x, r, rOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void ScalarMultBase(ReadOnlySpan k, Span r) + { + uint[] x = F.Create(); + uint[] y = F.Create(); + + Ed448.ScalarMultBaseXY(k, x, y); + + F.Inv(x, x); + F.Mul(x, y, x); + F.Sqr(x, x); + + F.Normalize(x); + F.Encode(x, r); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs.meta new file mode 100644 index 00000000..0f757923 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cf616d896f96c4b4d8e388b9d307617a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs new file mode 100644 index 00000000..1ceda746 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs @@ -0,0 +1,1375 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748 +{ + [CLSCompliant(false)] + public static class X448Field + { + public const int Size = 16; + + private const uint M28 = 0x0FFFFFFFU; + + private static readonly uint[] P32 = new uint[]{ 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, + 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFEU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, + 0xFFFFFFFFU, 0xFFFFFFFFU }; + + public static void Add(uint[] x, uint[] y, uint[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = x[i] + y[i]; + } + } + + public static void AddOne(uint[] z) + { + z[0] += 1; + } + + public static void AddOne(uint[] z, int zOff) + { + z[zOff] += 1; + } + + //public static void Apm(int[] x, int[] y, int[] zp, int[] zm) + //{ + // for (int i = 0; i < Size; ++i) + // { + // int xi = x[i], yi = y[i]; + // zp[i] = xi + yi; + // zm[i] = xi - yi; + // } + //} + + public static int AreEqual(uint[] x, uint[] y) + { + uint d = 0; + for (int i = 0; i < Size; ++i) + { + d |= x[i] ^ y[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return ((int)d - 1) >> 31; + } + + public static bool AreEqualVar(uint[] x, uint[] y) + { + return 0 != AreEqual(x, y); + } + + public static void Carry(uint[] z) + { + uint z0 = z[0], z1 = z[1], z2 = z[2], z3 = z[3], z4 = z[4], z5 = z[5], z6 = z[6], z7 = z[7]; + uint z8 = z[8], z9 = z[9], z10 = z[10], z11 = z[11], z12 = z[12], z13 = z[13], z14 = z[14], z15 = z[15]; + + z1 += (z0 >> 28); z0 &= M28; + z5 += (z4 >> 28); z4 &= M28; + z9 += (z8 >> 28); z8 &= M28; + z13 += (z12 >> 28); z12 &= M28; + + z2 += (z1 >> 28); z1 &= M28; + z6 += (z5 >> 28); z5 &= M28; + z10 += (z9 >> 28); z9 &= M28; + z14 += (z13 >> 28); z13 &= M28; + + z3 += (z2 >> 28); z2 &= M28; + z7 += (z6 >> 28); z6 &= M28; + z11 += (z10 >> 28); z10 &= M28; + z15 += (z14 >> 28); z14 &= M28; + + uint t = z15 >> 28; z15 &= M28; + z0 += t; + z8 += t; + + z4 += (z3 >> 28); z3 &= M28; + z8 += (z7 >> 28); z7 &= M28; + z12 += (z11 >> 28); z11 &= M28; + + z1 += (z0 >> 28); z0 &= M28; + z5 += (z4 >> 28); z4 &= M28; + z9 += (z8 >> 28); z8 &= M28; + z13 += (z12 >> 28); z12 &= M28; + + z[0] = z0; z[1] = z1; z[2] = z2; z[3] = z3; z[4] = z4; z[5] = z5; z[6] = z6; z[7] = z7; + z[8] = z8; z[9] = z9; z[10] = z10; z[11] = z11; z[12] = z12; z[13] = z13; z[14] = z14; z[15] = z15; + } + + public static void CMov(int cond, uint[] x, int xOff, uint[] z, int zOff) + { + Debug.Assert(0 == cond || -1 == cond); + + uint MASK = (uint)cond; + + for (int i = 0; i < Size; ++i) + { + uint z_i = z[zOff + i], diff = z_i ^ x[xOff + i]; + z_i ^= (diff & MASK); + z[zOff + i] = z_i; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CMov(int cond, ReadOnlySpan x, Span z) + { + Debug.Assert(0 == cond || -1 == cond); + + uint MASK = (uint)cond; + + for (int i = 0; i < Size; ++i) + { + uint z_i = z[i], diff = z_i ^ x[i]; + z_i ^= (diff & MASK); + z[i] = z_i; + } + } +#endif + + public static void CNegate(int negate, uint[] z) + { + Debug.Assert(negate >> 1 == 0); + + uint[] t = Create(); + Sub(t, z, t); + + CMov(-negate, t, 0, z, 0); + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + for (int i = 0; i < Size; ++i) + { + z[zOff + i] = x[xOff + i]; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Copy(ReadOnlySpan x, Span z) + { + x[..Size].CopyTo(z); + } +#endif + + public static uint[] Create() + { + return new uint[Size]; + } + + public static uint[] CreateTable(int n) + { + return new uint[Size * n]; + } + + public static void CSwap(int swap, uint[] a, uint[] b) + { + Debug.Assert(swap >> 1 == 0); + Debug.Assert(a != b); + + uint mask = (uint)(0 - swap); + for (int i = 0; i < Size; ++i) + { + uint ai = a[i], bi = b[i]; + uint dummy = mask & (ai ^ bi); + a[i] = ai ^ dummy; + b[i] = bi ^ dummy; + } + } + + public static void Decode(uint[] x, int xOff, uint[] z) + { + Decode224(x, xOff, z, 0); + Decode224(x, xOff + 7, z, 8); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Decode(ReadOnlySpan x, Span z) + { + Decode224(x, z); + Decode224(x[7..], z[8..]); + } +#endif + + public static void Decode(byte[] x, int xOff, uint[] z) + { + Decode56(x, xOff, z, 0); + Decode56(x, xOff + 7, z, 2); + Decode56(x, xOff + 14, z, 4); + Decode56(x, xOff + 21, z, 6); + Decode56(x, xOff + 28, z, 8); + Decode56(x, xOff + 35, z, 10); + Decode56(x, xOff + 42, z, 12); + Decode56(x, xOff + 49, z, 14); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Decode(ReadOnlySpan x, Span z) + { + Decode56(x, z); + Decode56(x[7..], z[2..]); + Decode56(x[14..], z[4..]); + Decode56(x[21..], z[6..]); + Decode56(x[28..], z[8..]); + Decode56(x[35..], z[10..]); + Decode56(x[42..], z[12..]); + Decode56(x[49..], z[14..]); + } +#endif + + private static void Decode224(uint[] x, int xOff, uint[] z, int zOff) + { + uint x0 = x[xOff + 0], x1 = x[xOff + 1], x2 = x[xOff + 2], x3 = x[xOff + 3]; + uint x4 = x[xOff + 4], x5 = x[xOff + 5], x6 = x[xOff + 6]; + + z[zOff + 0] = x0 & M28; + z[zOff + 1] = (x0 >> 28 | x1 << 4) & M28; + z[zOff + 2] = (x1 >> 24 | x2 << 8) & M28; + z[zOff + 3] = (x2 >> 20 | x3 << 12) & M28; + z[zOff + 4] = (x3 >> 16 | x4 << 16) & M28; + z[zOff + 5] = (x4 >> 12 | x5 << 20) & M28; + z[zOff + 6] = (x5 >> 8 | x6 << 24) & M28; + z[zOff + 7] = x6 >> 4; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode224(ReadOnlySpan x, Span z) + { + uint x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + uint x4 = x[4], x5 = x[5], x6 = x[6]; + + z[0] = x0 & M28; + z[1] = (x0 >> 28 | x1 << 4) & M28; + z[2] = (x1 >> 24 | x2 << 8) & M28; + z[3] = (x2 >> 20 | x3 << 12) & M28; + z[4] = (x3 >> 16 | x4 << 16) & M28; + z[5] = (x4 >> 12 | x5 << 20) & M28; + z[6] = (x5 >> 8 | x6 << 24) & M28; + z[7] = x6 >> 4; + } +#endif + + private static uint Decode24(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode24(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + return n; + } +#endif + + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } +#endif + + private static void Decode56(byte[] bs, int off, uint[] z, int zOff) + { + uint lo = Decode32(bs, off); + uint hi = Decode24(bs, off + 4); + z[zOff] = lo & M28; + z[zOff + 1] = (lo >> 28) | (hi << 4); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode56(ReadOnlySpan bs, Span z) + { + uint lo = Decode32(bs); + uint hi = Decode24(bs[4..]); + z[0] = lo & M28; + z[1] = (lo >> 28) | (hi << 4); + } +#endif + + public static void Encode(uint[] x, uint[] z, int zOff) + { + Encode224(x, 0, z, zOff); + Encode224(x, 8, z, zOff + 7); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Encode(ReadOnlySpan x, Span z) + { + Encode224(x, z); + Encode224(x[8..], z[7..]); + } +#endif + + public static void Encode(uint[] x, byte[] z, int zOff) + { + Encode56(x, 0, z, zOff); + Encode56(x, 2, z, zOff + 7); + Encode56(x, 4, z, zOff + 14); + Encode56(x, 6, z, zOff + 21); + Encode56(x, 8, z, zOff + 28); + Encode56(x, 10, z, zOff + 35); + Encode56(x, 12, z, zOff + 42); + Encode56(x, 14, z, zOff + 49); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Encode(ReadOnlySpan x, Span z) + { + Encode56(x, z); + Encode56(x[2..], z[7..]); + Encode56(x[4..], z[14..]); + Encode56(x[6..], z[21..]); + Encode56(x[8..], z[28..]); + Encode56(x[10..], z[35..]); + Encode56(x[12..], z[42..]); + Encode56(x[14..], z[49..]); + } +#endif + + private static void Encode224(uint[] x, int xOff, uint[] z, int zOff) + { + uint x0 = x[xOff + 0], x1 = x[xOff + 1], x2 = x[xOff + 2], x3 = x[xOff + 3]; + uint x4 = x[xOff + 4], x5 = x[xOff + 5], x6 = x[xOff + 6], x7 = x[xOff + 7]; + + z[zOff + 0] = x0 | (x1 << 28); + z[zOff + 1] = (x1 >> 4) | (x2 << 24); + z[zOff + 2] = (x2 >> 8) | (x3 << 20); + z[zOff + 3] = (x3 >> 12) | (x4 << 16); + z[zOff + 4] = (x4 >> 16) | (x5 << 12); + z[zOff + 5] = (x5 >> 20) | (x6 << 8); + z[zOff + 6] = (x6 >> 24) | (x7 << 4); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode224(ReadOnlySpan x, Span z) + { + uint x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3]; + uint x4 = x[4], x5 = x[5], x6 = x[6], x7 = x[7]; + + z[0] = x0 | (x1 << 28); + z[1] = (x1 >> 4) | (x2 << 24); + z[2] = (x2 >> 8) | (x3 << 20); + z[3] = (x3 >> 12) | (x4 << 16); + z[4] = (x4 >> 16) | (x5 << 12); + z[5] = (x5 >> 20) | (x6 << 8); + z[6] = (x6 >> 24) | (x7 << 4); + } +#endif + + private static void Encode24(uint n, byte[] bs, int off) + { + bs[ off] = (byte)(n ); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode24(uint n, Span bs) + { + bs[0] = (byte)(n ); + bs[1] = (byte)(n >> 8); + bs[2] = (byte)(n >> 16); + } +#endif + + private static void Encode32(uint n, byte[] bs, int off) + { + bs[ off] = (byte)(n ); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + bs[++off] = (byte)(n >> 24); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode32(uint n, Span bs) + { + bs[0] = (byte)(n ); + bs[1] = (byte)(n >> 8); + bs[2] = (byte)(n >> 16); + bs[3] = (byte)(n >> 24); + } +#endif + + private static void Encode56(uint[] x, int xOff, byte[] bs, int off) + { + uint lo = x[xOff], hi = x[xOff + 1]; + Encode32(lo | (hi << 28), bs, off); + Encode24(hi >> 4, bs, off + 4); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode56(ReadOnlySpan x, Span bs) + { + uint lo = x[0], hi = x[1]; + Encode32(lo | (hi << 28), bs); + Encode24(hi >> 4, bs[4..]); + } +#endif + + public static void Inv(uint[] x, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Inv(x.AsSpan(), z.AsSpan()); +#else + //uint[] t = Create(); + //PowPm3d4(x, t); + //Sqr(t, 2, t); + //Mul(t, x, z); + + uint[] t = Create(); + uint[] u = new uint[14]; + + Copy(x, 0, t, 0); + Normalize(t); + Encode(t, u, 0); + + Mod.ModOddInverse(P32, u, u); + + Decode(u, 0, z); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Inv(ReadOnlySpan x, Span z) + { + Span t = stackalloc uint[Size]; + Span u = stackalloc uint[14]; + + Copy(x, t); + Normalize(t); + Encode(t, u); + + Mod.ModOddInverse(P32, u, u); + + Decode(u, z); + } +#endif + + public static void InvVar(uint[] x, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + InvVar(x.AsSpan(), z.AsSpan()); +#else + uint[] t = Create(); + uint[] u = new uint[14]; + + Copy(x, 0, t, 0); + Normalize(t); + Encode(t, u, 0); + + Mod.ModOddInverseVar(P32, u, u); + + Decode(u, 0, z); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void InvVar(ReadOnlySpan x, Span z) + { + Span t = stackalloc uint[Size]; + Span u = stackalloc uint[14]; + + Copy(x, t); + Normalize(t); + Encode(t, u); + + Mod.ModOddInverseVar(P32, u, u); + + Decode(u, z); + } +#endif + + public static int IsOne(uint[] x) + { + uint d = x[0] ^ 1; + for (int i = 1; i < Size; ++i) + { + d |= x[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return ((int)d - 1) >> 31; + } + + public static bool IsOneVar(uint[] x) + { + return 0 != IsOne(x); + } + + public static int IsZero(uint[] x) + { + uint d = 0; + for (int i = 0; i < Size; ++i) + { + d |= x[i]; + } + d |= d >> 16; + d &= 0xFFFF; + return ((int)d - 1) >> 31; + } + + public static bool IsZeroVar(uint[] x) + { + return 0U != IsZero(x); + } + + public static void Mul(uint[] x, uint y, uint[] z) + { + uint x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3], x4 = x[4], x5 = x[5], x6 = x[6], x7 = x[7]; + uint x8 = x[8], x9 = x[9], x10 = x[10], x11 = x[11], x12 = x[12], x13 = x[13], x14 = x[14], x15 = x[15]; + + uint z1, z5, z9, z13; + ulong c, d, e, f; + + c = (ulong)x1 * y; + z1 = (uint)c & M28; c >>= 28; + d = (ulong)x5 * y; + z5 = (uint)d & M28; d >>= 28; + e = (ulong)x9 * y; + z9 = (uint)e & M28; e >>= 28; + f = (ulong)x13 * y; + z13 = (uint)f & M28; f >>= 28; + + c += (ulong)x2 * y; + z[2] = (uint)c & M28; c >>= 28; + d += (ulong)x6 * y; + z[6] = (uint)d & M28; d >>= 28; + e += (ulong)x10 * y; + z[10] = (uint)e & M28; e >>= 28; + f += (ulong)x14 * y; + z[14] = (uint)f & M28; f >>= 28; + + c += (ulong)x3 * y; + z[3] = (uint)c & M28; c >>= 28; + d += (ulong)x7 * y; + z[7] = (uint)d & M28; d >>= 28; + e += (ulong)x11 * y; + z[11] = (uint)e & M28; e >>= 28; + f += (ulong)x15 * y; + z[15] = (uint)f & M28; f >>= 28; + + d += f; + + c += (ulong)x4 * y; + z[4] = (uint)c & M28; c >>= 28; + d += (ulong)x8 * y; + z[8] = (uint)d & M28; d >>= 28; + e += (ulong)x12 * y; + z[12] = (uint)e & M28; e >>= 28; + f += (ulong)x0 * y; + z[0] = (uint)f & M28; f >>= 28; + + z[1] = z1 + (uint)f; + z[5] = z5 + (uint)c; + z[9] = z9 + (uint)d; + z[13] = z13 + (uint)e; + } + + public static void Mul(uint[] x, uint[] y, uint[] z) + { + uint x0 = x[0]; + uint x1 = x[1]; + uint x2 = x[2]; + uint x3 = x[3]; + uint x4 = x[4]; + uint x5 = x[5]; + uint x6 = x[6]; + uint x7 = x[7]; + + uint u0 = x[8]; + uint u1 = x[9]; + uint u2 = x[10]; + uint u3 = x[11]; + uint u4 = x[12]; + uint u5 = x[13]; + uint u6 = x[14]; + uint u7 = x[15]; + + uint y0 = y[0]; + uint y1 = y[1]; + uint y2 = y[2]; + uint y3 = y[3]; + uint y4 = y[4]; + uint y5 = y[5]; + uint y6 = y[6]; + uint y7 = y[7]; + + uint v0 = y[8]; + uint v1 = y[9]; + uint v2 = y[10]; + uint v3 = y[11]; + uint v4 = y[12]; + uint v5 = y[13]; + uint v6 = y[14]; + uint v7 = y[15]; + + uint s0 = x0 + u0; + uint s1 = x1 + u1; + uint s2 = x2 + u2; + uint s3 = x3 + u3; + uint s4 = x4 + u4; + uint s5 = x5 + u5; + uint s6 = x6 + u6; + uint s7 = x7 + u7; + + uint t0 = y0 + v0; + uint t1 = y1 + v1; + uint t2 = y2 + v2; + uint t3 = y3 + v3; + uint t4 = y4 + v4; + uint t5 = y5 + v5; + uint t6 = y6 + v6; + uint t7 = y7 + v7; + + uint z0, z1, z2, z3, z4, z5, z6, z7, z8, z9, z10, z11, z12, z13, z14, z15; + ulong c, d; + + ulong f0 = (ulong)x0 * y0; + ulong f8 = (ulong)x7 * y1 + + (ulong)x6 * y2 + + (ulong)x5 * y3 + + (ulong)x4 * y4 + + (ulong)x3 * y5 + + (ulong)x2 * y6 + + (ulong)x1 * y7; + ulong g0 = (ulong)u0 * v0; + ulong g8 = (ulong)u7 * v1 + + (ulong)u6 * v2 + + (ulong)u5 * v3 + + (ulong)u4 * v4 + + (ulong)u3 * v5 + + (ulong)u2 * v6 + + (ulong)u1 * v7; + ulong h0 = (ulong)s0 * t0; + ulong h8 = (ulong)s7 * t1 + + (ulong)s6 * t2 + + (ulong)s5 * t3 + + (ulong)s4 * t4 + + (ulong)s3 * t5 + + (ulong)s2 * t6 + + (ulong)s1 * t7; + + c = f0 + g0 + h8 - f8; + z0 = (uint)c & M28; c >>= 28; + d = g8 + h0 - f0 + h8; + z8 = (uint)d & M28; d >>= 28; + + ulong f1 = (ulong)x1 * y0 + + (ulong)x0 * y1; + ulong f9 = (ulong)x7 * y2 + + (ulong)x6 * y3 + + (ulong)x5 * y4 + + (ulong)x4 * y5 + + (ulong)x3 * y6 + + (ulong)x2 * y7; + ulong g1 = (ulong)u1 * v0 + + (ulong)u0 * v1; + ulong g9 = (ulong)u7 * v2 + + (ulong)u6 * v3 + + (ulong)u5 * v4 + + (ulong)u4 * v5 + + (ulong)u3 * v6 + + (ulong)u2 * v7; + ulong h1 = (ulong)s1 * t0 + + (ulong)s0 * t1; + ulong h9 = (ulong)s7 * t2 + + (ulong)s6 * t3 + + (ulong)s5 * t4 + + (ulong)s4 * t5 + + (ulong)s3 * t6 + + (ulong)s2 * t7; + + c += f1 + g1 + h9 - f9; + z1 = (uint)c & M28; c >>= 28; + d += g9 + h1 - f1 + h9; + z9 = (uint)d & M28; d >>= 28; + + ulong f2 = (ulong)x2 * y0 + + (ulong)x1 * y1 + + (ulong)x0 * y2; + ulong f10 = (ulong)x7 * y3 + + (ulong)x6 * y4 + + (ulong)x5 * y5 + + (ulong)x4 * y6 + + (ulong)x3 * y7; + ulong g2 = (ulong)u2 * v0 + + (ulong)u1 * v1 + + (ulong)u0 * v2; + ulong g10 = (ulong)u7 * v3 + + (ulong)u6 * v4 + + (ulong)u5 * v5 + + (ulong)u4 * v6 + + (ulong)u3 * v7; + ulong h2 = (ulong)s2 * t0 + + (ulong)s1 * t1 + + (ulong)s0 * t2; + ulong h10 = (ulong)s7 * t3 + + (ulong)s6 * t4 + + (ulong)s5 * t5 + + (ulong)s4 * t6 + + (ulong)s3 * t7; + + c += f2 + g2 + h10 - f10; + z2 = (uint)c & M28; c >>= 28; + d += g10 + h2 - f2 + h10; + z10 = (uint)d & M28; d >>= 28; + + ulong f3 = (ulong)x3 * y0 + + (ulong)x2 * y1 + + (ulong)x1 * y2 + + (ulong)x0 * y3; + ulong f11 = (ulong)x7 * y4 + + (ulong)x6 * y5 + + (ulong)x5 * y6 + + (ulong)x4 * y7; + ulong g3 = (ulong)u3 * v0 + + (ulong)u2 * v1 + + (ulong)u1 * v2 + + (ulong)u0 * v3; + ulong g11 = (ulong)u7 * v4 + + (ulong)u6 * v5 + + (ulong)u5 * v6 + + (ulong)u4 * v7; + ulong h3 = (ulong)s3 * t0 + + (ulong)s2 * t1 + + (ulong)s1 * t2 + + (ulong)s0 * t3; + ulong h11 = (ulong)s7 * t4 + + (ulong)s6 * t5 + + (ulong)s5 * t6 + + (ulong)s4 * t7; + + c += f3 + g3 + h11 - f11; + z3 = (uint)c & M28; c >>= 28; + d += g11 + h3 - f3 + h11; + z11 = (uint)d & M28; d >>= 28; + + ulong f4 = (ulong)x4 * y0 + + (ulong)x3 * y1 + + (ulong)x2 * y2 + + (ulong)x1 * y3 + + (ulong)x0 * y4; + ulong f12 = (ulong)x7 * y5 + + (ulong)x6 * y6 + + (ulong)x5 * y7; + ulong g4 = (ulong)u4 * v0 + + (ulong)u3 * v1 + + (ulong)u2 * v2 + + (ulong)u1 * v3 + + (ulong)u0 * v4; + ulong g12 = (ulong)u7 * v5 + + (ulong)u6 * v6 + + (ulong)u5 * v7; + ulong h4 = (ulong)s4 * t0 + + (ulong)s3 * t1 + + (ulong)s2 * t2 + + (ulong)s1 * t3 + + (ulong)s0 * t4; + ulong h12 = (ulong)s7 * t5 + + (ulong)s6 * t6 + + (ulong)s5 * t7; + + c += f4 + g4 + h12 - f12; + z4 = (uint)c & M28; c >>= 28; + d += g12 + h4 - f4 + h12; + z12 = (uint)d & M28; d >>= 28; + + ulong f5 = (ulong)x5 * y0 + + (ulong)x4 * y1 + + (ulong)x3 * y2 + + (ulong)x2 * y3 + + (ulong)x1 * y4 + + (ulong)x0 * y5; + ulong f13 = (ulong)x7 * y6 + + (ulong)x6 * y7; + ulong g5 = (ulong)u5 * v0 + + (ulong)u4 * v1 + + (ulong)u3 * v2 + + (ulong)u2 * v3 + + (ulong)u1 * v4 + + (ulong)u0 * v5; + ulong g13 = (ulong)u7 * v6 + + (ulong)u6 * v7; + ulong h5 = (ulong)s5 * t0 + + (ulong)s4 * t1 + + (ulong)s3 * t2 + + (ulong)s2 * t3 + + (ulong)s1 * t4 + + (ulong)s0 * t5; + ulong h13 = (ulong)s7 * t6 + + (ulong)s6 * t7; + + c += f5 + g5 + h13 - f13; + z5 = (uint)c & M28; c >>= 28; + d += g13 + h5 - f5 + h13; + z13 = (uint)d & M28; d >>= 28; + + ulong f6 = (ulong)x6 * y0 + + (ulong)x5 * y1 + + (ulong)x4 * y2 + + (ulong)x3 * y3 + + (ulong)x2 * y4 + + (ulong)x1 * y5 + + (ulong)x0 * y6; + ulong f14 = (ulong)x7 * y7; + ulong g6 = (ulong)u6 * v0 + + (ulong)u5 * v1 + + (ulong)u4 * v2 + + (ulong)u3 * v3 + + (ulong)u2 * v4 + + (ulong)u1 * v5 + + (ulong)u0 * v6; + ulong g14 = (ulong)u7 * v7; + ulong h6 = (ulong)s6 * t0 + + (ulong)s5 * t1 + + (ulong)s4 * t2 + + (ulong)s3 * t3 + + (ulong)s2 * t4 + + (ulong)s1 * t5 + + (ulong)s0 * t6; + ulong h14 = (ulong)s7 * t7; + + c += f6 + g6 + h14 - f14; + z6 = (uint)c & M28; c >>= 28; + d += g14 + h6 - f6 + h14; + z14 = (uint)d & M28; d >>= 28; + + ulong f7 = (ulong)x7 * y0 + + (ulong)x6 * y1 + + (ulong)x5 * y2 + + (ulong)x4 * y3 + + (ulong)x3 * y4 + + (ulong)x2 * y5 + + (ulong)x1 * y6 + + (ulong)x0 * y7; + ulong g7 = (ulong)u7 * v0 + + (ulong)u6 * v1 + + (ulong)u5 * v2 + + (ulong)u4 * v3 + + (ulong)u3 * v4 + + (ulong)u2 * v5 + + (ulong)u1 * v6 + + (ulong)u0 * v7; + ulong h7 = (ulong)s7 * t0 + + (ulong)s6 * t1 + + (ulong)s5 * t2 + + (ulong)s4 * t3 + + (ulong)s3 * t4 + + (ulong)s2 * t5 + + (ulong)s1 * t6 + + (ulong)s0 * t7; + + c += f7 + g7; + z7 = (uint)c & M28; c >>= 28; + d += h7 - f7; + z15 = (uint)d & M28; d >>= 28; + + c += d; + + c += z8; + z8 = (uint)c & M28; c >>= 28; + d += z0; + z0 = (uint)d & M28; d >>= 28; + z9 += (uint)c; + z1 += (uint)d; + + z[0] = z0; + z[1] = z1; + z[2] = z2; + z[3] = z3; + z[4] = z4; + z[5] = z5; + z[6] = z6; + z[7] = z7; + z[8] = z8; + z[9] = z9; + z[10] = z10; + z[11] = z11; + z[12] = z12; + z[13] = z13; + z[14] = z14; + z[15] = z15; + } + + public static void Negate(uint[] x, uint[] z) + { + uint[] zero = Create(); + Sub(zero, x, z); + } + + public static void Normalize(uint[] z) + { + //int x = (z[15] >> (28 - 1)) & 1; + Reduce(z, 1); + Reduce(z, -1); + Debug.Assert(z[15] >> 28 == 0U); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Normalize(Span z) + { + //int x = (z[15] >> (28 - 1)) & 1; + Reduce(z, 1); + Reduce(z, -1); + Debug.Assert(z[15] >> 28 == 0U); + } +#endif + + public static void One(uint[] z) + { + z[0] = 1U; + for (int i = 1; i < Size; ++i) + { + z[i] = 0; + } + } + + private static void PowPm3d4(uint[] x, uint[] z) + { + // z = x^((p-3)/4) = x^(2^446 - 2^222 - 1) + // (223 1s) (1 0s) (222 1s) + // Addition chain: 1 2 3 6 9 18 19 37 74 111 [222] [223] + uint[] x2 = Create(); Sqr(x, x2); Mul(x, x2, x2); + uint[] x3 = Create(); Sqr(x2, x3); Mul(x, x3, x3); + uint[] x6 = Create(); Sqr(x3, 3, x6); Mul(x3, x6, x6); + uint[] x9 = Create(); Sqr(x6, 3, x9); Mul(x3, x9, x9); + uint[] x18 = Create(); Sqr(x9, 9, x18); Mul(x9, x18, x18); + uint[] x19 = Create(); Sqr(x18, x19); Mul(x, x19, x19); + uint[] x37 = Create(); Sqr(x19, 18, x37); Mul(x18, x37, x37); + uint[] x74 = Create(); Sqr(x37, 37, x74); Mul(x37, x74, x74); + uint[] x111 = Create(); Sqr(x74, 37, x111); Mul(x37, x111, x111); + uint[] x222 = Create(); Sqr(x111, 111, x222); Mul(x111, x222, x222); + uint[] x223 = Create(); Sqr(x222, x223); Mul(x, x223, x223); + + uint[] t = Create(); + Sqr(x223, 223, t); + Mul(t, x222, z); + } + + private static void Reduce(uint[] z, int x) + { + uint u = z[15], z15 = u & M28; + int t = (int)(u >> 28) + x; + + long cc = t; + for (int i = 0; i < 8; ++i) + { + cc += z[i]; z[i] = (uint)cc & M28; cc >>= 28; + } + cc += t; + for (int i = 8; i < 15; ++i) + { + cc += z[i]; z[i] = (uint)cc & M28; cc >>= 28; + } + z[15] = z15 + (uint)cc; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Reduce(Span z, int x) + { + uint u = z[15], z15 = u & M28; + int t = (int)(u >> 28) + x; + + long cc = t; + for (int i = 0; i < 8; ++i) + { + cc += z[i]; z[i] = (uint)cc & M28; cc >>= 28; + } + cc += t; + for (int i = 8; i < 15; ++i) + { + cc += z[i]; z[i] = (uint)cc & M28; cc >>= 28; + } + z[15] = z15 + (uint)cc; + } +#endif + + public static void Sqr(uint[] x, uint[] z) + { + uint x0 = x[0]; + uint x1 = x[1]; + uint x2 = x[2]; + uint x3 = x[3]; + uint x4 = x[4]; + uint x5 = x[5]; + uint x6 = x[6]; + uint x7 = x[7]; + + uint u0 = x[8]; + uint u1 = x[9]; + uint u2 = x[10]; + uint u3 = x[11]; + uint u4 = x[12]; + uint u5 = x[13]; + uint u6 = x[14]; + uint u7 = x[15]; + + uint x0_2 = x0 * 2; + uint x1_2 = x1 * 2; + uint x2_2 = x2 * 2; + uint x3_2 = x3 * 2; + uint x4_2 = x4 * 2; + uint x5_2 = x5 * 2; + uint x6_2 = x6 * 2; + + uint u0_2 = u0 * 2; + uint u1_2 = u1 * 2; + uint u2_2 = u2 * 2; + uint u3_2 = u3 * 2; + uint u4_2 = u4 * 2; + uint u5_2 = u5 * 2; + uint u6_2 = u6 * 2; + + uint s0 = x0 + u0; + uint s1 = x1 + u1; + uint s2 = x2 + u2; + uint s3 = x3 + u3; + uint s4 = x4 + u4; + uint s5 = x5 + u5; + uint s6 = x6 + u6; + uint s7 = x7 + u7; + + uint s0_2 = s0 * 2; + uint s1_2 = s1 * 2; + uint s2_2 = s2 * 2; + uint s3_2 = s3 * 2; + uint s4_2 = s4 * 2; + uint s5_2 = s5 * 2; + uint s6_2 = s6 * 2; + + uint z0, z1, z2, z3, z4, z5, z6, z7, z8, z9, z10, z11, z12, z13, z14, z15; + ulong c, d; + + ulong f0 = (ulong)x0 * x0; + ulong f8 = (ulong)x7 * x1_2 + + (ulong)x6 * x2_2 + + (ulong)x5 * x3_2 + + (ulong)x4 * x4; + ulong g0 = (ulong)u0 * u0; + ulong g8 = (ulong)u7 * u1_2 + + (ulong)u6 * u2_2 + + (ulong)u5 * u3_2 + + (ulong)u4 * u4; + ulong h0 = (ulong)s0 * s0; + ulong h8 = (ulong)s7 * s1_2 + + (ulong)s6 * s2_2 + + (ulong)s5 * s3_2 + + (ulong)s4 * s4; + + c = f0 + g0 + h8 - f8; + z0 = (uint)c & M28; c >>= 28; + d = g8 + h0 - f0 + h8; + z8 = (uint)d & M28; d >>= 28; + + ulong f1 = (ulong)x1 * x0_2; + ulong f9 = (ulong)x7 * x2_2 + + (ulong)x6 * x3_2 + + (ulong)x5 * x4_2; + ulong g1 = (ulong)u1 * u0_2; + ulong g9 = (ulong)u7 * u2_2 + + (ulong)u6 * u3_2 + + (ulong)u5 * u4_2; + ulong h1 = (ulong)s1 * s0_2; + ulong h9 = (ulong)s7 * s2_2 + + (ulong)s6 * s3_2 + + (ulong)s5 * s4_2; + + c += f1 + g1 + h9 - f9; + z1 = (uint)c & M28; c >>= 28; + d += g9 + h1 - f1 + h9; + z9 = (uint)d & M28; d >>= 28; + + ulong f2 = (ulong)x2 * x0_2 + + (ulong)x1 * x1; + ulong f10 = (ulong)x7 * x3_2 + + (ulong)x6 * x4_2 + + (ulong)x5 * x5; + ulong g2 = (ulong)u2 * u0_2 + + (ulong)u1 * u1; + ulong g10 = (ulong)u7 * u3_2 + + (ulong)u6 * u4_2 + + (ulong)u5 * u5; + ulong h2 = (ulong)s2 * s0_2 + + (ulong)s1 * s1; + ulong h10 = (ulong)s7 * s3_2 + + (ulong)s6 * s4_2 + + (ulong)s5 * s5; + + c += f2 + g2 + h10 - f10; + z2 = (uint)c & M28; c >>= 28; + d += g10 + h2 - f2 + h10; + z10 = (uint)d & M28; d >>= 28; + + ulong f3 = (ulong)x3 * x0_2 + + (ulong)x2 * x1_2; + ulong f11 = (ulong)x7 * x4_2 + + (ulong)x6 * x5_2; + ulong g3 = (ulong)u3 * u0_2 + + (ulong)u2 * u1_2; + ulong g11 = (ulong)u7 * u4_2 + + (ulong)u6 * u5_2; + ulong h3 = (ulong)s3 * s0_2 + + (ulong)s2 * s1_2; + ulong h11 = (ulong)s7 * s4_2 + + (ulong)s6 * s5_2; + + c += f3 + g3 + h11 - f11; + z3 = (uint)c & M28; c >>= 28; + d += g11 + h3 - f3 + h11; + z11 = (uint)d & M28; d >>= 28; + + ulong f4 = (ulong)x4 * x0_2 + + (ulong)x3 * x1_2 + + (ulong)x2 * x2; + ulong f12 = (ulong)x7 * x5_2 + + (ulong)x6 * x6; + ulong g4 = (ulong)u4 * u0_2 + + (ulong)u3 * u1_2 + + (ulong)u2 * u2; + ulong g12 = (ulong)u7 * u5_2 + + (ulong)u6 * u6; + ulong h4 = (ulong)s4 * s0_2 + + (ulong)s3 * s1_2 + + (ulong)s2 * s2; + ulong h12 = (ulong)s7 * s5_2 + + (ulong)s6 * s6; + + c += f4 + g4 + h12 - f12; + z4 = (uint)c & M28; c >>= 28; + d += g12 + h4 - f4 + h12; + z12 = (uint)d & M28; d >>= 28; + + ulong f5 = (ulong)x5 * x0_2 + + (ulong)x4 * x1_2 + + (ulong)x3 * x2_2; + ulong f13 = (ulong)x7 * x6_2; + ulong g5 = (ulong)u5 * u0_2 + + (ulong)u4 * u1_2 + + (ulong)u3 * u2_2; + ulong g13 = (ulong)u7 * u6_2; + ulong h5 = (ulong)s5 * s0_2 + + (ulong)s4 * s1_2 + + (ulong)s3 * s2_2; + ulong h13 = (ulong)s7 * s6_2; + + c += f5 + g5 + h13 - f13; + z5 = (uint)c & M28; c >>= 28; + d += g13 + h5 - f5 + h13; + z13 = (uint)d & M28; d >>= 28; + + ulong f6 = (ulong)x6 * x0_2 + + (ulong)x5 * x1_2 + + (ulong)x4 * x2_2 + + (ulong)x3 * x3; + ulong f14 = (ulong)x7 * x7; + ulong g6 = (ulong)u6 * u0_2 + + (ulong)u5 * u1_2 + + (ulong)u4 * u2_2 + + (ulong)u3 * u3; + ulong g14 = (ulong)u7 * u7; + ulong h6 = (ulong)s6 * s0_2 + + (ulong)s5 * s1_2 + + (ulong)s4 * s2_2 + + (ulong)s3 * s3; + ulong h14 = (ulong)s7 * s7; + + c += f6 + g6 + h14 - f14; + z6 = (uint)c & M28; c >>= 28; + d += g14 + h6 - f6 + h14; + z14 = (uint)d & M28; d >>= 28; + + ulong f7 = (ulong)x7 * x0_2 + + (ulong)x6 * x1_2 + + (ulong)x5 * x2_2 + + (ulong)x4 * x3_2; + ulong g7 = (ulong)u7 * u0_2 + + (ulong)u6 * u1_2 + + (ulong)u5 * u2_2 + + (ulong)u4 * u3_2; + ulong h7 = (ulong)s7 * s0_2 + + (ulong)s6 * s1_2 + + (ulong)s5 * s2_2 + + (ulong)s4 * s3_2; + + c += f7 + g7; + z7 = (uint)c & M28; c >>= 28; + d += h7 - f7; + z15 = (uint)d & M28; d >>= 28; + + c += d; + + c += z8; + z8 = (uint)c & M28; c >>= 28; + d += z0; + z0 = (uint)d & M28; d >>= 28; + z9 += (uint)c; + z1 += (uint)d; + + z[0] = z0; + z[1] = z1; + z[2] = z2; + z[3] = z3; + z[4] = z4; + z[5] = z5; + z[6] = z6; + z[7] = z7; + z[8] = z8; + z[9] = z9; + z[10] = z10; + z[11] = z11; + z[12] = z12; + z[13] = z13; + z[14] = z14; + z[15] = z15; + } + + public static void Sqr(uint[] x, int n, uint[] z) + { + Debug.Assert(n > 0); + + Sqr(x, z); + + while (--n > 0) + { + Sqr(z, z); + } + } + + public static bool SqrtRatioVar(uint[] u, uint[] v, uint[] z) + { + uint[] u3v = Create(); + uint[] u5v3 = Create(); + + Sqr(u, u3v); + Mul(u3v, v, u3v); + Sqr(u3v, u5v3); + Mul(u3v, u, u3v); + Mul(u5v3, u, u5v3); + Mul(u5v3, v, u5v3); + + uint[] x = Create(); + PowPm3d4(u5v3, x); + Mul(x, u3v, x); + + uint[] t = Create(); + Sqr(x, t); + Mul(t, v, t); + + Sub(u, t, t); + Normalize(t); + + if (IsZeroVar(t)) + { + Copy(x, 0, z, 0); + return true; + } + + return false; + } + + public static void Sub(uint[] x, uint[] y, uint[] z) + { + uint x0 = x[0], x1 = x[1], x2 = x[2], x3 = x[3], x4 = x[4], x5 = x[5], x6 = x[6], x7 = x[7]; + uint x8 = x[8], x9 = x[9], x10 = x[10], x11 = x[11], x12 = x[12], x13 = x[13], x14 = x[14], x15 = x[15]; + uint y0 = y[0], y1 = y[1], y2 = y[2], y3 = y[3], y4 = y[4], y5 = y[5], y6 = y[6], y7 = y[7]; + uint y8 = y[8], y9 = y[9], y10 = y[10], y11 = y[11], y12 = y[12], y13 = y[13], y14 = y[14], y15 = y[15]; + + uint z0 = x0 + 0x1FFFFFFEU - y0; + uint z1 = x1 + 0x1FFFFFFEU - y1; + uint z2 = x2 + 0x1FFFFFFEU - y2; + uint z3 = x3 + 0x1FFFFFFEU - y3; + uint z4 = x4 + 0x1FFFFFFEU - y4; + uint z5 = x5 + 0x1FFFFFFEU - y5; + uint z6 = x6 + 0x1FFFFFFEU - y6; + uint z7 = x7 + 0x1FFFFFFEU - y7; + uint z8 = x8 + 0x1FFFFFFCU - y8; + uint z9 = x9 + 0x1FFFFFFEU - y9; + uint z10 = x10 + 0x1FFFFFFEU - y10; + uint z11 = x11 + 0x1FFFFFFEU - y11; + uint z12 = x12 + 0x1FFFFFFEU - y12; + uint z13 = x13 + 0x1FFFFFFEU - y13; + uint z14 = x14 + 0x1FFFFFFEU - y14; + uint z15 = x15 + 0x1FFFFFFEU - y15; + + z2 += z1 >> 28; z1 &= M28; + z6 += z5 >> 28; z5 &= M28; + z10 += z9 >> 28; z9 &= M28; + z14 += z13 >> 28; z13 &= M28; + + z3 += z2 >> 28; z2 &= M28; + z7 += z6 >> 28; z6 &= M28; + z11 += z10 >> 28; z10 &= M28; + z15 += z14 >> 28; z14 &= M28; + + uint t = z15 >> 28; z15 &= M28; + z0 += t; + z8 += t; + + z4 += z3 >> 28; z3 &= M28; + z8 += z7 >> 28; z7 &= M28; + z12 += z11 >> 28; z11 &= M28; + + z1 += z0 >> 28; z0 &= M28; + z5 += z4 >> 28; z4 &= M28; + z9 += z8 >> 28; z8 &= M28; + z13 += z12 >> 28; z12 &= M28; + + z[0] = z0; + z[1] = z1; + z[2] = z2; + z[3] = z3; + z[4] = z4; + z[5] = z5; + z[6] = z6; + z[7] = z7; + z[8] = z8; + z[9] = z9; + z[10] = z10; + z[11] = z11; + z[12] = z12; + z[13] = z13; + z[14] = z14; + z[15] = z15; + } + + public static void SubOne(uint[] z) + { + uint[] one = Create(); + one[0] = 1U; + + Sub(z, one, z); + } + + public static void Zero(uint[] z) + { + for (int i = 0; i < Size; ++i) + { + z[i] = 0; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs.meta new file mode 100644 index 00000000..3e89cc3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dab3ece8872a26848b430918be6eef9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc7748/X448Field.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032.meta new file mode 100644 index 00000000..0b30403d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f050cf38376746046b798dbf14d54346 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs new file mode 100644 index 00000000..553fd8cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs @@ -0,0 +1,1807 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032 +{ + using F = Rfc7748.X25519Field; + + /// + /// A low-level implementation of the Ed25519, Ed25519ctx, and Ed25519ph instantiations of the Edwards-Curve Digital + /// Signature Algorithm specified in RFC 8032. + /// + /// + /// The implementation strategy is mostly drawn from + /// Mike Hamburg, "Fast and compact elliptic-curve cryptography", notably the "signed multi-comb" algorithm (for + /// scalar multiplication by a fixed point), the "half Niels coordinates" (for precomputed points), and the + /// "extensible coordinates" (for accumulators). Standard + /// extended coordinates are used during + /// precomputations, needing only a single extra point addition formula. + /// + public static class Ed25519 + { + // -x^2 + y^2 == 1 + 0x52036CEE2B6FFE738CC740797779E89800700A4D4141D8AB75EB4DCA135978A3 * x^2 * y^2 + + public enum Algorithm + { + Ed25519 = 0, + Ed25519ctx = 1, + Ed25519ph = 2, + } + + private const long M08L = 0x000000FFL; + private const long M28L = 0x0FFFFFFFL; + private const long M32L = 0xFFFFFFFFL; + + private const int CoordUints = 8; + private const int PointBytes = CoordUints * 4; + private const int ScalarUints = 8; + private const int ScalarBytes = ScalarUints * 4; + + public static readonly int PrehashSize = 64; + public static readonly int PublicKeySize = PointBytes; + public static readonly int SecretKeySize = 32; + public static readonly int SignatureSize = PointBytes + ScalarBytes; + + // "SigEd25519 no Ed25519 collisions" + private static readonly byte[] Dom2Prefix = new byte[]{ 0x53, 0x69, 0x67, 0x45, 0x64, 0x32, 0x35, 0x35, 0x31, + 0x39, 0x20, 0x6e, 0x6f, 0x20, 0x45, 0x64, 0x32, 0x35, 0x35, 0x31, 0x39, 0x20, 0x63, 0x6f, 0x6c, 0x6c, 0x69, + 0x73, 0x69, 0x6f, 0x6e, 0x73 }; + + private static readonly uint[] P = { 0xFFFFFFEDU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, + 0xFFFFFFFFU, 0xFFFFFFFFU, 0x7FFFFFFFU }; + private static readonly uint[] L = { 0x5CF5D3EDU, 0x5812631AU, 0xA2F79CD6U, 0x14DEF9DEU, 0x00000000U, + 0x00000000U, 0x00000000U, 0x10000000U }; + + private const int L0 = -0x030A2C13; // L0:26/-- + private const int L1 = 0x012631A6; // L1:24/22 + private const int L2 = 0x079CD658; // L2:27/-- + private const int L3 = -0x006215D1; // L3:23/-- + private const int L4 = 0x000014DF; // L4:12/11 + + private static readonly int[] B_x = { 0x0325D51A, 0x018B5823, 0x007B2C95, 0x0304A92D, 0x00D2598E, 0x01D6DC5C, + 0x01388C7F, 0x013FEC0A, 0x029E6B72, 0x0042D26D }; + private static readonly int[] B_y = { 0x02666658, 0x01999999, 0x00666666, 0x03333333, 0x00CCCCCC, 0x02666666, + 0x01999999, 0x00666666, 0x03333333, 0x00CCCCCC, }; + + // Note that d == -121665/121666 + private static readonly int[] C_d = { 0x035978A3, 0x02D37284, 0x018AB75E, 0x026A0A0E, 0x0000E014, 0x0379E898, + 0x01D01E5D, 0x01E738CC, 0x03715B7F, 0x00A406D9 }; + private static readonly int[] C_d2 = { 0x02B2F159, 0x01A6E509, 0x01156EBD, 0x00D4141D, 0x0001C029, 0x02F3D130, + 0x03A03CBB, 0x01CE7198, 0x02E2B6FF, 0x00480DB3 }; + private static readonly int[] C_d4 = { 0x0165E2B2, 0x034DCA13, 0x002ADD7A, 0x01A8283B, 0x00038052, 0x01E7A260, + 0x03407977, 0x019CE331, 0x01C56DFF, 0x00901B67 }; + + private const int WnafWidth = 5; + private const int WnafWidthBase = 7; + + // ScalarMultBase is hard-coded for these values of blocks, teeth, spacing so they can't be freely changed + private const int PrecompBlocks = 8; + private const int PrecompTeeth = 4; + private const int PrecompSpacing = 8; + //private const int PrecompRange = PrecompBlocks * PrecompTeeth * PrecompSpacing; // range == 256 + private const int PrecompPoints = 1 << (PrecompTeeth - 1); + private const int PrecompMask = PrecompPoints - 1; + + private static readonly object PrecompLock = new object(); + private static PointPrecomp[] PrecompBaseWnaf = null; + private static int[] PrecompBaseComb = null; + + private struct PointAccum + { + internal int[] x, y, z, u, v; + } + + private struct PointAffine + { + internal int[] x, y; + } + + private struct PointExtended + { + internal int[] x, y, z, t; + } + + private struct PointPrecomp + { + internal int[] ymx_h; // (y - x)/2 + internal int[] ypx_h; // (y + x)/2 + internal int[] xyd; // x.y.d + } + + private struct PointPrecompZ + { + internal int[] ymx_h; // (y - x)/2 + internal int[] ypx_h; // (y + x)/2 + internal int[] xyd; // x.y.d + internal int[] z; + } + + // Temp space to avoid allocations in point formulae. + private struct PointTemp + { + internal int[] r0, r1; + } + + private static byte[] CalculateS(byte[] r, byte[] k, byte[] s) + { + uint[] t = new uint[ScalarUints * 2]; DecodeScalar(r, 0, t); + uint[] u = new uint[ScalarUints]; DecodeScalar(k, 0, u); + uint[] v = new uint[ScalarUints]; DecodeScalar(s, 0, v); + + Nat256.MulAddTo(u, v, t); + + byte[] result = new byte[ScalarBytes * 2]; + for (int i = 0; i < t.Length; ++i) + { + Encode32(t[i], result, i * 4); + } + return ReduceScalar(result); + } + + private static bool CheckContextVar(byte[] ctx, byte phflag) + { + return ctx == null && phflag == 0x00 + || ctx != null && ctx.Length < 256; + } + + private static int CheckPoint(int[] x, int[] y) + { + int[] t = F.Create(); + int[] u = F.Create(); + int[] v = F.Create(); + + F.Sqr(x, u); + F.Sqr(y, v); + F.Mul(u, v, t); + F.Sub(v, u, v); + F.Mul(t, C_d, t); + F.AddOne(t); + F.Sub(t, v, t); + F.Normalize(t); + + return F.IsZero(t); + } + + private static int CheckPoint(int[] x, int[] y, int[] z) + { + int[] t = F.Create(); + int[] u = F.Create(); + int[] v = F.Create(); + int[] w = F.Create(); + + F.Sqr(x, u); + F.Sqr(y, v); + F.Sqr(z, w); + F.Mul(u, v, t); + F.Sub(v, u, v); + F.Mul(v, w, v); + F.Sqr(w, w); + F.Mul(t, C_d, t); + F.Add(t, w, t); + F.Sub(t, v, t); + F.Normalize(t); + + return F.IsZero(t); + } + + private static bool CheckPointVar(byte[] p) + { + uint[] t = new uint[CoordUints]; + Decode32(p, 0, t, 0, CoordUints); + t[CoordUints - 1] &= 0x7FFFFFFFU; + return !Nat256.Gte(t, P); + } + + private static bool CheckScalarVar(byte[] s, uint[] n) + { + DecodeScalar(s, 0, n); + return !Nat256.Gte(n, L); + } + + private static byte[] Copy(byte[] buf, int off, int len) + { + byte[] result = new byte[len]; + Array.Copy(buf, off, result, 0, len); + return result; + } + + private static IDigest CreateDigest() + { + return new Sha512Digest(); + } + + public static IDigest CreatePrehash() + { + return CreateDigest(); + } + + private static uint Decode24(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + return n; + } + + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } +#endif + + private static void Decode32(byte[] bs, int bsOff, uint[] n, int nOff, int nLen) + { + for (int i = 0; i < nLen; ++i) + { + n[nOff + i] = Decode32(bs, bsOff + i * 4); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode32(ReadOnlySpan bs, Span n) + { + for (int i = 0; i < n.Length; ++i) + { + n[i] = Decode32(bs[(i * 4)..]); + } + } +#endif + + private static bool DecodePointVar(byte[] p, int pOff, bool negate, ref PointAffine r) + { + byte[] py = Copy(p, pOff, PointBytes); + if (!CheckPointVar(py)) + return false; + + int x_0 = (py[PointBytes - 1] & 0x80) >> 7; + py[PointBytes - 1] &= 0x7F; + + F.Decode(py, 0, r.y); + + int[] u = F.Create(); + int[] v = F.Create(); + + F.Sqr(r.y, u); + F.Mul(C_d, u, v); + F.SubOne(u); + F.AddOne(v); + + if (!F.SqrtRatioVar(u, v, r.x)) + return false; + + F.Normalize(r.x); + if (x_0 == 1 && F.IsZeroVar(r.x)) + return false; + + if (negate ^ (x_0 != (r.x[0] & 1))) + { + F.Negate(r.x, r.x); + } + + return true; + } + + private static void DecodeScalar(byte[] k, int kOff, uint[] n) + { + Decode32(k, kOff, n, 0, ScalarUints); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void DecodeScalar(ReadOnlySpan k, Span n) + { + Decode32(k, n[..ScalarUints]); + } +#endif + + private static void Dom2(IDigest d, byte phflag, byte[] ctx) + { + if (ctx != null) + { + int n = Dom2Prefix.Length; + byte[] t = new byte[n + 2 + ctx.Length]; + Dom2Prefix.CopyTo(t, 0); + t[n] = phflag; + t[n + 1] = (byte)ctx.Length; + ctx.CopyTo(t, n + 2); + + d.BlockUpdate(t, 0, t.Length); + } + } + + private static void Encode24(uint n, byte[] bs, int off) + { + bs[off] = (byte)(n); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + } + + private static void Encode32(uint n, byte[] bs, int off) + { + bs[off] = (byte)(n); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + bs[++off] = (byte)(n >> 24); + } + + private static void Encode56(ulong n, byte[] bs, int off) + { + Encode32((uint)n, bs, off); + Encode24((uint)(n >> 32), bs, off + 4); + } + + private static int EncodePoint(ref PointAccum p, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return EncodePoint(ref p, r.AsSpan(rOff)); +#else + int[] x = F.Create(); + int[] y = F.Create(); + + F.Inv(p.z, y); + F.Mul(p.x, y, x); + F.Mul(p.y, y, y); + F.Normalize(x); + F.Normalize(y); + + int result = CheckPoint(x, y); + + F.Encode(y, r, rOff); + r[rOff + PointBytes - 1] |= (byte)((x[0] & 1) << 7); + + return result; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int EncodePoint(ref PointAccum p, Span r) + { + int[] x = F.Create(); + int[] y = F.Create(); + + F.Inv(p.z, y); + F.Mul(p.x, y, x); + F.Mul(p.y, y, y); + F.Normalize(x); + F.Normalize(y); + + int result = CheckPoint(x, y); + + F.Encode(y, r); + r[PointBytes - 1] |= (byte)((x[0] & 1) << 7); + + return result; + } +#endif + + public static void GeneratePrivateKey(SecureRandom random, byte[] k) + { + if (k.Length != SecretKeySize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePrivateKey(SecureRandom random, Span k) + { + if (k.Length != SecretKeySize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + } +#endif + + public static void GeneratePublicKey(byte[] sk, int skOff, byte[] pk, int pkOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + GeneratePublicKey(sk.AsSpan(skOff), pk.AsSpan(pkOff)); +#else + IDigest d = CreateDigest(); + byte[] h = new byte[d.GetDigestSize()]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.DoFinal(h, 0); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + ScalarMultBaseEncoded(s, pk, pkOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePublicKey(ReadOnlySpan sk, Span pk) + { + IDigest d = CreateDigest(); + int digestSize = d.GetDigestSize(); + Span h = digestSize <= 128 + ? stackalloc byte[digestSize] + : new byte[digestSize]; + + d.BlockUpdate(sk[..SecretKeySize]); + d.DoFinal(h); + + Span s = stackalloc byte[ScalarBytes]; + PruneScalar(h, s); + + ScalarMultBaseEncoded(s, pk); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint GetWindow4(ReadOnlySpan x, int n) +#else + private static uint GetWindow4(uint[] x, int n) +#endif + { + int w = (int)((uint)n >> 3), b = (n & 7) << 2; + return (x[w] >> b) & 15U; + } + + private static sbyte[] GetWnafVar(uint[] n, int width) + { + Debug.Assert(n[ScalarUints - 1] <= L[ScalarUints - 1]); + Debug.Assert(2 <= width && width <= 8); + + uint[] t = new uint[ScalarUints * 2]; + { + uint c = 0; + int tPos = t.Length, i = ScalarUints; + while (--i >= 0) + { + uint next = n[i]; + t[--tPos] = (next >> 16) | (c << 16); + t[--tPos] = c = next; + } + } + + sbyte[] ws = new sbyte[253]; + + int lead = 32 - width; + + uint carry = 0U; + int j = 0; + for (int i = 0; i < t.Length; ++i, j -= 16) + { + uint word = t[i]; + while (j < 16) + { + uint word16 = word >> j; + uint bit = word16 & 1U; + + if (bit == carry) + { + ++j; + continue; + } + + uint digit = (word16 | 1U) << lead; + carry = digit >> 31; + + ws[(i << 4) + j] = (sbyte)((int)digit >> lead); + + j += width; + } + } + + Debug.Assert(carry == 0); + + return ws; + } + + private static void ImplSign(IDigest d, byte[] h, byte[] s, byte[] pk, int pkOff, byte[] ctx, byte phflag, + byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + Dom2(d, phflag, ctx); + d.BlockUpdate(h, ScalarBytes, ScalarBytes); + d.BlockUpdate(m, mOff, mLen); + d.DoFinal(h, 0); + + byte[] r = ReduceScalar(h); + byte[] R = new byte[PointBytes]; + ScalarMultBaseEncoded(r, R, 0); + + Dom2(d, phflag, ctx); + d.BlockUpdate(R, 0, PointBytes); + d.BlockUpdate(pk, pkOff, PointBytes); + d.BlockUpdate(m, mOff, mLen); + d.DoFinal(h, 0); + + byte[] k = ReduceScalar(h); + byte[] S = CalculateS(r, k, s); + + Array.Copy(R, 0, sig, sigOff, PointBytes); + Array.Copy(S, 0, sig, sigOff + PointBytes, ScalarBytes); + } + + private static void ImplSign(byte[] sk, int skOff, byte[] ctx, byte phflag, byte[] m, int mOff, int mLen, + byte[] sig, int sigOff) + { + if (!CheckContextVar(ctx, phflag)) + throw new ArgumentException("ctx"); + + IDigest d = CreateDigest(); + byte[] h = new byte[d.GetDigestSize()]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.DoFinal(h, 0); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + byte[] pk = new byte[PointBytes]; + ScalarMultBaseEncoded(s, pk, 0); + + ImplSign(d, h, s, pk, 0, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + private static void ImplSign(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte phflag, byte[] m, + int mOff, int mLen, byte[] sig, int sigOff) + { + if (!CheckContextVar(ctx, phflag)) + throw new ArgumentException("ctx"); + + IDigest d = CreateDigest(); + byte[] h = new byte[d.GetDigestSize()]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.DoFinal(h, 0); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + ImplSign(d, h, s, pk, pkOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + private static bool ImplVerify(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte phflag, byte[] m, + int mOff, int mLen) + { + if (!CheckContextVar(ctx, phflag)) + throw new ArgumentException("ctx"); + + byte[] R = Copy(sig, sigOff, PointBytes); + byte[] S = Copy(sig, sigOff + PointBytes, ScalarBytes); + + if (!CheckPointVar(R)) + return false; + + uint[] nS = new uint[ScalarUints]; + if (!CheckScalarVar(S, nS)) + return false; + + Init(out PointAffine pA); + if (!DecodePointVar(pk, pkOff, true, ref pA)) + return false; + + IDigest d = CreateDigest(); + byte[] h = new byte[d.GetDigestSize()]; + + Dom2(d, phflag, ctx); + d.BlockUpdate(R, 0, PointBytes); + d.BlockUpdate(pk, pkOff, PointBytes); + d.BlockUpdate(m, mOff, mLen); + d.DoFinal(h, 0); + + byte[] k = ReduceScalar(h); + + uint[] nA = new uint[ScalarUints]; + DecodeScalar(k, 0, nA); + + Init(out PointAccum pR); + ScalarMultStrausVar(nS, nA, ref pA, ref pR); + + byte[] check = new byte[PointBytes]; + return 0 != EncodePoint(ref pR, check, 0) && Arrays.AreEqual(check, R); + } + + private static void Init(out PointAccum r) + { + r.x = F.Create(); + r.y = F.Create(); + r.z = F.Create(); + r.u = F.Create(); + r.v = F.Create(); + } + + private static void Init(out PointAffine r) + { + r.x = F.Create(); + r.y = F.Create(); + } + + private static void Init(out PointExtended r) + { + r.x = F.Create(); + r.y = F.Create(); + r.z = F.Create(); + r.t = F.Create(); + } + + private static void Init(out PointPrecomp r) + { + r.ymx_h = F.Create(); + r.ypx_h = F.Create(); + r.xyd = F.Create(); + } + + private static void Init(out PointPrecompZ r) + { + r.ymx_h = F.Create(); + r.ypx_h = F.Create(); + r.xyd = F.Create(); + r.z = F.Create(); + } + + private static void Init(out PointTemp r) + { + r.r0 = F.Create(); + r.r1 = F.Create(); + } + + private static void InvertDoubleZs(PointExtended[] points) + { + int count = points.Length; + int[] cs = F.CreateTable(count); + + int[] u = F.Create(); + F.Copy(points[0].z, 0, u, 0); + F.Copy(u, 0, cs, 0); + + int i = 0; + while (++i < count) + { + F.Mul(u, points[i].z, u); + F.Copy(u, 0, cs, i * F.Size); + } + + F.Add(u, u, u); + F.InvVar(u, u); + --i; + + int[] t = F.Create(); + + while (i > 0) + { + int j = i--; + F.Copy(cs, i * F.Size, t, 0); + F.Mul(t, u, t); + F.Mul(u, points[j].z, u); + F.Copy(t, 0, points[j].z, 0); + } + + F.Copy(u, 0, points[0].z, 0); + } + + private static bool IsNeutralElementVar(int[] x, int[] y) + { + return F.IsZeroVar(x) && F.IsOneVar(y); + } + + private static bool IsNeutralElementVar(int[] x, int[] y, int[] z) + { + return F.IsZeroVar(x) && F.AreEqualVar(y, z); + } + + private static void PointAdd(ref PointExtended p, ref PointExtended q, ref PointExtended r, ref PointTemp t) + { + // p may ref the same point as r (or q), but q may not ref the same point as r. + Debug.Assert(q.x != r.x & q.y != r.y && q.z != r.z && q.t != r.t); + + int[] a = r.x; + int[] b = r.y; + int[] c = t.r0; + int[] d = t.r1; + int[] e = a; + int[] f = c; + int[] g = d; + int[] h = b; + + F.Apm(p.y, p.x, b, a); + F.Apm(q.y, q.x, d, c); + F.Mul(a, c, a); + F.Mul(b, d, b); + F.Mul(p.t, q.t, c); + F.Mul(c, C_d2, c); + F.Add(p.z, p.z, d); + F.Mul(d, q.z, d); + F.Apm(b, a, h, e); + F.Apm(d, c, g, f); + F.Mul(e, h, r.t); + F.Mul(f, g, r.z); + F.Mul(e, f, r.x); + F.Mul(h, g, r.y); + } + + private static void PointAdd(ref PointPrecomp p, ref PointAccum r, ref PointTemp t) + { + int[] a = r.x; + int[] b = r.y; + int[] c = t.r0; + int[] e = r.u; + int[] f = a; + int[] g = b; + int[] h = r.v; + + F.Apm(r.y, r.x, b, a); + F.Mul(a, p.ymx_h, a); + F.Mul(b, p.ypx_h, b); + F.Mul(r.u, r.v, c); + F.Mul(c, p.xyd, c); + F.Apm(b, a, h, e); + F.Apm(r.z, c, g, f); + F.Mul(f, g, r.z); + F.Mul(f, e, r.x); + F.Mul(g, h, r.y); + } + + private static void PointAdd(ref PointPrecompZ p, ref PointAccum r, ref PointTemp t) + { + int[] a = r.x; + int[] b = r.y; + int[] c = t.r0; + int[] d = r.z; + int[] e = r.u; + int[] f = a; + int[] g = b; + int[] h = r.v; + + F.Apm(r.y, r.x, b, a); + F.Mul(a, p.ymx_h, a); + F.Mul(b, p.ypx_h, b); + F.Mul(r.u, r.v, c); + F.Mul(c, p.xyd, c); + F.Mul(r.z, p.z, d); + F.Apm(b, a, h, e); + F.Apm(d, c, g, f); + F.Mul(f, g, r.z); + F.Mul(f, e, r.x); + F.Mul(g, h, r.y); + } + + private static void PointAddVar(bool negate, ref PointPrecomp p, ref PointAccum r, ref PointTemp t) + { + int[] a = r.x; + int[] b = r.y; + int[] c = t.r0; + int[] e = r.u; + int[] f = a; + int[] g = b; + int[] h = r.v; + + int[] na, nb; + if (negate) + { + na = b; nb = a; + } + else + { + na = a; nb = b; + } + int[] nf = na, ng = nb; + + F.Apm(r.y, r.x, b, a); + F.Mul(na, p.ymx_h, na); + F.Mul(nb, p.ypx_h, nb); + F.Mul(r.u, r.v, c); + F.Mul(c, p.xyd, c); + F.Apm(b, a, h, e); + F.Apm(r.z, c, ng, nf); + F.Mul(f, g, r.z); + F.Mul(f, e, r.x); + F.Mul(g, h, r.y); + } + + private static void PointAddVar(bool negate, ref PointPrecompZ p, ref PointAccum r, ref PointTemp t) + { + int[] a = r.x; + int[] b = r.y; + int[] c = t.r0; + int[] d = r.z; + int[] e = r.u; + int[] f = a; + int[] g = b; + int[] h = r.v; + + int[] na, nb; + if (negate) + { + na = b; nb = a; + } + else + { + na = a; nb = b; + } + int[] nf = na, ng = nb; + + F.Apm(r.y, r.x, b, a); + F.Mul(na, p.ymx_h, na); + F.Mul(nb, p.ypx_h, nb); + F.Mul(r.u, r.v, c); + F.Mul(c, p.xyd, c); + F.Mul(r.z, p.z, d); + F.Apm(b, a, h, e); + F.Apm(d, c, ng, nf); + F.Mul(f, g, r.z); + F.Mul(f, e, r.x); + F.Mul(g, h, r.y); + } + + private static void PointCopy(ref PointAccum p, ref PointExtended r) + { + F.Copy(p.x, 0, r.x, 0); + F.Copy(p.y, 0, r.y, 0); + F.Copy(p.z, 0, r.z, 0); + F.Mul(p.u, p.v, r.t); + } + + private static void PointCopy(ref PointAffine p, ref PointExtended r) + { + F.Copy(p.x, 0, r.x, 0); + F.Copy(p.y, 0, r.y, 0); + F.One(r.z); + F.Mul(p.x, p.y, r.t); + } + + private static void PointCopy(ref PointExtended p, ref PointPrecompZ r) + { + // To avoid halving x and y, we double t and z instead. + F.Apm(p.y, p.x, r.ypx_h, r.ymx_h); + F.Mul(p.t, C_d2, r.xyd); + F.Add(p.z, p.z, r.z); + } + + private static void PointDouble(ref PointAccum r) + { + int[] a = r.x; + int[] b = r.y; + int[] c = r.z; + int[] e = r.u; + int[] f = a; + int[] g = b; + int[] h = r.v; + + F.Add(r.x, r.y, e); + F.Sqr(r.x, a); + F.Sqr(r.y, b); + F.Sqr(r.z, c); + F.Add(c, c, c); + F.Apm(a, b, h, g); + F.Sqr(e, e); + F.Sub(h, e, e); + F.Add(c, g, f); + F.Carry(f); // Probably unnecessary, but keep until better bounds analysis available + F.Mul(f, g, r.z); + F.Mul(f, e, r.x); + F.Mul(g, h, r.y); + } + + private static void PointLookup(int block, int index, ref PointPrecomp p) + { + Debug.Assert(0 <= block && block < PrecompBlocks); + Debug.Assert(0 <= index && index < PrecompPoints); + + int off = block * PrecompPoints * 3 * F.Size; + + for (int i = 0; i < PrecompPoints; ++i) + { + int cond = ((i ^ index) - 1) >> 31; + F.CMov(cond, PrecompBaseComb, off, p.ymx_h, 0); off += F.Size; + F.CMov(cond, PrecompBaseComb, off, p.ypx_h, 0); off += F.Size; + F.CMov(cond, PrecompBaseComb, off, p.xyd , 0); off += F.Size; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void PointLookupZ(ReadOnlySpan x, int n, ReadOnlySpan table, ref PointPrecompZ r) + { + // TODO This method is currently hard-coded to 4-bit windows and 8 precomputed points + + uint w = GetWindow4(x, n); + + int sign = (int)(w >> (4 - 1)) ^ 1; + int abs = ((int)w ^ -sign) & 7; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < 8); + + for (int i = 0; i < 8; ++i) + { + int cond = ((i ^ abs) - 1) >> 31; + F.CMov(cond, table, r.ymx_h); table = table[F.Size..]; + F.CMov(cond, table, r.ypx_h); table = table[F.Size..]; + F.CMov(cond, table, r.xyd); table = table[F.Size..]; + F.CMov(cond, table, r.z); table = table[F.Size..]; + } + + F.CSwap(sign, r.ymx_h, r.ypx_h); + F.CNegate(sign, r.xyd); + } +#else + private static void PointLookupZ(uint[] x, int n, int[] table, ref PointPrecompZ r) + { + // TODO This method is currently hard-coded to 4-bit windows and 8 precomputed points + + uint w = GetWindow4(x, n); + + int sign = (int)(w >> (4 - 1)) ^ 1; + int abs = ((int)w ^ -sign) & 7; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < 8); + + for (int i = 0, off = 0; i < 8; ++i) + { + int cond = ((i ^ abs) - 1) >> 31; + F.CMov(cond, table, off, r.ymx_h, 0); off += F.Size; + F.CMov(cond, table, off, r.ypx_h, 0); off += F.Size; + F.CMov(cond, table, off, r.xyd , 0); off += F.Size; + F.CMov(cond, table, off, r.z , 0); off += F.Size; + } + + F.CSwap(sign, r.ymx_h, r.ypx_h); + F.CNegate(sign, r.xyd); + } +#endif + + private static void PointPrecompute(ref PointAffine p, PointExtended[] points, int count, ref PointTemp t) + { + Debug.Assert(count > 0); + + Init(out points[0]); + PointCopy(ref p, ref points[0]); + + Init(out PointExtended d); + PointAdd(ref points[0], ref points[0], ref d, ref t); + + for (int i = 1; i < count; ++i) + { + Init(out points[i]); + PointAdd(ref points[i - 1], ref d, ref points[i], ref t); + } + } + + private static int[] PointPrecomputeZ(ref PointAffine p, int count, ref PointTemp t) + { + Debug.Assert(count > 0); + + Init(out PointExtended q); + PointCopy(ref p, ref q); + + Init(out PointExtended d); + PointAdd(ref q, ref q, ref d, ref t); + + Init(out PointPrecompZ r); + int[] table = F.CreateTable(count * 4); + int off = 0; + + int i = 0; + for (;;) + { + PointCopy(ref q, ref r); + + F.Copy(r.ymx_h, 0, table, off); off += F.Size; + F.Copy(r.ypx_h, 0, table, off); off += F.Size; + F.Copy(r.xyd , 0, table, off); off += F.Size; + F.Copy(r.z , 0, table, off); off += F.Size; + + if (++i == count) + break; + + PointAdd(ref q, ref d, ref q, ref t); + } + + return table; + } + + private static void PointPrecomputeZ(ref PointAffine p, PointPrecompZ[] points, int count, ref PointTemp t) + { + Debug.Assert(count > 0); + + Init(out PointExtended q); + PointCopy(ref p, ref q); + + Init(out PointExtended d); + PointAdd(ref q, ref q, ref d, ref t); + + int i = 0; + for (;;) + { + ref PointPrecompZ r = ref points[i]; + Init(out r); + PointCopy(ref q, ref r); + + if (++i == count) + break; + + PointAdd(ref q, ref d, ref q, ref t); + } + } + + private static void PointSetNeutral(ref PointAccum p) + { + F.Zero(p.x); + F.One(p.y); + F.One(p.z); + F.Zero(p.u); + F.One(p.v); + } + + public static void Precompute() + { + lock (PrecompLock) + { + if (PrecompBaseWnaf != null && PrecompBaseComb != null) + return; + + int wnafPoints = 1 << (WnafWidthBase - 2); + int combPoints = PrecompBlocks * PrecompPoints; + int totalPoints = wnafPoints + combPoints; + + PointExtended[] points = new PointExtended[totalPoints]; + Init(out PointTemp t); + + Init(out PointAffine b); + F.Copy(B_x, 0, b.x, 0); + F.Copy(B_y, 0, b.y, 0); + + PointPrecompute(ref b, points, wnafPoints, ref t); + + Init(out PointAccum p); + F.Copy(B_x, 0, p.x, 0); + F.Copy(B_y, 0, p.y, 0); + F.One(p.z); + F.Copy(B_x, 0, p.u, 0); + F.Copy(B_y, 0, p.v, 0); + + int pointsIndex = wnafPoints; + PointExtended[] toothPowers = new PointExtended[PrecompTeeth]; + for (int tooth = 0; tooth < PrecompTeeth; ++tooth) + { + Init(out toothPowers[tooth]); + } + Init(out PointExtended u); + for (int block = 0; block < PrecompBlocks; ++block) + { + ref PointExtended sum = ref points[pointsIndex++]; + Init(out sum); + + for (int tooth = 0; tooth < PrecompTeeth; ++tooth) + { + if (tooth == 0) + { + PointCopy(ref p, ref sum); + } + else + { + PointCopy(ref p, ref u); + PointAdd(ref sum, ref u, ref sum, ref t); + } + + PointDouble(ref p); + PointCopy(ref p, ref toothPowers[tooth]); + + if (block + tooth != PrecompBlocks + PrecompTeeth - 2) + { + for (int spacing = 1; spacing < PrecompSpacing; ++spacing) + { + PointDouble(ref p); + } + } + } + + F.Negate(sum.x, sum.x); + F.Negate(sum.t, sum.t); + + for (int tooth = 0; tooth < (PrecompTeeth - 1); ++tooth) + { + int size = 1 << tooth; + for (int j = 0; j < size; ++j, ++pointsIndex) + { + Init(out points[pointsIndex]); + PointAdd(ref points[pointsIndex - size], ref toothPowers[tooth], ref points[pointsIndex], + ref t); + } + } + } + Debug.Assert(pointsIndex == totalPoints); + + // Set each z coordinate to 1/(2.z) to avoid calculating halves of x, y in the following code + InvertDoubleZs(points); + + PrecompBaseWnaf = new PointPrecomp[wnafPoints]; + for (int i = 0; i < wnafPoints; ++i) + { + ref PointExtended q = ref points[i]; + ref PointPrecomp r = ref PrecompBaseWnaf[i]; + Init(out r); + + // Calculate x/2 and y/2 (because the z value holds half the inverse; see above). + F.Mul(q.x, q.z, q.x); + F.Mul(q.y, q.z, q.y); + + // y/2 +/- x/2 + F.Apm(q.y, q.x, r.ypx_h, r.ymx_h); + + // x/2 * y/2 * (4.d) == x.y.d + F.Mul(q.x, q.y, r.xyd); + F.Mul(r.xyd, C_d4, r.xyd); + + F.Normalize(r.ymx_h); + F.Normalize(r.ypx_h); + F.Normalize(r.xyd); + } + + PrecompBaseComb = F.CreateTable(combPoints * 3); + Init(out PointPrecomp s); + int off = 0; + for (int i = wnafPoints; i < totalPoints; ++i) + { + ref PointExtended q = ref points[i]; + + // Calculate x/2 and y/2 (because the z value holds half the inverse; see above). + F.Mul(q.x, q.z, q.x); + F.Mul(q.y, q.z, q.y); + + // y/2 +/- x/2 + F.Apm(q.y, q.x, s.ypx_h, s.ymx_h); + + // x/2 * y/2 * (4.d) == x.y.d + F.Mul(q.x, q.y, s.xyd); + F.Mul(s.xyd, C_d4, s.xyd); + + F.Normalize(s.ymx_h); + F.Normalize(s.ypx_h); + F.Normalize(s.xyd); + + F.Copy(s.ymx_h, 0, PrecompBaseComb, off); off += F.Size; + F.Copy(s.ypx_h, 0, PrecompBaseComb, off); off += F.Size; + F.Copy(s.xyd , 0, PrecompBaseComb, off); off += F.Size; + } + Debug.Assert(off == PrecompBaseComb.Length); + } + } + + private static void PruneScalar(byte[] n, int nOff, byte[] r) + { + Array.Copy(n, nOff, r, 0, ScalarBytes); + + r[0] &= 0xF8; + r[ScalarBytes - 1] &= 0x7F; + r[ScalarBytes - 1] |= 0x40; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void PruneScalar(ReadOnlySpan n, Span r) + { + n[..ScalarBytes].CopyTo(r); + + r[0] &= 0xF8; + r[ScalarBytes - 1] &= 0x7F; + r[ScalarBytes - 1] |= 0x40; + } +#endif + + private static byte[] ReduceScalar(byte[] n) + { + long x00 = Decode32(n, 0) & M32L; // x00:32/-- + long x01 = (Decode24(n, 4) << 4) & M32L; // x01:28/-- + long x02 = Decode32(n, 7) & M32L; // x02:32/-- + long x03 = (Decode24(n, 11) << 4) & M32L; // x03:28/-- + long x04 = Decode32(n, 14) & M32L; // x04:32/-- + long x05 = (Decode24(n, 18) << 4) & M32L; // x05:28/-- + long x06 = Decode32(n, 21) & M32L; // x06:32/-- + long x07 = (Decode24(n, 25) << 4) & M32L; // x07:28/-- + long x08 = Decode32(n, 28) & M32L; // x08:32/-- + long x09 = (Decode24(n, 32) << 4) & M32L; // x09:28/-- + long x10 = Decode32(n, 35) & M32L; // x10:32/-- + long x11 = (Decode24(n, 39) << 4) & M32L; // x11:28/-- + long x12 = Decode32(n, 42) & M32L; // x12:32/-- + long x13 = (Decode24(n, 46) << 4) & M32L; // x13:28/-- + long x14 = Decode32(n, 49) & M32L; // x14:32/-- + long x15 = (Decode24(n, 53) << 4) & M32L; // x15:28/-- + long x16 = Decode32(n, 56) & M32L; // x16:32/-- + long x17 = (Decode24(n, 60) << 4) & M32L; // x17:28/-- + long x18 = n[63] & M08L; // x18:08/-- + long t; + + //x18 += (x17 >> 28); x17 &= M28L; + x09 -= x18 * L0; // x09:34/28 + x10 -= x18 * L1; // x10:33/30 + x11 -= x18 * L2; // x11:35/28 + x12 -= x18 * L3; // x12:32/31 + x13 -= x18 * L4; // x13:28/21 + + x17 += (x16 >> 28); x16 &= M28L; // x17:28/--, x16:28/-- + x08 -= x17 * L0; // x08:54/32 + x09 -= x17 * L1; // x09:52/51 + x10 -= x17 * L2; // x10:55/34 + x11 -= x17 * L3; // x11:51/36 + x12 -= x17 * L4; // x12:41/-- + + //x16 += (x15 >> 28); x15 &= M28L; + x07 -= x16 * L0; // x07:54/28 + x08 -= x16 * L1; // x08:54/53 + x09 -= x16 * L2; // x09:55/53 + x10 -= x16 * L3; // x10:55/52 + x11 -= x16 * L4; // x11:51/41 + + x15 += (x14 >> 28); x14 &= M28L; // x15:28/--, x14:28/-- + x06 -= x15 * L0; // x06:54/32 + x07 -= x15 * L1; // x07:54/53 + x08 -= x15 * L2; // x08:56/-- + x09 -= x15 * L3; // x09:55/54 + x10 -= x15 * L4; // x10:55/53 + + //x14 += (x13 >> 28); x13 &= M28L; + x05 -= x14 * L0; // x05:54/28 + x06 -= x14 * L1; // x06:54/53 + x07 -= x14 * L2; // x07:56/-- + x08 -= x14 * L3; // x08:56/51 + x09 -= x14 * L4; // x09:56/-- + + x13 += (x12 >> 28); x12 &= M28L; // x13:28/22, x12:28/-- + x04 -= x13 * L0; // x04:54/49 + x05 -= x13 * L1; // x05:54/53 + x06 -= x13 * L2; // x06:56/-- + x07 -= x13 * L3; // x07:56/52 + x08 -= x13 * L4; // x08:56/52 + + x12 += (x11 >> 28); x11 &= M28L; // x12:28/24, x11:28/-- + x03 -= x12 * L0; // x03:54/49 + x04 -= x12 * L1; // x04:54/51 + x05 -= x12 * L2; // x05:56/-- + x06 -= x12 * L3; // x06:56/52 + x07 -= x12 * L4; // x07:56/53 + + x11 += (x10 >> 28); x10 &= M28L; // x11:29/--, x10:28/-- + x02 -= x11 * L0; // x02:55/32 + x03 -= x11 * L1; // x03:55/-- + x04 -= x11 * L2; // x04:56/55 + x05 -= x11 * L3; // x05:56/52 + x06 -= x11 * L4; // x06:56/53 + + x10 += (x09 >> 28); x09 &= M28L; // x10:29/--, x09:28/-- + x01 -= x10 * L0; // x01:55/28 + x02 -= x10 * L1; // x02:55/54 + x03 -= x10 * L2; // x03:56/55 + x04 -= x10 * L3; // x04:57/-- + x05 -= x10 * L4; // x05:56/53 + + x08 += (x07 >> 28); x07 &= M28L; // x08:56/53, x07:28/-- + x09 += (x08 >> 28); x08 &= M28L; // x09:29/25, x08:28/-- + + t = (x08 >> 27) & 1L; + x09 += t; // x09:29/26 + + x00 -= x09 * L0; // x00:55/53 + x01 -= x09 * L1; // x01:55/54 + x02 -= x09 * L2; // x02:57/-- + x03 -= x09 * L3; // x03:57/-- + x04 -= x09 * L4; // x04:57/42 + + x01 += (x00 >> 28); x00 &= M28L; + x02 += (x01 >> 28); x01 &= M28L; + x03 += (x02 >> 28); x02 &= M28L; + x04 += (x03 >> 28); x03 &= M28L; + x05 += (x04 >> 28); x04 &= M28L; + x06 += (x05 >> 28); x05 &= M28L; + x07 += (x06 >> 28); x06 &= M28L; + x08 += (x07 >> 28); x07 &= M28L; + x09 = (x08 >> 28); x08 &= M28L; + + x09 -= t; + + Debug.Assert(x09 == 0L || x09 == -1L); + + x00 += x09 & L0; + x01 += x09 & L1; + x02 += x09 & L2; + x03 += x09 & L3; + x04 += x09 & L4; + + x01 += (x00 >> 28); x00 &= M28L; + x02 += (x01 >> 28); x01 &= M28L; + x03 += (x02 >> 28); x02 &= M28L; + x04 += (x03 >> 28); x03 &= M28L; + x05 += (x04 >> 28); x04 &= M28L; + x06 += (x05 >> 28); x05 &= M28L; + x07 += (x06 >> 28); x06 &= M28L; + x08 += (x07 >> 28); x07 &= M28L; + + byte[] r = new byte[ScalarBytes]; + Encode56((ulong)(x00 | (x01 << 28)), r, 0); + Encode56((ulong)(x02 | (x03 << 28)), r, 7); + Encode56((ulong)(x04 | (x05 << 28)), r, 14); + Encode56((ulong)(x06 | (x07 << 28)), r, 21); + Encode32((uint)x08, r, 28); + return r; + } + + private static void ScalarMult(byte[] k, ref PointAffine p, ref PointAccum r) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMult(k.AsSpan(), ref p, ref r); +#else + uint[] n = new uint[ScalarUints]; + DecodeScalar(k, 0, n); + + // Recode the scalar into signed-digit form + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); Debug.Assert(c1 == 0U); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, 1U); Debug.Assert(c2 == (1U << 31)); + } + + Init(out PointPrecompZ q); + Init(out PointTemp t); + int[] table = PointPrecomputeZ(ref p, 8, ref t); + + PointSetNeutral(ref r); + + int w = 63; + for (;;) + { + PointLookupZ(n, w, table, ref q); + PointAdd(ref q, ref r, ref t); + + if (--w < 0) + break; + + for (int i = 0; i < 4; ++i) + { + PointDouble(ref r); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMult(ReadOnlySpan k, ref PointAffine p, ref PointAccum r) + { + Span n = stackalloc uint[ScalarUints]; + DecodeScalar(k, n); + + // Recode the scalar into signed-digit form + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); Debug.Assert(c1 == 0U); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, 1U); Debug.Assert(c2 == (1U << 31)); + } + + Init(out PointPrecompZ q); + Init(out PointTemp t); + int[] table = PointPrecomputeZ(ref p, 8, ref t); + + PointSetNeutral(ref r); + + int w = 63; + for (;;) + { + PointLookupZ(n, w, table, ref q); + PointAdd(ref q, ref r, ref t); + + if (--w < 0) + break; + + for (int i = 0; i < 4; ++i) + { + PointDouble(ref r); + } + } + } +#endif + + private static void ScalarMultBase(byte[] k, ref PointAccum r) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBase(k.AsSpan(), ref r); +#else + // Equivalent (but much slower) + //Init(out PointAffine p); + //F.Copy(B_x, 0, p.x, 0); + //F.Copy(B_y, 0, p.y, 0); + //ScalarMult(k, ref p, ref r); + + Precompute(); + + uint[] n = new uint[ScalarUints]; + DecodeScalar(k, 0, n); + + // Recode the scalar into signed-digit form, then group comb bits in each block + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); Debug.Assert(c1 == 0U); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, 1U); Debug.Assert(c2 == (1U << 31)); + + /* + * Because we are using 4 teeth and 8 spacing, each limb of n corresponds to one of the 8 blocks. + * Therefore we can efficiently group the bits for each comb position using a (double) shuffle. + */ + for (int i = 0; i < ScalarUints; ++i) + { + n[i] = Interleave.Shuffle2(n[i]); + } + } + + Init(out PointPrecomp p); + Init(out PointTemp t); + + PointSetNeutral(ref r); + int resultSign = 0; + + int cOff = (PrecompSpacing - 1) * PrecompTeeth; + for (;;) + { + for (int b = 0; b < PrecompBlocks; ++b) + { + uint w = n[b] >> cOff; + int sign = (int)(w >> (PrecompTeeth - 1)) & 1; + int abs = ((int)w ^ -sign) & PrecompMask; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < PrecompPoints); + + PointLookup(b, abs, ref p); + + F.CNegate(resultSign ^ sign, r.x); + F.CNegate(resultSign ^ sign, r.u); + resultSign = sign; + + PointAdd(ref p, ref r, ref t); + } + + if ((cOff -= PrecompTeeth) < 0) + break; + + PointDouble(ref r); + } + + F.CNegate(resultSign, r.x); + F.CNegate(resultSign, r.u); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMultBase(ReadOnlySpan k, ref PointAccum r) + { + // Equivalent (but much slower) + //Init(out PointAffine p); + //F.Copy(B_x, 0, p.x, 0); + //F.Copy(B_y, 0, p.y, 0); + //ScalarMult(k, ref p, ref r); + + Precompute(); + + Span n = stackalloc uint[ScalarUints]; + DecodeScalar(k, n); + + // Recode the scalar into signed-digit form, then group comb bits in each block + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); Debug.Assert(c1 == 0U); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, 1U); Debug.Assert(c2 == (1U << 31)); + + /* + * Because we are using 4 teeth and 8 spacing, each limb of n corresponds to one of the 8 blocks. + * Therefore we can efficiently group the bits for each comb position using a (double) shuffle. + */ + for (int i = 0; i < ScalarUints; ++i) + { + n[i] = Interleave.Shuffle2(n[i]); + } + } + + Init(out PointPrecomp p); + Init(out PointTemp t); + + PointSetNeutral(ref r); + int resultSign = 0; + + int cOff = (PrecompSpacing - 1) * PrecompTeeth; + for (;;) + { + for (int b = 0; b < PrecompBlocks; ++b) + { + uint w = n[b] >> cOff; + int sign = (int)(w >> (PrecompTeeth - 1)) & 1; + int abs = ((int)w ^ -sign) & PrecompMask; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < PrecompPoints); + + PointLookup(b, abs, ref p); + + F.CNegate(resultSign ^ sign, r.x); + F.CNegate(resultSign ^ sign, r.u); + resultSign = sign; + + PointAdd(ref p, ref r, ref t); + } + + if ((cOff -= PrecompTeeth) < 0) + break; + + PointDouble(ref r); + } + + F.CNegate(resultSign, r.x); + F.CNegate(resultSign, r.u); + } +#endif + + private static void ScalarMultBaseEncoded(byte[] k, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBaseEncoded(k.AsSpan(), r.AsSpan(rOff)); +#else + Init(out PointAccum p); + ScalarMultBase(k, ref p); + if (0 == EncodePoint(ref p, r, rOff)) + throw new InvalidOperationException(); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMultBaseEncoded(ReadOnlySpan k, Span r) + { + Init(out PointAccum p); + ScalarMultBase(k, ref p); + if (0 == EncodePoint(ref p, r)) + throw new InvalidOperationException(); + } +#endif + + internal static void ScalarMultBaseYZ(byte[] k, int kOff, int[] y, int[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBaseYZ(k.AsSpan(kOff), y.AsSpan(), z.AsSpan()); +#else + byte[] n = new byte[ScalarBytes]; + PruneScalar(k, kOff, n); + + Init(out PointAccum p); + ScalarMultBase(n, ref p); + + if (0 == CheckPoint(p.x, p.y, p.z)) + throw new InvalidOperationException(); + + F.Copy(p.y, 0, y, 0); + F.Copy(p.z, 0, z, 0); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void ScalarMultBaseYZ(ReadOnlySpan k, Span y, Span z) + { + Span n = stackalloc byte[ScalarBytes]; + PruneScalar(k, n); + + Init(out PointAccum p); + ScalarMultBase(n, ref p); + + if (0 == CheckPoint(p.x, p.y, p.z)) + throw new InvalidOperationException(); + + F.Copy(p.y, y); + F.Copy(p.z, z); + } +#endif + + private static void ScalarMultOrderVar(ref PointAffine p, ref PointAccum r) + { + sbyte[] ws_p = GetWnafVar(L, WnafWidth); + + int count = 1 << (WnafWidth - 2); + PointPrecompZ[] tp = new PointPrecompZ[count]; + Init(out PointTemp t); + PointPrecomputeZ(ref p, tp, count, ref t); + + PointSetNeutral(ref r); + + for (int bit = 252;;) + { + int wp = ws_p[bit]; + if (wp != 0) + { + int sign = wp >> 31; + int index = (wp ^ sign) >> 1; + + PointAddVar(sign != 0, ref tp[index], ref r, ref t); + } + + if (--bit < 0) + break; + + PointDouble(ref r); + } + } + + private static void ScalarMultStrausVar(uint[] nb, uint[] np, ref PointAffine p, ref PointAccum r) + { + Precompute(); + + sbyte[] ws_b = GetWnafVar(nb, WnafWidthBase); + sbyte[] ws_p = GetWnafVar(np, WnafWidth); + + int count = 1 << (WnafWidth - 2); + PointPrecompZ[] tp = new PointPrecompZ[count]; + Init(out PointTemp t); + PointPrecomputeZ(ref p, tp, count, ref t); + + PointSetNeutral(ref r); + + for (int bit = 252;;) + { + int wb = ws_b[bit]; + if (wb != 0) + { + int sign = wb >> 31; + int index = (wb ^ sign) >> 1; + + PointAddVar(sign != 0, ref PrecompBaseWnaf[index], ref r, ref t); + } + + int wp = ws_p[bit]; + if (wp != 0) + { + int sign = wp >> 31; + int index = (wp ^ sign) >> 1; + + PointAddVar(sign != 0, ref tp[index], ref r, ref t); + } + + if (--bit < 0) + break; + + PointDouble(ref r); + } + } + + public static void Sign(byte[] sk, int skOff, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte[] ctx = null; + byte phflag = 0x00; + + ImplSign(sk, skOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void Sign(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte[] ctx = null; + byte phflag = 0x00; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void Sign(byte[] sk, int skOff, byte[] ctx, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte phflag = 0x00; + + ImplSign(sk, skOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void Sign(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte phflag = 0x00; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] ctx, byte[] ph, int phOff, byte[] sig, int sigOff) + { + byte phflag = 0x01; + + ImplSign(sk, skOff, ctx, phflag, ph, phOff, PrehashSize, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte[] ph, int phOff, byte[] sig, int sigOff) + { + byte phflag = 0x01; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, ph, phOff, PrehashSize, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] ctx, IDigest ph, byte[] sig, int sigOff) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.DoFinal(m, 0)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + ImplSign(sk, skOff, ctx, phflag, m, 0, m.Length, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, IDigest ph, byte[] sig, int sigOff) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.DoFinal(m, 0)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, m, 0, m.Length, sig, sigOff); + } + + public static bool ValidatePublicKeyFull(byte[] pk, int pkOff) + { + Init(out PointAffine p); + if (!DecodePointVar(pk, pkOff, false, ref p)) + return false; + + F.Normalize(p.x); + F.Normalize(p.y); + + if (IsNeutralElementVar(p.x, p.y)) + return false; + + Init(out PointAccum r); + ScalarMultOrderVar(ref p, ref r); + + F.Normalize(r.x); + F.Normalize(r.y); + F.Normalize(r.z); + + return IsNeutralElementVar(r.x, r.y, r.z); + } + + public static bool ValidatePublicKeyPartial(byte[] pk, int pkOff) + { + Init(out PointAffine p); + return DecodePointVar(pk, pkOff, false, ref p); + } + + public static bool Verify(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] m, int mOff, int mLen) + { + byte[] ctx = null; + byte phflag = 0x00; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, m, mOff, mLen); + } + + public static bool Verify(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte[] m, int mOff, int mLen) + { + byte phflag = 0x00; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, m, mOff, mLen); + } + + public static bool VerifyPrehash(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte[] ph, int phOff) + { + byte phflag = 0x01; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, ph, phOff, PrehashSize); + } + + public static bool VerifyPrehash(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, IDigest ph) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.DoFinal(m, 0)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, m, 0, m.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs.meta new file mode 100644 index 00000000..d22ef061 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4698b4e25bad68a4ab75bae45753f475 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed25519.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs new file mode 100644 index 00000000..155bdb29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs @@ -0,0 +1,1806 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc8032 +{ + using F = Rfc7748.X448Field; + + /// + /// A low-level implementation of the Ed448 and Ed448ph instantiations of the Edwards-Curve Digital Signature + /// Algorithm specified in RFC 8032. + /// + /// + /// The implementation uses the "signed mult-comb" algorithm (for scalar multiplication by a fixed point) from + /// Mike Hamburg, "Fast and compact elliptic-curve cryptography". Standard + /// projective coordinates are used + /// for most point arithmetic. + /// + public static class Ed448 + { + // x^2 + y^2 == 1 - 39081 * x^2 * y^2 + + public enum Algorithm + { + Ed448 = 0, + Ed448ph = 1, + } + + private const ulong M26UL = 0x03FFFFFFUL; + private const ulong M28UL = 0x0FFFFFFFUL; + + private const int CoordUints = 14; + private const int PointBytes = CoordUints * 4 + 1; + private const int ScalarUints = 14; + private const int ScalarBytes = ScalarUints * 4 + 1; + + public static readonly int PrehashSize = 64; + public static readonly int PublicKeySize = PointBytes; + public static readonly int SecretKeySize = 57; + public static readonly int SignatureSize = PointBytes + ScalarBytes; + + // "SigEd448" + private static readonly byte[] Dom4Prefix = new byte[]{ 0x53, 0x69, 0x67, 0x45, 0x64, 0x34, 0x34, 0x38 }; + + private static readonly uint[] P = { 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, + 0xFFFFFFFEU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU }; + private static readonly uint[] L = { 0xAB5844F3U, 0x2378C292U, 0x8DC58F55U, 0x216CC272U, 0xAED63690U, 0xC44EDB49U, 0x7CCA23E9U, + 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0xFFFFFFFFU, 0x3FFFFFFFU }; + + private const int L_0 = 0x04A7BB0D; // L_0:26/24 + private const int L_1 = 0x0873D6D5; // L_1:27/23 + private const int L_2 = 0x0A70AADC; // L_2:27/26 + private const int L_3 = 0x03D8D723; // L_3:26/-- + private const int L_4 = 0x096FDE93; // L_4:27/25 + private const int L_5 = 0x0B65129C; // L_5:27/26 + private const int L_6 = 0x063BB124; // L_6:27/-- + private const int L_7 = 0x08335DC1; // L_7:27/22 + + private const int L4_0 = 0x029EEC34; // L4_0:25/24 + private const int L4_1 = 0x01CF5B55; // L4_1:25/-- + private const int L4_2 = 0x09C2AB72; // L4_2:27/25 + private const int L4_3 = 0x0F635C8E; // L4_3:28/-- + private const int L4_4 = 0x05BF7A4C; // L4_4:26/25 + private const int L4_5 = 0x0D944A72; // L4_5:28/-- + private const int L4_6 = 0x08EEC492; // L4_6:27/24 + private const int L4_7 = 0x20CD7705; // L4_7:29/24 + + private static readonly uint[] B_x = { 0x070CC05EU, 0x026A82BCU, 0x00938E26U, 0x080E18B0U, 0x0511433BU, 0x0F72AB66U, 0x0412AE1AU, + 0x0A3D3A46U, 0x0A6DE324U, 0x00F1767EU, 0x04657047U, 0x036DA9E1U, 0x05A622BFU, 0x0ED221D1U, 0x066BED0DU, 0x04F1970CU }; + private static readonly uint[] B_y = { 0x0230FA14U, 0x008795BFU, 0x07C8AD98U, 0x0132C4EDU, 0x09C4FDBDU, 0x01CE67C3U, 0x073AD3FFU, + 0x005A0C2DU, 0x07789C1EU, 0x0A398408U, 0x0A73736CU, 0x0C7624BEU, 0x003756C9U, 0x02488762U, 0x016EB6BCU, 0x0693F467U }; + private const int C_d = -39081; + + private const int WnafWidth = 5; + private const int WnafWidthBase = 7; + + // ScalarMultBase supports varying blocks, teeth, spacing so long as their product is in range [449, 479] + private const int PrecompBlocks = 5; + private const int PrecompTeeth = 5; + private const int PrecompSpacing = 18; + private const int PrecompRange = PrecompBlocks * PrecompTeeth * PrecompSpacing; // 448 < range < 480 + private const int PrecompPoints = 1 << (PrecompTeeth - 1); + private const int PrecompMask = PrecompPoints - 1; + + private static readonly object PrecompLock = new object(); + private static PointAffine[] PrecompBaseWnaf = null; + private static uint[] PrecompBaseComb = null; + + private struct PointAffine + { + internal uint[] x, y; + } + + private struct PointProjective + { + internal uint[] x, y, z; + } + + private static byte[] CalculateS(byte[] r, byte[] k, byte[] s) + { + uint[] t = new uint[ScalarUints * 2]; DecodeScalar(r, 0, t); + uint[] u = new uint[ScalarUints]; DecodeScalar(k, 0, u); + uint[] v = new uint[ScalarUints]; DecodeScalar(s, 0, v); + + Nat.MulAddTo(ScalarUints, u, v, t); + + byte[] result = new byte[ScalarBytes * 2]; + for (int i = 0; i < t.Length; ++i) + { + Encode32(t[i], result, i * 4); + } + return ReduceScalar(result); + } + + private static bool CheckContextVar(byte[] ctx) + { + return ctx != null && ctx.Length < 256; + } + + private static int CheckPoint(uint[] x, uint[] y) + { + uint[] t = F.Create(); + uint[] u = F.Create(); + uint[] v = F.Create(); + + F.Sqr(x, u); + F.Sqr(y, v); + F.Mul(u, v, t); + F.Add(u, v, u); + F.Mul(t, -C_d, t); + F.SubOne(t); + F.Add(t, u, t); + F.Normalize(t); + + return F.IsZero(t); + } + + private static int CheckPoint(uint[] x, uint[] y, uint[] z) + { + uint[] t = F.Create(); + uint[] u = F.Create(); + uint[] v = F.Create(); + uint[] w = F.Create(); + + F.Sqr(x, u); + F.Sqr(y, v); + F.Sqr(z, w); + F.Mul(u, v, t); + F.Add(u, v, u); + F.Mul(u, w, u); + F.Sqr(w, w); + F.Mul(t, -C_d, t); + F.Sub(t, w, t); + F.Add(t, u, t); + F.Normalize(t); + + return F.IsZero(t); + } + + private static bool CheckPointVar(byte[] p) + { + if ((p[PointBytes - 1] & 0x7F) != 0x00) + return false; + + uint[] t = new uint[CoordUints]; + Decode32(p, 0, t, 0, CoordUints); + return !Nat.Gte(CoordUints, t, P); + } + + private static bool CheckScalarVar(byte[] s, uint[] n) + { + if (s[ScalarBytes - 1] != 0x00) + return false; + + DecodeScalar(s, 0, n); + return !Nat.Gte(ScalarUints, n, L); + } + + private static byte[] Copy(byte[] buf, int off, int len) + { + byte[] result = new byte[len]; + Array.Copy(buf, off, result, 0, len); + return result; + } + + public static IXof CreatePrehash() + { + return CreateXof(); + } + + private static IXof CreateXof() + { + return new ShakeDigest(256); + } + + private static uint Decode16(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + return n; + } + + private static uint Decode24(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + return n; + } + + private static uint Decode32(byte[] bs, int off) + { + uint n = bs[off]; + n |= (uint)bs[++off] << 8; + n |= (uint)bs[++off] << 16; + n |= (uint)bs[++off] << 24; + return n; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint Decode32(ReadOnlySpan bs) + { + uint n = bs[0]; + n |= (uint)bs[1] << 8; + n |= (uint)bs[2] << 16; + n |= (uint)bs[3] << 24; + return n; + } +#endif + + private static void Decode32(byte[] bs, int bsOff, uint[] n, int nOff, int nLen) + { + for (int i = 0; i < nLen; ++i) + { + n[nOff + i] = Decode32(bs, bsOff + i * 4); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode32(ReadOnlySpan bs, Span n) + { + for (int i = 0; i < n.Length; ++i) + { + n[i] = Decode32(bs[(i * 4)..]); + } + } +#endif + + private static bool DecodePointVar(byte[] p, int pOff, bool negate, ref PointProjective r) + { + byte[] py = Copy(p, pOff, PointBytes); + if (!CheckPointVar(py)) + return false; + + int x_0 = (py[PointBytes - 1] & 0x80) >> 7; + py[PointBytes - 1] &= 0x7F; + + F.Decode(py, 0, r.y); + + uint[] u = F.Create(); + uint[] v = F.Create(); + + F.Sqr(r.y, u); + F.Mul(u, (uint)-C_d, v); + F.Negate(u, u); + F.AddOne(u); + F.AddOne(v); + + if (!F.SqrtRatioVar(u, v, r.x)) + return false; + + F.Normalize(r.x); + if (x_0 == 1 && F.IsZeroVar(r.x)) + return false; + + if (negate ^ (x_0 != (r.x[0] & 1))) + { + F.Negate(r.x, r.x); + } + + F.One(r.z); + return true; + } + + private static void DecodeScalar(byte[] k, int kOff, uint[] n) + { + Debug.Assert(k[kOff + ScalarBytes - 1] == 0x00); + + Decode32(k, kOff, n, 0, ScalarUints); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void DecodeScalar(ReadOnlySpan k, Span n) + { + Debug.Assert(k[ScalarBytes - 1] == 0x00); + + Decode32(k, n[..ScalarUints]); + } +#endif + + private static void Dom4(IXof d, byte phflag, byte[] ctx) + { + int n = Dom4Prefix.Length; + byte[] t = new byte[n + 2 + ctx.Length]; + Dom4Prefix.CopyTo(t, 0); + t[n] = phflag; + t[n + 1] = (byte)ctx.Length; + ctx.CopyTo(t, n + 2); + + d.BlockUpdate(t, 0, t.Length); + } + + private static void Encode24(uint n, byte[] bs, int off) + { + bs[off] = (byte)(n); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + } + + private static void Encode32(uint n, byte[] bs, int off) + { + bs[off] = (byte)(n); + bs[++off] = (byte)(n >> 8); + bs[++off] = (byte)(n >> 16); + bs[++off] = (byte)(n >> 24); + } + + private static void Encode56(ulong n, byte[] bs, int off) + { + Encode32((uint)n, bs, off); + Encode24((uint)(n >> 32), bs, off + 4); + } + + private static int EncodePoint(ref PointProjective p, byte[] r, int rOff) + { + uint[] x = F.Create(); + uint[] y = F.Create(); + + F.Inv(p.z, y); + F.Mul(p.x, y, x); + F.Mul(p.y, y, y); + F.Normalize(x); + F.Normalize(y); + + int result = CheckPoint(x, y); + + F.Encode(y, r, rOff); + r[rOff + PointBytes - 1] = (byte)((x[0] & 1) << 7); + + return result; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int EncodePoint(ref PointProjective p, Span r) + { + uint[] x = F.Create(); + uint[] y = F.Create(); + + F.Inv(p.z, y); + F.Mul(p.x, y, x); + F.Mul(p.y, y, y); + F.Normalize(x); + F.Normalize(y); + + int result = CheckPoint(x, y); + + F.Encode(y, r); + r[PointBytes - 1] = (byte)((x[0] & 1) << 7); + + return result; + } +#endif + + public static void GeneratePrivateKey(SecureRandom random, byte[] k) + { + if (k.Length != SecretKeySize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePrivateKey(SecureRandom random, Span k) + { + if (k.Length != SecretKeySize) + throw new ArgumentException(nameof(k)); + + random.NextBytes(k); + } +#endif + + public static void GeneratePublicKey(byte[] sk, int skOff, byte[] pk, int pkOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + GeneratePublicKey(sk.AsSpan(skOff), pk.AsSpan(pkOff)); +#else + IXof d = CreateXof(); + byte[] h = new byte[ScalarBytes * 2]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.OutputFinal(h, 0, h.Length); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + ScalarMultBaseEncoded(s, pk, pkOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void GeneratePublicKey(ReadOnlySpan sk, Span pk) + { + IXof d = CreateXof(); + Span h = stackalloc byte[ScalarBytes * 2]; + + d.BlockUpdate(sk[..SecretKeySize]); + d.OutputFinal(h); + + Span s = stackalloc byte[ScalarBytes]; + PruneScalar(h, s); + + ScalarMultBaseEncoded(s, pk); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static uint GetWindow4(ReadOnlySpan x, int n) +#else + private static uint GetWindow4(uint[] x, int n) +#endif + { + int w = (int)((uint)n >> 3), b = (n & 7) << 2; + return (x[w] >> b) & 15U; + } + + private static sbyte[] GetWnafVar(uint[] n, int width) + { + Debug.Assert(n[ScalarUints - 1] <= L[ScalarUints - 1]); + Debug.Assert(2 <= width && width <= 8); + + uint[] t = new uint[ScalarUints * 2]; + { + uint c = 0; + int tPos = t.Length, i = ScalarUints; + while (--i >= 0) + { + uint next = n[i]; + t[--tPos] = (next >> 16) | (c << 16); + t[--tPos] = c = next; + } + } + + sbyte[] ws = new sbyte[447]; + + int lead = 32 - width; + + uint carry = 0U; + int j = 0; + for (int i = 0; i < t.Length; ++i, j -= 16) + { + uint word = t[i]; + while (j < 16) + { + uint word16 = word >> j; + uint bit = word16 & 1U; + + if (bit == carry) + { + ++j; + continue; + } + + uint digit = (word16 | 1U) << lead; + carry = digit >> 31; + + ws[(i << 4) + j] = (sbyte)((int)digit >> lead); + + j += width; + } + } + + Debug.Assert(carry == 0); + + return ws; + } + + private static void ImplSign(IXof d, byte[] h, byte[] s, byte[] pk, int pkOff, byte[] ctx, byte phflag, + byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + Dom4(d, phflag, ctx); + d.BlockUpdate(h, ScalarBytes, ScalarBytes); + d.BlockUpdate(m, mOff, mLen); + d.OutputFinal(h, 0, h.Length); + + byte[] r = ReduceScalar(h); + byte[] R = new byte[PointBytes]; + ScalarMultBaseEncoded(r, R, 0); + + Dom4(d, phflag, ctx); + d.BlockUpdate(R, 0, PointBytes); + d.BlockUpdate(pk, pkOff, PointBytes); + d.BlockUpdate(m, mOff, mLen); + d.OutputFinal(h, 0, h.Length); + + byte[] k = ReduceScalar(h); + byte[] S = CalculateS(r, k, s); + + Array.Copy(R, 0, sig, sigOff, PointBytes); + Array.Copy(S, 0, sig, sigOff + PointBytes, ScalarBytes); + } + + private static void ImplSign(byte[] sk, int skOff, byte[] ctx, byte phflag, byte[] m, int mOff, int mLen, + byte[] sig, int sigOff) + { + if (!CheckContextVar(ctx)) + throw new ArgumentException("ctx"); + + IXof d = CreateXof(); + byte[] h = new byte[ScalarBytes * 2]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.OutputFinal(h, 0, h.Length); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + byte[] pk = new byte[PointBytes]; + ScalarMultBaseEncoded(s, pk, 0); + + ImplSign(d, h, s, pk, 0, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + private static void ImplSign(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte phflag, + byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + if (!CheckContextVar(ctx)) + throw new ArgumentException("ctx"); + + IXof d = CreateXof(); + byte[] h = new byte[ScalarBytes * 2]; + + d.BlockUpdate(sk, skOff, SecretKeySize); + d.OutputFinal(h, 0, h.Length); + + byte[] s = new byte[ScalarBytes]; + PruneScalar(h, 0, s); + + ImplSign(d, h, s, pk, pkOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + private static bool ImplVerify(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte phflag, + byte[] m, int mOff, int mLen) + { + if (!CheckContextVar(ctx)) + throw new ArgumentException("ctx"); + + byte[] R = Copy(sig, sigOff, PointBytes); + byte[] S = Copy(sig, sigOff + PointBytes, ScalarBytes); + + if (!CheckPointVar(R)) + return false; + + uint[] nS = new uint[ScalarUints]; + if (!CheckScalarVar(S, nS)) + return false; + + Init(out PointProjective pA); + if (!DecodePointVar(pk, pkOff, true, ref pA)) + return false; + + IXof d = CreateXof(); + byte[] h = new byte[ScalarBytes * 2]; + + Dom4(d, phflag, ctx); + d.BlockUpdate(R, 0, PointBytes); + d.BlockUpdate(pk, pkOff, PointBytes); + d.BlockUpdate(m, mOff, mLen); + d.OutputFinal(h, 0, h.Length); + + byte[] k = ReduceScalar(h); + + uint[] nA = new uint[ScalarUints]; + DecodeScalar(k, 0, nA); + + Init(out PointProjective pR); + ScalarMultStrausVar(nS, nA, ref pA, ref pR); + + byte[] check = new byte[PointBytes]; + return 0 != EncodePoint(ref pR, check, 0) && Arrays.AreEqual(check, R); + } + + private static void Init(out PointAffine r) + { + r.x = F.Create(); + r.y = F.Create(); + } + + private static void Init(out PointProjective r) + { + r.x = F.Create(); + r.y = F.Create(); + r.z = F.Create(); + } + + private static void InvertZs(PointProjective[] points) + { + int count = points.Length; + uint[] cs = F.CreateTable(count); + + uint[] u = F.Create(); + F.Copy(points[0].z, 0, u, 0); + F.Copy(u, 0, cs, 0); + + int i = 0; + while (++i < count) + { + F.Mul(u, points[i].z, u); + F.Copy(u, 0, cs, i * F.Size); + } + + F.InvVar(u, u); + --i; + + uint[] t = F.Create(); + + while (i > 0) + { + int j = i--; + F.Copy(cs, i * F.Size, t, 0); + F.Mul(t, u, t); + F.Mul(u, points[j].z, u); + F.Copy(t, 0, points[j].z, 0); + } + + F.Copy(u, 0, points[0].z, 0); + } + + private static bool IsNeutralElementVar(uint[] x, uint[] y, uint[] z) + { + return F.IsZeroVar(x) && F.AreEqualVar(y, z); + } + + private static void PointAdd(ref PointAffine p, ref PointProjective r) + { + uint[] b = F.Create(); + uint[] c = F.Create(); + uint[] d = F.Create(); + uint[] e = F.Create(); + uint[] f = F.Create(); + uint[] g = F.Create(); + uint[] h = F.Create(); + + F.Sqr(r.z, b); + F.Mul(p.x, r.x, c); + F.Mul(p.y, r.y, d); + F.Mul(c, d, e); + F.Mul(e, -C_d, e); + //F.Apm(b, e, f, g); + F.Add(b, e, f); + F.Sub(b, e, g); + F.Add(p.y, p.x, h); + F.Add(r.y, r.x, e); + F.Mul(h, e, h); + //F.Apm(d, c, b, e); + F.Add(d, c, b); + F.Sub(d, c, e); + F.Carry(b); + F.Sub(h, b, h); + F.Mul(h, r.z, h); + F.Mul(e, r.z, e); + F.Mul(f, h, r.x); + F.Mul(e, g, r.y); + F.Mul(f, g, r.z); + } + + private static void PointAdd(ref PointProjective p, ref PointProjective r) + { + uint[] a = F.Create(); + uint[] b = F.Create(); + uint[] c = F.Create(); + uint[] d = F.Create(); + uint[] e = F.Create(); + uint[] f = F.Create(); + uint[] g = F.Create(); + uint[] h = F.Create(); + + F.Mul(p.z, r.z, a); + F.Sqr(a, b); + F.Mul(p.x, r.x, c); + F.Mul(p.y, r.y, d); + F.Mul(c, d, e); + F.Mul(e, -C_d, e); + //F.Apm(b, e, f, g); + F.Add(b, e, f); + F.Sub(b, e, g); + F.Add(p.y, p.x, h); + F.Add(r.y, r.x, e); + F.Mul(h, e, h); + //F.Apm(d, c, b, e); + F.Add(d, c, b); + F.Sub(d, c, e); + F.Carry(b); + F.Sub(h, b, h); + F.Mul(h, a, h); + F.Mul(e, a, e); + F.Mul(f, h, r.x); + F.Mul(e, g, r.y); + F.Mul(f, g, r.z); + } + + private static void PointAddVar(bool negate, ref PointAffine p, ref PointProjective r) + { + uint[] b = F.Create(); + uint[] c = F.Create(); + uint[] d = F.Create(); + uint[] e = F.Create(); + uint[] f = F.Create(); + uint[] g = F.Create(); + uint[] h = F.Create(); + + uint[] nb, ne, nf, ng; + if (negate) + { + nb = e; ne = b; nf = g; ng = f; + F.Sub(p.y, p.x, h); + } + else + { + nb = b; ne = e; nf = f; ng = g; + F.Add(p.y, p.x, h); + } + + F.Sqr(r.z, b); + F.Mul(p.x, r.x, c); + F.Mul(p.y, r.y, d); + F.Mul(c, d, e); + F.Mul(e, -C_d, e); + //F.Apm(b, e, nf, ng); + F.Add(b, e, nf); + F.Sub(b, e, ng); + F.Add(r.y, r.x, e); + F.Mul(h, e, h); + //F.Apm(d, c, nb, ne); + F.Add(d, c, nb); + F.Sub(d, c, ne); + F.Carry(nb); + F.Sub(h, b, h); + F.Mul(h, r.z, h); + F.Mul(e, r.z, e); + F.Mul(f, h, r.x); + F.Mul(e, g, r.y); + F.Mul(f, g, r.z); + } + + private static void PointAddVar(bool negate, ref PointProjective p, ref PointProjective r) + { + uint[] a = F.Create(); + uint[] b = F.Create(); + uint[] c = F.Create(); + uint[] d = F.Create(); + uint[] e = F.Create(); + uint[] f = F.Create(); + uint[] g = F.Create(); + uint[] h = F.Create(); + + uint[] nb, ne, nf, ng; + if (negate) + { + nb = e; ne = b; nf = g; ng = f; + F.Sub(p.y, p.x, h); + } + else + { + nb = b; ne = e; nf = f; ng = g; + F.Add(p.y, p.x, h); + } + + F.Mul(p.z, r.z, a); + F.Sqr(a, b); + F.Mul(p.x, r.x, c); + F.Mul(p.y, r.y, d); + F.Mul(c, d, e); + F.Mul(e, -C_d, e); + //F.Apm(b, e, nf, ng); + F.Add(b, e, nf); + F.Sub(b, e, ng); + F.Add(r.y, r.x, e); + F.Mul(h, e, h); + //F.Apm(d, c, nb, ne); + F.Add(d, c, nb); + F.Sub(d, c, ne); + F.Carry(nb); + F.Sub(h, b, h); + F.Mul(h, a, h); + F.Mul(e, a, e); + F.Mul(f, h, r.x); + F.Mul(e, g, r.y); + F.Mul(f, g, r.z); + } + + private static void PointCopy(ref PointProjective p, ref PointProjective r) + { + F.Copy(p.x, 0, r.x, 0); + F.Copy(p.y, 0, r.y, 0); + F.Copy(p.z, 0, r.z, 0); + } + + private static void PointDouble(ref PointProjective r) + { + uint[] b = F.Create(); + uint[] c = F.Create(); + uint[] d = F.Create(); + uint[] e = F.Create(); + uint[] h = F.Create(); + uint[] j = F.Create(); + + F.Add(r.x, r.y, b); + F.Sqr(b, b); + F.Sqr(r.x, c); + F.Sqr(r.y, d); + F.Add(c, d, e); + F.Carry(e); + F.Sqr(r.z, h); + F.Add(h, h, h); + F.Carry(h); + F.Sub(e, h, j); + F.Sub(b, e, b); + F.Sub(c, d, c); + F.Mul(b, j, r.x); + F.Mul(e, c, r.y); + F.Mul(e, j, r.z); + } + + private static void PointLookup(int block, int index, ref PointAffine p) + { + Debug.Assert(0 <= block && block < PrecompBlocks); + Debug.Assert(0 <= index && index < PrecompPoints); + + int off = block * PrecompPoints * 2 * F.Size; + + for (int i = 0; i < PrecompPoints; ++i) + { + int cond = ((i ^ index) - 1) >> 31; + F.CMov(cond, PrecompBaseComb, off, p.x, 0); off += F.Size; + F.CMov(cond, PrecompBaseComb, off, p.y, 0); off += F.Size; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void PointLookup(ReadOnlySpan x, int n, ReadOnlySpan table, ref PointProjective r) + { + // TODO This method is currently hardcoded to 4-bit windows and 8 precomputed points + + uint w = GetWindow4(x, n); + + int sign = (int)(w >> (4 - 1)) ^ 1; + int abs = ((int)w ^ -sign) & 7; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < 8); + + for (int i = 0; i < 8; ++i) + { + int cond = ((i ^ abs) - 1) >> 31; + F.CMov(cond, table, r.x); table = table[F.Size..]; + F.CMov(cond, table, r.y); table = table[F.Size..]; + F.CMov(cond, table, r.z); table = table[F.Size..]; + } + + F.CNegate(sign, r.x); + } +#else + private static void PointLookup(uint[] x, int n, uint[] table, ref PointProjective r) + { + // TODO This method is currently hardcoded to 4-bit windows and 8 precomputed points + + uint w = GetWindow4(x, n); + + int sign = (int)(w >> (4 - 1)) ^ 1; + int abs = ((int)w ^ -sign) & 7; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < 8); + + for (int i = 0, off = 0; i < 8; ++i) + { + int cond = ((i ^ abs) - 1) >> 31; + F.CMov(cond, table, off, r.x, 0); off += F.Size; + F.CMov(cond, table, off, r.y, 0); off += F.Size; + F.CMov(cond, table, off, r.z, 0); off += F.Size; + } + + F.CNegate(sign, r.x); + } +#endif + + private static void PointLookup15(uint[] table, ref PointProjective r) + { + int off = F.Size * 3 * 7; + + F.Copy(table, off, r.x, 0); off += F.Size; + F.Copy(table, off, r.y, 0); off += F.Size; + F.Copy(table, off, r.z, 0); + } + + private static uint[] PointPrecompute(ref PointProjective p, int count) + { + Debug.Assert(count > 0); + + Init(out PointProjective q); + PointCopy(ref p, ref q); + + Init(out PointProjective d); + PointCopy(ref q, ref d); + PointDouble(ref d); + + uint[] table = F.CreateTable(count * 3); + int off = 0; + + int i = 0; + for (;;) + { + F.Copy(q.x, 0, table, off); off += F.Size; + F.Copy(q.y, 0, table, off); off += F.Size; + F.Copy(q.z, 0, table, off); off += F.Size; + + if (++i == count) + break; + + PointAdd(ref d, ref q); + } + + return table; + } + + private static void PointPrecomputeVar(ref PointProjective p, PointProjective[] points, int count) + { + Debug.Assert(count > 0); + + Init(out PointProjective d); + PointCopy(ref p, ref d); + PointDouble(ref d); + + Init(out points[0]); + PointCopy(ref p, ref points[0]); + for (int i = 1; i < count; ++i) + { + Init(out points[i]); + PointCopy(ref points[i - 1], ref points[i]); + PointAdd(ref d, ref points[i]); + } + } + + private static void PointSetNeutral(ref PointProjective p) + { + F.Zero(p.x); + F.One(p.y); + F.One(p.z); + } + + public static void Precompute() + { + lock (PrecompLock) + { + if (PrecompBaseWnaf != null && PrecompBaseComb != null) + return; + + Debug.Assert(PrecompRange > 448); + Debug.Assert(PrecompRange < 480); + + int wnafPoints = 1 << (WnafWidthBase - 2); + int combPoints = PrecompBlocks * PrecompPoints; + int totalPoints = wnafPoints + combPoints; + + PointProjective[] points = new PointProjective[totalPoints]; + + Init(out PointProjective p); + F.Copy(B_x, 0, p.x, 0); + F.Copy(B_y, 0, p.y, 0); + F.One(p.z); + + PointPrecomputeVar(ref p, points, wnafPoints); + + int pointsIndex = wnafPoints; + PointProjective[] toothPowers = new PointProjective[PrecompTeeth]; + for (int tooth = 0; tooth < PrecompTeeth; ++tooth) + { + Init(out toothPowers[tooth]); + } + for (int block = 0; block < PrecompBlocks; ++block) + { + ref PointProjective sum = ref points[pointsIndex++]; + Init(out sum); + + for (int tooth = 0; tooth < PrecompTeeth; ++tooth) + { + if (tooth == 0) + { + PointCopy(ref p, ref sum); + } + else + { + PointAdd(ref p, ref sum); + } + + PointDouble(ref p); + PointCopy(ref p, ref toothPowers[tooth]); + + if (block + tooth != PrecompBlocks + PrecompTeeth - 2) + { + for (int spacing = 1; spacing < PrecompSpacing; ++spacing) + { + PointDouble(ref p); + } + } + } + + F.Negate(sum.x, sum.x); + + for (int tooth = 0; tooth < (PrecompTeeth - 1); ++tooth) + { + int size = 1 << tooth; + for (int j = 0; j < size; ++j, ++pointsIndex) + { + Init(out points[pointsIndex]); + PointCopy(ref points[pointsIndex - size], ref points[pointsIndex]); + PointAdd(ref toothPowers[tooth], ref points[pointsIndex]); + } + } + } + Debug.Assert(pointsIndex == totalPoints); + + InvertZs(points); + + PrecompBaseWnaf = new PointAffine[wnafPoints]; + for (int i = 0; i < wnafPoints; ++i) + { + ref PointProjective q = ref points[i]; + ref PointAffine r = ref PrecompBaseWnaf[i]; + Init(out r); + + F.Mul(q.x, q.z, r.x); F.Normalize(r.x); + F.Mul(q.y, q.z, r.y); F.Normalize(r.y); + } + + PrecompBaseComb = F.CreateTable(combPoints * 2); + int off = 0; + for (int i = wnafPoints; i < totalPoints; ++i) + { + ref PointProjective q = ref points[i]; + + F.Mul(q.x, q.z, q.x); F.Normalize(q.x); + F.Mul(q.y, q.z, q.y); F.Normalize(q.y); + + F.Copy(q.x, 0, PrecompBaseComb, off); off += F.Size; + F.Copy(q.y, 0, PrecompBaseComb, off); off += F.Size; + } + Debug.Assert(off == PrecompBaseComb.Length); + } + } + + private static void PruneScalar(byte[] n, int nOff, byte[] r) + { + Array.Copy(n, nOff, r, 0, ScalarBytes - 1); + + r[0] &= 0xFC; + r[ScalarBytes - 2] |= 0x80; + r[ScalarBytes - 1] = 0x00; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void PruneScalar(ReadOnlySpan n, Span r) + { + n[..(ScalarBytes - 1)].CopyTo(r); + + r[0] &= 0xFC; + r[ScalarBytes - 2] |= 0x80; + r[ScalarBytes - 1] = 0x00; + } +#endif + + private static byte[] ReduceScalar(byte[] n) + { + ulong x00 = Decode32(n, 0); // x00:32/-- + ulong x01 = (Decode24(n, 4) << 4); // x01:28/-- + ulong x02 = Decode32(n, 7); // x02:32/-- + ulong x03 = (Decode24(n, 11) << 4); // x03:28/-- + ulong x04 = Decode32(n, 14); // x04:32/-- + ulong x05 = (Decode24(n, 18) << 4); // x05:28/-- + ulong x06 = Decode32(n, 21); // x06:32/-- + ulong x07 = (Decode24(n, 25) << 4); // x07:28/-- + ulong x08 = Decode32(n, 28); // x08:32/-- + ulong x09 = (Decode24(n, 32) << 4); // x09:28/-- + ulong x10 = Decode32(n, 35); // x10:32/-- + ulong x11 = (Decode24(n, 39) << 4); // x11:28/-- + ulong x12 = Decode32(n, 42); // x12:32/-- + ulong x13 = (Decode24(n, 46) << 4); // x13:28/-- + ulong x14 = Decode32(n, 49); // x14:32/-- + ulong x15 = (Decode24(n, 53) << 4); // x15:28/-- + ulong x16 = Decode32(n, 56); // x16:32/-- + ulong x17 = (Decode24(n, 60) << 4); // x17:28/-- + ulong x18 = Decode32(n, 63); // x18:32/-- + ulong x19 = (Decode24(n, 67) << 4); // x19:28/-- + ulong x20 = Decode32(n, 70); // x20:32/-- + ulong x21 = (Decode24(n, 74) << 4); // x21:28/-- + ulong x22 = Decode32(n, 77); // x22:32/-- + ulong x23 = (Decode24(n, 81) << 4); // x23:28/-- + ulong x24 = Decode32(n, 84); // x24:32/-- + ulong x25 = (Decode24(n, 88) << 4); // x25:28/-- + ulong x26 = Decode32(n, 91); // x26:32/-- + ulong x27 = (Decode24(n, 95) << 4); // x27:28/-- + ulong x28 = Decode32(n, 98); // x28:32/-- + ulong x29 = (Decode24(n, 102) << 4); // x29:28/-- + ulong x30 = Decode32(n, 105); // x30:32/-- + ulong x31 = (Decode24(n, 109) << 4); // x31:28/-- + ulong x32 = Decode16(n, 112); // x32:16/-- + + // x32 += (x31 >> 28); x31 &= M28UL; + x16 += x32 * L4_0; // x16:42/-- + x17 += x32 * L4_1; // x17:41/28 + x18 += x32 * L4_2; // x18:43/42 + x19 += x32 * L4_3; // x19:44/28 + x20 += x32 * L4_4; // x20:43/-- + x21 += x32 * L4_5; // x21:44/28 + x22 += x32 * L4_6; // x22:43/41 + x23 += x32 * L4_7; // x23:45/41 + + x31 += (x30 >> 28); x30 &= M28UL; // x31:28/--, x30:28/-- + x15 += x31 * L4_0; // x15:54/-- + x16 += x31 * L4_1; // x16:53/42 + x17 += x31 * L4_2; // x17:55/54 + x18 += x31 * L4_3; // x18:56/44 + x19 += x31 * L4_4; // x19:55/-- + x20 += x31 * L4_5; // x20:56/43 + x21 += x31 * L4_6; // x21:55/53 + x22 += x31 * L4_7; // x22:57/53 + + //x30 += (x29 >> 28); x29 &= M28UL; + x14 += x30 * L4_0; // x14:54/-- + x15 += x30 * L4_1; // x15:54/53 + x16 += x30 * L4_2; // x16:56/-- + x17 += x30 * L4_3; // x17:57/-- + x18 += x30 * L4_4; // x18:56/55 + x19 += x30 * L4_5; // x19:56/55 + x20 += x30 * L4_6; // x20:57/-- + x21 += x30 * L4_7; // x21:57/56 + + x29 += (x28 >> 28); x28 &= M28UL; // x29:28/--, x28:28/-- + x13 += x29 * L4_0; // x13:54/-- + x14 += x29 * L4_1; // x14:54/53 + x15 += x29 * L4_2; // x15:56/-- + x16 += x29 * L4_3; // x16:57/-- + x17 += x29 * L4_4; // x17:57/55 + x18 += x29 * L4_5; // x18:57/55 + x19 += x29 * L4_6; // x19:57/52 + x20 += x29 * L4_7; // x20:58/52 + + //x28 += (x27 >> 28); x27 &= M28UL; + x12 += x28 * L4_0; // x12:54/-- + x13 += x28 * L4_1; // x13:54/53 + x14 += x28 * L4_2; // x14:56/-- + x15 += x28 * L4_3; // x15:57/-- + x16 += x28 * L4_4; // x16:57/55 + x17 += x28 * L4_5; // x17:58/-- + x18 += x28 * L4_6; // x18:58/-- + x19 += x28 * L4_7; // x19:58/53 + + x27 += (x26 >> 28); x26 &= M28UL; // x27:28/--, x26:28/-- + x11 += x27 * L4_0; // x11:54/-- + x12 += x27 * L4_1; // x12:54/53 + x13 += x27 * L4_2; // x13:56/-- + x14 += x27 * L4_3; // x14:57/-- + x15 += x27 * L4_4; // x15:57/55 + x16 += x27 * L4_5; // x16:58/-- + x17 += x27 * L4_6; // x17:58/56 + x18 += x27 * L4_7; // x18:59/-- + + //x26 += (x25 >> 28); x25 &= M28UL; + x10 += x26 * L4_0; // x10:54/-- + x11 += x26 * L4_1; // x11:54/53 + x12 += x26 * L4_2; // x12:56/-- + x13 += x26 * L4_3; // x13:57/-- + x14 += x26 * L4_4; // x14:57/55 + x15 += x26 * L4_5; // x15:58/-- + x16 += x26 * L4_6; // x16:58/56 + x17 += x26 * L4_7; // x17:59/-- + + x25 += (x24 >> 28); x24 &= M28UL; // x25:28/--, x24:28/-- + x09 += x25 * L4_0; // x09:54/-- + x10 += x25 * L4_1; // x10:54/53 + x11 += x25 * L4_2; // x11:56/-- + x12 += x25 * L4_3; // x12:57/-- + x13 += x25 * L4_4; // x13:57/55 + x14 += x25 * L4_5; // x14:58/-- + x15 += x25 * L4_6; // x15:58/56 + x16 += x25 * L4_7; // x16:59/-- + + x21 += (x20 >> 28); x20 &= M28UL; // x21:58/--, x20:28/-- + x22 += (x21 >> 28); x21 &= M28UL; // x22:57/54, x21:28/-- + x23 += (x22 >> 28); x22 &= M28UL; // x23:45/42, x22:28/-- + x24 += (x23 >> 28); x23 &= M28UL; // x24:28/18, x23:28/-- + + x08 += x24 * L4_0; // x08:54/-- + x09 += x24 * L4_1; // x09:55/-- + x10 += x24 * L4_2; // x10:56/46 + x11 += x24 * L4_3; // x11:57/46 + x12 += x24 * L4_4; // x12:57/55 + x13 += x24 * L4_5; // x13:58/-- + x14 += x24 * L4_6; // x14:58/56 + x15 += x24 * L4_7; // x15:59/-- + + x07 += x23 * L4_0; // x07:54/-- + x08 += x23 * L4_1; // x08:54/53 + x09 += x23 * L4_2; // x09:56/53 + x10 += x23 * L4_3; // x10:57/46 + x11 += x23 * L4_4; // x11:57/55 + x12 += x23 * L4_5; // x12:58/-- + x13 += x23 * L4_6; // x13:58/56 + x14 += x23 * L4_7; // x14:59/-- + + x06 += x22 * L4_0; // x06:54/-- + x07 += x22 * L4_1; // x07:54/53 + x08 += x22 * L4_2; // x08:56/-- + x09 += x22 * L4_3; // x09:57/53 + x10 += x22 * L4_4; // x10:57/55 + x11 += x22 * L4_5; // x11:58/-- + x12 += x22 * L4_6; // x12:58/56 + x13 += x22 * L4_7; // x13:59/-- + + x18 += (x17 >> 28); x17 &= M28UL; // x18:59/31, x17:28/-- + x19 += (x18 >> 28); x18 &= M28UL; // x19:58/54, x18:28/-- + x20 += (x19 >> 28); x19 &= M28UL; // x20:30/29, x19:28/-- + x21 += (x20 >> 28); x20 &= M28UL; // x21:28/03, x20:28/-- + + x05 += x21 * L4_0; // x05:54/-- + x06 += x21 * L4_1; // x06:55/-- + x07 += x21 * L4_2; // x07:56/31 + x08 += x21 * L4_3; // x08:57/31 + x09 += x21 * L4_4; // x09:57/56 + x10 += x21 * L4_5; // x10:58/-- + x11 += x21 * L4_6; // x11:58/56 + x12 += x21 * L4_7; // x12:59/-- + + x04 += x20 * L4_0; // x04:54/-- + x05 += x20 * L4_1; // x05:54/53 + x06 += x20 * L4_2; // x06:56/53 + x07 += x20 * L4_3; // x07:57/31 + x08 += x20 * L4_4; // x08:57/55 + x09 += x20 * L4_5; // x09:58/-- + x10 += x20 * L4_6; // x10:58/56 + x11 += x20 * L4_7; // x11:59/-- + + x03 += x19 * L4_0; // x03:54/-- + x04 += x19 * L4_1; // x04:54/53 + x05 += x19 * L4_2; // x05:56/-- + x06 += x19 * L4_3; // x06:57/53 + x07 += x19 * L4_4; // x07:57/55 + x08 += x19 * L4_5; // x08:58/-- + x09 += x19 * L4_6; // x09:58/56 + x10 += x19 * L4_7; // x10:59/-- + + x15 += (x14 >> 28); x14 &= M28UL; // x15:59/31, x14:28/-- + x16 += (x15 >> 28); x15 &= M28UL; // x16:59/32, x15:28/-- + x17 += (x16 >> 28); x16 &= M28UL; // x17:31/29, x16:28/-- + x18 += (x17 >> 28); x17 &= M28UL; // x18:28/04, x17:28/-- + + x02 += x18 * L4_0; // x02:54/-- + x03 += x18 * L4_1; // x03:55/-- + x04 += x18 * L4_2; // x04:56/32 + x05 += x18 * L4_3; // x05:57/32 + x06 += x18 * L4_4; // x06:57/56 + x07 += x18 * L4_5; // x07:58/-- + x08 += x18 * L4_6; // x08:58/56 + x09 += x18 * L4_7; // x09:59/-- + + x01 += x17 * L4_0; // x01:54/-- + x02 += x17 * L4_1; // x02:54/53 + x03 += x17 * L4_2; // x03:56/53 + x04 += x17 * L4_3; // x04:57/32 + x05 += x17 * L4_4; // x05:57/55 + x06 += x17 * L4_5; // x06:58/-- + x07 += x17 * L4_6; // x07:58/56 + x08 += x17 * L4_7; // x08:59/-- + + x16 *= 4; + x16 += (x15 >> 26); x15 &= M26UL; + x16 += 1; // x16:30/01 + + x00 += x16 * L_0; + x01 += x16 * L_1; + x02 += x16 * L_2; + x03 += x16 * L_3; + x04 += x16 * L_4; + x05 += x16 * L_5; + x06 += x16 * L_6; + x07 += x16 * L_7; + + x01 += (x00 >> 28); x00 &= M28UL; + x02 += (x01 >> 28); x01 &= M28UL; + x03 += (x02 >> 28); x02 &= M28UL; + x04 += (x03 >> 28); x03 &= M28UL; + x05 += (x04 >> 28); x04 &= M28UL; + x06 += (x05 >> 28); x05 &= M28UL; + x07 += (x06 >> 28); x06 &= M28UL; + x08 += (x07 >> 28); x07 &= M28UL; + x09 += (x08 >> 28); x08 &= M28UL; + x10 += (x09 >> 28); x09 &= M28UL; + x11 += (x10 >> 28); x10 &= M28UL; + x12 += (x11 >> 28); x11 &= M28UL; + x13 += (x12 >> 28); x12 &= M28UL; + x14 += (x13 >> 28); x13 &= M28UL; + x15 += (x14 >> 28); x14 &= M28UL; + x16 = (x15 >> 26); x15 &= M26UL; + + x16 -= 1; + + Debug.Assert(x16 == 0UL || x16 == ulong.MaxValue); + + x00 -= x16 & L_0; + x01 -= x16 & L_1; + x02 -= x16 & L_2; + x03 -= x16 & L_3; + x04 -= x16 & L_4; + x05 -= x16 & L_5; + x06 -= x16 & L_6; + x07 -= x16 & L_7; + + x01 += (ulong)((long)x00 >> 28); x00 &= M28UL; + x02 += (ulong)((long)x01 >> 28); x01 &= M28UL; + x03 += (ulong)((long)x02 >> 28); x02 &= M28UL; + x04 += (ulong)((long)x03 >> 28); x03 &= M28UL; + x05 += (ulong)((long)x04 >> 28); x04 &= M28UL; + x06 += (ulong)((long)x05 >> 28); x05 &= M28UL; + x07 += (ulong)((long)x06 >> 28); x06 &= M28UL; + x08 += (ulong)((long)x07 >> 28); x07 &= M28UL; + x09 += (ulong)((long)x08 >> 28); x08 &= M28UL; + x10 += (ulong)((long)x09 >> 28); x09 &= M28UL; + x11 += (ulong)((long)x10 >> 28); x10 &= M28UL; + x12 += (ulong)((long)x11 >> 28); x11 &= M28UL; + x13 += (ulong)((long)x12 >> 28); x12 &= M28UL; + x14 += (ulong)((long)x13 >> 28); x13 &= M28UL; + x15 += (ulong)((long)x14 >> 28); x14 &= M28UL; + + Debug.Assert(x15 >> 26 == 0UL); + + byte[] r = new byte[ScalarBytes]; + Encode56(x00 | (x01 << 28), r, 0); + Encode56(x02 | (x03 << 28), r, 7); + Encode56(x04 | (x05 << 28), r, 14); + Encode56(x06 | (x07 << 28), r, 21); + Encode56(x08 | (x09 << 28), r, 28); + Encode56(x10 | (x11 << 28), r, 35); + Encode56(x12 | (x13 << 28), r, 42); + Encode56(x14 | (x15 << 28), r, 49); + //r[ScalarBytes - 1] = 0; + return r; + } + + private static void ScalarMult(byte[] k, ref PointProjective p, ref PointProjective r) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMult(k.AsSpan(), ref p, ref r); +#else + uint[] n = new uint[ScalarUints]; + DecodeScalar(k, 0, n); + + // Recode the scalar into signed-digit form + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, c1); Debug.Assert(c2 == (1U << 31)); + + // NOTE: Bit 448 is implicitly set after the signed-digit recoding + } + + uint[] table = PointPrecompute(ref p, 8); + Init(out PointProjective q); + + // Replace first 4 doublings (2^4 * P) with 1 addition (P + 15 * P) + PointLookup15(table, ref r); + PointAdd(ref p, ref r); + + int w = 111; + for (;;) + { + PointLookup(n, w, table, ref q); + PointAdd(ref q, ref r); + + if (--w < 0) + break; + + for (int i = 0; i < 4; ++i) + { + PointDouble(ref r); + } + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMult(ReadOnlySpan k, ref PointProjective p, ref PointProjective r) + { + Span n = stackalloc uint[ScalarUints]; + DecodeScalar(k, n); + + // Recode the scalar into signed-digit form + { + uint c1 = Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); + uint c2 = Nat.ShiftDownBit(ScalarUints, n, c1); Debug.Assert(c2 == (1U << 31)); + + // NOTE: Bit 448 is implicitly set after the signed-digit recoding + } + + uint[] table = PointPrecompute(ref p, 8); + Init(out PointProjective q); + + // Replace first 4 doublings (2^4 * P) with 1 addition (P + 15 * P) + PointLookup15(table, ref r); + PointAdd(ref p, ref r); + + int w = 111; + for (;;) + { + PointLookup(n, w, table, ref q); + PointAdd(ref q, ref r); + + if (--w < 0) + break; + + for (int i = 0; i < 4; ++i) + { + PointDouble(ref r); + } + } + } +#endif + + private static void ScalarMultBase(byte[] k, ref PointProjective r) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBase(k.AsSpan(), ref r); +#else + // Equivalent (but much slower) + //Init(out PointProjective p); + //F.Copy(B_x, 0, p.x, 0); + //F.Copy(B_y, 0, p.y, 0); + //F.One(p.z); + //ScalarMult(k, ref p, ref r); + + Precompute(); + + uint[] n = new uint[ScalarUints + 1]; + DecodeScalar(k, 0, n); + + // Recode the scalar into signed-digit form + { + n[ScalarUints] = (1U << (PrecompRange - 448)) + + Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); + uint c = Nat.ShiftDownBit(n.Length, n, 0); + Debug.Assert(c == (1U << 31)); + } + + Init(out PointAffine p); + + PointSetNeutral(ref r); + + int cOff = PrecompSpacing - 1; + for (;;) + { + int tPos = cOff; + + for (int b = 0; b < PrecompBlocks; ++b) + { + uint w = 0; + for (int t = 0; t < PrecompTeeth; ++t) + { + uint tBit = n[tPos >> 5] >> (tPos & 0x1F); + w &= ~(1U << t); + w ^= (tBit << t); + tPos += PrecompSpacing; + } + + int sign = (int)(w >> (PrecompTeeth - 1)) & 1; + int abs = ((int)w ^ -sign) & PrecompMask; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < PrecompPoints); + + PointLookup(b, abs, ref p); + + F.CNegate(sign, p.x); + + PointAdd(ref p, ref r); + } + + if (--cOff < 0) + break; + + PointDouble(ref r); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMultBase(ReadOnlySpan k, ref PointProjective r) + { + // Equivalent (but much slower) + //Init(out PointProjective p); + //F.Copy(B_x, 0, p.x, 0); + //F.Copy(B_y, 0, p.y, 0); + //F.One(p.z); + //ScalarMult(k, ref p, ref r); + + Precompute(); + + Span n = stackalloc uint[ScalarUints + 1]; + DecodeScalar(k, n); + + // Recode the scalar into signed-digit form + { + n[ScalarUints] = (1U << (PrecompRange - 448)) + + Nat.CAdd(ScalarUints, ~(int)n[0] & 1, n, L, n); + uint c = Nat.ShiftDownBit(n.Length, n, 0); + Debug.Assert(c == (1U << 31)); + } + + Init(out PointAffine p); + + PointSetNeutral(ref r); + + int cOff = PrecompSpacing - 1; + for (;;) + { + int tPos = cOff; + + for (int b = 0; b < PrecompBlocks; ++b) + { + uint w = 0; + for (int t = 0; t < PrecompTeeth; ++t) + { + uint tBit = n[tPos >> 5] >> (tPos & 0x1F); + w &= ~(1U << t); + w ^= (tBit << t); + tPos += PrecompSpacing; + } + + int sign = (int)(w >> (PrecompTeeth - 1)) & 1; + int abs = ((int)w ^ -sign) & PrecompMask; + + Debug.Assert(sign == 0 || sign == 1); + Debug.Assert(0 <= abs && abs < PrecompPoints); + + PointLookup(b, abs, ref p); + + F.CNegate(sign, p.x); + + PointAdd(ref p, ref r); + } + + if (--cOff < 0) + break; + + PointDouble(ref r); + } + } +#endif + + private static void ScalarMultBaseEncoded(byte[] k, byte[] r, int rOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBaseEncoded(k.AsSpan(), r.AsSpan(rOff)); +#else + Init(out PointProjective p); + ScalarMultBase(k, ref p); + if (0 == EncodePoint(ref p, r, rOff)) + throw new InvalidOperationException(); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void ScalarMultBaseEncoded(ReadOnlySpan k, Span r) + { + Init(out PointProjective p); + ScalarMultBase(k, ref p); + if (0 == EncodePoint(ref p, r)) + throw new InvalidOperationException(); + } +#endif + + internal static void ScalarMultBaseXY(byte[] k, int kOff, uint[] x, uint[] y) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ScalarMultBaseXY(k.AsSpan(kOff), x.AsSpan(), y.AsSpan()); +#else + byte[] n = new byte[ScalarBytes]; + PruneScalar(k, kOff, n); + + Init(out PointProjective p); + ScalarMultBase(n, ref p); + + if (0 == CheckPoint(p.x, p.y, p.z)) + throw new InvalidOperationException(); + + F.Copy(p.x, 0, x, 0); + F.Copy(p.y, 0, y, 0); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void ScalarMultBaseXY(ReadOnlySpan k, Span x, Span y) + { + Span n = stackalloc byte[ScalarBytes]; + PruneScalar(k, n); + + Init(out PointProjective p); + ScalarMultBase(n, ref p); + + if (0 == CheckPoint(p.x, p.y, p.z)) + throw new InvalidOperationException(); + + F.Copy(p.x, x); + F.Copy(p.y, y); + } +#endif + + private static void ScalarMultOrderVar(ref PointProjective p, ref PointProjective r) + { + sbyte[] ws_p = GetWnafVar(L, WnafWidth); + + int count = 1 << (WnafWidth - 2); + PointProjective[] tp = new PointProjective[count]; + PointPrecomputeVar(ref p, tp, count); + + PointSetNeutral(ref r); + + for (int bit = 446;;) + { + int wp = ws_p[bit]; + if (wp != 0) + { + int sign = wp >> 31; + int index = (wp ^ sign) >> 1; + + PointAddVar(sign != 0, ref tp[index], ref r); + } + + if (--bit < 0) + break; + + PointDouble(ref r); + } + } + + private static void ScalarMultStrausVar(uint[] nb, uint[] np, ref PointProjective p, ref PointProjective r) + { + Precompute(); + + sbyte[] ws_b = GetWnafVar(nb, WnafWidthBase); + sbyte[] ws_p = GetWnafVar(np, WnafWidth); + + int count = 1 << (WnafWidth - 2); + PointProjective[] tp = new PointProjective[count]; + PointPrecomputeVar(ref p, tp, count); + + PointSetNeutral(ref r); + + for (int bit = 446;;) + { + int wb = ws_b[bit]; + if (wb != 0) + { + int sign = wb >> 31; + int index = (wb ^ sign) >> 1; + + PointAddVar(sign != 0, ref PrecompBaseWnaf[index], ref r); + } + + int wp = ws_p[bit]; + if (wp != 0) + { + int sign = wp >> 31; + int index = (wp ^ sign) >> 1; + + PointAddVar(sign != 0, ref tp[index], ref r); + } + + if (--bit < 0) + break; + + PointDouble(ref r); + } + } + + public static void Sign(byte[] sk, int skOff, byte[] ctx, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte phflag = 0x00; + + ImplSign(sk, skOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void Sign(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte[] m, int mOff, int mLen, byte[] sig, int sigOff) + { + byte phflag = 0x00; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, m, mOff, mLen, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] ctx, byte[] ph, int phOff, byte[] sig, int sigOff) + { + byte phflag = 0x01; + + ImplSign(sk, skOff, ctx, phflag, ph, phOff, PrehashSize, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, byte[] ph, int phOff, byte[] sig, int sigOff) + { + byte phflag = 0x01; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, ph, phOff, PrehashSize, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] ctx, IXof ph, byte[] sig, int sigOff) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.OutputFinal(m, 0, PrehashSize)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + ImplSign(sk, skOff, ctx, phflag, m, 0, m.Length, sig, sigOff); + } + + public static void SignPrehash(byte[] sk, int skOff, byte[] pk, int pkOff, byte[] ctx, IXof ph, byte[] sig, int sigOff) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.OutputFinal(m, 0, PrehashSize)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + ImplSign(sk, skOff, pk, pkOff, ctx, phflag, m, 0, m.Length, sig, sigOff); + } + + public static bool ValidatePublicKeyFull(byte[] pk, int pkOff) + { + Init(out PointProjective p); + if (!DecodePointVar(pk, pkOff, false, ref p)) + return false; + + F.Normalize(p.x); + F.Normalize(p.y); + F.Normalize(p.z); + + if (IsNeutralElementVar(p.x, p.y, p.z)) + return false; + + Init(out PointProjective r); + ScalarMultOrderVar(ref p, ref r); + + F.Normalize(r.x); + F.Normalize(r.y); + F.Normalize(r.z); + + return IsNeutralElementVar(r.x, r.y, r.z); + } + + public static bool ValidatePublicKeyPartial(byte[] pk, int pkOff) + { + Init(out PointProjective p); + return DecodePointVar(pk, pkOff, false, ref p); + } + + public static bool Verify(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte[] m, int mOff, int mLen) + { + byte phflag = 0x00; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, m, mOff, mLen); + } + + public static bool VerifyPrehash(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, byte[] ph, int phOff) + { + byte phflag = 0x01; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, ph, phOff, PrehashSize); + } + + public static bool VerifyPrehash(byte[] sig, int sigOff, byte[] pk, int pkOff, byte[] ctx, IXof ph) + { + byte[] m = new byte[PrehashSize]; + if (PrehashSize != ph.OutputFinal(m, 0, PrehashSize)) + throw new ArgumentException("ph"); + + byte phflag = 0x01; + + return ImplVerify(sig, sigOff, pk, pkOff, ctx, phflag, m, 0, m.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs.meta new file mode 100644 index 00000000..a353548e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 89836b95c3df4624c92b7f9ff7532869 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/ec/rfc8032/Ed448.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field.meta new file mode 100644 index 00000000..9cc08f0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 735ac69407e1d744ab3902dd4e8008d3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs new file mode 100644 index 00000000..7f97fa5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + public abstract class FiniteFields + { + internal static readonly IFiniteField GF_2 = new PrimeField(BigInteger.ValueOf(2)); + internal static readonly IFiniteField GF_3 = new PrimeField(BigInteger.ValueOf(3)); + + public static IPolynomialExtensionField GetBinaryExtensionField(int[] exponents) + { + if (exponents[0] != 0) + { + throw new ArgumentException("Irreducible polynomials in GF(2) must have constant term", "exponents"); + } + for (int i = 1; i < exponents.Length; ++i) + { + if (exponents[i] <= exponents[i - 1]) + { + throw new ArgumentException("Polynomial exponents must be monotonically increasing", "exponents"); + } + } + + return new GenericPolynomialExtensionField(GF_2, new GF2Polynomial(exponents)); + } + + // public static IPolynomialExtensionField GetTernaryExtensionField(Term[] terms) + // { + // return new GenericPolynomialExtensionField(GF_3, new GF3Polynomial(terms)); + // } + + public static IFiniteField GetPrimeField(BigInteger characteristic) + { + int bitLength = characteristic.BitLength; + if (characteristic.SignValue <= 0 || bitLength < 2) + { + throw new ArgumentException("Must be >= 2", "characteristic"); + } + + if (bitLength < 3) + { + switch (characteristic.IntValue) + { + case 2: + return GF_2; + case 3: + return GF_3; + } + } + + return new PrimeField(characteristic); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs.meta new file mode 100644 index 00000000..9dba5a98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d9cf255372aca244b0e0c814b6aa1a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/FiniteFields.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs new file mode 100644 index 00000000..ac408b63 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + internal class GF2Polynomial + : IPolynomial + { + protected readonly int[] exponents; + + internal GF2Polynomial(int[] exponents) + { + this.exponents = Arrays.Clone(exponents); + } + + public virtual int Degree + { + get { return exponents[exponents.Length - 1]; } + } + + public virtual int[] GetExponentsPresent() + { + return Arrays.Clone(exponents); + } + + public override bool Equals(object obj) + { + if (this == obj) + { + return true; + } + GF2Polynomial other = obj as GF2Polynomial; + if (null == other) + { + return false; + } + return Arrays.AreEqual(exponents, other.exponents); + } + + public override int GetHashCode() + { + return Arrays.GetHashCode(exponents); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs.meta new file mode 100644 index 00000000..924c30d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bc79bafac44ff7444a7bfa6ae1151239 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GF2Polynomial.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs new file mode 100644 index 00000000..d8202346 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + internal class GenericPolynomialExtensionField + : IPolynomialExtensionField + { + protected readonly IFiniteField subfield; + protected readonly IPolynomial minimalPolynomial; + + internal GenericPolynomialExtensionField(IFiniteField subfield, IPolynomial polynomial) + { + this.subfield = subfield; + this.minimalPolynomial = polynomial; + } + + public virtual BigInteger Characteristic + { + get { return subfield.Characteristic; } + } + + public virtual int Dimension + { + get { return subfield.Dimension * minimalPolynomial.Degree; } + } + + public virtual IFiniteField Subfield + { + get { return subfield; } + } + + public virtual int Degree + { + get { return minimalPolynomial.Degree; } + } + + public virtual IPolynomial MinimalPolynomial + { + get { return minimalPolynomial; } + } + + public override bool Equals(object obj) + { + if (this == obj) + { + return true; + } + GenericPolynomialExtensionField other = obj as GenericPolynomialExtensionField; + if (null == other) + { + return false; + } + return subfield.Equals(other.subfield) && minimalPolynomial.Equals(other.minimalPolynomial); + } + + public override int GetHashCode() + { + return subfield.GetHashCode() ^ Integers.RotateLeft(minimalPolynomial.GetHashCode(), 16); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs.meta new file mode 100644 index 00000000..dce05dbe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d54072e6e8de5f4c8ca10a77fa0db85 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/GenericPolynomialExtensionField.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs new file mode 100644 index 00000000..309f9d04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + public interface IExtensionField + : IFiniteField + { + IFiniteField Subfield { get; } + + int Degree { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs.meta new file mode 100644 index 00000000..716a20c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bb7c0110bd6f38f4680ca455c3e474d0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IExtensionField.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs new file mode 100644 index 00000000..134f6236 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + public interface IFiniteField + { + BigInteger Characteristic { get; } + + int Dimension { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs.meta new file mode 100644 index 00000000..69730e53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ca84db28bb202064485e5514dc24cc07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IFiniteField.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs new file mode 100644 index 00000000..57163f12 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + public interface IPolynomial + { + int Degree { get; } + + //BigInteger[] GetCoefficients(); + + int[] GetExponentsPresent(); + + //Term[] GetNonZeroTerms(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs.meta new file mode 100644 index 00000000..d6608b91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c0d3c2649daade84c9b2259b31e29b13 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomial.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs new file mode 100644 index 00000000..ed6d2912 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + public interface IPolynomialExtensionField + : IExtensionField + { + IPolynomial MinimalPolynomial { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs.meta new file mode 100644 index 00000000..d33c4daa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 59e9df0aff107cf45b99e681a5823847 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/IPolynomialExtensionField.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs new file mode 100644 index 00000000..013dfa81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Field +{ + internal class PrimeField + : IFiniteField + { + protected readonly BigInteger characteristic; + + internal PrimeField(BigInteger characteristic) + { + this.characteristic = characteristic; + } + + public virtual BigInteger Characteristic + { + get { return characteristic; } + } + + public virtual int Dimension + { + get { return 1; } + } + + public override bool Equals(object obj) + { + if (this == obj) + { + return true; + } + PrimeField other = obj as PrimeField; + if (null == other) + { + return false; + } + return characteristic.Equals(other.characteristic); + } + + public override int GetHashCode() + { + return characteristic.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs.meta new file mode 100644 index 00000000..c78a681a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4178adfb0014b2044a1565e0e7d752ba +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/field/PrimeField.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw.meta new file mode 100644 index 00000000..734d1d91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 320e7a2d5cde47345aaec7d7ded92998 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs new file mode 100644 index 00000000..3b24e576 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Diagnostics; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal static class Bits + { +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static uint BitPermuteStep(uint x, uint m, int s) + { + Debug.Assert((m & (m << s)) == 0U); + Debug.Assert((m << s) >> s == m); + + uint t = (x ^ (x >> s)) & m; + return t ^ (t << s) ^ x; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static ulong BitPermuteStep(ulong x, ulong m, int s) + { + Debug.Assert((m & (m << s)) == 0UL); + Debug.Assert((m << s) >> s == m); + + ulong t = (x ^ (x >> s)) & m; + return t ^ (t << s) ^ x; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static void BitPermuteStep2(ref uint hi, ref uint lo, uint m, int s) + { +#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP1_1_OR_GREATER || UNITY_2021_2_OR_NEWER + //Debug.Assert(!Unsafe.AreSame(ref hi, ref lo) || (m & (m << s)) == 0U); +#endif + Debug.Assert((m << s) >> s == m); + + uint t = ((lo >> s) ^ hi) & m; + lo ^= t << s; + hi ^= t; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static void BitPermuteStep2(ref ulong hi, ref ulong lo, ulong m, int s) + { +#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP1_1_OR_GREATER || UNITY_2021_2_OR_NEWER + //Debug.Assert(!Unsafe.AreSame(ref hi, ref lo) || (m & (m << s)) == 0UL); +#endif + Debug.Assert((m << s) >> s == m); + + ulong t = ((lo >> s) ^ hi) & m; + lo ^= t << s; + hi ^= t; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static uint BitPermuteStepSimple(uint x, uint m, int s) + { + Debug.Assert((m & (m << s)) == 0U); + Debug.Assert((m << s) >> s == m); + + return ((x & m) << s) | ((x >> s) & m); + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal static ulong BitPermuteStepSimple(ulong x, ulong m, int s) + { + Debug.Assert((m & (m << s)) == 0UL); + Debug.Assert((m << s) >> s == m); + + return ((x & m) << s) | ((x >> s) & m); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs.meta new file mode 100644 index 00000000..2ac91da9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a8a7eec4b1a25894d8af3ea89125bf2c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Bits.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs new file mode 100644 index 00000000..12fcef35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs @@ -0,0 +1,250 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.Intrinsics.X86; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Interleave + { + private const ulong M32 = 0x55555555UL; + private const ulong M64 = 0x5555555555555555UL; + private const ulong M64R = 0xAAAAAAAAAAAAAAAAUL; + + internal static uint Expand8to16(uint x) + { + x &= 0xFFU; + x = (x | (x << 4)) & 0x0F0FU; + x = (x | (x << 2)) & 0x3333U; + x = (x | (x << 1)) & 0x5555U; + return x; + } + + internal static uint Expand16to32(uint x) + { + x &= 0xFFFFU; + x = (x | (x << 8)) & 0x00FF00FFU; + x = (x | (x << 4)) & 0x0F0F0F0FU; + x = (x | (x << 2)) & 0x33333333U; + x = (x | (x << 1)) & 0x55555555U; + return x; + } + + internal static ulong Expand32to64(uint x) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.IsSupported) + { + return (ulong)Bmi2.ParallelBitDeposit(x >> 16, 0x55555555U) << 32 + | Bmi2.ParallelBitDeposit(x , 0x55555555U); + } +#endif + + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x0000FF00U, 8); + x = Bits.BitPermuteStep(x, 0x00F000F0U, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0CU, 2); + x = Bits.BitPermuteStep(x, 0x22222222U, 1); + + return ((x >> 1) & M32) << 32 | (x & M32); + } + + internal static void Expand64To128(ulong x, ulong[] z, int zOff) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + z[zOff ] = Bmi2.X64.ParallelBitDeposit(x , 0x5555555555555555UL); + z[zOff + 1] = Bmi2.X64.ParallelBitDeposit(x >> 32, 0x5555555555555555UL); + return; + } +#endif + + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x00000000FFFF0000UL, 16); + x = Bits.BitPermuteStep(x, 0x0000FF000000FF00UL, 8); + x = Bits.BitPermuteStep(x, 0x00F000F000F000F0UL, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0C0C0C0C0CUL, 2); + x = Bits.BitPermuteStep(x, 0x2222222222222222UL, 1); + + z[zOff ] = (x ) & M64; + z[zOff + 1] = (x >> 1) & M64; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void Expand64To128(ulong x, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + z[0] = Bmi2.X64.ParallelBitDeposit(x , 0x5555555555555555UL); + z[1] = Bmi2.X64.ParallelBitDeposit(x >> 32, 0x5555555555555555UL); + return; + } +#endif + + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x00000000FFFF0000UL, 16); + x = Bits.BitPermuteStep(x, 0x0000FF000000FF00UL, 8); + x = Bits.BitPermuteStep(x, 0x00F000F000F000F0UL, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0C0C0C0C0CUL, 2); + x = Bits.BitPermuteStep(x, 0x2222222222222222UL, 1); + + z[0] = (x ) & M64; + z[1] = (x >> 1) & M64; + } +#endif + + internal static void Expand64To128(ulong[] xs, int xsOff, int xsLen, ulong[] zs, int zsOff) + { + int xsPos = xsLen, zsPos = zsOff + (xsLen << 1); + while (--xsPos >= 0) + { + zsPos -= 2; + Expand64To128(xs[xsOff + xsPos], zs, zsPos); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void Expand64To128(ReadOnlySpan xs, Span zs) + { + int xsPos = xs.Length, zsPos = xs.Length << 1; + Debug.Assert(!zs[xsPos..zsPos].Overlaps(xs)); + while (--xsPos >= 0) + { + zsPos -= 2; + Expand64To128(xs[xsPos], zs[zsPos..]); + } + } +#endif + + internal static ulong Expand64To128Rev(ulong x, out ulong low) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + low = Bmi2.X64.ParallelBitDeposit(x >> 32, 0xAAAAAAAAAAAAAAAAUL); + return Bmi2.X64.ParallelBitDeposit(x , 0xAAAAAAAAAAAAAAAAUL); + } +#endif + + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x00000000FFFF0000UL, 16); + x = Bits.BitPermuteStep(x, 0x0000FF000000FF00UL, 8); + x = Bits.BitPermuteStep(x, 0x00F000F000F000F0UL, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0C0C0C0C0CUL, 2); + x = Bits.BitPermuteStep(x, 0x2222222222222222UL, 1); + + low = (x ) & M64R; + return (x << 1) & M64R; + } + + internal static uint Shuffle(uint x) + { + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x0000FF00U, 8); + x = Bits.BitPermuteStep(x, 0x00F000F0U, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0CU, 2); + x = Bits.BitPermuteStep(x, 0x22222222U, 1); + return x; + } + + internal static ulong Shuffle(ulong x) + { + // "shuffle" low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x00000000FFFF0000UL, 16); + x = Bits.BitPermuteStep(x, 0x0000FF000000FF00UL, 8); + x = Bits.BitPermuteStep(x, 0x00F000F000F000F0UL, 4); + x = Bits.BitPermuteStep(x, 0x0C0C0C0C0C0C0C0CUL, 2); + x = Bits.BitPermuteStep(x, 0x2222222222222222UL, 1); + return x; + } + + internal static uint Shuffle2(uint x) + { + // "shuffle" (twice) low half to even bits and high half to odd bits + x = Bits.BitPermuteStep(x, 0x00AA00AAU, 7); + x = Bits.BitPermuteStep(x, 0x0000CCCCU, 14); + x = Bits.BitPermuteStep(x, 0x00F000F0U, 4); + x = Bits.BitPermuteStep(x, 0x0000FF00U, 8); + return x; + } + + internal static uint Unshuffle(uint x) + { + // "unshuffle" even bits to low half and odd bits to high half + x = Bits.BitPermuteStep(x, 0x22222222U, 1); + x = Bits.BitPermuteStep(x, 0x0C0C0C0CU, 2); + x = Bits.BitPermuteStep(x, 0x00F000F0U, 4); + x = Bits.BitPermuteStep(x, 0x0000FF00U, 8); + return x; + } + + internal static ulong Unshuffle(ulong x) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + return Bmi2.X64.ParallelBitExtract(x, 0xAAAAAAAAAAAAAAAAUL) << 32 + | Bmi2.X64.ParallelBitExtract(x, 0x5555555555555555UL); + } +#endif + + // "unshuffle" even bits to low half and odd bits to high half + x = Bits.BitPermuteStep(x, 0x2222222222222222UL, 1); + x = Bits.BitPermuteStep(x, 0x0C0C0C0C0C0C0C0CUL, 2); + x = Bits.BitPermuteStep(x, 0x00F000F000F000F0UL, 4); + x = Bits.BitPermuteStep(x, 0x0000FF000000FF00UL, 8); + x = Bits.BitPermuteStep(x, 0x00000000FFFF0000UL, 16); + return x; + } + + internal static ulong Unshuffle(ulong x, out ulong even) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + even = Bmi2.X64.ParallelBitExtract(x, 0x5555555555555555UL); + return Bmi2.X64.ParallelBitExtract(x, 0xAAAAAAAAAAAAAAAAUL); + } +#endif + + ulong u0 = Unshuffle(x); + even = u0 & 0x00000000FFFFFFFFUL; + return u0 >> 32; + } + + internal static ulong Unshuffle(ulong x0, ulong x1, out ulong even) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi2.X64.IsSupported) + { + even = Bmi2.X64.ParallelBitExtract(x0, 0x5555555555555555UL) + | Bmi2.X64.ParallelBitExtract(x1, 0x5555555555555555UL) << 32; + return Bmi2.X64.ParallelBitExtract(x0, 0xAAAAAAAAAAAAAAAAUL) + | Bmi2.X64.ParallelBitExtract(x1, 0xAAAAAAAAAAAAAAAAUL) << 32; + } +#endif + + ulong u0 = Unshuffle(x0); + ulong u1 = Unshuffle(x1); + even = (u1 << 32) | (u0 & 0x00000000FFFFFFFFUL); + return (u0 >> 32) | (u1 & 0xFFFFFFFF00000000UL); + } + + internal static uint Unshuffle2(uint x) + { + // "unshuffle" (twice) even bits to low half and odd bits to high half + x = Bits.BitPermuteStep(x, 0x0000FF00U, 8); + x = Bits.BitPermuteStep(x, 0x00F000F0U, 4); + x = Bits.BitPermuteStep(x, 0x0000CCCCU, 14); + x = Bits.BitPermuteStep(x, 0x00AA00AAU, 7); + return x; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs.meta new file mode 100644 index 00000000..91f4a42d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1f203782a670ead4199841bd483d52f6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Interleave.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs new file mode 100644 index 00000000..e52840c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs @@ -0,0 +1,914 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + /* + * Modular inversion as implemented in this class is based on the paper "Fast constant-time gcd + * computation and modular inversion" by Daniel J. Bernstein and Bo-Yin Yang. + */ + + internal static class Mod + { + private const int M30 = 0x3FFFFFFF; + private const ulong M32UL = 0xFFFFFFFFUL; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CheckedModOddInverse(ReadOnlySpan m, ReadOnlySpan x, Span z) +#else + public static void CheckedModOddInverse(uint[] m, uint[] x, uint[] z) +#endif + { + if (0 == ModOddInverse(m, x, z)) + throw new ArithmeticException("Inverse does not exist."); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CheckedModOddInverseVar(ReadOnlySpan m, ReadOnlySpan x, Span z) +#else + public static void CheckedModOddInverseVar(uint[] m, uint[] x, uint[] z) +#endif + { + if (!ModOddInverseVar(m, x, z)) + throw new ArithmeticException("Inverse does not exist."); + } + + public static uint Inverse32(uint d) + { + Debug.Assert((d & 1U) == 1U); + + //int x = d + (((d + 1) & 4) << 1); // d.x == 1 mod 2**4 + uint x = d; // d.x == 1 mod 2**3 + x *= 2 - d * x; // d.x == 1 mod 2**6 + x *= 2 - d * x; // d.x == 1 mod 2**12 + x *= 2 - d * x; // d.x == 1 mod 2**24 + x *= 2 - d * x; // d.x == 1 mod 2**48 + Debug.Assert(d * x == 1U); + return x; + } + + public static ulong Inverse64(ulong d) + { + Debug.Assert((d & 1UL) == 1UL); + + //ulong x = d + (((d + 1) & 4) << 1); // d.x == 1 mod 2**4 + ulong x = d; // d.x == 1 mod 2**3 + x *= 2 - d * x; // d.x == 1 mod 2**6 + x *= 2 - d * x; // d.x == 1 mod 2**12 + x *= 2 - d * x; // d.x == 1 mod 2**24 + x *= 2 - d * x; // d.x == 1 mod 2**48 + x *= 2 - d * x; // d.x == 1 mod 2**96 + Debug.Assert(d * x == 1UL); + return x; + } + + public static uint ModOddInverse(uint[] m, uint[] x, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ModOddInverse(m.AsSpan(), x.AsSpan(), z.AsSpan()); +#else + int len32 = m.Length; + Debug.Assert(len32 > 0); + Debug.Assert((m[0] & 1) != 0); + Debug.Assert(m[len32 - 1] != 0); + + int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]); + int len30 = (bits + 29) / 30; + + int[] t = new int[4]; + int[] D = new int[len30]; + int[] E = new int[len30]; + int[] F = new int[len30]; + int[] G = new int[len30]; + int[] M = new int[len30]; + + E[0] = 1; + Encode30(bits, x, 0, G, 0); + Encode30(bits, m, 0, M, 0); + Array.Copy(M, 0, F, 0, len30); + + int delta = 0; + int m0Inv32 = (int)Inverse32((uint)M[0]); + int maxDivsteps = GetMaximumDivsteps(bits); + + for (int divSteps = 0; divSteps < maxDivsteps; divSteps += 30) + { + delta = Divsteps30(delta, F[0], G[0], t); + UpdateDE30(len30, D, E, t, m0Inv32, M); + UpdateFG30(len30, F, G, t); + } + + int signF = F[len30 - 1] >> 31; + CNegate30(len30, signF, F); + + /* + * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it + * into the range (-M, M). Then normalize by conditionally negating (according to signF) + * and/or then adding M, to bring it into the range [0, M). + */ + CNormalize30(len30, signF, D, M); + + Decode30(bits, D, 0, z, 0); + Debug.Assert(0 != Nat.LessThan(m.Length, z, m)); + + return (uint)(EqualTo(len30, F, 1) & EqualToZero(len30, G)); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ModOddInverse(ReadOnlySpan m, ReadOnlySpan x, Span z) + { + int len32 = m.Length; + Debug.Assert(len32 > 0); + Debug.Assert((m[0] & 1) != 0); + Debug.Assert(m[len32 - 1] != 0); + + int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]); + int len30 = (bits + 29) / 30; + + Span alloc = len30 <= 50 + ? stackalloc int[len30 * 5] + : new int[len30 * 5]; + + Span t = stackalloc int[4]; + Span D = alloc[..len30]; alloc = alloc[len30..]; + Span E = alloc[..len30]; alloc = alloc[len30..]; + Span F = alloc[..len30]; alloc = alloc[len30..]; + Span G = alloc[..len30]; alloc = alloc[len30..]; + Span M = alloc[..len30]; + + E[0] = 1; + Encode30(bits, x, G); + Encode30(bits, m, M); + M.CopyTo(F); + + int delta = 0; + int m0Inv32 = (int)Inverse32((uint)M[0]); + int maxDivsteps = GetMaximumDivsteps(bits); + + for (int divSteps = 0; divSteps < maxDivsteps; divSteps += 30) + { + delta = Divsteps30(delta, F[0], G[0], t); + UpdateDE30(len30, D, E, t, m0Inv32, M); + UpdateFG30(len30, F, G, t); + } + + int signF = F[len30 - 1] >> 31; + CNegate30(len30, signF, F); + + /* + * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it + * into the range (-M, M). Then normalize by conditionally negating (according to signF) + * and/or then adding M, to bring it into the range [0, M). + */ + CNormalize30(len30, signF, D, M); + + Decode30(bits, D, z); + Debug.Assert(0 != Nat.LessThan(m.Length, z, m)); + + return (uint)(EqualTo(len30, F, 1) & EqualToZero(len30, G)); + } +#endif + + public static bool ModOddInverseVar(uint[] m, uint[] x, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ModOddInverseVar(m.AsSpan(), x.AsSpan(), z.AsSpan()); +#else + int len32 = m.Length; + Debug.Assert(len32 > 0); + Debug.Assert((m[0] & 1) != 0); + Debug.Assert(m[len32 - 1] != 0); + + int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]); + int len30 = (bits + 29) / 30; + + int[] t = new int[4]; + int[] D = new int[len30]; + int[] E = new int[len30]; + int[] F = new int[len30]; + int[] G = new int[len30]; + int[] M = new int[len30]; + + E[0] = 1; + Encode30(bits, x, 0, G, 0); + Encode30(bits, m, 0, M, 0); + Array.Copy(M, 0, F, 0, len30); + + int clzG = Integers.NumberOfLeadingZeros(G[len30 - 1] | 1) - (len30 * 30 + 2 - bits); + int eta = -1 - clzG; + int lenDE = len30, lenFG = len30; + int m0Inv32 = (int)Inverse32((uint)M[0]); + int maxDivsteps = GetMaximumDivsteps(bits); + + int divsteps = 0; + while (!IsZero(lenFG, G)) + { + if (divsteps >= maxDivsteps) + return false; + + divsteps += 30; + + eta = Divsteps30Var(eta, F[0], G[0], t); + UpdateDE30(lenDE, D, E, t, m0Inv32, M); + UpdateFG30(lenFG, F, G, t); + + int fn = F[lenFG - 1]; + int gn = G[lenFG - 1]; + + int cond = (lenFG - 2) >> 31; + cond |= fn ^ (fn >> 31); + cond |= gn ^ (gn >> 31); + + if (cond == 0) + { + F[lenFG - 2] |= fn << 30; + G[lenFG - 2] |= gn << 30; + --lenFG; + } + } + + int signF = F[lenFG - 1] >> 31; + + /* + * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it + * into the range (-M, M). Then normalize by conditionally negating (according to signF) + * and/or then adding M, to bring it into the range [0, M). + */ + int signD = D[lenDE - 1] >> 31; + if (signD < 0) + { + signD = Add30(lenDE, D, M); + } + if (signF < 0) + { + signD = Negate30(lenDE, D); + signF = Negate30(lenFG, F); + } + Debug.Assert(0 == signF); + + if (!IsOne(lenFG, F)) + return false; + + if (signD < 0) + { + signD = Add30(lenDE, D, M); + } + Debug.Assert(0 == signD); + + Decode30(bits, D, 0, z, 0); + Debug.Assert(!Nat.Gte(m.Length, z, m)); + + return true; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool ModOddInverseVar(ReadOnlySpan m, ReadOnlySpan x, Span z) + { + int len32 = m.Length; + Debug.Assert(len32 > 0); + Debug.Assert((m[0] & 1) != 0); + Debug.Assert(m[len32 - 1] != 0); + + int bits = (len32 << 5) - Integers.NumberOfLeadingZeros((int)m[len32 - 1]); + int len30 = (bits + 29) / 30; + + Span alloc = len30 <= 50 + ? stackalloc int[len30 * 5] + : new int[len30 * 5]; + + Span t = stackalloc int[4]; + Span D = alloc[..len30]; alloc = alloc[len30..]; + Span E = alloc[..len30]; alloc = alloc[len30..]; + Span F = alloc[..len30]; alloc = alloc[len30..]; + Span G = alloc[..len30]; alloc = alloc[len30..]; + Span M = alloc[..len30]; + + E[0] = 1; + Encode30(bits, x, G); + Encode30(bits, m, M); + M.CopyTo(F); + + int clzG = Integers.NumberOfLeadingZeros(G[len30 - 1] | 1) - (len30 * 30 + 2 - bits); + int eta = -1 - clzG; + int lenDE = len30, lenFG = len30; + int m0Inv32 = (int)Inverse32((uint)M[0]); + int maxDivsteps = GetMaximumDivsteps(bits); + + int divsteps = 0; + while (!IsZero(lenFG, G)) + { + if (divsteps >= maxDivsteps) + return false; + + divsteps += 30; + + eta = Divsteps30Var(eta, F[0], G[0], t); + UpdateDE30(lenDE, D, E, t, m0Inv32, M); + UpdateFG30(lenFG, F, G, t); + + int fn = F[lenFG - 1]; + int gn = G[lenFG - 1]; + + int cond = (lenFG - 2) >> 31; + cond |= fn ^ (fn >> 31); + cond |= gn ^ (gn >> 31); + + if (cond == 0) + { + F[lenFG - 2] |= fn << 30; + G[lenFG - 2] |= gn << 30; + --lenFG; + } + } + + int signF = F[lenFG - 1] >> 31; + + /* + * D is in the range (-2.M, M). First, conditionally add M if D is negative, to bring it + * into the range (-M, M). Then normalize by conditionally negating (according to signF) + * and/or then adding M, to bring it into the range [0, M). + */ + int signD = D[lenDE - 1] >> 31; + if (signD < 0) + { + signD = Add30(lenDE, D, M); + } + if (signF < 0) + { + signD = Negate30(lenDE, D); + signF = Negate30(lenFG, F); + } + Debug.Assert(0 == signF); + + if (!IsOne(lenFG, F)) + return false; + + if (signD < 0) + { + signD = Add30(lenDE, D, M); + } + Debug.Assert(0 == signD); + + Decode30(bits, D, z); + Debug.Assert(!Nat.Gte(m.Length, z, m)); + + return true; + } +#endif + + public static uint[] Random(SecureRandom random, uint[] p) + { + int len = p.Length; + uint[] s = Nat.Create(len); + + uint m = p[len - 1]; + m |= m >> 1; + m |= m >> 2; + m |= m >> 4; + m |= m >> 8; + m |= m >> 16; + + byte[] bytes = new byte[len << 2]; + do + { + random.NextBytes(bytes); + Pack.BE_To_UInt32(bytes, 0, s); + s[len - 1] &= m; + } + while (Nat.Gte(len, s, p)); + + return s; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Random(SecureRandom random, ReadOnlySpan p, Span z) + { + int len = p.Length; + if (z.Length < len) + throw new ArgumentException("insufficient space", nameof(z)); + + var s = z[..len]; + + uint m = p[len - 1]; + m |= m >> 1; + m |= m >> 2; + m |= m >> 4; + m |= m >> 8; + m |= m >> 16; + + Span bytes = len <= 256 + ? stackalloc byte[len << 2] + : new byte[len << 2]; + + do + { + random.NextBytes(bytes); + Pack.BE_To_UInt32(bytes, s); + s[len - 1] &= m; + } + while (Nat.Gte(len, s, p)); + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Add30(int len30, Span D, ReadOnlySpan M) +#else + private static int Add30(int len30, int[] D, int[] M) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(D.Length >= len30); + Debug.Assert(M.Length >= len30); + + int c = 0, last = len30 - 1; + for (int i = 0; i < last; ++i) + { + c += D[i] + M[i]; + D[i] = c & M30; c >>= 30; + } + c += D[last] + M[last]; + D[last] = c; c >>= 30; + return c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void CNegate30(int len30, int cond, Span D) +#else + private static void CNegate30(int len30, int cond, int[] D) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(D.Length >= len30); + + int c = 0, last = len30 - 1; + for (int i = 0; i < last; ++i) + { + c += (D[i] ^ cond) - cond; + D[i] = c & M30; c >>= 30; + } + c += (D[last] ^ cond) - cond; + D[last] = c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void CNormalize30(int len30, int condNegate, Span D, ReadOnlySpan M) +#else + private static void CNormalize30(int len30, int condNegate, int[] D, int[] M) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(D.Length >= len30); + Debug.Assert(M.Length >= len30); + + int last = len30 - 1; + + { + int c = 0, condAdd = D[last] >> 31; + for (int i = 0; i < last; ++i) + { + int di = D[i] + (M[i] & condAdd); + di = (di ^ condNegate) - condNegate; + c += di; D[i] = c & M30; c >>= 30; + } + { + int di = D[last] + (M[last] & condAdd); + di = (di ^ condNegate) - condNegate; + c += di; D[last] = c; + } + } + + { + int c = 0, condAdd = D[last] >> 31; + for (int i = 0; i < last; ++i) + { + int di = D[i] + (M[i] & condAdd); + c += di; D[i] = c & M30; c >>= 30; + } + { + int di = D[last] + (M[last] & condAdd); + c += di; D[last] = c; + } + Debug.Assert(c >> 30 == 0); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Decode30(int bits, ReadOnlySpan x, Span z) + { + Debug.Assert(bits > 0); + + int avail = 0; + ulong data = 0L; + + int xOff = 0, zOff = 0; + while (bits > 0) + { + while (avail < System.Math.Min(32, bits)) + { + data |= (ulong)x[xOff++] << avail; + avail += 30; + } + + z[zOff++] = (uint)data; data >>= 32; + avail -= 32; + bits -= 32; + } + } +#else + private static void Decode30(int bits, int[] x, int xOff, uint[] z, int zOff) + { + Debug.Assert(bits > 0); + + int avail = 0; + ulong data = 0L; + + while (bits > 0) + { + while (avail < System.Math.Min(32, bits)) + { + data |= (ulong)x[xOff++] << avail; + avail += 30; + } + + z[zOff++] = (uint)data; data >>= 32; + avail -= 32; + bits -= 32; + } + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Divsteps30(int delta, int f0, int g0, Span t) +#else + private static int Divsteps30(int delta, int f0, int g0, int[] t) +#endif + { + int u = 1 << 30, v = 0, q = 0, r = 1 << 30; + int f = f0, g = g0; + + for (int i = 0; i < 30; ++i) + { + Debug.Assert((f & 1) == 1); + Debug.Assert(((u >> (30 - i)) * f0 + (v >> (30 - i)) * g0) == f << i); + Debug.Assert(((q >> (30 - i)) * f0 + (r >> (30 - i)) * g0) == g << i); + + int c1 = delta >> 31; + int c2 = -(g & 1); + + int x = f ^ c1; + int y = u ^ c1; + int z = v ^ c1; + + g -= x & c2; + q -= y & c2; + r -= z & c2; + + c2 &= ~c1; + delta = (delta ^ c2) - (c2 - 1); + + f += g & c2; + u += q & c2; + v += r & c2; + + g >>= 1; + q >>= 1; + r >>= 1; + } + + t[0] = u; + t[1] = v; + t[2] = q; + t[3] = r; + + return delta; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Divsteps30Var(int eta, int f0, int g0, Span t) +#else + private static int Divsteps30Var(int eta, int f0, int g0, int[] t) +#endif + { + int u = 1, v = 0, q = 0, r = 1; + int f = f0, g = g0, m, w, x, y, z; + int i = 30, limit, zeros; + + for (; ; ) + { + // Use a sentinel bit to count zeros only up to i. + zeros = Integers.NumberOfTrailingZeros(g | (-1 << i)); + + g >>= zeros; + u <<= zeros; + v <<= zeros; + eta -= zeros; + i -= zeros; + + if (i <= 0) + break; + + Debug.Assert((f & 1) == 1); + Debug.Assert((g & 1) == 1); + Debug.Assert((u * f0 + v * g0) == f << (30 - i)); + Debug.Assert((q * f0 + r * g0) == g << (30 - i)); + + if (eta < 0) + { + eta = -eta; + x = f; f = g; g = -x; + y = u; u = q; q = -y; + z = v; v = r; r = -z; + + // Handle up to 6 divsteps at once, subject to eta and i. + limit = (eta + 1) > i ? i : (eta + 1); + m = (int)((uint.MaxValue >> (32 - limit)) & 63U); + + w = (f * g * (f * f - 2)) & m; + } + else + { + // Handle up to 4 divsteps at once, subject to eta and i. + limit = (eta + 1) > i ? i : (eta + 1); + m = (int)((uint.MaxValue >> (32 - limit)) & 15U); + + w = f + (((f + 1) & 4) << 1); + w = (-w * g) & m; + } + + g += f * w; + q += u * w; + r += v * w; + + Debug.Assert((g & m) == 0); + } + + t[0] = u; + t[1] = v; + t[2] = q; + t[3] = r; + + return eta; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void Encode30(int bits, ReadOnlySpan x, Span z) + { + Debug.Assert(bits > 0); + + int avail = 0; + ulong data = 0UL; + + int xOff = 0, zOff = 0; + while (bits > 0) + { + if (avail < System.Math.Min(30, bits)) + { + data |= (x[xOff++] & M32UL) << avail; + avail += 32; + } + + z[zOff++] = (int)data & M30; data >>= 30; + avail -= 30; + bits -= 30; + } + } +#else + private static void Encode30(int bits, uint[] x, int xOff, int[] z, int zOff) + { + Debug.Assert(bits > 0); + + int avail = 0; + ulong data = 0UL; + + while (bits > 0) + { + if (avail < System.Math.Min(30, bits)) + { + data |= (x[xOff++] & M32UL) << avail; + avail += 32; + } + + z[zOff++] = (int)data & M30; data >>= 30; + avail -= 30; + bits -= 30; + } + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int EqualTo(int len, ReadOnlySpan x, int y) +#else + private static int EqualTo(int len, int[] x, int y) +#endif + { + int d = x[0] ^ y; + for (int i = 1; i < len; ++i) + { + d |= x[i]; + } + d = (int)((uint)d >> 1) | (d & 1); + return (d - 1) >> 31; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int EqualToZero(int len, ReadOnlySpan x) +#else + private static int EqualToZero(int len, int[] x) +#endif + { + int d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[i]; + } + d = (int)((uint)d >> 1) | (d & 1); + return (d - 1) >> 31; + } + + private static int GetMaximumDivsteps(int bits) + { + return (49 * bits + (bits < 46 ? 80 : 47)) / 17; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static bool IsOne(int len, ReadOnlySpan x) +#else + private static bool IsOne(int len, int[] x) +#endif + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static bool IsZero(int len, ReadOnlySpan x) +#else + private static bool IsZero(int len, int[] x) +#endif + { + if (x[0] != 0) + { + return false; + } + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static int Negate30(int len30, Span D) +#else + private static int Negate30(int len30, int[] D) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(D.Length >= len30); + + int c = 0, last = len30 - 1; + for (int i = 0; i < last; ++i) + { + c -= D[i]; + D[i] = c & M30; c >>= 30; + } + c -= D[last]; + D[last] = c; c >>= 30; + return c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void UpdateDE30(int len30, Span D, Span E, ReadOnlySpan t, int m0Inv32, + ReadOnlySpan M) +#else + private static void UpdateDE30(int len30, int[] D, int[] E, int[] t, int m0Inv32, int[] M) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(D.Length >= len30); + Debug.Assert(E.Length >= len30); + Debug.Assert(M.Length >= len30); + Debug.Assert(m0Inv32 * M[0] == 1); + + int u = t[0], v = t[1], q = t[2], r = t[3]; + int di, ei, i, md, me, mi, sd, se; + long cd, ce; + + /* + * We accept D (E) in the range (-2.M, M) and conceptually add the modulus to the input + * value if it is initially negative. Instead of adding it explicitly, we add u and/or v (q + * and/or r) to md (me). + */ + sd = D[len30 - 1] >> 31; + se = E[len30 - 1] >> 31; + + md = (u & sd) + (v & se); + me = (q & sd) + (r & se); + + mi = M[0]; + di = D[0]; + ei = E[0]; + + cd = (long)u * di + (long)v * ei; + ce = (long)q * di + (long)r * ei; + + /* + * Subtract from md/me an extra term in the range [0, 2^30) such that the low 30 bits of the + * intermediate D/E values will be 0, allowing clean division by 2^30. The final D/E are + * thus in the range (-2.M, M), consistent with the input constraint. + */ + md -= (m0Inv32 * (int)cd + md) & M30; + me -= (m0Inv32 * (int)ce + me) & M30; + + cd += (long)mi * md; + ce += (long)mi * me; + + Debug.Assert(((int)cd & M30) == 0); + Debug.Assert(((int)ce & M30) == 0); + + cd >>= 30; + ce >>= 30; + + for (i = 1; i < len30; ++i) + { + mi = M[i]; + di = D[i]; + ei = E[i]; + + cd += (long)u * di + (long)v * ei + (long)mi * md; + ce += (long)q * di + (long)r * ei + (long)mi * me; + + D[i - 1] = (int)cd & M30; cd >>= 30; + E[i - 1] = (int)ce & M30; ce >>= 30; + } + + D[len30 - 1] = (int)cd; + E[len30 - 1] = (int)ce; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private static void UpdateFG30(int len30, Span F, Span G, ReadOnlySpan t) +#else + private static void UpdateFG30(int len30, int[] F, int[] G, int[] t) +#endif + { + Debug.Assert(len30 > 0); + Debug.Assert(F.Length >= len30); + Debug.Assert(G.Length >= len30); + + int u = t[0], v = t[1], q = t[2], r = t[3]; + int fi, gi, i; + long cf, cg; + + fi = F[0]; + gi = G[0]; + + cf = (long)u * fi + (long)v * gi; + cg = (long)q * fi + (long)r * gi; + + Debug.Assert(((int)cf & M30) == 0); + Debug.Assert(((int)cg & M30) == 0); + + cf >>= 30; + cg >>= 30; + + for (i = 1; i < len30; ++i) + { + fi = F[i]; + gi = G[i]; + + cf += (long)u * fi + (long)v * gi; + cg += (long)q * fi + (long)r * gi; + + F[i - 1] = (int)cf & M30; cf >>= 30; + G[i - 1] = (int)cg & M30; cg >>= 30; + } + + F[len30 - 1] = (int)cf; + G[len30 - 1] = (int)cg; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs.meta new file mode 100644 index 00000000..8ace6594 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f21140cfe49f0b44ba52cdfa2ca5bdca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Mod.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs new file mode 100644 index 00000000..614448be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs @@ -0,0 +1,2905 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(int len, uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Add(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static uint Add33At(int len, uint x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = (ulong)z[zPos + 0] + x; + z[zPos + 0] = (uint)c; + c >>= 32; + c += (ulong)z[zPos + 1] + 1; + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 2); + } + + public static uint Add33At(int len, uint x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = (ulong)z[zOff + zPos] + x; + z[zOff + zPos] = (uint)c; + c >>= 32; + c += (ulong)z[zOff + zPos + 1] + 1; + z[zOff + zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, zPos + 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Add33At(int len, uint x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = (ulong)z[zPos + 0] + x; + z[zPos + 0] = (uint)c; + c >>= 32; + c += (ulong)z[zPos + 1] + 1; + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 2); + } +#endif + + public static uint Add33To(int len, uint x, uint[] z) + { + ulong c = (ulong)z[0] + x; + z[0] = (uint)c; + c >>= 32; + c += (ulong)z[1] + 1; + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 2); + } + + public static uint Add33To(int len, uint x, uint[] z, int zOff) + { + ulong c = (ulong)z[zOff + 0] + x; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)z[zOff + 1] + 1; + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Add33To(int len, uint x, Span z) + { + ulong c = (ulong)z[0] + x; + z[0] = (uint)c; + c >>= 32; + c += (ulong)z[1] + 1; + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 2); + } +#endif + + public static uint AddBothTo(int len, uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + y[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + + public static uint AddBothTo(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[xOff + i] + y[yOff + i] + z[zOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddBothTo(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + y[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static uint AddDWordAt(int len, ulong x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = z[zPos + 0] + (x & M); + z[zPos + 0] = (uint)c; + c >>= 32; + c += z[zPos + 1] + (x >> 32); + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 2); + } + + public static uint AddDWordAt(int len, ulong x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = z[zOff + zPos] + (x & M); + z[zOff + zPos] = (uint)c; + c >>= 32; + c += z[zOff + zPos + 1] + (x >> 32); + z[zOff + zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, zPos + 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddDWordAt(int len, ulong x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + ulong c = z[zPos + 0] + (x & M); + z[zPos + 0] = (uint)c; + c >>= 32; + c += z[zPos + 1] + (x >> 32); + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 2); + } +#endif + + public static uint AddDWordTo(int len, ulong x, uint[] z) + { + ulong c = (ulong)z[0] + (x & M); + z[0] = (uint)c; + c >>= 32; + c += (ulong)z[1] + (x >> 32); + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 2); + } + + public static uint AddDWordTo(int len, ulong x, uint[] z, int zOff) + { + ulong c = (ulong)z[zOff + 0] + (x & M); + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)z[zOff + 1] + (x >> 32); + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddDWordTo(int len, ulong x, Span z) + { + ulong c = z[0] + (x & M); + z[0] = (uint)c; + c >>= 32; + c += z[1] + (x >> 32); + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 2); + } +#endif + + public static uint AddTo(int len, uint[] x, uint[] z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + + public static uint AddTo(int len, uint[] x, int xOff, uint[] z, int zOff) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[xOff + i] + z[zOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddTo(int len, ReadOnlySpan x, Span z) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static uint AddTo(int len, uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[xOff + i] + z[zOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddTo(int len, ReadOnlySpan x, Span z, uint cIn) + { + ulong c = cIn; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static uint AddToEachOther(int len, uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)u[uOff + i] + v[vOff + i]; + u[uOff + i] = (uint)c; + v[vOff + i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddToEachOther(int len, Span u, Span v) + { + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)u[i] + v[i]; + u[i] = (uint)c; + v[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static uint AddWordAt(int len, uint x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + ulong c = (ulong)x + z[zPos]; + z[zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 1); + } + + public static uint AddWordAt(int len, uint x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + ulong c = (ulong)x + z[zOff + zPos]; + z[zOff + zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, zPos + 1); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddWordAt(int len, uint x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + ulong c = (ulong)x + z[zPos]; + z[zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 1); + } +#endif + + public static uint AddWordTo(int len, uint x, uint[] z) + { + ulong c = (ulong)x + z[0]; + z[0] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 1); + } + + public static uint AddWordTo(int len, uint x, uint[] z, int zOff) + { + ulong c = (ulong)x + z[zOff]; + z[zOff] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zOff, 1); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint AddWordTo(int len, uint x, Span z) + { + ulong c = (ulong)x + z[0]; + z[0] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, 1); + } +#endif + + public static uint CAdd(int len, int mask, uint[] x, uint[] y, uint[] z) + { + uint MASK = (uint)-(mask & 1); + + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + (y[i] & MASK); + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint CAdd(int len, int mask, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + uint MASK = (uint)-(mask & 1); + + ulong c = 0; + for (int i = 0; i < len; ++i) + { + c += (ulong)x[i] + (y[i] & MASK); + z[i] = (uint)c; + c >>= 32; + } + return (uint)c; + } +#endif + + public static void CMov(int len, int mask, uint[] x, int xOff, uint[] z, int zOff) + { + uint MASK = (uint)-(mask & 1); + + for (int i = 0; i < len; ++i) + { + uint z_i = z[zOff + i], diff = z_i ^ x[xOff + i]; + z_i ^= diff & MASK; + z[zOff + i] = z_i; + } + + //uint half = 0x55555555U, rest = half << (-(int)MASK); + + //for (int i = 0; i < len; ++i) + //{ + // uint z_i = z[zOff + i], diff = z_i ^ x[xOff + i]; + // z_i ^= (diff & half); + // z_i ^= (diff & rest); + // z[zOff + i] = z_i; + //} + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CMov(int len, int mask, ReadOnlySpan x, Span z) + { + uint MASK = (uint)-(mask & 1); + + for (int i = 0; i < len; ++i) + { + uint z_i = z[i], diff = z_i ^ x[i]; + z_i ^= diff & MASK; + z[i] = z_i; + } + + //uint half = 0x55555555U, rest = half << (-(int)MASK); + + //for (int i = 0; i < len; ++i) + //{ + // uint z_i = z[i], diff = z_i ^ x[i]; + // z_i ^= (diff & half); + // z_i ^= (diff & rest); + // z[i] = z_i; + //} + } +#endif + + public static int Compare(int len, uint[] x, uint[] y) + { + for (int i = len - 1; i >= 0; --i) + { + uint x_i = x[i]; + uint y_i = y[i]; + if (x_i < y_i) + return -1; + if (x_i > y_i) + return 1; + } + return 0; + } + + public static int Compare(int len, uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = len - 1; i >= 0; --i) + { + uint x_i = x[xOff + i]; + uint y_i = y[yOff + i]; + if (x_i < y_i) + return -1; + if (x_i > y_i) + return 1; + } + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Compare(int len, ReadOnlySpan x, ReadOnlySpan y) + { + for (int i = len - 1; i >= 0; --i) + { + uint x_i = x[i]; + uint y_i = y[i]; + if (x_i < y_i) + return -1; + if (x_i > y_i) + return 1; + } + return 0; + } +#endif + + public static uint[] Copy(int len, uint[] x) + { + uint[] z = new uint[len]; + Array.Copy(x, 0, z, 0, len); + return z; + } + + public static void Copy(int len, uint[] x, uint[] z) + { + Array.Copy(x, 0, z, 0, len); + } + + public static void Copy(int len, uint[] x, int xOff, uint[] z, int zOff) + { + Array.Copy(x, xOff, z, zOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Copy(int len, ReadOnlySpan x, Span z) + { + x[..len].CopyTo(z); + } +#endif + + public static ulong[] Copy64(int len, ulong[] x) + { + ulong[] z = new ulong[len]; + Array.Copy(x, 0, z, 0, len); + return z; + } + + public static void Copy64(int len, ulong[] x, ulong[] z) + { + Array.Copy(x, 0, z, 0, len); + } + + public static void Copy64(int len, ulong[] x, int xOff, ulong[] z, int zOff) + { + Array.Copy(x, xOff, z, zOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Copy64(int len, ReadOnlySpan x, Span z) + { + x[..len].CopyTo(z); + } +#endif + + public static uint[] Create(int len) + { + return new uint[len]; + } + + public static ulong[] Create64(int len) + { + return new ulong[len]; + } + + public static int CSub(int len, int mask, uint[] x, uint[] y, uint[] z) + { + long MASK = (uint)-(mask & 1); + long c = 0; + for (int i = 0; i < len; ++i) + { + c += x[i] - (y[i] & MASK); + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } + + public static int CSub(int len, int mask, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long MASK = (uint)-(mask & 1); + long c = 0; + for (int i = 0; i < len; ++i) + { + c += x[xOff + i] - (y[yOff + i] & MASK); + z[zOff + i] = (uint)c; + c >>= 32; + } + return (int)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int CSub(int len, int mask, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + long MASK = (uint)-(mask & 1); + long c = 0; + for (int i = 0; i < len; ++i) + { + c += x[i] - (y[i] & MASK); + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } +#endif + + public static int Dec(int len, uint[] z) + { + for (int i = 0; i < len; ++i) + { + if (--z[i] != uint.MaxValue) + return 0; + } + return -1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Dec(int len, Span z) + { + for (int i = 0; i < len; ++i) + { + if (--z[i] != uint.MaxValue) + return 0; + } + return -1; + } +#endif + + public static int Dec(int len, uint[] x, uint[] z) + { + int i = 0; + while (i < len) + { + uint c = x[i] - 1; + z[i] = c; + ++i; + if (c != uint.MaxValue) + { + while (i < len) + { + z[i] = x[i]; + ++i; + } + return 0; + } + } + return -1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Dec(int len, ReadOnlySpan x, Span z) + { + int i = 0; + while (i < len) + { + uint c = x[i] - 1; + z[i] = c; + ++i; + if (c != uint.MaxValue) + { + while (i < len) + { + z[i] = x[i]; + ++i; + } + return 0; + } + } + return -1; + } +#endif + + public static int DecAt(int len, uint[] z, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (--z[i] != uint.MaxValue) + return 0; + } + return -1; + } + + public static int DecAt(int len, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (--z[zOff + i] != uint.MaxValue) + return 0; + } + return -1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int DecAt(int len, Span z, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (--z[i] != uint.MaxValue) + return 0; + } + return -1; + } +#endif + + public static bool Eq(int len, uint[] x, uint[] y) + { + for (int i = len - 1; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool Eq(int len, ReadOnlySpan x, ReadOnlySpan y) + { + for (int i = len - 1; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } +#endif + + public static uint EqualTo(int len, uint[] x, uint y) + { + uint d = x[0] ^ y; + for (int i = 1; i < len; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + + public static uint EqualTo(int len, uint[] x, int xOff, uint y) + { + uint d = x[xOff] ^ y; + for (int i = 1; i < len; ++i) + { + d |= x[xOff + i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint EqualTo(int len, ReadOnlySpan x, uint y) + { + uint d = x[0] ^ y; + for (int i = 1; i < len; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } +#endif + + public static uint EqualTo(int len, uint[] x, uint[] y) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[i] ^ y[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + + public static uint EqualTo(int len, uint[] x, int xOff, uint[] y, int yOff) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[xOff + i] ^ y[yOff + i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint EqualTo(int len, ReadOnlySpan x, ReadOnlySpan y) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[i] ^ y[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } +#endif + + public static uint EqualToZero(int len, uint[] x) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + + public static uint EqualToZero(int len, uint[] x, int xOff) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[xOff + i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint EqualToZero(int len, ReadOnlySpan x) + { + uint d = 0; + for (int i = 0; i < len; ++i) + { + d |= x[i]; + } + d = (d >> 1) | (d & 1); + return (uint)(((int)d - 1) >> 31); + } +#endif + + public static uint[] FromBigInteger(int bits, BigInteger x) + { + int len = GetLengthForBits(bits); + + if (x.SignValue < 0 || x.BitLength > bits) + throw new ArgumentException(); + + uint[] z = Create(len); + + // NOTE: Use a fixed number of loop iterations + z[0] = (uint)x.IntValue; + for (int i = 1; i < len; ++i) + { + x = x.ShiftRight(32); + z[i] = (uint)x.IntValue; + } + return z; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void FromBigInteger(int bits, BigInteger x, Span z) + { + int len = GetLengthForBits(bits); + + if (x.SignValue < 0 || x.BitLength > bits) + throw new ArgumentException(); + if (z.Length < len) + throw new ArgumentException(); + + // NOTE: Use a fixed number of loop iterations + z[0] = (uint)x.IntValue; + for (int i = 1; i < len; ++i) + { + x = x.ShiftRight(32); + z[i] = (uint)x.IntValue; + } + } +#endif + + public static ulong[] FromBigInteger64(int bits, BigInteger x) + { + int len = GetLengthForBits64(bits); + + if (x.SignValue < 0 || x.BitLength > bits) + throw new ArgumentException(); + + ulong[] z = Create64(len); + + // NOTE: Use a fixed number of loop iterations + z[0] = (ulong)x.LongValue; + for (int i = 1; i < len; ++i) + { + x = x.ShiftRight(64); + z[i] = (ulong)x.LongValue; + } + return z; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void FromBigInteger64(int bits, BigInteger x, Span z) + { + int len = GetLengthForBits64(bits); + + if (x.SignValue < 0 || x.BitLength > bits) + throw new ArgumentException(); + if (z.Length < len) + throw new ArgumentException(); + + // NOTE: Use a fixed number of loop iterations + z[0] = (ulong)x.LongValue; + for (int i = 1; i < len; ++i) + { + x = x.ShiftRight(64); + z[i] = (ulong)x.LongValue; + } + } +#endif + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + return x[0] & 1; + + int w = bit >> 5; + if (w < 0 || w >= x.Length) + return 0; + + int b = bit & 31; + return (x[w] >> b) & 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint GetBit(ReadOnlySpan x, int bit) + { + if (bit == 0) + return x[0] & 1; + + int w = bit >> 5; + if (w < 0 || w >= x.Length) + return 0; + + int b = bit & 31; + return (x[w] >> b) & 1; + } +#endif + + public static int GetLengthForBits(int bits) + { + if (bits < 1) + throw new ArgumentException(); + + return (int)(((uint)bits + 31) >> 5); + } + + public static int GetLengthForBits64(int bits) + { + if (bits < 1) + throw new ArgumentException(); + + return (int)(((uint)bits + 63) >> 6); + } + + public static bool Gte(int len, uint[] x, uint[] y) + { + for (int i = len - 1; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool Gte(int len, ReadOnlySpan x, ReadOnlySpan y) + { + for (int i = len - 1; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } +#endif + + public static uint Inc(int len, uint[] z) + { + for (int i = 0; i < len; ++i) + { + if (++z[i] != uint.MinValue) + return 0; + } + return 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Inc(int len, Span z) + { + for (int i = 0; i < len; ++i) + { + if (++z[i] != uint.MinValue) + return 0; + } + return 1; + } +#endif + + public static uint Inc(int len, uint[] x, uint[] z) + { + int i = 0; + while (i < len) + { + uint c = x[i] + 1; + z[i] = c; + ++i; + if (c != 0) + { + while (i < len) + { + z[i] = x[i]; + ++i; + } + return 0; + } + } + return 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Inc(int len, ReadOnlySpan x, Span z) + { + int i = 0; + while (i < len) + { + uint c = x[i] + 1; + z[i] = c; + ++i; + if (c != 0) + { + while (i < len) + { + z[i] = x[i]; + ++i; + } + return 0; + } + } + return 1; + } +#endif + + public static uint IncAt(int len, uint[] z, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (++z[i] != uint.MinValue) + return 0; + } + return 1; + } + + public static uint IncAt(int len, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (++z[zOff + i] != uint.MinValue) + return 0; + } + return 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint IncAt(int len, Span z, int zPos) + { + Debug.Assert(zPos <= len); + for (int i = zPos; i < len; ++i) + { + if (++z[i] != uint.MinValue) + return 0; + } + return 1; + } +#endif + + public static bool IsOne(int len, uint[] x) + { + if (x[0] != 1) + return false; + + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + return false; + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool IsOne(int len, ReadOnlySpan x) + { + if (x[0] != 1) + return false; + + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + return false; + } + return true; + } +#endif + + public static bool IsZero(int len, uint[] x) + { + if (x[0] != 0) + return false; + + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + return false; + } + return true; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool IsZero(int len, ReadOnlySpan x) + { + if (x[0] != 0) + return false; + + for (int i = 1; i < len; ++i) + { + if (x[i] != 0) + return false; + } + return true; + } +#endif + + public static int LessThan(int len, uint[] x, uint[] y) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[i] - y[i]; + c >>= 32; + } + Debug.Assert(c == 0L || c == -1L); + return (int)c; + } + + public static int LessThan(int len, uint[] x, int xOff, uint[] y, int yOff) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[xOff + i] - y[yOff + i]; + c >>= 32; + } + Debug.Assert(c == 0L || c == -1L); + return (int)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int LessThan(int len, ReadOnlySpan x, ReadOnlySpan y) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[i] - y[i]; + c >>= 32; + } + Debug.Assert(c == 0L || c == -1L); + return (int)c; + } +#endif + + public static void Mul(int len, uint[] x, uint[] y, uint[] zz) + { + zz[len] = MulWord(len, x[0], y, zz); + + for (int i = 1; i < len; ++i) + { + zz[i + len] = MulWordAddTo(len, x[i], y, 0, zz, i); + } + } + + public static void Mul(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + zz[zzOff + len] = MulWord(len, x[xOff], y, yOff, zz, zzOff); + + for (int i = 1; i < len; ++i) + { + zz[zzOff + i + len] = MulWordAddTo(len, x[xOff + i], y, yOff, zz, zzOff + i); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Mul(int len, ReadOnlySpan x, ReadOnlySpan y, Span zz) + { + zz[len] = MulWord(len, x[0], y, zz); + + for (int i = 1; i < len; ++i) + { + zz[i + len] = MulWordAddTo(len, x[i], y, zz[i..]); + } + } +#endif + + public static void Mul(uint[] x, int xOff, int xLen, uint[] y, int yOff, int yLen, uint[] zz, int zzOff) + { + zz[zzOff + yLen] = MulWord(yLen, x[xOff], y, yOff, zz, zzOff); + + for (int i = 1; i < xLen; ++i) + { + zz[zzOff + i + yLen] = MulWordAddTo(yLen, x[xOff + i], y, yOff, zz, zzOff + i); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Mul(ReadOnlySpan x, ReadOnlySpan y, Span zz) + { + int xLen = x.Length, yLen = y.Length; + zz[yLen] = MulWord(yLen, x[0], y, zz); + + for (int i = 1; i < xLen; ++i) + { + zz[i + yLen] = MulWordAddTo(yLen, x[i], y, zz[i..]); + } + } +#endif + + public static uint MulAddTo(int len, uint[] x, uint[] y, uint[] zz) + { + ulong zc = 0; + for (int i = 0; i < len; ++i) + { + zc += MulWordAddTo(len, x[i], y, 0, zz, i) & M; + zc += zz[i + len] & M; + zz[i + len] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong zc = 0; + for (int i = 0; i < len; ++i) + { + zc += MulWordAddTo(len, x[xOff + i], y, yOff, zz, zzOff) & M; + zc += zz[zzOff + len] & M; + zz[zzOff + len] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint MulAddTo(int len, ReadOnlySpan x, ReadOnlySpan y, Span zz) + { + ulong zc = 0; + for (int i = 0; i < len; ++i) + { + zc += MulWordAddTo(len, x[i], y, zz[i..]) & M; + zc += zz[i + len] & M; + zz[i + len] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } +#endif + + public static uint Mul31BothAdd(int len, uint a, uint[] x, uint b, uint[] y, uint[] z, int zOff) + { + ulong c = 0, aVal = a, bVal = b; + int i = 0; + do + { + c += aVal * x[i] + bVal * y[i] + z[zOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint Mul31BothAdd(int len, uint a, ReadOnlySpan x, uint b, ReadOnlySpan y, + Span z) + { + ulong c = 0, aVal = a, bVal = b; + int i = 0; + do + { + c += aVal * x[i] + bVal * y[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } +#endif + + public static uint MulWord(int len, uint x, uint[] y, uint[] z) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } + + public static uint MulWord(int len, uint x, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[yOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint MulWord(int len, uint x, ReadOnlySpan y, Span z) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } +#endif + + public static uint MulWordAddTo(int len, uint x, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[yOff + i] + z[zOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint MulWordAddTo(int len, uint x, ReadOnlySpan y, Span z) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i] + z[i]; + z[i] = (uint)c; + c >>= 32; + } + while (++i < len); + return (uint)c; + } +#endif + + public static uint MulWordDwordAddAt(int len, uint x, ulong y, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 3)); + ulong c = 0, xVal = x; + c += xVal * (uint)y + z[zPos + 0]; + z[zPos + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zPos + 1]; + z[zPos + 1] = (uint)c; + c >>= 32; + c += z[zPos + 2]; + z[zPos + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 3); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint MulWordDwordAddAt(int len, uint x, ulong y, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 3)); + ulong c = 0, xVal = x; + c += xVal * (uint)y + z[zPos + 0]; + z[zPos + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zPos + 1]; + z[zPos + 1] = (uint)c; + c >>= 32; + c += z[zPos + 2]; + z[zPos + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : IncAt(len, z, zPos + 3); + } +#endif + + public static uint ShiftDownBit(int len, uint[] z, uint c) + { + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } + + public static uint ShiftDownBit(int len, uint[] z, int zOff, uint c) + { + int i = len; + while (--i >= 0) + { + uint next = z[zOff + i]; + z[zOff + i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftDownBit(int len, Span z, uint c) + { + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } +#endif + + public static uint ShiftDownBit(int len, uint[] x, uint c, uint[] z) + { + int i = len; + while (--i >= 0) + { + uint next = x[i]; + z[i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } + + public static uint ShiftDownBit(int len, uint[] x, int xOff, uint c, uint[] z, int zOff) + { + int i = len; + while (--i >= 0) + { + uint next = x[xOff + i]; + z[zOff + i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftDownBit(int len, ReadOnlySpan x, uint c, Span z) + { + int i = len; + while (--i >= 0) + { + uint next = x[i]; + z[i] = (next >> 1) | (c << 31); + c = next; + } + return c << 31; + } +#endif + + public static uint ShiftDownBits(int len, uint[] z, int bits, uint c) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } + + public static uint ShiftDownBits(int len, uint[] z, int zOff, int bits, uint c) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = z[zOff + i]; + z[zOff + i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftDownBits(int len, Span z, int bits, uint c) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } +#endif + + public static uint ShiftDownBits(int len, uint[] x, int bits, uint c, uint[] z) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = x[i]; + z[i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } + + public static uint ShiftDownBits(int len, uint[] x, int xOff, int bits, uint c, uint[] z, int zOff) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = x[xOff + i]; + z[zOff + i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftDownBits(int len, ReadOnlySpan x, int bits, uint c, Span z) + { + Debug.Assert(bits > 0 && bits < 32); + int i = len; + while (--i >= 0) + { + uint next = x[i]; + z[i] = (next >> bits) | (c << -bits); + c = next; + } + return c << -bits; + } +#endif + + public static uint ShiftDownWord(int len, uint[] z, uint c) + { + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = c; + c = next; + } + return c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftDownWord(int len, Span z, uint c) + { + int i = len; + while (--i >= 0) + { + uint next = z[i]; + z[i] = c; + c = next; + } + return c; + } +#endif + + public static uint ShiftUpBit(int len, uint[] z, uint c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit(len, z.AsSpan(0, len), c); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[i + 0]; + uint next1 = z[i + 1]; + uint next2 = z[i + 2]; + uint next3 = z[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 31); + z[i + 1] = (next1 << 1) | (next0 >> 31); + z[i + 2] = (next2 << 1) | (next1 >> 31); + z[i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[i]; + z[i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; +#endif + } + + public static uint ShiftUpBit(int len, uint[] z, int zOff, uint c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit(len, z.AsSpan(zOff, len), c); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[zOff + i + 0]; + uint next1 = z[zOff + i + 1]; + uint next2 = z[zOff + i + 2]; + uint next3 = z[zOff + i + 3]; + z[zOff + i + 0] = (next0 << 1) | (c >> 31); + z[zOff + i + 1] = (next1 << 1) | (next0 >> 31); + z[zOff + i + 2] = (next2 << 1) | (next1 >> 31); + z[zOff + i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[zOff + i]; + z[zOff + i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftUpBit(int len, Span z, uint c) + { + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[i + 0]; + uint next1 = z[i + 1]; + uint next2 = z[i + 2]; + uint next3 = z[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 31); + z[i + 1] = (next1 << 1) | (next0 >> 31); + z[i + 2] = (next2 << 1) | (next1 >> 31); + z[i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[i]; + z[i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; + } +#endif + + public static uint ShiftUpBit(int len, uint[] x, uint c, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit(len, x.AsSpan(0, len), c, z.AsSpan(0, len)); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[i + 0]; + uint next1 = x[i + 1]; + uint next2 = x[i + 2]; + uint next3 = x[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 31); + z[i + 1] = (next1 << 1) | (next0 >> 31); + z[i + 2] = (next2 << 1) | (next1 >> 31); + z[i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[i]; + z[i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; +#endif + } + + public static uint ShiftUpBit(int len, uint[] x, int xOff, uint c, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit(len, x.AsSpan(xOff, len), c, z.AsSpan(zOff, len)); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[xOff + i + 0]; + uint next1 = x[xOff + i + 1]; + uint next2 = x[xOff + i + 2]; + uint next3 = x[xOff + i + 3]; + z[zOff + i + 0] = (next0 << 1) | (c >> 31); + z[zOff + i + 1] = (next1 << 1) | (next0 >> 31); + z[zOff + i + 2] = (next2 << 1) | (next1 >> 31); + z[zOff + i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[xOff + i]; + z[zOff + i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftUpBit(int len, ReadOnlySpan x, uint c, Span z) + { + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[i + 0]; + uint next1 = x[i + 1]; + uint next2 = x[i + 2]; + uint next3 = x[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 31); + z[i + 1] = (next1 << 1) | (next0 >> 31); + z[i + 2] = (next2 << 1) | (next1 >> 31); + z[i + 3] = (next3 << 1) | (next2 >> 31); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[i]; + z[i] = (next << 1) | (c >> 31); + c = next; + ++i; + } + return c >> 31; + } +#endif + + public static ulong ShiftUpBit64(int len, ulong[] x, ulong c, ulong[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit64(len, x.AsSpan(0, len), c, z.AsSpan(0, len)); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[i + 0]; + ulong next1 = x[i + 1]; + ulong next2 = x[i + 2]; + ulong next3 = x[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 63); + z[i + 1] = (next1 << 1) | (next0 >> 63); + z[i + 2] = (next2 << 1) | (next1 >> 63); + z[i + 3] = (next3 << 1) | (next2 >> 63); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[i]; + z[i] = (next << 1) | (c >> 63); + c = next; + ++i; + } + return c >> 63; +#endif + } + + public static ulong ShiftUpBit64(int len, ulong[] x, int xOff, ulong c, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBit64(len, x.AsSpan(xOff, len), c, z.AsSpan(zOff, len)); +#else + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[xOff + i + 0]; + ulong next1 = x[xOff + i + 1]; + ulong next2 = x[xOff + i + 2]; + ulong next3 = x[xOff + i + 3]; + z[zOff + i + 0] = (next0 << 1) | (c >> 63); + z[zOff + i + 1] = (next1 << 1) | (next0 >> 63); + z[zOff + i + 2] = (next2 << 1) | (next1 >> 63); + z[zOff + i + 3] = (next3 << 1) | (next2 >> 63); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[xOff + i]; + z[zOff + i] = (next << 1) | (c >> 63); + c = next; + ++i; + } + return c >> 63; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static ulong ShiftUpBit64(int len, ReadOnlySpan x, ulong c, Span z) + { + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[i + 0]; + ulong next1 = x[i + 1]; + ulong next2 = x[i + 2]; + ulong next3 = x[i + 3]; + z[i + 0] = (next0 << 1) | (c >> 63); + z[i + 1] = (next1 << 1) | (next0 >> 63); + z[i + 2] = (next2 << 1) | (next1 >> 63); + z[i + 3] = (next3 << 1) | (next2 >> 63); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[i]; + z[i] = (next << 1) | (c >> 63); + c = next; + ++i; + } + return c >> 63; + } +#endif + + public static uint ShiftUpBits(int len, uint[] z, int bits, uint c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits(len, z.AsSpan(0, len), bits, c); +#else + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[i + 0]; + uint next1 = z[i + 1]; + uint next2 = z[i + 2]; + uint next3 = z[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + + public static uint ShiftUpBits(int len, uint[] z, int zOff, int bits, uint c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits(len, z.AsSpan(zOff, len), bits, c); +#else + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[zOff + i + 0]; + uint next1 = z[zOff + i + 1]; + uint next2 = z[zOff + i + 2]; + uint next3 = z[zOff + i + 3]; + z[zOff + i + 0] = (next0 << bits) | (c >> -bits); + z[zOff + i + 1] = (next1 << bits) | (next0 >> -bits); + z[zOff + i + 2] = (next2 << bits) | (next1 >> -bits); + z[zOff + i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[zOff + i]; + z[zOff + i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftUpBits(int len, Span z, int bits, uint c) + { + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = z[i + 0]; + uint next1 = z[i + 1]; + uint next2 = z[i + 2]; + uint next3 = z[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = z[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; + } +#endif + + public static uint ShiftUpBits(int len, uint[] x, int bits, uint c, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits(len, x.AsSpan(0, len), bits, c, z.AsSpan(0, len)); +#else + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[i + 0]; + uint next1 = x[i + 1]; + uint next2 = x[i + 2]; + uint next3 = x[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + + public static uint ShiftUpBits(int len, uint[] x, int xOff, int bits, uint c, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits(len, x.AsSpan(xOff, len), bits, c, z.AsSpan(zOff, len)); +#else + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[xOff + i + 0]; + uint next1 = x[xOff + i + 1]; + uint next2 = x[xOff + i + 2]; + uint next3 = x[xOff + i + 3]; + z[zOff + i + 0] = (next0 << bits) | (c >> -bits); + z[zOff + i + 1] = (next1 << bits) | (next0 >> -bits); + z[zOff + i + 2] = (next2 << bits) | (next1 >> -bits); + z[zOff + i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[xOff + i]; + z[zOff + i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint ShiftUpBits(int len, ReadOnlySpan x, int bits, uint c, Span z) + { + Debug.Assert(bits > 0 && bits < 32); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + uint next0 = x[i + 0]; + uint next1 = x[i + 1]; + uint next2 = x[i + 2]; + uint next3 = x[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + uint next = x[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; + } +#endif + + public static ulong ShiftUpBits64(int len, ulong[] z, int bits, ulong c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits64(len, z.AsSpan(0, len), bits, c); +#else + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = z[i + 0]; + ulong next1 = z[i + 1]; + ulong next2 = z[i + 2]; + ulong next3 = z[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = z[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + + public static ulong ShiftUpBits64(int len, ulong[] z, int zOff, int bits, ulong c) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits64(len, z.AsSpan(zOff, len), bits, c); +#else + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = z[zOff + i + 0]; + ulong next1 = z[zOff + i + 1]; + ulong next2 = z[zOff + i + 2]; + ulong next3 = z[zOff + i + 3]; + z[zOff + i + 0] = (next0 << bits) | (c >> -bits); + z[zOff + i + 1] = (next1 << bits) | (next0 >> -bits); + z[zOff + i + 2] = (next2 << bits) | (next1 >> -bits); + z[zOff + i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = z[zOff + i]; + z[zOff + i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static ulong ShiftUpBits64(int len, Span z, int bits, ulong c) + { + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = z[i + 0]; + ulong next1 = z[i + 1]; + ulong next2 = z[i + 2]; + ulong next3 = z[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = z[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; + } +#endif + + public static ulong ShiftUpBits64(int len, ulong[] x, int bits, ulong c, ulong[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits64(len, x.AsSpan(0, len), bits, c, z.AsSpan(0, len)); +#else + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[i + 0]; + ulong next1 = x[i + 1]; + ulong next2 = x[i + 2]; + ulong next3 = x[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + + public static ulong ShiftUpBits64(int len, ulong[] x, int xOff, int bits, ulong c, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ShiftUpBits64(len, x.AsSpan(xOff, len), bits, c, z.AsSpan(zOff, len)); +#else + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[xOff + i + 0]; + ulong next1 = x[xOff + i + 1]; + ulong next2 = x[xOff + i + 2]; + ulong next3 = x[xOff + i + 3]; + z[zOff + i + 0] = (next0 << bits) | (c >> -bits); + z[zOff + i + 1] = (next1 << bits) | (next0 >> -bits); + z[zOff + i + 2] = (next2 << bits) | (next1 >> -bits); + z[zOff + i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[xOff + i]; + z[zOff + i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static ulong ShiftUpBits64(int len, ReadOnlySpan x, int bits, ulong c, Span z) + { + Debug.Assert(bits > 0 && bits < 64); + int i = 0, limit4 = len - 4; + while (i <= limit4) + { + ulong next0 = x[i + 0]; + ulong next1 = x[i + 1]; + ulong next2 = x[i + 2]; + ulong next3 = x[i + 3]; + z[i + 0] = (next0 << bits) | (c >> -bits); + z[i + 1] = (next1 << bits) | (next0 >> -bits); + z[i + 2] = (next2 << bits) | (next1 >> -bits); + z[i + 3] = (next3 << bits) | (next2 >> -bits); + c = next3; + i += 4; + } + while (i < len) + { + ulong next = x[i]; + z[i] = (next << bits) | (c >> -bits); + c = next; + ++i; + } + return c >> -bits; + } +#endif + + public static void Square(int len, uint[] x, uint[] zz) + { + int extLen = len << 1; + uint c = 0; + int j = len, k = extLen; + do + { + ulong xVal = (ulong)x[--j]; + ulong p = xVal * xVal; + zz[--k] = (c << 31) | (uint)(p >> 33); + zz[--k] = (uint)(p >> 1); + c = (uint)p; + } + while (j > 0); + + ulong d = 0UL; + int zzPos = 2; + + for (int i = 1; i < len; ++i) + { + d += SquareWordAddTo(x, i, zz); + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + } + Debug.Assert(0UL == d); + + ShiftUpBit(extLen, zz, x[0] << 31); + } + + public static void Square(int len, uint[] x, int xOff, uint[] zz, int zzOff) + { + int extLen = len << 1; + uint c = 0; + int j = len, k = extLen; + do + { + ulong xVal = (ulong)x[xOff + --j]; + ulong p = xVal * xVal; + zz[zzOff + --k] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --k] = (uint)(p >> 1); + c = (uint)p; + } + while (j > 0); + + ulong d = 0UL; + int zzPos = zzOff + 2; + + for (int i = 1; i < len; ++i) + { + d += SquareWordAddTo(x, xOff, i, zz, zzOff); + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + } + Debug.Assert(0UL == d); + + ShiftUpBit(extLen, zz, zzOff, x[xOff] << 31); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Square(int len, ReadOnlySpan x, Span zz) + { + int extLen = len << 1; + uint c = 0; + int j = len, k = extLen; + do + { + ulong xVal = (ulong)x[--j]; + ulong p = xVal * xVal; + zz[--k] = (c << 31) | (uint)(p >> 33); + zz[--k] = (uint)(p >> 1); + c = (uint)p; + } + while (j > 0); + + ulong d = 0UL; + int zzPos = 2; + + for (int i = 1; i < len; ++i) + { + d += SquareWordAddTo(x, i, zz); + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + d += zz[zzPos]; + zz[zzPos++] = (uint)d; d >>= 32; + } + Debug.Assert(0UL == d); + + ShiftUpBit(extLen, zz, x[0] << 31); + } +#endif + + public static uint SquareWordAddTo(uint[] x, int xPos, uint[] z) + { + ulong c = 0, xVal = (ulong)x[xPos]; + int i = 0; + do + { + c += xVal * x[i] + z[xPos + i]; + z[xPos + i] = (uint)c; + c >>= 32; + } + while (++i < xPos); + return (uint)c; + } + + public static uint SquareWordAddTo(uint[] x, int xOff, int xPos, uint[] z, int zOff) + { + ulong c = 0, xVal = (ulong)x[xOff + xPos]; + int i = 0; + do + { + c += xVal * (x[xOff + i] & M) + (z[xPos + zOff] & M); + z[xPos + zOff] = (uint)c; + c >>= 32; + ++zOff; + } + while (++i < xPos); + return (uint)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static uint SquareWordAddTo(ReadOnlySpan x, int xPos, Span z) + { + ulong c = 0, xVal = x[xPos]; + int i = 0; + do + { + c += xVal * x[i] + z[xPos + i]; + z[xPos + i] = (uint)c; + c >>= 32; + } + while (++i < xPos); + return (uint)c; + } +#endif + + public static int Sub(int len, uint[] x, uint[] y, uint[] z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[i] - y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } + + public static int Sub(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[xOff + i] - y[yOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (int)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Sub(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)x[i] - y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } +#endif + + public static int Sub33At(int len, uint x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = (long)z[zPos + 0] - x; + z[zPos + 0] = (uint)c; + c >>= 32; + c += (long)z[zPos + 1] - 1; + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 2); + } + + public static int Sub33At(int len, uint x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = (long)z[zOff + zPos] - x; + z[zOff + zPos] = (uint)c; + c >>= 32; + c += (long)z[zOff + zPos + 1] - 1; + z[zOff + zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, zPos + 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Sub33At(int len, uint x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = (long)z[zPos + 0] - x; + z[zPos + 0] = (uint)c; + c >>= 32; + c += (long)z[zPos + 1] - 1; + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 2); + } +#endif + + public static int Sub33From(int len, uint x, uint[] z) + { + long c = (long)z[0] - x; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - 1; + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 2); + } + + public static int Sub33From(int len, uint x, uint[] z, int zOff) + { + long c = (long)z[zOff + 0] - x; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - 1; + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int Sub33From(int len, uint x, Span z) + { + long c = (long)z[0] - x; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - 1; + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 2); + } +#endif + + public static int SubBothFrom(int len, uint[] x, uint[] y, uint[] z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[i] - x[i] - y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } + + public static int SubBothFrom(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[zOff + i] - x[xOff + i] - y[yOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (int)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubBothFrom(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[i] - x[i] - y[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } +#endif + + public static int SubDWordAt(int len, ulong x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = z[zPos + 0] - (long)(x & M); + z[zPos + 0] = (uint)c; + c >>= 32; + c += z[zPos + 1] - (long)(x >> 32); + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 2); + } + + public static int SubDWordAt(int len, ulong x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = z[zOff + zPos] - (long)(x & M); + z[zOff + zPos] = (uint)c; + c >>= 32; + c += z[zOff + zPos + 1] - (long)(x >> 32); + z[zOff + zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, zPos + 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubDWordAt(int len, ulong x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 2)); + long c = z[zPos + 0] - (long)(x & M); + z[zPos + 0] = (uint)c; + c >>= 32; + c += z[zPos + 1] - (long)(x >> 32); + z[zPos + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 2); + } +#endif + + public static int SubDWordFrom(int len, ulong x, uint[] z) + { + long c = z[0] - (long)(x & M); + z[0] = (uint)c; + c >>= 32; + c += z[1] - (long)(x >> 32); + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 2); + } + + public static int SubDWordFrom(int len, ulong x, uint[] z, int zOff) + { + long c = z[zOff + 0] - (long)(x & M); + z[zOff + 0] = (uint)c; + c >>= 32; + c += z[zOff + 1] - (long)(x >> 32); + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, 2); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubDWordFrom(int len, ulong x, Span z) + { + long c = z[0] - (long)(x & M); + z[0] = (uint)c; + c >>= 32; + c += z[1] - (long)(x >> 32); + z[1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 2); + } +#endif + + public static int SubFrom(int len, uint[] x, uint[] z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[i] - x[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } + + public static int SubFrom(int len, uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[zOff + i] - x[xOff + i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + return (int)c; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubFrom(int len, ReadOnlySpan x, Span z) + { + long c = 0; + for (int i = 0; i < len; ++i) + { + c += (long)z[i] - x[i]; + z[i] = (uint)c; + c >>= 32; + } + return (int)c; + } +#endif + + public static int SubWordAt(int len, uint x, uint[] z, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + long c = (long)z[zPos] - x; + z[zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 1); + } + + public static int SubWordAt(int len, uint x, uint[] z, int zOff, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + long c = (long)z[zOff + zPos] - x; + z[zOff + zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, zPos + 1); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubWordAt(int len, uint x, Span z, int zPos) + { + Debug.Assert(zPos <= (len - 1)); + long c = (long)z[zPos] - x; + z[zPos] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zPos + 1); + } +#endif + + public static int SubWordFrom(int len, uint x, uint[] z) + { + long c = (long)z[0] - x; + z[0] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 1); + } + + public static int SubWordFrom(int len, uint x, uint[] z, int zOff) + { + long c = (long)z[zOff + 0] - x; + z[zOff + 0] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, zOff, 1); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int SubWordFrom(int len, uint x, Span z) + { + long c = (long)z[0] - x; + z[0] = (uint)c; + c >>= 32; + return c == 0 ? 0 : DecAt(len, z, 1); + } +#endif + + public static BigInteger ToBigInteger(int len, uint[] x) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ToBigInteger(len, x.AsSpan()); +#else + byte[] bs = new byte[len << 2]; + int xPos = len, bsPos = 0; + while (--xPos >= 0) + { + Pack.UInt32_To_BE(x[xPos], bs, bsPos); + bsPos += 4; + } + return new BigInteger(1, bs); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static BigInteger ToBigInteger(int len, ReadOnlySpan x) + { + int bsLen = len << 2; + Span bs = bsLen <= 512 + ? stackalloc byte[bsLen] + : new byte[bsLen]; + + int xPos = len; + Span t = bs; + while (--xPos >= 0) + { + Pack.UInt32_To_BE(x[xPos], t); + t = t[4..]; + } + return new BigInteger(1, bs); + } +#endif + + public static void Xor(int len, uint[] x, uint[] y, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor(len, x.AsSpan(0, len), y.AsSpan(0, len), z.AsSpan(0, len)); +#else + for (int i = 0; i < len; ++i) + { + z[i] = x[i] ^ y[i]; + } +#endif + } + + public static void Xor(int len, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor(len, x.AsSpan(xOff, len), y.AsSpan(yOff, len), z.AsSpan(zOff, len)); +#else + for (int i = 0; i < len; ++i) + { + z[zOff + i] = x[xOff + i] ^ y[yOff + i]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Xor(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + int i = 0, limit16 = len - 16; + while (i <= limit16) + { + Nat512.Xor(x[i..], y[i..], z[i..]); + i += 16; + } + while (i < len) + { + z[i] = x[i] ^ y[i]; + ++i; + } + } +#endif + + public static void Xor64(int len, ulong[] x, ulong[] y, ulong[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor64(len, x.AsSpan(0, len), y.AsSpan(0, len), z.AsSpan(0, len)); +#else + for (int i = 0; i < len; ++i) + { + z[i] = x[i] ^ y[i]; + } +#endif + } + + public static void Xor64(int len, ulong[] x, int xOff, ulong[] y, int yOff, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor64(len, x.AsSpan(xOff, len), y.AsSpan(yOff, len), z.AsSpan(zOff, len)); +#else + for (int i = 0; i < len; ++i) + { + z[zOff + i] = x[xOff + i] ^ y[yOff + i]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Xor64(int len, ReadOnlySpan x, ReadOnlySpan y, Span z) + { + int i = 0, limit8 = len - 8; + while (i <= limit8) + { + Nat512.Xor64(x[i..], y[i..], z[i..]); + i += 8; + } + while (i < len) + { + z[i] = x[i] ^ y[i]; + ++i; + } + } +#endif + + public static void XorTo(int len, uint[] x, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo(len, x.AsSpan(0, len), z.AsSpan(0, len)); +#else + for (int i = 0; i < len; ++i) + { + z[i] ^= x[i]; + } +#endif + } + + public static void XorTo(int len, uint[] x, int xOff, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo(len, x.AsSpan(xOff, len), z.AsSpan(zOff, len)); +#else + for (int i = 0; i < len; ++i) + { + z[zOff + i] ^= x[xOff + i]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void XorTo(int len, ReadOnlySpan x, Span z) + { + int i = 0, limit16 = len - 16; + while (i <= limit16) + { + Nat512.XorTo(x[i..], z[i..]); + i += 16; + } + while (i < len) + { + z[i] ^= x[i]; + ++i; + } + } +#endif + + public static void XorTo64(int len, ulong[] x, ulong[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo64(len, x.AsSpan(0, len), z.AsSpan(0, len)); +#else + for (int i = 0; i < len; ++i) + { + z[i] ^= x[i]; + } +#endif + } + + public static void XorTo64(int len, ulong[] x, int xOff, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo64(len, x.AsSpan(xOff, len), z.AsSpan(zOff, len)); +#else + for (int i = 0; i < len; ++i) + { + z[zOff + i] ^= x[xOff + i]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void XorTo64(int len, ReadOnlySpan x, Span z) + { + int i = 0, limit8 = len - 8; + while (i <= limit8) + { + Nat512.XorTo64(x[i..], z[i..]); + i += 8; + } + while (i < len) + { + z[i] ^= x[i]; + ++i; + } + } +#endif + + public static void Zero(int len, uint[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + z.AsSpan(0, len).Fill(0U); +#else + for (int i = 0; i < len; ++i) + { + z[i] = 0U; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Zero(int len, Span z) + { + z[..len].Fill(0U); + } +#endif + + public static void Zero64(int len, ulong[] z) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + z.AsSpan(0, len).Fill(0UL); +#else + for (int i = 0; i < len; ++i) + { + z[i] = 0UL; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Zero64(int len, Span z) + { + z[..len].Fill(0UL); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs.meta new file mode 100644 index 00000000..9057666b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5485273b1b8b0f543bd41301d46c1092 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs new file mode 100644 index 00000000..642cb77f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs @@ -0,0 +1,846 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat128 + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + c += (ulong)x[xOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddToEachOther(uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + c += (ulong)u[uOff + 0] + v[vOff + 0]; + u[uOff + 0] = (uint)c; + v[vOff + 0] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 1] + v[vOff + 1]; + u[uOff + 1] = (uint)c; + v[vOff + 1] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 2] + v[vOff + 2]; + u[uOff + 2] = (uint)c; + v[vOff + 2] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 3] + v[vOff + 3]; + u[uOff + 3] = (uint)c; + v[vOff + 3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static void Copy(uint[] x, uint[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + } + + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + } + + public static uint[] Create() + { + return new uint[4]; + } + + public static ulong[] Create64() + { + return new ulong[2]; + } + + public static uint[] CreateExt() + { + return new uint[8]; + } + + public static ulong[] CreateExt64() + { + return new ulong[4]; + } + + public static bool Diff(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + bool pos = Gte(x, xOff, y, yOff); + if (pos) + { + Sub(x, xOff, y, yOff, z, zOff); + } + else + { + Sub(y, yOff, x, xOff, z, zOff); + } + return pos; + } + + public static bool Eq(uint[] x, uint[] y) + { + for (int i = 3; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 1; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + { + return x[0] & 1; + } + if ((bit & 127) != bit) + { + return 0; + } + int w = bit >> 5; + int b = bit & 31; + return (x[w] >> b) & 1; + } + + public static bool Gte(uint[] x, uint[] y) + { + for (int i = 3; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool Gte(uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = 3; i >= 0; --i) + { + uint x_i = x[xOff + i], y_i = y[yOff + i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool IsOne(uint[] x) + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < 4; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 2; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero(uint[] x) + { + for (int i = 0; i < 4; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 2; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + + { + ulong c = 0, x_0 = x[0]; + c += x_0 * y_0; + zz[0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[3] = (uint)c; + c >>= 32; + zz[4] = (uint)c; + } + + for (int i = 1; i < 4; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + zz[i + 4] = (uint)c; + } + } + + public static void Mul(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + + { + ulong c = 0, x_0 = x[xOff + 0]; + c += x_0 * y_0; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[zzOff + 3] = (uint)c; + c >>= 32; + zz[zzOff + 4] = (uint)c; + } + + for (int i = 1; i < 4; ++i) + { + ++zzOff; + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + zz[zzOff + 4] = (uint)c; + } + } + + public static uint MulAddTo(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + + ulong zc = 0; + for (int i = 0; i < 4; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + + zc += c + zz[i + 4]; + zz[i + 4] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + + ulong zc = 0; + for (int i = 0; i < 4; ++i) + { + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + + zc += c + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + + public static ulong Mul33Add(uint w, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + Debug.Assert(w >> 31 == 0); + + ulong c = 0, wVal = w; + ulong x0 = x[xOff + 0]; + c += wVal * x0 + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong x1 = x[xOff + 1]; + c += wVal * x1 + x0 + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + ulong x2 = x[xOff + 2]; + c += wVal * x2 + x1 + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + ulong x3 = x[xOff + 3]; + c += wVal * x3 + x2 + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += x3; + return c; + } + + public static uint MulWordAddExt(uint x, uint[] yy, int yyOff, uint[] zz, int zzOff) + { + Debug.Assert(yyOff <= 4); + Debug.Assert(zzOff <= 4); + + ulong c = 0, xVal = x; + c += xVal * yy[yyOff + 0] + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 1] + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 2] + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 3] + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33DWordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 0); + ulong c = 0, xVal = x; + ulong y00 = y & M; + c += xVal * y00 + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong y01 = y >> 32; + c += xVal * y01 + y00 + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += y01 + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33WordAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 1); + ulong c = 0, yVal = y; + c += yVal * x + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += yVal + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(4, z, zOff, 3); + } + + public static uint MulWordDwordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 1); + ulong c = 0, xVal = x; + c += xVal * y + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(4, z, zOff, 3); + } + + public static uint MulWordsAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 2); + + ulong c = 0, xVal = x, yVal = y; + c += yVal * xVal + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(4, z, zOff, 2); + } + + public static uint MulWord(uint x, uint[] y, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < 4); + return (uint)c; + } + + public static void Square(uint[] x, uint[] zz) + { + ulong x_0 = x[0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 3, j = 8; + do + { + ulong xVal = x[i--]; + ulong p = xVal * xVal; + zz[--j] = (c << 31) | (uint)(p >> 33); + zz[--j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[1]; + ulong zz_2 = zz[2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[2]; + ulong zz_3 = zz[3]; + ulong zz_4 = zz[4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[3]; + ulong zz_5 = zz[5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_6 += zz_5 >> 32; + } + + w = (uint)zz_4; + zz[4] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_5; + zz[5] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_6; + zz[6] = (w << 1) | c; + c = w >> 31; + w = zz[7] + (uint)(zz_6 >> 32); + zz[7] = (w << 1) | c; + } + + public static void Square(uint[] x, int xOff, uint[] zz, int zzOff) + { + ulong x_0 = x[xOff + 0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 3, j = 8; + do + { + ulong xVal = x[xOff + i--]; + ulong p = xVal * xVal; + zz[zzOff + --j] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[zzOff + 0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[xOff + 1]; + ulong zz_2 = zz[zzOff + 2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[zzOff + 1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[xOff + 2]; + ulong zz_3 = zz[zzOff + 3]; + ulong zz_4 = zz[zzOff + 4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[zzOff + 2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[xOff + 3]; + ulong zz_5 = zz[zzOff + 5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[zzOff + 6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[zzOff + 3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_6 += zz_5 >> 32; + } + + w = (uint)zz_4; + zz[zzOff + 4] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_5; + zz[zzOff + 5] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_6; + zz[zzOff + 6] = (w << 1) | c; + c = w >> 31; + w = zz[zzOff + 7] + (uint)(zz_6 >> 32); + zz[zzOff + 7] = (w << 1) | c; + } + + public static int Sub(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int Sub(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + c += (long)x[xOff + 0] - y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)x[xOff + 1] - y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)x[xOff + 2] - y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)x[xOff + 3] - y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubBothFrom(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3]; + z[3] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + c += (long)z[zOff + 0] - x[xOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - x[xOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)z[zOff + 2] - x[xOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)z[zOff + 3] - x[xOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return (int)c; + } + + public static BigInteger ToBigInteger(uint[] x) + { + byte[] bs = new byte[16]; + for (int i = 0; i < 4; ++i) + { + uint x_i = x[i]; + if (x_i != 0) + { + Pack.UInt32_To_BE(x_i, bs, (3 - i) << 2); + } + } + return new BigInteger(1, bs); + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[16]; + for (int i = 0; i < 2; ++i) + { + ulong x_i = x[i]; + if (x_i != 0UL) + { + Pack.UInt64_To_BE(x_i, bs, (1 - i) << 3); + } + } + return new BigInteger(1, bs); + } + + public static void Zero(uint[] z) + { + z[0] = 0; + z[1] = 0; + z[2] = 0; + z[3] = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs.meta new file mode 100644 index 00000000..161b318a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8e573d70894015449a2e9b05c1b85cdc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat128.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs new file mode 100644 index 00000000..0123f8f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs @@ -0,0 +1,874 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat160 + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + c += (ulong)x[xOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + z[zOff + 5]; + return (uint)c; + } + + public static uint AddToEachOther(uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + c += (ulong)u[uOff + 0] + v[vOff + 0]; + u[uOff + 0] = (uint)c; + v[vOff + 0] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 1] + v[vOff + 1]; + u[uOff + 1] = (uint)c; + v[vOff + 1] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 2] + v[vOff + 2]; + u[uOff + 2] = (uint)c; + v[vOff + 2] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 3] + v[vOff + 3]; + u[uOff + 3] = (uint)c; + v[vOff + 3] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 4] + v[vOff + 4]; + u[uOff + 4] = (uint)c; + v[vOff + 4] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static void Copy(uint[] x, uint[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + } + + public static uint[] Create() + { + return new uint[5]; + } + + public static uint[] CreateExt() + { + return new uint[10]; + } + + public static bool Diff(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + bool pos = Gte(x, xOff, y, yOff); + if (pos) + { + Sub(x, xOff, y, yOff, z, zOff); + } + else + { + Sub(y, yOff, x, xOff, z, zOff); + } + return pos; + } + + public static bool Eq(uint[] x, uint[] y) + { + for (int i = 4; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + { + return x[0] & 1; + } + int w = bit >> 5; + if (w < 0 || w >= 5) + { + return 0; + } + int b = bit & 31; + return (x[w] >> b) & 1; + } + + public static bool Gte(uint[] x, uint[] y) + { + for (int i = 4; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool Gte(uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = 4; i >= 0; --i) + { + uint x_i = x[xOff + i], y_i = y[yOff + i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool IsOne(uint[] x) + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < 5; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsZero(uint[] x) + { + for (int i = 0; i < 5; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + + { + ulong c = 0, x_0 = x[0]; + c += x_0 * y_0; + zz[0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[4] = (uint)c; + c >>= 32; + zz[5] = (uint)c; + } + + for (int i = 1; i < 5; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + zz[i + 5] = (uint)c; + } + } + + public static void Mul(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + + { + ulong c = 0, x_0 = x[xOff + 0]; + c += x_0 * y_0; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[zzOff + 4] = (uint)c; + c >>= 32; + zz[zzOff + 5] = (uint)c; + } + + for (int i = 1; i < 5; ++i) + { + ++zzOff; + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + zz[zzOff + 5] = (uint)c; + } + } + + public static uint MulAddTo(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + + ulong zc = 0; + for (int i = 0; i < 5; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + + zc += c + zz[i + 5]; + zz[i + 5] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + + ulong zc = 0; + for (int i = 0; i < 5; ++i) + { + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + + zc += c + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + + public static ulong Mul33Add(uint w, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + Debug.Assert(w >> 31 == 0); + + ulong c = 0, wVal = w; + ulong x0 = x[xOff + 0]; + c += wVal * x0 + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong x1 = x[xOff + 1]; + c += wVal * x1 + x0 + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + ulong x2 = x[xOff + 2]; + c += wVal * x2 + x1 + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + ulong x3 = x[xOff + 3]; + c += wVal * x3 + x2 + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + ulong x4 = x[xOff + 4]; + c += wVal * x4 + x3 + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += x4; + return c; + } + + public static uint MulWordAddExt(uint x, uint[] yy, int yyOff, uint[] zz, int zzOff) + { + Debug.Assert(yyOff <= 5); + Debug.Assert(zzOff <= 5); + + ulong c = 0, xVal = x; + c += xVal * yy[yyOff + 0] + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 1] + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 2] + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 3] + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 4] + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33DWordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 1); + ulong c = 0, xVal = x; + ulong y00 = y & M; + c += xVal * y00 + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong y01 = y >> 32; + c += xVal * y01 + y00 + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += y01 + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(5, z, zOff, 4); + } + + public static uint Mul33WordAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 2); + ulong c = 0, yVal = y; + c += yVal * x + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += yVal + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(5, z, zOff, 3); + } + + public static uint MulWordDwordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 2); + ulong c = 0, xVal = x; + c += xVal * y + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(5, z, zOff, 3); + } + + public static uint MulWordsAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 3); + + ulong c = 0, xVal = x, yVal = y; + c += yVal * xVal + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(5, z, zOff, 2); + } + + public static uint MulWord(uint x, uint[] y, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < 5); + return (uint)c; + } + + public static void Square(uint[] x, uint[] zz) + { + ulong x_0 = x[0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 4, j = 10; + do + { + ulong xVal = x[i--]; + ulong p = xVal * xVal; + zz[--j] = (c << 31) | (uint)(p >> 33); + zz[--j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[1]; + ulong zz_2 = zz[2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[2]; + ulong zz_3 = zz[3]; + ulong zz_4 = zz[4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[3]; + ulong zz_5 = zz[5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[4]; + ulong zz_7 = zz[7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_8 += zz_7 >> 32; + } + + w = (uint)zz_5; + zz[5] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_6; + zz[6] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_7; + zz[7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[8] = (w << 1) | c; + c = w >> 31; + w = zz[9] + (uint)(zz_8 >> 32); + zz[9] = (w << 1) | c; + } + + public static void Square(uint[] x, int xOff, uint[] zz, int zzOff) + { + ulong x_0 = x[xOff + 0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 4, j = 10; + do + { + ulong xVal = x[xOff + i--]; + ulong p = xVal * xVal; + zz[zzOff + --j] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[zzOff + 0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[xOff + 1]; + ulong zz_2 = zz[zzOff + 2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[zzOff + 1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[xOff + 2]; + ulong zz_3 = zz[zzOff + 3]; + ulong zz_4 = zz[zzOff + 4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[zzOff + 2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[xOff + 3]; + ulong zz_5 = zz[zzOff + 5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[zzOff + 6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[zzOff + 3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[xOff + 4]; + ulong zz_7 = zz[zzOff + 7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[zzOff + 8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[zzOff + 4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_8 += zz_7 >> 32; + } + + w = (uint)zz_5; + zz[zzOff + 5] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_6; + zz[zzOff + 6] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_7; + zz[zzOff + 7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[zzOff + 8] = (w << 1) | c; + c = w >> 31; + w = zz[zzOff + 9] + (uint)(zz_8 >> 32); + zz[zzOff + 9] = (w << 1) | c; + } + + public static int Sub(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int Sub(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + c += (long)x[xOff + 0] - y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)x[xOff + 1] - y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)x[xOff + 2] - y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)x[xOff + 3] - y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)x[xOff + 4] - y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubBothFrom(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4]; + z[4] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + c += (long)z[zOff + 0] - x[xOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - x[xOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)z[zOff + 2] - x[xOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)z[zOff + 3] - x[xOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)z[zOff + 4] - x[xOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + return (int)c; + } + + public static BigInteger ToBigInteger(uint[] x) + { + byte[] bs = new byte[20]; + for (int i = 0; i < 5; ++i) + { + uint x_i = x[i]; + if (x_i != 0) + { + Pack.UInt32_To_BE(x_i, bs, (4 - i) << 2); + } + } + return new BigInteger(1, bs); + } + + public static void Zero(uint[] z) + { + z[0] = 0; + z[1] = 0; + z[2] = 0; + z[3] = 0; + z[4] = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs.meta new file mode 100644 index 00000000..e528ecb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f023e8d4a45302842b1396603a0cb71f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat160.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs new file mode 100644 index 00000000..e9892976 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs @@ -0,0 +1,1041 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat192 + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5]; + z[5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + c += (ulong)x[xOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddToEachOther(uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + c += (ulong)u[uOff + 0] + v[vOff + 0]; + u[uOff + 0] = (uint)c; + v[vOff + 0] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 1] + v[vOff + 1]; + u[uOff + 1] = (uint)c; + v[vOff + 1] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 2] + v[vOff + 2]; + u[uOff + 2] = (uint)c; + v[vOff + 2] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 3] + v[vOff + 3]; + u[uOff + 3] = (uint)c; + v[vOff + 3] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 4] + v[vOff + 4]; + u[uOff + 4] = (uint)c; + v[vOff + 4] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 5] + v[vOff + 5]; + u[uOff + 5] = (uint)c; + v[vOff + 5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static void Copy(uint[] x, uint[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + z[zOff + 5] = x[xOff + 5]; + } + + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + } + + public static uint[] Create() + { + return new uint[6]; + } + + public static ulong[] Create64() + { + return new ulong[3]; + } + + public static uint[] CreateExt() + { + return new uint[12]; + } + + public static ulong[] CreateExt64() + { + return new ulong[6]; + } + + public static bool Diff(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + bool pos = Gte(x, xOff, y, yOff); + if (pos) + { + Sub(x, xOff, y, yOff, z, zOff); + } + else + { + Sub(y, yOff, x, xOff, z, zOff); + } + return pos; + } + + public static bool Eq(uint[] x, uint[] y) + { + for (int i = 5; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 2; i >= 0; --i) + { + if (x[i] != y[i]) + { + return false; + } + } + return true; + } + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + { + return x[0] & 1; + } + int w = bit >> 5; + if (w < 0 || w >= 6) + { + return 0; + } + int b = bit & 31; + return (x[w] >> b) & 1; + } + + public static bool Gte(uint[] x, uint[] y) + { + for (int i = 5; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool Gte(uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = 5; i >= 0; --i) + { + uint x_i = x[xOff + i], y_i = y[yOff + i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool IsOne(uint[] x) + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < 6; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 3; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero(uint[] x) + { + for (int i = 0; i < 6; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 3; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + + { + ulong c = 0, x_0 = x[0]; + c += x_0 * y_0; + zz[0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[5] = (uint)c; + c >>= 32; + zz[6] = (uint)c; + } + + for (int i = 1; i < 6; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + zz[i + 6] = (uint)c; + } + } + + public static void Mul(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + + { + ulong c = 0, x_0 = x[xOff + 0]; + c += x_0 * y_0; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[zzOff + 5] = (uint)c; + c >>= 32; + zz[zzOff + 6] = (uint)c; + } + + for (int i = 1; i < 6; ++i) + { + ++zzOff; + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + zz[zzOff + 6] = (uint)c; + } + } + + public static uint MulAddTo(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + + ulong zc = 0; + for (int i = 0; i < 6; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + + zc += c + zz[i + 6]; + zz[i + 6] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + + ulong zc = 0; + for (int i = 0; i < 6; ++i) + { + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + + zc += c + zz[zzOff + 6]; + zz[zzOff + 6] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + + public static ulong Mul33Add(uint w, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + Debug.Assert(w >> 31 == 0); + + ulong c = 0, wVal = w; + ulong x0 = x[xOff + 0]; + c += wVal * x0 + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong x1 = x[xOff + 1]; + c += wVal * x1 + x0 + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + ulong x2 = x[xOff + 2]; + c += wVal * x2 + x1 + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + ulong x3 = x[xOff + 3]; + c += wVal * x3 + x2 + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + ulong x4 = x[xOff + 4]; + c += wVal * x4 + x3 + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + ulong x5 = x[xOff + 5]; + c += wVal * x5 + x4 + y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += x5; + return c; + } + + public static uint MulWordAddExt(uint x, uint[] yy, int yyOff, uint[] zz, int zzOff) + { + Debug.Assert(yyOff <= 6); + Debug.Assert(zzOff <= 6); + ulong c = 0, xVal = x; + c += xVal * yy[yyOff + 0] + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 1] + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 2] + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 3] + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 4] + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += xVal * yy[yyOff + 5] + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33DWordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 2); + ulong c = 0, xVal = x; + ulong y00 = y & M; + c += xVal * y00 + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong y01 = y >> 32; + c += xVal * y01 + y00 + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += y01 + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(6, z, zOff, 4); + } + + public static uint Mul33WordAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <=3); + ulong c = 0, yVal = y; + c += yVal * x + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += yVal + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(6, z, zOff, 3); + } + + public static uint MulWordDwordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 3); + ulong c = 0, xVal = x; + c += xVal * y + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(6, z, zOff, 3); + } + + public static uint MulWord(uint x, uint[] y, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < 6); + return (uint)c; + } + + public static void Square(uint[] x, uint[] zz) + { + ulong x_0 = x[0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 5, j = 12; + do + { + ulong xVal = x[i--]; + ulong p = xVal * xVal; + zz[--j] = (c << 31) | (uint)(p >> 33); + zz[--j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[1]; + ulong zz_2 = zz[2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[2]; + ulong zz_3 = zz[3]; + ulong zz_4 = zz[4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[3]; + ulong zz_5 = zz[5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[4]; + ulong zz_7 = zz[7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[5]; + ulong zz_9 = zz[9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_10 += zz_9 >> 32; + } + + w = (uint)zz_6; + zz[6] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_7; + zz[7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[10] = (w << 1) | c; + c = w >> 31; + w = zz[11] + (uint)(zz_10 >> 32); + zz[11] = (w << 1) | c; + } + + public static void Square(uint[] x, int xOff, uint[] zz, int zzOff) + { + ulong x_0 = x[xOff + 0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 5, j = 12; + do + { + ulong xVal = x[xOff + i--]; + ulong p = xVal * xVal; + zz[zzOff + --j] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[zzOff + 0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[xOff + 1]; + ulong zz_2 = zz[zzOff + 2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[zzOff + 1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[xOff + 2]; + ulong zz_3 = zz[zzOff + 3]; + ulong zz_4 = zz[zzOff + 4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[zzOff + 2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[xOff + 3]; + ulong zz_5 = zz[zzOff + 5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[zzOff + 6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[zzOff + 3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[xOff + 4]; + ulong zz_7 = zz[zzOff + 7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[zzOff + 8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[zzOff + 4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[xOff + 5]; + ulong zz_9 = zz[zzOff + 9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[zzOff + 10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[zzOff + 5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_10 += zz_9 >> 32; + } + + w = (uint)zz_6; + zz[zzOff + 6] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_7; + zz[zzOff + 7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[zzOff + 8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[zzOff + 9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[zzOff + 10] = (w << 1) | c; + c = w >> 31; + w = zz[zzOff + 11] + (uint)(zz_10 >> 32); + zz[zzOff + 11] = (w << 1) | c; + } + + public static int Sub(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int Sub(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + c += (long)x[xOff + 0] - y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)x[xOff + 1] - y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)x[xOff + 2] - y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)x[xOff + 3] - y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)x[xOff + 4] - y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)x[xOff + 5] - y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubBothFrom(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5]; + z[5] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + c += (long)z[zOff + 0] - x[xOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - x[xOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)z[zOff + 2] - x[xOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)z[zOff + 3] - x[xOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)z[zOff + 4] - x[xOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)z[zOff + 5] - x[xOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + return (int)c; + } + + public static BigInteger ToBigInteger(uint[] x) + { + byte[] bs = new byte[24]; + for (int i = 0; i < 6; ++i) + { + uint x_i = x[i]; + if (x_i != 0) + { + Pack.UInt32_To_BE(x_i, bs, (5 - i) << 2); + } + } + return new BigInteger(1, bs); + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[24]; + for (int i = 0; i < 3; ++i) + { + ulong x_i = x[i]; + if (x_i != 0L) + { + Pack.UInt64_To_BE(x_i, bs, (2 - i) << 3); + } + } + return new BigInteger(1, bs); + } + + public static void Zero(uint[] z) + { + z[0] = 0; + z[1] = 0; + z[2] = 0; + z[3] = 0; + z[4] = 0; + z[5] = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs.meta new file mode 100644 index 00000000..1d17d387 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0df4eec1471914e4ab2cce37354523a0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat192.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs new file mode 100644 index 00000000..75764141 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs @@ -0,0 +1,1178 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat224 + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + y[6]; + z[6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Add(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0; + c += (ulong)x[xOff + 0] + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + y[6] + z[6]; + z[6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0; + c += (ulong)x[xOff + 0] + y[yOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + y[yOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + y[yOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + y[yOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + y[yOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + y[yOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + y[yOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + z[6]; + z[6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + c += (ulong)x[xOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddToEachOther(uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + c += (ulong)u[uOff + 0] + v[vOff + 0]; + u[uOff + 0] = (uint)c; + v[vOff + 0] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 1] + v[vOff + 1]; + u[uOff + 1] = (uint)c; + v[vOff + 1] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 2] + v[vOff + 2]; + u[uOff + 2] = (uint)c; + v[vOff + 2] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 3] + v[vOff + 3]; + u[uOff + 3] = (uint)c; + v[vOff + 3] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 4] + v[vOff + 4]; + u[uOff + 4] = (uint)c; + v[vOff + 4] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 5] + v[vOff + 5]; + u[uOff + 5] = (uint)c; + v[vOff + 5] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 6] + v[vOff + 6]; + u[uOff + 6] = (uint)c; + v[vOff + 6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static void Copy(uint[] x, uint[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + z[6] = x[6]; + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + z[zOff + 5] = x[xOff + 5]; + z[zOff + 6] = x[xOff + 6]; + } + + public static uint[] Create() + { + return new uint[7]; + } + + public static uint[] CreateExt() + { + return new uint[14]; + } + + public static bool Diff(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + bool pos = Gte(x, xOff, y, yOff); + if (pos) + { + Sub(x, xOff, y, yOff, z, zOff); + } + else + { + Sub(y, yOff, x, xOff, z, zOff); + } + return pos; + } + + public static bool Eq(uint[] x, uint[] y) + { + for (int i = 6; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + { + return x[0] & 1; + } + int w = bit >> 5; + if (w < 0 || w >= 7) + { + return 0; + } + int b = bit & 31; + return (x[w] >> b) & 1; + } + + public static bool Gte(uint[] x, uint[] y) + { + for (int i = 6; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool Gte(uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = 6; i >= 0; --i) + { + uint x_i = x[xOff + i], y_i = y[yOff + i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool IsOne(uint[] x) + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < 7; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsZero(uint[] x) + { + for (int i = 0; i < 7; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + ulong y_6 = y[6]; + + { + ulong c = 0, x_0 = x[0]; + c += x_0 * y_0; + zz[0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[5] = (uint)c; + c >>= 32; + c += x_0 * y_6; + zz[6] = (uint)c; + c >>= 32; + zz[7] = (uint)c; + } + + for (int i = 1; i < 7; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[i + 6]; + zz[i + 6] = (uint)c; + c >>= 32; + zz[i + 7] = (uint)c; + } + } + + public static void Mul(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + ulong y_6 = y[yOff + 6]; + + { + ulong c = 0, x_0 = x[xOff + 0]; + c += x_0 * y_0; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_0 * y_6; + zz[zzOff + 6] = (uint)c; + c >>= 32; + zz[zzOff + 7] = (uint)c; + } + + for (int i = 1; i < 7; ++i) + { + ++zzOff; + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[zzOff + 6]; + zz[zzOff + 6] = (uint)c; + c >>= 32; + zz[zzOff + 7] = (uint)c; + } + } + + public static uint MulAddTo(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + ulong y_6 = y[6]; + + ulong zc = 0; + for (int i = 0; i < 7; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[i + 6]; + zz[i + 6] = (uint)c; + c >>= 32; + + zc += c + zz[i + 7]; + zz[i + 7] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + ulong y_6 = y[yOff + 6]; + + ulong zc = 0; + for (int i = 0; i < 7; ++i) + { + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[zzOff + 6]; + zz[zzOff + 6] = (uint)c; + c >>= 32; + + zc += c + zz[zzOff + 7]; + zz[zzOff + 7] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + + public static ulong Mul33Add(uint w, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + Debug.Assert(w >> 31 == 0); + + ulong c = 0, wVal = w; + ulong x0 = x[xOff + 0]; + c += wVal * x0 + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong x1 = x[xOff + 1]; + c += wVal * x1 + x0 + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + ulong x2 = x[xOff + 2]; + c += wVal * x2 + x1 + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + ulong x3 = x[xOff + 3]; + c += wVal * x3 + x2 + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + ulong x4 = x[xOff + 4]; + c += wVal * x4 + x3 + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + ulong x5 = x[xOff + 5]; + c += wVal * x5 + x4 + y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + ulong x6 = x[xOff + 6]; + c += wVal * x6 + x5 + y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += x6; + return c; + } + + public static uint MulByWord(uint x, uint[] z) + { + ulong c = 0, xVal = x; + c += xVal * (ulong)z[0]; + z[0] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[1]; + z[1] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[2]; + z[2] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[3]; + z[3] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[4]; + z[4] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[5]; + z[5] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[6]; + z[6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint MulByWordAddTo(uint x, uint[] y, uint[] z) + { + ulong c = 0, xVal = x; + c += xVal * (ulong)z[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[5] + y[5]; + z[5] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[6] + y[6]; + z[6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint MulWordAddTo(uint x, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + c += xVal * y[yOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33DWordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 3); + ulong c = 0, xVal = x; + ulong y00 = y & M; + c += xVal * y00 + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong y01 = y >> 32; + c += xVal * y01 + y00 + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += y01 + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(7, z, zOff, 4); + } + + public static uint Mul33WordAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 4); + ulong c = 0, yVal = y; + c += yVal * x + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += yVal + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(7, z, zOff, 3); + } + + public static uint MulWordDwordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 4); + ulong c = 0, xVal = x; + c += xVal * y + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(7, z, zOff, 3); + } + + public static uint MulWord(uint x, uint[] y, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < 7); + return (uint)c; + } + + public static void Square(uint[] x, uint[] zz) + { + ulong x_0 = x[0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 6, j = 14; + do + { + ulong xVal = x[i--]; + ulong p = xVal * xVal; + zz[--j] = (c << 31) | (uint)(p >> 33); + zz[--j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[1]; + ulong zz_2 = zz[2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[2]; + ulong zz_3 = zz[3]; + ulong zz_4 = zz[4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[3]; + ulong zz_5 = zz[5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[4]; + ulong zz_7 = zz[7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[5]; + ulong zz_9 = zz[9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_6 &= M; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_8 &= M; + zz_10 += zz_9 >> 32; + zz_9 &= M; + } + + ulong x_6 = x[6]; + ulong zz_11 = zz[11] + (zz_10 >> 32); zz_10 &= M; + ulong zz_12 = zz[12] + (zz_11 >> 32); zz_11 &= M; + { + zz_6 += x_6 * x_0; + w = (uint)zz_6; + zz[6] = (w << 1) | c; + c = w >> 31; + zz_7 += (zz_6 >> 32) + x_6 * x_1; + zz_8 += (zz_7 >> 32) + x_6 * x_2; + zz_9 += (zz_8 >> 32) + x_6 * x_3; + zz_10 += (zz_9 >> 32) + x_6 * x_4; + zz_11 += (zz_10 >> 32) + x_6 * x_5; + zz_12 += zz_11 >> 32; + } + + w = (uint)zz_7; + zz[7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[10] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_11; + zz[11] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_12; + zz[12] = (w << 1) | c; + c = w >> 31; + w = zz[13] + (uint)(zz_12 >> 32); + zz[13] = (w << 1) | c; + } + + public static void Square(uint[] x, int xOff, uint[] zz, int zzOff) + { + ulong x_0 = x[xOff + 0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 6, j = 14; + do + { + ulong xVal = x[xOff + i--]; + ulong p = xVal * xVal; + zz[zzOff + --j] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[zzOff + 0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[xOff + 1]; + ulong zz_2 = zz[zzOff + 2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[zzOff + 1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[xOff + 2]; + ulong zz_3 = zz[zzOff + 3]; + ulong zz_4 = zz[zzOff + 4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[zzOff + 2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[xOff + 3]; + ulong zz_5 = zz[zzOff + 5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[zzOff + 6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[zzOff + 3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[xOff + 4]; + ulong zz_7 = zz[zzOff + 7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[zzOff + 8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[zzOff + 4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[xOff + 5]; + ulong zz_9 = zz[zzOff + 9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[zzOff + 10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[zzOff + 5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_6 &= M; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_8 &= M; + zz_10 += zz_9 >> 32; + zz_9 &= M; + } + + ulong x_6 = x[xOff + 6]; + ulong zz_11 = zz[zzOff + 11] + (zz_10 >> 32); zz_10 &= M; + ulong zz_12 = zz[zzOff + 12] + (zz_11 >> 32); zz_11 &= M; + { + zz_6 += x_6 * x_0; + w = (uint)zz_6; + zz[zzOff + 6] = (w << 1) | c; + c = w >> 31; + zz_7 += (zz_6 >> 32) + x_6 * x_1; + zz_8 += (zz_7 >> 32) + x_6 * x_2; + zz_9 += (zz_8 >> 32) + x_6 * x_3; + zz_10 += (zz_9 >> 32) + x_6 * x_4; + zz_11 += (zz_10 >> 32) + x_6 * x_5; + zz_12 += zz_11 >> 32; + } + + w = (uint)zz_7; + zz[zzOff + 7] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_8; + zz[zzOff + 8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[zzOff + 9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[zzOff + 10] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_11; + zz[zzOff + 11] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_12; + zz[zzOff + 12] = (w << 1) | c; + c = w >> 31; + w = zz[zzOff + 13] + (uint)(zz_12 >> 32); + zz[zzOff + 13] = (w << 1) | c; + } + + public static int Sub(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)x[6] - y[6]; + z[6] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int Sub(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + c += (long)x[xOff + 0] - y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)x[xOff + 1] - y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)x[xOff + 2] - y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)x[xOff + 3] - y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)x[xOff + 4] - y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)x[xOff + 5] - y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (long)x[xOff + 6] - y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubBothFrom(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6] - x[6] - y[6]; + z[6] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6] - x[6]; + z[6] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + c += (long)z[zOff + 0] - x[xOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - x[xOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)z[zOff + 2] - x[xOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)z[zOff + 3] - x[xOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)z[zOff + 4] - x[xOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)z[zOff + 5] - x[xOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (long)z[zOff + 6] - x[xOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + return (int)c; + } + + public static BigInteger ToBigInteger(uint[] x) + { + byte[] bs = new byte[28]; + for (int i = 0; i < 7; ++i) + { + uint x_i = x[i]; + if (x_i != 0) + { + Pack.UInt32_To_BE(x_i, bs, (6 - i) << 2); + } + } + return new BigInteger(1, bs); + } + + public static void Zero(uint[] z) + { + z[0] = 0; + z[1] = 0; + z[2] = 0; + z[3] = 0; + z[4] = 0; + z[5] = 0; + z[6] = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs.meta new file mode 100644 index 00000000..1f09aead --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e307710879c3c9a419ca12b34097a671 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat224.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs new file mode 100644 index 00000000..8c989b6d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs @@ -0,0 +1,1454 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat256 + { + private const ulong M = 0xFFFFFFFFUL; + + public static uint Add(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + y[6]; + z[6] = (uint)c; + c >>= 32; + c += (ulong)x[7] + y[7]; + z[7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Add(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0; + c += (ulong)x[xOff + 0] + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 7] + y[yOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, uint[] y, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + y[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + y[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + y[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + y[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + y[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + y[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + y[6] + z[6]; + z[6] = (uint)c; + c >>= 32; + c += (ulong)x[7] + y[7] + z[7]; + z[7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddBothTo(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0; + c += (ulong)x[xOff + 0] + y[yOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + y[yOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + y[yOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + y[yOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + y[yOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + y[yOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + y[yOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 7] + y[yOff + 7] + z[zOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, uint[] z) + { + ulong c = 0; + c += (ulong)x[0] + z[0]; + z[0] = (uint)c; + c >>= 32; + c += (ulong)x[1] + z[1]; + z[1] = (uint)c; + c >>= 32; + c += (ulong)x[2] + z[2]; + z[2] = (uint)c; + c >>= 32; + c += (ulong)x[3] + z[3]; + z[3] = (uint)c; + c >>= 32; + c += (ulong)x[4] + z[4]; + z[4] = (uint)c; + c >>= 32; + c += (ulong)x[5] + z[5]; + z[5] = (uint)c; + c >>= 32; + c += (ulong)x[6] + z[6]; + z[6] = (uint)c; + c >>= 32; + c += (ulong)x[7] + z[7]; + z[7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddTo(uint[] x, int xOff, uint[] z, int zOff, uint cIn) + { + ulong c = cIn; + c += (ulong)x[xOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += (ulong)x[xOff + 7] + z[zOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint AddToEachOther(uint[] u, int uOff, uint[] v, int vOff) + { + ulong c = 0; + c += (ulong)u[uOff + 0] + v[vOff + 0]; + u[uOff + 0] = (uint)c; + v[vOff + 0] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 1] + v[vOff + 1]; + u[uOff + 1] = (uint)c; + v[vOff + 1] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 2] + v[vOff + 2]; + u[uOff + 2] = (uint)c; + v[vOff + 2] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 3] + v[vOff + 3]; + u[uOff + 3] = (uint)c; + v[vOff + 3] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 4] + v[vOff + 4]; + u[uOff + 4] = (uint)c; + v[vOff + 4] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 5] + v[vOff + 5]; + u[uOff + 5] = (uint)c; + v[vOff + 5] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 6] + v[vOff + 6]; + u[uOff + 6] = (uint)c; + v[vOff + 6] = (uint)c; + c >>= 32; + c += (ulong)u[uOff + 7] + v[vOff + 7]; + u[uOff + 7] = (uint)c; + v[vOff + 7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static void Copy(uint[] x, uint[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + z[6] = x[6]; + z[7] = x[7]; + } + + public static void Copy(uint[] x, int xOff, uint[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + z[zOff + 5] = x[xOff + 5]; + z[zOff + 6] = x[xOff + 6]; + z[zOff + 7] = x[xOff + 7]; + } + + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + } + + public static uint[] Create() + { + return new uint[8]; + } + + public static ulong[] Create64() + { + return new ulong[4]; + } + + public static uint[] CreateExt() + { + return new uint[16]; + } + + public static ulong[] CreateExt64() + { + return new ulong[8]; + } + + public static bool Diff(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + bool pos = Gte(x, xOff, y, yOff); + if (pos) + { + Sub(x, xOff, y, yOff, z, zOff); + } + else + { + Sub(y, yOff, x, xOff, z, zOff); + } + return pos; + } + + public static bool Eq(uint[] x, uint[] y) + { + for (int i = 7; i >= 0; --i) + { + if (x[i] != y[i]) + return false; + } + return true; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 3; i >= 0; --i) + { + if (x[i] != y[i]) + { + return false; + } + } + return true; + } + + public static uint GetBit(uint[] x, int bit) + { + if (bit == 0) + { + return x[0] & 1; + } + if ((bit & 255) != bit) + { + return 0; + } + int w = bit >> 5; + int b = bit & 31; + return (x[w] >> b) & 1; + } + + public static bool Gte(uint[] x, uint[] y) + { + for (int i = 7; i >= 0; --i) + { + uint x_i = x[i], y_i = y[i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool Gte(uint[] x, int xOff, uint[] y, int yOff) + { + for (int i = 7; i >= 0; --i) + { + uint x_i = x[xOff + i], y_i = y[yOff + i]; + if (x_i < y_i) + return false; + if (x_i > y_i) + return true; + } + return true; + } + + public static bool IsOne(uint[] x) + { + if (x[0] != 1) + { + return false; + } + for (int i = 1; i < 8; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 4; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero(uint[] x) + { + for (int i = 0; i < 8; ++i) + { + if (x[i] != 0) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 4; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + ulong y_6 = y[6]; + ulong y_7 = y[7]; + + { + ulong c = 0, x_0 = x[0]; + c += x_0 * y_0; + zz[0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[5] = (uint)c; + c >>= 32; + c += x_0 * y_6; + zz[6] = (uint)c; + c >>= 32; + c += x_0 * y_7; + zz[7] = (uint)c; + c >>= 32; + zz[8] = (uint)c; + } + + for (int i = 1; i < 8; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[i + 6]; + zz[i + 6] = (uint)c; + c >>= 32; + c += x_i * y_7 + zz[i + 7]; + zz[i + 7] = (uint)c; + c >>= 32; + zz[i + 8] = (uint)c; + } + } + + public static void Mul(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + ulong y_6 = y[yOff + 6]; + ulong y_7 = y[yOff + 7]; + + { + ulong c = 0, x_0 = x[xOff + 0]; + c += x_0 * y_0; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_0 * y_1; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_0 * y_2; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_0 * y_3; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_0 * y_4; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_0 * y_5; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_0 * y_6; + zz[zzOff + 6] = (uint)c; + c >>= 32; + c += x_0 * y_7; + zz[zzOff + 7] = (uint)c; + c >>= 32; + zz[zzOff + 8] = (uint)c; + } + + for (int i = 1; i < 8; ++i) + { + ++zzOff; + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[zzOff + 6]; + zz[zzOff + 6] = (uint)c; + c >>= 32; + c += x_i * y_7 + zz[zzOff + 7]; + zz[zzOff + 7] = (uint)c; + c >>= 32; + zz[zzOff + 8] = (uint)c; + } + } + + public static uint MulAddTo(uint[] x, uint[] y, uint[] zz) + { + ulong y_0 = y[0]; + ulong y_1 = y[1]; + ulong y_2 = y[2]; + ulong y_3 = y[3]; + ulong y_4 = y[4]; + ulong y_5 = y[5]; + ulong y_6 = y[6]; + ulong y_7 = y[7]; + + ulong zc = 0; + for (int i = 0; i < 8; ++i) + { + ulong c = 0, x_i = x[i]; + c += x_i * y_0 + zz[i + 0]; + zz[i + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[i + 1]; + zz[i + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[i + 2]; + zz[i + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[i + 3]; + zz[i + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[i + 4]; + zz[i + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[i + 5]; + zz[i + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[i + 6]; + zz[i + 6] = (uint)c; + c >>= 32; + c += x_i * y_7 + zz[i + 7]; + zz[i + 7] = (uint)c; + c >>= 32; + + zc += c + zz[i + 8]; + zz[i + 8] = (uint)zc; + zc >>= 32; + } + return (uint)zc; + } + + public static uint MulAddTo(uint[] x, int xOff, uint[] y, int yOff, uint[] zz, int zzOff) + { + ulong y_0 = y[yOff + 0]; + ulong y_1 = y[yOff + 1]; + ulong y_2 = y[yOff + 2]; + ulong y_3 = y[yOff + 3]; + ulong y_4 = y[yOff + 4]; + ulong y_5 = y[yOff + 5]; + ulong y_6 = y[yOff + 6]; + ulong y_7 = y[yOff + 7]; + + ulong zc = 0; + for (int i = 0; i < 8; ++i) + { + ulong c = 0, x_i = x[xOff + i]; + c += x_i * y_0 + zz[zzOff + 0]; + zz[zzOff + 0] = (uint)c; + c >>= 32; + c += x_i * y_1 + zz[zzOff + 1]; + zz[zzOff + 1] = (uint)c; + c >>= 32; + c += x_i * y_2 + zz[zzOff + 2]; + zz[zzOff + 2] = (uint)c; + c >>= 32; + c += x_i * y_3 + zz[zzOff + 3]; + zz[zzOff + 3] = (uint)c; + c >>= 32; + c += x_i * y_4 + zz[zzOff + 4]; + zz[zzOff + 4] = (uint)c; + c >>= 32; + c += x_i * y_5 + zz[zzOff + 5]; + zz[zzOff + 5] = (uint)c; + c >>= 32; + c += x_i * y_6 + zz[zzOff + 6]; + zz[zzOff + 6] = (uint)c; + c >>= 32; + c += x_i * y_7 + zz[zzOff + 7]; + zz[zzOff + 7] = (uint)c; + c >>= 32; + + zc += c + zz[zzOff + 8]; + zz[zzOff + 8] = (uint)zc; + zc >>= 32; + ++zzOff; + } + return (uint)zc; + } + + public static ulong Mul33Add(uint w, uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + Debug.Assert(w >> 31 == 0); + + ulong c = 0, wVal = w; + ulong x0 = x[xOff + 0]; + c += wVal * x0 + y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong x1 = x[xOff + 1]; + c += wVal * x1 + x0 + y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + ulong x2 = x[xOff + 2]; + c += wVal * x2 + x1 + y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + ulong x3 = x[xOff + 3]; + c += wVal * x3 + x2 + y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + ulong x4 = x[xOff + 4]; + c += wVal * x4 + x3 + y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + ulong x5 = x[xOff + 5]; + c += wVal * x5 + x4 + y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + ulong x6 = x[xOff + 6]; + c += wVal * x6 + x5 + y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + ulong x7 = x[xOff + 7]; + c += wVal * x7 + x6 + y[yOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + c += x7; + return c; + } + + public static uint MulByWord(uint x, uint[] z) + { + ulong c = 0, xVal = x; + c += xVal * (ulong)z[0]; + z[0] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[1]; + z[1] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[2]; + z[2] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[3]; + z[3] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[4]; + z[4] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[5]; + z[5] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[6]; + z[6] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[7]; + z[7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint MulByWordAddTo(uint x, uint[] y, uint[] z) + { + ulong c = 0, xVal = x; + c += xVal * (ulong)z[0] + y[0]; + z[0] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[1] + y[1]; + z[1] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[2] + y[2]; + z[2] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[3] + y[3]; + z[3] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[4] + y[4]; + z[4] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[5] + y[5]; + z[5] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[6] + y[6]; + z[6] = (uint)c; + c >>= 32; + c += xVal * (ulong)z[7] + y[7]; + z[7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint MulWordAddTo(uint x, uint[] y, int yOff, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + c += xVal * y[yOff + 0] + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 1] + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 2] + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 3] + z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 4] + z[zOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 5] + z[zOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 6] + z[zOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += xVal * y[yOff + 7] + z[zOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (uint)c; + } + + public static uint Mul33DWordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 4); + ulong c = 0, xVal = x; + ulong y00 = y & M; + c += xVal * y00 + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + ulong y01 = y >> 32; + c += xVal * y01 + y00 + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += y01 + z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += z[zOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(8, z, zOff, 4); + } + + public static uint Mul33WordAdd(uint x, uint y, uint[] z, int zOff) + { + Debug.Assert(x >> 31 == 0); + Debug.Assert(zOff <= 5); + ulong c = 0, yVal = y; + c += yVal * x + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += yVal + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(8, z, zOff, 3); + } + + public static uint MulWordDwordAdd(uint x, ulong y, uint[] z, int zOff) + { + Debug.Assert(zOff <= 5); + ulong c = 0, xVal = x; + c += xVal * y + z[zOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += xVal * (y >> 32) + z[zOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += z[zOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + return c == 0 ? 0 : Nat.IncAt(8, z, zOff, 3); + } + + public static uint MulWord(uint x, uint[] y, uint[] z, int zOff) + { + ulong c = 0, xVal = x; + int i = 0; + do + { + c += xVal * y[i]; + z[zOff + i] = (uint)c; + c >>= 32; + } + while (++i < 8); + return (uint)c; + } + + public static void Square(uint[] x, uint[] zz) + { + ulong x_0 = x[0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 7, j = 16; + do + { + ulong xVal = x[i--]; + ulong p = xVal * xVal; + zz[--j] = (c << 31) | (uint)(p >> 33); + zz[--j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[1]; + ulong zz_2 = zz[2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[2]; + ulong zz_3 = zz[3]; + ulong zz_4 = zz[4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[3]; + ulong zz_5 = zz[5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[4]; + ulong zz_7 = zz[7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[5]; + ulong zz_9 = zz[9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_6 &= M; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_8 &= M; + zz_10 += zz_9 >> 32; + zz_9 &= M; + } + + ulong x_6 = x[6]; + ulong zz_11 = zz[11] + (zz_10 >> 32); zz_10 &= M; + ulong zz_12 = zz[12] + (zz_11 >> 32); zz_11 &= M; + { + zz_6 += x_6 * x_0; + w = (uint)zz_6; + zz[6] = (w << 1) | c; + c = w >> 31; + zz_7 += (zz_6 >> 32) + x_6 * x_1; + zz_8 += (zz_7 >> 32) + x_6 * x_2; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_6 * x_3; + zz_8 &= M; + zz_10 += (zz_9 >> 32) + x_6 * x_4; + zz_9 &= M; + zz_11 += (zz_10 >> 32) + x_6 * x_5; + zz_10 &= M; + zz_12 += zz_11 >> 32; + zz_11 &= M; + } + + ulong x_7 = x[7]; + ulong zz_13 = zz[13] + (zz_12 >> 32); zz_12 &= M; + ulong zz_14 = zz[14] + (zz_13 >> 32); zz_13 &= M; + { + zz_7 += x_7 * x_0; + w = (uint)zz_7; + zz[7] = (w << 1) | c; + c = w >> 31; + zz_8 += (zz_7 >> 32) + x_7 * x_1; + zz_9 += (zz_8 >> 32) + x_7 * x_2; + zz_10 += (zz_9 >> 32) + x_7 * x_3; + zz_11 += (zz_10 >> 32) + x_7 * x_4; + zz_12 += (zz_11 >> 32) + x_7 * x_5; + zz_13 += (zz_12 >> 32) + x_7 * x_6; + zz_14 += zz_13 >> 32; + } + + w = (uint)zz_8; + zz[8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[10] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_11; + zz[11] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_12; + zz[12] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_13; + zz[13] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_14; + zz[14] = (w << 1) | c; + c = w >> 31; + w = zz[15] + (uint)(zz_14 >> 32); + zz[15] = (w << 1) | c; + } + + public static void Square(uint[] x, int xOff, uint[] zz, int zzOff) + { + ulong x_0 = x[xOff + 0]; + ulong zz_1; + + uint c = 0, w; + { + int i = 7, j = 16; + do + { + ulong xVal = x[xOff + i--]; + ulong p = xVal * xVal; + zz[zzOff + --j] = (c << 31) | (uint)(p >> 33); + zz[zzOff + --j] = (uint)(p >> 1); + c = (uint)p; + } + while (i > 0); + + { + ulong p = x_0 * x_0; + zz_1 = (ulong)(c << 31) | (p >> 33); + zz[zzOff + 0] = (uint)p; + c = (uint)(p >> 32) & 1; + } + } + + ulong x_1 = x[xOff + 1]; + ulong zz_2 = zz[zzOff + 2]; + + { + zz_1 += x_1 * x_0; + w = (uint)zz_1; + zz[zzOff + 1] = (w << 1) | c; + c = w >> 31; + zz_2 += zz_1 >> 32; + } + + ulong x_2 = x[xOff + 2]; + ulong zz_3 = zz[zzOff + 3]; + ulong zz_4 = zz[zzOff + 4]; + { + zz_2 += x_2 * x_0; + w = (uint)zz_2; + zz[zzOff + 2] = (w << 1) | c; + c = w >> 31; + zz_3 += (zz_2 >> 32) + x_2 * x_1; + zz_4 += zz_3 >> 32; + zz_3 &= M; + } + + ulong x_3 = x[xOff + 3]; + ulong zz_5 = zz[zzOff + 5] + (zz_4 >> 32); zz_4 &= M; + ulong zz_6 = zz[zzOff + 6] + (zz_5 >> 32); zz_5 &= M; + { + zz_3 += x_3 * x_0; + w = (uint)zz_3; + zz[zzOff + 3] = (w << 1) | c; + c = w >> 31; + zz_4 += (zz_3 >> 32) + x_3 * x_1; + zz_5 += (zz_4 >> 32) + x_3 * x_2; + zz_4 &= M; + zz_6 += zz_5 >> 32; + zz_5 &= M; + } + + ulong x_4 = x[xOff + 4]; + ulong zz_7 = zz[zzOff + 7] + (zz_6 >> 32); zz_6 &= M; + ulong zz_8 = zz[zzOff + 8] + (zz_7 >> 32); zz_7 &= M; + { + zz_4 += x_4 * x_0; + w = (uint)zz_4; + zz[zzOff + 4] = (w << 1) | c; + c = w >> 31; + zz_5 += (zz_4 >> 32) + x_4 * x_1; + zz_6 += (zz_5 >> 32) + x_4 * x_2; + zz_5 &= M; + zz_7 += (zz_6 >> 32) + x_4 * x_3; + zz_6 &= M; + zz_8 += zz_7 >> 32; + zz_7 &= M; + } + + ulong x_5 = x[xOff + 5]; + ulong zz_9 = zz[zzOff + 9] + (zz_8 >> 32); zz_8 &= M; + ulong zz_10 = zz[zzOff + 10] + (zz_9 >> 32); zz_9 &= M; + { + zz_5 += x_5 * x_0; + w = (uint)zz_5; + zz[zzOff + 5] = (w << 1) | c; + c = w >> 31; + zz_6 += (zz_5 >> 32) + x_5 * x_1; + zz_7 += (zz_6 >> 32) + x_5 * x_2; + zz_6 &= M; + zz_8 += (zz_7 >> 32) + x_5 * x_3; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_5 * x_4; + zz_8 &= M; + zz_10 += zz_9 >> 32; + zz_9 &= M; + } + + ulong x_6 = x[xOff + 6]; + ulong zz_11 = zz[zzOff + 11] + (zz_10 >> 32); zz_10 &= M; + ulong zz_12 = zz[zzOff + 12] + (zz_11 >> 32); zz_11 &= M; + { + zz_6 += x_6 * x_0; + w = (uint)zz_6; + zz[zzOff + 6] = (w << 1) | c; + c = w >> 31; + zz_7 += (zz_6 >> 32) + x_6 * x_1; + zz_8 += (zz_7 >> 32) + x_6 * x_2; + zz_7 &= M; + zz_9 += (zz_8 >> 32) + x_6 * x_3; + zz_8 &= M; + zz_10 += (zz_9 >> 32) + x_6 * x_4; + zz_9 &= M; + zz_11 += (zz_10 >> 32) + x_6 * x_5; + zz_10 &= M; + zz_12 += zz_11 >> 32; + zz_11 &= M; + } + + ulong x_7 = x[xOff + 7]; + ulong zz_13 = zz[zzOff + 13] + (zz_12 >> 32); zz_12 &= M; + ulong zz_14 = zz[zzOff + 14] + (zz_13 >> 32); zz_13 &= M; + { + zz_7 += x_7 * x_0; + w = (uint)zz_7; + zz[zzOff + 7] = (w << 1) | c; + c = w >> 31; + zz_8 += (zz_7 >> 32) + x_7 * x_1; + zz_9 += (zz_8 >> 32) + x_7 * x_2; + zz_10 += (zz_9 >> 32) + x_7 * x_3; + zz_11 += (zz_10 >> 32) + x_7 * x_4; + zz_12 += (zz_11 >> 32) + x_7 * x_5; + zz_13 += (zz_12 >> 32) + x_7 * x_6; + zz_14 += zz_13 >> 32; + } + + w = (uint)zz_8; + zz[zzOff + 8] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_9; + zz[zzOff + 9] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_10; + zz[zzOff + 10] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_11; + zz[zzOff + 11] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_12; + zz[zzOff + 12] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_13; + zz[zzOff + 13] = (w << 1) | c; + c = w >> 31; + w = (uint)zz_14; + zz[zzOff + 14] = (w << 1) | c; + c = w >> 31; + w = zz[zzOff + 15] + (uint)(zz_14 >> 32); + zz[zzOff + 15] = (w << 1) | c; + } + + public static int Sub(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)x[6] - y[6]; + z[6] = (uint)c; + c >>= 32; + c += (long)x[7] - y[7]; + z[7] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int Sub(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { + long c = 0; + c += (long)x[xOff + 0] - y[yOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)x[xOff + 1] - y[yOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)x[xOff + 2] - y[yOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)x[xOff + 3] - y[yOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)x[xOff + 4] - y[yOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)x[xOff + 5] - y[yOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (long)x[xOff + 6] - y[yOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += (long)x[xOff + 7] - y[yOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubBothFrom(uint[] x, uint[] y, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0] - y[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1] - y[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2] - y[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3] - y[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4] - y[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5] - y[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6] - x[6] - y[6]; + z[6] = (uint)c; + c >>= 32; + c += (long)z[7] - x[7] - y[7]; + z[7] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, uint[] z) + { + long c = 0; + c += (long)z[0] - x[0]; + z[0] = (uint)c; + c >>= 32; + c += (long)z[1] - x[1]; + z[1] = (uint)c; + c >>= 32; + c += (long)z[2] - x[2]; + z[2] = (uint)c; + c >>= 32; + c += (long)z[3] - x[3]; + z[3] = (uint)c; + c >>= 32; + c += (long)z[4] - x[4]; + z[4] = (uint)c; + c >>= 32; + c += (long)z[5] - x[5]; + z[5] = (uint)c; + c >>= 32; + c += (long)z[6] - x[6]; + z[6] = (uint)c; + c >>= 32; + c += (long)z[7] - x[7]; + z[7] = (uint)c; + c >>= 32; + return (int)c; + } + + public static int SubFrom(uint[] x, int xOff, uint[] z, int zOff) + { + long c = 0; + c += (long)z[zOff + 0] - x[xOff + 0]; + z[zOff + 0] = (uint)c; + c >>= 32; + c += (long)z[zOff + 1] - x[xOff + 1]; + z[zOff + 1] = (uint)c; + c >>= 32; + c += (long)z[zOff + 2] - x[xOff + 2]; + z[zOff + 2] = (uint)c; + c >>= 32; + c += (long)z[zOff + 3] - x[xOff + 3]; + z[zOff + 3] = (uint)c; + c >>= 32; + c += (long)z[zOff + 4] - x[xOff + 4]; + z[zOff + 4] = (uint)c; + c >>= 32; + c += (long)z[zOff + 5] - x[xOff + 5]; + z[zOff + 5] = (uint)c; + c >>= 32; + c += (long)z[zOff + 6] - x[xOff + 6]; + z[zOff + 6] = (uint)c; + c >>= 32; + c += (long)z[zOff + 7] - x[xOff + 7]; + z[zOff + 7] = (uint)c; + c >>= 32; + return (int)c; + } + + public static BigInteger ToBigInteger(uint[] x) + { + byte[] bs = new byte[32]; + for (int i = 0; i < 8; ++i) + { + uint x_i = x[i]; + if (x_i != 0) + { + Pack.UInt32_To_BE(x_i, bs, (7 - i) << 2); + } + } + return new BigInteger(1, bs); + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[32]; + for (int i = 0; i < 4; ++i) + { + ulong x_i = x[i]; + if (x_i != 0L) + { + Pack.UInt64_To_BE(x_i, bs, (3 - i) << 3); + } + } + return new BigInteger(1, bs); + } + + public static void Xor(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor(x.AsSpan(xOff), y.AsSpan(yOff), z.AsSpan(zOff)); +#else + for (int i = 0; i < 8; i += 4) + { + z[zOff + i + 0] = x[xOff + i + 0] ^ y[yOff + i + 0]; + z[zOff + i + 1] = x[xOff + i + 1] ^ y[yOff + i + 1]; + z[zOff + i + 2] = x[xOff + i + 2] ^ y[yOff + i + 2]; + z[zOff + i + 3] = x[xOff + i + 3] ^ y[yOff + i + 3]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Xor(ReadOnlySpan x, ReadOnlySpan y, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported && Unsafe.SizeOf>() == 32) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Y = MemoryMarshal.AsBytes(y[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x20]); + var Y0 = MemoryMarshal.Read>(Y[0x00..0x20]); + + var Z0 = Avx2.Xor(X0, Y0); + + MemoryMarshal.Write(Z[0x00..0x20], ref Z0); + return; + } + + if (Sse2.IsSupported && Unsafe.SizeOf>() == 16) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Y = MemoryMarshal.AsBytes(y[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x10]); + var X1 = MemoryMarshal.Read>(X[0x10..0x20]); + + var Y0 = MemoryMarshal.Read>(Y[0x00..0x10]); + var Y1 = MemoryMarshal.Read>(Y[0x10..0x20]); + + var Z0 = Sse2.Xor(X0, Y0); + var Z1 = Sse2.Xor(X1, Y1); + + MemoryMarshal.Write(Z[0x00..0x10], ref Z0); + MemoryMarshal.Write(Z[0x10..0x20], ref Z1); + return; + } +#endif + + for (int i = 0; i < 8; i += 4) + { + z[i + 0] = x[i + 0] ^ y[i + 0]; + z[i + 1] = x[i + 1] ^ y[i + 1]; + z[i + 2] = x[i + 2] ^ y[i + 2]; + z[i + 3] = x[i + 3] ^ y[i + 3]; + } + } +#endif + + public static void Zero(uint[] z) + { + z[0] = 0; + z[1] = 0; + z[2] = 0; + z[3] = 0; + z[4] = 0; + z[5] = 0; + z[6] = 0; + z[7] = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs.meta new file mode 100644 index 00000000..a07ccf29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c70eb2d09a9fe1439fc104e0fa629b3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat256.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs new file mode 100644 index 00000000..a3924806 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs @@ -0,0 +1,96 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat320 + { + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + } + + public static ulong[] Create64() + { + return new ulong[5]; + } + + public static ulong[] CreateExt64() + { + return new ulong[10]; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 4; i >= 0; --i) + { + if (x[i] != y[i]) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 5; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 5; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[40]; + for (int i = 0; i < 5; ++i) + { + ulong x_i = x[i]; + if (x_i != 0L) + { + Pack.UInt64_To_BE(x_i, bs, (4 - i) << 3); + } + } + return new BigInteger(1, bs); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs.meta new file mode 100644 index 00000000..f0183087 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 309130aee4bc22543a4d95a42c092f6a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat320.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs new file mode 100644 index 00000000..9e92ec63 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat384 + { + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + Nat192.Mul(x, y, zz); + Nat192.Mul(x, 6, y, 6, zz, 12); + + uint c18 = Nat192.AddToEachOther(zz, 6, zz, 12); + uint c12 = c18 + Nat192.AddTo(zz, 0, zz, 6, 0); + c18 += Nat192.AddTo(zz, 18, zz, 12, c12); + + uint[] dx = Nat192.Create(), dy = Nat192.Create(); + bool neg = Nat192.Diff(x, 6, x, 0, dx, 0) != Nat192.Diff(y, 6, y, 0, dy, 0); + + uint[] tt = Nat192.CreateExt(); + Nat192.Mul(dx, dy, tt); + + c18 += neg ? Nat.AddTo(12, tt, 0, zz, 6) : (uint)Nat.SubFrom(12, tt, 0, zz, 6); + Nat.AddWordAt(24, c18, zz, 18); + } + + public static void Square(uint[] x, uint[] zz) + { + Nat192.Square(x, zz); + Nat192.Square(x, 6, zz, 12); + + uint c18 = Nat192.AddToEachOther(zz, 6, zz, 12); + uint c12 = c18 + Nat192.AddTo(zz, 0, zz, 6, 0); + c18 += Nat192.AddTo(zz, 18, zz, 12, c12); + + uint[] dx = Nat192.Create(); + Nat192.Diff(x, 6, x, 0, dx, 0); + + uint[] m = Nat192.CreateExt(); + Nat192.Square(dx, m); + + c18 += (uint)Nat.SubFrom(12, m, 0, zz, 6); + Nat.AddWordAt(24, c18, zz, 18); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs.meta new file mode 100644 index 00000000..f455c2a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: babe821f27a2e0a4abe69c2a8cc40d6b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat384.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs new file mode 100644 index 00000000..485eec4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs @@ -0,0 +1,138 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat448 + { + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + z[6] = x[6]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + z[zOff + 5] = x[xOff + 5]; + z[zOff + 6] = x[xOff + 6]; + } + + public static ulong[] Create64() + { + return new ulong[7]; + } + + public static ulong[] CreateExt64() + { + return new ulong[14]; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 6; i >= 0; --i) + { + if (x[i] != y[i]) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 7; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 7; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + Nat224.Mul(x, y, zz); + Nat224.Mul(x, 7, y, 7, zz, 14); + + uint c21 = Nat224.AddToEachOther(zz, 7, zz, 14); + uint c14 = c21 + Nat224.AddTo(zz, 0, zz, 7, 0); + c21 += Nat224.AddTo(zz, 21, zz, 14, c14); + + uint[] dx = Nat224.Create(), dy = Nat224.Create(); + bool neg = Nat224.Diff(x, 7, x, 0, dx, 0) != Nat224.Diff(y, 7, y, 0, dy, 0); + + uint[] tt = Nat224.CreateExt(); + Nat224.Mul(dx, dy, tt); + + c21 += neg ? Nat.AddTo(14, tt, 0, zz, 7) : (uint)Nat.SubFrom(14, tt, 0, zz, 7); + Nat.AddWordAt(28, c21, zz, 21); + } + + public static void Square(uint[] x, uint[] zz) + { + Nat224.Square(x, zz); + Nat224.Square(x, 7, zz, 14); + + uint c21 = Nat224.AddToEachOther(zz, 7, zz, 14); + uint c14 = c21 + Nat224.AddTo(zz, 0, zz, 7, 0); + c21 += Nat224.AddTo(zz, 21, zz, 14, c14); + + uint[] dx = Nat224.Create(); + Nat224.Diff(x, 7, x, 0, dx, 0); + + uint[] tt = Nat224.CreateExt(); + Nat224.Square(dx, tt); + + c21 += (uint)Nat.SubFrom(14, tt, 0, zz, 7); + Nat.AddWordAt(28, c21, zz, 21); + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[56]; + for (int i = 0; i < 7; ++i) + { + ulong x_i = x[i]; + if (x_i != 0L) + { + Pack.UInt64_To_BE(x_i, bs, (6 - i) << 3); + } + } + return new BigInteger(1, bs); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs.meta new file mode 100644 index 00000000..d291e699 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9377779e96ae29e40a19ab66c70992c7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat448.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs new file mode 100644 index 00000000..d4263df0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs @@ -0,0 +1,363 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat512 + { + public static void Mul(uint[] x, uint[] y, uint[] zz) + { + Nat256.Mul(x, y, zz); + Nat256.Mul(x, 8, y, 8, zz, 16); + + uint c24 = Nat256.AddToEachOther(zz, 8, zz, 16); + uint c16 = c24 + Nat256.AddTo(zz, 0, zz, 8, 0); + c24 += Nat256.AddTo(zz, 24, zz, 16, c16); + + uint[] dx = Nat256.Create(), dy = Nat256.Create(); + bool neg = Nat256.Diff(x, 8, x, 0, dx, 0) != Nat256.Diff(y, 8, y, 0, dy, 0); + + uint[] tt = Nat256.CreateExt(); + Nat256.Mul(dx, dy, tt); + + c24 += neg ? Nat.AddTo(16, tt, 0, zz, 8) : (uint)Nat.SubFrom(16, tt, 0, zz, 8); + Nat.AddWordAt(32, c24, zz, 24); + } + + public static void Square(uint[] x, uint[] zz) + { + Nat256.Square(x, zz); + Nat256.Square(x, 8, zz, 16); + + uint c24 = Nat256.AddToEachOther(zz, 8, zz, 16); + uint c16 = c24 + Nat256.AddTo(zz, 0, zz, 8, 0); + c24 += Nat256.AddTo(zz, 24, zz, 16, c16); + + uint[] dx = Nat256.Create(); + Nat256.Diff(x, 8, x, 0, dx, 0); + + uint[] m = Nat256.CreateExt(); + Nat256.Square(dx, m); + + c24 += (uint)Nat.SubFrom(16, m, 0, zz, 8); + Nat.AddWordAt(32, c24, zz, 24); + } + + public static void Xor(uint[] x, int xOff, uint[] y, int yOff, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor(x.AsSpan(xOff), y.AsSpan(yOff), z.AsSpan(zOff)); +#else + for (int i = 0; i < 16; i += 4) + { + z[zOff + i + 0] = x[xOff + i + 0] ^ y[yOff + i + 0]; + z[zOff + i + 1] = x[xOff + i + 1] ^ y[yOff + i + 1]; + z[zOff + i + 2] = x[xOff + i + 2] ^ y[yOff + i + 2]; + z[zOff + i + 3] = x[xOff + i + 3] ^ y[yOff + i + 3]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Xor(ReadOnlySpan x, ReadOnlySpan y, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported && Unsafe.SizeOf>() == 32) + { + var X = MemoryMarshal.AsBytes(x[..16]); + var Y = MemoryMarshal.AsBytes(y[..16]); + var Z = MemoryMarshal.AsBytes(z[..16]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x20]); + var X1 = MemoryMarshal.Read>(X[0x20..0x40]); + + var Y0 = MemoryMarshal.Read>(Y[0x00..0x20]); + var Y1 = MemoryMarshal.Read>(Y[0x20..0x40]); + + var Z0 = Avx2.Xor(X0, Y0); + var Z1 = Avx2.Xor(X1, Y1); + + MemoryMarshal.Write(Z[0x00..0x20], ref Z0); + MemoryMarshal.Write(Z[0x20..0x40], ref Z1); + return; + } + + if (Sse2.IsSupported && Unsafe.SizeOf>() == 16) + { + var X = MemoryMarshal.AsBytes(x[..16]); + var Y = MemoryMarshal.AsBytes(y[..16]); + var Z = MemoryMarshal.AsBytes(z[..16]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x10]); + var X1 = MemoryMarshal.Read>(X[0x10..0x20]); + var X2 = MemoryMarshal.Read>(X[0x20..0x30]); + var X3 = MemoryMarshal.Read>(X[0x30..0x40]); + + var Y0 = MemoryMarshal.Read>(Y[0x00..0x10]); + var Y1 = MemoryMarshal.Read>(Y[0x10..0x20]); + var Y2 = MemoryMarshal.Read>(Y[0x20..0x30]); + var Y3 = MemoryMarshal.Read>(Y[0x30..0x40]); + + var Z0 = Sse2.Xor(X0, Y0); + var Z1 = Sse2.Xor(X1, Y1); + var Z2 = Sse2.Xor(X2, Y2); + var Z3 = Sse2.Xor(X3, Y3); + + MemoryMarshal.Write(Z[0x00..0x10], ref Z0); + MemoryMarshal.Write(Z[0x10..0x20], ref Z1); + MemoryMarshal.Write(Z[0x20..0x30], ref Z2); + MemoryMarshal.Write(Z[0x30..0x40], ref Z3); + return; + } +#endif + + for (int i = 0; i < 16; i += 4) + { + z[i + 0] = x[i + 0] ^ y[i + 0]; + z[i + 1] = x[i + 1] ^ y[i + 1]; + z[i + 2] = x[i + 2] ^ y[i + 2]; + z[i + 3] = x[i + 3] ^ y[i + 3]; + } + } +#endif + + public static void XorTo(uint[] x, int xOff, uint[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo(x.AsSpan(xOff), z.AsSpan(zOff)); +#else + for (int i = 0; i < 16; i += 4) + { + z[zOff + i + 0] ^= x[xOff + i + 0]; + z[zOff + i + 1] ^= x[xOff + i + 1]; + z[zOff + i + 2] ^= x[xOff + i + 2]; + z[zOff + i + 3] ^= x[xOff + i + 3]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void XorTo(ReadOnlySpan x, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported && Unsafe.SizeOf>() == 32) + { + var X = MemoryMarshal.AsBytes(x[..16]); + var Z = MemoryMarshal.AsBytes(z[..16]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x20]); + var X1 = MemoryMarshal.Read>(X[0x20..0x40]); + + var Y0 = MemoryMarshal.Read>(Z[0x00..0x20]); + var Y1 = MemoryMarshal.Read>(Z[0x20..0x40]); + + var Z0 = Avx2.Xor(X0, Y0); + var Z1 = Avx2.Xor(X1, Y1); + + MemoryMarshal.Write(Z[0x00..0x20], ref Z0); + MemoryMarshal.Write(Z[0x20..0x40], ref Z1); + return; + } + + if (Sse2.IsSupported && Unsafe.SizeOf>() == 16) + { + var X = MemoryMarshal.AsBytes(x[..16]); + var Z = MemoryMarshal.AsBytes(z[..16]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x10]); + var X1 = MemoryMarshal.Read>(X[0x10..0x20]); + var X2 = MemoryMarshal.Read>(X[0x20..0x30]); + var X3 = MemoryMarshal.Read>(X[0x30..0x40]); + + var Y0 = MemoryMarshal.Read>(Z[0x00..0x10]); + var Y1 = MemoryMarshal.Read>(Z[0x10..0x20]); + var Y2 = MemoryMarshal.Read>(Z[0x20..0x30]); + var Y3 = MemoryMarshal.Read>(Z[0x30..0x40]); + + var Z0 = Sse2.Xor(X0, Y0); + var Z1 = Sse2.Xor(X1, Y1); + var Z2 = Sse2.Xor(X2, Y2); + var Z3 = Sse2.Xor(X3, Y3); + + MemoryMarshal.Write(Z[0x00..0x10], ref Z0); + MemoryMarshal.Write(Z[0x10..0x20], ref Z1); + MemoryMarshal.Write(Z[0x20..0x30], ref Z2); + MemoryMarshal.Write(Z[0x30..0x40], ref Z3); + return; + } +#endif + + for (int i = 0; i < 16; i += 4) + { + z[i + 0] ^= x[i + 0]; + z[i + 1] ^= x[i + 1]; + z[i + 2] ^= x[i + 2]; + z[i + 3] ^= x[i + 3]; + } + } +#endif + + public static void Xor64(ulong[] x, int xOff, ulong[] y, int yOff, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Xor64(x.AsSpan(xOff), y.AsSpan(yOff), z.AsSpan(zOff)); +#else + for (int i = 0; i < 8; i += 4) + { + z[zOff + i + 0] = x[xOff + i + 0] ^ y[yOff + i + 0]; + z[zOff + i + 1] = x[xOff + i + 1] ^ y[yOff + i + 1]; + z[zOff + i + 2] = x[xOff + i + 2] ^ y[yOff + i + 2]; + z[zOff + i + 3] = x[xOff + i + 3] ^ y[yOff + i + 3]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Xor64(ReadOnlySpan x, ReadOnlySpan y, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported && Unsafe.SizeOf>() == 32) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Y = MemoryMarshal.AsBytes(y[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x20]); + var X1 = MemoryMarshal.Read>(X[0x20..0x40]); + + var Y0 = MemoryMarshal.Read>(Y[0x00..0x20]); + var Y1 = MemoryMarshal.Read>(Y[0x20..0x40]); + + var Z0 = Avx2.Xor(X0, Y0); + var Z1 = Avx2.Xor(X1, Y1); + + MemoryMarshal.Write(Z[0x00..0x20], ref Z0); + MemoryMarshal.Write(Z[0x20..0x40], ref Z1); + return; + } + + if (Sse2.IsSupported && Unsafe.SizeOf>() == 16) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Y = MemoryMarshal.AsBytes(y[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x10]); + var X1 = MemoryMarshal.Read>(X[0x10..0x20]); + var X2 = MemoryMarshal.Read>(X[0x20..0x30]); + var X3 = MemoryMarshal.Read>(X[0x30..0x40]); + + var Y0 = MemoryMarshal.Read>(Y[0x00..0x10]); + var Y1 = MemoryMarshal.Read>(Y[0x10..0x20]); + var Y2 = MemoryMarshal.Read>(Y[0x20..0x30]); + var Y3 = MemoryMarshal.Read>(Y[0x30..0x40]); + + var Z0 = Sse2.Xor(X0, Y0); + var Z1 = Sse2.Xor(X1, Y1); + var Z2 = Sse2.Xor(X2, Y2); + var Z3 = Sse2.Xor(X3, Y3); + + MemoryMarshal.Write(Z[0x00..0x10], ref Z0); + MemoryMarshal.Write(Z[0x10..0x20], ref Z1); + MemoryMarshal.Write(Z[0x20..0x30], ref Z2); + MemoryMarshal.Write(Z[0x30..0x40], ref Z3); + return; + } +#endif + + for (int i = 0; i < 8; i += 4) + { + z[i + 0] = x[i + 0] ^ y[i + 0]; + z[i + 1] = x[i + 1] ^ y[i + 1]; + z[i + 2] = x[i + 2] ^ y[i + 2]; + z[i + 3] = x[i + 3] ^ y[i + 3]; + } + } +#endif + + public static void XorTo64(ulong[] x, int xOff, ulong[] z, int zOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + XorTo64(x.AsSpan(xOff), z.AsSpan(zOff)); +#else + for (int i = 0; i < 8; i += 4) + { + z[zOff + i + 0] ^= x[xOff + i + 0]; + z[zOff + i + 1] ^= x[xOff + i + 1]; + z[zOff + i + 2] ^= x[xOff + i + 2]; + z[zOff + i + 3] ^= x[xOff + i + 3]; + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void XorTo64(ReadOnlySpan x, Span z) + { +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported && Unsafe.SizeOf>() == 32) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x20]); + var X1 = MemoryMarshal.Read>(X[0x20..0x40]); + + var Y0 = MemoryMarshal.Read>(Z[0x00..0x20]); + var Y1 = MemoryMarshal.Read>(Z[0x20..0x40]); + + var Z0 = Avx2.Xor(X0, Y0); + var Z1 = Avx2.Xor(X1, Y1); + + MemoryMarshal.Write(Z[0x00..0x20], ref Z0); + MemoryMarshal.Write(Z[0x20..0x40], ref Z1); + return; + } + + if (Sse2.IsSupported && Unsafe.SizeOf>() == 16) + { + var X = MemoryMarshal.AsBytes(x[..8]); + var Z = MemoryMarshal.AsBytes(z[..8]); + + var X0 = MemoryMarshal.Read>(X[0x00..0x10]); + var X1 = MemoryMarshal.Read>(X[0x10..0x20]); + var X2 = MemoryMarshal.Read>(X[0x20..0x30]); + var X3 = MemoryMarshal.Read>(X[0x30..0x40]); + + var Y0 = MemoryMarshal.Read>(Z[0x00..0x10]); + var Y1 = MemoryMarshal.Read>(Z[0x10..0x20]); + var Y2 = MemoryMarshal.Read>(Z[0x20..0x30]); + var Y3 = MemoryMarshal.Read>(Z[0x30..0x40]); + + var Z0 = Sse2.Xor(X0, Y0); + var Z1 = Sse2.Xor(X1, Y1); + var Z2 = Sse2.Xor(X2, Y2); + var Z3 = Sse2.Xor(X3, Y3); + + MemoryMarshal.Write(Z[0x00..0x10], ref Z0); + MemoryMarshal.Write(Z[0x10..0x20], ref Z1); + MemoryMarshal.Write(Z[0x20..0x30], ref Z2); + MemoryMarshal.Write(Z[0x30..0x40], ref Z3); + return; + } +#endif + + for (int i = 0; i < 8; i += 4) + { + z[i + 0] ^= x[i + 0]; + z[i + 1] ^= x[i + 1]; + z[i + 2] ^= x[i + 2]; + z[i + 3] ^= x[i + 3]; + } + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs.meta new file mode 100644 index 00000000..3576b25b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 872a1fdcc31253a43b1d02b6a8ebb0a4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat512.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs new file mode 100644 index 00000000..70701f74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw +{ + internal abstract class Nat576 + { + public static void Copy64(ulong[] x, ulong[] z) + { + z[0] = x[0]; + z[1] = x[1]; + z[2] = x[2]; + z[3] = x[3]; + z[4] = x[4]; + z[5] = x[5]; + z[6] = x[6]; + z[7] = x[7]; + z[8] = x[8]; + } + + public static void Copy64(ulong[] x, int xOff, ulong[] z, int zOff) + { + z[zOff + 0] = x[xOff + 0]; + z[zOff + 1] = x[xOff + 1]; + z[zOff + 2] = x[xOff + 2]; + z[zOff + 3] = x[xOff + 3]; + z[zOff + 4] = x[xOff + 4]; + z[zOff + 5] = x[xOff + 5]; + z[zOff + 6] = x[xOff + 6]; + z[zOff + 7] = x[xOff + 7]; + z[zOff + 8] = x[xOff + 8]; + } + + public static ulong[] Create64() + { + return new ulong[9]; + } + + public static ulong[] CreateExt64() + { + return new ulong[18]; + } + + public static bool Eq64(ulong[] x, ulong[] y) + { + for (int i = 8; i >= 0; --i) + { + if (x[i] != y[i]) + { + return false; + } + } + return true; + } + + public static bool IsOne64(ulong[] x) + { + if (x[0] != 1UL) + { + return false; + } + for (int i = 1; i < 9; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static bool IsZero64(ulong[] x) + { + for (int i = 0; i < 9; ++i) + { + if (x[i] != 0UL) + { + return false; + } + } + return true; + } + + public static BigInteger ToBigInteger64(ulong[] x) + { + byte[] bs = new byte[72]; + for (int i = 0; i < 9; ++i) + { + ulong x_i = x[i]; + if (x_i != 0L) + { + Pack.UInt64_To_BE(x_i, bs, (8 - i) << 3); + } + } + return new BigInteger(1, bs); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs.meta new file mode 100644 index 00000000..888470fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0ea9f7f5581e4ad4a8fc33fa01aa8bef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/math/raw/Nat576.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp.meta new file mode 100644 index 00000000..0518f3c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 22f5ec29de31fee4f81375480464ad9e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs new file mode 100644 index 00000000..0a818fe2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs @@ -0,0 +1,192 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /// + /// + /// BasicOcspResponse ::= SEQUENCE { + /// tbsResponseData ResponseData, + /// signatureAlgorithm AlgorithmIdentifier, + /// signature BIT STRING, + /// certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL + /// } + /// + /// + public class BasicOcspResp + : X509ExtensionBase + { + private readonly BasicOcspResponse resp; + private readonly ResponseData data; +// private readonly X509Certificate[] chain; + + public BasicOcspResp( + BasicOcspResponse resp) + { + this.resp = resp; + this.data = resp.TbsResponseData; + } + + /// The DER encoding of the tbsResponseData field. + /// In the event of an encoding error. + public byte[] GetTbsResponseData() + { + try + { + return data.GetDerEncoded(); + } + catch (IOException e) + { + throw new OcspException("problem encoding tbsResponseData", e); + } + } + + public int Version + { + get { return data.Version.IntValueExact + 1; } + } + + public RespID ResponderId + { + get { return new RespID(data.ResponderID); } + } + + public DateTime ProducedAt + { + get { return data.ProducedAt.ToDateTime(); } + } + + public SingleResp[] Responses + { + get + { + Asn1Sequence s = data.Responses; + SingleResp[] rs = new SingleResp[s.Count]; + + for (int i = 0; i != rs.Length; i++) + { + rs[i] = new SingleResp(SingleResponse.GetInstance(s[i])); + } + + return rs; + } + } + + public X509Extensions ResponseExtensions + { + get { return data.ResponseExtensions; } + } + + protected override X509Extensions GetX509Extensions() + { + return ResponseExtensions; + } + + public string SignatureAlgName + { + get { return OcspUtilities.GetAlgorithmName(resp.SignatureAlgorithm.Algorithm); } + } + + public string SignatureAlgOid + { + get { return resp.SignatureAlgorithm.Algorithm.Id; } + } + + public byte[] GetSignature() + { + return resp.GetSignatureOctets(); + } + + private List GetCertList() + { + // load the certificates if we have any + + var result = new List(); + + Asn1Sequence certs = resp.Certs; + if (certs != null) + { + foreach (Asn1Encodable ae in certs) + { + if (ae != null && ae.ToAsn1Object() is Asn1Sequence s) + { + result.Add(new X509Certificate(X509CertificateStructure.GetInstance(s))); + } + } + } + + return result; + } + + public X509Certificate[] GetCerts() + { + return GetCertList().ToArray(); + } + + /// The certificates, if any, associated with the response. + /// In the event of an encoding error. + public IStore GetCertificates() + { + return CollectionUtilities.CreateStore(this.GetCertList()); + } + + /// + /// Verify the signature against the tbsResponseData object we contain. + /// + public bool Verify( + AsymmetricKeyParameter publicKey) + { + try + { + ISigner signature = SignerUtilities.GetSigner(this.SignatureAlgName); + signature.Init(false, publicKey); + byte[] bs = data.GetDerEncoded(); + signature.BlockUpdate(bs, 0, bs.Length); + + return signature.VerifySignature(this.GetSignature()); + } + catch (Exception e) + { + throw new OcspException("exception processing sig: " + e, e); + } + } + + /// The ASN.1 encoded representation of this object. + public byte[] GetEncoded() + { + return resp.GetEncoded(); + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + BasicOcspResp other = obj as BasicOcspResp; + + if (other == null) + return false; + + return resp.Equals(other.resp); + } + + public override int GetHashCode() + { + return resp.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs.meta new file mode 100644 index 00000000..acad1a4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 86ca7c3ecc117ba4fa791916b469a680 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPResp.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs new file mode 100644 index 00000000..b390beed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs @@ -0,0 +1,294 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /** + * Generator for basic OCSP response objects. + */ + public class BasicOcspRespGenerator + { + private readonly List list = new List(); + + private X509Extensions responseExtensions; + private RespID responderID; + + private class ResponseObject + { + internal CertificateID certId; + internal CertStatus certStatus; + internal Asn1GeneralizedTime thisUpdate; + internal Asn1GeneralizedTime nextUpdate; + internal X509Extensions extensions; + + internal ResponseObject( + CertificateID certId, + CertificateStatus certStatus, + DateTime thisUpdate, + DateTime? nextUpdate, + X509Extensions extensions) + { + this.certId = certId; + + if (certStatus == null) + { + this.certStatus = new CertStatus(); + } + else if (certStatus is UnknownStatus) + { + this.certStatus = new CertStatus(2, DerNull.Instance); + } + else + { + RevokedStatus rs = (RevokedStatus) certStatus; + CrlReason revocationReason = rs.HasRevocationReason + ? new CrlReason(rs.RevocationReason) + : null; + + this.certStatus = new CertStatus( + new RevokedInfo(new Asn1GeneralizedTime(rs.RevocationTime), revocationReason)); + } + + this.thisUpdate = new DerGeneralizedTime(thisUpdate); + this.nextUpdate = nextUpdate.HasValue ? new DerGeneralizedTime(nextUpdate.Value) : null; + + this.extensions = extensions; + } + + public SingleResponse ToResponse() + { + return new SingleResponse(certId.ToAsn1Object(), certStatus, thisUpdate, nextUpdate, extensions); + } + } + + /** + * basic constructor + */ + public BasicOcspRespGenerator( + RespID responderID) + { + this.responderID = responderID; + } + + /** + * construct with the responderID to be the SHA-1 keyHash of the passed in public key. + */ + public BasicOcspRespGenerator( + AsymmetricKeyParameter publicKey) + { + this.responderID = new RespID(publicKey); + } + + /** + * Add a response for a particular Certificate ID. + * + * @param certID certificate ID details + * @param certStatus status of the certificate - null if okay + */ + public void AddResponse( + CertificateID certID, + CertificateStatus certStatus) + { + list.Add(new ResponseObject(certID, certStatus, DateTime.UtcNow, null, null)); + } + + /** + * Add a response for a particular Certificate ID. + * + * @param certID certificate ID details + * @param certStatus status of the certificate - null if okay + * @param singleExtensions optional extensions + */ + public void AddResponse( + CertificateID certID, + CertificateStatus certStatus, + X509Extensions singleExtensions) + { + list.Add(new ResponseObject(certID, certStatus, DateTime.UtcNow, null, singleExtensions)); + } + + /** + * Add a response for a particular Certificate ID. + * + * @param certID certificate ID details + * @param nextUpdate date when next update should be requested + * @param certStatus status of the certificate - null if okay + * @param singleExtensions optional extensions + */ + public void AddResponse( + CertificateID certID, + CertificateStatus certStatus, + DateTime? nextUpdate, + X509Extensions singleExtensions) + { + list.Add(new ResponseObject(certID, certStatus, DateTime.UtcNow, nextUpdate, singleExtensions)); + } + + /** + * Add a response for a particular Certificate ID. + * + * @param certID certificate ID details + * @param thisUpdate date this response was valid on + * @param nextUpdate date when next update should be requested + * @param certStatus status of the certificate - null if okay + * @param singleExtensions optional extensions + */ + public void AddResponse( + CertificateID certID, + CertificateStatus certStatus, + DateTime thisUpdate, + DateTime? nextUpdate, + X509Extensions singleExtensions) + { + list.Add(new ResponseObject(certID, certStatus, thisUpdate, nextUpdate, singleExtensions)); + } + + /** + * Set the extensions for the response. + * + * @param responseExtensions the extension object to carry. + */ + public void SetResponseExtensions( + X509Extensions responseExtensions) + { + this.responseExtensions = responseExtensions; + } + + private BasicOcspResp GenerateResponse( + ISignatureFactory signatureCalculator, + X509Certificate[] chain, + DateTime producedAt) + { + AlgorithmIdentifier signingAlgID = (AlgorithmIdentifier)signatureCalculator.AlgorithmDetails; + DerObjectIdentifier signingAlgorithm = signingAlgID.Algorithm; + + Asn1EncodableVector responses = new Asn1EncodableVector(); + + foreach (ResponseObject respObj in list) + { + try + { + responses.Add(respObj.ToResponse()); + } + catch (Exception e) + { + throw new OcspException("exception creating Request", e); + } + } + + ResponseData tbsResp = new ResponseData(responderID.ToAsn1Object(), new Asn1GeneralizedTime(producedAt), + new DerSequence(responses), responseExtensions); + DerBitString bitSig; + + try + { + IStreamCalculator streamCalculator = signatureCalculator.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + tbsResp.EncodeTo(sigStream, Asn1Encodable.Der); + } + + bitSig = new DerBitString(streamCalculator.GetResult().Collect()); + } + catch (Exception e) + { + throw new OcspException("exception processing TBSRequest: " + e, e); + } + + AlgorithmIdentifier sigAlgId = OcspUtilities.GetSigAlgID(signingAlgorithm); + + DerSequence chainSeq = null; + if (chain != null && chain.Length > 0) + { + Asn1EncodableVector v = new Asn1EncodableVector(chain.Length); + try + { + for (int i = 0; i != chain.Length; i++) + { + v.Add(chain[i].CertificateStructure); + } + } + catch (IOException e) + { + throw new OcspException("error processing certs", e); + } + catch (CertificateEncodingException e) + { + throw new OcspException("error encoding certs", e); + } + + chainSeq = new DerSequence(v); + } + + return new BasicOcspResp(new BasicOcspResponse(tbsResp, sigAlgId, bitSig, chainSeq)); + } + + public BasicOcspResp Generate( + string signingAlgorithm, + AsymmetricKeyParameter privateKey, + X509Certificate[] chain, + DateTime thisUpdate) + { + return Generate(signingAlgorithm, privateKey, chain, thisUpdate, null); + } + + public BasicOcspResp Generate( + string signingAlgorithm, + AsymmetricKeyParameter privateKey, + X509Certificate[] chain, + DateTime producedAt, + SecureRandom random) + { + if (signingAlgorithm == null) + { + throw new ArgumentException("no signing algorithm specified"); + } + + return GenerateResponse(new Asn1SignatureFactory(signingAlgorithm, privateKey, random), chain, producedAt); + } + + /// + /// Generate the signed response using the passed in signature calculator. + /// + /// Implementation of signing calculator factory. + /// The certificate chain associated with the response signer. + /// "produced at" date. + /// + public BasicOcspResp Generate( + ISignatureFactory signatureCalculatorFactory, + X509Certificate[] chain, + DateTime producedAt) + { + if (signatureCalculatorFactory == null) + { + throw new ArgumentException("no signature calculator specified"); + } + + return GenerateResponse(signatureCalculatorFactory, chain, producedAt); + } + + /** + * Return an IEnumerable of the signature names supported by the generator. + * + * @return an IEnumerable containing recognised names. + */ + public IEnumerable SignatureAlgNames + { + get { return OcspUtilities.AlgNames; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs.meta new file mode 100644 index 00000000..b7b0dcdb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 72e457ca408bf4e4696a4652a1e0eb06 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/BasicOCSPRespGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs new file mode 100644 index 00000000..a9093ca2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class CertificateID + { + public const string HashSha1 = "1.3.14.3.2.26"; + + private readonly CertID id; + + public CertificateID( + CertID id) + { + if (id == null) + throw new ArgumentNullException("id"); + + this.id = id; + } + + /** + * create from an issuer certificate and the serial number of the + * certificate it signed. + * @exception OcspException if any problems occur creating the id fields. + */ + public CertificateID( + string hashAlgorithm, + X509Certificate issuerCert, + BigInteger serialNumber) + { + AlgorithmIdentifier hashAlg = new AlgorithmIdentifier( + new DerObjectIdentifier(hashAlgorithm), DerNull.Instance); + + this.id = CreateCertID(hashAlg, issuerCert, new DerInteger(serialNumber)); + } + + public string HashAlgOid + { + get { return id.HashAlgorithm.Algorithm.Id; } + } + + public byte[] GetIssuerNameHash() + { + return id.IssuerNameHash.GetOctets(); + } + + public byte[] GetIssuerKeyHash() + { + return id.IssuerKeyHash.GetOctets(); + } + + /** + * return the serial number for the certificate associated + * with this request. + */ + public BigInteger SerialNumber + { + get { return id.SerialNumber.Value; } + } + + public bool MatchesIssuer( + X509Certificate issuerCert) + { + return CreateCertID(id.HashAlgorithm, issuerCert, id.SerialNumber).Equals(id); + } + + public CertID ToAsn1Object() + { + return id; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + CertificateID other = obj as CertificateID; + + if (other == null) + return false; + + return id.ToAsn1Object().Equals(other.id.ToAsn1Object()); + } + + public override int GetHashCode() + { + return id.ToAsn1Object().GetHashCode(); + } + + + /** + * Create a new CertificateID for a new serial number derived from a previous one + * calculated for the same CA certificate. + * + * @param original the previously calculated CertificateID for the CA. + * @param newSerialNumber the serial number for the new certificate of interest. + * + * @return a new CertificateID for newSerialNumber + */ + public static CertificateID DeriveCertificateID(CertificateID original, BigInteger newSerialNumber) + { + return new CertificateID(new CertID(original.id.HashAlgorithm, original.id.IssuerNameHash, + original.id.IssuerKeyHash, new DerInteger(newSerialNumber))); + } + + private static CertID CreateCertID( + AlgorithmIdentifier hashAlg, + X509Certificate issuerCert, + DerInteger serialNumber) + { + try + { + string hashAlgorithm = hashAlg.Algorithm.Id; + + X509Name issuerName = PrincipalUtilities.GetSubjectX509Principal(issuerCert); + byte[] issuerNameHash = DigestUtilities.CalculateDigest( + hashAlgorithm, issuerName.GetEncoded()); + + AsymmetricKeyParameter issuerKey = issuerCert.GetPublicKey(); + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(issuerKey); + byte[] issuerKeyHash = DigestUtilities.CalculateDigest( + hashAlgorithm, info.PublicKeyData.GetBytes()); + + return new CertID(hashAlg, new DerOctetString(issuerNameHash), + new DerOctetString(issuerKeyHash), serialNumber); + } + catch (Exception e) + { + throw new OcspException("problem creating ID: " + e, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs.meta new file mode 100644 index 00000000..5ac717c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 489dcea2996bc2b42a71bbd509bcaf8f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs new file mode 100644 index 00000000..2711df14 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public abstract class CertificateStatus + { + public static readonly CertificateStatus Good = null; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs.meta new file mode 100644 index 00000000..2a768c54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 011cf76e0683c5744be4ae717bd7ce65 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/CertificateStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs new file mode 100644 index 00000000..a48a82c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + [Serializable] + public class OcspException + : Exception + { + public OcspException() + : base() + { + } + + public OcspException(string message) + : base(message) + { + } + + public OcspException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected OcspException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs.meta new file mode 100644 index 00000000..e1ab9fad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b8d9cd2e595d4064b8d2bf5aa8a069e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs new file mode 100644 index 00000000..739e371c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs @@ -0,0 +1,250 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /** + *
    +	 * OcspRequest     ::=     SEQUENCE {
    +	 *       tbsRequest                  TBSRequest,
    +	 *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }
    +	 *
    +	 *   TBSRequest      ::=     SEQUENCE {
    +	 *       version             [0]     EXPLICIT Version DEFAULT v1,
    +	 *       requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
    +	 *       requestList                 SEQUENCE OF Request,
    +	 *       requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }
    +	 *
    +	 *   Signature       ::=     SEQUENCE {
    +	 *       signatureAlgorithm      AlgorithmIdentifier,
    +	 *       signature               BIT STRING,
    +	 *       certs               [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL}
    +	 *
    +	 *   Version         ::=             INTEGER  {  v1(0) }
    +	 *
    +	 *   Request         ::=     SEQUENCE {
    +	 *       reqCert                     CertID,
    +	 *       singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }
    +	 *
    +	 *   CertID          ::=     SEQUENCE {
    +	 *       hashAlgorithm       AlgorithmIdentifier,
    +	 *       issuerNameHash      OCTET STRING, -- Hash of Issuer's DN
    +	 *       issuerKeyHash       OCTET STRING, -- Hash of Issuers public key
    +	 *       serialNumber        CertificateSerialNumber }
    +	 * 
    + */ + public class OcspReq + : X509ExtensionBase + { + private OcspRequest req; + + public OcspReq( + OcspRequest req) + { + this.req = req; + } + + public OcspReq( + byte[] req) + : this(new Asn1InputStream(req)) + { + } + + public OcspReq( + Stream inStr) + : this(new Asn1InputStream(inStr)) + { + } + + private OcspReq( + Asn1InputStream aIn) + { + try + { + this.req = OcspRequest.GetInstance(aIn.ReadObject()); + } + catch (ArgumentException e) + { + throw new IOException("malformed request: " + e.Message); + } + catch (InvalidCastException e) + { + throw new IOException("malformed request: " + e.Message); + } + } + + /** + * Return the DER encoding of the tbsRequest field. + * @return DER encoding of tbsRequest + * @throws OcspException in the event of an encoding error. + */ + public byte[] GetTbsRequest() + { + try + { + return req.TbsRequest.GetEncoded(); + } + catch (IOException e) + { + throw new OcspException("problem encoding tbsRequest", e); + } + } + + public int Version + { + get { return req.TbsRequest.Version.IntValueExact + 1; } + } + + public GeneralName RequestorName + { + get { return GeneralName.GetInstance(req.TbsRequest.RequestorName); } + } + + public Req[] GetRequestList() + { + Asn1Sequence seq = req.TbsRequest.RequestList; + Req[] requests = new Req[seq.Count]; + + for (int i = 0; i != requests.Length; i++) + { + requests[i] = new Req(Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request.GetInstance(seq[i])); + } + + return requests; + } + + public X509Extensions RequestExtensions + { + get { return X509Extensions.GetInstance(req.TbsRequest.RequestExtensions); } + } + + protected override X509Extensions GetX509Extensions() + { + return RequestExtensions; + } + + /** + * return the object identifier representing the signature algorithm + */ + public string SignatureAlgOid + { + get + { + if (!this.IsSigned) + return null; + + return req.OptionalSignature.SignatureAlgorithm.Algorithm.Id; + } + } + + public byte[] GetSignature() + { + if (!this.IsSigned) + return null; + + return req.OptionalSignature.GetSignatureOctets(); + } + + private List GetCertList() + { + // load the certificates if we have any + + var result = new List(); + + Asn1Sequence certs = req.OptionalSignature.Certs; + if (certs != null) + { + foreach (Asn1Encodable ae in certs) + { + if (ae != null && ae.ToAsn1Object() is Asn1Sequence s) + { + result.Add(new X509Certificate(X509CertificateStructure.GetInstance(s))); + } + } + } + + return result; + } + + public X509Certificate[] GetCerts() + { + if (!this.IsSigned) + return null; + + return this.GetCertList().ToArray(); + } + + /** + * If the request is signed return a possibly empty CertStore containing the certificates in the + * request. If the request is not signed the method returns null. + * + * @return null if not signed, a CertStore otherwise + * @throws OcspException + */ + public IStore GetCertificates() + { + if (!this.IsSigned) + return null; + + return CollectionUtilities.CreateStore(this.GetCertList()); + } + + /** + * Return whether or not this request is signed. + * + * @return true if signed false otherwise. + */ + public bool IsSigned + { + get { return req.OptionalSignature != null; } + } + + /** + * Verify the signature against the TBSRequest object we contain. + */ + public bool Verify( + AsymmetricKeyParameter publicKey) + { + if (!this.IsSigned) + throw new OcspException("attempt to Verify signature on unsigned object"); + + try + { + ISigner signature = SignerUtilities.GetSigner(this.SignatureAlgOid); + + signature.Init(false, publicKey); + + byte[] encoded = req.TbsRequest.GetEncoded(); + + signature.BlockUpdate(encoded, 0, encoded.Length); + + return signature.VerifySignature(this.GetSignature()); + } + catch (Exception e) + { + throw new OcspException("exception processing sig: " + e, e); + } + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return req.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs.meta new file mode 100644 index 00000000..b0bb24d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb58be0b070a61847a575c0060282b5f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReq.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs new file mode 100644 index 00000000..988b2f9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs @@ -0,0 +1,245 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class OcspReqGenerator + { + private List list = new List(); + private GeneralName requestorName = null; + private X509Extensions requestExtensions = null; + + private class RequestObject + { + internal CertificateID certId; + internal X509Extensions extensions; + + public RequestObject( + CertificateID certId, + X509Extensions extensions) + { + this.certId = certId; + this.extensions = extensions; + } + + public Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request ToRequest() + { + return new Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request(certId.ToAsn1Object(), extensions); + } + } + + /** + * Add a request for the given CertificateID. + * + * @param certId certificate ID of interest + */ + public void AddRequest( + CertificateID certId) + { + list.Add(new RequestObject(certId, null)); + } + + /** + * Add a request with extensions + * + * @param certId certificate ID of interest + * @param singleRequestExtensions the extensions to attach to the request + */ + public void AddRequest( + CertificateID certId, + X509Extensions singleRequestExtensions) + { + list.Add(new RequestObject(certId, singleRequestExtensions)); + } + + /** + * Set the requestor name to the passed in X509Principal + * + * @param requestorName a X509Principal representing the requestor name. + */ + public void SetRequestorName( + X509Name requestorName) + { + try + { + this.requestorName = new GeneralName(GeneralName.DirectoryName, requestorName); + } + catch (Exception e) + { + throw new ArgumentException("cannot encode principal", e); + } + } + + public void SetRequestorName( + GeneralName requestorName) + { + this.requestorName = requestorName; + } + + public void SetRequestExtensions( + X509Extensions requestExtensions) + { + this.requestExtensions = requestExtensions; + } + + private OcspReq GenerateRequest( + DerObjectIdentifier signingAlgorithm, + AsymmetricKeyParameter privateKey, + X509Certificate[] chain, + SecureRandom random) + { + Asn1EncodableVector requests = new Asn1EncodableVector(); + + foreach (RequestObject reqObj in list) + { + try + { + requests.Add(reqObj.ToRequest()); + } + catch (Exception e) + { + throw new OcspException("exception creating Request", e); + } + } + + TbsRequest tbsReq = new TbsRequest(requestorName, new DerSequence(requests), requestExtensions); + + ISigner sig = null; + Signature signature = null; + + if (signingAlgorithm != null) + { + if (requestorName == null) + { + throw new OcspException("requestorName must be specified if request is signed."); + } + + try + { + sig = SignerUtilities.GetSigner(signingAlgorithm.Id); + if (random != null) + { + sig.Init(true, new ParametersWithRandom(privateKey, random)); + } + else + { + sig.Init(true, privateKey); + } + } + catch (Exception e) + { + throw new OcspException("exception creating signature: " + e, e); + } + + DerBitString bitSig = null; + + try + { + byte[] encoded = tbsReq.GetEncoded(); + sig.BlockUpdate(encoded, 0, encoded.Length); + + bitSig = new DerBitString(sig.GenerateSignature()); + } + catch (Exception e) + { + throw new OcspException("exception processing TBSRequest: " + e, e); + } + + AlgorithmIdentifier sigAlgId = new AlgorithmIdentifier(signingAlgorithm, DerNull.Instance); + + if (chain != null && chain.Length > 0) + { + Asn1EncodableVector v = new Asn1EncodableVector(); + try + { + for (int i = 0; i != chain.Length; i++) + { + v.Add(chain[i].CertificateStructure); + } + } + catch (IOException e) + { + throw new OcspException("error processing certs", e); + } + catch (CertificateEncodingException e) + { + throw new OcspException("error encoding certs", e); + } + + signature = new Signature(sigAlgId, bitSig, new DerSequence(v)); + } + else + { + signature = new Signature(sigAlgId, bitSig); + } + } + + return new OcspReq(new OcspRequest(tbsReq, signature)); + } + + /** + * Generate an unsigned request + * + * @return the OcspReq + * @throws OcspException + */ + public OcspReq Generate() + { + return GenerateRequest(null, null, null, null); + } + + public OcspReq Generate( + string signingAlgorithm, + AsymmetricKeyParameter privateKey, + X509Certificate[] chain) + { + return Generate(signingAlgorithm, privateKey, chain, null); + } + + public OcspReq Generate( + string signingAlgorithm, + AsymmetricKeyParameter privateKey, + X509Certificate[] chain, + SecureRandom random) + { + if (signingAlgorithm == null) + throw new ArgumentException("no signing algorithm specified"); + + try + { + DerObjectIdentifier oid = OcspUtilities.GetAlgorithmOid(signingAlgorithm); + + return GenerateRequest(oid, privateKey, chain, random); + } + catch (ArgumentException) + { + throw new ArgumentException("unknown signing algorithm specified: " + signingAlgorithm); + } + } + + /** + * Return an IEnumerable of the signature names supported by the generator. + * + * @return an IEnumerable containing recognised names. + */ + public IEnumerable SignatureAlgNames + { + get { return OcspUtilities.AlgNames; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs.meta new file mode 100644 index 00000000..24f4d15a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9276b013e8b460f49bfbaa385bf13560 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPReqGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs new file mode 100644 index 00000000..162c83f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class OcspResp + { + private OcspResponse resp; + + public OcspResp( + OcspResponse resp) + { + this.resp = resp; + } + + public OcspResp( + byte[] resp) + : this(new Asn1InputStream(resp)) + { + } + + public OcspResp( + Stream inStr) + : this(new Asn1InputStream(inStr)) + { + } + + private OcspResp( + Asn1InputStream aIn) + { + try + { + this.resp = OcspResponse.GetInstance(aIn.ReadObject()); + } + catch (Exception e) + { + throw new IOException("malformed response: " + e.Message, e); + } + } + + public int Status + { + get { return this.resp.ResponseStatus.IntValueExact; } + } + + public object GetResponseObject() + { + ResponseBytes rb = this.resp.ResponseBytes; + + if (rb == null) + return null; + + if (rb.ResponseType.Equals(OcspObjectIdentifiers.PkixOcspBasic)) + { + try + { + return new BasicOcspResp( + BasicOcspResponse.GetInstance( + Asn1Object.FromByteArray(rb.Response.GetOctets()))); + } + catch (Exception e) + { + throw new OcspException("problem decoding object: " + e, e); + } + } + + return rb.Response; + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return resp.GetEncoded(); + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + OcspResp other = obj as OcspResp; + + if (other == null) + return false; + + return resp.Equals(other.resp); + } + + public override int GetHashCode() + { + return resp.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs.meta new file mode 100644 index 00000000..1f98694e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 860e7d9201544c0468db856985f25e80 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPResp.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs new file mode 100644 index 00000000..e43f0711 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /** + * base generator for an OCSP response - at the moment this only supports the + * generation of responses containing BasicOCSP responses. + */ + public class OCSPRespGenerator + { + public const int Successful = 0; // Response has valid confirmations + public const int MalformedRequest = 1; // Illegal confirmation request + public const int InternalError = 2; // Internal error in issuer + public const int TryLater = 3; // Try again later + // (4) is not used + public const int SigRequired = 5; // Must sign the request + public const int Unauthorized = 6; // Request unauthorized + + public OcspResp Generate( + int status, + object response) + { + if (response == null) + { + return new OcspResp(new OcspResponse(new OcspResponseStatus(status),null)); + } + if (response is BasicOcspResp) + { + BasicOcspResp r = (BasicOcspResp)response; + Asn1OctetString octs; + + try + { + octs = new DerOctetString(r.GetEncoded()); + } + catch (Exception e) + { + throw new OcspException("can't encode object.", e); + } + + ResponseBytes rb = new ResponseBytes( + OcspObjectIdentifiers.PkixOcspBasic, octs); + + return new OcspResp(new OcspResponse( + new OcspResponseStatus(status), rb)); + } + + throw new OcspException("unknown response object"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs.meta new file mode 100644 index 00000000..d1e110ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e070e983fe28c9d4d99a110520b1f07e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs new file mode 100644 index 00000000..a050ab5a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public abstract class OcspRespStatus + { + /** + * note 4 is not used. + */ + public const int Successful = 0; // --Response has valid confirmations + public const int MalformedRequest = 1; // --Illegal confirmation request + public const int InternalError = 2; // --Internal error in issuer + public const int TryLater = 3; // --Try again later + public const int SigRequired = 5; // --Must sign the request + public const int Unauthorized = 6; // --Request unauthorized + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs.meta new file mode 100644 index 00000000..c870a01a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b217336d2556578438a8a961e5dd7bbd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPRespStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs new file mode 100644 index 00000000..40fba3ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs @@ -0,0 +1,150 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + internal class OcspUtilities + { + private static readonly Dictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary Oids = + new Dictionary(); + private static readonly HashSet NoParams = new HashSet(); + + static OcspUtilities() + { + Algorithms.Add("MD2WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD2WithRsaEncryption); + Algorithms.Add("MD2WITHRSA", PkcsObjectIdentifiers.MD2WithRsaEncryption); + Algorithms.Add("MD5WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD5WithRsaEncryption); + Algorithms.Add("MD5WITHRSA", PkcsObjectIdentifiers.MD5WithRsaEncryption); + Algorithms.Add("SHA1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + Algorithms.Add("SHA-1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + Algorithms.Add("SHA1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + Algorithms.Add("SHA-1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + Algorithms.Add("SHA224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + Algorithms.Add("SHA-224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + Algorithms.Add("SHA224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + Algorithms.Add("SHA-224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + Algorithms.Add("SHA256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + Algorithms.Add("SHA-256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + Algorithms.Add("SHA256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + Algorithms.Add("SHA-256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + Algorithms.Add("SHA384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + Algorithms.Add("SHA-384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + Algorithms.Add("SHA384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + Algorithms.Add("SHA-384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + Algorithms.Add("SHA512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + Algorithms.Add("SHA-512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + Algorithms.Add("SHA512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + Algorithms.Add("SHA-512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + Algorithms.Add("SHA512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + Algorithms.Add("SHA-512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + Algorithms.Add("SHA512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + Algorithms.Add("SHA-512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + Algorithms.Add("SHA512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + Algorithms.Add("SHA-512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + Algorithms.Add("SHA512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + Algorithms.Add("SHA-512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + Algorithms.Add("RIPEMD160WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + Algorithms.Add("RIPEMD160WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + Algorithms.Add("RIPEMD128WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + Algorithms.Add("RIPEMD128WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + Algorithms.Add("RIPEMD256WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + Algorithms.Add("RIPEMD256WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + Algorithms.Add("SHA1WITHDSA", X9ObjectIdentifiers.IdDsaWithSha1); + Algorithms.Add("DSAWITHSHA1", X9ObjectIdentifiers.IdDsaWithSha1); + Algorithms.Add("SHA224WITHDSA", NistObjectIdentifiers.DsaWithSha224); + Algorithms.Add("SHA256WITHDSA", NistObjectIdentifiers.DsaWithSha256); + Algorithms.Add("SHA1WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha1); + Algorithms.Add("ECDSAWITHSHA1", X9ObjectIdentifiers.ECDsaWithSha1); + Algorithms.Add("SHA224WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha224); + Algorithms.Add("SHA256WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha256); + Algorithms.Add("SHA384WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha384); + Algorithms.Add("SHA512WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha512); + Algorithms.Add("GOST3411WITHGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + Algorithms.Add("GOST3411WITHGOST3410-94", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + + Oids.Add(PkcsObjectIdentifiers.MD2WithRsaEncryption, "MD2WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.MD5WithRsaEncryption, "MD5WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha1WithRsaEncryption, "SHA1WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha224WithRsaEncryption, "SHA224WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha256WithRsaEncryption, "SHA256WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha384WithRsaEncryption, "SHA384WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha512WithRsaEncryption, "SHA512WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha512_224WithRSAEncryption, "SHA512(224)WITHRSA"); + Oids.Add(PkcsObjectIdentifiers.Sha512_256WithRSAEncryption, "SHA512(256)WITHRSA"); + Oids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160, "RIPEMD160WITHRSA"); + Oids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128, "RIPEMD128WITHRSA"); + Oids.Add(TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256, "RIPEMD256WITHRSA"); + Oids.Add(X9ObjectIdentifiers.IdDsaWithSha1, "SHA1WITHDSA"); + Oids.Add(NistObjectIdentifiers.DsaWithSha224, "SHA224WITHDSA"); + Oids.Add(NistObjectIdentifiers.DsaWithSha256, "SHA256WITHDSA"); + Oids.Add(X9ObjectIdentifiers.ECDsaWithSha1, "SHA1WITHECDSA"); + Oids.Add(X9ObjectIdentifiers.ECDsaWithSha224, "SHA224WITHECDSA"); + Oids.Add(X9ObjectIdentifiers.ECDsaWithSha256, "SHA256WITHECDSA"); + Oids.Add(X9ObjectIdentifiers.ECDsaWithSha384, "SHA384WITHECDSA"); + Oids.Add(X9ObjectIdentifiers.ECDsaWithSha512, "SHA512WITHECDSA"); + Oids.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94, "GOST3411WITHGOST3410"); + Oids.Add(OiwObjectIdentifiers.MD5WithRsa, "MD5WITHRSA"); + Oids.Add(OiwObjectIdentifiers.Sha1WithRsa, "SHA1WITHRSA"); + Oids.Add(OiwObjectIdentifiers.DsaWithSha1, "SHA1WITHDSA"); + + // + // According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) omit the parameters field. + // The parameters field SHALL be NULL for RSA based signature algorithms. + // + NoParams.Add(X9ObjectIdentifiers.ECDsaWithSha1); + NoParams.Add(X9ObjectIdentifiers.ECDsaWithSha224); + NoParams.Add(X9ObjectIdentifiers.ECDsaWithSha256); + NoParams.Add(X9ObjectIdentifiers.ECDsaWithSha384); + NoParams.Add(X9ObjectIdentifiers.ECDsaWithSha512); + NoParams.Add(X9ObjectIdentifiers.IdDsaWithSha1); + NoParams.Add(OiwObjectIdentifiers.DsaWithSha1); + NoParams.Add(NistObjectIdentifiers.DsaWithSha224); + NoParams.Add(NistObjectIdentifiers.DsaWithSha256); + } + + internal static DerObjectIdentifier GetAlgorithmOid(string algorithmName) + { + if (Algorithms.TryGetValue(algorithmName, out var oid)) + return oid; + + return new DerObjectIdentifier(algorithmName); + } + + internal static string GetAlgorithmName(DerObjectIdentifier oid) + { + if (Oids.TryGetValue(oid, out var algorithmName)) + return algorithmName; + + return oid.Id; + } + + internal static AlgorithmIdentifier GetSigAlgID(DerObjectIdentifier sigOid) + { + if (NoParams.Contains(sigOid)) + return new AlgorithmIdentifier(sigOid); + + return new AlgorithmIdentifier(sigOid, DerNull.Instance); + } + + internal static IEnumerable AlgNames + { + get { return CollectionUtilities.Proxy(Algorithms.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs.meta new file mode 100644 index 00000000..88ca7f36 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 426710afbfc0c9d49954dea4932f2a7d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/OCSPUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs new file mode 100644 index 00000000..c28cf8cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class Req + : X509ExtensionBase + { + private Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request req; + + public Req( + Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp.Request req) + { + this.req = req; + } + + public CertificateID GetCertID() + { + return new CertificateID(req.ReqCert); + } + + public X509Extensions SingleRequestExtensions + { + get { return req.SingleRequestExtensions; } + } + + protected override X509Extensions GetX509Extensions() + { + return SingleRequestExtensions; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs.meta new file mode 100644 index 00000000..b4a1e1b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 191ed2b00cdfd0b449a79129300375ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/Req.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs new file mode 100644 index 00000000..d95dcc91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class RespData + : X509ExtensionBase + { + internal readonly ResponseData data; + + public RespData( + ResponseData data) + { + this.data = data; + } + + public int Version + { + get { return data.Version.IntValueExact + 1; } + } + + public RespID GetResponderId() + { + return new RespID(data.ResponderID); + } + + public DateTime ProducedAt + { + get { return data.ProducedAt.ToDateTime(); } + } + + public SingleResp[] GetResponses() + { + Asn1Sequence s = data.Responses; + SingleResp[] rs = new SingleResp[s.Count]; + + for (int i = 0; i != rs.Length; i++) + { + rs[i] = new SingleResp(SingleResponse.GetInstance(s[i])); + } + + return rs; + } + + public X509Extensions ResponseExtensions + { + get { return data.ResponseExtensions; } + } + + protected override X509Extensions GetX509Extensions() + { + return ResponseExtensions; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs.meta new file mode 100644 index 00000000..4d03e369 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4d005d2b85b56e442ad39bfcd5915570 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs new file mode 100644 index 00000000..c8748f02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /** + * Carrier for a ResponderID. + */ + public class RespID + { + internal readonly ResponderID id; + + public RespID( + ResponderID id) + { + this.id = id; + } + + public RespID( + X509Name name) + { + this.id = new ResponderID(name); + } + + public RespID( + AsymmetricKeyParameter publicKey) + { + try + { + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey); + + byte[] keyHash = DigestUtilities.CalculateDigest("SHA1", info.PublicKeyData.GetBytes()); + + this.id = new ResponderID(new DerOctetString(keyHash)); + } + catch (Exception e) + { + throw new OcspException("problem creating ID: " + e, e); + } + } + + public ResponderID ToAsn1Object() + { + return id; + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + RespID other = obj as RespID; + + if (other == null) + return false; + + return id.Equals(other.id); + } + + public override int GetHashCode() + { + return id.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs.meta new file mode 100644 index 00000000..b0bb36ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b7a26cc8d5ebba647ab4f6a08158e432 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RespID.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs new file mode 100644 index 00000000..0c5d3e75 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /// Wrapper for the RevokedInfo object + public class RevokedStatus + : CertificateStatus + { + private readonly RevokedInfo m_revokedInfo; + + public RevokedStatus(RevokedInfo revokedInfo) + { + m_revokedInfo = revokedInfo; + } + + public RevokedStatus(DateTime revocationDate) + { + m_revokedInfo = new RevokedInfo(new Asn1GeneralizedTime(revocationDate)); + } + + public RevokedStatus(DateTime revocationDate, int reason) + { + m_revokedInfo = new RevokedInfo(new Asn1GeneralizedTime(revocationDate), new CrlReason(reason)); + } + + public DateTime RevocationTime + { + get { return m_revokedInfo.RevocationTime.ToDateTime(); } + } + + public bool HasRevocationReason + { + get { return m_revokedInfo.RevocationReason != null; } + } + + /// Return the revocation reason, if there is one. + /// This field is optional; test for it with first. + /// The revocation reason, if available. + /// If no revocation reason is available. + public int RevocationReason + { + get + { + if (m_revokedInfo.RevocationReason == null) + throw new InvalidOperationException("attempt to get a reason where none is available"); + + return m_revokedInfo.RevocationReason.IntValueExact; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs.meta new file mode 100644 index 00000000..bf61fac6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dd782b09f847e7f4c80fb1b8080e7c16 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/RevokedStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs new file mode 100644 index 00000000..028860cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs @@ -0,0 +1,74 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + public class SingleResp + : X509ExtensionBase + { + internal readonly SingleResponse resp; + + public SingleResp( + SingleResponse resp) + { + this.resp = resp; + } + + public CertificateID GetCertID() + { + return new CertificateID(resp.CertId); + } + + /** + * Return the status object for the response - null indicates good. + * + * @return the status object for the response, null if it is good. + */ + public object GetCertStatus() + { + CertStatus s = resp.CertStatus; + + if (s.TagNo == 0) + { + return null; // good + } + + if (s.TagNo == 1) + { + return new RevokedStatus(RevokedInfo.GetInstance(s.Status)); + } + + return new UnknownStatus(); + } + + public DateTime ThisUpdate + { + get { return resp.ThisUpdate.ToDateTime(); } + } + + /** + * return the NextUpdate value - note: this is an optional field so may + * be returned as null. + * + * @return nextUpdate, or null if not present. + */ + public DateTime? NextUpdate => resp.NextUpdate?.ToDateTime(); + + public X509Extensions SingleExtensions + { + get { return resp.SingleExtensions; } + } + + protected override X509Extensions GetX509Extensions() + { + return SingleExtensions; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs.meta new file mode 100644 index 00000000..7be6d175 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 60ec5f958c4f5bd4d8cb743c1204b297 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/SingleResp.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs new file mode 100644 index 00000000..0c64fdf6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Ocsp +{ + /** + * wrapper for the UnknownInfo object + */ + public class UnknownStatus + : CertificateStatus + { + public UnknownStatus() + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs.meta new file mode 100644 index 00000000..7a8e0728 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e5c3c6df296925848810cfa3836dc0b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/ocsp/UnknownStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl.meta new file mode 100644 index 00000000..5c240084 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e713d0ddac6de8d41b1257a307ef976a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs new file mode 100644 index 00000000..cb213b5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class EncryptionException + : IOException + { + public EncryptionException() + : base() + { + } + + public EncryptionException(string message) + : base(message) + { + } + + public EncryptionException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected EncryptionException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs.meta new file mode 100644 index 00000000..ae9a8cbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 981e1ba8edf9e9e4988c31f98532ae5b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/EncryptionException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs new file mode 100644 index 00000000..b8fa41d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + public interface IPasswordFinder + { + char[] GetPassword(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs.meta new file mode 100644 index 00000000..d37749c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a0edd8897a93e634d895a9f8c5ae3984 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/IPasswordFinder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs new file mode 100644 index 00000000..019e8edf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs @@ -0,0 +1,274 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + /** + * PEM generator for the original set of PEM objects used in Open SSL. + */ + public class MiscPemGenerator + : PemObjectGenerator + { + private readonly object obj; + private readonly string algorithm; + private readonly char[] password; + private readonly SecureRandom random; + + public MiscPemGenerator(object obj) + { + this.obj = obj; + } + + public MiscPemGenerator( + object obj, + string algorithm, + char[] password, + SecureRandom random) + { + this.obj = obj; + this.algorithm = algorithm; + this.password = password; + this.random = random; + } + + private static PemObject CreatePemObject(object obj) + { + if (obj == null) + throw new ArgumentNullException("obj"); + + if (obj is AsymmetricCipherKeyPair keyPair) + { + return CreatePemObject(keyPair.Private); + } + + string type; + byte[] encoding; + + if (obj is PemObject pemObject) + return pemObject; + + if (obj is PemObjectGenerator pemObjectGenerator) + return pemObjectGenerator.Generate(); + + if (obj is X509Certificate certificate) + { + // TODO Should we prefer "X509 CERTIFICATE" here? + type = "CERTIFICATE"; + try + { + encoding = certificate.GetEncoded(); + } + catch (CertificateEncodingException e) + { + throw new IOException("Cannot Encode object: " + e.ToString()); + } + } + else if (obj is X509Crl crl) + { + type = "X509 CRL"; + try + { + encoding = crl.GetEncoded(); + } + catch (CrlException e) + { + throw new IOException("Cannot Encode object: " + e.ToString()); + } + } + else if (obj is AsymmetricKeyParameter akp) + { + if (akp.IsPrivate) + { + encoding = EncodePrivateKey(akp, out type); + } + else + { + type = "PUBLIC KEY"; + + encoding = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(akp).GetDerEncoded(); + } + } + else if (obj is X509V2AttributeCertificate attrCert) + { + type = "ATTRIBUTE CERTIFICATE"; + encoding = attrCert.GetEncoded(); + } + else if (obj is Pkcs10CertificationRequest certReq) + { + type = "CERTIFICATE REQUEST"; + encoding = certReq.GetEncoded(); + } + else if (obj is Asn1.Cms.ContentInfo contentInfo) + { + type = "PKCS7"; + encoding = contentInfo.GetEncoded(); + } + else + { + throw new PemGenerationException("Object type not supported: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + return new PemObject(type, encoding); + } + +// private string GetHexEncoded(byte[] bytes) +// { +// bytes = Hex.Encode(bytes); +// +// char[] chars = new char[bytes.Length]; +// +// for (int i = 0; i != bytes.Length; i++) +// { +// chars[i] = (char)bytes[i]; +// } +// +// return new string(chars); +// } + + private static PemObject CreatePemObject( + object obj, + string algorithm, + char[] password, + SecureRandom random) + { + if (obj == null) + throw new ArgumentNullException("obj"); + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + if (password == null) + throw new ArgumentNullException("password"); + if (random == null) + throw new ArgumentNullException("random"); + + if (obj is AsymmetricCipherKeyPair keyPair) + { + return CreatePemObject(keyPair.Private, algorithm, password, random); + } + + string type = null; + byte[] keyData = null; + + if (obj is AsymmetricKeyParameter akp) + { + if (akp.IsPrivate) + { + keyData = EncodePrivateKey(akp, out type); + } + } + + if (type == null || keyData == null) + { + // TODO Support other types? + throw new PemGenerationException("Object type not supported: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(obj)); + } + + + string dekAlgName = algorithm.ToUpperInvariant(); + + // Note: For backward compatibility + if (dekAlgName == "DESEDE") + { + dekAlgName = "DES-EDE3-CBC"; + } + + int ivLength = Org.BouncyCastle.Utilities.Platform.StartsWith(dekAlgName, "AES-") ? 16 : 8; + + byte[] iv = new byte[ivLength]; + random.NextBytes(iv); + + byte[] encData = PemUtilities.Crypt(true, keyData, password, dekAlgName, iv); + + var headers = new List(2); + headers.Add(new PemHeader("Proc-Type", "4,ENCRYPTED")); + headers.Add(new PemHeader("DEK-Info", dekAlgName + "," + Hex.ToHexString(iv).ToUpperInvariant())); + + return new PemObject(type, headers, encData); + } + + private static byte[] EncodePrivateKey( + AsymmetricKeyParameter akp, + out string keyType) + { + PrivateKeyInfo info = PrivateKeyInfoFactory.CreatePrivateKeyInfo(akp); + AlgorithmIdentifier algID = info.PrivateKeyAlgorithm; + DerObjectIdentifier oid = algID.Algorithm; + + if (oid.Equals(X9ObjectIdentifiers.IdDsa)) + { + keyType = "DSA PRIVATE KEY"; + + DsaParameter p = DsaParameter.GetInstance(algID.Parameters); + + BigInteger x = ((DsaPrivateKeyParameters) akp).X; + BigInteger y = p.G.ModPow(x, p.P); + + // TODO Create an ASN1 object somewhere for this? + return new DerSequence( + new DerInteger(0), + new DerInteger(p.P), + new DerInteger(p.Q), + new DerInteger(p.G), + new DerInteger(y), + new DerInteger(x)).GetEncoded(); + } + + if (oid.Equals(PkcsObjectIdentifiers.RsaEncryption)) + { + keyType = "RSA PRIVATE KEY"; + + return info.ParsePrivateKey().GetEncoded(); + } + else if (oid.Equals(CryptoProObjectIdentifiers.GostR3410x2001) + || oid.Equals(X9ObjectIdentifiers.IdECPublicKey)) + { + keyType = "EC PRIVATE KEY"; + + return info.ParsePrivateKey().GetEncoded(); + } + else + { + keyType = "PRIVATE KEY"; + + return info.GetEncoded(); + } + } + + public PemObject Generate() + { + try + { + if (algorithm != null) + { + return CreatePemObject(obj, algorithm, password, random); + } + + return CreatePemObject(obj); + } + catch (IOException e) + { + throw new PemGenerationException("encoding exception", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs.meta new file mode 100644 index 00000000..251e4240 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c60119b76d63fc94abf11f318989f875 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/MiscPemGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs new file mode 100644 index 00000000..fe58b4ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + [Serializable] + public class PemException + : IOException + { + public PemException() + : base() + { + } + + public PemException(string message) + : base(message) + { + } + + public PemException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PemException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs.meta new file mode 100644 index 00000000..327660b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05876173bd4800c4583fde079bb2cec5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs new file mode 100644 index 00000000..196c6305 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs @@ -0,0 +1,393 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + /** + * Class for reading OpenSSL PEM encoded streams containing + * X509 certificates, PKCS8 encoded keys and PKCS7 objects. + *

    + * In the case of PKCS7 objects the reader will return a CMS ContentInfo object. Keys and + * Certificates will be returned using the appropriate java.security type.

    + */ + public class PemReader + : Utilities.IO.Pem.PemReader + { + //private static readonly Dictionary Parsers = new Dictionary(); + + static PemReader() + { +// Parsers.Add("CERTIFICATE REQUEST", new PKCS10CertificationRequestParser()); +// Parsers.Add("NEW CERTIFICATE REQUEST", new PKCS10CertificationRequestParser()); +// Parsers.Add("CERTIFICATE", new X509CertificateParser(provider)); +// Parsers.Add("X509 CERTIFICATE", new X509CertificateParser(provider)); +// Parsers.Add("X509 CRL", new X509CRLParser(provider)); +// Parsers.Add("PKCS7", new PKCS7Parser()); +// Parsers.Add("ATTRIBUTE CERTIFICATE", new X509AttributeCertificateParser()); +// Parsers.Add("EC PARAMETERS", new ECNamedCurveSpecParser()); +// Parsers.Add("PUBLIC KEY", new PublicKeyParser(provider)); +// Parsers.Add("RSA PUBLIC KEY", new RSAPublicKeyParser(provider)); +// Parsers.Add("RSA PRIVATE KEY", new RSAKeyPairParser(provider)); +// Parsers.Add("DSA PRIVATE KEY", new DSAKeyPairParser(provider)); +// Parsers.Add("EC PRIVATE KEY", new ECDSAKeyPairParser(provider)); +// Parsers.Add("ENCRYPTED PRIVATE KEY", new EncryptedPrivateKeyParser(provider)); +// Parsers.Add("PRIVATE KEY", new PrivateKeyParser(provider)); + } + + private readonly IPasswordFinder pFinder; + + /** + * Create a new PemReader + * + * @param reader the Reader + */ + public PemReader( + TextReader reader) + : this(reader, null) + { + } + + /** + * Create a new PemReader with a password finder + * + * @param reader the Reader + * @param pFinder the password finder + */ + public PemReader( + TextReader reader, + IPasswordFinder pFinder) + : base(reader) + { + this.pFinder = pFinder; + } + + public object ReadObject() + { + PemObject obj = ReadPemObject(); + + if (obj == null) + return null; + + // TODO Follow Java build and map to parser objects? +// if (parsers.Contains(obj.Type)) +// return ((PemObjectParser)parsers[obj.Type]).ParseObject(obj); + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(obj.Type, "PRIVATE KEY")) + return ReadPrivateKey(obj); + + switch (obj.Type) + { + case "PUBLIC KEY": + return ReadPublicKey(obj); + case "RSA PUBLIC KEY": + return ReadRsaPublicKey(obj); + case "CERTIFICATE REQUEST": + case "NEW CERTIFICATE REQUEST": + return ReadCertificateRequest(obj); + case "CERTIFICATE": + case "X509 CERTIFICATE": + return ReadCertificate(obj); + case "PKCS7": + case "CMS": + return ReadPkcs7(obj); + case "X509 CRL": + return ReadCrl(obj); + case "ATTRIBUTE CERTIFICATE": + return ReadAttributeCertificate(obj); + // TODO Add back in when tests done, and return type issue resolved + //case "EC PARAMETERS": + // return ReadECParameters(obj); + default: + throw new IOException("unrecognised object: " + obj.Type); + } + } + + private AsymmetricKeyParameter ReadRsaPublicKey(PemObject pemObject) + { + RsaPublicKeyStructure rsaPubStructure = RsaPublicKeyStructure.GetInstance( + Asn1Object.FromByteArray(pemObject.Content)); + + return new RsaKeyParameters( + false, // not private + rsaPubStructure.Modulus, + rsaPubStructure.PublicExponent); + } + + private AsymmetricKeyParameter ReadPublicKey(PemObject pemObject) + { + return PublicKeyFactory.CreateKey(pemObject.Content); + } + + /** + * Reads in a X509Certificate. + * + * @return the X509Certificate + * @throws IOException if an I/O error occured + */ + private X509Certificate ReadCertificate(PemObject pemObject) + { + try + { + return new X509CertificateParser().ReadCertificate(pemObject.Content); + } + catch (Exception e) + { + throw new PemException("problem parsing cert: " + e.ToString()); + } + } + + /** + * Reads in a X509CRL. + * + * @return the X509Certificate + * @throws IOException if an I/O error occured + */ + private X509Crl ReadCrl(PemObject pemObject) + { + try + { + return new X509CrlParser().ReadCrl(pemObject.Content); + } + catch (Exception e) + { + throw new PemException("problem parsing cert: " + e.ToString()); + } + } + + /** + * Reads in a PKCS10 certification request. + * + * @return the certificate request. + * @throws IOException if an I/O error occured + */ + private Pkcs10CertificationRequest ReadCertificateRequest(PemObject pemObject) + { + try + { + return new Pkcs10CertificationRequest(pemObject.Content); + } + catch (Exception e) + { + throw new PemException("problem parsing cert: " + e.ToString()); + } + } + + /** + * Reads in a X509 Attribute Certificate. + * + * @return the X509 Attribute Certificate + * @throws IOException if an I/O error occured + */ + private X509V2AttributeCertificate ReadAttributeCertificate(PemObject pemObject) + { + return new X509V2AttributeCertificate(pemObject.Content); + } + + /** + * Reads in a PKCS7 object. This returns a ContentInfo object suitable for use with the CMS + * API. + * + * @return the X509Certificate + * @throws IOException if an I/O error occured + */ + // TODO Consider returning Asn1.Pkcs.ContentInfo + private Asn1.Cms.ContentInfo ReadPkcs7(PemObject pemObject) + { + try + { + return Asn1.Cms.ContentInfo.GetInstance( + Asn1Object.FromByteArray(pemObject.Content)); + } + catch (Exception e) + { + throw new PemException("problem parsing PKCS7 object: " + e.ToString()); + } + } + + /** + * Read a Key Pair + */ + private object ReadPrivateKey(PemObject pemObject) + { + // + // extract the key + // + Debug.Assert(Org.BouncyCastle.Utilities.Platform.EndsWith(pemObject.Type, "PRIVATE KEY")); + + string type = pemObject.Type.Substring(0, pemObject.Type.Length - "PRIVATE KEY".Length).Trim(); + byte[] keyBytes = pemObject.Content; + + var fields = new Dictionary(); + foreach (PemHeader header in pemObject.Headers) + { + fields[header.Name] = header.Value; + } + + string procType = CollectionUtilities.GetValueOrNull(fields, "Proc-Type"); + + if (procType == "4,ENCRYPTED") + { + if (pFinder == null) + throw new PasswordException("No password finder specified, but a password is required"); + + char[] password = pFinder.GetPassword(); + if (password == null) + throw new PasswordException("Password is null, but a password is required"); + + if (!fields.TryGetValue("DEK-Info", out var dekInfo)) + throw new PemException("missing DEK-info"); + + string[] tknz = dekInfo.Split(','); + + string dekAlgName = tknz[0].Trim(); + byte[] iv = Hex.Decode(tknz[1].Trim()); + + keyBytes = PemUtilities.Crypt(false, keyBytes, password, dekAlgName, iv); + } + + try + { + AsymmetricKeyParameter pubSpec, privSpec; + Asn1Sequence seq = Asn1Sequence.GetInstance(keyBytes); + + switch (type) + { + case "RSA": + { + if (seq.Count != 9) + throw new PemException("malformed sequence in RSA private key"); + + RsaPrivateKeyStructure rsa = RsaPrivateKeyStructure.GetInstance(seq); + + pubSpec = new RsaKeyParameters(false, rsa.Modulus, rsa.PublicExponent); + privSpec = new RsaPrivateCrtKeyParameters( + rsa.Modulus, rsa.PublicExponent, rsa.PrivateExponent, + rsa.Prime1, rsa.Prime2, rsa.Exponent1, rsa.Exponent2, + rsa.Coefficient); + + break; + } + + case "DSA": + { + if (seq.Count != 6) + throw new PemException("malformed sequence in DSA private key"); + + // TODO Create an ASN1 object somewhere for this? + //DerInteger v = (DerInteger)seq[0]; + DerInteger p = (DerInteger)seq[1]; + DerInteger q = (DerInteger)seq[2]; + DerInteger g = (DerInteger)seq[3]; + DerInteger y = (DerInteger)seq[4]; + DerInteger x = (DerInteger)seq[5]; + + DsaParameters parameters = new DsaParameters(p.Value, q.Value, g.Value); + + privSpec = new DsaPrivateKeyParameters(x.Value, parameters); + pubSpec = new DsaPublicKeyParameters(y.Value, parameters); + + break; + } + + case "EC": + { + ECPrivateKeyStructure pKey = ECPrivateKeyStructure.GetInstance(seq); + AlgorithmIdentifier algId = new AlgorithmIdentifier( + X9ObjectIdentifiers.IdECPublicKey, pKey.GetParameters()); + + PrivateKeyInfo privInfo = new PrivateKeyInfo(algId, pKey.ToAsn1Object()); + + // TODO Are the keys returned here ECDSA, as Java version forces? + privSpec = PrivateKeyFactory.CreateKey(privInfo); + + DerBitString pubKey = pKey.GetPublicKey(); + if (pubKey != null) + { + SubjectPublicKeyInfo pubInfo = new SubjectPublicKeyInfo(algId, pubKey.GetBytes()); + + // TODO Are the keys returned here ECDSA, as Java version forces? + pubSpec = PublicKeyFactory.CreateKey(pubInfo); + } + else + { + pubSpec = ECKeyPairGenerator.GetCorrespondingPublicKey( + (ECPrivateKeyParameters)privSpec); + } + + break; + } + + case "ENCRYPTED": + { + char[] password = pFinder.GetPassword(); + + if (password == null) + throw new PasswordException("Password is null, but a password is required"); + + return PrivateKeyFactory.DecryptKey(password, EncryptedPrivateKeyInfo.GetInstance(seq)); + } + + case "": + { + return PrivateKeyFactory.CreateKey(PrivateKeyInfo.GetInstance(seq)); + } + + default: + throw new ArgumentException("Unknown key type: " + type, "type"); + } + + return new AsymmetricCipherKeyPair(pubSpec, privSpec); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new PemException( + "problem creating " + type + " private key: " + e.ToString()); + } + } + + // TODO Add an equivalent class for ECNamedCurveParameterSpec? + //private ECNamedCurveParameterSpec ReadECParameters( +// private X9ECParameters ReadECParameters(PemObject pemObject) +// { +// DerObjectIdentifier oid = (DerObjectIdentifier)Asn1Object.FromByteArray(pemObject.Content); +// +// //return ECNamedCurveTable.getParameterSpec(oid.Id); +// return GetCurveParameters(oid.Id); +// } + + private static X9ECParameters GetCurveParameters(string name) + { + X9ECParameters ecP = ECKeyPairGenerator.FindECCurveByName(name); + if (ecP == null) + throw new Exception("unknown curve name: " + name); + + return ecP; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs.meta new file mode 100644 index 00000000..19cbe5ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cfc57f0adcd8ed94e9079cf443360e9b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMReader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs new file mode 100644 index 00000000..525ac12b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs @@ -0,0 +1,162 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + internal sealed class PemUtilities + { + private enum PemBaseAlg { AES_128, AES_192, AES_256, BF, DES, DES_EDE, DES_EDE3, RC2, RC2_40, RC2_64 }; + private enum PemMode { CBC, CFB, ECB, OFB }; + + static PemUtilities() + { + // Signal to obfuscation tools not to change enum constants + Enums.GetArbitraryValue().ToString(); + Enums.GetArbitraryValue().ToString(); + } + + private static void ParseDekAlgName( + string dekAlgName, + out PemBaseAlg baseAlg, + out PemMode mode) + { + try + { + mode = PemMode.ECB; + + if (dekAlgName == "DES-EDE" || dekAlgName == "DES-EDE3") + { + baseAlg = Enums.GetEnumValue(dekAlgName); + return; + } + + int pos = dekAlgName.LastIndexOf('-'); + if (pos >= 0) + { + baseAlg = Enums.GetEnumValue(dekAlgName.Substring(0, pos)); + mode = Enums.GetEnumValue(dekAlgName.Substring(pos + 1)); + return; + } + } + catch (ArgumentException) + { + } + + throw new EncryptionException("Unknown DEK algorithm: " + dekAlgName); + } + + internal static byte[] Crypt( + bool encrypt, + byte[] bytes, + char[] password, + string dekAlgName, + byte[] iv) + { + PemBaseAlg baseAlg; + PemMode mode; + ParseDekAlgName(dekAlgName, out baseAlg, out mode); + + string padding; + switch (mode) + { + case PemMode.CBC: + case PemMode.ECB: + padding = "PKCS5Padding"; + break; + case PemMode.CFB: + case PemMode.OFB: + padding = "NoPadding"; + break; + default: + throw new EncryptionException("Unknown DEK algorithm: " + dekAlgName); + } + + string algorithm; + + byte[] salt = iv; + switch (baseAlg) + { + case PemBaseAlg.AES_128: + case PemBaseAlg.AES_192: + case PemBaseAlg.AES_256: + algorithm = "AES"; + if (salt.Length > 8) + { + salt = new byte[8]; + Array.Copy(iv, 0, salt, 0, salt.Length); + } + break; + case PemBaseAlg.BF: + algorithm = "BLOWFISH"; + break; + case PemBaseAlg.DES: + algorithm = "DES"; + break; + case PemBaseAlg.DES_EDE: + case PemBaseAlg.DES_EDE3: + algorithm = "DESede"; + break; + case PemBaseAlg.RC2: + case PemBaseAlg.RC2_40: + case PemBaseAlg.RC2_64: + algorithm = "RC2"; + break; + default: + throw new EncryptionException("Unknown DEK algorithm: " + dekAlgName); + } + + string cipherName = algorithm + "/" + mode + "/" + padding; + IBufferedCipher cipher = CipherUtilities.GetCipher(cipherName); + + ICipherParameters cParams = GetCipherParameters(password, baseAlg, salt); + + if (mode != PemMode.ECB) + { + cParams = new ParametersWithIV(cParams, iv); + } + + cipher.Init(encrypt, cParams); + + return cipher.DoFinal(bytes); + } + + private static ICipherParameters GetCipherParameters( + char[] password, + PemBaseAlg baseAlg, + byte[] salt) + { + string algorithm; + int keyBits; + switch (baseAlg) + { + case PemBaseAlg.AES_128: keyBits = 128; algorithm = "AES128"; break; + case PemBaseAlg.AES_192: keyBits = 192; algorithm = "AES192"; break; + case PemBaseAlg.AES_256: keyBits = 256; algorithm = "AES256"; break; + case PemBaseAlg.BF: keyBits = 128; algorithm = "BLOWFISH"; break; + case PemBaseAlg.DES: keyBits = 64; algorithm = "DES"; break; + case PemBaseAlg.DES_EDE: keyBits = 128; algorithm = "DESEDE"; break; + case PemBaseAlg.DES_EDE3: keyBits = 192; algorithm = "DESEDE3"; break; + case PemBaseAlg.RC2: keyBits = 128; algorithm = "RC2"; break; + case PemBaseAlg.RC2_40: keyBits = 40; algorithm = "RC2"; break; + case PemBaseAlg.RC2_64: keyBits = 64; algorithm = "RC2"; break; + default: + return null; + } + + OpenSslPbeParametersGenerator pGen = new OpenSslPbeParametersGenerator(); + + pGen.Init(PbeParametersGenerator.Pkcs5PasswordToBytes(password), salt); + + return pGen.GenerateDerivedParameters(algorithm, keyBits); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs.meta new file mode 100644 index 00000000..8f4fc53d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ef457f1e14880fd4788266fbf19f7d07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs new file mode 100644 index 00000000..24836d0b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + /// General purpose writer for OpenSSL PEM objects. + public class PemWriter + : Utilities.IO.Pem.PemWriter + { + /// The TextWriter object to write the output to. + public PemWriter(TextWriter writer) + : base(writer) + { + } + + public void WriteObject(object obj) + { + try + { + base.WriteObject(new MiscPemGenerator(obj)); + } + catch (PemGenerationException e) + { + if (e.InnerException is IOException inner) + throw inner; + + throw e; + } + } + + public void WriteObject( + object obj, + string algorithm, + char[] password, + SecureRandom random) + { + base.WriteObject(new MiscPemGenerator(obj, algorithm, password, random)); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs.meta new file mode 100644 index 00000000..a0a06a78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b50122db0d5f8b4795d6e09a238f875 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PEMWriter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs new file mode 100644 index 00000000..622086ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class PasswordException + : IOException + { + public PasswordException() + : base() + { + } + + public PasswordException(string message) + : base(message) + { + } + + public PasswordException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PasswordException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs.meta new file mode 100644 index 00000000..ce687dba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9aba0b83e16be5a4abb9d6eed08dce75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/PasswordException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs new file mode 100644 index 00000000..bb88ae9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs @@ -0,0 +1,106 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl +{ + public class Pkcs8Generator + : PemObjectGenerator + { + // FIXME See PbeUtilities static constructor +// public static readonly string Aes128Cbc = NistObjectIdentifiers.IdAes128Cbc.Id; +// public static readonly string Aes192Cbc = NistObjectIdentifiers.IdAes192Cbc.Id; +// public static readonly string Aes256Cbc = NistObjectIdentifiers.IdAes256Cbc.Id; +// +// public static readonly string Des3Cbc = PkcsObjectIdentifiers.DesEde3Cbc.Id; + + public static readonly string PbeSha1_RC4_128 = PkcsObjectIdentifiers.PbeWithShaAnd128BitRC4.Id; + public static readonly string PbeSha1_RC4_40 = PkcsObjectIdentifiers.PbeWithShaAnd40BitRC4.Id; + public static readonly string PbeSha1_3DES = PkcsObjectIdentifiers.PbeWithShaAnd3KeyTripleDesCbc.Id; + public static readonly string PbeSha1_2DES = PkcsObjectIdentifiers.PbeWithShaAnd2KeyTripleDesCbc.Id; + public static readonly string PbeSha1_RC2_128 = PkcsObjectIdentifiers.PbeWithShaAnd128BitRC2Cbc.Id; + public static readonly string PbeSha1_RC2_40 = PkcsObjectIdentifiers.PbewithShaAnd40BitRC2Cbc.Id; + + private char[] password; + private string algorithm; + private int iterationCount; + private AsymmetricKeyParameter privKey; + private SecureRandom random; + + /** + * Constructor for an unencrypted private key PEM object. + * + * @param key private key to be encoded. + */ + public Pkcs8Generator(AsymmetricKeyParameter privKey) + { + this.privKey = privKey; + } + + /** + * Constructor for an encrypted private key PEM object. + * + * @param key private key to be encoded + * @param algorithm encryption algorithm to use + * @param provider provider to use + * @throws NoSuchAlgorithmException if algorithm/mode cannot be found + */ + public Pkcs8Generator(AsymmetricKeyParameter privKey, string algorithm) + { + // TODO Check privKey.IsPrivate + this.privKey = privKey; + this.algorithm = algorithm; + this.iterationCount = 2048; + } + + public SecureRandom SecureRandom + { + set { this.random = value; } + } + + public char[] Password + { + set { this.password = value; } + } + + public int IterationCount + { + set { this.iterationCount = value; } + } + + public PemObject Generate() + { + if (algorithm == null) + { + PrivateKeyInfo pki = PrivateKeyInfoFactory.CreatePrivateKeyInfo(privKey); + + return new PemObject("PRIVATE KEY", pki.GetEncoded()); + } + + // TODO Theoretically, the amount of salt needed depends on the algorithm + byte[] salt = new byte[20]; + random = CryptoServicesRegistrar.GetSecureRandom(random); + random.NextBytes(salt); + + try + { + EncryptedPrivateKeyInfo epki = EncryptedPrivateKeyInfoFactory.CreateEncryptedPrivateKeyInfo( + algorithm, password, salt, iterationCount, privKey); + + return new PemObject("ENCRYPTED PRIVATE KEY", epki.GetEncoded()); + } + catch (Exception e) + { + throw new PemGenerationException("Couldn't encrypt private key", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs.meta new file mode 100644 index 00000000..9daee5a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d20b9798489068e46a4f7fb07d337dd5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/openssl/Pkcs8Generator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs.meta new file mode 100644 index 00000000..754510c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a3d2d285511156b49a5b28a08e70c28c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs new file mode 100644 index 00000000..d19bd65c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public class AsymmetricKeyEntry + : Pkcs12Entry + { + private readonly AsymmetricKeyParameter key; + + public AsymmetricKeyEntry(AsymmetricKeyParameter key) + : base(new Dictionary()) + { + this.key = key; + } + + public AsymmetricKeyEntry(AsymmetricKeyParameter key, + IDictionary attributes) + : base(attributes) + { + this.key = key; + } + + public AsymmetricKeyParameter Key + { + get { return this.key; } + } + + public override bool Equals(object obj) + { + AsymmetricKeyEntry other = obj as AsymmetricKeyEntry; + + if (other == null) + return false; + + return key.Equals(other.key); + } + + public override int GetHashCode() + { + return ~key.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs.meta new file mode 100644 index 00000000..ab8abe47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 75f3173b523280747ae0bf35112a8cf4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/AsymmetricKeyEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs new file mode 100644 index 00000000..f05dbc70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs @@ -0,0 +1,106 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public sealed class EncryptedPrivateKeyInfoFactory + { + private EncryptedPrivateKeyInfoFactory() + { + } + + public static EncryptedPrivateKeyInfo CreateEncryptedPrivateKeyInfo( + DerObjectIdentifier algorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + AsymmetricKeyParameter key) + { + return CreateEncryptedPrivateKeyInfo( + algorithm.Id, passPhrase, salt, iterationCount, + PrivateKeyInfoFactory.CreatePrivateKeyInfo(key)); + } + + public static EncryptedPrivateKeyInfo CreateEncryptedPrivateKeyInfo( + string algorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + AsymmetricKeyParameter key) + { + return CreateEncryptedPrivateKeyInfo( + algorithm, passPhrase, salt, iterationCount, + PrivateKeyInfoFactory.CreatePrivateKeyInfo(key)); + } + + public static EncryptedPrivateKeyInfo CreateEncryptedPrivateKeyInfo( + string algorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + PrivateKeyInfo keyInfo) + { + IBufferedCipher cipher = PbeUtilities.CreateEngine(algorithm) as IBufferedCipher; + if (cipher == null) + throw new Exception("Unknown encryption algorithm: " + algorithm); + + Asn1Encodable pbeParameters = PbeUtilities.GenerateAlgorithmParameters( + algorithm, salt, iterationCount); + ICipherParameters cipherParameters = PbeUtilities.GenerateCipherParameters( + algorithm, passPhrase, pbeParameters); + cipher.Init(true, cipherParameters); + byte[] encoding = cipher.DoFinal(keyInfo.GetEncoded()); + + DerObjectIdentifier oid = PbeUtilities.GetObjectIdentifier(algorithm); + AlgorithmIdentifier algID = new AlgorithmIdentifier(oid, pbeParameters); + return new EncryptedPrivateKeyInfo(algID, encoding); + } + + public static EncryptedPrivateKeyInfo CreateEncryptedPrivateKeyInfo( + DerObjectIdentifier cipherAlgorithm, + DerObjectIdentifier prfAlgorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + SecureRandom random, + AsymmetricKeyParameter key) + { + return CreateEncryptedPrivateKeyInfo( + cipherAlgorithm, prfAlgorithm, passPhrase, salt, iterationCount, random, + PrivateKeyInfoFactory.CreatePrivateKeyInfo(key)); + } + + public static EncryptedPrivateKeyInfo CreateEncryptedPrivateKeyInfo( + DerObjectIdentifier cipherAlgorithm, + DerObjectIdentifier prfAlgorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + SecureRandom random, + PrivateKeyInfo keyInfo) + { + IBufferedCipher cipher = CipherUtilities.GetCipher(cipherAlgorithm) as IBufferedCipher; + if (cipher == null) + throw new Exception("Unknown encryption algorithm: " + cipherAlgorithm); + + Asn1Encodable pbeParameters = PbeUtilities.GenerateAlgorithmParameters( + cipherAlgorithm, prfAlgorithm, salt, iterationCount, random); + ICipherParameters cipherParameters = PbeUtilities.GenerateCipherParameters( + PkcsObjectIdentifiers.IdPbeS2, passPhrase, pbeParameters); + cipher.Init(true, cipherParameters); + byte[] encoding = cipher.DoFinal(keyInfo.GetEncoded()); + + AlgorithmIdentifier algID = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdPbeS2, pbeParameters); + return new EncryptedPrivateKeyInfo(algID, encoding); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs.meta new file mode 100644 index 00000000..218c7c26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 52e397b191f385f4f9b69077ef030ccd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/EncryptedPrivateKeyInfoFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs new file mode 100644 index 00000000..2fa9ef69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public class Pkcs12StoreBuilder + { + private DerObjectIdentifier keyAlgorithm = PkcsObjectIdentifiers.PbeWithShaAnd3KeyTripleDesCbc; + private DerObjectIdentifier certAlgorithm = PkcsObjectIdentifiers.PbewithShaAnd40BitRC2Cbc; + private DerObjectIdentifier keyPrfAlgorithm = null; + private bool useDerEncoding = false; + + public Pkcs12StoreBuilder() + { + } + + public Pkcs12Store Build() + { + return new Pkcs12Store(keyAlgorithm, keyPrfAlgorithm, certAlgorithm, useDerEncoding); + } + + public Pkcs12StoreBuilder SetCertAlgorithm(DerObjectIdentifier certAlgorithm) + { + this.certAlgorithm = certAlgorithm; + return this; + } + + public Pkcs12StoreBuilder SetKeyAlgorithm(DerObjectIdentifier keyAlgorithm) + { + this.keyAlgorithm = keyAlgorithm; + return this; + } + + // Specify a PKCS#5 Scheme 2 encryption for keys + public Pkcs12StoreBuilder SetKeyAlgorithm(DerObjectIdentifier keyAlgorithm, DerObjectIdentifier keyPrfAlgorithm) + { + this.keyAlgorithm = keyAlgorithm; + this.keyPrfAlgorithm = keyPrfAlgorithm; + return this; + } + public Pkcs12StoreBuilder SetUseDerEncoding(bool useDerEncoding) + { + this.useDerEncoding = useDerEncoding; + return this; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs.meta new file mode 100644 index 00000000..6f0602d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a70510229ec6bc346997ebdab22d9cc8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PKCS12StoreBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs new file mode 100644 index 00000000..2bf4a293 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs @@ -0,0 +1,538 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /// + /// A class for verifying and creating Pkcs10 Certification requests. + /// + /// + /// CertificationRequest ::= Sequence { + /// certificationRequestInfo CertificationRequestInfo, + /// signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }}, + /// signature BIT STRING + /// } + /// + /// CertificationRequestInfo ::= Sequence { + /// version Integer { v1(0) } (v1,...), + /// subject Name, + /// subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }}, + /// attributes [0] Attributes{{ CRIAttributes }} + /// } + /// + /// Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }} + /// + /// Attr { ATTRIBUTE:IOSet } ::= Sequence { + /// type ATTRIBUTE.&id({IOSet}), + /// values Set SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{\@type}) + /// } + /// + /// see + public class Pkcs10CertificationRequest + : CertificationRequest + { + internal static readonly Dictionary m_algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + internal static readonly Dictionary m_exParams = + new Dictionary(StringComparer.OrdinalIgnoreCase); + internal static readonly Dictionary m_keyAlgorithms = + new Dictionary(); + internal static readonly Dictionary m_oids = + new Dictionary(); + internal static readonly HashSet m_noParams = new HashSet(); + + static Pkcs10CertificationRequest() + { + m_algorithms.Add("MD2WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD2WITHRSA", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD5WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("MD5WITHRSA", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("RSAWITHMD5", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA1WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA224WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA256WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA384WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA512WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("RSAWITHSHA1", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("RIPEMD128WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD128WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD160WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD160WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD256WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("RIPEMD256WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("SHA1WITHDSA", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("DSAWITHSHA1", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("SHA224WITHDSA", NistObjectIdentifiers.DsaWithSha224); + m_algorithms.Add("SHA256WITHDSA", NistObjectIdentifiers.DsaWithSha256); + m_algorithms.Add("SHA384WITHDSA", NistObjectIdentifiers.DsaWithSha384); + m_algorithms.Add("SHA512WITHDSA", NistObjectIdentifiers.DsaWithSha512); + m_algorithms.Add("SHA1WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("SHA224WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha224); + m_algorithms.Add("SHA256WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha256); + m_algorithms.Add("SHA384WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha384); + m_algorithms.Add("SHA512WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha512); + m_algorithms.Add("ECDSAWITHSHA1", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("GOST3411WITHGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3410WITHGOST3411", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3411WITHECGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHECGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + + // + // reverse mappings + // + m_oids.Add(PkcsObjectIdentifiers.Sha1WithRsaEncryption, "SHA1WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha224WithRsaEncryption, "SHA224WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha256WithRsaEncryption, "SHA256WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha384WithRsaEncryption, "SHA384WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha512WithRsaEncryption, "SHA512WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha512_224WithRSAEncryption, "SHA512(224)WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.Sha512_256WithRSAEncryption, "SHA512(256)WITHRSA"); + m_oids.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94, "GOST3411WITHGOST3410"); + m_oids.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001, "GOST3411WITHECGOST3410"); + + m_oids.Add(PkcsObjectIdentifiers.MD5WithRsaEncryption, "MD5WITHRSA"); + m_oids.Add(PkcsObjectIdentifiers.MD2WithRsaEncryption, "MD2WITHRSA"); + m_oids.Add(X9ObjectIdentifiers.IdDsaWithSha1, "SHA1WITHDSA"); + m_oids.Add(X9ObjectIdentifiers.ECDsaWithSha1, "SHA1WITHECDSA"); + m_oids.Add(X9ObjectIdentifiers.ECDsaWithSha224, "SHA224WITHECDSA"); + m_oids.Add(X9ObjectIdentifiers.ECDsaWithSha256, "SHA256WITHECDSA"); + m_oids.Add(X9ObjectIdentifiers.ECDsaWithSha384, "SHA384WITHECDSA"); + m_oids.Add(X9ObjectIdentifiers.ECDsaWithSha512, "SHA512WITHECDSA"); + m_oids.Add(OiwObjectIdentifiers.MD5WithRsa, "MD5WITHRSA"); + m_oids.Add(OiwObjectIdentifiers.Sha1WithRsa, "SHA1WITHRSA"); + m_oids.Add(OiwObjectIdentifiers.DsaWithSha1, "SHA1WITHDSA"); + m_oids.Add(NistObjectIdentifiers.DsaWithSha224, "SHA224WITHDSA"); + m_oids.Add(NistObjectIdentifiers.DsaWithSha256, "SHA256WITHDSA"); + + // + // key types + // + m_keyAlgorithms.Add(PkcsObjectIdentifiers.RsaEncryption, "RSA"); + m_keyAlgorithms.Add(X9ObjectIdentifiers.IdDsa, "DSA"); + + // + // According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) omit the parameters field. + // The parameters field SHALL be NULL for RSA based signature algorithms. + // + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha1); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha224); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha256); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha384); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha512); + m_noParams.Add(X9ObjectIdentifiers.IdDsaWithSha1); + m_noParams.Add(OiwObjectIdentifiers.DsaWithSha1); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha224); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha256); + + // + // RFC 4491 + // + m_noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + + // + // explicit params + // + AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + m_exParams.Add("SHA1WITHRSAANDMGF1", CreatePssParams(sha1AlgId, 20)); + + AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha224, DerNull.Instance); + m_exParams.Add("SHA224WITHRSAANDMGF1", CreatePssParams(sha224AlgId, 28)); + + AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance); + m_exParams.Add("SHA256WITHRSAANDMGF1", CreatePssParams(sha256AlgId, 32)); + + AlgorithmIdentifier sha384AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance); + m_exParams.Add("SHA384WITHRSAANDMGF1", CreatePssParams(sha384AlgId, 48)); + + AlgorithmIdentifier sha512AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance); + m_exParams.Add("SHA512WITHRSAANDMGF1", CreatePssParams(sha512AlgId, 64)); + } + + private static RsassaPssParameters CreatePssParams( + AlgorithmIdentifier hashAlgId, + int saltSize) + { + return new RsassaPssParameters( + hashAlgId, + new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, hashAlgId), + new DerInteger(saltSize), + new DerInteger(1)); + } + + protected Pkcs10CertificationRequest() + { + } + + public Pkcs10CertificationRequest( + byte[] encoded) + : base((Asn1Sequence)Asn1Object.FromByteArray(encoded)) + { + } + + public Pkcs10CertificationRequest( + Asn1Sequence seq) + : base(seq) + { + } + + public Pkcs10CertificationRequest( + Stream input) + : base((Asn1Sequence)Asn1Object.FromStream(input)) + { + } + + /// + /// Instantiate a Pkcs10CertificationRequest object with the necessary credentials. + /// + ///Name of Sig Alg. + /// X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" + /// Public Key to be included in cert reqest. + /// ASN1Set of Attributes. + /// Matching Private key for nominated (above) public key to be used to sign the request. + public Pkcs10CertificationRequest( + string signatureAlgorithm, + X509Name subject, + AsymmetricKeyParameter publicKey, + Asn1Set attributes, + AsymmetricKeyParameter signingKey) + : this(new Asn1SignatureFactory(signatureAlgorithm, signingKey), subject, publicKey, attributes) + { + } + + /// + /// Instantiate a Pkcs10CertificationRequest object with the necessary credentials. + /// + ///The factory for signature calculators to sign the PKCS#10 request with. + /// X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" + /// Public Key to be included in cert reqest. + /// ASN1Set of Attributes. + public Pkcs10CertificationRequest( + ISignatureFactory signatureFactory, + X509Name subject, + AsymmetricKeyParameter publicKey, + Asn1Set attributes) + { + if (signatureFactory == null) + throw new ArgumentNullException("signatureFactory"); + if (subject == null) + throw new ArgumentNullException("subject"); + if (publicKey == null) + throw new ArgumentNullException("publicKey"); + if (publicKey.IsPrivate) + throw new ArgumentException("expected public key", "publicKey"); + + Init(signatureFactory, subject, publicKey, attributes); + } + + private void Init( + ISignatureFactory signatureFactory, + X509Name subject, + AsymmetricKeyParameter publicKey, + Asn1Set attributes) + { + this.sigAlgId = (AlgorithmIdentifier)signatureFactory.AlgorithmDetails; + + SubjectPublicKeyInfo pubInfo = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey); + + this.reqInfo = new CertificationRequestInfo(subject, pubInfo, attributes); + + IStreamCalculator streamCalculator = signatureFactory.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + reqInfo.EncodeTo(sigStream, Der); + } + + // Generate Signature. + sigBits = new DerBitString(streamCalculator.GetResult().Collect()); + } + + // internal Pkcs10CertificationRequest( + // Asn1InputStream seqStream) + // { + // Asn1Sequence seq = (Asn1Sequence) seqStream.ReadObject(); + // try + // { + // this.reqInfo = CertificationRequestInfo.GetInstance(seq[0]); + // this.sigAlgId = AlgorithmIdentifier.GetInstance(seq[1]); + // this.sigBits = (DerBitString) seq[2]; + // } + // catch (Exception ex) + // { + // throw new ArgumentException("Create From Asn1Sequence: " + ex.Message); + // } + // } + + /// + /// Get the public key. + /// + /// The public key. + public AsymmetricKeyParameter GetPublicKey() + { + return PublicKeyFactory.CreateKey(reqInfo.SubjectPublicKeyInfo); + } + + /// + /// Verify Pkcs10 Cert Request is valid. + /// + /// true = valid. + public bool Verify() + { + return Verify(this.GetPublicKey()); + } + + public bool Verify( + AsymmetricKeyParameter publicKey) + { + return Verify(new Asn1VerifierFactoryProvider(publicKey)); + } + + public bool Verify( + IVerifierFactoryProvider verifierProvider) + { + return Verify(verifierProvider.CreateVerifierFactory(sigAlgId)); + } + + public bool Verify( + IVerifierFactory verifier) + { + try + { + byte[] b = reqInfo.GetDerEncoded(); + + IStreamCalculator streamCalculator = verifier.CreateCalculator(); + using (var stream = streamCalculator.Stream) + { + stream.Write(b, 0, b.Length); + } + + return streamCalculator.GetResult().IsVerified(sigBits.GetOctets()); + } + catch (Exception e) + { + throw new SignatureException("exception encoding TBS cert request", e); + } + } + + // /// + // /// Get the Der Encoded Pkcs10 Certification Request. + // /// + // /// A byte array. + // public byte[] GetEncoded() + // { + // return new CertificationRequest(reqInfo, sigAlgId, sigBits).GetDerEncoded(); + // } + + // TODO Figure out how to set parameters on an ISigner + private void SetSignatureParameters( + ISigner signature, + Asn1Encodable asn1Params) + { + if (asn1Params != null && !(asn1Params is Asn1Null)) + { + // AlgorithmParameters sigParams = AlgorithmParameters.GetInstance(signature.getAlgorithm()); + // + // try + // { + // sigParams.init(asn1Params.ToAsn1Object().GetDerEncoded()); + // } + // catch (IOException e) + // { + // throw new SignatureException("IOException decoding parameters: " + e.Message); + // } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(signature.AlgorithmName, "MGF1")) + { + throw new NotImplementedException("signature algorithm with MGF1"); + + // try + // { + // signature.setParameter(sigParams.getParameterSpec(PSSParameterSpec.class)); + // } + // catch (GeneralSecurityException e) + // { + // throw new SignatureException("Exception extracting parameters: " + e.getMessage()); + // } + } + } + } + + internal static string GetSignatureName( + AlgorithmIdentifier sigAlgId) + { + Asn1Encodable asn1Params = sigAlgId.Parameters; + + if (asn1Params != null && !(asn1Params is Asn1Null)) + { + if (sigAlgId.Algorithm.Equals(PkcsObjectIdentifiers.IdRsassaPss)) + { + RsassaPssParameters rsaParams = RsassaPssParameters.GetInstance(asn1Params); + return GetDigestAlgName(rsaParams.HashAlgorithm.Algorithm) + "withRSAandMGF1"; + } + } + + return sigAlgId.Algorithm.Id; + } + + private static string GetDigestAlgName( + DerObjectIdentifier digestAlgOID) + { + if (PkcsObjectIdentifiers.MD5.Equals(digestAlgOID)) + { + return "MD5"; + } + else if (OiwObjectIdentifiers.IdSha1.Equals(digestAlgOID)) + { + return "SHA1"; + } + else if (NistObjectIdentifiers.IdSha224.Equals(digestAlgOID)) + { + return "SHA224"; + } + else if (NistObjectIdentifiers.IdSha256.Equals(digestAlgOID)) + { + return "SHA256"; + } + else if (NistObjectIdentifiers.IdSha384.Equals(digestAlgOID)) + { + return "SHA384"; + } + else if (NistObjectIdentifiers.IdSha512.Equals(digestAlgOID)) + { + return "SHA512"; + } + else if (NistObjectIdentifiers.IdSha512_224.Equals(digestAlgOID)) + { + return "SHA512(224)"; + } + else if (NistObjectIdentifiers.IdSha512_256.Equals(digestAlgOID)) + { + return "SHA512(256)"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD128.Equals(digestAlgOID)) + { + return "RIPEMD128"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD160.Equals(digestAlgOID)) + { + return "RIPEMD160"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD256.Equals(digestAlgOID)) + { + return "RIPEMD256"; + } + else if (CryptoProObjectIdentifiers.GostR3411.Equals(digestAlgOID)) + { + return "GOST3411"; + } + else + { + return digestAlgOID.Id; + } + } + + /// + /// Returns X509Extensions if the Extensions Request attribute can be found and returns the extensions block. + /// + /// X509Extensions block or null if one cannot be found. + public X509Extensions GetRequestedExtensions() + { + if (reqInfo.Attributes != null) + { + foreach (Asn1Encodable item in reqInfo.Attributes) + { + AttributePkcs attributePkcs; + try + { + attributePkcs = AttributePkcs.GetInstance(item); + + } + catch (ArgumentException ex) + { + throw new ArgumentException("encountered non PKCS attribute in extensions block", ex); + } + + if (attributePkcs.AttrType.Equals(PkcsObjectIdentifiers.Pkcs9AtExtensionRequest)) + { + X509ExtensionsGenerator generator = new X509ExtensionsGenerator(); + + Asn1Sequence extensionSequence = Asn1Sequence.GetInstance(attributePkcs.AttrValues[0]); + + + foreach (Asn1Encodable seqItem in extensionSequence) + { + + Asn1Sequence itemSeq = Asn1Sequence.GetInstance(seqItem); + if (itemSeq.Count == 2) + { + generator.AddExtension(DerObjectIdentifier.GetInstance(itemSeq[0]), false, Asn1OctetString.GetInstance(itemSeq[1]).GetOctets()); + } + else if (itemSeq.Count == 3) + { + generator.AddExtension(DerObjectIdentifier.GetInstance(itemSeq[0]), DerBoolean.GetInstance(itemSeq[1]).IsTrue, Asn1OctetString.GetInstance(itemSeq[2]).GetOctets()); + } + else + { + throw new ArgumentException("incorrect sequence size of X509Extension got " + itemSeq.Count + " expected 2 or 3"); + } + } + + return generator.Generate(); + } + + } + } + + return null; + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs.meta new file mode 100644 index 00000000..25863ec8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b3867a8548acd74ebe611c2f134888a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs new file mode 100644 index 00000000..583679f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /// + /// A class for creating and verifying Pkcs10 Certification requests (this is an extension on ). + /// The requests are made using delay signing. This is useful for situations where + /// the private key is in another environment and not directly accessible (e.g. HSM) + /// So the first step creates the request, then the signing is done outside this + /// object and the signature is then used to complete the request. + /// + /// + /// CertificationRequest ::= Sequence { + /// certificationRequestInfo CertificationRequestInfo, + /// signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }}, + /// signature BIT STRING + /// } + /// + /// CertificationRequestInfo ::= Sequence { + /// version Integer { v1(0) } (v1,...), + /// subject Name, + /// subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }}, + /// attributes [0] Attributes{{ CRIAttributes }} + /// } + /// + /// Attributes { ATTRIBUTE:IOSet } ::= Set OF Attr{{ IOSet }} + /// + /// Attr { ATTRIBUTE:IOSet } ::= Sequence { + /// type ATTRIBUTE.&id({IOSet}), + /// values Set SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{\@type}) + /// } + /// + /// see + public class Pkcs10CertificationRequestDelaySigned : Pkcs10CertificationRequest + { + protected Pkcs10CertificationRequestDelaySigned() + : base() + { + } + public Pkcs10CertificationRequestDelaySigned( + byte[] encoded) + : base(encoded) + { + } + public Pkcs10CertificationRequestDelaySigned( + Asn1Sequence seq) + : base(seq) + { + } + public Pkcs10CertificationRequestDelaySigned( + Stream input) + : base(input) + { + } + public Pkcs10CertificationRequestDelaySigned( + string signatureAlgorithm, + X509Name subject, + AsymmetricKeyParameter publicKey, + Asn1Set attributes, + AsymmetricKeyParameter signingKey) + : base(signatureAlgorithm, subject, publicKey, attributes, signingKey) + { + } + /// + /// Instantiate a Pkcs10CertificationRequest object with the necessary credentials. + /// + /// Name of Sig Alg. + /// X509Name of subject eg OU="My unit." O="My Organisatioin" C="au" + /// Public Key to be included in cert reqest. + /// ASN1Set of Attributes. + /// + /// After the object is constructed use the and finally the + /// SignRequest methods to finalize the request. + /// + public Pkcs10CertificationRequestDelaySigned( + string signatureAlgorithm, + X509Name subject, + AsymmetricKeyParameter publicKey, + Asn1Set attributes) + { + if (signatureAlgorithm == null) + throw new ArgumentNullException("signatureAlgorithm"); + if (subject == null) + throw new ArgumentNullException("subject"); + if (publicKey == null) + throw new ArgumentNullException("publicKey"); + if (publicKey.IsPrivate) + throw new ArgumentException("expected public key", "publicKey"); + + DerObjectIdentifier sigOid = CollectionUtilities.GetValueOrNull(m_algorithms, signatureAlgorithm); + if (sigOid == null) + { + try + { + sigOid = new DerObjectIdentifier(signatureAlgorithm); + } + catch (Exception e) + { + throw new ArgumentException("Unknown signature type requested", e); + } + } + if (m_noParams.Contains(sigOid)) + { + this.sigAlgId = new AlgorithmIdentifier(sigOid); + } + else if (m_exParams.TryGetValue(signatureAlgorithm, out var explicitParameters)) + { + this.sigAlgId = new AlgorithmIdentifier(sigOid, explicitParameters); + } + else + { + this.sigAlgId = new AlgorithmIdentifier(sigOid, DerNull.Instance); + } + SubjectPublicKeyInfo pubInfo = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey); + this.reqInfo = new CertificationRequestInfo(subject, pubInfo, attributes); + } + + public byte[] GetDataToSign() + { + return reqInfo.GetDerEncoded(); + } + public void SignRequest(byte[] signedData) + { + //build the signature from the signed data + sigBits = new DerBitString(signedData); + } + public void SignRequest(DerBitString signedData) + { + //build the signature from the signed data + sigBits = signedData; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs.meta new file mode 100644 index 00000000..e48b3bd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa9b307119c81c54487c4ea577a6d176 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs10CertificationRequestDelaySigned.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs new file mode 100644 index 00000000..e34131f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public abstract class Pkcs12Entry + { + private readonly IDictionary m_attributes; + + protected internal Pkcs12Entry(IDictionary attributes) + { + m_attributes = attributes; + } + + public Asn1Encodable this[DerObjectIdentifier oid] + { + get { return CollectionUtilities.GetValueOrNull(m_attributes, oid); } + } + + public IEnumerable BagAttributeKeys + { + get { return CollectionUtilities.Proxy(m_attributes.Keys); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs.meta new file mode 100644 index 00000000..df536636 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8ba8759323038ba45958a28762994402 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Entry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs new file mode 100644 index 00000000..ccf001ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs @@ -0,0 +1,994 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public class Pkcs12Store + { + public const string IgnoreUselessPasswordProperty = "Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs12.IgnoreUselessPassword"; + + private readonly Dictionary m_keys = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private readonly Dictionary m_localIds = new Dictionary(); + private readonly Dictionary m_certs = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private readonly Dictionary m_chainCerts = + new Dictionary(); + private readonly Dictionary m_keyCerts = + new Dictionary(); + private readonly DerObjectIdentifier keyAlgorithm; + private readonly DerObjectIdentifier keyPrfAlgorithm; + private readonly DerObjectIdentifier certAlgorithm; + private readonly bool useDerEncoding; + + private AsymmetricKeyEntry unmarkedKeyEntry = null; + + private const int MinIterations = 1024; + private const int SaltSize = 20; + + private static SubjectKeyIdentifier CreateSubjectKeyID(AsymmetricKeyParameter pubKey) + { + return new SubjectKeyIdentifier( + SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pubKey)); + } + + internal class CertId + { + private readonly byte[] id; + + internal CertId( + AsymmetricKeyParameter pubKey) + { + this.id = CreateSubjectKeyID(pubKey).GetKeyIdentifier(); + } + + internal CertId( + byte[] id) + { + this.id = id; + } + + internal byte[] Id + { + get { return id; } + } + + public override int GetHashCode() + { + return Arrays.GetHashCode(id); + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + CertId other = obj as CertId; + + if (other == null) + return false; + + return Arrays.AreEqual(id, other.id); + } + } + + internal Pkcs12Store(DerObjectIdentifier keyAlgorithm, DerObjectIdentifier keyPrfAlgorithm, + DerObjectIdentifier certAlgorithm, bool useDerEncoding) + { + this.keyAlgorithm = keyAlgorithm; + this.keyPrfAlgorithm = keyPrfAlgorithm; + this.certAlgorithm = certAlgorithm; + this.useDerEncoding = useDerEncoding; + } + + protected virtual void LoadKeyBag(PrivateKeyInfo privKeyInfo, Asn1Set bagAttributes) + { + AsymmetricKeyParameter privKey = PrivateKeyFactory.CreateKey(privKeyInfo); + + var attributes = new Dictionary(); + AsymmetricKeyEntry keyEntry = new AsymmetricKeyEntry(privKey, attributes); + + string alias = null; + Asn1OctetString localId = null; + + if (bagAttributes != null) + { + foreach (Asn1Sequence sq in bagAttributes) + { + DerObjectIdentifier aOid = DerObjectIdentifier.GetInstance(sq[0]); + Asn1Set attrSet = Asn1Set.GetInstance(sq[1]); + Asn1Encodable attr = null; + + if (attrSet.Count > 0) + { + // TODO We should be adding all attributes in the set + attr = attrSet[0]; + + // TODO We might want to "merge" attribute sets with + // the same OID - currently, differing values give an error + if (attributes.TryGetValue(aOid, out var attributeValue)) + { + // OK, but the value has to be the same + if (!attributeValue.Equals(attr)) + throw new IOException("attempt to add existing attribute with different value"); + } + else + { + attributes[aOid] = attr; + } + + if (aOid.Equals(PkcsObjectIdentifiers.Pkcs9AtFriendlyName)) + { + alias = ((DerBmpString)attr).GetString(); + // TODO Do these in a separate loop, just collect aliases here + m_keys[alias] = keyEntry; + } + else if (aOid.Equals(PkcsObjectIdentifiers.Pkcs9AtLocalKeyID)) + { + localId = (Asn1OctetString)attr; + } + } + } + } + + if (localId != null) + { + string name = Hex.ToHexString(localId.GetOctets()); + + if (alias == null) + { + m_keys[name] = keyEntry; + } + else + { + // TODO There may have been more than one alias + m_localIds[alias] = name; + } + } + else + { + unmarkedKeyEntry = keyEntry; + } + } + + protected virtual void LoadPkcs8ShroudedKeyBag(EncryptedPrivateKeyInfo encPrivKeyInfo, Asn1Set bagAttributes, + char[] password, bool wrongPkcs12Zero) + { + if (password != null) + { + PrivateKeyInfo privInfo = PrivateKeyInfoFactory.CreatePrivateKeyInfo( + password, wrongPkcs12Zero, encPrivKeyInfo); + + LoadKeyBag(privInfo, bagAttributes); + } + } + + public void Load(Stream input, char[] password) + { + if (input == null) + throw new ArgumentNullException("input"); + + Pfx bag = Pfx.GetInstance(Asn1Object.FromStream(input)); + ContentInfo info = bag.AuthSafe; + bool wrongPkcs12Zero = false; + + if (bag.MacData != null) // check the mac code + { + if (password == null) + throw new ArgumentNullException("password", "no password supplied when one expected"); + + MacData mData = bag.MacData; + DigestInfo dInfo = mData.Mac; + AlgorithmIdentifier algId = dInfo.AlgorithmID; + byte[] salt = mData.GetSalt(); + int itCount = mData.IterationCount.IntValue; + + byte[] data = Asn1OctetString.GetInstance(info.Content).GetOctets(); + + byte[] mac = CalculatePbeMac(algId.Algorithm, salt, itCount, password, false, data); + byte[] dig = dInfo.GetDigest(); + + if (!Arrays.ConstantTimeAreEqual(mac, dig)) + { + if (password.Length > 0) + throw new IOException("PKCS12 key store MAC invalid - wrong password or corrupted file."); + + // Try with incorrect zero length password + mac = CalculatePbeMac(algId.Algorithm, salt, itCount, password, true, data); + + if (!Arrays.ConstantTimeAreEqual(mac, dig)) + throw new IOException("PKCS12 key store MAC invalid - wrong password or corrupted file."); + + wrongPkcs12Zero = true; + } + } + else if (password != null) + { + string ignoreProperty = Org.BouncyCastle.Utilities.Platform.GetEnvironmentVariable(IgnoreUselessPasswordProperty); + bool ignore = ignoreProperty != null && Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("true", ignoreProperty); + + if (!ignore) + { + throw new IOException("password supplied for keystore that does not require one"); + } + } + + m_keys.Clear(); + m_localIds.Clear(); + unmarkedKeyEntry = null; + + var certBags = new List(); + + if (info.ContentType.Equals(PkcsObjectIdentifiers.Data)) + { + Asn1OctetString content = Asn1OctetString.GetInstance(info.Content); + AuthenticatedSafe authSafe = AuthenticatedSafe.GetInstance(content.GetOctets()); + ContentInfo[] cis = authSafe.GetContentInfo(); + + foreach (ContentInfo ci in cis) + { + DerObjectIdentifier oid = ci.ContentType; + + byte[] octets = null; + if (oid.Equals(PkcsObjectIdentifiers.Data)) + { + octets = Asn1OctetString.GetInstance(ci.Content).GetOctets(); + } + else if (oid.Equals(PkcsObjectIdentifiers.EncryptedData)) + { + if (password != null) + { + EncryptedData d = EncryptedData.GetInstance(ci.Content); + octets = CryptPbeData(false, d.EncryptionAlgorithm, + password, wrongPkcs12Zero, d.Content.GetOctets()); + } + } + else + { + // TODO Other data types + } + + if (octets != null) + { + Asn1Sequence seq = Asn1Sequence.GetInstance(octets); + + foreach (Asn1Sequence subSeq in seq) + { + SafeBag b = SafeBag.GetInstance(subSeq); + + if (b.BagID.Equals(PkcsObjectIdentifiers.CertBag)) + { + certBags.Add(b); + } + else if (b.BagID.Equals(PkcsObjectIdentifiers.Pkcs8ShroudedKeyBag)) + { + LoadPkcs8ShroudedKeyBag(EncryptedPrivateKeyInfo.GetInstance(b.BagValue), + b.BagAttributes, password, wrongPkcs12Zero); + } + else if (b.BagID.Equals(PkcsObjectIdentifiers.KeyBag)) + { + LoadKeyBag(PrivateKeyInfo.GetInstance(b.BagValue), b.BagAttributes); + } + else + { + // TODO Other bag types + } + } + } + } + } + + m_certs.Clear(); + m_chainCerts.Clear(); + m_keyCerts.Clear(); + + foreach (SafeBag b in certBags) + { + CertBag certBag = CertBag.GetInstance(b.BagValue); + byte[] octets = ((Asn1OctetString)certBag.CertValue).GetOctets(); + X509Certificate cert = new X509CertificateParser().ReadCertificate(octets); + + // + // set the attributes + // + var attributes = new Dictionary(); + Asn1OctetString localId = null; + string alias = null; + + if (b.BagAttributes != null) + { + foreach (Asn1Sequence sq in b.BagAttributes) + { + DerObjectIdentifier aOid = DerObjectIdentifier.GetInstance(sq[0]); + Asn1Set attrSet = Asn1Set.GetInstance(sq[1]); + + if (attrSet.Count > 0) + { + // TODO We should be adding all attributes in the set + Asn1Encodable attr = attrSet[0]; + + // TODO We might want to "merge" attribute sets with + // the same OID - currently, differing values give an error + if (attributes.TryGetValue(aOid, out var attributeValue)) + { + // we've found more than one - one might be incorrect + if (PkcsObjectIdentifiers.Pkcs9AtLocalKeyID.Equals(aOid)) + { + string id = Hex.ToHexString(Asn1OctetString.GetInstance(attr).GetOctets()); + if (!m_keys.ContainsKey(id) && !m_localIds.ContainsKey(id)) + continue; // ignore this one - it's not valid + } + + // OK, but the value has to be the same + if (!attributeValue.Equals(attr)) + { + throw new IOException("attempt to add existing attribute with different value"); + } + } + else + { + attributes[aOid] = attr; + } + + if (aOid.Equals(PkcsObjectIdentifiers.Pkcs9AtFriendlyName)) + { + alias = ((DerBmpString)attr).GetString(); + } + else if (aOid.Equals(PkcsObjectIdentifiers.Pkcs9AtLocalKeyID)) + { + localId = (Asn1OctetString)attr; + } + } + } + } + + CertId certId = new CertId(cert.GetPublicKey()); + X509CertificateEntry certEntry = new X509CertificateEntry(cert, attributes); + + m_chainCerts[certId] = certEntry; + + if (unmarkedKeyEntry != null) + { + if (m_keyCerts.Count == 0) + { + string name = Hex.ToHexString(certId.Id); + + m_keyCerts[name] = certEntry; + m_keys[name] = unmarkedKeyEntry; + } + else + { + m_keys["unmarked"] = unmarkedKeyEntry; + } + } + else + { + if (localId != null) + { + string name = Hex.ToHexString(localId.GetOctets()); + + m_keyCerts[name] = certEntry; + } + + if (alias != null) + { + // TODO There may have been more than one alias + m_certs[alias] = certEntry; + } + } + } + } + + public AsymmetricKeyEntry GetKey(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + return CollectionUtilities.GetValueOrNull(m_keys, alias); + } + + public bool IsCertificateEntry(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + return m_certs.ContainsKey(alias) && !m_keys.ContainsKey(alias); + } + + public bool IsKeyEntry(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + return m_keys.ContainsKey(alias); + } + + public IEnumerable Aliases + { + get + { + var aliases = new HashSet(m_certs.Keys); + aliases.UnionWith(m_keys.Keys); + return CollectionUtilities.Proxy(aliases); + } + } + + public bool ContainsAlias(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + return m_certs.ContainsKey(alias) || m_keys.ContainsKey(alias); + } + + /** + * simply return the cert entry for the private key + */ + public X509CertificateEntry GetCertificate(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + if (m_certs.TryGetValue(alias, out var cert)) + return cert; + + var keyCertKey = alias; + if (m_localIds.TryGetValue(alias, out var localId)) + { + keyCertKey = localId; + } + + return CollectionUtilities.GetValueOrNull(m_keyCerts, keyCertKey); + } + + public string GetCertificateAlias(X509Certificate cert) + { + if (cert == null) + throw new ArgumentNullException(nameof(cert)); + + foreach (var entry in m_certs) + { + if (entry.Value.Certificate.Equals(cert)) + return entry.Key; + } + + foreach (var entry in m_keyCerts) + { + if (entry.Value.Certificate.Equals(cert)) + return entry.Key; + } + + return null; + } + + public X509CertificateEntry[] GetCertificateChain(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + if (!IsKeyEntry(alias)) + return null; + + X509CertificateEntry c = GetCertificate(alias); + if (c == null) + return null; + + var cs = new List(); + + while (c != null) + { + X509Certificate x509c = c.Certificate; + X509CertificateEntry nextC = null; + + Asn1OctetString akiValue = x509c.GetExtensionValue(X509Extensions.AuthorityKeyIdentifier); + if (akiValue != null) + { + AuthorityKeyIdentifier aki = AuthorityKeyIdentifier.GetInstance(akiValue.GetOctets()); + + byte[] keyID = aki.GetKeyIdentifier(); + if (keyID != null) + { + nextC = CollectionUtilities.GetValueOrNull(m_chainCerts, new CertId(keyID)); + } + } + + if (nextC == null) + { + // + // no authority key id, try the Issuer DN + // + X509Name i = x509c.IssuerDN; + X509Name s = x509c.SubjectDN; + + if (!i.Equivalent(s)) + { + foreach (var entry in m_chainCerts) + { + X509Certificate cert = entry.Value.Certificate; + + if (cert.SubjectDN.Equivalent(i)) + { + try + { + x509c.Verify(cert.GetPublicKey()); + + nextC = entry.Value; + break; + } + catch (InvalidKeyException) + { + // TODO What if it doesn't verify? + } + } + } + } + } + + cs.Add(c); + if (nextC != c) // self signed - end of the chain + { + c = nextC; + } + else + { + c = null; + } + } + + return cs.ToArray(); + } + + public void SetCertificateEntry(string alias, X509CertificateEntry certEntry) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + if (certEntry == null) + throw new ArgumentNullException(nameof(certEntry)); + if (m_keys.ContainsKey(alias)) + throw new ArgumentException("There is a key entry with the name " + alias + "."); + + m_certs[alias] = certEntry; + m_chainCerts[new CertId(certEntry.Certificate.GetPublicKey())] = certEntry; + } + + public void SetKeyEntry(string alias, AsymmetricKeyEntry keyEntry, X509CertificateEntry[] chain) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + if (keyEntry == null) + throw new ArgumentNullException(nameof(keyEntry)); + if (keyEntry.Key.IsPrivate && chain == null) + throw new ArgumentException("No certificate chain for private key"); + + if (m_keys.ContainsKey(alias)) + { + DeleteEntry(alias); + } + + m_keys[alias] = keyEntry; + m_certs[alias] = chain[0]; + + for (int i = 0; i != chain.Length; i++) + { + m_chainCerts[new CertId(chain[i].Certificate.GetPublicKey())] = chain[i]; + } + } + + public void DeleteEntry(string alias) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + + if (CollectionUtilities.Remove(m_certs, alias, out var cert)) + { + m_chainCerts.Remove(new CertId(cert.Certificate.GetPublicKey())); + } + + if (m_keys.Remove(alias)) + { + if (CollectionUtilities.Remove(m_localIds, alias, out var id)) + { + if (CollectionUtilities.Remove(m_keyCerts, id, out var keyCert)) + { + m_chainCerts.Remove(new CertId(keyCert.Certificate.GetPublicKey())); + } + } + } + } + + public bool IsEntryOfType(string alias, Type entryType) + { + if (entryType == typeof(X509CertificateEntry)) + return IsCertificateEntry(alias); + + if (entryType == typeof(AsymmetricKeyEntry)) + return IsKeyEntry(alias) && GetCertificate(alias) != null; + + return false; + } + + public int Count + { + get + { + int count = m_certs.Count; + + foreach (var key in m_keys.Keys) + { + if (!m_certs.ContainsKey(key)) + { + ++count; + } + } + + return count; + } + } + + public void Save(Stream stream, char[] password, SecureRandom random) + { + if (stream == null) + throw new ArgumentNullException(nameof(stream)); + if (random == null) + throw new ArgumentNullException(nameof(random)); + + // + // handle the keys + // + Asn1EncodableVector keyBags = new Asn1EncodableVector(); + foreach (var keyEntry in m_keys) + { + var name = keyEntry.Key; + var privKey = keyEntry.Value; + + byte[] kSalt = new byte[SaltSize]; + random.NextBytes(kSalt); + + DerObjectIdentifier bagOid; + Asn1Encodable bagData; + + if (password == null) + { + bagOid = PkcsObjectIdentifiers.KeyBag; + bagData = PrivateKeyInfoFactory.CreatePrivateKeyInfo(privKey.Key); + } + else + { + bagOid = PkcsObjectIdentifiers.Pkcs8ShroudedKeyBag; + if (keyPrfAlgorithm != null) + { + bagData = EncryptedPrivateKeyInfoFactory.CreateEncryptedPrivateKeyInfo(keyAlgorithm, + keyPrfAlgorithm, password, kSalt, MinIterations, random, privKey.Key); + } + else + { + bagData = EncryptedPrivateKeyInfoFactory.CreateEncryptedPrivateKeyInfo(keyAlgorithm, password, + kSalt, MinIterations, privKey.Key); + } + } + + Asn1EncodableVector kName = new Asn1EncodableVector(); + + foreach (var oid in privKey.BagAttributeKeys) + { + // NB: Ignore any existing FriendlyName + if (!PkcsObjectIdentifiers.Pkcs9AtFriendlyName.Equals(oid)) + { + kName.Add(new DerSequence(oid, new DerSet(privKey[oid]))); + } + } + + // + // make sure we are using the local alias on store + // + // NB: We always set the FriendlyName based on 'name' + //if (privKey[PkcsObjectIdentifiers.Pkcs9AtFriendlyName] == null) + { + kName.Add( + new DerSequence( + PkcsObjectIdentifiers.Pkcs9AtFriendlyName, + new DerSet(new DerBmpString(name)))); + } + + // + // make sure we have a local key-id + // + if (privKey[PkcsObjectIdentifiers.Pkcs9AtLocalKeyID] == null) + { + X509CertificateEntry ct = GetCertificate(name); + AsymmetricKeyParameter pubKey = ct.Certificate.GetPublicKey(); + SubjectKeyIdentifier subjectKeyID = CreateSubjectKeyID(pubKey); + + kName.Add( + new DerSequence( + PkcsObjectIdentifiers.Pkcs9AtLocalKeyID, + new DerSet(subjectKeyID))); + } + + keyBags.Add(new SafeBag(bagOid, bagData.ToAsn1Object(), new DerSet(kName))); + } + + byte[] keyBagsEncoding = new DerSequence(keyBags).GetDerEncoded(); + ContentInfo keysInfo = new ContentInfo(PkcsObjectIdentifiers.Data, new BerOctetString(keyBagsEncoding)); + + // + // certificate processing + // + byte[] cSalt = new byte[SaltSize]; + + random.NextBytes(cSalt); + + Asn1EncodableVector certBags = new Asn1EncodableVector(); + Pkcs12PbeParams cParams = new Pkcs12PbeParams(cSalt, MinIterations); + AlgorithmIdentifier cAlgId = new AlgorithmIdentifier(certAlgorithm, cParams.ToAsn1Object()); + var doneCerts = new HashSet(); + + foreach (string name in m_keys.Keys) + { + X509CertificateEntry certEntry = GetCertificate(name); + CertBag cBag = new CertBag( + PkcsObjectIdentifiers.X509Certificate, + new DerOctetString(certEntry.Certificate.GetEncoded())); + + Asn1EncodableVector fName = new Asn1EncodableVector(); + + foreach (var oid in certEntry.BagAttributeKeys) + { + // NB: Ignore any existing FriendlyName + if (!PkcsObjectIdentifiers.Pkcs9AtFriendlyName.Equals(oid)) + { + fName.Add(new DerSequence(oid, new DerSet(certEntry[oid]))); + } + } + + // + // make sure we are using the local alias on store + // + // NB: We always set the FriendlyName based on 'name' + //if (certEntry[PkcsObjectIdentifiers.Pkcs9AtFriendlyName] == null) + { + fName.Add( + new DerSequence( + PkcsObjectIdentifiers.Pkcs9AtFriendlyName, + new DerSet(new DerBmpString(name)))); + } + + // + // make sure we have a local key-id + // + if (certEntry[PkcsObjectIdentifiers.Pkcs9AtLocalKeyID] == null) + { + AsymmetricKeyParameter pubKey = certEntry.Certificate.GetPublicKey(); + SubjectKeyIdentifier subjectKeyID = CreateSubjectKeyID(pubKey); + + fName.Add( + new DerSequence( + PkcsObjectIdentifiers.Pkcs9AtLocalKeyID, + new DerSet(subjectKeyID))); + } + + certBags.Add(new SafeBag(PkcsObjectIdentifiers.CertBag, cBag.ToAsn1Object(), new DerSet(fName))); + + doneCerts.Add(certEntry.Certificate); + } + + foreach (var certEntry in m_certs) + { + var certId = certEntry.Key; + var cert = certEntry.Value; + + if (m_keys.ContainsKey(certId)) + continue; + + CertBag cBag = new CertBag( + PkcsObjectIdentifiers.X509Certificate, + new DerOctetString(cert.Certificate.GetEncoded())); + + Asn1EncodableVector fName = new Asn1EncodableVector(); + + foreach (var oid in cert.BagAttributeKeys) + { + // a certificate not immediately linked to a key doesn't require + // a localKeyID and will confuse some PKCS12 implementations. + // + // If we find one, we'll prune it out. + if (PkcsObjectIdentifiers.Pkcs9AtLocalKeyID.Equals(oid)) + continue; + + // NB: Ignore any existing FriendlyName + if (!PkcsObjectIdentifiers.Pkcs9AtFriendlyName.Equals(oid)) + { + fName.Add(new DerSequence(oid, new DerSet(cert[oid]))); + } + } + + // + // make sure we are using the local alias on store + // + // NB: We always set the FriendlyName based on 'certId' + //if (cert[PkcsObjectIdentifiers.Pkcs9AtFriendlyName] == null) + { + fName.Add( + new DerSequence( + PkcsObjectIdentifiers.Pkcs9AtFriendlyName, + new DerSet(new DerBmpString(certId)))); + } + + // the Oracle PKCS12 parser looks for a trusted key usage for named certificates as well + if (cert[MiscObjectIdentifiers.id_oracle_pkcs12_trusted_key_usage] == null) + { + Asn1OctetString ext = cert.Certificate.GetExtensionValue(X509Extensions.ExtendedKeyUsage); + + if (ext != null) + { + ExtendedKeyUsage usage = ExtendedKeyUsage.GetInstance(ext.GetOctets()); + Asn1EncodableVector v = new Asn1EncodableVector(); + IList usages = usage.GetAllUsages(); + for (int i = 0; i != usages.Count; i++) + { + v.Add(usages[i]); + } + + fName.Add( + new DerSequence( + MiscObjectIdentifiers.id_oracle_pkcs12_trusted_key_usage, + new DerSet(v))); + } + else + { + fName.Add( + new DerSequence( + MiscObjectIdentifiers.id_oracle_pkcs12_trusted_key_usage, + new DerSet(KeyPurposeID.AnyExtendedKeyUsage))); + } + } + + certBags.Add(new SafeBag(PkcsObjectIdentifiers.CertBag, cBag.ToAsn1Object(), new DerSet(fName))); + + doneCerts.Add(cert.Certificate); + } + + foreach (var chainCertEntry in m_chainCerts) + { + var certId = chainCertEntry.Key; + var cert = chainCertEntry.Value; + + if (doneCerts.Contains(cert.Certificate)) + continue; + + CertBag cBag = new CertBag( + PkcsObjectIdentifiers.X509Certificate, + new DerOctetString(cert.Certificate.GetEncoded())); + + Asn1EncodableVector fName = new Asn1EncodableVector(); + + foreach (var oid in cert.BagAttributeKeys) + { + // a certificate not immediately linked to a key doesn't require + // a localKeyID and will confuse some PKCS12 implementations. + // + // If we find one, we'll prune it out. + if (PkcsObjectIdentifiers.Pkcs9AtLocalKeyID.Equals(oid)) + continue; + + fName.Add(new DerSequence(oid, new DerSet(cert[oid]))); + } + + certBags.Add(new SafeBag(PkcsObjectIdentifiers.CertBag, cBag.ToAsn1Object(), new DerSet(fName))); + } + + byte[] certBagsEncoding = new DerSequence(certBags).GetDerEncoded(); + + ContentInfo certsInfo; + if (password == null || certAlgorithm == null) + { + certsInfo = new ContentInfo(PkcsObjectIdentifiers.Data, new BerOctetString(certBagsEncoding)); + } + else + { + byte[] certBytes = CryptPbeData(true, cAlgId, password, false, certBagsEncoding); + EncryptedData cInfo = new EncryptedData(PkcsObjectIdentifiers.Data, cAlgId, new BerOctetString(certBytes)); + certsInfo = new ContentInfo(PkcsObjectIdentifiers.EncryptedData, cInfo.ToAsn1Object()); + } + + ContentInfo[] info = new ContentInfo[]{ keysInfo, certsInfo }; + + byte[] data = new AuthenticatedSafe(info).GetEncoded( + useDerEncoding ? Asn1Encodable.Der : Asn1Encodable.Ber); + + ContentInfo mainInfo = new ContentInfo(PkcsObjectIdentifiers.Data, new BerOctetString(data)); + + // + // create the mac + // + MacData macData = null; + if (password != null) + { + byte[] mSalt = new byte[20]; + random.NextBytes(mSalt); + + byte[] mac = CalculatePbeMac(OiwObjectIdentifiers.IdSha1, + mSalt, MinIterations, password, false, data); + + AlgorithmIdentifier algId = new AlgorithmIdentifier( + OiwObjectIdentifiers.IdSha1, DerNull.Instance); + DigestInfo dInfo = new DigestInfo(algId, mac); + + macData = new MacData(dInfo, mSalt, MinIterations); + } + + // + // output the Pfx + // + Pfx pfx = new Pfx(mainInfo, macData); + + pfx.EncodeTo(stream, useDerEncoding ? Asn1Encodable.Der : Asn1Encodable.Ber); + } + + internal static byte[] CalculatePbeMac( + DerObjectIdentifier oid, + byte[] salt, + int itCount, + char[] password, + bool wrongPkcs12Zero, + byte[] data) + { + Asn1Encodable asn1Params = PbeUtilities.GenerateAlgorithmParameters( + oid, salt, itCount); + ICipherParameters cipherParams = PbeUtilities.GenerateCipherParameters( + oid, password, wrongPkcs12Zero, asn1Params); + + IMac mac = (IMac) PbeUtilities.CreateEngine(oid); + mac.Init(cipherParams); + return MacUtilities.DoFinal(mac, data); + } + + private static byte[] CryptPbeData( + bool forEncryption, + AlgorithmIdentifier algId, + char[] password, + bool wrongPkcs12Zero, + byte[] data) + { + IBufferedCipher cipher = PbeUtilities.CreateEngine(algId) as IBufferedCipher; + + if (cipher == null) + throw new Exception("Unknown encryption algorithm: " + algId.Algorithm); + + if (algId.Algorithm.Equals(PkcsObjectIdentifiers.IdPbeS2)) + { + PbeS2Parameters pbeParameters = PbeS2Parameters.GetInstance(algId.Parameters); + ICipherParameters cipherParams = PbeUtilities.GenerateCipherParameters( + algId.Algorithm, password, pbeParameters); + cipher.Init(forEncryption, cipherParams); + return cipher.DoFinal(data); + } + else + { + Pkcs12PbeParams pbeParameters = Pkcs12PbeParams.GetInstance(algId.Parameters); + ICipherParameters cipherParams = PbeUtilities.GenerateCipherParameters( + algId.Algorithm, password, wrongPkcs12Zero, pbeParameters); + cipher.Init(forEncryption, cipherParams); + return cipher.DoFinal(data); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs.meta new file mode 100644 index 00000000..03fddea2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b77d22ab97eaec8499bdd0430f0956cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Store.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs new file mode 100644 index 00000000..1706f13c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /** + * Utility class for reencoding PKCS#12 files to definite length. + */ + public class Pkcs12Utilities + { + /** + * Just re-encode the outer layer of the PKCS#12 file to definite length encoding. + * + * @param berPKCS12File - original PKCS#12 file + * @return a byte array representing the DER encoding of the PFX structure + * @throws IOException + */ + public static byte[] ConvertToDefiniteLength( + byte[] berPkcs12File) + { + Pfx pfx = Pfx.GetInstance(berPkcs12File); + + return pfx.GetEncoded(Asn1Encodable.Der); + } + + /** + * Re-encode the PKCS#12 structure to definite length encoding at the inner layer + * as well, recomputing the MAC accordingly. + * + * @param berPKCS12File - original PKCS12 file. + * @param provider - provider to use for MAC calculation. + * @return a byte array representing the DER encoding of the PFX structure. + * @throws IOException on parsing, encoding errors. + */ + public static byte[] ConvertToDefiniteLength( + byte[] berPkcs12File, + char[] passwd) + { + Pfx pfx = Pfx.GetInstance(berPkcs12File); + + ContentInfo info = pfx.AuthSafe; + + Asn1OctetString content = Asn1OctetString.GetInstance(info.Content); + Asn1Object obj = Asn1Object.FromByteArray(content.GetOctets()); + + info = new ContentInfo(info.ContentType, new DerOctetString(obj.GetEncoded(Asn1Encodable.Der))); + + MacData mData = pfx.MacData; + + try + { + int itCount = mData.IterationCount.IntValue; + byte[] data = Asn1OctetString.GetInstance(info.Content).GetOctets(); + byte[] res = Pkcs12Store.CalculatePbeMac( + mData.Mac.AlgorithmID.Algorithm, mData.GetSalt(), itCount, passwd, false, data); + + AlgorithmIdentifier algId = new AlgorithmIdentifier( + mData.Mac.AlgorithmID.Algorithm, DerNull.Instance); + DigestInfo dInfo = new DigestInfo(algId, res); + + mData = new MacData(dInfo, mData.GetSalt(), itCount); + } + catch (Exception e) + { + throw new IOException("error constructing MAC: " + e.ToString()); + } + + pfx = new Pfx(info, mData); + + return pfx.GetEncoded(Asn1Encodable.Der); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs.meta new file mode 100644 index 00000000..50b3be70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9cfb01f5e3f631040a04960f5a58ff2f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs12Utilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs new file mode 100644 index 00000000..ad2647f9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /// + /// A holding class for a PKCS#8 encrypted private key info object that allows for its decryption. + /// + public class Pkcs8EncryptedPrivateKeyInfo + { + private EncryptedPrivateKeyInfo encryptedPrivateKeyInfo; + + private static EncryptedPrivateKeyInfo parseBytes(byte[] pkcs8Encoding) + { + try + { + return EncryptedPrivateKeyInfo.GetInstance(pkcs8Encoding); + } + + catch (ArgumentException e) + { + throw new PkcsIOException("malformed data: " + e.Message, e); + } + catch (Exception e) + { + throw new PkcsIOException("malformed data: " + e.Message, e); + } + } + + /// + /// Base constructor from a PKCS#8 EncryptedPrivateKeyInfo object. + /// + /// A PKCS#8 EncryptedPrivateKeyInfo object. + public Pkcs8EncryptedPrivateKeyInfo(EncryptedPrivateKeyInfo encryptedPrivateKeyInfo) + { + this.encryptedPrivateKeyInfo = encryptedPrivateKeyInfo; + } + + /// + /// Base constructor from a BER encoding of a PKCS#8 EncryptedPrivateKeyInfo object. + /// + /// A BER encoding of a PKCS#8 EncryptedPrivateKeyInfo objects. + public Pkcs8EncryptedPrivateKeyInfo(byte[] encryptedPrivateKeyInfo) : this(parseBytes(encryptedPrivateKeyInfo)) + { + + } + + /// + /// Returns the underlying ASN.1 structure inside this object. + /// + /// Return the EncryptedPrivateKeyInfo structure in this object. + public EncryptedPrivateKeyInfo ToAsn1Structure() + { + return encryptedPrivateKeyInfo; + } + + /// + /// Returns a copy of the encrypted data in this structure. + /// + /// Return a copy of the encrypted data in this object. + public byte[] GetEncryptedData() + { + return encryptedPrivateKeyInfo.GetEncryptedData(); + } + + /// + /// Return a binary ASN.1 encoding of the EncryptedPrivateKeyInfo structure in this object. + /// + /// A byte array containing the encoded object. + public byte[] GetEncoded() + { + return encryptedPrivateKeyInfo.GetEncoded(); + } + + /// + /// Get a decryptor from the passed in provider and decrypt the encrypted private key info, returning the result. + /// + /// A provider to query for decryptors for the object. + /// The decrypted private key info structure. + public PrivateKeyInfo DecryptPrivateKeyInfo(IDecryptorBuilderProvider inputDecryptorProvider) + { + try + { + ICipherBuilder decryptorBuilder = inputDecryptorProvider.CreateDecryptorBuilder(encryptedPrivateKeyInfo.EncryptionAlgorithm); + + ICipher encIn = decryptorBuilder.BuildCipher(new MemoryInputStream(encryptedPrivateKeyInfo.GetEncryptedData())); + + byte[] data; + using (var strm = encIn.Stream) + { + data = Streams.ReadAll(encIn.Stream); + } + + return PrivateKeyInfo.GetInstance(data); + } + catch (Exception e) + { + throw new PkcsException("unable to read encrypted data: " + e.Message, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs.meta new file mode 100644 index 00000000..83a407ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1e0e3b8f6698b1841b27911397a984f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs new file mode 100644 index 00000000..12922748 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public class Pkcs8EncryptedPrivateKeyInfoBuilder + { + private PrivateKeyInfo privateKeyInfo; + + public Pkcs8EncryptedPrivateKeyInfoBuilder(byte[] privateKeyInfo): this(PrivateKeyInfo.GetInstance(privateKeyInfo)) + { + } + + public Pkcs8EncryptedPrivateKeyInfoBuilder(PrivateKeyInfo privateKeyInfo) + { + this.privateKeyInfo = privateKeyInfo; + } + + /// + /// Create the encrypted private key info using the passed in encryptor. + /// + /// The encryptor to use. + /// An encrypted private key info containing the original private key info. + public Pkcs8EncryptedPrivateKeyInfo Build( + ICipherBuilder encryptor) + { + try + { + MemoryStream bOut = new MemoryOutputStream(); + ICipher cOut = encryptor.BuildCipher(bOut); + byte[] keyData = privateKeyInfo.GetEncoded(); + + using (var str = cOut.Stream) + { + str.Write(keyData, 0, keyData.Length); + } + + return new Pkcs8EncryptedPrivateKeyInfo( + new EncryptedPrivateKeyInfo((AlgorithmIdentifier)encryptor.AlgorithmDetails, bOut.ToArray())); + } + catch (IOException) + { + throw new InvalidOperationException("cannot encode privateKeyInfo"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs.meta new file mode 100644 index 00000000..58b0e46e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ab323a69f3d34844af3b15a38b76edd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/Pkcs8EncryptedPrivateKeyInfoBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs new file mode 100644 index 00000000..1ff8a2bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /// Base exception for PKCS related issues. + [Serializable] + public class PkcsException + : Exception + { + public PkcsException() + : base() + { + } + + public PkcsException(string message) + : base(message) + { + } + + public PkcsException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PkcsException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs.meta new file mode 100644 index 00000000..6bda3d32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fba4a0da553b52f4db1ade56fd28b7e2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs new file mode 100644 index 00000000..64715432 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + /// Base exception for parsing related issues in the PKCS namespace. + [Serializable] + public class PkcsIOException + : IOException + { + public PkcsIOException() + : base() + { + } + + public PkcsIOException(string message) + : base(message) + { + } + + public PkcsIOException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PkcsIOException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs.meta new file mode 100644 index 00000000..37ff9207 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 99deac37df00c084490417974fbc2ce8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PkcsIOException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs new file mode 100644 index 00000000..6242cff7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs @@ -0,0 +1,292 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public static class PrivateKeyInfoFactory + { + public static PrivateKeyInfo CreatePrivateKeyInfo( + AsymmetricKeyParameter privateKey) + { + return CreatePrivateKeyInfo(privateKey, null); + } + + /** + * Create a PrivateKeyInfo representation of a private key with attributes. + * + * @param privateKey the key to be encoded into the info object. + * @param attributes the set of attributes to be included. + * @return the appropriate PrivateKeyInfo + * @throws java.io.IOException on an error encoding the key + */ + public static PrivateKeyInfo CreatePrivateKeyInfo(AsymmetricKeyParameter privateKey, Asn1Set attributes) + { + if (privateKey == null) + throw new ArgumentNullException("privateKey"); + if (!privateKey.IsPrivate) + throw new ArgumentException("Public key passed - private key expected", "privateKey"); + + if (privateKey is ElGamalPrivateKeyParameters) + { + ElGamalPrivateKeyParameters _key = (ElGamalPrivateKeyParameters)privateKey; + ElGamalParameters egp = _key.Parameters; + return new PrivateKeyInfo( + new AlgorithmIdentifier(OiwObjectIdentifiers.ElGamalAlgorithm, new ElGamalParameter(egp.P, egp.G).ToAsn1Object()), + new DerInteger(_key.X), + attributes); + } + + if (privateKey is DsaPrivateKeyParameters) + { + DsaPrivateKeyParameters _key = (DsaPrivateKeyParameters)privateKey; + DsaParameters dp = _key.Parameters; + return new PrivateKeyInfo( + new AlgorithmIdentifier(X9ObjectIdentifiers.IdDsa, new DsaParameter(dp.P, dp.Q, dp.G).ToAsn1Object()), + new DerInteger(_key.X), + attributes); + } + + if (privateKey is DHPrivateKeyParameters) + { + DHPrivateKeyParameters _key = (DHPrivateKeyParameters)privateKey; + + DHParameter p = new DHParameter( + _key.Parameters.P, _key.Parameters.G, _key.Parameters.L); + + return new PrivateKeyInfo( + new AlgorithmIdentifier(_key.AlgorithmOid, p.ToAsn1Object()), + new DerInteger(_key.X), + attributes); + } + + if (privateKey is RsaKeyParameters) + { + AlgorithmIdentifier algID = new AlgorithmIdentifier( + PkcsObjectIdentifiers.RsaEncryption, DerNull.Instance); + + RsaPrivateKeyStructure keyStruct; + if (privateKey is RsaPrivateCrtKeyParameters) + { + RsaPrivateCrtKeyParameters _key = (RsaPrivateCrtKeyParameters)privateKey; + + keyStruct = new RsaPrivateKeyStructure( + _key.Modulus, + _key.PublicExponent, + _key.Exponent, + _key.P, + _key.Q, + _key.DP, + _key.DQ, + _key.QInv); + } + else + { + RsaKeyParameters _key = (RsaKeyParameters) privateKey; + + keyStruct = new RsaPrivateKeyStructure( + _key.Modulus, + BigInteger.Zero, + _key.Exponent, + BigInteger.Zero, + BigInteger.Zero, + BigInteger.Zero, + BigInteger.Zero, + BigInteger.Zero); + } + + return new PrivateKeyInfo(algID, keyStruct.ToAsn1Object(), attributes); + } + + if (privateKey is ECPrivateKeyParameters) + { + ECPrivateKeyParameters priv = (ECPrivateKeyParameters) privateKey; + DerBitString publicKey = new DerBitString(ECKeyPairGenerator.GetCorrespondingPublicKey(priv).Q.GetEncoded(false)); + + ECDomainParameters dp = priv.Parameters; + + // ECGOST3410 + if (dp is ECGost3410Parameters) + { + ECGost3410Parameters domainParameters = (ECGost3410Parameters) dp; + + Gost3410PublicKeyAlgParameters gostParams = new Gost3410PublicKeyAlgParameters( + (domainParameters).PublicKeyParamSet, + (domainParameters).DigestParamSet, + (domainParameters).EncryptionParamSet); + + bool is512 = priv.D.BitLength > 256; + DerObjectIdentifier identifier = (is512) ? + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512 : + RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256; + int size = (is512) ? 64 : 32; + + byte[] encKey = new byte[size]; + + ExtractBytes(encKey, size, 0, priv.D); + + return new PrivateKeyInfo(new AlgorithmIdentifier(identifier, gostParams), new DerOctetString(encKey)); + } + + + int orderBitLength = dp.N.BitLength; + + AlgorithmIdentifier algID; + ECPrivateKeyStructure ec; + + if (priv.AlgorithmName == "ECGOST3410") + { + if (priv.PublicKeyParamSet == null) + throw new NotImplementedException("Not a CryptoPro parameter set"); + + Gost3410PublicKeyAlgParameters gostParams = new Gost3410PublicKeyAlgParameters( + priv.PublicKeyParamSet, CryptoProObjectIdentifiers.GostR3411x94CryptoProParamSet); + + algID = new AlgorithmIdentifier(CryptoProObjectIdentifiers.GostR3410x2001, gostParams); + + // TODO Do we need to pass any parameters here? + ec = new ECPrivateKeyStructure(orderBitLength, priv.D, publicKey, null); + } + else + { + X962Parameters x962; + if (priv.PublicKeyParamSet == null) + { + X9ECParameters ecP = new X9ECParameters(dp.Curve, new X9ECPoint(dp.G, false), dp.N, dp.H, + dp.GetSeed()); + x962 = new X962Parameters(ecP); + } + else + { + x962 = new X962Parameters(priv.PublicKeyParamSet); + } + + ec = new ECPrivateKeyStructure(orderBitLength, priv.D, publicKey, x962); + + algID = new AlgorithmIdentifier(X9ObjectIdentifiers.IdECPublicKey, x962); + } + + return new PrivateKeyInfo(algID, ec, attributes); + } + + if (privateKey is Gost3410PrivateKeyParameters) + { + Gost3410PrivateKeyParameters _key = (Gost3410PrivateKeyParameters)privateKey; + + if (_key.PublicKeyParamSet == null) + throw new NotImplementedException("Not a CryptoPro parameter set"); + + byte[] keyEnc = _key.X.ToByteArrayUnsigned(); + byte[] keyBytes = new byte[keyEnc.Length]; + + for (int i = 0; i != keyBytes.Length; i++) + { + keyBytes[i] = keyEnc[keyEnc.Length - 1 - i]; // must be little endian + } + + Gost3410PublicKeyAlgParameters algParams = new Gost3410PublicKeyAlgParameters( + _key.PublicKeyParamSet, CryptoProObjectIdentifiers.GostR3411x94CryptoProParamSet, null); + + AlgorithmIdentifier algID = new AlgorithmIdentifier( + CryptoProObjectIdentifiers.GostR3410x94, + algParams.ToAsn1Object()); + + return new PrivateKeyInfo(algID, new DerOctetString(keyBytes), attributes); + } + + if (privateKey is X448PrivateKeyParameters) + { + X448PrivateKeyParameters key = (X448PrivateKeyParameters)privateKey; + + return new PrivateKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_X448), + new DerOctetString(key.GetEncoded()), attributes, key.GeneratePublicKey().GetEncoded()); + } + + if (privateKey is X25519PrivateKeyParameters) + { + X25519PrivateKeyParameters key = (X25519PrivateKeyParameters)privateKey; + + return new PrivateKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_X25519), + new DerOctetString(key.GetEncoded()), attributes, key.GeneratePublicKey().GetEncoded()); + } + + if (privateKey is Ed448PrivateKeyParameters) + { + Ed448PrivateKeyParameters key = (Ed448PrivateKeyParameters)privateKey; + + return new PrivateKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_Ed448), + new DerOctetString(key.GetEncoded()), attributes, key.GeneratePublicKey().GetEncoded()); + } + + if (privateKey is Ed25519PrivateKeyParameters) + { + Ed25519PrivateKeyParameters key = (Ed25519PrivateKeyParameters)privateKey; + + return new PrivateKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_Ed25519), + new DerOctetString(key.GetEncoded()), attributes, key.GeneratePublicKey().GetEncoded()); + } + + throw new ArgumentException("Class provided is not convertible: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(privateKey)); + } + + public static PrivateKeyInfo CreatePrivateKeyInfo( + char[] passPhrase, + EncryptedPrivateKeyInfo encInfo) + { + return CreatePrivateKeyInfo(passPhrase, false, encInfo); + } + + public static PrivateKeyInfo CreatePrivateKeyInfo( + char[] passPhrase, + bool wrongPkcs12Zero, + EncryptedPrivateKeyInfo encInfo) + { + AlgorithmIdentifier algID = encInfo.EncryptionAlgorithm; + + IBufferedCipher cipher = PbeUtilities.CreateEngine(algID) as IBufferedCipher; + if (cipher == null) + throw new Exception("Unknown encryption algorithm: " + algID.Algorithm); + + ICipherParameters cipherParameters = PbeUtilities.GenerateCipherParameters( + algID, passPhrase, wrongPkcs12Zero); + cipher.Init(false, cipherParameters); + byte[] keyBytes = cipher.DoFinal(encInfo.GetEncryptedData()); + + return PrivateKeyInfo.GetInstance(keyBytes); + } + + private static void ExtractBytes(byte[] encKey, int size, int offSet, BigInteger bI) + { + byte[] val = bI.ToByteArray(); + if (val.Length < size) + { + byte[] tmp = new byte[size]; + Array.Copy(val, 0, tmp, tmp.Length - val.Length, val.Length); + val = tmp; + } + + for (int i = 0; i != size; i++) + { + encKey[offSet + i] = val[val.Length - 1 - i]; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs.meta new file mode 100644 index 00000000..51b20c51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 65bbd77d914cbac4a91a75cb55d36af2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/PrivateKeyInfoFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs new file mode 100644 index 00000000..8968eddf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs +{ + public class X509CertificateEntry + : Pkcs12Entry + { + private readonly X509Certificate cert; + + public X509CertificateEntry(X509Certificate cert) + : base(new Dictionary()) + { + this.cert = cert; + } + + public X509CertificateEntry(X509Certificate cert, IDictionary attributes) + : base(attributes) + { + this.cert = cert; + } + + public X509Certificate Certificate + { + get { return this.cert; } + } + + public override bool Equals(object obj) + { + X509CertificateEntry other = obj as X509CertificateEntry; + + if (other == null) + return false; + + return cert.Equals(other.cert); + } + + public override int GetHashCode() + { + return ~cert.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs.meta new file mode 100644 index 00000000..c7380283 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f125ca4f378d5b04899838e51a7be48d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkcs/X509CertificateEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix.meta new file mode 100644 index 00000000..0feae84c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 57be2c548270f3046b666e03e0510b50 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs new file mode 100644 index 00000000..39d0b56e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public class CertStatus + { + public const int Unrevoked = 11; + + public const int Undetermined = 12; + + private int status = Unrevoked; + + DateTime? revocationDate = null; + + /// + /// Returns the revocationDate. + /// + public DateTime? RevocationDate + { + get { return revocationDate; } + set { this.revocationDate = value; } + } + + /// + /// Returns the certStatus. + /// + public int Status + { + get { return status; } + set { this.status = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs.meta new file mode 100644 index 00000000..fd0b7105 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea556a97bcba0dd488c189bc0f4c6206 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/CertStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs new file mode 100644 index 00000000..12cf9ac5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public abstract class PkixAttrCertChecker + { + /** + * Returns an immutable Set of X.509 attribute certificate + * extensions that this PkixAttrCertChecker supports or + * null if no extensions are supported. + *

    + * Each element of the set is a String representing the + * Object Identifier (OID) of the X.509 extension that is supported. + *

    + *

    + * All X.509 attribute certificate extensions that a + * PkixAttrCertChecker might possibly be able to process + * should be included in the set. + *

    + * + * @return an immutable Set of X.509 extension OIDs (in + * String format) supported by this + * PkixAttrCertChecker, or null if no + * extensions are supported + */ + public abstract ISet GetSupportedExtensions(); + + /** + * Performs checks on the specified attribute certificate. Every handled + * extension is rmeoved from the unresolvedCritExts + * collection. + * + * @param attrCert The attribute certificate to be checked. + * @param certPath The certificate path which belongs to the attribute + * certificate issuer public key certificate. + * @param holderCertPath The certificate path which belongs to the holder + * certificate. + * @param unresolvedCritExts a Collection of OID strings + * representing the current set of unresolved critical extensions + * @throws CertPathValidatorException if the specified attribute certificate + * does not pass the check. + */ + public abstract void Check(X509V2AttributeCertificate attrCert, PkixCertPath certPath, + PkixCertPath holderCertPath, ICollection unresolvedCritExts); + + /** + * Returns a clone of this object. + * + * @return a copy of this PkixAttrCertChecker + */ + public abstract PkixAttrCertChecker Clone(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs.meta new file mode 100644 index 00000000..6fcdeae7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c8553a499bd484a42af438559317d403 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertChecker.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs new file mode 100644 index 00000000..0ca47898 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs @@ -0,0 +1,228 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public class PkixAttrCertPathBuilder + { + /** + * Build and validate a CertPath using the given parameter. + * + * @param params PKIXBuilderParameters object containing all information to + * build the CertPath + */ + public virtual PkixCertPathBuilderResult Build(PkixBuilderParameters pkixParams) + { + // search target certificates + + if (!(pkixParams.GetTargetConstraintsAttrCert() is X509AttrCertStoreSelector attrCertSelector)) + { + throw new PkixCertPathBuilderException( + "TargetConstraints must be an instance of " + + typeof(X509AttrCertStoreSelector).FullName + + " for " + + typeof(PkixAttrCertPathBuilder).FullName + " class."); + } + + HashSet targets; + try + { + targets = FindAttributeCertificates(attrCertSelector, pkixParams.GetStoresAttrCert()); + } + catch (Exception e) + { + throw new PkixCertPathBuilderException("Error finding target attribute certificate.", e); + } + + if (targets.Count == 0) + throw new PkixCertPathBuilderException("No attribute certificate found matching targetConstraints."); + + PkixCertPathBuilderResult result = null; + + // check all potential target certificates + foreach (var target in targets) + { + X509CertStoreSelector certSelector = new X509CertStoreSelector(); + X509Name[] principals = target.Issuer.GetPrincipals(); + var issuers = new HashSet(); + for (int i = 0; i < principals.Length; i++) + { + // TODO Replace loop with a single multiprincipal selector (or don't even use selector) + try + { + certSelector.Subject = principals[i]; + + CollectionUtilities.CollectMatches(issuers, certSelector, pkixParams.GetStoresCert()); + } + catch (Exception e) + { + throw new PkixCertPathBuilderException( + "Public key certificate for attribute certificate cannot be searched.", + e); + } + } + + if (issuers.Count < 1) + throw new PkixCertPathBuilderException("Public key certificate for attribute certificate cannot be found."); + + var certPathList = new List(); + + foreach (X509Certificate issuer in issuers) + { + result = Build(target, issuer, pkixParams, certPathList); + + if (result != null) + break; + } + + if (result != null) + break; + } + + if (result == null && certPathException != null) + throw new PkixCertPathBuilderException("Possible certificate chain could not be validated.", + certPathException); + + if (result == null && certPathException == null) + throw new PkixCertPathBuilderException("Unable to find certificate chain."); + + return result; + } + + private Exception certPathException; + + private PkixCertPathBuilderResult Build( + X509V2AttributeCertificate attrCert, + X509Certificate tbvCert, + PkixBuilderParameters pkixParams, + IList tbvPath) + { + // If tbvCert is readily present in tbvPath, it indicates having run + // into a cycle in the + // PKI graph. + if (tbvPath.Contains(tbvCert)) + return null; + + // step out, the certificate is not allowed to appear in a certification + // chain + if (pkixParams.GetExcludedCerts().Contains(tbvCert)) + return null; + + // test if certificate path exceeds maximum length + if (pkixParams.MaxPathLength != -1) + { + if (tbvPath.Count - 1 > pkixParams.MaxPathLength) + return null; + } + + tbvPath.Add(tbvCert); + + PkixCertPathBuilderResult builderResult = null; + +// X509CertificateParser certParser = new X509CertificateParser(); + PkixAttrCertPathValidator validator = new PkixAttrCertPathValidator(); + + try + { + // check whether the issuer of is a TrustAnchor + if (PkixCertPathValidatorUtilities.IsIssuerTrustAnchor(tbvCert, pkixParams.GetTrustAnchors())) + { + PkixCertPath certPath = new PkixCertPath(tbvPath); + PkixCertPathValidatorResult result; + + try + { + result = validator.Validate(certPath, pkixParams); + } + catch (Exception e) + { + throw new Exception("Certification path could not be validated.", e); + } + + return new PkixCertPathBuilderResult(certPath, result.TrustAnchor, + result.PolicyTree, result.SubjectPublicKey); + } + else + { + // add additional X.509 stores from locations in certificate + try + { + PkixCertPathValidatorUtilities.AddAdditionalStoresFromAltNames(tbvCert, pkixParams); + } + catch (CertificateParsingException e) + { + throw new Exception("No additional X.509 stores can be added from certificate locations.", e); + } + + // try to get the issuer certificate from one of the stores + ISet issuers; + try + { + issuers = PkixCertPathValidatorUtilities.FindIssuerCerts(tbvCert, pkixParams); + } + catch (Exception e) + { + throw new Exception("Cannot find issuer certificate for certificate in certification path.", e); + } + + if (issuers.Count < 1) + throw new Exception("No issuer certificate for certificate in certification path found."); + + foreach (X509Certificate issuer in issuers) + { + // if untrusted self signed certificate continue + if (PkixCertPathValidatorUtilities.IsSelfIssued(issuer)) + continue; + + builderResult = Build(attrCert, issuer, pkixParams, tbvPath); + + if (builderResult != null) + break; + } + } + } + catch (Exception e) + { + certPathException = new Exception("No valid certification path could be build.", e); + } + + if (builderResult == null) + { + tbvPath.Remove(tbvCert); + } + + return builderResult; + } + + internal static HashSet FindAttributeCertificates( + ISelector attrCertSelector, + IList> attrCertStores) + { + var attrCerts = new HashSet(); + + foreach (var attrCertStore in attrCertStores) + { + try + { + attrCerts.UnionWith(attrCertStore.EnumerateMatches(attrCertSelector)); + } + catch (Exception e) + { + throw new Exception("Problem while picking certificates from X.509 store.", e); + } + } + + return attrCerts; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs.meta new file mode 100644 index 00000000..e57e06e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 551b69a53d6a6574f9a6102522d3271e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs new file mode 100644 index 00000000..e4604942 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs @@ -0,0 +1,77 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /** + * CertPathValidatorSpi implementation for X.509 Attribute Certificates la RFC 3281. + * + * @see org.bouncycastle.x509.ExtendedPkixParameters + */ + public class PkixAttrCertPathValidator + // extends CertPathValidatorSpi + { + /** + * Validates an attribute certificate with the given certificate path. + * + *

    + * params must be an instance of + * ExtendedPkixParameters. + *

    + * The target constraints in the params must be an + * X509AttrCertStoreSelector with at least the attribute + * certificate criterion set. Obey that also target informations may be + * necessary to correctly validate this attribute certificate. + *

    + * The attribute certificate issuer must be added to the trusted attribute + * issuers with {@link ExtendedPkixParameters#setTrustedACIssuers(Set)}. + *

    + * @param certPath The certificate path which belongs to the attribute + * certificate issuer public key certificate. + * @param params The PKIX parameters. + * @return A PKIXCertPathValidatorResult of the result of + * validating the certPath. + * @throws InvalidAlgorithmParameterException if params is + * inappropriate for this validator. + * @throws CertPathValidatorException if the verification fails. + */ + public virtual PkixCertPathValidatorResult Validate(PkixCertPath certPath, PkixParameters pkixParams) + { + if (!(pkixParams.GetTargetConstraintsAttrCert() is X509AttrCertStoreSelector attrCertSelector)) + { + throw new ArgumentException( + "TargetConstraints must be an instance of " + typeof(X509AttrCertStoreSelector).FullName, + nameof(pkixParams)); + } + + var attrCert = attrCertSelector.AttributeCert; + PkixCertPath holderCertPath = Rfc3281CertPathUtilities.ProcessAttrCert1(attrCert, pkixParams); + PkixCertPathValidatorResult result = Rfc3281CertPathUtilities.ProcessAttrCert2(certPath, pkixParams); + X509Certificate issuerCert = (X509Certificate)certPath.Certificates[0]; + Rfc3281CertPathUtilities.ProcessAttrCert3(issuerCert, pkixParams); + Rfc3281CertPathUtilities.ProcessAttrCert4(issuerCert, pkixParams); + Rfc3281CertPathUtilities.ProcessAttrCert5(attrCert, pkixParams); + // 6 already done in X509AttrCertStoreSelector + Rfc3281CertPathUtilities.ProcessAttrCert7(attrCert, certPath, holderCertPath, pkixParams); + Rfc3281CertPathUtilities.AdditionalChecks(attrCert, pkixParams); + DateTime date; + try + { + date = PkixCertPathValidatorUtilities.GetValidCertDateFromValidityModel(pkixParams, null, -1); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Could not get validity date from attribute certificate.", e); + } + Rfc3281CertPathUtilities.CheckCrls(attrCert, pkixParams, issuerCert, date, certPath.Certificates); + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs.meta new file mode 100644 index 00000000..08f54fa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c2d54a774c6e04c4db5da8bddaae66a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixAttrCertPathValidator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs new file mode 100644 index 00000000..85b5574d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs @@ -0,0 +1,150 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixBuilderParameters. + /// + public class PkixBuilderParameters + : PkixParameters + { + private int maxPathLength = 5; + + private ISet excludedCerts = new HashSet(); + + /** + * Returns an instance of PkixBuilderParameters. + *

    + * This method can be used to get a copy from other + * PKIXBuilderParameters, PKIXParameters, + * and ExtendedPKIXParameters instances. + *

    + * + * @param pkixParams The PKIX parameters to create a copy of. + * @return An PkixBuilderParameters instance. + */ + public static PkixBuilderParameters GetInstance( + PkixParameters pkixParams) + { + PkixBuilderParameters parameters = new PkixBuilderParameters( + pkixParams.GetTrustAnchors(), + pkixParams.GetTargetConstraintsCert(), + pkixParams.GetTargetConstraintsAttrCert()); + parameters.SetParams(pkixParams); + return parameters; + } + + public PkixBuilderParameters(ISet trustAnchors, ISelector targetConstraintsCert) + : this(trustAnchors, targetConstraintsCert, null) + { + } + + public PkixBuilderParameters(ISet trustAnchors, ISelector targetConstraintsCert, + ISelector targetConstraintsAttrCert) + : base(trustAnchors) + { + SetTargetConstraintsCert(targetConstraintsCert); + SetTargetConstraintsAttrCert(targetConstraintsAttrCert); + } + + public virtual int MaxPathLength + { + get { return maxPathLength; } + set + { + if (value < -1) + { + throw new InvalidParameterException( + "The maximum path length parameter can not be less than -1."); + } + this.maxPathLength = value; + } + } + + /// + /// Excluded certificates are not used for building a certification path. + /// + /// the excluded certificates. + public virtual ISet GetExcludedCerts() + { + return new HashSet(excludedCerts); + } + + /// + /// Sets the excluded certificates which are not used for building a + /// certification path. If the ISet is null an + /// empty set is assumed. + /// + /// + /// The given set is cloned to protect it against subsequent modifications. + /// + /// The excluded certificates to set. + public virtual void SetExcludedCerts(ISet excludedCerts) + { + if (excludedCerts == null) + { + this.excludedCerts = new HashSet(); + } + else + { + this.excludedCerts = new HashSet(excludedCerts); + } + } + + /** + * Can alse handle ExtendedPKIXBuilderParameters and + * PKIXBuilderParameters. + * + * @param params Parameters to set. + * @see org.bouncycastle.x509.ExtendedPKIXParameters#setParams(java.security.cert.PKIXParameters) + */ + protected override void SetParams(PkixParameters parameters) + { + base.SetParams(parameters); + if (parameters is PkixBuilderParameters _params) + { + maxPathLength = _params.maxPathLength; + excludedCerts = new HashSet(_params.excludedCerts); + } + } + + /** + * Makes a copy of this PKIXParameters object. Changes to the + * copy will not affect the original and vice versa. + * + * @return a copy of this PKIXParameters object + */ + public override object Clone() + { + PkixBuilderParameters parameters = new PkixBuilderParameters( + GetTrustAnchors(), + GetTargetConstraintsCert(), + GetTargetConstraintsAttrCert()); + parameters.SetParams(this); + return parameters; + } + + public override string ToString() + { + StringBuilder s = new StringBuilder(); + s.AppendLine("PkixBuilderParameters ["); + s.Append(base.ToString()); + s.Append(" Maximum Path Length: "); + s.Append(MaxPathLength); + s.AppendLine(); + s.AppendLine("]"); + return s.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs.meta new file mode 100644 index 00000000..fd902ad9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f23d644ddc665f64d8fb4d81341f5941 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixBuilderParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs new file mode 100644 index 00000000..f4ac66ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs @@ -0,0 +1,423 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /** + * An immutable sequence of certificates (a certification path).
    + *
    + * This is an abstract class that defines the methods common to all CertPaths. + * Subclasses can handle different kinds of certificates (X.509, PGP, etc.).
    + *
    + * All CertPath objects have a type, a list of Certificates, and one or more + * supported encodings. Because the CertPath class is immutable, a CertPath + * cannot change in any externally visible way after being constructed. This + * stipulation applies to all public fields and methods of this class and any + * added or overridden by subclasses.
    + *
    + * The type is a string that identifies the type of Certificates in the + * certification path. For each certificate cert in a certification path + * certPath, cert.getType().equals(certPath.getType()) must be true.
    + *
    + * The list of Certificates is an ordered List of zero or more Certificates. + * This List and all of the Certificates contained in it must be immutable.
    + *
    + * Each CertPath object must support one or more encodings so that the object + * can be translated into a byte array for storage or transmission to other + * parties. Preferably, these encodings should be well-documented standards + * (such as PKCS#7). One of the encodings supported by a CertPath is considered + * the default encoding. This encoding is used if no encoding is explicitly + * requested (for the {@link #getEncoded()} method, for instance).
    + *
    + * All CertPath objects are also Serializable. CertPath objects are resolved + * into an alternate {@link CertPathRep} object during serialization. This + * allows a CertPath object to be serialized into an equivalent representation + * regardless of its underlying implementation.
    + *
    + * CertPath objects can be created with a CertificateFactory or they can be + * returned by other classes, such as a CertPathBuilder.
    + *
    + * By convention, X.509 CertPaths (consisting of X509Certificates), are ordered + * starting with the target certificate and ending with a certificate issued by + * the trust anchor. That is, the issuer of one certificate is the subject of + * the following one. The certificate representing the + * {@link TrustAnchor TrustAnchor} should not be included in the certification + * path. Unvalidated X.509 CertPaths may not follow these conventions. PKIX + * CertPathValidators will detect any departure from these conventions that + * cause the certification path to be invalid and throw a + * CertPathValidatorException.
    + *
    + * Concurrent Access
    + *
    + * All CertPath objects must be thread-safe. That is, multiple threads may + * concurrently invoke the methods defined in this class on a single CertPath + * object (or more than one) with no ill effects. This is also true for the List + * returned by CertPath.getCertificates.
    + *
    + * Requiring CertPath objects to be immutable and thread-safe allows them to be + * passed around to various pieces of code without worrying about coordinating + * access. Providing this thread-safety is generally not difficult, since the + * CertPath and List objects in question are immutable. + * + * @see CertificateFactory + * @see CertPathBuilder + */ + /// + /// CertPath implementation for X.509 certificates. + /// + public class PkixCertPath +// : CertPath + { + internal static readonly List m_encodings = new List{ "PkiPath", "PEM", "PKCS7" }; + + private readonly IList m_certificates; + + private static IList SortCerts(IList certs) + { + if (certs.Count < 2) + return certs; + + X509Name issuer = certs[0].IssuerDN; + bool okay = true; + + for (int i = 1; i != certs.Count; i++) + { + X509Certificate cert = certs[i]; + + if (issuer.Equivalent(cert.SubjectDN, true)) + { + issuer = cert.IssuerDN; + } + else + { + okay = false; + break; + } + } + + if (okay) + return certs; + + // find end-entity cert + var retList = new List(certs.Count); + var orig = new List(certs); + + for (int i = 0; i < certs.Count; i++) + { + X509Certificate cert = certs[i]; + bool found = false; + + X509Name subject = cert.SubjectDN; + foreach (X509Certificate c in certs) + { + if (c.IssuerDN.Equivalent(subject, true)) + { + found = true; + break; + } + } + + if (!found) + { + retList.Add(cert); + certs.RemoveAt(i); + } + } + + // can only have one end entity cert - something's wrong, give up. + if (retList.Count > 1) + return orig; + + for (int i = 0; i != retList.Count; i++) + { + issuer = retList[i].IssuerDN; + + for (int j = 0; j < certs.Count; j++) + { + X509Certificate c = certs[j]; + if (issuer.Equivalent(c.SubjectDN, true)) + { + retList.Add(c); + certs.RemoveAt(j); + break; + } + } + } + + // make sure all certificates are accounted for. + if (certs.Count > 0) + return orig; + + return retList; + } + + /** + * Creates a CertPath of the specified type. + * This constructor is protected because most users should use + * a CertificateFactory to create CertPaths. + * @param type the standard name of the type of Certificatesin this path + **/ + public PkixCertPath(IList certificates) + { + m_certificates = SortCerts(new List(certificates)); + } + + public PkixCertPath(Stream inStream) + : this(inStream, "PkiPath") + { + } + + /** + * Creates a CertPath of the specified type. + * This constructor is protected because most users should use + * a CertificateFactory to create CertPaths. + * + * @param type the standard name of the type of Certificatesin this path + **/ + public PkixCertPath(Stream inStream, string encoding) + { + //string upper = Org.BouncyCastle.Utilities.Platform.ToUpperInvariant(encoding); + + IList certs; + try + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("PkiPath", encoding)) + { + Asn1InputStream derInStream = new Asn1InputStream(inStream); + Asn1Object derObject = derInStream.ReadObject(); + if (!(derObject is Asn1Sequence)) + { + throw new CertificateException( + "input stream does not contain a ASN1 SEQUENCE while reading PkiPath encoded data to load CertPath"); + } + + certs = new List(); + + foreach (Asn1Encodable ae in (Asn1Sequence)derObject) + { + byte[] derBytes = ae.GetEncoded(Asn1Encodable.Der); + Stream certInStream = new MemoryStream(derBytes, false); + + // TODO Is inserting at the front important (list will be sorted later anyway)? + certs.Insert(0, new X509CertificateParser().ReadCertificate(certInStream)); + } + } + else if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("PEM", encoding) || + Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase("PKCS7", encoding)) + { + certs = new X509CertificateParser().ReadCertificates(inStream); + } + else + { + throw new CertificateException("unsupported encoding: " + encoding); + } + } + catch (IOException ex) + { + throw new CertificateException( + "IOException throw while decoding CertPath:\n" + + ex.ToString()); + } + + m_certificates = SortCerts(certs); + } + + /** + * Returns an iteration of the encodings supported by this + * certification path, with the default encoding + * first. Attempts to modify the returned Iterator via its + * remove method result in an UnsupportedOperationException. + * + * @return an Iterator over the names of the supported encodings (as Strings) + **/ + public virtual IEnumerable Encodings + { + get { return CollectionUtilities.Proxy(m_encodings); } + } + + /** + * Compares this certification path for equality with the specified object. + * Two CertPaths are equal if and only if their types are equal and their + * certificate Lists (and by implication the Certificates in those Lists) + * are equal. A CertPath is never equal to an object that is not a CertPath.
    + *
    + * This algorithm is implemented by this method. If it is overridden, the + * behavior specified here must be maintained. + * + * @param other + * the object to test for equality with this certification path + * + * @return true if the specified object is equal to this certification path, + * false otherwise + * + * @see Object#hashCode() Object.hashCode() + */ + public override bool Equals(object obj) + { + if (this == obj) + return true; + + if (!(obj is PkixCertPath that)) + return false; + + var thisCerts = this.Certificates; + var thatCerts = that.Certificates; + + if (thisCerts.Count != thatCerts.Count) + return false; + + var e1 = thisCerts.GetEnumerator(); + var e2 = thatCerts.GetEnumerator(); + + while (e1.MoveNext()) + { + e2.MoveNext(); + + if (!Equals(e1.Current, e2.Current)) + return false; + } + + return true; + } + + public override int GetHashCode() + { + return m_certificates.GetHashCode(); + } + + /** + * Returns the encoded form of this certification path, using + * the default encoding. + * + * @return the encoded bytes + * @exception CertificateEncodingException if an encoding error occurs + **/ + public virtual byte[] GetEncoded() + { + return GetEncoded(m_encodings[0]); + } + + /** + * Returns the encoded form of this certification path, using + * the specified encoding. + * + * @param encoding the name of the encoding to use + * @return the encoded bytes + * @exception CertificateEncodingException if an encoding error + * occurs or the encoding requested is not supported + * + */ + public virtual byte[] GetEncoded(string encoding) + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(encoding, "PkiPath")) + { + Asn1EncodableVector v = new Asn1EncodableVector(m_certificates.Count); + for (int i = m_certificates.Count - 1; i >= 0; i--) + { + v.Add(ToAsn1Object(m_certificates[i])); + } + + return ToDerEncoded(new DerSequence(v)); + } + else if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(encoding, "PKCS7")) + { + ContentInfo encInfo = new ContentInfo(PkcsObjectIdentifiers.Data, null); + + Asn1EncodableVector v = new Asn1EncodableVector(m_certificates.Count); + foreach (var cert in m_certificates) + { + v.Add(ToAsn1Object(cert)); + } + + SignedData sd = new SignedData( + new DerInteger(1), + new DerSet(), + encInfo, + new DerSet(v), + null, + new DerSet()); + + return ToDerEncoded(new ContentInfo(PkcsObjectIdentifiers.SignedData, sd)); + } + else if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(encoding, "PEM")) + { + MemoryStream bOut = new MemoryStream(); + + try + { + using (var pWrt = new PemWriter(new StreamWriter(bOut))) + { + foreach (var cert in m_certificates) + { + pWrt.WriteObject(cert); + } + } + } + catch (Exception) + { + throw new CertificateEncodingException("can't encode certificate for PEM encoded path"); + } + + return bOut.ToArray(); + } + else + { + throw new CertificateEncodingException("unsupported encoding: " + encoding); + } + } + + /// + /// Returns the list of certificates in this certification + /// path. + /// + public virtual IList Certificates + { + get { return CollectionUtilities.ReadOnly(m_certificates); } + } + + /** + * Return a DERObject containing the encoded certificate. + * + * @param cert the X509Certificate object to be encoded + * + * @return the DERObject + **/ + private Asn1Object ToAsn1Object(X509Certificate cert) + { + try + { + return cert.CertificateStructure.ToAsn1Object(); + } + catch (Exception e) + { + throw new CertificateEncodingException("Exception while encoding certificate", e); + } + } + + private byte[] ToDerEncoded(Asn1Encodable obj) + { + try + { + return obj.GetEncoded(Asn1Encodable.Der); + } + catch (IOException e) + { + throw new CertificateEncodingException("Exception thrown", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs.meta new file mode 100644 index 00000000..b4deaf52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f5fc1ff7c57f8d142bcb4a283b7bb1ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPath.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs new file mode 100644 index 00000000..63b7593e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs @@ -0,0 +1,173 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /** + * Implements the PKIX CertPathBuilding algorithm for BouncyCastle. + * + * @see CertPathBuilderSpi + */ + public class PkixCertPathBuilder + { + /** + * Build and validate a CertPath using the given parameter. + * + * @param params PKIXBuilderParameters object containing all information to + * build the CertPath + */ + public virtual PkixCertPathBuilderResult Build(PkixBuilderParameters pkixParams) + { + // search target certificates + + var certSelector = pkixParams.GetTargetConstraintsCert(); + + var targets = new HashSet(); + try + { + CollectionUtilities.CollectMatches(targets, certSelector, pkixParams.GetStoresCert()); + } + catch (Exception e) + { + throw new PkixCertPathBuilderException( + "Error finding target certificate.", e); + } + + if (targets.Count < 1) + throw new PkixCertPathBuilderException("No certificate found matching targetConstraints."); + + PkixCertPathBuilderResult result = null; + var certPathList = new List(); + + // check all potential target certificates + foreach (X509Certificate cert in targets) + { + result = Build(cert, pkixParams, certPathList); + + if (result != null) + break; + } + + if (result == null && certPathException != null) + throw new PkixCertPathBuilderException(certPathException.Message, certPathException.InnerException); + + if (result == null && certPathException == null) + throw new PkixCertPathBuilderException("Unable to find certificate chain."); + + return result; + } + + private Exception certPathException; + + protected virtual PkixCertPathBuilderResult Build( + X509Certificate tbvCert, + PkixBuilderParameters pkixParams, + IList tbvPath) + { + // If tbvCert is already present in tbvPath, it indicates having run into a cycle in the PKI graph. + if (tbvPath.Contains(tbvCert)) + return null; + + // step out, the certificate is not allowed to appear in a certification chain. + if (pkixParams.GetExcludedCerts().Contains(tbvCert)) + return null; + + // test if certificate path exceeds maximum length + if (pkixParams.MaxPathLength != -1) + { + if (tbvPath.Count - 1 > pkixParams.MaxPathLength) + return null; + } + + tbvPath.Add(tbvCert); + + PkixCertPathBuilderResult builderResult = null; + PkixCertPathValidator validator = new PkixCertPathValidator(); + + try + { + // check whether the issuer of is a TrustAnchor + if (PkixCertPathValidatorUtilities.IsIssuerTrustAnchor(tbvCert, pkixParams.GetTrustAnchors())) + { + // exception message from possibly later tried certification chains + PkixCertPath certPath; + try + { + certPath = new PkixCertPath(tbvPath); + } + catch (Exception e) + { + throw new Exception("Certification path could not be constructed from certificate list.", e); + } + + PkixCertPathValidatorResult result; + try + { + result = validator.Validate(certPath, pkixParams); + } + catch (Exception e) + { + throw new Exception( + "Certification path could not be validated.", e); + } + + return new PkixCertPathBuilderResult(certPath, result.TrustAnchor, result.PolicyTree, + result.SubjectPublicKey); + } + else + { + // add additional X.509 stores from locations in certificate + try + { + PkixCertPathValidatorUtilities.AddAdditionalStoresFromAltNames(tbvCert, pkixParams); + } + catch (CertificateParsingException e) + { + throw new Exception("No additiontal X.509 stores can be added from certificate locations.", e); + } + + // try to get the issuer certificate from one of the stores + ISet issuers; + try + { + issuers = PkixCertPathValidatorUtilities.FindIssuerCerts(tbvCert, pkixParams); + } + catch (Exception e) + { + throw new Exception("Cannot find issuer certificate for certificate in certification path.", e); + } + + if (issuers.Count < 1) + throw new Exception("No issuer certificate for certificate in certification path found."); + + foreach (X509Certificate issuer in issuers) + { + builderResult = Build(issuer, pkixParams, tbvPath); + + if (builderResult != null) + break; + } + } + } + catch (Exception e) + { + certPathException = e; + } + + if (builderResult == null) + { + tbvPath.Remove(tbvCert); + } + + return builderResult; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs.meta new file mode 100644 index 00000000..8dd859e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3af37573fb0dac6498c9286e7e292986 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs new file mode 100644 index 00000000..e8191793 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + [Serializable] + public class PkixCertPathBuilderException + : GeneralSecurityException + { + public PkixCertPathBuilderException() + : base() + { + } + + public PkixCertPathBuilderException(string message) + : base(message) + { + } + + public PkixCertPathBuilderException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PkixCertPathBuilderException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs.meta new file mode 100644 index 00000000..eda10f01 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a2e5e272ee1a4c74fa18374e00566791 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs new file mode 100644 index 00000000..07c9497b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixCertPathBuilderResult. + /// + public class PkixCertPathBuilderResult + : PkixCertPathValidatorResult//, ICertPathBuilderResult + { + private PkixCertPath certPath; + + public PkixCertPathBuilderResult( + PkixCertPath certPath, + TrustAnchor trustAnchor, + PkixPolicyNode policyTree, + AsymmetricKeyParameter subjectPublicKey) + : base(trustAnchor, policyTree, subjectPublicKey) + { + if (certPath == null) + throw new ArgumentNullException("certPath"); + + this.certPath = certPath; + } + + public PkixCertPath CertPath + { + get { return certPath; } + } + + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.AppendLine("SimplePKIXCertPathBuilderResult: ["); + sb.Append(" Certification Path: ").Append(CertPath).AppendLine(); + sb.Append(" Trust Anchor: ").Append(TrustAnchor.TrustedCert.IssuerDN).AppendLine(); + sb.Append(" Subject Public Key: ").Append(SubjectPublicKey).AppendLine(); + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs.meta new file mode 100644 index 00000000..30f474e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 421f5ce8750da8b4e88f18b50d2e95e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathBuilderResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs new file mode 100644 index 00000000..3c106e5e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public abstract class PkixCertPathChecker + { + protected PkixCertPathChecker() + { + } + + /** + * Initializes the internal state of this PKIXCertPathChecker. + *

    + * The forward flag specifies the order that certificates + * will be passed to the {@link #check check} method (forward or reverse). A + * PKIXCertPathChecker must support reverse checking + * and may support forward checking. + *

    + * + * @param forward + * the order that certificates are presented to the + * check method. If true, + * certificates are presented from target to most-trusted CA + * (forward); if false, from most-trusted CA to + * target (reverse). + * @exception CertPathValidatorException + * if this PKIXCertPathChecker is unable to + * check certificates in the specified order; it should never + * be thrown if the forward flag is false since reverse + * checking must be supported + */ + public abstract void Init(bool forward); + //throws CertPathValidatorException; + + /** + * Indicates if forward checking is supported. Forward checking refers to + * the ability of the PKIXCertPathChecker to perform its + * checks when certificates are presented to the check method + * in the forward direction (from target to most-trusted CA). + * + * @return true if forward checking is supported, + * false otherwise + */ + public abstract bool IsForwardCheckingSupported(); + + /** + * Returns an immutable Set of X.509 certificate extensions + * that this PKIXCertPathChecker supports (i.e. recognizes, + * is able to process), or null if no extensions are + * supported. + *

    + * Each element of the set is a String representing the + * Object Identifier (OID) of the X.509 extension that is supported. The OID + * is represented by a set of nonnegative integers separated by periods. + *

    + * All X.509 certificate extensions that a PKIXCertPathChecker + * might possibly be able to process should be included in the set. + *

    + * + * @return an immutable Set of X.509 extension OIDs (in + * String format) supported by this + * PKIXCertPathChecker, or null if no + * extensions are supported + */ + public abstract ISet GetSupportedExtensions(); + + /** + * Performs the check(s) on the specified certificate using its internal + * state and removes any critical extensions that it processes from the + * specified collection of OID strings that represent the unresolved + * critical extensions. The certificates are presented in the order + * specified by the init method. + * + * @param cert + * the Certificate to be checked + * @param unresolvedCritExts + * a Collection of OID strings representing the + * current set of unresolved critical extensions + * @exception CertPathValidatorException + * if the specified certificate does not pass the check + */ + public abstract void Check(X509Certificate cert, ISet unresolvedCritExts); + //throws CertPathValidatorException; + + /** + * Returns a clone of this object. Calls the Object.clone() + * method. All subclasses which maintain state must support and override + * this method, if necessary. + * + * @return a copy of this PKIXCertPathChecker + */ + public virtual object Clone() + { + // TODO Check this + return base.MemberwiseClone(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs.meta new file mode 100644 index 00000000..6d1f7e22 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 39c94453f9b47cf4c8557419108f16a6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathChecker.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs new file mode 100644 index 00000000..f66c36af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs @@ -0,0 +1,442 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /** + * The Service Provider Interface (SPI) + * for the {@link CertPathValidator CertPathValidator} class. All + * CertPathValidator implementations must include a class (the + * SPI class) that extends this class (CertPathValidatorSpi) + * and implements all of its methods. In general, instances of this class + * should only be accessed through the CertPathValidator class. + * For details, see the Java Cryptography Architecture.
    + *
    + * Concurrent Access
    + *
    + * Instances of this class need not be protected against concurrent + * access from multiple threads. Threads that need to access a single + * CertPathValidatorSpi instance concurrently should synchronize + * amongst themselves and provide the necessary locking before calling the + * wrapping CertPathValidator object.
    + *
    + * However, implementations of CertPathValidatorSpi may still + * encounter concurrency issues, since multiple threads each + * manipulating a different CertPathValidatorSpi instance need not + * synchronize. + */ + /// + /// CertPathValidatorSpi implementation for X.509 Certificate validation a la RFC + /// 3280. + /// + public class PkixCertPathValidator + { + public virtual PkixCertPathValidatorResult Validate(PkixCertPath certPath, PkixParameters paramsPkix) + { + if (paramsPkix.GetTrustAnchors() == null) + { + throw new ArgumentException( + "trustAnchors is null, this is not allowed for certification path validation.", + nameof(paramsPkix)); + } + + // + // 6.1.1 - inputs + // + + // + // (a) + // + var certs = certPath.Certificates; + int n = certs.Count; + + if (n == 0) + throw new PkixCertPathValidatorException("Certification path is empty.", null, 0); + + // + // (b) + // + // DateTime validDate = PkixCertPathValidatorUtilities.GetValidDate(paramsPkix); + + // + // (c) + // + var userInitialPolicySet = paramsPkix.GetInitialPolicies(); + + // + // (d) + // + TrustAnchor trust; + try + { + trust = PkixCertPathValidatorUtilities.FindTrustAnchor(certs[certs.Count - 1], + paramsPkix.GetTrustAnchors()); + + if (trust == null) + throw new PkixCertPathValidatorException("Trust anchor for certification path not found.", null, -1); + + CheckCertificate(trust.TrustedCert); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException(e.Message, e.InnerException, certs.Count - 1); + } + + // + // (e), (f), (g) are part of the paramsPkix object. + // + int index = 0; + int i; + // Certificate for each interation of the validation loop + // Signature information for each iteration of the validation loop + // + // 6.1.2 - setup + // + + // + // (a) + // + var policyNodes = new List[n + 1]; + for (int j = 0; j < policyNodes.Length; j++) + { + policyNodes[j] = new List(); + } + + var policySet = new HashSet(); + + policySet.Add(Rfc3280CertPathUtilities.ANY_POLICY); + + var validPolicyTree = new PkixPolicyNode(new List(), 0, policySet, null, + new HashSet(), Rfc3280CertPathUtilities.ANY_POLICY, false); + + policyNodes[0].Add(validPolicyTree); + + // + // (b) and (c) + // + PkixNameConstraintValidator nameConstraintValidator = new PkixNameConstraintValidator(); + + // (d) + // + int explicitPolicy; + var acceptablePolicies = new HashSet(); + + if (paramsPkix.IsExplicitPolicyRequired) + { + explicitPolicy = 0; + } + else + { + explicitPolicy = n + 1; + } + + // + // (e) + // + int inhibitAnyPolicy; + + if (paramsPkix.IsAnyPolicyInhibited) + { + inhibitAnyPolicy = 0; + } + else + { + inhibitAnyPolicy = n + 1; + } + + // + // (f) + // + int policyMapping; + + if (paramsPkix.IsPolicyMappingInhibited) + { + policyMapping = 0; + } + else + { + policyMapping = n + 1; + } + + // + // (g), (h), (i), (j) + // + AsymmetricKeyParameter workingPublicKey; + X509Name workingIssuerName; + + X509Certificate sign = trust.TrustedCert; + try + { + if (sign != null) + { + workingIssuerName = sign.SubjectDN; + workingPublicKey = sign.GetPublicKey(); + } + else + { + workingIssuerName = new X509Name(trust.CAName); + workingPublicKey = trust.CAPublicKey; + } + } + catch (ArgumentException ex) + { + throw new PkixCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, -1); + } + + AlgorithmIdentifier workingAlgId = null; + try + { + workingAlgId = PkixCertPathValidatorUtilities.GetAlgorithmIdentifier(workingPublicKey); + } + catch (PkixCertPathValidatorException e) + { + throw new PkixCertPathValidatorException( + "Algorithm identifier of public key of trust anchor could not be read.", e, -1); + } + +// DerObjectIdentifier workingPublicKeyAlgorithm = workingAlgId.Algorithm; +// Asn1Encodable workingPublicKeyParameters = workingAlgId.Parameters; + + // + // (k) + // + int maxPathLength = n; + + // + // 6.1.3 + // + + var targetConstraints = paramsPkix.GetTargetConstraintsCert(); + if (targetConstraints != null && !targetConstraints.Match((X509Certificate)certs[0])) + { + throw new PkixCertPathValidatorException( + "Target certificate in certification path does not match targetConstraints.", null, 0); + } + + // + // initialize CertPathChecker's + // + var certPathCheckers = paramsPkix.GetCertPathCheckers(); + foreach (PkixCertPathChecker certPathChecker in certPathCheckers) + { + certPathChecker.Init(false); + } + + X509Certificate cert = null; + + for (index = certs.Count - 1; index >= 0; index--) + { + // try + // { + // + // i as defined in the algorithm description + // + i = n - index; + + // + // set certificate to be checked in this round + // sign and workingPublicKey and workingIssuerName are set + // at the end of the for loop and initialized the + // first time from the TrustAnchor + // + cert = (X509Certificate)certs[index]; + + try + { + CheckCertificate(cert); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException(e.Message, e.InnerException, index); + } + + // + // 6.1.3 + // + + Rfc3280CertPathUtilities.ProcessCertA(certPath, paramsPkix, index, workingPublicKey, + workingIssuerName, sign); + + Rfc3280CertPathUtilities.ProcessCertBC(certPath, index, nameConstraintValidator); + + validPolicyTree = Rfc3280CertPathUtilities.ProcessCertD(certPath, index, + acceptablePolicies, validPolicyTree, policyNodes, inhibitAnyPolicy); + + validPolicyTree = Rfc3280CertPathUtilities.ProcessCertE(certPath, index, validPolicyTree); + + Rfc3280CertPathUtilities.ProcessCertF(certPath, index, validPolicyTree, explicitPolicy); + + // + // 6.1.4 + // + + if (i != n) + { + if (cert != null && cert.Version == 1) + { + // we've found the trust anchor at the top of the path, ignore and keep going + if ((i == 1) && cert.Equals(trust.TrustedCert)) + continue; + + throw new PkixCertPathValidatorException( + "Version 1 certificates can't be used as CA ones.", null, index); + } + + Rfc3280CertPathUtilities.PrepareNextCertA(certPath, index); + + validPolicyTree = Rfc3280CertPathUtilities.PrepareCertB(certPath, index, policyNodes, + validPolicyTree, policyMapping); + + Rfc3280CertPathUtilities.PrepareNextCertG(certPath, index, nameConstraintValidator); + + // (h) + explicitPolicy = Rfc3280CertPathUtilities.PrepareNextCertH1(certPath, index, explicitPolicy); + policyMapping = Rfc3280CertPathUtilities.PrepareNextCertH2(certPath, index, policyMapping); + inhibitAnyPolicy = Rfc3280CertPathUtilities.PrepareNextCertH3(certPath, index, inhibitAnyPolicy); + + // + // (i) + // + explicitPolicy = Rfc3280CertPathUtilities.PrepareNextCertI1(certPath, index, explicitPolicy); + policyMapping = Rfc3280CertPathUtilities.PrepareNextCertI2(certPath, index, policyMapping); + + // (j) + inhibitAnyPolicy = Rfc3280CertPathUtilities.PrepareNextCertJ(certPath, index, inhibitAnyPolicy); + + // (k) + Rfc3280CertPathUtilities.PrepareNextCertK(certPath, index); + + // (l) + maxPathLength = Rfc3280CertPathUtilities.PrepareNextCertL(certPath, index, maxPathLength); + + // (m) + maxPathLength = Rfc3280CertPathUtilities.PrepareNextCertM(certPath, index, maxPathLength); + + // (n) + Rfc3280CertPathUtilities.PrepareNextCertN(certPath, index); + + var criticalExtensions1 = cert.GetCriticalExtensionOids(); + + if (criticalExtensions1 != null) + { + criticalExtensions1 = new HashSet(criticalExtensions1); + + // these extensions are handled by the algorithm + criticalExtensions1.Remove(X509Extensions.KeyUsage.Id); + criticalExtensions1.Remove(X509Extensions.CertificatePolicies.Id); + criticalExtensions1.Remove(X509Extensions.PolicyMappings.Id); + criticalExtensions1.Remove(X509Extensions.InhibitAnyPolicy.Id); + criticalExtensions1.Remove(X509Extensions.IssuingDistributionPoint.Id); + criticalExtensions1.Remove(X509Extensions.DeltaCrlIndicator.Id); + criticalExtensions1.Remove(X509Extensions.PolicyConstraints.Id); + criticalExtensions1.Remove(X509Extensions.BasicConstraints.Id); + criticalExtensions1.Remove(X509Extensions.SubjectAlternativeName.Id); + criticalExtensions1.Remove(X509Extensions.NameConstraints.Id); + } + else + { + criticalExtensions1 = new HashSet(); + } + + // (o) + Rfc3280CertPathUtilities.PrepareNextCertO(certPath, index, criticalExtensions1, certPathCheckers); + + // set signing certificate for next round + sign = cert; + + // (c) + workingIssuerName = sign.SubjectDN; + + // (d) + try + { + workingPublicKey = PkixCertPathValidatorUtilities.GetNextWorkingKey(certPath.Certificates, index); + } + catch (PkixCertPathValidatorException e) + { + throw new PkixCertPathValidatorException("Next working key could not be retrieved.", e, index); + } + + workingAlgId = PkixCertPathValidatorUtilities.GetAlgorithmIdentifier(workingPublicKey); + // (f) +// workingPublicKeyAlgorithm = workingAlgId.Algorithm; + // (e) +// workingPublicKeyParameters = workingAlgId.Parameters; + } + } + + // + // 6.1.5 Wrap-up procedure + // + + explicitPolicy = Rfc3280CertPathUtilities.WrapupCertA(explicitPolicy, cert); + + explicitPolicy = Rfc3280CertPathUtilities.WrapupCertB(certPath, index + 1, explicitPolicy); + + // + // (c) (d) and (e) are already done + // + + // + // (f) + // + var criticalExtensions = cert.GetCriticalExtensionOids(); + + if (criticalExtensions != null) + { + criticalExtensions = new HashSet(criticalExtensions); + + // Requires .Id + // these extensions are handled by the algorithm + criticalExtensions.Remove(X509Extensions.KeyUsage.Id); + criticalExtensions.Remove(X509Extensions.CertificatePolicies.Id); + criticalExtensions.Remove(X509Extensions.PolicyMappings.Id); + criticalExtensions.Remove(X509Extensions.InhibitAnyPolicy.Id); + criticalExtensions.Remove(X509Extensions.IssuingDistributionPoint.Id); + criticalExtensions.Remove(X509Extensions.DeltaCrlIndicator.Id); + criticalExtensions.Remove(X509Extensions.PolicyConstraints.Id); + criticalExtensions.Remove(X509Extensions.BasicConstraints.Id); + criticalExtensions.Remove(X509Extensions.SubjectAlternativeName.Id); + criticalExtensions.Remove(X509Extensions.NameConstraints.Id); + criticalExtensions.Remove(X509Extensions.CrlDistributionPoints.Id); + } + else + { + criticalExtensions = new HashSet(); + } + + Rfc3280CertPathUtilities.WrapupCertF(certPath, index + 1, certPathCheckers, criticalExtensions); + + PkixPolicyNode intersection = Rfc3280CertPathUtilities.WrapupCertG(certPath, paramsPkix, + userInitialPolicySet, index + 1, policyNodes, validPolicyTree, acceptablePolicies); + + if ((explicitPolicy > 0) || (intersection != null)) + { + return new PkixCertPathValidatorResult(trust, intersection, cert.GetPublicKey()); + } + + throw new PkixCertPathValidatorException("Path processing failed on policy.", null, index); + } + + internal static void CheckCertificate(X509Certificate cert) + { + try + { + TbsCertificateStructure.GetInstance(cert.CertificateStructure.TbsCertificate); + } + catch (CertificateEncodingException e) + { + throw new Exception("unable to process TBSCertificate", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs.meta new file mode 100644 index 00000000..304face6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bebd79e812f23d544a0f5ca3362e7119 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs new file mode 100644 index 00000000..d416aaee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs @@ -0,0 +1,97 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /** + * An exception indicating one of a variety of problems encountered when + * validating a certification path.
    + *
    + * A CertPathValidatorException provides support for wrapping + * exceptions. The {@link #getCause getCause} method returns the throwable, + * if any, that caused this exception to be thrown.
    + *
    + * A CertPathValidatorException may also include the + * certification path that was being validated when the exception was thrown + * and the index of the certificate in the certification path that caused the + * exception to be thrown. Use the {@link #getCertPath getCertPath} and + * {@link #getIndex getIndex} methods to retrieve this information.
    + *
    + * Concurrent Access
    + *
    + * Unless otherwise specified, the methods defined in this class are not + * thread-safe. Multiple threads that need to access a single + * object concurrently should synchronize amongst themselves and + * provide the necessary locking. Multiple threads each manipulating + * separate objects need not synchronize. + * + * @see CertPathValidator + **/ + [Serializable] + public class PkixCertPathValidatorException + : GeneralSecurityException + { + protected readonly int m_index = -1; + + public PkixCertPathValidatorException() + : base() + { + } + + public PkixCertPathValidatorException(string message) + : base(message) + { + } + + public PkixCertPathValidatorException(string message, Exception innerException) + : base(message, innerException) + { + } + + /// + /// Creates a PkixCertPathValidatorException with the specified + /// detail message, cause, certification path, and index. + /// + /// the detail message (or null if none) + /// the cause (or null if none) + /// the index of the certificate in the certification path that * + public PkixCertPathValidatorException(string message, Exception innerException, int index) + : base(message, innerException) + { + if (index < -1) + throw new ArgumentException("cannot be < -1", nameof(index)); + + m_index = index; + } + + protected PkixCertPathValidatorException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + m_index = info.GetInt32("index"); + } + + public override void GetObjectData(SerializationInfo info, StreamingContext context) + { + base.GetObjectData(info, context); + info.AddValue("index", m_index); + } + + /// eturns the index of the certificate in the certification path that caused the exception to be + /// thrown. + /// + /// Note that the list of certificates in a is zero based. If no index has been set, + /// -1 is returned. + /// + /// The index that has been set, or -1 if none has been set. + public int Index + { + get { return m_index; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs.meta new file mode 100644 index 00000000..c4e02e16 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fce20941c0e68e14abb450b88df42fb0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs new file mode 100644 index 00000000..93271e92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixCertPathValidatorResult. + /// + public class PkixCertPathValidatorResult + //: ICertPathValidatorResult + { + private TrustAnchor trustAnchor; + private PkixPolicyNode policyTree; + private AsymmetricKeyParameter subjectPublicKey; + + public PkixPolicyNode PolicyTree + { + get { return this.policyTree; } + } + + public TrustAnchor TrustAnchor + { + get { return this.trustAnchor; } + } + + public AsymmetricKeyParameter SubjectPublicKey + { + get { return this.subjectPublicKey; } + } + + public PkixCertPathValidatorResult(TrustAnchor trustAnchor, PkixPolicyNode policyTree, + AsymmetricKeyParameter subjectPublicKey) + { + if (trustAnchor == null) + throw new ArgumentNullException(nameof(trustAnchor)); + if (subjectPublicKey == null) + throw new ArgumentNullException(nameof(subjectPublicKey)); + + this.trustAnchor = trustAnchor; + this.policyTree = policyTree; + this.subjectPublicKey = subjectPublicKey; + } + + public object Clone() + { + return new PkixCertPathValidatorResult(this.TrustAnchor, this.PolicyTree, this.SubjectPublicKey); + } + + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.AppendLine("PKIXCertPathValidatorResult: ["); + sb.Append(" Trust Anchor: ").Append(TrustAnchor).AppendLine(); + sb.Append(" Policy Tree: ").Append(PolicyTree).AppendLine(); + sb.Append(" Subject Public Key: ").Append(SubjectPublicKey).AppendLine(); + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs.meta new file mode 100644 index 00000000..69b581f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8adfe630e0d971145980b144b4335746 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs new file mode 100644 index 00000000..6b3cc124 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs @@ -0,0 +1,1053 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixCertPathValidatorUtilities. + /// + internal static class PkixCertPathValidatorUtilities + { + private static readonly PkixCrlUtilities CrlUtilities = new PkixCrlUtilities(); + + internal static readonly string ANY_POLICY = "2.5.29.32.0"; + + internal static readonly string CRL_NUMBER = X509Extensions.CrlNumber.Id; + + /// + /// key usage bits + /// + internal static readonly int KEY_CERT_SIGN = 5; + internal static readonly int CRL_SIGN = 6; + + //internal static readonly string[] crlReasons = new string[] + //{ + // "unspecified", + // "keyCompromise", + // "cACompromise", + // "affiliationChanged", + // "superseded", + // "cessationOfOperation", + // "certificateHold", + // "unknown", + // "removeFromCRL", + // "privilegeWithdrawn", + // "aACompromise" + //}; + + /// + /// Search the given Set of TrustAnchor's for one that is the + /// issuer of the given X509 certificate. + /// + /// the X509 certificate + /// a Set of TrustAnchor's + /// the TrustAnchor object if found or + /// null if not. + /// + /// @exception + internal static TrustAnchor FindTrustAnchor(X509Certificate cert, ISet trustAnchors) + { + var iter = trustAnchors.GetEnumerator(); + TrustAnchor trust = null; + AsymmetricKeyParameter trustPublicKey = null; + Exception invalidKeyEx = null; + + X509CertStoreSelector certSelectX509 = new X509CertStoreSelector(); + + try + { + certSelectX509.Subject = GetIssuerPrincipal(cert); + } + catch (IOException ex) + { + throw new Exception("Cannot set subject search criteria for trust anchor.", ex); + } + + while (iter.MoveNext() && trust == null) + { + trust = iter.Current; + if (trust.TrustedCert != null) + { + if (certSelectX509.Match(trust.TrustedCert)) + { + trustPublicKey = trust.TrustedCert.GetPublicKey(); + } + else + { + trust = null; + } + } + else if (trust.CAName != null && trust.CAPublicKey != null) + { + try + { + X509Name certIssuer = GetIssuerPrincipal(cert); + X509Name caName = new X509Name(trust.CAName); + + if (certIssuer.Equivalent(caName, true)) + { + trustPublicKey = trust.CAPublicKey; + } + else + { + trust = null; + } + } + catch (InvalidParameterException) + { + trust = null; + } + } + else + { + trust = null; + } + + if (trustPublicKey != null) + { + try + { + cert.Verify(trustPublicKey); + } + catch (Exception ex) + { + invalidKeyEx = ex; + trust = null; + } + } + } + + if (trust == null && invalidKeyEx != null) + { + throw new Exception("TrustAnchor found but certificate validation failed.", invalidKeyEx); + } + + return trust; + } + + internal static bool IsIssuerTrustAnchor(X509Certificate cert, ISet trustAnchors) + { + try + { + return FindTrustAnchor(cert, trustAnchors) != null; + } + catch (Exception) + { + return false; + } + } + + internal static void AddAdditionalStoresFromAltNames(X509Certificate cert, PkixParameters pkixParams) + { + // if in the IssuerAltName extension an URI + // is given, add an additinal X.509 store + var issuerAltNames = cert.GetIssuerAlternativeNames(); + if (issuerAltNames != null) + { + foreach (var list in issuerAltNames) + { + // look for URI + if (list.Count >= 2 && list[0].Equals(GeneralName.UniformResourceIdentifier)) + { + string location = (string)list[1]; + AddAdditionalStoreFromLocation(location, pkixParams); + } + } + } + } + + internal static DateTime GetValidDate(PkixParameters paramsPKIX) + { + DateTime? validDate = paramsPKIX.Date; + + if (validDate == null) + return DateTime.UtcNow; + + return validDate.Value; + } + + /// + /// Returns the issuer of an attribute certificate or certificate. + /// + /// The attribute certificate or certificate. + /// The issuer as X500Principal. + internal static X509Name GetIssuerPrincipal(object obj) + { + if (obj is X509Certificate cert) + return cert.IssuerDN; + if (obj is X509V2AttributeCertificate attrCert) + return attrCert.Issuer.GetPrincipals()[0]; + throw new InvalidOperationException(); + } + + internal static X509Name GetIssuerPrincipal(X509V2AttributeCertificate attrCert) + { + return attrCert.Issuer.GetPrincipals()[0]; + } + + internal static X509Name GetIssuerPrincipal(X509Certificate cert) + { + return cert.IssuerDN; + } + + internal static bool IsSelfIssued( + X509Certificate cert) + { + return cert.SubjectDN.Equivalent(cert.IssuerDN, true); + } + + internal static AlgorithmIdentifier GetAlgorithmIdentifier( + AsymmetricKeyParameter key) + { + try + { + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(key); + + return info.AlgorithmID; + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Subject public key cannot be decoded.", e); + } + } + + internal static bool IsAnyPolicy(ISet policySet) + { + return policySet == null || policySet.Count < 1 || policySet.Contains(ANY_POLICY); + } + + internal static void AddAdditionalStoreFromLocation( + string location, + PkixParameters pkixParams) + { + if (pkixParams.IsAdditionalLocationsEnabled) + { + try + { + if (Org.BouncyCastle.Utilities.Platform.StartsWith(location, "ldap://")) + { + // ldap://directory.d-trust.net/CN=D-TRUST + // Qualified CA 2003 1:PN,O=D-Trust GmbH,C=DE + // skip "ldap://" + location = location.Substring(7); + // after first / baseDN starts + string url;//, baseDN; + int slashPos = location.IndexOf('/'); + if (slashPos != -1) + { + url = "ldap://" + location.Substring(0, slashPos); +// baseDN = location.Substring(slashPos); + } + else + { + url = "ldap://" + location; +// baseDN = nsull; + } + + throw new NotImplementedException("LDAP cert/CRL stores"); + + // use all purpose parameters + //X509LDAPCertStoreParameters ldapParams = new X509LDAPCertStoreParameters.Builder( + // url, baseDN).build(); + //pkixParams.AddAdditionalStore(X509Store.getInstance( + // "CERTIFICATE/LDAP", ldapParams)); + //pkixParams.AddAdditionalStore(X509Store.getInstance( + // "CRL/LDAP", ldapParams)); + //pkixParams.AddAdditionalStore(X509Store.getInstance( + // "ATTRIBUTECERTIFICATE/LDAP", ldapParams)); + //pkixParams.AddAdditionalStore(X509Store.getInstance( + // "CERTIFICATEPAIR/LDAP", ldapParams)); + } + } + catch (Exception) + { + // cannot happen + throw new Exception("Exception adding X.509 stores."); + } + } + } + + private static BigInteger GetSerialNumber( + object cert) + { + if (cert is X509Certificate) + { + return ((X509Certificate)cert).SerialNumber; + } + else + { + return ((X509V2AttributeCertificate)cert).SerialNumber; + } + } + + // + // policy checking + // + + internal static ISet GetQualifierSet(Asn1Sequence qualifiers) + { + var pq = new HashSet(); + + if (qualifiers != null) + { + foreach (Asn1Encodable ae in qualifiers) + { + try + { + pq.Add(PolicyQualifierInfo.GetInstance(ae.ToAsn1Object())); + } + catch (IOException ex) + { + throw new PkixCertPathValidatorException("Policy qualifier info cannot be decoded.", ex); + } + } + } + + return pq; + } + + internal static PkixPolicyNode RemovePolicyNode(PkixPolicyNode validPolicyTree, + IList[] policyNodes, PkixPolicyNode _node) + { + PkixPolicyNode _parent = _node.Parent; + + if (validPolicyTree == null) + { + return null; + } + + if (_parent == null) + { + for (int j = 0; j < policyNodes.Length; j++) + { + policyNodes[j] = new List(); + } + + return null; + } + else + { + _parent.RemoveChild(_node); + RemovePolicyNodeRecurse(policyNodes, _node); + + return validPolicyTree; + } + } + + private static void RemovePolicyNodeRecurse(IList[] policyNodes, PkixPolicyNode _node) + { + policyNodes[_node.Depth].Remove(_node); + + if (_node.HasChildren) + { + foreach (PkixPolicyNode _child in _node.Children) + { + RemovePolicyNodeRecurse(policyNodes, _child); + } + } + } + + internal static void PrepareNextCertB1(int i, IList[] policyNodes, string id_p, + IDictionary> m_idp, X509Certificate cert) + { + foreach (var node in policyNodes[i]) + { + if (node.ValidPolicy.Equals(id_p)) + { + node.ExpectedPolicies = CollectionUtilities.GetValueOrNull(m_idp, id_p); + return; + } + } + + foreach (var node in policyNodes[i]) + { + if (ANY_POLICY.Equals(node.ValidPolicy)) + { + Asn1Sequence policies; + try + { + policies = Asn1Sequence.GetInstance( + GetExtensionValue(cert, X509Extensions.CertificatePolicies)); + } + catch (Exception e) + { + throw new Exception("Certificate policies cannot be decoded.", e); + } + + ISet pq = null; + + foreach (var policy in policies) + { + PolicyInformation pinfo; + try + { + pinfo = PolicyInformation.GetInstance(policy); + } + catch (Exception ex) + { + throw new Exception("Policy information cannot be decoded.", ex); + } + + if (ANY_POLICY.Equals(pinfo.PolicyIdentifier.Id)) + { + try + { + pq = GetQualifierSet(pinfo.PolicyQualifiers); + } + catch (PkixCertPathValidatorException ex) + { + throw new PkixCertPathValidatorException( + "Policy qualifier info set could not be built.", ex); + } + break; + } + } + + bool ci = false; + var critExtOids = cert.GetCriticalExtensionOids(); + if (critExtOids != null) + { + ci = critExtOids.Contains(X509Extensions.CertificatePolicies.Id); + } + + PkixPolicyNode p_node = node.Parent; + if (ANY_POLICY.Equals(p_node.ValidPolicy)) + { + PkixPolicyNode c_node = new PkixPolicyNode(new List(), i, + CollectionUtilities.GetValueOrNull(m_idp, id_p), p_node, pq, id_p, ci); + p_node.AddChild(c_node); + policyNodes[i].Add(c_node); + } + break; + } + } + } + + internal static PkixPolicyNode PrepareNextCertB2(int i, IList[] policyNodes, string id_p, + PkixPolicyNode validPolicyTree) + { + int pos = 0; + + // Copy to avoid RemoveAt calls interfering with enumeration + foreach (var node in new List(policyNodes[i])) + { + if (!node.ValidPolicy.Equals(id_p)) + { + ++pos; + continue; + } + + node.Parent.RemoveChild(node); + + policyNodes[i].RemoveAt(pos); + + for (int k = i - 1; k >= 0; k--) + { + var nodes = policyNodes[k]; + + for (int l = 0; l < nodes.Count; l++) + { + var node2 = nodes[l]; + if (!node2.HasChildren) + { + validPolicyTree = RemovePolicyNode(validPolicyTree, policyNodes, node2); + if (validPolicyTree == null) + break; + } + } + } + } + return validPolicyTree; + } + + internal static void GetCertStatus( + DateTime validDate, + X509Crl crl, + object cert, + CertStatus certStatus) + { + X509Crl bcCRL; + + try + { + bcCRL = new X509Crl(CertificateList.GetInstance((Asn1Sequence)Asn1Sequence.FromByteArray(crl.GetEncoded()))); + } + catch (Exception exception) + { + throw new Exception("X509Crl could not be created.", exception); + } + + X509CrlEntry crl_entry = (X509CrlEntry)bcCRL.GetRevokedCertificate(GetSerialNumber(cert)); + + if (crl_entry == null) + return; + + X509Name issuer = GetIssuerPrincipal(cert); + + if (!issuer.Equivalent(crl_entry.GetCertificateIssuer(), true) + && !issuer.Equivalent(crl.IssuerDN, true)) + { + return; + } + + int reasonCodeValue = CrlReason.Unspecified; + + if (crl_entry.HasExtensions) + { + try + { + Asn1Object extValue = GetExtensionValue(crl_entry, X509Extensions.ReasonCode); + DerEnumerated reasonCode = DerEnumerated.GetInstance(extValue); + if (null != reasonCode) + { + reasonCodeValue = reasonCode.IntValueExact; + } + } + catch (Exception e) + { + throw new Exception("Reason code CRL entry extension could not be decoded.", e); + } + } + + DateTime revocationDate = crl_entry.RevocationDate; + if (validDate.Ticks < revocationDate.Ticks) + { + switch (reasonCodeValue) + { + case CrlReason.Unspecified: + case CrlReason.KeyCompromise: + case CrlReason.CACompromise: + case CrlReason.AACompromise: + break; + default: + return; + } + } + + // (i) or (j) + certStatus.Status = reasonCodeValue; + certStatus.RevocationDate = revocationDate; + } + + /** + * Return the next working key inheriting DSA parameters if necessary. + *

    + * This methods inherits DSA parameters from the indexed certificate or + * previous certificates in the certificate chain to the returned + * PublicKey. The list is searched upwards, meaning the end + * certificate is at position 0 and previous certificates are following. + *

    + *

    + * If the indexed certificate does not contain a DSA key this method simply + * returns the public key. If the DSA key already contains DSA parameters + * the key is also only returned. + *

    + * + * @param certs The certification path. + * @param index The index of the certificate which contains the public key + * which should be extended with DSA parameters. + * @return The public key of the certificate in list position + * index extended with DSA parameters if applicable. + * @throws Exception if DSA parameters cannot be inherited. + */ + internal static AsymmetricKeyParameter GetNextWorkingKey(IList certs, int index) + { + X509Certificate cert = certs[index]; + + AsymmetricKeyParameter pubKey = cert.GetPublicKey(); + + if (!(pubKey is DsaPublicKeyParameters)) + return pubKey; + + DsaPublicKeyParameters dsaPubKey = (DsaPublicKeyParameters)pubKey; + + if (dsaPubKey.Parameters != null) + return dsaPubKey; + + for (int i = index + 1; i < certs.Count; i++) + { + X509Certificate parentCert = certs[i]; + pubKey = parentCert.GetPublicKey(); + + if (!(pubKey is DsaPublicKeyParameters)) + { + throw new PkixCertPathValidatorException( + "DSA parameters cannot be inherited from previous certificate."); + } + + DsaPublicKeyParameters prevDSAPubKey = (DsaPublicKeyParameters)pubKey; + + if (prevDSAPubKey.Parameters == null) + continue; + + DsaParameters dsaParams = prevDSAPubKey.Parameters; + + try + { + return new DsaPublicKeyParameters(dsaPubKey.Y, dsaParams); + } + catch (Exception exception) + { + throw new Exception(exception.Message); + } + } + + throw new PkixCertPathValidatorException("DSA parameters cannot be inherited from previous certificate."); + } + + internal static DateTime GetValidCertDateFromValidityModel( + PkixParameters paramsPkix, + PkixCertPath certPath, + int index) + { + if (paramsPkix.ValidityModel != PkixParameters.ChainValidityModel) + { + return GetValidDate(paramsPkix); + } + + // if end cert use given signing/encryption/... time + if (index <= 0) + { + return GetValidDate(paramsPkix); + // else use time when previous cert was created + } + + var cert = certPath.Certificates[index - 1]; + + if (index - 1 == 0) + { + Asn1GeneralizedTime dateOfCertgen; + try + { + Asn1OctetString extVal = cert.GetExtensionValue(IsisMttObjectIdentifiers.IdIsisMttATDateOfCertGen); + dateOfCertgen = Asn1GeneralizedTime.GetInstance(extVal); + } + catch (ArgumentException) + { + throw new Exception( + "Date of cert gen extension could not be read."); + } + if (dateOfCertgen != null) + { + try + { + return dateOfCertgen.ToDateTime(); + } + catch (ArgumentException e) + { + throw new Exception( + "Date from date of cert gen extension could not be parsed.", + e); + } + } + } + + return cert.NotBefore; + } + + /** + * Add the CRL issuers from the cRLIssuer field of the distribution point or + * from the certificate if not given to the issuer criterion of the + * selector. + *

    + * The issuerPrincipals are a collection with a single + * X500Principal for X509Certificates. For + * {@link X509AttributeCertificate}s the issuer may contain more than one + * X500Principal. + *

    + * + * @param dp The distribution point. + * @param issuerPrincipals The issuers of the certificate or attribute + * certificate which contains the distribution point. + * @param selector The CRL selector. + * @param pkixParams The PKIX parameters containing the cert stores. + * @throws Exception if an exception occurs while processing. + * @throws ClassCastException if issuerPrincipals does not + * contain only X500Principals. + */ + internal static void GetCrlIssuersFromDistributionPoint( + DistributionPoint dp, + ICollection issuerPrincipals, + X509CrlStoreSelector selector, + PkixParameters pkixParams) + { + var issuers = new List(); + // indirect CRL + if (dp.CrlIssuer != null) + { + GeneralName[] genNames = dp.CrlIssuer.GetNames(); + // look for a DN + for (int j = 0; j < genNames.Length; j++) + { + if (genNames[j].TagNo == GeneralName.DirectoryName) + { + try + { + issuers.Add(X509Name.GetInstance(genNames[j].Name.ToAsn1Object())); + } + catch (IOException e) + { + throw new Exception("CRL issuer information from distribution point cannot be decoded.", e); + } + } + } + } + else + { + /* + * certificate issuer is CRL issuer, distributionPoint field MUST be + * present. + */ + if (dp.DistributionPointName == null) + { + throw new Exception( + "CRL issuer is omitted from distribution point but no distributionPoint field present."); + } + + // add and check issuer principals + issuers.AddRange(issuerPrincipals); + } + // TODO: is not found although this should correctly add the rel name. selector of Sun is buggy here or PKI test case is invalid + // distributionPoint + // if (dp.getDistributionPoint() != null) + // { + // // look for nameRelativeToCRLIssuer + // if (dp.getDistributionPoint().getType() == DistributionPointName.NAME_RELATIVE_TO_CRL_ISSUER) + // { + // // append fragment to issuer, only one + // // issuer can be there, if this is given + // if (issuers.size() != 1) + // { + // throw new AnnotatedException( + // "nameRelativeToCRLIssuer field is given but more than one CRL issuer is given."); + // } + // DEREncodable relName = dp.getDistributionPoint().getName(); + // Iterator it = issuers.iterator(); + // List issuersTemp = new ArrayList(issuers.size()); + // while (it.hasNext()) + // { + // Enumeration e = null; + // try + // { + // e = ASN1Sequence.getInstance( + // new ASN1InputStream(((X500Principal) it.next()) + // .getEncoded()).readObject()).getObjects(); + // } + // catch (IOException ex) + // { + // throw new AnnotatedException( + // "Cannot decode CRL issuer information.", ex); + // } + // ASN1EncodableVector v = new ASN1EncodableVector(); + // while (e.hasMoreElements()) + // { + // v.add((DEREncodable) e.nextElement()); + // } + // v.add(relName); + // issuersTemp.add(new X500Principal(new DERSequence(v) + // .getDEREncoded())); + // } + // issuers.clear(); + // issuers.addAll(issuersTemp); + // } + // } + + selector.Issuers = issuers; + } + + /** + * Fetches complete CRLs according to RFC 3280. + * + * @param dp The distribution point for which the complete CRL + * @param cert The X509Certificate or + * {@link org.bouncycastle.x509.X509AttributeCertificate} for + * which the CRL should be searched. + * @param currentDate The date for which the delta CRLs must be valid. + * @param paramsPKIX The extended PKIX parameters. + * @return A Set of X509CRLs with complete + * CRLs. + * @throws Exception if an exception occurs while picking the CRLs + * or no CRLs are found. + */ + internal static ISet GetCompleteCrls(DistributionPoint dp, object certObj, DateTime currentDate, + PkixParameters paramsPKIX) + { + var certObjIssuer = GetIssuerPrincipal(certObj); + + X509CrlStoreSelector crlselect = new X509CrlStoreSelector(); + try + { + var issuers = new HashSet(); + issuers.Add(certObjIssuer); + + GetCrlIssuersFromDistributionPoint(dp, issuers, crlselect, paramsPKIX); + } + catch (Exception e) + { + throw new Exception("Could not get issuer information from distribution point.", e); + } + + { + if (certObj is X509Certificate cert) + { + crlselect.CertificateChecking = cert; + } + else if (certObj is X509V2AttributeCertificate attrCert) + { + crlselect.AttrCertChecking = attrCert; + } + } + + crlselect.CompleteCrlEnabled = true; + + ISet crls = CrlUtilities.FindCrls(crlselect, paramsPKIX, currentDate); + if (crls.Count < 1) + throw new Exception("No CRLs found for issuer \"" + certObjIssuer + "\""); + + return crls; + } + + /** + * Fetches delta CRLs according to RFC 3280 section 5.2.4. + * + * @param currentDate The date for which the delta CRLs must be valid. + * @param paramsPKIX The extended PKIX parameters. + * @param completeCRL The complete CRL the delta CRL is for. + * @return A Set of X509CRLs with delta CRLs. + * @throws Exception if an exception occurs while picking the delta + * CRLs. + */ + internal static ISet GetDeltaCrls( + DateTime currentDate, + PkixParameters paramsPKIX, + X509Crl completeCRL) + { + X509CrlStoreSelector deltaSelect = new X509CrlStoreSelector(); + + // 5.2.4 (a) + try + { + var deltaSelectIssuer = new List(); + deltaSelectIssuer.Add(completeCRL.IssuerDN); + deltaSelect.Issuers = deltaSelectIssuer; + } + catch (IOException e) + { + throw new Exception("Cannot extract issuer from CRL.", e); + } + + BigInteger completeCRLNumber = null; + try + { + Asn1Object asn1Object = GetExtensionValue(completeCRL, X509Extensions.CrlNumber); + if (asn1Object != null) + { + completeCRLNumber = CrlNumber.GetInstance(asn1Object).PositiveValue; + } + } + catch (Exception e) + { + throw new Exception( + "CRL number extension could not be extracted from CRL.", e); + } + + // 5.2.4 (b) + byte[] idp = null; + + try + { + Asn1Object obj = GetExtensionValue(completeCRL, X509Extensions.IssuingDistributionPoint); + if (obj != null) + { + idp = obj.GetDerEncoded(); + } + } + catch (Exception e) + { + throw new Exception( + "Issuing distribution point extension value could not be read.", + e); + } + + // 5.2.4 (d) + + deltaSelect.MinCrlNumber = (completeCRLNumber == null) + ? null + : completeCRLNumber.Add(BigInteger.One); + + deltaSelect.IssuingDistributionPoint = idp; + deltaSelect.IssuingDistributionPointEnabled = true; + + // 5.2.4 (c) + deltaSelect.MaxBaseCrlNumber = completeCRLNumber; + + // find delta CRLs + ISet temp = CrlUtilities.FindCrls(deltaSelect, paramsPKIX, currentDate); + + var result = new HashSet(); + + foreach (X509Crl crl in temp) + { + if (IsDeltaCrl(crl)) + { + result.Add(crl); + } + } + + return result; + } + + private static bool IsDeltaCrl(X509Crl crl) + { + var critical = crl.GetCriticalExtensionOids(); + + return critical.Contains(X509Extensions.DeltaCrlIndicator.Id); + } + + internal static void AddAdditionalStoresFromCrlDistributionPoint( + CrlDistPoint crldp, + PkixParameters pkixParams) + { + if (crldp != null) + { + DistributionPoint[] dps = null; + try + { + dps = crldp.GetDistributionPoints(); + } + catch (Exception e) + { + throw new Exception( + "Distribution points could not be read.", e); + } + for (int i = 0; i < dps.Length; i++) + { + DistributionPointName dpn = dps[i].DistributionPointName; + // look for URIs in fullName + if (dpn != null) + { + if (dpn.PointType == DistributionPointName.FullName) + { + GeneralName[] genNames = GeneralNames.GetInstance( + dpn.Name).GetNames(); + // look for an URI + for (int j = 0; j < genNames.Length; j++) + { + if (genNames[j].TagNo == GeneralName.UniformResourceIdentifier) + { + string location = DerIA5String.GetInstance(genNames[j].Name).GetString(); + AddAdditionalStoreFromLocation(location, pkixParams); + } + } + } + } + } + } + } + + internal static bool ProcessCertD1i(int index, IList[] policyNodes, DerObjectIdentifier pOid, + ISet pq) + { + foreach (var node in policyNodes[index - 1]) + { + if (node.ExpectedPolicies.Contains(pOid.Id)) + { + var childExpectedPolicies = new HashSet(); + childExpectedPolicies.Add(pOid.Id); + + var child = new PkixPolicyNode(new List(), index, childExpectedPolicies, node, pq, + pOid.Id, false); + node.AddChild(child); + policyNodes[index].Add(child); + + return true; + } + } + + return false; + } + + internal static void ProcessCertD1ii(int index, IList[] policyNodes, + DerObjectIdentifier _poid, ISet _pq) + { + foreach (var _node in policyNodes[index - 1]) + { + if (ANY_POLICY.Equals(_node.ValidPolicy)) + { + var _childExpectedPolicies = new HashSet(); + _childExpectedPolicies.Add(_poid.Id); + + var _child = new PkixPolicyNode(new List(), index, _childExpectedPolicies, _node, + _pq, _poid.Id, false); + _node.AddChild(_child); + policyNodes[index].Add(_child); + + return; + } + } + } + + /** + * Find the issuer certificates of a given certificate. + * + * @param cert + * The certificate for which an issuer should be found. + * @param pkixParams + * @return A Collection object containing the issuer + * X509Certificates. Never null. + * + * @exception Exception + * if an error occurs. + */ + internal static HashSet FindIssuerCerts( + X509Certificate cert, + PkixBuilderParameters pkixParams) + { + X509CertStoreSelector certSelector = new X509CertStoreSelector(); + try + { + certSelector.Subject = cert.IssuerDN; + } + catch (IOException ex) + { + throw new Exception( + "Subject criteria for certificate selector to find issuer certificate could not be set.", ex); + } + + var certs = new HashSet(); + try + { + CollectionUtilities.CollectMatches(certs, certSelector, pkixParams.GetStoresCert()); + } + catch (Exception e) + { + throw new Exception("Issuer certificate cannot be searched.", e); + } + + return certs; + } + + internal static Asn1Object GetExtensionValue(IX509Extension extensions, DerObjectIdentifier oid) + { + return X509ExtensionUtilities.FromExtensionValue(extensions, oid); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs.meta new file mode 100644 index 00000000..6af7b20f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cf17f7db98be2e349b83a484c744b396 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCertPathValidatorUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs new file mode 100644 index 00000000..c88b9123 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs @@ -0,0 +1,109 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public class PkixCrlUtilities + { + public virtual ISet FindCrls(X509CrlStoreSelector crlSelector, PkixParameters paramsPkix, + DateTime currentDate) + { + HashSet initialSet; + + // get complete CRL(s) + try + { + initialSet = FindCrls(crlSelector, paramsPkix.GetStoresCrl()); + } + catch (Exception e) + { + throw new Exception("Exception obtaining complete CRLs.", e); + } + + var finalSet = new HashSet(); + DateTime validityDate = currentDate; + + if (paramsPkix.Date != null) + { + validityDate = paramsPkix.Date.Value; + } + + // based on RFC 5280 6.3.3 + foreach (X509Crl crl in initialSet) + { + DateTime? nextUpdate = crl.NextUpdate; + + if (null == nextUpdate || nextUpdate.Value.CompareTo(validityDate) > 0) + { + X509Certificate cert = crlSelector.CertificateChecking; + + if (null == cert || crl.ThisUpdate.CompareTo(cert.NotAfter) < 0) + { + finalSet.Add(crl); + } + } + } + + return finalSet; + } + + public virtual ISet FindCrls(X509CrlStoreSelector crlSelector, PkixParameters paramsPkix) + { + // get complete CRL(s) + try + { + return FindCrls(crlSelector, paramsPkix.GetStoresCrl()); + } + catch (Exception e) + { + throw new Exception("Exception obtaining complete CRLs.", e); + } + } + + /// + /// crl checking + /// Return a Collection of all CRLs found in the X509Store's that are + /// matching the crlSelect criteriums. + /// + /// a {@link X509CRLStoreSelector} object that will be used + /// to select the CRLs + /// a List containing only {@link org.bouncycastle.x509.X509Store + /// X509Store} objects. These are used to search for CRLs + /// a Collection of all found {@link X509CRL X509CRL} objects. May be + /// empty but never null. + /// + private HashSet FindCrls(ISelector crlSelector, IList> crlStores) + { + var crls = new HashSet(); + + Exception lastException = null; + bool foundValidStore = false; + + foreach (var crlStore in crlStores) + { + try + { + crls.UnionWith(crlStore.EnumerateMatches(crlSelector)); + foundValidStore = true; + } + catch (Exception e) + { + lastException = new Exception("Exception searching in X.509 CRL store.", e); + } + } + + if (!foundValidStore && lastException != null) + throw lastException; + + return crls; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs.meta new file mode 100644 index 00000000..7ab5f8b1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 705617dc309d56849bd38c50db2b18fc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixCrlUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs new file mode 100644 index 00000000..513b8a23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs @@ -0,0 +1,1860 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X500.Style; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + public class PkixNameConstraintValidator + { + private static readonly DerObjectIdentifier SerialNumberOid = X509Name.SerialNumber; + + private ISet excludedSubtreesDN = new HashSet(); + + private ISet excludedSubtreesDns = new HashSet(); + + private ISet excludedSubtreesEmail = new HashSet(); + + private ISet excludedSubtreesUri = new HashSet(); + + private ISet excludedSubtreesIP = new HashSet(); + + private ISet excludedSubtreesOtherName = new HashSet(); + + private ISet permittedSubtreesDN; + + private ISet permittedSubtreesDns; + + private ISet permittedSubtreesEmail; + + private ISet permittedSubtreesUri; + + private ISet permittedSubtreesIP; + + private ISet permittedSubtreesOtherName; + + public PkixNameConstraintValidator() + { + } + + private static bool WithinDNSubtree( + Asn1Sequence dns, + Asn1Sequence subtree) + { + if (subtree.Count < 1 || subtree.Count > dns.Count) + return false; + + int start = 0; + Rdn subtreeRdnStart = Rdn.GetInstance(subtree[0]); + for (int j = 0; j < dns.Count; j++) + { + start = j; + Rdn dnsRdn = Rdn.GetInstance(dns[j]); + if (IetfUtilities.RdnAreEqual(subtreeRdnStart, dnsRdn)) + break; + } + + if (subtree.Count > dns.Count - start) + return false; + + for (int j = 0; j < subtree.Count; ++j) + { + // both subtree and dns are a ASN.1 Name and the elements are a RDN + Rdn subtreeRdn = Rdn.GetInstance(subtree[j]); + Rdn dnsRdn = Rdn.GetInstance(dns[start + j]); + + // check if types and values of all naming attributes are matching, other types which are not restricted are allowed, see https://tools.ietf.org/html/rfc5280#section-7.1 + + // Two relative distinguished names + // RDN1 and RDN2 match if they have the same number of naming attributes + // and for each naming attribute in RDN1 there is a matching naming attribute in RDN2. + // NOTE: this is checking the attributes in the same order, which might be not necessary, if this is a problem also IETFUtils.rDNAreEqual mus tbe changed. + // use new RFC 5280 comparison, NOTE: this is now different from with RFC 3280, where only binary comparison is used + // obey RFC 5280 7.1 + // special treatment of serialNumber for GSMA SGP.22 RSP specification + if (subtreeRdn.Count == 1 && dnsRdn.Count == 1 + && subtreeRdn.GetFirst().GetType().Equals(SerialNumberOid) + && dnsRdn.GetFirst().GetType().Equals(SerialNumberOid)) + { + if (!Org.BouncyCastle.Utilities.Platform.StartsWith(dnsRdn.GetFirst().Value.ToString(), subtreeRdn.GetFirst().Value.ToString())) + return false; + } + else if (!IetfUtilities.RdnAreEqual(subtreeRdn, dnsRdn)) + { + return false; + } + } + + return true; + } + + public void CheckPermittedDN(Asn1Sequence dn) + { + CheckPermittedDirectory(permittedSubtreesDN, dn); + } + + public void CheckExcludedDN(Asn1Sequence dn) + { + CheckExcludedDirectory(excludedSubtreesDN, dn); + } + + private ISet IntersectDN(ISet permitted, ISet dns) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree1 in dns) + { + Asn1Sequence dn1 = Asn1Sequence.GetInstance(subtree1.Base.Name); + if (permitted == null) + { + if (dn1 != null) + { + intersect.Add(dn1); + } + } + else + { + foreach (var dn2 in permitted) + { + if (WithinDNSubtree(dn1, dn2)) + { + intersect.Add(dn1); + } + else if (WithinDNSubtree(dn2, dn1)) + { + intersect.Add(dn2); + } + } + } + } + return intersect; + } + + private ISet UnionDN(ISet excluded, Asn1Sequence dn) + { + if (excluded.Count < 1) + { + if (dn == null) + return excluded; + + excluded.Add(dn); + return excluded; + } + + var union = new HashSet(); + + foreach (var subtree in excluded) + { + if (WithinDNSubtree(dn, subtree)) + { + union.Add(subtree); + } + else if (WithinDNSubtree(subtree, dn)) + { + union.Add(dn); + } + else + { + union.Add(subtree); + union.Add(dn); + } + } + + return union; + } + + private ISet IntersectOtherName(ISet permitted, ISet otherNames) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree1 in otherNames) + { + OtherName otherName1 = OtherName.GetInstance(subtree1.Base.Name); + if (otherName1 == null) + continue; + + if (permitted == null) + { + intersect.Add(otherName1); + } + else + { + foreach (OtherName otherName2 in permitted) + { + IntersectOtherName(otherName1, otherName2, intersect); + } + } + } + return intersect; + } + + private void IntersectOtherName(OtherName otherName1, OtherName otherName2, ISet intersect) + { + if (otherName1.Equals(otherName2)) + { + intersect.Add(otherName1); + } + } + + private ISet UnionOtherName(ISet permitted, OtherName otherName) + { + var union = permitted != null ? new HashSet(permitted) : new HashSet(); + union.Add(otherName); + return union; + } + + private ISet IntersectEmail(ISet permitted, ISet emails) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree1 in emails) + { + string email = ExtractNameAsString(subtree1.Base); + + if (permitted == null) + { + if (email != null) + { + intersect.Add(email); + } + } + else + { + foreach (string _permitted in permitted) + { + IntersectEmail(email, _permitted, intersect); + } + } + } + return intersect; + } + + private ISet UnionEmail(ISet excluded, string email) + { + if (excluded.Count < 1) + { + if (email == null) + return excluded; + + excluded.Add(email); + return excluded; + } + + var union = new HashSet(); + foreach (string _excluded in excluded) + { + UnionEmail(_excluded, email, union); + } + return union; + } + + /** + * Returns the intersection of the permitted IP ranges in + * permitted with ip. + * + * @param permitted A Set of permitted IP addresses with + * their subnet mask as byte arrays. + * @param ips The IP address with its subnet mask. + * @return The Set of permitted IP ranges intersected with + * ip. + */ + private ISet IntersectIP(ISet permitted, ISet ips) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree in ips) + { + byte[] ip = Asn1OctetString.GetInstance(subtree.Base.Name).GetOctets(); + if (permitted == null) + { + if (ip != null) + { + intersect.Add(ip); + } + } + else + { + foreach (byte[] _permitted in permitted) + { + intersect.UnionWith(IntersectIPRange(_permitted, ip)); + } + } + } + return intersect; + } + + /** + * Returns the union of the excluded IP ranges in excluded + * with ip. + * + * @param excluded A Set of excluded IP addresses with their + * subnet mask as byte arrays. + * @param ip The IP address with its subnet mask. + * @return The Set of excluded IP ranges unified with + * ip as byte arrays. + */ + private ISet UnionIP(ISet excluded, byte[] ip) + { + if (excluded.Count < 1) + { + if (ip == null) + return excluded; + + excluded.Add(ip); + return excluded; + } + + var union = new HashSet(); + foreach (byte[] _excluded in excluded) + { + union.UnionWith(UnionIPRange(_excluded, ip)); + } + return union; + } + + /** + * Calculates the union if two IP ranges. + * + * @param ipWithSubmask1 The first IP address with its subnet mask. + * @param ipWithSubmask2 The second IP address with its subnet mask. + * @return A Set with the union of both addresses. + */ + private ISet UnionIPRange(byte[] ipWithSubmask1, byte[] ipWithSubmask2) + { + var set = new HashSet(); + // difficult, adding always all IPs is not wrong + if (Arrays.AreEqual(ipWithSubmask1, ipWithSubmask2)) + { + set.Add(ipWithSubmask1); + } + else + { + set.Add(ipWithSubmask1); + set.Add(ipWithSubmask2); + } + return set; + } + + /** + * Calculates the interesction if two IP ranges. + * + * @param ipWithSubmask1 The first IP address with its subnet mask. + * @param ipWithSubmask2 The second IP address with its subnet mask. + * @return A Set with the single IP address with its subnet + * mask as a byte array or an empty Set. + */ + private ISet IntersectIPRange(byte[] ipWithSubmask1, byte[] ipWithSubmask2) + { + if (ipWithSubmask1.Length != ipWithSubmask2.Length) + { + //Collections.EMPTY_SET; + return new HashSet(); + } + + byte[][] temp = ExtractIPsAndSubnetMasks(ipWithSubmask1, ipWithSubmask2); + byte[] ip1 = temp[0]; + byte[] subnetmask1 = temp[1]; + byte[] ip2 = temp[2]; + byte[] subnetmask2 = temp[3]; + + byte[][] minMax = MinMaxIPs(ip1, subnetmask1, ip2, subnetmask2); + byte[] min; + byte[] max; + max = Min(minMax[1], minMax[3]); + min = Max(minMax[0], minMax[2]); + + // minimum IP address must be bigger than max + if (CompareTo(min, max) == 1) + { + //return Collections.EMPTY_SET; + return new HashSet(); + } + // OR keeps all significant bits + byte[] ip = Or(minMax[0], minMax[2]); + byte[] subnetmask = Or(subnetmask1, subnetmask2); + + //return new HashSet( ICollectionsingleton(IpWithSubnetMask(ip, subnetmask)); + var hs = new HashSet(); + hs.Add(IpWithSubnetMask(ip, subnetmask)); + + return hs; + } + + /** + * Concatenates the IP address with its subnet mask. + * + * @param ip The IP address. + * @param subnetMask Its subnet mask. + * @return The concatenated IP address with its subnet mask. + */ + private byte[] IpWithSubnetMask(byte[] ip, byte[] subnetMask) + { + int ipLength = ip.Length; + byte[] temp = new byte[ipLength * 2]; + Array.Copy(ip, 0, temp, 0, ipLength); + Array.Copy(subnetMask, 0, temp, ipLength, ipLength); + return temp; + } + + /** + * Splits the IP addresses and their subnet mask. + * + * @param ipWithSubmask1 The first IP address with the subnet mask. + * @param ipWithSubmask2 The second IP address with the subnet mask. + * @return An array with two elements. Each element contains the IP address + * and the subnet mask in this order. + */ + private byte[][] ExtractIPsAndSubnetMasks( + byte[] ipWithSubmask1, + byte[] ipWithSubmask2) + { + int ipLength = ipWithSubmask1.Length / 2; + byte[] ip1 = new byte[ipLength]; + byte[] subnetmask1 = new byte[ipLength]; + Array.Copy(ipWithSubmask1, 0, ip1, 0, ipLength); + Array.Copy(ipWithSubmask1, ipLength, subnetmask1, 0, ipLength); + + byte[] ip2 = new byte[ipLength]; + byte[] subnetmask2 = new byte[ipLength]; + Array.Copy(ipWithSubmask2, 0, ip2, 0, ipLength); + Array.Copy(ipWithSubmask2, ipLength, subnetmask2, 0, ipLength); + return new byte[][]{ ip1, subnetmask1, ip2, subnetmask2 }; + } + + /** + * Based on the two IP addresses and their subnet masks the IP range is + * computed for each IP address - subnet mask pair and returned as the + * minimum IP address and the maximum address of the range. + * + * @param ip1 The first IP address. + * @param subnetmask1 The subnet mask of the first IP address. + * @param ip2 The second IP address. + * @param subnetmask2 The subnet mask of the second IP address. + * @return A array with two elements. The first/second element contains the + * min and max IP address of the first/second IP address and its + * subnet mask. + */ + private byte[][] MinMaxIPs( + byte[] ip1, + byte[] subnetmask1, + byte[] ip2, + byte[] subnetmask2) + { + int ipLength = ip1.Length; + byte[] min1 = new byte[ipLength]; + byte[] max1 = new byte[ipLength]; + + byte[] min2 = new byte[ipLength]; + byte[] max2 = new byte[ipLength]; + + for (int i = 0; i < ipLength; i++) + { + min1[i] = (byte)(ip1[i] & subnetmask1[i]); + max1[i] = (byte)(ip1[i] & subnetmask1[i] | ~subnetmask1[i]); + + min2[i] = (byte)(ip2[i] & subnetmask2[i]); + max2[i] = (byte)(ip2[i] & subnetmask2[i] | ~subnetmask2[i]); + } + + return new byte[][]{ min1, max1, min2, max2 }; + } + + private bool IsOtherNameConstrained(OtherName constraint, OtherName otherName) + { + return constraint.Equals(otherName); + } + + private bool IsOtherNameConstrained(ISet constraints, OtherName otherName) + { + foreach (OtherName constraint in constraints) + { + if (IsOtherNameConstrained(constraint, otherName)) + return true; + } + + return false; + } + + private void CheckPermittedOtherName(ISet permitted, OtherName name) + { + if (permitted != null && !IsOtherNameConstrained(permitted, name)) + throw new PkixNameConstraintValidatorException("Subject OtherName is not from a permitted subtree."); + } + + private void CheckExcludedOtherName(ISet excluded, OtherName name) + { + if (IsOtherNameConstrained(excluded, name)) + throw new PkixNameConstraintValidatorException("OtherName is from an excluded subtree."); + } + + private bool IsEmailConstrained(string constraint, string email) + { + string sub = email.Substring(email.IndexOf('@') + 1); + // a particular mailbox + if (constraint.IndexOf('@') != -1) + { + if (string.Equals(email, constraint, StringComparison.OrdinalIgnoreCase)) + return true; + } + // on particular host + else if (constraint[0] != '.') + { + if (string.Equals(sub, constraint, StringComparison.OrdinalIgnoreCase)) + return true; + } + // address in sub domain + else if (WithinDomain(sub, constraint)) + { + return true; + } + return false; + } + + private bool IsEmailConstrained(ISet constraints, string email) + { + foreach (string constraint in constraints) + { + if (IsEmailConstrained(constraint, email)) + return true; + } + + return false; + } + + private void CheckPermittedEmail(ISet permitted, string email) + { + if (permitted != null + && !(email.Length == 0 && permitted.Count < 1) + && !IsEmailConstrained(permitted, email)) + { + throw new PkixNameConstraintValidatorException( + "Subject email address is not from a permitted subtree."); + } + } + + private void CheckExcludedEmail(ISet excluded, string email) + { + if (IsEmailConstrained(excluded, email)) + throw new PkixNameConstraintValidatorException("Email address is from an excluded subtree."); + } + + private bool IsDnsConstrained(string constraint, string dns) + { + return WithinDomain(dns, constraint) || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(dns, constraint); + } + + private bool IsDnsConstrained(ISet constraints, string dns) + { + foreach (var constraint in constraints) + { + if (IsDnsConstrained(constraint, dns)) + return true; + } + + return false; + } + + private void CheckPermittedDns(ISet permitted, string dns) + { + if (permitted != null + && !(dns.Length == 0 && permitted.Count < 1) + && !IsDnsConstrained(permitted, dns)) + { + throw new PkixNameConstraintValidatorException("DNS is not from a permitted subtree."); + } + } + + private void CheckExcludedDns(ISet excluded, string dns) + { + if (IsDnsConstrained(excluded, dns)) + throw new PkixNameConstraintValidatorException("DNS is from an excluded subtree."); + } + + private bool IsDirectoryConstrained(ISet constraints, Asn1Sequence directory) + { + foreach (var constraint in constraints) + { + if (WithinDNSubtree(directory, constraint)) + return true; + } + + return false; + } + + private void CheckPermittedDirectory(ISet permitted, Asn1Sequence directory) + { + if (permitted != null + && !(directory.Count == 0 && permitted.Count < 1) + && !IsDirectoryConstrained(permitted, directory)) + { + throw new PkixNameConstraintValidatorException( + "Subject distinguished name is not from a permitted subtree"); + } + } + + private void CheckExcludedDirectory(ISet excluded, Asn1Sequence directory) + { + if (IsDirectoryConstrained(excluded, directory)) + { + throw new PkixNameConstraintValidatorException( + "Subject distinguished name is from an excluded subtree"); + } + } + + private bool IsUriConstrained(string constraint, string uri) + { + string host = ExtractHostFromURL(uri); + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(constraint, ".")) + { + // in sub domain or domain + return WithinDomain(host, constraint); + } + + // a host + return Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(host, constraint); + } + + private bool IsUriConstrained(ISet constraints, string uri) + { + foreach (string constraint in constraints) + { + if (IsUriConstrained(constraint, uri)) + return true; + } + + return false; + } + + private void CheckPermittedUri(ISet permitted, string uri) + { + if (permitted != null + && !(uri.Length == 0 && permitted.Count < 1) + && !IsUriConstrained(permitted, uri)) + { + throw new PkixNameConstraintValidatorException("URI is not from a permitted subtree."); + } + } + + private void CheckExcludedUri(ISet excluded, string uri) + { + if (IsUriConstrained(excluded, uri)) + throw new PkixNameConstraintValidatorException("URI is from an excluded subtree."); + } + + /** + * Checks if the IP address ip is constrained by + * constraint. + * + * @param constraint The constraint. This is an IP address concatenated with + * its subnetmask. + * @param ip The IP address. + * @return true if constrained, false + * otherwise. + */ + private bool IsIPConstrained(byte[] constraint, byte[] ip) + { + int ipLength = ip.Length; + if (ipLength != (constraint.Length / 2)) + return false; + + byte[] subnetMask = new byte[ipLength]; + Array.Copy(constraint, ipLength, subnetMask, 0, ipLength); + + byte[] permittedSubnetAddress = new byte[ipLength]; + + byte[] ipSubnetAddress = new byte[ipLength]; + + // the resulting IP address by applying the subnet mask + for (int i = 0; i < ipLength; i++) + { + permittedSubnetAddress[i] = (byte)(constraint[i] & subnetMask[i]); + ipSubnetAddress[i] = (byte)(ip[i] & subnetMask[i]); + } + + return Arrays.AreEqual(permittedSubnetAddress, ipSubnetAddress); + } + + private bool IsIPConstrained(ISet constraints, byte[] ip) + { + foreach (byte[] constraint in constraints) + { + if (IsIPConstrained(constraint, ip)) + return true; + } + + return false; + } + + /** + * Checks if the IP ip is included in the permitted ISet + * permitted. + * + * @param permitted A Set of permitted IP addresses with + * their subnet mask as byte arrays. + * @param ip The IP address. + * @throws PkixNameConstraintValidatorException + * if the IP is not permitted. + */ + private void CheckPermittedIP(ISet permitted, byte[] ip) + { + if (permitted != null + && !(ip.Length == 0 && permitted.Count < 1) + && !IsIPConstrained(permitted, ip)) + { + throw new PkixNameConstraintValidatorException("IP is not from a permitted subtree."); + } + } + + /** + * Checks if the IP ip is included in the excluded ISet + * excluded. + * + * @param excluded A Set of excluded IP addresses with their + * subnet mask as byte arrays. + * @param ip The IP address. + * @throws PkixNameConstraintValidatorException + * if the IP is excluded. + */ + private void CheckExcludedIP(ISet excluded, byte[] ip) + { + if (IsIPConstrained(excluded, ip)) + throw new PkixNameConstraintValidatorException("IP is from an excluded subtree."); + } + + private bool WithinDomain(string testDomain, string domain) + { + string tempDomain = domain; + if (Org.BouncyCastle.Utilities.Platform.StartsWith(tempDomain, ".")) + { + tempDomain = tempDomain.Substring(1); + } + + string[] domainParts = tempDomain.Split('.'); // Strings.split(tempDomain, '.'); + string[] testDomainParts = testDomain.Split('.'); // Strings.split(testDomain, '.'); + + // must have at least one subdomain + if (testDomainParts.Length <= domainParts.Length) + return false; + + int d = testDomainParts.Length - domainParts.Length; + for (int i = -1; i < domainParts.Length; i++) + { + if (i == -1) + { + if (testDomainParts[i + d].Length < 1) + { + return false; + } + } + else if (!Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(testDomainParts[i + d], domainParts[i])) + { + return false; + } + } + return true; + } + + /** + * The common part of email1 and email2 is + * added to the union union. If email1 and + * email2 have nothing in common they are added both. + * + * @param email1 Email address constraint 1. + * @param email2 Email address constraint 2. + * @param union The union. + */ + private void UnionEmail(string email1, string email2, ISet union) + { + // email1 is a particular address + if (email1.IndexOf('@') != -1) + { + string _sub = email1.Substring(email1.IndexOf('@') + 1); + // both are a particular mailbox + if (email2.IndexOf('@') != -1) + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(_sub, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + } + // email1 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email1, ".")) + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (WithinDomain(_sub, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2) || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email2); + } + else if (WithinDomain(email2, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + else + { + if (WithinDomain(email2, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + } + // email specifies a host + else + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + } + } + + private void UnionUri(string email1, string email2, ISet union) + { + // email1 is a particular address + if (email1.IndexOf('@') != -1) + { + string _sub = email1.Substring(email1.IndexOf('@') + 1); + // both are a particular mailbox + if (email2.IndexOf('@') != -1) + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(_sub, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + + } + } + } + // email1 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email1, ".")) + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (WithinDomain(_sub, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2) || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email2); + } + else if (WithinDomain(email2, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + else + { + if (WithinDomain(email2, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + } + // email specifies a host + else + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email1)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2)) + { + union.Add(email2); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + union.Add(email1); + } + else + { + union.Add(email1); + union.Add(email2); + } + } + } + } + + private ISet IntersectDns(ISet permitted, ISet dnss) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree in dnss) + { + string dns = ExtractNameAsString(subtree.Base); + if (permitted == null) + { + if (dns != null) + { + intersect.Add(dns); + } + } + else + { + foreach (string _permitted in permitted) + { + if (WithinDomain(_permitted, dns)) + { + intersect.Add(_permitted); + } + else if (WithinDomain(dns, _permitted)) + { + intersect.Add(dns); + } + } + } + } + return intersect; + } + + private ISet UnionDns(ISet excluded, string dns) + { + if (excluded.Count < 1) + { + if (dns == null) + return excluded; + + excluded.Add(dns); + return excluded; + } + + var union = new HashSet(); + foreach (string _excluded in excluded) + { + if (WithinDomain(_excluded, dns)) + { + union.Add(dns); + } + else if (WithinDomain(dns, _excluded)) + { + union.Add(_excluded); + } + else + { + union.Add(_excluded); + union.Add(dns); + } + } + return union; + } + + /** + * The most restricting part from email1 and + * email2 is added to the intersection intersect. + * + * @param email1 Email address constraint 1. + * @param email2 Email address constraint 2. + * @param intersect The intersection. + */ + private void IntersectEmail(string email1, string email2, ISet intersect) + { + // email1 is a particular address + if (email1.IndexOf('@') != -1) + { + string _sub = email1.Substring(email1.IndexOf('@') + 1); + // both are a particular mailbox + if (email2.IndexOf('@') != -1) + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(_sub, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email2)) + { + intersect.Add(email1); + } + } + } + // email specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email1, ".")) + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (WithinDomain(_sub, email1)) + { + intersect.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2) || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + else if (WithinDomain(email2, email1)) + { + intersect.Add(email2); + } + } + else + { + if (WithinDomain(email2, email1)) + { + intersect.Add(email2); + } + } + } + // email1 specifies a host + else + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email2.IndexOf('@') + 1); + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email1)) + { + intersect.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + } + } + } + + private ISet IntersectUri(ISet permitted, ISet uris) + { + var intersect = new HashSet(); + foreach (GeneralSubtree subtree in uris) + { + string uri = ExtractNameAsString(subtree.Base); + if (permitted == null) + { + if (uri != null) + { + intersect.Add(uri); + } + } + else + { + foreach (string _permitted in permitted) + { + IntersectUri(_permitted, uri, intersect); + } + } + } + return intersect; + } + + private ISet UnionUri(ISet excluded, string uri) + { + if (excluded.Count < 1) + { + if (uri == null) + return excluded; + + excluded.Add(uri); + return excluded; + } + + var union = new HashSet(); + foreach (string _excluded in excluded) + { + UnionUri(_excluded, uri, union); + } + return union; + } + + private void IntersectUri(string email1, string email2, ISet intersect) + { + // email1 is a particular address + if (email1.IndexOf('@') != -1) + { + string _sub = email1.Substring(email1.IndexOf('@') + 1); + // both are a particular mailbox + if (email2.IndexOf('@') != -1) + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(_sub, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email2)) + { + intersect.Add(email1); + } + } + } + // email specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email1, ".")) + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email1.IndexOf('@') + 1); + if (WithinDomain(_sub, email1)) + { + intersect.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2) || Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + else if (WithinDomain(email2, email1)) + { + intersect.Add(email2); + } + } + else + { + if (WithinDomain(email2, email1)) + { + intersect.Add(email2); + } + } + } + // email1 specifies a host + else + { + if (email2.IndexOf('@') != -1) + { + string _sub = email2.Substring(email2.IndexOf('@') + 1); + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(_sub, email1)) + { + intersect.Add(email2); + } + } + // email2 specifies a domain + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(email2, ".")) + { + if (WithinDomain(email1, email2)) + { + intersect.Add(email1); + } + } + // email2 specifies a particular host + else + { + if (Org.BouncyCastle.Utilities.Platform.EqualsIgnoreCase(email1, email2)) + { + intersect.Add(email1); + } + } + } + } + + private static string ExtractHostFromURL(string url) + { + // see RFC 1738 + // remove ':' after protocol, e.g. http: + string sub = url.Substring(url.IndexOf(':') + 1); + // extract host from Common Internet Scheme Syntax, e.g. http:// + int idxOfSlashes = Org.BouncyCastle.Utilities.Platform.IndexOf(sub, "//"); + if (idxOfSlashes != -1) + { + sub = sub.Substring(idxOfSlashes + 2); + } + // first remove port, e.g. http://test.com:21 + if (sub.LastIndexOf(':') != -1) + { + sub = sub.Substring(0, sub.LastIndexOf(':')); + } + // remove user and password, e.g. http://john:password@test.com + sub = sub.Substring(sub.IndexOf(':') + 1); + sub = sub.Substring(sub.IndexOf('@') + 1); + // remove local parts, e.g. http://test.com/bla + if (sub.IndexOf('/') != -1) + { + sub = sub.Substring(0, sub.IndexOf('/')); + } + return sub; + } + + /** + * Checks if the given GeneralName is in the permitted ISet. + * + * @param name The GeneralName + * @throws PkixNameConstraintValidatorException + * If the name + */ + public void checkPermitted(GeneralName name) + //throws PkixNameConstraintValidatorException + { + switch (name.TagNo) + { + case GeneralName.OtherName: + CheckPermittedOtherName(permittedSubtreesOtherName, OtherName.GetInstance(name.Name)); + break; + case GeneralName.Rfc822Name: + CheckPermittedEmail(permittedSubtreesEmail, ExtractNameAsString(name)); + break; + case GeneralName.DnsName: + CheckPermittedDns(permittedSubtreesDns, ExtractNameAsString(name)); + break; + case GeneralName.DirectoryName: + CheckPermittedDN(Asn1Sequence.GetInstance(name.Name.ToAsn1Object())); + break; + case GeneralName.UniformResourceIdentifier: + CheckPermittedUri(permittedSubtreesUri, ExtractNameAsString(name)); + break; + case GeneralName.IPAddress: + CheckPermittedIP(permittedSubtreesIP, Asn1OctetString.GetInstance(name.Name).GetOctets()); + break; + } + } + + /** + * Check if the given GeneralName is contained in the excluded ISet. + * + * @param name The GeneralName. + * @throws PkixNameConstraintValidatorException + * If the name is + * excluded. + */ + public void checkExcluded(GeneralName name) + //throws PkixNameConstraintValidatorException + { + switch (name.TagNo) + { + case GeneralName.OtherName: + CheckExcludedOtherName(excludedSubtreesOtherName, OtherName.GetInstance(name.Name)); + break; + case GeneralName.Rfc822Name: + CheckExcludedEmail(excludedSubtreesEmail, ExtractNameAsString(name)); + break; + case GeneralName.DnsName: + CheckExcludedDns(excludedSubtreesDns, ExtractNameAsString(name)); + break; + case GeneralName.DirectoryName: + CheckExcludedDN(Asn1Sequence.GetInstance(name.Name.ToAsn1Object())); + break; + case GeneralName.UniformResourceIdentifier: + CheckExcludedUri(excludedSubtreesUri, ExtractNameAsString(name)); + break; + case GeneralName.IPAddress: + CheckExcludedIP(excludedSubtreesIP, Asn1OctetString.GetInstance(name.Name).GetOctets()); + break; + } + } + + /** + * Updates the permitted ISet of these name constraints with the intersection + * with the given subtree. + * + * @param permitted The permitted subtrees + */ + + public void IntersectPermittedSubtree(Asn1Sequence permitted) + { + var subtreesMap = new Dictionary>(); + + // group in ISets in a map ordered by tag no. + foreach (var element in permitted) + { + GeneralSubtree subtree = GeneralSubtree.GetInstance(element); + + int tagNo = subtree.Base.TagNo; + + ISet subtrees; + if (!subtreesMap.TryGetValue(tagNo, out subtrees)) + { + subtrees = new HashSet(); + subtreesMap[tagNo] = subtrees; + } + + subtrees.Add(subtree); + } + + foreach (var entry in subtreesMap) + { + // go through all subtree groups + switch (entry.Key) + { + case GeneralName.OtherName: + permittedSubtreesOtherName = IntersectOtherName(permittedSubtreesOtherName, entry.Value); + break; + case GeneralName.Rfc822Name: + permittedSubtreesEmail = IntersectEmail(permittedSubtreesEmail, entry.Value); + break; + case GeneralName.DnsName: + permittedSubtreesDns = IntersectDns(permittedSubtreesDns, entry.Value); + break; + case GeneralName.DirectoryName: + permittedSubtreesDN = IntersectDN(permittedSubtreesDN, entry.Value); + break; + case GeneralName.UniformResourceIdentifier: + permittedSubtreesUri = IntersectUri(permittedSubtreesUri, entry.Value); + break; + case GeneralName.IPAddress: + permittedSubtreesIP = IntersectIP(permittedSubtreesIP, entry.Value); + break; + } + } + } + + private string ExtractNameAsString(GeneralName name) + { + return DerIA5String.GetInstance(name.Name).GetString(); + } + + public void IntersectEmptyPermittedSubtree(int nameType) + { + switch (nameType) + { + case GeneralName.OtherName: + permittedSubtreesOtherName = new HashSet(); + break; + case GeneralName.Rfc822Name: + permittedSubtreesEmail = new HashSet(); + break; + case GeneralName.DnsName: + permittedSubtreesDns = new HashSet(); + break; + case GeneralName.DirectoryName: + permittedSubtreesDN = new HashSet(); + break; + case GeneralName.UniformResourceIdentifier: + permittedSubtreesUri = new HashSet(); + break; + case GeneralName.IPAddress: + permittedSubtreesIP = new HashSet(); + break; + } + } + + /** + * Adds a subtree to the excluded ISet of these name constraints. + * + * @param subtree A subtree with an excluded GeneralName. + */ + public void AddExcludedSubtree(GeneralSubtree subtree) + { + GeneralName subTreeBase = subtree.Base; + + switch (subTreeBase.TagNo) + { + case GeneralName.OtherName: + excludedSubtreesOtherName = UnionOtherName(excludedSubtreesOtherName, + OtherName.GetInstance(subTreeBase.Name)); + break; + case GeneralName.Rfc822Name: + excludedSubtreesEmail = UnionEmail(excludedSubtreesEmail, + ExtractNameAsString(subTreeBase)); + break; + case GeneralName.DnsName: + excludedSubtreesDns = UnionDns(excludedSubtreesDns, + ExtractNameAsString(subTreeBase)); + break; + case GeneralName.DirectoryName: + excludedSubtreesDN = UnionDN(excludedSubtreesDN, + (Asn1Sequence)subTreeBase.Name.ToAsn1Object()); + break; + case GeneralName.UniformResourceIdentifier: + excludedSubtreesUri = UnionUri(excludedSubtreesUri, + ExtractNameAsString(subTreeBase)); + break; + case GeneralName.IPAddress: + excludedSubtreesIP = UnionIP(excludedSubtreesIP, + Asn1OctetString.GetInstance(subTreeBase.Name).GetOctets()); + break; + } + } + + /** + * Returns the maximum IP address. + * + * @param ip1 The first IP address. + * @param ip2 The second IP address. + * @return The maximum IP address. + */ + private static byte[] Max(byte[] ip1, byte[] ip2) + { + for (int i = 0; i < ip1.Length; i++) + { + if ((ip1[i] & 0xFFFF) > (ip2[i] & 0xFFFF)) + { + return ip1; + } + } + return ip2; + } + + /** + * Returns the minimum IP address. + * + * @param ip1 The first IP address. + * @param ip2 The second IP address. + * @return The minimum IP address. + */ + private static byte[] Min(byte[] ip1, byte[] ip2) + { + for (int i = 0; i < ip1.Length; i++) + { + if ((ip1[i] & 0xFFFF) < (ip2[i] & 0xFFFF)) + { + return ip1; + } + } + return ip2; + } + + /** + * Compares IP address ip1 with ip2. If ip1 + * is equal to ip2 0 is returned. If ip1 is bigger 1 is returned, -1 + * otherwise. + * + * @param ip1 The first IP address. + * @param ip2 The second IP address. + * @return 0 if ip1 is equal to ip2, 1 if ip1 is bigger, -1 otherwise. + */ + private static int CompareTo(byte[] ip1, byte[] ip2) + { + if (Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays.AreEqual(ip1, ip2)) + { + return 0; + } + if (Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Arrays.AreEqual(Max(ip1, ip2), ip1)) + { + return 1; + } + return -1; + } + + /** + * Returns the logical OR of the IP addresses ip1 and + * ip2. + * + * @param ip1 The first IP address. + * @param ip2 The second IP address. + * @return The OR of ip1 and ip2. + */ + private static byte[] Or(byte[] ip1, byte[] ip2) + { + byte[] temp = new byte[ip1.Length]; + for (int i = 0; i < ip1.Length; i++) + { + temp[i] = (byte)(ip1[i] | ip2[i]); + } + return temp; + } + + public override int GetHashCode() + { + return HashCollection(excludedSubtreesDN) + + HashCollection(excludedSubtreesDns) + + HashCollection(excludedSubtreesEmail) + + HashCollection(excludedSubtreesIP) + + HashCollection(excludedSubtreesUri) + + HashCollection(excludedSubtreesOtherName) + + HashCollection(permittedSubtreesDN) + + HashCollection(permittedSubtreesDns) + + HashCollection(permittedSubtreesEmail) + + HashCollection(permittedSubtreesIP) + + HashCollection(permittedSubtreesUri) + + HashCollection(permittedSubtreesOtherName); + } + + private int HashCollection(IEnumerable c) + { + int hash = 0; + if (c != null) + { + foreach (byte[] o in c) + { + hash += Arrays.GetHashCode(o); + } + } + return hash; + } + + private int HashCollection(IEnumerable c) + { + int hash = 0; + if (c != null) + { + foreach (object o in c) + { + hash += o.GetHashCode(); + } + } + return hash; + } + + public override bool Equals(object o) + { + if (!(o is PkixNameConstraintValidator that)) + return false; + + return AreEqualSets(that.excludedSubtreesDN, excludedSubtreesDN) + && AreEqualSets(that.excludedSubtreesDns, excludedSubtreesDns) + && AreEqualSets(that.excludedSubtreesEmail, excludedSubtreesEmail) + && AreEqualSets(that.excludedSubtreesIP, excludedSubtreesIP) + && AreEqualSets(that.excludedSubtreesUri, excludedSubtreesUri) + && AreEqualSets(that.excludedSubtreesOtherName, excludedSubtreesOtherName) + && AreEqualSets(that.permittedSubtreesDN, permittedSubtreesDN) + && AreEqualSets(that.permittedSubtreesDns, permittedSubtreesDns) + && AreEqualSets(that.permittedSubtreesEmail, permittedSubtreesEmail) + && AreEqualSets(that.permittedSubtreesIP, permittedSubtreesIP) + && AreEqualSets(that.permittedSubtreesUri, permittedSubtreesUri) + && AreEqualSets(that.permittedSubtreesOtherName, permittedSubtreesOtherName); + } + + private bool AreEqualSets(ISet set1, ISet set2) + { + if (set1 == set2) + return true; + if (set1 == null || set2 == null || set1.Count != set2.Count) + return false; + + foreach (byte[] a in set1) + { + bool found = false; + foreach (byte[] b in set2) + { + if (Arrays.AreEqual(a, b)) + { + found = true; + break; + } + } + + if (!found) + return false; + } + return true; + } + + private bool AreEqualSets(ISet set1, ISet set2) + { + if (set1 == set2) + return true; + if (set1 == null || set2 == null || set1.Count != set2.Count) + return false; + + foreach (T a in set1) + { + if (!set2.Contains(a)) + return false; + } + return true; + } + + /** + * Stringifies an IPv4 or v6 address with subnet mask. + * + * @param ip The IP with subnet mask. + * @return The stringified IP address. + */ + private string StringifyIP(byte[] ip) + { + string temp = ""; + for (int i = 0; i < ip.Length / 2; i++) + { + temp += (ip[i] & 0x00FF) + "."; + } + temp = temp.Substring(0, temp.Length - 1); + temp += "/"; + for (int i = ip.Length / 2; i < ip.Length; i++) + { + temp += (ip[i] & 0x00FF) + "."; + } + temp = temp.Substring(0, temp.Length - 1); + return temp; + } + + private string StringifyIPCollection(ISet ips) + { + string temp = ""; + temp += "["; + foreach (byte[] ip in ips) + { + temp += StringifyIP(ip) + ","; + } + if (temp.Length > 1) + { + temp = temp.Substring(0, temp.Length - 1); + } + temp += "]"; + return temp; + } + + private string StringifyOtherNameCollection(ISet otherNames) + { + StringBuilder sb = new StringBuilder('['); + foreach (OtherName name in otherNames) + { + if (sb.Length > 1) + { + sb.Append(','); + } + sb.Append(name.TypeID.Id); + sb.Append(':'); + sb.Append(Hex.ToHexString(name.Value.GetEncoded())); + } + sb.Append(']'); + return sb.ToString(); + } + + public override string ToString() + { + StringBuilder sb = new StringBuilder("permitted:\n"); + if (permittedSubtreesDN != null) + { + Append(sb, "DN", permittedSubtreesDN); + } + if (permittedSubtreesDns != null) + { + Append(sb, "DNS", permittedSubtreesDns); + } + if (permittedSubtreesEmail != null) + { + Append(sb, "Email", permittedSubtreesEmail); + } + if (permittedSubtreesUri != null) + { + Append(sb, "URI", permittedSubtreesUri); + } + if (permittedSubtreesIP != null) + { + Append(sb, "IP", StringifyIPCollection(permittedSubtreesIP)); + } + if (permittedSubtreesOtherName != null) + { + Append(sb, "OtherName", StringifyOtherNameCollection(permittedSubtreesOtherName)); + } + sb.Append("excluded:\n"); + if (excludedSubtreesDN.Count > 0) + { + Append(sb, "DN", excludedSubtreesDN); + } + if (excludedSubtreesDns.Count > 0) + { + Append(sb, "DNS", excludedSubtreesDns); + } + if (excludedSubtreesEmail.Count > 0) + { + Append(sb, "Email", excludedSubtreesEmail); + } + if (excludedSubtreesUri.Count > 0) + { + Append(sb, "URI", excludedSubtreesUri); + } + if (excludedSubtreesIP.Count > 0) + { + Append(sb, "IP", StringifyIPCollection(excludedSubtreesIP)); + } + if (excludedSubtreesOtherName.Count > 0) + { + Append(sb, "OtherName", StringifyOtherNameCollection(excludedSubtreesOtherName)); + } + return sb.ToString(); + } + + private static void Append(StringBuilder sb, string name, object value) + { + sb.Append(name); + sb.AppendLine(":"); + sb.Append(value); + sb.AppendLine(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs.meta new file mode 100644 index 00000000..3b5379fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93e8a1717355d6d46b9e49e15661cc3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs new file mode 100644 index 00000000..e622f178 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + [Serializable] + public class PkixNameConstraintValidatorException + : Exception + { + public PkixNameConstraintValidatorException() + : base() + { + } + + public PkixNameConstraintValidatorException(string message) + : base(message) + { + } + + public PkixNameConstraintValidatorException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PkixNameConstraintValidatorException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs.meta new file mode 100644 index 00000000..494e6b44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 912e3f0128c00744b815ed27b7589bcc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixNameConstraintValidatorException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs new file mode 100644 index 00000000..05eb0d29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs @@ -0,0 +1,794 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixParameters. + /// + public class PkixParameters + { + /** + * This is the default PKIX validity model. Actually there are two variants + * of this: The PKIX model and the modified PKIX model. The PKIX model + * verifies that all involved certificates must have been valid at the + * current time. The modified PKIX model verifies that all involved + * certificates were valid at the signing time. Both are indirectly choosen + * with the {@link PKIXParameters#setDate(java.util.Date)} method, so this + * methods sets the Date when all certificates must have been + * valid. + */ + public const int PkixValidityModel = 0; + + /** + * This model uses the following validity model. Each certificate must have + * been valid at the moment where is was used. That means the end + * certificate must have been valid at the time the signature was done. The + * CA certificate which signed the end certificate must have been valid, + * when the end certificate was signed. The CA (or Root CA) certificate must + * have been valid, when the CA certificate was signed and so on. So the + * {@link PKIXParameters#setDate(java.util.Date)} method sets the time, when + * the end certificate must have been valid.

    It is used e.g. + * in the German signature law. + */ + public const int ChainValidityModel = 1; + + private HashSet trustAnchors; + private DateTime? date; + private List m_checkers; + private bool revocationEnabled = true; + private HashSet initialPolicies; + //private bool checkOnlyEECertificateCrl = false; + private bool explicitPolicyRequired = false; + private bool anyPolicyInhibited = false; + private bool policyMappingInhibited = false; + private bool policyQualifiersRejected = true; + + private List> m_storesAttrCert; + private List> m_storesCert; + private List> m_storesCrl; + + private ISelector m_targetConstraintsAttrCert; + private ISelector m_targetConstraintsCert; + + private bool additionalLocationsEnabled; + private ISet trustedACIssuers; + private ISet necessaryACAttributes; + private ISet prohibitedACAttributes; + private ISet attrCertCheckers; + private int validityModel = PkixValidityModel; + private bool useDeltas = false; + + /** + * Creates an instance of PKIXParameters with the specified Set of + * most-trusted CAs. Each element of the set is a TrustAnchor.
    + *
    + * Note that the Set is copied to protect against subsequent modifications. + * + * @param trustAnchors + * a Set of TrustAnchors + * + * @exception InvalidAlgorithmParameterException + * if the specified Set is empty + * (trustAnchors.isEmpty() == true) + * @exception NullPointerException + * if the specified Set is null + * @exception ClassCastException + * if any of the elements in the Set are not of type + * java.security.cert.TrustAnchor + */ + public PkixParameters(ISet trustAnchors) + { + SetTrustAnchors(trustAnchors); + + this.initialPolicies = new HashSet(); + this.m_checkers = new List(); + this.m_storesAttrCert = new List>(); + this.m_storesCert = new List>(); + this.m_storesCrl = new List>(); + this.trustedACIssuers = new HashSet(); + this.necessaryACAttributes = new HashSet(); + this.prohibitedACAttributes = new HashSet(); + this.attrCertCheckers = new HashSet(); + } + +// // TODO implement for other keystores (see Java build)? +// /** +// * Creates an instance of PKIXParameters that +// * populates the set of most-trusted CAs from the trusted +// * certificate entries contained in the specified KeyStore. +// * Only keystore entries that contain trusted X509Certificates +// * are considered; all other certificate types are ignored. +// * +// * @param keystore a KeyStore from which the set of +// * most-trusted CAs will be populated +// * @throws KeyStoreException if the keystore has not been initialized +// * @throws InvalidAlgorithmParameterException if the keystore does +// * not contain at least one trusted certificate entry +// * @throws NullPointerException if the keystore is null +// */ +// public PkixParameters( +// Pkcs12Store keystore) +//// throws KeyStoreException, InvalidAlgorithmParameterException +// { +// if (keystore == null) +// throw new ArgumentNullException("keystore"); +// ISet trustAnchors = new HashSet(); +// foreach (string alias in keystore.Aliases) +// { +// if (keystore.IsCertificateEntry(alias)) +// { +// X509CertificateEntry x509Entry = keystore.GetCertificate(alias); +// trustAnchors.Add(new TrustAnchor(x509Entry.Certificate, null)); +// } +// } +// SetTrustAnchors(trustAnchors); +// +// this.initialPolicies = new HashSet(); +// this.certPathCheckers = new ArrayList(); +// this.stores = new ArrayList(); +// this.additionalStores = new ArrayList(); +// this.trustedACIssuers = new HashSet(); +// this.necessaryACAttributes = new HashSet(); +// this.prohibitedACAttributes = new HashSet(); +// this.attrCertCheckers = new HashSet(); +// } + + public virtual bool IsRevocationEnabled + { + get { return revocationEnabled; } + set { revocationEnabled = value; } + } + + public virtual bool IsExplicitPolicyRequired + { + get { return explicitPolicyRequired; } + set { this.explicitPolicyRequired = value; } + } + + public virtual bool IsAnyPolicyInhibited + { + get { return anyPolicyInhibited; } + set { this.anyPolicyInhibited = value; } + } + + public virtual bool IsPolicyMappingInhibited + { + get { return policyMappingInhibited; } + set { this.policyMappingInhibited = value; } + } + + public virtual bool IsPolicyQualifiersRejected + { + get { return policyQualifiersRejected; } + set { this.policyQualifiersRejected = value; } + } + + //public bool IsCheckOnlyEECertificateCrl + //{ + // get { return this.checkOnlyEECertificateCrl; } + // set { this.checkOnlyEECertificateCrl = value; } + //} + + public virtual DateTime? Date + { + get { return this.date; } + set { this.date = value; } + } + + // Returns a Set of the most-trusted CAs. + public virtual ISet GetTrustAnchors() + { + return new HashSet(this.trustAnchors); + } + + // Sets the set of most-trusted CAs. + // Set is copied to protect against subsequent modifications. + public virtual void SetTrustAnchors(ISet tas) + { + if (tas == null) + throw new ArgumentNullException("value"); + if (tas.Count < 1) + throw new ArgumentException("non-empty set required", "value"); + + // Explicit copy to enforce type-safety + this.trustAnchors = new HashSet(); + foreach (TrustAnchor ta in tas) + { + if (ta != null) + { + trustAnchors.Add(ta); + } + } + } + + /** + * Returns the required constraints on the target certificate or attribute + * certificate. The constraints are returned as an instance of + * IX509Selector. If null, no constraints are + * defined. + * + *

    + * The target certificate in a PKIX path may be a certificate or an + * attribute certificate. + *

    + * Note that the IX509Selector returned is cloned to protect + * against subsequent modifications. + *

    + * @return a IX509Selector specifying the constraints on the + * target certificate or attribute certificate (or null) + * @see #setTargetConstraints + * @see X509CertStoreSelector + * @see X509AttributeCertStoreSelector + */ + public virtual ISelector GetTargetConstraintsAttrCert() + { + return (ISelector)m_targetConstraintsAttrCert?.Clone(); + } + + /** + * Sets the required constraints on the target certificate or attribute + * certificate. The constraints are specified as an instance of + * IX509Selector. If null, no constraints are + * defined. + *

    + * The target certificate in a PKIX path may be a certificate or an + * attribute certificate. + *

    + * Note that the IX509Selector specified is cloned to protect + * against subsequent modifications. + *

    + * + * @param selector a IX509Selector specifying the constraints on + * the target certificate or attribute certificate (or + * null) + * @see #getTargetConstraints + * @see X509CertStoreSelector + * @see X509AttributeCertStoreSelector + */ + public virtual void SetTargetConstraintsAttrCert(ISelector targetConstraintsAttrCert) + { + this.m_targetConstraintsAttrCert = (ISelector)targetConstraintsAttrCert?.Clone(); + } + + /** + * Returns the required constraints on the target certificate. The + * constraints are returned as an instance of CertSelector. If + * null, no constraints are defined.
    + *
    + * Note that the CertSelector returned is cloned to protect against + * subsequent modifications. + * + * @return a CertSelector specifying the constraints on the target + * certificate (or null) + * + * @see #setTargetCertConstraints(CertSelector) + */ + public virtual ISelector GetTargetConstraintsCert() + { + return (ISelector)m_targetConstraintsCert?.Clone(); + } + + /** + * Sets the required constraints on the target certificate. The constraints + * are specified as an instance of CertSelector. If null, no constraints are + * defined.
    + *
    + * Note that the CertSelector specified is cloned to protect against + * subsequent modifications. + * + * @param selector + * a CertSelector specifying the constraints on the target + * certificate (or null) + * + * @see #getTargetCertConstraints() + */ + public virtual void SetTargetConstraintsCert(ISelector targetConstraintsCert) + { + m_targetConstraintsCert = (ISelector)targetConstraintsCert?.Clone(); + } + + /** + * Returns an immutable Set of initial policy identifiers (OID strings), + * indicating that any one of these policies would be acceptable to the + * certificate user for the purposes of certification path processing. The + * default return value is an empty Set, which is + * interpreted as meaning that any policy would be acceptable. + * + * @return an immutable Set of initial policy OIDs in String + * format, or an empty Set (implying any policy is + * acceptable). Never returns null. + * + * @see #setInitialPolicies(java.util.Set) + */ + public virtual ISet GetInitialPolicies() + { + // TODO Can it really be null? + if (initialPolicies == null) + return new HashSet(); + + return new HashSet(initialPolicies); + } + + /** + * Sets the Set of initial policy identifiers (OID strings), + * indicating that any one of these policies would be acceptable to the + * certificate user for the purposes of certification path processing. By + * default, any policy is acceptable (i.e. all policies), so a user that + * wants to allow any policy as acceptable does not need to call this + * method, or can call it with an empty Set (or + * null).
    + *
    + * Note that the Set is copied to protect against subsequent modifications.
    + *
    + * + * @param initialPolicies + * a Set of initial policy OIDs in String format (or + * null) + * + * @exception ClassCastException + * if any of the elements in the set are not of type String + * + * @see #getInitialPolicies() + */ + public virtual void SetInitialPolicies(ISet initialPolicies) + { + this.initialPolicies = new HashSet(); + if (initialPolicies != null) + { + foreach (string obj in initialPolicies) + { + if (obj != null) + { + this.initialPolicies.Add(obj); + } + } + } + } + + /** + * Sets a List of additional certification path checkers. If + * the specified List contains an object that is not a PKIXCertPathChecker, + * it is ignored.
    + *
    + * Each PKIXCertPathChecker specified implements additional + * checks on a certificate. Typically, these are checks to process and + * verify private extensions contained in certificates. Each + * PKIXCertPathChecker should be instantiated with any + * initialization parameters needed to execute the check.
    + *
    + * This method allows sophisticated applications to extend a PKIX + * CertPathValidator or CertPathBuilder. Each + * of the specified PKIXCertPathCheckers will be called, in turn, by a PKIX + * CertPathValidator or CertPathBuilder for + * each certificate processed or validated.
    + *
    + * Regardless of whether these additional PKIXCertPathCheckers are set, a + * PKIX CertPathValidator or CertPathBuilder + * must perform all of the required PKIX checks on each certificate. The one + * exception to this rule is if the RevocationEnabled flag is set to false + * (see the {@link #setRevocationEnabled(boolean) setRevocationEnabled} + * method).
    + *
    + * Note that the List supplied here is copied and each PKIXCertPathChecker + * in the list is cloned to protect against subsequent modifications. + * + * @param checkers + * a List of PKIXCertPathCheckers. May be null, in which case no + * additional checkers will be used. + * @exception ClassCastException + * if any of the elements in the list are not of type + * java.security.cert.PKIXCertPathChecker + * @see #getCertPathCheckers() + */ + public virtual void SetCertPathCheckers(IList checkers) + { + m_checkers = new List(); + + if (checkers != null) + { + foreach (var checker in checkers) + { + m_checkers.Add((PkixCertPathChecker)checker.Clone()); + } + } + } + + /** + * Returns the List of certification path checkers. Each PKIXCertPathChecker + * in the returned IList is cloned to protect against subsequent modifications. + * + * @return an immutable List of PKIXCertPathCheckers (may be empty, but not + * null) + * + * @see #setCertPathCheckers(java.util.List) + */ + public virtual IList GetCertPathCheckers() + { + var result = new List(m_checkers.Count); + foreach (var checker in m_checkers) + { + result.Add((PkixCertPathChecker)checker.Clone()); + } + return result; + } + + /** + * Adds a PKIXCertPathChecker to the list of certification + * path checkers. See the {@link #setCertPathCheckers setCertPathCheckers} + * method for more details. + *

    + * Note that the PKIXCertPathChecker is cloned to protect + * against subsequent modifications.

    + * + * @param checker a PKIXCertPathChecker to add to the list of + * checks. If null, the checker is ignored (not added to list). + */ + public virtual void AddCertPathChecker(PkixCertPathChecker checker) + { + if (checker != null) + { + m_checkers.Add((PkixCertPathChecker)checker.Clone()); + } + } + + public virtual object Clone() + { + // FIXME Check this whole method against the Java implementation! + + PkixParameters parameters = new PkixParameters(GetTrustAnchors()); + parameters.SetParams(this); + return parameters; + + +// PkixParameters obj = new PkixParameters(new HashSet()); +//// (PkixParameters) this.MemberwiseClone(); +// obj.x509Stores = new ArrayList(x509Stores); +// obj.certPathCheckers = new ArrayList(certPathCheckers); +// +// //Iterator iter = certPathCheckers.iterator(); +// //obj.certPathCheckers = new ArrayList(); +// //while (iter.hasNext()) +// //{ +// // obj.certPathCheckers.add(((PKIXCertPathChecker)iter.next()) +// // .clone()); +// //} +// //if (initialPolicies != null) +// //{ +// // obj.initialPolicies = new HashSet(initialPolicies); +// //} +//// if (trustAnchors != null) +//// { +//// obj.trustAnchors = new HashSet(trustAnchors); +//// } +//// if (certSelector != null) +//// { +//// obj.certSelector = (X509CertStoreSelector) certSelector.Clone(); +//// } +// return obj; + } + + /** + * Method to support Clone() under J2ME. + * super.Clone() does not exist and fields are not copied. + * + * @param params Parameters to set. If this are + * ExtendedPkixParameters they are copied to. + */ + protected virtual void SetParams(PkixParameters parameters) + { + Date = parameters.Date; + SetCertPathCheckers(parameters.GetCertPathCheckers()); + IsAnyPolicyInhibited = parameters.IsAnyPolicyInhibited; + IsExplicitPolicyRequired = parameters.IsExplicitPolicyRequired; + IsPolicyMappingInhibited = parameters.IsPolicyMappingInhibited; + IsRevocationEnabled = parameters.IsRevocationEnabled; + SetInitialPolicies(parameters.GetInitialPolicies()); + IsPolicyQualifiersRejected = parameters.IsPolicyQualifiersRejected; + SetTrustAnchors(parameters.GetTrustAnchors()); + + m_storesAttrCert = new List>(parameters.m_storesAttrCert); + m_storesCert = new List>(parameters.m_storesCert); + m_storesCrl = new List>(parameters.m_storesCrl); + + SetTargetConstraintsAttrCert(parameters.GetTargetConstraintsAttrCert()); + SetTargetConstraintsCert(parameters.GetTargetConstraintsCert()); + + validityModel = parameters.validityModel; + useDeltas = parameters.useDeltas; + additionalLocationsEnabled = parameters.additionalLocationsEnabled; + trustedACIssuers = new HashSet(parameters.trustedACIssuers); + prohibitedACAttributes = new HashSet(parameters.prohibitedACAttributes); + necessaryACAttributes = new HashSet(parameters.necessaryACAttributes); + attrCertCheckers = new HashSet(parameters.attrCertCheckers); + } + + /** + * Whether delta CRLs should be used for checking the revocation status. + * Defaults to false. + */ + public virtual bool IsUseDeltasEnabled + { + get { return useDeltas; } + set { useDeltas = value; } + } + + /** + * The validity model. + * @see #CHAIN_VALIDITY_MODEL + * @see #PKIX_VALIDITY_MODEL + */ + public virtual int ValidityModel + { + get { return validityModel; } + set { validityModel = value; } + } + + public virtual IList> GetStoresAttrCert() + { + return new List>(m_storesAttrCert); + } + + public virtual IList> GetStoresCert() + { + return new List>(m_storesCert); + } + + public virtual IList> GetStoresCrl() + { + return new List>(m_storesCrl); + } + + public virtual void SetAttrStoresCert(IList> storesAttrCert) + { + if (storesAttrCert == null) + { + m_storesAttrCert = new List>(); + } + else + { + m_storesAttrCert = new List>(storesAttrCert); + } + } + + public virtual void SetStoresCert(IList> storesCert) + { + if (storesCert == null) + { + m_storesCert = new List>(); + } + else + { + m_storesCert = new List>(storesCert); + } + } + + public virtual void SetStoresCrl(IList> storesCrl) + { + if (storesCrl == null) + { + m_storesCrl = new List>(); + } + else + { + m_storesCrl = new List>(storesCrl); + } + } + + public virtual void AddStoreAttrCert(IStore storeAttrCert) + { + if (storeAttrCert != null) + { + m_storesAttrCert.Add(storeAttrCert); + } + } + + public virtual void AddStoreCert(IStore storeCert) + { + if (storeCert != null) + { + m_storesCert.Add(storeCert); + } + } + + public virtual void AddStoreCrl(IStore storeCrl) + { + if (storeCrl != null) + { + m_storesCrl.Add(storeCrl); + } + } + + /** + * Returns if additional {@link X509Store}s for locations like LDAP found + * in certificates or CRLs should be used. + * + * @return Returns true if additional stores are used. + */ + public virtual bool IsAdditionalLocationsEnabled + { + get { return additionalLocationsEnabled; } + } + + /** + * Sets if additional {@link X509Store}s for locations like LDAP found in + * certificates or CRLs should be used. + * + * @param enabled true if additional stores are used. + */ + public virtual void SetAdditionalLocationsEnabled( + bool enabled) + { + additionalLocationsEnabled = enabled; + } + + /** + * Returns the trusted attribute certificate issuers. If attribute + * certificates is verified the trusted AC issuers must be set. + *

    + * The returned ISet consists of TrustAnchors. + *

    + * The returned ISet is immutable. Never null + *

    + * + * @return Returns an immutable set of the trusted AC issuers. + */ + public virtual ISet GetTrustedACIssuers() + { + return new HashSet(trustedACIssuers); + } + + /** + * Sets the trusted attribute certificate issuers. If attribute certificates + * is verified the trusted AC issuers must be set. + *

    + * The trustedACIssuers must be a ISet of + * TrustAnchor + *

    + * The given set is cloned. + *

    + * + * @param trustedACIssuers The trusted AC issuers to set. Is never + * null. + * @throws ClassCastException if an element of stores is not + * a TrustAnchor. + */ + public virtual void SetTrustedACIssuers(ISet trustedACIssuers) + { + if (trustedACIssuers == null) + { + this.trustedACIssuers = new HashSet(); + } + else + { + this.trustedACIssuers = new HashSet(trustedACIssuers); + } + } + + /** + * Returns the necessary attributes which must be contained in an attribute + * certificate. + *

    + * The returned ISet is immutable and contains + * Strings with the OIDs. + *

    + * + * @return Returns the necessary AC attributes. + */ + public virtual ISet GetNecessaryACAttributes() + { + return new HashSet(necessaryACAttributes); + } + + /** + * Sets the necessary which must be contained in an attribute certificate. + *

    + * The ISet must contain Strings with the + * OIDs. + *

    + * The set is cloned. + *

    + * + * @param necessaryACAttributes The necessary AC attributes to set. + * @throws ClassCastException if an element of + * necessaryACAttributes is not a + * String. + */ + public virtual void SetNecessaryACAttributes(ISet necessaryACAttributes) + { + if (necessaryACAttributes == null) + { + this.necessaryACAttributes = new HashSet(); + } + else + { + this.necessaryACAttributes = new HashSet(necessaryACAttributes); + } + } + + /** + * Returns the attribute certificates which are not allowed. + *

    + * The returned ISet is immutable and contains + * Strings with the OIDs. + *

    + * + * @return Returns the prohibited AC attributes. Is never null. + */ + public virtual ISet GetProhibitedACAttributes() + { + return new HashSet(prohibitedACAttributes); + } + + /** + * Sets the attribute certificates which are not allowed. + *

    + * The ISet must contain Strings with the + * OIDs. + *

    + * The set is cloned. + *

    + * + * @param prohibitedACAttributes The prohibited AC attributes to set. + * @throws ClassCastException if an element of + * prohibitedACAttributes is not a + * String. + */ + public virtual void SetProhibitedACAttributes(ISet prohibitedACAttributes) + { + if (prohibitedACAttributes == null) + { + this.prohibitedACAttributes = new HashSet(); + } + else + { + this.prohibitedACAttributes = new HashSet(prohibitedACAttributes); + } + } + + /** + * Returns the attribute certificate checker. The returned set contains + * {@link PKIXAttrCertChecker}s and is immutable. + * + * @return Returns the attribute certificate checker. Is never + * null. + */ + public virtual ISet GetAttrCertCheckers() + { + return new HashSet(attrCertCheckers); + } + + /** + * Sets the attribute certificate checkers. + *

    + * All elements in the ISet must a {@link PKIXAttrCertChecker}. + *

    + *

    + * The given set is cloned. + *

    + * + * @param attrCertCheckers The attribute certificate checkers to set. Is + * never null. + * @throws ClassCastException if an element of attrCertCheckers + * is not a PKIXAttrCertChecker. + */ + public virtual void SetAttrCertCheckers(ISet attrCertCheckers) + { + if (attrCertCheckers == null) + { + this.attrCertCheckers = new HashSet(); + } + else + { + this.attrCertCheckers = new HashSet(attrCertCheckers); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs.meta new file mode 100644 index 00000000..04e86be3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5a16dff65ebecea4293b545100538fcf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs new file mode 100644 index 00000000..172cb03e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs @@ -0,0 +1,160 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// Summary description for PkixPolicyNode. + /// + public class PkixPolicyNode +// : IPolicyNode + { + protected IList mChildren; + protected int mDepth; + protected ISet mExpectedPolicies; + protected PkixPolicyNode mParent; + protected ISet mPolicyQualifiers; + protected string mValidPolicy; + protected bool mCritical; + + public virtual int Depth + { + get { return this.mDepth; } + } + + public virtual IEnumerable Children + { + get { return CollectionUtilities.Proxy(mChildren); } + } + + public virtual bool IsCritical + { + get { return this.mCritical; } + set { this.mCritical = value; } + } + + public virtual ISet PolicyQualifiers + { + get { return new HashSet(this.mPolicyQualifiers); } + } + + public virtual string ValidPolicy + { + get { return this.mValidPolicy; } + } + + public virtual bool HasChildren + { + get { return mChildren.Count != 0; } + } + + public virtual ISet ExpectedPolicies + { + get { return new HashSet(this.mExpectedPolicies); } + set { this.mExpectedPolicies = new HashSet(value); } + } + + public virtual PkixPolicyNode Parent + { + get { return this.mParent; } + set { this.mParent = value; } + } + + /// Constructors + public PkixPolicyNode( + IEnumerable children, + int depth, + ISet expectedPolicies, + PkixPolicyNode parent, + ISet policyQualifiers, + string validPolicy, + bool critical) + { + if (children == null) + { + this.mChildren = new List(); + } + else + { + this.mChildren = new List(children); + } + + this.mDepth = depth; + this.mExpectedPolicies = expectedPolicies; + this.mParent = parent; + this.mPolicyQualifiers = policyQualifiers; + this.mValidPolicy = validPolicy; + this.mCritical = critical; + } + + public virtual void AddChild( + PkixPolicyNode child) + { + child.Parent = this; + mChildren.Add(child); + } + + public virtual void RemoveChild( + PkixPolicyNode child) + { + mChildren.Remove(child); + } + + public override string ToString() + { + return ToString(""); + } + + public virtual string ToString(string indent) + { + StringBuilder buf = new StringBuilder(); + buf.Append(indent); + buf.Append(mValidPolicy); + buf.AppendLine(" {"); + + foreach (PkixPolicyNode child in mChildren) + { + buf.Append(child.ToString(indent + " ")); + } + + buf.Append(indent); + buf.AppendLine("}"); + return buf.ToString(); + } + + public virtual object Clone() + { + return Copy(); + } + + public virtual PkixPolicyNode Copy() + { + PkixPolicyNode node = new PkixPolicyNode( + new List(), + mDepth, + new HashSet(mExpectedPolicies), + null, + new HashSet(mPolicyQualifiers), + mValidPolicy, + mCritical); + + foreach (PkixPolicyNode child in mChildren) + { + PkixPolicyNode copy = child.Copy(); + copy.Parent = node; + node.AddChild(copy); + } + + return node; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs.meta new file mode 100644 index 00000000..8a0153fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 558f27a4675e58c4cbd59765aef2f29b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/PkixPolicyNode.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs new file mode 100644 index 00000000..465c079e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// This class helps to handle CRL revocation reasons mask. Each CRL handles a + /// certain set of revocation reasons. + /// + internal class ReasonsMask + { + private int _reasons; + + /// + /// Constructs are reason mask with the reasons. + /// + /// The reasons. + internal ReasonsMask( + int reasons) + { + _reasons = reasons; + } + + /// + /// A reason mask with no reason. + /// + internal ReasonsMask() + : this(0) + { + } + + /// + /// A mask with all revocation reasons. + /// + internal static readonly ReasonsMask AllReasons = new ReasonsMask( + ReasonFlags.AACompromise | ReasonFlags.AffiliationChanged | ReasonFlags.CACompromise + | ReasonFlags.CertificateHold | ReasonFlags.CessationOfOperation + | ReasonFlags.KeyCompromise | ReasonFlags.PrivilegeWithdrawn | ReasonFlags.Unused + | ReasonFlags.Superseded); + + /** + * Adds all reasons from the reasons mask to this mask. + * + * @param mask The reasons mask to add. + */ + internal void AddReasons( + ReasonsMask mask) + { + _reasons = _reasons | mask.Reasons.IntValue; + } + + /// + /// Returns true if this reasons mask contains all possible + /// reasons. + /// + /// true if this reasons mask contains all possible reasons. + /// + internal bool IsAllReasons + { + get { return _reasons == AllReasons._reasons; } + } + + /// + /// Intersects this mask with the given reasons mask. + /// + /// mask The mask to intersect with. + /// The intersection of this and teh given mask. + internal ReasonsMask Intersect( + ReasonsMask mask) + { + ReasonsMask _mask = new ReasonsMask(); + _mask.AddReasons(new ReasonsMask(_reasons & mask.Reasons.IntValue)); + return _mask; + } + + /// + /// Returns true if the passed reasons mask has new reasons. + /// + /// The reasons mask which should be tested for new reasons. + /// true if the passed reasons mask has new reasons. + internal bool HasNewReasons( + ReasonsMask mask) + { + return ((_reasons | mask.Reasons.IntValue ^ _reasons) != 0); + } + + /// + /// Returns the reasons in this mask. + /// + public ReasonFlags Reasons + { + get { return new ReasonFlags(_reasons); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs.meta new file mode 100644 index 00000000..643a06c9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a84f0f7495255bc47997c29ee0f431e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/ReasonsMask.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs new file mode 100644 index 00000000..5373131f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs @@ -0,0 +1,2323 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + internal static class Rfc3280CertPathUtilities + { + private static readonly PkixCrlUtilities CrlUtilities = new PkixCrlUtilities(); + + internal static readonly string ANY_POLICY = "2.5.29.32.0"; + + // key usage bits + internal static readonly int KEY_CERT_SIGN = 5; + internal static readonly int CRL_SIGN = 6; + + /** + * If the complete CRL includes an issuing distribution point (IDP) CRL + * extension check the following: + *

    + * (i) If the distribution point name is present in the IDP CRL extension + * and the distribution field is present in the DP, then verify that one of + * the names in the IDP matches one of the names in the DP. If the + * distribution point name is present in the IDP CRL extension and the + * distribution field is omitted from the DP, then verify that one of the + * names in the IDP matches one of the names in the cRLIssuer field of the + * DP. + *

    + *

    + * (ii) If the onlyContainsUserCerts boolean is asserted in the IDP CRL + * extension, verify that the certificate does not include the basic + * constraints extension with the cA boolean asserted. + *

    + *

    + * (iii) If the onlyContainsCACerts boolean is asserted in the IDP CRL + * extension, verify that the certificate includes the basic constraints + * extension with the cA boolean asserted. + *

    + *

    + * (iv) Verify that the onlyContainsAttributeCerts boolean is not asserted. + *

    + * + * @param dp The distribution point. + * @param cert The certificate. + * @param crl The CRL. + * @throws AnnotatedException if one of the conditions is not met or an error occurs. + */ + internal static void ProcessCrlB2(DistributionPoint dp, object cert, X509Crl crl) + { + IssuingDistributionPoint idp; + try + { + idp = IssuingDistributionPoint.GetInstance(PkixCertPathValidatorUtilities.GetExtensionValue(crl, X509Extensions.IssuingDistributionPoint)); + } + catch (Exception e) + { + throw new Exception("0 Issuing distribution point extension could not be decoded.", e); + } + + // (b) (2) (i) + // distribution point name is present + if (idp != null) + { + if (idp.DistributionPoint != null) + { + // make list of names + DistributionPointName dpName = IssuingDistributionPoint.GetInstance(idp).DistributionPoint; + var names = new List(); + + if (dpName.PointType == DistributionPointName.FullName) + { + GeneralName[] genNames = GeneralNames.GetInstance(dpName.Name).GetNames(); + for (int j = 0; j < genNames.Length; j++) + { + names.Add(genNames[j]); + } + } + if (dpName.PointType == DistributionPointName.NameRelativeToCrlIssuer) + { + var seq = Asn1Sequence.GetInstance(crl.IssuerDN.ToAsn1Object()); + + Asn1EncodableVector vec = new Asn1EncodableVector(seq.Count + 1); + foreach (var element in seq) + { + vec.Add(element); + } + vec.Add(dpName.Name); + + names.Add(new GeneralName(X509Name.GetInstance(new DerSequence(vec)))); + } + bool matches = false; + // verify that one of the names in the IDP matches one + // of the names in the DP. + if (dp.DistributionPointName != null) + { + dpName = dp.DistributionPointName; + GeneralName[] genNames = null; + if (dpName.PointType == DistributionPointName.FullName) + { + genNames = GeneralNames.GetInstance(dpName.Name).GetNames(); + } + if (dpName.PointType == DistributionPointName.NameRelativeToCrlIssuer) + { + if (dp.CrlIssuer != null) + { + genNames = dp.CrlIssuer.GetNames(); + } + else + { + genNames = new GeneralName[1]; + try + { + genNames[0] = new GeneralName( + PkixCertPathValidatorUtilities.GetIssuerPrincipal(cert)); + } + catch (IOException e) + { + throw new Exception("Could not read certificate issuer.", e); + } + } + for (int j = 0; j < genNames.Length; j++) + { + var seq = Asn1Sequence.GetInstance(genNames[j].Name.ToAsn1Object()); + + Asn1EncodableVector vec = new Asn1EncodableVector(seq.Count + 1); + foreach (var element in seq) + { + vec.Add(element); + } + vec.Add(dpName.Name); + + genNames[j] = new GeneralName(X509Name.GetInstance(new DerSequence(vec))); + } + } + if (genNames != null) + { + for (int j = 0; j < genNames.Length; j++) + { + if (names.Contains(genNames[j])) + { + matches = true; + break; + } + } + } + if (!matches) + { + throw new Exception( + "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); + } + } + // verify that one of the names in + // the IDP matches one of the names in the cRLIssuer field of + // the DP + else + { + if (dp.CrlIssuer == null) + { + throw new Exception("Either the cRLIssuer or the distributionPoint field must " + + "be contained in DistributionPoint."); + } + GeneralName[] genNames = dp.CrlIssuer.GetNames(); + for (int j = 0; j < genNames.Length; j++) + { + if (names.Contains(genNames[j])) + { + matches = true; + break; + } + } + if (!matches) + { + throw new Exception( + "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point."); + } + } + } + BasicConstraints bc = null; + try + { + bc = BasicConstraints.GetInstance(PkixCertPathValidatorUtilities.GetExtensionValue( + (IX509Extension)cert, X509Extensions.BasicConstraints)); + } + catch (Exception e) + { + throw new Exception("Basic constraints extension could not be decoded.", e); + } + + //if (cert is X509Certificate) + { + // (b) (2) (ii) + if (idp.OnlyContainsUserCerts && ((bc != null) && bc.IsCA())) + { + throw new Exception("CA Cert CRL only contains user certificates."); + } + + // (b) (2) (iii) + if (idp.OnlyContainsCACerts && (bc == null || !bc.IsCA())) + { + throw new Exception("End CRL only contains CA certificates."); + } + } + + // (b) (2) (iv) + if (idp.OnlyContainsAttributeCerts) + { + throw new Exception("onlyContainsAttributeCerts boolean is asserted."); + } + } + } + + /// + internal static void ProcessCertBC( + PkixCertPath certPath, + int index, + PkixNameConstraintValidator nameConstraintValidator) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + int n = certs.Count; + // i as defined in the algorithm description + int i = n - index; + // + // (b), (c) permitted and excluded subtree checking. + // + if (!(PkixCertPathValidatorUtilities.IsSelfIssued(cert) && (i < n))) + { + X509Name principal = cert.SubjectDN; + Asn1Sequence dns; + + try + { + dns = Asn1Sequence.GetInstance(principal.GetEncoded()); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Exception extracting subject name when checking subtrees.", e, index); + } + + try + { + nameConstraintValidator.CheckPermittedDN(dns); + nameConstraintValidator.CheckExcludedDN(dns); + } + catch (PkixNameConstraintValidatorException e) + { + throw new PkixCertPathValidatorException( + "Subtree check for certificate subject failed.", e, index); + } + + GeneralNames altName = null; + try + { + altName = GeneralNames.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.SubjectAlternativeName)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Subject alternative name extension could not be decoded.", e, index); + } + + var emails = X509Name.GetInstance(dns).GetValueList(X509Name.EmailAddress); + foreach (string email in emails) + { + GeneralName emailAsGeneralName = new GeneralName(GeneralName.Rfc822Name, email); + try + { + nameConstraintValidator.checkPermitted(emailAsGeneralName); + nameConstraintValidator.checkExcluded(emailAsGeneralName); + } + catch (PkixNameConstraintValidatorException ex) + { + throw new PkixCertPathValidatorException( + "Subtree check for certificate subject alternative email failed.", ex, index); + } + } + if (altName != null) + { + GeneralName[] genNames = null; + try + { + genNames = altName.GetNames(); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Subject alternative name contents could not be decoded.", e, index); + } + foreach (GeneralName genName in genNames) + { + try + { + nameConstraintValidator.checkPermitted(genName); + nameConstraintValidator.checkExcluded(genName); + } + catch (PkixNameConstraintValidatorException e) + { + throw new PkixCertPathValidatorException( + "Subtree check for certificate subject alternative name failed.", e, index); + } + } + } + } + } + + /// + internal static void PrepareNextCertA(PkixCertPath certPath, int index) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + // + // + // (a) check the policy mappings + // + Asn1Sequence pm; + try + { + pm = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.PolicyMappings)); + } + catch (Exception ex) + { + throw new PkixCertPathValidatorException( + "Policy mappings extension could not be decoded.", ex, index); + } + if (pm != null) + { + Asn1Sequence mappings = pm; + + for (int j = 0; j < mappings.Count; j++) + { + DerObjectIdentifier issuerDomainPolicy; + DerObjectIdentifier subjectDomainPolicy; + try + { + Asn1Sequence mapping = Asn1Sequence.GetInstance(mappings[j]); + + issuerDomainPolicy = DerObjectIdentifier.GetInstance(mapping[0]); + subjectDomainPolicy = DerObjectIdentifier.GetInstance(mapping[1]); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Policy mappings extension contents could not be decoded.", e, index); + } + + if (ANY_POLICY.Equals(issuerDomainPolicy.Id)) + throw new PkixCertPathValidatorException( + "IssuerDomainPolicy is anyPolicy", null, index); + + if (ANY_POLICY.Equals(subjectDomainPolicy.Id)) + throw new PkixCertPathValidatorException( + "SubjectDomainPolicy is anyPolicy,", null, index); + } + } + } + + /// + internal static PkixPolicyNode ProcessCertD(PkixCertPath certPath, int index, ISet acceptablePolicies, + PkixPolicyNode validPolicyTree, IList[] policyNodes, int inhibitAnyPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + int n = certs.Count; + // i as defined in the algorithm description + int i = n - index; + // + // (d) policy Information checking against initial policy and + // policy mapping + // + Asn1Sequence certPolicies; + try + { + certPolicies = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.CertificatePolicies)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Could not read certificate policies extension from certificate.", e, index); + } + if (certPolicies != null && validPolicyTree != null) + { + // + // (d) (1) + // + var pols = new HashSet(); + + foreach (Asn1Encodable ae in certPolicies) + { + PolicyInformation pInfo = PolicyInformation.GetInstance(ae.ToAsn1Object()); + DerObjectIdentifier pOid = pInfo.PolicyIdentifier; + + pols.Add(pOid.Id); + + if (!ANY_POLICY.Equals(pOid.Id)) + { + ISet pq; + try + { + pq = PkixCertPathValidatorUtilities.GetQualifierSet(pInfo.PolicyQualifiers); + } + catch (PkixCertPathValidatorException ex) + { + throw new PkixCertPathValidatorException( + "Policy qualifier info set could not be build.", ex, index); + } + + bool match = PkixCertPathValidatorUtilities.ProcessCertD1i(i, policyNodes, pOid, pq); + + if (!match) + { + PkixCertPathValidatorUtilities.ProcessCertD1ii(i, policyNodes, pOid, pq); + } + } + } + + if (acceptablePolicies.Count < 1 || acceptablePolicies.Contains(ANY_POLICY)) + { + acceptablePolicies.Clear(); + acceptablePolicies.UnionWith(pols); + } + else + { + var t1 = new HashSet(); + + foreach (var o in acceptablePolicies) + { + if (pols.Contains(o)) + { + t1.Add(o); + } + } + acceptablePolicies.Clear(); + acceptablePolicies.UnionWith(t1); + } + + // + // (d) (2) + // + if ((inhibitAnyPolicy > 0) || ((i < n) && PkixCertPathValidatorUtilities.IsSelfIssued(cert))) + { + foreach (Asn1Encodable ae in certPolicies) + { + PolicyInformation pInfo = PolicyInformation.GetInstance(ae.ToAsn1Object()); + if (ANY_POLICY.Equals(pInfo.PolicyIdentifier.Id)) + { + var _apq = PkixCertPathValidatorUtilities.GetQualifierSet(pInfo.PolicyQualifiers); + + foreach (var _node in policyNodes[i - 1]) + { + foreach (var _policy in _node.ExpectedPolicies) + { + bool _found = false; + + foreach (PkixPolicyNode _child in _node.Children) + { + if (_policy.Equals(_child.ValidPolicy)) + { + _found = true; + break; + } + } + + if (!_found) + { + var _newChildExpectedPolicies = new HashSet(); + _newChildExpectedPolicies.Add(_policy); + + var _newChild = new PkixPolicyNode(new List(), i, + _newChildExpectedPolicies, _node, _apq, _policy, false); + _node.AddChild(_newChild); + policyNodes[i].Add(_newChild); + } + } + } + break; + } + } + } + + PkixPolicyNode _validPolicyTree = validPolicyTree; + // + // (d) (3) + // + for (int j = i - 1; j >= 0; j--) + { + var nodes = policyNodes[j]; + + for (int k = 0; k < nodes.Count; k++) + { + var node = nodes[k]; + if (!node.HasChildren) + { + _validPolicyTree = PkixCertPathValidatorUtilities.RemovePolicyNode(_validPolicyTree, + policyNodes, node); + if (_validPolicyTree == null) + break; + } + } + } + + // + // d (4) + // + var criticalExtensionOids = cert.GetCriticalExtensionOids(); + + if (criticalExtensionOids != null) + { + bool critical = criticalExtensionOids.Contains(X509Extensions.CertificatePolicies.Id); + + foreach (var node in policyNodes[i]) + { + node.IsCritical = critical; + } + } + return _validPolicyTree; + } + return null; + } + + /** + * If the DP includes cRLIssuer, then verify that the issuer field in the + * complete CRL matches cRLIssuer in the DP and that the complete CRL + * contains an + * g distribution point extension with the indirectCRL + * boolean asserted. Otherwise, verify that the CRL issuer matches the + * certificate issuer. + * + * @param dp The distribution point. + * @param cert The certificate ot attribute certificate. + * @param crl The CRL for cert. + * @throws AnnotatedException if one of the above conditions does not apply or an error + * occurs. + */ + internal static void ProcessCrlB1(DistributionPoint dp, object cert, X509Crl crl) + { + Asn1Object idp = PkixCertPathValidatorUtilities.GetExtensionValue( + crl, X509Extensions.IssuingDistributionPoint); + + bool isIndirect = false; + if (idp != null) + { + if (IssuingDistributionPoint.GetInstance(idp).IsIndirectCrl) + { + isIndirect = true; + } + } + + byte[] issuerBytes = crl.IssuerDN.GetEncoded(); + + bool matchIssuer = false; + if (dp.CrlIssuer != null) + { + GeneralName[] genNames = dp.CrlIssuer.GetNames(); + for (int j = 0; j < genNames.Length; j++) + { + if (genNames[j].TagNo == GeneralName.DirectoryName) + { + try + { + if (Arrays.AreEqual(genNames[j].Name.GetEncoded(), issuerBytes)) + { + matchIssuer = true; + } + } + catch (IOException e) + { + throw new Exception( + "CRL issuer information from distribution point cannot be decoded.", e); + } + } + } + if (matchIssuer && !isIndirect) + { + throw new Exception("Distribution point contains cRLIssuer field but CRL is not indirect."); + } + if (!matchIssuer) + { + throw new Exception("CRL issuer of CRL does not match CRL issuer of distribution point."); + } + } + else + { + if (crl.IssuerDN.Equivalent(PkixCertPathValidatorUtilities.GetIssuerPrincipal(cert), true)) + { + matchIssuer = true; + } + } + if (!matchIssuer) + { + throw new Exception("Cannot find matching CRL issuer for certificate."); + } + } + + internal static ReasonsMask ProcessCrlD(X509Crl crl, DistributionPoint dp) + //throws AnnotatedException + { + IssuingDistributionPoint idp; + try + { + idp = IssuingDistributionPoint.GetInstance(PkixCertPathValidatorUtilities.GetExtensionValue(crl, X509Extensions.IssuingDistributionPoint)); + } + catch (Exception e) + { + throw new Exception("issuing distribution point extension could not be decoded.", e); + } + + // (d) (1) + if (idp != null && idp.OnlySomeReasons != null && dp.Reasons != null) + { + return new ReasonsMask(dp.Reasons.IntValue).Intersect(new ReasonsMask(idp.OnlySomeReasons.IntValue)); + } + // (d) (4) + if ((idp == null || idp.OnlySomeReasons == null) && dp.Reasons == null) + { + return ReasonsMask.AllReasons; + } + + // (d) (2) and (d)(3) + + ReasonsMask dpReasons; + if (dp.Reasons == null) + { + dpReasons = ReasonsMask.AllReasons; + } + else + { + dpReasons = new ReasonsMask(dp.Reasons.IntValue); + } + + ReasonsMask idpReasons; + if (idp == null) + { + idpReasons = ReasonsMask.AllReasons; + } + else + { + idpReasons = new ReasonsMask(idp.OnlySomeReasons.IntValue); + } + + return dpReasons.Intersect(idpReasons); + } + + /** + * Obtain and validate the certification path for the complete CRL issuer. + * If a key usage extension is present in the CRL issuer's certificate, + * verify that the cRLSign bit is set. + * + * @param crl CRL which contains revocation information for the certificate + * cert. + * @param cert The attribute certificate or certificate to check if it is + * revoked. + * @param defaultCRLSignCert The issuer certificate of the certificate cert. + * @param defaultCRLSignKey The public key of the issuer certificate + * defaultCRLSignCert. + * @param paramsPKIX paramsPKIX PKIX parameters. + * @param certPathCerts The certificates on the certification path. + * @return A Set with all keys of possible CRL issuer + * certificates. + * @throws AnnotatedException if the CRL is not valid or the status cannot be checked or + * some error occurs. + */ + internal static ISet ProcessCrlF( + X509Crl crl, + object cert, + X509Certificate defaultCRLSignCert, + AsymmetricKeyParameter defaultCRLSignKey, + PkixParameters paramsPKIX, + IList certPathCerts) + { + // (f) + + // get issuer from CRL + X509CertStoreSelector certSelector = new X509CertStoreSelector(); + try + { + certSelector.Subject = crl.IssuerDN; + } + catch (IOException e) + { + throw new Exception( + "Subject criteria for certificate selector to find issuer certificate for CRL could not be set.", e); + } + + // get CRL signing certs + var signingCerts = new HashSet(); + + try + { + CollectionUtilities.CollectMatches(signingCerts, certSelector, paramsPKIX.GetStoresCert()); + } + catch (Exception e) + { + throw new Exception("Issuer certificate for CRL cannot be searched.", e); + } + + signingCerts.Add(defaultCRLSignCert); + + + var validCerts = new List(); + var validKeys = new List(); + + foreach (X509Certificate signingCert in signingCerts) + { + /* + * CA of the certificate, for which this CRL is checked, has also + * signed CRL, so skip the path validation, because is already done + */ + if (signingCert.Equals(defaultCRLSignCert)) + { + validCerts.Add(signingCert); + validKeys.Add(defaultCRLSignKey); + continue; + } + try + { + PkixCertPathBuilder builder = new PkixCertPathBuilder(); + + certSelector = new X509CertStoreSelector(); + certSelector.Certificate = signingCert; + + PkixBuilderParameters parameters = PkixBuilderParameters.GetInstance(paramsPKIX); + parameters.SetTargetConstraintsCert(certSelector); + + /* + * if signingCert is placed not higher on the cert path a + * dependency loop results. CRL for cert is checked, but + * signingCert is needed for checking the CRL which is dependent + * on checking cert because it is higher in the cert path and so + * signing signingCert transitively. so, revocation is disabled, + * forgery attacks of the CRL are detected in this outer loop + * for all other it must be enabled to prevent forgery attacks + */ + if (certPathCerts.Contains(signingCert)) + { + parameters.IsRevocationEnabled = false; + } + else + { + parameters.IsRevocationEnabled = true; + } + var certs = builder.Build(parameters).CertPath.Certificates; + validCerts.Add(signingCert); + validKeys.Add(PkixCertPathValidatorUtilities.GetNextWorkingKey(certs, 0)); + } + catch (PkixCertPathBuilderException e) + { + throw new Exception("CertPath for CRL signer failed to validate.", e); + } + catch (PkixCertPathValidatorException e) + { + throw new Exception("Public key of issuer certificate of CRL could not be retrieved.", e); + } + } + + var checkKeys = new HashSet(); + + Exception lastException = null; + for (int i = 0; i < validCerts.Count; i++) + { + X509Certificate signCert = (X509Certificate)validCerts[i]; + bool[] keyusage = signCert.GetKeyUsage(); + + if (keyusage != null && (keyusage.Length < 7 || !keyusage[CRL_SIGN])) + { + lastException = new Exception( + "Issuer certificate key usage extension does not permit CRL signing."); + } + else + { + checkKeys.Add(validKeys[i]); + } + } + + if ((checkKeys.Count == 0) && lastException == null) + { + throw new Exception("Cannot find a valid issuer certificate."); + } + if ((checkKeys.Count == 0) && lastException != null) + { + throw lastException; + } + + return checkKeys; + } + + internal static AsymmetricKeyParameter ProcessCrlG(X509Crl crl, ISet keys) + { + Exception lastException = null; + foreach (AsymmetricKeyParameter key in keys) + { + try + { + crl.Verify(key); + return key; + } + catch (Exception e) + { + lastException = e; + } + } + throw new Exception("Cannot verify CRL.", lastException); + } + + internal static X509Crl ProcessCrlH(ISet deltaCrls, AsymmetricKeyParameter key) + { + Exception lastException = null; + foreach (X509Crl crl in deltaCrls) + { + try + { + crl.Verify(key); + return crl; + } + catch (Exception e) + { + lastException = e; + } + } + if (lastException != null) + { + throw new Exception("Cannot verify delta CRL.", lastException); + } + return null; + } + + /** + * Checks a distribution point for revocation information for the + * certificate cert. + * + * @param dp The distribution point to consider. + * @param paramsPKIX PKIX parameters. + * @param cert Certificate to check if it is revoked. + * @param validDate The date when the certificate revocation status should be + * checked. + * @param defaultCRLSignCert The issuer certificate of the certificate cert. + * @param defaultCRLSignKey The public key of the issuer certificate + * defaultCRLSignCert. + * @param certStatus The current certificate revocation status. + * @param reasonMask The reasons mask which is already checked. + * @param certPathCerts The certificates of the certification path. + * @throws AnnotatedException if the certificate is revoked or the status cannot be checked + * or some error occurs. + */ + private static void CheckCrl( + DistributionPoint dp, + PkixParameters paramsPKIX, + X509Certificate cert, + DateTime validDate, + X509Certificate defaultCRLSignCert, + AsymmetricKeyParameter defaultCRLSignKey, + CertStatus certStatus, + ReasonsMask reasonMask, + IList certPathCerts) + { + DateTime currentDate = DateTime.UtcNow; + + if (validDate.Ticks > currentDate.Ticks) + { + throw new Exception("Validation time is in future."); + } + + // (a) + /* + * We always get timely valid CRLs, so there is no step (a) (1). + * "locally cached" CRLs are assumed to be in getStore(), additional + * CRLs must be enabled in the ExtendedPKIXParameters and are in + * getAdditionalStore() + */ + + ISet crls = PkixCertPathValidatorUtilities.GetCompleteCrls(dp, cert, currentDate, paramsPKIX); + bool validCrlFound = false; + Exception lastException = null; + + var crl_iter = crls.GetEnumerator(); + + while (crl_iter.MoveNext() && certStatus.Status == CertStatus.Unrevoked && !reasonMask.IsAllReasons) + { + try + { + X509Crl crl = crl_iter.Current; + + // (d) + ReasonsMask interimReasonsMask = ProcessCrlD(crl, dp); + + // (e) + /* + * The reasons mask is updated at the end, so only valid CRLs + * can update it. If this CRL does not contain new reasons it + * must be ignored. + */ + if (!interimReasonsMask.HasNewReasons(reasonMask)) + { + continue; + } + + // (f) + var keys = ProcessCrlF(crl, cert, defaultCRLSignCert, defaultCRLSignKey, paramsPKIX, certPathCerts); + // (g) + AsymmetricKeyParameter key = ProcessCrlG(crl, keys); + + X509Crl deltaCRL = null; + + if (paramsPKIX.IsUseDeltasEnabled) + { + // get delta CRLs + ISet deltaCRLs = PkixCertPathValidatorUtilities.GetDeltaCrls(currentDate, paramsPKIX, crl); + // we only want one valid delta CRL + // (h) + deltaCRL = ProcessCrlH(deltaCRLs, key); + } + + /* + * CRL must be be valid at the current time, not the validation + * time. If a certificate is revoked with reason keyCompromise, + * cACompromise, it can be used for forgery, also for the past. + * This reason may not be contained in older CRLs. + */ + + /* + * in the chain model signatures stay valid also after the + * certificate has been expired, so they do not have to be in + * the CRL validity time + */ + + if (paramsPKIX.ValidityModel != PkixParameters.ChainValidityModel) + { + /* + * if a certificate has expired, but was revoked, it is not + * more in the CRL, so it would be regarded as valid if the + * first check is not done + */ + if (cert.NotAfter.Ticks < crl.ThisUpdate.Ticks) + { + throw new Exception("No valid CRL for current time found."); + } + } + + ProcessCrlB1(dp, cert, crl); + + // (b) (2) + ProcessCrlB2(dp, cert, crl); + + // (c) + ProcessCrlC(deltaCRL, crl, paramsPKIX); + + // (i) + ProcessCrlI(validDate, deltaCRL, cert, certStatus, paramsPKIX); + + // (j) + ProcessCrlJ(validDate, crl, cert, certStatus); + + // (k) + if (certStatus.Status == CrlReason.RemoveFromCrl) + { + certStatus.Status = CertStatus.Unrevoked; + } + + // update reasons mask + reasonMask.AddReasons(interimReasonsMask); + + var criticalExtensions = crl.GetCriticalExtensionOids(); + + if (criticalExtensions != null) + { + criticalExtensions = new HashSet(criticalExtensions); + criticalExtensions.Remove(X509Extensions.IssuingDistributionPoint.Id); + criticalExtensions.Remove(X509Extensions.DeltaCrlIndicator.Id); + + if (criticalExtensions.Count > 0) + throw new Exception("CRL contains unsupported critical extensions."); + } + + if (deltaCRL != null) + { + criticalExtensions = deltaCRL.GetCriticalExtensionOids(); + if (criticalExtensions != null) + { + criticalExtensions = new HashSet(criticalExtensions); + criticalExtensions.Remove(X509Extensions.IssuingDistributionPoint.Id); + criticalExtensions.Remove(X509Extensions.DeltaCrlIndicator.Id); + + if (criticalExtensions.Count > 0) + throw new Exception("Delta CRL contains unsupported critical extension."); + } + } + + validCrlFound = true; + } + catch (Exception e) + { + lastException = e; + } + } + if (!validCrlFound) + { + throw lastException; + } + } + + /** + * Checks a certificate if it is revoked. + * + * @param paramsPKIX PKIX parameters. + * @param cert Certificate to check if it is revoked. + * @param validDate The date when the certificate revocation status should be + * checked. + * @param sign The issuer certificate of the certificate cert. + * @param workingPublicKey The public key of the issuer certificate sign. + * @param certPathCerts The certificates of the certification path. + * @throws AnnotatedException if the certificate is revoked or the status cannot be checked + * or some error occurs. + */ + internal static void CheckCrls( + PkixParameters paramsPKIX, + X509Certificate cert, + DateTime validDate, + X509Certificate sign, + AsymmetricKeyParameter workingPublicKey, + IList certPathCerts) + { + Exception lastException = null; + CrlDistPoint crldp; + + try + { + crldp = CrlDistPoint.GetInstance(PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.CrlDistributionPoints)); + } + catch (Exception e) + { + throw new Exception("CRL distribution point extension could not be read.", e); + } + + try + { + PkixCertPathValidatorUtilities.AddAdditionalStoresFromCrlDistributionPoint(crldp, paramsPKIX); + } + catch (Exception e) + { + throw new Exception( + "No additional CRL locations could be decoded from CRL distribution point extension.", e); + } + CertStatus certStatus = new CertStatus(); + ReasonsMask reasonsMask = new ReasonsMask(); + + bool validCrlFound = false; + + // for each distribution point + if (crldp != null) + { + DistributionPoint[] dps; + try + { + dps = crldp.GetDistributionPoints(); + } + catch (Exception e) + { + throw new Exception("Distribution points could not be read.", e); + } + if (dps != null) + { + for (int i = 0; i < dps.Length && certStatus.Status == CertStatus.Unrevoked && !reasonsMask.IsAllReasons; i++) + { + PkixParameters paramsPKIXClone = (PkixParameters)paramsPKIX.Clone(); + try + { + CheckCrl(dps[i], paramsPKIXClone, cert, validDate, sign, workingPublicKey, certStatus, + reasonsMask, certPathCerts); + validCrlFound = true; + } + catch (Exception e) + { + lastException = e; + } + } + } + } + + /* + * If the revocation status has not been determined, repeat the process + * above with any available CRLs not specified in a distribution point + * but issued by the certificate issuer. + */ + + if (certStatus.Status == CertStatus.Unrevoked && !reasonsMask.IsAllReasons) + { + try + { + /* + * assume a DP with both the reasons and the cRLIssuer fields + * omitted and a distribution point name of the certificate + * issuer. + */ + X509Name issuer; + try + { + issuer = X509Name.GetInstance(cert.IssuerDN.GetEncoded()); + } + catch (Exception e) + { + throw new Exception("Issuer from certificate for CRL could not be reencoded.", e); + } + DistributionPoint dp = new DistributionPoint(new DistributionPointName(0, new GeneralNames( + new GeneralName(GeneralName.DirectoryName, issuer))), null, null); + PkixParameters paramsPKIXClone = (PkixParameters)paramsPKIX.Clone(); + + CheckCrl(dp, paramsPKIXClone, cert, validDate, sign, workingPublicKey, certStatus, reasonsMask, + certPathCerts); + + validCrlFound = true; + } + catch (Exception e) + { + lastException = e; + } + } + + if (!validCrlFound) + { + throw lastException; + } + if (certStatus.Status != CertStatus.Unrevoked) + { + // This format is enforced by the NistCertPath tests + string formattedDate = certStatus.RevocationDate.Value.ToString( + "ddd MMM dd HH:mm:ss K yyyy"); + string message = "Certificate revocation after " + formattedDate; + message += ", reason: " + CrlReasons[certStatus.Status]; + throw new Exception(message); + } + + if (!reasonsMask.IsAllReasons && certStatus.Status == CertStatus.Unrevoked) + { + certStatus.Status = CertStatus.Undetermined; + } + + if (certStatus.Status == CertStatus.Undetermined) + { + throw new Exception("Certificate status could not be determined."); + } + } + + /// + internal static PkixPolicyNode PrepareCertB(PkixCertPath certPath, int index, + IList[] policyNodes, PkixPolicyNode validPolicyTree, int policyMapping) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + int n = certs.Count; + // i as defined in the algorithm description + int i = n - index; + // (b) + // + Asn1Sequence pm; + try + { + pm = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.PolicyMappings)); + } + catch (Exception ex) + { + throw new PkixCertPathValidatorException( + "Policy mappings extension could not be decoded.", ex, index); + } + PkixPolicyNode _validPolicyTree = validPolicyTree; + if (pm != null) + { + Asn1Sequence mappings = pm; + var m_idp = new Dictionary>(); + var s_idp = new HashSet(); + + for (int j = 0; j < mappings.Count; j++) + { + Asn1Sequence mapping = (Asn1Sequence)mappings[j]; + string id_p = ((DerObjectIdentifier)mapping[0]).Id; + string sd_p = ((DerObjectIdentifier)mapping[1]).Id; + + ISet tmp; + if (m_idp.TryGetValue(id_p, out tmp)) + { + tmp.Add(sd_p); + } + else + { + tmp = new HashSet(); + tmp.Add(sd_p); + m_idp[id_p] = tmp; + s_idp.Add(id_p); + } + } + + foreach (var id_p in s_idp) + { + // + // (1) + // + if (policyMapping > 0) + { + bool idp_found = false; + + foreach (PkixPolicyNode node in policyNodes[i]) + { + if (node.ValidPolicy.Equals(id_p)) + { + idp_found = true; + node.ExpectedPolicies = CollectionUtilities.GetValueOrNull(m_idp, id_p); + break; + } + } + + if (!idp_found) + { + foreach (PkixPolicyNode node in policyNodes[i]) + { + if (ANY_POLICY.Equals(node.ValidPolicy)) + { + Asn1Sequence policies = null; + try + { + policies = (Asn1Sequence)PkixCertPathValidatorUtilities.GetExtensionValue(cert, + X509Extensions.CertificatePolicies); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Certificate policies extension could not be decoded.", e, index); + } + + ISet pq = null; + + foreach (Asn1Encodable ae in policies) + { + PolicyInformation pinfo = null; + try + { + pinfo = PolicyInformation.GetInstance(ae.ToAsn1Object()); + } + catch (Exception ex) + { + throw new PkixCertPathValidatorException( + "Policy information could not be decoded.", ex, index); + } + if (ANY_POLICY.Equals(pinfo.PolicyIdentifier.Id)) + { + try + { + pq = PkixCertPathValidatorUtilities + .GetQualifierSet(pinfo.PolicyQualifiers); + } + catch (PkixCertPathValidatorException ex) + { + throw new PkixCertPathValidatorException( + "Policy qualifier info set could not be decoded.", ex, index); + } + break; + } + } + bool ci = false; + var critExtOids = cert.GetCriticalExtensionOids(); + if (critExtOids != null) + { + ci = critExtOids.Contains(X509Extensions.CertificatePolicies.Id); + } + + PkixPolicyNode p_node = node.Parent; + if (ANY_POLICY.Equals(p_node.ValidPolicy)) + { + var c_node = new PkixPolicyNode(new List(), i, + CollectionUtilities.GetValueOrNull(m_idp, id_p), p_node, pq, id_p, ci); + p_node.AddChild(c_node); + policyNodes[i].Add(c_node); + } + break; + } + } + } + + // + // (2) + // + } + else if (policyMapping <= 0) + { + foreach (var node in new List(policyNodes[i])) + { + if (node.ValidPolicy.Equals(id_p)) + { + node.Parent.RemoveChild(node); + + for (int k = i - 1; k >= 0; k--) + { + foreach (var node2 in new List(policyNodes[k])) + { + if (!node2.HasChildren) + { + _validPolicyTree = PkixCertPathValidatorUtilities.RemovePolicyNode( + _validPolicyTree, policyNodes, node2); + + if (_validPolicyTree == null) + break; + } + } + } + } + } + } + } + } + return _validPolicyTree; + } + + internal static ISet[] ProcessCrlA1ii( + DateTime currentDate, + PkixParameters paramsPKIX, + X509Certificate cert, + X509Crl crl) + { + X509CrlStoreSelector crlselect = new X509CrlStoreSelector(); + crlselect.CertificateChecking = cert; + + try + { + var issuer = new List(); + issuer.Add(crl.IssuerDN); + crlselect.Issuers = issuer; + } + catch (IOException e) + { + throw new Exception("Cannot extract issuer from CRL." + e, e); + } + + crlselect.CompleteCrlEnabled = true; + ISet completeSet = CrlUtilities.FindCrls(crlselect, paramsPKIX, currentDate); + var deltaSet = new HashSet(); + + if (paramsPKIX.IsUseDeltasEnabled) + { + // get delta CRL(s) + try + { + deltaSet.UnionWith(PkixCertPathValidatorUtilities.GetDeltaCrls(currentDate, paramsPKIX, crl)); + } + catch (Exception e) + { + throw new Exception("Exception obtaining delta CRLs.", e); + } + } + + return new []{ completeSet, deltaSet }; + } + + internal static ISet ProcessCrlA1i( + DateTime currentDate, + PkixParameters paramsPKIX, + X509Certificate cert, + X509Crl crl) + { + var deltaSet = new HashSet(); + if (paramsPKIX.IsUseDeltasEnabled) + { + CrlDistPoint freshestCRL; + try + { + freshestCRL = CrlDistPoint.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.FreshestCrl)); + } + catch (Exception e) + { + throw new Exception("Freshest CRL extension could not be decoded from certificate.", e); + } + + if (freshestCRL == null) + { + try + { + freshestCRL = CrlDistPoint.GetInstance(PkixCertPathValidatorUtilities.GetExtensionValue(crl, + X509Extensions.FreshestCrl)); + } + catch (Exception e) + { + throw new Exception("Freshest CRL extension could not be decoded from CRL.", e); + } + } + if (freshestCRL != null) + { + try + { + PkixCertPathValidatorUtilities.AddAdditionalStoresFromCrlDistributionPoint(freshestCRL, + paramsPKIX); + } + catch (Exception e) + { + throw new Exception( + "No new delta CRL locations could be added from Freshest CRL extension.", e); + } + // get delta CRL(s) + try + { + deltaSet.UnionWith(PkixCertPathValidatorUtilities.GetDeltaCrls(currentDate, paramsPKIX, crl)); + } + catch (Exception e) + { + throw new Exception("Exception obtaining delta CRLs.", e); + } + } + } + return deltaSet; + } + + internal static void ProcessCertF( + PkixCertPath certPath, + int index, + PkixPolicyNode validPolicyTree, + int explicitPolicy) + { + // + // (f) + // + if (explicitPolicy <= 0 && validPolicyTree == null) + { + throw new PkixCertPathValidatorException( + "No valid policy tree found when one expected.", null, index); + } + } + + internal static void ProcessCertA( + PkixCertPath certPath, + PkixParameters paramsPKIX, + int index, + AsymmetricKeyParameter workingPublicKey, + X509Name workingIssuerName, + X509Certificate sign) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + // + // (a) verify + // + try + { + // (a) (1) + // + cert.Verify(workingPublicKey); + } + catch (GeneralSecurityException e) + { + throw new PkixCertPathValidatorException("Could not validate certificate signature.", e, index); + } + + try + { + // (a) (2) + // + cert.CheckValidity(PkixCertPathValidatorUtilities + .GetValidCertDateFromValidityModel(paramsPKIX, certPath, index)); + } + catch (CertificateExpiredException e) + { + throw new PkixCertPathValidatorException("Could not validate certificate: " + e.Message, e, index); + } + catch (CertificateNotYetValidException e) + { + throw new PkixCertPathValidatorException("Could not validate certificate: " + e.Message, e, index); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Could not validate time of certificate.", e, index); + } + + // + // (a) (3) + // + if (paramsPKIX.IsRevocationEnabled) + { + try + { + CheckCrls(paramsPKIX, cert, PkixCertPathValidatorUtilities.GetValidCertDateFromValidityModel(paramsPKIX, + certPath, index), sign, workingPublicKey, certs); + } + catch (Exception e) + { + Exception cause = e.InnerException; + if (cause == null) + { + cause = e; + } + throw new PkixCertPathValidatorException(e.Message, cause, index); + } + } + + // + // (a) (4) name chaining + // + X509Name issuer = PkixCertPathValidatorUtilities.GetIssuerPrincipal(cert); + if (!issuer.Equivalent(workingIssuerName, true)) + { + throw new PkixCertPathValidatorException("IssuerName(" + issuer + + ") does not match SubjectName(" + workingIssuerName + ") of signing certificate.", null, index); + } + } + + internal static int PrepareNextCertI1(PkixCertPath certPath, int index, int explicitPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + // + // (i) + // + Asn1Sequence pc; + try + { + pc = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.PolicyConstraints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Policy constraints extension cannot be decoded.", e, index); + } + + if (pc != null) + { + foreach (var policyConstraint in pc) + { + try + { + Asn1TaggedObject constraint = Asn1TaggedObject.GetInstance(policyConstraint); + if (constraint.HasContextTag(0)) + { + int tmpInt = DerInteger.GetInstance(constraint, false).IntValueExact; + if (tmpInt < explicitPolicy) + return tmpInt; + + break; + } + } + catch (ArgumentException e) + { + throw new PkixCertPathValidatorException( + "Policy constraints extension contents cannot be decoded.", e, index); + } + } + } + return explicitPolicy; + } + + /// + internal static int PrepareNextCertI2( + PkixCertPath certPath, + int index, + int policyMapping) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (i) + // + Asn1Sequence pc = null; + try + { + pc = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.PolicyConstraints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Policy constraints extension cannot be decoded.", e, index); + } + + if (pc != null) + { + foreach (var policyConstraint in pc) + { + try + { + Asn1TaggedObject constraint = Asn1TaggedObject.GetInstance(policyConstraint); + if (constraint.HasContextTag(1)) + { + int tmpInt = DerInteger.GetInstance(constraint, false).IntValueExact; + if (tmpInt < policyMapping) + return tmpInt; + + break; + } + } + catch (ArgumentException e) + { + throw new PkixCertPathValidatorException( + "Policy constraints extension contents cannot be decoded.", e, index); + } + } + } + return policyMapping; + } + + /// + internal static void PrepareNextCertG( + PkixCertPath certPath, + int index, + PkixNameConstraintValidator nameConstraintValidator) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (g) handle the name constraints extension + // + NameConstraints nc = null; + try + { + Asn1Sequence ncSeq = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.NameConstraints)); + if (ncSeq != null) + { + nc = new NameConstraints(ncSeq); + } + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Name constraints extension could not be decoded.", e, index); + } + if (nc != null) + { + // + // (g) (1) permitted subtrees + // + Asn1Sequence permitted = nc.PermittedSubtrees; + if (permitted != null) + { + try + { + nameConstraintValidator.IntersectPermittedSubtree(permitted); + } + catch (Exception ex) + { + throw new PkixCertPathValidatorException( + "Permitted subtrees cannot be build from name constraints extension.", ex, index); + } + } + + // + // (g) (2) excluded subtrees + // + Asn1Sequence excluded = nc.ExcludedSubtrees; + if (excluded != null) + { + try + { + foreach (var excludedSubtree in excluded) + { + GeneralSubtree subtree = GeneralSubtree.GetInstance(excludedSubtree); + nameConstraintValidator.AddExcludedSubtree(subtree); + } + } + catch (Exception ex) + { + throw new PkixCertPathValidatorException( + "Excluded subtrees cannot be build from name constraints extension.", ex, index); + } + } + } + } + + /// + internal static int PrepareNextCertJ( + PkixCertPath certPath, + int index, + int inhibitAnyPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (j) + // + DerInteger iap = null; + try + { + iap = DerInteger.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.InhibitAnyPolicy)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Inhibit any-policy extension cannot be decoded.", e, index); + } + + if (iap != null) + { + int _inhibitAnyPolicy = iap.IntValueExact; + + if (_inhibitAnyPolicy < inhibitAnyPolicy) + return _inhibitAnyPolicy; + } + return inhibitAnyPolicy; + } + + /// + internal static void PrepareNextCertK( + PkixCertPath certPath, + int index) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + // + // (k) + // + BasicConstraints bc; + try + { + bc = BasicConstraints.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.BasicConstraints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Basic constraints extension cannot be decoded.", e, index); + } + if (bc != null) + { + if (!(bc.IsCA())) + throw new PkixCertPathValidatorException("Not a CA certificate"); + } + else + { + throw new PkixCertPathValidatorException("Intermediate certificate lacks BasicConstraints"); + } + } + + /// + internal static int PrepareNextCertL( + PkixCertPath certPath, + int index, + int maxPathLength) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + // + // (l) + // + if (!PkixCertPathValidatorUtilities.IsSelfIssued(cert)) + { + if (maxPathLength <= 0) + throw new PkixCertPathValidatorException("Max path length not greater than zero", null, index); + + return maxPathLength - 1; + } + return maxPathLength; + } + + /// + internal static int PrepareNextCertM( + PkixCertPath certPath, + int index, + int maxPathLength) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (m) + // + BasicConstraints bc; + try + { + bc = BasicConstraints.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.BasicConstraints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Basic constraints extension cannot be decoded.", e, index); + } + if (bc != null) + { + BigInteger _pathLengthConstraint = bc.PathLenConstraint; + + if (_pathLengthConstraint != null) + { + int _plc = _pathLengthConstraint.IntValue; + + if (_plc < maxPathLength) + { + return _plc; + } + } + } + return maxPathLength; + } + + /// + internal static void PrepareNextCertN( + PkixCertPath certPath, + int index) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (n) + // + bool[] _usage = cert.GetKeyUsage(); + + if ((_usage != null) && !_usage[KEY_CERT_SIGN]) + { + throw new PkixCertPathValidatorException( + "Issuer certificate keyusage extension is critical and does not permit key signing.", null, index); + } + } + + /// + internal static void PrepareNextCertO(PkixCertPath certPath, int index, ISet criticalExtensions, + IList checkers) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (o) + // + foreach (var checker in checkers) + { + try + { + checker.Check(cert, criticalExtensions); + } + catch (PkixCertPathValidatorException e) + { + throw new PkixCertPathValidatorException(e.Message, e.InnerException, index); + } + } + if (criticalExtensions.Count > 0) + { + throw new PkixCertPathValidatorException("Certificate has unsupported critical extension.", null, index); + } + } + + internal static int PrepareNextCertH1( + PkixCertPath certPath, + int index, + int explicitPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (h) + // + if (!PkixCertPathValidatorUtilities.IsSelfIssued(cert)) + { + // + // (1) + // + if (explicitPolicy != 0) + return explicitPolicy - 1; + } + return explicitPolicy; + } + + internal static int PrepareNextCertH2( + PkixCertPath certPath, + int index, + int policyMapping) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (h) + // + if (!PkixCertPathValidatorUtilities.IsSelfIssued(cert)) + { + // + // (2) + // + if (policyMapping != 0) + return policyMapping - 1; + } + return policyMapping; + } + + + internal static int PrepareNextCertH3( + PkixCertPath certPath, + int index, + int inhibitAnyPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (h) + // + if (!PkixCertPathValidatorUtilities.IsSelfIssued(cert)) + { + // + // (3) + // + if (inhibitAnyPolicy != 0) + return inhibitAnyPolicy - 1; + } + return inhibitAnyPolicy; + } + + internal static int WrapupCertA( + int explicitPolicy, + X509Certificate cert) + { + // + // (a) + // + if (!PkixCertPathValidatorUtilities.IsSelfIssued(cert) && (explicitPolicy != 0)) + { + explicitPolicy--; + } + return explicitPolicy; + } + + /// + internal static int WrapupCertB( + PkixCertPath certPath, + int index, + int explicitPolicy) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (b) + // + Asn1Sequence pc; + try + { + pc = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.PolicyConstraints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Policy constraints could not be decoded.", e, index); + } + + if (pc != null) + { + foreach (var policyConstraint in pc) + { + Asn1TaggedObject constraint = Asn1TaggedObject.GetInstance(policyConstraint); + if (constraint.HasContextTag(0)) + { + int tmpInt; + try + { + tmpInt = DerInteger.GetInstance(constraint, false).IntValueExact; + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Policy constraints requireExplicitPolicy field could not be decoded.", e, index); + } + if (tmpInt == 0) + return 0; + + break; + } + } + } + return explicitPolicy; + } + + /// + internal static void WrapupCertF(PkixCertPath certPath, int index, IList checkers, + ISet criticalExtensions) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + foreach (var checker in checkers) + { + try + { + checker.Check(cert, criticalExtensions); + } + catch (PkixCertPathValidatorException e) + { + throw new PkixCertPathValidatorException("Additional certificate path checker failed.", e, index); + } + } + + if (criticalExtensions.Count > 0) + { + throw new PkixCertPathValidatorException("Certificate has unsupported critical extension", + null, index); + } + } + + internal static PkixPolicyNode WrapupCertG(PkixCertPath certPath, PkixParameters paramsPKIX, + ISet userInitialPolicySet, int index, IList[] policyNodes, + PkixPolicyNode validPolicyTree, ISet acceptablePolicies) + { + int n = certPath.Certificates.Count; + + // + // (g) + // + PkixPolicyNode intersection; + + // + // (g) (i) + // + if (validPolicyTree == null) + { + if (paramsPKIX.IsExplicitPolicyRequired) + { + throw new PkixCertPathValidatorException( + "Explicit policy requested but none available.", null, index); + } + intersection = null; + } + else if (PkixCertPathValidatorUtilities.IsAnyPolicy(userInitialPolicySet)) // (g) (ii) + { + if (paramsPKIX.IsExplicitPolicyRequired) + { + if (acceptablePolicies.Count < 1) + { + throw new PkixCertPathValidatorException( + "Explicit policy requested but none available.", null, index); + } + + var _validPolicyNodeSet = new HashSet(); + + foreach (var _nodeDepth in policyNodes) + { + foreach (var _node in _nodeDepth) + { + if (ANY_POLICY.Equals(_node.ValidPolicy)) + { + foreach (var o in _node.Children) + { + _validPolicyNodeSet.Add(o); + } + } + } + } + + foreach (var _node in _validPolicyNodeSet) + { + if (!acceptablePolicies.Contains(_node.ValidPolicy)) + { + // TODO? + // validPolicyTree = + // removePolicyNode(validPolicyTree, policyNodes, + // _node); + } + } + if (validPolicyTree != null) + { + for (int j = n - 1; j >= 0; j--) + { + var nodes = policyNodes[j]; + + for (int k = 0; k < nodes.Count; k++) + { + var node = nodes[k]; + if (!node.HasChildren) + { + validPolicyTree = PkixCertPathValidatorUtilities.RemovePolicyNode( + validPolicyTree, policyNodes, node); + } + } + } + } + } + + intersection = validPolicyTree; + } + else + { + // + // (g) (iii) + // + // This implementation is not exactly same as the one described in + // RFC3280. + // However, as far as the validation result is concerned, both + // produce + // adequate result. The only difference is whether AnyPolicy is + // remain + // in the policy tree or not. + // + // (g) (iii) 1 + // + var _validPolicyNodeSet = new HashSet(); + + foreach (var _nodeDepth in policyNodes) + { + foreach (var _node in _nodeDepth) + { + if (ANY_POLICY.Equals(_node.ValidPolicy)) + { + foreach (PkixPolicyNode _c_node in _node.Children) + { + if (!ANY_POLICY.Equals(_c_node.ValidPolicy)) + { + _validPolicyNodeSet.Add(_c_node); + } + } + } + } + } + + // + // (g) (iii) 2 + // + foreach (var _node in _validPolicyNodeSet) + { + if (!userInitialPolicySet.Contains(_node.ValidPolicy)) + { + validPolicyTree = PkixCertPathValidatorUtilities.RemovePolicyNode(validPolicyTree, policyNodes, + _node); + } + } + + // + // (g) (iii) 4 + // + if (validPolicyTree != null) + { + for (int j = n - 1; j >= 0; j--) + { + var nodes = policyNodes[j]; + + for (int k = 0; k < nodes.Count; k++) + { + var node = nodes[k]; + if (!node.HasChildren) + { + validPolicyTree = PkixCertPathValidatorUtilities.RemovePolicyNode(validPolicyTree, + policyNodes, node); + } + } + } + } + + intersection = validPolicyTree; + } + return intersection; + } + + /** + * If use-deltas is set, verify the issuer and scope of the delta CRL. + * + * @param deltaCRL The delta CRL. + * @param completeCRL The complete CRL. + * @param pkixParams The PKIX paramaters. + * @throws AnnotatedException if an exception occurs. + */ + internal static void ProcessCrlC( + X509Crl deltaCRL, + X509Crl completeCRL, + PkixParameters pkixParams) + { + if (deltaCRL == null) + return; + + IssuingDistributionPoint completeidp = null; + try + { + completeidp = IssuingDistributionPoint.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(completeCRL, X509Extensions.IssuingDistributionPoint)); + } + catch (Exception e) + { + throw new Exception("000 Issuing distribution point extension could not be decoded.", e); + } + + if (pkixParams.IsUseDeltasEnabled) + { + // (c) (1) + if (!deltaCRL.IssuerDN.Equivalent(completeCRL.IssuerDN, true)) + throw new Exception("Complete CRL issuer does not match delta CRL issuer."); + + // (c) (2) + IssuingDistributionPoint deltaidp = null; + try + { + deltaidp = IssuingDistributionPoint.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(deltaCRL, X509Extensions.IssuingDistributionPoint)); + } + catch (Exception e) + { + throw new Exception( + "Issuing distribution point extension from delta CRL could not be decoded.", e); + } + + if (!Org.BouncyCastle.Utilities.Platform.Equals(completeidp, deltaidp)) + { + throw new Exception( + "Issuing distribution point extension from delta CRL and complete CRL does not match."); + } + + // (c) (3) + Asn1Object completeKeyIdentifier = null; + try + { + completeKeyIdentifier = PkixCertPathValidatorUtilities.GetExtensionValue( + completeCRL, X509Extensions.AuthorityKeyIdentifier); + } + catch (Exception e) + { + throw new Exception( + "Authority key identifier extension could not be extracted from complete CRL.", e); + } + + Asn1Object deltaKeyIdentifier = null; + try + { + deltaKeyIdentifier = PkixCertPathValidatorUtilities.GetExtensionValue( + deltaCRL, X509Extensions.AuthorityKeyIdentifier); + } + catch (Exception e) + { + throw new Exception( + "Authority key identifier extension could not be extracted from delta CRL.", e); + } + + if (completeKeyIdentifier == null) + throw new Exception("CRL authority key identifier is null."); + + if (deltaKeyIdentifier == null) + throw new Exception("Delta CRL authority key identifier is null."); + + if (!completeKeyIdentifier.Equals(deltaKeyIdentifier)) + { + throw new Exception( + "Delta CRL authority key identifier does not match complete CRL authority key identifier."); + } + } + } + + internal static void ProcessCrlI( + DateTime validDate, + X509Crl deltacrl, + object cert, + CertStatus certStatus, + PkixParameters pkixParams) + { + if (pkixParams.IsUseDeltasEnabled && deltacrl != null) + { + PkixCertPathValidatorUtilities.GetCertStatus(validDate, deltacrl, cert, certStatus); + } + } + + internal static void ProcessCrlJ( + DateTime validDate, + X509Crl completecrl, + object cert, + CertStatus certStatus) + { + if (certStatus.Status == CertStatus.Unrevoked) + { + PkixCertPathValidatorUtilities.GetCertStatus(validDate, completecrl, cert, certStatus); + } + } + + internal static PkixPolicyNode ProcessCertE( + PkixCertPath certPath, + int index, + PkixPolicyNode validPolicyTree) + { + var certs = certPath.Certificates; + X509Certificate cert = certs[index]; + + // + // (e) + // + Asn1Sequence certPolicies = null; + try + { + certPolicies = Asn1Sequence.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(cert, X509Extensions.CertificatePolicies)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Could not read certificate policies extension from certificate.", + e, index); + } + if (certPolicies == null) + { + validPolicyTree = null; + } + return validPolicyTree; + } + + internal static readonly string[] CrlReasons = new string[] + { + "unspecified", + "keyCompromise", + "cACompromise", + "affiliationChanged", + "superseded", + "cessationOfOperation", + "certificateHold", + "unknown", + "removeFromCRL", + "privilegeWithdrawn", + "aACompromise" + }; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs.meta new file mode 100644 index 00000000..f1d9249a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 178da0e259332774883474322ed3f654 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3280CertPathUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs new file mode 100644 index 00000000..92c80618 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs @@ -0,0 +1,578 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + internal static class Rfc3281CertPathUtilities + { + internal static void ProcessAttrCert7( + X509V2AttributeCertificate attrCert, + PkixCertPath certPath, + PkixCertPath holderCertPath, + PkixParameters pkixParams) + { + // TODO: + // AA Controls + // Attribute encryption + // Proxy + var critExtOids = attrCert.GetCriticalExtensionOids(); + + // 7.1 + // process extensions + + // target information checked in step 6 / X509AttributeCertStoreSelector + if (critExtOids.Contains(X509Extensions.TargetInformation.Id)) + { + try + { + TargetInformation.GetInstance(PkixCertPathValidatorUtilities + .GetExtensionValue(attrCert, X509Extensions.TargetInformation)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Target information extension could not be read.", e); + } + } + critExtOids.Remove(X509Extensions.TargetInformation.Id); + foreach (PkixAttrCertChecker checker in pkixParams.GetAttrCertCheckers()) + { + checker.Check(attrCert, certPath, holderCertPath, critExtOids); + } + if (critExtOids.Count > 0) + { + throw new PkixCertPathValidatorException( + "Attribute certificate contains unsupported critical extensions: " + critExtOids); + } + } + + /** + * Checks if an attribute certificate is revoked. + * + * @param attrCert Attribute certificate to check if it is revoked. + * @param paramsPKIX PKIX parameters. + * @param issuerCert The issuer certificate of the attribute certificate + * attrCert. + * @param validDate The date when the certificate revocation status should + * be checked. + * @param certPathCerts The certificates of the certification path to be + * checked. + * + * @throws CertPathValidatorException if the certificate is revoked or the + * status cannot be checked or some error occurs. + */ + internal static void CheckCrls( + X509V2AttributeCertificate attrCert, + PkixParameters paramsPKIX, + X509Certificate issuerCert, + DateTime validDate, + IList certPathCerts) + { + if (!paramsPKIX.IsRevocationEnabled) + return; + + // check if revocation is available + if (attrCert.GetExtensionValue(X509Extensions.NoRevAvail) != null) + { + if (attrCert.GetExtensionValue(X509Extensions.CrlDistributionPoints) != null || + attrCert.GetExtensionValue(X509Extensions.AuthorityInfoAccess) != null) + { + throw new PkixCertPathValidatorException( + "No rev avail extension is set, but also an AC revocation pointer."); + } + + return; + } + + CrlDistPoint crldp; + try + { + crldp = CrlDistPoint.GetInstance( + PkixCertPathValidatorUtilities.GetExtensionValue(attrCert, X509Extensions.CrlDistributionPoints)); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("CRL distribution point extension could not be read.", e); + } + + try + { + PkixCertPathValidatorUtilities.AddAdditionalStoresFromCrlDistributionPoint(crldp, paramsPKIX); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "No additional CRL locations could be decoded from CRL distribution point extension.", e); + } + + CertStatus certStatus = new CertStatus(); + ReasonsMask reasonsMask = new ReasonsMask(); + + Exception lastException = null; + bool validCrlFound = false; + // for each distribution point + if (crldp != null) + { + DistributionPoint[] dps; + try + { + dps = crldp.GetDistributionPoints(); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException("Distribution points could not be read.", e); + } + try + { + for (int i = 0; + i < dps.Length && certStatus.Status == CertStatus.Unrevoked && !reasonsMask.IsAllReasons; + i++) + { + PkixParameters paramsPKIXClone = (PkixParameters)paramsPKIX.Clone(); + CheckCrl(dps[i], attrCert, paramsPKIXClone,validDate, issuerCert, certStatus, reasonsMask, + certPathCerts); + validCrlFound = true; + } + } + catch (Exception e) + { + lastException = new Exception("No valid CRL for distribution point found.", e); + } + } + + /* + * If the revocation status has not been determined, repeat the + * process above with any available CRLs not specified in a + * distribution point but issued by the certificate issuer. + */ + + if (certStatus.Status == CertStatus.Unrevoked && !reasonsMask.IsAllReasons) + { + try + { + /* + * assume a DP with both the reasons and the cRLIssuer + * fields omitted and a distribution point name of the + * certificate issuer. + */ + X509Name issuer; + try + { + issuer = X509Name.GetInstance(attrCert.Issuer.GetPrincipals()[0].GetEncoded()); + } + catch (Exception e) + { + throw new Exception("Issuer from certificate for CRL could not be reencoded.", e); + } + DistributionPoint dp = new DistributionPoint( + new DistributionPointName(0, new GeneralNames( + new GeneralName(GeneralName.DirectoryName, issuer))), null, null); + PkixParameters paramsPKIXClone = (PkixParameters) paramsPKIX.Clone(); + CheckCrl(dp, attrCert, paramsPKIXClone, validDate, + issuerCert, certStatus, reasonsMask, certPathCerts); + validCrlFound = true; + } + catch (Exception e) + { + lastException = new Exception("No valid CRL for distribution point found.", e); + } + } + + if (!validCrlFound) + throw new PkixCertPathValidatorException("No valid CRL found.", lastException); + + if (certStatus.Status != CertStatus.Unrevoked) + { + // This format is enforced by the NistCertPath tests + string formattedDate = certStatus.RevocationDate.Value.ToString("ddd MMM dd HH:mm:ss K yyyy"); + string message = "Attribute certificate revocation after " + formattedDate + ", reason: " + + Rfc3280CertPathUtilities.CrlReasons[certStatus.Status]; + throw new PkixCertPathValidatorException(message); + } + if (!reasonsMask.IsAllReasons + && certStatus.Status == CertStatus.Unrevoked) + { + certStatus.Status = CertStatus.Undetermined; + } + if (certStatus.Status == CertStatus.Undetermined) + { + throw new PkixCertPathValidatorException( + "Attribute certificate status could not be determined."); + } + } + + internal static void AdditionalChecks( + X509V2AttributeCertificate attrCert, + PkixParameters pkixParams) + { + // 1 + foreach (string oid in pkixParams.GetProhibitedACAttributes()) + { + if (attrCert.GetAttributes(oid) != null) + { + throw new PkixCertPathValidatorException( + "Attribute certificate contains prohibited attribute: " + + oid + "."); + } + } + foreach (string oid in pkixParams.GetNecessaryACAttributes()) + { + if (attrCert.GetAttributes(oid) == null) + { + throw new PkixCertPathValidatorException( + "Attribute certificate does not contain necessary attribute: " + + oid + "."); + } + } + } + + internal static void ProcessAttrCert5( + X509V2AttributeCertificate attrCert, + PkixParameters pkixParams) + { + try + { + attrCert.CheckValidity(PkixCertPathValidatorUtilities.GetValidDate(pkixParams)); + } + catch (CertificateExpiredException e) + { + throw new PkixCertPathValidatorException( + "Attribute certificate is not valid.", e); + } + catch (CertificateNotYetValidException e) + { + throw new PkixCertPathValidatorException( + "Attribute certificate is not valid.", e); + } + } + + internal static void ProcessAttrCert4( + X509Certificate acIssuerCert, + PkixParameters pkixParams) + { + var set = pkixParams.GetTrustedACIssuers(); + bool trusted = false; + foreach (TrustAnchor anchor in set) + { + var symbols = X509Name.RFC2253Symbols; + if (acIssuerCert.SubjectDN.ToString(false, symbols).Equals(anchor.CAName) + || acIssuerCert.Equals(anchor.TrustedCert)) + { + trusted = true; + } + } + if (!trusted) + { + throw new PkixCertPathValidatorException( + "Attribute certificate issuer is not directly trusted."); + } + } + + internal static void ProcessAttrCert3( + X509Certificate acIssuerCert, + PkixParameters pkixParams) + { + if (acIssuerCert.GetKeyUsage() != null + && (!acIssuerCert.GetKeyUsage()[0] && !acIssuerCert.GetKeyUsage()[1])) + { + throw new PkixCertPathValidatorException( + "Attribute certificate issuer public key cannot be used to validate digital signatures."); + } + if (acIssuerCert.GetBasicConstraints() != -1) + { + throw new PkixCertPathValidatorException( + "Attribute certificate issuer is also a public key certificate issuer."); + } + } + + internal static PkixCertPathValidatorResult ProcessAttrCert2( + PkixCertPath certPath, + PkixParameters pkixParams) + { + PkixCertPathValidator validator = new PkixCertPathValidator(); + + try + { + return validator.Validate(certPath, pkixParams); + } + catch (PkixCertPathValidatorException e) + { + throw new PkixCertPathValidatorException( + "Certification path for issuer certificate of attribute certificate could not be validated.", + e); + } + } + + /** + * Searches for a holder public key certificate and verifies its + * certification path. + * + * @param attrCert the attribute certificate. + * @param pkixParams The PKIX parameters. + * @return The certificate path of the holder certificate. + * @throws Exception if + *
      + *
    • no public key certificate can be found although holder + * information is given by an entity name or a base certificate + * ID
    • + *
    • support classes cannot be created
    • + *
    • no certification path for the public key certificate can + * be built
    • + *
    + */ + internal static PkixCertPath ProcessAttrCert1( + X509V2AttributeCertificate attrCert, + PkixParameters pkixParams) + { + PkixCertPathBuilderResult result = null; + // find holder PKCs + var holderPKCs = new HashSet(); + if (attrCert.Holder.GetIssuer() != null) + { + X509CertStoreSelector selector = new X509CertStoreSelector(); + selector.SerialNumber = attrCert.Holder.SerialNumber; + X509Name[] principals = attrCert.Holder.GetIssuer(); + for (int i = 0; i < principals.Length; i++) + { + // TODO Replace loop with a single multiprincipal selector (or don't even use selector) + try + { + selector.Issuer = principals[i]; + + CollectionUtilities.CollectMatches(holderPKCs, selector, pkixParams.GetStoresCert()); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Public key certificate for attribute certificate cannot be searched.", + e); + } + } + if (holderPKCs.Count < 1) + { + throw new PkixCertPathValidatorException( + "Public key certificate specified in base certificate ID for attribute certificate cannot be found."); + } + } + if (attrCert.Holder.GetEntityNames() != null) + { + X509CertStoreSelector selector = new X509CertStoreSelector(); + X509Name[] principals = attrCert.Holder.GetEntityNames(); + for (int i = 0; i < principals.Length; i++) + { + // TODO Replace loop with a single multiprincipal selector (or don't even use selector) + try + { + selector.Issuer = principals[i]; + + CollectionUtilities.CollectMatches(holderPKCs, selector, pkixParams.GetStoresCert()); + } + catch (Exception e) + { + throw new PkixCertPathValidatorException( + "Public key certificate for attribute certificate cannot be searched.", + e); + } + } + if (holderPKCs.Count < 1) + { + throw new PkixCertPathValidatorException( + "Public key certificate specified in entity name for attribute certificate cannot be found."); + } + } + + // verify cert paths for PKCs + PkixBuilderParameters parameters = PkixBuilderParameters.GetInstance(pkixParams); + + PkixCertPathValidatorException lastException = null; + foreach (X509Certificate cert in holderPKCs) + { + X509CertStoreSelector certSelector = new X509CertStoreSelector(); + certSelector.Certificate = cert; + + parameters.SetTargetConstraintsCert(certSelector); + + PkixCertPathBuilder builder = new PkixCertPathBuilder(); + + try + { + result = builder.Build(parameters); + } + catch (PkixCertPathBuilderException e) + { + lastException = new PkixCertPathValidatorException( + "Certification path for public key certificate of attribute certificate could not be build.", + e); + } + } + if (lastException != null) + { + throw lastException; + } + return result.CertPath; + } + + /** + * + * Checks a distribution point for revocation information for the + * certificate attrCert. + * + * @param dp The distribution point to consider. + * @param attrCert The attribute certificate which should be checked. + * @param paramsPKIX PKIX parameters. + * @param validDate The date when the certificate revocation status should + * be checked. + * @param issuerCert Certificate to check if it is revoked. + * @param reasonMask The reasons mask which is already checked. + * @param certPathCerts The certificates of the certification path to be + * checked. + * @throws Exception if the certificate is revoked or the status + * cannot be checked or some error occurs. + */ + private static void CheckCrl( + DistributionPoint dp, + X509V2AttributeCertificate attrCert, + PkixParameters paramsPKIX, + DateTime validDate, + X509Certificate issuerCert, + CertStatus certStatus, + ReasonsMask reasonMask, + IList certPathCerts) + { + /* + * 4.3.6 No Revocation Available + * + * The noRevAvail extension, defined in [X.509-2000], allows an AC + * issuer to indicate that no revocation information will be made + * available for this AC. + */ + if (attrCert.GetExtensionValue(X509Extensions.NoRevAvail) != null) + return; + + DateTime currentDate = DateTime.UtcNow; + if (validDate.CompareTo(currentDate) > 0) + throw new Exception("Validation time is in future."); + + // (a) + /* + * We always get timely valid CRLs, so there is no step (a) (1). + * "locally cached" CRLs are assumed to be in getStore(), additional + * CRLs must be enabled in the ExtendedPkixParameters and are in + * getAdditionalStore() + */ + var crls = PkixCertPathValidatorUtilities.GetCompleteCrls(dp, attrCert, currentDate, paramsPKIX); + bool validCrlFound = false; + Exception lastException = null; + + var crl_iter = crls.GetEnumerator(); + + while (crl_iter.MoveNext() + && certStatus.Status == CertStatus.Unrevoked + && !reasonMask.IsAllReasons) + { + try + { + X509Crl crl = crl_iter.Current; + + // (d) + ReasonsMask interimReasonsMask = Rfc3280CertPathUtilities.ProcessCrlD(crl, dp); + + // (e) + /* + * The reasons mask is updated at the end, so only valid CRLs + * can update it. If this CRL does not contain new reasons it + * must be ignored. + */ + if (!interimReasonsMask.HasNewReasons(reasonMask)) + continue; + + // (f) + var keys = Rfc3280CertPathUtilities.ProcessCrlF(crl, attrCert,null, null, paramsPKIX, + certPathCerts); + + // (g) + AsymmetricKeyParameter pubKey = Rfc3280CertPathUtilities.ProcessCrlG(crl, keys); + + X509Crl deltaCRL = null; + + if (paramsPKIX.IsUseDeltasEnabled) + { + // get delta CRLs + var deltaCRLs = PkixCertPathValidatorUtilities.GetDeltaCrls(currentDate, paramsPKIX, crl); + + // we only want one valid delta CRL + // (h) + deltaCRL = Rfc3280CertPathUtilities.ProcessCrlH(deltaCRLs, pubKey); + } + + /* + * CRL must be be valid at the current time, not the validation + * time. If a certificate is revoked with reason keyCompromise, + * cACompromise, it can be used for forgery, also for the past. + * This reason may not be contained in older CRLs. + */ + + /* + * in the chain model signatures stay valid also after the + * certificate has been expired, so they do not have to be in + * the CRL vality time + */ + if (paramsPKIX.ValidityModel != PkixParameters.ChainValidityModel) + { + /* + * if a certificate has expired, but was revoked, it is not + * more in the CRL, so it would be regarded as valid if the + * first check is not done + */ + if (attrCert.NotAfter.CompareTo(crl.ThisUpdate) < 0) + throw new Exception("No valid CRL for current time found."); + } + + Rfc3280CertPathUtilities.ProcessCrlB1(dp, attrCert, crl); + + // (b) (2) + Rfc3280CertPathUtilities.ProcessCrlB2(dp, attrCert, crl); + + // (c) + Rfc3280CertPathUtilities.ProcessCrlC(deltaCRL, crl, paramsPKIX); + + // (i) + Rfc3280CertPathUtilities.ProcessCrlI(validDate, deltaCRL, + attrCert, certStatus, paramsPKIX); + + // (j) + Rfc3280CertPathUtilities.ProcessCrlJ(validDate, crl, attrCert, + certStatus); + + // (k) + if (certStatus.Status == CrlReason.RemoveFromCrl) + { + certStatus.Status = CertStatus.Unrevoked; + } + + // update reasons mask + reasonMask.AddReasons(interimReasonsMask); + validCrlFound = true; + } + catch (Exception e) + { + lastException = e; + } + } + + if (!validCrlFound) + throw lastException; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs.meta new file mode 100644 index 00000000..8871d226 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b86abfedca8980341ad49d20c1489cc8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/Rfc3281CertPathUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs new file mode 100644 index 00000000..baec46c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs @@ -0,0 +1,261 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkix +{ + /// + /// A trust anchor or most-trusted Certification Authority (CA). + /// + /// This class represents a "most-trusted CA", which is used as a trust anchor + /// for validating X.509 certification paths. A most-trusted CA includes the + /// public key of the CA, the CA's name, and any constraints upon the set of + /// paths which may be validated using this key. These parameters can be + /// specified in the form of a trusted X509Certificate or as individual + /// parameters. + /// + public class TrustAnchor + { + private readonly AsymmetricKeyParameter pubKey; + private readonly string caName; + private readonly X509Name caPrincipal; + private readonly X509Certificate trustedCert; + private byte[] ncBytes; + private NameConstraints nc; + + /// + /// Creates an instance of TrustAnchor with the specified X509Certificate and + /// optional name constraints, which are intended to be used as additional + /// constraints when validating an X.509 certification path. + /// The name constraints are specified as a byte array. This byte array + /// should contain the DER encoded form of the name constraints, as they + /// would appear in the NameConstraints structure defined in RFC 2459 and + /// X.509. The ASN.1 definition of this structure appears below. + /// + ///
    +	    ///	NameConstraints ::= SEQUENCE {
    +	    ///		permittedSubtrees       [0]     GeneralSubtrees OPTIONAL,
    +	    ///		excludedSubtrees        [1]     GeneralSubtrees OPTIONAL }
    +	    ///	   
    +        /// GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree
    +        /// 
    +        ///		GeneralSubtree ::= SEQUENCE {
    +        ///		base                    GeneralName,
    +        ///		minimum         [0]     BaseDistance DEFAULT 0,
    +        ///		maximum         [1]     BaseDistance OPTIONAL }
    +        ///		
    +        ///		BaseDistance ::= INTEGER (0..MAX)
    +		///
    +		///		GeneralName ::= CHOICE {
    +		///		otherName                       [0]     OtherName,
    +		///		rfc822Name                      [1]     IA5String,
    +		///		dNSName                         [2]     IA5String,
    +		///		x400Address                     [3]     ORAddress,
    +		///		directoryName                   [4]     Name,
    +		///		ediPartyName                    [5]     EDIPartyName,
    +		///		uniformResourceIdentifier       [6]     IA5String,
    +		///		iPAddress                       [7]     OCTET STRING,
    +		///		registeredID                    [8]     OBJECT IDENTIFIER}
    +		///	
    + /// + /// Note that the name constraints byte array supplied is cloned to protect + /// against subsequent modifications. + ///
    + /// a trusted X509Certificate + /// a byte array containing the ASN.1 DER encoding of a + /// NameConstraints extension to be used for checking name + /// constraints. Only the value of the extension is included, not + /// the OID or criticality flag. Specify null to omit the + /// parameter. + /// if the specified X509Certificate is null + public TrustAnchor( + X509Certificate trustedCert, + byte[] nameConstraints) + { + if (trustedCert == null) + throw new ArgumentNullException("trustedCert"); + + this.trustedCert = trustedCert; + this.pubKey = null; + this.caName = null; + this.caPrincipal = null; + setNameConstraints(nameConstraints); + } + + /// + /// Creates an instance of TrustAnchor where the + /// most-trusted CA is specified as an X500Principal and public key. + /// + /// + ///

    + /// Name constraints are an optional parameter, and are intended to be used + /// as additional constraints when validating an X.509 certification path. + ///

    + /// The name constraints are specified as a byte array. This byte array + /// contains the DER encoded form of the name constraints, as they + /// would appear in the NameConstraints structure defined in RFC 2459 + /// and X.509. The ASN.1 notation for this structure is supplied in the + /// documentation for the other constructors. + ///

    + /// Note that the name constraints byte array supplied here is cloned to + /// protect against subsequent modifications. + ///

    + ///
    + /// the name of the most-trusted CA as X509Name + /// the public key of the most-trusted CA + /// + /// a byte array containing the ASN.1 DER encoding of a NameConstraints extension to + /// be used for checking name constraints. Only the value of the extension is included, + /// not the OID or criticality flag. Specify null to omit the parameter. + /// + /// + /// if caPrincipal or pubKey is null + /// + public TrustAnchor( + X509Name caPrincipal, + AsymmetricKeyParameter pubKey, + byte[] nameConstraints) + { + if (caPrincipal == null) + throw new ArgumentNullException("caPrincipal"); + if (pubKey == null) + throw new ArgumentNullException("pubKey"); + + this.trustedCert = null; + this.caPrincipal = caPrincipal; + this.caName = caPrincipal.ToString(); + this.pubKey = pubKey; + setNameConstraints(nameConstraints); + } + + /// + /// Creates an instance of TrustAnchor where the most-trusted + /// CA is specified as a distinguished name and public key. Name constraints + /// are an optional parameter, and are intended to be used as additional + /// constraints when validating an X.509 certification path. + ///
    + /// The name constraints are specified as a byte array. This byte array + /// contains the DER encoded form of the name constraints, as they would + /// appear in the NameConstraints structure defined in RFC 2459 and X.509. + ///
    + /// the X.500 distinguished name of the most-trusted CA in RFC + /// 2253 string format + /// the public key of the most-trusted CA + /// a byte array containing the ASN.1 DER encoding of a + /// NameConstraints extension to be used for checking name + /// constraints. Only the value of the extension is included, not + /// the OID or criticality flag. Specify null to omit the + /// parameter. + /// throws NullPointerException, IllegalArgumentException + public TrustAnchor( + string caName, + AsymmetricKeyParameter pubKey, + byte[] nameConstraints) + { + if (caName == null) + throw new ArgumentNullException("caName"); + if (pubKey == null) + throw new ArgumentNullException("pubKey"); + if (caName.Length == 0) + throw new ArgumentException("caName can not be an empty string"); + + this.caPrincipal = new X509Name(caName); + this.pubKey = pubKey; + this.caName = caName; + this.trustedCert = null; + setNameConstraints(nameConstraints); + } + + /// + /// Returns the most-trusted CA certificate. + /// + public X509Certificate TrustedCert + { + get { return this.trustedCert; } + } + + /// + /// Returns the name of the most-trusted CA as an X509Name. + /// + public X509Name CA + { + get { return this.caPrincipal; } + } + + /// + /// Returns the name of the most-trusted CA in RFC 2253 string format. + /// + public string CAName + { + get { return this.caName; } + } + + /// + /// Returns the public key of the most-trusted CA. + /// + public AsymmetricKeyParameter CAPublicKey + { + get { return this.pubKey; } + } + + /// + /// Decode the name constraints and clone them if not null. + /// + private void setNameConstraints( + byte[] bytes) + { + if (bytes == null) + { + ncBytes = null; + nc = null; + } + else + { + ncBytes = (byte[]) bytes.Clone(); + // validate DER encoding + //nc = new NameConstraintsExtension(Boolean.FALSE, bytes); + nc = NameConstraints.GetInstance(Asn1Object.FromByteArray(bytes)); + } + } + + public byte[] GetNameConstraints + { + get { return Arrays.Clone(ncBytes); } + } + + /// + /// Returns a formatted string describing the TrustAnchor. + /// + /// a formatted string describing the TrustAnchor + public override string ToString() + { + // TODO Some of the sub-objects might not implement ToString() properly + StringBuilder sb = new StringBuilder(); + sb.AppendLine("["); + if (this.pubKey != null) + { + sb.Append(" Trusted CA Public Key: ").Append(this.pubKey).AppendLine(); + sb.Append(" Trusted CA Issuer Name: ").Append(this.caName).AppendLine(); + } + else + { + sb.Append(" Trusted CA cert: ").Append(this.TrustedCert).AppendLine(); + } + if (nc != null) + { + sb.Append(" Name Constraints: ").Append(nc).AppendLine(); + } + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs.meta new file mode 100644 index 00000000..046fd818 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fbeb412e4cf0c2d4cbf8f92e5a874c56 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/pkix/TrustAnchor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security.meta new file mode 100644 index 00000000..364347c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: bacba84b7c83795419369692f09560fb +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs new file mode 100644 index 00000000..7cc32316 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs @@ -0,0 +1,123 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Kdf; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Utility class for creating IBasicAgreement objects from their names/Oids + /// + public static class AgreementUtilities + { + private static readonly IDictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static AgreementUtilities() + { + Algorithms[X9ObjectIdentifiers.DHSinglePassCofactorDHSha1KdfScheme.Id] = "ECCDHWITHSHA1KDF"; + Algorithms[X9ObjectIdentifiers.DHSinglePassStdDHSha1KdfScheme.Id] = "ECDHWITHSHA1KDF"; + Algorithms[X9ObjectIdentifiers.MqvSinglePassSha1KdfScheme.Id] = "ECMQVWITHSHA1KDF"; + + Algorithms[EdECObjectIdentifiers.id_X25519.Id] = "X25519"; + Algorithms[EdECObjectIdentifiers.id_X448.Id] = "X448"; + } + + public static IBasicAgreement GetBasicAgreement( + DerObjectIdentifier oid) + { + return GetBasicAgreement(oid.Id); + } + + public static IBasicAgreement GetBasicAgreement( + string algorithm) + { + string mechanism = GetMechanism(algorithm); + + if (mechanism == "DH" || mechanism == "DIFFIEHELLMAN") + return new DHBasicAgreement(); + + if (mechanism == "ECDH") + return new ECDHBasicAgreement(); + + if (mechanism == "ECDHC" || mechanism == "ECCDH") + return new ECDHCBasicAgreement(); + + if (mechanism == "ECMQV") + return new ECMqvBasicAgreement(); + + throw new SecurityUtilityException("Basic Agreement " + algorithm + " not recognised."); + } + + public static IBasicAgreement GetBasicAgreementWithKdf( + DerObjectIdentifier oid, + string wrapAlgorithm) + { + return GetBasicAgreementWithKdf(oid.Id, wrapAlgorithm); + } + + public static IBasicAgreement GetBasicAgreementWithKdf( + string agreeAlgorithm, + string wrapAlgorithm) + { + string mechanism = GetMechanism(agreeAlgorithm); + + // 'DHWITHSHA1KDF' retained for backward compatibility + if (mechanism == "DHWITHSHA1KDF" || mechanism == "ECDHWITHSHA1KDF") + return new ECDHWithKdfBasicAgreement( + wrapAlgorithm, + new ECDHKekGenerator( + new Sha1Digest())); + + if (mechanism == "ECMQVWITHSHA1KDF") + return new ECMqvWithKdfBasicAgreement( + wrapAlgorithm, + new ECDHKekGenerator( + new Sha1Digest())); + + throw new SecurityUtilityException("Basic Agreement (with KDF) " + agreeAlgorithm + " not recognised."); + } + + public static IRawAgreement GetRawAgreement( + DerObjectIdentifier oid) + { + return GetRawAgreement(oid.Id); + } + + public static IRawAgreement GetRawAgreement(string algorithm) + { + string mechanism = GetMechanism(algorithm); + + if (mechanism == "X25519") + return new X25519Agreement(); + + if (mechanism == "X448") + return new X448Agreement(); + + throw new SecurityUtilityException("Raw Agreement " + algorithm + " not recognised."); + } + + public static string GetAlgorithmName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Algorithms, oid.Id); + } + + private static string GetMechanism(string algorithm) + { + var mechanism = CollectionUtilities.GetValueOrKey(Algorithms, algorithm); + + return mechanism.ToUpperInvariant(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs.meta new file mode 100644 index 00000000..7cbc99ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b6340f487b560cf4b83581c564cce161 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/AgreementUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs new file mode 100644 index 00000000..a4453ca5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs @@ -0,0 +1,804 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nsri; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Cipher Utility class contains methods that can not be specifically grouped into other classes. + /// + public static class CipherUtilities + { + private enum CipherAlgorithm { + AES, + ARC4, + ARIA, + BLOWFISH, + CAMELLIA, + CAST5, + CAST6, + CHACHA, + CHACHA20_POLY1305, + CHACHA7539, + DES, + DESEDE, + ELGAMAL, + GOST28147, + HC128, + HC256, + IDEA, + NOEKEON, + PBEWITHSHAAND128BITRC4, + PBEWITHSHAAND40BITRC4, + RC2, + RC5, + RC5_64, + RC6, + RIJNDAEL, + RSA, + SALSA20, + SEED, + SERPENT, + SKIPJACK, + SM4, + TEA, + THREEFISH_256, + THREEFISH_512, + THREEFISH_1024, + TNEPRES, + TWOFISH, + VMPC, + VMPC_KSA3, + XTEA, + }; + + private enum CipherMode { ECB, NONE, CBC, CCM, CFB, CTR, CTS, EAX, GCM, GOFB, OCB, OFB, OPENPGPCFB, SIC }; + private enum CipherPadding + { + NOPADDING, + RAW, + ISO10126PADDING, + ISO10126D2PADDING, + ISO10126_2PADDING, + ISO7816_4PADDING, + ISO9797_1PADDING, + ISO9796_1, + ISO9796_1PADDING, + OAEP, + OAEPPADDING, + OAEPWITHMD5ANDMGF1PADDING, + OAEPWITHSHA1ANDMGF1PADDING, + OAEPWITHSHA_1ANDMGF1PADDING, + OAEPWITHSHA224ANDMGF1PADDING, + OAEPWITHSHA_224ANDMGF1PADDING, + OAEPWITHSHA256ANDMGF1PADDING, + OAEPWITHSHA_256ANDMGF1PADDING, + OAEPWITHSHA256ANDMGF1WITHSHA256PADDING, + OAEPWITHSHA_256ANDMGF1WITHSHA_256PADDING, + OAEPWITHSHA256ANDMGF1WITHSHA1PADDING, + OAEPWITHSHA_256ANDMGF1WITHSHA_1PADDING, + OAEPWITHSHA384ANDMGF1PADDING, + OAEPWITHSHA_384ANDMGF1PADDING, + OAEPWITHSHA512ANDMGF1PADDING, + OAEPWITHSHA_512ANDMGF1PADDING, + PKCS1, + PKCS1PADDING, + PKCS5, + PKCS5PADDING, + PKCS7, + PKCS7PADDING, + TBCPADDING, + WITHCTS, + X923PADDING, + ZEROBYTEPADDING, + }; + + private static readonly Dictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static CipherUtilities() + { + // Signal to obfuscation tools not to change enum constants + Enums.GetArbitraryValue().ToString(); + Enums.GetArbitraryValue().ToString(); + Enums.GetArbitraryValue().ToString(); + + // TODO Flesh out the list of aliases + + Algorithms[NistObjectIdentifiers.IdAes128Cbc.Id] = "AES/CBC/PKCS7PADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Cbc.Id] = "AES/CBC/PKCS7PADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Cbc.Id] = "AES/CBC/PKCS7PADDING"; + + Algorithms[NistObjectIdentifiers.IdAes128Ccm.Id] = "AES/CCM/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Ccm.Id] = "AES/CCM/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Ccm.Id] = "AES/CCM/NOPADDING"; + + Algorithms[NistObjectIdentifiers.IdAes128Cfb.Id] = "AES/CFB/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Cfb.Id] = "AES/CFB/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Cfb.Id] = "AES/CFB/NOPADDING"; + + Algorithms[NistObjectIdentifiers.IdAes128Ecb.Id] = "AES/ECB/PKCS7PADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Ecb.Id] = "AES/ECB/PKCS7PADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Ecb.Id] = "AES/ECB/PKCS7PADDING"; + Algorithms["AES//PKCS7"] = "AES/ECB/PKCS7PADDING"; + Algorithms["AES//PKCS7PADDING"] = "AES/ECB/PKCS7PADDING"; + Algorithms["AES//PKCS5"] = "AES/ECB/PKCS7PADDING"; + Algorithms["AES//PKCS5PADDING"] = "AES/ECB/PKCS7PADDING"; + + Algorithms[NistObjectIdentifiers.IdAes128Gcm.Id] = "AES/GCM/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Gcm.Id] = "AES/GCM/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Gcm.Id] = "AES/GCM/NOPADDING"; + + Algorithms[NistObjectIdentifiers.IdAes128Ofb.Id] = "AES/OFB/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes192Ofb.Id] = "AES/OFB/NOPADDING"; + Algorithms[NistObjectIdentifiers.IdAes256Ofb.Id] = "AES/OFB/NOPADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_cbc.Id] = "ARIA/CBC/PKCS7PADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_cbc.Id] = "ARIA/CBC/PKCS7PADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_cbc.Id] = "ARIA/CBC/PKCS7PADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_ccm.Id] = "ARIA/CCM/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_ccm.Id] = "ARIA/CCM/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_ccm.Id] = "ARIA/CCM/NOPADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_cfb.Id] = "ARIA/CFB/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_cfb.Id] = "ARIA/CFB/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_cfb.Id] = "ARIA/CFB/NOPADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_ctr.Id] = "ARIA/CTR/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_ctr.Id] = "ARIA/CTR/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_ctr.Id] = "ARIA/CTR/NOPADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_ecb.Id] = "ARIA/ECB/PKCS7PADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_ecb.Id] = "ARIA/ECB/PKCS7PADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_ecb.Id] = "ARIA/ECB/PKCS7PADDING"; + Algorithms["ARIA//PKCS7"] = "ARIA/ECB/PKCS7PADDING"; + Algorithms["ARIA//PKCS7PADDING"] = "ARIA/ECB/PKCS7PADDING"; + Algorithms["ARIA//PKCS5"] = "ARIA/ECB/PKCS7PADDING"; + Algorithms["ARIA//PKCS5PADDING"] = "ARIA/ECB/PKCS7PADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_gcm.Id] = "ARIA/GCM/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_gcm.Id] = "ARIA/GCM/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_gcm.Id] = "ARIA/GCM/NOPADDING"; + + Algorithms[NsriObjectIdentifiers.id_aria128_ofb.Id] = "ARIA/OFB/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria192_ofb.Id] = "ARIA/OFB/NOPADDING"; + Algorithms[NsriObjectIdentifiers.id_aria256_ofb.Id] = "ARIA/OFB/NOPADDING"; + + Algorithms["RSA/ECB/PKCS1"] = "RSA//PKCS1PADDING"; + Algorithms["RSA/ECB/PKCS1PADDING"] = "RSA//PKCS1PADDING"; + Algorithms[PkcsObjectIdentifiers.RsaEncryption.Id] = "RSA//PKCS1PADDING"; + Algorithms[PkcsObjectIdentifiers.IdRsaesOaep.Id] = "RSA//OAEPPADDING"; + + Algorithms[OiwObjectIdentifiers.DesCbc.Id] = "DES/CBC"; + Algorithms[OiwObjectIdentifiers.DesCfb.Id] = "DES/CFB"; + Algorithms[OiwObjectIdentifiers.DesEcb.Id] = "DES/ECB"; + Algorithms[OiwObjectIdentifiers.DesOfb.Id] = "DES/OFB"; + Algorithms[OiwObjectIdentifiers.DesEde.Id] = "DESEDE"; + Algorithms["TDEA"] = "DESEDE"; + Algorithms[PkcsObjectIdentifiers.DesEde3Cbc.Id] = "DESEDE/CBC"; + Algorithms[PkcsObjectIdentifiers.RC2Cbc.Id] = "RC2/CBC"; + Algorithms["1.3.6.1.4.1.188.7.1.1.2"] = "IDEA/CBC"; + Algorithms["1.2.840.113533.7.66.10"] = "CAST5/CBC"; + + Algorithms["RC4"] = "ARC4"; + Algorithms["ARCFOUR"] = "ARC4"; + Algorithms["1.2.840.113549.3.4"] = "ARC4"; + + + + Algorithms["PBEWITHSHA1AND128BITRC4"] = "PBEWITHSHAAND128BITRC4"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd128BitRC4.Id] = "PBEWITHSHAAND128BITRC4"; + Algorithms["PBEWITHSHA1AND40BITRC4"] = "PBEWITHSHAAND40BITRC4"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd40BitRC4.Id] = "PBEWITHSHAAND40BITRC4"; + + Algorithms["PBEWITHSHA1ANDDES"] = "PBEWITHSHA1ANDDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithSha1AndDesCbc.Id] = "PBEWITHSHA1ANDDES-CBC"; + Algorithms["PBEWITHSHA1ANDRC2"] = "PBEWITHSHA1ANDRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithSha1AndRC2Cbc.Id] = "PBEWITHSHA1ANDRC2-CBC"; + + Algorithms["PBEWITHSHA1AND3-KEYTRIPLEDES-CBC"] = "PBEWITHSHAAND3-KEYTRIPLEDES-CBC"; + Algorithms["PBEWITHSHAAND3KEYTRIPLEDES"] = "PBEWITHSHAAND3-KEYTRIPLEDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd3KeyTripleDesCbc.Id] = "PBEWITHSHAAND3-KEYTRIPLEDES-CBC"; + Algorithms["PBEWITHSHA1ANDDESEDE"] = "PBEWITHSHAAND3-KEYTRIPLEDES-CBC"; + + Algorithms["PBEWITHSHA1AND2-KEYTRIPLEDES-CBC"] = "PBEWITHSHAAND2-KEYTRIPLEDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd2KeyTripleDesCbc.Id] = "PBEWITHSHAAND2-KEYTRIPLEDES-CBC"; + + Algorithms["PBEWITHSHA1AND128BITRC2-CBC"] = "PBEWITHSHAAND128BITRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd128BitRC2Cbc.Id] = "PBEWITHSHAAND128BITRC2-CBC"; + + Algorithms["PBEWITHSHA1AND40BITRC2-CBC"] = "PBEWITHSHAAND40BITRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbewithShaAnd40BitRC2Cbc.Id] = "PBEWITHSHAAND40BITRC2-CBC"; + + Algorithms["PBEWITHSHA1AND128BITAES-CBC-BC"] = "PBEWITHSHAAND128BITAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND128BITAES-CBC-BC"] = "PBEWITHSHAAND128BITAES-CBC-BC"; + + Algorithms["PBEWITHSHA1AND192BITAES-CBC-BC"] = "PBEWITHSHAAND192BITAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND192BITAES-CBC-BC"] = "PBEWITHSHAAND192BITAES-CBC-BC"; + + Algorithms["PBEWITHSHA1AND256BITAES-CBC-BC"] = "PBEWITHSHAAND256BITAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND256BITAES-CBC-BC"] = "PBEWITHSHAAND256BITAES-CBC-BC"; + + Algorithms["PBEWITHSHA-256AND128BITAES-CBC-BC"] = "PBEWITHSHA256AND128BITAES-CBC-BC"; + Algorithms["PBEWITHSHA-256AND192BITAES-CBC-BC"] = "PBEWITHSHA256AND192BITAES-CBC-BC"; + Algorithms["PBEWITHSHA-256AND256BITAES-CBC-BC"] = "PBEWITHSHA256AND256BITAES-CBC-BC"; + + + Algorithms["GOST"] = "GOST28147"; + Algorithms["GOST-28147"] = "GOST28147"; + Algorithms[CryptoProObjectIdentifiers.GostR28147Gcfb.Id] = "GOST28147/CBC/PKCS7PADDING"; + + Algorithms["RC5-32"] = "RC5"; + + Algorithms[NttObjectIdentifiers.IdCamellia128Cbc.Id] = "CAMELLIA/CBC/PKCS7PADDING"; + Algorithms[NttObjectIdentifiers.IdCamellia192Cbc.Id] = "CAMELLIA/CBC/PKCS7PADDING"; + Algorithms[NttObjectIdentifiers.IdCamellia256Cbc.Id] = "CAMELLIA/CBC/PKCS7PADDING"; + + Algorithms[KisaObjectIdentifiers.IdSeedCbc.Id] = "SEED/CBC/PKCS7PADDING"; + + Algorithms["1.3.6.1.4.1.3029.1.2"] = "BLOWFISH/CBC"; + + Algorithms["CHACHA20"] = "CHACHA7539"; + Algorithms[PkcsObjectIdentifiers.IdAlgAeadChaCha20Poly1305.Id] = "CHACHA20-POLY1305"; + } + + public static IBufferedCipher GetCipher( + DerObjectIdentifier oid) + { + return GetCipher(oid.Id); + } + + public static IBufferedCipher GetCipher(string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + algorithm = CollectionUtilities.GetValueOrKey(Algorithms, algorithm).ToUpperInvariant(); + + IBasicAgreement iesAgreement = null; + if (algorithm == "IES") + { + iesAgreement = new DHBasicAgreement(); + } + else if (algorithm == "ECIES") + { + iesAgreement = new ECDHBasicAgreement(); + } + + if (iesAgreement != null) + { + return new BufferedIesCipher( + new IesEngine( + iesAgreement, + new Kdf2BytesGenerator( + new Sha1Digest()), + new HMac( + new Sha1Digest()))); + } + + + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(algorithm, "PBE")) + { + if (Org.BouncyCastle.Utilities.Platform.EndsWith(algorithm, "-CBC")) + { + if (algorithm == "PBEWITHSHA1ANDDES-CBC") + { + return new PaddedBufferedBlockCipher( + new CbcBlockCipher(new DesEngine())); + } + else if (algorithm == "PBEWITHSHA1ANDRC2-CBC") + { + return new PaddedBufferedBlockCipher( + new CbcBlockCipher(new RC2Engine())); + } + else if (Strings.IsOneOf(algorithm, + "PBEWITHSHAAND2-KEYTRIPLEDES-CBC", "PBEWITHSHAAND3-KEYTRIPLEDES-CBC")) + { + return new PaddedBufferedBlockCipher( + new CbcBlockCipher(new DesEdeEngine())); + } + else if (Strings.IsOneOf(algorithm, + "PBEWITHSHAAND128BITRC2-CBC", "PBEWITHSHAAND40BITRC2-CBC")) + { + return new PaddedBufferedBlockCipher( + new CbcBlockCipher(new RC2Engine())); + } + } + else if (Org.BouncyCastle.Utilities.Platform.EndsWith(algorithm, "-BC") || Org.BouncyCastle.Utilities.Platform.EndsWith(algorithm, "-OPENSSL")) + { + if (Strings.IsOneOf(algorithm, + "PBEWITHSHAAND128BITAES-CBC-BC", + "PBEWITHSHAAND192BITAES-CBC-BC", + "PBEWITHSHAAND256BITAES-CBC-BC", + "PBEWITHSHA256AND128BITAES-CBC-BC", + "PBEWITHSHA256AND192BITAES-CBC-BC", + "PBEWITHSHA256AND256BITAES-CBC-BC", + "PBEWITHMD5AND128BITAES-CBC-OPENSSL", + "PBEWITHMD5AND192BITAES-CBC-OPENSSL", + "PBEWITHMD5AND256BITAES-CBC-OPENSSL")) + { + return new PaddedBufferedBlockCipher( + new CbcBlockCipher(AesUtilities.CreateEngine())); + } + } + } + + + + string[] parts = algorithm.Split('/'); + + IAeadCipher aeadCipher = null; + IBlockCipher blockCipher = null; + IAsymmetricBlockCipher asymBlockCipher = null; + IStreamCipher streamCipher = null; + + string algorithmName = CollectionUtilities.GetValueOrKey(Algorithms, parts[0]).ToUpperInvariant(); + + CipherAlgorithm cipherAlgorithm; + try + { + cipherAlgorithm = Enums.GetEnumValue(algorithmName); + } + catch (ArgumentException) + { + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + + switch (cipherAlgorithm) + { + case CipherAlgorithm.AES: + blockCipher = AesUtilities.CreateEngine(); + break; + case CipherAlgorithm.ARC4: + streamCipher = new RC4Engine(); + break; + case CipherAlgorithm.ARIA: + blockCipher = new AriaEngine(); + break; + case CipherAlgorithm.BLOWFISH: + blockCipher = new BlowfishEngine(); + break; + case CipherAlgorithm.CAMELLIA: + blockCipher = new CamelliaEngine(); + break; + case CipherAlgorithm.CAST5: + blockCipher = new Cast5Engine(); + break; + case CipherAlgorithm.CAST6: + blockCipher = new Cast6Engine(); + break; + case CipherAlgorithm.CHACHA: + streamCipher = new ChaChaEngine(); + break; + case CipherAlgorithm.CHACHA20_POLY1305: + aeadCipher = new ChaCha20Poly1305(); + break; + case CipherAlgorithm.CHACHA7539: + streamCipher = new ChaCha7539Engine(); + break; + case CipherAlgorithm.DES: + blockCipher = new DesEngine(); + break; + case CipherAlgorithm.DESEDE: + blockCipher = new DesEdeEngine(); + break; + case CipherAlgorithm.ELGAMAL: + asymBlockCipher = new ElGamalEngine(); + break; + case CipherAlgorithm.GOST28147: + blockCipher = new Gost28147Engine(); + break; + case CipherAlgorithm.HC128: + streamCipher = new HC128Engine(); + break; + case CipherAlgorithm.HC256: + streamCipher = new HC256Engine(); + break; + case CipherAlgorithm.IDEA: + blockCipher = new IdeaEngine(); + break; + case CipherAlgorithm.NOEKEON: + blockCipher = new NoekeonEngine(); + break; + case CipherAlgorithm.PBEWITHSHAAND128BITRC4: + case CipherAlgorithm.PBEWITHSHAAND40BITRC4: + streamCipher = new RC4Engine(); + break; + case CipherAlgorithm.RC2: + blockCipher = new RC2Engine(); + break; + case CipherAlgorithm.RC5: + blockCipher = new RC532Engine(); + break; + case CipherAlgorithm.RC5_64: + blockCipher = new RC564Engine(); + break; + case CipherAlgorithm.RC6: + blockCipher = new RC6Engine(); + break; + case CipherAlgorithm.RIJNDAEL: + blockCipher = new RijndaelEngine(); + break; + case CipherAlgorithm.RSA: + asymBlockCipher = new RsaBlindedEngine(); + break; + case CipherAlgorithm.SALSA20: + streamCipher = new Salsa20Engine(); + break; + case CipherAlgorithm.SEED: + blockCipher = new SeedEngine(); + break; + case CipherAlgorithm.SERPENT: + blockCipher = new SerpentEngine(); + break; + case CipherAlgorithm.SKIPJACK: + blockCipher = new SkipjackEngine(); + break; + case CipherAlgorithm.SM4: + blockCipher = new SM4Engine(); + break; + case CipherAlgorithm.TEA: + blockCipher = new TeaEngine(); + break; + case CipherAlgorithm.THREEFISH_256: + blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_256); + break; + case CipherAlgorithm.THREEFISH_512: + blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_512); + break; + case CipherAlgorithm.THREEFISH_1024: + blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_1024); + break; + case CipherAlgorithm.TNEPRES: + blockCipher = new TnepresEngine(); + break; + case CipherAlgorithm.TWOFISH: + blockCipher = new TwofishEngine(); + break; + case CipherAlgorithm.VMPC: + streamCipher = new VmpcEngine(); + break; + case CipherAlgorithm.VMPC_KSA3: + streamCipher = new VmpcKsa3Engine(); + break; + case CipherAlgorithm.XTEA: + blockCipher = new XteaEngine(); + break; + default: + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + + if (aeadCipher != null) + { + if (parts.Length > 1) + throw new ArgumentException("Modes and paddings cannot be applied to AEAD ciphers"); + + return new BufferedAeadCipher(aeadCipher); + } + + if (streamCipher != null) + { + if (parts.Length > 1) + throw new ArgumentException("Modes and paddings not used for stream ciphers"); + + return new BufferedStreamCipher(streamCipher); + } + + + bool cts = false; + bool padded = true; + IBlockCipherPadding padding = null; + IAeadBlockCipher aeadBlockCipher = null; + + if (parts.Length > 2) + { + if (streamCipher != null) + throw new ArgumentException("Paddings not used for stream ciphers"); + + string paddingName = parts[2]; + + CipherPadding cipherPadding; + if (paddingName == "") + { + cipherPadding = CipherPadding.RAW; + } + else if (paddingName == "X9.23PADDING") + { + cipherPadding = CipherPadding.X923PADDING; + } + else + { + try + { + cipherPadding = Enums.GetEnumValue(paddingName); + } + catch (ArgumentException) + { + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + } + + switch (cipherPadding) + { + case CipherPadding.NOPADDING: + padded = false; + break; + case CipherPadding.RAW: + break; + case CipherPadding.ISO10126PADDING: + case CipherPadding.ISO10126D2PADDING: + case CipherPadding.ISO10126_2PADDING: + padding = new ISO10126d2Padding(); + break; + case CipherPadding.ISO7816_4PADDING: + case CipherPadding.ISO9797_1PADDING: + padding = new ISO7816d4Padding(); + break; + case CipherPadding.ISO9796_1: + case CipherPadding.ISO9796_1PADDING: + asymBlockCipher = new ISO9796d1Encoding(asymBlockCipher); + break; + case CipherPadding.OAEP: + case CipherPadding.OAEPPADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher); + break; + case CipherPadding.OAEPWITHMD5ANDMGF1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new MD5Digest()); + break; + case CipherPadding.OAEPWITHSHA1ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA_1ANDMGF1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha1Digest()); + break; + case CipherPadding.OAEPWITHSHA224ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA_224ANDMGF1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha224Digest()); + break; + case CipherPadding.OAEPWITHSHA256ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA_256ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA256ANDMGF1WITHSHA256PADDING: + case CipherPadding.OAEPWITHSHA_256ANDMGF1WITHSHA_256PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha256Digest()); + break; + case CipherPadding.OAEPWITHSHA256ANDMGF1WITHSHA1PADDING: + case CipherPadding.OAEPWITHSHA_256ANDMGF1WITHSHA_1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha256Digest(), new Sha1Digest(), null); + break; + case CipherPadding.OAEPWITHSHA384ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA_384ANDMGF1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha384Digest()); + break; + case CipherPadding.OAEPWITHSHA512ANDMGF1PADDING: + case CipherPadding.OAEPWITHSHA_512ANDMGF1PADDING: + asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha512Digest()); + break; + case CipherPadding.PKCS1: + case CipherPadding.PKCS1PADDING: + asymBlockCipher = new Pkcs1Encoding(asymBlockCipher); + break; + case CipherPadding.PKCS5: + case CipherPadding.PKCS5PADDING: + case CipherPadding.PKCS7: + case CipherPadding.PKCS7PADDING: + padding = new Pkcs7Padding(); + break; + case CipherPadding.TBCPADDING: + padding = new TbcPadding(); + break; + case CipherPadding.WITHCTS: + cts = true; + break; + case CipherPadding.X923PADDING: + padding = new X923Padding(); + break; + case CipherPadding.ZEROBYTEPADDING: + padding = new ZeroBytePadding(); + break; + default: + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + } + + string mode = ""; + IBlockCipherMode blockCipherMode = null; + if (parts.Length > 1) + { + mode = parts[1]; + + int di = GetDigitIndex(mode); + string modeName = di >= 0 ? mode.Substring(0, di) : mode; + + try + { + CipherMode cipherMode = modeName == "" + ? CipherMode.NONE + : Enums.GetEnumValue(modeName); + + switch (cipherMode) + { + case CipherMode.ECB: + case CipherMode.NONE: + break; + case CipherMode.CBC: + blockCipherMode = new CbcBlockCipher(blockCipher); + break; + case CipherMode.CCM: + aeadBlockCipher = new CcmBlockCipher(blockCipher); + break; + case CipherMode.CFB: + { + int bits = (di < 0) + ? 8 * blockCipher.GetBlockSize() + : int.Parse(mode.Substring(di)); + + blockCipherMode = new CfbBlockCipher(blockCipher, bits); + break; + } + case CipherMode.CTR: + blockCipherMode = new SicBlockCipher(blockCipher); + break; + case CipherMode.CTS: + cts = true; + blockCipherMode = new CbcBlockCipher(blockCipher); + break; + case CipherMode.EAX: + aeadBlockCipher = new EaxBlockCipher(blockCipher); + break; + case CipherMode.GCM: + aeadBlockCipher = new GcmBlockCipher(blockCipher); + break; + case CipherMode.GOFB: + blockCipherMode = new GOfbBlockCipher(blockCipher); + break; + case CipherMode.OCB: + aeadBlockCipher = new OcbBlockCipher(blockCipher, CreateBlockCipher(cipherAlgorithm)); + break; + case CipherMode.OFB: + { + int bits = (di < 0) + ? 8 * blockCipher.GetBlockSize() + : int.Parse(mode.Substring(di)); + + blockCipherMode = new OfbBlockCipher(blockCipher, bits); + break; + } + case CipherMode.OPENPGPCFB: + blockCipherMode = new OpenPgpCfbBlockCipher(blockCipher); + break; + case CipherMode.SIC: + if (blockCipher.GetBlockSize() < 16) + { + throw new ArgumentException("Warning: SIC-Mode can become a twotime-pad if the blocksize of the cipher is too small. Use a cipher with a block size of at least 128 bits (e.g. AES)"); + } + blockCipherMode = new SicBlockCipher(blockCipher); + break; + default: + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + } + catch (ArgumentException) + { + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + } + + if (aeadBlockCipher != null) + { + if (cts) + throw new SecurityUtilityException("CTS mode not valid for AEAD ciphers."); + if (padded && parts.Length > 2 && parts[2] != "") + throw new SecurityUtilityException("Bad padding specified for AEAD cipher."); + + return new BufferedAeadBlockCipher(aeadBlockCipher); + } + + if (blockCipher != null) + { + if (blockCipherMode == null) + { + blockCipherMode = EcbBlockCipher.GetBlockCipherMode(blockCipher); + } + + if (cts) + { + return new CtsBlockCipher(blockCipherMode); + } + + if (padding != null) + { + return new PaddedBufferedBlockCipher(blockCipherMode, padding); + } + + if (!padded || blockCipherMode.IsPartialBlockOkay) + { + return new BufferedBlockCipher(blockCipherMode); + } + + return new PaddedBufferedBlockCipher(blockCipherMode); + } + + if (asymBlockCipher != null) + { + return new BufferedAsymmetricBlockCipher(asymBlockCipher); + } + + throw new SecurityUtilityException("Cipher " + algorithm + " not recognised."); + } + + public static string GetAlgorithmName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Algorithms, oid.Id); + } + + private static int GetDigitIndex(string s) + { + for (int i = 0; i < s.Length; ++i) + { + if (char.IsDigit(s[i])) + return i; + } + + return -1; + } + + private static IBlockCipher CreateBlockCipher(CipherAlgorithm cipherAlgorithm) + { + switch (cipherAlgorithm) + { + case CipherAlgorithm.AES: return AesUtilities.CreateEngine(); + case CipherAlgorithm.ARIA: return new AriaEngine(); + case CipherAlgorithm.BLOWFISH: return new BlowfishEngine(); + case CipherAlgorithm.CAMELLIA: return new CamelliaEngine(); + case CipherAlgorithm.CAST5: return new Cast5Engine(); + case CipherAlgorithm.CAST6: return new Cast6Engine(); + case CipherAlgorithm.DES: return new DesEngine(); + case CipherAlgorithm.DESEDE: return new DesEdeEngine(); + case CipherAlgorithm.GOST28147: return new Gost28147Engine(); + case CipherAlgorithm.IDEA: return new IdeaEngine(); + case CipherAlgorithm.NOEKEON: return new NoekeonEngine(); + case CipherAlgorithm.RC2: return new RC2Engine(); + case CipherAlgorithm.RC5: return new RC532Engine(); + case CipherAlgorithm.RC5_64: return new RC564Engine(); + case CipherAlgorithm.RC6: return new RC6Engine(); + case CipherAlgorithm.RIJNDAEL: return new RijndaelEngine(); + case CipherAlgorithm.SEED: return new SeedEngine(); + case CipherAlgorithm.SERPENT: return new SerpentEngine(); + case CipherAlgorithm.SKIPJACK: return new SkipjackEngine(); + case CipherAlgorithm.SM4: return new SM4Engine(); + case CipherAlgorithm.TEA: return new TeaEngine(); + case CipherAlgorithm.THREEFISH_256: return new ThreefishEngine(ThreefishEngine.BLOCKSIZE_256); + case CipherAlgorithm.THREEFISH_512: return new ThreefishEngine(ThreefishEngine.BLOCKSIZE_512); + case CipherAlgorithm.THREEFISH_1024: return new ThreefishEngine(ThreefishEngine.BLOCKSIZE_1024); + case CipherAlgorithm.TNEPRES: return new TnepresEngine(); + case CipherAlgorithm.TWOFISH: return new TwofishEngine(); + case CipherAlgorithm.XTEA: return new XteaEngine(); + default: + throw new SecurityUtilityException("Cipher " + cipherAlgorithm + " not recognised or not a block cipher"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs.meta new file mode 100644 index 00000000..0a021fa7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6c54da9ff45a0f6459c74985451550a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/CipherUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs new file mode 100644 index 00000000..159dca78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs @@ -0,0 +1,320 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.UA; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Utility class for creating IDigest objects from their names/Oids + /// + public static class DigestUtilities + { + private enum DigestAlgorithm { + BLAKE2B_160, BLAKE2B_256, BLAKE2B_384, BLAKE2B_512, + BLAKE2S_128, BLAKE2S_160, BLAKE2S_224, BLAKE2S_256, + BLAKE3_256, + DSTU7564_256, DSTU7564_384, DSTU7564_512, + GOST3411, + GOST3411_2012_256, GOST3411_2012_512, + KECCAK_224, KECCAK_256, KECCAK_288, KECCAK_384, KECCAK_512, + MD2, MD4, MD5, + NONE, + RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320, + SHA_1, SHA_224, SHA_256, SHA_384, SHA_512, + SHA_512_224, SHA_512_256, + SHA3_224, SHA3_256, SHA3_384, SHA3_512, + SHAKE128_256, SHAKE256_512, + SM3, + TIGER, + WHIRLPOOL, + }; + + private static readonly IDictionary Aliases = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary Oids = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static DigestUtilities() + { + // Signal to obfuscation tools not to change enum constants + Enums.GetArbitraryValue().ToString(); + + Aliases[PkcsObjectIdentifiers.MD2.Id] = "MD2"; + Aliases[PkcsObjectIdentifiers.MD4.Id] = "MD4"; + Aliases[PkcsObjectIdentifiers.MD5.Id] = "MD5"; + + Aliases["SHA1"] = "SHA-1"; + Aliases[OiwObjectIdentifiers.IdSha1.Id] = "SHA-1"; + Aliases[PkcsObjectIdentifiers.IdHmacWithSha1.Id] = "SHA-1"; + Aliases[MiscObjectIdentifiers.HMAC_SHA1.Id] = "SHA-1"; + Aliases["SHA224"] = "SHA-224"; + Aliases[NistObjectIdentifiers.IdSha224.Id] = "SHA-224"; + Aliases[PkcsObjectIdentifiers.IdHmacWithSha224.Id] = "SHA-224"; + Aliases["SHA256"] = "SHA-256"; + Aliases[NistObjectIdentifiers.IdSha256.Id] = "SHA-256"; + Aliases[PkcsObjectIdentifiers.IdHmacWithSha256.Id] = "SHA-256"; + Aliases["SHA384"] = "SHA-384"; + Aliases[NistObjectIdentifiers.IdSha384.Id] = "SHA-384"; + Aliases[PkcsObjectIdentifiers.IdHmacWithSha384.Id] = "SHA-384"; + Aliases["SHA512"] = "SHA-512"; + Aliases[NistObjectIdentifiers.IdSha512.Id] = "SHA-512"; + Aliases[PkcsObjectIdentifiers.IdHmacWithSha512.Id] = "SHA-512"; + + Aliases["SHA512/224"] = "SHA-512/224"; + Aliases["SHA512(224)"] = "SHA-512/224"; + Aliases["SHA-512(224)"] = "SHA-512/224"; + Aliases[NistObjectIdentifiers.IdSha512_224.Id] = "SHA-512/224"; + Aliases["SHA512/256"] = "SHA-512/256"; + Aliases["SHA512(256)"] = "SHA-512/256"; + Aliases["SHA-512(256)"] = "SHA-512/256"; + Aliases[NistObjectIdentifiers.IdSha512_256.Id] = "SHA-512/256"; + + Aliases["RIPEMD-128"] = "RIPEMD128"; + Aliases[TeleTrusTObjectIdentifiers.RipeMD128.Id] = "RIPEMD128"; + Aliases["RIPEMD-160"] = "RIPEMD160"; + Aliases[TeleTrusTObjectIdentifiers.RipeMD160.Id] = "RIPEMD160"; + Aliases["RIPEMD-256"] = "RIPEMD256"; + Aliases[TeleTrusTObjectIdentifiers.RipeMD256.Id] = "RIPEMD256"; + Aliases["RIPEMD-320"] = "RIPEMD320"; + //Aliases[TeleTrusTObjectIdentifiers.RipeMD320.Id] = "RIPEMD320"; + + Aliases[CryptoProObjectIdentifiers.GostR3411.Id] = "GOST3411"; + + Aliases["KECCAK224"] = "KECCAK-224"; + Aliases["KECCAK256"] = "KECCAK-256"; + Aliases["KECCAK288"] = "KECCAK-288"; + Aliases["KECCAK384"] = "KECCAK-384"; + Aliases["KECCAK512"] = "KECCAK-512"; + + Aliases[NistObjectIdentifiers.IdSha3_224.Id] = "SHA3-224"; + Aliases[NistObjectIdentifiers.IdHMacWithSha3_224.Id] = "SHA3-224"; + Aliases[NistObjectIdentifiers.IdSha3_256.Id] = "SHA3-256"; + Aliases[NistObjectIdentifiers.IdHMacWithSha3_256.Id] = "SHA3-256"; + Aliases[NistObjectIdentifiers.IdSha3_384.Id] = "SHA3-384"; + Aliases[NistObjectIdentifiers.IdHMacWithSha3_384.Id] = "SHA3-384"; + Aliases[NistObjectIdentifiers.IdSha3_512.Id] = "SHA3-512"; + Aliases[NistObjectIdentifiers.IdHMacWithSha3_512.Id] = "SHA3-512"; + Aliases["SHAKE128"] = "SHAKE128-256"; + Aliases[NistObjectIdentifiers.IdShake128.Id] = "SHAKE128-256"; + Aliases["SHAKE256"] = "SHAKE256-512"; + Aliases[NistObjectIdentifiers.IdShake256.Id] = "SHAKE256-512"; + + Aliases[GMObjectIdentifiers.sm3.Id] = "SM3"; + + Aliases[MiscObjectIdentifiers.id_blake2b160.Id] = "BLAKE2B-160"; + Aliases[MiscObjectIdentifiers.id_blake2b256.Id] = "BLAKE2B-256"; + Aliases[MiscObjectIdentifiers.id_blake2b384.Id] = "BLAKE2B-384"; + Aliases[MiscObjectIdentifiers.id_blake2b512.Id] = "BLAKE2B-512"; + Aliases[MiscObjectIdentifiers.id_blake2s128.Id] = "BLAKE2S-128"; + Aliases[MiscObjectIdentifiers.id_blake2s160.Id] = "BLAKE2S-160"; + Aliases[MiscObjectIdentifiers.id_blake2s224.Id] = "BLAKE2S-224"; + Aliases[MiscObjectIdentifiers.id_blake2s256.Id] = "BLAKE2S-256"; + Aliases[MiscObjectIdentifiers.blake3_256.Id] = "BLAKE3-256"; + + Aliases[RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Id] = "GOST3411-2012-256"; + Aliases[RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Id] = "GOST3411-2012-512"; + + Aliases[UAObjectIdentifiers.dstu7564digest_256.Id] = "DSTU7564-256"; + Aliases[UAObjectIdentifiers.dstu7564digest_384.Id] = "DSTU7564-384"; + Aliases[UAObjectIdentifiers.dstu7564digest_512.Id] = "DSTU7564-512"; + + Oids["MD2"] = PkcsObjectIdentifiers.MD2; + Oids["MD4"] = PkcsObjectIdentifiers.MD4; + Oids["MD5"] = PkcsObjectIdentifiers.MD5; + Oids["SHA-1"] = OiwObjectIdentifiers.IdSha1; + Oids["SHA-224"] = NistObjectIdentifiers.IdSha224; + Oids["SHA-256"] = NistObjectIdentifiers.IdSha256; + Oids["SHA-384"] = NistObjectIdentifiers.IdSha384; + Oids["SHA-512"] = NistObjectIdentifiers.IdSha512; + Oids["SHA-512/224"] = NistObjectIdentifiers.IdSha512_224; + Oids["SHA-512/256"] = NistObjectIdentifiers.IdSha512_256; + Oids["SHA3-224"] = NistObjectIdentifiers.IdSha3_224; + Oids["SHA3-256"] = NistObjectIdentifiers.IdSha3_256; + Oids["SHA3-384"] = NistObjectIdentifiers.IdSha3_384; + Oids["SHA3-512"] = NistObjectIdentifiers.IdSha3_512; + Oids["SHAKE128-256"] = NistObjectIdentifiers.IdShake128; + Oids["SHAKE256-512"] = NistObjectIdentifiers.IdShake256; + Oids["RIPEMD128"] = TeleTrusTObjectIdentifiers.RipeMD128; + Oids["RIPEMD160"] = TeleTrusTObjectIdentifiers.RipeMD160; + Oids["RIPEMD256"] = TeleTrusTObjectIdentifiers.RipeMD256; + Oids["GOST3411"] = CryptoProObjectIdentifiers.GostR3411; + Oids["SM3"] = GMObjectIdentifiers.sm3; + Oids["BLAKE2B-160"] = MiscObjectIdentifiers.id_blake2b160; + Oids["BLAKE2B-256"] = MiscObjectIdentifiers.id_blake2b256; + Oids["BLAKE2B-384"] = MiscObjectIdentifiers.id_blake2b384; + Oids["BLAKE2B-512"] = MiscObjectIdentifiers.id_blake2b512; + Oids["BLAKE2S-128"] = MiscObjectIdentifiers.id_blake2s128; + Oids["BLAKE2S-160"] = MiscObjectIdentifiers.id_blake2s160; + Oids["BLAKE2S-224"] = MiscObjectIdentifiers.id_blake2s224; + Oids["BLAKE2S-256"] = MiscObjectIdentifiers.id_blake2s256; + Oids["BLAKE3-256"] = MiscObjectIdentifiers.blake3_256; + Oids["GOST3411-2012-256"] = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256; + Oids["GOST3411-2012-512"] = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512; + Oids["DSTU7564-256"] = UAObjectIdentifiers.dstu7564digest_256; + Oids["DSTU7564-384"] = UAObjectIdentifiers.dstu7564digest_384; + Oids["DSTU7564-512"] = UAObjectIdentifiers.dstu7564digest_512; + } + + /// + /// Returns a ObjectIdentifier for a given digest mechanism. + /// + /// A string representation of the digest meanism. + /// A DerObjectIdentifier, null if the Oid is not available. + + public static DerObjectIdentifier GetObjectIdentifier(string mechanism) + { + if (mechanism == null) + throw new ArgumentNullException(nameof(mechanism)); + + mechanism = CollectionUtilities.GetValueOrKey(Aliases, mechanism).ToUpperInvariant(); + + return CollectionUtilities.GetValueOrNull(Oids, mechanism); + } + + public static IDigest GetDigest(DerObjectIdentifier id) + { + return GetDigest(id.Id); + } + + public static IDigest GetDigest(string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + string mechanism = CollectionUtilities.GetValueOrKey(Aliases, algorithm).ToUpperInvariant(); + + try + { + DigestAlgorithm digestAlgorithm = Enums.GetEnumValue(mechanism); + + switch (digestAlgorithm) + { + case DigestAlgorithm.BLAKE2B_160: return new Blake2bDigest(160); + case DigestAlgorithm.BLAKE2B_256: return new Blake2bDigest(256); + case DigestAlgorithm.BLAKE2B_384: return new Blake2bDigest(384); + case DigestAlgorithm.BLAKE2B_512: return new Blake2bDigest(512); + case DigestAlgorithm.BLAKE2S_128: return new Blake2sDigest(128); + case DigestAlgorithm.BLAKE2S_160: return new Blake2sDigest(160); + case DigestAlgorithm.BLAKE2S_224: return new Blake2sDigest(224); + case DigestAlgorithm.BLAKE2S_256: return new Blake2sDigest(256); + case DigestAlgorithm.BLAKE3_256: return new Blake3Digest(256); + case DigestAlgorithm.DSTU7564_256: return new Dstu7564Digest(256); + case DigestAlgorithm.DSTU7564_384: return new Dstu7564Digest(384); + case DigestAlgorithm.DSTU7564_512: return new Dstu7564Digest(512); + case DigestAlgorithm.GOST3411: return new Gost3411Digest(); + case DigestAlgorithm.GOST3411_2012_256: return new Gost3411_2012_256Digest(); + case DigestAlgorithm.GOST3411_2012_512: return new Gost3411_2012_512Digest(); + case DigestAlgorithm.KECCAK_224: return new KeccakDigest(224); + case DigestAlgorithm.KECCAK_256: return new KeccakDigest(256); + case DigestAlgorithm.KECCAK_288: return new KeccakDigest(288); + case DigestAlgorithm.KECCAK_384: return new KeccakDigest(384); + case DigestAlgorithm.KECCAK_512: return new KeccakDigest(512); + case DigestAlgorithm.MD2: return new MD2Digest(); + case DigestAlgorithm.MD4: return new MD4Digest(); + case DigestAlgorithm.MD5: return new MD5Digest(); + case DigestAlgorithm.NONE: return new NullDigest(); + case DigestAlgorithm.RIPEMD128: return new RipeMD128Digest(); + case DigestAlgorithm.RIPEMD160: return new RipeMD160Digest(); + case DigestAlgorithm.RIPEMD256: return new RipeMD256Digest(); + case DigestAlgorithm.RIPEMD320: return new RipeMD320Digest(); + case DigestAlgorithm.SHA_1: return new Sha1Digest(); + case DigestAlgorithm.SHA_224: return new Sha224Digest(); + case DigestAlgorithm.SHA_256: return new Sha256Digest(); + case DigestAlgorithm.SHA_384: return new Sha384Digest(); + case DigestAlgorithm.SHA_512: return new Sha512Digest(); + case DigestAlgorithm.SHA_512_224: return new Sha512tDigest(224); + case DigestAlgorithm.SHA_512_256: return new Sha512tDigest(256); + case DigestAlgorithm.SHA3_224: return new Sha3Digest(224); + case DigestAlgorithm.SHA3_256: return new Sha3Digest(256); + case DigestAlgorithm.SHA3_384: return new Sha3Digest(384); + case DigestAlgorithm.SHA3_512: return new Sha3Digest(512); + case DigestAlgorithm.SHAKE128_256: return new ShakeDigest(128); + case DigestAlgorithm.SHAKE256_512: return new ShakeDigest(256); + case DigestAlgorithm.SM3: return new SM3Digest(); + case DigestAlgorithm.TIGER: return new TigerDigest(); + case DigestAlgorithm.WHIRLPOOL: return new WhirlpoolDigest(); + } + } + catch (ArgumentException) + { + } + + throw new SecurityUtilityException("Digest " + mechanism + " not recognised."); + } + + public static string GetAlgorithmName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Aliases, oid.Id); + } + + public static byte[] CalculateDigest(DerObjectIdentifier id, byte[] input) + { + return CalculateDigest(id.Id, input); + } + + public static byte[] CalculateDigest(string algorithm, byte[] input) + { + IDigest digest = GetDigest(algorithm); + return DoFinal(digest, input); + } + + public static byte[] CalculateDigest(string algorithm, byte[] buf, int off, int len) + { + IDigest digest = GetDigest(algorithm); + return DoFinal(digest, buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static byte[] CalculateDigest(string algorithm, ReadOnlySpan buffer) + { + IDigest digest = GetDigest(algorithm); + return DoFinal(digest, buffer); + } +#endif + + public static byte[] DoFinal(IDigest digest) + { + byte[] b = new byte[digest.GetDigestSize()]; + digest.DoFinal(b, 0); + return b; + } + + public static byte[] DoFinal(IDigest digest, byte[] input) + { + digest.BlockUpdate(input, 0, input.Length); + return DoFinal(digest); + } + + public static byte[] DoFinal(IDigest digest, byte[] buf, int off, int len) + { + digest.BlockUpdate(buf, off, len); + return DoFinal(digest); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static byte[] DoFinal(IDigest digest, ReadOnlySpan buffer) + { + digest.BlockUpdate(buffer); + return DoFinal(digest); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs.meta new file mode 100644 index 00000000..57795450 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c0743381edd6b964e8d369d32d1742f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DigestUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs new file mode 100644 index 00000000..494908f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs @@ -0,0 +1,325 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NET5_0_OR_GREATER +using System.Runtime.Versioning; +#endif +using System.Security.Cryptography; +using SystemX509 = System.Security.Cryptography.X509Certificates; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// A class containing methods to interface the BouncyCastle world to the .NET Crypto world. + /// + public static class DotNetUtilities + { + /// + /// Create an System.Security.Cryptography.X509Certificate from an X509Certificate Structure. + /// + /// + /// A System.Security.Cryptography.X509Certificate. + public static SystemX509.X509Certificate ToX509Certificate( + X509CertificateStructure x509Struct) + { + return new SystemX509.X509Certificate(x509Struct.GetDerEncoded()); + } + + public static SystemX509.X509Certificate ToX509Certificate( + X509Certificate x509Cert) + { + return new SystemX509.X509Certificate(x509Cert.GetEncoded()); + } + + public static X509Certificate FromX509Certificate( + SystemX509.X509Certificate x509Cert) + { + return new X509CertificateParser().ReadCertificate(x509Cert.GetRawCertData()); + } + + public static AsymmetricCipherKeyPair GetDsaKeyPair(DSA dsa) + { + return GetDsaKeyPair(dsa.ExportParameters(true)); + } + + public static AsymmetricCipherKeyPair GetDsaKeyPair(DSAParameters dp) + { + DsaPublicKeyParameters pubKey = GetDsaPublicKey(dp); + + DsaPrivateKeyParameters privKey = new DsaPrivateKeyParameters( + new BigInteger(1, dp.X), + pubKey.Parameters); + + return new AsymmetricCipherKeyPair(pubKey, privKey); + } + + public static DsaPublicKeyParameters GetDsaPublicKey(DSA dsa) + { + return GetDsaPublicKey(dsa.ExportParameters(false)); + } + + public static DsaPublicKeyParameters GetDsaPublicKey(DSAParameters dp) + { + DsaValidationParameters validationParameters = (dp.Seed != null) + ? new DsaValidationParameters(dp.Seed, dp.Counter) + : null; + + DsaParameters parameters = new DsaParameters( + new BigInteger(1, dp.P), + new BigInteger(1, dp.Q), + new BigInteger(1, dp.G), + validationParameters); + + return new DsaPublicKeyParameters( + new BigInteger(1, dp.Y), + parameters); + } + +#if NETCOREAPP1_0_OR_GREATER || NET47_OR_GREATER || NETSTANDARD1_6_OR_GREATER || UNITY_2021_2_OR_NEWER + public static AsymmetricCipherKeyPair GetECDsaKeyPair(ECDsa ecDsa) + { + return GetECKeyPair("ECDSA", ecDsa.ExportParameters(true)); + } + + public static ECPublicKeyParameters GetECDsaPublicKey(ECDsa ecDsa) + { + return GetECPublicKey("ECDSA", ecDsa.ExportParameters(false)); + } + + public static AsymmetricCipherKeyPair GetECKeyPair(string algorithm, ECParameters ec) + { + ECPublicKeyParameters pubKey = GetECPublicKey(algorithm, ec); + + ECPrivateKeyParameters privKey = new ECPrivateKeyParameters( + pubKey.AlgorithmName, + new BigInteger(1, ec.D), + pubKey.Parameters); + + return new AsymmetricCipherKeyPair(pubKey, privKey); + } + + public static ECPublicKeyParameters GetECPublicKey(string algorithm, ECParameters ec) + { + X9ECParameters x9 = GetX9ECParameters(ec.Curve); + if (x9 == null) + throw new NotSupportedException("Unrecognized curve"); + + return new ECPublicKeyParameters( + algorithm, + GetECPoint(x9.Curve, ec.Q), + new ECDomainParameters(x9)); + } + + private static Math.EC.ECPoint GetECPoint(Math.EC.ECCurve curve, ECPoint point) + { + return curve.CreatePoint(new BigInteger(1, point.X), new BigInteger(1, point.Y)); + } + + private static X9ECParameters GetX9ECParameters(ECCurve curve) + { + if (!curve.IsNamed) + throw new NotSupportedException("Only named curves are supported"); + + Oid oid = curve.Oid; + if (oid != null) + { + string oidValue = oid.Value; + if (oidValue != null) + return ECKeyPairGenerator.FindECCurveByOid(new DerObjectIdentifier(oidValue)); + } + return null; + } +#endif + + public static AsymmetricCipherKeyPair GetRsaKeyPair(RSA rsa) + { + return GetRsaKeyPair(rsa.ExportParameters(true)); + } + + public static AsymmetricCipherKeyPair GetRsaKeyPair(RSAParameters rp) + { + RsaKeyParameters pubKey = GetRsaPublicKey(rp); + + RsaPrivateCrtKeyParameters privKey = new RsaPrivateCrtKeyParameters( + pubKey.Modulus, + pubKey.Exponent, + new BigInteger(1, rp.D), + new BigInteger(1, rp.P), + new BigInteger(1, rp.Q), + new BigInteger(1, rp.DP), + new BigInteger(1, rp.DQ), + new BigInteger(1, rp.InverseQ)); + + return new AsymmetricCipherKeyPair(pubKey, privKey); + } + + public static RsaKeyParameters GetRsaPublicKey(RSA rsa) + { + return GetRsaPublicKey(rsa.ExportParameters(false)); + } + + public static RsaKeyParameters GetRsaPublicKey( + RSAParameters rp) + { + return new RsaKeyParameters( + false, + new BigInteger(1, rp.Modulus), + new BigInteger(1, rp.Exponent)); + } + + public static AsymmetricCipherKeyPair GetKeyPair(AsymmetricAlgorithm privateKey) + { + if (privateKey is DSA dsa) + return GetDsaKeyPair(dsa); + +#if NETCOREAPP1_0_OR_GREATER || NET47_OR_GREATER || NETSTANDARD1_6_OR_GREATER || UNITY_2021_2_OR_NEWER + if (privateKey is ECDsa ecDsa) + return GetECDsaKeyPair(ecDsa); +#endif + + if (privateKey is RSA rsa) + return GetRsaKeyPair(rsa); + + throw new ArgumentException("Unsupported algorithm specified", nameof(privateKey)); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaKeyParameters rsaKey) + { + // TODO This appears to not work for private keys (when no CRT info) + return CreateRSAProvider(ToRSAParameters(rsaKey)); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaKeyParameters rsaKey, CspParameters csp) + { + // TODO This appears to not work for private keys (when no CRT info) + return CreateRSAProvider(ToRSAParameters(rsaKey), csp); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaPrivateCrtKeyParameters privKey) + { + return CreateRSAProvider(ToRSAParameters(privKey)); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaPrivateCrtKeyParameters privKey, CspParameters csp) + { + return CreateRSAProvider(ToRSAParameters(privKey), csp); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaPrivateKeyStructure privKey) + { + return CreateRSAProvider(ToRSAParameters(privKey)); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + public static RSA ToRSA(RsaPrivateKeyStructure privKey, CspParameters csp) + { + return CreateRSAProvider(ToRSAParameters(privKey), csp); + } + + public static RSAParameters ToRSAParameters(RsaKeyParameters rsaKey) + { + RSAParameters rp = new RSAParameters(); + rp.Modulus = rsaKey.Modulus.ToByteArrayUnsigned(); + if (rsaKey.IsPrivate) + rp.D = ConvertRSAParametersField(rsaKey.Exponent, rp.Modulus.Length); + else + rp.Exponent = rsaKey.Exponent.ToByteArrayUnsigned(); + return rp; + } + + public static RSAParameters ToRSAParameters(RsaPrivateCrtKeyParameters privKey) + { + RSAParameters rp = new RSAParameters(); + rp.Modulus = privKey.Modulus.ToByteArrayUnsigned(); + rp.Exponent = privKey.PublicExponent.ToByteArrayUnsigned(); + rp.P = privKey.P.ToByteArrayUnsigned(); + rp.Q = privKey.Q.ToByteArrayUnsigned(); + rp.D = ConvertRSAParametersField(privKey.Exponent, rp.Modulus.Length); + rp.DP = ConvertRSAParametersField(privKey.DP, rp.P.Length); + rp.DQ = ConvertRSAParametersField(privKey.DQ, rp.Q.Length); + rp.InverseQ = ConvertRSAParametersField(privKey.QInv, rp.Q.Length); + return rp; + } + + public static RSAParameters ToRSAParameters(RsaPrivateKeyStructure privKey) + { + RSAParameters rp = new RSAParameters(); + rp.Modulus = privKey.Modulus.ToByteArrayUnsigned(); + rp.Exponent = privKey.PublicExponent.ToByteArrayUnsigned(); + rp.P = privKey.Prime1.ToByteArrayUnsigned(); + rp.Q = privKey.Prime2.ToByteArrayUnsigned(); + rp.D = ConvertRSAParametersField(privKey.PrivateExponent, rp.Modulus.Length); + rp.DP = ConvertRSAParametersField(privKey.Exponent1, rp.P.Length); + rp.DQ = ConvertRSAParametersField(privKey.Exponent2, rp.Q.Length); + rp.InverseQ = ConvertRSAParametersField(privKey.Coefficient, rp.Q.Length); + return rp; + } + + private static byte[] ConvertRSAParametersField(BigInteger n, int size) + { + return BigIntegers.AsUnsignedByteArray(size, n); + } + + // TODO Why do we use CspParameters instead of just RSA.Create in methods below? +// private static RSA CreateRSA(RSAParameters rp) +// { +//#if NETCOREAPP2_0_OR_GREATER || NET472_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +// return RSA.Create(rp); +//#else +// var rsa = RSA.Create(); +// rsa.ImportParameters(rp); +// return rsa; +//#endif +// } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + private static RSACryptoServiceProvider CreateRSAProvider(RSAParameters rp) + { + CspParameters csp = new CspParameters(); + csp.KeyContainerName = string.Format("BouncyCastle-{0}", Guid.NewGuid()); + return CreateRSAProvider(rp, csp); + } + +#if NET5_0_OR_GREATER + [SupportedOSPlatform("windows")] +#endif + private static RSACryptoServiceProvider CreateRSAProvider(RSAParameters rp, CspParameters csp) + { + RSACryptoServiceProvider rsaCsp = new RSACryptoServiceProvider(csp); + rsaCsp.ImportParameters(rp); + return rsaCsp; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs.meta new file mode 100644 index 00000000..2ce77750 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 29911560445f8a94cb98322fd9ca0e6b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/DotNetUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs new file mode 100644 index 00000000..47f2ed58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class GeneralSecurityException + : Exception + { + public GeneralSecurityException() + : base() + { + } + + public GeneralSecurityException(string message) + : base(message) + { + } + + public GeneralSecurityException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected GeneralSecurityException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs.meta new file mode 100644 index 00000000..b557cfce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0ab96b96a86e1a459cb938ef6706b9c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneralSecurityException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs new file mode 100644 index 00000000..5ce09aea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs @@ -0,0 +1,421 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Iana; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nsri; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public static class GeneratorUtilities + { + private static readonly IDictionary KgAlgorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary KpgAlgorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary DefaultKeySizes = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static GeneratorUtilities() + { + // + // key generators. + // + AddKgAlgorithm("AES", + "AESWRAP"); + AddKgAlgorithm("AES128", + "2.16.840.1.101.3.4.2", + NistObjectIdentifiers.IdAes128Cbc, + NistObjectIdentifiers.IdAes128Ccm, + NistObjectIdentifiers.IdAes128Cfb, + NistObjectIdentifiers.IdAes128Ecb, + NistObjectIdentifiers.IdAes128Gcm, + NistObjectIdentifiers.IdAes128Ofb, + NistObjectIdentifiers.IdAes128Wrap); + AddKgAlgorithm("AES192", + "2.16.840.1.101.3.4.22", + NistObjectIdentifiers.IdAes192Cbc, + NistObjectIdentifiers.IdAes192Ccm, + NistObjectIdentifiers.IdAes192Cfb, + NistObjectIdentifiers.IdAes192Ecb, + NistObjectIdentifiers.IdAes192Gcm, + NistObjectIdentifiers.IdAes192Ofb, + NistObjectIdentifiers.IdAes192Wrap); + AddKgAlgorithm("AES256", + "2.16.840.1.101.3.4.42", + NistObjectIdentifiers.IdAes256Cbc, + NistObjectIdentifiers.IdAes256Ccm, + NistObjectIdentifiers.IdAes256Cfb, + NistObjectIdentifiers.IdAes256Ecb, + NistObjectIdentifiers.IdAes256Gcm, + NistObjectIdentifiers.IdAes256Ofb, + NistObjectIdentifiers.IdAes256Wrap); + AddKgAlgorithm("BLOWFISH", + "1.3.6.1.4.1.3029.1.2"); + AddKgAlgorithm("CAMELLIA", + "CAMELLIAWRAP"); + AddKgAlgorithm("ARIA"); + AddKgAlgorithm("ARIA128", + NsriObjectIdentifiers.id_aria128_cbc, + NsriObjectIdentifiers.id_aria128_ccm, + NsriObjectIdentifiers.id_aria128_cfb, + NsriObjectIdentifiers.id_aria128_ctr, + NsriObjectIdentifiers.id_aria128_ecb, + NsriObjectIdentifiers.id_aria128_gcm, + NsriObjectIdentifiers.id_aria128_ocb2, + NsriObjectIdentifiers.id_aria128_ofb); + AddKgAlgorithm("ARIA192", + NsriObjectIdentifiers.id_aria192_cbc, + NsriObjectIdentifiers.id_aria192_ccm, + NsriObjectIdentifiers.id_aria192_cfb, + NsriObjectIdentifiers.id_aria192_ctr, + NsriObjectIdentifiers.id_aria192_ecb, + NsriObjectIdentifiers.id_aria192_gcm, + NsriObjectIdentifiers.id_aria192_ocb2, + NsriObjectIdentifiers.id_aria192_ofb); + AddKgAlgorithm("ARIA256", + NsriObjectIdentifiers.id_aria256_cbc, + NsriObjectIdentifiers.id_aria256_ccm, + NsriObjectIdentifiers.id_aria256_cfb, + NsriObjectIdentifiers.id_aria256_ctr, + NsriObjectIdentifiers.id_aria256_ecb, + NsriObjectIdentifiers.id_aria256_gcm, + NsriObjectIdentifiers.id_aria256_ocb2, + NsriObjectIdentifiers.id_aria256_ofb); + AddKgAlgorithm("CAMELLIA128", + NttObjectIdentifiers.IdCamellia128Cbc, + NttObjectIdentifiers.IdCamellia128Wrap); + AddKgAlgorithm("CAMELLIA192", + NttObjectIdentifiers.IdCamellia192Cbc, + NttObjectIdentifiers.IdCamellia192Wrap); + AddKgAlgorithm("CAMELLIA256", + NttObjectIdentifiers.IdCamellia256Cbc, + NttObjectIdentifiers.IdCamellia256Wrap); + AddKgAlgorithm("CAST5", + "1.2.840.113533.7.66.10"); + AddKgAlgorithm("CAST6"); + AddKgAlgorithm("CHACHA"); + AddKgAlgorithm("CHACHA7539", + "CHACHA20", + "CHACHA20-POLY1305", + PkcsObjectIdentifiers.IdAlgAeadChaCha20Poly1305); + AddKgAlgorithm("DES", + OiwObjectIdentifiers.DesCbc, + OiwObjectIdentifiers.DesCfb, + OiwObjectIdentifiers.DesEcb, + OiwObjectIdentifiers.DesOfb); + AddKgAlgorithm("DESEDE", + "DESEDEWRAP", + "TDEA", + OiwObjectIdentifiers.DesEde); + AddKgAlgorithm("DESEDE3", + PkcsObjectIdentifiers.DesEde3Cbc, + PkcsObjectIdentifiers.IdAlgCms3DesWrap); + AddKgAlgorithm("GOST28147", + "GOST", + "GOST-28147", + CryptoProObjectIdentifiers.GostR28147Gcfb); + AddKgAlgorithm("HC128"); + AddKgAlgorithm("HC256"); + AddKgAlgorithm("IDEA", + "1.3.6.1.4.1.188.7.1.1.2"); + AddKgAlgorithm("NOEKEON"); + AddKgAlgorithm("RC2", + PkcsObjectIdentifiers.RC2Cbc, + PkcsObjectIdentifiers.IdAlgCmsRC2Wrap); + AddKgAlgorithm("RC4", + "ARC4", + "1.2.840.113549.3.4"); + AddKgAlgorithm("RC5", + "RC5-32"); + AddKgAlgorithm("RC5-64"); + AddKgAlgorithm("RC6"); + AddKgAlgorithm("RIJNDAEL"); + AddKgAlgorithm("SALSA20"); + AddKgAlgorithm("SEED", + KisaObjectIdentifiers.IdNpkiAppCmsSeedWrap, + KisaObjectIdentifiers.IdSeedCbc); + AddKgAlgorithm("SERPENT"); + AddKgAlgorithm("SKIPJACK"); + AddKgAlgorithm("SM4"); + AddKgAlgorithm("TEA"); + AddKgAlgorithm("THREEFISH-256"); + AddKgAlgorithm("THREEFISH-512"); + AddKgAlgorithm("THREEFISH-1024"); + AddKgAlgorithm("TNEPRES"); + AddKgAlgorithm("TWOFISH"); + AddKgAlgorithm("VMPC"); + AddKgAlgorithm("VMPC-KSA3"); + AddKgAlgorithm("XTEA"); + + // + // HMac key generators + // + AddHMacKeyGenerator("MD2"); + AddHMacKeyGenerator("MD4"); + AddHMacKeyGenerator("MD5", + IanaObjectIdentifiers.HmacMD5); + AddHMacKeyGenerator("SHA1", + PkcsObjectIdentifiers.IdHmacWithSha1, + IanaObjectIdentifiers.HmacSha1); + AddHMacKeyGenerator("SHA224", + PkcsObjectIdentifiers.IdHmacWithSha224); + AddHMacKeyGenerator("SHA256", + PkcsObjectIdentifiers.IdHmacWithSha256); + AddHMacKeyGenerator("SHA384", + PkcsObjectIdentifiers.IdHmacWithSha384); + AddHMacKeyGenerator("SHA512", + PkcsObjectIdentifiers.IdHmacWithSha512); + AddHMacKeyGenerator("SHA512/224"); + AddHMacKeyGenerator("SHA512/256"); + AddHMacKeyGenerator("KECCAK224"); + AddHMacKeyGenerator("KECCAK256"); + AddHMacKeyGenerator("KECCAK288"); + AddHMacKeyGenerator("KECCAK384"); + AddHMacKeyGenerator("KECCAK512"); + AddHMacKeyGenerator("SHA3-224", + NistObjectIdentifiers.IdHMacWithSha3_224); + AddHMacKeyGenerator("SHA3-256", + NistObjectIdentifiers.IdHMacWithSha3_256); + AddHMacKeyGenerator("SHA3-384", + NistObjectIdentifiers.IdHMacWithSha3_384); + AddHMacKeyGenerator("SHA3-512", + NistObjectIdentifiers.IdHMacWithSha3_512); + AddHMacKeyGenerator("RIPEMD128"); + AddHMacKeyGenerator("RIPEMD160", + IanaObjectIdentifiers.HmacRipeMD160); + AddHMacKeyGenerator("TIGER", + IanaObjectIdentifiers.HmacTiger); + AddHMacKeyGenerator("GOST3411-2012-256", + RosstandartObjectIdentifiers.id_tc26_hmac_gost_3411_12_256); + AddHMacKeyGenerator("GOST3411-2012-512", + RosstandartObjectIdentifiers.id_tc26_hmac_gost_3411_12_512); + + // + // key pair generators. + // + AddKpgAlgorithm("DH", + "DIFFIEHELLMAN"); + AddKpgAlgorithm("DSA"); + AddKpgAlgorithm("EC", + // TODO Should this be an alias for ECDH? + X9ObjectIdentifiers.DHSinglePassStdDHSha1KdfScheme); + AddKpgAlgorithm("ECDH", + "ECIES"); + AddKpgAlgorithm("ECDHC"); + AddKpgAlgorithm("ECMQV", + X9ObjectIdentifiers.MqvSinglePassSha1KdfScheme); + AddKpgAlgorithm("ECDSA"); + AddKpgAlgorithm("ECGOST3410", + "ECGOST-3410", + "GOST-3410-2001"); + AddKpgAlgorithm("ECGOST3410-2012", + "GOST-3410-2012"); + AddKpgAlgorithm("Ed25519", + "Ed25519ctx", + "Ed25519ph", + EdECObjectIdentifiers.id_Ed25519); + AddKpgAlgorithm("Ed448", + "Ed448ph", + EdECObjectIdentifiers.id_Ed448); + AddKpgAlgorithm("ELGAMAL"); + AddKpgAlgorithm("GOST3410", + "GOST-3410", + "GOST-3410-94"); + AddKpgAlgorithm("RSA", + "1.2.840.113549.1.1.1"); + AddKpgAlgorithm("RSASSA-PSS"); + AddKpgAlgorithm("X25519", + EdECObjectIdentifiers.id_X25519); + AddKpgAlgorithm("X448", + EdECObjectIdentifiers.id_X448); + + AddDefaultKeySizeEntries(64, "DES"); + AddDefaultKeySizeEntries(80, "SKIPJACK"); + AddDefaultKeySizeEntries(128, "AES128", "ARIA128", "BLOWFISH", "CAMELLIA128", "CAST5", "CHACHA", "DESEDE", + "HC128", "HMACMD2", "HMACMD4", "HMACMD5", "HMACRIPEMD128", "IDEA", "NOEKEON", + "RC2", "RC4", "RC5", "SALSA20", "SEED", "SM4", "TEA", "XTEA", "VMPC", "VMPC-KSA3"); + AddDefaultKeySizeEntries(160, "HMACRIPEMD160", "HMACSHA1"); + AddDefaultKeySizeEntries(192, "AES", "AES192", "ARIA192", "CAMELLIA192", "DESEDE3", "HMACTIGER", + "RIJNDAEL", "SERPENT", "TNEPRES"); + AddDefaultKeySizeEntries(224, "HMACSHA3-224", "HMACKECCAK224", "HMACSHA224", "HMACSHA512/224"); + AddDefaultKeySizeEntries(256, "AES256", "ARIA", "ARIA256", "CAMELLIA", "CAMELLIA256", "CAST6", + "CHACHA7539", "GOST28147", "HC256", "HMACGOST3411-2012-256", "HMACSHA3-256", "HMACKECCAK256", + "HMACSHA256", "HMACSHA512/256", "RC5-64", "RC6", "THREEFISH-256", "TWOFISH"); + AddDefaultKeySizeEntries(288, "HMACKECCAK288"); + AddDefaultKeySizeEntries(384, "HMACSHA3-384", "HMACKECCAK384", "HMACSHA384"); + AddDefaultKeySizeEntries(512, "HMACGOST3411-2012-512", "HMACSHA3-512", "HMACKECCAK512", "HMACSHA512", + "THREEFISH-512"); + AddDefaultKeySizeEntries(1024, "THREEFISH-1024"); + } + + private static void AddDefaultKeySizeEntries(int size, params string[] algorithms) + { + foreach (string algorithm in algorithms) + { + DefaultKeySizes.Add(algorithm, size); + } + } + + private static void AddKgAlgorithm(string canonicalName, params object[] aliases) + { + KgAlgorithms[canonicalName] = canonicalName; + + foreach (object alias in aliases) + { + KgAlgorithms[alias.ToString()] = canonicalName; + } + } + + private static void AddKpgAlgorithm(string canonicalName, params object[] aliases) + { + KpgAlgorithms[canonicalName] = canonicalName; + + foreach (object alias in aliases) + { + KpgAlgorithms[alias.ToString()] = canonicalName; + } + } + + private static void AddHMacKeyGenerator(string algorithm, params object[] aliases) + { + string mainName = "HMAC" + algorithm; + + KgAlgorithms[mainName] = mainName; + KgAlgorithms["HMAC-" + algorithm] = mainName; + KgAlgorithms["HMAC/" + algorithm] = mainName; + + foreach (object alias in aliases) + { + KgAlgorithms[alias.ToString()] = mainName; + } + } + + // TODO Consider making this public + internal static string GetCanonicalKeyGeneratorAlgorithm(string algorithm) + { + return CollectionUtilities.GetValueOrNull(KgAlgorithms, algorithm); + } + + // TODO Consider making this public + internal static string GetCanonicalKeyPairGeneratorAlgorithm(string algorithm) + { + return CollectionUtilities.GetValueOrNull(KpgAlgorithms, algorithm); + } + + public static CipherKeyGenerator GetKeyGenerator(DerObjectIdentifier oid) + { + return GetKeyGenerator(oid.Id); + } + + public static CipherKeyGenerator GetKeyGenerator(string algorithm) + { + string canonicalName = GetCanonicalKeyGeneratorAlgorithm(algorithm); + + if (canonicalName == null) + throw new SecurityUtilityException("KeyGenerator " + algorithm + " not recognised."); + + int defaultKeySize = FindDefaultKeySize(canonicalName); + if (defaultKeySize == -1) + throw new SecurityUtilityException("KeyGenerator " + algorithm + + " (" + canonicalName + ") not supported."); + + if (canonicalName == "DES") + return new DesKeyGenerator(defaultKeySize); + + if (canonicalName == "DESEDE" || canonicalName == "DESEDE3") + return new DesEdeKeyGenerator(defaultKeySize); + + return new CipherKeyGenerator(defaultKeySize); + } + + public static IAsymmetricCipherKeyPairGenerator GetKeyPairGenerator(DerObjectIdentifier oid) + { + return GetKeyPairGenerator(oid.Id); + } + + public static IAsymmetricCipherKeyPairGenerator GetKeyPairGenerator(string algorithm) + { + string canonicalName = GetCanonicalKeyPairGeneratorAlgorithm(algorithm); + + if (canonicalName == null) + throw new SecurityUtilityException("KeyPairGenerator " + algorithm + " not recognised."); + + if (canonicalName == "DH") + return new DHKeyPairGenerator(); + + if (canonicalName == "DSA") + return new DsaKeyPairGenerator(); + + // "EC", "ECDH", "ECDHC", "ECDSA", "ECGOST3410", "ECGOST3410-2012", "ECMQV" + if (Org.BouncyCastle.Utilities.Platform.StartsWith(canonicalName, "EC")) + return new ECKeyPairGenerator(canonicalName); + + if (canonicalName == "Ed25519") + return new Ed25519KeyPairGenerator(); + + if (canonicalName == "Ed448") + return new Ed448KeyPairGenerator(); + + if (canonicalName == "ELGAMAL") + return new ElGamalKeyPairGenerator(); + + if (canonicalName == "GOST3410") + return new Gost3410KeyPairGenerator(); + + if (canonicalName == "RSA" || canonicalName == "RSASSA-PSS") + return new RsaKeyPairGenerator(); + + if (canonicalName == "X25519") + return new X25519KeyPairGenerator(); + + if (canonicalName == "X448") + return new X448KeyPairGenerator(); + + throw new SecurityUtilityException("KeyPairGenerator " + algorithm + + " (" + canonicalName + ") not supported."); + } + + internal static int GetDefaultKeySize(DerObjectIdentifier oid) + { + return GetDefaultKeySize(oid.Id); + } + + internal static int GetDefaultKeySize(string algorithm) + { + string canonicalName = GetCanonicalKeyGeneratorAlgorithm(algorithm); + + if (canonicalName == null) + throw new SecurityUtilityException("KeyGenerator " + algorithm + " not recognised."); + + int defaultKeySize = FindDefaultKeySize(canonicalName); + if (defaultKeySize == -1) + throw new SecurityUtilityException("KeyGenerator " + algorithm + + " (" + canonicalName + ") not supported."); + + return defaultKeySize; + } + + private static int FindDefaultKeySize(string canonicalName) + { + return DefaultKeySizes.TryGetValue(canonicalName, out int keySize) ? keySize : -1; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs.meta new file mode 100644 index 00000000..d15969a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6cb3909f8fb7c5347b364b4fa096c021 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/GeneratorUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs new file mode 100644 index 00000000..9937371f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class InvalidKeyException + : KeyException + { + public InvalidKeyException() + : base() + { + } + + public InvalidKeyException(string message) + : base(message) + { + } + + public InvalidKeyException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected InvalidKeyException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs.meta new file mode 100644 index 00000000..f6ad0f3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 690804f78f51495448c61aed38937628 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidKeyException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs new file mode 100644 index 00000000..393a4731 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class InvalidParameterException + : KeyException + { + public InvalidParameterException() + : base() + { + } + + public InvalidParameterException(string message) + : base(message) + { + } + + public InvalidParameterException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected InvalidParameterException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs.meta new file mode 100644 index 00000000..eaf09165 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a007675e27f57324e8b3caaa9606fb99 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/InvalidParameterException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs new file mode 100644 index 00000000..106a00d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs @@ -0,0 +1,600 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public class JksStore + { + private static readonly int Magic = unchecked((int)0xFEEDFEED); + + private static readonly AlgorithmIdentifier JksObfuscationAlg = new AlgorithmIdentifier( + new DerObjectIdentifier("1.3.6.1.4.1.42.2.17.1.1"), DerNull.Instance); + + private readonly Dictionary m_certificateEntries = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private readonly Dictionary m_keyEntries = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + public JksStore() + { + } + + /// + public bool Probe(Stream stream) + { + using (var br = new BinaryReader(stream)) + try + { + return Magic == BinaryReaders.ReadInt32BigEndian(br); + } + catch (EndOfStreamException) + { + return false; + } + } + + /// + public AsymmetricKeyParameter GetKey(string alias, char[] password) + { + if (alias == null) + throw new ArgumentNullException(nameof(alias)); + if (password == null) + throw new ArgumentNullException(nameof(password)); + + if (!m_keyEntries.TryGetValue(alias, out JksKeyEntry keyEntry)) + return null; + + if (!JksObfuscationAlg.Equals(keyEntry.keyData.EncryptionAlgorithm)) + throw new IOException("unknown encryption algorithm"); + + byte[] encryptedData = keyEntry.keyData.GetEncryptedData(); + + // key length is encryptedData - salt - checksum + int pkcs8Len = encryptedData.Length - 40; + + IDigest digest = DigestUtilities.GetDigest("SHA-1"); + + // key decryption + byte[] keyStream = CalculateKeyStream(digest, password, encryptedData, pkcs8Len); + byte[] pkcs8Key = new byte[pkcs8Len]; + for (int i = 0; i < pkcs8Len; ++i) + { + pkcs8Key[i] = (byte)(encryptedData[20 + i] ^ keyStream[i]); + } + Array.Clear(keyStream, 0, keyStream.Length); + + // integrity check + byte[] checksum = GetKeyChecksum(digest, password, pkcs8Key); + + if (!Arrays.ConstantTimeAreEqual(20, encryptedData, pkcs8Len + 20, checksum, 0)) + throw new IOException("cannot recover key"); + + return PrivateKeyFactory.CreateKey(pkcs8Key); + } + + private byte[] GetKeyChecksum(IDigest digest, char[] password, byte[] pkcs8Key) + { + AddPassword(digest, password); + + return DigestUtilities.DoFinal(digest, pkcs8Key); + } + + private byte[] CalculateKeyStream(IDigest digest, char[] password, byte[] salt, int count) + { + byte[] keyStream = new byte[count]; + byte[] hash = Arrays.CopyOf(salt, 20); + + int index = 0; + while (index < count) + { + AddPassword(digest, password); + + digest.BlockUpdate(hash, 0, hash.Length); + digest.DoFinal(hash, 0); + + int length = System.Math.Min(hash.Length, keyStream.Length - index); + Array.Copy(hash, 0, keyStream, index, length); + index += length; + } + + return keyStream; + } + + public X509Certificate[] GetCertificateChain(string alias) + { + if (m_keyEntries.TryGetValue(alias, out var keyEntry)) + return CloneChain(keyEntry.chain); + + return null; + } + + public X509Certificate GetCertificate(string alias) + { + if (m_certificateEntries.TryGetValue(alias, out var certEntry)) + return certEntry.cert; + + if (m_keyEntries.TryGetValue(alias, out var keyEntry)) + return keyEntry.chain?[0]; + + return null; + } + + public DateTime? GetCreationDate(string alias) + { + if (m_certificateEntries.TryGetValue(alias, out var certEntry)) + return certEntry.date; + + if (m_keyEntries.TryGetValue(alias, out var keyEntry)) + return keyEntry.date; + + return null; + } + + /// + public void SetKeyEntry(string alias, AsymmetricKeyParameter key, char[] password, X509Certificate[] chain) + { + alias = ConvertAlias(alias); + + if (ContainsAlias(alias)) + throw new IOException("alias [" + alias + "] already in use"); + + byte[] pkcs8Key = PrivateKeyInfoFactory.CreatePrivateKeyInfo(key).GetEncoded(); + byte[] protectedKey = new byte[pkcs8Key.Length + 40]; + + SecureRandom rnd = CryptoServicesRegistrar.GetSecureRandom(); + rnd.NextBytes(protectedKey, 0, 20); + + IDigest digest = DigestUtilities.GetDigest("SHA-1"); + + byte[] checksum = GetKeyChecksum(digest, password, pkcs8Key); + Array.Copy(checksum, 0, protectedKey, 20 + pkcs8Key.Length, 20); + + byte[] keyStream = CalculateKeyStream(digest, password, protectedKey, pkcs8Key.Length); + for (int i = 0; i != keyStream.Length; i++) + { + protectedKey[20 + i] = (byte)(pkcs8Key[i] ^ keyStream[i]); + } + Array.Clear(keyStream, 0, keyStream.Length); + + try + { + var epki = new EncryptedPrivateKeyInfo(JksObfuscationAlg, protectedKey); + m_keyEntries.Add(alias, new JksKeyEntry(DateTime.UtcNow, epki.GetEncoded(), CloneChain(chain))); + } + catch (Exception e) + { + throw new IOException("unable to encode encrypted private key", e); + } + } + + /// + public void SetKeyEntry(string alias, byte[] key, X509Certificate[] chain) + { + alias = ConvertAlias(alias); + + if (ContainsAlias(alias)) + throw new IOException("alias [" + alias + "] already in use"); + + m_keyEntries.Add(alias, new JksKeyEntry(DateTime.UtcNow, key, CloneChain(chain))); + } + + /// + public void SetCertificateEntry(string alias, X509Certificate cert) + { + alias = ConvertAlias(alias); + + if (ContainsAlias(alias)) + throw new IOException("alias [" + alias + "] already in use"); + + m_certificateEntries.Add(alias, new JksTrustedCertEntry(DateTime.UtcNow, cert)); + } + + public void DeleteEntry(string alias) + { + if (!m_keyEntries.Remove(alias)) + { + m_certificateEntries.Remove(alias); + } + } + + public IEnumerable Aliases + { + get + { + var aliases = new HashSet(m_certificateEntries.Keys); + aliases.UnionWith(m_keyEntries.Keys); + return CollectionUtilities.Proxy(aliases); + } + } + + public bool ContainsAlias(string alias) + { + return IsCertificateEntry(alias) || IsKeyEntry(alias); + } + + public int Count + { + get { return m_certificateEntries.Count + m_keyEntries.Count; } + } + + public bool IsKeyEntry(string alias) + { + return m_keyEntries.ContainsKey(alias); + } + + public bool IsCertificateEntry(string alias) + { + return m_certificateEntries.ContainsKey(alias); + } + + public string GetCertificateAlias(X509Certificate cert) + { + foreach (var entry in m_certificateEntries) + { + if (entry.Value.cert.Equals(cert)) + return entry.Key; + } + return null; + } + + /// + public void Save(Stream stream, char[] password) + { + if (stream == null) + throw new ArgumentNullException(nameof(stream)); + if (password == null) + throw new ArgumentNullException(nameof(password)); + + IDigest checksumDigest = CreateChecksumDigest(password); + BinaryWriter bw = new BinaryWriter(new DigestStream(stream, null, checksumDigest)); + + BinaryWriters.WriteInt32BigEndian(bw, Magic); + BinaryWriters.WriteInt32BigEndian(bw, 2); + + BinaryWriters.WriteInt32BigEndian(bw, Count); + + foreach (var entry in m_keyEntries) + { + string alias = entry.Key; + JksKeyEntry keyEntry = entry.Value; + + BinaryWriters.WriteInt32BigEndian(bw, 1); + WriteUtf(bw, alias); + WriteDateTime(bw, keyEntry.date); + WriteBufferWithInt32Length(bw, keyEntry.keyData.GetEncoded()); + + X509Certificate[] chain = keyEntry.chain; + int chainLength = chain == null ? 0 : chain.Length; + BinaryWriters.WriteInt32BigEndian(bw, chainLength); + for (int i = 0; i < chainLength; ++i) + { + WriteTypedCertificate(bw, chain[i]); + } + } + + foreach (var entry in m_certificateEntries) + { + string alias = entry.Key; + JksTrustedCertEntry certEntry = entry.Value; + + BinaryWriters.WriteInt32BigEndian(bw, 2); + WriteUtf(bw, alias); + WriteDateTime(bw, certEntry.date); + WriteTypedCertificate(bw, certEntry.cert); + } + + byte[] checksum = DigestUtilities.DoFinal(checksumDigest); + bw.Write(checksum); + bw.Flush(); + } + + /// + public void Load(Stream stream, char[] password) + { + if (stream == null) + throw new ArgumentNullException(nameof(stream)); + + m_certificateEntries.Clear(); + m_keyEntries.Clear(); + + using (var storeStream = ValidateStream(stream, password)) + { + BinaryReader br = new BinaryReader(storeStream); + + int magic = BinaryReaders.ReadInt32BigEndian(br); + int storeVersion = BinaryReaders.ReadInt32BigEndian(br); + + if (!(magic == Magic && (storeVersion == 1 || storeVersion == 2))) + throw new IOException("Invalid keystore format"); + + int numEntries = BinaryReaders.ReadInt32BigEndian(br); + + for (int t = 0; t < numEntries; t++) + { + int tag = BinaryReaders.ReadInt32BigEndian(br); + + switch (tag) + { + case 1: // keys + { + string alias = ReadUtf(br); + DateTime date = ReadDateTime(br); + + // encrypted key data + byte[] keyData = ReadBufferWithInt32Length(br); + + // certificate chain + int chainLength = BinaryReaders.ReadInt32BigEndian(br); + X509Certificate[] chain = null; + if (chainLength > 0) + { + var certs = new List(System.Math.Min(10, chainLength)); + for (int certNo = 0; certNo != chainLength; certNo++) + { + certs.Add(ReadTypedCertificate(br, storeVersion)); + } + chain = certs.ToArray(); + } + m_keyEntries.Add(alias, new JksKeyEntry(date, keyData, chain)); + break; + } + case 2: // certificate + { + string alias = ReadUtf(br); + DateTime date = ReadDateTime(br); + + X509Certificate cert = ReadTypedCertificate(br, storeVersion); + + m_certificateEntries.Add(alias, new JksTrustedCertEntry(date, cert)); + break; + } + default: + throw new IOException("unable to discern entry type"); + } + } + + if (storeStream.Position != storeStream.Length) + throw new IOException("password incorrect or store tampered with"); + } + } + + /* + * Validate password takes the checksum of the store and will either. + * 1. If password is null, load the store into memory, return the result. + * 2. If password is not null, load the store into memory, test the checksum, and if successful return + * a new input stream instance of the store. + * 3. Fail if there is a password and an invalid checksum. + * + * @param inputStream The input stream. + * @param password the password. + * @return Either the passed in input stream or a new input stream. + */ + /// + private ErasableByteStream ValidateStream(Stream inputStream, char[] password) + { + byte[] rawStore = Streams.ReadAll(inputStream); + int checksumPos = rawStore.Length - 20; + + if (password != null) + { + byte[] checksum = CalculateChecksum(password, rawStore, 0, checksumPos); + + if (!Arrays.ConstantTimeAreEqual(20, checksum, 0, rawStore, checksumPos)) + { + Array.Clear(rawStore, 0, rawStore.Length); + throw new IOException("password incorrect or store tampered with"); + } + } + + return new ErasableByteStream(rawStore, 0, checksumPos); + } + + private static void AddPassword(IDigest digest, char[] password) + { + // Encoding.BigEndianUnicode + for (int i = 0; i < password.Length; ++i) + { + digest.Update((byte)(password[i] >> 8)); + digest.Update((byte)password[i]); + } + } + + private static byte[] CalculateChecksum(char[] password, byte[] buffer, int offset, int length) + { + IDigest checksumDigest = CreateChecksumDigest(password); + checksumDigest.BlockUpdate(buffer, offset, length); + return DigestUtilities.DoFinal(checksumDigest); + } + + private static X509Certificate[] CloneChain(X509Certificate[] chain) + { + return (X509Certificate[])chain?.Clone(); + } + + private static string ConvertAlias(string alias) + { + return alias.ToLowerInvariant(); + } + + private static IDigest CreateChecksumDigest(char[] password) + { + IDigest digest = DigestUtilities.GetDigest("SHA-1"); + AddPassword(digest, password); + + // + // This "Mighty Aphrodite" string goes all the way back to the + // first java betas in the mid 90's, why who knows? But see + // https://cryptosense.com/mighty-aphrodite-dark-secrets-of-the-java-keystore/ + // + byte[] prefix = Encoding.UTF8.GetBytes("Mighty Aphrodite"); + digest.BlockUpdate(prefix, 0, prefix.Length); + return digest; + } + + private static byte[] ReadBufferWithInt16Length(BinaryReader br) + { + int length = BinaryReaders.ReadInt16BigEndian(br); + return BinaryReaders.ReadBytesFully(br, length); + } + + private static byte[] ReadBufferWithInt32Length(BinaryReader br) + { + int length = BinaryReaders.ReadInt32BigEndian(br); + return BinaryReaders.ReadBytesFully(br, length); + } + + private static DateTime ReadDateTime(BinaryReader br) + { + long unixMS = BinaryReaders.ReadInt64BigEndian(br); + return DateTimeUtilities.UnixMsToDateTime(unixMS); + } + + private static X509Certificate ReadTypedCertificate(BinaryReader br, int storeVersion) + { + if (storeVersion == 2) + { + string certFormat = ReadUtf(br); + if ("X.509" != certFormat) + throw new IOException("Unsupported certificate format: " + certFormat); + } + + byte[] certData = ReadBufferWithInt32Length(br); + try + { + return new X509Certificate(certData); + } + finally + { + Array.Clear(certData, 0, certData.Length); + } + } + + private static string ReadUtf(BinaryReader br) + { + byte[] utfBytes = ReadBufferWithInt16Length(br); + + /* + * FIXME JKS actually uses a "modified UTF-8" format. For the moment we will just support single-byte + * encodings that aren't null bytes. + */ + for (int i = 0; i < utfBytes.Length; ++i) + { + byte utfByte = utfBytes[i]; + if (utfByte == 0 || (utfByte & 0x80) != 0) + throw new NotSupportedException("Currently missing support for modified UTF-8 encoding in JKS"); + } + + return Encoding.UTF8.GetString(utfBytes); + } + + private static void WriteBufferWithInt16Length(BinaryWriter bw, byte[] buffer) + { + BinaryWriters.WriteInt16BigEndian(bw, Convert.ToInt16(buffer.Length)); + bw.Write(buffer); + } + + private static void WriteBufferWithInt32Length(BinaryWriter bw, byte[] buffer) + { + BinaryWriters.WriteInt32BigEndian(bw, buffer.Length); + bw.Write(buffer); + } + + private static void WriteDateTime(BinaryWriter bw, DateTime dateTime) + { + long unixMS = DateTimeUtilities.DateTimeToUnixMs(dateTime); + BinaryWriters.WriteInt64BigEndian(bw, unixMS); + } + + private static void WriteTypedCertificate(BinaryWriter bw, X509Certificate cert) + { + WriteUtf(bw, "X.509"); + WriteBufferWithInt32Length(bw, cert.GetEncoded()); + } + + private static void WriteUtf(BinaryWriter bw, string s) + { + byte[] utfBytes = Encoding.UTF8.GetBytes(s); + + /* + * FIXME JKS actually uses a "modified UTF-8" format. For the moment we will just support single-byte + * encodings that aren't null bytes. + */ + for (int i = 0; i < utfBytes.Length; ++i) + { + byte utfByte = utfBytes[i]; + if (utfByte == 0 || (utfByte & 0x80) != 0) + throw new NotSupportedException("Currently missing support for modified UTF-8 encoding in JKS"); + } + + WriteBufferWithInt16Length(bw, utfBytes); + } + + /** + * JksTrustedCertEntry is a internal container for the certificate entry. + */ + private sealed class JksTrustedCertEntry + { + internal readonly DateTime date; + internal readonly X509Certificate cert; + + internal JksTrustedCertEntry(DateTime date, X509Certificate cert) + { + this.date = date; + this.cert = cert; + } + } + + private sealed class JksKeyEntry + { + internal readonly DateTime date; + internal readonly EncryptedPrivateKeyInfo keyData; + internal readonly X509Certificate[] chain; + + internal JksKeyEntry(DateTime date, byte[] keyData, X509Certificate[] chain) + { + this.date = date; + this.keyData = EncryptedPrivateKeyInfo.GetInstance(Asn1Sequence.GetInstance(keyData)); + this.chain = chain; + } + } + + private sealed class ErasableByteStream + : MemoryStream + { + internal ErasableByteStream(byte[] buffer, int index, int count) + : base(buffer, index, count, false, true) + { + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + Position = 0L; + + byte[] rawStore = GetBuffer(); + Array.Clear(rawStore, 0, rawStore.Length); + } + base.Dispose(disposing); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs.meta new file mode 100644 index 00000000..a0a0cd10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a4b8a401c0492da448707365e4b0a90e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/JksStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs new file mode 100644 index 00000000..5e941750 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class KeyException + : GeneralSecurityException + { + public KeyException() + : base() + { + } + + public KeyException(string message) + : base(message) + { + } + + public KeyException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected KeyException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs.meta new file mode 100644 index 00000000..4eda40e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e6b4cea6873c7e54894e57087fba1651 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/KeyException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs new file mode 100644 index 00000000..da34e3cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs @@ -0,0 +1,238 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Iana; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Paddings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Utility class for creating HMac object from their names/Oids + /// + public static class MacUtilities + { + private static readonly IDictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static MacUtilities() + { + Algorithms[IanaObjectIdentifiers.HmacMD5.Id] = "HMAC-MD5"; + Algorithms[IanaObjectIdentifiers.HmacRipeMD160.Id] = "HMAC-RIPEMD160"; + Algorithms[IanaObjectIdentifiers.HmacSha1.Id] = "HMAC-SHA1"; + Algorithms[IanaObjectIdentifiers.HmacTiger.Id] = "HMAC-TIGER"; + + Algorithms[PkcsObjectIdentifiers.IdHmacWithSha1.Id] = "HMAC-SHA1"; + Algorithms[MiscObjectIdentifiers.HMAC_SHA1.Id] = "HMAC-SHA1"; + Algorithms[PkcsObjectIdentifiers.IdHmacWithSha224.Id] = "HMAC-SHA224"; + Algorithms[PkcsObjectIdentifiers.IdHmacWithSha256.Id] = "HMAC-SHA256"; + Algorithms[PkcsObjectIdentifiers.IdHmacWithSha384.Id] = "HMAC-SHA384"; + Algorithms[PkcsObjectIdentifiers.IdHmacWithSha512.Id] = "HMAC-SHA512"; + + Algorithms[NistObjectIdentifiers.IdHMacWithSha3_224.Id] = "HMAC-SHA3-224"; + Algorithms[NistObjectIdentifiers.IdHMacWithSha3_256.Id] = "HMAC-SHA3-256"; + Algorithms[NistObjectIdentifiers.IdHMacWithSha3_384.Id] = "HMAC-SHA3-384"; + Algorithms[NistObjectIdentifiers.IdHMacWithSha3_512.Id] = "HMAC-SHA3-512"; + + Algorithms[RosstandartObjectIdentifiers.id_tc26_hmac_gost_3411_12_256.Id] = "HMAC-GOST3411-2012-256"; + Algorithms[RosstandartObjectIdentifiers.id_tc26_hmac_gost_3411_12_512.Id] = "HMAC-GOST3411-2012-512"; + + // TODO AESMAC? + + Algorithms["DES"] = "DESMAC"; + Algorithms["DES/CFB8"] = "DESMAC/CFB8"; + Algorithms["DES64"] = "DESMAC64"; + Algorithms["DESEDE"] = "DESEDEMAC"; + Algorithms[PkcsObjectIdentifiers.DesEde3Cbc.Id] = "DESEDEMAC"; + Algorithms["DESEDE/CFB8"] = "DESEDEMAC/CFB8"; + Algorithms["DESISO9797MAC"] = "DESWITHISO9797"; + Algorithms["DESEDE64"] = "DESEDEMAC64"; + + Algorithms["DESEDE64WITHISO7816-4PADDING"] = "DESEDEMAC64WITHISO7816-4PADDING"; + Algorithms["DESEDEISO9797ALG1MACWITHISO7816-4PADDING"] = "DESEDEMAC64WITHISO7816-4PADDING"; + Algorithms["DESEDEISO9797ALG1WITHISO7816-4PADDING"] = "DESEDEMAC64WITHISO7816-4PADDING"; + + Algorithms["ISO9797ALG3"] = "ISO9797ALG3MAC"; + Algorithms["ISO9797ALG3MACWITHISO7816-4PADDING"] = "ISO9797ALG3WITHISO7816-4PADDING"; + + Algorithms["SKIPJACK"] = "SKIPJACKMAC"; + Algorithms["SKIPJACK/CFB8"] = "SKIPJACKMAC/CFB8"; + Algorithms["IDEA"] = "IDEAMAC"; + Algorithms["IDEA/CFB8"] = "IDEAMAC/CFB8"; + Algorithms["RC2"] = "RC2MAC"; + Algorithms["RC2/CFB8"] = "RC2MAC/CFB8"; + Algorithms["RC5"] = "RC5MAC"; + Algorithms["RC5/CFB8"] = "RC5MAC/CFB8"; + Algorithms["GOST28147"] = "GOST28147MAC"; + Algorithms["VMPC"] = "VMPCMAC"; + Algorithms["VMPC-MAC"] = "VMPCMAC"; + Algorithms["SIPHASH"] = "SIPHASH-2-4"; + + Algorithms["PBEWITHHMACSHA"] = "PBEWITHHMACSHA1"; + Algorithms["1.3.14.3.2.26"] = "PBEWITHHMACSHA1"; + } + + public static IMac GetMac(DerObjectIdentifier id) + { + return GetMac(id.Id); + } + + public static IMac GetMac(string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + string mechanism = CollectionUtilities.GetValueOrKey(Algorithms, algorithm).ToUpperInvariant(); + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEWITH")) + { + mechanism = mechanism.Substring("PBEWITH".Length); + } + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "HMAC")) + { + string digestName; + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "HMAC-") || Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "HMAC/")) + { + digestName = mechanism.Substring(5); + } + else + { + digestName = mechanism.Substring(4); + } + + return new HMac(DigestUtilities.GetDigest(digestName)); + } + + if (mechanism == "AESCMAC") + { + return new CMac(AesUtilities.CreateEngine()); + } + if (mechanism == "DESMAC") + { + return new CbcBlockCipherMac(new DesEngine()); + } + if (mechanism == "DESMAC/CFB8") + { + return new CfbBlockCipherMac(new DesEngine()); + } + if (mechanism == "DESMAC64") + { + return new CbcBlockCipherMac(new DesEngine(), 64); + } + if (mechanism == "DESEDECMAC") + { + return new CMac(new DesEdeEngine()); + } + if (mechanism == "DESEDEMAC") + { + return new CbcBlockCipherMac(new DesEdeEngine()); + } + if (mechanism == "DESEDEMAC/CFB8") + { + return new CfbBlockCipherMac(new DesEdeEngine()); + } + if (mechanism == "DESEDEMAC64") + { + return new CbcBlockCipherMac(new DesEdeEngine(), 64); + } + if (mechanism == "DESEDEMAC64WITHISO7816-4PADDING") + { + return new CbcBlockCipherMac(new DesEdeEngine(), 64, new ISO7816d4Padding()); + } + if (mechanism == "DESWITHISO9797" + || mechanism == "ISO9797ALG3MAC") + { + return new ISO9797Alg3Mac(new DesEngine()); + } + if (mechanism == "ISO9797ALG3WITHISO7816-4PADDING") + { + return new ISO9797Alg3Mac(new DesEngine(), new ISO7816d4Padding()); + } + if (mechanism == "SKIPJACKMAC") + { + return new CbcBlockCipherMac(new SkipjackEngine()); + } + if (mechanism == "SKIPJACKMAC/CFB8") + { + return new CfbBlockCipherMac(new SkipjackEngine()); + } + if (mechanism == "IDEAMAC") + { + return new CbcBlockCipherMac(new IdeaEngine()); + } + if (mechanism == "IDEAMAC/CFB8") + { + return new CfbBlockCipherMac(new IdeaEngine()); + } + if (mechanism == "RC2MAC") + { + return new CbcBlockCipherMac(new RC2Engine()); + } + if (mechanism == "RC2MAC/CFB8") + { + return new CfbBlockCipherMac(new RC2Engine()); + } + if (mechanism == "RC5MAC") + { + return new CbcBlockCipherMac(new RC532Engine()); + } + if (mechanism == "RC5MAC/CFB8") + { + return new CfbBlockCipherMac(new RC532Engine()); + } + if (mechanism == "GOST28147MAC") + { + return new Gost28147Mac(); + } + if (mechanism == "VMPCMAC") + { + return new VmpcMac(); + } + if (mechanism == "SIPHASH-2-4") + { + return new SipHash(); + } + throw new SecurityUtilityException("Mac " + mechanism + " not recognised."); + } + + public static string GetAlgorithmName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Algorithms, oid.Id); + } + + public static byte[] CalculateMac(string algorithm, ICipherParameters cp, byte[] input) + { + IMac mac = GetMac(algorithm); + mac.Init(cp); + mac.BlockUpdate(input, 0, input.Length); + return DoFinal(mac); + } + + public static byte[] DoFinal(IMac mac) + { + byte[] b = new byte[mac.GetMacSize()]; + mac.DoFinal(b, 0); + return b; + } + + public static byte[] DoFinal(IMac mac, byte[] input) + { + mac.BlockUpdate(input, 0, input.Length); + return DoFinal(mac); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs.meta new file mode 100644 index 00000000..0ca2a95b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ad092a9700bb814e92ca896a23751fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/MacUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs new file mode 100644 index 00000000..edaa5885 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs @@ -0,0 +1,361 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nsri; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public static class ParameterUtilities + { + private static readonly IDictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary BasicIVSizes = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static ParameterUtilities() + { + AddAlgorithm("AES", + "AESWRAP"); + AddAlgorithm("AES128", + "2.16.840.1.101.3.4.2", + NistObjectIdentifiers.IdAes128Cbc, + NistObjectIdentifiers.IdAes128Ccm, + NistObjectIdentifiers.IdAes128Cfb, + NistObjectIdentifiers.IdAes128Ecb, + NistObjectIdentifiers.IdAes128Gcm, + NistObjectIdentifiers.IdAes128Ofb, + NistObjectIdentifiers.IdAes128Wrap); + AddAlgorithm("AES192", + "2.16.840.1.101.3.4.22", + NistObjectIdentifiers.IdAes192Cbc, + NistObjectIdentifiers.IdAes192Ccm, + NistObjectIdentifiers.IdAes192Cfb, + NistObjectIdentifiers.IdAes192Ecb, + NistObjectIdentifiers.IdAes192Gcm, + NistObjectIdentifiers.IdAes192Ofb, + NistObjectIdentifiers.IdAes192Wrap); + AddAlgorithm("AES256", + "2.16.840.1.101.3.4.42", + NistObjectIdentifiers.IdAes256Cbc, + NistObjectIdentifiers.IdAes256Ccm, + NistObjectIdentifiers.IdAes256Cfb, + NistObjectIdentifiers.IdAes256Ecb, + NistObjectIdentifiers.IdAes256Gcm, + NistObjectIdentifiers.IdAes256Ofb, + NistObjectIdentifiers.IdAes256Wrap); + AddAlgorithm("ARIA"); + AddAlgorithm("ARIA128", + NsriObjectIdentifiers.id_aria128_cbc, + NsriObjectIdentifiers.id_aria128_ccm, + NsriObjectIdentifiers.id_aria128_cfb, + NsriObjectIdentifiers.id_aria128_ctr, + NsriObjectIdentifiers.id_aria128_ecb, + NsriObjectIdentifiers.id_aria128_gcm, + NsriObjectIdentifiers.id_aria128_ocb2, + NsriObjectIdentifiers.id_aria128_ofb); + AddAlgorithm("ARIA192", + NsriObjectIdentifiers.id_aria192_cbc, + NsriObjectIdentifiers.id_aria192_ccm, + NsriObjectIdentifiers.id_aria192_cfb, + NsriObjectIdentifiers.id_aria192_ctr, + NsriObjectIdentifiers.id_aria192_ecb, + NsriObjectIdentifiers.id_aria192_gcm, + NsriObjectIdentifiers.id_aria192_ocb2, + NsriObjectIdentifiers.id_aria192_ofb); + AddAlgorithm("ARIA256", + NsriObjectIdentifiers.id_aria256_cbc, + NsriObjectIdentifiers.id_aria256_ccm, + NsriObjectIdentifiers.id_aria256_cfb, + NsriObjectIdentifiers.id_aria256_ctr, + NsriObjectIdentifiers.id_aria256_ecb, + NsriObjectIdentifiers.id_aria256_gcm, + NsriObjectIdentifiers.id_aria256_ocb2, + NsriObjectIdentifiers.id_aria256_ofb); + AddAlgorithm("BLOWFISH", + "1.3.6.1.4.1.3029.1.2"); + AddAlgorithm("CAMELLIA", + "CAMELLIAWRAP"); + AddAlgorithm("CAMELLIA128", + NttObjectIdentifiers.IdCamellia128Cbc, + NttObjectIdentifiers.IdCamellia128Wrap); + AddAlgorithm("CAMELLIA192", + NttObjectIdentifiers.IdCamellia192Cbc, + NttObjectIdentifiers.IdCamellia192Wrap); + AddAlgorithm("CAMELLIA256", + NttObjectIdentifiers.IdCamellia256Cbc, + NttObjectIdentifiers.IdCamellia256Wrap); + AddAlgorithm("CAST5", + "1.2.840.113533.7.66.10"); + AddAlgorithm("CAST6"); + AddAlgorithm("CHACHA"); + AddAlgorithm("CHACHA7539", + "CHACHA20", + "CHACHA20-POLY1305", + PkcsObjectIdentifiers.IdAlgAeadChaCha20Poly1305); + AddAlgorithm("DES", + OiwObjectIdentifiers.DesCbc, + OiwObjectIdentifiers.DesCfb, + OiwObjectIdentifiers.DesEcb, + OiwObjectIdentifiers.DesOfb); + AddAlgorithm("DESEDE", + "DESEDEWRAP", + "TDEA", + OiwObjectIdentifiers.DesEde, + PkcsObjectIdentifiers.IdAlgCms3DesWrap); + AddAlgorithm("DESEDE3", + PkcsObjectIdentifiers.DesEde3Cbc); + AddAlgorithm("GOST28147", + "GOST", + "GOST-28147", + CryptoProObjectIdentifiers.GostR28147Gcfb); + AddAlgorithm("HC128"); + AddAlgorithm("HC256"); + AddAlgorithm("IDEA", + "1.3.6.1.4.1.188.7.1.1.2"); + AddAlgorithm("NOEKEON"); + AddAlgorithm("RC2", + PkcsObjectIdentifiers.RC2Cbc, + PkcsObjectIdentifiers.IdAlgCmsRC2Wrap); + AddAlgorithm("RC4", + "ARC4", + "1.2.840.113549.3.4"); + AddAlgorithm("RC5", + "RC5-32"); + AddAlgorithm("RC5-64"); + AddAlgorithm("RC6"); + AddAlgorithm("RIJNDAEL"); + AddAlgorithm("SALSA20"); + AddAlgorithm("SEED", + KisaObjectIdentifiers.IdNpkiAppCmsSeedWrap, + KisaObjectIdentifiers.IdSeedCbc); + AddAlgorithm("SERPENT"); + AddAlgorithm("SKIPJACK"); + AddAlgorithm("SM4"); + AddAlgorithm("TEA"); + AddAlgorithm("THREEFISH-256"); + AddAlgorithm("THREEFISH-512"); + AddAlgorithm("THREEFISH-1024"); + AddAlgorithm("TNEPRES"); + AddAlgorithm("TWOFISH"); + AddAlgorithm("VMPC"); + AddAlgorithm("VMPC-KSA3"); + AddAlgorithm("XTEA"); + + AddBasicIVSizeEntries(8, "BLOWFISH", "CHACHA", "DES", "DESEDE", "DESEDE3", "SALSA20"); + AddBasicIVSizeEntries(12, "CHACHA7539"); + AddBasicIVSizeEntries(16, "AES", "AES128", "AES192", "AES256", "ARIA", "ARIA128", "ARIA192", "ARIA256", + "CAMELLIA", "CAMELLIA128", "CAMELLIA192", "CAMELLIA256", "NOEKEON", "SEED", "SM4"); + + // TODO These algorithms support an IV + // but JCE doesn't seem to provide an AlgorithmParametersGenerator for them + // "RIJNDAEL", "SKIPJACK", "TWOFISH" + } + + private static void AddAlgorithm(string canonicalName, params object[] aliases) + { + Algorithms[canonicalName] = canonicalName; + + foreach (object alias in aliases) + { + Algorithms[alias.ToString()] = canonicalName; + } + } + + private static void AddBasicIVSizeEntries(int size, params string[] algorithms) + { + foreach (string algorithm in algorithms) + { + BasicIVSizes.Add(algorithm, size); + } + } + + public static string GetCanonicalAlgorithmName(string algorithm) + { + return CollectionUtilities.GetValueOrNull(Algorithms, algorithm); + } + + public static KeyParameter CreateKeyParameter(DerObjectIdentifier algOid, byte[] keyBytes) + { + return CreateKeyParameter(algOid.Id, keyBytes, 0, keyBytes.Length); + } + + public static KeyParameter CreateKeyParameter(string algorithm, byte[] keyBytes) + { + return CreateKeyParameter(algorithm, keyBytes, 0, keyBytes.Length); + } + + public static KeyParameter CreateKeyParameter( + DerObjectIdentifier algOid, + byte[] keyBytes, + int offset, + int length) + { + return CreateKeyParameter(algOid.Id, keyBytes, offset, length); + } + + public static KeyParameter CreateKeyParameter( + string algorithm, + byte[] keyBytes, + int offset, + int length) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + string canonical = GetCanonicalAlgorithmName(algorithm); + + if (canonical == null) + throw new SecurityUtilityException("Algorithm " + algorithm + " not recognised."); + + if (canonical == "DES") + return new DesParameters(keyBytes, offset, length); + + if (canonical == "DESEDE" || canonical =="DESEDE3") + return new DesEdeParameters(keyBytes, offset, length); + + if (canonical == "RC2") + return new RC2Parameters(keyBytes, offset, length); + + return new KeyParameter(keyBytes, offset, length); + } + + public static ICipherParameters GetCipherParameters( + DerObjectIdentifier algOid, + ICipherParameters key, + Asn1Object asn1Params) + { + return GetCipherParameters(algOid.Id, key, asn1Params); + } + + public static ICipherParameters GetCipherParameters( + string algorithm, + ICipherParameters key, + Asn1Object asn1Params) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + + string canonical = GetCanonicalAlgorithmName(algorithm); + + if (canonical == null) + throw new SecurityUtilityException("Algorithm " + algorithm + " not recognised."); + + byte[] iv = null; + + try + { + // TODO These algorithms support an IV + // but JCE doesn't seem to provide an AlgorithmParametersGenerator for them + // "RIJNDAEL", "SKIPJACK", "TWOFISH" + + int basicIVKeySize = FindBasicIVSize(canonical); + if (basicIVKeySize != -1 + || canonical == "RIJNDAEL" || canonical == "SKIPJACK" || canonical == "TWOFISH") + { + iv = ((Asn1OctetString) asn1Params).GetOctets(); + } + else if (canonical == "CAST5") + { + iv = Cast5CbcParameters.GetInstance(asn1Params).GetIV(); + } + else if (canonical == "IDEA") + { + iv = IdeaCbcPar.GetInstance(asn1Params).GetIV(); + } + else if (canonical == "RC2") + { + iv = RC2CbcParameter.GetInstance(asn1Params).GetIV(); + } + } + catch (Exception e) + { + throw new ArgumentException("Could not process ASN.1 parameters", e); + } + + if (iv != null) + { + return new ParametersWithIV(key, iv); + } + + throw new SecurityUtilityException("Algorithm " + algorithm + " not recognised."); + } + + public static Asn1Encodable GenerateParameters( + DerObjectIdentifier algID, + SecureRandom random) + { + return GenerateParameters(algID.Id, random); + } + + public static Asn1Encodable GenerateParameters( + string algorithm, + SecureRandom random) + { + if (algorithm == null) + throw new ArgumentNullException("algorithm"); + + string canonical = GetCanonicalAlgorithmName(algorithm); + + if (canonical == null) + throw new SecurityUtilityException("Algorithm " + algorithm + " not recognised."); + + // TODO These algorithms support an IV + // but JCE doesn't seem to provide an AlgorithmParametersGenerator for them + // "RIJNDAEL", "SKIPJACK", "TWOFISH" + + int basicIVKeySize = FindBasicIVSize(canonical); + if (basicIVKeySize != -1) + return CreateIVOctetString(random, basicIVKeySize); + + if (canonical == "CAST5") + return new Cast5CbcParameters(CreateIV(random, 8), 128); + + if (canonical == "IDEA") + return new IdeaCbcPar(CreateIV(random, 8)); + + if (canonical == "RC2") + return new RC2CbcParameter(CreateIV(random, 8)); + + throw new SecurityUtilityException("Algorithm " + algorithm + " not recognised."); + } + + public static ICipherParameters WithRandom(ICipherParameters cp, SecureRandom random) + { + if (random != null) + { + cp = new ParametersWithRandom(cp, random); + } + return cp; + } + + private static Asn1OctetString CreateIVOctetString(SecureRandom random, int ivLength) + { + return new DerOctetString(CreateIV(random, ivLength)); + } + + private static byte[] CreateIV(SecureRandom random, int ivLength) + { + return SecureRandom.GetNextBytes(random, ivLength); + } + + private static int FindBasicIVSize(string canonicalName) + { + return BasicIVSizes.TryGetValue(canonicalName, out int keySize) ? keySize : -1; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs.meta new file mode 100644 index 00000000..4c6b8e62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 50948de6091fafc4faca1e9b5dc82047 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/ParameterUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs new file mode 100644 index 00000000..823c7e7a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs @@ -0,0 +1,696 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.BC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// + /// + public static class PbeUtilities + { + const string Pkcs5S1 = "Pkcs5S1"; + const string Pkcs5S2 = "Pkcs5S2"; + const string Pkcs12 = "Pkcs12"; + const string OpenSsl = "OpenSsl"; + + private static readonly IDictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary AlgorithmType = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly IDictionary Oids = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static PbeUtilities() + { + Algorithms["PKCS5SCHEME1"] = "Pkcs5scheme1"; + Algorithms["PKCS5SCHEME2"] = "Pkcs5scheme2"; + Algorithms["PBKDF2"] = "Pkcs5scheme2"; + Algorithms[PkcsObjectIdentifiers.IdPbeS2.Id] = "Pkcs5scheme2"; +// algorithms[PkcsObjectIdentifiers.IdPbkdf2.Id] = "Pkcs5scheme2"; + + // FIXME Add support for these? (see Pkcs8Generator) +// algorithms[PkcsObjectIdentifiers.DesEde3Cbc.Id] = "Pkcs5scheme2"; +// algorithms[NistObjectIdentifiers.IdAes128Cbc.Id] = "Pkcs5scheme2"; +// algorithms[NistObjectIdentifiers.IdAes192Cbc.Id] = "Pkcs5scheme2"; +// algorithms[NistObjectIdentifiers.IdAes256Cbc.Id] = "Pkcs5scheme2"; + + Algorithms["PBEWITHMD2ANDDES-CBC"] = "PBEwithMD2andDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithMD2AndDesCbc.Id] = "PBEwithMD2andDES-CBC"; + Algorithms["PBEWITHMD2ANDRC2-CBC"] = "PBEwithMD2andRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithMD2AndRC2Cbc.Id] = "PBEwithMD2andRC2-CBC"; + Algorithms["PBEWITHMD5ANDDES-CBC"] = "PBEwithMD5andDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithMD5AndDesCbc.Id] = "PBEwithMD5andDES-CBC"; + Algorithms["PBEWITHMD5ANDRC2-CBC"] = "PBEwithMD5andRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithMD5AndRC2Cbc.Id] = "PBEwithMD5andRC2-CBC"; + Algorithms["PBEWITHSHA1ANDDES"] = "PBEwithSHA-1andDES-CBC"; + Algorithms["PBEWITHSHA-1ANDDES"] = "PBEwithSHA-1andDES-CBC"; + Algorithms["PBEWITHSHA1ANDDES-CBC"] = "PBEwithSHA-1andDES-CBC"; + Algorithms["PBEWITHSHA-1ANDDES-CBC"] = "PBEwithSHA-1andDES-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithSha1AndDesCbc.Id] = "PBEwithSHA-1andDES-CBC"; + Algorithms["PBEWITHSHA1ANDRC2"] = "PBEwithSHA-1andRC2-CBC"; + Algorithms["PBEWITHSHA-1ANDRC2"] = "PBEwithSHA-1andRC2-CBC"; + Algorithms["PBEWITHSHA1ANDRC2-CBC"] = "PBEwithSHA-1andRC2-CBC"; + Algorithms["PBEWITHSHA-1ANDRC2-CBC"] = "PBEwithSHA-1andRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithSha1AndRC2Cbc.Id] = "PBEwithSHA-1andRC2-CBC"; + Algorithms["PKCS12"] = "Pkcs12"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc.Id] = "PBEwithSHA-1and128bitAES-CBC-BC"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc.Id] = "PBEwithSHA-1and192bitAES-CBC-BC"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc.Id] = "PBEwithSHA-1and256bitAES-CBC-BC"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc.Id] = "PBEwithSHA-256and128bitAES-CBC-BC"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc.Id] = "PBEwithSHA-256and192bitAES-CBC-BC"; + Algorithms[BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc.Id] = "PBEwithSHA-256and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHAAND128BITRC4"] = "PBEwithSHA-1and128bitRC4"; + Algorithms["PBEWITHSHA1AND128BITRC4"] = "PBEwithSHA-1and128bitRC4"; + Algorithms["PBEWITHSHA-1AND128BITRC4"] = "PBEwithSHA-1and128bitRC4"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd128BitRC4.Id] = "PBEwithSHA-1and128bitRC4"; + Algorithms["PBEWITHSHAAND40BITRC4"] = "PBEwithSHA-1and40bitRC4"; + Algorithms["PBEWITHSHA1AND40BITRC4"] = "PBEwithSHA-1and40bitRC4"; + Algorithms["PBEWITHSHA-1AND40BITRC4"] = "PBEwithSHA-1and40bitRC4"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd40BitRC4.Id] = "PBEwithSHA-1and40bitRC4"; + Algorithms["PBEWITHSHAAND3-KEYDESEDE-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHAAND3-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA1AND3-KEYDESEDE-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA1AND3-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA-1AND3-KEYDESEDE-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA-1AND3-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd3KeyTripleDesCbc.Id] = "PBEwithSHA-1and3-keyDESEDE-CBC"; + Algorithms["PBEWITHSHAAND2-KEYDESEDE-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHAAND2-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA1AND2-KEYDESEDE-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA1AND2-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA-1AND2-KEYDESEDE-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHA-1AND2-KEYTRIPLEDES-CBC"] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd2KeyTripleDesCbc.Id] = "PBEwithSHA-1and2-keyDESEDE-CBC"; + Algorithms["PBEWITHSHAAND128BITRC2-CBC"] = "PBEwithSHA-1and128bitRC2-CBC"; + Algorithms["PBEWITHSHA1AND128BITRC2-CBC"] = "PBEwithSHA-1and128bitRC2-CBC"; + Algorithms["PBEWITHSHA-1AND128BITRC2-CBC"] = "PBEwithSHA-1and128bitRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbeWithShaAnd128BitRC2Cbc.Id] = "PBEwithSHA-1and128bitRC2-CBC"; + Algorithms["PBEWITHSHAAND40BITRC2-CBC"] = "PBEwithSHA-1and40bitRC2-CBC"; + Algorithms["PBEWITHSHA1AND40BITRC2-CBC"] = "PBEwithSHA-1and40bitRC2-CBC"; + Algorithms["PBEWITHSHA-1AND40BITRC2-CBC"] = "PBEwithSHA-1and40bitRC2-CBC"; + Algorithms[PkcsObjectIdentifiers.PbewithShaAnd40BitRC2Cbc.Id] = "PBEwithSHA-1and40bitRC2-CBC"; + Algorithms["PBEWITHSHAAND128BITAES-CBC-BC"] = "PBEwithSHA-1and128bitAES-CBC-BC"; + Algorithms["PBEWITHSHA1AND128BITAES-CBC-BC"] = "PBEwithSHA-1and128bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND128BITAES-CBC-BC"] = "PBEwithSHA-1and128bitAES-CBC-BC"; + Algorithms["PBEWITHSHAAND192BITAES-CBC-BC"] = "PBEwithSHA-1and192bitAES-CBC-BC"; + Algorithms["PBEWITHSHA1AND192BITAES-CBC-BC"] = "PBEwithSHA-1and192bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND192BITAES-CBC-BC"] = "PBEwithSHA-1and192bitAES-CBC-BC"; + Algorithms["PBEWITHSHAAND256BITAES-CBC-BC"] = "PBEwithSHA-1and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHA1AND256BITAES-CBC-BC"] = "PBEwithSHA-1and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-1AND256BITAES-CBC-BC"] = "PBEwithSHA-1and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHA256AND128BITAES-CBC-BC"] = "PBEwithSHA-256and128bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-256AND128BITAES-CBC-BC"] = "PBEwithSHA-256and128bitAES-CBC-BC"; + Algorithms["PBEWITHSHA256AND192BITAES-CBC-BC"] = "PBEwithSHA-256and192bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-256AND192BITAES-CBC-BC"] = "PBEwithSHA-256and192bitAES-CBC-BC"; + Algorithms["PBEWITHSHA256AND256BITAES-CBC-BC"] = "PBEwithSHA-256and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHA-256AND256BITAES-CBC-BC"] = "PBEwithSHA-256and256bitAES-CBC-BC"; + Algorithms["PBEWITHSHAANDIDEA"] = "PBEwithSHA-1andIDEA-CBC"; + Algorithms["PBEWITHSHAANDIDEA-CBC"] = "PBEwithSHA-1andIDEA-CBC"; + Algorithms["PBEWITHSHAANDTWOFISH"] = "PBEwithSHA-1andTWOFISH-CBC"; + Algorithms["PBEWITHSHAANDTWOFISH-CBC"] = "PBEwithSHA-1andTWOFISH-CBC"; + Algorithms["PBEWITHHMACSHA1"] = "PBEwithHmacSHA-1"; + Algorithms["PBEWITHHMACSHA-1"] = "PBEwithHmacSHA-1"; + Algorithms[OiwObjectIdentifiers.IdSha1.Id] = "PBEwithHmacSHA-1"; + Algorithms["PBEWITHHMACSHA224"] = "PBEwithHmacSHA-224"; + Algorithms["PBEWITHHMACSHA-224"] = "PBEwithHmacSHA-224"; + Algorithms[NistObjectIdentifiers.IdSha224.Id] = "PBEwithHmacSHA-224"; + Algorithms["PBEWITHHMACSHA256"] = "PBEwithHmacSHA-256"; + Algorithms["PBEWITHHMACSHA-256"] = "PBEwithHmacSHA-256"; + Algorithms[NistObjectIdentifiers.IdSha256.Id] = "PBEwithHmacSHA-256"; + Algorithms["PBEWITHHMACRIPEMD128"] = "PBEwithHmacRipeMD128"; + Algorithms[TeleTrusTObjectIdentifiers.RipeMD128.Id] = "PBEwithHmacRipeMD128"; + Algorithms["PBEWITHHMACRIPEMD160"] = "PBEwithHmacRipeMD160"; + Algorithms[TeleTrusTObjectIdentifiers.RipeMD160.Id] = "PBEwithHmacRipeMD160"; + Algorithms["PBEWITHHMACRIPEMD256"] = "PBEwithHmacRipeMD256"; + Algorithms[TeleTrusTObjectIdentifiers.RipeMD256.Id] = "PBEwithHmacRipeMD256"; + Algorithms["PBEWITHHMACTIGER"] = "PBEwithHmacTiger"; + + Algorithms["PBEWITHMD5AND128BITAES-CBC-OPENSSL"] = "PBEwithMD5and128bitAES-CBC-OpenSSL"; + Algorithms["PBEWITHMD5AND192BITAES-CBC-OPENSSL"] = "PBEwithMD5and192bitAES-CBC-OpenSSL"; + Algorithms["PBEWITHMD5AND256BITAES-CBC-OPENSSL"] = "PBEwithMD5and256bitAES-CBC-OpenSSL"; + + AlgorithmType["Pkcs5scheme1"] = Pkcs5S1; + AlgorithmType["Pkcs5scheme2"] = Pkcs5S2; + AlgorithmType["PBEwithMD2andDES-CBC"] = Pkcs5S1; + AlgorithmType["PBEwithMD2andRC2-CBC"] = Pkcs5S1; + AlgorithmType["PBEwithMD5andDES-CBC"] = Pkcs5S1; + AlgorithmType["PBEwithMD5andRC2-CBC"] = Pkcs5S1; + AlgorithmType["PBEwithSHA-1andDES-CBC"] = Pkcs5S1; + AlgorithmType["PBEwithSHA-1andRC2-CBC"] = Pkcs5S1; + AlgorithmType["Pkcs12"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and128bitRC4"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and40bitRC4"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and3-keyDESEDE-CBC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and2-keyDESEDE-CBC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and128bitRC2-CBC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and40bitRC2-CBC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and128bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and192bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1and256bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-256and128bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-256and192bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-256and256bitAES-CBC-BC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1andIDEA-CBC"] = Pkcs12; + AlgorithmType["PBEwithSHA-1andTWOFISH-CBC"] = Pkcs12; + AlgorithmType["PBEwithHmacSHA-1"] = Pkcs12; + AlgorithmType["PBEwithHmacSHA-224"] = Pkcs12; + AlgorithmType["PBEwithHmacSHA-256"] = Pkcs12; + AlgorithmType["PBEwithHmacRipeMD128"] = Pkcs12; + AlgorithmType["PBEwithHmacRipeMD160"] = Pkcs12; + AlgorithmType["PBEwithHmacRipeMD256"] = Pkcs12; + AlgorithmType["PBEwithHmacTiger"] = Pkcs12; + + AlgorithmType["PBEwithMD5and128bitAES-CBC-OpenSSL"] = OpenSsl; + AlgorithmType["PBEwithMD5and192bitAES-CBC-OpenSSL"] = OpenSsl; + AlgorithmType["PBEwithMD5and256bitAES-CBC-OpenSSL"] = OpenSsl; + + Oids["PBEwithMD2andDES-CBC"] = PkcsObjectIdentifiers.PbeWithMD2AndDesCbc; + Oids["PBEwithMD2andRC2-CBC"] = PkcsObjectIdentifiers.PbeWithMD2AndRC2Cbc; + Oids["PBEwithMD5andDES-CBC"] = PkcsObjectIdentifiers.PbeWithMD5AndDesCbc; + Oids["PBEwithMD5andRC2-CBC"] = PkcsObjectIdentifiers.PbeWithMD5AndRC2Cbc; + Oids["PBEwithSHA-1andDES-CBC"] = PkcsObjectIdentifiers.PbeWithSha1AndDesCbc; + Oids["PBEwithSHA-1andRC2-CBC"] = PkcsObjectIdentifiers.PbeWithSha1AndRC2Cbc; + Oids["PBEwithSHA-1and128bitRC4"] = PkcsObjectIdentifiers.PbeWithShaAnd128BitRC4; + Oids["PBEwithSHA-1and40bitRC4"] = PkcsObjectIdentifiers.PbeWithShaAnd40BitRC4; + Oids["PBEwithSHA-1and3-keyDESEDE-CBC"] = PkcsObjectIdentifiers.PbeWithShaAnd3KeyTripleDesCbc; + Oids["PBEwithSHA-1and2-keyDESEDE-CBC"] = PkcsObjectIdentifiers.PbeWithShaAnd2KeyTripleDesCbc; + Oids["PBEwithSHA-1and128bitRC2-CBC"] = PkcsObjectIdentifiers.PbeWithShaAnd128BitRC2Cbc; + Oids["PBEwithSHA-1and40bitRC2-CBC"] = PkcsObjectIdentifiers.PbewithShaAnd40BitRC2Cbc; + Oids["PBEwithHmacSHA-1"] = OiwObjectIdentifiers.IdSha1; + Oids["PBEwithHmacSHA-224"] = NistObjectIdentifiers.IdSha224; + Oids["PBEwithHmacSHA-256"] = NistObjectIdentifiers.IdSha256; + Oids["PBEwithHmacRipeMD128"] = TeleTrusTObjectIdentifiers.RipeMD128; + Oids["PBEwithHmacRipeMD160"] = TeleTrusTObjectIdentifiers.RipeMD160; + Oids["PBEwithHmacRipeMD256"] = TeleTrusTObjectIdentifiers.RipeMD256; + Oids["Pkcs5scheme2"] = PkcsObjectIdentifiers.IdPbeS2; + } + + static PbeParametersGenerator MakePbeGenerator( + string type, + IDigest digest, + byte[] key, + byte[] salt, + int iterationCount) + { + PbeParametersGenerator generator; + + if (type.Equals(Pkcs5S1)) + { + generator = new Pkcs5S1ParametersGenerator(digest); + } + else if (type.Equals(Pkcs5S2)) + { + generator = new Pkcs5S2ParametersGenerator(digest); + } + else if (type.Equals(Pkcs12)) + { + generator = new Pkcs12ParametersGenerator(digest); + } + else if (type.Equals(OpenSsl)) + { + generator = new OpenSslPbeParametersGenerator(); + } + else + { + throw new ArgumentException("Unknown PBE type: " + type, "type"); + } + + generator.Init(key, salt, iterationCount); + return generator; + } + + /// + /// Returns a ObjectIdentifier for a give encoding. + /// + /// A string representation of the encoding. + /// A DerObjectIdentifier, null if the Oid is not available. + public static DerObjectIdentifier GetObjectIdentifier(string mechanism) + { + if (!Algorithms.TryGetValue(mechanism, out var algorithm)) + return null; + + return CollectionUtilities.GetValueOrNull(Oids, algorithm); + } + + //public static ICollection Algorithms + //{ + // get { return oids.Keys; } + //} + + public static bool IsPkcs12(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var mechanism)) + return false; + if (!AlgorithmType.TryGetValue(mechanism, out var algorithmType)) + return false; + + return Pkcs12.Equals(algorithmType); + } + + public static bool IsPkcs5Scheme1(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var mechanism)) + return false; + if (!AlgorithmType.TryGetValue(mechanism, out var algorithmType)) + return false; + + return Pkcs5S1.Equals(algorithmType); + } + + public static bool IsPkcs5Scheme2(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var mechanism)) + return false; + if (!AlgorithmType.TryGetValue(mechanism, out var algorithmType)) + return false; + + return Pkcs5S2.Equals(algorithmType); + } + + public static bool IsOpenSsl(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var mechanism)) + return false; + if (!AlgorithmType.TryGetValue(mechanism, out var algorithmType)) + return false; + + return OpenSsl.Equals(algorithmType); + } + + public static bool IsPbeAlgorithm(string algorithm) + { + if (!Algorithms.TryGetValue(algorithm, out var mechanism)) + return false; + + return AlgorithmType.ContainsKey(mechanism); + } + + public static Asn1Encodable GenerateAlgorithmParameters( + DerObjectIdentifier algorithmOid, + byte[] salt, + int iterationCount) + { + return GenerateAlgorithmParameters(algorithmOid.Id, salt, iterationCount); + } + + public static Asn1Encodable GenerateAlgorithmParameters( + string algorithm, + byte[] salt, + int iterationCount) + { + if (IsPkcs12(algorithm)) + { + return new Pkcs12PbeParams(salt, iterationCount); + } + else if (IsPkcs5Scheme2(algorithm)) + { + return new Pbkdf2Params(salt, iterationCount); + } + else + { + return new PbeParameter(salt, iterationCount); + } + } + + public static Asn1Encodable GenerateAlgorithmParameters( + DerObjectIdentifier cipherAlgorithm, + DerObjectIdentifier hashAlgorithm, + byte[] salt, + int iterationCount, + SecureRandom secureRandom) + { + EncryptionScheme encScheme; + if (NistObjectIdentifiers.IdAes128Cbc.Equals(cipherAlgorithm) + || NistObjectIdentifiers.IdAes192Cbc.Equals(cipherAlgorithm) + || NistObjectIdentifiers.IdAes256Cbc.Equals(cipherAlgorithm) + || NistObjectIdentifiers.IdAes128Cfb.Equals(cipherAlgorithm) + || NistObjectIdentifiers.IdAes192Cfb.Equals(cipherAlgorithm) + || NistObjectIdentifiers.IdAes256Cfb.Equals(cipherAlgorithm)) + { + byte[] iv = new byte[16]; + secureRandom.NextBytes(iv); + encScheme = new EncryptionScheme(cipherAlgorithm, new DerOctetString(iv)); + } + else + { + throw new ArgumentException("unknown cipher: " + cipherAlgorithm); + } + + KeyDerivationFunc func = new KeyDerivationFunc(PkcsObjectIdentifiers.IdPbkdf2, new Pbkdf2Params(salt, iterationCount, new AlgorithmIdentifier(hashAlgorithm, DerNull.Instance))); + + return new PbeS2Parameters(func, encScheme); + } + + public static ICipherParameters GenerateCipherParameters( + DerObjectIdentifier algorithmOid, + char[] password, + Asn1Encodable pbeParameters) + { + return GenerateCipherParameters(algorithmOid.Id, password, false, pbeParameters); + } + + public static ICipherParameters GenerateCipherParameters( + DerObjectIdentifier algorithmOid, + char[] password, + bool wrongPkcs12Zero, + Asn1Encodable pbeParameters) + { + return GenerateCipherParameters(algorithmOid.Id, password, wrongPkcs12Zero, pbeParameters); + } + + public static ICipherParameters GenerateCipherParameters( + AlgorithmIdentifier algID, + char[] password) + { + return GenerateCipherParameters(algID.Algorithm.Id, password, false, algID.Parameters); + } + + public static ICipherParameters GenerateCipherParameters( + AlgorithmIdentifier algID, + char[] password, + bool wrongPkcs12Zero) + { + return GenerateCipherParameters(algID.Algorithm.Id, password, wrongPkcs12Zero, algID.Parameters); + } + + public static ICipherParameters GenerateCipherParameters( + string algorithm, + char[] password, + Asn1Encodable pbeParameters) + { + return GenerateCipherParameters(algorithm, password, false, pbeParameters); + } + + public static ICipherParameters GenerateCipherParameters( + string algorithm, + char[] password, + bool wrongPkcs12Zero, + Asn1Encodable pbeParameters) + { + string mechanism = CollectionUtilities.GetValueOrNull(Algorithms, algorithm); + + byte[] keyBytes = null; + byte[] salt = null; + int iterationCount = 0; + + if (IsPkcs12(mechanism)) + { + Pkcs12PbeParams pbeParams = Pkcs12PbeParams.GetInstance(pbeParameters); + salt = pbeParams.GetIV(); + iterationCount = pbeParams.Iterations.IntValue; + keyBytes = PbeParametersGenerator.Pkcs12PasswordToBytes(password, wrongPkcs12Zero); + } + else if (IsPkcs5Scheme2(mechanism)) + { + // See below + } + else + { + PbeParameter pbeParams = PbeParameter.GetInstance(pbeParameters); + salt = pbeParams.GetSalt(); + iterationCount = pbeParams.IterationCount.IntValue; + keyBytes = PbeParametersGenerator.Pkcs5PasswordToBytes(password); + } + + ICipherParameters parameters = null; + + if (IsPkcs5Scheme2(mechanism)) + { + PbeS2Parameters s2p = PbeS2Parameters.GetInstance(pbeParameters.ToAsn1Object()); + AlgorithmIdentifier encScheme = s2p.EncryptionScheme; + DerObjectIdentifier encOid = encScheme.Algorithm; + Asn1Object encParams = encScheme.Parameters.ToAsn1Object(); + + Pbkdf2Params pbeParams = Pbkdf2Params.GetInstance(s2p.KeyDerivationFunc.Parameters.ToAsn1Object()); + IDigest digest = DigestUtilities.GetDigest(pbeParams.Prf.Algorithm); + + byte[] iv; + if (encOid.Equals(PkcsObjectIdentifiers.RC2Cbc)) // PKCS5.B.2.3 + { + RC2CbcParameter rc2Params = RC2CbcParameter.GetInstance(encParams); + iv = rc2Params.GetIV(); + } + else + { + iv = Asn1OctetString.GetInstance(encParams).GetOctets(); + } + + salt = pbeParams.GetSalt(); + iterationCount = pbeParams.IterationCount.IntValue; + keyBytes = PbeParametersGenerator.Pkcs5PasswordToBytes(password); + + int keyLength = pbeParams.KeyLength != null + ? pbeParams.KeyLength.IntValue * 8 + : GeneratorUtilities.GetDefaultKeySize(encOid); + + PbeParametersGenerator gen = MakePbeGenerator( + AlgorithmType[mechanism], digest, keyBytes, salt, iterationCount); + + parameters = gen.GenerateDerivedParameters(encOid.Id, keyLength); + + if (iv != null) + { + // FIXME? OpenSSL weirdness with IV of zeros (for ECB keys?) + if (Arrays.AreEqual(iv, new byte[iv.Length])) + { + //Console.Error.Write("***** IV all 0 (length " + iv.Length + ") *****"); + } + else + { + parameters = new ParametersWithIV(parameters, iv); + } + } + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithSHA-1")) + { + PbeParametersGenerator generator = MakePbeGenerator( + AlgorithmType[mechanism], new Sha1Digest(), keyBytes, salt, iterationCount); + + if (mechanism.Equals("PBEwithSHA-1and128bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 128, 128); + } + else if (mechanism.Equals("PBEwithSHA-1and192bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 192, 128); + } + else if (mechanism.Equals("PBEwithSHA-1and256bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 256, 128); + } + else if (mechanism.Equals("PBEwithSHA-1and128bitRC4")) + { + parameters = generator.GenerateDerivedParameters("RC4", 128); + } + else if (mechanism.Equals("PBEwithSHA-1and40bitRC4")) + { + parameters = generator.GenerateDerivedParameters("RC4", 40); + } + else if (mechanism.Equals("PBEwithSHA-1and3-keyDESEDE-CBC")) + { + parameters = generator.GenerateDerivedParameters("DESEDE", 192, 64); + } + else if (mechanism.Equals("PBEwithSHA-1and2-keyDESEDE-CBC")) + { + parameters = generator.GenerateDerivedParameters("DESEDE", 128, 64); + } + else if (mechanism.Equals("PBEwithSHA-1and128bitRC2-CBC")) + { + parameters = generator.GenerateDerivedParameters("RC2", 128, 64); + } + else if (mechanism.Equals("PBEwithSHA-1and40bitRC2-CBC")) + { + parameters = generator.GenerateDerivedParameters("RC2", 40, 64); + } + else if (mechanism.Equals("PBEwithSHA-1andDES-CBC")) + { + parameters = generator.GenerateDerivedParameters("DES", 64, 64); + } + else if (mechanism.Equals("PBEwithSHA-1andRC2-CBC")) + { + parameters = generator.GenerateDerivedParameters("RC2", 64, 64); + } + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithSHA-256")) + { + PbeParametersGenerator generator = MakePbeGenerator( + AlgorithmType[mechanism], new Sha256Digest(), keyBytes, salt, iterationCount); + + if (mechanism.Equals("PBEwithSHA-256and128bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 128, 128); + } + else if (mechanism.Equals("PBEwithSHA-256and192bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 192, 128); + } + else if (mechanism.Equals("PBEwithSHA-256and256bitAES-CBC-BC")) + { + parameters = generator.GenerateDerivedParameters("AES", 256, 128); + } + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithMD5")) + { + PbeParametersGenerator generator = MakePbeGenerator( + AlgorithmType[mechanism], new MD5Digest(), keyBytes, salt, iterationCount); + + if (mechanism.Equals("PBEwithMD5andDES-CBC")) + { + parameters = generator.GenerateDerivedParameters("DES", 64, 64); + } + else if (mechanism.Equals("PBEwithMD5andRC2-CBC")) + { + parameters = generator.GenerateDerivedParameters("RC2", 64, 64); + } + else if (mechanism.Equals("PBEwithMD5and128bitAES-CBC-OpenSSL")) + { + parameters = generator.GenerateDerivedParameters("AES", 128, 128); + } + else if (mechanism.Equals("PBEwithMD5and192bitAES-CBC-OpenSSL")) + { + parameters = generator.GenerateDerivedParameters("AES", 192, 128); + } + else if (mechanism.Equals("PBEwithMD5and256bitAES-CBC-OpenSSL")) + { + parameters = generator.GenerateDerivedParameters("AES", 256, 128); + } + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithMD2")) + { + PbeParametersGenerator generator = MakePbeGenerator( + AlgorithmType[mechanism], new MD2Digest(), keyBytes, salt, iterationCount); + if (mechanism.Equals("PBEwithMD2andDES-CBC")) + { + parameters = generator.GenerateDerivedParameters("DES", 64, 64); + } + else if (mechanism.Equals("PBEwithMD2andRC2-CBC")) + { + parameters = generator.GenerateDerivedParameters("RC2", 64, 64); + } + } + else if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithHmac")) + { + string digestName = mechanism.Substring("PBEwithHmac".Length); + IDigest digest = DigestUtilities.GetDigest(digestName); + + PbeParametersGenerator generator = MakePbeGenerator( + AlgorithmType[mechanism], digest, keyBytes, salt, iterationCount); + + int bitLen = digest.GetDigestSize() * 8; + parameters = generator.GenerateDerivedMacParameters(bitLen); + } + + Array.Clear(keyBytes, 0, keyBytes.Length); + + return FixDesParity(mechanism, parameters); + } + + public static object CreateEngine( + DerObjectIdentifier algorithmOid) + { + return CreateEngine(algorithmOid.Id); + } + + public static object CreateEngine( + AlgorithmIdentifier algID) + { + string algorithm = algID.Algorithm.Id; + + if (IsPkcs5Scheme2(algorithm)) + { + PbeS2Parameters s2p = PbeS2Parameters.GetInstance(algID.Parameters.ToAsn1Object()); + AlgorithmIdentifier encScheme = s2p.EncryptionScheme; + return CipherUtilities.GetCipher(encScheme.Algorithm); + } + + return CreateEngine(algorithm); + } + + public static object CreateEngine(string algorithm) + { + string mechanism = CollectionUtilities.GetValueOrNull(Algorithms, algorithm); + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithHmac")) + { + string digestName = mechanism.Substring("PBEwithHmac".Length); + + return MacUtilities.GetMac("HMAC/" + digestName); + } + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithMD2") + || Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithMD5") + || Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithSHA-1") + || Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "PBEwithSHA-256")) + { + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "AES-CBC-BC") || Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "AES-CBC-OPENSSL")) + { + return CipherUtilities.GetCipher("AES/CBC"); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "DES-CBC")) + { + return CipherUtilities.GetCipher("DES/CBC"); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "DESEDE-CBC")) + { + return CipherUtilities.GetCipher("DESEDE/CBC"); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "RC2-CBC")) + { + return CipherUtilities.GetCipher("RC2/CBC"); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "RC4")) + { + return CipherUtilities.GetCipher("RC4"); + } + } + + return null; + } + + public static string GetEncodingName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Algorithms, oid.Id); + } + + private static ICipherParameters FixDesParity(string mechanism, ICipherParameters parameters) + { + if (!Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "DES-CBC") && !Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "DESEDE-CBC")) + { + return parameters; + } + + if (parameters is ParametersWithIV) + { + ParametersWithIV ivParams = (ParametersWithIV)parameters; + return new ParametersWithIV(FixDesParity(mechanism, ivParams.Parameters), ivParams.GetIV()); + } + + KeyParameter kParam = (KeyParameter)parameters; + byte[] keyBytes = kParam.GetKey(); + DesParameters.SetOddParity(keyBytes); + return new KeyParameter(keyBytes); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs.meta new file mode 100644 index 00000000..2711f4fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ab7ce3ff8a9f8b40a97a4b8406794c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PbeUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs new file mode 100644 index 00000000..c238cf8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs @@ -0,0 +1,412 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cryptlib; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Gnu; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public static class PrivateKeyFactory + { + public static AsymmetricKeyParameter CreateKey( + byte[] privateKeyInfoData) + { + return CreateKey( + PrivateKeyInfo.GetInstance( + Asn1Object.FromByteArray(privateKeyInfoData))); + } + + public static AsymmetricKeyParameter CreateKey( + Stream inStr) + { + return CreateKey( + PrivateKeyInfo.GetInstance( + Asn1Object.FromStream(inStr))); + } + + public static AsymmetricKeyParameter CreateKey( + PrivateKeyInfo keyInfo) + { + AlgorithmIdentifier algID = keyInfo.PrivateKeyAlgorithm; + DerObjectIdentifier algOid = algID.Algorithm; + + // TODO See RSAUtil.isRsaOid in Java build + if (algOid.Equals(PkcsObjectIdentifiers.RsaEncryption) + || algOid.Equals(X509ObjectIdentifiers.IdEARsa) + || algOid.Equals(PkcsObjectIdentifiers.IdRsassaPss) + || algOid.Equals(PkcsObjectIdentifiers.IdRsaesOaep)) + { + RsaPrivateKeyStructure keyStructure = RsaPrivateKeyStructure.GetInstance(keyInfo.ParsePrivateKey()); + + return new RsaPrivateCrtKeyParameters( + keyStructure.Modulus, + keyStructure.PublicExponent, + keyStructure.PrivateExponent, + keyStructure.Prime1, + keyStructure.Prime2, + keyStructure.Exponent1, + keyStructure.Exponent2, + keyStructure.Coefficient); + } + // TODO? + // else if (algOid.Equals(X9ObjectIdentifiers.DHPublicNumber)) + else if (algOid.Equals(PkcsObjectIdentifiers.DhKeyAgreement)) + { + DHParameter para = new DHParameter( + Asn1Sequence.GetInstance(algID.Parameters.ToAsn1Object())); + DerInteger derX = (DerInteger)keyInfo.ParsePrivateKey(); + + BigInteger lVal = para.L; + int l = lVal == null ? 0 : lVal.IntValue; + DHParameters dhParams = new DHParameters(para.P, para.G, null, l); + + return new DHPrivateKeyParameters(derX.Value, dhParams, algOid); + } + else if (algOid.Equals(OiwObjectIdentifiers.ElGamalAlgorithm)) + { + ElGamalParameter para = new ElGamalParameter( + Asn1Sequence.GetInstance(algID.Parameters.ToAsn1Object())); + DerInteger derX = (DerInteger)keyInfo.ParsePrivateKey(); + + return new ElGamalPrivateKeyParameters( + derX.Value, + new ElGamalParameters(para.P, para.G)); + } + else if (algOid.Equals(X9ObjectIdentifiers.IdDsa)) + { + DerInteger derX = (DerInteger)keyInfo.ParsePrivateKey(); + Asn1Encodable ae = algID.Parameters; + + DsaParameters parameters = null; + if (ae != null) + { + DsaParameter para = DsaParameter.GetInstance(ae.ToAsn1Object()); + parameters = new DsaParameters(para.P, para.Q, para.G); + } + + return new DsaPrivateKeyParameters(derX.Value, parameters); + } + else if (algOid.Equals(X9ObjectIdentifiers.IdECPublicKey)) + { + X962Parameters para = X962Parameters.GetInstance(algID.Parameters.ToAsn1Object()); + + X9ECParameters x9; + if (para.IsNamedCurve) + { + x9 = ECKeyPairGenerator.FindECCurveByOid((DerObjectIdentifier)para.Parameters); + } + else + { + x9 = new X9ECParameters((Asn1Sequence)para.Parameters); + } + + ECPrivateKeyStructure ec = ECPrivateKeyStructure.GetInstance(keyInfo.ParsePrivateKey()); + BigInteger d = ec.GetKey(); + + if (para.IsNamedCurve) + { + return new ECPrivateKeyParameters("EC", d, (DerObjectIdentifier)para.Parameters); + } + + ECDomainParameters dParams = new ECDomainParameters(x9.Curve, x9.G, x9.N, x9.H, x9.GetSeed()); + return new ECPrivateKeyParameters(d, dParams); + } + else if (algOid.Equals(CryptoProObjectIdentifiers.GostR3410x2001) || + algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512) || + algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256)) + { + Asn1Object p = algID.Parameters.ToAsn1Object(); + Gost3410PublicKeyAlgParameters gostParams = Gost3410PublicKeyAlgParameters.GetInstance(p); + + ECGost3410Parameters ecSpec; + BigInteger d; + + if (p is Asn1Sequence seq && (seq.Count == 2 || seq.Count == 3)) + { + X9ECParameters ecP = ECGost3410NamedCurves.GetByOid(gostParams.PublicKeyParamSet); + if (ecP == null) + throw new ArgumentException("Unrecognized curve OID for GostR3410x2001 private key"); + + ecSpec = new ECGost3410Parameters( + new ECNamedDomainParameters(gostParams.PublicKeyParamSet, ecP), + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + + Asn1OctetString privEnc = keyInfo.PrivateKeyData; + if (privEnc.GetOctets().Length == 32 || privEnc.GetOctets().Length == 64) + { + d = new BigInteger(1, Arrays.Reverse(privEnc.GetOctets())); + } + else + { + Asn1Object privKey = keyInfo.ParsePrivateKey(); + if (privKey is DerInteger derInteger) + { + d = derInteger.PositiveValue; + } + else + { + byte[] dVal = Arrays.Reverse(Asn1OctetString.GetInstance(privKey).GetOctets()); + d = new BigInteger(1, dVal); + } + } + } + else + { + X962Parameters x962Parameters = X962Parameters.GetInstance(p); + + if (x962Parameters.IsNamedCurve) + { + DerObjectIdentifier oid = DerObjectIdentifier.GetInstance(x962Parameters.Parameters); + X9ECParameters ecP = ECNamedCurveTable.GetByOid(oid); + if (ecP == null) + throw new ArgumentException("Unrecognized curve OID for GostR3410x2001 private key"); + + ecSpec = new ECGost3410Parameters( + new ECNamedDomainParameters(oid, ecP), + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + } + else if (x962Parameters.IsImplicitlyCA) + { + ecSpec = null; + } + else + { + X9ECParameters ecP = X9ECParameters.GetInstance(x962Parameters.Parameters); + + ecSpec = new ECGost3410Parameters( + new ECNamedDomainParameters(algOid, ecP), + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + } + + Asn1Object privKey = keyInfo.ParsePrivateKey(); + if (privKey is DerInteger derD) + { + d = derD.Value; + } + else + { + ECPrivateKeyStructure ec = ECPrivateKeyStructure.GetInstance(privKey); + + d = ec.GetKey(); + } + } + + return new ECPrivateKeyParameters( + d, + new ECGost3410Parameters( + ecSpec, + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet)); + } + else if (algOid.Equals(CryptoProObjectIdentifiers.GostR3410x94)) + { + Gost3410PublicKeyAlgParameters gostParams = Gost3410PublicKeyAlgParameters.GetInstance(algID.Parameters); + + Asn1Object privKey = keyInfo.ParsePrivateKey(); + BigInteger x; + + if (privKey is DerInteger) + { + x = DerInteger.GetInstance(privKey).PositiveValue; + } + else + { + x = new BigInteger(1, Arrays.Reverse(Asn1OctetString.GetInstance(privKey).GetOctets())); + } + + return new Gost3410PrivateKeyParameters(x, gostParams.PublicKeyParamSet); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_X25519) + || algOid.Equals(CryptlibObjectIdentifiers.curvey25519)) + { + return new X25519PrivateKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_X448)) + { + return new X448PrivateKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_Ed25519) + || algOid.Equals(GnuObjectIdentifiers.Ed25519)) + { + return new Ed25519PrivateKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_Ed448)) + { + return new Ed448PrivateKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_agreement_gost_3410_12_256) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_agreement_gost_3410_12_512)) + { + Gost3410PublicKeyAlgParameters gostParams = Gost3410PublicKeyAlgParameters.GetInstance( + keyInfo.PrivateKeyAlgorithm.Parameters); + ECGost3410Parameters ecSpec; + BigInteger d; + Asn1Object p = keyInfo.PrivateKeyAlgorithm.Parameters.ToAsn1Object(); + if (p is Asn1Sequence && (Asn1Sequence.GetInstance(p).Count == 2 || Asn1Sequence.GetInstance(p).Count == 3)) + { + X9ECParameters ecP = ECGost3410NamedCurves.GetByOid(gostParams.PublicKeyParamSet); + + ecSpec = new ECGost3410Parameters( + new ECNamedDomainParameters( + gostParams.PublicKeyParamSet, ecP), + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + + Asn1OctetString privEnc = keyInfo.PrivateKeyData; + if (privEnc.GetOctets().Length == 32 || privEnc.GetOctets().Length == 64) + { + byte[] dVal = Arrays.Reverse(privEnc.GetOctets()); + d = new BigInteger(1, dVal); + } + else + { + Asn1Encodable privKey = keyInfo.ParsePrivateKey(); + if (privKey is DerInteger) + { + d = DerInteger.GetInstance(privKey).PositiveValue; + } + else + { + byte[] dVal = Arrays.Reverse(Asn1OctetString.GetInstance(privKey).GetOctets()); + d = new BigInteger(1, dVal); + } + } + } + else + { + X962Parameters parameters = X962Parameters.GetInstance(keyInfo.PrivateKeyAlgorithm.Parameters); + + if (parameters.IsNamedCurve) + { + DerObjectIdentifier oid = DerObjectIdentifier.GetInstance(parameters.Parameters); + X9ECParameters ecP = ECKeyPairGenerator.FindECCurveByOid(oid); + + ecSpec = new ECGost3410Parameters(new ECNamedDomainParameters(oid, ecP), + gostParams.PublicKeyParamSet, gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + } + else if (parameters.IsImplicitlyCA) + { + ecSpec = null; + } + else + { + X9ECParameters ecP = X9ECParameters.GetInstance(parameters.Parameters); + ecSpec = new ECGost3410Parameters(new ECNamedDomainParameters(algOid, ecP), + gostParams.PublicKeyParamSet, gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + } + + Asn1Encodable privKey = keyInfo.ParsePrivateKey(); + if (privKey is DerInteger) + { + DerInteger derD = DerInteger.GetInstance(privKey); + d = derD.Value; + } + else + { + ECPrivateKeyStructure ec = ECPrivateKeyStructure.GetInstance(privKey); + d = ec.GetKey(); + } + } + + return new ECPrivateKeyParameters( + d, + new ECGost3410Parameters( + ecSpec, + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet)); + + } + else + { + throw new SecurityUtilityException("algorithm identifier in private key not recognised"); + } + } + + private static byte[] GetRawKey(PrivateKeyInfo keyInfo) + { + return Asn1OctetString.GetInstance(keyInfo.ParsePrivateKey()).GetOctets(); + } + + public static AsymmetricKeyParameter DecryptKey( + char[] passPhrase, + EncryptedPrivateKeyInfo encInfo) + { + return CreateKey(PrivateKeyInfoFactory.CreatePrivateKeyInfo(passPhrase, encInfo)); + } + + public static AsymmetricKeyParameter DecryptKey( + char[] passPhrase, + byte[] encryptedPrivateKeyInfoData) + { + return DecryptKey(passPhrase, Asn1Object.FromByteArray(encryptedPrivateKeyInfoData)); + } + + public static AsymmetricKeyParameter DecryptKey( + char[] passPhrase, + Stream encryptedPrivateKeyInfoStream) + { + return DecryptKey(passPhrase, Asn1Object.FromStream(encryptedPrivateKeyInfoStream)); + } + + private static AsymmetricKeyParameter DecryptKey( + char[] passPhrase, + Asn1Object asn1Object) + { + return DecryptKey(passPhrase, EncryptedPrivateKeyInfo.GetInstance(asn1Object)); + } + + public static byte[] EncryptKey( + DerObjectIdentifier algorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + AsymmetricKeyParameter key) + { + return EncryptedPrivateKeyInfoFactory.CreateEncryptedPrivateKeyInfo( + algorithm, passPhrase, salt, iterationCount, key).GetEncoded(); + } + + public static byte[] EncryptKey( + string algorithm, + char[] passPhrase, + byte[] salt, + int iterationCount, + AsymmetricKeyParameter key) + { + return EncryptedPrivateKeyInfoFactory.CreateEncryptedPrivateKeyInfo( + algorithm, passPhrase, salt, iterationCount, key).GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs.meta new file mode 100644 index 00000000..570c83de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 85adaa18b04407841abedf0df4d09d99 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PrivateKeyFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs new file mode 100644 index 00000000..c2dc763c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs @@ -0,0 +1,322 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cryptlib; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Gnu; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public static class PublicKeyFactory + { + public static AsymmetricKeyParameter CreateKey( + byte[] keyInfoData) + { + return CreateKey( + SubjectPublicKeyInfo.GetInstance( + Asn1Object.FromByteArray(keyInfoData))); + } + + public static AsymmetricKeyParameter CreateKey( + Stream inStr) + { + return CreateKey( + SubjectPublicKeyInfo.GetInstance( + Asn1Object.FromStream(inStr))); + } + + public static AsymmetricKeyParameter CreateKey( + SubjectPublicKeyInfo keyInfo) + { + AlgorithmIdentifier algID = keyInfo.AlgorithmID; + DerObjectIdentifier algOid = algID.Algorithm; + + // TODO See RSAUtil.isRsaOid in Java build + if (algOid.Equals(PkcsObjectIdentifiers.RsaEncryption) + || algOid.Equals(X509ObjectIdentifiers.IdEARsa) + || algOid.Equals(PkcsObjectIdentifiers.IdRsassaPss) + || algOid.Equals(PkcsObjectIdentifiers.IdRsaesOaep)) + { + RsaPublicKeyStructure pubKey = RsaPublicKeyStructure.GetInstance( + keyInfo.ParsePublicKey()); + + return new RsaKeyParameters(false, pubKey.Modulus, pubKey.PublicExponent); + } + else if (algOid.Equals(X9ObjectIdentifiers.DHPublicNumber)) + { + Asn1Sequence seq = Asn1Sequence.GetInstance(algID.Parameters.ToAsn1Object()); + + DHPublicKey dhPublicKey = DHPublicKey.GetInstance(keyInfo.ParsePublicKey()); + + BigInteger y = dhPublicKey.Y.Value; + + if (IsPkcsDHParam(seq)) + return ReadPkcsDHParam(algOid, y, seq); + + DHDomainParameters dhParams = DHDomainParameters.GetInstance(seq); + + BigInteger p = dhParams.P.Value; + BigInteger g = dhParams.G.Value; + BigInteger q = dhParams.Q.Value; + + BigInteger j = null; + if (dhParams.J != null) + { + j = dhParams.J.Value; + } + + DHValidationParameters validation = null; + DHValidationParms dhValidationParms = dhParams.ValidationParms; + if (dhValidationParms != null) + { + byte[] seed = dhValidationParms.Seed.GetBytes(); + BigInteger pgenCounter = dhValidationParms.PgenCounter.Value; + + // TODO Check pgenCounter size? + + validation = new DHValidationParameters(seed, pgenCounter.IntValue); + } + + return new DHPublicKeyParameters(y, new DHParameters(p, g, q, j, validation)); + } + else if (algOid.Equals(PkcsObjectIdentifiers.DhKeyAgreement)) + { + Asn1Sequence seq = Asn1Sequence.GetInstance(algID.Parameters.ToAsn1Object()); + + DerInteger derY = (DerInteger)keyInfo.ParsePublicKey(); + + return ReadPkcsDHParam(algOid, derY.Value, seq); + } + else if (algOid.Equals(OiwObjectIdentifiers.ElGamalAlgorithm)) + { + ElGamalParameter para = new ElGamalParameter( + Asn1Sequence.GetInstance(algID.Parameters.ToAsn1Object())); + DerInteger derY = (DerInteger)keyInfo.ParsePublicKey(); + + return new ElGamalPublicKeyParameters( + derY.Value, + new ElGamalParameters(para.P, para.G)); + } + else if (algOid.Equals(X9ObjectIdentifiers.IdDsa) + || algOid.Equals(OiwObjectIdentifiers.DsaWithSha1)) + { + DerInteger derY = (DerInteger)keyInfo.ParsePublicKey(); + Asn1Encodable ae = algID.Parameters; + + DsaParameters parameters = null; + if (ae != null) + { + DsaParameter para = DsaParameter.GetInstance(ae.ToAsn1Object()); + parameters = new DsaParameters(para.P, para.Q, para.G); + } + + return new DsaPublicKeyParameters(derY.Value, parameters); + } + else if (algOid.Equals(X9ObjectIdentifiers.IdECPublicKey)) + { + X962Parameters para = X962Parameters.GetInstance(algID.Parameters.ToAsn1Object()); + + X9ECParameters x9; + if (para.IsNamedCurve) + { + x9 = ECKeyPairGenerator.FindECCurveByOid((DerObjectIdentifier)para.Parameters); + } + else + { + x9 = new X9ECParameters((Asn1Sequence)para.Parameters); + } + + Asn1OctetString key = new DerOctetString(keyInfo.PublicKeyData.GetBytes()); + X9ECPoint derQ = new X9ECPoint(x9.Curve, key); + ECPoint q = derQ.Point; + + if (para.IsNamedCurve) + { + return new ECPublicKeyParameters("EC", q, (DerObjectIdentifier)para.Parameters); + } + + ECDomainParameters dParams = new ECDomainParameters(x9); + return new ECPublicKeyParameters(q, dParams); + } + else if (algOid.Equals(CryptoProObjectIdentifiers.GostR3410x2001)) + { + Gost3410PublicKeyAlgParameters gostParams = Gost3410PublicKeyAlgParameters.GetInstance(algID.Parameters); + DerObjectIdentifier publicKeyParamSet = gostParams.PublicKeyParamSet; + + X9ECParameters ecP = ECGost3410NamedCurves.GetByOid(publicKeyParamSet); + if (ecP == null) + return null; + + Asn1OctetString key; + try + { + key = (Asn1OctetString)keyInfo.ParsePublicKey(); + } + catch (IOException e) + { + throw new ArgumentException("error recovering GOST3410_2001 public key", e); + } + + int fieldSize = 32; + int keySize = 2 * fieldSize; + + byte[] keyEnc = key.GetOctets(); + if (keyEnc.Length != keySize) + throw new ArgumentException("invalid length for GOST3410_2001 public key"); + + byte[] x9Encoding = new byte[1 + keySize]; + x9Encoding[0] = 0x04; + for (int i = 1; i <= fieldSize; ++i) + { + x9Encoding[i] = keyEnc[fieldSize - i]; + x9Encoding[i + fieldSize] = keyEnc[keySize - i]; + } + + ECPoint q = ecP.Curve.DecodePoint(x9Encoding); + + return new ECPublicKeyParameters("ECGOST3410", q, publicKeyParamSet); + } + else if (algOid.Equals(CryptoProObjectIdentifiers.GostR3410x94)) + { + Gost3410PublicKeyAlgParameters algParams = Gost3410PublicKeyAlgParameters.GetInstance(algID.Parameters); + + Asn1OctetString key; + try + { + key = (Asn1OctetString)keyInfo.ParsePublicKey(); + } + catch (IOException e) + { + throw new ArgumentException("error recovering GOST3410_94 public key", e); + } + + byte[] keyBytes = Arrays.Reverse(key.GetOctets()); // was little endian + + BigInteger y = new BigInteger(1, keyBytes); + + return new Gost3410PublicKeyParameters(y, algParams.PublicKeyParamSet); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_X25519) + || algOid.Equals(CryptlibObjectIdentifiers.curvey25519)) + { + return new X25519PublicKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_X448)) + { + return new X448PublicKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_Ed25519) + || algOid.Equals(GnuObjectIdentifiers.Ed25519)) + { + return new Ed25519PublicKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(EdECObjectIdentifiers.id_Ed448)) + { + return new Ed448PublicKeyParameters(GetRawKey(keyInfo)); + } + else if (algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_agreement_gost_3410_12_256) + || algOid.Equals(RosstandartObjectIdentifiers.id_tc26_agreement_gost_3410_12_512)) + { + Gost3410PublicKeyAlgParameters gostParams = Gost3410PublicKeyAlgParameters.GetInstance(algID.Parameters); + DerObjectIdentifier publicKeyParamSet = gostParams.PublicKeyParamSet; + + ECGost3410Parameters ecDomainParameters =new ECGost3410Parameters( + new ECNamedDomainParameters(publicKeyParamSet, ECGost3410NamedCurves.GetByOid(publicKeyParamSet)), + publicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + + Asn1OctetString key; + try + { + key = (Asn1OctetString)keyInfo.ParsePublicKey(); + } + catch (IOException e) + { + throw new ArgumentException("error recovering GOST3410_2012 public key", e); + } + + int fieldSize = 32; + if (algOid.Equals(RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512)) + { + fieldSize = 64; + } + int keySize = 2 * fieldSize; + + byte[] keyEnc = key.GetOctets(); + if (keyEnc.Length != keySize) + throw new ArgumentException("invalid length for GOST3410_2012 public key"); + + byte[] x9Encoding = new byte[1 + keySize]; + x9Encoding[0] = 0x04; + for (int i = 1; i <= fieldSize; ++i) + { + x9Encoding[i] = keyEnc[fieldSize - i]; + x9Encoding[i + fieldSize] = keyEnc[keySize - i]; + } + + ECPoint q = ecDomainParameters.Curve.DecodePoint(x9Encoding); + + return new ECPublicKeyParameters(q, ecDomainParameters); + } + else + { + throw new SecurityUtilityException("algorithm identifier in public key not recognised: " + algOid); + } + } + + private static byte[] GetRawKey(SubjectPublicKeyInfo keyInfo) + { + /* + * TODO[RFC 8422] + * - Require keyInfo.Algorithm.Parameters == null? + */ + return keyInfo.PublicKeyData.GetOctets(); + } + + private static bool IsPkcsDHParam(Asn1Sequence seq) + { + if (seq.Count == 2) + return true; + + if (seq.Count > 3) + return false; + + DerInteger l = DerInteger.GetInstance(seq[2]); + DerInteger p = DerInteger.GetInstance(seq[0]); + + return l.Value.CompareTo(BigInteger.ValueOf(p.Value.BitLength)) <= 0; + } + + private static DHPublicKeyParameters ReadPkcsDHParam(DerObjectIdentifier algOid, + BigInteger y, Asn1Sequence seq) + { + DHParameter para = new DHParameter(seq); + + BigInteger lVal = para.L; + int l = lVal == null ? 0 : lVal.IntValue; + DHParameters dhParams = new DHParameters(para.P, para.G, null, l); + + return new DHPublicKeyParameters(y, dhParams, algOid); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs.meta new file mode 100644 index 00000000..c7bb770e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a1df72ef9f3aca445944c307f852e67a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/PublicKeyFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs new file mode 100644 index 00000000..d5c04e56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs @@ -0,0 +1,267 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Threading; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + public class SecureRandom + : Random + { + private static long counter = DateTime.UtcNow.Ticks; + + private static long NextCounterValue() + { + return Interlocked.Increment(ref counter); + } + + private static readonly SecureRandom MasterRandom = new SecureRandom(new CryptoApiRandomGenerator()); + internal static readonly SecureRandom ArbitraryRandom = new SecureRandom(new VmpcRandomGenerator(), 16); + + private static DigestRandomGenerator CreatePrng(string digestName, bool autoSeed) + { + IDigest digest = DigestUtilities.GetDigest(digestName); + if (digest == null) + return null; + DigestRandomGenerator prng = new DigestRandomGenerator(digest); + if (autoSeed) + { + AutoSeed(prng, digest.GetDigestSize()); + } + return prng; + } + + public static byte[] GetNextBytes(SecureRandom secureRandom, int length) + { + byte[] result = new byte[length]; + secureRandom.NextBytes(result); + return result; + } + + /// + /// Create and auto-seed an instance based on the given algorithm. + /// + /// Equivalent to GetInstance(algorithm, true) + /// e.g. "SHA256PRNG" + public static SecureRandom GetInstance(string algorithm) + { + return GetInstance(algorithm, true); + } + + /// + /// Create an instance based on the given algorithm, with optional auto-seeding + /// + /// e.g. "SHA256PRNG" + /// If true, the instance will be auto-seeded. + public static SecureRandom GetInstance(string algorithm, bool autoSeed) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + if (algorithm.EndsWith("PRNG", StringComparison.OrdinalIgnoreCase)) + { + string digestName = algorithm.Substring(0, algorithm.Length - "PRNG".Length); + + DigestRandomGenerator prng = CreatePrng(digestName, autoSeed); + if (prng != null) + return new SecureRandom(prng); + } + + throw new ArgumentException("Unrecognised PRNG algorithm: " + algorithm, "algorithm"); + } + + protected readonly IRandomGenerator generator; + + public SecureRandom() + : this(CreatePrng("SHA256", true)) + { + } + + /// Use the specified instance of IRandomGenerator as random source. + /// + /// This constructor performs no seeding of either the IRandomGenerator or the + /// constructed SecureRandom. It is the responsibility of the client to provide + /// proper seed material as necessary/appropriate for the given IRandomGenerator + /// implementation. + /// + /// The source to generate all random bytes from. + public SecureRandom(IRandomGenerator generator) + : base(0) + { + this.generator = generator; + } + + public SecureRandom(IRandomGenerator generator, int autoSeedLengthInBytes) + : base(0) + { + AutoSeed(generator, autoSeedLengthInBytes); + + this.generator = generator; + } + + public virtual byte[] GenerateSeed(int length) + { + return GetNextBytes(MasterRandom, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void GenerateSeed(Span seed) + { + MasterRandom.NextBytes(seed); + } +#endif + + public virtual void SetSeed(byte[] seed) + { + generator.AddSeedMaterial(seed); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void SetSeed(Span seed) + { + generator.AddSeedMaterial(seed); + } +#endif + + public virtual void SetSeed(long seed) + { + generator.AddSeedMaterial(seed); + } + + public override int Next() + { + return NextInt() & int.MaxValue; + } + + public override int Next(int maxValue) + { + if (maxValue < 2) + { + if (maxValue < 0) + throw new ArgumentOutOfRangeException("maxValue", "cannot be negative"); + + return 0; + } + + int bits; + + // Test whether maxValue is a power of 2 + if ((maxValue & (maxValue - 1)) == 0) + { + bits = NextInt() & int.MaxValue; + return (int)(((long)bits * maxValue) >> 31); + } + + int result; + do + { + bits = NextInt() & int.MaxValue; + result = bits % maxValue; + } + while (bits - result + (maxValue - 1) < 0); // Ignore results near overflow + + return result; + } + + public override int Next(int minValue, int maxValue) + { + if (maxValue <= minValue) + { + if (maxValue == minValue) + return minValue; + + throw new ArgumentException("maxValue cannot be less than minValue"); + } + + int diff = maxValue - minValue; + if (diff > 0) + return minValue + Next(diff); + + for (;;) + { + int i = NextInt(); + + if (i >= minValue && i < maxValue) + return i; + } + } + + public override void NextBytes(byte[] buf) + { + generator.NextBytes(buf); + } + + public virtual void NextBytes(byte[] buf, int off, int len) + { + generator.NextBytes(buf, off, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void NextBytes(Span buffer) + { + if (generator != null) + { + generator.NextBytes(buffer); + } + else + { + byte[] tmp = new byte[buffer.Length]; + NextBytes(tmp); + tmp.CopyTo(buffer); + } + } +#endif + + private static readonly double DoubleScale = 1.0 / Convert.ToDouble(1L << 53); + + public override double NextDouble() + { + ulong x = (ulong)NextLong() >> 11; + + return Convert.ToDouble(x) * DoubleScale; + } + + public virtual int NextInt() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = stackalloc byte[4]; +#else + byte[] bytes = new byte[4]; +#endif + NextBytes(bytes); + return (int)Pack.BE_To_UInt32(bytes); + } + + public virtual long NextLong() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span bytes = stackalloc byte[8]; +#else + byte[] bytes = new byte[8]; +#endif + NextBytes(bytes); + return (long)Pack.BE_To_UInt64(bytes); + } + + private static void AutoSeed(IRandomGenerator generator, int seedLength) + { + generator.AddSeedMaterial(NextCounterValue()); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span seed = seedLength <= 128 + ? stackalloc byte[seedLength] + : new byte[seedLength]; +#else + byte[] seed = new byte[seedLength]; +#endif + MasterRandom.NextBytes(seed); + generator.AddSeedMaterial(seed); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs.meta new file mode 100644 index 00000000..888bc3f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0731b199d0ba3d747baa640cbe95310d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecureRandom.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs new file mode 100644 index 00000000..55ac72dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class SecurityUtilityException + : Exception + { + public SecurityUtilityException() + : base() + { + } + + public SecurityUtilityException(string message) + : base(message) + { + } + + public SecurityUtilityException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected SecurityUtilityException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs.meta new file mode 100644 index 00000000..6c466e1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 181c09d31591c8b4bb1c71c82e8cbaf9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SecurityUtilityException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs new file mode 100644 index 00000000..6b1a61af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + [Serializable] + public class SignatureException + : GeneralSecurityException + { + public SignatureException() + : base() + { + } + + public SignatureException(string message) + : base(message) + { + } + + public SignatureException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected SignatureException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs.meta new file mode 100644 index 00000000..ed0d4525 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 576b3e321edaccf4ab48b1c3b6bc44c6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignatureException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs new file mode 100644 index 00000000..9f6216c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs @@ -0,0 +1,711 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Signer Utility class contains methods that can not be specifically grouped into other classes. + /// + public static class SignerUtilities + { + internal static readonly IDictionary AlgorithmMap = + new Dictionary(StringComparer.OrdinalIgnoreCase); + internal static readonly IDictionary Oids = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static SignerUtilities() + { + AlgorithmMap["MD2WITHRSA"] = "MD2withRSA"; + AlgorithmMap["MD2WITHRSAENCRYPTION"] = "MD2withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.MD2WithRsaEncryption.Id] = "MD2withRSA"; + + AlgorithmMap["MD4WITHRSA"] = "MD4withRSA"; + AlgorithmMap["MD4WITHRSAENCRYPTION"] = "MD4withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.MD4WithRsaEncryption.Id] = "MD4withRSA"; + AlgorithmMap[OiwObjectIdentifiers.MD4WithRsa.Id] = "MD4withRSA"; + AlgorithmMap[OiwObjectIdentifiers.MD4WithRsaEncryption.Id] = "MD4withRSA"; + + AlgorithmMap["MD5WITHRSA"] = "MD5withRSA"; + AlgorithmMap["MD5WITHRSAENCRYPTION"] = "MD5withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.MD5WithRsaEncryption.Id] = "MD5withRSA"; + AlgorithmMap[OiwObjectIdentifiers.MD5WithRsa.Id] = "MD5withRSA"; + + AlgorithmMap["SHA1WITHRSA"] = "SHA-1withRSA"; + AlgorithmMap["SHA-1WITHRSA"] = "SHA-1withRSA"; + AlgorithmMap["SHA1WITHRSAENCRYPTION"] = "SHA-1withRSA"; + AlgorithmMap["SHA-1WITHRSAENCRYPTION"] = "SHA-1withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha1WithRsaEncryption.Id] = "SHA-1withRSA"; + AlgorithmMap[OiwObjectIdentifiers.Sha1WithRsa.Id] = "SHA-1withRSA"; + + AlgorithmMap["SHA224WITHRSA"] = "SHA-224withRSA"; + AlgorithmMap["SHA-224WITHRSA"] = "SHA-224withRSA"; + AlgorithmMap["SHA224WITHRSAENCRYPTION"] = "SHA-224withRSA"; + AlgorithmMap["SHA-224WITHRSAENCRYPTION"] = "SHA-224withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha224WithRsaEncryption.Id] = "SHA-224withRSA"; + + AlgorithmMap["SHA256WITHRSA"] = "SHA-256withRSA"; + AlgorithmMap["SHA-256WITHRSA"] = "SHA-256withRSA"; + AlgorithmMap["SHA256WITHRSAENCRYPTION"] = "SHA-256withRSA"; + AlgorithmMap["SHA-256WITHRSAENCRYPTION"] = "SHA-256withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha256WithRsaEncryption.Id] = "SHA-256withRSA"; + + AlgorithmMap["SHA384WITHRSA"] = "SHA-384withRSA"; + AlgorithmMap["SHA-384WITHRSA"] = "SHA-384withRSA"; + AlgorithmMap["SHA384WITHRSAENCRYPTION"] = "SHA-384withRSA"; + AlgorithmMap["SHA-384WITHRSAENCRYPTION"] = "SHA-384withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha384WithRsaEncryption.Id] = "SHA-384withRSA"; + + AlgorithmMap["SHA512WITHRSA"] = "SHA-512withRSA"; + AlgorithmMap["SHA-512WITHRSA"] = "SHA-512withRSA"; + AlgorithmMap["SHA512WITHRSAENCRYPTION"] = "SHA-512withRSA"; + AlgorithmMap["SHA-512WITHRSAENCRYPTION"] = "SHA-512withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha512WithRsaEncryption.Id] = "SHA-512withRSA"; + + AlgorithmMap["SHA512(224)WITHRSA"] = "SHA-512(224)withRSA"; + AlgorithmMap["SHA-512(224)WITHRSA"] = "SHA-512(224)withRSA"; + AlgorithmMap["SHA512(224)WITHRSAENCRYPTION"] = "SHA-512(224)withRSA"; + AlgorithmMap["SHA-512(224)WITHRSAENCRYPTION"] = "SHA-512(224)withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha512_224WithRSAEncryption.Id] = "SHA-512(224)withRSA"; + + AlgorithmMap["SHA512(256)WITHRSA"] = "SHA-512(256)withRSA"; + AlgorithmMap["SHA-512(256)WITHRSA"] = "SHA-512(256)withRSA"; + AlgorithmMap["SHA512(256)WITHRSAENCRYPTION"] = "SHA-512(256)withRSA"; + AlgorithmMap["SHA-512(256)WITHRSAENCRYPTION"] = "SHA-512(256)withRSA"; + AlgorithmMap[PkcsObjectIdentifiers.Sha512_256WithRSAEncryption.Id] = "SHA-512(256)withRSA"; + + AlgorithmMap["SHA3-224WITHRSA"] = "SHA3-224withRSA"; + AlgorithmMap["SHA3-224WITHRSAENCRYPTION"] = "SHA3-224withRSA"; + AlgorithmMap[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224.Id] = "SHA3-224withRSA"; + AlgorithmMap["SHA3-256WITHRSA"] = "SHA3-256withRSA"; + AlgorithmMap["SHA3-256WITHRSAENCRYPTION"] = "SHA3-256withRSA"; + AlgorithmMap[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256.Id] = "SHA3-256withRSA"; + AlgorithmMap["SHA3-384WITHRSA"] = "SHA3-384withRSA"; + AlgorithmMap["SHA3-384WITHRSAENCRYPTION"] = "SHA3-384withRSA"; + AlgorithmMap[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384.Id] = "SHA3-384withRSA"; + AlgorithmMap["SHA3-512WITHRSA"] = "SHA3-512withRSA"; + AlgorithmMap["SHA3-512WITHRSAENCRYPTION"] = "SHA3-512withRSA"; + AlgorithmMap[NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512.Id] = "SHA3-512withRSA"; + + AlgorithmMap["PSSWITHRSA"] = "PSSwithRSA"; + AlgorithmMap["RSASSA-PSS"] = "PSSwithRSA"; + AlgorithmMap[PkcsObjectIdentifiers.IdRsassaPss.Id] = "PSSwithRSA"; + AlgorithmMap["RSAPSS"] = "PSSwithRSA"; + + AlgorithmMap["SHA1WITHRSAANDMGF1"] = "SHA-1withRSAandMGF1"; + AlgorithmMap["SHA-1WITHRSAANDMGF1"] = "SHA-1withRSAandMGF1"; + AlgorithmMap["SHA1WITHRSA/PSS"] = "SHA-1withRSAandMGF1"; + AlgorithmMap["SHA-1WITHRSA/PSS"] = "SHA-1withRSAandMGF1"; + AlgorithmMap["SHA1WITHRSASSA-PSS"] = "SHA-1withRSAandMGF1"; + AlgorithmMap["SHA-1WITHRSASSA-PSS"] = "SHA-1withRSAandMGF1"; + + AlgorithmMap["SHA224WITHRSAANDMGF1"] = "SHA-224withRSAandMGF1"; + AlgorithmMap["SHA-224WITHRSAANDMGF1"] = "SHA-224withRSAandMGF1"; + AlgorithmMap["SHA224WITHRSA/PSS"] = "SHA-224withRSAandMGF1"; + AlgorithmMap["SHA-224WITHRSA/PSS"] = "SHA-224withRSAandMGF1"; + AlgorithmMap["SHA224WITHRSASSA-PSS"] = "SHA-224withRSAandMGF1"; + AlgorithmMap["SHA-224WITHRSASSA-PSS"] = "SHA-224withRSAandMGF1"; + + AlgorithmMap["SHA256WITHRSAANDMGF1"] = "SHA-256withRSAandMGF1"; + AlgorithmMap["SHA-256WITHRSAANDMGF1"] = "SHA-256withRSAandMGF1"; + AlgorithmMap["SHA256WITHRSA/PSS"] = "SHA-256withRSAandMGF1"; + AlgorithmMap["SHA-256WITHRSA/PSS"] = "SHA-256withRSAandMGF1"; + AlgorithmMap["SHA256WITHRSASSA-PSS"] = "SHA-256withRSAandMGF1"; + AlgorithmMap["SHA-256WITHRSASSA-PSS"] = "SHA-256withRSAandMGF1"; + + AlgorithmMap["SHA384WITHRSAANDMGF1"] = "SHA-384withRSAandMGF1"; + AlgorithmMap["SHA-384WITHRSAANDMGF1"] = "SHA-384withRSAandMGF1"; + AlgorithmMap["SHA384WITHRSA/PSS"] = "SHA-384withRSAandMGF1"; + AlgorithmMap["SHA-384WITHRSA/PSS"] = "SHA-384withRSAandMGF1"; + AlgorithmMap["SHA384WITHRSASSA-PSS"] = "SHA-384withRSAandMGF1"; + AlgorithmMap["SHA-384WITHRSASSA-PSS"] = "SHA-384withRSAandMGF1"; + + AlgorithmMap["SHA512WITHRSAANDMGF1"] = "SHA-512withRSAandMGF1"; + AlgorithmMap["SHA-512WITHRSAANDMGF1"] = "SHA-512withRSAandMGF1"; + AlgorithmMap["SHA512WITHRSA/PSS"] = "SHA-512withRSAandMGF1"; + AlgorithmMap["SHA-512WITHRSA/PSS"] = "SHA-512withRSAandMGF1"; + AlgorithmMap["SHA512WITHRSASSA-PSS"] = "SHA-512withRSAandMGF1"; + AlgorithmMap["SHA-512WITHRSASSA-PSS"] = "SHA-512withRSAandMGF1"; + + AlgorithmMap["RIPEMD128WITHRSA"] = "RIPEMD128withRSA"; + AlgorithmMap["RIPEMD128WITHRSAENCRYPTION"] = "RIPEMD128withRSA"; + AlgorithmMap[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128.Id] = "RIPEMD128withRSA"; + + AlgorithmMap["RIPEMD160WITHRSA"] = "RIPEMD160withRSA"; + AlgorithmMap["RIPEMD160WITHRSAENCRYPTION"] = "RIPEMD160withRSA"; + AlgorithmMap[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160.Id] = "RIPEMD160withRSA"; + + AlgorithmMap["RIPEMD256WITHRSA"] = "RIPEMD256withRSA"; + AlgorithmMap["RIPEMD256WITHRSAENCRYPTION"] = "RIPEMD256withRSA"; + AlgorithmMap[TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256.Id] = "RIPEMD256withRSA"; + + AlgorithmMap["NONEWITHRSA"] = "RSA"; + AlgorithmMap["RSAWITHNONE"] = "RSA"; + AlgorithmMap["RAWRSA"] = "RSA"; + + AlgorithmMap["RAWRSAPSS"] = "RAWRSASSA-PSS"; + AlgorithmMap["NONEWITHRSAPSS"] = "RAWRSASSA-PSS"; + AlgorithmMap["NONEWITHRSASSA-PSS"] = "RAWRSASSA-PSS"; + + AlgorithmMap["NONEWITHDSA"] = "NONEwithDSA"; + AlgorithmMap["DSAWITHNONE"] = "NONEwithDSA"; + AlgorithmMap["RAWDSA"] = "NONEwithDSA"; + + AlgorithmMap["DSA"] = "SHA-1withDSA"; + AlgorithmMap["DSAWITHSHA1"] = "SHA-1withDSA"; + AlgorithmMap["DSAWITHSHA-1"] = "SHA-1withDSA"; + AlgorithmMap["SHA/DSA"] = "SHA-1withDSA"; + AlgorithmMap["SHA1/DSA"] = "SHA-1withDSA"; + AlgorithmMap["SHA-1/DSA"] = "SHA-1withDSA"; + AlgorithmMap["SHA1WITHDSA"] = "SHA-1withDSA"; + AlgorithmMap["SHA-1WITHDSA"] = "SHA-1withDSA"; + AlgorithmMap[X9ObjectIdentifiers.IdDsaWithSha1.Id] = "SHA-1withDSA"; + AlgorithmMap[OiwObjectIdentifiers.DsaWithSha1.Id] = "SHA-1withDSA"; + + AlgorithmMap["DSAWITHSHA224"] = "SHA-224withDSA"; + AlgorithmMap["DSAWITHSHA-224"] = "SHA-224withDSA"; + AlgorithmMap["SHA224/DSA"] = "SHA-224withDSA"; + AlgorithmMap["SHA-224/DSA"] = "SHA-224withDSA"; + AlgorithmMap["SHA224WITHDSA"] = "SHA-224withDSA"; + AlgorithmMap["SHA-224WITHDSA"] = "SHA-224withDSA"; + AlgorithmMap[NistObjectIdentifiers.DsaWithSha224.Id] = "SHA-224withDSA"; + + AlgorithmMap["DSAWITHSHA256"] = "SHA-256withDSA"; + AlgorithmMap["DSAWITHSHA-256"] = "SHA-256withDSA"; + AlgorithmMap["SHA256/DSA"] = "SHA-256withDSA"; + AlgorithmMap["SHA-256/DSA"] = "SHA-256withDSA"; + AlgorithmMap["SHA256WITHDSA"] = "SHA-256withDSA"; + AlgorithmMap["SHA-256WITHDSA"] = "SHA-256withDSA"; + AlgorithmMap[NistObjectIdentifiers.DsaWithSha256.Id] = "SHA-256withDSA"; + + AlgorithmMap["DSAWITHSHA384"] = "SHA-384withDSA"; + AlgorithmMap["DSAWITHSHA-384"] = "SHA-384withDSA"; + AlgorithmMap["SHA384/DSA"] = "SHA-384withDSA"; + AlgorithmMap["SHA-384/DSA"] = "SHA-384withDSA"; + AlgorithmMap["SHA384WITHDSA"] = "SHA-384withDSA"; + AlgorithmMap["SHA-384WITHDSA"] = "SHA-384withDSA"; + AlgorithmMap[NistObjectIdentifiers.DsaWithSha384.Id] = "SHA-384withDSA"; + + AlgorithmMap["DSAWITHSHA512"] = "SHA-512withDSA"; + AlgorithmMap["DSAWITHSHA-512"] = "SHA-512withDSA"; + AlgorithmMap["SHA512/DSA"] = "SHA-512withDSA"; + AlgorithmMap["SHA-512/DSA"] = "SHA-512withDSA"; + AlgorithmMap["SHA512WITHDSA"] = "SHA-512withDSA"; + AlgorithmMap["SHA-512WITHDSA"] = "SHA-512withDSA"; + AlgorithmMap[NistObjectIdentifiers.DsaWithSha512.Id] = "SHA-512withDSA"; + + AlgorithmMap["NONEWITHECDSA"] = "NONEwithECDSA"; + AlgorithmMap["ECDSAWITHNONE"] = "NONEwithECDSA"; + + AlgorithmMap["ECDSA"] = "SHA-1withECDSA"; + AlgorithmMap["SHA1/ECDSA"] = "SHA-1withECDSA"; + AlgorithmMap["SHA-1/ECDSA"] = "SHA-1withECDSA"; + AlgorithmMap["ECDSAWITHSHA1"] = "SHA-1withECDSA"; + AlgorithmMap["ECDSAWITHSHA-1"] = "SHA-1withECDSA"; + AlgorithmMap["SHA1WITHECDSA"] = "SHA-1withECDSA"; + AlgorithmMap["SHA-1WITHECDSA"] = "SHA-1withECDSA"; + AlgorithmMap[X9ObjectIdentifiers.ECDsaWithSha1.Id] = "SHA-1withECDSA"; + AlgorithmMap[TeleTrusTObjectIdentifiers.ECSignWithSha1.Id] = "SHA-1withECDSA"; + + AlgorithmMap["SHA224/ECDSA"] = "SHA-224withECDSA"; + AlgorithmMap["SHA-224/ECDSA"] = "SHA-224withECDSA"; + AlgorithmMap["ECDSAWITHSHA224"] = "SHA-224withECDSA"; + AlgorithmMap["ECDSAWITHSHA-224"] = "SHA-224withECDSA"; + AlgorithmMap["SHA224WITHECDSA"] = "SHA-224withECDSA"; + AlgorithmMap["SHA-224WITHECDSA"] = "SHA-224withECDSA"; + AlgorithmMap[X9ObjectIdentifiers.ECDsaWithSha224.Id] = "SHA-224withECDSA"; + + AlgorithmMap["SHA256/ECDSA"] = "SHA-256withECDSA"; + AlgorithmMap["SHA-256/ECDSA"] = "SHA-256withECDSA"; + AlgorithmMap["ECDSAWITHSHA256"] = "SHA-256withECDSA"; + AlgorithmMap["ECDSAWITHSHA-256"] = "SHA-256withECDSA"; + AlgorithmMap["SHA256WITHECDSA"] = "SHA-256withECDSA"; + AlgorithmMap["SHA-256WITHECDSA"] = "SHA-256withECDSA"; + AlgorithmMap[X9ObjectIdentifiers.ECDsaWithSha256.Id] = "SHA-256withECDSA"; + + AlgorithmMap["SHA384/ECDSA"] = "SHA-384withECDSA"; + AlgorithmMap["SHA-384/ECDSA"] = "SHA-384withECDSA"; + AlgorithmMap["ECDSAWITHSHA384"] = "SHA-384withECDSA"; + AlgorithmMap["ECDSAWITHSHA-384"] = "SHA-384withECDSA"; + AlgorithmMap["SHA384WITHECDSA"] = "SHA-384withECDSA"; + AlgorithmMap["SHA-384WITHECDSA"] = "SHA-384withECDSA"; + AlgorithmMap[X9ObjectIdentifiers.ECDsaWithSha384.Id] = "SHA-384withECDSA"; + + AlgorithmMap["SHA512/ECDSA"] = "SHA-512withECDSA"; + AlgorithmMap["SHA-512/ECDSA"] = "SHA-512withECDSA"; + AlgorithmMap["ECDSAWITHSHA512"] = "SHA-512withECDSA"; + AlgorithmMap["ECDSAWITHSHA-512"] = "SHA-512withECDSA"; + AlgorithmMap["SHA512WITHECDSA"] = "SHA-512withECDSA"; + AlgorithmMap["SHA-512WITHECDSA"] = "SHA-512withECDSA"; + AlgorithmMap[X9ObjectIdentifiers.ECDsaWithSha512.Id] = "SHA-512withECDSA"; + + AlgorithmMap["RIPEMD160/ECDSA"] = "RIPEMD160withECDSA"; + AlgorithmMap["ECDSAWITHRIPEMD160"] = "RIPEMD160withECDSA"; + AlgorithmMap["RIPEMD160WITHECDSA"] = "RIPEMD160withECDSA"; + AlgorithmMap[TeleTrusTObjectIdentifiers.ECSignWithRipeMD160.Id] = "RIPEMD160withECDSA"; + + AlgorithmMap["NONEWITHCVC-ECDSA"] = "NONEwithCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHNONE"] = "NONEwithCVC-ECDSA"; + + AlgorithmMap["SHA1/CVC-ECDSA"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap["SHA-1/CVC-ECDSA"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA1"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA-1"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap["SHA1WITHCVC-ECDSA"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap["SHA-1WITHCVC-ECDSA"] = "SHA-1withCVC-ECDSA"; + AlgorithmMap[EacObjectIdentifiers.id_TA_ECDSA_SHA_1.Id] = "SHA-1withCVC-ECDSA"; + + AlgorithmMap["SHA224/CVC-ECDSA"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap["SHA-224/CVC-ECDSA"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA224"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA-224"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap["SHA224WITHCVC-ECDSA"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap["SHA-224WITHCVC-ECDSA"] = "SHA-224withCVC-ECDSA"; + AlgorithmMap[EacObjectIdentifiers.id_TA_ECDSA_SHA_224.Id] = "SHA-224withCVC-ECDSA"; + + AlgorithmMap["SHA256/CVC-ECDSA"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap["SHA-256/CVC-ECDSA"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA256"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA-256"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap["SHA256WITHCVC-ECDSA"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap["SHA-256WITHCVC-ECDSA"] = "SHA-256withCVC-ECDSA"; + AlgorithmMap[EacObjectIdentifiers.id_TA_ECDSA_SHA_256.Id] = "SHA-256withCVC-ECDSA"; + + AlgorithmMap["SHA384/CVC-ECDSA"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap["SHA-384/CVC-ECDSA"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA384"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA-384"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap["SHA384WITHCVC-ECDSA"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap["SHA-384WITHCVC-ECDSA"] = "SHA-384withCVC-ECDSA"; + AlgorithmMap[EacObjectIdentifiers.id_TA_ECDSA_SHA_384.Id] = "SHA-384withCVC-ECDSA"; + + AlgorithmMap["SHA512/CVC-ECDSA"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap["SHA-512/CVC-ECDSA"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA512"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap["CVC-ECDSAWITHSHA-512"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap["SHA512WITHCVC-ECDSA"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap["SHA-512WITHCVC-ECDSA"] = "SHA-512withCVC-ECDSA"; + AlgorithmMap[EacObjectIdentifiers.id_TA_ECDSA_SHA_512.Id] = "SHA-512withCVC-ECDSA"; + + AlgorithmMap["NONEWITHPLAIN-ECDSA"] = "NONEwithPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHNONE"] = "NONEwithPLAIN-ECDSA"; + + AlgorithmMap["SHA1/PLAIN-ECDSA"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap["SHA-1/PLAIN-ECDSA"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA1"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA-1"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap["SHA1WITHPLAIN-ECDSA"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap["SHA-1WITHPLAIN-ECDSA"] = "SHA-1withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_SHA1.Id] = "SHA-1withPLAIN-ECDSA"; + + AlgorithmMap["SHA224/PLAIN-ECDSA"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap["SHA-224/PLAIN-ECDSA"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA224"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA-224"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap["SHA224WITHPLAIN-ECDSA"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap["SHA-224WITHPLAIN-ECDSA"] = "SHA-224withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_SHA224.Id] = "SHA-224withPLAIN-ECDSA"; + + AlgorithmMap["SHA256/PLAIN-ECDSA"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap["SHA-256/PLAIN-ECDSA"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA256"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA-256"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap["SHA256WITHPLAIN-ECDSA"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap["SHA-256WITHPLAIN-ECDSA"] = "SHA-256withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_SHA256.Id] = "SHA-256withPLAIN-ECDSA"; + + AlgorithmMap["SHA384/PLAIN-ECDSA"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap["SHA-384/PLAIN-ECDSA"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA384"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA-384"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap["SHA384WITHPLAIN-ECDSA"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap["SHA-384WITHPLAIN-ECDSA"] = "SHA-384withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_SHA384.Id] = "SHA-384withPLAIN-ECDSA"; + + AlgorithmMap["SHA512/PLAIN-ECDSA"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap["SHA-512/PLAIN-ECDSA"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA512"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHSHA-512"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap["SHA512WITHPLAIN-ECDSA"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap["SHA-512WITHPLAIN-ECDSA"] = "SHA-512withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_SHA512.Id] = "SHA-512withPLAIN-ECDSA"; + + AlgorithmMap["RIPEMD160/PLAIN-ECDSA"] = "RIPEMD160withPLAIN-ECDSA"; + AlgorithmMap["PLAIN-ECDSAWITHRIPEMD160"] = "RIPEMD160withPLAIN-ECDSA"; + AlgorithmMap["RIPEMD160WITHPLAIN-ECDSA"] = "RIPEMD160withPLAIN-ECDSA"; + AlgorithmMap[BsiObjectIdentifiers.ecdsa_plain_RIPEMD160.Id] = "RIPEMD160withPLAIN-ECDSA"; + + AlgorithmMap["SHA1WITHECNR"] = "SHA-1withECNR"; + AlgorithmMap["SHA-1WITHECNR"] = "SHA-1withECNR"; + AlgorithmMap["SHA224WITHECNR"] = "SHA-224withECNR"; + AlgorithmMap["SHA-224WITHECNR"] = "SHA-224withECNR"; + AlgorithmMap["SHA256WITHECNR"] = "SHA-256withECNR"; + AlgorithmMap["SHA-256WITHECNR"] = "SHA-256withECNR"; + AlgorithmMap["SHA384WITHECNR"] = "SHA-384withECNR"; + AlgorithmMap["SHA-384WITHECNR"] = "SHA-384withECNR"; + AlgorithmMap["SHA512WITHECNR"] = "SHA-512withECNR"; + AlgorithmMap["SHA-512WITHECNR"] = "SHA-512withECNR"; + + AlgorithmMap["GOST-3410"] = "GOST3410"; + AlgorithmMap["GOST-3410-94"] = "GOST3410"; + AlgorithmMap["GOST3411WITHGOST3410"] = "GOST3410"; + AlgorithmMap["GOST3411/GOST3410"] = "GOST3410"; + AlgorithmMap[CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94.Id] = "GOST3410"; + + AlgorithmMap["ECGOST-3410"] = "ECGOST3410"; + AlgorithmMap["GOST-3410-2001"] = "ECGOST3410"; + AlgorithmMap["GOST3411WITHECGOST3410"] = "ECGOST3410"; + AlgorithmMap["GOST3411/ECGOST3410"] = "ECGOST3410"; + AlgorithmMap[CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001.Id] = "ECGOST3410"; + + AlgorithmMap["GOST-3410-2012-256"] = "ECGOST3410-2012-256"; + AlgorithmMap["GOST3411WITHECGOST3410-2012-256"] = "ECGOST3410-2012-256"; + AlgorithmMap["GOST3411-2012-256WITHECGOST3410"] = "ECGOST3410-2012-256"; + AlgorithmMap["GOST3411-2012-256WITHECGOST3410-2012-256"] = "ECGOST3410-2012-256"; + AlgorithmMap["GOST3411-2012-256/ECGOST3410"] = "ECGOST3410-2012-256"; + AlgorithmMap["GOST3411-2012-256/ECGOST3410-2012-256"] = "ECGOST3410-2012-256"; + AlgorithmMap[RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256.Id] = + "ECGOST3410-2012-256"; + + AlgorithmMap["GOST-3410-2012-512"] = "ECGOST3410-2012-512"; + AlgorithmMap["GOST3411WITHECGOST3410-2012-512"] = "ECGOST3410-2012-512"; + AlgorithmMap["GOST3411-2012-512WITHECGOST3410"] = "ECGOST3410-2012-512"; + AlgorithmMap["GOST3411-2012-512WITHECGOST3410-2012-512"] = "ECGOST3410-2012-512"; + AlgorithmMap["GOST3411-2012-512/ECGOST3410"] = "ECGOST3410-2012-512"; + AlgorithmMap["GOST3411-2012-512/ECGOST3410-2012-512"] = "ECGOST3410-2012-512"; + AlgorithmMap[RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512.Id] = + "ECGOST3410-2012-512"; + + AlgorithmMap["ED25519"] = "Ed25519"; + AlgorithmMap[EdECObjectIdentifiers.id_Ed25519.Id] = "Ed25519"; + AlgorithmMap["ED25519CTX"] = "Ed25519ctx"; + AlgorithmMap["ED25519PH"] = "Ed25519ph"; + AlgorithmMap["ED448"] = "Ed448"; + AlgorithmMap[EdECObjectIdentifiers.id_Ed448.Id] = "Ed448"; + AlgorithmMap["ED448PH"] = "Ed448ph"; + + AlgorithmMap["SHA256WITHSM2"] = "SHA256withSM2"; + AlgorithmMap[GMObjectIdentifiers.sm2sign_with_sha256.Id] = "SHA256withSM2"; + AlgorithmMap["SM3WITHSM2"] = "SM3withSM2"; + AlgorithmMap[GMObjectIdentifiers.sm2sign_with_sm3.Id] = "SM3withSM2"; + + Oids["MD2withRSA"] = PkcsObjectIdentifiers.MD2WithRsaEncryption; + Oids["MD4withRSA"] = PkcsObjectIdentifiers.MD4WithRsaEncryption; + Oids["MD5withRSA"] = PkcsObjectIdentifiers.MD5WithRsaEncryption; + + Oids["SHA-1withRSA"] = PkcsObjectIdentifiers.Sha1WithRsaEncryption; + Oids["SHA-224withRSA"] = PkcsObjectIdentifiers.Sha224WithRsaEncryption; + Oids["SHA-256withRSA"] = PkcsObjectIdentifiers.Sha256WithRsaEncryption; + Oids["SHA-384withRSA"] = PkcsObjectIdentifiers.Sha384WithRsaEncryption; + Oids["SHA-512withRSA"] = PkcsObjectIdentifiers.Sha512WithRsaEncryption; + Oids["SHA-512(224)withRSA"] = PkcsObjectIdentifiers.Sha512_224WithRSAEncryption; + Oids["SHA-512(256)withRSA"] = PkcsObjectIdentifiers.Sha512_256WithRSAEncryption; + Oids["SHA3-224withRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_224; + Oids["SHA3-256withRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_256; + Oids["SHA3-384withRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_384; + Oids["SHA3-512withRSA"] = NistObjectIdentifiers.IdRsassaPkcs1V15WithSha3_512; + + Oids["PSSwithRSA"] = PkcsObjectIdentifiers.IdRsassaPss; + Oids["SHA-1withRSAandMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + Oids["SHA-224withRSAandMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + Oids["SHA-256withRSAandMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + Oids["SHA-384withRSAandMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + Oids["SHA-512withRSAandMGF1"] = PkcsObjectIdentifiers.IdRsassaPss; + + Oids["RIPEMD128withRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128; + Oids["RIPEMD160withRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160; + Oids["RIPEMD256withRSA"] = TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256; + + Oids["SHA-1withDSA"] = X9ObjectIdentifiers.IdDsaWithSha1; + + Oids["SHA-1withECDSA"] = X9ObjectIdentifiers.ECDsaWithSha1; + Oids["SHA-224withECDSA"] = X9ObjectIdentifiers.ECDsaWithSha224; + Oids["SHA-256withECDSA"] = X9ObjectIdentifiers.ECDsaWithSha256; + Oids["SHA-384withECDSA"] = X9ObjectIdentifiers.ECDsaWithSha384; + Oids["SHA-512withECDSA"] = X9ObjectIdentifiers.ECDsaWithSha512; + Oids["RIPEMD160withECDSA"] = TeleTrusTObjectIdentifiers.ECSignWithRipeMD160; + + Oids["SHA-1withCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_1; + Oids["SHA-224withCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_224; + Oids["SHA-256withCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_256; + Oids["SHA-384withCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_384; + Oids["SHA-512withCVC-ECDSA"] = EacObjectIdentifiers.id_TA_ECDSA_SHA_512; + + Oids["SHA-1withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA1; + Oids["SHA-224withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA224; + Oids["SHA-256withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA256; + Oids["SHA-384withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA384; + Oids["SHA-512withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_SHA512; + Oids["RIPEMD160withPLAIN-ECDSA"] = BsiObjectIdentifiers.ecdsa_plain_RIPEMD160; + + Oids["GOST3410"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94; + Oids["ECGOST3410"] = CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001; + + Oids["ECGOST3410-2012-256"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256; + Oids["ECGOST3410-2012-512"] = RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512; + + Oids["Ed25519"] = EdECObjectIdentifiers.id_Ed25519; + Oids["Ed448"] = EdECObjectIdentifiers.id_Ed448; + + Oids["SHA256withSM2"] = GMObjectIdentifiers.sm2sign_with_sha256; + Oids["SM3withSM2"] = GMObjectIdentifiers.sm2sign_with_sm3; + } + + /// + /// Returns an ObjectIdentifier for a given encoding. + /// + /// A string representation of the encoding. + /// A DerObjectIdentifier, null if the OID is not available. + // TODO Don't really want to support this + public static DerObjectIdentifier GetObjectIdentifier(string mechanism) + { + if (mechanism == null) + throw new ArgumentNullException(nameof(mechanism)); + + string algorithm = CollectionUtilities.GetValueOrKey(AlgorithmMap, mechanism); + + return CollectionUtilities.GetValueOrNull(Oids, algorithm); + } + + public static ICollection Algorithms + { + get { return CollectionUtilities.ReadOnly(Oids.Keys); } + } + + public static Asn1Encodable GetDefaultX509Parameters(DerObjectIdentifier id) + { + return GetDefaultX509Parameters(id.Id); + } + + public static Asn1Encodable GetDefaultX509Parameters(string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + string mechanism = CollectionUtilities.GetValueOrKey(AlgorithmMap, algorithm); + + if (mechanism == "PSSwithRSA") + { + // TODO The Sha1Digest here is a default. In JCE version, the actual digest + // to be used can be overridden by subsequent parameter settings. + return GetPssX509Parameters("SHA-1"); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withRSAandMGF1")) + { + string digestName = mechanism.Substring(0, mechanism.Length - "withRSAandMGF1".Length); + return GetPssX509Parameters(digestName); + } + + return DerNull.Instance; + } + + private static Asn1Encodable GetPssX509Parameters( + string digestName) + { + AlgorithmIdentifier hashAlgorithm = new AlgorithmIdentifier( + DigestUtilities.GetObjectIdentifier(digestName), DerNull.Instance); + + // TODO Is it possible for the MGF hash alg to be different from the PSS one? + AlgorithmIdentifier maskGenAlgorithm = new AlgorithmIdentifier( + PkcsObjectIdentifiers.IdMgf1, hashAlgorithm); + + int saltLen = DigestUtilities.GetDigest(digestName).GetDigestSize(); + return new RsassaPssParameters(hashAlgorithm, maskGenAlgorithm, + new DerInteger(saltLen), new DerInteger(1)); + } + + public static ISigner GetSigner(DerObjectIdentifier id) + { + return GetSigner(id.Id); + } + + public static ISigner GetSigner(string algorithm) + { + if (algorithm == null) + throw new ArgumentNullException(nameof(algorithm)); + + string mechanism = CollectionUtilities.GetValueOrKey(AlgorithmMap, algorithm.ToUpperInvariant()); + + if (Org.BouncyCastle.Utilities.Platform.StartsWith(mechanism, "Ed")) + { + if (mechanism.Equals("Ed25519")) + { + return new Ed25519Signer(); + } + if (mechanism.Equals("Ed25519ctx")) + { + return new Ed25519ctxSigner(Arrays.EmptyBytes); + } + if (mechanism.Equals("Ed25519ph")) + { + return new Ed25519phSigner(Arrays.EmptyBytes); + } + if (mechanism.Equals("Ed448")) + { + return new Ed448Signer(Arrays.EmptyBytes); + } + if (mechanism.Equals("Ed448ph")) + { + return new Ed448phSigner(Arrays.EmptyBytes); + } + } + + if (mechanism.Equals("RSA")) + { + return (new RsaDigestSigner(new NullDigest(), (AlgorithmIdentifier)null)); + } + if (mechanism.Equals("RAWRSASSA-PSS")) + { + // TODO Add support for other parameter settings + return PssSigner.CreateRawSigner(new RsaBlindedEngine(), new Sha1Digest()); + } + if (mechanism.Equals("PSSwithRSA")) + { + // TODO The Sha1Digest here is a default. In JCE version, the actual digest + // to be used can be overridden by subsequent parameter settings. + return new PssSigner(new RsaBlindedEngine(), new Sha1Digest()); + } + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withRSA")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new RsaDigestSigner(digest); + } + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withRSAandMGF1")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new PssSigner(new RsaBlindedEngine(), digest); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withDSA")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new DsaDigestSigner(new DsaSigner(), digest); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withECDSA")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new DsaDigestSigner(new ECDsaSigner(), digest); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withCVC-ECDSA") + || Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withPLAIN-ECDSA")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new DsaDigestSigner(new ECDsaSigner(), digest, PlainDsaEncoding.Instance); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withECNR")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new DsaDigestSigner(new ECNRSigner(), digest); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "withSM2")) + { + string digestName = mechanism.Substring(0, mechanism.LastIndexOf("with")); + IDigest digest = DigestUtilities.GetDigest(digestName); + return new SM2Signer(digest); + } + + if (mechanism.Equals("GOST3410")) + { + return new Gost3410DigestSigner(new Gost3410Signer(), new Gost3411Digest()); + } + if (mechanism.Equals("ECGOST3410")) + { + return new Gost3410DigestSigner(new ECGost3410Signer(), new Gost3411Digest()); + } + if (mechanism.Equals("ECGOST3410-2012-256")) + { + return new Gost3410DigestSigner(new ECGost3410Signer(), new Gost3411_2012_256Digest()); + } + if (mechanism.Equals("ECGOST3410-2012-512")) + { + return new Gost3410DigestSigner(new ECGost3410Signer(), new Gost3411_2012_512Digest()); + } + + if (mechanism.Equals("SHA1WITHRSA/ISO9796-2")) + { + return new Iso9796d2Signer(new RsaBlindedEngine(), new Sha1Digest(), true); + } + if (mechanism.Equals("MD5WITHRSA/ISO9796-2")) + { + return new Iso9796d2Signer(new RsaBlindedEngine(), new MD5Digest(), true); + } + if (mechanism.Equals("RIPEMD160WITHRSA/ISO9796-2")) + { + return new Iso9796d2Signer(new RsaBlindedEngine(), new RipeMD160Digest(), true); + } + + if (Org.BouncyCastle.Utilities.Platform.EndsWith(mechanism, "/X9.31")) + { + string x931 = mechanism.Substring(0, mechanism.Length - "/X9.31".Length); + int withPos = Org.BouncyCastle.Utilities.Platform.IndexOf(x931, "WITH"); + if (withPos > 0) + { + int endPos = withPos + "WITH".Length; + + string digestName = x931.Substring(0, withPos); + IDigest digest = DigestUtilities.GetDigest(digestName); + + string cipherName = x931.Substring(endPos, x931.Length - endPos); + if (cipherName.Equals("RSA")) + { + IAsymmetricBlockCipher cipher = new RsaBlindedEngine(); + return new X931Signer(cipher, digest); + } + } + } + + throw new SecurityUtilityException("Signer " + algorithm + " not recognised."); + } + + public static string GetEncodingName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(AlgorithmMap, oid.Id); + } + + public static ISigner InitSigner(DerObjectIdentifier algorithmOid, bool forSigning, AsymmetricKeyParameter privateKey, SecureRandom random) + { + return InitSigner(algorithmOid.Id, forSigning, privateKey, random); + } + + public static ISigner InitSigner(string algorithm, bool forSigning, AsymmetricKeyParameter privateKey, SecureRandom random) + { + ISigner signer = GetSigner(algorithm); + signer.Init(forSigning, ParameterUtilities.WithRandom(privateKey, random)); + return signer; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs.meta new file mode 100644 index 00000000..c2fc6028 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b62719c4972e35743a8c43085dbdda2a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/SignerUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs new file mode 100644 index 00000000..c50d9245 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Kisa; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ntt; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security +{ + /// + /// Utility class for creating IWrapper objects from their names/Oids + /// + public static class WrapperUtilities + { + private enum WrapAlgorithm { AESWRAP, CAMELLIAWRAP, DESEDEWRAP, RC2WRAP, SEEDWRAP, + DESEDERFC3211WRAP, AESRFC3211WRAP, CAMELLIARFC3211WRAP }; + + private static readonly IDictionary Algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + + static WrapperUtilities() + { + // Signal to obfuscation tools not to change enum constants + Enums.GetArbitraryValue().ToString(); + + Algorithms[NistObjectIdentifiers.IdAes128Wrap.Id] = "AESWRAP"; + Algorithms[NistObjectIdentifiers.IdAes192Wrap.Id] = "AESWRAP"; + Algorithms[NistObjectIdentifiers.IdAes256Wrap.Id] = "AESWRAP"; + + Algorithms[NttObjectIdentifiers.IdCamellia128Wrap.Id] = "CAMELLIAWRAP"; + Algorithms[NttObjectIdentifiers.IdCamellia192Wrap.Id] = "CAMELLIAWRAP"; + Algorithms[NttObjectIdentifiers.IdCamellia256Wrap.Id] = "CAMELLIAWRAP"; + + Algorithms[PkcsObjectIdentifiers.IdAlgCms3DesWrap.Id] = "DESEDEWRAP"; + Algorithms["TDEAWRAP"] = "DESEDEWRAP"; + + Algorithms[PkcsObjectIdentifiers.IdAlgCmsRC2Wrap.Id] = "RC2WRAP"; + + Algorithms[KisaObjectIdentifiers.IdNpkiAppCmsSeedWrap.Id] = "SEEDWRAP"; + } + + public static IWrapper GetWrapper(DerObjectIdentifier oid) + { + return GetWrapper(oid.Id); + } + + public static IWrapper GetWrapper(string algorithm) + { + string mechanism = CollectionUtilities.GetValueOrKey(Algorithms, algorithm).ToUpperInvariant(); + + try + { + WrapAlgorithm wrapAlgorithm = Enums.GetEnumValue(mechanism); + + switch (wrapAlgorithm) + { + case WrapAlgorithm.AESWRAP: return new AesWrapEngine(); + case WrapAlgorithm.CAMELLIAWRAP: return new CamelliaWrapEngine(); + case WrapAlgorithm.DESEDEWRAP: return new DesEdeWrapEngine(); + case WrapAlgorithm.RC2WRAP: return new RC2WrapEngine(); + case WrapAlgorithm.SEEDWRAP: return new SeedWrapEngine(); + case WrapAlgorithm.DESEDERFC3211WRAP: return new Rfc3211WrapEngine(new DesEdeEngine()); + case WrapAlgorithm.AESRFC3211WRAP: return new Rfc3211WrapEngine(AesUtilities.CreateEngine()); + case WrapAlgorithm.CAMELLIARFC3211WRAP: return new Rfc3211WrapEngine(new CamelliaEngine()); + } + } + catch (ArgumentException) + { + } + + // Create an IBufferedCipher and use it as IWrapper (via BufferedCipherWrapper) + IBufferedCipher blockCipher = CipherUtilities.GetCipher(algorithm); + + if (blockCipher != null) + return new BufferedCipherWrapper(blockCipher); + + throw new SecurityUtilityException("Wrapper " + algorithm + " not recognised."); + } + + public static string GetAlgorithmName(DerObjectIdentifier oid) + { + return CollectionUtilities.GetValueOrNull(Algorithms, oid.Id); + } + + private class BufferedCipherWrapper + : IWrapper + { + private readonly IBufferedCipher cipher; + private bool forWrapping; + + public BufferedCipherWrapper( + IBufferedCipher cipher) + { + this.cipher = cipher; + } + + public string AlgorithmName + { + get { return cipher.AlgorithmName; } + } + + public void Init( + bool forWrapping, + ICipherParameters parameters) + { + this.forWrapping = forWrapping; + + cipher.Init(forWrapping, parameters); + } + + public byte[] Wrap( + byte[] input, + int inOff, + int length) + { + if (!forWrapping) + throw new InvalidOperationException("Not initialised for wrapping"); + + return cipher.DoFinal(input, inOff, length); + } + + public byte[] Unwrap( + byte[] input, + int inOff, + int length) + { + if (forWrapping) + throw new InvalidOperationException("Not initialised for unwrapping"); + + return cipher.DoFinal(input, inOff, length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs.meta new file mode 100644 index 00000000..03e3122c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8ce4500c6130be5468c2706cc93a6c9d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/WrapperUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert.meta new file mode 100644 index 00000000..92c64ded --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 213149bb88b23594da11a7fb57134c1d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs new file mode 100644 index 00000000..27ce55ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CertificateEncodingException + : CertificateException + { + public CertificateEncodingException() + : base() + { + } + + public CertificateEncodingException(string message) + : base(message) + { + } + + public CertificateEncodingException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CertificateEncodingException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs.meta new file mode 100644 index 00000000..3e9fd92e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a7193fbc9a98f4349ab1d8d3e04edc85 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateEncodingException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs new file mode 100644 index 00000000..c384620a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CertificateException + : GeneralSecurityException + { + public CertificateException() + : base() + { + } + + public CertificateException(string message) + : base(message) + { + } + + public CertificateException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CertificateException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs.meta new file mode 100644 index 00000000..859301c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0eb9f6f322156a04f9aff03b4561b82b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs new file mode 100644 index 00000000..0292057f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CertificateExpiredException + : CertificateException + { + public CertificateExpiredException() + : base() + { + } + + public CertificateExpiredException(string message) + : base(message) + { + } + + public CertificateExpiredException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CertificateExpiredException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs.meta new file mode 100644 index 00000000..3e9f8f98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a93f66f40ea6194782b585eda01542a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateExpiredException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs new file mode 100644 index 00000000..f106500b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CertificateNotYetValidException + : CertificateException + { + public CertificateNotYetValidException() + : base() + { + } + + public CertificateNotYetValidException(string message) + : base(message) + { + } + + public CertificateNotYetValidException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CertificateNotYetValidException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs.meta new file mode 100644 index 00000000..c1ff56be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a84cec395c32284fbc3840613861e76 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateNotYetValidException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs new file mode 100644 index 00000000..3429396c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CertificateParsingException + : CertificateException + { + public CertificateParsingException() + : base() + { + } + + public CertificateParsingException(string message) + : base(message) + { + } + + public CertificateParsingException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CertificateParsingException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs.meta new file mode 100644 index 00000000..2d7714df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c280cf8a77358364888575577b2e3b5b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CertificateParsingException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs new file mode 100644 index 00000000..5346834c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates +{ + [Serializable] + public class CrlException + : GeneralSecurityException + { + public CrlException() + : base() + { + } + + public CrlException(string message) + : base(message) + { + } + + public CrlException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected CrlException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs.meta new file mode 100644 index 00000000..03973064 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0a4267b054d871b47bddaf9f92a251a3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/security/cert/CrlException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls.meta new file mode 100644 index 00000000..6e643d12 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 6c2af7a6cdbdb8142bbfe76f00e51619 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs new file mode 100644 index 00000000..bf273385 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs @@ -0,0 +1,488 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base class for a TLS client. + public abstract class AbstractTlsClient + : AbstractTlsPeer, TlsClient + { + protected TlsClientContext m_context; + protected ProtocolVersion[] m_protocolVersions; + protected int[] m_cipherSuites; + + protected IList m_supportedGroups; + protected IList m_supportedSignatureAlgorithms; + protected IList m_supportedSignatureAlgorithmsCert; + + protected AbstractTlsClient(TlsCrypto crypto) + : base(crypto) + { + } + + /// + protected virtual bool AllowUnexpectedServerExtension(int extensionType, byte[] extensionData) + { + switch (extensionType) + { + case ExtensionType.supported_groups: + /* + * Exception added based on field reports that some servers do send this, although the + * Supported Elliptic Curves Extension is clearly intended to be client-only. If + * present, we still require that it is a valid EllipticCurveList. + */ + TlsExtensionsUtilities.ReadSupportedGroupsExtension(extensionData); + return true; + + case ExtensionType.ec_point_formats: + /* + * Exception added based on field reports that some servers send this even when they + * didn't negotiate an ECC cipher suite. If present, we still require that it is a valid + * ECPointFormatList. + */ + TlsExtensionsUtilities.ReadSupportedPointFormatsExtension(extensionData); + return true; + + default: + return false; + } + } + + protected virtual IList GetNamedGroupRoles() + { + var namedGroupRoles = TlsUtilities.GetNamedGroupRoles(GetCipherSuites()); + var sigAlgs = m_supportedSignatureAlgorithms; + var sigAlgsCert = m_supportedSignatureAlgorithmsCert; + + if ((null == sigAlgs || TlsUtilities.ContainsAnySignatureAlgorithm(sigAlgs, SignatureAlgorithm.ecdsa)) || + (null != sigAlgsCert && TlsUtilities.ContainsAnySignatureAlgorithm(sigAlgsCert, SignatureAlgorithm.ecdsa))) + { + TlsUtilities.AddToSet(namedGroupRoles, NamedGroupRole.ecdsa); + } + + return namedGroupRoles; + } + + /// + protected virtual void CheckForUnexpectedServerExtension(IDictionary serverExtensions, + int extensionType) + { + byte[] extensionData = TlsUtilities.GetExtensionData(serverExtensions, extensionType); + if (extensionData != null && !AllowUnexpectedServerExtension(extensionType, extensionData)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + /// + public virtual TlsPskIdentity GetPskIdentity() + { + return null; + } + + /// + public virtual TlsSrpIdentity GetSrpIdentity() + { + return null; + } + + public virtual TlsDHGroupVerifier GetDHGroupVerifier() + { + return new DefaultTlsDHGroupVerifier(); + } + + public virtual TlsSrpConfigVerifier GetSrpConfigVerifier() + { + return new DefaultTlsSrpConfigVerifier(); + } + + protected virtual IList GetCertificateAuthorities() + { + return null; + } + + protected virtual IList GetProtocolNames() + { + return null; + } + + protected virtual CertificateStatusRequest GetCertificateStatusRequest() + { + return new CertificateStatusRequest(CertificateStatusType.ocsp, new OcspStatusRequest(null, null)); + } + + /// an of (or null). + protected virtual IList GetMultiCertStatusRequest() + { + return null; + } + + protected virtual IList GetSniServerNames() + { + return null; + } + + /// The default implementation calls this to determine which named + /// groups to include in the supported_groups extension for the ClientHello. + /// The named group roles for which there should + /// be at least one supported group. By default this is inferred from the offered cipher suites and signature + /// algorithms. + /// an of . See for group constants. + /// + protected virtual IList GetSupportedGroups(IList namedGroupRoles) + { + TlsCrypto crypto = Crypto; + var supportedGroups = new List(); + + if (namedGroupRoles.Contains(NamedGroupRole.ecdh)) + { + TlsUtilities.AddIfSupported(supportedGroups, crypto, + new int[]{ NamedGroup.x25519, NamedGroup.x448 }); + } + + if (namedGroupRoles.Contains(NamedGroupRole.ecdh) || + namedGroupRoles.Contains(NamedGroupRole.ecdsa)) + { + TlsUtilities.AddIfSupported(supportedGroups, crypto, + new int[]{ NamedGroup.secp256r1, NamedGroup.secp384r1 }); + } + + if (namedGroupRoles.Contains(NamedGroupRole.dh)) + { + TlsUtilities.AddIfSupported(supportedGroups, crypto, + new int[]{ NamedGroup.ffdhe2048, NamedGroup.ffdhe3072, NamedGroup.ffdhe4096 }); + } + + return supportedGroups; + } + + protected virtual IList GetSupportedSignatureAlgorithms() + { + return TlsUtilities.GetDefaultSupportedSignatureAlgorithms(m_context); + } + + protected virtual IList GetSupportedSignatureAlgorithmsCert() + { + return null; + } + + protected virtual IList GetTrustedCAIndication() + { + return null; + } + + protected virtual short[] GetAllowedClientCertificateTypes() + { + return null; + } + + protected virtual short[] GetAllowedServerCertificateTypes() + { + return null; + } + + public virtual void Init(TlsClientContext context) + { + this.m_context = context; + + this.m_protocolVersions = GetSupportedVersions(); + this.m_cipherSuites = GetSupportedCipherSuites(); + } + + public override ProtocolVersion[] GetProtocolVersions() + { + return m_protocolVersions; + } + + public override int[] GetCipherSuites() + { + return m_cipherSuites; + } + + /// + public override void NotifyHandshakeBeginning() + { + base.NotifyHandshakeBeginning(); + + this.m_supportedGroups = null; + this.m_supportedSignatureAlgorithms = null; + this.m_supportedSignatureAlgorithmsCert = null; + } + + public virtual TlsSession GetSessionToResume() + { + return null; + } + + public virtual IList GetExternalPsks() + { + return null; + } + + public virtual bool IsFallback() + { + /* + * RFC 7507 4. The TLS_FALLBACK_SCSV cipher suite value is meant for use by clients that + * repeat a connection attempt with a downgraded protocol (perform a "fallback retry") in + * order to work around interoperability problems with legacy servers. + */ + return false; + } + + /// + public virtual IDictionary GetClientExtensions() + { + var clientExtensions = new Dictionary(); + + bool offeringTlsV13Plus = false; + bool offeringPreTlsV13 = false; + { + ProtocolVersion[] supportedVersions = GetProtocolVersions(); + for (int i = 0; i < supportedVersions.Length; ++i) + { + if (TlsUtilities.IsTlsV13(supportedVersions[i])) + { + offeringTlsV13Plus = true; + } + else + { + offeringPreTlsV13 = true; + } + } + } + + var protocolNames = GetProtocolNames(); + if (protocolNames != null) + { + TlsExtensionsUtilities.AddAlpnExtensionClient(clientExtensions, protocolNames); + } + + var sniServerNames = GetSniServerNames(); + if (sniServerNames != null) + { + TlsExtensionsUtilities.AddServerNameExtensionClient(clientExtensions, sniServerNames); + } + + CertificateStatusRequest statusRequest = GetCertificateStatusRequest(); + if (statusRequest != null) + { + TlsExtensionsUtilities.AddStatusRequestExtension(clientExtensions, statusRequest); + } + + if (offeringTlsV13Plus) + { + var certificateAuthorities = GetCertificateAuthorities(); + if (certificateAuthorities != null) + { + TlsExtensionsUtilities.AddCertificateAuthoritiesExtension(clientExtensions, certificateAuthorities); + } + } + + if (offeringPreTlsV13) + { + // TODO Shouldn't add if no offered cipher suite uses a block cipher? + TlsExtensionsUtilities.AddEncryptThenMacExtension(clientExtensions); + + var statusRequestV2 = GetMultiCertStatusRequest(); + if (statusRequestV2 != null) + { + TlsExtensionsUtilities.AddStatusRequestV2Extension(clientExtensions, statusRequestV2); + } + + var trustedCAKeys = GetTrustedCAIndication(); + if (trustedCAKeys != null) + { + TlsExtensionsUtilities.AddTrustedCAKeysExtensionClient(clientExtensions, trustedCAKeys); + } + } + + ProtocolVersion clientVersion = m_context.ClientVersion; + + /* + * RFC 5246 7.4.1.4.1. Note: this extension is not meaningful for TLS versions prior to 1.2. + * Clients MUST NOT offer it if they are offering prior versions. + */ + if (TlsUtilities.IsSignatureAlgorithmsExtensionAllowed(clientVersion)) + { + var supportedSigAlgs = GetSupportedSignatureAlgorithms(); + if (null != supportedSigAlgs && supportedSigAlgs.Count > 0) + { + this.m_supportedSignatureAlgorithms = supportedSigAlgs; + + TlsExtensionsUtilities.AddSignatureAlgorithmsExtension(clientExtensions, supportedSigAlgs); + } + + var supportedSigAlgsCert = GetSupportedSignatureAlgorithmsCert(); + if (null != supportedSigAlgsCert && supportedSigAlgsCert.Count > 0) + { + this.m_supportedSignatureAlgorithmsCert = supportedSigAlgsCert; + + TlsExtensionsUtilities.AddSignatureAlgorithmsCertExtension(clientExtensions, supportedSigAlgsCert); + } + } + + var namedGroupRoles = GetNamedGroupRoles(); + + var supportedGroups = GetSupportedGroups(namedGroupRoles); + if (supportedGroups != null && supportedGroups.Count > 0) + { + this.m_supportedGroups = supportedGroups; + + TlsExtensionsUtilities.AddSupportedGroupsExtension(clientExtensions, supportedGroups); + } + + if (offeringPreTlsV13) + { + if (namedGroupRoles.Contains(NamedGroupRole.ecdh) || + namedGroupRoles.Contains(NamedGroupRole.ecdsa)) + { + TlsExtensionsUtilities.AddSupportedPointFormatsExtension(clientExtensions, + new short[]{ ECPointFormat.uncompressed }); + } + } + + /* + * RFC 7250 4.1: + * + * If the client has no remaining certificate types to send in + * the client hello, other than the default X.509 type, it MUST omit the + * client_certificate_type extension in the client hello. + */ + short[] clientCertTypes = GetAllowedClientCertificateTypes(); + if (clientCertTypes != null && (clientCertTypes.Length > 1 || clientCertTypes[0] != CertificateType.X509)) + { + TlsExtensionsUtilities.AddClientCertificateTypeExtensionClient(clientExtensions, clientCertTypes); + } + + /* + * RFC 7250 4.1: + * + * If the client has no remaining certificate types to send in + * the client hello, other than the default X.509 certificate type, it + * MUST omit the entire server_certificate_type extension from the + * client hello. + */ + short[] serverCertTypes = GetAllowedServerCertificateTypes(); + if (serverCertTypes != null && (serverCertTypes.Length > 1 || serverCertTypes[0] != CertificateType.X509)) + { + TlsExtensionsUtilities.AddServerCertificateTypeExtensionClient(clientExtensions, serverCertTypes); + } + + return clientExtensions; + } + + public virtual IList GetEarlyKeyShareGroups() + { + /* + * RFC 8446 4.2.8. Each KeyShareEntry value MUST correspond to a group offered in the + * "supported_groups" extension and MUST appear in the same order. However, the values MAY + * be a non-contiguous subset of the "supported_groups" extension and MAY omit the most + * preferred groups. + */ + + if (null == m_supportedGroups || m_supportedGroups.Count < 1) + return null; + + if (m_supportedGroups.Contains(NamedGroup.x25519)) + return TlsUtilities.VectorOfOne(NamedGroup.x25519); + + if (m_supportedGroups.Contains(NamedGroup.secp256r1)) + return TlsUtilities.VectorOfOne(NamedGroup.secp256r1); + + return TlsUtilities.VectorOfOne(m_supportedGroups[0]); + } + + /// + public virtual void NotifyServerVersion(ProtocolVersion serverVersion) + { + } + + public virtual void NotifySessionToResume(TlsSession session) + { + } + + public virtual void NotifySessionID(byte[] sessionID) + { + } + + public virtual void NotifySelectedCipherSuite(int selectedCipherSuite) + { + } + + /// + public virtual void NotifySelectedPsk(TlsPsk selectedPsk) + { + } + + /// + public virtual void ProcessServerExtensions(IDictionary serverExtensions) + { + if (null == serverExtensions) + return; + + SecurityParameters securityParameters = m_context.SecurityParameters; + bool isTlsV13 = TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion); + + if (isTlsV13) + { + /* + * NOTE: From TLS 1.3 the protocol classes are strict about what extensions can appear. + */ + } + else + { + /* + * RFC 5246 7.4.1.4.1. Servers MUST NOT send this extension. + */ + CheckForUnexpectedServerExtension(serverExtensions, ExtensionType.signature_algorithms); + CheckForUnexpectedServerExtension(serverExtensions, ExtensionType.signature_algorithms_cert); + + CheckForUnexpectedServerExtension(serverExtensions, ExtensionType.supported_groups); + + int selectedCipherSuite = securityParameters.CipherSuite; + + if (TlsEccUtilities.IsEccCipherSuite(selectedCipherSuite)) + { + // We only support uncompressed format, this is just to validate the extension, if present. + TlsExtensionsUtilities.GetSupportedPointFormatsExtension(serverExtensions); + } + else + { + CheckForUnexpectedServerExtension(serverExtensions, ExtensionType.ec_point_formats); + } + + /* + * RFC 7685 3. The server MUST NOT echo the extension. + */ + CheckForUnexpectedServerExtension(serverExtensions, ExtensionType.padding); + } + } + + /// + public virtual void ProcessServerSupplementalData(IList serverSupplementalData) + { + if (serverSupplementalData != null) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public abstract TlsAuthentication GetAuthentication(); + + /// + public virtual IList GetClientSupplementalData() + { + return null; + } + + /// + public virtual void NotifyNewSessionTicket(NewSessionTicket newSessionTicket) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs.meta new file mode 100644 index 00000000..79455111 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ff03546a7fa843458d8b08928d7f72b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsClient.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs new file mode 100644 index 00000000..be8ab409 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs @@ -0,0 +1,316 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Threading; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal abstract class AbstractTlsContext + : TlsContext + { + private static long counter = DateTime.UtcNow.Ticks; + + private static long NextCounterValue() + { + return Interlocked.Increment(ref counter); + } + + private static TlsNonceGenerator CreateNonceGenerator(TlsCrypto crypto, int connectionEnd) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span additionalSeedMaterial = stackalloc byte[16]; + Pack.UInt64_To_BE((ulong)NextCounterValue(), additionalSeedMaterial); + Pack.UInt64_To_BE((ulong)DateTime.UtcNow.Ticks, additionalSeedMaterial[8..]); +#else + byte[] additionalSeedMaterial = new byte[16]; + Pack.UInt64_To_BE((ulong)NextCounterValue(), additionalSeedMaterial, 0); + Pack.UInt64_To_BE((ulong)DateTime.UtcNow.Ticks, additionalSeedMaterial, 8); +#endif + additionalSeedMaterial[0] &= 0x7F; + additionalSeedMaterial[0] |= (byte)(connectionEnd << 7); + + return crypto.CreateNonceGenerator(additionalSeedMaterial); + } + + private readonly TlsCrypto m_crypto; + private readonly int m_connectionEnd; + private readonly TlsNonceGenerator m_nonceGenerator; + + private SecurityParameters m_securityParameters = null; + private ProtocolVersion[] m_clientSupportedVersions = null; + private ProtocolVersion m_clientVersion = null; + private ProtocolVersion m_rsaPreMasterSecretVersion = null; + private TlsSession m_session = null; + private object m_userObject = null; + private bool m_connected = false; + + internal AbstractTlsContext(TlsCrypto crypto, int connectionEnd) + { + this.m_crypto = crypto; + this.m_connectionEnd = connectionEnd; + this.m_nonceGenerator = CreateNonceGenerator(crypto, connectionEnd); + } + + /// + internal void HandshakeBeginning(TlsPeer peer) + { + lock (this) + { + //if (null != m_securityParameters) + // throw new TlsFatalAlert(AlertDescription.internal_error, "Handshake already started"); + + var tmp = this.m_securityParameters; + + m_securityParameters = new SecurityParameters(); + m_securityParameters.m_entity = m_connectionEnd; + + if (tmp != null) + { + this.m_securityParameters.IsRenegotiating = true; + this.m_securityParameters.m_secureRenegotiation = tmp.m_secureRenegotiation; + this.m_securityParameters.m_negotiatedVersion = tmp.m_negotiatedVersion; + + this.m_securityParameters.m_localVerifyData = tmp.m_localVerifyData; + this.m_securityParameters.m_peerVerifyData = tmp.m_peerVerifyData; + this.m_securityParameters.PreRenegotiatingServerCert = tmp.m_peerCertificate; + } + } + + peer.NotifyHandshakeBeginning(); + } + + /// + internal void HandshakeComplete(TlsPeer peer, TlsSession session) + { + lock (this) + { + if (null == m_securityParameters) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_session = session; + this.m_connected = true; + } + + peer.NotifyHandshakeComplete(); + } + + internal bool IsConnected + { + get { lock (this) return m_connected; } + } + + internal bool IsHandshaking + { + get { lock (this) return !m_connected && null != m_securityParameters; } + } + + public TlsCrypto Crypto + { + get { return m_crypto; } + } + + public virtual TlsNonceGenerator NonceGenerator + { + get { return m_nonceGenerator; } + } + + public SecurityParameters SecurityParameters + { + get { lock (this) return m_securityParameters; } + } + + public abstract bool IsServer { get; } + + public virtual ProtocolVersion[] ClientSupportedVersions + { + get { return m_clientSupportedVersions; } + } + + internal void SetClientSupportedVersions(ProtocolVersion[] clientSupportedVersions) + { + this.m_clientSupportedVersions = clientSupportedVersions; + } + + public virtual ProtocolVersion ClientVersion + { + get { return m_clientVersion; } + } + + internal void SetClientVersion(ProtocolVersion clientVersion) + { + this.m_clientVersion = clientVersion; + } + + public virtual ProtocolVersion RsaPreMasterSecretVersion + { + get { return m_rsaPreMasterSecretVersion; } + } + + internal void SetRsaPreMasterSecretVersion(ProtocolVersion rsaPreMasterSecretVersion) + { + this.m_rsaPreMasterSecretVersion = rsaPreMasterSecretVersion; + } + + public virtual ProtocolVersion ServerVersion + { + get { return SecurityParameters.NegotiatedVersion; } + } + + public virtual TlsSession ResumableSession + { + get + { + TlsSession session = Session; + if (session == null || !session.IsResumable) + return null; + + return session; + } + } + + public virtual TlsSession Session + { + get { return m_session; } + } + + public virtual object UserObject + { + get { return m_userObject; } + set { this.m_userObject = value; } + } + + public virtual byte[] ExportChannelBinding(int channelBinding) + { + if (!IsConnected) + throw new InvalidOperationException("Export of channel bindings unavailable before handshake completion"); + + SecurityParameters securityParameters = SecurityParameters; + + if (ChannelBinding.tls_exporter == channelBinding) + return ExportKeyingMaterial("EXPORTER-Channel-Binding", TlsUtilities.EmptyBytes, 32); + + if (TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + return null; + + switch (channelBinding) + { + case ChannelBinding.tls_server_end_point: + { + byte[] tlsServerEndPoint = securityParameters.TlsServerEndPoint; + + return TlsUtilities.IsNullOrEmpty(tlsServerEndPoint) ? null : Arrays.Clone(tlsServerEndPoint); + } + + case ChannelBinding.tls_unique: + { + return Arrays.Clone(securityParameters.TlsUnique); + } + + case ChannelBinding.tls_unique_for_telnet: + default: + throw new NotSupportedException(); + } + } + + public virtual byte[] ExportEarlyKeyingMaterial(string asciiLabel, byte[] context, int length) + { + // TODO[tls13] Ensure early_exporter_master_secret is available suitably early! + if (!IsConnected) + throw new InvalidOperationException("Export of early key material only available during handshake"); + + SecurityParameters sp = SecurityParameters; + + return ExportKeyingMaterial13(CheckEarlyExportSecret(sp.EarlyExporterMasterSecret), + sp.PrfCryptoHashAlgorithm, asciiLabel, context, length); + } + + public virtual byte[] ExportKeyingMaterial(string asciiLabel, byte[] context, int length) + { + if (!IsConnected) + throw new InvalidOperationException("Export of key material unavailable before handshake completion"); + + /* + * TODO[tls13] Introduce a TlsExporter interface? Avoid calculating (early) exporter + * secret(s) unless the peer actually uses it. + */ + SecurityParameters sp = SecurityParameters; + + if (!sp.IsExtendedMasterSecret) + { + /* + * RFC 7627 5.4. If a client or server chooses to continue with a full handshake without + * the extended master secret extension, [..] the client or server MUST NOT export any + * key material based on the new master secret for any subsequent application-level + * authentication. In particular, it MUST disable [RFC5705] [..]. + */ + throw new InvalidOperationException("Export of key material requires extended_master_secret"); + } + + if (TlsUtilities.IsTlsV13(sp.NegotiatedVersion)) + { + return ExportKeyingMaterial13(CheckExportSecret(sp.ExporterMasterSecret), sp.PrfCryptoHashAlgorithm, + asciiLabel, context, length); + } + + byte[] seed = TlsUtilities.CalculateExporterSeed(sp, context); + + return TlsUtilities.Prf(sp, CheckExportSecret(sp.MasterSecret), asciiLabel, seed, length).Extract(); + } + + protected virtual byte[] ExportKeyingMaterial13(TlsSecret secret, int cryptoHashAlgorithm, string asciiLabel, + byte[] context, int length) + { + if (null == context) + { + context = TlsUtilities.EmptyBytes; + } + else if (!TlsUtilities.IsValidUint16(context.Length)) + { + throw new ArgumentException("must have length less than 2^16 (or be null)", "context"); + } + + TlsHash exporterHash = Crypto.CreateHash(cryptoHashAlgorithm); + byte[] emptyTranscriptHash = exporterHash.CalculateHash(); + + TlsSecret exporterSecret = TlsUtilities.DeriveSecret(SecurityParameters, secret, asciiLabel, + emptyTranscriptHash); + + byte[] exporterContext = emptyTranscriptHash; + if (context.Length > 0) + { + exporterHash.Update(context, 0, context.Length); + exporterContext = exporterHash.CalculateHash(); + } + + return TlsCryptoUtilities + .HkdfExpandLabel(exporterSecret, cryptoHashAlgorithm, "exporter", exporterContext, length).Extract(); + } + + protected virtual TlsSecret CheckEarlyExportSecret(TlsSecret secret) + { + if (null == secret) + { + // TODO[tls13] For symmetry with normal export, ideally available for NotifyHandshakeBeginning() only + //throw new InvalidOperationException("Export of early key material only available from NotifyHandshakeBeginning()"); + throw new InvalidOperationException("Export of early key material not available for this handshake"); + } + return secret; + } + + protected virtual TlsSecret CheckExportSecret(TlsSecret secret) + { + if (null == secret) + throw new InvalidOperationException( + "Export of key material only available from NotifyHandshakeComplete()"); + + return secret; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs.meta new file mode 100644 index 00000000..17dc7ef5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 185d4643fb3bc144797237d9cd964223 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsContext.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs new file mode 100644 index 00000000..2def9a4b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base class for supporting a TLS key exchange implementation. + public abstract class AbstractTlsKeyExchange + : TlsKeyExchange + { + protected readonly int m_keyExchange; + + protected TlsContext m_context; + + protected AbstractTlsKeyExchange(int keyExchange) + { + this.m_keyExchange = keyExchange; + } + + public virtual void Init(TlsContext context) + { + this.m_context = context; + } + + public abstract void SkipServerCredentials(); + + public abstract void ProcessServerCredentials(TlsCredentials serverCredentials); + + public virtual void ProcessServerCertificate(Certificate serverCertificate) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual bool RequiresServerKeyExchange + { + get { return false; } + } + + public virtual byte[] GenerateServerKeyExchange() + { + if (RequiresServerKeyExchange) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return null; + } + + public virtual void SkipServerKeyExchange() + { + if (RequiresServerKeyExchange) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public virtual void ProcessServerKeyExchange(Stream input) + { + if (!RequiresServerKeyExchange) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public virtual short[] GetClientCertificateTypes() + { + return null; + } + + public virtual void SkipClientCredentials() + { + } + + public abstract void ProcessClientCredentials(TlsCredentials clientCredentials); + + public virtual void ProcessClientCertificate(Certificate clientCertificate) + { + } + + public abstract void GenerateClientKeyExchange(Stream output); + + public virtual void ProcessClientKeyExchange(Stream input) + { + // Key exchange implementation MUST support client key exchange + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual bool RequiresCertificateVerify + { + get { return true; } + } + + public abstract TlsSecret GeneratePreMasterSecret(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs.meta new file mode 100644 index 00000000..1f552eda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 479e2d61a046e7c4aa75cc6cc161aa6a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs new file mode 100644 index 00000000..6bd8d7f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base class for supporting a TLS key exchange factory implementation. + public abstract class AbstractTlsKeyExchangeFactory + : TlsKeyExchangeFactory + { + public virtual TlsKeyExchange CreateDHKeyExchange(int keyExchange) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateDHanonKeyExchangeClient(int keyExchange, TlsDHGroupVerifier dhGroupVerifier) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateDHanonKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateDheKeyExchangeClient(int keyExchange, TlsDHGroupVerifier dhGroupVerifier) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateDheKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateECDHKeyExchange(int keyExchange) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateECDHanonKeyExchangeClient(int keyExchange) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateECDHanonKeyExchangeServer(int keyExchange, TlsECConfig ecConfig) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateECDheKeyExchangeClient(int keyExchange) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateECDheKeyExchangeServer(int keyExchange, TlsECConfig ecConfig) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreatePskKeyExchangeClient(int keyExchange, TlsPskIdentity pskIdentity, + TlsDHGroupVerifier dhGroupVerifier) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreatePskKeyExchangeServer(int keyExchange, + TlsPskIdentityManager pskIdentityManager, TlsDHConfig dhConfig, TlsECConfig ecConfig) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateRsaKeyExchange(int keyExchange) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateSrpKeyExchangeClient(int keyExchange, TlsSrpIdentity srpIdentity, + TlsSrpConfigVerifier srpConfigVerifier) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual TlsKeyExchange CreateSrpKeyExchangeServer(int keyExchange, + TlsSrpLoginParameters loginParameters) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs.meta new file mode 100644 index 00000000..35cb86b6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 614a6bc36c83caf47aab3fc25400aaf1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsKeyExchangeFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs new file mode 100644 index 00000000..0ebbe07a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base class for a TLS client or server. + public abstract class AbstractTlsPeer + : TlsPeer + { + private readonly TlsCrypto m_crypto; + + private volatile TlsCloseable m_closeHandle; + + protected AbstractTlsPeer(TlsCrypto crypto) + { + this.m_crypto = crypto; + } + + /// Get the values that are supported by this peer. + /// + /// WARNING: Mixing DTLS and TLS versions in the returned array is currently NOT supported. Use a separate + /// (sub-)class for each case. + /// + /// an array of supported values. + protected virtual ProtocolVersion[] GetSupportedVersions() + { + return ProtocolVersion.TLSv13.DownTo(ProtocolVersion.TLSv12); + } + + protected abstract int[] GetSupportedCipherSuites(); + + /// + public virtual void Cancel() + { + TlsCloseable closeHandle = this.m_closeHandle; + if (null != closeHandle) + { + closeHandle.Close(); + } + } + + public virtual TlsCrypto Crypto + { + get { return m_crypto; } + } + + public virtual void NotifyCloseHandle(TlsCloseable closeHandle) + { + this.m_closeHandle = closeHandle; + } + + public abstract ProtocolVersion[] GetProtocolVersions(); + + public abstract int[] GetCipherSuites(); + + /// + public virtual void NotifyHandshakeBeginning() + { + } + + public virtual int GetHandshakeTimeoutMillis() + { + return 0; + } + + public virtual bool AllowLegacyResumption() + { + return false; + } + + public virtual int GetMaxCertificateChainLength() + { + return 10; + } + + public virtual int GetMaxHandshakeMessageSize() + { + return 32768; + } + + public virtual short[] GetPskKeyExchangeModes() + { + return new short[]{ PskKeyExchangeMode.psk_dhe_ke }; + } + + public virtual bool RequiresCloseNotify() + { + return true; + } + + public virtual bool RequiresExtendedMasterSecret() + { + return false; + } + + public virtual bool ShouldCheckSigAlgOfPeerCerts() + { + return true; + } + + public virtual bool ShouldUseExtendedMasterSecret() + { + return true; + } + + public virtual bool ShouldUseExtendedPadding() + { + return false; + } + + public virtual bool ShouldUseGmtUnixTime() + { + /* + * draft-mathewson-no-gmtunixtime-00 2. For the reasons we discuss above, we recommend that + * TLS implementors MUST by default set the entire value the ClientHello.Random and + * ServerHello.Random fields, including gmt_unix_time, to a cryptographically random + * sequence. + */ + return false; + } + + /// + public virtual void NotifySecureRenegotiation(bool secureRenegotiation) + { + if (!secureRenegotiation) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + /// + public virtual TlsKeyExchangeFactory GetKeyExchangeFactory() + { + return new DefaultTlsKeyExchangeFactory(); + } + + public virtual void NotifyAlertRaised(short alertLevel, short alertDescription, string message, + Exception cause) + { + } + + public virtual void NotifyAlertReceived(short alertLevel, short alertDescription) + { + } + + /// + public virtual void NotifyHandshakeComplete() + { + } + + public virtual TlsHeartbeat GetHeartbeat() + { + return null; + } + + public virtual short GetHeartbeatPolicy() + { + return HeartbeatMode.peer_not_allowed_to_send; + } + + public virtual bool IgnoreCorruptDtlsRecords => false; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs.meta new file mode 100644 index 00000000..8da50f2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c87abebe4e1d1f4dabf3de52d9760e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsPeer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs new file mode 100644 index 00000000..fa68db40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs @@ -0,0 +1,658 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base class for a TLS server. + public abstract class AbstractTlsServer + : AbstractTlsPeer, TlsServer + { + protected TlsServerContext m_context; + protected ProtocolVersion[] m_protocolVersions; + protected int[] m_cipherSuites; + + protected int[] m_offeredCipherSuites; + protected IDictionary m_clientExtensions; + + protected bool m_encryptThenMACOffered; + protected short m_maxFragmentLengthOffered; + protected bool m_truncatedHMacOffered; + protected bool m_clientSentECPointFormats; + protected CertificateStatusRequest m_certificateStatusRequest; + protected IList m_statusRequestV2; + protected IList m_trustedCAKeys; + + protected int m_selectedCipherSuite; + protected IList m_clientProtocolNames; + protected ProtocolName m_selectedProtocolName; + + protected readonly IDictionary m_serverExtensions = new Dictionary(); + + public AbstractTlsServer(TlsCrypto crypto) + : base(crypto) + { + } + + protected virtual bool AllowCertificateStatus() + { + return true; + } + + protected virtual bool AllowEncryptThenMac() + { + return true; + } + + protected virtual bool AllowMultiCertStatus() + { + return false; + } + + protected virtual bool AllowTruncatedHmac() + { + return false; + } + + protected virtual bool AllowTrustedCAIndication() + { + return false; + } + + protected virtual int GetMaximumNegotiableCurveBits() + { + int[] clientSupportedGroups = m_context.SecurityParameters.ClientSupportedGroups; + if (clientSupportedGroups == null) + { + /* + * RFC 4492 4. A client that proposes ECC cipher suites may choose not to include these + * extensions. In this case, the server is free to choose any one of the elliptic curves + * or point formats [...]. + */ + return NamedGroup.GetMaximumCurveBits(); + } + + int maxBits = 0; + for (int i = 0; i < clientSupportedGroups.Length; ++i) + { + maxBits = System.Math.Max(maxBits, NamedGroup.GetCurveBits(clientSupportedGroups[i])); + } + return maxBits; + } + + protected virtual int GetMaximumNegotiableFiniteFieldBits() + { + int[] clientSupportedGroups = m_context.SecurityParameters.ClientSupportedGroups; + if (clientSupportedGroups == null) + { + return NamedGroup.GetMaximumFiniteFieldBits(); + } + + int maxBits = 0; + for (int i = 0; i < clientSupportedGroups.Length; ++i) + { + maxBits = System.Math.Max(maxBits, NamedGroup.GetFiniteFieldBits(clientSupportedGroups[i])); + } + return maxBits; + } + + protected virtual IList GetProtocolNames() + { + return null; + } + + protected virtual bool IsSelectableCipherSuite(int cipherSuite, int availCurveBits, int availFiniteFieldBits, + IList sigAlgs) + { + // TODO[tls13] The version check should be separated out (eventually select ciphersuite before version) + return TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, m_context.ServerVersion) + && availCurveBits >= TlsEccUtilities.GetMinimumCurveBits(cipherSuite) + && availFiniteFieldBits >= TlsDHUtilities.GetMinimumFiniteFieldBits(cipherSuite) + && TlsUtilities.IsValidCipherSuiteForSignatureAlgorithms(cipherSuite, sigAlgs); + } + + protected virtual bool PreferLocalCipherSuites() + { + return false; + } + + /// + protected virtual bool SelectCipherSuite(int cipherSuite) + { + this.m_selectedCipherSuite = cipherSuite; + return true; + } + + protected virtual int SelectDH(int minimumFiniteFieldBits) + { + int[] clientSupportedGroups = m_context.SecurityParameters.ClientSupportedGroups; + if (clientSupportedGroups == null) + return SelectDHDefault(minimumFiniteFieldBits); + + // Try to find a supported named group of the required size from the client's list. + for (int i = 0; i < clientSupportedGroups.Length; ++i) + { + int namedGroup = clientSupportedGroups[i]; + if (NamedGroup.GetFiniteFieldBits(namedGroup) >= minimumFiniteFieldBits) + return namedGroup; + } + + return -1; + } + + protected virtual int SelectDHDefault(int minimumFiniteFieldBits) + { + return minimumFiniteFieldBits <= 2048 ? NamedGroup.ffdhe2048 + : minimumFiniteFieldBits <= 3072 ? NamedGroup.ffdhe3072 + : minimumFiniteFieldBits <= 4096 ? NamedGroup.ffdhe4096 + : minimumFiniteFieldBits <= 6144 ? NamedGroup.ffdhe6144 + : minimumFiniteFieldBits <= 8192 ? NamedGroup.ffdhe8192 + : -1; + } + + protected virtual int SelectECDH(int minimumCurveBits) + { + int[] clientSupportedGroups = m_context.SecurityParameters.ClientSupportedGroups; + if (clientSupportedGroups == null) + return SelectECDHDefault(minimumCurveBits); + + // Try to find a supported named group of the required size from the client's list. + for (int i = 0; i < clientSupportedGroups.Length; ++i) + { + int namedGroup = clientSupportedGroups[i]; + if (NamedGroup.GetCurveBits(namedGroup) >= minimumCurveBits) + return namedGroup; + } + + return -1; + } + + protected virtual int SelectECDHDefault(int minimumCurveBits) + { + return minimumCurveBits <= 256 ? NamedGroup.secp256r1 + : minimumCurveBits <= 384 ? NamedGroup.secp384r1 + : minimumCurveBits <= 521 ? NamedGroup.secp521r1 + : -1; + } + + protected virtual ProtocolName SelectProtocolName() + { + IList serverProtocolNames = GetProtocolNames(); + if (null == serverProtocolNames || serverProtocolNames.Count < 1) + return null; + + ProtocolName result = SelectProtocolName(m_clientProtocolNames, serverProtocolNames); + if (null == result) + throw new TlsFatalAlert(AlertDescription.no_application_protocol); + + return result; + } + + protected virtual ProtocolName SelectProtocolName(IList clientProtocolNames, + IList serverProtocolNames) + { + foreach (ProtocolName serverProtocolName in serverProtocolNames) + { + if (clientProtocolNames.Contains(serverProtocolName)) + return serverProtocolName; + } + return null; + } + + protected virtual bool ShouldSelectProtocolNameEarly() + { + return true; + } + + protected virtual bool PreferLocalClientCertificateTypes() + { + return false; + } + + protected virtual short[] GetAllowedClientCertificateTypes() + { + return null; + } + + public virtual void Init(TlsServerContext context) + { + this.m_context = context; + + this.m_protocolVersions = GetSupportedVersions(); + this.m_cipherSuites = GetSupportedCipherSuites(); + } + + public override ProtocolVersion[] GetProtocolVersions() + { + return m_protocolVersions; + } + + public override int[] GetCipherSuites() + { + return m_cipherSuites; + } + + public override void NotifyHandshakeBeginning() + { + base.NotifyHandshakeBeginning(); + + this.m_offeredCipherSuites = null; + this.m_clientExtensions = null; + this.m_encryptThenMACOffered = false; + this.m_maxFragmentLengthOffered = 0; + this.m_truncatedHMacOffered = false; + this.m_clientSentECPointFormats = false; + this.m_certificateStatusRequest = null; + this.m_selectedCipherSuite = -1; + this.m_selectedProtocolName = null; + this.m_serverExtensions.Clear(); + } + + public virtual TlsSession GetSessionToResume(byte[] sessionID) + { + return null; + } + + public virtual byte[] GetNewSessionID() + { + return null; + } + + public virtual TlsPskExternal GetExternalPsk(IList identities) + { + return null; + } + + public virtual void NotifySession(TlsSession session) + { + } + + public virtual void NotifyClientVersion(ProtocolVersion clientVersion) + { + } + + public virtual void NotifyFallback(bool isFallback) + { + /* + * RFC 7507 3. If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest + * protocol version supported by the server is higher than the version indicated in + * ClientHello.client_version, the server MUST respond with a fatal inappropriate_fallback + * alert [..]. + */ + if (isFallback) + { + ProtocolVersion[] serverVersions = GetProtocolVersions(); + ProtocolVersion clientVersion = m_context.ClientVersion; + + ProtocolVersion latestServerVersion; + if (clientVersion.IsTls) + { + latestServerVersion = ProtocolVersion.GetLatestTls(serverVersions); + } + else if (clientVersion.IsDtls) + { + latestServerVersion = ProtocolVersion.GetLatestDtls(serverVersions); + } + else + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + if (null != latestServerVersion && latestServerVersion.IsLaterVersionOf(clientVersion)) + { + throw new TlsFatalAlert(AlertDescription.inappropriate_fallback); + } + } + } + + public virtual void NotifyOfferedCipherSuites(int[] offeredCipherSuites) + { + this.m_offeredCipherSuites = offeredCipherSuites; + } + + public virtual void ProcessClientExtensions(IDictionary clientExtensions) + { + this.m_clientExtensions = clientExtensions; + + if (null != clientExtensions) + { + this.m_clientProtocolNames = TlsExtensionsUtilities.GetAlpnExtensionClient(clientExtensions); + + if (ShouldSelectProtocolNameEarly()) + { + if (null != m_clientProtocolNames && m_clientProtocolNames.Count > 0) + { + this.m_selectedProtocolName = SelectProtocolName(); + } + } + + // TODO[tls13] Don't need these if we have negotiated (D)TLS 1.3+ + { + this.m_encryptThenMACOffered = TlsExtensionsUtilities.HasEncryptThenMacExtension(clientExtensions); + this.m_truncatedHMacOffered = TlsExtensionsUtilities.HasTruncatedHmacExtension(clientExtensions); + this.m_statusRequestV2 = TlsExtensionsUtilities.GetStatusRequestV2Extension(clientExtensions); + this.m_trustedCAKeys = TlsExtensionsUtilities.GetTrustedCAKeysExtensionClient(clientExtensions); + + // We only support uncompressed format, this is just to validate the extension, and note its presence. + this.m_clientSentECPointFormats = + null != TlsExtensionsUtilities.GetSupportedPointFormatsExtension(clientExtensions); + } + + this.m_certificateStatusRequest = TlsExtensionsUtilities.GetStatusRequestExtension(clientExtensions); + + this.m_maxFragmentLengthOffered = TlsExtensionsUtilities.GetMaxFragmentLengthExtension(clientExtensions); + if (m_maxFragmentLengthOffered >= 0 && !MaxFragmentLength.IsValid(m_maxFragmentLengthOffered)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + + public virtual ProtocolVersion GetServerVersion() + { + ProtocolVersion[] serverVersions = GetProtocolVersions(); + ProtocolVersion[] clientVersions = m_context.ClientSupportedVersions; + + foreach (ProtocolVersion clientVersion in clientVersions) + { + if (ProtocolVersion.Contains(serverVersions, clientVersion)) + return clientVersion; + } + + throw new TlsFatalAlert(AlertDescription.protocol_version); + } + + public virtual int[] GetSupportedGroups() + { + // TODO[tls13] The rest of this class assumes all named groups are supported + return new int[]{ NamedGroup.x25519, NamedGroup.x448, NamedGroup.secp256r1, NamedGroup.secp384r1, + NamedGroup.ffdhe2048, NamedGroup.ffdhe3072, NamedGroup.ffdhe4096 }; + } + + public virtual int GetSelectedCipherSuite() + { + SecurityParameters securityParameters = m_context.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (TlsUtilities.IsTlsV13(negotiatedVersion)) + { + int commonCipherSuite13 = TlsUtilities.GetCommonCipherSuite13(negotiatedVersion, m_offeredCipherSuites, + GetCipherSuites(), PreferLocalCipherSuites()); + + if (commonCipherSuite13 >= 0 && SelectCipherSuite(commonCipherSuite13)) + { + return commonCipherSuite13; + } + } + else + { + /* + * RFC 5246 7.4.3. In order to negotiate correctly, the server MUST check any candidate + * cipher suites against the "signature_algorithms" extension before selecting them. This is + * somewhat inelegant but is a compromise designed to minimize changes to the original + * cipher suite design. + */ + var sigAlgs = TlsUtilities.GetUsableSignatureAlgorithms(securityParameters.ClientSigAlgs); + + /* + * RFC 4429 5.1. A server that receives a ClientHello containing one or both of these + * extensions MUST use the client's enumerated capabilities to guide its selection of an + * appropriate cipher suite. One of the proposed ECC cipher suites must be negotiated only + * if the server can successfully complete the handshake while using the curves and point + * formats supported by the client [...]. + */ + int availCurveBits = GetMaximumNegotiableCurveBits(); + int availFiniteFieldBits = GetMaximumNegotiableFiniteFieldBits(); + + int[] cipherSuites = TlsUtilities.GetCommonCipherSuites(m_offeredCipherSuites, GetCipherSuites(), + PreferLocalCipherSuites()); + + for (int i = 0; i < cipherSuites.Length; ++i) + { + int cipherSuite = cipherSuites[i]; + if (IsSelectableCipherSuite(cipherSuite, availCurveBits, availFiniteFieldBits, sigAlgs) + && SelectCipherSuite(cipherSuite)) + { + return cipherSuite; + } + } + } + + throw new TlsFatalAlert(AlertDescription.handshake_failure, "No selectable cipher suite"); + } + + // IDictionary is (Int32 -> byte[]) + public virtual IDictionary GetServerExtensions() + { + bool isTlsV13 = TlsUtilities.IsTlsV13(m_context); + + if (isTlsV13) + { + if (null != m_certificateStatusRequest && AllowCertificateStatus()) + { + /* + * TODO[tls13] RFC 8446 4.4.2.1. OCSP Status and SCT Extensions. + * + * OCSP information is carried in an extension for a CertificateEntry. + */ + } + } + else + { + if (m_encryptThenMACOffered && AllowEncryptThenMac()) + { + /* + * RFC 7366 3. If a server receives an encrypt-then-MAC request extension from a client + * and then selects a stream or Authenticated Encryption with Associated Data (AEAD) + * ciphersuite, it MUST NOT send an encrypt-then-MAC response extension back to the + * client. + */ + if (TlsUtilities.IsBlockCipherSuite(m_selectedCipherSuite)) + { + TlsExtensionsUtilities.AddEncryptThenMacExtension(m_serverExtensions); + } + } + + if (m_truncatedHMacOffered && AllowTruncatedHmac()) + { + TlsExtensionsUtilities.AddTruncatedHmacExtension(m_serverExtensions); + } + + if (m_clientSentECPointFormats && TlsEccUtilities.IsEccCipherSuite(m_selectedCipherSuite)) + { + /* + * RFC 4492 5.2. A server that selects an ECC cipher suite in response to a ClientHello + * message including a Supported Point Formats Extension appends this extension (along + * with others) to its ServerHello message, enumerating the point formats it can parse. + */ + TlsExtensionsUtilities.AddSupportedPointFormatsExtension(m_serverExtensions, + new short[]{ ECPointFormat.uncompressed }); + } + + // TODO[tls13] See RFC 8446 4.4.2.1 + if (null != m_statusRequestV2 && AllowMultiCertStatus()) + { + /* + * RFC 6961 2.2. If a server returns a "CertificateStatus" message in response to a + * "status_request_v2" request, then the server MUST have included an extension of type + * "status_request_v2" with empty "extension_data" in the extended server hello.. + */ + TlsExtensionsUtilities.AddEmptyExtensionData(m_serverExtensions, ExtensionType.status_request_v2); + } + else if (null != this.m_certificateStatusRequest && AllowCertificateStatus()) + { + /* + * RFC 6066 8. If a server returns a "CertificateStatus" message, then the server MUST + * have included an extension of type "status_request" with empty "extension_data" in + * the extended server hello. + */ + TlsExtensionsUtilities.AddEmptyExtensionData(m_serverExtensions, ExtensionType.status_request); + } + + if (null != m_trustedCAKeys && AllowTrustedCAIndication()) + { + TlsExtensionsUtilities.AddTrustedCAKeysExtensionServer(m_serverExtensions); + } + } + + if (m_maxFragmentLengthOffered >= 0 && MaxFragmentLength.IsValid(m_maxFragmentLengthOffered)) + { + TlsExtensionsUtilities.AddMaxFragmentLengthExtension(m_serverExtensions, m_maxFragmentLengthOffered); + } + + // RFC 7250 4.2 for server_certificate_type + short[] serverCertTypes = TlsExtensionsUtilities.GetServerCertificateTypeExtensionClient( + m_clientExtensions); + if (serverCertTypes != null) + { + TlsCredentials credentials = GetCredentials(); + + if (credentials == null || !Arrays.Contains(serverCertTypes, credentials.Certificate.CertificateType)) + { + // outcome 2: we support the extension but have no common types + throw new TlsFatalAlert(AlertDescription.unsupported_certificate); + } + + // outcome 3: we support the extension and have a common type + TlsExtensionsUtilities.AddServerCertificateTypeExtensionServer(m_serverExtensions, + credentials.Certificate.CertificateType); + } + + // RFC 7250 4.2 for client_certificate_type + short[] remoteClientCertTypes = TlsExtensionsUtilities.GetClientCertificateTypeExtensionClient( + m_clientExtensions); + if (remoteClientCertTypes != null) + { + short[] localClientCertTypes = GetAllowedClientCertificateTypes(); + if (localClientCertTypes != null) + { + short[] preferredTypes; + short[] nonPreferredTypes; + if (PreferLocalClientCertificateTypes()) + { + preferredTypes = localClientCertTypes; + nonPreferredTypes = remoteClientCertTypes; + } + else + { + preferredTypes = remoteClientCertTypes; + nonPreferredTypes = localClientCertTypes; + } + + short selectedType = -1; + for (int i = 0; i < preferredTypes.Length; i++) + { + if (Arrays.Contains(nonPreferredTypes, preferredTypes[i])) + { + selectedType = preferredTypes[i]; + break; + } + } + + if (selectedType == -1) + { + // outcome 2: we support the extension but have no common types + throw new TlsFatalAlert(AlertDescription.unsupported_certificate); + } + + // outcome 3: we support the extension and have a common type + TlsExtensionsUtilities.AddClientCertificateTypeExtensionServer(m_serverExtensions, selectedType); + } // else outcome 1: we don't support the extension + } + + return m_serverExtensions; + } + + public virtual void GetServerExtensionsForConnection(IDictionary serverExtensions) + { + if (!ShouldSelectProtocolNameEarly()) + { + if (null != m_clientProtocolNames && m_clientProtocolNames.Count > 0) + { + this.m_selectedProtocolName = SelectProtocolName(); + } + } + + /* + * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous + * contents of this extension are irrelevant, and only the values in the new handshake + * messages are considered. + */ + if (null == m_selectedProtocolName) + { + serverExtensions.Remove(ExtensionType.application_layer_protocol_negotiation); + } + else + { + TlsExtensionsUtilities.AddAlpnExtensionServer(serverExtensions, m_selectedProtocolName); + } + } + + public virtual IList GetServerSupplementalData() + { + return null; + } + + public abstract TlsCredentials GetCredentials(); + + public virtual CertificateStatus GetCertificateStatus() + { + return null; + } + + public virtual CertificateRequest GetCertificateRequest() + { + return null; + } + + public virtual TlsPskIdentityManager GetPskIdentityManager() + { + return null; + } + + public virtual TlsSrpLoginParameters GetSrpLoginParameters() + { + return null; + } + + public virtual TlsDHConfig GetDHConfig() + { + int minimumFiniteFieldBits = TlsDHUtilities.GetMinimumFiniteFieldBits(m_selectedCipherSuite); + int namedGroup = SelectDH(minimumFiniteFieldBits); + return TlsDHUtilities.CreateNamedDHConfig(m_context, namedGroup); + } + + public virtual TlsECConfig GetECDHConfig() + { + int minimumCurveBits = TlsEccUtilities.GetMinimumCurveBits(m_selectedCipherSuite); + int namedGroup = SelectECDH(minimumCurveBits); + return TlsEccUtilities.CreateNamedECConfig(m_context, namedGroup); + } + + public virtual void ProcessClientSupplementalData(IList clientSupplementalData) + { + if (clientSupplementalData != null) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public virtual void NotifyClientCertificate(Certificate clientCertificate) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual NewSessionTicket GetNewSessionTicket() + { + /* + * RFC 5077 3.3. If the server determines that it does not want to include a ticket after it + * has included the SessionTicket extension in the ServerHello, then it sends a zero-length + * ticket in the NewSessionTicket handshake message. + */ + return new NewSessionTicket(0L, TlsUtilities.EmptyBytes); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs.meta new file mode 100644 index 00000000..9e466dd4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5497bcddbc7379a47baa33de97d14040 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AbstractTlsServer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs new file mode 100644 index 00000000..ab6dbec2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs @@ -0,0 +1,327 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5246 7.2. + public abstract class AlertDescription + { + /// This message notifies the recipient that the sender will not send any more messages on this + /// connection. + /// + /// Note that as of TLS 1.1, failure to properly close a connection no longer requires that a session not be + /// resumed. This is a change from TLS 1.0 ("The session becomes unresumable if any connection is terminated + /// without proper close_notify messages with level equal to warning.") to conform with widespread + /// implementation practice. + /// + public const short close_notify = 0; + + /// An inappropriate message was received. + /// + /// This alert is always fatal and should never be observed in communication between proper implementations. + /// + public const short unexpected_message = 10; + + /// This alert is returned if a record is received with an incorrect MAC. + /// + /// This alert also MUST be returned if an alert is sent because a TLSCiphertext decrypted in an invalid way: + /// either it wasn't an even multiple of the block length, or its padding values, when checked, weren't + /// correct. This message is always fatal and should never be observed in communication between proper + /// implementations (except when messages were corrupted in the network). + /// + public const short bad_record_mac = 20; + + /// + /// This alert was used in some earlier versions of TLS, and may have permitted certain attacks against the CBC + /// mode [CBCATT]. It MUST NOT be sent by compliant implementations. + /// + public const short decryption_failed = 21; + + /// A TLSCiphertext record was received that had a length more than 2^14+2048 bytes, or a record + /// decrypted to a TLSCompressed record with more than 2^14+1024 bytes. + /// + /// This message is always fatal and should never be observed in communication between proper implementations + /// (except when messages were corrupted in the network). + /// + public const short record_overflow = 22; + + /// The decompression function received improper input (e.g., data that would expand to excessive + /// length). + /// + /// This message is always fatal and should never be observed in communication between proper implementations. + /// + public const short decompression_failure = 30; + + /// Reception of a handshake_failure alert message indicates that the sender was unable to negotiate + /// an acceptable set of security parameters given the options available. + /// + /// This is a fatal error. + /// + public const short handshake_failure = 40; + + /// + /// This alert was used in SSLv3 but not any version of TLS. It MUST NOT be sent by compliant implementations. + /// + public const short no_certificate = 41; + + /// A certificate was corrupt, contained signatures that did not verify correctly, etc. + public const short bad_certificate = 42; + + /// A certificate was of an unsupported type. + public const short unsupported_certificate = 43; + + /// A certificate was revoked by its signer. + public const short certificate_revoked = 44; + + /// A certificate has expired or is not currently valid. + public const short certificate_expired = 45; + + /// Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable. + /// + public const short certificate_unknown = 46; + + /// A field in the handshake was out of range or inconsistent with other fields. + /// + /// This message is always fatal. + /// + public const short illegal_parameter = 47; + + /// A valid certificate chain or partial chain was received, but the certificate was not accepted + /// because the CA certificate could not be located or couldn't be matched with a known, trusted CA. + /// + /// This message is always fatal. + /// + public const short unknown_ca = 48; + + /// A valid certificate was received, but when access control was applied, the sender decided not to + /// proceed with negotiation. + /// + /// This message is always fatal. + /// + public const short access_denied = 49; + + /// A message could not be decoded because some field was out of the specified range or the length of + /// the message was incorrect. + /// + /// This message is always fatal and should never be observed in communication between proper + /// implementations (except when messages were corrupted in the network). + /// + public const short decode_error = 50; + + /// A handshake cryptographic operation failed, including being unable to correctly verify a signature + /// or validate a Finished message. + /// + /// This message is always fatal. + /// + public const short decrypt_error = 51; + + /// + /// This alert was used in some earlier versions of TLS. It MUST NOT be sent by compliant implementations. + /// + public const short export_restriction = 60; + + /// The protocol version the client has attempted to negotiate is recognized but not supported. + /// + /// + /// (For example, old protocol versions might be avoided for security reasons.) This message is always fatal. + /// + public const short protocol_version = 70; + + /// Returned instead of handshake_failure when a negotiation has failed specifically because the + /// server requires ciphers more secure than those supported by the client. + /// + /// This message is always fatal. + /// + public const short insufficient_security = 71; + + /// An internal error unrelated to the peer or the correctness of the protocol (such as a memory + /// allocation failure) makes it impossible to continue. + /// + /// This message is always fatal. + /// + public const short internal_error = 80; + + /// This handshake is being canceled for some reason unrelated to a protocol failure. + /// + /// If the user cancels an operation after the handshake is complete, just closing the connection by sending a + /// close_notify is more appropriate. This alert should be followed by a close_notify. This message is + /// generally a warning. + /// + public const short user_canceled = 90; + + /// Sent by the client in response to a hello request or by the server in response to a client hello + /// after initial handshaking. + /// + /// Either of these would normally lead to renegotiation; when that is not appropriate, the recipient should + /// respond with this alert. At that point, the original requester can decide whether to proceed with the + /// connection. One case where this would be appropriate is where a server has spawned a process to satisfy a + /// request; the process might receive security parameters (key length, authentication, etc.) at startup, and + /// it might be difficult to communicate changes to these parameters after that point. This message is always a + /// warning. + /// + public const short no_renegotiation = 100; + + /// Sent by clients that receive an extended server hello containing an extension that they did not + /// put in the corresponding client hello. + /// + /// This message is always fatal. + /// + public const short unsupported_extension = 110; + + /* + * RFC 3546 + */ + + /// This alert is sent by servers who are unable to retrieve a certificate chain from the URL supplied + /// by the client(see Section 3.3). + /// + /// This message MAY be fatal - for example if client authentication is required by the server for the + /// handshake to continue and the server is unable to retrieve the certificate chain, it may send a fatal + /// alert. + /// + public const short certificate_unobtainable = 111; + + /// This alert is sent by servers that receive a server_name extension request, but do not recognize + /// the server name. + /// + /// This message MAY be fatal. + /// + public const short unrecognized_name = 112; + + /// This alert is sent by clients that receive an invalid certificate status response (see Section 3.6 + /// ). + /// + /// This message is always fatal. + /// + public const short bad_certificate_status_response = 113; + + /// This alert is sent by servers when a certificate hash does not match a client provided + /// certificate_hash. + /// + /// This message is always fatal. + /// + public const short bad_certificate_hash_value = 114; + + /* + * RFC 4279 + */ + + /// If the server does not recognize the PSK identity, it MAY respond with an "unknown_psk_identity" + /// alert message. + public const short unknown_psk_identity = 115; + + /* + * RFC 7301 + */ + + /// In the event that the server supports no protocols that the client advertises, then the server + /// SHALL respond with a fatal "no_application_protocol" alert. + public const short no_application_protocol = 120; + + /* + * RFC 7507 + */ + + /// If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version + /// supported by the server is higher than the version indicated in ClientHello.client_version, the server MUST + /// respond with a fatal inappropriate_fallback alert[..]. + public const short inappropriate_fallback = 86; + + /* + * RFC 8446 + */ + + /// Sent by endpoints that receive a handshake message not containing an extension that is mandatory + /// to send for the offered TLS version or other negotiated parameters. + public const short missing_extension = 109; + + /// Sent by servers when a client certificate is desired but none was provided by the client. + /// + public const short certificate_required = 116; + + public static string GetName(short alertDescription) + { + switch (alertDescription) + { + case close_notify: + return "close_notify"; + case unexpected_message: + return "unexpected_message"; + case bad_record_mac: + return "bad_record_mac"; + case decryption_failed: + return "decryption_failed"; + case record_overflow: + return "record_overflow"; + case decompression_failure: + return "decompression_failure"; + case handshake_failure: + return "handshake_failure"; + case no_certificate: + return "no_certificate"; + case bad_certificate: + return "bad_certificate"; + case unsupported_certificate: + return "unsupported_certificate"; + case certificate_revoked: + return "certificate_revoked"; + case certificate_expired: + return "certificate_expired"; + case certificate_unknown: + return "certificate_unknown"; + case illegal_parameter: + return "illegal_parameter"; + case unknown_ca: + return "unknown_ca"; + case access_denied: + return "access_denied"; + case decode_error: + return "decode_error"; + case decrypt_error: + return "decrypt_error"; + case export_restriction: + return "export_restriction"; + case protocol_version: + return "protocol_version"; + case insufficient_security: + return "insufficient_security"; + case internal_error: + return "internal_error"; + case user_canceled: + return "user_canceled"; + case no_renegotiation: + return "no_renegotiation"; + case unsupported_extension: + return "unsupported_extension"; + case certificate_unobtainable: + return "certificate_unobtainable"; + case unrecognized_name: + return "unrecognized_name"; + case bad_certificate_status_response: + return "bad_certificate_status_response"; + case bad_certificate_hash_value: + return "bad_certificate_hash_value"; + case unknown_psk_identity: + return "unknown_psk_identity"; + case no_application_protocol: + return "no_application_protocol"; + case inappropriate_fallback: + return "inappropriate_fallback"; + case missing_extension: + return "missing_extension"; + case certificate_required: + return "certificate_required"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short alertDescription) + { + return GetName(alertDescription) + "(" + alertDescription + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs.meta new file mode 100644 index 00000000..b3ab2c9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea47453e8d8caa741adc0f160c58df24 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertDescription.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs new file mode 100644 index 00000000..50fa979c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5246 7.2 + public abstract class AlertLevel + { + public const short warning = 1; + public const short fatal = 2; + + public static string GetName(short alertDescription) + { + switch (alertDescription) + { + case warning: + return "warning"; + case fatal: + return "fatal"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short alertDescription) + { + return GetName(alertDescription) + "(" + alertDescription + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs.meta new file mode 100644 index 00000000..11f020f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ff32f09f842be0848a5c73b323c124d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/AlertLevel.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs new file mode 100644 index 00000000..1fda131a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class BasicTlsPskExternal + : TlsPskExternal + { + protected readonly byte[] m_identity; + protected readonly TlsSecret m_key; + protected readonly int m_prfAlgorithm; + + public BasicTlsPskExternal(byte[] identity, TlsSecret key) + : this(identity, key, Tls.PrfAlgorithm.tls13_hkdf_sha256) + { + } + + public BasicTlsPskExternal(byte[] identity, TlsSecret key, int prfAlgorithm) + { + this.m_identity = Arrays.Clone(identity); + this.m_key = key; + this.m_prfAlgorithm = prfAlgorithm; + } + + public virtual byte[] Identity + { + get { return m_identity; } + } + + public virtual TlsSecret Key + { + get { return m_key; } + } + + public virtual int PrfAlgorithm + { + get { return m_prfAlgorithm; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs.meta new file mode 100644 index 00000000..c77cda12 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eabe44b03b1e3b646bcc61c774a2507c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskExternal.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs new file mode 100644 index 00000000..1159aede --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// A basic PSK Identity holder. + public class BasicTlsPskIdentity + : TlsPskIdentity + { + protected readonly byte[] m_identity; + protected readonly byte[] m_psk; + + public BasicTlsPskIdentity(byte[] identity, byte[] psk) + { + this.m_identity = Arrays.Clone(identity); + this.m_psk = Arrays.Clone(psk); + } + + public BasicTlsPskIdentity(string identity, byte[] psk) + { + this.m_identity = Strings.ToUtf8ByteArray(identity); + this.m_psk = Arrays.Clone(psk); + } + + public virtual void SkipIdentityHint() + { + } + + public virtual void NotifyIdentityHint(byte[] psk_identity_hint) + { + } + + public virtual byte[] GetPskIdentity() + { + return m_identity; + } + + public byte[] GetPsk() + { + return Arrays.Clone(m_psk); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs.meta new file mode 100644 index 00000000..21d5d2bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c8d33100841afe47953cabe7b1a9ca4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsPskIdentity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs new file mode 100644 index 00000000..99155af4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// A basic SRP Identity holder. + public class BasicTlsSrpIdentity + : TlsSrpIdentity + { + protected readonly byte[] m_identity; + protected readonly byte[] m_password; + + public BasicTlsSrpIdentity(byte[] identity, byte[] password) + { + this.m_identity = Arrays.Clone(identity); + this.m_password = Arrays.Clone(password); + } + + public BasicTlsSrpIdentity(string identity, string password) + { + this.m_identity = Strings.ToUtf8ByteArray(identity); + this.m_password = Strings.ToUtf8ByteArray(password); + } + + public virtual byte[] GetSrpIdentity() + { + return m_identity; + } + + public virtual byte[] GetSrpPassword() + { + return m_password; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs.meta new file mode 100644 index 00000000..ab3fdf2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f1b64950c5930bf44b67bcd250724de3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/BasicTlsSrpIdentity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs new file mode 100644 index 00000000..bffb67e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs @@ -0,0 +1,268 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// A queue for bytes. This file could be more optimized. + public sealed class ByteQueue + { + /// The smallest number which can be written as 2^x which is bigger than i. + private static int GetAllocationSize(int i) + { + return Integers.HighestOneBit((256 | i) << 1); + } + + /// The buffer where we store our data. + private byte[] m_databuf; + + /// How many bytes at the beginning of the buffer are skipped. + private int m_skipped = 0; + + /// How many bytes in the buffer are valid data. + private int m_available = 0; + + private bool m_readOnlyBuf = false; + + public ByteQueue() + : this(0) + { + } + + public ByteQueue(int capacity) + { + this.m_databuf = capacity == 0 ? TlsUtilities.EmptyBytes : new byte[capacity]; + } + + public ByteQueue(byte[] buf, int off, int len) + { + this.m_databuf = buf; + this.m_skipped = off; + this.m_available = len; + this.m_readOnlyBuf = true; + } + + /// Add some data to our buffer. + /// A byte-array to read data from. + /// How many bytes to skip at the beginning of the array. + /// How many bytes to read from the array. + public void AddData(byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + AddData(buf.AsSpan(off, len)); +#else + if (m_readOnlyBuf) + throw new InvalidOperationException("Cannot add data to read-only buffer"); + + if (m_available == 0) + { + if (len > m_databuf.Length) + { + int desiredSize = GetAllocationSize(len); + m_databuf = new byte[desiredSize]; + } + m_skipped = 0; + } + else if ((m_skipped + m_available + len) > m_databuf.Length) + { + int desiredSize = GetAllocationSize(m_available + len); + if (desiredSize > m_databuf.Length) + { + byte[] tmp = new byte[desiredSize]; + Array.Copy(m_databuf, m_skipped, tmp, 0, m_available); + m_databuf = tmp; + } + else + { + Array.Copy(m_databuf, m_skipped, m_databuf, 0, m_available); + } + m_skipped = 0; + } + + Array.Copy(buf, off, m_databuf, m_skipped + m_available, len); + m_available += len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void AddData(ReadOnlySpan buffer) + { + if (m_readOnlyBuf) + throw new InvalidOperationException("Cannot add data to read-only buffer"); + + int len = buffer.Length; + if (m_available == 0) + { + if (len > m_databuf.Length) + { + int desiredSize = GetAllocationSize(len); + m_databuf = new byte[desiredSize]; + } + m_skipped = 0; + } + else if ((m_skipped + m_available + len) > m_databuf.Length) + { + int desiredSize = GetAllocationSize(m_available + len); + if (desiredSize > m_databuf.Length) + { + byte[] tmp = new byte[desiredSize]; + Array.Copy(m_databuf, m_skipped, tmp, 0, m_available); + m_databuf = tmp; + } + else + { + Array.Copy(m_databuf, m_skipped, m_databuf, 0, m_available); + } + m_skipped = 0; + } + + buffer.CopyTo(m_databuf.AsSpan(m_skipped + m_available)); + m_available += len; + } +#endif + + /// The number of bytes which are available in this buffer. + public int Available + { + get { return m_available; } + } + + /// Copy some bytes from the beginning of the data to the provided . + /// The to copy the bytes to. + /// How many bytes to copy. + public void CopyTo(Stream output, int length) + { + if (length > m_available) + throw new InvalidOperationException("Cannot copy " + length + " bytes, only got " + m_available); + + output.Write(m_databuf, m_skipped, length); + } + + /// Read data from the buffer. + /// The buffer where the read data will be copied to. + /// How many bytes to skip at the beginning of buf. + /// How many bytes to read at all. + /// How many bytes from our data to skip. + public void Read(byte[] buf, int offset, int len, int skip) + { + if ((buf.Length - offset) < len) + { + throw new ArgumentException("Buffer size of " + buf.Length + + " is too small for a read of " + len + " bytes"); + } + if ((m_available - skip) < len) + { + throw new InvalidOperationException("Not enough data to read"); + } + Array.Copy(m_databuf, m_skipped + skip, buf, offset, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Read(Span buffer, int skip) + { + if ((m_available - skip) < buffer.Length) + throw new InvalidOperationException("Not enough data to read"); + + buffer.CopyFrom(m_databuf.AsSpan(m_skipped + skip)); + } +#endif + + /// Return a over some bytes at the beginning of the data. + /// + /// How many bytes will be readable. + /// A over the data. + internal HandshakeMessageInput ReadHandshakeMessage(int length) + { + if (length > m_available) + throw new InvalidOperationException("Cannot read " + length + " bytes, only got " + m_available); + + int position = m_skipped; + + m_available -= length; + m_skipped += length; + + return new HandshakeMessageInput(m_databuf, position, length); + } + + public int ReadInt32() + { + if (m_available < 4) + throw new InvalidOperationException("Not enough data to read"); + + return TlsUtilities.ReadInt32(m_databuf, m_skipped); + } + + public int ReadUint16(int skip) + { + if (m_available < skip + 2) + throw new InvalidOperationException("Not enough data to read"); + + return TlsUtilities.ReadUint16(m_databuf, m_skipped + skip); + } + + /// Remove some bytes from our data from the beginning. + /// How many bytes to remove. + public void RemoveData(int i) + { + if (i > m_available) + throw new InvalidOperationException("Cannot remove " + i + " bytes, only got " + m_available); + + /* + * Skip the data. + */ + m_available -= i; + m_skipped += i; + } + + /// Remove data from the buffer. + /// The buffer where the removed data will be copied to. + /// How many bytes to skip at the beginning of buf. + /// How many bytes to read at all. + /// How many bytes from our data to skip. + public void RemoveData(byte[] buf, int off, int len, int skip) + { + Read(buf, off, len, skip); + RemoveData(skip + len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void RemoveData(Span buffer, int skip) + { + Read(buffer, skip); + RemoveData(skip + buffer.Length); + } +#endif + + public byte[] RemoveData(int len, int skip) + { + byte[] buf = new byte[len]; + RemoveData(buf, 0, len, skip); + return buf; + } + + public void Shrink() + { + if (m_available == 0) + { + m_databuf = TlsUtilities.EmptyBytes; + m_skipped = 0; + } + else + { + int desiredSize = GetAllocationSize(m_available); + if (desiredSize < m_databuf.Length) + { + byte[] tmp = new byte[desiredSize]; + Array.Copy(m_databuf, m_skipped, tmp, 0, m_available); + m_databuf = tmp; + m_skipped = 0; + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs.meta new file mode 100644 index 00000000..28e333ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 46d9343f4fdeb094580df31fad01868e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs new file mode 100644 index 00000000..2e8f4af7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs @@ -0,0 +1,76 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ByteQueueInputStream + : BaseInputStream + { + private readonly ByteQueue m_buffer; + + public ByteQueueInputStream() + { + this.m_buffer = new ByteQueue(); + } + + public void AddBytes(byte[] buf) + { + m_buffer.AddData(buf, 0, buf.Length); + } + + public void AddBytes(byte[] buf, int bufOff, int bufLen) + { + m_buffer.AddData(buf, bufOff, bufLen); + } + + public int Peek(byte[] buf) + { + int bytesToRead = System.Math.Min(m_buffer.Available, buf.Length); + m_buffer.Read(buf, 0, bytesToRead, 0); + return bytesToRead; + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + int bytesToRead = System.Math.Min(m_buffer.Available, count); + m_buffer.RemoveData(buffer, offset, bytesToRead, 0); + return bytesToRead; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int bytesToRead = System.Math.Min(m_buffer.Available, buffer.Length); + m_buffer.RemoveData(buffer[..bytesToRead], 0); + return bytesToRead; + } +#endif + + public override int ReadByte() + { + if (m_buffer.Available == 0) + return -1; + + return m_buffer.RemoveData(1, 0)[0]; + } + + public long Skip(long n) + { + int bytesToRemove = System.Math.Min((int)n, m_buffer.Available); + m_buffer.RemoveData(bytesToRemove); + return bytesToRemove; + } + + public int Available + { + get { return m_buffer.Available; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs.meta new file mode 100644 index 00000000..9efc1b74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6c0ce4ccfebda8a4baa1fc3a44800fdb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs new file mode 100644 index 00000000..8217fea4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// OutputStream based on a ByteQueue implementation. + public sealed class ByteQueueOutputStream + : BaseOutputStream + { + private readonly ByteQueue m_buffer; + + public ByteQueueOutputStream() + { + this.m_buffer = new ByteQueue(); + } + + public ByteQueue Buffer + { + get { return m_buffer; } + } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + m_buffer.AddData(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + m_buffer.AddData(buffer); + } +#endif + + public override void WriteByte(byte value) + { + m_buffer.AddData(new byte[]{ value }, 0, 1); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs.meta new file mode 100644 index 00000000..60674eda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e564de8792de0849b0b60e73524d7dc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ByteQueueOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs new file mode 100644 index 00000000..839b00ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class CachedInformationType + { + public const short cert = 1; + public const short cert_req = 2; + + public static string GetName(short cachedInformationType) + { + switch (cachedInformationType) + { + case cert: + return "cert"; + case cert_req: + return "cert_req"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short cachedInformationType) + { + return GetName(cachedInformationType) + "(" + cachedInformationType + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs.meta new file mode 100644 index 00000000..1c4e6d1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0343715c70bfaa24ab4a42444ad3c6ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CachedInformationType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs new file mode 100644 index 00000000..e3bf4a53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Implementation of the RFC 3546 3.3. CertChainType. + public abstract class CertChainType + { + public const short individual_certs = 0; + public const short pkipath = 1; + + public static string GetName(short certChainType) + { + switch (certChainType) + { + case individual_certs: + return "individual_certs"; + case pkipath: + return "pkipath"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short certChainType) + { + return GetName(certChainType) + "(" + certChainType + ")"; + } + + public static bool IsValid(short certChainType) + { + return certChainType >= individual_certs && certChainType <= pkipath; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs.meta new file mode 100644 index 00000000..edb05d9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd44ea61ae62c504e9cc5aacf3d6753d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertChainType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs new file mode 100644 index 00000000..3db86277 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs @@ -0,0 +1,300 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Parsing and encoding of a Certificate struct from RFC 4346. + /// + ///
    +    /// opaque ASN.1Cert<2^24-1>;
    +    /// struct {
    +    ///   ASN.1Cert certificate_list<0..2^24-1>;
    +    /// } Certificate;
    +    /// 
    + ///
    + public sealed class Certificate + { + private static readonly TlsCertificate[] EmptyCerts = new TlsCertificate[0]; + private static readonly CertificateEntry[] EmptyCertEntries = new CertificateEntry[0]; + + public static readonly Certificate EmptyChain = new Certificate(EmptyCerts); + public static readonly Certificate EmptyChainTls13 = new Certificate(TlsUtilities.EmptyBytes, EmptyCertEntries); + + public sealed class ParseOptions + { + public short CertificateType { get; set; } = Tls.CertificateType.X509; + public int MaxChainLength { get; set; } = int.MaxValue; + } + + private static CertificateEntry[] Convert(TlsCertificate[] certificateList) + { + if (TlsUtilities.IsNullOrContainsNull(certificateList)) + throw new ArgumentException("cannot be null or contain any nulls", "certificateList"); + + int count = certificateList.Length; + CertificateEntry[] result = new CertificateEntry[count]; + for (int i = 0; i < count; ++i) + { + result[i] = new CertificateEntry(certificateList[i], null); + } + return result; + } + + private readonly byte[] m_certificateRequestContext; + private readonly CertificateEntry[] m_certificateEntryList; + private readonly short m_certificateType; + + public Certificate(TlsCertificate[] certificateList) + : this(null, Convert(certificateList)) + { + } + + public Certificate(byte[] certificateRequestContext, CertificateEntry[] certificateEntryList) + : this(Tls.CertificateType.X509, certificateRequestContext, certificateEntryList) + { + } + + // TODO[tls13] Prefer to manage the certificateRequestContext internally only? + public Certificate(short certificateType, byte[] certificateRequestContext, CertificateEntry[] certificateEntryList) + { + if (null != certificateRequestContext && !TlsUtilities.IsValidUint8(certificateRequestContext.Length)) + throw new ArgumentException("cannot be longer than 255", "certificateRequestContext"); + if (TlsUtilities.IsNullOrContainsNull(certificateEntryList)) + throw new ArgumentException("cannot be null or contain any nulls", "certificateEntryList"); + + m_certificateRequestContext = TlsUtilities.Clone(certificateRequestContext); + m_certificateEntryList = certificateEntryList; + m_certificateType = certificateType; + } + + public byte[] GetCertificateRequestContext() + { + return TlsUtilities.Clone(m_certificateRequestContext); + } + + /// an array of representing a certificate chain. + public TlsCertificate[] GetCertificateList() + { + return CloneCertificateList(); + } + + public TlsCertificate GetCertificateAt(int index) + { + return m_certificateEntryList[index].Certificate; + } + + public CertificateEntry GetCertificateEntryAt(int index) + { + return m_certificateEntryList[index]; + } + + public CertificateEntry[] GetCertificateEntryList() + { + return CloneCertificateEntryList(); + } + + public short CertificateType => m_certificateType; + + public int Length => m_certificateEntryList.Length; + + /// true if this certificate chain contains no certificates, or false otherwise. + /// + public bool IsEmpty => m_certificateEntryList.Length == 0; + + /// Encode this to a , and optionally calculate the + /// "end point hash" (per RFC 5929's tls-server-end-point binding). + /// the of the current connection. + /// the to encode to. + /// the to write the "end point hash" to (or null). + /// + /// + public void Encode(TlsContext context, Stream messageOutput, Stream endPointHashOutput) + { + bool isTlsV13 = TlsUtilities.IsTlsV13(context); + + if ((null != m_certificateRequestContext) != isTlsV13) + throw new InvalidOperationException(); + + if (isTlsV13) + { + TlsUtilities.WriteOpaque8(m_certificateRequestContext, messageOutput); + } + + int count = m_certificateEntryList.Length; + var certEncodings = new List(count); + var extEncodings = isTlsV13 ? new List(count) : null; + + long totalLength = 0; + for (int i = 0; i < count; ++i) + { + CertificateEntry entry = m_certificateEntryList[i]; + TlsCertificate cert = entry.Certificate; + byte[] derEncoding = cert.GetEncoded(); + + if (i == 0 && endPointHashOutput != null) + { + CalculateEndPointHash(context, cert, derEncoding, endPointHashOutput); + } + + certEncodings.Add(derEncoding); + totalLength += derEncoding.Length; + totalLength += 3; + + if (isTlsV13) + { + var extensions = entry.Extensions; + byte[] extEncoding = (null == extensions) + ? TlsUtilities.EmptyBytes + : TlsProtocol.WriteExtensionsData(extensions); + + extEncodings.Add(extEncoding); + totalLength += extEncoding.Length; + totalLength += 2; + } + } + + // RFC 7250 indicates the raw key is not wrapped in a cert list like X509 is + // but RFC 8446 wraps it in a CertificateEntry, which is inside certificate_list + if (isTlsV13 || m_certificateType != Tls.CertificateType.RawPublicKey) + { + TlsUtilities.CheckUint24(totalLength); + TlsUtilities.WriteUint24((int)totalLength, messageOutput); + } + + for (int i = 0; i < count; ++i) + { + TlsUtilities.WriteOpaque24(certEncodings[i], messageOutput); + + if (isTlsV13) + { + TlsUtilities.WriteOpaque16(extEncodings[i], messageOutput); + } + } + } + + /// Parse a from a . + /// the to apply during parsing. + /// the of the current connection. + /// the to parse from. + /// the to write the "end point hash" to (or null). + /// + /// a object. + /// + public static Certificate Parse(ParseOptions options, TlsContext context, Stream messageInput, + Stream endPointHashOutput) + { + SecurityParameters securityParameters = context.SecurityParameters; + bool isTlsV13 = TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion); + short certType = options.CertificateType; + + byte[] certificateRequestContext = null; + if (isTlsV13) + { + certificateRequestContext = TlsUtilities.ReadOpaque8(messageInput); + } + + int totalLength = TlsUtilities.ReadUint24(messageInput); + if (totalLength == 0) + { + return !isTlsV13 ? EmptyChain + : certificateRequestContext.Length < 1 ? EmptyChainTls13 + : new Certificate(certType, certificateRequestContext, EmptyCertEntries); + } + + byte[] certListData = TlsUtilities.ReadFully(totalLength, messageInput); + MemoryStream buf = new MemoryStream(certListData, false); + + TlsCrypto crypto = context.Crypto; + int maxChainLength = System.Math.Max(1, options.MaxChainLength); + + var certificate_list = new List(); + while (buf.Position < buf.Length) + { + if (certificate_list.Count >= maxChainLength) + { + throw new TlsFatalAlert(AlertDescription.internal_error, + "Certificate chain longer than maximum (" + maxChainLength + ")"); + } + + // RFC 7250 indicates the raw key is not wrapped in a cert list like X509 is + // but RFC 8446 wraps it in a CertificateEntry, which is inside certificate_list + byte[] derEncoding; + if (isTlsV13 || certType != Tls.CertificateType.RawPublicKey) + { + derEncoding = TlsUtilities.ReadOpaque24(buf, 1); + } + else + { + derEncoding = certListData; + buf.Seek(totalLength, SeekOrigin.Current); + } + + TlsCertificate cert = crypto.CreateCertificate(certType, derEncoding); + + if (certificate_list.Count < 1 && endPointHashOutput != null) + { + CalculateEndPointHash(context, cert, derEncoding, endPointHashOutput); + } + + IDictionary extensions = null; + if (isTlsV13) + { + byte[] extEncoding = TlsUtilities.ReadOpaque16(buf); + + extensions = TlsProtocol.ReadExtensionsData13(HandshakeType.certificate, extEncoding); + } + + certificate_list.Add(new CertificateEntry(cert, extensions)); + } + + CertificateEntry[] certificateList = new CertificateEntry[certificate_list.Count]; + for (int i = 0; i < certificate_list.Count; i++) + { + certificateList[i] = (CertificateEntry)certificate_list[i]; + } + + return new Certificate(certType, certificateRequestContext, certificateList); + } + + private static void CalculateEndPointHash(TlsContext context, TlsCertificate cert, byte[] encoding, + Stream output) + { + byte[] endPointHash = TlsUtilities.CalculateEndPointHash(context, cert, encoding); + if (endPointHash != null && endPointHash.Length > 0) + { + output.Write(endPointHash, 0, endPointHash.Length); + } + } + + private TlsCertificate[] CloneCertificateList() + { + int count = m_certificateEntryList.Length; + if (0 == count) + return EmptyCerts; + + TlsCertificate[] result = new TlsCertificate[count]; + for (int i = 0; i < count; ++i) + { + result[i] = m_certificateEntryList[i].Certificate; + } + return result; + } + + private CertificateEntry[] CloneCertificateEntryList() + { + int count = m_certificateEntryList.Length; + if (0 == count) + return EmptyCertEntries; + + CertificateEntry[] result = new CertificateEntry[count]; + Array.Copy(m_certificateEntryList, 0, result, 0, count); + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs.meta new file mode 100644 index 00000000..dad1e421 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2df6dbef81932664e9619ec95460e292 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Certificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs new file mode 100644 index 00000000..71defc31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /** + * RFC 8879 + */ + public abstract class CertificateCompressionAlgorithm + { + public const int zlib = 1; + public const int brotli = 2; + public const int zstd = 3; + + public static string GetName(int certificateCompressionAlgorithm) + { + switch (certificateCompressionAlgorithm) + { + case zlib: + return "zlib"; + case brotli: + return "brotli"; + case zstd: + return "zstd"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(int certificateCompressionAlgorithm) + { + return GetName(certificateCompressionAlgorithm) + "(" + certificateCompressionAlgorithm + ")"; + } + + public static bool IsRecognized(int certificateCompressionAlgorithm) + { + switch (certificateCompressionAlgorithm) + { + case zlib: + case brotli: + case zstd: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs.meta new file mode 100644 index 00000000..3610ed4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a93ef33216ff6e64d9f60274857f30f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateCompressionAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs new file mode 100644 index 00000000..c80dfeac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class CertificateEntry + { + private readonly TlsCertificate m_certificate; + private readonly IDictionary m_extensions; + + public CertificateEntry(TlsCertificate certificate, IDictionary extensions) + { + if (null == certificate) + throw new ArgumentNullException("certificate"); + + this.m_certificate = certificate; + this.m_extensions = extensions; + } + + public TlsCertificate Certificate + { + get { return m_certificate; } + } + + public IDictionary Extensions + { + get { return m_extensions; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs.meta new file mode 100644 index 00000000..9e4c606a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6b9c1b025244de4a8d3bb610655e479 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs new file mode 100644 index 00000000..df15362a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs @@ -0,0 +1,283 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Parsing and encoding of a CertificateRequest struct from RFC 4346. + /// + ///
    +    /// struct {
    +    ///   ClientCertificateType certificate_types<1..2^8-1>;
    +    ///   DistinguishedName certificate_authorities<3..2^16-1>;
    +    /// } CertificateRequest;
    +    /// 
    + /// Updated for RFC 5246: + ///
    +    /// struct {
    +    ///   ClientCertificateType certificate_types <1..2 ^ 8 - 1>;
    +    ///   SignatureAndHashAlgorithm supported_signature_algorithms <2 ^ 16 - 1>;
    +    ///   DistinguishedName certificate_authorities <0..2 ^ 16 - 1>;
    +    /// } CertificateRequest;
    +    /// 
    + /// Revised for RFC 8446: + ///
    +    /// struct {
    +    ///   opaque certificate_request_context <0..2 ^ 8 - 1>;
    +    ///   Extension extensions <2..2 ^ 16 - 1>;
    +    /// } CertificateRequest;
    +    /// 
    + ///
    + /// + /// + public sealed class CertificateRequest + { + /// + private static IList CheckSupportedSignatureAlgorithms( + IList supportedSignatureAlgorithms, short alertDescription) + { + if (null == supportedSignatureAlgorithms) + throw new TlsFatalAlert(alertDescription, "'signature_algorithms' is required"); + + return supportedSignatureAlgorithms; + } + + private readonly byte[] m_certificateRequestContext; + private readonly short[] m_certificateTypes; + private readonly IList m_supportedSignatureAlgorithms; + private readonly IList m_supportedSignatureAlgorithmsCert; + private readonly IList m_certificateAuthorities; + + /// see for valid constants. + /// + /// an of . + public CertificateRequest(short[] certificateTypes, + IList supportedSignatureAlgorithms, IList certificateAuthorities) + : this(null, certificateTypes, supportedSignatureAlgorithms, null, certificateAuthorities) + { + } + + // TODO[tls13] Prefer to manage the certificateRequestContext internally only? + /// + public CertificateRequest(byte[] certificateRequestContext, + IList supportedSignatureAlgorithms, + IList supportedSignatureAlgorithmsCert, IList certificateAuthorities) + : this(certificateRequestContext, null, + CheckSupportedSignatureAlgorithms(supportedSignatureAlgorithms, AlertDescription.internal_error), + supportedSignatureAlgorithmsCert, certificateAuthorities) + { + /* + * TODO[tls13] Removed certificateTypes, added certificate_request_context, added extensions + * (required: signature_algorithms, optional: status_request, signed_certificate_timestamp, + * certificate_authorities, oid_filters, signature_algorithms_cert) + */ + } + + private CertificateRequest(byte[] certificateRequestContext, short[] certificateTypes, + IList supportedSignatureAlgorithms, + IList supportedSignatureAlgorithmsCert, IList certificateAuthorities) + { + if (null != certificateRequestContext && !TlsUtilities.IsValidUint8(certificateRequestContext.Length)) + throw new ArgumentException("cannot be longer than 255", "certificateRequestContext"); + if (null != certificateTypes + && (certificateTypes.Length < 1 || !TlsUtilities.IsValidUint8(certificateTypes.Length))) + { + throw new ArgumentException("should have length from 1 to 255", "certificateTypes"); + } + + this.m_certificateRequestContext = TlsUtilities.Clone(certificateRequestContext); + this.m_certificateTypes = certificateTypes; + this.m_supportedSignatureAlgorithms = supportedSignatureAlgorithms; + this.m_supportedSignatureAlgorithmsCert = supportedSignatureAlgorithmsCert; + this.m_certificateAuthorities = certificateAuthorities; + } + + public byte[] GetCertificateRequestContext() + { + return TlsUtilities.Clone(m_certificateRequestContext); + } + + /// an array of certificate types + /// + public short[] CertificateTypes + { + get { return m_certificateTypes; } + } + + /// an of (or null before TLS 1.2). + /// + public IList SupportedSignatureAlgorithms + { + get { return m_supportedSignatureAlgorithms; } + } + + /// an optional of . May be non-null from + /// TLS 1.3 onwards. + public IList SupportedSignatureAlgorithmsCert + { + get { return m_supportedSignatureAlgorithmsCert; } + } + + /// an of . + public IList CertificateAuthorities + { + get { return m_certificateAuthorities; } + } + + public bool HasCertificateRequestContext(byte[] certificateRequestContext) + { + return Arrays.AreEqual(m_certificateRequestContext, certificateRequestContext); + } + + /// Encode this to a . + /// the of the current connection. + /// the to encode to. + /// + public void Encode(TlsContext context, Stream output) + { + ProtocolVersion negotiatedVersion = context.ServerVersion; + bool isTlsV12 = TlsUtilities.IsTlsV12(negotiatedVersion); + bool isTlsV13 = TlsUtilities.IsTlsV13(negotiatedVersion); + + if (isTlsV13 != (null != m_certificateRequestContext) || + isTlsV13 != (null == m_certificateTypes) || + isTlsV12 != (null != m_supportedSignatureAlgorithms) || + (!isTlsV13 && (null != m_supportedSignatureAlgorithmsCert))) + { + throw new InvalidOperationException(); + } + + if (isTlsV13) + { + TlsUtilities.WriteOpaque8(m_certificateRequestContext, output); + + var extensions = new Dictionary(); + TlsExtensionsUtilities.AddSignatureAlgorithmsExtension(extensions, m_supportedSignatureAlgorithms); + + if (null != m_supportedSignatureAlgorithmsCert) + { + TlsExtensionsUtilities.AddSignatureAlgorithmsCertExtension(extensions, + m_supportedSignatureAlgorithmsCert); + } + + if (null != m_certificateAuthorities) + { + TlsExtensionsUtilities.AddCertificateAuthoritiesExtension(extensions, m_certificateAuthorities); + } + + byte[] extEncoding = TlsProtocol.WriteExtensionsData(extensions); + + TlsUtilities.WriteOpaque16(extEncoding, output); + return; + } + + TlsUtilities.WriteUint8ArrayWithUint8Length(m_certificateTypes, output); + + if (isTlsV12) + { + // TODO Check whether SignatureAlgorithm.anonymous is allowed here + TlsUtilities.EncodeSupportedSignatureAlgorithms(m_supportedSignatureAlgorithms, output); + } + + if (m_certificateAuthorities == null || m_certificateAuthorities.Count < 1) + { + TlsUtilities.WriteUint16(0, output); + } + else + { + var derEncodings = new List(m_certificateAuthorities.Count); + + int totalLength = 0; + foreach (X509Name certificateAuthority in m_certificateAuthorities) + { + byte[] derEncoding = certificateAuthority.GetEncoded(Asn1Encodable.Der); + derEncodings.Add(derEncoding); + totalLength += derEncoding.Length + 2; + } + + TlsUtilities.CheckUint16(totalLength); + TlsUtilities.WriteUint16(totalLength, output); + + foreach (byte[] derEncoding in derEncodings) + { + TlsUtilities.WriteOpaque16(derEncoding, output); + } + } + } + + /// Parse a from a + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static CertificateRequest Parse(TlsContext context, Stream input) + { + ProtocolVersion negotiatedVersion = context.ServerVersion; + bool isTlsV13 = TlsUtilities.IsTlsV13(negotiatedVersion); + + if (isTlsV13) + { + byte[] certificateRequestContext = TlsUtilities.ReadOpaque8(input); + + /* + * TODO[tls13] required: signature_algorithms; optional: status_request, + * signed_certificate_timestamp, certificate_authorities, oid_filters, + * signature_algorithms_cert + */ + + byte[] extEncoding = TlsUtilities.ReadOpaque16(input); + + var extensions = TlsProtocol.ReadExtensionsData13(HandshakeType.certificate_request, extEncoding); + + var supportedSignatureAlgorithms13 = CheckSupportedSignatureAlgorithms( + TlsExtensionsUtilities.GetSignatureAlgorithmsExtension(extensions), + AlertDescription.missing_extension); + var supportedSignatureAlgorithmsCert13 = TlsExtensionsUtilities + .GetSignatureAlgorithmsCertExtension(extensions); + var certificateAuthorities13 = TlsExtensionsUtilities.GetCertificateAuthoritiesExtension(extensions); + + return new CertificateRequest(certificateRequestContext, supportedSignatureAlgorithms13, + supportedSignatureAlgorithmsCert13, certificateAuthorities13); + } + + bool isTLSv12 = TlsUtilities.IsTlsV12(negotiatedVersion); + + short[] certificateTypes = TlsUtilities.ReadUint8ArrayWithUint8Length(input, 1); + + IList supportedSignatureAlgorithms = null; + if (isTLSv12) + { + supportedSignatureAlgorithms = TlsUtilities.ParseSupportedSignatureAlgorithms(input); + } + + IList certificateAuthorities = null; + { + byte[] certAuthData = TlsUtilities.ReadOpaque16(input); + if (certAuthData.Length > 0) + { + certificateAuthorities = new List(); + MemoryStream bis = new MemoryStream(certAuthData, false); + do + { + byte[] derEncoding = TlsUtilities.ReadOpaque16(bis, 1); + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + X509Name ca = X509Name.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(ca, derEncoding); + certificateAuthorities.Add(ca); + } + while (bis.Position < bis.Length); + } + } + + return new CertificateRequest(certificateTypes, supportedSignatureAlgorithms, certificateAuthorities); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs.meta new file mode 100644 index 00000000..a5b57f31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea54ac33b50847245bbf3b8f8b11647b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs new file mode 100644 index 00000000..7f57376c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs @@ -0,0 +1,215 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class CertificateStatus + { + private readonly short m_statusType; + private readonly object m_response; + + public CertificateStatus(short statusType, object response) + { + if (!IsCorrectType(statusType, response)) + throw new ArgumentException("not an instance of the correct type", "response"); + + this.m_statusType = statusType; + this.m_response = response; + } + + public short StatusType + { + get { return m_statusType; } + } + + public object Response + { + get { return m_response; } + } + + public OcspResponse OcspResponse + { + get + { + if (!IsCorrectType(CertificateStatusType.ocsp, m_response)) + throw new InvalidOperationException("'response' is not an OCSPResponse"); + + return (OcspResponse)m_response; + } + } + + /// an of (possibly null) . + public IList OcspResponseList + { + get + { + if (!IsCorrectType(CertificateStatusType.ocsp_multi, m_response)) + throw new InvalidOperationException("'response' is not an OCSPResponseList"); + + return (IList)m_response; + } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_statusType, output); + + switch (m_statusType) + { + case CertificateStatusType.ocsp: + { + OcspResponse ocspResponse = (OcspResponse)m_response; + byte[] derEncoding = ocspResponse.GetEncoded(Asn1Encodable.Der); + TlsUtilities.WriteOpaque24(derEncoding, output); + break; + } + case CertificateStatusType.ocsp_multi: + { + var ocspResponseList = (IList)m_response; + int count = ocspResponseList.Count; + + var derEncodings = new List(count); + long totalLength = 0; + foreach (OcspResponse ocspResponse in ocspResponseList) + { + if (ocspResponse == null) + { + derEncodings.Add(TlsUtilities.EmptyBytes); + } + else + { + byte[] derEncoding = ocspResponse.GetEncoded(Asn1Encodable.Der); + derEncodings.Add(derEncoding); + totalLength += derEncoding.Length; + } + totalLength += 3; + } + + TlsUtilities.CheckUint24(totalLength); + TlsUtilities.WriteUint24((int)totalLength, output); + + foreach (byte[] derEncoding in derEncodings) + { + TlsUtilities.WriteOpaque24(derEncoding, output); + } + + break; + } + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + /// Parse a from a . + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static CertificateStatus Parse(TlsContext context, Stream input) + { + SecurityParameters securityParameters = context.SecurityParameters; + + Certificate peerCertificate = securityParameters.PeerCertificate; + if (null == peerCertificate || peerCertificate.IsEmpty + || CertificateType.X509 != peerCertificate.CertificateType) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int certificateCount = peerCertificate.Length; + int statusRequestVersion = securityParameters.StatusRequestVersion; + + short status_type = TlsUtilities.ReadUint8(input); + object response; + + switch (status_type) + { + case CertificateStatusType.ocsp: + { + RequireStatusRequestVersion(1, statusRequestVersion); + + byte[] derEncoding = TlsUtilities.ReadOpaque24(input, 1); + response = ParseOcspResponse(derEncoding); + break; + } + case CertificateStatusType.ocsp_multi: + { + RequireStatusRequestVersion(2, statusRequestVersion); + + byte[] ocsp_response_list = TlsUtilities.ReadOpaque24(input, 1); + MemoryStream buf = new MemoryStream(ocsp_response_list, false); + + var ocspResponseList = new List(); + while (buf.Position < buf.Length) + { + if (ocspResponseList.Count >= certificateCount) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + int length = TlsUtilities.ReadUint24(buf); + if (length < 1) + { + ocspResponseList.Add(null); + } + else + { + byte[] derEncoding = TlsUtilities.ReadFully(length, buf); + ocspResponseList.Add(ParseOcspResponse(derEncoding)); + } + } + + response = ocspResponseList; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + return new CertificateStatus(status_type, response); + } + + private static bool IsCorrectType(short statusType, object response) + { + switch (statusType) + { + case CertificateStatusType.ocsp: + return response is OcspResponse; + case CertificateStatusType.ocsp_multi: + return IsOcspResponseList(response); + default: + throw new ArgumentException("unsupported CertificateStatusType", "statusType"); + } + } + + private static bool IsOcspResponseList(object response) + { + return response is IList v && v.Count > 0; + } + + /// + private static OcspResponse ParseOcspResponse(byte[] derEncoding) + { + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + OcspResponse ocspResponse = OcspResponse.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(ocspResponse, derEncoding); + return ocspResponse; + } + + /// + private static void RequireStatusRequestVersion(int minVersion, int statusRequestVersion) + { + if (statusRequestVersion < minVersion) + throw new TlsFatalAlert(AlertDescription.decode_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs.meta new file mode 100644 index 00000000..598fa702 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f1305b7557855f419df3114699abec7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatus.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs new file mode 100644 index 00000000..f2b2dc76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Implementation of the RFC 3546 3.6. CertificateStatusRequest. + public sealed class CertificateStatusRequest + { + private short m_statusType; + private object m_request; + + public CertificateStatusRequest(short statusType, object request) + { + if (!IsCorrectType(statusType, request)) + throw new ArgumentException("not an instance of the correct type", "request"); + + this.m_statusType = statusType; + this.m_request = request; + } + + public short StatusType + { + get { return m_statusType; } + } + + public object Request + { + get { return m_request; } + } + + public OcspStatusRequest OcspStatusRequest + { + get + { + if (!IsCorrectType(CertificateStatusType.ocsp, m_request)) + throw new InvalidOperationException("'request' is not an OCSPStatusRequest"); + + return (OcspStatusRequest)m_request; + } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_statusType, output); + + switch (m_statusType) + { + case CertificateStatusType.ocsp: + ((OcspStatusRequest)m_request).Encode(output); + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static CertificateStatusRequest Parse(Stream input) + { + short status_type = TlsUtilities.ReadUint8(input); + object request; + + switch (status_type) + { + case CertificateStatusType.ocsp: + request = OcspStatusRequest.Parse(input); + break; + default: + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + return new CertificateStatusRequest(status_type, request); + } + + private static bool IsCorrectType(short statusType, object request) + { + switch (statusType) + { + case CertificateStatusType.ocsp: + return request is OcspStatusRequest; + default: + throw new ArgumentException("unsupported CertificateStatusType", "statusType"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs.meta new file mode 100644 index 00000000..40080e3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79210b713e19e8442a639108155dbe9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs new file mode 100644 index 00000000..801534fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs @@ -0,0 +1,104 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Implementation of the RFC 6961 2.2. CertificateStatusRequestItemV2. + public sealed class CertificateStatusRequestItemV2 + { + private readonly short m_statusType; + private readonly object m_request; + + public CertificateStatusRequestItemV2(short statusType, object request) + { + if (!IsCorrectType(statusType, request)) + throw new ArgumentException("not an instance of the correct type", "request"); + + this.m_statusType = statusType; + this.m_request = request; + } + + public short StatusType + { + get { return m_statusType; } + } + + public object Request + { + get { return m_request; } + } + + public OcspStatusRequest OcspStatusRequest + { + get + { + if (!(m_request is OcspStatusRequest)) + throw new InvalidOperationException("'request' is not an OcspStatusRequest"); + + return (OcspStatusRequest)m_request; + } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_statusType, output); + + MemoryStream buf = new MemoryStream(); + switch (m_statusType) + { + case CertificateStatusType.ocsp: + case CertificateStatusType.ocsp_multi: + ((OcspStatusRequest)m_request).Encode(buf); + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + byte[] requestBytes = buf.ToArray(); + TlsUtilities.WriteOpaque16(requestBytes, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static CertificateStatusRequestItemV2 Parse(Stream input) + { + short status_type = TlsUtilities.ReadUint8(input); + + object request; + byte[] requestBytes = TlsUtilities.ReadOpaque16(input); + MemoryStream buf = new MemoryStream(requestBytes, false); + switch (status_type) + { + case CertificateStatusType.ocsp: + case CertificateStatusType.ocsp_multi: + request = OcspStatusRequest.Parse(buf); + break; + default: + throw new TlsFatalAlert(AlertDescription.decode_error); + } + TlsProtocol.AssertEmpty(buf); + + return new CertificateStatusRequestItemV2(status_type, request); + } + + private static bool IsCorrectType(short statusType, object request) + { + switch (statusType) + { + case CertificateStatusType.ocsp: + case CertificateStatusType.ocsp_multi: + return request is OcspStatusRequest; + default: + throw new ArgumentException("unsupported CertificateStatusType", "statusType"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs.meta new file mode 100644 index 00000000..cfbb62c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6e50bf5ee0e5a5a4aab73c60288eb166 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusRequestItemV2.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs new file mode 100644 index 00000000..299be57b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class CertificateStatusType + { + /* + * RFC 6066 + */ + public const short ocsp = 1; + + /* + * RFC 6961 + */ + public const short ocsp_multi = 2; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs.meta new file mode 100644 index 00000000..8b7dd192 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fff43ed338e82154eaea50af22c9b87b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateStatusType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs new file mode 100644 index 00000000..172d57ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 6091 + public abstract class CertificateType + { + public const short X509 = 0; + public const short OpenPGP = 1; + + /* + * RFC 7250 + */ + public const short RawPublicKey = 2; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs.meta new file mode 100644 index 00000000..5522cecc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 815f0f06a6e09ce469df69b184b04f9f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs new file mode 100644 index 00000000..bd59379a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs @@ -0,0 +1,120 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 3546 3.3 + public sealed class CertificateUrl + { + private readonly short m_type; + private readonly IList m_urlAndHashList; + + /// see for valid constants. + /// an of . + public CertificateUrl(short type, IList urlAndHashList) + { + if (!CertChainType.IsValid(type)) + throw new ArgumentException("not a valid CertChainType value", "type"); + if (urlAndHashList == null || urlAndHashList.Count < 1) + throw new ArgumentException("must have length > 0", "urlAndHashList"); + if (type == CertChainType.pkipath && urlAndHashList.Count != 1) + throw new ArgumentException("must contain exactly one entry when type is " + + CertChainType.GetText(type), "urlAndHashList"); + + this.m_type = type; + this.m_urlAndHashList = urlAndHashList; + } + + /// + public short Type + { + get { return m_type; } + } + + /// an of . + public IList UrlAndHashList + { + get { return m_urlAndHashList; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_type, output); + + ListBuffer16 buf = new ListBuffer16(); + foreach (UrlAndHash urlAndHash in m_urlAndHashList) + { + urlAndHash.Encode(buf); + } + buf.EncodeTo(output); + } + + /// Parse a from a . + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static CertificateUrl Parse(TlsContext context, Stream input) + { + short type = TlsUtilities.ReadUint8(input); + if (!CertChainType.IsValid(type)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int totalLength = TlsUtilities.ReadUint16(input); + if (totalLength < 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + byte[] urlAndHashListData = TlsUtilities.ReadFully(totalLength, input); + + MemoryStream buf = new MemoryStream(urlAndHashListData, false); + + var url_and_hash_list = new List(); + while (buf.Position < buf.Length) + { + UrlAndHash url_and_hash = UrlAndHash.Parse(context, buf); + url_and_hash_list.Add(url_and_hash); + } + + if (type == CertChainType.pkipath && url_and_hash_list.Count != 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return new CertificateUrl(type, url_and_hash_list); + } + + // TODO Could be more generally useful + internal class ListBuffer16 + : MemoryStream + { + internal ListBuffer16() + { + // Reserve space for length + TlsUtilities.WriteUint16(0, this); + } + + internal void EncodeTo(Stream output) + { + // Patch actual length back in + int length = Convert.ToInt32(Length) - 2; + TlsUtilities.CheckUint16(length); + + Seek(0L, SeekOrigin.Begin); + TlsUtilities.WriteUint16(length, this); + + WriteTo(output); + + Dispose(); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs.meta new file mode 100644 index 00000000..dc33c910 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bcc63aa5f351fe24da84a3c37fce4fc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateUrl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs new file mode 100644 index 00000000..cdf0fd14 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class CertificateVerify + { + private readonly int m_algorithm; + private readonly byte[] m_signature; + + public CertificateVerify(int algorithm, byte[] signature) + { + if (!TlsUtilities.IsValidUint16(algorithm)) + throw new ArgumentException("algorithm"); + if (signature == null) + throw new ArgumentNullException("signature"); + + this.m_algorithm = algorithm; + this.m_signature = signature; + } + + /// a value. + public int Algorithm + { + get { return m_algorithm; } + } + + public byte[] Signature + { + get { return m_signature; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint16(m_algorithm, output); + TlsUtilities.WriteOpaque16(m_signature, output); + } + + /// Parse a from a . + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static CertificateVerify Parse(TlsContext context, Stream input) + { + if (!TlsUtilities.IsTlsV13(context)) + throw new InvalidOperationException(); + + int algorithm = TlsUtilities.ReadUint16(input); + byte[] signature = TlsUtilities.ReadOpaque16(input); + return new CertificateVerify(algorithm, signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs.meta new file mode 100644 index 00000000..562cebb4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 306d36fca91c28c4f8d7c13c245bce16 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CertificateVerify.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs new file mode 100644 index 00000000..f7905eec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class ChangeCipherSpec + { + public const short change_cipher_spec = 1; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs.meta new file mode 100644 index 00000000..7f9db18a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a03d8b91571e63a42818870a91ef3a74 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChangeCipherSpec.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs new file mode 100644 index 00000000..f986baaa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5056 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g.serialization). + /// + public abstract class ChannelBinding + { + /* + * RFC 5929 + */ + public const int tls_server_end_point = 0; + public const int tls_unique = 1; + public const int tls_unique_for_telnet = 2; + + /* + * RFC 9266 + */ + public const int tls_exporter = 3; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs.meta new file mode 100644 index 00000000..477ea949 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b18e9057b144fe41abaa807153fac1c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ChannelBinding.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs new file mode 100644 index 00000000..282594d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs @@ -0,0 +1,465 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 A.5 + public abstract class CipherSuite + { + public static bool IsScsv(int cipherSuite) + { + switch (cipherSuite) + { + case TLS_EMPTY_RENEGOTIATION_INFO_SCSV: + case TLS_FALLBACK_SCSV: + return true; + default: + return false; + } + } + + public const int TLS_NULL_WITH_NULL_NULL = 0x0000; + public const int TLS_RSA_WITH_NULL_MD5 = 0x0001; + public const int TLS_RSA_WITH_NULL_SHA = 0x0002; + public const int TLS_RSA_EXPORT_WITH_RC4_40_MD5 = 0x0003; + public const int TLS_RSA_WITH_RC4_128_MD5 = 0x0004; + public const int TLS_RSA_WITH_RC4_128_SHA = 0x0005; + public const int TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 = 0x0006; + public const int TLS_RSA_WITH_IDEA_CBC_SHA = 0x0007; + public const int TLS_RSA_EXPORT_WITH_DES40_CBC_SHA = 0x0008; + public const int TLS_RSA_WITH_DES_CBC_SHA = 0x0009; + public const int TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x000A; + public const int TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA = 0x000B; + public const int TLS_DH_DSS_WITH_DES_CBC_SHA = 0x000C; + public const int TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA = 0x000D; + public const int TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA = 0x000E; + public const int TLS_DH_RSA_WITH_DES_CBC_SHA = 0x000F; + public const int TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA = 0x0010; + public const int TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA = 0x0011; + public const int TLS_DHE_DSS_WITH_DES_CBC_SHA = 0x0012; + public const int TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA = 0x0013; + public const int TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA = 0x0014; + public const int TLS_DHE_RSA_WITH_DES_CBC_SHA = 0x0015; + public const int TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = 0x0016; + public const int TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 = 0x0017; + public const int TLS_DH_anon_WITH_RC4_128_MD5 = 0x0018; + public const int TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA = 0x0019; + public const int TLS_DH_anon_WITH_DES_CBC_SHA = 0x001A; + public const int TLS_DH_anon_WITH_3DES_EDE_CBC_SHA = 0x001B; + + /* + * Note: The cipher suite values { 0x00, 0x1C } and { 0x00, 0x1D } are reserved to avoid + * collision with Fortezza-based cipher suites in SSL 3. + */ + + /* + * RFC 3268 + */ + public const int TLS_RSA_WITH_AES_128_CBC_SHA = 0x002F; + public const int TLS_DH_DSS_WITH_AES_128_CBC_SHA = 0x0030; + public const int TLS_DH_RSA_WITH_AES_128_CBC_SHA = 0x0031; + public const int TLS_DHE_DSS_WITH_AES_128_CBC_SHA = 0x0032; + public const int TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x0033; + public const int TLS_DH_anon_WITH_AES_128_CBC_SHA = 0x0034; + public const int TLS_RSA_WITH_AES_256_CBC_SHA = 0x0035; + public const int TLS_DH_DSS_WITH_AES_256_CBC_SHA = 0x0036; + public const int TLS_DH_RSA_WITH_AES_256_CBC_SHA = 0x0037; + public const int TLS_DHE_DSS_WITH_AES_256_CBC_SHA = 0x0038; + public const int TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x0039; + public const int TLS_DH_anon_WITH_AES_256_CBC_SHA = 0x003A; + + /* + * RFC 5932 + */ + public const int TLS_RSA_WITH_CAMELLIA_128_CBC_SHA = 0x0041; + public const int TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA = 0x0042; + public const int TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA = 0x0043; + public const int TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA = 0x0044; + public const int TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA = 0x0045; + public const int TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA = 0x0046; + + public const int TLS_RSA_WITH_CAMELLIA_256_CBC_SHA = 0x0084; + public const int TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA = 0x0085; + public const int TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA = 0x0086; + public const int TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA = 0x0087; + public const int TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA = 0x0088; + public const int TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA = 0x0089; + + public const int TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BA; + public const int TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BB; + public const int TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BC; + public const int TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BD; + public const int TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BE; + public const int TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256 = 0x00BF; + + public const int TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C0; + public const int TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C1; + public const int TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C2; + public const int TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C3; + public const int TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C4; + public const int TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 = 0x00C5; + + /* + * RFC 4162 + */ + public const int TLS_RSA_WITH_SEED_CBC_SHA = 0x0096; + public const int TLS_DH_DSS_WITH_SEED_CBC_SHA = 0x0097; + public const int TLS_DH_RSA_WITH_SEED_CBC_SHA = 0x0098; + public const int TLS_DHE_DSS_WITH_SEED_CBC_SHA = 0x0099; + public const int TLS_DHE_RSA_WITH_SEED_CBC_SHA = 0x009A; + public const int TLS_DH_anon_WITH_SEED_CBC_SHA = 0x009B; + + /* + * RFC 4279 + */ + public const int TLS_PSK_WITH_RC4_128_SHA = 0x008A; + public const int TLS_PSK_WITH_3DES_EDE_CBC_SHA = 0x008B; + public const int TLS_PSK_WITH_AES_128_CBC_SHA = 0x008C; + public const int TLS_PSK_WITH_AES_256_CBC_SHA = 0x008D; + public const int TLS_DHE_PSK_WITH_RC4_128_SHA = 0x008E; + public const int TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA = 0x008F; + public const int TLS_DHE_PSK_WITH_AES_128_CBC_SHA = 0x0090; + public const int TLS_DHE_PSK_WITH_AES_256_CBC_SHA = 0x0091; + public const int TLS_RSA_PSK_WITH_RC4_128_SHA = 0x0092; + public const int TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA = 0x0093; + public const int TLS_RSA_PSK_WITH_AES_128_CBC_SHA = 0x0094; + public const int TLS_RSA_PSK_WITH_AES_256_CBC_SHA = 0x0095; + + /* + * RFC 4492 + */ + public const int TLS_ECDH_ECDSA_WITH_NULL_SHA = 0xC001; + public const int TLS_ECDH_ECDSA_WITH_RC4_128_SHA = 0xC002; + public const int TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA = 0xC003; + public const int TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA = 0xC004; + public const int TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA = 0xC005; + public const int TLS_ECDHE_ECDSA_WITH_NULL_SHA = 0xC006; + public const int TLS_ECDHE_ECDSA_WITH_RC4_128_SHA = 0xC007; + public const int TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA = 0xC008; + public const int TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA = 0xC009; + public const int TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA = 0xC00A; + public const int TLS_ECDH_RSA_WITH_NULL_SHA = 0xC00B; + public const int TLS_ECDH_RSA_WITH_RC4_128_SHA = 0xC00C; + public const int TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA = 0xC00D; + public const int TLS_ECDH_RSA_WITH_AES_128_CBC_SHA = 0xC00E; + public const int TLS_ECDH_RSA_WITH_AES_256_CBC_SHA = 0xC00F; + public const int TLS_ECDHE_RSA_WITH_NULL_SHA = 0xC010; + public const int TLS_ECDHE_RSA_WITH_RC4_128_SHA = 0xC011; + public const int TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA = 0xC012; + public const int TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0xC013; + public const int TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0xC014; + public const int TLS_ECDH_anon_WITH_NULL_SHA = 0xC015; + public const int TLS_ECDH_anon_WITH_RC4_128_SHA = 0xC016; + public const int TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA = 0xC017; + public const int TLS_ECDH_anon_WITH_AES_128_CBC_SHA = 0xC018; + public const int TLS_ECDH_anon_WITH_AES_256_CBC_SHA = 0xC019; + + /* + * RFC 4785 + */ + public const int TLS_PSK_WITH_NULL_SHA = 0x002C; + public const int TLS_DHE_PSK_WITH_NULL_SHA = 0x002D; + public const int TLS_RSA_PSK_WITH_NULL_SHA = 0x002E; + + /* + * RFC 5054 + */ + public const int TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA = 0xC01A; + public const int TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA = 0xC01B; + public const int TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA = 0xC01C; + public const int TLS_SRP_SHA_WITH_AES_128_CBC_SHA = 0xC01D; + public const int TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA = 0xC01E; + public const int TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA = 0xC01F; + public const int TLS_SRP_SHA_WITH_AES_256_CBC_SHA = 0xC020; + public const int TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA = 0xC021; + public const int TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA = 0xC022; + + /* + * RFC 5246 + */ + public const int TLS_RSA_WITH_NULL_SHA256 = 0x003B; + public const int TLS_RSA_WITH_AES_128_CBC_SHA256 = 0x003C; + public const int TLS_RSA_WITH_AES_256_CBC_SHA256 = 0x003D; + public const int TLS_DH_DSS_WITH_AES_128_CBC_SHA256 = 0x003E; + public const int TLS_DH_RSA_WITH_AES_128_CBC_SHA256 = 0x003F; + public const int TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 = 0x0040; + public const int TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 = 0x0067; + public const int TLS_DH_DSS_WITH_AES_256_CBC_SHA256 = 0x0068; + public const int TLS_DH_RSA_WITH_AES_256_CBC_SHA256 = 0x0069; + public const int TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 = 0x006A; + public const int TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 = 0x006B; + public const int TLS_DH_anon_WITH_AES_128_CBC_SHA256 = 0x006C; + public const int TLS_DH_anon_WITH_AES_256_CBC_SHA256 = 0x006D; + + /* + * RFC 5288 + */ + public const int TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x009C; + public const int TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x009D; + public const int TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 = 0x009E; + public const int TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 = 0x009F; + public const int TLS_DH_RSA_WITH_AES_128_GCM_SHA256 = 0x00A0; + public const int TLS_DH_RSA_WITH_AES_256_GCM_SHA384 = 0x00A1; + public const int TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 = 0x00A2; + public const int TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 = 0x00A3; + public const int TLS_DH_DSS_WITH_AES_128_GCM_SHA256 = 0x00A4; + public const int TLS_DH_DSS_WITH_AES_256_GCM_SHA384 = 0x00A5; + public const int TLS_DH_anon_WITH_AES_128_GCM_SHA256 = 0x00A6; + public const int TLS_DH_anon_WITH_AES_256_GCM_SHA384 = 0x00A7; + + /* + * RFC 5289 + */ + public const int TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 = 0xC023; + public const int TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 = 0xC024; + public const int TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 = 0xC025; + public const int TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 = 0xC026; + public const int TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 = 0xC027; + public const int TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 = 0xC028; + public const int TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 = 0xC029; + public const int TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 = 0xC02A; + public const int TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0xC02B; + public const int TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 = 0xC02C; + public const int TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 = 0xC02D; + public const int TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 = 0xC02E; + public const int TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0xC02F; + public const int TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 = 0xC030; + public const int TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 = 0xC031; + public const int TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 = 0xC032; + + /* + * RFC 5487 + */ + public const int TLS_PSK_WITH_AES_128_GCM_SHA256 = 0x00A8; + public const int TLS_PSK_WITH_AES_256_GCM_SHA384 = 0x00A9; + public const int TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 = 0x00AA; + public const int TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 = 0x00AB; + public const int TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 = 0x00AC; + public const int TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 = 0x00AD; + public const int TLS_PSK_WITH_AES_128_CBC_SHA256 = 0x00AE; + public const int TLS_PSK_WITH_AES_256_CBC_SHA384 = 0x00AF; + public const int TLS_PSK_WITH_NULL_SHA256 = 0x00B0; + public const int TLS_PSK_WITH_NULL_SHA384 = 0x00B1; + public const int TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 = 0x00B2; + public const int TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 = 0x00B3; + public const int TLS_DHE_PSK_WITH_NULL_SHA256 = 0x00B4; + public const int TLS_DHE_PSK_WITH_NULL_SHA384 = 0x00B5; + public const int TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 = 0x00B6; + public const int TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 = 0x00B7; + public const int TLS_RSA_PSK_WITH_NULL_SHA256 = 0x00B8; + public const int TLS_RSA_PSK_WITH_NULL_SHA384 = 0x00B9; + + /* + * RFC 5489 + */ + public const int TLS_ECDHE_PSK_WITH_RC4_128_SHA = 0xC033; + public const int TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA = 0xC034; + public const int TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA = 0xC035; + public const int TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA = 0xC036; + public const int TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 = 0xC037; + public const int TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 = 0xC038; + public const int TLS_ECDHE_PSK_WITH_NULL_SHA = 0xC039; + public const int TLS_ECDHE_PSK_WITH_NULL_SHA256 = 0xC03A; + public const int TLS_ECDHE_PSK_WITH_NULL_SHA384 = 0xC03B; + + /* + * RFC 5746 + */ + public const int TLS_EMPTY_RENEGOTIATION_INFO_SCSV = 0x00FF; + + /* + * RFC 6209 + */ + public const int TLS_RSA_WITH_ARIA_128_CBC_SHA256 = 0xC03C; + public const int TLS_RSA_WITH_ARIA_256_CBC_SHA384 = 0xC03D; + public const int TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256 = 0xC03E; + public const int TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384 = 0xC03F; + public const int TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256 = 0xC040; + public const int TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384 = 0xC041; + public const int TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256 = 0xC042; + public const int TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384 = 0xC043; + public const int TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 = 0xC044; + public const int TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 = 0xC045; + public const int TLS_DH_anon_WITH_ARIA_128_CBC_SHA256 = 0xC046; + public const int TLS_DH_anon_WITH_ARIA_256_CBC_SHA384 = 0xC047; + + public const int TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 = 0xC048; + public const int TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 = 0xC049; + public const int TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 = 0xC04A; + public const int TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 = 0xC04B; + public const int TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 = 0xC04C; + public const int TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 = 0xC04D; + public const int TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 = 0xC04E; + public const int TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 = 0xC04F; + + public const int TLS_RSA_WITH_ARIA_128_GCM_SHA256 = 0xC050; + public const int TLS_RSA_WITH_ARIA_256_GCM_SHA384 = 0xC051; + public const int TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 = 0xC052; + public const int TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 = 0xC053; + public const int TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256 = 0xC054; + public const int TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384 = 0xC055; + public const int TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256 = 0xC056; + public const int TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384 = 0xC057; + public const int TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256 = 0xC058; + public const int TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384 = 0xC059; + public const int TLS_DH_anon_WITH_ARIA_128_GCM_SHA256 = 0xC05A; + public const int TLS_DH_anon_WITH_ARIA_256_GCM_SHA384 = 0xC05B; + + public const int TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 = 0xC05C; + public const int TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 = 0xC05D; + public const int TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 = 0xC05E; + public const int TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 = 0xC05F; + public const int TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 = 0xC060; + public const int TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 = 0xC061; + public const int TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 = 0xC062; + public const int TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 = 0xC063; + + public const int TLS_PSK_WITH_ARIA_128_CBC_SHA256 = 0xC064; + public const int TLS_PSK_WITH_ARIA_256_CBC_SHA384 = 0xC065; + public const int TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 = 0xC066; + public const int TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 = 0xC067; + public const int TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 = 0xC068; + public const int TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 = 0xC069; + public const int TLS_PSK_WITH_ARIA_128_GCM_SHA256 = 0xC06A; + public const int TLS_PSK_WITH_ARIA_256_GCM_SHA384 = 0xC06B; + public const int TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 = 0xC06C; + public const int TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 = 0xC06D; + public const int TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 = 0xC06E; + public const int TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 = 0xC06F; + public const int TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 = 0xC070; + public const int TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 = 0xC071; + + /* + * RFC 6367 + */ + public const int TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 = 0xC072; + public const int TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = 0xC073; + public const int TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 = 0xC074; + public const int TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = 0xC075; + public const int TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 = 0xC076; + public const int TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 = 0xC077; + public const int TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 = 0xC078; + public const int TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 = 0xC079; + + public const int TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC07A; + public const int TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC07B; + public const int TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC07C; + public const int TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC07D; + public const int TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC07E; + public const int TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC07F; + public const int TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256 = 0xC080; + public const int TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384 = 0xC081; + public const int TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256 = 0xC082; + public const int TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384 = 0xC083; + public const int TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256 = 0xC084; + public const int TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384 = 0xC085; + public const int TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC086; + public const int TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC087; + public const int TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC088; + public const int TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC089; + public const int TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC08A; + public const int TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC08B; + public const int TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC08C; + public const int TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC08D; + + public const int TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 = 0xC08E; + public const int TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 = 0xC08F; + public const int TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 = 0xC090; + public const int TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 = 0xC091; + public const int TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 = 0xC092; + public const int TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 = 0xC093; + public const int TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 = 0xC094; + public const int TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 = 0xC095; + public const int TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 = 0xC096; + public const int TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 = 0xC097; + public const int TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 = 0xC098; + public const int TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 = 0xC099; + public const int TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 = 0xC09A; + public const int TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 = 0xC09B; + + /* + * RFC 6655 + */ + public const int TLS_RSA_WITH_AES_128_CCM = 0xC09C; + public const int TLS_RSA_WITH_AES_256_CCM = 0xC09D; + public const int TLS_DHE_RSA_WITH_AES_128_CCM = 0xC09E; + public const int TLS_DHE_RSA_WITH_AES_256_CCM = 0xC09F; + public const int TLS_RSA_WITH_AES_128_CCM_8 = 0xC0A0; + public const int TLS_RSA_WITH_AES_256_CCM_8 = 0xC0A1; + public const int TLS_DHE_RSA_WITH_AES_128_CCM_8 = 0xC0A2; + public const int TLS_DHE_RSA_WITH_AES_256_CCM_8 = 0xC0A3; + public const int TLS_PSK_WITH_AES_128_CCM = 0xC0A4; + public const int TLS_PSK_WITH_AES_256_CCM = 0xC0A5; + public const int TLS_DHE_PSK_WITH_AES_128_CCM = 0xC0A6; + public const int TLS_DHE_PSK_WITH_AES_256_CCM = 0xC0A7; + public const int TLS_PSK_WITH_AES_128_CCM_8 = 0xC0A8; + public const int TLS_PSK_WITH_AES_256_CCM_8 = 0xC0A9; + public const int TLS_PSK_DHE_WITH_AES_128_CCM_8 = 0xC0AA; + public const int TLS_PSK_DHE_WITH_AES_256_CCM_8 = 0xC0AB; + + /* + * RFC 7251 + */ + public const int TLS_ECDHE_ECDSA_WITH_AES_128_CCM = 0xC0AC; + public const int TLS_ECDHE_ECDSA_WITH_AES_256_CCM = 0xC0AD; + public const int TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 = 0xC0AE; + public const int TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 = 0xC0AF; + + /* + * RFC 7507 + */ + public const int TLS_FALLBACK_SCSV = 0x5600; + + /* + * RFC 7905 + */ + public const int TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCA8; + public const int TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCA9; + public const int TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAA; + public const int TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAB; + public const int TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAC; + public const int TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAD; + public const int TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAE; + + /* + * RFC 8442 + */ + public const int TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256 = 0xD001; + public const int TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384 = 0xD002; + public const int TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256 = 0xD003; + public const int TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256 = 0xD005; + + /* + * TLS 1.3 Section + * + * Although TLS 1.3 uses the same cipher suite space as previous versions of TLS, TLS 1.3 cipher + * suites are defined differently, only specifying the symmetric ciphers, and cannot be used for + * TLS 1.2. Similarly, cipher suites for TLS 1.2 and lower cannot be used with TLS 1.3. + */ + + /* + * RFC 8446 + */ + public const int TLS_AES_128_GCM_SHA256 = 0x1301; + public const int TLS_AES_256_GCM_SHA384 = 0x1302; + public const int TLS_CHACHA20_POLY1305_SHA256 = 0x1303; + public const int TLS_AES_128_CCM_SHA256 = 0x1304; + public const int TLS_AES_128_CCM_8_SHA256 = 0x1305; + + /* + * RFC 8998 + */ + public const int TLS_SM4_GCM_SM3 = 0x00C6; + public const int TLS_SM4_CCM_SM3 = 0x00C7; + + /* + * draft-smyshlyaev-tls12-gost-suites-10 + */ + public const int TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC = 0xC100; + public const int TLS_GOSTR341112_256_WITH_MAGMA_CTR_OMAC = 0xC101; + public const int TLS_GOSTR341112_256_WITH_28147_CNT_IMIT = 0xC102; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs.meta new file mode 100644 index 00000000..2961f36a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4479541e02ecf6345b86c141376819af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherSuite.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs new file mode 100644 index 00000000..cb956f75 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class CipherType + { + public const int stream = 0; + public const int block = 1; + + /* + * RFC 5246 + */ + public const int aead = 2; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs.meta new file mode 100644 index 00000000..4a9fce63 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c4e26ca847acd7f47913d0babf6b89a1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CipherType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs new file mode 100644 index 00000000..a664d6ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class ClientAuthenticationType + { + /* + * RFC 5077 4 + */ + public const short anonymous = 0; + public const short certificate_based = 1; + public const short psk = 2; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs.meta new file mode 100644 index 00000000..22069bdd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 258b149e90ce21a4aa05254db388ec90 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientAuthenticationType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs new file mode 100644 index 00000000..15419673 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class ClientCertificateType + { + /* + * RFC 4346 7.4.4 + */ + public const short rsa_sign = 1; + public const short dss_sign = 2; + public const short rsa_fixed_dh = 3; + public const short dss_fixed_dh = 4; + public const short rsa_ephemeral_dh_RESERVED = 5; + public const short dss_ephemeral_dh_RESERVED = 6; + public const short fortezza_dms_RESERVED = 20; + + /* + * RFC 4492 5.5 + */ + public const short ecdsa_sign = 64; + public const short rsa_fixed_ecdh = 65; + public const short ecdsa_fixed_ecdh = 66; + + /* + * draft-smyshlyaev-tls12-gost-suites-10 + */ + public const short gost_sign256 = 67; + public const short gost_sign512 = 68; + + public static string GetName(short clientCertificateType) + { + switch (clientCertificateType) + { + case rsa_sign: + return "rsa_sign"; + case dss_sign: + return "dss_sign"; + case rsa_fixed_dh: + return "rsa_fixed_dh"; + case dss_fixed_dh: + return "dss_fixed_dh"; + case rsa_ephemeral_dh_RESERVED: + return "rsa_ephemeral_dh_RESERVED"; + case dss_ephemeral_dh_RESERVED: + return "dss_ephemeral_dh_RESERVED"; + case fortezza_dms_RESERVED: + return "fortezza_dms_RESERVED"; + case ecdsa_sign: + return "ecdsa_sign"; + case rsa_fixed_ecdh: + return "rsa_fixed_ecdh"; + case ecdsa_fixed_ecdh: + return "ecdsa_fixed_ecdh"; + case gost_sign256: + return "gost_sign256"; + case gost_sign512: + return "gost_sign512"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short clientCertificateType) + { + return GetName(clientCertificateType) + "(" + clientCertificateType + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs.meta new file mode 100644 index 00000000..81b04d8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db04be92db464b247a675d5328508058 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientCertificateType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs new file mode 100644 index 00000000..75875829 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs @@ -0,0 +1,181 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ClientHello + { + private readonly ProtocolVersion m_version; + private readonly byte[] m_random; + private readonly byte[] m_sessionID; + private readonly byte[] m_cookie; + private readonly int[] m_cipherSuites; + private readonly IDictionary m_extensions; + private readonly int m_bindersSize; + + public ClientHello(ProtocolVersion version, byte[] random, byte[] sessionID, byte[] cookie, + int[] cipherSuites, IDictionary extensions, int bindersSize) + { + this.m_version = version; + this.m_random = random; + this.m_sessionID = sessionID; + this.m_cookie = cookie; + this.m_cipherSuites = cipherSuites; + this.m_extensions = extensions; + this.m_bindersSize = bindersSize; + } + + public int BindersSize + { + get { return m_bindersSize; } + } + + public int[] CipherSuites + { + get { return m_cipherSuites; } + } + + public byte[] Cookie + { + get { return m_cookie; } + } + + public IDictionary Extensions + { + get { return m_extensions; } + } + + public byte[] Random + { + get { return m_random; } + } + + public byte[] SessionID + { + get { return m_sessionID; } + } + + public ProtocolVersion Version + { + get { return m_version; } + } + + /// Encode this to a . + /// the of the current connection. + /// the to encode to. + /// + public void Encode(TlsContext context, Stream output) + { + if (m_bindersSize < 0) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsUtilities.WriteVersion(m_version, output); + + output.Write(m_random, 0, m_random.Length); + + TlsUtilities.WriteOpaque8(m_sessionID, output); + + if (null != m_cookie) + { + TlsUtilities.WriteOpaque8(m_cookie, output); + } + + TlsUtilities.WriteUint16ArrayWithUint16Length(m_cipherSuites, output); + + TlsUtilities.WriteUint8ArrayWithUint8Length(new short[]{ CompressionMethod.cls_null }, output); + + TlsProtocol.WriteExtensions(output, m_extensions, m_bindersSize); + } + + /// Parse a from a . + /// the to parse from. + /// for DTLS this should be non-null; the input is copied to this + /// , minus the cookie field. + /// a object. + /// + public static ClientHello Parse(MemoryStream messageInput, Stream dtlsOutput) + { + try + { + return ImplParse(messageInput, dtlsOutput); + } + catch (TlsFatalAlert e) + { + throw e; + } + catch (IOException e) + { + throw new TlsFatalAlert(AlertDescription.decode_error, e); + } + } + + /// + private static ClientHello ImplParse(MemoryStream messageInput, Stream dtlsOutput) + { + Stream input = messageInput; + if (null != dtlsOutput) + { + input = new TeeInputStream(input, dtlsOutput); + } + + ProtocolVersion clientVersion = TlsUtilities.ReadVersion(input); + + byte[] random = TlsUtilities.ReadFully(32, input); + + byte[] sessionID = TlsUtilities.ReadOpaque8(input, 0, 32); + + byte[] cookie = null; + if (null != dtlsOutput) + { + /* + * RFC 6347 This specification increases the cookie size limit to 255 bytes for greater + * future flexibility. The limit remains 32 for previous versions of DTLS. + */ + int maxCookieLength = ProtocolVersion.DTLSv12.IsEqualOrEarlierVersionOf(clientVersion) ? 255 : 32; + + cookie = TlsUtilities.ReadOpaque8(messageInput, 0, maxCookieLength); + } + + int cipher_suites_length = TlsUtilities.ReadUint16(input); + if (cipher_suites_length < 2 || (cipher_suites_length & 1) != 0 + || Convert.ToInt32(messageInput.Length - messageInput.Position) < cipher_suites_length) + { + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + /* + * NOTE: "If the session_id field is not empty (implying a session resumption request) this + * vector must include at least the cipher_suite from that session." + */ + int[] cipherSuites = TlsUtilities.ReadUint16Array(cipher_suites_length / 2, input); + + short[] compressionMethods = TlsUtilities.ReadUint8ArrayWithUint8Length(input, 1); + if (!Arrays.Contains(compressionMethods, CompressionMethod.cls_null)) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + /* + * NOTE: Can't use TlsProtocol.ReadExtensions directly because TeeInputStream a) won't have + * 'Length' or 'Position' properties in the FIPS provider, b) isn't a MemoryStream. + */ + IDictionary extensions = null; + if (messageInput.Position < messageInput.Length) + { + byte[] extBytes = TlsUtilities.ReadOpaque16(input); + + TlsProtocol.AssertEmpty(messageInput); + + extensions = TlsProtocol.ReadExtensionsDataClientHello(extBytes); + } + + return new ClientHello(clientVersion, random, sessionID, cookie, cipherSuites, extensions, -1); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs.meta new file mode 100644 index 00000000..aae4360e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 244ee135dc38238429d13dfdeef11c29 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ClientHello.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs new file mode 100644 index 00000000..b2f42071 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs @@ -0,0 +1,79 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// A combined hash, which implements md5(m) || sha1(m). + public class CombinedHash + : TlsHash + { + protected readonly TlsContext m_context; + protected readonly TlsCrypto m_crypto; + protected readonly TlsHash m_md5; + protected readonly TlsHash m_sha1; + + internal CombinedHash(TlsContext context, TlsHash md5, TlsHash sha1) + { + this.m_context = context; + this.m_crypto = context.Crypto; + this.m_md5 = md5; + this.m_sha1 = sha1; + } + + public CombinedHash(TlsCrypto crypto) + { + this.m_crypto = crypto; + this.m_md5 = crypto.CreateHash(CryptoHashAlgorithm.md5); + this.m_sha1 = crypto.CreateHash(CryptoHashAlgorithm.sha1); + } + + public CombinedHash(CombinedHash t) + { + this.m_context = t.m_context; + this.m_crypto = t.m_crypto; + this.m_md5 = t.m_md5.CloneHash(); + this.m_sha1 = t.m_sha1.CloneHash(); + } + + public virtual void Update(byte[] input, int inOff, int len) + { + m_md5.Update(input, inOff, len); + m_sha1.Update(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input) + { + m_md5.Update(input); + m_sha1.Update(input); + } +#endif + + public virtual byte[] CalculateHash() + { + if (null != m_context && TlsUtilities.IsSsl(m_context)) + { + Ssl3Utilities.CompleteCombinedHash(m_context, m_md5, m_sha1); + } + + return Arrays.Concatenate(m_md5.CalculateHash(), m_sha1.CalculateHash()); + } + + public virtual TlsHash CloneHash() + { + return new CombinedHash(this); + } + + public virtual void Reset() + { + m_md5.Reset(); + m_sha1.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs.meta new file mode 100644 index 00000000..65c1b4a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9ba41fe4062285e4a9fa6bf63e221b94 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CombinedHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs new file mode 100644 index 00000000..b337bc44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 6.1 + public abstract class CompressionMethod + { + public const short cls_null = 0; + + /* + * RFC 3749 2 + */ + public const short DEFLATE = 1; + + /* + * Values from 224 decimal (0xE0) through 255 decimal (0xFF) + * inclusive are reserved for private use. + */ + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs.meta new file mode 100644 index 00000000..a42d23cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d41a12d191bc924d917a0a62f8ad424 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/CompressionMethod.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs new file mode 100644 index 00000000..e6c86077 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values(e.g.serialization). + /// + public abstract class ConnectionEnd + { + public const int server = 0; + public const int client = 1; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs.meta new file mode 100644 index 00000000..66ca7091 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: adc38f97978faf9478af713d75daeb3e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ConnectionEnd.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs new file mode 100644 index 00000000..28a2f0eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 6.2.1 + public abstract class ContentType + { + public const short change_cipher_spec = 20; + public const short alert = 21; + public const short handshake = 22; + public const short application_data = 23; + public const short heartbeat = 24; + + public static string GetName(short contentType) + { + switch (contentType) + { + case alert: + return "alert"; + case application_data: + return "application_data"; + case change_cipher_spec: + return "change_cipher_spec"; + case handshake: + return "handshake"; + case heartbeat: + return "heartbeat"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short contentType) + { + return GetName(contentType) + "(" + contentType + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs.meta new file mode 100644 index 00000000..a6bfa68d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 613767d489596084ebd0ae2d7fdf1649 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ContentType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs new file mode 100644 index 00000000..afb8c7fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface DatagramReceiver + { + /// + int GetReceiveLimit(); + + /// + int Receive(byte[] buf, int off, int len, int waitMillis); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + int Receive(Span buffer, int waitMillis); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs.meta new file mode 100644 index 00000000..5221b382 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 02648160b6efb1f489b2598c57cea5ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramReceiver.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs new file mode 100644 index 00000000..1dc15cb0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface DatagramSender + { + /// + int GetSendLimit(); + + /// + void Send(byte[] buf, int off, int len); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + void Send(ReadOnlySpan buffer); +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs.meta new file mode 100644 index 00000000..66664969 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2146afac0062f204fabcdf46cd12c4aa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramSender.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs new file mode 100644 index 00000000..74e5ada4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for an object sending and receiving DTLS data. + public interface DatagramTransport + : DatagramReceiver, DatagramSender, TlsCloseable + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs.meta new file mode 100644 index 00000000..bf9fc411 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c199c833bca8f3e499041f9cf6143d7d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DatagramTransport.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs new file mode 100644 index 00000000..9b158100 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs @@ -0,0 +1,52 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class DefaultTlsClient + : AbstractTlsClient + { + private static readonly int[] DefaultCipherSuites = new int[] + { + /* + * TLS 1.3 + */ + CipherSuite.TLS_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_AES_128_GCM_SHA256, + + /* + * pre-TLS 1.3 + */ + CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA, + }; + + public DefaultTlsClient(TlsCrypto crypto) + : base(crypto) + { + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs.meta new file mode 100644 index 00000000..c3149bea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d77b1b0cf91f7342b4da3f577e0ca65 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsClient.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs new file mode 100644 index 00000000..ccfeb097 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Container class for generating signatures that carries the signature type, parameters, public key + /// certificate and public key's associated signer object. + public class DefaultTlsCredentialedSigner + : TlsCredentialedSigner + { + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly Certificate m_certificate; + protected readonly SignatureAndHashAlgorithm m_signatureAndHashAlgorithm; + protected readonly TlsSigner m_signer; + + public DefaultTlsCredentialedSigner(TlsCryptoParameters cryptoParams, TlsSigner signer, + Certificate certificate, SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + if (certificate == null) + throw new ArgumentNullException("certificate"); + if (certificate.IsEmpty) + throw new ArgumentException("cannot be empty", "certificate"); + if (signer == null) + throw new ArgumentNullException("signer"); + + this.m_cryptoParams = cryptoParams; + this.m_certificate = certificate; + this.m_signatureAndHashAlgorithm = signatureAndHashAlgorithm; + this.m_signer = signer; + } + + public virtual Certificate Certificate + { + get { return m_certificate; } + } + + public virtual byte[] GenerateRawSignature(byte[] hash) + { + return m_signer.GenerateRawSignature(GetEffectiveAlgorithm(), hash); + } + + public virtual SignatureAndHashAlgorithm SignatureAndHashAlgorithm + { + get { return m_signatureAndHashAlgorithm; } + } + + public virtual TlsStreamSigner GetStreamSigner() + { + return m_signer.GetStreamSigner(GetEffectiveAlgorithm()); + } + + protected virtual SignatureAndHashAlgorithm GetEffectiveAlgorithm() + { + SignatureAndHashAlgorithm algorithm = null; + if (TlsImplUtilities.IsTlsV12(m_cryptoParams)) + { + algorithm = SignatureAndHashAlgorithm; + if (algorithm == null) + throw new InvalidOperationException("'signatureAndHashAlgorithm' cannot be null for (D)TLS 1.2+"); + } + return algorithm; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs.meta new file mode 100644 index 00000000..b80a17ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74725a528d4ecd44da3483c5132b0a9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsCredentialedSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs new file mode 100644 index 00000000..5680f150 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DefaultTlsDHGroupVerifier + : TlsDHGroupVerifier + { + public static readonly int DefaultMinimumPrimeBits = 2048; + + private static readonly List DefaultGroups = new List(); + + private static void AddDefaultGroup(DHGroup dhGroup) + { + DefaultGroups.Add(dhGroup); + } + + static DefaultTlsDHGroupVerifier() + { + /* + * These 10 standard groups are those specified in NIST SP 800-56A Rev. 3 Appendix D. Make + * sure to consider the impact on BCJSSE's FIPS mode and/or usage with the BCFIPS provider + * before modifying this list. + */ + + AddDefaultGroup(DHStandardGroups.rfc3526_2048); + AddDefaultGroup(DHStandardGroups.rfc3526_3072); + AddDefaultGroup(DHStandardGroups.rfc3526_4096); + AddDefaultGroup(DHStandardGroups.rfc3526_6144); + AddDefaultGroup(DHStandardGroups.rfc3526_8192); + + AddDefaultGroup(DHStandardGroups.rfc7919_ffdhe2048); + AddDefaultGroup(DHStandardGroups.rfc7919_ffdhe3072); + AddDefaultGroup(DHStandardGroups.rfc7919_ffdhe4096); + AddDefaultGroup(DHStandardGroups.rfc7919_ffdhe6144); + AddDefaultGroup(DHStandardGroups.rfc7919_ffdhe8192); + } + + // IList is (DHGroup) + protected readonly IList m_groups; + protected readonly int m_minimumPrimeBits; + + /// Accept named groups and various standard DH groups with 'P' at least + /// bits. + public DefaultTlsDHGroupVerifier() + : this(DefaultMinimumPrimeBits) + { + } + + /// Accept named groups and various standard DH groups with 'P' at least the specified number of bits. + /// + /// the minimum bitlength of 'P'. + public DefaultTlsDHGroupVerifier(int minimumPrimeBits) + : this(DefaultGroups, minimumPrimeBits) + { + } + + /// Accept named groups and a custom set of group parameters, subject to a minimum bitlength for 'P'. + /// + /// a list of acceptable s. + /// the minimum bitlength of 'P'. + public DefaultTlsDHGroupVerifier(IList groups, int minimumPrimeBits) + { + this.m_groups = new List(groups); + this.m_minimumPrimeBits = minimumPrimeBits; + } + + public virtual bool Accept(DHGroup dhGroup) + { + return CheckMinimumPrimeBits(dhGroup) && CheckGroup(dhGroup); + } + + public virtual int MinimumPrimeBits + { + get { return m_minimumPrimeBits; } + } + + protected virtual bool AreGroupsEqual(DHGroup a, DHGroup b) + { + return a == b || (AreParametersEqual(a.P, b.P) && AreParametersEqual(a.G, b.G)); + } + + protected virtual bool AreParametersEqual(BigInteger a, BigInteger b) + { + return a == b || a.Equals(b); + } + + protected virtual bool CheckGroup(DHGroup dhGroup) + { + foreach (DHGroup group in m_groups) + { + if (AreGroupsEqual(dhGroup, group)) + return true; + } + return false; + } + + protected virtual bool CheckMinimumPrimeBits(DHGroup dhGroup) + { + return dhGroup.P.BitLength >= MinimumPrimeBits; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs.meta new file mode 100644 index 00000000..797aff58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d50aa3069dbb43745b61cbea30807c18 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsDHGroupVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs new file mode 100644 index 00000000..ad14bd6e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DefaultTlsHeartbeat + : TlsHeartbeat + { + private readonly int idleMillis, timeoutMillis; + + private uint counter = 0U; + + public DefaultTlsHeartbeat(int idleMillis, int timeoutMillis) + { + if (idleMillis <= 0) + throw new ArgumentException("must be > 0", "idleMillis"); + if (timeoutMillis <= 0) + throw new ArgumentException("must be > 0", "timeoutMillis"); + + this.idleMillis = idleMillis; + this.timeoutMillis = timeoutMillis; + } + + public virtual byte[] GeneratePayload() + { + lock (this) + { + // NOTE: The counter naturally wraps back to 0 + return Pack.UInt32_To_BE(++counter); + } + } + + public virtual int IdleMillis + { + get { return idleMillis; } + } + + public virtual int TimeoutMillis + { + get { return timeoutMillis; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs.meta new file mode 100644 index 00000000..4358a60f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2779100c40ef8414982ccd7386e0542e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsHeartbeat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs new file mode 100644 index 00000000..7e34dc99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DefaultTlsKeyExchangeFactory + : AbstractTlsKeyExchangeFactory + { + public override TlsKeyExchange CreateDHKeyExchange(int keyExchange) + { + return new TlsDHKeyExchange(keyExchange); + } + + public override TlsKeyExchange CreateDHanonKeyExchangeClient(int keyExchange, + TlsDHGroupVerifier dhGroupVerifier) + { + return new TlsDHanonKeyExchange(keyExchange, dhGroupVerifier); + } + + public override TlsKeyExchange CreateDHanonKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig) + { + return new TlsDHanonKeyExchange(keyExchange, dhConfig); + } + + public override TlsKeyExchange CreateDheKeyExchangeClient(int keyExchange, TlsDHGroupVerifier dhGroupVerifier) + { + return new TlsDheKeyExchange(keyExchange, dhGroupVerifier); + } + + public override TlsKeyExchange CreateDheKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig) + { + return new TlsDheKeyExchange(keyExchange, dhConfig); + } + + public override TlsKeyExchange CreateECDHKeyExchange(int keyExchange) + { + return new TlsECDHKeyExchange(keyExchange); + } + + public override TlsKeyExchange CreateECDHanonKeyExchangeClient(int keyExchange) + { + return new TlsECDHanonKeyExchange(keyExchange); + } + + public override TlsKeyExchange CreateECDHanonKeyExchangeServer(int keyExchange, TlsECConfig ecConfig) + { + return new TlsECDHanonKeyExchange(keyExchange, ecConfig); + } + + public override TlsKeyExchange CreateECDheKeyExchangeClient(int keyExchange) + { + return new TlsECDheKeyExchange(keyExchange); + } + + public override TlsKeyExchange CreateECDheKeyExchangeServer(int keyExchange, TlsECConfig ecConfig) + { + return new TlsECDheKeyExchange(keyExchange, ecConfig); + } + + public override TlsKeyExchange CreatePskKeyExchangeClient(int keyExchange, TlsPskIdentity pskIdentity, + TlsDHGroupVerifier dhGroupVerifier) + { + return new TlsPskKeyExchange(keyExchange, pskIdentity, dhGroupVerifier); + } + + public override TlsKeyExchange CreatePskKeyExchangeServer(int keyExchange, + TlsPskIdentityManager pskIdentityManager, TlsDHConfig dhConfig, TlsECConfig ecConfig) + { + return new TlsPskKeyExchange(keyExchange, pskIdentityManager, dhConfig, ecConfig); + } + + public override TlsKeyExchange CreateRsaKeyExchange(int keyExchange) + { + return new TlsRsaKeyExchange(keyExchange); + } + + public override TlsKeyExchange CreateSrpKeyExchangeClient(int keyExchange, TlsSrpIdentity srpIdentity, + TlsSrpConfigVerifier srpConfigVerifier) + { + return new TlsSrpKeyExchange(keyExchange, srpIdentity, srpConfigVerifier); + } + + public override TlsKeyExchange CreateSrpKeyExchangeServer(int keyExchange, TlsSrpLoginParameters loginParameters) + { + return new TlsSrpKeyExchange(keyExchange, loginParameters); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs.meta new file mode 100644 index 00000000..1e648e4e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a9b472b6f389d84bb5a36e681f46b10 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsKeyExchangeFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs new file mode 100644 index 00000000..ab171869 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class DefaultTlsServer + : AbstractTlsServer + { + private static readonly int[] DefaultCipherSuites = new int[] + { + /* + * TLS 1.3 + */ + CipherSuite.TLS_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_AES_256_GCM_SHA384, + CipherSuite.TLS_AES_128_GCM_SHA256, + + /* + * pre-TLS 1.3 + */ + CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384, + CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA, + }; + + public DefaultTlsServer(TlsCrypto crypto) + : base(crypto) + { + } + + /// + protected virtual TlsCredentialedSigner GetDsaSignerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /// + protected virtual TlsCredentialedSigner GetECDsaSignerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /// + protected virtual TlsCredentialedDecryptor GetRsaEncryptionCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /// + protected virtual TlsCredentialedSigner GetRsaSignerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + public override TlsCredentials GetCredentials() + { + int keyExchangeAlgorithm = m_context.SecurityParameters.KeyExchangeAlgorithm; + + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DHE_DSS: + return GetDsaSignerCredentials(); + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + return GetECDsaSignerCredentials(); + + case KeyExchangeAlgorithm.DHE_RSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + return GetRsaSignerCredentials(); + + case KeyExchangeAlgorithm.RSA: + return GetRsaEncryptionCredentials(); + + default: + // Note: internal error here; selected a key exchange we don't implement! + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs.meta new file mode 100644 index 00000000..3529624d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 430b3a4ea2894994881ff08ec0ef6ca7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsServer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs new file mode 100644 index 00000000..0c860366 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DefaultTlsSrpConfigVerifier + : TlsSrpConfigVerifier + { + private static readonly List DefaultGroups = new List(); + + static DefaultTlsSrpConfigVerifier() + { + DefaultGroups.Add(Srp6StandardGroups.rfc5054_1024); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_1536); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_2048); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_3072); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_4096); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_6144); + DefaultGroups.Add(Srp6StandardGroups.rfc5054_8192); + } + + // IList is (SRP6Group) + protected readonly IList m_groups; + + /// Accept only the group parameters specified in RFC 5054 Appendix A. + public DefaultTlsSrpConfigVerifier() + : this(DefaultGroups) + { + } + + /// Specify a custom set of acceptable group parameters. + /// an of acceptable . + public DefaultTlsSrpConfigVerifier(IList groups) + { + this.m_groups = new List(groups); + } + + public virtual bool Accept(TlsSrpConfig srpConfig) + { + foreach (Srp6Group group in m_groups) + { + if (AreGroupsEqual(srpConfig, group)) + return true; + } + return false; + } + + protected virtual bool AreGroupsEqual(TlsSrpConfig a, Srp6Group b) + { + BigInteger[] ng = a.GetExplicitNG(); + return AreParametersEqual(ng[0], b.N) && AreParametersEqual(ng[1], b.G); + } + + protected virtual bool AreParametersEqual(BigInteger a, BigInteger b) + { + return a == b || a.Equals(b); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs.meta new file mode 100644 index 00000000..428fd73b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b98d9c07f4bd6ba489fdd62552086a86 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DefaultTlsSrpConfigVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs new file mode 100644 index 00000000..42f814b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs @@ -0,0 +1,260 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Buffers input until the hash algorithm is determined. + internal sealed class DeferredHash + : TlsHandshakeHash + { + private const int BufferingHashLimit = 4; + + private readonly TlsContext m_context; + + private DigestInputBuffer m_buf; + private IDictionary m_hashes; + private bool m_forceBuffering; + private bool m_sealed; + + internal DeferredHash(TlsContext context) + { + this.m_context = context; + this.m_buf = new DigestInputBuffer(); + this.m_hashes = new Dictionary(); + this.m_forceBuffering = false; + this.m_sealed = false; + } + + /// + public void CopyBufferTo(Stream output) + { + if (m_buf == null) + { + // If you see this, you need to call ForceBuffering() before SealHashAlgorithms() + throw new InvalidOperationException("Not buffering"); + } + + m_buf.CopyInputTo(output); + } + + public void ForceBuffering() + { + if (m_sealed) + throw new InvalidOperationException("Too late to force buffering"); + + this.m_forceBuffering = true; + } + + public void NotifyPrfDetermined() + { + SecurityParameters securityParameters = m_context.SecurityParameters; + + switch (securityParameters.PrfAlgorithm) + { + case PrfAlgorithm.ssl_prf_legacy: + case PrfAlgorithm.tls_prf_legacy: + { + CheckTrackingHash(CryptoHashAlgorithm.md5); + CheckTrackingHash(CryptoHashAlgorithm.sha1); + break; + } + default: + { + CheckTrackingHash(securityParameters.PrfCryptoHashAlgorithm); + break; + } + } + } + + public void TrackHashAlgorithm(int cryptoHashAlgorithm) + { + if (m_sealed) + throw new InvalidOperationException("Too late to track more hash algorithms"); + + CheckTrackingHash(cryptoHashAlgorithm); + } + + public void SealHashAlgorithms() + { + if (m_sealed) + throw new InvalidOperationException("Already sealed"); + + this.m_sealed = true; + CheckStopBuffering(); + } + + public void StopTracking() + { + SecurityParameters securityParameters = m_context.SecurityParameters; + + IDictionary newHashes = new Dictionary(); + switch (securityParameters.PrfAlgorithm) + { + case PrfAlgorithm.ssl_prf_legacy: + case PrfAlgorithm.tls_prf_legacy: + { + CloneHash(newHashes, CryptoHashAlgorithm.md5); + CloneHash(newHashes, CryptoHashAlgorithm.sha1); + break; + } + default: + { + CloneHash(newHashes, securityParameters.PrfCryptoHashAlgorithm); + break; + } + } + + this.m_buf = null; + this.m_hashes = newHashes; + this.m_forceBuffering = false; + this.m_sealed = true; + } + + public TlsHash ForkPrfHash() + { + CheckStopBuffering(); + + SecurityParameters securityParameters = m_context.SecurityParameters; + + TlsHash prfHash; + switch (securityParameters.PrfAlgorithm) + { + case PrfAlgorithm.ssl_prf_legacy: + case PrfAlgorithm.tls_prf_legacy: + { + TlsHash md5Hash = CloneHash(CryptoHashAlgorithm.md5); + TlsHash sha1Hash = CloneHash(CryptoHashAlgorithm.sha1); + prfHash = new CombinedHash(m_context, md5Hash, sha1Hash); + break; + } + default: + { + prfHash = CloneHash(securityParameters.PrfCryptoHashAlgorithm); + break; + } + } + + if (m_buf != null) + { + m_buf.UpdateDigest(prfHash); + } + + return prfHash; + } + + public byte[] GetFinalHash(int cryptoHashAlgorithm) + { + if (!m_hashes.TryGetValue(cryptoHashAlgorithm, out var hash)) + throw new InvalidOperationException("CryptoHashAlgorithm." + cryptoHashAlgorithm + + " is not being tracked"); + + CheckStopBuffering(); + + hash = hash.CloneHash(); + if (m_buf != null) + { + m_buf.UpdateDigest(hash); + } + + return hash.CalculateHash(); + } + + public void Update(byte[] input, int inOff, int len) + { + if (m_buf != null) + { + m_buf.Write(input, inOff, len); + return; + } + + foreach (TlsHash hash in m_hashes.Values) + { + hash.Update(input, inOff, len); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input) + { + if (m_buf != null) + { + m_buf.Write(input); + return; + } + + foreach (TlsHash hash in m_hashes.Values) + { + hash.Update(input); + } + } +#endif + + public byte[] CalculateHash() + { + throw new InvalidOperationException("Use 'ForkPrfHash' to get a definite hash"); + } + + public TlsHash CloneHash() + { + throw new InvalidOperationException("attempt to clone a DeferredHash"); + } + + public void Reset() + { + if (m_buf != null) + { + m_buf.SetLength(0); + return; + } + + foreach (TlsHash hash in m_hashes.Values) + { + hash.Reset(); + } + } + + private void CheckStopBuffering() + { + if (!m_forceBuffering && m_sealed && m_buf != null && m_hashes.Count <= BufferingHashLimit) + { + foreach (TlsHash hash in m_hashes.Values) + { + m_buf.UpdateDigest(hash); + } + + this.m_buf = null; + } + } + + private void CheckTrackingHash(int cryptoHashAlgorithm) + { + if (!m_hashes.ContainsKey(cryptoHashAlgorithm)) + { + TlsHash hash = m_context.Crypto.CreateHash(cryptoHashAlgorithm); + m_hashes[cryptoHashAlgorithm] = hash; + } + } + + private TlsHash CloneHash(int cryptoHashAlgorithm) + { + return m_hashes[cryptoHashAlgorithm].CloneHash(); + } + + private void CloneHash(IDictionary newHashes, int cryptoHashAlgorithm) + { + TlsHash hash = CloneHash(cryptoHashAlgorithm); + if (m_buf != null) + { + m_buf.UpdateDigest(hash); + } + newHashes[cryptoHashAlgorithm] = hash; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs.meta new file mode 100644 index 00000000..9f31ce08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 462771a14f9d4344c8f5b4c4d22ac02b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DeferredHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs new file mode 100644 index 00000000..faebf79f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class DigestInputBuffer + : MemoryStream + { + internal void UpdateDigest(TlsHash hash) + { + WriteTo(new TlsHashSink(hash)); + } + + /// + internal void CopyInputTo(Stream output) + { + // TODO[tls] Consider defensive copy if 'output' might be external code + WriteTo(output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs.meta new file mode 100644 index 00000000..21fec0a5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ee6097b25a803e14d9d3eaa1d32b5713 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigestInputBuffer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs new file mode 100644 index 00000000..955fc398 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class DigitallySigned + { + private readonly SignatureAndHashAlgorithm m_algorithm; + private readonly byte[] m_signature; + + public DigitallySigned(SignatureAndHashAlgorithm algorithm, byte[] signature) + { + if (signature == null) + throw new ArgumentNullException("signature"); + + this.m_algorithm = algorithm; + this.m_signature = signature; + } + + /// a (or null before TLS 1.2). + public SignatureAndHashAlgorithm Algorithm + { + get { return m_algorithm; } + } + + public byte[] Signature + { + get { return m_signature; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + if (m_algorithm != null) + { + m_algorithm.Encode(output); + } + TlsUtilities.WriteOpaque16(m_signature, output); + } + + /// Parse a from a . + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static DigitallySigned Parse(TlsContext context, Stream input) + { + SignatureAndHashAlgorithm algorithm = null; + if (TlsUtilities.IsTlsV12(context)) + { + algorithm = SignatureAndHashAlgorithm.Parse(input); + + if (SignatureAlgorithm.anonymous == algorithm.Signature) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + byte[] signature = TlsUtilities.ReadOpaque16(input); + return new DigitallySigned(algorithm, signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs.meta new file mode 100644 index 00000000..9b397f7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6f5316ab2ecd024ba06f7a922cad1be +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DigitallySigned.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs new file mode 100644 index 00000000..d375de8e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs @@ -0,0 +1,994 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DtlsClientProtocol + : DtlsProtocol + { + public DtlsClientProtocol() + : base() + { + } + + /// + public virtual DtlsTransport Connect(TlsClient client, DatagramTransport transport) + { + if (client == null) + throw new ArgumentNullException("client"); + if (transport == null) + throw new ArgumentNullException("transport"); + + ClientHandshakeState state = new ClientHandshakeState(); + state.client = client; + state.clientContext = new TlsClientContextImpl(client.Crypto); + + client.Init(state.clientContext); + state.clientContext.HandshakeBeginning(client); + + SecurityParameters securityParameters = state.clientContext.SecurityParameters; + securityParameters.m_extendedPadding = client.ShouldUseExtendedPadding(); + + TlsSession sessionToResume = state.client.GetSessionToResume(); + if (sessionToResume != null && sessionToResume.IsResumable) + { + SessionParameters sessionParameters = sessionToResume.ExportSessionParameters(); + + /* + * NOTE: If we ever enable session resumption without extended_master_secret, then + * renegotiation MUST be disabled (see RFC 7627 5.4). + */ + if (sessionParameters != null + && (sessionParameters.IsExtendedMasterSecret + || (!state.client.RequiresExtendedMasterSecret() && state.client.AllowLegacyResumption()))) + { + TlsSecret masterSecret = sessionParameters.MasterSecret; + lock (masterSecret) + { + if (masterSecret.IsAlive()) + { + state.tlsSession = sessionToResume; + state.sessionParameters = sessionParameters; + state.sessionMasterSecret = state.clientContext.Crypto.AdoptSecret(masterSecret); + } + } + } + } + + DtlsRecordLayer recordLayer = new DtlsRecordLayer(state.clientContext, state.client, transport); + client.NotifyCloseHandle(recordLayer); + + try + { + return ClientHandshake(state, recordLayer); + } + catch (TlsFatalAlert fatalAlert) + { + AbortClientHandshake(state, recordLayer, fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (IOException e) + { + AbortClientHandshake(state, recordLayer, AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + AbortClientHandshake(state, recordLayer, AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + finally + { + securityParameters.Clear(); + } + } + + internal virtual void AbortClientHandshake(ClientHandshakeState state, DtlsRecordLayer recordLayer, + short alertDescription) + { + recordLayer.Fail(alertDescription); + InvalidateSession(state); + } + + /// + internal virtual DtlsTransport ClientHandshake(ClientHandshakeState state, DtlsRecordLayer recordLayer) + { + SecurityParameters securityParameters = state.clientContext.SecurityParameters; + + DtlsReliableHandshake handshake = new DtlsReliableHandshake(state.clientContext, recordLayer, + state.client.GetHandshakeTimeoutMillis(), null); + + byte[] clientHelloBody = GenerateClientHello(state); + + recordLayer.SetWriteVersion(ProtocolVersion.DTLSv10); + + handshake.SendMessage(HandshakeType.client_hello, clientHelloBody); + + DtlsReliableHandshake.Message serverMessage = handshake.ReceiveMessage(); + + // TODO Consider stricter HelloVerifyRequest protocol + //if (serverMessage.Type == HandshakeType.hello_verify_request) + while (serverMessage.Type == HandshakeType.hello_verify_request) + { + byte[] cookie = ProcessHelloVerifyRequest(state, serverMessage.Body); + byte[] patched = PatchClientHelloWithCookie(clientHelloBody, cookie); + + handshake.ResetAfterHelloVerifyRequestClient(); + handshake.SendMessage(HandshakeType.client_hello, patched); + + serverMessage = handshake.ReceiveMessage(); + } + + if (serverMessage.Type == HandshakeType.server_hello) + { + ProtocolVersion recordLayerVersion = recordLayer.ReadVersion; + ReportServerVersion(state, recordLayerVersion); + recordLayer.SetWriteVersion(recordLayerVersion); + + ProcessServerHello(state, serverMessage.Body); + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + handshake.HandshakeHash.NotifyPrfDetermined(); + + ApplyMaxFragmentLengthExtension(recordLayer, securityParameters.MaxFragmentLength); + + if (state.resumedSession) + { + securityParameters.m_masterSecret = state.sessionMasterSecret; + recordLayer.InitPendingEpoch(TlsUtilities.InitCipher(state.clientContext)); + + // NOTE: Calculated exclusive of the actual Finished message from the server + securityParameters.m_peerVerifyData = TlsUtilities.CalculateVerifyData(state.clientContext, + handshake.HandshakeHash, true); + ProcessFinished(handshake.ReceiveMessageBody(HandshakeType.finished), + securityParameters.PeerVerifyData); + + // NOTE: Calculated exclusive of the Finished message itself + securityParameters.m_localVerifyData = TlsUtilities.CalculateVerifyData(state.clientContext, + handshake.HandshakeHash, false); + handshake.SendMessage(HandshakeType.finished, securityParameters.LocalVerifyData); + + handshake.Finish(); + + if (securityParameters.IsExtendedMasterSecret) + { + securityParameters.m_tlsUnique = securityParameters.PeerVerifyData; + } + + securityParameters.m_localCertificate = state.sessionParameters.LocalCertificate; + securityParameters.m_peerCertificate = state.sessionParameters.PeerCertificate; + securityParameters.m_pskIdentity = state.sessionParameters.PskIdentity; + securityParameters.m_srpIdentity = state.sessionParameters.SrpIdentity; + + state.clientContext.HandshakeComplete(state.client, state.tlsSession); + + recordLayer.InitHeartbeat(state.heartbeat, + HeartbeatMode.peer_allowed_to_send == state.heartbeatPolicy); + + return new DtlsTransport(recordLayer, state.client.IgnoreCorruptDtlsRecords); + } + + InvalidateSession(state); + state.tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, null); + + serverMessage = handshake.ReceiveMessage(); + + if (serverMessage.Type == HandshakeType.supplemental_data) + { + ProcessServerSupplementalData(state, serverMessage.Body); + serverMessage = handshake.ReceiveMessage(); + } + else + { + state.client.ProcessServerSupplementalData(null); + } + + state.keyExchange = TlsUtilities.InitKeyExchangeClient(state.clientContext, state.client); + + if (serverMessage.Type == HandshakeType.certificate) + { + ProcessServerCertificate(state, serverMessage.Body); + serverMessage = handshake.ReceiveMessage(); + } + else + { + // Okay, Certificate is optional + state.authentication = null; + } + + if (serverMessage.Type == HandshakeType.certificate_status) + { + if (securityParameters.StatusRequestVersion < 1) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + ProcessCertificateStatus(state, serverMessage.Body); + serverMessage = handshake.ReceiveMessage(); + } + else + { + // Okay, CertificateStatus is optional + } + + TlsUtilities.ProcessServerCertificate(state.clientContext, state.certificateStatus, state.keyExchange, + state.authentication, state.clientExtensions, state.serverExtensions); + + if (serverMessage.Type == HandshakeType.server_key_exchange) + { + ProcessServerKeyExchange(state, serverMessage.Body); + serverMessage = handshake.ReceiveMessage(); + } + else + { + // Okay, ServerKeyExchange is optional + state.keyExchange.SkipServerKeyExchange(); + } + + if (serverMessage.Type == HandshakeType.certificate_request) + { + ProcessCertificateRequest(state, serverMessage.Body); + + TlsUtilities.EstablishServerSigAlgs(securityParameters, state.certificateRequest); + + serverMessage = handshake.ReceiveMessage(); + } + else + { + // Okay, CertificateRequest is optional + } + + if (serverMessage.Type == HandshakeType.server_hello_done) + { + if (serverMessage.Body.Length != 0) + { + throw new TlsFatalAlert(AlertDescription.decode_error); + } + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + TlsCredentials clientAuthCredentials = null; + TlsCredentialedSigner clientAuthSigner = null; + Certificate clientAuthCertificate = null; + SignatureAndHashAlgorithm clientAuthAlgorithm = null; + TlsStreamSigner clientAuthStreamSigner = null; + + if (state.certificateRequest != null) + { + clientAuthCredentials = TlsUtilities.EstablishClientCredentials(state.authentication, + state.certificateRequest); + if (clientAuthCredentials != null) + { + clientAuthCertificate = clientAuthCredentials.Certificate; + + if (clientAuthCredentials is TlsCredentialedSigner) + { + clientAuthSigner = (TlsCredentialedSigner)clientAuthCredentials; + clientAuthAlgorithm = TlsUtilities.GetSignatureAndHashAlgorithm( + securityParameters.NegotiatedVersion, clientAuthSigner); + clientAuthStreamSigner = clientAuthSigner.GetStreamSigner(); + + if (ProtocolVersion.DTLSv12.Equals(securityParameters.NegotiatedVersion)) + { + TlsUtilities.VerifySupportedSignatureAlgorithm(securityParameters.ServerSigAlgs, + clientAuthAlgorithm, AlertDescription.internal_error); + + if (clientAuthStreamSigner == null) + { + TlsUtilities.TrackHashAlgorithmClient(handshake.HandshakeHash, clientAuthAlgorithm); + } + } + + if (clientAuthStreamSigner != null) + { + handshake.HandshakeHash.ForceBuffering(); + } + } + } + } + + handshake.HandshakeHash.SealHashAlgorithms(); + + if (clientAuthCredentials == null) + { + state.keyExchange.SkipClientCredentials(); + } + else + { + state.keyExchange.ProcessClientCredentials(clientAuthCredentials); + } + + var clientSupplementalData = state.client.GetClientSupplementalData(); + if (clientSupplementalData != null) + { + byte[] supplementalDataBody = GenerateSupplementalData(clientSupplementalData); + handshake.SendMessage(HandshakeType.supplemental_data, supplementalDataBody); + } + + if (null != state.certificateRequest) + { + SendCertificateMessage(state.clientContext, handshake, clientAuthCertificate, null); + } + + byte[] clientKeyExchangeBody = GenerateClientKeyExchange(state); + handshake.SendMessage(HandshakeType.client_key_exchange, clientKeyExchangeBody); + + securityParameters.m_sessionHash = TlsUtilities.GetCurrentPrfHash(handshake.HandshakeHash); + + TlsProtocol.EstablishMasterSecret(state.clientContext, state.keyExchange); + recordLayer.InitPendingEpoch(TlsUtilities.InitCipher(state.clientContext)); + + if (clientAuthSigner != null) + { + DigitallySigned certificateVerify = TlsUtilities.GenerateCertificateVerifyClient(state.clientContext, + clientAuthSigner, clientAuthAlgorithm, clientAuthStreamSigner, handshake.HandshakeHash); + byte[] certificateVerifyBody = GenerateCertificateVerify(state, certificateVerify); + handshake.SendMessage(HandshakeType.certificate_verify, certificateVerifyBody); + } + + handshake.PrepareToFinish(); + + securityParameters.m_localVerifyData = TlsUtilities.CalculateVerifyData(state.clientContext, + handshake.HandshakeHash, false); + handshake.SendMessage(HandshakeType.finished, securityParameters.LocalVerifyData); + + if (state.expectSessionTicket) + { + serverMessage = handshake.ReceiveMessage(); + if (serverMessage.Type == HandshakeType.new_session_ticket) + { + /* + * RFC 5077 3.4. If the client receives a session ticket from the server, then it + * discards any Session ID that was sent in the ServerHello. + */ + securityParameters.m_sessionID = TlsUtilities.EmptyBytes; + InvalidateSession(state); + state.tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, null); + + ProcessNewSessionTicket(state, serverMessage.Body); + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + // NOTE: Calculated exclusive of the actual Finished message from the server + securityParameters.m_peerVerifyData = TlsUtilities.CalculateVerifyData(state.clientContext, + handshake.HandshakeHash, true); + ProcessFinished(handshake.ReceiveMessageBody(HandshakeType.finished), securityParameters.PeerVerifyData); + + handshake.Finish(); + + state.sessionMasterSecret = securityParameters.MasterSecret; + + state.sessionParameters = new SessionParameters.Builder() + .SetCipherSuite(securityParameters.CipherSuite) + .SetExtendedMasterSecret(securityParameters.IsExtendedMasterSecret) + .SetLocalCertificate(securityParameters.LocalCertificate) + .SetMasterSecret(state.clientContext.Crypto.AdoptSecret(state.sessionMasterSecret)) + .SetNegotiatedVersion(securityParameters.NegotiatedVersion) + .SetPeerCertificate(securityParameters.PeerCertificate) + .SetPskIdentity(securityParameters.PskIdentity) + .SetSrpIdentity(securityParameters.SrpIdentity) + // TODO Consider filtering extensions that aren't relevant to resumed sessions + .SetServerExtensions(state.serverExtensions) + .Build(); + + state.tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, state.sessionParameters); + + securityParameters.m_tlsUnique = securityParameters.LocalVerifyData; + + state.clientContext.HandshakeComplete(state.client, state.tlsSession); + + recordLayer.InitHeartbeat(state.heartbeat, HeartbeatMode.peer_allowed_to_send == state.heartbeatPolicy); + + return new DtlsTransport(recordLayer, state.client.IgnoreCorruptDtlsRecords); + } + + /// + protected virtual byte[] GenerateCertificateVerify(ClientHandshakeState state, + DigitallySigned certificateVerify) + { + MemoryStream buf = new MemoryStream(); + certificateVerify.Encode(buf); + return buf.ToArray(); + } + + /// + protected virtual byte[] GenerateClientHello(ClientHandshakeState state) + { + TlsClientContextImpl context = state.clientContext; + SecurityParameters securityParameters = context.SecurityParameters; + + context.SetClientSupportedVersions(state.client.GetProtocolVersions()); + + ProtocolVersion client_version = ProtocolVersion.GetLatestDtls(context.ClientSupportedVersions); + if (!ProtocolVersion.IsSupportedDtlsVersionClient(client_version)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + context.SetClientVersion(client_version); + + { + bool useGmtUnixTime = ProtocolVersion.DTLSv12.IsEqualOrLaterVersionOf(client_version) + && state.client.ShouldUseGmtUnixTime(); + + securityParameters.m_clientRandom = TlsProtocol.CreateRandomBlock(useGmtUnixTime, state.clientContext); + } + + byte[] session_id = TlsUtilities.GetSessionID(state.tlsSession); + + bool fallback = state.client.IsFallback(); + + state.offeredCipherSuites = state.client.GetCipherSuites(); + + if (session_id.Length > 0 && state.sessionParameters != null) + { + if (!Arrays.Contains(state.offeredCipherSuites, state.sessionParameters.CipherSuite)) + { + session_id = TlsUtilities.EmptyBytes; + } + } + + state.clientExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised( + state.client.GetClientExtensions()); + + ProtocolVersion legacy_version = client_version; + if (client_version.IsLaterVersionOf(ProtocolVersion.DTLSv12)) + { + legacy_version = ProtocolVersion.DTLSv12; + + TlsExtensionsUtilities.AddSupportedVersionsExtensionClient(state.clientExtensions, + context.ClientSupportedVersions); + } + + context.SetRsaPreMasterSecretVersion(legacy_version); + + securityParameters.m_clientServerNames = TlsExtensionsUtilities.GetServerNameExtensionClient( + state.clientExtensions); + + if (TlsUtilities.IsSignatureAlgorithmsExtensionAllowed(client_version)) + { + TlsUtilities.EstablishClientSigAlgs(securityParameters, state.clientExtensions); + } + + securityParameters.m_clientSupportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension( + state.clientExtensions); + + state.clientAgreements = TlsUtilities.AddKeyShareToClientHello(state.clientContext, state.client, + state.clientExtensions); + + if (TlsUtilities.IsExtendedMasterSecretOptionalDtls(context.ClientSupportedVersions) + && state.client.ShouldUseExtendedMasterSecret()) + { + TlsExtensionsUtilities.AddExtendedMasterSecretExtension(state.clientExtensions); + } + else if (!TlsUtilities.IsTlsV13(client_version) + && state.client.RequiresExtendedMasterSecret()) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + // Cipher Suites (and SCSV) + { + /* + * RFC 5746 3.4. The client MUST include either an empty "renegotiation_info" extension, + * or the TLS_EMPTY_RENEGOTIATION_INFO_SCSV signaling cipher suite value in the + * ClientHello. Including both is NOT RECOMMENDED. + */ + bool noRenegExt = (null == TlsUtilities.GetExtensionData(state.clientExtensions, + ExtensionType.renegotiation_info)); + bool noRenegScsv = !Arrays.Contains(state.offeredCipherSuites, + CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV); + + if (noRenegExt && noRenegScsv) + { + state.offeredCipherSuites = Arrays.Append(state.offeredCipherSuites, + CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV); + } + } + + /* (Fallback SCSV) + * RFC 7507 4. If a client sends a ClientHello.client_version containing a lower value + * than the latest (highest-valued) version supported by the client, it SHOULD include + * the TLS_FALLBACK_SCSV cipher suite value in ClientHello.cipher_suites [..]. (The + * client SHOULD put TLS_FALLBACK_SCSV after all cipher suites that it actually intends + * to negotiate.) + */ + if (fallback && !Arrays.Contains(state.offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)) + { + state.offeredCipherSuites = Arrays.Append(state.offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV); + } + + // Heartbeats + { + state.heartbeat = state.client.GetHeartbeat(); + state.heartbeatPolicy = state.client.GetHeartbeatPolicy(); + + if (null != state.heartbeat || HeartbeatMode.peer_allowed_to_send == state.heartbeatPolicy) + { + TlsExtensionsUtilities.AddHeartbeatExtension(state.clientExtensions, + new HeartbeatExtension(state.heartbeatPolicy)); + } + } + + + + ClientHello clientHello = new ClientHello(legacy_version, securityParameters.ClientRandom, session_id, + TlsUtilities.EmptyBytes, state.offeredCipherSuites, state.clientExtensions, 0); + + MemoryStream buf = new MemoryStream(); + clientHello.Encode(state.clientContext, buf); + return buf.ToArray(); + } + + /// + protected virtual byte[] GenerateClientKeyExchange(ClientHandshakeState state) + { + MemoryStream buf = new MemoryStream(); + state.keyExchange.GenerateClientKeyExchange(buf); + return buf.ToArray(); + } + + protected virtual void InvalidateSession(ClientHandshakeState state) + { + if (state.sessionMasterSecret != null) + { + state.sessionMasterSecret.Destroy(); + state.sessionMasterSecret = null; + } + + if (state.sessionParameters != null) + { + state.sessionParameters.Clear(); + state.sessionParameters = null; + } + + if (state.tlsSession != null) + { + state.tlsSession.Invalidate(); + state.tlsSession = null; + } + } + + /// + protected virtual void ProcessCertificateRequest(ClientHandshakeState state, byte[] body) + { + if (null == state.authentication) + { + /* + * RFC 2246 7.4.4. It is a fatal handshake_failure alert for an anonymous server to + * request client identification. + */ + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + MemoryStream buf = new MemoryStream(body, false); + + CertificateRequest certificateRequest = CertificateRequest.Parse(state.clientContext, buf); + + TlsProtocol.AssertEmpty(buf); + + state.certificateRequest = TlsUtilities.ValidateCertificateRequest(certificateRequest, state.keyExchange); + + state.clientContext.SecurityParameters.m_clientCertificateType = + TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(state.serverExtensions, + CertificateType.X509); + } + + /// + protected virtual void ProcessCertificateStatus(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + + // TODO[tls13] Ensure this cannot happen for (D)TLS1.3+ + state.certificateStatus = CertificateStatus.Parse(state.clientContext, buf); + + TlsProtocol.AssertEmpty(buf); + } + + /// + protected virtual byte[] ProcessHelloVerifyRequest(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + + ProtocolVersion server_version = TlsUtilities.ReadVersion(buf); + + /* + * RFC 6347 This specification increases the cookie size limit to 255 bytes for greater + * future flexibility. The limit remains 32 for previous versions of DTLS. + */ + int maxCookieLength = ProtocolVersion.DTLSv12.IsEqualOrEarlierVersionOf(server_version) ? 255 : 32; + + byte[] cookie = TlsUtilities.ReadOpaque8(buf, 0, maxCookieLength); + + TlsProtocol.AssertEmpty(buf); + + // TODO Seems this behaviour is not yet in line with OpenSSL for DTLS 1.2 + //ReportServerVersion(state, server_version); + if (!server_version.IsEqualOrEarlierVersionOf(state.clientContext.ClientVersion)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return cookie; + } + + /// + protected virtual void ProcessNewSessionTicket(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + + NewSessionTicket newSessionTicket = NewSessionTicket.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + state.client.NotifyNewSessionTicket(newSessionTicket); + } + + /// + protected virtual void ProcessServerCertificate(ClientHandshakeState state, byte[] body) + { + state.authentication = TlsUtilities.ReceiveServerCertificate(state.clientContext, state.client, + new MemoryStream(body, false), state.serverExtensions); + } + + /// + protected virtual void ProcessServerHello(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + + ServerHello serverHello = ServerHello.Parse(buf); + ProtocolVersion server_version = serverHello.Version; + + state.serverExtensions = serverHello.Extensions; + + + + SecurityParameters securityParameters = state.clientContext.SecurityParameters; + + // TODO[dtls13] Check supported_version extension for negotiated version + + ReportServerVersion(state, server_version); + + securityParameters.m_serverRandom = serverHello.Random; + + if (!state.clientContext.ClientVersion.Equals(server_version)) + { + TlsUtilities.CheckDowngradeMarker(server_version, securityParameters.ServerRandom); + } + + { + byte[] selectedSessionID = serverHello.SessionID; + securityParameters.m_sessionID = selectedSessionID; + state.client.NotifySessionID(selectedSessionID); + state.resumedSession = selectedSessionID.Length > 0 && state.tlsSession != null + && Arrays.AreEqual(selectedSessionID, state.tlsSession.SessionID); + } + + /* + * Find out which CipherSuite the server has chosen and check that it was one of the offered + * ones, and is a valid selection for the negotiated version. + */ + { + int cipherSuite = ValidateSelectedCipherSuite(serverHello.CipherSuite, + AlertDescription.illegal_parameter); + + if (!TlsUtilities.IsValidCipherSuiteSelection(state.offeredCipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, securityParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + state.client.NotifySelectedCipherSuite(cipherSuite); + } + + /* + * RFC3546 2.2 The extended server hello message format MAY be sent in place of the server + * hello message when the client has requested extended functionality via the extended + * client hello message specified in Section 2.1. ... Note that the extended server hello + * message is only sent in response to an extended client hello message. This prevents the + * possibility that the extended server hello message could "break" existing TLS 1.0 + * clients. + */ + + /* + * TODO RFC 3546 2.3 If [...] the older session is resumed, then the server MUST ignore + * extensions appearing in the client hello, and send a server hello containing no + * extensions. + */ + + /* + * RFC 7627 4. Clients and servers SHOULD NOT accept handshakes that do not use the extended + * master secret [..]. (and see 5.2, 5.3) + * + * RFC 8446 Appendix D. Because TLS 1.3 always hashes in the transcript up to the server + * Finished, implementations which support both TLS 1.3 and earlier versions SHOULD indicate + * the use of the Extended Master Secret extension in their APIs whenever TLS 1.3 is used. + */ + if (TlsUtilities.IsTlsV13(server_version)) + { + securityParameters.m_extendedMasterSecret = true; + } + else + { + bool acceptedExtendedMasterSecret = TlsExtensionsUtilities.HasExtendedMasterSecretExtension( + state.serverExtensions); + + if (acceptedExtendedMasterSecret) + { + if (!state.resumedSession && !state.client.ShouldUseExtendedMasterSecret()) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + else + { + if (state.client.RequiresExtendedMasterSecret() + || (state.resumedSession && !state.client.AllowLegacyResumption())) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + + securityParameters.m_extendedMasterSecret = acceptedExtendedMasterSecret; + } + + /* + * + * RFC 3546 2.2 Note that the extended server hello message is only sent in response to an + * extended client hello message. However, see RFC 5746 exception below. We always include + * the SCSV, so an Extended Server Hello is always allowed. + */ + if (state.serverExtensions != null) + { + foreach (int extType in state.serverExtensions.Keys) + { + /* + * RFC 5746 3.6. Note that sending a "renegotiation_info" extension in response to a + * ClientHello containing only the SCSV is an explicit exception to the prohibition + * in RFC 5246, Section 7.4.1.4, on the server sending unsolicited extensions and is + * only allowed because the client is signaling its willingness to receive the + * extension via the TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. + */ + if (extType == ExtensionType.renegotiation_info) + continue; + + /* + * RFC 5246 7.4.1.4 An extension type MUST NOT appear in the ServerHello unless the + * same extension type appeared in the corresponding ClientHello. If a client + * receives an extension type in ServerHello that it did not request in the + * associated ClientHello, it MUST abort the handshake with an unsupported_extension + * fatal alert. + */ + if (null == TlsUtilities.GetExtensionData(state.clientExtensions, extType)) + throw new TlsFatalAlert(AlertDescription.unsupported_extension); + + /* + * RFC 3546 2.3. If [...] the older session is resumed, then the server MUST ignore + * extensions appearing in the client hello, and send a server hello containing no + * extensions[.] + */ + if (state.resumedSession) + { + // TODO[compat-gnutls] GnuTLS test server sends server extensions e.g. ec_point_formats + // TODO[compat-openssl] OpenSSL test server sends server extensions e.g. ec_point_formats + // TODO[compat-polarssl] PolarSSL test server sends server extensions e.g. ec_point_formats + //throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + } + + /* + * RFC 5746 3.4. Client Behavior: Initial Handshake + */ + { + /* + * When a ServerHello is received, the client MUST check if it includes the + * "renegotiation_info" extension: + */ + byte[] renegExtData = TlsUtilities.GetExtensionData(state.serverExtensions, + ExtensionType.renegotiation_info); + if (renegExtData != null) + { + /* + * If the extension is present, set the secure_renegotiation flag to TRUE. The + * client MUST then verify that the length of the "renegotiated_connection" + * field is zero, and if it is not, MUST abort the handshake (by sending a fatal + * handshake_failure alert). + */ + securityParameters.m_secureRenegotiation = true; + + if (!Arrays.ConstantTimeAreEqual(renegExtData, + TlsProtocol.CreateRenegotiationInfo(TlsUtilities.EmptyBytes))) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + } + + // TODO[compat-gnutls] GnuTLS test server fails to send renegotiation_info extension when resuming + state.client.NotifySecureRenegotiation(securityParameters.IsSecureRenegotiation); + + /* + * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous + * contents of this extension are irrelevant, and only the values in the new handshake + * messages are considered. + */ + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer( + state.serverExtensions); + securityParameters.m_applicationProtocolSet = true; + + // Heartbeats + { + HeartbeatExtension heartbeatExtension = TlsExtensionsUtilities.GetHeartbeatExtension( + state.serverExtensions); + if (null == heartbeatExtension) + { + state.heartbeat = null; + state.heartbeatPolicy = HeartbeatMode.peer_not_allowed_to_send; + } + else if (HeartbeatMode.peer_allowed_to_send != heartbeatExtension.Mode) + { + state.heartbeat = null; + } + } + + + + var sessionClientExtensions = state.clientExtensions; + var sessionServerExtensions = state.serverExtensions; + + if (state.resumedSession) + { + if (securityParameters.CipherSuite != state.sessionParameters.CipherSuite + || !server_version.Equals(state.sessionParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + sessionClientExtensions = null; + sessionServerExtensions = state.sessionParameters.ReadServerExtensions(); + } + + if (sessionServerExtensions != null && sessionServerExtensions.Count > 0) + { + { + /* + * RFC 7366 3. If a server receives an encrypt-then-MAC request extension from a client + * and then selects a stream or Authenticated Encryption with Associated Data (AEAD) + * ciphersuite, it MUST NOT send an encrypt-then-MAC response extension back to the + * client. + */ + bool serverSentEncryptThenMac = TlsExtensionsUtilities.HasEncryptThenMacExtension( + sessionServerExtensions); + if (serverSentEncryptThenMac && !TlsUtilities.IsBlockCipherSuite(securityParameters.CipherSuite)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + securityParameters.m_encryptThenMac = serverSentEncryptThenMac; + } + + securityParameters.m_maxFragmentLength = EvaluateMaxFragmentLengthExtension(state.resumedSession, + sessionClientExtensions, sessionServerExtensions, AlertDescription.illegal_parameter); + + securityParameters.m_truncatedHmac = TlsExtensionsUtilities.HasTruncatedHmacExtension( + sessionServerExtensions); + + if (!state.resumedSession) + { + // TODO[tls13] See RFC 8446 4.4.2.1 + if (TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.status_request_v2, AlertDescription.illegal_parameter)) + { + securityParameters.m_statusRequestVersion = 2; + } + else if (TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.status_request, AlertDescription.illegal_parameter)) + { + securityParameters.m_statusRequestVersion = 1; + } + } + + state.expectSessionTicket = !state.resumedSession + && TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.session_ticket, AlertDescription.illegal_parameter); + } + + if (sessionClientExtensions != null) + { + state.client.ProcessServerExtensions(sessionServerExtensions); + } + } + + /// + protected virtual void ProcessServerKeyExchange(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + state.keyExchange.ProcessServerKeyExchange(buf); + TlsProtocol.AssertEmpty(buf); + } + + /// + protected virtual void ProcessServerSupplementalData(ClientHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + var serverSupplementalData = TlsProtocol.ReadSupplementalDataMessage(buf); + state.client.ProcessServerSupplementalData(serverSupplementalData); + } + + /// + protected virtual void ReportServerVersion(ClientHandshakeState state, ProtocolVersion server_version) + { + TlsClientContextImpl context = state.clientContext; + SecurityParameters securityParameters = context.SecurityParameters; + + ProtocolVersion currentServerVersion = securityParameters.NegotiatedVersion; + if (null != currentServerVersion) + { + if (!currentServerVersion.Equals(server_version)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return; + } + + if (!ProtocolVersion.Contains(context.ClientSupportedVersions, server_version)) + throw new TlsFatalAlert(AlertDescription.protocol_version); + + securityParameters.m_negotiatedVersion = server_version; + + TlsUtilities.NegotiatedVersionDtlsClient(state.clientContext, state.client); + } + + /// + protected static byte[] PatchClientHelloWithCookie(byte[] clientHelloBody, byte[] cookie) + { + int sessionIDPos = 34; + int sessionIDLength = TlsUtilities.ReadUint8(clientHelloBody, sessionIDPos); + + int cookieLengthPos = sessionIDPos + 1 + sessionIDLength; + int cookiePos = cookieLengthPos + 1; + + byte[] patched = new byte[clientHelloBody.Length + cookie.Length]; + Array.Copy(clientHelloBody, 0, patched, 0, cookieLengthPos); + TlsUtilities.CheckUint8(cookie.Length); + TlsUtilities.WriteUint8(cookie.Length, patched, cookieLengthPos); + Array.Copy(cookie, 0, patched, cookiePos, cookie.Length); + Array.Copy(clientHelloBody, cookiePos, patched, cookiePos + cookie.Length, + clientHelloBody.Length - cookiePos); + + return patched; + } + + protected internal class ClientHandshakeState + { + internal TlsClient client = null; + internal TlsClientContextImpl clientContext = null; + internal TlsSession tlsSession = null; + internal SessionParameters sessionParameters = null; + internal TlsSecret sessionMasterSecret = null; + internal SessionParameters.Builder sessionParametersBuilder = null; + internal int[] offeredCipherSuites = null; + internal IDictionary clientExtensions = null; + internal IDictionary serverExtensions = null; + internal bool resumedSession = false; + internal bool expectSessionTicket = false; + internal IDictionary clientAgreements = null; + internal TlsKeyExchange keyExchange = null; + internal TlsAuthentication authentication = null; + internal CertificateStatus certificateStatus = null; + internal CertificateRequest certificateRequest = null; + internal TlsHeartbeat heartbeat = null; + internal short heartbeatPolicy = HeartbeatMode.peer_not_allowed_to_send; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs.meta new file mode 100644 index 00000000..99eeb660 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c8d052cfc6148f046bb49b746e0b7053 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsClientProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs new file mode 100644 index 00000000..0e1d6dfe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal sealed class DtlsEpoch + { + private readonly DtlsReplayWindow m_replayWindow = new DtlsReplayWindow(); + + private readonly int m_epoch; + private readonly TlsCipher m_cipher; + + private long m_sequenceNumber = 0; + + internal DtlsEpoch(int epoch, TlsCipher cipher) + { + if (epoch < 0) + throw new ArgumentException("must be >= 0", "epoch"); + if (cipher == null) + throw new ArgumentNullException("cipher"); + + this.m_epoch = epoch; + this.m_cipher = cipher; + } + + /// + internal long AllocateSequenceNumber() + { + lock (this) + { + if (m_sequenceNumber >= (1L << 48)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return m_sequenceNumber++; + } + } + + internal TlsCipher Cipher + { + get { return m_cipher; } + } + + internal int Epoch + { + get { return m_epoch; } + } + + internal DtlsReplayWindow ReplayWindow + { + get { return m_replayWindow; } + } + + internal long SequenceNumber + { + get { lock (this) return m_sequenceNumber; } + set { lock (this) this.m_sequenceNumber = value; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs.meta new file mode 100644 index 00000000..97bed031 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a30edb6f790ba1142a36574ca613e17d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsEpoch.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs new file mode 100644 index 00000000..e460893d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal interface DtlsHandshakeRetransmit + { + /// + void ReceivedHandshakeRecord(int epoch, byte[] buf, int off, int len); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs.meta new file mode 100644 index 00000000..554b2e51 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f945f2fb5fe1bc43abcc8cea745d392 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsHandshakeRetransmit.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs new file mode 100644 index 00000000..c430f6d4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class DtlsProtocol + { + internal DtlsProtocol() + { + } + + /// + internal virtual void ProcessFinished(byte[] body, byte[] expected_verify_data) + { + MemoryStream buf = new MemoryStream(body, false); + + byte[] verify_data = TlsUtilities.ReadFully(expected_verify_data.Length, buf); + + TlsProtocol.AssertEmpty(buf); + + if (!Arrays.ConstantTimeAreEqual(expected_verify_data, verify_data)) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + /// + internal static void ApplyMaxFragmentLengthExtension(DtlsRecordLayer recordLayer, short maxFragmentLength) + { + if (maxFragmentLength >= 0) + { + if (!MaxFragmentLength.IsValid(maxFragmentLength)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int plainTextLimit = 1 << (8 + maxFragmentLength); + recordLayer.SetPlaintextLimit(plainTextLimit); + } + } + + /// + internal static short EvaluateMaxFragmentLengthExtension(bool resumedSession, + IDictionary clientExtensions, IDictionary serverExtensions, + short alertDescription) + { + short maxFragmentLength = TlsExtensionsUtilities.GetMaxFragmentLengthExtension(serverExtensions); + if (maxFragmentLength >= 0) + { + if (!MaxFragmentLength.IsValid(maxFragmentLength) + || (!resumedSession && maxFragmentLength != TlsExtensionsUtilities + .GetMaxFragmentLengthExtension(clientExtensions))) + { + throw new TlsFatalAlert(alertDescription); + } + } + return maxFragmentLength; + } + + /// + internal static byte[] GenerateCertificate(TlsContext context, Certificate certificate, Stream endPointHash) + { + MemoryStream buf = new MemoryStream(); + certificate.Encode(context, buf, endPointHash); + return buf.ToArray(); + } + + /// + internal static byte[] GenerateSupplementalData(IList supplementalData) + { + MemoryStream buf = new MemoryStream(); + TlsProtocol.WriteSupplementalData(buf, supplementalData); + return buf.ToArray(); + } + + /// + internal static void SendCertificateMessage(TlsContext context, DtlsReliableHandshake handshake, + Certificate certificate, Stream endPointHash) + { + SecurityParameters securityParameters = context.SecurityParameters; + if (null != securityParameters.LocalCertificate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (null == certificate) + { + certificate = Certificate.EmptyChain; + } + + byte[] certificateBody = GenerateCertificate(context, certificate, endPointHash); + handshake.SendMessage(HandshakeType.certificate, certificateBody); + + securityParameters.m_localCertificate = certificate; + } + + /// + internal static int ValidateSelectedCipherSuite(int selectedCipherSuite, short alertDescription) + { + switch (TlsUtilities.GetEncryptionAlgorithm(selectedCipherSuite)) + { + case EncryptionAlgorithm.RC4_40: + case EncryptionAlgorithm.RC4_128: + case -1: + throw new TlsFatalAlert(alertDescription); + default: + return selectedCipherSuite; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs.meta new file mode 100644 index 00000000..5cb75230 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69381563a53e23a448f8f79a6b9fb828 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs new file mode 100644 index 00000000..72c2c1bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal sealed class DtlsReassembler + { + private readonly short m_msg_type; + private readonly byte[] m_body; + + private readonly List m_missing = new List(); + + internal DtlsReassembler(short msg_type, int length) + { + this.m_msg_type = msg_type; + this.m_body = new byte[length]; + this.m_missing.Add(new Range(0, length)); + } + + internal short MsgType + { + get { return m_msg_type; } + } + + internal byte[] GetBodyIfComplete() + { + return m_missing.Count > 0 ? null : m_body; + } + + internal void ContributeFragment(short msg_type, int length, byte[] buf, int off, int fragment_offset, + int fragment_length) + { + int fragment_end = fragment_offset + fragment_length; + + if (m_msg_type != msg_type || m_body.Length != length || fragment_end > length) + return; + + if (fragment_length == 0) + { + // NOTE: Empty messages still require an empty fragment to complete it + if (fragment_offset == 0 && m_missing.Count > 0) + { + Range firstRange = (Range)m_missing[0]; + if (firstRange.End == 0) + { + m_missing.RemoveAt(0); + } + } + return; + } + + for (int i = 0; i < m_missing.Count; ++i) + { + Range range = (Range)m_missing[i]; + if (range.Start >= fragment_end) + break; + + if (range.End > fragment_offset) + { + int copyStart = System.Math.Max(range.Start, fragment_offset); + int copyEnd = System.Math.Min(range.End, fragment_end); + int copyLength = copyEnd - copyStart; + + Array.Copy(buf, off + copyStart - fragment_offset, m_body, copyStart, copyLength); + + if (copyStart == range.Start) + { + if (copyEnd == range.End) + { + m_missing.RemoveAt(i--); + } + else + { + range.Start = copyEnd; + } + } + else + { + if (copyEnd != range.End) + { + m_missing.Insert(++i, new Range(copyEnd, range.End)); + } + range.End = copyStart; + } + } + } + } + + internal void Reset() + { + m_missing.Clear(); + m_missing.Add(new Range(0, m_body.Length)); + } + + private sealed class Range + { + private int m_start, m_end; + + internal Range(int start, int end) + { + this.m_start = start; + this.m_end = end; + } + + public int Start + { + get { return m_start; } + set { this.m_start = value; } + } + + public int End + { + get { return m_end; } + set { this.m_end = value; } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs.meta new file mode 100644 index 00000000..8156a71b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6fdf9fcea476c944f80a41949b54949d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReassembler.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs new file mode 100644 index 00000000..818ccf24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs @@ -0,0 +1,966 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Net.Sockets; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class DtlsRecordLayer + : DatagramTransport + { + private const int RECORD_HEADER_LENGTH = 13; + private const int MAX_FRAGMENT_LENGTH = 1 << 14; + private const long TCP_MSL = 1000L * 60 * 2; + private const long RETRANSMIT_TIMEOUT = TCP_MSL * 2; + + /// + internal static byte[] ReceiveClientHelloRecord(byte[] data, int dataOff, int dataLen) + { + if (dataLen < RECORD_HEADER_LENGTH) + { + return null; + } + + short contentType = TlsUtilities.ReadUint8(data, dataOff + 0); + if (ContentType.handshake != contentType) + return null; + + ProtocolVersion version = TlsUtilities.ReadVersion(data, dataOff + 1); + if (!ProtocolVersion.DTLSv10.IsEqualOrEarlierVersionOf(version)) + return null; + + int epoch = TlsUtilities.ReadUint16(data, dataOff + 3); + if (0 != epoch) + return null; + + //long sequenceNumber = TlsUtilities.ReadUint48(data, dataOff + 5); + + int length = TlsUtilities.ReadUint16(data, dataOff + 11); + if (dataLen < RECORD_HEADER_LENGTH + length) + return null; + + if (length > MAX_FRAGMENT_LENGTH) + return null; + + // NOTE: We ignore/drop any data after the first record + return TlsUtilities.CopyOfRangeExact(data, dataOff + RECORD_HEADER_LENGTH, + dataOff + RECORD_HEADER_LENGTH + length); + } + + /// + internal static void SendHelloVerifyRequestRecord(DatagramSender sender, long recordSeq, byte[] message) + { + TlsUtilities.CheckUint16(message.Length); + + byte[] record = new byte[RECORD_HEADER_LENGTH + message.Length]; + TlsUtilities.WriteUint8(ContentType.handshake, record, 0); + TlsUtilities.WriteVersion(ProtocolVersion.DTLSv10, record, 1); + TlsUtilities.WriteUint16(0, record, 3); + TlsUtilities.WriteUint48(recordSeq, record, 5); + TlsUtilities.WriteUint16(message.Length, record, 11); + + Array.Copy(message, 0, record, RECORD_HEADER_LENGTH, message.Length); + + SendDatagram(sender, record, 0, record.Length); + } + + /// + private static void SendDatagram(DatagramSender sender, byte[] buf, int off, int len) + { + // TODO[tls-port] Can we support interrupted IO on .NET? + //try + //{ + // sender.Send(buf, off, len); + //} + //catch (InterruptedIOException e) + //{ + // e.bytesTransferred = 0; + // throw e; + //} + + sender.Send(buf, off, len); + } + + private readonly TlsContext m_context; + private readonly TlsPeer m_peer; + private readonly DatagramTransport m_transport; + + private readonly ByteQueue m_recordQueue = new ByteQueue(); + private readonly object m_writeLock = new object(); + + private volatile bool m_closed = false; + private volatile bool m_failed = false; + // TODO[dtls13] Review the draft/RFC (legacy_record_version) to see if readVersion can be removed + private volatile ProtocolVersion m_readVersion = null, m_writeVersion = null; + private volatile bool m_inConnection; + private volatile bool m_inHandshake; + private volatile int m_plaintextLimit; + private DtlsEpoch m_currentEpoch, m_pendingEpoch; + private DtlsEpoch m_readEpoch, m_writeEpoch; + + private DtlsHandshakeRetransmit m_retransmit = null; + private DtlsEpoch m_retransmitEpoch = null; + private Timeout m_retransmitTimeout = null; + + private TlsHeartbeat m_heartbeat = null; // If non-null, controls the sending of heartbeat requests + private bool m_heartBeatResponder = false; // Whether we should send heartbeat responses + + private HeartbeatMessage m_heartbeatInFlight = null; // The current in-flight heartbeat request, if any + private Timeout m_heartbeatTimeout = null; // Idle timeout (if none in-flight), else expiry timeout for response + + private int m_heartbeatResendMillis = -1; // Delay before retransmit of current in-flight heartbeat request + private Timeout m_heartbeatResendTimeout = null; // Timeout for next retransmit of the in-flight heartbeat request + + internal DtlsRecordLayer(TlsContext context, TlsPeer peer, DatagramTransport transport) + { + this.m_context = context; + this.m_peer = peer; + this.m_transport = transport; + + this.m_inHandshake = true; + + this.m_currentEpoch = new DtlsEpoch(0, TlsNullNullCipher.Instance); + this.m_pendingEpoch = null; + this.m_readEpoch = m_currentEpoch; + this.m_writeEpoch = m_currentEpoch; + + SetPlaintextLimit(MAX_FRAGMENT_LENGTH); + } + + internal virtual bool IsClosed + { + get { return m_closed; } + } + + internal virtual void ResetAfterHelloVerifyRequestServer(long recordSeq) + { + this.m_inConnection = true; + + m_currentEpoch.SequenceNumber = recordSeq; + m_currentEpoch.ReplayWindow.Reset(recordSeq); + } + + internal virtual void SetPlaintextLimit(int plaintextLimit) + { + this.m_plaintextLimit = plaintextLimit; + } + + internal virtual int ReadEpoch + { + get { return m_readEpoch.Epoch; } + } + + internal virtual ProtocolVersion ReadVersion + { + get { return m_readVersion; } + set { this.m_readVersion = value; } + } + + internal virtual void SetWriteVersion(ProtocolVersion writeVersion) + { + this.m_writeVersion = writeVersion; + } + + internal virtual void InitPendingEpoch(TlsCipher pendingCipher) + { + if (m_pendingEpoch != null) + throw new InvalidOperationException(); + + /* + * TODO "In order to ensure that any given sequence/epoch pair is unique, implementations + * MUST NOT allow the same epoch value to be reused within two times the TCP maximum segment + * lifetime." + */ + + // TODO Check for overflow + this.m_pendingEpoch = new DtlsEpoch(m_writeEpoch.Epoch + 1, pendingCipher); + } + + internal virtual void HandshakeSuccessful(DtlsHandshakeRetransmit retransmit) + { + if (m_readEpoch == m_currentEpoch || m_writeEpoch == m_currentEpoch) + { + // TODO + throw new InvalidOperationException(); + } + + if (null != retransmit) + { + this.m_retransmit = retransmit; + this.m_retransmitEpoch = m_currentEpoch; + this.m_retransmitTimeout = new Timeout(RETRANSMIT_TIMEOUT); + } + + this.m_inHandshake = false; + this.m_currentEpoch = m_pendingEpoch; + this.m_pendingEpoch = null; + } + + internal virtual void InitHeartbeat(TlsHeartbeat heartbeat, bool heartbeatResponder) + { + if (m_inHandshake) + throw new InvalidOperationException(); + + this.m_heartbeat = heartbeat; + this.m_heartBeatResponder = heartbeatResponder; + + if (null != heartbeat) + { + ResetHeartbeat(); + } + } + + internal virtual void ResetWriteEpoch() + { + if (null != m_retransmitEpoch) + { + this.m_writeEpoch = m_retransmitEpoch; + } + else + { + this.m_writeEpoch = m_currentEpoch; + } + } + + /// + public virtual int GetReceiveLimit() + { + return System.Math.Min(m_plaintextLimit, + m_readEpoch.Cipher.GetPlaintextLimit(m_transport.GetReceiveLimit() - RECORD_HEADER_LENGTH)); + } + + /// + public virtual int GetSendLimit() + { + return System.Math.Min(m_plaintextLimit, + m_writeEpoch.Cipher.GetPlaintextLimit(m_transport.GetSendLimit() - RECORD_HEADER_LENGTH)); + } + + /// + public virtual int Receive(byte[] buf, int off, int len, int waitMillis) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Receive(buf.AsSpan(off, len), waitMillis); +#else + long currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + + Timeout timeout = Timeout.ForWaitMillis(waitMillis, currentTimeMillis); + byte[] record = null; + + while (waitMillis >= 0) + { + if (null != m_retransmitTimeout && m_retransmitTimeout.RemainingMillis(currentTimeMillis) < 1) + { + m_retransmit = null; + m_retransmitEpoch = null; + m_retransmitTimeout = null; + } + + if (Timeout.HasExpired(m_heartbeatTimeout, currentTimeMillis)) + { + if (null != m_heartbeatInFlight) + throw new TlsTimeoutException("Heartbeat timed out"); + + this.m_heartbeatInFlight = HeartbeatMessage.Create(m_context, + HeartbeatMessageType.heartbeat_request, m_heartbeat.GeneratePayload()); + this.m_heartbeatTimeout = new Timeout(m_heartbeat.TimeoutMillis, currentTimeMillis); + + this.m_heartbeatResendMillis = DtlsReliableHandshake.INITIAL_RESEND_MILLIS; + this.m_heartbeatResendTimeout = new Timeout(m_heartbeatResendMillis, currentTimeMillis); + + SendHeartbeatMessage(m_heartbeatInFlight); + } + else if (Timeout.HasExpired(m_heartbeatResendTimeout, currentTimeMillis)) + { + this.m_heartbeatResendMillis = DtlsReliableHandshake.BackOff(m_heartbeatResendMillis); + this.m_heartbeatResendTimeout = new Timeout(m_heartbeatResendMillis, currentTimeMillis); + + SendHeartbeatMessage(m_heartbeatInFlight); + } + + waitMillis = Timeout.ConstrainWaitMillis(waitMillis, m_heartbeatTimeout, currentTimeMillis); + waitMillis = Timeout.ConstrainWaitMillis(waitMillis, m_heartbeatResendTimeout, currentTimeMillis); + + // NOTE: Guard against bad logic giving a negative value + if (waitMillis < 0) + { + waitMillis = 1; + } + + int receiveLimit = System.Math.Min(len, GetReceiveLimit()) + RECORD_HEADER_LENGTH; + if (null == record || record.Length < receiveLimit) + { + record = new byte[receiveLimit]; + } + + int received = ReceiveRecord(record, 0, receiveLimit, waitMillis); + int processed = ProcessRecord(received, record, buf, off); + if (processed >= 0) + { + return processed; + } + + currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + waitMillis = Timeout.GetWaitMillis(timeout, currentTimeMillis); + } + + return -1; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + public virtual int Receive(Span buffer, int waitMillis) + { + long currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + + Timeout timeout = Timeout.ForWaitMillis(waitMillis, currentTimeMillis); + byte[] record = null; + + while (waitMillis >= 0) + { + if (null != m_retransmitTimeout && m_retransmitTimeout.RemainingMillis(currentTimeMillis) < 1) + { + m_retransmit = null; + m_retransmitEpoch = null; + m_retransmitTimeout = null; + } + + if (Timeout.HasExpired(m_heartbeatTimeout, currentTimeMillis)) + { + if (null != m_heartbeatInFlight) + throw new TlsTimeoutException("Heartbeat timed out"); + + this.m_heartbeatInFlight = HeartbeatMessage.Create(m_context, + HeartbeatMessageType.heartbeat_request, m_heartbeat.GeneratePayload()); + this.m_heartbeatTimeout = new Timeout(m_heartbeat.TimeoutMillis, currentTimeMillis); + + this.m_heartbeatResendMillis = DtlsReliableHandshake.INITIAL_RESEND_MILLIS; + this.m_heartbeatResendTimeout = new Timeout(m_heartbeatResendMillis, currentTimeMillis); + + SendHeartbeatMessage(m_heartbeatInFlight); + } + else if (Timeout.HasExpired(m_heartbeatResendTimeout, currentTimeMillis)) + { + this.m_heartbeatResendMillis = DtlsReliableHandshake.BackOff(m_heartbeatResendMillis); + this.m_heartbeatResendTimeout = new Timeout(m_heartbeatResendMillis, currentTimeMillis); + + SendHeartbeatMessage(m_heartbeatInFlight); + } + + waitMillis = Timeout.ConstrainWaitMillis(waitMillis, m_heartbeatTimeout, currentTimeMillis); + waitMillis = Timeout.ConstrainWaitMillis(waitMillis, m_heartbeatResendTimeout, currentTimeMillis); + + // NOTE: Guard against bad logic giving a negative value + if (waitMillis < 0) + { + waitMillis = 1; + } + + int receiveLimit = System.Math.Min(buffer.Length, GetReceiveLimit()) + RECORD_HEADER_LENGTH; + if (null == record || record.Length < receiveLimit) + { + record = new byte[receiveLimit]; + } + + int received = ReceiveRecord(record, 0, receiveLimit, waitMillis); + int processed = ProcessRecord(received, record, buffer); + if (processed >= 0) + { + return processed; + } + + currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + waitMillis = Timeout.GetWaitMillis(timeout, currentTimeMillis); + } + + return -1; + } +#endif + + /// + public virtual void Send(byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Send(buf.AsSpan(off, len)); +#else + short contentType = ContentType.application_data; + + if (m_inHandshake || m_writeEpoch == m_retransmitEpoch) + { + contentType = ContentType.handshake; + + short handshakeType = TlsUtilities.ReadUint8(buf, off); + if (handshakeType == HandshakeType.finished) + { + DtlsEpoch nextEpoch = null; + if (m_inHandshake) + { + nextEpoch = m_pendingEpoch; + } + else if (m_writeEpoch == m_retransmitEpoch) + { + nextEpoch = m_currentEpoch; + } + + if (nextEpoch == null) + { + // TODO + throw new InvalidOperationException(); + } + + // Implicitly send change_cipher_spec and change to pending cipher state + + // TODO Send change_cipher_spec and finished records in single datagram? + byte[] data = new byte[1]{ 1 }; + SendRecord(ContentType.change_cipher_spec, data, 0, data.Length); + + this.m_writeEpoch = nextEpoch; + } + } + + SendRecord(contentType, buf, off, len); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + public virtual void Send(ReadOnlySpan buffer) + { + short contentType = ContentType.application_data; + + if (m_inHandshake || m_writeEpoch == m_retransmitEpoch) + { + contentType = ContentType.handshake; + + short handshakeType = TlsUtilities.ReadUint8(buffer); + if (handshakeType == HandshakeType.finished) + { + DtlsEpoch nextEpoch = null; + if (m_inHandshake) + { + nextEpoch = m_pendingEpoch; + } + else if (m_writeEpoch == m_retransmitEpoch) + { + nextEpoch = m_currentEpoch; + } + + if (nextEpoch == null) + { + // TODO + throw new InvalidOperationException(); + } + + // Implicitly send change_cipher_spec and change to pending cipher state + + // TODO Send change_cipher_spec and finished records in single datagram? + ReadOnlySpan data = stackalloc byte[1]{ 1 }; + SendRecord(ContentType.change_cipher_spec, data); + + this.m_writeEpoch = nextEpoch; + } + } + + SendRecord(contentType, buffer); + } +#endif + + /// + public virtual void Close() + { + if (!m_closed) + { + if (m_inHandshake && m_inConnection) + { + Warn(AlertDescription.user_canceled, "User canceled handshake"); + } + CloseTransport(); + } + } + + internal virtual void Fail(short alertDescription) + { + if (!m_closed) + { + if (m_inConnection) + { + try + { + RaiseAlert(AlertLevel.fatal, alertDescription, null, null); + } + catch (Exception) + { + // Ignore + } + } + + this.m_failed = true; + + CloseTransport(); + } + } + + internal virtual void Failed() + { + if (!m_closed) + { + this.m_failed = true; + + CloseTransport(); + } + } + + /// + internal virtual void Warn(short alertDescription, string message) + { + RaiseAlert(AlertLevel.warning, alertDescription, message, null); + } + + private void CloseTransport() + { + if (!m_closed) + { + /* + * RFC 5246 7.2.1. Unless some other fatal alert has been transmitted, each party is + * required to send a close_notify alert before closing the write side of the + * connection. The other party MUST respond with a close_notify alert of its own and + * close down the connection immediately, discarding any pending writes. + */ + + try + { + if (!m_failed) + { + Warn(AlertDescription.close_notify, null); + } + m_transport.Close(); + } + catch (Exception) + { + // Ignore + } + + this.m_closed = true; + } + } + + /// + private void RaiseAlert(short alertLevel, short alertDescription, string message, Exception cause) + { + m_peer.NotifyAlertRaised(alertLevel, alertDescription, message, cause); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ReadOnlySpan error = stackalloc byte[2]{ (byte)alertLevel, (byte)alertDescription }; + SendRecord(ContentType.alert, error); +#else + byte[] error = new byte[2]{ (byte)alertLevel, (byte)alertDescription }; + SendRecord(ContentType.alert, error, 0, 2); +#endif + } + + /// + private int ReceiveDatagram(byte[] buf, int off, int len, int waitMillis) + { + try + { + return m_transport.Receive(buf, off, len, waitMillis); + } + catch (TlsTimeoutException) + { + return -1; + } + catch (SocketException e) + { + if (TlsUtilities.IsTimeout(e)) + return -1; + + throw e; + } + // TODO[tls-port] Can we support interrupted IO on .NET? + //catch (InterruptedIOException e) + //{ + // e.bytesTransferred = 0; + // throw e; + //} + } + + // TODO Include 'currentTimeMillis' as an argument, use with Timeout, resetHeartbeat + /// +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int ProcessRecord(int received, byte[] record, Span buffer) +#else + private int ProcessRecord(int received, byte[] record, byte[] buf, int off) +#endif + { + // NOTE: received < 0 (timeout) is covered by this first case + if (received < RECORD_HEADER_LENGTH) + return -1; + + int length = TlsUtilities.ReadUint16(record, 11); + if (received != (length + RECORD_HEADER_LENGTH)) + return -1; + + // TODO[dtls13] Deal with opaque record type for 1.3 AEAD ciphers + short recordType = TlsUtilities.ReadUint8(record, 0); + + switch (recordType) + { + case ContentType.alert: + case ContentType.application_data: + case ContentType.change_cipher_spec: + case ContentType.handshake: + case ContentType.heartbeat: + break; + default: + return -1; + } + + int epoch = TlsUtilities.ReadUint16(record, 3); + + DtlsEpoch recordEpoch = null; + if (epoch == m_readEpoch.Epoch) + { + recordEpoch = m_readEpoch; + } + else if (recordType == ContentType.handshake && null != m_retransmitEpoch + && epoch == m_retransmitEpoch.Epoch) + { + recordEpoch = m_retransmitEpoch; + } + + if (null == recordEpoch) + return -1; + + long seq = TlsUtilities.ReadUint48(record, 5); + if (recordEpoch.ReplayWindow.ShouldDiscard(seq)) + return -1; + + ProtocolVersion recordVersion = TlsUtilities.ReadVersion(record, 1); + if (!recordVersion.IsDtls) + return -1; + + if (null != m_readVersion && !m_readVersion.Equals(recordVersion)) + { + /* + * Special-case handling for retransmitted ClientHello records. + * + * TODO Revisit how 'readVersion' works, since this is quite awkward. + */ + bool isClientHelloFragment = + ReadEpoch == 0 + && length > 0 + && ContentType.handshake == recordType + && HandshakeType.client_hello == TlsUtilities.ReadUint8(record, RECORD_HEADER_LENGTH); + + if (!isClientHelloFragment) + return -1; + } + + long macSeqNo = GetMacSequenceNumber(recordEpoch.Epoch, seq); + + TlsDecodeResult decoded = recordEpoch.Cipher.DecodeCiphertext(macSeqNo, recordType, recordVersion, record, + RECORD_HEADER_LENGTH, length); + + recordEpoch.ReplayWindow.ReportAuthenticated(seq); + + if (decoded.len > m_plaintextLimit) + return -1; + + if (decoded.len < 1 && decoded.contentType != ContentType.application_data) + return -1; + + if (null == m_readVersion) + { + bool isHelloVerifyRequest = + ReadEpoch == 0 + && length > 0 + && ContentType.handshake == recordType + && HandshakeType.hello_verify_request == TlsUtilities.ReadUint8(record, RECORD_HEADER_LENGTH); + + if (isHelloVerifyRequest) + { + /* + * RFC 6347 4.2.1 DTLS 1.2 server implementations SHOULD use DTLS version 1.0 + * regardless of the version of TLS that is expected to be negotiated. DTLS 1.2 and + * 1.0 clients MUST use the version solely to indicate packet formatting (which is + * the same in both DTLS 1.2 and 1.0) and not as part of version negotiation. + */ + if (!ProtocolVersion.DTLSv12.IsEqualOrLaterVersionOf(recordVersion)) + return -1; + } + else + { + this.m_readVersion = recordVersion; + } + } + + switch (decoded.contentType) + { + case ContentType.alert: + { + if (decoded.len == 2) + { + short alertLevel = TlsUtilities.ReadUint8(decoded.buf, decoded.off); + short alertDescription = TlsUtilities.ReadUint8(decoded.buf, decoded.off + 1); + + m_peer.NotifyAlertReceived(alertLevel, alertDescription); + + if (alertLevel == AlertLevel.fatal) + { + Failed(); + throw new TlsFatalAlert(alertDescription); + } + + // TODO Can close_notify be a fatal alert? + if (alertDescription == AlertDescription.close_notify) + { + CloseTransport(); + } + } + + return -1; + } + case ContentType.application_data: + { + if (m_inHandshake) + { + // TODO Consider buffering application data for new epoch that arrives + // out-of-order with the Finished message + return -1; + } + break; + } + case ContentType.change_cipher_spec: + { + // Implicitly receive change_cipher_spec and change to pending cipher state + + for (int i = 0; i < decoded.len; ++i) + { + short message = TlsUtilities.ReadUint8(decoded.buf, decoded.off + i); + if (message != ChangeCipherSpec.change_cipher_spec) + continue; + + if (m_pendingEpoch != null) + { + m_readEpoch = m_pendingEpoch; + } + } + + return -1; + } + case ContentType.handshake: + { + if (!m_inHandshake) + { + if (null != m_retransmit) + { + m_retransmit.ReceivedHandshakeRecord(epoch, decoded.buf, decoded.off, decoded.len); + } + + // TODO Consider support for HelloRequest + return -1; + } + break; + } + case ContentType.heartbeat: + { + if (null != m_heartbeatInFlight || m_heartBeatResponder) + { + try + { + MemoryStream input = new MemoryStream(decoded.buf, decoded.off, decoded.len, false); + HeartbeatMessage heartbeatMessage = HeartbeatMessage.Parse(input); + + if (null != heartbeatMessage) + { + switch (heartbeatMessage.Type) + { + case HeartbeatMessageType.heartbeat_request: + { + if (m_heartBeatResponder) + { + HeartbeatMessage response = HeartbeatMessage.Create(m_context, + HeartbeatMessageType.heartbeat_response, heartbeatMessage.Payload); + + SendHeartbeatMessage(response); + } + break; + } + case HeartbeatMessageType.heartbeat_response: + { + if (null != m_heartbeatInFlight + && Arrays.AreEqual(heartbeatMessage.Payload, m_heartbeatInFlight.Payload)) + { + ResetHeartbeat(); + } + break; + } + default: + break; + } + } + } + catch (Exception) + { + // Ignore + } + } + + return -1; + } + default: + return -1; + } + + /* + * NOTE: If we receive any non-handshake data in the new epoch implies the peer has + * received our final flight. + */ + if (!m_inHandshake && null != m_retransmit) + { + this.m_retransmit = null; + this.m_retransmitEpoch = null; + this.m_retransmitTimeout = null; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + decoded.buf.AsSpan(decoded.off, decoded.len).CopyTo(buffer); +#else + Array.Copy(decoded.buf, decoded.off, buf, off, decoded.len); +#endif + return decoded.len; + } + + /// + private int ReceiveRecord(byte[] buf, int off, int len, int waitMillis) + { + if (m_recordQueue.Available > 0) + { + int length = 0; + if (m_recordQueue.Available >= RECORD_HEADER_LENGTH) + { + length = m_recordQueue.ReadUint16(11); + } + + int received = System.Math.Min(m_recordQueue.Available, RECORD_HEADER_LENGTH + length); + m_recordQueue.RemoveData(buf, off, received, 0); + return received; + } + + { + int received = ReceiveDatagram(buf, off, len, waitMillis); + if (received >= RECORD_HEADER_LENGTH) + { + this.m_inConnection = true; + + int fragmentLength = TlsUtilities.ReadUint16(buf, off + 11); + int recordLength = RECORD_HEADER_LENGTH + fragmentLength; + if (received > recordLength) + { + m_recordQueue.AddData(buf, off + recordLength, received - recordLength); + received = recordLength; + } + } + + return received; + } + } + + private void ResetHeartbeat() + { + this.m_heartbeatInFlight = null; + this.m_heartbeatResendMillis = -1; + this.m_heartbeatResendTimeout = null; + this.m_heartbeatTimeout = new Timeout(m_heartbeat.IdleMillis); + } + + /// + private void SendHeartbeatMessage(HeartbeatMessage heartbeatMessage) + { + MemoryStream output = new MemoryStream(); + heartbeatMessage.Encode(output); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (!output.TryGetBuffer(out var buffer)) + throw new InvalidOperationException(); + + SendRecord(ContentType.heartbeat, buffer); +#else + byte[] buf = output.ToArray(); + SendRecord(ContentType.heartbeat, buf, 0, buf.Length); +#endif + } + + /* + * Currently uses synchronization to ensure heartbeat sends and application data sends don't + * interfere with each other. It may be overly cautious; the sequence number allocation is + * atomic, and if we synchronize only on the datagram send instead, then the only effect should + * be possible reordering of records (which might surprise a reliable transport implementation). + */ + /// +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void SendRecord(short contentType, ReadOnlySpan buffer) +#else + private void SendRecord(short contentType, byte[] buf, int off, int len) +#endif + { + // Never send anything until a valid ClientHello has been received + if (m_writeVersion == null) + return; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int len = buffer.Length; +#endif + + if (len > m_plaintextLimit) + throw new TlsFatalAlert(AlertDescription.internal_error); + + /* + * RFC 5246 6.2.1 Implementations MUST NOT send zero-length fragments of Handshake, Alert, + * or ChangeCipherSpec content types. + */ + if (len < 1 && contentType != ContentType.application_data) + throw new TlsFatalAlert(AlertDescription.internal_error); + + lock (m_writeLock) + { + int recordEpoch = m_writeEpoch.Epoch; + long recordSequenceNumber = m_writeEpoch.AllocateSequenceNumber(); + long macSequenceNumber = GetMacSequenceNumber(recordEpoch, recordSequenceNumber); + ProtocolVersion recordVersion = m_writeVersion; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + TlsEncodeResult encoded = m_writeEpoch.Cipher.EncodePlaintext(macSequenceNumber, contentType, + recordVersion, RECORD_HEADER_LENGTH, buffer); +#else + TlsEncodeResult encoded = m_writeEpoch.Cipher.EncodePlaintext(macSequenceNumber, contentType, + recordVersion, RECORD_HEADER_LENGTH, buf, off, len); +#endif + + int ciphertextLength = encoded.len - RECORD_HEADER_LENGTH; + TlsUtilities.CheckUint16(ciphertextLength); + + TlsUtilities.WriteUint8(encoded.recordType, encoded.buf, encoded.off + 0); + TlsUtilities.WriteVersion(recordVersion, encoded.buf, encoded.off + 1); + TlsUtilities.WriteUint16(recordEpoch, encoded.buf, encoded.off + 3); + TlsUtilities.WriteUint48(recordSequenceNumber, encoded.buf, encoded.off + 5); + TlsUtilities.WriteUint16(ciphertextLength, encoded.buf, encoded.off + 11); + + SendDatagram(m_transport, encoded.buf, encoded.off, encoded.len); + } + } + + private static long GetMacSequenceNumber(int epoch, long sequence_number) + { + return ((epoch & 0xFFFFFFFFL) << 48) | sequence_number; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs.meta new file mode 100644 index 00000000..a05080e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8cb74da811de1b34fa24bdb94fdaa910 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRecordLayer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs new file mode 100644 index 00000000..762944e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs @@ -0,0 +1,569 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class DtlsReliableHandshake + { + private const int MAX_RECEIVE_AHEAD = 16; + private const int MESSAGE_HEADER_LENGTH = 12; + + internal const int INITIAL_RESEND_MILLIS = 1000; + private const int MAX_RESEND_MILLIS = 60000; + + /// + internal static DtlsRequest ReadClientRequest(byte[] data, int dataOff, int dataLen, Stream dtlsOutput) + { + // TODO Support the possibility of a fragmented ClientHello datagram + + byte[] message = DtlsRecordLayer.ReceiveClientHelloRecord(data, dataOff, dataLen); + if (null == message || message.Length < MESSAGE_HEADER_LENGTH) + return null; + + long recordSeq = TlsUtilities.ReadUint48(data, dataOff + 5); + + short msgType = TlsUtilities.ReadUint8(message, 0); + if (HandshakeType.client_hello != msgType) + return null; + + int length = TlsUtilities.ReadUint24(message, 1); + if (message.Length != MESSAGE_HEADER_LENGTH + length) + return null; + + // TODO Consider stricter HelloVerifyRequest-related checks + //int messageSeq = TlsUtilities.ReadUint16(message, 4); + //if (messageSeq > 1) + // return null; + + int fragmentOffset = TlsUtilities.ReadUint24(message, 6); + if (0 != fragmentOffset) + return null; + + int fragmentLength = TlsUtilities.ReadUint24(message, 9); + if (length != fragmentLength) + return null; + + ClientHello clientHello = ClientHello.Parse( + new MemoryStream(message, MESSAGE_HEADER_LENGTH, length, false), dtlsOutput); + + return new DtlsRequest(recordSeq, message, clientHello); + } + + /// + internal static void SendHelloVerifyRequest(DatagramSender sender, long recordSeq, byte[] cookie) + { + TlsUtilities.CheckUint8(cookie.Length); + + int length = 3 + cookie.Length; + + byte[] message = new byte[MESSAGE_HEADER_LENGTH + length]; + TlsUtilities.WriteUint8(HandshakeType.hello_verify_request, message, 0); + TlsUtilities.WriteUint24(length, message, 1); + //TlsUtilities.WriteUint16(0, message, 4); + //TlsUtilities.WriteUint24(0, message, 6); + TlsUtilities.WriteUint24(length, message, 9); + + // HelloVerifyRequest fields + TlsUtilities.WriteVersion(ProtocolVersion.DTLSv10, message, MESSAGE_HEADER_LENGTH + 0); + TlsUtilities.WriteOpaque8(cookie, message, MESSAGE_HEADER_LENGTH + 2); + + DtlsRecordLayer.SendHelloVerifyRequestRecord(sender, recordSeq, message); + } + + /* + * No 'final' modifiers so that it works in earlier JDKs + */ + private DtlsRecordLayer m_recordLayer; + private Timeout m_handshakeTimeout; + + private TlsHandshakeHash m_handshakeHash; + + private IDictionary m_currentInboundFlight = new Dictionary(); + private IDictionary m_previousInboundFlight = null; + private IList m_outboundFlight = new List(); + + private int m_resendMillis = -1; + private Timeout m_resendTimeout = null; + + private int m_next_send_seq = 0, m_next_receive_seq = 0; + + internal DtlsReliableHandshake(TlsContext context, DtlsRecordLayer transport, int timeoutMillis, + DtlsRequest request) + { + this.m_recordLayer = transport; + this.m_handshakeHash = new DeferredHash(context); + this.m_handshakeTimeout = Timeout.ForWaitMillis(timeoutMillis); + + if (null != request) + { + this.m_resendMillis = INITIAL_RESEND_MILLIS; + this.m_resendTimeout = new Timeout(m_resendMillis); + + long recordSeq = request.RecordSeq; + int messageSeq = request.MessageSeq; + byte[] message = request.Message; + + m_recordLayer.ResetAfterHelloVerifyRequestServer(recordSeq); + + // Simulate a previous flight consisting of the request ClientHello + DtlsReassembler reassembler = new DtlsReassembler(HandshakeType.client_hello, + message.Length - MESSAGE_HEADER_LENGTH); + m_currentInboundFlight[messageSeq] = reassembler; + + // We sent HelloVerifyRequest with (message) sequence number 0 + this.m_next_send_seq = 1; + this.m_next_receive_seq = messageSeq + 1; + + m_handshakeHash.Update(message, 0, message.Length); + } + } + + internal void ResetAfterHelloVerifyRequestClient() + { + this.m_currentInboundFlight = new Dictionary(); + this.m_previousInboundFlight = null; + this.m_outboundFlight = new List(); + + this.m_resendMillis = -1; + this.m_resendTimeout = null; + + // We're waiting for ServerHello, always with (message) sequence number 1 + this.m_next_receive_seq = 1; + + m_handshakeHash.Reset(); + } + + internal TlsHandshakeHash HandshakeHash + { + get { return m_handshakeHash; } + } + + internal void PrepareToFinish() + { + m_handshakeHash.StopTracking(); + } + + /// + internal void SendMessage(short msg_type, byte[] body) + { + TlsUtilities.CheckUint24(body.Length); + + if (null != m_resendTimeout) + { + CheckInboundFlight(); + + this.m_resendMillis = -1; + this.m_resendTimeout = null; + + m_outboundFlight.Clear(); + } + + Message message = new Message(m_next_send_seq++, msg_type, body); + + m_outboundFlight.Add(message); + + WriteMessage(message); + UpdateHandshakeMessagesDigest(message); + } + + /// + internal Message ReceiveMessage() + { + Message message = ImplReceiveMessage(); + UpdateHandshakeMessagesDigest(message); + return message; + } + + /// + internal byte[] ReceiveMessageBody(short msg_type) + { + Message message = ImplReceiveMessage(); + if (message.Type != msg_type) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + UpdateHandshakeMessagesDigest(message); + return message.Body; + } + + /// + internal Message ReceiveMessageDelayedDigest(short msg_type) + { + Message message = ImplReceiveMessage(); + if (message.Type != msg_type) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + return message; + } + + /// + internal void UpdateHandshakeMessagesDigest(Message message) + { + short msg_type = message.Type; + switch (msg_type) + { + case HandshakeType.hello_request: + case HandshakeType.hello_verify_request: + case HandshakeType.key_update: + break; + + // TODO[dtls13] Not included in the transcript for (D)TLS 1.3+ + case HandshakeType.new_session_ticket: + default: + { + byte[] body = message.Body; + byte[] buf = new byte[MESSAGE_HEADER_LENGTH]; + TlsUtilities.WriteUint8(msg_type, buf, 0); + TlsUtilities.WriteUint24(body.Length, buf, 1); + TlsUtilities.WriteUint16(message.Seq, buf, 4); + TlsUtilities.WriteUint24(0, buf, 6); + TlsUtilities.WriteUint24(body.Length, buf, 9); + m_handshakeHash.Update(buf, 0, buf.Length); + m_handshakeHash.Update(body, 0, body.Length); + break; + } + } + } + + internal void Finish() + { + DtlsHandshakeRetransmit retransmit = null; + if (null != m_resendTimeout) + { + CheckInboundFlight(); + } + else + { + PrepareInboundFlight(null); + + if (m_previousInboundFlight != null) + { + /* + * RFC 6347 4.2.4. In addition, for at least twice the default MSL defined for [TCP], + * when in the FINISHED state, the node that transmits the last flight (the server in an + * ordinary handshake or the client in a resumed handshake) MUST respond to a retransmit + * of the peer's last flight with a retransmit of the last flight. + */ + retransmit = new Retransmit(this); + } + } + + m_recordLayer.HandshakeSuccessful(retransmit); + } + + internal static int BackOff(int timeoutMillis) + { + /* + * TODO[DTLS] implementations SHOULD back off handshake packet size during the + * retransmit backoff. + */ + return System.Math.Min(timeoutMillis * 2, MAX_RESEND_MILLIS); + } + + /** + * Check that there are no "extra" messages left in the current inbound flight + */ + private void CheckInboundFlight() + { + foreach (int key in m_currentInboundFlight.Keys) + { + if (key >= m_next_receive_seq) + { + // TODO Should this be considered an error? + } + } + } + + /// + private Message GetPendingMessage() + { + if (m_currentInboundFlight.TryGetValue(m_next_receive_seq, out var next)) + { + byte[] body = next.GetBodyIfComplete(); + if (body != null) + { + m_previousInboundFlight = null; + return new Message(m_next_receive_seq++, next.MsgType, body); + } + } + return null; + } + + /// + private Message ImplReceiveMessage() + { + long currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + + if (null == m_resendTimeout) + { + m_resendMillis = INITIAL_RESEND_MILLIS; + m_resendTimeout = new Timeout(m_resendMillis, currentTimeMillis); + + PrepareInboundFlight(new Dictionary()); + } + + byte[] buf = null; + + for (;;) + { + if (m_recordLayer.IsClosed) + throw new TlsFatalAlert(AlertDescription.user_canceled); + + Message pending = GetPendingMessage(); + if (pending != null) + return pending; + + if (Timeout.HasExpired(m_handshakeTimeout, currentTimeMillis)) + throw new TlsTimeoutException("Handshake timed out"); + + int waitMillis = Timeout.GetWaitMillis(m_handshakeTimeout, currentTimeMillis); + waitMillis = Timeout.ConstrainWaitMillis(waitMillis, m_resendTimeout, currentTimeMillis); + + // NOTE: Ensure a finite wait, of at least 1ms + if (waitMillis < 1) + { + waitMillis = 1; + } + + int receiveLimit = m_recordLayer.GetReceiveLimit(); + if (buf == null || buf.Length < receiveLimit) + { + buf = new byte[receiveLimit]; + } + + int received = m_recordLayer.Receive(buf, 0, receiveLimit, waitMillis); + if (received < 0) + { + ResendOutboundFlight(); + } + else + { + ProcessRecord(MAX_RECEIVE_AHEAD, m_recordLayer.ReadEpoch, buf, 0, received); + } + + currentTimeMillis = DateTimeUtilities.CurrentUnixMs(); + } + } + + private void PrepareInboundFlight(IDictionary nextFlight) + { + ResetAll(m_currentInboundFlight); + m_previousInboundFlight = m_currentInboundFlight; + m_currentInboundFlight = nextFlight; + } + + /// + private void ProcessRecord(int windowSize, int epoch, byte[] buf, int off, int len) + { + bool checkPreviousFlight = false; + + while (len >= MESSAGE_HEADER_LENGTH) + { + int fragment_length = TlsUtilities.ReadUint24(buf, off + 9); + int message_length = fragment_length + MESSAGE_HEADER_LENGTH; + if (len < message_length) + { + // NOTE: Truncated message - ignore it + break; + } + + int length = TlsUtilities.ReadUint24(buf, off + 1); + int fragment_offset = TlsUtilities.ReadUint24(buf, off + 6); + if (fragment_offset + fragment_length > length) + { + // NOTE: Malformed fragment - ignore it and the rest of the record + break; + } + + /* + * NOTE: This very simple epoch check will only work until we want to support + * renegotiation (and we're not likely to do that anyway). + */ + short msg_type = TlsUtilities.ReadUint8(buf, off + 0); + int expectedEpoch = msg_type == HandshakeType.finished ? 1 : 0; + if (epoch != expectedEpoch) + break; + + int message_seq = TlsUtilities.ReadUint16(buf, off + 4); + if (message_seq >= (m_next_receive_seq + windowSize)) + { + // NOTE: Too far ahead - ignore + } + else if (message_seq >= m_next_receive_seq) + { + if (!m_currentInboundFlight.TryGetValue(message_seq, out var reassembler)) + { + reassembler = new DtlsReassembler(msg_type, length); + m_currentInboundFlight[message_seq] = reassembler; + } + + reassembler.ContributeFragment(msg_type, length, buf, off + MESSAGE_HEADER_LENGTH, fragment_offset, + fragment_length); + } + else if (m_previousInboundFlight != null) + { + /* + * NOTE: If we receive the previous flight of incoming messages in full again, + * retransmit our last flight + */ + + if (m_previousInboundFlight.TryGetValue(message_seq, out var reassembler)) + { + reassembler.ContributeFragment(msg_type, length, buf, off + MESSAGE_HEADER_LENGTH, + fragment_offset, fragment_length); + checkPreviousFlight = true; + } + } + + off += message_length; + len -= message_length; + } + + if (checkPreviousFlight && CheckAll(m_previousInboundFlight)) + { + ResendOutboundFlight(); + ResetAll(m_previousInboundFlight); + } + } + + /// + private void ResendOutboundFlight() + { + m_recordLayer.ResetWriteEpoch(); + foreach (Message message in m_outboundFlight) + { + WriteMessage(message); + } + + m_resendMillis = BackOff(m_resendMillis); + m_resendTimeout = new Timeout(m_resendMillis); + } + + /// + private void WriteMessage(Message message) + { + int sendLimit = m_recordLayer.GetSendLimit(); + int fragmentLimit = sendLimit - MESSAGE_HEADER_LENGTH; + + // TODO Support a higher minimum fragment size? + if (fragmentLimit < 1) + { + // TODO Should we be throwing an exception here? + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int length = message.Body.Length; + + // NOTE: Must still send a fragment if body is empty + int fragment_offset = 0; + do + { + int fragment_length = System.Math.Min(length - fragment_offset, fragmentLimit); + WriteHandshakeFragment(message, fragment_offset, fragment_length); + fragment_offset += fragment_length; + } + while (fragment_offset < length); + } + + /// + private void WriteHandshakeFragment(Message message, int fragment_offset, int fragment_length) + { + RecordLayerBuffer fragment = new RecordLayerBuffer(MESSAGE_HEADER_LENGTH + fragment_length); + TlsUtilities.WriteUint8(message.Type, fragment); + TlsUtilities.WriteUint24(message.Body.Length, fragment); + TlsUtilities.WriteUint16(message.Seq, fragment); + TlsUtilities.WriteUint24(fragment_offset, fragment); + TlsUtilities.WriteUint24(fragment_length, fragment); + fragment.Write(message.Body, fragment_offset, fragment_length); + + fragment.SendToRecordLayer(m_recordLayer); + } + + private static bool CheckAll(IDictionary inboundFlight) + { + foreach (DtlsReassembler r in inboundFlight.Values) + { + if (r.GetBodyIfComplete() == null) + return false; + } + return true; + } + + private static void ResetAll(IDictionary inboundFlight) + { + foreach (DtlsReassembler r in inboundFlight.Values) + { + r.Reset(); + } + } + + internal class Message + { + private readonly int m_message_seq; + private readonly short m_msg_type; + private readonly byte[] m_body; + + internal Message(int message_seq, short msg_type, byte[] body) + { + this.m_message_seq = message_seq; + this.m_msg_type = msg_type; + this.m_body = body; + } + + public int Seq + { + get { return m_message_seq; } + } + + public short Type + { + get { return m_msg_type; } + } + + public byte[] Body + { + get { return m_body; } + } + } + + internal class RecordLayerBuffer + : MemoryStream + { + internal RecordLayerBuffer(int size) + : base(size) + { + } + + internal void SendToRecordLayer(DtlsRecordLayer recordLayer) + { + byte[] buf = GetBuffer(); + int bufLen = Convert.ToInt32(Length); + + recordLayer.Send(buf, 0, bufLen); + Dispose(); + } + } + + internal class Retransmit + : DtlsHandshakeRetransmit + { + private readonly DtlsReliableHandshake m_outer; + + internal Retransmit(DtlsReliableHandshake outer) + { + this.m_outer = outer; + } + + public void ReceivedHandshakeRecord(int epoch, byte[] buf, int off, int len) + { + m_outer.ProcessRecord(0, epoch, buf, off, len); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs.meta new file mode 100644 index 00000000..71ce001a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f27ce3e28d65c740b874681b07b2da8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReliableHandshake.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs new file mode 100644 index 00000000..bb3f1356 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs @@ -0,0 +1,88 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /** + * RFC 4347 4.1.2.5 Anti-replay + *

    + * Support fast rejection of duplicate records by maintaining a sliding receive window + *

    + */ + internal sealed class DtlsReplayWindow + { + private const long ValidSeqMask = 0x0000FFFFFFFFFFFFL; + + private const long WindowSize = 64L; + + private long m_latestConfirmedSeq = -1; + private ulong m_bitmap = 0; + + /// Check whether a received record with the given sequence number should be rejected as a duplicate. + /// + /// the 48-bit DTLSPlainText.sequence_number field of a received record. + /// true if the record should be discarded without further processing. + internal bool ShouldDiscard(long seq) + { + if ((seq & ValidSeqMask) != seq) + return true; + + if (seq <= m_latestConfirmedSeq) + { + long diff = m_latestConfirmedSeq - seq; + if (diff >= WindowSize) + return true; + + if ((m_bitmap & (1UL << (int)diff)) != 0) + return true; + } + + return false; + } + + /// Report that a received record with the given sequence number passed authentication checks. + /// + /// the 48-bit DTLSPlainText.sequence_number field of an authenticated record. + internal void ReportAuthenticated(long seq) + { + if ((seq & ValidSeqMask) != seq) + throw new ArgumentException("out of range", "seq"); + + if (seq <= m_latestConfirmedSeq) + { + long diff = m_latestConfirmedSeq - seq; + if (diff < WindowSize) + { + m_bitmap |= (1UL << (int)diff); + } + } + else + { + long diff = seq - m_latestConfirmedSeq; + if (diff >= WindowSize) + { + m_bitmap = 1; + } + else + { + m_bitmap <<= (int)diff; // for earlier JDKs + m_bitmap |= 1UL; + } + m_latestConfirmedSeq = seq; + } + } + + internal void Reset(long seq) + { + if ((seq & ValidSeqMask) != seq) + throw new ArgumentException("out of range", "seq"); + + // Discard future records unless sequence number > 'seq' + m_latestConfirmedSeq = seq; + m_bitmap = ulong.MaxValue >> (int)System.Math.Max(0, 63 - seq); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs.meta new file mode 100644 index 00000000..b0524b52 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 28d5357af7f618f4bb012f3de1dcf25e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsReplayWindow.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs new file mode 100644 index 00000000..94eb6103 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class DtlsRequest + { + private readonly long m_recordSeq; + private readonly byte[] m_message; + private readonly ClientHello m_clientHello; + + internal DtlsRequest(long recordSeq, byte[] message, ClientHello clientHello) + { + this.m_recordSeq = recordSeq; + this.m_message = message; + this.m_clientHello = clientHello; + } + + internal ClientHello ClientHello + { + get { return m_clientHello; } + } + + internal byte[] Message + { + get { return m_message; } + } + + internal int MessageSeq + { + get { return TlsUtilities.ReadUint16(m_message, 4); } + } + + internal long RecordSeq + { + get { return m_recordSeq; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs.meta new file mode 100644 index 00000000..33d15c5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4e1e1fccdcf76441a492442920b0eee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs new file mode 100644 index 00000000..05298f0e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs @@ -0,0 +1,876 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DtlsServerProtocol + : DtlsProtocol + { + protected bool m_verifyRequests = true; + + public DtlsServerProtocol() + : base() + { + } + + public virtual bool VerifyRequests + { + get { return m_verifyRequests; } + set { this.m_verifyRequests = value; } + } + + /// + public virtual DtlsTransport Accept(TlsServer server, DatagramTransport transport) + { + return Accept(server, transport, null); + } + + /// + public virtual DtlsTransport Accept(TlsServer server, DatagramTransport transport, DtlsRequest request) + { + if (server == null) + throw new ArgumentNullException("server"); + if (transport == null) + throw new ArgumentNullException("transport"); + + ServerHandshakeState state = new ServerHandshakeState(); + state.server = server; + state.serverContext = new TlsServerContextImpl(server.Crypto); + server.Init(state.serverContext); + state.serverContext.HandshakeBeginning(server); + + SecurityParameters securityParameters = state.serverContext.SecurityParameters; + securityParameters.m_extendedPadding = server.ShouldUseExtendedPadding(); + + DtlsRecordLayer recordLayer = new DtlsRecordLayer(state.serverContext, state.server, transport); + server.NotifyCloseHandle(recordLayer); + + try + { + return ServerHandshake(state, recordLayer, request); + } + catch (TlsFatalAlert fatalAlert) + { + AbortServerHandshake(state, recordLayer, fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (IOException e) + { + AbortServerHandshake(state, recordLayer, AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + AbortServerHandshake(state, recordLayer, AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + finally + { + securityParameters.Clear(); + } + } + + internal virtual void AbortServerHandshake(ServerHandshakeState state, DtlsRecordLayer recordLayer, + short alertDescription) + { + recordLayer.Fail(alertDescription); + InvalidateSession(state); + } + + /// + internal virtual DtlsTransport ServerHandshake(ServerHandshakeState state, DtlsRecordLayer recordLayer, + DtlsRequest request) + { + SecurityParameters securityParameters = state.serverContext.SecurityParameters; + + DtlsReliableHandshake handshake = new DtlsReliableHandshake(state.serverContext, recordLayer, + state.server.GetHandshakeTimeoutMillis(), request); + + DtlsReliableHandshake.Message clientMessage = null; + + if (null == request) + { + clientMessage = handshake.ReceiveMessage(); + + // NOTE: DtlsRecordLayer requires any DTLS version, we don't otherwise constrain this + //ProtocolVersion recordLayerVersion = recordLayer.ReadVersion; + + if (clientMessage.Type == HandshakeType.client_hello) + { + ProcessClientHello(state, clientMessage.Body); + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + else + { + ProcessClientHello(state, request.ClientHello); + } + + /* + * NOTE: Currently no server support for session resumption + * + * If adding support, ensure securityParameters.tlsUnique is set to the localVerifyData, but + * ONLY when extended_master_secret has been negotiated (otherwise NULL). + */ + { + // TODO[resumption] + + state.tlsSession = TlsUtilities.ImportSession(TlsUtilities.EmptyBytes, null); + state.sessionParameters = null; + state.sessionMasterSecret = null; + } + + securityParameters.m_sessionID = state.tlsSession.SessionID; + + state.server.NotifySession(state.tlsSession); + + { + byte[] serverHelloBody = GenerateServerHello(state, recordLayer); + + // TODO[dtls13] Ideally, move this into GenerateServerHello once legacy_record_version clarified + { + ProtocolVersion recordLayerVersion = state.serverContext.ServerVersion; + recordLayer.ReadVersion = recordLayerVersion; + recordLayer.SetWriteVersion(recordLayerVersion); + } + + handshake.SendMessage(HandshakeType.server_hello, serverHelloBody); + } + + handshake.HandshakeHash.NotifyPrfDetermined(); + + var serverSupplementalData = state.server.GetServerSupplementalData(); + if (serverSupplementalData != null) + { + byte[] supplementalDataBody = GenerateSupplementalData(serverSupplementalData); + handshake.SendMessage(HandshakeType.supplemental_data, supplementalDataBody); + } + + state.keyExchange = TlsUtilities.InitKeyExchangeServer(state.serverContext, state.server); + + state.serverCredentials = null; + + if (!KeyExchangeAlgorithm.IsAnonymous(securityParameters.KeyExchangeAlgorithm)) + { + state.serverCredentials = TlsUtilities.EstablishServerCredentials(state.server); + } + + // Server certificate + { + Certificate serverCertificate = null; + + MemoryStream endPointHash = new MemoryStream(); + if (state.serverCredentials == null) + { + state.keyExchange.SkipServerCredentials(); + } + else + { + state.keyExchange.ProcessServerCredentials(state.serverCredentials); + + serverCertificate = state.serverCredentials.Certificate; + + SendCertificateMessage(state.serverContext, handshake, serverCertificate, endPointHash); + } + securityParameters.m_tlsServerEndPoint = endPointHash.ToArray(); + + // TODO[RFC 3546] Check whether empty certificates is possible, allowed, or excludes CertificateStatus + if (serverCertificate == null || serverCertificate.IsEmpty) + { + securityParameters.m_statusRequestVersion = 0; + } + } + + if (securityParameters.StatusRequestVersion > 0) + { + CertificateStatus certificateStatus = state.server.GetCertificateStatus(); + if (certificateStatus != null) + { + byte[] certificateStatusBody = GenerateCertificateStatus(state, certificateStatus); + handshake.SendMessage(HandshakeType.certificate_status, certificateStatusBody); + } + } + + byte[] serverKeyExchange = state.keyExchange.GenerateServerKeyExchange(); + if (serverKeyExchange != null) + { + handshake.SendMessage(HandshakeType.server_key_exchange, serverKeyExchange); + } + + if (state.serverCredentials != null) + { + state.certificateRequest = state.server.GetCertificateRequest(); + + if (null == state.certificateRequest) + { + /* + * For static agreement key exchanges, CertificateRequest is required since + * the client Certificate message is mandatory but can only be sent if the + * server requests it. + */ + if (!state.keyExchange.RequiresCertificateVerify) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + else + { + if (TlsUtilities.IsTlsV12(state.serverContext) + != (state.certificateRequest.SupportedSignatureAlgorithms != null)) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + state.certificateRequest = TlsUtilities.ValidateCertificateRequest(state.certificateRequest, state.keyExchange); + + TlsUtilities.EstablishServerSigAlgs(securityParameters, state.certificateRequest); + + if (ProtocolVersion.DTLSv12.Equals(securityParameters.NegotiatedVersion)) + { + TlsUtilities.TrackHashAlgorithms(handshake.HandshakeHash, securityParameters.ServerSigAlgs); + + if (state.serverContext.Crypto.HasAnyStreamVerifiers(securityParameters.ServerSigAlgs)) + { + handshake.HandshakeHash.ForceBuffering(); + } + } + else + { + if (state.serverContext.Crypto.HasAnyStreamVerifiersLegacy(state.certificateRequest.CertificateTypes)) + { + handshake.HandshakeHash.ForceBuffering(); + } + } + } + } + + handshake.HandshakeHash.SealHashAlgorithms(); + + if (null != state.certificateRequest) + { + byte[] certificateRequestBody = GenerateCertificateRequest(state, state.certificateRequest); + handshake.SendMessage(HandshakeType.certificate_request, certificateRequestBody); + } + + handshake.SendMessage(HandshakeType.server_hello_done, TlsUtilities.EmptyBytes); + + clientMessage = handshake.ReceiveMessage(); + + if (clientMessage.Type == HandshakeType.supplemental_data) + { + ProcessClientSupplementalData(state, clientMessage.Body); + clientMessage = handshake.ReceiveMessage(); + } + else + { + state.server.ProcessClientSupplementalData(null); + } + + if (state.certificateRequest == null) + { + state.keyExchange.SkipClientCredentials(); + } + else + { + if (clientMessage.Type == HandshakeType.certificate) + { + ProcessClientCertificate(state, clientMessage.Body); + clientMessage = handshake.ReceiveMessage(); + } + else + { + if (TlsUtilities.IsTlsV12(state.serverContext)) + { + /* + * RFC 5246 If no suitable certificate is available, the client MUST send a + * certificate message containing no certificates. + * + * NOTE: In previous RFCs, this was SHOULD instead of MUST. + */ + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + NotifyClientCertificate(state, Certificate.EmptyChain); + } + } + + if (clientMessage.Type == HandshakeType.client_key_exchange) + { + ProcessClientKeyExchange(state, clientMessage.Body); + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + securityParameters.m_sessionHash = TlsUtilities.GetCurrentPrfHash(handshake.HandshakeHash); + + TlsProtocol.EstablishMasterSecret(state.serverContext, state.keyExchange); + recordLayer.InitPendingEpoch(TlsUtilities.InitCipher(state.serverContext)); + + /* + * RFC 5246 7.4.8 This message is only sent following a client certificate that has signing + * capability (i.e., all certificates except those containing fixed Diffie-Hellman + * parameters). + */ + { + if (ExpectCertificateVerifyMessage(state)) + { + clientMessage = handshake.ReceiveMessageDelayedDigest(HandshakeType.certificate_verify); + byte[] certificateVerifyBody = clientMessage.Body; + ProcessCertificateVerify(state, certificateVerifyBody, handshake.HandshakeHash); + handshake.PrepareToFinish(); + handshake.UpdateHandshakeMessagesDigest(clientMessage); + } + else + { + handshake.PrepareToFinish(); + } + } + + // NOTE: Calculated exclusive of the actual Finished message from the client + securityParameters.m_peerVerifyData = TlsUtilities.CalculateVerifyData(state.serverContext, + handshake.HandshakeHash, false); + ProcessFinished(handshake.ReceiveMessageBody(HandshakeType.finished), securityParameters.PeerVerifyData); + + if (state.expectSessionTicket) + { + /* + * TODO[new_session_ticket] Check the server-side rules regarding the session ID, since the client + * is going to ignore any session ID it received once it sees the new_session_ticket message. + */ + + NewSessionTicket newSessionTicket = state.server.GetNewSessionTicket(); + byte[] newSessionTicketBody = GenerateNewSessionTicket(state, newSessionTicket); + handshake.SendMessage(HandshakeType.new_session_ticket, newSessionTicketBody); + } + + // NOTE: Calculated exclusive of the Finished message itself + securityParameters.m_localVerifyData = TlsUtilities.CalculateVerifyData(state.serverContext, + handshake.HandshakeHash, true); + handshake.SendMessage(HandshakeType.finished, securityParameters.LocalVerifyData); + + handshake.Finish(); + + state.sessionMasterSecret = securityParameters.MasterSecret; + + state.sessionParameters = new SessionParameters.Builder() + .SetCipherSuite(securityParameters.CipherSuite) + .SetExtendedMasterSecret(securityParameters.IsExtendedMasterSecret) + .SetLocalCertificate(securityParameters.LocalCertificate) + .SetMasterSecret(state.serverContext.Crypto.AdoptSecret(state.sessionMasterSecret)) + .SetNegotiatedVersion(securityParameters.NegotiatedVersion) + .SetPeerCertificate(securityParameters.PeerCertificate) + .SetPskIdentity(securityParameters.PskIdentity) + .SetSrpIdentity(securityParameters.SrpIdentity) + // TODO Consider filtering extensions that aren't relevant to resumed sessions + .SetServerExtensions(state.serverExtensions) + .Build(); + + state.tlsSession = TlsUtilities.ImportSession(state.tlsSession.SessionID, state.sessionParameters); + + securityParameters.m_tlsUnique = securityParameters.PeerVerifyData; + + state.serverContext.HandshakeComplete(state.server, state.tlsSession); + + recordLayer.InitHeartbeat(state.heartbeat, HeartbeatMode.peer_allowed_to_send == state.heartbeatPolicy); + + return new DtlsTransport(recordLayer, state.server.IgnoreCorruptDtlsRecords); + } + + /// + protected virtual byte[] GenerateCertificateRequest(ServerHandshakeState state, + CertificateRequest certificateRequest) + { + MemoryStream buf = new MemoryStream(); + certificateRequest.Encode(state.serverContext, buf); + return buf.ToArray(); + } + + /// + protected virtual byte[] GenerateCertificateStatus(ServerHandshakeState state, + CertificateStatus certificateStatus) + { + MemoryStream buf = new MemoryStream(); + // TODO[tls13] Ensure this cannot happen for (D)TLS1.3+ + certificateStatus.Encode(buf); + return buf.ToArray(); + } + + /// + protected virtual byte[] GenerateNewSessionTicket(ServerHandshakeState state, + NewSessionTicket newSessionTicket) + { + MemoryStream buf = new MemoryStream(); + newSessionTicket.Encode(buf); + return buf.ToArray(); + } + + /// + internal virtual byte[] GenerateServerHello(ServerHandshakeState state, DtlsRecordLayer recordLayer) + { + TlsServerContextImpl context = state.serverContext; + SecurityParameters securityParameters = context.SecurityParameters; + + ProtocolVersion server_version = state.server.GetServerVersion(); + { + if (!ProtocolVersion.Contains(context.ClientSupportedVersions, server_version)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + // TODO[dtls13] Read draft/RFC for guidance on the legacy_record_version field + //ProtocolVersion legacy_record_version = server_version.IsLaterVersionOf(ProtocolVersion.DTLSv12) + // ? ProtocolVersion.DTLSv12 + // : server_version; + + //recordLayer.SetWriteVersion(legacy_record_version); + securityParameters.m_negotiatedVersion = server_version; + + TlsUtilities.NegotiatedVersionDtlsServer(context); + } + + { + bool useGmtUnixTime = ProtocolVersion.DTLSv12.IsEqualOrLaterVersionOf(server_version) + && state.server.ShouldUseGmtUnixTime(); + + securityParameters.m_serverRandom = TlsProtocol.CreateRandomBlock(useGmtUnixTime, context); + + if (!server_version.Equals(ProtocolVersion.GetLatestDtls(state.server.GetProtocolVersions()))) + { + TlsUtilities.WriteDowngradeMarker(server_version, securityParameters.ServerRandom); + } + } + + { + int cipherSuite = ValidateSelectedCipherSuite(state.server.GetSelectedCipherSuite(), + AlertDescription.internal_error); + + if (!TlsUtilities.IsValidCipherSuiteSelection(state.offeredCipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, securityParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + } + + state.serverExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised( + state.server.GetServerExtensions()); + + state.server.GetServerExtensionsForConnection(state.serverExtensions); + + ProtocolVersion legacy_version = server_version; + if (server_version.IsLaterVersionOf(ProtocolVersion.DTLSv12)) + { + legacy_version = ProtocolVersion.DTLSv12; + + TlsExtensionsUtilities.AddSupportedVersionsExtensionServer(state.serverExtensions, server_version); + } + + /* + * RFC 5746 3.6. Server Behavior: Initial Handshake + */ + if (securityParameters.IsSecureRenegotiation) + { + byte[] renegExtData = TlsUtilities.GetExtensionData(state.serverExtensions, + ExtensionType.renegotiation_info); + bool noRenegExt = (null == renegExtData); + + if (noRenegExt) + { + /* + * Note that sending a "renegotiation_info" extension in response to a ClientHello + * containing only the SCSV is an explicit exception to the prohibition in RFC 5246, + * Section 7.4.1.4, on the server sending unsolicited extensions and is only allowed + * because the client is signaling its willingness to receive the extension via the + * TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. + */ + + /* + * If the secure_renegotiation flag is set to TRUE, the server MUST include an empty + * "renegotiation_info" extension in the ServerHello message. + */ + state.serverExtensions[ExtensionType.renegotiation_info] = TlsProtocol.CreateRenegotiationInfo( + TlsUtilities.EmptyBytes); + } + } + + /* + * RFC 7627 4. Clients and servers SHOULD NOT accept handshakes that do not use the extended + * master secret [..]. (and see 5.2, 5.3) + * + * RFC 8446 Appendix D. Because TLS 1.3 always hashes in the transcript up to the server + * Finished, implementations which support both TLS 1.3 and earlier versions SHOULD indicate + * the use of the Extended Master Secret extension in their APIs whenever TLS 1.3 is used. + */ + if (TlsUtilities.IsTlsV13(server_version)) + { + securityParameters.m_extendedMasterSecret = true; + } + else + { + securityParameters.m_extendedMasterSecret = state.offeredExtendedMasterSecret + && state.server.ShouldUseExtendedMasterSecret(); + + if (securityParameters.IsExtendedMasterSecret) + { + TlsExtensionsUtilities.AddExtendedMasterSecretExtension(state.serverExtensions); + } + else if (state.server.RequiresExtendedMasterSecret()) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + else if (state.resumedSession && !state.server.AllowLegacyResumption()) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + // Heartbeats + if (null != state.heartbeat || HeartbeatMode.peer_allowed_to_send == state.heartbeatPolicy) + { + TlsExtensionsUtilities.AddHeartbeatExtension(state.serverExtensions, + new HeartbeatExtension(state.heartbeatPolicy)); + } + + + + /* + * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous + * contents of this extension are irrelevant, and only the values in the new handshake + * messages are considered. + */ + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer( + state.serverExtensions); + securityParameters.m_applicationProtocolSet = true; + + /* + * TODO RFC 3546 2.3 If [...] the older session is resumed, then the server MUST ignore + * extensions appearing in the client hello, and send a server hello containing no + * extensions. + */ + if (state.serverExtensions.Count > 0) + { + securityParameters.m_encryptThenMac = TlsExtensionsUtilities.HasEncryptThenMacExtension( + state.serverExtensions); + + securityParameters.m_maxFragmentLength = EvaluateMaxFragmentLengthExtension(state.resumedSession, + state.clientExtensions, state.serverExtensions, AlertDescription.internal_error); + + securityParameters.m_truncatedHmac = TlsExtensionsUtilities.HasTruncatedHmacExtension(state.serverExtensions); + + /* + * TODO It's surprising that there's no provision to allow a 'fresh' CertificateStatus to be sent in + * a session resumption handshake. + */ + if (!state.resumedSession) + { + // TODO[tls13] See RFC 8446 4.4.2.1 + if (TlsUtilities.HasExpectedEmptyExtensionData(state.serverExtensions, + ExtensionType.status_request_v2, AlertDescription.internal_error)) + { + securityParameters.m_statusRequestVersion = 2; + } + else if (TlsUtilities.HasExpectedEmptyExtensionData(state.serverExtensions, + ExtensionType.status_request, AlertDescription.internal_error)) + { + securityParameters.m_statusRequestVersion = 1; + } + } + + state.expectSessionTicket = !state.resumedSession + && TlsUtilities.HasExpectedEmptyExtensionData(state.serverExtensions, ExtensionType.session_ticket, + AlertDescription.internal_error); + } + + ApplyMaxFragmentLengthExtension(recordLayer, securityParameters.MaxFragmentLength); + + + + ServerHello serverHello = new ServerHello(legacy_version, securityParameters.ServerRandom, + state.tlsSession.SessionID, securityParameters.CipherSuite, state.serverExtensions); + + MemoryStream buf = new MemoryStream(); + serverHello.Encode(state.serverContext, buf); + return buf.ToArray(); + } + + protected virtual void InvalidateSession(ServerHandshakeState state) + { + if (state.sessionMasterSecret != null) + { + state.sessionMasterSecret.Destroy(); + state.sessionMasterSecret = null; + } + + if (state.sessionParameters != null) + { + state.sessionParameters.Clear(); + state.sessionParameters = null; + } + + if (state.tlsSession != null) + { + state.tlsSession.Invalidate(); + state.tlsSession = null; + } + } + + /// + protected virtual void NotifyClientCertificate(ServerHandshakeState state, Certificate clientCertificate) + { + if (null == state.certificateRequest) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsUtilities.ProcessClientCertificate(state.serverContext, clientCertificate, state.keyExchange, + state.server); + } + + /// + protected virtual void ProcessClientCertificate(ServerHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + + Certificate.ParseOptions options = new Certificate.ParseOptions() + { + CertificateType = TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer( + state.clientExtensions, CertificateType.X509), + MaxChainLength = state.server.GetMaxCertificateChainLength(), + }; + + Certificate clientCertificate = Certificate.Parse(options, state.serverContext, buf, null); + + TlsProtocol.AssertEmpty(buf); + + NotifyClientCertificate(state, clientCertificate); + } + + /// + protected virtual void ProcessCertificateVerify(ServerHandshakeState state, byte[] body, + TlsHandshakeHash handshakeHash) + { + if (state.certificateRequest == null) + throw new InvalidOperationException(); + + MemoryStream buf = new MemoryStream(body, false); + + TlsServerContextImpl context = state.serverContext; + DigitallySigned certificateVerify = DigitallySigned.Parse(context, buf); + + TlsProtocol.AssertEmpty(buf); + + TlsUtilities.VerifyCertificateVerifyClient(context, state.certificateRequest, certificateVerify, handshakeHash); + } + + /// + protected virtual void ProcessClientHello(ServerHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + ClientHello clientHello = ClientHello.Parse(buf, Stream.Null); + ProcessClientHello(state, clientHello); + } + + /// + protected virtual void ProcessClientHello(ServerHandshakeState state, ClientHello clientHello) + { + // TODO Read RFCs for guidance on the expected record layer version number + ProtocolVersion legacy_version = clientHello.Version; + state.offeredCipherSuites = clientHello.CipherSuites; + + /* + * TODO RFC 3546 2.3 If [...] the older session is resumed, then the server MUST ignore + * extensions appearing in the client hello, and send a server hello containing no + * extensions. + */ + state.clientExtensions = clientHello.Extensions; + + + + TlsServerContextImpl context = state.serverContext; + SecurityParameters securityParameters = context.SecurityParameters; + + if (!legacy_version.IsDtls) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + context.SetRsaPreMasterSecretVersion(legacy_version); + + context.SetClientSupportedVersions( + TlsExtensionsUtilities.GetSupportedVersionsExtensionClient(state.clientExtensions)); + + ProtocolVersion client_version = legacy_version; + if (null == context.ClientSupportedVersions) + { + if (client_version.IsLaterVersionOf(ProtocolVersion.DTLSv12)) + { + client_version = ProtocolVersion.DTLSv12; + } + + context.SetClientSupportedVersions(client_version.DownTo(ProtocolVersion.DTLSv10)); + } + else + { + client_version = ProtocolVersion.GetLatestDtls(context.ClientSupportedVersions); + } + + if (!ProtocolVersion.SERVER_EARLIEST_SUPPORTED_DTLS.IsEqualOrEarlierVersionOf(client_version)) + throw new TlsFatalAlert(AlertDescription.protocol_version); + + context.SetClientVersion(client_version); + + state.server.NotifyClientVersion(context.ClientVersion); + + securityParameters.m_clientRandom = clientHello.Random; + + state.server.NotifyFallback(Arrays.Contains(state.offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)); + + state.server.NotifyOfferedCipherSuites(state.offeredCipherSuites); + + /* + * TODO[resumption] Check RFC 7627 5.4. for required behaviour + */ + + /* + * RFC 5746 3.6. Server Behavior: Initial Handshake + */ + { + /* + * RFC 5746 3.4. The client MUST include either an empty "renegotiation_info" extension, + * or the TLS_EMPTY_RENEGOTIATION_INFO_SCSV signaling cipher suite value in the + * ClientHello. Including both is NOT RECOMMENDED. + */ + + /* + * When a ClientHello is received, the server MUST check if it includes the + * TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. If it does, set the secure_renegotiation flag + * to TRUE. + */ + if (Arrays.Contains(state.offeredCipherSuites, CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV)) + { + securityParameters.m_secureRenegotiation = true; + } + + /* + * The server MUST check if the "renegotiation_info" extension is included in the + * ClientHello. + */ + byte[] renegExtData = TlsUtilities.GetExtensionData(state.clientExtensions, + ExtensionType.renegotiation_info); + if (renegExtData != null) + { + /* + * If the extension is present, set secure_renegotiation flag to TRUE. The + * server MUST then verify that the length of the "renegotiated_connection" + * field is zero, and if it is not, MUST abort the handshake. + */ + securityParameters.m_secureRenegotiation = true; + + if (!Arrays.ConstantTimeAreEqual(renegExtData, + TlsProtocol.CreateRenegotiationInfo(TlsUtilities.EmptyBytes))) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + } + + state.server.NotifySecureRenegotiation(securityParameters.IsSecureRenegotiation); + + state.offeredExtendedMasterSecret = TlsExtensionsUtilities.HasExtendedMasterSecretExtension( + state.clientExtensions); + + if (state.clientExtensions != null) + { + // NOTE: Validates the padding extension data, if present + TlsExtensionsUtilities.GetPaddingExtension(state.clientExtensions); + + securityParameters.m_clientServerNames = TlsExtensionsUtilities.GetServerNameExtensionClient( + state.clientExtensions); + + /* + * RFC 5246 7.4.1.4.1. Note: this extension is not meaningful for TLS versions prior + * to 1.2. Clients MUST NOT offer it if they are offering prior versions. + */ + if (TlsUtilities.IsSignatureAlgorithmsExtensionAllowed(client_version)) + { + TlsUtilities.EstablishClientSigAlgs(securityParameters, state.clientExtensions); + } + + securityParameters.m_clientSupportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension( + state.clientExtensions); + + // Heartbeats + { + HeartbeatExtension heartbeatExtension = TlsExtensionsUtilities.GetHeartbeatExtension( + state.clientExtensions); + if (null != heartbeatExtension) + { + if (HeartbeatMode.peer_allowed_to_send == heartbeatExtension.Mode) + { + state.heartbeat = state.server.GetHeartbeat(); + } + + state.heartbeatPolicy = state.server.GetHeartbeatPolicy(); + } + } + + state.server.ProcessClientExtensions(state.clientExtensions); + } + } + + /// + protected virtual void ProcessClientKeyExchange(ServerHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + state.keyExchange.ProcessClientKeyExchange(buf); + TlsProtocol.AssertEmpty(buf); + } + + /// + protected virtual void ProcessClientSupplementalData(ServerHandshakeState state, byte[] body) + { + MemoryStream buf = new MemoryStream(body, false); + var clientSupplementalData = TlsProtocol.ReadSupplementalDataMessage(buf); + state.server.ProcessClientSupplementalData(clientSupplementalData); + } + + protected virtual bool ExpectCertificateVerifyMessage(ServerHandshakeState state) + { + if (null == state.certificateRequest) + return false; + + Certificate clientCertificate = state.serverContext.SecurityParameters.PeerCertificate; + + return null != clientCertificate && !clientCertificate.IsEmpty + && (null == state.keyExchange || state.keyExchange.RequiresCertificateVerify); + } + + protected internal class ServerHandshakeState + { + internal TlsServer server = null; + internal TlsServerContextImpl serverContext = null; + internal TlsSession tlsSession = null; + internal SessionParameters sessionParameters = null; + internal TlsSecret sessionMasterSecret = null; + internal SessionParameters.Builder sessionParametersBuilder = null; + internal int[] offeredCipherSuites = null; + internal IDictionary clientExtensions = null; + internal IDictionary serverExtensions = null; + internal bool offeredExtendedMasterSecret = false; + internal bool resumedSession = false; + internal bool expectSessionTicket = false; + internal TlsKeyExchange keyExchange = null; + internal TlsCredentials serverCredentials = null; + internal CertificateRequest certificateRequest = null; + internal TlsHeartbeat heartbeat = null; + internal short heartbeatPolicy = HeartbeatMode.peer_not_allowed_to_send; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs.meta new file mode 100644 index 00000000..638efb44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9bb054da46d22b8459a6ce151879a2bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsServerProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs new file mode 100644 index 00000000..5e71d649 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs @@ -0,0 +1,242 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Net.Sockets; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DtlsTransport + : DatagramTransport + { + private readonly DtlsRecordLayer m_recordLayer; + private readonly bool m_ignoreCorruptRecords; + + internal DtlsTransport(DtlsRecordLayer recordLayer, bool ignoreCorruptRecords) + { + m_recordLayer = recordLayer; + m_ignoreCorruptRecords = ignoreCorruptRecords; + } + + /// + public virtual int GetReceiveLimit() + { + return m_recordLayer.GetReceiveLimit(); + } + + /// + public virtual int GetSendLimit() + { + return m_recordLayer.GetSendLimit(); + } + + /// + public virtual int Receive(byte[] buf, int off, int len, int waitMillis) + { + if (null == buf) + throw new ArgumentNullException("buf"); + if (off < 0 || off >= buf.Length) + throw new ArgumentException("invalid offset: " + off, "off"); + if (len < 0 || len > buf.Length - off) + throw new ArgumentException("invalid length: " + len, "len"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Receive(buf.AsSpan(off, len), waitMillis); +#else + if (waitMillis < 0) + throw new ArgumentException("cannot be negative", "waitMillis"); + + try + { + return m_recordLayer.Receive(buf, off, len, waitMillis); + } + catch (TlsFatalAlert fatalAlert) + { + if (m_ignoreCorruptRecords && AlertDescription.bad_record_mac == fatalAlert.AlertDescription) + return -1; + + m_recordLayer.Fail(fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (TlsTimeoutException e) + { + throw e; + } + catch (SocketException e) + { + if (TlsUtilities.IsTimeout(e)) + throw e; + + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + // TODO[tls-port] Can we support interrupted IO on .NET? + //catch (InterruptedIOException e) + //{ + // throw e; + //} + catch (IOException e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + public virtual int Receive(Span buffer, int waitMillis) + { + if (waitMillis < 0) + throw new ArgumentException("cannot be negative", nameof(waitMillis)); + + try + { + return m_recordLayer.Receive(buffer, waitMillis); + } + catch (TlsFatalAlert fatalAlert) + { + if (m_ignoreCorruptRecords && AlertDescription.bad_record_mac == fatalAlert.AlertDescription) + return -1; + + m_recordLayer.Fail(fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (TlsTimeoutException e) + { + throw e; + } + catch (SocketException e) + { + if (TlsUtilities.IsTimeout(e)) + throw e; + + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + // TODO[tls-port] Can we support interrupted IO on .NET? + //catch (InterruptedIOException e) + //{ + // throw e; + //} + catch (IOException e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } +#endif + + /// + public virtual void Send(byte[] buf, int off, int len) + { + if (null == buf) + throw new ArgumentNullException("buf"); + if (off < 0 || off >= buf.Length) + throw new ArgumentException("invalid offset: " + off, "off"); + if (len < 0 || len > buf.Length - off) + throw new ArgumentException("invalid length: " + len, "len"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Send(buf.AsSpan(off, len)); +#else + try + { + m_recordLayer.Send(buf, off, len); + } + catch (TlsFatalAlert fatalAlert) + { + m_recordLayer.Fail(fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (TlsTimeoutException e) + { + throw e; + } + catch (SocketException e) + { + if (TlsUtilities.IsTimeout(e)) + throw e; + + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + // TODO[tls-port] Can we support interrupted IO on .NET? + //catch (InterruptedIOException e) + //{ + // throw e; + //} + catch (IOException e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void Send(ReadOnlySpan buffer) + { + try + { + m_recordLayer.Send(buffer); + } + catch (TlsFatalAlert fatalAlert) + { + m_recordLayer.Fail(fatalAlert.AlertDescription); + throw fatalAlert; + } + catch (TlsTimeoutException e) + { + throw e; + } + catch (SocketException e) + { + if (TlsUtilities.IsTimeout(e)) + throw e; + + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + // TODO[tls-port] Can we support interrupted IO on .NET? + //catch (InterruptedIOException e) + //{ + // throw e; + //} + catch (IOException e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw e; + } + catch (Exception e) + { + m_recordLayer.Fail(AlertDescription.internal_error); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } +#endif + + /// + public virtual void Close() + { + m_recordLayer.Close(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs.meta new file mode 100644 index 00000000..6e6c5da6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0653589165f2d97469c6e712164e76ee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsTransport.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs new file mode 100644 index 00000000..de564d97 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs @@ -0,0 +1,93 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class DtlsVerifier + { + private static TlsMac CreateCookieMac(TlsCrypto crypto) + { + TlsMac mac = crypto.CreateHmac(MacAlgorithm.hmac_sha256); + + byte[] secret = new byte[mac.MacLength]; + crypto.SecureRandom.NextBytes(secret); + + mac.SetKey(secret, 0, secret.Length); + + return mac; + } + + private readonly TlsMac m_cookieMac; + private readonly TlsMacSink m_cookieMacSink; + + public DtlsVerifier(TlsCrypto crypto) + { + this.m_cookieMac = CreateCookieMac(crypto); + this.m_cookieMacSink = new TlsMacSink(m_cookieMac); + } + + public virtual DtlsRequest VerifyRequest(byte[] clientID, byte[] data, int dataOff, int dataLen, + DatagramSender sender) + { + lock (this) + { + bool resetCookieMac = true; + + try + { + m_cookieMac.Update(clientID, 0, clientID.Length); + + DtlsRequest request = DtlsReliableHandshake.ReadClientRequest(data, dataOff, dataLen, + m_cookieMacSink); + if (null != request) + { + byte[] expectedCookie = m_cookieMac.CalculateMac(); + resetCookieMac = false; + + // TODO Consider stricter HelloVerifyRequest protocol + //switch (request.MessageSeq) + //{ + //case 0: + //{ + // DtlsReliableHandshake.SendHelloVerifyRequest(sender, request.RecordSeq, expectedCookie); + // break; + //} + //case 1: + //{ + // if (Arrays.ConstantTimeAreEqual(expectedCookie, request.ClientHello.Cookie)) + // return request; + + // break; + //} + //} + + if (Arrays.ConstantTimeAreEqual(expectedCookie, request.ClientHello.Cookie)) + return request; + + DtlsReliableHandshake.SendHelloVerifyRequest(sender, request.RecordSeq, expectedCookie); + } + } + catch (IOException) + { + // Ignore + } + finally + { + if (resetCookieMac) + { + m_cookieMac.Reset(); + } + } + + return null; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs.meta new file mode 100644 index 00000000..d189febc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e147374dcec297746b3725981e6d3b11 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/DtlsVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs new file mode 100644 index 00000000..56068ec4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 4492 5.4 + public abstract class ECCurveType + { + /** + * Indicates the elliptic curve domain parameters are conveyed verbosely, and the + * underlying finite field is a prime field. + */ + public const short explicit_prime = 1; + + /** + * Indicates the elliptic curve domain parameters are conveyed verbosely, and the + * underlying finite field is a characteristic-2 field. + */ + public const short explicit_char2 = 2; + + /** + * Indicates that a named curve is used. This option SHOULD be used when applicable. + */ + public const short named_curve = 3; + + /* + * Values 248 through 255 are reserved for private use. + */ + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs.meta new file mode 100644 index 00000000..974e6d23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b61c6f7c29cb864b906a538241ad973 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECCurveType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs new file mode 100644 index 00000000..6d520fc1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 4492 5.1.2 + public abstract class ECPointFormat + { + public const short uncompressed = 0; + public const short ansiX962_compressed_prime = 1; + public const short ansiX962_compressed_char2 = 2; + + /* + * reserved (248..255) + */ + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs.meta new file mode 100644 index 00000000..62e50d92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ad17c05a54768714dbc0949b2dede87e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ECPointFormat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs new file mode 100644 index 00000000..f1aac722 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class EncryptionAlgorithm + { + public const int NULL = 0; + public const int RC4_40 = 1; + public const int RC4_128 = 2; + public const int RC2_CBC_40 = 3; + public const int IDEA_CBC = 4; + public const int DES40_CBC = 5; + public const int DES_CBC = 6; + public const int cls_3DES_EDE_CBC = 7; + + /* + * RFC 3268 + */ + public const int AES_128_CBC = 8; + public const int AES_256_CBC = 9; + + /* + * RFC 5289 + */ + public const int AES_128_GCM = 10; + public const int AES_256_GCM = 11; + + /* + * RFC 5932 + */ + public const int CAMELLIA_128_CBC = 12; + public const int CAMELLIA_256_CBC = 13; + + /* + * RFC 4162 + */ + public const int SEED_CBC = 14; + + /* + * RFC 6655 + */ + public const int AES_128_CCM = 15; + public const int AES_128_CCM_8 = 16; + public const int AES_256_CCM = 17; + public const int AES_256_CCM_8 = 18; + + /* + * RFC 6367 + */ + public const int CAMELLIA_128_GCM = 19; + public const int CAMELLIA_256_GCM = 20; + + /* + * RFC 7905 + */ + public const int CHACHA20_POLY1305 = 21; + + /* + * RFC 6209 + */ + public const int ARIA_128_CBC = 22; + public const int ARIA_256_CBC = 23; + public const int ARIA_128_GCM = 24; + public const int ARIA_256_GCM = 25; + + /* + * RFC 8998 + */ + public const int SM4_CCM = 26; + public const int SM4_GCM = 27; + + /* + * GMT 0024-2014 + */ + public const int SM4_CBC = 28; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs.meta new file mode 100644 index 00000000..b2349ea8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 623ff661714ef774e9e85679139f63c6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/EncryptionAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs new file mode 100644 index 00000000..4acddf5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5705 + public abstract class ExporterLabel + { + /* + * RFC 5246 + */ + public const string client_finished = "client finished"; + public const string server_finished = "server finished"; + public const string master_secret = "master secret"; + public const string key_expansion = "key expansion"; + + /* + * RFC 5216 + */ + public const string client_EAP_encryption = "client EAP encryption"; + + /* + * RFC 5281 + */ + public const string ttls_keying_material = "ttls keying material"; + public const string ttls_challenge = "ttls challenge"; + + /* + * RFC 5764 + */ + public const string dtls_srtp = "EXTRACTOR-dtls_srtp"; + + /* + * RFC 7627 + */ + public const string extended_master_secret = "extended master secret"; + + /* + * draft-ietf-tokbind-protocol-16 + */ + public const string token_binding = "EXPORTER-Token-Binding"; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs.meta new file mode 100644 index 00000000..9ab0a5fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 57c42687da5b4f64aa15e87a26506b86 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExporterLabel.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs new file mode 100644 index 00000000..16c7f485 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs @@ -0,0 +1,291 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class ExtensionType + { + /* + * RFC 2546 2.3. + */ + public const int server_name = 0; + public const int max_fragment_length = 1; + public const int client_certificate_url = 2; + public const int trusted_ca_keys = 3; + public const int truncated_hmac = 4; + public const int status_request = 5; + + /* + * RFC 4681 + */ + public const int user_mapping = 6; + + /* + * RFC 5878 + */ + public const int client_authz = 7; + public const int server_authz = 8; + + /* + * RFC 6091 + */ + public const int cert_type = 9; + + /* + * RFC 7919 (originally 'elliptic_curves' from RFC 4492) + */ + public const int supported_groups = 10; + + /* + * RFC 4492 5.1. + */ + public const int ec_point_formats = 11; + + /* + * RFC 5054 2.8.1. + */ + public const int srp = 12; + + /* + * RFC 5246 7.4.1.4. + */ + public const int signature_algorithms = 13; + + /* + * RFC 5764 9. + */ + public const int use_srtp = 14; + + /* + * RFC 6520 6. + */ + public const int heartbeat = 15; + + /* + * RFC 7301 + */ + public const int application_layer_protocol_negotiation = 16; + + /* + * RFC 6961 + */ + public const int status_request_v2 = 17; + + /* + * RFC 6962 + */ + public const int signed_certificate_timestamp = 18; + + /* + * RFC 7250 + */ + public const int client_certificate_type = 19; + public const int server_certificate_type = 20; + + /* + * RFC 7685 + */ + public const int padding = 21; + + /* + * RFC 7366 + */ + public const int encrypt_then_mac = 22; + + /* + * RFC 7627 + */ + public const int extended_master_secret = 23; + + /* + * RFC 8472 + */ + public const int token_binding = 24; + + /* + * RFC 7924 + */ + public const int cached_info = 25; + + /* + * RFC 8879 + */ + public const int compress_certificate = 27; + + /* + * RFC 8449 + */ + public const int record_size_limit = 28; + + /* + * RFC 5077 7. + */ + public const int session_ticket = 35; + + /* + * RFC 8446 + */ + public const int pre_shared_key = 41; + public const int early_data = 42; + public const int supported_versions = 43; + public const int cookie = 44; + public const int psk_key_exchange_modes = 45; + public const int certificate_authorities = 47; + public const int oid_filters = 48; + public const int post_handshake_auth = 49; + public const int signature_algorithms_cert = 50; + public const int key_share = 51; + + /* + * RFC 5746 3.2. + */ + public const int renegotiation_info = 0xff01; + + public static string GetName(int extensionType) + { + switch (extensionType) + { + case server_name: + return "server_name"; + case max_fragment_length: + return "max_fragment_length"; + case client_certificate_url: + return "client_certificate_url"; + case trusted_ca_keys: + return "trusted_ca_keys"; + case truncated_hmac: + return "truncated_hmac"; + case status_request: + return "status_request"; + case user_mapping: + return "user_mapping"; + case client_authz: + return "client_authz"; + case server_authz: + return "server_authz"; + case cert_type: + return "cert_type"; + case supported_groups: + return "supported_groups"; + case ec_point_formats: + return "ec_point_formats"; + case srp: + return "srp"; + case signature_algorithms: + return "signature_algorithms"; + case use_srtp: + return "use_srtp"; + case heartbeat: + return "heartbeat"; + case application_layer_protocol_negotiation: + return "application_layer_protocol_negotiation"; + case status_request_v2: + return "status_request_v2"; + case signed_certificate_timestamp: + return "signed_certificate_timestamp"; + case client_certificate_type: + return "client_certificate_type"; + case server_certificate_type: + return "server_certificate_type"; + case padding: + return "padding"; + case encrypt_then_mac: + return "encrypt_then_mac"; + case extended_master_secret: + return "extended_master_secret"; + case token_binding: + return "token_binding"; + case cached_info: + return "cached_info"; + case compress_certificate: + return "compress_certificate"; + case record_size_limit: + return "record_size_limit"; + case session_ticket: + return "session_ticket"; + case pre_shared_key: + return "pre_shared_key"; + case early_data: + return "early_data"; + case supported_versions: + return "supported_versions"; + case cookie: + return "cookie"; + case psk_key_exchange_modes: + return "psk_key_exchange_modes"; + case certificate_authorities: + return "certificate_authorities"; + case oid_filters: + return "oid_filters"; + case post_handshake_auth: + return "post_handshake_auth"; + case signature_algorithms_cert: + return "signature_algorithms_cert"; + case key_share: + return "key_share"; + case renegotiation_info: + return "renegotiation_info"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(int extensionType) + { + return GetName(extensionType) + "(" + extensionType + ")"; + } + + public static bool IsRecognized(int extensionType) + { + switch (extensionType) + { + case server_name: + case max_fragment_length: + case client_certificate_url: + case trusted_ca_keys: + case truncated_hmac: + case status_request: + case user_mapping: + case client_authz: + case server_authz: + case cert_type: + case supported_groups: + case ec_point_formats: + case srp: + case signature_algorithms: + case use_srtp: + case heartbeat: + case application_layer_protocol_negotiation: + case status_request_v2: + case signed_certificate_timestamp: + case client_certificate_type: + case server_certificate_type: + case padding: + case encrypt_then_mac: + case extended_master_secret: + case token_binding: + case cached_info: + case compress_certificate: + case record_size_limit: + case session_ticket: + case pre_shared_key: + case early_data: + case supported_versions: + case cookie: + case psk_key_exchange_modes: + case certificate_authorities: + case oid_filters: + case post_handshake_auth: + case signature_algorithms_cert: + case key_share: + case renegotiation_info: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs.meta new file mode 100644 index 00000000..82b5dfea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c380caa5f336aa04998a35e2ebbc7ba8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ExtensionType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs new file mode 100644 index 00000000..cbfaa7d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + // TODO Rewrite without MemoryStream + public sealed class HandshakeMessageInput + : MemoryStream + { + private readonly int m_offset; + + internal HandshakeMessageInput(byte[] buf, int offset, int length) + : base(buf, offset, length, false, true) + { + m_offset = offset; + } + + public void UpdateHash(TlsHash hash) + { + WriteTo(new TlsHashSink(hash)); + } + + internal void UpdateHashPrefix(TlsHash hash, int bindersSize) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + hash.Update(buf, m_offset, count - bindersSize); + } + + internal void UpdateHashSuffix(TlsHash hash, int bindersSize) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + hash.Update(buf, m_offset + count - bindersSize, bindersSize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs.meta new file mode 100644 index 00000000..d31259e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6c9f87e0bc1490e45b2610f69d7a7ea2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageInput.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs new file mode 100644 index 00000000..6142c002 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs @@ -0,0 +1,94 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal sealed class HandshakeMessageOutput + : MemoryStream + { + internal static int GetLength(int bodyLength) + { + return 4 + bodyLength; + } + + /// + internal static void Send(TlsProtocol protocol, short handshakeType, byte[] body) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(handshakeType, body.Length); + message.Write(body, 0, body.Length); + message.Send(protocol); + } + + /// + internal HandshakeMessageOutput(short handshakeType) + : this(handshakeType, 60) + { + } + + /// + internal HandshakeMessageOutput(short handshakeType, int bodyLength) + : base(GetLength(bodyLength)) + { + TlsUtilities.CheckUint8(handshakeType); + TlsUtilities.WriteUint8(handshakeType, this); + // Reserve space for length + Seek(3L, SeekOrigin.Current); + } + + /// + internal void Send(TlsProtocol protocol) + { + // Patch actual length back in + int bodyLength = Convert.ToInt32(Length) - 4; + TlsUtilities.CheckUint24(bodyLength); + + Seek(1L, SeekOrigin.Begin); + TlsUtilities.WriteUint24(bodyLength, this); + + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + protocol.WriteHandshakeMessage(buf, 0, count); + + Dispose(); + } + + internal void PrepareClientHello(TlsHandshakeHash handshakeHash, int bindersSize) + { + // Patch actual length back in + int bodyLength = Convert.ToInt32(Length) - 4 + bindersSize; + TlsUtilities.CheckUint24(bodyLength); + + Seek(1L, SeekOrigin.Begin); + TlsUtilities.WriteUint24(bodyLength, this); + + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + handshakeHash.Update(buf, 0, count); + + Seek(0L, SeekOrigin.End); + } + + internal void SendClientHello(TlsClientProtocol clientProtocol, TlsHandshakeHash handshakeHash, int bindersSize) + { + byte[] buf = GetBuffer(); + int count = Convert.ToInt32(Length); + + if (bindersSize > 0) + { + handshakeHash.Update(buf, count - bindersSize, bindersSize); + } + + clientProtocol.WriteHandshakeMessage(buf, 0, count); + + Dispose(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs.meta new file mode 100644 index 00000000..251b9bc9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 79454d101bb401b4ca9d43f40466cb82 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeMessageOutput.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs new file mode 100644 index 00000000..44c3258e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs @@ -0,0 +1,143 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class HandshakeType + { + /* + * RFC 2246 7.4 + */ + public const short hello_request = 0; + public const short client_hello = 1; + public const short server_hello = 2; + public const short certificate = 11; + public const short server_key_exchange = 12; + public const short certificate_request = 13; + public const short server_hello_done = 14; + public const short certificate_verify = 15; + public const short client_key_exchange = 16; + public const short finished = 20; + + /* + * RFC 3546 2.4 + */ + public const short certificate_url = 21; + public const short certificate_status = 22; + + /* + * (DTLS) RFC 4347 4.3.2 + */ + public const short hello_verify_request = 3; + + /* + * RFC 4680 + */ + public const short supplemental_data = 23; + + /* + * RFC 8446 + */ + public const short new_session_ticket = 4; + public const short end_of_early_data = 5; + public const short hello_retry_request = 6; + public const short encrypted_extensions = 8; + public const short key_update = 24; + public const short message_hash = 254; + + /* + * RFC 8879 + */ + public const short compressed_certificate = 25; + + public static string GetName(short handshakeType) + { + switch (handshakeType) + { + case hello_request: + return "hello_request"; + case client_hello: + return "client_hello"; + case server_hello: + return "server_hello"; + case certificate: + return "certificate"; + case server_key_exchange: + return "server_key_exchange"; + case certificate_request: + return "certificate_request"; + case server_hello_done: + return "server_hello_done"; + case certificate_verify: + return "certificate_verify"; + case client_key_exchange: + return "client_key_exchange"; + case finished: + return "finished"; + case certificate_url: + return "certificate_url"; + case certificate_status: + return "certificate_status"; + case hello_verify_request: + return "hello_verify_request"; + case supplemental_data: + return "supplemental_data"; + case new_session_ticket: + return "new_session_ticket"; + case end_of_early_data: + return "end_of_early_data"; + case hello_retry_request: + return "hello_retry_request"; + case encrypted_extensions: + return "encrypted_extensions"; + case key_update: + return "key_update"; + case message_hash: + return "message_hash"; + case compressed_certificate: + return "compressed_certificate"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short handshakeType) + { + return GetName(handshakeType) + "(" + handshakeType + ")"; + } + + public static bool IsRecognized(short handshakeType) + { + switch (handshakeType) + { + case hello_request: + case client_hello: + case server_hello: + case certificate: + case server_key_exchange: + case certificate_request: + case server_hello_done: + case certificate_verify: + case client_key_exchange: + case finished: + case certificate_url: + case certificate_status: + case hello_verify_request: + case supplemental_data: + case new_session_ticket: + case end_of_early_data: + case hello_retry_request: + case encrypted_extensions: + case key_update: + case message_hash: + case compressed_certificate: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs.meta new file mode 100644 index 00000000..8d271cab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa3ad6dc8df46834db774df0479c2f72 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HandshakeType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs new file mode 100644 index 00000000..69aa8853 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5246 7.4.1.4.1 + public abstract class HashAlgorithm + { + public const short none = 0; + public const short md5 = 1; + public const short sha1 = 2; + public const short sha224 = 3; + public const short sha256 = 4; + public const short sha384 = 5; + public const short sha512 = 6; + + /* + * RFC 8422 + */ + public const short Intrinsic = 8; + + public static string GetName(short hashAlgorithm) + { + switch (hashAlgorithm) + { + case none: + return "none"; + case md5: + return "md5"; + case sha1: + return "sha1"; + case sha224: + return "sha224"; + case sha256: + return "sha256"; + case sha384: + return "sha384"; + case sha512: + return "sha512"; + case Intrinsic: + return "Intrinsic"; + default: + return "UNKNOWN"; + } + } + + public static int GetOutputSize(short hashAlgorithm) + { + switch (hashAlgorithm) + { + case md5: + return 16; + case sha1: + return 20; + case sha224: + return 28; + case sha256: + return 32; + case sha384: + return 48; + case sha512: + return 64; + default: + return -1; + } + } + + public static string GetText(short hashAlgorithm) + { + return GetName(hashAlgorithm) + "(" + hashAlgorithm + ")"; + } + + public static bool IsPrivate(short hashAlgorithm) + { + return 224 <= hashAlgorithm && hashAlgorithm <= 255; + } + + public static bool IsRecognized(short hashAlgorithm) + { + switch (hashAlgorithm) + { + case md5: + case sha1: + case sha224: + case sha256: + case sha384: + case sha512: + case Intrinsic: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs.meta new file mode 100644 index 00000000..8368a7a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 64aa2474b5e6ec84da8a3d0470889159 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HashAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs new file mode 100644 index 00000000..7f8d1c21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class HeartbeatExtension + { + private readonly short m_mode; + + public HeartbeatExtension(short mode) + { + if (!HeartbeatMode.IsValid(mode)) + throw new ArgumentException("not a valid HeartbeatMode value", "mode"); + + this.m_mode = mode; + } + + public short Mode + { + get { return m_mode; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_mode, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static HeartbeatExtension Parse(Stream input) + { + short mode = TlsUtilities.ReadUint8(input); + if (!HeartbeatMode.IsValid(mode)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return new HeartbeatExtension(mode); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs.meta new file mode 100644 index 00000000..7d011f85 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bffd887429de2354189a4259dccb6e6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatExtension.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs new file mode 100644 index 00000000..d064787a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs @@ -0,0 +1,122 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class HeartbeatMessage + { + public static HeartbeatMessage Create(TlsContext context, short type, byte[] payload) + { + return Create(context, type, payload, 16); + } + + public static HeartbeatMessage Create(TlsContext context, short type, byte[] payload, int paddingLength) + { + byte[] padding = context.NonceGenerator.GenerateNonce(paddingLength); + + return new HeartbeatMessage(type, payload, padding); + } + + private readonly short m_type; + private readonly byte[] m_payload; + private readonly byte[] m_padding; + + public HeartbeatMessage(short type, byte[] payload, byte[] padding) + { + if (!HeartbeatMessageType.IsValid(type)) + throw new ArgumentException("not a valid HeartbeatMessageType value", "type"); + if (null == payload || payload.Length >= (1 << 16)) + throw new ArgumentException("must have length < 2^16", "payload"); + if (null == padding || padding.Length < 16) + throw new ArgumentException("must have length >= 16", "padding"); + + this.m_type = type; + this.m_payload = payload; + this.m_padding = padding; + } + + public int PaddingLength + { + /* + * RFC 6520 4. The padding of a received HeartbeatMessage message MUST be ignored + */ + get { return m_padding.Length; } + } + + public byte[] Payload + { + get { return m_payload; } + } + + public short Type + { + get { return m_type; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_type, output); + + TlsUtilities.CheckUint16(m_payload.Length); + TlsUtilities.WriteUint16(m_payload.Length, output); + output.Write(m_payload, 0, m_payload.Length); + + output.Write(m_padding, 0, m_padding.Length); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static HeartbeatMessage Parse(Stream input) + { + short type = TlsUtilities.ReadUint8(input); + if (!HeartbeatMessageType.IsValid(type)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + int payload_length = TlsUtilities.ReadUint16(input); + byte[] payloadBuffer = Streams.ReadAll(input); + + byte[] payload = GetPayload(payloadBuffer, payload_length); + if (null == payload) + { + /* + * RFC 6520 4. If the payload_length of a received HeartbeatMessage is too large, the received + * HeartbeatMessage MUST be discarded silently. + */ + return null; + } + + byte[] padding = GetPadding(payloadBuffer, payload_length); + + return new HeartbeatMessage(type, payload, padding); + } + + private static byte[] GetPayload(byte[] payloadBuffer, int payloadLength) + { + /* + * RFC 6520 4. The padding_length MUST be at least 16. + */ + int maxPayloadLength = payloadBuffer.Length - 16; + if (payloadLength > maxPayloadLength) + return null; + + return Arrays.CopyOf(payloadBuffer, payloadLength); + } + + private static byte[] GetPadding(byte[] payloadBuffer, int payloadLength) + { + return TlsUtilities.CopyOfRangeExact(payloadBuffer, payloadLength, payloadBuffer.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs.meta new file mode 100644 index 00000000..254c9d5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 86e7fb6f4fc526f4682b1f410aefd2bb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs new file mode 100644 index 00000000..f7228c9e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 6520 3. + public abstract class HeartbeatMessageType + { + public const short heartbeat_request = 1; + public const short heartbeat_response = 2; + + public static string GetName(short heartbeatMessageType) + { + switch (heartbeatMessageType) + { + case heartbeat_request: + return "heartbeat_request"; + case heartbeat_response: + return "heartbeat_response"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short heartbeatMessageType) + { + return GetName(heartbeatMessageType) + "(" + heartbeatMessageType + ")"; + } + + public static bool IsValid(short heartbeatMessageType) + { + return heartbeatMessageType >= heartbeat_request && heartbeatMessageType <= heartbeat_response; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs.meta new file mode 100644 index 00000000..1cddc033 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3c73c503f0be1de4db06969f54652ab5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMessageType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs new file mode 100644 index 00000000..ce820dc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /* + * RFC 6520 + */ + public abstract class HeartbeatMode + { + public const short peer_allowed_to_send = 1; + public const short peer_not_allowed_to_send = 2; + + public static string GetName(short heartbeatMode) + { + switch (heartbeatMode) + { + case peer_allowed_to_send: + return "peer_allowed_to_send"; + case peer_not_allowed_to_send: + return "peer_not_allowed_to_send"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short heartbeatMode) + { + return GetName(heartbeatMode) + "(" + heartbeatMode + ")"; + } + + public static bool IsValid(short heartbeatMode) + { + return heartbeatMode >= peer_allowed_to_send && heartbeatMode <= peer_not_allowed_to_send; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs.meta new file mode 100644 index 00000000..20b560dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a896cfa538726d49bbb1b2d8fc80aef +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/HeartbeatMode.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs new file mode 100644 index 00000000..6519c713 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs @@ -0,0 +1,39 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 6066 + public abstract class IdentifierType + { + public const short pre_agreed = 0; + public const short key_sha1_hash = 1; + public const short x509_name = 2; + public const short cert_sha1_hash = 3; + + public static string GetName(short identifierType) + { + switch (identifierType) + { + case pre_agreed: + return "pre_agreed"; + case key_sha1_hash: + return "key_sha1_hash"; + case x509_name: + return "x509_name"; + case cert_sha1_hash: + return "cert_sha1_hash"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short identifierType) + { + return GetName(identifierType) + "(" + identifierType + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs.meta new file mode 100644 index 00000000..9ff9c643 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cb5ae36b35c7e724492c3993a9d43f13 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/IdentifierType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs new file mode 100644 index 00000000..43b0fe2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class KeyExchangeAlgorithm + { + /* + * NOTE: We interpret TLS 1.3 cipher suites as having a NULL key exchange + */ + public const int NULL = 0; + + public const int RSA = 1; + public const int RSA_EXPORT = 2; + public const int DHE_DSS = 3; + public const int DHE_DSS_EXPORT = 4; + public const int DHE_RSA = 5; + public const int DHE_RSA_EXPORT = 6; + public const int DH_DSS = 7; + public const int DH_DSS_EXPORT = 8; + public const int DH_RSA = 9; + public const int DH_RSA_EXPORT = 10; + public const int DH_anon = 11; + public const int DH_anon_EXPORT = 12; + + /* + * RFC 4279 + */ + public const int PSK = 13; + public const int DHE_PSK = 14; + public const int RSA_PSK = 15; + + /* + * RFC 4429 + */ + public const int ECDH_ECDSA = 16; + public const int ECDHE_ECDSA = 17; + public const int ECDH_RSA = 18; + public const int ECDHE_RSA = 19; + public const int ECDH_anon = 20; + + /* + * RFC 5054 + */ + public const int SRP = 21; + public const int SRP_DSS = 22; + public const int SRP_RSA = 23; + + /* + * RFC 5489 + */ + public const int ECDHE_PSK = 24; + + /* + * GMT 0024-2014 + */ + public const int SM2 = 25; + + public static bool IsAnonymous(int keyExchangeAlgorithm) + { + switch (keyExchangeAlgorithm) + { + case DH_anon: + case DH_anon_EXPORT: + case ECDH_anon: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs.meta new file mode 100644 index 00000000..6410ea45 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41bbb279bf74d914bbae13c0f9c21dbb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyExchangeAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs new file mode 100644 index 00000000..1ee5b228 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs @@ -0,0 +1,66 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class KeyShareEntry + { + private static bool CheckKeyExchangeLength(int length) + { + return 0 < length && length < (1 << 16); + } + + private readonly int m_namedGroup; + private readonly byte[] m_keyExchange; + + /// + /// + public KeyShareEntry(int namedGroup, byte[] keyExchange) + { + if (!TlsUtilities.IsValidUint16(namedGroup)) + throw new ArgumentException("should be a uint16", "namedGroup"); + if (null == keyExchange) + throw new ArgumentNullException("keyExchange"); + if (!CheckKeyExchangeLength(keyExchange.Length)) + throw new ArgumentException("must have length from 1 to (2^16 - 1)", "keyExchange"); + + this.m_namedGroup = namedGroup; + this.m_keyExchange = keyExchange; + } + + /// + public int NamedGroup + { + get { return m_namedGroup; } + } + + public byte[] KeyExchange + { + get { return m_keyExchange; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint16(NamedGroup, output); + TlsUtilities.WriteOpaque16(KeyExchange, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static KeyShareEntry Parse(Stream input) + { + int namedGroup = TlsUtilities.ReadUint16(input); + byte[] keyExchange = TlsUtilities.ReadOpaque16(input, 1); + return new KeyShareEntry(namedGroup, keyExchange); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs.meta new file mode 100644 index 00000000..d08fa45a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a2160d7939ba2f44daf2190c2e7b0f92 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyShareEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs new file mode 100644 index 00000000..bb7e0511 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs @@ -0,0 +1,38 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 8446 4.6.3 + public abstract class KeyUpdateRequest + { + public const short update_not_requested = 0; + public const short update_requested = 1; + + public static string GetName(short keyUpdateRequest) + { + switch (keyUpdateRequest) + { + case update_not_requested: + return "update_not_requested"; + case update_requested: + return "update_requested"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short keyUpdateRequest) + { + return GetName(keyUpdateRequest) + "(" + keyUpdateRequest + ")"; + } + + public static bool IsValid(short keyUpdateRequest) + { + return keyUpdateRequest >= update_not_requested && keyUpdateRequest <= update_requested; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs.meta new file mode 100644 index 00000000..23909a3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d088ed1d8cbf195409361ece35439919 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/KeyUpdateRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs new file mode 100644 index 00000000..45a71512 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 2246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class MacAlgorithm + { + public const int cls_null = 0; + public const int md5 = 1; + public const int sha = 2; + + /* + * RFC 5246 + */ + public const int hmac_md5 = md5; + public const int hmac_sha1 = sha; + public const int hmac_sha256 = 3; + public const int hmac_sha384 = 4; + public const int hmac_sha512 = 5; + + public static string GetName(int macAlgorithm) + { + switch (macAlgorithm) + { + case cls_null: + return "null"; + case hmac_md5: + return "hmac_md5"; + case hmac_sha1: + return "hmac_sha1"; + case hmac_sha256: + return "hmac_sha256"; + case hmac_sha384: + return "hmac_sha384"; + case hmac_sha512: + return "hmac_sha512"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(int macAlgorithm) + { + return GetName(macAlgorithm) + "(" + macAlgorithm + ")"; + } + + public static bool IsHmac(int macAlgorithm) + { + switch (macAlgorithm) + { + case hmac_md5: + case hmac_sha1: + case hmac_sha256: + case hmac_sha384: + case hmac_sha512: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs.meta new file mode 100644 index 00000000..bed15196 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a6bc247babc95c24fadf878080156582 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MacAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs new file mode 100644 index 00000000..f61878d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class MaxFragmentLength + { + /* + * RFC 3546 3.2. + */ + public const short pow2_9 = 1; + public const short pow2_10 = 2; + public const short pow2_11 = 3; + public const short pow2_12 = 4; + + public static bool IsValid(short maxFragmentLength) + { + return maxFragmentLength >= pow2_9 && maxFragmentLength <= pow2_12; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs.meta new file mode 100644 index 00000000..dc4a7573 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: be254619a6b787f4e89b56e3edcfc419 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/MaxFragmentLength.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs new file mode 100644 index 00000000..f43fb467 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class NameType + { + /* + * RFC 3546 3.1. + */ + public const short host_name = 0; + + public static string GetName(short nameType) + { + switch (nameType) + { + case host_name: + return "host_name"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short nameType) + { + return GetName(nameType) + "(" + nameType + ")"; + } + + public static bool IsRecognized(short nameType) + { + return host_name == nameType; + } + + public static bool IsValid(short nameType) + { + return TlsUtilities.IsValidUint8(nameType); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs.meta new file mode 100644 index 00000000..4836774d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: caae76b16a9529c468d8014557177fd4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NameType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs new file mode 100644 index 00000000..d989cac1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs @@ -0,0 +1,420 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 7919 + public abstract class NamedGroup + { + /* + * RFC 4492 5.1.1 + *

    + * The named curves defined here are those specified in SEC 2 [13]. Note that many of these curves + * are also recommended in ANSI X9.62 [7] and FIPS 186-2 [11]. Values 0xFE00 through 0xFEFF are + * reserved for private use. Values 0xFF01 and 0xFF02 indicate that the client supports arbitrary + * prime and characteristic-2 curves, respectively (the curve parameters must be encoded explicitly + * in ECParameters). + */ + public const int sect163k1 = 1; + public const int sect163r1 = 2; + public const int sect163r2 = 3; + public const int sect193r1 = 4; + public const int sect193r2 = 5; + public const int sect233k1 = 6; + public const int sect233r1 = 7; + public const int sect239k1 = 8; + public const int sect283k1 = 9; + public const int sect283r1 = 10; + public const int sect409k1 = 11; + public const int sect409r1 = 12; + public const int sect571k1 = 13; + public const int sect571r1 = 14; + public const int secp160k1 = 15; + public const int secp160r1 = 16; + public const int secp160r2 = 17; + public const int secp192k1 = 18; + public const int secp192r1 = 19; + public const int secp224k1 = 20; + public const int secp224r1 = 21; + public const int secp256k1 = 22; + public const int secp256r1 = 23; + public const int secp384r1 = 24; + public const int secp521r1 = 25; + + /* + * RFC 7027 + */ + public const int brainpoolP256r1 = 26; + public const int brainpoolP384r1 = 27; + public const int brainpoolP512r1 = 28; + + /* + * RFC 8422 + */ + public const int x25519 = 29; + public const int x448 = 30; + + /* + * RFC 8734 + */ + public const int brainpoolP256r1tls13 = 31; + public const int brainpoolP384r1tls13 = 32; + public const int brainpoolP512r1tls13 = 33; + + /* + * draft-smyshlyaev-tls12-gost-suites-10 + */ + public const int GC256A = 34; + public const int GC256B = 35; + public const int GC256C = 36; + public const int GC256D = 37; + public const int GC512A = 38; + public const int GC512B = 39; + public const int GC512C = 40; + + /* + * RFC 8998 + */ + public const int curveSM2 = 41; + + /* + * RFC 7919 2. Codepoints in the "Supported Groups Registry" with a high byte of 0x01 (that is, + * between 256 and 511, inclusive) are set aside for FFDHE groups, though only a small number of + * them are initially defined and we do not expect many other FFDHE groups to be added to this + * range. No codepoints outside of this range will be allocated to FFDHE groups. + */ + public const int ffdhe2048 = 256; + public const int ffdhe3072 = 257; + public const int ffdhe4096 = 258; + public const int ffdhe6144 = 259; + public const int ffdhe8192 = 260; + + /* + * RFC 8446 reserved ffdhe_private_use (0x01FC..0x01FF) + */ + + /* + * RFC 4492 reserved ecdhe_private_use (0xFE00..0xFEFF) + */ + + /* + * RFC 4492 + */ + public const int arbitrary_explicit_prime_curves = 0xFF01; + public const int arbitrary_explicit_char2_curves = 0xFF02; + + /* Names of the actual underlying elliptic curves (not necessarily matching the NamedGroup names). */ + private static readonly string[] CurveNames = new string[]{ "sect163k1", "sect163r1", "sect163r2", "sect193r1", + "sect193r2", "sect233k1", "sect233r1", "sect239k1", "sect283k1", "sect283r1", "sect409k1", "sect409r1", + "sect571k1", "sect571r1", "secp160k1", "secp160r1", "secp160r2", "secp192k1", "secp192r1", "secp224k1", + "secp224r1", "secp256k1", "secp256r1", "secp384r1", "secp521r1", "brainpoolP256r1", "brainpoolP384r1", + "brainpoolP512r1", "X25519", "X448", "brainpoolP256r1", "brainpoolP384r1", "brainpoolP512r1", + "Tc26-Gost-3410-12-256-paramSetA", "GostR3410-2001-CryptoPro-A", "GostR3410-2001-CryptoPro-B", + "GostR3410-2001-CryptoPro-C", "Tc26-Gost-3410-12-512-paramSetA", "Tc26-Gost-3410-12-512-paramSetB", + "Tc26-Gost-3410-12-512-paramSetC", "sm2p256v1" }; + + private static readonly string[] FiniteFieldNames = new string[]{ "ffdhe2048", "ffdhe3072", "ffdhe4096", + "ffdhe6144", "ffdhe8192" }; + + public static bool CanBeNegotiated(int namedGroup, ProtocolVersion version) + { + if (TlsUtilities.IsTlsV13(version)) + { + if ((namedGroup >= sect163k1 && namedGroup <= secp256k1) + || (namedGroup >= brainpoolP256r1 && namedGroup <= brainpoolP512r1) + || (namedGroup >= GC256A && namedGroup <= GC512C) + || (namedGroup >= arbitrary_explicit_prime_curves && namedGroup <= arbitrary_explicit_char2_curves)) + { + return false; + } + } + else + { + if ((namedGroup >= brainpoolP256r1tls13 && namedGroup <= brainpoolP512r1tls13) + || (namedGroup == curveSM2)) + { + return false; + } + } + + return IsValid(namedGroup); + } + + public static int GetCurveBits(int namedGroup) + { + switch (namedGroup) + { + case secp160k1: + case secp160r1: + case secp160r2: + return 160; + + case sect163k1: + case sect163r1: + case sect163r2: + return 163; + + case secp192k1: + case secp192r1: + return 192; + + case sect193r1: + case sect193r2: + return 193; + + case secp224k1: + case secp224r1: + return 224; + + case sect233k1: + case sect233r1: + return 233; + + case sect239k1: + return 239; + + case x25519: + return 252; + + case brainpoolP256r1: + case brainpoolP256r1tls13: + case curveSM2: + case GC256A: + case GC256B: + case GC256C: + case GC256D: + case secp256k1: + case secp256r1: + return 256; + + case sect283k1: + case sect283r1: + return 283; + + case brainpoolP384r1: + case brainpoolP384r1tls13: + case secp384r1: + return 384; + + case sect409k1: + case sect409r1: + return 409; + + case x448: + return 446; + + case brainpoolP512r1: + case brainpoolP512r1tls13: + case GC512A: + case GC512B: + case GC512C: + return 512; + + case secp521r1: + return 521; + + case sect571k1: + case sect571r1: + return 571; + + default: + return 0; + } + } + + public static string GetCurveName(int namedGroup) + { + if (RefersToASpecificCurve(namedGroup)) + { + return CurveNames[namedGroup - sect163k1]; + } + + return null; + } + + public static int GetFiniteFieldBits(int namedGroup) + { + switch (namedGroup) + { + case ffdhe2048: + return 2048; + case ffdhe3072: + return 3072; + case ffdhe4096: + return 4096; + case ffdhe6144: + return 6144; + case ffdhe8192: + return 8192; + default: + return 0; + } + } + + public static string GetFiniteFieldName(int namedGroup) + { + if (RefersToASpecificFiniteField(namedGroup)) + { + return FiniteFieldNames[namedGroup - ffdhe2048]; + } + + return null; + } + + public static int GetMaximumChar2CurveBits() + { + return 571; + } + + public static int GetMaximumCurveBits() + { + return 571; + } + + public static int GetMaximumFiniteFieldBits() + { + return 8192; + } + + public static int GetMaximumPrimeCurveBits() + { + return 521; + } + + public static string GetName(int namedGroup) + { + if (IsPrivate(namedGroup)) + { + return "PRIVATE"; + } + + switch (namedGroup) + { + case x25519: + return "x25519"; + case x448: + return "x448"; + case brainpoolP256r1tls13: + return "brainpoolP256r1tls13"; + case brainpoolP384r1tls13: + return "brainpoolP384r1tls13"; + case brainpoolP512r1tls13: + return "brainpoolP512r1tls13"; + case GC256A: + return "GC256A"; + case GC256B: + return "GC256B"; + case GC256C: + return "GC256C"; + case GC256D: + return "GC256D"; + case GC512A: + return "GC512A"; + case GC512B: + return "GC512B"; + case GC512C: + return "GC512C"; + case curveSM2: + return "curveSM2"; + case arbitrary_explicit_prime_curves: + return "arbitrary_explicit_prime_curves"; + case arbitrary_explicit_char2_curves: + return "arbitrary_explicit_char2_curves"; + } + + string standardName = GetStandardName(namedGroup); + if (null != standardName) + { + return standardName; + } + + return "UNKNOWN"; + } + + public static string GetStandardName(int namedGroup) + { + string curveName = GetCurveName(namedGroup); + if (null != curveName) + { + return curveName; + } + + string finiteFieldName = GetFiniteFieldName(namedGroup); + if (null != finiteFieldName) + { + return finiteFieldName; + } + + return null; + } + + public static string GetText(int namedGroup) + { + return GetName(namedGroup) + "(" + namedGroup + ")"; + } + + public static bool IsChar2Curve(int namedGroup) + { + return (namedGroup >= sect163k1 && namedGroup <= sect571r1) + || (namedGroup == arbitrary_explicit_char2_curves); + } + + public static bool IsPrimeCurve(int namedGroup) + { + return (namedGroup >= secp160k1 && namedGroup <= curveSM2) + || (namedGroup == arbitrary_explicit_prime_curves); + } + + public static bool IsPrivate(int namedGroup) + { + return (namedGroup >> 2) == 0x7F || (namedGroup >> 8) == 0xFE; + } + + public static bool IsValid(int namedGroup) + { + return RefersToASpecificGroup(namedGroup) + || IsPrivate(namedGroup) + || (namedGroup >= arbitrary_explicit_prime_curves && namedGroup <= arbitrary_explicit_char2_curves); + } + + public static bool RefersToAnECDHCurve(int namedGroup) + { + return RefersToASpecificCurve(namedGroup); + } + + public static bool RefersToAnECDSACurve(int namedGroup) + { + /* + * TODO[RFC 8998] Double-check whether this method is only being used to mean + * "signature-capable" or specifically ECDSA, and consider curveSM2 behaviour + * accordingly. + */ + return RefersToASpecificCurve(namedGroup) + && !RefersToAnXDHCurve(namedGroup); + } + + public static bool RefersToAnXDHCurve(int namedGroup) + { + return namedGroup >= x25519 && namedGroup <= x448; + } + + public static bool RefersToASpecificCurve(int namedGroup) + { + return namedGroup >= sect163k1 && namedGroup <= curveSM2; + } + + public static bool RefersToASpecificFiniteField(int namedGroup) + { + return namedGroup >= ffdhe2048 && namedGroup <= ffdhe8192; + } + + public static bool RefersToASpecificGroup(int namedGroup) + { + return RefersToASpecificCurve(namedGroup) + || RefersToASpecificFiniteField(namedGroup); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs.meta new file mode 100644 index 00000000..452243ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9154c9c22cc61b42ba7e02d40569596 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroup.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs new file mode 100644 index 00000000..0b57543b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class NamedGroupRole + { + public const int dh = 1; + public const int ecdh = 2; + public const int ecdsa = 3; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs.meta new file mode 100644 index 00000000..190f78e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc18bd015c8c56e47baa180dbf0ddc8d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NamedGroupRole.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs new file mode 100644 index 00000000..2b7f3d03 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class NewSessionTicket + { + private readonly long m_ticketLifetimeHint; + private readonly byte[] m_ticket; + + public NewSessionTicket(long ticketLifetimeHint, byte[] ticket) + { + this.m_ticketLifetimeHint = ticketLifetimeHint; + this.m_ticket = ticket; + } + + public long TicketLifetimeHint + { + get { return m_ticketLifetimeHint; } + } + + public byte[] Ticket + { + get { return m_ticket; } + } + + ///

    Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint32(TicketLifetimeHint, output); + TlsUtilities.WriteOpaque16(Ticket, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static NewSessionTicket Parse(Stream input) + { + long ticketLifetimeHint = TlsUtilities.ReadUint32(input); + byte[] ticket = TlsUtilities.ReadOpaque16(input); + return new NewSessionTicket(ticketLifetimeHint, ticket); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs.meta new file mode 100644 index 00000000..3c9beb8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 500b342cb35110649b5acab0153e4d0a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/NewSessionTicket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs new file mode 100644 index 00000000..81b07348 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs @@ -0,0 +1,119 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ocsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 3546 3.6 + public sealed class OcspStatusRequest + { + private readonly IList m_responderIDList; + private readonly X509Extensions m_requestExtensions; + + /// an of , specifying the list of + /// trusted OCSP responders. An empty list has the special meaning that the responders are implicitly known to + /// the server - e.g., by prior arrangement. + /// OCSP request extensions. A null value means that there are no extensions. + /// + public OcspStatusRequest(IList responderIDList, X509Extensions requestExtensions) + { + this.m_responderIDList = responderIDList; + this.m_requestExtensions = requestExtensions; + } + + /// an of . + public IList ResponderIDList + { + get { return m_responderIDList; } + } + + /// OCSP request extensions. + public X509Extensions RequestExtensions + { + get { return m_requestExtensions; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + if (m_responderIDList == null || m_responderIDList.Count < 1) + { + TlsUtilities.WriteUint16(0, output); + } + else + { + MemoryStream buf = new MemoryStream(); + foreach (ResponderID responderID in m_responderIDList) + { + byte[] derEncoding = responderID.GetEncoded(Asn1Encodable.Der); + TlsUtilities.WriteOpaque16(derEncoding, buf); + } + TlsUtilities.CheckUint16(buf.Length); + TlsUtilities.WriteUint16(Convert.ToInt32(buf.Length), output); + buf.WriteTo(output); + } + + if (m_requestExtensions == null) + { + TlsUtilities.WriteUint16(0, output); + } + else + { + byte[] derEncoding = m_requestExtensions.GetEncoded(Asn1Encodable.Der); + TlsUtilities.CheckUint16(derEncoding.Length); + TlsUtilities.WriteUint16(derEncoding.Length, output); + output.Write(derEncoding, 0, derEncoding.Length); + } + } + + /// Parse an from a . + /// the to parse from. + /// an object. + /// + public static OcspStatusRequest Parse(Stream input) + { + var responderIDList = new List(); + { + byte[] data = TlsUtilities.ReadOpaque16(input); + if (data.Length > 0) + { + MemoryStream buf = new MemoryStream(data, false); + do + { + byte[] derEncoding = TlsUtilities.ReadOpaque16(buf, 1); + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + ResponderID responderID = ResponderID.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(responderID, derEncoding); + responderIDList.Add(responderID); + } + while (buf.Position < buf.Length); + } + } + + X509Extensions requestExtensions = null; + { + byte[] derEncoding = TlsUtilities.ReadOpaque16(input); + if (derEncoding.Length > 0) + { + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + X509Extensions extensions = X509Extensions.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(extensions, derEncoding); + requestExtensions = extensions; + } + } + + return new OcspStatusRequest(responderIDList, requestExtensions); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs.meta new file mode 100644 index 00000000..518f5e58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 48916e094a8cfb540b76c1335aa48b49 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OcspStatusRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs new file mode 100644 index 00000000..a10af3e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs @@ -0,0 +1,228 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class OfferedPsks + { + internal class BindersConfig + { + internal readonly TlsPsk[] m_psks; + internal readonly short[] m_pskKeyExchangeModes; + internal readonly TlsSecret[] m_earlySecrets; + internal int m_bindersSize; + + internal BindersConfig(TlsPsk[] psks, short[] pskKeyExchangeModes, TlsSecret[] earlySecrets, + int bindersSize) + { + this.m_psks = psks; + this.m_pskKeyExchangeModes = pskKeyExchangeModes; + this.m_earlySecrets = earlySecrets; + this.m_bindersSize = bindersSize; + } + } + + internal class SelectedConfig + { + internal readonly int m_index; + internal readonly TlsPsk m_psk; + internal readonly short[] m_pskKeyExchangeModes; + internal readonly TlsSecret m_earlySecret; + + internal SelectedConfig(int index, TlsPsk psk, short[] pskKeyExchangeModes, TlsSecret earlySecret) + { + this.m_index = index; + this.m_psk = psk; + this.m_pskKeyExchangeModes = pskKeyExchangeModes; + this.m_earlySecret = earlySecret; + } + } + + private readonly IList m_identities; + private readonly IList m_binders; + private readonly int m_bindersSize; + + public OfferedPsks(IList identities) + : this(identities, null, -1) + { + } + + private OfferedPsks(IList identities, IList binders, int bindersSize) + { + if (null == identities || identities.Count < 1) + throw new ArgumentException("cannot be null or empty", "identities"); + if (null != binders && identities.Count != binders.Count) + throw new ArgumentException("must be the same length as 'identities' (or null)", "binders"); + if ((null != binders) != (bindersSize >= 0)) + throw new ArgumentException("must be >= 0 iff 'binders' are present", "bindersSize"); + + this.m_identities = identities; + this.m_binders = binders; + this.m_bindersSize = bindersSize; + } + + public IList Binders + { + get { return m_binders; } + } + + public int BindersSize + { + get { return m_bindersSize; } + } + + public IList Identities + { + get { return m_identities; } + } + + public int GetIndexOfIdentity(PskIdentity pskIdentity) + { + for (int i = 0, count = m_identities.Count; i < count; ++i) + { + if (pskIdentity.Equals(m_identities[i])) + return i; + } + return -1; + } + + /// + public void Encode(Stream output) + { + // identities + { + int lengthOfIdentitiesList = 0; + foreach (PskIdentity identity in m_identities) + { + lengthOfIdentitiesList += identity.GetEncodedLength(); + } + + TlsUtilities.CheckUint16(lengthOfIdentitiesList); + TlsUtilities.WriteUint16(lengthOfIdentitiesList, output); + + foreach (PskIdentity identity in m_identities) + { + identity.Encode(output); + } + } + + // binders + if (null != m_binders) + { + int lengthOfBindersList = 0; + foreach (byte[] binder in m_binders) + { + lengthOfBindersList += 1 + binder.Length; + } + + TlsUtilities.CheckUint16(lengthOfBindersList); + TlsUtilities.WriteUint16(lengthOfBindersList, output); + + foreach (byte[] binder in m_binders) + { + TlsUtilities.WriteOpaque8(binder, output); + } + } + } + + /// + internal static void EncodeBinders(Stream output, TlsCrypto crypto, TlsHandshakeHash handshakeHash, + BindersConfig bindersConfig) + { + TlsPsk[] psks = bindersConfig.m_psks; + TlsSecret[] earlySecrets = bindersConfig.m_earlySecrets; + int expectedLengthOfBindersList = bindersConfig.m_bindersSize - 2; + + TlsUtilities.CheckUint16(expectedLengthOfBindersList); + TlsUtilities.WriteUint16(expectedLengthOfBindersList, output); + + int lengthOfBindersList = 0; + for (int i = 0; i < psks.Length; ++i) + { + TlsPsk psk = psks[i]; + TlsSecret earlySecret = earlySecrets[i]; + + // TODO[tls13-psk] Handle resumption PSKs + bool isExternalPsk = true; + int pskCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(psk.PrfAlgorithm); + + // TODO[tls13-psk] Cache the transcript hashes per algorithm to avoid duplicates for multiple PSKs + TlsHash hash = crypto.CreateHash(pskCryptoHashAlgorithm); + handshakeHash.CopyBufferTo(new TlsHashSink(hash)); + byte[] transcriptHash = hash.CalculateHash(); + + byte[] binder = TlsUtilities.CalculatePskBinder(crypto, isExternalPsk, pskCryptoHashAlgorithm, + earlySecret, transcriptHash); + + lengthOfBindersList += 1 + binder.Length; + TlsUtilities.WriteOpaque8(binder, output); + } + + if (expectedLengthOfBindersList != lengthOfBindersList) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /// + internal static int GetBindersSize(TlsPsk[] psks) + { + int lengthOfBindersList = 0; + for (int i = 0; i < psks.Length; ++i) + { + TlsPsk psk = psks[i]; + + int prfAlgorithm = psk.PrfAlgorithm; + int prfCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(prfAlgorithm); + + lengthOfBindersList += 1 + TlsCryptoUtilities.GetHashOutputSize(prfCryptoHashAlgorithm); + } + TlsUtilities.CheckUint16(lengthOfBindersList); + return 2 + lengthOfBindersList; + } + + /// + public static OfferedPsks Parse(Stream input) + { + var identities = new List(); + { + int totalLengthIdentities = TlsUtilities.ReadUint16(input); + if (totalLengthIdentities < 7) + throw new TlsFatalAlert(AlertDescription.decode_error); + + byte[] identitiesData = TlsUtilities.ReadFully(totalLengthIdentities, input); + MemoryStream buf = new MemoryStream(identitiesData, false); + do + { + PskIdentity identity = PskIdentity.Parse(buf); + identities.Add(identity); + } + while (buf.Position < buf.Length); + } + + var binders = new List(); + int totalLengthBinders = TlsUtilities.ReadUint16(input); + { + if (totalLengthBinders < 33) + throw new TlsFatalAlert(AlertDescription.decode_error); + + byte[] bindersData = TlsUtilities.ReadFully(totalLengthBinders, input); + MemoryStream buf = new MemoryStream(bindersData, false); + do + { + byte[] binder = TlsUtilities.ReadOpaque8(buf, 32); + binders.Add(binder); + } + while (buf.Position < buf.Length); + } + + return new OfferedPsks(identities, binders, 2 + totalLengthBinders); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs.meta new file mode 100644 index 00000000..70e13df3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6463f73c25fa04e4baf6fabe86c259ee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/OfferedPsks.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs new file mode 100644 index 00000000..b4f338eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5246 + /// + /// Note that the values here are implementation-specific and arbitrary. It is recommended not to depend on the + /// particular values (e.g. serialization). + /// + public abstract class PrfAlgorithm + { + public const int ssl_prf_legacy = 0; + public const int tls_prf_legacy = 1; + public const int tls_prf_sha256 = 2; + public const int tls_prf_sha384 = 3; + public const int tls13_hkdf_sha256 = 4; + public const int tls13_hkdf_sha384 = 5; + //public const int tls13_hkdf_sha512 = 6; + public const int tls13_hkdf_sm3 = 7; + + public static string GetName(int prfAlgorithm) + { + switch (prfAlgorithm) + { + case ssl_prf_legacy: + return "ssl_prf_legacy"; + case tls_prf_legacy: + return "tls_prf_legacy"; + case tls_prf_sha256: + return "tls_prf_sha256"; + case tls_prf_sha384: + return "tls_prf_sha384"; + case tls13_hkdf_sha256: + return "tls13_hkdf_sha256"; + case tls13_hkdf_sha384: + return "tls13_hkdf_sha384"; + case tls13_hkdf_sm3: + return "tls13_hkdf_sm3"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(int prfAlgorithm) + { + return GetName(prfAlgorithm) + "(" + prfAlgorithm + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs.meta new file mode 100644 index 00000000..77109151 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74b5963837141ac429a61bd322809250 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PrfAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs new file mode 100644 index 00000000..f9de1837 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs @@ -0,0 +1,103 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 7301 Represents a protocol name for use with ALPN. + public sealed class ProtocolName + { + public static ProtocolName AsRawBytes(byte[] bytes) + { + return new ProtocolName(Arrays.Clone(bytes)); + } + + public static ProtocolName AsUtf8Encoding(string name) + { + return new ProtocolName(Strings.ToUtf8ByteArray(name)); + } + + public static readonly ProtocolName Http_1_1 = AsUtf8Encoding("http/1.1"); + public static readonly ProtocolName Spdy_1 = AsUtf8Encoding("spdy/1"); + public static readonly ProtocolName Spdy_2 = AsUtf8Encoding("spdy/2"); + public static readonly ProtocolName Spdy_3 = AsUtf8Encoding("spdy/3"); + public static readonly ProtocolName Stun_Turn = AsUtf8Encoding("stun.turn"); + public static readonly ProtocolName Stun_Nat_Discovery = AsUtf8Encoding("stun.nat-discovery"); + public static readonly ProtocolName Http_2_Tls = AsUtf8Encoding("h2"); + public static readonly ProtocolName Http_2_Tcp = AsUtf8Encoding("h2c"); + public static readonly ProtocolName WebRtc = AsUtf8Encoding("webrtc"); + public static readonly ProtocolName WebRtc_Confidential = AsUtf8Encoding("c-webrtc"); + public static readonly ProtocolName Ftp = AsUtf8Encoding("ftp"); + public static readonly ProtocolName Imap = AsUtf8Encoding("imap"); + public static readonly ProtocolName Pop3 = AsUtf8Encoding("pop3"); + public static readonly ProtocolName ManageSieve = AsUtf8Encoding("managesieve"); + public static readonly ProtocolName Coap = AsUtf8Encoding("coap"); + public static readonly ProtocolName Xmpp_Client = AsUtf8Encoding("xmpp-client"); + public static readonly ProtocolName Xmpp_Server = AsUtf8Encoding("xmpp-server"); + public static readonly ProtocolName Acme_Tls_1 = AsUtf8Encoding("acme-tls/1"); + public static readonly ProtocolName Oasis_Mqtt = AsUtf8Encoding("mqtt"); + public static readonly ProtocolName Dns_Over_Tls = AsUtf8Encoding("dot"); + public static readonly ProtocolName Ntske_1 = AsUtf8Encoding("ntske/1"); + public static readonly ProtocolName Sun_Rpc = AsUtf8Encoding("sunrpc"); + public static readonly ProtocolName Http_3 = AsUtf8Encoding("h3"); + public static readonly ProtocolName Smb_2 = AsUtf8Encoding("smb"); + public static readonly ProtocolName Irc = AsUtf8Encoding("irc"); + public static readonly ProtocolName Nntp_Reading = AsUtf8Encoding("nntp"); + public static readonly ProtocolName Nntp_Transit = AsUtf8Encoding("nnsp"); + public static readonly ProtocolName Dns_Over_Quic = AsUtf8Encoding("doq"); + + private readonly byte[] m_bytes; + + private ProtocolName(byte[] bytes) + { + if (bytes == null) + throw new ArgumentNullException("bytes"); + if (bytes.Length < 1 || bytes.Length > 255) + throw new ArgumentException("must have length from 1 to 255", "bytes"); + + this.m_bytes = bytes; + } + + public byte[] GetBytes() + { + return Arrays.Clone(m_bytes); + } + + public string GetUtf8Decoding() + { + return Strings.FromUtf8ByteArray(m_bytes); + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteOpaque8(m_bytes, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static ProtocolName Parse(Stream input) + { + return new ProtocolName(TlsUtilities.ReadOpaque8(input, 1)); + } + + public override bool Equals(object obj) + { + return obj is ProtocolName && Arrays.AreEqual(m_bytes, ((ProtocolName)obj).m_bytes); + } + + public override int GetHashCode() + { + return Arrays.GetHashCode(m_bytes); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs.meta new file mode 100644 index 00000000..c88375f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ff15d7c59ba30284ea2908ba6b83168b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolName.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs new file mode 100644 index 00000000..02717941 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs @@ -0,0 +1,423 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ProtocolVersion + { + public static readonly ProtocolVersion SSLv3 = new ProtocolVersion(0x0300, "SSL 3.0"); + public static readonly ProtocolVersion TLSv10 = new ProtocolVersion(0x0301, "TLS 1.0"); + public static readonly ProtocolVersion TLSv11 = new ProtocolVersion(0x0302, "TLS 1.1"); + public static readonly ProtocolVersion TLSv12 = new ProtocolVersion(0x0303, "TLS 1.2"); + public static readonly ProtocolVersion TLSv13 = new ProtocolVersion(0x0304, "TLS 1.3"); + public static readonly ProtocolVersion DTLSv10 = new ProtocolVersion(0xFEFF, "DTLS 1.0"); + public static readonly ProtocolVersion DTLSv12 = new ProtocolVersion(0xFEFD, "DTLS 1.2"); + public static readonly ProtocolVersion DTLSv13 = new ProtocolVersion(0xFEFC, "DTLS 1.3"); + + internal static readonly ProtocolVersion CLIENT_EARLIEST_SUPPORTED_DTLS = DTLSv10; + internal static readonly ProtocolVersion CLIENT_EARLIEST_SUPPORTED_TLS = SSLv3; + internal static readonly ProtocolVersion CLIENT_LATEST_SUPPORTED_DTLS = DTLSv12; + internal static readonly ProtocolVersion CLIENT_LATEST_SUPPORTED_TLS = TLSv13; + + internal static readonly ProtocolVersion SERVER_EARLIEST_SUPPORTED_DTLS = DTLSv10; + internal static readonly ProtocolVersion SERVER_EARLIEST_SUPPORTED_TLS = SSLv3; + internal static readonly ProtocolVersion SERVER_LATEST_SUPPORTED_DTLS = DTLSv12; + internal static readonly ProtocolVersion SERVER_LATEST_SUPPORTED_TLS = TLSv13; + + public static bool Contains(ProtocolVersion[] versions, ProtocolVersion version) + { + if (versions != null && version != null) + { + for (int i = 0; i < versions.Length; ++i) + { + if (version.Equals(versions[i])) + return true; + } + } + return false; + } + + public static ProtocolVersion GetEarliestDtls(ProtocolVersion[] versions) + { + ProtocolVersion earliest = null; + if (null != versions) + { + for (int i = 0; i < versions.Length; ++i) + { + ProtocolVersion next = versions[i]; + if (null != next && next.IsDtls) + { + if (null == earliest || next.MinorVersion > earliest.MinorVersion) + { + earliest = next; + } + } + } + } + return earliest; + } + + public static ProtocolVersion GetEarliestTls(ProtocolVersion[] versions) + { + ProtocolVersion earliest = null; + if (null != versions) + { + for (int i = 0; i < versions.Length; ++i) + { + ProtocolVersion next = versions[i]; + if (null != next && next.IsTls) + { + if (null == earliest || next.MinorVersion < earliest.MinorVersion) + { + earliest = next; + } + } + } + } + return earliest; + } + + public static ProtocolVersion GetLatestDtls(ProtocolVersion[] versions) + { + ProtocolVersion latest = null; + if (null != versions) + { + for (int i = 0; i < versions.Length; ++i) + { + ProtocolVersion next = versions[i]; + if (null != next && next.IsDtls) + { + if (null == latest || next.MinorVersion < latest.MinorVersion) + { + latest = next; + } + } + } + } + return latest; + } + + public static ProtocolVersion GetLatestTls(ProtocolVersion[] versions) + { + ProtocolVersion latest = null; + if (null != versions) + { + for (int i = 0; i < versions.Length; ++i) + { + ProtocolVersion next = versions[i]; + if (null != next && next.IsTls) + { + if (null == latest || next.MinorVersion > latest.MinorVersion) + { + latest = next; + } + } + } + } + return latest; + } + + internal static bool IsSupportedDtlsVersionClient(ProtocolVersion version) + { + return null != version + && version.IsEqualOrLaterVersionOf(CLIENT_EARLIEST_SUPPORTED_DTLS) + && version.IsEqualOrEarlierVersionOf(CLIENT_LATEST_SUPPORTED_DTLS); + } + + internal static bool IsSupportedDtlsVersionServer(ProtocolVersion version) + { + return null != version + && version.IsEqualOrLaterVersionOf(SERVER_EARLIEST_SUPPORTED_DTLS) + && version.IsEqualOrEarlierVersionOf(SERVER_LATEST_SUPPORTED_DTLS); + } + + internal static bool IsSupportedTlsVersionClient(ProtocolVersion version) + { + if (null == version) + return false; + + int fullVersion = version.FullVersion; + + return fullVersion >= CLIENT_EARLIEST_SUPPORTED_TLS.FullVersion + && fullVersion <= CLIENT_LATEST_SUPPORTED_TLS.FullVersion; + } + + internal static bool IsSupportedTlsVersionServer(ProtocolVersion version) + { + if (null == version) + return false; + + int fullVersion = version.FullVersion; + + return fullVersion >= SERVER_EARLIEST_SUPPORTED_TLS.FullVersion + && fullVersion <= SERVER_LATEST_SUPPORTED_TLS.FullVersion; + } + + private readonly int version; + private readonly string name; + + private ProtocolVersion(int v, string name) + { + this.version = v & 0xFFFF; + this.name = name; + } + + public ProtocolVersion[] DownTo(ProtocolVersion min) + { + if (!IsEqualOrLaterVersionOf(min)) + throw new ArgumentException("must be an equal or earlier version of this one", "min"); + + var result = new List(); + result.Add(this); + + ProtocolVersion current = this; + while (!current.Equals(min)) + { + current = current.GetPreviousVersion(); + result.Add(current); + } + + return result.ToArray(); + } + + public int FullVersion + { + get { return version; } + } + + public int MajorVersion + { + get { return version >> 8; } + } + + public int MinorVersion + { + get { return version & 0xFF; } + } + + public string Name + { + get { return name; } + } + + public bool IsDtls + { + get { return MajorVersion == 0xFE; } + } + + public bool IsSsl + { + get { return this == SSLv3; } + } + + public bool IsTls + { + get { return MajorVersion == 0x03; } + } + + public ProtocolVersion GetEquivalentTlsVersion() + { + switch (MajorVersion) + { + case 0x03: + return this; + case 0xFE: + switch (MinorVersion) + { + case 0xFF: + return TLSv11; + case 0xFD: + return TLSv12; + case 0xFC: + return TLSv13; + default: + return null; + } + default: + return null; + } + } + + public ProtocolVersion GetNextVersion() + { + int major = MajorVersion, minor = MinorVersion; + switch (major) + { + case 0x03: + switch (minor) + { + case 0xFF: + return null; + default: + return Get(major, minor + 1); + } + case 0xFE: + switch (minor) + { + case 0x00: + return null; + case 0xFF: + return DTLSv12; + default: + return Get(major, minor - 1); + } + default: + return null; + } + } + + public ProtocolVersion GetPreviousVersion() + { + int major = MajorVersion, minor = MinorVersion; + switch (major) + { + case 0x03: + switch (minor) + { + case 0x00: + return null; + default: + return Get(major, minor - 1); + } + case 0xFE: + switch (minor) + { + case 0xFF: + return null; + case 0xFD: + return DTLSv10; + default: + return Get(major, minor + 1); + } + default: + return null; + } + } + + public bool IsEarlierVersionOf(ProtocolVersion version) + { + if (null == version || MajorVersion != version.MajorVersion) + return false; + + int diffMinorVersion = MinorVersion - version.MinorVersion; + return IsDtls ? diffMinorVersion > 0 : diffMinorVersion < 0; + } + + public bool IsEqualOrEarlierVersionOf(ProtocolVersion version) + { + if (null == version || MajorVersion != version.MajorVersion) + return false; + + int diffMinorVersion = MinorVersion - version.MinorVersion; + return IsDtls ? diffMinorVersion >= 0 : diffMinorVersion <= 0; + } + + public bool IsEqualOrLaterVersionOf(ProtocolVersion version) + { + if (null == version || MajorVersion != version.MajorVersion) + return false; + + int diffMinorVersion = MinorVersion - version.MinorVersion; + return IsDtls ? diffMinorVersion <= 0 : diffMinorVersion >= 0; + } + + public bool IsLaterVersionOf(ProtocolVersion version) + { + if (null == version || MajorVersion != version.MajorVersion) + return false; + + int diffMinorVersion = MinorVersion - version.MinorVersion; + return IsDtls ? diffMinorVersion < 0 : diffMinorVersion > 0; + } + + public override bool Equals(object other) + { + return this == other || (other is ProtocolVersion && Equals((ProtocolVersion)other)); + } + + public bool Equals(ProtocolVersion other) + { + return other != null && this.version == other.version; + } + + public override int GetHashCode() + { + return version; + } + + public static ProtocolVersion Get(int major, int minor) + { + switch (major) + { + case 0x03: + { + switch (minor) + { + case 0x00: + return SSLv3; + case 0x01: + return TLSv10; + case 0x02: + return TLSv11; + case 0x03: + return TLSv12; + case 0x04: + return TLSv13; + } + return GetUnknownVersion(major, minor, "TLS"); + } + case 0xFE: + { + switch (minor) + { + case 0xFF: + return DTLSv10; + case 0xFE: + throw new ArgumentException("{0xFE, 0xFE} is a reserved protocol version"); + case 0xFD: + return DTLSv12; + case 0xFC: + return DTLSv13; + } + return GetUnknownVersion(major, minor, "DTLS"); + } + default: + { + return GetUnknownVersion(major, minor, "UNKNOWN"); + } + } + } + + public ProtocolVersion[] Only() + { + return new ProtocolVersion[]{ this }; + } + + public override string ToString() + { + return name; + } + + private static void CheckUint8(int versionOctet) + { + if (!TlsUtilities.IsValidUint8(versionOctet)) + throw new ArgumentException("not a valid octet", "versionOctet"); + } + + private static ProtocolVersion GetUnknownVersion(int major, int minor, string prefix) + { + CheckUint8(major); + CheckUint8(minor); + + int v = (major << 8) | minor; + string hex = Convert.ToString(0x10000 | v, 16).Substring(1).ToUpperInvariant(); + return new ProtocolVersion(v, prefix + " 0x" + hex); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs.meta new file mode 100644 index 00000000..d00a8c86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91a272c8ba4522a458d02408438d3710 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ProtocolVersion.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs new file mode 100644 index 00000000..bba4e4e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class PskIdentity + { + private readonly byte[] m_identity; + private readonly long m_obfuscatedTicketAge; + + public PskIdentity(byte[] identity, long obfuscatedTicketAge) + { + if (null == identity) + throw new ArgumentNullException("identity"); + if (identity.Length < 1 || !TlsUtilities.IsValidUint16(identity.Length)) + throw new ArgumentException("should have length from 1 to 65535", "identity"); + if (!TlsUtilities.IsValidUint32(obfuscatedTicketAge)) + throw new ArgumentException("should be a uint32", "obfuscatedTicketAge"); + + this.m_identity = identity; + this.m_obfuscatedTicketAge = obfuscatedTicketAge; + } + + public int GetEncodedLength() + { + return 6 + m_identity.Length; + } + + public byte[] Identity + { + get { return m_identity; } + } + + public long ObfuscatedTicketAge + { + get { return m_obfuscatedTicketAge; } + } + + public void Encode(Stream output) + { + TlsUtilities.WriteOpaque16(Identity, output); + TlsUtilities.WriteUint32(ObfuscatedTicketAge, output); + } + + public static PskIdentity Parse(Stream input) + { + byte[] identity = TlsUtilities.ReadOpaque16(input, 1); + long obfuscatedTicketAge = TlsUtilities.ReadUint32(input); + return new PskIdentity(identity, obfuscatedTicketAge); + } + + public override bool Equals(object obj) + { + PskIdentity that = obj as PskIdentity; + if (null == that) + return false; + + return this.m_obfuscatedTicketAge == that.m_obfuscatedTicketAge + && Arrays.ConstantTimeAreEqual(this.m_identity, that.m_identity); + } + + public override int GetHashCode() + { + return Arrays.GetHashCode(m_identity) ^ m_obfuscatedTicketAge.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs.meta new file mode 100644 index 00000000..5a6108ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07cc160895047444bbf724cf6c6494af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskIdentity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs new file mode 100644 index 00000000..1dff6b85 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class PskKeyExchangeMode + { + /* + * RFC 8446 + */ + + public const short psk_ke = 0; + public const short psk_dhe_ke = 1; + + public static string GetName(short pskKeyExchangeMode) + { + switch (pskKeyExchangeMode) + { + case psk_ke: + return "psk_ke"; + case psk_dhe_ke: + return "psk_dhe_ke"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short pskKeyExchangeMode) + { + return GetName(pskKeyExchangeMode) + "(" + pskKeyExchangeMode + ")"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs.meta new file mode 100644 index 00000000..5dfbaf2b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cb54d1170f70a364abadf11e7652103b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskKeyExchangeMode.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs new file mode 100644 index 00000000..7d89df80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class PskTlsClient + : AbstractTlsClient + { + private static readonly int[] DefaultCipherSuites = new int[] + { + CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA + }; + + protected readonly TlsPskIdentity m_pskIdentity; + + public PskTlsClient(TlsCrypto crypto, byte[] identity, byte[] psk) + : this(crypto, new BasicTlsPskIdentity(identity, psk)) + { + } + + public PskTlsClient(TlsCrypto crypto, TlsPskIdentity pskIdentity) + : base(crypto) + { + this.m_pskIdentity = pskIdentity; + } + + protected override ProtocolVersion[] GetSupportedVersions() + { + return ProtocolVersion.TLSv12.Only(); + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + public override TlsPskIdentity GetPskIdentity() + { + return m_pskIdentity; + } + + /// + public override TlsAuthentication GetAuthentication() + { + /* + * Note: This method is not called unless a server certificate is sent, which may be the + * case e.g. for RSA_PSK key exchange. + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs.meta new file mode 100644 index 00000000..ae2f2ee8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 006bf1150c99f434998d21a8f7106d50 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsClient.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs new file mode 100644 index 00000000..90141964 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class PskTlsServer + : AbstractTlsServer + { + private static readonly int[] DefaultCipherSuites = new int[] + { + CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA + }; + + protected readonly TlsPskIdentityManager m_pskIdentityManager; + + public PskTlsServer(TlsCrypto crypto, TlsPskIdentityManager pskIdentityManager) + : base(crypto) + { + this.m_pskIdentityManager = pskIdentityManager; + } + + /// + protected virtual TlsCredentialedDecryptor GetRsaEncryptionCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + protected override ProtocolVersion[] GetSupportedVersions() + { + return ProtocolVersion.TLSv12.Only(); + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + public override TlsCredentials GetCredentials() + { + int keyExchangeAlgorithm = m_context.SecurityParameters.KeyExchangeAlgorithm; + + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DHE_PSK: + case KeyExchangeAlgorithm.ECDHE_PSK: + case KeyExchangeAlgorithm.PSK: + return null; + + case KeyExchangeAlgorithm.RSA_PSK: + return GetRsaEncryptionCredentials(); + + default: + // Note: internal error here; selected a key exchange we don't implement! + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + public override TlsPskIdentityManager GetPskIdentityManager() + { + return m_pskIdentityManager; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs.meta new file mode 100644 index 00000000..ebf1eea6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d9fb58df898aa6445af32332108b2285 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/PskTlsServer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs new file mode 100644 index 00000000..6a747513 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class RecordFormat + { + public const int TypeOffset = 0; + public const int VersionOffset = 1; + public const int LengthOffset = 3; + public const int FragmentOffset = 5; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs.meta new file mode 100644 index 00000000..3914d5e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7d0484ec1b0e1dd4286d2b77c68e2222 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordFormat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs new file mode 100644 index 00000000..e3fbc2ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class RecordPreview + { + private readonly int recordSize; + private readonly int contentLimit; + + internal static RecordPreview CombineAppData(RecordPreview a, RecordPreview b) + { + return new RecordPreview(a.RecordSize + b.RecordSize, a.ContentLimit + b.ContentLimit); + } + + internal static RecordPreview ExtendRecordSize(RecordPreview a, int recordSize) + { + return new RecordPreview(a.RecordSize + recordSize, a.ContentLimit); + } + + internal RecordPreview(int recordSize, int contentLimit) + { + this.recordSize = recordSize; + this.contentLimit = contentLimit; + } + + public int ContentLimit + { + get { return contentLimit; } + } + + public int RecordSize + { + get { return recordSize; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs.meta new file mode 100644 index 00000000..48cb9fec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3a4841f5b2e25fe40a8c70a248dfe120 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordPreview.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs new file mode 100644 index 00000000..f420125f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs @@ -0,0 +1,609 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// An implementation of the TLS 1.0/1.1/1.2 record layer. + internal sealed class RecordStream + { + private const int DefaultPlaintextLimit = (1 << 14); + + private readonly Record m_inputRecord = new Record(); + private readonly SequenceNumber m_readSeqNo = new SequenceNumber(), m_writeSeqNo = new SequenceNumber(); + + private readonly TlsProtocol m_handler; + private readonly Stream m_input; + private readonly Stream m_output; + + private TlsCipher m_pendingCipher = null; + private TlsCipher m_readCipher = TlsNullNullCipher.Instance; + private TlsCipher m_readCipherDeferred = null; + private TlsCipher m_writeCipher = TlsNullNullCipher.Instance; + + private ProtocolVersion m_writeVersion = null; + + private int m_plaintextLimit = DefaultPlaintextLimit; + private int m_ciphertextLimit = DefaultPlaintextLimit; + private bool m_ignoreChangeCipherSpec = false; + + internal RecordStream(TlsProtocol handler, Stream input, Stream output) + { + this.m_handler = handler; + this.m_input = input; + this.m_output = output; + } + + internal int PlaintextLimit + { + get { return m_plaintextLimit; } + } + + internal void SetPlaintextLimit(int plaintextLimit) + { + this.m_plaintextLimit = plaintextLimit; + this.m_ciphertextLimit = m_readCipher.GetCiphertextDecodeLimit(plaintextLimit); + } + + internal void SetWriteVersion(ProtocolVersion writeVersion) + { + this.m_writeVersion = writeVersion; + } + + internal void SetIgnoreChangeCipherSpec(bool ignoreChangeCipherSpec) + { + this.m_ignoreChangeCipherSpec = ignoreChangeCipherSpec; + } + + internal void SetPendingCipher(TlsCipher tlsCipher) + { + this.m_pendingCipher = tlsCipher; + } + + /// + internal void NotifyChangeCipherSpecReceived() + { + if (m_pendingCipher == null) + throw new TlsFatalAlert(AlertDescription.unexpected_message, "No pending cipher"); + + EnablePendingCipherRead(false); + } + + /// + internal void EnablePendingCipherRead(bool deferred) + { + if (m_pendingCipher == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (m_readCipherDeferred != null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (deferred) + { + this.m_readCipherDeferred = m_pendingCipher; + } + else + { + this.m_readCipher = m_pendingCipher; + this.m_ciphertextLimit = m_readCipher.GetCiphertextDecodeLimit(m_plaintextLimit); + m_readSeqNo.Reset(); + } + } + + /// + internal void EnablePendingCipherWrite() + { + if (m_pendingCipher == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_writeCipher = this.m_pendingCipher; + m_writeSeqNo.Reset(); + } + + /// + internal void FinaliseHandshake() + { + if (m_readCipher != m_pendingCipher || m_writeCipher != m_pendingCipher) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + this.m_pendingCipher = null; + } + + internal bool NeedsKeyUpdate() + { + return m_writeSeqNo.CurrentValue >= (1L << 20); + } + + /// + internal void NotifyKeyUpdateReceived() + { + m_readCipher.RekeyDecoder(); + m_readSeqNo.Reset(); + } + + /// + internal void NotifyKeyUpdateSent() + { + m_writeCipher.RekeyEncoder(); + m_writeSeqNo.Reset(); + } + + /// + internal RecordPreview PreviewRecordHeader(byte[] recordHeader) + { + short recordType = CheckRecordType(recordHeader, RecordFormat.TypeOffset); + + //ProtocolVersion recordVersion = TlsUtilities.ReadVersion(recordHeader, RecordFormat.VersionOffset); + + int length = TlsUtilities.ReadUint16(recordHeader, RecordFormat.LengthOffset); + + CheckLength(length, m_ciphertextLimit, AlertDescription.record_overflow); + + int recordSize = RecordFormat.FragmentOffset + length; + int applicationDataLimit = 0; + + // NOTE: For TLS 1.3, this only MIGHT be application data + if (ContentType.application_data == recordType && m_handler.IsApplicationDataReady) + { + applicationDataLimit = System.Math.Max(0, System.Math.Min(m_plaintextLimit, + m_readCipher.GetPlaintextLimit(length))); + } + + return new RecordPreview(recordSize, applicationDataLimit); + } + + internal RecordPreview PreviewOutputRecord(int contentLength) + { + int contentLimit = System.Math.Max(0, System.Math.Min(m_plaintextLimit, contentLength)); + int recordSize = PreviewOutputRecordSize(contentLimit); + return new RecordPreview(recordSize, contentLimit); + } + + internal int PreviewOutputRecordSize(int contentLength) + { + Debug.Assert(contentLength <= m_plaintextLimit); + + return RecordFormat.FragmentOffset + m_writeCipher.GetCiphertextEncodeLimit(contentLength, m_plaintextLimit); + } + + /// + internal bool ReadFullRecord(byte[] input, int inputOff, int inputLen) + { + if (inputLen < RecordFormat.FragmentOffset) + return false; + + int length = TlsUtilities.ReadUint16(input, inputOff + RecordFormat.LengthOffset); + if (inputLen != (RecordFormat.FragmentOffset + length)) + return false; + + short recordType = CheckRecordType(input, inputOff + RecordFormat.TypeOffset); + + ProtocolVersion recordVersion = TlsUtilities.ReadVersion(input, inputOff + RecordFormat.VersionOffset); + + CheckLength(length, m_ciphertextLimit, AlertDescription.record_overflow); + + if (m_ignoreChangeCipherSpec && ContentType.change_cipher_spec == recordType) + { + CheckChangeCipherSpec(input, inputOff + RecordFormat.FragmentOffset, length); + return true; + } + + TlsDecodeResult decoded = DecodeAndVerify(recordType, recordVersion, input, + inputOff + RecordFormat.FragmentOffset, length); + + m_handler.ProcessRecord(decoded.contentType, decoded.buf, decoded.off, decoded.len); + return true; + } + + /// + internal bool ReadRecord() + { + if (!m_inputRecord.ReadHeader(m_input)) + return false; + + short recordType = CheckRecordType(m_inputRecord.m_buf, RecordFormat.TypeOffset); + + ProtocolVersion recordVersion = TlsUtilities.ReadVersion(m_inputRecord.m_buf, RecordFormat.VersionOffset); + + int length = TlsUtilities.ReadUint16(m_inputRecord.m_buf, RecordFormat.LengthOffset); + + CheckLength(length, m_ciphertextLimit, AlertDescription.record_overflow); + + m_inputRecord.ReadFragment(m_input, length); + + TlsDecodeResult decoded; + try + { + if (m_ignoreChangeCipherSpec && ContentType.change_cipher_spec == recordType) + { + CheckChangeCipherSpec(m_inputRecord.m_buf, RecordFormat.FragmentOffset, length); + return true; + } + + decoded = DecodeAndVerify(recordType, recordVersion, m_inputRecord.m_buf, RecordFormat.FragmentOffset, + length); + + // with aead/cha-cha in and out buffer is the same + m_handler.ProcessRecord(decoded.contentType, decoded.buf, decoded.off, decoded.len); + + if (decoded.fromBufferPool) + Best.HTTP.Shared.PlatformSupport.Memory.BufferPool.Release(decoded.buf); + } + finally + { + m_inputRecord.Reset(); + } + + return true; + } + + /// + internal TlsDecodeResult DecodeAndVerify(short recordType, ProtocolVersion recordVersion, byte[] ciphertext, + int off, int len) + { + long seqNo = m_readSeqNo.NextValue(AlertDescription.unexpected_message); + TlsDecodeResult decoded = m_readCipher.DecodeCiphertext(seqNo, recordType, recordVersion, ciphertext, off, + len); + + CheckLength(decoded.len, m_plaintextLimit, AlertDescription.record_overflow); + + /* + * RFC 5246 6.2.1 Implementations MUST NOT send zero-length fragments of Handshake, Alert, + * or ChangeCipherSpec content types. + */ + if (decoded.len < 1 && decoded.contentType != ContentType.application_data) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return decoded; + } + + /// + internal void WriteRecord(short contentType, byte[] plaintext, int plaintextOffset, int plaintextLength) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + WriteRecord(contentType, plaintext.AsSpan(plaintextOffset, plaintextLength)); +#else + // Never send anything until a valid ClientHello has been received + if (m_writeVersion == null) + return; + + /* + * RFC 5246 6.2.1 The length should not exceed 2^14. + */ + CheckLength(plaintextLength, m_plaintextLimit, AlertDescription.internal_error); + + /* + * RFC 5246 6.2.1 Implementations MUST NOT send zero-length fragments of Handshake, Alert, + * or ChangeCipherSpec content types. + */ + if (plaintextLength < 1 && contentType != ContentType.application_data) + throw new TlsFatalAlert(AlertDescription.internal_error); + + long seqNo = m_writeSeqNo.NextValue(AlertDescription.internal_error); + ProtocolVersion recordVersion = m_writeVersion; + + TlsEncodeResult encoded = m_writeCipher.EncodePlaintext(seqNo, contentType, recordVersion, + RecordFormat.FragmentOffset, plaintext, plaintextOffset, plaintextLength); + + int ciphertextLength = encoded.len - RecordFormat.FragmentOffset; + TlsUtilities.CheckUint16(ciphertextLength); + + TlsUtilities.WriteUint8(encoded.recordType, encoded.buf, encoded.off + RecordFormat.TypeOffset); + TlsUtilities.WriteVersion(recordVersion, encoded.buf, encoded.off + RecordFormat.VersionOffset); + TlsUtilities.WriteUint16(ciphertextLength, encoded.buf, encoded.off + RecordFormat.LengthOffset); + + // TODO[tls-port] Can we support interrupted IO on .NET? + try + { + m_output.Write(encoded.buf, encoded.off, encoded.len); + } + //catch (InterruptedIOException e) + //{ + // throw new TlsFatalAlert(AlertDescription.internal_error, e); + //} + finally + { + if (encoded.fromBufferPool) + BufferPool.Release(encoded.buf); + } + + m_output.Flush(); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + internal void WriteRecord(short contentType, ReadOnlySpan plaintext) + { + // Never send anything until a valid ClientHello has been received + if (m_writeVersion == null) + return; + + /* + * RFC 5246 6.2.1 The length should not exceed 2^14. + */ + CheckLength(plaintext.Length, m_plaintextLimit, AlertDescription.internal_error); + + /* + * RFC 5246 6.2.1 Implementations MUST NOT send zero-length fragments of Handshake, Alert, + * or ChangeCipherSpec content types. + */ + if (plaintext.Length < 1 && contentType != ContentType.application_data) + throw new TlsFatalAlert(AlertDescription.internal_error); + + long seqNo=m_writeSeqNo.NextValue(AlertDescription.internal_error); + ProtocolVersion recordVersion = m_writeVersion; + + TlsEncodeResult encoded = m_writeCipher.EncodePlaintext(seqNo, contentType, recordVersion, + RecordFormat.FragmentOffset, plaintext); + + int ciphertextLength = encoded.len - RecordFormat.FragmentOffset; + TlsUtilities.CheckUint16(ciphertextLength); + + TlsUtilities.WriteUint8(encoded.recordType, encoded.buf, encoded.off + RecordFormat.TypeOffset); + TlsUtilities.WriteVersion(recordVersion, encoded.buf, encoded.off + RecordFormat.VersionOffset); + TlsUtilities.WriteUint16(ciphertextLength, encoded.buf, encoded.off + RecordFormat.LengthOffset); + + // TODO[tls-port] Can we support interrupted IO on .NET? + //try + //{ + m_output.Write(encoded.buf, encoded.off, encoded.len); + //} + //catch (InterruptedIOException e) + //{ + // throw new TlsFatalAlert(AlertDescription.internal_error, e); + //} + + m_output.Flush(); + } +#endif + + /// + internal void Close() + { + m_inputRecord.Reset(); + + IOException io = null; + try + { + m_input.Dispose(); + } + catch (IOException e) + { + io = e; + } + + try + { + m_output.Dispose(); + } + catch (IOException e) + { + if (io == null) + { + io = e; + } + else + { + // TODO[tls] Available from JDK 7 + //io.addSuppressed(e); + } + } + + if (io != null) + throw io; + } + + /// + private void CheckChangeCipherSpec(byte[] buf, int off, int len) + { + if (1 != len || (byte)ChangeCipherSpec.change_cipher_spec != buf[off]) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message, + "Malformed " + ContentType.GetText(ContentType.change_cipher_spec)); + } + } + + /// + private short CheckRecordType(byte[] buf, int off) + { + short recordType = TlsUtilities.ReadUint8(buf, off); + + if (null != m_readCipherDeferred && recordType == ContentType.application_data) + { + this.m_readCipher = m_readCipherDeferred; + this.m_readCipherDeferred = null; + this.m_ciphertextLimit = m_readCipher.GetCiphertextDecodeLimit(m_plaintextLimit); + m_readSeqNo.Reset(); + } + else if (m_readCipher.UsesOpaqueRecordType) + { + if (ContentType.application_data != recordType) + { + if (m_ignoreChangeCipherSpec && ContentType.change_cipher_spec == recordType) + { + // See RFC 8446 D.4. + } + else + { + throw new TlsFatalAlert(AlertDescription.unexpected_message, + "Opaque " + ContentType.GetText(recordType)); + } + } + } + else + { + switch (recordType) + { + case ContentType.application_data: + { + if (!m_handler.IsApplicationDataReady) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message, + "Not ready for " + ContentType.GetText(ContentType.application_data)); + } + break; + } + case ContentType.alert: + case ContentType.change_cipher_spec: + case ContentType.handshake: + // case ContentType.heartbeat: + break; + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message, + "Unsupported " + ContentType.GetText(recordType)); + } + } + + return recordType; + } + + /// + private static void CheckLength(int length, int limit, short alertDescription) + { + if (length > limit) + throw new TlsFatalAlert(alertDescription); + } + + private sealed class Record + { + private readonly byte[] m_header = new byte[RecordFormat.FragmentOffset]; + + internal volatile byte[] m_buf; + internal volatile int m_pos; + + internal Record() + { + this.m_buf = m_header; + this.m_pos = 0; + } + + /// + internal void FillTo(Stream input, int length) + { + while (m_pos < length) + { + // TODO[tls-port] Can we support interrupted IO on .NET? + //try + //{ + int numRead = input.Read(m_buf, m_pos, length - m_pos); + if (numRead < 1) + break; + + m_pos += numRead; + //} + //catch (InterruptedIOException e) + //{ + // /* + // * Although modifying the bytesTransferred doesn't seem ideal, it's the simplest + // * way to make sure we don't break client code that depends on the exact type, + // * e.g. in Apache's httpcomponents-core-4.4.9, BHttpConnectionBase.isStale + // * depends on the exception type being SocketTimeoutException (or a subclass). + // * + // * We can set to 0 here because the only relevant callstack (via + // * TlsProtocol.readApplicationData) only ever processes one non-empty record (so + // * interruption after partial output cannot occur). + // */ + // m_pos += e.bytesTransferred; + // e.bytesTransferred = 0; + // throw e; + //} + } + } + + /// + internal void ReadFragment(Stream input, int fragmentLength) + { + int recordLength = RecordFormat.FragmentOffset + fragmentLength; + Resize(recordLength); + FillTo(input, recordLength); + if (m_pos < recordLength) + throw new EndOfStreamException(); + } + + /// + internal bool ReadHeader(Stream input) + { + FillTo(input, RecordFormat.FragmentOffset); + if (m_pos == 0) + return false; + + if (m_pos < RecordFormat.FragmentOffset) + throw new EndOfStreamException(); + + return true; + } + + internal void Reset() + { + if (m_buf != m_header) + BufferPool.Release(m_buf); + + m_buf = m_header; + m_pos = 0; + } + + private void Resize(int length) + { + if (m_buf.Length < length) + { + //byte[] tmp = new byte[length]; + //Array.Copy(m_buf, 0, tmp, 0, m_pos); + //m_buf = tmp; + + byte[] tmp = BufferPool.Get(length, true); + Array.Copy(m_buf, 0, tmp, 0, m_pos); + + if (m_buf != m_header) + BufferPool.Release(m_buf); + m_buf = tmp; + } + } + } + + private sealed class SequenceNumber + { + private long m_value = 0L; + private bool m_exhausted = false; + + internal long CurrentValue + { + get { lock (this) return m_value; } + } + + /// + internal long NextValue(short alertDescription) + { + lock (this) + { + if (m_exhausted) + throw new TlsFatalAlert(alertDescription, "Sequence numbers exhausted"); + + long result = m_value; + if (++m_value == 0L) + { + this.m_exhausted = true; + } + return result; + } + } + + internal void Reset() + { + lock (this) + { + this.m_value = 0L; + this.m_exhausted = false; + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs.meta new file mode 100644 index 00000000..7054ee7c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a0350344da4acc846b0a6ae2f36c7817 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/RecordStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs new file mode 100644 index 00000000..5b0b071f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs @@ -0,0 +1,339 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class SecurityParameters + { + internal int m_entity = -1; + internal bool m_resumedSession = false; + internal bool m_secureRenegotiation = false; + internal int m_cipherSuite = Tls.CipherSuite.TLS_NULL_WITH_NULL_NULL; + internal short m_maxFragmentLength = -1; + internal int m_prfAlgorithm = -1; + internal int m_prfCryptoHashAlgorithm = -1; + internal int m_prfHashLength = -1; + internal int m_verifyDataLength = -1; + internal TlsSecret m_baseKeyClient = null; + internal TlsSecret m_baseKeyServer = null; + internal TlsSecret m_earlyExporterMasterSecret = null; + internal TlsSecret m_earlySecret = null; + internal TlsSecret m_exporterMasterSecret = null; + internal TlsSecret m_handshakeSecret = null; + internal TlsSecret m_masterSecret = null; + internal TlsSecret m_trafficSecretClient = null; + internal TlsSecret m_trafficSecretServer = null; + internal byte[] m_clientRandom = null; + internal byte[] m_serverRandom = null; + internal byte[] m_sessionHash = null; + internal byte[] m_sessionID = null; + internal byte[] m_pskIdentity = null; + internal byte[] m_srpIdentity = null; + internal byte[] m_tlsServerEndPoint = null; + internal byte[] m_tlsUnique = null; + internal bool m_encryptThenMac = false; + internal bool m_extendedMasterSecret = false; + internal bool m_extendedPadding = false; + internal bool m_truncatedHmac = false; + internal ProtocolName m_applicationProtocol = null; + internal bool m_applicationProtocolSet = false; + internal short[] m_clientCertTypes = null; + internal IList m_clientServerNames = null; + internal IList m_clientSigAlgs = null; + internal IList m_clientSigAlgsCert = null; + internal int[] m_clientSupportedGroups = null; + internal IList m_serverSigAlgs = null; + internal IList m_serverSigAlgsCert = null; + internal int[] m_serverSupportedGroups = null; + internal int m_keyExchangeAlgorithm = -1; + internal Certificate m_localCertificate = null; + internal Certificate m_peerCertificate = null; + internal ProtocolVersion m_negotiatedVersion = null; + internal int m_statusRequestVersion = 0; + internal short m_clientCertificateType = -1; + + // TODO[tls-ops] Investigate whether we can handle verify data using TlsSecret + internal byte[] m_localVerifyData = null; + internal byte[] m_peerVerifyData = null; + + internal void Clear() + { + this.m_sessionHash = null; + this.m_sessionID = null; + this.m_clientCertTypes = null; + this.m_clientServerNames = null; + this.m_clientSigAlgs = null; + this.m_clientSigAlgsCert = null; + this.m_clientSupportedGroups = null; + this.m_serverSigAlgs = null; + this.m_serverSigAlgsCert = null; + this.m_serverSupportedGroups = null; + this.m_statusRequestVersion = 0; + + this.m_baseKeyClient = ClearSecret(m_baseKeyClient); + this.m_baseKeyServer = ClearSecret(m_baseKeyServer); + this.m_earlyExporterMasterSecret = ClearSecret(m_earlyExporterMasterSecret); + this.m_earlySecret = ClearSecret(m_earlySecret); + this.m_exporterMasterSecret = ClearSecret(m_exporterMasterSecret); + this.m_handshakeSecret = ClearSecret(m_handshakeSecret); + this.m_masterSecret = ClearSecret(m_masterSecret); + } + + public ProtocolName ApplicationProtocol + { + get { return m_applicationProtocol; } + } + + public TlsSecret BaseKeyClient + { + get { return m_baseKeyClient; } + } + + public TlsSecret BaseKeyServer + { + get { return m_baseKeyServer; } + } + + public int CipherSuite + { + get { return m_cipherSuite; } + } + + public short ClientCertificateType + { + get { return m_clientCertificateType; } + } + + public short[] ClientCertTypes + { + get { return m_clientCertTypes; } + } + + public byte[] ClientRandom + { + get { return m_clientRandom; } + } + + public IList ClientServerNames + { + get { return m_clientServerNames; } + } + + public IList ClientSigAlgs + { + get { return m_clientSigAlgs; } + } + + public IList ClientSigAlgsCert + { + get { return m_clientSigAlgsCert; } + } + + public int[] ClientSupportedGroups + { + get { return m_clientSupportedGroups; } + } + + public TlsSecret EarlyExporterMasterSecret + { + get { return m_earlyExporterMasterSecret; } + } + + public TlsSecret EarlySecret + { + get { return m_earlySecret; } + } + + public TlsSecret ExporterMasterSecret + { + get { return m_exporterMasterSecret; } + } + + public int Entity + { + get { return m_entity; } + } + + public TlsSecret HandshakeSecret + { + get { return m_handshakeSecret; } + } + + public bool IsApplicationProtocolSet + { + get { return m_applicationProtocolSet; } + } + + public bool IsEncryptThenMac + { + get { return m_encryptThenMac; } + } + + public bool IsExtendedMasterSecret + { + get { return m_extendedMasterSecret; } + } + + public bool IsExtendedPadding + { + get { return m_extendedPadding; } + } + + public bool IsResumedSession + { + get { return m_resumedSession; } + } + + public bool IsSecureRenegotiation + { + get { return m_secureRenegotiation; } + } + + public bool IsTruncatedHmac + { + get { return m_truncatedHmac; } + } + + public int KeyExchangeAlgorithm + { + get { return m_keyExchangeAlgorithm; } + } + + public Certificate LocalCertificate + { + get { return m_localCertificate; } + } + + public byte[] LocalVerifyData + { + get { return m_localVerifyData; } + } + + public TlsSecret MasterSecret + { + get { return m_masterSecret; } + } + + public short MaxFragmentLength + { + get { return m_maxFragmentLength; } + } + + public ProtocolVersion NegotiatedVersion + { + get { return m_negotiatedVersion; } + } + + public Certificate PeerCertificate + { + get { return m_peerCertificate; } + } + + public byte[] PeerVerifyData + { + get { return m_peerVerifyData; } + } + + public int PrfAlgorithm + { + get { return m_prfAlgorithm; } + } + + public int PrfCryptoHashAlgorithm + { + get { return m_prfCryptoHashAlgorithm; } + } + + public int PrfHashLength + { + get { return m_prfHashLength; } + } + + public byte[] PskIdentity + { + get { return m_pskIdentity; } + } + + public byte[] ServerRandom + { + get { return m_serverRandom; } + } + + public IList ServerSigAlgs + { + get { return m_serverSigAlgs; } + } + + public IList ServerSigAlgsCert + { + get { return m_serverSigAlgsCert; } + } + + public int[] ServerSupportedGroups + { + get { return m_serverSupportedGroups; } + } + + public byte[] SessionHash + { + get { return m_sessionHash; } + } + + public byte[] SessionID + { + get { return m_sessionID; } + } + + public byte[] SrpIdentity + { + get { return m_srpIdentity; } + } + + public int StatusRequestVersion + { + get { return m_statusRequestVersion; } + } + + public byte[] TlsServerEndPoint + { + get { return m_tlsServerEndPoint; } + } + + public byte[] TlsUnique + { + get { return m_tlsUnique; } + } + + public TlsSecret TrafficSecretClient + { + get { return m_trafficSecretClient; } + } + + public TlsSecret TrafficSecretServer + { + get { return m_trafficSecretServer; } + } + + public int VerifyDataLength + { + get { return m_verifyDataLength; } + } + + public bool IsRenegotiating { get; set; } + public Certificate PreRenegotiatingServerCert { get; set; } + + private static TlsSecret ClearSecret(TlsSecret secret) + { + if (null != secret) + { + secret.Destroy(); + } + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs.meta new file mode 100644 index 00000000..e8d742e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0f787c597796b2449e90bd9964386a3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SecurityParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs new file mode 100644 index 00000000..cb7b5054 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ServerHello + { + private static readonly byte[] HelloRetryRequestMagic = { 0xCF, 0x21, 0xAD, 0x74, 0xE5, 0x9A, 0x61, 0x11, 0xBE, + 0x1D, 0x8C, 0x02, 0x1E, 0x65, 0xB8, 0x91, 0xC2, 0xA2, 0x11, 0x16, 0x7A, 0xBB, 0x8C, 0x5E, 0x07, 0x9E, 0x09, + 0xE2, 0xC8, 0xA8, 0x33, 0x9C }; + + private readonly ProtocolVersion m_version; + private readonly byte[] m_random; + private readonly byte[] m_sessionID; + private readonly int m_cipherSuite; + private readonly IDictionary m_extensions; + + public ServerHello(byte[] sessionID, int cipherSuite, IDictionary extensions) + : this(ProtocolVersion.TLSv12, Arrays.Clone(HelloRetryRequestMagic), sessionID, cipherSuite, extensions) + { + } + + public ServerHello(ProtocolVersion version, byte[] random, byte[] sessionID, int cipherSuite, + IDictionary extensions) + { + this.m_version = version; + this.m_random = random; + this.m_sessionID = sessionID; + this.m_cipherSuite = cipherSuite; + this.m_extensions = extensions; + } + + public int CipherSuite + { + get { return m_cipherSuite; } + } + + public IDictionary Extensions + { + get { return m_extensions; } + } + + public byte[] Random + { + get { return m_random; } + } + + public byte[] SessionID + { + get { return m_sessionID; } + } + + public ProtocolVersion Version + { + get { return m_version; } + } + + public bool IsHelloRetryRequest() + { + return Arrays.AreEqual(HelloRetryRequestMagic, m_random); + } + + /// Encode this to a . + /// the of the current connection. + /// the to encode to. + /// + public void Encode(TlsContext context, Stream output) + { + TlsUtilities.WriteVersion(m_version, output); + + output.Write(m_random, 0, m_random.Length); + + TlsUtilities.WriteOpaque8(m_sessionID, output); + + TlsUtilities.WriteUint16(m_cipherSuite, output); + + TlsUtilities.WriteUint8(CompressionMethod.cls_null, output); + + TlsProtocol.WriteExtensions(output, m_extensions); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static ServerHello Parse(MemoryStream input) + { + ProtocolVersion version = TlsUtilities.ReadVersion(input); + + byte[] random = TlsUtilities.ReadFully(32, input); + + byte[] sessionID = TlsUtilities.ReadOpaque8(input, 0, 32); + + int cipherSuite = TlsUtilities.ReadUint16(input); + + short compressionMethod = TlsUtilities.ReadUint8(input); + if (CompressionMethod.cls_null != compressionMethod) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + var extensions = TlsProtocol.ReadExtensions(input); + + return new ServerHello(version, random, sessionID, cipherSuite, extensions); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs.meta new file mode 100644 index 00000000..1cec6c10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: efe555eadce5a2741aacaa2b5892e9b5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerHello.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs new file mode 100644 index 00000000..279bd73e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 6066 3. Server Name Indication + /// + /// Current implementation uses this guidance: "For backward compatibility, all future data structures associated + /// with new NameTypes MUST begin with a 16-bit length field. TLS MAY treat provided server names as opaque data + /// and pass the names and types to the application.". RFC 6066 specifies ASCII encoding for host_name (possibly + /// using A-labels for IDNs), but note that the previous version (RFC 4366) specified UTF-8 encoding (see RFC 6066 + /// Appendix A). For maximum compatibility, it is recommended that client code tolerate receiving UTF-8 from the + /// peer, but only generate ASCII itself. + /// + public sealed class ServerName + { + private readonly short nameType; + private readonly byte[] nameData; + + public ServerName(short nameType, byte[] nameData) + { + if (!TlsUtilities.IsValidUint8(nameType)) + throw new ArgumentException("must be from 0 to 255", "nameType"); + if (null == nameData) + throw new ArgumentNullException("nameData"); + if (nameData.Length < 1 || !TlsUtilities.IsValidUint16(nameData.Length)) + throw new ArgumentException("must have length from 1 to 65535", "nameData"); + + this.nameType = nameType; + this.nameData = nameData; + } + + public byte[] NameData + { + get { return nameData; } + } + + public short NameType + { + get { return nameType; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(nameType, output); + TlsUtilities.WriteOpaque16(nameData, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static ServerName Parse(Stream input) + { + short name_type = TlsUtilities.ReadUint8(input); + byte[] nameData = TlsUtilities.ReadOpaque16(input, 1); + return new ServerName(name_type, nameData); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs.meta new file mode 100644 index 00000000..ef76d763 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 848a710cb0b11794ebd645194d4731d6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerName.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs new file mode 100644 index 00000000..7361952f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs @@ -0,0 +1,91 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ServerNameList + { + private readonly IList m_serverNameList; + + /// an of . + public ServerNameList(IList serverNameList) + { + if (null == serverNameList) + throw new ArgumentNullException("serverNameList"); + + this.m_serverNameList = serverNameList; + } + + /// an of . + public IList ServerNames + { + get { return m_serverNameList; } + } + + /// Encode this to a . + /// the to encode to . + /// + public void Encode(Stream output) + { + MemoryStream buf = new MemoryStream(); + + short[] nameTypesSeen = TlsUtilities.EmptyShorts; + foreach (ServerName entry in ServerNames) + { + nameTypesSeen = CheckNameType(nameTypesSeen, entry.NameType); + if (null == nameTypesSeen) + throw new TlsFatalAlert(AlertDescription.internal_error); + + entry.Encode(buf); + } + + int length = Convert.ToInt32(buf.Length); + TlsUtilities.CheckUint16(length); + TlsUtilities.WriteUint16(length, output); + buf.WriteTo(output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static ServerNameList Parse(Stream input) + { + byte[] data = TlsUtilities.ReadOpaque16(input, 1); + + MemoryStream buf = new MemoryStream(data, false); + + short[] nameTypesSeen = TlsUtilities.EmptyShorts; + var server_name_list = new List(); + while (buf.Position < buf.Length) + { + ServerName entry = ServerName.Parse(buf); + + nameTypesSeen = CheckNameType(nameTypesSeen, entry.NameType); + if (null == nameTypesSeen) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + server_name_list.Add(entry); + } + + return new ServerNameList(server_name_list); + } + + private static short[] CheckNameType(short[] nameTypesSeen, short nameType) + { + // RFC 6066 3. The ServerNameList MUST NOT contain more than one name of the same NameType. + if (Arrays.Contains(nameTypesSeen, nameType)) + return null; + + return Arrays.Append(nameTypesSeen, nameType); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs.meta new file mode 100644 index 00000000..c0c910a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 189b3a534ce6a134c8950b6924871c41 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerNameList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs new file mode 100644 index 00000000..894ed875 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class ServerOnlyTlsAuthentication + : TlsAuthentication + { + public abstract void NotifyServerCertificate(TlsServerCertificate serverCertificate); + + public TlsCredentials GetClientCredentials(CertificateRequest certificateRequest) + { + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs.meta new file mode 100644 index 00000000..4dbeada7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1e88e8c8535b4a8488de136508a80927 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerOnlyTlsAuthentication.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs new file mode 100644 index 00000000..495da40b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs @@ -0,0 +1,71 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class ServerSrpParams + { + private BigInteger m_N, m_g, m_B; + private byte[] m_s; + + public ServerSrpParams(BigInteger N, BigInteger g, byte[] s, BigInteger B) + { + this.m_N = N; + this.m_g = g; + this.m_s = Arrays.Clone(s); + this.m_B = B; + } + + public BigInteger B + { + get { return m_B; } + } + + public BigInteger G + { + get { return m_g; } + } + + public BigInteger N + { + get { return m_N; } + } + + public byte[] S + { + get { return m_s; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsSrpUtilities.WriteSrpParameter(m_N, output); + TlsSrpUtilities.WriteSrpParameter(m_g, output); + TlsUtilities.WriteOpaque8(m_s, output); + TlsSrpUtilities.WriteSrpParameter(m_B, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static ServerSrpParams Parse(Stream input) + { + BigInteger N = TlsSrpUtilities.ReadSrpParameter(input); + BigInteger g = TlsSrpUtilities.ReadSrpParameter(input); + byte[] s = TlsUtilities.ReadOpaque8(input, 1); + BigInteger B = TlsSrpUtilities.ReadSrpParameter(input); + + return new ServerSrpParams(N, g, s, B); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs.meta new file mode 100644 index 00000000..749e70ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 47ab5970e2f967744973d2c6ddb705c8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/ServerSrpParams.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs new file mode 100644 index 00000000..4ae86238 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs @@ -0,0 +1,199 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class SessionParameters + { + public sealed class Builder + { + private int m_cipherSuite = -1; + private Certificate m_localCertificate = null; + private TlsSecret m_masterSecret = null; + private ProtocolVersion m_negotiatedVersion; + private Certificate m_peerCertificate = null; + private byte[] m_pskIdentity = null; + private byte[] m_srpIdentity = null; + private byte[] m_encodedServerExtensions = null; + private bool m_extendedMasterSecret = false; + + public Builder() + { + } + + public SessionParameters Build() + { + Validate(m_cipherSuite >= 0, "cipherSuite"); + Validate(m_masterSecret != null, "masterSecret"); + return new SessionParameters(m_cipherSuite, m_localCertificate, m_masterSecret, m_negotiatedVersion, + m_peerCertificate, m_pskIdentity, m_srpIdentity, m_encodedServerExtensions, m_extendedMasterSecret); + } + + public Builder SetCipherSuite(int cipherSuite) + { + this.m_cipherSuite = cipherSuite; + return this; + } + + public Builder SetExtendedMasterSecret(bool extendedMasterSecret) + { + this.m_extendedMasterSecret = extendedMasterSecret; + return this; + } + + public Builder SetLocalCertificate(Certificate localCertificate) + { + this.m_localCertificate = localCertificate; + return this; + } + + public Builder SetMasterSecret(TlsSecret masterSecret) + { + this.m_masterSecret = masterSecret; + return this; + } + + public Builder SetNegotiatedVersion(ProtocolVersion negotiatedVersion) + { + this.m_negotiatedVersion = negotiatedVersion; + return this; + } + + public Builder SetPeerCertificate(Certificate peerCertificate) + { + this.m_peerCertificate = peerCertificate; + return this; + } + + public Builder SetPskIdentity(byte[] pskIdentity) + { + this.m_pskIdentity = pskIdentity; + return this; + } + + public Builder SetSrpIdentity(byte[] srpIdentity) + { + this.m_srpIdentity = srpIdentity; + return this; + } + + /// + public Builder SetServerExtensions(IDictionary serverExtensions) + { + if (serverExtensions == null || serverExtensions.Count < 1) + { + this.m_encodedServerExtensions = null; + } + else + { + MemoryStream buf = new MemoryStream(); + TlsProtocol.WriteExtensions(buf, serverExtensions); + this.m_encodedServerExtensions = buf.ToArray(); + } + return this; + } + + private void Validate(bool condition, string parameter) + { + if (!condition) + throw new InvalidOperationException("Required session parameter '" + parameter + "' not configured"); + } + } + + private readonly int m_cipherSuite; + private readonly Certificate m_localCertificate; + private readonly TlsSecret m_masterSecret; + private readonly ProtocolVersion m_negotiatedVersion; + private readonly Certificate m_peerCertificate; + private readonly byte[] m_pskIdentity; + private readonly byte[] m_srpIdentity; + private readonly byte[] m_encodedServerExtensions; + private readonly bool m_extendedMasterSecret; + + private SessionParameters(int cipherSuite, Certificate localCertificate, TlsSecret masterSecret, + ProtocolVersion negotiatedVersion, Certificate peerCertificate, byte[] pskIdentity, byte[] srpIdentity, + byte[] encodedServerExtensions, bool extendedMasterSecret) + { + this.m_cipherSuite = cipherSuite; + this.m_localCertificate = localCertificate; + this.m_masterSecret = masterSecret; + this.m_negotiatedVersion = negotiatedVersion; + this.m_peerCertificate = peerCertificate; + this.m_pskIdentity = Arrays.Clone(pskIdentity); + this.m_srpIdentity = Arrays.Clone(srpIdentity); + this.m_encodedServerExtensions = encodedServerExtensions; + this.m_extendedMasterSecret = extendedMasterSecret; + } + + public int CipherSuite + { + get { return m_cipherSuite; } + } + + public void Clear() + { + if (m_masterSecret != null) + { + m_masterSecret.Destroy(); + } + } + + public SessionParameters Copy() + { + return new SessionParameters(m_cipherSuite, m_localCertificate, m_masterSecret, m_negotiatedVersion, + m_peerCertificate, m_pskIdentity, m_srpIdentity, m_encodedServerExtensions, m_extendedMasterSecret); + } + + public bool IsExtendedMasterSecret + { + get { return m_extendedMasterSecret; } + } + + public Certificate LocalCertificate + { + get { return m_localCertificate; } + } + + public TlsSecret MasterSecret + { + get { return m_masterSecret; } + } + + public ProtocolVersion NegotiatedVersion + { + get { return m_negotiatedVersion; } + } + + public Certificate PeerCertificate + { + get { return m_peerCertificate; } + } + + public byte[] PskIdentity + { + get { return m_pskIdentity; } + } + + /// + public IDictionary ReadServerExtensions() + { + if (m_encodedServerExtensions == null) + return null; + + return TlsProtocol.ReadExtensions(new MemoryStream(m_encodedServerExtensions, false)); + } + + public byte[] SrpIdentity + { + get { return m_srpIdentity; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs.meta new file mode 100644 index 00000000..e507d51a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b6e3e8577af798f4baf27e885079c759 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SessionParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs new file mode 100644 index 00000000..9f40cd0a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs @@ -0,0 +1,156 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /** + * RFC 5246 7.4.1.4.1 (in RFC 2246, there were no specific values assigned) + */ + public class SignatureAlgorithm + { + public const short anonymous = 0; + public const short rsa = 1; + public const short dsa = 2; + public const short ecdsa = 3; + + /* + * RFC 8422 + */ + public const short ed25519 = 7; + public const short ed448 = 8; + + /* + * RFC 8446 (implied from SignatureScheme values) + * RFC 8447 reserved these values without allocating the implied names + */ + public const short rsa_pss_rsae_sha256 = 4; + public const short rsa_pss_rsae_sha384 = 5; + public const short rsa_pss_rsae_sha512 = 6; + public const short rsa_pss_pss_sha256 = 9; + public const short rsa_pss_pss_sha384 = 10; + public const short rsa_pss_pss_sha512 = 11; + + /* + * RFC 8734 (implied from SignatureScheme values) + */ + public const short ecdsa_brainpoolP256r1tls13_sha256 = 26; + public const short ecdsa_brainpoolP384r1tls13_sha384 = 27; + public const short ecdsa_brainpoolP512r1tls13_sha512 = 28; + + /* + * draft-smyshlyaev-tls12-gost-suites-10 + */ + public const short gostr34102012_256 = 64; + public const short gostr34102012_512 = 65; + + public static short GetClientCertificateType(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + case SignatureAlgorithm.rsa_pss_rsae_sha256: + case SignatureAlgorithm.rsa_pss_rsae_sha384: + case SignatureAlgorithm.rsa_pss_rsae_sha512: + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + return ClientCertificateType.rsa_sign; + + case SignatureAlgorithm.dsa: + return ClientCertificateType.dss_sign; + + case SignatureAlgorithm.ecdsa: + case SignatureAlgorithm.ed25519: + case SignatureAlgorithm.ed448: + return ClientCertificateType.ecdsa_sign; + + case SignatureAlgorithm.gostr34102012_256: + return ClientCertificateType.gost_sign256; + + case SignatureAlgorithm.gostr34102012_512: + return ClientCertificateType.gost_sign512; + + default: + return -1; + } + } + + public static string GetName(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case anonymous: + return "anonymous"; + case rsa: + return "rsa"; + case dsa: + return "dsa"; + case ecdsa: + return "ecdsa"; + case rsa_pss_rsae_sha256: + return "rsa_pss_rsae_sha256"; + case rsa_pss_rsae_sha384: + return "rsa_pss_rsae_sha384"; + case rsa_pss_rsae_sha512: + return "rsa_pss_rsae_sha512"; + case ed25519: + return "ed25519"; + case ed448: + return "ed448"; + case rsa_pss_pss_sha256: + return "rsa_pss_pss_sha256"; + case rsa_pss_pss_sha384: + return "rsa_pss_pss_sha384"; + case rsa_pss_pss_sha512: + return "rsa_pss_pss_sha512"; + case ecdsa_brainpoolP256r1tls13_sha256: + return "ecdsa_brainpoolP256r1tls13_sha256"; + case ecdsa_brainpoolP384r1tls13_sha384: + return "ecdsa_brainpoolP384r1tls13_sha384"; + case ecdsa_brainpoolP512r1tls13_sha512: + return "ecdsa_brainpoolP512r1tls13_sha512"; + case gostr34102012_256: + return "gostr34102012_256"; + case gostr34102012_512: + return "gostr34102012_512"; + default: + return "UNKNOWN"; + } + } + + public static string GetText(short signatureAlgorithm) + { + return GetName(signatureAlgorithm) + "(" + signatureAlgorithm + ")"; + } + + public static bool IsRecognized(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case anonymous: + case rsa: + case dsa: + case ecdsa: + case rsa_pss_rsae_sha256: + case rsa_pss_rsae_sha384: + case rsa_pss_rsae_sha512: + case ed25519: + case ed448: + case rsa_pss_pss_sha256: + case rsa_pss_pss_sha384: + case rsa_pss_pss_sha512: + case ecdsa_brainpoolP256r1tls13_sha256: + case ecdsa_brainpoolP384r1tls13_sha384: + case ecdsa_brainpoolP512r1tls13_sha512: + case gostr34102012_256: + case gostr34102012_512: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs.meta new file mode 100644 index 00000000..2b70caf0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09ae5700537f32741b0287de6f4e44a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs new file mode 100644 index 00000000..bad80bd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5246 7.4.1.4.1 + public sealed class SignatureAndHashAlgorithm + { + public static readonly SignatureAndHashAlgorithm ecdsa_brainpoolP256r1tls13_sha256 = + Create(SignatureScheme.ecdsa_brainpoolP256r1tls13_sha256); + public static readonly SignatureAndHashAlgorithm ecdsa_brainpoolP384r1tls13_sha384 = + Create(SignatureScheme.ecdsa_brainpoolP384r1tls13_sha384); + public static readonly SignatureAndHashAlgorithm ecdsa_brainpoolP512r1tls13_sha512 = + Create(SignatureScheme.ecdsa_brainpoolP512r1tls13_sha512); + public static readonly SignatureAndHashAlgorithm ed25519 = + Create(SignatureScheme.ed25519); + public static readonly SignatureAndHashAlgorithm ed448 = + Create(SignatureScheme.ed448); + public static readonly SignatureAndHashAlgorithm gostr34102012_256 = + Create(HashAlgorithm.Intrinsic, SignatureAlgorithm.gostr34102012_256); + public static readonly SignatureAndHashAlgorithm gostr34102012_512 = + Create(HashAlgorithm.Intrinsic, SignatureAlgorithm.gostr34102012_512); + public static readonly SignatureAndHashAlgorithm rsa_pss_rsae_sha256 = + Create(SignatureScheme.rsa_pss_rsae_sha256); + public static readonly SignatureAndHashAlgorithm rsa_pss_rsae_sha384 = + Create(SignatureScheme.rsa_pss_rsae_sha384); + public static readonly SignatureAndHashAlgorithm rsa_pss_rsae_sha512 = + Create(SignatureScheme.rsa_pss_rsae_sha512); + public static readonly SignatureAndHashAlgorithm rsa_pss_pss_sha256 = + Create(SignatureScheme.rsa_pss_pss_sha256); + public static readonly SignatureAndHashAlgorithm rsa_pss_pss_sha384 = + Create(SignatureScheme.rsa_pss_pss_sha384); + public static readonly SignatureAndHashAlgorithm rsa_pss_pss_sha512 = + Create(SignatureScheme.rsa_pss_pss_sha512); + + public static SignatureAndHashAlgorithm GetInstance(short hashAlgorithm, short signatureAlgorithm) + { + switch (hashAlgorithm) + { + case HashAlgorithm.Intrinsic: + return GetInstanceIntrinsic(signatureAlgorithm); + default: + return Create(hashAlgorithm, signatureAlgorithm); + } + } + + private static SignatureAndHashAlgorithm GetInstanceIntrinsic(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.ed25519: + return ed25519; + case SignatureAlgorithm.ed448: + return ed448; + case SignatureAlgorithm.gostr34102012_256: + return gostr34102012_256; + case SignatureAlgorithm.gostr34102012_512: + return gostr34102012_512; + case SignatureAlgorithm.rsa_pss_rsae_sha256: + return rsa_pss_rsae_sha256; + case SignatureAlgorithm.rsa_pss_rsae_sha384: + return rsa_pss_rsae_sha384; + case SignatureAlgorithm.rsa_pss_rsae_sha512: + return rsa_pss_rsae_sha512; + case SignatureAlgorithm.rsa_pss_pss_sha256: + return rsa_pss_pss_sha256; + case SignatureAlgorithm.rsa_pss_pss_sha384: + return rsa_pss_pss_sha384; + case SignatureAlgorithm.rsa_pss_pss_sha512: + return rsa_pss_pss_sha512; + case SignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256: + return ecdsa_brainpoolP256r1tls13_sha256; + case SignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384: + return ecdsa_brainpoolP384r1tls13_sha384; + case SignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512: + return ecdsa_brainpoolP512r1tls13_sha512; + default: + return Create(HashAlgorithm.Intrinsic, signatureAlgorithm); + } + } + + private static SignatureAndHashAlgorithm Create(int signatureScheme) + { + short hashAlgorithm = SignatureScheme.GetHashAlgorithm(signatureScheme); + short signatureAlgorithm = SignatureScheme.GetSignatureAlgorithm(signatureScheme); + return Create(hashAlgorithm, signatureAlgorithm); + } + + private static SignatureAndHashAlgorithm Create(short hashAlgorithm, short signatureAlgorithm) + { + return new SignatureAndHashAlgorithm(hashAlgorithm, signatureAlgorithm); + } + + private readonly short m_hash; + private readonly short m_signature; + + /// + /// + public SignatureAndHashAlgorithm(short hash, short signature) + { + /* + * TODO]tls] The TlsUtils methods are inlined here to avoid circular static initialization + * b/w these classes. We should refactor parts of TlsUtils into separate classes. e.g. the + * TLS low-level encoding methods, and/or the SigAndHash registry and methods. + */ + + //if (!TlsUtilities.IsValidUint8(hash)) + if ((hash & 0xFF) != hash) + throw new ArgumentException("should be a uint8", "hash"); + + //if (!TlsUtilities.IsValidUint8(signature)) + if ((signature & 0xFF) != signature) + throw new ArgumentException("should be a uint8", "signature"); + + this.m_hash = hash; + this.m_signature = signature; + } + + /// + public short Hash + { + get { return m_hash; } + } + + /// + public short Signature + { + get { return m_signature; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(Hash, output); + TlsUtilities.WriteUint8(Signature, output); + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static SignatureAndHashAlgorithm Parse(Stream input) + { + short hash = TlsUtilities.ReadUint8(input); + short signature = TlsUtilities.ReadUint8(input); + + return GetInstance(hash, signature); + } + + public override bool Equals(object obj) + { + if (!(obj is SignatureAndHashAlgorithm)) + return false; + + SignatureAndHashAlgorithm other = (SignatureAndHashAlgorithm)obj; + return other.Hash == Hash && other.Signature == Signature; + } + + public override int GetHashCode() + { + return ((int)Hash << 16) | (int)Signature; + } + + public override string ToString() + { + return "{" + HashAlgorithm.GetText(Hash) + "," + SignatureAlgorithm.GetText(Signature) + "}"; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs.meta new file mode 100644 index 00000000..694fef88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 601cccb38d13763489c2a24d81ac7054 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureAndHashAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs new file mode 100644 index 00000000..4927e926 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs @@ -0,0 +1,244 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class SignatureScheme + { + /* + * RFC 8446 + */ + + public const int rsa_pkcs1_sha1 = 0x0201; + public const int ecdsa_sha1 = 0x0203; + + public const int rsa_pkcs1_sha256 = 0x0401; + public const int rsa_pkcs1_sha384 = 0x0501; + public const int rsa_pkcs1_sha512 = 0x0601; + + public const int ecdsa_secp256r1_sha256 = 0x0403; + public const int ecdsa_secp384r1_sha384 = 0x0503; + public const int ecdsa_secp521r1_sha512 = 0x0603; + + public const int rsa_pss_rsae_sha256 = 0x0804; + public const int rsa_pss_rsae_sha384 = 0x0805; + public const int rsa_pss_rsae_sha512 = 0x0806; + + public const int ed25519 = 0x0807; + public const int ed448 = 0x0808; + + public const int rsa_pss_pss_sha256 = 0x0809; + public const int rsa_pss_pss_sha384 = 0x080A; + public const int rsa_pss_pss_sha512 = 0x080B; + + /* + * RFC 8734 + */ + + public const int ecdsa_brainpoolP256r1tls13_sha256 = 0x081A; + public const int ecdsa_brainpoolP384r1tls13_sha384 = 0x081B; + public const int ecdsa_brainpoolP512r1tls13_sha512 = 0x081C; + + /* + * RFC 8998 + */ + + public const int sm2sig_sm3 = 0x0708; + + /* + * RFC 8446 reserved for private use (0xFE00..0xFFFF) + */ + + public static int From(SignatureAndHashAlgorithm sigAndHashAlg) + { + if (null == sigAndHashAlg) + throw new ArgumentNullException(); + + return From(sigAndHashAlg.Hash, sigAndHashAlg.Signature); + } + + public static int From(short hashAlgorithm, short signatureAlgorithm) + { + return ((hashAlgorithm & 0xFF) << 8) | (signatureAlgorithm & 0xFF); + } + + public static int GetCryptoHashAlgorithm(int signatureScheme) + { + switch (signatureScheme) + { + case ed25519: + case ed448: + return -1; + case ecdsa_brainpoolP256r1tls13_sha256: + case rsa_pss_pss_sha256: + case rsa_pss_rsae_sha256: + return CryptoHashAlgorithm.sha256; + case ecdsa_brainpoolP384r1tls13_sha384: + case rsa_pss_pss_sha384: + case rsa_pss_rsae_sha384: + return CryptoHashAlgorithm.sha384; + case ecdsa_brainpoolP512r1tls13_sha512: + case rsa_pss_pss_sha512: + case rsa_pss_rsae_sha512: + return CryptoHashAlgorithm.sha512; + case sm2sig_sm3: + return CryptoHashAlgorithm.sm3; + default: + { + short hashAlgorithm = GetHashAlgorithm(signatureScheme); + if (HashAlgorithm.Intrinsic == hashAlgorithm || !HashAlgorithm.IsRecognized(hashAlgorithm)) + return -1; + + return TlsCryptoUtilities.GetHash(hashAlgorithm); + } + } + } + + public static int GetCryptoHashAlgorithm(SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + return GetCryptoHashAlgorithm(From(signatureAndHashAlgorithm)); + } + + public static string GetName(int signatureScheme) + { + switch (signatureScheme) + { + case rsa_pkcs1_sha1: + return "rsa_pkcs1_sha1"; + case ecdsa_sha1: + return "ecdsa_sha1"; + case rsa_pkcs1_sha256: + return "rsa_pkcs1_sha256"; + case rsa_pkcs1_sha384: + return "rsa_pkcs1_sha384"; + case rsa_pkcs1_sha512: + return "rsa_pkcs1_sha512"; + case ecdsa_secp256r1_sha256: + return "ecdsa_secp256r1_sha256"; + case ecdsa_secp384r1_sha384: + return "ecdsa_secp384r1_sha384"; + case ecdsa_secp521r1_sha512: + return "ecdsa_secp521r1_sha512"; + case rsa_pss_rsae_sha256: + return "rsa_pss_rsae_sha256"; + case rsa_pss_rsae_sha384: + return "rsa_pss_rsae_sha384"; + case rsa_pss_rsae_sha512: + return "rsa_pss_rsae_sha512"; + case ed25519: + return "ed25519"; + case ed448: + return "ed448"; + case rsa_pss_pss_sha256: + return "rsa_pss_pss_sha256"; + case rsa_pss_pss_sha384: + return "rsa_pss_pss_sha384"; + case rsa_pss_pss_sha512: + return "rsa_pss_pss_sha512"; + case ecdsa_brainpoolP256r1tls13_sha256: + return "ecdsa_brainpoolP256r1tls13_sha256"; + case ecdsa_brainpoolP384r1tls13_sha384: + return "ecdsa_brainpoolP384r1tls13_sha384"; + case ecdsa_brainpoolP512r1tls13_sha512: + return "ecdsa_brainpoolP512r1tls13_sha512"; + case sm2sig_sm3: + return "sm2sig_sm3"; + default: + return "UNKNOWN"; + } + } + + /** + * For TLS 1.3+ usage, some signature schemes are constrained to use a particular + * ({@link NamedGroup}. Not relevant for TLS 1.2 and below. + */ + public static int GetNamedGroup(int signatureScheme) + { + switch (signatureScheme) + { + case ecdsa_brainpoolP256r1tls13_sha256: + return NamedGroup.brainpoolP256r1tls13; + case ecdsa_brainpoolP384r1tls13_sha384: + return NamedGroup.brainpoolP384r1tls13; + case ecdsa_brainpoolP512r1tls13_sha512: + return NamedGroup.brainpoolP512r1tls13; + case ecdsa_secp256r1_sha256: + return NamedGroup.secp256r1; + case ecdsa_secp384r1_sha384: + return NamedGroup.secp384r1; + case ecdsa_secp521r1_sha512: + return NamedGroup.secp521r1; + case sm2sig_sm3: + return NamedGroup.curveSM2; + default: + return -1; + } + } + + public static short GetHashAlgorithm(int signatureScheme) + { + // TODO[RFC 8998] sm2sig_sm3 + return (short)((signatureScheme >> 8) & 0xFF); + } + + public static short GetSignatureAlgorithm(int signatureScheme) + { + // TODO[RFC 8998] sm2sig_sm3 + return (short)(signatureScheme & 0xFF); + } + + public static SignatureAndHashAlgorithm GetSignatureAndHashAlgorithm(int signatureScheme) + { + return SignatureAndHashAlgorithm.GetInstance( + GetHashAlgorithm(signatureScheme), + GetSignatureAlgorithm(signatureScheme)); + } + + public static string GetText(int signatureScheme) + { + string hex = Convert.ToString(signatureScheme, 16).ToUpperInvariant(); + return GetName(signatureScheme) + "(0x" + hex + ")"; + } + + public static bool IsPrivate(int signatureScheme) + { + return (signatureScheme >> 9) == 0xFE; + } + + public static bool IsECDsa(int signatureScheme) + { + switch (signatureScheme) + { + case ecdsa_brainpoolP256r1tls13_sha256: + case ecdsa_brainpoolP384r1tls13_sha384: + case ecdsa_brainpoolP512r1tls13_sha512: + return true; + default: + return SignatureAlgorithm.ecdsa == GetSignatureAlgorithm(signatureScheme); + } + } + + public static bool IsRsaPss(int signatureScheme) + { + switch (signatureScheme) + { + case rsa_pss_rsae_sha256: + case rsa_pss_rsae_sha384: + case rsa_pss_rsae_sha512: + case rsa_pss_pss_sha256: + case rsa_pss_pss_sha384: + case rsa_pss_pss_sha512: + return true; + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs.meta new file mode 100644 index 00000000..c337279a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 76f126303fb85174fba939c967467d49 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SignatureScheme.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs new file mode 100644 index 00000000..4ccfc82d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// An implementation of that simulates the existence of "unknown" + /// identities to obscure the fact that there is no verifier for them. + public class SimulatedTlsSrpIdentityManager + : TlsSrpIdentityManager + { + private static readonly byte[] PrefixPassword = Strings.ToByteArray("password"); + private static readonly byte[] PrefixSalt = Strings.ToByteArray("salt"); + + /// Create a that implements the algorithm from RFC 5054 + /// 2.5.1.3. + /// + /// the defining the group that SRP is operating in. + /// the secret "seed key" referred to in RFC 5054 2.5.1.3. + /// an instance of . + /// + public static SimulatedTlsSrpIdentityManager GetRfc5054Default(TlsCrypto crypto, Srp6Group group, byte[] seedKey) + { + TlsMac mac = crypto.CreateHmac(MacAlgorithm.hmac_sha1); + + mac.SetKey(seedKey, 0, seedKey.Length); + + TlsSrpConfig srpConfig = new TlsSrpConfig(); + + srpConfig.SetExplicitNG(new BigInteger[]{ group.N, group.G }); + + return new SimulatedTlsSrpIdentityManager(group, crypto.CreateSrp6VerifierGenerator(srpConfig), mac); + } + + protected readonly Srp6Group m_group; + protected readonly TlsSrp6VerifierGenerator m_verifierGenerator; + protected readonly TlsMac m_mac; + + public SimulatedTlsSrpIdentityManager(Srp6Group group, TlsSrp6VerifierGenerator verifierGenerator, TlsMac mac) + { + this.m_group = group; + this.m_verifierGenerator = verifierGenerator; + this.m_mac = mac; + } + + public virtual TlsSrpLoginParameters GetLoginParameters(byte[] identity) + { + m_mac.Update(PrefixSalt, 0, PrefixSalt.Length); + m_mac.Update(identity, 0, identity.Length); + + byte[] salt = m_mac.CalculateMac(); + + m_mac.Update(PrefixPassword, 0, PrefixPassword.Length); + m_mac.Update(identity, 0, identity.Length); + + byte[] password = m_mac.CalculateMac(); + + BigInteger verifier = m_verifierGenerator.GenerateVerifier(salt, identity, password); + + TlsSrpConfig srpConfig = new TlsSrpConfig(); + srpConfig.SetExplicitNG(new BigInteger[]{ m_group.N, m_group.G }); + + return new TlsSrpLoginParameters(identity, srpConfig, verifier, salt); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs.meta new file mode 100644 index 00000000..f46b8136 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1916b895d4643ac49b2479911581890a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SimulatedTlsSrpIdentityManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs new file mode 100644 index 00000000..c1c8ee3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class SrpTlsClient + : AbstractTlsClient + { + private static readonly int[] DefaultCipherSuites = new int[] + { + CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA + }; + + protected readonly TlsSrpIdentity m_srpIdentity; + + public SrpTlsClient(TlsCrypto crypto, byte[] identity, byte[] password) + : this(crypto, new BasicTlsSrpIdentity(identity, password)) + { + } + + public SrpTlsClient(TlsCrypto crypto, TlsSrpIdentity srpIdentity) + : base(crypto) + { + this.m_srpIdentity = srpIdentity; + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + protected override ProtocolVersion[] GetSupportedVersions() + { + return ProtocolVersion.TLSv12.Only(); + } + + protected virtual bool RequireSrpServerExtension + { + // No explicit guidance in RFC 5054; by default an (empty) extension from server is optional + get { return false; } + } + + /// + public override IDictionary GetClientExtensions() + { + var clientExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised( + base.GetClientExtensions()); + TlsSrpUtilities.AddSrpExtension(clientExtensions, m_srpIdentity.GetSrpIdentity()); + return clientExtensions; + } + + /// + public override void ProcessServerExtensions(IDictionary serverExtensions) + { + if (!TlsUtilities.HasExpectedEmptyExtensionData(serverExtensions, ExtensionType.srp, + AlertDescription.illegal_parameter)) + { + if (RequireSrpServerExtension) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + base.ProcessServerExtensions(serverExtensions); + } + + public override TlsSrpIdentity GetSrpIdentity() + { + return m_srpIdentity; + } + + /// + public override TlsAuthentication GetAuthentication() + { + /* + * Note: This method is not called unless a server certificate is sent, which may be the + * case e.g. for SRP_DSS or SRP_RSA key exchange. + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs.meta new file mode 100644 index 00000000..38a77ac1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ebf9ad97e381cd4e83df7c9cce5ebf9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsClient.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs new file mode 100644 index 00000000..5a5c137d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class SrpTlsServer + : AbstractTlsServer + { + private static readonly int[] DefaultCipherSuites = new int[] + { + CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA, + CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA + }; + + protected readonly TlsSrpIdentityManager m_srpIdentityManager; + + protected byte[] m_srpIdentity = null; + protected TlsSrpLoginParameters m_srpLoginParameters = null; + + public SrpTlsServer(TlsCrypto crypto, TlsSrpIdentityManager srpIdentityManager) + : base(crypto) + { + this.m_srpIdentityManager = srpIdentityManager; + } + + /// + protected virtual TlsCredentialedSigner GetDsaSignerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /// + protected virtual TlsCredentialedSigner GetRsaSignerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + protected override ProtocolVersion[] GetSupportedVersions() + { + return ProtocolVersion.TLSv12.Only(); + } + + protected override int[] GetSupportedCipherSuites() + { + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + public override void ProcessClientExtensions(IDictionary clientExtensions) + { + base.ProcessClientExtensions(clientExtensions); + + this.m_srpIdentity = TlsSrpUtilities.GetSrpExtension(clientExtensions); + } + + public override int GetSelectedCipherSuite() + { + int cipherSuite = base.GetSelectedCipherSuite(); + + if (TlsSrpUtilities.IsSrpCipherSuite(cipherSuite)) + { + if (m_srpIdentity != null) + { + this.m_srpLoginParameters = m_srpIdentityManager.GetLoginParameters(m_srpIdentity); + } + + if (m_srpLoginParameters == null) + throw new TlsFatalAlert(AlertDescription.unknown_psk_identity); + } + + return cipherSuite; + } + + public override TlsCredentials GetCredentials() + { + int keyExchangeAlgorithm = m_context.SecurityParameters.KeyExchangeAlgorithm; + + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.SRP: + return null; + + case KeyExchangeAlgorithm.SRP_DSS: + return GetDsaSignerCredentials(); + + case KeyExchangeAlgorithm.SRP_RSA: + return GetRsaSignerCredentials(); + + default: + // Note: internal error here; selected a key exchange we don't implement! + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + public override TlsSrpLoginParameters GetSrpLoginParameters() + { + return m_srpLoginParameters; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs.meta new file mode 100644 index 00000000..2c5c0f46 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c155cb0b7bcf1a24fbc0773d798e4226 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrpTlsServer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs new file mode 100644 index 00000000..46535aeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class SrtpProtectionProfile + { + /* + * RFC 5764 4.1.2. + */ + public const int SRTP_AES128_CM_HMAC_SHA1_80 = 0x0001; + public const int SRTP_AES128_CM_HMAC_SHA1_32 = 0x0002; + public const int SRTP_NULL_HMAC_SHA1_80 = 0x0005; + public const int SRTP_NULL_HMAC_SHA1_32 = 0x0006; + + /* + * RFC 7714 14.2. + */ + public const int SRTP_AEAD_AES_128_GCM = 0x0007; + public const int SRTP_AEAD_AES_256_GCM = 0x0008; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs.meta new file mode 100644 index 00000000..2cbb67e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3c87d74a5d3dbab43af3dfbd295ba579 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SrtpProtectionProfile.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs new file mode 100644 index 00000000..d6e4f8e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal abstract class Ssl3Utilities + { + private static readonly byte[] SSL_CLIENT = {0x43, 0x4C, 0x4E, 0x54}; + private static readonly byte[] SSL_SERVER = {0x53, 0x52, 0x56, 0x52}; + + private const byte IPAD_BYTE = (byte)0x36; + private const byte OPAD_BYTE = (byte)0x5C; + + private static readonly byte[] IPAD = GenPad(IPAD_BYTE, 48); + private static readonly byte[] OPAD = GenPad(OPAD_BYTE, 48); + + internal static byte[] CalculateVerifyData(TlsHandshakeHash handshakeHash, bool isServer) + { + TlsHash prf = handshakeHash.ForkPrfHash(); + byte[] sslSender = isServer ? SSL_SERVER : SSL_CLIENT; + prf.Update(sslSender, 0, sslSender.Length); + return prf.CalculateHash(); + } + + internal static void CompleteCombinedHash(TlsContext context, TlsHash md5, TlsHash sha1) + { + TlsSecret masterSecret = context.SecurityParameters.MasterSecret; + byte[] master_secret = context.Crypto.AdoptSecret(masterSecret).Extract(); + + CompleteHash(master_secret, md5, 48); + CompleteHash(master_secret, sha1, 40); + } + + private static void CompleteHash(byte[] master_secret, TlsHash hash, int padLength) + { + hash.Update(master_secret, 0, master_secret.Length); + hash.Update(IPAD, 0, padLength); + + byte[] tmp = hash.CalculateHash(); + + hash.Update(master_secret, 0, master_secret.Length); + hash.Update(OPAD, 0, padLength); + hash.Update(tmp, 0, tmp.Length); + } + + private static byte[] GenPad(byte b, int count) + { + byte[] padding = new byte[count]; + Arrays.Fill(padding, b); + return padding; + } + + /// + internal static byte[] ReadEncryptedPms(Stream input) + { + return Streams.ReadAll(input); + } + + /// + internal static void WriteEncryptedPms(byte[] encryptedPms, Stream output) + { + output.Write(encryptedPms, 0, encryptedPms.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs.meta new file mode 100644 index 00000000..fd5e49a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d2aae7d4d2ec3f4fbb6ee53f34faea0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Ssl3Utilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs new file mode 100644 index 00000000..fbcedf1c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class SupplementalDataEntry + { + private readonly int m_dataType; + private readonly byte[] m_data; + + public SupplementalDataEntry(int dataType, byte[] data) + { + this.m_dataType = dataType; + this.m_data = data; + } + + public int DataType + { + get { return m_dataType; } + } + + public byte[] Data + { + get { return m_data; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs.meta new file mode 100644 index 00000000..714fa43f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f6c127e1d13225d44bfd7462ffbf0448 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs new file mode 100644 index 00000000..e28dab66 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 4680 + public abstract class SupplementalDataType + { + /* + * RFC 4681 + */ + public const int user_mapping_data = 0; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs.meta new file mode 100644 index 00000000..9a7b2f93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1cc87eb55c070d4b9e79c0ae0ae7004 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/SupplementalDataType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs new file mode 100644 index 00000000..69880274 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs @@ -0,0 +1,123 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class Timeout + { + private long durationMillis; + private long startMillis; + + internal Timeout(long durationMillis) + : this(durationMillis, DateTimeUtilities.CurrentUnixMs()) + { + } + + internal Timeout(long durationMillis, long currentTimeMillis) + { + this.durationMillis = System.Math.Max(0, durationMillis); + this.startMillis = System.Math.Max(0, currentTimeMillis); + } + + //internal long RemainingMillis() + //{ + // return RemainingMillis(DateTimeUtilities.CurrentUnixMs()); + //} + + internal long RemainingMillis(long currentTimeMillis) + { + lock (this) + { + // If clock jumped backwards, reset start time + if (startMillis > currentTimeMillis) + { + startMillis = currentTimeMillis; + return durationMillis; + } + + long elapsed = currentTimeMillis - startMillis; + long remaining = durationMillis - elapsed; + + // Once timeout reached, lock it in + if (remaining <= 0) + return durationMillis = 0L; + + return remaining; + } + } + + //internal static int ConstrainWaitMillis(int waitMillis, Timeout timeout) + //{ + // return constrainWaitMillis(waitMillis, timeout, DateTimeUtilities.CurrentUnixMs()); + //} + + internal static int ConstrainWaitMillis(int waitMillis, Timeout timeout, long currentTimeMillis) + { + if (waitMillis < 0) + return -1; + + int timeoutMillis = GetWaitMillis(timeout, currentTimeMillis); + if (timeoutMillis < 0) + return -1; + + if (waitMillis == 0) + return timeoutMillis; + + if (timeoutMillis == 0) + return waitMillis; + + return System.Math.Min(waitMillis, timeoutMillis); + } + + internal static Timeout ForWaitMillis(int waitMillis) + { + return ForWaitMillis(waitMillis, DateTimeUtilities.CurrentUnixMs()); + } + + internal static Timeout ForWaitMillis(int waitMillis, long currentTimeMillis) + { + if (waitMillis < 0) + throw new ArgumentException("cannot be negative", "waitMillis"); + + if (waitMillis > 0) + return new Timeout(waitMillis, currentTimeMillis); + + return null; + } + + //internal static int GetWaitMillis(Timeout timeout) + //{ + // return GetWaitMillis(timeout, DateTimeUtilities.CurrentUnixMs()); + //} + + internal static int GetWaitMillis(Timeout timeout, long currentTimeMillis) + { + if (null == timeout) + return 0; + + long remainingMillis = timeout.RemainingMillis(currentTimeMillis); + if (remainingMillis < 1L) + return -1; + + if (remainingMillis > int.MaxValue) + return int.MaxValue; + + return (int)remainingMillis; + } + + internal static bool HasExpired(Timeout timeout) + { + return HasExpired(timeout, DateTimeUtilities.CurrentUnixMs()); + } + + internal static bool HasExpired(Timeout timeout, long currentTimeMillis) + { + return null != timeout && timeout.RemainingMillis(currentTimeMillis) < 1L; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs.meta new file mode 100644 index 00000000..b6c12e19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f906efcf7c25ee040b9dd0a20c1e40d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/Timeout.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs new file mode 100644 index 00000000..bd1e733b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface to provide TLS authentication credentials. + public interface TlsAuthentication + { + /// Called by the protocol handler to report the server certificate. + /// + /// Note: this method is responsible for certificate verification and validation. + /// + /// the server certificate received. + /// + void NotifyServerCertificate(TlsServerCertificate serverCertificate); + + /// Return client credentials in response to server's certificate request. + /// + /// The returned value may be null, or else it MUST implement exactly one of + /// , , or + /// , depending on the key exchange that was negotiated and the details of + /// the . + /// + /// details of the certificate request. + /// a object or null for no client authentication. + /// + TlsCredentials GetClientCredentials(CertificateRequest certificateRequest); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs.meta new file mode 100644 index 00000000..3405945d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7f58a9662ab5eec4cad76904b04d71e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsAuthentication.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs new file mode 100644 index 00000000..94509051 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs @@ -0,0 +1,115 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface TlsClient + : TlsPeer + { + void Init(TlsClientContext context); + + /// Return the session this client wants to resume, if any. + /// + /// Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated. + /// + /// A representing the resumable session to be used for this connection, or + /// null to use a new session. + /// + TlsSession GetSessionToResume(); + + /// Return the external PSKs to offer in the ClientHello. + /// This will only be called when TLS 1.3 or higher is amongst the offered protocol versions. + /// an of instances, or null if none should be + /// offered. + IList GetExternalPsks(); + + bool IsFallback(); + + /// (Int32 -> byte[]) + /// + IDictionary GetClientExtensions(); + + /// If this client is offering TLS 1.3 or higher, this method may be called to determine for which + /// groups a key share should be included in the initial ClientHello. + /// + /// Groups that were not included in the supported_groups extension (by will + /// be ignored. The protocol will then add a suitable key_share extension to the ClientHello extensions. + /// + /// an of named group values, possibly empty or + /// null. + /// + IList GetEarlyKeyShareGroups(); + + /// + void NotifyServerVersion(ProtocolVersion selectedVersion); + + /// Notifies the client of the session that will be offered in ClientHello for resumption, if any. + /// + /// + /// This will be either the session returned from {@link #getSessionToResume()} or null if that session was + /// unusable. NOTE: the actual negotiated session_id is notified by . + /// + /// The representing the resumable session to be offered for + /// this connection, or null if there is none. + /// + void NotifySessionToResume(TlsSession session); + + /// Notifies the client of the session_id sent in the ServerHello. + /// + /// + void NotifySessionID(byte[] sessionID); + + void NotifySelectedCipherSuite(int selectedCipherSuite); + + /// + void NotifySelectedPsk(TlsPsk selectedPsk); + + /// The protocol implementation validates that any server extensions received correspond to client + /// extensions sent. + /// + /// If further processing of the server extensions is needed, it can be done in this callback. NOTE: This is + /// not called for session resumption handshakes. + /// + /// (Int32 -> byte[]) + /// + void ProcessServerExtensions(IDictionary serverExtensions); + + /// (SupplementalDataEntry) + /// + void ProcessServerSupplementalData(IList serverSupplementalData); + + /// + TlsPskIdentity GetPskIdentity(); + + /// + TlsSrpIdentity GetSrpIdentity(); + + /// + TlsDHGroupVerifier GetDHGroupVerifier(); + + /// + TlsSrpConfigVerifier GetSrpConfigVerifier(); + + /// + TlsAuthentication GetAuthentication(); + + /// (SupplementalDataEntry) + /// + IList GetClientSupplementalData(); + + /// RFC 5077 3.3. NewSessionTicket Handshake Message + /// + /// This method will be called (only) when a NewSessionTicket handshake message is received. The ticket is + /// opaque to the client and clients MUST NOT examine the ticket under the assumption that it complies with e.g. + /// RFC 5077 4. "Recommended Ticket Construction". + /// + /// The ticket. + /// + void NotifyNewSessionTicket(NewSessionTicket newSessionTicket); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs.meta new file mode 100644 index 00000000..68747e7a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 252e272e6cb28e74ab73cf2bd6dc71af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClient.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs new file mode 100644 index 00000000..89ea8625 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Marker interface to distinguish a TLS client context. + public interface TlsClientContext + : TlsContext + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs.meta new file mode 100644 index 00000000..0391a27e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b0a57ddd93aea34582345b012f33499 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContext.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs new file mode 100644 index 00000000..64203f42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class TlsClientContextImpl + : AbstractTlsContext, TlsClientContext + { + internal TlsClientContextImpl(TlsCrypto crypto) + : base(crypto, ConnectionEnd.client) + { + } + + public override bool IsServer + { + get { return false; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs.meta new file mode 100644 index 00000000..6c9cc333 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 43f8b6eb10560874484bccdc44902091 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientContextImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs new file mode 100644 index 00000000..3d0a22dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs @@ -0,0 +1,1909 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class TlsClientProtocol + : TlsProtocol + { + protected TlsClient m_tlsClient = null; + internal TlsClientContextImpl m_tlsClientContext = null; + + protected IDictionary m_clientAgreements = null; + internal OfferedPsks.BindersConfig m_clientBinders = null; + protected ClientHello m_clientHello = null; + protected TlsKeyExchange m_keyExchange = null; + protected TlsAuthentication m_authentication = null; + + protected CertificateStatus m_certificateStatus = null; + protected CertificateRequest m_certificateRequest = null; + + /// Constructor for non-blocking mode. + /// + /// When data is received, use to provide the received ciphertext, + /// then use to read the corresponding cleartext.

    + /// Similarly, when data needs to be sent, use + /// to provide the cleartext, then use to get the + /// corresponding ciphertext. + ///
    + public TlsClientProtocol() + : base() + { + } + + /// Constructor for blocking mode. + /// The of data to/from the server. + public TlsClientProtocol(Stream stream) + : base(stream) + { + } + + /// Constructor for blocking mode. + /// The of data from the server. + /// The of data to the server. + public TlsClientProtocol(Stream input, Stream output) + : base(input, output) + { + } + + /// Initiates a TLS handshake in the role of client. + /// + /// In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use + /// to receive a callback when the handshake is complete. + /// + /// The to use for the handshake. + /// If in blocking mode and handshake was not successful. + public virtual void Connect(TlsClient tlsClient) + { + if (tlsClient == null) + throw new ArgumentNullException("tlsClient"); + if (m_tlsClient != null) + throw new InvalidOperationException("'Connect' can only be called once"); + + this.m_tlsClient = tlsClient; + this.m_tlsClientContext = new TlsClientContextImpl(tlsClient.Crypto); + + tlsClient.Init(m_tlsClientContext); + tlsClient.NotifyCloseHandle(this); + + BeginHandshake(false); + + if (m_blocking) + { + BlockForHandshake(); + } + } + + protected override void BeginHandshake(bool renegotiation) + { + base.BeginHandshake(renegotiation); + + SendClientHello(); + this.m_connectionState = CS_CLIENT_HELLO; + } + + protected override void CleanupHandshake() + { + base.CleanupHandshake(); + + this.m_clientAgreements = null; + this.m_clientBinders = null; + this.m_clientHello = null; + this.m_keyExchange = null; + this.m_authentication = null; + + this.m_certificateStatus = null; + this.m_certificateRequest = null; + } + + protected override TlsContext Context + { + get { return m_tlsClientContext; } + } + + internal override AbstractTlsContext ContextAdmin + { + get { return m_tlsClientContext; } + } + + protected override TlsPeer Peer + { + get { return m_tlsClient; } + } + + /// + protected virtual void Handle13HandshakeMessage(short type, HandshakeMessageInput buf) + { + if (!IsTlsV13ConnectionState()) + throw new TlsFatalAlert(AlertDescription.internal_error); + + switch (type) + { + case HandshakeType.certificate: + { + switch (m_connectionState) + { + case CS_SERVER_ENCRYPTED_EXTENSIONS: + case CS_SERVER_CERTIFICATE_REQUEST: + { + if (m_connectionState != CS_SERVER_CERTIFICATE_REQUEST) + { + Skip13CertificateRequest(); + } + + Receive13ServerCertificate(buf); + this.m_connectionState = CS_SERVER_CERTIFICATE; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.certificate_request: + { + switch (m_connectionState) + { + case CS_END: + { + // TODO[tls13] Permit post-handshake authentication if we sent post_handshake_auth extension + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + case CS_SERVER_ENCRYPTED_EXTENSIONS: + { + Receive13CertificateRequest(buf, false); + this.m_connectionState = CS_SERVER_CERTIFICATE_REQUEST; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.certificate_verify: + { + switch (m_connectionState) + { + case CS_SERVER_CERTIFICATE: + { + Receive13ServerCertificateVerify(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_CERTIFICATE_VERIFY; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.encrypted_extensions: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO: + { + Receive13EncryptedExtensions(buf); + this.m_connectionState = CS_SERVER_ENCRYPTED_EXTENSIONS; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.finished: + { + switch (m_connectionState) + { + case CS_SERVER_ENCRYPTED_EXTENSIONS: + case CS_SERVER_CERTIFICATE_REQUEST: + case CS_SERVER_CERTIFICATE_VERIFY: + { + if (m_connectionState == CS_SERVER_ENCRYPTED_EXTENSIONS) + { + Skip13CertificateRequest(); + } + if (m_connectionState != CS_SERVER_CERTIFICATE_VERIFY) + { + Skip13ServerCertificate(); + } + + Receive13ServerFinished(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_FINISHED; + + byte[] serverFinishedTranscriptHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + // See RFC 8446 D.4. + m_recordStream.SetIgnoreChangeCipherSpec(false); + + /* + * TODO[tls13] After receiving the server's Finished message, if the server has accepted early + * data, an EndOfEarlyData message will be sent to indicate the key change. This message will + * be encrypted with the 0-RTT traffic keys. + */ + + if (null != m_certificateRequest) + { + TlsCredentialedSigner clientCredentials = TlsUtilities.Establish13ClientCredentials( + m_authentication, m_certificateRequest); + + Certificate clientCertificate = null; + if (null != clientCredentials) + { + clientCertificate = clientCredentials.Certificate; + } + + if (null == clientCertificate) + { + // In this calling context, certificate_request_context is length 0 + clientCertificate = Certificate.EmptyChainTls13; + } + + Send13CertificateMessage(clientCertificate); + this.m_connectionState = CS_CLIENT_CERTIFICATE; + + if (null != clientCredentials) + { + DigitallySigned certificateVerify = TlsUtilities.Generate13CertificateVerify( + m_tlsClientContext, clientCredentials, m_handshakeHash); + Send13CertificateVerifyMessage(certificateVerify); + this.m_connectionState = CS_CLIENT_CERTIFICATE_VERIFY; + } + } + + Send13FinishedMessage(); + this.m_connectionState = CS_CLIENT_FINISHED; + + TlsUtilities.Establish13PhaseApplication(m_tlsClientContext, serverFinishedTranscriptHash, + m_recordStream); + + m_recordStream.EnablePendingCipherWrite(); + m_recordStream.EnablePendingCipherRead(false); + + CompleteHandshake(); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.key_update: + { + Receive13KeyUpdate(buf); + break; + } + case HandshakeType.new_session_ticket: + { + Receive13NewSessionTicket(buf); + break; + } + case HandshakeType.server_hello: + { + switch (m_connectionState) + { + case CS_CLIENT_HELLO: + { + // NOTE: Legacy handler should be dispatching initial ServerHello/HelloRetryRequest. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + case CS_CLIENT_HELLO_RETRY: + { + ServerHello serverHello = ReceiveServerHelloMessage(buf); + if (serverHello.IsHelloRetryRequest()) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + Process13ServerHello(serverHello, true); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_HELLO; + + Process13ServerHelloCoda(serverHello, true); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + + case HandshakeType.certificate_status: + case HandshakeType.certificate_url: + case HandshakeType.client_hello: + case HandshakeType.client_key_exchange: + case HandshakeType.compressed_certificate: + case HandshakeType.end_of_early_data: + case HandshakeType.hello_request: + case HandshakeType.hello_verify_request: + case HandshakeType.message_hash: + case HandshakeType.server_hello_done: + case HandshakeType.server_key_exchange: + case HandshakeType.supplemental_data: + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + protected override void HandleHandshakeMessage(short type, HandshakeMessageInput buf) + { + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + + if (m_connectionState > CS_CLIENT_HELLO + && TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + { + if (securityParameters.IsResumedSession) + throw new TlsFatalAlert(AlertDescription.internal_error); + + Handle13HandshakeMessage(type, buf); + return; + } + + if (!IsLegacyConnectionState()) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (securityParameters.IsResumedSession) + { + if (type != HandshakeType.finished || m_connectionState != CS_SERVER_HELLO) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + ProcessFinishedMessage(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_FINISHED; + + SendChangeCipherSpec(); + SendFinishedMessage(); + this.m_connectionState = CS_CLIENT_FINISHED; + + CompleteHandshake(); + return; + } + + switch (type) + { + case HandshakeType.certificate: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO: + case CS_SERVER_SUPPLEMENTAL_DATA: + { + if (m_connectionState != CS_SERVER_SUPPLEMENTAL_DATA) + { + HandleSupplementalData(null); + } + + /* + * NOTE: Certificate processing (including authentication) is delayed to allow for a + * possible CertificateStatus message. + */ + m_authentication = TlsUtilities.ReceiveServerCertificate(m_tlsClientContext, m_tlsClient, buf, + m_serverExtensions); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + this.m_connectionState = CS_SERVER_CERTIFICATE; + break; + } + case HandshakeType.certificate_status: + { + switch (m_connectionState) + { + case CS_SERVER_CERTIFICATE: + { + if (securityParameters.StatusRequestVersion < 1) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + this.m_certificateStatus = CertificateStatus.Parse(m_tlsClientContext, buf); + + AssertEmpty(buf); + + this.m_connectionState = CS_SERVER_CERTIFICATE_STATUS; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.finished: + { + switch (m_connectionState) + { + case CS_CLIENT_FINISHED: + case CS_SERVER_SESSION_TICKET: + { + if (m_connectionState != CS_SERVER_SESSION_TICKET) + { + /* + * RFC 5077 3.3. This message MUST be sent if the server included a + * SessionTicket extension in the ServerHello. + */ + if (m_expectSessionTicket) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + ProcessFinishedMessage(buf); + this.m_connectionState = CS_SERVER_FINISHED; + + CompleteHandshake(); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.server_hello: + { + switch (m_connectionState) + { + case CS_CLIENT_HELLO: + { + ServerHello serverHello = ReceiveServerHelloMessage(buf); + + // TODO[tls13] Only treat as HRR if it's TLS 1.3?? + if (serverHello.IsHelloRetryRequest()) + { + Process13HelloRetryRequest(serverHello); + m_handshakeHash.NotifyPrfDetermined(); + m_handshakeHash.SealHashAlgorithms(); + TlsUtilities.AdjustTranscriptForRetry(m_handshakeHash); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_HELLO_RETRY_REQUEST; + + Send13ClientHelloRetry(); + this.m_connectionState = CS_CLIENT_HELLO_RETRY; + } + else + { + ProcessServerHello(serverHello); + m_handshakeHash.NotifyPrfDetermined(); + if (TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + { + m_handshakeHash.SealHashAlgorithms(); + } + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_SERVER_HELLO; + + if (TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + { + Process13ServerHelloCoda(serverHello, false); + } + } + + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.supplemental_data: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO: + { + HandleSupplementalData(ReadSupplementalDataMessage(buf)); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.server_hello_done: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO: + case CS_SERVER_SUPPLEMENTAL_DATA: + case CS_SERVER_CERTIFICATE: + case CS_SERVER_CERTIFICATE_STATUS: + case CS_SERVER_KEY_EXCHANGE: + case CS_SERVER_CERTIFICATE_REQUEST: + { + if (m_connectionState == CS_SERVER_HELLO) + { + HandleSupplementalData(null); + } + if (m_connectionState == CS_SERVER_HELLO || + m_connectionState == CS_SERVER_SUPPLEMENTAL_DATA) + { + this.m_authentication = null; + } + if (m_connectionState != CS_SERVER_KEY_EXCHANGE && + m_connectionState != CS_SERVER_CERTIFICATE_REQUEST) + { + HandleServerCertificate(); + + // There was no server key exchange message; check it's OK + m_keyExchange.SkipServerKeyExchange(); + } + + AssertEmpty(buf); + + this.m_connectionState = CS_SERVER_HELLO_DONE; + + TlsCredentials clientAuthCredentials = null; + TlsCredentialedSigner clientAuthSigner = null; + Certificate clientAuthCertificate = null; + SignatureAndHashAlgorithm clientAuthAlgorithm = null; + TlsStreamSigner clientAuthStreamSigner = null; + + if (m_certificateRequest != null) + { + clientAuthCredentials = TlsUtilities.EstablishClientCredentials(m_authentication, + m_certificateRequest); + if (clientAuthCredentials != null) + { + clientAuthCertificate = clientAuthCredentials.Certificate; + + if (clientAuthCredentials is TlsCredentialedSigner) + { + clientAuthSigner = (TlsCredentialedSigner)clientAuthCredentials; + clientAuthAlgorithm = TlsUtilities.GetSignatureAndHashAlgorithm( + securityParameters.NegotiatedVersion, clientAuthSigner); + clientAuthStreamSigner = clientAuthSigner.GetStreamSigner(); + + if (ProtocolVersion.TLSv12.Equals(securityParameters.NegotiatedVersion)) + { + TlsUtilities.VerifySupportedSignatureAlgorithm(securityParameters.ServerSigAlgs, + clientAuthAlgorithm, AlertDescription.internal_error); + + if (clientAuthStreamSigner == null) + { + TlsUtilities.TrackHashAlgorithmClient(m_handshakeHash, clientAuthAlgorithm); + } + } + + if (clientAuthStreamSigner != null) + { + m_handshakeHash.ForceBuffering(); + } + } + } + } + + m_handshakeHash.SealHashAlgorithms(); + + if (clientAuthCredentials == null) + { + m_keyExchange.SkipClientCredentials(); + } + else + { + m_keyExchange.ProcessClientCredentials(clientAuthCredentials); + } + + var clientSupplementalData = m_tlsClient.GetClientSupplementalData(); + if (clientSupplementalData != null) + { + SendSupplementalDataMessage(clientSupplementalData); + this.m_connectionState = CS_CLIENT_SUPPLEMENTAL_DATA; + } + + if (m_certificateRequest != null) + { + SendCertificateMessage(clientAuthCertificate, null); + this.m_connectionState = CS_CLIENT_CERTIFICATE; + } + + SendClientKeyExchange(); + this.m_connectionState = CS_CLIENT_KEY_EXCHANGE; + + bool isSsl = TlsUtilities.IsSsl(m_tlsClientContext); + if (isSsl) + { + // NOTE: For SSLv3 (only), master_secret needed to calculate session hash + EstablishMasterSecret(m_tlsClientContext, m_keyExchange); + } + + securityParameters.m_sessionHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + if (!isSsl) + { + // NOTE: For (D)TLS, session hash potentially needed for extended_master_secret + EstablishMasterSecret(m_tlsClientContext, m_keyExchange); + } + + m_recordStream.SetPendingCipher(TlsUtilities.InitCipher(m_tlsClientContext)); + + if (clientAuthSigner != null) + { + DigitallySigned certificateVerify = TlsUtilities.GenerateCertificateVerifyClient( + m_tlsClientContext, clientAuthSigner, clientAuthAlgorithm, clientAuthStreamSigner, + m_handshakeHash); + SendCertificateVerifyMessage(certificateVerify); + this.m_connectionState = CS_CLIENT_CERTIFICATE_VERIFY; + } + + m_handshakeHash.StopTracking(); + + SendChangeCipherSpec(); + SendFinishedMessage(); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + this.m_connectionState = CS_CLIENT_FINISHED; + break; + } + case HandshakeType.server_key_exchange: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO: + case CS_SERVER_SUPPLEMENTAL_DATA: + case CS_SERVER_CERTIFICATE: + case CS_SERVER_CERTIFICATE_STATUS: + { + if (m_connectionState == CS_SERVER_HELLO) + { + HandleSupplementalData(null); + } + if (m_connectionState != CS_SERVER_CERTIFICATE && + m_connectionState != CS_SERVER_CERTIFICATE_STATUS) + { + this.m_authentication = null; + } + + HandleServerCertificate(); + + m_keyExchange.ProcessServerKeyExchange(buf); + + AssertEmpty(buf); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + this.m_connectionState = CS_SERVER_KEY_EXCHANGE; + break; + } + case HandshakeType.certificate_request: + { + switch (m_connectionState) + { + case CS_SERVER_CERTIFICATE: + case CS_SERVER_CERTIFICATE_STATUS: + case CS_SERVER_KEY_EXCHANGE: + { + if (m_connectionState != CS_SERVER_KEY_EXCHANGE) + { + HandleServerCertificate(); + + // There was no server key exchange message; check it's OK + m_keyExchange.SkipServerKeyExchange(); + } + + ReceiveCertificateRequest(buf); + + TlsUtilities.EstablishServerSigAlgs(securityParameters, m_certificateRequest); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + this.m_connectionState = CS_SERVER_CERTIFICATE_REQUEST; + break; + } + case HandshakeType.new_session_ticket: + { + switch (m_connectionState) + { + case CS_CLIENT_FINISHED: + { + if (!m_expectSessionTicket) + { + /* + * RFC 5077 3.3. This message MUST NOT be sent if the server did not include a + * SessionTicket extension in the ServerHello. + */ + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + /* + * RFC 5077 3.4. If the client receives a session ticket from the server, then it + * discards any Session ID that was sent in the ServerHello. + */ + securityParameters.m_sessionID = TlsUtilities.EmptyBytes; + InvalidateSession(); + this.m_tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, null); + + ReceiveNewSessionTicket(buf); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + this.m_connectionState = CS_SERVER_SESSION_TICKET; + break; + } + case HandshakeType.hello_request: + { + AssertEmpty(buf); + + /* + * RFC 2246 7.4.1.1 Hello request This message will be ignored by the client if the + * client is currently negotiating a session. This message may be ignored by the client + * if it does not wish to renegotiate a session, or the client may, if it wishes, + * respond with a no_renegotiation alert. + */ + if (IsApplicationDataReady) + { + //RefuseRenegotiation(); + handleRenegotiation(); + } + break; + } + + case HandshakeType.certificate_url: + case HandshakeType.certificate_verify: + case HandshakeType.client_hello: + case HandshakeType.client_key_exchange: + case HandshakeType.compressed_certificate: + case HandshakeType.encrypted_extensions: + case HandshakeType.end_of_early_data: + case HandshakeType.hello_verify_request: + case HandshakeType.key_update: + case HandshakeType.message_hash: + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + /// + protected virtual void HandleServerCertificate() + { + TlsUtilities.ProcessServerCertificate(m_tlsClientContext, m_certificateStatus, m_keyExchange, + m_authentication, m_clientExtensions, m_serverExtensions); + } + + /// + protected virtual void HandleSupplementalData(IList serverSupplementalData) + { + m_tlsClient.ProcessServerSupplementalData(serverSupplementalData); + this.m_connectionState = CS_SERVER_SUPPLEMENTAL_DATA; + + this.m_keyExchange = TlsUtilities.InitKeyExchangeClient(m_tlsClientContext, m_tlsClient); + } + + /// + protected virtual void Process13HelloRetryRequest(ServerHello helloRetryRequest) + { + ProtocolVersion legacy_record_version = ProtocolVersion.TLSv12; + m_recordStream.SetWriteVersion(legacy_record_version); + + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + if (securityParameters.IsRenegotiating) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /* + * RFC 8446 4.1.4. Upon receipt of a HelloRetryRequest, the client MUST check the + * legacy_version, legacy_session_id_echo, cipher_suite, and legacy_compression_method as + * specified in Section 4.1.3 and then process the extensions, starting with determining the + * version using "supported_versions". + */ + ProtocolVersion legacy_version = helloRetryRequest.Version; + byte[] legacy_session_id_echo = helloRetryRequest.SessionID; + int cipherSuite = helloRetryRequest.CipherSuite; + // NOTE: legacy_compression_method checked during ServerHello parsing + + if (!ProtocolVersion.TLSv12.Equals(legacy_version) || + !Arrays.AreEqual(m_clientHello.SessionID, legacy_session_id_echo) || + !TlsUtilities.IsValidCipherSuiteSelection(m_clientHello.CipherSuites, cipherSuite)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + var extensions = helloRetryRequest.Extensions; + if (null == extensions) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + TlsUtilities.CheckExtensionData13(extensions, HandshakeType.hello_retry_request, + AlertDescription.illegal_parameter); + + { + /* + * RFC 8446 4.2. Implementations MUST NOT send extension responses if the remote + * endpoint did not send the corresponding extension requests, with the exception of the + * "cookie" extension in the HelloRetryRequest. Upon receiving such an extension, an + * endpoint MUST abort the handshake with an "unsupported_extension" alert. + */ + foreach (int extType in extensions.Keys) + { + if (ExtensionType.cookie == extType) + continue; + + if (null == TlsUtilities.GetExtensionData(m_clientExtensions, extType)) + throw new TlsFatalAlert(AlertDescription.unsupported_extension); + } + } + + ProtocolVersion server_version = TlsExtensionsUtilities.GetSupportedVersionsExtensionServer(extensions); + if (null == server_version) + throw new TlsFatalAlert(AlertDescription.missing_extension); + + if (!ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(server_version) || + !ProtocolVersion.Contains(m_tlsClientContext.ClientSupportedVersions, server_version) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, server_version)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + if (null != m_clientBinders) + { + if (!Arrays.Contains(m_clientBinders.m_pskKeyExchangeModes, PskKeyExchangeMode.psk_dhe_ke)) + { + this.m_clientBinders = null; + + m_tlsClient.NotifySelectedPsk(null); + } + } + + /* + * RFC 8446 4.2.8. Upon receipt of this [Key Share] extension in a HelloRetryRequest, the + * client MUST verify that (1) the selected_group field corresponds to a group which was + * provided in the "supported_groups" extension in the original ClientHello and (2) the + * selected_group field does not correspond to a group which was provided in the "key_share" + * extension in the original ClientHello. If either of these checks fails, then the client + * MUST abort the handshake with an "illegal_parameter" alert. + */ + int selected_group = TlsExtensionsUtilities.GetKeyShareHelloRetryRequest(extensions); + + if (!TlsUtilities.IsValidKeyShareSelection(server_version, securityParameters.ClientSupportedGroups, + m_clientAgreements, selected_group)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + byte[] cookie = TlsExtensionsUtilities.GetCookieExtension(extensions); + + + + securityParameters.m_negotiatedVersion = server_version; + TlsUtilities.NegotiatedVersionTlsClient(m_tlsClientContext, m_tlsClient); + + securityParameters.m_resumedSession = false; + securityParameters.m_sessionID = TlsUtilities.EmptyBytes; + m_tlsClient.NotifySessionID(TlsUtilities.EmptyBytes); + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + m_tlsClient.NotifySelectedCipherSuite(cipherSuite); + + this.m_clientAgreements = null; + this.m_retryCookie = cookie; + this.m_retryGroup = selected_group; + } + + /// + protected virtual void Process13ServerHello(ServerHello serverHello, bool afterHelloRetryRequest) + { + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + + ProtocolVersion legacy_version = serverHello.Version; + byte[] legacy_session_id_echo = serverHello.SessionID; + int cipherSuite = serverHello.CipherSuite; + // NOTE: legacy_compression_method checked during ServerHello parsing + + if (!ProtocolVersion.TLSv12.Equals(legacy_version) || + !Arrays.AreEqual(m_clientHello.SessionID, legacy_session_id_echo)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + var extensions = serverHello.Extensions; + if (null == extensions) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + TlsUtilities.CheckExtensionData13(extensions, HandshakeType.server_hello, + AlertDescription.illegal_parameter); + + if (afterHelloRetryRequest) + { + ProtocolVersion server_version = TlsExtensionsUtilities.GetSupportedVersionsExtensionServer(extensions); + if (null == server_version) + throw new TlsFatalAlert(AlertDescription.missing_extension); + + if (!securityParameters.NegotiatedVersion.Equals(server_version) || + securityParameters.CipherSuite != cipherSuite) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + else + { + if (!TlsUtilities.IsValidCipherSuiteSelection(m_clientHello.CipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, securityParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + securityParameters.m_resumedSession = false; + securityParameters.m_sessionID = TlsUtilities.EmptyBytes; + m_tlsClient.NotifySessionID(TlsUtilities.EmptyBytes); + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + m_tlsClient.NotifySelectedCipherSuite(cipherSuite); + } + + this.m_clientHello = null; + + // NOTE: Apparently downgrade marker mechanism not used for TLS 1.3+? + securityParameters.m_serverRandom = serverHello.Random; + + securityParameters.m_secureRenegotiation = false; + + /* + * RFC 8446 Appendix D. Because TLS 1.3 always hashes in the transcript up to the server + * Finished, implementations which support both TLS 1.3 and earlier versions SHOULD indicate + * the use of the Extended Master Secret extension in their APIs whenever TLS 1.3 is used. + */ + securityParameters.m_extendedMasterSecret = true; + + /* + * TODO[tls13] RFC 8446 4.4.2.1. OCSP Status and SCT Extensions. + * + * OCSP information is carried in an extension for a CertificateEntry. + */ + securityParameters.m_statusRequestVersion = + m_clientExtensions.ContainsKey(ExtensionType.status_request) ? 1 : 0; + + TlsSecret pskEarlySecret = null; + { + int selected_identity = TlsExtensionsUtilities.GetPreSharedKeyServerHello(extensions); + TlsPsk selectedPsk = null; + + if (selected_identity >= 0) + { + if (null == m_clientBinders || selected_identity >= m_clientBinders.m_psks.Length) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + selectedPsk = m_clientBinders.m_psks[selected_identity]; + if (selectedPsk.PrfAlgorithm != securityParameters.PrfAlgorithm) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + pskEarlySecret = m_clientBinders.m_earlySecrets[selected_identity]; + + this.m_selectedPsk13 = true; + } + + m_tlsClient.NotifySelectedPsk(selectedPsk); + } + + TlsSecret sharedSecret = null; + { + KeyShareEntry keyShareEntry = TlsExtensionsUtilities.GetKeyShareServerHello(extensions); + if (null == keyShareEntry) + { + if (afterHelloRetryRequest + || null == pskEarlySecret + || !Arrays.Contains(m_clientBinders.m_pskKeyExchangeModes, PskKeyExchangeMode.psk_ke)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + else + { + if (null != pskEarlySecret + && !Arrays.Contains(m_clientBinders.m_pskKeyExchangeModes, PskKeyExchangeMode.psk_dhe_ke)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + TlsAgreement agreement = (TlsAgreement)m_clientAgreements[keyShareEntry.NamedGroup]; + if (null == agreement) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + agreement.ReceivePeerValue(keyShareEntry.KeyExchange); + sharedSecret = agreement.CalculateSecret(); + } + } + + this.m_clientAgreements = null; + this.m_clientBinders = null; + + TlsUtilities.Establish13PhaseSecrets(m_tlsClientContext, pskEarlySecret, sharedSecret); + + InvalidateSession(); + this.m_tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, null); + } + + /// + protected virtual void Process13ServerHelloCoda(ServerHello serverHello, bool afterHelloRetryRequest) + { + byte[] serverHelloTranscriptHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + TlsUtilities.Establish13PhaseHandshake(m_tlsClientContext, serverHelloTranscriptHash, m_recordStream); + + // See RFC 8446 D.4. + if (!afterHelloRetryRequest) + { + m_recordStream.SetIgnoreChangeCipherSpec(true); + + /* + * TODO[tls13] If offering early_data, the record is placed immediately after the first + * ClientHello. + */ + /* + * TODO[tls13] Ideally wait until just after Server Finished received, but then we'd need to defer + * the enabling of the pending write cipher + */ + SendChangeCipherSpecMessage(); + } + + m_recordStream.EnablePendingCipherWrite(); + m_recordStream.EnablePendingCipherRead(false); + } + + /// + protected virtual void ProcessServerHello(ServerHello serverHello) + { + var serverHelloExtensions = serverHello.Extensions; + + ProtocolVersion legacy_version = serverHello.Version; + ProtocolVersion supported_version = TlsExtensionsUtilities.GetSupportedVersionsExtensionServer( + serverHelloExtensions); + + ProtocolVersion server_version; + if (null == supported_version) + { + server_version = legacy_version; + } + else + { + if (!ProtocolVersion.TLSv12.Equals(legacy_version) || + !ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(supported_version)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + server_version = supported_version; + } + + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + + if (securityParameters.IsRenegotiating) + { + // Check that this matches the negotiated version from the initial handshake + if (!server_version.Equals(securityParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + else + { + if (!ProtocolVersion.Contains(m_tlsClientContext.ClientSupportedVersions, server_version)) + throw new TlsFatalAlert(AlertDescription.protocol_version); + + ProtocolVersion legacy_record_version = server_version.IsLaterVersionOf(ProtocolVersion.TLSv12) + ? ProtocolVersion.TLSv12 + : server_version; + + m_recordStream.SetWriteVersion(legacy_record_version); + securityParameters.m_negotiatedVersion = server_version; + } + + TlsUtilities.NegotiatedVersionTlsClient(m_tlsClientContext, m_tlsClient); + + if (ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(server_version)) + { + Process13ServerHello(serverHello, false); + return; + } + + int[] offeredCipherSuites = m_clientHello.CipherSuites; + + this.m_clientHello = null; + this.m_retryCookie = null; + this.m_retryGroup = -1; + + securityParameters.m_serverRandom = serverHello.Random; + + if (!m_tlsClientContext.ClientVersion.Equals(server_version)) + { + TlsUtilities.CheckDowngradeMarker(server_version, securityParameters.ServerRandom); + } + + { + byte[] selectedSessionID = serverHello.SessionID; + securityParameters.m_sessionID = selectedSessionID; + m_tlsClient.NotifySessionID(selectedSessionID); + securityParameters.m_resumedSession = selectedSessionID.Length > 0 && m_tlsSession != null + && Arrays.AreEqual(selectedSessionID, m_tlsSession.SessionID); + } + + /* + * Find out which CipherSuite the server has chosen and check that it was one of the offered + * ones, and is a valid selection for the negotiated version. + */ + { + int cipherSuite = serverHello.CipherSuite; + + if (!TlsUtilities.IsValidCipherSuiteSelection(offeredCipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, securityParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + m_tlsClient.NotifySelectedCipherSuite(cipherSuite); + } + + /* + * RFC 3546 2.2 Note that the extended server hello message is only sent in response to an + * extended client hello message. + * + * However, see RFC 5746 exception below. We always include the SCSV, so an Extended Server + * Hello is always allowed. + */ + this.m_serverExtensions = serverHelloExtensions; + if (m_serverExtensions != null) + { + foreach (int extType in m_serverExtensions.Keys) + { + /* + * RFC 5746 3.6. Note that sending a "renegotiation_info" extension in response to a + * ClientHello containing only the SCSV is an explicit exception to the prohibition + * in RFC 5246, Section 7.4.1.4, on the server sending unsolicited extensions and is + * only allowed because the client is signaling its willingness to receive the + * extension via the TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. + */ + if (ExtensionType.renegotiation_info == extType) + continue; + + /* + * RFC 5246 7.4.1.4 An extension type MUST NOT appear in the ServerHello unless the + * same extension type appeared in the corresponding ClientHello. If a client + * receives an extension type in ServerHello that it did not request in the + * associated ClientHello, it MUST abort the handshake with an unsupported_extension + * fatal alert. + */ + if (null == TlsUtilities.GetExtensionData(m_clientExtensions, extType)) + throw new TlsFatalAlert(AlertDescription.unsupported_extension); + + /* + * RFC 3546 2.3. If [...] the older session is resumed, then the server MUST ignore + * extensions appearing in the client hello, and send a server hello containing no + * extensions[.] + */ + if (securityParameters.IsResumedSession) + { + // TODO[compat-gnutls] GnuTLS test server sends server extensions e.g. ec_point_formats + // TODO[compat-openssl] OpenSSL test server sends server extensions e.g. ec_point_formats + // TODO[compat-polarssl] PolarSSL test server sends server extensions e.g. ec_point_formats + // throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + } + + byte[] renegExtData = TlsUtilities.GetExtensionData(m_serverExtensions, ExtensionType.renegotiation_info); + + if (securityParameters.IsRenegotiating) + { + /* + * RFC 5746 3.5. Client Behavior: Secure Renegotiation + * + * This text applies if the connection's "secure_renegotiation" flag is set to TRUE. + */ + if (!securityParameters.IsSecureRenegotiation) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /* + * When a ServerHello is received, the client MUST verify that the "renegotiation_info" + * extension is present; if it is not, the client MUST abort the handshake. + */ + if (renegExtData == null) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + /* + * The client MUST then verify that the first half of the "renegotiated_connection" + * field is equal to the saved client_verify_data value, and the second half is equal to + * the saved server_verify_data value. If they are not, the client MUST abort the + * handshake. + */ + SecurityParameters saved = m_tlsClientContext.SecurityParameters; + byte[] reneg_conn_info = Arrays.Concatenate(saved.LocalVerifyData, saved.PeerVerifyData); + + if (!Arrays.ConstantTimeAreEqual(renegExtData, TlsProtocol.CreateRenegotiationInfo(reneg_conn_info))) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + else + { + /* + * RFC 5746 3.4. Client Behavior: Initial Handshake (both full and session-resumption) + */ + + /* + * When a ServerHello is received, the client MUST check if it includes the + * "renegotiation_info" extension: + */ + if (renegExtData == null) + { + /* + * If the extension is not present, the server does not support secure + * renegotiation; set secure_renegotiation flag to FALSE. In this case, some clients + * may want to terminate the handshake instead of continuing; see Section 4.1 for + * discussion. + */ + securityParameters.m_secureRenegotiation = false; + } + else + { + /* + * If the extension is present, set the secure_renegotiation flag to TRUE. The + * client MUST then verify that the length of the "renegotiated_connection" + * field is zero, and if it is not, MUST abort the handshake (by sending a fatal + * handshake_failure alert). + */ + securityParameters.m_secureRenegotiation = true; + + if (!Arrays.ConstantTimeAreEqual(renegExtData, CreateRenegotiationInfo(TlsUtilities.EmptyBytes))) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + + // TODO[compat-gnutls] GnuTLS test server fails to send renegotiation_info extension when resuming + m_tlsClient.NotifySecureRenegotiation(securityParameters.IsSecureRenegotiation); + + /* + * RFC 7627 4. Clients and servers SHOULD NOT accept handshakes that do not use the extended + * master secret [..]. (and see 5.2, 5.3) + * + * RFC 8446 Appendix D. Because TLS 1.3 always hashes in the transcript up to the server + * Finished, implementations which support both TLS 1.3 and earlier versions SHOULD indicate + * the use of the Extended Master Secret extension in their APIs whenever TLS 1.3 is used. + */ + { + bool acceptedExtendedMasterSecret = TlsExtensionsUtilities.HasExtendedMasterSecretExtension( + m_serverExtensions); + bool resumedSession = securityParameters.IsResumedSession; + + if (acceptedExtendedMasterSecret) + { + if (server_version.IsSsl + || (!resumedSession && !m_tlsClient.ShouldUseExtendedMasterSecret())) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + else + { + if (m_tlsClient.RequiresExtendedMasterSecret() + || (resumedSession && !m_tlsClient.AllowLegacyResumption())) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + + securityParameters.m_extendedMasterSecret = acceptedExtendedMasterSecret; + } + + /* + * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous + * contents of this extension are irrelevant, and only the values in the new handshake + * messages are considered. + */ + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer( + m_serverExtensions); + securityParameters.m_applicationProtocolSet = true; + + var sessionClientExtensions = m_clientExtensions; + var sessionServerExtensions = m_serverExtensions; + if (securityParameters.IsResumedSession) + { + if (securityParameters.CipherSuite != m_sessionParameters.CipherSuite + || !server_version.Equals(m_sessionParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + sessionClientExtensions = null; + sessionServerExtensions = m_sessionParameters.ReadServerExtensions(); + } + + if (sessionServerExtensions != null && sessionServerExtensions.Count > 0) + { + { + /* + * RFC 7366 3. If a server receives an encrypt-then-MAC request extension from a client + * and then selects a stream or Authenticated Encryption with Associated Data (AEAD) + * ciphersuite, it MUST NOT send an encrypt-then-MAC response extension back to the + * client. + */ + bool serverSentEncryptThenMAC = TlsExtensionsUtilities.HasEncryptThenMacExtension( + sessionServerExtensions); + if (serverSentEncryptThenMAC && !TlsUtilities.IsBlockCipherSuite(securityParameters.CipherSuite)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + securityParameters.m_encryptThenMac = serverSentEncryptThenMAC; + } + + securityParameters.m_maxFragmentLength = ProcessMaxFragmentLengthExtension(sessionClientExtensions, + sessionServerExtensions, AlertDescription.illegal_parameter); + + securityParameters.m_truncatedHmac = TlsExtensionsUtilities.HasTruncatedHmacExtension( + sessionServerExtensions); + + /* + * TODO It's surprising that there's no provision to allow a 'fresh' CertificateStatus to be sent in + * a session resumption handshake. + */ + if (!securityParameters.IsResumedSession) + { + // TODO[tls13] See RFC 8446 4.4.2.1 + if (TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.status_request_v2, AlertDescription.illegal_parameter)) + { + securityParameters.m_statusRequestVersion = 2; + } + else if (TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.status_request, AlertDescription.illegal_parameter)) + { + securityParameters.m_statusRequestVersion = 1; + } + + this.m_expectSessionTicket = TlsUtilities.HasExpectedEmptyExtensionData(sessionServerExtensions, + ExtensionType.session_ticket, AlertDescription.illegal_parameter); + } + } + + if (sessionClientExtensions != null) + { + m_tlsClient.ProcessServerExtensions(sessionServerExtensions); + } + + ApplyMaxFragmentLengthExtension(securityParameters.MaxFragmentLength); + + if (securityParameters.IsResumedSession) + { + securityParameters.m_masterSecret = m_sessionMasterSecret; + m_recordStream.SetPendingCipher(TlsUtilities.InitCipher(m_tlsClientContext)); + } + else + { + InvalidateSession(); + this.m_tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, null); + } + } + + /// + protected virtual void Receive13CertificateRequest(MemoryStream buf, bool postHandshakeAuth) + { + // TODO[tls13] Support for post_handshake_auth + if (postHandshakeAuth) + throw new TlsFatalAlert(AlertDescription.internal_error); + + /* + * RFC 8446 4.3.2. A server which is authenticating with a certificate MAY optionally + * request a certificate from the client. + */ + + if (m_selectedPsk13) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + CertificateRequest certificateRequest = CertificateRequest.Parse(m_tlsClientContext, buf); + + AssertEmpty(buf); + + if (!certificateRequest.HasCertificateRequestContext(TlsUtilities.EmptyBytes)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + this.m_certificateRequest = certificateRequest; + + m_tlsClientContext.SecurityParameters.m_clientCertificateType = + TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(m_serverExtensions, + CertificateType.X509); + + TlsUtilities.EstablishServerSigAlgs(m_tlsClientContext.SecurityParameters, certificateRequest); + } + + protected override void Send13CertificateMessage(Certificate certificate) + { + // Create a new certificate with the current context. + certificate = new Certificate(this.m_certificateRequest.GetCertificateRequestContext(), certificate.GetCertificateEntryList()); + + // call base's implementation with the new certificate + base.Send13CertificateMessage(certificate); + } + + /// + protected virtual void Receive13EncryptedExtensions(MemoryStream buf) + { + byte[] extBytes = TlsUtilities.ReadOpaque16(buf); + + AssertEmpty(buf); + + + this.m_serverExtensions = ReadExtensionsData13(HandshakeType.encrypted_extensions, extBytes); + + { + /* + * RFC 8446 4.2. Implementations MUST NOT send extension responses if the remote + * endpoint did not send the corresponding extension requests, with the exception of the + * "cookie" extension in the HelloRetryRequest. Upon receiving such an extension, an + * endpoint MUST abort the handshake with an "unsupported_extension" alert. + */ + foreach (int extType in m_serverExtensions.Keys) + { + if (null == TlsUtilities.GetExtensionData(m_clientExtensions, extType)) + throw new TlsFatalAlert(AlertDescription.unsupported_extension); + } + } + + + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer( + m_serverExtensions); + securityParameters.m_applicationProtocolSet = true; + + var sessionClientExtensions = m_clientExtensions; + var sessionServerExtensions = m_serverExtensions; + if (securityParameters.IsResumedSession) + { + if (securityParameters.CipherSuite != m_sessionParameters.CipherSuite + || !negotiatedVersion.Equals(m_sessionParameters.NegotiatedVersion)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + sessionClientExtensions = null; + sessionServerExtensions = m_sessionParameters.ReadServerExtensions(); + } + + securityParameters.m_maxFragmentLength = ProcessMaxFragmentLengthExtension(sessionClientExtensions, + sessionServerExtensions, AlertDescription.illegal_parameter); + + securityParameters.m_encryptThenMac = false; + securityParameters.m_truncatedHmac = false; + + /* + * TODO[tls13] RFC 8446 4.4.2.1. OCSP Status and SCT Extensions. + * + * OCSP information is carried in an extension for a CertificateEntry. + */ + securityParameters.m_statusRequestVersion = + m_clientExtensions.ContainsKey(ExtensionType.status_request) ? 1 : 0; + + this.m_expectSessionTicket = false; + + if (null != sessionClientExtensions) + { + m_tlsClient.ProcessServerExtensions(m_serverExtensions); + } + + ApplyMaxFragmentLengthExtension(securityParameters.MaxFragmentLength); + } + + /// + protected virtual void Receive13NewSessionTicket(MemoryStream buf) + { + if (!IsApplicationDataReady) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + // TODO[tls13] Do something more than just ignore them + + // struct { + // uint32 ticket_lifetime; + // uint32 ticket_age_add; + // opaque ticket_nonce<0..255>; + // opaque ticket<1..2^16-1>; + // Extension extensions<0..2^16-2>; + // } NewSessionTicket; + + TlsUtilities.ReadUint32(buf); + TlsUtilities.ReadUint32(buf); + TlsUtilities.ReadOpaque8(buf); + TlsUtilities.ReadOpaque16(buf); + TlsUtilities.ReadOpaque16(buf); + AssertEmpty(buf); + } + + /// + protected virtual void Receive13ServerCertificate(MemoryStream buf) + { + if (m_selectedPsk13) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + m_authentication = TlsUtilities.Receive13ServerCertificate(m_tlsClientContext, m_tlsClient, buf, + m_serverExtensions); + + // NOTE: In TLS 1.3 we don't have to wait for a possible CertificateStatus message. + HandleServerCertificate(); + } + + /// + protected virtual void Receive13ServerCertificateVerify(MemoryStream buf) + { + Certificate serverCertificate = m_tlsClientContext.SecurityParameters.PeerCertificate; + if (null == serverCertificate || serverCertificate.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); + + CertificateVerify certificateVerify = CertificateVerify.Parse(m_tlsClientContext, buf); + + AssertEmpty(buf); + + TlsUtilities.Verify13CertificateVerifyServer(m_tlsClientContext, m_handshakeHash, certificateVerify); + } + + /// + protected virtual void Receive13ServerFinished(MemoryStream buf) + { + Process13FinishedMessage(buf); + } + + /// + protected virtual void ReceiveCertificateRequest(MemoryStream buf) + { + if (null == m_authentication) + { + /* + * RFC 2246 7.4.4. It is a fatal handshake_failure alert for an anonymous server to + * request client identification. + */ + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + CertificateRequest certificateRequest = CertificateRequest.Parse(m_tlsClientContext, buf); + + AssertEmpty(buf); + + m_certificateRequest = TlsUtilities.ValidateCertificateRequest(certificateRequest, m_keyExchange); + + m_tlsClientContext.SecurityParameters.m_clientCertificateType = + TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(m_serverExtensions, + CertificateType.X509); + } + + /// + protected virtual void ReceiveNewSessionTicket(MemoryStream buf) + { + NewSessionTicket newSessionTicket = NewSessionTicket.Parse(buf); + + AssertEmpty(buf); + + m_tlsClient.NotifyNewSessionTicket(newSessionTicket); + } + + /// + protected virtual ServerHello ReceiveServerHelloMessage(MemoryStream buf) + { + return ServerHello.Parse(buf); + } + + /// + protected virtual void Send13ClientHelloRetry() + { + var clientHelloExtensions = m_clientHello.Extensions; + + clientHelloExtensions.Remove(ExtensionType.cookie); + clientHelloExtensions.Remove(ExtensionType.early_data); + clientHelloExtensions.Remove(ExtensionType.key_share); + clientHelloExtensions.Remove(ExtensionType.pre_shared_key); + + /* + * RFC 4.2.2. When sending the new ClientHello, the client MUST copy the contents of the + * extension received in the HelloRetryRequest into a "cookie" extension in the new + * ClientHello. + */ + if (null != m_retryCookie) + { + /* + * - Including a "cookie" extension if one was provided in the HelloRetryRequest. + */ + TlsExtensionsUtilities.AddCookieExtension(clientHelloExtensions, m_retryCookie); + this.m_retryCookie = null; + } + + /* + * - Updating the "pre_shared_key" extension if present by recomputing the "obfuscated_ticket_age" + * and binder values and (optionally) removing any PSKs which are incompatible with the server's + * indicated cipher suite. + */ + if (null != m_clientBinders) + { + this.m_clientBinders = TlsUtilities.AddPreSharedKeyToClientHelloRetry(m_tlsClientContext, + m_clientBinders, clientHelloExtensions); + if (null == m_clientBinders) + { + m_tlsClient.NotifySelectedPsk(null); + } + } + + /* + * RFC 8446 4.2.8. [..] when sending the new ClientHello, the client MUST replace the + * original "key_share" extension with one containing only a new KeyShareEntry for the group + * indicated in the selected_group field of the triggering HelloRetryRequest. + */ + if (m_retryGroup < 0) + throw new TlsFatalAlert(AlertDescription.internal_error); + + /* + * - If a "key_share" extension was supplied in the HelloRetryRequest, replacing the list of shares + * with a list containing a single KeyShareEntry from the indicated group + */ + this.m_clientAgreements = TlsUtilities.AddKeyShareToClientHelloRetry(m_tlsClientContext, + clientHelloExtensions, m_retryGroup); + + /* + * TODO[tls13] Optionally adding, removing, or changing the length of the "padding" + * extension [RFC7685]. + */ + + // See RFC 8446 D.4. + { + m_recordStream.SetIgnoreChangeCipherSpec(true); + + /* + * TODO[tls13] If offering early_data, the record is placed immediately after the first + * ClientHello. + */ + SendChangeCipherSpecMessage(); + } + + SendClientHelloMessage(); + } + + /// + protected virtual void SendCertificateVerifyMessage(DigitallySigned certificateVerify) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate_verify); + certificateVerify.Encode(message); + message.Send(this); + } + + /// + protected virtual void SendClientHello() + { + SecurityParameters securityParameters = m_tlsClientContext.SecurityParameters; + + ProtocolVersion[] supportedVersions = m_tlsClient.GetProtocolVersions(); + ProtocolVersion earliestVersion = ProtocolVersion.GetEarliestTls(supportedVersions); + ProtocolVersion latestVersion = ProtocolVersion.GetLatestTls(supportedVersions); + + if (securityParameters.IsRenegotiating) + { + latestVersion = m_tlsClientContext.ClientVersion; + } + else + { + m_tlsClientContext.SetClientSupportedVersions(supportedVersions); + + if (ProtocolVersion.Contains(supportedVersions, ProtocolVersion.SSLv3)) + { + // TODO[tls13] Prevent offering SSLv3 AND TLSv13? + m_recordStream.SetWriteVersion(ProtocolVersion.SSLv3); + } + else + { + m_recordStream.SetWriteVersion(ProtocolVersion.TLSv10); + } + + //earliestVersion = ProtocolVersion.GetEarliestTls(supportedVersions); + //latestVersion = ProtocolVersion.GetLatestTls(supportedVersions); + + if (!ProtocolVersion.IsSupportedTlsVersionClient(latestVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + m_tlsClientContext.SetClientVersion(latestVersion); + } + + bool offeringTlsV12Minus = ProtocolVersion.TLSv12.IsEqualOrLaterVersionOf(earliestVersion); + bool offeringTlsV13Plus = ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(latestVersion); + + { + bool useGmtUnixTime = !offeringTlsV13Plus && m_tlsClient.ShouldUseGmtUnixTime(); + + securityParameters.m_clientRandom = CreateRandomBlock(useGmtUnixTime, m_tlsClientContext); + } + + EstablishSession(offeringTlsV12Minus ? m_tlsClient.GetSessionToResume() : null); + m_tlsClient.NotifySessionToResume(m_tlsSession); + + /* + * TODO RFC 5077 3.4. When presenting a ticket, the client MAY generate and include a + * Session ID in the TLS ClientHello. + */ + byte[] legacy_session_id = TlsUtilities.GetSessionID(m_tlsSession); + + bool fallback = m_tlsClient.IsFallback(); + + int[] offeredCipherSuites = m_tlsClient.GetCipherSuites(); + + if (legacy_session_id.Length > 0 && m_sessionParameters != null) + { + if (!Arrays.Contains(offeredCipherSuites, m_sessionParameters.CipherSuite)) + { + legacy_session_id = TlsUtilities.EmptyBytes; + } + } + + this.m_clientExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised( + m_tlsClient.GetClientExtensions()); + + ProtocolVersion legacy_version = latestVersion; + if (offeringTlsV13Plus) + { + legacy_version = ProtocolVersion.TLSv12; + + TlsExtensionsUtilities.AddSupportedVersionsExtensionClient(m_clientExtensions, supportedVersions); + + /* + * RFC 8446 4.2.1. In compatibility mode [..], this field MUST be non-empty, so a client + * not offering a pre-TLS 1.3 session MUST generate a new 32-byte value. + */ + if (legacy_session_id.Length < 1) + { + legacy_session_id = m_tlsClientContext.NonceGenerator.GenerateNonce(32); + } + } + + m_tlsClientContext.SetRsaPreMasterSecretVersion(legacy_version); + + securityParameters.m_clientServerNames = TlsExtensionsUtilities.GetServerNameExtensionClient( + m_clientExtensions); + + if (TlsUtilities.IsSignatureAlgorithmsExtensionAllowed(latestVersion)) + { + TlsUtilities.EstablishClientSigAlgs(securityParameters, m_clientExtensions); + } + + securityParameters.m_clientSupportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension( + m_clientExtensions); + + this.m_clientBinders = TlsUtilities.AddPreSharedKeyToClientHello(m_tlsClientContext, m_tlsClient, + m_clientExtensions, offeredCipherSuites); + + // TODO[tls13-psk] Perhaps don't add key_share if external PSK(s) offered and 'psk_dhe_ke' not offered + this.m_clientAgreements = TlsUtilities.AddKeyShareToClientHello(m_tlsClientContext, m_tlsClient, + m_clientExtensions); + + if (TlsUtilities.IsExtendedMasterSecretOptionalTls(supportedVersions) + && (m_tlsClient.ShouldUseExtendedMasterSecret() || + (null != m_sessionParameters && m_sessionParameters.IsExtendedMasterSecret))) + { + TlsExtensionsUtilities.AddExtendedMasterSecretExtension(m_clientExtensions); + } + else if (!offeringTlsV13Plus && m_tlsClient.RequiresExtendedMasterSecret()) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + +// { +// bool useGmtUnixTime = !offeringTlsV13Plus && m_tlsClient.ShouldUseGmtUnixTime(); +// +// securityParameters.m_clientRandom = CreateRandomBlock(useGmtUnixTime, m_tlsClientContext); +// } + + if (securityParameters.IsRenegotiating) + { + /* + * RFC 5746 3.5. Client Behavior: Secure Renegotiation + * + * This text applies if the connection's "secure_renegotiation" flag is set to TRUE. + */ + if (!securityParameters.IsSecureRenegotiation) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + /* + * The client MUST include the "renegotiation_info" extension in the ClientHello, + * containing the saved client_verify_data. The SCSV MUST NOT be included. + */ + SecurityParameters saved = m_tlsClientContext.SecurityParameters; + + m_clientExtensions[ExtensionType.renegotiation_info] = TlsProtocol.CreateRenegotiationInfo(saved.LocalVerifyData); + } + else + { + /* + * RFC 5746 3.4. Client Behavior: Initial Handshake (both full and session-resumption) + */ + + /* + * The client MUST include either an empty "renegotiation_info" extension, or the + * TLS_EMPTY_RENEGOTIATION_INFO_SCSV signaling cipher suite value in the ClientHello. + * Including both is NOT RECOMMENDED. + */ + bool noRenegExt = (null == TlsUtilities.GetExtensionData(m_clientExtensions, + ExtensionType.renegotiation_info)); + bool noRenegScsv = !Arrays.Contains(offeredCipherSuites, CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV); + + if (noRenegExt && noRenegScsv) + { + // TODO[tls13] Probably want to not add this if no pre-TLSv13 versions offered? + offeredCipherSuites = Arrays.Append(offeredCipherSuites, CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV); + } + } + + /* + * (Fallback SCSV) + * RFC 7507 4. If a client sends a ClientHello.client_version containing a lower value + * than the latest (highest-valued) version supported by the client, it SHOULD include + * the TLS_FALLBACK_SCSV cipher suite value in ClientHello.cipher_suites [..]. (The + * client SHOULD put TLS_FALLBACK_SCSV after all cipher suites that it actually intends + * to negotiate.) + */ + if (fallback && !Arrays.Contains(offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)) + { + offeredCipherSuites = Arrays.Append(offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV); + } + + + + int bindersSize = null == m_clientBinders ? 0 : m_clientBinders.m_bindersSize; + + this.m_clientHello = new ClientHello(legacy_version, securityParameters.ClientRandom, legacy_session_id, + null, offeredCipherSuites, m_clientExtensions, bindersSize); + + SendClientHelloMessage(); + } + + /// + protected virtual void SendClientHelloMessage() + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.client_hello); + m_clientHello.Encode(m_tlsClientContext, message); + + message.PrepareClientHello(m_handshakeHash, m_clientHello.BindersSize); + + if (null != m_clientBinders) + { + OfferedPsks.EncodeBinders(message, m_tlsClientContext.Crypto, m_handshakeHash, m_clientBinders); + } + + message.SendClientHello(this, m_handshakeHash, m_clientHello.BindersSize); + } + + /// + protected virtual void SendClientKeyExchange() + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.client_key_exchange); + m_keyExchange.GenerateClientKeyExchange(message); + message.Send(this); + } + + /// + protected virtual void Skip13CertificateRequest() + { + this.m_certificateRequest = null; + } + + /// + protected virtual void Skip13ServerCertificate() + { + if (!m_selectedPsk13) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + this.m_authentication = TlsUtilities.Skip13ServerCertificate(m_tlsClientContext); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs.meta new file mode 100644 index 00000000..4d310a8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3c66da0849a3efa46a29aa518c757b91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsClientProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs new file mode 100644 index 00000000..5560fc9b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs @@ -0,0 +1,15 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface TlsCloseable + { + /// + void Close(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs.meta new file mode 100644 index 00000000..62a50d9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d71bd6bab91195b43b631cd5d43d19c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCloseable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs new file mode 100644 index 00000000..ef74f63f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for a TLS context implementation. + public interface TlsContext + { + TlsCrypto Crypto { get; } + + TlsNonceGenerator NonceGenerator { get; } + + SecurityParameters SecurityParameters { get; } + + /// Return true if this context is for a server, false otherwise. + /// true for a server based context, false for a client based one. + bool IsServer { get; } + + ProtocolVersion[] ClientSupportedVersions { get; } + + ProtocolVersion ClientVersion { get; } + + ProtocolVersion RsaPreMasterSecretVersion { get; } + + ProtocolVersion ServerVersion { get; } + + /// Used to get the resumable session, if any, used by this connection. + /// + /// Only available after the handshake has successfully completed. + /// + /// A representing the resumable session used by this connection, or null if + /// no resumable session available. + /// + TlsSession ResumableSession { get; } + + /// Used to get the session information for this connection. + /// + /// Only available after the handshake has successfully completed. Use + /// to find out if the session is resumable. + /// + /// A representing the session used by this connection. + /// + TlsSession Session { get; } + + object UserObject { get; set; } + + /// Export the value of the specified channel binding. + /// + /// Only available after the handshake has successfully completed. + /// + /// A constant specifying the channel binding to + /// export. + /// A copy of the channel binding data as a byte[], or null if the binding could not be + /// determined. + byte[] ExportChannelBinding(int channelBinding); + + /// Export (early data) keying material according to RFC 5705: "Keying Material Exporters for TLS", as + /// updated for TLS 1.3 (RFC 8446). + /// + /// NOTE: for use in settings where an exporter is needed for 0-RTT data. + /// + /// indicates which application will use the exported keys. + /// allows the application using the exporter to mix its own data with the TLS PRF + /// for the exporter output. + /// the number of bytes to generate. + /// a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret. + byte[] ExportEarlyKeyingMaterial(string asciiLabel, byte[] context_value, int length); + + /// Export keying material according to RFC 5705: "Keying Material Exporters for TLS", as updated for + /// TLS 1.3 (RFC 8446) when negotiated. + /// indicates which application will use the exported keys. + /// allows the application using the exporter to mix its own data with the TLS PRF + /// for the exporter output. + /// the number of bytes to generate. + /// a pseudorandom bit string of 'length' bytes generated from the (exporter_)master_secret. + byte[] ExportKeyingMaterial(string asciiLabel, byte[] context_value, int length); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs.meta new file mode 100644 index 00000000..7d54b40a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 400ebbd43b7de834da3f03cbd4b4a74d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsContext.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs new file mode 100644 index 00000000..396ba22e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Support interface for generating a secret based on the credentials sent by a TLS peer. + public interface TlsCredentialedAgreement + : TlsCredentials + { + /// Calculate an agreed secret based on our credentials and the public key credentials of our peer. + /// + /// public key certificate of our TLS peer. + /// the agreed secret. + /// in case of an exception on generation of the secret. + TlsSecret GenerateAgreement(TlsCertificate peerCertificate); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs.meta new file mode 100644 index 00000000..9a4f349f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a0a4a8a5b1484b4c928667a4f9915b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs new file mode 100644 index 00000000..0efcbd2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for a class that decrypts TLS secrets. + public interface TlsCredentialedDecryptor + : TlsCredentials + { + /// Decrypt the passed in cipher text using the parameters available. + /// the parameters to use for the decryption. + /// the cipher text containing the secret. + /// a TLS secret. + /// on a parsing or decryption error. + TlsSecret Decrypt(TlsCryptoParameters cryptoParams, byte[] ciphertext); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs.meta new file mode 100644 index 00000000..5a0ae962 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed868514feb56f5488d28562f7854a60 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedDecryptor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs new file mode 100644 index 00000000..ad4df384 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Support interface for generating a signature based on our private credentials. + public interface TlsCredentialedSigner + : TlsCredentials + { + /// Generate a signature against the passed in hash. + /// a message digest calculated across the message the signature is to apply to. + /// an encoded signature. + /// if the hash cannot be processed, or there is an issue with the private + /// credentials. + byte[] GenerateRawSignature(byte[] hash); + + /// Return the algorithm IDs for the signature algorithm and the associated hash it uses. + /// the full algorithm details for the signature. + SignatureAndHashAlgorithm SignatureAndHashAlgorithm { get; } + + /// + TlsStreamSigner GetStreamSigner(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs.meta new file mode 100644 index 00000000..ec16cd42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9547ebbec004b564e862244687d3ec6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentialedSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs new file mode 100644 index 00000000..b37c69ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for interfaces/classes carrying TLS credentials. + public interface TlsCredentials + { + /// Return the certificate structure representing our identity. + /// our certificate structure. + Certificate Certificate { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs.meta new file mode 100644 index 00000000..3b4dcf0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c940535dd5f6844488c12af5cd3b5e30 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsCredentials.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs new file mode 100644 index 00000000..938b8da2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Interface for verifying explicit Diffie-Hellman group parameters. + public interface TlsDHGroupVerifier + { + /// Check whether the given DH group is acceptable for use. + /// the to check. + /// true if (and only if) the specified group is acceptable. + bool Accept(DHGroup dhGroup); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs.meta new file mode 100644 index 00000000..a2ea7c8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b1dd16c77d3b244f8620e024434bb7e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHGroupVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs new file mode 100644 index 00000000..5d299bf2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs @@ -0,0 +1,95 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS DH key exchange. + public class TlsDHKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsCredentialedAgreement m_agreementCredentials; + protected TlsCertificate m_dhPeerCertificate; + + public TlsDHKeyExchange(int keyExchange) + : base(CheckKeyExchange(keyExchange)) + { + } + + public override void SkipServerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + this.m_agreementCredentials = TlsUtilities.RequireAgreementCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + this.m_dhPeerCertificate = serverCertificate.GetCertificateAt(0).CheckUsageInRole(TlsCertificateRole.DH); + } + + public override short[] GetClientCertificateTypes() + { + return new short[]{ ClientCertificateType.dss_fixed_dh, ClientCertificateType.rsa_fixed_dh }; + } + + public override void SkipClientCredentials() + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + this.m_agreementCredentials = TlsUtilities.RequireAgreementCredentials(clientCredentials); + } + + public override void GenerateClientKeyExchange(Stream output) + { + /* + * RFC 2246 7.4.7.2 If the client certificate already contains a suitable Diffie-Hellman + * key, then Yc is implicit and does not need to be sent again. In this case, the Client Key + * Exchange message will be sent, but will be empty. + */ + } + + public override void ProcessClientCertificate(Certificate clientCertificate) + { + this.m_dhPeerCertificate = clientCertificate.GetCertificateAt(0).CheckUsageInRole(TlsCertificateRole.DH); + } + + public override void ProcessClientKeyExchange(Stream input) + { + // For dss_fixed_dh and rsa_fixed_dh, the key arrived in the client certificate + } + + public override bool RequiresCertificateVerify + { + get { return false; } + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreementCredentials.GenerateAgreement(m_dhPeerCertificate); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs.meta new file mode 100644 index 00000000..7ca66781 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b082c7989bddc5488897837b937362f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs new file mode 100644 index 00000000..f4b8db69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class TlsDHUtilities + { + public static TlsDHConfig CreateNamedDHConfig(TlsContext context, int namedGroup) + { + if (namedGroup < 0 || NamedGroup.GetFiniteFieldBits(namedGroup) < 1) + return null; + + bool padded = TlsUtilities.IsTlsV13(context); + return new TlsDHConfig(namedGroup, padded); + } + + public static DHGroup GetDHGroup(TlsDHConfig dhConfig) + { + int namedGroup = dhConfig.NamedGroup; + if (namedGroup >= 0) + return GetNamedDHGroup(namedGroup); + + return dhConfig.ExplicitGroup; + } + + public static DHGroup GetNamedDHGroup(int namedGroup) + { + switch (namedGroup) + { + case NamedGroup.ffdhe2048: + return DHStandardGroups.rfc7919_ffdhe2048; + case NamedGroup.ffdhe3072: + return DHStandardGroups.rfc7919_ffdhe3072; + case NamedGroup.ffdhe4096: + return DHStandardGroups.rfc7919_ffdhe4096; + case NamedGroup.ffdhe6144: + return DHStandardGroups.rfc7919_ffdhe6144; + case NamedGroup.ffdhe8192: + return DHStandardGroups.rfc7919_ffdhe8192; + default: + return null; + } + } + + public static int GetMinimumFiniteFieldBits(int cipherSuite) + { + /* + * NOTE: An equivalent mechanism was added to support a minimum bit-size requirement for ECC + * mooted in early drafts of RFC 8442. This requirement was removed in later drafts, so that + * mechanism is currently somewhat trivial, and this similarly so. + */ + return IsDHCipherSuite(cipherSuite) ? 1 : 0; + } + + public static bool IsDHCipherSuite(int cipherSuite) + { + switch (TlsUtilities.GetKeyExchangeAlgorithm(cipherSuite)) + { + case KeyExchangeAlgorithm.DH_anon: + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_PSK: + case KeyExchangeAlgorithm.DHE_RSA: + return true; + + default: + return false; + } + } + + public static int GetNamedGroupForDHParameters(BigInteger p, BigInteger g) + { + int[] namedGroups = new int[]{ NamedGroup.ffdhe2048, NamedGroup.ffdhe3072, NamedGroup.ffdhe4096, + NamedGroup.ffdhe6144, NamedGroup.ffdhe8192 }; + + for (int i = 0; i < namedGroups.Length; ++i) + { + int namedGroup = namedGroups[i]; + DHGroup dhGroup = GetNamedDHGroup(namedGroup); + if (dhGroup != null && dhGroup.P.Equals(p) && dhGroup.G.Equals(g)) + return namedGroup; + } + + return -1; + } + + public static DHGroup GetStandardGroupForDHParameters(BigInteger p, BigInteger g) + { + DHGroup[] standardGroups = new DHGroup[] { DHStandardGroups.rfc7919_ffdhe2048, + DHStandardGroups.rfc7919_ffdhe3072, DHStandardGroups.rfc7919_ffdhe4096, DHStandardGroups.rfc7919_ffdhe6144, + DHStandardGroups.rfc7919_ffdhe8192, DHStandardGroups.rfc3526_1536, DHStandardGroups.rfc3526_2048, + DHStandardGroups.rfc3526_3072, DHStandardGroups.rfc3526_4096, DHStandardGroups.rfc3526_6144, + DHStandardGroups.rfc3526_8192, DHStandardGroups.rfc5996_768, DHStandardGroups.rfc5996_1024 }; + + for (int i = 0; i < standardGroups.Length; ++i) + { + DHGroup dhGroup = standardGroups[i]; + if (dhGroup != null && dhGroup.P.Equals(p) && dhGroup.G.Equals(g)) + return dhGroup; + } + + return null; + } + + /// + public static TlsDHConfig ReceiveDHConfig(TlsContext context, TlsDHGroupVerifier dhGroupVerifier, + Stream input) + { + BigInteger p = ReadDHParameter(input); + BigInteger g = ReadDHParameter(input); + + int namedGroup = GetNamedGroupForDHParameters(p, g); + if (namedGroup< 0) + { + DHGroup dhGroup = GetStandardGroupForDHParameters(p, g); + if (null == dhGroup) + { + dhGroup = new DHGroup(p, null, g, 0); + } + + if (!dhGroupVerifier.Accept(dhGroup)) + throw new TlsFatalAlert(AlertDescription.insufficient_security); + + return new TlsDHConfig(dhGroup); + } + + int[] clientSupportedGroups = context.SecurityParameters.ClientSupportedGroups; + if (null == clientSupportedGroups || Arrays.Contains(clientSupportedGroups, namedGroup)) + return new TlsDHConfig(namedGroup, false); + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + /// + public static BigInteger ReadDHParameter(Stream input) + { + return new BigInteger(1, TlsUtilities.ReadOpaque16(input, 1)); + } + + /// + public static void WriteDHConfig(TlsDHConfig dhConfig, Stream output) + { + DHGroup group = GetDHGroup(dhConfig); + WriteDHParameter(group.P, output); + WriteDHParameter(group.G, output); + } + + /// + public static void WriteDHParameter(BigInteger x, Stream output) + { + TlsUtilities.WriteOpaque16(BigIntegers.AsUnsignedByteArray(x), output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs.meta new file mode 100644 index 00000000..e287a997 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f0ff751c6376c7e4ea0661ffe285f689 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs new file mode 100644 index 00000000..3c621b28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS DH_anon key exchange. + public class TlsDHanonKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.DH_anon: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsDHGroupVerifier m_dhGroupVerifier; + protected TlsDHConfig m_dhConfig; + + protected TlsAgreement m_agreement; + + public TlsDHanonKeyExchange(int keyExchange, TlsDHGroupVerifier dhGroupVerifier) + : this(keyExchange, dhGroupVerifier, null) + { + } + + public TlsDHanonKeyExchange(int keyExchange, TlsDHConfig dhConfig) + : this(keyExchange, null, dhConfig) + { + } + + private TlsDHanonKeyExchange(int keyExchange, TlsDHGroupVerifier dhGroupVerifier, TlsDHConfig dhConfig) + : base(CheckKeyExchange(keyExchange)) + { + this.m_dhGroupVerifier = dhGroupVerifier; + this.m_dhConfig = dhConfig; + } + + public override void SkipServerCredentials() + { + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override bool RequiresServerKeyExchange + { + get { return true; } + } + + public override byte[] GenerateServerKeyExchange() + { + MemoryStream buf = new MemoryStream(); + + TlsDHUtilities.WriteDHConfig(m_dhConfig, buf); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + byte[] y = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque16(y, buf); + + return buf. ToArray(); + } + + public override void ProcessServerKeyExchange(Stream input) + { + this.m_dhConfig = TlsDHUtilities.ReceiveDHConfig(m_context, m_dhGroupVerifier, input); + + byte[] y = TlsUtilities.ReadOpaque16(input, 1); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + m_agreement.ReceivePeerValue(y); + } + + public override short[] GetClientCertificateTypes() + { + return null; + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void GenerateClientKeyExchange(Stream output) + { + byte[] y = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque16(y, output); + } + + public override void ProcessClientCertificate(Certificate clientCertificate) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override void ProcessClientKeyExchange(Stream input) + { + byte[] y = TlsUtilities.ReadOpaque16(input, 1); + + m_agreement.ReceivePeerValue(y); + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreement.CalculateSecret(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs.meta new file mode 100644 index 00000000..1506067f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4bd1d397c66088c409c0a28ee0b96b31 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDHanonKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs new file mode 100644 index 00000000..5dc25d53 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs @@ -0,0 +1,133 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class TlsDheKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsDHGroupVerifier m_dhGroupVerifier; + protected TlsDHConfig m_dhConfig; + + protected TlsCredentialedSigner m_serverCredentials = null; + protected TlsCertificate m_serverCertificate = null; + protected TlsAgreement m_agreement; + + public TlsDheKeyExchange(int keyExchange, TlsDHGroupVerifier dhGroupVerifier) + : this(keyExchange, dhGroupVerifier, null) + { + } + + public TlsDheKeyExchange(int keyExchange, TlsDHConfig dhConfig) + : this(keyExchange, null, dhConfig) + { + } + + private TlsDheKeyExchange(int keyExchange, TlsDHGroupVerifier dhGroupVerifier, TlsDHConfig dhConfig) + : base(CheckKeyExchange(keyExchange)) + { + this.m_dhGroupVerifier = dhGroupVerifier; + this.m_dhConfig = dhConfig; + } + + public override void SkipServerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + this.m_serverCredentials = TlsUtilities.RequireSignerCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + this.m_serverCertificate = serverCertificate.GetCertificateAt(0); + } + + public override bool RequiresServerKeyExchange + { + get { return true; } + } + + public override byte[] GenerateServerKeyExchange() + { + DigestInputBuffer digestBuffer = new DigestInputBuffer(); + + TlsDHUtilities.WriteDHConfig(m_dhConfig, digestBuffer); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + byte[] y = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque16(y, digestBuffer); + + TlsUtilities.GenerateServerKeyExchangeSignature(m_context, m_serverCredentials, null, digestBuffer); + + return digestBuffer.ToArray(); + } + + public override void ProcessServerKeyExchange(Stream input) + { + DigestInputBuffer digestBuffer = new DigestInputBuffer(); + Stream teeIn = new TeeInputStream(input, digestBuffer); + + this.m_dhConfig = TlsDHUtilities.ReceiveDHConfig(m_context, m_dhGroupVerifier, teeIn); + + byte[] y = TlsUtilities.ReadOpaque16(teeIn, 1); + + TlsUtilities.VerifyServerKeyExchangeSignature(m_context, input, m_serverCertificate, null, digestBuffer); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + m_agreement.ReceivePeerValue(y); + } + + public override short[] GetClientCertificateTypes() + { + return new short[]{ ClientCertificateType.dss_sign, ClientCertificateType.ecdsa_sign, + ClientCertificateType.rsa_sign }; + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + TlsUtilities.RequireSignerCredentials(clientCredentials); + } + + public override void GenerateClientKeyExchange(Stream output) + { + byte[] y = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque16(y, output); + } + + public override void ProcessClientKeyExchange(Stream input) + { + m_agreement.ReceivePeerValue(TlsUtilities.ReadOpaque16(input, 1)); + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreement.CalculateSecret(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs.meta new file mode 100644 index 00000000..69a007cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b915d36441b45d2468bb29c86a1b7bde +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsDheKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs new file mode 100644 index 00000000..3033ea1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS ECDH key exchange (see RFC 4492). + public class TlsECDHKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDH_RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsCredentialedAgreement m_agreementCredentials; + protected TlsCertificate m_ecdhPeerCertificate; + + public TlsECDHKeyExchange(int keyExchange) + : base(CheckKeyExchange(keyExchange)) + { + } + + public override void SkipServerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + this.m_agreementCredentials = TlsUtilities.RequireAgreementCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + this.m_ecdhPeerCertificate = serverCertificate.GetCertificateAt(0).CheckUsageInRole( + TlsCertificateRole.ECDH); + } + + public override short[] GetClientCertificateTypes() + { + /* + * RFC 4492 3. [...] The ECDSA_fixed_ECDH and RSA_fixed_ECDH mechanisms are usable with + * ECDH_ECDSA and ECDH_RSA. Their use with ECDHE_ECDSA and ECDHE_RSA is prohibited because + * the use of a long-term ECDH client key would jeopardize the forward secrecy property of + * these algorithms. + */ + return new short[]{ ClientCertificateType.ecdsa_fixed_ecdh, ClientCertificateType.rsa_fixed_ecdh }; + } + + public override void SkipClientCredentials() + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + this.m_agreementCredentials = TlsUtilities.RequireAgreementCredentials(clientCredentials); + } + + public override void GenerateClientKeyExchange(Stream output) + { + // In this case, the Client Key Exchange message will be sent, but will be empty. + } + + public override void ProcessClientCertificate(Certificate clientCertificate) + { + this.m_ecdhPeerCertificate = clientCertificate.GetCertificateAt(0).CheckUsageInRole( + TlsCertificateRole.ECDH); + } + + public override void ProcessClientKeyExchange(Stream input) + { + // For ecdsa_fixed_ecdh and rsa_fixed_ecdh, the key arrived in the client certificate + } + + public override bool RequiresCertificateVerify + { + get { return false; } + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreementCredentials.GenerateAgreement(m_ecdhPeerCertificate); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs.meta new file mode 100644 index 00000000..eed178ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 56a3a83817175ef4a9af9085071a4cda +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs new file mode 100644 index 00000000..d5f5d550 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs @@ -0,0 +1,131 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS ECDH_anon key exchange (see RFC 4492). + public class TlsECDHanonKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.ECDH_anon: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsECConfig m_ecConfig; + + protected TlsAgreement m_agreement; + + public TlsECDHanonKeyExchange(int keyExchange) + : this(keyExchange, null) + { + } + + public TlsECDHanonKeyExchange(int keyExchange, TlsECConfig ecConfig) + : base(CheckKeyExchange(keyExchange)) + { + this.m_ecConfig = ecConfig; + } + + public override void SkipServerCredentials() + { + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override bool RequiresServerKeyExchange + { + get { return true; } + } + + public override byte[] GenerateServerKeyExchange() + { + MemoryStream buf = new MemoryStream(); + + TlsEccUtilities.WriteECConfig(m_ecConfig, buf); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + GenerateEphemeral(buf); + + return buf.ToArray(); + } + + public override void ProcessServerKeyExchange(Stream input) + { + this.m_ecConfig = TlsEccUtilities.ReceiveECDHConfig(m_context, input); + + byte[] point = TlsUtilities.ReadOpaque8(input, 1); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + ProcessEphemeral(point); + } + + public override short[] GetClientCertificateTypes() + { + return null; + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void GenerateClientKeyExchange(Stream output) + { + GenerateEphemeral(output); + } + + public override void ProcessClientCertificate(Certificate clientCertificate) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + public override void ProcessClientKeyExchange(Stream input) + { + byte[] point = TlsUtilities.ReadOpaque8(input, 1); + + ProcessEphemeral(point); + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreement.CalculateSecret(); + } + + protected virtual void GenerateEphemeral(Stream output) + { + byte[] point = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque8(point, output); + } + + protected virtual void ProcessEphemeral(byte[] point) + { + TlsEccUtilities.CheckPointEncoding(m_ecConfig.NamedGroup, point); + + this.m_agreement.ReceivePeerValue(point); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs.meta new file mode 100644 index 00000000..394a0426 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7eebc77983bf54a4c957a9d1532b7d2b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDHanonKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs new file mode 100644 index 00000000..55262784 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs @@ -0,0 +1,145 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS ECDHE key exchange (see RFC 4492). + public class TlsECDheKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.ECDHE_ECDSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsECConfig m_ecConfig; + + protected TlsCredentialedSigner m_serverCredentials = null; + protected TlsCertificate m_serverCertificate = null; + protected TlsAgreement m_agreement; + + public TlsECDheKeyExchange(int keyExchange) + : this(keyExchange, null) + { + } + + public TlsECDheKeyExchange(int keyExchange, TlsECConfig ecConfig) + : base(CheckKeyExchange(keyExchange)) + { + this.m_ecConfig = ecConfig; + } + + public override void SkipServerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + this.m_serverCredentials = TlsUtilities.RequireSignerCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + this.m_serverCertificate = serverCertificate.GetCertificateAt(0); + } + + public override bool RequiresServerKeyExchange + { + get { return true; } + } + + public override byte[] GenerateServerKeyExchange() + { + DigestInputBuffer digestBuffer = new DigestInputBuffer(); + + TlsEccUtilities.WriteECConfig(m_ecConfig, digestBuffer); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + GenerateEphemeral(digestBuffer); + + TlsUtilities.GenerateServerKeyExchangeSignature(m_context, m_serverCredentials, null, digestBuffer); + + return digestBuffer.ToArray(); + } + + public override void ProcessServerKeyExchange(Stream input) + { + DigestInputBuffer digestBuffer = new DigestInputBuffer(); + Stream teeIn = new TeeInputStream(input, digestBuffer); + + this.m_ecConfig = TlsEccUtilities.ReceiveECDHConfig(m_context, teeIn); + + byte[] point = TlsUtilities.ReadOpaque8(teeIn, 1); + + TlsUtilities.VerifyServerKeyExchangeSignature(m_context, input, m_serverCertificate, null, digestBuffer); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + ProcessEphemeral(point); + } + + public override short[] GetClientCertificateTypes() + { + /* + * RFC 4492 3. [...] The ECDSA_fixed_ECDH and RSA_fixed_ECDH mechanisms are usable with + * ECDH_ECDSA and ECDH_RSA. Their use with ECDHE_ECDSA and ECDHE_RSA is prohibited because + * the use of a long-term ECDH client key would jeopardize the forward secrecy property of + * these algorithms. + */ + return new short[]{ ClientCertificateType.dss_sign, ClientCertificateType.ecdsa_sign, + ClientCertificateType.rsa_sign }; + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + TlsUtilities.RequireSignerCredentials(clientCredentials); + } + + public override void GenerateClientKeyExchange(Stream output) + { + GenerateEphemeral(output); + } + + public override void ProcessClientKeyExchange(Stream input) + { + byte[] point = TlsUtilities.ReadOpaque8(input, 1); + + ProcessEphemeral(point); + } + + public override TlsSecret GeneratePreMasterSecret() + { + return m_agreement.CalculateSecret(); + } + + protected virtual void GenerateEphemeral(Stream output) + { + byte[] point = m_agreement.GenerateEphemeral(); + + TlsUtilities.WriteOpaque8(point, output); + } + + protected virtual void ProcessEphemeral(byte[] point) + { + TlsEccUtilities.CheckPointEncoding(m_ecConfig.NamedGroup, point); + + this.m_agreement.ReceivePeerValue(point); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs.meta new file mode 100644 index 00000000..3813b8ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 163545b1ca2d4be4faa821ea9efb3a34 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsECDheKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs new file mode 100644 index 00000000..b0669ca4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class TlsEccUtilities + { + /// + public static TlsECConfig CreateNamedECConfig(TlsContext context, int namedGroup) + { + if (NamedGroup.GetCurveBits(namedGroup) < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return new TlsECConfig(namedGroup); + } + + public static int GetMinimumCurveBits(int cipherSuite) + { + /* + * NOTE: This mechanism was added to support a minimum bit-size requirement mooted in early + * drafts of RFC 8442. This requirement was removed in later drafts, so this mechanism is + * currently somewhat trivial. + */ + return IsEccCipherSuite(cipherSuite) ? 1 : 0; + } + + public static bool IsEccCipherSuite(int cipherSuite) + { + switch (TlsUtilities.GetKeyExchangeAlgorithm(cipherSuite)) + { + case KeyExchangeAlgorithm.ECDH_anon: + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDH_RSA: + case KeyExchangeAlgorithm.ECDHE_ECDSA: + case KeyExchangeAlgorithm.ECDHE_PSK: + case KeyExchangeAlgorithm.ECDHE_RSA: + return true; + + default: + return false; + } + } + + /// + public static void CheckPointEncoding(int namedGroup, byte[] encoding) + { + if (TlsUtilities.IsNullOrEmpty(encoding)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + switch (namedGroup) + { + case NamedGroup.x25519: + case NamedGroup.x448: + return; + } + + switch (encoding[0]) + { + case 0x04: // uncompressed + return; + + case 0x00: // infinity + case 0x02: // compressed + case 0x03: // compressed + case 0x06: // hybrid + case 0x07: // hybrid + default: + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + } + + /// + public static TlsECConfig ReceiveECDHConfig(TlsContext context, Stream input) + { + short curveType = TlsUtilities.ReadUint8(input); + if (curveType != ECCurveType.named_curve) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + int namedGroup = TlsUtilities.ReadUint16(input); + if (NamedGroup.RefersToAnECDHCurve(namedGroup)) + { + int[] clientSupportedGroups = context.SecurityParameters.ClientSupportedGroups; + if (null == clientSupportedGroups || Arrays.Contains(clientSupportedGroups, namedGroup)) + return new TlsECConfig(namedGroup); + } + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + /// + public static void WriteECConfig(TlsECConfig ecConfig, Stream output) + { + WriteNamedECParameters(ecConfig.NamedGroup, output); + } + + /// + public static void WriteNamedECParameters(int namedGroup, Stream output) + { + if (!NamedGroup.RefersToASpecificCurve(namedGroup)) + { + /* + * RFC 4492 5.4. All those values of NamedCurve are allowed that refer to a specific + * curve. Values of NamedCurve that indicate support for a class of explicitly defined + * curves are not allowed here [...]. + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + TlsUtilities.WriteUint8(ECCurveType.named_curve, output); + TlsUtilities.CheckUint16(namedGroup); + TlsUtilities.WriteUint16(namedGroup, output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs.meta new file mode 100644 index 00000000..35ee85e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ba86c2daf0f6b5a43ad7a22bfabb7d1a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsEccUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs new file mode 100644 index 00000000..18f7888c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + [Serializable] + public class TlsException + : IOException + { + public TlsException() + : base() + { + } + + public TlsException(string message) + : base(message) + { + } + + public TlsException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected TlsException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs.meta new file mode 100644 index 00000000..b4270dfa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c54627ae5d1a4c848b23ba2f8b49aeb4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs new file mode 100644 index 00000000..785e6e73 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs @@ -0,0 +1,1449 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public static class TlsExtensionsUtilities + { + public static IDictionary EnsureExtensionsInitialised(IDictionary extensions) + { + return extensions == null ? new Dictionary() : extensions; + } + + /// (Int32 -> byte[]) + /// an of . + /// + public static void AddAlpnExtensionClient(IDictionary extensions, + IList protocolNameList) + { + extensions[ExtensionType.application_layer_protocol_negotiation] = + CreateAlpnExtensionClient(protocolNameList); + } + + /// + public static void AddAlpnExtensionServer(IDictionary extensions, ProtocolName protocolName) + { + extensions[ExtensionType.application_layer_protocol_negotiation] = CreateAlpnExtensionServer(protocolName); + } + + /// + public static void AddCertificateAuthoritiesExtension(IDictionary extensions, + IList authorities) + { + extensions[ExtensionType.certificate_authorities] = CreateCertificateAuthoritiesExtension(authorities); + } + + /// + public static void AddClientCertificateTypeExtensionClient(IDictionary extensions, + short[] certificateTypes) + { + extensions[ExtensionType.client_certificate_type] = CreateCertificateTypeExtensionClient(certificateTypes); + } + + /// + public static void AddClientCertificateTypeExtensionServer(IDictionary extensions, + short certificateType) + { + extensions[ExtensionType.client_certificate_type] = CreateCertificateTypeExtensionServer(certificateType); + } + + public static void AddClientCertificateUrlExtension(IDictionary extensions) + { + extensions[ExtensionType.client_certificate_url] = CreateClientCertificateUrlExtension(); + } + + /// + public static void AddCompressCertificateExtension(IDictionary extensions, int[] algorithms) + { + extensions[ExtensionType.compress_certificate] = CreateCompressCertificateExtension(algorithms); + } + + /// + public static void AddCookieExtension(IDictionary extensions, byte[] cookie) + { + extensions[ExtensionType.cookie] = CreateCookieExtension(cookie); + } + + public static void AddEarlyDataIndication(IDictionary extensions) + { + extensions[ExtensionType.early_data] = CreateEarlyDataIndication(); + } + + /// + public static void AddEarlyDataMaxSize(IDictionary extensions, long maxSize) + { + extensions[ExtensionType.early_data] = CreateEarlyDataMaxSize(maxSize); + } + + public static void AddEmptyExtensionData(IDictionary extensions, int extType) + { + extensions[extType] = CreateEmptyExtensionData(); + } + + public static void AddEncryptThenMacExtension(IDictionary extensions) + { + extensions[ExtensionType.encrypt_then_mac] = CreateEncryptThenMacExtension(); + } + + public static void AddExtendedMasterSecretExtension(IDictionary extensions) + { + extensions[ExtensionType.extended_master_secret] = CreateExtendedMasterSecretExtension(); + } + + /// + public static void AddHeartbeatExtension(IDictionary extensions, + HeartbeatExtension heartbeatExtension) + { + extensions[ExtensionType.heartbeat] = CreateHeartbeatExtension(heartbeatExtension); + } + + /// + public static void AddKeyShareClientHello(IDictionary extensions, + IList clientShares) + { + extensions[ExtensionType.key_share] = CreateKeyShareClientHello(clientShares); + } + + /// + public static void AddKeyShareHelloRetryRequest(IDictionary extensions, int namedGroup) + { + extensions[ExtensionType.key_share] = CreateKeyShareHelloRetryRequest(namedGroup); + } + + /// + public static void AddKeyShareServerHello(IDictionary extensions, KeyShareEntry serverShare) + { + extensions[ExtensionType.key_share] = CreateKeyShareServerHello(serverShare); + } + + /// + public static void AddMaxFragmentLengthExtension(IDictionary extensions, short maxFragmentLength) + { + extensions[ExtensionType.max_fragment_length] = CreateMaxFragmentLengthExtension(maxFragmentLength); + } + + /// + public static void AddOidFiltersExtension(IDictionary extensions, + IDictionary filters) + { + extensions[ExtensionType.oid_filters] = CreateOidFiltersExtension(filters); + } + + /// + public static void AddPaddingExtension(IDictionary extensions, int dataLength) + { + extensions[ExtensionType.padding] = CreatePaddingExtension(dataLength); + } + + public static void AddPostHandshakeAuthExtension(IDictionary extensions) + { + extensions[ExtensionType.post_handshake_auth] = CreatePostHandshakeAuthExtension(); + } + + /// + public static void AddPreSharedKeyClientHello(IDictionary extensions, OfferedPsks offeredPsks) + { + extensions[ExtensionType.pre_shared_key] = CreatePreSharedKeyClientHello(offeredPsks); + } + + /// + public static void AddPreSharedKeyServerHello(IDictionary extensions, int selectedIdentity) + { + extensions[ExtensionType.pre_shared_key] = CreatePreSharedKeyServerHello(selectedIdentity); + } + + /// + public static void AddPskKeyExchangeModesExtension(IDictionary extensions, short[] modes) + { + extensions[ExtensionType.psk_key_exchange_modes] = CreatePskKeyExchangeModesExtension(modes); + } + + /// + public static void AddRecordSizeLimitExtension(IDictionary extensions, int recordSizeLimit) + { + extensions[ExtensionType.record_size_limit] = CreateRecordSizeLimitExtension(recordSizeLimit); + } + + /// + public static void AddServerCertificateTypeExtensionClient(IDictionary extensions, + short[] certificateTypes) + { + extensions[ExtensionType.server_certificate_type] = CreateCertificateTypeExtensionClient(certificateTypes); + } + + /// + public static void AddServerCertificateTypeExtensionServer(IDictionary extensions, + short certificateType) + { + extensions[ExtensionType.server_certificate_type] = CreateCertificateTypeExtensionServer(certificateType); + } + + /// + public static void AddServerNameExtensionClient(IDictionary extensions, + IList serverNameList) + { + extensions[ExtensionType.server_name] = CreateServerNameExtensionClient(serverNameList); + } + + /// + public static void AddServerNameExtensionServer(IDictionary extensions) + { + extensions[ExtensionType.server_name] = CreateServerNameExtensionServer(); + } + + /// + public static void AddSignatureAlgorithmsExtension(IDictionary extensions, + IList supportedSignatureAlgorithms) + { + extensions[ExtensionType.signature_algorithms] = + CreateSignatureAlgorithmsExtension(supportedSignatureAlgorithms); + } + + /// + public static void AddSignatureAlgorithmsCertExtension(IDictionary extensions, + IList supportedSignatureAlgorithms) + { + extensions[ExtensionType.signature_algorithms_cert] = + CreateSignatureAlgorithmsCertExtension(supportedSignatureAlgorithms); + } + + /// + public static void AddStatusRequestExtension(IDictionary extensions, + CertificateStatusRequest statusRequest) + { + extensions[ExtensionType.status_request] = CreateStatusRequestExtension(statusRequest); + } + + /// + public static void AddStatusRequestV2Extension(IDictionary extensions, + IList statusRequestV2) + { + extensions[ExtensionType.status_request_v2] = CreateStatusRequestV2Extension(statusRequestV2); + } + + /// + public static void AddSupportedGroupsExtension(IDictionary extensions, IList namedGroups) + { + extensions[ExtensionType.supported_groups] = CreateSupportedGroupsExtension(namedGroups); + } + + /// + public static void AddSupportedPointFormatsExtension(IDictionary extensions, + short[] ecPointFormats) + { + extensions[ExtensionType.ec_point_formats] = CreateSupportedPointFormatsExtension(ecPointFormats); + } + + /// + public static void AddSupportedVersionsExtensionClient(IDictionary extensions, + ProtocolVersion[] versions) + { + extensions[ExtensionType.supported_versions] = CreateSupportedVersionsExtensionClient(versions); + } + + /// + public static void AddSupportedVersionsExtensionServer(IDictionary extensions, + ProtocolVersion selectedVersion) + { + extensions[ExtensionType.supported_versions] = CreateSupportedVersionsExtensionServer(selectedVersion); + } + + public static void AddTruncatedHmacExtension(IDictionary extensions) + { + extensions[ExtensionType.truncated_hmac] = CreateTruncatedHmacExtension(); + } + + /// + public static void AddTrustedCAKeysExtensionClient(IDictionary extensions, + IList trustedAuthoritiesList) + { + extensions[ExtensionType.trusted_ca_keys] = CreateTrustedCAKeysExtensionClient(trustedAuthoritiesList); + } + + public static void AddTrustedCAKeysExtensionServer(IDictionary extensions) + { + extensions[ExtensionType.trusted_ca_keys] = CreateTrustedCAKeysExtensionServer(); + } + + /// an of . + /// + public static IList GetAlpnExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, + ExtensionType.application_layer_protocol_negotiation); + return extensionData == null ? null : ReadAlpnExtensionClient(extensionData); + } + + /// + public static ProtocolName GetAlpnExtensionServer(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, + ExtensionType.application_layer_protocol_negotiation); + return extensionData == null ? null : ReadAlpnExtensionServer(extensionData); + } + + /// + public static IList GetCertificateAuthoritiesExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.certificate_authorities); + return extensionData == null ? null : ReadCertificateAuthoritiesExtension(extensionData); + } + + /// + public static short[] GetClientCertificateTypeExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.client_certificate_type); + return extensionData == null ? null : ReadCertificateTypeExtensionClient(extensionData); + } + + /// + public static short GetClientCertificateTypeExtensionServer(IDictionary extensions, + short defaultValue) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.client_certificate_type); + return extensionData == null ? defaultValue : ReadCertificateTypeExtensionServer(extensionData); + } + + /// + public static int[] GetCompressCertificateExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.compress_certificate); + return extensionData == null ? null : ReadCompressCertificateExtension(extensionData); + } + + /// + public static byte[] GetCookieExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.cookie); + return extensionData == null ? null : ReadCookieExtension(extensionData); + } + + /// + public static long GetEarlyDataMaxSize(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.early_data); + return extensionData == null ? -1L : ReadEarlyDataMaxSize(extensionData); + } + + /// + public static HeartbeatExtension GetHeartbeatExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.heartbeat); + return extensionData == null ? null : ReadHeartbeatExtension(extensionData); + } + + /// + public static IList GetKeyShareClientHello(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.key_share); + return extensionData == null ? null : ReadKeyShareClientHello(extensionData); + } + + /// + public static int GetKeyShareHelloRetryRequest(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.key_share); + return extensionData == null ? -1 : ReadKeyShareHelloRetryRequest(extensionData); + } + + /// + public static KeyShareEntry GetKeyShareServerHello(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.key_share); + return extensionData == null ? null : ReadKeyShareServerHello(extensionData); + } + + /// + public static short GetMaxFragmentLengthExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.max_fragment_length); + return extensionData == null ? (short)-1 : ReadMaxFragmentLengthExtension(extensionData); + } + + /// + public static IDictionary GetOidFiltersExtension( + IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.oid_filters); + return extensionData == null ? null : ReadOidFiltersExtension(extensionData); + } + + /// + public static int GetPaddingExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.padding); + return extensionData == null ? -1 : ReadPaddingExtension(extensionData); + } + + /// + public static OfferedPsks GetPreSharedKeyClientHello(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.pre_shared_key); + return extensionData == null ? null : ReadPreSharedKeyClientHello(extensionData); + } + + /// + public static int GetPreSharedKeyServerHello(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.pre_shared_key); + return extensionData == null ? -1 : ReadPreSharedKeyServerHello(extensionData); + } + + /// + public static short[] GetPskKeyExchangeModesExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.psk_key_exchange_modes); + return extensionData == null ? null : ReadPskKeyExchangeModesExtension(extensionData); + } + + /// + public static int GetRecordSizeLimitExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.record_size_limit); + return extensionData == null ? -1 : ReadRecordSizeLimitExtension(extensionData); + } + + /// + public static short[] GetServerCertificateTypeExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.server_certificate_type); + return extensionData == null ? null : ReadCertificateTypeExtensionClient(extensionData); + } + + /// + public static short GetServerCertificateTypeExtensionServer(IDictionary extensions, + short defaultValue) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.server_certificate_type); + return extensionData == null ? defaultValue : ReadCertificateTypeExtensionServer(extensionData); + } + + /// + public static IList GetServerNameExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.server_name); + return extensionData == null ? null : ReadServerNameExtensionClient(extensionData); + } + + /// + public static IList GetSignatureAlgorithmsExtension( + IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.signature_algorithms); + return extensionData == null ? null : ReadSignatureAlgorithmsExtension(extensionData); + } + + /// + public static IList GetSignatureAlgorithmsCertExtension( + IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.signature_algorithms_cert); + return extensionData == null ? null : ReadSignatureAlgorithmsCertExtension(extensionData); + } + + /// + public static CertificateStatusRequest GetStatusRequestExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.status_request); + return extensionData == null ? null : ReadStatusRequestExtension(extensionData); + } + + /// + public static IList GetStatusRequestV2Extension( + IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.status_request_v2); + return extensionData == null ? null : ReadStatusRequestV2Extension(extensionData); + } + + /// + public static int[] GetSupportedGroupsExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.supported_groups); + return extensionData == null ? null : ReadSupportedGroupsExtension(extensionData); + } + + /// + public static short[] GetSupportedPointFormatsExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.ec_point_formats); + return extensionData == null ? null : ReadSupportedPointFormatsExtension(extensionData); + } + + /// + public static ProtocolVersion[] GetSupportedVersionsExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.supported_versions); + return extensionData == null ? null : ReadSupportedVersionsExtensionClient(extensionData); + } + + /// + public static ProtocolVersion GetSupportedVersionsExtensionServer(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.supported_versions); + return extensionData == null ? null : ReadSupportedVersionsExtensionServer(extensionData); + } + + /// + public static IList GetTrustedCAKeysExtensionClient(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.trusted_ca_keys); + return extensionData == null ? null : ReadTrustedCAKeysExtensionClient(extensionData); + } + + /// + public static bool HasClientCertificateUrlExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.client_certificate_url); + return extensionData == null ? false : ReadClientCertificateUrlExtension(extensionData); + } + + /// + public static bool HasEarlyDataIndication(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.early_data); + return extensionData == null ? false : ReadEarlyDataIndication(extensionData); + } + + /// + public static bool HasEncryptThenMacExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.encrypt_then_mac); + return extensionData == null ? false : ReadEncryptThenMacExtension(extensionData); + } + + /// + public static bool HasExtendedMasterSecretExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.extended_master_secret); + return extensionData == null ? false : ReadExtendedMasterSecretExtension(extensionData); + } + + /// + public static bool HasServerNameExtensionServer(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.server_name); + return extensionData == null ? false : ReadServerNameExtensionServer(extensionData); + } + + /// + public static bool HasPostHandshakeAuthExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.post_handshake_auth); + return extensionData == null ? false : ReadPostHandshakeAuthExtension(extensionData); + } + + /// + public static bool HasTruncatedHmacExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.truncated_hmac); + return extensionData == null ? false : ReadTruncatedHmacExtension(extensionData); + } + + /// + public static bool HasTrustedCAKeysExtensionServer(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.trusted_ca_keys); + return extensionData == null ? false : ReadTrustedCAKeysExtensionServer(extensionData); + } + + /// an of . + /// + public static byte[] CreateAlpnExtensionClient(IList protocolNameList) + { + if (protocolNameList == null || protocolNameList.Count < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + foreach (ProtocolName protocolName in protocolNameList) + { + protocolName.Encode(buf); + } + + return PatchOpaque16(buf); + } + + /// + public static byte[] CreateAlpnExtensionServer(ProtocolName protocolName) + { + var protocol_name_list = new List(); + protocol_name_list.Add(protocolName); + + return CreateAlpnExtensionClient(protocol_name_list); + } + + /// + public static byte[] CreateCertificateAuthoritiesExtension(IList authorities) + { + if (null == authorities || authorities.Count < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + foreach (X509Name authority in authorities) + { + byte[] derEncoding = authority.GetEncoded(Asn1Encodable.Der); + TlsUtilities.WriteOpaque16(derEncoding, buf); + } + + return PatchOpaque16(buf); + } + + /// + public static byte[] CreateCertificateTypeExtensionClient(short[] certificateTypes) + { + if (TlsUtilities.IsNullOrEmpty(certificateTypes) || certificateTypes.Length > 255) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeUint8ArrayWithUint8Length(certificateTypes); + } + + /// + public static byte[] CreateCertificateTypeExtensionServer(short certificateType) + { + return TlsUtilities.EncodeUint8(certificateType); + } + + public static byte[] CreateClientCertificateUrlExtension() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreateCompressCertificateExtension(int[] algorithms) + { + if (TlsUtilities.IsNullOrEmpty(algorithms) || algorithms.Length > 127) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeUint16ArrayWithUint8Length(algorithms); + } + + /// + public static byte[] CreateCookieExtension(byte[] cookie) + { + if (TlsUtilities.IsNullOrEmpty(cookie) || cookie.Length >= (1 << 16)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeOpaque16(cookie); + } + + public static byte[] CreateEarlyDataIndication() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreateEarlyDataMaxSize(long maxSize) + { + return TlsUtilities.EncodeUint32(maxSize); + } + + public static byte[] CreateEmptyExtensionData() + { + return TlsUtilities.EmptyBytes; + } + + public static byte[] CreateEncryptThenMacExtension() + { + return CreateEmptyExtensionData(); + } + + public static byte[] CreateExtendedMasterSecretExtension() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreateHeartbeatExtension(HeartbeatExtension heartbeatExtension) + { + if (heartbeatExtension == null) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + MemoryStream buf = new MemoryStream(); + + heartbeatExtension.Encode(buf); + + return buf.ToArray(); + } + + /// + public static byte[] CreateKeyShareClientHello(IList clientShares) + { + if (clientShares == null || clientShares.Count < 1) + return TlsUtilities.EncodeUint16(0); + + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + foreach (KeyShareEntry clientShare in clientShares) + { + clientShare.Encode(buf); + } + + return PatchOpaque16(buf); + } + + /// + public static byte[] CreateKeyShareHelloRetryRequest(int namedGroup) + { + return TlsUtilities.EncodeUint16(namedGroup); + } + + /// + public static byte[] CreateKeyShareServerHello(KeyShareEntry serverShare) + { + if (serverShare == null) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + MemoryStream buf = new MemoryStream(); + + serverShare.Encode(buf); + + return buf.ToArray(); + } + + /// + public static byte[] CreateMaxFragmentLengthExtension(short maxFragmentLength) + { + return TlsUtilities.EncodeUint8(maxFragmentLength); + } + + /// + public static byte[] CreateOidFiltersExtension(IDictionary filters) + { + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + if (null != filters) + { + //foreach (DerObjectIdentifier certificateExtensionOid in filters.Keys) + foreach (var filter in filters) + { + var certificateExtensionOid = filter.Key; + var certificateExtensionValues = filter.Value; + + if (null == certificateExtensionOid || null == certificateExtensionValues) + throw new TlsFatalAlert(AlertDescription.internal_error); + + byte[] derEncoding = certificateExtensionOid.GetEncoded(Asn1Encodable.Der); + TlsUtilities.WriteOpaque8(derEncoding, buf); + + TlsUtilities.WriteOpaque16(certificateExtensionValues, buf); + } + } + + return PatchOpaque16(buf); + } + + /// + public static byte[] CreatePaddingExtension(int dataLength) + { + TlsUtilities.CheckUint16(dataLength); + return new byte[dataLength]; + } + + public static byte[] CreatePostHandshakeAuthExtension() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreatePreSharedKeyClientHello(OfferedPsks offeredPsks) + { + if (offeredPsks == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + offeredPsks.Encode(buf); + + return buf.ToArray(); + } + + /// + public static byte[] CreatePreSharedKeyServerHello(int selectedIdentity) + { + return TlsUtilities.EncodeUint16(selectedIdentity); + } + + /// + public static byte[] CreatePskKeyExchangeModesExtension(short[] modes) + { + if (TlsUtilities.IsNullOrEmpty(modes) || modes.Length > 255) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeUint8ArrayWithUint8Length(modes); + } + + /// + public static byte[] CreateRecordSizeLimitExtension(int recordSizeLimit) + { + if (recordSizeLimit < 64) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeUint16(recordSizeLimit); + } + + /// + public static byte[] CreateServerNameExtensionClient(IList serverNameList) + { + if (serverNameList == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + new ServerNameList(serverNameList).Encode(buf); + + return buf.ToArray(); + } + + public static byte[] CreateServerNameExtensionServer() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreateSignatureAlgorithmsExtension( + IList supportedSignatureAlgorithms) + { + MemoryStream buf = new MemoryStream(); + + TlsUtilities.EncodeSupportedSignatureAlgorithms(supportedSignatureAlgorithms, buf); + + return buf.ToArray(); + } + + /// + public static byte[] CreateSignatureAlgorithmsCertExtension( + IList supportedSignatureAlgorithms) + { + return CreateSignatureAlgorithmsExtension(supportedSignatureAlgorithms); + } + + /// + public static byte[] CreateStatusRequestExtension(CertificateStatusRequest statusRequest) + { + if (statusRequest == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + statusRequest.Encode(buf); + + return buf.ToArray(); + } + + /// + public static byte[] CreateStatusRequestV2Extension(IList statusRequestV2) + { + if (statusRequestV2 == null || statusRequestV2.Count < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + foreach (CertificateStatusRequestItemV2 entry in statusRequestV2) + { + entry.Encode(buf); + } + + return PatchOpaque16(buf); + } + + /// + public static byte[] CreateSupportedGroupsExtension(IList namedGroups) + { + if (namedGroups == null || namedGroups.Count < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int count = namedGroups.Count; + int[] values = new int[count]; + for (int i = 0; i < count; ++i) + { + values[i] = namedGroups[i]; + } + + return TlsUtilities.EncodeUint16ArrayWithUint16Length(values); + } + + /// + public static byte[] CreateSupportedPointFormatsExtension(short[] ecPointFormats) + { + if (ecPointFormats == null || !Arrays.Contains(ecPointFormats, ECPointFormat.uncompressed)) + { + /* + * RFC 4492 5.1. If the Supported Point Formats Extension is indeed sent, it MUST + * contain the value 0 (uncompressed) as one of the items in the list of point formats. + */ + + // NOTE: We add it at the start (highest preference) + ecPointFormats = Arrays.Prepend(ecPointFormats, ECPointFormat.uncompressed); + } + + return TlsUtilities.EncodeUint8ArrayWithUint8Length(ecPointFormats); + } + + /// + public static byte[] CreateSupportedVersionsExtensionClient(ProtocolVersion[] versions) + { + if (TlsUtilities.IsNullOrEmpty(versions) || versions.Length > 127) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int count = versions.Length; + byte[] data = new byte[1 + count * 2]; + TlsUtilities.WriteUint8(count * 2, data, 0); + for (int i = 0; i < count; ++i) + { + TlsUtilities.WriteVersion(versions[i], data, 1 + i * 2); + } + return data; + } + + /// + public static byte[] CreateSupportedVersionsExtensionServer(ProtocolVersion selectedVersion) + { + return TlsUtilities.EncodeVersion(selectedVersion); + } + + public static byte[] CreateTruncatedHmacExtension() + { + return CreateEmptyExtensionData(); + } + + /// + public static byte[] CreateTrustedCAKeysExtensionClient(IList trustedAuthoritiesList) + { + MemoryStream buf = new MemoryStream(); + + // Placeholder for length + TlsUtilities.WriteUint16(0, buf); + + if (trustedAuthoritiesList != null) + { + foreach (TrustedAuthority entry in trustedAuthoritiesList) + { + entry.Encode(buf); + } + } + + return PatchOpaque16(buf); + } + + public static byte[] CreateTrustedCAKeysExtensionServer() + { + return CreateEmptyExtensionData(); + } + + /// + private static bool ReadEmptyExtensionData(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + if (extensionData.Length != 0) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return true; + } + + /// an of . + /// + public static IList ReadAlpnExtensionClient(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var protocol_name_list = new List(); + while (buf.Position < buf.Length) + { + ProtocolName protocolName = ProtocolName.Parse(buf); + + protocol_name_list.Add(protocolName); + } + return protocol_name_list; + } + + /// + public static ProtocolName ReadAlpnExtensionServer(byte[] extensionData) + { + var protocol_name_list = ReadAlpnExtensionClient(extensionData); + if (protocol_name_list.Count != 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return protocol_name_list[0]; + } + + /// + public static IList ReadCertificateAuthoritiesExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length < 5) + throw new TlsFatalAlert(AlertDescription.decode_error); + + MemoryStream buf = new MemoryStream(extensionData); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var authorities = new List(); + while (buf.Position < buf.Length) + { + byte[] derEncoding = TlsUtilities.ReadOpaque16(buf, 1); + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + X509Name ca = X509Name.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(ca, derEncoding); + authorities.Add(ca); + } + return authorities; + } + + /// + public static short[] ReadCertificateTypeExtensionClient(byte[] extensionData) + { + short[] certificateTypes = TlsUtilities.DecodeUint8ArrayWithUint8Length(extensionData); + if (certificateTypes.Length < 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return certificateTypes; + } + + /// + public static short ReadCertificateTypeExtensionServer(byte[] extensionData) + { + return TlsUtilities.DecodeUint8(extensionData); + } + + /// + public static bool ReadClientCertificateUrlExtension(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static int[] ReadCompressCertificateExtension(byte[] extensionData) + { + int[] algorithms = TlsUtilities.DecodeUint16ArrayWithUint8Length(extensionData); + if (algorithms.Length < 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return algorithms; + } + + /// + public static byte[] ReadCookieExtension(byte[] extensionData) + { + return TlsUtilities.DecodeOpaque16(extensionData, 1); + } + + /// + public static bool ReadEarlyDataIndication(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static long ReadEarlyDataMaxSize(byte[] extensionData) + { + return TlsUtilities.DecodeUint32(extensionData); + } + + /// + public static bool ReadEncryptThenMacExtension(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static bool ReadExtendedMasterSecretExtension(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static HeartbeatExtension ReadHeartbeatExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + HeartbeatExtension heartbeatExtension = HeartbeatExtension.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + return heartbeatExtension; + } + + /// + public static IList ReadKeyShareClientHello(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + /* + * TODO[tls13] Clients MUST NOT offer multiple KeyShareEntry values for the same group. + * Clients MUST NOT offer any KeyShareEntry values for groups not listed in the client's + * "supported_groups" extension. Servers MAY check for violations of these rules and abort + * the handshake with an "illegal_parameter" alert if one is violated. + */ + + MemoryStream buf = new MemoryStream(extensionData, false); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var clientShares = new List(); + while (buf.Position < buf.Length) + { + KeyShareEntry clientShare = KeyShareEntry.Parse(buf); + + clientShares.Add(clientShare); + } + return clientShares; + } + + /// + public static int ReadKeyShareHelloRetryRequest(byte[] extensionData) + { + return TlsUtilities.DecodeUint16(extensionData); + } + + /// + public static KeyShareEntry ReadKeyShareServerHello(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + KeyShareEntry serverShare = KeyShareEntry.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + return serverShare; + } + + /// + public static short ReadMaxFragmentLengthExtension(byte[] extensionData) + { + return TlsUtilities.DecodeUint8(extensionData); + } + + /// + public static IDictionary ReadOidFiltersExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length < 2) + throw new TlsFatalAlert(AlertDescription.decode_error); + + MemoryStream buf = new MemoryStream(extensionData, false); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var filters = new Dictionary(); + while (buf.Position < buf.Length) + { + byte[] derEncoding = TlsUtilities.ReadOpaque8(buf, 1); + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + DerObjectIdentifier certificateExtensionOid = DerObjectIdentifier.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(certificateExtensionOid, derEncoding); + + if (filters.ContainsKey(certificateExtensionOid)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + byte[] certificateExtensionValues = TlsUtilities.ReadOpaque16(buf); + + filters[certificateExtensionOid] = certificateExtensionValues; + } + return filters; + } + + /// + public static int ReadPaddingExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + if (!Arrays.AreAllZeroes(extensionData, 0, extensionData.Length)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return extensionData.Length; + } + + /// + public static bool ReadPostHandshakeAuthExtension(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static OfferedPsks ReadPreSharedKeyClientHello(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + OfferedPsks offeredPsks = OfferedPsks.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + return offeredPsks; + } + + /// + public static int ReadPreSharedKeyServerHello(byte[] extensionData) + { + return TlsUtilities.DecodeUint16(extensionData); + } + + /// + public static short[] ReadPskKeyExchangeModesExtension(byte[] extensionData) + { + short[] modes = TlsUtilities.DecodeUint8ArrayWithUint8Length(extensionData); + if (modes.Length < 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return modes; + } + + /// + public static int ReadRecordSizeLimitExtension(byte[] extensionData) + { + int recordSizeLimit = TlsUtilities.DecodeUint16(extensionData); + if (recordSizeLimit < 64) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return recordSizeLimit; + } + + /// + public static IList ReadServerNameExtensionClient(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + ServerNameList serverNameList = ServerNameList.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + return serverNameList.ServerNames; + } + + /// + public static bool ReadServerNameExtensionServer(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static IList ReadSignatureAlgorithmsExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + var supported_signature_algorithms = TlsUtilities.ParseSupportedSignatureAlgorithms(buf); + + TlsProtocol.AssertEmpty(buf); + + return supported_signature_algorithms; + } + + /// + public static IList ReadSignatureAlgorithmsCertExtension(byte[] extensionData) + { + return ReadSignatureAlgorithmsExtension(extensionData); + } + + /// + public static CertificateStatusRequest ReadStatusRequestExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + CertificateStatusRequest statusRequest = CertificateStatusRequest.Parse(buf); + + TlsProtocol.AssertEmpty(buf); + + return statusRequest; + } + + /// + public static IList ReadStatusRequestV2Extension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length < 3) + throw new TlsFatalAlert(AlertDescription.decode_error); + + MemoryStream buf = new MemoryStream(extensionData, false); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var statusRequestV2 = new List(); + while (buf.Position < buf.Length) + { + CertificateStatusRequestItemV2 entry = CertificateStatusRequestItemV2.Parse(buf); + statusRequestV2.Add(entry); + } + return statusRequestV2; + } + + /// + public static int[] ReadSupportedGroupsExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + int length = TlsUtilities.ReadUint16(buf); + if (length < 2 || (length & 1) != 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int[] namedGroups = TlsUtilities.ReadUint16Array(length / 2, buf); + + TlsProtocol.AssertEmpty(buf); + + return namedGroups; + } + + /// + public static short[] ReadSupportedPointFormatsExtension(byte[] extensionData) + { + short[] ecPointFormats = TlsUtilities.DecodeUint8ArrayWithUint8Length(extensionData); + if (!Arrays.Contains(ecPointFormats, ECPointFormat.uncompressed)) + { + /* + * RFC 4492 5.1. If the Supported Point Formats Extension is indeed sent, it MUST + * contain the value 0 (uncompressed) as one of the items in the list of point formats. + */ + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + return ecPointFormats; + } + + /// + public static ProtocolVersion[] ReadSupportedVersionsExtensionClient(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length < 3 || extensionData.Length > 255 || (extensionData.Length & 1) == 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int length = TlsUtilities.ReadUint8(extensionData, 0); + if (length != (extensionData.Length - 1)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int count = length / 2; + ProtocolVersion[] versions = new ProtocolVersion[count]; + for (int i = 0; i < count; ++i) + { + versions[i] = TlsUtilities.ReadVersion(extensionData, 1 + i * 2); + } + return versions; + } + + /// + public static ProtocolVersion ReadSupportedVersionsExtensionServer(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length != 2) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return TlsUtilities.ReadVersion(extensionData, 0); + } + + /// + public static bool ReadTruncatedHmacExtension(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + public static IList ReadTrustedCAKeysExtensionClient(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + if (extensionData.Length < 2) + throw new TlsFatalAlert(AlertDescription.decode_error); + + MemoryStream buf = new MemoryStream(extensionData, false); + + int length = TlsUtilities.ReadUint16(buf); + if (length != (extensionData.Length - 2)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + var trusted_authorities_list = new List(); + while (buf.Position < buf.Length) + { + TrustedAuthority entry = TrustedAuthority.Parse(buf); + trusted_authorities_list.Add(entry); + } + return trusted_authorities_list; + } + + /// + public static bool ReadTrustedCAKeysExtensionServer(byte[] extensionData) + { + return ReadEmptyExtensionData(extensionData); + } + + /// + private static byte[] PatchOpaque16(MemoryStream buf) + { + int length = Convert.ToInt32(buf.Length) - 2; + TlsUtilities.CheckUint16(length); + byte[] extensionData = buf.ToArray(); + TlsUtilities.WriteUint16(length, extensionData, 0); + return extensionData; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs.meta new file mode 100644 index 00000000..afe485b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 61321e7f35174fe4dae2d26743e756f1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsExtensionsUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs new file mode 100644 index 00000000..97c923c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + [Serializable] + public class TlsFatalAlert + : TlsException + { + private static string GetMessage(short alertDescription, string detailMessage) + { + string msg = Tls.AlertDescription.GetText(alertDescription); + if (null != detailMessage) + { + msg += "; " + detailMessage; + } + return msg; + } + + protected readonly byte m_alertDescription; + + public TlsFatalAlert(short alertDescription) + : this(alertDescription, null, null) + { + } + + public TlsFatalAlert(short alertDescription, string detailMessage) + : this(alertDescription, detailMessage, null) + { + } + + public TlsFatalAlert(short alertDescription, Exception alertCause) + : this(alertDescription, null, alertCause) + { + } + + public TlsFatalAlert(short alertDescription, string detailMessage, Exception alertCause) + : base(GetMessage(alertDescription, detailMessage), alertCause) + { + if (!TlsUtilities.IsValidUint8(alertDescription)) + throw new ArgumentOutOfRangeException(nameof(alertDescription)); + + m_alertDescription = (byte)alertDescription; + } + + protected TlsFatalAlert(SerializationInfo info, StreamingContext context) + : base(info, context) + { + m_alertDescription = info.GetByte("alertDescription"); + } + + public override void GetObjectData(SerializationInfo info, StreamingContext context) + { + base.GetObjectData(info, context); + info.AddValue("alertDescription", m_alertDescription); + } + + public virtual short AlertDescription + { + get { return m_alertDescription; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs.meta new file mode 100644 index 00000000..5b0880ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d692fb9d4bbba5342883d1c8b17309c7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlert.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs new file mode 100644 index 00000000..ce9e93cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + [Serializable] + public class TlsFatalAlertReceived + : TlsException + { + protected readonly byte m_alertDescription; + + public TlsFatalAlertReceived(short alertDescription) + : base(Tls.AlertDescription.GetText(alertDescription)) + { + if (!TlsUtilities.IsValidUint8(alertDescription)) + throw new ArgumentOutOfRangeException(nameof(alertDescription)); + + m_alertDescription = (byte)alertDescription; + } + + protected TlsFatalAlertReceived(SerializationInfo info, StreamingContext context) + : base(info, context) + { + m_alertDescription = info.GetByte("alertDescription"); + } + + public override void GetObjectData(SerializationInfo info, StreamingContext context) + { + base.GetObjectData(info, context); + info.AddValue("alertDescription", m_alertDescription); + } + + public virtual short AlertDescription + { + get { return m_alertDescription; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs.meta new file mode 100644 index 00000000..a84787ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7e7b8b9eaa3d4334884ef8b1c21fa9ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsFatalAlertReceived.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs new file mode 100644 index 00000000..eb9f1ce5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for an object that can calculate a handshake hash. + public interface TlsHandshakeHash + : TlsHash + { + /// + void CopyBufferTo(Stream output); + + void ForceBuffering(); + + void NotifyPrfDetermined(); + + void TrackHashAlgorithm(int cryptoHashAlgorithm); + + void SealHashAlgorithms(); + + void StopTracking(); + + TlsHash ForkPrfHash(); + + byte[] GetFinalHash(int cryptoHashAlgorithm); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs.meta new file mode 100644 index 00000000..af5ad20d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09f1488efa63cf94a98748066a65ae2c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHandshakeHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs new file mode 100644 index 00000000..b8a5bf4f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface TlsHeartbeat + { + byte[] GeneratePayload(); + + int IdleMillis { get; } + + int TimeoutMillis { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs.meta new file mode 100644 index 00000000..2c184287 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 87a2a48430a5c6045acc86751e13182b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsHeartbeat.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs new file mode 100644 index 00000000..f4eb13c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// A generic interface for key exchange implementations in (D)TLS. + public interface TlsKeyExchange + { + void Init(TlsContext context); + + /// + void SkipServerCredentials(); + + /// + void ProcessServerCredentials(TlsCredentials serverCredentials); + + /// + void ProcessServerCertificate(Certificate serverCertificate); + + bool RequiresServerKeyExchange { get; } + + /// + byte[] GenerateServerKeyExchange(); + + /// + void SkipServerKeyExchange(); + + /// + void ProcessServerKeyExchange(Stream input); + + short[] GetClientCertificateTypes(); + + /// + void SkipClientCredentials(); + + /// + void ProcessClientCredentials(TlsCredentials clientCredentials); + + /// + void ProcessClientCertificate(Certificate clientCertificate); + + /// + void GenerateClientKeyExchange(Stream output); + + /// + void ProcessClientKeyExchange(Stream input); + + bool RequiresCertificateVerify { get; } + + /// + TlsSecret GeneratePreMasterSecret(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs.meta new file mode 100644 index 00000000..1bdfbc84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 31243e33531cd3d4e8b394f5b74d3b0c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs new file mode 100644 index 00000000..25f55ef2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Interface for a key exchange factory offering a variety of specific algorithms. + public interface TlsKeyExchangeFactory + { + /// + TlsKeyExchange CreateDHKeyExchange(int keyExchange); + + /// + TlsKeyExchange CreateDHanonKeyExchangeClient(int keyExchange, TlsDHGroupVerifier dhGroupVerifier); + + /// + TlsKeyExchange CreateDHanonKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig); + + /// + TlsKeyExchange CreateDheKeyExchangeClient(int keyExchange, TlsDHGroupVerifier dhGroupVerifier); + + /// + TlsKeyExchange CreateDheKeyExchangeServer(int keyExchange, TlsDHConfig dhConfig); + + /// + TlsKeyExchange CreateECDHKeyExchange(int keyExchange); + + /// + TlsKeyExchange CreateECDHanonKeyExchangeClient(int keyExchange); + + /// + TlsKeyExchange CreateECDHanonKeyExchangeServer(int keyExchange, TlsECConfig ecConfig); + + /// + TlsKeyExchange CreateECDheKeyExchangeClient(int keyExchange); + + /// + TlsKeyExchange CreateECDheKeyExchangeServer(int keyExchange, TlsECConfig ecConfig); + + /// + TlsKeyExchange CreatePskKeyExchangeClient(int keyExchange, TlsPskIdentity pskIdentity, + TlsDHGroupVerifier dhGroupVerifier); + + /// + TlsKeyExchange CreatePskKeyExchangeServer(int keyExchange, TlsPskIdentityManager pskIdentityManager, + TlsDHConfig dhConfig, TlsECConfig ecConfig); + + /// + TlsKeyExchange CreateRsaKeyExchange(int keyExchange); + + /// + TlsKeyExchange CreateSrpKeyExchangeClient(int keyExchange, TlsSrpIdentity srpIdentity, + TlsSrpConfigVerifier srpConfigVerifier); + + /// + TlsKeyExchange CreateSrpKeyExchangeServer(int keyExchange, TlsSrpLoginParameters loginParameters); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs.meta new file mode 100644 index 00000000..0396b126 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d4fea3b7e5536164093adbe148761173 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsKeyExchangeFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs new file mode 100644 index 00000000..45844dc6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs @@ -0,0 +1,32 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// This exception will be thrown (only) when the connection is closed by the peer without sending a + /// close_notify warning alert. + /// + /// If this happens, the TLS protocol cannot rule out truncation of the connection data (potentially + /// malicious). It may be possible to check for truncation via some property of a higher level protocol + /// built upon TLS, e.g.the Content-Length header for HTTPS. + /// + [Serializable] + public class TlsNoCloseNotifyException + : EndOfStreamException + { + public TlsNoCloseNotifyException() + : base("No close_notify alert received before connection closed") + { + } + + protected TlsNoCloseNotifyException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs.meta new file mode 100644 index 00000000..328cbee5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ba33bc7e4d4f9ee46ab8958466a1432e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsNoCloseNotifyException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs new file mode 100644 index 00000000..f3de360a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Object Identifiers associated with TLS extensions. + public abstract class TlsObjectIdentifiers + { + /// RFC 7633 + public static readonly DerObjectIdentifier id_pe_tlsfeature = X509ObjectIdentifiers.IdPE.Branch("24"); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs.meta new file mode 100644 index 00000000..038f43f2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6cc9d6811f9b05446a999f8091b219b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsObjectIdentifiers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs new file mode 100644 index 00000000..76df14a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for a (D)TLS endpoint. + public interface TlsPeer + { + TlsCrypto Crypto { get; } + + void NotifyCloseHandle(TlsCloseable closehandle); + + /// + void Cancel(); + + ProtocolVersion[] GetProtocolVersions(); + + int[] GetCipherSuites(); + + /// Notifies the peer that a new handshake is about to begin. + /// + void NotifyHandshakeBeginning(); + + /// Specify the timeout, in milliseconds, to use for the complete handshake process. + /// + /// NOTE: Currently only respected by DTLS protocols. Negative values are not allowed. A timeout of zero means + /// an infinite timeout (i.e.the handshake will never time out). + /// + /// the handshake timeout, in milliseconds. + int GetHandshakeTimeoutMillis(); + + bool AllowLegacyResumption(); + + int GetMaxCertificateChainLength(); + + int GetMaxHandshakeMessageSize(); + + short[] GetPskKeyExchangeModes(); + + /// + /// This option is provided as a last resort for interoperability with TLS peers that fail to correctly send a + /// close_notify alert at end of stream. Implementations SHOULD return true; caution is advised if returning + /// false without a full understanding of the implications. + /// + bool RequiresCloseNotify(); + + /// This implementation supports RFC 7627 and will always negotiate the extended_master_secret + /// extension where possible. When connecting to a peer that does not offer/accept this extension, it is + /// recommended to abort the handshake.This option is provided for interoperability with legacy peers, although + /// some TLS features will be disabled in that case (see RFC 7627 5.4). + /// + /// true if the handshake should be aborted when the peer does not negotiate the + /// extended_master_secret extension, or false to support legacy interoperability. + bool RequiresExtendedMasterSecret(); + + bool ShouldUseExtendedMasterSecret(); + + /// See RFC 5246 6.2.3.2. Controls whether block cipher encryption may randomly add extra padding + /// beyond the minimum. + /// + /// Note that in configurations where this is known to be potential security risk this setting will be ignored + /// (and extended padding disabled). Extra padding is always supported when decrypting received records. + /// + /// true if random extra padding should be added during block cipher encryption, or + /// false to always use the minimum amount of required padding. + bool ShouldUseExtendedPadding(); + + /// draft-mathewson-no-gmtunixtime-00 2. "If existing users of a TLS implementation may rely on + /// gmt_unix_time containing the current time, we recommend that implementors MAY provide the ability to set + /// gmt_unix_time as an option only, off by default.". + /// + /// NOTE: For a server that has negotiated TLS 1.3 (or later), or a client that has offered TLS 1.3 (or later), + /// this is not called and gmt_unix_time is not used. + /// + /// true if the current time should be used in the gmt_unix_time field of Random, or + /// false if gmt_unix_time should contain a cryptographically random value. + bool ShouldUseGmtUnixTime(); + + /// RFC 5746 3.4/3.6. In case this is false, peers may want to terminate the handshake instead of + /// continuing; see Section 4.1/4.3 for discussion. + /// + /// NOTE: TLS 1.3 forbids renegotiation, so this is never called when TLS 1.3 (or later) was negotiated. + /// + /// + void NotifySecureRenegotiation(bool secureRenegotiation); + + /// + TlsKeyExchangeFactory GetKeyExchangeFactory(); + + /// This method will be called when an alert is raised by the protocol. + /// + /// + /// A human-readable message explaining what caused this alert. May be null. + /// The that caused this alert to be raised. May be null. + void NotifyAlertRaised(short alertLevel, short alertDescription, string message, Exception cause); + + /// This method will be called when an alert is received from the remote peer. + /// + /// + void NotifyAlertReceived(short alertLevel, short alertDescription); + + /// Notifies the peer that the handshake has been successfully completed. + /// + void NotifyHandshakeComplete(); + + /// Return a instance that will control the generation of heartbeats + /// locally (if permitted by the remote peer), or null to not generate heartbeats. Heartbeats are described in + /// RFC 6520. + /// an instance of . + /// + TlsHeartbeat GetHeartbeat(); + + /// Return the heartbeat mode applicable to the remote peer. Heartbeats are described in RFC 6520. + /// + /// + /// See enumeration class for appropriate return values. + /// + /// the value. + short GetHeartbeatPolicy(); + + /// Indicates whether a DTLS connection should ignore corrupt records (bad_record_mac) instead of + /// failing the connection. + /// Called only once at the start of a connection and applies throughout. + /// The value true to ignore corrupt DTLS records, or false to fail the connection. + /// + bool IgnoreCorruptDtlsRecords { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs.meta new file mode 100644 index 00000000..d6e1096c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3adc78ad4e8a9e642b942981739b0abc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPeer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs new file mode 100644 index 00000000..2b63c79f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs @@ -0,0 +1,2182 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.TLS; +using Best.HTTP.Shared.PlatformSupport.Threading; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class TlsProtocol + : TlsCloseable + { + /* + * Connection States. + * + * NOTE: Redirection of handshake messages to TLS 1.3 handlers assumes CS_START, CS_CLIENT_HELLO + * are lower than any of the other values. + */ + protected const short CS_START = 0; + protected const short CS_CLIENT_HELLO = 1; + protected const short CS_SERVER_HELLO_RETRY_REQUEST = 2; + protected const short CS_CLIENT_HELLO_RETRY = 3; + protected const short CS_SERVER_HELLO = 4; + protected const short CS_SERVER_ENCRYPTED_EXTENSIONS = 5; + protected const short CS_SERVER_SUPPLEMENTAL_DATA = 6; + protected const short CS_SERVER_CERTIFICATE = 7; + protected const short CS_SERVER_CERTIFICATE_STATUS = 8; + protected const short CS_SERVER_CERTIFICATE_VERIFY = 9; + protected const short CS_SERVER_KEY_EXCHANGE = 10; + protected const short CS_SERVER_CERTIFICATE_REQUEST = 11; + protected const short CS_SERVER_HELLO_DONE = 12; + protected const short CS_CLIENT_END_OF_EARLY_DATA = 13; + protected const short CS_CLIENT_SUPPLEMENTAL_DATA = 14; + protected const short CS_CLIENT_CERTIFICATE = 15; + protected const short CS_CLIENT_KEY_EXCHANGE = 16; + protected const short CS_CLIENT_CERTIFICATE_VERIFY = 17; + protected const short CS_CLIENT_FINISHED = 18; + protected const short CS_SERVER_SESSION_TICKET = 19; + protected const short CS_SERVER_FINISHED = 20; + protected const short CS_END = 21; + + protected bool IsLegacyConnectionState() + { + switch (m_connectionState) + { + case CS_START: + case CS_CLIENT_HELLO: + case CS_SERVER_HELLO: + case CS_SERVER_SUPPLEMENTAL_DATA: + case CS_SERVER_CERTIFICATE: + case CS_SERVER_CERTIFICATE_STATUS: + case CS_SERVER_KEY_EXCHANGE: + case CS_SERVER_CERTIFICATE_REQUEST: + case CS_SERVER_HELLO_DONE: + case CS_CLIENT_SUPPLEMENTAL_DATA: + case CS_CLIENT_CERTIFICATE: + case CS_CLIENT_KEY_EXCHANGE: + case CS_CLIENT_CERTIFICATE_VERIFY: + case CS_CLIENT_FINISHED: + case CS_SERVER_SESSION_TICKET: + case CS_SERVER_FINISHED: + case CS_END: + return true; + + case CS_SERVER_HELLO_RETRY_REQUEST: + case CS_CLIENT_HELLO_RETRY: + case CS_SERVER_ENCRYPTED_EXTENSIONS: + case CS_SERVER_CERTIFICATE_VERIFY: + case CS_CLIENT_END_OF_EARLY_DATA: + default: + return false; + } + } + + protected bool IsTlsV13ConnectionState() + { + switch (m_connectionState) + { + case CS_START: + case CS_CLIENT_HELLO: + case CS_SERVER_HELLO_RETRY_REQUEST: + case CS_CLIENT_HELLO_RETRY: + case CS_SERVER_HELLO: + case CS_SERVER_ENCRYPTED_EXTENSIONS: + case CS_SERVER_CERTIFICATE_REQUEST: + case CS_SERVER_CERTIFICATE: + case CS_SERVER_CERTIFICATE_VERIFY: + case CS_SERVER_FINISHED: + case CS_CLIENT_END_OF_EARLY_DATA: + case CS_CLIENT_CERTIFICATE: + case CS_CLIENT_CERTIFICATE_VERIFY: + case CS_CLIENT_FINISHED: + case CS_END: + return true; + + case CS_SERVER_SUPPLEMENTAL_DATA: + case CS_SERVER_CERTIFICATE_STATUS: + case CS_SERVER_KEY_EXCHANGE: + case CS_SERVER_HELLO_DONE: + case CS_CLIENT_SUPPLEMENTAL_DATA: + case CS_CLIENT_KEY_EXCHANGE: + case CS_SERVER_SESSION_TICKET: + default: + return false; + } + } + + /* + * Different modes to handle the known IV weakness + */ + protected const short ADS_MODE_1_Nsub1 = 0; // 1/n-1 record splitting + protected const short ADS_MODE_0_N = 1; // 0/n record splitting + protected const short ADS_MODE_0_N_FIRSTONLY = 2; // 0/n record splitting on first data fragment only + + /* + * Queues for data from some protocols. + */ + private readonly ByteQueue m_applicationDataQueue = new ByteQueue(0); + private readonly ByteQueue m_alertQueue = new ByteQueue(2); + private readonly ByteQueue m_handshakeQueue = new ByteQueue(0); + //private readonly ByteQueue m_heartbeatQueue = new ByteQueue(0); + + internal readonly RecordStream m_recordStream; + //internal readonly object m_recordWriteLock = new object(); + + private int m_maxHandshakeMessageSize = -1; + + internal TlsHandshakeHash m_handshakeHash; + + private TlsStream m_tlsStream = null; + + private volatile bool m_closed = false; + private volatile bool m_failedWithError = false; + private volatile bool m_appDataReady = false; + private volatile bool m_appDataSplitEnabled = true; + private volatile bool m_keyUpdateEnabled = false; + //private volatile bool m_keyUpdatePendingReceive = false; + private volatile bool m_keyUpdatePendingSend = false; + private volatile bool m_resumableHandshake = false; + private volatile int m_appDataSplitMode = ADS_MODE_1_Nsub1; + + protected TlsSession m_tlsSession = null; + protected SessionParameters m_sessionParameters = null; + protected TlsSecret m_sessionMasterSecret = null; + + protected byte[] m_retryCookie = null; + protected int m_retryGroup = -1; + protected IDictionary m_clientExtensions = null; + protected IDictionary m_serverExtensions = null; + + protected short m_connectionState = CS_START; + protected bool m_selectedPsk13 = false; + protected bool m_receivedChangeCipherSpec = false; + protected bool m_expectSessionTicket = false; + + protected readonly bool m_blocking; + protected readonly ByteQueueInputStream m_inputBuffers; + protected readonly ByteQueueOutputStream m_outputBuffer; + + protected TlsProtocol() + { + this.m_blocking = false; + this.m_inputBuffers = new ByteQueueInputStream(); + this.m_outputBuffer = new ByteQueueOutputStream(); + this.m_recordStream = new RecordStream(this, m_inputBuffers, m_outputBuffer); + } + + public TlsProtocol(Stream stream) + : this(stream, stream) + { + } + + public TlsProtocol(Stream input, Stream output) + { + this.m_blocking = true; + this.m_inputBuffers = null; + this.m_outputBuffer = null; + this.m_recordStream = new RecordStream(this, input, output); + } + + /// + public virtual void ResumeHandshake() + { + if (!m_blocking) + throw new InvalidOperationException("Cannot use ResumeHandshake() in non-blocking mode!"); + if (!IsHandshaking) + throw new InvalidOperationException("No handshake in progress"); + + BlockForHandshake(); + } + + /// + protected virtual void CloseConnection() + { + m_recordStream.Close(); + } + + protected abstract TlsContext Context { get; } + + internal abstract AbstractTlsContext ContextAdmin { get; } + + protected abstract TlsPeer Peer { get; } + + /// + protected virtual void HandleAlertMessage(short alertLevel, short alertDescription) + { + Peer.NotifyAlertReceived(alertLevel, alertDescription); + + if (alertLevel == AlertLevel.warning) + { + HandleAlertWarningMessage(alertDescription); + } + else + { + HandleFailure(); + + throw new TlsFatalAlertReceived(alertDescription); + } + } + + /// + protected virtual void HandleAlertWarningMessage(short alertDescription) + { + switch (alertDescription) + { + /* + * RFC 5246 7.2.1. The other party MUST respond with a close_notify alert of its own + * and close down the connection immediately, discarding any pending writes. + */ + case AlertDescription.close_notify: + { + if (!m_appDataReady) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + HandleClose(false); + break; + } + case AlertDescription.no_certificate: + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + case AlertDescription.no_renegotiation: + { + // TODO[reneg] Give peer the option to tolerate this + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + } + + /// + protected virtual void HandleChangeCipherSpecMessage() + { + } + + /// + protected virtual void HandleClose(bool user_canceled) + { + if (!m_closed) + { + this.m_closed = true; + + if (!m_appDataReady) + { + CleanupHandshake(); + + if (user_canceled) + { + RaiseAlertWarning(AlertDescription.user_canceled, "User canceled handshake"); + } + } + + RaiseAlertWarning(AlertDescription.close_notify, "Connection closed"); + + CloseConnection(); + } + } + + /// + protected virtual void HandleException(short alertDescription, string message, Exception e) + { + // TODO[tls-port] Can we support interrupted IO on .NET? + //if ((m_appDataReady || IsResumableHandshake()) && (e is InterruptedIOException)) + // return; + + if (!m_closed) + { + RaiseAlertFatal(alertDescription, message, e); + + HandleFailure(); + } + } + + /// + protected virtual void HandleFailure() + { + this.m_closed = true; + this.m_failedWithError = true; + + /* + * RFC 2246 7.2.1. The session becomes unresumable if any connection is terminated + * without proper close_notify messages with level equal to warning. + */ + // TODO This isn't quite in the right place. Also, as of TLS 1.1 the above is obsolete. + InvalidateSession(); + + if (!m_appDataReady) + { + CleanupHandshake(); + } + + CloseConnection(); + } + + /// + protected abstract void HandleHandshakeMessage(short type, HandshakeMessageInput buf); + + /// + protected virtual void ApplyMaxFragmentLengthExtension(short maxFragmentLength) + { + if (maxFragmentLength >= 0) + { + if (!MaxFragmentLength.IsValid(maxFragmentLength)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int plainTextLimit = 1 << (8 + maxFragmentLength); + m_recordStream.SetPlaintextLimit(plainTextLimit); + } + } + + /// + protected virtual void CheckReceivedChangeCipherSpec(bool expected) + { + if (expected != m_receivedChangeCipherSpec) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + /// + protected virtual void BlockForHandshake() + { + while (m_connectionState != CS_END) + { + if (IsClosed) + { + // NOTE: Any close during the handshake should have raised an exception. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + SafeReadRecord(); + } + } + + protected virtual void handleRenegotiation() + { + // TODO: check whether renegotiation is enabled or not and call BeginHandshake/RefuseRenegotiation accordingly. + BeginHandshake(true); + } + + /// + protected virtual void BeginHandshake(bool renegotiation) + { + AbstractTlsContext context = ContextAdmin; + TlsPeer peer = Peer; + + this.m_maxHandshakeMessageSize = System.Math.Max(1024, peer.GetMaxHandshakeMessageSize()); + + this.m_handshakeHash = new DeferredHash(context); + this.m_connectionState = CS_START; + this.m_selectedPsk13 = false; + + context.HandshakeBeginning(peer); + + SecurityParameters securityParameters = context.SecurityParameters; + + if (renegotiation != securityParameters.IsRenegotiating) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + securityParameters.m_extendedPadding = peer.ShouldUseExtendedPadding(); + } + + protected virtual void CleanupHandshake() + { + TlsContext context = Context; + if (null != context) + { + SecurityParameters securityParameters = context.SecurityParameters; + if (null != securityParameters) + { + securityParameters.Clear(); + } + } + + this.m_tlsSession = null; + this.m_sessionParameters = null; + this.m_sessionMasterSecret = null; + + this.m_retryCookie = null; + this.m_retryGroup = -1; + this.m_clientExtensions = null; + this.m_serverExtensions = null; + + this.m_selectedPsk13 = false; + this.m_receivedChangeCipherSpec = false; + this.m_expectSessionTicket = false; + } + + /// + protected virtual void CompleteHandshake() + { + try + { + AbstractTlsContext context = ContextAdmin; + SecurityParameters securityParameters = context.SecurityParameters; + + if ((!context.IsHandshaking && !securityParameters.IsRenegotiating) || + null == securityParameters.LocalVerifyData || + null == securityParameters.PeerVerifyData) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + m_recordStream.FinaliseHandshake(); + this.m_connectionState = CS_END; + + // TODO Prefer to set to null, but would need guards elsewhere + this.m_handshakeHash = new DeferredHash(context); + + m_alertQueue.Shrink(); + m_handshakeQueue.Shrink(); + + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + this.m_appDataSplitEnabled = !TlsUtilities.IsTlsV11(negotiatedVersion); + this.m_appDataReady = true; + + this.m_keyUpdateEnabled = TlsUtilities.IsTlsV13(negotiatedVersion); + + if (m_blocking) + { + this.m_tlsStream = new TlsStream(this); + } + + if (m_sessionParameters == null) + { + this.m_sessionMasterSecret = securityParameters.MasterSecret; + + this.m_sessionParameters = new SessionParameters.Builder() + .SetCipherSuite(securityParameters.CipherSuite) + .SetExtendedMasterSecret(securityParameters.IsExtendedMasterSecret) + .SetLocalCertificate(securityParameters.LocalCertificate) + .SetMasterSecret(context.Crypto.AdoptSecret(m_sessionMasterSecret)) + .SetNegotiatedVersion(securityParameters.NegotiatedVersion) + .SetPeerCertificate(securityParameters.PeerCertificate) + .SetPskIdentity(securityParameters.PskIdentity) + .SetSrpIdentity(securityParameters.SrpIdentity) + // TODO Consider filtering extensions that aren't relevant to resumed sessions + .SetServerExtensions(m_serverExtensions) + .Build(); + + this.m_tlsSession = TlsUtilities.ImportSession(securityParameters.SessionID, m_sessionParameters); + } + else + { + securityParameters.m_localCertificate = m_sessionParameters.LocalCertificate; + securityParameters.m_peerCertificate = m_sessionParameters.PeerCertificate; + securityParameters.m_pskIdentity = m_sessionParameters.PskIdentity; + securityParameters.m_srpIdentity = m_sessionParameters.SrpIdentity; + } + + context.HandshakeComplete(Peer, m_tlsSession); + } + finally + { + CleanupHandshake(); + } + } + + /// + internal void ProcessRecord(short protocol, byte[] buf, int off, int len) + { + /* + * Have a look at the protocol type, and add it to the correct queue. + */ + switch (protocol) + { + case ContentType.alert: + { + m_alertQueue.AddData(buf, off, len); + ProcessAlertQueue(); + break; + } + case ContentType.application_data: + { + if (!m_appDataReady) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + m_applicationDataQueue.AddData(buf, off, len); + ProcessApplicationDataQueue(); + break; + } + case ContentType.change_cipher_spec: + { + ProcessChangeCipherSpec(buf, off, len); + break; + } + case ContentType.handshake: + { + if (m_handshakeQueue.Available > 0) + { + m_handshakeQueue.AddData(buf, off, len); + ProcessHandshakeQueue(m_handshakeQueue); + } + else + { + ByteQueue tmpQueue = new ByteQueue(buf, off, len); + ProcessHandshakeQueue(tmpQueue); + int remaining = tmpQueue.Available; + if (remaining > 0) + { + m_handshakeQueue.AddData(buf, off + len - remaining, remaining); + } + } + break; + } + //case ContentType.heartbeat: + //{ + // if (!m_appDataReady) + // throw new TlsFatalAlert(AlertDescription.unexpected_message); + + // // TODO[RFC 6520] + // m_heartbeatQueue.addData(buf, off, len); + // ProcessHeartbeatQueue(); + // break; + //} + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + /// + private void ProcessHandshakeQueue(ByteQueue queue) + { + /* + * We need the first 4 bytes, they contain type and length of the message. + */ + while (queue.Available >= 4) + { + int header = queue.ReadInt32(); + + short type = (short)((uint)header >> 24); + if (!HandshakeType.IsRecognized(type)) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message, + "Handshake message of unrecognized type: " + type); + } + + int length = header & 0x00FFFFFF; + if (length > m_maxHandshakeMessageSize) + { + throw new TlsFatalAlert(AlertDescription.internal_error, + "Handshake message length exceeds the maximum: " + HandshakeType.GetText(type) + ", " + length + + " > " + m_maxHandshakeMessageSize); + } + + int totalLength = 4 + length; + if (queue.Available < totalLength) + { + // Not enough bytes in the buffer to read the full message. + break; + } + + /* + * Check ChangeCipherSpec status + */ + switch (type) + { + case HandshakeType.hello_request: + break; + + default: + { + ProtocolVersion negotiatedVersion = Context.ServerVersion; + if (null != negotiatedVersion && TlsUtilities.IsTlsV13(negotiatedVersion)) + break; + + CheckReceivedChangeCipherSpec(HandshakeType.finished == type); + break; + } + } + + HandshakeMessageInput buf = queue.ReadHandshakeMessage(totalLength); + + switch (type) + { + /* + * These message types aren't included in the transcript. + */ + case HandshakeType.hello_request: + case HandshakeType.key_update: + break; + + /* + * Not included in the transcript for (D)TLS 1.3+ + */ + case HandshakeType.new_session_ticket: + { + ProtocolVersion negotiatedVersion = Context.ServerVersion; + if (null != negotiatedVersion && !TlsUtilities.IsTlsV13(negotiatedVersion)) + { + buf.UpdateHash(m_handshakeHash); + } + + break; + } + + /* + * These message types are deferred to the handler to explicitly update the transcript. + */ + case HandshakeType.certificate_verify: + case HandshakeType.client_hello: + case HandshakeType.finished: + case HandshakeType.server_hello: + break; + + /* + * For all others we automatically update the transcript immediately. + */ + default: + { + buf.UpdateHash(m_handshakeHash); + break; + } + } + + buf.Seek(4L, SeekOrigin.Current); + + HandleHandshakeMessage(type, buf); + } + } + + private void ProcessApplicationDataQueue() + { + /* + * There is nothing we need to do here. + * + * This function could be used for callbacks when application data arrives in the future. + */ + } + + /// + private void ProcessAlertQueue() + { + while (m_alertQueue.Available >= 2) + { + /* + * An alert is always 2 bytes. Read the alert. + */ + byte[] alert = m_alertQueue.RemoveData(2, 0); + short alertLevel = alert[0]; + short alertDescription = alert[1]; + + HandleAlertMessage(alertLevel, alertDescription); + } + } + + /// This method is called, when a change cipher spec message is received. + /// If the message has an invalid content or the handshake is not in the correct + /// state. + private void ProcessChangeCipherSpec(byte[] buf, int off, int len) + { + ProtocolVersion negotiatedVersion = Context.ServerVersion; + if (null == negotiatedVersion || TlsUtilities.IsTlsV13(negotiatedVersion)) + { + // See RFC 8446 D.4. + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + for (int i = 0; i < len; ++i) + { + short message = TlsUtilities.ReadUint8(buf, off + i); + + if (message != ChangeCipherSpec.change_cipher_spec) + throw new TlsFatalAlert(AlertDescription.decode_error); + + if (this.m_receivedChangeCipherSpec + || m_alertQueue.Available > 0 + || m_handshakeQueue.Available > 0) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + m_recordStream.NotifyChangeCipherSpecReceived(); + + this.m_receivedChangeCipherSpec = true; + + HandleChangeCipherSpecMessage(); + } + } + + public virtual int ApplicationDataAvailable + { + get { return m_applicationDataQueue.Available; } + } + + /// Read data from the network. + /// + /// The method will return immediately, if there is still some data left in the buffer, or block until some + /// application data has been read from the network. + /// + /// The buffer where the data will be copied to. + /// The position where the data will be placed in the buffer. + /// The maximum number of bytes to read. + /// The number of bytes read. + /// If something goes wrong during reading data. + public virtual int ReadApplicationData(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ReadApplicationData(buffer.AsSpan(offset, count)); +#else + if (!m_appDataReady) + throw new InvalidOperationException("Cannot read application data until initial handshake completed."); + + while (m_applicationDataQueue.Available < 1) + { + if (this.m_closed) + { + if (this.m_failedWithError) + throw new IOException("Cannot read application data on failed TLS connection"); + + return 0; + } + + /* + * NOTE: Only called more than once when empty records are received, so no special + * InterruptedIOException handling is necessary. + */ + SafeReadRecord(); + } + + if (count > 0) + { + count = System.Math.Min(count, m_applicationDataQueue.Available); + m_applicationDataQueue.RemoveData(buffer, offset, count, 0); + } + return count; +#endif + } + + public int TestApplicationData() + { + while (m_applicationDataQueue.Available == 0) + { + if (this.m_closed) + { + if (this.m_failedWithError) + throw new IOException("Cannot read application data on failed TLS connection"); + + return -1; + } + if (!m_appDataReady) + throw new InvalidOperationException("Cannot read application data until initial handshake completed."); + + /* + * NOTE: Only called more than once when empty records are received, so no special + * InterruptedIOException handling is necessary. + */ + SafeReadRecord(); + } + + return m_applicationDataQueue.Available; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ReadApplicationData(Span buffer) + { + if (!m_appDataReady) + throw new InvalidOperationException("Cannot read application data until initial handshake completed."); + + while (m_applicationDataQueue.Available < 1) + { + if (this.m_closed) + { + if (this.m_failedWithError) + throw new IOException("Cannot read application data on failed TLS connection"); + + return 0; + } + + /* + * NOTE: Only called more than once when empty records are received, so no special + * InterruptedIOException handling is necessary. + */ + SafeReadRecord(); + } + + int count = buffer.Length; + if (count > 0) + { + count = System.Math.Min(count, m_applicationDataQueue.Available); + m_applicationDataQueue.RemoveData(buffer[..count], 0); + } + return count; + } +#endif + + /// + protected virtual RecordPreview SafePreviewRecordHeader(byte[] recordHeader) + { + try + { + return m_recordStream.PreviewRecordHeader(recordHeader); + } + catch (TlsFatalAlert e) + { + HandleException(e.AlertDescription, "Failed to read record", e); + throw; + } + catch (IOException e) + { + HandleException(AlertDescription.internal_error, "Failed to read record", e); + throw; + } + catch (Exception e) + { + HandleException(AlertDescription.internal_error, "Failed to read record", e); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + + /// + protected virtual void SafeReadRecord() + { + try + { + if (m_recordStream.ReadRecord()) + return; + + if (!m_appDataReady) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + if (!Peer.RequiresCloseNotify()) + { + HandleClose(false); + return; + } + } + catch (TlsFatalAlertReceived e) + { + // Connection failure already handled at source + throw; + } + catch (TlsFatalAlert e) + { + HandleException(e.AlertDescription, "Failed to read record", e); + throw; + } + catch (IOException e) + { + HandleException(AlertDescription.internal_error, "Failed to read record", e); + throw; + } + catch (Exception e) + { + HandleException(AlertDescription.internal_error, "Failed to read record", e); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + HandleFailure(); + + throw new TlsNoCloseNotifyException(); + } + + /// + protected virtual bool SafeReadFullRecord(byte[] input, int inputOff, int inputLen) + { + try + { + return m_recordStream.ReadFullRecord(input, inputOff, inputLen); + } + catch (TlsFatalAlert e) + { + HandleException(e.AlertDescription, "Failed to process record", e); + throw; + } + catch (IOException e) + { + HandleException(AlertDescription.internal_error, "Failed to process record", e); + throw; + } + catch (Exception e) + { + HandleException(AlertDescription.internal_error, "Failed to process record", e); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + + /// + protected virtual void SafeWriteRecord(short type, byte[] buf, int offset, int len) + { + try + { + m_recordStream.WriteRecord(type, buf, offset, len); + } + catch (TlsFatalAlert e) + { + HandleException(e.AlertDescription, "Failed to write record", e); + throw; + } + catch (IOException e) + { + HandleException(AlertDescription.internal_error, "Failed to write record", e); + throw; + } + catch (Exception e) + { + HandleException(AlertDescription.internal_error, "Failed to write record", e); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + protected virtual void SafeWriteRecord(short type, ReadOnlySpan buffer) + { + try + { + m_recordStream.WriteRecord(type, buffer); + } + catch (TlsFatalAlert e) + { + HandleException(e.AlertDescription, "Failed to write record", e); + throw; + } + catch (IOException e) + { + HandleException(AlertDescription.internal_error, "Failed to write record", e); + throw; + } + catch (Exception e) + { + HandleException(AlertDescription.internal_error, "Failed to write record", e); + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } +#endif + + /// Write some application data. + /// + /// Fragmentation is handled internally. Usable in both blocking/non-blocking modes.

    + /// In blocking mode, the output will be automatically sent via the underlying transport. In non-blocking mode, + /// call to get the output bytes to send to the peer.

    + /// This method must not be called until after the initial handshake is complete. Attempting to call it earlier + /// will result in an . + ///
    + /// The buffer containing application data to send. + /// The offset at which the application data begins + /// The number of bytes of application data. + /// If called before the initial handshake has completed. + /// + /// If connection is already closed, or for encryption or transport errors. + /// + public virtual void WriteApplicationData(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + WriteApplicationData(buffer.AsSpan(offset, count)); +#else + if (!m_appDataReady) + throw new InvalidOperationException( + "Cannot write application data until initial handshake completed."); + + //lock (m_recordWriteLock) + { + while (count > 0) + { + if (m_closed) + throw new IOException("Cannot write application data on closed/failed TLS connection"); + + /* + * RFC 5246 6.2.1. Zero-length fragments of Application data MAY be sent as they are + * potentially useful as a traffic analysis countermeasure. + * + * NOTE: Actually, implementations appear to have settled on 1/n-1 record splitting. + */ + if (m_appDataSplitEnabled) + { + /* + * Protect against known IV attack! + * + * DO NOT REMOVE THIS CODE, EXCEPT YOU KNOW EXACTLY WHAT YOU ARE DOING HERE. + */ + switch (m_appDataSplitMode) + { + case ADS_MODE_0_N_FIRSTONLY: + { + this.m_appDataSplitEnabled = false; + SafeWriteRecord(ContentType.application_data, TlsUtilities.EmptyBytes, 0, 0); + break; + } + case ADS_MODE_0_N: + { + SafeWriteRecord(ContentType.application_data, TlsUtilities.EmptyBytes, 0, 0); + break; + } + case ADS_MODE_1_Nsub1: + default: + { + if (count > 1) + { + SafeWriteRecord(ContentType.application_data, buffer, offset, 1); + ++offset; + --count; + } + break; + } + } + } + else if (m_keyUpdateEnabled) + { + if (m_keyUpdatePendingSend) + { + Send13KeyUpdate(false); + } + else if (m_recordStream.NeedsKeyUpdate()) + { + Send13KeyUpdate(true); + } + } + + // Fragment data according to the current fragment limit. + int toWrite = System.Math.Min(count, m_recordStream.PlaintextLimit); + SafeWriteRecord(ContentType.application_data, buffer, offset, toWrite); + offset += toWrite; + count -= toWrite; + } + } +#endif + } + + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void WriteApplicationData(ReadOnlySpan buffer) + { + if (!m_appDataReady) + throw new InvalidOperationException( + "Cannot write application data until initial handshake completed."); + + //lock (m_recordWriteLock) + { + while (!buffer.IsEmpty) + { + if (m_closed) + throw new IOException("Cannot write application data on closed/failed TLS connection"); + + /* + * RFC 5246 6.2.1. Zero-length fragments of Application data MAY be sent as they are + * potentially useful as a traffic analysis countermeasure. + * + * NOTE: Actually, implementations appear to have settled on 1/n-1 record splitting. + */ + if (m_appDataSplitEnabled) + { + /* + * Protect against known IV attack! + * + * DO NOT REMOVE THIS CODE, EXCEPT YOU KNOW EXACTLY WHAT YOU ARE DOING HERE. + */ + switch (m_appDataSplitMode) + { + case ADS_MODE_0_N_FIRSTONLY: + { + this.m_appDataSplitEnabled = false; + SafeWriteRecord(ContentType.application_data, TlsUtilities.EmptyBytes, 0, 0); + break; + } + case ADS_MODE_0_N: + { + SafeWriteRecord(ContentType.application_data, TlsUtilities.EmptyBytes, 0, 0); + break; + } + case ADS_MODE_1_Nsub1: + default: + { + if (buffer.Length > 1) + { + SafeWriteRecord(ContentType.application_data, buffer[..1]); + buffer = buffer[1..]; + } + break; + } + } + } + else if (m_keyUpdateEnabled) + { + if (m_keyUpdatePendingSend) + { + Send13KeyUpdate(false); + } + else if (m_recordStream.NeedsKeyUpdate()) + { + Send13KeyUpdate(true); + } + } + + // Fragment data according to the current fragment limit. + int toWrite = System.Math.Min(buffer.Length, m_recordStream.PlaintextLimit); + SafeWriteRecord(ContentType.application_data, buffer[..toWrite]); + buffer = buffer[toWrite..]; + } + } + } +#endif + + public virtual int AppDataSplitMode + { + get { return m_appDataSplitMode; } + set + { + if (value < ADS_MODE_1_Nsub1 || value > ADS_MODE_0_N_FIRSTONLY) + throw new InvalidOperationException("Illegal appDataSplitMode mode: " + value); + + this.m_appDataSplitMode = value; + } + } + + public virtual bool IsResumableHandshake + { + get { return m_resumableHandshake; } + set { this.m_resumableHandshake = value; } + } + + /// + internal void WriteHandshakeMessage(byte[] buf, int off, int len) + { + if (len < 4) + throw new TlsFatalAlert(AlertDescription.internal_error); + + short type = TlsUtilities.ReadUint8(buf, off); + switch (type) + { + /* + * These message types aren't included in the transcript. + */ + case HandshakeType.hello_request: + case HandshakeType.key_update: + break; + + /* + * Not included in the transcript for (D)TLS 1.3+ + */ + case HandshakeType.new_session_ticket: + { + ProtocolVersion negotiatedVersion = Context.ServerVersion; + if (null != negotiatedVersion && !TlsUtilities.IsTlsV13(negotiatedVersion)) + { + m_handshakeHash.Update(buf, off, len); + } + + break; + } + + /* + * These message types are deferred to the writer to explicitly update the transcript. + */ + case HandshakeType.client_hello: + break; + + /* + * For all others we automatically update the transcript. + */ + default: + { + m_handshakeHash.Update(buf, off, len); + break; + } + } + + int total = 0; + do + { + // Fragment data according to the current fragment limit. + int toWrite = System.Math.Min(len - total, m_recordStream.PlaintextLimit); + SafeWriteRecord(ContentType.handshake, buf, off + total, toWrite); + total += toWrite; + } + while (total < len); + } + + /// The secure bidirectional stream for this connection + /// Only allowed in blocking mode. + public virtual Stream Stream + { + get + { + if (!m_blocking) + throw new InvalidOperationException( + "Cannot use Stream in non-blocking mode! Use OfferInput()/OfferOutput() instead."); + + return this.m_tlsStream; + } + } + + /// Should be called in non-blocking mode when the input data reaches EOF. + /// + public virtual void CloseInput() + { + if (m_blocking) + throw new InvalidOperationException("Cannot use CloseInput() in blocking mode!"); + + if (m_closed) + return; + + if (m_inputBuffers.Available > 0) + throw new EndOfStreamException(); + + if (!m_appDataReady) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + if (!Peer.RequiresCloseNotify()) + { + HandleClose(false); + return; + } + + HandleFailure(); + + throw new TlsNoCloseNotifyException(); + } + + /// + public virtual RecordPreview PreviewInputRecord(byte[] recordHeader) + { + if (m_blocking) + throw new InvalidOperationException("Cannot use PreviewInputRecord() in blocking mode!"); + if (m_inputBuffers.Available != 0) + throw new InvalidOperationException("Can only use PreviewInputRecord() for record-aligned input."); + if (m_closed) + throw new IOException("Connection is closed, cannot accept any more input"); + + return SafePreviewRecordHeader(recordHeader); + } + + public virtual int PreviewOutputRecord() + { + if (m_blocking) + throw new InvalidOperationException("Cannot use PreviewOutputRecord() in blocking mode!"); + + ByteQueue buffer = m_outputBuffer.Buffer; + int available = buffer.Available; + if (available < 1) + return 0; + + if (available >= RecordFormat.FragmentOffset) + { + int length = buffer.ReadUint16(RecordFormat.LengthOffset); + int recordSize = RecordFormat.FragmentOffset + length; + + if (available >= recordSize) + return recordSize; + } + + throw new InvalidOperationException("Can only use PreviewOutputRecord() for record-aligned output."); + } + + /// + public virtual RecordPreview PreviewOutputRecord(int applicationDataSize) + { + if (!m_appDataReady) + throw new InvalidOperationException( + "Cannot use PreviewOutputRecord() until initial handshake completed."); + if (m_blocking) + throw new InvalidOperationException("Cannot use PreviewOutputRecord() in blocking mode!"); + if (m_outputBuffer.Buffer.Available != 0) + throw new InvalidOperationException("Can only use PreviewOutputRecord() for record-aligned output."); + if (m_closed) + throw new IOException("Connection is closed, cannot produce any more output"); + + if (applicationDataSize < 1) + return new RecordPreview(0, 0); + + if (m_appDataSplitEnabled) + { + switch (m_appDataSplitMode) + { + case ADS_MODE_0_N_FIRSTONLY: + case ADS_MODE_0_N: + { + RecordPreview a = m_recordStream.PreviewOutputRecord(0); + RecordPreview b = m_recordStream.PreviewOutputRecord(applicationDataSize); + return RecordPreview.CombineAppData(a, b); + } + case ADS_MODE_1_Nsub1: + default: + { + RecordPreview a = m_recordStream.PreviewOutputRecord(1); + if (applicationDataSize > 1) + { + RecordPreview b = m_recordStream.PreviewOutputRecord(applicationDataSize - 1); + a = RecordPreview.CombineAppData(a, b); + } + return a; + } + } + } + else + { + RecordPreview a = m_recordStream.PreviewOutputRecord(applicationDataSize); + if (m_keyUpdateEnabled && (m_keyUpdatePendingSend || m_recordStream.NeedsKeyUpdate())) + { + int keyUpdateLength = HandshakeMessageOutput.GetLength(1); + int recordSize = m_recordStream.PreviewOutputRecordSize(keyUpdateLength); + a = RecordPreview.ExtendRecordSize(a, recordSize); + } + return a; + } + } + + /// Equivalent to OfferInput(input, 0, input.Length). + /// The input buffer to offer. + /// + /// + public virtual void OfferInput(byte[] input) + { + OfferInput(input, 0, input.Length); + } + + /// Offer input from an arbitrary source. + /// Only allowed in non-blocking mode.

    + /// This method will decrypt and process all records that are fully available. If only part of a record is + /// available, the buffer will be retained until the remainder of the record is offered.

    + /// If any records containing application data were processed, the decrypted data can be obtained using + /// . If any records containing protocol data were processed, a + /// response may have been generated. You should always check to see if there is any available output after + /// calling this method by calling . + ///
    + /// The input buffer to offer. + /// The offset within the input buffer that input begins. + /// The number of bytes of input being offered. + /// If an error occurs while decrypting or processing a record. + public virtual void OfferInput(byte[] input, int inputOff, int inputLen) + { + if (m_blocking) + throw new InvalidOperationException("Cannot use OfferInput() in blocking mode! Use Stream instead."); + if (m_closed) + throw new IOException("Connection is closed, cannot accept any more input"); + + // Fast path if the input is arriving one record at a time + if (m_inputBuffers.Available == 0 && SafeReadFullRecord(input, inputOff, inputLen)) + { + if (m_closed) + { + if (!m_appDataReady) + { + // NOTE: Any close during the handshake should have raised an exception. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + return; + } + + m_inputBuffers.AddBytes(input, inputOff, inputLen); + + // loop while there are enough bytes to read the length of the next record + while (m_inputBuffers.Available >= RecordFormat.FragmentOffset) + { + byte[] recordHeader = new byte[RecordFormat.FragmentOffset]; + if (RecordFormat.FragmentOffset != m_inputBuffers.Peek(recordHeader)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + RecordPreview preview = SafePreviewRecordHeader(recordHeader); + if (m_inputBuffers.Available < preview.RecordSize) + { + // not enough bytes to read a whole record + break; + } + + // NOTE: This is actually reading from inputBuffers, so InterruptedIOException shouldn't be possible + SafeReadRecord(); + + if (m_closed) + { + if (!m_appDataReady) + { + // NOTE: Any close during the handshake should have raised an exception. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + break; + } + } + } + + public virtual int ApplicationDataLimit + { + get { return m_recordStream.PlaintextLimit; } + } + + /// Gets the amount of received application data. + /// A call to is guaranteed to be able to return at least + /// this much data.

    + /// Only allowed in non-blocking mode. + ///
    + /// The number of bytes of available application data. + public virtual int GetAvailableInputBytes() + { + if (m_blocking) + throw new InvalidOperationException("Cannot use GetAvailableInputBytes() in blocking mode!"); + + return ApplicationDataAvailable; + } + + /// Retrieves received application data. + /// + /// Use to check how much application data is currently available. This + /// method functions similarly to , except that it never blocks. If + /// no data is available, nothing will be copied and zero will be returned.

    + /// Only allowed in non-blocking mode. + ///
    + /// The buffer to hold the application data. + /// The start offset in the buffer at which the data is written. + /// The maximum number of bytes to read. + /// The total number of bytes copied to the buffer. May be less than the length specified if the + /// length was greater than the amount of available data. + public virtual int ReadInput(byte[] buf, int off, int len) + { + if (m_blocking) + throw new InvalidOperationException("Cannot use ReadInput() in blocking mode! Use Stream instead."); + + len = System.Math.Min(len, ApplicationDataAvailable); + if (len < 1) + return 0; + + m_applicationDataQueue.RemoveData(buf, off, len, 0); + return len; + } + + /// Gets the amount of encrypted data available to be sent. + /// + /// A call to is guaranteed to be able to return at least this much + /// data. Only allowed in non-blocking mode. + /// + /// The number of bytes of available encrypted data. + public virtual int GetAvailableOutputBytes() + { + if (m_blocking) + throw new InvalidOperationException("Cannot use GetAvailableOutputBytes() in blocking mode! Use Stream instead."); + + return m_outputBuffer.Buffer.Available; + } + + /// Retrieves encrypted data to be sent. + /// + /// Use to check how much encrypted data is currently available. This + /// method functions similarly to , except that it never blocks. If + /// no data is available, nothing will be copied and zero will be returned. Only allowed in non-blocking mode. + /// + /// The buffer to hold the encrypted data. + /// The start offset in the buffer at which the data is written. + /// The maximum number of bytes to read. + /// The total number of bytes copied to the buffer. May be less than the length specified if the + /// length was greater than the amount of available data. + public virtual int ReadOutput(byte[] buffer, int offset, int length) + { + if (m_blocking) + throw new InvalidOperationException("Cannot use ReadOutput() in blocking mode! Use 'Stream() instead."); + + int bytesToRead = System.Math.Min(GetAvailableOutputBytes(), length); + m_outputBuffer.Buffer.RemoveData(buffer, offset, bytesToRead, 0); + return bytesToRead; + } + + protected virtual bool EstablishSession(TlsSession sessionToResume) + { + this.m_tlsSession = null; + this.m_sessionParameters = null; + this.m_sessionMasterSecret = null; + + if (null == sessionToResume || !sessionToResume.IsResumable) + return false; + + SessionParameters sessionParameters = sessionToResume.ExportSessionParameters(); + if (null == sessionParameters) + return false; + + if (!sessionParameters.IsExtendedMasterSecret) + { + TlsPeer peer = Peer; + if (!peer.AllowLegacyResumption() || peer.RequiresExtendedMasterSecret()) + return false; + + /* + * NOTE: For session resumption without extended_master_secret, renegotiation MUST be disabled + * (see RFC 7627 5.4). + */ + } + + TlsSecret sessionMasterSecret = TlsUtilities.GetSessionMasterSecret(Context.Crypto, + sessionParameters.MasterSecret); + if (null == sessionMasterSecret) + return false; + + this.m_tlsSession = sessionToResume; + this.m_sessionParameters = sessionParameters; + this.m_sessionMasterSecret = sessionMasterSecret; + + return true; + } + + protected virtual void InvalidateSession() + { + if (m_sessionMasterSecret != null) + { + m_sessionMasterSecret.Destroy(); + this.m_sessionMasterSecret = null; + } + + if (m_sessionParameters != null) + { + m_sessionParameters.Clear(); + this.m_sessionParameters = null; + } + + if (m_tlsSession != null) + { + m_tlsSession.Invalidate(); + this.m_tlsSession = null; + } + } + + /// + protected virtual void ProcessFinishedMessage(MemoryStream buf) + { + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + bool isServerContext = context.IsServer; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span verify_data = stackalloc byte[securityParameters.VerifyDataLength]; + TlsUtilities.ReadFully(verify_data, buf); +#else + byte[] verify_data = TlsUtilities.ReadFully(securityParameters.VerifyDataLength, buf); +#endif + + AssertEmpty(buf); + + byte[] expected_verify_data = TlsUtilities.CalculateVerifyData(context, m_handshakeHash, !isServerContext); + + /* + * Compare both checksums. + */ + if (!Arrays.ConstantTimeAreEqual(expected_verify_data, verify_data)) + { + /* + * Wrong checksum in the finished message. + */ + throw new TlsFatalAlert(AlertDescription.decrypt_error); + } + + securityParameters.m_peerVerifyData = expected_verify_data; + + if (!securityParameters.IsResumedSession || securityParameters.IsExtendedMasterSecret) + { + if (null == securityParameters.LocalVerifyData) + { + securityParameters.m_tlsUnique = expected_verify_data; + } + } + } + + /// + protected virtual void Process13FinishedMessage(MemoryStream buf) + { + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + bool isServerContext = context.IsServer; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span verify_data = stackalloc byte[securityParameters.VerifyDataLength]; + TlsUtilities.ReadFully(verify_data, buf); +#else + byte[] verify_data = TlsUtilities.ReadFully(securityParameters.VerifyDataLength, buf); +#endif + + AssertEmpty(buf); + + byte[] expected_verify_data = TlsUtilities.CalculateVerifyData(context, m_handshakeHash, !isServerContext); + + /* + * Compare both checksums. + */ + if (!Arrays.ConstantTimeAreEqual(expected_verify_data, verify_data)) + { + /* + * Wrong checksum in the finished message. + */ + throw new TlsFatalAlert(AlertDescription.decrypt_error); + } + + securityParameters.m_peerVerifyData = expected_verify_data; + securityParameters.m_tlsUnique = null; + } + + /// + protected virtual void RaiseAlertFatal(short alertDescription, string message, Exception cause) + { + Peer.NotifyAlertRaised(AlertLevel.fatal, alertDescription, message, cause); + + byte[] alert = new byte[]{ (byte)AlertLevel.fatal, (byte)alertDescription }; + + try + { + m_recordStream.WriteRecord(ContentType.alert, alert, 0, 2); + } + catch (Exception) + { + // We are already processing an exception, so just ignore this + } + } + + /// + protected virtual void RaiseAlertWarning(short alertDescription, string message) + { + Peer.NotifyAlertRaised(AlertLevel.warning, alertDescription, message, null); + + byte[] alert = new byte[]{ (byte)AlertLevel.warning, (byte)alertDescription }; + + SafeWriteRecord(ContentType.alert, alert, 0, 2); + } + + + /// + protected virtual void Receive13KeyUpdate(MemoryStream buf) + { + // TODO[tls13] This is interesting enough to notify the TlsPeer for possible logging/vetting + + if (!(m_appDataReady && m_keyUpdateEnabled)) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + short requestUpdate = TlsUtilities.ReadUint8(buf); + + AssertEmpty(buf); + + if (!KeyUpdateRequest.IsValid(requestUpdate)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + bool updateRequested = (KeyUpdateRequest.update_requested == requestUpdate); + + TlsUtilities.Update13TrafficSecretPeer(Context); + m_recordStream.NotifyKeyUpdateReceived(); + + //this.m_keyUpdatePendingReceive &= updateRequested; + this.m_keyUpdatePendingSend |= updateRequested; + } + + /// + protected virtual void SendCertificateMessage(Certificate certificate, Stream endPointHash) + { + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + if (null != securityParameters.LocalCertificate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (null == certificate) + { + certificate = Certificate.EmptyChain; + } + + if (certificate.IsEmpty && !context.IsServer && securityParameters.NegotiatedVersion.IsSsl) + { + string message = "SSLv3 client didn't provide credentials"; + RaiseAlertWarning(AlertDescription.no_certificate, message); + } + else + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate); + certificate.Encode(context, message, endPointHash); + message.Send(this); + } + + securityParameters.m_localCertificate = certificate; + } + + /// + protected virtual void Send13CertificateMessage(Certificate certificate) + { + if (null == certificate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + if (null != securityParameters.LocalCertificate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate); + certificate.Encode(context, message, null); + message.Send(this); + + securityParameters.m_localCertificate = certificate; + } + + /// + protected virtual void Send13CertificateVerifyMessage(DigitallySigned certificateVerify) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate_verify); + certificateVerify.Encode(message); + message.Send(this); + } + + /// + protected virtual void SendChangeCipherSpec() + { + SendChangeCipherSpecMessage(); + m_recordStream.EnablePendingCipherWrite(); + } + + /// + protected virtual void SendChangeCipherSpecMessage() + { + byte[] message = new byte[]{ 1 }; + SafeWriteRecord(ContentType.change_cipher_spec, message, 0, message.Length); + } + + /// + protected virtual void SendFinishedMessage() + { + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + bool isServerContext = context.IsServer; + + byte[] verify_data = TlsUtilities.CalculateVerifyData(context, m_handshakeHash, isServerContext); + + securityParameters.m_localVerifyData = verify_data; + + if (!securityParameters.IsResumedSession || securityParameters.IsExtendedMasterSecret) + { + if (null == securityParameters.PeerVerifyData) + { + securityParameters.m_tlsUnique = verify_data; + } + } + + HandshakeMessageOutput.Send(this, HandshakeType.finished, verify_data); + } + + /// + protected virtual void Send13FinishedMessage() + { + TlsContext context = Context; + SecurityParameters securityParameters = context.SecurityParameters; + bool isServerContext = context.IsServer; + + byte[] verify_data = TlsUtilities.CalculateVerifyData(context, m_handshakeHash, isServerContext); + + securityParameters.m_localVerifyData = verify_data; + securityParameters.m_tlsUnique = null; + + HandshakeMessageOutput.Send(this, HandshakeType.finished, verify_data); + } + + /// + protected virtual void Send13KeyUpdate(bool updateRequested) + { + // TODO[tls13] This is interesting enough to notify the TlsPeer for possible logging/vetting + + if (!(m_appDataReady && m_keyUpdateEnabled)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + short requestUpdate = updateRequested + ? KeyUpdateRequest.update_requested + : KeyUpdateRequest.update_not_requested; + + HandshakeMessageOutput.Send(this, HandshakeType.key_update, TlsUtilities.EncodeUint8(requestUpdate)); + + TlsUtilities.Update13TrafficSecretLocal(Context); + m_recordStream.NotifyKeyUpdateSent(); + + //this.m_keyUpdatePendingReceive |= updateRequested; + this.m_keyUpdatePendingSend &= updateRequested; + } + + /// + protected virtual void SendSupplementalDataMessage(IList supplementalData) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.supplemental_data); + WriteSupplementalData(message, supplementalData); + message.Send(this); + } + + public virtual void Close() + { + HandleClose(true); + } + + public virtual void Flush() + { + } + + internal bool IsApplicationDataReady + { + get { return m_appDataReady; } + } + + public virtual bool IsClosed + { + get { return m_closed; } + } + + public virtual bool IsConnected + { + get + { + if (m_closed) + return false; + + AbstractTlsContext context = ContextAdmin; + + return null != context && context.IsConnected; + } + } + + public virtual bool IsHandshaking + { + get + { + if (m_closed) + return false; + + AbstractTlsContext context = ContextAdmin; + + return null != context && context.IsHandshaking; + } + } + + /// + protected virtual short ProcessMaxFragmentLengthExtension(IDictionary clientExtensions, + IDictionary serverExtensions, short alertDescription) + { + short maxFragmentLength = TlsExtensionsUtilities.GetMaxFragmentLengthExtension(serverExtensions); + if (maxFragmentLength >= 0) + { + if (!MaxFragmentLength.IsValid(maxFragmentLength) || + (clientExtensions != null && + maxFragmentLength != TlsExtensionsUtilities.GetMaxFragmentLengthExtension(clientExtensions))) + { + throw new TlsFatalAlert(alertDescription); + } + } + return maxFragmentLength; + } + + /// + protected virtual void RefuseRenegotiation() + { + /* + * RFC 5746 4.5 SSLv3 clients [..] SHOULD use a fatal handshake_failure alert. + */ + if (TlsUtilities.IsSsl(Context)) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + RaiseAlertWarning(AlertDescription.no_renegotiation, "Renegotiation not supported"); + } + + /// Make sure the 'buf' is now empty. Fail otherwise. + /// The to check. + /// + internal static void AssertEmpty(MemoryStream buf) + { + if (buf.Position < buf.Length) + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + internal static byte[] CreateRandomBlock(bool useGmtUnixTime, TlsContext context) + { + byte[] result = context.NonceGenerator.GenerateNonce(32); + + if (useGmtUnixTime) + { + TlsUtilities.WriteGmtUnixTime(result, 0); + } + + return result; + } + + /// + internal static byte[] CreateRenegotiationInfo(byte[] renegotiated_connection) + { + return TlsUtilities.EncodeOpaque8(renegotiated_connection); + } + + /// + internal static void EstablishMasterSecret(TlsContext context, TlsKeyExchange keyExchange) + { + TlsSecret preMasterSecret = keyExchange.GeneratePreMasterSecret(); + if (preMasterSecret == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + try + { + context.SecurityParameters.m_masterSecret = TlsUtilities.CalculateMasterSecret(context, + preMasterSecret); + + if (context.SecurityParameters.NegotiatedVersion != ProtocolVersion.TLSv13) + KeyLogFileWriter.WriteLabel(Labels.CLIENT_RANDOM, context.SecurityParameters); + } + finally + { + /* + * RFC 2246 8.1. The pre_master_secret should be deleted from memory once the + * master_secret has been computed. + */ + preMasterSecret.Destroy(); + } + } + + /// + internal static IDictionary ReadExtensions(MemoryStream input) + { + if (input.Position >= input.Length) + return null; + + byte[] extBytes = TlsUtilities.ReadOpaque16(input); + + AssertEmpty(input); + + return ReadExtensionsData(extBytes); + } + + /// + internal static IDictionary ReadExtensionsData(byte[] extBytes) + { + // Int32 -> byte[] + var extensions = new Dictionary(); + + if (extBytes.Length > 0) + { + MemoryStream buf = new MemoryStream(extBytes, false); + + do + { + int extension_type = TlsUtilities.ReadUint16(buf); + byte[] extension_data = TlsUtilities.ReadOpaque16(buf); + + /* + * RFC 3546 2.3 There MUST NOT be more than one extension of the same type. + */ + if (extensions.ContainsKey(extension_type)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter, + "Repeated extension: " + ExtensionType.GetText(extension_type)); + + extensions.Add(extension_type, extension_data); + } + while (buf.Position < buf.Length); + } + + return extensions; + } + + /// + internal static IDictionary ReadExtensionsData13(int handshakeType, byte[] extBytes) + { + // Int32 -> byte[] + var extensions = new Dictionary(); + + if (extBytes.Length > 0) + { + MemoryStream buf = new MemoryStream(extBytes, false); + + do + { + int extension_type = TlsUtilities.ReadUint16(buf); + + if (!TlsUtilities.IsPermittedExtensionType13(handshakeType, extension_type)) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter, + "Invalid extension: " + ExtensionType.GetText(extension_type)); + } + + byte[] extension_data = TlsUtilities.ReadOpaque16(buf); + + /* + * RFC 3546 2.3 There MUST NOT be more than one extension of the same type. + */ + if (extensions.ContainsKey(extension_type)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter, + "Repeated extension: " + ExtensionType.GetText(extension_type)); + + extensions.Add(extension_type, extension_data); + } + while (buf.Position < buf.Length); + } + + return extensions; + } + + /// + internal static IDictionary ReadExtensionsDataClientHello(byte[] extBytes) + { + /* + * TODO[tls13] We are currently allowing any extensions to appear in ClientHello. It is + * somewhat complicated to restrict what can appear based on the specific set of versions + * the client is offering, and anyway could be fragile since clients may take a + * "kitchen sink" approach to adding extensions independently of the offered versions. + */ + + // Int32 -> byte[] + var extensions = new Dictionary(); + + if (extBytes.Length > 0) + { + MemoryStream buf = new MemoryStream(extBytes, false); + + int extension_type; + bool pre_shared_key_found = false; + + do + { + extension_type = TlsUtilities.ReadUint16(buf); + byte[] extension_data = TlsUtilities.ReadOpaque16(buf); + + /* + * RFC 3546 2.3 There MUST NOT be more than one extension of the same type. + */ + if (extensions.ContainsKey(extension_type)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter, + "Repeated extension: " + ExtensionType.GetText(extension_type)); + + extensions.Add(extension_type, extension_data); + + pre_shared_key_found |= (ExtensionType.pre_shared_key == extension_type); + } + while (buf.Position < buf.Length); + + if (pre_shared_key_found && (ExtensionType.pre_shared_key != extension_type)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter, + "'pre_shared_key' MUST be last in ClientHello"); + } + + return extensions; + } + + /// + internal static IList ReadSupplementalDataMessage(MemoryStream input) + { + byte[] supp_data = TlsUtilities.ReadOpaque24(input, 1); + + AssertEmpty(input); + + MemoryStream buf = new MemoryStream(supp_data, false); + + var supplementalData = new List(); + + while (buf.Position < buf.Length) + { + int supp_data_type = TlsUtilities.ReadUint16(buf); + byte[] data = TlsUtilities.ReadOpaque16(buf); + + supplementalData.Add(new SupplementalDataEntry(supp_data_type, data)); + } + + return supplementalData; + } + + /// + internal static void WriteExtensions(Stream output, IDictionary extensions) + { + WriteExtensions(output, extensions, 0); + } + + /// + internal static void WriteExtensions(Stream output, IDictionary extensions, int bindersSize) + { + if (null == extensions || extensions.Count < 1) + return; + + byte[] extBytes = WriteExtensionsData(extensions, bindersSize); + + int lengthWithBinders = extBytes.Length + bindersSize; + TlsUtilities.CheckUint16(lengthWithBinders); + TlsUtilities.WriteUint16(lengthWithBinders, output); + output.Write(extBytes, 0, extBytes.Length); + } + + /// + internal static byte[] WriteExtensionsData(IDictionary extensions) + { + return WriteExtensionsData(extensions, 0); + } + + /// + internal static byte[] WriteExtensionsData(IDictionary extensions, int bindersSize) + { + MemoryStream buf = new MemoryStream(); + WriteExtensionsData(extensions, buf, bindersSize); + return buf.ToArray(); + } + + /// + internal static void WriteExtensionsData(IDictionary extensions, MemoryStream buf) + { + WriteExtensionsData(extensions, buf, 0); + } + + /// + internal static void WriteExtensionsData(IDictionary extensions, MemoryStream buf, int bindersSize) + { + /* + * NOTE: There are reports of servers that don't accept a zero-length extension as the last + * one, so we write out any zero-length ones first as a best-effort workaround. + */ + WriteSelectedExtensions(buf, extensions, true); + WriteSelectedExtensions(buf, extensions, false); + WritePreSharedKeyExtension(buf, extensions, bindersSize); + } + + /// + internal static void WritePreSharedKeyExtension(MemoryStream buf, IDictionary extensions, + int bindersSize) + { + if (extensions.TryGetValue(ExtensionType.pre_shared_key, out var extension_data)) + { + TlsUtilities.CheckUint16(ExtensionType.pre_shared_key); + TlsUtilities.WriteUint16(ExtensionType.pre_shared_key, buf); + + int lengthWithBinders = extension_data.Length + bindersSize; + TlsUtilities.CheckUint16(lengthWithBinders); + TlsUtilities.WriteUint16(lengthWithBinders, buf); + buf.Write(extension_data, 0, extension_data.Length); + } + } + + /// + internal static void WriteSelectedExtensions(Stream output, IDictionary extensions, + bool selectEmpty) + { + foreach (var extension in extensions) + { + int extension_type = extension.Key; + + // NOTE: Must be last; handled by 'WritePreSharedKeyExtension' + if (ExtensionType.pre_shared_key == extension_type) + continue; + + byte[] extension_data = extension.Value; + + if (selectEmpty == (extension_data.Length == 0)) + { + TlsUtilities.CheckUint16(extension_type); + TlsUtilities.WriteUint16(extension_type, output); + TlsUtilities.WriteOpaque16(extension_data, output); + } + } + } + + /// + internal static void WriteSupplementalData(Stream output, IList supplementalData) + { + MemoryStream buf = new MemoryStream(); + + foreach (SupplementalDataEntry entry in supplementalData) + { + int supp_data_type = entry.DataType; + TlsUtilities.CheckUint16(supp_data_type); + TlsUtilities.WriteUint16(supp_data_type, buf); + TlsUtilities.WriteOpaque16(entry.Data, buf); + } + + byte[] supp_data = buf.ToArray(); + + TlsUtilities.WriteOpaque24(supp_data, output); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs.meta new file mode 100644 index 00000000..1b25f5b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f16fbd373fada64fa70adf558de4f83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs new file mode 100644 index 00000000..02bcc6dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface TlsPsk + { + byte[] Identity { get; } + + TlsSecret Key { get; } + + int PrfAlgorithm { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs.meta new file mode 100644 index 00000000..ac9e26c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6cc6e6df5041c8240bf8bd05c337fcac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPsk.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs new file mode 100644 index 00000000..4a43b450 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs @@ -0,0 +1,13 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public interface TlsPskExternal + : TlsPsk + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs.meta new file mode 100644 index 00000000..062084eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a9843b6b898fc9943a2eda4af1c1c533 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskExternal.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs new file mode 100644 index 00000000..3bf1f605 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Processor interface for a PSK identity. + public interface TlsPskIdentity + { + void SkipIdentityHint(); + + void NotifyIdentityHint(byte[] psk_identity_hint); + + byte[] GetPskIdentity(); + + byte[] GetPsk(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs.meta new file mode 100644 index 00000000..5cbbc649 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 549c6db0d59a55d45bd40b4717bfe027 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs new file mode 100644 index 00000000..4ece24c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for an object that can process a PSK identity. + public interface TlsPskIdentityManager + { + byte[] GetHint(); + + byte[] GetPsk(byte[] identity); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs.meta new file mode 100644 index 00000000..eaf5fd5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 12366a8f5ac815e40ae17e357420ba8d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskIdentityManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs new file mode 100644 index 00000000..a41781ab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs @@ -0,0 +1,309 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS PSK key exchange (RFC 4279). + public class TlsPskKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.DHE_PSK: + case KeyExchangeAlgorithm.ECDHE_PSK: + case KeyExchangeAlgorithm.PSK: + case KeyExchangeAlgorithm.RSA_PSK: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsPskIdentity m_pskIdentity; + protected TlsPskIdentityManager m_pskIdentityManager; + protected TlsDHGroupVerifier m_dhGroupVerifier; + + protected byte[] m_psk_identity_hint = null; + protected byte[] m_psk = null; + + protected TlsDHConfig m_dhConfig; + protected TlsECConfig m_ecConfig; + protected TlsAgreement m_agreement; + + protected TlsCredentialedDecryptor m_serverCredentials = null; + protected TlsEncryptor m_serverEncryptor; + protected TlsSecret m_preMasterSecret; + + public TlsPskKeyExchange(int keyExchange, TlsPskIdentity pskIdentity, TlsDHGroupVerifier dhGroupVerifier) + : this(keyExchange, pskIdentity, null, dhGroupVerifier, null, null) + { + } + + public TlsPskKeyExchange(int keyExchange, TlsPskIdentityManager pskIdentityManager, + TlsDHConfig dhConfig, TlsECConfig ecConfig) + : this(keyExchange, null, pskIdentityManager, null, dhConfig, ecConfig) + { + } + + private TlsPskKeyExchange(int keyExchange, TlsPskIdentity pskIdentity, TlsPskIdentityManager pskIdentityManager, + TlsDHGroupVerifier dhGroupVerifier, TlsDHConfig dhConfig, TlsECConfig ecConfig) + : base(CheckKeyExchange(keyExchange)) + { + this.m_pskIdentity = pskIdentity; + this.m_pskIdentityManager = pskIdentityManager; + this.m_dhGroupVerifier = dhGroupVerifier; + this.m_dhConfig = dhConfig; + this.m_ecConfig = ecConfig; + } + + public override void SkipServerCredentials() + { + if (m_keyExchange == KeyExchangeAlgorithm.RSA_PSK) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + if (m_keyExchange != KeyExchangeAlgorithm.RSA_PSK) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_serverCredentials = TlsUtilities.RequireDecryptorCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + if (m_keyExchange != KeyExchangeAlgorithm.RSA_PSK) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + this.m_serverEncryptor = serverCertificate.GetCertificateAt(0).CreateEncryptor( + TlsCertificateRole.RsaEncryption); + } + + public override byte[] GenerateServerKeyExchange() + { + this.m_psk_identity_hint = m_pskIdentityManager.GetHint(); + + if (this.m_psk_identity_hint == null && !RequiresServerKeyExchange) + return null; + + MemoryStream buf = new MemoryStream(); + + if (this.m_psk_identity_hint == null) + { + TlsUtilities.WriteOpaque16(TlsUtilities.EmptyBytes, buf); + } + else + { + TlsUtilities.WriteOpaque16(this.m_psk_identity_hint, buf); + } + + if (this.m_keyExchange == KeyExchangeAlgorithm.DHE_PSK) + { + if (this.m_dhConfig == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsDHUtilities.WriteDHConfig(m_dhConfig, buf); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + GenerateEphemeralDH(buf); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.ECDHE_PSK) + { + if (this.m_ecConfig == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsEccUtilities.WriteECConfig(m_ecConfig, buf); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + GenerateEphemeralECDH(buf); + } + + return buf.ToArray(); + } + + public override bool RequiresServerKeyExchange + { + get + { + switch (m_keyExchange) + { + case KeyExchangeAlgorithm.DHE_PSK: + case KeyExchangeAlgorithm.ECDHE_PSK: + return true; + default: + return false; + } + } + } + + public override void ProcessServerKeyExchange(Stream input) + { + this.m_psk_identity_hint = TlsUtilities.ReadOpaque16(input); + + if (this.m_keyExchange == KeyExchangeAlgorithm.DHE_PSK) + { + this.m_dhConfig = TlsDHUtilities.ReceiveDHConfig(m_context, m_dhGroupVerifier, input); + + byte[] y = TlsUtilities.ReadOpaque16(input, 1); + + this.m_agreement = m_context.Crypto.CreateDHDomain(m_dhConfig).CreateDH(); + + ProcessEphemeralDH(y); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.ECDHE_PSK) + { + this.m_ecConfig = TlsEccUtilities.ReceiveECDHConfig(m_context, input); + + byte[] point = TlsUtilities.ReadOpaque8(input, 1); + + this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH(); + + ProcessEphemeralECDH(point); + } + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void GenerateClientKeyExchange(Stream output) + { + if (m_psk_identity_hint == null) + { + m_pskIdentity.SkipIdentityHint(); + } + else + { + m_pskIdentity.NotifyIdentityHint(m_psk_identity_hint); + } + + byte[] psk_identity = m_pskIdentity.GetPskIdentity(); + if (psk_identity == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_psk = m_pskIdentity.GetPsk(); + if (m_psk == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsUtilities.WriteOpaque16(psk_identity, output); + + m_context.SecurityParameters.m_pskIdentity = Arrays.Clone(psk_identity); + + if (this.m_keyExchange == KeyExchangeAlgorithm.DHE_PSK) + { + GenerateEphemeralDH(output); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.ECDHE_PSK) + { + GenerateEphemeralECDH(output); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.RSA_PSK) + { + this.m_preMasterSecret = TlsUtilities.GenerateEncryptedPreMasterSecret(m_context, m_serverEncryptor, + output); + } + } + + public override void ProcessClientKeyExchange(Stream input) + { + byte[] psk_identity = TlsUtilities.ReadOpaque16(input); + + this.m_psk = m_pskIdentityManager.GetPsk(psk_identity); + if (m_psk == null) + throw new TlsFatalAlert(AlertDescription.unknown_psk_identity); + + m_context.SecurityParameters.m_pskIdentity = psk_identity; + + if (this.m_keyExchange == KeyExchangeAlgorithm.DHE_PSK) + { + byte[] y = TlsUtilities.ReadOpaque16(input, 1); + + ProcessEphemeralDH(y); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.ECDHE_PSK) + { + byte[] point = TlsUtilities.ReadOpaque8(input, 1); + + ProcessEphemeralECDH(point); + } + else if (this.m_keyExchange == KeyExchangeAlgorithm.RSA_PSK) + { + byte[] encryptedPreMasterSecret = TlsUtilities.ReadEncryptedPms(m_context, input); + + this.m_preMasterSecret = m_serverCredentials.Decrypt(new TlsCryptoParameters(m_context), + encryptedPreMasterSecret); + } + } + + public override TlsSecret GeneratePreMasterSecret() + { + byte[] other_secret = GenerateOtherSecret(m_psk.Length); + + MemoryStream buf = new MemoryStream(4 + other_secret.Length + m_psk.Length); + TlsUtilities.WriteOpaque16(other_secret, buf); + TlsUtilities.WriteOpaque16(m_psk, buf); + + Array.Clear(m_psk, 0, m_psk.Length); + this.m_psk = null; + + return m_context.Crypto.CreateSecret(buf.ToArray()); + } + + protected virtual void GenerateEphemeralDH(Stream output) + { + byte[] y = m_agreement.GenerateEphemeral(); + TlsUtilities.WriteOpaque16(y, output); + } + + protected virtual void GenerateEphemeralECDH(Stream output) + { + byte[] point = m_agreement.GenerateEphemeral(); + TlsUtilities.WriteOpaque8(point, output); + } + + protected virtual byte[] GenerateOtherSecret(int pskLength) + { + if (this.m_keyExchange == KeyExchangeAlgorithm.PSK) + return new byte[pskLength]; + + if (this.m_keyExchange == KeyExchangeAlgorithm.DHE_PSK || + this.m_keyExchange == KeyExchangeAlgorithm.ECDHE_PSK) + { + if (m_agreement != null) + return m_agreement.CalculateSecret().Extract(); + } + + if (this.m_keyExchange == KeyExchangeAlgorithm.RSA_PSK) + { + if (m_preMasterSecret != null) + return this.m_preMasterSecret.Extract(); + } + + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + protected virtual void ProcessEphemeralDH(byte[] y) + { + this.m_agreement.ReceivePeerValue(y); + } + + protected virtual void ProcessEphemeralECDH(byte[] point) + { + TlsEccUtilities.CheckPointEncoding(m_ecConfig.NamedGroup, point); + + this.m_agreement.ReceivePeerValue(point); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs.meta new file mode 100644 index 00000000..afc5c8ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ccfcbfa8b266eb543a21fa10915d9a89 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsPskKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs new file mode 100644 index 00000000..45d147ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs @@ -0,0 +1,84 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS RSA key exchange. + public class TlsRsaKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsCredentialedDecryptor m_serverCredentials = null; + protected TlsEncryptor m_serverEncryptor; + protected TlsSecret m_preMasterSecret; + + public TlsRsaKeyExchange(int keyExchange) + : base(CheckKeyExchange(keyExchange)) + { + } + + public override void SkipServerCredentials() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + this.m_serverCredentials = TlsUtilities.RequireDecryptorCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + this.m_serverEncryptor = serverCertificate.GetCertificateAt(0).CreateEncryptor( + TlsCertificateRole.RsaEncryption); + } + + public override short[] GetClientCertificateTypes() + { + return new short[]{ ClientCertificateType.rsa_sign, ClientCertificateType.dss_sign, + ClientCertificateType.ecdsa_sign }; + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + TlsUtilities.RequireSignerCredentials(clientCredentials); + } + + public override void GenerateClientKeyExchange(Stream output) + { + this.m_preMasterSecret = TlsUtilities.GenerateEncryptedPreMasterSecret(m_context, m_serverEncryptor, + output); + } + + public override void ProcessClientKeyExchange(Stream input) + { + byte[] encryptedPreMasterSecret = TlsUtilities.ReadEncryptedPms(m_context, input); + + this.m_preMasterSecret = m_serverCredentials.Decrypt(new TlsCryptoParameters(m_context), + encryptedPreMasterSecret); + } + + public override TlsSecret GeneratePreMasterSecret() + { + TlsSecret tmp = this.m_preMasterSecret; + this.m_preMasterSecret = null; + return tmp; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs.meta new file mode 100644 index 00000000..094d89e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 77989cc4485a79240ab84ac7d664ae22 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsRsaKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs new file mode 100644 index 00000000..0df9c804 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs @@ -0,0 +1,134 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Interface describing a TLS server endpoint. + public interface TlsServer + : TlsPeer + { + void Init(TlsServerContext context); + + /// Return the specified session, if available. + /// + /// Note that the peer's certificate chain for the session (if any) may need to be periodically revalidated. + /// + /// the ID of the session to resume. + /// A with the specified session ID, or null. + /// + TlsSession GetSessionToResume(byte[] sessionID); + + byte[] GetNewSessionID(); + + /// Return the external PSK to select from the ClientHello. + /// + /// WARNING: EXPERIMENTAL FEATURE, UNSTABLE API + /// Note that this will only be called when TLS 1.3 or higher is amongst the offered protocol versions, and one + /// or more PSKs are actually offered. + /// + /// an of instances. + /// The corresponding to the selected identity, or null to not select + /// any. + TlsPskExternal GetExternalPsk(IList identities); + + void NotifySession(TlsSession session); + + /// + void NotifyClientVersion(ProtocolVersion clientVersion); + + /// + void NotifyFallback(bool isFallback); + + /// + void NotifyOfferedCipherSuites(int[] offeredCipherSuites); + + /// (Int32 -> byte[]) + /// + void ProcessClientExtensions(IDictionary clientExtensions); + + /// + ProtocolVersion GetServerVersion(); + + /// + int[] GetSupportedGroups(); + + /// + int GetSelectedCipherSuite(); + + /// (Int32 -> byte[]) + /// + IDictionary GetServerExtensions(); + + /// (Int32 -> byte[]) + /// + void GetServerExtensionsForConnection(IDictionary serverExtensions); + + /// (SupplementalDataEntry) + /// + IList GetServerSupplementalData(); + + /// Return server credentials to use. + /// + /// The returned value may be null, or else it MUST implement exactly one of + /// , , or + /// , depending on the key exchange that was negotiated. + /// + /// a object or null for anonymous key exchanges. + /// + TlsCredentials GetCredentials(); + + /// + /// This method will be called (only) if the server included an extension of type "status_request" with empty + /// "extension_data" in the extended server hello. See RFC 3546 3.6. Certificate Status Request. If a + /// non-null is returned, it is sent to the client as a handshake message of + /// type "certificate_status". + /// + /// A to be sent to the client (or null for none). + /// + CertificateStatus GetCertificateStatus(); + + /// + CertificateRequest GetCertificateRequest(); + + /// + TlsPskIdentityManager GetPskIdentityManager(); + + /// + TlsSrpLoginParameters GetSrpLoginParameters(); + + /// + TlsDHConfig GetDHConfig(); + + /// + TlsECConfig GetECDHConfig(); + + /// (SupplementalDataEntry) + /// + void ProcessClientSupplementalData(IList clientSupplementalData); + + /// Called by the protocol handler to report the client certificate, only if + /// returned non-null. + /// + /// Note: this method is responsible for certificate verification and validation. + /// + /// the effective client certificate (may be an empty chain). + /// + void NotifyClientCertificate(Certificate clientCertificate); + + /// RFC 5077 3.3. NewSessionTicket Handshake Message. + /// + /// This method will be called (only) if a NewSessionTicket extension was sent by the server. See RFC 5077 + /// 4. Recommended Ticket Construction for recommended format and protection. + /// + /// The ticket. + /// + NewSessionTicket GetNewSessionTicket(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs.meta new file mode 100644 index 00000000..6c6df093 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4397e0e45c29e0a4dbe863231b41d288 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs new file mode 100644 index 00000000..8c60a4d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Server certificate carrier interface. + public interface TlsServerCertificate + { + Certificate Certificate { get; } + + CertificateStatus CertificateStatus { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs.meta new file mode 100644 index 00000000..063c7584 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4ae2e4511baaaa64ea3f3d0fe0a7cbe1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs new file mode 100644 index 00000000..d73ce4bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal sealed class TlsServerCertificateImpl + : TlsServerCertificate + { + private readonly Certificate m_certificate; + private readonly CertificateStatus m_certificateStatus; + + internal TlsServerCertificateImpl(Certificate certificate, CertificateStatus certificateStatus) + { + this.m_certificate = certificate; + this.m_certificateStatus = certificateStatus; + } + + public Certificate Certificate + { + get { return m_certificate; } + } + + public CertificateStatus CertificateStatus + { + get { return m_certificateStatus; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs.meta new file mode 100644 index 00000000..9935e232 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1442292fc941483448d2c5772513756f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerCertificateImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs new file mode 100644 index 00000000..eec1c6c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Marker interface to distinguish a TLS server context. + public interface TlsServerContext + : TlsContext + { + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs.meta new file mode 100644 index 00000000..4572b8b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 27998a7bbf11dca47bcd70d89db31122 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContext.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs new file mode 100644 index 00000000..0f842434 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class TlsServerContextImpl + : AbstractTlsContext, TlsServerContext + { + internal TlsServerContextImpl(TlsCrypto crypto) + : base(crypto, ConnectionEnd.server) + { + } + + public override bool IsServer + { + get { return true; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs.meta new file mode 100644 index 00000000..bac4564b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 423c2135039a4b546b3f171f6f49cbee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerContextImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs new file mode 100644 index 00000000..93ab052e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs @@ -0,0 +1,1560 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class TlsServerProtocol + : TlsProtocol + { + protected TlsServer m_tlsServer = null; + internal TlsServerContextImpl m_tlsServerContext = null; + + protected int[] m_offeredCipherSuites = null; + protected TlsKeyExchange m_keyExchange = null; + protected CertificateRequest m_certificateRequest = null; + + /// Constructor for non-blocking mode. + /// + /// When data is received, use to provide the received ciphertext, + /// then use to read the corresponding cleartext.

    + /// Similarly, when data needs to be sent, use + /// to provide the cleartext, then use to get the + /// corresponding ciphertext. + ///
    + public TlsServerProtocol() + : base() + { + } + + /// Constructor for blocking mode. + /// The of data to/from the server. + public TlsServerProtocol(Stream stream) + : base(stream) + { + } + + /// Constructor for blocking mode. + /// The of data from the server. + /// The of data to the server. + public TlsServerProtocol(Stream input, Stream output) + : base(input, output) + { + } + + /// Receives a TLS handshake in the role of server. + /// + /// In blocking mode, this will not return until the handshake is complete. In non-blocking mode, use + /// to receive a callback when the handshake is complete. + /// + /// The to use for the handshake. + /// If in blocking mode and handshake was not successful. + public void Accept(TlsServer tlsServer) + { + if (tlsServer == null) + throw new ArgumentNullException("tlsServer"); + if (m_tlsServer != null) + throw new InvalidOperationException("'Accept' can only be called once"); + + this.m_tlsServer = tlsServer; + this.m_tlsServerContext = new TlsServerContextImpl(tlsServer.Crypto); + + tlsServer.Init(m_tlsServerContext); + tlsServer.NotifyCloseHandle(this); + + BeginHandshake(false); + + if (m_blocking) + { + BlockForHandshake(); + } + } + + protected override void CleanupHandshake() + { + base.CleanupHandshake(); + + this.m_offeredCipherSuites = null; + this.m_keyExchange = null; + this.m_certificateRequest = null; + } + + protected virtual bool ExpectCertificateVerifyMessage() + { + if (null == m_certificateRequest) + return false; + + Certificate clientCertificate = m_tlsServerContext.SecurityParameters.PeerCertificate; + + return null != clientCertificate && !clientCertificate.IsEmpty + && (null == m_keyExchange || m_keyExchange.RequiresCertificateVerify); + } + + /// + protected virtual ServerHello Generate13HelloRetryRequest(ClientHello clientHello) + { + // TODO[tls13] In future there might be other reasons for a HelloRetryRequest. + if (m_retryGroup < 0) + throw new TlsFatalAlert(AlertDescription.internal_error); + + SecurityParameters securityParameters = m_tlsServerContext.SecurityParameters; + ProtocolVersion serverVersion = securityParameters.NegotiatedVersion; + + var serverHelloExtensions = new Dictionary(); + TlsExtensionsUtilities.AddSupportedVersionsExtensionServer(serverHelloExtensions, serverVersion); + if (m_retryGroup >= 0) + { + TlsExtensionsUtilities.AddKeyShareHelloRetryRequest(serverHelloExtensions, m_retryGroup); + } + if (null != m_retryCookie) + { + TlsExtensionsUtilities.AddCookieExtension(serverHelloExtensions, m_retryCookie); + } + + TlsUtilities.CheckExtensionData13(serverHelloExtensions, HandshakeType.hello_retry_request, + AlertDescription.internal_error); + + return new ServerHello(clientHello.SessionID, securityParameters.CipherSuite, serverHelloExtensions); + } + + /// + protected virtual ServerHello Generate13ServerHello(ClientHello clientHello, + HandshakeMessageInput clientHelloMessage, bool afterHelloRetryRequest) + { + SecurityParameters securityParameters = m_tlsServerContext.SecurityParameters; + + + byte[] legacy_session_id = clientHello.SessionID; + + var clientHelloExtensions = clientHello.Extensions; + if (null == clientHelloExtensions) + throw new TlsFatalAlert(AlertDescription.missing_extension); + + + ProtocolVersion serverVersion = securityParameters.NegotiatedVersion; + TlsCrypto crypto = m_tlsServerContext.Crypto; + + // NOTE: Will only select for psk_dhe_ke + OfferedPsks.SelectedConfig selectedPsk = TlsUtilities.SelectPreSharedKey(m_tlsServerContext, m_tlsServer, + clientHelloExtensions, clientHelloMessage, m_handshakeHash, afterHelloRetryRequest); + + var clientShares = TlsExtensionsUtilities.GetKeyShareClientHello(clientHelloExtensions); + KeyShareEntry clientShare = null; + + if (afterHelloRetryRequest) + { + if (m_retryGroup < 0) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (null == selectedPsk) + { + /* + * RFC 8446 4.2.3. If a server is authenticating via a certificate and the client has + * not sent a "signature_algorithms" extension, then the server MUST abort the handshake + * with a "missing_extension" alert. + */ + if (null == securityParameters.ClientSigAlgs) + throw new TlsFatalAlert(AlertDescription.missing_extension); + } + else + { + // TODO[tls13] Maybe filter the offered PSKs by PRF algorithm before server selection instead + if (selectedPsk.m_psk.PrfAlgorithm != securityParameters.PrfAlgorithm) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + /* + * TODO[tls13] Confirm fields in the ClientHello haven't changed + * + * RFC 8446 4.1.2 [..] when the server has responded to its ClientHello with a + * HelloRetryRequest [..] the client MUST send the same ClientHello without + * modification, except as follows: [key_share, early_data, cookie, pre_shared_key, + * padding]. + */ + + byte[] cookie = TlsExtensionsUtilities.GetCookieExtension(clientHelloExtensions); + if (!Arrays.AreEqual(m_retryCookie, cookie)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + this.m_retryCookie = null; + + clientShare = TlsUtilities.SelectKeyShare(clientShares, m_retryGroup); + if (null == clientShare) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + else + { + { + securityParameters.m_serverRandom = CreateRandomBlock(false, m_tlsServerContext); + + if (!serverVersion.Equals(ProtocolVersion.GetLatestTls(m_tlsServer.GetProtocolVersions()))) + { + TlsUtilities.WriteDowngradeMarker(serverVersion, securityParameters.ServerRandom); + } + } + + this.m_clientExtensions = clientHelloExtensions; + + securityParameters.m_secureRenegotiation = false; + + // NOTE: Validates the padding extension data, if present + TlsExtensionsUtilities.GetPaddingExtension(clientHelloExtensions); + + securityParameters.m_clientServerNames = TlsExtensionsUtilities + .GetServerNameExtensionClient(clientHelloExtensions); + + TlsUtilities.EstablishClientSigAlgs(securityParameters, clientHelloExtensions); + + /* + * RFC 8446 4.2.3. If a server is authenticating via a certificate and the client has + * not sent a "signature_algorithms" extension, then the server MUST abort the handshake + * with a "missing_extension" alert. + */ + if (null == selectedPsk && null == securityParameters.ClientSigAlgs) + throw new TlsFatalAlert(AlertDescription.missing_extension); + + m_tlsServer.ProcessClientExtensions(clientHelloExtensions); + + /* + * NOTE: Currently no server support for session resumption + * + * If adding support, ensure securityParameters.tlsUnique is set to the localVerifyData, but + * ONLY when extended_master_secret has been negotiated (otherwise NULL). + */ + { + // TODO[tls13] Resumption/PSK + securityParameters.m_resumedSession = false; + + this.m_tlsSession = TlsUtilities.ImportSession(TlsUtilities.EmptyBytes, null); + this.m_sessionParameters = null; + this.m_sessionMasterSecret = null; + } + + securityParameters.m_sessionID = m_tlsSession.SessionID; + + m_tlsServer.NotifySession(m_tlsSession); + + TlsUtilities.NegotiatedVersionTlsServer(m_tlsServerContext); + + { + // TODO[tls13] Constrain selection when PSK selected + int cipherSuite = m_tlsServer.GetSelectedCipherSuite(); + + if (!TlsUtilities.IsValidCipherSuiteSelection(m_offeredCipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, serverVersion)) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + } + + int[] clientSupportedGroups = securityParameters.ClientSupportedGroups; + int[] serverSupportedGroups = securityParameters.ServerSupportedGroups; + + clientShare = TlsUtilities.SelectKeyShare(crypto, serverVersion, clientShares, clientSupportedGroups, + serverSupportedGroups); + + if (null == clientShare) + { + this.m_retryGroup = TlsUtilities.SelectKeyShareGroup(crypto, serverVersion, clientSupportedGroups, + serverSupportedGroups); + if (m_retryGroup < 0) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + this.m_retryCookie = m_tlsServerContext.NonceGenerator.GenerateNonce(16); + + return Generate13HelloRetryRequest(clientHello); + } + + if (clientShare.NamedGroup != serverSupportedGroups[0]) + { + /* + * TODO[tls13] RFC 8446 4.2.7. As of TLS 1.3, servers are permitted to send the + * "supported_groups" extension to the client. Clients MUST NOT act upon any + * information found in "supported_groups" prior to successful completion of the + * handshake but MAY use the information learned from a successfully completed + * handshake to change what groups they use in their "key_share" extension in + * subsequent connections. If the server has a group it prefers to the ones in the + * "key_share" extension but is still willing to accept the ClientHello, it SHOULD + * send "supported_groups" to update the client's view of its preferences; this + * extension SHOULD contain all groups the server supports, regardless of whether + * they are currently supported by the client. + */ + } + } + + + var serverHelloExtensions = new Dictionary(); + var serverEncryptedExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised( + m_tlsServer.GetServerExtensions()); + + m_tlsServer.GetServerExtensionsForConnection(serverEncryptedExtensions); + + ProtocolVersion serverLegacyVersion = ProtocolVersion.TLSv12; + TlsExtensionsUtilities.AddSupportedVersionsExtensionServer(serverHelloExtensions, serverVersion); + + /* + * RFC 8446 Appendix D. Because TLS 1.3 always hashes in the transcript up to the server + * Finished, implementations which support both TLS 1.3 and earlier versions SHOULD indicate + * the use of the Extended Master Secret extension in their APIs whenever TLS 1.3 is used. + */ + securityParameters.m_extendedMasterSecret = true; + + /* + * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous + * contents of this extension are irrelevant, and only the values in the new handshake + * messages are considered. + */ + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer( + serverEncryptedExtensions); + securityParameters.m_applicationProtocolSet = true; + + if (serverEncryptedExtensions.Count > 0) + { + securityParameters.m_maxFragmentLength = ProcessMaxFragmentLengthExtension( + securityParameters.IsResumedSession ? null : clientHelloExtensions, serverEncryptedExtensions, + AlertDescription.internal_error); + } + + securityParameters.m_encryptThenMac = false; + securityParameters.m_truncatedHmac = false; + + /* + * TODO[tls13] RFC 8446 4.4.2.1. OCSP Status and SCT Extensions. + * + * OCSP information is carried in an extension for a CertificateEntry. + */ + securityParameters.m_statusRequestVersion = + clientHelloExtensions.ContainsKey(ExtensionType.status_request) ? 1 : 0; + + this.m_expectSessionTicket = false; + + TlsSecret pskEarlySecret = null; + if (null != selectedPsk) + { + pskEarlySecret = selectedPsk.m_earlySecret; + + this.m_selectedPsk13 = true; + + TlsExtensionsUtilities.AddPreSharedKeyServerHello(serverHelloExtensions, selectedPsk.m_index); + } + + TlsSecret sharedSecret; + { + int namedGroup = clientShare.NamedGroup; + + TlsAgreement agreement; + if (NamedGroup.RefersToASpecificCurve(namedGroup)) + { + agreement = crypto.CreateECDomain(new TlsECConfig(namedGroup)).CreateECDH(); + } + else if (NamedGroup.RefersToASpecificFiniteField(namedGroup)) + { + agreement = crypto.CreateDHDomain(new TlsDHConfig(namedGroup, true)).CreateDH(); + } + else + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + byte[] key_exchange = agreement.GenerateEphemeral(); + KeyShareEntry serverShare = new KeyShareEntry(namedGroup, key_exchange); + TlsExtensionsUtilities.AddKeyShareServerHello(serverHelloExtensions, serverShare); + + agreement.ReceivePeerValue(clientShare.KeyExchange); + sharedSecret = agreement.CalculateSecret(); + } + + TlsUtilities.Establish13PhaseSecrets(m_tlsServerContext, pskEarlySecret, sharedSecret); + + this.m_serverExtensions = serverEncryptedExtensions; + + ApplyMaxFragmentLengthExtension(securityParameters.MaxFragmentLength); + + TlsUtilities.CheckExtensionData13(serverHelloExtensions, HandshakeType.server_hello, + AlertDescription.internal_error); + + return new ServerHello(serverLegacyVersion, securityParameters.ServerRandom, legacy_session_id, + securityParameters.CipherSuite, serverHelloExtensions); + } + + /// + protected virtual ServerHello GenerateServerHello(ClientHello clientHello, + HandshakeMessageInput clientHelloMessage) + { + ProtocolVersion clientLegacyVersion = clientHello.Version; + if (!clientLegacyVersion.IsTls) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + this.m_offeredCipherSuites = clientHello.CipherSuites; + + + + SecurityParameters securityParameters = m_tlsServerContext.SecurityParameters; + + m_tlsServerContext.SetClientSupportedVersions( + TlsExtensionsUtilities.GetSupportedVersionsExtensionClient(clientHello.Extensions)); + + ProtocolVersion clientVersion = clientLegacyVersion; + if (null == m_tlsServerContext.ClientSupportedVersions) + { + if (clientVersion.IsLaterVersionOf(ProtocolVersion.TLSv12)) + { + clientVersion = ProtocolVersion.TLSv12; + } + + m_tlsServerContext.SetClientSupportedVersions(clientVersion.DownTo(ProtocolVersion.SSLv3)); + } + else + { + clientVersion = ProtocolVersion.GetLatestTls(m_tlsServerContext.ClientSupportedVersions); + } + + // Set the legacy_record_version to use for early alerts + m_recordStream.SetWriteVersion(clientVersion); + + if (!ProtocolVersion.SERVER_EARLIEST_SUPPORTED_TLS.IsEqualOrEarlierVersionOf(clientVersion)) + throw new TlsFatalAlert(AlertDescription.protocol_version); + + // NOT renegotiating + { + m_tlsServerContext.SetClientVersion(clientVersion); + } + + m_tlsServer.NotifyClientVersion(m_tlsServerContext.ClientVersion); + + securityParameters.m_clientRandom = clientHello.Random; + + m_tlsServer.NotifyFallback(Arrays.Contains(m_offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)); + + m_tlsServer.NotifyOfferedCipherSuites(m_offeredCipherSuites); + + // TODO[tls13] Negotiate cipher suite first? + + ProtocolVersion serverVersion; + + // NOT renegotiating + { + serverVersion = m_tlsServer.GetServerVersion(); + if (!ProtocolVersion.Contains(m_tlsServerContext.ClientSupportedVersions, serverVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + securityParameters.m_negotiatedVersion = serverVersion; + } + + securityParameters.m_clientSupportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension( + clientHello.Extensions); + securityParameters.m_serverSupportedGroups = m_tlsServer.GetSupportedGroups(); + + if (ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(serverVersion)) + { + // See RFC 8446 D.4. + m_recordStream.SetIgnoreChangeCipherSpec(true); + + m_recordStream.SetWriteVersion(ProtocolVersion.TLSv12); + + return Generate13ServerHello(clientHello, clientHelloMessage, false); + } + + m_recordStream.SetWriteVersion(serverVersion); + + { + bool useGmtUnixTime = m_tlsServer.ShouldUseGmtUnixTime(); + + securityParameters.m_serverRandom = CreateRandomBlock(useGmtUnixTime, m_tlsServerContext); + + if (!serverVersion.Equals(ProtocolVersion.GetLatestTls(m_tlsServer.GetProtocolVersions()))) + { + TlsUtilities.WriteDowngradeMarker(serverVersion, securityParameters.ServerRandom); + } + } + + this.m_clientExtensions = clientHello.Extensions; + + byte[] clientRenegExtData = TlsUtilities.GetExtensionData(m_clientExtensions, ExtensionType.renegotiation_info); + + // NOT renegotiating + { + /* + * RFC 5746 3.6. Server Behavior: Initial Handshake (both full and session-resumption) + */ + + /* + * RFC 5746 3.4. The client MUST include either an empty "renegotiation_info" extension, + * or the TLS_EMPTY_RENEGOTIATION_INFO_SCSV signaling cipher suite value in the + * ClientHello. Including both is NOT RECOMMENDED. + */ + + /* + * When a ClientHello is received, the server MUST check if it includes the + * TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. If it does, set the secure_renegotiation flag + * to TRUE. + */ + if (Arrays.Contains(m_offeredCipherSuites, CipherSuite.TLS_EMPTY_RENEGOTIATION_INFO_SCSV)) + { + securityParameters.m_secureRenegotiation = true; + } + + /* + * The server MUST check if the "renegotiation_info" extension is included in the + * ClientHello. + */ + if (clientRenegExtData != null) + { + /* + * If the extension is present, set secure_renegotiation flag to TRUE. The + * server MUST then verify that the length of the "renegotiated_connection" + * field is zero, and if it is not, MUST abort the handshake. + */ + securityParameters.m_secureRenegotiation = true; + + if (!Arrays.ConstantTimeAreEqual(clientRenegExtData, + CreateRenegotiationInfo(TlsUtilities.EmptyBytes))) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + } + + m_tlsServer.NotifySecureRenegotiation(securityParameters.IsSecureRenegotiation); + + bool offeredExtendedMasterSecret = TlsExtensionsUtilities.HasExtendedMasterSecretExtension( + m_clientExtensions); + + if (m_clientExtensions != null) + { + // NOTE: Validates the padding extension data, if present + TlsExtensionsUtilities.GetPaddingExtension(m_clientExtensions); + + securityParameters.m_clientServerNames = TlsExtensionsUtilities.GetServerNameExtensionClient( + m_clientExtensions); + + /* + * RFC 5246 7.4.1.4.1. Note: this extension is not meaningful for TLS versions prior + * to 1.2. Clients MUST NOT offer it if they are offering prior versions. + */ + if (TlsUtilities.IsSignatureAlgorithmsExtensionAllowed(clientVersion)) + { + TlsUtilities.EstablishClientSigAlgs(securityParameters, m_clientExtensions); + } + + securityParameters.m_clientSupportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension( + m_clientExtensions); + + m_tlsServer.ProcessClientExtensions(m_clientExtensions); + } + + bool resumedSession = EstablishSession(m_tlsServer.GetSessionToResume(clientHello.SessionID)); + securityParameters.m_resumedSession = resumedSession; + + if (!resumedSession) + { + byte[] newSessionID = m_tlsServer.GetNewSessionID(); + if (null == newSessionID) + { + newSessionID = TlsUtilities.EmptyBytes; + } + + this.m_tlsSession = TlsUtilities.ImportSession(newSessionID, null); + this.m_sessionParameters = null; + this.m_sessionMasterSecret = null; + } + + securityParameters.m_sessionID = m_tlsSession.SessionID; + + m_tlsServer.NotifySession(m_tlsSession); + + TlsUtilities.NegotiatedVersionTlsServer(m_tlsServerContext); + + { + int cipherSuite = resumedSession + ? m_sessionParameters.CipherSuite + : m_tlsServer.GetSelectedCipherSuite(); + + if (!TlsUtilities.IsValidCipherSuiteSelection(m_offeredCipherSuites, cipherSuite) || + !TlsUtilities.IsValidVersionForCipherSuite(cipherSuite, serverVersion)) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + TlsUtilities.NegotiatedCipherSuite(securityParameters, cipherSuite); + } + + m_tlsServerContext.SetRsaPreMasterSecretVersion(clientLegacyVersion); + + { + var sessionServerExtensions = resumedSession + ? m_sessionParameters.ReadServerExtensions() + : m_tlsServer.GetServerExtensions(); + + this.m_serverExtensions = TlsExtensionsUtilities.EnsureExtensionsInitialised(sessionServerExtensions); + } + + m_tlsServer.GetServerExtensionsForConnection(m_serverExtensions); + + // NOT renegotiating + { + /* + * RFC 5746 3.6. Server Behavior: Initial Handshake (both full and session-resumption) + */ + if (securityParameters.IsSecureRenegotiation) + { + byte[] serverRenegExtData = TlsUtilities.GetExtensionData(m_serverExtensions, + ExtensionType.renegotiation_info); + bool noRenegExt = (null == serverRenegExtData); + + if (noRenegExt) + { + /* + * Note that sending a "renegotiation_info" extension in response to a ClientHello + * containing only the SCSV is an explicit exception to the prohibition in RFC 5246, + * Section 7.4.1.4, on the server sending unsolicited extensions and is only allowed + * because the client is signaling its willingness to receive the extension via the + * TLS_EMPTY_RENEGOTIATION_INFO_SCSV SCSV. + */ + + /* + * If the secure_renegotiation flag is set to TRUE, the server MUST include an empty + * "renegotiation_info" extension in the ServerHello message. + */ + this.m_serverExtensions[ExtensionType.renegotiation_info] = CreateRenegotiationInfo( + TlsUtilities.EmptyBytes); + } + } + } + + /* + * RFC 7627 4. Clients and servers SHOULD NOT accept handshakes that do not use the extended + * master secret [..]. (and see 5.2, 5.3) + */ + if (resumedSession) + { + if (!m_sessionParameters.IsExtendedMasterSecret) + { + /* + * TODO[resumption] ProvTlsServer currently only resumes EMS sessions. Revisit this + * in relation to 'tlsServer.allowLegacyResumption()'. + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + if (!offeredExtendedMasterSecret) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + securityParameters.m_extendedMasterSecret = true; + + TlsExtensionsUtilities.AddExtendedMasterSecretExtension(m_serverExtensions); + } + else + { + securityParameters.m_extendedMasterSecret = offeredExtendedMasterSecret && !serverVersion.IsSsl + && m_tlsServer.ShouldUseExtendedMasterSecret(); + + if (securityParameters.IsExtendedMasterSecret) + { + TlsExtensionsUtilities.AddExtendedMasterSecretExtension(m_serverExtensions); + } + else if (m_tlsServer.RequiresExtendedMasterSecret()) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + } + + securityParameters.m_applicationProtocol = TlsExtensionsUtilities.GetAlpnExtensionServer(m_serverExtensions); + securityParameters.m_applicationProtocolSet = true; + + if (m_serverExtensions.Count > 0) + { + securityParameters.m_encryptThenMac = TlsExtensionsUtilities.HasEncryptThenMacExtension( + m_serverExtensions); + + securityParameters.m_maxFragmentLength = ProcessMaxFragmentLengthExtension( + resumedSession ? null : m_clientExtensions, m_serverExtensions, AlertDescription.internal_error); + + securityParameters.m_truncatedHmac = TlsExtensionsUtilities.HasTruncatedHmacExtension( + m_serverExtensions); + + if (!resumedSession) + { + if (TlsUtilities.HasExpectedEmptyExtensionData(m_serverExtensions, ExtensionType.status_request_v2, + AlertDescription.internal_error)) + { + securityParameters.m_statusRequestVersion = 2; + } + else if (TlsUtilities.HasExpectedEmptyExtensionData(m_serverExtensions, ExtensionType.status_request, + AlertDescription.internal_error)) + { + securityParameters.m_statusRequestVersion = 1; + } + + this.m_expectSessionTicket = TlsUtilities.HasExpectedEmptyExtensionData(m_serverExtensions, + ExtensionType.session_ticket, AlertDescription.internal_error); + } + } + + ApplyMaxFragmentLengthExtension(securityParameters.MaxFragmentLength); + + return new ServerHello(serverVersion, securityParameters.ServerRandom, m_tlsSession.SessionID, + securityParameters.CipherSuite, m_serverExtensions); + } + + protected override TlsContext Context + { + get { return m_tlsServerContext; } + } + + internal override AbstractTlsContext ContextAdmin + { + get { return m_tlsServerContext; } + } + + protected override TlsPeer Peer + { + get { return m_tlsServer; } + } + + /// + protected virtual void Handle13HandshakeMessage(short type, HandshakeMessageInput buf) + { + if (!IsTlsV13ConnectionState()) + throw new TlsFatalAlert(AlertDescription.internal_error); + + /* + * TODO[tls13] Abbreviated handshakes (PSK resumption) + * + * NOTE: No CertificateRequest, Certificate, CertificateVerify messages, but client + * might now send EndOfEarlyData after receiving server Finished message. + */ + + switch (type) + { + case HandshakeType.certificate: + { + switch (m_connectionState) + { + case CS_SERVER_FINISHED: + { + Receive13ClientCertificate(buf); + this.m_connectionState = CS_CLIENT_CERTIFICATE; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.certificate_verify: + { + switch (m_connectionState) + { + case CS_CLIENT_CERTIFICATE: + { + Receive13ClientCertificateVerify(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_CLIENT_CERTIFICATE_VERIFY; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.client_hello: + { + switch (m_connectionState) + { + case CS_START: + { + // NOTE: Legacy handler should be dispatching initial ClientHello. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + case CS_SERVER_HELLO_RETRY_REQUEST: + { + ClientHello clientHelloRetry = ReceiveClientHelloMessage(buf); + this.m_connectionState = CS_CLIENT_HELLO_RETRY; + + ServerHello serverHello = Generate13ServerHello(clientHelloRetry, buf, true); + SendServerHelloMessage(serverHello); + this.m_connectionState = CS_SERVER_HELLO; + + Send13ServerHelloCoda(serverHello, true); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.finished: + { + switch (m_connectionState) + { + case CS_SERVER_FINISHED: + case CS_CLIENT_CERTIFICATE: + case CS_CLIENT_CERTIFICATE_VERIFY: + { + if (m_connectionState == CS_SERVER_FINISHED) + { + Skip13ClientCertificate(); + } + if (m_connectionState != CS_CLIENT_CERTIFICATE_VERIFY) + { + Skip13ClientCertificateVerify(); + } + + Receive13ClientFinished(buf); + this.m_connectionState = CS_CLIENT_FINISHED; + + // See RFC 8446 D.4. + m_recordStream.SetIgnoreChangeCipherSpec(false); + + // NOTE: Completes the switch to application-data phase (server entered after CS_SERVER_FINISHED). + m_recordStream.EnablePendingCipherRead(false); + + CompleteHandshake(); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.key_update: + { + Receive13KeyUpdate(buf); + break; + } + + case HandshakeType.certificate_request: + case HandshakeType.certificate_status: + case HandshakeType.certificate_url: + case HandshakeType.client_key_exchange: + case HandshakeType.compressed_certificate: + case HandshakeType.encrypted_extensions: + case HandshakeType.end_of_early_data: + case HandshakeType.hello_request: + case HandshakeType.hello_verify_request: + case HandshakeType.message_hash: + case HandshakeType.new_session_ticket: + case HandshakeType.server_hello: + case HandshakeType.server_hello_done: + case HandshakeType.server_key_exchange: + case HandshakeType.supplemental_data: + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + protected override void HandleHandshakeMessage(short type, HandshakeMessageInput buf) + { + SecurityParameters securityParameters = m_tlsServerContext.SecurityParameters; + + if (m_connectionState > CS_CLIENT_HELLO + && TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + { + if (securityParameters.IsResumedSession) + throw new TlsFatalAlert(AlertDescription.internal_error); + + Handle13HandshakeMessage(type, buf); + return; + } + + if (!IsLegacyConnectionState()) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (securityParameters.IsResumedSession) + { + if (type != HandshakeType.finished || m_connectionState != CS_SERVER_FINISHED) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + ProcessFinishedMessage(buf); + this.m_connectionState = CS_CLIENT_FINISHED; + + CompleteHandshake(); + return; + } + + switch (type) + { + case HandshakeType.client_hello: + { + if (IsApplicationDataReady) + { + RefuseRenegotiation(); + break; + } + + switch (m_connectionState) + { + case CS_END: + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + case CS_START: + { + ClientHello clientHello = ReceiveClientHelloMessage(buf); + this.m_connectionState = CS_CLIENT_HELLO; + + ServerHello serverHello = GenerateServerHello(clientHello, buf); + m_handshakeHash.NotifyPrfDetermined(); + + if (TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion)) + { + m_handshakeHash.SealHashAlgorithms(); + + if (serverHello.IsHelloRetryRequest()) + { + TlsUtilities.AdjustTranscriptForRetry(m_handshakeHash); + + SendServerHelloMessage(serverHello); + this.m_connectionState = CS_SERVER_HELLO_RETRY_REQUEST; + + // See RFC 8446 D.4. + SendChangeCipherSpecMessage(); + } + else + { + SendServerHelloMessage(serverHello); + this.m_connectionState = CS_SERVER_HELLO; + + // See RFC 8446 D.4. + SendChangeCipherSpecMessage(); + + Send13ServerHelloCoda(serverHello, false); + } + break; + } + + // For TLS 1.3+, this was already done by GenerateServerHello + buf.UpdateHash(m_handshakeHash); + + SendServerHelloMessage(serverHello); + this.m_connectionState = CS_SERVER_HELLO; + + if (securityParameters.IsResumedSession) + { + securityParameters.m_masterSecret = m_sessionMasterSecret; + m_recordStream.SetPendingCipher(TlsUtilities.InitCipher(m_tlsServerContext)); + + SendChangeCipherSpec(); + SendFinishedMessage(); + this.m_connectionState = CS_SERVER_FINISHED; + break; + } + + var serverSupplementalData = m_tlsServer.GetServerSupplementalData(); + if (serverSupplementalData != null) + { + SendSupplementalDataMessage(serverSupplementalData); + this.m_connectionState = CS_SERVER_SUPPLEMENTAL_DATA; + } + + this.m_keyExchange = TlsUtilities.InitKeyExchangeServer(m_tlsServerContext, m_tlsServer); + + TlsCredentials serverCredentials = null; + + if (!KeyExchangeAlgorithm.IsAnonymous(securityParameters.KeyExchangeAlgorithm)) + { + serverCredentials = TlsUtilities.EstablishServerCredentials(m_tlsServer); + } + + // Server certificate + { + Certificate serverCertificate = null; + + MemoryStream endPointHash = new MemoryStream(); + if (null == serverCredentials) + { + m_keyExchange.SkipServerCredentials(); + } + else + { + m_keyExchange.ProcessServerCredentials(serverCredentials); + + serverCertificate = serverCredentials.Certificate; + SendCertificateMessage(serverCertificate, endPointHash); + this.m_connectionState = CS_SERVER_CERTIFICATE; + } + + securityParameters.m_tlsServerEndPoint = endPointHash.ToArray(); + + // TODO[RFC 3546] Check whether empty certificates is possible, allowed, or excludes + // CertificateStatus + if (null == serverCertificate || serverCertificate.IsEmpty) + { + securityParameters.m_statusRequestVersion = 0; + } + } + + if (securityParameters.StatusRequestVersion > 0) + { + CertificateStatus certificateStatus = m_tlsServer.GetCertificateStatus(); + if (certificateStatus != null) + { + SendCertificateStatusMessage(certificateStatus); + this.m_connectionState = CS_SERVER_CERTIFICATE_STATUS; + } + } + + byte[] serverKeyExchange = m_keyExchange.GenerateServerKeyExchange(); + if (serverKeyExchange != null) + { + SendServerKeyExchangeMessage(serverKeyExchange); + this.m_connectionState = CS_SERVER_KEY_EXCHANGE; + } + + if (null != serverCredentials) + { + this.m_certificateRequest = m_tlsServer.GetCertificateRequest(); + + if (null == m_certificateRequest) + { + /* + * For static agreement key exchanges, CertificateRequest is required since + * the client Certificate message is mandatory but can only be sent if the + * server requests it. + */ + if (!m_keyExchange.RequiresCertificateVerify) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + else + { + if (TlsUtilities.IsTlsV12(m_tlsServerContext) + != (m_certificateRequest.SupportedSignatureAlgorithms != null)) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + this.m_certificateRequest = TlsUtilities.ValidateCertificateRequest(m_certificateRequest, + m_keyExchange); + + TlsUtilities.EstablishServerSigAlgs(securityParameters, m_certificateRequest); + + if (ProtocolVersion.TLSv12.Equals(securityParameters.NegotiatedVersion)) + { + TlsUtilities.TrackHashAlgorithms(m_handshakeHash, securityParameters.ServerSigAlgs); + + if (m_tlsServerContext.Crypto.HasAnyStreamVerifiers(securityParameters.ServerSigAlgs)) + { + m_handshakeHash.ForceBuffering(); + } + } + else + { + if (m_tlsServerContext.Crypto.HasAnyStreamVerifiersLegacy(m_certificateRequest.CertificateTypes)) + { + m_handshakeHash.ForceBuffering(); + } + } + } + } + + m_handshakeHash.SealHashAlgorithms(); + + if (null != m_certificateRequest) + { + SendCertificateRequestMessage(m_certificateRequest); + this.m_connectionState = CS_SERVER_CERTIFICATE_REQUEST; + } + + SendServerHelloDoneMessage(); + this.m_connectionState = CS_SERVER_HELLO_DONE; + + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.supplemental_data: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO_DONE: + { + m_tlsServer.ProcessClientSupplementalData(ReadSupplementalDataMessage(buf)); + this.m_connectionState = CS_CLIENT_SUPPLEMENTAL_DATA; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.certificate: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO_DONE: + case CS_CLIENT_SUPPLEMENTAL_DATA: + { + if (m_connectionState != CS_CLIENT_SUPPLEMENTAL_DATA) + { + m_tlsServer.ProcessClientSupplementalData(null); + } + + ReceiveCertificateMessage(buf); + this.m_connectionState = CS_CLIENT_CERTIFICATE; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.client_key_exchange: + { + switch (m_connectionState) + { + case CS_SERVER_HELLO_DONE: + case CS_CLIENT_SUPPLEMENTAL_DATA: + case CS_CLIENT_CERTIFICATE: + { + if (m_connectionState == CS_SERVER_HELLO_DONE) + { + m_tlsServer.ProcessClientSupplementalData(null); + } + if (m_connectionState != CS_CLIENT_CERTIFICATE) + { + if (null == m_certificateRequest) + { + m_keyExchange.SkipClientCredentials(); + } + else if (TlsUtilities.IsTlsV12(m_tlsServerContext)) + { + /* + * RFC 5246 If no suitable certificate is available, the client MUST send a + * certificate message containing no certificates. + * + * NOTE: In previous RFCs, this was SHOULD instead of MUST. + */ + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + else if (TlsUtilities.IsSsl(m_tlsServerContext)) + { + /* + * SSL 3.0 If the server has sent a certificate request Message, the client must + * send either the certificate message or a no_certificate alert. + */ + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + else + { + NotifyClientCertificate(Certificate.EmptyChain); + } + } + + ReceiveClientKeyExchangeMessage(buf); + this.m_connectionState = CS_CLIENT_KEY_EXCHANGE; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.certificate_verify: + { + switch (m_connectionState) + { + case CS_CLIENT_KEY_EXCHANGE: + { + /* + * RFC 5246 7.4.8 This message is only sent following a client certificate that has + * signing capability (i.e., all certificates except those containing fixed + * Diffie-Hellman parameters). + */ + if (!ExpectCertificateVerifyMessage()) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + ReceiveCertificateVerifyMessage(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_CLIENT_CERTIFICATE_VERIFY; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + case HandshakeType.finished: + { + switch (m_connectionState) + { + case CS_CLIENT_KEY_EXCHANGE: + case CS_CLIENT_CERTIFICATE_VERIFY: + { + if (m_connectionState != CS_CLIENT_CERTIFICATE_VERIFY) + { + if (ExpectCertificateVerifyMessage()) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + ProcessFinishedMessage(buf); + buf.UpdateHash(m_handshakeHash); + this.m_connectionState = CS_CLIENT_FINISHED; + + if (m_expectSessionTicket) + { + /* + * TODO[new_session_ticket] Check the server-side rules regarding the session ID, since + * the client is going to ignore any session ID it received once it sees the + * new_session_ticket message. + */ + + SendNewSessionTicketMessage(m_tlsServer.GetNewSessionTicket()); + this.m_connectionState = CS_SERVER_SESSION_TICKET; + } + + SendChangeCipherSpec(); + SendFinishedMessage(); + this.m_connectionState = CS_SERVER_FINISHED; + + CompleteHandshake(); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + break; + } + + case HandshakeType.certificate_request: + case HandshakeType.certificate_status: + case HandshakeType.certificate_url: + case HandshakeType.compressed_certificate: + case HandshakeType.encrypted_extensions: + case HandshakeType.end_of_early_data: + case HandshakeType.hello_request: + case HandshakeType.hello_verify_request: + case HandshakeType.key_update: + case HandshakeType.message_hash: + case HandshakeType.new_session_ticket: + case HandshakeType.server_hello: + case HandshakeType.server_hello_done: + case HandshakeType.server_key_exchange: + default: + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } + + protected override void HandleAlertWarningMessage(short alertDescription) + { + /* + * SSL 3.0 If the server has sent a certificate request Message, the client must send + * either the certificate message or a no_certificate alert. + */ + if (AlertDescription.no_certificate == alertDescription && null != m_certificateRequest + && TlsUtilities.IsSsl(m_tlsServerContext)) + { + switch (m_connectionState) + { + case CS_SERVER_HELLO_DONE: + case CS_CLIENT_SUPPLEMENTAL_DATA: + { + if (m_connectionState != CS_CLIENT_SUPPLEMENTAL_DATA) + { + m_tlsServer.ProcessClientSupplementalData(null); + } + + NotifyClientCertificate(Certificate.EmptyChain); + this.m_connectionState = CS_CLIENT_CERTIFICATE; + return; + } + } + } + + base.HandleAlertWarningMessage(alertDescription); + } + + /// + protected virtual void NotifyClientCertificate(Certificate clientCertificate) + { + if (null == m_certificateRequest) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsUtilities.ProcessClientCertificate(m_tlsServerContext, clientCertificate, m_keyExchange, m_tlsServer); + } + + /// + protected virtual void Receive13ClientCertificate(MemoryStream buf) + { + // TODO[tls13] This currently just duplicates 'receiveCertificateMessage' + + if (null == m_certificateRequest) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + Certificate.ParseOptions options = new Certificate.ParseOptions() + { + CertificateType = TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(m_serverExtensions, + CertificateType.X509), + MaxChainLength = m_tlsServer.GetMaxCertificateChainLength(), + }; + + Certificate clientCertificate = Certificate.Parse(options, m_tlsServerContext, buf, null); + + AssertEmpty(buf); + + NotifyClientCertificate(clientCertificate); + } + + /// + protected void Receive13ClientCertificateVerify(MemoryStream buf) + { + Certificate clientCertificate = m_tlsServerContext.SecurityParameters.PeerCertificate; + if (null == clientCertificate || clientCertificate.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); + + CertificateVerify certificateVerify = CertificateVerify.Parse(m_tlsServerContext, buf); + + AssertEmpty(buf); + + TlsUtilities.Verify13CertificateVerifyClient(m_tlsServerContext, m_handshakeHash, certificateVerify); + } + + /// + protected virtual void Receive13ClientFinished(MemoryStream buf) + { + Process13FinishedMessage(buf); + } + + /// + protected virtual void ReceiveCertificateMessage(MemoryStream buf) + { + if (null == m_certificateRequest) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + Certificate.ParseOptions options = new Certificate.ParseOptions() + { + CertificateType = TlsExtensionsUtilities.GetClientCertificateTypeExtensionServer(m_serverExtensions, + CertificateType.X509), + MaxChainLength = m_tlsServer.GetMaxCertificateChainLength(), + }; + + Certificate clientCertificate = Certificate.Parse(options, m_tlsServerContext, buf, null); + + AssertEmpty(buf); + + NotifyClientCertificate(clientCertificate); + } + + /// + protected virtual void ReceiveCertificateVerifyMessage(MemoryStream buf) + { + DigitallySigned certificateVerify = DigitallySigned.Parse(m_tlsServerContext, buf); + + AssertEmpty(buf); + + TlsUtilities.VerifyCertificateVerifyClient(m_tlsServerContext, m_certificateRequest, certificateVerify, + m_handshakeHash); + + m_handshakeHash.StopTracking(); + } + + /// + protected virtual ClientHello ReceiveClientHelloMessage(MemoryStream buf) + { + return ClientHello.Parse(buf, null); + } + + /// + protected virtual void ReceiveClientKeyExchangeMessage(MemoryStream buf) + { + m_keyExchange.ProcessClientKeyExchange(buf); + + AssertEmpty(buf); + + bool isSsl = TlsUtilities.IsSsl(m_tlsServerContext); + if (isSsl) + { + // NOTE: For SSLv3 (only), master_secret needed to calculate session hash + EstablishMasterSecret(m_tlsServerContext, m_keyExchange); + } + + m_tlsServerContext.SecurityParameters.m_sessionHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + if (!isSsl) + { + // NOTE: For (D)TLS, session hash potentially needed for extended_master_secret + EstablishMasterSecret(m_tlsServerContext, m_keyExchange); + } + + m_recordStream.SetPendingCipher(TlsUtilities.InitCipher(m_tlsServerContext)); + + if (!ExpectCertificateVerifyMessage()) + { + m_handshakeHash.StopTracking(); + } + } + + /// + protected virtual void Send13EncryptedExtensionsMessage(IDictionary serverExtensions) + { + // TODO[tls13] Avoid extra copy; use placeholder to write opaque-16 data directly to message buffer + + byte[] extBytes = WriteExtensionsData(serverExtensions); + + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.encrypted_extensions); + TlsUtilities.WriteOpaque16(extBytes, message); + message.Send(this); + } + + /// + protected virtual void Send13ServerHelloCoda(ServerHello serverHello, bool afterHelloRetryRequest) + { + SecurityParameters securityParameters = m_tlsServerContext.SecurityParameters; + + byte[] serverHelloTranscriptHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + TlsUtilities.Establish13PhaseHandshake(m_tlsServerContext, serverHelloTranscriptHash, m_recordStream); + + m_recordStream.EnablePendingCipherWrite(); + m_recordStream.EnablePendingCipherRead(true); + + Send13EncryptedExtensionsMessage(m_serverExtensions); + this.m_connectionState = CS_SERVER_ENCRYPTED_EXTENSIONS; + + if (m_selectedPsk13) + { + /* + * For PSK-only key exchange, there's no CertificateRequest, Certificate, CertificateVerify. + */ + } + else + { + // CertificateRequest + { + this.m_certificateRequest = m_tlsServer.GetCertificateRequest(); + if (null != m_certificateRequest) + { + if (!m_certificateRequest.HasCertificateRequestContext(TlsUtilities.EmptyBytes)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsUtilities.EstablishServerSigAlgs(securityParameters, m_certificateRequest); + + SendCertificateRequestMessage(m_certificateRequest); + this.m_connectionState = CS_SERVER_CERTIFICATE_REQUEST; + } + } + + TlsCredentialedSigner serverCredentials = TlsUtilities.Establish13ServerCredentials(m_tlsServer); + if (null == serverCredentials) + throw new TlsFatalAlert(AlertDescription.internal_error); + + // Certificate + { + /* + * TODO[tls13] Note that we are expecting the TlsServer implementation to take care of + * e.g. adding optional "status_request" extension to each CertificateEntry. + */ + /* + * No CertificateStatus message is sent; TLS 1.3 uses per-CertificateEntry + * "status_request" extension instead. + */ + + Certificate serverCertificate = serverCredentials.Certificate; + Send13CertificateMessage(serverCertificate); + securityParameters.m_tlsServerEndPoint = null; + this.m_connectionState = CS_SERVER_CERTIFICATE; + } + + // CertificateVerify + { + DigitallySigned certificateVerify = TlsUtilities.Generate13CertificateVerify(m_tlsServerContext, + serverCredentials, m_handshakeHash); + Send13CertificateVerifyMessage(certificateVerify); + this.m_connectionState = CS_CLIENT_CERTIFICATE_VERIFY; + } + } + + // Finished + { + Send13FinishedMessage(); + this.m_connectionState = CS_SERVER_FINISHED; + } + + byte[] serverFinishedTranscriptHash = TlsUtilities.GetCurrentPrfHash(m_handshakeHash); + + TlsUtilities.Establish13PhaseApplication(m_tlsServerContext, serverFinishedTranscriptHash, m_recordStream); + + m_recordStream.EnablePendingCipherWrite(); + } + + /// + protected virtual void SendCertificateRequestMessage(CertificateRequest certificateRequest) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate_request); + certificateRequest.Encode(m_tlsServerContext, message); + message.Send(this); + } + + /// + protected virtual void SendCertificateStatusMessage(CertificateStatus certificateStatus) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.certificate_status); + // TODO[tls13] Ensure this cannot happen for (D)TLS1.3+ + certificateStatus.Encode(message); + message.Send(this); + } + + /// + protected virtual void SendHelloRequestMessage() + { + HandshakeMessageOutput.Send(this, HandshakeType.hello_request, TlsUtilities.EmptyBytes); + } + + /// + protected virtual void SendNewSessionTicketMessage(NewSessionTicket newSessionTicket) + { + if (newSessionTicket == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.new_session_ticket); + newSessionTicket.Encode(message); + message.Send(this); + } + + /// + protected virtual void SendServerHelloDoneMessage() + { + HandshakeMessageOutput.Send(this, HandshakeType.server_hello_done, TlsUtilities.EmptyBytes); + } + + /// + protected virtual void SendServerHelloMessage(ServerHello serverHello) + { + HandshakeMessageOutput message = new HandshakeMessageOutput(HandshakeType.server_hello); + serverHello.Encode(m_tlsServerContext, message); + message.Send(this); + } + + /// + protected virtual void SendServerKeyExchangeMessage(byte[] serverKeyExchange) + { + HandshakeMessageOutput.Send(this, HandshakeType.server_key_exchange, serverKeyExchange); + } + + /// + protected virtual void Skip13ClientCertificate() + { + if (null != m_certificateRequest) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + /// + protected virtual void Skip13ClientCertificateVerify() + { + if (ExpectCertificateVerifyMessage()) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs.meta new file mode 100644 index 00000000..9e4f901d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 97ce4143c0b65b24e99d9ec1ce6c86c2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsServerProtocol.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs new file mode 100644 index 00000000..12ba3a6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for a carrier object for a TLS session. + public interface TlsSession + { + SessionParameters ExportSessionParameters(); + + byte[] SessionID { get; } + + void Invalidate(); + + bool IsResumable { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs.meta new file mode 100644 index 00000000..15a95520 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ea96af220af3b07408a4ebb6f22f92ad +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSession.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs new file mode 100644 index 00000000..ac8a8b2e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class TlsSessionImpl + : TlsSession + { + private readonly byte[] m_sessionID; + private readonly SessionParameters m_sessionParameters; + private bool m_resumable; + + internal TlsSessionImpl(byte[] sessionID, SessionParameters sessionParameters) + { + if (sessionID == null) + throw new ArgumentNullException("sessionID"); + if (sessionID.Length > 32) + throw new ArgumentException("cannot be longer than 32 bytes", "sessionID"); + + this.m_sessionID = Arrays.Clone(sessionID); + this.m_sessionParameters = sessionParameters; + this.m_resumable = sessionID.Length > 0 && null != sessionParameters; + } + + public SessionParameters ExportSessionParameters() + { + lock (this) + { + return m_sessionParameters == null ? null : m_sessionParameters.Copy(); + } + } + + public byte[] SessionID + { + get { lock (this) return m_sessionID; } + } + + public void Invalidate() + { + lock (this) + { + this.m_resumable = false; + } + } + + public bool IsResumable + { + get { lock (this) return m_resumable; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs.meta new file mode 100644 index 00000000..e48222f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e9074d64f7a05014c97753d3e323ec77 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSessionImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs new file mode 100644 index 00000000..dcb1c932 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Interface for verifying SRP config needs to conform to. + public interface TlsSrpConfigVerifier + { + /// Check whether the given SRP configuration is acceptable for use. + /// the to check. + /// true if (and only if) the specified configuration is acceptable. + bool Accept(TlsSrpConfig srpConfig); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs.meta new file mode 100644 index 00000000..265e5fb2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c00e840dc34fe224e82171cb5e7645e8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpConfigVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs new file mode 100644 index 00000000..7481c7fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Processor interface for an SRP identity. + public interface TlsSrpIdentity + { + byte[] GetSrpIdentity(); + + byte[] GetSrpPassword(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs.meta new file mode 100644 index 00000000..5ac9e8c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8ed39563c1686954baa4da0b6478621f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentity.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs new file mode 100644 index 00000000..d7e818af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs @@ -0,0 +1,22 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// Base interface for an object that can return login parameters from an SRP identity. + public interface TlsSrpIdentityManager + { + /// Lookup the corresponding to the specified identity. + /// + /// NOTE: To avoid "identity probing", unknown identities SHOULD be handled as recommended in RFC 5054 2.5.1.3. + /// is provided for this purpose. + /// + /// the SRP identity sent by the connecting client. + /// the for the specified identity, or else 'simulated' parameters + /// if the identity is not recognized. A null value is also allowed, but not recommended. + TlsSrpLoginParameters GetLoginParameters(byte[] identity); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs.meta new file mode 100644 index 00000000..74285368 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10952cb203b2e554fb39f459b83f5872 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpIdentityManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs new file mode 100644 index 00000000..564291eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs @@ -0,0 +1,191 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// (D)TLS SRP key exchange (RFC 5054). + public class TlsSrpKeyExchange + : AbstractTlsKeyExchange + { + private static int CheckKeyExchange(int keyExchange) + { + switch (keyExchange) + { + case KeyExchangeAlgorithm.SRP: + case KeyExchangeAlgorithm.SRP_DSS: + case KeyExchangeAlgorithm.SRP_RSA: + return keyExchange; + default: + throw new ArgumentException("unsupported key exchange algorithm", "keyExchange"); + } + } + + protected TlsSrpIdentity m_srpIdentity; + protected TlsSrpConfigVerifier m_srpConfigVerifier; + protected TlsCertificate m_serverCertificate = null; + protected byte[] m_srpSalt = null; + protected TlsSrp6Client m_srpClient = null; + + protected TlsSrpLoginParameters m_srpLoginParameters; + protected TlsCredentialedSigner m_serverCredentials = null; + protected TlsSrp6Server m_srpServer = null; + + protected BigInteger m_srpPeerCredentials = null; + + public TlsSrpKeyExchange(int keyExchange, TlsSrpIdentity srpIdentity, TlsSrpConfigVerifier srpConfigVerifier) + : base(CheckKeyExchange(keyExchange)) + { + this.m_srpIdentity = srpIdentity; + this.m_srpConfigVerifier = srpConfigVerifier; + } + + public TlsSrpKeyExchange(int keyExchange, TlsSrpLoginParameters srpLoginParameters) + : base(CheckKeyExchange(keyExchange)) + { + this.m_srpLoginParameters = srpLoginParameters; + } + + public override void SkipServerCredentials() + { + if (m_keyExchange != KeyExchangeAlgorithm.SRP) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void ProcessServerCredentials(TlsCredentials serverCredentials) + { + if (m_keyExchange == KeyExchangeAlgorithm.SRP) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_serverCredentials = TlsUtilities.RequireSignerCredentials(serverCredentials); + } + + public override void ProcessServerCertificate(Certificate serverCertificate) + { + if (m_keyExchange == KeyExchangeAlgorithm.SRP) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_serverCertificate = serverCertificate.GetCertificateAt(0); + } + + public override bool RequiresServerKeyExchange + { + get { return true; } + } + + public override byte[] GenerateServerKeyExchange() + { + TlsSrpConfig config = m_srpLoginParameters.Config; + + this.m_srpServer = m_context.Crypto.CreateSrp6Server(config, m_srpLoginParameters.Verifier); + + BigInteger B = m_srpServer.GenerateServerCredentials(); + + BigInteger[] ng = config.GetExplicitNG(); + ServerSrpParams srpParams = new ServerSrpParams(ng[0], ng[1], m_srpLoginParameters.Salt, B); + + DigestInputBuffer digestBuffer = new DigestInputBuffer(); + + srpParams.Encode(digestBuffer); + + if (m_serverCredentials != null) + { + TlsUtilities.GenerateServerKeyExchangeSignature(m_context, m_serverCredentials, null, digestBuffer); + } + + return digestBuffer.ToArray(); + } + + public override void ProcessServerKeyExchange(Stream input) + { + DigestInputBuffer digestBuffer = null; + Stream teeIn = input; + + if (m_keyExchange != KeyExchangeAlgorithm.SRP) + { + digestBuffer = new DigestInputBuffer(); + teeIn = new TeeInputStream(input, digestBuffer); + } + + ServerSrpParams srpParams = ServerSrpParams.Parse(teeIn); + + if (digestBuffer != null) + { + TlsUtilities.VerifyServerKeyExchangeSignature(m_context, input, m_serverCertificate, null, + digestBuffer); + } + + TlsSrpConfig config = new TlsSrpConfig(); + config.SetExplicitNG(new BigInteger[]{ srpParams.N, srpParams.G }); + + if (!m_srpConfigVerifier.Accept(config)) + throw new TlsFatalAlert(AlertDescription.insufficient_security); + + this.m_srpSalt = srpParams.S; + + /* + * RFC 5054 2.5.3: The client MUST abort the handshake with an "illegal_parameter" alert if + * B % N = 0. + */ + this.m_srpPeerCredentials = ValidatePublicValue(srpParams.N, srpParams.B); + this.m_srpClient = m_context.Crypto.CreateSrp6Client(config); + } + + public override void ProcessClientCredentials(TlsCredentials clientCredentials) + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public override void GenerateClientKeyExchange(Stream output) + { + byte[] identity = m_srpIdentity.GetSrpIdentity(); + byte[] password = m_srpIdentity.GetSrpPassword(); + + BigInteger A = m_srpClient.GenerateClientCredentials(m_srpSalt, identity, password); + TlsSrpUtilities.WriteSrpParameter(A, output); + + m_context.SecurityParameters.m_srpIdentity = Arrays.Clone(identity); + } + + public override void ProcessClientKeyExchange(Stream input) + { + /* + * RFC 5054 2.5.4: The server MUST abort the handshake with an "illegal_parameter" alert if + * A % N = 0. + */ + this.m_srpPeerCredentials = ValidatePublicValue(m_srpLoginParameters.Config.GetExplicitNG()[0], + TlsSrpUtilities.ReadSrpParameter(input)); + + m_context.SecurityParameters.m_srpIdentity = Arrays.Clone(m_srpLoginParameters.Identity); + } + + public override TlsSecret GeneratePreMasterSecret() + { + BigInteger S = m_srpServer != null + ? m_srpServer.CalculateSecret(m_srpPeerCredentials) + : m_srpClient.CalculateSecret(m_srpPeerCredentials); + + // TODO Check if this needs to be a fixed size + return m_context.Crypto.CreateSecret(BigIntegers.AsUnsignedByteArray(S)); + } + + protected static BigInteger ValidatePublicValue(BigInteger N, BigInteger val) + { + val = val.Mod(N); + + // Check that val % N != 0 + if (val.Equals(BigInteger.Zero)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return val; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs.meta new file mode 100644 index 00000000..1f5dad1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8336aeea286b6e94fba8ed7039a2db5c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpKeyExchange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs new file mode 100644 index 00000000..72ed05de --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public class TlsSrpLoginParameters + { + protected byte[] m_identity; + protected TlsSrpConfig m_srpConfig; + protected BigInteger m_verifier; + protected byte[] m_salt; + + public TlsSrpLoginParameters(byte[] identity, TlsSrpConfig srpConfig, BigInteger verifier, byte[] salt) + { + this.m_identity = Arrays.Clone(identity); + this.m_srpConfig = srpConfig; + this.m_verifier = verifier; + this.m_salt = Arrays.Clone(salt); + } + + public virtual TlsSrpConfig Config + { + get { return m_srpConfig; } + } + + public virtual byte[] Identity + { + get { return m_identity; } + } + + public virtual byte[] Salt + { + get { return m_salt; } + } + + public virtual BigInteger Verifier + { + get { return m_verifier; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs.meta new file mode 100644 index 00000000..4db3ca07 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d05ba3c7439b3b244b95f496144cccb5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpLoginParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs new file mode 100644 index 00000000..4a8d51aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class TlsSrpUtilities + { + /// + public static void AddSrpExtension(IDictionary extensions, byte[] identity) + { + extensions[ExtensionType.srp] = CreateSrpExtension(identity); + } + + /// + public static byte[] GetSrpExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.srp); + return extensionData == null ? null : ReadSrpExtension(extensionData); + } + + /// + public static byte[] CreateSrpExtension(byte[] identity) + { + if (identity == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsUtilities.EncodeOpaque8(identity); + } + + /// + public static byte[] ReadSrpExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + return TlsUtilities.DecodeOpaque8(extensionData, 1); + } + + /// + public static BigInteger ReadSrpParameter(Stream input) + { + return new BigInteger(1, TlsUtilities.ReadOpaque16(input, 1)); + } + + /// + public static void WriteSrpParameter(BigInteger x, Stream output) + { + TlsUtilities.WriteOpaque16(BigIntegers.AsUnsignedByteArray(x), output); + } + + public static bool IsSrpCipherSuite(int cipherSuite) + { + switch (TlsUtilities.GetKeyExchangeAlgorithm(cipherSuite)) + { + case KeyExchangeAlgorithm.SRP: + case KeyExchangeAlgorithm.SRP_DSS: + case KeyExchangeAlgorithm.SRP_RSA: + return true; + + default: + return false; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs.meta new file mode 100644 index 00000000..b58b2d0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ec208f631ccf7d4a9b305fc2d9ac5d4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrpUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs new file mode 100644 index 00000000..a431747e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5764 DTLS Extension to Establish Keys for SRTP. + public abstract class TlsSrtpUtilities +{ + /// + public static void AddUseSrtpExtension(IDictionary extensions, UseSrtpData useSrtpData) + { + extensions[ExtensionType.use_srtp] = CreateUseSrtpExtension(useSrtpData); + } + + /// + public static UseSrtpData GetUseSrtpExtension(IDictionary extensions) + { + byte[] extensionData = TlsUtilities.GetExtensionData(extensions, ExtensionType.use_srtp); + return extensionData == null ? null : ReadUseSrtpExtension(extensionData); + } + + /// + public static byte[] CreateUseSrtpExtension(UseSrtpData useSrtpData) + { + if (useSrtpData == null) + throw new ArgumentNullException("useSrtpData"); + + MemoryStream buf = new MemoryStream(); + + // SRTPProtectionProfiles + TlsUtilities.WriteUint16ArrayWithUint16Length(useSrtpData.ProtectionProfiles, buf); + + // srtp_mki + TlsUtilities.WriteOpaque8(useSrtpData.Mki, buf); + + return buf.ToArray(); + } + + /// + public static UseSrtpData ReadUseSrtpExtension(byte[] extensionData) + { + if (extensionData == null) + throw new ArgumentNullException("extensionData"); + + MemoryStream buf = new MemoryStream(extensionData, false); + + // SRTPProtectionProfiles + int length = TlsUtilities.ReadUint16(buf); + if (length < 2 || (length & 1) != 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int[] protectionProfiles = TlsUtilities.ReadUint16Array(length / 2, buf); + + // srtp_mki + byte[] mki = TlsUtilities.ReadOpaque8(buf); + + TlsProtocol.AssertEmpty(buf); + + return new UseSrtpData(protectionProfiles, mki); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs.meta new file mode 100644 index 00000000..23b5bdaa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d129a331624ed924f81277eb14250172 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsSrtpUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs new file mode 100644 index 00000000..e46272ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs @@ -0,0 +1,110 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + internal class TlsStream + : Stream + { + private readonly TlsProtocol m_handler; + + public TlsProtocol Protocol { get => this.m_handler; } + + byte[] oneByteBuf = new byte[1]; + + internal TlsStream(TlsProtocol handler) + { + m_handler = handler; + } + + public override bool CanRead + { + get { return true; } + } + + public override bool CanSeek + { + get { return false; } + } + + public override bool CanWrite + { + get { return true; } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + m_handler.Close(); + } + base.Dispose(disposing); + } + + public override void Flush() + { + m_handler.Flush(); + } + + public override long Length + { + get { throw new NotSupportedException(); } + } + + public override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + return m_handler.ReadApplicationData(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + return m_handler.ReadApplicationData(buffer); + } +#endif + + public override int ReadByte() + { + int ret = m_handler.ReadApplicationData(oneByteBuf, 0, 1); + return ret <= 0 ? -1 : oneByteBuf[0]; + } + + public override long Seek(long offset, SeekOrigin origin) + { + throw new NotSupportedException(); + } + + public override void SetLength(long value) + { + throw new NotSupportedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + m_handler.WriteApplicationData(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + m_handler.WriteApplicationData(buffer); + } +#endif + + public override void WriteByte(byte value) + { + oneByteBuf[0] = value; + Write(oneByteBuf, 0, 1); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs.meta new file mode 100644 index 00000000..a3d0dcf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ebc28584d918e8244b65af99b04032b7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs new file mode 100644 index 00000000..7defaf58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + [Serializable] + public class TlsTimeoutException + : IOException + { + public TlsTimeoutException() + : base() + { + } + + public TlsTimeoutException(string message) + : base(message) + { + } + + public TlsTimeoutException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected TlsTimeoutException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs.meta new file mode 100644 index 00000000..a10a81bc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b51ec40abbe942f4ea6cf3defa169025 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsTimeoutException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs new file mode 100644 index 00000000..b65772bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs @@ -0,0 +1,5786 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Net.Sockets; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public abstract class TlsUtilities + { + private static readonly byte[] DowngradeTlsV11 = Hex.DecodeStrict("444F574E47524400"); + private static readonly byte[] DowngradeTlsV12 = Hex.DecodeStrict("444F574E47524401"); + + private static readonly IDictionary CertSigAlgOids = CreateCertSigAlgOids(); + private static readonly IList DefaultSupportedSigAlgs = CreateDefaultSupportedSigAlgs(); + + private static void AddCertSigAlgOid(IDictionary d, DerObjectIdentifier oid, + SignatureAndHashAlgorithm sigAndHash) + { + d[oid.Id] = sigAndHash; + } + + private static void AddCertSigAlgOid(IDictionary d, DerObjectIdentifier oid, + short hashAlgorithm, short signatureAlgorithm) + { + AddCertSigAlgOid(d, oid, SignatureAndHashAlgorithm.GetInstance(hashAlgorithm, signatureAlgorithm)); + } + + private static IDictionary CreateCertSigAlgOids() + { + var d = new Dictionary(); + + AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha224, HashAlgorithm.sha224, SignatureAlgorithm.dsa); + AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha256, HashAlgorithm.sha256, SignatureAlgorithm.dsa); + AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha384, HashAlgorithm.sha384, SignatureAlgorithm.dsa); + AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha512, HashAlgorithm.sha512, SignatureAlgorithm.dsa); + + AddCertSigAlgOid(d, OiwObjectIdentifiers.DsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.dsa); + AddCertSigAlgOid(d, OiwObjectIdentifiers.Sha1WithRsa, HashAlgorithm.sha1, SignatureAlgorithm.rsa); + + AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha1WithRsaEncryption, HashAlgorithm.sha1, SignatureAlgorithm.rsa); + AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha224WithRsaEncryption, HashAlgorithm.sha224, SignatureAlgorithm.rsa); + AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha256WithRsaEncryption, HashAlgorithm.sha256, SignatureAlgorithm.rsa); + AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha384WithRsaEncryption, HashAlgorithm.sha384, SignatureAlgorithm.rsa); + AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha512WithRsaEncryption, HashAlgorithm.sha512, SignatureAlgorithm.rsa); + + AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, X9ObjectIdentifiers.IdDsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.dsa); + + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_1, HashAlgorithm.sha1, SignatureAlgorithm.rsa); + AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_256, HashAlgorithm.sha256, SignatureAlgorithm.rsa); + + AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa); + AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa); + + AddCertSigAlgOid(d, EdECObjectIdentifiers.id_Ed25519, SignatureAndHashAlgorithm.ed25519); + AddCertSigAlgOid(d, EdECObjectIdentifiers.id_Ed448, SignatureAndHashAlgorithm.ed448); + + AddCertSigAlgOid(d, RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256, + SignatureAndHashAlgorithm.gostr34102012_256); + AddCertSigAlgOid(d, RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512, + SignatureAndHashAlgorithm.gostr34102012_512); + + // TODO[RFC 8998] + //AddCertSigAlgOid(d, GMObjectIdentifiers.sm2sign_with_sm3, HashAlgorithm.sm3, SignatureAlgorithm.sm2); + + return d; + } + + private static IList CreateDefaultSupportedSigAlgs() + { + var result = new List(); + result.Add(SignatureAndHashAlgorithm.ed25519); + result.Add(SignatureAndHashAlgorithm.ed448); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha256); + result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha384); + result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha512); + result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha256); + result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha384); + result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha512); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.rsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.rsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.rsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.dsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.dsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.dsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.rsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.dsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.rsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.dsa)); + return result; + } + + public static readonly byte[] EmptyBytes = new byte[0]; + public static readonly short[] EmptyShorts = new short[0]; + public static readonly int[] EmptyInts = new int[0]; + public static readonly long[] EmptyLongs = new long[0]; + public static readonly string[] EmptyStrings = new string[0]; + + internal static short MinimumHashStrict = HashAlgorithm.sha1; + internal static short MinimumHashPreferred = HashAlgorithm.sha256; + + public static void CheckUint8(short i) + { + if (!IsValidUint8(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint8(int i) + { + if (!IsValidUint8(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint8(long i) + { + if (!IsValidUint8(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint16(int i) + { + if (!IsValidUint16(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint16(long i) + { + if (!IsValidUint16(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint24(int i) + { + if (!IsValidUint24(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint24(long i) + { + if (!IsValidUint24(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint32(long i) + { + if (!IsValidUint32(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint48(long i) + { + if (!IsValidUint48(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static void CheckUint64(long i) + { + if (!IsValidUint64(i)) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public static bool IsValidUint8(short i) + { + return (i & 0xFF) == i; + } + + public static bool IsValidUint8(int i) + { + return (i & 0xFF) == i; + } + + public static bool IsValidUint8(long i) + { + return (i & 0xFFL) == i; + } + + public static bool IsValidUint16(int i) + { + return (i & 0xFFFF) == i; + } + + public static bool IsValidUint16(long i) + { + return (i & 0xFFFFL) == i; + } + + public static bool IsValidUint24(int i) + { + return (i & 0xFFFFFF) == i; + } + + public static bool IsValidUint24(long i) + { + return (i & 0xFFFFFFL) == i; + } + + public static bool IsValidUint32(long i) + { + return (i & 0xFFFFFFFFL) == i; + } + + public static bool IsValidUint48(long i) + { + return (i & 0xFFFFFFFFFFFFL) == i; + } + + public static bool IsValidUint64(long i) + { + return true; + } + + public static bool IsSsl(TlsContext context) + { + return context.ServerVersion.IsSsl; + } + + public static bool IsTlsV10(ProtocolVersion version) + { + return ProtocolVersion.TLSv10.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV10(TlsContext context) + { + return IsTlsV10(context.ServerVersion); + } + + public static bool IsTlsV11(ProtocolVersion version) + { + return ProtocolVersion.TLSv11.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV11(TlsContext context) + { + return IsTlsV11(context.ServerVersion); + } + + public static bool IsTlsV12(ProtocolVersion version) + { + return ProtocolVersion.TLSv12.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV12(TlsContext context) + { + return IsTlsV12(context.ServerVersion); + } + + public static bool IsTlsV13(ProtocolVersion version) + { + return ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV13(TlsContext context) + { + return IsTlsV13(context.ServerVersion); + } + + public static void WriteUint8(short i, Stream output) + { + output.WriteByte((byte)i); + } + + public static void WriteUint8(int i, Stream output) + { + output.WriteByte((byte)i); + } + + public static void WriteUint8(short i, byte[] buf, int offset) + { + buf[offset] = (byte)i; + } + + public static void WriteUint8(int i, byte[] buf, int offset) + { + buf[offset] = (byte)i; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void WriteUint8(int i, Span buf) + { + buf[0] = (byte)i; + } +#endif + + public static void WriteUint16(int i, Stream output) + { + output.WriteByte((byte)(i >> 8)); + output.WriteByte((byte)i); + } + + public static void WriteUint16(int i, byte[] buf, int offset) + { + buf[offset ] = (byte)(i >> 8); + buf[offset + 1] = (byte)i; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void WriteUint16(int i, Span buf) + { + buf[0] = (byte)(i >> 8); + buf[1] = (byte)i; + } +#endif + + public static void WriteUint24(int i, Stream output) + { + output.WriteByte((byte)(i >> 16)); + output.WriteByte((byte)(i >> 8)); + output.WriteByte((byte)i); + } + + public static void WriteUint24(int i, byte[] buf, int offset) + { + buf[offset ] = (byte)(i >> 16); + buf[offset + 1] = (byte)(i >> 8); + buf[offset + 2] = (byte)i; + } + + public static void WriteUint32(long i, Stream output) + { + output.WriteByte((byte)(i >> 24)); + output.WriteByte((byte)(i >> 16)); + output.WriteByte((byte)(i >> 8)); + output.WriteByte((byte)i); + } + + public static void WriteUint32(long i, byte[] buf, int offset) + { + buf[offset ] = (byte)(i >> 24); + buf[offset + 1] = (byte)(i >> 16); + buf[offset + 2] = (byte)(i >> 8); + buf[offset + 3] = (byte)i; + } + + public static void WriteUint48(long i, Stream output) + { + output.WriteByte((byte)(i >> 40)); + output.WriteByte((byte)(i >> 32)); + output.WriteByte((byte)(i >> 24)); + output.WriteByte((byte)(i >> 16)); + output.WriteByte((byte)(i >> 8)); + output.WriteByte((byte)i); + } + + public static void WriteUint48(long i, byte[] buf, int offset) + { + buf[offset ] = (byte)(i >> 40); + buf[offset + 1] = (byte)(i >> 32); + buf[offset + 2] = (byte)(i >> 24); + buf[offset + 3] = (byte)(i >> 16); + buf[offset + 4] = (byte)(i >> 8); + buf[offset + 5] = (byte)i; + } + + public static void WriteUint64(long i, Stream output) + { + output.WriteByte((byte)(i >> 56)); + output.WriteByte((byte)(i >> 48)); + output.WriteByte((byte)(i >> 40)); + output.WriteByte((byte)(i >> 32)); + output.WriteByte((byte)(i >> 24)); + output.WriteByte((byte)(i >> 16)); + output.WriteByte((byte)(i >> 8)); + output.WriteByte((byte) i); + } + + public static void WriteUint64(long i, byte[] buf, int offset) + { + buf[offset ] = (byte)(i >> 56); + buf[offset + 1] = (byte)(i >> 48); + buf[offset + 2] = (byte)(i >> 40); + buf[offset + 3] = (byte)(i >> 32); + buf[offset + 4] = (byte)(i >> 24); + buf[offset + 5] = (byte)(i >> 16); + buf[offset + 6] = (byte)(i >> 8); + buf[offset + 7] = (byte)i; + } + + public static void WriteOpaque8(byte[] buf, Stream output) + { + CheckUint8(buf.Length); + WriteUint8(buf.Length, output); + output.Write(buf, 0, buf.Length); + } + + public static void WriteOpaque8(byte[] data, byte[] buf, int off) + { + CheckUint8(data.Length); + WriteUint8(data.Length, buf, off); + Array.Copy(data, 0, buf, off + 1, data.Length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void WriteOpaque8(ReadOnlySpan data, Span buf) + { + CheckUint8(data.Length); + WriteUint8(data.Length, buf); + data.CopyTo(buf[1..]); + } +#endif + + public static void WriteOpaque16(byte[] buf, Stream output) + { + CheckUint16(buf.Length); + WriteUint16(buf.Length, output); + output.Write(buf, 0, buf.Length); + } + + public static void WriteOpaque16(byte[] data, byte[] buf, int off) + { + CheckUint16(data.Length); + WriteUint16(data.Length, buf, off); + Array.Copy(data, 0, buf, off + 2, data.Length); + } + + public static void WriteOpaque24(byte[] buf, Stream output) + { + CheckUint24(buf.Length); + WriteUint24(buf.Length, output); + output.Write(buf, 0, buf.Length); + } + + public static void WriteOpaque24(byte[] data, byte[] buf, int off) + { + CheckUint24(data.Length); + WriteUint24(data.Length, buf, off); + Array.Copy(data, 0, buf, off + 3, data.Length); + } + + public static void WriteUint8Array(short[] u8s, Stream output) + { + for (int i = 0; i < u8s.Length; ++i) + { + WriteUint8(u8s[i], output); + } + } + + public static void WriteUint8Array(short[] u8s, byte[] buf, int offset) + { + for (int i = 0; i < u8s.Length; ++i) + { + WriteUint8(u8s[i], buf, offset); + ++offset; + } + } + + public static void WriteUint8ArrayWithUint8Length(short[] u8s, Stream output) + { + CheckUint8(u8s.Length); + WriteUint8(u8s.Length, output); + WriteUint8Array(u8s, output); + } + + public static void WriteUint8ArrayWithUint8Length(short[] u8s, byte[] buf, int offset) + { + CheckUint8(u8s.Length); + WriteUint8(u8s.Length, buf, offset); + WriteUint8Array(u8s, buf, offset + 1); + } + + public static void WriteUint16Array(int[] u16s, Stream output) + { + for (int i = 0; i < u16s.Length; ++i) + { + WriteUint16(u16s[i], output); + } + } + + public static void WriteUint16Array(int[] u16s, byte[] buf, int offset) + { + for (int i = 0; i < u16s.Length; ++i) + { + WriteUint16(u16s[i], buf, offset); + offset += 2; + } + } + + public static void WriteUint16ArrayWithUint8Length(int[] u16s, byte[] buf, int offset) + { + int length = 2 * u16s.Length; + CheckUint8(length); + WriteUint8(length, buf, offset); + WriteUint16Array(u16s, buf, offset + 1); + } + + public static void WriteUint16ArrayWithUint16Length(int[] u16s, Stream output) + { + int length = 2 * u16s.Length; + CheckUint16(length); + WriteUint16(length, output); + WriteUint16Array(u16s, output); + } + + public static void WriteUint16ArrayWithUint16Length(int[] u16s, byte[] buf, int offset) + { + int length = 2 * u16s.Length; + CheckUint16(length); + WriteUint16(length, buf, offset); + WriteUint16Array(u16s, buf, offset + 2); + } + + public static byte[] DecodeOpaque8(byte[] buf) + { + return DecodeOpaque8(buf, 0); + } + + public static byte[] DecodeOpaque8(byte[] buf, int minLength) + { + if (buf == null) + throw new ArgumentNullException("buf"); + if (buf.Length < 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + short length = ReadUint8(buf, 0); + if (buf.Length != (length + 1) || length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return CopyOfRangeExact(buf, 1, buf.Length); + } + + public static byte[] DecodeOpaque16(byte[] buf) + { + return DecodeOpaque16(buf, 0); + } + + public static byte[] DecodeOpaque16(byte[] buf, int minLength) + { + if (buf == null) + throw new ArgumentNullException("buf"); + if (buf.Length < 2) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int length = ReadUint16(buf, 0); + if (buf.Length != (length + 2) || length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return CopyOfRangeExact(buf, 2, buf.Length); + } + + public static short DecodeUint8(byte[] buf) + { + if (buf == null) + throw new ArgumentNullException("buf"); + if (buf.Length != 1) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadUint8(buf, 0); + } + + public static short[] DecodeUint8ArrayWithUint8Length(byte[] buf) + { + if (buf == null) + throw new ArgumentNullException("buf"); + + int count = ReadUint8(buf, 0); + if (buf.Length != (count + 1)) + throw new TlsFatalAlert(AlertDescription.decode_error); + + short[] uints = new short[count]; + for (int i = 0; i < count; ++i) + { + uints[i] = ReadUint8(buf, i + 1); + } + return uints; + } + + public static int DecodeUint16(byte[] buf) + { + if (buf == null) + throw new ArgumentNullException("buf"); + if (buf.Length != 2) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadUint16(buf, 0); + } + + public static int[] DecodeUint16ArrayWithUint8Length(byte[] buf) + { + if (buf == null) + throw new ArgumentNullException("buf"); + + int length = ReadUint8(buf, 0); + if (buf.Length != (length + 1) || (length & 1) != 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int count = length / 2, pos = 1; + int[] u16s = new int[count]; + for (int i = 0; i < count; ++i) + { + u16s[i] = ReadUint16(buf, pos); + pos += 2; + } + return u16s; + } + + public static long DecodeUint32(byte[] buf) + { + if (buf == null) + throw new ArgumentNullException("buf"); + if (buf.Length != 4) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadUint32(buf, 0); + } + + public static byte[] EncodeOpaque8(byte[] buf) + { + CheckUint8(buf.Length); + return Arrays.Prepend(buf, (byte)buf.Length); + } + + public static byte[] EncodeOpaque16(byte[] buf) + { + CheckUint16(buf.Length); + byte[] r = new byte[2 + buf.Length]; + WriteUint16(buf.Length, r, 0); + Array.Copy(buf, 0, r, 2, buf.Length); + return r; + } + + public static byte[] EncodeOpaque24(byte[] buf) + { + CheckUint24(buf.Length); + byte[] r = new byte[3 + buf.Length]; + WriteUint24(buf.Length, r, 0); + Array.Copy(buf, 0, r, 3, buf.Length); + return r; + } + + public static byte[] EncodeUint8(short u8) + { + CheckUint8(u8); + + byte[] encoding = new byte[1]; + WriteUint8(u8, encoding, 0); + return encoding; + } + + public static byte[] EncodeUint8ArrayWithUint8Length(short[] u8s) + { + byte[] result = new byte[1 + u8s.Length]; + WriteUint8ArrayWithUint8Length(u8s, result, 0); + return result; + } + + public static byte[] EncodeUint16(int u16) + { + CheckUint16(u16); + + byte[] encoding = new byte[2]; + WriteUint16(u16, encoding, 0); + return encoding; + } + + public static byte[] EncodeUint16ArrayWithUint8Length(int[] u16s) + { + int length = 2 * u16s.Length; + byte[] result = new byte[1 + length]; + WriteUint16ArrayWithUint8Length(u16s, result, 0); + return result; + } + + public static byte[] EncodeUint16ArrayWithUint16Length(int[] u16s) + { + int length = 2 * u16s.Length; + byte[] result = new byte[2 + length]; + WriteUint16ArrayWithUint16Length(u16s, result, 0); + return result; + } + + public static byte[] EncodeUint24(int u24) + { + CheckUint24(u24); + + byte[] encoding = new byte[3]; + WriteUint24(u24, encoding, 0); + return encoding; + } + + public static byte[] EncodeUint32(long u32) + { + CheckUint32(u32); + + byte[] encoding = new byte[4]; + WriteUint32(u32, encoding, 0); + return encoding; + } + + public static byte[] EncodeVersion(ProtocolVersion version) + { + return new byte[]{ + (byte)version.MajorVersion, + (byte)version.MinorVersion + }; + } + + public static int ReadInt32(byte[] buf, int offset) + { + int n = buf[offset] << 24; + n |= (buf[++offset] & 0xff) << 16; + n |= (buf[++offset] & 0xff) << 8; + n |= (buf[++offset] & 0xff); + return n; + } + + public static short ReadUint8(Stream input) + { + int i = input.ReadByte(); + if (i < 0) + throw new EndOfStreamException(); + return (short)i; + } + + public static short ReadUint8(byte[] buf, int offset) + { + return (short)buf[offset]; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static short ReadUint8(ReadOnlySpan buffer) + { + return (short)buffer[0]; + } +#endif + + public static int ReadUint16(Stream input) + { + int i1 = input.ReadByte(); + int i2 = input.ReadByte(); + if (i2 < 0) + throw new EndOfStreamException(); + return (i1 << 8) | i2; + } + + public static int ReadUint16(byte[] buf, int offset) + { + int n = (buf[offset] & 0xff) << 8; + n |= (buf[++offset] & 0xff); + return n; + } + + public static int ReadUint24(Stream input) + { + int i1 = input.ReadByte(); + int i2 = input.ReadByte(); + int i3 = input.ReadByte(); + if (i3 < 0) + throw new EndOfStreamException(); + + return (i1 << 16) | (i2 << 8) | i3; + } + + public static int ReadUint24(byte[] buf, int offset) + { + int n = (buf[offset] & 0xff) << 16; + n |= (buf[++offset] & 0xff) << 8; + n |= (buf[++offset] & 0xff); + return n; + } + + public static long ReadUint32(Stream input) + { + int i1 = input.ReadByte(); + int i2 = input.ReadByte(); + int i3 = input.ReadByte(); + int i4 = input.ReadByte(); + if (i4 < 0) + throw new EndOfStreamException(); + + return ((i1 << 24) | (i2 << 16) | (i3 << 8) | i4) & 0xFFFFFFFFL; + } + + public static long ReadUint32(byte[] buf, int offset) + { + int n = (buf[offset] & 0xff) << 24; + n |= (buf[++offset] & 0xff) << 16; + n |= (buf[++offset] & 0xff) << 8; + n |= (buf[++offset] & 0xff); + return n & 0xFFFFFFFFL; + } + + public static long ReadUint48(Stream input) + { + int hi = ReadUint24(input); + int lo = ReadUint24(input); + return ((long)(hi & 0xffffffffL) << 24) | (long)(lo & 0xffffffffL); + } + + public static long ReadUint48(byte[] buf, int offset) + { + int hi = ReadUint24(buf, offset); + int lo = ReadUint24(buf, offset + 3); + return ((long)(hi & 0xffffffffL) << 24) | (long)(lo & 0xffffffffL); + } + + public static byte[] ReadAllOrNothing(int length, Stream input) + { + if (length < 1) + return EmptyBytes; + byte[] buf = new byte[length]; + int read = Streams.ReadFully(input, buf); + if (read == 0) + return null; + if (read != length) + throw new EndOfStreamException(); + return buf; + } + + public static byte[] ReadFully(int length, Stream input) + { + if (length < 1) + return EmptyBytes; + byte[] buf = new byte[length]; + if (length != Streams.ReadFully(input, buf)) + throw new EndOfStreamException(); + return buf; + } + + public static void ReadFully(byte[] buf, Stream input) + { + int length = buf.Length; + if (length > 0 && length != Streams.ReadFully(input, buf)) + throw new EndOfStreamException(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void ReadFully(Span buf, Stream input) + { + int length = buf.Length; + if (length > 0 && length != Streams.ReadFully(input, buf)) + throw new EndOfStreamException(); + } +#endif + + public static byte[] ReadOpaque8(Stream input) + { + short length = ReadUint8(input); + return ReadFully(length, input); + } + + public static byte[] ReadOpaque8(Stream input, int minLength) + { + short length = ReadUint8(input); + if (length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadFully(length, input); + } + + public static byte[] ReadOpaque8(Stream input, int minLength, int maxLength) + { + short length = ReadUint8(input); + if (length < minLength || maxLength < length) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadFully(length, input); + } + + public static byte[] ReadOpaque16(Stream input) + { + int length = ReadUint16(input); + return ReadFully(length, input); + } + + public static byte[] ReadOpaque16(Stream input, int minLength) + { + int length = ReadUint16(input); + if (length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadFully(length, input); + } + + public static byte[] ReadOpaque24(Stream input) + { + int length = ReadUint24(input); + return ReadFully(length, input); + } + + public static byte[] ReadOpaque24(Stream input, int minLength) + { + int length = ReadUint24(input); + if (length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadFully(length, input); + } + + public static short[] ReadUint8Array(int count, Stream input) + { + short[] uints = new short[count]; + for (int i = 0; i < count; ++i) + { + uints[i] = ReadUint8(input); + } + return uints; + } + + public static short[] ReadUint8ArrayWithUint8Length(Stream input, int minLength) + { + int length = ReadUint8(input); + if (length < minLength) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return ReadUint8Array(length, input); + } + + public static int[] ReadUint16Array(int count, Stream input) + { + int[] uints = new int[count]; + for (int i = 0; i < count; ++i) + { + uints[i] = ReadUint16(input); + } + return uints; + } + + public static ProtocolVersion ReadVersion(byte[] buf, int offset) + { + return ProtocolVersion.Get(buf[offset], buf[offset + 1]); + } + + public static ProtocolVersion ReadVersion(Stream input) + { + int i1 = input.ReadByte(); + int i2 = input.ReadByte(); + if (i2 < 0) + throw new EndOfStreamException(); + + return ProtocolVersion.Get(i1, i2); + } + + public static Asn1Object ReadAsn1Object(byte[] encoding) + { + Asn1InputStream asn1 = new Asn1InputStream(encoding); + Asn1Object result = asn1.ReadObject(); + if (null == result) + throw new TlsFatalAlert(AlertDescription.decode_error); + if (null != asn1.ReadObject()) + throw new TlsFatalAlert(AlertDescription.decode_error); + + return result; + } + + /// + public static void RequireDerEncoding(Asn1Encodable asn1, byte[] encoding) + { + /* + * NOTE: The current ASN.1 parsing code can't enforce DER-only parsing, but since DER is + * canonical, we can check it by re-encoding the result and comparing to the original. + */ + byte[] check = asn1.GetEncoded(Asn1Encodable.Der); + if (!Arrays.AreEqual(check, encoding)) + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + public static void WriteGmtUnixTime(byte[] buf, int offset) + { + int t = (int)(DateTimeUtilities.CurrentUnixMs() / 1000L); + buf[offset ] = (byte)(t >> 24); + buf[offset + 1] = (byte)(t >> 16); + buf[offset + 2] = (byte)(t >> 8); + buf[offset + 3] = (byte)t; + } + + public static void WriteVersion(ProtocolVersion version, Stream output) + { + output.WriteByte((byte)version.MajorVersion); + output.WriteByte((byte)version.MinorVersion); + } + + public static void WriteVersion(ProtocolVersion version, byte[] buf, int offset) + { + buf[offset] = (byte)version.MajorVersion; + buf[offset + 1] = (byte)version.MinorVersion; + } + + public static void AddIfSupported(IList supportedAlgs, TlsCrypto crypto, + SignatureAndHashAlgorithm alg) + { + if (crypto.HasSignatureAndHashAlgorithm(alg)) + { + supportedAlgs.Add(alg); + } + } + + public static void AddIfSupported(IList supportedGroups, TlsCrypto crypto, int namedGroup) + { + if (crypto.HasNamedGroup(namedGroup)) + { + supportedGroups.Add(namedGroup); + } + } + + public static void AddIfSupported(IList supportedGroups, TlsCrypto crypto, int[] namedGroups) + { + for (int i = 0; i < namedGroups.Length; ++i) + { + AddIfSupported(supportedGroups, crypto, namedGroups[i]); + } + } + + public static bool AddToSet(IList s, T i) + { + bool result = !s.Contains(i); + if (result) + { + s.Add(i); + } + return result; + } + + public static IList GetDefaultDssSignatureAlgorithms() + { + return GetDefaultSignatureAlgorithms(SignatureAlgorithm.dsa); + } + + public static IList GetDefaultECDsaSignatureAlgorithms() + { + return GetDefaultSignatureAlgorithms(SignatureAlgorithm.ecdsa); + } + + public static IList GetDefaultRsaSignatureAlgorithms() + { + return GetDefaultSignatureAlgorithms(SignatureAlgorithm.rsa); + } + + public static SignatureAndHashAlgorithm GetDefaultSignatureAlgorithm(short signatureAlgorithm) + { + /* + * RFC 5246 7.4.1.4.1. If the client does not send the signature_algorithms extension, + * the server MUST do the following: + * + * - If the negotiated key exchange algorithm is one of (RSA, DHE_RSA, DH_RSA, RSA_PSK, + * ECDH_RSA, ECDHE_RSA), behave as if client had sent the value {sha1,rsa}. + * + * - If the negotiated key exchange algorithm is one of (DHE_DSS, DH_DSS), behave as if + * the client had sent the value {sha1,dsa}. + * + * - If the negotiated key exchange algorithm is one of (ECDH_ECDSA, ECDHE_ECDSA), + * behave as if the client had sent value {sha1,ecdsa}. + */ + + switch (signatureAlgorithm) + { + case SignatureAlgorithm.dsa: + case SignatureAlgorithm.ecdsa: + case SignatureAlgorithm.rsa: + return SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, signatureAlgorithm); + default: + return null; + } + } + + public static IList GetDefaultSignatureAlgorithms(short signatureAlgorithm) + { + SignatureAndHashAlgorithm sigAndHashAlg = GetDefaultSignatureAlgorithm(signatureAlgorithm); + + return null == sigAndHashAlg ? new List() : VectorOfOne(sigAndHashAlg); + } + + public static IList GetDefaultSupportedSignatureAlgorithms(TlsContext context) + { + return GetSupportedSignatureAlgorithms(context, DefaultSupportedSigAlgs); + } + + public static IList GetSupportedSignatureAlgorithms(TlsContext context, + IList candidates) + { + TlsCrypto crypto = context.Crypto; + + var result = new List(candidates.Count); + foreach (SignatureAndHashAlgorithm sigAndHashAlg in candidates) + { + AddIfSupported(result, crypto, sigAndHashAlg); + } + return result; + } + + internal static SignatureAndHashAlgorithm GetSignatureAndHashAlgorithm(ProtocolVersion negotiatedVersion, + TlsCredentialedSigner credentialedSigner) + { + SignatureAndHashAlgorithm signatureAndHashAlgorithm = null; + if (IsSignatureAlgorithmsExtensionAllowed(negotiatedVersion)) + { + signatureAndHashAlgorithm = credentialedSigner.SignatureAndHashAlgorithm; + if (signatureAndHashAlgorithm == null) + { + /* + * RFC 5246 4.7. digitally-signed element needs SignatureAndHashAlgorithm from TLS 1.2 + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + return signatureAndHashAlgorithm; + } + + public static byte[] GetExtensionData(IDictionary extensions, int extensionType) + { + if (extensions == null || !extensions.TryGetValue(extensionType, out var extensionData)) + return null; + + return extensionData; + } + + public static bool HasExpectedEmptyExtensionData(IDictionary extensions, int extensionType, + short alertDescription) + { + byte[] extension_data = GetExtensionData(extensions, extensionType); + if (extension_data == null) + return false; + + if (extension_data.Length != 0) + throw new TlsFatalAlert(alertDescription); + + return true; + } + + public static TlsSession ImportSession(byte[] sessionID, SessionParameters sessionParameters) + { + return new TlsSessionImpl(sessionID, sessionParameters); + } + + internal static bool IsExtendedMasterSecretOptionalDtls(ProtocolVersion[] activeProtocolVersions) + { + return ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.DTLSv12) + || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.DTLSv10); + } + + internal static bool IsExtendedMasterSecretOptionalTls(ProtocolVersion[] activeProtocolVersions) + { + return ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv12) + || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv11) + || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv10); + } + + public static bool IsNullOrContainsNull(object[] array) + { + if (null == array) + return true; + + int count = array.Length; + for (int i = 0; i < count; ++i) + { + if (null == array[i]) + return true; + } + return false; + } + + public static bool IsNullOrEmpty(T[] array) + { + return null == array || array.Length < 1; + } + + public static bool IsNullOrEmpty(string s) + { + return null == s || s.Length < 1; + } + + public static bool IsNullOrEmpty(IList v) + { + return null == v || v.Count < 1; + } + + public static bool IsSignatureAlgorithmsExtensionAllowed(ProtocolVersion version) + { + return null != version + && ProtocolVersion.TLSv12.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static short GetLegacyClientCertType(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + return ClientCertificateType.rsa_sign; + case SignatureAlgorithm.dsa: + return ClientCertificateType.dss_sign; + case SignatureAlgorithm.ecdsa: + return ClientCertificateType.ecdsa_sign; + default: + return -1; + } + } + + public static short GetLegacySignatureAlgorithmClient(short clientCertificateType) + { + switch (clientCertificateType) + { + case ClientCertificateType.dss_sign: + return SignatureAlgorithm.dsa; + case ClientCertificateType.ecdsa_sign: + return SignatureAlgorithm.ecdsa; + case ClientCertificateType.rsa_sign: + return SignatureAlgorithm.rsa; + default: + return -1; + } + } + + public static short GetLegacySignatureAlgorithmClientCert(short clientCertificateType) + { + switch (clientCertificateType) + { + case ClientCertificateType.dss_sign: + case ClientCertificateType.dss_fixed_dh: + return SignatureAlgorithm.dsa; + + case ClientCertificateType.ecdsa_sign: + case ClientCertificateType.ecdsa_fixed_ecdh: + return SignatureAlgorithm.ecdsa; + + case ClientCertificateType.rsa_sign: + case ClientCertificateType.rsa_fixed_dh: + case ClientCertificateType.rsa_fixed_ecdh: + return SignatureAlgorithm.rsa; + default: + return -1; + } + } + + public static short GetLegacySignatureAlgorithmServer(int keyExchangeAlgorithm) + { + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.SRP_DSS: + return SignatureAlgorithm.dsa; + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + return SignatureAlgorithm.ecdsa; + + case KeyExchangeAlgorithm.DHE_RSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + case KeyExchangeAlgorithm.SRP_RSA: + return SignatureAlgorithm.rsa; + + default: + return -1; + } + } + + public static short GetLegacySignatureAlgorithmServerCert(int keyExchangeAlgorithm) + { + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.SRP_DSS: + return SignatureAlgorithm.dsa; + + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDHE_ECDSA: + return SignatureAlgorithm.ecdsa; + + case KeyExchangeAlgorithm.DH_RSA: + case KeyExchangeAlgorithm.DHE_RSA: + case KeyExchangeAlgorithm.ECDH_RSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + case KeyExchangeAlgorithm.RSA: + case KeyExchangeAlgorithm.RSA_PSK: + case KeyExchangeAlgorithm.SRP_RSA: + return SignatureAlgorithm.rsa; + + default: + return -1; + } + } + + public static IList GetLegacySupportedSignatureAlgorithms() + { + var result = new List(3); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.dsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.ecdsa)); + result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.rsa)); + return result; + } + + /// + public static void EncodeSupportedSignatureAlgorithms( + IList supportedSignatureAlgorithms, Stream output) + { + if (supportedSignatureAlgorithms == null || + supportedSignatureAlgorithms.Count < 1 || + supportedSignatureAlgorithms.Count >= (1 << 15)) + { + throw new ArgumentException("must have length from 1 to (2^15 - 1)", "supportedSignatureAlgorithms"); + } + + // supported_signature_algorithms + int length = 2 * supportedSignatureAlgorithms.Count; + CheckUint16(length); + WriteUint16(length, output); + foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms) + { + if (entry.Signature == SignatureAlgorithm.anonymous) + { + /* + * RFC 5246 7.4.1.4.1 The "anonymous" value is meaningless in this context but used + * in Section 7.4.3. It MUST NOT appear in this extension. + */ + throw new ArgumentException( + "SignatureAlgorithm.anonymous MUST NOT appear in the signature_algorithms extension"); + } + entry.Encode(output); + } + } + + /// + public static IList ParseSupportedSignatureAlgorithms(Stream input) + { + // supported_signature_algorithms + int length = ReadUint16(input); + if (length < 2 || (length & 1) != 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int count = length / 2; + var supportedSignatureAlgorithms = new List(count); + for (int i = 0; i < count; ++i) + { + SignatureAndHashAlgorithm sigAndHashAlg = SignatureAndHashAlgorithm.Parse(input); + + if (SignatureAlgorithm.anonymous != sigAndHashAlg.Signature) + { + supportedSignatureAlgorithms.Add(sigAndHashAlg); + } + } + return supportedSignatureAlgorithms; + } + + /// + public static void VerifySupportedSignatureAlgorithm( + IList supportedSignatureAlgorithms, SignatureAndHashAlgorithm signatureAlgorithm) + { + VerifySupportedSignatureAlgorithm(supportedSignatureAlgorithms, signatureAlgorithm, + AlertDescription.illegal_parameter); + } + + /// + internal static void VerifySupportedSignatureAlgorithm( + IList supportedSignatureAlgorithms, SignatureAndHashAlgorithm signatureAlgorithm, + short alertDescription) + { + if (supportedSignatureAlgorithms == null || supportedSignatureAlgorithms.Count < 1 + || supportedSignatureAlgorithms.Count >= (1 << 15)) + { + throw new ArgumentException("must have length from 1 to (2^15 - 1)", "supportedSignatureAlgorithms"); + } + if (signatureAlgorithm == null) + throw new ArgumentNullException("signatureAlgorithm"); + + if (signatureAlgorithm.Signature == SignatureAlgorithm.anonymous + || !ContainsSignatureAlgorithm(supportedSignatureAlgorithms, signatureAlgorithm)) + { + throw new TlsFatalAlert(alertDescription); + } + } + + /// + public static bool ContainsSignatureAlgorithm(IList supportedSignatureAlgorithms, + SignatureAndHashAlgorithm signatureAlgorithm) + { + foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms) + { + if (entry.Equals(signatureAlgorithm)) + return true; + } + + return false; + } + + public static bool ContainsAnySignatureAlgorithm(IList supportedSignatureAlgorithms, + short signatureAlgorithm) + { + foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms) + { + if (entry.Signature == signatureAlgorithm) + return true; + } + + return false; + } + + public static TlsSecret Prf(SecurityParameters securityParameters, TlsSecret secret, string asciiLabel, + byte[] seed, int length) + { + return secret.DeriveUsingPrf(securityParameters.PrfAlgorithm, asciiLabel, seed, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static TlsSecret Prf(SecurityParameters securityParameters, TlsSecret secret, + ReadOnlySpan asciiLabel, ReadOnlySpan seed, int length) + { + return secret.DeriveUsingPrf(securityParameters.PrfAlgorithm, asciiLabel, seed, length); + } +#endif + + public static byte[] Clone(byte[] data) + { + return null == data ? null : data.Length == 0 ? EmptyBytes : (byte[])data.Clone(); + } + + public static string[] Clone(string[] s) + { + return null == s ? null : s.Length < 1 ? EmptyStrings : (string[])s.Clone(); + } + + public static bool ConstantTimeAreEqual(int len, byte[] a, int aOff, byte[] b, int bOff) + { + int d = 0; + for (int i = 0; i < len; ++i) + { + d |= a[aOff + i] ^ b[bOff + i]; + } + return 0 == d; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool ConstantTimeAreEqual(int len, Span a, int aOff, byte[] b, int bOff) + { + int d = 0; + for (int i = 0; i < len; ++i) + { + d |= a[aOff + i] ^ b[bOff + i]; + } + return 0 == d; + } +#endif + + public static byte[] CopyOfRangeExact(byte[] original, int from, int to) + { + int newLength = to - from; + byte[] copy = new byte[newLength]; + Array.Copy(original, from, copy, 0, newLength); + return copy; + } + + internal static byte[] Concat(byte[] a, byte[] b) + { + byte[] c = new byte[a.Length + b.Length]; + Array.Copy(a, 0, c, 0, a.Length); + Array.Copy(b, 0, c, a.Length, b.Length); + return c; + } + + /// + internal static byte[] CalculateEndPointHash(TlsContext context, TlsCertificate certificate, byte[] enc) + { + return CalculateEndPointHash(context, certificate, enc, 0, enc.Length); + } + + /// + internal static byte[] CalculateEndPointHash(TlsContext context, TlsCertificate certificate, byte[] enc, + int encOff, int encLen) + { + short hashAlgorithm = HashAlgorithm.none; + + string sigAlgOid = certificate.SigAlgOid; + if (sigAlgOid != null) + { + if (PkcsObjectIdentifiers.IdRsassaPss.Id.Equals(sigAlgOid)) + { + RsassaPssParameters pssParams = RsassaPssParameters.GetInstance(certificate.GetSigAlgParams()); + if (null != pssParams) + { + DerObjectIdentifier hashOid = pssParams.HashAlgorithm.Algorithm; + if (NistObjectIdentifiers.IdSha256.Equals(hashOid)) + { + hashAlgorithm = HashAlgorithm.sha256; + } + else if (NistObjectIdentifiers.IdSha384.Equals(hashOid)) + { + hashAlgorithm = HashAlgorithm.sha384; + } + else if (NistObjectIdentifiers.IdSha512.Equals(hashOid)) + { + hashAlgorithm = HashAlgorithm.sha512; + } + } + } + else + { + if (CertSigAlgOids.TryGetValue(sigAlgOid, out var algorithm)) + { + hashAlgorithm = algorithm.Hash; + } + } + } + + switch (hashAlgorithm) + { + case HashAlgorithm.Intrinsic: + hashAlgorithm = HashAlgorithm.none; + break; + case HashAlgorithm.md5: + case HashAlgorithm.sha1: + hashAlgorithm = HashAlgorithm.sha256; + break; + } + + if (HashAlgorithm.none != hashAlgorithm) + { + TlsHash hash = CreateHash(context.Crypto, hashAlgorithm); + if (hash != null) + { + hash.Update(enc, encOff, encLen); + return hash.CalculateHash(); + } + } + + return EmptyBytes; + } + + public static byte[] CalculateExporterSeed(SecurityParameters securityParameters, byte[] context) + { + byte[] cr = securityParameters.ClientRandom, sr = securityParameters.ServerRandom; + if (null == context) + return Arrays.Concatenate(cr, sr); + + if (!IsValidUint16(context.Length)) + throw new ArgumentException("must have length less than 2^16 (or be null)", "context"); + + byte[] contextLength = new byte[2]; + WriteUint16(context.Length, contextLength, 0); + + return Arrays.ConcatenateAll(cr, sr, contextLength, context); + } + + private static byte[] CalculateFinishedHmac(SecurityParameters securityParameters, TlsSecret baseKey, + byte[] transcriptHash) + { + int prfCryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm; + int prfHashLength = securityParameters.PrfHashLength; + + return CalculateFinishedHmac(prfCryptoHashAlgorithm, prfHashLength, baseKey, transcriptHash); + } + + private static byte[] CalculateFinishedHmac(int prfCryptoHashAlgorithm, int prfHashLength, TlsSecret baseKey, + byte[] transcriptHash) + { + TlsSecret finishedKey = TlsCryptoUtilities.HkdfExpandLabel(baseKey, prfCryptoHashAlgorithm, "finished", + EmptyBytes, prfHashLength); + + try + { + return finishedKey.CalculateHmac(prfCryptoHashAlgorithm, transcriptHash, 0, transcriptHash.Length); + } + finally + { + finishedKey.Destroy(); + } + } + + internal static TlsSecret CalculateMasterSecret(TlsContext context, TlsSecret preMasterSecret) + { + SecurityParameters sp = context.SecurityParameters; + + string asciiLabel; + byte[] seed; + if (sp.IsExtendedMasterSecret) + { + asciiLabel = ExporterLabel.extended_master_secret; + seed = sp.SessionHash; + } + else + { + asciiLabel = ExporterLabel.master_secret; + seed = Concat(sp.ClientRandom, sp.ServerRandom); + } + + return Prf(sp, preMasterSecret, asciiLabel, seed, 48); + } + + internal static byte[] CalculatePskBinder(TlsCrypto crypto, bool isExternalPsk, int pskCryptoHashAlgorithm, + TlsSecret earlySecret, byte[] transcriptHash) + { + int prfHashLength = TlsCryptoUtilities.GetHashOutputSize(pskCryptoHashAlgorithm); + + string label = isExternalPsk ? "ext binder" : "res binder"; + byte[] emptyTranscriptHash = crypto.CreateHash(pskCryptoHashAlgorithm).CalculateHash(); + + TlsSecret binderKey = DeriveSecret(pskCryptoHashAlgorithm, prfHashLength, earlySecret, label, + emptyTranscriptHash); + + try + { + return CalculateFinishedHmac(pskCryptoHashAlgorithm, prfHashLength, binderKey, transcriptHash); + } + finally + { + binderKey.Destroy(); + } + } + + internal static byte[] CalculateVerifyData(TlsContext context, TlsHandshakeHash handshakeHash, bool isServer) + { + SecurityParameters securityParameters = context.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (IsTlsV13(negotiatedVersion)) + { + TlsSecret baseKey = isServer + ? securityParameters.BaseKeyServer + : securityParameters.BaseKeyClient; + byte[] transcriptHash = GetCurrentPrfHash(handshakeHash); + + return CalculateFinishedHmac(securityParameters, baseKey, transcriptHash); + } + + if (negotiatedVersion.IsSsl) + { + return Ssl3Utilities.CalculateVerifyData(handshakeHash, isServer); + } + + string asciiLabel = isServer ? ExporterLabel.server_finished : ExporterLabel.client_finished; + byte[] prfHash = GetCurrentPrfHash(handshakeHash); + + TlsSecret master_secret = securityParameters.MasterSecret; + int verify_data_length = securityParameters.VerifyDataLength; + + return Prf(securityParameters, master_secret, asciiLabel, prfHash, verify_data_length).Extract(); + } + + internal static void Establish13PhaseSecrets(TlsContext context, TlsSecret pskEarlySecret, + TlsSecret sharedSecret) + { + TlsCrypto crypto = context.Crypto; + SecurityParameters securityParameters = context.SecurityParameters; + int cryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm; + TlsSecret zeros = crypto.HkdfInit(cryptoHashAlgorithm); + byte[] emptyTranscriptHash = crypto.CreateHash(cryptoHashAlgorithm).CalculateHash(); + + TlsSecret earlySecret = pskEarlySecret; + if (null == earlySecret) + { + earlySecret = crypto + .HkdfInit(cryptoHashAlgorithm) + .HkdfExtract(cryptoHashAlgorithm, zeros); + } + + if (null == sharedSecret) + { + sharedSecret = zeros; + } + + TlsSecret handshakeSecret = DeriveSecret(securityParameters, earlySecret, "derived", emptyTranscriptHash) + .HkdfExtract(cryptoHashAlgorithm, sharedSecret); + + if (sharedSecret != zeros) + { + sharedSecret.Destroy(); + } + + TlsSecret masterSecret = DeriveSecret(securityParameters, handshakeSecret, "derived", emptyTranscriptHash) + .HkdfExtract(cryptoHashAlgorithm, zeros); + + securityParameters.m_earlySecret = earlySecret; + securityParameters.m_handshakeSecret = handshakeSecret; + securityParameters.m_masterSecret = masterSecret; + } + + private static void Establish13TrafficSecrets(TlsContext context, byte[] transcriptHash, TlsSecret phaseSecret, + string clientLabel, string serverLabel, RecordStream recordStream) + { + SecurityParameters securityParameters = context.SecurityParameters; + + securityParameters.m_trafficSecretClient = DeriveSecret(securityParameters, phaseSecret, clientLabel, + transcriptHash); + + if (null != serverLabel) + { + securityParameters.m_trafficSecretServer = DeriveSecret(securityParameters, phaseSecret, serverLabel, + transcriptHash); + } + + // TODO[tls13] Early data (client->server only) + + recordStream.SetPendingCipher(InitCipher(context)); + } + + internal static void Establish13PhaseApplication(TlsContext context, byte[] serverFinishedTranscriptHash, + RecordStream recordStream) + { + SecurityParameters securityParameters = context.SecurityParameters; + TlsSecret phaseSecret = securityParameters.MasterSecret; + + Establish13TrafficSecrets(context, serverFinishedTranscriptHash, phaseSecret, "c ap traffic", + "s ap traffic", recordStream); + + securityParameters.m_exporterMasterSecret = DeriveSecret(securityParameters, phaseSecret, "exp master", + serverFinishedTranscriptHash); + + Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.CLIENT_TRAFFIC_SECRET_0, securityParameters); + Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.SERVER_TRAFFIC_SECRET_0, securityParameters); + Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.EXPORTER_SECRET, securityParameters); + } + + internal static void Establish13PhaseEarly(TlsContext context, byte[] clientHelloTranscriptHash, + RecordStream recordStream) + { + SecurityParameters securityParameters = context.SecurityParameters; + TlsSecret phaseSecret = securityParameters.EarlySecret; + + // TODO[tls13] binder_key + + // TODO[tls13] Early data (client->server only) + if (null != recordStream) + { + Establish13TrafficSecrets(context, clientHelloTranscriptHash, phaseSecret, "c e traffic", null, + recordStream); + } + + securityParameters.m_earlyExporterMasterSecret = DeriveSecret(securityParameters, phaseSecret, + "e exp master", clientHelloTranscriptHash); + } + + internal static void Establish13PhaseHandshake(TlsContext context, byte[] serverHelloTranscriptHash, + RecordStream recordStream) + { + SecurityParameters securityParameters = context.SecurityParameters; + TlsSecret phaseSecret = securityParameters.HandshakeSecret; + + Establish13TrafficSecrets(context, serverHelloTranscriptHash, phaseSecret, "c hs traffic", "s hs traffic", + recordStream); + + Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.CLIENT_HANDSHAKE_TRAFFIC_SECRET, securityParameters); + Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.SERVER_HANDSHAKE_TRAFFIC_SECRET, securityParameters); + + securityParameters.m_baseKeyClient = securityParameters.TrafficSecretClient; + securityParameters.m_baseKeyServer = securityParameters.TrafficSecretServer; + } + + internal static void Update13TrafficSecretLocal(TlsContext context) + { + Update13TrafficSecret(context, context.IsServer); + } + + internal static void Update13TrafficSecretPeer(TlsContext context) + { + Update13TrafficSecret(context, !context.IsServer); + } + + private static void Update13TrafficSecret(TlsContext context, bool forServer) + { + SecurityParameters securityParameters = context.SecurityParameters; + + TlsSecret current; + if (forServer) + { + current = securityParameters.TrafficSecretServer; + securityParameters.m_trafficSecretServer = Update13TrafficSecret(securityParameters, current); + } + else + { + current = securityParameters.TrafficSecretClient; + securityParameters.m_trafficSecretClient = Update13TrafficSecret(securityParameters, current); + } + + if (null != current) + { + current.Destroy(); + } + } + + private static TlsSecret Update13TrafficSecret(SecurityParameters securityParameters, TlsSecret secret) + { + return TlsCryptoUtilities.HkdfExpandLabel(secret, securityParameters.PrfCryptoHashAlgorithm, "traffic upd", + EmptyBytes, securityParameters.PrfHashLength); + } + + public static DerObjectIdentifier GetOidForHashAlgorithm(short hashAlgorithm) + { + switch (hashAlgorithm) + { + case HashAlgorithm.md5: + return PkcsObjectIdentifiers.MD5; + case HashAlgorithm.sha1: + return X509ObjectIdentifiers.IdSha1; + case HashAlgorithm.sha224: + return NistObjectIdentifiers.IdSha224; + case HashAlgorithm.sha256: + return NistObjectIdentifiers.IdSha256; + case HashAlgorithm.sha384: + return NistObjectIdentifiers.IdSha384; + case HashAlgorithm.sha512: + return NistObjectIdentifiers.IdSha512; + // TODO[RFC 8998] + //case HashAlgorithm.sm3: + // return GMObjectIdentifiers.sm3; + default: + throw new ArgumentException("invalid HashAlgorithm: " + HashAlgorithm.GetText(hashAlgorithm)); + } + } + + internal static int GetPrfAlgorithm(SecurityParameters securityParameters, int cipherSuite) + { + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + bool isTlsV13 = IsTlsV13(negotiatedVersion); + bool isTlsV12Exactly = !isTlsV13 && IsTlsV12(negotiatedVersion); + bool isSsl = negotiatedVersion.IsSsl; + + switch (cipherSuite) + { + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + { + if (isTlsV13) + return PrfAlgorithm.tls13_hkdf_sha256; + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + case CipherSuite.TLS_AES_256_GCM_SHA384: + { + if (isTlsV13) + return PrfAlgorithm.tls13_hkdf_sha384; + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + case CipherSuite.TLS_SM4_CCM_SM3: + case CipherSuite.TLS_SM4_GCM_SM3: + { + if (isTlsV13) + return PrfAlgorithm.tls13_hkdf_sm3; + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_NULL_SHA256: + { + if (isTlsV12Exactly) + return PrfAlgorithm.tls_prf_sha256; + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384: + { + if (isTlsV12Exactly) + return PrfAlgorithm.tls_prf_sha384; + + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384: + { + if (isTlsV13) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + if (isTlsV12Exactly) + return PrfAlgorithm.tls_prf_sha384; + + if (isSsl) + return PrfAlgorithm.ssl_prf_legacy; + + return PrfAlgorithm.tls_prf_legacy; + } + + default: + { + if (isTlsV13) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + if (isTlsV12Exactly) + return PrfAlgorithm.tls_prf_sha256; + + if (isSsl) + return PrfAlgorithm.ssl_prf_legacy; + + return PrfAlgorithm.tls_prf_legacy; + } + } + } + + internal static int GetPrfAlgorithm13(int cipherSuite) + { + // NOTE: GetPrfAlgorithms13 relies on the number of distinct return values + switch (cipherSuite) + { + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + return PrfAlgorithm.tls13_hkdf_sha256; + + case CipherSuite.TLS_AES_256_GCM_SHA384: + return PrfAlgorithm.tls13_hkdf_sha384; + + case CipherSuite.TLS_SM4_CCM_SM3: + case CipherSuite.TLS_SM4_GCM_SM3: + return PrfAlgorithm.tls13_hkdf_sm3; + + default: + return -1; + } + } + + internal static int[] GetPrfAlgorithms13(int[] cipherSuites) + { + int[] result = new int[System.Math.Min(3, cipherSuites.Length)]; + + int count = 0; + for (int i = 0; i < cipherSuites.Length; ++i) + { + int prfAlgorithm = GetPrfAlgorithm13(cipherSuites[i]); + if (prfAlgorithm >= 0 && !Arrays.Contains(result, prfAlgorithm)) + { + result[count++] = prfAlgorithm; + } + } + + return Truncate(result, count); + } + + internal static byte[] CalculateSignatureHash(TlsContext context, SignatureAndHashAlgorithm algorithm, + byte[] extraSignatureInput, DigestInputBuffer buf) + { + TlsCrypto crypto = context.Crypto; + + TlsHash h = algorithm == null + ? new CombinedHash(crypto) + : CreateHash(crypto, algorithm); + + SecurityParameters sp = context.SecurityParameters; + // NOTE: The implicit copy here is intended (and important) + byte[] randoms = Arrays.Concatenate(sp.ClientRandom, sp.ServerRandom); + h.Update(randoms, 0, randoms.Length); + + if (null != extraSignatureInput) + { + h.Update(extraSignatureInput, 0, extraSignatureInput.Length); + } + + buf.UpdateDigest(h); + + return h.CalculateHash(); + } + + internal static void SendSignatureInput(TlsContext context, byte[] extraSignatureInput, DigestInputBuffer buf, + Stream output) + { + SecurityParameters sp = context.SecurityParameters; + // NOTE: The implicit copy here is intended (and important) + byte[] randoms = Arrays.Concatenate(sp.ClientRandom, sp.ServerRandom); + output.Write(randoms, 0, randoms.Length); + + if (null != extraSignatureInput) + { + output.Write(extraSignatureInput, 0, extraSignatureInput.Length); + } + + buf.CopyInputTo(output); + + output.Dispose(); + } + + internal static DigitallySigned GenerateCertificateVerifyClient(TlsClientContext clientContext, + TlsCredentialedSigner clientAuthSigner, SignatureAndHashAlgorithm clientAuthAlgorithm, + TlsStreamSigner clientAuthStreamSigner, TlsHandshakeHash handshakeHash) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + if (IsTlsV13(securityParameters.NegotiatedVersion)) + { + // Should be using Generate13CertificateVerify instead + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + byte[] signature; + if (clientAuthStreamSigner != null) + { + handshakeHash.CopyBufferTo(clientAuthStreamSigner.Stream); + signature = clientAuthStreamSigner.GetSignature(); + } + else + { + byte[] hash; + if (clientAuthAlgorithm == null) + { + hash = securityParameters.SessionHash; + } + else + { + hash = handshakeHash.GetFinalHash(SignatureScheme.GetCryptoHashAlgorithm(clientAuthAlgorithm)); + } + + signature = clientAuthSigner.GenerateRawSignature(hash); + } + + return new DigitallySigned(clientAuthAlgorithm, signature); + } + + internal static DigitallySigned Generate13CertificateVerify(TlsContext context, + TlsCredentialedSigner credentialedSigner, TlsHandshakeHash handshakeHash) + { + SignatureAndHashAlgorithm signatureAndHashAlgorithm = credentialedSigner.SignatureAndHashAlgorithm; + if (null == signatureAndHashAlgorithm) + throw new TlsFatalAlert(AlertDescription.internal_error); + + string contextString = context.IsServer + ? "TLS 1.3, server CertificateVerify" + : "TLS 1.3, client CertificateVerify"; + + byte[] signature = Generate13CertificateVerify(context.Crypto, credentialedSigner, contextString, + handshakeHash, signatureAndHashAlgorithm); + + return new DigitallySigned(signatureAndHashAlgorithm, signature); + } + + private static byte[] Generate13CertificateVerify(TlsCrypto crypto, TlsCredentialedSigner credentialedSigner, + string contextString, TlsHandshakeHash handshakeHash, SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + TlsStreamSigner streamSigner = credentialedSigner.GetStreamSigner(); + + byte[] header = GetCertificateVerifyHeader(contextString); + byte[] prfHash = GetCurrentPrfHash(handshakeHash); + + if (null != streamSigner) + { + Stream output = streamSigner.Stream; + output.Write(header, 0, header.Length); + output.Write(prfHash, 0, prfHash.Length); + return streamSigner.GetSignature(); + } + + TlsHash tlsHash = CreateHash(crypto, signatureAndHashAlgorithm); + tlsHash.Update(header, 0, header.Length); + tlsHash.Update(prfHash, 0, prfHash.Length); + byte[] hash = tlsHash.CalculateHash(); + return credentialedSigner.GenerateRawSignature(hash); + } + + internal static void VerifyCertificateVerifyClient(TlsServerContext serverContext, + CertificateRequest certificateRequest, DigitallySigned certificateVerify, TlsHandshakeHash handshakeHash) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + Certificate clientCertificate = securityParameters.PeerCertificate; + TlsCertificate verifyingCert = clientCertificate.GetCertificateAt(0); + SignatureAndHashAlgorithm sigAndHashAlg = certificateVerify.Algorithm; + short signatureAlgorithm; + + if (null == sigAndHashAlg) + { + signatureAlgorithm = verifyingCert.GetLegacySignatureAlgorithm(); + + CheckClientCertificateType(certificateRequest, GetLegacyClientCertType(signatureAlgorithm), + AlertDescription.unsupported_certificate); + } + else + { + VerifySupportedSignatureAlgorithm(securityParameters.ServerSigAlgs, sigAndHashAlg); + + signatureAlgorithm = sigAndHashAlg.Signature; + + CheckClientCertificateType(certificateRequest, + SignatureAlgorithm.GetClientCertificateType(signatureAlgorithm), AlertDescription.illegal_parameter); + } + + // Verify the CertificateVerify message contains a correct signature. + bool verified; + try + { + TlsVerifier verifier = verifyingCert.CreateVerifier(signatureAlgorithm); + TlsStreamVerifier streamVerifier = verifier.GetStreamVerifier(certificateVerify); + + if (streamVerifier != null) + { + handshakeHash.CopyBufferTo(streamVerifier.Stream); + verified = streamVerifier.IsVerified(); + } + else + { + byte[] hash; + if (IsTlsV12(serverContext)) + { + hash = handshakeHash.GetFinalHash(SignatureScheme.GetCryptoHashAlgorithm(sigAndHashAlg)); + } + else + { + hash = securityParameters.SessionHash; + } + + verified = verifier.VerifyRawSignature(certificateVerify, hash); + } + } + catch (TlsFatalAlert e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.decrypt_error, e); + } + + if (!verified) + { + throw new TlsFatalAlert(AlertDescription.decrypt_error); + } + } + + /// + internal static void Verify13CertificateVerifyClient(TlsServerContext serverContext, + TlsHandshakeHash handshakeHash, CertificateVerify certificateVerify) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + + var supportedAlgorithms = securityParameters.ServerSigAlgs; + TlsCertificate certificate = securityParameters.PeerCertificate.GetCertificateAt(0); + + Verify13CertificateVerify(supportedAlgorithms, "TLS 1.3, client CertificateVerify", handshakeHash, + certificate, certificateVerify); + } + + /// + internal static void Verify13CertificateVerifyServer(TlsClientContext clientContext, + TlsHandshakeHash handshakeHash, CertificateVerify certificateVerify) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + + var supportedAlgorithms = securityParameters.ClientSigAlgs; + TlsCertificate certificate = securityParameters.PeerCertificate.GetCertificateAt(0); + + Verify13CertificateVerify(supportedAlgorithms, "TLS 1.3, server CertificateVerify", handshakeHash, + certificate, certificateVerify); + } + + /// + private static void Verify13CertificateVerify(IList supportedAlgorithms, + string contextString, TlsHandshakeHash handshakeHash, TlsCertificate certificate, + CertificateVerify certificateVerify) + { + // Verify the CertificateVerify message contains a correct signature. + bool verified; + try + { + int signatureScheme = certificateVerify.Algorithm; + + SignatureAndHashAlgorithm algorithm = SignatureScheme.GetSignatureAndHashAlgorithm(signatureScheme); + VerifySupportedSignatureAlgorithm(supportedAlgorithms, algorithm); + + Tls13Verifier verifier = certificate.CreateVerifier(signatureScheme); + + byte[] header = GetCertificateVerifyHeader(contextString); + byte[] prfHash = GetCurrentPrfHash(handshakeHash); + + Stream output = verifier.Stream; + output.Write(header, 0, header.Length); + output.Write(prfHash, 0, prfHash.Length); + verified = verifier.VerifySignature(certificateVerify.Signature); + } + catch (TlsFatalAlert e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.decrypt_error, e); + } + + if (!verified) + { + throw new TlsFatalAlert(AlertDescription.decrypt_error); + } + } + + private static byte[] GetCertificateVerifyHeader(string contextString) + { + int count = contextString.Length; + byte[] header = new byte[64 + count + 1]; + for (int i = 0; i < 64; ++i) + { + header[i] = 0x20; + } + for (int i = 0; i < count; ++i) + { + char c = contextString[i]; + header[64 + i] = (byte)c; + } + header[64 + count] = 0x00; + return header; + } + + /// + internal static void GenerateServerKeyExchangeSignature(TlsContext context, TlsCredentialedSigner credentials, + byte[] extraSignatureInput, DigestInputBuffer digestBuffer) + { + /* + * RFC 5246 4.7. digitally-signed element needs SignatureAndHashAlgorithm from TLS 1.2 + */ + SignatureAndHashAlgorithm algorithm = GetSignatureAndHashAlgorithm(context.ServerVersion, credentials); + TlsStreamSigner streamSigner = credentials.GetStreamSigner(); + + byte[] signature; + if (streamSigner != null) + { + SendSignatureInput(context, extraSignatureInput, digestBuffer, streamSigner.Stream); + signature = streamSigner.GetSignature(); + } + else + { + byte[] hash = CalculateSignatureHash(context, algorithm, extraSignatureInput, digestBuffer); + signature = credentials.GenerateRawSignature(hash); + } + + DigitallySigned digitallySigned = new DigitallySigned(algorithm, signature); + + digitallySigned.Encode(digestBuffer); + } + + /// + internal static void VerifyServerKeyExchangeSignature(TlsContext context, Stream signatureInput, + TlsCertificate serverCertificate, byte[] extraSignatureInput, DigestInputBuffer digestBuffer) + { + DigitallySigned digitallySigned = DigitallySigned.Parse(context, signatureInput); + + SecurityParameters securityParameters = context.SecurityParameters; + int keyExchangeAlgorithm = securityParameters.KeyExchangeAlgorithm; + + SignatureAndHashAlgorithm sigAndHashAlg = digitallySigned.Algorithm; + short signatureAlgorithm; + + if (sigAndHashAlg == null) + { + signatureAlgorithm = GetLegacySignatureAlgorithmServer(keyExchangeAlgorithm); + } + else + { + signatureAlgorithm = sigAndHashAlg.Signature; + + if (!IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + VerifySupportedSignatureAlgorithm(securityParameters.ClientSigAlgs, sigAndHashAlg); + } + + TlsVerifier verifier = serverCertificate.CreateVerifier(signatureAlgorithm); + TlsStreamVerifier streamVerifier = verifier.GetStreamVerifier(digitallySigned); + + bool verified; + if (streamVerifier != null) + { + SendSignatureInput(context, null, digestBuffer, streamVerifier.Stream); + verified = streamVerifier.IsVerified(); + } + else + { + byte[] hash = CalculateSignatureHash(context, sigAndHashAlg, null, digestBuffer); + verified = verifier.VerifyRawSignature(digitallySigned, hash); + } + + if (!verified) + { + throw new TlsFatalAlert(AlertDescription.decrypt_error); + } + } + + internal static void TrackHashAlgorithmClient(TlsHandshakeHash handshakeHash, + SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm); + if (cryptoHashAlgorithm >= 0) + { + handshakeHash.TrackHashAlgorithm(cryptoHashAlgorithm); + } + } + + internal static void TrackHashAlgorithms(TlsHandshakeHash handshakeHash, + IList supportedSignatureAlgorithms) + { + foreach (SignatureAndHashAlgorithm signatureAndHashAlgorithm in supportedSignatureAlgorithms) + { + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm); + if (cryptoHashAlgorithm >= 0) + { + handshakeHash.TrackHashAlgorithm(cryptoHashAlgorithm); + } + else if (HashAlgorithm.Intrinsic == signatureAndHashAlgorithm.Hash) + { + handshakeHash.ForceBuffering(); + } + } + } + + public static bool HasSigningCapability(short clientCertificateType) + { + switch (clientCertificateType) + { + case ClientCertificateType.dss_sign: + case ClientCertificateType.ecdsa_sign: + case ClientCertificateType.rsa_sign: + return true; + default: + return false; + } + } + + public static IList VectorOfOne(T obj) + { + var v = new List(1); + v.Add(obj); + return v; + } + + public static int GetCipherType(int cipherSuite) + { + int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite); + + return GetEncryptionAlgorithmType(encryptionAlgorithm); + } + + public static int GetEncryptionAlgorithm(int cipherSuite) + { + switch (cipherSuite) + { + case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA: + return EncryptionAlgorithm.cls_3DES_EDE_CBC; + + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA: + return EncryptionAlgorithm.AES_128_CBC; + + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM: + return EncryptionAlgorithm.AES_128_CCM; + + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8: + return EncryptionAlgorithm.AES_128_CCM_8; + + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256: + return EncryptionAlgorithm.AES_128_GCM; + + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA: + return EncryptionAlgorithm.AES_256_CBC; + + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM: + return EncryptionAlgorithm.AES_256_CCM; + + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8: + return EncryptionAlgorithm.AES_256_CCM_8; + + case CipherSuite.TLS_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384: + return EncryptionAlgorithm.AES_256_GCM; + + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256: + return EncryptionAlgorithm.ARIA_128_CBC; + + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256: + return EncryptionAlgorithm.ARIA_128_GCM; + + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384: + return EncryptionAlgorithm.ARIA_256_CBC; + + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384: + return EncryptionAlgorithm.ARIA_256_GCM; + + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256: + return EncryptionAlgorithm.CAMELLIA_128_CBC; + + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256: + return EncryptionAlgorithm.CAMELLIA_128_GCM; + + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384: + return EncryptionAlgorithm.CAMELLIA_256_CBC; + + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384: + return EncryptionAlgorithm.CAMELLIA_256_GCM; + + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256: + return EncryptionAlgorithm.CHACHA20_POLY1305; + + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_WITH_NULL_SHA: + return EncryptionAlgorithm.NULL; + + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_WITH_NULL_SHA256: + return EncryptionAlgorithm.NULL; + + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384: + return EncryptionAlgorithm.NULL; + + case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA: + return EncryptionAlgorithm.SEED_CBC; + + case CipherSuite.TLS_SM4_CCM_SM3: + return EncryptionAlgorithm.SM4_CCM; + + case CipherSuite.TLS_SM4_GCM_SM3: + return EncryptionAlgorithm.SM4_GCM; + + default: + return -1; + } + } + + public static int GetEncryptionAlgorithmType(int encryptionAlgorithm) + { + switch (encryptionAlgorithm) + { + case EncryptionAlgorithm.AES_128_CCM: + case EncryptionAlgorithm.AES_128_CCM_8: + case EncryptionAlgorithm.AES_128_GCM: + case EncryptionAlgorithm.AES_256_CCM: + case EncryptionAlgorithm.AES_256_CCM_8: + case EncryptionAlgorithm.AES_256_GCM: + case EncryptionAlgorithm.ARIA_128_GCM: + case EncryptionAlgorithm.ARIA_256_GCM: + case EncryptionAlgorithm.CAMELLIA_128_GCM: + case EncryptionAlgorithm.CAMELLIA_256_GCM: + case EncryptionAlgorithm.CHACHA20_POLY1305: + case EncryptionAlgorithm.SM4_CCM: + case EncryptionAlgorithm.SM4_GCM: + return CipherType.aead; + + case EncryptionAlgorithm.RC2_CBC_40: + case EncryptionAlgorithm.IDEA_CBC: + case EncryptionAlgorithm.DES40_CBC: + case EncryptionAlgorithm.DES_CBC: + case EncryptionAlgorithm.cls_3DES_EDE_CBC: + case EncryptionAlgorithm.AES_128_CBC: + case EncryptionAlgorithm.AES_256_CBC: + case EncryptionAlgorithm.ARIA_128_CBC: + case EncryptionAlgorithm.ARIA_256_CBC: + case EncryptionAlgorithm.CAMELLIA_128_CBC: + case EncryptionAlgorithm.CAMELLIA_256_CBC: + case EncryptionAlgorithm.SEED_CBC: + case EncryptionAlgorithm.SM4_CBC: + return CipherType.block; + + case EncryptionAlgorithm.NULL: + case EncryptionAlgorithm.RC4_40: + case EncryptionAlgorithm.RC4_128: + return CipherType.stream; + + default: + return -1; + } + } + + public static int GetKeyExchangeAlgorithm(int cipherSuite) + { + switch (cipherSuite) + { + case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.DH_anon; + + case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.DH_DSS; + + case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.DH_RSA; + + case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.DHE_DSS; + + case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8: + return KeyExchangeAlgorithm.DHE_PSK; + + case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.DHE_RSA; + + case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA: + return KeyExchangeAlgorithm.ECDH_anon; + + case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA: + return KeyExchangeAlgorithm.ECDH_ECDSA; + + case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA: + return KeyExchangeAlgorithm.ECDH_RSA; + + case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA: + return KeyExchangeAlgorithm.ECDHE_ECDSA; + + case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384: + return KeyExchangeAlgorithm.ECDHE_PSK; + + case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA: + return KeyExchangeAlgorithm.ECDHE_RSA; + + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_AES_256_GCM_SHA384: + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_SM4_CCM_SM3: + case CipherSuite.TLS_SM4_GCM_SM3: + return KeyExchangeAlgorithm.NULL; + + case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_PSK_WITH_NULL_SHA384: + return KeyExchangeAlgorithm.PSK; + + case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA: + return KeyExchangeAlgorithm.RSA; + + case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384: + return KeyExchangeAlgorithm.RSA_PSK; + + case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA: + return KeyExchangeAlgorithm.SRP; + + case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA: + return KeyExchangeAlgorithm.SRP_DSS; + + case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA: + return KeyExchangeAlgorithm.SRP_RSA; + + default: + return -1; + } + } + + public static IList GetKeyExchangeAlgorithms(int[] cipherSuites) + { + var result = new List(); + if (null != cipherSuites) + { + for (int i = 0; i < cipherSuites.Length; ++i) + { + AddToSet(result, GetKeyExchangeAlgorithm(cipherSuites[i])); + } + result.Remove(-1); + } + return result; + } + + public static int GetMacAlgorithm(int cipherSuite) + { + switch (cipherSuite) + { + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_AES_256_GCM_SHA384: + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_SM4_CCM_SM3: + case CipherSuite.TLS_SM4_GCM_SM3: + return MacAlgorithm.cls_null; + + case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA: + case CipherSuite.TLS_RSA_WITH_NULL_SHA: + case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA: + case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA: + return MacAlgorithm.hmac_sha1; + + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_NULL_SHA256: + return MacAlgorithm.hmac_sha256; + + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384: + return MacAlgorithm.hmac_sha384; + + default: + return -1; + } + } + + public static ProtocolVersion GetMinimumVersion(int cipherSuite) + { + switch (cipherSuite) + { + case CipherSuite.TLS_AES_128_CCM_SHA256: + case CipherSuite.TLS_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_AES_128_GCM_SHA256: + case CipherSuite.TLS_AES_256_GCM_SHA384: + case CipherSuite.TLS_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_SM4_CCM_SM3: + case CipherSuite.TLS_SM4_GCM_SM3: + return ProtocolVersion.TLSv13; + + case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM: + case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM: + case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8: + case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM: + case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM: + case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8: + case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384: + case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256: + case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384: + case CipherSuite.TLS_RSA_WITH_NULL_SHA256: + return ProtocolVersion.TLSv12; + + default: + return ProtocolVersion.SSLv3; + } + } + + public static IList GetNamedGroupRoles(int[] cipherSuites) + { + return GetNamedGroupRoles(GetKeyExchangeAlgorithms(cipherSuites)); + } + + public static IList GetNamedGroupRoles(IList keyExchangeAlgorithms) + { + var result = new List(); + foreach (int keyExchangeAlgorithm in keyExchangeAlgorithms) + { + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DH_anon: + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_PSK: + case KeyExchangeAlgorithm.DHE_RSA: + { + AddToSet(result, NamedGroupRole.dh); + break; + } + + case KeyExchangeAlgorithm.ECDH_anon: + case KeyExchangeAlgorithm.ECDH_RSA: + case KeyExchangeAlgorithm.ECDHE_PSK: + case KeyExchangeAlgorithm.ECDHE_RSA: + { + AddToSet(result, NamedGroupRole.ecdh); + break; + } + + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDHE_ECDSA: + { + AddToSet(result, NamedGroupRole.ecdh); + AddToSet(result, NamedGroupRole.ecdsa); + break; + } + + case KeyExchangeAlgorithm.NULL: + { + // TODO[tls13] We're conservatively adding both here, though maybe only one is needed + AddToSet(result, NamedGroupRole.dh); + AddToSet(result, NamedGroupRole.ecdh); + break; + } + } + } + return result; + } + + /// + public static bool IsAeadCipherSuite(int cipherSuite) + { + return CipherType.aead == GetCipherType(cipherSuite); + } + + /// + public static bool IsBlockCipherSuite(int cipherSuite) + { + return CipherType.block == GetCipherType(cipherSuite); + } + + /// + public static bool IsStreamCipherSuite(int cipherSuite) + { + return CipherType.stream == GetCipherType(cipherSuite); + } + + /// Whether a server can select the specified cipher suite given the available signature algorithms + /// for ServerKeyExchange. + public static bool IsValidCipherSuiteForSignatureAlgorithms(int cipherSuite, IList sigAlgs) + { + int keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite); + + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_RSA: + case KeyExchangeAlgorithm.ECDHE_ECDSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + case KeyExchangeAlgorithm.NULL: + case KeyExchangeAlgorithm.SRP_RSA: + case KeyExchangeAlgorithm.SRP_DSS: + break; + + default: + return true; + } + + foreach (short signatureAlgorithm in sigAlgs) + { + if (IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm)) + return true; + } + + return false; + } + + internal static bool IsValidCipherSuiteSelection(int[] offeredCipherSuites, int cipherSuite) + { + return null != offeredCipherSuites + && Arrays.Contains(offeredCipherSuites, cipherSuite) + && CipherSuite.TLS_NULL_WITH_NULL_NULL != cipherSuite + && !CipherSuite.IsScsv(cipherSuite); + } + + internal static bool IsValidKeyShareSelection(ProtocolVersion negotiatedVersion, int[] clientSupportedGroups, + IDictionary clientAgreements, int keyShareGroup) + { + return null != clientSupportedGroups + && Arrays.Contains(clientSupportedGroups, keyShareGroup) + && !clientAgreements.ContainsKey(keyShareGroup) + && NamedGroup.CanBeNegotiated(keyShareGroup, negotiatedVersion); + } + + internal static bool IsValidSignatureAlgorithmForServerKeyExchange(short signatureAlgorithm, + int keyExchangeAlgorithm) + { + // TODO[tls13] + + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DHE_RSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + case KeyExchangeAlgorithm.SRP_RSA: + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + case SignatureAlgorithm.rsa_pss_rsae_sha256: + case SignatureAlgorithm.rsa_pss_rsae_sha384: + case SignatureAlgorithm.rsa_pss_rsae_sha512: + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + return true; + default: + return false; + } + + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.SRP_DSS: + return SignatureAlgorithm.dsa == signatureAlgorithm; + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + switch (signatureAlgorithm) + { + case SignatureAlgorithm.ecdsa: + case SignatureAlgorithm.ed25519: + case SignatureAlgorithm.ed448: + return true; + default: + return false; + } + + case KeyExchangeAlgorithm.NULL: + return SignatureAlgorithm.anonymous != signatureAlgorithm; + + default: + return false; + } + } + + public static bool IsValidSignatureSchemeForServerKeyExchange(int signatureScheme, int keyExchangeAlgorithm) + { + short signatureAlgorithm = SignatureScheme.GetSignatureAlgorithm(signatureScheme); + + return IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm); + } + + public static bool IsValidVersionForCipherSuite(int cipherSuite, ProtocolVersion version) + { + version = version.GetEquivalentTlsVersion(); + + ProtocolVersion minimumVersion = GetMinimumVersion(cipherSuite); + if (minimumVersion == version) + return true; + + if (!minimumVersion.IsEarlierVersionOf(version)) + return false; + + return ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(minimumVersion) + || ProtocolVersion.TLSv13.IsLaterVersionOf(version); + } + + /// + public static SignatureAndHashAlgorithm ChooseSignatureAndHashAlgorithm(TlsContext context, + IList sigHashAlgs, short signatureAlgorithm) + { + return ChooseSignatureAndHashAlgorithm(context.ServerVersion, sigHashAlgs, signatureAlgorithm); + } + + /// + public static SignatureAndHashAlgorithm ChooseSignatureAndHashAlgorithm(ProtocolVersion negotiatedVersion, + IList sigHashAlgs, short signatureAlgorithm) + { + if (!IsTlsV12(negotiatedVersion)) + return null; + + if (sigHashAlgs == null) + { + /* + * TODO[tls13] RFC 8446 4.2.3 Clients which desire the server to authenticate itself via + * a certificate MUST send the "signature_algorithms" extension. + */ + + sigHashAlgs = GetDefaultSignatureAlgorithms(signatureAlgorithm); + } + + SignatureAndHashAlgorithm result = null; + foreach (SignatureAndHashAlgorithm sigHashAlg in sigHashAlgs) + { + if (sigHashAlg.Signature != signatureAlgorithm) + continue; + + short hash = sigHashAlg.Hash; + if (hash < MinimumHashStrict) + continue; + + if (result == null) + { + result = sigHashAlg; + continue; + } + + short current = result.Hash; + if (current < MinimumHashPreferred) + { + if (hash > current) + { + result = sigHashAlg; + } + } + else if (hash >= MinimumHashPreferred) + { + if (hash < current) + { + result = sigHashAlg; + } + } + } + if (result == null) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return result; + } + + public static IList GetUsableSignatureAlgorithms(IList sigHashAlgs) + { + if (sigHashAlgs == null) + return new List(){ SignatureAlgorithm.rsa, SignatureAlgorithm.dsa, SignatureAlgorithm.ecdsa }; + + var v = new List(); + foreach (SignatureAndHashAlgorithm sigHashAlg in sigHashAlgs) + { + if (sigHashAlg.Hash >= MinimumHashStrict) + { + short sigAlg = sigHashAlg.Signature; + if (!v.Contains(sigAlg)) + { + // TODO Check for crypto support before choosing (or pass in cached list?) + v.Add(sigAlg); + } + } + } + return v; + } + + public static int GetCommonCipherSuite13(ProtocolVersion negotiatedVersion, int[] peerCipherSuites, + int[] localCipherSuites, bool useLocalOrder) + { + int[] ordered = peerCipherSuites, unordered = localCipherSuites; + if (useLocalOrder) + { + ordered = localCipherSuites; + unordered = peerCipherSuites; + } + + for (int i = 0; i < ordered.Length; ++i) + { + int candidate = ordered[i]; + if (Arrays.Contains(unordered, candidate) && + IsValidVersionForCipherSuite(candidate, negotiatedVersion)) + { + return candidate; + } + } + + return -1; + } + + public static int[] GetCommonCipherSuites(int[] peerCipherSuites, int[] localCipherSuites, bool useLocalOrder) + { + int[] ordered = peerCipherSuites, unordered = localCipherSuites; + if (useLocalOrder) + { + ordered = localCipherSuites; + unordered = peerCipherSuites; + } + + int count = 0, limit = System.Math.Min(ordered.Length, unordered.Length); + int[] candidates = new int[limit]; + for (int i = 0; i < ordered.Length; ++i) + { + int candidate = ordered[i]; + if (!Contains(candidates, 0, count, candidate) + && Arrays.Contains(unordered, candidate)) + { + candidates[count++] = candidate; + } + } + + if (count < limit) + { + candidates = Arrays.CopyOf(candidates, count); + } + + return candidates; + } + + public static int[] GetSupportedCipherSuites(TlsCrypto crypto, int[] suites) + { + return GetSupportedCipherSuites(crypto, suites, 0, suites.Length); + } + + public static int[] GetSupportedCipherSuites(TlsCrypto crypto, int[] suites, int suitesOff, int suitesCount) + { + int[] supported = new int[suitesCount]; + int count = 0; + + for (int i = 0; i < suitesCount; ++i) + { + int suite = suites[suitesOff + i]; + if (IsSupportedCipherSuite(crypto, suite)) + { + supported[count++] = suite; + } + } + + if (count < suitesCount) + { + supported = Arrays.CopyOf(supported, count); + } + + return supported; + } + + public static bool IsSupportedCipherSuite(TlsCrypto crypto, int cipherSuite) + { + int keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite); + if (!IsSupportedKeyExchange(crypto, keyExchangeAlgorithm)) + return false; + + int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite); + if (encryptionAlgorithm < 0 || !crypto.HasEncryptionAlgorithm(encryptionAlgorithm)) + return false; + + int macAlgorithm = GetMacAlgorithm(cipherSuite); + if (macAlgorithm != MacAlgorithm.cls_null) + { + if (macAlgorithm < 0 || !crypto.HasMacAlgorithm(macAlgorithm)) + return false; + } + + return true; + } + + public static bool IsSupportedKeyExchange(TlsCrypto crypto, int keyExchangeAlgorithm) + { + switch (keyExchangeAlgorithm) + { + case KeyExchangeAlgorithm.DH_anon: + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + case KeyExchangeAlgorithm.DHE_PSK: + return crypto.HasDHAgreement(); + + case KeyExchangeAlgorithm.DHE_DSS: + return crypto.HasDHAgreement() + && crypto.HasSignatureAlgorithm(SignatureAlgorithm.dsa); + + case KeyExchangeAlgorithm.DHE_RSA: + return crypto.HasDHAgreement() + && HasAnyRsaSigAlgs(crypto); + + case KeyExchangeAlgorithm.ECDH_anon: + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDH_RSA: + case KeyExchangeAlgorithm.ECDHE_PSK: + return crypto.HasECDHAgreement(); + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + return crypto.HasECDHAgreement() + && (crypto.HasSignatureAlgorithm(SignatureAlgorithm.ecdsa) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.ed25519) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.ed448)); + + case KeyExchangeAlgorithm.ECDHE_RSA: + return crypto.HasECDHAgreement() + && HasAnyRsaSigAlgs(crypto); + + case KeyExchangeAlgorithm.NULL: + case KeyExchangeAlgorithm.PSK: + return true; + + case KeyExchangeAlgorithm.RSA: + case KeyExchangeAlgorithm.RSA_PSK: + return crypto.HasRsaEncryption(); + + case KeyExchangeAlgorithm.SRP: + return crypto.HasSrpAuthentication(); + + case KeyExchangeAlgorithm.SRP_DSS: + return crypto.HasSrpAuthentication() + && crypto.HasSignatureAlgorithm(SignatureAlgorithm.dsa); + + case KeyExchangeAlgorithm.SRP_RSA: + return crypto.HasSrpAuthentication() + && HasAnyRsaSigAlgs(crypto); + + default: + return false; + } + } + + internal static bool HasAnyRsaSigAlgs(TlsCrypto crypto) + { + return crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha256) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha384) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha512) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha256) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha384) + || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha512); + } + + internal static byte[] GetCurrentPrfHash(TlsHandshakeHash handshakeHash) + { + return handshakeHash.ForkPrfHash().CalculateHash(); + } + + private static TlsHash CreateHash(TlsCrypto crypto, short hashAlgorithm) + { + return crypto.CreateHash(TlsCryptoUtilities.GetHash(hashAlgorithm)); + } + + private static TlsHash CreateHash(TlsCrypto crypto, SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + return crypto.CreateHash(SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm)); + } + + /// + private static TlsKeyExchange CreateKeyExchangeClient(TlsClient client, int keyExchange) + { + TlsKeyExchangeFactory factory = client.GetKeyExchangeFactory(); + + switch (keyExchange) + { + case KeyExchangeAlgorithm.DH_anon: + return factory.CreateDHanonKeyExchangeClient(keyExchange, client.GetDHGroupVerifier()); + + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + return factory.CreateDHKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_RSA: + return factory.CreateDheKeyExchangeClient(keyExchange, client.GetDHGroupVerifier()); + + case KeyExchangeAlgorithm.ECDH_anon: + return factory.CreateECDHanonKeyExchangeClient(keyExchange); + + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDH_RSA: + return factory.CreateECDHKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + return factory.CreateECDheKeyExchangeClient(keyExchange); + + case KeyExchangeAlgorithm.RSA: + return factory.CreateRsaKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.DHE_PSK: + return factory.CreatePskKeyExchangeClient(keyExchange, client.GetPskIdentity(), + client.GetDHGroupVerifier()); + + case KeyExchangeAlgorithm.ECDHE_PSK: + case KeyExchangeAlgorithm.PSK: + case KeyExchangeAlgorithm.RSA_PSK: + return factory.CreatePskKeyExchangeClient(keyExchange, client.GetPskIdentity(), null); + + case KeyExchangeAlgorithm.SRP: + case KeyExchangeAlgorithm.SRP_DSS: + case KeyExchangeAlgorithm.SRP_RSA: + return factory.CreateSrpKeyExchangeClient(keyExchange, client.GetSrpIdentity(), + client.GetSrpConfigVerifier()); + + default: + /* + * Note: internal error here; the TlsProtocol implementation verifies that the + * server-selected cipher suite was in the list of client-offered cipher suites, so if + * we now can't produce an implementation, we shouldn't have offered it! + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + /// + private static TlsKeyExchange CreateKeyExchangeServer(TlsServer server, int keyExchange) + { + TlsKeyExchangeFactory factory = server.GetKeyExchangeFactory(); + + switch (keyExchange) + { + case KeyExchangeAlgorithm.DH_anon: + return factory.CreateDHanonKeyExchangeServer(keyExchange, server.GetDHConfig()); + + case KeyExchangeAlgorithm.DH_DSS: + case KeyExchangeAlgorithm.DH_RSA: + return factory.CreateDHKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.DHE_DSS: + case KeyExchangeAlgorithm.DHE_RSA: + return factory.CreateDheKeyExchangeServer(keyExchange, server.GetDHConfig()); + + case KeyExchangeAlgorithm.ECDH_anon: + return factory.CreateECDHanonKeyExchangeServer(keyExchange, server.GetECDHConfig()); + + case KeyExchangeAlgorithm.ECDH_ECDSA: + case KeyExchangeAlgorithm.ECDH_RSA: + return factory.CreateECDHKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.ECDHE_ECDSA: + case KeyExchangeAlgorithm.ECDHE_RSA: + return factory.CreateECDheKeyExchangeServer(keyExchange, server.GetECDHConfig()); + + case KeyExchangeAlgorithm.RSA: + return factory.CreateRsaKeyExchange(keyExchange); + + case KeyExchangeAlgorithm.DHE_PSK: + return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(), + server.GetDHConfig(), null); + + case KeyExchangeAlgorithm.ECDHE_PSK: + return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(), null, + server.GetECDHConfig()); + + case KeyExchangeAlgorithm.PSK: + case KeyExchangeAlgorithm.RSA_PSK: + return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(), null, null); + + case KeyExchangeAlgorithm.SRP: + case KeyExchangeAlgorithm.SRP_DSS: + case KeyExchangeAlgorithm.SRP_RSA: + return factory.CreateSrpKeyExchangeServer(keyExchange, server.GetSrpLoginParameters()); + + default: + /* + * Note: internal error here; the TlsProtocol implementation verifies that the + * server-selected cipher suite was in the list of client-offered cipher suites, so if + * we now can't produce an implementation, we shouldn't have offered it! + */ + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + /// + internal static TlsKeyExchange InitKeyExchangeClient(TlsClientContext clientContext, TlsClient client) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + TlsKeyExchange keyExchange = CreateKeyExchangeClient(client, securityParameters.KeyExchangeAlgorithm); + keyExchange.Init(clientContext); + return keyExchange; + } + + /// + internal static TlsKeyExchange InitKeyExchangeServer(TlsServerContext serverContext, TlsServer server) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + TlsKeyExchange keyExchange = CreateKeyExchangeServer(server, securityParameters.KeyExchangeAlgorithm); + keyExchange.Init(serverContext); + return keyExchange; + } + + internal static TlsCipher InitCipher(TlsContext context) + { + SecurityParameters securityParameters = context.SecurityParameters; + int cipherSuite = securityParameters.CipherSuite; + int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite); + int macAlgorithm = GetMacAlgorithm(cipherSuite); + + if (encryptionAlgorithm < 0 || macAlgorithm < 0) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return context.Crypto.CreateCipher(new TlsCryptoParameters(context), encryptionAlgorithm, macAlgorithm); + } + + /// Check the signature algorithm for certificates in the peer's CertPath as specified in RFC 5246 + /// 7.4.2, 7.4.4, 7.4.6 and similar rules for earlier TLS versions. + /// + /// The supplied CertPath should include the trust anchor (its signature algorithm isn't checked, but in the + /// general case checking a certificate requires the issuer certificate). + /// + /// if any certificate in the CertPath (excepting the trust anchor) has a + /// signature algorithm that is not one of the locally supported signature algorithms. + public static void CheckPeerSigAlgs(TlsContext context, TlsCertificate[] peerCertPath) + { + if (context.IsServer) + { + CheckSigAlgOfClientCerts(context, peerCertPath); + } + else + { + CheckSigAlgOfServerCerts(context, peerCertPath); + } + } + + private static void CheckSigAlgOfClientCerts(TlsContext context, TlsCertificate[] clientCertPath) + { + SecurityParameters securityParameters = context.SecurityParameters; + short[] clientCertTypes = securityParameters.ClientCertTypes; + var serverSigAlgsCert = securityParameters.ServerSigAlgsCert; + + int trustAnchorPos = clientCertPath.Length - 1; + for (int i = 0; i < trustAnchorPos; ++i) + { + TlsCertificate subjectCert = clientCertPath[i]; + TlsCertificate issuerCert = clientCertPath[i + 1]; + + SignatureAndHashAlgorithm sigAndHashAlg = GetCertSigAndHashAlg(subjectCert, issuerCert); + + bool valid = false; + if (null == sigAndHashAlg) + { + // We don't recognize the 'signatureAlgorithm' of the certificate + } + else if (null == serverSigAlgsCert) + { + // TODO Review this (legacy) logic with RFC 4346 (7.4?.2?) + if (null != clientCertTypes) + { + for (int j = 0; j < clientCertTypes.Length; ++j) + { + short signatureAlgorithm = GetLegacySignatureAlgorithmClientCert(clientCertTypes[j]); + if (sigAndHashAlg.Signature == signatureAlgorithm) + { + valid = true; + break; + } + } + } + } + else + { + /* + * RFC 5246 7.4.4 Any certificates provided by the client MUST be signed using a + * hash/signature algorithm pair found in supported_signature_algorithms. + */ + valid = ContainsSignatureAlgorithm(serverSigAlgsCert, sigAndHashAlg); + } + + if (!valid) + { + throw new TlsFatalAlert(AlertDescription.bad_certificate); + } + } + } + + private static void CheckSigAlgOfServerCerts(TlsContext context, TlsCertificate[] serverCertPath) + { + SecurityParameters securityParameters = context.SecurityParameters; + var clientSigAlgsCert = securityParameters.ClientSigAlgsCert; + var clientSigAlgs = securityParameters.ClientSigAlgs; + + /* + * NOTE: For TLS 1.2, we'll check 'signature_algorithms' too (if it's distinct), since + * there's no way of knowing whether the server understood 'signature_algorithms_cert'. + */ + if (clientSigAlgs == clientSigAlgsCert || IsTlsV13(securityParameters.NegotiatedVersion)) + { + clientSigAlgs = null; + } + + int trustAnchorPos = serverCertPath.Length - 1; + for (int i = 0; i < trustAnchorPos; ++i) + { + TlsCertificate subjectCert = serverCertPath[i]; + TlsCertificate issuerCert = serverCertPath[i + 1]; + + SignatureAndHashAlgorithm sigAndHashAlg = GetCertSigAndHashAlg(subjectCert, issuerCert); + + bool valid = false; + if (null == sigAndHashAlg) + { + // We don't recognize the 'signatureAlgorithm' of the certificate + } + else if (null == clientSigAlgsCert) + { + /* + * RFC 4346 7.4.2. Unless otherwise specified, the signing algorithm for the + * certificate MUST be the same as the algorithm for the certificate key. + */ + short signatureAlgorithm = GetLegacySignatureAlgorithmServerCert( + securityParameters.KeyExchangeAlgorithm); + + valid = (signatureAlgorithm == sigAndHashAlg.Signature); + } + else + { + /* + * RFC 5246 7.4.2. If the client provided a "signature_algorithms" extension, then + * all certificates provided by the server MUST be signed by a hash/signature algorithm + * pair that appears in that extension. + */ + valid = ContainsSignatureAlgorithm(clientSigAlgsCert, sigAndHashAlg) + || (null != clientSigAlgs && ContainsSignatureAlgorithm(clientSigAlgs, sigAndHashAlg)); + } + + if (!valid) + throw new TlsFatalAlert(AlertDescription.bad_certificate); + } + } + + internal static void CheckTlsFeatures(Certificate serverCertificate, IDictionary clientExtensions, + IDictionary serverExtensions) + { + /* + * RFC 7633 4.3.3. A client MUST treat a certificate with a TLS feature extension as an + * invalid certificate if the features offered by the server do not contain all features + * present in both the client's ClientHello message and the TLS feature extension. + */ + byte[] tlsFeatures = serverCertificate.GetCertificateAt(0).GetExtension(TlsObjectIdentifiers.id_pe_tlsfeature); + if (tlsFeatures != null) + { + // TODO[tls] Proper ASN.1 type class for this extension? + Asn1Sequence tlsFeaturesSeq = (Asn1Sequence)ReadAsn1Object(tlsFeatures); + for (int i = 0; i < tlsFeaturesSeq.Count; ++i) + { + if (!(tlsFeaturesSeq[i] is DerInteger)) + throw new TlsFatalAlert(AlertDescription.bad_certificate); + } + + RequireDerEncoding(tlsFeaturesSeq, tlsFeatures); + + foreach (DerInteger tlsExtensionElement in tlsFeaturesSeq) + { + BigInteger tlsExtension = tlsExtensionElement.PositiveValue; + if (tlsExtension.BitLength <= 16) + { + int extensionType = tlsExtension.IntValueExact; + + if (clientExtensions.ContainsKey(extensionType) && !serverExtensions.ContainsKey(extensionType)) + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + } + } + } + + internal static void ProcessClientCertificate(TlsServerContext serverContext, Certificate clientCertificate, + TlsKeyExchange keyExchange, TlsServer server) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + if (null != securityParameters.PeerCertificate) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + bool isTlsV13 = IsTlsV13(securityParameters.NegotiatedVersion); + if (isTlsV13) + { + // 'keyExchange' not used + } + else if (clientCertificate.IsEmpty) + { + /* + * NOTE: We tolerate SSLv3 clients sending an empty chain, although "If no suitable + * certificate is available, the client should send a no_certificate alert instead". + */ + + keyExchange.SkipClientCredentials(); + } + else + { + keyExchange.ProcessClientCertificate(clientCertificate); + } + + securityParameters.m_peerCertificate = clientCertificate; + + /* + * RFC 5246 7.4.6. If the client does not send any certificates, the server MAY at its + * discretion either continue the handshake without client authentication, or respond with a + * fatal handshake_failure alert. Also, if some aspect of the certificate chain was + * unacceptable (e.g., it was not signed by a known, trusted CA), the server MAY at its + * discretion either continue the handshake (considering the client unauthenticated) or send + * a fatal alert. + */ + server.NotifyClientCertificate(clientCertificate); + } + + internal static void ProcessServerCertificate(TlsClientContext clientContext, + CertificateStatus serverCertificateStatus, TlsKeyExchange keyExchange, + TlsAuthentication clientAuthentication, IDictionary clientExtensions, + IDictionary serverExtensions) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + bool isTlsV13 = IsTlsV13(securityParameters.NegotiatedVersion); + + if (null == clientAuthentication) + { + if (isTlsV13) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (securityParameters.IsRenegotiating) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure); + } + + // There was no server certificate message; check it's OK + keyExchange.SkipServerCredentials(); + securityParameters.m_tlsServerEndPoint = EmptyBytes; + return; + } + + Certificate serverCertificate = securityParameters.PeerCertificate; + + CheckTlsFeatures(serverCertificate, clientExtensions, serverExtensions); + + if (!isTlsV13) + { + keyExchange.ProcessServerCertificate(serverCertificate); + } + + clientAuthentication.NotifyServerCertificate( + new TlsServerCertificateImpl(serverCertificate, serverCertificateStatus)); + } + + internal static SignatureAndHashAlgorithm GetCertSigAndHashAlg(TlsCertificate subjectCert, TlsCertificate issuerCert) + { + string sigAlgOid = subjectCert.SigAlgOid; + + if (null != sigAlgOid) + { + if (!PkcsObjectIdentifiers.IdRsassaPss.Id.Equals(sigAlgOid)) + return CollectionUtilities.GetValueOrNull(CertSigAlgOids, sigAlgOid); + + RsassaPssParameters pssParams = RsassaPssParameters.GetInstance(subjectCert.GetSigAlgParams()); + if (null != pssParams) + { + DerObjectIdentifier hashOid = pssParams.HashAlgorithm.Algorithm; + if (NistObjectIdentifiers.IdSha256.Equals(hashOid)) + { + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha256)) + return SignatureAndHashAlgorithm.rsa_pss_pss_sha256; + + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha256)) + return SignatureAndHashAlgorithm.rsa_pss_rsae_sha256; + } + else if (NistObjectIdentifiers.IdSha384.Equals(hashOid)) + { + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha384)) + return SignatureAndHashAlgorithm.rsa_pss_pss_sha384; + + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha384)) + return SignatureAndHashAlgorithm.rsa_pss_rsae_sha384; + } + else if (NistObjectIdentifiers.IdSha512.Equals(hashOid)) + { + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha512)) + return SignatureAndHashAlgorithm.rsa_pss_pss_sha512; + + if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha512)) + return SignatureAndHashAlgorithm.rsa_pss_rsae_sha512; + } + } + } + + return null; + } + + internal static CertificateRequest ValidateCertificateRequest(CertificateRequest certificateRequest, + TlsKeyExchange keyExchange) + { + short[] validClientCertificateTypes = keyExchange.GetClientCertificateTypes(); + if (IsNullOrEmpty(validClientCertificateTypes)) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + certificateRequest = NormalizeCertificateRequest(certificateRequest, validClientCertificateTypes); + if (certificateRequest == null) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return certificateRequest; + } + + internal static CertificateRequest NormalizeCertificateRequest(CertificateRequest certificateRequest, + short[] validClientCertificateTypes) + { + if (ContainsAll(validClientCertificateTypes, certificateRequest.CertificateTypes)) + return certificateRequest; + + short[] retained = RetainAll(certificateRequest.CertificateTypes, validClientCertificateTypes); + if (retained.Length < 1) + return null; + + // TODO Filter for unique sigAlgs/CAs only + return new CertificateRequest(retained, certificateRequest.SupportedSignatureAlgorithms, + certificateRequest.CertificateAuthorities); + } + + internal static bool Contains(int[] buf, int off, int len, int value) + { + for (int i = 0; i < len; ++i) + { + if (value == buf[off + i]) + return true; + } + return false; + } + + internal static bool ContainsAll(short[] container, short[] elements) + { + for (int i = 0; i < elements.Length; ++i) + { + if (!Arrays.Contains(container, elements[i])) + return false; + } + return true; + } + + internal static short[] RetainAll(short[] retainer, short[] elements) + { + short[] retained = new short[System.Math.Min(retainer.Length, elements.Length)]; + + int count = 0; + for (int i = 0; i < elements.Length; ++i) + { + if (Arrays.Contains(retainer, elements[i])) + { + retained[count++] = elements[i]; + } + } + + return Truncate(retained, count); + } + + internal static short[] Truncate(short[] a, int n) + { + if (n >= a.Length) + return a; + + short[] t = new short[n]; + Array.Copy(a, 0, t, 0, n); + return t; + } + + internal static int[] Truncate(int[] a, int n) + { + if (n >= a.Length) + return a; + + int[] t = new int[n]; + Array.Copy(a, 0, t, 0, n); + return t; + } + + /// + internal static TlsCredentialedAgreement RequireAgreementCredentials(TlsCredentials credentials) + { + if (!(credentials is TlsCredentialedAgreement)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return (TlsCredentialedAgreement)credentials; + } + + /// + internal static TlsCredentialedDecryptor RequireDecryptorCredentials(TlsCredentials credentials) + { + if (!(credentials is TlsCredentialedDecryptor)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return (TlsCredentialedDecryptor)credentials; + } + + /// + internal static TlsCredentialedSigner RequireSignerCredentials(TlsCredentials credentials) + { + if (!(credentials is TlsCredentialedSigner)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return (TlsCredentialedSigner)credentials; + } + + /// + private static void CheckClientCertificateType(CertificateRequest certificateRequest, + short clientCertificateType, short alertDescription) + { + if (clientCertificateType < 0 + || !Arrays.Contains(certificateRequest.CertificateTypes, clientCertificateType)) + { + throw new TlsFatalAlert(alertDescription); + } + } + + private static void CheckDowngradeMarker(byte[] randomBlock, byte[] downgradeMarker) + { + int len = downgradeMarker.Length; + if (ConstantTimeAreEqual(len, downgradeMarker, 0, randomBlock, randomBlock.Length - len)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + internal static void CheckDowngradeMarker(ProtocolVersion version, byte[] randomBlock) + { + version = version.GetEquivalentTlsVersion(); + + if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv11)) + { + CheckDowngradeMarker(randomBlock, DowngradeTlsV11); + } + if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv12)) + { + CheckDowngradeMarker(randomBlock, DowngradeTlsV12); + } + } + + internal static void WriteDowngradeMarker(ProtocolVersion version, byte[] randomBlock) + { + version = version.GetEquivalentTlsVersion(); + + byte[] marker; + if (ProtocolVersion.TLSv12 == version) + { + marker = DowngradeTlsV12; + } + else if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv11)) + { + marker = DowngradeTlsV11; + } + else + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + Array.Copy(marker, 0, randomBlock, randomBlock.Length - marker.Length, marker.Length); + } + + private static bool areCertificatesEqual(Certificate a, Certificate b) + { + int length = a.Length; + if (b.Length == length) + { + try + { + for (int i = 0; i < length; ++i) + { + TlsCertificate ai = a.GetCertificateAt(i); + TlsCertificate bi = b.GetCertificateAt(i); + + if (!Arrays.AreEqual(ai.GetEncoded(), bi.GetEncoded())) + { + return false; + } + } + + return true; + } + catch (Exception e) + { + } + } + return false; + } + + private static bool isSafeRenegotiationServerCertificate(TlsClientContext clientContext, Certificate serverCertificate) + { + SecurityParameters securityParametersConnection = clientContext.SecurityParameters; + if (securityParametersConnection != null) + { + Certificate previousCertificate = securityParametersConnection.PreRenegotiatingServerCert; + if (null != previousCertificate) + { + return areCertificatesEqual(previousCertificate, serverCertificate); + } + } + + return false; + } + + internal static TlsAuthentication ReceiveServerCertificate(TlsClientContext clientContext, TlsClient client, + MemoryStream buf, IDictionary serverExtensions) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + if (KeyExchangeAlgorithm.IsAnonymous(securityParameters.KeyExchangeAlgorithm) + || null != securityParameters.PeerCertificate) + { + throw new TlsFatalAlert(AlertDescription.unexpected_message); + } + + MemoryStream endPointHash = new MemoryStream(); + + Certificate.ParseOptions options = new Certificate.ParseOptions() + { + CertificateType = TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(serverExtensions, + CertificateType.X509), + MaxChainLength = client.GetMaxCertificateChainLength(), + }; + + Certificate serverCertificate = Certificate.Parse(options, clientContext, buf, endPointHash); + + TlsProtocol.AssertEmpty(buf); + + if (serverCertificate.IsEmpty) + throw new TlsFatalAlert(AlertDescription.decode_error); + + if (securityParameters.IsRenegotiating && !isSafeRenegotiationServerCertificate(clientContext, serverCertificate)) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, "Server certificate changed unsafely in renegotiation handshake"); + } + + securityParameters.PreRenegotiatingServerCert = null; + securityParameters.m_peerCertificate = serverCertificate; + securityParameters.m_tlsServerEndPoint = endPointHash.ToArray(); + + TlsAuthentication authentication = client.GetAuthentication(); + if (null == authentication) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return authentication; + } + + internal static TlsAuthentication Receive13ServerCertificate(TlsClientContext clientContext, TlsClient client, + MemoryStream buf, IDictionary serverExtensions) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + if (null != securityParameters.PeerCertificate) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + Certificate.ParseOptions options = new Certificate.ParseOptions() + { + CertificateType = TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(serverExtensions, + CertificateType.X509), + MaxChainLength = client.GetMaxCertificateChainLength(), + }; + + Certificate serverCertificate = Certificate.Parse(options, clientContext, buf, null); + + TlsProtocol.AssertEmpty(buf); + + if (serverCertificate.GetCertificateRequestContext().Length > 0) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + if (serverCertificate.IsEmpty) + throw new TlsFatalAlert(AlertDescription.decode_error); + + securityParameters.m_peerCertificate = serverCertificate; + securityParameters.m_tlsServerEndPoint = null; + + TlsAuthentication authentication = client.GetAuthentication(); + if (null == authentication) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return authentication; + } + + internal static TlsAuthentication Skip13ServerCertificate(TlsClientContext clientContext) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + if (null != securityParameters.PeerCertificate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + securityParameters.m_peerCertificate = null; + securityParameters.m_tlsServerEndPoint = null; + + return null; + } + + public static bool ContainsNonAscii(byte[] bs) + { + for (int i = 0; i < bs.Length; ++i) + { + int c = bs[i]; + if (c >= 0x80) + return true; + } + return false; + } + + public static bool ContainsNonAscii(string s) + { + for (int i = 0; i < s.Length; ++i) + { + int c = s[i]; + if (c >= 0x80) + return true; + } + return false; + } + + internal static IDictionary AddKeyShareToClientHello(TlsClientContext clientContext, + TlsClient client, IDictionary clientExtensions) + { + /* + * RFC 8446 9.2. If containing a "supported_groups" extension, it MUST also contain a + * "key_share" extension, and vice versa. An empty KeyShare.client_shares vector is + * permitted. + */ + if (!IsTlsV13(clientContext.ClientVersion) + || !clientExtensions.ContainsKey(ExtensionType.supported_groups)) + { + return null; + } + + var supportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension(clientExtensions); + var keyShareGroups = client.GetEarlyKeyShareGroups(); + var clientAgreements = new Dictionary(3); + var clientShares = new List(2); + + CollectKeyShares(clientContext.Crypto, supportedGroups, keyShareGroups, clientAgreements, clientShares); + + // TODO[tls13-psk] When clientShares empty, consider not adding extension if pre_shared_key in use + TlsExtensionsUtilities.AddKeyShareClientHello(clientExtensions, clientShares); + + return clientAgreements; + } + + internal static IDictionary AddKeyShareToClientHelloRetry(TlsClientContext clientContext, + IDictionary clientExtensions, int keyShareGroup) + { + int[] supportedGroups = new int[]{ keyShareGroup }; + var keyShareGroups = VectorOfOne(keyShareGroup); + var clientAgreements = new Dictionary(1); + var clientShares = new List(1); + + CollectKeyShares(clientContext.Crypto, supportedGroups, keyShareGroups, clientAgreements, clientShares); + + TlsExtensionsUtilities.AddKeyShareClientHello(clientExtensions, clientShares); + + if (clientAgreements.Count < 1 || clientShares.Count < 1) + { + // NOTE: Probable cause is declaring an unsupported NamedGroup in supported_groups extension + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + return clientAgreements; + } + + private static void CollectKeyShares(TlsCrypto crypto, int[] supportedGroups, IList keyShareGroups, + IDictionary clientAgreements, IList clientShares) + { + if (IsNullOrEmpty(supportedGroups)) + return; + + if (null == keyShareGroups || keyShareGroups.Count < 1) + return; + + for (int i = 0; i < supportedGroups.Length; ++i) + { + int supportedGroup = supportedGroups[i]; + + if (!keyShareGroups.Contains(supportedGroup) + || clientAgreements.ContainsKey(supportedGroup) + || !crypto.HasNamedGroup(supportedGroup)) + { + continue; + } + + TlsAgreement agreement = null; + if (NamedGroup.RefersToASpecificCurve(supportedGroup)) + { + if (crypto.HasECDHAgreement()) + { + agreement = crypto.CreateECDomain(new TlsECConfig(supportedGroup)).CreateECDH(); + } + } + else if (NamedGroup.RefersToASpecificFiniteField(supportedGroup)) + { + if (crypto.HasDHAgreement()) + { + agreement = crypto.CreateDHDomain(new TlsDHConfig(supportedGroup, true)).CreateDH(); + } + } + + if (null != agreement) + { + byte[] key_exchange = agreement.GenerateEphemeral(); + KeyShareEntry clientShare = new KeyShareEntry(supportedGroup, key_exchange); + + clientShares.Add(clientShare); + clientAgreements[supportedGroup] = agreement; + } + } + } + + internal static KeyShareEntry SelectKeyShare(IList clientShares, int keyShareGroup) + { + if (null != clientShares && 1 == clientShares.Count) + { + KeyShareEntry clientShare = (KeyShareEntry)clientShares[0]; + if (null != clientShare && clientShare.NamedGroup == keyShareGroup) + { + return clientShare; + } + } + return null; + } + + internal static KeyShareEntry SelectKeyShare(TlsCrypto crypto, ProtocolVersion negotiatedVersion, + IList clientShares, int[] clientSupportedGroups, int[] serverSupportedGroups) + { + if (null != clientShares && !IsNullOrEmpty(clientSupportedGroups) && !IsNullOrEmpty(serverSupportedGroups)) + { + foreach (KeyShareEntry clientShare in clientShares) + { + int group = clientShare.NamedGroup; + + if (!NamedGroup.CanBeNegotiated(group, negotiatedVersion)) + continue; + + if (!Arrays.Contains(serverSupportedGroups, group) || + !Arrays.Contains(clientSupportedGroups, group)) + { + continue; + } + + if (!crypto.HasNamedGroup(group)) + continue; + + if ((NamedGroup.RefersToASpecificCurve(group) && !crypto.HasECDHAgreement()) || + (NamedGroup.RefersToASpecificFiniteField(group) && !crypto.HasDHAgreement())) + { + continue; + } + + return clientShare; + } + } + return null; + } + + internal static int SelectKeyShareGroup(TlsCrypto crypto, ProtocolVersion negotiatedVersion, + int[] clientSupportedGroups, int[] serverSupportedGroups) + { + if (!IsNullOrEmpty(clientSupportedGroups) && !IsNullOrEmpty(serverSupportedGroups)) + { + foreach (int group in clientSupportedGroups) + { + if (!NamedGroup.CanBeNegotiated(group, negotiatedVersion)) + continue; + + if (!Arrays.Contains(serverSupportedGroups, group)) + continue; + + if (!crypto.HasNamedGroup(group)) + continue; + + if ((NamedGroup.RefersToASpecificCurve(group) && !crypto.HasECDHAgreement()) || + (NamedGroup.RefersToASpecificFiniteField(group) && !crypto.HasDHAgreement())) + { + continue; + } + + return group; + } + } + return -1; + } + + internal static byte[] ReadEncryptedPms(TlsContext context, Stream input) + { + if (IsSsl(context)) + return Ssl3Utilities.ReadEncryptedPms(input); + + return ReadOpaque16(input); + } + + internal static void WriteEncryptedPms(TlsContext context, byte[] encryptedPms, Stream output) + { + if (IsSsl(context)) + { + Ssl3Utilities.WriteEncryptedPms(encryptedPms, output); + } + else + { + WriteOpaque16(encryptedPms, output); + } + } + + internal static byte[] GetSessionID(TlsSession tlsSession) + { + if (null != tlsSession) + { + byte[] sessionID = tlsSession.SessionID; + if (null != sessionID + && sessionID.Length > 0 + && sessionID.Length <= 32) + { + return sessionID; + } + } + return EmptyBytes; + } + + internal static void AdjustTranscriptForRetry(TlsHandshakeHash handshakeHash) + { + byte[] clientHelloHash = GetCurrentPrfHash(handshakeHash); + handshakeHash.Reset(); + + int length = clientHelloHash.Length; + CheckUint8(length); + + byte[] synthetic = new byte[4 + length]; + WriteUint8(HandshakeType.message_hash, synthetic, 0); + WriteUint24(length, synthetic, 1); + Array.Copy(clientHelloHash, 0, synthetic, 4, length); + + handshakeHash.Update(synthetic, 0, synthetic.Length); + } + + internal static TlsCredentials EstablishClientCredentials(TlsAuthentication clientAuthentication, + CertificateRequest certificateRequest) + { + return ValidateCredentials(clientAuthentication.GetClientCredentials(certificateRequest)); + } + + internal static TlsCredentialedSigner Establish13ClientCredentials(TlsAuthentication clientAuthentication, + CertificateRequest certificateRequest) + { + return Validate13Credentials(clientAuthentication.GetClientCredentials(certificateRequest)); + } + + internal static void EstablishClientSigAlgs(SecurityParameters securityParameters, + IDictionary clientExtensions) + { + securityParameters.m_clientSigAlgs = TlsExtensionsUtilities.GetSignatureAlgorithmsExtension( + clientExtensions); + securityParameters.m_clientSigAlgsCert = TlsExtensionsUtilities.GetSignatureAlgorithmsCertExtension( + clientExtensions); + } + + internal static TlsCredentials EstablishServerCredentials(TlsServer server) + { + return ValidateCredentials(server.GetCredentials()); + } + + internal static TlsCredentialedSigner Establish13ServerCredentials(TlsServer server) + { + return Validate13Credentials(server.GetCredentials()); + } + + internal static void EstablishServerSigAlgs(SecurityParameters securityParameters, + CertificateRequest certificateRequest) + { + securityParameters.m_clientCertTypes = certificateRequest.CertificateTypes; + securityParameters.m_serverSigAlgs = certificateRequest.SupportedSignatureAlgorithms; + securityParameters.m_serverSigAlgsCert = certificateRequest.SupportedSignatureAlgorithmsCert; + + if (null == securityParameters.ServerSigAlgsCert) + { + securityParameters.m_serverSigAlgsCert = securityParameters.ServerSigAlgs; + } + } + + internal static TlsCredentials ValidateCredentials(TlsCredentials credentials) + { + if (null != credentials) + { + int count = 0; + count += (credentials is TlsCredentialedAgreement) ? 1 : 0; + count += (credentials is TlsCredentialedDecryptor) ? 1 : 0; + count += (credentials is TlsCredentialedSigner) ? 1 : 0; + if (count != 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + } + return credentials; + } + + internal static TlsCredentialedSigner Validate13Credentials(TlsCredentials credentials) + { + if (null == credentials) + return null; + + if (!(credentials is TlsCredentialedSigner)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return (TlsCredentialedSigner)credentials; + } + + internal static void NegotiatedCipherSuite(SecurityParameters securityParameters, int cipherSuite) + { + securityParameters.m_cipherSuite = cipherSuite; + securityParameters.m_keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite); + + int prfAlgorithm = GetPrfAlgorithm(securityParameters, cipherSuite); + securityParameters.m_prfAlgorithm = prfAlgorithm; + + switch (prfAlgorithm) + { + case PrfAlgorithm.ssl_prf_legacy: + case PrfAlgorithm.tls_prf_legacy: + { + securityParameters.m_prfCryptoHashAlgorithm = -1; + securityParameters.m_prfHashLength = -1; + break; + } + default: + { + int prfCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(prfAlgorithm); + + securityParameters.m_prfCryptoHashAlgorithm = prfCryptoHashAlgorithm; + securityParameters.m_prfHashLength = TlsCryptoUtilities.GetHashOutputSize(prfCryptoHashAlgorithm); + break; + } + } + + /* + * TODO[tls13] We're slowly moving towards negotiating cipherSuite THEN version. We could + * move this to "after parameter negotiation" i.e. after ServerHello/EncryptedExtensions. + */ + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + if (IsTlsV13(negotiatedVersion)) + { + securityParameters.m_verifyDataLength = securityParameters.PrfHashLength; + } + else + { + securityParameters.m_verifyDataLength = negotiatedVersion.IsSsl ? 36 : 12; + } + } + + internal static void NegotiatedVersion(SecurityParameters securityParameters) + { + if (!IsSignatureAlgorithmsExtensionAllowed(securityParameters.NegotiatedVersion)) + { + securityParameters.m_clientSigAlgs = null; + securityParameters.m_clientSigAlgsCert = null; + return; + } + + if (null == securityParameters.ClientSigAlgs) + { + securityParameters.m_clientSigAlgs = GetLegacySupportedSignatureAlgorithms(); + } + + if (null == securityParameters.ClientSigAlgsCert) + { + securityParameters.m_clientSigAlgsCert = securityParameters.ClientSigAlgs; + } + } + + internal static void NegotiatedVersionDtlsClient(TlsClientContext clientContext, TlsClient client) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!ProtocolVersion.IsSupportedDtlsVersionClient(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + NegotiatedVersion(securityParameters); + + client.NotifyServerVersion(negotiatedVersion); + } + + internal static void NegotiatedVersionDtlsServer(TlsServerContext serverContext) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!ProtocolVersion.IsSupportedDtlsVersionServer(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + NegotiatedVersion(securityParameters); + } + + internal static void NegotiatedVersionTlsClient(TlsClientContext clientContext, TlsClient client) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!ProtocolVersion.IsSupportedTlsVersionClient(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + NegotiatedVersion(securityParameters); + + client.NotifyServerVersion(negotiatedVersion); + } + + internal static void NegotiatedVersionTlsServer(TlsServerContext serverContext) + { + SecurityParameters securityParameters = serverContext.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!ProtocolVersion.IsSupportedTlsVersionServer(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + NegotiatedVersion(securityParameters); + } + + internal static TlsSecret DeriveSecret(SecurityParameters securityParameters, TlsSecret secret, string label, + byte[] transcriptHash) + { + int prfCryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm; + int prfHashLength = securityParameters.PrfHashLength; + + return DeriveSecret(prfCryptoHashAlgorithm, prfHashLength, secret, label, transcriptHash); + } + + internal static TlsSecret DeriveSecret(int prfCryptoHashAlgorithm, int prfHashLength, TlsSecret secret, + string label, byte[] transcriptHash) + { + if (transcriptHash.Length != prfHashLength) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return TlsCryptoUtilities.HkdfExpandLabel(secret, prfCryptoHashAlgorithm, label, transcriptHash, + prfHashLength); + } + + internal static TlsSecret GetSessionMasterSecret(TlsCrypto crypto, TlsSecret masterSecret) + { + if (null != masterSecret) + { + lock (masterSecret) + { + if (masterSecret.IsAlive()) + return crypto.AdoptSecret(masterSecret); + } + } + + return null; + } + + internal static bool IsPermittedExtensionType13(int handshakeType, int extensionType) + { + switch (extensionType) + { + case ExtensionType.server_name: + case ExtensionType.max_fragment_length: + case ExtensionType.supported_groups: + case ExtensionType.use_srtp: + case ExtensionType.heartbeat: + case ExtensionType.application_layer_protocol_negotiation: + case ExtensionType.client_certificate_type: + case ExtensionType.server_certificate_type: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.encrypted_extensions: + return true; + default: + return false; + } + } + case ExtensionType.status_request: + case ExtensionType.signed_certificate_timestamp: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.certificate_request: + case HandshakeType.certificate: + return true; + default: + return false; + } + } + case ExtensionType.signature_algorithms: + case ExtensionType.compress_certificate: + case ExtensionType.certificate_authorities: + case ExtensionType.signature_algorithms_cert: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.certificate_request: + return true; + default: + return false; + } + } + case ExtensionType.padding: + case ExtensionType.psk_key_exchange_modes: + case ExtensionType.post_handshake_auth: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + return true; + default: + return false; + } + } + case ExtensionType.key_share: + case ExtensionType.supported_versions: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.server_hello: + case HandshakeType.hello_retry_request: + return true; + default: + return false; + } + } + case ExtensionType.pre_shared_key: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.server_hello: + return true; + default: + return false; + } + } + case ExtensionType.early_data: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.encrypted_extensions: + case HandshakeType.new_session_ticket: + return true; + default: + return false; + } + } + case ExtensionType.cookie: + { + switch (handshakeType) + { + case HandshakeType.client_hello: + case HandshakeType.hello_retry_request: + return true; + default: + return false; + } + } + case ExtensionType.oid_filters: + { + switch (handshakeType) + { + case HandshakeType.certificate_request: + return true; + default: + return false; + } + } + default: + { + return !ExtensionType.IsRecognized(extensionType); + } + } + } + + /// + internal static void CheckExtensionData13(IDictionary extensions, int handshakeType, + short alertDescription) + { + foreach (int extensionType in extensions.Keys) + { + if (!IsPermittedExtensionType13(handshakeType, extensionType)) + throw new TlsFatalAlert(alertDescription, "Invalid extension: " + + ExtensionType.GetText(extensionType)); + } + } + + /// Generate a pre_master_secret and send it encrypted to the server. + /// + public static TlsSecret GenerateEncryptedPreMasterSecret(TlsContext context, TlsEncryptor encryptor, + Stream output) + { + ProtocolVersion version = context.RsaPreMasterSecretVersion; + TlsSecret preMasterSecret = context.Crypto.GenerateRsaPreMasterSecret(version); + byte[] encryptedPreMasterSecret = preMasterSecret.Encrypt(encryptor); + WriteEncryptedPms(context, encryptedPreMasterSecret, output); + return preMasterSecret; + } + + public static bool IsTimeout(SocketException e) + { + return SocketError.TimedOut == e.SocketErrorCode; + } + + /// + internal static void AddPreSharedKeyToClientExtensions(TlsPsk[] psks, IDictionary clientExtensions) + { + var identities = new List(psks.Length); + for (int i = 0; i < psks.Length; ++i) + { + TlsPsk psk = psks[i]; + + // TODO[tls13-psk] Handle obfuscated_ticket_age for resumption PSKs + identities.Add(new PskIdentity(psk.Identity, 0L)); + } + + TlsExtensionsUtilities.AddPreSharedKeyClientHello(clientExtensions, new OfferedPsks(identities)); + } + + /// + internal static OfferedPsks.BindersConfig AddPreSharedKeyToClientHello(TlsClientContext clientContext, + TlsClient client, IDictionary clientExtensions, int[] offeredCipherSuites) + { + if (!IsTlsV13(clientContext.ClientVersion)) + return null; + + TlsPskExternal[] pskExternals = GetPskExternalsClient(client, offeredCipherSuites); + if (null == pskExternals) + return null; + + short[] pskKeyExchangeModes = client.GetPskKeyExchangeModes(); + if (IsNullOrEmpty(pskKeyExchangeModes)) + throw new TlsFatalAlert(AlertDescription.internal_error, + "External PSKs configured but no PskKeyExchangeMode available"); + + TlsSecret[] pskEarlySecrets = GetPskEarlySecrets(clientContext.Crypto, pskExternals); + + int bindersSize = OfferedPsks.GetBindersSize(pskExternals); + + AddPreSharedKeyToClientExtensions(pskExternals, clientExtensions); + TlsExtensionsUtilities.AddPskKeyExchangeModesExtension(clientExtensions, pskKeyExchangeModes); + + return new OfferedPsks.BindersConfig(pskExternals, pskKeyExchangeModes, pskEarlySecrets, bindersSize); + } + + /// + internal static OfferedPsks.BindersConfig AddPreSharedKeyToClientHelloRetry(TlsClientContext clientContext, + OfferedPsks.BindersConfig clientBinders, IDictionary clientExtensions) + { + SecurityParameters securityParameters = clientContext.SecurityParameters; + + int prfAlgorithm = GetPrfAlgorithm13(securityParameters.CipherSuite); + + var pskIndices = GetPskIndices(clientBinders.m_psks, prfAlgorithm); + if (pskIndices.Count < 1) + return null; + + OfferedPsks.BindersConfig result = clientBinders; + + int count = pskIndices.Count; + if (count < clientBinders.m_psks.Length) + { + TlsPsk[] psks = new TlsPsk[count]; + TlsSecret[] earlySecrets = new TlsSecret[count]; + + for (int i = 0; i < count; ++i) + { + int j = (int)pskIndices[i]; + + psks[i] = clientBinders.m_psks[j]; + earlySecrets[i] = clientBinders.m_earlySecrets[j]; + } + + int bindersSize = OfferedPsks.GetBindersSize(psks); + + result = new OfferedPsks.BindersConfig(psks, clientBinders.m_pskKeyExchangeModes, earlySecrets, + bindersSize); + } + + AddPreSharedKeyToClientExtensions(result.m_psks, clientExtensions); + // NOTE: psk_key_exchange_modes should already be in 'clientExtensions' from the ClientHello + + return result; + } + + internal static OfferedPsks.SelectedConfig SelectPreSharedKey(TlsServerContext serverContext, TlsServer server, + IDictionary clientHelloExtensions, HandshakeMessageInput clientHelloMessage, + TlsHandshakeHash handshakeHash, bool afterHelloRetryRequest) + { + bool handshakeHashUpdated = false; + + OfferedPsks offeredPsks = TlsExtensionsUtilities.GetPreSharedKeyClientHello(clientHelloExtensions); + if (null != offeredPsks) + { + short[] pskKeyExchangeModes = TlsExtensionsUtilities.GetPskKeyExchangeModesExtension( + clientHelloExtensions); + if (IsNullOrEmpty(pskKeyExchangeModes)) + throw new TlsFatalAlert(AlertDescription.missing_extension); + + // TODO[tls13] Add support for psk_ke? + if (Arrays.Contains(pskKeyExchangeModes, PskKeyExchangeMode.psk_dhe_ke)) + { + // TODO[tls13] Prefer to get the exact index from the server? + TlsPskExternal psk = server.GetExternalPsk(offeredPsks.Identities); + if (null != psk) + { + int index = offeredPsks.GetIndexOfIdentity(new PskIdentity(psk.Identity, 0L)); + if (index >= 0) + { + byte[] binder = (byte[])offeredPsks.Binders[index]; + + TlsCrypto crypto = serverContext.Crypto; + TlsSecret earlySecret = GetPskEarlySecret(crypto, psk); + + // TODO[tls13-psk] Handle resumption PSKs + bool isExternalPsk = true; + int pskCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(psk.PrfAlgorithm); + + byte[] transcriptHash; + { + handshakeHashUpdated = true; + int bindersSize = offeredPsks.BindersSize; + clientHelloMessage.UpdateHashPrefix(handshakeHash, bindersSize); + + if (afterHelloRetryRequest) + { + transcriptHash = handshakeHash.GetFinalHash(pskCryptoHashAlgorithm); + } + else + { + TlsHash hash = crypto.CreateHash(pskCryptoHashAlgorithm); + handshakeHash.CopyBufferTo(new TlsHashSink(hash)); + transcriptHash = hash.CalculateHash(); + } + + clientHelloMessage.UpdateHashSuffix(handshakeHash, bindersSize); + } + + byte[] calculatedBinder = CalculatePskBinder(crypto, isExternalPsk, pskCryptoHashAlgorithm, + earlySecret, transcriptHash); + + if (Arrays.ConstantTimeAreEqual(calculatedBinder, binder)) + return new OfferedPsks.SelectedConfig(index, psk, pskKeyExchangeModes, earlySecret); + } + } + } + } + + if (!handshakeHashUpdated) + { + clientHelloMessage.UpdateHash(handshakeHash); + } + + return null; + } + + internal static TlsSecret GetPskEarlySecret(TlsCrypto crypto, TlsPsk psk) + { + int cryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(psk.PrfAlgorithm); + + return crypto + .HkdfInit(cryptoHashAlgorithm) + .HkdfExtract(cryptoHashAlgorithm, psk.Key); + } + + internal static TlsSecret[] GetPskEarlySecrets(TlsCrypto crypto, TlsPsk[] psks) + { + int count = psks.Length; + TlsSecret[] earlySecrets = new TlsSecret[count]; + for (int i = 0; i < count; ++i) + { + earlySecrets[i] = GetPskEarlySecret(crypto, psks[i]); + } + return earlySecrets; + } + + /// + internal static TlsPskExternal[] GetPskExternalsClient(TlsClient client, int[] offeredCipherSuites) + { + var externalPsks = client.GetExternalPsks(); + if (IsNullOrEmpty(externalPsks)) + return null; + + int[] prfAlgorithms = GetPrfAlgorithms13(offeredCipherSuites); + + int count = externalPsks.Count; + TlsPskExternal[] result = new TlsPskExternal[count]; + + for (int i = 0; i < count; ++i) + { + TlsPskExternal pskExternal = externalPsks[i] as TlsPskExternal; + if (null == pskExternal) + throw new TlsFatalAlert(AlertDescription.internal_error, + "External PSKs element is not a TlsPSKExternal"); + + if (!Arrays.Contains(prfAlgorithms, pskExternal.PrfAlgorithm)) + throw new TlsFatalAlert(AlertDescription.internal_error, + "External PSK incompatible with offered cipher suites"); + + result[i] = pskExternal; + } + + return result; + } + + internal static IList GetPskIndices(TlsPsk[] psks, int prfAlgorithm) + { + var v = new List(psks.Length); + for (int i = 0; i < psks.Length; ++i) + { + if (psks[i].PrfAlgorithm == prfAlgorithm) + { + v.Add(i); + } + } + return v; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs.meta new file mode 100644 index 00000000..733a552f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5ac1720a30987bf43ad492a260ecf969 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TlsUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs new file mode 100644 index 00000000..bff99038 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + public sealed class TrustedAuthority + { + private readonly short m_identifierType; + private readonly object m_identifier; + + public TrustedAuthority(short identifierType, object identifier) + { + if (!IsCorrectType(identifierType, identifier)) + throw new ArgumentException("not an instance of the correct type", "identifier"); + + this.m_identifierType = identifierType; + this.m_identifier = identifier; + } + + public short IdentifierType + { + get { return m_identifierType; } + } + + public object Identifier + { + get { return m_identifier; } + } + + public byte[] GetCertSha1Hash() + { + return Arrays.Clone((byte[])m_identifier); + } + + public byte[] GetKeySha1Hash() + { + return Arrays.Clone((byte[])m_identifier); + } + + public X509Name X509Name + { + get + { + CheckCorrectType(Tls.IdentifierType.x509_name); + return (X509Name)m_identifier; + } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + TlsUtilities.WriteUint8(m_identifierType, output); + + switch (m_identifierType) + { + case Tls.IdentifierType.cert_sha1_hash: + case Tls.IdentifierType.key_sha1_hash: + { + byte[] sha1Hash = (byte[])m_identifier; + output.Write(sha1Hash, 0, sha1Hash.Length); + break; + } + case Tls.IdentifierType.pre_agreed: + { + break; + } + case Tls.IdentifierType.x509_name: + { + X509Name dn = (X509Name)m_identifier; + byte[] derEncoding = dn.GetEncoded(Asn1Encodable.Der); + TlsUtilities.WriteOpaque16(derEncoding, output); + break; + } + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + /// Parse a from a . + /// the to parse from. + /// a object. + /// + public static TrustedAuthority Parse(Stream input) + { + short identifier_type = TlsUtilities.ReadUint8(input); + object identifier; + + switch (identifier_type) + { + case Tls.IdentifierType.cert_sha1_hash: + case Tls.IdentifierType.key_sha1_hash: + { + identifier = TlsUtilities.ReadFully(20, input); + break; + } + case Tls.IdentifierType.pre_agreed: + { + identifier = null; + break; + } + case Tls.IdentifierType.x509_name: + { + byte[] derEncoding = TlsUtilities.ReadOpaque16(input, 1); + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(derEncoding); + X509Name x509Name = X509Name.GetInstance(asn1); + TlsUtilities.RequireDerEncoding(x509Name, derEncoding); + identifier = x509Name; + break; + } + default: + throw new TlsFatalAlert(AlertDescription.decode_error); + } + + return new TrustedAuthority(identifier_type, identifier); + } + + private void CheckCorrectType(short expectedIdentifierType) + { + if (m_identifierType != expectedIdentifierType || !IsCorrectType(expectedIdentifierType, m_identifier)) + throw new InvalidOperationException("TrustedAuthority is not of type " + + Tls.IdentifierType.GetName(expectedIdentifierType)); + } + + private static bool IsCorrectType(short identifierType, object identifier) + { + switch (identifierType) + { + case Tls.IdentifierType.cert_sha1_hash: + case Tls.IdentifierType.key_sha1_hash: + return IsSha1Hash(identifier); + case Tls.IdentifierType.pre_agreed: + return identifier == null; + case Tls.IdentifierType.x509_name: + return identifier is X509Name; + default: + throw new ArgumentException("unsupported IdentifierType", "identifierType"); + } + } + + private static bool IsSha1Hash(object identifier) + { + return identifier is byte[] && ((byte[])identifier).Length == 20; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs.meta new file mode 100644 index 00000000..dc81756e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91b73d815d6bda14bbff876e953a6916 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/TrustedAuthority.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs new file mode 100644 index 00000000..e9705585 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 6066 5. + public sealed class UrlAndHash + { + private readonly string m_url; + private readonly byte[] m_sha1Hash; + + public UrlAndHash(string url, byte[] sha1Hash) + { + if (TlsUtilities.IsNullOrEmpty(url) || url.Length >= (1 << 16)) + throw new ArgumentException("must have length from 1 to (2^16 - 1)", "url"); + if (sha1Hash != null && sha1Hash.Length != 20) + throw new ArgumentException("must have length == 20, if present", "sha1Hash"); + + this.m_url = url; + this.m_sha1Hash = sha1Hash; + } + + public string Url + { + get { return m_url; } + } + + public byte[] Sha1Hash + { + get { return m_sha1Hash; } + } + + /// Encode this to a . + /// the to encode to. + /// + public void Encode(Stream output) + { + byte[] urlEncoding = Strings.ToByteArray(m_url); + TlsUtilities.WriteOpaque16(urlEncoding, output); + + if (m_sha1Hash == null) + { + TlsUtilities.WriteUint8(0, output); + } + else + { + TlsUtilities.WriteUint8(1, output); + output.Write(m_sha1Hash, 0, m_sha1Hash.Length); + } + } + + /// Parse a from a . + /// the of the current connection. + /// the to parse from. + /// a object. + /// + public static UrlAndHash Parse(TlsContext context, Stream input) + { + byte[] urlEncoding = TlsUtilities.ReadOpaque16(input, 1); + string url = Strings.FromByteArray(urlEncoding); + + byte[] sha1Hash = null; + short padding = TlsUtilities.ReadUint8(input); + switch (padding) + { + case 0: + if (TlsUtilities.IsTlsV12(context)) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + break; + case 1: + sha1Hash = TlsUtilities.ReadFully(20, input); + break; + default: + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + } + + return new UrlAndHash(url, sha1Hash); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs.meta new file mode 100644 index 00000000..b4d5f072 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 57d3fe473b5248c43b2d5097348d43f3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UrlAndHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs new file mode 100644 index 00000000..0af94566 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 5764 4.1.1 + public sealed class UseSrtpData + { + private readonly int[] m_protectionProfiles; + private readonly byte[] m_mki; + + /// see for valid constants. + /// valid lengths from 0 to 255. + public UseSrtpData(int[] protectionProfiles, byte[] mki) + { + if (TlsUtilities.IsNullOrEmpty(protectionProfiles) || protectionProfiles.Length >= (1 << 15)) + throw new ArgumentException("must have length from 1 to (2^15 - 1)", "protectionProfiles"); + + if (mki == null) + { + mki = TlsUtilities.EmptyBytes; + } + else if (mki.Length > 255) + { + throw new ArgumentException("cannot be longer than 255 bytes", "mki"); + } + + this.m_protectionProfiles = protectionProfiles; + this.m_mki = mki; + } + + /// see for valid constants. + public int[] ProtectionProfiles + { + get { return m_protectionProfiles; } + } + + /// valid lengths from 0 to 255. + public byte[] Mki + { + get { return m_mki; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs.meta new file mode 100644 index 00000000..987e8e8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c1b4aa0e4ed329e43809c45b0f828b18 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UseSrtpData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs new file mode 100644 index 00000000..e992c02f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls +{ + /// RFC 4681 + public abstract class UserMappingType + { + /* + * RFC 4681 + */ + public const short upn_domain_hint = 64; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs.meta new file mode 100644 index 00000000..5d6bb120 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f596c3c8b841f54c8a72efffae41133 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/UserMappingType.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto.meta new file mode 100644 index 00000000..7865553e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2cbd27b7428866848b713718131afe48 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs new file mode 100644 index 00000000..abcf4a1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public abstract class CryptoHashAlgorithm + { + public const int md5 = 1; + public const int sha1 = 2; + public const int sha224 = 3; + public const int sha256 = 4; + public const int sha384 = 5; + public const int sha512 = 6; + public const int sm3 = 7; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs.meta new file mode 100644 index 00000000..b3f1a627 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d936dc47006b56419947d9f121fde07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoHashAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs new file mode 100644 index 00000000..41cf0805 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public abstract class CryptoSignatureAlgorithm + { + public const int rsa = 1; + public const int dsa = 2; + public const int ecdsa = 3; + public const int rsa_pss_rsae_sha256 = 4; + public const int rsa_pss_rsae_sha384 = 5; + public const int rsa_pss_rsae_sha512 = 6; + public const int ed25519 = 7; + public const int ed448 = 8; + public const int rsa_pss_pss_sha256 = 9; + public const int rsa_pss_pss_sha384 = 10; + public const int rsa_pss_pss_sha512 = 11; + public const int ecdsa_brainpoolP256r1tls13_sha256 = 26; + public const int ecdsa_brainpoolP384r1tls13_sha384 = 27; + public const int ecdsa_brainpoolP512r1tls13_sha512 = 28; + public const int gostr34102012_256 = 64; + public const int gostr34102012_512 = 65; + public const int sm2 = 200; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs.meta new file mode 100644 index 00000000..bf103656 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a9c21464a3cafb84eb1d1ea41410a84e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/CryptoSignatureAlgorithm.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs new file mode 100644 index 00000000..c0dfe6f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Carrier class for Diffie-Hellman group parameters. + public class DHGroup + { + private readonly BigInteger g, p, q; + private readonly int l; + + /// Base constructor with the prime factor of (p - 1). + /// the prime modulus. + /// specifies the prime factor of (p - 1). + /// the base generator. + /// + public DHGroup(BigInteger p, BigInteger q, BigInteger g, int l) + { + this.p = p; + this.g = g; + this.q = q; + this.l = l; + } + + public virtual BigInteger G + { + get { return g; } + } + + public virtual int L + { + get { return l; } + } + + public virtual BigInteger P + { + get { return p; } + } + + public virtual BigInteger Q + { + get { return q; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs.meta new file mode 100644 index 00000000..4d33d4e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b0c3655356273524bbb61396c8f664fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHGroup.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs new file mode 100644 index 00000000..778cf69f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs @@ -0,0 +1,252 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Standard Diffie-Hellman groups from various IETF specifications. + public class DHStandardGroups + { + private static readonly BigInteger Two = BigInteger.Two; + + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + //private static DHGroup FromPG(string hexP, string hexG) + //{ + // return new DHGroup(FromHex(hexP), null, FromHex(hexG), 0); + //} + + private static DHGroup SafePrimeGen2(string hexP) + { + return SafePrimeGen2(hexP, 0); + } + + private static DHGroup SafePrimeGen2(string hexP, int l) + { + // NOTE: A group using a safe prime (i.e. q = (p-1)/2), and generator g = 2 + BigInteger p = FromHex(hexP); + return new DHGroup(p, p.ShiftRight(1), Two, l); + } + + /* + * RFC 2409 + */ + private static readonly string rfc2409_768_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"; + public static readonly DHGroup rfc2409_768 = SafePrimeGen2(rfc2409_768_p); + + private static readonly string rfc2409_1024_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381" + + "FFFFFFFFFFFFFFFF"; + public static readonly DHGroup rfc2409_1024 = SafePrimeGen2(rfc2409_1024_p); + + /* + * RFC 3526 + */ + private static readonly string rfc3526_1536_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_1536_l = 200; // RFC3526/RFC7919 + public static readonly DHGroup rfc3526_1536 = SafePrimeGen2(rfc3526_1536_p, rfc3526_1536_l); + + private static readonly string rfc3526_2048_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AACAA68FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_2048_l = System.Math.Max(225, 112 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHGroup rfc3526_2048 = SafePrimeGen2(rfc3526_2048_p, rfc3526_2048_l); + + private static readonly string rfc3526_3072_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_3072_l = System.Math.Max(275, 128 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHGroup rfc3526_3072 = SafePrimeGen2(rfc3526_3072_p, rfc3526_3072_l); + + private static readonly string rfc3526_4096_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" + "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" + + "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" + "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" + + "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" + "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" + + "FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_4096_l = System.Math.Max(325, 152 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHGroup rfc3526_4096 = SafePrimeGen2(rfc3526_4096_p, rfc3526_4096_l); + + private static readonly string rfc3526_6144_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + + "6DCC4024FFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_6144_l = System.Math.Max(375, 176 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHGroup rfc3526_6144 = SafePrimeGen2(rfc3526_6144_p, rfc3526_6144_l); + + private static readonly string rfc3526_8192_p = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" + + "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" + + "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" + + "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" + "83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" + + "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" + "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" + + "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" + "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" + + "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" + + "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" + "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" + + "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" + "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" + + "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" + "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BD" + "F8FF9406AD9E530EE5DB382F413001AEB06A53ED9027D831" + + "179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B" + "DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF" + + "5983CA01C64B92ECF032EA15D1721D03F482D7CE6E74FEF6" + "D55E702F46980C82B5A84031900B1C9E59E7C97FBEC7E8F3" + + "23A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE328" + + "06A1D58BB7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55C" + "DA56C9EC2EF29632387FE8D76E3C0468043E8F663F4860EE" + + "12BF2D5B0B7474D6E694F91E6DBE115974A3926F12FEE5E4" + "38777CB6A932DF8CD8BEC4D073B931BA3BC832B68D9DD300" + + "741FA7BF8AFC47ED2576F6936BA424663AAB639C5AE4F568" + "3423B4742BF1C978238F16CBE39D652DE3FDB8BEFC848AD9" + + "22222E04A4037C0713EB57A81A23F0C73473FC646CEA306B" + "4BCBC8862F8385DDFA9D4B7FA2C087E879683303ED5BDD3A" + + "062B3CF5B3A278A66D2A13F83F44F82DDF310EE074AB6A36" + "4597E899A0255DC164F31CC50846851DF9AB48195DED7EA1" + + "B1D510BD7EE74D73FAF36BC31ECFA268359046F4EB879F92" + "4009438B481C6CD7889A002ED5EE382BC9190DA6FC026E47" + + "9558E4475677E9AA9E3050E2765694DFC81F56E880B96E71" + "60C980DD98EDD3DFFFFFFFFFFFFFFFFF"; + private static readonly int rfc3526_8192_l = System.Math.Max(400, 200 * 2); // MAX(RFC3526/RFC7919,FIPS) + public static readonly DHGroup rfc3526_8192 = SafePrimeGen2(rfc3526_8192_p, rfc3526_8192_l); + + /* + * RFC 4306 + */ + public static readonly DHGroup rfc4306_768 = rfc2409_768; + public static readonly DHGroup rfc4306_1024 = rfc2409_1024; + + /* + * RFC 5996 + */ + public static readonly DHGroup rfc5996_768 = rfc4306_768; + public static readonly DHGroup rfc5996_1024 = rfc4306_1024; + + /* + * RFC 7919 + */ + private static readonly string rfc7919_ffdhe2048_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B423861285C97FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe2048_l = System.Math.Max(225, 112 * 2); // MAX(RFC7919,FIPS) + public static readonly DHGroup rfc7919_ffdhe2048 = SafePrimeGen2(rfc7919_ffdhe2048_p, rfc7919_ffdhe2048_l); + + private static readonly string rfc7919_ffdhe3072_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B66C62E37FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe3072_l = System.Math.Max(275, 128 * 2); // MAX(RFC7919,FIPS) + public static readonly DHGroup rfc7919_ffdhe3072 = SafePrimeGen2(rfc7919_ffdhe3072_p, rfc7919_ffdhe3072_l); + + private static readonly string rfc7919_ffdhe4096_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E655F6A" + + "FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe4096_l = System.Math.Max(325, 152 * 2); // MAX(RFC7919,FIPS) + public static readonly DHGroup rfc7919_ffdhe4096 = SafePrimeGen2(rfc7919_ffdhe4096_p, rfc7919_ffdhe4096_l); + + private static readonly string rfc7919_ffdhe6144_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E0DD902" + + "0BFD64B645036C7A4E677D2C38532A3A23BA4442CAF53EA6" + "3BB454329B7624C8917BDD64B1C0FD4CB38E8C334C701C3A" + + "CDAD0657FCCFEC719B1F5C3E4E46041F388147FB4CFDB477" + "A52471F7A9A96910B855322EDB6340D8A00EF092350511E3" + + "0ABEC1FFF9E3A26E7FB29F8C183023C3587E38DA0077D9B4" + "763E4E4B94B2BBC194C6651E77CAF992EEAAC0232A281BF6" + + "B3A739C1226116820AE8DB5847A67CBEF9C9091B462D538C" + "D72B03746AE77F5E62292C311562A846505DC82DB854338A" + + "E49F5235C95B91178CCF2DD5CACEF403EC9D1810C6272B04" + "5B3B71F9DC6B80D63FDD4A8E9ADB1E6962A69526D43161C1" + + "A41D570D7938DAD4A40E329CD0E40E65FFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe6144_l = System.Math.Max(375, 176 * 2); // MAX(RFC7919,FIPS) + public static readonly DHGroup rfc7919_ffdhe6144 = SafePrimeGen2(rfc7919_ffdhe6144_p, rfc7919_ffdhe6144_l); + + private static readonly string rfc7919_ffdhe8192_p = "FFFFFFFFFFFFFFFFADF85458A2BB4A9AAFDC5620273D3CF1" + + "D8B9C583CE2D3695A9E13641146433FBCC939DCE249B3EF9" + "7D2FE363630C75D8F681B202AEC4617AD3DF1ED5D5FD6561" + + "2433F51F5F066ED0856365553DED1AF3B557135E7F57C935" + "984F0C70E0E68B77E2A689DAF3EFE8721DF158A136ADE735" + + "30ACCA4F483A797ABC0AB182B324FB61D108A94BB2C8E3FB" + "B96ADAB760D7F4681D4F42A3DE394DF4AE56EDE76372BB19" + + "0B07A7C8EE0A6D709E02FCE1CDF7E2ECC03404CD28342F61" + "9172FE9CE98583FF8E4F1232EEF28183C3FE3B1B4C6FAD73" + + "3BB5FCBC2EC22005C58EF1837D1683B2C6F34A26C1B2EFFA" + "886B4238611FCFDCDE355B3B6519035BBC34F4DEF99C0238" + + "61B46FC9D6E6C9077AD91D2691F7F7EE598CB0FAC186D91C" + "AEFE130985139270B4130C93BC437944F4FD4452E2D74DD3" + + "64F2E21E71F54BFF5CAE82AB9C9DF69EE86D2BC522363A0D" + "ABC521979B0DEADA1DBF9A42D5C4484E0ABCD06BFA53DDEF" + + "3C1B20EE3FD59D7C25E41D2B669E1EF16E6F52C3164DF4FB" + "7930E9E4E58857B6AC7D5F42D69F6D187763CF1D55034004" + + "87F55BA57E31CC7A7135C886EFB4318AED6A1E012D9E6832" + "A907600A918130C46DC778F971AD0038092999A333CB8B7A" + + "1A1DB93D7140003C2A4ECEA9F98D0ACC0A8291CDCEC97DCF" + "8EC9B55A7F88A46B4DB5A851F44182E1C68A007E5E0DD902" + + "0BFD64B645036C7A4E677D2C38532A3A23BA4442CAF53EA6" + "3BB454329B7624C8917BDD64B1C0FD4CB38E8C334C701C3A" + + "CDAD0657FCCFEC719B1F5C3E4E46041F388147FB4CFDB477" + "A52471F7A9A96910B855322EDB6340D8A00EF092350511E3" + + "0ABEC1FFF9E3A26E7FB29F8C183023C3587E38DA0077D9B4" + "763E4E4B94B2BBC194C6651E77CAF992EEAAC0232A281BF6" + + "B3A739C1226116820AE8DB5847A67CBEF9C9091B462D538C" + "D72B03746AE77F5E62292C311562A846505DC82DB854338A" + + "E49F5235C95B91178CCF2DD5CACEF403EC9D1810C6272B04" + "5B3B71F9DC6B80D63FDD4A8E9ADB1E6962A69526D43161C1" + + "A41D570D7938DAD4A40E329CCFF46AAA36AD004CF600C838" + "1E425A31D951AE64FDB23FCEC9509D43687FEB69EDD1CC5E" + + "0B8CC3BDF64B10EF86B63142A3AB8829555B2F747C932665" + "CB2C0F1CC01BD70229388839D2AF05E454504AC78B758282" + + "2846C0BA35C35F5C59160CC046FD8251541FC68C9C86B022" + "BB7099876A460E7451A8A93109703FEE1C217E6C3826E52C" + + "51AA691E0E423CFC99E9E31650C1217B624816CDAD9A95F9" + "D5B8019488D9C0A0A1FE3075A577E23183F81D4A3F2FA457" + + "1EFC8CE0BA8A4FE8B6855DFE72B0A66EDED2FBABFBE58A30" + "FAFABE1C5D71A87E2F741EF8C1FE86FEA6BBFDE530677F0D" + + "97D11D49F7A8443D0822E506A9F4614E011E2A94838FF88C" + "D68C8BB7C5C6424CFFFFFFFFFFFFFFFF"; + private static readonly int rfc7919_ffdhe8192_l = System.Math.Max(400, 200 * 2); // MAX(RFC7919,FIPS) + public static readonly DHGroup rfc7919_ffdhe8192 = SafePrimeGen2(rfc7919_ffdhe8192_p, rfc7919_ffdhe8192_l); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs.meta new file mode 100644 index 00000000..873292f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4bcf0622142dc4f46b48a2f7bba37c73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/DHStandardGroups.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs new file mode 100644 index 00000000..debbff04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Carrier class for SRP-6 group parameters. + public class Srp6Group + { + private readonly BigInteger n, g; + + /// Base constructor. + /// the n value. + /// the g value. + public Srp6Group(BigInteger n, BigInteger g) + { + this.n = n; + this.g = g; + } + + public virtual BigInteger G + { + get { return g; } + } + + public virtual BigInteger N + { + get { return n; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs.meta new file mode 100644 index 00000000..97927dc3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93f0369e9df00e04882ce37436107a44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6Group.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs new file mode 100644 index 00000000..72499bce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// A selection of standard groups for SRP-6. + public class Srp6StandardGroups + { + private static BigInteger FromHex(string hex) + { + return new BigInteger(1, Hex.DecodeStrict(hex)); + } + + private static Srp6Group FromNG(string hexN, string hexG) + { + return new Srp6Group(FromHex(hexN), FromHex(hexG)); + } + + /* + * RFC 5054 + */ + private static readonly string rfc5054_1024_N = "EEAF0AB9ADB38DD69C33F80AFA8FC5E86072618775FF3C0B9EA2314C" + + "9C256576D674DF7496EA81D3383B4813D692C6E0E0D5D8E250B98BE4" + + "8E495C1D6089DAD15DC7D7B46154D6B6CE8EF4AD69B15D4982559B29" + + "7BCF1885C529F566660E57EC68EDBC3C05726CC02FD4CBF4976EAA9A" + "FD5138FE8376435B9FC61D2FC0EB06E3"; + private static readonly string rfc5054_1024_g = "02"; + public static readonly Srp6Group rfc5054_1024 = FromNG(rfc5054_1024_N, rfc5054_1024_g); + + private static readonly string rfc5054_1536_N = "9DEF3CAFB939277AB1F12A8617A47BBBDBA51DF499AC4C80BEEEA961" + + "4B19CC4D5F4F5F556E27CBDE51C6A94BE4607A291558903BA0D0F843" + + "80B655BB9A22E8DCDF028A7CEC67F0D08134B1C8B97989149B609E0B" + + "E3BAB63D47548381DBC5B1FC764E3F4B53DD9DA1158BFD3E2B9C8CF5" + + "6EDF019539349627DB2FD53D24B7C48665772E437D6C7F8CE442734A" + + "F7CCB7AE837C264AE3A9BEB87F8A2FE9B8B5292E5A021FFF5E91479E" + + "8CE7A28C2442C6F315180F93499A234DCF76E3FED135F9BB"; + private static readonly string rfc5054_1536_g = "02"; + public static readonly Srp6Group rfc5054_1536 = FromNG(rfc5054_1536_N, rfc5054_1536_g); + + private static readonly string rfc5054_2048_N = "AC6BDB41324A9A9BF166DE5E1389582FAF72B6651987EE07FC319294" + + "3DB56050A37329CBB4A099ED8193E0757767A13DD52312AB4B03310D" + + "CD7F48A9DA04FD50E8083969EDB767B0CF6095179A163AB3661A05FB" + + "D5FAAAE82918A9962F0B93B855F97993EC975EEAA80D740ADBF4FF74" + + "7359D041D5C33EA71D281E446B14773BCA97B43A23FB801676BD207A" + + "436C6481F1D2B9078717461A5B9D32E688F87748544523B524B0D57D" + + "5EA77A2775D2ECFA032CFBDBF52FB3786160279004E57AE6AF874E73" + + "03CE53299CCC041C7BC308D82A5698F3A8D0C38271AE35F8E9DBFBB6" + + "94B5C803D89F7AE435DE236D525F54759B65E372FCD68EF20FA7111F" + "9E4AFF73"; + private static readonly string rfc5054_2048_g = "02"; + public static readonly Srp6Group rfc5054_2048 = FromNG(rfc5054_2048_N, rfc5054_2048_g); + + private static readonly string rfc5054_3072_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + "E0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"; + private static readonly string rfc5054_3072_g = "05"; + public static readonly Srp6Group rfc5054_3072 = FromNG(rfc5054_3072_N, rfc5054_3072_g); + + private static readonly string rfc5054_4096_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" + "FFFFFFFFFFFFFFFF"; + private static readonly string rfc5054_4096_g = "05"; + public static readonly Srp6Group rfc5054_4096 = FromNG(rfc5054_4096_N, rfc5054_4096_g); + + private static readonly string rfc5054_6144_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + "6DCC4024FFFFFFFFFFFFFFFF"; + private static readonly string rfc5054_6144_g = "05"; + public static readonly Srp6Group rfc5054_6144 = FromNG(rfc5054_6144_N, rfc5054_6144_g); + + private static readonly string rfc5054_8192_N = "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" + + "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B" + + "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9" + + "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6" + + "49286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8" + + "FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D" + + "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C" + + "180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718" + + "3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D" + + "04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7D" + + "B3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D226" + + "1AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200C" + + "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFC" + + "E0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B26" + + "99C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB" + + "04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2" + + "233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127" + + "D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" + + "36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BDF8FF9406" + + "AD9E530EE5DB382F413001AEB06A53ED9027D831179727B0865A8918" + + "DA3EDBEBCF9B14ED44CE6CBACED4BB1BDB7F1447E6CC254B33205151" + + "2BD7AF426FB8F401378CD2BF5983CA01C64B92ECF032EA15D1721D03" + + "F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E59E7C97F" + + "BEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" + + "CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58B" + + "B7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632" + + "387FE8D76E3C0468043E8F663F4860EE12BF2D5B0B7474D6E694F91E" + + "6DBE115974A3926F12FEE5E438777CB6A932DF8CD8BEC4D073B931BA" + + "3BC832B68D9DD300741FA7BF8AFC47ED2576F6936BA424663AAB639C" + + "5AE4F5683423B4742BF1C978238F16CBE39D652DE3FDB8BEFC848AD9" + + "22222E04A4037C0713EB57A81A23F0C73473FC646CEA306B4BCBC886" + + "2F8385DDFA9D4B7FA2C087E879683303ED5BDD3A062B3CF5B3A278A6" + + "6D2A13F83F44F82DDF310EE074AB6A364597E899A0255DC164F31CC5" + + "0846851DF9AB48195DED7EA1B1D510BD7EE74D73FAF36BC31ECFA268" + + "359046F4EB879F924009438B481C6CD7889A002ED5EE382BC9190DA6" + + "FC026E479558E4475677E9AA9E3050E2765694DFC81F56E880B96E71" + "60C980DD98EDD3DFFFFFFFFFFFFFFFFF"; + private static readonly string rfc5054_8192_g = "13"; + public static readonly Srp6Group rfc5054_8192 = FromNG(rfc5054_8192_N, rfc5054_8192_g); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs.meta new file mode 100644 index 00000000..66926c80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 205519e32004ec443a23ee9eff3923d5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Srp6StandardGroups.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs new file mode 100644 index 00000000..095eb9c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public interface Tls13Verifier + { + /// + Stream Stream { get; } + + /// + bool VerifySignature(byte[] signature); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs.meta new file mode 100644 index 00000000..ee29e10d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ea3189791a7d584795742784a615f67 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/Tls13Verifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs new file mode 100644 index 00000000..e9e94548 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for ephemeral key agreement calculator. + public interface TlsAgreement + { + /// Generate an ephemeral key pair, returning the encoding of the public key. + /// a byte encoding of the public key. + /// + byte[] GenerateEphemeral(); + + /// Pass in the public key for the peer to the agreement calculator. + /// a byte encoding of the peer public key. + /// + void ReceivePeerValue(byte[] peerValue); + + /// Calculate the agreed secret based on the calculator's current state. + /// the calculated secret. + /// + TlsSecret CalculateSecret(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs.meta new file mode 100644 index 00000000..9e42a9cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 24670de321572894ba49d4b6a1541cbb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs new file mode 100644 index 00000000..8161c30f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs @@ -0,0 +1,61 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Interface providing the functional representation of a single X.509 certificate. + public interface TlsCertificate + { + /// Return an encryptor based on the public key in this certificate. + /// + /// a based on this certificate's public key. + /// + TlsEncryptor CreateEncryptor(int tlsCertificateRole); + + /// + /// + TlsVerifier CreateVerifier(short signatureAlgorithm); + + /// + /// + Tls13Verifier CreateVerifier(int signatureScheme); + + /// + byte[] GetEncoded(); + + /// + byte[] GetExtension(DerObjectIdentifier extensionOid); + + BigInteger SerialNumber { get; } + + /// the OID of this certificate's 'signatureAlgorithm', as a string. + string SigAlgOid { get; } + + /// + Asn1Encodable GetSigAlgParams(); + + /// + /// + short GetLegacySignatureAlgorithm(); + + /// + /// true if (and only if) this certificate can be used to verify the given signature algorithm. + /// + /// + bool SupportsSignatureAlgorithm(short signatureAlgorithm); + + /// + bool SupportsSignatureAlgorithmCA(short signatureAlgorithm); + + /// + /// + TlsCertificate CheckUsageInRole(int tlsCertificateRole); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs.meta new file mode 100644 index 00000000..4d4b7a7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f094c228f79705f4ea97f12cdf31b47e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs new file mode 100644 index 00000000..d657d0e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public abstract class TlsCertificateRole + { + public const int DH = 1; + public const int ECDH = 2; + public const int RsaEncryption = 3; + public const int Sm2Encryption = 4; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs.meta new file mode 100644 index 00000000..89795a4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0a2666397e244784c857e835885555ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCertificateRole.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs new file mode 100644 index 00000000..861d4560 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for a TLS bulk cipher. + public interface TlsCipher + { + /// Return the maximum input size for a ciphertext given a maximum output size for the plaintext of + /// plaintextLimit bytes. + /// the maximum output size for the plaintext. + /// the maximum input size of the ciphertext for plaintextlimit bytes of output. + int GetCiphertextDecodeLimit(int plaintextLimit); + + /// Return the maximum output size for a ciphertext given an actual input plaintext size of + /// plaintextLength bytes and a maximum input plaintext size of plaintextLimit bytes. + /// the actual input size for the plaintext. + /// the maximum input size for the plaintext. + /// the maximum output size of the ciphertext for plaintextlimit bytes of input. + int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit); + + /// Return the maximum size for the plaintext given ciphertextlimit bytes of ciphertext. + /// the maximum number of bytes of ciphertext. + /// the maximum size of the plaintext for ciphertextlimit bytes of input. + int GetPlaintextLimit(int ciphertextLimit); + + /// Encode the passed in plaintext using the current bulk cipher. + /// sequence number of the message represented by plaintext. + /// content type of the message represented by plaintext. + /// used for the record. + /// extra bytes to allocate at start of returned byte array. + /// array holding input plaintext to the cipher. + /// offset into input array the plaintext starts at. + /// length of the plaintext in the array. + /// A containing the result of encoding (after 'headerAllocation' unused + /// bytes). + /// + TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int offset, int len); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext); +#endif + + /// Decode the passed in ciphertext using the current bulk cipher. + /// sequence number of the message represented by ciphertext. + /// content type used in the record for this message. + /// used for the record. + /// array holding input ciphertext to the cipher. + /// offset into input array the ciphertext starts at. + /// length of the ciphertext in the array. + /// A containing the result of decoding. + /// + TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int offset, int len); + + /// + void RekeyDecoder(); + + /// + void RekeyEncoder(); + + bool UsesOpaqueRecordType { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs.meta new file mode 100644 index 00000000..9a1df671 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0b77c7e74f9f80944804026db5cfa431 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs new file mode 100644 index 00000000..ff044ee3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs @@ -0,0 +1,213 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Service and object creation interface for the primitive types and services that are associated with + /// cryptography in the API. + public interface TlsCrypto + { + /// Return true if this TlsCrypto would use a stream verifier for any of the passed in algorithms. + /// + /// This method is only relevant to handshakes negotiating (D)TLS 1.2. + /// A list of + /// values. + /// true if this instance would use a stream verifier for any of the passed in algorithms, otherwise + /// false. + bool HasAnyStreamVerifiers(IList signatureAndHashAlgorithms); + + /// Return true if this TlsCrypto would use a stream verifier for any of the passed in algorithms. + /// + /// This method is only relevant to handshakes negotiating (D)TLS versions older than 1.2. + /// An array of values. + /// true if this instance would use a stream verifier for any of the passed in algorithms, otherwise + /// false. + bool HasAnyStreamVerifiersLegacy(short[] clientCertificateTypes); + + /// Return true if this TlsCrypto can support the passed in hash algorithm. + /// the algorithm of interest. + /// true if cryptoHashAlgorithm is supported, false otherwise. + bool HasCryptoHashAlgorithm(int cryptoHashAlgorithm); + + /// Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in + /// combination with EVERY hash algorithm). + /// the algorithm of interest. + /// true if cryptoSignatureAlgorithm is supported, false otherwise. + bool HasCryptoSignatureAlgorithm(int cryptoSignatureAlgorithm); + + /// Return true if this TlsCrypto can support DH key agreement. + /// true if this instance can support DH key agreement, false otherwise. + bool HasDHAgreement(); + + /// Return true if this TlsCrypto can support ECDH key agreement. + /// true if this instance can support ECDH key agreement, false otherwise. + bool HasECDHAgreement(); + + /// Return true if this TlsCrypto can support the passed in block/stream encryption algorithm. + /// + /// the algorithm of interest. + /// true if encryptionAlgorithm is supported, false otherwise. + bool HasEncryptionAlgorithm(int encryptionAlgorithm); + + /// Return true if this TlsCrypto can support HKDF with the passed in hash algorithm. + /// the algorithm of interest. + /// true if HKDF is supported with cryptoHashAlgorithm, false otherwise. + bool HasHkdfAlgorithm(int cryptoHashAlgorithm); + + /// Return true if this TlsCrypto can support the passed in MAC algorithm. + /// the algorithm of interest. + /// true if macAlgorithm is supported, false otherwise. + bool HasMacAlgorithm(int macAlgorithm); + + /// Return true if this TlsCrypto supports the passed in named group + /// value. + /// true if this instance supports the passed in named group value. + /// + bool HasNamedGroup(int namedGroup); + + /// Return true if this TlsCrypto can support RSA encryption/decryption. + /// true if this instance can support RSA encryption/decryption, false otherwise. + bool HasRsaEncryption(); + + /// Return true if this TlsCrypto can support the passed in signature algorithm (not necessarily in + /// combination with EVERY hash algorithm). + /// true if signatureAlgorithm is supported, false otherwise. + bool HasSignatureAlgorithm(short signatureAlgorithm); + + /// Return true if this TlsCrypto can support the passed in signature algorithm. + /// the algorithm of interest. + /// true if sigAndHashAlgorithm is supported, false otherwise. + bool HasSignatureAndHashAlgorithm(SignatureAndHashAlgorithm sigAndHashAlgorithm); + + /// Return true if this TlsCrypto can support the passed in signature scheme. + /// the scheme of interest. + /// true if signatureScheme is supported, false otherwise. + bool HasSignatureScheme(int signatureScheme); + + /// Return true if this TlsCrypto can support SRP authentication. + /// true if this instance can support SRP authentication, false otherwise. + bool HasSrpAuthentication(); + + /// Create a TlsSecret object based on provided data. + /// the data to base the TlsSecret on. + /// a TlsSecret based on the provided data. + TlsSecret CreateSecret(byte[] data); + + /// Create a TlsSecret object containing a randomly-generated RSA PreMasterSecret + /// the client version to place in the first 2 bytes + /// a TlsSecret containing the PreMasterSecret. + TlsSecret GenerateRsaPreMasterSecret(ProtocolVersion clientVersion); + + /// Return the primary (safest) SecureRandom for this crypto. + /// a SecureRandom suitable for key generation. + SecureRandom SecureRandom { get; } + + /// Create a TlsCertificate from an ASN.1 binary encoding of an X.509 certificate. + /// DER/BER encoding of the certificate of interest. + /// a TlsCertificate. + /// if there is an issue on decoding or constructing the certificate. + TlsCertificate CreateCertificate(byte[] encoding); + + /// Create a TlsCertificate from an ASN.1 binary encoding of a certificate. + /// Certificate type as per IANA TLS Certificate Types registry. + /// DER/BER encoding of the certificate of interest. + /// a TlsCertificate. + /// if there is an issue on decoding or constructing the certificate. + TlsCertificate CreateCertificate(short type, byte[] encoding); + + /// Create a cipher for the specified encryption and MAC algorithms. + /// + /// See enumeration classes , for appropriate + /// argument values. + /// + /// context specific parameters. + /// the encryption algorithm to be employed by the cipher. + /// the MAC algorithm to be employed by the cipher. + /// a implementing the encryption and MAC algorithms. + /// + TlsCipher CreateCipher(TlsCryptoParameters cryptoParams, int encryptionAlgorithm, int macAlgorithm); + + /// Create a domain object supporting the domain parameters described in dhConfig. + /// the config describing the DH parameters to use. + /// a TlsDHDomain supporting the parameters in dhConfig. + TlsDHDomain CreateDHDomain(TlsDHConfig dhConfig); + + /// Create a domain object supporting the domain parameters described in ecConfig. + /// the config describing the EC parameters to use. + /// a TlsECDomain supporting the parameters in ecConfig. + TlsECDomain CreateECDomain(TlsECConfig ecConfig); + + /// Adopt the passed in secret, creating a new copy of it. + /// the secret to make a copy of. + /// a TlsSecret based on the original secret. + TlsSecret AdoptSecret(TlsSecret secret); + + /// Create a suitable hash for the hash algorithm identifier passed in. + /// + /// See enumeration class for appropriate argument values. + /// + /// the hash algorithm the hash needs to implement. + /// a . + TlsHash CreateHash(int cryptoHashAlgorithm); + + /// Create a suitable HMAC for the MAC algorithm identifier passed in. + /// + /// See enumeration class for appropriate argument values. + /// + /// the MAC algorithm the HMAC needs to match. + /// a . + TlsHmac CreateHmac(int macAlgorithm); + + /// Create a suitable HMAC using the hash algorithm identifier passed in. + /// + /// See enumeration class for appropriate argument values. + /// + /// the hash algorithm the HMAC should use. + /// a . + TlsHmac CreateHmacForHash(int cryptoHashAlgorithm); + + /// Create a nonce generator. + /// + /// Each call should construct a new generator, and the generator should be returned from this call only after + /// automatically seeding from this 's entropy source, and from the provided additional + /// seed material. The output of each returned generator must be completely independent of the others. + /// + /// context-specific seed material + /// a . + TlsNonceGenerator CreateNonceGenerator(byte[] additionalSeedMaterial); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + TlsNonceGenerator CreateNonceGenerator(ReadOnlySpan additionalSeedMaterial); +#endif + + /// Create an SRP-6 client. + /// client config. + /// an initialised SRP6 client object. + TlsSrp6Client CreateSrp6Client(TlsSrpConfig srpConfig); + + /// Create an SRP-6 server. + /// server config. + /// the SRP6 verifier value. + /// an initialised SRP6 server object. + TlsSrp6Server CreateSrp6Server(TlsSrpConfig srpConfig, BigInteger srpVerifier); + + /// Create an SRP-6 verifier generator. + /// generator config. + /// an initialized SRP6 verifier generator. + TlsSrp6VerifierGenerator CreateSrp6VerifierGenerator(TlsSrpConfig srpConfig); + + /// Setup an initial "secret" for a chain of HKDF calls (RFC 5869), containing a string of HashLen + /// zeroes. + /// the hash algorithm to instantiate HMAC with. See + /// for values. + TlsSecret HkdfInit(int cryptoHashAlgorithm); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs.meta new file mode 100644 index 00000000..d03c3211 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bc2f369987b63394e9ca2b8c392d3305 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCrypto.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs new file mode 100644 index 00000000..11096bcd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Basic exception class for crypto services to pass back a cause. + [Serializable] + public class TlsCryptoException + : TlsException + { + public TlsCryptoException() + : base() + { + } + + public TlsCryptoException(string message) + : base(message) + { + } + + public TlsCryptoException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected TlsCryptoException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs.meta new file mode 100644 index 00000000..e9eb257b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32c1bc5a5e541124cb019e44d6feab9f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs new file mode 100644 index 00000000..83e73b3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + // TODO[tls-port] Would rather this be sealed + /// Carrier class for context-related parameters needed for creating secrets and ciphers. + public class TlsCryptoParameters + { + private readonly TlsContext m_context; + + /// Base constructor. + /// the context for this parameters object. + public TlsCryptoParameters(TlsContext context) + { + this.m_context = context; + } + + public SecurityParameters SecurityParameters + { + get { return m_context.SecurityParameters; } + } + + public ProtocolVersion ClientVersion + { + get { return m_context.ClientVersion; } + } + + public ProtocolVersion RsaPreMasterSecretVersion + { + get { return m_context.RsaPreMasterSecretVersion; } + } + + // TODO[tls-port] Would rather this be non-virtual + public virtual ProtocolVersion ServerVersion + { + get { return m_context.ServerVersion; } + } + + public bool IsServer + { + get { return m_context.IsServer; } + } + + public TlsNonceGenerator NonceGenerator + { + get { return m_context.NonceGenerator; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs.meta new file mode 100644 index 00000000..e8be417f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5552d77408907594282bf61c6c6b311b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs new file mode 100644 index 00000000..678bfb24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs @@ -0,0 +1,278 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public abstract class TlsCryptoUtilities + { + // "tls13 " + private static readonly byte[] Tls13Prefix = new byte[] { 0x74, 0x6c, 0x73, 0x31, 0x33, 0x20 }; + + public static int GetHash(short hashAlgorithm) + { + switch (hashAlgorithm) + { + case HashAlgorithm.md5: + return CryptoHashAlgorithm.md5; + case HashAlgorithm.sha1: + return CryptoHashAlgorithm.sha1; + case HashAlgorithm.sha224: + return CryptoHashAlgorithm.sha224; + case HashAlgorithm.sha256: + return CryptoHashAlgorithm.sha256; + case HashAlgorithm.sha384: + return CryptoHashAlgorithm.sha384; + case HashAlgorithm.sha512: + return CryptoHashAlgorithm.sha512; + default: + throw new ArgumentException("specified HashAlgorithm invalid: " + HashAlgorithm.GetText(hashAlgorithm)); + } + } + + public static int GetHashForHmac(int macAlgorithm) + { + switch (macAlgorithm) + { + case MacAlgorithm.hmac_md5: + return CryptoHashAlgorithm.md5; + case MacAlgorithm.hmac_sha1: + return CryptoHashAlgorithm.sha1; + case MacAlgorithm.hmac_sha256: + return CryptoHashAlgorithm.sha256; + case MacAlgorithm.hmac_sha384: + return CryptoHashAlgorithm.sha384; + case MacAlgorithm.hmac_sha512: + return CryptoHashAlgorithm.sha512; + default: + throw new ArgumentException("specified MacAlgorithm not an HMAC: " + MacAlgorithm.GetText(macAlgorithm)); + } + } + + public static int GetHashForPrf(int prfAlgorithm) + { + switch (prfAlgorithm) + { + case PrfAlgorithm.ssl_prf_legacy: + case PrfAlgorithm.tls_prf_legacy: + throw new ArgumentException("legacy PRF not a valid algorithm"); + case PrfAlgorithm.tls_prf_sha256: + case PrfAlgorithm.tls13_hkdf_sha256: + return CryptoHashAlgorithm.sha256; + case PrfAlgorithm.tls_prf_sha384: + case PrfAlgorithm.tls13_hkdf_sha384: + return CryptoHashAlgorithm.sha384; + case PrfAlgorithm.tls13_hkdf_sm3: + return CryptoHashAlgorithm.sm3; + default: + throw new ArgumentException("unknown PrfAlgorithm: " + PrfAlgorithm.GetText(prfAlgorithm)); + } + } + + public static int GetHashInternalSize(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + case CryptoHashAlgorithm.sha1: + case CryptoHashAlgorithm.sha224: + case CryptoHashAlgorithm.sha256: + case CryptoHashAlgorithm.sm3: + return 64; + case CryptoHashAlgorithm.sha384: + case CryptoHashAlgorithm.sha512: + return 128; + default: + throw new ArgumentException(); + } + } + + public static int GetHashOutputSize(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + return 16; + case CryptoHashAlgorithm.sha1: + return 20; + case CryptoHashAlgorithm.sha224: + return 28; + case CryptoHashAlgorithm.sha256: + case CryptoHashAlgorithm.sm3: + return 32; + case CryptoHashAlgorithm.sha384: + return 48; + case CryptoHashAlgorithm.sha512: + return 64; + default: + throw new ArgumentException(); + } + } + + public static DerObjectIdentifier GetOidForHash(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + return PkcsObjectIdentifiers.MD5; + case CryptoHashAlgorithm.sha1: + return X509ObjectIdentifiers.IdSha1; + case CryptoHashAlgorithm.sha224: + return NistObjectIdentifiers.IdSha224; + case CryptoHashAlgorithm.sha256: + return NistObjectIdentifiers.IdSha256; + case CryptoHashAlgorithm.sha384: + return NistObjectIdentifiers.IdSha384; + case CryptoHashAlgorithm.sha512: + return NistObjectIdentifiers.IdSha512; + // TODO[RFC 8998] + //case CryptoHashAlgorithm.sm3: + // return GMObjectIdentifiers.sm3; + default: + throw new ArgumentException(); + } + } + + public static int GetSignature(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + return CryptoSignatureAlgorithm.rsa; + case SignatureAlgorithm.dsa: + return CryptoSignatureAlgorithm.dsa; + case SignatureAlgorithm.ecdsa: + return CryptoSignatureAlgorithm.ecdsa; + case SignatureAlgorithm.rsa_pss_rsae_sha256: + return CryptoSignatureAlgorithm.rsa_pss_rsae_sha256; + case SignatureAlgorithm.rsa_pss_rsae_sha384: + return CryptoSignatureAlgorithm.rsa_pss_rsae_sha384; + case SignatureAlgorithm.rsa_pss_rsae_sha512: + return CryptoSignatureAlgorithm.rsa_pss_rsae_sha512; + case SignatureAlgorithm.ed25519: + return CryptoSignatureAlgorithm.ed25519; + case SignatureAlgorithm.ed448: + return CryptoSignatureAlgorithm.ed448; + case SignatureAlgorithm.rsa_pss_pss_sha256: + return CryptoSignatureAlgorithm.rsa_pss_pss_sha256; + case SignatureAlgorithm.rsa_pss_pss_sha384: + return CryptoSignatureAlgorithm.rsa_pss_pss_sha384; + case SignatureAlgorithm.rsa_pss_pss_sha512: + return CryptoSignatureAlgorithm.rsa_pss_pss_sha512; + case SignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256: + return CryptoSignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256; + case SignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384: + return CryptoSignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384; + case SignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512: + return CryptoSignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512; + case SignatureAlgorithm.gostr34102012_256: + return CryptoSignatureAlgorithm.gostr34102012_256; + case SignatureAlgorithm.gostr34102012_512: + return CryptoSignatureAlgorithm.gostr34102012_512; + default: + throw new ArgumentException("specified SignatureAlgorithm invalid: " + + SignatureAlgorithm.GetText(signatureAlgorithm)); + } + } + + /// + public static TlsSecret HkdfExpandLabel(TlsSecret secret, int cryptoHashAlgorithm, string label, + byte[] context, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return HkdfExpandLabel(secret, cryptoHashAlgorithm, label.AsSpan(), context.AsSpan(), length); +#else + int labelLength = label.Length; + if (labelLength < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int contextLength = context.Length; + int expandedLabelLength = Tls13Prefix.Length + labelLength; + + byte[] hkdfLabel = new byte[2 + (1 + expandedLabelLength) + (1 + contextLength)]; + + // uint16 length + { + TlsUtilities.CheckUint16(length); + TlsUtilities.WriteUint16(length, hkdfLabel, 0); + } + + // opaque label<7..255> + { + TlsUtilities.CheckUint8(expandedLabelLength); + TlsUtilities.WriteUint8(expandedLabelLength, hkdfLabel, 2); + + Array.Copy(Tls13Prefix, 0, hkdfLabel, 2 + 1, Tls13Prefix.Length); + + int labelPos = 2 + (1 + Tls13Prefix.Length); + for (int i = 0; i < labelLength; ++i) + { + char c = label[i]; + hkdfLabel[labelPos + i] = (byte)c; + } + } + + // context + { + TlsUtilities.WriteOpaque8(context, hkdfLabel, 2 + (1 + expandedLabelLength)); + } + + return secret.HkdfExpand(cryptoHashAlgorithm, hkdfLabel, length); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + /// + public static TlsSecret HkdfExpandLabel(TlsSecret secret, int cryptoHashAlgorithm, ReadOnlySpan label, + ReadOnlySpan context, int length) + { + int labelLength = label.Length; + if (labelLength < 1) + throw new TlsFatalAlert(AlertDescription.internal_error); + + int contextLength = context.Length; + int expandedLabelLength = Tls13Prefix.Length + labelLength; + + int hkdfLabelLength = 2 + (1 + expandedLabelLength) + (1 + contextLength); + Span hkdfLabel = hkdfLabelLength <= 512 + ? stackalloc byte[hkdfLabelLength] + : new byte[hkdfLabelLength]; + + // uint16 length + { + TlsUtilities.CheckUint16(length); + TlsUtilities.WriteUint16(length, hkdfLabel); + } + + // opaque label<7..255> + { + TlsUtilities.CheckUint8(expandedLabelLength); + TlsUtilities.WriteUint8(expandedLabelLength, hkdfLabel[2..]); + + Tls13Prefix.CopyTo(hkdfLabel[3..]); + + int labelPos = 2 + (1 + Tls13Prefix.Length); + for (int i = 0; i < labelLength; ++i) + { + hkdfLabel[labelPos + i] = (byte)label[i]; + } + } + + // context + { + TlsUtilities.WriteOpaque8(context, hkdfLabel.Slice(2 + (1 + expandedLabelLength))); + } + + return secret.HkdfExpand(cryptoHashAlgorithm, hkdfLabel, length); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs.meta new file mode 100644 index 00000000..e22a0e60 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5a4c8bc3b91696042aa554bc9fdd7ad9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsCryptoUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs new file mode 100644 index 00000000..3c7dece7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Basic config for Diffie-Hellman. + public class TlsDHConfig + { + protected readonly DHGroup m_explicitGroup; + protected readonly int m_namedGroup; + protected readonly bool m_padded; + + public TlsDHConfig(DHGroup explicitGroup) + { + this.m_explicitGroup = explicitGroup; + this.m_namedGroup = -1; + this.m_padded = false; + } + + public TlsDHConfig(int namedGroup, bool padded) + { + this.m_explicitGroup = null; + this.m_namedGroup = namedGroup; + this.m_padded = padded; + } + + public virtual DHGroup ExplicitGroup + { + get { return m_explicitGroup; } + } + + public virtual int NamedGroup + { + get { return m_namedGroup; } + } + + public virtual bool IsPadded + { + get { return m_padded; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs.meta new file mode 100644 index 00000000..8ac0d437 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 748773f6e1dff094cb0f790cd14e3555 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHConfig.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs new file mode 100644 index 00000000..62ecc5bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Domain interface to service factory for creating Diffie-Hellman operators. + public interface TlsDHDomain + { + /// Return an agreement operator suitable for ephemeral Diffie-Hellman. + /// a key agreement operator. + TlsAgreement CreateDH(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs.meta new file mode 100644 index 00000000..487a469a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa1eab0ee5788854da1284cc99dc5804 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDHDomain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs new file mode 100644 index 00000000..f009cd87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public sealed class TlsDecodeResult + { + public readonly byte[] buf; + public readonly int off, len; + public readonly short contentType; + + public readonly bool fromBufferPool; + + public TlsDecodeResult(byte[] buf, int off, int len, short contentType) + { + this.buf = buf; + this.off = off; + this.len = len; + this.contentType = contentType; + this.fromBufferPool = false; + } + + public TlsDecodeResult(byte[] buf, int off, int len, short contentType, bool fromPool) + { + this.buf = buf; + this.off = off; + this.len = len; + this.contentType = contentType; + this.fromBufferPool = fromPool; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs.meta new file mode 100644 index 00000000..6853f5b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b924eab0ba3728a42be192b3a9b1a3cd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsDecodeResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs new file mode 100644 index 00000000..192dfab9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Carrier class for Elliptic Curve parameter configuration. + public class TlsECConfig + { + protected readonly int m_namedGroup; + + public TlsECConfig(int namedGroup) + { + this.m_namedGroup = namedGroup; + } + + /// Return the group used. + /// the named group used. + public virtual int NamedGroup + { + get { return m_namedGroup; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs.meta new file mode 100644 index 00000000..2c796d11 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ade4e9b429294542967a145103922c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECConfig.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs new file mode 100644 index 00000000..6098a75a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Domain interface to service factory for creating Elliptic-Curve (EC) based operators. + public interface TlsECDomain + { + /// Return an agreement operator suitable for ephemeral EC Diffie-Hellman. + /// a key agreement operator. + TlsAgreement CreateECDH(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs.meta new file mode 100644 index 00000000..2492bf22 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 10e062c0536b4c44d9448289ee7590ae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsECDomain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs new file mode 100644 index 00000000..0abf25ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public readonly struct TlsEncodeResult + { + public readonly byte[] buf; + public readonly int off, len; + public readonly short recordType; + public readonly bool fromBufferPool; + + public TlsEncodeResult(byte[] buf, int off, int len, short recordType) + { + this.buf = buf; + this.off = off; + this.len = len; + this.recordType = recordType; + this.fromBufferPool = false; + } + + public TlsEncodeResult(byte[] buf, int off, int len, short recordType, bool fromPool) + { + this.buf = buf; + this.off = off; + this.len = len; + this.recordType = recordType; + this.fromBufferPool = fromPool; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs.meta new file mode 100644 index 00000000..e8b70411 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5cfbddb26f474c741983d651383cd999 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncodeResult.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs new file mode 100644 index 00000000..843b60cd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for an encryptor. + public interface TlsEncryptor + { + /// Encrypt data from the passed in input array. + /// byte array containing the input data. + /// offset into input where the data starts. + /// the length of the data to encrypt. + /// the encrypted data. + /// + byte[] Encrypt(byte[] input, int inOff, int length); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs.meta new file mode 100644 index 00000000..2c0c6a94 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e69e056457e8f0648ba3ecc52a488126 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsEncryptor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs new file mode 100644 index 00000000..0591a199 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Interface for message digest, or hash, services. + public interface TlsHash + { + /// Update the hash with the passed in input. + /// input array containing the data. + /// offset into the input array the input starts at. + /// the length of the input data. + void Update(byte[] input, int inOff, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void Update(ReadOnlySpan input); +#endif + + /// Return calculated hash for any input passed in. + /// the hash value. + byte[] CalculateHash(); + + /// Return a clone of this hash object representing its current state. + /// a clone of the current hash. + TlsHash CloneHash(); + + /// Reset the hash underlying this service. + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs.meta new file mode 100644 index 00000000..de877980 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 387cc504bb8ab384fab899dea727bf18 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs new file mode 100644 index 00000000..b5e30788 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public class TlsHashSink + : BaseOutputStream + { + private readonly TlsHash m_hash; + + public TlsHashSink(TlsHash hash) + { + this.m_hash = hash; + } + + public virtual TlsHash Hash + { + get { return m_hash; } + } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { + m_hash.Update(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (!buffer.IsEmpty) + { + m_hash.Update(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_hash.Update(new byte[]{ value }, 0, 1); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs.meta new file mode 100644 index 00000000..fb4f5db3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 463860056c41f4346b6be85b9accb68e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHashSink.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs new file mode 100644 index 00000000..2ea2756d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Interface for MAC services based on HMAC. + public interface TlsHmac + : TlsMac + { + /// Return the internal block size for the message digest underlying this HMAC service. + /// the internal block size for the digest (in bytes). + int InternalBlockSize { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs.meta new file mode 100644 index 00000000..57dbe976 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4b362f49fe3ef084cb107a1e44e043e0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsHmac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs new file mode 100644 index 00000000..dcb79ca2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Interface for MAC services. + public interface TlsMac + { + /// Set the key to be used by the MAC implementation supporting this service. + /// array holding the MAC key. + /// offset into the array the key starts at. + /// length of the key in the array. + void SetKey(byte[] key, int keyOff, int keyLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void SetKey(ReadOnlySpan key); +#endif + + /// Update the MAC with the passed in input. + /// input array containing the data. + /// offset into the input array the input starts at. + /// the length of the input data. + void Update(byte[] input, int inOff, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void Update(ReadOnlySpan input); +#endif + + /// Return calculated MAC for any input passed in. + /// the MAC value. + byte[] CalculateMac(); + + /// Write the calculated MAC to an output buffer. + /// output array to write the MAC to. + /// offset into the output array to write the MAC to. + void CalculateMac(byte[] output, int outOff); + + /// Return the length of the MAC generated by this service. + /// the MAC length. + int MacLength { get; } + + /// Reset the MAC underlying this service. + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs.meta new file mode 100644 index 00000000..97a8c156 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 81261daf0b292bb43ade1651aa7ed471 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs new file mode 100644 index 00000000..95039fe6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public class TlsMacSink + : BaseOutputStream + { + private readonly TlsMac m_mac; + + public TlsMacSink(TlsMac mac) + { + this.m_mac = mac; + } + + public virtual TlsMac Mac + { + get { return m_mac; } + } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count > 0) + { + m_mac.Update(buffer, offset, count); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + if (!buffer.IsEmpty) + { + m_mac.Update(buffer); + } + } +#endif + + public override void WriteByte(byte value) + { + m_mac.Update(new byte[]{ value }, 0, 1); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs.meta new file mode 100644 index 00000000..9fc97671 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9a296a68917660a4c8926c6c82e6ec25 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsMacSink.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs new file mode 100644 index 00000000..5e78fd23 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public interface TlsNonceGenerator + { + /// Generate a nonce byte[] string. + /// the length, in bytes, of the nonce to generate. + /// the nonce value. + byte[] GenerateNonce(int size); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs.meta new file mode 100644 index 00000000..bd74ce58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 717feeb79537785489328fadeb2e5424 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNonceGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs new file mode 100644 index 00000000..8d21b832 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs @@ -0,0 +1,69 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// The cipher for TLS_NULL_WITH_NULL_NULL. + public sealed class TlsNullNullCipher + : TlsCipher + { + public static readonly TlsNullNullCipher Instance = new TlsNullNullCipher(); + + public int GetCiphertextDecodeLimit(int plaintextLimit) + { + return plaintextLimit; + } + + public int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + return plaintextLength; + } + + public int GetPlaintextLimit(int ciphertextLimit) + { + return ciphertextLimit; + } + + public TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int offset, int len) + { + byte[] result = new byte[headerAllocation + len]; + Array.Copy(plaintext, offset, result, headerAllocation, len); + return new TlsEncodeResult(result, 0, result.Length, contentType); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + byte[] result = new byte[headerAllocation + plaintext.Length]; + plaintext.CopyTo(result.AsSpan(headerAllocation)); + return new TlsEncodeResult(result, 0, result.Length, contentType); + } +#endif + + public TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int offset, int len) + { + return new TlsDecodeResult(ciphertext, offset, len, recordType); + } + + public void RekeyDecoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public void RekeyEncoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public bool UsesOpaqueRecordType + { + get { return false; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs.meta new file mode 100644 index 00000000..cb16d3f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7ccd0e8d7f3664448b160e2c75a447ca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsNullNullCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs new file mode 100644 index 00000000..8e6213c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Interface supporting the generation of key material and other SSL/TLS secret values from PRFs. + /// + public interface TlsSecret + { + /// Calculate an HMAC with this secret's data as the key. + /// the hash algorithm to instantiate HMAC with. See + /// for values. + /// array containing the input data. + /// offset into the input array the input starts at. + /// the length of the input data. + byte[] CalculateHmac(int cryptoHashAlgorithm, byte[] buf, int off, int len); + + /// Return a new secret based on applying a PRF to this one. + /// PRF algorithm to use. + /// the label details. + /// the seed details. + /// the size (in bytes) of the secret to generate. + /// the new secret. + TlsSecret DeriveUsingPrf(int prfAlgorithm, string label, byte[] seed, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + TlsSecret DeriveUsingPrf(int prfAlgorithm, ReadOnlySpan label, ReadOnlySpan seed, int length); +#endif + + /// Destroy the internal state of the secret. + /// + /// After this call, any attempt to use the will result in an + /// being thrown. + /// + void Destroy(); + + /// Return an encrypted copy of the data this secret is based on. + /// the encryptor to use for protecting the internal data. + /// an encrypted copy of this secret's internal data. + /// + byte[] Encrypt(TlsEncryptor encryptor); + + /// Return the internal data from this secret. + /// + /// The does not keep a copy of the data. After this call, any attempt to use the + /// will result in an being thrown. + /// + /// the secret's internal data. + byte[] Extract(); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void ExtractTo(Span output); +#endif + + /// RFC 5869 HKDF-Expand function, with this secret's data as the pseudo-random key ('prk'). + /// the hash algorithm to instantiate HMAC with. See + /// for values. + /// optional context and application specific information (can be zero-length). + /// length of output keying material in octets. + /// output keying material (of 'length' octets). + TlsSecret HkdfExpand(int cryptoHashAlgorithm, byte[] info, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + TlsSecret HkdfExpand(int cryptoHashAlgorithm, ReadOnlySpan info, int length); +#endif + + /// RFC 5869 HKDF-Extract function, with this secret's data as the 'salt'. + /// + /// The does not keep a copy of the data. After this call, any attempt to use + /// the will result in an being thrown. + /// + /// the hash algorithm to instantiate HMAC with. See + /// for values. + /// input keying material. + /// a pseudo-random key (of HashLen octets). + TlsSecret HkdfExtract(int cryptoHashAlgorithm, TlsSecret ikm); + + bool IsAlive(); + + int Length { get; } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs.meta new file mode 100644 index 00000000..84d7b02e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6f16cce2acdd6e548bffafcfe575bf55 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSecret.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs new file mode 100644 index 00000000..01b55b4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for a TLS signer that works on raw message digests. + public interface TlsSigner + { + /// Generate an encoded signature based on the passed in hash. + /// the signature algorithm to use. + /// the hash calculated for the signature. + /// an encoded signature. + /// in case of an exception processing the hash. + byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash); + + /// + TlsStreamSigner GetStreamSigner(SignatureAndHashAlgorithm algorithm); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs.meta new file mode 100644 index 00000000..439e7ec2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c609c0931be8d5e4b84e415f8ed9ca31 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs new file mode 100644 index 00000000..5822925f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Basic interface for an SRP-6 client implementation. + public interface TlsSrp6Client + { + /// Generates the secret S given the server's credentials + /// The server's credentials + /// Client's verification message for the server + /// If server's credentials are invalid + BigInteger CalculateSecret(BigInteger serverB); + + /// Generates client's credentials given the client's salt, identity and password + /// The salt used in the client's verifier. + /// The user's identity (eg. username) + /// The user's password + /// Client's public value to send to server + BigInteger GenerateClientCredentials(byte[] salt, byte[] identity, byte[] password); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs.meta new file mode 100644 index 00000000..ca7584cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41a27b95c3714ac4ca31e0197be1bf90 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Client.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs new file mode 100644 index 00000000..31047e10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs @@ -0,0 +1,26 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Basic interface for an SRP-6 server implementation. + public interface TlsSrp6Server + { + /// Generates the server's credentials that are to be sent to the client. + /// The server's public value to the client + BigInteger GenerateServerCredentials(); + + /// Processes the client's credentials. If valid the shared secret is generated and returned. + /// + /// The client's credentials. + /// A shared secret . + /// If client's credentials are invalid. + BigInteger CalculateSecret(BigInteger clientA); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs.meta new file mode 100644 index 00000000..cc481dc3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a798c5ab8db5b5d4d9e09bba2238c81f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6Server.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs new file mode 100644 index 00000000..f06eb30f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for a generator for SRP-6 verifiers. + public interface TlsSrp6VerifierGenerator + { + /// Creates a new SRP-6 verifier value. + /// The salt to use, generally should be large and random + /// The user's identifying information (eg. username) + /// The user's password + /// A new verifier for use in future SRP authentication + BigInteger GenerateVerifier(byte[] salt, byte[] identity, byte[] password); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs.meta new file mode 100644 index 00000000..5a66a92c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6067341625c3494aabbf45ded1554ee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrp6VerifierGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs new file mode 100644 index 00000000..29fb11a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Basic config for SRP. + public class TlsSrpConfig + { + protected BigInteger[] m_explicitNG; + + /// Return the (N, g) values used in SRP-6. + /// (N, g) as a BigInteger array (N=[0], g=[1]). + public BigInteger[] GetExplicitNG() + { + return (BigInteger[])m_explicitNG.Clone(); + } + + /// Set the (N, g) values used for SRP-6. + /// (N, g) as a BigInteger array (N=[0], g=[1]). + public void SetExplicitNG(BigInteger[] explicitNG) + { + this.m_explicitNG = (BigInteger[])explicitNG.Clone(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs.meta new file mode 100644 index 00000000..2a251e44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f652b9b598c392b4180b81525345bd82 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsSrpConfig.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs new file mode 100644 index 00000000..c7498a1c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public interface TlsStreamSigner + { + /// + Stream Stream { get; } + + /// + byte[] GetSignature(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs.meta new file mode 100644 index 00000000..4c37c3cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 03ab1650caa08b34eb0ae69200df4a4a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs new file mode 100644 index 00000000..f7ad0e40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + public interface TlsStreamVerifier + { + /// + Stream Stream { get; } + + /// + bool IsVerified(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs.meta new file mode 100644 index 00000000..cf554e50 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ec649f72a473a64f889da81b4b108f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsStreamVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs new file mode 100644 index 00000000..5a12ce2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto +{ + /// Base interface for a TLS verifier that works with signatures and either raw message digests, or entire + /// messages. + public interface TlsVerifier + { + /// + TlsStreamVerifier GetStreamVerifier(DigitallySigned digitallySigned); + + /// Return true if the passed in signature and hash represent a real signature. + /// the signature object containing the signature to be verified. + /// the hash calculated for the signature. + /// true if signature verifies, false otherwise. + /// in case of an exception verifying signature. + bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs.meta new file mode 100644 index 00000000..78ae99cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec72a295b17351e48a3bf0680e05a613 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/TlsVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl.meta new file mode 100644 index 00000000..e6b35500 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f838c3e33cb9a32408bf9e4d4d4a4955 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs new file mode 100644 index 00000000..98970c2f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Base class for a TlsCrypto implementation that provides some needed methods from elsewhere in the impl + /// package. + public abstract class AbstractTlsCrypto + : TlsCrypto + { + public abstract bool HasAnyStreamVerifiers(IList signatureAndHashAlgorithms); + + public abstract bool HasAnyStreamVerifiersLegacy(short[] clientCertificateTypes); + + public abstract bool HasCryptoHashAlgorithm(int cryptoHashAlgorithm); + + public abstract bool HasCryptoSignatureAlgorithm(int cryptoSignatureAlgorithm); + + public abstract bool HasDHAgreement(); + + public abstract bool HasECDHAgreement(); + + public abstract bool HasEncryptionAlgorithm(int encryptionAlgorithm); + + public abstract bool HasHkdfAlgorithm(int cryptoHashAlgorithm); + + public abstract bool HasMacAlgorithm(int macAlgorithm); + + public abstract bool HasNamedGroup(int namedGroup); + + public abstract bool HasRsaEncryption(); + + public abstract bool HasSignatureAlgorithm(short signatureAlgorithm); + + public abstract bool HasSignatureAndHashAlgorithm(SignatureAndHashAlgorithm sigAndHashAlgorithm); + + public abstract bool HasSignatureScheme(int signatureScheme); + + public abstract bool HasSrpAuthentication(); + + public abstract TlsSecret CreateSecret(byte[] data); + + public abstract TlsSecret GenerateRsaPreMasterSecret(ProtocolVersion clientVersion); + + public abstract SecureRandom SecureRandom { get; } + + public virtual TlsCertificate CreateCertificate(byte[] encoding) + { + return CreateCertificate(CertificateType.X509, encoding); + } + + public abstract TlsCertificate CreateCertificate(short type, byte[] encoding); + + public abstract TlsCipher CreateCipher(TlsCryptoParameters cryptoParams, int encryptionAlgorithm, int macAlgorithm); + + public abstract TlsDHDomain CreateDHDomain(TlsDHConfig dhConfig); + + public abstract TlsECDomain CreateECDomain(TlsECConfig ecConfig); + + public virtual TlsSecret AdoptSecret(TlsSecret secret) + { + // TODO[tls] Need an alternative that doesn't require AbstractTlsSecret (which holds literal data) + if (secret is AbstractTlsSecret) + { + AbstractTlsSecret sec = (AbstractTlsSecret)secret; + + return CreateSecret(sec.CopyData()); + } + + throw new ArgumentException("unrecognized TlsSecret - cannot copy data: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(secret)); + } + + public abstract TlsHash CreateHash(int cryptoHashAlgorithm); + + public abstract TlsHmac CreateHmac(int macAlgorithm); + + public abstract TlsHmac CreateHmacForHash(int cryptoHashAlgorithm); + + public abstract TlsNonceGenerator CreateNonceGenerator(byte[] additionalSeedMaterial); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract TlsNonceGenerator CreateNonceGenerator(ReadOnlySpan additionalSeedMaterial); +#endif + + public abstract TlsSrp6Client CreateSrp6Client(TlsSrpConfig srpConfig); + + public abstract TlsSrp6Server CreateSrp6Server(TlsSrpConfig srpConfig, BigInteger srpVerifier); + + public abstract TlsSrp6VerifierGenerator CreateSrp6VerifierGenerator(TlsSrpConfig srpConfig); + + public abstract TlsSecret HkdfInit(int cryptoHashAlgorithm); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs.meta new file mode 100644 index 00000000..f32b662f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1a4a126833da2e40844fa8069bfeb86 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsCrypto.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs new file mode 100644 index 00000000..e0b04d4d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs @@ -0,0 +1,144 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Base class for a TlsSecret implementation which captures common code and fields. + public abstract class AbstractTlsSecret + : TlsSecret + { + protected static byte[] CopyData(AbstractTlsSecret other) + { + return other.CopyData(); + } + + protected byte[] m_data; + + /// Base constructor. + /// the byte[] making up the secret value. + protected AbstractTlsSecret(byte[] data) + { + m_data = data; + } + + protected virtual void CheckAlive() + { + if (m_data == null) + throw new InvalidOperationException("Secret has already been extracted or destroyed"); + } + + protected abstract AbstractTlsCrypto Crypto { get; } + + public virtual byte[] CalculateHmac(int cryptoHashAlgorithm, byte[] buf, int off, int len) + { + lock (this) + { + CheckAlive(); + + TlsHmac hmac = Crypto.CreateHmacForHash(cryptoHashAlgorithm); + hmac.SetKey(m_data, 0, m_data.Length); + hmac.Update(buf, off, len); + return hmac.CalculateMac(); + } + } + + public abstract TlsSecret DeriveUsingPrf(int prfAlgorithm, string label, byte[] seed, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract TlsSecret DeriveUsingPrf(int prfAlgorithm, ReadOnlySpan label, ReadOnlySpan seed, + int length); +#endif + + public virtual void Destroy() + { + lock (this) + { + if (m_data != null) + { + // TODO Is there a way to ensure the data is really overwritten? + Array.Clear(m_data, 0, m_data.Length); + m_data = null; + } + } + } + + /// + public virtual byte[] Encrypt(TlsEncryptor encryptor) + { + lock (this) + { + CheckAlive(); + + return encryptor.Encrypt(m_data, 0, m_data.Length); + } + } + + public virtual byte[] Extract() + { + lock (this) + { + CheckAlive(); + + byte[] result = m_data; + m_data = null; + return result; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ExtractTo(Span output) + { + lock (this) + { + CheckAlive(); + + m_data.CopyTo(output); + m_data = null; + } + } +#endif + + public abstract TlsSecret HkdfExpand(int cryptoHashAlgorithm, byte[] info, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public abstract TlsSecret HkdfExpand(int cryptoHashAlgorithm, ReadOnlySpan info, int length); +#endif + + public abstract TlsSecret HkdfExtract(int cryptoHashAlgorithm, TlsSecret ikm); + + public virtual bool IsAlive() + { + lock (this) + { + return null != m_data; + } + } + + public virtual int Length + { + get + { + lock (this) + { + CheckAlive(); + + return m_data.Length; + } + } + } + + internal virtual byte[] CopyData() + { + lock (this) + { + return Arrays.Clone(m_data); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs.meta new file mode 100644 index 00000000..15e1de3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ef94305ee072ddf41a9532746428c761 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/AbstractTlsSecret.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs new file mode 100644 index 00000000..ea169b3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + public sealed class LegacyTls13Verifier + : TlsVerifier + { + private readonly int m_signatureScheme; + private readonly Tls13Verifier m_tls13Verifier; + + public LegacyTls13Verifier(int signatureScheme, Tls13Verifier tls13Verifier) + { + if (!TlsUtilities.IsValidUint16(signatureScheme)) + throw new ArgumentException("signatureScheme"); + if (tls13Verifier == null) + throw new ArgumentNullException("tls13Verifier"); + + this.m_signatureScheme = signatureScheme; + this.m_tls13Verifier = tls13Verifier; + } + + public TlsStreamVerifier GetStreamVerifier(DigitallySigned digitallySigned) + { + SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm; + if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + return new TlsStreamVerifierImpl(m_tls13Verifier, digitallySigned.Signature); + } + + public bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) + { + throw new NotSupportedException(); + } + + private class TlsStreamVerifierImpl + : TlsStreamVerifier + { + private readonly Tls13Verifier m_tls13Verifier; + private readonly byte[] m_signature; + + internal TlsStreamVerifierImpl(Tls13Verifier tls13Verifier, byte[] signature) + { + this.m_tls13Verifier = tls13Verifier; + this.m_signature = signature; + } + + public Stream Stream + { + get { return m_tls13Verifier.Stream; } + } + + public bool IsVerified() + { + return m_tls13Verifier.VerifySignature(m_signature); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs.meta new file mode 100644 index 00000000..30b7ace0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8723fad84fcafb34b816778c033680f2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/LegacyTls13Verifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs new file mode 100644 index 00000000..73c5b2e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs @@ -0,0 +1,140 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + public abstract class RsaUtilities + { + private static readonly byte[] RSAPSSParams_256_A, RSAPSSParams_384_A, RSAPSSParams_512_A; + private static readonly byte[] RSAPSSParams_256_B, RSAPSSParams_384_B, RSAPSSParams_512_B; + + static RsaUtilities() + { + /* + * RFC 4055 + */ + + AlgorithmIdentifier sha256Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256); + AlgorithmIdentifier sha384Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384); + AlgorithmIdentifier sha512Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512); + AlgorithmIdentifier sha256Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance); + AlgorithmIdentifier sha384Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance); + AlgorithmIdentifier sha512Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance); + + AlgorithmIdentifier mgf1SHA256Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_A); + AlgorithmIdentifier mgf1SHA384Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_A); + AlgorithmIdentifier mgf1SHA512Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_A); + AlgorithmIdentifier mgf1SHA256Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_B); + AlgorithmIdentifier mgf1SHA384Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_B); + AlgorithmIdentifier mgf1SHA512Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_B); + + DerInteger sha256Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha256)); + DerInteger sha384Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha384)); + DerInteger sha512Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha512)); + + DerInteger trailerField = new DerInteger(1); + + try + { + RSAPSSParams_256_A = new RsassaPssParameters(sha256Identifier_A, mgf1SHA256Identifier_A, sha256Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + RSAPSSParams_384_A = new RsassaPssParameters(sha384Identifier_A, mgf1SHA384Identifier_A, sha384Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + RSAPSSParams_512_A = new RsassaPssParameters(sha512Identifier_A, mgf1SHA512Identifier_A, sha512Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + RSAPSSParams_256_B = new RsassaPssParameters(sha256Identifier_B, mgf1SHA256Identifier_B, sha256Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + RSAPSSParams_384_B = new RsassaPssParameters(sha384Identifier_B, mgf1SHA384Identifier_B, sha384Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + RSAPSSParams_512_B = new RsassaPssParameters(sha512Identifier_B, mgf1SHA512Identifier_B, sha512Size, trailerField) + .GetEncoded(Asn1Encodable.Der); + } + catch (IOException e) + { + throw new InvalidOperationException(e.Message); + } + } + + public static bool SupportsPkcs1(AlgorithmIdentifier pubKeyAlgID) + { + DerObjectIdentifier oid = pubKeyAlgID.Algorithm; + return PkcsObjectIdentifiers.RsaEncryption.Equals(oid) + || X509ObjectIdentifiers.IdEARsa.Equals(oid); + } + + public static bool SupportsPss_Pss(short signatureAlgorithm, AlgorithmIdentifier pubKeyAlgID) + { + DerObjectIdentifier oid = pubKeyAlgID.Algorithm; + if (!PkcsObjectIdentifiers.IdRsassaPss.Equals(oid)) + return false; + + /* + * TODO ASN.1 NULL shouldn't really be allowed here; it's a workaround for e.g. Oracle JDK + * 1.8.0_241, where the X.509 certificate implementation adds the NULL when re-encoding the + * original parameters. It appears it was fixed at some later date (OpenJDK 12.0.2 does not + * have the issue), but not sure exactly when. + */ + Asn1Encodable pssParams = pubKeyAlgID.Parameters; + if (null == pssParams || pssParams is DerNull) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + return true; + default: + return false; + } + } + + byte[] encoded; + try + { + encoded = pssParams.ToAsn1Object().GetEncoded(Asn1Encodable.Der); + } + catch (Exception) + { + return false; + } + + byte[] expected_A, expected_B; + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa_pss_pss_sha256: + expected_A = RSAPSSParams_256_A; + expected_B = RSAPSSParams_256_B; + break; + case SignatureAlgorithm.rsa_pss_pss_sha384: + expected_A = RSAPSSParams_384_A; + expected_B = RSAPSSParams_384_B; + break; + case SignatureAlgorithm.rsa_pss_pss_sha512: + expected_A = RSAPSSParams_512_A; + expected_B = RSAPSSParams_512_B; + break; + default: + return false; + } + + return Arrays.AreEqual(expected_A, encoded) + || Arrays.AreEqual(expected_B, encoded); + } + + public static bool SupportsPss_Rsae(AlgorithmIdentifier pubKeyAlgID) + { + DerObjectIdentifier oid = pubKeyAlgID.Algorithm; + return PkcsObjectIdentifiers.RsaEncryption.Equals(oid); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs.meta new file mode 100644 index 00000000..0dda2ed2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f935fb480e2cd004491dcdde3d7ff10c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/RsaUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs new file mode 100644 index 00000000..bb90e15c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs @@ -0,0 +1,497 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// A generic TLS 1.2 AEAD cipher. + public class TlsAeadCipher + : TlsCipher + { + public const int AEAD_CCM = 1; + public const int AEAD_CHACHA20_POLY1305 = 2; + public const int AEAD_GCM = 3; + + private const int NONCE_RFC5288 = 1; + private const int NONCE_RFC7905 = 2; + + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly int m_keySize; + protected readonly int m_macSize; + protected readonly int m_fixed_iv_length; + protected readonly int m_record_iv_length; + + protected readonly TlsAeadCipherImpl m_decryptCipher, m_encryptCipher; + protected readonly byte[] m_decryptNonce, m_encryptNonce; + + protected readonly bool m_isTlsV13; + protected readonly int m_nonceMode; + + /// + public TlsAeadCipher(TlsCryptoParameters cryptoParams, TlsAeadCipherImpl encryptCipher, + TlsAeadCipherImpl decryptCipher, int keySize, int macSize, int aeadType) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!TlsImplUtilities.IsTlsV12(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_isTlsV13 = TlsImplUtilities.IsTlsV13(negotiatedVersion); + this.m_nonceMode = GetNonceMode(m_isTlsV13, aeadType); + + switch (m_nonceMode) + { + case NONCE_RFC5288: + this.m_fixed_iv_length = 4; + this.m_record_iv_length = 8; + break; + case NONCE_RFC7905: + this.m_fixed_iv_length = 12; + this.m_record_iv_length = 0; + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + this.m_cryptoParams = cryptoParams; + this.m_keySize = keySize; + this.m_macSize = macSize; + + this.m_decryptCipher = decryptCipher; + this.m_encryptCipher = encryptCipher; + + this.m_decryptNonce = new byte[m_fixed_iv_length]; + this.m_encryptNonce = new byte[m_fixed_iv_length]; + + bool isServer = cryptoParams.IsServer; + if (m_isTlsV13) + { + RekeyCipher(securityParameters, decryptCipher, m_decryptNonce, !isServer); + RekeyCipher(securityParameters, encryptCipher, m_encryptNonce, isServer); + return; + } + + int keyBlockSize = (2 * keySize) + (2 * m_fixed_iv_length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span keyBlock = keyBlockSize <= 512 + ? stackalloc byte[keyBlockSize] + : new byte[keyBlockSize]; + TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlock); + + if (isServer) + { + decryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + encryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + + keyBlock[..m_fixed_iv_length].CopyTo(m_decryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + keyBlock[..m_fixed_iv_length].CopyTo(m_encryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + } + else + { + encryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + decryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + + keyBlock[..m_fixed_iv_length].CopyTo(m_encryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + keyBlock[..m_fixed_iv_length].CopyTo(m_decryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + } + + if (!keyBlock.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); +#else + byte[] keyBlock = TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlockSize); + int pos = 0; + + if (isServer) + { + decryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + encryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + + Array.Copy(keyBlock, pos, m_decryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + Array.Copy(keyBlock, pos, m_encryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + } + else + { + encryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + decryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + + Array.Copy(keyBlock, pos, m_encryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + Array.Copy(keyBlock, pos, m_decryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + } + + if (pos != keyBlockSize) + throw new TlsFatalAlert(AlertDescription.internal_error); +#endif + + int nonceLength = m_fixed_iv_length + m_record_iv_length; + + // NOTE: Ensure dummy nonce is not part of the generated sequence(s) + byte[] dummyNonce = new byte[nonceLength]; + dummyNonce[0] = (byte)~m_encryptNonce[0]; + dummyNonce[1] = (byte)~m_decryptNonce[1]; + + encryptCipher.Init(dummyNonce, macSize, null); + decryptCipher.Init(dummyNonce, macSize, null); + } + + public virtual int GetCiphertextDecodeLimit(int plaintextLimit) + { + return plaintextLimit + m_macSize + m_record_iv_length + (m_isTlsV13 ? 1 : 0); + } + + public virtual int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + int innerPlaintextLimit = plaintextLength; + if (m_isTlsV13) + { + // TODO[tls13] Add support for padding + int maxPadding = 0; + + innerPlaintextLimit = 1 + System.Math.Min(plaintextLimit, plaintextLength + maxPadding); + } + + return innerPlaintextLimit + m_macSize + m_record_iv_length; + } + + public virtual int GetPlaintextLimit(int ciphertextLimit) + { + return ciphertextLimit - m_macSize - m_record_iv_length - (m_isTlsV13 ? 1 : 0); + } + + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int plaintextOffset, int plaintextLength) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return EncodePlaintext(seqNo, contentType, recordVersion, headerAllocation, + plaintext.AsSpan(plaintextOffset, plaintextLength)); +#else + byte[] nonce = new byte[m_encryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_encryptNonce, 0, nonce, 0, m_encryptNonce.Length); + // RFC 5288/6655: The nonce_explicit MAY be the 64-bit sequence number. + TlsUtilities.WriteUint64(seqNo, nonce, m_encryptNonce.Length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_encryptNonce.Length; ++i) + { + nonce[i] ^= m_encryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int extraLength = m_isTlsV13 ? 1 : 0; + + // TODO[tls13] If we support adding padding to TLSInnerPlaintext, this will need review + int encryptionLength = m_encryptCipher.GetOutputSize(plaintextLength + extraLength); + int ciphertextLength = m_record_iv_length + encryptionLength; + + byte[] output = new byte[headerAllocation + ciphertextLength]; + int outputPos = headerAllocation; + + if (m_record_iv_length != 0) + { + Array.Copy(nonce, nonce.Length - m_record_iv_length, output, outputPos, m_record_iv_length); + outputPos += m_record_iv_length; + } + + short recordType = m_isTlsV13 ? ContentType.application_data : contentType; + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintextLength); + + try + { + Array.Copy(plaintext, plaintextOffset, output, outputPos, plaintextLength); + if (m_isTlsV13) + { + output[outputPos + plaintextLength] = (byte)contentType; + } + + m_encryptCipher.Init(nonce, m_macSize, additionalData); + outputPos += m_encryptCipher.DoFinal(output, outputPos, plaintextLength + extraLength, output, + outputPos); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + if (outputPos != output.Length) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + return new TlsEncodeResult(output, 0, output.Length, recordType); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + byte[] nonce = new byte[m_encryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_encryptNonce, 0, nonce, 0, m_encryptNonce.Length); + // RFC 5288/6655: The nonce_explicit MAY be the 64-bit sequence number. + TlsUtilities.WriteUint64(seqNo, nonce, m_encryptNonce.Length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_encryptNonce.Length; ++i) + { + nonce[i] ^= m_encryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int extraLength = m_isTlsV13 ? 1 : 0; + + // TODO[tls13] If we support adding padding to TLSInnerPlaintext, this will need review + int encryptionLength = m_encryptCipher.GetOutputSize(plaintext.Length + extraLength); + int ciphertextLength = m_record_iv_length + encryptionLength; + + byte[] output = new byte[headerAllocation + ciphertextLength]; + int outputPos = headerAllocation; + + if (m_record_iv_length != 0) + { + Array.Copy(nonce, nonce.Length - m_record_iv_length, output, outputPos, m_record_iv_length); + outputPos += m_record_iv_length; + } + + short recordType = m_isTlsV13 ? ContentType.application_data : contentType; + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintext.Length); + + try + { + plaintext.CopyTo(output.AsSpan(outputPos)); + if (m_isTlsV13) + { + output[outputPos + plaintext.Length] = (byte)contentType; + } + + m_encryptCipher.Init(nonce, m_macSize, additionalData); + outputPos += m_encryptCipher.DoFinal(output, outputPos, plaintext.Length + extraLength, output, + outputPos); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + if (outputPos != output.Length) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + return new TlsEncodeResult(output, 0, output.Length, recordType); + } +#endif + + public virtual TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int ciphertextOffset, int ciphertextLength) + { + if (GetPlaintextLimit(ciphertextLength) < 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + byte[] nonce = new byte[m_decryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_decryptNonce, 0, nonce, 0, m_decryptNonce.Length); + Array.Copy(ciphertext, ciphertextOffset, nonce, nonce.Length - m_record_iv_length, + m_record_iv_length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_decryptNonce.Length; ++i) + { + nonce[i] ^= m_decryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int encryptionOffset = ciphertextOffset + m_record_iv_length; + int encryptionLength = ciphertextLength - m_record_iv_length; + int plaintextLength = m_decryptCipher.GetOutputSize(encryptionLength); + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintextLength); + + int outputPos; + try + { + m_decryptCipher.Init(nonce, m_macSize, additionalData); + outputPos = m_decryptCipher.DoFinal(ciphertext, encryptionOffset, encryptionLength, ciphertext, + encryptionOffset); + } + catch (TlsFatalAlert fatalAlert) + { + if (AlertDescription.bad_record_mac == fatalAlert.AlertDescription) + { + m_decryptCipher.Reset(); + } + throw fatalAlert; + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + m_decryptCipher.Reset(); + throw new TlsFatalAlert(AlertDescription.bad_record_mac, e); + } + + if (outputPos != plaintextLength) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + short contentType = recordType; + if (m_isTlsV13) + { + // Strip padding and read true content type from TLSInnerPlaintext + int pos = plaintextLength; + for (;;) + { + if (--pos < 0) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + byte octet = ciphertext[encryptionOffset + pos]; + if (0 != octet) + { + contentType = (short)(octet & 0xFF); + plaintextLength = pos; + break; + } + } + } + + return new TlsDecodeResult(ciphertext, encryptionOffset, plaintextLength, contentType); + } + + public virtual void RekeyDecoder() + { + RekeyCipher(m_cryptoParams.SecurityParameters, m_decryptCipher, m_decryptNonce, !m_cryptoParams.IsServer); + } + + public virtual void RekeyEncoder() + { + RekeyCipher(m_cryptoParams.SecurityParameters, m_encryptCipher, m_encryptNonce, m_cryptoParams.IsServer); + } + + public virtual bool UsesOpaqueRecordType + { + get { return m_isTlsV13; } + } + + protected virtual byte[] GetAdditionalData(long seqNo, short recordType, ProtocolVersion recordVersion, + int ciphertextLength, int plaintextLength) + { + if (m_isTlsV13) + { + /* + * TLSCiphertext.opaque_type || TLSCiphertext.legacy_record_version || TLSCiphertext.length + */ + byte[] additional_data = new byte[5]; + TlsUtilities.WriteUint8(recordType, additional_data, 0); + TlsUtilities.WriteVersion(recordVersion, additional_data, 1); + TlsUtilities.WriteUint16(ciphertextLength, additional_data, 3); + return additional_data; + } + else + { + /* + * seq_num + TLSCompressed.type + TLSCompressed.version + TLSCompressed.length + */ + byte[] additional_data = new byte[13]; + TlsUtilities.WriteUint64(seqNo, additional_data, 0); + TlsUtilities.WriteUint8(recordType, additional_data, 8); + TlsUtilities.WriteVersion(recordVersion, additional_data, 9); + TlsUtilities.WriteUint16(plaintextLength, additional_data, 11); + return additional_data; + } + } + + protected virtual void RekeyCipher(SecurityParameters securityParameters, TlsAeadCipherImpl cipher, + byte[] nonce, bool serverSecret) + { + if (!m_isTlsV13) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsSecret secret = serverSecret + ? securityParameters.TrafficSecretServer + : securityParameters.TrafficSecretClient; + + // TODO[tls13] For early data, have to disable server->client + if (null == secret) + throw new TlsFatalAlert(AlertDescription.internal_error); + + Setup13Cipher(cipher, nonce, secret, securityParameters.PrfCryptoHashAlgorithm); + } + + protected virtual void Setup13Cipher(TlsAeadCipherImpl cipher, byte[] nonce, TlsSecret secret, + int cryptoHashAlgorithm) + { + byte[] key = TlsCryptoUtilities.HkdfExpandLabel(secret, cryptoHashAlgorithm, "key", + TlsUtilities.EmptyBytes, m_keySize).Extract(); + byte[] iv = TlsCryptoUtilities.HkdfExpandLabel(secret, cryptoHashAlgorithm, "iv", TlsUtilities.EmptyBytes, + m_fixed_iv_length).Extract(); + + cipher.SetKey(key, 0, m_keySize); + Array.Copy(iv, 0, nonce, 0, m_fixed_iv_length); + + // NOTE: Ensure dummy nonce is not part of the generated sequence(s) + iv [0] ^= 0x80; + cipher.Init(iv, m_macSize, null); + } + + private static int GetNonceMode(bool isTLSv13, int aeadType) + { + switch (aeadType) + { + case AEAD_CCM: + case AEAD_GCM: + return isTLSv13 ? NONCE_RFC7905 : NONCE_RFC5288; + + case AEAD_CHACHA20_POLY1305: + return NONCE_RFC7905; + + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs.meta new file mode 100644 index 00000000..68a648d7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5fdf671c05679fb4a9235bb34a12cec0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs new file mode 100644 index 00000000..48fde570 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Base interface for services supporting AEAD encryption/decryption. + public interface TlsAeadCipherImpl + { + /// Set the key to be used by the AEAD cipher implementation supporting this service. + /// array holding the AEAD cipher key. + /// offset into the array the key starts at. + /// length of the key in the array. + /// + void SetKey(byte[] key, int keyOff, int keyLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void SetKey(ReadOnlySpan key); +#endif + + /// Initialise the parameters for the AEAD operator. + /// the nonce. + /// MAC size in bytes. + /// any additional data to be included in the MAC calculation. + /// if the parameters are inappropriate. + void Init(byte[] nonce, int macSize, byte[] additionalData); + + /// Return the maximum size of the output for input of inputLength bytes. + /// the length (in bytes) of the proposed input. + /// the maximum size of the output. + int GetOutputSize(int inputLength); + + /// Perform the cipher encryption/decryption returning the output in output. + /// + /// Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher. + /// + /// array holding input data to the cipher. + /// offset into input array data starts at. + /// length of the input data in the array. + /// array to hold the cipher output. + /// offset into output array to start saving output. + /// the amount of data written to output. + /// in case of failure. + int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset); + + void Reset(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs.meta new file mode 100644 index 00000000..94a2fa59 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f52f1077f381fd4285eaf40e6ac99f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsAeadCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs new file mode 100644 index 00000000..a1889f06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs @@ -0,0 +1,532 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// A generic TLS 1.0-1.2 block cipher. This can be used for AES or 3DES for example. + public class TlsBlockCipher + : TlsCipher + { + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly byte[] m_randomData; + protected readonly bool m_encryptThenMac; + protected readonly bool m_useExplicitIV; + protected readonly bool m_acceptExtraPadding; + protected readonly bool m_useExtraPadding; + + protected readonly TlsBlockCipherImpl m_decryptCipher, m_encryptCipher; + protected readonly TlsSuiteMac m_readMac, m_writeMac; + + /// + public TlsBlockCipher(TlsCryptoParameters cryptoParams, TlsBlockCipherImpl encryptCipher, + TlsBlockCipherImpl decryptCipher, TlsHmac clientMac, TlsHmac serverMac, int cipherKeySize) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (TlsImplUtilities.IsTlsV13(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_cryptoParams = cryptoParams; + this.m_randomData = cryptoParams.NonceGenerator.GenerateNonce(256); + + this.m_encryptThenMac = securityParameters.IsEncryptThenMac; + this.m_useExplicitIV = TlsImplUtilities.IsTlsV11(negotiatedVersion); + + this.m_acceptExtraPadding = !negotiatedVersion.IsSsl; + + /* + * Don't use variable-length padding with truncated MACs. + * + * See "Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol", Paterson, + * Ristenpart, Shrimpton. + * + * TODO[DTLS] Consider supporting in DTLS (without exceeding send limit though) + */ + this.m_useExtraPadding = securityParameters.IsExtendedPadding + && ProtocolVersion.TLSv10.IsEqualOrEarlierVersionOf(negotiatedVersion) + && (m_encryptThenMac || !securityParameters.IsTruncatedHmac); + + this.m_encryptCipher = encryptCipher; + this.m_decryptCipher = decryptCipher; + + TlsBlockCipherImpl clientCipher, serverCipher; + if (cryptoParams.IsServer) + { + clientCipher = decryptCipher; + serverCipher = encryptCipher; + } + else + { + clientCipher = encryptCipher; + serverCipher = decryptCipher; + } + + int keyBlockSize = (2 * cipherKeySize) + clientMac.MacLength + serverMac.MacLength; + + // From TLS 1.1 onwards, block ciphers don't need IVs from the key_block + if (!m_useExplicitIV) + { + keyBlockSize += clientCipher.GetBlockSize() + serverCipher.GetBlockSize(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span keyBlock = keyBlockSize <= 512 + ? stackalloc byte[keyBlockSize] + : new byte[keyBlockSize]; + TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlock); + + clientMac.SetKey(keyBlock[..clientMac.MacLength]); keyBlock = keyBlock[clientMac.MacLength..]; + serverMac.SetKey(keyBlock[..serverMac.MacLength]); keyBlock = keyBlock[serverMac.MacLength..]; + + clientCipher.SetKey(keyBlock[..cipherKeySize]); keyBlock = keyBlock[cipherKeySize..]; + serverCipher.SetKey(keyBlock[..cipherKeySize]); keyBlock = keyBlock[cipherKeySize..]; + + int clientIVLength = clientCipher.GetBlockSize(); + int serverIVLength = serverCipher.GetBlockSize(); + + if (m_useExplicitIV) + { + clientCipher.Init(clientIVLength <= 64 ? stackalloc byte[clientIVLength] : new byte[clientIVLength]); + serverCipher.Init(serverIVLength <= 64 ? stackalloc byte[serverIVLength] : new byte[serverIVLength]); + } + else + { + clientCipher.Init(keyBlock[..clientIVLength]); keyBlock = keyBlock[clientIVLength..]; + serverCipher.Init(keyBlock[..serverIVLength]); keyBlock = keyBlock[serverIVLength..]; + } + + if (!keyBlock.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); +#else + byte[] keyBlock = TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlockSize); + int pos = 0; + + clientMac.SetKey(keyBlock, pos, clientMac.MacLength); + pos += clientMac.MacLength; + serverMac.SetKey(keyBlock, pos, serverMac.MacLength); + pos += serverMac.MacLength; + + clientCipher.SetKey(keyBlock, pos, cipherKeySize); + pos += cipherKeySize; + serverCipher.SetKey(keyBlock, pos, cipherKeySize); + pos += cipherKeySize; + + int clientIVLength = clientCipher.GetBlockSize(); + int serverIVLength = serverCipher.GetBlockSize(); + + if (m_useExplicitIV) + { + clientCipher.Init(new byte[clientIVLength], 0, clientIVLength); + serverCipher.Init(new byte[serverIVLength], 0, serverIVLength); + } + else + { + clientCipher.Init(keyBlock, pos, clientIVLength); + pos += clientIVLength; + serverCipher.Init(keyBlock, pos, serverIVLength); + pos += serverIVLength; + } + + if (pos != keyBlockSize) + throw new TlsFatalAlert(AlertDescription.internal_error); +#endif + + if (cryptoParams.IsServer) + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, serverMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, clientMac); + } + else + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, clientMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, serverMac); + } + } + + public virtual int GetCiphertextDecodeLimit(int plaintextLimit) + { + int blockSize = m_decryptCipher.GetBlockSize(); + int macSize = m_readMac.Size; + int maxPadding = 256; + + return GetCiphertextLength(blockSize, macSize, maxPadding, plaintextLimit); + } + + public virtual int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + int maxPadding = m_useExtraPadding ? 256 : blockSize; + + return GetCiphertextLength(blockSize, macSize, maxPadding, plaintextLength); + } + + public virtual int GetPlaintextLimit(int ciphertextLimit) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int plaintextLimit = ciphertextLimit; + + // Leave room for the MAC, and require block-alignment + if (m_encryptThenMac) + { + plaintextLimit -= macSize; + plaintextLimit -= plaintextLimit % blockSize; + } + else + { + plaintextLimit -= plaintextLimit % blockSize; + plaintextLimit -= macSize; + } + + // Minimum 1 byte of padding + --plaintextLimit; + + // An explicit IV consumes 1 block + if (m_useExplicitIV) + { + plaintextLimit -= blockSize; + } + + return plaintextLimit; + } + + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int offset, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return EncodePlaintext(seqNo, contentType, recordVersion, headerAllocation, plaintext.AsSpan(offset, len)); +#else + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int enc_input_length = len; + if (!m_encryptThenMac) + { + enc_input_length += macSize; + } + + int padding_length = blockSize - (enc_input_length % blockSize); + if (m_useExtraPadding) + { + // Add a random number of extra blocks worth of padding + int maxExtraPadBlocks = (256 - padding_length) / blockSize; + int actualExtraPadBlocks = ChooseExtraPadBlocks(maxExtraPadBlocks); + padding_length += actualExtraPadBlocks * blockSize; + } + + int totalSize = len + macSize + padding_length; + if (m_useExplicitIV) + { + totalSize += blockSize; + } + + byte[] outBuf = new byte[headerAllocation + totalSize]; + int outOff = headerAllocation; + + if (m_useExplicitIV) + { + // Technically the explicit IV will be the encryption of this nonce + byte[] explicitIV = m_cryptoParams.NonceGenerator.GenerateNonce(blockSize); + Array.Copy(explicitIV, 0, outBuf, outOff, blockSize); + outOff += blockSize; + } + + Array.Copy(plaintext, offset, outBuf, outOff, len); + outOff += len; + + if (!m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext, offset, len); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + byte padByte = (byte)(padding_length - 1); + for (int i = 0; i < padding_length; ++i) + { + outBuf[outOff++] = padByte; + } + + m_encryptCipher.DoFinal(outBuf, headerAllocation, outOff - headerAllocation, outBuf, headerAllocation); + + if (m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, outBuf, headerAllocation, + outOff - headerAllocation); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + if (outOff != outBuf.Length) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return new TlsEncodeResult(outBuf, 0, outBuf.Length, contentType); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int enc_input_length = plaintext.Length; + if (!m_encryptThenMac) + { + enc_input_length += macSize; + } + + int padding_length = blockSize - (enc_input_length % blockSize); + if (m_useExtraPadding) + { + // Add a random number of extra blocks worth of padding + int maxExtraPadBlocks = (256 - padding_length) / blockSize; + int actualExtraPadBlocks = ChooseExtraPadBlocks(maxExtraPadBlocks); + padding_length += actualExtraPadBlocks * blockSize; + } + + int totalSize = plaintext.Length + macSize + padding_length; + if (m_useExplicitIV) + { + totalSize += blockSize; + } + + byte[] outBuf = new byte[headerAllocation + totalSize]; + int outOff = headerAllocation; + + if (m_useExplicitIV) + { + // Technically the explicit IV will be the encryption of this nonce + byte[] explicitIV = m_cryptoParams.NonceGenerator.GenerateNonce(blockSize); + Array.Copy(explicitIV, 0, outBuf, outOff, blockSize); + outOff += blockSize; + } + + plaintext.CopyTo(outBuf.AsSpan(outOff)); + outOff += plaintext.Length; + + if (!m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext); + mac.CopyTo(outBuf.AsSpan(outOff)); + outOff += mac.Length; + } + + byte padByte = (byte)(padding_length - 1); + for (int i = 0; i < padding_length; ++i) + { + outBuf[outOff++] = padByte; + } + + m_encryptCipher.DoFinal(outBuf, headerAllocation, outOff - headerAllocation, outBuf, headerAllocation); + + if (m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, outBuf, headerAllocation, + outOff - headerAllocation); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + if (outOff != outBuf.Length) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return new TlsEncodeResult(outBuf, 0, outBuf.Length, contentType); + } +#endif + + public virtual TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int offset, int len) + { + int blockSize = m_decryptCipher.GetBlockSize(); + int macSize = m_readMac.Size; + + int minLen = blockSize; + if (m_encryptThenMac) + { + minLen += macSize; + } + else + { + minLen = System.Math.Max(minLen, macSize + 1); + } + + if (m_useExplicitIV) + { + minLen += blockSize; + } + + if (len < minLen) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int blocks_length = len; + if (m_encryptThenMac) + { + blocks_length -= macSize; + } + + if (blocks_length % blockSize != 0) + throw new TlsFatalAlert(AlertDescription.decryption_failed); + + if (m_encryptThenMac) + { + byte[] expectedMac = m_readMac.CalculateMac(seqNo, recordType, ciphertext, offset, len - macSize); + + bool checkMac = TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, + offset + len - macSize); + if (!checkMac) + { + /* + * RFC 7366 3. The MAC SHALL be evaluated before any further processing such as + * decryption is performed, and if the MAC verification fails, then processing SHALL + * terminate immediately. For TLS, a fatal bad_record_mac MUST be generated [2]. For + * DTLS, the record MUST be discarded, and a fatal bad_record_mac MAY be generated + * [4]. This immediate response to a bad MAC eliminates any timing channels that may + * be available through the use of manipulated packet data. + */ + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + } + } + + m_decryptCipher.DoFinal(ciphertext, offset, blocks_length, ciphertext, offset); + + if (m_useExplicitIV) + { + offset += blockSize; + blocks_length -= blockSize; + } + + // If there's anything wrong with the padding, this will return zero + int totalPad = CheckPaddingConstantTime(ciphertext, offset, blocks_length, blockSize, + m_encryptThenMac ? 0 : macSize); + bool badMac = (totalPad == 0); + + int dec_output_length = blocks_length - totalPad; + + if (!m_encryptThenMac) + { + dec_output_length -= macSize; + + byte[] expectedMac = m_readMac.CalculateMacConstantTime(seqNo, recordType, ciphertext, offset, + dec_output_length, blocks_length - macSize, m_randomData); + + badMac |= !TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, + offset + dec_output_length); + } + + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + + return new TlsDecodeResult(ciphertext, offset, dec_output_length, recordType); + } + + public virtual void RekeyDecoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual void RekeyEncoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual bool UsesOpaqueRecordType + { + get { return false; } + } + + protected virtual int CheckPaddingConstantTime(byte[] buf, int off, int len, int blockSize, int macSize) + { + int end = off + len; + byte lastByte = buf[end - 1]; + int padlen = lastByte & 0xff; + int totalPad = padlen + 1; + + int dummyIndex = 0; + byte padDiff = 0; + + int totalPadLimit = System.Math.Min(m_acceptExtraPadding ? 256 : blockSize, len - macSize); + + if (totalPad > totalPadLimit) + { + totalPad = 0; + } + else + { + int padPos = end - totalPad; + do + { + padDiff |= (byte)(buf[padPos++] ^ lastByte); + } + while (padPos < end); + + dummyIndex = totalPad; + + if (padDiff != 0) + { + totalPad = 0; + } + } + + // Run some extra dummy checks so the number of checks is always constant + { + byte[] dummyPad = m_randomData; + while (dummyIndex < 256) + { + padDiff |= (byte)(dummyPad[dummyIndex++] ^ lastByte); + } + // Ensure the above loop is not eliminated + dummyPad[0] ^= padDiff; + } + + return totalPad; + } + + protected virtual int ChooseExtraPadBlocks(int max) + { + byte[] random = m_cryptoParams.NonceGenerator.GenerateNonce(4); + int x = (int)Pack.LE_To_UInt32(random, 0); + int n = Integers.NumberOfTrailingZeros(x); + return System.Math.Min(n, max); + } + + protected virtual int GetCiphertextLength(int blockSize, int macSize, int maxPadding, int plaintextLength) + { + int ciphertextLength = plaintextLength; + + // An explicit IV consumes 1 block + if (m_useExplicitIV) + { + ciphertextLength += blockSize; + } + + // Leave room for the MAC and (block-aligning) padding + + ciphertextLength += maxPadding; + + if (m_encryptThenMac) + { + ciphertextLength -= (ciphertextLength % blockSize); + ciphertextLength += macSize; + } + else + { + ciphertextLength += macSize; + ciphertextLength -= (ciphertextLength % blockSize); + } + + return ciphertextLength; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs.meta new file mode 100644 index 00000000..f1311cf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a85161e5ba712cb4883536de2b0fce4a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs new file mode 100644 index 00000000..f2382115 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs @@ -0,0 +1,52 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Interface for block cipher services. + public interface TlsBlockCipherImpl + { + /// Set the key to be used by the block cipher implementation supporting this service. + /// array holding the block cipher key. + /// offset into the array the key starts at. + /// length of the key in the array. + /// + void SetKey(byte[] key, int keyOff, int keyLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void SetKey(ReadOnlySpan key); +#endif + + /// Initialise the parameters for operator. + /// array holding the initialization vector (IV). + /// offset into the array the IV starts at. + /// length of the IV in the array. + /// if the parameters are inappropriate. + void Init(byte[] iv, int ivOff, int ivLen); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + void Init(ReadOnlySpan iv); +#endif + + /// Perform the cipher encryption/decryption returning the output in output. + /// + /// Note: we have to use DoFinal() here as it is the only way to guarantee output from the underlying cipher. + /// + /// array holding input data to the cipher. + /// offset into input array data starts at. + /// length of the input data in the array. + /// array to hold the cipher output. + /// offset into output array to start saving output. + /// the amount of data written to output. + /// in case of failure. + int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset); + + /// Return the blocksize (in bytes) of the underlying block cipher. + /// the cipher's blocksize. + int GetBlockSize(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs.meta new file mode 100644 index 00000000..1d845896 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c9525369b45ed6042817ffbc5e90e0cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsBlockCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs new file mode 100644 index 00000000..36fcf722 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs @@ -0,0 +1,86 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Useful utility methods. + public abstract class TlsImplUtilities + { + public static bool IsSsl(TlsCryptoParameters cryptoParams) + { + return cryptoParams.ServerVersion.IsSsl; + } + + public static bool IsTlsV10(ProtocolVersion version) + { + return ProtocolVersion.TLSv10.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV10(TlsCryptoParameters cryptoParams) + { + return IsTlsV10(cryptoParams.ServerVersion); + } + + public static bool IsTlsV11(ProtocolVersion version) + { + return ProtocolVersion.TLSv11.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV11(TlsCryptoParameters cryptoParams) + { + return IsTlsV11(cryptoParams.ServerVersion); + } + + public static bool IsTlsV12(ProtocolVersion version) + { + return ProtocolVersion.TLSv12.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV12(TlsCryptoParameters cryptoParams) + { + return IsTlsV12(cryptoParams.ServerVersion); + } + + public static bool IsTlsV13(ProtocolVersion version) + { + return ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion()); + } + + public static bool IsTlsV13(TlsCryptoParameters cryptoParams) + { + return IsTlsV13(cryptoParams.ServerVersion); + } + + public static byte[] CalculateKeyBlock(TlsCryptoParameters cryptoParams, int length) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + TlsSecret master_secret = securityParameters.MasterSecret; + int prfAlgorithm = securityParameters.PrfAlgorithm; + byte[] seed = Arrays.Concatenate(securityParameters.ServerRandom, securityParameters.ClientRandom); + return master_secret.DeriveUsingPrf(prfAlgorithm, ExporterLabel.key_expansion, seed, length).Extract(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void CalculateKeyBlock(TlsCryptoParameters cryptoParams, Span keyBlock) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + TlsSecret master_secret = securityParameters.MasterSecret; + int prfAlgorithm = securityParameters.PrfAlgorithm; + + Span cr = securityParameters.ClientRandom, sr = securityParameters.ServerRandom; + Span seed = stackalloc byte[sr.Length + cr.Length]; + sr.CopyTo(seed); + cr.CopyTo(seed[sr.Length..]); + + TlsSecret derived = master_secret.DeriveUsingPrf(prfAlgorithm, ExporterLabel.key_expansion, seed, + keyBlock.Length); + derived.ExtractTo(keyBlock); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs.meta new file mode 100644 index 00000000..5a326062 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 87bfbb1614880a14989169d07561dd32 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsImplUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs new file mode 100644 index 00000000..e70397e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs @@ -0,0 +1,133 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// The NULL cipher. + public class TlsNullCipher + : TlsCipher + { + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly TlsSuiteHmac m_readMac, m_writeMac; + + /// + public TlsNullCipher(TlsCryptoParameters cryptoParams, TlsHmac clientMac, TlsHmac serverMac) + { + if (TlsImplUtilities.IsTlsV13(cryptoParams)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + m_cryptoParams = cryptoParams; + + int keyBlockSize = clientMac.MacLength + serverMac.MacLength; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span keyBlock = keyBlockSize <= 512 + ? stackalloc byte[keyBlockSize] + : new byte[keyBlockSize]; + TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlock); + + clientMac.SetKey(keyBlock[..clientMac.MacLength]); keyBlock = keyBlock[clientMac.MacLength..]; + serverMac.SetKey(keyBlock[..serverMac.MacLength]); keyBlock = keyBlock[serverMac.MacLength..]; + + if (!keyBlock.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); +#else + byte[] keyBlock = TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlockSize); + int pos = 0; + + clientMac.SetKey(keyBlock, pos, clientMac.MacLength); + pos += clientMac.MacLength; + serverMac.SetKey(keyBlock, pos, serverMac.MacLength); + pos += serverMac.MacLength; + + if (pos != keyBlockSize) + throw new TlsFatalAlert(AlertDescription.internal_error); +#endif + + if (cryptoParams.IsServer) + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, serverMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, clientMac); + } + else + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, clientMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, serverMac); + } + } + + public virtual int GetCiphertextDecodeLimit(int plaintextLimit) + { + return plaintextLimit + m_writeMac.Size; + } + + public virtual int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + return plaintextLength + m_writeMac.Size; + } + + public virtual int GetPlaintextLimit(int ciphertextLimit) + { + return ciphertextLimit - m_writeMac.Size; + } + + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int offset, int len) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext, offset, len); + byte[] ciphertext = new byte[headerAllocation + len + mac.Length]; + Array.Copy(plaintext, offset, ciphertext, headerAllocation, len); + Array.Copy(mac, 0, ciphertext, headerAllocation + len, mac.Length); + return new TlsEncodeResult(ciphertext, 0, ciphertext.Length, contentType); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext); + byte[] ciphertext = new byte[headerAllocation + plaintext.Length + mac.Length]; + plaintext.CopyTo(ciphertext.AsSpan(headerAllocation)); + mac.CopyTo(ciphertext.AsSpan(headerAllocation + plaintext.Length)); + return new TlsEncodeResult(ciphertext, 0, ciphertext.Length, contentType); + } +#endif + + public virtual TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int offset, int len) + { + int macSize = m_readMac.Size; + if (len < macSize) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int macInputLen = len - macSize; + + byte[] expectedMac = m_readMac.CalculateMac(seqNo, recordType, ciphertext, offset, macInputLen); + + bool badMac = !TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, offset + macInputLen); + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + + return new TlsDecodeResult(ciphertext, offset, macInputLen, recordType); + } + + public virtual void RekeyDecoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual void RekeyEncoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual bool UsesOpaqueRecordType + { + get { return false; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs.meta new file mode 100644 index 00000000..77e5d52e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4997ddc18edf0d749b1c186f7fc1bbf8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsNullCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs new file mode 100644 index 00000000..783a28cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs @@ -0,0 +1,151 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest. + public class TlsSuiteHmac + : TlsSuiteMac + { + protected static int GetMacSize(TlsCryptoParameters cryptoParams, TlsMac mac) + { + int macSize = mac.MacLength; + if (cryptoParams.SecurityParameters.IsTruncatedHmac) + { + macSize = System.Math.Min(macSize, 10); + } + return macSize; + } + + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly TlsHmac m_mac; + protected readonly int m_digestBlockSize; + protected readonly int m_digestOverhead; + protected readonly int m_macSize; + + /// Generate a new instance of a TlsMac. + /// the TLS client context specific crypto parameters. + /// The MAC to use. + public TlsSuiteHmac(TlsCryptoParameters cryptoParams, TlsHmac mac) + { + this.m_cryptoParams = cryptoParams; + this.m_mac = mac; + this.m_macSize = GetMacSize(cryptoParams, mac); + this.m_digestBlockSize = mac.InternalBlockSize; + + // TODO This should check the actual algorithm, not assume based on the digest size + if (TlsImplUtilities.IsSsl(cryptoParams) && mac.MacLength == 20) + { + /* + * NOTE: For the SSL 3.0 MAC with SHA-1, the secret + input pad is not block-aligned. + */ + this.m_digestOverhead = 4; + } + else + { + this.m_digestOverhead = m_digestBlockSize / 8; + } + } + + public virtual int Size + { + get { return m_macSize; } + } + + public virtual byte[] CalculateMac(long seqNo, short type, byte[] msg, int msgOff, int msgLen) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return CalculateMac(seqNo, type, msg.AsSpan(msgOff, msgLen)); +#else + ProtocolVersion serverVersion = m_cryptoParams.ServerVersion; + bool isSsl = serverVersion.IsSsl; + + byte[] macHeader = new byte[isSsl ? 11 : 13]; + TlsUtilities.WriteUint64(seqNo, macHeader, 0); + TlsUtilities.WriteUint8(type, macHeader, 8); + if (!isSsl) + { + TlsUtilities.WriteVersion(serverVersion, macHeader, 9); + } + TlsUtilities.WriteUint16(msgLen, macHeader, macHeader.Length - 2); + + m_mac.Update(macHeader, 0, macHeader.Length); + m_mac.Update(msg, msgOff, msgLen); + + return Truncate(m_mac.CalculateMac()); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual byte[] CalculateMac(long seqNo, short type, ReadOnlySpan message) + { + ProtocolVersion serverVersion = m_cryptoParams.ServerVersion; + bool isSsl = serverVersion.IsSsl; + + byte[] macHeader = new byte[isSsl ? 11 : 13]; + TlsUtilities.WriteUint64(seqNo, macHeader, 0); + TlsUtilities.WriteUint8(type, macHeader, 8); + if (!isSsl) + { + TlsUtilities.WriteVersion(serverVersion, macHeader, 9); + } + TlsUtilities.WriteUint16(message.Length, macHeader, macHeader.Length - 2); + + m_mac.Update(macHeader); + m_mac.Update(message); + + return Truncate(m_mac.CalculateMac()); + } +#endif + + public virtual byte[] CalculateMacConstantTime(long seqNo, short type, byte[] msg, int msgOff, int msgLen, + int fullLength, byte[] dummyData) + { + /* + * Actual MAC only calculated on 'length' bytes... + */ + byte[] result = CalculateMac(seqNo, type, msg, msgOff, msgLen); + + /* + * ...but ensure a constant number of complete digest blocks are processed (as many as would + * be needed for 'fullLength' bytes of input). + */ + int headerLength = TlsImplUtilities.IsSsl(m_cryptoParams) ? 11 : 13; + + // How many extra full blocks do we need to calculate? + int extra = GetDigestBlockCount(headerLength + fullLength) - GetDigestBlockCount(headerLength + msgLen); + + while (--extra >= 0) + { + m_mac.Update(dummyData, 0, m_digestBlockSize); + } + + // One more byte in case the implementation is "lazy" about processing blocks + m_mac.Update(dummyData, 0, 1); + m_mac.Reset(); + + return result; + } + + protected virtual int GetDigestBlockCount(int inputLength) + { + // NOTE: The input pad for HMAC is always a full digest block + + // NOTE: This calculation assumes a minimum of 1 pad byte + return (inputLength + m_digestOverhead) / m_digestBlockSize; + } + + protected virtual byte[] Truncate(byte[] bs) + { + if (bs.Length <= m_macSize) + return bs; + + return Arrays.CopyOf(bs, m_macSize); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs.meta new file mode 100644 index 00000000..bfbab1d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 842fbe759a5c520499b0ae24cc9a7b8d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteHmac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs new file mode 100644 index 00000000..58854c41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs @@ -0,0 +1,41 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl +{ + /// Base interface for a generic TLS MAC implementation for use with a bulk cipher. + public interface TlsSuiteMac + { + /// Return the output length (in bytes) of this MAC. + /// The output length of this MAC. + int Size { get; } + + /// Calculate the MAC for some given data. + /// The sequence number of the record. + /// The content type of the message. + /// A byte array containing the message. + /// The number of bytes to skip, before the message starts. + /// The length of the message. + /// A new byte array containing the MAC value. + byte[] CalculateMac(long seqNo, short type, byte[] message, int offset, int length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + byte[] CalculateMac(long seqNo, short type, ReadOnlySpan message); +#endif + + /// Constant time calculation of the MAC for some given data with a given expected length. + /// The sequence number of the record. + /// The content type of the message. + /// A byte array containing the message. + /// The number of bytes to skip, before the message starts. + /// The length of the message. + /// The expected length of the full message. + /// Random data for padding out the MAC calculation if required. + /// A new byte array containing the MAC value. + byte[] CalculateMacConstantTime(long seqNo, short type, byte[] message, int offset, int length, + int expectedLength, byte[] randomData); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs.meta new file mode 100644 index 00000000..397b445b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: be9f7fb1fa73d6c499fe6eed529ccca3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/TlsSuiteMac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc.meta new file mode 100644 index 00000000..5c09ab7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9337994829923a8419cb2808e470fcbc +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs new file mode 100644 index 00000000..7a4573a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs @@ -0,0 +1,149 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public sealed class BcChaCha20Poly1305 + : TlsAeadCipherImpl + { + private static readonly byte[] Zeroes = new byte[15]; + + private readonly ChaCha7539Engine m_cipher = new ChaCha7539Engine(); + private readonly Poly1305 m_mac = new Poly1305(); + + private readonly bool m_isEncrypting; + + private int m_additionalDataLength; + + public BcChaCha20Poly1305(bool isEncrypting) + { + this.m_isEncrypting = isEncrypting; + } + + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { + if (m_isEncrypting) + { + int ciphertextLength = inputLength; + + m_cipher.DoFinal(input, inputOffset, inputLength, output, outputOffset); + int outputLength = inputLength; + + if (ciphertextLength != outputLength) + throw new InvalidOperationException(); + + UpdateMac(output, outputOffset, ciphertextLength); + + byte[] lengths = new byte[16]; + Pack.UInt64_To_LE((ulong)m_additionalDataLength, lengths, 0); + Pack.UInt64_To_LE((ulong)ciphertextLength, lengths, 8); + m_mac.BlockUpdate(lengths, 0, 16); + + m_mac.DoFinal(output, outputOffset + ciphertextLength); + + return ciphertextLength + 16; + } + else + { + int ciphertextLength = inputLength - 16; + + UpdateMac(input, inputOffset, ciphertextLength); + + byte[] expectedMac = new byte[16]; + Pack.UInt64_To_LE((ulong)m_additionalDataLength, expectedMac, 0); + Pack.UInt64_To_LE((ulong)ciphertextLength, expectedMac, 8); + m_mac.BlockUpdate(expectedMac, 0, 16); + m_mac.DoFinal(expectedMac, 0); + + bool badMac = !TlsUtilities.ConstantTimeAreEqual(16, expectedMac, 0, input, inputOffset + ciphertextLength); + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + + m_cipher.DoFinal(input, inputOffset, ciphertextLength, output, outputOffset); + int outputLength = ciphertextLength; + + if (ciphertextLength != outputLength) + throw new InvalidOperationException(); + + return ciphertextLength; + } + } + + public int GetOutputSize(int inputLength) + { + return m_isEncrypting ? inputLength + 16 : inputLength - 16; + } + + public void Init(byte[] nonce, int macSize, byte[] additionalData) + { + if (nonce == null || nonce.Length != 12 || macSize != 16) + throw new TlsFatalAlert(AlertDescription.internal_error); + + m_cipher.Init(m_isEncrypting, new ParametersWithIV(null, nonce)); + InitMac(); + if (additionalData == null) + { + this.m_additionalDataLength = 0; + } + else + { + this.m_additionalDataLength = additionalData.Length; + UpdateMac(additionalData, 0, additionalData.Length); + } + } + + public void Reset() + { + m_cipher.Reset(); + m_mac.Reset(); + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + KeyParameter cipherKey = new KeyParameter(key, keyOff, keyLen); + m_cipher.Init(m_isEncrypting, new ParametersWithIV(cipherKey, Zeroes, 0, 12)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + KeyParameter cipherKey = new KeyParameter(key); + m_cipher.Init(m_isEncrypting, new ParametersWithIV(cipherKey, Zeroes.AsSpan(0, 12))); + } +#endif + + private void InitMac() + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span firstBlock = stackalloc byte[64]; + m_cipher.ProcessBytes(firstBlock, firstBlock); + m_mac.Init(new KeyParameter(firstBlock[..32])); + firstBlock.Fill(0x00); +#else + byte[] firstBlock = new byte[64]; + m_cipher.ProcessBytes(firstBlock, 0, 64, firstBlock, 0); + m_mac.Init(new KeyParameter(firstBlock, 0, 32)); + Array.Clear(firstBlock, 0, firstBlock.Length); +#endif + } + + private void UpdateMac(byte[] buf, int off, int len) + { + m_mac.BlockUpdate(buf, off, len); + + int partial = len % 16; + if (partial != 0) + { + m_mac.BlockUpdate(Zeroes, 0, 16 - partial); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs.meta new file mode 100644 index 00000000..d9f1ad93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a547c44455703b94e8a66138181bac45 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcChaCha20Poly1305.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs new file mode 100644 index 00000000..92d3ba58 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs @@ -0,0 +1,116 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Credentialed class generating agreed secrets from a peer's public key for our end of the TLS connection + /// using the BC light-weight API. + public class BcDefaultTlsCredentialedAgreement + : TlsCredentialedAgreement + { + protected readonly TlsCredentialedAgreement m_agreementCredentials; + + public BcDefaultTlsCredentialedAgreement(BcTlsCrypto crypto, Certificate certificate, + AsymmetricKeyParameter privateKey) + { + if (crypto == null) + throw new ArgumentNullException("crypto"); + if (certificate == null) + throw new ArgumentNullException("certificate"); + if (certificate.IsEmpty) + throw new ArgumentException("cannot be empty", "certificate"); + if (privateKey == null) + throw new ArgumentNullException("privateKey"); + if (!privateKey.IsPrivate) + throw new ArgumentException("must be private", "privateKey"); + + if (privateKey is DHPrivateKeyParameters) + { + this.m_agreementCredentials = new DHCredentialedAgreement(crypto, certificate, + (DHPrivateKeyParameters)privateKey); + } + else if (privateKey is ECPrivateKeyParameters) + { + this.m_agreementCredentials = new ECCredentialedAgreement(crypto, certificate, + (ECPrivateKeyParameters)privateKey); + } + else + { + throw new ArgumentException("'privateKey' type not supported: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(privateKey)); + } + } + + public virtual Certificate Certificate + { + get { return m_agreementCredentials.Certificate; } + } + + public virtual TlsSecret GenerateAgreement(TlsCertificate peerCertificate) + { + return m_agreementCredentials.GenerateAgreement(peerCertificate); + } + + private sealed class DHCredentialedAgreement + : TlsCredentialedAgreement + { + private readonly BcTlsCrypto m_crypto; + private readonly Certificate m_certificate; + private readonly DHPrivateKeyParameters m_privateKey; + + internal DHCredentialedAgreement(BcTlsCrypto crypto, Certificate certificate, + DHPrivateKeyParameters privateKey) + { + this.m_crypto = crypto; + this.m_certificate = certificate; + this.m_privateKey = privateKey; + } + + public TlsSecret GenerateAgreement(TlsCertificate peerCertificate) + { + BcTlsCertificate bcCert = BcTlsCertificate.Convert(m_crypto, peerCertificate); + DHPublicKeyParameters peerPublicKey = bcCert.GetPubKeyDH(); + return BcTlsDHDomain.CalculateDHAgreement(m_crypto, m_privateKey, peerPublicKey, false); + } + + public Certificate Certificate + { + get { return m_certificate; } + } + } + + private sealed class ECCredentialedAgreement + : TlsCredentialedAgreement + { + private readonly BcTlsCrypto m_crypto; + private readonly Certificate m_certificate; + private readonly ECPrivateKeyParameters m_privateKey; + + internal ECCredentialedAgreement(BcTlsCrypto crypto, Certificate certificate, + ECPrivateKeyParameters privateKey) + { + this.m_crypto = crypto; + this.m_certificate = certificate; + this.m_privateKey = privateKey; + } + + public TlsSecret GenerateAgreement(TlsCertificate peerCertificate) + { + BcTlsCertificate bcCert = BcTlsCertificate.Convert(m_crypto, peerCertificate); + ECPublicKeyParameters peerPublicKey = bcCert.GetPubKeyEC(); + return BcTlsECDomain.CalculateECDHAgreement(m_crypto, m_privateKey, peerPublicKey); + } + + public Certificate Certificate + { + get { return m_certificate; } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs.meta new file mode 100644 index 00000000..4ff3f576 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 84303c0f198bc434b870377ae76edfec +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedAgreement.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs new file mode 100644 index 00000000..9602850a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs @@ -0,0 +1,143 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Credentialed class decrypting RSA encrypted secrets sent from a peer for our end of the TLS connection + /// using the BC light-weight API. + public class BcDefaultTlsCredentialedDecryptor + : TlsCredentialedDecryptor + { + protected readonly BcTlsCrypto m_crypto; + protected readonly Certificate m_certificate; + protected readonly AsymmetricKeyParameter m_privateKey; + + public BcDefaultTlsCredentialedDecryptor(BcTlsCrypto crypto, Certificate certificate, + AsymmetricKeyParameter privateKey) + { + if (crypto == null) + throw new ArgumentNullException("crypto"); + if (certificate == null) + throw new ArgumentNullException("certificate"); + if (certificate.IsEmpty) + throw new ArgumentException("cannot be empty", "certificate"); + if (privateKey == null) + throw new ArgumentNullException("privateKey"); + if (!privateKey.IsPrivate) + throw new ArgumentException("must be private", "privateKey"); + + if (privateKey is RsaKeyParameters) + { + } + else + { + throw new ArgumentException("'privateKey' type not supported: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(privateKey)); + } + + this.m_crypto = crypto; + this.m_certificate = certificate; + this.m_privateKey = privateKey; + } + + public virtual Certificate Certificate + { + get { return m_certificate; } + } + + public virtual TlsSecret Decrypt(TlsCryptoParameters cryptoParams, byte[] ciphertext) + { + // TODO Keep only the decryption itself here - move error handling outside + return SafeDecryptPreMasterSecret(cryptoParams, (RsaKeyParameters)m_privateKey, ciphertext); + } + + /* + * TODO[tls-ops] Probably need to make RSA encryption/decryption into TlsCrypto functions so + * that users can implement "generic" encryption credentials externally + */ + protected virtual TlsSecret SafeDecryptPreMasterSecret(TlsCryptoParameters cryptoParams, + RsaKeyParameters rsaServerPrivateKey, byte[] encryptedPreMasterSecret) + { + SecureRandom secureRandom = m_crypto.SecureRandom; + + /* + * RFC 5246 7.4.7.1. + */ + ProtocolVersion expectedVersion = cryptoParams.RsaPreMasterSecretVersion; + + // TODO Provide as configuration option? + bool versionNumberCheckDisabled = false; + + /* + * Generate 48 random bytes we can use as a Pre-Master-Secret, if the + * PKCS1 padding check should fail. + */ + byte[] fallback = new byte[48]; + secureRandom.NextBytes(fallback); + + byte[] M = Arrays.Clone(fallback); + try + { + Pkcs1Encoding encoding = new Pkcs1Encoding(new RsaBlindedEngine(), fallback); + encoding.Init(false, new ParametersWithRandom(rsaServerPrivateKey, secureRandom)); + + M = encoding.ProcessBlock(encryptedPreMasterSecret, 0, encryptedPreMasterSecret.Length); + } + catch (Exception) + { + /* + * This should never happen since the decryption should never throw an exception + * and return a random value instead. + * + * In any case, a TLS server MUST NOT generate an alert if processing an + * RSA-encrypted premaster secret message fails, or the version number is not as + * expected. Instead, it MUST continue the handshake with a randomly generated + * premaster secret. + */ + } + + /* + * If ClientHello.legacy_version is TLS 1.1 or higher, server implementations MUST check the + * version number [..]. + */ + if (versionNumberCheckDisabled && !TlsImplUtilities.IsTlsV11(expectedVersion)) + { + /* + * If the version number is TLS 1.0 or earlier, server implementations SHOULD check the + * version number, but MAY have a configuration option to disable the check. + */ + } + else + { + /* + * Compare the version number in the decrypted Pre-Master-Secret with the legacy_version + * field from the ClientHello. If they don't match, continue the handshake with the + * randomly generated 'fallback' value. + * + * NOTE: The comparison and replacement must be constant-time. + */ + int mask = (expectedVersion.MajorVersion ^ (M[0] & 0xFF)) + | (expectedVersion.MinorVersion ^ (M[1] & 0xFF)); + + // 'mask' will be all 1s if the versions matched, or else all 0s. + mask = (mask - 1) >> 31; + + for (int i = 0; i < 48; i++) + { + M[i] = (byte)((M[i] & mask) | (fallback[i] & ~mask)); + } + } + + return m_crypto.CreateSecret(M); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs.meta new file mode 100644 index 00000000..4d584333 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8e593abd1a2506c4d9e25120fce65765 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedDecryptor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs new file mode 100644 index 00000000..78390bf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs @@ -0,0 +1,89 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Credentialed class for generating signatures based on the use of primitives from the BC light-weight API. + public class BcDefaultTlsCredentialedSigner + : DefaultTlsCredentialedSigner + { + private static BcTlsCertificate GetEndEntity(BcTlsCrypto crypto, Certificate certificate) + { + if (certificate == null || certificate.IsEmpty) + throw new ArgumentException("No certificate"); + + return BcTlsCertificate.Convert(crypto, certificate.GetCertificateAt(0)); + } + + private static TlsSigner MakeSigner(BcTlsCrypto crypto, AsymmetricKeyParameter privateKey, + Certificate certificate, SignatureAndHashAlgorithm signatureAndHashAlgorithm) + { + TlsSigner signer; + if (privateKey is RsaKeyParameters) + { + RsaKeyParameters privKeyRsa = (RsaKeyParameters)privateKey; + + if (signatureAndHashAlgorithm != null) + { + int signatureScheme = SignatureScheme.From(signatureAndHashAlgorithm); + if (SignatureScheme.IsRsaPss(signatureScheme)) + { + return new BcTlsRsaPssSigner(crypto, privKeyRsa, signatureScheme); + } + } + + RsaKeyParameters pubKeyRsa = GetEndEntity(crypto, certificate).GetPubKeyRsa(); + + signer = new BcTlsRsaSigner(crypto, privKeyRsa, pubKeyRsa); + } + else if (privateKey is DsaPrivateKeyParameters) + { + signer = new BcTlsDsaSigner(crypto, (DsaPrivateKeyParameters)privateKey); + } + else if (privateKey is ECPrivateKeyParameters) + { + ECPrivateKeyParameters privKeyEC = (ECPrivateKeyParameters)privateKey; + + if (signatureAndHashAlgorithm != null) + { + int signatureScheme = SignatureScheme.From(signatureAndHashAlgorithm); + if (SignatureScheme.IsECDsa(signatureScheme)) + { + return new BcTlsECDsa13Signer(crypto, privKeyEC, signatureScheme); + } + } + + signer = new BcTlsECDsaSigner(crypto, privKeyEC); + } + else if (privateKey is Ed25519PrivateKeyParameters) + { + signer = new BcTlsEd25519Signer(crypto, (Ed25519PrivateKeyParameters)privateKey); + } + else if (privateKey is Ed448PrivateKeyParameters) + { + signer = new BcTlsEd448Signer(crypto, (Ed448PrivateKeyParameters)privateKey); + } + else + { + throw new ArgumentException("'privateKey' type not supported: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(privateKey)); + } + + return signer; + } + + public BcDefaultTlsCredentialedSigner(TlsCryptoParameters cryptoParams, BcTlsCrypto crypto, + AsymmetricKeyParameter privateKey, Certificate certificate, + SignatureAndHashAlgorithm signatureAndHashAlgorithm) + : base(cryptoParams, MakeSigner(crypto, privateKey, certificate, signatureAndHashAlgorithm), certificate, + signatureAndHashAlgorithm) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs.meta new file mode 100644 index 00000000..75510f90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e58111d54937dc94f843131c59731115 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcDefaultTlsCredentialedSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs new file mode 100644 index 00000000..489529d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs @@ -0,0 +1,133 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// HMAC implementation based on original internet draft for HMAC (RFC 2104). + /// + /// The difference is that padding is concatenated versus XORed with the key, e.g: + /// H(K + opad, H(K + ipad, text)) + /// + internal class BcSsl3Hmac + : TlsHmac + { + private const byte IPAD_BYTE = (byte)0x36; + private const byte OPAD_BYTE = (byte)0x5C; + + private static readonly byte[] IPAD = GenPad(IPAD_BYTE, 48); + private static readonly byte[] OPAD = GenPad(OPAD_BYTE, 48); + + private readonly IDigest m_digest; + private readonly int m_padLength; + + private byte[] m_secret; + + /// Base constructor for one of the standard digest algorithms for which the byteLength is known. + /// + /// + /// Behaviour is undefined for digests other than MD5 or SHA1. + /// + /// the digest. + internal BcSsl3Hmac(IDigest digest) + { + this.m_digest = digest; + + if (digest.GetDigestSize() == 20) + { + this.m_padLength = 40; + } + else + { + this.m_padLength = 48; + } + } + + public virtual void SetKey(byte[] key, int keyOff, int keyLen) + { + this.m_secret = TlsUtilities.CopyOfRangeExact(key, keyOff, keyOff + keyLen); + + Reset(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + this.m_secret = key.ToArray(); + + Reset(); + } +#endif + + public virtual void Update(byte[] input, int inOff, int len) + { + m_digest.BlockUpdate(input, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input) + { + m_digest.BlockUpdate(input); + } +#endif + + public virtual byte[] CalculateMac() + { + byte[] result = new byte[m_digest.GetDigestSize()]; + DoFinal(result, 0); + return result; + } + + public virtual void CalculateMac(byte[] output, int outOff) + { + DoFinal(output, outOff); + } + + public virtual int InternalBlockSize + { + get { return m_digest.GetByteLength(); } + } + + public virtual int MacLength + { + get { return m_digest.GetDigestSize(); } + } + + /** + * Reset the mac generator. + */ + public virtual void Reset() + { + m_digest.Reset(); + m_digest.BlockUpdate(m_secret, 0, m_secret.Length); + m_digest.BlockUpdate(IPAD, 0, m_padLength); + } + + private void DoFinal(byte[] output, int outOff) + { + byte[] tmp = new byte[m_digest.GetDigestSize()]; + m_digest.DoFinal(tmp, 0); + + m_digest.BlockUpdate(m_secret, 0, m_secret.Length); + m_digest.BlockUpdate(OPAD, 0, m_padLength); + m_digest.BlockUpdate(tmp, 0, tmp.Length); + + m_digest.DoFinal(output, outOff); + + Reset(); + } + + private static byte[] GenPad(byte b, int count) + { + byte[] padding = new byte[count]; + Arrays.Fill(padding, b); + return padding; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs.meta new file mode 100644 index 00000000..2e12fc72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f1cf89108ae984c499e7cf5dba3cbde6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcSsl3Hmac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs new file mode 100644 index 00000000..feeb1e71 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs @@ -0,0 +1,36 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTls13Verifier + : Tls13Verifier + { + private readonly SignerSink m_output; + + internal BcTls13Verifier(ISigner verifier) + { + if (verifier == null) + throw new ArgumentNullException("verifier"); + + this.m_output = new SignerSink(verifier); + } + + public Stream Stream + { + get { return m_output; } + } + + public bool VerifySignature(byte[] signature) + { + return m_output.Signer.VerifySignature(signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs.meta new file mode 100644 index 00000000..10233714 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4aa938c0bce81eb4dba1f37cc3bb491d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTls13Verifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs new file mode 100644 index 00000000..4eafdd35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs @@ -0,0 +1,70 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsAeadCipherImpl + : TlsAeadCipherImpl + { + private readonly bool m_isEncrypting; + private readonly IAeadCipher m_cipher; + + private KeyParameter key; + + internal BcTlsAeadCipherImpl(IAeadCipher cipher, bool isEncrypting) + { + this.m_cipher = cipher; + this.m_isEncrypting = isEncrypting; + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + this.key = new KeyParameter(key, keyOff, keyLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + this.key = new KeyParameter(key); + } +#endif + + public void Init(byte[] nonce, int macSize, byte[] additionalData) + { + m_cipher.Init(m_isEncrypting, new AeadParameters(key, macSize * 8, nonce, additionalData)); + } + + public int GetOutputSize(int inputLength) + { + return m_cipher.GetOutputSize(inputLength); + } + + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { + int len = m_cipher.ProcessBytes(input, inputOffset, inputLength, output, outputOffset); + + try + { + len += m_cipher.DoFinal(output, outputOffset + len); + } + catch (InvalidCipherTextException e) + { + throw new TlsFatalAlert(AlertDescription.bad_record_mac, e); + } + + return len; + } + + public void Reset() + { + m_cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs.meta new file mode 100644 index 00000000..8639345d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 445248e82182d894baa56e1df879c8cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsAeadCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs new file mode 100644 index 00000000..62c63835 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs @@ -0,0 +1,67 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsBlockCipherImpl + : TlsBlockCipherImpl + { + private readonly bool m_isEncrypting; + private readonly IBlockCipher m_cipher; + + private KeyParameter key; + + internal BcTlsBlockCipherImpl(IBlockCipher cipher, bool isEncrypting) + { + this.m_cipher = cipher; + this.m_isEncrypting = isEncrypting; + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + this.key = new KeyParameter(key, keyOff, keyLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + this.key = new KeyParameter(key); + } +#endif + + public void Init(byte[] iv, int ivOff, int ivLen) + { + m_cipher.Init(m_isEncrypting, new ParametersWithIV(key, iv, ivOff, ivLen)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Init(ReadOnlySpan iv) + { + m_cipher.Init(m_isEncrypting, new ParametersWithIV(key, iv)); + } +#endif + + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { + int blockSize = m_cipher.GetBlockSize(); + + for (int i = 0; i < inputLength; i += blockSize) + { + m_cipher.ProcessBlock(input, inputOffset + i, output, outputOffset + i); + } + + return inputLength; + } + + public int GetBlockSize() + { + return m_cipher.GetBlockSize(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs.meta new file mode 100644 index 00000000..2f058e5b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a239f59225989d442bc5c8187707e487 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsBlockCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs new file mode 100644 index 00000000..d31bd604 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for a single X.509 certificate based on the BC light-weight API. + public class BcTlsCertificate + : BcTlsRawKeyCertificate + { + /// + public static BcTlsCertificate Convert(BcTlsCrypto crypto, TlsCertificate certificate) + { + if (certificate is BcTlsCertificate) + return (BcTlsCertificate)certificate; + + return new BcTlsCertificate(crypto, certificate.GetEncoded()); + } + + /// + public static X509CertificateStructure ParseCertificate(byte[] encoding) + { + try + { + Asn1Object asn1 = TlsUtilities.ReadAsn1Object(encoding); + return X509CertificateStructure.GetInstance(asn1); + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.bad_certificate, e); + } + } + + protected readonly X509CertificateStructure m_certificate; + + /// + public BcTlsCertificate(BcTlsCrypto crypto, byte[] encoding) + : this(crypto, ParseCertificate(encoding)) + { + } + + public BcTlsCertificate(BcTlsCrypto crypto, X509CertificateStructure certificate) + : base(crypto, certificate.SubjectPublicKeyInfo) + { + m_certificate = certificate; + } + + public virtual X509CertificateStructure X509CertificateStructure => m_certificate; + + /// + public override byte[] GetEncoded() + { + return m_certificate.GetEncoded(Asn1Encodable.Der); + } + + /// + public override byte[] GetExtension(DerObjectIdentifier extensionOid) + { + X509Extensions extensions = m_certificate.TbsCertificate.Extensions; + if (extensions != null) + { + X509Extension extension = extensions.GetExtension(extensionOid); + if (extension != null) + { + return Arrays.Clone(extension.Value.GetOctets()); + } + } + return null; + } + + public override BigInteger SerialNumber => m_certificate.SerialNumber.Value; + + public override string SigAlgOid => m_certificate.SignatureAlgorithm.Algorithm.Id; + + public override Asn1Encodable GetSigAlgParams() => m_certificate.SignatureAlgorithm.Parameters; + + protected override bool SupportsKeyUsage(int keyUsageBits) + { + X509Extensions exts = m_certificate.TbsCertificate.Extensions; + if (exts != null) + { + KeyUsage ku = KeyUsage.FromExtensions(exts); + if (ku != null) + { + int bits = ku.GetBytes()[0] & 0xff; + if ((bits & keyUsageBits) != keyUsageBits) + return false; + } + } + return true; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs.meta new file mode 100644 index 00000000..61e5b3b6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f90dea4e64a35bc4cb84ba6c806af5c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs new file mode 100644 index 00000000..b7239c45 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs @@ -0,0 +1,774 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /** + * Class for providing cryptographic services for TLS based on implementations in the BC light-weight API. + *

    + * This class provides default implementations for everything. If you need to customise it, extend the class + * and override the appropriate methods. + *

    + */ + public class BcTlsCrypto + : AbstractTlsCrypto + { + private readonly SecureRandom m_entropySource; + + public BcTlsCrypto() + : this(CryptoServicesRegistrar.GetSecureRandom()) + { + } + + public BcTlsCrypto(SecureRandom entropySource) + { + if (entropySource == null) + throw new ArgumentNullException(nameof(entropySource)); + + this.m_entropySource = entropySource; + } + + internal virtual BcTlsSecret AdoptLocalSecret(byte[] data) + { + return new BcTlsSecret(this, data); + } + + public override SecureRandom SecureRandom + { + get { return m_entropySource; } + } + + public override TlsCertificate CreateCertificate(short type, byte[] encoding) + { + switch (type) + { + case CertificateType.X509: + return new BcTlsCertificate(this, encoding); + case CertificateType.RawPublicKey: + return new BcTlsRawKeyCertificate(this, encoding); + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + public override TlsCipher CreateCipher(TlsCryptoParameters cryptoParams, int encryptionAlgorithm, + int macAlgorithm) + { + switch (encryptionAlgorithm) + { + case EncryptionAlgorithm.AES_128_CBC: + case EncryptionAlgorithm.ARIA_128_CBC: + case EncryptionAlgorithm.CAMELLIA_128_CBC: + case EncryptionAlgorithm.SEED_CBC: + case EncryptionAlgorithm.SM4_CBC: + return CreateCipher_Cbc(cryptoParams, encryptionAlgorithm, 16, macAlgorithm); + + case EncryptionAlgorithm.cls_3DES_EDE_CBC: + return CreateCipher_Cbc(cryptoParams, encryptionAlgorithm, 24, macAlgorithm); + + case EncryptionAlgorithm.AES_256_CBC: + case EncryptionAlgorithm.ARIA_256_CBC: + case EncryptionAlgorithm.CAMELLIA_256_CBC: + return CreateCipher_Cbc(cryptoParams, encryptionAlgorithm, 32, macAlgorithm); + + case EncryptionAlgorithm.AES_128_CCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Ccm(cryptoParams, 16, 16); + case EncryptionAlgorithm.AES_128_CCM_8: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Ccm(cryptoParams, 16, 8); + case EncryptionAlgorithm.AES_128_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Gcm(cryptoParams, 16, 16); + case EncryptionAlgorithm.AES_256_CCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Ccm(cryptoParams, 32, 16); + case EncryptionAlgorithm.AES_256_CCM_8: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Ccm(cryptoParams, 32, 8); + case EncryptionAlgorithm.AES_256_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aes_Gcm(cryptoParams, 32, 16); + case EncryptionAlgorithm.ARIA_128_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aria_Gcm(cryptoParams, 16, 16); + case EncryptionAlgorithm.ARIA_256_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Aria_Gcm(cryptoParams, 32, 16); + case EncryptionAlgorithm.CAMELLIA_128_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Camellia_Gcm(cryptoParams, 16, 16); + case EncryptionAlgorithm.CAMELLIA_256_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_Camellia_Gcm(cryptoParams, 32, 16); + case EncryptionAlgorithm.CHACHA20_POLY1305: + // NOTE: Ignores macAlgorithm + return CreateChaCha20Poly1305(cryptoParams); + case EncryptionAlgorithm.NULL: + return CreateNullCipher(cryptoParams, macAlgorithm); + case EncryptionAlgorithm.SM4_CCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_SM4_Ccm(cryptoParams); + case EncryptionAlgorithm.SM4_GCM: + // NOTE: Ignores macAlgorithm + return CreateCipher_SM4_Gcm(cryptoParams); + + case EncryptionAlgorithm.DES40_CBC: + case EncryptionAlgorithm.DES_CBC: + case EncryptionAlgorithm.IDEA_CBC: + case EncryptionAlgorithm.RC2_CBC_40: + case EncryptionAlgorithm.RC4_128: + case EncryptionAlgorithm.RC4_40: + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + public override TlsDHDomain CreateDHDomain(TlsDHConfig dhConfig) + { + return new BcTlsDHDomain(this, dhConfig); + } + + public override TlsECDomain CreateECDomain(TlsECConfig ecConfig) + { + switch (ecConfig.NamedGroup) + { + case NamedGroup.x25519: + return new BcX25519Domain(this); + case NamedGroup.x448: + return new BcX448Domain(this); + default: + return new BcTlsECDomain(this, ecConfig); + } + } + + public override TlsNonceGenerator CreateNonceGenerator(byte[] additionalSeedMaterial) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return CreateNonceGenerator(Spans.FromNullableReadOnly(additionalSeedMaterial)); +#else + int cryptoHashAlgorithm = CryptoHashAlgorithm.sha256; + IDigest digest = CreateDigest(cryptoHashAlgorithm); + + int seedLength = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm); + byte[] seed = new byte[seedLength]; + SecureRandom.NextBytes(seed); + + DigestRandomGenerator randomGenerator = new DigestRandomGenerator(digest); + randomGenerator.AddSeedMaterial(additionalSeedMaterial); + randomGenerator.AddSeedMaterial(seed); + + return new BcTlsNonceGenerator(randomGenerator); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override TlsNonceGenerator CreateNonceGenerator(ReadOnlySpan additionalSeedMaterial) + { + int cryptoHashAlgorithm = CryptoHashAlgorithm.sha256; + IDigest digest = CreateDigest(cryptoHashAlgorithm); + + int seedLength = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm); + Span seed = seedLength <= 128 + ? stackalloc byte[seedLength] + : new byte[seedLength]; + SecureRandom.NextBytes(seed); + + DigestRandomGenerator randomGenerator = new DigestRandomGenerator(digest); + randomGenerator.AddSeedMaterial(additionalSeedMaterial); + randomGenerator.AddSeedMaterial(seed); + + return new BcTlsNonceGenerator(randomGenerator); + } +#endif + + public override bool HasAnyStreamVerifiers(IList signatureAndHashAlgorithms) + { + foreach (SignatureAndHashAlgorithm algorithm in signatureAndHashAlgorithms) + { + switch (SignatureScheme.From(algorithm)) + { + case SignatureScheme.ed25519: + case SignatureScheme.ed448: + return true; + } + } + return false; + } + + public override bool HasAnyStreamVerifiersLegacy(short[] clientCertificateTypes) + { + return false; + } + + public override bool HasCryptoHashAlgorithm(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + case CryptoHashAlgorithm.sha1: + case CryptoHashAlgorithm.sha224: + case CryptoHashAlgorithm.sha256: + case CryptoHashAlgorithm.sha384: + case CryptoHashAlgorithm.sha512: + case CryptoHashAlgorithm.sm3: + return true; + + default: + return false; + } + } + + public override bool HasCryptoSignatureAlgorithm(int cryptoSignatureAlgorithm) + { + switch (cryptoSignatureAlgorithm) + { + case CryptoSignatureAlgorithm.rsa: + case CryptoSignatureAlgorithm.dsa: + case CryptoSignatureAlgorithm.ecdsa: + case CryptoSignatureAlgorithm.rsa_pss_rsae_sha256: + case CryptoSignatureAlgorithm.rsa_pss_rsae_sha384: + case CryptoSignatureAlgorithm.rsa_pss_rsae_sha512: + case CryptoSignatureAlgorithm.ed25519: + case CryptoSignatureAlgorithm.ed448: + case CryptoSignatureAlgorithm.rsa_pss_pss_sha256: + case CryptoSignatureAlgorithm.rsa_pss_pss_sha384: + case CryptoSignatureAlgorithm.rsa_pss_pss_sha512: + return true; + + // TODO[draft-smyshlyaev-tls12-gost-suites-10] + case CryptoSignatureAlgorithm.gostr34102012_256: + case CryptoSignatureAlgorithm.gostr34102012_512: + + // TODO[RFC 8998] + case CryptoSignatureAlgorithm.sm2: + + default: + return false; + } + } + + public override bool HasDHAgreement() + { + return true; + } + + public override bool HasECDHAgreement() + { + return true; + } + + public override bool HasEncryptionAlgorithm(int encryptionAlgorithm) + { + switch (encryptionAlgorithm) + { + case EncryptionAlgorithm.AES_128_CBC: + case EncryptionAlgorithm.AES_128_CCM: + case EncryptionAlgorithm.AES_128_CCM_8: + case EncryptionAlgorithm.AES_128_GCM: + case EncryptionAlgorithm.AES_256_CBC: + case EncryptionAlgorithm.AES_256_CCM: + case EncryptionAlgorithm.AES_256_CCM_8: + case EncryptionAlgorithm.AES_256_GCM: + case EncryptionAlgorithm.ARIA_128_CBC: + case EncryptionAlgorithm.ARIA_128_GCM: + case EncryptionAlgorithm.ARIA_256_CBC: + case EncryptionAlgorithm.ARIA_256_GCM: + case EncryptionAlgorithm.CAMELLIA_128_CBC: + case EncryptionAlgorithm.CAMELLIA_128_GCM: + case EncryptionAlgorithm.CAMELLIA_256_CBC: + case EncryptionAlgorithm.CAMELLIA_256_GCM: + case EncryptionAlgorithm.CHACHA20_POLY1305: + case EncryptionAlgorithm.cls_3DES_EDE_CBC: + case EncryptionAlgorithm.NULL: + case EncryptionAlgorithm.SEED_CBC: + case EncryptionAlgorithm.SM4_CBC: + case EncryptionAlgorithm.SM4_CCM: + case EncryptionAlgorithm.SM4_GCM: + return true; + + case EncryptionAlgorithm.DES_CBC: + case EncryptionAlgorithm.DES40_CBC: + case EncryptionAlgorithm.IDEA_CBC: + case EncryptionAlgorithm.RC2_CBC_40: + case EncryptionAlgorithm.RC4_128: + case EncryptionAlgorithm.RC4_40: + default: + return false; + } + } + + public override bool HasHkdfAlgorithm(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.sha256: + case CryptoHashAlgorithm.sha384: + case CryptoHashAlgorithm.sha512: + case CryptoHashAlgorithm.sm3: + return true; + + default: + return false; + } + } + + public override bool HasMacAlgorithm(int macAlgorithm) + { + switch (macAlgorithm) + { + case MacAlgorithm.hmac_md5: + case MacAlgorithm.hmac_sha1: + case MacAlgorithm.hmac_sha256: + case MacAlgorithm.hmac_sha384: + case MacAlgorithm.hmac_sha512: + return true; + + default: + return false; + } + } + + public override bool HasNamedGroup(int namedGroup) + { + return NamedGroup.RefersToASpecificGroup(namedGroup); + } + + public override bool HasRsaEncryption() + { + return true; + } + + public override bool HasSignatureAlgorithm(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + case SignatureAlgorithm.dsa: + case SignatureAlgorithm.ecdsa: + case SignatureAlgorithm.ed25519: + case SignatureAlgorithm.ed448: + case SignatureAlgorithm.rsa_pss_rsae_sha256: + case SignatureAlgorithm.rsa_pss_rsae_sha384: + case SignatureAlgorithm.rsa_pss_rsae_sha512: + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + case SignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256: + case SignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384: + case SignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512: + return true; + + // TODO[draft-smyshlyaev-tls12-gost-suites-10] + case SignatureAlgorithm.gostr34102012_256: + case SignatureAlgorithm.gostr34102012_512: + // TODO[RFC 8998] + //case SignatureAlgorithm.sm2: + default: + return false; + } + } + + public override bool HasSignatureAndHashAlgorithm(SignatureAndHashAlgorithm sigAndHashAlgorithm) + { + short signature = sigAndHashAlgorithm.Signature; + + switch (sigAndHashAlgorithm.Hash) + { + case HashAlgorithm.md5: + return SignatureAlgorithm.rsa == signature && HasSignatureAlgorithm(signature); + default: + return HasSignatureAlgorithm(signature); + } + } + + public override bool HasSignatureScheme(int signatureScheme) + { + switch (signatureScheme) + { + case SignatureScheme.sm2sig_sm3: + return false; + default: + { + short signature = SignatureScheme.GetSignatureAlgorithm(signatureScheme); + + switch(SignatureScheme.GetCryptoHashAlgorithm(signatureScheme)) + { + case CryptoHashAlgorithm.md5: + return SignatureAlgorithm.rsa == signature && HasSignatureAlgorithm(signature); + default: + return HasSignatureAlgorithm(signature); + } + } + } + } + + public override bool HasSrpAuthentication() + { + return true; + } + + public override TlsSecret CreateSecret(byte[] data) + { + try + { + return AdoptLocalSecret(Arrays.Clone(data)); + } + finally + { + // TODO[tls-ops] Add this after checking all callers + //if (data != null) + //{ + // Array.Clear(data, 0, data.Length); + //} + } + } + + public override TlsSecret GenerateRsaPreMasterSecret(ProtocolVersion version) + { + byte[] data = new byte[48]; + SecureRandom.NextBytes(data); + TlsUtilities.WriteVersion(version, data, 0); + return AdoptLocalSecret(data); + } + + public virtual IDigest CloneDigest(int cryptoHashAlgorithm, IDigest digest) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + return new MD5Digest((MD5Digest)digest); + case CryptoHashAlgorithm.sha1: + return new Sha1Digest((Sha1Digest)digest); + case CryptoHashAlgorithm.sha224: + return new Sha224Digest((Sha224Digest)digest); + case CryptoHashAlgorithm.sha256: + return new Sha256Digest((Sha256Digest)digest); + case CryptoHashAlgorithm.sha384: + return new Sha384Digest((Sha384Digest)digest); + case CryptoHashAlgorithm.sha512: + return new Sha512Digest((Sha512Digest)digest); + case CryptoHashAlgorithm.sm3: + return new SM3Digest((SM3Digest)digest); + default: + throw new ArgumentException("invalid CryptoHashAlgorithm: " + cryptoHashAlgorithm); + } + } + + public virtual IDigest CreateDigest(int cryptoHashAlgorithm) + { + switch (cryptoHashAlgorithm) + { + case CryptoHashAlgorithm.md5: + return new MD5Digest(); + case CryptoHashAlgorithm.sha1: + return new Sha1Digest(); + case CryptoHashAlgorithm.sha224: + return new Sha224Digest(); + case CryptoHashAlgorithm.sha256: + return new Sha256Digest(); + case CryptoHashAlgorithm.sha384: + return new Sha384Digest(); + case CryptoHashAlgorithm.sha512: + return new Sha512Digest(); + case CryptoHashAlgorithm.sm3: + return new SM3Digest(); + default: + throw new ArgumentException("invalid CryptoHashAlgorithm: " + cryptoHashAlgorithm); + } + } + + public override TlsHash CreateHash(int cryptoHashAlgorithm) + { + return new BcTlsHash(this, cryptoHashAlgorithm); + } + + protected virtual IBlockCipher CreateBlockCipher(int encryptionAlgorithm) + { + switch (encryptionAlgorithm) + { + case EncryptionAlgorithm.cls_3DES_EDE_CBC: + return CreateDesEdeEngine(); + case EncryptionAlgorithm.AES_128_CBC: + case EncryptionAlgorithm.AES_256_CBC: + return CreateAesEngine(); + case EncryptionAlgorithm.ARIA_128_CBC: + case EncryptionAlgorithm.ARIA_256_CBC: + return CreateAriaEngine(); + case EncryptionAlgorithm.CAMELLIA_128_CBC: + case EncryptionAlgorithm.CAMELLIA_256_CBC: + return CreateCamelliaEngine(); + case EncryptionAlgorithm.SEED_CBC: + return CreateSeedEngine(); + case EncryptionAlgorithm.SM4_CBC: + return CreateSM4Engine(); + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + protected virtual IBlockCipher CreateCbcBlockCipher(IBlockCipher blockCipher) + { + return new CbcBlockCipher(blockCipher); + } + + protected virtual IBlockCipher CreateCbcBlockCipher(int encryptionAlgorithm) + { + return CreateCbcBlockCipher(CreateBlockCipher(encryptionAlgorithm)); + } + + protected virtual TlsCipher CreateChaCha20Poly1305(TlsCryptoParameters cryptoParams) + { + BcChaCha20Poly1305 encrypt = new BcChaCha20Poly1305(true); + BcChaCha20Poly1305 decrypt = new BcChaCha20Poly1305(false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, 32, 16, TlsAeadCipher.AEAD_CHACHA20_POLY1305); + } + + protected virtual TlsAeadCipher CreateCipher_Aes_Ccm(TlsCryptoParameters cryptoParams, int cipherKeySize, + int macSize) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, cipherKeySize, macSize, TlsAeadCipher.AEAD_CCM); + } + + protected virtual TlsAeadCipher CreateCipher_Aes_Gcm(TlsCryptoParameters cryptoParams, int cipherKeySize, + int macSize) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, cipherKeySize, macSize, TlsAeadCipher.AEAD_GCM); + } + + protected virtual TlsAeadCipher CreateCipher_Aria_Gcm(TlsCryptoParameters cryptoParams, int cipherKeySize, + int macSize) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aria_Gcm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Aria_Gcm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, cipherKeySize, macSize, TlsAeadCipher.AEAD_GCM); + } + + protected virtual TlsAeadCipher CreateCipher_Camellia_Gcm(TlsCryptoParameters cryptoParams, int cipherKeySize, + int macSize) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Camellia_Gcm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_Camellia_Gcm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, cipherKeySize, macSize, TlsAeadCipher.AEAD_GCM); + } + + protected virtual TlsCipher CreateCipher_Cbc(TlsCryptoParameters cryptoParams, int encryptionAlgorithm, + int cipherKeySize, int macAlgorithm) + { + BcTlsBlockCipherImpl encrypt = new BcTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), true); + BcTlsBlockCipherImpl decrypt = new BcTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), false); + + TlsHmac clientMac = CreateMac(cryptoParams, macAlgorithm); + TlsHmac serverMac = CreateMac(cryptoParams, macAlgorithm); + + return new TlsBlockCipher(cryptoParams, encrypt, decrypt, clientMac, serverMac, cipherKeySize); + } + + protected virtual TlsAeadCipher CreateCipher_SM4_Ccm(TlsCryptoParameters cryptoParams) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_SM4_Ccm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_SM4_Ccm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, 16, 16, TlsAeadCipher.AEAD_CCM); + } + + protected virtual TlsAeadCipher CreateCipher_SM4_Gcm(TlsCryptoParameters cryptoParams) + { + BcTlsAeadCipherImpl encrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_SM4_Gcm(), true); + BcTlsAeadCipherImpl decrypt = new BcTlsAeadCipherImpl(CreateAeadCipher_SM4_Gcm(), false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, 16, 16, TlsAeadCipher.AEAD_GCM); + } + + protected virtual TlsNullCipher CreateNullCipher(TlsCryptoParameters cryptoParams, int macAlgorithm) + { + return new TlsNullCipher(cryptoParams, CreateMac(cryptoParams, macAlgorithm), + CreateMac(cryptoParams, macAlgorithm)); + } + + protected virtual IBlockCipher CreateAesEngine() + { + return AesUtilities.CreateEngine(); + } + + protected virtual IBlockCipher CreateAriaEngine() + { + return new AriaEngine(); + } + + protected virtual IBlockCipher CreateCamelliaEngine() + { + return new CamelliaEngine(); + } + + protected virtual IBlockCipher CreateDesEdeEngine() + { + return new DesEdeEngine(); + } + + protected virtual IBlockCipher CreateSeedEngine() + { + return new SeedEngine(); + } + + protected virtual IBlockCipher CreateSM4Engine() + { + return new SM4Engine(); + } + + protected virtual IAeadCipher CreateCcmMode(IBlockCipher engine) + { + return new CcmBlockCipher(engine); + } + + protected virtual IAeadCipher CreateGcmMode(IBlockCipher engine) + { + // TODO Consider allowing custom configuration of multiplier + return new GcmBlockCipher(engine); + } + + protected virtual IAeadCipher CreateAeadCipher_Aes_Ccm() + { + return CreateCcmMode(CreateAesEngine()); + } + + protected virtual IAeadCipher CreateAeadCipher_Aes_Gcm() + { + return CreateGcmMode(CreateAesEngine()); + } + + protected virtual IAeadCipher CreateAeadCipher_Aria_Gcm() + { + return CreateGcmMode(CreateAriaEngine()); + } + + protected virtual IAeadCipher CreateAeadCipher_Camellia_Gcm() + { + return CreateGcmMode(CreateCamelliaEngine()); + } + + protected virtual IAeadCipher CreateAeadCipher_SM4_Ccm() + { + return CreateCcmMode(CreateSM4Engine()); + } + + protected virtual IAeadCipher CreateAeadCipher_SM4_Gcm() + { + return CreateGcmMode(CreateSM4Engine()); + } + + public override TlsHmac CreateHmac(int macAlgorithm) + { + switch (macAlgorithm) + { + case MacAlgorithm.hmac_md5: + case MacAlgorithm.hmac_sha1: + case MacAlgorithm.hmac_sha256: + case MacAlgorithm.hmac_sha384: + case MacAlgorithm.hmac_sha512: + return CreateHmacForHash(TlsCryptoUtilities.GetHashForHmac(macAlgorithm)); + + default: + throw new ArgumentException("invalid MacAlgorithm: " + macAlgorithm); + } + } + + public override TlsHmac CreateHmacForHash(int cryptoHashAlgorithm) + { + return new BcTlsHmac(new HMac(CreateDigest(cryptoHashAlgorithm))); + } + + protected virtual TlsHmac CreateHmac_Ssl(int macAlgorithm) + { + switch (macAlgorithm) + { + case MacAlgorithm.hmac_md5: + return new BcSsl3Hmac(CreateDigest(CryptoHashAlgorithm.md5)); + case MacAlgorithm.hmac_sha1: + return new BcSsl3Hmac(CreateDigest(CryptoHashAlgorithm.sha1)); + case MacAlgorithm.hmac_sha256: + return new BcSsl3Hmac(CreateDigest(CryptoHashAlgorithm.sha256)); + case MacAlgorithm.hmac_sha384: + return new BcSsl3Hmac(CreateDigest(CryptoHashAlgorithm.sha384)); + case MacAlgorithm.hmac_sha512: + return new BcSsl3Hmac(CreateDigest(CryptoHashAlgorithm.sha512)); + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + + protected virtual TlsHmac CreateMac(TlsCryptoParameters cryptoParams, int macAlgorithm) + { + if (TlsImplUtilities.IsSsl(cryptoParams)) + { + return CreateHmac_Ssl(macAlgorithm); + } + else + { + return CreateHmac(macAlgorithm); + } + } + + public override TlsSrp6Client CreateSrp6Client(TlsSrpConfig srpConfig) + { + BigInteger[] ng = srpConfig.GetExplicitNG(); + Srp6GroupParameters srpGroup = new Srp6GroupParameters(ng[0], ng[1]); + + Srp6Client srp6Client = new Srp6Client(); + srp6Client.Init(srpGroup, CreateDigest(CryptoHashAlgorithm.sha1), SecureRandom); + + return new BcTlsSrp6Client(srp6Client); + } + + public override TlsSrp6Server CreateSrp6Server(TlsSrpConfig srpConfig, BigInteger srpVerifier) + { + BigInteger[] ng = srpConfig.GetExplicitNG(); + Srp6GroupParameters srpGroup = new Srp6GroupParameters(ng[0], ng[1]); + + Srp6Server srp6Server = new Srp6Server(); + srp6Server.Init(srpGroup, srpVerifier, CreateDigest(CryptoHashAlgorithm.sha1), SecureRandom); + + return new BcTlsSrp6Server(srp6Server); + } + + public override TlsSrp6VerifierGenerator CreateSrp6VerifierGenerator(TlsSrpConfig srpConfig) + { + BigInteger[] ng = srpConfig.GetExplicitNG(); + + Srp6VerifierGenerator srp6VerifierGenerator = new Srp6VerifierGenerator(); + srp6VerifierGenerator.Init(ng[0], ng[1], CreateDigest(CryptoHashAlgorithm.sha1)); + + return new BcTlsSrp6VerifierGenerator(srp6VerifierGenerator); + } + + public override TlsSecret HkdfInit(int cryptoHashAlgorithm) + { + return AdoptLocalSecret(new byte[TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm)]); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs.meta new file mode 100644 index 00000000..782b7019 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 36e6d3f8becfe7d46a9fe2a9c8a37c3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsCrypto.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs new file mode 100644 index 00000000..4acbda68 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Support class for ephemeral Diffie-Hellman using the BC light-weight library. + public class BcTlsDH + : TlsAgreement + { + protected readonly BcTlsDHDomain m_domain; + + protected AsymmetricCipherKeyPair m_localKeyPair; + protected DHPublicKeyParameters m_peerPublicKey; + + public BcTlsDH(BcTlsDHDomain domain) + { + this.m_domain = domain; + } + + public virtual byte[] GenerateEphemeral() + { + this.m_localKeyPair = m_domain.GenerateKeyPair(); + + return m_domain.EncodePublicKey((DHPublicKeyParameters)m_localKeyPair.Public); + } + + public virtual void ReceivePeerValue(byte[] peerValue) + { + this.m_peerPublicKey = m_domain.DecodePublicKey(peerValue); + } + + public virtual TlsSecret CalculateSecret() + { + return m_domain.CalculateDHAgreement((DHPrivateKeyParameters)m_localKeyPair.Private, m_peerPublicKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs.meta new file mode 100644 index 00000000..e75c6a3c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9191048a1d0bd014090167375a36ec73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDH.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs new file mode 100644 index 00000000..4d2049ed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// BC light-weight support class for Diffie-Hellman key pair generation and key agreement over a + /// specified Diffie-Hellman configuration. + public class BcTlsDHDomain + : TlsDHDomain + { + private static byte[] EncodeValue(DHParameters dh, bool padded, BigInteger x) + { + return padded + ? BigIntegers.AsUnsignedByteArray(GetValueLength(dh), x) + : BigIntegers.AsUnsignedByteArray(x); + } + + private static int GetValueLength(DHParameters dh) + { + return BigIntegers.GetUnsignedByteLength(dh.P); + } + + public static BcTlsSecret CalculateDHAgreement(BcTlsCrypto crypto, DHPrivateKeyParameters privateKey, + DHPublicKeyParameters publicKey, bool padded) + { + DHBasicAgreement basicAgreement = new DHBasicAgreement(); + basicAgreement.Init(privateKey); + BigInteger agreementValue = basicAgreement.CalculateAgreement(publicKey); + byte[] secret = EncodeValue(privateKey.Parameters, padded, agreementValue); + return crypto.AdoptLocalSecret(secret); + } + + public static DHParameters GetDomainParameters(TlsDHConfig dhConfig) + { + DHGroup dhGroup = TlsDHUtilities.GetDHGroup(dhConfig); + if (dhGroup == null) + throw new ArgumentException("No DH configuration provided"); + + return new DHParameters(dhGroup.P, dhGroup.G, dhGroup.Q, dhGroup.L); + } + + protected readonly BcTlsCrypto m_crypto; + protected readonly TlsDHConfig m_config; + protected readonly DHParameters m_domainParameters; + + public BcTlsDHDomain(BcTlsCrypto crypto, TlsDHConfig dhConfig) + { + this.m_crypto = crypto; + this.m_config = dhConfig; + this.m_domainParameters = GetDomainParameters(dhConfig); + } + + public virtual BcTlsSecret CalculateDHAgreement(DHPrivateKeyParameters privateKey, + DHPublicKeyParameters publicKey) + { + return CalculateDHAgreement(m_crypto, privateKey, publicKey, m_config.IsPadded); + } + + public virtual TlsAgreement CreateDH() + { + return new BcTlsDH(this); + } + + /// + public virtual BigInteger DecodeParameter(byte[] encoding) + { + if (m_config.IsPadded && GetValueLength(m_domainParameters) != encoding.Length) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + return new BigInteger(1, encoding); + } + + /// + public virtual DHPublicKeyParameters DecodePublicKey(byte[] encoding) + { + /* + * RFC 7919 3. [..] the client MUST verify that dh_Ys is in the range 1 < dh_Ys < dh_p - 1. + * If dh_Ys is not in this range, the client MUST terminate the connection with a fatal + * handshake_failure(40) alert. + */ + try + { + BigInteger y = DecodeParameter(encoding); + + return new DHPublicKeyParameters(y, m_domainParameters); + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.handshake_failure, e); + } + } + + public virtual byte[] EncodeParameter(BigInteger x) + { + return EncodeValue(m_domainParameters, m_config.IsPadded, x); + } + + public virtual byte[] EncodePublicKey(DHPublicKeyParameters publicKey) + { + return EncodeValue(m_domainParameters, true, publicKey.Y); + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + DHBasicKeyPairGenerator keyPairGenerator = new DHBasicKeyPairGenerator(); + keyPairGenerator.Init(new DHKeyGenerationParameters(m_crypto.SecureRandom, m_domainParameters)); + return keyPairGenerator.GenerateKeyPair(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs.meta new file mode 100644 index 00000000..1ab91a71 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30ef06c298d99664b9cf05c5a42e22ac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDHDomain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs new file mode 100644 index 00000000..b06e7934 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for generation of the raw DSA signature type using the BC light-weight API. + /// + public class BcTlsDsaSigner + : BcTlsDssSigner + { + public BcTlsDsaSigner(BcTlsCrypto crypto, DsaPrivateKeyParameters privateKey) + : base(crypto, privateKey) + { + } + + protected override IDsa CreateDsaImpl(int cryptoHashAlgorithm) + { + return new DsaSigner(new HMacDsaKCalculator(m_crypto.CreateDigest(cryptoHashAlgorithm))); + } + + protected override short SignatureAlgorithm + { + get { return Tls.SignatureAlgorithm.dsa; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs.meta new file mode 100644 index 00000000..d02846b8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e0baf4b33ad021e44bab408cea5773ca +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs new file mode 100644 index 00000000..acd99d48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for the verification of the raw DSA signature type using the BC light-weight API. + /// + public class BcTlsDsaVerifier + : BcTlsDssVerifier + { + public BcTlsDsaVerifier(BcTlsCrypto crypto, DsaPublicKeyParameters publicKey) + : base(crypto, publicKey) + { + } + + protected override IDsa CreateDsaImpl() + { + return new DsaSigner(); + } + + protected override short SignatureAlgorithm + { + get { return Tls.SignatureAlgorithm.dsa; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs.meta new file mode 100644 index 00000000..0d7bcdc7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1dd8d1f47f4d96d4c83c665b309cc52d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDsaVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs new file mode 100644 index 00000000..eeab92c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// BC light-weight base class for the signers implementing the two DSA style algorithms from FIPS PUB + /// 186-4: DSA and ECDSA. + public abstract class BcTlsDssSigner + : BcTlsSigner + { + protected BcTlsDssSigner(BcTlsCrypto crypto, AsymmetricKeyParameter privateKey) + : base(crypto, privateKey) + { + } + + protected abstract IDsa CreateDsaImpl(int cryptoHashAlgorithm); + + protected abstract short SignatureAlgorithm { get; } + + public override byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash) + { + if (algorithm != null && algorithm.Signature != SignatureAlgorithm) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + int cryptoHashAlgorithm = (null == algorithm) + ? CryptoHashAlgorithm.sha1 + : TlsCryptoUtilities.GetHash(algorithm.Hash); + + ISigner signer = new DsaDigestSigner(CreateDsaImpl(cryptoHashAlgorithm), new NullDigest()); + signer.Init(true, new ParametersWithRandom(m_privateKey, m_crypto.SecureRandom)); + if (algorithm == null) + { + // Note: Only use the SHA1 part of the (MD5/SHA1) hash + signer.BlockUpdate(hash, 16, 20); + } + else + { + signer.BlockUpdate(hash, 0, hash.Length); + } + try + { + return signer.GenerateSignature(); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs.meta new file mode 100644 index 00000000..ef0e7a86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c2ca5e7e6ad55c489e5936b0beccc9c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs new file mode 100644 index 00000000..008c3c10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs @@ -0,0 +1,47 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// BC light-weight base class for the verifiers supporting the two DSA style algorithms from FIPS PUB + /// 186-4: DSA and ECDSA. + public abstract class BcTlsDssVerifier + : BcTlsVerifier + { + protected BcTlsDssVerifier(BcTlsCrypto crypto, AsymmetricKeyParameter publicKey) + : base(crypto, publicKey) + { + } + + protected abstract IDsa CreateDsaImpl(); + + protected abstract short SignatureAlgorithm { get; } + + public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) + { + SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm; + if (algorithm != null && algorithm.Signature != SignatureAlgorithm) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + ISigner signer = new DsaDigestSigner(CreateDsaImpl(), new NullDigest()); + signer.Init(false, m_publicKey); + if (algorithm == null) + { + // Note: Only use the SHA1 part of the (MD5/SHA1) hash + signer.BlockUpdate(hash, 16, 20); + } + else + { + signer.BlockUpdate(hash, 0, hash.Length); + } + return signer.VerifySignature(digitallySigned.Signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs.meta new file mode 100644 index 00000000..0981a3eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 82bc57525eb1d6847bd0f677aa9ffc1e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsDssVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs new file mode 100644 index 00000000..0899ac5a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs @@ -0,0 +1,43 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Support class for ephemeral Elliptic Curve Diffie-Hellman using the BC light-weight library. + public class BcTlsECDH + : TlsAgreement + { + protected readonly BcTlsECDomain m_domain; + + protected AsymmetricCipherKeyPair m_localKeyPair; + protected ECPublicKeyParameters m_peerPublicKey; + + public BcTlsECDH(BcTlsECDomain domain) + { + this.m_domain = domain; + } + + public virtual byte[] GenerateEphemeral() + { + this.m_localKeyPair = m_domain.GenerateKeyPair(); + + return m_domain.EncodePublicKey((ECPublicKeyParameters)m_localKeyPair.Public); + } + + public virtual void ReceivePeerValue(byte[] peerValue) + { + this.m_peerPublicKey = m_domain.DecodePublicKey(peerValue); + } + + public virtual TlsSecret CalculateSecret() + { + return m_domain.CalculateECDHAgreement((ECPrivateKeyParameters)m_localKeyPair.Private, m_peerPublicKey); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs.meta new file mode 100644 index 00000000..d1efe7a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6aa1f94604e5f1944b98d536face36a7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDH.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs new file mode 100644 index 00000000..3daedb72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs @@ -0,0 +1,125 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /** + * EC domain class for generating key pairs and performing key agreement. + */ + public class BcTlsECDomain + : TlsECDomain + { + public static BcTlsSecret CalculateECDHAgreement(BcTlsCrypto crypto, ECPrivateKeyParameters privateKey, + ECPublicKeyParameters publicKey) + { + ECDHBasicAgreement basicAgreement = new ECDHBasicAgreement(); + basicAgreement.Init(privateKey); + BigInteger agreementValue = basicAgreement.CalculateAgreement(publicKey); + + /* + * RFC 4492 5.10. Note that this octet string (Z in IEEE 1363 terminology) as output by + * FE2OSP, the Field Element to Octet String Conversion Primitive, has constant length for + * any given field; leading zeros found in this octet string MUST NOT be truncated. + */ + byte[] secret = BigIntegers.AsUnsignedByteArray(basicAgreement.GetFieldSize(), agreementValue); + return crypto.AdoptLocalSecret(secret); + } + + public static ECDomainParameters GetDomainParameters(TlsECConfig ecConfig) + { + return GetDomainParameters(ecConfig.NamedGroup); + } + + public static ECDomainParameters GetDomainParameters(int namedGroup) + { + if (!NamedGroup.RefersToASpecificCurve(namedGroup)) + return null; + + // Parameters are lazily created the first time a particular curve is accessed + + string curveName = NamedGroup.GetCurveName(namedGroup); + X9ECParameters ecP = ECKeyPairGenerator.FindECCurveByName(curveName); + if (ecP == null) + return null; + + // It's a bit inefficient to do this conversion every time + return new ECDomainParameters(ecP.Curve, ecP.G, ecP.N, ecP.H, ecP.GetSeed()); + } + + protected readonly BcTlsCrypto m_crypto; + protected readonly TlsECConfig m_config; + protected readonly ECDomainParameters m_domainParameters; + + public BcTlsECDomain(BcTlsCrypto crypto, TlsECConfig ecConfig) + { + this.m_crypto = crypto; + this.m_config = ecConfig; + this.m_domainParameters = GetDomainParameters(ecConfig); + } + + public virtual BcTlsSecret CalculateECDHAgreement(ECPrivateKeyParameters privateKey, + ECPublicKeyParameters publicKey) + { + return CalculateECDHAgreement(m_crypto, privateKey, publicKey); + } + + public virtual TlsAgreement CreateECDH() + { + return new BcTlsECDH(this); + } + + public virtual ECPoint DecodePoint(byte[] encoding) + { + return m_domainParameters.Curve.DecodePoint(encoding); + } + + /// + public virtual ECPublicKeyParameters DecodePublicKey(byte[] encoding) + { + try + { + ECPoint point = DecodePoint(encoding); + + return new ECPublicKeyParameters(point, m_domainParameters); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter, e); + } + } + + public virtual byte[] EncodePoint(ECPoint point) + { + return point.GetEncoded(false); + } + + public virtual byte[] EncodePublicKey(ECPublicKeyParameters publicKey) + { + return EncodePoint(publicKey.Q); + } + + public virtual AsymmetricCipherKeyPair GenerateKeyPair() + { + ECKeyPairGenerator keyPairGenerator = new ECKeyPairGenerator(); + keyPairGenerator.Init(new ECKeyGenerationParameters(m_domainParameters, m_crypto.SecureRandom)); + return keyPairGenerator.GenerateKeyPair(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs.meta new file mode 100644 index 00000000..60cb9450 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2fd27ec13a575ea4c8600311dcb18f69 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDomain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs new file mode 100644 index 00000000..274e5e47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for generation of ECDSA signatures in TLS 1.3+ using the BC light-weight API. + /// + public class BcTlsECDsa13Signer + : BcTlsSigner + { + private readonly int m_signatureScheme; + + public BcTlsECDsa13Signer(BcTlsCrypto crypto, ECPrivateKeyParameters privateKey, int signatureScheme) + : base(crypto, privateKey) + { + if (!SignatureScheme.IsECDsa(signatureScheme)) + throw new ArgumentException("signatureScheme"); + + this.m_signatureScheme = signatureScheme; + } + + public override byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash) + { + if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme); + IDsa dsa = new ECDsaSigner(new HMacDsaKCalculator(m_crypto.CreateDigest(cryptoHashAlgorithm))); + + ISigner signer = new DsaDigestSigner(dsa, new NullDigest()); + signer.Init(true, new ParametersWithRandom(m_privateKey, m_crypto.SecureRandom)); + signer.BlockUpdate(hash, 0, hash.Length); + try + { + return signer.GenerateSignature(); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs.meta new file mode 100644 index 00000000..f32e8fc4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42b7da95e44910341b4de9117adf94bf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsa13Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs new file mode 100644 index 00000000..c1902f3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for generation of the raw ECDSA signature type using the BC light-weight API. + /// + public class BcTlsECDsaSigner + : BcTlsDssSigner + { + public BcTlsECDsaSigner(BcTlsCrypto crypto, ECPrivateKeyParameters privateKey) + : base(crypto, privateKey) + { + } + + protected override IDsa CreateDsaImpl(int cryptoHashAlgorithm) + { + return new ECDsaSigner(new HMacDsaKCalculator(m_crypto.CreateDigest(cryptoHashAlgorithm))); + } + + protected override short SignatureAlgorithm + { + get { return Tls.SignatureAlgorithm.ecdsa; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs.meta new file mode 100644 index 00000000..60896f8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bc174da35b6a95c43b4f9fd3ff8f9601 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs new file mode 100644 index 00000000..feb4bde0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for the verification of the raw ECDSA signature type using the BC light-weight + /// API. + public class BcTlsECDsaVerifier + : BcTlsDssVerifier + { + public BcTlsECDsaVerifier(BcTlsCrypto crypto, ECPublicKeyParameters publicKey) + : base(crypto, publicKey) + { + } + + protected override IDsa CreateDsaImpl() + { + return new ECDsaSigner(); + } + + protected override short SignatureAlgorithm + { + get { return Tls.SignatureAlgorithm.ecdsa; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs.meta new file mode 100644 index 00000000..668d4541 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92d29c21e5ab5ce409a87a091497c11b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsECDsaVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs new file mode 100644 index 00000000..93741d33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public class BcTlsEd25519Signer + : BcTlsSigner + { + public BcTlsEd25519Signer(BcTlsCrypto crypto, Ed25519PrivateKeyParameters privateKey) + : base(crypto, privateKey) + { + } + + public override TlsStreamSigner GetStreamSigner(SignatureAndHashAlgorithm algorithm) + { + if (algorithm == null || SignatureScheme.From(algorithm) != SignatureScheme.ed25519) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + Ed25519Signer signer = new Ed25519Signer(); + signer.Init(true, m_privateKey); + + return new BcTlsStreamSigner(signer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs.meta new file mode 100644 index 00000000..768d14f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 815dee36ad3d2184fa77798c223a4b38 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd25519Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs new file mode 100644 index 00000000..46ff32b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public class BcTlsEd448Signer + : BcTlsSigner + { + public BcTlsEd448Signer(BcTlsCrypto crypto, Ed448PrivateKeyParameters privateKey) + : base(crypto, privateKey) + { + } + + public override TlsStreamSigner GetStreamSigner(SignatureAndHashAlgorithm algorithm) + { + if (algorithm == null || SignatureScheme.From(algorithm) != SignatureScheme.ed448) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + Ed448Signer signer = new Ed448Signer(TlsUtilities.EmptyBytes); + signer.Init(true, m_privateKey); + + return new BcTlsStreamSigner(signer); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs.meta new file mode 100644 index 00000000..070c5e3d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a5ec0d7e05eb7cc43bc8fd211f9ba4c3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsEd448Signer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs new file mode 100644 index 00000000..77468ebf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsHash + : TlsHash + { + private readonly BcTlsCrypto m_crypto; + private readonly int m_cryptoHashAlgorithm; + private readonly IDigest m_digest; + + internal BcTlsHash(BcTlsCrypto crypto, int cryptoHashAlgorithm) + : this(crypto, cryptoHashAlgorithm, crypto.CreateDigest(cryptoHashAlgorithm)) + { + } + + private BcTlsHash(BcTlsCrypto crypto, int cryptoHashAlgorithm, IDigest digest) + { + this.m_crypto = crypto; + this.m_cryptoHashAlgorithm = cryptoHashAlgorithm; + this.m_digest = digest; + } + + public void Update(byte[] data, int offSet, int length) + { + m_digest.BlockUpdate(data, offSet, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input) + { + m_digest.BlockUpdate(input); + } +#endif + + public byte[] CalculateHash() + { + byte[] rv = new byte[m_digest.GetDigestSize()]; + m_digest.DoFinal(rv, 0); + return rv; + } + + public TlsHash CloneHash() + { + IDigest clone = m_crypto.CloneDigest(m_cryptoHashAlgorithm, m_digest); + return new BcTlsHash(m_crypto, m_cryptoHashAlgorithm, clone); + } + + public void Reset() + { + m_digest.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs.meta new file mode 100644 index 00000000..9c23375a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1a4db1fa62387dd4bbae89d4aeca62fd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHash.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs new file mode 100644 index 00000000..6082f674 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsHmac + : TlsHmac + { + private readonly HMac m_hmac; + + internal BcTlsHmac(HMac hmac) + { + this.m_hmac = hmac; + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + m_hmac.Init(new KeyParameter(key, keyOff, keyLen)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + m_hmac.Init(new KeyParameter(key)); + } +#endif + + public void Update(byte[] input, int inOff, int length) + { + m_hmac.BlockUpdate(input, inOff, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Update(ReadOnlySpan input) + { + m_hmac.BlockUpdate(input); + } +#endif + + public byte[] CalculateMac() + { + byte[] rv = new byte[m_hmac.GetMacSize()]; + m_hmac.DoFinal(rv, 0); + return rv; + } + + public void CalculateMac(byte[] output, int outOff) + { + m_hmac.DoFinal(output, outOff); + } + + public int InternalBlockSize + { + get { return m_hmac.GetUnderlyingDigest().GetByteLength(); } + } + + public int MacLength + { + get { return m_hmac.GetMacSize(); } + } + + public void Reset() + { + m_hmac.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs.meta new file mode 100644 index 00000000..be722f64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bef25266360b4f04db436903e852505d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsHmac.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs new file mode 100644 index 00000000..f760949b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsNonceGenerator + : TlsNonceGenerator + { + private readonly IRandomGenerator m_randomGenerator; + + internal BcTlsNonceGenerator(IRandomGenerator randomGenerator) + { + this.m_randomGenerator = randomGenerator; + } + + public byte[] GenerateNonce(int size) + { + byte[] nonce = new byte[size]; + m_randomGenerator.NextBytes(nonce); + return nonce; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs.meta new file mode 100644 index 00000000..ec01ce06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9bd9a1921160b7d4d982cb9241e1f81f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsNonceGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs new file mode 100644 index 00000000..6d9a3b09 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs @@ -0,0 +1,511 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Implementation class for a single X.509 certificate based on the BC light-weight API. + public class BcTlsRawKeyCertificate + : TlsCertificate + { + protected readonly BcTlsCrypto m_crypto; + protected readonly SubjectPublicKeyInfo m_keyInfo; + + protected DHPublicKeyParameters m_pubKeyDH = null; + protected ECPublicKeyParameters m_pubKeyEC = null; + protected Ed25519PublicKeyParameters m_pubKeyEd25519 = null; + protected Ed448PublicKeyParameters m_pubKeyEd448 = null; + protected RsaKeyParameters m_pubKeyRsa = null; + + /// + public BcTlsRawKeyCertificate(BcTlsCrypto crypto, byte[] encoding) + : this(crypto, SubjectPublicKeyInfo.GetInstance(encoding)) + { + } + + public BcTlsRawKeyCertificate(BcTlsCrypto crypto, SubjectPublicKeyInfo keyInfo) + { + m_crypto = crypto; + m_keyInfo = keyInfo; + } + + public virtual SubjectPublicKeyInfo SubjectPublicKeyInfo => m_keyInfo; + + /// + public virtual TlsEncryptor CreateEncryptor(int tlsCertificateRole) + { + ValidateKeyUsage(KeyUsage.KeyEncipherment); + + switch (tlsCertificateRole) + { + case TlsCertificateRole.RsaEncryption: + { + this.m_pubKeyRsa = GetPubKeyRsa(); + return new BcTlsRsaEncryptor(m_crypto, m_pubKeyRsa); + } + // TODO[gmssl] + //case TlsCertificateRole.Sm2Encryption: + //{ + // this.m_pubKeyEC = GetPubKeyEC(); + // return new BcTlsSM2Encryptor(m_crypto, m_pubKeyEC); + //} + } + + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + + /// + public virtual TlsVerifier CreateVerifier(short signatureAlgorithm) + { + switch (signatureAlgorithm) + { + case SignatureAlgorithm.ed25519: + case SignatureAlgorithm.ed448: + { + int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm); + Tls13Verifier tls13Verifier = CreateVerifier(signatureScheme); + return new LegacyTls13Verifier(signatureScheme, tls13Verifier); + } + } + + ValidateKeyUsage(KeyUsage.DigitalSignature); + + switch (signatureAlgorithm) + { + case SignatureAlgorithm.dsa: + return new BcTlsDsaVerifier(m_crypto, GetPubKeyDss()); + + case SignatureAlgorithm.ecdsa: + return new BcTlsECDsaVerifier(m_crypto, GetPubKeyEC()); + + case SignatureAlgorithm.rsa: + { + ValidateRsa_Pkcs1(); + return new BcTlsRsaVerifier(m_crypto, GetPubKeyRsa()); + } + + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + { + ValidateRsa_Pss_Pss(signatureAlgorithm); + int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm); + return new BcTlsRsaPssVerifier(m_crypto, GetPubKeyRsa(), signatureScheme); + } + + case SignatureAlgorithm.rsa_pss_rsae_sha256: + case SignatureAlgorithm.rsa_pss_rsae_sha384: + case SignatureAlgorithm.rsa_pss_rsae_sha512: + { + ValidateRsa_Pss_Rsae(); + int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm); + return new BcTlsRsaPssVerifier(m_crypto, GetPubKeyRsa(), signatureScheme); + } + + default: + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + } + + /// + public virtual Tls13Verifier CreateVerifier(int signatureScheme) + { + ValidateKeyUsage(KeyUsage.DigitalSignature); + + switch (signatureScheme) + { + case SignatureScheme.ecdsa_brainpoolP256r1tls13_sha256: + case SignatureScheme.ecdsa_brainpoolP384r1tls13_sha384: + case SignatureScheme.ecdsa_brainpoolP512r1tls13_sha512: + case SignatureScheme.ecdsa_secp256r1_sha256: + case SignatureScheme.ecdsa_secp384r1_sha384: + case SignatureScheme.ecdsa_secp521r1_sha512: + case SignatureScheme.ecdsa_sha1: + { + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + ISigner verifier = new DsaDigestSigner(new ECDsaSigner(), digest); + verifier.Init(false, GetPubKeyEC()); + + return new BcTls13Verifier(verifier); + } + + case SignatureScheme.ed25519: + { + Ed25519Signer verifier = new Ed25519Signer(); + verifier.Init(false, GetPubKeyEd25519()); + + return new BcTls13Verifier(verifier); + } + + case SignatureScheme.ed448: + { + Ed448Signer verifier = new Ed448Signer(TlsUtilities.EmptyBytes); + verifier.Init(false, GetPubKeyEd448()); + + return new BcTls13Verifier(verifier); + } + + case SignatureScheme.rsa_pkcs1_sha1: + case SignatureScheme.rsa_pkcs1_sha256: + case SignatureScheme.rsa_pkcs1_sha384: + case SignatureScheme.rsa_pkcs1_sha512: + { + ValidateRsa_Pkcs1(); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + RsaDigestSigner verifier = new RsaDigestSigner(digest, + TlsCryptoUtilities.GetOidForHash(cryptoHashAlgorithm)); + verifier.Init(false, GetPubKeyRsa()); + + return new BcTls13Verifier(verifier); + } + + case SignatureScheme.rsa_pss_pss_sha256: + case SignatureScheme.rsa_pss_pss_sha384: + case SignatureScheme.rsa_pss_pss_sha512: + { + ValidateRsa_Pss_Pss(SignatureScheme.GetSignatureAlgorithm(signatureScheme)); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + PssSigner verifier = new PssSigner(new RsaEngine(), digest, digest.GetDigestSize()); + verifier.Init(false, GetPubKeyRsa()); + + return new BcTls13Verifier(verifier); + } + + case SignatureScheme.rsa_pss_rsae_sha256: + case SignatureScheme.rsa_pss_rsae_sha384: + case SignatureScheme.rsa_pss_rsae_sha512: + { + ValidateRsa_Pss_Rsae(); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + PssSigner verifier = new PssSigner(new RsaEngine(), digest, digest.GetDigestSize()); + verifier.Init(false, GetPubKeyRsa()); + + return new BcTls13Verifier(verifier); + } + + // TODO[RFC 8998] + //case SignatureScheme.sm2sig_sm3: + //{ + // ParametersWithID parametersWithID = new ParametersWithID(GetPubKeyEC(), + // Strings.ToByteArray("TLSv1.3+GM+Cipher+Suite")); + + // SM2Signer verifier = new SM2Signer(); + // verifier.Init(false, parametersWithID); + + // return new BcTls13Verifier(verifier); + //} + + default: + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + } + + /// + public virtual byte[] GetEncoded() + { + return m_keyInfo.GetEncoded(Asn1Encodable.Der); + } + + /// + public virtual byte[] GetExtension(DerObjectIdentifier extensionOid) + { + return null; + } + + public virtual BigInteger SerialNumber => null; + + public virtual string SigAlgOid => null; + + public virtual Asn1Encodable GetSigAlgParams() => null; + + /// + public virtual short GetLegacySignatureAlgorithm() + { + AsymmetricKeyParameter publicKey = GetPublicKey(); + if (publicKey.IsPrivate) + throw new TlsFatalAlert(AlertDescription.internal_error); + + if (!SupportsKeyUsage(KeyUsage.DigitalSignature)) + return -1; + + /* + * RFC 5246 7.4.6. Client Certificate + */ + + /* + * RSA public key; the certificate MUST allow the key to be used for signing with the + * signature scheme and hash algorithm that will be employed in the certificate verify + * message. + */ + if (publicKey is RsaKeyParameters) + return SignatureAlgorithm.rsa; + + /* + * DSA public key; the certificate MUST allow the key to be used for signing with the + * hash algorithm that will be employed in the certificate verify message. + */ + if (publicKey is DsaPublicKeyParameters) + return SignatureAlgorithm.dsa; + + /* + * ECDSA-capable public key; the certificate MUST allow the key to be used for signing + * with the hash algorithm that will be employed in the certificate verify message; the + * public key MUST use a curve and point format supported by the server. + */ + if (publicKey is ECPublicKeyParameters) + { + // TODO Check the curve and point format + return SignatureAlgorithm.ecdsa; + } + + return -1; + } + + /// + public virtual DHPublicKeyParameters GetPubKeyDH() + { + try + { + return (DHPublicKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual DsaPublicKeyParameters GetPubKeyDss() + { + try + { + return (DsaPublicKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual ECPublicKeyParameters GetPubKeyEC() + { + try + { + return (ECPublicKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual Ed25519PublicKeyParameters GetPubKeyEd25519() + { + try + { + return (Ed25519PublicKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual Ed448PublicKeyParameters GetPubKeyEd448() + { + try + { + return (Ed448PublicKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual RsaKeyParameters GetPubKeyRsa() + { + try + { + return (RsaKeyParameters)GetPublicKey(); + } + catch (InvalidCastException e) + { + throw new TlsFatalAlert(AlertDescription.certificate_unknown, e); + } + } + + /// + public virtual bool SupportsSignatureAlgorithm(short signatureAlgorithm) + { + return SupportsSignatureAlgorithm(signatureAlgorithm, KeyUsage.DigitalSignature); + } + + /// + public virtual bool SupportsSignatureAlgorithmCA(short signatureAlgorithm) + { + return SupportsSignatureAlgorithm(signatureAlgorithm, KeyUsage.KeyCertSign); + } + + /// + public virtual TlsCertificate CheckUsageInRole(int tlsCertificateRole) + { + switch (tlsCertificateRole) + { + case TlsCertificateRole.DH: + { + ValidateKeyUsage(KeyUsage.KeyAgreement); + this.m_pubKeyDH = GetPubKeyDH(); + return this; + } + case TlsCertificateRole.ECDH: + { + ValidateKeyUsage(KeyUsage.KeyAgreement); + this.m_pubKeyEC = GetPubKeyEC(); + return this; + } + } + + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + + /// + protected virtual AsymmetricKeyParameter GetPublicKey() + { + try + { + return PublicKeyFactory.CreateKey(m_keyInfo); + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.unsupported_certificate, e); + } + } + + protected virtual bool SupportsKeyUsage(int keyUsageBits) + { + return true; + } + + protected virtual bool SupportsRsa_Pkcs1() + { + AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID; + return RsaUtilities.SupportsPkcs1(pubKeyAlgID); + } + + protected virtual bool SupportsRsa_Pss_Pss(short signatureAlgorithm) + { + AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID; + return RsaUtilities.SupportsPss_Pss(signatureAlgorithm, pubKeyAlgID); + } + + protected virtual bool SupportsRsa_Pss_Rsae() + { + AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID; + return RsaUtilities.SupportsPss_Rsae(pubKeyAlgID); + } + + /// + protected virtual bool SupportsSignatureAlgorithm(short signatureAlgorithm, int keyUsage) + { + if (!SupportsKeyUsage(keyUsage)) + return false; + + AsymmetricKeyParameter publicKey = GetPublicKey(); + + switch (signatureAlgorithm) + { + case SignatureAlgorithm.rsa: + return SupportsRsa_Pkcs1() + && publicKey is RsaKeyParameters; + + case SignatureAlgorithm.dsa: + return publicKey is DsaPublicKeyParameters; + + case SignatureAlgorithm.ecdsa: + case SignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256: + case SignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384: + case SignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512: + return publicKey is ECPublicKeyParameters; + + case SignatureAlgorithm.ed25519: + return publicKey is Ed25519PublicKeyParameters; + + case SignatureAlgorithm.ed448: + return publicKey is Ed448PublicKeyParameters; + + case SignatureAlgorithm.rsa_pss_rsae_sha256: + case SignatureAlgorithm.rsa_pss_rsae_sha384: + case SignatureAlgorithm.rsa_pss_rsae_sha512: + return SupportsRsa_Pss_Rsae() + && publicKey is RsaKeyParameters; + + case SignatureAlgorithm.rsa_pss_pss_sha256: + case SignatureAlgorithm.rsa_pss_pss_sha384: + case SignatureAlgorithm.rsa_pss_pss_sha512: + return SupportsRsa_Pss_Pss(signatureAlgorithm) + && publicKey is RsaKeyParameters; + + default: + return false; + } + } + + /// + public virtual void ValidateKeyUsage(int keyUsageBits) + { + if (!SupportsKeyUsage(keyUsageBits)) + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + + /// + protected virtual void ValidateRsa_Pkcs1() + { + if (!SupportsRsa_Pkcs1()) + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + + /// + protected virtual void ValidateRsa_Pss_Pss(short signatureAlgorithm) + { + if (!SupportsRsa_Pss_Pss(signatureAlgorithm)) + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + + /// + protected virtual void ValidateRsa_Pss_Rsae() + { + if (!SupportsRsa_Pss_Rsae()) + throw new TlsFatalAlert(AlertDescription.certificate_unknown); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs.meta new file mode 100644 index 00000000..726bd844 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f956740c47d73ee42b06809b11ca0fd1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRawKeyCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs new file mode 100644 index 00000000..76cb9a0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsRsaEncryptor + : TlsEncryptor + { + private static RsaKeyParameters CheckPublicKey(RsaKeyParameters pubKeyRsa) + { + if (null == pubKeyRsa || pubKeyRsa.IsPrivate) + throw new ArgumentException("No public RSA key provided", "pubKeyRsa"); + + return pubKeyRsa; + } + + private readonly BcTlsCrypto m_crypto; + private readonly RsaKeyParameters m_pubKeyRsa; + + internal BcTlsRsaEncryptor(BcTlsCrypto crypto, RsaKeyParameters pubKeyRsa) + { + this.m_crypto = crypto; + this.m_pubKeyRsa = CheckPublicKey(pubKeyRsa); + } + + public byte[] Encrypt(byte[] input, int inOff, int length) + { + try + { + Pkcs1Encoding encoding = new Pkcs1Encoding(new RsaBlindedEngine()); + encoding.Init(true, new ParametersWithRandom(m_pubKeyRsa, m_crypto.SecureRandom)); + return encoding.ProcessBlock(input, inOff, length); + } + catch (InvalidCipherTextException e) + { + /* + * This should never happen, only during decryption. + */ + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs.meta new file mode 100644 index 00000000..0618b090 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e2fbf26ff4db16e4ab6d7a66dc1b2734 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaEncryptor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs new file mode 100644 index 00000000..2538e43e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Operator supporting the generation of RSASSA-PSS signatures using the BC light-weight API. + public class BcTlsRsaPssSigner + : BcTlsSigner + { + private readonly int m_signatureScheme; + + public BcTlsRsaPssSigner(BcTlsCrypto crypto, RsaKeyParameters privateKey, int signatureScheme) + : base(crypto, privateKey) + { + if (!SignatureScheme.IsRsaPss(signatureScheme)) + throw new ArgumentException("signatureScheme"); + + this.m_signatureScheme = signatureScheme; + } + + public override byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash) + { + if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + PssSigner signer = PssSigner.CreateRawSigner(new RsaBlindedEngine(), digest, digest, digest.GetDigestSize(), + PssSigner.TrailerImplicit); + signer.Init(true, new ParametersWithRandom(m_privateKey, m_crypto.SecureRandom)); + signer.BlockUpdate(hash, 0, hash.Length); + try + { + return signer.GenerateSignature(); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs.meta new file mode 100644 index 00000000..4dc3c1f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32c0adc0dc01c7048b8ef04bb6a0ab9a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs new file mode 100644 index 00000000..69e62524 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs @@ -0,0 +1,45 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API. + public class BcTlsRsaPssVerifier + : BcTlsVerifier + { + private readonly int m_signatureScheme; + + public BcTlsRsaPssVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey, int signatureScheme) + : base(crypto, publicKey) + { + if (!SignatureScheme.IsRsaPss(signatureScheme)) + throw new ArgumentException("signatureScheme"); + + this.m_signatureScheme = signatureScheme; + } + + public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) + { + SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm; + if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme); + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + + PssSigner verifier = PssSigner.CreateRawSigner(new RsaEngine(), digest, digest, digest.GetDigestSize(), + PssSigner.TrailerImplicit); + verifier.Init(false, m_publicKey); + verifier.BlockUpdate(hash, 0, hash.Length); + return verifier.VerifySignature(digitallySigned.Signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs.meta new file mode 100644 index 00000000..69060ae1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 394d3707553c52046b3e608d23561d65 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaPssVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs new file mode 100644 index 00000000..21293548 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Operator supporting the generation of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API. + /// + public class BcTlsRsaSigner + : BcTlsSigner + { + private readonly RsaKeyParameters m_publicKey; + + public BcTlsRsaSigner(BcTlsCrypto crypto, RsaKeyParameters privateKey, RsaKeyParameters publicKey) + : base(crypto, privateKey) + { + this.m_publicKey = publicKey; + } + + public override byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash) + { + IDigest nullDigest = new NullDigest(); + + ISigner signer; + if (algorithm != null) + { + if (algorithm.Signature != SignatureAlgorithm.rsa) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + /* + * RFC 5246 4.7. In RSA signing, the opaque vector contains the signature generated + * using the RSASSA-PKCS1-v1_5 signature scheme defined in [PKCS1]. + */ + signer = new RsaDigestSigner(nullDigest, TlsUtilities.GetOidForHashAlgorithm(algorithm.Hash)); + } + else + { + /* + * RFC 5246 4.7. Note that earlier versions of TLS used a different RSA signature scheme + * that did not include a DigestInfo encoding. + */ + signer = new GenericSigner(new Pkcs1Encoding(new RsaBlindedEngine()), nullDigest); + } + signer.Init(true, new ParametersWithRandom(m_privateKey, m_crypto.SecureRandom)); + signer.BlockUpdate(hash, 0, hash.Length); + try + { + byte[] signature = signer.GenerateSignature(); + + signer.Init(false, m_publicKey); + signer.BlockUpdate(hash, 0, hash.Length); + + if (signer.VerifySignature(signature)) + { + return signature; + } + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs.meta new file mode 100644 index 00000000..3d9ff3bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 493cafec07827344580a19f8e73a15fb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs new file mode 100644 index 00000000..aea30a5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs @@ -0,0 +1,56 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Encodings; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Operator supporting the verification of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API. + /// + public class BcTlsRsaVerifier + : BcTlsVerifier + { + public BcTlsRsaVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey) + : base(crypto, publicKey) + { + } + + public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) + { + IDigest nullDigest = new NullDigest(); + + SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm; + ISigner signer; + if (algorithm != null) + { + if (algorithm.Signature != SignatureAlgorithm.rsa) + throw new InvalidOperationException("Invalid algorithm: " + algorithm); + + /* + * RFC 5246 4.7. In RSA signing, the opaque vector contains the signature generated + * using the RSASSA-PKCS1-v1_5 signature scheme defined in [PKCS1]. + */ + signer = new RsaDigestSigner(nullDigest, TlsUtilities.GetOidForHashAlgorithm(algorithm.Hash)); + } + else + { + /* + * RFC 5246 4.7. Note that earlier versions of TLS used a different RSA signature scheme + * that did not include a DigestInfo encoding. + */ + signer = new GenericSigner(new Pkcs1Encoding(new RsaBlindedEngine()), nullDigest); + } + signer.Init(false, m_publicKey); + signer.BlockUpdate(hash, 0, hash.Length); + return signer.VerifySignature(digitallySigned.Signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs.meta new file mode 100644 index 00000000..3e9ec365 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 262b99bbd5b956c45a02f2057583f956 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsRsaVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs new file mode 100644 index 00000000..5c17095f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs @@ -0,0 +1,416 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// BC light-weight support class for handling TLS secrets and deriving key material and other secrets + /// from them. + public class BcTlsSecret + : AbstractTlsSecret + { + public static BcTlsSecret Convert(BcTlsCrypto crypto, TlsSecret secret) + { + if (secret is BcTlsSecret) + return (BcTlsSecret)secret; + + if (secret is AbstractTlsSecret) + { + AbstractTlsSecret abstractTlsSecret = (AbstractTlsSecret)secret; + + return crypto.AdoptLocalSecret(CopyData(abstractTlsSecret)); + } + + throw new ArgumentException("unrecognized TlsSecret - cannot copy data: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(secret)); + } + + // SSL3 magic mix constants ("A", "BB", "CCC", ...) + private static readonly byte[] Ssl3Const = GenerateSsl3Constants(); + + private static byte[] GenerateSsl3Constants() + { + int n = 15; + byte[] result = new byte[n * (n + 1) / 2]; + int pos = 0; + for (int i = 0; i < n; ++i) + { + byte b = (byte)('A' + i); + for (int j = 0; j <= i; ++j) + { + result[pos++] = b; + } + } + return result; + } + + protected readonly BcTlsCrypto m_crypto; + + public BcTlsSecret(BcTlsCrypto crypto, byte[] data) + : base(data) + { + this.m_crypto = crypto; + } + + public override TlsSecret DeriveUsingPrf(int prfAlgorithm, string label, byte[] seed, int length) + { + lock (this) + { + CheckAlive(); + + switch (prfAlgorithm) + { + case PrfAlgorithm.tls13_hkdf_sha256: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha256, label, seed, length); + case PrfAlgorithm.tls13_hkdf_sha384: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha384, label, seed, length); + case PrfAlgorithm.tls13_hkdf_sm3: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sm3, label, seed, length); + default: + return m_crypto.AdoptLocalSecret(Prf(prfAlgorithm, label, seed, length)); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override TlsSecret DeriveUsingPrf(int prfAlgorithm, ReadOnlySpan label, ReadOnlySpan seed, + int length) + { + lock (this) + { + CheckAlive(); + + switch (prfAlgorithm) + { + case PrfAlgorithm.tls13_hkdf_sha256: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha256, label, seed, length); + case PrfAlgorithm.tls13_hkdf_sha384: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha384, label, seed, length); + case PrfAlgorithm.tls13_hkdf_sm3: + return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sm3, label, seed, length); + default: + return m_crypto.AdoptLocalSecret(Prf(prfAlgorithm, label, seed, length)); + } + } + } +#endif + + public override TlsSecret HkdfExpand(int cryptoHashAlgorithm, byte[] info, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return HkdfExpand(cryptoHashAlgorithm, info.AsSpan(), length); +#else + lock (this) + { + if (length < 1) + return m_crypto.AdoptLocalSecret(TlsUtilities.EmptyBytes); + + int hashLen = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm); + if (length > (255 * hashLen)) + throw new ArgumentException("must be <= 255 * (output size of 'hashAlgorithm')", "length"); + + CheckAlive(); + + byte[] prk = m_data; + + HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm)); + hmac.Init(new KeyParameter(prk)); + + byte[] okm = new byte[length]; + + byte[] t = new byte[hashLen]; + byte counter = 0x00; + + int pos = 0; + for (;;) + { + hmac.BlockUpdate(info, 0, info.Length); + hmac.Update(++counter); + hmac.DoFinal(t, 0); + + int remaining = length - pos; + if (remaining <= hashLen) + { + Array.Copy(t, 0, okm, pos, remaining); + break; + } + + Array.Copy(t, 0, okm, pos, hashLen); + pos += hashLen; + hmac.BlockUpdate(t, 0, t.Length); + } + + return m_crypto.AdoptLocalSecret(okm); + } +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override TlsSecret HkdfExpand(int cryptoHashAlgorithm, ReadOnlySpan info, int length) + { + lock (this) + { + if (length < 1) + return m_crypto.AdoptLocalSecret(TlsUtilities.EmptyBytes); + + int hashLen = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm); + if (length > (255 * hashLen)) + throw new ArgumentException("must be <= 255 * (output size of 'hashAlgorithm')", "length"); + + CheckAlive(); + + ReadOnlySpan prk = m_data; + + HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm)); + hmac.Init(new KeyParameter(prk)); + + byte[] okm = new byte[length]; + + Span t = hashLen <= 128 + ? stackalloc byte[hashLen] + : new byte[hashLen]; + byte counter = 0x00; + + int pos = 0; + for (;;) + { + hmac.BlockUpdate(info); + hmac.Update(++counter); + hmac.DoFinal(t); + + int remaining = length - pos; + if (remaining <= hashLen) + { + t[..remaining].CopyTo(okm.AsSpan(pos)); + break; + } + + t.CopyTo(okm.AsSpan(pos)); + pos += hashLen; + hmac.BlockUpdate(t); + } + + return m_crypto.AdoptLocalSecret(okm); + } + } +#endif + + public override TlsSecret HkdfExtract(int cryptoHashAlgorithm, TlsSecret ikm) + { + lock (this) + { + CheckAlive(); + + byte[] salt = m_data; + this.m_data = null; + + HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm)); + hmac.Init(new KeyParameter(salt)); + + Convert(m_crypto, ikm).UpdateMac(hmac); + + byte[] prk = new byte[hmac.GetMacSize()]; + hmac.DoFinal(prk, 0); + + return m_crypto.AdoptLocalSecret(prk); + } + } + + protected override AbstractTlsCrypto Crypto + { + get { return m_crypto; } + } + + protected virtual void HmacHash(int cryptoHashAlgorithm, byte[] secret, int secretOff, int secretLen, + byte[] seed, byte[] output) + { + IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); + HMac hmac = new HMac(digest); + hmac.Init(new KeyParameter(secret, secretOff, secretLen)); + + byte[] a = seed; + + int macSize = hmac.GetMacSize(); + + byte[] b1 = new byte[macSize]; + byte[] b2 = new byte[macSize]; + + int pos = 0; + while (pos < output.Length) + { + hmac.BlockUpdate(a, 0, a.Length); + hmac.DoFinal(b1, 0); + a = b1; + hmac.BlockUpdate(a, 0, a.Length); + hmac.BlockUpdate(seed, 0, seed.Length); + hmac.DoFinal(b2, 0); + Array.Copy(b2, 0, output, pos, System.Math.Min(macSize, output.Length - pos)); + pos += macSize; + } + } + + protected virtual byte[] Prf(int prfAlgorithm, string label, byte[] seed, int length) + { + if (PrfAlgorithm.ssl_prf_legacy == prfAlgorithm) + return Prf_Ssl(seed, length); + + byte[] labelSeed = Arrays.Concatenate(Strings.ToByteArray(label), seed); + + if (PrfAlgorithm.tls_prf_legacy == prfAlgorithm) + return Prf_1_0(labelSeed, length); + + return Prf_1_2(prfAlgorithm, labelSeed, length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected virtual byte[] Prf(int prfAlgorithm, ReadOnlySpan label, ReadOnlySpan seed, int length) + { + if (PrfAlgorithm.ssl_prf_legacy == prfAlgorithm) + return Prf_Ssl(seed, length); + + byte[] labelSeed = new byte[label.Length + seed.Length]; + + for (int i = 0; i < label.Length; ++i) + { + labelSeed[i] = (byte)label[i]; + } + + seed.CopyTo(labelSeed.AsSpan(label.Length)); + + if (PrfAlgorithm.tls_prf_legacy == prfAlgorithm) + return Prf_1_0(labelSeed, length); + + return Prf_1_2(prfAlgorithm, labelSeed, length); + } +#endif + + protected virtual byte[] Prf_Ssl(byte[] seed, int length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Prf_Ssl(seed.AsSpan(), length); +#else + IDigest md5 = m_crypto.CreateDigest(CryptoHashAlgorithm.md5); + IDigest sha1 = m_crypto.CreateDigest(CryptoHashAlgorithm.sha1); + + int md5Size = md5.GetDigestSize(); + int sha1Size = sha1.GetDigestSize(); + + byte[] tmp = new byte[System.Math.Max(md5Size, sha1Size)]; + byte[] result = new byte[length]; + + int constLen = 1, constPos = 0, resultPos = 0; + while (resultPos < length) + { + sha1.BlockUpdate(Ssl3Const, constPos, constLen); + constPos += constLen++; + + sha1.BlockUpdate(m_data, 0, m_data.Length); + sha1.BlockUpdate(seed, 0, seed.Length); + sha1.DoFinal(tmp, 0); + + md5.BlockUpdate(m_data, 0, m_data.Length); + md5.BlockUpdate(tmp, 0, sha1Size); + + int remaining = length - resultPos; + if (remaining < md5Size) + { + md5.DoFinal(tmp, 0); + Array.Copy(tmp, 0, result, resultPos, remaining); + resultPos += remaining; + } + else + { + md5.DoFinal(result, resultPos); + resultPos += md5Size; + } + } + + return result; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + protected virtual byte[] Prf_Ssl(ReadOnlySpan seed, int length) + { + IDigest md5 = m_crypto.CreateDigest(CryptoHashAlgorithm.md5); + IDigest sha1 = m_crypto.CreateDigest(CryptoHashAlgorithm.sha1); + + int md5Size = md5.GetDigestSize(); + int sha1Size = sha1.GetDigestSize(); + + Span tmp = stackalloc byte[System.Math.Max(md5Size, sha1Size)]; + byte[] result = new byte[length]; + + int constLen = 1, constPos = 0, resultPos = 0; + while (resultPos < length) + { + sha1.BlockUpdate(Ssl3Const.AsSpan(constPos, constLen)); + constPos += constLen++; + + sha1.BlockUpdate(m_data); + sha1.BlockUpdate(seed); + sha1.DoFinal(tmp); + + md5.BlockUpdate(m_data); + md5.BlockUpdate(tmp[..sha1Size]); + + int remaining = length - resultPos; + if (remaining < md5Size) + { + md5.DoFinal(tmp); + tmp[..remaining].CopyTo(result.AsSpan(resultPos)); + resultPos += remaining; + } + else + { + md5.DoFinal(result.AsSpan(resultPos)); + resultPos += md5Size; + } + } + + return result; + } +#endif + + protected virtual byte[] Prf_1_0(byte[] labelSeed, int length) + { + int s_half = (m_data.Length + 1) / 2; + + byte[] b1 = new byte[length]; + HmacHash(CryptoHashAlgorithm.md5, m_data, 0, s_half, labelSeed, b1); + + byte[] b2 = new byte[length]; + HmacHash(CryptoHashAlgorithm.sha1, m_data, m_data.Length - s_half, s_half, labelSeed, b2); + + for (int i = 0; i < length; i++) + { + b1[i] ^= b2[i]; + } + return b1; + } + + protected virtual byte[] Prf_1_2(int prfAlgorithm, byte[] labelSeed, int length) + { + int cryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(prfAlgorithm); + byte[] result = new byte[length]; + HmacHash(cryptoHashAlgorithm, m_data, 0, m_data.Length, labelSeed, result); + return result; + } + + protected virtual void UpdateMac(IMac mac) + { + lock (this) + { + CheckAlive(); + + mac.BlockUpdate(m_data, 0, m_data.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs.meta new file mode 100644 index 00000000..399e0bb2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 85a721fd49f4902428c3caa39ac83b40 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSecret.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs new file mode 100644 index 00000000..afa79a3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public abstract class BcTlsSigner + : TlsSigner + { + protected readonly BcTlsCrypto m_crypto; + protected readonly AsymmetricKeyParameter m_privateKey; + + protected BcTlsSigner(BcTlsCrypto crypto, AsymmetricKeyParameter privateKey) + { + if (crypto == null) + throw new ArgumentNullException("crypto"); + if (privateKey == null) + throw new ArgumentNullException("privateKey"); + if (!privateKey.IsPrivate) + throw new ArgumentException("must be private", "privateKey"); + + this.m_crypto = crypto; + this.m_privateKey = privateKey; + } + + public virtual byte[] GenerateRawSignature(SignatureAndHashAlgorithm algorithm, byte[] hash) + { + throw new NotSupportedException(); + } + + public virtual TlsStreamSigner GetStreamSigner(SignatureAndHashAlgorithm algorithm) + { + return null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs.meta new file mode 100644 index 00000000..d0cc2ff3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 305b37d61fbd1214a8eea941cb9d1f8e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs new file mode 100644 index 00000000..e1be0126 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsSrp6Client + : TlsSrp6Client + { + private readonly Srp6Client m_srp6Client; + + internal BcTlsSrp6Client(Srp6Client srpClient) + { + this.m_srp6Client = srpClient; + } + + public BigInteger CalculateSecret(BigInteger serverB) + { + try + { + return m_srp6Client.CalculateSecret(serverB); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter, e); + } + } + + public BigInteger GenerateClientCredentials(byte[] srpSalt, byte[] identity, byte[] password) + { + return m_srp6Client.GenerateClientCredentials(srpSalt, identity, password); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs.meta new file mode 100644 index 00000000..8a6c298e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05a4b14ea34033a45b780e27139d8afb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Client.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs new file mode 100644 index 00000000..d3ebe897 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsSrp6Server + : TlsSrp6Server + { + private readonly Srp6Server m_srp6Server; + + internal BcTlsSrp6Server(Srp6Server srp6Server) + { + this.m_srp6Server = srp6Server; + } + + public BigInteger GenerateServerCredentials() + { + return m_srp6Server.GenerateServerCredentials(); + } + + public BigInteger CalculateSecret(BigInteger clientA) + { + try + { + return m_srp6Server.CalculateSecret(clientA); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.illegal_parameter, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs.meta new file mode 100644 index 00000000..edbd4e15 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6bf7dfb7ec324f74285eae7d974ae28e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6Server.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs new file mode 100644 index 00000000..7d594ecd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs @@ -0,0 +1,27 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Agreement.Srp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsSrp6VerifierGenerator + : TlsSrp6VerifierGenerator + { + private readonly Srp6VerifierGenerator m_srp6VerifierGenerator; + + internal BcTlsSrp6VerifierGenerator(Srp6VerifierGenerator srp6VerifierGenerator) + { + this.m_srp6VerifierGenerator = srp6VerifierGenerator; + } + + public BigInteger GenerateVerifier(byte[] salt, byte[] identity, byte[] password) + { + return m_srp6VerifierGenerator.GenerateVerifier(salt, identity, password); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs.meta new file mode 100644 index 00000000..a7601214 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b8f68e434e3a3142977e4da775abc98 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsSrp6VerifierGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs new file mode 100644 index 00000000..3fcdcbe7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsStreamSigner + : TlsStreamSigner + { + private readonly SignerSink m_output; + + internal BcTlsStreamSigner(ISigner signer) + { + this.m_output = new SignerSink(signer); + } + + public Stream Stream + { + get { return m_output; } + } + + public byte[] GetSignature() + { + try + { + return m_output.Signer.GenerateSignature(); + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs.meta new file mode 100644 index 00000000..688f06e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e74faffd2aa527d4a845f6498e758812 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs new file mode 100644 index 00000000..11093110 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcTlsStreamVerifier + : TlsStreamVerifier + { + private readonly SignerSink m_output; + private readonly byte[] m_signature; + + internal BcTlsStreamVerifier(ISigner verifier, byte[] signature) + { + this.m_output = new SignerSink(verifier); + this.m_signature = signature; + } + + public Stream Stream + { + get { return m_output; } + } + + public bool IsVerified() + { + return m_output.Signer.VerifySignature(m_signature); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs.meta new file mode 100644 index 00000000..03db45ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d424ccba0cab9ee46aae3a380e1e802d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsStreamVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs new file mode 100644 index 00000000..dba77747 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs @@ -0,0 +1,40 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public abstract class BcTlsVerifier + : TlsVerifier + { + protected readonly BcTlsCrypto m_crypto; + protected readonly AsymmetricKeyParameter m_publicKey; + + protected BcTlsVerifier(BcTlsCrypto crypto, AsymmetricKeyParameter publicKey) + { + if (crypto == null) + throw new ArgumentNullException("crypto"); + if (publicKey == null) + throw new ArgumentNullException("publicKey"); + if (publicKey.IsPrivate) + throw new ArgumentException("must be public", "publicKey"); + + this.m_crypto = crypto; + this.m_publicKey = publicKey; + } + + public virtual TlsStreamVerifier GetStreamVerifier(DigitallySigned digitallySigned) + { + return null; + } + + public virtual bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) + { + throw new NotSupportedException(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs.meta new file mode 100644 index 00000000..22969cf9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 56e0a640f551a734ca82598ca760c05d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcTlsVerifier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs new file mode 100644 index 00000000..049ca1d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs @@ -0,0 +1,52 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + internal sealed class BcVerifyingStreamSigner + : TlsStreamSigner + { + private readonly ISigner m_signer; + private readonly ISigner m_verifier; + private readonly TeeOutputStream m_output; + + internal BcVerifyingStreamSigner(ISigner signer, ISigner verifier) + { + Stream outputSigner = new SignerSink(signer); + Stream outputVerifier = new SignerSink(verifier); + + this.m_signer = signer; + this.m_verifier = verifier; + this.m_output = new TeeOutputStream(outputSigner, outputVerifier); + } + + public Stream Stream + { + get { return m_output; } + } + + public byte[] GetSignature() + { + try + { + byte[] signature = m_signer.GenerateSignature(); + if (m_verifier.VerifySignature(signature)) + return signature; + } + catch (CryptoException e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs.meta new file mode 100644 index 00000000..c41fbfb6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: de67313ac565c424ca92712d06026c38 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcVerifyingStreamSigner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs new file mode 100644 index 00000000..8d8bd92f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Support class for X25519 using the BC light-weight library. + public class BcX25519 + : TlsAgreement + { + protected readonly BcTlsCrypto m_crypto; + protected readonly byte[] m_privateKey = new byte[X25519.ScalarSize]; + protected readonly byte[] m_peerPublicKey = new byte[X25519.PointSize]; + + public BcX25519(BcTlsCrypto crypto) + { + this.m_crypto = crypto; + } + + public virtual byte[] GenerateEphemeral() + { + m_crypto.SecureRandom.NextBytes(m_privateKey); + + byte[] publicKey = new byte[X25519.PointSize]; + X25519.ScalarMultBase(m_privateKey, 0, publicKey, 0); + return publicKey; + } + + public virtual void ReceivePeerValue(byte[] peerValue) + { + if (peerValue == null || peerValue.Length != X25519.PointSize) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + Array.Copy(peerValue, 0, m_peerPublicKey, 0, X25519.PointSize); + } + + public virtual TlsSecret CalculateSecret() + { + try + { + byte[] secret = new byte[X25519.PointSize]; + if (!X25519.CalculateAgreement(m_privateKey, 0, m_peerPublicKey, 0, secret, 0)) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + return m_crypto.AdoptLocalSecret(secret); + } + finally + { + Array.Clear(m_privateKey, 0, m_privateKey.Length); + Array.Clear(m_peerPublicKey, 0, m_peerPublicKey.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs.meta new file mode 100644 index 00000000..862ae47f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bd6451fbd7aba3d4893ed53b2bfbbf65 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs new file mode 100644 index 00000000..38cc322a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public class BcX25519Domain + : TlsECDomain + { + protected readonly BcTlsCrypto m_crypto; + + public BcX25519Domain(BcTlsCrypto crypto) + { + this.m_crypto = crypto; + } + + public virtual TlsAgreement CreateECDH() + { + return new BcX25519(m_crypto); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs.meta new file mode 100644 index 00000000..3f010c29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 056ee7f6926a7dc479bfb4209e64cea9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX25519Domain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs new file mode 100644 index 00000000..61187935 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + /// Support class for X448 using the BC light-weight library. + public class BcX448 + : TlsAgreement + { + protected readonly BcTlsCrypto m_crypto; + protected readonly byte[] m_privateKey = new byte[X448.ScalarSize]; + protected readonly byte[] m_peerPublicKey = new byte[X448.PointSize]; + + public BcX448(BcTlsCrypto crypto) + { + this.m_crypto = crypto; + } + + public virtual byte[] GenerateEphemeral() + { + m_crypto.SecureRandom.NextBytes(m_privateKey); + + byte[] publicKey = new byte[X448.PointSize]; + X448.ScalarMultBase(m_privateKey, 0, publicKey, 0); + return publicKey; + } + + public virtual void ReceivePeerValue(byte[] peerValue) + { + if (peerValue == null || peerValue.Length != X448.PointSize) + throw new TlsFatalAlert(AlertDescription.illegal_parameter); + + Array.Copy(peerValue, 0, m_peerPublicKey, 0, X448.PointSize); + } + + public virtual TlsSecret CalculateSecret() + { + try + { + byte[] secret = new byte[X448.PointSize]; + if (!X448.CalculateAgreement(m_privateKey, 0, m_peerPublicKey, 0, secret, 0)) + throw new TlsFatalAlert(AlertDescription.handshake_failure); + + return m_crypto.AdoptLocalSecret(secret); + } + finally + { + Array.Clear(m_privateKey, 0, m_privateKey.Length); + Array.Clear(m_peerPublicKey, 0, m_peerPublicKey.Length); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs.meta new file mode 100644 index 00000000..fd819dc5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 53ebfdfdf1d0c9d45a98c18b97154411 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs new file mode 100644 index 00000000..7303d390 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs @@ -0,0 +1,24 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC +{ + public class BcX448Domain + : TlsECDomain + { + protected readonly BcTlsCrypto m_crypto; + + public BcX448Domain(BcTlsCrypto crypto) + { + this.m_crypto = crypto; + } + + public virtual TlsAgreement CreateECDH() + { + return new BcX448(m_crypto); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs.meta new file mode 100644 index 00000000..b07a7b14 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c2096d96b2625a8479fd8090c2114e21 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tls/crypto/impl/bc/BcX448Domain.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp.meta new file mode 100644 index 00000000..48651010 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7ab95e51debc51f40a393c3a8065365e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs new file mode 100644 index 00000000..62488957 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + public class GenTimeAccuracy + { + private Accuracy accuracy; + + public GenTimeAccuracy( + Accuracy accuracy) + { + this.accuracy = accuracy; + } + + public int Seconds { get { return GetTimeComponent(accuracy.Seconds); } } + + public int Millis { get { return GetTimeComponent(accuracy.Millis); } } + + public int Micros { get { return GetTimeComponent(accuracy.Micros); } } + + private int GetTimeComponent( + DerInteger time) + { + return time == null ? 0 : time.IntValueExact; + } + + public override string ToString() + { + return Seconds + "." + Millis.ToString("000") + Micros.ToString("000"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs.meta new file mode 100644 index 00000000..6f968c1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a67a2ad2d48b5d84fb324820fc217466 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/GenTimeAccuracy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs new file mode 100644 index 00000000..7a340a9b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Recognised hash algorithms for the time stamp protocol. + */ + public static class TspAlgorithms + { + public static readonly string MD5 = PkcsObjectIdentifiers.MD5.Id; + + public static readonly string Sha1 = OiwObjectIdentifiers.IdSha1.Id; + + public static readonly string Sha224 = NistObjectIdentifiers.IdSha224.Id; + public static readonly string Sha256 = NistObjectIdentifiers.IdSha256.Id; + public static readonly string Sha384 = NistObjectIdentifiers.IdSha384.Id; + public static readonly string Sha512 = NistObjectIdentifiers.IdSha512.Id; + + public static readonly string RipeMD128 = TeleTrusTObjectIdentifiers.RipeMD128.Id; + public static readonly string RipeMD160 = TeleTrusTObjectIdentifiers.RipeMD160.Id; + public static readonly string RipeMD256 = TeleTrusTObjectIdentifiers.RipeMD256.Id; + + public static readonly string Gost3411 = CryptoProObjectIdentifiers.GostR3411.Id; + public static readonly string Gost3411_2012_256 = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Id; + public static readonly string Gost3411_2012_512 = RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Id; + + public static readonly string SM3 = GMObjectIdentifiers.sm3.Id; + + public static readonly IList Allowed; + + static TspAlgorithms() + { + Allowed = CollectionUtilities.ReadOnly(new List() + { + Gost3411, Gost3411_2012_256, Gost3411_2012_512, MD5, RipeMD128, RipeMD160, RipeMD256, Sha1, Sha224, + Sha256, Sha384, Sha512, SM3 + }); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs.meta new file mode 100644 index 00000000..7a9cdb98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ede17539eeedd6249aa7258bb2268dee +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPAlgorithms.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs new file mode 100644 index 00000000..f35b2455 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + [Serializable] + public class TspException + : Exception + { + public TspException() + : base() + { + } + + public TspException(string message) + : base(message) + { + } + + public TspException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected TspException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs.meta new file mode 100644 index 00000000..c18b4625 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 75166084ac1227f42b50229b5aa6f674 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs new file mode 100644 index 00000000..74af48d0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs @@ -0,0 +1,206 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.GM; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + public class TspUtil + { + private static readonly Dictionary DigestLengths = new Dictionary(); + private static readonly Dictionary DigestNames = new Dictionary(); + + static TspUtil() + { + DigestLengths.Add(PkcsObjectIdentifiers.MD5.Id, 16); + DigestLengths.Add(OiwObjectIdentifiers.IdSha1.Id, 20); + DigestLengths.Add(NistObjectIdentifiers.IdSha224.Id, 28); + DigestLengths.Add(NistObjectIdentifiers.IdSha256.Id, 32); + DigestLengths.Add(NistObjectIdentifiers.IdSha384.Id, 48); + DigestLengths.Add(NistObjectIdentifiers.IdSha512.Id, 64); + DigestLengths.Add(TeleTrusTObjectIdentifiers.RipeMD128.Id, 16); + DigestLengths.Add(TeleTrusTObjectIdentifiers.RipeMD160.Id, 20); + DigestLengths.Add(TeleTrusTObjectIdentifiers.RipeMD256.Id, 32); + DigestLengths.Add(CryptoProObjectIdentifiers.GostR3411.Id, 32); + DigestLengths.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Id, 32); + DigestLengths.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Id, 64); + DigestLengths.Add(GMObjectIdentifiers.sm3.Id, 32); + + DigestNames.Add(PkcsObjectIdentifiers.MD5.Id, "MD5"); + DigestNames.Add(OiwObjectIdentifiers.IdSha1.Id, "SHA1"); + DigestNames.Add(NistObjectIdentifiers.IdSha224.Id, "SHA224"); + DigestNames.Add(NistObjectIdentifiers.IdSha256.Id, "SHA256"); + DigestNames.Add(NistObjectIdentifiers.IdSha384.Id, "SHA384"); + DigestNames.Add(NistObjectIdentifiers.IdSha512.Id, "SHA512"); + DigestNames.Add(PkcsObjectIdentifiers.MD5WithRsaEncryption.Id, "MD5"); + DigestNames.Add(PkcsObjectIdentifiers.Sha1WithRsaEncryption.Id, "SHA1"); + DigestNames.Add(PkcsObjectIdentifiers.Sha224WithRsaEncryption.Id, "SHA224"); + DigestNames.Add(PkcsObjectIdentifiers.Sha256WithRsaEncryption.Id, "SHA256"); + DigestNames.Add(PkcsObjectIdentifiers.Sha384WithRsaEncryption.Id, "SHA384"); + DigestNames.Add(PkcsObjectIdentifiers.Sha512WithRsaEncryption.Id, "SHA512"); + DigestNames.Add(TeleTrusTObjectIdentifiers.RipeMD128.Id, "RIPEMD128"); + DigestNames.Add(TeleTrusTObjectIdentifiers.RipeMD160.Id, "RIPEMD160"); + DigestNames.Add(TeleTrusTObjectIdentifiers.RipeMD256.Id, "RIPEMD256"); + DigestNames.Add(CryptoProObjectIdentifiers.GostR3411.Id, "GOST3411"); + DigestNames.Add(OiwObjectIdentifiers.DsaWithSha1.Id, "SHA1"); + DigestNames.Add(OiwObjectIdentifiers.Sha1WithRsa.Id, "SHA1"); + DigestNames.Add(OiwObjectIdentifiers.MD5WithRsa.Id, "MD5"); + DigestNames.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_256.Id, "GOST3411-2012-256"); + DigestNames.Add(RosstandartObjectIdentifiers.id_tc26_gost_3411_12_512.Id, "GOST3411-2012-512"); + DigestNames.Add(GMObjectIdentifiers.sm3.Id, "SM3"); + } + + + /** + * Fetches the signature time-stamp attributes from a SignerInformation object. + * Checks that the MessageImprint for each time-stamp matches the signature field. + * (see RFC 3161 Appendix A). + * + * @param signerInfo a SignerInformation to search for time-stamps + * @return a collection of TimeStampToken objects + * @throws TSPValidationException + */ + public static IList GetSignatureTimestamps( + SignerInformation signerInfo) + { + var timestamps = new List(); + + Asn1.Cms.AttributeTable unsignedAttrs = signerInfo.UnsignedAttributes; + if (unsignedAttrs != null) + { + foreach (Asn1.Cms.Attribute tsAttr in unsignedAttrs.GetAll( + PkcsObjectIdentifiers.IdAASignatureTimeStampToken)) + { + foreach (Asn1Encodable asn1 in tsAttr.AttrValues) + { + try + { + Asn1.Cms.ContentInfo contentInfo = Asn1.Cms.ContentInfo.GetInstance( + asn1.ToAsn1Object()); + TimeStampToken timeStampToken = new TimeStampToken(contentInfo); + TimeStampTokenInfo tstInfo = timeStampToken.TimeStampInfo; + + byte[] expectedDigest = DigestUtilities.CalculateDigest( + GetDigestAlgName(tstInfo.MessageImprintAlgOid), + signerInfo.GetSignature()); + + if (!Arrays.ConstantTimeAreEqual(expectedDigest, tstInfo.GetMessageImprintDigest())) + throw new TspValidationException("Incorrect digest in message imprint"); + + timestamps.Add(timeStampToken); + } + catch (SecurityUtilityException) + { + throw new TspValidationException("Unknown hash algorithm specified in timestamp"); + } + catch (Exception) + { + throw new TspValidationException("Timestamp could not be parsed"); + } + } + } + } + + return timestamps; + } + + /** + * Validate the passed in certificate as being of the correct type to be used + * for time stamping. To be valid it must have an ExtendedKeyUsage extension + * which has a key purpose identifier of id-kp-timeStamping. + * + * @param cert the certificate of interest. + * @throws TspValidationException if the certicate fails on one of the check points. + */ + public static void ValidateCertificate( + X509Certificate cert) + { + if (cert.Version != 3) + throw new ArgumentException("Certificate must have an ExtendedKeyUsage extension."); + + Asn1OctetString ext = cert.GetExtensionValue(X509Extensions.ExtendedKeyUsage); + if (ext == null) + throw new TspValidationException("Certificate must have an ExtendedKeyUsage extension."); + + if (!cert.GetCriticalExtensionOids().Contains(X509Extensions.ExtendedKeyUsage.Id)) + throw new TspValidationException("Certificate must have an ExtendedKeyUsage extension marked as critical."); + + try + { + ExtendedKeyUsage extKey = ExtendedKeyUsage.GetInstance( + Asn1Object.FromByteArray(ext.GetOctets())); + + if (!extKey.HasKeyPurposeId(KeyPurposeID.id_kp_timeStamping) || extKey.Count != 1) + throw new TspValidationException("ExtendedKeyUsage not solely time stamping."); + } + catch (IOException) + { + throw new TspValidationException("cannot process ExtendedKeyUsage extension"); + } + } + + /// + /// Return the digest algorithm using one of the standard JCA string + /// representations rather than the algorithm identifier (if possible). + /// + internal static string GetDigestAlgName(string digestAlgOid) + { + return CollectionUtilities.GetValueOrKey(DigestNames, digestAlgOid); + } + + internal static int GetDigestLength(string digestAlgOid) + { + if (!DigestLengths.TryGetValue(digestAlgOid, out int length)) + throw new TspException("digest algorithm cannot be found."); + + return length; + } + + internal static IDigest CreateDigestInstance(string digestAlgOID) + { + string digestName = GetDigestAlgName(digestAlgOID); + + return DigestUtilities.GetDigest(digestName); + } + + internal static ISet GetCriticalExtensionOids(X509Extensions extensions) + { + return extensions == null + ? new HashSet() + : new HashSet(extensions.GetCriticalExtensionOids()); + } + + internal static ISet GetNonCriticalExtensionOids(X509Extensions extensions) + { + return extensions == null + ? new HashSet() + : new HashSet(extensions.GetNonCriticalExtensionOids()); + } + + internal static IList GetExtensionOids(X509Extensions extensions) + { + return extensions == null + ? new List() + : new List(extensions.GetExtensionOids()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs.meta new file mode 100644 index 00000000..de5d7ca3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b425ef0ad51ea8447a6758b9176992bd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs new file mode 100644 index 00000000..1a0b5d81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Exception thrown if a TSP request or response fails to validate. + *

    + * If a failure code is associated with the exception it can be retrieved using + * the getFailureCode() method.

    + */ + [Serializable] + public class TspValidationException + : TspException + { + protected readonly int m_failureCode; + + public TspValidationException(string message) + : this(message, -1) + { + } + + public TspValidationException(string message, int failureCode) + : base(message) + { + m_failureCode = failureCode; + } + + protected TspValidationException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + m_failureCode = info.GetInt32("failureCode"); + } + + public override void GetObjectData(SerializationInfo info, StreamingContext context) + { + base.GetObjectData(info, context); + info.AddValue("failureCode", m_failureCode); + } + + /// The failure code associated with this exception, if one is set. + public int FailureCode + { + get { return m_failureCode; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs.meta new file mode 100644 index 00000000..eee6c227 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e59f5dd6ae60d7646934bcfeec540b67 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TSPValidationException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs new file mode 100644 index 00000000..efa0dd1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs @@ -0,0 +1,185 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Base class for an RFC 3161 Time Stamp Request. + */ + public class TimeStampRequest + : X509ExtensionBase + { + private TimeStampReq req; + private X509Extensions extensions; + + public TimeStampRequest( + TimeStampReq req) + { + this.req = req; + this.extensions = req.Extensions; + } + + /** + * Create a TimeStampRequest from the past in byte array. + * + * @param req byte array containing the request. + * @throws IOException if the request is malformed. + */ + public TimeStampRequest( + byte[] req) + : this(new Asn1InputStream(req)) + { + } + + /** + * Create a TimeStampRequest from the past in input stream. + * + * @param in input stream containing the request. + * @throws IOException if the request is malformed. + */ + public TimeStampRequest( + Stream input) + : this(new Asn1InputStream(input)) + { + } + + private TimeStampRequest( + Asn1InputStream str) + { + try + { + this.req = TimeStampReq.GetInstance(str.ReadObject()); + } + catch (InvalidCastException e) + { + throw new IOException("malformed request: " + e); + } + catch (ArgumentException e) + { + throw new IOException("malformed request: " + e); + } + } + + public int Version + { + get { return req.Version.IntValueExact; } + } + + public string MessageImprintAlgOid + { + get { return req.MessageImprint.HashAlgorithm.Algorithm.Id; } + } + + public byte[] GetMessageImprintDigest() + { + return req.MessageImprint.GetHashedMessage(); + } + + public string ReqPolicy + { + get + { + return req.ReqPolicy == null + ? null + : req.ReqPolicy.Id; + } + } + + public BigInteger Nonce + { + get + { + return req.Nonce == null + ? null + : req.Nonce.Value; + } + } + + public bool CertReq + { + get + { + return req.CertReq == null + ? false + : req.CertReq.IsTrue; + } + } + + /** + * Validate the timestamp request, checking the digest to see if it is of an + * accepted type and whether it is of the correct length for the algorithm specified. + * + * @param algorithms a set of string OIDS giving accepted algorithms. + * @param policies if non-null a set of policies we are willing to sign under. + * @param extensions if non-null a set of extensions we are willing to accept. + * @throws TspException if the request is invalid, or processing fails. + */ + public void Validate(IList algorithms, IList policies, IList extensions) + { + if (!algorithms.Contains(this.MessageImprintAlgOid)) + throw new TspValidationException("request contains unknown algorithm", PkiFailureInfo.BadAlg); + + if (policies != null && this.ReqPolicy != null && !policies.Contains(this.ReqPolicy)) + throw new TspValidationException("request contains unknown policy", PkiFailureInfo.UnacceptedPolicy); + + if (this.Extensions != null && extensions != null) + { + foreach (DerObjectIdentifier oid in this.Extensions.ExtensionOids) + { + if (!extensions.Contains(oid.Id)) + throw new TspValidationException("request contains unknown extension", PkiFailureInfo.UnacceptedExtension); + } + } + + int digestLength = TspUtil.GetDigestLength(this.MessageImprintAlgOid); + + if (digestLength != this.GetMessageImprintDigest().Length) + throw new TspValidationException("imprint digest the wrong length", PkiFailureInfo.BadDataFormat); + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return req.GetEncoded(); + } + + internal X509Extensions Extensions + { + get { return req.Extensions; } + } + + public virtual bool HasExtensions + { + get { return extensions != null; } + } + + public virtual X509Extension GetExtension(DerObjectIdentifier oid) + { + return extensions == null ? null : extensions.GetExtension(oid); + } + + public virtual IList GetExtensionOids() + { + return TspUtil.GetExtensionOids(extensions); + } + + protected override X509Extensions GetX509Extensions() + { + return Extensions; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs.meta new file mode 100644 index 00000000..d9a3f3e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f9e31c19edd43f479fb6c60384f39f4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs new file mode 100644 index 00000000..c24dcd70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Generator for RFC 3161 Time Stamp Request objects. + */ + public class TimeStampRequestGenerator + { + private DerObjectIdentifier reqPolicy; + + private DerBoolean certReq; + + private Dictionary m_extensions = + new Dictionary(); + private List m_ordering = new List(); + + public void SetReqPolicy(string reqPolicy) + { + this.reqPolicy = new DerObjectIdentifier(reqPolicy); + } + + public void SetCertReq(bool certReq) + { + this.certReq = DerBoolean.GetInstance(certReq); + } + + /** + * add a given extension field for the standard extensions tag (tag 3) + * @throws IOException + */ + public virtual void AddExtension(DerObjectIdentifier oid, bool critical, Asn1Encodable extValue) + { + this.AddExtension(oid, critical, extValue.GetEncoded()); + } + + /** + * add a given extension field for the standard extensions tag + * The value parameter becomes the contents of the octet string associated + * with the extension. + */ + public virtual void AddExtension(DerObjectIdentifier oid, bool critical, byte[] extValue) + { + m_extensions.Add(oid, new X509Extension(critical, new DerOctetString(extValue))); + m_ordering.Add(oid); + } + + public TimeStampRequest Generate(string digestAlgorithm, byte[] digest) + { + return Generate(digestAlgorithm, digest, null); + } + + public TimeStampRequest Generate(string digestAlgorithmOid, byte[] digest, BigInteger nonce) + { + if (digestAlgorithmOid == null) + throw new ArgumentException("No digest algorithm specified"); + + DerObjectIdentifier digestAlgOid = new DerObjectIdentifier(digestAlgorithmOid); + + AlgorithmIdentifier algID = new AlgorithmIdentifier(digestAlgOid, DerNull.Instance); + MessageImprint messageImprint = new MessageImprint(algID, digest); + + X509Extensions ext = null; + + if (m_ordering.Count > 0) + { + ext = new X509Extensions(m_ordering, m_extensions); + } + + DerInteger derNonce = nonce == null ? null : new DerInteger(nonce); + + return new TimeStampRequest( + new TimeStampReq(messageImprint, reqPolicy, derNonce, certReq, ext)); + } + + public virtual TimeStampRequest Generate(DerObjectIdentifier digestAlgorithm, byte[] digest) + { + return Generate(digestAlgorithm.Id, digest); + } + + public virtual TimeStampRequest Generate(DerObjectIdentifier digestAlgorithm, byte[] digest, BigInteger nonce) + { + return Generate(digestAlgorithm.Id, digest, nonce); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs.meta new file mode 100644 index 00000000..b892b0bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c6cfd962291124340a70ee4d5e1c9977 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampRequestGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs new file mode 100644 index 00000000..0bcd787a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs @@ -0,0 +1,188 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Base class for an RFC 3161 Time Stamp Response object. + */ + public class TimeStampResponse + { + private TimeStampResp resp; + private TimeStampToken timeStampToken; + + public TimeStampResponse( + TimeStampResp resp) + { + this.resp = resp; + + if (resp.TimeStampToken != null) + { + timeStampToken = new TimeStampToken(resp.TimeStampToken); + } + } + + /** + * Create a TimeStampResponse from a byte array containing an ASN.1 encoding. + * + * @param resp the byte array containing the encoded response. + * @throws TspException if the response is malformed. + * @throws IOException if the byte array doesn't represent an ASN.1 encoding. + */ + public TimeStampResponse( + byte[] resp) + : this(readTimeStampResp(new Asn1InputStream(resp))) + { + } + + /** + * Create a TimeStampResponse from an input stream containing an ASN.1 encoding. + * + * @param input the input stream containing the encoded response. + * @throws TspException if the response is malformed. + * @throws IOException if the stream doesn't represent an ASN.1 encoding. + */ + public TimeStampResponse( + Stream input) + : this(readTimeStampResp(new Asn1InputStream(input))) + { + } + + private static TimeStampResp readTimeStampResp( + Asn1InputStream input) + { + try + { + return TimeStampResp.GetInstance(input.ReadObject()); + } + catch (ArgumentException e) + { + throw new TspException("malformed timestamp response: " + e, e); + } + catch (InvalidCastException e) + { + throw new TspException("malformed timestamp response: " + e, e); + } + } + + public int Status + { + get { return resp.Status.Status.IntValue; } + } + + public string GetStatusString() + { + if (resp.Status.StatusString == null) + { + return null; + } + + StringBuilder statusStringBuf = new StringBuilder(); + PkiFreeText text = resp.Status.StatusString; + for (int i = 0; i != text.Count; i++) + { + statusStringBuf.Append(text[i].GetString()); + } + + return statusStringBuf.ToString(); + } + + public PkiFailureInfo GetFailInfo() + { + if (resp.Status.FailInfo == null) + { + return null; + } + + return new PkiFailureInfo(resp.Status.FailInfo); + } + + public TimeStampToken TimeStampToken + { + get { return timeStampToken; } + } + + /** + * Check this response against to see if it a well formed response for + * the passed in request. Validation will include checking the time stamp + * token if the response status is GRANTED or GRANTED_WITH_MODS. + * + * @param request the request to be checked against + * @throws TspException if the request can not match this response. + */ + public void Validate( + TimeStampRequest request) + { + TimeStampToken tok = this.TimeStampToken; + + if (tok != null) + { + TimeStampTokenInfo tstInfo = tok.TimeStampInfo; + + if (request.Nonce != null && !request.Nonce.Equals(tstInfo.Nonce)) + { + throw new TspValidationException("response contains wrong nonce value."); + } + + if (this.Status != (int) PkiStatus.Granted && this.Status != (int) PkiStatus.GrantedWithMods) + { + throw new TspValidationException("time stamp token found in failed request."); + } + + if (!Arrays.ConstantTimeAreEqual(request.GetMessageImprintDigest(), tstInfo.GetMessageImprintDigest())) + { + throw new TspValidationException("response for different message imprint digest."); + } + + if (!tstInfo.MessageImprintAlgOid.Equals(request.MessageImprintAlgOid)) + { + throw new TspValidationException("response for different message imprint algorithm."); + } + + Asn1.Cms.Attribute scV1 = tok.SignedAttributes[PkcsObjectIdentifiers.IdAASigningCertificate]; + Asn1.Cms.Attribute scV2 = tok.SignedAttributes[PkcsObjectIdentifiers.IdAASigningCertificateV2]; + + if (scV1 == null && scV2 == null) + { + throw new TspValidationException("no signing certificate attribute present."); + } + + if (scV1 != null && scV2 != null) + { + /* + * RFC 5035 5.4. If both attributes exist in a single message, + * they are independently evaluated. + */ + } + + if (request.ReqPolicy != null && !request.ReqPolicy.Equals(tstInfo.Policy)) + { + throw new TspValidationException("TSA policy wrong for request."); + } + } + else if (this.Status == (int) PkiStatus.Granted || this.Status == (int) PkiStatus.GrantedWithMods) + { + throw new TspValidationException("no time stamp token found and one expected."); + } + } + + /** + * return the ASN.1 encoded representation of this object. + */ + public byte[] GetEncoded() + { + return resp.GetEncoded(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs.meta new file mode 100644 index 00000000..466fac5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0804f9ba1b02f6d48932f1ba6cac7a4f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs new file mode 100644 index 00000000..f5375fba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs @@ -0,0 +1,259 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + /** + * Generator for RFC 3161 Time Stamp Responses. + */ + public class TimeStampResponseGenerator + { + private PkiStatus status; + + private Asn1EncodableVector statusStrings; + + private int failInfo; + private TimeStampTokenGenerator tokenGenerator; + private IList acceptedAlgorithms; + private IList acceptedPolicies; + private IList acceptedExtensions; + + public TimeStampResponseGenerator( + TimeStampTokenGenerator tokenGenerator, + IList acceptedAlgorithms) + : this(tokenGenerator, acceptedAlgorithms, null, null) + { + } + + public TimeStampResponseGenerator( + TimeStampTokenGenerator tokenGenerator, + IList acceptedAlgorithms, + IList acceptedPolicy) + : this(tokenGenerator, acceptedAlgorithms, acceptedPolicy, null) + { + } + + public TimeStampResponseGenerator( + TimeStampTokenGenerator tokenGenerator, + IList acceptedAlgorithms, + IList acceptedPolicies, + IList acceptedExtensions) + { + this.tokenGenerator = tokenGenerator; + this.acceptedAlgorithms = acceptedAlgorithms; + this.acceptedPolicies = acceptedPolicies; + this.acceptedExtensions = acceptedExtensions; + + statusStrings = new Asn1EncodableVector(); + } + + private void AddStatusString(string statusString) + { + statusStrings.Add(new DerUtf8String(statusString)); + } + + private void SetFailInfoField(int field) + { + failInfo |= field; + } + + private PkiStatusInfo GetPkiStatusInfo() + { + Asn1EncodableVector v = new Asn1EncodableVector( + new DerInteger((int)status)); + + if (statusStrings.Count > 0) + { + v.Add(new PkiFreeText(new DerSequence(statusStrings))); + } + + if (failInfo != 0) + { + v.Add(new FailInfo(failInfo)); + } + + return new PkiStatusInfo(new DerSequence(v)); + } + + /** + * Return an appropriate TimeStampResponse. + *

    + * If genTime is null a timeNotAvailable error response will be returned. + * + * @param request the request this response is for. + * @param serialNumber serial number for the response token. + * @param genTime generation time for the response token. + * @param provider provider to use for signature calculation. + * @return + * @throws NoSuchAlgorithmException + * @throws NoSuchProviderException + * @throws TSPException + *

    + */ + public TimeStampResponse Generate(TimeStampRequest request, BigInteger serialNumber, DateTime? genTime) + { + TimeStampResp resp; + + try + { + if (genTime == null) + throw new TspValidationException("The time source is not available.", + PkiFailureInfo.TimeNotAvailable); + + request.Validate(acceptedAlgorithms, acceptedPolicies, acceptedExtensions); + + this.status = PkiStatus.Granted; + this.AddStatusString("Operation Okay"); + + PkiStatusInfo pkiStatusInfo = GetPkiStatusInfo(); + + ContentInfo tstTokenContentInfo; + try + { + TimeStampToken token = tokenGenerator.Generate(request, serialNumber, genTime.Value); + byte[] encoded = token.ToCmsSignedData().GetEncoded(); + + tstTokenContentInfo = ContentInfo.GetInstance(Asn1Object.FromByteArray(encoded)); + } + catch (IOException e) + { + throw new TspException("Timestamp token received cannot be converted to ContentInfo", e); + } + + resp = new TimeStampResp(pkiStatusInfo, tstTokenContentInfo); + } + catch (TspValidationException e) + { + status = PkiStatus.Rejection; + + this.SetFailInfoField(e.FailureCode); + this.AddStatusString(e.Message); + + PkiStatusInfo pkiStatusInfo = GetPkiStatusInfo(); + + resp = new TimeStampResp(pkiStatusInfo, null); + } + + try + { + return new TimeStampResponse(resp); + } + catch (IOException e) + { + throw new TspException("created badly formatted response!", e); + } + } + + public TimeStampResponse GenerateGrantedResponse(TimeStampRequest request, BigInteger serialNumber, + DateTime? genTime, string statusString, X509Extensions additionalExtensions) + { + TimeStampResp resp; + + try + { + if (genTime == null) + throw new TspValidationException("The time source is not available.", + PkiFailureInfo.TimeNotAvailable); + + request.Validate(acceptedAlgorithms, acceptedPolicies, acceptedExtensions); + + this.status = PkiStatus.Granted; + this.AddStatusString(statusString); + + PkiStatusInfo pkiStatusInfo = GetPkiStatusInfo(); + + ContentInfo tstTokenContentInfo; + try + { + TimeStampToken token = tokenGenerator.Generate(request, serialNumber, genTime.Value,additionalExtensions); + byte[] encoded = token.ToCmsSignedData().GetEncoded(); + + tstTokenContentInfo = ContentInfo.GetInstance(Asn1Object.FromByteArray(encoded)); + } + catch (IOException e) + { + throw new TspException("Timestamp token received cannot be converted to ContentInfo", e); + } + + resp = new TimeStampResp(pkiStatusInfo, tstTokenContentInfo); + } + catch (TspValidationException e) + { + status = PkiStatus.Rejection; + + this.SetFailInfoField(e.FailureCode); + this.AddStatusString(e.Message); + + PkiStatusInfo pkiStatusInfo = GetPkiStatusInfo(); + + resp = new TimeStampResp(pkiStatusInfo, null); + } + + try + { + return new TimeStampResponse(resp); + } + catch (IOException e) + { + throw new TspException("created badly formatted response!", e); + } + } + + + + class FailInfo + : DerBitString + { + internal FailInfo(int failInfoValue) + : base(failInfoValue) + { + } + } + + /** + * Generate a TimeStampResponse with chosen status and FailInfoField. + * + * @param status the PKIStatus to set. + * @param failInfoField the FailInfoField to set. + * @param statusString an optional string describing the failure. + * @return a TimeStampResponse with a failInfoField and optional statusString + * @throws TSPException in case the response could not be created + */ + public TimeStampResponse GenerateFailResponse(PkiStatus status, int failInfoField, string statusString) + { + this.status = status; + + this.SetFailInfoField(failInfoField); + + if (statusString != null) + { + this.AddStatusString(statusString); + } + + PkiStatusInfo pkiStatusInfo = GetPkiStatusInfo(); + + TimeStampResp resp = new TimeStampResp(pkiStatusInfo, null); + + try + { + return new TimeStampResponse(resp); + } + catch (IOException e) + { + throw new TspException("created badly formatted response!", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs.meta new file mode 100644 index 00000000..d441a6ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4ddc9e5ee5d7244dafcd78dd02bce08 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampResponseGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs new file mode 100644 index 00000000..9d529591 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs @@ -0,0 +1,308 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + public class TimeStampToken + { + private readonly CmsSignedData tsToken; + private readonly SignerInformation tsaSignerInfo; +// private readonly DateTime genTime; + private readonly TimeStampTokenInfo tstInfo; + private readonly CertID certID; + + public TimeStampToken( + Asn1.Cms.ContentInfo contentInfo) + : this(new CmsSignedData(contentInfo)) + { + } + + public TimeStampToken( + CmsSignedData signedData) + { + this.tsToken = signedData; + + if (!this.tsToken.SignedContentType.Equals(PkcsObjectIdentifiers.IdCTTstInfo)) + { + throw new TspValidationException("ContentInfo object not for a time stamp."); + } + + var signers = tsToken.GetSignerInfos().GetSigners(); + + if (signers.Count != 1) + { + throw new ArgumentException("Time-stamp token signed by " + + signers.Count + + " signers, but it must contain just the TSA signature."); + } + + + var signerEnum = signers.GetEnumerator(); + + signerEnum.MoveNext(); + tsaSignerInfo = signerEnum.Current; + + try + { + CmsProcessable content = tsToken.SignedContent; + MemoryStream bOut = new MemoryStream(); + + content.Write(bOut); + + this.tstInfo = new TimeStampTokenInfo( + TstInfo.GetInstance( + Asn1Object.FromByteArray(bOut.ToArray()))); + + Asn1.Cms.Attribute attr = tsaSignerInfo.SignedAttributes[ + PkcsObjectIdentifiers.IdAASigningCertificate]; + +// if (attr == null) +// { +// throw new TspValidationException( +// "no signing certificate attribute found, time stamp invalid."); +// } +// +// SigningCertificate signCert = SigningCertificate.GetInstance( +// attr.AttrValues[0]); +// +// this.certID = EssCertID.GetInstance(signCert.GetCerts()[0]); + + if (attr != null) + { + + if (attr.AttrValues[0] is SigningCertificateV2) + { + SigningCertificateV2 signCert = SigningCertificateV2.GetInstance(attr.AttrValues[0]); + this.certID = new CertID(EssCertIDv2.GetInstance(signCert.GetCerts()[0])); + } + else + { + SigningCertificate signCert = SigningCertificate.GetInstance(attr.AttrValues[0]); + this.certID = new CertID(EssCertID.GetInstance(signCert.GetCerts()[0])); + } + } + else + { + attr = tsaSignerInfo.SignedAttributes[PkcsObjectIdentifiers.IdAASigningCertificateV2]; + + if (attr == null) + throw new TspValidationException("no signing certificate attribute found, time stamp invalid."); + + SigningCertificateV2 signCertV2 = SigningCertificateV2.GetInstance(attr.AttrValues[0]); + + this.certID = new CertID(EssCertIDv2.GetInstance(signCertV2.GetCerts()[0])); + } + } + catch (CmsException e) + { + throw new TspException(e.Message, e.InnerException); + } + } + + public TimeStampTokenInfo TimeStampInfo + { + get { return tstInfo; } + } + + public SignerID SignerID + { + get { return tsaSignerInfo.SignerID; } + } + + public Asn1.Cms.AttributeTable SignedAttributes + { + get { return tsaSignerInfo.SignedAttributes; } + } + + public Asn1.Cms.AttributeTable UnsignedAttributes + { + get { return tsaSignerInfo.UnsignedAttributes; } + } + + public IStore GetAttributeCertificates() => tsToken.GetAttributeCertificates(); + + public IStore GetCertificates() => tsToken.GetCertificates(); + + public IStore GetCrls() => tsToken.GetCrls(); + + /** + * Validate the time stamp token. + *

    + * To be valid the token must be signed by the passed in certificate and + * the certificate must be the one referred to by the SigningCertificate + * attribute included in the hashed attributes of the token. The + * certificate must also have the ExtendedKeyUsageExtension with only + * KeyPurposeID.IdKPTimeStamping and have been valid at the time the + * timestamp was created. + *

    + *

    + * A successful call to validate means all the above are true. + *

    + */ + public void Validate( + X509Certificate cert) + { + try + { + byte[] hash = DigestUtilities.CalculateDigest( + certID.GetHashAlgorithmName(), cert.GetEncoded()); + + if (!Arrays.ConstantTimeAreEqual(certID.GetCertHash(), hash)) + throw new TspValidationException("certificate hash does not match certID hash."); + + if (certID.IssuerSerial != null) + { + if (!certID.IssuerSerial.Serial.HasValue(cert.SerialNumber)) + throw new TspValidationException("certificate serial number does not match certID for signature."); + + GeneralName[] names = certID.IssuerSerial.Issuer.GetNames(); + X509Name principal = PrincipalUtilities.GetIssuerX509Principal(cert); + bool found = false; + + for (int i = 0; i != names.Length; i++) + { + if (names[i].TagNo == 4 + && X509Name.GetInstance(names[i].Name).Equivalent(principal)) + { + found = true; + break; + } + } + + if (!found) + { + throw new TspValidationException("certificate name does not match certID for signature. "); + } + } + + TspUtil.ValidateCertificate(cert); + + cert.CheckValidity(tstInfo.GenTime); + + if (!tsaSignerInfo.Verify(cert)) + { + throw new TspValidationException("signature not created by certificate."); + } + } + catch (CmsException e) + { + if (e.InnerException != null) + { + throw new TspException(e.Message, e.InnerException); + } + + throw new TspException("CMS exception: " + e, e); + } + catch (CertificateEncodingException e) + { + throw new TspException("problem processing certificate: " + e, e); + } + catch (SecurityUtilityException e) + { + throw new TspException("cannot find algorithm: " + e.Message, e); + } + } + + /** + * Return the underlying CmsSignedData object. + * + * @return the underlying CMS structure. + */ + public CmsSignedData ToCmsSignedData() + { + return tsToken; + } + + /** + * Return a ASN.1 encoded byte stream representing the encoded object. + * + * @throws IOException if encoding fails. + */ + public byte[] GetEncoded() + { + return tsToken.GetEncoded(Asn1Encodable.Der); + } + + /** + * return the ASN.1 encoded representation of this object using the specified encoding. + * + * @param encoding the ASN.1 encoding format to use ("BER" or "DER"). + */ + public byte[] GetEncoded(string encoding) + { + return tsToken.GetEncoded(encoding); + } + + // perhaps this should be done using an interface on the ASN.1 classes... + private class CertID + { + private EssCertID certID; + private EssCertIDv2 certIDv2; + + internal CertID(EssCertID certID) + { + this.certID = certID; + this.certIDv2 = null; + } + + internal CertID(EssCertIDv2 certID) + { + this.certIDv2 = certID; + this.certID = null; + } + + public string GetHashAlgorithmName() + { + if (certID != null) + return "SHA-1"; + + if (NistObjectIdentifiers.IdSha256.Equals(certIDv2.HashAlgorithm.Algorithm)) + return "SHA-256"; + + return certIDv2.HashAlgorithm.Algorithm.Id; + } + + public AlgorithmIdentifier GetHashAlgorithm() + { + return (certID != null) + ? new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1) + : certIDv2.HashAlgorithm; + } + + public byte[] GetCertHash() + { + return certID != null + ? certID.GetCertHash() + : certIDv2.GetCertHash(); + } + + public IssuerSerial IssuerSerial + { + get + { + return certID != null + ? certID.IssuerSerial + : certIDv2.IssuerSerial; + } + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs.meta new file mode 100644 index 00000000..4ed105c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41680bb46e9d713419aa5f7ddb83c694 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampToken.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs new file mode 100644 index 00000000..7b3c7f84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs @@ -0,0 +1,452 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Ess; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Cms; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + public enum Resolution + { + R_SECONDS, R_TENTHS_OF_SECONDS, R_HUNDREDTHS_OF_SECONDS, R_MILLISECONDS + } + + public class TimeStampTokenGenerator + { + private int accuracySeconds = -1; + private int accuracyMillis = -1; + private int accuracyMicros = -1; + private bool ordering = false; + private GeneralName tsa = null; + private DerObjectIdentifier tsaPolicyOID; + + private IStore x509Certs; + private IStore x509Crls; + private IStore x509AttrCerts; + // TODO Port changes from bc-java + //private Dictionary<> otherRevoc = new Dictionary<>(); + private SignerInfoGenerator signerInfoGenerator; + IDigestFactory digestCalculator; + + private Resolution resolution = Resolution.R_SECONDS; + + public Resolution Resolution + { + get { return resolution; } + set { resolution = value; } + } + + /** + * basic creation - only the default attributes will be included here. + */ + public TimeStampTokenGenerator( + AsymmetricKeyParameter key, + X509Certificate cert, + string digestOID, + string tsaPolicyOID) + : this(key, cert, digestOID, tsaPolicyOID, null, null) + { + } + + public TimeStampTokenGenerator( + SignerInfoGenerator signerInfoGen, + IDigestFactory digestCalculator, + DerObjectIdentifier tsaPolicy, + bool isIssuerSerialIncluded) + { + this.signerInfoGenerator = signerInfoGen; + this.digestCalculator = digestCalculator; + this.tsaPolicyOID = tsaPolicy; + + if (signerInfoGenerator.certificate == null) + throw new ArgumentException("SignerInfoGenerator must have an associated certificate"); + + X509Certificate assocCert = signerInfoGenerator.certificate; + TspUtil.ValidateCertificate(assocCert); + + try + { + byte[] certEnc = assocCert.GetEncoded(); + + IStreamCalculator calculator = digestCalculator.CreateCalculator(); + + using (var stream = calculator.Stream) + { + stream.Write(certEnc, 0, certEnc.Length); + } + + if (((AlgorithmIdentifier)digestCalculator.AlgorithmDetails).Algorithm.Equals(OiwObjectIdentifiers.IdSha1)) + { + EssCertID essCertID = new EssCertID( + calculator.GetResult().Collect(), + isIssuerSerialIncluded ? + new IssuerSerial( + new GeneralNames( + new GeneralName(assocCert.IssuerDN)), + new DerInteger(assocCert.SerialNumber)) : null); + + this.signerInfoGenerator = signerInfoGen.NewBuilder() + .WithSignedAttributeGenerator(new TableGen(signerInfoGen, essCertID)) + .Build(signerInfoGen.contentSigner, signerInfoGen.certificate); + } + else + { + AlgorithmIdentifier digestAlgID = new AlgorithmIdentifier( + ((AlgorithmIdentifier)digestCalculator.AlgorithmDetails).Algorithm); + + EssCertIDv2 essCertID = new EssCertIDv2( + calculator.GetResult().Collect(), + isIssuerSerialIncluded ? + new IssuerSerial( + new GeneralNames( + new GeneralName(assocCert.IssuerDN)), + new DerInteger(assocCert.SerialNumber)) : null); + + this.signerInfoGenerator = signerInfoGen.NewBuilder() + .WithSignedAttributeGenerator(new TableGen2(signerInfoGen, essCertID)) + .Build(signerInfoGen.contentSigner, signerInfoGen.certificate); + } + } + catch (Exception ex) + { + throw new TspException("Exception processing certificate", ex); + } + } + + /** + * create with a signer with extra signed/unsigned attributes. + */ + public TimeStampTokenGenerator( + AsymmetricKeyParameter key, + X509Certificate cert, + string digestOID, + string tsaPolicyOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) : this( + makeInfoGenerator(key, cert, digestOID, signedAttr, unsignedAttr), + Asn1DigestFactory.Get(OiwObjectIdentifiers.IdSha1), + tsaPolicyOID != null ? new DerObjectIdentifier(tsaPolicyOID):null, false) + { + } + + internal static SignerInfoGenerator makeInfoGenerator( + AsymmetricKeyParameter key, + X509Certificate cert, + string digestOID, + Asn1.Cms.AttributeTable signedAttr, + Asn1.Cms.AttributeTable unsignedAttr) + { + TspUtil.ValidateCertificate(cert); + + // + // Add the ESSCertID attribute + // + IDictionary signedAttrs; + if (signedAttr != null) + { + signedAttrs = signedAttr.ToDictionary(); + } + else + { + signedAttrs = new Dictionary(); + } + + //try + //{ + // byte[] hash = DigestUtilities.CalculateDigest("SHA-1", cert.GetEncoded()); + + // EssCertID essCertid = new EssCertID(hash); + + // Asn1.Cms.Attribute attr = new Asn1.Cms.Attribute( + // PkcsObjectIdentifiers.IdAASigningCertificate, + // new DerSet(new SigningCertificate(essCertid))); + + // signedAttrs[attr.AttrType] = attr; + //} + //catch (CertificateEncodingException e) + //{ + // throw new TspException("Exception processing certificate.", e); + //} + //catch (SecurityUtilityException e) + //{ + // throw new TspException("Can't find a SHA-1 implementation.", e); + //} + + string digestName = CmsSignedHelper.Instance.GetDigestAlgName(digestOID); + string signatureName = digestName + "with" + CmsSignedHelper.Instance.GetEncryptionAlgName(CmsSignedHelper.Instance.GetEncOid(key, digestOID)); + + Asn1SignatureFactory sigfact = new Asn1SignatureFactory(signatureName, key); + return new SignerInfoGeneratorBuilder() + .WithSignedAttributeGenerator( + new DefaultSignedAttributeTableGenerator( + new Asn1.Cms.AttributeTable(signedAttrs))) + .WithUnsignedAttributeGenerator( + new SimpleAttributeTableGenerator(unsignedAttr)) + .Build(sigfact, cert); + } + + public void SetAttributeCertificates(IStore attributeCertificates) + { + this.x509AttrCerts = attributeCertificates; + } + + public void SetCertificates(IStore certificates) + { + this.x509Certs = certificates; + } + + public void SetCrls(IStore crls) + { + this.x509Crls = crls; + } + + public void SetAccuracySeconds( + int accuracySeconds) + { + this.accuracySeconds = accuracySeconds; + } + + public void SetAccuracyMillis( + int accuracyMillis) + { + this.accuracyMillis = accuracyMillis; + } + + public void SetAccuracyMicros( + int accuracyMicros) + { + this.accuracyMicros = accuracyMicros; + } + + public void SetOrdering( + bool ordering) + { + this.ordering = ordering; + } + + public void SetTsa( + GeneralName tsa) + { + this.tsa = tsa; + } + + //------------------------------------------------------------------------------ + + public TimeStampToken Generate( + TimeStampRequest request, + BigInteger serialNumber, + DateTime genTime) + { + return Generate(request, serialNumber, genTime, null); + } + + + public TimeStampToken Generate( + TimeStampRequest request, + BigInteger serialNumber, + DateTime genTime, X509Extensions additionalExtensions) + { + DerObjectIdentifier digestAlgOID = new DerObjectIdentifier(request.MessageImprintAlgOid); + + AlgorithmIdentifier algID = new AlgorithmIdentifier(digestAlgOID, DerNull.Instance); + MessageImprint messageImprint = new MessageImprint(algID, request.GetMessageImprintDigest()); + + Accuracy accuracy = null; + if (accuracySeconds > 0 || accuracyMillis > 0 || accuracyMicros > 0) + { + DerInteger seconds = null; + if (accuracySeconds > 0) + { + seconds = new DerInteger(accuracySeconds); + } + + DerInteger millis = null; + if (accuracyMillis > 0) + { + millis = new DerInteger(accuracyMillis); + } + + DerInteger micros = null; + if (accuracyMicros > 0) + { + micros = new DerInteger(accuracyMicros); + } + + accuracy = new Accuracy(seconds, millis, micros); + } + + DerBoolean derOrdering = null; + if (ordering) + { + derOrdering = DerBoolean.GetInstance(ordering); + } + + DerInteger nonce = null; + if (request.Nonce != null) + { + nonce = new DerInteger(request.Nonce); + } + + DerObjectIdentifier tsaPolicy = tsaPolicyOID; + if (request.ReqPolicy != null) + { + tsaPolicy = new DerObjectIdentifier(request.ReqPolicy); + } + + if (tsaPolicy == null) + { + throw new TspValidationException("request contains no policy", PkiFailureInfo.UnacceptedPolicy); + } + + X509Extensions respExtensions = request.Extensions; + if (additionalExtensions != null) + { + X509ExtensionsGenerator extGen = new X509ExtensionsGenerator(); + + if (respExtensions != null) + { + foreach(object oid in respExtensions.ExtensionOids) + { + DerObjectIdentifier id = DerObjectIdentifier.GetInstance(oid); + extGen.AddExtension(id, respExtensions.GetExtension(DerObjectIdentifier.GetInstance(id))); + } + } + + foreach (object oid in additionalExtensions.ExtensionOids) + { + DerObjectIdentifier id = DerObjectIdentifier.GetInstance(oid); + extGen.AddExtension(id, additionalExtensions.GetExtension(DerObjectIdentifier.GetInstance(id))); + + } + + respExtensions = extGen.Generate(); + } + + var timeStampTime = new Asn1GeneralizedTime(WithResolution(genTime, resolution)); + + TstInfo tstInfo = new TstInfo(tsaPolicy, messageImprint, + new DerInteger(serialNumber), timeStampTime, accuracy, + derOrdering, nonce, tsa, respExtensions); + + try + { + CmsSignedDataGenerator signedDataGenerator = new CmsSignedDataGenerator(); + + byte[] derEncodedTstInfo = tstInfo.GetDerEncoded(); + + if (request.CertReq) + { + signedDataGenerator.AddCertificates(x509Certs); + signedDataGenerator.AddAttributeCertificates(x509AttrCerts); + } + + signedDataGenerator.AddCrls(x509Crls); + + signedDataGenerator.AddSignerInfoGenerator(signerInfoGenerator); + + CmsSignedData signedData = signedDataGenerator.Generate( + PkcsObjectIdentifiers.IdCTTstInfo.Id, + new CmsProcessableByteArray(derEncodedTstInfo), + true); + + return new TimeStampToken(signedData); + } + catch (CmsException cmsEx) + { + throw new TspException("Error generating time-stamp token", cmsEx); + } + catch (IOException e) + { + throw new TspException("Exception encoding info", e); + } + //catch (InvalidAlgorithmParameterException e) + //{ + // throw new TspException("Exception handling CertStore CRLs", e); + //} + } + + private static DateTime WithResolution(DateTime dateTime, Resolution resolution) + { + switch (resolution) + { + case Resolution.R_SECONDS: + return DateTimeUtilities.WithPrecisionSecond(dateTime); + case Resolution.R_TENTHS_OF_SECONDS: + return DateTimeUtilities.WithPrecisionDecisecond(dateTime); + case Resolution.R_HUNDREDTHS_OF_SECONDS: + return DateTimeUtilities.WithPrecisionCentisecond(dateTime); + case Resolution.R_MILLISECONDS: + return DateTimeUtilities.WithPrecisionMillisecond(dateTime); + default: + throw new InvalidOperationException(); + } + } + + private class TableGen + : CmsAttributeTableGenerator + { + private readonly SignerInfoGenerator infoGen; + private readonly EssCertID essCertID; + + + public TableGen(SignerInfoGenerator infoGen, EssCertID essCertID) + { + this.infoGen = infoGen; + this.essCertID = essCertID; + } + + public Asn1.Cms.AttributeTable GetAttributes(IDictionary parameters) + { + Asn1.Cms.AttributeTable tab = infoGen.signedGen.GetAttributes(parameters); + if (tab[PkcsObjectIdentifiers.IdAASigningCertificate] == null) + { + return tab.Add(PkcsObjectIdentifiers.IdAASigningCertificate, new SigningCertificate(essCertID)); + } + return tab; + } + } + + private class TableGen2 + : CmsAttributeTableGenerator + { + private readonly SignerInfoGenerator infoGen; + private readonly EssCertIDv2 essCertID; + + + public TableGen2(SignerInfoGenerator infoGen, EssCertIDv2 essCertID) + { + this.infoGen = infoGen; + this.essCertID = essCertID; + } + + public Asn1.Cms.AttributeTable GetAttributes(IDictionary parameters) + { + Asn1.Cms.AttributeTable tab = infoGen.signedGen.GetAttributes(parameters); + if (tab[PkcsObjectIdentifiers.IdAASigningCertificateV2] == null) + { + return tab.Add(PkcsObjectIdentifiers.IdAASigningCertificateV2, new SigningCertificateV2(essCertID)); + } + return tab; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs.meta new file mode 100644 index 00000000..1218dfeb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8cf66cda766c10b47b38b343460bacc8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs new file mode 100644 index 00000000..ba670788 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs @@ -0,0 +1,128 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Tsp; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tsp +{ + public class TimeStampTokenInfo + { + private static TstInfo ParseTstInfo(byte[] tstInfoEncoding) + { + try + { + return TstInfo.GetInstance(tstInfoEncoding); + } + catch (Exception e) + { + throw new TspException("unable to parse TstInfo encoding: " + e.Message); + } + } + + private TstInfo tstInfo; + private DateTime genTime; + + public TimeStampTokenInfo(byte[] tstInfoEncoding) + : this(ParseTstInfo(tstInfoEncoding)) + { + } + + public TimeStampTokenInfo( + TstInfo tstInfo) + { + this.tstInfo = tstInfo; + + try + { + this.genTime = tstInfo.GenTime.ToDateTime(); + } + catch (Exception e) + { + throw new TspException("unable to parse genTime field: " + e.Message); + } + } + + public bool IsOrdered + { + get { return tstInfo.Ordering.IsTrue; } + } + + public Accuracy Accuracy + { + get { return tstInfo.Accuracy; } + } + + public DateTime GenTime + { + get { return genTime; } + } + + public GenTimeAccuracy GenTimeAccuracy + { + get + { + return this.Accuracy == null + ? null + : new GenTimeAccuracy(this.Accuracy); + } + } + + public string Policy + { + get { return tstInfo.Policy.Id; } + } + + public BigInteger SerialNumber + { + get { return tstInfo.SerialNumber.Value; } + } + + public GeneralName Tsa + { + get { return tstInfo.Tsa; } + } + + /** + * @return the nonce value, null if there isn't one. + */ + public BigInteger Nonce + { + get + { + return tstInfo.Nonce == null + ? null + : tstInfo.Nonce.Value; + } + } + + public AlgorithmIdentifier HashAlgorithm + { + get { return tstInfo.MessageImprint.HashAlgorithm; } + } + + public string MessageImprintAlgOid + { + get { return tstInfo.MessageImprint.HashAlgorithm.Algorithm.Id; } + } + + public byte[] GetMessageImprintDigest() + { + return tstInfo.MessageImprint.GetHashedMessage(); + } + + public byte[] GetEncoded() + { + return tstInfo.GetEncoded(); + } + + public TstInfo TstInfo + { + get { return tstInfo; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs.meta new file mode 100644 index 00000000..162326b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 797e399bd822e044fb0b302b1ae7ae05 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/tsp/TimeStampTokenInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util.meta new file mode 100644 index 00000000..b7f0a74f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: de35f504a90e2fc479fb5e6c146f0624 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs new file mode 100644 index 00000000..bc9c7782 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs @@ -0,0 +1,1015 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + /// General array utilities. + public static class Arrays + { + public static readonly byte[] EmptyBytes = new byte[0]; + public static readonly int[] EmptyInts = new int[0]; + + public static bool AreAllZeroes(byte[] buf, int off, int len) + { + uint bits = 0; + for (int i = 0; i < len; ++i) + { + bits |= buf[off + i]; + } + return bits == 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool AreAllZeroes(ReadOnlySpan buf) + { + uint bits = 0; + for (int i = 0; i < buf.Length; ++i) + { + bits |= buf[i]; + } + return bits == 0; + } +#endif + + public static bool AreEqual( + bool[] a, + bool[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + public static bool AreEqual( + char[] a, + char[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + /// + /// Are two arrays equal. + /// + /// Left side. + /// Right side. + /// True if equal. + public static bool AreEqual(byte[] a, byte[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + public static bool AreEqual(byte[] a, int aFromIndex, int aToIndex, byte[] b, int bFromIndex, int bToIndex) + { + int aLength = aToIndex - aFromIndex; + int bLength = bToIndex - bFromIndex; + + if (aLength != bLength) + return false; + + for (int i = 0; i < aLength; ++i) + { + if (a[aFromIndex + i] != b[bFromIndex + i]) + return false; + } + + return true; + } + + /// + /// A constant time equals comparison - does not terminate early if + /// test will fail. + /// + /// first array + /// second array + /// true if arrays equal, false otherwise. + public static bool ConstantTimeAreEqual(byte[] a, byte[] b) + { + if (null == a || null == b) + return false; + if (a == b) + return true; + + int len = System.Math.Min(a.Length, b.Length); + int nonEqual = a.Length ^ b.Length; + for (int i = 0; i < len; ++i) + { + nonEqual |= (a[i] ^ b[i]); + } + for (int i = len; i < b.Length; ++i) + { + nonEqual |= (b[i] ^ ~b[i]); + } + return 0 == nonEqual; + } + + public static bool ConstantTimeAreEqual(int len, byte[] a, int aOff, byte[] b, int bOff) + { + if (null == a) + throw new ArgumentNullException("a"); + if (null == b) + throw new ArgumentNullException("b"); + if (len < 0) + throw new ArgumentException("cannot be negative", "len"); + if (aOff > (a.Length - len)) + throw new IndexOutOfRangeException("'aOff' value invalid for specified length"); + if (bOff > (b.Length - len)) + throw new IndexOutOfRangeException("'bOff' value invalid for specified length"); + + int d = 0; + for (int i = 0; i < len; ++i) + { + d |= a[aOff + i] ^ b[bOff + i]; + } + return 0 == d; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static bool ConstantTimeAreEqual(Span a, Span b) + { + if (a.Length != b.Length) + throw new ArgumentException("Spans to compare must have equal length"); + + int d = 0; + for (int i = 0, count = a.Length; i < count; ++i) + { + d |= a[i] ^ b[i]; + } + return 0 == d; + + } +#endif + + public static bool AreEqual( + int[] a, + int[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + [CLSCompliant(false)] + public static bool AreEqual(uint[] a, uint[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + public static bool AreEqual(long[] a, long[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + [CLSCompliant(false)] + public static bool AreEqual(ulong[] a, ulong[] b) + { + if (a == b) + return true; + + if (a == null || b == null) + return false; + + return HaveSameContents(a, b); + } + + private static bool HaveSameContents( + bool[] a, + bool[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents( + char[] a, + char[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents( + byte[] a, + byte[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents( + int[] a, + int[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents(uint[] a, uint[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents(long[] a, long[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + private static bool HaveSameContents(ulong[] a, ulong[] b) + { + int i = a.Length; + if (i != b.Length) + return false; + while (i != 0) + { + --i; + if (a[i] != b[i]) + return false; + } + return true; + } + + public static string ToString( + object[] a) + { + StringBuilder sb = new StringBuilder("["); + if (a.Length > 0) + { + sb.Append(a[0]); + for (int index = 1; index < a.Length; ++index) + { + sb.Append(", ").Append(a[index]); + } + } + sb.Append(']'); + return sb.ToString(); + } + + public static int GetHashCode(byte[] data) + { + if (data == null) + { + return 0; + } + + int i = data.Length; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= data[i]; + } + + return hc; + } + + public static int GetHashCode(byte[] data, int off, int len) + { + if (data == null) + { + return 0; + } + + int i = len; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= data[off + i]; + } + + return hc; + } + + public static int GetHashCode(int[] data) + { + if (data == null) + return 0; + + int i = data.Length; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= data[i]; + } + + return hc; + } + + [CLSCompliant(false)] + public static int GetHashCode(ushort[] data) + { + if (data == null) + return 0; + + int i = data.Length; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= data[i]; + } + + return hc; + } + + public static int GetHashCode(int[] data, int off, int len) + { + if (data == null) + return 0; + + int i = len; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= data[off + i]; + } + + return hc; + } + + [CLSCompliant(false)] + public static int GetHashCode(uint[] data) + { + if (data == null) + return 0; + + int i = data.Length; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= (int)data[i]; + } + + return hc; + } + + [CLSCompliant(false)] + public static int GetHashCode(uint[] data, int off, int len) + { + if (data == null) + return 0; + + int i = len; + int hc = i + 1; + + while (--i >= 0) + { + hc *= 257; + hc ^= (int)data[off + i]; + } + + return hc; + } + + [CLSCompliant(false)] + public static int GetHashCode(ulong[] data) + { + if (data == null) + return 0; + + int i = data.Length; + int hc = i + 1; + + while (--i >= 0) + { + ulong di = data[i]; + hc *= 257; + hc ^= (int)di; + hc *= 257; + hc ^= (int)(di >> 32); + } + + return hc; + } + + [CLSCompliant(false)] + public static int GetHashCode(ulong[] data, int off, int len) + { + if (data == null) + return 0; + + int i = len; + int hc = i + 1; + + while (--i >= 0) + { + ulong di = data[off + i]; + hc *= 257; + hc ^= (int)di; + hc *= 257; + hc ^= (int)(di >> 32); + } + + return hc; + } + + public static bool[] Clone(bool[] data) + { + return data == null ? null : (bool[])data.Clone(); + } + + public static byte[] Clone(byte[] data) + { + return data == null ? null : (byte[])data.Clone(); + } + + public static short[] Clone(short[] data) + { + return data == null ? null : (short[])data.Clone(); + } + + [CLSCompliant(false)] + public static ushort[] Clone(ushort[] data) + { + return data == null ? null : (ushort[])data.Clone(); + } + + public static int[] Clone(int[] data) + { + return data == null ? null : (int[])data.Clone(); + } + + [CLSCompliant(false)] + public static uint[] Clone(uint[] data) + { + return data == null ? null : (uint[])data.Clone(); + } + + public static long[] Clone(long[] data) + { + return data == null ? null : (long[])data.Clone(); + } + + [CLSCompliant(false)] + public static ulong[] Clone(ulong[] data) + { + return data == null ? null : (ulong[])data.Clone(); + } + + public static byte[] Clone(byte[] data, byte[] existing) + { + if (data == null) + return null; + if (existing == null || existing.Length != data.Length) + return Clone(data); + Array.Copy(data, 0, existing, 0, existing.Length); + return existing; + } + + [CLSCompliant(false)] + public static ulong[] Clone(ulong[] data, ulong[] existing) + { + if (data == null) + return null; + if (existing == null || existing.Length != data.Length) + return Clone(data); + Array.Copy(data, 0, existing, 0, existing.Length); + return existing; + } + + public static bool Contains(byte[] a, byte n) + { + for (int i = 0; i < a.Length; ++i) + { + if (a[i] == n) + return true; + } + return false; + } + + public static bool Contains(short[] a, short n) + { + for (int i = 0; i < a.Length; ++i) + { + if (a[i] == n) + return true; + } + return false; + } + + public static bool Contains(int[] a, int n) + { + for (int i = 0; i < a.Length; ++i) + { + if (a[i] == n) + return true; + } + return false; + } + + public static void Fill( + byte[] buf, + byte b) + { + int i = buf.Length; + while (i > 0) + { + buf[--i] = b; + } + } + + [CLSCompliant(false)] + public static void Fill( + ulong[] buf, + ulong b) + { + int i = buf.Length; + while (i > 0) + { + buf[--i] = b; + } + } + + public static void Fill(byte[] buf, int from, int to, byte b) + { + for (int i = from; i < to; ++i) + { + buf[i] = b; + } + } + + public static void Fill(T[] ts, T t) + { + for (int i = 0; i < ts.Length; ++i) + { + ts[i] = t; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void Fill(Span ts, T t) + { + ts.Fill(t); + } +#endif + + public static byte[] CopyOf(byte[] data, int newLength) + { + byte[] tmp = new byte[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + public static char[] CopyOf(char[] data, int newLength) + { + char[] tmp = new char[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + public static int[] CopyOf(int[] data, int newLength) + { + int[] tmp = new int[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + [CLSCompliant(false)] + public static uint[] CopyOf(uint[] data, int newLength) + { + uint[] tmp = new uint[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + public static long[] CopyOf(long[] data, int newLength) + { + long[] tmp = new long[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + public static BigInteger[] CopyOf(BigInteger[] data, int newLength) + { + BigInteger[] tmp = new BigInteger[newLength]; + Array.Copy(data, 0, tmp, 0, System.Math.Min(newLength, data.Length)); + return tmp; + } + + /** + * Make a copy of a range of bytes from the passed in data array. The range can + * extend beyond the end of the input array, in which case the return array will + * be padded with zeroes. + * + * @param data the array from which the data is to be copied. + * @param from the start index at which the copying should take place. + * @param to the final index of the range (exclusive). + * + * @return a new byte array containing the range given. + */ + public static byte[] CopyOfRange(byte[] data, int from, int to) + { + int newLength = GetLength(from, to); + byte[] tmp = new byte[newLength]; + Array.Copy(data, from, tmp, 0, System.Math.Min(newLength, data.Length - from)); + return tmp; + } + + public static int[] CopyOfRange(int[] data, int from, int to) + { + int newLength = GetLength(from, to); + int[] tmp = new int[newLength]; + Array.Copy(data, from, tmp, 0, System.Math.Min(newLength, data.Length - from)); + return tmp; + } + + public static long[] CopyOfRange(long[] data, int from, int to) + { + int newLength = GetLength(from, to); + long[] tmp = new long[newLength]; + Array.Copy(data, from, tmp, 0, System.Math.Min(newLength, data.Length - from)); + return tmp; + } + + public static BigInteger[] CopyOfRange(BigInteger[] data, int from, int to) + { + int newLength = GetLength(from, to); + BigInteger[] tmp = new BigInteger[newLength]; + Array.Copy(data, from, tmp, 0, System.Math.Min(newLength, data.Length - from)); + return tmp; + } + + private static int GetLength(int from, int to) + { + int newLength = to - from; + if (newLength < 0) + throw new ArgumentException(from + " > " + to); + return newLength; + } + + public static byte[] Append(byte[] a, byte b) + { + if (a == null) + return new byte[] { b }; + + int length = a.Length; + byte[] result = new byte[length + 1]; + Array.Copy(a, 0, result, 0, length); + result[length] = b; + return result; + } + + public static short[] Append(short[] a, short b) + { + if (a == null) + return new short[] { b }; + + int length = a.Length; + short[] result = new short[length + 1]; + Array.Copy(a, 0, result, 0, length); + result[length] = b; + return result; + } + + public static int[] Append(int[] a, int b) + { + if (a == null) + return new int[] { b }; + + int length = a.Length; + int[] result = new int[length + 1]; + Array.Copy(a, 0, result, 0, length); + result[length] = b; + return result; + } + + public static byte[] Concatenate(byte[] a, byte[] b) + { + if (a == null) + return Clone(b); + if (b == null) + return Clone(a); + + byte[] rv = new byte[a.Length + b.Length]; + Array.Copy(a, 0, rv, 0, a.Length); + Array.Copy(b, 0, rv, a.Length, b.Length); + return rv; + } + + [CLSCompliant(false)] + public static ushort[] Concatenate(ushort[] a, ushort[] b) + { + if (a == null) + return Clone(b); + if (b == null) + return Clone(a); + + ushort[] rv = new ushort[a.Length + b.Length]; + Array.Copy(a, 0, rv, 0, a.Length); + Array.Copy(b, 0, rv, a.Length, b.Length); + return rv; + } + + public static byte[] ConcatenateAll(params byte[][] vs) + { + byte[][] nonNull = new byte[vs.Length][]; + int count = 0; + int totalLength = 0; + + for (int i = 0; i < vs.Length; ++i) + { + byte[] v = vs[i]; + if (v != null) + { + nonNull[count++] = v; + totalLength += v.Length; + } + } + + byte[] result = new byte[totalLength]; + int pos = 0; + + for (int j = 0; j < count; ++j) + { + byte[] v = nonNull[j]; + Array.Copy(v, 0, result, pos, v.Length); + pos += v.Length; + } + + return result; + } + + public static int[] Concatenate(int[] a, int[] b) + { + if (a == null) + return Clone(b); + if (b == null) + return Clone(a); + + int[] rv = new int[a.Length + b.Length]; + Array.Copy(a, 0, rv, 0, a.Length); + Array.Copy(b, 0, rv, a.Length, b.Length); + return rv; + } + + [CLSCompliant(false)] + public static uint[] Concatenate(uint[] a, uint[] b) + { + if (a == null) + return Clone(b); + if (b == null) + return Clone(a); + + uint[] rv = new uint[a.Length + b.Length]; + Array.Copy(a, 0, rv, 0, a.Length); + Array.Copy(b, 0, rv, a.Length, b.Length); + return rv; + } + + public static byte[] Prepend(byte[] a, byte b) + { + if (a == null) + return new byte[] { b }; + + int length = a.Length; + byte[] result = new byte[length + 1]; + Array.Copy(a, 0, result, 1, length); + result[0] = b; + return result; + } + + public static short[] Prepend(short[] a, short b) + { + if (a == null) + return new short[] { b }; + + int length = a.Length; + short[] result = new short[length + 1]; + Array.Copy(a, 0, result, 1, length); + result[0] = b; + return result; + } + + public static int[] Prepend(int[] a, int b) + { + if (a == null) + return new int[] { b }; + + int length = a.Length; + int[] result = new int[length + 1]; + Array.Copy(a, 0, result, 1, length); + result[0] = b; + return result; + } + + public static T[] Prepend(T[] a, T b) + { + if (a == null) + return new T[1]{ b }; + + T[] result = new T[1 + a.Length]; + result[0] = b; + a.CopyTo(result, 1); + return result; + } + + public static byte[] Reverse(byte[] a) + { + if (a == null) + return null; + + int p1 = 0, p2 = a.Length; + byte[] result = new byte[p2]; + + while (--p2 >= 0) + { + result[p2] = a[p1++]; + } + + return result; + } + + public static int[] Reverse(int[] a) + { + if (a == null) + return null; + + int p1 = 0, p2 = a.Length; + int[] result = new int[p2]; + + while (--p2 >= 0) + { + result[p2] = a[p1++]; + } + + return result; + } + + public static T[] ReverseInPlace(T[] array) + { + if (null == array) + return null; + + Array.Reverse(array); + return array; + } + + public static void Clear(byte[] data) + { + if (null != data) + { + Array.Clear(data, 0, data.Length); + } + } + + public static void Clear(int[] data) + { + if (null != data) + { + Array.Clear(data, 0, data.Length); + } + } + + public static bool IsNullOrContainsNull(object[] array) + { + if (null == array) + return true; + + int count = array.Length; + for (int i = 0; i < count; ++i) + { + if (null == array[i]) + return true; + } + return false; + } + + public static bool IsNullOrEmpty(byte[] array) + { + return null == array || array.Length < 1; + } + + public static bool IsNullOrEmpty(object[] array) + { + return null == array || array.Length < 1; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + + public static byte[] Concatenate(ReadOnlySpan a, ReadOnlySpan b) + { + byte[] rv = new byte[a.Length + b.Length]; + a.CopyTo(rv); + b.CopyTo(rv.AsSpan(a.Length)); + return rv; + } + + public static byte[] Concatenate(ReadOnlySpan a, ReadOnlySpan b, ReadOnlySpan c) + { + byte[] rv = new byte[a.Length + b.Length + c.Length]; + a.CopyTo(rv); + b.CopyTo(rv.AsSpan(a.Length)); + c.CopyTo(rv.AsSpan(a.Length + b.Length)); + return rv; + } + + public static byte[] Concatenate(ReadOnlySpan a, ReadOnlySpan b, ReadOnlySpan c, + ReadOnlySpan d) + { + byte[] rv = new byte[a.Length + b.Length + c.Length + d.Length]; + a.CopyTo(rv); + b.CopyTo(rv.AsSpan(a.Length)); + c.CopyTo(rv.AsSpan(a.Length + b.Length)); + d.CopyTo(rv.AsSpan(a.Length + b.Length + c.Length)); + return rv; + } + +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs.meta new file mode 100644 index 00000000..ea55a29f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 045e3f3570746e048a195295c92d5627 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Arrays.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs new file mode 100644 index 00000000..7cd83fd5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs @@ -0,0 +1,255 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + /** + * BigInteger utilities. + */ + public static class BigIntegers + { + public static readonly BigInteger Zero = BigInteger.Zero; + public static readonly BigInteger One = BigInteger.One; + + private const int MaxIterations = 1000; + + /** + * Return the passed in value as an unsigned byte array. + * + * @param value the value to be converted. + * @return a byte array without a leading zero byte if present in the signed encoding. + */ + public static byte[] AsUnsignedByteArray(BigInteger n) + { + return n.ToByteArrayUnsigned(); + } + + /** + * Return the passed in value as an unsigned byte array of the specified length, padded with + * leading zeros as necessary. + * @param length the fixed length of the result. + * @param n the value to be converted. + * @return a byte array padded to a fixed length with leading zeros. + */ + public static byte[] AsUnsignedByteArray(int length, BigInteger n) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int bytesLength = n.GetLengthofByteArrayUnsigned(); + + if (bytesLength > length) + throw new ArgumentException("standard length exceeded", nameof(n)); + + byte[] bytes = new byte[length]; + n.ToByteArrayUnsigned(bytes.AsSpan(length - bytesLength)); + return bytes; +#else + byte[] bytes = n.ToByteArrayUnsigned(); + int bytesLength = bytes.Length; + + if (bytesLength == length) + return bytes; + + if (bytesLength > length) + throw new ArgumentException("standard length exceeded", nameof(n)); + + byte[] tmp = new byte[length]; + Array.Copy(bytes, 0, tmp, length - bytesLength, bytesLength); + return tmp; +#endif + } + + /** + * Write the passed in value as unsigned bytes to the specified buffer range, padded with + * leading zeros as necessary. + * + * @param n + * the value to be converted. + * @param buf + * the buffer to which the value is written. + * @param off + * the start offset in array buf at which the data is written. + * @param len + * the fixed length of data written (possibly padded with leading zeros). + */ + public static void AsUnsignedByteArray(BigInteger n, byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + AsUnsignedByteArray(n, buf.AsSpan(off, len)); +#else + byte[] bytes = n.ToByteArrayUnsigned(); + int bytesLength = bytes.Length; + + if (bytesLength > len) + throw new ArgumentException("standard length exceeded", nameof(n)); + + int padLen = len - bytesLength; + Arrays.Fill(buf, off, off + padLen, 0); + Array.Copy(bytes, 0, buf, off + padLen, bytesLength); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static void AsUnsignedByteArray(BigInteger n, Span buf) + { + int bytesLength = n.GetLengthofByteArrayUnsigned(); + + if (bytesLength > buf.Length) + throw new ArgumentException("standard length exceeded", nameof(n)); + + buf[..^bytesLength].Fill(0x00); + n.ToByteArrayUnsigned(buf[^bytesLength..]); + } +#endif + + /// + /// Creates a Random BigInteger from the secure random of a given bit length. + /// + /// + /// + /// + public static BigInteger CreateRandomBigInteger(int bitLength, SecureRandom secureRandom) + { + return new BigInteger(bitLength, secureRandom); + } + + /** + * Return a random BigInteger not less than 'min' and not greater than 'max' + * + * @param min the least value that may be generated + * @param max the greatest value that may be generated + * @param random the source of randomness + * @return a random BigInteger value in the range [min,max] + */ + public static BigInteger CreateRandomInRange( + BigInteger min, + BigInteger max, + // TODO Should have been just Random class + SecureRandom random) + { + int cmp = min.CompareTo(max); + if (cmp >= 0) + { + if (cmp > 0) + throw new ArgumentException("'min' may not be greater than 'max'"); + + return min; + } + + if (min.BitLength > max.BitLength / 2) + { + return CreateRandomInRange(BigInteger.Zero, max.Subtract(min), random).Add(min); + } + + for (int i = 0; i < MaxIterations; ++i) + { + BigInteger x = new BigInteger(max.BitLength, random); + if (x.CompareTo(min) >= 0 && x.CompareTo(max) <= 0) + { + return x; + } + } + + // fall back to a faster (restricted) method + return new BigInteger(max.Subtract(min).BitLength - 1, random).Add(min); + } + + public static BigInteger ModOddInverse(BigInteger M, BigInteger X) + { + if (!M.TestBit(0)) + throw new ArgumentException("must be odd", "M"); + if (M.SignValue != 1) + throw new ArithmeticException("BigInteger: modulus not positive"); + if (X.SignValue < 0 || X.CompareTo(M) >= 0) + { + X = X.Mod(M); + } + + int bits = M.BitLength; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (bits <= 2048) + { + int len = Nat.GetLengthForBits(bits); + Span m = stackalloc uint[len]; + Span x = stackalloc uint[len]; + Span z = stackalloc uint[len]; + Nat.FromBigInteger(bits, M, m); + Nat.FromBigInteger(bits, X, x); + if (0 == Mod.ModOddInverse(m, x, z)) + throw new ArithmeticException("BigInteger not invertible"); + return Nat.ToBigInteger(len, z); + } + else +#endif + { + uint[] m = Nat.FromBigInteger(bits, M); + uint[] x = Nat.FromBigInteger(bits, X); + int len = m.Length; + uint[] z = Nat.Create(len); + if (0 == Mod.ModOddInverse(m, x, z)) + throw new ArithmeticException("BigInteger not invertible"); + return Nat.ToBigInteger(len, z); + } + } + + public static BigInteger ModOddInverseVar(BigInteger M, BigInteger X) + { + if (!M.TestBit(0)) + throw new ArgumentException("must be odd", "M"); + if (M.SignValue != 1) + throw new ArithmeticException("BigInteger: modulus not positive"); + if (M.Equals(One)) + return Zero; + if (X.SignValue < 0 || X.CompareTo(M) >= 0) + { + X = X.Mod(M); + } + if (X.Equals(One)) + return One; + + int bits = M.BitLength; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (bits <= 2048) + { + int len = Nat.GetLengthForBits(bits); + Span m = stackalloc uint[len]; + Span x = stackalloc uint[len]; + Span z = stackalloc uint[len]; + Nat.FromBigInteger(bits, M, m); + Nat.FromBigInteger(bits, X, x); + if (!Mod.ModOddInverseVar(m, x, z)) + throw new ArithmeticException("BigInteger not invertible"); + return Nat.ToBigInteger(len, z); + } + else +#endif + { + uint[] m = Nat.FromBigInteger(bits, M); + uint[] x = Nat.FromBigInteger(bits, X); + int len = m.Length; + uint[] z = Nat.Create(len); + if (!Mod.ModOddInverseVar(m, x, z)) + throw new ArithmeticException("BigInteger not invertible"); + return Nat.ToBigInteger(len, z); + } + } + + public static int GetByteLength(BigInteger n) + { + return n.GetLengthofByteArray(); + } + + public static int GetUnsignedByteLength(BigInteger n) + { + return n.GetLengthofByteArrayUnsigned(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs.meta new file mode 100644 index 00000000..859c1571 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc777dff47defef4a8d3aeeae81a96c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/BigIntegers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs new file mode 100644 index 00000000..3e1dc423 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public static class Bytes + { + public const int NumBits = 8; + public const int NumBytes = 1; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs.meta new file mode 100644 index 00000000..20cafabe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dd997dcda7501ba4cb92448ce542f099 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Bytes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs new file mode 100644 index 00000000..45d0e5bd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + internal static class Enums + { + internal static TEnum GetEnumValue(string s) + where TEnum : struct, Enum + { + // We only want to parse single named constants + if (s.Length > 0 && char.IsLetter(s[0]) && s.IndexOf(',') < 0) + { + s = s.Replace('-', '_'); + s = s.Replace('/', '_'); + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Enum.Parse(s, false); +#else + return (TEnum)Enum.Parse(typeof(TEnum), s, false); +#endif + } + + throw new ArgumentException(); + } + + internal static TEnum[] GetEnumValues() + where TEnum : struct, Enum + { +#if NET5_0_OR_GREATER + return Enum.GetValues(); +#else + return (TEnum[])Enum.GetValues(typeof(TEnum)); +#endif + } + + internal static TEnum GetArbitraryValue() + where TEnum : struct, Enum + { + TEnum[] values = GetEnumValues(); + int pos = (int)(DateTimeUtilities.CurrentUnixMs() & int.MaxValue) % values.Length; + return values[pos]; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs.meta new file mode 100644 index 00000000..6bd2319a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ee543c7959ad9a543afceffd825a5880 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Enums.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs new file mode 100644 index 00000000..52b1c7c2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs @@ -0,0 +1,16 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public interface IEncodable + { + /// Return a byte array representing the implementing object. + /// An encoding of this object as a byte array. + /// + byte[] GetEncoded(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs.meta new file mode 100644 index 00000000..86728546 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 298d46646e6cef440aa680edefc25b0c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IEncodable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs new file mode 100644 index 00000000..54d029f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public interface IMemoable + { + /// + /// Produce a copy of this object with its configuration and in its current state. + /// + /// + /// The returned object may be used simply to store the state, or may be used as a similar object + /// starting from the copied state. + /// + IMemoable Copy(); + + /// + /// Restore a copied object state into this object. + /// + /// + /// Implementations of this method should try to avoid or minimise memory allocation to perform the reset. + /// + /// an object originally {@link #copy() copied} from an object of the same type as this instance. + /// if the provided object is not of the correct type. + /// if the other parameter is in some other way invalid. + void Reset(IMemoable other); + } + +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs.meta new file mode 100644 index 00000000..a7b04b87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6b6fe8a690fe35241aad5e1aefd370fb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/IMemoable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs new file mode 100644 index 00000000..e2eeafee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs @@ -0,0 +1,162 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Numerics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public static class Integers + { + public const int NumBits = 32; + public const int NumBytes = 4; + + private static readonly byte[] DeBruijnTZ = { + 0x1F, 0x00, 0x1B, 0x01, 0x1C, 0x0D, 0x17, 0x02, 0x1D, 0x15, 0x13, 0x0E, 0x18, 0x10, 0x03, 0x07, + 0x1E, 0x1A, 0x0C, 0x16, 0x14, 0x12, 0x0F, 0x06, 0x19, 0x0B, 0x11, 0x05, 0x0A, 0x04, 0x09, 0x08 }; + + public static int HighestOneBit(int i) + { + return (int)HighestOneBit((uint)i); + } + + [CLSCompliant(false)] + public static uint HighestOneBit(uint i) + { + i |= i >> 1; + i |= i >> 2; + i |= i >> 4; + i |= i >> 8; + i |= i >> 16; + return i - (i >> 1); + } + + public static int LowestOneBit(int i) + { + return i & -i; + } + + [CLSCompliant(false)] + public static uint LowestOneBit(uint i) + { + return (uint)LowestOneBit((int)i); + } + + public static int NumberOfLeadingZeros(int i) + { +#if NETCOREAPP3_0_OR_GREATER + if (Lzcnt.IsSupported) + { + return (int)Lzcnt.LeadingZeroCount((uint)i); + } +#endif + + if (i <= 0) + return (~i >> (31 - 5)) & (1 << 5); + + uint u = (uint)i; + int n = 1; + if (0 == (u >> 16)) { n += 16; u <<= 16; } + if (0 == (u >> 24)) { n += 8; u <<= 8; } + if (0 == (u >> 28)) { n += 4; u <<= 4; } + if (0 == (u >> 30)) { n += 2; u <<= 2; } + n -= (int)(u >> 31); + return n; + } + + public static int NumberOfTrailingZeros(int i) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi1.IsSupported) + { + return (int)Bmi1.TrailingZeroCount((uint)i); + } +#endif + + int n = DeBruijnTZ[(uint)((i & -i) * 0x0EF96A62) >> 27]; + int m = (((i & 0xFFFF) | (int)((uint)i >> 16)) - 1) >> 31; + return n - m; + } + + public static int Reverse(int i) + { + return (int)Reverse((uint)i); + } + + [CLSCompliant(false)] + public static uint Reverse(uint i) + { + i = Bits.BitPermuteStepSimple(i, 0x55555555U, 1); + i = Bits.BitPermuteStepSimple(i, 0x33333333U, 2); + i = Bits.BitPermuteStepSimple(i, 0x0F0F0F0FU, 4); + return ReverseBytes(i); + } + + public static int ReverseBytes(int i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return (int)ReverseBytes((uint)i); +#endif + } + + [CLSCompliant(false)] + public static uint ReverseBytes(uint i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return RotateLeft(i & 0xFF00FF00U, 8) | + RotateLeft(i & 0x00FF00FFU, 24); +#endif + } + + public static int RotateLeft(int i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return (int)BitOperations.RotateLeft((uint)i, distance); +#else + return (i << distance) | (int)((uint)i >> -distance); +#endif + } + + [CLSCompliant(false)] + public static uint RotateLeft(uint i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return BitOperations.RotateLeft(i, distance); +#else + return (i << distance) | (i >> -distance); +#endif + } + + public static int RotateRight(int i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return (int)BitOperations.RotateRight((uint)i, distance); +#else + return (int)((uint)i >> distance) | (i << -distance); +#endif + } + + [CLSCompliant(false)] + public static uint RotateRight(uint i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return BitOperations.RotateRight(i, distance); +#else + return (i >> distance) | (i << -distance); +#endif + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs.meta new file mode 100644 index 00000000..994d7716 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 91c03e8c4d3c1034aa7cf365f5a0ce2e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Integers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs new file mode 100644 index 00000000..72180575 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs @@ -0,0 +1,163 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Numerics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.Raw; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public static class Longs + { + public const int NumBits = 64; + public const int NumBytes = 8; + + private static readonly byte[] DeBruijnTZ = { + 0x3F, 0x00, 0x01, 0x34, 0x02, 0x06, 0x35, 0x1A, 0x03, 0x25, 0x28, 0x07, 0x21, 0x36, 0x2F, 0x1B, + 0x3D, 0x04, 0x26, 0x2D, 0x2B, 0x29, 0x15, 0x08, 0x17, 0x22, 0x3A, 0x37, 0x30, 0x11, 0x1C, 0x0A, + 0x3E, 0x33, 0x05, 0x19, 0x24, 0x27, 0x20, 0x2E, 0x3C, 0x2C, 0x2A, 0x14, 0x16, 0x39, 0x10, 0x09, + 0x32, 0x18, 0x23, 0x1F, 0x3B, 0x13, 0x38, 0x0F, 0x31, 0x1E, 0x12, 0x0E, 0x1D, 0x0D, 0x0C, 0x0B }; + + public static long HighestOneBit(long i) + { + return (long)HighestOneBit((ulong)i); + } + + [CLSCompliant(false)] + public static ulong HighestOneBit(ulong i) + { + i |= i >> 1; + i |= i >> 2; + i |= i >> 4; + i |= i >> 8; + i |= i >> 16; + i |= i >> 32; + return i - (i >> 1); + } + + public static long LowestOneBit(long i) + { + return i & -i; + } + + [CLSCompliant(false)] + public static ulong LowestOneBit(ulong i) + { + return (ulong)LowestOneBit((long)i); + } + + public static int NumberOfLeadingZeros(long i) + { +#if NETCOREAPP3_0_OR_GREATER + if (Lzcnt.X64.IsSupported) + { + return (int)Lzcnt.X64.LeadingZeroCount((ulong)i); + } +#endif + + int x = (int)(i >> 32), n = 0; + if (x == 0) + { + n = 32; + x = (int)i; + } + return n + Integers.NumberOfLeadingZeros(x); + } + + public static int NumberOfTrailingZeros(long i) + { +#if NETCOREAPP3_0_OR_GREATER + if (Bmi1.X64.IsSupported) + { + return (int)Bmi1.X64.TrailingZeroCount((ulong)i); + } +#endif + + int n = DeBruijnTZ[(uint)((ulong)((i & -i) * 0x045FBAC7992A70DAL) >> 58)]; + long m = (((i & 0xFFFFFFFFL) | (long)((ulong)i >> 32)) - 1L) >> 63; + return n - (int)m; + } + + public static long Reverse(long i) + { + return (long)Reverse((ulong)i); + } + + [CLSCompliant(false)] + public static ulong Reverse(ulong i) + { + i = Bits.BitPermuteStepSimple(i, 0x5555555555555555UL, 1); + i = Bits.BitPermuteStepSimple(i, 0x3333333333333333UL, 2); + i = Bits.BitPermuteStepSimple(i, 0x0F0F0F0F0F0F0F0FUL, 4); + return ReverseBytes(i); + } + + public static long ReverseBytes(long i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return (long)ReverseBytes((ulong)i); +#endif + } + + [CLSCompliant(false)] + public static ulong ReverseBytes(ulong i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return RotateLeft(i & 0xFF000000FF000000UL, 8) | + RotateLeft(i & 0x00FF000000FF0000UL, 24) | + RotateLeft(i & 0x0000FF000000FF00UL, 40) | + RotateLeft(i & 0x000000FF000000FFUL, 56); +#endif + } + + public static long RotateLeft(long i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return (long)BitOperations.RotateLeft((ulong)i, distance); +#else + return (i << distance) | (long)((ulong)i >> -distance); +#endif + } + + [CLSCompliant(false)] + public static ulong RotateLeft(ulong i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return BitOperations.RotateLeft(i, distance); +#else + return (i << distance) | (i >> -distance); +#endif + } + + public static long RotateRight(long i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return (long)BitOperations.RotateRight((ulong)i, distance); +#else + return (long)((ulong)i >> distance) | (i << -distance); +#endif + } + + [CLSCompliant(false)] + public static ulong RotateRight(ulong i, int distance) + { +#if NETCOREAPP3_0_OR_GREATER + return BitOperations.RotateRight(i, distance); +#else + return (i >> distance) | (i << -distance); +#endif + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs.meta new file mode 100644 index 00000000..1517d301 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 25313d245cd61e24ab01d489e565bc05 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Longs.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs new file mode 100644 index 00000000..9062b4a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs @@ -0,0 +1,42 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + /** + * Exception to be thrown on a failure to reset an object implementing Memoable. + *

    + * The exception extends InvalidCastException to enable users to have a single handling case, + * only introducing specific handling of this one if required. + *

    + */ + [Serializable] + public class MemoableResetException + : InvalidCastException + { + public MemoableResetException() + : base() + { + } + + public MemoableResetException(string message) + : base(message) + { + } + + public MemoableResetException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected MemoableResetException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs.meta new file mode 100644 index 00000000..583ca5f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: abda8fbda66938e46b85d0ff89dec2c1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/MemoableResetException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs new file mode 100644 index 00000000..f10ebd9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs @@ -0,0 +1,14 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public static class Objects + { + public static int GetHashCode(object obj) + { + return null == obj ? 0 : obj.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs.meta new file mode 100644 index 00000000..cf9ebc74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 90178b5c5561bca46b329659a9ab1e71 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Objects.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs new file mode 100644 index 00000000..4b981792 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + internal static class Platform + { + private static readonly CompareInfo InvariantCompareInfo = CultureInfo.InvariantCulture.CompareInfo; + + internal static bool EqualsIgnoreCase(string a, string b) + { + return string.Equals(a, b, StringComparison.OrdinalIgnoreCase); + } + + internal static string GetEnvironmentVariable(string variable) + { + try + { + return Environment.GetEnvironmentVariable(variable); + } + catch (System.Security.SecurityException) + { + // We don't have the required permission to read this environment variable, + // which is fine, just act as if it's not set + return null; + } + } + + internal static int IndexOf(string source, char value) + { + return InvariantCompareInfo.IndexOf(source, value, CompareOptions.Ordinal); + } + + internal static int IndexOf(string source, string value) + { + return InvariantCompareInfo.IndexOf(source, value, CompareOptions.Ordinal); + } + + internal static int IndexOf(string source, char value, int startIndex) + { + return InvariantCompareInfo.IndexOf(source, value, startIndex, CompareOptions.Ordinal); + } + + internal static int IndexOf(string source, string value, int startIndex) + { + return InvariantCompareInfo.IndexOf(source, value, startIndex, CompareOptions.Ordinal); + } + + internal static int LastIndexOf(string source, string value) + { + return InvariantCompareInfo.LastIndexOf(source, value, CompareOptions.Ordinal); + } + + internal static bool StartsWith(string source, string prefix) + { + return InvariantCompareInfo.IsPrefix(source, prefix, CompareOptions.Ordinal); + } + + internal static bool EndsWith(string source, string suffix) + { + return InvariantCompareInfo.IsSuffix(source, suffix, CompareOptions.Ordinal); + } + + internal static string GetTypeName(object obj) + { + return obj.GetType().FullName; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs.meta new file mode 100644 index 00000000..4ee2bf04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8b2f0d2cbaad8924da704f961e0c0435 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Platform.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs new file mode 100644 index 00000000..754c0a70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs @@ -0,0 +1,58 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + public static class Shorts + { + public const int NumBits = 16; + public const int NumBytes = 2; + + public static short ReverseBytes(short i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return RotateLeft(i, 8); +#endif + } + + [CLSCompliant(false)] + public static ushort ReverseBytes(ushort i) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return BinaryPrimitives.ReverseEndianness(i); +#else + return RotateLeft(i, 8); +#endif + } + + public static short RotateLeft(short i, int distance) + { + return (short)RotateLeft((ushort)i, distance); + } + + [CLSCompliant(false)] + public static ushort RotateLeft(ushort i, int distance) + { + return (ushort)((i << distance) | (i >> (16 - distance))); + } + + public static short RotateRight(short i, int distance) + { + return (short)RotateRight((ushort)i, distance); + } + + [CLSCompliant(false)] + public static ushort RotateRight(ushort i, int distance) + { + return (ushort)((i >> distance) | (i << (16 - distance))); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs.meta new file mode 100644 index 00000000..9e67a0c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2b5ae23859624b949ab387d8e4bdab5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Shorts.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs new file mode 100644 index 00000000..c6e87e25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs @@ -0,0 +1,46 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System; +using System.Runtime.CompilerServices; + +//#nullable enable + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + internal static class Spans + { + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void CopyFrom(this Span output, ReadOnlySpan input) + { + input[..output.Length].CopyTo(output); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static Span FromNullable(T[]? array) + { + return array == null ? Span.Empty : array.AsSpan(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static Span FromNullable(T[]? array, int start) + { + return array == null ? Span.Empty : array.AsSpan(start); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ReadOnlySpan FromNullableReadOnly(T[]? array) + { + return array == null ? Span.Empty : array.AsSpan(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static ReadOnlySpan FromNullableReadOnly(T[]? array, int start) + { + return array == null ? Span.Empty : array.AsSpan(start); + } + } +} +#endif +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs.meta new file mode 100644 index 00000000..2b4b254b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 18f39fb7d39fd96488c7507e451b68ab +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Spans.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs new file mode 100644 index 00000000..904cba56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs @@ -0,0 +1,83 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities +{ + /// General string utilities. + public static class Strings + { + internal static bool IsOneOf(string s, params string[] candidates) + { + foreach (string candidate in candidates) + { + if (s == candidate) + return true; + } + return false; + } + + public static string FromByteArray(byte[] bs) + { + char[] cs = new char[bs.Length]; + for (int i = 0; i < cs.Length; ++i) + { + cs[i] = Convert.ToChar(bs[i]); + } + return new string(cs); + } + + public static byte[] ToByteArray(char[] cs) + { + byte[] bs = new byte[cs.Length]; + for (int i = 0; i < bs.Length; ++i) + { + bs[i] = Convert.ToByte(cs[i]); + } + return bs; + } + + public static byte[] ToByteArray(string s) + { + byte[] bs = new byte[s.Length]; + for (int i = 0; i < bs.Length; ++i) + { + bs[i] = Convert.ToByte(s[i]); + } + return bs; + } + + public static string FromAsciiByteArray(byte[] bytes) + { + return Encoding.ASCII.GetString(bytes); + } + + public static byte[] ToAsciiByteArray(char[] cs) + { + return Encoding.ASCII.GetBytes(cs); + } + + public static byte[] ToAsciiByteArray(string s) + { + return Encoding.ASCII.GetBytes(s); + } + + public static string FromUtf8ByteArray(byte[] bytes) + { + return Encoding.UTF8.GetString(bytes); + } + + public static byte[] ToUtf8ByteArray(char[] cs) + { + return Encoding.UTF8.GetBytes(cs); + } + + public static byte[] ToUtf8ByteArray(string s) + { + return Encoding.UTF8.GetBytes(s); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs.meta new file mode 100644 index 00000000..fdc9623e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 659c0c708dc43994980d08114bd2da8d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/Strings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2.meta new file mode 100644 index 00000000..d7c11c2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8af2c152b28e3264aaa586b7072d808b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs new file mode 100644 index 00000000..bb2f1057 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs @@ -0,0 +1,51 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +/* + * This package is based on the work done by Keiron Liddle, Aftex Software + * to whom the Ant project is very grateful for his + * great code. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2 +{ + /** + * Base class for both the compress and decompress classes. + * Holds common arrays, and static data. + * + * @author Keiron Liddle + */ + public class BZip2Constants + { + public const int baseBlockSize = 100000; + public const int MAX_ALPHA_SIZE = 258; + public const int MAX_CODE_LEN = 20; + public const int MAX_CODE_LEN_GEN = 17; + public const int RUNA = 0; + public const int RUNB = 1; + public const int N_GROUPS = 6; + public const int G_SIZE = 50; + public const int N_ITERS = 4; + public const int MAX_SELECTORS = 2 + (900000 / G_SIZE); + public const int NUM_OVERSHOOT_BYTES = 20; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs.meta new file mode 100644 index 00000000..41fd7f8d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6136f863c56a5974d91f7bfd70bd79f3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/BZip2Constants.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs new file mode 100644 index 00000000..7c515544 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs @@ -0,0 +1,813 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +/* + * This package is based on the work done by Keiron Liddle, Aftex Software + * to whom the Ant project is very grateful for his + * great code. + */ + +using System; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2 +{ + /** + * An input stream that decompresses from the BZip2 format (with the file + * header chars) to be read as any other stream. + * + * @author Keiron Liddle + * + * NB: note this class has been modified to read the leading BZ from the + * start of the BZIP2 stream to make it compatible with other PGP programs. + */ + public class CBZip2InputStream + : BaseInputStream + { + /* + index of the last char in the block, so + the block size == last + 1. + */ + private int last; + + /* + index in zptr[] of original string after sorting. + */ + private int origPtr; + + /* + always: in the range 0 .. 9. + The current block size is 100000 * this number. + */ + private int blockSize100k; + + private int bsBuff; + private int bsLive; + private readonly CRC m_blockCrc = new CRC(); + + private int nInUse; + + private byte[] seqToUnseq = new byte[256]; + + private byte[] m_selectors = new byte[BZip2Constants.MAX_SELECTORS]; + + private int[] tt; + private byte[] ll8; + + /* + freq table collected to save a pass over the data + during decompression. + */ + private int[] unzftab = new int[256]; + + private int[][] limit = CreateIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_CODE_LEN + 1); + private int[][] basev = CreateIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_CODE_LEN + 1); + private int[][] perm = CreateIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE); + private int[] minLens = new int[BZip2Constants.N_GROUPS]; + + private Stream bsStream; + + private bool streamEnd = false; + + private int currentByte = -1; + + private const int RAND_PART_B_STATE = 1; + private const int RAND_PART_C_STATE = 2; + private const int NO_RAND_PART_B_STATE = 3; + private const int NO_RAND_PART_C_STATE = 4; + + private int currentState = 0; + + private int m_expectedBlockCrc, m_expectedStreamCrc, m_streamCrc; + + int i2, count, chPrev, ch2; + int i, tPos; + int rNToGo = 0; + int rTPos = 0; + int j2; + int z; + + public CBZip2InputStream(Stream zStream) + { + ll8 = null; + tt = null; + bsStream = zStream; + bsLive = 0; + bsBuff = 0; + + int magic1 = bsStream.ReadByte(); + int magic2 = bsStream.ReadByte(); + int version = bsStream.ReadByte(); + int level = bsStream.ReadByte(); + if (level < 0) + throw new EndOfStreamException(); + + if (magic1 != 'B' | magic2 != 'Z' | version != 'h' | level < '1' | level > '9') + throw new IOException("Invalid stream header"); + + blockSize100k = level - '0'; + + int n = BZip2Constants.baseBlockSize * blockSize100k; + ll8 = new byte[n]; + tt = new int[n]; + + m_streamCrc = 0; + + BeginBlock(); + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + /* + * TODO The base class implementation allows to return partial data if/when ReadByte throws. That would be + * be preferable here too (so don't override), but it would require that exceptions cause this instance to + * permanently fail, and that needs review. + */ + int pos = 0; + while (pos < count) + { + int b = ReadByte(); + if (b < 0) + break; + + buffer[offset + pos++] = (byte)b; + } + return pos; + } + + public override int ReadByte() + { + if (streamEnd) + return -1; + + int result = currentByte; + switch (currentState) + { + case RAND_PART_B_STATE: + SetupRandPartB(); + break; + case RAND_PART_C_STATE: + SetupRandPartC(); + break; + case NO_RAND_PART_B_STATE: + SetupNoRandPartB(); + break; + case NO_RAND_PART_C_STATE: + SetupNoRandPartC(); + break; + default: + throw new InvalidOperationException(); + } + return result; + } + + private void BeginBlock() + { + long magic48 = BsGetLong48(); + if (magic48 != 0x314159265359L) + { + if (magic48 != 0x177245385090L) + throw new IOException("Block header error"); + + m_expectedStreamCrc = BsGetInt32(); + if (m_expectedStreamCrc != m_streamCrc) + throw new IOException("Stream CRC error"); + + BsFinishedWithStream(); + streamEnd = true; + return; + } + + m_expectedBlockCrc = BsGetInt32(); + + bool blockRandomised = BsGetBit() == 1; + + GetAndMoveToFrontDecode(); + + m_blockCrc.Initialise(); + + int[] cftab = new int[257]; + { + int accum = 0; + cftab[0] = 0; + for (i = 0; i < 256; ++i) + { + accum += unzftab[i]; + cftab[i + 1] = accum; + } + if (accum != (last + 1)) + throw new InvalidOperationException(); + } + + for (i = 0; i <= last; i++) + { + byte ch = ll8[i]; + tt[cftab[ch]++] = i; + } + + tPos = tt[origPtr]; + + count = 0; + i2 = 0; + ch2 = 256; /* not a char and not EOF */ + + if (blockRandomised) + { + rNToGo = 0; + rTPos = 0; + SetupRandPartA(); + } + else + { + SetupNoRandPartA(); + } + } + + private void EndBlock() + { + int blockFinalCrc = m_blockCrc.GetFinal(); + if (m_expectedBlockCrc != blockFinalCrc) + throw new IOException("Block CRC error"); + + m_streamCrc = Integers.RotateLeft(m_streamCrc, 1) ^ blockFinalCrc; + } + + private void BsFinishedWithStream() + { + try + { + if (this.bsStream != null) + { + this.bsStream.Dispose(); + this.bsStream = null; + } + } + catch + { + //ignore + } + } + + private int BsGetBit() + { + if (bsLive == 0) + { + bsBuff = RequireByte(); + bsLive = 7; + return (int)((uint)bsBuff >> 7); + } + + --bsLive; + + return (bsBuff >> bsLive) & 1; + } + + private int BsGetBits(int n) + { + Debug.Assert(1 <= n && n <= 24); + + while (bsLive < n) + { + bsBuff = (bsBuff << 8) | RequireByte(); + bsLive += 8; + } + + bsLive -= n; + + return (bsBuff >> bsLive) & ((1 << n) - 1); + } + + private int BsGetBitsSmall(int n) + { + Debug.Assert(1 <= n && n <= 8); + + if (bsLive < n) + { + bsBuff = (bsBuff << 8) | RequireByte(); + bsLive += 8; + } + + bsLive -= n; + + return (bsBuff >> bsLive) & ((1 << n) - 1); + } + + private int BsGetInt32() + { + int u = BsGetBits(16) << 16; + return u | BsGetBits(16); + } + + private long BsGetLong48() + { + long u = (long)BsGetBits(24) << 24; + return u | (long)BsGetBits(24); + } + + private void HbCreateDecodeTables(int[] limit, int[] basev, int[] perm, byte[] length, int minLen, int maxLen, + int alphaSize) + { + Array.Clear(basev, 0, basev.Length); + Array.Clear(limit, 0, limit.Length); + + int pp = 0, baseVal = 0; + for (int i = minLen; i <= maxLen; i++) + { + for (int j = 0; j < alphaSize; j++) + { + if (length[j] == i) + { + perm[pp++] = j; + } + } + basev[i] = baseVal; + limit[i] = baseVal + pp; + baseVal += baseVal + pp; + } + } + + private int RecvDecodingTables() + { + int i, j; + + nInUse = 0; + + /* Receive the mapping table */ + int inUse16 = BsGetBits(16); + + for (i = 0; i < 16; ++i) + { + if ((inUse16 & (0x8000 >> i)) != 0) + { + int inUse = BsGetBits(16); + + int i16 = i * 16; + for (j = 0; j < 16; ++j) + { + if ((inUse & (0x8000 >> j)) != 0) + { + seqToUnseq[nInUse++] = (byte)(i16 + j); + } + } + } + } + + if (nInUse < 1) + throw new InvalidOperationException(); + + int alphaSize = nInUse + 2; + + /* Now the selectors */ + int nGroups = BsGetBitsSmall(3); + if (nGroups < 2 || nGroups > BZip2Constants.N_GROUPS) + throw new InvalidOperationException(); + + int nSelectors = BsGetBits(15); + if (nSelectors < 1) + throw new InvalidOperationException(); + + uint mtfGroups = 0x00543210U; + for (i = 0; i < nSelectors; i++) + { + int mtfSelector = 0; + while (BsGetBit() == 1) + { + if (++mtfSelector >= nGroups) + throw new InvalidOperationException(); + } + + // Ignore declared selectors in excess of the maximum usable number + if (i >= BZip2Constants.MAX_SELECTORS) + continue; + + // Undo the MTF value for the selector. + switch (mtfSelector) + { + case 0: + break; + case 1: + mtfGroups = (mtfGroups >> 4) & 0x00000FU | (mtfGroups << 4) & 0x0000F0U | mtfGroups & 0xFFFF00U; + break; + case 2: + mtfGroups = (mtfGroups >> 8) & 0x00000FU | (mtfGroups << 4) & 0x000FF0U | mtfGroups & 0xFFF000U; + break; + case 3: + mtfGroups = (mtfGroups >> 12) & 0x00000FU | (mtfGroups << 4) & 0x00FFF0U | mtfGroups & 0xFF0000U; + break; + case 4: + mtfGroups = (mtfGroups >> 16) & 0x00000FU | (mtfGroups << 4) & 0x0FFFF0U | mtfGroups & 0xF00000U; + break; + case 5: + mtfGroups = (mtfGroups >> 20) & 0x00000FU | (mtfGroups << 4) & 0xFFFFF0U; + break; + default: + throw new InvalidOperationException(); + } + + m_selectors[i] = (byte)(mtfGroups & 0xF); + } + + byte[] len_t = new byte[alphaSize]; + + /* Now the coding tables */ + for (int t = 0; t < nGroups; t++) + { + int maxLen = 0, minLen = 32; + int curr = BsGetBitsSmall(5); + if ((curr < 1) | (curr > BZip2Constants.MAX_CODE_LEN)) + throw new InvalidOperationException(); + + for (i = 0; i < alphaSize; i++) + { + int markerBit = BsGetBit(); + while (markerBit != 0) + { + int nextTwoBits = BsGetBitsSmall(2); + curr += 1 - (nextTwoBits & 2); + if ((curr < 1) | (curr > BZip2Constants.MAX_CODE_LEN)) + throw new InvalidOperationException(); + markerBit = nextTwoBits & 1; + } + + len_t[i] = (byte)curr; + maxLen = System.Math.Max(maxLen, curr); + minLen = System.Math.Min(minLen, curr); + } + + /* Create the Huffman decoding tables */ + HbCreateDecodeTables(limit[t], basev[t], perm[t], len_t, minLen, maxLen, alphaSize); + minLens[t] = minLen; + } + + return nSelectors; + } + + private void GetAndMoveToFrontDecode() + { + int i, j, nextSym; + + int limitLast = BZip2Constants.baseBlockSize * blockSize100k; + + origPtr = BsGetBits(24); + if (origPtr > 10 + limitLast) + throw new InvalidOperationException(); + + int nSelectors = RecvDecodingTables(); + + int alphaSize = nInUse + 2; + int EOB = nInUse + 1; + + /* + Setting up the unzftab entries here is not strictly + necessary, but it does save having to do it later + in a separate pass, and so saves a block's worth of + cache misses. + */ + Array.Clear(unzftab, 0, unzftab.Length); + + byte[] yy = new byte[nInUse]; + for (i = 0; i < nInUse; ++i) + { + yy[i] = seqToUnseq[i]; + } + + last = -1; + + int groupNo = 0; + int groupPos = BZip2Constants.G_SIZE - 1; + int groupSel = m_selectors[groupNo]; + int groupMinLen = minLens[groupSel]; + int[] groupLimits = limit[groupSel]; + int[] groupPerm = perm[groupSel]; + int[] groupBase = basev[groupSel]; + + { + int zn = groupMinLen; + int zvec = BsGetBits(groupMinLen); + while (zvec >= groupLimits[zn]) + { + if (++zn > BZip2Constants.MAX_CODE_LEN) + throw new InvalidOperationException(); + + zvec = (zvec << 1) | BsGetBit(); + } + int permIndex = zvec - groupBase[zn]; + if (permIndex >= alphaSize) + throw new InvalidOperationException(); + + nextSym = groupPerm[permIndex]; + } + + while (nextSym != EOB) + { + //if (nextSym == BZip2Constants.RUNA || nextSym == BZip2Constants.RUNB) + if (nextSym <= BZip2Constants.RUNB) + { + int n = 1, s = 0; + do + { + if (n > 1024 * 1024) + throw new InvalidOperationException(); + + s += n << nextSym; + n <<= 1; + + { + if (groupPos == 0) + { + if (++groupNo >= nSelectors) + throw new InvalidOperationException(); + + groupPos = BZip2Constants.G_SIZE; + groupSel = m_selectors[groupNo]; + groupMinLen = minLens[groupSel]; + groupLimits = limit[groupSel]; + groupPerm = perm[groupSel]; + groupBase = basev[groupSel]; + } + groupPos--; + + int zn = groupMinLen; + int zvec = BsGetBits(groupMinLen); + while (zvec >= groupLimits[zn]) + { + if (++zn > BZip2Constants.MAX_CODE_LEN) + throw new InvalidOperationException(); + + zvec = (zvec << 1) | BsGetBit(); + } + int permIndex = zvec - groupBase[zn]; + if (permIndex >= alphaSize) + throw new InvalidOperationException(); + + nextSym = groupPerm[permIndex]; + } + } + //while (nextSym == BZip2Constants.RUNA || nextSym == BZip2Constants.RUNB); + while (nextSym <= BZip2Constants.RUNB); + + byte ch = yy[0]; + unzftab[ch] += s; + + if (last >= limitLast - s) + throw new InvalidOperationException("Block overrun"); + + while (--s >= 0) + { + ll8[++last] = ch; + } + + continue; + } + else + { + if (++last >= limitLast) + throw new InvalidOperationException("Block overrun"); + + byte tmp = yy[nextSym - 1]; + unzftab[tmp]++; + ll8[last] = tmp; + + /* + * This loop is hammered during decompression, hence avoid + * native method call overhead of Array.Copy for very + * small ranges to copy. + */ + if (nextSym <= 16) + { + for (j = nextSym - 1; j > 0; --j) + { + yy[j] = yy[j - 1]; + } + } + else + { + Array.Copy(yy, 0, yy, 1, nextSym - 1); + } + + yy[0] = tmp; + + { + if (groupPos == 0) + { + if (++groupNo >= nSelectors) + throw new InvalidOperationException(); + + groupPos = BZip2Constants.G_SIZE; + groupSel = m_selectors[groupNo]; + groupMinLen = minLens[groupSel]; + groupLimits = limit[groupSel]; + groupPerm = perm[groupSel]; + groupBase = basev[groupSel]; + } + groupPos--; + + int zn = groupMinLen; + int zvec = BsGetBits(groupMinLen); + while (zvec >= groupLimits[zn]) + { + if (++zn > BZip2Constants.MAX_CODE_LEN) + throw new InvalidOperationException(); + + zvec = (zvec << 1) | BsGetBit(); + } + int permIndex = zvec - groupBase[zn]; + if (permIndex >= alphaSize) + throw new InvalidOperationException(); + + nextSym = groupPerm[permIndex]; + } + continue; + } + } + + if (origPtr > last) + throw new InvalidOperationException(); + + // Check unzftab entries are in range. + { + int nblock = last + 1; + int check = 0; + + for (i = 0; i <= 255; i++) + { + int t = unzftab[i]; + check |= t; + check |= nblock - t; + } + if (check < 0) + throw new InvalidOperationException(); + } + } + + private int RequireByte() + { + int b = bsStream.ReadByte(); + if (b < 0) + throw new EndOfStreamException(); + return b & 0xFF; + } + + private void SetupRandPartA() + { + if (i2 <= last) + { + chPrev = ch2; + ch2 = ll8[tPos]; + tPos = tt[tPos]; + if (rNToGo == 0) + { + rNToGo = CBZip2OutputStream.RNums[rTPos++]; + rTPos &= 0x1FF; + } + rNToGo--; + ch2 ^= rNToGo == 1 ? 1 : 0; + i2++; + + currentByte = ch2; + currentState = RAND_PART_B_STATE; + m_blockCrc.Update((byte)ch2); + } + else + { + EndBlock(); + BeginBlock(); + } + } + + private void SetupNoRandPartA() + { + if (i2 <= last) + { + chPrev = ch2; + ch2 = ll8[tPos]; + tPos = tt[tPos]; + i2++; + + currentByte = ch2; + currentState = NO_RAND_PART_B_STATE; + m_blockCrc.Update((byte)ch2); + } + else + { + EndBlock(); + BeginBlock(); + } + } + + private void SetupRandPartB() + { + if (ch2 != chPrev) + { + count = 1; + SetupRandPartA(); + } + else if (++count < 4) + { + SetupRandPartA(); + } + else + { + z = ll8[tPos]; + tPos = tt[tPos]; + if (rNToGo == 0) + { + rNToGo = CBZip2OutputStream.RNums[rTPos++]; + rTPos &= 0x1FF; + } + rNToGo--; + z ^= rNToGo == 1 ? 1 : 0; + j2 = 0; + currentState = RAND_PART_C_STATE; + SetupRandPartC(); + } + } + + private void SetupNoRandPartB() + { + if (ch2 != chPrev) + { + count = 1; + SetupNoRandPartA(); + } + else if (++count < 4) + { + SetupNoRandPartA(); + } + else + { + z = ll8[tPos]; + tPos = tt[tPos]; + currentState = NO_RAND_PART_C_STATE; + j2 = 0; + SetupNoRandPartC(); + } + } + + private void SetupRandPartC() + { + if (j2 < z) + { + currentByte = ch2; + m_blockCrc.Update((byte)ch2); + j2++; + } + else + { + i2++; + count = 0; + SetupRandPartA(); + } + } + + private void SetupNoRandPartC() + { + if (j2 < z) + { + currentByte = ch2; + m_blockCrc.Update((byte)ch2); + j2++; + } + else + { + i2++; + count = 0; + SetupNoRandPartA(); + } + } + + internal static int[][] CreateIntArray(int n1, int n2) + { + int[][] a = new int[n1][]; + for (int k = 0; k < n1; ++k) + { + a[k] = new int[n2]; + } + return a; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs.meta new file mode 100644 index 00000000..399b5475 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8aab073bc541d945bb0f604da6a2e7e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2InputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs new file mode 100644 index 00000000..65bb4bac --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs @@ -0,0 +1,1623 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +/* + * This package is based on the work done by Keiron Liddle, Aftex Software + * to whom the Ant project is very grateful for his + * great code. + */ + +using System; +using System.Collections.Generic; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2 +{ + /** + * An output stream that compresses into the BZip2 format (with the file + * header chars) into another stream. + * + * @author Keiron Liddle + * + * TODO: Update to BZip2 1.0.1 + * NB: note this class has been modified to add a leading BZ to the + * start of the BZIP2 stream to make it compatible with other PGP programs. + */ + public class CBZip2OutputStream + : BaseOutputStream + { + protected const int SETMASK = 1 << 21; + protected const int CLEARMASK = ~SETMASK; + protected const int GREATER_ICOST = 15; + protected const int LESSER_ICOST = 0; + protected const int SMALL_THRESH = 20; + protected const int DEPTH_THRESH = 10; + + internal static readonly ushort[] RNums = { + 619, 720, 127, 481, 931, 816, 813, 233, 566, 247, 985, 724, 205, 454, 863, 491, 741, 242, 949, 214, 733, + 859, 335, 708, 621, 574, 73, 654, 730, 472, 419, 436, 278, 496, 867, 210, 399, 680, 480, 51, 878, 465, 811, + 169, 869, 675, 611, 697, 867, 561, 862, 687, 507, 283, 482, 129, 807, 591, 733, 623, 150, 238, 59, 379, 684, + 877, 625, 169, 643, 105, 170, 607, 520, 932, 727, 476, 693, 425, 174, 647, 73, 122, 335, 530, 442, 853, 695, + 249, 445, 515, 909, 545, 703, 919, 874, 474, 882, 500, 594, 612, 641, 801, 220, 162, 819, 984, 589, 513, + 495, 799, 161, 604, 958, 533, 221, 400, 386, 867, 600, 782, 382, 596, 414, 171, 516, 375, 682, 485, 911, + 276, 98, 553, 163, 354, 666, 933, 424, 341, 533, 870, 227, 730, 475, 186, 263, 647, 537, 686, 600, 224, 469, + 68, 770, 919, 190, 373, 294, 822, 808, 206, 184, 943, 795, 384, 383, 461, 404, 758, 839, 887, 715, 67, 618, + 276, 204, 918, 873, 777, 604, 560, 951, 160, 578, 722, 79, 804, 96, 409, 713, 940, 652, 934, 970, 447, 318, + 353, 859, 672, 112, 785, 645, 863, 803, 350, 139, 93, 354, 99, 820, 908, 609, 772, 154, 274, 580, 184, 79, + 626, 630, 742, 653, 282, 762, 623, 680, 81, 927, 626, 789, 125, 411, 521, 938, 300, 821, 78, 343, 175, 128, + 250, 170, 774, 972, 275, 999, 639, 495, 78, 352, 126, 857, 956, 358, 619, 580, 124, 737, 594, 701, 612, 669, + 112, 134, 694, 363, 992, 809, 743, 168, 974, 944, 375, 748, 52, 600, 747, 642, 182, 862, 81, 344, 805, 988, + 739, 511, 655, 814, 334, 249, 515, 897, 955, 664, 981, 649, 113, 974, 459, 893, 228, 433, 837, 553, 268, + 926, 240, 102, 654, 459, 51, 686, 754, 806, 760, 493, 403, 415, 394, 687, 700, 946, 670, 656, 610, 738, 392, + 760, 799, 887, 653, 978, 321, 576, 617, 626, 502, 894, 679, 243, 440, 680, 879, 194, 572, 640, 724, 926, 56, + 204, 700, 707, 151, 457, 449, 797, 195, 791, 558, 945, 679, 297, 59, 87, 824, 713, 663, 412, 693, 342, 606, + 134, 108, 571, 364, 631, 212, 174, 643, 304, 329, 343, 97, 430, 751, 497, 314, 983, 374, 822, 928, 140, 206, + 73, 263, 980, 736, 876, 478, 430, 305, 170, 514, 364, 692, 829, 82, 855, 953, 676, 246, 369, 970, 294, 750, + 807, 827, 150, 790, 288, 923, 804, 378, 215, 828, 592, 281, 565, 555, 710, 82, 896, 831, 547, 261, 524, 462, + 293, 465, 502, 56, 661, 821, 976, 991, 658, 869, 905, 758, 745, 193, 768, 550, 608, 933, 378, 286, 215, 979, + 792, 961, 61, 688, 793, 644, 986, 403, 106, 366, 905, 644, 372, 567, 466, 434, 645, 210, 389, 550, 919, 135, + 780, 773, 635, 389, 707, 100, 626, 958, 165, 504, 920, 176, 193, 713, 857, 265, 203, 50, 668, 108, 645, 990, + 626, 197, 510, 357, 358, 850, 858, 364, 936, 638 }; + + /* + * Knuth's increments seem to work better than Incerpi-Sedgewick here, possibly because the number of elements + * to sort is usually small, typically <= 20. + */ + private static readonly int[] Incs = { 1, 4, 13, 40, 121, 364, 1093, 3280, 9841, 29524, 88573, 265720, 797161, + 2391484 }; + + private bool finished; + + protected static void HbMakeCodeLengths(byte[] len, int[] freq, int alphaSize, int maxLen) + { + /* + Nodes and heap entries run from 1. Entry 0 + for both the heap and nodes is a sentinel. + */ + int[] heap = new int[BZip2Constants.MAX_ALPHA_SIZE + 2]; + int[] weight = new int[BZip2Constants.MAX_ALPHA_SIZE * 2]; + int[] parent = new int[BZip2Constants.MAX_ALPHA_SIZE * 2]; + + for (int i = 0; i < alphaSize; i++) + { + weight[i + 1] = (freq[i] == 0 ? 1 : freq[i]) << 8; + } + + while (true) + { + int nNodes = alphaSize; + int nHeap = 0; + + heap[0] = 0; + weight[0] = 0; + parent[0] = -2; + + for (int i = 1; i <= alphaSize; i++) + { + parent[i] = -1; + heap[++nHeap] = i; + { + int zz = nHeap; + int tmp = heap[zz]; + while (weight[tmp] < weight[heap[zz >> 1]]) + { + heap[zz] = heap[zz >> 1]; + zz >>= 1; + } + heap[zz] = tmp; + } + } + if (!(nHeap < (BZip2Constants.MAX_ALPHA_SIZE + 2))) + throw new InvalidOperationException(); + + while (nHeap > 1) + { + int n1 = heap[1]; + heap[1] = heap[nHeap--]; + { + int zz = 1; + int tmp = heap[zz]; + while (true) + { + int yy = zz << 1; + if (yy > nHeap) + break; + + if (yy < nHeap + && weight[heap[yy + 1]] < weight[heap[yy]]) + { + yy++; + } + + if (weight[tmp] < weight[heap[yy]]) + break; + + heap[zz] = heap[yy]; + zz = yy; + } + heap[zz] = tmp; + } + int n2 = heap[1]; + heap[1] = heap[nHeap--]; + { + int zz = 1; + int tmp = heap[zz]; + while (true) + { + int yy = zz << 1; + if (yy > nHeap) + break; + + if (yy < nHeap + && weight[heap[yy + 1]] < weight[heap[yy]]) + { + yy++; + } + + if (weight[tmp] < weight[heap[yy]]) + break; + + heap[zz] = heap[yy]; + zz = yy; + } + heap[zz] = tmp; + } + nNodes++; + parent[n1] = parent[n2] = nNodes; + + weight[nNodes] = (int)((uint)((weight[n1] & 0xffffff00) + + (weight[n2] & 0xffffff00)) + | (uint)(1 + (((weight[n1] & 0x000000ff) > + (weight[n2] & 0x000000ff)) ? + (weight[n1] & 0x000000ff) : + (weight[n2] & 0x000000ff)))); + + parent[nNodes] = -1; + heap[++nHeap] = nNodes; + { + int zz = nHeap; + int tmp = heap[zz]; + while (weight[tmp] < weight[heap[zz >> 1]]) + { + heap[zz] = heap[zz >> 1]; + zz >>= 1; + } + heap[zz] = tmp; + } + } + if (!(nNodes < (BZip2Constants.MAX_ALPHA_SIZE * 2))) + throw new InvalidOperationException(); + + //bool tooLong = false; + int tooLongBits = 0; + for (int i = 1; i <= alphaSize; i++) + { + int j = 0; + int k = i; + while (parent[k] >= 0) + { + k = parent[k]; + j++; + } + len[i - 1] = (byte)j; + //tooLong |= j > maxLen; + tooLongBits |= maxLen - j; + } + + //if (!tooLong) + if (tooLongBits >= 0) + break; + + for (int i = 1; i <= alphaSize; i++) + { + int j = weight[i] >> 8; + j = 1 + (j / 2); + weight[i] = j << 8; + } + } + } + + /* + * number of characters in the block + */ + int count; + + /* + index in zptr[] of original string after sorting. + */ + int origPtr; + + /* + always: in the range 0 .. 9. + The current block size is 100000 * this number. + */ + private readonly int blockSize100k; + private readonly int allowableBlockSize; + + bool blockRandomised; + private readonly IList blocksortStack = new List(); + + int bsBuff; + int bsLivePos; + private readonly CRC m_blockCrc = new CRC(); + + private bool[] inUse = new bool[256]; + private int nInUse; + + private byte[] m_selectors = new byte[BZip2Constants.MAX_SELECTORS]; + + private byte[] blockBytes; + private ushort[] quadrantShorts; + private int[] zptr; + private int[] szptr; + private int[] ftab; + + private int nMTF; + + private int[] mtfFreq = new int[BZip2Constants.MAX_ALPHA_SIZE]; + + /* + * Used when sorting. If too many long comparisons + * happen, we stop sorting, randomise the block + * slightly, and try again. + */ + private int workFactor; + private int workDone; + private int workLimit; + private bool firstAttempt; + + private int currentByte = -1; + private int runLength = 0; + private int m_streamCrc; + + public CBZip2OutputStream(Stream outStream) + : this(outStream, 9) + { + } + + public CBZip2OutputStream(Stream outStream, int blockSize) + { + blockBytes = null; + quadrantShorts = null; + zptr = null; + ftab = null; + + outStream.WriteByte((byte)'B'); + outStream.WriteByte((byte)'Z'); + + bsStream = outStream; + bsBuff = 0; + bsLivePos = 32; + + workFactor = 50; + if (blockSize > 9) + { + blockSize = 9; + } + else if (blockSize < 1) + { + blockSize = 1; + } + blockSize100k = blockSize; + + /* 20 is just a paranoia constant */ + allowableBlockSize = BZip2Constants.baseBlockSize * blockSize100k - 20; + + int n = BZip2Constants.baseBlockSize * blockSize100k; + blockBytes = new byte[(n + 1 + BZip2Constants.NUM_OVERSHOOT_BYTES)]; + quadrantShorts = new ushort[(n + 1 + BZip2Constants.NUM_OVERSHOOT_BYTES)]; + zptr = new int[n]; + ftab = new int[65537]; + + /* + The back end needs a place to store the MTF values + whilst it calculates the coding tables. We could + put them in the zptr array. However, these values + will fit in a short, so we overlay szptr at the + start of zptr, in the hope of reducing the number + of cache misses induced by the multiple traversals + of the MTF values when calculating coding tables. + Seems to improve compression speed by about 1%. + */ + // NOTE: We can't "overlay" in C#, so we just share zptr + szptr = zptr; + + // Write `magic' bytes h indicating file-format == huffmanised, followed by a digit indicating blockSize100k + outStream.WriteByte((byte)'h'); + outStream.WriteByte((byte)('0' + blockSize100k)); + + m_streamCrc = 0; + + InitBlock(); + } + + /** + * + * modified by Oliver Merkel, 010128 + * + */ + public override void WriteByte(byte value) + { + if (currentByte == value) + { + if (++runLength > 254) + { + WriteRun(); + currentByte = -1; + runLength = 0; + } + return; + } + + if (currentByte >= 0) + { + WriteRun(); + } + + currentByte = value; + runLength = 1; + } + + private void WriteRun() + { + if (count > allowableBlockSize) + { + EndBlock(); + InitBlock(); + } + + inUse[currentByte] = true; + + switch (runLength) + { + case 1: + blockBytes[++count] = (byte)currentByte; + m_blockCrc.Update((byte)currentByte); + break; + case 2: + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + m_blockCrc.Update((byte)currentByte); + m_blockCrc.Update((byte)currentByte); + break; + case 3: + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + m_blockCrc.Update((byte)currentByte); + m_blockCrc.Update((byte)currentByte); + m_blockCrc.Update((byte)currentByte); + break; + default: + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)currentByte; + blockBytes[++count] = (byte)(runLength - 4); + inUse[runLength - 4] = true; + m_blockCrc.UpdateRun((byte)currentByte, runLength); + break; + } + } + + bool closed = false; + + protected void Detach(bool disposing) + { + if (disposing) + { + if (!closed) + { + Finish(); + closed = true; + } + } + base.Dispose(disposing); + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + if (!closed) + { + Finish(); + closed = true; + this.bsStream.Dispose(); + } + } + base.Dispose(disposing); + } + + public void Finish() + { + if (finished) + return; + + if (runLength > 0) + { + WriteRun(); + } + currentByte = -1; + if (count > 0) + { + EndBlock(); + } + EndCompression(); + finished = true; + Flush(); + } + + public override void Flush() + { + bsStream.Flush(); + } + + private void InitBlock() + { + m_blockCrc.Initialise(); + count = 0; + + for (int i = 0; i < 256; i++) + { + inUse[i] = false; + } + } + + private void EndBlock() + { + int blockFinalCrc = m_blockCrc.GetFinal(); + m_streamCrc = Integers.RotateLeft(m_streamCrc, 1) ^ blockFinalCrc; + + /* sort the block and establish posn of original string */ + DoReversibleTransformation(); + + /* + A 6-byte block header, the value chosen arbitrarily + as 0x314159265359 :-). A 32 bit value does not really + give a strong enough guarantee that the value will not + appear by chance in the compressed datastream. Worst-case + probability of this event, for a 900k block, is about + 2.0e-3 for 32 bits, 1.0e-5 for 40 bits and 4.0e-8 for 48 bits. + For a compressed file of size 100Gb -- about 100000 blocks -- + only a 48-bit marker will do. NB: normal compression/ + decompression do *not* rely on these statistical properties. + They are only important when trying to recover blocks from + damaged files. + */ + BsPutLong48(0x314159265359L); + + /* Now the block's CRC, so it is in a known place. */ + BsPutInt32(blockFinalCrc); + + /* Now a single bit indicating randomisation. */ + BsPutBit(blockRandomised ? 1 : 0); + + /* Finally, block's contents proper. */ + MoveToFrontCodeAndSend(); + } + + private void EndCompression() + { + /* + Now another magic 48-bit number, 0x177245385090, to + indicate the end of the last block. (Sqrt(pi), if + you want to know. I did want to use e, but it contains + too much repetition -- 27 18 28 18 28 46 -- for me + to feel statistically comfortable. Call me paranoid.) + */ + BsPutLong48(0x177245385090L); + + BsPutInt32(m_streamCrc); + + BsFinishedWithStream(); + } + + private void HbAssignCodes(int[] code, byte[] length, int minLen, int maxLen, int alphaSize) + { + int vec = 0; + for (int n = minLen; n <= maxLen; n++) + { + for (int i = 0; i < alphaSize; i++) + { + if (length[i] == n) + { + code[i] = vec++; + } + } + vec <<= 1; + } + } + + private void BsFinishedWithStream() + { + if (bsLivePos < 32) + { + bsStream.WriteByte((byte)(bsBuff >> 24)); + bsBuff = 0; + bsLivePos = 32; + } + } + + private void BsPutBit(int v) + { + --bsLivePos; + bsBuff |= v << bsLivePos; + + if (bsLivePos <= 24) + { + bsStream.WriteByte((byte)(bsBuff >> 24)); + bsBuff <<= 8; + bsLivePos += 8; + } + } + + private void BsPutBits(int n, int v) + { + Debug.Assert(1 <= n && n <= 24); + + bsLivePos -= n; + bsBuff |= v << bsLivePos; + + while (bsLivePos <= 24) + { + bsStream.WriteByte((byte)(bsBuff >> 24)); + bsBuff <<= 8; + bsLivePos += 8; + } + } + + private void BsPutBitsSmall(int n, int v) + { + Debug.Assert(1 <= n && n <= 8); + + bsLivePos -= n; + bsBuff |= v << bsLivePos; + + if (bsLivePos <= 24) + { + bsStream.WriteByte((byte)(bsBuff >> 24)); + bsBuff <<= 8; + bsLivePos += 8; + } + } + + private void BsPutInt32(int u) + { + BsPutBits(16, (u >> 16) & 0xFFFF); + BsPutBits(16, u & 0xFFFF); + } + + private void BsPutLong48(long u) + { + BsPutBits(24, (int)(u >> 24) & 0xFFFFFF); + BsPutBits(24, (int)u & 0xFFFFFF); + } + + private void SendMtfValues() + { + + int v, t, i, j, bt, bc, iter; + + int alphaSize = nInUse + 2; + + /* Decide how many coding tables to use */ + if (nMTF <= 0) + throw new InvalidOperationException(); + + int nGroups; + if (nMTF < 200) + { + nGroups = 2; + } + else if (nMTF < 600) + { + nGroups = 3; + } + else if (nMTF < 1200) + { + nGroups = 4; + } + else if (nMTF < 2400) + { + nGroups = 5; + } + else + { + nGroups = 6; + } + + byte[][] len = CreateByteArray(nGroups, alphaSize); + for (t = 0; t < nGroups; t++) + { + Arrays.Fill(len[t], GREATER_ICOST); + } + + /* Generate an initial set of coding tables */ + { + int nPart = nGroups; + int remF = nMTF; + int ge = -1; + while (nPart > 0) + { + int gs = ge + 1; + int aFreq = 0, tFreq = remF / nPart; + while (aFreq < tFreq && ge < alphaSize - 1) + { + aFreq += mtfFreq[++ge]; + } + + if (ge > gs && nPart != nGroups && nPart != 1 + && ((nGroups - nPart) % 2 == 1)) + { + aFreq -= mtfFreq[ge--]; + } + + byte[] len_np = len[nPart - 1]; + for (v = 0; v < alphaSize; v++) + { + if (v >= gs && v <= ge) + { + len_np[v] = LESSER_ICOST; + } + else + { + len_np[v] = GREATER_ICOST; + } + } + + nPart--; + remF -= aFreq; + } + } + + int[][] rfreq = CBZip2InputStream.CreateIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE); + int[] fave = new int[BZip2Constants.N_GROUPS]; + short[] cost = new short[BZip2Constants.N_GROUPS]; + + // Iterate up to N_ITERS times to improve the tables. + int nSelectors = 0; + for (iter = 0; iter < BZip2Constants.N_ITERS; iter++) + { + for (t = 0; t < nGroups; t++) + { + fave[t] = 0; + + int[] rfreq_t = rfreq[t]; + for (v = 0; v < alphaSize; v++) + { + rfreq_t[v] = 0; + } + } + + nSelectors = 0; + int gs = 0; + while (gs < nMTF) + { + /* Set group start & end marks. */ + + /* + * Calculate the cost of this group as coded by each of the coding tables. + */ + + int ge = System.Math.Min(gs + BZip2Constants.G_SIZE - 1, nMTF - 1); + + if (nGroups == 6) + { + byte[] len_0 = len[0], len_1 = len[1], len_2 = len[2], len_3 = len[3], len_4 = len[4], len_5 = len[5]; + short cost0 = 0, cost1 = 0, cost2 = 0, cost3 = 0, cost4 = 0, cost5 = 0; + + for (i = gs; i <= ge; i++) + { + int icv = szptr[i]; + cost0 += len_0[icv]; + cost1 += len_1[icv]; + cost2 += len_2[icv]; + cost3 += len_3[icv]; + cost4 += len_4[icv]; + cost5 += len_5[icv]; + } + + cost[0] = cost0; + cost[1] = cost1; + cost[2] = cost2; + cost[3] = cost3; + cost[4] = cost4; + cost[5] = cost5; + } + else + { + for (t = 0; t < nGroups; t++) + { + cost[t] = 0; + } + + for (i = gs; i <= ge; i++) + { + int icv = szptr[i]; + for (t = 0; t < nGroups; t++) + { + cost[t] += len[t][icv]; + } + } + } + + /* + Find the coding table which is best for this group, + and record its identity in the selector table. + */ + bc = cost[0]; + bt = 0; + for (t = 1; t < nGroups; t++) + { + short cost_t = cost[t]; + if (cost_t < bc) + { + bc = cost_t; + bt = t; + } + } + fave[bt]++; + m_selectors[nSelectors] = (byte)bt; + nSelectors++; + + /* + Increment the symbol frequencies for the selected table. + */ + int[] rfreq_bt = rfreq[bt]; + for (i = gs; i <= ge; i++) + { + rfreq_bt[szptr[i]]++; + } + + gs = ge + 1; + } + + /* + Recompute the tables based on the accumulated frequencies. + */ + for (t = 0; t < nGroups; t++) + { + HbMakeCodeLengths(len[t], rfreq[t], alphaSize, BZip2Constants.MAX_CODE_LEN_GEN); + } + } + + if (nGroups >= 8 || nGroups > BZip2Constants.N_GROUPS) + throw new InvalidOperationException(); + if (nSelectors >= 32768 || nSelectors > BZip2Constants.MAX_SELECTORS) + throw new InvalidOperationException(); + + int[][] code = CBZip2InputStream.CreateIntArray(BZip2Constants.N_GROUPS, BZip2Constants.MAX_ALPHA_SIZE); + + /* Assign actual codes for the tables. */ + for (t = 0; t < nGroups; t++) + { + int maxLen = 0, minLen = 32; + byte[] len_t = len[t]; + for (i = 0; i < alphaSize; i++) + { + int lti = len_t[i]; + maxLen = System.Math.Max(maxLen, lti); + minLen = System.Math.Min(minLen, lti); + } + if (minLen < 1 | maxLen > BZip2Constants.MAX_CODE_LEN_GEN) + throw new InvalidOperationException(); + + HbAssignCodes(code[t], len_t, minLen, maxLen, alphaSize); + } + + /* Transmit the mapping table. */ + { + bool[] inUse16 = new bool[16]; + for (i = 0; i < 16; i++) + { + inUse16[i] = false; + int i16 = i * 16; + for (j = 0; j < 16; j++) + { + if (inUse[i16 + j]) + { + inUse16[i] = true; + break; + } + } + } + + for (i = 0; i < 16; i++) + { + BsPutBit(inUse16[i] ? 1 : 0); + } + + for (i = 0; i < 16; i++) + { + if (inUse16[i]) + { + int i16 = i * 16; + for (j = 0; j < 16; j++) + { + BsPutBit(inUse[i16 + j] ? 1 : 0); + } + } + } + } + + /* Now the selectors. */ + BsPutBitsSmall(3, nGroups); + BsPutBits(15, nSelectors); + { + int mtfSelectors = 0x00654321; + + for (i = 0; i < nSelectors; i++) + { + // Compute MTF value for the selector. + int ll_i = m_selectors[i]; + int bitPos = ll_i << 2; + int mtfSelector = (mtfSelectors >> bitPos) & 0xF; + + if (mtfSelector != 1) + { + int mtfIncMask = (0x00888888 - mtfSelectors + 0x00111111 * mtfSelector) & 0x00888888; + mtfSelectors = mtfSelectors - (mtfSelector << bitPos) + (mtfIncMask >> 3); + } + + BsPutBitsSmall(mtfSelector, (1 << mtfSelector) - 2); + } + } + + /* Now the coding tables. */ + for (t = 0; t < nGroups; t++) + { + byte[] len_t = len[t]; + int curr = len_t[0]; + BsPutBitsSmall(6, curr << 1); + for (i = 1; i < alphaSize; i++) + { + int lti = len_t[i]; + while (curr < lti) + { + BsPutBitsSmall(2, 2); + curr++; /* 10 */ + } + while (curr > lti) + { + BsPutBitsSmall(2, 3); + curr--; /* 11 */ + } + BsPutBit(0); + } + } + + /* And finally, the block data proper */ + { + int selCtr = 0; + int gs = 0; + while (gs < nMTF) + { + int ge = System.Math.Min(gs + BZip2Constants.G_SIZE - 1, nMTF - 1); + + int selector_selCtr = m_selectors[selCtr]; + byte[] len_selCtr = len[selector_selCtr]; + int[] code_selCtr = code[selector_selCtr]; + + for (i = gs; i <= ge; i++) + { + int sfmap_i = szptr[i]; + BsPutBits(len_selCtr[sfmap_i], code_selCtr[sfmap_i]); + } + + gs = ge + 1; + selCtr++; + } + if (selCtr != nSelectors) + throw new InvalidOperationException(); + } + } + + private void MoveToFrontCodeAndSend() + { + BsPutBits(24, origPtr); + GenerateMtfValues(); + SendMtfValues(); + } + + private Stream bsStream; + + private void SimpleSort(int lo, int hi, int d) + { + int i, j, h, v; + + int bigN = hi - lo + 1; + if (bigN < 2) + return; + + int hp = 0; + while (Incs[hp] < bigN) + { + hp++; + } + hp--; + + for (; hp >= 0; hp--) + { + h = Incs[hp]; + + i = lo + h; + while (i <= hi) + { + /* copy 1 */ + v = zptr[i]; + j = i; + while (FullGtU(zptr[j - h] + d, v + d)) + { + zptr[j] = zptr[j - h]; + j = j - h; + if (j <= (lo + h - 1)) + break; + } + zptr[j] = v; + + /* copy 2 */ + if (++i > hi) + break; + + v = zptr[i]; + j = i; + while (FullGtU(zptr[j - h] + d, v + d)) + { + zptr[j] = zptr[j - h]; + j = j - h; + if (j <= (lo + h - 1)) + break; + } + zptr[j] = v; + + /* copy 3 */ + if (++i > hi) + break; + + v = zptr[i]; + j = i; + while (FullGtU(zptr[j - h] + d, v + d)) + { + zptr[j] = zptr[j - h]; + j = j - h; + if (j <= (lo + h - 1)) + break; + } + zptr[j] = v; + i++; + + if (workDone > workLimit && firstAttempt) + return; + } + } + } + + private void Vswap(int p1, int p2, int n) + { + while (--n >= 0) + { + int t1 = zptr[p1], t2 = zptr[p2]; + zptr[p1++] = t2; + zptr[p2++] = t1; + } + } + + private int Med3(int a, int b, int c) + { + return a > b + ? (c < b ? b : c > a ? a : c) + : (c < a ? a : c > b ? b : c); + } + + internal class StackElem + { + internal int ll; + internal int hh; + internal int dd; + } + + private static void PushStackElem(IList stack, int stackCount, int ll, int hh, int dd) + { + StackElem stackElem; + if (stackCount < stack.Count) + { + stackElem = stack[stackCount]; + } + else + { + stackElem = new StackElem(); + stack.Add(stackElem); + } + + stackElem.ll = ll; + stackElem.hh = hh; + stackElem.dd = dd; + } + + private void QSort3(int loSt, int hiSt, int dSt) + { + int unLo, unHi, ltLo, gtHi, n, m; + + var stack = blocksortStack; + int stackCount = 0; + StackElem stackElem; + + int lo = loSt; + int hi = hiSt; + int d = dSt; + + for (;;) + { + if (hi - lo < SMALL_THRESH || d > DEPTH_THRESH) + { + SimpleSort(lo, hi, d); + if (stackCount < 1 || (workDone > workLimit && firstAttempt)) + return; + + stackElem = stack[--stackCount]; + lo = stackElem.ll; + hi = stackElem.hh; + d = stackElem.dd; + continue; + } + + int d1 = d + 1; + int med = Med3( + blockBytes[zptr[lo] + d1], + blockBytes[zptr[hi] + d1], + blockBytes[zptr[(lo + hi) >> 1] + d1]); + + unLo = ltLo = lo; + unHi = gtHi = hi; + + while (true) + { + while (unLo <= unHi) + { + int zUnLo = zptr[unLo]; + n = blockBytes[zUnLo + d1] - med; + if (n > 0) + break; + + if (n == 0) + { + zptr[unLo] = zptr[ltLo]; + zptr[ltLo++] = zUnLo; + } + unLo++; + } + while (unLo <= unHi) + { + int zUnHi = zptr[unHi]; + n = blockBytes[zUnHi + d1] - med; + if (n < 0) + break; + + if (n == 0) + { + zptr[unHi] = zptr[gtHi]; + zptr[gtHi--] = zUnHi; + } + unHi--; + } + if (unLo > unHi) + break; + + int temp = zptr[unLo]; + zptr[unLo++] = zptr[unHi]; + zptr[unHi--] = temp; + } + + if (gtHi < ltLo) + { + d = d1; + continue; + } + + n = System.Math.Min(ltLo - lo, unLo - ltLo); + Vswap(lo, unLo - n, n); + + m = System.Math.Min(hi - gtHi, gtHi - unHi); + Vswap(unLo, hi - m + 1, m); + + n = lo + (unLo - ltLo); + m = hi - (gtHi - unHi); + + PushStackElem(stack, stackCount++, lo, n - 1, d); + PushStackElem(stack, stackCount++, n, m, d1); + + lo = m + 1; + } + } + + private void MainSort() + { + int i, j, ss, sb; + int[] runningOrder = new int[256]; + int[] copy = new int[256]; + bool[] bigDone = new bool[256]; + int c1, c2; + + /* + In the various block-sized structures, live data runs + from 0 to last+NUM_OVERSHOOT_BYTES inclusive. First, + set up the overshoot area for block. + */ + for (i = 0; i < BZip2Constants.NUM_OVERSHOOT_BYTES; i++) + { + blockBytes[count + i + 1] = blockBytes[(i % count) + 1]; + } + for (i = 0; i <= count + BZip2Constants.NUM_OVERSHOOT_BYTES; i++) + { + quadrantShorts[i] = 0; + } + + blockBytes[0] = blockBytes[count]; + + if (count <= 4000) + { + /* + Use SimpleSort(), since the full sorting mechanism + has quite a large constant overhead. + */ + for (i = 0; i < count; i++) + { + zptr[i] = i; + } + firstAttempt = false; + workDone = workLimit = 0; + SimpleSort(0, count - 1, 0); + } + else + { + for (i = 0; i <= 255; i++) + { + bigDone[i] = false; + } + + for (i = 0; i <= 65536; i++) + { + ftab[i] = 0; + } + + c1 = blockBytes[0]; + for (i = 1; i <= count; i++) + { + c2 = blockBytes[i]; + ftab[(c1 << 8) + c2]++; + c1 = c2; + } + + for (i = 0; i < 65536; i++) + { + ftab[i + 1] += ftab[i]; + } + + c1 = blockBytes[1]; + for (i = 0; i < (count - 1); i++) + { + c2 = blockBytes[i + 2]; + j = (c1 << 8) + c2; + c1 = c2; + ftab[j]--; + zptr[ftab[j]] = i; + } + + j = ((int)blockBytes[count] << 8) + blockBytes[1]; + ftab[j]--; + zptr[ftab[j]] = count - 1; + + /* + Now ftab contains the first loc of every small bucket. + Calculate the running order, from smallest to largest + big bucket. + */ + + for (i = 0; i <= 255; i++) + { + runningOrder[i] = i; + } + + { + int h = 1; + do + { + h = 3 * h + 1; + } + while (h <= 256); + do + { + h = h / 3; + for (i = h; i <= 255; i++) + { + int vv = runningOrder[i]; + j = i; + while ((ftab[(runningOrder[j - h] + 1) << 8] - ftab[runningOrder[j - h] << 8]) + > (ftab[(vv + 1) << 8] - ftab[vv << 8])) + { + runningOrder[j] = runningOrder[j - h]; + j = j - h; + if (j < h) + break; + } + runningOrder[j] = vv; + } + } + while (h != 1); + } + + /* + The main sorting loop. + */ + for (i = 0; i <= 255; i++) + { + /* + Process big buckets, starting with the least full. + */ + ss = runningOrder[i]; + + /* + Complete the big bucket [ss] by quicksorting + any unsorted small buckets [ss, j]. Hopefully + previous pointer-scanning phases have already + completed many of the small buckets [ss, j], so + we don't have to sort them at all. + */ + for (j = 0; j <= 255; j++) + { + sb = (ss << 8) + j; + if ((ftab[sb] & SETMASK) != SETMASK) + { + int lo = ftab[sb] & CLEARMASK; + int hi = (ftab[sb + 1] & CLEARMASK) - 1; + if (hi > lo) + { + QSort3(lo, hi, 2); + if (workDone > workLimit && firstAttempt) + return; + } + ftab[sb] |= SETMASK; + } + } + + /* + The ss big bucket is now done. Record this fact, + and update the quadrant descriptors. Remember to + update quadrants in the overshoot area too, if + necessary. The "if (i < 255)" test merely skips + this updating for the last bucket processed, since + updating for the last bucket is pointless. + */ + bigDone[ss] = true; + + if (i < 255) + { + int bbStart = ftab[ss << 8] & CLEARMASK; + int bbSize = (ftab[(ss + 1) << 8] & CLEARMASK) - bbStart; + + int shifts = 0; + while ((bbSize >> shifts) > 65534) + { + shifts++; + } + + for (j = 0; j < bbSize; j++) + { + int a2update = zptr[bbStart + j] + 1; + ushort qVal = (ushort)(j >> shifts); + quadrantShorts[a2update] = qVal; + if (a2update <= BZip2Constants.NUM_OVERSHOOT_BYTES) + { + quadrantShorts[a2update + count] = qVal; + } + } + + if (!(((bbSize - 1) >> shifts) <= 65535)) + throw new InvalidOperationException(); + } + + /* + Now scan this big bucket so as to synthesise the + sorted order for small buckets [t, ss] for all t != ss. + */ + for (j = 0; j <= 255; j++) + { + copy[j] = ftab[(j << 8) + ss] & CLEARMASK; + } + + for (j = ftab[ss << 8] & CLEARMASK; + j < (ftab[(ss + 1) << 8] & CLEARMASK); j++) + { + int zptr_j = zptr[j]; + c1 = blockBytes[zptr_j]; + if (!bigDone[c1]) + { + zptr[copy[c1]] = (zptr_j == 0 ? count : zptr_j) - 1; + copy[c1]++; + } + } + + for (j = 0; j <= 255; j++) + { + ftab[(j << 8) + ss] |= SETMASK; + } + } + } + } + + private void RandomiseBlock() + { + for (int i = 0; i < 256; i++) + { + inUse[i] = false; + } + + int rNToGo = 0, rTPos = 0; + + for (int i = 1; i <= count; i++) + { + if (rNToGo == 0) + { + rNToGo = RNums[rTPos++]; + rTPos &= 0x1FF; + } + rNToGo--; + blockBytes[i] ^= (byte)(rNToGo == 1 ? 1 : 0); + + inUse[blockBytes[i]] = true; + } + } + + private void DoReversibleTransformation() + { + workLimit = workFactor * (count - 1); + workDone = 0; + blockRandomised = false; + firstAttempt = true; + + MainSort(); + + if (workDone > workLimit && firstAttempt) + { + RandomiseBlock(); + workLimit = workDone = 0; + blockRandomised = true; + firstAttempt = false; + MainSort(); + } + + origPtr = -1; + for (int i = 0; i < count; i++) + { + if (zptr[i] == 0) + { + origPtr = i; + break; + } + } + + if (origPtr == -1) + throw new InvalidOperationException(); + } + + private bool FullGtU(int i1, int i2) + { + int c1, c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + int k = count; + int s1, s2; + + do + { + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + s1 = quadrantShorts[i1]; + s2 = quadrantShorts[i2]; + if (s1 != s2) + return s1 > s2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + s1 = quadrantShorts[i1]; + s2 = quadrantShorts[i2]; + if (s1 != s2) + return s1 > s2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + s1 = quadrantShorts[i1]; + s2 = quadrantShorts[i2]; + if (s1 != s2) + return s1 > s2; + + c1 = blockBytes[++i1]; + c2 = blockBytes[++i2]; + if (c1 != c2) + return c1 > c2; + + s1 = quadrantShorts[i1]; + s2 = quadrantShorts[i2]; + if (s1 != s2) + return s1 > s2; + + if (i1 >= count) + { + i1 -= count; + } + if (i2 >= count) + { + i2 -= count; + } + + k -= 4; + workDone++; + } + while (k >= 0); + + return false; + } + + private void GenerateMtfValues() + { + int i; + + nInUse = 0; + + byte[] yy = new byte[256]; + for (i = 0; i < 256; i++) + { + if (inUse[i]) + { + yy[nInUse++] = (byte)i; + } + } + + int EOB = nInUse + 1; + + for (i = 0; i <= EOB; i++) + { + mtfFreq[i] = 0; + } + + int wr = 0, zPend = 0; + for (i = 0; i < count; i++) + { + byte blockByte = blockBytes[zptr[i]]; + + byte tmp = yy[0]; + if (blockByte == tmp) + { + zPend++; + continue; + } + + int sym = 1; + do + { + byte tmp2 = tmp; + tmp = yy[sym]; + yy[sym++] = tmp2; + } + while (blockByte != tmp); + yy[0] = tmp; + + while (zPend > 0) + { + // RUNA or RUNB + int run = --zPend & 1; + szptr[wr++] = run; + mtfFreq[run]++; + zPend >>= 1; + } + + szptr[wr++] = sym; + mtfFreq[sym]++; + } + + while (zPend > 0) + { + // RUNA or RUNB + int run = --zPend & 1; + szptr[wr++] = run; + mtfFreq[run]++; + zPend >>= 1; + } + + szptr[wr++] = EOB; + mtfFreq[EOB]++; + + nMTF = wr; + } + + internal static byte[][] CreateByteArray(int n1, int n2) + { + byte[][] a = new byte[n1][]; + for (int k = 0; k < n1; ++k) + { + a[k] = new byte[n2]; + } + return a; + } + } + + public class CBZip2OutputStreamLeaveOpen + : CBZip2OutputStream + { + public CBZip2OutputStreamLeaveOpen(Stream outStream) + : base(outStream) + { + } + + public CBZip2OutputStreamLeaveOpen(Stream outStream, int blockSize) + : base(outStream, blockSize) + { + } + + protected override void Dispose(bool disposing) + { + Detach(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs.meta new file mode 100644 index 00000000..d557b640 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f52b7adccce60e2458fcffa02a148187 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CBZip2OutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs new file mode 100644 index 00000000..c261906e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs @@ -0,0 +1,162 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +/* + * This package is based on the work done by Keiron Liddle), Aftex Software + * to whom the Ant project is very grateful for his + * great code. + */ + +using System.Diagnostics; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Bzip2 +{ + /** + * A simple class the hold and calculate the CRC for sanity checking + * of the data. + * + * @author Keiron Liddle + */ + internal class CRC + { + // Values are byte-reversed + private static readonly uint[] Crc32Table = { + 0x00000000, 0xB71DC104, 0x6E3B8209, 0xD926430D, + 0xDC760413, 0x6B6BC517, 0xB24D861A, 0x0550471E, + 0xB8ED0826, 0x0FF0C922, 0xD6D68A2F, 0x61CB4B2B, + 0x649B0C35, 0xD386CD31, 0x0AA08E3C, 0xBDBD4F38, + 0x70DB114C, 0xC7C6D048, 0x1EE09345, 0xA9FD5241, + 0xACAD155F, 0x1BB0D45B, 0xC2969756, 0x758B5652, + 0xC836196A, 0x7F2BD86E, 0xA60D9B63, 0x11105A67, + 0x14401D79, 0xA35DDC7D, 0x7A7B9F70, 0xCD665E74, + 0xE0B62398, 0x57ABE29C, 0x8E8DA191, 0x39906095, + 0x3CC0278B, 0x8BDDE68F, 0x52FBA582, 0xE5E66486, + 0x585B2BBE, 0xEF46EABA, 0x3660A9B7, 0x817D68B3, + 0x842D2FAD, 0x3330EEA9, 0xEA16ADA4, 0x5D0B6CA0, + 0x906D32D4, 0x2770F3D0, 0xFE56B0DD, 0x494B71D9, + 0x4C1B36C7, 0xFB06F7C3, 0x2220B4CE, 0x953D75CA, + 0x28803AF2, 0x9F9DFBF6, 0x46BBB8FB, 0xF1A679FF, + 0xF4F63EE1, 0x43EBFFE5, 0x9ACDBCE8, 0x2DD07DEC, + 0x77708634, 0xC06D4730, 0x194B043D, 0xAE56C539, + 0xAB068227, 0x1C1B4323, 0xC53D002E, 0x7220C12A, + 0xCF9D8E12, 0x78804F16, 0xA1A60C1B, 0x16BBCD1F, + 0x13EB8A01, 0xA4F64B05, 0x7DD00808, 0xCACDC90C, + 0x07AB9778, 0xB0B6567C, 0x69901571, 0xDE8DD475, + 0xDBDD936B, 0x6CC0526F, 0xB5E61162, 0x02FBD066, + 0xBF469F5E, 0x085B5E5A, 0xD17D1D57, 0x6660DC53, + 0x63309B4D, 0xD42D5A49, 0x0D0B1944, 0xBA16D840, + 0x97C6A5AC, 0x20DB64A8, 0xF9FD27A5, 0x4EE0E6A1, + 0x4BB0A1BF, 0xFCAD60BB, 0x258B23B6, 0x9296E2B2, + 0x2F2BAD8A, 0x98366C8E, 0x41102F83, 0xF60DEE87, + 0xF35DA999, 0x4440689D, 0x9D662B90, 0x2A7BEA94, + 0xE71DB4E0, 0x500075E4, 0x892636E9, 0x3E3BF7ED, + 0x3B6BB0F3, 0x8C7671F7, 0x555032FA, 0xE24DF3FE, + 0x5FF0BCC6, 0xE8ED7DC2, 0x31CB3ECF, 0x86D6FFCB, + 0x8386B8D5, 0x349B79D1, 0xEDBD3ADC, 0x5AA0FBD8, + 0xEEE00C69, 0x59FDCD6D, 0x80DB8E60, 0x37C64F64, + 0x3296087A, 0x858BC97E, 0x5CAD8A73, 0xEBB04B77, + 0x560D044F, 0xE110C54B, 0x38368646, 0x8F2B4742, + 0x8A7B005C, 0x3D66C158, 0xE4408255, 0x535D4351, + 0x9E3B1D25, 0x2926DC21, 0xF0009F2C, 0x471D5E28, + 0x424D1936, 0xF550D832, 0x2C769B3F, 0x9B6B5A3B, + 0x26D61503, 0x91CBD407, 0x48ED970A, 0xFFF0560E, + 0xFAA01110, 0x4DBDD014, 0x949B9319, 0x2386521D, + 0x0E562FF1, 0xB94BEEF5, 0x606DADF8, 0xD7706CFC, + 0xD2202BE2, 0x653DEAE6, 0xBC1BA9EB, 0x0B0668EF, + 0xB6BB27D7, 0x01A6E6D3, 0xD880A5DE, 0x6F9D64DA, + 0x6ACD23C4, 0xDDD0E2C0, 0x04F6A1CD, 0xB3EB60C9, + 0x7E8D3EBD, 0xC990FFB9, 0x10B6BCB4, 0xA7AB7DB0, + 0xA2FB3AAE, 0x15E6FBAA, 0xCCC0B8A7, 0x7BDD79A3, + 0xC660369B, 0x717DF79F, 0xA85BB492, 0x1F467596, + 0x1A163288, 0xAD0BF38C, 0x742DB081, 0xC3307185, + 0x99908A5D, 0x2E8D4B59, 0xF7AB0854, 0x40B6C950, + 0x45E68E4E, 0xF2FB4F4A, 0x2BDD0C47, 0x9CC0CD43, + 0x217D827B, 0x9660437F, 0x4F460072, 0xF85BC176, + 0xFD0B8668, 0x4A16476C, 0x93300461, 0x242DC565, + 0xE94B9B11, 0x5E565A15, 0x87701918, 0x306DD81C, + 0x353D9F02, 0x82205E06, 0x5B061D0B, 0xEC1BDC0F, + 0x51A69337, 0xE6BB5233, 0x3F9D113E, 0x8880D03A, + 0x8DD09724, 0x3ACD5620, 0xE3EB152D, 0x54F6D429, + 0x7926A9C5, 0xCE3B68C1, 0x171D2BCC, 0xA000EAC8, + 0xA550ADD6, 0x124D6CD2, 0xCB6B2FDF, 0x7C76EEDB, + 0xC1CBA1E3, 0x76D660E7, 0xAFF023EA, 0x18EDE2EE, + 0x1DBDA5F0, 0xAAA064F4, 0x738627F9, 0xC49BE6FD, + 0x09FDB889, 0xBEE0798D, 0x67C63A80, 0xD0DBFB84, + 0xD58BBC9A, 0x62967D9E, 0xBBB03E93, 0x0CADFF97, + 0xB110B0AF, 0x060D71AB, 0xDF2B32A6, 0x6836F3A2, + 0x6D66B4BC, 0xDA7B75B8, 0x035D36B5, 0xB440F7B1, + }; + + private uint m_value = 0U; + + internal void Initialise() + { + m_value = 0xFFFFFFFF; + } + + internal int GetFinal() + { + return (int)~Integers.ReverseBytes(m_value); + } + + internal void Update(byte inCh) + { + m_value = (m_value >> 8) ^ Crc32Table[(byte)(m_value ^ inCh)]; + } + + internal void UpdateRun(byte inCh, int runLength) + { + Debug.Assert(runLength >= 4); + + uint inCh2 = (uint)inCh << 8 | inCh; + uint inCh4 = inCh2 << 16 | inCh2; + + do + { + m_value ^= inCh4; + m_value = (m_value >> 8) ^ Crc32Table[(byte)m_value]; + m_value = (m_value >> 8) ^ Crc32Table[(byte)m_value]; + m_value = (m_value >> 8) ^ Crc32Table[(byte)m_value]; + m_value = (m_value >> 8) ^ Crc32Table[(byte)m_value]; + } + while ((runLength -= 4) >= 4); + + switch (runLength & 3) + { + case 0: + break; + case 1: + Update(inCh); + break; + case 2: + Update(inCh); + Update(inCh); + break; + case 3: + Update(inCh); + Update(inCh); + Update(inCh); + break; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs.meta new file mode 100644 index 00000000..051f8494 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 16e988d7db3476c45a8d1d6e679162ce +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/bzip2/CRC.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections.meta new file mode 100644 index 00000000..c569b9aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8e247a1f3b006bf49a5aedf53c22281b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs new file mode 100644 index 00000000..548c7a77 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs @@ -0,0 +1,108 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + public abstract class CollectionUtilities + { + public static void CollectMatches(ICollection matches, ISelector selector, + IEnumerable> stores) + { + if (matches == null) + throw new ArgumentNullException(nameof(matches)); + if (stores == null) + return; + + foreach (var store in stores) + { + if (store == null) + continue; + + foreach (T match in store.EnumerateMatches(selector)) + { + matches.Add(match); + } + } + } + + public static IStore CreateStore(IEnumerable contents) + { + return new StoreImpl(contents); + } + + public static T GetValueOrKey(IDictionary d, T k) + { + return d.TryGetValue(k, out var v) ? v : k; + } + + public static V GetValueOrNull(IDictionary d, K k) + where V : class + { + return d.TryGetValue(k, out var v) ? v : null; + } + + public static IEnumerable Proxy(IEnumerable e) + { + return new EnumerableProxy(e); + } + + public static ICollection ReadOnly(ICollection c) + { + return new ReadOnlyCollectionProxy(c); + } + + public static IDictionary ReadOnly(IDictionary d) + { + return new ReadOnlyDictionaryProxy(d); + } + + public static IList ReadOnly(IList l) + { + return new ReadOnlyListProxy(l); + } + + public static ISet ReadOnly(ISet s) + { + return new ReadOnlySetProxy(s); + } + + public static bool Remove(IDictionary d, K k, out V v) + { + if (!d.TryGetValue(k, out v)) + return false; + + d.Remove(k); + return true; + } + + public static T RequireNext(IEnumerator e) + { + if (!e.MoveNext()) + throw new InvalidOperationException(); + + return e.Current; + } + + public static string ToString(IEnumerable c) + { + IEnumerator e = c.GetEnumerator(); + if (!e.MoveNext()) + return "[]"; + + StringBuilder sb = new StringBuilder("["); + sb.Append(e.Current); + while (e.MoveNext()) + { + sb.Append(", "); + sb.Append(e.Current); + } + sb.Append(']'); + return sb.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs.meta new file mode 100644 index 00000000..4a229e06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cdc28a5ad8d0b3340b3b5641556474fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/CollectionUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs new file mode 100644 index 00000000..fd568291 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs @@ -0,0 +1,33 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal sealed class EnumerableProxy + : IEnumerable + { + private readonly IEnumerable m_target; + + internal EnumerableProxy(IEnumerable target) + { + if (target == null) + throw new ArgumentNullException(nameof(target)); + + m_target = target; + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return m_target.GetEnumerator(); + } + + public IEnumerator GetEnumerator() + { + return m_target.GetEnumerator(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs.meta new file mode 100644 index 00000000..ef9b7ee7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 571715e05129dc34383c126d51098c1c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/EnumerableProxy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs.meta new file mode 100644 index 00000000..6b15c9fa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ab7586b2044df0e44a4c910e8d03f93c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/HashSet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs new file mode 100644 index 00000000..b32a193b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + /// Interface for matching objects in an . + /// The contravariant type of selectable objects. + public interface ISelector + : ICloneable + { + /// Match the passed in object, returning true if it would be selected by this selector, false + /// otherwise. + /// The object to be matched. + /// true if the objects is matched by this selector, false otherwise. + bool Match(T candidate); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs.meta new file mode 100644 index 00000000..2cff6964 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e0266c79007451459497d3ba691a08b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ISelector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs new file mode 100644 index 00000000..8a5f4c2b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs @@ -0,0 +1,19 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + /// A generic interface describing a simple store of objects. + /// The covariant type of stored objects. + public interface IStore + { + /// Enumerate the (possibly empty) collection of objects matched by the given selector. + /// The used to select matching objects. + /// An of the matching objects. + IEnumerable EnumerateMatches(ISelector selector); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs.meta new file mode 100644 index 00000000..f5f5b35d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7dea964c98f2454ba958564aafab2b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/IStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs.meta new file mode 100644 index 00000000..a452e614 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3845dc04ef8b2bc449341e49d7fada35 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/LinkedDictionary.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs new file mode 100644 index 00000000..d0b35bd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs @@ -0,0 +1,48 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal abstract class ReadOnlyCollection + : ICollection + { + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public bool IsReadOnly => true; + + public void Add(T item) => throw new NotSupportedException(); + public void Clear() => throw new NotSupportedException(); + public bool Remove(T item) => throw new NotSupportedException(); + + public abstract bool Contains(T item); + public abstract int Count { get; } + public abstract void CopyTo(T[] array, int arrayIndex); + public abstract IEnumerator GetEnumerator(); + } + + internal class ReadOnlyCollectionProxy + : ReadOnlyCollection + { + private readonly ICollection m_target; + + internal ReadOnlyCollectionProxy(ICollection target) + { + if (target == null) + throw new ArgumentNullException(nameof(target)); + + m_target = target; + } + + public override bool Contains(T item) => m_target.Contains(item); + public override int Count => m_target.Count; + public override void CopyTo(T[] array, int arrayIndex) => m_target.CopyTo(array, arrayIndex); + public override IEnumerator GetEnumerator() => m_target.GetEnumerator(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs.meta new file mode 100644 index 00000000..68317205 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 323bad9db03db12468df5318685d10c9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyCollection.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs new file mode 100644 index 00000000..de6a22d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs @@ -0,0 +1,68 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal abstract class ReadOnlyDictionary + : IDictionary + { + public V this[K key] + { + get { return Lookup(key); } + set { throw new NotSupportedException(); } + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public bool IsReadOnly => true; + + public void Add(K key, V value) => throw new NotSupportedException(); + public void Add(KeyValuePair item) => throw new NotSupportedException(); + public void Clear() => throw new NotSupportedException(); + public bool Remove(K key) => throw new NotSupportedException(); + public bool Remove(KeyValuePair item) => throw new NotSupportedException(); + + public abstract bool Contains(KeyValuePair item); + public abstract bool ContainsKey(K key); + public abstract void CopyTo(KeyValuePair[] array, int arrayIndex); + public abstract int Count { get; } + public abstract IEnumerator> GetEnumerator(); + public abstract ICollection Keys { get; } + public abstract bool TryGetValue(K key, out V value); + public abstract ICollection Values { get; } + + protected abstract V Lookup(K key); + } + + internal class ReadOnlyDictionaryProxy + : ReadOnlyDictionary + { + private readonly IDictionary m_target; + + internal ReadOnlyDictionaryProxy(IDictionary target) + { + if (target == null) + throw new ArgumentNullException(nameof(target)); + + m_target = target; + } + + public override bool Contains(KeyValuePair item) => m_target.Contains(item); + public override bool ContainsKey(K key) => m_target.ContainsKey(key); + public override void CopyTo(KeyValuePair[] array, int arrayIndex) => m_target.CopyTo(array, arrayIndex); + public override int Count => m_target.Count; + public override IEnumerator> GetEnumerator() => m_target.GetEnumerator(); + public override ICollection Keys => new ReadOnlyCollectionProxy(m_target.Keys); + public override bool TryGetValue(K key, out V value) => m_target.TryGetValue(key, out value); + public override ICollection Values => new ReadOnlyCollectionProxy(m_target.Values); + + protected override V Lookup(K key) => m_target[key]; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs.meta new file mode 100644 index 00000000..ac3f20ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7a38f68b5c929cf40a64b86399b5469a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyDictionary.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs new file mode 100644 index 00000000..b42f1afd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal abstract class ReadOnlyList + : IList + { + public T this[int index] + { + get { return Lookup(index); } + set { throw new NotSupportedException(); } + } + + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public bool IsReadOnly => true; + + public void Add(T item) => throw new NotSupportedException(); + public void Clear() => throw new NotSupportedException(); + public void Insert(int index, T item) => throw new NotSupportedException(); + public bool Remove(T item) => throw new NotSupportedException(); + public void RemoveAt(int index) => throw new NotSupportedException(); + + + public abstract bool Contains(T item); + public abstract void CopyTo(T[] array, int arrayIndex); + public abstract int Count { get; } + public abstract IEnumerator GetEnumerator(); + public abstract int IndexOf(T item); + + protected abstract T Lookup(int index); + } + + internal class ReadOnlyListProxy + : ReadOnlyList + { + private readonly IList m_target; + + internal ReadOnlyListProxy(IList target) + { + if (target == null) + throw new ArgumentNullException(nameof(target)); + + m_target = target; + } + + public override int Count => m_target.Count; + public override bool Contains(T item) => m_target.Contains(item); + public override void CopyTo(T[] array, int arrayIndex) => m_target.CopyTo(array, arrayIndex); + public override IEnumerator GetEnumerator() => m_target.GetEnumerator(); + public override int IndexOf(T item) => m_target.IndexOf(item); + + protected override T Lookup(int index) => m_target[index]; + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs.meta new file mode 100644 index 00000000..147ff096 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42d34408073dcc34683b4bb9ab1f25a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlyList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs new file mode 100644 index 00000000..476ba331 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs @@ -0,0 +1,65 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal abstract class ReadOnlySet + : ISet + { + System.Collections.IEnumerator System.Collections.IEnumerable.GetEnumerator() + { + return GetEnumerator(); + } + + public bool IsReadOnly => true; + + void ICollection.Add(T item) => throw new NotSupportedException(); + + public bool Add(T item) => throw new NotSupportedException(); + public void Clear() => throw new NotSupportedException(); + public void ExceptWith(IEnumerable other) => throw new NotSupportedException(); + public void IntersectWith(IEnumerable other) => throw new NotSupportedException(); + public bool Remove(T item) => throw new NotSupportedException(); + public bool SetEquals(IEnumerable other) => throw new NotSupportedException(); + public void SymmetricExceptWith(IEnumerable other) => throw new NotSupportedException(); + public void UnionWith(IEnumerable other) => throw new NotSupportedException(); + + public abstract bool Contains(T item); + public abstract void CopyTo(T[] array, int arrayIndex); + public abstract int Count { get; } + public abstract IEnumerator GetEnumerator(); + public abstract bool IsProperSubsetOf(IEnumerable other); + public abstract bool IsProperSupersetOf(IEnumerable other); + public abstract bool IsSubsetOf(IEnumerable other); + public abstract bool IsSupersetOf(IEnumerable other); + public abstract bool Overlaps(IEnumerable other); + } + + internal class ReadOnlySetProxy + : ReadOnlySet + { + private readonly ISet m_target; + + internal ReadOnlySetProxy(ISet target) + { + if (target == null) + throw new ArgumentNullException(nameof(target)); + + m_target = target; + } + + public override bool Contains(T item) => m_target.Contains(item); + public override void CopyTo(T[] array, int arrayIndex) => m_target.CopyTo(array, arrayIndex); + public override int Count => m_target.Count; + public override IEnumerator GetEnumerator() => m_target.GetEnumerator(); + public override bool IsProperSubsetOf(IEnumerable other) => m_target.IsProperSubsetOf(other); + public override bool IsProperSupersetOf(IEnumerable other) => m_target.IsProperSupersetOf(other); + public override bool IsSubsetOf(IEnumerable other) => m_target.IsSubsetOf(other); + public override bool IsSupersetOf(IEnumerable other) => m_target.IsSupersetOf(other); + public override bool Overlaps(IEnumerable other) => m_target.Overlaps(other); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs.meta new file mode 100644 index 00000000..86b207f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c945a33b689ce264c83bad7b01b886e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/ReadOnlySet.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs new file mode 100644 index 00000000..07dc5e76 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs @@ -0,0 +1,29 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections +{ + internal sealed class StoreImpl + : IStore + { + private readonly List m_contents; + + internal StoreImpl(IEnumerable e) + { + m_contents = new List(e); + } + + IEnumerable IStore.EnumerateMatches(ISelector selector) + { + foreach (T candidate in m_contents) + { + if (selector == null || selector.Match(candidate)) + yield return candidate; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs.meta new file mode 100644 index 00000000..f07bbb1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 445cc24ffa98e4b4f8b052a751547980 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/collections/StoreImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date.meta new file mode 100644 index 00000000..9494ec1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ac585883b83388046ad46a793bfc1850 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs new file mode 100644 index 00000000..7858fa7b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date +{ + public static class DateTimeUtilities + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static readonly DateTime UnixEpoch = DateTime.UnixEpoch; +#else + public static readonly DateTime UnixEpoch = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc); +#endif + + public static readonly long MaxUnixMs = + (DateTime.MaxValue.Ticks - UnixEpoch.Ticks) / TimeSpan.TicksPerMillisecond; + public static readonly long MinUnixMs = 0L; + + /// + /// Return the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC) for a given DateTime value. + /// + /// The DateTime value will be converted to UTC (using before + /// conversion. + /// A DateTime value not before the epoch. + /// Number of whole milliseconds after epoch. + /// 'dateTime' is before the epoch. + public static long DateTimeToUnixMs(DateTime dateTime) + { + DateTime utc = dateTime.ToUniversalTime(); + if (utc.CompareTo(UnixEpoch) < 0) + throw new ArgumentOutOfRangeException(nameof(dateTime), "DateTime value may not be before the epoch"); + + return (utc.Ticks - UnixEpoch.Ticks) / TimeSpan.TicksPerMillisecond; + } + + /// + /// Create a UTC DateTime value from the number of milliseconds since the Unix epoch (1 Jan., 1970 UTC). + /// + /// Number of milliseconds since the epoch. + /// A UTC DateTime value + /// 'unixMs' is before 'MinUnixMs' or after 'MaxUnixMs'. + /// + public static DateTime UnixMsToDateTime(long unixMs) + { + if (unixMs < MinUnixMs || unixMs > MaxUnixMs) + throw new ArgumentOutOfRangeException(nameof(unixMs)); + + return new DateTime(unixMs * TimeSpan.TicksPerMillisecond + UnixEpoch.Ticks, DateTimeKind.Utc); + } + + /// + /// Return the current number of milliseconds since the Unix epoch (1 Jan., 1970 UTC). + /// + public static long CurrentUnixMs() + { + return DateTimeToUnixMs(DateTime.UtcNow); + } + + public static DateTime WithPrecisionCentisecond(DateTime dateTime) + { + int millisecond = dateTime.Millisecond - (dateTime.Millisecond % 10); + return new DateTime(dateTime.Year, dateTime.Month, dateTime.Day, + dateTime.Hour, dateTime.Minute, dateTime.Second, millisecond, dateTime.Kind); + } + + public static DateTime WithPrecisionDecisecond(DateTime dateTime) + { + int millisecond = dateTime.Millisecond - (dateTime.Millisecond % 100); + return new DateTime(dateTime.Year, dateTime.Month, dateTime.Day, + dateTime.Hour, dateTime.Minute, dateTime.Second, millisecond, dateTime.Kind); + } + + public static DateTime WithPrecisionMillisecond(DateTime dateTime) + { + return new DateTime(dateTime.Year, dateTime.Month, dateTime.Day, + dateTime.Hour, dateTime.Minute, dateTime.Second, dateTime.Millisecond, dateTime.Kind); + } + + public static DateTime WithPrecisionSecond(DateTime dateTime) + { + return new DateTime(dateTime.Year, dateTime.Month, dateTime.Day, + dateTime.Hour, dateTime.Minute, dateTime.Second, dateTime.Kind); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs.meta new file mode 100644 index 00000000..d32f4163 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09685d77d92cc9244ab0e0b68b4c775d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/date/DateTimeUtilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders.meta new file mode 100644 index 00000000..efbba023 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d6e88507597a5ba47ae561dc2d402c7c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs new file mode 100644 index 00000000..c740a902 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs @@ -0,0 +1,124 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + public sealed class Base64 + { + private Base64() + { + } + + public static string ToBase64String( + byte[] data) + { + return Convert.ToBase64String(data, 0, data.Length); + } + + public static string ToBase64String( + byte[] data, + int off, + int length) + { + return Convert.ToBase64String(data, off, length); + } + + /** + * encode the input data producing a base 64 encoded byte array. + * + * @return a byte array containing the base 64 encoded data. + */ + public static byte[] Encode( + byte[] data) + { + return Encode(data, 0, data.Length); + } + + /** + * encode the input data producing a base 64 encoded byte array. + * + * @return a byte array containing the base 64 encoded data. + */ + public static byte[] Encode( + byte[] data, + int off, + int length) + { + string s = Convert.ToBase64String(data, off, length); + return Strings.ToAsciiByteArray(s); + } + + /** + * Encode the byte data to base 64 writing it to the given output stream. + * + * @return the number of bytes produced. + */ + public static int Encode( + byte[] data, + Stream outStream) + { + byte[] encoded = Encode(data); + outStream.Write(encoded, 0, encoded.Length); + return encoded.Length; + } + + /** + * Encode the byte data to base 64 writing it to the given output stream. + * + * @return the number of bytes produced. + */ + public static int Encode( + byte[] data, + int off, + int length, + Stream outStream) + { + byte[] encoded = Encode(data, off, length); + outStream.Write(encoded, 0, encoded.Length); + return encoded.Length; + } + + /** + * decode the base 64 encoded input data. It is assumed the input data is valid. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + byte[] data) + { + string s = Strings.FromAsciiByteArray(data); + return Convert.FromBase64String(s); + } + + /** + * decode the base 64 encoded string data - whitespace will be ignored. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + string data) + { + return Convert.FromBase64String(data); + } + + /** + * decode the base 64 encoded string data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public static int Decode( + string data, + Stream outStream) + { + byte[] decoded = Decode(data); + outStream.Write(decoded, 0, decoded.Length); + return decoded.Length; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs.meta new file mode 100644 index 00000000..60822b81 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 20ee66f3a63d2c34da408faba59df235 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs new file mode 100644 index 00000000..4cefeb19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs @@ -0,0 +1,511 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + public class Base64Encoder + : IEncoder + { + protected readonly byte[] encodingTable = + { + (byte)'A', (byte)'B', (byte)'C', (byte)'D', (byte)'E', (byte)'F', (byte)'G', + (byte)'H', (byte)'I', (byte)'J', (byte)'K', (byte)'L', (byte)'M', (byte)'N', + (byte)'O', (byte)'P', (byte)'Q', (byte)'R', (byte)'S', (byte)'T', (byte)'U', + (byte)'V', (byte)'W', (byte)'X', (byte)'Y', (byte)'Z', + (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f', (byte)'g', + (byte)'h', (byte)'i', (byte)'j', (byte)'k', (byte)'l', (byte)'m', (byte)'n', + (byte)'o', (byte)'p', (byte)'q', (byte)'r', (byte)'s', (byte)'t', (byte)'u', + (byte)'v', + (byte)'w', (byte)'x', (byte)'y', (byte)'z', + (byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', + (byte)'7', (byte)'8', (byte)'9', + (byte)'+', (byte)'/' + }; + + protected byte padding = (byte)'='; + + /* + * set up the decoding table. + */ + protected readonly byte[] decodingTable = new byte[128]; + + protected void InitialiseDecodingTable() + { + Arrays.Fill(decodingTable, (byte)0xff); + + for (int i = 0; i < encodingTable.Length; i++) + { + decodingTable[encodingTable[i]] = (byte)i; + } + } + + public Base64Encoder() + { + InitialiseDecodingTable(); + } + + public int Encode(byte[] inBuf, int inOff, int inLen, byte[] outBuf, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Encode(inBuf.AsSpan(inOff, inLen), outBuf.AsSpan(outOff)); +#else + int inPos = inOff; + int inEnd = inOff + inLen - 2; + int outPos = outOff; + + while (inPos < inEnd) + { + uint a1 = inBuf[inPos++]; + uint a2 = inBuf[inPos++]; + uint a3 = inBuf[inPos++]; + + outBuf[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + outBuf[outPos++] = encodingTable[((a1 << 4) | (a2 >> 4)) & 0x3F]; + outBuf[outPos++] = encodingTable[((a2 << 2) | (a3 >> 6)) & 0x3F]; + outBuf[outPos++] = encodingTable[a3 & 0x3F]; + } + + switch (inLen - (inPos - inOff)) + { + case 1: + { + uint a1 = inBuf[inPos++]; + + outBuf[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + outBuf[outPos++] = encodingTable[(a1 << 4) & 0x3F]; + outBuf[outPos++] = padding; + outBuf[outPos++] = padding; + break; + } + case 2: + { + uint a1 = inBuf[inPos++]; + uint a2 = inBuf[inPos++]; + + outBuf[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + outBuf[outPos++] = encodingTable[((a1 << 4) | (a2 >> 4)) & 0x3F]; + outBuf[outPos++] = encodingTable[(a2 << 2) & 0x3F]; + outBuf[outPos++] = padding; + break; + } + } + + return outPos - outOff; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Encode(ReadOnlySpan input, Span output) + { + int inPos = 0; + int inEnd = input.Length - 2; + int outPos = 0; + + while (inPos < inEnd) + { + uint a1 = input[inPos++]; + uint a2 = input[inPos++]; + uint a3 = input[inPos++]; + + output[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + output[outPos++] = encodingTable[((a1 << 4) | (a2 >> 4)) & 0x3F]; + output[outPos++] = encodingTable[((a2 << 2) | (a3 >> 6)) & 0x3F]; + output[outPos++] = encodingTable[a3 & 0x3F]; + } + + switch (input.Length - inPos) + { + case 1: + { + uint a1 = input[inPos++]; + + output[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + output[outPos++] = encodingTable[(a1 << 4) & 0x3F]; + output[outPos++] = padding; + output[outPos++] = padding; + break; + } + case 2: + { + uint a1 = input[inPos++]; + uint a2 = input[inPos++]; + + output[outPos++] = encodingTable[(a1 >> 2) & 0x3F]; + output[outPos++] = encodingTable[((a1 << 4) | (a2 >> 4)) & 0x3F]; + output[outPos++] = encodingTable[(a2 << 2) & 0x3F]; + output[outPos++] = padding; + break; + } + } + + return outPos; + } +#endif + + /** + * encode the input data producing a base 64 output stream. + * + * @return the number of bytes produced. + */ + public int Encode(byte[] buf, int off, int len, Stream outStream) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Encode(buf.AsSpan(off, len), outStream); +#else + if (len < 0) + return 0; + + byte[] tmp = new byte[72]; + int remaining = len; + while (remaining > 0) + { + int inLen = System.Math.Min(54, remaining); + int outLen = Encode(buf, off, inLen, tmp, 0); + outStream.Write(tmp, 0, outLen); + off += inLen; + remaining -= inLen; + } + return (len + 2) / 3 * 4; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Encode(ReadOnlySpan data, Stream outStream) + { + Span tmp = stackalloc byte[72]; + int result = (data.Length + 2) / 3 * 4; + while (!data.IsEmpty) + { + int inLen = System.Math.Min(54, data.Length); + int outLen = Encode(data[..inLen], tmp); + outStream.Write(tmp[..outLen]); + data = data[inLen..]; + } + return result; + } +#endif + + private bool Ignore(char c) + { + return c == '\n' || c =='\r' || c == '\t' || c == ' '; + } + + /** + * decode the base 64 encoded byte data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public int Decode(byte[] data, int off, int length, Stream outStream) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Decode(data.AsSpan(off, length), outStream); +#else + byte b1, b2, b3, b4; + byte[] outBuffer = new byte[54]; // S/MIME standard + int bufOff = 0; + int outLen = 0; + int end = off + length; + + while (end > off) + { + if (!Ignore((char)data[end - 1])) + break; + + end--; + } + + int finish = end - 4; + int i = NextI(data, off, finish); + + while (i < finish) + { + b1 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b2 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b3 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b4 = decodingTable[data[i++]]; + + if ((b1 | b2 | b3 | b4) >= 0x80) + throw new IOException("invalid characters encountered in base64 data"); + + outBuffer[bufOff++] = (byte)((b1 << 2) | (b2 >> 4)); + outBuffer[bufOff++] = (byte)((b2 << 4) | (b3 >> 2)); + outBuffer[bufOff++] = (byte)((b3 << 6) | b4); + + if (bufOff == outBuffer.Length) + { + outStream.Write(outBuffer, 0, bufOff); + bufOff = 0; + } + + outLen += 3; + + i = NextI(data, i, finish); + } + + if (bufOff > 0) + { + outStream.Write(outBuffer, 0, bufOff); + } + + int e0 = NextI(data, i, end); + int e1 = NextI(data, e0 + 1, end); + int e2 = NextI(data, e1 + 1, end); + int e3 = NextI(data, e2 + 1, end); + + outLen += DecodeLastBlock(outStream, (char)data[e0], (char)data[e1], (char)data[e2], (char)data[e3]); + + return outLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Decode(ReadOnlySpan data, Stream outStream) + { + byte b1, b2, b3, b4; + Span outBuffer = stackalloc byte[54]; // S/MIME standard + int bufOff = 0; + int outLen = 0; + int end = data.Length; + + while (end > 0) + { + if (!Ignore((char)data[end - 1])) + break; + + end--; + } + + int finish = end - 4; + int i = NextI(data, 0, finish); + + while (i < finish) + { + b1 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b2 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b3 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b4 = decodingTable[data[i++]]; + + if ((b1 | b2 | b3 | b4) >= 0x80) + throw new IOException("invalid characters encountered in base64 data"); + + outBuffer[bufOff++] = (byte)((b1 << 2) | (b2 >> 4)); + outBuffer[bufOff++] = (byte)((b2 << 4) | (b3 >> 2)); + outBuffer[bufOff++] = (byte)((b3 << 6) | b4); + + if (bufOff == outBuffer.Length) + { + outStream.Write(outBuffer); + bufOff = 0; + } + + outLen += 3; + + i = NextI(data, i, finish); + } + + if (bufOff > 0) + { + outStream.Write(outBuffer[..bufOff]); + } + + int e0 = NextI(data, i, end); + int e1 = NextI(data, e0 + 1, end); + int e2 = NextI(data, e1 + 1, end); + int e3 = NextI(data, e2 + 1, end); + + outLen += DecodeLastBlock(outStream, (char)data[e0], (char)data[e1], (char)data[e2], (char)data[e3]); + + return outLen; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int NextI(ReadOnlySpan data, int i, int finish) +#else + private int NextI(byte[] data, int i, int finish) +#endif + { + while ((i < finish) && Ignore((char)data[i])) + { + i++; + } + return i; + } + + /** + * decode the base 64 encoded string data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public int DecodeString(string data, Stream outStream) + { + // Platform Implementation +// byte[] bytes = Convert.FromBase64String(data); +// outStream.Write(bytes, 0, bytes.Length); +// return bytes.Length; + + byte b1, b2, b3, b4; + int length = 0; + + int end = data.Length; + + while (end > 0) + { + if (!Ignore(data[end - 1])) + break; + + end--; + } + + int finish = end - 4; + int i = NextI(data, 0, finish); +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span buf = stackalloc byte[3]; +#endif + + while (i < finish) + { + b1 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b2 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b3 = decodingTable[data[i++]]; + + i = NextI(data, i, finish); + + b4 = decodingTable[data[i++]]; + + if ((b1 | b2 | b3 | b4) >= 0x80) + throw new IOException("invalid characters encountered in base64 data"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + buf[0] = (byte)((b1 << 2) | (b2 >> 4)); + buf[1] = (byte)((b2 << 4) | (b3 >> 2)); + buf[2] = (byte)((b3 << 6) | b4); + outStream.Write(buf); +#else + outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4))); + outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2))); + outStream.WriteByte((byte)((b3 << 6) | b4)); +#endif + + length += 3; + + i = NextI(data, i, finish); + } + + length += DecodeLastBlock(outStream, data[end - 4], data[end - 3], data[end - 2], data[end - 1]); + + return length; + } + + private int DecodeLastBlock( + Stream outStream, + char c1, + char c2, + char c3, + char c4) + { + if (c3 == padding) + { + if (c4 != padding) + throw new IOException("invalid characters encountered at end of base64 data"); + + byte b1 = decodingTable[c1]; + byte b2 = decodingTable[c2]; + + if ((b1 | b2) >= 0x80) + throw new IOException("invalid characters encountered at end of base64 data"); + + outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4))); + + return 1; + } + + if (c4 == padding) + { + byte b1 = decodingTable[c1]; + byte b2 = decodingTable[c2]; + byte b3 = decodingTable[c3]; + + if ((b1 | b2 | b3) >= 0x80) + throw new IOException("invalid characters encountered at end of base64 data"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span buf = stackalloc byte[2] { + (byte)((b1 << 2) | (b2 >> 4)), + (byte)((b2 << 4) | (b3 >> 2)), + }; + outStream.Write(buf); +#else + outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4))); + outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2))); +#endif + + return 2; + } + + { + byte b1 = decodingTable[c1]; + byte b2 = decodingTable[c2]; + byte b3 = decodingTable[c3]; + byte b4 = decodingTable[c4]; + + if ((b1 | b2 | b3 | b4) >= 0x80) + throw new IOException("invalid characters encountered at end of base64 data"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span buf = stackalloc byte[3] { + (byte)((b1 << 2) | (b2 >> 4)), + (byte)((b2 << 4) | (b3 >> 2)), + (byte)((b3 << 6) | b4), + }; + outStream.Write(buf); +#else + outStream.WriteByte((byte)((b1 << 2) | (b2 >> 4))); + outStream.WriteByte((byte)((b2 << 4) | (b3 >> 2))); + outStream.WriteByte((byte)((b3 << 6) | b4)); +#endif + + return 3; + } + } + + private int NextI(string data, int i, int finish) + { + while ((i < finish) && Ignore(data[i])) + { + i++; + } + return i; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs.meta new file mode 100644 index 00000000..0dfb63a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7615516921672634d908150b6b9d04cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Base64Encoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs new file mode 100644 index 00000000..6806db6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /// + /// A buffering class to allow translation from one format to another to + /// be done in discrete chunks. + /// + public class BufferedDecoder + { + internal byte[] buffer; + internal int bufOff; + + internal ITranslator translator; + + /// + /// Create a buffered Decoder. + /// + /// The translater to use. + /// The size of the buffer. + public BufferedDecoder( + ITranslator translator, + int bufferSize) + { + this.translator = translator; + + if ((bufferSize % translator.GetEncodedBlockSize()) != 0) + { + throw new ArgumentException("buffer size not multiple of input block size"); + } + + buffer = new byte[bufferSize]; +// bufOff = 0; + } + + /// + /// Process one byte of data. + /// + /// Data in. + /// Byte array for the output. + /// The offset in the output byte array to start writing from. + /// The amount of output bytes. + public int ProcessByte( + byte input, + byte[] output, + int outOff) + { + int resultLen = 0; + + buffer[bufOff++] = input; + + if (bufOff == buffer.Length) + { + resultLen = translator.Decode(buffer, 0, buffer.Length, output, outOff); + bufOff = 0; + } + + return resultLen; + } + + + /// + /// Process data from a byte array. + /// + /// The input data. + /// Start position within input data array. + /// Amount of data to process from input data array. + /// Array to store output. + /// Position in output array to start writing from. + /// The amount of output bytes. + public int ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] outBytes, + int outOff) + { + if (len < 0) + { + throw new ArgumentException("Can't have a negative input length!"); + } + + int resultLen = 0; + int gapLen = buffer.Length - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, buffer, bufOff, gapLen); + + resultLen += translator.Decode(buffer, 0, buffer.Length, outBytes, outOff); + + bufOff = 0; + + len -= gapLen; + inOff += gapLen; + outOff += resultLen; + + int chunkSize = len - (len % buffer.Length); + + resultLen += translator.Decode(input, inOff, chunkSize, outBytes, outOff); + + len -= chunkSize; + inOff += chunkSize; + } + + if (len != 0) + { + Array.Copy(input, inOff, buffer, bufOff, len); + + bufOff += len; + } + + return resultLen; + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs.meta new file mode 100644 index 00000000..0d538a8c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 48b2c47bcdb15bd41a417f13eb07bebf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedDecoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs new file mode 100644 index 00000000..d41907a9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs @@ -0,0 +1,121 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /// + /// A class that allows encoding of data using a specific encoder to be processed in chunks. + /// + public class BufferedEncoder + { + internal byte[] Buffer; + internal int bufOff; + + internal ITranslator translator; + + + /// + /// Create. + /// + /// The translator to use. + /// Size of the chunks. + public BufferedEncoder( + ITranslator translator, + int bufferSize) + { + this.translator = translator; + + if ((bufferSize % translator.GetEncodedBlockSize()) != 0) + { + throw new ArgumentException("buffer size not multiple of input block size"); + } + + Buffer = new byte[bufferSize]; +// bufOff = 0; + } + + + /// + /// Process one byte of data. + /// + /// The byte. + /// An array to store output in. + /// Offset within output array to start writing from. + /// + public int ProcessByte( + byte input, + byte[] outBytes, + int outOff) + { + int resultLen = 0; + + Buffer[bufOff++] = input; + + if (bufOff == Buffer.Length) + { + resultLen = translator.Encode(Buffer, 0, Buffer.Length, outBytes, outOff); + bufOff = 0; + } + + return resultLen; + } + + /// + /// Process data from a byte array. + /// + /// Input data Byte array containing data to be processed. + /// Start position within input data array. + /// Amount of input data to be processed. + /// Output data array. + /// Offset within output data array to start writing to. + /// The amount of data written. + public int ProcessBytes( + byte[] input, + int inOff, + int len, + byte[] outBytes, + int outOff) + { + if (len < 0) + { + throw new ArgumentException("Can't have a negative input length!"); + } + + int resultLen = 0; + int gapLen = Buffer.Length - bufOff; + + if (len > gapLen) + { + Array.Copy(input, inOff, Buffer, bufOff, gapLen); + + resultLen += translator.Encode(Buffer, 0, Buffer.Length, outBytes, outOff); + + bufOff = 0; + + len -= gapLen; + inOff += gapLen; + outOff += resultLen; + + int chunkSize = len - (len % Buffer.Length); + + resultLen += translator.Encode(input, inOff, chunkSize, outBytes, outOff); + + len -= chunkSize; + inOff += chunkSize; + } + + if (len != 0) + { + Array.Copy(input, inOff, Buffer, bufOff, len); + + bufOff += len; + } + + return resultLen; + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs.meta new file mode 100644 index 00000000..af1fa056 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8e6e03d00708fd438fe57a07c9bf05f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/BufferedEncoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs new file mode 100644 index 00000000..1fb3995b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs @@ -0,0 +1,155 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /// + /// Class to decode and encode Hex. + /// + public sealed class Hex + { + private static readonly HexEncoder encoder = new HexEncoder(); + + private Hex() + { + } + + public static string ToHexString( + byte[] data) + { + return ToHexString(data, 0, data.Length); + } + + public static string ToHexString( + byte[] data, + int off, + int length) + { + byte[] hex = Encode(data, off, length); + return Strings.FromAsciiByteArray(hex); + } + + /** + * encode the input data producing a Hex encoded byte array. + * + * @return a byte array containing the Hex encoded data. + */ + public static byte[] Encode( + byte[] data) + { + return Encode(data, 0, data.Length); + } + + /** + * encode the input data producing a Hex encoded byte array. + * + * @return a byte array containing the Hex encoded data. + */ + public static byte[] Encode( + byte[] data, + int off, + int length) + { + MemoryStream bOut = new MemoryStream(length * 2); + + encoder.Encode(data, off, length, bOut); + + return bOut.ToArray(); + } + + /** + * Hex encode the byte data writing it to the given output stream. + * + * @return the number of bytes produced. + */ + public static int Encode( + byte[] data, + Stream outStream) + { + return encoder.Encode(data, 0, data.Length, outStream); + } + + /** + * Hex encode the byte data writing it to the given output stream. + * + * @return the number of bytes produced. + */ + public static int Encode( + byte[] data, + int off, + int length, + Stream outStream) + { + return encoder.Encode(data, off, length, outStream); + } + + /** + * decode the Hex encoded input data. It is assumed the input data is valid. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + byte[] data) + { + MemoryStream bOut = new MemoryStream((data.Length + 1) / 2); + + encoder.Decode(data, 0, data.Length, bOut); + + return bOut.ToArray(); + } + + /** + * decode the Hex encoded string data - whitespace will be ignored. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + string data) + { + MemoryStream bOut = new MemoryStream((data.Length + 1) / 2); + + encoder.DecodeString(data, bOut); + + return bOut.ToArray(); + } + + /** + * decode the Hex encoded string data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public static int Decode( + string data, + Stream outStream) + { + return encoder.DecodeString(data, outStream); + } + + /** + * Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be + * considered an error. + * + * @return a byte array representing the decoded data. + */ + public static byte[] DecodeStrict(string str) + { + return encoder.DecodeStrict(str, 0, str.Length); + } + + /** + * Decode the hexadecimal-encoded string strictly i.e. any non-hexadecimal characters will be + * considered an error. + * + * @return a byte array representing the decoded data. + */ + public static byte[] DecodeStrict(string str, int off, int len) + { + return encoder.DecodeStrict(str, off, len); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs.meta new file mode 100644 index 00000000..b302c73e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8cd91990de2b6174ba4ae1a7623ed031 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Hex.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs new file mode 100644 index 00000000..5a93e6b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs @@ -0,0 +1,356 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + public class HexEncoder + : IEncoder + { + protected readonly byte[] encodingTable = + { + (byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', (byte)'7', + (byte)'8', (byte)'9', (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f' + }; + + /* + * set up the decoding table. + */ + protected readonly byte[] decodingTable = new byte[128]; + + protected void InitialiseDecodingTable() + { + Arrays.Fill(decodingTable, (byte)0xff); + + for (int i = 0; i < encodingTable.Length; i++) + { + decodingTable[encodingTable[i]] = (byte)i; + } + + decodingTable['A'] = decodingTable['a']; + decodingTable['B'] = decodingTable['b']; + decodingTable['C'] = decodingTable['c']; + decodingTable['D'] = decodingTable['d']; + decodingTable['E'] = decodingTable['e']; + decodingTable['F'] = decodingTable['f']; + } + + public HexEncoder() + { + InitialiseDecodingTable(); + } + + public int Encode(byte[] inBuf, int inOff, int inLen, byte[] outBuf, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Encode(inBuf.AsSpan(inOff, inLen), outBuf.AsSpan(outOff)); +#else + int inPos = inOff; + int inEnd = inOff + inLen; + int outPos = outOff; + + while (inPos < inEnd) + { + uint b = inBuf[inPos++]; + + outBuf[outPos++] = encodingTable[b >> 4]; + outBuf[outPos++] = encodingTable[b & 0xF]; + } + + return outPos - outOff; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Encode(ReadOnlySpan input, Span output) + { + int inPos = 0; + int inEnd = input.Length; + int outPos = 0; + + while (inPos < inEnd) + { + uint b = input[inPos++]; + + output[outPos++] = encodingTable[b >> 4]; + output[outPos++] = encodingTable[b & 0xF]; + } + + return outPos; + } +#endif + + /** + * encode the input data producing a Hex output stream. + * + * @return the number of bytes produced. + */ + public int Encode(byte[] buf, int off, int len, Stream outStream) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Encode(buf.AsSpan(off, len), outStream); +#else + if (len < 0) + return 0; + + byte[] tmp = new byte[72]; + int remaining = len; + while (remaining > 0) + { + int inLen = System.Math.Min(36, remaining); + int outLen = Encode(buf, off, inLen, tmp, 0); + outStream.Write(tmp, 0, outLen); + off += inLen; + remaining -= inLen; + } + return len * 2; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Encode(ReadOnlySpan data, Stream outStream) + { + Span tmp = stackalloc byte[72]; + int result = data.Length * 2; + while (!data.IsEmpty) + { + int inLen = System.Math.Min(36, data.Length); + int outLen = Encode(data[..inLen], tmp); + outStream.Write(tmp[..outLen]); + data = data[inLen..]; + } + return result; + } +#endif + + private static bool Ignore(char c) + { + return c == '\n' || c =='\r' || c == '\t' || c == ' '; + } + + /** + * decode the Hex encoded byte data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public int Decode(byte[] data, int off, int length, Stream outStream) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return Decode(data.AsSpan(off, length), outStream); +#else + byte b1, b2; + int outLen = 0; + byte[] buf = new byte[36]; + int bufOff = 0; + int end = off + length; + + while (end > off) + { + if (!Ignore((char)data[end - 1])) + break; + + end--; + } + + int i = off; + while (i < end) + { + while (i < end && Ignore((char)data[i])) + { + i++; + } + + b1 = decodingTable[data[i++]]; + + while (i < end && Ignore((char)data[i])) + { + i++; + } + + b2 = decodingTable[data[i++]]; + + if ((b1 | b2) >= 0x80) + throw new IOException("invalid characters encountered in Hex data"); + + buf[bufOff++] = (byte)((b1 << 4) | b2); + + if (bufOff == buf.Length) + { + outStream.Write(buf, 0, bufOff); + bufOff = 0; + } + + outLen++; + } + + if (bufOff > 0) + { + outStream.Write(buf, 0, bufOff); + } + + return outLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int Decode(ReadOnlySpan data, Stream outStream) + { + byte b1, b2; + int outLen = 0; + Span buf = stackalloc byte[36]; + int bufOff = 0; + int end = data.Length; + + while (end > 0) + { + if (!Ignore((char)data[end - 1])) + break; + + end--; + } + + int i = 0; + while (i < end) + { + while (i < end && Ignore((char)data[i])) + { + i++; + } + + b1 = decodingTable[data[i++]]; + + while (i < end && Ignore((char)data[i])) + { + i++; + } + + b2 = decodingTable[data[i++]]; + + if ((b1 | b2) >= 0x80) + throw new IOException("invalid characters encountered in Hex data"); + + buf[bufOff++] = (byte)((b1 << 4) | b2); + + if (bufOff == buf.Length) + { + outStream.Write(buf); + bufOff = 0; + } + + outLen++; + } + + if (bufOff > 0) + { + outStream.Write(buf[..bufOff]); + } + + return outLen; + } +#endif + + /** + * decode the Hex encoded string data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public int DecodeString(string data, Stream outStream) + { + byte b1, b2; + int length = 0; +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span buf = stackalloc byte[36]; +#else + byte[] buf = new byte[36]; +#endif + int bufOff = 0; + int end = data.Length; + + while (end > 0) + { + if (!Ignore(data[end - 1])) + break; + + end--; + } + + int i = 0; + while (i < end) + { + while (i < end && Ignore(data[i])) + { + i++; + } + + b1 = decodingTable[data[i++]]; + + while (i < end && Ignore(data[i])) + { + i++; + } + + b2 = decodingTable[data[i++]]; + + if ((b1 | b2) >= 0x80) + throw new IOException("invalid characters encountered in Hex data"); + + buf[bufOff++] = (byte)((b1 << 4) | b2); + + if (bufOff == buf.Length) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + outStream.Write(buf); +#else + outStream.Write(buf, 0, bufOff); +#endif + bufOff = 0; + } + + length++; + } + + if (bufOff > 0) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + outStream.Write(buf[..bufOff]); +#else + outStream.Write(buf, 0, bufOff); +#endif + } + + return length; + } + + internal byte[] DecodeStrict(string str, int off, int len) + { + if (null == str) + throw new ArgumentNullException("str"); + if (off < 0 || len < 0 || off > (str.Length - len)) + throw new IndexOutOfRangeException("invalid offset and/or length specified"); + if (0 != (len & 1)) + throw new ArgumentException("a hexadecimal encoding must have an even number of characters", "len"); + + int resultLen = len >> 1; + byte[] result = new byte[resultLen]; + + int strPos = off; + for (int i = 0; i < resultLen; ++i) + { + byte b1 = decodingTable[str[strPos++]]; + byte b2 = decodingTable[str[strPos++]]; + + if ((b1 | b2) >= 0x80) + throw new IOException("invalid characters encountered in Hex data"); + + result[i] = (byte)((b1 << 4) | b2); + } + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs.meta new file mode 100644 index 00000000..a333c1f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 872fa54f158a32f4d94d73854f617bcf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexEncoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs new file mode 100644 index 00000000..97b8c671 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs @@ -0,0 +1,112 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /// + /// A hex translator. + /// + public class HexTranslator : ITranslator + { + private static readonly byte[] hexTable = + { + (byte)'0', (byte)'1', (byte)'2', (byte)'3', (byte)'4', (byte)'5', (byte)'6', (byte)'7', + (byte)'8', (byte)'9', (byte)'a', (byte)'b', (byte)'c', (byte)'d', (byte)'e', (byte)'f' + }; + + /// + /// Return encoded block size. + /// + /// 2 + public int GetEncodedBlockSize() + { + return 2; + } + + /// + /// Encode some data. + /// + /// Input data array. + /// Start position within input data array. + /// The amount of data to process. + /// The output data array. + /// The offset within the output data array to start writing from. + /// Amount of data encoded. + public int Encode( + byte[] input, + int inOff, + int length, + byte[] outBytes, + int outOff) + { + for (int i = 0, j = 0; i < length; i++, j += 2) + { + outBytes[outOff + j] = hexTable[(input[inOff] >> 4) & 0x0f]; + outBytes[outOff + j + 1] = hexTable[input[inOff] & 0x0f]; + + inOff++; + } + + return length * 2; + } + + /// + /// Returns the decoded block size. + /// + /// 1 + public int GetDecodedBlockSize() + { + return 1; + } + + /// + /// Decode data from a byte array. + /// + /// The input data array. + /// Start position within input data array. + /// The amounty of data to process. + /// The output data array. + /// The position within the output data array to start writing from. + /// The amount of data written. + public int Decode( + byte[] input, + int inOff, + int length, + byte[] outBytes, + int outOff) + { + int halfLength = length / 2; + byte left, right; + for (int i = 0; i < halfLength; i++) + { + left = input[inOff + i * 2]; + right = input[inOff + i * 2 + 1]; + + if (left < (byte)'a') + { + outBytes[outOff] = (byte)((left - '0') << 4); + } + else + { + outBytes[outOff] = (byte)((left - 'a' + 10) << 4); + } + if (right < (byte)'a') + { + outBytes[outOff] += (byte)(right - '0'); + } + else + { + outBytes[outOff] += (byte)(right - 'a' + 10); + } + + outOff++; + } + + return halfLength; + } + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs.meta new file mode 100644 index 00000000..627b5797 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 88fc882be662e6d49abacaba2f385d22 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/HexTranslator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs new file mode 100644 index 00000000..32df308f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs @@ -0,0 +1,30 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /** + * Encode and decode byte arrays (typically from binary to 7-bit ASCII + * encodings). + */ + public interface IEncoder + { + int Encode(byte[] data, int off, int length, Stream outStream); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int Encode(ReadOnlySpan data, Stream outStream); +#endif + + int Decode(byte[] data, int off, int length, Stream outStream); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int Decode(ReadOnlySpan data, Stream outStream); +#endif + + int DecodeString(string data, Stream outStream); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs.meta new file mode 100644 index 00000000..f1e6a29b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8f8062fb69e0bfc4d921903d3b332803 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/IEncoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs new file mode 100644 index 00000000..ad736d29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /// + /// Translator interface. + /// + public interface ITranslator + { + int GetEncodedBlockSize(); + + int Encode(byte[] input, int inOff, int length, byte[] outBytes, int outOff); + + int GetDecodedBlockSize(); + + int Decode(byte[] input, int inOff, int length, byte[] outBytes, int outOff); + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs.meta new file mode 100644 index 00000000..466b9fb4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 706003b77f4a59848a410906ddf3ea98 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/Translator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs new file mode 100644 index 00000000..ce05f5dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs @@ -0,0 +1,131 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /** + * Convert binary data to and from UrlBase64 encoding. This is identical to + * Base64 encoding, except that the padding character is "." and the other + * non-alphanumeric characters are "-" and "_" instead of "+" and "/". + *

    + * The purpose of UrlBase64 encoding is to provide a compact encoding of binary + * data that is safe for use as an URL parameter. Base64 encoding does not + * produce encoded values that are safe for use in URLs, since "/" can be + * interpreted as a path delimiter; "+" is the encoded form of a space; and + * "=" is used to separate a name from the corresponding value in an URL + * parameter. + *

    + */ + public class UrlBase64 + { + private static readonly IEncoder encoder = new UrlBase64Encoder(); + + /** + * Encode the input data producing a URL safe base 64 encoded byte array. + * + * @return a byte array containing the URL safe base 64 encoded data. + */ + public static byte[] Encode( + byte[] data) + { + MemoryStream bOut = new MemoryStream(); + + try + { + encoder.Encode(data, 0, data.Length, bOut); + } + catch (IOException e) + { + throw new Exception("exception encoding URL safe base64 string: " + e.Message, e); + } + + return bOut.ToArray(); + } + + /** + * Encode the byte data writing it to the given output stream. + * + * @return the number of bytes produced. + */ + public static int Encode( + byte[] data, + Stream outStr) + { + return encoder.Encode(data, 0, data.Length, outStr); + } + + /** + * Decode the URL safe base 64 encoded input data - white space will be ignored. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + byte[] data) + { + MemoryStream bOut = new MemoryStream(); + + try + { + encoder.Decode(data, 0, data.Length, bOut); + } + catch (IOException e) + { + throw new Exception("exception decoding URL safe base64 string: " + e.Message, e); + } + + return bOut.ToArray(); + } + + /** + * decode the URL safe base 64 encoded byte data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public static int Decode( + byte[] data, + Stream outStr) + { + return encoder.Decode(data, 0, data.Length, outStr); + } + + /** + * decode the URL safe base 64 encoded string data - whitespace will be ignored. + * + * @return a byte array representing the decoded data. + */ + public static byte[] Decode( + string data) + { + MemoryStream bOut = new MemoryStream(); + + try + { + encoder.DecodeString(data, bOut); + } + catch (IOException e) + { + throw new Exception("exception decoding URL safe base64 string: " + e.Message, e); + } + + return bOut.ToArray(); + } + + /** + * Decode the URL safe base 64 encoded string data writing it to the given output stream, + * whitespace characters will be ignored. + * + * @return the number of bytes produced. + */ + public static int Decode( + string data, + Stream outStr) + { + return encoder.DecodeString(data, outStr); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs.meta new file mode 100644 index 00000000..bb7d5246 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0ec522de5ab0d2c40a961d3e35759c8a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs new file mode 100644 index 00000000..7c644f3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders +{ + /** + * Convert binary data to and from UrlBase64 encoding. This is identical to + * Base64 encoding, except that the padding character is "." and the other + * non-alphanumeric characters are "-" and "_" instead of "+" and "/". + *

    + * The purpose of UrlBase64 encoding is to provide a compact encoding of binary + * data that is safe for use as an URL parameter. Base64 encoding does not + * produce encoded values that are safe for use in URLs, since "/" can be + * interpreted as a path delimiter; "+" is the encoded form of a space; and + * "=" is used to separate a name from the corresponding value in an URL + * parameter. + *

    + */ + public class UrlBase64Encoder + : Base64Encoder + { + public UrlBase64Encoder() + { + encodingTable[encodingTable.Length - 2] = (byte) '-'; + encodingTable[encodingTable.Length - 1] = (byte) '_'; + padding = (byte) '.'; + // we must re-create the decoding table with the new encoded values. + InitialiseDecodingTable(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs.meta new file mode 100644 index 00000000..70fe48c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4cf7201858cd1b540863c832bfec0739 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/encoders/UrlBase64Encoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io.meta new file mode 100644 index 00000000..4566afd7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: db1e44ac042776b47b90f3a1703e5f9d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs new file mode 100644 index 00000000..2368995f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs @@ -0,0 +1,57 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public abstract class BaseInputStream + : Stream + { + public sealed override bool CanRead { get { return true; } } + public sealed override bool CanSeek { get { return false; } } + public sealed override bool CanWrite { get { return false; } } + + public sealed override void Flush() {} + public sealed override long Length { get { throw new NotSupportedException(); } } + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + int pos = 0; + try + { + while (pos < count) + { + int b = ReadByte(); + if (b < 0) + break; + + buffer[offset + pos++] = (byte)b; + } + } + catch (IOException) + { + if (pos == 0) + throw; + } + return pos; + } + + public sealed override long Seek(long offset, SeekOrigin origin) { throw new NotSupportedException(); } + public sealed override void SetLength(long value) { throw new NotSupportedException(); } + public sealed override void Write(byte[] buffer, int offset, int count) { throw new NotSupportedException(); } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) { throw new NotSupportedException(); } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs.meta new file mode 100644 index 00000000..dbe7cb41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8d3c7df3d713db44b8a85441a7f79523 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs new file mode 100644 index 00000000..3ea660b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public abstract class BaseOutputStream + : Stream + { + public sealed override bool CanRead { get { return false; } } + public sealed override bool CanSeek { get { return false; } } + public sealed override bool CanWrite { get { return true; } } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) { throw new NotSupportedException(); } +#endif + public override void Flush() {} + public sealed override long Length { get { throw new NotSupportedException(); } } + public sealed override long Position + { + get { throw new NotSupportedException(); } + set { throw new NotSupportedException(); } + } + public sealed override int Read(byte[] buffer, int offset, int count) { throw new NotSupportedException(); } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public sealed override int Read(Span buffer) { throw new NotSupportedException(); } +#endif + public sealed override long Seek(long offset, SeekOrigin origin) { throw new NotSupportedException(); } + public sealed override void SetLength(long value) { throw new NotSupportedException(); } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + for (int i = 0; i < count; ++i) + { + WriteByte(buffer[offset + i]); + } + } + + public virtual void Write(params byte[] buffer) + { + Write(buffer, 0, buffer.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs.meta new file mode 100644 index 00000000..14b79c1f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c619d8578417f68448ce7e16e61d6826 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BaseOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs new file mode 100644 index 00000000..4d43bcf5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs @@ -0,0 +1,98 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public static class BinaryReaders + { + public static byte[] ReadBytesFully(BinaryReader binaryReader, int count) + { + byte[] bytes = binaryReader.ReadBytes(count); + if (bytes == null || bytes.Length != count) + throw new EndOfStreamException(); + return bytes; + } + + public static short ReadInt16BigEndian(BinaryReader binaryReader) + { + short n = binaryReader.ReadInt16(); + return BitConverter.IsLittleEndian ? Shorts.ReverseBytes(n) : n; + } + + public static short ReadInt16LittleEndian(BinaryReader binaryReader) + { + short n = binaryReader.ReadInt16(); + return BitConverter.IsLittleEndian ? n : Shorts.ReverseBytes(n); + } + + public static int ReadInt32BigEndian(BinaryReader binaryReader) + { + int n = binaryReader.ReadInt32(); + return BitConverter.IsLittleEndian ? Integers.ReverseBytes(n) : n; + } + + public static int ReadInt32LittleEndian(BinaryReader binaryReader) + { + int n = binaryReader.ReadInt32(); + return BitConverter.IsLittleEndian ? n : Integers.ReverseBytes(n); + } + + public static long ReadInt64BigEndian(BinaryReader binaryReader) + { + long n = binaryReader.ReadInt64(); + return BitConverter.IsLittleEndian ? Longs.ReverseBytes(n) : n; + } + + public static long ReadInt64LittleEndian(BinaryReader binaryReader) + { + long n = binaryReader.ReadInt64(); + return BitConverter.IsLittleEndian ? n : Longs.ReverseBytes(n); + } + + [CLSCompliant(false)] + public static ushort ReadUInt16BigEndian(BinaryReader binaryReader) + { + ushort n = binaryReader.ReadUInt16(); + return BitConverter.IsLittleEndian ? Shorts.ReverseBytes(n) : n; + } + + [CLSCompliant(false)] + public static ushort ReadUInt16LittleEndian(BinaryReader binaryReader) + { + ushort n = binaryReader.ReadUInt16(); + return BitConverter.IsLittleEndian ? n : Shorts.ReverseBytes(n); + } + + [CLSCompliant(false)] + public static uint ReadUInt32BigEndian(BinaryReader binaryReader) + { + uint n = binaryReader.ReadUInt32(); + return BitConverter.IsLittleEndian ? Integers.ReverseBytes(n) : n; + } + + [CLSCompliant(false)] + public static uint ReadUInt32LittleEndian(BinaryReader binaryReader) + { + uint n = binaryReader.ReadUInt32(); + return BitConverter.IsLittleEndian ? n : Integers.ReverseBytes(n); + } + + [CLSCompliant(false)] + public static ulong ReadUInt64BigEndian(BinaryReader binaryReader) + { + ulong n = binaryReader.ReadUInt64(); + return BitConverter.IsLittleEndian ? Longs.ReverseBytes(n) : n; + } + + [CLSCompliant(false)] + public static ulong ReadUInt64LittleEndian(BinaryReader binaryReader) + { + ulong n = binaryReader.ReadUInt64(); + return BitConverter.IsLittleEndian ? n : Longs.ReverseBytes(n); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs.meta new file mode 100644 index 00000000..d56cda1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fce3edadd1191454491f938ec31dd95c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryReaders.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs new file mode 100644 index 00000000..7554cc86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs @@ -0,0 +1,90 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public static class BinaryWriters + { + public static void WriteInt16BigEndian(BinaryWriter binaryWriter, short n) + { + short bigEndian = BitConverter.IsLittleEndian ? Shorts.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + public static void WriteInt16LittleEndian(BinaryWriter binaryWriter, short n) + { + short littleEndian = BitConverter.IsLittleEndian ? n : Shorts.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + + public static void WriteInt32BigEndian(BinaryWriter binaryWriter, int n) + { + int bigEndian = BitConverter.IsLittleEndian ? Integers.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + public static void WriteInt32LittleEndian(BinaryWriter binaryWriter, int n) + { + int littleEndian = BitConverter.IsLittleEndian ? n : Integers.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + + public static void WriteInt64BigEndian(BinaryWriter binaryWriter, long n) + { + long bigEndian = BitConverter.IsLittleEndian ? Longs.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + public static void WriteInt64LittleEndian(BinaryWriter binaryWriter, long n) + { + long littleEndian = BitConverter.IsLittleEndian ? n : Longs.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt16BigEndian(BinaryWriter binaryWriter, ushort n) + { + ushort bigEndian = BitConverter.IsLittleEndian ? Shorts.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt16LittleEndian(BinaryWriter binaryWriter, ushort n) + { + ushort littleEndian = BitConverter.IsLittleEndian ? n : Shorts.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt32BigEndian(BinaryWriter binaryWriter, uint n) + { + uint bigEndian = BitConverter.IsLittleEndian ? Integers.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt32LittleEndian(BinaryWriter binaryWriter, uint n) + { + uint littleEndian = BitConverter.IsLittleEndian ? n : Integers.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt64BigEndian(BinaryWriter binaryWriter, ulong n) + { + ulong bigEndian = BitConverter.IsLittleEndian ? Longs.ReverseBytes(n) : n; + binaryWriter.Write(bigEndian); + } + + [CLSCompliant(false)] + public static void WriteUInt64LittleEndian(BinaryWriter binaryWriter, ulong n) + { + ulong littleEndian = BitConverter.IsLittleEndian ? n : Longs.ReverseBytes(n); + binaryWriter.Write(littleEndian); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs.meta new file mode 100644 index 00000000..c151a199 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 49d753068f0ab3840b50807d6fd9efbd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/BinaryWriters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs new file mode 100644 index 00000000..e91a0074 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs @@ -0,0 +1,100 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class FilterStream + : Stream + { + protected readonly Stream s; + + public FilterStream(Stream s) + { + this.s = s ?? throw new ArgumentNullException(nameof(s)); + } + public override bool CanRead + { + get { return s.CanRead; } + } + public override bool CanSeek + { + get { return s.CanSeek; } + } + public override bool CanWrite + { + get { return s.CanWrite; } + } +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + s.CopyTo(destination, bufferSize); + } +#endif + public override void Flush() + { + s.Flush(); + } + public override long Length + { + get { return s.Length; } + } + public override long Position + { + get { return s.Position; } + set { s.Position = value; } + } + public override int Read(byte[] buffer, int offset, int count) + { + return s.Read(buffer, offset, count); + } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + return s.Read(buffer); + } +#endif + public override int ReadByte() + { + return s.ReadByte(); + } + public override long Seek(long offset, SeekOrigin origin) + { + return s.Seek(offset, origin); + } + public override void SetLength(long value) + { + s.SetLength(value); + } + public override void Write(byte[] buffer, int offset, int count) + { + s.Write(buffer, offset, count); + } +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + s.Write(buffer); + } +#endif + public override void WriteByte(byte value) + { + s.WriteByte(value); + } + protected void Detach(bool disposing) + { + base.Dispose(disposing); + } + protected override void Dispose(bool disposing) + { + if (disposing) + { + s.Dispose(); + } + + base.Dispose(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs.meta new file mode 100644 index 00000000..591a127c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed3b3b33e3d5f8341af1407e24495b36 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/FilterStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs new file mode 100644 index 00000000..e6158233 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs @@ -0,0 +1,60 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib; +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + internal class LimitedInputStream + : BaseInputStream + { + private readonly Stream m_stream; + private long m_limit; + + internal LimitedInputStream(Stream stream, long limit) + { + this.m_stream = stream; + this.m_limit = limit; + } + + internal long CurrentLimit => m_limit; + + public override int Read(byte[] buffer, int offset, int count) + { + int numRead = m_stream.Read(buffer, offset, count); + if (numRead > 0) + { + if ((m_limit -= numRead) < 0) + throw new StreamOverflowException("Data Overflow"); + } + return numRead; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int numRead = m_stream.Read(buffer); + if (numRead > 0) + { + if ((m_limit -= numRead) < 0) + throw new StreamOverflowException("Data Overflow"); + } + return numRead; + } +#endif + + public override int ReadByte() + { + int b = m_stream.ReadByte(); + if (b >= 0) + { + if (--m_limit < 0) + throw new StreamOverflowException("Data Overflow"); + } + return b; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs.meta new file mode 100644 index 00000000..187a4723 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2b259dfe1ec7b794982f204a725915cf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/LimitedInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs new file mode 100644 index 00000000..16221d72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs @@ -0,0 +1,23 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class MemoryInputStream + : MemoryStream + { + public MemoryInputStream(byte[] buffer) + : base(buffer, false) + { + } + + public sealed override bool CanWrite + { + get { return false; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs.meta new file mode 100644 index 00000000..deffa2b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 93486c9465c55d544b217d49d89e769f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs new file mode 100644 index 00000000..3fe2945b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs @@ -0,0 +1,18 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class MemoryOutputStream + : MemoryStream + { + public sealed override bool CanRead + { + get { return false; } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs.meta new file mode 100644 index 00000000..2a8fa535 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8c8434b188ea1394f9eea7856c6d502f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/MemoryOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs new file mode 100644 index 00000000..6d0a6c00 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs @@ -0,0 +1,87 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class PushbackStream + : FilterStream + { + private int m_buf = -1; + + public PushbackStream(Stream s) + : base(s) + { + } + +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || (UNITY_2021_2_OR_NEWER && (NET_STANDARD_2_0 || NET_STANDARD_2_1)) + public override void CopyTo(Stream destination, int bufferSize) + { + if (m_buf != -1) + { + destination.WriteByte((byte)m_buf); + m_buf = -1; + } + + s.CopyTo(destination, bufferSize); + } +#endif + + public override int Read(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (m_buf != -1) + { + if (count < 1) + return 0; + + buffer[offset] = (byte)m_buf; + m_buf = -1; + return 1; + } + + return s.Read(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + if (m_buf != -1) + { + if (buffer.IsEmpty) + return 0; + + buffer[0] = (byte)m_buf; + m_buf = -1; + return 1; + } + + return s.Read(buffer); + } +#endif + + public override int ReadByte() + { + if (m_buf != -1) + { + int tmp = m_buf; + m_buf = -1; + return tmp; + } + + return base.ReadByte(); + } + + public virtual void Unread(int b) + { + if (m_buf != -1) + throw new InvalidOperationException("Can only push back one byte"); + + m_buf = b & 0xFF; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs.meta new file mode 100644 index 00000000..d80225ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2f19db2f73dd28f4fb543d28d35a6034 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/PushbackStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs new file mode 100644 index 00000000..607da5fe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs @@ -0,0 +1,35 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + [Serializable] + public class StreamOverflowException + : IOException + { + public StreamOverflowException() + : base() + { + } + + public StreamOverflowException(string message) + : base(message) + { + } + + public StreamOverflowException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected StreamOverflowException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs.meta new file mode 100644 index 00000000..088c4644 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 279bdd2eefacecb4287bfa1cdb0dd4eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/StreamOverflowException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs new file mode 100644 index 00000000..17d08b5d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs @@ -0,0 +1,140 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public static class Streams + { + private const int BufferSize = 4096; + + public static void Drain(Stream inStr) + { + inStr.CopyTo(Stream.Null, BufferSize); + } + + /// Write the full contents of inStr to the destination stream outStr. + /// Source stream. + /// Destination stream. + /// In case of IO failure. + public static void PipeAll(Stream inStr, Stream outStr) + { + inStr.CopyTo(outStr, BufferSize); + } + + /// Write the full contents of inStr to the destination stream outStr. + /// Source stream. + /// Destination stream. + /// The size of temporary buffer to use. + /// In case of IO failure. + public static void PipeAll(Stream inStr, Stream outStr, int bufferSize) + { + inStr.CopyTo(outStr, bufferSize); + } + + /// + /// Pipe all bytes from inStr to outStr, throwing StreamFlowException if greater + /// than limit bytes in inStr. + /// + /// + /// A + /// + /// + /// A + /// + /// + /// A + /// + /// The number of bytes actually transferred, if not greater than limit + /// + public static long PipeAllLimited(Stream inStr, long limit, Stream outStr) + { + var limited = new LimitedInputStream(inStr, limit); + limited.CopyTo(outStr, BufferSize); + return limit - limited.CurrentLimit; + } + + public static byte[] ReadAll(Stream inStr) + { + MemoryStream buf = new MemoryStream(); + PipeAll(inStr, buf); + return buf.ToArray(); + } + + public static byte[] ReadAll(MemoryStream inStr) + { + return inStr.ToArray(); + } + + public static byte[] ReadAllLimited(Stream inStr, int limit) + { + MemoryStream buf = new MemoryStream(); + PipeAllLimited(inStr, limit, buf); + return buf.ToArray(); + } + + public static int ReadFully(Stream inStr, byte[] buf) + { + return ReadFully(inStr, buf, 0, buf.Length); + } + + public static int ReadFully(Stream inStr, byte[] buf, int off, int len) + { + int totalRead = 0; + while (totalRead < len) + { + int numRead = inStr.Read(buf, off + totalRead, len - totalRead); + if (numRead < 1) + break; + totalRead += numRead; + } + return totalRead; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public static int ReadFully(Stream inStr, Span buffer) + { + int totalRead = 0; + while (totalRead < buffer.Length) + { + int numRead = inStr.Read(buffer[totalRead..]); + if (numRead < 1) + break; + totalRead += numRead; + } + return totalRead; + } +#endif + + public static void ValidateBufferArguments(byte[] buffer, int offset, int count) + { + if (buffer == null) + throw new ArgumentNullException("buffer"); + int available = buffer.Length - offset; + if ((offset | available) < 0) + throw new ArgumentOutOfRangeException("offset"); + int remaining = available - count; + if ((count | remaining) < 0) + throw new ArgumentOutOfRangeException("count"); + } + + /// + public static int WriteBufTo(MemoryStream buf, byte[] output, int offset) + { +#if NETCOREAPP2_0_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (buf.TryGetBuffer(out var buffer)) + { + buffer.CopyTo(output, offset); + return buffer.Count; + } +#endif + + int size = Convert.ToInt32(buf.Length); + buf.WriteTo(new MemoryStream(output, offset, size)); + return size; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs.meta new file mode 100644 index 00000000..ab27a9bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7089ea257ba29894db3af5eb53489c91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/Streams.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs new file mode 100644 index 00000000..3118c0ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs @@ -0,0 +1,73 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class TeeInputStream + : BaseInputStream + { + private readonly Stream input, tee; + + public TeeInputStream(Stream input, Stream tee) + { + Debug.Assert(input.CanRead); + Debug.Assert(tee.CanWrite); + + this.input = input; + this.tee = tee; + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + input.Dispose(); + tee.Dispose(); + } + base.Dispose(disposing); + } + + public override int Read(byte[] buffer, int offset, int count) + { + int i = input.Read(buffer, offset, count); + + if (i > 0) + { + tee.Write(buffer, offset, i); + } + + return i; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override int Read(Span buffer) + { + int i = input.Read(buffer); + + if (i > 0) + { + tee.Write(buffer[..i]); + } + + return i; + } +#endif + + public override int ReadByte() + { + int i = input.ReadByte(); + + if (i >= 0) + { + tee.WriteByte((byte)i); + } + + return i; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs.meta new file mode 100644 index 00000000..344fddc3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 78f1188bec8f1ac42a3c7d91c1a30268 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeInputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs new file mode 100644 index 00000000..4b4deee2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs @@ -0,0 +1,55 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO +{ + public class TeeOutputStream + : BaseOutputStream + { + private readonly Stream output, tee; + + public TeeOutputStream(Stream output, Stream tee) + { + Debug.Assert(output.CanWrite); + Debug.Assert(tee.CanWrite); + + this.output = output; + this.tee = tee; + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + output.Dispose(); + tee.Dispose(); + } + base.Dispose(disposing); + } + + public override void Write(byte[] buffer, int offset, int count) + { + output.Write(buffer, offset, count); + tee.Write(buffer, offset, count); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public override void Write(ReadOnlySpan buffer) + { + output.Write(buffer); + tee.Write(buffer); + } +#endif + + public override void WriteByte(byte value) + { + output.WriteByte(value); + tee.WriteByte(value); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs.meta new file mode 100644 index 00000000..517e04af --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ee01e6fa38384014894902dca90d9f07 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/TeeOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression.meta new file mode 100644 index 00000000..f04f4d92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e481329737ea54c449534183e8a444cb +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs new file mode 100644 index 00000000..96f24393 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs @@ -0,0 +1,25 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Compression +{ + using Impl = Utilities.Bzip2; + + internal static class Bzip2 + { + internal static Stream CompressOutput(Stream stream, bool leaveOpen = false) + { + return leaveOpen + ? new Impl.CBZip2OutputStreamLeaveOpen(stream) + : new Impl.CBZip2OutputStream(stream); + } + + internal static Stream DecompressInput(Stream stream) + { + return new Impl.CBZip2InputStream(stream); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs.meta new file mode 100644 index 00000000..2cb46a67 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d04b453ee61d0b549821205ed981a483 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Bzip2.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs new file mode 100644 index 00000000..3bfe8c48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs @@ -0,0 +1,50 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +#if NET6_0_OR_GREATER +using System.IO.Compression; +#else +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Compression +{ + internal static class ZLib + { + internal static Stream CompressOutput(Stream stream, int zlibCompressionLevel, bool leaveOpen = false) + { +#if NET6_0_OR_GREATER + return new ZLibStream(stream, GetCompressionLevel(zlibCompressionLevel), leaveOpen); +#else + return leaveOpen + ? new ZOutputStreamLeaveOpen(stream, zlibCompressionLevel, false) + : new ZOutputStream(stream, zlibCompressionLevel, false); +#endif + } + + internal static Stream DecompressInput(Stream stream) + { +#if NET6_0_OR_GREATER + return new ZLibStream(stream, CompressionMode.Decompress, leaveOpen: false); +#else + return new ZInputStream(stream); +#endif + } + +#if NET6_0_OR_GREATER + internal static CompressionLevel GetCompressionLevel(int zlibCompressionLevel) + { + return zlibCompressionLevel switch + { + 0 => CompressionLevel.NoCompression, + 1 or 2 or 3 => CompressionLevel.Fastest, + 7 or 8 or 9 => CompressionLevel.SmallestSize, + _ => CompressionLevel.Optimal, + }; + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs.meta new file mode 100644 index 00000000..2a80a36b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b0af16ed78741a14c88aa3b66f6d4b2f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/ZLib.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs new file mode 100644 index 00000000..eac7db6b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs @@ -0,0 +1,37 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System.IO; + +#if NET6_0_OR_GREATER +using System.IO.Compression; +#else +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib; +#endif + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Compression +{ + internal static class Zip + { + internal static Stream CompressOutput(Stream stream, int zlibCompressionLevel, bool leaveOpen = false) + { +#if NET6_0_OR_GREATER + return new DeflateStream(stream, ZLib.GetCompressionLevel(zlibCompressionLevel), leaveOpen); +#else + return leaveOpen + ? new ZOutputStreamLeaveOpen(stream, zlibCompressionLevel, true) + : new ZOutputStream(stream, zlibCompressionLevel, true); +#endif + } + + internal static Stream DecompressInput(Stream stream) + { +#if NET6_0_OR_GREATER + return new DeflateStream(stream, CompressionMode.Decompress, leaveOpen: false); +#else + return new ZInputStream(stream, true); +#endif + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs.meta new file mode 100644 index 00000000..38bb529e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 398602b3dbbd7f1458ca04870a4452ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/compression/Zip.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem.meta new file mode 100644 index 00000000..a532f7cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 52264ae1689071e4b86aff6fadb9d9a2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs new file mode 100644 index 00000000..66eac7aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs @@ -0,0 +1,34 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.Serialization; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + [Serializable] + public class PemGenerationException + : Exception + { + public PemGenerationException() + : base() + { + } + + public PemGenerationException(string message) + : base(message) + { + } + + public PemGenerationException(string message, Exception innerException) + : base(message, innerException) + { + } + + protected PemGenerationException(SerializationInfo info, StreamingContext context) + : base(info, context) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs.meta new file mode 100644 index 00000000..11b9c769 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 54711797ae622c84188cfbb9a5cae97a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemGenerationException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs new file mode 100644 index 00000000..317fd0f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs @@ -0,0 +1,64 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + public class PemHeader + { + private string name; + private string val; + + public PemHeader(string name, string val) + { + this.name = name; + this.val = val; + } + + public virtual string Name + { + get { return name; } + } + + public virtual string Value + { + get { return val; } + } + + public override int GetHashCode() + { + return GetHashCode(this.name) + 31 * GetHashCode(this.val); + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + + if (!(obj is PemHeader)) + return false; + + PemHeader other = (PemHeader)obj; + + return Org.BouncyCastle.Utilities.Platform.Equals(this.name, other.name) + && Org.BouncyCastle.Utilities.Platform.Equals(this.val, other.val); + } + + private int GetHashCode(string s) + { + if (s == null) + { + return 1; + } + + return s.GetHashCode(); + } + + public override string ToString() + { + return name + ":" + val; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs.meta new file mode 100644 index 00000000..9573d609 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b892c40614a572f45af1714e78837483 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemHeader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs new file mode 100644 index 00000000..31042563 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs @@ -0,0 +1,49 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + public class PemObject + : PemObjectGenerator + { + private string type; + private IList headers; + private byte[] content; + + public PemObject(string type, byte[] content) + : this(type, new List(), content) + { + } + + public PemObject(string type, IList headers, byte[] content) + { + this.type = type; + this.headers = new List(headers); + this.content = content; + } + + public string Type + { + get { return type; } + } + + public IList Headers + { + get { return headers; } + } + + public byte[] Content + { + get { return content; } + } + + public PemObject Generate() + { + return this; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs.meta new file mode 100644 index 00000000..610c162c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4bce1d1ba4bf69e488437b0eb0f8e357 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObject.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs new file mode 100644 index 00000000..c0aaf936 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs @@ -0,0 +1,17 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + public interface PemObjectGenerator + { + /// + /// A + /// + /// + PemObject Generate(); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs.meta new file mode 100644 index 00000000..322b8652 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e16ccade6df2b64db6108492c8f51cb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs new file mode 100644 index 00000000..1dcd0624 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs @@ -0,0 +1,21 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + public interface PemObjectParser + { + /// + /// A + /// + /// + /// An + /// + /// + object ParseObject(PemObject obj); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs.meta new file mode 100644 index 00000000..799c274a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d60aad74ea940284c9e74e43ba83c881 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemObjectParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs new file mode 100644 index 00000000..98460d33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs @@ -0,0 +1,377 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + public class PemReader + : IDisposable + { + private readonly TextReader reader; + private readonly MemoryStream buffer; + private readonly StreamWriter textBuffer; + private readonly List pushback = new List(); + int c = 0; + + public PemReader(TextReader reader) + { + this.reader = reader ?? throw new ArgumentNullException(nameof(reader)); + this.buffer = new MemoryStream(); + this.textBuffer = new StreamWriter(buffer); + } + + #region IDisposable + + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + protected virtual void Dispose(bool disposing) + { + if (disposing) + { + reader.Dispose(); + } + } + + #endregion + + public TextReader Reader + { + get { return reader; } + } + + + /// + /// A + /// + /// + public PemObject ReadPemObject() + { + + // + // Look for BEGIN + // + + for (;;) + { + + // Seek a leading dash, ignore anything up to that point. + if (!seekDash()) + { + // There are no pem objects here. + return null; + } + + + // consume dash [-----]BEGIN ... + if (!consumeDash()) + { + throw new IOException("no data after consuming leading dashes"); + } + + + skipWhiteSpace(); + + + if (!expect("BEGIN")) + { + continue; + } + + break; + + } + + + skipWhiteSpace(); + + // + // Consume type, accepting whitespace + // + + if (!bufferUntilStopChar('-',false) ) + { + throw new IOException("ran out of data before consuming type"); + } + + string type = bufferedString().Trim(); + + + // Consume dashes after type. + + if (!consumeDash()) + { + throw new IOException("ran out of data consuming header"); + } + + skipWhiteSpace(); + + + // + // Read ahead looking for headers. + // Look for a colon for up to 64 characters, as an indication there might be a header. + // + + var headers = new List(); + + while (seekColon(64)) + { + + if (!bufferUntilStopChar(':',false)) + { + throw new IOException("ran out of data reading header key value"); + } + + string key = bufferedString().Trim(); + + + c = Read(); + if (c != ':') + { + throw new IOException("expected colon"); + } + + + // + // We are going to look for well formed headers, if they do not end with a "LF" we cannot + // discern where they end. + // + + if (!bufferUntilStopChar('\n', false)) // Now read to the end of the line. + { + throw new IOException("ran out of data before consuming header value"); + } + + skipWhiteSpace(); + + string value = bufferedString().Trim(); + headers.Add(new PemHeader(key,value)); + } + + + // + // Consume payload, ignoring all white space until we encounter a '-' + // + + skipWhiteSpace(); + + if (!bufferUntilStopChar('-',true)) + { + throw new IOException("ran out of data before consuming payload"); + } + + string payload = bufferedString(); + + // Seek the start of the end. + if (!seekDash()) + { + throw new IOException("did not find leading '-'"); + } + + if (!consumeDash()) + { + throw new IOException("no data after consuming trailing dashes"); + } + + if (!expect("END "+type)) + { + throw new IOException("END "+type+" was not found."); + } + + + + if (!seekDash()) + { + throw new IOException("did not find ending '-'"); + } + + + // consume trailing dashes. + consumeDash(); + + + return new PemObject(type, headers, Base64.Decode(payload)); + + } + + + + private string bufferedString() + { + textBuffer.Flush(); + string value = Strings.FromUtf8ByteArray(buffer.ToArray()); + buffer.Position = 0; + buffer.SetLength(0); + return value; + } + + + private bool seekDash() + { + c = 0; + while((c = Read()) >=0) + { + if (c == '-') + { + break; + } + } + + PushBack(c); + + return c == '-'; + } + + + /// + /// Seek ':" up to the limit. + /// + /// + /// + private bool seekColon(int upTo) + { + c = 0; + bool colonFound = false; + var read = new List(); + + for (; upTo>=0 && c >=0; upTo--) + { + c = Read(); + read.Add(c); + if (c == ':') + { + colonFound = true; + break; + } + } + + while(read.Count>0) + { + PushBack((int)read[read.Count-1]); + read.RemoveAt(read.Count-1); + } + + return colonFound; + } + + + + /// + /// Consume the dashes + /// + /// + private bool consumeDash() + { + c = 0; + while ((c = Read()) >= 0) + { + if (c != '-') + { + break; + } + } + + PushBack(c); + + return c != -1; + } + + /// + /// Skip white space leave char in stream. + /// + private void skipWhiteSpace() + { + while ((c = Read()) >= 0) + { + if (c > ' ') + { + break; + } + } + PushBack(c); + } + + /// + /// Read forward consuming the expected string. + /// + /// expected string + /// false if not consumed + + private bool expect(string value) + { + for (int t=0; t + /// Consume until dash. + /// + /// true if stream end not met + private bool bufferUntilStopChar(char stopChar, bool skipWhiteSpace) + { + while ((c = Read()) >= 0) + { + if (skipWhiteSpace && c <=' ') + { + continue; + } + + if (c != stopChar) + { + textBuffer.Write((char)c); + textBuffer.Flush(); + + } else + { + PushBack(c); + break; + } + } + + return c > -1; + } + + private void PushBack(int value) + { + if (pushback.Count == 0) + { + pushback.Add(value); + } else + { + pushback.Insert(0, value); + } + } + + private int Read() + { + if (pushback.Count > 0) + { + int i = pushback[0]; + pushback.RemoveAt(0); + return i; + } + + return reader.Read(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs.meta new file mode 100644 index 00000000..f047a606 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09f2d56aaf05d0c4583f2e055172290e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemReader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs new file mode 100644 index 00000000..c0acac19 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs @@ -0,0 +1,139 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem +{ + /** + * A generic PEM writer, based on RFC 1421 + */ + public class PemWriter + : IDisposable + { + private const int LineLength = 64; + + private readonly TextWriter writer; + private readonly int nlLength; + private char[] buf = new char[LineLength]; + + /** + * Base constructor. + * + * @param out output stream to use. + */ + public PemWriter(TextWriter writer) + { + this.writer = writer ?? throw new ArgumentNullException(nameof(writer)); + this.nlLength = Environment.NewLine.Length; + } + + #region IDisposable + + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + protected virtual void Dispose(bool disposing) + { + if (disposing) + { + writer.Dispose(); + } + } + + #endregion + + public TextWriter Writer + { + get { return writer; } + } + + /** + * Return the number of bytes or characters required to contain the + * passed in object if it is PEM encoded. + * + * @param obj pem object to be output + * @return an estimate of the number of bytes + */ + public int GetOutputSize(PemObject obj) + { + // BEGIN and END boundaries. + int size = (2 * (obj.Type.Length + 10 + nlLength)) + 6 + 4; + + if (obj.Headers.Count > 0) + { + foreach (PemHeader header in obj.Headers) + { + size += header.Name.Length + ": ".Length + header.Value.Length + nlLength; + } + + size += nlLength; + } + + // base64 encoding + int dataLen = ((obj.Content.Length + 2) / 3) * 4; + + size += dataLen + (((dataLen + LineLength - 1) / LineLength) * nlLength); + + return size; + } + + public void WriteObject(PemObjectGenerator objGen) + { + PemObject obj = objGen.Generate(); + + WritePreEncapsulationBoundary(obj.Type); + + if (obj.Headers.Count > 0) + { + foreach (PemHeader header in obj.Headers) + { + writer.Write(header.Name); + writer.Write(": "); + writer.WriteLine(header.Value); + } + + writer.WriteLine(); + } + + WriteEncoded(obj.Content); + WritePostEncapsulationBoundary(obj.Type); + } + + private void WriteEncoded(byte[] bytes) + { + bytes = Base64.Encode(bytes); + + for (int i = 0; i < bytes.Length; i += buf.Length) + { + int index = 0; + while (index != buf.Length) + { + if ((i + index) >= bytes.Length) + break; + + buf[index] = (char)bytes[i + index]; + index++; + } + writer.WriteLine(buf, 0, index); + } + } + + private void WritePreEncapsulationBoundary(string type) + { + writer.WriteLine("-----BEGIN " + type + "-----"); + } + + private void WritePostEncapsulationBoundary(string type) + { + writer.WriteLine("-----END " + type + "-----"); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs.meta new file mode 100644 index 00000000..61321cba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9bf98bac36d6fa7478399f9c8df01ab7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/io/pem/PemWriter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net.meta new file mode 100644 index 00000000..189c924a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 57904ebb74b9d0245a0e138522f778ec +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs new file mode 100644 index 00000000..840a5cd2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs @@ -0,0 +1,201 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Globalization; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Net +{ + public class IPAddress + { + /** + * Validate the given IPv4 or IPv6 address. + * + * @param address the IP address as a string. + * + * @return true if a valid address, false otherwise + */ + public static bool IsValid( + string address) + { + return IsValidIPv4(address) || IsValidIPv6(address); + } + + /** + * Validate the given IPv4 or IPv6 address and netmask. + * + * @param address the IP address as a string. + * + * @return true if a valid address with netmask, false otherwise + */ + public static bool IsValidWithNetMask( + string address) + { + return IsValidIPv4WithNetmask(address) || IsValidIPv6WithNetmask(address); + } + + /** + * Validate the given IPv4 address. + * + * @param address the IP address as a string. + * + * @return true if a valid IPv4 address, false otherwise + */ + public static bool IsValidIPv4( + string address) + { + try + { + return unsafeIsValidIPv4(address); + } + catch (FormatException) {} + catch (OverflowException) {} + return false; + } + + private static bool unsafeIsValidIPv4( + string address) + { + if (address.Length == 0) + return false; + + int octets = 0; + string temp = address + "."; + + int pos; + int start = 0; + while (start < temp.Length + && (pos = temp.IndexOf('.', start)) > start) + { + if (octets == 4) + return false; + + string octetStr = temp.Substring(start, pos - start); + int octet = int.Parse(octetStr); + + if (octet < 0 || octet > 255) + return false; + + start = pos + 1; + octets++; + } + + return octets == 4; + } + + public static bool IsValidIPv4WithNetmask( + string address) + { + int index = address.IndexOf('/'); + string mask = address.Substring(index + 1); + + return (index > 0) && IsValidIPv4(address.Substring(0, index)) + && (IsValidIPv4(mask) || IsMaskValue(mask, 32)); + } + + public static bool IsValidIPv6WithNetmask( + string address) + { + int index = address.IndexOf('/'); + string mask = address.Substring(index + 1); + + return (index > 0) && (IsValidIPv6(address.Substring(0, index)) + && (IsValidIPv6(mask) || IsMaskValue(mask, 128))); + } + + private static bool IsMaskValue( + string component, + int size) + { + int val = int.Parse(component); + try + { + return val >= 0 && val <= size; + } + catch (FormatException) {} + catch (OverflowException) {} + return false; + } + + /** + * Validate the given IPv6 address. + * + * @param address the IP address as a string. + * + * @return true if a valid IPv4 address, false otherwise + */ + public static bool IsValidIPv6( + string address) + { + try + { + return unsafeIsValidIPv6(address); + } + catch (FormatException) {} + catch (OverflowException) {} + return false; + } + + private static bool unsafeIsValidIPv6( + string address) + { + if (address.Length == 0) + { + return false; + } + + int octets = 0; + + string temp = address + ":"; + bool doubleColonFound = false; + int pos; + int start = 0; + while (start < temp.Length + && (pos = temp.IndexOf(':', start)) >= start) + { + if (octets == 8) + { + return false; + } + + if (start != pos) + { + string value = temp.Substring(start, pos - start); + + if (pos == (temp.Length - 1) && value.IndexOf('.') > 0) + { + if (!IsValidIPv4(value)) + { + return false; + } + + octets++; // add an extra one as address covers 2 words. + } + else + { + string octetStr = temp.Substring(start, pos - start); + int octet = int.Parse(octetStr, NumberStyles.AllowHexSpecifier); + + if (octet < 0 || octet > 0xffff) + return false; + } + } + else + { + if (pos != 1 && pos != temp.Length - 1 && doubleColonFound) + { + return false; + } + doubleColonFound = true; + } + start = pos + 1; + octets++; + } + + return octets == 8 || doubleColonFound; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs.meta new file mode 100644 index 00000000..81c9d5e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 650d0544fa59ab348886ddccdaa41a7c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/net/IPAddress.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib.meta new file mode 100644 index 00000000..0c32c330 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7911853902bec814785d8cec7bf9b0d3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs new file mode 100644 index 00000000..5e46a93f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: Adler32.cs,v 1.1 2006-07-31 13:59:25 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + internal sealed class Adler32{ + + // largest prime smaller than 65536 + private const int BASE=65521; + // NMAX is the largest n such that 255n(n+1)/2 + (n+1)(BASE-1) <= 2^32-1 + private const int NMAX=5552; + + internal long adler32(long adler, byte[] buf, int index, int len){ + if(buf == null){ return 1L; } + + long s1=adler&0xffff; + long s2=(adler>>16)&0xffff; + int k; + + while(len > 0) { + k=len=16){ + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + s1+=buf[index++]&0xff; s2+=s1; + k-=16; + } + if(k!=0){ + do{ + s1+=buf[index++]&0xff; s2+=s1; + } + while(--k!=0); + } + s1%=BASE; + s2%=BASE; + } + return (s2<<16)|s1; + } + + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs.meta new file mode 100644 index 00000000..8919895e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dfe2afbad742dc64b91ca3f4adafb777 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Adler32.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs new file mode 100644 index 00000000..58a0bdda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs @@ -0,0 +1,1638 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: Deflate.cs,v 1.2 2008-05-10 09:35:40 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + public sealed class Deflate{ + + private const int MAX_MEM_LEVEL=9; + + private const int Z_DEFAULT_COMPRESSION=-1; + + private const int MAX_WBITS=15; // 32K LZ77 window + private const int DEF_MEM_LEVEL=8; + + internal class Config{ + internal int good_length; // reduce lazy search above this match length + internal int max_lazy; // do not perform lazy search above this match length + internal int nice_length; // quit search above this match length + internal int max_chain; + internal int func; + internal Config(int good_length, int max_lazy, + int nice_length, int max_chain, int func){ + this.good_length=good_length; + this.max_lazy=max_lazy; + this.nice_length=nice_length; + this.max_chain=max_chain; + this.func=func; + } + } + + private const int STORED=0; + private const int FAST=1; + private const int SLOW=2; + private static readonly Config[] config_table; + + static Deflate(){ + config_table=new Config[10]; + // good lazy nice chain + config_table[0]=new Config(0, 0, 0, 0, STORED); + config_table[1]=new Config(4, 4, 8, 4, FAST); + config_table[2]=new Config(4, 5, 16, 8, FAST); + config_table[3]=new Config(4, 6, 32, 32, FAST); + + config_table[4]=new Config(4, 4, 16, 16, SLOW); + config_table[5]=new Config(8, 16, 32, 32, SLOW); + config_table[6]=new Config(8, 16, 128, 128, SLOW); + config_table[7]=new Config(8, 32, 128, 256, SLOW); + config_table[8]=new Config(32, 128, 258, 1024, SLOW); + config_table[9]=new Config(32, 258, 258, 4096, SLOW); + } + + private static readonly string[] z_errmsg = { + "need dictionary", // Z_NEED_DICT 2 + "stream end", // Z_STREAM_END 1 + "", // Z_OK 0 + "file error", // Z_ERRNO (-1) + "stream error", // Z_STREAM_ERROR (-2) + "data error", // Z_DATA_ERROR (-3) + "insufficient memory", // Z_MEM_ERROR (-4) + "buffer error", // Z_BUF_ERROR (-5) + "incompatible version",// Z_VERSION_ERROR (-6) + "" + }; + + // block not completed, need more input or more output + private const int NeedMore=0; + + // block flush performed + private const int BlockDone=1; + + // finish started, need only more output at next deflate + private const int FinishStarted=2; + + // finish done, accept no more input or output + private const int FinishDone=3; + + // preset dictionary flag in zlib header + private const int PRESET_DICT=0x20; + + private const int Z_FILTERED=1; + private const int Z_HUFFMAN_ONLY=2; + private const int Z_DEFAULT_STRATEGY=0; + + private const int Z_NO_FLUSH=0; + private const int Z_PARTIAL_FLUSH=1; + private const int Z_SYNC_FLUSH=2; + private const int Z_FULL_FLUSH=3; + private const int Z_FINISH=4; + + private const int Z_OK=0; + private const int Z_STREAM_END=1; + private const int Z_NEED_DICT=2; + private const int Z_ERRNO=-1; + private const int Z_STREAM_ERROR=-2; + private const int Z_DATA_ERROR=-3; + private const int Z_MEM_ERROR=-4; + private const int Z_BUF_ERROR=-5; + private const int Z_VERSION_ERROR=-6; + + private const int INIT_STATE=42; + private const int BUSY_STATE=113; + private const int FINISH_STATE=666; + + // The deflate compression method + private const int Z_DEFLATED=8; + + private const int STORED_BLOCK=0; + private const int STATIC_TREES=1; + private const int DYN_TREES=2; + + // The three kinds of block type + private const int Z_BINARY=0; + private const int Z_ASCII=1; + private const int Z_UNKNOWN=2; + + private const int Buf_size=8*2; + + // repeat previous bit length 3-6 times (2 bits of repeat count) + private const int REP_3_6=16; + + // repeat a zero length 3-10 times (3 bits of repeat count) + private const int REPZ_3_10=17; + + // repeat a zero length 11-138 times (7 bits of repeat count) + private const int REPZ_11_138=18; + + private const int MIN_MATCH=3; + private const int MAX_MATCH=258; + private const int MIN_LOOKAHEAD=(MAX_MATCH+MIN_MATCH+1); + + private const int MAX_BITS=15; + private const int D_CODES=30; + private const int BL_CODES=19; + private const int LENGTH_CODES=29; + private const int LITERALS=256; + private const int L_CODES=(LITERALS+1+LENGTH_CODES); + private const int HEAP_SIZE=(2*L_CODES+1); + + private const int END_BLOCK=256; + + internal ZStream strm; // pointer back to this zlib stream + internal int status; // as the name implies + internal byte[] pending_buf; // output still pending + internal int pending_out; // next pending byte to output to the stream + internal int pending; // nb of bytes in the pending buffer + internal int noheader; // suppress zlib header and adler32 + internal byte data_type; // UNKNOWN, BINARY or ASCII + internal byte method; // STORED (for zip only) or DEFLATED + internal int last_flush; // value of flush param for previous deflate call + + internal int w_size; // LZ77 window size (32K by default) + internal int w_bits; // log2(w_size) (8..16) + internal int w_mask; // w_size - 1 + + internal byte[] window; + // Sliding window. Input bytes are read into the second half of the window, + // and move to the first half later to keep a dictionary of at least wSize + // bytes. With this organization, matches are limited to a distance of + // wSize-MAX_MATCH bytes, but this ensures that IO is always + // performed with a length multiple of the block size. Also, it limits + // the window size to 64K, which is quite useful on MSDOS. + // To do: use the user input buffer as sliding window. + + internal int window_size; + // Actual size of window: 2*wSize, except when the user input buffer + // is directly used as sliding window. + + internal short[] prev; + // Link to older string with same hash index. To limit the size of this + // array to 64K, this link is maintained only for the last 32K strings. + // An index in this array is thus a window index modulo 32K. + + internal short[] head; // Heads of the hash chains or NIL. + + internal int ins_h; // hash index of string to be inserted + internal int hash_size; // number of elements in hash table + internal int hash_bits; // log2(hash_size) + internal int hash_mask; // hash_size-1 + + // Number of bits by which ins_h must be shifted at each input + // step. It must be such that after MIN_MATCH steps, the oldest + // byte no longer takes part in the hash key, that is: + // hash_shift * MIN_MATCH >= hash_bits + internal int hash_shift; + + // Window position at the beginning of the current output block. Gets + // negative when the window is moved backwards. + + internal int block_start; + + internal int match_length; // length of best match + internal int prev_match; // previous match + internal int match_available; // set if previous match exists + internal int strstart; // start of string to insert + internal int match_start; // start of matching string + internal int lookahead; // number of valid bytes ahead in window + + // Length of the best match at previous step. Matches not greater than this + // are discarded. This is used in the lazy match evaluation. + internal int prev_length; + + // To speed up deflation, hash chains are never searched beyond this + // length. A higher limit improves compression ratio but degrades the speed. + internal int max_chain_length; + + // Attempt to find a better match only when the current match is strictly + // smaller than this value. This mechanism is used only for compression + // levels >= 4. + internal int max_lazy_match; + + // Insert new strings in the hash table only if the match length is not + // greater than this length. This saves time but degrades compression. + // max_insert_length is used only for compression levels <= 3. + + internal int level; // compression level (1..9) + internal int strategy; // favor or force Huffman coding + + // Use a faster search when the previous match is longer than this + internal int good_match; + + // Stop searching when current match exceeds this + internal int nice_match; + + internal short[] dyn_ltree; // literal and length tree + internal short[] dyn_dtree; // distance tree + internal short[] bl_tree; // Huffman tree for bit lengths + + internal Tree l_desc=new Tree(); // desc for literal tree + internal Tree d_desc=new Tree(); // desc for distance tree + internal Tree bl_desc=new Tree(); // desc for bit length tree + + // number of codes at each bit length for an optimal tree + internal short[] bl_count=new short[MAX_BITS+1]; + + // heap used to build the Huffman trees + internal int[] heap=new int[2*L_CODES+1]; + + internal int heap_len; // number of elements in the heap + internal int heap_max; // element of largest frequency + // The sons of heap[n] are heap[2*n] and heap[2*n+1]. heap[0] is not used. + // The same heap array is used to build all trees. + + // Depth of each subtree used as tie breaker for trees of equal frequency + internal byte[] depth=new byte[2*L_CODES+1]; + + internal int l_buf; // index for literals or lengths */ + + // Size of match buffer for literals/lengths. There are 4 reasons for + // limiting lit_bufsize to 64K: + // - frequencies can be kept in 16 bit counters + // - if compression is not successful for the first block, all input + // data is still in the window so we can still emit a stored block even + // when input comes from standard input. (This can also be done for + // all blocks if lit_bufsize is not greater than 32K.) + // - if compression is not successful for a file smaller than 64K, we can + // even emit a stored file instead of a stored block (saving 5 bytes). + // This is applicable only for zip (not gzip or zlib). + // - creating new Huffman trees less frequently may not provide fast + // adaptation to changes in the input data statistics. (Take for + // example a binary file with poorly compressible code followed by + // a highly compressible string table.) Smaller buffer sizes give + // fast adaptation but have of course the overhead of transmitting + // trees more frequently. + // - I can't count above 4 + internal int lit_bufsize; + + internal int last_lit; // running index in l_buf + + // Buffer for distances. To simplify the code, d_buf and l_buf have + // the same number of elements. To use different lengths, an extra flag + // array would be necessary. + + internal int d_buf; // index of pendig_buf + + internal int opt_len; // bit length of current block with optimal trees + internal int static_len; // bit length of current block with static trees + internal int matches; // number of string matches in current block + internal int last_eob_len; // bit length of EOB code for last block + + // Output buffer. bits are inserted starting at the bottom (least + // significant bits). + internal uint bi_buf; + + // Number of valid bits in bi_buf. All bits above the last valid bit + // are always zero. + internal int bi_valid; + + internal Deflate(){ + dyn_ltree=new short[HEAP_SIZE*2]; + dyn_dtree=new short[(2*D_CODES+1)*2]; // distance tree + bl_tree=new short[(2*BL_CODES+1)*2]; // Huffman tree for bit lengths + } + + internal void lm_init() { + window_size=2*w_size; + + head[hash_size-1]=0; + for(int i=0; i= 3; max_blindex--) { + if (bl_tree[Tree.bl_order[max_blindex]*2+1] != 0) break; + } + // Update opt_len to include the bit length tree and counts + opt_len += 3*(max_blindex+1) + 5+5+4; + + return max_blindex; + } + + + // Send the header for a block using dynamic Huffman trees: the counts, the + // lengths of the bit length codes, the literal tree and the distance tree. + // IN assertion: lcodes >= 257, dcodes >= 1, blcodes >= 4. + internal void send_all_trees(int lcodes, int dcodes, int blcodes){ + int rank; // index in bl_order + + send_bits(lcodes-257, 5); // not +255 as stated in appnote.txt + send_bits(dcodes-1, 5); + send_bits(blcodes-4, 4); // not -3 as stated in appnote.txt + for (rank = 0; rank < blcodes; rank++) { + send_bits(bl_tree[Tree.bl_order[rank]*2+1], 3); + } + send_tree(dyn_ltree, lcodes-1); // literal tree + send_tree(dyn_dtree, dcodes-1); // distance tree + } + + // Send a literal or distance tree in compressed form, using the codes in + // bl_tree. + internal void send_tree (short[] tree,// the tree to be sent + int max_code // and its largest code of non zero frequency + ){ + int n; // iterates over all tree elements + int prevlen = -1; // last emitted length + int curlen; // length of current code + int nextlen = tree[0*2+1]; // length of next code + int count = 0; // repeat count of the current code + int max_count = 7; // max repeat count + int min_count = 4; // min repeat count + + if (nextlen == 0){ max_count = 138; min_count = 3; } + + for (n = 0; n <= max_code; n++) { + curlen = nextlen; nextlen = tree[(n+1)*2+1]; + if(++count < max_count && curlen == nextlen) { + continue; + } + else if(count < min_count) { + do { send_code(curlen, bl_tree); } while (--count != 0); + } + else if(curlen != 0){ + if(curlen != prevlen){ + send_code(curlen, bl_tree); count--; + } + send_code(REP_3_6, bl_tree); + send_bits(count-3, 2); + } + else if(count <= 10){ + send_code(REPZ_3_10, bl_tree); + send_bits(count-3, 3); + } + else{ + send_code(REPZ_11_138, bl_tree); + send_bits(count-11, 7); + } + count = 0; prevlen = curlen; + if(nextlen == 0){ + max_count = 138; min_count = 3; + } + else if(curlen == nextlen){ + max_count = 6; min_count = 3; + } + else{ + max_count = 7; min_count = 4; + } + } + } + + // Output a byte on the stream. + // IN assertion: there is enough room in pending_buf. + internal void put_byte(byte[] p, int start, int len){ + System.Array.Copy(p, start, pending_buf, pending, len); + pending+=len; + } + + internal void put_byte(byte c){ + pending_buf[pending++]=c; + } + internal void put_short(int w) { + pending_buf[pending++]=(byte)(w/*&0xff*/); + pending_buf[pending++]=(byte)(w>>8); + } + internal void putShortMSB(int b){ + pending_buf[pending++]=(byte)(b>>8); + pending_buf[pending++]=(byte)(b/*&0xff*/); + } + + internal void send_code(int c, short[] tree){ + int c2=c*2; + send_bits((tree[c2]&0xffff), (tree[c2+1]&0xffff)); + } + + internal void send_bits(int val, int length){ + if (bi_valid > Buf_size - length) { + bi_buf |= (uint)(val << bi_valid); + pending_buf[pending++]=(byte)(bi_buf/*&0xff*/); + pending_buf[pending++]=(byte)(bi_buf>>8); + bi_buf = ((uint)val) >> (Buf_size - bi_valid); + bi_valid += length - Buf_size; + } else { + bi_buf |= (uint)(val << bi_valid); + bi_valid += length; + } +// int len = length; +// if (bi_valid > (int)Buf_size - len) { +// int val = value; +// // bi_buf |= (val << bi_valid); +// bi_buf = (short)((ushort)bi_buf | (ushort)((val << bi_valid)&0xffff)); +// put_short(bi_buf); +// bi_buf = (short)(((uint)val) >> (Buf_size - bi_valid)); +// bi_valid += len - Buf_size; +// } else { +// // bi_buf |= (value) << bi_valid; +// bi_buf = (short)((ushort)bi_buf | (ushort)(((value) << bi_valid)&0xffff)); +// bi_valid += len; +// } + } + + // Send one empty static block to give enough lookahead for inflate. + // This takes 10 bits, of which 7 may remain in the bit buffer. + // The current inflate code requires 9 bits of lookahead. If the + // last two codes for the previous block (real code plus EOB) were coded + // on 5 bits or less, inflate may have only 5+3 bits of lookahead to decode + // the last real code. In this case we send two empty static blocks instead + // of one. (There are no problems if the previous block is stored or fixed.) + // To simplify the code, we assume the worst case of last real code encoded + // on one bit only. + internal void _tr_align(){ + send_bits(STATIC_TREES<<1, 3); + send_code(END_BLOCK, StaticTree.static_ltree); + + bi_flush(); + + // Of the 10 bits for the empty block, we have already sent + // (10 - bi_valid) bits. The lookahead for the last real code (before + // the EOB of the previous block) was thus at least one plus the length + // of the EOB plus what we have just sent of the empty static block. + if (1 + last_eob_len + 10 - bi_valid < 9) { + send_bits(STATIC_TREES<<1, 3); + send_code(END_BLOCK, StaticTree.static_ltree); + bi_flush(); + } + last_eob_len = 7; + } + + + // Save the match info and tally the frequency counts. Return true if + // the current block must be flushed. + internal bool _tr_tally (int dist, // distance of matched string + int lc // match length-MIN_MATCH or unmatched char (if dist==0) + ){ + + pending_buf[d_buf+last_lit*2] = (byte)(dist>>8); + pending_buf[d_buf+last_lit*2+1] = (byte)dist; + + pending_buf[l_buf+last_lit] = (byte)lc; last_lit++; + + if (dist == 0) { + // lc is the unmatched char + dyn_ltree[lc*2]++; + } + else { + matches++; + // Here, lc is the match length - MIN_MATCH + dist--; // dist = match distance - 1 + dyn_ltree[(Tree._length_code[lc]+LITERALS+1)*2]++; + dyn_dtree[Tree.d_code(dist)*2]++; + } + + if ((last_lit & 0x1fff) == 0 && level > 2) { + // Compute an upper bound for the compressed length + int out_length = last_lit*8; + int in_length = strstart - block_start; + int dcode; + for (dcode = 0; dcode < D_CODES; dcode++) { + out_length += (int)((int)dyn_dtree[dcode*2] * + (5L+Tree.extra_dbits[dcode])); + } + out_length >>= 3; + if ((matches < (last_lit/2)) && out_length < in_length/2) return true; + } + + return (last_lit == lit_bufsize-1); + // We avoid equality with lit_bufsize because of wraparound at 64K + // on 16 bit machines and because stored blocks are restricted to + // 64K-1 bytes. + } + + // Send the block data compressed using the given Huffman trees + internal void compress_block(short[] ltree, short[] dtree){ + int dist; // distance of matched string + int lc; // match length or unmatched char (if dist == 0) + int lx = 0; // running index in l_buf + int code; // the code to send + int extra; // number of extra bits to send + + if (last_lit != 0){ + do{ + dist=((pending_buf[d_buf+lx*2]<<8)&0xff00)| + (pending_buf[d_buf+lx*2+1]&0xff); + lc=(pending_buf[l_buf+lx])&0xff; lx++; + + if(dist == 0){ + send_code(lc, ltree); // send a literal byte + } + else{ + // Here, lc is the match length - MIN_MATCH + code = Tree._length_code[lc]; + + send_code(code+LITERALS+1, ltree); // send the length code + extra = Tree.extra_lbits[code]; + if(extra != 0){ + lc -= Tree.base_length[code]; + send_bits(lc, extra); // send the extra length bits + } + dist--; // dist is now the match distance - 1 + code = Tree.d_code(dist); + + send_code(code, dtree); // send the distance code + extra = Tree.extra_dbits[code]; + if (extra != 0) { + dist -= Tree.base_dist[code]; + send_bits(dist, extra); // send the extra distance bits + } + } // literal or match pair ? + + // Check that the overlay between pending_buf and d_buf+l_buf is ok: + } + while (lx < last_lit); + } + + send_code(END_BLOCK, ltree); + last_eob_len = ltree[END_BLOCK*2+1]; + } + + // Set the data type to ASCII or BINARY, using a crude approximation: + // binary if more than 20% of the bytes are <= 6 or >= 128, ascii otherwise. + // IN assertion: the fields freq of dyn_ltree are set and the total of all + // frequencies does not exceed 64K (to fit in an int on 16 bit machines). + internal void set_data_type(){ + int n = 0; + int ascii_freq = 0; + int bin_freq = 0; + while(n<7){ bin_freq += dyn_ltree[n*2]; n++;} + while(n<128){ ascii_freq += dyn_ltree[n*2]; n++;} + while(n (ascii_freq >> 2) ? Z_BINARY : Z_ASCII); + } + + // Flush the bit buffer, keeping at most 7 bits in it. + internal void bi_flush(){ + if (bi_valid == 16) { + pending_buf[pending++]=(byte)(bi_buf/*&0xff*/); + pending_buf[pending++]=(byte)(bi_buf>>8); + bi_buf=0; + bi_valid=0; + } + else if (bi_valid >= 8) { + pending_buf[pending++]=(byte)(bi_buf); + bi_buf>>=8; + bi_buf &= 0x00ff; + bi_valid-=8; + } + } + + // Flush the bit buffer and align the output on a byte boundary + internal void bi_windup(){ + if (bi_valid > 8) { + pending_buf[pending++]=(byte)(bi_buf); + pending_buf[pending++]=(byte)(bi_buf>>8); + } else if (bi_valid > 0) { + pending_buf[pending++]=(byte)(bi_buf); + } + bi_buf = 0; + bi_valid = 0; + } + + // Copy a stored block, storing first the length and its + // one's complement if requested. + internal void copy_block(int buf, // the input data + int len, // its length + bool header // true if block header must be written + ){ + //int index=0; + bi_windup(); // align on byte boundary + last_eob_len = 8; // enough lookahead for inflate + + if (header) { + put_short((short)len); + put_short((short)~len); + } + + // while(len--!=0) { + // put_byte(window[buf+index]); + // index++; + // } + put_byte(window, buf, len); + } + + internal void flush_block_only(bool eof){ + _tr_flush_block(block_start>=0 ? block_start : -1, + strstart-block_start, + eof); + block_start=strstart; + strm.flush_pending(); + } + + // Copy without compression as much as possible from the input stream, return + // the current block state. + // This function does not insert new strings in the dictionary since + // uncompressible data is probably not useful. This function is used + // only for the level=0 compression option. + // NOTE: this function should be optimized to avoid extra copying from + // window to pending_buf. + internal int deflate_stored(int flush){ + // Stored blocks are limited to 0xffff bytes, pending_buf is limited + // to pending_buf_size, and each stored block has a 5 byte header: + + int max_block_size = System.Math.Min(0xffff, pending_buf.Length - 5); + int max_start; + + // Copy as much as possible from input to output: + while(true){ + // Fill the window as much as possible: + if(lookahead<=1){ + fill_window(); + if(lookahead==0 && flush==Z_NO_FLUSH) return NeedMore; + if(lookahead==0) break; // flush the current block + } + + strstart+=lookahead; + lookahead=0; + + // Emit a stored block if pending_buf will be full: + max_start=block_start+max_block_size; + if(strstart==0|| strstart>=max_start) { + // strstart == 0 is possible when wraparound on 16-bit machine + lookahead = (int)(strstart-max_start); + strstart = (int)max_start; + + flush_block_only(false); + if(strm.avail_out==0) return NeedMore; + + } + + // Flush if we may have to slide, otherwise block_start may become + // negative and the data will be gone: + if(strstart-block_start >= w_size-MIN_LOOKAHEAD) { + flush_block_only(false); + if(strm.avail_out==0) return NeedMore; + } + } + + flush_block_only(flush == Z_FINISH); + if(strm.avail_out==0) + return (flush == Z_FINISH) ? FinishStarted : NeedMore; + + return flush == Z_FINISH ? FinishDone : BlockDone; + } + + // Send a stored block + internal void _tr_stored_block(int buf, // input block + int stored_len, // length of input block + bool eof // true if this is the last block for a file + ){ + send_bits((STORED_BLOCK<<1)+(eof?1:0), 3); // send block type + copy_block(buf, stored_len, true); // with header + } + + // Determine the best encoding for the current block: dynamic trees, static + // trees or store, and output the encoded block to the zip file. + internal void _tr_flush_block(int buf, // input block, or NULL if too old + int stored_len, // length of input block + bool eof // true if this is the last block for a file + ) { + int opt_lenb, static_lenb;// opt_len and static_len in bytes + int max_blindex = 0; // index of last bit length code of non zero freq + + // Build the Huffman trees unless a stored block is forced + if(level > 0) { + // Check if the file is ascii or binary + if(data_type == Z_UNKNOWN) set_data_type(); + + // Construct the literal and distance trees + l_desc.build_tree(this); + + d_desc.build_tree(this); + + // At this point, opt_len and static_len are the total bit lengths of + // the compressed block data, excluding the tree representations. + + // Build the bit length tree for the above two trees, and get the index + // in bl_order of the last bit length code to send. + max_blindex=build_bl_tree(); + + // Determine the best encoding. Compute first the block length in bytes + opt_lenb=(opt_len+3+7)>>3; + static_lenb=(static_len+3+7)>>3; + + if(static_lenb<=opt_lenb) opt_lenb=static_lenb; + } + else { + opt_lenb=static_lenb=stored_len+5; // force a stored block + } + + if(stored_len+4<=opt_lenb && buf != -1){ + // 4: two words for the lengths + // The test buf != NULL is only necessary if LIT_BUFSIZE > WSIZE. + // Otherwise we can't have processed more than WSIZE input bytes since + // the last block flush, because compression would have been + // successful. If LIT_BUFSIZE <= WSIZE, it is never too late to + // transform a block into a stored block. + _tr_stored_block(buf, stored_len, eof); + } + else if(static_lenb == opt_lenb){ + send_bits((STATIC_TREES<<1)+(eof?1:0), 3); + compress_block(StaticTree.static_ltree, StaticTree.static_dtree); + } + else{ + send_bits((DYN_TREES<<1)+(eof?1:0), 3); + send_all_trees(l_desc.max_code+1, d_desc.max_code+1, max_blindex+1); + compress_block(dyn_ltree, dyn_dtree); + } + + // The above check is made mod 2^32, for files larger than 512 MB + // and uLong implemented on 32 bits. + + init_block(); + + if(eof){ + bi_windup(); + } + } + + // Fill the window when the lookahead becomes insufficient. + // Updates strstart and lookahead. + // + // IN assertion: lookahead < MIN_LOOKAHEAD + // OUT assertions: strstart <= window_size-MIN_LOOKAHEAD + // At least one byte has been read, or avail_in == 0; reads are + // performed for at least two bytes (required for the zip translate_eol + // option -- not supported here). + internal void fill_window(){ + int n, m; + int p; + int more; // Amount of free space at the end of the window. + + do{ + more = (window_size-lookahead-strstart); + + // Deal with !@#$% 64K limit: + if(more==0 && strstart==0 && lookahead==0){ + more = w_size; + } + else if(more==-1) { + // Very unlikely, but possible on 16 bit machine if strstart == 0 + // and lookahead == 1 (input done one byte at time) + more--; + + // If the window is almost full and there is insufficient lookahead, + // move the upper half to the lower one to make room in the upper half. + } + else if(strstart >= w_size+ w_size-MIN_LOOKAHEAD) { + System.Array.Copy(window, w_size, window, 0, w_size); + match_start-=w_size; + strstart-=w_size; // we now have strstart >= MAX_DIST + block_start-=w_size; + + // Slide the hash table (could be avoided with 32 bit values + // at the expense of memory usage). We slide even when level == 0 + // to keep the hash table consistent if we switch back to level > 0 + // later. (Using level 0 permanently is not an optimal usage of + // zlib, so we don't care about this pathological case.) + + n = hash_size; + p=n; + do { + m = (head[--p]&0xffff); + head[p]=(short)(m>=w_size ? (m-w_size) : 0); + } + while (--n != 0); + + n = w_size; + p = n; + do { + m = (prev[--p]&0xffff); + prev[p] = (short)(m >= w_size ? (m-w_size) : 0); + // If n is not on any hash chain, prev[n] is garbage but + // its value will never be used. + } + while (--n!=0); + more += w_size; + } + + if (strm.avail_in == 0) return; + + // If there was no sliding: + // strstart <= WSIZE+MAX_DIST-1 && lookahead <= MIN_LOOKAHEAD - 1 && + // more == window_size - lookahead - strstart + // => more >= window_size - (MIN_LOOKAHEAD-1 + WSIZE + MAX_DIST-1) + // => more >= window_size - 2*WSIZE + 2 + // In the BIG_MEM or MMAP case (not yet supported), + // window_size == input_size + MIN_LOOKAHEAD && + // strstart + s->lookahead <= input_size => more >= MIN_LOOKAHEAD. + // Otherwise, window_size == 2*WSIZE so more >= 2. + // If there was sliding, more >= WSIZE. So in all cases, more >= 2. + + n = strm.read_buf(window, strstart + lookahead, more); + lookahead += n; + + // Initialize the hash value now that we have some input: + if(lookahead >= MIN_MATCH) { + ins_h = window[strstart]&0xff; + ins_h=(((ins_h)<= MIN_MATCH){ + ins_h=(((ins_h)<=MIN_MATCH){ + // check_match(strstart, match_start, match_length); + + bflush=_tr_tally(strstart-match_start, match_length-MIN_MATCH); + + lookahead -= match_length; + + // Insert new strings in the hash table only if the match length + // is not too large. This saves time but degrades compression. + if(match_length <= max_lazy_match && + lookahead >= MIN_MATCH) { + match_length--; // string at strstart already in hash table + do{ + strstart++; + + ins_h=((ins_h<= MIN_MATCH) { + ins_h=(((ins_h)< 4096))) { + + // If prev_match is also MIN_MATCH, match_start is garbage + // but we will ignore the current match anyway. + match_length = MIN_MATCH-1; + } + } + + // If there was a match at the previous step and the current + // match is not better, output the previous match: + if(prev_length >= MIN_MATCH && match_length <= prev_length) { + int max_insert = strstart + lookahead - MIN_MATCH; + // Do not insert strings in hash table beyond this. + + // check_match(strstart-1, prev_match, prev_length); + + bflush=_tr_tally(strstart-1-prev_match, prev_length - MIN_MATCH); + + // Insert in hash table all strings up to the end of the match. + // strstart-1 and strstart are already inserted. If there is not + // enough lookahead, the last two strings are not inserted in + // the hash table. + lookahead -= prev_length-1; + prev_length -= 2; + do{ + if(++strstart <= max_insert) { + ins_h=(((ins_h)<(w_size-MIN_LOOKAHEAD) ? + strstart-(w_size-MIN_LOOKAHEAD) : 0; + int nice_match=this.nice_match; + + // Stop when cur_match becomes <= limit. To simplify the code, + // we prevent matches with the string of window index 0. + + int wmask = w_mask; + + int strend = strstart + MAX_MATCH; + byte scan_end1 = window[scan+best_len-1]; + byte scan_end = window[scan+best_len]; + + // The code is optimized for HASH_BITS >= 8 and MAX_MATCH-2 multiple of 16. + // It is easy to get rid of this optimization if necessary. + + // Do not waste too much time if we already have a good match: + if (prev_length >= good_match) { + chain_length >>= 2; + } + + // Do not look for matches beyond the end of the input. This is necessary + // to make deflate deterministic. + if (nice_match > lookahead) nice_match = lookahead; + + do { + match = cur_match; + + // Skip to next match if the match length cannot increase + // or if the match length is less than 2: + if (window[match+best_len] != scan_end || + window[match+best_len-1] != scan_end1 || + window[match] != window[scan] || + window[++match] != window[scan+1]) continue; + + // The check at best_len-1 can be removed because it will be made + // again later. (This heuristic is not always a win.) + // It is not necessary to compare scan[2] and match[2] since they + // are always equal when the other bytes match, given that + // the hash keys are equal and that HASH_BITS >= 8. + scan += 2; match++; + + // We check for insufficient lookahead only every 8th comparison; + // the 256th check will be made at strstart+258. + do { + } while (window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + scan < strend); + + len = MAX_MATCH - (int)(strend - scan); + scan = strend - MAX_MATCH; + + if(len>best_len) { + match_start = cur_match; + best_len = len; + if (len >= nice_match) break; + scan_end1 = window[scan+best_len-1]; + scan_end = window[scan+best_len]; + } + + } while ((cur_match = (prev[cur_match & wmask]&0xffff)) > limit + && --chain_length != 0); + + if (best_len <= lookahead) return best_len; + return lookahead; + } + + internal int deflateInit(ZStream strm, int level, int bits){ + return deflateInit2(strm, level, Z_DEFLATED, bits, DEF_MEM_LEVEL, + Z_DEFAULT_STRATEGY); + } + internal int deflateInit(ZStream strm, int level){ + return deflateInit(strm, level, MAX_WBITS); + } + internal int deflateInit2(ZStream strm, int level, int method, int windowBits, + int memLevel, int strategy){ + int noheader = 0; + // byte[] my_version=ZLIB_VERSION; + + // + // if (version == null || version[0] != my_version[0] + // || stream_size != sizeof(z_stream)) { + // return Z_VERSION_ERROR; + // } + + strm.msg = null; + + if (level == Z_DEFAULT_COMPRESSION) level = 6; + + if (windowBits < 0) { // undocumented feature: suppress zlib header + noheader = 1; + windowBits = -windowBits; + } + + if (memLevel < 1 || memLevel > MAX_MEM_LEVEL || + method != Z_DEFLATED || + windowBits < 9 || windowBits > 15 || level < 0 || level > 9 || + strategy < 0 || strategy > Z_HUFFMAN_ONLY) { + return Z_STREAM_ERROR; + } + + strm.dstate = (Deflate)this; + + this.noheader = noheader; + w_bits = windowBits; + w_size = 1 << w_bits; + w_mask = w_size - 1; + + hash_bits = memLevel + 7; + hash_size = 1 << hash_bits; + hash_mask = hash_size - 1; + hash_shift = ((hash_bits+MIN_MATCH-1)/MIN_MATCH); + + window = new byte[w_size*2]; + prev = new short[w_size]; + head = new short[hash_size]; + + lit_bufsize = 1 << (memLevel + 6); // 16K elements by default + + // We overlay pending_buf and d_buf+l_buf. This works since the average + // output size for (length,distance) codes is <= 24 bits. + pending_buf = new byte[lit_bufsize*4]; + + d_buf = lit_bufsize; + l_buf = (1+2)*lit_bufsize; + + this.level = level; + + //System.out.println("level="+level); + + this.strategy = strategy; + this.method = (byte)method; + + return deflateReset(strm); + } + + internal int deflateReset(ZStream strm){ + strm.total_in = strm.total_out = 0; + strm.msg = null; // + strm.data_type = Z_UNKNOWN; + + pending = 0; + pending_out = 0; + + if(noheader < 0) { + noheader = 0; // was set to -1 by deflate(..., Z_FINISH); + } + status = (noheader!=0) ? BUSY_STATE : INIT_STATE; + strm.adler=strm._adler.adler32(0, null, 0, 0); + + last_flush = Z_NO_FLUSH; + + tr_init(); + lm_init(); + return Z_OK; + } + + internal int deflateEnd(){ + if(status!=INIT_STATE && status!=BUSY_STATE && status!=FINISH_STATE){ + return Z_STREAM_ERROR; + } + // Deallocate in reverse order of allocations: + pending_buf=null; + head=null; + prev=null; + window=null; + // free + // dstate=null; + return status == BUSY_STATE ? Z_DATA_ERROR : Z_OK; + } + + internal int deflateParams(ZStream strm, int _level, int _strategy){ + int err=Z_OK; + + if(_level == Z_DEFAULT_COMPRESSION){ + _level = 6; + } + if(_level < 0 || _level > 9 || + _strategy < 0 || _strategy > Z_HUFFMAN_ONLY) { + return Z_STREAM_ERROR; + } + + if(config_table[level].func!=config_table[_level].func && + strm.total_in != 0) { + // Flush the last buffer: + err = strm.deflate(Z_PARTIAL_FLUSH); + } + + if(level != _level) { + level = _level; + max_lazy_match = config_table[level].max_lazy; + good_match = config_table[level].good_length; + nice_match = config_table[level].nice_length; + max_chain_length = config_table[level].max_chain; + } + strategy = _strategy; + return err; + } + + internal int deflateSetDictionary (ZStream strm, byte[] dictionary, int dictLength){ + int length = dictLength; + int index=0; + + if(dictionary == null || status != INIT_STATE) + return Z_STREAM_ERROR; + + strm.adler=strm._adler.adler32(strm.adler, dictionary, 0, dictLength); + + if(length < MIN_MATCH) return Z_OK; + if(length > w_size-MIN_LOOKAHEAD){ + length = w_size-MIN_LOOKAHEAD; + index=dictLength-length; // use the tail of the dictionary + } + System.Array.Copy(dictionary, index, window, 0, length); + strstart = length; + block_start = length; + + // Insert all strings in the hash table (except for the last two bytes). + // s->lookahead stays null, so s->ins_h will be recomputed at the next + // call of fill_window. + + ins_h = window[0]&0xff; + ins_h=(((ins_h)<Z_FINISH || flush<0){ + return Z_STREAM_ERROR; + } + + if(strm.next_out == null || + (strm.next_in == null && strm.avail_in != 0) || + (status == FINISH_STATE && flush != Z_FINISH)) { + strm.msg=z_errmsg[Z_NEED_DICT-(Z_STREAM_ERROR)]; + return Z_STREAM_ERROR; + } + if(strm.avail_out == 0){ + strm.msg=z_errmsg[Z_NEED_DICT-(Z_BUF_ERROR)]; + return Z_BUF_ERROR; + } + + this.strm = strm; // just in case + old_flush = last_flush; + last_flush = flush; + + // Write the zlib header + if(status == INIT_STATE) { + int header = (Z_DEFLATED+((w_bits-8)<<4))<<8; + int level_flags=((level-1)&0xff)>>1; + + if(level_flags>3) level_flags=3; + header |= (level_flags<<6); + if(strstart!=0) header |= PRESET_DICT; + header+=31-(header % 31); + + status=BUSY_STATE; + putShortMSB(header); + + + // Save the adler32 of the preset dictionary: + if(strstart!=0){ + putShortMSB((int)(strm.adler>>16)); + putShortMSB((int)(strm.adler&0xffff)); + } + strm.adler=strm._adler.adler32(0, null, 0, 0); + } + + // Flush as much pending output as possible + if(pending != 0) { + strm.flush_pending(); + if(strm.avail_out == 0) { + //System.out.println(" avail_out==0"); + // Since avail_out is 0, deflate will be called again with + // more output space, but possibly with both pending and + // avail_in equal to zero. There won't be anything to do, + // but this is not an error situation so make sure we + // return OK instead of BUF_ERROR at next call of deflate: + last_flush = -1; + return Z_OK; + } + + // Make sure there is something to do and avoid duplicate consecutive + // flushes. For repeated and useless calls with Z_FINISH, we keep + // returning Z_STREAM_END instead of Z_BUFF_ERROR. + } + else if(strm.avail_in==0 && flush <= old_flush && + flush != Z_FINISH) { + strm.msg=z_errmsg[Z_NEED_DICT-(Z_BUF_ERROR)]; + return Z_BUF_ERROR; + } + + // User must not provide more input after the first FINISH: + if(status == FINISH_STATE && strm.avail_in != 0) { + strm.msg=z_errmsg[Z_NEED_DICT-(Z_BUF_ERROR)]; + return Z_BUF_ERROR; + } + + // Start a new block or continue the current one. + if(strm.avail_in!=0 || lookahead!=0 || + (flush != Z_NO_FLUSH && status != FINISH_STATE)) { + int bstate=-1; + switch(config_table[level].func){ + case STORED: + bstate = deflate_stored(flush); + break; + case FAST: + bstate = deflate_fast(flush); + break; + case SLOW: + bstate = deflate_slow(flush); + break; + default: + break; + } + + if (bstate==FinishStarted || bstate==FinishDone) { + status = FINISH_STATE; + } + if (bstate==NeedMore || bstate==FinishStarted) { + if(strm.avail_out == 0) { + last_flush = -1; // avoid BUF_ERROR next call, see above + } + return Z_OK; + // If flush != Z_NO_FLUSH && avail_out == 0, the next call + // of deflate should use the same flush parameter to make sure + // that the flush is complete. So we don't have to output an + // empty block here, this will be done at next call. This also + // ensures that for a very small output buffer, we emit at most + // one empty block. + } + + if (bstate==BlockDone) { + if(flush == Z_PARTIAL_FLUSH) { + _tr_align(); + } + else { // FULL_FLUSH or SYNC_FLUSH + _tr_stored_block(0, 0, false); + // For a full flush, this empty block will be recognized + // as a special marker by inflate_sync(). + if(flush == Z_FULL_FLUSH) { + //state.head[s.hash_size-1]=0; + for(int i=0; i>16)); + putShortMSB((int)(strm.adler&0xffff)); + strm.flush_pending(); + + // If avail_out is zero, the application will call deflate again + // to flush the rest. + noheader = -1; // write the trailer only once! + return pending != 0 ? Z_OK : Z_STREAM_END; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs.meta new file mode 100644 index 00000000..70a6a33b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a6fa847d0a1f9f047b21ba23161c2229 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/Deflate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs new file mode 100644 index 00000000..b101167d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs @@ -0,0 +1,622 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: InfBlocks.cs,v 1.2 2008-05-10 09:35:40 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + internal sealed class InfBlocks{ + private const int MANY=1440; + + // And'ing with mask[n] masks the lower n bits + private static readonly int[] inflate_mask = { + 0x00000000, 0x00000001, 0x00000003, 0x00000007, 0x0000000f, + 0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 0x000001ff, + 0x000003ff, 0x000007ff, 0x00000fff, 0x00001fff, 0x00003fff, + 0x00007fff, 0x0000ffff + }; + + // Table for deflate from PKZIP's appnote.txt. + static readonly int[] border = { // Order of the bit length code lengths + 16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15 + }; + + private const int Z_OK=0; + private const int Z_STREAM_END=1; + private const int Z_NEED_DICT=2; + private const int Z_ERRNO=-1; + private const int Z_STREAM_ERROR=-2; + private const int Z_DATA_ERROR=-3; + private const int Z_MEM_ERROR=-4; + private const int Z_BUF_ERROR=-5; + private const int Z_VERSION_ERROR=-6; + + private const int TYPE=0; // get type bits (3, including end bit) + private const int LENS=1; // get lengths for stored + private const int STORED=2;// processing stored block + private const int TABLE=3; // get table lengths + private const int BTREE=4; // get bit lengths tree for a dynamic block + private const int DTREE=5; // get length, distance trees for a dynamic block + private const int CODES=6; // processing fixed or dynamic block + private const int DRY=7; // output remaining window bytes + private const int DONE=8; // finished last block, done + private const int BAD=9; // ot a data error--stuck here + + internal int mode; // current inflate_block mode + + internal int left; // if STORED, bytes left to copy + + internal int table; // table lengths (14 bits) + internal int index; // index into blens (or border) + internal int[] blens; // bit lengths of codes + internal int[] bb=new int[1]; // bit length tree depth + internal int[] tb=new int[1]; // bit length decoding tree + + internal InfCodes codes=new InfCodes(); // if CODES, current state + + int last; // true if this block is the last block + + // mode independent information + internal int bitk; // bits in bit buffer + internal int bitb; // bit buffer + internal int[] hufts; // single malloc for tree space + internal byte[] window; // sliding window + internal int end; // one byte after sliding window + internal int read; // window read pointer + internal int write; // window write pointer + internal object checkfn; // check function + internal long check; // check on output + + internal InfTree inftree=new InfTree(); + + internal InfBlocks(ZStream z, object checkfn, int w){ + hufts=new int[MANY*3]; + window=new byte[w]; + end=w; + this.checkfn = checkfn; + mode = TYPE; + reset(z, null); + } + + internal void reset(ZStream z, long[] c){ + if(c!=null) c[0]=check; + if(mode==BTREE || mode==DTREE){ + } + if(mode==CODES){ + codes.free(z); + } + mode=TYPE; + bitk=0; + bitb=0; + read=write=0; + + if(checkfn != null) + z.adler=check=z._adler.adler32(0L, null, 0, 0); + } + + internal int proc(ZStream z, int r){ + int t; // temporary storage + int b; // bit buffer + int k; // bits in bit buffer + int p; // input data pointer + int n; // bytes available there + int q; // output window write pointer + int m; { // bytes to end of window or read pointer + + // copy input/output information to locals (UPDATE macro restores) + p=z.next_in_index;n=z.avail_in;b=bitb;k=bitk;} { + q=write;m=(int)(q> 1){ + case 0: { // stored + b>>=(3);k-=(3);} + t = k & 7; { // go to byte boundary + + b>>=(t);k-=(t);} + mode = LENS; // get length of stored block + break; + case 1: { // fixed + int[] bl=new int[1]; + int[] bd=new int[1]; + int[][] tl=new int[1][]; + int[][] td=new int[1][]; + + InfTree.inflate_trees_fixed(bl, bd, tl, td, z); + codes.init(bl[0], bd[0], tl[0], 0, td[0], 0, z); + } { + + b>>=(3);k-=(3);} + + mode = CODES; + break; + case 2: { // dynamic + + b>>=(3);k-=(3);} + + mode = TABLE; + break; + case 3: { // illegal + + b>>=(3);k-=(3);} + mode = BAD; + z.msg = "invalid block type"; + r = Z_DATA_ERROR; + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + break; + case LENS: + + while(k<(32)){ + if(n!=0){ + r=Z_OK; + } + else{ + bitb=b; bitk=k; + z.avail_in=n; + z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + }; + n--; + b|=(z.next_in[p++]&0xff)<> 16) & 0xffff) != (b & 0xffff)){ + mode = BAD; + z.msg = "invalid stored block lengths"; + r = Z_DATA_ERROR; + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + left = (b & 0xffff); + b = k = 0; // dump bits + mode = left!=0 ? STORED : (last!=0 ? DRY : TYPE); + break; + case STORED: + if (n == 0){ + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + + if(m==0){ + if(q==end&&read!=0){ + q=0; m=(int)(qn) t = n; + if(t>m) t = m; + System.Array.Copy(z.next_in, p, window, q, t); + p += t; n -= t; + q += t; m -= t; + if ((left -= t) != 0) + break; + mode = last!=0 ? DRY : TYPE; + break; + case TABLE: + + while(k<(14)){ + if(n!=0){ + r=Z_OK; + } + else{ + bitb=b; bitk=k; + z.avail_in=n; + z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + }; + n--; + b|=(z.next_in[p++]&0xff)< 29 || ((t >> 5) & 0x1f) > 29) { + mode = BAD; + z.msg = "too many length or distance symbols"; + r = Z_DATA_ERROR; + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + t = 258 + (t & 0x1f) + ((t >> 5) & 0x1f); + if(blens==null || blens.Length>=(14);k-=(14);} + + index = 0; + mode = BTREE; + goto case BTREE; + case BTREE: + while (index < 4 + (table >> 10)){ + while(k<(3)){ + if(n!=0){ + r=Z_OK; + } + else{ + bitb=b; bitk=k; + z.avail_in=n; + z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + }; + n--; + b|=(z.next_in[p++]&0xff)<>=(3);k-=(3);} + } + + while(index < 19){ + blens[border[index++]] = 0; + } + + bb[0] = 7; + t = inftree.inflate_trees_bits(blens, bb, tb, hufts, z); + if (t != Z_OK){ + r = t; + if (r == Z_DATA_ERROR){ + blens=null; + mode = BAD; + } + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + + index = 0; + mode = DTREE; + goto case DTREE; + case DTREE: + while (true){ + t = table; + if(!(index < 258 + (t & 0x1f) + ((t >> 5) & 0x1f))){ + break; + } + + int i, j, c; + + t = bb[0]; + + while(k<(t)){ + if(n!=0){ + r=Z_OK; + } + else{ + bitb=b; bitk=k; + z.avail_in=n; + z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + }; + n--; + b|=(z.next_in[p++]&0xff)<>=(t);k-=(t); + blens[index++] = c; + } + else { // c == 16..18 + i = c == 18 ? 7 : c - 14; + j = c == 18 ? 11 : 3; + + while(k<(t+i)){ + if(n!=0){ + r=Z_OK; + } + else{ + bitb=b; bitk=k; + z.avail_in=n; + z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + }; + n--; + b|=(z.next_in[p++]&0xff)<>=(t);k-=(t); + + j += (b & inflate_mask[i]); + + b>>=(i);k-=(i); + + i = index; + t = table; + if (i + j > 258 + (t & 0x1f) + ((t >> 5) & 0x1f) || + (c == 16 && i < 1)){ + blens=null; + mode = BAD; + z.msg = "invalid bit length repeat"; + r = Z_DATA_ERROR; + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + + c = c == 16 ? blens[i-1] : 0; + do{ + blens[i++] = c; + } + while (--j!=0); + index = i; + } + } + + tb[0]=-1; { + int[] bl=new int[1]; + int[] bd=new int[1]; + int[] tl=new int[1]; + int[] td=new int[1]; + bl[0] = 9; // must be <= 9 for lookahead assumptions + bd[0] = 6; // must be <= 9 for lookahead assumptions + + t = table; + t = inftree.inflate_trees_dynamic(257 + (t & 0x1f), + 1 + ((t >> 5) & 0x1f), + blens, bl, bd, tl, td, hufts, z); + + if (t != Z_OK){ + if (t == Z_DATA_ERROR){ + blens=null; + mode = BAD; + } + r = t; + + bitb=b; bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + return inflate_flush(z,r); + } + codes.init(bl[0], bd[0], hufts, tl[0], hufts, td[0], z); + } + mode = CODES; + goto case CODES; + case CODES: + bitb=b; bitk=k; + z.avail_in=n; z.total_in+=p-z.next_in_index;z.next_in_index=p; + write=q; + + if ((r = codes.proc(this, z, r)) != Z_STREAM_END){ + return inflate_flush(z, r); + } + r = Z_OK; + codes.free(z); + + p=z.next_in_index; n=z.avail_in;b=bitb;k=bitk; + q=write;m=(int)(q z.avail_out) n = z.avail_out; + if (n!=0 && r == Z_BUF_ERROR) r = Z_OK; + + // update counters + z.avail_out -= n; + z.total_out += n; + + // update check information + if(checkfn != null) + z.adler=check=z._adler.adler32(check, window, q, n); + + // copy as far as end of window + System.Array.Copy(window, q, z.next_out, p, n); + p += n; + q += n; + + // see if more to copy at beginning of window + if (q == end){ + // wrap pointers + q = 0; + if (write == end) + write = 0; + + // compute bytes to copy + n = write - q; + if (n > z.avail_out) n = z.avail_out; + if (n!=0 && r == Z_BUF_ERROR) r = Z_OK; + + // update counters + z.avail_out -= n; + z.total_out += n; + + // update check information + if(checkfn != null) + z.adler=check=z._adler.adler32(check, window, q, n); + + // copy + System.Array.Copy(window, q, z.next_out, p, n); + p += n; + q += n; + } + + // update pointers + z.next_out_index = p; + read = q; + + // done + return r; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs.meta new file mode 100644 index 00000000..93e59e0b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c231b887b727c11419bada0b0b9361b8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfBlocks.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs new file mode 100644 index 00000000..652a84d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs @@ -0,0 +1,615 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: InfCodes.cs,v 1.2 2008-05-10 09:35:40 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + internal sealed class InfCodes{ + + private static readonly int[] inflate_mask = { + 0x00000000, 0x00000001, 0x00000003, 0x00000007, 0x0000000f, + 0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 0x000001ff, + 0x000003ff, 0x000007ff, 0x00000fff, 0x00001fff, 0x00003fff, + 0x00007fff, 0x0000ffff + }; + + private const int Z_OK=0; + private const int Z_STREAM_END=1; + private const int Z_NEED_DICT=2; + private const int Z_ERRNO=-1; + private const int Z_STREAM_ERROR=-2; + private const int Z_DATA_ERROR=-3; + private const int Z_MEM_ERROR=-4; + private const int Z_BUF_ERROR=-5; + private const int Z_VERSION_ERROR=-6; + + // waiting for "i:"=input, + // "o:"=output, + // "x:"=nothing + private const int START=0; // x: set up for LEN + private const int LEN=1; // i: get length/literal/eob next + private const int LENEXT=2; // i: getting length extra (have base) + private const int DIST=3; // i: get distance next + private const int DISTEXT=4;// i: getting distance extra + private const int COPY=5; // o: copying bytes in window, waiting for space + private const int LIT=6; // o: got literal, waiting for output space + private const int WASH=7; // o: got eob, possibly still output waiting + private const int END=8; // x: got eob and all data flushed + private const int BADCODE=9;// x: got error + + int mode; // current inflate_codes mode + + // mode dependent information + int len; + + int[] tree; // pointer into tree + int tree_index=0; + int need; // bits needed + + int lit; + + // if EXT or COPY, where and how much + int get; // bits to get for extra + int dist; // distance back to copy from + + byte lbits; // ltree bits decoded per branch + byte dbits; // dtree bits decoder per branch + int[] ltree; // literal/length/eob tree + int ltree_index; // literal/length/eob tree + int[] dtree; // distance tree + int dtree_index; // distance tree + + internal InfCodes(){ + } + internal void init(int bl, int bd, + int[] tl, int tl_index, + int[] td, int td_index, ZStream z){ + mode=START; + lbits=(byte)bl; + dbits=(byte)bd; + ltree=tl; + ltree_index=tl_index; + dtree = td; + dtree_index=td_index; + tree=null; + } + + internal int proc(InfBlocks s, ZStream z, int r){ + int j; // temporary storage + int tindex; // temporary pointer + int e; // extra bits or operation + int b=0; // bit buffer + int k=0; // bits in bit buffer + int p=0; // input data pointer + int n; // bytes available there + int q; // output window write pointer + int m; // bytes to end of window or read pointer + int f; // pointer to copy strings from + + // copy input/output information to locals (UPDATE macro restores) + p=z.next_in_index;n=z.avail_in;b=s.bitb;k=s.bitk; + q=s.write;m=q= 258 && n >= 10){ + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + r = inflate_fast(lbits, dbits, + ltree, ltree_index, + dtree, dtree_index, + s, z); + + p=z.next_in_index;n=z.avail_in;b=s.bitb;k=s.bitk; + q=s.write;m=q>=(tree[tindex+1]); + k-=(tree[tindex+1]); + + e=tree[tindex]; + + if(e == 0){ // literal + lit = tree[tindex+2]; + mode = LIT; + break; + } + if((e & 16)!=0 ){ // length + get = e & 15; + len = tree[tindex+2]; + mode = LENEXT; + break; + } + if ((e & 64) == 0){ // next table + need = e; + tree_index = tindex/3+tree[tindex+2]; + break; + } + if ((e & 32)!=0){ // end of block + mode = WASH; + break; + } + mode = BADCODE; // invalid code + z.msg = "invalid literal/length code"; + r = Z_DATA_ERROR; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + return s.inflate_flush(z,r); + + case LENEXT: // i: getting length extra (have base) + j = get; + + while(k<(j)){ + if(n!=0)r=Z_OK; + else{ + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + return s.inflate_flush(z,r); + } + n--; b|=(z.next_in[p++]&0xff)<>=j; + k-=j; + + need = dbits; + tree = dtree; + tree_index=dtree_index; + mode = DIST; + goto case DIST; + case DIST: // i: get distance next + j = need; + + while(k<(j)){ + if(n!=0)r=Z_OK; + else{ + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + return s.inflate_flush(z,r); + } + n--; b|=(z.next_in[p++]&0xff)<>=tree[tindex+1]; + k-=tree[tindex+1]; + + e = (tree[tindex]); + if((e & 16)!=0){ // distance + get = e & 15; + dist = tree[tindex+2]; + mode = DISTEXT; + break; + } + if ((e & 64) == 0){ // next table + need = e; + tree_index = tindex/3 + tree[tindex+2]; + break; + } + mode = BADCODE; // invalid code + z.msg = "invalid distance code"; + r = Z_DATA_ERROR; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + return s.inflate_flush(z,r); + + case DISTEXT: // i: getting distance extra + j = get; + + while(k<(j)){ + if(n!=0)r=Z_OK; + else{ + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + return s.inflate_flush(z,r); + } + n--; b|=(z.next_in[p++]&0xff)<>=j; + k-=j; + + mode = COPY; + goto case COPY; + case COPY: // o: copying bytes in window, waiting for space + f = q - dist; + while(f < 0){ // modulo window size-"while" instead + f += s.end; // of "if" handles invalid distances + } + while (len!=0){ + + if(m==0){ + if(q==s.end&&s.read!=0){q=0;m=q 7){ // return unused byte, if any + k -= 8; + n++; + p--; // can always return one + } + + s.write=q; r=s.inflate_flush(z,r); + q=s.write;m=q= 258 && n >= 10 + // get literal/length code + while(k<(20)){ // max bits for literal/length code + n--; + b|=(z.next_in[p++]&0xff)<>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]); + + s.window[q++] = (byte)tp[tp_index_t_3+2]; + m--; + continue; + } + do { + + b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]); + + if((e&16)!=0){ + e &= 15; + c = tp[tp_index_t_3+2] + ((int)b & inflate_mask[e]); + + b>>=e; k-=e; + + // decode distance base of block to copy + while(k<(15)){ // max bits for distance code + n--; + b|=(z.next_in[p++]&0xff)<>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]); + + if((e&16)!=0){ + // get extra bits to add to distance base + e &= 15; + while(k<(e)){ // get extra bits (up to 13) + n--; + b|=(z.next_in[p++]&0xff)<>=(e); k-=(e); + + // do the copy + m -= c; + if (q >= d){ // offset before dest + // just copy + r=q-d; + if(q-r>0 && 2>(q-r)){ + s.window[q++]=s.window[r++]; // minimum count is three, + s.window[q++]=s.window[r++]; // so unroll loop a little + c-=2; + } + else{ + System.Array.Copy(s.window, r, s.window, q, 2); + q+=2; r+=2; c-=2; + } + } + else{ // else offset after destination + r=q-d; + do{ + r+=s.end; // force pointer in window + }while(r<0); // covers invalid distances + e=s.end-r; + if(c>e){ // if source crosses, + c-=e; // wrapped copy + if(q-r>0 && e>(q-r)){ + do{s.window[q++] = s.window[r++];} + while(--e!=0); + } + else{ + System.Array.Copy(s.window, r, s.window, q, e); + q+=e; r+=e; e=0; + } + r = 0; // copy rest from start of window + } + + } + + // copy all or what's left + if(q-r>0 && c>(q-r)){ + do{s.window[q++] = s.window[r++];} + while(--c!=0); + } + else{ + System.Array.Copy(s.window, r, s.window, q, c); + q+=c; r+=c; c=0; + } + break; + } + else if((e&64)==0){ + t+=tp[tp_index_t_3+2]; + t+=(b&inflate_mask[e]); + tp_index_t_3=(tp_index+t)*3; + e=tp[tp_index_t_3]; + } + else{ + z.msg = "invalid distance code"; + + c=z.avail_in-n;c=(k>>3)>3:c;n+=c;p-=c;k-=c<<3; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + + return Z_DATA_ERROR; + } + } + while(true); + break; + } + + if((e&64)==0){ + t+=tp[tp_index_t_3+2]; + t+=(b&inflate_mask[e]); + tp_index_t_3=(tp_index+t)*3; + if((e=tp[tp_index_t_3])==0){ + + b>>=(tp[tp_index_t_3+1]); k-=(tp[tp_index_t_3+1]); + + s.window[q++]=(byte)tp[tp_index_t_3+2]; + m--; + break; + } + } + else if((e&32)!=0){ + + c=z.avail_in-n;c=(k>>3)>3:c;n+=c;p-=c;k-=c<<3; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + + return Z_STREAM_END; + } + else{ + z.msg="invalid literal/length code"; + + c=z.avail_in-n;c=(k>>3)>3:c;n+=c;p-=c;k-=c<<3; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + + return Z_DATA_ERROR; + } + } + while(true); + } + while(m>=258 && n>= 10); + + // not enough input or output--restore pointers and return + c=z.avail_in-n;c=(k>>3)>3:c;n+=c;p-=c;k-=c<<3; + + s.bitb=b;s.bitk=k; + z.avail_in=n;z.total_in+=p-z.next_in_index;z.next_in_index=p; + s.write=q; + + return Z_OK; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs.meta new file mode 100644 index 00000000..6741b84d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 363abca07fc3ca64db94b6f87e36a7ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfCodes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfTree.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfTree.cs new file mode 100644 index 00000000..470af92c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/InfTree.cs @@ -0,0 +1,527 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: InfTree.cs,v 1.2 2008-05-10 09:35:40 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + internal sealed class InfTree{ + + private const int MANY=1440; + + private const int Z_OK=0; + private const int Z_STREAM_END=1; + private const int Z_NEED_DICT=2; + private const int Z_ERRNO=-1; + private const int Z_STREAM_ERROR=-2; + private const int Z_DATA_ERROR=-3; + private const int Z_MEM_ERROR=-4; + private const int Z_BUF_ERROR=-5; + private const int Z_VERSION_ERROR=-6; + + private const int fixed_bl = 9; + private const int fixed_bd = 5; + + static readonly int[] fixed_tl = { + 96,7,256, 0,8,80, 0,8,16, 84,8,115, + 82,7,31, 0,8,112, 0,8,48, 0,9,192, + 80,7,10, 0,8,96, 0,8,32, 0,9,160, + 0,8,0, 0,8,128, 0,8,64, 0,9,224, + 80,7,6, 0,8,88, 0,8,24, 0,9,144, + 83,7,59, 0,8,120, 0,8,56, 0,9,208, + 81,7,17, 0,8,104, 0,8,40, 0,9,176, + 0,8,8, 0,8,136, 0,8,72, 0,9,240, + 80,7,4, 0,8,84, 0,8,20, 85,8,227, + 83,7,43, 0,8,116, 0,8,52, 0,9,200, + 81,7,13, 0,8,100, 0,8,36, 0,9,168, + 0,8,4, 0,8,132, 0,8,68, 0,9,232, + 80,7,8, 0,8,92, 0,8,28, 0,9,152, + 84,7,83, 0,8,124, 0,8,60, 0,9,216, + 82,7,23, 0,8,108, 0,8,44, 0,9,184, + 0,8,12, 0,8,140, 0,8,76, 0,9,248, + 80,7,3, 0,8,82, 0,8,18, 85,8,163, + 83,7,35, 0,8,114, 0,8,50, 0,9,196, + 81,7,11, 0,8,98, 0,8,34, 0,9,164, + 0,8,2, 0,8,130, 0,8,66, 0,9,228, + 80,7,7, 0,8,90, 0,8,26, 0,9,148, + 84,7,67, 0,8,122, 0,8,58, 0,9,212, + 82,7,19, 0,8,106, 0,8,42, 0,9,180, + 0,8,10, 0,8,138, 0,8,74, 0,9,244, + 80,7,5, 0,8,86, 0,8,22, 192,8,0, + 83,7,51, 0,8,118, 0,8,54, 0,9,204, + 81,7,15, 0,8,102, 0,8,38, 0,9,172, + 0,8,6, 0,8,134, 0,8,70, 0,9,236, + 80,7,9, 0,8,94, 0,8,30, 0,9,156, + 84,7,99, 0,8,126, 0,8,62, 0,9,220, + 82,7,27, 0,8,110, 0,8,46, 0,9,188, + 0,8,14, 0,8,142, 0,8,78, 0,9,252, + 96,7,256, 0,8,81, 0,8,17, 85,8,131, + 82,7,31, 0,8,113, 0,8,49, 0,9,194, + 80,7,10, 0,8,97, 0,8,33, 0,9,162, + 0,8,1, 0,8,129, 0,8,65, 0,9,226, + 80,7,6, 0,8,89, 0,8,25, 0,9,146, + 83,7,59, 0,8,121, 0,8,57, 0,9,210, + 81,7,17, 0,8,105, 0,8,41, 0,9,178, + 0,8,9, 0,8,137, 0,8,73, 0,9,242, + 80,7,4, 0,8,85, 0,8,21, 80,8,258, + 83,7,43, 0,8,117, 0,8,53, 0,9,202, + 81,7,13, 0,8,101, 0,8,37, 0,9,170, + 0,8,5, 0,8,133, 0,8,69, 0,9,234, + 80,7,8, 0,8,93, 0,8,29, 0,9,154, + 84,7,83, 0,8,125, 0,8,61, 0,9,218, + 82,7,23, 0,8,109, 0,8,45, 0,9,186, + 0,8,13, 0,8,141, 0,8,77, 0,9,250, + 80,7,3, 0,8,83, 0,8,19, 85,8,195, + 83,7,35, 0,8,115, 0,8,51, 0,9,198, + 81,7,11, 0,8,99, 0,8,35, 0,9,166, + 0,8,3, 0,8,131, 0,8,67, 0,9,230, + 80,7,7, 0,8,91, 0,8,27, 0,9,150, + 84,7,67, 0,8,123, 0,8,59, 0,9,214, + 82,7,19, 0,8,107, 0,8,43, 0,9,182, + 0,8,11, 0,8,139, 0,8,75, 0,9,246, + 80,7,5, 0,8,87, 0,8,23, 192,8,0, + 83,7,51, 0,8,119, 0,8,55, 0,9,206, + 81,7,15, 0,8,103, 0,8,39, 0,9,174, + 0,8,7, 0,8,135, 0,8,71, 0,9,238, + 80,7,9, 0,8,95, 0,8,31, 0,9,158, + 84,7,99, 0,8,127, 0,8,63, 0,9,222, + 82,7,27, 0,8,111, 0,8,47, 0,9,190, + 0,8,15, 0,8,143, 0,8,79, 0,9,254, + 96,7,256, 0,8,80, 0,8,16, 84,8,115, + 82,7,31, 0,8,112, 0,8,48, 0,9,193, + + 80,7,10, 0,8,96, 0,8,32, 0,9,161, + 0,8,0, 0,8,128, 0,8,64, 0,9,225, + 80,7,6, 0,8,88, 0,8,24, 0,9,145, + 83,7,59, 0,8,120, 0,8,56, 0,9,209, + 81,7,17, 0,8,104, 0,8,40, 0,9,177, + 0,8,8, 0,8,136, 0,8,72, 0,9,241, + 80,7,4, 0,8,84, 0,8,20, 85,8,227, + 83,7,43, 0,8,116, 0,8,52, 0,9,201, + 81,7,13, 0,8,100, 0,8,36, 0,9,169, + 0,8,4, 0,8,132, 0,8,68, 0,9,233, + 80,7,8, 0,8,92, 0,8,28, 0,9,153, + 84,7,83, 0,8,124, 0,8,60, 0,9,217, + 82,7,23, 0,8,108, 0,8,44, 0,9,185, + 0,8,12, 0,8,140, 0,8,76, 0,9,249, + 80,7,3, 0,8,82, 0,8,18, 85,8,163, + 83,7,35, 0,8,114, 0,8,50, 0,9,197, + 81,7,11, 0,8,98, 0,8,34, 0,9,165, + 0,8,2, 0,8,130, 0,8,66, 0,9,229, + 80,7,7, 0,8,90, 0,8,26, 0,9,149, + 84,7,67, 0,8,122, 0,8,58, 0,9,213, + 82,7,19, 0,8,106, 0,8,42, 0,9,181, + 0,8,10, 0,8,138, 0,8,74, 0,9,245, + 80,7,5, 0,8,86, 0,8,22, 192,8,0, + 83,7,51, 0,8,118, 0,8,54, 0,9,205, + 81,7,15, 0,8,102, 0,8,38, 0,9,173, + 0,8,6, 0,8,134, 0,8,70, 0,9,237, + 80,7,9, 0,8,94, 0,8,30, 0,9,157, + 84,7,99, 0,8,126, 0,8,62, 0,9,221, + 82,7,27, 0,8,110, 0,8,46, 0,9,189, + 0,8,14, 0,8,142, 0,8,78, 0,9,253, + 96,7,256, 0,8,81, 0,8,17, 85,8,131, + 82,7,31, 0,8,113, 0,8,49, 0,9,195, + 80,7,10, 0,8,97, 0,8,33, 0,9,163, + 0,8,1, 0,8,129, 0,8,65, 0,9,227, + 80,7,6, 0,8,89, 0,8,25, 0,9,147, + 83,7,59, 0,8,121, 0,8,57, 0,9,211, + 81,7,17, 0,8,105, 0,8,41, 0,9,179, + 0,8,9, 0,8,137, 0,8,73, 0,9,243, + 80,7,4, 0,8,85, 0,8,21, 80,8,258, + 83,7,43, 0,8,117, 0,8,53, 0,9,203, + 81,7,13, 0,8,101, 0,8,37, 0,9,171, + 0,8,5, 0,8,133, 0,8,69, 0,9,235, + 80,7,8, 0,8,93, 0,8,29, 0,9,155, + 84,7,83, 0,8,125, 0,8,61, 0,9,219, + 82,7,23, 0,8,109, 0,8,45, 0,9,187, + 0,8,13, 0,8,141, 0,8,77, 0,9,251, + 80,7,3, 0,8,83, 0,8,19, 85,8,195, + 83,7,35, 0,8,115, 0,8,51, 0,9,199, + 81,7,11, 0,8,99, 0,8,35, 0,9,167, + 0,8,3, 0,8,131, 0,8,67, 0,9,231, + 80,7,7, 0,8,91, 0,8,27, 0,9,151, + 84,7,67, 0,8,123, 0,8,59, 0,9,215, + 82,7,19, 0,8,107, 0,8,43, 0,9,183, + 0,8,11, 0,8,139, 0,8,75, 0,9,247, + 80,7,5, 0,8,87, 0,8,23, 192,8,0, + 83,7,51, 0,8,119, 0,8,55, 0,9,207, + 81,7,15, 0,8,103, 0,8,39, 0,9,175, + 0,8,7, 0,8,135, 0,8,71, 0,9,239, + 80,7,9, 0,8,95, 0,8,31, 0,9,159, + 84,7,99, 0,8,127, 0,8,63, 0,9,223, + 82,7,27, 0,8,111, 0,8,47, 0,9,191, + 0,8,15, 0,8,143, 0,8,79, 0,9,255 + }; + static readonly int[] fixed_td = { + 80,5,1, 87,5,257, 83,5,17, 91,5,4097, + 81,5,5, 89,5,1025, 85,5,65, 93,5,16385, + 80,5,3, 88,5,513, 84,5,33, 92,5,8193, + 82,5,9, 90,5,2049, 86,5,129, 192,5,24577, + 80,5,2, 87,5,385, 83,5,25, 91,5,6145, + 81,5,7, 89,5,1537, 85,5,97, 93,5,24577, + 80,5,4, 88,5,769, 84,5,49, 92,5,12289, + 82,5,13, 90,5,3073, 86,5,193, 192,5,24577 + }; + + // Tables for deflate from PKZIP's appnote.txt. + static readonly int[] cplens = { // Copy lengths for literal codes 257..285 + 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 15, 17, 19, 23, 27, 31, + 35, 43, 51, 59, 67, 83, 99, 115, 131, 163, 195, 227, 258, 0, 0 + }; + + // see note #13 above about 258 + static readonly int[] cplext = { // Extra bits for literal codes 257..285 + 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2, + 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0, 112, 112 // 112==invalid + }; + + static readonly int[] cpdist = { // Copy offsets for distance codes 0..29 + 1, 2, 3, 4, 5, 7, 9, 13, 17, 25, 33, 49, 65, 97, 129, 193, + 257, 385, 513, 769, 1025, 1537, 2049, 3073, 4097, 6145, + 8193, 12289, 16385, 24577 + }; + + static readonly int[] cpdext = { // Extra bits for distance codes + 0, 0, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6, + 7, 7, 8, 8, 9, 9, 10, 10, 11, 11, + 12, 12, 13, 13}; + + // If BMAX needs to be larger than 16, then h and x[] should be uLong. + const int BMAX=15; // maximum bit length of any code + + int[] hn = null; // hufts used in space + int[] v = null; // work area for huft_build + int[] c = null; // bit length count table + int[] r = null; // table entry for structure assignment + int[] u = null; // table stack + int[] x = null; // bit offsets, then code stack + + private int huft_build(int[] b, // code lengths in bits (all assumed <= BMAX) + int bindex, + int n, // number of codes (assumed <= 288) + int s, // number of simple-valued codes (0..s-1) + int[] d, // list of base values for non-simple codes + int[] e, // list of extra bits for non-simple codes + int[] t, // result: starting table + int[] m, // maximum lookup bits, returns actual + int[] hp,// space for trees + int[] hn,// hufts used in space + int[] v // working area: values in order of bit length + ){ + // Given a list of code lengths and a maximum table size, make a set of + // tables to decode that set of codes. Return Z_OK on success, Z_BUF_ERROR + // if the given code set is incomplete (the tables are still built in this + // case), Z_DATA_ERROR if the input is invalid (an over-subscribed set of + // lengths), or Z_MEM_ERROR if not enough memory. + + int a; // counter for codes of length k + int f; // i repeats in table every f entries + int g; // maximum code length + int h; // table level + int i; // counter, current code + int j; // counter + int k; // number of bits in current code + int l; // bits per table (returned in m) + int mask; // (1 << w) - 1, to avoid cc -O bug on HP + int p; // pointer into c[], b[], or v[] + int q; // points to current table + int w; // bits before this table == (l * h) + int xp; // pointer into x + int y; // number of dummy codes added + int z; // number of entries in current table + + // Generate counts for each bit length + + p = 0; i = n; + do { + c[b[bindex+p]]++; p++; i--; // assume all entries <= BMAX + }while(i!=0); + + if(c[0] == n){ // null input--all zero length codes + t[0] = -1; + m[0] = 0; + return Z_OK; + } + + // Find minimum and maximum length, bound *m by those + l = m[0]; + for (j = 1; j <= BMAX; j++) + if(c[j]!=0) break; + k = j; // minimum code length + if(l < j){ + l = j; + } + for (i = BMAX; i!=0; i--){ + if(c[i]!=0) break; + } + g = i; // maximum code length + if(l > i){ + l = i; + } + m[0] = l; + + // Adjust last length count to fill out codes, if needed + for (y = 1 << j; j < i; j++, y <<= 1){ + if ((y -= c[j]) < 0){ + return Z_DATA_ERROR; + } + } + if ((y -= c[i]) < 0){ + return Z_DATA_ERROR; + } + c[i] += y; + + // Generate starting offsets into the value table for each length + x[1] = j = 0; + p = 1; xp = 2; + while (--i!=0) { // note that i == g from above + x[xp] = (j += c[p]); + xp++; + p++; + } + + // Make a table of values in order of bit lengths + i = 0; p = 0; + do { + if ((j = b[bindex+p]) != 0){ + v[x[j]++] = i; + } + p++; + } + while (++i < n); + n = x[g]; // set n to length of v + + // Generate the Huffman codes and for each, make the table entries + x[0] = i = 0; // first Huffman code is zero + p = 0; // grab values in bit order + h = -1; // no tables yet--level -1 + w = -l; // bits decoded == (l * h) + u[0] = 0; // just to keep compilers happy + q = 0; // ditto + z = 0; // ditto + + // go through the bit lengths (k already is bits in shortest code) + for (; k <= g; k++){ + a = c[k]; + while (a--!=0){ + // here i is the Huffman code of length k bits for value *p + // make tables up to required level + while (k > w + l){ + h++; + w += l; // previous table always l bits + // compute minimum size table less than or equal to l bits + z = g - w; + z = (z > l) ? l : z; // table size upper limit + if((f=1<<(j=k-w))>a+1){ // try a k-w bit table + // too few codes for k-w bit table + f -= a + 1; // deduct codes from patterns left + xp = k; + if(j < z){ + while (++j < z){ // try smaller tables up to z bits + if((f <<= 1) <= c[++xp]) + break; // enough codes to use up j bits + f -= c[xp]; // else deduct codes from patterns + } + } + } + z = 1 << j; // table entries for j-bit table + + // allocate new table + if (hn[0] + z > MANY){ // (note: doesn't matter for fixed) + return Z_DATA_ERROR; // overflow of MANY + } + u[h] = q = /*hp+*/ hn[0]; // DEBUG + hn[0] += z; + + // connect to last table, if there is one + if(h!=0){ + x[h]=i; // save pattern for backing up + r[0]=(byte)j; // bits in this table + r[1]=(byte)l; // bits to dump before this table + j=i>>(w - l); + r[2] = (int)(q - u[h-1] - j); // offset to this table + System.Array.Copy(r, 0, hp, (u[h-1]+j)*3, 3); // connect to last table + } + else{ + t[0] = q; // first table is returned result + } + } + + // set up table entry in r + r[1] = (byte)(k - w); + if (p >= n){ + r[0] = 128 + 64; // out of values--invalid code + } + else if (v[p] < s){ + r[0] = (byte)(v[p] < 256 ? 0 : 32 + 64); // 256 is end-of-block + r[2] = v[p++]; // simple code is just the value + } + else{ + r[0]=(byte)(e[v[p]-s]+16+64); // non-simple--look up in lists + r[2]=d[v[p++] - s]; + } + + // fill code-like entries with r + f=1<<(k-w); + for (j=i>>w;j>= 1){ + i ^= j; + } + i ^= j; + + // backup over finished tables + mask = (1 << w) - 1; // needed on HP, cc -O bug + while ((i & mask) != x[h]){ + h--; // don't need to update q + w -= l; + mask = (1 << w) - 1; + } + } + } + // Return Z_BUF_ERROR if we were given an incomplete table + return y != 0 && g != 1 ? Z_BUF_ERROR : Z_OK; + } + + internal int inflate_trees_bits(int[] c, // 19 code lengths + int[] bb, // bits tree desired/actual depth + int[] tb, // bits tree result + int[] hp, // space for trees + ZStream z // for messages + ){ + int result; + initWorkArea(19); + hn[0]=0; + result = huft_build(c, 0, 19, 19, null, null, tb, bb, hp, hn, v); + + if(result == Z_DATA_ERROR){ + z.msg = "oversubscribed dynamic bit lengths tree"; + } + else if(result == Z_BUF_ERROR || bb[0] == 0){ + z.msg = "incomplete dynamic bit lengths tree"; + result = Z_DATA_ERROR; + } + return result; + } + + internal int inflate_trees_dynamic(int nl, // number of literal/length codes + int nd, // number of distance codes + int[] c, // that many (total) code lengths + int[] bl, // literal desired/actual bit depth + int[] bd, // distance desired/actual bit depth + int[] tl, // literal/length tree result + int[] td, // distance tree result + int[] hp, // space for trees + ZStream z // for messages + ){ + int result; + + // build literal/length tree + initWorkArea(288); + hn[0]=0; + result = huft_build(c, 0, nl, 257, cplens, cplext, tl, bl, hp, hn, v); + if (result != Z_OK || bl[0] == 0){ + if(result == Z_DATA_ERROR){ + z.msg = "oversubscribed literal/length tree"; + } + else if (result != Z_MEM_ERROR){ + z.msg = "incomplete literal/length tree"; + result = Z_DATA_ERROR; + } + return result; + } + + // build distance tree + initWorkArea(288); + result = huft_build(c, nl, nd, 0, cpdist, cpdext, td, bd, hp, hn, v); + + if (result != Z_OK || (bd[0] == 0 && nl > 257)){ + if (result == Z_DATA_ERROR){ + z.msg = "oversubscribed distance tree"; + } + else if (result == Z_BUF_ERROR) { + z.msg = "incomplete distance tree"; + result = Z_DATA_ERROR; + } + else if (result != Z_MEM_ERROR){ + z.msg = "empty distance tree with lengths"; + result = Z_DATA_ERROR; + } + return result; + } + + return Z_OK; + } + + internal static int inflate_trees_fixed(int[] bl, //literal desired/actual bit depth + int[] bd, //distance desired/actual bit depth + int[][] tl,//literal/length tree result + int[][] td,//distance tree result + ZStream z //for memory allocation + ){ + bl[0]=fixed_bl; + bd[0]=fixed_bd; + tl[0]=fixed_tl; + td[0]=fixed_td; + return Z_OK; + } + + private void initWorkArea(int vsize){ + if(hn==null){ + hn=new int[1]; + v=new int[vsize]; + c=new int[BMAX+1]; + r=new int[3]; + u=new int[BMAX]; + x=new int[BMAX+1]; + } + if(v.Lengthstate); + return Z_OK; + } + + internal int inflateInit(ZStream z, int w){ + z.msg = null; + blocks = null; + + // handle undocumented nowrap option (no zlib header or check) + nowrap = 0; + if(w < 0){ + w = - w; + nowrap = 1; + } + + // set window size + if(w<8 ||w>15){ + inflateEnd(z); + return Z_STREAM_ERROR; + } + wbits=w; + + z.istate.blocks=new InfBlocks(z, + z.istate.nowrap!=0 ? null : this, + 1<>4)+8>z.istate.wbits){ + z.istate.mode = BAD; + z.msg="invalid window size"; + z.istate.marker = 5; // can't try inflateSync + break; + } + z.istate.mode=FLAG; + goto case FLAG; + case FLAG: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + b = (z.next_in[z.next_in_index++])&0xff; + + if((((z.istate.method << 8)+b) % 31)!=0){ + z.istate.mode = BAD; + z.msg = "incorrect header check"; + z.istate.marker = 5; // can't try inflateSync + break; + } + + if((b&PRESET_DICT)==0){ + z.istate.mode = BLOCKS; + break; + } + z.istate.mode = DICT4; + goto case DICT4; + case DICT4: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need=((z.next_in[z.next_in_index++]&0xff)<<24)&0xff000000L; + z.istate.mode=DICT3; + goto case DICT3; + case DICT3: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<16)&0xff0000L; + z.istate.mode=DICT2; + goto case DICT2; + case DICT2: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<8)&0xff00L; + z.istate.mode=DICT1; + goto case DICT1; + case DICT1: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need += (z.next_in[z.next_in_index++]&0xffL); + z.adler = z.istate.need; + z.istate.mode = DICT0; + return Z_NEED_DICT; + case DICT0: + z.istate.mode = BAD; + z.msg = "need dictionary"; + z.istate.marker = 0; // can try inflateSync + return Z_STREAM_ERROR; + case BLOCKS: + + r = z.istate.blocks.proc(z, r); + if(r == Z_DATA_ERROR){ + z.istate.mode = BAD; + z.istate.marker = 0; // can try inflateSync + break; + } + if(r == Z_OK){ + r = f; + } + if(r != Z_STREAM_END){ + return r; + } + r = f; + z.istate.blocks.reset(z, z.istate.was); + if(z.istate.nowrap!=0){ + z.istate.mode=DONE; + break; + } + z.istate.mode=CHECK4; + goto case CHECK4; + case CHECK4: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need=((z.next_in[z.next_in_index++]&0xff)<<24)&0xff000000L; + z.istate.mode=CHECK3; + goto case CHECK3; + case CHECK3: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<16)&0xff0000L; + z.istate.mode = CHECK2; + goto case CHECK2; + case CHECK2: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need+=((z.next_in[z.next_in_index++]&0xff)<<8)&0xff00L; + z.istate.mode = CHECK1; + goto case CHECK1; + case CHECK1: + + if(z.avail_in==0)return r;r=f; + + z.avail_in--; z.total_in++; + z.istate.need+=(z.next_in[z.next_in_index++]&0xffL); + + if(((int)(z.istate.was[0])) != ((int)(z.istate.need))){ + z.istate.mode = BAD; + z.msg = "incorrect data check"; + z.istate.marker = 5; // can't try inflateSync + break; + } + + z.istate.mode = DONE; + goto case DONE; + case DONE: + return Z_STREAM_END; + case BAD: + return Z_DATA_ERROR; + default: + return Z_STREAM_ERROR; + } + } + } + + + internal int inflateSetDictionary(ZStream z, byte[] dictionary, int dictLength){ + int index=0; + int length = dictLength; + if(z==null || z.istate == null|| z.istate.mode != DICT0) + return Z_STREAM_ERROR; + + if(z._adler.adler32(1L, dictionary, 0, dictLength)!=z.adler){ + return Z_DATA_ERROR; + } + + z.adler = z._adler.adler32(0, null, 0, 0); + + if(length >= (1< 0) + { + output.Write(buf, 0, count); + } + } + while (z.avail_in > 0 || z.avail_out == 0); + + Flush(); + } + + public override void Flush() + { + output.Flush(); + } + + public virtual int FlushMode + { + get { return flushLevel; } + set { this.flushLevel = value; } + } + + public virtual long TotalIn + { + get { return z.total_in; } + } + + public virtual long TotalOut + { + get { return z.total_out; } + } + + public override void Write(byte[] buffer, int offset, int count) + { + Streams.ValidateBufferArguments(buffer, offset, count); + + if (count == 0) + return; + + z.next_in = buffer; + z.next_in_index = offset; + z.avail_in = count; + + do + { + z.next_out = buf; + z.next_out_index = 0; + z.avail_out = buf.Length; + + int err = compress + ? z.deflate(flushLevel) + : z.inflate(flushLevel); + + if (err != JZlib.Z_OK) + // TODO + //throw new ZStreamException((compress ? "de" : "in") + "flating: " + z.msg); + throw new IOException((compress ? "de" : "in") + "flating: " + z.msg); + + output.Write(buf, 0, buf.Length - z.avail_out); + } + while (z.avail_in > 0 || z.avail_out == 0); + } + + public override void WriteByte(byte value) + { + buf1[0] = value; + Write(buf1, 0, 1); + } + } + + public class ZOutputStreamLeaveOpen + : ZOutputStream + { + public ZOutputStreamLeaveOpen(Stream output) + : base(output) + { + } + + public ZOutputStreamLeaveOpen(Stream output, bool nowrap) + : base(output, nowrap) + { + } + + public ZOutputStreamLeaveOpen(Stream output, ZStream z) + : base(output, z) + { + } + + public ZOutputStreamLeaveOpen(Stream output, int level) + : base(output, level) + { + } + + public ZOutputStreamLeaveOpen(Stream output, int level, bool nowrap) + : base(output, level, nowrap) + { + } + + protected override void Dispose(bool disposing) + { + Detach(disposing); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZOutputStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZOutputStream.cs.meta new file mode 100644 index 00000000..96635e2b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZOutputStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9daefa2516997ab47a36120ae44ced7e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZOutputStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs new file mode 100644 index 00000000..58facb40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs @@ -0,0 +1,218 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: ZStream.cs,v 1.1 2006-07-31 13:59:26 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + public sealed class ZStream{ + + private const int MAX_WBITS=15; // 32K LZ77 window + private const int DEF_WBITS=MAX_WBITS; + + private const int Z_NO_FLUSH=0; + private const int Z_PARTIAL_FLUSH=1; + private const int Z_SYNC_FLUSH=2; + private const int Z_FULL_FLUSH=3; + private const int Z_FINISH=4; + + private const int MAX_MEM_LEVEL=9; + + private const int Z_OK=0; + private const int Z_STREAM_END=1; + private const int Z_NEED_DICT=2; + private const int Z_ERRNO=-1; + private const int Z_STREAM_ERROR=-2; + private const int Z_DATA_ERROR=-3; + private const int Z_MEM_ERROR=-4; + private const int Z_BUF_ERROR=-5; + private const int Z_VERSION_ERROR=-6; + + public byte[] next_in; // next input byte + public int next_in_index; + public int avail_in; // number of bytes available at next_in + public long total_in; // total nb of input bytes read so far + + public byte[] next_out; // next output byte should be put there + public int next_out_index; + public int avail_out; // remaining free space at next_out + public long total_out; // total nb of bytes output so far + + public string msg; + + internal Deflate dstate; + internal Inflate istate; + + internal int data_type; // best guess about the data type: ascii or binary + + public long adler; + internal Adler32 _adler=new Adler32(); + + public int inflateInit(){ + return inflateInit(DEF_WBITS); + } + public int inflateInit(bool nowrap){ + return inflateInit(DEF_WBITS, nowrap); + } + public int inflateInit(int w){ + return inflateInit(w, false); + } + + public int inflateInit(int w, bool nowrap){ + istate=new Inflate(); + return istate.inflateInit(this, nowrap?-w:w); + } + + public int inflate(int f){ + if(istate==null) return Z_STREAM_ERROR; + return istate.inflate(this, f); + } + public int inflateEnd(){ + if(istate==null) return Z_STREAM_ERROR; + int ret=istate.inflateEnd(this); + istate = null; + return ret; + } + public int inflateSync(){ + if(istate == null) + return Z_STREAM_ERROR; + return istate.inflateSync(this); + } + public int inflateSetDictionary(byte[] dictionary, int dictLength){ + if(istate == null) + return Z_STREAM_ERROR; + return istate.inflateSetDictionary(this, dictionary, dictLength); + } + + public int deflateInit(int level){ + return deflateInit(level, MAX_WBITS); + } + public int deflateInit(int level, bool nowrap){ + return deflateInit(level, MAX_WBITS, nowrap); + } + public int deflateInit(int level, int bits){ + return deflateInit(level, bits, false); + } + public int deflateInit(int level, int bits, bool nowrap){ + dstate=new Deflate(); + return dstate.deflateInit(this, level, nowrap?-bits:bits); + } + public int deflate(int flush){ + if(dstate==null){ + return Z_STREAM_ERROR; + } + return dstate.deflate(this, flush); + } + public int deflateEnd(){ + if(dstate==null) return Z_STREAM_ERROR; + int ret=dstate.deflateEnd(); + dstate=null; + return ret; + } + public int deflateParams(int level, int strategy){ + if(dstate==null) return Z_STREAM_ERROR; + return dstate.deflateParams(this, level, strategy); + } + public int deflateSetDictionary (byte[] dictionary, int dictLength){ + if(dstate == null) + return Z_STREAM_ERROR; + return dstate.deflateSetDictionary(this, dictionary, dictLength); + } + + // Flush as much pending output as possible. All deflate() output goes + // through this function so some applications may wish to modify it + // to avoid allocating a large strm->next_out buffer and copying into it. + // (See also read_buf()). + internal void flush_pending(){ + int len=dstate.pending; + + if(len>avail_out) len=avail_out; + if(len==0) return; + + if(dstate.pending_buf.Length<=dstate.pending_out || + next_out.Length<=next_out_index || + dstate.pending_buf.Length<(dstate.pending_out+len) || + next_out.Length<(next_out_index+len)){ + // System.out.println(dstate.pending_buf.length+", "+dstate.pending_out+ + // ", "+next_out.length+", "+next_out_index+", "+len); + // System.out.println("avail_out="+avail_out); + } + + System.Array.Copy(dstate.pending_buf, dstate.pending_out, + next_out, next_out_index, len); + + next_out_index+=len; + dstate.pending_out+=len; + total_out+=len; + avail_out-=len; + dstate.pending-=len; + if(dstate.pending==0){ + dstate.pending_out=0; + } + } + + // Read a new buffer from the current input stream, update the adler32 + // and total number of bytes read. All deflate() input goes through + // this function so some applications may wish to modify it to avoid + // allocating a large strm->next_in buffer and copying from it. + // (See also flush_pending()). + internal int read_buf(byte[] buf, int start, int size) { + int len=avail_in; + + if(len>size) len=size; + if(len==0) return 0; + + avail_in-=len; + + if(dstate.noheader==0) { + adler=_adler.adler32(adler, next_in, next_in_index, len); + } + System.Array.Copy(next_in, next_in_index, buf, start, len); + next_in_index += len; + total_in += len; + return len; + } + + public void free(){ + next_in=null; + next_out=null; + msg=null; + _adler=null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs.meta new file mode 100644 index 00000000..4c927b64 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c61e91376cb1a194e8d1f7922f942c16 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs new file mode 100644 index 00000000..60ae1f83 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs @@ -0,0 +1,371 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +/* + * $Id: Tree.cs,v 1.2 2008-05-10 09:35:40 bouncy Exp $ + * +Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the distribution. + + 3. The names of the authors may not be used to endorse or promote products + derived from this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ +/* + * This program is based on zlib-1.1.3, so all credit should go authors + * Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) + * and contributors of zlib. + */ + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Zlib { + + internal sealed class Tree{ + private const int MAX_BITS=15; + private const int BL_CODES=19; + private const int D_CODES=30; + private const int LITERALS=256; + private const int LENGTH_CODES=29; + private const int L_CODES=(LITERALS+1+LENGTH_CODES); + private const int HEAP_SIZE=(2*L_CODES+1); + + // Bit length codes must not exceed MAX_BL_BITS bits + internal const int MAX_BL_BITS=7; + + // end of block literal code + internal const int END_BLOCK=256; + + // repeat previous bit length 3-6 times (2 bits of repeat count) + internal const int REP_3_6=16; + + // repeat a zero length 3-10 times (3 bits of repeat count) + internal const int REPZ_3_10=17; + + // repeat a zero length 11-138 times (7 bits of repeat count) + internal const int REPZ_11_138=18; + + // extra bits for each length code + internal static readonly int[] extra_lbits={ + 0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0 + }; + + // extra bits for each distance code + internal static readonly int[] extra_dbits={ + 0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13 + }; + + // extra bits for each bit length code + internal static readonly int[] extra_blbits={ + 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,3,7 + }; + + internal static readonly byte[] bl_order={ + 16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15}; + + + // The lengths of the bit length codes are sent in order of decreasing + // probability, to avoid transmitting the lengths for unused bit + // length codes. + + internal const int Buf_size=8*2; + + // see definition of array dist_code below + internal const int DIST_CODE_LEN=512; + + internal static readonly byte[] _dist_code = { + 0, 1, 2, 3, 4, 4, 5, 5, 6, 6, 6, 6, 7, 7, 7, 7, 8, 8, 8, 8, + 8, 8, 8, 8, 9, 9, 9, 9, 9, 9, 9, 9, 10, 10, 10, 10, 10, 10, 10, 10, + 10, 10, 10, 10, 10, 10, 10, 10, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, + 11, 11, 11, 11, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, + 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 13, 13, 13, 13, + 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, + 13, 13, 13, 13, 13, 13, 13, 13, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 0, 0, 16, 17, + 18, 18, 19, 19, 20, 20, 20, 20, 21, 21, 21, 21, 22, 22, 22, 22, 22, 22, 22, 22, + 23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 24, 24, 24, 24, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, + 27, 27, 27, 27, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29 + }; + + internal static readonly byte[] _length_code={ + 0, 1, 2, 3, 4, 5, 6, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 12, 12, + 13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, + 17, 17, 17, 17, 17, 17, 17, 17, 18, 18, 18, 18, 18, 18, 18, 18, 19, 19, 19, 19, + 19, 19, 19, 19, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, + 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 22, 22, 22, 22, + 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, + 23, 23, 23, 23, 23, 23, 23, 23, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, + 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 26, 26, 26, 26, 26, 26, 26, 26, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 26, 26, 26, 26, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28 + }; + + internal static readonly int[] base_length = { + 0, 1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 14, 16, 20, 24, 28, 32, 40, 48, 56, + 64, 80, 96, 112, 128, 160, 192, 224, 0 + }; + + internal static readonly int[] base_dist = { + 0, 1, 2, 3, 4, 6, 8, 12, 16, 24, + 32, 48, 64, 96, 128, 192, 256, 384, 512, 768, + 1024, 1536, 2048, 3072, 4096, 6144, 8192, 12288, 16384, 24576 + }; + + // Mapping from a distance to a distance code. dist is the distance - 1 and + // must not have side effects. _dist_code[256] and _dist_code[257] are never + // used. + internal static int d_code(int dist){ + return ((dist) < 256 ? _dist_code[dist] : _dist_code[256+((dist)>>7)]); + } + + internal short[] dyn_tree; // the dynamic tree + internal int max_code; // largest code with non zero frequency + internal StaticTree stat_desc; // the corresponding static tree + + // Compute the optimal bit lengths for a tree and update the total bit length + // for the current block. + // IN assertion: the fields freq and dad are set, heap[heap_max] and + // above are the tree nodes sorted by increasing frequency. + // OUT assertions: the field len is set to the optimal bit length, the + // array bl_count contains the frequencies for each bit length. + // The length opt_len is updated; static_len is also updated if stree is + // not null. + internal void gen_bitlen(Deflate s){ + short[] tree = dyn_tree; + short[] stree = stat_desc.static_tree; + int[] extra = stat_desc.extra_bits; + int based = stat_desc.extra_base; + int max_length = stat_desc.max_length; + int h; // heap index + int n, m; // iterate over the tree elements + int bits; // bit length + int xbits; // extra bits + short f; // frequency + int overflow = 0; // number of elements with bit length too large + + for (bits = 0; bits <= MAX_BITS; bits++) s.bl_count[bits] = 0; + + // In a first pass, compute the optimal bit lengths (which may + // overflow in the case of the bit length tree). + tree[s.heap[s.heap_max]*2+1] = 0; // root of the heap + + for(h=s.heap_max+1; h max_length){ bits = max_length; overflow++; } + tree[n*2+1] = (short)bits; + // We overwrite tree[n*2+1] which is no longer needed + + if (n > max_code) continue; // not a leaf node + + s.bl_count[bits]++; + xbits = 0; + if (n >= based) xbits = extra[n-based]; + f = tree[n*2]; + s.opt_len += f * (bits + xbits); + if (stree!=null) s.static_len += f * (stree[n*2+1] + xbits); + } + if (overflow == 0) return; + + // This happens for example on obj2 and pic of the Calgary corpus + // Find the first bit length which could increase: + do { + bits = max_length-1; + while(s.bl_count[bits]==0) bits--; + s.bl_count[bits]--; // move one leaf down the tree + s.bl_count[bits+1]+=2; // move one overflow item as its brother + s.bl_count[max_length]--; + // The brother of the overflow item also moves one step up, + // but this does not affect bl_count[max_length] + overflow -= 2; + } + while (overflow > 0); + + for (bits = max_length; bits != 0; bits--) { + n = s.bl_count[bits]; + while (n != 0) { + m = s.heap[--h]; + if (m > max_code) continue; + if (tree[m*2+1] != bits) { + s.opt_len += (int)(((long)bits - (long)tree[m*2+1])*(long)tree[m*2]); + tree[m*2+1] = (short)bits; + } + n--; + } + } + } + + // Construct one Huffman tree and assigns the code bit strings and lengths. + // Update the total bit length for the current block. + // IN assertion: the field freq is set for all tree elements. + // OUT assertions: the fields len and code are set to the optimal bit length + // and corresponding code. The length opt_len is updated; static_len is + // also updated if stree is not null. The field max_code is set. + internal void build_tree(Deflate s){ + short[] tree=dyn_tree; + short[] stree=stat_desc.static_tree; + int elems=stat_desc.elems; + int n, m; // iterate over heap elements + int max_code=-1; // largest code with non zero frequency + int node; // new node being created + + // Construct the initial heap, with least frequent element in + // heap[1]. The sons of heap[n] are heap[2*n] and heap[2*n+1]. + // heap[0] is not used. + s.heap_len = 0; + s.heap_max = HEAP_SIZE; + + for(n=0; n=1; n--) + s.pqdownheap(tree, n); + + // Construct the Huffman tree by repeatedly combining the least two + // frequent nodes. + + node=elems; // next internal node of the tree + do{ + // n = node of least frequency + n=s.heap[1]; + s.heap[1]=s.heap[s.heap_len--]; + s.pqdownheap(tree, 1); + m=s.heap[1]; // m = node of next least frequency + + s.heap[--s.heap_max] = n; // keep the nodes sorted by frequency + s.heap[--s.heap_max] = m; + + // Create a new node father of n and m + tree[node*2] = (short)(tree[n*2] + tree[m*2]); + s.depth[node] = (byte)(System.Math.Max(s.depth[n],s.depth[m])+1); + tree[n*2+1] = tree[m*2+1] = (short)node; + + // and insert the new node in the heap + s.heap[1] = node++; + s.pqdownheap(tree, 1); + } + while(s.heap_len>=2); + + s.heap[--s.heap_max] = s.heap[1]; + + // At this point, the fields freq and dad are set. We can now + // generate the bit lengths. + + gen_bitlen(s); + + // The field len is now set, we can generate the bit codes + gen_codes(tree, max_code, s.bl_count); + } + + // Generate the codes for a given tree and bit counts (which need not be + // optimal). + // IN assertion: the array bl_count contains the bit length statistics for + // the given tree and the field len is set for all tree elements. + // OUT assertion: the field code is set for all tree elements of non + // zero code length. + internal static void gen_codes(short[] tree, // the tree to decorate + int max_code, // largest code with non zero frequency + short[] bl_count // number of codes at each bit length + ){ + short[] next_code=new short[MAX_BITS+1]; // next code value for each bit length + short code = 0; // running code value + int bits; // bit index + int n; // code index + + // The distribution counts are first used to generate the code values + // without bit reversal. + for (bits = 1; bits <= MAX_BITS; bits++) { + next_code[bits] = code = (short)((code + bl_count[bits-1]) << 1); + } + + // Check that the bit counts in bl_count are consistent. The last code + // must be all ones. + //Assert (code + bl_count[MAX_BITS]-1 == (1<>=1; + res<<=1; + } + while(--len>0); + return res>>1; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs.meta new file mode 100644 index 00000000..f775a7a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c380efed8f5438c409a43e67f176c3d8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/util/zlib/ZTree.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509.meta new file mode 100644 index 00000000..d30303e3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2afd9d5b870ce9a42a4712d5f525d987 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs new file mode 100644 index 00000000..a44173cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs @@ -0,0 +1,427 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// The Holder object. + ///
    + 	/// Holder ::= SEQUENCE {
    + 	///		baseCertificateID   [0] IssuerSerial OPTIONAL,
    + 	///			-- the issuer and serial number of
    + 	///			-- the holder's Public Key Certificate
    + 	///		entityName          [1] GeneralNames OPTIONAL,
    + 	///			-- the name of the claimant or role
    + 	///		objectDigestInfo    [2] ObjectDigestInfo OPTIONAL
    + 	///			-- used to directly authenticate the holder,
    + 	///			-- for example, an executable
    + 	/// }
    +	/// 
    + ///
    + public class AttributeCertificateHolder + //: CertSelector, Selector + : ISelector + { + internal readonly Holder holder; + + internal AttributeCertificateHolder( + Asn1Sequence seq) + { + holder = Holder.GetInstance(seq); + } + + public AttributeCertificateHolder( + X509Name issuerName, + BigInteger serialNumber) + { + holder = new Holder( + new IssuerSerial( + GenerateGeneralNames(issuerName), + new DerInteger(serialNumber))); + } + + public AttributeCertificateHolder( + X509Certificate cert) + { + X509Name name; + try + { + name = PrincipalUtilities.GetIssuerX509Principal(cert); + } + catch (Exception e) + { + throw new CertificateParsingException(e.Message); + } + + holder = new Holder(new IssuerSerial(GenerateGeneralNames(name), new DerInteger(cert.SerialNumber))); + } + + public AttributeCertificateHolder( + X509Name principal) + { + holder = new Holder(GenerateGeneralNames(principal)); + } + + /** + * Constructs a holder for v2 attribute certificates with a hash value for + * some type of object. + *

    + * digestedObjectType can be one of the following: + *

      + *
    • 0 - publicKey - A hash of the public key of the holder must be + * passed.
    • + *
    • 1 - publicKeyCert - A hash of the public key certificate of the + * holder must be passed.
    • + *
    • 2 - otherObjectDigest - A hash of some other object type must be + * passed. otherObjectTypeID must not be empty.
    • + *
    + *

    + *

    This cannot be used if a v1 attribute certificate is used.

    + * + * @param digestedObjectType The digest object type. + * @param digestAlgorithm The algorithm identifier for the hash. + * @param otherObjectTypeID The object type ID if + * digestedObjectType is + * otherObjectDigest. + * @param objectDigest The hash value. + */ + public AttributeCertificateHolder( + int digestedObjectType, + string digestAlgorithm, + string otherObjectTypeID, + byte[] objectDigest) + { + // TODO Allow 'objectDigest' to be null? + + holder = new Holder(new ObjectDigestInfo(digestedObjectType, otherObjectTypeID, + new AlgorithmIdentifier(new DerObjectIdentifier(digestAlgorithm)), Arrays.Clone(objectDigest))); + } + + /** + * Returns the digest object type if an object digest info is used. + *

    + *

      + *
    • 0 - publicKey - A hash of the public key of the holder must be + * passed.
    • + *
    • 1 - publicKeyCert - A hash of the public key certificate of the + * holder must be passed.
    • + *
    • 2 - otherObjectDigest - A hash of some other object type must be + * passed. otherObjectTypeID must not be empty.
    • + *
    + *

    + * + * @return The digest object type or -1 if no object digest info is set. + */ + public int DigestedObjectType + { + get + { + ObjectDigestInfo odi = holder.ObjectDigestInfo; + + return odi == null + ? -1 + : odi.DigestedObjectType.IntValueExact; + } + } + + /** + * Returns the other object type ID if an object digest info is used. + * + * @return The other object type ID or null if no object + * digest info is set. + */ + public string DigestAlgorithm + { + get + { + ObjectDigestInfo odi = holder.ObjectDigestInfo; + + return odi == null + ? null + : odi.DigestAlgorithm.Algorithm.Id; + } + } + + /** + * Returns the hash if an object digest info is used. + * + * @return The hash or null if no object digest info is set. + */ + public byte[] GetObjectDigest() + { + ObjectDigestInfo odi = holder.ObjectDigestInfo; + + return odi == null + ? null + : odi.ObjectDigest.GetBytes(); + } + + /** + * Returns the digest algorithm ID if an object digest info is used. + * + * @return The digest algorithm ID or null if no object + * digest info is set. + */ + public string OtherObjectTypeID + { + get + { + ObjectDigestInfo odi = holder.ObjectDigestInfo; + + return odi == null + ? null + : odi.OtherObjectTypeID.Id; + } + } + + private GeneralNames GenerateGeneralNames( + X509Name principal) + { +// return GeneralNames.GetInstance(new DerSequence(new GeneralName(principal))); + return new GeneralNames(new GeneralName(principal)); + } + + private bool MatchesDN( + X509Name subject, + GeneralNames targets) + { + GeneralName[] names = targets.GetNames(); + + for (int i = 0; i != names.Length; i++) + { + GeneralName gn = names[i]; + + if (gn.TagNo == GeneralName.DirectoryName) + { + try + { + if (X509Name.GetInstance(gn.Name).Equivalent(subject)) + { + return true; + } + } + catch (Exception) + { + } + } + } + + return false; + } + + private object[] GetNames( + GeneralName[] names) + { + int count = 0; + for (int i = 0; i != names.Length; i++) + { + if (names[i].TagNo == GeneralName.DirectoryName) + { + ++count; + } + } + + object[] result = new object[count]; + + int pos = 0; + for (int i = 0; i != names.Length; i++) + { + if (names[i].TagNo == GeneralName.DirectoryName) + { + result[pos++] = X509Name.GetInstance(names[i].Name); + } + } + + return result; + } + + private X509Name[] GetPrincipals( + GeneralNames names) + { + object[] p = this.GetNames(names.GetNames()); + + int count = 0; + + for (int i = 0; i != p.Length; i++) + { + if (p[i] is X509Name) + { + ++count; + } + } + + X509Name[] result = new X509Name[count]; + + int pos = 0; + for (int i = 0; i != p.Length; i++) + { + if (p[i] is X509Name) + { + result[pos++] = (X509Name)p[i]; + } + } + + return result; + } + + /** + * Return any principal objects inside the attribute certificate holder entity names field. + * + * @return an array of IPrincipal objects (usually X509Name), null if no entity names field is set. + */ + public X509Name[] GetEntityNames() + { + if (holder.EntityName != null) + { + return GetPrincipals(holder.EntityName); + } + + return null; + } + + /** + * Return the principals associated with the issuer attached to this holder + * + * @return an array of principals, null if no BaseCertificateID is set. + */ + public X509Name[] GetIssuer() + { + if (holder.BaseCertificateID != null) + { + return GetPrincipals(holder.BaseCertificateID.Issuer); + } + + return null; + } + + /** + * Return the serial number associated with the issuer attached to this holder. + * + * @return the certificate serial number, null if no BaseCertificateID is set. + */ + public BigInteger SerialNumber + { + get + { + if (holder.BaseCertificateID != null) + { + return holder.BaseCertificateID.Serial.Value; + } + + return null; + } + } + + public object Clone() + { + return new AttributeCertificateHolder((Asn1Sequence)holder.ToAsn1Object()); + } + + public bool Match(X509Certificate x509Cert) + { + if (x509Cert == null) + return false; + + try + { + if (holder.BaseCertificateID != null) + { + return holder.BaseCertificateID.Serial.HasValue(x509Cert.SerialNumber) + && MatchesDN(PrincipalUtilities.GetIssuerX509Principal(x509Cert), holder.BaseCertificateID.Issuer); + } + + if (holder.EntityName != null) + { + if (MatchesDN(PrincipalUtilities.GetSubjectX509Principal(x509Cert), holder.EntityName)) + { + return true; + } + } + + if (holder.ObjectDigestInfo != null) + { + IDigest md = null; + try + { + md = DigestUtilities.GetDigest(DigestAlgorithm); + } + catch (Exception) + { + return false; + } + + switch (DigestedObjectType) + { + case ObjectDigestInfo.PublicKey: + { + // TODO: DSA Dss-parms + + //byte[] b = x509Cert.GetPublicKey().getEncoded(); + // TODO Is this the right way to encode? + byte[] b = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo( + x509Cert.GetPublicKey()).GetEncoded(); + md.BlockUpdate(b, 0, b.Length); + break; + } + + case ObjectDigestInfo.PublicKeyCert: + { + byte[] b = x509Cert.GetEncoded(); + md.BlockUpdate(b, 0, b.Length); + break; + } + + // TODO Default handler? + } + + // TODO Shouldn't this be the other way around? + if (!Arrays.AreEqual(DigestUtilities.DoFinal(md), GetObjectDigest())) + { + return false; + } + } + } + catch (CertificateEncodingException) + { + return false; + } + + return false; + } + + public override bool Equals( + object obj) + { + if (obj == this) + { + return true; + } + + if (!(obj is AttributeCertificateHolder)) + { + return false; + } + + AttributeCertificateHolder other = (AttributeCertificateHolder)obj; + + return this.holder.Equals(other.holder); + } + + public override int GetHashCode() + { + return this.holder.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs.meta new file mode 100644 index 00000000..b4c47b6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ebc31bfac25c1846a4177bd1925433c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateHolder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs new file mode 100644 index 00000000..11029375 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs @@ -0,0 +1,182 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * Carrying class for an attribute certificate issuer. + */ + public class AttributeCertificateIssuer + //: CertSelector, Selector + : ISelector + { + internal readonly Asn1Encodable form; + + /** + * Set the issuer directly with the ASN.1 structure. + * + * @param issuer The issuer + */ + public AttributeCertificateIssuer( + AttCertIssuer issuer) + { + form = issuer.Issuer; + } + + public AttributeCertificateIssuer( + X509Name principal) + { +// form = new V2Form(GeneralNames.GetInstance(new DerSequence(new GeneralName(principal)))); + form = new V2Form(new GeneralNames(new GeneralName(principal))); + } + + private object[] GetNames() + { + GeneralNames name; + if (form is V2Form) + { + name = ((V2Form)form).IssuerName; + } + else + { + name = (GeneralNames)form; + } + + GeneralName[] names = name.GetNames(); + + int count = 0; + for (int i = 0; i != names.Length; i++) + { + if (names[i].TagNo == GeneralName.DirectoryName) + { + ++count; + } + } + + object[] result = new object[count]; + + int pos = 0; + for (int i = 0; i != names.Length; i++) + { + if (names[i].TagNo == GeneralName.DirectoryName) + { + result[pos++] = X509Name.GetInstance(names[i].Name); + } + } + + return result; + } + + /// Return any principal objects inside the attribute certificate issuer object. + /// An array of IPrincipal objects (usually X509Principal). + public X509Name[] GetPrincipals() + { + object[] p = this.GetNames(); + + int count = 0; + for (int i = 0; i != p.Length; i++) + { + if (p[i] is X509Name) + { + ++count; + } + } + + X509Name[] result = new X509Name[count]; + + int pos = 0; + for (int i = 0; i != p.Length; i++) + { + if (p[i] is X509Name) + { + result[pos++] = (X509Name)p[i]; + } + } + + return result; + } + + private bool MatchesDN( + X509Name subject, + GeneralNames targets) + { + GeneralName[] names = targets.GetNames(); + + for (int i = 0; i != names.Length; i++) + { + GeneralName gn = names[i]; + + if (gn.TagNo == GeneralName.DirectoryName) + { + try + { + if (X509Name.GetInstance(gn.Name).Equivalent(subject)) + { + return true; + } + } + catch (Exception) + { + } + } + } + + return false; + } + + public object Clone() + { + return new AttributeCertificateIssuer(AttCertIssuer.GetInstance(form)); + } + + public bool Match(X509Certificate x509Cert) + { + if (x509Cert == null) + return false; + + if (form is V2Form) + { + V2Form issuer = (V2Form) form; + if (issuer.BaseCertificateID != null) + { + return issuer.BaseCertificateID.Serial.HasValue(x509Cert.SerialNumber) + && MatchesDN(x509Cert.IssuerDN, issuer.BaseCertificateID.Issuer); + } + + return MatchesDN(x509Cert.SubjectDN, issuer.IssuerName); + } + + return MatchesDN(x509Cert.SubjectDN, (GeneralNames) form); + } + + public override bool Equals( + object obj) + { + if (obj == this) + { + return true; + } + + if (!(obj is AttributeCertificateIssuer)) + { + return false; + } + + AttributeCertificateIssuer other = (AttributeCertificateIssuer)obj; + + return this.form.Equals(other.form); + } + + public override int GetHashCode() + { + return this.form.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs.meta new file mode 100644 index 00000000..808eb723 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9ae9b673d38065f448c5413289237221 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/AttributeCertificateIssuer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs new file mode 100644 index 00000000..66f6041d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs @@ -0,0 +1,28 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + public interface IX509Extension + { + /// + /// Get all critical extension values, by oid + /// + /// IDictionary with string (OID) keys and Asn1OctetString values + ISet GetCriticalExtensionOids(); + + /// + /// Get all non-critical extension values, by oid + /// + /// IDictionary with string (OID) keys and Asn1OctetString values + ISet GetNonCriticalExtensionOids(); + + Asn1OctetString GetExtensionValue(DerObjectIdentifier oid); + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs.meta new file mode 100644 index 00000000..8f16b653 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 59950d83bfcaae84a80098ecd507042a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/IX509Extension.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs new file mode 100644 index 00000000..850f8142 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs @@ -0,0 +1,99 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + class PemParser + { + private readonly string _header1; + private readonly string _header2; + private readonly string _footer1; + private readonly string _footer2; + + internal PemParser( + string type) + { + _header1 = "-----BEGIN " + type + "-----"; + _header2 = "-----BEGIN X509 " + type + "-----"; + _footer1 = "-----END " + type + "-----"; + _footer2 = "-----END X509 " + type + "-----"; + } + + private string ReadLine( + Stream inStream) + { + int c; + StringBuilder l = new StringBuilder(); + + do + { + while (((c = inStream.ReadByte()) != '\r') && c != '\n' && (c >= 0)) + { + if (c == '\r') + { + continue; + } + + l.Append((char)c); + } + } + while (c >= 0 && l.Length == 0); + + if (c < 0) + { + return null; + } + + return l.ToString(); + } + + internal Asn1Sequence ReadPemObject( + Stream inStream) + { + string line; + StringBuilder pemBuf = new StringBuilder(); + + while ((line = ReadLine(inStream)) != null) + { + if (Org.BouncyCastle.Utilities.Platform.StartsWith(line, _header1) || Org.BouncyCastle.Utilities.Platform.StartsWith(line, _header2)) + { + break; + } + } + + while ((line = ReadLine(inStream)) != null) + { + if (Org.BouncyCastle.Utilities.Platform.StartsWith(line, _footer1) || Org.BouncyCastle.Utilities.Platform.StartsWith(line, _footer2)) + { + break; + } + + pemBuf.Append(line); + } + + if (pemBuf.Length != 0) + { + Asn1Object o = Asn1Object.FromByteArray(Base64.Decode(pemBuf.ToString())); + + if (!(o is Asn1Sequence)) + { + throw new IOException("malformed PEM data encountered"); + } + + return (Asn1Sequence) o; + } + + return null; + } + } +} + +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs.meta new file mode 100644 index 00000000..dbc0449f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7253b01e0b23f944483e71d7932a9a7e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PEMParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs new file mode 100644 index 00000000..b62b877a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs @@ -0,0 +1,74 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// A utility class that will extract X509Principal objects from X.509 certificates. + ///

    + /// Use this in preference to trying to recreate a principal from a string, not all + /// DNs are what they should be, so it's best to leave them encoded where they + /// can be.

    + ///
    + public class PrincipalUtilities + { + /// Return the issuer of the given cert as an X509Principal. + public static X509Name GetIssuerX509Principal( + X509Certificate cert) + { + try + { + TbsCertificateStructure tbsCert = TbsCertificateStructure.GetInstance( + Asn1Object.FromByteArray(cert.GetTbsCertificate())); + + return tbsCert.Issuer; + } + catch (Exception e) + { + throw new CertificateEncodingException("Could not extract issuer", e); + } + } + + /// Return the subject of the given cert as an X509Principal. + public static X509Name GetSubjectX509Principal( + X509Certificate cert) + { + try + { + TbsCertificateStructure tbsCert = TbsCertificateStructure.GetInstance( + Asn1Object.FromByteArray(cert.GetTbsCertificate())); + + return tbsCert.Subject; + } + catch (Exception e) + { + throw new CertificateEncodingException("Could not extract subject", e); + } + } + + /// Return the issuer of the given CRL as an X509Principal. + public static X509Name GetIssuerX509Principal( + X509Crl crl) + { + try + { + TbsCertificateList tbsCertList = TbsCertificateList.GetInstance( + Asn1Object.FromByteArray(crl.GetTbsCertList())); + + return tbsCertList.Issuer; + } + catch (Exception e) + { + throw new CrlException("Could not extract issuer", e); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs.meta new file mode 100644 index 00000000..117b454d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 311bf1252972ead4489c26943ec5e649 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/PrincipalUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs new file mode 100644 index 00000000..9790c7bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs @@ -0,0 +1,277 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// A factory to produce Public Key Info Objects. + /// + public static class SubjectPublicKeyInfoFactory + { + /// + /// Create a Subject Public Key Info object for a given public key. + /// + /// One of ElGammalPublicKeyParameters, DSAPublicKeyParameter, DHPublicKeyParameters, RsaKeyParameters or ECPublicKeyParameters + /// A subject public key info object. + /// Throw exception if object provided is not one of the above. + public static SubjectPublicKeyInfo CreateSubjectPublicKeyInfo( + AsymmetricKeyParameter publicKey) + { + if (publicKey == null) + throw new ArgumentNullException("publicKey"); + if (publicKey.IsPrivate) + throw new ArgumentException("Private key passed - public key expected.", "publicKey"); + + if (publicKey is ElGamalPublicKeyParameters) + { + ElGamalPublicKeyParameters _key = (ElGamalPublicKeyParameters)publicKey; + ElGamalParameters kp = _key.Parameters; + + SubjectPublicKeyInfo info = new SubjectPublicKeyInfo( + new AlgorithmIdentifier( + OiwObjectIdentifiers.ElGamalAlgorithm, + new ElGamalParameter(kp.P, kp.G).ToAsn1Object()), + new DerInteger(_key.Y)); + + return info; + } + + if (publicKey is DsaPublicKeyParameters) + { + DsaPublicKeyParameters _key = (DsaPublicKeyParameters) publicKey; + DsaParameters kp = _key.Parameters; + Asn1Encodable ae = kp == null + ? null + : new DsaParameter(kp.P, kp.Q, kp.G).ToAsn1Object(); + + return new SubjectPublicKeyInfo( + new AlgorithmIdentifier(X9ObjectIdentifiers.IdDsa, ae), + new DerInteger(_key.Y)); + } + + if (publicKey is DHPublicKeyParameters) + { + DHPublicKeyParameters _key = (DHPublicKeyParameters) publicKey; + DHParameters kp = _key.Parameters; + + SubjectPublicKeyInfo info = new SubjectPublicKeyInfo( + new AlgorithmIdentifier( + _key.AlgorithmOid, + new DHParameter(kp.P, kp.G, kp.L).ToAsn1Object()), + new DerInteger(_key.Y)); + + return info; + } // End of DH + + if (publicKey is RsaKeyParameters) + { + RsaKeyParameters _key = (RsaKeyParameters) publicKey; + + SubjectPublicKeyInfo info = new SubjectPublicKeyInfo( + new AlgorithmIdentifier(PkcsObjectIdentifiers.RsaEncryption, DerNull.Instance), + new RsaPublicKeyStructure(_key.Modulus, _key.Exponent).ToAsn1Object()); + + return info; + } // End of RSA. + + if (publicKey is ECPublicKeyParameters) + { + + ECPublicKeyParameters _key = (ECPublicKeyParameters) publicKey; + + + if (_key.Parameters is ECGost3410Parameters) + { + ECGost3410Parameters gostParams = (ECGost3410Parameters)_key.Parameters; + + BigInteger bX = _key.Q.AffineXCoord.ToBigInteger(); + BigInteger bY = _key.Q.AffineYCoord.ToBigInteger(); + bool is512 = (bX.BitLength > 256); + + Gost3410PublicKeyAlgParameters parameters = new Gost3410PublicKeyAlgParameters( + gostParams.PublicKeyParamSet, + gostParams.DigestParamSet, + gostParams.EncryptionParamSet); + + int encKeySize; + int offset; + DerObjectIdentifier algIdentifier; + if (is512) + { + encKeySize = 128; + offset = 64; + algIdentifier = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_512; + } + else + { + encKeySize = 64; + offset = 32; + algIdentifier = RosstandartObjectIdentifiers.id_tc26_gost_3410_12_256; + } + + byte[] encKey = new byte[encKeySize]; + + ExtractBytes(encKey, encKeySize / 2, 0, bX); + ExtractBytes(encKey, encKeySize / 2, offset, bY); + + return new SubjectPublicKeyInfo(new AlgorithmIdentifier(algIdentifier, parameters), new DerOctetString(encKey)); + + + } // End of ECGOST3410_2012 + + + + + + if (_key.AlgorithmName == "ECGOST3410") + { + if (_key.PublicKeyParamSet == null) + throw new NotImplementedException("Not a CryptoPro parameter set"); + + ECPoint q = _key.Q.Normalize(); + BigInteger bX = q.AffineXCoord.ToBigInteger(); + BigInteger bY = q.AffineYCoord.ToBigInteger(); + + byte[] encKey = new byte[64]; + ExtractBytes(encKey, 0, bX); + ExtractBytes(encKey, 32, bY); + + Gost3410PublicKeyAlgParameters gostParams = new Gost3410PublicKeyAlgParameters( + _key.PublicKeyParamSet, CryptoProObjectIdentifiers.GostR3411x94CryptoProParamSet); + + AlgorithmIdentifier algID = new AlgorithmIdentifier( + CryptoProObjectIdentifiers.GostR3410x2001, + gostParams.ToAsn1Object()); + + return new SubjectPublicKeyInfo(algID, new DerOctetString(encKey)); + } + else + { + X962Parameters x962; + if (_key.PublicKeyParamSet == null) + { + ECDomainParameters kp = _key.Parameters; + X9ECParameters ecP = new X9ECParameters(kp.Curve, new X9ECPoint(kp.G, false), kp.N, kp.H, + kp.GetSeed()); + + x962 = new X962Parameters(ecP); + } + else + { + x962 = new X962Parameters(_key.PublicKeyParamSet); + } + + byte[] pubKey = _key.Q.GetEncoded(false); + + AlgorithmIdentifier algID = new AlgorithmIdentifier( + X9ObjectIdentifiers.IdECPublicKey, x962.ToAsn1Object()); + + return new SubjectPublicKeyInfo(algID, pubKey); + } + } // End of EC + + if (publicKey is Gost3410PublicKeyParameters) + { + Gost3410PublicKeyParameters _key = (Gost3410PublicKeyParameters) publicKey; + + if (_key.PublicKeyParamSet == null) + throw new NotImplementedException("Not a CryptoPro parameter set"); + + byte[] keyEnc = _key.Y.ToByteArrayUnsigned(); + byte[] keyBytes = new byte[keyEnc.Length]; + + for (int i = 0; i != keyBytes.Length; i++) + { + keyBytes[i] = keyEnc[keyEnc.Length - 1 - i]; // must be little endian + } + + Gost3410PublicKeyAlgParameters algParams = new Gost3410PublicKeyAlgParameters( + _key.PublicKeyParamSet, CryptoProObjectIdentifiers.GostR3411x94CryptoProParamSet); + + AlgorithmIdentifier algID = new AlgorithmIdentifier( + CryptoProObjectIdentifiers.GostR3410x94, + algParams.ToAsn1Object()); + + return new SubjectPublicKeyInfo(algID, new DerOctetString(keyBytes)); + } + + if (publicKey is X448PublicKeyParameters) + { + X448PublicKeyParameters key = (X448PublicKeyParameters)publicKey; + + return new SubjectPublicKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_X448), key.GetEncoded()); + } + + if (publicKey is X25519PublicKeyParameters) + { + X25519PublicKeyParameters key = (X25519PublicKeyParameters)publicKey; + + return new SubjectPublicKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_X25519), key.GetEncoded()); + } + + if (publicKey is Ed448PublicKeyParameters) + { + Ed448PublicKeyParameters key = (Ed448PublicKeyParameters)publicKey; + + return new SubjectPublicKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_Ed448), key.GetEncoded()); + } + + if (publicKey is Ed25519PublicKeyParameters) + { + Ed25519PublicKeyParameters key = (Ed25519PublicKeyParameters)publicKey; + + return new SubjectPublicKeyInfo(new AlgorithmIdentifier(EdECObjectIdentifiers.id_Ed25519), key.GetEncoded()); + } + + throw new ArgumentException("Class provided no convertible: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(publicKey)); + } + + private static void ExtractBytes( + byte[] encKey, + int offset, + BigInteger bI) + { + byte[] val = bI.ToByteArray(); + int n = (bI.BitLength + 7) / 8; + + for (int i = 0; i < n; ++i) + { + encKey[offset + i] = val[val.Length - 1 - i]; + } + } + + + private static void ExtractBytes(byte[] encKey, int size, int offSet, BigInteger bI) + { + byte[] val = bI.ToByteArray(); + if (val.Length < size) + { + byte[] tmp = new byte[size]; + Array.Copy(val, 0, tmp, tmp.Length - val.Length, val.Length); + val = tmp; + } + + for (int i = 0; i != size; i++) + { + encKey[offSet + i] = val[val.Length - 1 - i]; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs.meta new file mode 100644 index 00000000..c4674e35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 21c220a487be4a544a982e875ed218b8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/SubjectPublicKeyInfoFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs new file mode 100644 index 00000000..ac8bfb0d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs @@ -0,0 +1,175 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + public class X509AttrCertParser + { + private static readonly PemParser PemAttrCertParser = new PemParser("ATTRIBUTE CERTIFICATE"); + + private Asn1Set sData; + private int sDataObjectCount; + private Stream currentStream; + + private X509V2AttributeCertificate ReadDerCertificate( + Asn1InputStream dIn) + { + Asn1Sequence seq = (Asn1Sequence)dIn.ReadObject(); + + if (seq.Count > 1 && seq[0] is DerObjectIdentifier) + { + if (seq[0].Equals(PkcsObjectIdentifiers.SignedData)) + { + sData = SignedData.GetInstance( + Asn1Sequence.GetInstance((Asn1TaggedObject) seq[1], true)).Certificates; + + return GetCertificate(); + } + } + + return new X509V2AttributeCertificate(AttributeCertificate.GetInstance(seq)); + } + + private X509V2AttributeCertificate GetCertificate() + { + if (sData != null) + { + while (sDataObjectCount < sData.Count) + { + Asn1Encodable ae = sData[sDataObjectCount++]; + + if (ae.ToAsn1Object() is Asn1TaggedObject t && t.TagNo == 2) + { + return new X509V2AttributeCertificate( + AttributeCertificate.GetInstance(Asn1Sequence.GetInstance(t, false))); + } + } + } + + return null; + } + + private X509V2AttributeCertificate ReadPemCertificate( + Stream inStream) + { + Asn1Sequence seq = PemAttrCertParser.ReadPemObject(inStream); + + return seq == null + ? null + : new X509V2AttributeCertificate(AttributeCertificate.GetInstance(seq)); + } + + /// + /// Create loading data from byte array. + /// + /// + public X509V2AttributeCertificate ReadAttrCert(byte[] input) + { + return ReadAttrCert(new MemoryStream(input, false)); + } + + /// + /// Create loading data from byte array. + /// + /// + public IList ReadAttrCerts(byte[] input) + { + return ReadAttrCerts(new MemoryStream(input, false)); + } + + /** + * Generates a certificate object and initializes it with the data + * read from the input stream inStream. + */ + public X509V2AttributeCertificate ReadAttrCert( + Stream inStream) + { + if (inStream == null) + throw new ArgumentNullException("inStream"); + if (!inStream.CanRead) + throw new ArgumentException("inStream must be read-able", "inStream"); + + if (currentStream == null) + { + currentStream = inStream; + sData = null; + sDataObjectCount = 0; + } + else if (currentStream != inStream) // reset if input stream has changed + { + currentStream = inStream; + sData = null; + sDataObjectCount = 0; + } + + try + { + if (sData != null) + { + if (sDataObjectCount != sData.Count) + { + return GetCertificate(); + } + + sData = null; + sDataObjectCount = 0; + return null; + } + + int tag = inStream.ReadByte(); + if (tag < 0) + return null; + + if (inStream.CanSeek) + { + inStream.Seek(-1L, SeekOrigin.Current); + } + else + { + PushbackStream pis = new PushbackStream(inStream); + pis.Unread(tag); + inStream = pis; + } + + if (tag != 0x30) // assume ascii PEM encoded. + { + return ReadPemCertificate(inStream); + } + + return ReadDerCertificate(new Asn1InputStream(inStream)); + } + catch (Exception e) + { + throw new CertificateException(e.ToString()); + } + } + + /** + * Returns a (possibly empty) collection view of the certificates + * read from the given input stream inStream. + */ + public IList ReadAttrCerts(Stream inStream) + { + var attrCerts = new List(); + + X509V2AttributeCertificate attrCert; + while ((attrCert = ReadAttrCert(inStream)) != null) + { + attrCerts.Add(attrCert); + } + + return attrCerts; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs.meta new file mode 100644 index 00000000..23ea1c92 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09d5969e9932cc44a9b193b0e8a7d21b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509AttrCertParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs new file mode 100644 index 00000000..15688103 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs @@ -0,0 +1,80 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * Class for carrying the values in an X.509 Attribute. + */ + public class X509Attribute + : Asn1Encodable + { + private readonly AttributeX509 attr; + + /** + * @param at an object representing an attribute. + */ + internal X509Attribute( + Asn1Encodable at) + { + this.attr = AttributeX509.GetInstance(at); + } + + /** + * Create an X.509 Attribute with the type given by the passed in oid and + * the value represented by an ASN.1 Set containing value. + * + * @param oid type of the attribute + * @param value value object to go into the atribute's value set. + */ + public X509Attribute( + string oid, + Asn1Encodable value) + { + this.attr = new AttributeX509(new DerObjectIdentifier(oid), new DerSet(value)); + } + + /** + * Create an X.59 Attribute with the type given by the passed in oid and the + * value represented by an ASN.1 Set containing the objects in value. + * + * @param oid type of the attribute + * @param value vector of values to go in the attribute's value set. + */ + public X509Attribute( + string oid, + Asn1EncodableVector value) + { + this.attr = new AttributeX509(new DerObjectIdentifier(oid), new DerSet(value)); + } + + public string Oid + { + get { return attr.AttrType.Id; } + } + + public Asn1Encodable[] GetValues() + { + Asn1Set s = attr.AttrValues; + Asn1Encodable[] values = new Asn1Encodable[s.Count]; + + for (int i = 0; i != s.Count; i++) + { + values[i] = (Asn1Encodable)s[i]; + } + + return values; + } + + public override Asn1Object ToAsn1Object() + { + return attr.ToAsn1Object(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs.meta new file mode 100644 index 00000000..98fab348 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 503766c8583a865498ac1e45f2862b76 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Attribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs new file mode 100644 index 00000000..4dd18880 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs @@ -0,0 +1,101 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + public class X509CertPairParser + { + private Stream currentStream; + + private X509CertificatePair ReadDerCrossCertificatePair( + Stream inStream) + { + Asn1InputStream dIn = new Asn1InputStream(inStream);//, ProviderUtil.getReadLimit(in)); + Asn1Sequence seq = (Asn1Sequence)dIn.ReadObject(); + CertificatePair pair = CertificatePair.GetInstance(seq); + return new X509CertificatePair(pair); + } + + /// + /// Create loading data from byte array. + /// + /// + public X509CertificatePair ReadCertPair(byte[] input) + { + return ReadCertPair(new MemoryStream(input, false)); + } + + /// + /// Create loading data from byte array. + /// + /// + public IList ReadCertPairs(byte[] input) + { + return ReadCertPairs(new MemoryStream(input, false)); + } + + public X509CertificatePair ReadCertPair(Stream inStream) + { + if (inStream == null) + throw new ArgumentNullException("inStream"); + if (!inStream.CanRead) + throw new ArgumentException("inStream must be read-able", "inStream"); + + if (currentStream == null) + { + currentStream = inStream; + } + else if (currentStream != inStream) // reset if input stream has changed + { + currentStream = inStream; + } + + try + { + int tag = inStream.ReadByte(); + if (tag < 0) + return null; + + if (inStream.CanSeek) + { + inStream.Seek(-1L, SeekOrigin.Current); + } + else + { + PushbackStream pis = new PushbackStream(inStream); + pis.Unread(tag); + inStream = pis; + } + + return ReadDerCrossCertificatePair(inStream); + } + catch (Exception e) + { + throw new CertificateException(e.ToString()); + } + } + + public IList ReadCertPairs(Stream inStream) + { + var certPairs = new List(); + + X509CertificatePair certPair; + while ((certPair = ReadCertPair(inStream)) != null) + { + certPairs.Add(certPair); + } + + return certPairs; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs.meta new file mode 100644 index 00000000..ab53190e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9717099e0c34ea7428dfab19014b822e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertPairParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs new file mode 100644 index 00000000..4bc8d8c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs @@ -0,0 +1,748 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Net; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Misc; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// An Object representing an X509 Certificate. + /// Has static methods for loading Certificates encoded in many forms that return X509Certificate Objects. + /// + public class X509Certificate + : X509ExtensionBase + // , PKCS12BagAttributeCarrier + { + private class CachedEncoding + { + private readonly byte[] encoding; + private readonly CertificateEncodingException exception; + + internal CachedEncoding(byte[] encoding, CertificateEncodingException exception) + { + this.encoding = encoding; + this.exception = exception; + } + + internal byte[] Encoding + { + get { return encoding; } + } + + internal byte[] GetEncoded() + { + if (null != exception) + throw exception; + + if (null == encoding) + throw new CertificateEncodingException(); + + return encoding; + } + } + + private readonly X509CertificateStructure c; + //private Dictionary<> pkcs12Attributes = new Dictionary<>(); + //private List<> pkcs12Ordering = new List<>(); + private readonly string sigAlgName; + private readonly byte[] sigAlgParams; + private readonly BasicConstraints basicConstraints; + private readonly bool[] keyUsage; + + private readonly object cacheLock = new object(); + private AsymmetricKeyParameter publicKeyValue; + private CachedEncoding cachedEncoding; + + private volatile bool hashValueSet; + private volatile int hashValue; + + protected X509Certificate() + { + } + + public X509Certificate(byte[] certData) + : this(X509CertificateStructure.GetInstance(certData)) + { + } + + public X509Certificate(X509CertificateStructure c) + { + this.c = c; + + try + { + this.sigAlgName = X509SignatureUtilities.GetSignatureName(c.SignatureAlgorithm); + + Asn1Encodable parameters = c.SignatureAlgorithm.Parameters; + this.sigAlgParams = (null == parameters) ? null : parameters.GetEncoded(Asn1Encodable.Der); + } + catch (Exception e) + { + throw new CertificateParsingException("Certificate contents invalid: " + e); + } + + try + { + Asn1OctetString str = GetExtensionValue(X509Extensions.BasicConstraints); + if (str != null) + { + basicConstraints = BasicConstraints.GetInstance(X509ExtensionUtilities.FromExtensionValue(str)); + } + } + catch (Exception e) + { + throw new CertificateParsingException("cannot construct BasicConstraints: " + e); + } + + try + { + Asn1OctetString str = GetExtensionValue(X509Extensions.KeyUsage); + if (str != null) + { + DerBitString bits = DerBitString.GetInstance(X509ExtensionUtilities.FromExtensionValue(str)); + + byte[] bytes = bits.GetBytes(); + int length = (bytes.Length * 8) - bits.PadBits; + + keyUsage = new bool[(length < 9) ? 9 : length]; + + for (int i = 0; i != length; i++) + { + keyUsage[i] = (bytes[i / 8] & (0x80 >> (i % 8))) != 0; + } + } + else + { + keyUsage = null; + } + } + catch (Exception e) + { + throw new CertificateParsingException("cannot construct KeyUsage: " + e); + } + } + + // internal X509Certificate( + // Asn1Sequence seq) + // { + // this.c = X509CertificateStructure.GetInstance(seq); + // } + + // /// + // /// Load certificate from byte array. + // /// + // /// Byte array containing encoded X509Certificate. + // public X509Certificate( + // byte[] encoded) + // : this((Asn1Sequence) new Asn1InputStream(encoded).ReadObject()) + // { + // } + // + // /// + // /// Load certificate from Stream. + // /// Must be positioned at start of certificate. + // /// + // /// + // public X509Certificate( + // Stream input) + // : this((Asn1Sequence) new Asn1InputStream(input).ReadObject()) + // { + // } + + public virtual X509CertificateStructure CertificateStructure + { + get { return c; } + } + + /// + /// Return true if the current time is within the start and end times nominated on the certificate. + /// + /// true id certificate is valid for the current time. + public virtual bool IsValidNow + { + get { return IsValid(DateTime.UtcNow); } + } + + /// + /// Return true if the nominated time is within the start and end times nominated on the certificate. + /// + /// The time to test validity against. + /// True if certificate is valid for nominated time. + public virtual bool IsValid( + DateTime time) + { + return time.CompareTo(NotBefore) >= 0 && time.CompareTo(NotAfter) <= 0; + } + + /// + /// Checks if the current date is within certificate's validity period. + /// + public virtual void CheckValidity() + { + this.CheckValidity(DateTime.UtcNow); + } + + /// + /// Checks if the given date is within certificate's validity period. + /// + /// if the certificate is expired by given date + /// if the certificate is not yet valid on given date + public virtual void CheckValidity( + DateTime time) + { + if (time.CompareTo(NotAfter) > 0) + throw new CertificateExpiredException("certificate expired on " + c.EndDate); + if (time.CompareTo(NotBefore) < 0) + throw new CertificateNotYetValidException("certificate not valid until " + c.StartDate); + } + + /// + /// Return the certificate's version. + /// + /// An integer whose value Equals the version of the cerficate. + public virtual int Version + { + get { return c.Version; } + } + + /// + /// Return a BigInteger containing the serial number. + /// + /// The Serial number. + public virtual BigInteger SerialNumber + { + get { return c.SerialNumber.Value; } + } + + /// + /// Get the Issuer Distinguished Name. (Who signed the certificate.) + /// + /// And X509Object containing name and value pairs. + // public IPrincipal IssuerDN + public virtual X509Name IssuerDN + { + get { return c.Issuer; } + } + + /// + /// Get the subject of this certificate. + /// + /// An X509Name object containing name and value pairs. + // public IPrincipal SubjectDN + public virtual X509Name SubjectDN + { + get { return c.Subject; } + } + + /// + /// The time that this certificate is valid from. + /// + /// A DateTime object representing that time in the local time zone. + public virtual DateTime NotBefore + { + get { return c.StartDate.ToDateTime(); } + } + + /// + /// The time that this certificate is valid up to. + /// + /// A DateTime object representing that time in the local time zone. + public virtual DateTime NotAfter + { + get { return c.EndDate.ToDateTime(); } + } + + /// + /// Return the Der encoded TbsCertificate data. + /// This is the certificate component less the signature. + /// To Get the whole certificate call the GetEncoded() member. + /// + /// A byte array containing the Der encoded Certificate component. + public virtual byte[] GetTbsCertificate() + { + return c.TbsCertificate.GetDerEncoded(); + } + + /// + /// The signature. + /// + /// A byte array containg the signature of the certificate. + public virtual byte[] GetSignature() + { + return c.GetSignatureOctets(); + } + + /// + /// A meaningful version of the Signature Algorithm. (EG SHA1WITHRSA) + /// + /// A sting representing the signature algorithm. + public virtual string SigAlgName + { + get { return sigAlgName; } + } + + /// + /// Get the Signature Algorithms Object ID. + /// + /// A string containg a '.' separated object id. + public virtual string SigAlgOid + { + get { return c.SignatureAlgorithm.Algorithm.Id; } + } + + /// + /// Get the signature algorithms parameters. (EG DSA Parameters) + /// + /// A byte array containing the Der encoded version of the parameters or null if there are none. + public virtual byte[] GetSigAlgParams() + { + return Arrays.Clone(sigAlgParams); + } + + /// + /// Get the issuers UID. + /// + /// A DerBitString. + public virtual DerBitString IssuerUniqueID + { + get { return c.TbsCertificate.IssuerUniqueID; } + } + + /// + /// Get the subjects UID. + /// + /// A DerBitString. + public virtual DerBitString SubjectUniqueID + { + get { return c.TbsCertificate.SubjectUniqueID; } + } + + /// + /// Get a key usage guidlines. + /// + public virtual bool[] GetKeyUsage() + { + return Arrays.Clone(keyUsage); + } + + // TODO Replace with something that returns a list of DerObjectIdentifier + public virtual IList GetExtendedKeyUsage() + { + Asn1OctetString str = GetExtensionValue(X509Extensions.ExtendedKeyUsage); + + if (str == null) + return null; + + try + { + Asn1Sequence seq = Asn1Sequence.GetInstance(X509ExtensionUtilities.FromExtensionValue(str)); + + var result = new List(); + foreach (DerObjectIdentifier oid in seq) + { + result.Add(oid); + } + return result; + } + catch (Exception e) + { + throw new CertificateParsingException("error processing extended key usage extension", e); + } + } + + public virtual int GetBasicConstraints() + { + if (basicConstraints != null && basicConstraints.IsCA()) + { + if (basicConstraints.PathLenConstraint == null) + { + return int.MaxValue; + } + + return basicConstraints.PathLenConstraint.IntValue; + } + + return -1; + } + + public virtual GeneralNames GetIssuerAlternativeNameExtension() + { + return GetAlternativeNameExtension(X509Extensions.IssuerAlternativeName); + } + + public virtual GeneralNames GetSubjectAlternativeNameExtension() + { + return GetAlternativeNameExtension(X509Extensions.SubjectAlternativeName); + } + + public virtual IList> GetIssuerAlternativeNames() + { + return GetAlternativeNames(X509Extensions.IssuerAlternativeName); + } + + public virtual IList> GetSubjectAlternativeNames() + { + return GetAlternativeNames(X509Extensions.SubjectAlternativeName); + } + + protected virtual GeneralNames GetAlternativeNameExtension(DerObjectIdentifier oid) + { + Asn1OctetString altNames = GetExtensionValue(oid); + if (altNames == null) + return null; + + Asn1Object asn1Object = X509ExtensionUtilities.FromExtensionValue(altNames); + + return GeneralNames.GetInstance(asn1Object); + } + + protected virtual IList> GetAlternativeNames(DerObjectIdentifier oid) + { + var generalNames = GetAlternativeNameExtension(oid); + if (generalNames == null) + return null; + + var gns = generalNames.GetNames(); + + var result = new List>(gns.Length); + foreach (GeneralName gn in gns) + { + var entry = new List(2); + entry.Add(gn.TagNo); + + switch (gn.TagNo) + { + case GeneralName.EdiPartyName: + case GeneralName.X400Address: + case GeneralName.OtherName: + entry.Add(gn.GetEncoded()); + break; + case GeneralName.DirectoryName: + // TODO Styles + //entry.Add(X509Name.GetInstance(Rfc4519Style.Instance, gn.Name).ToString()); + entry.Add(X509Name.GetInstance(gn.Name).ToString()); + break; + case GeneralName.DnsName: + case GeneralName.Rfc822Name: + case GeneralName.UniformResourceIdentifier: + entry.Add(((IAsn1String)gn.Name).GetString()); + break; + case GeneralName.RegisteredID: + entry.Add(DerObjectIdentifier.GetInstance(gn.Name).Id); + break; + case GeneralName.IPAddress: + byte[] addrBytes = Asn1OctetString.GetInstance(gn.Name).GetOctets(); + IPAddress ipAddress = new IPAddress(addrBytes); + entry.Add(ipAddress.ToString()); + break; + default: + throw new IOException("Bad tag number: " + gn.TagNo); + } + + result.Add(entry); + } + return result; + } + + protected override X509Extensions GetX509Extensions() + { + return c.Version >= 3 + ? c.TbsCertificate.Extensions + : null; + } + + /// + /// Get the public key of the subject of the certificate. + /// + /// The public key parameters. + public virtual AsymmetricKeyParameter GetPublicKey() + { + // Cache the public key to support repeated-use optimizations + lock (cacheLock) + { + if (null != publicKeyValue) + return publicKeyValue; + } + + AsymmetricKeyParameter temp = PublicKeyFactory.CreateKey(c.SubjectPublicKeyInfo); + + lock (cacheLock) + { + if (null == publicKeyValue) + { + publicKeyValue = temp; + } + + return publicKeyValue; + } + } + + /// + /// Return the DER encoding of this certificate. + /// + /// A byte array containing the DER encoding of this certificate. + /// If there is an error encoding the certificate. + public virtual byte[] GetEncoded() + { + return Arrays.Clone(GetCachedEncoding().GetEncoded()); + } + + public override bool Equals(object other) + { + if (this == other) + return true; + + X509Certificate that = other as X509Certificate; + if (null == that) + return false; + + if (this.hashValueSet && that.hashValueSet) + { + if (this.hashValue != that.hashValue) + return false; + } + else if (null == this.cachedEncoding || null == that.cachedEncoding) + { + DerBitString signature = c.Signature; + if (null != signature && !signature.Equals(that.c.Signature)) + return false; + } + + byte[] thisEncoding = this.GetCachedEncoding().Encoding; + byte[] thatEncoding = that.GetCachedEncoding().Encoding; + + return null != thisEncoding + && null != thatEncoding + && Arrays.AreEqual(thisEncoding, thatEncoding); + } + + public override int GetHashCode() + { + if (!hashValueSet) + { + byte[] thisEncoding = this.GetCachedEncoding().Encoding; + + hashValue = Arrays.GetHashCode(thisEncoding); + hashValueSet = true; + } + + return hashValue; + } + + // public void setBagAttribute( + // DERObjectIdentifier oid, + // DEREncodable attribute) + // { + // pkcs12Attributes.put(oid, attribute); + // pkcs12Ordering.addElement(oid); + // } + // + // public DEREncodable getBagAttribute( + // DERObjectIdentifier oid) + // { + // return (DEREncodable)pkcs12Attributes.get(oid); + // } + // + // public Enumeration getBagAttributeKeys() + // { + // return pkcs12Ordering.elements(); + // } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + + buf.Append(" [0] Version: ").Append(this.Version).AppendLine(); + buf.Append(" SerialNumber: ").Append(this.SerialNumber).AppendLine(); + buf.Append(" IssuerDN: ").Append(this.IssuerDN).AppendLine(); + buf.Append(" Start Date: ").Append(this.NotBefore).AppendLine(); + buf.Append(" Final Date: ").Append(this.NotAfter).AppendLine(); + buf.Append(" SubjectDN: ").Append(this.SubjectDN).AppendLine(); + buf.Append(" Public Key: ").Append(this.GetPublicKey()).AppendLine(); + buf.Append(" Signature Algorithm: ").Append(this.SigAlgName).AppendLine(); + + byte[] sig = this.GetSignature(); + buf.Append(" Signature: ").Append(Hex.ToHexString(sig, 0, 20)).AppendLine(); + + for (int i = 20; i < sig.Length; i += 20) + { + int len = System.Math.Min(20, sig.Length - i); + buf.Append(" ").Append(Hex.ToHexString(sig, i, len)).AppendLine(); + } + + X509Extensions extensions = c.TbsCertificate.Extensions; + + if (extensions != null) + { + var e = extensions.ExtensionOids.GetEnumerator(); + + if (e.MoveNext()) + { + buf.Append(" Extensions: \n"); + } + + do + { + DerObjectIdentifier oid = e.Current; + X509Extension ext = extensions.GetExtension(oid); + + if (ext.Value != null) + { + Asn1Object obj = X509ExtensionUtilities.FromExtensionValue(ext.Value); + + buf.Append(" critical(").Append(ext.IsCritical).Append(") "); + try + { + if (oid.Equals(X509Extensions.BasicConstraints)) + { + buf.Append(BasicConstraints.GetInstance(obj)); + } + else if (oid.Equals(X509Extensions.KeyUsage)) + { + buf.Append(KeyUsage.GetInstance(obj)); + } + else if (oid.Equals(MiscObjectIdentifiers.NetscapeCertType)) + { + buf.Append(new NetscapeCertType((DerBitString)obj)); + } + else if (oid.Equals(MiscObjectIdentifiers.NetscapeRevocationUrl)) + { + buf.Append(new NetscapeRevocationUrl((DerIA5String)obj)); + } + else if (oid.Equals(MiscObjectIdentifiers.VerisignCzagExtension)) + { + buf.Append(new VerisignCzagExtension((DerIA5String)obj)); + } + else + { + buf.Append(oid.Id); + buf.Append(" value = ").Append(Asn1Dump.DumpAsString(obj)); + //buf.Append(" value = ").Append("*****").AppendLine(); + } + } + catch (Exception) + { + buf.Append(oid.Id); + //buf.Append(" value = ").Append(new string(Hex.encode(ext.getValue().getOctets()))).AppendLine(); + buf.Append(" value = ").Append("*****"); + } + } + + buf.AppendLine(); + } + while (e.MoveNext()); + } + + return buf.ToString(); + } + + /// + /// Verify the certificate's signature using the nominated public key. + /// + /// An appropriate public key parameter object, RsaPublicKeyParameters, DsaPublicKeyParameters or ECDsaPublicKeyParameters + /// True if the signature is valid. + /// If key submitted is not of the above nominated types. + public virtual void Verify( + AsymmetricKeyParameter key) + { + CheckSignature(new Asn1VerifierFactory(c.SignatureAlgorithm, key)); + } + + /// + /// Verify the certificate's signature using a verifier created using the passed in verifier provider. + /// + /// An appropriate provider for verifying the certificate's signature. + /// True if the signature is valid. + /// If verifier provider is not appropriate or the certificate algorithm is invalid. + public virtual void Verify( + IVerifierFactoryProvider verifierProvider) + { + CheckSignature(verifierProvider.CreateVerifierFactory(c.SignatureAlgorithm)); + } + + protected virtual void CheckSignature( + IVerifierFactory verifier) + { + if (!IsAlgIDEqual(c.SignatureAlgorithm, c.TbsCertificate.Signature)) + throw new CertificateException("signature algorithm in TBS cert not same as outer cert"); + + byte[] b = GetTbsCertificate(); + + IStreamCalculator streamCalculator = verifier.CreateCalculator(); + using (var stream = streamCalculator.Stream) + { + stream.Write(b, 0, b.Length); + } + + if (!streamCalculator.GetResult().IsVerified(this.GetSignature())) + throw new InvalidKeyException("Public key presented not for certificate signature"); + } + + private CachedEncoding GetCachedEncoding() + { + lock (cacheLock) + { + if (null != cachedEncoding) + return cachedEncoding; + } + + byte[] encoding = null; + CertificateEncodingException exception = null; + try + { + encoding = c.GetEncoded(Asn1Encodable.Der); + } + catch (IOException e) + { + exception = new CertificateEncodingException("Failed to DER-encode certificate", e); + } + + CachedEncoding temp = new CachedEncoding(encoding, exception); + + lock (cacheLock) + { + if (null == cachedEncoding) + { + cachedEncoding = temp; + } + + return cachedEncoding; + } + } + + private static bool IsAlgIDEqual(AlgorithmIdentifier id1, AlgorithmIdentifier id2) + { + if (!id1.Algorithm.Equals(id2.Algorithm)) + return false; + + Asn1Encodable p1 = id1.Parameters; + Asn1Encodable p2 = id2.Parameters; + + if ((p1 == null) == (p2 == null)) + return Org.BouncyCastle.Utilities.Platform.Equals(p1, p2); + + // Exactly one of p1, p2 is null at this point + return p1 == null + ? p2.ToAsn1Object() is Asn1Null + : p1.ToAsn1Object() is Asn1Null; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs.meta new file mode 100644 index 00000000..d1deb00f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa0b89e98fc55f148992b4c9e3a86439 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Certificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs new file mode 100644 index 00000000..dc9300c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs @@ -0,0 +1,127 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// This class contains a cross certificate pair. Cross certificates pairs may + /// contain two cross signed certificates from two CAs. A certificate from the + /// other CA to this CA is contained in the forward certificate, the certificate + /// from this CA to the other CA is contained in the reverse certificate. + /// + public class X509CertificatePair + { + private readonly X509Certificate forward; + private readonly X509Certificate reverse; + + /// Constructor + /// Certificate from the other CA to this CA. + /// Certificate from this CA to the other CA. + public X509CertificatePair( + X509Certificate forward, + X509Certificate reverse) + { + this.forward = forward; + this.reverse = reverse; + } + + /// Constructor from a ASN.1 CertificatePair structure. + /// The CertificatePair ASN.1 object. + public X509CertificatePair( + CertificatePair pair) + { + if (pair.Forward != null) + { + this.forward = new X509Certificate(pair.Forward); + } + if (pair.Reverse != null) + { + this.reverse = new X509Certificate(pair.Reverse); + } + } + + public byte[] GetEncoded() + { + try + { + X509CertificateStructure f = null, r = null; + + if (forward != null) + { + f = X509CertificateStructure.GetInstance( + Asn1Object.FromByteArray(forward.GetEncoded())); + + if (f == null) + throw new CertificateEncodingException("unable to get encoding for forward"); + } + + if (reverse != null) + { + r = X509CertificateStructure.GetInstance( + Asn1Object.FromByteArray(reverse.GetEncoded())); + + if (r == null) + throw new CertificateEncodingException("unable to get encoding for reverse"); + } + + return new CertificatePair(f, r).GetDerEncoded(); + } + catch (Exception e) + { + // TODO +// throw new ExtCertificateEncodingException(e.toString(), e); + throw new CertificateEncodingException(e.Message, e); + } + } + + /// Returns the certificate from the other CA to this CA. + public X509Certificate Forward + { + get { return forward; } + } + + /// Returns the certificate from this CA to the other CA. + public X509Certificate Reverse + { + get { return reverse; } + } + + public override bool Equals( + object obj) + { + if (obj == this) + return true; + + X509CertificatePair other = obj as X509CertificatePair; + + if (other == null) + return false; + + return Org.BouncyCastle.Utilities.Platform.Equals(this.forward, other.forward) + && Org.BouncyCastle.Utilities.Platform.Equals(this.reverse, other.reverse); + } + + public override int GetHashCode() + { + int hash = -1; + if (forward != null) + { + hash ^= forward.GetHashCode(); + } + if (reverse != null) + { + hash *= 17; + hash ^= reverse.GetHashCode(); + } + return hash; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs.meta new file mode 100644 index 00000000..0210d9b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b5702066ee45b8c4b9bb62fcca33ffcd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificatePair.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs new file mode 100644 index 00000000..21ef60e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs @@ -0,0 +1,171 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * class for dealing with X509 certificates. + *

    + * At the moment this will deal with "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----" + * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7 + * objects.

    + */ + public class X509CertificateParser + { + private static readonly PemParser PemCertParser = new PemParser("CERTIFICATE"); + + private Asn1Set sData; + private int sDataObjectCount; + private Stream currentStream; + + private X509Certificate ReadDerCertificate(Asn1InputStream dIn) + { + Asn1Sequence seq = (Asn1Sequence)dIn.ReadObject(); + + if (seq.Count > 1 && seq[0] is DerObjectIdentifier) + { + if (seq[0].Equals(PkcsObjectIdentifiers.SignedData)) + { + sData = SignedData.GetInstance( + Asn1Sequence.GetInstance((Asn1TaggedObject) seq[1], true)).Certificates; + + return GetCertificate(); + } + } + + return new X509Certificate(X509CertificateStructure.GetInstance(seq)); + } + + private X509Certificate ReadPemCertificate(Stream inStream) + { + Asn1Sequence seq = PemCertParser.ReadPemObject(inStream); + + return seq == null ? null : new X509Certificate(X509CertificateStructure.GetInstance(seq)); + } + + private X509Certificate GetCertificate() + { + if (sData != null) + { + while (sDataObjectCount < sData.Count) + { + object obj = sData[sDataObjectCount++]; + + if (obj is Asn1Sequence) + return new X509Certificate(X509CertificateStructure.GetInstance(obj)); + } + } + + return null; + } + + /// + /// Create loading data from byte array. + /// + /// + public X509Certificate ReadCertificate(byte[] input) + { + return ReadCertificate(new MemoryStream(input, false)); + } + + /// + /// Create loading data from byte array. + /// + /// + public IList ReadCertificates(byte[] input) + { + return ReadCertificates(new MemoryStream(input, false)); + } + + /** + * Generates a certificate object and initializes it with the data + * read from the input stream inStream. + */ + public X509Certificate ReadCertificate(Stream inStream) + { + if (inStream == null) + throw new ArgumentNullException("inStream"); + if (!inStream.CanRead) + throw new ArgumentException("inStream must be read-able", "inStream"); + + if (currentStream == null) + { + currentStream = inStream; + sData = null; + sDataObjectCount = 0; + } + else if (currentStream != inStream) // reset if input stream has changed + { + currentStream = inStream; + sData = null; + sDataObjectCount = 0; + } + + try + { + if (sData != null) + { + if (sDataObjectCount != sData.Count) + return GetCertificate(); + + sData = null; + sDataObjectCount = 0; + return null; + } + + int tag = inStream.ReadByte(); + if (tag < 0) + return null; + + if (inStream.CanSeek) + { + inStream.Seek(-1L, SeekOrigin.Current); + } + else + { + PushbackStream pis = new PushbackStream(inStream); + pis.Unread(tag); + inStream = pis; + } + + if (tag != 0x30) // assume ascii PEM encoded. + return ReadPemCertificate(inStream); + + return ReadDerCertificate(new Asn1InputStream(inStream)); + } + catch (Exception e) + { + throw new CertificateException("Failed to read certificate", e); + } + } + + /** + * Returns a (possibly empty) collection view of the certificates + * read from the given input stream inStream. + */ + public IList ReadCertificates(Stream inStream) + { + return new List(ParseCertificates(inStream)); + } + + public IEnumerable ParseCertificates(Stream inStream) + { + X509Certificate cert; + while ((cert = ReadCertificate(inStream)) != null) + { + yield return cert; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs.meta new file mode 100644 index 00000000..d403fc02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7d5216ff5f040b4ebd432320894ae89 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CertificateParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs new file mode 100644 index 00000000..c6bccaef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs @@ -0,0 +1,497 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * The following extensions are listed in RFC 2459 as relevant to CRLs + * + * Authority Key Identifier + * Issuer Alternative Name + * CRL Number + * Delta CRL Indicator (critical) + * Issuing Distribution Point (critical) + */ + public class X509Crl + : X509ExtensionBase + // TODO Add interface Crl? + { + private class CachedEncoding + { + private readonly byte[] encoding; + private readonly CrlException exception; + + internal CachedEncoding(byte[] encoding, CrlException exception) + { + this.encoding = encoding; + this.exception = exception; + } + + internal byte[] Encoding + { + get { return encoding; } + } + + internal byte[] GetEncoded() + { + if (null != exception) + throw exception; + + if (null == encoding) + throw new CrlException(); + + return encoding; + } + } + + private readonly CertificateList c; + private readonly string sigAlgName; + private readonly byte[] sigAlgParams; + private readonly bool isIndirect; + + private readonly object cacheLock = new object(); + private CachedEncoding cachedEncoding; + + private volatile bool hashValueSet; + private volatile int hashValue; + + public X509Crl(byte[] encoding) + : this(CertificateList.GetInstance(encoding)) + { + } + + public X509Crl(CertificateList c) + { + this.c = c; + + try + { + this.sigAlgName = X509SignatureUtilities.GetSignatureName(c.SignatureAlgorithm); + + Asn1Encodable parameters = c.SignatureAlgorithm.Parameters; + this.sigAlgParams = (null == parameters) ? null : parameters.GetEncoded(Asn1Encodable.Der); + + this.isIndirect = IsIndirectCrl; + } + catch (Exception e) + { + throw new CrlException("CRL contents invalid: " + e); + } + } + + public virtual CertificateList CertificateList + { + get { return c; } + } + + protected override X509Extensions GetX509Extensions() + { + return c.Version >= 2 + ? c.TbsCertList.Extensions + : null; + } + + public virtual void Verify( + AsymmetricKeyParameter publicKey) + { + Verify(new Asn1VerifierFactoryProvider(publicKey)); + } + + /// + /// Verify the CRL's signature using a verifier created using the passed in verifier provider. + /// + /// An appropriate provider for verifying the CRL's signature. + /// True if the signature is valid. + /// If verifier provider is not appropriate or the CRL algorithm is invalid. + public virtual void Verify( + IVerifierFactoryProvider verifierProvider) + { + CheckSignature(verifierProvider.CreateVerifierFactory(c.SignatureAlgorithm)); + } + + protected virtual void CheckSignature( + IVerifierFactory verifier) + { + // TODO Compare IsAlgIDEqual in X509Certificate.CheckSignature + if (!c.SignatureAlgorithm.Equals(c.TbsCertList.Signature)) + throw new CrlException("Signature algorithm on CertificateList does not match TbsCertList."); + + byte[] b = GetTbsCertList(); + + IStreamCalculator streamCalculator = verifier.CreateCalculator(); + using (var stream = streamCalculator.Stream) + { + stream.Write(b, 0, b.Length); + } + + if (!streamCalculator.GetResult().IsVerified(GetSignature())) + throw new InvalidKeyException("CRL does not verify with supplied public key."); + } + + public virtual int Version + { + get { return c.Version; } + } + + public virtual X509Name IssuerDN + { + get { return c.Issuer; } + } + + public virtual DateTime ThisUpdate + { + get { return c.ThisUpdate.ToDateTime(); } + } + + public virtual DateTime? NextUpdate => c.NextUpdate?.ToDateTime(); + + private ISet LoadCrlEntries() + { + var entrySet = new HashSet(); + var revoked = c.GetRevokedCertificateEnumeration(); + + X509Name previousCertificateIssuer = IssuerDN; + foreach (CrlEntry entry in revoked) + { + X509CrlEntry crlEntry = new X509CrlEntry(entry, isIndirect, previousCertificateIssuer); + entrySet.Add(crlEntry); + previousCertificateIssuer = crlEntry.GetCertificateIssuer(); + } + + return entrySet; + } + + public virtual X509CrlEntry GetRevokedCertificate( + BigInteger serialNumber) + { + var certs = c.GetRevokedCertificateEnumeration(); + + X509Name previousCertificateIssuer = IssuerDN; + foreach (CrlEntry entry in certs) + { + X509CrlEntry crlEntry = new X509CrlEntry(entry, isIndirect, previousCertificateIssuer); + + if (serialNumber.Equals(entry.UserCertificate.Value)) + { + return crlEntry; + } + + previousCertificateIssuer = crlEntry.GetCertificateIssuer(); + } + + return null; + } + + public virtual ISet GetRevokedCertificates() + { + var entrySet = LoadCrlEntries(); + + if (entrySet.Count > 0) + return entrySet; + + return null; + } + + public virtual byte[] GetTbsCertList() + { + try + { + return c.TbsCertList.GetDerEncoded(); + } + catch (Exception e) + { + throw new CrlException(e.ToString()); + } + } + + public virtual byte[] GetSignature() + { + return c.GetSignatureOctets(); + } + + public virtual string SigAlgName + { + get { return sigAlgName; } + } + + public virtual string SigAlgOid + { + get { return c.SignatureAlgorithm.Algorithm.Id; } + } + + public virtual byte[] GetSigAlgParams() + { + return Arrays.Clone(sigAlgParams); + } + + /// + /// Return the DER encoding of this CRL. + /// + /// A byte array containing the DER encoding of this CRL. + /// If there is an error encoding the CRL. + public virtual byte[] GetEncoded() + { + return Arrays.Clone(GetCachedEncoding().GetEncoded()); + } + + public override bool Equals(object other) + { + if (this == other) + return true; + + X509Crl that = other as X509Crl; + if (null == that) + return false; + + if (this.hashValueSet && that.hashValueSet) + { + if (this.hashValue != that.hashValue) + return false; + } + else if (null == this.cachedEncoding || null == that.cachedEncoding) + { + DerBitString signature = c.Signature; + if (null != signature && !signature.Equals(that.c.Signature)) + return false; + } + + byte[] thisEncoding = this.GetCachedEncoding().Encoding; + byte[] thatEncoding = that.GetCachedEncoding().Encoding; + + return null != thisEncoding + && null != thatEncoding + && Arrays.AreEqual(thisEncoding, thatEncoding); + } + + public override int GetHashCode() + { + if (!hashValueSet) + { + byte[] thisEncoding = this.GetCachedEncoding().Encoding; + + hashValue = Arrays.GetHashCode(thisEncoding); + hashValueSet = true; + } + + return hashValue; + } + + /** + * Returns a string representation of this CRL. + * + * @return a string representation of this CRL. + */ + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + + buf.Append(" Version: ").Append(this.Version).AppendLine(); + buf.Append(" IssuerDN: ").Append(this.IssuerDN).AppendLine(); + buf.Append(" This update: ").Append(this.ThisUpdate).AppendLine(); + buf.Append(" Next update: ").Append(this.NextUpdate).AppendLine(); + buf.Append(" Signature Algorithm: ").Append(this.SigAlgName).AppendLine(); + + byte[] sig = this.GetSignature(); + + buf.Append(" Signature: "); + buf.Append(Hex.ToHexString(sig, 0, 20)).AppendLine(); + + for (int i = 20; i < sig.Length; i += 20) + { + int count = System.Math.Min(20, sig.Length - i); + buf.Append(" "); + buf.Append(Hex.ToHexString(sig, i, count)).AppendLine(); + } + + X509Extensions extensions = c.TbsCertList.Extensions; + + if (extensions != null) + { + var e = extensions.ExtensionOids.GetEnumerator(); + + if (e.MoveNext()) + { + buf.Append(" Extensions: ").AppendLine(); + } + + do + { + DerObjectIdentifier oid = e.Current; + X509Extension ext = extensions.GetExtension(oid); + + if (ext.Value != null) + { + Asn1Object asn1Value = X509ExtensionUtilities.FromExtensionValue(ext.Value); + + buf.Append(" critical(").Append(ext.IsCritical).Append(") "); + try + { + if (oid.Equals(X509Extensions.CrlNumber)) + { + buf.Append(new CrlNumber(DerInteger.GetInstance(asn1Value).PositiveValue)).AppendLine(); + } + else if (oid.Equals(X509Extensions.DeltaCrlIndicator)) + { + buf.Append( + "Base CRL: " + + new CrlNumber(DerInteger.GetInstance( + asn1Value).PositiveValue)) + .AppendLine(); + } + else if (oid.Equals(X509Extensions.IssuingDistributionPoint)) + { + buf.Append(IssuingDistributionPoint.GetInstance((Asn1Sequence) asn1Value)).AppendLine(); + } + else if (oid.Equals(X509Extensions.CrlDistributionPoints)) + { + buf.Append(CrlDistPoint.GetInstance((Asn1Sequence) asn1Value)).AppendLine(); + } + else if (oid.Equals(X509Extensions.FreshestCrl)) + { + buf.Append(CrlDistPoint.GetInstance((Asn1Sequence) asn1Value)).AppendLine(); + } + else + { + buf.Append(oid.Id); + buf.Append(" value = ").Append( + Asn1Dump.DumpAsString(asn1Value)) + .AppendLine(); + } + } + catch (Exception) + { + buf.Append(oid.Id); + buf.Append(" value = ").Append("*****").AppendLine(); + } + } + else + { + buf.AppendLine(); + } + } + while (e.MoveNext()); + } + + var certSet = GetRevokedCertificates(); + if (certSet != null) + { + foreach (X509CrlEntry entry in certSet) + { + buf.Append(entry); + buf.AppendLine(); + } + } + + return buf.ToString(); + } + + /** + * Checks whether the given certificate is on this CRL. + * + * @param cert the certificate to check for. + * @return true if the given certificate is on this CRL, + * false otherwise. + */ +// public bool IsRevoked( +// Certificate cert) +// { +// if (!cert.getType().Equals("X.509")) +// { +// throw new RuntimeException("X.509 CRL used with non X.509 Cert"); +// } + public virtual bool IsRevoked( + X509Certificate cert) + { + CrlEntry[] certs = c.GetRevokedCertificates(); + + if (certs != null) + { + BigInteger serial = cert.SerialNumber; + + for (int i = 0; i < certs.Length; i++) + { + if (certs[i].UserCertificate.HasValue(serial)) + return true; + } + } + + return false; + } + + protected virtual bool IsIndirectCrl + { + get + { + Asn1OctetString idp = GetExtensionValue(X509Extensions.IssuingDistributionPoint); + bool isIndirect = false; + + try + { + if (idp != null) + { + isIndirect = IssuingDistributionPoint.GetInstance( + X509ExtensionUtilities.FromExtensionValue(idp)).IsIndirectCrl; + } + } + catch (Exception e) + { + // TODO +// throw new ExtCrlException("Exception reading IssuingDistributionPoint", e); + throw new CrlException("Exception reading IssuingDistributionPoint" + e); + } + + return isIndirect; + } + } + + private CachedEncoding GetCachedEncoding() + { + lock (cacheLock) + { + if (null != cachedEncoding) + return cachedEncoding; + } + + byte[] encoding = null; + CrlException exception = null; + try + { + encoding = c.GetEncoded(Asn1Encodable.Der); + } + catch (IOException e) + { + exception = new CrlException("Failed to DER-encode CRL", e); + } + + CachedEncoding temp = new CachedEncoding(encoding, exception); + + lock (cacheLock) + { + if (null == cachedEncoding) + { + cachedEncoding = temp; + } + + return cachedEncoding; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs.meta new file mode 100644 index 00000000..2efa0cc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 74e300a282d8d504e8c78bbe4d35539b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Crl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs new file mode 100644 index 00000000..2fb0fcba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs @@ -0,0 +1,234 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Text; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * The following extensions are listed in RFC 2459 as relevant to CRL Entries + * + * ReasonCode Hode Instruction Code Invalidity Date Certificate Issuer + * (critical) + */ + public class X509CrlEntry + : X509ExtensionBase + { + private CrlEntry c; + private bool isIndirect; + private X509Name previousCertificateIssuer; + private X509Name certificateIssuer; + + private volatile bool hashValueSet; + private volatile int hashValue; + + public X509CrlEntry( + CrlEntry c) + { + this.c = c; + this.certificateIssuer = loadCertificateIssuer(); + } + + /** + * Constructor for CRLEntries of indirect CRLs. If isIndirect + * is false {@link #getCertificateIssuer()} will always + * return null, previousCertificateIssuer is + * ignored. If this isIndirect is specified and this CrlEntry + * has no certificate issuer CRL entry extension + * previousCertificateIssuer is returned by + * {@link #getCertificateIssuer()}. + * + * @param c + * TbsCertificateList.CrlEntry object. + * @param isIndirect + * true if the corresponding CRL is a indirect + * CRL. + * @param previousCertificateIssuer + * Certificate issuer of the previous CrlEntry. + */ + public X509CrlEntry( + CrlEntry c, + bool isIndirect, + X509Name previousCertificateIssuer) + { + this.c = c; + this.isIndirect = isIndirect; + this.previousCertificateIssuer = previousCertificateIssuer; + this.certificateIssuer = loadCertificateIssuer(); + } + + private X509Name loadCertificateIssuer() + { + if (!isIndirect) + { + return null; + } + + Asn1OctetString ext = GetExtensionValue(X509Extensions.CertificateIssuer); + if (ext == null) + { + return previousCertificateIssuer; + } + + try + { + GeneralName[] names = GeneralNames.GetInstance( + X509ExtensionUtilities.FromExtensionValue(ext)).GetNames(); + + for (int i = 0; i < names.Length; i++) + { + if (names[i].TagNo == GeneralName.DirectoryName) + { + return X509Name.GetInstance(names[i].Name); + } + } + } + catch (Exception) + { + } + + return null; + } + + public X509Name GetCertificateIssuer() + { + return certificateIssuer; + } + + protected override X509Extensions GetX509Extensions() + { + return c.Extensions; + } + + public byte[] GetEncoded() + { + try + { + return c.GetDerEncoded(); + } + catch (Exception e) + { + throw new CrlException(e.ToString()); + } + } + + public BigInteger SerialNumber + { + get { return c.UserCertificate.Value; } + } + + public DateTime RevocationDate + { + get { return c.RevocationDate.ToDateTime(); } + } + + public bool HasExtensions + { + get { return c.Extensions != null; } + } + + public override bool Equals(object other) + { + if (this == other) + return true; + + X509CrlEntry that = other as X509CrlEntry; + if (null == that) + return false; + + if (this.hashValueSet && that.hashValueSet) + { + if (this.hashValue != that.hashValue) + return false; + } + + return this.c.Equals(that.c); + } + + public override int GetHashCode() + { + if (!hashValueSet) + { + hashValue = this.c.GetHashCode(); + hashValueSet = true; + } + + return hashValue; + } + + public override string ToString() + { + StringBuilder buf = new StringBuilder(); + + buf.Append(" userCertificate: ").Append(this.SerialNumber).AppendLine(); + buf.Append(" revocationDate: ").Append(this.RevocationDate).AppendLine(); + buf.Append(" certificateIssuer: ").Append(this.GetCertificateIssuer()).AppendLine(); + + X509Extensions extensions = c.Extensions; + + if (extensions != null) + { + var e = extensions.ExtensionOids.GetEnumerator(); + if (e.MoveNext()) + { + buf.Append(" crlEntryExtensions:").AppendLine(); + + do + { + DerObjectIdentifier oid = e.Current; + X509Extension ext = extensions.GetExtension(oid); + + if (ext.Value != null) + { + Asn1Object obj = X509ExtensionUtilities.FromExtensionValue(ext.Value); + + buf.Append(" critical(") + .Append(ext.IsCritical) + .Append(") "); + try + { + if (oid.Equals(X509Extensions.ReasonCode)) + { + buf.Append(new CrlReason(DerEnumerated.GetInstance(obj))); + } + else if (oid.Equals(X509Extensions.CertificateIssuer)) + { + buf.Append("Certificate issuer: ").Append( + GeneralNames.GetInstance((Asn1Sequence)obj)); + } + else + { + buf.Append(oid.Id); + buf.Append(" value = ").Append(Asn1Dump.DumpAsString(obj)); + } + buf.AppendLine(); + } + catch (Exception) + { + buf.Append(oid.Id); + buf.Append(" value = ").Append("*****").AppendLine(); + } + } + else + { + buf.AppendLine(); + } + } + while (e.MoveNext()); + } + } + + return buf.ToString(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs.meta new file mode 100644 index 00000000..e40e7cbb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f216de1485603c446bf5b7a608d421ba +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs new file mode 100644 index 00000000..74b1c7f6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs @@ -0,0 +1,176 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + public class X509CrlParser + { + private static readonly PemParser PemCrlParser = new PemParser("CRL"); + + private readonly bool lazyAsn1; + + private Asn1Set sCrlData; + private int sCrlDataObjectCount; + private Stream currentCrlStream; + + public X509CrlParser(bool lazyAsn1 = false) + { + this.lazyAsn1 = lazyAsn1; + } + + private X509Crl ReadDerCrl(Asn1InputStream dIn) + { + Asn1Sequence seq = (Asn1Sequence)dIn.ReadObject(); + + if (seq.Count > 1 && seq[0] is DerObjectIdentifier) + { + if (seq[0].Equals(PkcsObjectIdentifiers.SignedData)) + { + sCrlData = SignedData.GetInstance( + Asn1Sequence.GetInstance((Asn1TaggedObject) seq[1], true)).Crls; + + return GetCrl(); + } + } + + return new X509Crl(CertificateList.GetInstance(seq)); + } + + private X509Crl ReadPemCrl(Stream inStream) + { + Asn1Sequence seq = PemCrlParser.ReadPemObject(inStream); + + return seq == null ? null : new X509Crl(CertificateList.GetInstance(seq)); + } + + private X509Crl GetCrl() + { + if (sCrlData == null || sCrlDataObjectCount >= sCrlData.Count) + return null; + + return new X509Crl(CertificateList.GetInstance(sCrlData[sCrlDataObjectCount++])); + } + + /// + /// Create loading data from byte array. + /// + /// + public X509Crl ReadCrl(byte[] input) + { + return ReadCrl(new MemoryStream(input, false)); + } + + /// + /// Create loading data from byte array. + /// + /// + public IList ReadCrls(byte[] input) + { + return ReadCrls(new MemoryStream(input, false)); + } + + /** + * Generates a certificate revocation list (CRL) object and initializes + * it with the data read from the input stream inStream. + */ + public X509Crl ReadCrl(Stream inStream) + { + if (inStream == null) + throw new ArgumentNullException("inStream"); + if (!inStream.CanRead) + throw new ArgumentException("inStream must be read-able", "inStream"); + + if (currentCrlStream == null) + { + currentCrlStream = inStream; + sCrlData = null; + sCrlDataObjectCount = 0; + } + else if (currentCrlStream != inStream) // reset if input stream has changed + { + currentCrlStream = inStream; + sCrlData = null; + sCrlDataObjectCount = 0; + } + + try + { + if (sCrlData != null) + { + if (sCrlDataObjectCount != sCrlData.Count) + return GetCrl(); + + sCrlData = null; + sCrlDataObjectCount = 0; + return null; + } + + int tag = inStream.ReadByte(); + if (tag < 0) + return null; + + if (inStream.CanSeek) + { + inStream.Seek(-1L, SeekOrigin.Current); + } + else + { + PushbackStream pis = new PushbackStream(inStream); + pis.Unread(tag); + inStream = pis; + } + + if (tag != 0x30) // assume ascii PEM encoded. + return ReadPemCrl(inStream); + + Asn1InputStream asn1 = lazyAsn1 + ? new LazyAsn1InputStream(inStream) + : new Asn1InputStream(inStream); + + return ReadDerCrl(asn1); + } + catch (CrlException e) + { + throw e; + } + catch (Exception e) + { + throw new CrlException(e.ToString()); + } + } + + /** + * Returns a (possibly empty) collection view of the CRLs read from + * the given input stream inStream. + * + * The inStream may contain a sequence of DER-encoded CRLs, or + * a PKCS#7 CRL set. This is a PKCS#7 SignedData object, with the + * only significant field being crls. In particular the signature + * and the contents are ignored. + */ + public IList ReadCrls(Stream inStream) + { + return new List(ParseCrls(inStream)); + } + + public IEnumerable ParseCrls(Stream inStream) + { + X509Crl crl; + while ((crl = ReadCrl(inStream)) != null) + { + yield return crl; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs.meta new file mode 100644 index 00000000..bfe1d915 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 41bafd07ac43a35468be8d3a02450215 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509CrlParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs new file mode 100644 index 00000000..90b64ec3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs @@ -0,0 +1,59 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + public abstract class X509ExtensionBase + : IX509Extension + { + protected abstract X509Extensions GetX509Extensions(); + + protected virtual ISet GetExtensionOids(bool critical) + { + X509Extensions extensions = GetX509Extensions(); + if (extensions == null) + return null; + + var set = new HashSet(); + foreach (DerObjectIdentifier oid in extensions.ExtensionOids) + { + X509Extension ext = extensions.GetExtension(oid); + if (ext.IsCritical == critical) + { + set.Add(oid.Id); + } + } + return set; + } + + /// + /// Get non critical extensions. + /// + /// A set of non critical extension oids. + public virtual ISet GetNonCriticalExtensionOids() + { + return GetExtensionOids(false); + } + + /// + /// Get any critical extensions. + /// + /// A sorted list of critical entension. + public virtual ISet GetCriticalExtensionOids() + { + return GetExtensionOids(true); + } + + public virtual Asn1OctetString GetExtensionValue(DerObjectIdentifier oid) + { + return GetX509Extensions()?.GetExtension(oid)?.Value; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs.meta new file mode 100644 index 00000000..7a961c47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: eeb1e20f1f3fda54682074f84762b183 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509ExtensionBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs new file mode 100644 index 00000000..89aaae40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs @@ -0,0 +1,63 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * A holding class for constructing an X509 Key Usage extension. + * + *
    +	 *    id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 }
    +	 *
    +	 *    KeyUsage ::= BIT STRING {
    +	 *         digitalSignature        (0),
    +	 *         nonRepudiation          (1),
    +	 *         keyEncipherment         (2),
    +	 *         dataEncipherment        (3),
    +	 *         keyAgreement            (4),
    +	 *         keyCertSign             (5),
    +	 *         cRLSign                 (6),
    +	 *         encipherOnly            (7),
    +	 *         decipherOnly            (8) }
    +	 * 
    + */ + public class X509KeyUsage + : Asn1Encodable + { + public const int DigitalSignature = 1 << 7; + public const int NonRepudiation = 1 << 6; + public const int KeyEncipherment = 1 << 5; + public const int DataEncipherment = 1 << 4; + public const int KeyAgreement = 1 << 3; + public const int KeyCertSign = 1 << 2; + public const int CrlSign = 1 << 1; + public const int EncipherOnly = 1 << 0; + public const int DecipherOnly = 1 << 15; + + private readonly int usage; + + /** + * Basic constructor. + * + * @param usage - the bitwise OR of the Key Usage flags giving the + * allowed uses for the key. + * e.g. (X509KeyUsage.keyEncipherment | X509KeyUsage.dataEncipherment) + */ + public X509KeyUsage( + int usage) + { + this.usage = usage; + } + + public override Asn1Object ToAsn1Object() + { + return new KeyUsage(usage); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs.meta new file mode 100644 index 00000000..5aa8d03c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 287001b462deaac4b9af167c95ba9f9c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509KeyUsage.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs new file mode 100644 index 00000000..02c6ec48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs @@ -0,0 +1,139 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + internal class X509SignatureUtilities + { + private static readonly Asn1Null derNull = DerNull.Instance; + + internal static void SetSignatureParameters( + ISigner signature, + Asn1Encodable parameters) + { + if (parameters != null && !derNull.Equals(parameters)) + { + // TODO Put back in +// AlgorithmParameters sigParams = AlgorithmParameters.GetInstance(signature.getAlgorithm()); +// +// try +// { +// sigParams.Init(parameters.ToAsn1Object().GetDerEncoded()); +// } +// catch (IOException e) +// { +// throw new SignatureException("IOException decoding parameters: " + e.Message); +// } +// +// if (Org.BouncyCastle.Utilities.Platform.EndsWith(signature.getAlgorithm(), "MGF1")) +// { +// try +// { +// signature.setParameter(sigParams.getParameterSpec(PSSParameterSpec.class)); +// } +// catch (GeneralSecurityException e) +// { +// throw new SignatureException("Exception extracting parameters: " + e.Message); +// } +// } + } + } + + internal static string GetSignatureName( + AlgorithmIdentifier sigAlgId) + { + Asn1Encodable parameters = sigAlgId.Parameters; + + if (parameters != null && !derNull.Equals(parameters)) + { + if (sigAlgId.Algorithm.Equals(PkcsObjectIdentifiers.IdRsassaPss)) + { + RsassaPssParameters rsaParams = RsassaPssParameters.GetInstance(parameters); + + return GetDigestAlgName(rsaParams.HashAlgorithm.Algorithm) + "withRSAandMGF1"; + } + if (sigAlgId.Algorithm.Equals(X9ObjectIdentifiers.ECDsaWithSha2)) + { + Asn1Sequence ecDsaParams = Asn1Sequence.GetInstance(parameters); + + return GetDigestAlgName((DerObjectIdentifier)ecDsaParams[0]) + "withECDSA"; + } + } + + string sigName = SignerUtilities.GetEncodingName(sigAlgId.Algorithm); + if (null != sigName) + { + return sigName; + } + + return sigAlgId.Algorithm.Id; + } + + /** + * Return the digest algorithm using one of the standard JCA string + * representations rather than the algorithm identifier (if possible). + */ + private static string GetDigestAlgName( + DerObjectIdentifier digestAlgOID) + { + if (PkcsObjectIdentifiers.MD5.Equals(digestAlgOID)) + { + return "MD5"; + } + else if (OiwObjectIdentifiers.IdSha1.Equals(digestAlgOID)) + { + return "SHA1"; + } + else if (NistObjectIdentifiers.IdSha224.Equals(digestAlgOID)) + { + return "SHA224"; + } + else if (NistObjectIdentifiers.IdSha256.Equals(digestAlgOID)) + { + return "SHA256"; + } + else if (NistObjectIdentifiers.IdSha384.Equals(digestAlgOID)) + { + return "SHA384"; + } + else if (NistObjectIdentifiers.IdSha512.Equals(digestAlgOID)) + { + return "SHA512"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD128.Equals(digestAlgOID)) + { + return "RIPEMD128"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD160.Equals(digestAlgOID)) + { + return "RIPEMD160"; + } + else if (TeleTrusTObjectIdentifiers.RipeMD256.Equals(digestAlgOID)) + { + return "RIPEMD256"; + } + else if (CryptoProObjectIdentifiers.GostR3411.Equals(digestAlgOID)) + { + return "GOST3411"; + } + else + { + return digestAlgOID.Id; + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs.meta new file mode 100644 index 00000000..a18df785 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1074abb8ba940744ab6b77639dbcc763 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509SignatureUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs new file mode 100644 index 00000000..c309bf04 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs @@ -0,0 +1,167 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.CryptoPro; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.TeleTrust; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + internal class X509Utilities + { + private static readonly Dictionary m_algorithms = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly Dictionary m_exParams = + new Dictionary(StringComparer.OrdinalIgnoreCase); + private static readonly HashSet m_noParams = new HashSet(); + + static X509Utilities() + { + m_algorithms.Add("MD2WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD2WITHRSA", PkcsObjectIdentifiers.MD2WithRsaEncryption); + m_algorithms.Add("MD5WITHRSAENCRYPTION", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("MD5WITHRSA", PkcsObjectIdentifiers.MD5WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA-1WITHRSA", PkcsObjectIdentifiers.Sha1WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA-224WITHRSA", PkcsObjectIdentifiers.Sha224WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA-256WITHRSA", PkcsObjectIdentifiers.Sha256WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA-384WITHRSA", PkcsObjectIdentifiers.Sha384WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA-512WITHRSA", PkcsObjectIdentifiers.Sha512WithRsaEncryption); + m_algorithms.Add("SHA512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA-512(224)WITHRSA", PkcsObjectIdentifiers.Sha512_224WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSAENCRYPTION", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA-512(256)WITHRSA", PkcsObjectIdentifiers.Sha512_256WithRSAEncryption); + m_algorithms.Add("SHA1WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA224WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA256WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA384WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("SHA512WITHRSAANDMGF1", PkcsObjectIdentifiers.IdRsassaPss); + m_algorithms.Add("RIPEMD160WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD160WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD160); + m_algorithms.Add("RIPEMD128WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD128WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD128); + m_algorithms.Add("RIPEMD256WITHRSAENCRYPTION", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("RIPEMD256WITHRSA", TeleTrusTObjectIdentifiers.RsaSignatureWithRipeMD256); + m_algorithms.Add("SHA1WITHDSA", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("DSAWITHSHA1", X9ObjectIdentifiers.IdDsaWithSha1); + m_algorithms.Add("SHA224WITHDSA", NistObjectIdentifiers.DsaWithSha224); + m_algorithms.Add("SHA256WITHDSA", NistObjectIdentifiers.DsaWithSha256); + m_algorithms.Add("SHA384WITHDSA", NistObjectIdentifiers.DsaWithSha384); + m_algorithms.Add("SHA512WITHDSA", NistObjectIdentifiers.DsaWithSha512); + m_algorithms.Add("SHA1WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("ECDSAWITHSHA1", X9ObjectIdentifiers.ECDsaWithSha1); + m_algorithms.Add("SHA224WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha224); + m_algorithms.Add("SHA256WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha256); + m_algorithms.Add("SHA384WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha384); + m_algorithms.Add("SHA512WITHECDSA", X9ObjectIdentifiers.ECDsaWithSha512); + m_algorithms.Add("GOST3411WITHGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3411WITHGOST3410-94", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_algorithms.Add("GOST3411WITHECGOST3410", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHECGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + m_algorithms.Add("GOST3411WITHGOST3410-2001", CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + + // + // According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) omit the parameters field. + // The parameters field SHALL be NULL for RSA based signature algorithms. + // + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha1); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha224); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha256); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha384); + m_noParams.Add(X9ObjectIdentifiers.ECDsaWithSha512); + m_noParams.Add(X9ObjectIdentifiers.IdDsaWithSha1); + m_noParams.Add(OiwObjectIdentifiers.DsaWithSha1); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha224); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha256); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha384); + m_noParams.Add(NistObjectIdentifiers.DsaWithSha512); + + // + // RFC 4491 + // + m_noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x94); + m_noParams.Add(CryptoProObjectIdentifiers.GostR3411x94WithGostR3410x2001); + + // + // explicit params + // + AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OiwObjectIdentifiers.IdSha1, DerNull.Instance); + m_exParams.Add("SHA1WITHRSAANDMGF1", CreatePssParams(sha1AlgId, 20)); + + AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha224, DerNull.Instance); + m_exParams.Add("SHA224WITHRSAANDMGF1", CreatePssParams(sha224AlgId, 28)); + + AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance); + m_exParams.Add("SHA256WITHRSAANDMGF1", CreatePssParams(sha256AlgId, 32)); + + AlgorithmIdentifier sha384AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance); + m_exParams.Add("SHA384WITHRSAANDMGF1", CreatePssParams(sha384AlgId, 48)); + + AlgorithmIdentifier sha512AlgId = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance); + m_exParams.Add("SHA512WITHRSAANDMGF1", CreatePssParams(sha512AlgId, 64)); + } + + private static RsassaPssParameters CreatePssParams( + AlgorithmIdentifier hashAlgId, + int saltSize) + { + return new RsassaPssParameters( + hashAlgId, + new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, hashAlgId), + new DerInteger(saltSize), + new DerInteger(1)); + } + + internal static DerObjectIdentifier GetAlgorithmOid(string algorithmName) + { + if (m_algorithms.TryGetValue(algorithmName, out var oid)) + return oid; + + return new DerObjectIdentifier(algorithmName); + } + + internal static AlgorithmIdentifier GetSigAlgID(DerObjectIdentifier sigOid, string algorithmName) + { + if (m_noParams.Contains(sigOid)) + return new AlgorithmIdentifier(sigOid); + + if (m_exParams.TryGetValue(algorithmName, out var explicitParameters)) + return new AlgorithmIdentifier(sigOid, explicitParameters); + + return new AlgorithmIdentifier(sigOid, DerNull.Instance); + } + + internal static IEnumerable GetAlgNames() + { + return CollectionUtilities.Proxy(m_algorithms.Keys); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs.meta new file mode 100644 index 00000000..fd42dfde --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4f161bf137ed4fc4e8f725248245bacd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509Utilities.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs new file mode 100644 index 00000000..8b91bee1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs @@ -0,0 +1,151 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// Class to Generate X509V1 Certificates. + /// + public class X509V1CertificateGenerator + { + private V1TbsCertificateGenerator tbsGen; + + /// + /// Default Constructor. + /// + public X509V1CertificateGenerator() + { + tbsGen = new V1TbsCertificateGenerator(); + } + + /// + /// Reset the generator. + /// + public void Reset() + { + tbsGen = new V1TbsCertificateGenerator(); + } + + /// + /// Set the certificate's serial number. + /// + /// Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data. + /// You will be surprised how ugly a serial number collision can get. + /// The serial number. + public void SetSerialNumber( + BigInteger serialNumber) + { + if (serialNumber.SignValue <= 0) + { + throw new ArgumentException("serial number must be a positive integer", "serialNumber"); + } + + tbsGen.SetSerialNumber(new DerInteger(serialNumber)); + } + + /// + /// Set the issuer distinguished name. + /// The issuer is the entity whose private key is used to sign the certificate. + /// + /// The issuers DN. + public void SetIssuerDN( + X509Name issuer) + { + tbsGen.SetIssuer(issuer); + } + + /// + /// Set the date that this certificate is to be valid from. + /// + /// + public void SetNotBefore( + DateTime date) + { + tbsGen.SetStartDate(new Time(date)); + } + + /// + /// Set the date after which this certificate will no longer be valid. + /// + /// + public void SetNotAfter( + DateTime date) + { + tbsGen.SetEndDate(new Time(date)); + } + + /// + /// Set the subject distinguished name. + /// The subject describes the entity associated with the public key. + /// + /// + public void SetSubjectDN( + X509Name subject) + { + tbsGen.SetSubject(subject); + } + + /// + /// Set the public key that this certificate identifies. + /// + /// + public void SetPublicKey( + AsymmetricKeyParameter publicKey) + { + try + { + tbsGen.SetSubjectPublicKeyInfo( + SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey)); + } + catch (Exception e) + { + throw new ArgumentException("unable to process key - " + e.ToString()); + } + } + + /// + /// Generate a new using the provided . + /// + /// A signature factory with the necessary + /// algorithm details. + /// An . + public X509Certificate Generate(ISignatureFactory signatureFactory) + { + var sigAlgID = (AlgorithmIdentifier)signatureFactory.AlgorithmDetails; + + tbsGen.SetSignature(sigAlgID); + + TbsCertificateStructure tbsCert = tbsGen.GenerateTbsCertificate(); + + IStreamCalculator streamCalculator = signatureFactory.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + tbsCert.EncodeTo(sigStream, Asn1Encodable.Der); + } + + var signature = streamCalculator.GetResult().Collect(); + + return new X509Certificate( + new X509CertificateStructure(tbsCert, sigAlgID, new DerBitString(signature))); + } + + /// + /// Allows enumeration of the signature names supported by the generator. + /// + public IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs.meta new file mode 100644 index 00000000..02abb9c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 65303b6fc60b8d947a517e6a218de794 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V1CertificateGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs new file mode 100644 index 00000000..84823818 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs @@ -0,0 +1,280 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// An implementation of a version 2 X.509 Attribute Certificate. + public class X509V2AttributeCertificate + : X509ExtensionBase + { + private readonly AttributeCertificate cert; + private readonly DateTime notBefore; + private readonly DateTime notAfter; + + private static AttributeCertificate GetObject(Stream input) + { + try + { + return AttributeCertificate.GetInstance(Asn1Object.FromStream(input)); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new IOException("exception decoding certificate structure", e); + } + } + + public X509V2AttributeCertificate( + Stream encIn) + : this(GetObject(encIn)) + { + } + + public X509V2AttributeCertificate( + byte[] encoded) + : this(new MemoryStream(encoded, false)) + { + } + + public X509V2AttributeCertificate(AttributeCertificate cert) + { + this.cert = cert; + + try + { + this.notAfter = cert.ACInfo.AttrCertValidityPeriod.NotAfterTime.ToDateTime(); + this.notBefore = cert.ACInfo.AttrCertValidityPeriod.NotBeforeTime.ToDateTime(); + } + catch (Exception e) + { + throw new IOException("invalid data structure in certificate!", e); + } + } + + public virtual AttributeCertificate AttributeCertificate + { + get { return cert; } + } + + public virtual int Version + { + get { return cert.ACInfo.Version.IntValueExact + 1; } + } + + public virtual BigInteger SerialNumber + { + get { return cert.ACInfo.SerialNumber.Value; } + } + + public virtual AttributeCertificateHolder Holder + { + get + { + return new AttributeCertificateHolder((Asn1Sequence)cert.ACInfo.Holder.ToAsn1Object()); + } + } + + public virtual AttributeCertificateIssuer Issuer + { + get + { + return new AttributeCertificateIssuer(cert.ACInfo.Issuer); + } + } + + public virtual DateTime NotBefore + { + get { return notBefore; } + } + + public virtual DateTime NotAfter + { + get { return notAfter; } + } + + public virtual bool[] GetIssuerUniqueID() + { + DerBitString id = cert.ACInfo.IssuerUniqueID; + + if (id != null) + { + byte[] bytes = id.GetBytes(); + bool[] boolId = new bool[bytes.Length * 8 - id.PadBits]; + + for (int i = 0; i != boolId.Length; i++) + { + //boolId[i] = (bytes[i / 8] & (0x80 >>> (i % 8))) != 0; + boolId[i] = (bytes[i / 8] & (0x80 >> (i % 8))) != 0; + } + + return boolId; + } + + return null; + } + + public virtual bool IsValidNow + { + get { return IsValid(DateTime.UtcNow); } + } + + public virtual bool IsValid( + DateTime date) + { + return date.CompareTo(NotBefore) >= 0 && date.CompareTo(NotAfter) <= 0; + } + + public virtual void CheckValidity() + { + this.CheckValidity(DateTime.UtcNow); + } + + public virtual void CheckValidity( + DateTime date) + { + if (date.CompareTo(NotAfter) > 0) + throw new CertificateExpiredException("certificate expired on " + NotAfter); + if (date.CompareTo(NotBefore) < 0) + throw new CertificateNotYetValidException("certificate not valid until " + NotBefore); + } + + public virtual AlgorithmIdentifier SignatureAlgorithm + { + get { return cert.SignatureAlgorithm; } + } + + public virtual byte[] GetSignature() + { + return cert.GetSignatureOctets(); + } + + public virtual void Verify( + AsymmetricKeyParameter key) + { + CheckSignature(new Asn1VerifierFactory(cert.SignatureAlgorithm, key)); + } + + /// + /// Verify the certificate's signature using a verifier created using the passed in verifier provider. + /// + /// An appropriate provider for verifying the certificate's signature. + /// True if the signature is valid. + /// If verifier provider is not appropriate or the certificate algorithm is invalid. + public virtual void Verify( + IVerifierFactoryProvider verifierProvider) + { + CheckSignature(verifierProvider.CreateVerifierFactory(cert.SignatureAlgorithm)); + } + + protected virtual void CheckSignature( + IVerifierFactory verifier) + { + // TODO Compare IsAlgIDEqual in X509Certificate.CheckSignature + if (!cert.SignatureAlgorithm.Equals(cert.ACInfo.Signature)) + throw new CertificateException("Signature algorithm in certificate info not same as outer certificate"); + + IStreamCalculator streamCalculator = verifier.CreateCalculator(); + + try + { + byte[] b = this.cert.ACInfo.GetEncoded(); + + using (var stream = streamCalculator.Stream) + { + stream.Write(b, 0, b.Length); + } + } + catch (IOException e) + { + throw new SignatureException("Exception encoding certificate info object", e); + } + + if (!streamCalculator.GetResult().IsVerified(this.GetSignature())) + throw new InvalidKeyException("Public key presented not for certificate signature"); + } + + public virtual byte[] GetEncoded() + { + return cert.GetEncoded(); + } + + protected override X509Extensions GetX509Extensions() + { + return cert.ACInfo.Extensions; + } + + public virtual X509Attribute[] GetAttributes() + { + Asn1Sequence seq = cert.ACInfo.Attributes; + X509Attribute[] attrs = new X509Attribute[seq.Count]; + + for (int i = 0; i != seq.Count; i++) + { + attrs[i] = new X509Attribute((Asn1Encodable)seq[i]); + } + + return attrs; + } + + public virtual X509Attribute[] GetAttributes( + string oid) + { + Asn1Sequence seq = cert.ACInfo.Attributes; + var list = new List(); + + for (int i = 0; i != seq.Count; i++) + { + X509Attribute attr = new X509Attribute((Asn1Encodable)seq[i]); + if (attr.Oid.Equals(oid)) + { + list.Add(attr); + } + } + + if (list.Count < 1) + { + return null; + } + + return list.ToArray(); + } + + public override bool Equals(object obj) + { + if (obj == this) + return true; + + X509V2AttributeCertificate other = obj as X509V2AttributeCertificate; + + if (other == null) + return false; + + return cert.Equals(other.cert); + + // NB: May prefer this implementation of Equals if more than one certificate implementation in play + //return Arrays.AreEqual(this.GetEncoded(), other.GetEncoded()); + } + + public override int GetHashCode() + { + return cert.GetHashCode(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs.meta new file mode 100644 index 00000000..236c7a9d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 13d2c8141695faf429cc82df3962eb13 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs new file mode 100644 index 00000000..d8d68a9f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs @@ -0,0 +1,146 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// Class to produce an X.509 Version 2 AttributeCertificate. + public class X509V2AttributeCertificateGenerator + { + private readonly X509ExtensionsGenerator extGenerator = new X509ExtensionsGenerator(); + + private V2AttributeCertificateInfoGenerator acInfoGen; + + public X509V2AttributeCertificateGenerator() + { + acInfoGen = new V2AttributeCertificateInfoGenerator(); + } + + /// Reset the generator + public void Reset() + { + acInfoGen = new V2AttributeCertificateInfoGenerator(); + extGenerator.Reset(); + } + + /// Set the Holder of this Attribute Certificate. + public void SetHolder( + AttributeCertificateHolder holder) + { + acInfoGen.SetHolder(holder.holder); + } + + /// Set the issuer. + public void SetIssuer( + AttributeCertificateIssuer issuer) + { + acInfoGen.SetIssuer(AttCertIssuer.GetInstance(issuer.form)); + } + + /// Set the serial number for the certificate. + public void SetSerialNumber( + BigInteger serialNumber) + { + acInfoGen.SetSerialNumber(new DerInteger(serialNumber)); + } + + public void SetNotBefore( + DateTime date) + { + acInfoGen.SetStartDate(new Asn1GeneralizedTime(date)); + } + + public void SetNotAfter( + DateTime date) + { + acInfoGen.SetEndDate(new Asn1GeneralizedTime(date)); + } + + /// Add an attribute. + public void AddAttribute( + X509Attribute attribute) + { + acInfoGen.AddAttribute(AttributeX509.GetInstance(attribute.ToAsn1Object())); + } + + public void SetIssuerUniqueId( + bool[] iui) + { + // TODO convert bool array to bit string + //acInfoGen.SetIssuerUniqueID(iui); + throw new NotImplementedException("SetIssuerUniqueId()"); + } + + /// Add a given extension field for the standard extensions tag. + public void AddExtension( + string oid, + bool critical, + Asn1Encodable extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, extensionValue); + } + + /// + /// Add a given extension field for the standard extensions tag. + /// The value parameter becomes the contents of the octet string associated + /// with the extension. + /// + public void AddExtension( + string oid, + bool critical, + byte[] extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, extensionValue); + } + + /// + /// Generate a new using the provided . + /// + /// A signature factory with the necessary + /// algorithm details. + /// An . + public X509V2AttributeCertificate Generate(ISignatureFactory signatureFactory) + { + var sigAlgID = (AlgorithmIdentifier)signatureFactory.AlgorithmDetails; + + acInfoGen.SetSignature(sigAlgID); + + if (!extGenerator.IsEmpty) + { + acInfoGen.SetExtensions(extGenerator.Generate()); + } + + AttributeCertificateInfo acInfo = acInfoGen.GenerateAttributeCertificateInfo(); + + IStreamCalculator streamCalculator = signatureFactory.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + acInfo.EncodeTo(sigStream, Asn1Encodable.Der); + } + + var signature = streamCalculator.GetResult().Collect(); + + return new X509V2AttributeCertificate( + new AttributeCertificate(acInfo, sigAlgID, new DerBitString(signature))); + } + + /// + /// Allows enumeration of the signature names supported by the generator. + /// + public IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs.meta new file mode 100644 index 00000000..5896c3fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fa2461148b1bc3b4cba0e1b64b67b6f5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2AttributeCertificateGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs new file mode 100644 index 00000000..a4a9bca3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs @@ -0,0 +1,214 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /** + * class to produce an X.509 Version 2 CRL. + */ + public class X509V2CrlGenerator + { + private readonly X509ExtensionsGenerator extGenerator = new X509ExtensionsGenerator(); + + private V2TbsCertListGenerator tbsGen; + + public X509V2CrlGenerator() + { + tbsGen = new V2TbsCertListGenerator(); + } + + /** + * reset the generator + */ + public void Reset() + { + tbsGen = new V2TbsCertListGenerator(); + extGenerator.Reset(); + } + + /** + * Set the issuer distinguished name - the issuer is the entity whose private key is used to sign the + * certificate. + */ + public void SetIssuerDN( + X509Name issuer) + { + tbsGen.SetIssuer(issuer); + } + + public void SetThisUpdate( + DateTime date) + { + tbsGen.SetThisUpdate(new Time(date)); + } + + public void SetNextUpdate( + DateTime date) + { + tbsGen.SetNextUpdate(new Time(date)); + } + + /** + * Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise + * or 0 if CrlReason is not to be used + **/ + public void AddCrlEntry( + BigInteger userCertificate, + DateTime revocationDate, + int reason) + { + tbsGen.AddCrlEntry(new DerInteger(userCertificate), new Time(revocationDate), reason); + } + + /** + * Add a CRL entry with an Invalidity Date extension as well as a CrlReason extension. + * Reason being as indicated by CrlReason, i.e. CrlReason.KeyCompromise + * or 0 if CrlReason is not to be used + **/ + public void AddCrlEntry( + BigInteger userCertificate, + DateTime revocationDate, + int reason, + DateTime invalidityDate) + { + tbsGen.AddCrlEntry(new DerInteger(userCertificate), new Time(revocationDate), reason, + new Asn1GeneralizedTime(invalidityDate)); + } + + /** + * Add a CRL entry with extensions. + **/ + public void AddCrlEntry( + BigInteger userCertificate, + DateTime revocationDate, + X509Extensions extensions) + { + tbsGen.AddCrlEntry(new DerInteger(userCertificate), new Time(revocationDate), extensions); + } + + /** + * Add the CRLEntry objects contained in a previous CRL. + * + * @param other the X509Crl to source the other entries from. + */ + public void AddCrl(X509Crl other) + { + if (other == null) + throw new ArgumentNullException("other"); + + var revocations = other.GetRevokedCertificates(); + + if (revocations != null) + { + foreach (X509CrlEntry entry in revocations) + { + try + { + tbsGen.AddCrlEntry( + Asn1Sequence.GetInstance( + Asn1Object.FromByteArray(entry.GetEncoded()))); + } + catch (IOException e) + { + throw new CrlException("exception processing encoding of CRL", e); + } + } + } + } + + /** + * add a given extension field for the standard extensions tag (tag 0) + */ + public void AddExtension( + string oid, + bool critical, + Asn1Encodable extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, extensionValue); + } + + /** + * add a given extension field for the standard extensions tag (tag 0) + */ + public void AddExtension( + DerObjectIdentifier oid, + bool critical, + Asn1Encodable extensionValue) + { + extGenerator.AddExtension(oid, critical, extensionValue); + } + + /** + * add a given extension field for the standard extensions tag (tag 0) + */ + public void AddExtension( + string oid, + bool critical, + byte[] extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, new DerOctetString(extensionValue)); + } + + /** + * add a given extension field for the standard extensions tag (tag 0) + */ + public void AddExtension( + DerObjectIdentifier oid, + bool critical, + byte[] extensionValue) + { + extGenerator.AddExtension(oid, critical, new DerOctetString(extensionValue)); + } + + /// + /// Generate a new using the provided . + /// + /// A signature factory with the necessary + /// algorithm details. + /// An . + public X509Crl Generate(ISignatureFactory signatureFactory) + { + var sigAlgID = (AlgorithmIdentifier)signatureFactory.AlgorithmDetails; + + tbsGen.SetSignature(sigAlgID); + + if (!extGenerator.IsEmpty) + { + tbsGen.SetExtensions(extGenerator.Generate()); + } + + TbsCertificateList tbsCertList = tbsGen.GenerateTbsCertList(); + + IStreamCalculator streamCalculator = signatureFactory.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + tbsCertList.EncodeTo(sigStream, Asn1Encodable.Der); + } + + var signature = streamCalculator.GetResult().Collect(); + + return new X509Crl( + CertificateList.GetInstance(new DerSequence(tbsCertList, sigAlgID, new DerBitString(signature)))); + } + + /// + /// Allows enumeration of the signature names supported by the generator. + /// + public IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs.meta new file mode 100644 index 00000000..6693a82f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bca8b38c8b95c784184f6a651d0b6369 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V2CRLGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs new file mode 100644 index 00000000..323d89e9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs @@ -0,0 +1,285 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509 +{ + /// + /// A class to Generate Version 3 X509Certificates. + /// + public class X509V3CertificateGenerator + { + private readonly X509ExtensionsGenerator extGenerator = new X509ExtensionsGenerator(); + + private V3TbsCertificateGenerator tbsGen; + + public X509V3CertificateGenerator() + { + tbsGen = new V3TbsCertificateGenerator(); + } + + /// + /// Reset the Generator. + /// + public void Reset() + { + tbsGen = new V3TbsCertificateGenerator(); + extGenerator.Reset(); + } + + /// + /// Set the certificate's serial number. + /// + /// Make serial numbers long, if you have no serial number policy make sure the number is at least 16 bytes of secure random data. + /// You will be surprised how ugly a serial number collision can Get. + /// The serial number. + public void SetSerialNumber( + BigInteger serialNumber) + { + if (serialNumber.SignValue <= 0) + { + throw new ArgumentException("serial number must be a positive integer", "serialNumber"); + } + + tbsGen.SetSerialNumber(new DerInteger(serialNumber)); + } + + /// + /// Set the distinguished name of the issuer. + /// The issuer is the entity which is signing the certificate. + /// + /// The issuer's DN. + public void SetIssuerDN( + X509Name issuer) + { + tbsGen.SetIssuer(issuer); + } + + /// + /// Set the date that this certificate is to be valid from. + /// + /// + public void SetNotBefore( + DateTime date) + { + tbsGen.SetStartDate(new Time(date)); + } + + /// + /// Set the date after which this certificate will no longer be valid. + /// + /// + public void SetNotAfter( + DateTime date) + { + tbsGen.SetEndDate(new Time(date)); + } + + /// + /// Set the DN of the entity that this certificate is about. + /// + /// + public void SetSubjectDN( + X509Name subject) + { + tbsGen.SetSubject(subject); + } + + /// + /// Set the public key that this certificate identifies. + /// + /// + public void SetPublicKey( + AsymmetricKeyParameter publicKey) + { + tbsGen.SetSubjectPublicKeyInfo(SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(publicKey)); + } + + /// + /// Set the subject unique ID - note: it is very rare that it is correct to do this. + /// + /// + public void SetSubjectUniqueID( + bool[] uniqueID) + { + tbsGen.SetSubjectUniqueID(booleanToBitString(uniqueID)); + } + + /// + /// Set the issuer unique ID - note: it is very rare that it is correct to do this. + /// + /// + public void SetIssuerUniqueID( + bool[] uniqueID) + { + tbsGen.SetIssuerUniqueID(booleanToBitString(uniqueID)); + } + + private DerBitString booleanToBitString( + bool[] id) + { + byte[] bytes = new byte[(id.Length + 7) / 8]; + + for (int i = 0; i != id.Length; i++) + { + if (id[i]) + { + bytes[i / 8] |= (byte)(1 << ((7 - (i % 8)))); + } + } + + int pad = id.Length % 8; + + if (pad == 0) + { + return new DerBitString(bytes); + } + + return new DerBitString(bytes, 8 - pad); + } + + /// + /// Add a given extension field for the standard extensions tag (tag 3). + /// + /// string containing a dotted decimal Object Identifier. + /// Is it critical. + /// The value. + public void AddExtension( + string oid, + bool critical, + Asn1Encodable extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, extensionValue); + } + + /// + /// Add an extension to this certificate. + /// + /// Its Object Identifier. + /// Is it critical. + /// The value. + public void AddExtension( + DerObjectIdentifier oid, + bool critical, + Asn1Encodable extensionValue) + { + extGenerator.AddExtension(oid, critical, extensionValue); + } + + /// + /// Add an extension using a string with a dotted decimal OID. + /// + /// string containing a dotted decimal Object Identifier. + /// Is it critical. + /// byte[] containing the value of this extension. + public void AddExtension( + string oid, + bool critical, + byte[] extensionValue) + { + extGenerator.AddExtension(new DerObjectIdentifier(oid), critical, new DerOctetString(extensionValue)); + } + + /// + /// Add an extension to this certificate. + /// + /// Its Object Identifier. + /// Is it critical. + /// byte[] containing the value of this extension. + public void AddExtension( + DerObjectIdentifier oid, + bool critical, + byte[] extensionValue) + { + extGenerator.AddExtension(oid, critical, new DerOctetString(extensionValue)); + } + + /// + /// Add a given extension field for the standard extensions tag (tag 3), + /// copying the extension value from another certificate. + /// + public void CopyAndAddExtension( + string oid, + bool critical, + X509Certificate cert) + { + CopyAndAddExtension(new DerObjectIdentifier(oid), critical, cert); + } + + /** + * add a given extension field for the standard extensions tag (tag 3) + * copying the extension value from another certificate. + * @throws CertificateParsingException if the extension cannot be extracted. + */ + public void CopyAndAddExtension( + DerObjectIdentifier oid, + bool critical, + X509Certificate cert) + { + Asn1OctetString extValue = cert.GetExtensionValue(oid); + if (extValue == null) + throw new CertificateParsingException("extension " + oid + " not present"); + + try + { + Asn1Encodable value = X509ExtensionUtilities.FromExtensionValue(extValue); + + this.AddExtension(oid, critical, value); + } + catch (Exception e) + { + throw new CertificateParsingException(e.Message, e); + } + } + + /// + /// Generate a new using the provided . + /// + /// A signature factory with the necessary + /// algorithm details. + /// An . + public X509Certificate Generate(ISignatureFactory signatureFactory) + { + var sigAlgID = (AlgorithmIdentifier)signatureFactory.AlgorithmDetails; + + tbsGen.SetSignature(sigAlgID); + + if (!extGenerator.IsEmpty) + { + tbsGen.SetExtensions(extGenerator.Generate()); + } + + TbsCertificateStructure tbsCert = tbsGen.GenerateTbsCertificate(); + + IStreamCalculator streamCalculator = signatureFactory.CreateCalculator(); + using (Stream sigStream = streamCalculator.Stream) + { + tbsCert.EncodeTo(sigStream, Asn1Encodable.Der); + } + + var signature = streamCalculator.GetResult().Collect(); + + return new X509Certificate(new X509CertificateStructure(tbsCert, sigAlgID, new DerBitString(signature))); + } + + /// + /// Allows enumeration of the signature names supported by the generator. + /// + public IEnumerable SignatureAlgNames + { + get { return X509Utilities.GetAlgNames(); } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs.meta new file mode 100644 index 00000000..d599b885 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 21ba90f611a0ac34cad69e9742e2968f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/X509V3CertificateGenerator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension.meta new file mode 100644 index 00000000..5be6a0ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 67a323e460d1030448e90ed32a8f60fb +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs new file mode 100644 index 00000000..08dbfe57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs @@ -0,0 +1,106 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension +{ + /// A high level authority key identifier. + public class AuthorityKeyIdentifierStructure + : AuthorityKeyIdentifier + { + /** + * Constructor which will take the byte[] returned from getExtensionValue() + * + * @param encodedValue a DER octet encoded string with the extension structure in it. + * @throws IOException on parsing errors. + */ + // TODO Add a functional constructor from byte[]? + public AuthorityKeyIdentifierStructure( + Asn1OctetString encodedValue) + : base((Asn1Sequence) X509ExtensionUtilities.FromExtensionValue(encodedValue)) + { + } + + private static Asn1Sequence FromCertificate( + X509Certificate certificate) + { + try + { + GeneralName genName = new GeneralName( + PrincipalUtilities.GetIssuerX509Principal(certificate)); + + if (certificate.Version == 3) + { + Asn1OctetString ext = certificate.GetExtensionValue(X509Extensions.SubjectKeyIdentifier); + + if (ext != null) + { + Asn1OctetString str = (Asn1OctetString) X509ExtensionUtilities.FromExtensionValue(ext); + + return (Asn1Sequence) new AuthorityKeyIdentifier( + str.GetOctets(), new GeneralNames(genName), certificate.SerialNumber).ToAsn1Object(); + } + } + + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo( + certificate.GetPublicKey()); + + return (Asn1Sequence) new AuthorityKeyIdentifier( + info, new GeneralNames(genName), certificate.SerialNumber).ToAsn1Object(); + } + catch (Exception e) + { + throw new CertificateParsingException("Exception extracting certificate details", e); + } + } + + private static Asn1Sequence FromKey( + AsymmetricKeyParameter pubKey) + { + try + { + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pubKey); + + return (Asn1Sequence) new AuthorityKeyIdentifier(info).ToAsn1Object(); + } + catch (Exception e) + { + throw new InvalidKeyException("can't process key: " + e); + } + } + + /** + * Create an AuthorityKeyIdentifier using the passed in certificate's public + * key, issuer and serial number. + * + * @param certificate the certificate providing the information. + * @throws CertificateParsingException if there is a problem processing the certificate + */ + public AuthorityKeyIdentifierStructure( + X509Certificate certificate) + : base(FromCertificate(certificate)) + { + } + + /** + * Create an AuthorityKeyIdentifier using just the hash of the + * public key. + * + * @param pubKey the key to generate the hash from. + * @throws InvalidKeyException if there is a problem using the key. + */ + public AuthorityKeyIdentifierStructure( + AsymmetricKeyParameter pubKey) + : base(FromKey(pubKey)) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs.meta new file mode 100644 index 00000000..d4e1d50e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: af2f47f3c96c6ec44a641bd715f9bf4e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/AuthorityKeyIdentifierStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs new file mode 100644 index 00000000..3a8f2306 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs @@ -0,0 +1,53 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.Certificates; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension +{ + /** + * A high level subject key identifier. + */ + public class SubjectKeyIdentifierStructure + : SubjectKeyIdentifier + { + /** + * Constructor which will take the byte[] returned from getExtensionValue() + * + * @param encodedValue a DER octet encoded string with the extension structure in it. + * @throws IOException on parsing errors. + */ + public SubjectKeyIdentifierStructure( + Asn1OctetString encodedValue) + : base((Asn1OctetString) X509ExtensionUtilities.FromExtensionValue(encodedValue)) + { + } + + private static Asn1OctetString FromPublicKey( + AsymmetricKeyParameter pubKey) + { + try + { + SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pubKey); + + return (Asn1OctetString) new SubjectKeyIdentifier(info).ToAsn1Object(); + } + catch (Exception e) + { + throw new CertificateParsingException("Exception extracting certificate details: " + e.ToString()); + } + } + + public SubjectKeyIdentifierStructure( + AsymmetricKeyParameter pubKey) + : base(FromPublicKey(pubKey)) + { + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs.meta new file mode 100644 index 00000000..bfc9bb3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 951acd8cb11bc624c9d28b402ada43e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/SubjectKeyIdentifierStructure.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs new file mode 100644 index 00000000..cdc0ac8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs @@ -0,0 +1,31 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension +{ + public class X509ExtensionUtilities + { + public static Asn1Object FromExtensionValue(Asn1OctetString extensionValue) + { + return Asn1Object.FromByteArray(extensionValue.GetOctets()); + } + + /// + /// Extract the value of the given extension, if it exists. + /// + /// The extensions object. + /// The object identifier to obtain. + /// Asn1Object + /// if the extension cannot be read. + public static Asn1Object FromExtensionValue(IX509Extension extensions, DerObjectIdentifier oid) + { + Asn1OctetString extensionValue = extensions.GetExtensionValue(oid); + return extensionValue == null ? null : FromExtensionValue(extensionValue); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs.meta new file mode 100644 index 00000000..b7addac7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 87bd1393b2d90394d99cb837720ca8b8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/extension/X509ExtensionUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store.meta new file mode 100644 index 00000000..4043e1e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c89b8fcb1f5997e45afb97d99ff9d26e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs new file mode 100644 index 00000000..f62311b6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs @@ -0,0 +1,363 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store +{ + /** + * This class is an Selector like implementation to select + * attribute certificates from a given set of criteria. + * + * @see org.bouncycastle.x509.X509AttributeCertificate + * @see org.bouncycastle.x509.X509Store + */ + public class X509AttrCertStoreSelector + : ISelector + { + // TODO: name constraints??? + + private X509V2AttributeCertificate attributeCert; + private DateTime? attributeCertificateValid; + private AttributeCertificateHolder holder; + private AttributeCertificateIssuer issuer; + private BigInteger serialNumber; + private ISet targetNames = new HashSet(); + private ISet targetGroups = new HashSet(); + + public X509AttrCertStoreSelector() + { + } + + private X509AttrCertStoreSelector( + X509AttrCertStoreSelector o) + { + this.attributeCert = o.attributeCert; + this.attributeCertificateValid = o.attributeCertificateValid; + this.holder = o.holder; + this.issuer = o.issuer; + this.serialNumber = o.serialNumber; + this.targetGroups = new HashSet(o.targetGroups); + this.targetNames = new HashSet(o.targetNames); + } + + /// + /// Decides if the given attribute certificate should be selected. + /// + /// The attribute certificate to be checked. + /// true if the object matches this selector. + public bool Match(X509V2AttributeCertificate attrCert) + { + if (attrCert == null) + return false; + + if (this.attributeCert != null && !this.attributeCert.Equals(attrCert)) + return false; + + if (serialNumber != null && !attrCert.SerialNumber.Equals(serialNumber)) + return false; + + if (holder != null && !attrCert.Holder.Equals(holder)) + return false; + + if (issuer != null && !attrCert.Issuer.Equals(issuer)) + return false; + + if (attributeCertificateValid != null && !attrCert.IsValid(attributeCertificateValid.Value)) + return false; + + if (targetNames.Count > 0 || targetGroups.Count > 0) + { + Asn1OctetString targetInfoExt = attrCert.GetExtensionValue( + X509Extensions.TargetInformation); + + if (targetInfoExt != null) + { + TargetInformation targetinfo; + try + { + targetinfo = TargetInformation.GetInstance( + X509ExtensionUtilities.FromExtensionValue(targetInfoExt)); + } + catch (Exception) + { + return false; + } + + Targets[] targetss = targetinfo.GetTargetsObjects(); + + if (targetNames.Count > 0) + { + bool found = false; + + for (int i = 0; i < targetss.Length && !found; i++) + { + Target[] targets = targetss[i].GetTargets(); + + for (int j = 0; j < targets.Length; j++) + { + GeneralName targetName = targets[j].TargetName; + + if (targetName != null && targetNames.Contains(targetName)) + { + found = true; + break; + } + } + } + if (!found) + { + return false; + } + } + + if (targetGroups.Count > 0) + { + bool found = false; + + for (int i = 0; i < targetss.Length && !found; i++) + { + Target[] targets = targetss[i].GetTargets(); + + for (int j = 0; j < targets.Length; j++) + { + GeneralName targetGroup = targets[j].TargetGroup; + + if (targetGroup != null && targetGroups.Contains(targetGroup)) + { + found = true; + break; + } + } + } + + if (!found) + { + return false; + } + } + } + } + + return true; + } + + public object Clone() + { + return new X509AttrCertStoreSelector(this); + } + + /// The attribute certificate which must be matched. + /// If null is given, any will do. + public X509V2AttributeCertificate AttributeCert + { + get { return attributeCert; } + set { this.attributeCert = value; } + } + + /// The criteria for validity + /// If null is given any will do. + public DateTime? AttributeCertificateValid + { + get { return attributeCertificateValid; } + set { this.attributeCertificateValid = value; } + } + + /// The holder. + /// If null is given any will do. + public AttributeCertificateHolder Holder + { + get { return holder; } + set { this.holder = value; } + } + + /// The issuer. + /// If null is given any will do. + public AttributeCertificateIssuer Issuer + { + get { return issuer; } + set { this.issuer = value; } + } + + /// The serial number. + /// If null is given any will do. + public BigInteger SerialNumber + { + get { return serialNumber; } + set { this.serialNumber = value; } + } + + /** + * Adds a target name criterion for the attribute certificate to the target + * information extension criteria. The X509AttributeCertificate + * must contain at least one of the specified target names. + *

    + * Each attribute certificate may contain a target information extension + * limiting the servers where this attribute certificate can be used. If + * this extension is not present, the attribute certificate is not targeted + * and may be accepted by any server. + *

    + * + * @param name The name as a GeneralName (not null) + */ + public void AddTargetName( + GeneralName name) + { + targetNames.Add(name); + } + + /** + * Adds a target name criterion for the attribute certificate to the target + * information extension criteria. The X509AttributeCertificate + * must contain at least one of the specified target names. + *

    + * Each attribute certificate may contain a target information extension + * limiting the servers where this attribute certificate can be used. If + * this extension is not present, the attribute certificate is not targeted + * and may be accepted by any server. + *

    + * + * @param name a byte array containing the name in ASN.1 DER encoded form of a GeneralName + * @throws IOException if a parsing error occurs. + */ + public void AddTargetName(byte[] name) + { + AddTargetName(GeneralName.GetInstance(Asn1Object.FromByteArray(name))); + } + + /** + * Adds a collection with target names criteria. If null is + * given any will do. + *

    + * The collection consists of either GeneralName objects or byte[] arrays representing + * DER encoded GeneralName structures. + *

    + * + * @param names A collection of target names. + * @throws IOException if a parsing error occurs. + * @see #AddTargetName(byte[]) + * @see #AddTargetName(GeneralName) + */ + public void SetTargetNames(IEnumerable names) + { + targetNames = ExtractGeneralNames(names); + } + + /** + * Gets the target names. The collection consists of Lists + * made up of an Integer in the first entry and a DER encoded + * byte array or a String in the second entry. + *

    The returned collection is immutable.

    + * + * @return The collection of target names + * @see #setTargetNames(Collection) + */ + public IEnumerable GetTargetNames() + { + return CollectionUtilities.Proxy(targetNames); + } + + /** + * Adds a target group criterion for the attribute certificate to the target + * information extension criteria. The X509AttributeCertificate + * must contain at least one of the specified target groups. + *

    + * Each attribute certificate may contain a target information extension + * limiting the servers where this attribute certificate can be used. If + * this extension is not present, the attribute certificate is not targeted + * and may be accepted by any server. + *

    + * + * @param group The group as GeneralName form (not null) + */ + public void AddTargetGroup(GeneralName group) + { + targetGroups.Add(group); + } + + /** + * Adds a target group criterion for the attribute certificate to the target + * information extension criteria. The X509AttributeCertificate + * must contain at least one of the specified target groups. + *

    + * Each attribute certificate may contain a target information extension + * limiting the servers where this attribute certificate can be used. If + * this extension is not present, the attribute certificate is not targeted + * and may be accepted by any server. + *

    + * + * @param name a byte array containing the group in ASN.1 DER encoded form of a GeneralName + * @throws IOException if a parsing error occurs. + */ + public void AddTargetGroup(byte[] name) + { + AddTargetGroup(GeneralName.GetInstance(Asn1Object.FromByteArray(name))); + } + + /** + * Adds a collection with target groups criteria. If null is + * given any will do. + *

    + * The collection consists of GeneralName objects or byte[] + * representing DER encoded GeneralNames. + *

    + * + * @param names A collection of target groups. + * @throws IOException if a parsing error occurs. + * @see #AddTargetGroup(byte[]) + * @see #AddTargetGroup(GeneralName) + */ + public void SetTargetGroups(IEnumerable names) + { + targetGroups = ExtractGeneralNames(names); + } + + /** + * Gets the target groups. The collection consists of Lists + * made up of an Integer in the first entry and a DER encoded + * byte array or a String in the second entry. + *

    The returned collection is immutable.

    + * + * @return The collection of target groups. + * @see #setTargetGroups(Collection) + */ + public IEnumerable GetTargetGroups() + { + return CollectionUtilities.Proxy(targetGroups); + } + + private ISet ExtractGeneralNames(IEnumerable names) + { + var result = new HashSet(); + + if (names != null) + { + foreach (object o in names) + { + if (o is GeneralName gn) + { + result.Add(gn); + } + else if (o is byte[] bs) + { + result.Add(GeneralName.GetInstance(Asn1Object.FromByteArray(bs))); + } + else + { + throw new InvalidOperationException(); + } + } + } + + return result; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs.meta new file mode 100644 index 00000000..1fb2d107 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7bdee3bc8eda2544bb064655edb86039 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509AttrCertStoreSelector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs new file mode 100644 index 00000000..6995ed3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs @@ -0,0 +1,92 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store +{ + /// + /// This class is an IX509Selector implementation to select + /// certificate pairs, which are e.g. used for cross certificates. The set of + /// criteria is given from two X509CertStoreSelector objects, + /// each of which, if present, must match the respective component of a pair. + /// + public class X509CertPairStoreSelector + : ISelector + { + private static X509CertStoreSelector CloneSelector( + X509CertStoreSelector s) + { + return s == null ? null : (X509CertStoreSelector) s.Clone(); + } + + private X509CertificatePair certPair; + private X509CertStoreSelector forwardSelector; + private X509CertStoreSelector reverseSelector; + + public X509CertPairStoreSelector() + { + } + + private X509CertPairStoreSelector( + X509CertPairStoreSelector o) + { + this.certPair = o.CertPair; + this.forwardSelector = o.ForwardSelector; + this.reverseSelector = o.ReverseSelector; + } + + /// The certificate pair which is used for testing on equality. + public X509CertificatePair CertPair + { + get { return certPair; } + set { this.certPair = value; } + } + + /// The certificate selector for the forward part. + public X509CertStoreSelector ForwardSelector + { + get { return CloneSelector(forwardSelector); } + set { this.forwardSelector = CloneSelector(value); } + } + + /// The certificate selector for the reverse part. + public X509CertStoreSelector ReverseSelector + { + get { return CloneSelector(reverseSelector); } + set { this.reverseSelector = CloneSelector(value); } + } + + /// + /// Decides if the given certificate pair should be selected. If + /// obj is not a X509CertificatePair, this method + /// returns false. + /// + /// The X509CertificatePair to be tested. + /// true if the object matches this selector. + public bool Match(X509CertificatePair pair) + { + if (pair == null) + return false; + + if (certPair != null && !certPair.Equals(pair)) + return false; + + if (forwardSelector != null && !forwardSelector.Match(pair.Forward)) + return false; + + if (reverseSelector != null && !reverseSelector.Match(pair.Reverse)) + return false; + + return true; + } + + public object Clone() + { + return new X509CertPairStoreSelector(this); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs.meta new file mode 100644 index 00000000..80be8aaf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 28bb652f85dbfbb4ca2c7937b52a7cc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertPairStoreSelector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs new file mode 100644 index 00000000..d186e72e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs @@ -0,0 +1,333 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store +{ + public class X509CertStoreSelector + : ISelector + { + // TODO Missing criteria? + + private byte[] authorityKeyIdentifier; + private int basicConstraints = -1; + private X509Certificate certificate; + private DateTime? certificateValid; + private ISet extendedKeyUsage; + private bool ignoreX509NameOrdering; + private X509Name issuer; + private bool[] keyUsage; + private ISet policy; + private DateTime? privateKeyValid; + private BigInteger serialNumber; + private X509Name subject; + private byte[] subjectKeyIdentifier; + private SubjectPublicKeyInfo subjectPublicKey; + private DerObjectIdentifier subjectPublicKeyAlgID; + + public X509CertStoreSelector() + { + } + + public X509CertStoreSelector( + X509CertStoreSelector o) + { + this.authorityKeyIdentifier = o.AuthorityKeyIdentifier; + this.basicConstraints = o.BasicConstraints; + this.certificate = o.Certificate; + this.certificateValid = o.CertificateValid; + this.extendedKeyUsage = o.ExtendedKeyUsage; + this.ignoreX509NameOrdering = o.IgnoreX509NameOrdering; + this.issuer = o.Issuer; + this.keyUsage = o.KeyUsage; + this.policy = o.Policy; + this.privateKeyValid = o.PrivateKeyValid; + this.serialNumber = o.SerialNumber; + this.subject = o.Subject; + this.subjectKeyIdentifier = o.SubjectKeyIdentifier; + this.subjectPublicKey = o.SubjectPublicKey; + this.subjectPublicKeyAlgID = o.SubjectPublicKeyAlgID; + } + + public virtual object Clone() + { + return new X509CertStoreSelector(this); + } + + public byte[] AuthorityKeyIdentifier + { + get { return Arrays.Clone(authorityKeyIdentifier); } + set { authorityKeyIdentifier = Arrays.Clone(value); } + } + + public int BasicConstraints + { + get { return basicConstraints; } + set + { + if (value < -2) + throw new ArgumentException("value can't be less than -2", "value"); + + basicConstraints = value; + } + } + + public X509Certificate Certificate + { + get { return certificate; } + set { this.certificate = value; } + } + + public DateTime? CertificateValid + { + get { return certificateValid; } + set { certificateValid = value; } + } + + public ISet ExtendedKeyUsage + { + get { return CopySet(extendedKeyUsage); } + set { extendedKeyUsage = CopySet(value); } + } + + public bool IgnoreX509NameOrdering + { + get { return ignoreX509NameOrdering; } + set { this.ignoreX509NameOrdering = value; } + } + + public X509Name Issuer + { + get { return issuer; } + set { issuer = value; } + } + + public bool[] KeyUsage + { + get { return CopyBoolArray(keyUsage); } + set { keyUsage = CopyBoolArray(value); } + } + + /// + /// An ISet of DerObjectIdentifier objects. + /// + public ISet Policy + { + get { return CopySet(policy); } + set { policy = CopySet(value); } + } + + public DateTime? PrivateKeyValid + { + get { return privateKeyValid; } + set { privateKeyValid = value; } + } + + public BigInteger SerialNumber + { + get { return serialNumber; } + set { serialNumber = value; } + } + + public X509Name Subject + { + get { return subject; } + set { subject = value; } + } + + public byte[] SubjectKeyIdentifier + { + get { return Arrays.Clone(subjectKeyIdentifier); } + set { subjectKeyIdentifier = Arrays.Clone(value); } + } + + public SubjectPublicKeyInfo SubjectPublicKey + { + get { return subjectPublicKey; } + set { subjectPublicKey = value; } + } + + public DerObjectIdentifier SubjectPublicKeyAlgID + { + get { return subjectPublicKeyAlgID; } + set { subjectPublicKeyAlgID = value; } + } + + public virtual bool Match(X509Certificate c) + { + if (c == null) + return false; + + if (!MatchExtension(authorityKeyIdentifier, c, X509Extensions.AuthorityKeyIdentifier)) + return false; + + if (basicConstraints != -1) + { + int bc = c.GetBasicConstraints(); + + if (basicConstraints == -2) + { + if (bc != -1) + return false; + } + else + { + if (bc < basicConstraints) + return false; + } + } + + if (certificate != null && !certificate.Equals(c)) + return false; + + if (certificateValid != null && !c.IsValid(certificateValid.Value)) + return false; + + if (extendedKeyUsage != null) + { + var eku = c.GetExtendedKeyUsage(); + + // Note: if no extended key usage set, all key purposes are implicitly allowed + + if (eku != null) + { + foreach (DerObjectIdentifier oid in extendedKeyUsage) + { + if (!eku.Contains(oid)) + return false; + } + } + } + + if (issuer != null && !issuer.Equivalent(c.IssuerDN, !ignoreX509NameOrdering)) + return false; + + if (keyUsage != null) + { + bool[] ku = c.GetKeyUsage(); + + // Note: if no key usage set, all key purposes are implicitly allowed + + if (ku != null) + { + for (int i = 0; i < 9; ++i) + { + if (keyUsage[i] && !ku[i]) + return false; + } + } + } + + if (policy != null) + { + Asn1OctetString extVal = c.GetExtensionValue(X509Extensions.CertificatePolicies); + if (extVal == null) + return false; + + Asn1Sequence certPolicies = Asn1Sequence.GetInstance( + X509ExtensionUtilities.FromExtensionValue(extVal)); + + if (policy.Count < 1 && certPolicies.Count < 1) + return false; + + bool found = false; + foreach (PolicyInformation pi in certPolicies) + { + if (policy.Contains(pi.PolicyIdentifier)) + { + found = true; + break; + } + } + + if (!found) + return false; + } + + if (privateKeyValid != null) + { + Asn1OctetString extVal = c.GetExtensionValue(X509Extensions.PrivateKeyUsagePeriod); + if (extVal == null) + return false; + + PrivateKeyUsagePeriod pkup = PrivateKeyUsagePeriod.GetInstance( + X509ExtensionUtilities.FromExtensionValue(extVal)); + + DateTime dt = privateKeyValid.Value; + DateTime notAfter = pkup.NotAfter.ToDateTime(); + DateTime notBefore = pkup.NotBefore.ToDateTime(); + + if (dt.CompareTo(notAfter) > 0 || dt.CompareTo(notBefore) < 0) + return false; + } + + if (serialNumber != null && !serialNumber.Equals(c.SerialNumber)) + return false; + + if (subject != null && !subject.Equivalent(c.SubjectDN, !ignoreX509NameOrdering)) + return false; + + if (!MatchExtension(subjectKeyIdentifier, c, X509Extensions.SubjectKeyIdentifier)) + return false; + + if (subjectPublicKey != null && !subjectPublicKey.Equals(GetSubjectPublicKey(c))) + return false; + + if (subjectPublicKeyAlgID != null + && !subjectPublicKeyAlgID.Equals(GetSubjectPublicKey(c).AlgorithmID)) + return false; + + return true; + } + + internal static bool IssuersMatch( + X509Name a, + X509Name b) + { + return a == null ? b == null : a.Equivalent(b, true); + } + + private static bool[] CopyBoolArray( + bool[] b) + { + return b == null ? null : (bool[]) b.Clone(); + } + + private static ISet CopySet(ISet s) + { + return s == null ? null : new HashSet(s); + } + + private static SubjectPublicKeyInfo GetSubjectPublicKey( + X509Certificate c) + { + return SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(c.GetPublicKey()); + } + + private static bool MatchExtension( + byte[] b, + X509Certificate c, + DerObjectIdentifier oid) + { + if (b == null) + return true; + + Asn1OctetString extVal = c.GetExtensionValue(oid); + + if (extVal == null) + return false; + + return Arrays.AreEqual(b, extVal.GetOctets()); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs.meta new file mode 100644 index 00000000..0ba60770 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bb199e290ee009e4c85f09252efca980 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CertStoreSelector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs.meta new file mode 100644 index 00000000..f88e808d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d855ab7d925ca4e4fada7aa848fcc7ff +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs.meta new file mode 100644 index 00000000..841022e2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 815aaa87c2529e545adc0740ed315620 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CollectionStoreParameters.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs new file mode 100644 index 00000000..a4fda8be --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs @@ -0,0 +1,283 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Extension; + +namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.X509.Store +{ + public class X509CrlStoreSelector + : ISelector + { + // TODO Missing criteria? + + private X509Certificate certificateChecking; + private DateTime? dateAndTime; + private IList issuers; + private BigInteger maxCrlNumber; + private BigInteger minCrlNumber; + + private X509V2AttributeCertificate attrCertChecking; + private bool completeCrlEnabled; + private bool deltaCrlIndicatorEnabled; + private byte[] issuingDistributionPoint; + private bool issuingDistributionPointEnabled; + private BigInteger maxBaseCrlNumber; + + public X509CrlStoreSelector() + { + } + + public X509CrlStoreSelector( + X509CrlStoreSelector o) + { + this.certificateChecking = o.CertificateChecking; + this.dateAndTime = o.DateAndTime; + this.issuers = o.Issuers; + this.maxCrlNumber = o.MaxCrlNumber; + this.minCrlNumber = o.MinCrlNumber; + + this.deltaCrlIndicatorEnabled = o.DeltaCrlIndicatorEnabled; + this.completeCrlEnabled = o.CompleteCrlEnabled; + this.maxBaseCrlNumber = o.MaxBaseCrlNumber; + this.attrCertChecking = o.AttrCertChecking; + this.issuingDistributionPointEnabled = o.IssuingDistributionPointEnabled; + this.issuingDistributionPoint = o.IssuingDistributionPoint; + } + + public virtual object Clone() + { + return new X509CrlStoreSelector(this); + } + + public X509Certificate CertificateChecking + { + get { return certificateChecking; } + set { certificateChecking = value; } + } + + public DateTime? DateAndTime + { + get { return dateAndTime; } + set { dateAndTime = value; } + } + + /// + /// An ICollection of X509Name objects + /// + public IList Issuers + { + get { return new List(issuers); } + set { issuers = new List(value); } + } + + public BigInteger MaxCrlNumber + { + get { return maxCrlNumber; } + set { maxCrlNumber = value; } + } + + public BigInteger MinCrlNumber + { + get { return minCrlNumber; } + set { minCrlNumber = value; } + } + + /** + * The attribute certificate being checked. This is not a criterion. + * Rather, it is optional information that may help a {@link X509Store} find + * CRLs that would be relevant when checking revocation for the specified + * attribute certificate. If null is specified, then no such + * optional information is provided. + * + * @param attrCert the IX509AttributeCertificate being checked (or + * null) + * @see #getAttrCertificateChecking() + */ + public X509V2AttributeCertificate AttrCertChecking + { + get { return attrCertChecking; } + set { this.attrCertChecking = value; } + } + + /** + * If true only complete CRLs are returned. Defaults to + * false. + * + * @return true if only complete CRLs are returned. + */ + public bool CompleteCrlEnabled + { + get { return completeCrlEnabled; } + set { this.completeCrlEnabled = value; } + } + + /** + * Returns if this selector must match CRLs with the delta CRL indicator + * extension set. Defaults to false. + * + * @return Returns true if only CRLs with the delta CRL + * indicator extension are selected. + */ + public bool DeltaCrlIndicatorEnabled + { + get { return deltaCrlIndicatorEnabled; } + set { this.deltaCrlIndicatorEnabled = value; } + } + + /** + * The issuing distribution point. + *

    + * The issuing distribution point extension is a CRL extension which + * identifies the scope and the distribution point of a CRL. The scope + * contains among others information about revocation reasons contained in + * the CRL. Delta CRLs and complete CRLs must have matching issuing + * distribution points.

    + *

    + * The byte array is cloned to protect against subsequent modifications.

    + *

    + * You must also enable or disable this criteria with + * {@link #setIssuingDistributionPointEnabled(bool)}.

    + * + * @param issuingDistributionPoint The issuing distribution point to set. + * This is the DER encoded OCTET STRING extension value. + * @see #getIssuingDistributionPoint() + */ + public byte[] IssuingDistributionPoint + { + get { return Arrays.Clone(issuingDistributionPoint); } + set { this.issuingDistributionPoint = Arrays.Clone(value); } + } + + /** + * Whether the issuing distribution point criteria should be applied. + * Defaults to false. + *

    + * You may also set the issuing distribution point criteria if not a missing + * issuing distribution point should be assumed.

    + * + * @return Returns if the issuing distribution point check is enabled. + */ + public bool IssuingDistributionPointEnabled + { + get { return issuingDistributionPointEnabled; } + set { this.issuingDistributionPointEnabled = value; } + } + + /** + * The maximum base CRL number. Defaults to null. + * + * @return Returns the maximum base CRL number. + * @see #setMaxBaseCRLNumber(BigInteger) + */ + public BigInteger MaxBaseCrlNumber + { + get { return maxBaseCrlNumber; } + set { this.maxBaseCrlNumber = value; } + } + + public virtual bool Match(X509Crl c) + { + if (c == null) + return false; + + if (dateAndTime != null) + { + DateTime dt = dateAndTime.Value; + DateTime tu = c.ThisUpdate; + DateTime? nu = c.NextUpdate; + + if (dt.CompareTo(tu) < 0 || nu == null || dt.CompareTo(nu.Value) >= 0) + return false; + } + + if (issuers != null) + { + X509Name i = c.IssuerDN; + + bool found = false; + + foreach (X509Name issuer in issuers) + { + if (issuer.Equivalent(i, true)) + { + found = true; + break; + } + } + + if (!found) + return false; + } + + if (maxCrlNumber != null || minCrlNumber != null) + { + Asn1OctetString extVal = c.GetExtensionValue(X509Extensions.CrlNumber); + if (extVal == null) + return false; + + BigInteger cn = CrlNumber.GetInstance( + X509ExtensionUtilities.FromExtensionValue(extVal)).PositiveValue; + + if (maxCrlNumber != null && cn.CompareTo(maxCrlNumber) > 0) + return false; + + if (minCrlNumber != null && cn.CompareTo(minCrlNumber) < 0) + return false; + } + + DerInteger dci = null; + try + { + Asn1OctetString bytes = c.GetExtensionValue(X509Extensions.DeltaCrlIndicator); + if (bytes != null) + { + dci = DerInteger.GetInstance(X509ExtensionUtilities.FromExtensionValue(bytes)); + } + } + catch (Exception) + { + return false; + } + + if (dci == null) + { + if (DeltaCrlIndicatorEnabled) + return false; + } + else + { + if (CompleteCrlEnabled) + return false; + + if (maxBaseCrlNumber != null && dci.PositiveValue.CompareTo(maxBaseCrlNumber) > 0) + return false; + } + + if (issuingDistributionPointEnabled) + { + Asn1OctetString idp = c.GetExtensionValue(X509Extensions.IssuingDistributionPoint); + if (issuingDistributionPoint == null) + { + if (idp != null) + return false; + } + else + { + if (!Arrays.AreEqual(idp.GetOctets(), issuingDistributionPoint)) + return false; + } + } + + return true; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs.meta new file mode 100644 index 00000000..95fdba3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 896c55245b6bb834a87f80b975172b06 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509CrlStoreSelector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs new file mode 100644 index 00000000..0454b349 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs @@ -0,0 +1,3 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs.meta new file mode 100644 index 00000000..7f9d0265 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 515ca18011fd8064db71c583a7e23c3e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/BouncyCastle/x509/store/X509StoreFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression.meta new file mode 100644 index 00000000..952f2491 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 65aa0278748c3c54a827788d1cfa4eb6 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC.meta new file mode 100644 index 00000000..6dd612b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 31083049c3fd37d42a00f27742194a4c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs new file mode 100644 index 00000000..3edd2126 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs @@ -0,0 +1,473 @@ +// CRC32.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2011 Dino Chiesa. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// Last Saved: <2011-August-02 18:25:54> +// +// ------------------------------------------------------------------ +// +// This module defines the CRC32 class, which can do the CRC32 algorithm, using +// arbitrary starting polynomials, and bit reversal. The bit reversal is what +// distinguishes this CRC-32 used in BZip2 from the CRC-32 that is used in PKZIP +// files, or GZIP files. This class does both. +// +// ------------------------------------------------------------------ + + +using System; +using Interop = System.Runtime.InteropServices; + +namespace Best.HTTP.Shared.Compression.Crc +{ + /// + /// Computes a CRC-32. The CRC-32 algorithm is parameterized - you + /// can set the polynomial and enable or disable bit + /// reversal. This can be used for GZIP, BZip2, or ZIP. + /// + /// + /// This type is used internally by DotNetZip; it is generally not used + /// directly by applications wishing to create, read, or manipulate zip + /// archive files. + /// + + public class CRC32 + { + /// + /// Indicates the total number of bytes applied to the CRC. + /// + public Int64 TotalBytesRead + { + get + { + return _TotalBytesRead; + } + } + + /// + /// Indicates the current CRC for all blocks slurped in. + /// + public Int32 Crc32Result + { + get + { + return unchecked((Int32)(~_register)); + } + } + + /// + /// Returns the CRC32 for the specified stream. + /// + /// The stream over which to calculate the CRC32 + /// the CRC32 calculation + public Int32 GetCrc32(System.IO.Stream input) + { + return GetCrc32AndCopy(input, null); + } + + /// + /// Returns the CRC32 for the specified stream, and writes the input into the + /// output stream. + /// + /// The stream over which to calculate the CRC32 + /// The stream into which to deflate the input + /// the CRC32 calculation + public Int32 GetCrc32AndCopy(System.IO.Stream input, System.IO.Stream output) + { + if (input == null) + throw new Exception("The input stream must not be null."); + + unchecked + { + byte[] buffer = new byte[BUFFER_SIZE]; + int readSize = BUFFER_SIZE; + + _TotalBytesRead = 0; + int count = input.Read(buffer, 0, readSize); + if (output != null) output.Write(buffer, 0, count); + _TotalBytesRead += count; + while (count > 0) + { + SlurpBlock(buffer, 0, count); + count = input.Read(buffer, 0, readSize); + if (output != null) output.Write(buffer, 0, count); + _TotalBytesRead += count; + } + + return (Int32)(~_register); + } + } + + + /// + /// Get the CRC32 for the given (word,byte) combo. This is a + /// computation defined by PKzip for PKZIP 2.0 (weak) encryption. + /// + /// The word to start with. + /// The byte to combine it with. + /// The CRC-ized result. + public Int32 ComputeCrc32(Int32 W, byte B) + { + return _InternalComputeCrc32((UInt32)W, B); + } + + internal Int32 _InternalComputeCrc32(UInt32 W, byte B) + { + return (Int32)(crc32Table[(W ^ B) & 0xFF] ^ (W >> 8)); + } + + + /// + /// Update the value for the running CRC32 using the given block of bytes. + /// This is useful when using the CRC32() class in a Stream. + /// + /// block of bytes to slurp + /// starting point in the block + /// how many bytes within the block to slurp + public void SlurpBlock(byte[] block, int offset, int count) + { + if (block == null) + throw new Exception("The data buffer must not be null."); + + // bzip algorithm + for (int i = 0; i < count; i++) + { + int x = offset + i; + byte b = block[x]; + if (this.reverseBits) + { + UInt32 temp = (_register >> 24) ^ b; + _register = (_register << 8) ^ crc32Table[temp]; + } + else + { + UInt32 temp = (_register & 0x000000FF) ^ b; + _register = (_register >> 8) ^ crc32Table[temp]; + } + } + _TotalBytesRead += count; + } + + + /// + /// Process one byte in the CRC. + /// + /// the byte to include into the CRC . + public void UpdateCRC(byte b) + { + if (this.reverseBits) + { + UInt32 temp = (_register >> 24) ^ b; + _register = (_register << 8) ^ crc32Table[temp]; + } + else + { + UInt32 temp = (_register & 0x000000FF) ^ b; + _register = (_register >> 8) ^ crc32Table[temp]; + } + } + + /// + /// Process a run of N identical bytes into the CRC. + /// + /// + /// + /// This method serves as an optimization for updating the CRC when a + /// run of identical bytes is found. Rather than passing in a buffer of + /// length n, containing all identical bytes b, this method accepts the + /// byte value and the length of the (virtual) buffer - the length of + /// the run. + /// + /// + /// the byte to include into the CRC. + /// the number of times that byte should be repeated. + public void UpdateCRC(byte b, int n) + { + while (n-- > 0) + { + if (this.reverseBits) + { + uint temp = (_register >> 24) ^ b; + _register = (_register << 8) ^ crc32Table[(temp >= 0) + ? temp + : (temp + 256)]; + } + else + { + UInt32 temp = (_register & 0x000000FF) ^ b; + _register = (_register >> 8) ^ crc32Table[(temp >= 0) + ? temp + : (temp + 256)]; + + } + } + } + + + + private static uint ReverseBits(uint data) + { + unchecked + { + uint ret = data; + ret = (ret & 0x55555555) << 1 | (ret >> 1) & 0x55555555; + ret = (ret & 0x33333333) << 2 | (ret >> 2) & 0x33333333; + ret = (ret & 0x0F0F0F0F) << 4 | (ret >> 4) & 0x0F0F0F0F; + ret = (ret << 24) | ((ret & 0xFF00) << 8) | ((ret >> 8) & 0xFF00) | (ret >> 24); + return ret; + } + } + + private static byte ReverseBits(byte data) + { + unchecked + { + uint u = (uint)data * 0x00020202; + uint m = 0x01044010; + uint s = u & m; + uint t = (u << 2) & (m << 1); + return (byte)((0x01001001 * (s + t)) >> 24); + } + } + + + + private void GenerateLookupTable() + { + crc32Table = new UInt32[256]; + unchecked + { + UInt32 dwCrc; + byte i = 0; + do + { + dwCrc = i; + for (byte j = 8; j > 0; j--) + { + if ((dwCrc & 1) == 1) + { + dwCrc = (dwCrc >> 1) ^ dwPolynomial; + } + else + { + dwCrc >>= 1; + } + } + if (reverseBits) + { + crc32Table[ReverseBits(i)] = ReverseBits(dwCrc); + } + else + { + crc32Table[i] = dwCrc; + } + i++; + } while (i!=0); + } + +#if VERBOSE + Console.WriteLine(); + Console.WriteLine("private static readonly UInt32[] crc32Table = {"); + for (int i = 0; i < crc32Table.Length; i+=4) + { + Console.Write(" "); + for (int j=0; j < 4; j++) + { + Console.Write(" 0x{0:X8}U,", crc32Table[i+j]); + } + Console.WriteLine(); + } + Console.WriteLine("};"); + Console.WriteLine(); +#endif + } + + + private uint gf2_matrix_times(uint[] matrix, uint vec) + { + uint sum = 0; + int i=0; + while (vec != 0) + { + if ((vec & 0x01)== 0x01) + sum ^= matrix[i]; + vec >>= 1; + i++; + } + return sum; + } + + private void gf2_matrix_square(uint[] square, uint[] mat) + { + for (int i = 0; i < 32; i++) + square[i] = gf2_matrix_times(mat, mat[i]); + } + + + + /// + /// Combines the given CRC32 value with the current running total. + /// + /// + /// This is useful when using a divide-and-conquer approach to + /// calculating a CRC. Multiple threads can each calculate a + /// CRC32 on a segment of the data, and then combine the + /// individual CRC32 values at the end. + /// + /// the crc value to be combined with this one + /// the length of data the CRC value was calculated on + public void Combine(int crc, int length) + { + uint[] even = new uint[32]; // even-power-of-two zeros operator + uint[] odd = new uint[32]; // odd-power-of-two zeros operator + + if (length == 0) + return; + + uint crc1= ~_register; + uint crc2= (uint) crc; + + // put operator for one zero bit in odd + odd[0] = this.dwPolynomial; // the CRC-32 polynomial + uint row = 1; + for (int i = 1; i < 32; i++) + { + odd[i] = row; + row <<= 1; + } + + // put operator for two zero bits in even + gf2_matrix_square(even, odd); + + // put operator for four zero bits in odd + gf2_matrix_square(odd, even); + + uint len2 = (uint) length; + + // apply len2 zeros to crc1 (first square will put the operator for one + // zero byte, eight zero bits, in even) + do { + // apply zeros operator for this bit of len2 + gf2_matrix_square(even, odd); + + if ((len2 & 1)== 1) + crc1 = gf2_matrix_times(even, crc1); + len2 >>= 1; + + if (len2 == 0) + break; + + // another iteration of the loop with odd and even swapped + gf2_matrix_square(odd, even); + if ((len2 & 1)==1) + crc1 = gf2_matrix_times(odd, crc1); + len2 >>= 1; + + + } while (len2 != 0); + + crc1 ^= crc2; + + _register= ~crc1; + + //return (int) crc1; + return; + } + + + /// + /// Create an instance of the CRC32 class using the default settings: no + /// bit reversal, and a polynomial of 0xEDB88320. + /// + public CRC32() : this(false) + { + } + + /// + /// Create an instance of the CRC32 class, specifying whether to reverse + /// data bits or not. + /// + /// + /// specify true if the instance should reverse data bits. + /// + /// + /// + /// In the CRC-32 used by BZip2, the bits are reversed. Therefore if you + /// want a CRC32 with compatibility with BZip2, you should pass true + /// here. In the CRC-32 used by GZIP and PKZIP, the bits are not + /// reversed; Therefore if you want a CRC32 with compatibility with + /// those, you should pass false. + /// + /// + public CRC32(bool reverseBits) : + this( unchecked((int)0xEDB88320), reverseBits) + { + } + + + /// + /// Create an instance of the CRC32 class, specifying the polynomial and + /// whether to reverse data bits or not. + /// + /// + /// The polynomial to use for the CRC, expressed in the reversed (LSB) + /// format: the highest ordered bit in the polynomial value is the + /// coefficient of the 0th power; the second-highest order bit is the + /// coefficient of the 1 power, and so on. Expressed this way, the + /// polynomial for the CRC-32C used in IEEE 802.3, is 0xEDB88320. + /// + /// + /// specify true if the instance should reverse data bits. + /// + /// + /// + /// + /// In the CRC-32 used by BZip2, the bits are reversed. Therefore if you + /// want a CRC32 with compatibility with BZip2, you should pass true + /// here for the reverseBits parameter. In the CRC-32 used by + /// GZIP and PKZIP, the bits are not reversed; Therefore if you want a + /// CRC32 with compatibility with those, you should pass false for the + /// reverseBits parameter. + /// + /// + public CRC32(int polynomial, bool reverseBits) + { + this.reverseBits = reverseBits; + this.dwPolynomial = (uint) polynomial; + this.GenerateLookupTable(); + } + + /// + /// Reset the CRC-32 class - clear the CRC "remainder register." + /// + /// + /// + /// Use this when employing a single instance of this class to compute + /// multiple, distinct CRCs on multiple, distinct data blocks. + /// + /// + public void Reset() + { + _register = 0xFFFFFFFFU; + } + + // private member vars + private UInt32 dwPolynomial; + private Int64 _TotalBytesRead; + private bool reverseBits; + private UInt32[] crc32Table; + private const int BUFFER_SIZE = 8192; + private UInt32 _register = 0xFFFFFFFFU; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs.meta new file mode 100644 index 00000000..bcc5849f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a8d1a7c03c7c65d42a1cdbbc8dfd2729 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/CRC/CRC32.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib.meta new file mode 100644 index 00000000..fb7ede01 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3ba7197e0714cc748ac84c4f857e7793 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs new file mode 100644 index 00000000..c7402dbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs @@ -0,0 +1,1883 @@ +// Deflate.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2011-August-03 19:52:15> +// +// ------------------------------------------------------------------ +// +// This module defines logic for handling the Deflate or compression. +// +// This code is based on multiple sources: +// - the original zlib v1.2.3 source, which is Copyright (C) 1995-2005 Jean-loup Gailly. +// - the original jzlib, which is Copyright (c) 2000-2003 ymnk, JCraft,Inc. +// +// However, this code is significantly different from both. +// The object model is not the same, and many of the behaviors are different. +// +// In keeping with the license for these other works, the copyrights for +// jzlib and zlib are here. +// +// ----------------------------------------------------------------------- +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + +using System; + +#pragma warning disable 0675 + +namespace Best.HTTP.Shared.Compression.Zlib +{ + + internal enum BlockState + { + NeedMore = 0, // block not completed, need more input or more output + BlockDone, // block flush performed + FinishStarted, // finish started, need only more output at next deflate + FinishDone // finish done, accept no more input or output + } + + internal enum DeflateFlavor + { + Store, + Fast, + Slow + } + + internal sealed class DeflateManager + { + private static readonly int MEM_LEVEL_MAX = 9; + private static readonly int MEM_LEVEL_DEFAULT = 8; + + internal delegate BlockState CompressFunc(FlushType flush); + + internal class Config + { + // Use a faster search when the previous match is longer than this + internal int GoodLength; // reduce lazy search above this match length + + // Attempt to find a better match only when the current match is + // strictly smaller than this value. This mechanism is used only for + // compression levels >= 4. For levels 1,2,3: MaxLazy is actually + // MaxInsertLength. (See DeflateFast) + + internal int MaxLazy; // do not perform lazy search above this match length + + internal int NiceLength; // quit search above this match length + + // To speed up deflation, hash chains are never searched beyond this + // length. A higher limit improves compression ratio but degrades the speed. + + internal int MaxChainLength; + + internal DeflateFlavor Flavor; + + private Config(int goodLength, int maxLazy, int niceLength, int maxChainLength, DeflateFlavor flavor) + { + this.GoodLength = goodLength; + this.MaxLazy = maxLazy; + this.NiceLength = niceLength; + this.MaxChainLength = maxChainLength; + this.Flavor = flavor; + } + + public static Config Lookup(CompressionLevel level) + { + return Table[(int)level]; + } + + + static Config() + { + Table = new Config[] { + new Config(0, 0, 0, 0, DeflateFlavor.Store), + new Config(4, 4, 8, 4, DeflateFlavor.Fast), + new Config(4, 5, 16, 8, DeflateFlavor.Fast), + new Config(4, 6, 32, 32, DeflateFlavor.Fast), + + new Config(4, 4, 16, 16, DeflateFlavor.Slow), + new Config(8, 16, 32, 32, DeflateFlavor.Slow), + new Config(8, 16, 128, 128, DeflateFlavor.Slow), + new Config(8, 32, 128, 256, DeflateFlavor.Slow), + new Config(32, 128, 258, 1024, DeflateFlavor.Slow), + new Config(32, 258, 258, 4096, DeflateFlavor.Slow), + }; + } + + private static readonly Config[] Table; + } + + + private CompressFunc DeflateFunction; + + private static readonly System.String[] _ErrorMessage = new System.String[] + { + "need dictionary", + "stream end", + "", + "file error", + "stream error", + "data error", + "insufficient memory", + "buffer error", + "incompatible version", + "" + }; + + // preset dictionary flag in zlib header + private static readonly int PRESET_DICT = 0x20; + + private static readonly int INIT_STATE = 42; + private static readonly int BUSY_STATE = 113; + private static readonly int FINISH_STATE = 666; + + // The deflate compression method + private static readonly int Z_DEFLATED = 8; + + private static readonly int STORED_BLOCK = 0; + private static readonly int STATIC_TREES = 1; + private static readonly int DYN_TREES = 2; + + // The three kinds of block type + private static readonly int Z_BINARY = 0; + private static readonly int Z_ASCII = 1; + private static readonly int Z_UNKNOWN = 2; + + private static readonly int Buf_size = 8 * 2; + + private static readonly int MIN_MATCH = 3; + private static readonly int MAX_MATCH = 258; + + private static readonly int MIN_LOOKAHEAD = (MAX_MATCH + MIN_MATCH + 1); + + private static readonly int HEAP_SIZE = (2 * InternalConstants.L_CODES + 1); + + private static readonly int END_BLOCK = 256; + + internal ZlibCodec _codec; // the zlib encoder/decoder + internal int status; // as the name implies + internal byte[] pending; // output still pending - waiting to be compressed + internal int nextPending; // index of next pending byte to output to the stream + internal int pendingCount; // number of bytes in the pending buffer + + internal sbyte data_type; // UNKNOWN, BINARY or ASCII + internal int last_flush; // value of flush param for previous deflate call + + internal int w_size; // LZ77 window size (32K by default) + internal int w_bits; // log2(w_size) (8..16) + internal int w_mask; // w_size - 1 + + //internal byte[] dictionary; + internal byte[] window; + + // Sliding window. Input bytes are read into the second half of the window, + // and move to the first half later to keep a dictionary of at least wSize + // bytes. With this organization, matches are limited to a distance of + // wSize-MAX_MATCH bytes, but this ensures that IO is always + // performed with a length multiple of the block size. + // + // To do: use the user input buffer as sliding window. + + internal int window_size; + // Actual size of window: 2*wSize, except when the user input buffer + // is directly used as sliding window. + + internal short[] prev; + // Link to older string with same hash index. To limit the size of this + // array to 64K, this link is maintained only for the last 32K strings. + // An index in this array is thus a window index modulo 32K. + + internal short[] head; // Heads of the hash chains or NIL. + + internal int ins_h; // hash index of string to be inserted + internal int hash_size; // number of elements in hash table + internal int hash_bits; // log2(hash_size) + internal int hash_mask; // hash_size-1 + + // Number of bits by which ins_h must be shifted at each input + // step. It must be such that after MIN_MATCH steps, the oldest + // byte no longer takes part in the hash key, that is: + // hash_shift * MIN_MATCH >= hash_bits + internal int hash_shift; + + // Window position at the beginning of the current output block. Gets + // negative when the window is moved backwards. + + internal int block_start; + + Config config; + internal int match_length; // length of best match + internal int prev_match; // previous match + internal int match_available; // set if previous match exists + internal int strstart; // start of string to insert into.....???? + internal int match_start; // start of matching string + internal int lookahead; // number of valid bytes ahead in window + + // Length of the best match at previous step. Matches not greater than this + // are discarded. This is used in the lazy match evaluation. + internal int prev_length; + + // Insert new strings in the hash table only if the match length is not + // greater than this length. This saves time but degrades compression. + // max_insert_length is used only for compression levels <= 3. + + internal CompressionLevel compressionLevel; // compression level (1..9) + internal CompressionStrategy compressionStrategy; // favor or force Huffman coding + + + internal short[] dyn_ltree; // literal and length tree + internal short[] dyn_dtree; // distance tree + internal short[] bl_tree; // Huffman tree for bit lengths + + internal ZTree treeLiterals = new ZTree(); // desc for literal tree + internal ZTree treeDistances = new ZTree(); // desc for distance tree + internal ZTree treeBitLengths = new ZTree(); // desc for bit length tree + + // number of codes at each bit length for an optimal tree + internal short[] bl_count = new short[InternalConstants.MAX_BITS + 1]; + + // heap used to build the Huffman trees + internal int[] heap = new int[2 * InternalConstants.L_CODES + 1]; + + internal int heap_len; // number of elements in the heap + internal int heap_max; // element of largest frequency + + // The sons of heap[n] are heap[2*n] and heap[2*n+1]. heap[0] is not used. + // The same heap array is used to build all trees. + + // Depth of each subtree used as tie breaker for trees of equal frequency + internal sbyte[] depth = new sbyte[2 * InternalConstants.L_CODES + 1]; + + internal int _lengthOffset; // index for literals or lengths + + + // Size of match buffer for literals/lengths. There are 4 reasons for + // limiting lit_bufsize to 64K: + // - frequencies can be kept in 16 bit counters + // - if compression is not successful for the first block, all input + // data is still in the window so we can still emit a stored block even + // when input comes from standard input. (This can also be done for + // all blocks if lit_bufsize is not greater than 32K.) + // - if compression is not successful for a file smaller than 64K, we can + // even emit a stored file instead of a stored block (saving 5 bytes). + // This is applicable only for zip (not gzip or zlib). + // - creating new Huffman trees less frequently may not provide fast + // adaptation to changes in the input data statistics. (Take for + // example a binary file with poorly compressible code followed by + // a highly compressible string table.) Smaller buffer sizes give + // fast adaptation but have of course the overhead of transmitting + // trees more frequently. + + internal int lit_bufsize; + + internal int last_lit; // running index in l_buf + + // Buffer for distances. To simplify the code, d_buf and l_buf have + // the same number of elements. To use different lengths, an extra flag + // array would be necessary. + + internal int _distanceOffset; // index into pending; points to distance data?? + + internal int opt_len; // bit length of current block with optimal trees + internal int static_len; // bit length of current block with static trees + internal int matches; // number of string matches in current block + internal int last_eob_len; // bit length of EOB code for last block + + // Output buffer. bits are inserted starting at the bottom (least + // significant bits). + internal short bi_buf; + + // Number of valid bits in bi_buf. All bits above the last valid bit + // are always zero. + internal int bi_valid; + + + internal DeflateManager() + { + dyn_ltree = new short[HEAP_SIZE * 2]; + dyn_dtree = new short[(2 * InternalConstants.D_CODES + 1) * 2]; // distance tree + bl_tree = new short[(2 * InternalConstants.BL_CODES + 1) * 2]; // Huffman tree for bit lengths + } + + + // lm_init + private void _InitializeLazyMatch() + { + window_size = 2 * w_size; + + // clear the hash - workitem 9063 + Array.Clear(head, 0, hash_size); + //for (int i = 0; i < hash_size; i++) head[i] = 0; + + config = Config.Lookup(compressionLevel); + SetDeflater(); + + strstart = 0; + block_start = 0; + lookahead = 0; + match_length = prev_length = MIN_MATCH - 1; + match_available = 0; + ins_h = 0; + } + + // Initialize the tree data structures for a new zlib stream. + private void _InitializeTreeData() + { + treeLiterals.dyn_tree = dyn_ltree; + treeLiterals.staticTree = StaticTree.Literals; + + treeDistances.dyn_tree = dyn_dtree; + treeDistances.staticTree = StaticTree.Distances; + + treeBitLengths.dyn_tree = bl_tree; + treeBitLengths.staticTree = StaticTree.BitLengths; + + bi_buf = 0; + bi_valid = 0; + last_eob_len = 8; // enough lookahead for inflate + + // Initialize the first block of the first file: + _InitializeBlocks(); + } + + internal void _InitializeBlocks() + { + // Initialize the trees. + for (int i = 0; i < InternalConstants.L_CODES; i++) + dyn_ltree[i * 2] = 0; + for (int i = 0; i < InternalConstants.D_CODES; i++) + dyn_dtree[i * 2] = 0; + for (int i = 0; i < InternalConstants.BL_CODES; i++) + bl_tree[i * 2] = 0; + + dyn_ltree[END_BLOCK * 2] = 1; + opt_len = static_len = 0; + last_lit = matches = 0; + } + + // Restore the heap property by moving down the tree starting at node k, + // exchanging a node with the smallest of its two sons if necessary, stopping + // when the heap property is re-established (each father smaller than its + // two sons). + internal void pqdownheap(short[] tree, int k) + { + int v = heap[k]; + int j = k << 1; // left son of k + while (j <= heap_len) + { + // Set j to the smallest of the two sons: + if (j < heap_len && _IsSmaller(tree, heap[j + 1], heap[j], depth)) + { + j++; + } + // Exit if v is smaller than both sons + if (_IsSmaller(tree, v, heap[j], depth)) + break; + + // Exchange v with the smallest son + heap[k] = heap[j]; k = j; + // And continue down the tree, setting j to the left son of k + j <<= 1; + } + heap[k] = v; + } + + internal static bool _IsSmaller(short[] tree, int n, int m, sbyte[] depth) + { + short tn2 = tree[n * 2]; + short tm2 = tree[m * 2]; + return (tn2 < tm2 || (tn2 == tm2 && depth[n] <= depth[m])); + } + + + // Scan a literal or distance tree to determine the frequencies of the codes + // in the bit length tree. + internal void scan_tree(short[] tree, int max_code) + { + int n; // iterates over all tree elements + int prevlen = -1; // last emitted length + int curlen; // length of current code + int nextlen = (int)tree[0 * 2 + 1]; // length of next code + int count = 0; // repeat count of the current code + int max_count = 7; // max repeat count + int min_count = 4; // min repeat count + + if (nextlen == 0) + { + max_count = 138; min_count = 3; + } + tree[(max_code + 1) * 2 + 1] = (short)0x7fff; // guard //?? + + for (n = 0; n <= max_code; n++) + { + curlen = nextlen; nextlen = (int)tree[(n + 1) * 2 + 1]; + if (++count < max_count && curlen == nextlen) + { + continue; + } + else if (count < min_count) + { + bl_tree[curlen * 2] = (short)(bl_tree[curlen * 2] + count); + } + else if (curlen != 0) + { + if (curlen != prevlen) + bl_tree[curlen * 2]++; + bl_tree[InternalConstants.REP_3_6 * 2]++; + } + else if (count <= 10) + { + bl_tree[InternalConstants.REPZ_3_10 * 2]++; + } + else + { + bl_tree[InternalConstants.REPZ_11_138 * 2]++; + } + count = 0; prevlen = curlen; + if (nextlen == 0) + { + max_count = 138; min_count = 3; + } + else if (curlen == nextlen) + { + max_count = 6; min_count = 3; + } + else + { + max_count = 7; min_count = 4; + } + } + } + + // Construct the Huffman tree for the bit lengths and return the index in + // bl_order of the last bit length code to send. + internal int build_bl_tree() + { + int max_blindex; // index of last bit length code of non zero freq + + // Determine the bit length frequencies for literal and distance trees + scan_tree(dyn_ltree, treeLiterals.max_code); + scan_tree(dyn_dtree, treeDistances.max_code); + + // Build the bit length tree: + treeBitLengths.build_tree(this); + // opt_len now includes the length of the tree representations, except + // the lengths of the bit lengths codes and the 5+5+4 bits for the counts. + + // Determine the number of bit length codes to send. The pkzip format + // requires that at least 4 bit length codes be sent. (appnote.txt says + // 3 but the actual value used is 4.) + for (max_blindex = InternalConstants.BL_CODES - 1; max_blindex >= 3; max_blindex--) + { + if (bl_tree[ZTree.bl_order[max_blindex] * 2 + 1] != 0) + break; + } + // Update opt_len to include the bit length tree and counts + opt_len += 3 * (max_blindex + 1) + 5 + 5 + 4; + + return max_blindex; + } + + + // Send the header for a block using dynamic Huffman trees: the counts, the + // lengths of the bit length codes, the literal tree and the distance tree. + // IN assertion: lcodes >= 257, dcodes >= 1, blcodes >= 4. + internal void send_all_trees(int lcodes, int dcodes, int blcodes) + { + int rank; // index in bl_order + + send_bits(lcodes - 257, 5); // not +255 as stated in appnote.txt + send_bits(dcodes - 1, 5); + send_bits(blcodes - 4, 4); // not -3 as stated in appnote.txt + for (rank = 0; rank < blcodes; rank++) + { + send_bits(bl_tree[ZTree.bl_order[rank] * 2 + 1], 3); + } + send_tree(dyn_ltree, lcodes - 1); // literal tree + send_tree(dyn_dtree, dcodes - 1); // distance tree + } + + // Send a literal or distance tree in compressed form, using the codes in + // bl_tree. + internal void send_tree(short[] tree, int max_code) + { + int n; // iterates over all tree elements + int prevlen = -1; // last emitted length + int curlen; // length of current code + int nextlen = tree[0 * 2 + 1]; // length of next code + int count = 0; // repeat count of the current code + int max_count = 7; // max repeat count + int min_count = 4; // min repeat count + + if (nextlen == 0) + { + max_count = 138; min_count = 3; + } + + for (n = 0; n <= max_code; n++) + { + curlen = nextlen; nextlen = tree[(n + 1) * 2 + 1]; + if (++count < max_count && curlen == nextlen) + { + continue; + } + else if (count < min_count) + { + do + { + send_code(curlen, bl_tree); + } + while (--count != 0); + } + else if (curlen != 0) + { + if (curlen != prevlen) + { + send_code(curlen, bl_tree); count--; + } + send_code(InternalConstants.REP_3_6, bl_tree); + send_bits(count - 3, 2); + } + else if (count <= 10) + { + send_code(InternalConstants.REPZ_3_10, bl_tree); + send_bits(count - 3, 3); + } + else + { + send_code(InternalConstants.REPZ_11_138, bl_tree); + send_bits(count - 11, 7); + } + count = 0; prevlen = curlen; + if (nextlen == 0) + { + max_count = 138; min_count = 3; + } + else if (curlen == nextlen) + { + max_count = 6; min_count = 3; + } + else + { + max_count = 7; min_count = 4; + } + } + } + + // Output a block of bytes on the stream. + // IN assertion: there is enough room in pending_buf. + private void put_bytes(byte[] p, int start, int len) + { + Array.Copy(p, start, pending, pendingCount, len); + pendingCount += len; + } + +#if NOTNEEDED + private void put_byte(byte c) + { + pending[pendingCount++] = c; + } + internal void put_short(int b) + { + unchecked + { + pending[pendingCount++] = (byte)b; + pending[pendingCount++] = (byte)(b >> 8); + } + } + internal void putShortMSB(int b) + { + unchecked + { + pending[pendingCount++] = (byte)(b >> 8); + pending[pendingCount++] = (byte)b; + } + } +#endif + + internal void send_code(int c, short[] tree) + { + int c2 = c * 2; + send_bits((tree[c2] & 0xffff), (tree[c2 + 1] & 0xffff)); + } + + internal void send_bits(int value, int length) + { + int len = length; + unchecked + { + if (bi_valid > (int)Buf_size - len) + { + //int val = value; + // bi_buf |= (val << bi_valid); + + bi_buf |= (short)((value << bi_valid) & 0xffff); + //put_short(bi_buf); + pending[pendingCount++] = (byte)bi_buf; + pending[pendingCount++] = (byte)(bi_buf >> 8); + + + bi_buf = (short)((uint)value >> (Buf_size - bi_valid)); + bi_valid += len - Buf_size; + } + else + { + // bi_buf |= (value) << bi_valid; + bi_buf |= (short)((value << bi_valid) & 0xffff); + bi_valid += len; + } + } + } + + // Send one empty static block to give enough lookahead for inflate. + // This takes 10 bits, of which 7 may remain in the bit buffer. + // The current inflate code requires 9 bits of lookahead. If the + // last two codes for the previous block (real code plus EOB) were coded + // on 5 bits or less, inflate may have only 5+3 bits of lookahead to decode + // the last real code. In this case we send two empty static blocks instead + // of one. (There are no problems if the previous block is stored or fixed.) + // To simplify the code, we assume the worst case of last real code encoded + // on one bit only. + internal void _tr_align() + { + send_bits(STATIC_TREES << 1, 3); + send_code(END_BLOCK, StaticTree.lengthAndLiteralsTreeCodes); + + bi_flush(); + + // Of the 10 bits for the empty block, we have already sent + // (10 - bi_valid) bits. The lookahead for the last real code (before + // the EOB of the previous block) was thus at least one plus the length + // of the EOB plus what we have just sent of the empty static block. + if (1 + last_eob_len + 10 - bi_valid < 9) + { + send_bits(STATIC_TREES << 1, 3); + send_code(END_BLOCK, StaticTree.lengthAndLiteralsTreeCodes); + bi_flush(); + } + last_eob_len = 7; + } + + + // Save the match info and tally the frequency counts. Return true if + // the current block must be flushed. + internal bool _tr_tally(int dist, int lc) + { + pending[_distanceOffset + last_lit * 2] = unchecked((byte) ( (uint)dist >> 8 ) ); + pending[_distanceOffset + last_lit * 2 + 1] = unchecked((byte)dist); + pending[_lengthOffset + last_lit] = unchecked((byte)lc); + last_lit++; + + if (dist == 0) + { + // lc is the unmatched char + dyn_ltree[lc * 2]++; + } + else + { + matches++; + // Here, lc is the match length - MIN_MATCH + dist--; // dist = match distance - 1 + dyn_ltree[(ZTree.LengthCode[lc] + InternalConstants.LITERALS + 1) * 2]++; + dyn_dtree[ZTree.DistanceCode(dist) * 2]++; + } + + if ((last_lit & 0x1fff) == 0 && (int)compressionLevel > 2) + { + // Compute an upper bound for the compressed length + int out_length = last_lit << 3; + int in_length = strstart - block_start; + int dcode; + for (dcode = 0; dcode < InternalConstants.D_CODES; dcode++) + { + out_length = (int)(out_length + (int)dyn_dtree[dcode * 2] * (5L + ZTree.ExtraDistanceBits[dcode])); + } + out_length >>= 3; + if ((matches < (last_lit / 2)) && out_length < in_length / 2) + return true; + } + + return (last_lit == lit_bufsize - 1) || (last_lit == lit_bufsize); + // dinoch - wraparound? + // We avoid equality with lit_bufsize because of wraparound at 64K + // on 16 bit machines and because stored blocks are restricted to + // 64K-1 bytes. + } + + + + // Send the block data compressed using the given Huffman trees + internal void send_compressed_block(short[] ltree, short[] dtree) + { + int distance; // distance of matched string + int lc; // match length or unmatched char (if dist == 0) + int lx = 0; // running index in l_buf + int code; // the code to send + int extra; // number of extra bits to send + + if (last_lit != 0) + { + do + { + int ix = _distanceOffset + lx * 2; + distance = ((pending[ix] << 8) & 0xff00) | + (pending[ix + 1] & 0xff); + lc = (pending[_lengthOffset + lx]) & 0xff; + lx++; + + if (distance == 0) + { + send_code(lc, ltree); // send a literal byte + } + else + { + // literal or match pair + // Here, lc is the match length - MIN_MATCH + code = ZTree.LengthCode[lc]; + + // send the length code + send_code(code + InternalConstants.LITERALS + 1, ltree); + extra = ZTree.ExtraLengthBits[code]; + if (extra != 0) + { + // send the extra length bits + lc -= ZTree.LengthBase[code]; + send_bits(lc, extra); + } + distance--; // dist is now the match distance - 1 + code = ZTree.DistanceCode(distance); + + // send the distance code + send_code(code, dtree); + + extra = ZTree.ExtraDistanceBits[code]; + if (extra != 0) + { + // send the extra distance bits + distance -= ZTree.DistanceBase[code]; + send_bits(distance, extra); + } + } + + // Check that the overlay between pending and d_buf+l_buf is ok: + } + while (lx < last_lit); + } + + send_code(END_BLOCK, ltree); + last_eob_len = ltree[END_BLOCK * 2 + 1]; + } + + + + // Set the data type to ASCII or BINARY, using a crude approximation: + // binary if more than 20% of the bytes are <= 6 or >= 128, ascii otherwise. + // IN assertion: the fields freq of dyn_ltree are set and the total of all + // frequencies does not exceed 64K (to fit in an int on 16 bit machines). + internal void set_data_type() + { + int n = 0; + int ascii_freq = 0; + int bin_freq = 0; + while (n < 7) + { + bin_freq += dyn_ltree[n * 2]; n++; + } + while (n < 128) + { + ascii_freq += dyn_ltree[n * 2]; n++; + } + while (n < InternalConstants.LITERALS) + { + bin_freq += dyn_ltree[n * 2]; n++; + } + data_type = (sbyte)(bin_freq > (ascii_freq >> 2) ? Z_BINARY : Z_ASCII); + } + + + + // Flush the bit buffer, keeping at most 7 bits in it. + internal void bi_flush() + { + if (bi_valid == 16) + { + pending[pendingCount++] = (byte)bi_buf; + pending[pendingCount++] = (byte)(bi_buf >> 8); + bi_buf = 0; + bi_valid = 0; + } + else if (bi_valid >= 8) + { + //put_byte((byte)bi_buf); + pending[pendingCount++] = (byte)bi_buf; + bi_buf >>= 8; + bi_valid -= 8; + } + } + + // Flush the bit buffer and align the output on a byte boundary + internal void bi_windup() + { + if (bi_valid > 8) + { + pending[pendingCount++] = (byte)bi_buf; + pending[pendingCount++] = (byte)(bi_buf >> 8); + } + else if (bi_valid > 0) + { + //put_byte((byte)bi_buf); + pending[pendingCount++] = (byte)bi_buf; + } + bi_buf = 0; + bi_valid = 0; + } + + // Copy a stored block, storing first the length and its + // one's complement if requested. + internal void copy_block(int buf, int len, bool header) + { + bi_windup(); // align on byte boundary + last_eob_len = 8; // enough lookahead for inflate + + if (header) + unchecked + { + //put_short((short)len); + pending[pendingCount++] = (byte)len; + pending[pendingCount++] = (byte)(len >> 8); + //put_short((short)~len); + pending[pendingCount++] = (byte)~len; + pending[pendingCount++] = (byte)(~len >> 8); + } + + put_bytes(window, buf, len); + } + + internal void flush_block_only(bool eof) + { + _tr_flush_block(block_start >= 0 ? block_start : -1, strstart - block_start, eof); + block_start = strstart; + _codec.flush_pending(); + } + + // Copy without compression as much as possible from the input stream, return + // the current block state. + // This function does not insert new strings in the dictionary since + // uncompressible data is probably not useful. This function is used + // only for the level=0 compression option. + // NOTE: this function should be optimized to avoid extra copying from + // window to pending_buf. + internal BlockState DeflateNone(FlushType flush) + { + // Stored blocks are limited to 0xffff bytes, pending is limited + // to pending_buf_size, and each stored block has a 5 byte header: + + int max_block_size = 0xffff; + int max_start; + + if (max_block_size > pending.Length - 5) + { + max_block_size = pending.Length - 5; + } + + // Copy as much as possible from input to output: + while (true) + { + // Fill the window as much as possible: + if (lookahead <= 1) + { + _fillWindow(); + if (lookahead == 0 && flush == FlushType.None) + return BlockState.NeedMore; + if (lookahead == 0) + break; // flush the current block + } + + strstart += lookahead; + lookahead = 0; + + // Emit a stored block if pending will be full: + max_start = block_start + max_block_size; + if (strstart == 0 || strstart >= max_start) + { + // strstart == 0 is possible when wraparound on 16-bit machine + lookahead = (int)(strstart - max_start); + strstart = (int)max_start; + + flush_block_only(false); + if (_codec.AvailableBytesOut == 0) + return BlockState.NeedMore; + } + + // Flush if we may have to slide, otherwise block_start may become + // negative and the data will be gone: + if (strstart - block_start >= w_size - MIN_LOOKAHEAD) + { + flush_block_only(false); + if (_codec.AvailableBytesOut == 0) + return BlockState.NeedMore; + } + } + + flush_block_only(flush == FlushType.Finish); + if (_codec.AvailableBytesOut == 0) + return (flush == FlushType.Finish) ? BlockState.FinishStarted : BlockState.NeedMore; + + return flush == FlushType.Finish ? BlockState.FinishDone : BlockState.BlockDone; + } + + + // Send a stored block + internal void _tr_stored_block(int buf, int stored_len, bool eof) + { + send_bits((STORED_BLOCK << 1) + (eof ? 1 : 0), 3); // send block type + copy_block(buf, stored_len, true); // with header + } + + // Determine the best encoding for the current block: dynamic trees, static + // trees or store, and output the encoded block to the zip file. + internal void _tr_flush_block(int buf, int stored_len, bool eof) + { + int opt_lenb, static_lenb; // opt_len and static_len in bytes + int max_blindex = 0; // index of last bit length code of non zero freq + + // Build the Huffman trees unless a stored block is forced + if (compressionLevel > 0) + { + // Check if the file is ascii or binary + if (data_type == Z_UNKNOWN) + set_data_type(); + + // Construct the literal and distance trees + treeLiterals.build_tree(this); + + treeDistances.build_tree(this); + + // At this point, opt_len and static_len are the total bit lengths of + // the compressed block data, excluding the tree representations. + + // Build the bit length tree for the above two trees, and get the index + // in bl_order of the last bit length code to send. + max_blindex = build_bl_tree(); + + // Determine the best encoding. Compute first the block length in bytes + opt_lenb = (opt_len + 3 + 7) >> 3; + static_lenb = (static_len + 3 + 7) >> 3; + + if (static_lenb <= opt_lenb) + opt_lenb = static_lenb; + } + else + { + opt_lenb = static_lenb = stored_len + 5; // force a stored block + } + + if (stored_len + 4 <= opt_lenb && buf != -1) + { + // 4: two words for the lengths + // The test buf != NULL is only necessary if LIT_BUFSIZE > WSIZE. + // Otherwise we can't have processed more than WSIZE input bytes since + // the last block flush, because compression would have been + // successful. If LIT_BUFSIZE <= WSIZE, it is never too late to + // transform a block into a stored block. + _tr_stored_block(buf, stored_len, eof); + } + else if (static_lenb == opt_lenb) + { + send_bits((STATIC_TREES << 1) + (eof ? 1 : 0), 3); + send_compressed_block(StaticTree.lengthAndLiteralsTreeCodes, StaticTree.distTreeCodes); + } + else + { + send_bits((DYN_TREES << 1) + (eof ? 1 : 0), 3); + send_all_trees(treeLiterals.max_code + 1, treeDistances.max_code + 1, max_blindex + 1); + send_compressed_block(dyn_ltree, dyn_dtree); + } + + // The above check is made mod 2^32, for files larger than 512 MB + // and uLong implemented on 32 bits. + + _InitializeBlocks(); + + if (eof) + { + bi_windup(); + } + } + + // Fill the window when the lookahead becomes insufficient. + // Updates strstart and lookahead. + // + // IN assertion: lookahead < MIN_LOOKAHEAD + // OUT assertions: strstart <= window_size-MIN_LOOKAHEAD + // At least one byte has been read, or avail_in == 0; reads are + // performed for at least two bytes (required for the zip translate_eol + // option -- not supported here). + private void _fillWindow() + { + int n, m; + int p; + int more; // Amount of free space at the end of the window. + + do + { + more = (window_size - lookahead - strstart); + + // Deal with !@#$% 64K limit: + if (more == 0 && strstart == 0 && lookahead == 0) + { + more = w_size; + } + else if (more == -1) + { + // Very unlikely, but possible on 16 bit machine if strstart == 0 + // and lookahead == 1 (input done one byte at time) + more--; + + // If the window is almost full and there is insufficient lookahead, + // move the upper half to the lower one to make room in the upper half. + } + else if (strstart >= w_size + w_size - MIN_LOOKAHEAD) + { + Array.Copy(window, w_size, window, 0, w_size); + match_start -= w_size; + strstart -= w_size; // we now have strstart >= MAX_DIST + block_start -= w_size; + + // Slide the hash table (could be avoided with 32 bit values + // at the expense of memory usage). We slide even when level == 0 + // to keep the hash table consistent if we switch back to level > 0 + // later. (Using level 0 permanently is not an optimal usage of + // zlib, so we don't care about this pathological case.) + + n = hash_size; + p = n; + do + { + m = (head[--p] & 0xffff); + head[p] = (short)((m >= w_size) ? (m - w_size) : 0); + } + while (--n != 0); + + n = w_size; + p = n; + do + { + m = (prev[--p] & 0xffff); + prev[p] = (short)((m >= w_size) ? (m - w_size) : 0); + // If n is not on any hash chain, prev[n] is garbage but + // its value will never be used. + } + while (--n != 0); + more += w_size; + } + + if (_codec.AvailableBytesIn == 0) + return; + + // If there was no sliding: + // strstart <= WSIZE+MAX_DIST-1 && lookahead <= MIN_LOOKAHEAD - 1 && + // more == window_size - lookahead - strstart + // => more >= window_size - (MIN_LOOKAHEAD-1 + WSIZE + MAX_DIST-1) + // => more >= window_size - 2*WSIZE + 2 + // In the BIG_MEM or MMAP case (not yet supported), + // window_size == input_size + MIN_LOOKAHEAD && + // strstart + s->lookahead <= input_size => more >= MIN_LOOKAHEAD. + // Otherwise, window_size == 2*WSIZE so more >= 2. + // If there was sliding, more >= WSIZE. So in all cases, more >= 2. + + n = _codec.read_buf(window, strstart + lookahead, more); + lookahead += n; + + // Initialize the hash value now that we have some input: + if (lookahead >= MIN_MATCH) + { + ins_h = window[strstart] & 0xff; + ins_h = (((ins_h) << hash_shift) ^ (window[strstart + 1] & 0xff)) & hash_mask; + } + // If the whole input has less than MIN_MATCH bytes, ins_h is garbage, + // but this is not important since only literal bytes will be emitted. + } + while (lookahead < MIN_LOOKAHEAD && _codec.AvailableBytesIn != 0); + } + + // Compress as much as possible from the input stream, return the current + // block state. + // This function does not perform lazy evaluation of matches and inserts + // new strings in the dictionary only for unmatched strings or for short + // matches. It is used only for the fast compression options. + internal BlockState DeflateFast(FlushType flush) + { + // short hash_head = 0; // head of the hash chain + int hash_head = 0; // head of the hash chain + bool bflush; // set if current block must be flushed + + while (true) + { + // Make sure that we always have enough lookahead, except + // at the end of the input file. We need MAX_MATCH bytes + // for the next match, plus MIN_MATCH bytes to insert the + // string following the next match. + if (lookahead < MIN_LOOKAHEAD) + { + _fillWindow(); + if (lookahead < MIN_LOOKAHEAD && flush == FlushType.None) + { + return BlockState.NeedMore; + } + if (lookahead == 0) + break; // flush the current block + } + + // Insert the string window[strstart .. strstart+2] in the + // dictionary, and set hash_head to the head of the hash chain: + if (lookahead >= MIN_MATCH) + { + ins_h = (((ins_h) << hash_shift) ^ (window[(strstart) + (MIN_MATCH - 1)] & 0xff)) & hash_mask; + + // prev[strstart&w_mask]=hash_head=head[ins_h]; + hash_head = (head[ins_h] & 0xffff); + prev[strstart & w_mask] = head[ins_h]; + head[ins_h] = unchecked((short)strstart); + } + + // Find the longest match, discarding those <= prev_length. + // At this point we have always match_length < MIN_MATCH + + if (hash_head != 0L && ((strstart - hash_head) & 0xffff) <= w_size - MIN_LOOKAHEAD) + { + // To simplify the code, we prevent matches with the string + // of window index 0 (in particular we have to avoid a match + // of the string with itself at the start of the input file). + if (compressionStrategy != CompressionStrategy.HuffmanOnly) + { + match_length = longest_match(hash_head); + } + // longest_match() sets match_start + } + if (match_length >= MIN_MATCH) + { + // check_match(strstart, match_start, match_length); + + bflush = _tr_tally(strstart - match_start, match_length - MIN_MATCH); + + lookahead -= match_length; + + // Insert new strings in the hash table only if the match length + // is not too large. This saves time but degrades compression. + if (match_length <= config.MaxLazy && lookahead >= MIN_MATCH) + { + match_length--; // string at strstart already in hash table + do + { + strstart++; + + ins_h = ((ins_h << hash_shift) ^ (window[(strstart) + (MIN_MATCH - 1)] & 0xff)) & hash_mask; + // prev[strstart&w_mask]=hash_head=head[ins_h]; + hash_head = (head[ins_h] & 0xffff); + prev[strstart & w_mask] = head[ins_h]; + head[ins_h] = unchecked((short)strstart); + + // strstart never exceeds WSIZE-MAX_MATCH, so there are + // always MIN_MATCH bytes ahead. + } + while (--match_length != 0); + strstart++; + } + else + { + strstart += match_length; + match_length = 0; + ins_h = window[strstart] & 0xff; + + ins_h = (((ins_h) << hash_shift) ^ (window[strstart + 1] & 0xff)) & hash_mask; + // If lookahead < MIN_MATCH, ins_h is garbage, but it does not + // matter since it will be recomputed at next deflate call. + } + } + else + { + // No match, output a literal byte + + bflush = _tr_tally(0, window[strstart] & 0xff); + lookahead--; + strstart++; + } + if (bflush) + { + flush_block_only(false); + if (_codec.AvailableBytesOut == 0) + return BlockState.NeedMore; + } + } + + flush_block_only(flush == FlushType.Finish); + if (_codec.AvailableBytesOut == 0) + { + if (flush == FlushType.Finish) + return BlockState.FinishStarted; + else + return BlockState.NeedMore; + } + return flush == FlushType.Finish ? BlockState.FinishDone : BlockState.BlockDone; + } + + // Same as above, but achieves better compression. We use a lazy + // evaluation for matches: a match is finally adopted only if there is + // no better match at the next window position. + internal BlockState DeflateSlow(FlushType flush) + { + // short hash_head = 0; // head of hash chain + int hash_head = 0; // head of hash chain + bool bflush; // set if current block must be flushed + + // Process the input block. + while (true) + { + // Make sure that we always have enough lookahead, except + // at the end of the input file. We need MAX_MATCH bytes + // for the next match, plus MIN_MATCH bytes to insert the + // string following the next match. + + if (lookahead < MIN_LOOKAHEAD) + { + _fillWindow(); + if (lookahead < MIN_LOOKAHEAD && flush == FlushType.None) + return BlockState.NeedMore; + + if (lookahead == 0) + break; // flush the current block + } + + // Insert the string window[strstart .. strstart+2] in the + // dictionary, and set hash_head to the head of the hash chain: + + if (lookahead >= MIN_MATCH) + { + ins_h = (((ins_h) << hash_shift) ^ (window[(strstart) + (MIN_MATCH - 1)] & 0xff)) & hash_mask; + // prev[strstart&w_mask]=hash_head=head[ins_h]; + hash_head = (head[ins_h] & 0xffff); + prev[strstart & w_mask] = head[ins_h]; + head[ins_h] = unchecked((short)strstart); + } + + // Find the longest match, discarding those <= prev_length. + prev_length = match_length; + prev_match = match_start; + match_length = MIN_MATCH - 1; + + if (hash_head != 0 && prev_length < config.MaxLazy && + ((strstart - hash_head) & 0xffff) <= w_size - MIN_LOOKAHEAD) + { + // To simplify the code, we prevent matches with the string + // of window index 0 (in particular we have to avoid a match + // of the string with itself at the start of the input file). + + if (compressionStrategy != CompressionStrategy.HuffmanOnly) + { + match_length = longest_match(hash_head); + } + // longest_match() sets match_start + + if (match_length <= 5 && (compressionStrategy == CompressionStrategy.Filtered || + (match_length == MIN_MATCH && strstart - match_start > 4096))) + { + + // If prev_match is also MIN_MATCH, match_start is garbage + // but we will ignore the current match anyway. + match_length = MIN_MATCH - 1; + } + } + + // If there was a match at the previous step and the current + // match is not better, output the previous match: + if (prev_length >= MIN_MATCH && match_length <= prev_length) + { + int max_insert = strstart + lookahead - MIN_MATCH; + // Do not insert strings in hash table beyond this. + + // check_match(strstart-1, prev_match, prev_length); + + bflush = _tr_tally(strstart - 1 - prev_match, prev_length - MIN_MATCH); + + // Insert in hash table all strings up to the end of the match. + // strstart-1 and strstart are already inserted. If there is not + // enough lookahead, the last two strings are not inserted in + // the hash table. + lookahead -= (prev_length - 1); + prev_length -= 2; + do + { + if (++strstart <= max_insert) + { + ins_h = (((ins_h) << hash_shift) ^ (window[(strstart) + (MIN_MATCH - 1)] & 0xff)) & hash_mask; + //prev[strstart&w_mask]=hash_head=head[ins_h]; + hash_head = (head[ins_h] & 0xffff); + prev[strstart & w_mask] = head[ins_h]; + head[ins_h] = unchecked((short)strstart); + } + } + while (--prev_length != 0); + match_available = 0; + match_length = MIN_MATCH - 1; + strstart++; + + if (bflush) + { + flush_block_only(false); + if (_codec.AvailableBytesOut == 0) + return BlockState.NeedMore; + } + } + else if (match_available != 0) + { + + // If there was no match at the previous position, output a + // single literal. If there was a match but the current match + // is longer, truncate the previous match to a single literal. + + bflush = _tr_tally(0, window[strstart - 1] & 0xff); + + if (bflush) + { + flush_block_only(false); + } + strstart++; + lookahead--; + if (_codec.AvailableBytesOut == 0) + return BlockState.NeedMore; + } + else + { + // There is no previous match to compare with, wait for + // the next step to decide. + + match_available = 1; + strstart++; + lookahead--; + } + } + + if (match_available != 0) + { + bflush = _tr_tally(0, window[strstart - 1] & 0xff); + match_available = 0; + } + flush_block_only(flush == FlushType.Finish); + + if (_codec.AvailableBytesOut == 0) + { + if (flush == FlushType.Finish) + return BlockState.FinishStarted; + else + return BlockState.NeedMore; + } + + return flush == FlushType.Finish ? BlockState.FinishDone : BlockState.BlockDone; + } + + + internal int longest_match(int cur_match) + { + int chain_length = config.MaxChainLength; // max hash chain length + int scan = strstart; // current string + int match; // matched string + int len; // length of current match + int best_len = prev_length; // best match length so far + int limit = strstart > (w_size - MIN_LOOKAHEAD) ? strstart - (w_size - MIN_LOOKAHEAD) : 0; + + int niceLength = config.NiceLength; + + // Stop when cur_match becomes <= limit. To simplify the code, + // we prevent matches with the string of window index 0. + + int wmask = w_mask; + + int strend = strstart + MAX_MATCH; + byte scan_end1 = window[scan + best_len - 1]; + byte scan_end = window[scan + best_len]; + + // The code is optimized for HASH_BITS >= 8 and MAX_MATCH-2 multiple of 16. + // It is easy to get rid of this optimization if necessary. + + // Do not waste too much time if we already have a good match: + if (prev_length >= config.GoodLength) + { + chain_length >>= 2; + } + + // Do not look for matches beyond the end of the input. This is necessary + // to make deflate deterministic. + if (niceLength > lookahead) + niceLength = lookahead; + + do + { + match = cur_match; + + // Skip to next match if the match length cannot increase + // or if the match length is less than 2: + if (window[match + best_len] != scan_end || + window[match + best_len - 1] != scan_end1 || + window[match] != window[scan] || + window[++match] != window[scan + 1]) + continue; + + // The check at best_len-1 can be removed because it will be made + // again later. (This heuristic is not always a win.) + // It is not necessary to compare scan[2] and match[2] since they + // are always equal when the other bytes match, given that + // the hash keys are equal and that HASH_BITS >= 8. + scan += 2; match++; + + // We check for insufficient lookahead only every 8th comparison; + // the 256th check will be made at strstart+258. + do + { + } + while (window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && + window[++scan] == window[++match] && scan < strend); + + len = MAX_MATCH - (int)(strend - scan); + scan = strend - MAX_MATCH; + + if (len > best_len) + { + match_start = cur_match; + best_len = len; + if (len >= niceLength) + break; + scan_end1 = window[scan + best_len - 1]; + scan_end = window[scan + best_len]; + } + } + while ((cur_match = (prev[cur_match & wmask] & 0xffff)) > limit && --chain_length != 0); + + if (best_len <= lookahead) + return best_len; + return lookahead; + } + + + private bool Rfc1950BytesEmitted = false; + private bool _WantRfc1950HeaderBytes = true; + internal bool WantRfc1950HeaderBytes + { + get { return _WantRfc1950HeaderBytes; } + set { _WantRfc1950HeaderBytes = value; } + } + + + internal int Initialize(ZlibCodec codec, CompressionLevel level) + { + return Initialize(codec, level, ZlibConstants.WindowBitsMax); + } + + internal int Initialize(ZlibCodec codec, CompressionLevel level, int bits) + { + return Initialize(codec, level, bits, MEM_LEVEL_DEFAULT, CompressionStrategy.Default); + } + + internal int Initialize(ZlibCodec codec, CompressionLevel level, int bits, CompressionStrategy compressionStrategy) + { + return Initialize(codec, level, bits, MEM_LEVEL_DEFAULT, compressionStrategy); + } + + internal int Initialize(ZlibCodec codec, CompressionLevel level, int windowBits, int memLevel, CompressionStrategy strategy) + { + _codec = codec; + _codec.Message = null; + + // validation + if (windowBits < 9 || windowBits > 15) + throw new ZlibException("windowBits must be in the range 9..15."); + + if (memLevel < 1 || memLevel > MEM_LEVEL_MAX) + throw new ZlibException(String.Format("memLevel must be in the range 1.. {0}", MEM_LEVEL_MAX)); + + _codec.dstate = this; + + w_bits = windowBits; + w_size = 1 << w_bits; + w_mask = w_size - 1; + + hash_bits = memLevel + 7; + hash_size = 1 << hash_bits; + hash_mask = hash_size - 1; + hash_shift = ((hash_bits + MIN_MATCH - 1) / MIN_MATCH); + + window = new byte[w_size * 2];// BufferPool.Get(w_size * 2, false); + prev = new short[w_size]; + head = new short[hash_size]; + + // for memLevel==8, this will be 16384, 16k + lit_bufsize = 1 << (memLevel + 6); + + // Use a single array as the buffer for data pending compression, + // the output distance codes, and the output length codes (aka tree). + // orig comment: This works just fine since the average + // output size for (length,distance) codes is <= 24 bits. + pending = new byte[lit_bufsize * 4];// BufferPool.Get(lit_bufsize * 4, false); + _distanceOffset = lit_bufsize; + _lengthOffset = (1 + 2) * lit_bufsize; + + // So, for memLevel 8, the length of the pending buffer is 65536. 64k. + // The first 16k are pending bytes. + // The middle slice, of 32k, is used for distance codes. + // The final 16k are length codes. + + this.compressionLevel = level; + this.compressionStrategy = strategy; + + Reset(); + return ZlibConstants.Z_OK; + } + + + internal void Reset() + { + _codec.TotalBytesIn = _codec.TotalBytesOut = 0; + _codec.Message = null; + //strm.data_type = Z_UNKNOWN; + + pendingCount = 0; + nextPending = 0; + + Rfc1950BytesEmitted = false; + + status = (WantRfc1950HeaderBytes) ? INIT_STATE : BUSY_STATE; + _codec._Adler32 = Adler.Adler32(0, null, 0, 0); + + last_flush = (int)FlushType.None; + + _InitializeTreeData(); + _InitializeLazyMatch(); + } + + + internal int End() + { + if (status != INIT_STATE && status != BUSY_STATE && status != FINISH_STATE) + { + return ZlibConstants.Z_STREAM_ERROR; + } + // Deallocate in reverse order of allocations: + //BufferPool.Release(pending); + pending = null; + head = null; + prev = null; + //BufferPool.Release(window); + window = null; + // free + // dstate=null; + return status == BUSY_STATE ? ZlibConstants.Z_DATA_ERROR : ZlibConstants.Z_OK; + } + + + private void SetDeflater() + { + switch (config.Flavor) + { + case DeflateFlavor.Store: + DeflateFunction = DeflateNone; + break; + case DeflateFlavor.Fast: + DeflateFunction = DeflateFast; + break; + case DeflateFlavor.Slow: + DeflateFunction = DeflateSlow; + break; + } + } + + + internal int SetParams(CompressionLevel level, CompressionStrategy strategy) + { + int result = ZlibConstants.Z_OK; + + if (compressionLevel != level) + { + Config newConfig = Config.Lookup(level); + + // change in the deflate flavor (Fast vs slow vs none)? + if (newConfig.Flavor != config.Flavor && _codec.TotalBytesIn != 0) + { + // Flush the last buffer: + result = _codec.Deflate(FlushType.Partial); + } + + compressionLevel = level; + config = newConfig; + SetDeflater(); + } + + // no need to flush with change in strategy? Really? + compressionStrategy = strategy; + + return result; + } + + + internal int SetDictionary(byte[] dictionary) + { + int length = dictionary.Length; + int index = 0; + + if (dictionary == null || status != INIT_STATE) + throw new ZlibException("Stream error."); + + _codec._Adler32 = Adler.Adler32(_codec._Adler32, dictionary, 0, dictionary.Length); + + if (length < MIN_MATCH) + return ZlibConstants.Z_OK; + if (length > w_size - MIN_LOOKAHEAD) + { + length = w_size - MIN_LOOKAHEAD; + index = dictionary.Length - length; // use the tail of the dictionary + } + Array.Copy(dictionary, index, window, 0, length); + strstart = length; + block_start = length; + + // Insert all strings in the hash table (except for the last two bytes). + // s->lookahead stays null, so s->ins_h will be recomputed at the next + // call of fill_window. + + ins_h = window[0] & 0xff; + ins_h = (((ins_h) << hash_shift) ^ (window[1] & 0xff)) & hash_mask; + + for (int n = 0; n <= length - MIN_MATCH; n++) + { + ins_h = (((ins_h) << hash_shift) ^ (window[(n) + (MIN_MATCH - 1)] & 0xff)) & hash_mask; + prev[n & w_mask] = head[ins_h]; + head[ins_h] = (short)n; + } + return ZlibConstants.Z_OK; + } + + + + internal int Deflate(FlushType flush) + { + int old_flush; + + if (_codec.OutputBuffer == null || + (_codec.InputBuffer == null && _codec.AvailableBytesIn != 0) || + (status == FINISH_STATE && flush != FlushType.Finish)) + { + _codec.Message = _ErrorMessage[ZlibConstants.Z_NEED_DICT - (ZlibConstants.Z_STREAM_ERROR)]; + throw new ZlibException(String.Format("Something is fishy. [{0}]", _codec.Message)); + } + if (_codec.AvailableBytesOut == 0) + { + _codec.Message = _ErrorMessage[ZlibConstants.Z_NEED_DICT - (ZlibConstants.Z_BUF_ERROR)]; + throw new ZlibException("OutputBuffer is full (AvailableBytesOut == 0)"); + } + + old_flush = last_flush; + last_flush = (int)flush; + + // Write the zlib (rfc1950) header bytes + if (status == INIT_STATE) + { + int header = (Z_DEFLATED + ((w_bits - 8) << 4)) << 8; + int level_flags = (((int)compressionLevel - 1) & 0xff) >> 1; + + if (level_flags > 3) + level_flags = 3; + header |= (level_flags << 6); + if (strstart != 0) + header |= PRESET_DICT; + header += 31 - (header % 31); + + status = BUSY_STATE; + //putShortMSB(header); + unchecked + { + pending[pendingCount++] = (byte)(header >> 8); + pending[pendingCount++] = (byte)header; + } + // Save the adler32 of the preset dictionary: + if (strstart != 0) + { + pending[pendingCount++] = (byte)((_codec._Adler32 & 0xFF000000) >> 24); + pending[pendingCount++] = (byte)((_codec._Adler32 & 0x00FF0000) >> 16); + pending[pendingCount++] = (byte)((_codec._Adler32 & 0x0000FF00) >> 8); + pending[pendingCount++] = (byte)(_codec._Adler32 & 0x000000FF); + } + _codec._Adler32 = Adler.Adler32(0, null, 0, 0); + } + + // Flush as much pending output as possible + if (pendingCount != 0) + { + _codec.flush_pending(); + if (_codec.AvailableBytesOut == 0) + { + //System.out.println(" avail_out==0"); + // Since avail_out is 0, deflate will be called again with + // more output space, but possibly with both pending and + // avail_in equal to zero. There won't be anything to do, + // but this is not an error situation so make sure we + // return OK instead of BUF_ERROR at next call of deflate: + last_flush = -1; + return ZlibConstants.Z_OK; + } + + // Make sure there is something to do and avoid duplicate consecutive + // flushes. For repeated and useless calls with Z_FINISH, we keep + // returning Z_STREAM_END instead of Z_BUFF_ERROR. + } + else if (_codec.AvailableBytesIn == 0 && + (int)flush <= old_flush && + flush != FlushType.Finish) + { + // workitem 8557 + // + // Not sure why this needs to be an error. pendingCount == 0, which + // means there's nothing to deflate. And the caller has not asked + // for a FlushType.Finish, but... that seems very non-fatal. We + // can just say "OK" and do nothing. + + // _codec.Message = z_errmsg[ZlibConstants.Z_NEED_DICT - (ZlibConstants.Z_BUF_ERROR)]; + // throw new ZlibException("AvailableBytesIn == 0 && flush<=old_flush && flush != FlushType.Finish"); + + return ZlibConstants.Z_OK; + } + + // User must not provide more input after the first FINISH: + if (status == FINISH_STATE && _codec.AvailableBytesIn != 0) + { + _codec.Message = _ErrorMessage[ZlibConstants.Z_NEED_DICT - (ZlibConstants.Z_BUF_ERROR)]; + throw new ZlibException("status == FINISH_STATE && _codec.AvailableBytesIn != 0"); + } + + // Start a new block or continue the current one. + if (_codec.AvailableBytesIn != 0 || lookahead != 0 || (flush != FlushType.None && status != FINISH_STATE)) + { + BlockState bstate = DeflateFunction(flush); + + if (bstate == BlockState.FinishStarted || bstate == BlockState.FinishDone) + { + status = FINISH_STATE; + } + if (bstate == BlockState.NeedMore || bstate == BlockState.FinishStarted) + { + if (_codec.AvailableBytesOut == 0) + { + last_flush = -1; // avoid BUF_ERROR next call, see above + } + return ZlibConstants.Z_OK; + // If flush != Z_NO_FLUSH && avail_out == 0, the next call + // of deflate should use the same flush parameter to make sure + // that the flush is complete. So we don't have to output an + // empty block here, this will be done at next call. This also + // ensures that for a very small output buffer, we emit at most + // one empty block. + } + + if (bstate == BlockState.BlockDone) + { + if (flush == FlushType.Partial) + { + _tr_align(); + } + else + { + // FlushType.Full or FlushType.Sync + _tr_stored_block(0, 0, false); + // For a full flush, this empty block will be recognized + // as a special marker by inflate_sync(). + if (flush == FlushType.Full) + { + // clear hash (forget the history) + for (int i = 0; i < hash_size; i++) + head[i] = 0; + } + } + _codec.flush_pending(); + if (_codec.AvailableBytesOut == 0) + { + last_flush = -1; // avoid BUF_ERROR at next call, see above + return ZlibConstants.Z_OK; + } + } + } + + if (flush != FlushType.Finish) + return ZlibConstants.Z_OK; + + if (!WantRfc1950HeaderBytes || Rfc1950BytesEmitted) + return ZlibConstants.Z_STREAM_END; + + // Write the zlib trailer (adler32) + pending[pendingCount++] = (byte)((_codec._Adler32 & 0xFF000000) >> 24); + pending[pendingCount++] = (byte)((_codec._Adler32 & 0x00FF0000) >> 16); + pending[pendingCount++] = (byte)((_codec._Adler32 & 0x0000FF00) >> 8); + pending[pendingCount++] = (byte)(_codec._Adler32 & 0x000000FF); + //putShortMSB((int)(SharedUtils.URShift(_codec._Adler32, 16))); + //putShortMSB((int)(_codec._Adler32 & 0xffff)); + + _codec.flush_pending(); + + // If avail_out is zero, the application will call deflate again + // to flush the rest. + + Rfc1950BytesEmitted = true; // write the trailer only once! + + return pendingCount != 0 ? ZlibConstants.Z_OK : ZlibConstants.Z_STREAM_END; + } + + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs.meta new file mode 100644 index 00000000..6e05ac32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1c333486e9cb84047bbc56c17879a5b0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Deflate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs new file mode 100644 index 00000000..c8d1c625 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs @@ -0,0 +1,692 @@ +// DeflateStream.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009-2010 Dino Chiesa. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2011-July-31 14:48:11> +// +// ------------------------------------------------------------------ +// +// This module defines the DeflateStream class, which can be used as a replacement for +// the System.IO.Compression.DeflateStream class in the .NET BCL. +// +// ------------------------------------------------------------------ + + +using System; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + /// + /// A class for compressing and decompressing streams using the Deflate algorithm. + /// + /// + /// + /// + /// + /// The DeflateStream is a Decorator on a . It adds DEFLATE compression or decompression to any + /// stream. + /// + /// + /// + /// Using this stream, applications can compress or decompress data via stream + /// Read and Write operations. Either compresssion or decompression + /// can occur through either reading or writing. The compression format used is + /// DEFLATE, which is documented in IETF RFC 1951, "DEFLATE + /// Compressed Data Format Specification version 1.3.". + /// + /// + /// + /// + /// + public class DeflateStream : System.IO.Stream + { + internal ZlibBaseStream _baseStream; + internal System.IO.Stream _innerStream; + bool _disposed; + + /// + /// Create a DeflateStream using the specified CompressionMode. + /// + /// + /// + /// When mode is CompressionMode.Compress, the DeflateStream will use + /// the default compression level. The "captive" stream will be closed when + /// the DeflateStream is closed. + /// + /// + /// + /// This example uses a DeflateStream to compress data from a file, and writes + /// the compressed data to another file. + /// + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (var raw = System.IO.File.Create(fileToCompress + ".deflated")) + /// { + /// using (Stream compressor = new DeflateStream(raw, CompressionMode.Compress)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n; + /// while ((n= input.Read(buffer, 0, buffer.Length)) != 0) + /// { + /// compressor.Write(buffer, 0, n); + /// } + /// } + /// } + /// } + /// + /// + /// + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using raw As FileStream = File.Create(fileToCompress & ".deflated") + /// Using compressor As Stream = New DeflateStream(raw, CompressionMode.Compress) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// End Using + /// + /// + /// The stream which will be read or written. + /// Indicates whether the DeflateStream will compress or decompress. + public DeflateStream(System.IO.Stream stream, CompressionMode mode) + : this(stream, mode, CompressionLevel.Default, false) + { + } + + /// + /// Create a DeflateStream using the specified CompressionMode and the specified CompressionLevel. + /// + /// + /// + /// + /// + /// When mode is CompressionMode.Decompress, the level parameter is + /// ignored. The "captive" stream will be closed when the DeflateStream is + /// closed. + /// + /// + /// + /// + /// + /// + /// This example uses a DeflateStream to compress data from a file, and writes + /// the compressed data to another file. + /// + /// + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (var raw = System.IO.File.Create(fileToCompress + ".deflated")) + /// { + /// using (Stream compressor = new DeflateStream(raw, + /// CompressionMode.Compress, + /// CompressionLevel.BestCompression)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n= -1; + /// while (n != 0) + /// { + /// if (n > 0) + /// compressor.Write(buffer, 0, n); + /// n= input.Read(buffer, 0, buffer.Length); + /// } + /// } + /// } + /// } + /// + /// + /// + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using raw As FileStream = File.Create(fileToCompress & ".deflated") + /// Using compressor As Stream = New DeflateStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// End Using + /// + /// + /// The stream to be read or written while deflating or inflating. + /// Indicates whether the DeflateStream will compress or decompress. + /// A tuning knob to trade speed for effectiveness. + public DeflateStream(System.IO.Stream stream, CompressionMode mode, CompressionLevel level) + : this(stream, mode, level, false) + { + } + + /// + /// Create a DeflateStream using the specified + /// CompressionMode, and explicitly specify whether the + /// stream should be left open after Deflation or Inflation. + /// + /// + /// + /// + /// + /// This constructor allows the application to request that the captive stream + /// remain open after the deflation or inflation occurs. By default, after + /// Close() is called on the stream, the captive stream is also + /// closed. In some cases this is not desired, for example if the stream is a + /// memory stream that will be re-read after compression. Specify true for + /// the parameter to leave the stream open. + /// + /// + /// + /// The DeflateStream will use the default compression level. + /// + /// + /// + /// See the other overloads of this constructor for example code. + /// + /// + /// + /// + /// The stream which will be read or written. This is called the + /// "captive" stream in other places in this documentation. + /// + /// + /// + /// Indicates whether the DeflateStream will compress or decompress. + /// + /// + /// true if the application would like the stream to + /// remain open after inflation/deflation. + public DeflateStream(System.IO.Stream stream, CompressionMode mode, bool leaveOpen) + : this(stream, mode, CompressionLevel.Default, leaveOpen) + { + } + + /// + /// Create a DeflateStream using the specified CompressionMode + /// and the specified CompressionLevel, and explicitly specify whether + /// the stream should be left open after Deflation or Inflation. + /// + /// + /// + /// + /// + /// When mode is CompressionMode.Decompress, the level parameter is ignored. + /// + /// + /// + /// This constructor allows the application to request that the captive stream + /// remain open after the deflation or inflation occurs. By default, after + /// Close() is called on the stream, the captive stream is also + /// closed. In some cases this is not desired, for example if the stream is a + /// that will be re-read after + /// compression. Specify true for the parameter + /// to leave the stream open. + /// + /// + /// + /// + /// + /// + /// This example shows how to use a DeflateStream to compress data from + /// a file, and store the compressed data into another file. + /// + /// + /// using (var output = System.IO.File.Create(fileToCompress + ".deflated")) + /// { + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (Stream compressor = new DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, true)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n= -1; + /// while (n != 0) + /// { + /// if (n > 0) + /// compressor.Write(buffer, 0, n); + /// n= input.Read(buffer, 0, buffer.Length); + /// } + /// } + /// } + /// // can write additional data to the output stream here + /// } + /// + /// + /// + /// Using output As FileStream = File.Create(fileToCompress & ".deflated") + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using compressor As Stream = New DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, True) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// ' can write additional data to the output stream here. + /// End Using + /// + /// + /// The stream which will be read or written. + /// Indicates whether the DeflateStream will compress or decompress. + /// true if the application would like the stream to remain open after inflation/deflation. + /// A tuning knob to trade speed for effectiveness. + public DeflateStream(System.IO.Stream stream, CompressionMode mode, CompressionLevel level, bool leaveOpen) + { + _innerStream = stream; + _baseStream = new ZlibBaseStream(stream, mode, level, ZlibStreamFlavor.ZLIB, leaveOpen); + } + + /// + /// Create a DeflateStream using the specified CompressionMode + /// and the specified CompressionLevel, and explicitly specify whether + /// the stream should be left open after Deflation or Inflation. + /// + /// + /// + /// + /// + /// When mode is CompressionMode.Decompress, the level parameter is ignored. + /// + /// + /// + /// This constructor allows the application to request that the captive stream + /// remain open after the deflation or inflation occurs. By default, after + /// Close() is called on the stream, the captive stream is also + /// closed. In some cases this is not desired, for example if the stream is a + /// that will be re-read after + /// compression. Specify true for the parameter + /// to leave the stream open. + /// + /// + /// + /// + /// + /// + /// This example shows how to use a DeflateStream to compress data from + /// a file, and store the compressed data into another file. + /// + /// + /// using (var output = System.IO.File.Create(fileToCompress + ".deflated")) + /// { + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (Stream compressor = new DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, true)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n= -1; + /// while (n != 0) + /// { + /// if (n > 0) + /// compressor.Write(buffer, 0, n); + /// n= input.Read(buffer, 0, buffer.Length); + /// } + /// } + /// } + /// // can write additional data to the output stream here + /// } + /// + /// + /// + /// Using output As FileStream = File.Create(fileToCompress & ".deflated") + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using compressor As Stream = New DeflateStream(output, CompressionMode.Compress, CompressionLevel.BestCompression, True) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// ' can write additional data to the output stream here. + /// End Using + /// + /// + /// The stream which will be read or written. + /// Indicates whether the DeflateStream will compress or decompress. + /// true if the application would like the stream to remain open after inflation/deflation. + /// A tuning knob to trade speed for effectiveness. + /// Desired window bits. + public DeflateStream(System.IO.Stream stream, CompressionMode mode, CompressionLevel level, bool leaveOpen, int windowBits) + { + _innerStream = stream; + _baseStream = new ZlibBaseStream(stream, mode, level, ZlibStreamFlavor.DEFLATE, leaveOpen, windowBits); + } + + #region Zlib properties + + /// + /// This property sets the flush behavior on the stream. + /// + /// See the ZLIB documentation for the meaning of the flush behavior. + /// + virtual public FlushType FlushMode + { + get { return (this._baseStream._flushMode); } + set + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + this._baseStream._flushMode = value; + } + } + + /// + /// The size of the working buffer for the compression codec. + /// + /// + /// + /// + /// The working buffer is used for all stream operations. The default size is + /// 1024 bytes. The minimum size is 128 bytes. You may get better performance + /// with a larger buffer. Then again, you might not. You would have to test + /// it. + /// + /// + /// + /// Set this before the first call to Read() or Write() on the + /// stream. If you try to set it afterwards, it will throw. + /// + /// + public int BufferSize + { + get + { + return this._baseStream._bufferSize; + } + set + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + if (this._baseStream._workingBuffer != null) + throw new ZlibException("The working buffer is already set."); + if (value < ZlibConstants.WorkingBufferSizeMin) + throw new ZlibException(String.Format("Don't be silly. {0} bytes?? Use a bigger buffer, at least {1}.", value, ZlibConstants.WorkingBufferSizeMin)); + this._baseStream._bufferSize = value; + } + } + + /// + /// The ZLIB strategy to be used during compression. + /// + /// + /// + /// By tweaking this parameter, you may be able to optimize the compression for + /// data with particular characteristics. + /// + public CompressionStrategy Strategy + { + get + { + return this._baseStream.Strategy; + } + set + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + this._baseStream.Strategy = value; + } + } + + /// Returns the total number of bytes input so far. + virtual public long TotalIn + { + get + { + return this._baseStream._z.TotalBytesIn; + } + } + + /// Returns the total number of bytes output so far. + virtual public long TotalOut + { + get + { + return this._baseStream._z.TotalBytesOut; + } + } + + #endregion + + #region System.IO.Stream methods + /// + /// Dispose the stream. + /// + /// + /// + /// This may or may not result in a Close() call on the captive + /// stream. See the constructors that have a leaveOpen parameter + /// for more information. + /// + /// + /// Application code won't call this code directly. This method may be + /// invoked in two distinct scenarios. If disposing == true, the method + /// has been called directly or indirectly by a user's code, for example + /// via the public Dispose() method. In this case, both managed and + /// unmanaged resources can be referenced and disposed. If disposing == + /// false, the method has been called by the runtime from inside the + /// object finalizer and this method should not reference other objects; + /// in that case only unmanaged resources must be referenced or + /// disposed. + /// + /// + /// + /// true if the Dispose method was invoked by user code. + /// + protected override void Dispose(bool disposing) + { + try + { + if (!_disposed) + { + if (disposing && (this._baseStream != null)) + this._baseStream.Close(); + _disposed = true; + } + } + finally + { + base.Dispose(disposing); + } + } + + + + /// + /// Indicates whether the stream can be read. + /// + /// + /// The return value depends on whether the captive stream supports reading. + /// + public override bool CanRead + { + get + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + return _baseStream._stream.CanRead; + } + } + + /// + /// Indicates whether the stream supports Seek operations. + /// + /// + /// Always returns false. + /// + public override bool CanSeek + { + get { return false; } + } + + + /// + /// Indicates whether the stream can be written. + /// + /// + /// The return value depends on whether the captive stream supports writing. + /// + public override bool CanWrite + { + get + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + return _baseStream._stream.CanWrite; + } + } + + /// + /// Flush the stream. + /// + public override void Flush() + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + _baseStream.Flush(); + } + + /// + /// Reading this property always throws a . + /// + public override long Length + { + get { throw new NotImplementedException(); } + } + + /// + /// The position of the stream pointer. + /// + /// + /// + /// Setting this property always throws a . Reading will return the total bytes + /// written out, if used in writing, or the total bytes read in, if used in + /// reading. The count may refer to compressed bytes or uncompressed bytes, + /// depending on how you've used the stream. + /// + public override long Position + { + get + { + if (this._baseStream._streamMode == ZlibBaseStream.StreamMode.Writer) + return this._baseStream._z.TotalBytesOut; + if (this._baseStream._streamMode == ZlibBaseStream.StreamMode.Reader) + return this._baseStream._z.TotalBytesIn; + return 0; + } + set { throw new NotImplementedException(); } + } + + /// + /// Read data from the stream. + /// + /// + /// + /// + /// If you wish to use the DeflateStream to compress data while + /// reading, you can create a DeflateStream with + /// CompressionMode.Compress, providing an uncompressed data stream. + /// Then call Read() on that DeflateStream, and the data read will be + /// compressed as you read. If you wish to use the DeflateStream to + /// decompress data while reading, you can create a DeflateStream with + /// CompressionMode.Decompress, providing a readable compressed data + /// stream. Then call Read() on that DeflateStream, and the data read + /// will be decompressed as you read. + /// + /// + /// + /// A DeflateStream can be used for Read() or Write(), but not both. + /// + /// + /// + /// The buffer into which the read data should be placed. + /// the offset within that data array to put the first byte read. + /// the number of bytes to read. + /// the number of bytes actually read + public override int Read(byte[] buffer, int offset, int count) + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + return _baseStream.Read(buffer, offset, count); + } + + + /// + /// Calling this method always throws a . + /// + /// this is irrelevant, since it will always throw! + /// this is irrelevant, since it will always throw! + /// irrelevant! + public override long Seek(long offset, System.IO.SeekOrigin origin) + { + throw new NotImplementedException(); + } + + /// + /// Will call the base stream's SetLength method. + /// + public override void SetLength(long value) + { + _baseStream.SetLength(value); + } + + /// + /// Write data to the stream. + /// + /// + /// + /// + /// If you wish to use the DeflateStream to compress data while + /// writing, you can create a DeflateStream with + /// CompressionMode.Compress, and a writable output stream. Then call + /// Write() on that DeflateStream, providing uncompressed data + /// as input. The data sent to the output stream will be the compressed form + /// of the data written. If you wish to use the DeflateStream to + /// decompress data while writing, you can create a DeflateStream with + /// CompressionMode.Decompress, and a writable output stream. Then + /// call Write() on that stream, providing previously compressed + /// data. The data sent to the output stream will be the decompressed form of + /// the data written. + /// + /// + /// + /// A DeflateStream can be used for Read() or Write(), + /// but not both. + /// + /// + /// + /// + /// The buffer holding data to write to the stream. + /// the offset within that data array to find the first byte to write. + /// the number of bytes to write. + public override void Write(byte[] buffer, int offset, int count) + { + if (_disposed) throw new ObjectDisposedException("DeflateStream"); + _baseStream.Write(buffer, offset, count); + } + #endregion + } + +} + diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs.meta new file mode 100644 index 00000000..bc2e2a06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e6f8b634ea87d64448627ac20994230f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/DeflateStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs new file mode 100644 index 00000000..eb0d61fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs @@ -0,0 +1,919 @@ +// GZipStream.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2011-July-11 21:42:34> +// +// ------------------------------------------------------------------ +// +// This module defines the GZipStream class, which can be used as a replacement for +// the System.IO.Compression.GZipStream class in the .NET BCL. NB: The design is not +// completely OO clean: there is some intelligence in the ZlibBaseStream that reads the +// GZip header. +// +// ------------------------------------------------------------------ + + +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; +using System.IO; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + /// + /// A class for compressing and decompressing GZIP streams. + /// + /// + /// + /// + /// The GZipStream is a Decorator on a + /// . It adds GZIP compression or decompression to any + /// stream. + /// + /// + /// + /// Like the System.IO.Compression.GZipStream in the .NET Base Class Library, the + /// Ionic.Zlib.GZipStream can compress while writing, or decompress while + /// reading, but not vice versa. The compression method used is GZIP, which is + /// documented in IETF RFC + /// 1952, "GZIP file format specification version 4.3". + /// + /// + /// A GZipStream can be used to decompress data (through Read()) or + /// to compress data (through Write()), but not both. + /// + /// + /// + /// If you wish to use the GZipStream to compress data, you must wrap it + /// around a write-able stream. As you call Write() on the GZipStream, the + /// data will be compressed into the GZIP format. If you want to decompress data, + /// you must wrap the GZipStream around a readable stream that contains an + /// IETF RFC 1952-compliant stream. The data will be decompressed as you call + /// Read() on the GZipStream. + /// + /// + /// + /// Though the GZIP format allows data from multiple files to be concatenated + /// together, this stream handles only a single segment of GZIP format, typically + /// representing a single file. + /// + /// + /// + /// + /// + public class GZipStream : System.IO.Stream + { + // GZip format + // source: http://tools.ietf.org/html/rfc1952 + // + // header id: 2 bytes 1F 8B + // compress method 1 byte 8= DEFLATE (none other supported) + // flag 1 byte bitfield (See below) + // mtime 4 bytes time_t (seconds since jan 1, 1970 UTC of the file. + // xflg 1 byte 2 = max compress used , 4 = max speed (can be ignored) + // OS 1 byte OS for originating archive. set to 0xFF in compression. + // extra field length 2 bytes optional - only if FEXTRA is set. + // extra field varies + // filename varies optional - if FNAME is set. zero terminated. ISO-8859-1. + // file comment varies optional - if FCOMMENT is set. zero terminated. ISO-8859-1. + // crc16 1 byte optional - present only if FHCRC bit is set + // compressed data varies + // CRC32 4 bytes + // isize 4 bytes data size modulo 2^32 + // + // FLG (FLaGs) + // bit 0 FTEXT - indicates file is ASCII text (can be safely ignored) + // bit 1 FHCRC - there is a CRC16 for the header immediately following the header + // bit 2 FEXTRA - extra fields are present + // bit 3 FNAME - the zero-terminated filename is present. encoding; ISO-8859-1. + // bit 4 FCOMMENT - a zero-terminated file comment is present. encoding: ISO-8859-1 + // bit 5 reserved + // bit 6 reserved + // bit 7 reserved + // + // On consumption: + // Extra field is a bunch of nonsense and can be safely ignored. + // Header CRC and OS, likewise. + // + // on generation: + // all optional fields get 0, except for the OS, which gets 255. + // + + + + /// + /// The comment on the GZIP stream. + /// + /// + /// + /// + /// The GZIP format allows for each file to optionally have an associated + /// comment stored with the file. The comment is encoded with the ISO-8859-1 + /// code page. To include a comment in a GZIP stream you create, set this + /// property before calling Write() for the first time on the + /// GZipStream. + /// + /// + /// + /// When using GZipStream to decompress, you can retrieve this property + /// after the first call to Read(). If no comment has been set in the + /// GZIP bytestream, the Comment property will return null + /// (Nothing in VB). + /// + /// + public String Comment + { + get + { + return _Comment; + } + set + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + _Comment = value; + } + } + + /// + /// The FileName for the GZIP stream. + /// + /// + /// + /// + /// + /// The GZIP format optionally allows each file to have an associated + /// filename. When compressing data (through Write()), set this + /// FileName before calling Write() the first time on the GZipStream. + /// The actual filename is encoded into the GZIP bytestream with the + /// ISO-8859-1 code page, according to RFC 1952. It is the application's + /// responsibility to insure that the FileName can be encoded and decoded + /// correctly with this code page. + /// + /// + /// + /// When decompressing (through Read()), you can retrieve this value + /// any time after the first Read(). In the case where there was no filename + /// encoded into the GZIP bytestream, the property will return null (Nothing + /// in VB). + /// + /// + public String FileName + { + get { return _FileName; } + set + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + _FileName = value; + if (_FileName == null) return; + if (_FileName.IndexOf("/") != -1) + { + _FileName = _FileName.Replace("/", "\\"); + } + if (_FileName.EndsWith("\\")) + throw new Exception("Illegal filename"); + if (_FileName.IndexOf("\\") != -1) + { + // trim any leading path + _FileName = Path.GetFileName(_FileName); + } + } + } + + /// + /// The last modified time for the GZIP stream. + /// + /// + /// + /// GZIP allows the storage of a last modified time with each GZIP entity. + /// When compressing data, you can set this before the first call to + /// Write(). When decompressing, you can retrieve this value any time + /// after the first call to Read(). + /// + public DateTime? LastModified; + + /// + /// The CRC on the GZIP stream. + /// + /// + /// This is used for internal error checking. You probably don't need to look at this property. + /// + public int Crc32 { get { return _Crc32; } } + + private int _headerByteCount; + internal ZlibBaseStream _baseStream; + bool _disposed; + bool _firstReadDone; + string _FileName; + string _Comment; + int _Crc32; + + + /// + /// Create a GZipStream using the specified CompressionMode. + /// + /// + /// + /// + /// When mode is CompressionMode.Compress, the GZipStream will use the + /// default compression level. + /// + /// + /// + /// As noted in the class documentation, the CompressionMode (Compress + /// or Decompress) also establishes the "direction" of the stream. A + /// GZipStream with CompressionMode.Compress works only through + /// Write(). A GZipStream with + /// CompressionMode.Decompress works only through Read(). + /// + /// + /// + /// + /// + /// This example shows how to use a GZipStream to compress data. + /// + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (var raw = System.IO.File.Create(outputFile)) + /// { + /// using (Stream compressor = new GZipStream(raw, CompressionMode.Compress)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n; + /// while ((n= input.Read(buffer, 0, buffer.Length)) != 0) + /// { + /// compressor.Write(buffer, 0, n); + /// } + /// } + /// } + /// } + /// + /// + /// Dim outputFile As String = (fileToCompress & ".compressed") + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using raw As FileStream = File.Create(outputFile) + /// Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// End Using + /// + /// + /// + /// + /// This example shows how to use a GZipStream to uncompress a file. + /// + /// private void GunZipFile(string filename) + /// { + /// if (!filename.EndsWith(".gz)) + /// throw new ArgumentException("filename"); + /// var DecompressedFile = filename.Substring(0,filename.Length-3); + /// byte[] working = new byte[WORKING_BUFFER_SIZE]; + /// int n= 1; + /// using (System.IO.Stream input = System.IO.File.OpenRead(filename)) + /// { + /// using (Stream decompressor= new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, true)) + /// { + /// using (var output = System.IO.File.Create(DecompressedFile)) + /// { + /// while (n !=0) + /// { + /// n= decompressor.Read(working, 0, working.Length); + /// if (n > 0) + /// { + /// output.Write(working, 0, n); + /// } + /// } + /// } + /// } + /// } + /// } + /// + /// + /// + /// Private Sub GunZipFile(ByVal filename as String) + /// If Not (filename.EndsWith(".gz)) Then + /// Throw New ArgumentException("filename") + /// End If + /// Dim DecompressedFile as String = filename.Substring(0,filename.Length-3) + /// Dim working(WORKING_BUFFER_SIZE) as Byte + /// Dim n As Integer = 1 + /// Using input As Stream = File.OpenRead(filename) + /// Using decompressor As Stream = new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, True) + /// Using output As Stream = File.Create(UncompressedFile) + /// Do + /// n= decompressor.Read(working, 0, working.Length) + /// If n > 0 Then + /// output.Write(working, 0, n) + /// End IF + /// Loop While (n > 0) + /// End Using + /// End Using + /// End Using + /// End Sub + /// + /// + /// + /// The stream which will be read or written. + /// Indicates whether the GZipStream will compress or decompress. + public GZipStream(Stream stream, CompressionMode mode) + : this(stream, mode, CompressionLevel.Default, false) + { + } + + /// + /// Create a GZipStream using the specified CompressionMode and + /// the specified CompressionLevel. + /// + /// + /// + /// + /// The CompressionMode (Compress or Decompress) also establishes the + /// "direction" of the stream. A GZipStream with + /// CompressionMode.Compress works only through Write(). A + /// GZipStream with CompressionMode.Decompress works only + /// through Read(). + /// + /// + /// + /// + /// + /// + /// This example shows how to use a GZipStream to compress a file into a .gz file. + /// + /// + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (var raw = System.IO.File.Create(fileToCompress + ".gz")) + /// { + /// using (Stream compressor = new GZipStream(raw, + /// CompressionMode.Compress, + /// CompressionLevel.BestCompression)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n; + /// while ((n= input.Read(buffer, 0, buffer.Length)) != 0) + /// { + /// compressor.Write(buffer, 0, n); + /// } + /// } + /// } + /// } + /// + /// + /// + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using raw As FileStream = File.Create(fileToCompress & ".gz") + /// Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// End Using + /// + /// + /// The stream to be read or written while deflating or inflating. + /// Indicates whether the GZipStream will compress or decompress. + /// A tuning knob to trade speed for effectiveness. + public GZipStream(Stream stream, CompressionMode mode, CompressionLevel level) + : this(stream, mode, level, false) + { + } + + /// + /// Create a GZipStream using the specified CompressionMode, and + /// explicitly specify whether the stream should be left open after Deflation + /// or Inflation. + /// + /// + /// + /// + /// This constructor allows the application to request that the captive stream + /// remain open after the deflation or inflation occurs. By default, after + /// Close() is called on the stream, the captive stream is also + /// closed. In some cases this is not desired, for example if the stream is a + /// memory stream that will be re-read after compressed data has been written + /// to it. Specify true for the parameter to leave + /// the stream open. + /// + /// + /// + /// The (Compress or Decompress) also + /// establishes the "direction" of the stream. A GZipStream with + /// CompressionMode.Compress works only through Write(). A GZipStream + /// with CompressionMode.Decompress works only through Read(). + /// + /// + /// + /// The GZipStream will use the default compression level. If you want + /// to specify the compression level, see . + /// + /// + /// + /// See the other overloads of this constructor for example code. + /// + /// + /// + /// + /// + /// The stream which will be read or written. This is called the "captive" + /// stream in other places in this documentation. + /// + /// + /// Indicates whether the GZipStream will compress or decompress. + /// + /// + /// + /// true if the application would like the base stream to remain open after + /// inflation/deflation. + /// + public GZipStream(Stream stream, CompressionMode mode, bool leaveOpen) + : this(stream, mode, CompressionLevel.Default, leaveOpen) + { + } + + /// + /// Create a GZipStream using the specified CompressionMode and the + /// specified CompressionLevel, and explicitly specify whether the + /// stream should be left open after Deflation or Inflation. + /// + /// + /// + /// + /// + /// This constructor allows the application to request that the captive stream + /// remain open after the deflation or inflation occurs. By default, after + /// Close() is called on the stream, the captive stream is also + /// closed. In some cases this is not desired, for example if the stream is a + /// memory stream that will be re-read after compressed data has been written + /// to it. Specify true for the parameter to + /// leave the stream open. + /// + /// + /// + /// As noted in the class documentation, the CompressionMode (Compress + /// or Decompress) also establishes the "direction" of the stream. A + /// GZipStream with CompressionMode.Compress works only through + /// Write(). A GZipStream with CompressionMode.Decompress works only + /// through Read(). + /// + /// + /// + /// + /// + /// This example shows how to use a GZipStream to compress data. + /// + /// using (System.IO.Stream input = System.IO.File.OpenRead(fileToCompress)) + /// { + /// using (var raw = System.IO.File.Create(outputFile)) + /// { + /// using (Stream compressor = new GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression, true)) + /// { + /// byte[] buffer = new byte[WORKING_BUFFER_SIZE]; + /// int n; + /// while ((n= input.Read(buffer, 0, buffer.Length)) != 0) + /// { + /// compressor.Write(buffer, 0, n); + /// } + /// } + /// } + /// } + /// + /// + /// Dim outputFile As String = (fileToCompress & ".compressed") + /// Using input As Stream = File.OpenRead(fileToCompress) + /// Using raw As FileStream = File.Create(outputFile) + /// Using compressor As Stream = New GZipStream(raw, CompressionMode.Compress, CompressionLevel.BestCompression, True) + /// Dim buffer As Byte() = New Byte(4096) {} + /// Dim n As Integer = -1 + /// Do While (n <> 0) + /// If (n > 0) Then + /// compressor.Write(buffer, 0, n) + /// End If + /// n = input.Read(buffer, 0, buffer.Length) + /// Loop + /// End Using + /// End Using + /// End Using + /// + /// + /// The stream which will be read or written. + /// Indicates whether the GZipStream will compress or decompress. + /// true if the application would like the stream to remain open after inflation/deflation. + /// A tuning knob to trade speed for effectiveness. + public GZipStream(Stream stream, CompressionMode mode, CompressionLevel level, bool leaveOpen) + { + _baseStream = new ZlibBaseStream(stream, mode, level, ZlibStreamFlavor.GZIP, leaveOpen); + } + + #region Zlib properties + + /// + /// This property sets the flush behavior on the stream. + /// + virtual public FlushType FlushMode + { + get { return (this._baseStream._flushMode); } + set { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + this._baseStream._flushMode = value; + } + } + + /// + /// The size of the working buffer for the compression codec. + /// + /// + /// + /// + /// The working buffer is used for all stream operations. The default size is + /// 1024 bytes. The minimum size is 128 bytes. You may get better performance + /// with a larger buffer. Then again, you might not. You would have to test + /// it. + /// + /// + /// + /// Set this before the first call to Read() or Write() on the + /// stream. If you try to set it afterwards, it will throw. + /// + /// + public int BufferSize + { + get + { + return this._baseStream._bufferSize; + } + set + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + if (this._baseStream._workingBuffer != null) + throw new ZlibException("The working buffer is already set."); + if (value < ZlibConstants.WorkingBufferSizeMin) + throw new ZlibException(String.Format("Don't be silly. {0} bytes?? Use a bigger buffer, at least {1}.", value, ZlibConstants.WorkingBufferSizeMin)); + this._baseStream._bufferSize = value; + } + } + + + /// Returns the total number of bytes input so far. + virtual public long TotalIn + { + get + { + return this._baseStream._z.TotalBytesIn; + } + } + + /// Returns the total number of bytes output so far. + virtual public long TotalOut + { + get + { + return this._baseStream._z.TotalBytesOut; + } + } + + #endregion + + #region Stream methods + + /// + /// Dispose the stream. + /// + /// + /// + /// This may or may not result in a Close() call on the captive + /// stream. See the constructors that have a leaveOpen parameter + /// for more information. + /// + /// + /// This method may be invoked in two distinct scenarios. If disposing + /// == true, the method has been called directly or indirectly by a + /// user's code, for example via the public Dispose() method. In this + /// case, both managed and unmanaged resources can be referenced and + /// disposed. If disposing == false, the method has been called by the + /// runtime from inside the object finalizer and this method should not + /// reference other objects; in that case only unmanaged resources must + /// be referenced or disposed. + /// + /// + /// + /// indicates whether the Dispose method was invoked by user code. + /// + protected override void Dispose(bool disposing) + { + try + { + if (!_disposed) + { + if (disposing && (this._baseStream != null)) + { + this._baseStream.Close(); + this._Crc32 = _baseStream.Crc32; + } + _disposed = true; + } + } + finally + { + base.Dispose(disposing); + } + } + + + /// + /// Indicates whether the stream can be read. + /// + /// + /// The return value depends on whether the captive stream supports reading. + /// + public override bool CanRead + { + get + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + return _baseStream._stream.CanRead; + } + } + + /// + /// Indicates whether the stream supports Seek operations. + /// + /// + /// Always returns false. + /// + public override bool CanSeek + { + get { return false; } + } + + + /// + /// Indicates whether the stream can be written. + /// + /// + /// The return value depends on whether the captive stream supports writing. + /// + public override bool CanWrite + { + get + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + return _baseStream._stream.CanWrite; + } + } + + /// + /// Flush the stream. + /// + public override void Flush() + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + _baseStream.Flush(); + } + + /// + /// Reading this property always throws a . + /// + public override long Length + { + get { throw new NotImplementedException(); } + } + + /// + /// The position of the stream pointer. + /// + /// + /// + /// Setting this property always throws a . Reading will return the total bytes + /// written out, if used in writing, or the total bytes read in, if used in + /// reading. The count may refer to compressed bytes or uncompressed bytes, + /// depending on how you've used the stream. + /// + public override long Position + { + get + { + if (this._baseStream._streamMode == ZlibBaseStream.StreamMode.Writer) + return this._baseStream._z.TotalBytesOut + _headerByteCount; + if (this._baseStream._streamMode == ZlibBaseStream.StreamMode.Reader) + return this._baseStream._z.TotalBytesIn + this._baseStream._gzipHeaderByteCount; + return 0; + } + + set { throw new NotImplementedException(); } + } + + /// + /// Read and decompress data from the source stream. + /// + /// + /// + /// With a GZipStream, decompression is done through reading. + /// + /// + /// + /// + /// byte[] working = new byte[WORKING_BUFFER_SIZE]; + /// using (System.IO.Stream input = System.IO.File.OpenRead(_CompressedFile)) + /// { + /// using (Stream decompressor= new Ionic.Zlib.GZipStream(input, CompressionMode.Decompress, true)) + /// { + /// using (var output = System.IO.File.Create(_DecompressedFile)) + /// { + /// int n; + /// while ((n= decompressor.Read(working, 0, working.Length)) !=0) + /// { + /// output.Write(working, 0, n); + /// } + /// } + /// } + /// } + /// + /// + /// The buffer into which the decompressed data should be placed. + /// the offset within that data array to put the first byte read. + /// the number of bytes to read. + /// the number of bytes actually read + public override int Read(byte[] buffer, int offset, int count) + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + int n = _baseStream.Read(buffer, offset, count); + + // Console.WriteLine("GZipStream::Read(buffer, off({0}), c({1}) = {2}", offset, count, n); + // Console.WriteLine( Util.FormatByteArray(buffer, offset, n) ); + + if (!_firstReadDone) + { + _firstReadDone = true; + FileName = _baseStream._GzipFileName; + Comment = _baseStream._GzipComment; + } + return n; + } + + + + /// + /// Calling this method always throws a . + /// + /// irrelevant; it will always throw! + /// irrelevant; it will always throw! + /// irrelevant! + public override long Seek(long offset, SeekOrigin origin) + { + throw new NotImplementedException(); + } + + /// + /// Calling this method always throws a . + /// + /// irrelevant; this method will always throw! + public override void SetLength(long value) + { + //throw new NotImplementedException(); + _baseStream.SetLength(value); + } + + /// + /// Write data to the stream. + /// + /// + /// + /// + /// If you wish to use the GZipStream to compress data while writing, + /// you can create a GZipStream with CompressionMode.Compress, and a + /// writable output stream. Then call Write() on that GZipStream, + /// providing uncompressed data as input. The data sent to the output stream + /// will be the compressed form of the data written. + /// + /// + /// + /// A GZipStream can be used for Read() or Write(), but not + /// both. Writing implies compression. Reading implies decompression. + /// + /// + /// + /// The buffer holding data to write to the stream. + /// the offset within that data array to find the first byte to write. + /// the number of bytes to write. + public override void Write(byte[] buffer, int offset, int count) + { + if (_disposed) throw new ObjectDisposedException("GZipStream"); + if (_baseStream._streamMode == ZlibBaseStream.StreamMode.Undefined) + { + //Console.WriteLine("GZipStream: First write"); + if (_baseStream._wantCompress) + { + // first write in compression, therefore, emit the GZIP header + _headerByteCount = EmitHeader(); + } + else + { + throw new InvalidOperationException(); + } + } + + _baseStream.Write(buffer, offset, count); + } + #endregion + + + internal static readonly System.DateTime _unixEpoch = new System.DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc); + internal static readonly System.Text.Encoding iso8859dash1 = System.Text.Encoding.GetEncoding("iso-8859-1"); + + + private int EmitHeader() + { + byte[] commentBytes = (Comment == null) ? null : iso8859dash1.GetBytes(Comment); + byte[] filenameBytes = (FileName == null) ? null : iso8859dash1.GetBytes(FileName); + + int cbLength = (Comment == null) ? 0 : commentBytes.Length + 1; + int fnLength = (FileName == null) ? 0 : filenameBytes.Length + 1; + + int bufferLength = 10 + cbLength + fnLength; + byte[] header = BufferPool.Get(bufferLength, true); + int i = 0; + // ID + header[i++] = 0x1F; + header[i++] = 0x8B; + + // compression method + header[i++] = 8; + byte flag = 0; + if (Comment != null) + flag ^= 0x10; + if (FileName != null) + flag ^= 0x8; + + // flag + header[i++] = flag; + + // mtime + if (!LastModified.HasValue) LastModified = DateTime.UtcNow; + System.TimeSpan delta = LastModified.Value - _unixEpoch; + Int32 timet = (Int32)delta.TotalSeconds; + Array.Copy(BitConverter.GetBytes(timet), 0, header, i, 4); + i += 4; + + // xflg + header[i++] = 0; // this field is totally useless + // OS + header[i++] = 0xFF; // 0xFF == unspecified + + // extra field length - only if FEXTRA is set, which it is not. + //header[i++]= 0; + //header[i++]= 0; + + // filename + if (fnLength != 0) + { + Array.Copy(filenameBytes, 0, header, i, fnLength - 1); + i += fnLength - 1; + header[i++] = 0; // terminate + } + + // comment + if (cbLength != 0) + { + Array.Copy(commentBytes, 0, header, i, cbLength - 1); + i += cbLength - 1; + header[i++] = 0; // terminate + } + + _baseStream._stream.Write(header, 0, i); + int headerLength = header.Length; + + BufferPool.Release(header); + + return headerLength; // bytes written + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs.meta new file mode 100644 index 00000000..4efb8bd6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e706c2e4fdfecda41ba004d6234fe442 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/GZipStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/InfTree.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/InfTree.cs new file mode 100644 index 00000000..87a2360e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/InfTree.cs @@ -0,0 +1,436 @@ +// Inftree.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2009-October-28 12:43:54> +// +// ------------------------------------------------------------------ +// +// This module defines classes used in decompression. This code is derived +// from the jzlib implementation of zlib. In keeping with the license for jzlib, +// the copyright to that code is below. +// +// ------------------------------------------------------------------ +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + + +using System; +namespace Best.HTTP.Shared.Compression.Zlib +{ + + sealed class InfTree + { + + private const int MANY = 1440; + + private const int Z_OK = 0; + private const int Z_STREAM_END = 1; + private const int Z_NEED_DICT = 2; + private const int Z_ERRNO = - 1; + private const int Z_STREAM_ERROR = - 2; + private const int Z_DATA_ERROR = - 3; + private const int Z_MEM_ERROR = - 4; + private const int Z_BUF_ERROR = - 5; + private const int Z_VERSION_ERROR = - 6; + + internal const int fixed_bl = 9; + internal const int fixed_bd = 5; + + //UPGRADE_NOTE: Final was removed from the declaration of 'fixed_tl'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] fixed_tl = new int[]{96, 7, 256, 0, 8, 80, 0, 8, 16, 84, 8, 115, 82, 7, 31, 0, 8, 112, 0, 8, 48, 0, 9, 192, 80, 7, 10, 0, 8, 96, 0, 8, 32, 0, 9, 160, 0, 8, 0, 0, 8, 128, 0, 8, 64, 0, 9, 224, 80, 7, 6, 0, 8, 88, 0, 8, 24, 0, 9, 144, 83, 7, 59, 0, 8, 120, 0, 8, 56, 0, 9, 208, 81, 7, 17, 0, 8, 104, 0, 8, 40, 0, 9, 176, 0, 8, 8, 0, 8, 136, 0, 8, 72, 0, 9, 240, 80, 7, 4, 0, 8, 84, 0, 8, 20, 85, 8, 227, 83, 7, 43, 0, 8, 116, 0, 8, 52, 0, 9, 200, 81, 7, 13, 0, 8, 100, 0, 8, 36, 0, 9, 168, 0, 8, 4, 0, 8, 132, 0, 8, 68, 0, 9, 232, 80, 7, 8, 0, 8, 92, 0, 8, 28, 0, 9, 152, 84, 7, 83, 0, 8, 124, 0, 8, 60, 0, 9, 216, 82, 7, 23, 0, 8, 108, 0, 8, 44, 0, 9, 184, 0, 8, 12, 0, 8, 140, 0, 8, 76, 0, 9, 248, 80, 7, 3, 0, 8, 82, 0, 8, 18, 85, 8, 163, 83, 7, 35, 0, 8, 114, 0, 8, 50, 0, 9, 196, 81, 7, 11, 0, 8, 98, 0, 8, 34, 0, 9, 164, 0, 8, 2, 0, 8, 130, 0, 8, 66, 0, 9, 228, 80, 7, 7, 0, 8, 90, 0, 8, 26, 0, 9, 148, 84, 7, 67, 0, 8, 122, 0, 8, 58, 0, 9, 212, 82, 7, 19, 0, 8, 106, 0, 8, 42, 0, 9, 180, 0, 8, 10, 0, 8, 138, 0, 8, 74, 0, 9, 244, 80, 7, 5, 0, 8, 86, 0, 8, 22, 192, 8, 0, 83, 7, 51, 0, 8, 118, 0, 8, 54, 0, 9, 204, 81, 7, 15, 0, 8, 102, 0, 8, 38, 0, 9, 172, 0, 8, 6, 0, 8, 134, 0, 8, 70, 0, 9, 236, 80, 7, 9, 0, 8, 94, 0, 8, 30, 0, 9, 156, 84, 7, 99, 0, 8, 126, 0, 8, 62, 0, 9, 220, 82, 7, 27, 0, 8, 110, 0, 8, 46, 0, 9, 188, 0, 8, 14, 0, 8, 142, 0, 8, 78, 0, 9, 252, 96, 7, 256, 0, 8, 81, 0, 8, 17, 85, 8, 131, 82, 7, 31, 0, 8, 113, 0, 8, 49, 0, 9, 194, 80, 7, 10, 0, 8, 97, 0, 8, 33, 0, 9, 162, 0, 8, 1, 0, 8, 129, 0, 8, 65, 0, 9, 226, 80, 7, 6, 0, 8, 89, 0, 8, 25, 0, 9, 146, 83, 7, 59, 0, 8, 121, 0, 8, 57, 0, 9, 210, 81, 7, 17, 0, 8, 105, 0, 8, 41, 0, 9, 178, 0, 8, 9, 0, 8, 137, 0, 8, 73, 0, 9, 242, 80, 7, 4, 0, 8, 85, 0, 8, 21, 80, 8, 258, 83, 7, 43, 0, 8, 117, 0, 8, 53, 0, 9, 202, 81, 7, 13, 0, 8, 101, 0, 8, 37, 0, 9, 170, 0, 8, 5, 0, 8, 133, 0, 8, 69, 0, 9, 234, 80, 7, 8, 0, 8, 93, 0, 8, 29, 0, 9, 154, 84, 7, 83, 0, 8, 125, 0, 8, 61, 0, 9, 218, 82, 7, 23, 0, 8, 109, 0, 8, 45, 0, 9, 186, + 0, 8, 13, 0, 8, 141, 0, 8, 77, 0, 9, 250, 80, 7, 3, 0, 8, 83, 0, 8, 19, 85, 8, 195, 83, 7, 35, 0, 8, 115, 0, 8, 51, 0, 9, 198, 81, 7, 11, 0, 8, 99, 0, 8, 35, 0, 9, 166, 0, 8, 3, 0, 8, 131, 0, 8, 67, 0, 9, 230, 80, 7, 7, 0, 8, 91, 0, 8, 27, 0, 9, 150, 84, 7, 67, 0, 8, 123, 0, 8, 59, 0, 9, 214, 82, 7, 19, 0, 8, 107, 0, 8, 43, 0, 9, 182, 0, 8, 11, 0, 8, 139, 0, 8, 75, 0, 9, 246, 80, 7, 5, 0, 8, 87, 0, 8, 23, 192, 8, 0, 83, 7, 51, 0, 8, 119, 0, 8, 55, 0, 9, 206, 81, 7, 15, 0, 8, 103, 0, 8, 39, 0, 9, 174, 0, 8, 7, 0, 8, 135, 0, 8, 71, 0, 9, 238, 80, 7, 9, 0, 8, 95, 0, 8, 31, 0, 9, 158, 84, 7, 99, 0, 8, 127, 0, 8, 63, 0, 9, 222, 82, 7, 27, 0, 8, 111, 0, 8, 47, 0, 9, 190, 0, 8, 15, 0, 8, 143, 0, 8, 79, 0, 9, 254, 96, 7, 256, 0, 8, 80, 0, 8, 16, 84, 8, 115, 82, 7, 31, 0, 8, 112, 0, 8, 48, 0, 9, 193, 80, 7, 10, 0, 8, 96, 0, 8, 32, 0, 9, 161, 0, 8, 0, 0, 8, 128, 0, 8, 64, 0, 9, 225, 80, 7, 6, 0, 8, 88, 0, 8, 24, 0, 9, 145, 83, 7, 59, 0, 8, 120, 0, 8, 56, 0, 9, 209, 81, 7, 17, 0, 8, 104, 0, 8, 40, 0, 9, 177, 0, 8, 8, 0, 8, 136, 0, 8, 72, 0, 9, 241, 80, 7, 4, 0, 8, 84, 0, 8, 20, 85, 8, 227, 83, 7, 43, 0, 8, 116, 0, 8, 52, 0, 9, 201, 81, 7, 13, 0, 8, 100, 0, 8, 36, 0, 9, 169, 0, 8, 4, 0, 8, 132, 0, 8, 68, 0, 9, 233, 80, 7, 8, 0, 8, 92, 0, 8, 28, 0, 9, 153, 84, 7, 83, 0, 8, 124, 0, 8, 60, 0, 9, 217, 82, 7, 23, 0, 8, 108, 0, 8, 44, 0, 9, 185, 0, 8, 12, 0, 8, 140, 0, 8, 76, 0, 9, 249, 80, 7, 3, 0, 8, 82, 0, 8, 18, 85, 8, 163, 83, 7, 35, 0, 8, 114, 0, 8, 50, 0, 9, 197, 81, 7, 11, 0, 8, 98, 0, 8, 34, 0, 9, 165, 0, 8, 2, 0, 8, 130, 0, 8, 66, 0, 9, 229, 80, 7, 7, 0, 8, 90, 0, 8, 26, 0, 9, 149, 84, 7, 67, 0, 8, 122, 0, 8, 58, 0, 9, 213, 82, 7, 19, 0, 8, 106, 0, 8, 42, 0, 9, 181, 0, 8, 10, 0, 8, 138, 0, 8, 74, 0, 9, 245, 80, 7, 5, 0, 8, 86, 0, 8, 22, 192, 8, 0, 83, 7, 51, 0, 8, 118, 0, 8, 54, 0, 9, 205, 81, 7, 15, 0, 8, 102, 0, 8, 38, 0, 9, 173, 0, 8, 6, 0, 8, 134, 0, 8, 70, 0, 9, 237, 80, 7, 9, 0, 8, 94, 0, 8, 30, 0, 9, 157, 84, 7, 99, 0, 8, 126, 0, 8, 62, 0, 9, 221, 82, 7, 27, 0, 8, 110, 0, 8, 46, 0, 9, 189, 0, 8, + 14, 0, 8, 142, 0, 8, 78, 0, 9, 253, 96, 7, 256, 0, 8, 81, 0, 8, 17, 85, 8, 131, 82, 7, 31, 0, 8, 113, 0, 8, 49, 0, 9, 195, 80, 7, 10, 0, 8, 97, 0, 8, 33, 0, 9, 163, 0, 8, 1, 0, 8, 129, 0, 8, 65, 0, 9, 227, 80, 7, 6, 0, 8, 89, 0, 8, 25, 0, 9, 147, 83, 7, 59, 0, 8, 121, 0, 8, 57, 0, 9, 211, 81, 7, 17, 0, 8, 105, 0, 8, 41, 0, 9, 179, 0, 8, 9, 0, 8, 137, 0, 8, 73, 0, 9, 243, 80, 7, 4, 0, 8, 85, 0, 8, 21, 80, 8, 258, 83, 7, 43, 0, 8, 117, 0, 8, 53, 0, 9, 203, 81, 7, 13, 0, 8, 101, 0, 8, 37, 0, 9, 171, 0, 8, 5, 0, 8, 133, 0, 8, 69, 0, 9, 235, 80, 7, 8, 0, 8, 93, 0, 8, 29, 0, 9, 155, 84, 7, 83, 0, 8, 125, 0, 8, 61, 0, 9, 219, 82, 7, 23, 0, 8, 109, 0, 8, 45, 0, 9, 187, 0, 8, 13, 0, 8, 141, 0, 8, 77, 0, 9, 251, 80, 7, 3, 0, 8, 83, 0, 8, 19, 85, 8, 195, 83, 7, 35, 0, 8, 115, 0, 8, 51, 0, 9, 199, 81, 7, 11, 0, 8, 99, 0, 8, 35, 0, 9, 167, 0, 8, 3, 0, 8, 131, 0, 8, 67, 0, 9, 231, 80, 7, 7, 0, 8, 91, 0, 8, 27, 0, 9, 151, 84, 7, 67, 0, 8, 123, 0, 8, 59, 0, 9, 215, 82, 7, 19, 0, 8, 107, 0, 8, 43, 0, 9, 183, 0, 8, 11, 0, 8, 139, 0, 8, 75, 0, 9, 247, 80, 7, 5, 0, 8, 87, 0, 8, 23, 192, 8, 0, 83, 7, 51, 0, 8, 119, 0, 8, 55, 0, 9, 207, 81, 7, 15, 0, 8, 103, 0, 8, 39, 0, 9, 175, 0, 8, 7, 0, 8, 135, 0, 8, 71, 0, 9, 239, 80, 7, 9, 0, 8, 95, 0, 8, 31, 0, 9, 159, 84, 7, 99, 0, 8, 127, 0, 8, 63, 0, 9, 223, 82, 7, 27, 0, 8, 111, 0, 8, 47, 0, 9, 191, 0, 8, 15, 0, 8, 143, 0, 8, 79, 0, 9, 255}; + //UPGRADE_NOTE: Final was removed from the declaration of 'fixed_td'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] fixed_td = new int[]{80, 5, 1, 87, 5, 257, 83, 5, 17, 91, 5, 4097, 81, 5, 5, 89, 5, 1025, 85, 5, 65, 93, 5, 16385, 80, 5, 3, 88, 5, 513, 84, 5, 33, 92, 5, 8193, 82, 5, 9, 90, 5, 2049, 86, 5, 129, 192, 5, 24577, 80, 5, 2, 87, 5, 385, 83, 5, 25, 91, 5, 6145, 81, 5, 7, 89, 5, 1537, 85, 5, 97, 93, 5, 24577, 80, 5, 4, 88, 5, 769, 84, 5, 49, 92, 5, 12289, 82, 5, 13, 90, 5, 3073, 86, 5, 193, 192, 5, 24577}; + + // Tables for deflate from PKZIP's appnote.txt. + //UPGRADE_NOTE: Final was removed from the declaration of 'cplens'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] cplens = new int[]{3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 15, 17, 19, 23, 27, 31, 35, 43, 51, 59, 67, 83, 99, 115, 131, 163, 195, 227, 258, 0, 0}; + + // see note #13 above about 258 + //UPGRADE_NOTE: Final was removed from the declaration of 'cplext'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] cplext = new int[]{0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0, 112, 112}; + + //UPGRADE_NOTE: Final was removed from the declaration of 'cpdist'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] cpdist = new int[]{1, 2, 3, 4, 5, 7, 9, 13, 17, 25, 33, 49, 65, 97, 129, 193, 257, 385, 513, 769, 1025, 1537, 2049, 3073, 4097, 6145, 8193, 12289, 16385, 24577}; + + //UPGRADE_NOTE: Final was removed from the declaration of 'cpdext'. "ms-help://MS.VSCC.v80/dv_commoner/local/redirect.htm?index='!DefaultContextWindowIndex'&keyword='jlca1003'" + internal static readonly int[] cpdext = new int[]{0, 0, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6, 7, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 13, 13}; + + // If BMAX needs to be larger than 16, then h and x[] should be uLong. + internal const int BMAX = 15; // maximum bit length of any code + + internal int[] hn = null; // hufts used in space + internal int[] v = null; // work area for huft_build + internal int[] c = null; // bit length count table + internal int[] r = null; // table entity for structure assignment + internal int[] u = null; // table stack + internal int[] x = null; // bit offsets, then code stack + + private int huft_build(int[] b, int bindex, int n, int s, int[] d, int[] e, int[] t, int[] m, int[] hp, int[] hn, int[] v) + { + // Given a list of code lengths and a maximum table size, make a set of + // tables to decode that set of codes. Return Z_OK on success, Z_BUF_ERROR + // if the given code set is incomplete (the tables are still built in this + // case), Z_DATA_ERROR if the input is invalid (an over-subscribed set of + // lengths), or Z_MEM_ERROR if not enough memory. + + int a; // counter for codes of length k + int f; // i repeats in table every f entries + int g; // maximum code length + int h; // table level + int i; // counter, current code + int j; // counter + int k; // number of bits in current code + int l; // bits per table (returned in m) + int mask; // (1 << w) - 1, to avoid cc -O bug on HP + int p; // pointer into c[], b[], or v[] + int q; // points to current table + int w; // bits before this table == (l * h) + int xp; // pointer into x + int y; // number of dummy codes added + int z; // number of entries in current table + + // Generate counts for each bit length + + p = 0; i = n; + do + { + c[b[bindex + p]]++; p++; i--; // assume all entries <= BMAX + } + while (i != 0); + + if (c[0] == n) + { + // null input--all zero length codes + t[0] = - 1; + m[0] = 0; + return Z_OK; + } + + // Find minimum and maximum length, bound *m by those + l = m[0]; + for (j = 1; j <= BMAX; j++) + if (c[j] != 0) + break; + k = j; // minimum code length + if (l < j) + { + l = j; + } + for (i = BMAX; i != 0; i--) + { + if (c[i] != 0) + break; + } + g = i; // maximum code length + if (l > i) + { + l = i; + } + m[0] = l; + + // Adjust last length count to fill out codes, if needed + for (y = 1 << j; j < i; j++, y <<= 1) + { + if ((y -= c[j]) < 0) + { + return Z_DATA_ERROR; + } + } + if ((y -= c[i]) < 0) + { + return Z_DATA_ERROR; + } + c[i] += y; + + // Generate starting offsets into the value table for each length + x[1] = j = 0; + p = 1; xp = 2; + while (--i != 0) + { + // note that i == g from above + x[xp] = (j += c[p]); + xp++; + p++; + } + + // Make a table of values in order of bit lengths + i = 0; p = 0; + do + { + if ((j = b[bindex + p]) != 0) + { + v[x[j]++] = i; + } + p++; + } + while (++i < n); + n = x[g]; // set n to length of v + + // Generate the Huffman codes and for each, make the table entries + x[0] = i = 0; // first Huffman code is zero + p = 0; // grab values in bit order + h = - 1; // no tables yet--level -1 + w = - l; // bits decoded == (l * h) + u[0] = 0; // just to keep compilers happy + q = 0; // ditto + z = 0; // ditto + + // go through the bit lengths (k already is bits in shortest code) + for (; k <= g; k++) + { + a = c[k]; + while (a-- != 0) + { + // here i is the Huffman code of length k bits for value *p + // make tables up to required level + while (k > w + l) + { + h++; + w += l; // previous table always l bits + // compute minimum size table less than or equal to l bits + z = g - w; + z = (z > l)?l:z; // table size upper limit + if ((f = 1 << (j = k - w)) > a + 1) + { + // try a k-w bit table + // too few codes for k-w bit table + f -= (a + 1); // deduct codes from patterns left + xp = k; + if (j < z) + { + while (++j < z) + { + // try smaller tables up to z bits + if ((f <<= 1) <= c[++xp]) + break; // enough codes to use up j bits + f -= c[xp]; // else deduct codes from patterns + } + } + } + z = 1 << j; // table entries for j-bit table + + // allocate new table + if (hn[0] + z > MANY) + { + // (note: doesn't matter for fixed) + return Z_DATA_ERROR; // overflow of MANY + } + u[h] = q = hn[0]; // DEBUG + hn[0] += z; + + // connect to last table, if there is one + if (h != 0) + { + x[h] = i; // save pattern for backing up + r[0] = (sbyte) j; // bits in this table + r[1] = (sbyte) l; // bits to dump before this table + j = SharedUtils.URShift(i, (w - l)); + r[2] = (int) (q - u[h - 1] - j); // offset to this table + Array.Copy(r, 0, hp, (u[h - 1] + j) * 3, 3); // connect to last table + } + else + { + t[0] = q; // first table is returned result + } + } + + // set up table entity in r + r[1] = (sbyte) (k - w); + if (p >= n) + { + r[0] = 128 + 64; // out of values--invalid code + } + else if (v[p] < s) + { + r[0] = (sbyte) (v[p] < 256?0:32 + 64); // 256 is end-of-block + r[2] = v[p++]; // simple code is just the value + } + else + { + r[0] = (sbyte) (e[v[p] - s] + 16 + 64); // non-simple--look up in lists + r[2] = d[v[p++] - s]; + } + + // fill code-like entries with r + f = 1 << (k - w); + for (j = SharedUtils.URShift(i, w); j < z; j += f) + { + Array.Copy(r, 0, hp, (q + j) * 3, 3); + } + + // backwards increment the k-bit code i + for (j = 1 << (k - 1); (i & j) != 0; j = SharedUtils.URShift(j, 1)) + { + i ^= j; + } + i ^= j; + + // backup over finished tables + mask = (1 << w) - 1; // needed on HP, cc -O bug + while ((i & mask) != x[h]) + { + h--; // don't need to update q + w -= l; + mask = (1 << w) - 1; + } + } + } + // Return Z_BUF_ERROR if we were given an incomplete table + return y != 0 && g != 1?Z_BUF_ERROR:Z_OK; + } + + internal int inflate_trees_bits(int[] c, int[] bb, int[] tb, int[] hp, ZlibCodec z) + { + int result; + initWorkArea(19); + hn[0] = 0; + result = huft_build(c, 0, 19, 19, null, null, tb, bb, hp, hn, v); + + if (result == Z_DATA_ERROR) + { + z.Message = "oversubscribed dynamic bit lengths tree"; + } + else if (result == Z_BUF_ERROR || bb[0] == 0) + { + z.Message = "incomplete dynamic bit lengths tree"; + result = Z_DATA_ERROR; + } + return result; + } + + internal int inflate_trees_dynamic(int nl, int nd, int[] c, int[] bl, int[] bd, int[] tl, int[] td, int[] hp, ZlibCodec z) + { + int result; + + // build literal/length tree + initWorkArea(288); + hn[0] = 0; + result = huft_build(c, 0, nl, 257, cplens, cplext, tl, bl, hp, hn, v); + if (result != Z_OK || bl[0] == 0) + { + if (result == Z_DATA_ERROR) + { + z.Message = "oversubscribed literal/length tree"; + } + else if (result != Z_MEM_ERROR) + { + z.Message = "incomplete literal/length tree"; + result = Z_DATA_ERROR; + } + return result; + } + + // build distance tree + initWorkArea(288); + result = huft_build(c, nl, nd, 0, cpdist, cpdext, td, bd, hp, hn, v); + + if (result != Z_OK || (bd[0] == 0 && nl > 257)) + { + if (result == Z_DATA_ERROR) + { + z.Message = "oversubscribed distance tree"; + } + else if (result == Z_BUF_ERROR) + { + z.Message = "incomplete distance tree"; + result = Z_DATA_ERROR; + } + else if (result != Z_MEM_ERROR) + { + z.Message = "empty distance tree with lengths"; + result = Z_DATA_ERROR; + } + return result; + } + + return Z_OK; + } + + internal static int inflate_trees_fixed(int[] bl, int[] bd, int[][] tl, int[][] td, ZlibCodec z) + { + bl[0] = fixed_bl; + bd[0] = fixed_bd; + tl[0] = fixed_tl; + td[0] = fixed_td; + return Z_OK; + } + + private void initWorkArea(int vsize) + { + if (hn == null) + { + hn = new int[1]; + v = new int[vsize]; + c = new int[BMAX + 1]; + r = new int[3]; + u = new int[BMAX]; + x = new int[BMAX + 1]; + } + else + { + if (v.Length < vsize) + { + v = new int[vsize]; + } + Array.Clear(v,0,vsize); + Array.Clear(c,0,BMAX+1); + r[0]=0; r[1]=0; r[2]=0; + // for(int i=0; i +// +// ------------------------------------------------------------------ +// +// This module defines classes for decompression. This code is derived +// from the jzlib implementation of zlib, but significantly modified. +// The object model is not the same, and many of the behaviors are +// different. Nonetheless, in keeping with the license for jzlib, I am +// reproducing the copyright to that code here. +// +// ------------------------------------------------------------------ +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; +namespace Best.HTTP.Shared.Compression.Zlib +{ + sealed class InflateBlocks + { + private const int MANY = 1440; + + // Table for deflate from PKZIP's appnote.txt. + internal static readonly int[] border = new int[] + { 16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15 }; + + private enum InflateBlockMode + { + TYPE = 0, // get type bits (3, including end bit) + LENS = 1, // get lengths for stored + STORED = 2, // processing stored block + TABLE = 3, // get table lengths + BTREE = 4, // get bit lengths tree for a dynamic block + DTREE = 5, // get length, distance trees for a dynamic block + CODES = 6, // processing fixed or dynamic block + DRY = 7, // output remaining window bytes + DONE = 8, // finished last block, done + BAD = 9, // ot a data error--stuck here + } + + private InflateBlockMode mode; // current inflate_block mode + + internal int left; // if STORED, bytes left to copy + + internal int table; // table lengths (14 bits) + internal int index; // index into blens (or border) + internal int[] blens; // bit lengths of codes + internal int[] bb = new int[1]; // bit length tree depth + internal int[] tb = new int[1]; // bit length decoding tree + + internal InflateCodes codes = new InflateCodes(); // if CODES, current state + + internal int last; // true if this block is the last block + + internal ZlibCodec _codec; // pointer back to this zlib stream + + // mode independent information + internal int bitk; // bits in bit buffer + internal int bitb; // bit buffer + internal int[] hufts; // single malloc for tree space + internal byte[] window; // sliding window + internal int end; // one byte after sliding window + internal int readAt; // window read pointer + internal int writeAt; // window write pointer + internal System.Object checkfn; // check function + internal uint check; // check on output + + internal InfTree inftree = new InfTree(); + + internal InflateBlocks(ZlibCodec codec, System.Object checkfn, int w) + { + _codec = codec; + hufts = new int[MANY * 3]; + window = BufferPool.Get(w, true); + end = w; + this.checkfn = checkfn; + mode = InflateBlockMode.TYPE; + Reset(); + } + + internal uint Reset() + { + uint oldCheck = check; + mode = InflateBlockMode.TYPE; + bitk = 0; + bitb = 0; + readAt = writeAt = 0; + + if (checkfn != null) + _codec._Adler32 = check = Adler.Adler32(0, null, 0, 0); + return oldCheck; + } + + + internal int Process(int r) + { + int t; // temporary storage + int b; // bit buffer + int k; // bits in bit buffer + int p; // input data pointer + int n; // bytes available there + int q; // output window write pointer + int m; // bytes to end of window or read pointer + + // copy input/output information to locals (UPDATE macro restores) + + p = _codec.NextIn; + n = _codec.AvailableBytesIn; + b = bitb; + k = bitk; + + q = writeAt; + m = (int)(q < readAt ? readAt - q - 1 : end - q); + + + // process input based on current state + while (true) + { + switch (mode) + { + case InflateBlockMode.TYPE: + + while (k < (3)) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + t = (int)(b & 7); + last = t & 1; + + switch ((uint)t >> 1) + { + case 0: // stored + b >>= 3; k -= (3); + t = k & 7; // go to byte boundary + b >>= t; k -= t; + mode = InflateBlockMode.LENS; // get length of stored block + break; + + case 1: // fixed + int[] bl = new int[1]; + int[] bd = new int[1]; + int[][] tl = new int[1][]; + int[][] td = new int[1][]; + InfTree.inflate_trees_fixed(bl, bd, tl, td, _codec); + codes.Init(bl[0], bd[0], tl[0], 0, td[0], 0); + b >>= 3; k -= 3; + mode = InflateBlockMode.CODES; + break; + + case 2: // dynamic + b >>= 3; k -= 3; + mode = InflateBlockMode.TABLE; + break; + + case 3: // illegal + b >>= 3; k -= 3; + mode = InflateBlockMode.BAD; + _codec.Message = "invalid block type"; + r = ZlibConstants.Z_DATA_ERROR; + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + break; + + case InflateBlockMode.LENS: + + while (k < (32)) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + ; + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + if ( ( ((~b)>>16) & 0xffff) != (b & 0xffff)) + { + mode = InflateBlockMode.BAD; + _codec.Message = "invalid stored block lengths"; + r = ZlibConstants.Z_DATA_ERROR; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + left = (b & 0xffff); + b = k = 0; // dump bits + mode = left != 0 ? InflateBlockMode.STORED : (last != 0 ? InflateBlockMode.DRY : InflateBlockMode.TYPE); + break; + + case InflateBlockMode.STORED: + if (n == 0) + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + if (m == 0) + { + if (q == end && readAt != 0) + { + q = 0; m = (int)(q < readAt ? readAt - q - 1 : end - q); + } + if (m == 0) + { + writeAt = q; + r = Flush(r); + q = writeAt; m = (int)(q < readAt ? readAt - q - 1 : end - q); + if (q == end && readAt != 0) + { + q = 0; m = (int)(q < readAt ? readAt - q - 1 : end - q); + } + if (m == 0) + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + } + } + r = ZlibConstants.Z_OK; + + t = left; + if (t > n) + t = n; + if (t > m) + t = m; + Array.Copy(_codec.InputBuffer, p, window, q, t); + p += t; n -= t; + q += t; m -= t; + if ((left -= t) != 0) + break; + mode = last != 0 ? InflateBlockMode.DRY : InflateBlockMode.TYPE; + break; + + case InflateBlockMode.TABLE: + + while (k < (14)) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + table = t = (b & 0x3fff); + if ((t & 0x1f) > 29 || ((t >> 5) & 0x1f) > 29) + { + mode = InflateBlockMode.BAD; + _codec.Message = "too many length or distance symbols"; + r = ZlibConstants.Z_DATA_ERROR; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + t = 258 + (t & 0x1f) + ((t >> 5) & 0x1f); + if (blens == null || blens.Length < t) + { + blens = new int[t]; + } + else + { + Array.Clear(blens, 0, t); + // for (int i = 0; i < t; i++) + // { + // blens[i] = 0; + // } + } + + b >>= 14; + k -= 14; + + + index = 0; + mode = InflateBlockMode.BTREE; + goto case InflateBlockMode.BTREE; + + case InflateBlockMode.BTREE: + while (index < 4 + (table >> 10)) + { + while (k < (3)) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + blens[border[index++]] = b & 7; + + b >>= 3; k -= 3; + } + + while (index < 19) + { + blens[border[index++]] = 0; + } + + bb[0] = 7; + t = inftree.inflate_trees_bits(blens, bb, tb, hufts, _codec); + if (t != ZlibConstants.Z_OK) + { + r = t; + if (r == ZlibConstants.Z_DATA_ERROR) + { + blens = null; + mode = InflateBlockMode.BAD; + } + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + index = 0; + mode = InflateBlockMode.DTREE; + goto case InflateBlockMode.DTREE; + + case InflateBlockMode.DTREE: + while (true) + { + t = table; + if (!(index < 258 + (t & 0x1f) + ((t >> 5) & 0x1f))) + { + break; + } + + int i, j, c; + + t = bb[0]; + + while (k < t) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + t = hufts[(tb[0] + (b & InternalInflateConstants.InflateMask[t])) * 3 + 1]; + c = hufts[(tb[0] + (b & InternalInflateConstants.InflateMask[t])) * 3 + 2]; + + if (c < 16) + { + b >>= t; k -= t; + blens[index++] = c; + } + else + { + // c == 16..18 + i = c == 18 ? 7 : c - 14; + j = c == 18 ? 11 : 3; + + while (k < (t + i)) + { + if (n != 0) + { + r = ZlibConstants.Z_OK; + } + else + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + n--; + b |= (_codec.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + b >>= t; k -= t; + + j += (b & InternalInflateConstants.InflateMask[i]); + + b >>= i; k -= i; + + i = index; + t = table; + if (i + j > 258 + (t & 0x1f) + ((t >> 5) & 0x1f) || (c == 16 && i < 1)) + { + blens = null; + mode = InflateBlockMode.BAD; + _codec.Message = "invalid bit length repeat"; + r = ZlibConstants.Z_DATA_ERROR; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + + c = (c == 16) ? blens[i-1] : 0; + do + { + blens[i++] = c; + } + while (--j != 0); + index = i; + } + } + + tb[0] = -1; + { + int[] bl = new int[] { 9 }; // must be <= 9 for lookahead assumptions + int[] bd = new int[] { 6 }; // must be <= 9 for lookahead assumptions + int[] tl = new int[1]; + int[] td = new int[1]; + + t = table; + t = inftree.inflate_trees_dynamic(257 + (t & 0x1f), 1 + ((t >> 5) & 0x1f), blens, bl, bd, tl, td, hufts, _codec); + + if (t != ZlibConstants.Z_OK) + { + if (t == ZlibConstants.Z_DATA_ERROR) + { + blens = null; + mode = InflateBlockMode.BAD; + } + r = t; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + codes.Init(bl[0], bd[0], hufts, tl[0], hufts, td[0]); + } + mode = InflateBlockMode.CODES; + goto case InflateBlockMode.CODES; + + case InflateBlockMode.CODES: + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + + r = codes.Process(this, r); + if (r != ZlibConstants.Z_STREAM_END) + { + return Flush(r); + } + + r = ZlibConstants.Z_OK; + p = _codec.NextIn; + n = _codec.AvailableBytesIn; + b = bitb; + k = bitk; + q = writeAt; + m = (int)(q < readAt ? readAt - q - 1 : end - q); + + if (last == 0) + { + mode = InflateBlockMode.TYPE; + break; + } + mode = InflateBlockMode.DRY; + goto case InflateBlockMode.DRY; + + case InflateBlockMode.DRY: + writeAt = q; + r = Flush(r); + q = writeAt; m = (int)(q < readAt ? readAt - q - 1 : end - q); + if (readAt != writeAt) + { + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + mode = InflateBlockMode.DONE; + goto case InflateBlockMode.DONE; + + case InflateBlockMode.DONE: + r = ZlibConstants.Z_STREAM_END; + bitb = b; + bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + + case InflateBlockMode.BAD: + r = ZlibConstants.Z_DATA_ERROR; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + + + default: + r = ZlibConstants.Z_STREAM_ERROR; + + bitb = b; bitk = k; + _codec.AvailableBytesIn = n; + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + writeAt = q; + return Flush(r); + } + } + } + + + internal void Free() + { + Reset(); + BufferPool.Release(window); + window = null; + hufts = null; + } + + internal void SetDictionary(byte[] d, int start, int n) + { + Array.Copy(d, start, window, 0, n); + readAt = writeAt = n; + } + + // Returns true if inflate is currently at the end of a block generated + // by Z_SYNC_FLUSH or Z_FULL_FLUSH. + internal int SyncPoint() + { + return mode == InflateBlockMode.LENS ? 1 : 0; + } + + // copy as much as possible from the sliding window to the output area + internal int Flush(int r) + { + int nBytes; + + for (int pass=0; pass < 2; pass++) + { + if (pass==0) + { + // compute number of bytes to copy as far as end of window + nBytes = (int)((readAt <= writeAt ? writeAt : end) - readAt); + } + else + { + // compute bytes to copy + nBytes = writeAt - readAt; + } + + // workitem 8870 + if (nBytes == 0) + { + if (r == ZlibConstants.Z_BUF_ERROR) + r = ZlibConstants.Z_OK; + return r; + } + + if (nBytes > _codec.AvailableBytesOut) + nBytes = _codec.AvailableBytesOut; + + if (nBytes != 0 && r == ZlibConstants.Z_BUF_ERROR) + r = ZlibConstants.Z_OK; + + // update counters + _codec.AvailableBytesOut -= nBytes; + _codec.TotalBytesOut += nBytes; + + // update check information + if (checkfn != null) + _codec._Adler32 = check = Adler.Adler32(check, window, readAt, nBytes); + + // copy as far as end of window + Array.Copy(window, readAt, _codec.OutputBuffer, _codec.NextOut, nBytes); + _codec.NextOut += nBytes; + readAt += nBytes; + + // see if more to copy at beginning of window + if (readAt == end && pass == 0) + { + // wrap pointers + readAt = 0; + if (writeAt == end) + writeAt = 0; + } + else pass++; + } + + // done + return r; + } + } + + + internal static class InternalInflateConstants + { + // And'ing with mask[n] masks the lower n bits + internal static readonly int[] InflateMask = new int[] { + 0x00000000, 0x00000001, 0x00000003, 0x00000007, + 0x0000000f, 0x0000001f, 0x0000003f, 0x0000007f, + 0x000000ff, 0x000001ff, 0x000003ff, 0x000007ff, + 0x00000fff, 0x00001fff, 0x00003fff, 0x00007fff, 0x0000ffff }; + } + + + sealed class InflateCodes + { + // waiting for "i:"=input, + // "o:"=output, + // "x:"=nothing + private const int START = 0; // x: set up for LEN + private const int LEN = 1; // i: get length/literal/eob next + private const int LENEXT = 2; // i: getting length extra (have base) + private const int DIST = 3; // i: get distance next + private const int DISTEXT = 4; // i: getting distance extra + private const int COPY = 5; // o: copying bytes in window, waiting for space + private const int LIT = 6; // o: got literal, waiting for output space + private const int WASH = 7; // o: got eob, possibly still output waiting + private const int END = 8; // x: got eob and all data flushed + private const int BADCODE = 9; // x: got error + + internal int mode; // current inflate_codes mode + + // mode dependent information + internal int len; + + internal int[] tree; // pointer into tree + internal int tree_index = 0; + internal int need; // bits needed + + internal int lit; + + // if EXT or COPY, where and how much + internal int bitsToGet; // bits to get for extra + internal int dist; // distance back to copy from + + internal byte lbits; // ltree bits decoded per branch + internal byte dbits; // dtree bits decoder per branch + internal int[] ltree; // literal/length/eob tree + internal int ltree_index; // literal/length/eob tree + internal int[] dtree; // distance tree + internal int dtree_index; // distance tree + + internal InflateCodes() + { + } + + internal void Init(int bl, int bd, int[] tl, int tl_index, int[] td, int td_index) + { + mode = START; + lbits = (byte)bl; + dbits = (byte)bd; + ltree = tl; + ltree_index = tl_index; + dtree = td; + dtree_index = td_index; + tree = null; + } + + internal int Process(InflateBlocks blocks, int r) + { + int j; // temporary storage + int tindex; // temporary pointer + int e; // extra bits or operation + int b = 0; // bit buffer + int k = 0; // bits in bit buffer + int p = 0; // input data pointer + int n; // bytes available there + int q; // output window write pointer + int m; // bytes to end of window or read pointer + int f; // pointer to copy strings from + + ZlibCodec z = blocks._codec; + + // copy input/output information to locals (UPDATE macro restores) + p = z.NextIn; + n = z.AvailableBytesIn; + b = blocks.bitb; + k = blocks.bitk; + q = blocks.writeAt; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + + // process input and output based on current state + while (true) + { + switch (mode) + { + // waiting for "i:"=input, "o:"=output, "x:"=nothing + case START: // x: set up for LEN + if (m >= 258 && n >= 10) + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; + z.TotalBytesIn += p - z.NextIn; + z.NextIn = p; + blocks.writeAt = q; + r = InflateFast(lbits, dbits, ltree, ltree_index, dtree, dtree_index, blocks, z); + + p = z.NextIn; + n = z.AvailableBytesIn; + b = blocks.bitb; + k = blocks.bitk; + q = blocks.writeAt; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + + if (r != ZlibConstants.Z_OK) + { + mode = (r == ZlibConstants.Z_STREAM_END) ? WASH : BADCODE; + break; + } + } + need = lbits; + tree = ltree; + tree_index = ltree_index; + + mode = LEN; + goto case LEN; + + case LEN: // i: get length/literal/eob next + j = need; + + while (k < j) + { + if (n != 0) + r = ZlibConstants.Z_OK; + else + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; + z.TotalBytesIn += p - z.NextIn; + z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + n--; + b |= (z.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + tindex = (tree_index + (b & InternalInflateConstants.InflateMask[j])) * 3; + + b >>= (tree[tindex + 1]); + k -= (tree[tindex + 1]); + + e = tree[tindex]; + + if (e == 0) + { + // literal + lit = tree[tindex + 2]; + mode = LIT; + break; + } + if ((e & 16) != 0) + { + // length + bitsToGet = e & 15; + len = tree[tindex + 2]; + mode = LENEXT; + break; + } + if ((e & 64) == 0) + { + // next table + need = e; + tree_index = tindex / 3 + tree[tindex + 2]; + break; + } + if ((e & 32) != 0) + { + // end of block + mode = WASH; + break; + } + mode = BADCODE; // invalid code + z.Message = "invalid literal/length code"; + r = ZlibConstants.Z_DATA_ERROR; + + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; + z.TotalBytesIn += p - z.NextIn; + z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + + + case LENEXT: // i: getting length extra (have base) + j = bitsToGet; + + while (k < j) + { + if (n != 0) + r = ZlibConstants.Z_OK; + else + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + n--; b |= (z.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + len += (b & InternalInflateConstants.InflateMask[j]); + + b >>= j; + k -= j; + + need = dbits; + tree = dtree; + tree_index = dtree_index; + mode = DIST; + goto case DIST; + + case DIST: // i: get distance next + j = need; + + while (k < j) + { + if (n != 0) + r = ZlibConstants.Z_OK; + else + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + n--; b |= (z.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + tindex = (tree_index + (b & InternalInflateConstants.InflateMask[j])) * 3; + + b >>= tree[tindex + 1]; + k -= tree[tindex + 1]; + + e = (tree[tindex]); + if ((e & 0x10) != 0) + { + // distance + bitsToGet = e & 15; + dist = tree[tindex + 2]; + mode = DISTEXT; + break; + } + if ((e & 64) == 0) + { + // next table + need = e; + tree_index = tindex / 3 + tree[tindex + 2]; + break; + } + mode = BADCODE; // invalid code + z.Message = "invalid distance code"; + r = ZlibConstants.Z_DATA_ERROR; + + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + + + case DISTEXT: // i: getting distance extra + j = bitsToGet; + + while (k < j) + { + if (n != 0) + r = ZlibConstants.Z_OK; + else + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + n--; b |= (z.InputBuffer[p++] & 0xff) << k; + k += 8; + } + + dist += (b & InternalInflateConstants.InflateMask[j]); + + b >>= j; + k -= j; + + mode = COPY; + goto case COPY; + + case COPY: // o: copying bytes in window, waiting for space + f = q - dist; + while (f < 0) + { + // modulo window size-"while" instead + f += blocks.end; // of "if" handles invalid distances + } + while (len != 0) + { + if (m == 0) + { + if (q == blocks.end && blocks.readAt != 0) + { + q = 0; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + } + if (m == 0) + { + blocks.writeAt = q; r = blocks.Flush(r); + q = blocks.writeAt; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + + if (q == blocks.end && blocks.readAt != 0) + { + q = 0; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + } + + if (m == 0) + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; + z.TotalBytesIn += p - z.NextIn; + z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + } + } + + blocks.window[q++] = blocks.window[f++]; m--; + + if (f == blocks.end) + f = 0; + len--; + } + mode = START; + break; + + case LIT: // o: got literal, waiting for output space + if (m == 0) + { + if (q == blocks.end && blocks.readAt != 0) + { + q = 0; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + } + if (m == 0) + { + blocks.writeAt = q; r = blocks.Flush(r); + q = blocks.writeAt; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + + if (q == blocks.end && blocks.readAt != 0) + { + q = 0; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + } + if (m == 0) + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + } + } + r = ZlibConstants.Z_OK; + + blocks.window[q++] = (byte)lit; m--; + + mode = START; + break; + + case WASH: // o: got eob, possibly more output + if (k > 7) + { + // return unused byte, if any + k -= 8; + n++; + p--; // can always return one + } + + blocks.writeAt = q; r = blocks.Flush(r); + q = blocks.writeAt; m = q < blocks.readAt ? blocks.readAt - q - 1 : blocks.end - q; + + if (blocks.readAt != blocks.writeAt) + { + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + mode = END; + goto case END; + + case END: + r = ZlibConstants.Z_STREAM_END; + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + + case BADCODE: // x: got error + + r = ZlibConstants.Z_DATA_ERROR; + + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + + default: + r = ZlibConstants.Z_STREAM_ERROR; + + blocks.bitb = b; blocks.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + blocks.writeAt = q; + return blocks.Flush(r); + } + } + } + + + // Called with number of bytes left to write in window at least 258 + // (the maximum string length) and number of input bytes available + // at least ten. The ten bytes are six bytes for the longest length/ + // distance pair plus four bytes for overloading the bit buffer. + + internal int InflateFast(int bl, int bd, int[] tl, int tl_index, int[] td, int td_index, InflateBlocks s, ZlibCodec z) + { + int t; // temporary pointer + int[] tp; // temporary pointer + int tp_index; // temporary pointer + int e; // extra bits or operation + int b; // bit buffer + int k; // bits in bit buffer + int p; // input data pointer + int n; // bytes available there + int q; // output window write pointer + int m; // bytes to end of window or read pointer + int ml; // mask for literal/length tree + int md; // mask for distance tree + int c; // bytes to copy + int d; // distance back to copy from + int r; // copy source pointer + + int tp_index_t_3; // (tp_index+t)*3 + + // load input, output, bit values + p = z.NextIn; n = z.AvailableBytesIn; b = s.bitb; k = s.bitk; + q = s.writeAt; m = q < s.readAt ? s.readAt - q - 1 : s.end - q; + + // initialize masks + ml = InternalInflateConstants.InflateMask[bl]; + md = InternalInflateConstants.InflateMask[bd]; + + // do until not enough input or output space for fast loop + do + { + // assume called with m >= 258 && n >= 10 + // get literal/length code + while (k < (20)) + { + // max bits for literal/length code + n--; + b |= (z.InputBuffer[p++] & 0xff) << k; k += 8; + } + + t = b & ml; + tp = tl; + tp_index = tl_index; + tp_index_t_3 = (tp_index + t) * 3; + if ((e = tp[tp_index_t_3]) == 0) + { + b >>= (tp[tp_index_t_3 + 1]); k -= (tp[tp_index_t_3 + 1]); + + s.window[q++] = (byte)tp[tp_index_t_3 + 2]; + m--; + continue; + } + do + { + + b >>= (tp[tp_index_t_3 + 1]); k -= (tp[tp_index_t_3 + 1]); + + if ((e & 16) != 0) + { + e &= 15; + c = tp[tp_index_t_3 + 2] + ((int)b & InternalInflateConstants.InflateMask[e]); + + b >>= e; k -= e; + + // decode distance base of block to copy + while (k < 15) + { + // max bits for distance code + n--; + b |= (z.InputBuffer[p++] & 0xff) << k; k += 8; + } + + t = b & md; + tp = td; + tp_index = td_index; + tp_index_t_3 = (tp_index + t) * 3; + e = tp[tp_index_t_3]; + + do + { + + b >>= (tp[tp_index_t_3 + 1]); k -= (tp[tp_index_t_3 + 1]); + + if ((e & 16) != 0) + { + // get extra bits to add to distance base + e &= 15; + while (k < e) + { + // get extra bits (up to 13) + n--; + b |= (z.InputBuffer[p++] & 0xff) << k; k += 8; + } + + d = tp[tp_index_t_3 + 2] + (b & InternalInflateConstants.InflateMask[e]); + + b >>= e; k -= e; + + // do the copy + m -= c; + if (q >= d) + { + // offset before dest + // just copy + r = q - d; + if (q - r > 0 && 2 > (q - r)) + { + s.window[q++] = s.window[r++]; // minimum count is three, + s.window[q++] = s.window[r++]; // so unroll loop a little + c -= 2; + } + else + { + Array.Copy(s.window, r, s.window, q, 2); + q += 2; r += 2; c -= 2; + } + } + else + { + // else offset after destination + r = q - d; + do + { + r += s.end; // force pointer in window + } + while (r < 0); // covers invalid distances + e = s.end - r; + if (c > e) + { + // if source crosses, + c -= e; // wrapped copy + if (q - r > 0 && e > (q - r)) + { + do + { + s.window[q++] = s.window[r++]; + } + while (--e != 0); + } + else + { + Array.Copy(s.window, r, s.window, q, e); + q += e; r += e; e = 0; + } + r = 0; // copy rest from start of window + } + } + + // copy all or what's left + if (q - r > 0 && c > (q - r)) + { + do + { + s.window[q++] = s.window[r++]; + } + while (--c != 0); + } + else + { + Array.Copy(s.window, r, s.window, q, c); + q += c; r += c; c = 0; + } + break; + } + else if ((e & 64) == 0) + { + t += tp[tp_index_t_3 + 2]; + t += (b & InternalInflateConstants.InflateMask[e]); + tp_index_t_3 = (tp_index + t) * 3; + e = tp[tp_index_t_3]; + } + else + { + z.Message = "invalid distance code"; + + c = z.AvailableBytesIn - n; c = (k >> 3) < c ? k >> 3 : c; n += c; p -= c; k -= (c << 3); + + s.bitb = b; s.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + s.writeAt = q; + + return ZlibConstants.Z_DATA_ERROR; + } + } + while (true); + break; + } + + if ((e & 64) == 0) + { + t += tp[tp_index_t_3 + 2]; + t += (b & InternalInflateConstants.InflateMask[e]); + tp_index_t_3 = (tp_index + t) * 3; + if ((e = tp[tp_index_t_3]) == 0) + { + b >>= (tp[tp_index_t_3 + 1]); k -= (tp[tp_index_t_3 + 1]); + s.window[q++] = (byte)tp[tp_index_t_3 + 2]; + m--; + break; + } + } + else if ((e & 32) != 0) + { + c = z.AvailableBytesIn - n; c = (k >> 3) < c ? k >> 3 : c; n += c; p -= c; k -= (c << 3); + + s.bitb = b; s.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + s.writeAt = q; + + return ZlibConstants.Z_STREAM_END; + } + else + { + z.Message = "invalid literal/length code"; + + c = z.AvailableBytesIn - n; c = (k >> 3) < c ? k >> 3 : c; n += c; p -= c; k -= (c << 3); + + s.bitb = b; s.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + s.writeAt = q; + + return ZlibConstants.Z_DATA_ERROR; + } + } + while (true); + } + while (m >= 258 && n >= 10); + + // not enough input or output--restore pointers and return + c = z.AvailableBytesIn - n; c = (k >> 3) < c ? k >> 3 : c; n += c; p -= c; k -= (c << 3); + + s.bitb = b; s.bitk = k; + z.AvailableBytesIn = n; z.TotalBytesIn += p - z.NextIn; z.NextIn = p; + s.writeAt = q; + + return ZlibConstants.Z_OK; + } + } + + + internal sealed class InflateManager + { + // preset dictionary flag in zlib header + private const int PRESET_DICT = 0x20; + + private const int Z_DEFLATED = 8; + + private enum InflateManagerMode + { + METHOD = 0, // waiting for method byte + FLAG = 1, // waiting for flag byte + DICT4 = 2, // four dictionary check bytes to go + DICT3 = 3, // three dictionary check bytes to go + DICT2 = 4, // two dictionary check bytes to go + DICT1 = 5, // one dictionary check byte to go + DICT0 = 6, // waiting for inflateSetDictionary + BLOCKS = 7, // decompressing blocks + CHECK4 = 8, // four check bytes to go + CHECK3 = 9, // three check bytes to go + CHECK2 = 10, // two check bytes to go + CHECK1 = 11, // one check byte to go + DONE = 12, // finished check, done + BAD = 13, // got an error--stay here + } + + private InflateManagerMode mode; // current inflate mode + internal ZlibCodec _codec; // pointer back to this zlib stream + + // mode dependent information + internal int method; // if FLAGS, method byte + + // if CHECK, check values to compare + internal uint computedCheck; // computed check value + internal uint expectedCheck; // stream check value + + // if BAD, inflateSync's marker bytes count + internal int marker; + + // mode independent information + //internal int nowrap; // flag for no wrapper + private bool _handleRfc1950HeaderBytes = true; + internal bool HandleRfc1950HeaderBytes + { + get { return _handleRfc1950HeaderBytes; } + set { _handleRfc1950HeaderBytes = value; } + } + internal int wbits; // log2(window size) (8..15, defaults to 15) + + internal InflateBlocks blocks; // current inflate_blocks state + + public InflateManager() { } + + public InflateManager(bool expectRfc1950HeaderBytes) + { + _handleRfc1950HeaderBytes = expectRfc1950HeaderBytes; + } + + internal int Reset() + { + _codec.TotalBytesIn = _codec.TotalBytesOut = 0; + _codec.Message = null; + mode = HandleRfc1950HeaderBytes ? InflateManagerMode.METHOD : InflateManagerMode.BLOCKS; + blocks.Reset(); + return ZlibConstants.Z_OK; + } + + internal int End() + { + if (blocks != null) + blocks.Free(); + blocks = null; + return ZlibConstants.Z_OK; + } + + internal int Initialize(ZlibCodec codec, int w) + { + _codec = codec; + _codec.Message = null; + blocks = null; + + // handle undocumented nowrap option (no zlib header or check) + //nowrap = 0; + //if (w < 0) + //{ + // w = - w; + // nowrap = 1; + //} + + // set window size + if (w < 8 || w > 15) + { + End(); + throw new ZlibException("Bad window size."); + + //return ZlibConstants.Z_STREAM_ERROR; + } + wbits = w; + + blocks = new InflateBlocks(codec, + HandleRfc1950HeaderBytes ? this : null, + 1 << w); + + // reset state + Reset(); + return ZlibConstants.Z_OK; + } + + + internal int Inflate(FlushType flush) + { + int b; + + if (_codec.InputBuffer == null) + throw new ZlibException("InputBuffer is null. "); + +// int f = (flush == FlushType.Finish) +// ? ZlibConstants.Z_BUF_ERROR +// : ZlibConstants.Z_OK; + + // workitem 8870 + int f = ZlibConstants.Z_OK; + int r = ZlibConstants.Z_BUF_ERROR; + + while (true) + { + switch (mode) + { + case InflateManagerMode.METHOD: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + if (((method = _codec.InputBuffer[_codec.NextIn++]) & 0xf) != Z_DEFLATED) + { + mode = InflateManagerMode.BAD; + _codec.Message = String.Format("unknown compression method (0x{0:X2})", method); + marker = 5; // can't try inflateSync + break; + } + if ((method >> 4) + 8 > wbits) + { + mode = InflateManagerMode.BAD; + _codec.Message = String.Format("invalid window size ({0})", (method >> 4) + 8); + marker = 5; // can't try inflateSync + break; + } + mode = InflateManagerMode.FLAG; + break; + + + case InflateManagerMode.FLAG: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + b = (_codec.InputBuffer[_codec.NextIn++]) & 0xff; + + if ((((method << 8) + b) % 31) != 0) + { + mode = InflateManagerMode.BAD; + _codec.Message = "incorrect header check"; + marker = 5; // can't try inflateSync + break; + } + + mode = ((b & PRESET_DICT) == 0) + ? InflateManagerMode.BLOCKS + : InflateManagerMode.DICT4; + break; + + case InflateManagerMode.DICT4: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + expectedCheck = (uint)((_codec.InputBuffer[_codec.NextIn++] << 24) & 0xff000000); + mode = InflateManagerMode.DICT3; + break; + + case InflateManagerMode.DICT3: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + expectedCheck += (uint)((_codec.InputBuffer[_codec.NextIn++] << 16) & 0x00ff0000); + mode = InflateManagerMode.DICT2; + break; + + case InflateManagerMode.DICT2: + + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + expectedCheck += (uint)((_codec.InputBuffer[_codec.NextIn++] << 8) & 0x0000ff00); + mode = InflateManagerMode.DICT1; + break; + + + case InflateManagerMode.DICT1: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; _codec.TotalBytesIn++; + expectedCheck += (uint)(_codec.InputBuffer[_codec.NextIn++] & 0x000000ff); + _codec._Adler32 = expectedCheck; + mode = InflateManagerMode.DICT0; + return ZlibConstants.Z_NEED_DICT; + + + case InflateManagerMode.DICT0: + mode = InflateManagerMode.BAD; + _codec.Message = "need dictionary"; + marker = 0; // can try inflateSync + return ZlibConstants.Z_STREAM_ERROR; + + + case InflateManagerMode.BLOCKS: + r = blocks.Process(r); + if (r == ZlibConstants.Z_DATA_ERROR) + { + mode = InflateManagerMode.BAD; + marker = 0; // can try inflateSync + break; + } + + if (r == ZlibConstants.Z_OK) r = f; + + if (r != ZlibConstants.Z_STREAM_END) + return r; + + r = f; + computedCheck = blocks.Reset(); + if (!HandleRfc1950HeaderBytes) + { + mode = InflateManagerMode.DONE; + return ZlibConstants.Z_STREAM_END; + } + mode = InflateManagerMode.CHECK4; + break; + + case InflateManagerMode.CHECK4: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + expectedCheck = (uint)((_codec.InputBuffer[_codec.NextIn++] << 24) & 0xff000000); + mode = InflateManagerMode.CHECK3; + break; + + case InflateManagerMode.CHECK3: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; _codec.TotalBytesIn++; + expectedCheck += (uint)((_codec.InputBuffer[_codec.NextIn++] << 16) & 0x00ff0000); + mode = InflateManagerMode.CHECK2; + break; + + case InflateManagerMode.CHECK2: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; + _codec.TotalBytesIn++; + expectedCheck += (uint)((_codec.InputBuffer[_codec.NextIn++] << 8) & 0x0000ff00); + mode = InflateManagerMode.CHECK1; + break; + + case InflateManagerMode.CHECK1: + if (_codec.AvailableBytesIn == 0) return r; + r = f; + _codec.AvailableBytesIn--; _codec.TotalBytesIn++; + expectedCheck += (uint)(_codec.InputBuffer[_codec.NextIn++] & 0x000000ff); + if (computedCheck != expectedCheck) + { + mode = InflateManagerMode.BAD; + _codec.Message = "incorrect data check"; + marker = 5; // can't try inflateSync + break; + } + mode = InflateManagerMode.DONE; + return ZlibConstants.Z_STREAM_END; + + case InflateManagerMode.DONE: + return ZlibConstants.Z_STREAM_END; + + case InflateManagerMode.BAD: + throw new ZlibException(String.Format("Bad state ({0})", _codec.Message)); + + default: + throw new ZlibException("Stream error."); + + } + } + } + + + + internal int SetDictionary(byte[] dictionary) + { + int index = 0; + int length = dictionary.Length; + if (mode != InflateManagerMode.DICT0) + throw new ZlibException("Stream error."); + + if (Adler.Adler32(1, dictionary, 0, dictionary.Length) != _codec._Adler32) + { + return ZlibConstants.Z_DATA_ERROR; + } + + _codec._Adler32 = Adler.Adler32(0, null, 0, 0); + + if (length >= (1 << wbits)) + { + length = (1 << wbits) - 1; + index = dictionary.Length - length; + } + blocks.SetDictionary(dictionary, index, length); + mode = InflateManagerMode.BLOCKS; + return ZlibConstants.Z_OK; + } + + + private static readonly byte[] mark = new byte[] { 0, 0, 0xff, 0xff }; + + internal int Sync() + { + int n; // number of bytes to look at + int p; // pointer to bytes + int m; // number of marker bytes found in a row + long r, w; // temporaries to save total_in and total_out + + // set up + if (mode != InflateManagerMode.BAD) + { + mode = InflateManagerMode.BAD; + marker = 0; + } + if ((n = _codec.AvailableBytesIn) == 0) + return ZlibConstants.Z_BUF_ERROR; + p = _codec.NextIn; + m = marker; + + // search + while (n != 0 && m < 4) + { + if (_codec.InputBuffer[p] == mark[m]) + { + m++; + } + else if (_codec.InputBuffer[p] != 0) + { + m = 0; + } + else + { + m = 4 - m; + } + p++; n--; + } + + // restore + _codec.TotalBytesIn += p - _codec.NextIn; + _codec.NextIn = p; + _codec.AvailableBytesIn = n; + marker = m; + + // return no joy or set up to restart on a new block + if (m != 4) + { + return ZlibConstants.Z_DATA_ERROR; + } + r = _codec.TotalBytesIn; + w = _codec.TotalBytesOut; + Reset(); + _codec.TotalBytesIn = r; + _codec.TotalBytesOut = w; + mode = InflateManagerMode.BLOCKS; + return ZlibConstants.Z_OK; + } + + + // Returns true if inflate is currently at the end of a block generated + // by Z_SYNC_FLUSH or Z_FULL_FLUSH. This function is used by one PPP + // implementation to provide an additional safety check. PPP uses Z_SYNC_FLUSH + // but removes the length bytes of the resulting empty stored block. When + // decompressing, PPP checks that at the end of input packet, inflate is + // waiting for these length bytes. + internal int SyncPoint(ZlibCodec z) + { + return blocks.SyncPoint(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Inflate.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Inflate.cs.meta new file mode 100644 index 00000000..d250dd96 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Inflate.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c2fad9248979a1e4bac5ee4af1c0bc5b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Inflate.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs new file mode 100644 index 00000000..99afabdd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs @@ -0,0 +1,423 @@ +// Tree.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2009-October-28 13:29:50> +// +// ------------------------------------------------------------------ +// +// This module defines classes for zlib compression and +// decompression. This code is derived from the jzlib implementation of +// zlib. In keeping with the license for jzlib, the copyright to that +// code is below. +// +// ------------------------------------------------------------------ +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + +using System; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + sealed class ZTree + { + private static readonly int HEAP_SIZE = (2 * InternalConstants.L_CODES + 1); + + // extra bits for each length code + internal static readonly int[] ExtraLengthBits = new int[] + { + 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2, + 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0 + }; + + // extra bits for each distance code + internal static readonly int[] ExtraDistanceBits = new int[] + { + 0, 0, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6, + 7, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 13, 13 + }; + + // extra bits for each bit length code + internal static readonly int[] extra_blbits = new int[]{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 3, 7}; + + internal static readonly sbyte[] bl_order = new sbyte[]{16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15}; + + + // The lengths of the bit length codes are sent in order of decreasing + // probability, to avoid transmitting the lengths for unused bit + // length codes. + + internal const int Buf_size = 8 * 2; + + // see definition of array dist_code below + //internal const int DIST_CODE_LEN = 512; + + private static readonly sbyte[] _dist_code = new sbyte[] + { + 0, 1, 2, 3, 4, 4, 5, 5, 6, 6, 6, 6, 7, 7, 7, 7, + 8, 8, 8, 8, 8, 8, 8, 8, 9, 9, 9, 9, 9, 9, 9, 9, + 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, + 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, + 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, + 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, + 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, + 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, + 0, 0, 16, 17, 18, 18, 19, 19, 20, 20, 20, 20, 21, 21, 21, 21, + 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, + 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, + 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29 + }; + + internal static readonly sbyte[] LengthCode = new sbyte[] + { + 0, 1, 2, 3, 4, 5, 6, 7, 8, 8, 9, 9, 10, 10, 11, 11, + 12, 12, 12, 12, 13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 15, 15, + 16, 16, 16, 16, 16, 16, 16, 16, 17, 17, 17, 17, 17, 17, 17, 17, + 18, 18, 18, 18, 18, 18, 18, 18, 19, 19, 19, 19, 19, 19, 19, 19, + 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, + 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, + 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, + 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, + 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, + 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, + 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, + 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28 + }; + + + internal static readonly int[] LengthBase = new int[] + { + 0, 1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 14, 16, 20, 24, 28, + 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 0 + }; + + + internal static readonly int[] DistanceBase = new int[] + { + 0, 1, 2, 3, 4, 6, 8, 12, 16, 24, 32, 48, 64, 96, 128, 192, + 256, 384, 512, 768, 1024, 1536, 2048, 3072, 4096, 6144, 8192, 12288, 16384, 24576 + }; + + + /// + /// Map from a distance to a distance code. + /// + /// + /// No side effects. _dist_code[256] and _dist_code[257] are never used. + /// + internal static int DistanceCode(int dist) + { + return (dist < 256) + ? _dist_code[dist] + : _dist_code[256 + SharedUtils.URShift(dist, 7)]; + } + + internal short[] dyn_tree; // the dynamic tree + internal int max_code; // largest code with non zero frequency + internal StaticTree staticTree; // the corresponding static tree + + // Compute the optimal bit lengths for a tree and update the total bit length + // for the current block. + // IN assertion: the fields freq and dad are set, heap[heap_max] and + // above are the tree nodes sorted by increasing frequency. + // OUT assertions: the field len is set to the optimal bit length, the + // array bl_count contains the frequencies for each bit length. + // The length opt_len is updated; static_len is also updated if stree is + // not null. + internal void gen_bitlen(DeflateManager s) + { + short[] tree = dyn_tree; + short[] stree = staticTree.treeCodes; + int[] extra = staticTree.extraBits; + int base_Renamed = staticTree.extraBase; + int max_length = staticTree.maxLength; + int h; // heap index + int n, m; // iterate over the tree elements + int bits; // bit length + int xbits; // extra bits + short f; // frequency + int overflow = 0; // number of elements with bit length too large + + for (bits = 0; bits <= InternalConstants.MAX_BITS; bits++) + s.bl_count[bits] = 0; + + // In a first pass, compute the optimal bit lengths (which may + // overflow in the case of the bit length tree). + tree[s.heap[s.heap_max] * 2 + 1] = 0; // root of the heap + + for (h = s.heap_max + 1; h < HEAP_SIZE; h++) + { + n = s.heap[h]; + bits = tree[tree[n * 2 + 1] * 2 + 1] + 1; + if (bits > max_length) + { + bits = max_length; overflow++; + } + tree[n * 2 + 1] = (short) bits; + // We overwrite tree[n*2+1] which is no longer needed + + if (n > max_code) + continue; // not a leaf node + + s.bl_count[bits]++; + xbits = 0; + if (n >= base_Renamed) + xbits = extra[n - base_Renamed]; + f = tree[n * 2]; + s.opt_len += f * (bits + xbits); + if (stree != null) + s.static_len += f * (stree[n * 2 + 1] + xbits); + } + if (overflow == 0) + return ; + + // This happens for example on obj2 and pic of the Calgary corpus + // Find the first bit length which could increase: + do + { + bits = max_length - 1; + while (s.bl_count[bits] == 0) + bits--; + s.bl_count[bits]--; // move one leaf down the tree + s.bl_count[bits + 1] = (short) (s.bl_count[bits + 1] + 2); // move one overflow item as its brother + s.bl_count[max_length]--; + // The brother of the overflow item also moves one step up, + // but this does not affect bl_count[max_length] + overflow -= 2; + } + while (overflow > 0); + + for (bits = max_length; bits != 0; bits--) + { + n = s.bl_count[bits]; + while (n != 0) + { + m = s.heap[--h]; + if (m > max_code) + continue; + if (tree[m * 2 + 1] != bits) + { + s.opt_len = (int) (s.opt_len + ((long) bits - (long) tree[m * 2 + 1]) * (long) tree[m * 2]); + tree[m * 2 + 1] = (short) bits; + } + n--; + } + } + } + + // Construct one Huffman tree and assigns the code bit strings and lengths. + // Update the total bit length for the current block. + // IN assertion: the field freq is set for all tree elements. + // OUT assertions: the fields len and code are set to the optimal bit length + // and corresponding code. The length opt_len is updated; static_len is + // also updated if stree is not null. The field max_code is set. + internal void build_tree(DeflateManager s) + { + short[] tree = dyn_tree; + short[] stree = staticTree.treeCodes; + int elems = staticTree.elems; + int n, m; // iterate over heap elements + int max_code = -1; // largest code with non zero frequency + int node; // new node being created + + // Construct the initial heap, with least frequent element in + // heap[1]. The sons of heap[n] are heap[2*n] and heap[2*n+1]. + // heap[0] is not used. + s.heap_len = 0; + s.heap_max = HEAP_SIZE; + + for (n = 0; n < elems; n++) + { + if (tree[n * 2] != 0) + { + s.heap[++s.heap_len] = max_code = n; + s.depth[n] = 0; + } + else + { + tree[n * 2 + 1] = 0; + } + } + + // The pkzip format requires that at least one distance code exists, + // and that at least one bit should be sent even if there is only one + // possible code. So to avoid special checks later on we force at least + // two codes of non zero frequency. + while (s.heap_len < 2) + { + node = s.heap[++s.heap_len] = (max_code < 2?++max_code:0); + tree[node * 2] = 1; + s.depth[node] = 0; + s.opt_len--; + if (stree != null) + s.static_len -= stree[node * 2 + 1]; + // node is 0 or 1 so it does not have extra bits + } + this.max_code = max_code; + + // The elements heap[heap_len/2+1 .. heap_len] are leaves of the tree, + // establish sub-heaps of increasing lengths: + + for (n = s.heap_len / 2; n >= 1; n--) + s.pqdownheap(tree, n); + + // Construct the Huffman tree by repeatedly combining the least two + // frequent nodes. + + node = elems; // next internal node of the tree + do + { + // n = node of least frequency + n = s.heap[1]; + s.heap[1] = s.heap[s.heap_len--]; + s.pqdownheap(tree, 1); + m = s.heap[1]; // m = node of next least frequency + + s.heap[--s.heap_max] = n; // keep the nodes sorted by frequency + s.heap[--s.heap_max] = m; + + // Create a new node father of n and m + tree[node * 2] = unchecked((short) (tree[n * 2] + tree[m * 2])); + s.depth[node] = (sbyte) (System.Math.Max((byte) s.depth[n], (byte) s.depth[m]) + 1); + tree[n * 2 + 1] = tree[m * 2 + 1] = (short) node; + + // and insert the new node in the heap + s.heap[1] = node++; + s.pqdownheap(tree, 1); + } + while (s.heap_len >= 2); + + s.heap[--s.heap_max] = s.heap[1]; + + // At this point, the fields freq and dad are set. We can now + // generate the bit lengths. + + gen_bitlen(s); + + // The field len is now set, we can generate the bit codes + gen_codes(tree, max_code, s.bl_count); + } + + // Generate the codes for a given tree and bit counts (which need not be + // optimal). + // IN assertion: the array bl_count contains the bit length statistics for + // the given tree and the field len is set for all tree elements. + // OUT assertion: the field code is set for all tree elements of non + // zero code length. + internal static void gen_codes(short[] tree, int max_code, short[] bl_count) + { + short[] next_code = new short[InternalConstants.MAX_BITS + 1]; // next code value for each bit length + short code = 0; // running code value + int bits; // bit index + int n; // code index + + // The distribution counts are first used to generate the code values + // without bit reversal. + for (bits = 1; bits <= InternalConstants.MAX_BITS; bits++) + unchecked { + next_code[bits] = code = (short) ((code + bl_count[bits - 1]) << 1); + } + + // Check that the bit counts in bl_count are consistent. The last code + // must be all ones. + //Assert (code + bl_count[MAX_BITS]-1 == (1<>= 1; //SharedUtils.URShift(code, 1); + res <<= 1; + } + while (--len > 0); + return res >> 1; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs.meta new file mode 100644 index 00000000..9e239faa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 250ac77039c994245b070728d2f42b73 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZTree.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs new file mode 100644 index 00000000..b51ea376 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs @@ -0,0 +1,546 @@ +// Zlib.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009-2011 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// Last Saved: <2011-August-03 19:52:28> +// +// ------------------------------------------------------------------ +// +// This module defines classes for ZLIB compression and +// decompression. This code is derived from the jzlib implementation of +// zlib, but significantly modified. The object model is not the same, +// and many of the behaviors are new or different. Nonetheless, in +// keeping with the license for jzlib, the copyright to that code is +// included below. +// +// ------------------------------------------------------------------ +// +// The following notice applies to jzlib: +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// jzlib is based on zlib-1.1.3. +// +// The following notice applies to zlib: +// +// ----------------------------------------------------------------------- +// +// Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler +// +// The ZLIB software is provided 'as-is', without any express or implied +// warranty. In no event will the authors be held liable for any damages +// arising from the use of this software. +// +// Permission is granted to anyone to use this software for any purpose, +// including commercial applications, and to alter it and redistribute it +// freely, subject to the following restrictions: +// +// 1. The origin of this software must not be misrepresented; you must not +// claim that you wrote the original software. If you use this software +// in a product, an acknowledgment in the product documentation would be +// appreciated but is not required. +// 2. Altered source versions must be plainly marked as such, and must not be +// misrepresented as being the original software. +// 3. This notice may not be removed or altered from any source distribution. +// +// Jean-loup Gailly jloup@gzip.org +// Mark Adler madler@alumni.caltech.edu +// +// ----------------------------------------------------------------------- + + + +using System; +using Interop=System.Runtime.InteropServices; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + + /// + /// Describes how to flush the current deflate operation. + /// + /// + /// The different FlushType values are useful when using a Deflate in a streaming application. + /// + public enum FlushType + { + /// No flush at all. + None = 0, + + /// Closes the current block, but doesn't flush it to + /// the output. Used internally only in hypothetical + /// scenarios. This was supposed to be removed by Zlib, but it is + /// still in use in some edge cases. + /// + Partial, + + /// + /// Use this during compression to specify that all pending output should be + /// flushed to the output buffer and the output should be aligned on a byte + /// boundary. You might use this in a streaming communication scenario, so that + /// the decompressor can get all input data available so far. When using this + /// with a ZlibCodec, AvailableBytesIn will be zero after the call if + /// enough output space has been provided before the call. Flushing will + /// degrade compression and so it should be used only when necessary. + /// + Sync, + + /// + /// Use this during compression to specify that all output should be flushed, as + /// with FlushType.Sync, but also, the compression state should be reset + /// so that decompression can restart from this point if previous compressed + /// data has been damaged or if random access is desired. Using + /// FlushType.Full too often can significantly degrade the compression. + /// + Full, + + /// Signals the end of the compression/decompression stream. + Finish, + } + + + /// + /// The compression level to be used when using a DeflateStream or ZlibStream with CompressionMode.Compress. + /// + public enum CompressionLevel + { + /// + /// None means that the data will be simply stored, with no change at all. + /// If you are producing ZIPs for use on Mac OSX, be aware that archives produced with CompressionLevel.None + /// cannot be opened with the default zip reader. Use a different CompressionLevel. + /// + None= 0, + /// + /// Same as None. + /// + Level0 = 0, + + /// + /// The fastest but least effective compression. + /// + BestSpeed = 1, + + /// + /// A synonym for BestSpeed. + /// + Level1 = 1, + + /// + /// A little slower, but better, than level 1. + /// + Level2 = 2, + + /// + /// A little slower, but better, than level 2. + /// + Level3 = 3, + + /// + /// A little slower, but better, than level 3. + /// + Level4 = 4, + + /// + /// A little slower than level 4, but with better compression. + /// + Level5 = 5, + + /// + /// The default compression level, with a good balance of speed and compression efficiency. + /// + Default = 6, + /// + /// A synonym for Default. + /// + Level6 = 6, + + /// + /// Pretty good compression! + /// + Level7 = 7, + + /// + /// Better compression than Level7! + /// + Level8 = 8, + + /// + /// The "best" compression, where best means greatest reduction in size of the input data stream. + /// This is also the slowest compression. + /// + BestCompression = 9, + + /// + /// A synonym for BestCompression. + /// + Level9 = 9, + } + + /// + /// Describes options for how the compression algorithm is executed. Different strategies + /// work better on different sorts of data. The strategy parameter can affect the compression + /// ratio and the speed of compression but not the correctness of the compresssion. + /// + public enum CompressionStrategy + { + /// + /// The default strategy is probably the best for normal data. + /// + Default = 0, + + /// + /// The Filtered strategy is intended to be used most effectively with data produced by a + /// filter or predictor. By this definition, filtered data consists mostly of small + /// values with a somewhat random distribution. In this case, the compression algorithm + /// is tuned to compress them better. The effect of Filtered is to force more Huffman + /// coding and less string matching; it is a half-step between Default and HuffmanOnly. + /// + Filtered = 1, + + /// + /// Using HuffmanOnly will force the compressor to do Huffman encoding only, with no + /// string matching. + /// + HuffmanOnly = 2, + } + + + /// + /// An enum to specify the direction of transcoding - whether to compress or decompress. + /// + public enum CompressionMode + { + /// + /// Used to specify that the stream should compress the data. + /// + Compress= 0, + /// + /// Used to specify that the stream should decompress the data. + /// + Decompress = 1, + } + + + /// + /// A general purpose exception class for exceptions in the Zlib library. + /// + [Interop.GuidAttribute("ebc25cf6-9120-4283-b972-0e5520d0000E")] + internal class ZlibException : System.Exception + { + /// + /// The ZlibException class captures exception information generated + /// by the Zlib library. + /// + public ZlibException() + : base() + { + } + + /// + /// This ctor collects a message attached to the exception. + /// + /// the message for the exception. + public ZlibException(System.String s) + : base(s) + { + } + } + + + internal class SharedUtils + { + /// + /// Performs an unsigned bitwise right shift with the specified number + /// + /// Number to operate on + /// Ammount of bits to shift + /// The resulting number from the shift operation + public static int URShift(int number, int bits) + { + return (int)((uint)number >> bits); + } + +#if NOT + /// + /// Performs an unsigned bitwise right shift with the specified number + /// + /// Number to operate on + /// Ammount of bits to shift + /// The resulting number from the shift operation + public static long URShift(long number, int bits) + { + return (long) ((UInt64)number >> bits); + } +#endif + + /// + /// Reads a number of characters from the current source TextReader and writes + /// the data to the target array at the specified index. + /// + /// + /// The source TextReader to read from + /// Contains the array of characteres read from the source TextReader. + /// The starting index of the target array. + /// The maximum number of characters to read from the source TextReader. + /// + /// + /// The number of characters read. The number will be less than or equal to + /// count depending on the data available in the source TextReader. Returns -1 + /// if the end of the stream is reached. + /// + public static System.Int32 ReadInput(System.IO.TextReader sourceTextReader, byte[] target, int start, int count) + { + // Returns 0 bytes if not enough space in target + if (target.Length == 0) return 0; + + char[] charArray = new char[target.Length]; + int bytesRead = sourceTextReader.Read(charArray, start, count); + + // Returns -1 if EOF + if (bytesRead == 0) return -1; + + for (int index = start; index < start + bytesRead; index++) + target[index] = (byte)charArray[index]; + + return bytesRead; + } + + + internal static byte[] ToByteArray(System.String sourceString) + { + return System.Text.UTF8Encoding.UTF8.GetBytes(sourceString); + } + + + internal static char[] ToCharArray(byte[] byteArray) + { + return System.Text.UTF8Encoding.UTF8.GetChars(byteArray); + } + } + + internal static class InternalConstants + { + internal static readonly int MAX_BITS = 15; + internal static readonly int BL_CODES = 19; + internal static readonly int D_CODES = 30; + internal static readonly int LITERALS = 256; + internal static readonly int LENGTH_CODES = 29; + internal static readonly int L_CODES = (LITERALS + 1 + LENGTH_CODES); + + // Bit length codes must not exceed MAX_BL_BITS bits + internal static readonly int MAX_BL_BITS = 7; + + // repeat previous bit length 3-6 times (2 bits of repeat count) + internal static readonly int REP_3_6 = 16; + + // repeat a zero length 3-10 times (3 bits of repeat count) + internal static readonly int REPZ_3_10 = 17; + + // repeat a zero length 11-138 times (7 bits of repeat count) + internal static readonly int REPZ_11_138 = 18; + + } + + internal sealed class StaticTree + { + internal static readonly short[] lengthAndLiteralsTreeCodes = new short[] { + 12, 8, 140, 8, 76, 8, 204, 8, 44, 8, 172, 8, 108, 8, 236, 8, + 28, 8, 156, 8, 92, 8, 220, 8, 60, 8, 188, 8, 124, 8, 252, 8, + 2, 8, 130, 8, 66, 8, 194, 8, 34, 8, 162, 8, 98, 8, 226, 8, + 18, 8, 146, 8, 82, 8, 210, 8, 50, 8, 178, 8, 114, 8, 242, 8, + 10, 8, 138, 8, 74, 8, 202, 8, 42, 8, 170, 8, 106, 8, 234, 8, + 26, 8, 154, 8, 90, 8, 218, 8, 58, 8, 186, 8, 122, 8, 250, 8, + 6, 8, 134, 8, 70, 8, 198, 8, 38, 8, 166, 8, 102, 8, 230, 8, + 22, 8, 150, 8, 86, 8, 214, 8, 54, 8, 182, 8, 118, 8, 246, 8, + 14, 8, 142, 8, 78, 8, 206, 8, 46, 8, 174, 8, 110, 8, 238, 8, + 30, 8, 158, 8, 94, 8, 222, 8, 62, 8, 190, 8, 126, 8, 254, 8, + 1, 8, 129, 8, 65, 8, 193, 8, 33, 8, 161, 8, 97, 8, 225, 8, + 17, 8, 145, 8, 81, 8, 209, 8, 49, 8, 177, 8, 113, 8, 241, 8, + 9, 8, 137, 8, 73, 8, 201, 8, 41, 8, 169, 8, 105, 8, 233, 8, + 25, 8, 153, 8, 89, 8, 217, 8, 57, 8, 185, 8, 121, 8, 249, 8, + 5, 8, 133, 8, 69, 8, 197, 8, 37, 8, 165, 8, 101, 8, 229, 8, + 21, 8, 149, 8, 85, 8, 213, 8, 53, 8, 181, 8, 117, 8, 245, 8, + 13, 8, 141, 8, 77, 8, 205, 8, 45, 8, 173, 8, 109, 8, 237, 8, + 29, 8, 157, 8, 93, 8, 221, 8, 61, 8, 189, 8, 125, 8, 253, 8, + 19, 9, 275, 9, 147, 9, 403, 9, 83, 9, 339, 9, 211, 9, 467, 9, + 51, 9, 307, 9, 179, 9, 435, 9, 115, 9, 371, 9, 243, 9, 499, 9, + 11, 9, 267, 9, 139, 9, 395, 9, 75, 9, 331, 9, 203, 9, 459, 9, + 43, 9, 299, 9, 171, 9, 427, 9, 107, 9, 363, 9, 235, 9, 491, 9, + 27, 9, 283, 9, 155, 9, 411, 9, 91, 9, 347, 9, 219, 9, 475, 9, + 59, 9, 315, 9, 187, 9, 443, 9, 123, 9, 379, 9, 251, 9, 507, 9, + 7, 9, 263, 9, 135, 9, 391, 9, 71, 9, 327, 9, 199, 9, 455, 9, + 39, 9, 295, 9, 167, 9, 423, 9, 103, 9, 359, 9, 231, 9, 487, 9, + 23, 9, 279, 9, 151, 9, 407, 9, 87, 9, 343, 9, 215, 9, 471, 9, + 55, 9, 311, 9, 183, 9, 439, 9, 119, 9, 375, 9, 247, 9, 503, 9, + 15, 9, 271, 9, 143, 9, 399, 9, 79, 9, 335, 9, 207, 9, 463, 9, + 47, 9, 303, 9, 175, 9, 431, 9, 111, 9, 367, 9, 239, 9, 495, 9, + 31, 9, 287, 9, 159, 9, 415, 9, 95, 9, 351, 9, 223, 9, 479, 9, + 63, 9, 319, 9, 191, 9, 447, 9, 127, 9, 383, 9, 255, 9, 511, 9, + 0, 7, 64, 7, 32, 7, 96, 7, 16, 7, 80, 7, 48, 7, 112, 7, + 8, 7, 72, 7, 40, 7, 104, 7, 24, 7, 88, 7, 56, 7, 120, 7, + 4, 7, 68, 7, 36, 7, 100, 7, 20, 7, 84, 7, 52, 7, 116, 7, + 3, 8, 131, 8, 67, 8, 195, 8, 35, 8, 163, 8, 99, 8, 227, 8 + }; + + internal static readonly short[] distTreeCodes = new short[] { + 0, 5, 16, 5, 8, 5, 24, 5, 4, 5, 20, 5, 12, 5, 28, 5, + 2, 5, 18, 5, 10, 5, 26, 5, 6, 5, 22, 5, 14, 5, 30, 5, + 1, 5, 17, 5, 9, 5, 25, 5, 5, 5, 21, 5, 13, 5, 29, 5, + 3, 5, 19, 5, 11, 5, 27, 5, 7, 5, 23, 5 }; + + internal static readonly StaticTree Literals; + internal static readonly StaticTree Distances; + internal static readonly StaticTree BitLengths; + + internal short[] treeCodes; // static tree or null + internal int[] extraBits; // extra bits for each code or null + internal int extraBase; // base index for extra_bits + internal int elems; // max number of elements in the tree + internal int maxLength; // max bit length for the codes + + private StaticTree(short[] treeCodes, int[] extraBits, int extraBase, int elems, int maxLength) + { + this.treeCodes = treeCodes; + this.extraBits = extraBits; + this.extraBase = extraBase; + this.elems = elems; + this.maxLength = maxLength; + } + static StaticTree() + { + Literals = new StaticTree(lengthAndLiteralsTreeCodes, ZTree.ExtraLengthBits, InternalConstants.LITERALS + 1, InternalConstants.L_CODES, InternalConstants.MAX_BITS); + Distances = new StaticTree(distTreeCodes, ZTree.ExtraDistanceBits, 0, InternalConstants.D_CODES, InternalConstants.MAX_BITS); + BitLengths = new StaticTree(null, ZTree.extra_blbits, 0, InternalConstants.BL_CODES, InternalConstants.MAX_BL_BITS); + } + } + + + + /// + /// Computes an Adler-32 checksum. + /// + /// + /// The Adler checksum is similar to a CRC checksum, but faster to compute, though less + /// reliable. It is used in producing RFC1950 compressed streams. The Adler checksum + /// is a required part of the "ZLIB" standard. Applications will almost never need to + /// use this class directly. + /// + /// + /// + public sealed class Adler + { + // largest prime smaller than 65536 + private static readonly uint BASE = 65521; + // NMAX is the largest n such that 255n(n+1)/2 + (n+1)(BASE-1) <= 2^32-1 + private static readonly int NMAX = 5552; + + +#pragma warning disable 3001 +#pragma warning disable 3002 + + /// + /// Calculates the Adler32 checksum. + /// + /// + /// + /// This is used within ZLIB. You probably don't need to use this directly. + /// + /// + /// + /// To compute an Adler32 checksum on a byte array: + /// + /// var adler = Adler.Adler32(0, null, 0, 0); + /// adler = Adler.Adler32(adler, buffer, index, length); + /// + /// + public static uint Adler32(uint adler, byte[] buf, int index, int len) + { + if (buf == null) + return 1; + + uint s1 = (uint) (adler & 0xffff); + uint s2 = (uint) ((adler >> 16) & 0xffff); + + while (len > 0) + { + int k = len < NMAX ? len : NMAX; + len -= k; + while (k >= 16) + { + //s1 += (buf[index++] & 0xff); s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + s1 += buf[index++]; s2 += s1; + k -= 16; + } + if (k != 0) + { + do + { + s1 += buf[index++]; + s2 += s1; + } + while (--k != 0); + } + s1 %= BASE; + s2 %= BASE; + } + return (uint)((s2 << 16) | s1); + } +#pragma warning restore 3001 +#pragma warning restore 3002 + + } + +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs.meta new file mode 100644 index 00000000..ee7953e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 92296e5d6552dbf4284a095b8d668b3f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/Zlib.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs new file mode 100644 index 00000000..f30444e5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs @@ -0,0 +1,595 @@ +// ZlibBaseStream.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2011-August-06 21:22:38> +// +// ------------------------------------------------------------------ +// +// This module defines the ZlibBaseStream class, which is an intnernal +// base class for DeflateStream, ZlibStream and GZipStream. +// +// ------------------------------------------------------------------ + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; +using System.IO; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + + internal enum ZlibStreamFlavor { ZLIB = 1950, DEFLATE = 1951, GZIP = 1952 } + + internal class ZlibBaseStream : System.IO.Stream + { + protected internal ZlibCodec _z = null; // deferred init... new ZlibCodec(); + + protected internal StreamMode _streamMode = StreamMode.Undefined; + protected internal FlushType _flushMode; + protected internal ZlibStreamFlavor _flavor; + protected internal CompressionMode _compressionMode; + protected internal CompressionLevel _level; + protected internal bool _leaveOpen; + protected internal byte[] _workingBuffer; + protected internal int _bufferSize = ZlibConstants.WorkingBufferSizeDefault; + protected internal int windowBitsMax; + protected internal byte[] _buf1 = new byte[1]; + + protected internal System.IO.Stream _stream; + protected internal CompressionStrategy Strategy = CompressionStrategy.Default; + + // workitem 7159 + Best.HTTP.Shared.Compression.Crc.CRC32 crc; + protected internal string _GzipFileName; + protected internal string _GzipComment; + protected internal DateTime _GzipMtime; + protected internal int _gzipHeaderByteCount; + + internal int Crc32 { get { if (crc == null) return 0; return crc.Crc32Result; } } + + public ZlibBaseStream(System.IO.Stream stream, + CompressionMode compressionMode, + CompressionLevel level, + ZlibStreamFlavor flavor, + bool leaveOpen) + :this(stream, compressionMode, level, flavor,leaveOpen, ZlibConstants.WindowBitsDefault) + { } + + public ZlibBaseStream(System.IO.Stream stream, + CompressionMode compressionMode, + CompressionLevel level, + ZlibStreamFlavor flavor, + bool leaveOpen, + int windowBits) + : base() + { + this._flushMode = FlushType.None; + //this._workingBuffer = new byte[WORKING_BUFFER_SIZE_DEFAULT]; + this._stream = stream; + this._leaveOpen = leaveOpen; + this._compressionMode = compressionMode; + this._flavor = flavor; + this._level = level; + this.windowBitsMax = windowBits; + // workitem 7159 + if (flavor == ZlibStreamFlavor.GZIP) + { + this.crc = new Best.HTTP.Shared.Compression.Crc.CRC32(); + } + } + + + protected internal bool _wantCompress + { + get + { + return (this._compressionMode == CompressionMode.Compress); + } + } + + private ZlibCodec z + { + get + { + if (_z == null) + { + bool wantRfc1950Header = (this._flavor == ZlibStreamFlavor.ZLIB); + _z = new ZlibCodec(); + if (this._compressionMode == CompressionMode.Decompress) + { + _z.InitializeInflate(this.windowBitsMax, wantRfc1950Header); + } + else + { + _z.Strategy = Strategy; + _z.InitializeDeflate(this._level, this.windowBitsMax, wantRfc1950Header); + } + } + return _z; + } + } + + + + private byte[] workingBuffer + { + get + { + if (_workingBuffer == null) + _workingBuffer = BufferPool.Get(_bufferSize, true); + return _workingBuffer; + } + } + + + + public override void Write(System.Byte[] buffer, int offset, int count) + { + // workitem 7159 + // calculate the CRC on the unccompressed data (before writing) + if (crc != null) + crc.SlurpBlock(buffer, offset, count); + + if (_streamMode == StreamMode.Undefined) + _streamMode = StreamMode.Writer; + else if (_streamMode != StreamMode.Writer) + throw new ZlibException("Cannot Write after Reading."); + + if (count == 0) + return; + + // first reference of z property will initialize the private var _z + z.InputBuffer = buffer; + _z.NextIn = offset; + _z.AvailableBytesIn = count; + bool done = false; + do + { + _z.OutputBuffer = workingBuffer; + _z.NextOut = 0; + _z.AvailableBytesOut = _workingBuffer.Length; + int rc = (_wantCompress) + ? _z.Deflate(_flushMode) + : _z.Inflate(_flushMode); + if (rc != ZlibConstants.Z_OK && rc != ZlibConstants.Z_STREAM_END) + throw new ZlibException((_wantCompress ? "de" : "in") + "flating: " + _z.Message); + + //if (_workingBuffer.Length - _z.AvailableBytesOut > 0) + _stream.Write(_workingBuffer, 0, _workingBuffer.Length - _z.AvailableBytesOut); + + done = _z.AvailableBytesIn == 0 && _z.AvailableBytesOut != 0; + + // If GZIP and de-compress, we're done when 8 bytes remain. + if (_flavor == ZlibStreamFlavor.GZIP && !_wantCompress) + done = (_z.AvailableBytesIn == 8 && _z.AvailableBytesOut != 0); + + } + while (!done); + } + + + + private void finish() + { + if (_z == null) return; + + if (_streamMode == StreamMode.Writer) + { + bool done = false; + do + { + _z.OutputBuffer = workingBuffer; + _z.NextOut = 0; + _z.AvailableBytesOut = _workingBuffer.Length; + int rc = (_wantCompress) + ? _z.Deflate(FlushType.Finish) + : _z.Inflate(FlushType.Finish); + + if (rc != ZlibConstants.Z_STREAM_END && rc != ZlibConstants.Z_OK) + { + string verb = (_wantCompress ? "de" : "in") + "flating"; + if (_z.Message == null) + throw new ZlibException(String.Format("{0}: (rc = {1})", verb, rc)); + else + throw new ZlibException(verb + ": " + _z.Message); + } + + if (_workingBuffer.Length - _z.AvailableBytesOut > 0) + { + _stream.Write(_workingBuffer, 0, _workingBuffer.Length - _z.AvailableBytesOut); + } + + done = _z.AvailableBytesIn == 0 && _z.AvailableBytesOut != 0; + // If GZIP and de-compress, we're done when 8 bytes remain. + if (_flavor == ZlibStreamFlavor.GZIP && !_wantCompress) + done = (_z.AvailableBytesIn == 8 && _z.AvailableBytesOut != 0); + + } + while (!done); + + Flush(); + + // workitem 7159 + if (_flavor == ZlibStreamFlavor.GZIP) + { + if (_wantCompress) + { + // Emit the GZIP trailer: CRC32 and size mod 2^32 + int c1 = crc.Crc32Result; + _stream.Write(BitConverter.GetBytes(c1), 0, 4); + int c2 = (Int32)(crc.TotalBytesRead & 0x00000000FFFFFFFF); + _stream.Write(BitConverter.GetBytes(c2), 0, 4); + } + else + { + throw new ZlibException("Writing with decompression is not supported."); + } + } + } + // workitem 7159 + else if (_streamMode == StreamMode.Reader) + { + if (_flavor == ZlibStreamFlavor.GZIP) + { + if (!_wantCompress) + { + // workitem 8501: handle edge case (decompress empty stream) + if (_z.TotalBytesOut == 0L) + return; + + // Read and potentially verify the GZIP trailer: + // CRC32 and size mod 2^32 + byte[] trailer = BufferPool.Get(8, true); + using var _ = trailer.AsAutoRelease(); + + // workitems 8679 & 12554 + if (_z.AvailableBytesIn < 8) + { + // Make sure we have read to the end of the stream + Array.Copy(_z.InputBuffer, _z.NextIn, trailer, 0, _z.AvailableBytesIn); + int bytesNeeded = 8 - _z.AvailableBytesIn; + int bytesRead = _stream.Read(trailer, + _z.AvailableBytesIn, + bytesNeeded); + if (bytesNeeded != bytesRead) + throw new ZlibException(String.Format("Missing or incomplete GZIP trailer. Expected 8 bytes, got {0}.", + _z.AvailableBytesIn + bytesRead)); + } + else + { + Array.Copy(_z.InputBuffer, _z.NextIn, trailer, 0, 8); + } + + Int32 crc32_expected = BitConverter.ToInt32(trailer, 0); + Int32 crc32_actual = crc.Crc32Result; + Int32 isize_expected = BitConverter.ToInt32(trailer, 4); + Int32 isize_actual = (Int32)(_z.TotalBytesOut & 0x00000000FFFFFFFF); + + if (crc32_actual != crc32_expected) + throw new ZlibException(String.Format("Bad CRC32 in GZIP trailer. (actual({0:X8})!=expected({1:X8}))", crc32_actual, crc32_expected)); + + if (isize_actual != isize_expected) + throw new ZlibException(String.Format("Bad size in GZIP trailer. (actual({0})!=expected({1}))", isize_actual, isize_expected)); + } + else + { + throw new ZlibException("Reading with compression is not supported."); + } + } + } + } + + + private void end() + { + if (z == null) + return; + if (_wantCompress) + { + _z.EndDeflate(); + } + else + { + _z.EndInflate(); + } + _z = null; + BufferPool.Release(_workingBuffer); + _workingBuffer = null; + } + + + public override void Close() + { + if (_stream == null) return; + try + { + finish(); + } + finally + { + end(); + if (!_leaveOpen) _stream.Dispose(); + _stream = null; + } + } + + public override void Flush() + { + _stream.Flush(); + } + + public override System.Int64 Seek(System.Int64 offset, System.IO.SeekOrigin origin) + { + throw new NotImplementedException(); + //_outStream.Seek(offset, origin); + } + public override void SetLength(System.Int64 value) + { + _stream.SetLength(value); + nomoreinput = false; + } + + +#if NOT + public int Read() + { + if (Read(_buf1, 0, 1) == 0) + return 0; + // calculate CRC after reading + if (crc!=null) + crc.SlurpBlock(_buf1,0,1); + return (_buf1[0] & 0xFF); + } +#endif + + private bool nomoreinput = false; + + + + private string ReadZeroTerminatedString() + { + var list = new System.Collections.Generic.List(); + bool done = false; + do + { + // workitem 7740 + int n = _stream.Read(_buf1, 0, 1); + if (n != 1) + throw new ZlibException("Unexpected EOF reading GZIP header."); + else + { + if (_buf1[0] == 0) + done = true; + else + list.Add(_buf1[0]); + } + } while (!done); + byte[] a = list.ToArray(); + return GZipStream.iso8859dash1.GetString(a, 0, a.Length); + } + + + private int _ReadAndValidateGzipHeader() + { + int totalBytesRead = 0; + // read the header on the first read + byte[] header = BufferPool.Get(10, true); + int n = _stream.Read(header, 0, 10); + + // workitem 8501: handle edge case (decompress empty stream) + if (n == 0) + { + BufferPool.Release(header); + return 0; + } + + if (n != 10) + { + BufferPool.Release(header); + throw new ZlibException("Not a valid GZIP stream."); + } + + if (header[0] != 0x1F || header[1] != 0x8B || header[2] != 8) + { + BufferPool.Release(header); + throw new ZlibException("Bad GZIP header."); + } + + Int32 timet = BitConverter.ToInt32(header, 4); + _GzipMtime = GZipStream._unixEpoch.AddSeconds(timet); + totalBytesRead += n; + if ((header[3] & 0x04) == 0x04) + { + // read and discard extra field + n = _stream.Read(header, 0, 2); // 2-byte length field + totalBytesRead += n; + + Int16 extraLength = (Int16)(header[0] + header[1] * 256); + byte[] extra = BufferPool.Get(extraLength, true); + n = _stream.Read(extra, 0, extraLength); + if (n != extraLength) + { + BufferPool.Release(extra); + BufferPool.Release(header); + throw new ZlibException("Unexpected end-of-file reading GZIP header."); + } + totalBytesRead += n; + } + if ((header[3] & 0x08) == 0x08) + _GzipFileName = ReadZeroTerminatedString(); + if ((header[3] & 0x10) == 0x010) + _GzipComment = ReadZeroTerminatedString(); + if ((header[3] & 0x02) == 0x02) + Read(_buf1, 0, 1); // CRC16, ignore + + BufferPool.Release(header); + return totalBytesRead; + } + + + + public override System.Int32 Read(System.Byte[] buffer, System.Int32 offset, System.Int32 count) + { + // According to MS documentation, any implementation of the IO.Stream.Read function must: + // (a) throw an exception if offset & count reference an invalid part of the buffer, + // or if count < 0, or if buffer is null + // (b) return 0 only upon EOF, or if count = 0 + // (c) if not EOF, then return at least 1 byte, up to bytes + + if (_streamMode == StreamMode.Undefined) + { + if (!this._stream.CanRead) throw new ZlibException("The stream is not readable."); + // for the first read, set up some controls. + _streamMode = StreamMode.Reader; + // (The first reference to _z goes through the private accessor which + // may initialize it.) + z.AvailableBytesIn = 0; + if (_flavor == ZlibStreamFlavor.GZIP) + { + _gzipHeaderByteCount = _ReadAndValidateGzipHeader(); + // workitem 8501: handle edge case (decompress empty stream) + if (_gzipHeaderByteCount == 0) + return 0; + } + } + + if (_streamMode != StreamMode.Reader) + throw new ZlibException("Cannot Read after Writing."); + + if (count == 0) return 0; + if (nomoreinput && _wantCompress) return 0; // workitem 8557 + if (buffer == null) throw new ArgumentNullException("buffer"); + if (count < 0) throw new ArgumentOutOfRangeException("count"); + if (offset < buffer.GetLowerBound(0)) throw new ArgumentOutOfRangeException("offset"); + if ((offset + count) > buffer.GetLength(0)) throw new ArgumentOutOfRangeException("count"); + + int rc = 0; + + // set up the output of the deflate/inflate codec: + _z.OutputBuffer = buffer; + _z.NextOut = offset; + _z.AvailableBytesOut = count; + + // This is necessary in case _workingBuffer has been resized. (new byte[]) + // (The first reference to _workingBuffer goes through the private accessor which + // may initialize it.) + _z.InputBuffer = workingBuffer; + + do + { + // need data in _workingBuffer in order to deflate/inflate. Here, we check if we have any. + if ((_z.AvailableBytesIn == 0) && (!nomoreinput)) + { + // No data available, so try to Read data from the captive stream. + _z.NextIn = 0; + _z.AvailableBytesIn = _stream.Read(_workingBuffer, 0, _workingBuffer.Length); + if (_z.AvailableBytesIn == 0) + nomoreinput = true; + + } + // we have data in InputBuffer; now compress or decompress as appropriate + rc = (_wantCompress) + ? _z.Deflate(_flushMode) + : _z.Inflate(_flushMode); + + if (nomoreinput && (rc == ZlibConstants.Z_BUF_ERROR)) + return 0; + + if (rc != ZlibConstants.Z_OK && rc != ZlibConstants.Z_STREAM_END) + throw new ZlibException(String.Format("{0}flating: rc={1} msg={2}", (_wantCompress ? "de" : "in"), rc, _z.Message)); + + if ((nomoreinput || rc == ZlibConstants.Z_STREAM_END) && (_z.AvailableBytesOut == count)) + break; // nothing more to read + } + //while (_z.AvailableBytesOut == count && rc == ZlibConstants.Z_OK); + while (_z.AvailableBytesOut > 0 && !nomoreinput && rc == ZlibConstants.Z_OK); + + + // workitem 8557 + // is there more room in output? + if (_z.AvailableBytesOut > 0) + { + if (rc == ZlibConstants.Z_OK && _z.AvailableBytesIn == 0) + { + // deferred + } + + // are we completely done reading? + if (nomoreinput) + { + // and in compression? + if (_wantCompress) + { + // no more input data available; therefore we flush to + // try to complete the read + rc = _z.Deflate(FlushType.Finish); + + if (rc != ZlibConstants.Z_OK && rc != ZlibConstants.Z_STREAM_END) + throw new ZlibException(String.Format("Deflating: rc={0} msg={1}", rc, _z.Message)); + } + } + } + + + rc = (count - _z.AvailableBytesOut); + + // calculate CRC after reading + if (crc != null) + crc.SlurpBlock(buffer, offset, rc); + + return rc; + } + + + + public override System.Boolean CanRead + { + get { return this._stream.CanRead; } + } + + public override System.Boolean CanSeek + { + get { return this._stream.CanSeek; } + } + + public override System.Boolean CanWrite + { + get { return this._stream.CanWrite; } + } + + public override System.Int64 Length + { + get { return _stream.Length; } + } + + public override long Position + { + get { throw new NotImplementedException(); } + set { throw new NotImplementedException(); } + } + + internal enum StreamMode + { + Writer, + Reader, + Undefined, + } + + } + + +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs.meta new file mode 100644 index 00000000..24ee2f72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9c9a765216df8624783cd25615a211e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibBaseStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs new file mode 100644 index 00000000..6fd60657 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs @@ -0,0 +1,712 @@ +// ZlibCodec.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2009-November-03 15:40:51> +// +// ------------------------------------------------------------------ +// +// This module defines a Codec for ZLIB compression and +// decompression. This code extends code that was based the jzlib +// implementation of zlib, but this code is completely novel. The codec +// class is new, and encapsulates some behaviors that are new, and some +// that were present in other classes in the jzlib code base. In +// keeping with the license for jzlib, the copyright to the jzlib code +// is included below. +// +// ------------------------------------------------------------------ +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + +using System; +using Interop=System.Runtime.InteropServices; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + /// + /// Encoder and Decoder for ZLIB and DEFLATE (IETF RFC1950 and RFC1951). + /// + /// + /// + /// This class compresses and decompresses data according to the Deflate algorithm + /// and optionally, the ZLIB format, as documented in RFC 1950 - ZLIB and RFC 1951 - DEFLATE. + /// + sealed internal class ZlibCodec + { + /// + /// The buffer from which data is taken. + /// + public byte[] InputBuffer; + + /// + /// An index into the InputBuffer array, indicating where to start reading. + /// + public int NextIn; + + /// + /// The number of bytes available in the InputBuffer, starting at NextIn. + /// + /// + /// Generally you should set this to InputBuffer.Length before the first Inflate() or Deflate() call. + /// The class will update this number as calls to Inflate/Deflate are made. + /// + public int AvailableBytesIn; + + /// + /// Total number of bytes read so far, through all calls to Inflate()/Deflate(). + /// + public long TotalBytesIn; + + /// + /// Buffer to store output data. + /// + public byte[] OutputBuffer; + + /// + /// An index into the OutputBuffer array, indicating where to start writing. + /// + public int NextOut; + + /// + /// The number of bytes available in the OutputBuffer, starting at NextOut. + /// + /// + /// Generally you should set this to OutputBuffer.Length before the first Inflate() or Deflate() call. + /// The class will update this number as calls to Inflate/Deflate are made. + /// + public int AvailableBytesOut; + + /// + /// Total number of bytes written to the output so far, through all calls to Inflate()/Deflate(). + /// + public long TotalBytesOut; + + /// + /// used for diagnostics, when something goes wrong! + /// + public System.String Message; + + internal DeflateManager dstate; + internal InflateManager istate; + + internal uint _Adler32; + + /// + /// The compression level to use in this codec. Useful only in compression mode. + /// + public CompressionLevel CompressLevel = CompressionLevel.Default; + + /// + /// The number of Window Bits to use. + /// + /// + /// This gauges the size of the sliding window, and hence the + /// compression effectiveness as well as memory consumption. It's best to just leave this + /// setting alone if you don't know what it is. The maximum value is 15 bits, which implies + /// a 32k window. + /// + public int WindowBits = ZlibConstants.WindowBitsDefault; + + /// + /// The compression strategy to use. + /// + /// + /// This is only effective in compression. The theory offered by ZLIB is that different + /// strategies could potentially produce significant differences in compression behavior + /// for different data sets. Unfortunately I don't have any good recommendations for how + /// to set it differently. When I tested changing the strategy I got minimally different + /// compression performance. It's best to leave this property alone if you don't have a + /// good feel for it. Or, you may want to produce a test harness that runs through the + /// different strategy options and evaluates them on different file types. If you do that, + /// let me know your results. + /// + public CompressionStrategy Strategy = CompressionStrategy.Default; + + + /// + /// The Adler32 checksum on the data transferred through the codec so far. You probably don't need to look at this. + /// + public int Adler32 { get { return (int)_Adler32; } } + + + /// + /// Create a ZlibCodec. + /// + /// + /// If you use this default constructor, you will later have to explicitly call + /// InitializeInflate() or InitializeDeflate() before using the ZlibCodec to compress + /// or decompress. + /// + public ZlibCodec() { } + + /// + /// Create a ZlibCodec that either compresses or decompresses. + /// + /// + /// Indicates whether the codec should compress (deflate) or decompress (inflate). + /// + public ZlibCodec(CompressionMode mode) + { + if (mode == CompressionMode.Compress) + { + int rc = InitializeDeflate(); + if (rc != ZlibConstants.Z_OK) throw new ZlibException("Cannot initialize for deflate."); + } + else if (mode == CompressionMode.Decompress) + { + int rc = InitializeInflate(); + if (rc != ZlibConstants.Z_OK) throw new ZlibException("Cannot initialize for inflate."); + } + else throw new ZlibException("Invalid ZlibStreamFlavor."); + } + + /// + /// Initialize the inflation state. + /// + /// + /// It is not necessary to call this before using the ZlibCodec to inflate data; + /// It is implicitly called when you call the constructor. + /// + /// Z_OK if everything goes well. + public int InitializeInflate() + { + return InitializeInflate(this.WindowBits); + } + + /// + /// Initialize the inflation state with an explicit flag to + /// govern the handling of RFC1950 header bytes. + /// + /// + /// + /// By default, the ZLIB header defined in RFC 1950 is expected. If + /// you want to read a zlib stream you should specify true for + /// expectRfc1950Header. If you have a deflate stream, you will want to specify + /// false. It is only necessary to invoke this initializer explicitly if you + /// want to specify false. + /// + /// + /// whether to expect an RFC1950 header byte + /// pair when reading the stream of data to be inflated. + /// + /// Z_OK if everything goes well. + public int InitializeInflate(bool expectRfc1950Header) + { + return InitializeInflate(this.WindowBits, expectRfc1950Header); + } + + /// + /// Initialize the ZlibCodec for inflation, with the specified number of window bits. + /// + /// The number of window bits to use. If you need to ask what that is, + /// then you shouldn't be calling this initializer. + /// Z_OK if all goes well. + public int InitializeInflate(int windowBits) + { + this.WindowBits = windowBits; + return InitializeInflate(windowBits, true); + } + + /// + /// Initialize the inflation state with an explicit flag to govern the handling of + /// RFC1950 header bytes. + /// + /// + /// + /// If you want to read a zlib stream you should specify true for + /// expectRfc1950Header. In this case, the library will expect to find a ZLIB + /// header, as defined in RFC + /// 1950, in the compressed stream. If you will be reading a DEFLATE or + /// GZIP stream, which does not have such a header, you will want to specify + /// false. + /// + /// + /// whether to expect an RFC1950 header byte pair when reading + /// the stream of data to be inflated. + /// The number of window bits to use. If you need to ask what that is, + /// then you shouldn't be calling this initializer. + /// Z_OK if everything goes well. + public int InitializeInflate(int windowBits, bool expectRfc1950Header) + { + this.WindowBits = windowBits; + if (dstate != null) throw new ZlibException("You may not call InitializeInflate() after calling InitializeDeflate()."); + istate = new InflateManager(expectRfc1950Header); + return istate.Initialize(this, windowBits); + } + + /// + /// Inflate the data in the InputBuffer, placing the result in the OutputBuffer. + /// + /// + /// You must have set InputBuffer and OutputBuffer, NextIn and NextOut, and AvailableBytesIn and + /// AvailableBytesOut before calling this method. + /// + /// + /// + /// private void InflateBuffer() + /// { + /// int bufferSize = 1024; + /// byte[] buffer = new byte[bufferSize]; + /// ZlibCodec decompressor = new ZlibCodec(); + /// + /// Console.WriteLine("\n============================================"); + /// Console.WriteLine("Size of Buffer to Inflate: {0} bytes.", CompressedBytes.Length); + /// MemoryStream ms = new MemoryStream(DecompressedBytes); + /// + /// int rc = decompressor.InitializeInflate(); + /// + /// decompressor.InputBuffer = CompressedBytes; + /// decompressor.NextIn = 0; + /// decompressor.AvailableBytesIn = CompressedBytes.Length; + /// + /// decompressor.OutputBuffer = buffer; + /// + /// // pass 1: inflate + /// do + /// { + /// decompressor.NextOut = 0; + /// decompressor.AvailableBytesOut = buffer.Length; + /// rc = decompressor.Inflate(FlushType.None); + /// + /// if (rc != ZlibConstants.Z_OK && rc != ZlibConstants.Z_STREAM_END) + /// throw new Exception("inflating: " + decompressor.Message); + /// + /// ms.Write(decompressor.OutputBuffer, 0, buffer.Length - decompressor.AvailableBytesOut); + /// } + /// while (decompressor.AvailableBytesIn > 0 || decompressor.AvailableBytesOut == 0); + /// + /// // pass 2: finish and flush + /// do + /// { + /// decompressor.NextOut = 0; + /// decompressor.AvailableBytesOut = buffer.Length; + /// rc = decompressor.Inflate(FlushType.Finish); + /// + /// if (rc != ZlibConstants.Z_STREAM_END && rc != ZlibConstants.Z_OK) + /// throw new Exception("inflating: " + decompressor.Message); + /// + /// if (buffer.Length - decompressor.AvailableBytesOut > 0) + /// ms.Write(buffer, 0, buffer.Length - decompressor.AvailableBytesOut); + /// } + /// while (decompressor.AvailableBytesIn > 0 || decompressor.AvailableBytesOut == 0); + /// + /// decompressor.EndInflate(); + /// } + /// + /// + /// + /// The flush to use when inflating. + /// Z_OK if everything goes well. + public int Inflate(FlushType flush) + { + if (istate == null) + throw new ZlibException("No Inflate State!"); + return istate.Inflate(flush); + } + + + /// + /// Ends an inflation session. + /// + /// + /// Call this after successively calling Inflate(). This will cause all buffers to be flushed. + /// After calling this you cannot call Inflate() without a intervening call to one of the + /// InitializeInflate() overloads. + /// + /// Z_OK if everything goes well. + public int EndInflate() + { + if (istate == null) + throw new ZlibException("No Inflate State!"); + int ret = istate.End(); + istate = null; + return ret; + } + + /// + /// I don't know what this does! + /// + /// Z_OK if everything goes well. + public int SyncInflate() + { + if (istate == null) + throw new ZlibException("No Inflate State!"); + return istate.Sync(); + } + + /// + /// Initialize the ZlibCodec for deflation operation. + /// + /// + /// The codec will use the MAX window bits and the default level of compression. + /// + /// + /// + /// int bufferSize = 40000; + /// byte[] CompressedBytes = new byte[bufferSize]; + /// byte[] DecompressedBytes = new byte[bufferSize]; + /// + /// ZlibCodec compressor = new ZlibCodec(); + /// + /// compressor.InitializeDeflate(CompressionLevel.Default); + /// + /// compressor.InputBuffer = System.Text.ASCIIEncoding.ASCII.GetBytes(TextToCompress); + /// compressor.NextIn = 0; + /// compressor.AvailableBytesIn = compressor.InputBuffer.Length; + /// + /// compressor.OutputBuffer = CompressedBytes; + /// compressor.NextOut = 0; + /// compressor.AvailableBytesOut = CompressedBytes.Length; + /// + /// while (compressor.TotalBytesIn != TextToCompress.Length && compressor.TotalBytesOut < bufferSize) + /// { + /// compressor.Deflate(FlushType.None); + /// } + /// + /// while (true) + /// { + /// int rc= compressor.Deflate(FlushType.Finish); + /// if (rc == ZlibConstants.Z_STREAM_END) break; + /// } + /// + /// compressor.EndDeflate(); + /// + /// + /// + /// Z_OK if all goes well. You generally don't need to check the return code. + public int InitializeDeflate() + { + return _InternalInitializeDeflate(true); + } + + /// + /// Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel. + /// + /// + /// The codec will use the maximum window bits (15) and the specified + /// CompressionLevel. It will emit a ZLIB stream as it compresses. + /// + /// The compression level for the codec. + /// Z_OK if all goes well. + public int InitializeDeflate(CompressionLevel level) + { + this.CompressLevel = level; + return _InternalInitializeDeflate(true); + } + + + /// + /// Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel, + /// and the explicit flag governing whether to emit an RFC1950 header byte pair. + /// + /// + /// The codec will use the maximum window bits (15) and the specified CompressionLevel. + /// If you want to generate a zlib stream, you should specify true for + /// wantRfc1950Header. In this case, the library will emit a ZLIB + /// header, as defined in RFC + /// 1950, in the compressed stream. + /// + /// The compression level for the codec. + /// whether to emit an initial RFC1950 byte pair in the compressed stream. + /// Z_OK if all goes well. + public int InitializeDeflate(CompressionLevel level, bool wantRfc1950Header) + { + this.CompressLevel = level; + return _InternalInitializeDeflate(wantRfc1950Header); + } + + + /// + /// Initialize the ZlibCodec for deflation operation, using the specified CompressionLevel, + /// and the specified number of window bits. + /// + /// + /// The codec will use the specified number of window bits and the specified CompressionLevel. + /// + /// The compression level for the codec. + /// the number of window bits to use. If you don't know what this means, don't use this method. + /// Z_OK if all goes well. + public int InitializeDeflate(CompressionLevel level, int bits) + { + this.CompressLevel = level; + this.WindowBits = bits; + return _InternalInitializeDeflate(true); + } + + /// + /// Initialize the ZlibCodec for deflation operation, using the specified + /// CompressionLevel, the specified number of window bits, and the explicit flag + /// governing whether to emit an RFC1950 header byte pair. + /// + /// + /// The compression level for the codec. + /// whether to emit an initial RFC1950 byte pair in the compressed stream. + /// the number of window bits to use. If you don't know what this means, don't use this method. + /// Z_OK if all goes well. + public int InitializeDeflate(CompressionLevel level, int bits, bool wantRfc1950Header) + { + this.CompressLevel = level; + this.WindowBits = bits; + return _InternalInitializeDeflate(wantRfc1950Header); + } + + private int _InternalInitializeDeflate(bool wantRfc1950Header) + { + if (istate != null) throw new ZlibException("You may not call InitializeDeflate() after calling InitializeInflate()."); + dstate = new DeflateManager(); + dstate.WantRfc1950HeaderBytes = wantRfc1950Header; + + return dstate.Initialize(this, this.CompressLevel, this.WindowBits, this.Strategy); + } + + /// + /// Deflate one batch of data. + /// + /// + /// You must have set InputBuffer and OutputBuffer before calling this method. + /// + /// + /// + /// private void DeflateBuffer(CompressionLevel level) + /// { + /// int bufferSize = 1024; + /// byte[] buffer = new byte[bufferSize]; + /// ZlibCodec compressor = new ZlibCodec(); + /// + /// Console.WriteLine("\n============================================"); + /// Console.WriteLine("Size of Buffer to Deflate: {0} bytes.", UncompressedBytes.Length); + /// MemoryStream ms = new MemoryStream(); + /// + /// int rc = compressor.InitializeDeflate(level); + /// + /// compressor.InputBuffer = UncompressedBytes; + /// compressor.NextIn = 0; + /// compressor.AvailableBytesIn = UncompressedBytes.Length; + /// + /// compressor.OutputBuffer = buffer; + /// + /// // pass 1: deflate + /// do + /// { + /// compressor.NextOut = 0; + /// compressor.AvailableBytesOut = buffer.Length; + /// rc = compressor.Deflate(FlushType.None); + /// + /// if (rc != ZlibConstants.Z_OK && rc != ZlibConstants.Z_STREAM_END) + /// throw new Exception("deflating: " + compressor.Message); + /// + /// ms.Write(compressor.OutputBuffer, 0, buffer.Length - compressor.AvailableBytesOut); + /// } + /// while (compressor.AvailableBytesIn > 0 || compressor.AvailableBytesOut == 0); + /// + /// // pass 2: finish and flush + /// do + /// { + /// compressor.NextOut = 0; + /// compressor.AvailableBytesOut = buffer.Length; + /// rc = compressor.Deflate(FlushType.Finish); + /// + /// if (rc != ZlibConstants.Z_STREAM_END && rc != ZlibConstants.Z_OK) + /// throw new Exception("deflating: " + compressor.Message); + /// + /// if (buffer.Length - compressor.AvailableBytesOut > 0) + /// ms.Write(buffer, 0, buffer.Length - compressor.AvailableBytesOut); + /// } + /// while (compressor.AvailableBytesIn > 0 || compressor.AvailableBytesOut == 0); + /// + /// compressor.EndDeflate(); + /// + /// ms.Seek(0, SeekOrigin.Begin); + /// CompressedBytes = new byte[compressor.TotalBytesOut]; + /// ms.Read(CompressedBytes, 0, CompressedBytes.Length); + /// } + /// + /// + /// whether to flush all data as you deflate. Generally you will want to + /// use Z_NO_FLUSH here, in a series of calls to Deflate(), and then call EndDeflate() to + /// flush everything. + /// + /// Z_OK if all goes well. + public int Deflate(FlushType flush) + { + if (dstate == null) + throw new ZlibException("No Deflate State!"); + return dstate.Deflate(flush); + } + + /// + /// End a deflation session. + /// + /// + /// Call this after making a series of one or more calls to Deflate(). All buffers are flushed. + /// + /// Z_OK if all goes well. + public int EndDeflate() + { + if (dstate == null) + throw new ZlibException("No Deflate State!"); + // Room for improvement: dinoch Tue, 03 Nov 2009 15:39 (test this) + //int ret = dstate.End(); + dstate = null; + return ZlibConstants.Z_OK; //ret; + } + + /// + /// Reset a codec for another deflation session. + /// + /// + /// Call this to reset the deflation state. For example if a thread is deflating + /// non-consecutive blocks, you can call Reset() after the Deflate(Sync) of the first + /// block and before the next Deflate(None) of the second block. + /// + /// Z_OK if all goes well. + public void ResetDeflate() + { + if (dstate == null) + throw new ZlibException("No Deflate State!"); + dstate.Reset(); + } + + + /// + /// Set the CompressionStrategy and CompressionLevel for a deflation session. + /// + /// the level of compression to use. + /// the strategy to use for compression. + /// Z_OK if all goes well. + public int SetDeflateParams(CompressionLevel level, CompressionStrategy strategy) + { + if (dstate == null) + throw new ZlibException("No Deflate State!"); + return dstate.SetParams(level, strategy); + } + + + /// + /// Set the dictionary to be used for either Inflation or Deflation. + /// + /// The dictionary bytes to use. + /// Z_OK if all goes well. + public int SetDictionary(byte[] dictionary) + { + if (istate != null) + return istate.SetDictionary(dictionary); + + if (dstate != null) + return dstate.SetDictionary(dictionary); + + throw new ZlibException("No Inflate or Deflate state!"); + } + + // Flush as much pending output as possible. All deflate() output goes + // through this function so some applications may wish to modify it + // to avoid allocating a large strm->next_out buffer and copying into it. + // (See also read_buf()). + internal void flush_pending() + { + int len = dstate.pendingCount; + + if (len > AvailableBytesOut) + len = AvailableBytesOut; + if (len == 0) + return; + + if (dstate.pending.Length <= dstate.nextPending || + OutputBuffer.Length <= NextOut || + dstate.pending.Length < (dstate.nextPending + len) || + OutputBuffer.Length < (NextOut + len)) + { + throw new ZlibException(String.Format("Invalid State. (pending.Length={0}, pendingCount={1})", + dstate.pending.Length, dstate.pendingCount)); + } + + Array.Copy(dstate.pending, dstate.nextPending, OutputBuffer, NextOut, len); + + NextOut += len; + dstate.nextPending += len; + TotalBytesOut += len; + AvailableBytesOut -= len; + dstate.pendingCount -= len; + if (dstate.pendingCount == 0) + { + dstate.nextPending = 0; + } + } + + // Read a new buffer from the current input stream, update the adler32 + // and total number of bytes read. All deflate() input goes through + // this function so some applications may wish to modify it to avoid + // allocating a large strm->next_in buffer and copying from it. + // (See also flush_pending()). + internal int read_buf(byte[] buf, int start, int size) + { + int len = AvailableBytesIn; + + if (len > size) + len = size; + if (len == 0) + return 0; + + AvailableBytesIn -= len; + + if (dstate.WantRfc1950HeaderBytes) + { + _Adler32 = Adler.Adler32(_Adler32, InputBuffer, NextIn, len); + } + Array.Copy(InputBuffer, NextIn, buf, start, len); + NextIn += len; + TotalBytesIn += len; + return len; + } + + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs.meta new file mode 100644 index 00000000..b5bb0675 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0f0f340535e633b4caf54ad7b99aab0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibCodec.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs new file mode 100644 index 00000000..fe951c84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs @@ -0,0 +1,128 @@ +// ZlibConstants.cs +// ------------------------------------------------------------------ +// +// Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. +// All rights reserved. +// +// This code module is part of DotNetZip, a zipfile class library. +// +// ------------------------------------------------------------------ +// +// This code is licensed under the Microsoft Public License. +// See the file License.txt for the license details. +// More info on: http://dotnetzip.codeplex.com +// +// ------------------------------------------------------------------ +// +// last saved (in emacs): +// Time-stamp: <2009-November-03 18:50:19> +// +// ------------------------------------------------------------------ +// +// This module defines constants used by the zlib class library. This +// code is derived from the jzlib implementation of zlib, but +// significantly modified. In keeping with the license for jzlib, the +// copyright to that code is included here. +// +// ------------------------------------------------------------------ +// +// Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are met: +// +// 1. Redistributions of source code must retain the above copyright notice, +// this list of conditions and the following disclaimer. +// +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in +// the documentation and/or other materials provided with the distribution. +// +// 3. The names of the authors may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, +// INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND +// FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, +// INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, +// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, +// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +// LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +// +// ----------------------------------------------------------------------- +// +// This program is based on zlib-1.1.3; credit to authors +// Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) +// and contributors of zlib. +// +// ----------------------------------------------------------------------- + + +using System; + +namespace Best.HTTP.Shared.Compression.Zlib +{ + /// + /// A bunch of constants used in the Zlib interface. + /// + public static class ZlibConstants + { + /// + /// The maximum number of window bits for the Deflate algorithm. + /// + public const int WindowBitsMax = 15; // 32K LZ77 window + + /// + /// The default number of window bits for the Deflate algorithm. + /// + public const int WindowBitsDefault = WindowBitsMax; + + /// + /// indicates everything is A-OK + /// + public const int Z_OK = 0; + + /// + /// Indicates that the last operation reached the end of the stream. + /// + public const int Z_STREAM_END = 1; + + /// + /// The operation ended in need of a dictionary. + /// + public const int Z_NEED_DICT = 2; + + /// + /// There was an error with the stream - not enough data, not open and readable, etc. + /// + public const int Z_STREAM_ERROR = -2; + + /// + /// There was an error with the data - not enough data, bad data, etc. + /// + public const int Z_DATA_ERROR = -3; + + /// + /// There was an error with the working buffer. + /// + public const int Z_BUF_ERROR = -5; + + /// + /// The size of the working buffer used in the ZlibCodec class. Defaults to 8192 bytes. + /// +#if NETCF + public const int WorkingBufferSizeDefault = 8192; +#else + public const int WorkingBufferSizeDefault = 16384; +#endif + /// + /// The minimum size of the working buffer used in the ZlibCodec class. Currently it is 128 bytes. + /// + public const int WorkingBufferSizeMin = 1024; + } + +} + diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs.meta new file mode 100644 index 00000000..476ece8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ad26e4796e02484b8db2961e064ba44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/Compression/Zlib/ZlibConstants.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON.meta new file mode 100644 index 00000000..9fc2cd08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 21e8db4dbc3241147b3fea3c59862b6a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs new file mode 100644 index 00000000..6d0ddde9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs @@ -0,0 +1,492 @@ +using System; +using System.Collections; +using System.Collections.Generic; +using System.Globalization; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.JSON +{ + /// + /// Based on the download from http://techblog.procurios.nl/k/news/view/14605/14863/how-do-i-write-my-own-parser-%28for-json%29.html + /// This class encodes and decodes JSON strings. + /// Spec. details, see http://www.json.org/ + /// + /// JSON uses Arrays and Objects. These correspond here to the datatypes List and Dictionary. + /// All numbers are parsed to doubles. + /// + public class Json + { + private const int TOKEN_NONE = 0; + private const int TOKEN_CURLY_OPEN = 1; + private const int TOKEN_CURLY_CLOSE = 2; + private const int TOKEN_SQUARED_OPEN = 3; + private const int TOKEN_SQUARED_CLOSE = 4; + private const int TOKEN_COLON = 5; + private const int TOKEN_COMMA = 6; + private const int TOKEN_STRING = 7; + private const int TOKEN_NUMBER = 8; + private const int TOKEN_TRUE = 9; + private const int TOKEN_FALSE = 10; + private const int TOKEN_NULL = 11; + + private const int BUILDER_CAPACITY = 2000; + + /// + /// Parses the string json into a value + /// + /// A JSON string. + /// A List, a Dictionary, a double, a string, null, true, or false + public static object Decode(string json) + { + bool success = true; + + return Decode(json, ref success); + } + + /// + /// Parses the string json into a value; and fills 'success' with the successfullness of the parse. + /// + /// A JSON string. + /// Successful parse? + /// A List, a Dictionary, a double, a string, null, true, or false + public static object Decode(string json, ref bool success) + { + success = true; + if (json != null) { + char[] charArray = json.ToCharArray(); + int index = 0; + object value = ParseValue(charArray, ref index, ref success); + return value; + } else { + return null; + } + } + + /// + /// Converts a Dictionary / List object into a JSON string + /// + /// A Dictionary / List + /// A JSON encoded string, or null if object 'json' is not serializable + public static string Encode(object json) + { + StringBuilder builder = StringBuilderPool.Get(BUILDER_CAPACITY); //new StringBuilder(BUILDER_CAPACITY); + + bool success = SerializeValue(json, builder); + + return (success ? StringBuilderPool.ReleaseAndGrab(builder) : null); + } + + protected static Dictionary ParseObject(char[] json, ref int index, ref bool success) + { + Dictionary table = new Dictionary(); + int token; + + // { + NextToken(json, ref index); + + bool done = false; + while (!done) { + token = LookAhead(json, index); + if (token == Json.TOKEN_NONE) { + success = false; + return null; + } else if (token == Json.TOKEN_COMMA) { + NextToken(json, ref index); + } else if (token == Json.TOKEN_CURLY_CLOSE) { + NextToken(json, ref index); + return table; + } else { + + // name + string name = ParseString(json, ref index, ref success); + if (!success) { + success = false; + return null; + } + + // : + token = NextToken(json, ref index); + if (token != Json.TOKEN_COLON) { + success = false; + return null; + } + + // value + object value = ParseValue(json, ref index, ref success); + if (!success) { + success = false; + return null; + } + + table[name] = value; + } + } + + return table; + } + + protected static List ParseArray(char[] json, ref int index, ref bool success) + { + List array = new List(); + + // [ + NextToken(json, ref index); + + bool done = false; + while (!done) { + int token = LookAhead(json, index); + if (token == Json.TOKEN_NONE) { + success = false; + return null; + } else if (token == Json.TOKEN_COMMA) { + NextToken(json, ref index); + } else if (token == Json.TOKEN_SQUARED_CLOSE) { + NextToken(json, ref index); + break; + } else { + object value = ParseValue(json, ref index, ref success); + if (!success) { + return null; + } + + array.Add(value); + } + } + + return array; + } + + protected static object ParseValue(char[] json, ref int index, ref bool success) + { + switch (LookAhead(json, index)) { + case Json.TOKEN_STRING: + return ParseString(json, ref index, ref success); + case Json.TOKEN_NUMBER: + return ParseNumber(json, ref index, ref success); + case Json.TOKEN_CURLY_OPEN: + return ParseObject(json, ref index, ref success); + case Json.TOKEN_SQUARED_OPEN: + return ParseArray(json, ref index, ref success); + case Json.TOKEN_TRUE: + NextToken(json, ref index); + return true; + case Json.TOKEN_FALSE: + NextToken(json, ref index); + return false; + case Json.TOKEN_NULL: + NextToken(json, ref index); + return null; + case Json.TOKEN_NONE: + break; + } + + success = false; + return null; + } + + protected static string ParseString(char[] json, ref int index, ref bool success) + { + StringBuilder s = StringBuilderPool.Get(BUILDER_CAPACITY); //new StringBuilder(BUILDER_CAPACITY); + + char c; + + EatWhitespace(json, ref index); + + // " + c = json[index++]; + + bool complete = false; + while (!complete) { + + if (index == json.Length) { + break; + } + + c = json[index++]; + if (c == '"') { + complete = true; + break; + } else if (c == '\\') { + + if (index == json.Length) { + break; + } + c = json[index++]; + if (c == '"') { + s.Append('"'); + } else if (c == '\\') { + s.Append('\\'); + } else if (c == '/') { + s.Append('/'); + } else if (c == 'b') { + s.Append('\b'); + } else if (c == 'f') { + s.Append('\f'); + } else if (c == 'n') { + s.Append('\n'); + } else if (c == 'r') { + s.Append('\r'); + } else if (c == 't') { + s.Append('\t'); + } else if (c == 'u') { + int remainingLength = json.Length - index; + if (remainingLength >= 4) { + // parse the 32 bit hex into an integer codepoint + uint codePoint; + if (!(success = UInt32.TryParse(new string(json, index, 4), NumberStyles.HexNumber, CultureInfo.InvariantCulture, out codePoint))) { + return ""; + } + // convert the integer codepoint to a unicode char and add to string + s.Append(Char.ConvertFromUtf32((int)codePoint)); + // skip 4 chars + index += 4; + } else { + break; + } + } + + } else { + s.Append(c); + } + + } + + if (!complete) { + success = false; + return null; + } + + return StringBuilderPool.ReleaseAndGrab(s); + } + + protected static double ParseNumber(char[] json, ref int index, ref bool success) + { + EatWhitespace(json, ref index); + + int lastIndex = GetLastIndexOfNumber(json, index); + int charLength = (lastIndex - index) + 1; + + double number; + success = Double.TryParse(new string(json, index, charLength), NumberStyles.Any, CultureInfo.InvariantCulture, out number); + + index = lastIndex + 1; + return number; + } + + protected static int GetLastIndexOfNumber(char[] json, int index) + { + int lastIndex; + + for (lastIndex = index; lastIndex < json.Length; lastIndex++) { + if ("0123456789+-.eE".IndexOf(json[lastIndex]) == -1) { + break; + } + } + return lastIndex - 1; + } + + protected static void EatWhitespace(char[] json, ref int index) + { + for (; index < json.Length; index++) { + if (" \t\n\r".IndexOf(json[index]) == -1) { + break; + } + } + } + + protected static int LookAhead(char[] json, int index) + { + int saveIndex = index; + return NextToken(json, ref saveIndex); + } + + protected static int NextToken(char[] json, ref int index) + { + EatWhitespace(json, ref index); + + if (index == json.Length) { + return Json.TOKEN_NONE; + } + + char c = json[index]; + index++; + switch (c) { + case '{': + return Json.TOKEN_CURLY_OPEN; + case '}': + return Json.TOKEN_CURLY_CLOSE; + case '[': + return Json.TOKEN_SQUARED_OPEN; + case ']': + return Json.TOKEN_SQUARED_CLOSE; + case ',': + return Json.TOKEN_COMMA; + case '"': + return Json.TOKEN_STRING; + case '0': case '1': case '2': case '3': case '4': + case '5': case '6': case '7': case '8': case '9': + case '-': + return Json.TOKEN_NUMBER; + case ':': + return Json.TOKEN_COLON; + } + index--; + + int remainingLength = json.Length - index; + + // false + if (remainingLength >= 5) { + if (json[index] == 'f' && + json[index + 1] == 'a' && + json[index + 2] == 'l' && + json[index + 3] == 's' && + json[index + 4] == 'e') { + index += 5; + return Json.TOKEN_FALSE; + } + } + + // true + if (remainingLength >= 4) { + if (json[index] == 't' && + json[index + 1] == 'r' && + json[index + 2] == 'u' && + json[index + 3] == 'e') { + index += 4; + return Json.TOKEN_TRUE; + } + } + + // null + if (remainingLength >= 4) { + if (json[index] == 'n' && + json[index + 1] == 'u' && + json[index + 2] == 'l' && + json[index + 3] == 'l') { + index += 4; + return Json.TOKEN_NULL; + } + } + + return Json.TOKEN_NONE; + } + + protected static bool SerializeValue(object value, StringBuilder builder) + { + bool success = true; + + if (value is string) { + success = SerializeString((string)value, builder); + } else if (value is IDictionary) { + success = SerializeObject((IDictionary)value, builder); + } else if (value is IList) { + success = SerializeArray(value as IList, builder); + } else if ((value is Boolean) && ((Boolean)value == true)) { + builder.Append("true"); + } else if ((value is Boolean) && ((Boolean)value == false)) { + builder.Append("false"); + } else if (value is ValueType) { + // thanks to ritchie for pointing out ValueType to me + success = SerializeNumber(Convert.ToDouble(value), builder); + } else if (value == null) { + builder.Append("null"); + } else { + success = false; + } + return success; + } + + protected static bool SerializeObject(IDictionary anObject, StringBuilder builder) + { + builder.Append("{"); + + IDictionaryEnumerator e = anObject.GetEnumerator(); + bool first = true; + while (e.MoveNext()) { + string key = e.Key.ToString(); + object value = e.Value; + + if (!first) { + builder.Append(", "); + } + + SerializeString(key, builder); + builder.Append(":"); + if (!SerializeValue(value, builder)) { + return false; + } + + first = false; + } + + builder.Append("}"); + return true; + } + + protected static bool SerializeArray(IList anArray, StringBuilder builder) + { + builder.Append("["); + + bool first = true; + for (int i = 0; i < anArray.Count; i++) { + object value = anArray[i]; + + if (!first) { + builder.Append(", "); + } + + if (!SerializeValue(value, builder)) { + return false; + } + + first = false; + } + + builder.Append("]"); + return true; + } + + protected static bool SerializeString(string aString, StringBuilder builder) + { + builder.Append("\""); + + char[] charArray = aString.ToCharArray(); + for (int i = 0; i < charArray.Length; i++) { + char c = charArray[i]; + if (c == '"') { + builder.Append("\\\""); + } else if (c == '\\') { + builder.Append("\\\\"); + } else if (c == '\b') { + builder.Append("\\b"); + } else if (c == '\f') { + builder.Append("\\f"); + } else if (c == '\n') { + builder.Append("\\n"); + } else if (c == '\r') { + builder.Append("\\r"); + } else if (c == '\t') { + builder.Append("\\t"); + } else { + int codepoint = Convert.ToInt32(c); + if ((codepoint >= 32) && (codepoint <= 126)) { + builder.Append(c); + } else { + builder.Append("\\u" + Convert.ToString(codepoint, 16).PadLeft(4, '0')); + } + } + } + + builder.Append("\""); + return true; + } + + protected static bool SerializeNumber(double number, StringBuilder builder) + { + builder.Append(Convert.ToString(number, CultureInfo.InvariantCulture)); + return true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs.meta new file mode 100644 index 00000000..1cc09628 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3d0267f9e586a5f4aa0316a3914734bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/JSON.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson.meta new file mode 100644 index 00000000..d673b4cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 593ed51040098bf49b7694632c40db69 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs new file mode 100644 index 00000000..2aaab9d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs @@ -0,0 +1,73 @@ +#region Header +/** + * IJsonWrapper.cs + * Interface that represents a type capable of handling all kinds of JSON + * data. This is mainly used when mapping objects through JsonMapper, and + * it's implemented by JsonData. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System.Collections; +using System.Collections.Specialized; + + +namespace Best.HTTP.JSON.LitJson +{ + public enum JsonType + { + None, + + Object, + Array, + String, + Int, + Long, + Double, + Boolean + } + + public interface IOrderedDictionary : IDictionary + { + new IDictionaryEnumerator GetEnumerator(); + void Insert(int index, object key, object value); + void RemoveAt(int index); + + object this[int index] + { + get; + set; + } + } + + public interface IJsonWrapper : IList, IOrderedDictionary + { + bool IsArray { get; } + bool IsBoolean { get; } + bool IsDouble { get; } + bool IsInt { get; } + bool IsLong { get; } + bool IsObject { get; } + bool IsString { get; } + + bool GetBoolean (); + double GetDouble (); + int GetInt (); + JsonType GetJsonType (); + long GetLong (); + string GetString (); + + void SetBoolean (bool val); + void SetDouble (double val); + void SetInt (int val); + void SetJsonType (JsonType type); + void SetLong (long val); + void SetString (string val); + + string ToJson (); + void ToJson (JsonWriter writer); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs.meta new file mode 100644 index 00000000..64403015 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b47b1ba30b5ba14884bc2464964048e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/IJsonWrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs new file mode 100644 index 00000000..6fdaee06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs @@ -0,0 +1,1059 @@ +#region Header +/** + * JsonData.cs + * Generic type to hold JSON data (objects, arrays, and so on). This is + * the default type returned by JsonMapper.ToObject(). + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.Specialized; +using System.IO; + + +namespace Best.HTTP.JSON.LitJson +{ + public sealed class JsonData : IJsonWrapper, IEquatable + { + #region Fields + private IList inst_array; + private bool inst_boolean; + private double inst_double; + private int inst_int; + private long inst_long; + private IDictionary inst_object; + private string inst_string; + private string json; + private JsonType type; + + // Used to implement the IOrderedDictionary interface + private IList> object_list; + #endregion + + + #region Properties + public int Count { + get { return EnsureCollection ().Count; } + } + + public bool IsArray { + get { return type == JsonType.Array; } + } + + public bool IsBoolean { + get { return type == JsonType.Boolean; } + } + + public bool IsDouble { + get { return type == JsonType.Double; } + } + + public bool IsInt { + get { return type == JsonType.Int; } + } + + public bool IsLong { + get { return type == JsonType.Long; } + } + + public bool IsObject { + get { return type == JsonType.Object; } + } + + public bool IsString { + get { return type == JsonType.String; } + } + + public ICollection Keys { + get { EnsureDictionary (); return inst_object.Keys; } + } + + /// + /// Determines whether the json contains an element that has the specified key. + /// + /// The key to locate in the json. + /// true if the json contains an element that has the specified key; otherwise, false. + public Boolean ContainsKey(String key) { + EnsureDictionary(); + return this.inst_object.Keys.Contains(key); + } + #endregion + + + #region ICollection Properties + int ICollection.Count { + get { + return Count; + } + } + + bool ICollection.IsSynchronized { + get { + return EnsureCollection ().IsSynchronized; + } + } + + object ICollection.SyncRoot { + get { + return EnsureCollection ().SyncRoot; + } + } + #endregion + + + #region IDictionary Properties + bool IDictionary.IsFixedSize { + get { + return EnsureDictionary ().IsFixedSize; + } + } + + bool IDictionary.IsReadOnly { + get { + return EnsureDictionary ().IsReadOnly; + } + } + + ICollection IDictionary.Keys { + get { + EnsureDictionary (); + IList keys = new List (); + + foreach (KeyValuePair entry in + object_list) { + keys.Add (entry.Key); + } + + return (ICollection) keys; + } + } + + ICollection IDictionary.Values { + get { + EnsureDictionary (); + IList values = new List (); + + foreach (KeyValuePair entry in + object_list) { + values.Add (entry.Value); + } + + return (ICollection) values; + } + } + #endregion + + + + #region IJsonWrapper Properties + bool IJsonWrapper.IsArray { + get { return IsArray; } + } + + bool IJsonWrapper.IsBoolean { + get { return IsBoolean; } + } + + bool IJsonWrapper.IsDouble { + get { return IsDouble; } + } + + bool IJsonWrapper.IsInt { + get { return IsInt; } + } + + bool IJsonWrapper.IsLong { + get { return IsLong; } + } + + bool IJsonWrapper.IsObject { + get { return IsObject; } + } + + bool IJsonWrapper.IsString { + get { return IsString; } + } + #endregion + + + #region IList Properties + bool IList.IsFixedSize { + get { + return EnsureList ().IsFixedSize; + } + } + + bool IList.IsReadOnly { + get { + return EnsureList ().IsReadOnly; + } + } + #endregion + + + #region IDictionary Indexer + object IDictionary.this[object key] { + get { + return EnsureDictionary ()[key]; + } + + set { + if (! (key is String)) + throw new ArgumentException ( + "The key has to be a string"); + + JsonData data = ToJsonData (value); + + this[(string) key] = data; + } + } + #endregion + + + #region IOrderedDictionary Indexer + object IOrderedDictionary.this[int idx] { + get { + EnsureDictionary (); + return object_list[idx].Value; + } + + set { + EnsureDictionary (); + JsonData data = ToJsonData (value); + + KeyValuePair old_entry = object_list[idx]; + + inst_object[old_entry.Key] = data; + + KeyValuePair entry = + new KeyValuePair (old_entry.Key, data); + + object_list[idx] = entry; + } + } + #endregion + + + #region IList Indexer + object IList.this[int index] { + get { + return EnsureList ()[index]; + } + + set { + EnsureList (); + JsonData data = ToJsonData (value); + + this[index] = data; + } + } + #endregion + + + #region Public Indexers + public JsonData this[string prop_name] { + get { + EnsureDictionary (); + return inst_object[prop_name]; + } + + set { + EnsureDictionary (); + + KeyValuePair entry = + new KeyValuePair (prop_name, value); + + if (inst_object.ContainsKey (prop_name)) { + for (int i = 0; i < object_list.Count; i++) { + if (object_list[i].Key == prop_name) { + object_list[i] = entry; + break; + } + } + } else + object_list.Add (entry); + + inst_object[prop_name] = value; + + json = null; + } + } + + public JsonData this[int index] { + get { + EnsureCollection (); + + if (type == JsonType.Array) + return inst_array[index]; + + return object_list[index].Value; + } + + set { + EnsureCollection (); + + if (type == JsonType.Array) + inst_array[index] = value; + else { + KeyValuePair entry = object_list[index]; + KeyValuePair new_entry = + new KeyValuePair (entry.Key, value); + + object_list[index] = new_entry; + inst_object[entry.Key] = value; + } + + json = null; + } + } + #endregion + + + #region Constructors + public JsonData () + { + } + + public JsonData (bool boolean) + { + type = JsonType.Boolean; + inst_boolean = boolean; + } + + public JsonData (double number) + { + type = JsonType.Double; + inst_double = number; + } + + public JsonData (int number) + { + type = JsonType.Int; + inst_int = number; + } + + public JsonData (long number) + { + type = JsonType.Long; + inst_long = number; + } + + public JsonData (object obj) + { + if (obj is Boolean) { + type = JsonType.Boolean; + inst_boolean = (bool) obj; + return; + } + + if (obj is Double) { + type = JsonType.Double; + inst_double = (double) obj; + return; + } + + if (obj is Int32) { + type = JsonType.Int; + inst_int = (int) obj; + return; + } + + if (obj is Int64) { + type = JsonType.Long; + inst_long = (long) obj; + return; + } + + if (obj is String) { + type = JsonType.String; + inst_string = (string) obj; + return; + } + + throw new ArgumentException ( + "Unable to wrap the given object with JsonData"); + } + + public JsonData (string str) + { + type = JsonType.String; + inst_string = str; + } + #endregion + + + #region Implicit Conversions + public static implicit operator JsonData (Boolean data) + { + return new JsonData (data); + } + + public static implicit operator JsonData (Double data) + { + return new JsonData (data); + } + + public static implicit operator JsonData (Int32 data) + { + return new JsonData (data); + } + + public static implicit operator JsonData (Int64 data) + { + return new JsonData (data); + } + + public static implicit operator JsonData (String data) + { + return new JsonData (data); + } + #endregion + + + #region Explicit Conversions + public static explicit operator Boolean (JsonData data) + { + if (data.type != JsonType.Boolean) + throw new InvalidCastException ( + "Instance of JsonData doesn't hold a double"); + + return data.inst_boolean; + } + + public static explicit operator Double (JsonData data) + { + if (data.type != JsonType.Double) + throw new InvalidCastException ( + "Instance of JsonData doesn't hold a double"); + + return data.inst_double; + } + + public static explicit operator Int32 (JsonData data) + { + if (data.type != JsonType.Int && data.type != JsonType.Long) + { + throw new InvalidCastException ( + "Instance of JsonData doesn't hold an int"); + } + + // cast may truncate data... but that's up to the user to consider + return data.type == JsonType.Int ? data.inst_int : (int)data.inst_long; + } + + public static explicit operator Int64 (JsonData data) + { + if (data.type != JsonType.Long && data.type != JsonType.Int) + { + throw new InvalidCastException ( + "Instance of JsonData doesn't hold a long"); + } + + return data.type == JsonType.Long ? data.inst_long : data.inst_int; + } + + public static explicit operator String (JsonData data) + { + if (data.type != JsonType.String) + throw new InvalidCastException ( + "Instance of JsonData doesn't hold a string"); + + return data.inst_string; + } + #endregion + + + #region ICollection Methods + void ICollection.CopyTo (Array array, int index) + { + EnsureCollection ().CopyTo (array, index); + } + #endregion + + + #region IDictionary Methods + void IDictionary.Add (object key, object value) + { + JsonData data = ToJsonData (value); + + EnsureDictionary ().Add (key, data); + + KeyValuePair entry = + new KeyValuePair ((string) key, data); + object_list.Add (entry); + + json = null; + } + + void IDictionary.Clear () + { + EnsureDictionary ().Clear (); + object_list.Clear (); + json = null; + } + + bool IDictionary.Contains (object key) + { + return EnsureDictionary ().Contains (key); + } + + IDictionaryEnumerator IDictionary.GetEnumerator () + { + return ((IOrderedDictionary) this).GetEnumerator (); + } + + void IDictionary.Remove (object key) + { + EnsureDictionary ().Remove (key); + + for (int i = 0; i < object_list.Count; i++) { + if (object_list[i].Key == (string) key) { + object_list.RemoveAt (i); + break; + } + } + + json = null; + } + #endregion + + + #region IEnumerable Methods + IEnumerator IEnumerable.GetEnumerator () + { + return EnsureCollection ().GetEnumerator (); + } + #endregion + + + #region IJsonWrapper Methods + bool IJsonWrapper.GetBoolean () + { + if (type != JsonType.Boolean) + throw new InvalidOperationException ( + "JsonData instance doesn't hold a boolean"); + + return inst_boolean; + } + + double IJsonWrapper.GetDouble () + { + if (type != JsonType.Double) + throw new InvalidOperationException ( + "JsonData instance doesn't hold a double"); + + return inst_double; + } + + int IJsonWrapper.GetInt () + { + if (type != JsonType.Int) + throw new InvalidOperationException ( + "JsonData instance doesn't hold an int"); + + return inst_int; + } + + long IJsonWrapper.GetLong () + { + if (type != JsonType.Long) + throw new InvalidOperationException ( + "JsonData instance doesn't hold a long"); + + return inst_long; + } + + string IJsonWrapper.GetString () + { + if (type != JsonType.String) + throw new InvalidOperationException ( + "JsonData instance doesn't hold a string"); + + return inst_string; + } + + void IJsonWrapper.SetBoolean (bool val) + { + type = JsonType.Boolean; + inst_boolean = val; + json = null; + } + + void IJsonWrapper.SetDouble (double val) + { + type = JsonType.Double; + inst_double = val; + json = null; + } + + void IJsonWrapper.SetInt (int val) + { + type = JsonType.Int; + inst_int = val; + json = null; + } + + void IJsonWrapper.SetLong (long val) + { + type = JsonType.Long; + inst_long = val; + json = null; + } + + void IJsonWrapper.SetString (string val) + { + type = JsonType.String; + inst_string = val; + json = null; + } + + string IJsonWrapper.ToJson () + { + return ToJson (); + } + + void IJsonWrapper.ToJson (JsonWriter writer) + { + ToJson (writer); + } + #endregion + + + #region IList Methods + int IList.Add (object value) + { + return Add (value); + } + + void IList.Clear () + { + EnsureList ().Clear (); + json = null; + } + + bool IList.Contains (object value) + { + return EnsureList ().Contains (value); + } + + int IList.IndexOf (object value) + { + return EnsureList ().IndexOf (value); + } + + void IList.Insert (int index, object value) + { + EnsureList ().Insert (index, value); + json = null; + } + + void IList.Remove (object value) + { + EnsureList ().Remove (value); + json = null; + } + + void IList.RemoveAt (int index) + { + EnsureList ().RemoveAt (index); + json = null; + } + #endregion + + + #region IOrderedDictionary Methods + IDictionaryEnumerator IOrderedDictionary.GetEnumerator () + { + EnsureDictionary (); + + return new OrderedDictionaryEnumerator ( + object_list.GetEnumerator ()); + } + + void IOrderedDictionary.Insert (int idx, object key, object value) + { + string property = (string) key; + JsonData data = ToJsonData (value); + + this[property] = data; + + KeyValuePair entry = + new KeyValuePair (property, data); + + object_list.Insert (idx, entry); + } + + void IOrderedDictionary.RemoveAt (int idx) + { + EnsureDictionary (); + + inst_object.Remove (object_list[idx].Key); + object_list.RemoveAt (idx); + } + #endregion + + + #region Private Methods + private ICollection EnsureCollection () + { + if (type == JsonType.Array) + return (ICollection) inst_array; + + if (type == JsonType.Object) + return (ICollection) inst_object; + + throw new InvalidOperationException ( + "The JsonData instance has to be initialized first"); + } + + private IDictionary EnsureDictionary () + { + if (type == JsonType.Object) + return (IDictionary) inst_object; + + if (type != JsonType.None) + throw new InvalidOperationException ( + "Instance of JsonData is not a dictionary"); + + type = JsonType.Object; + inst_object = new Dictionary (); + object_list = new List> (); + + return (IDictionary) inst_object; + } + + private IList EnsureList () + { + if (type == JsonType.Array) + return (IList) inst_array; + + if (type != JsonType.None) + throw new InvalidOperationException ( + "Instance of JsonData is not a list"); + + type = JsonType.Array; + inst_array = new List (); + + return (IList) inst_array; + } + + private JsonData ToJsonData (object obj) + { + if (obj == null) + return null; + + if (obj is JsonData) + return (JsonData) obj; + + return new JsonData (obj); + } + + private static void WriteJson (IJsonWrapper obj, JsonWriter writer) + { + if (obj == null) { + writer.Write (null); + return; + } + + if (obj.IsString) { + writer.Write (obj.GetString ()); + return; + } + + if (obj.IsBoolean) { + writer.Write (obj.GetBoolean ()); + return; + } + + if (obj.IsDouble) { + writer.Write (obj.GetDouble ()); + return; + } + + if (obj.IsInt) { + writer.Write (obj.GetInt ()); + return; + } + + if (obj.IsLong) { + writer.Write (obj.GetLong ()); + return; + } + + if (obj.IsArray) { + writer.WriteArrayStart (); + foreach (object elem in (IList) obj) + WriteJson ((JsonData) elem, writer); + writer.WriteArrayEnd (); + + return; + } + + if (obj.IsObject) { + writer.WriteObjectStart (); + + foreach (DictionaryEntry entry in ((IDictionary) obj)) { + writer.WritePropertyName ((string) entry.Key); + WriteJson ((JsonData) entry.Value, writer); + } + writer.WriteObjectEnd (); + + return; + } + } + #endregion + + + public int Add (object value) + { + JsonData data = ToJsonData (value); + + json = null; + + return EnsureList ().Add (data); + } + + public bool Remove(object obj) + { + json = null; + if(IsObject) + { + JsonData value = null; + if (inst_object.TryGetValue((string)obj, out value)) + return inst_object.Remove((string)obj) && object_list.Remove(new KeyValuePair((string)obj, value)); + else + throw new KeyNotFoundException("The specified key was not found in the JsonData object."); + } + if(IsArray) + { + return inst_array.Remove(ToJsonData(obj)); + } + throw new InvalidOperationException ( + "Instance of JsonData is not an object or a list."); + } + + public void Clear () + { + if (IsObject) { + ((IDictionary) this).Clear (); + return; + } + + if (IsArray) { + ((IList) this).Clear (); + return; + } + } + + public bool Equals (JsonData x) + { + if (x == null) + return false; + + if (x.type != this.type) + { + // further check to see if this is a long to int comparison + if ((x.type != JsonType.Int && x.type != JsonType.Long) + || (this.type != JsonType.Int && this.type != JsonType.Long)) + { + return false; + } + } + + switch (this.type) { + case JsonType.None: + return true; + + case JsonType.Object: + return this.inst_object.Equals (x.inst_object); + + case JsonType.Array: + return this.inst_array.Equals (x.inst_array); + + case JsonType.String: + return this.inst_string.Equals (x.inst_string); + + case JsonType.Int: + { + if (x.IsLong) + { + if (x.inst_long < Int32.MinValue || x.inst_long > Int32.MaxValue) + return false; + return this.inst_int.Equals((int)x.inst_long); + } + return this.inst_int.Equals (x.inst_int); + } + + case JsonType.Long: + { + if (x.IsInt) + { + if (this.inst_long < Int32.MinValue || this.inst_long > Int32.MaxValue) + return false; + return x.inst_int.Equals((int)this.inst_long); + } + return this.inst_long.Equals (x.inst_long); + } + + case JsonType.Double: + return this.inst_double.Equals (x.inst_double); + + case JsonType.Boolean: + return this.inst_boolean.Equals (x.inst_boolean); + } + + return false; + } + + public JsonType GetJsonType () + { + return type; + } + + public void SetJsonType (JsonType type) + { + if (this.type == type) + return; + + switch (type) { + case JsonType.None: + break; + + case JsonType.Object: + inst_object = new Dictionary (); + object_list = new List> (); + break; + + case JsonType.Array: + inst_array = new List (); + break; + + case JsonType.String: + inst_string = default (String); + break; + + case JsonType.Int: + inst_int = default (Int32); + break; + + case JsonType.Long: + inst_long = default (Int64); + break; + + case JsonType.Double: + inst_double = default (Double); + break; + + case JsonType.Boolean: + inst_boolean = default (Boolean); + break; + } + + this.type = type; + } + + public string ToJson () + { + if (json != null) + return json; + + StringWriter sw = new StringWriter (); + JsonWriter writer = new JsonWriter (sw); + writer.Validate = false; + + WriteJson (this, writer); + json = sw.ToString (); + + return json; + } + + public void ToJson (JsonWriter writer) + { + bool old_validate = writer.Validate; + + writer.Validate = false; + + WriteJson (this, writer); + + writer.Validate = old_validate; + } + + public override string ToString () + { + switch (type) { + case JsonType.Array: + return "JsonData array"; + + case JsonType.Boolean: + return inst_boolean.ToString (); + + case JsonType.Double: + return inst_double.ToString (); + + case JsonType.Int: + return inst_int.ToString (); + + case JsonType.Long: + return inst_long.ToString (); + + case JsonType.Object: + return "JsonData object"; + + case JsonType.String: + return inst_string; + } + + return "Uninitialized JsonData"; + } + } + + + internal class OrderedDictionaryEnumerator : IDictionaryEnumerator + { + IEnumerator> list_enumerator; + + + public object Current { + get { return Entry; } + } + + public DictionaryEntry Entry { + get { + KeyValuePair curr = list_enumerator.Current; + return new DictionaryEntry(curr.Key, curr.Value); + } + } + + public object Key { + get { return list_enumerator.Current.Key; } + } + + public object Value { + get { return list_enumerator.Current.Value; } + } + + + public OrderedDictionaryEnumerator ( + IEnumerator> enumerator) + { + list_enumerator = enumerator; + } + + + public bool MoveNext () + { + return list_enumerator.MoveNext (); + } + + public void Reset () + { + list_enumerator.Reset (); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs.meta new file mode 100644 index 00000000..0b409d57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c970b3eb05a754649a5955b508c44965 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonData.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs new file mode 100644 index 00000000..b583bff5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs @@ -0,0 +1,60 @@ +#region Header +/** + * JsonException.cs + * Base class throwed by LitJSON when a parsing error occurs. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; + + +namespace Best.HTTP.JSON.LitJson +{ + public class JsonException : Exception + { + public JsonException () : base () + { + } + + internal JsonException (ParserToken token) : + base (String.Format ( + "Invalid token '{0}' in input string", token)) + { + } + + internal JsonException (ParserToken token, + Exception inner_exception) : + base (String.Format ( + "Invalid token '{0}' in input string", token), + inner_exception) + { + } + + internal JsonException (int c) : + base (String.Format ( + "Invalid character '{0}' in input string", (char) c)) + { + } + + internal JsonException (int c, Exception inner_exception) : + base (String.Format ( + "Invalid character '{0}' in input string", (char) c), + inner_exception) + { + } + + + public JsonException (string message) : base (message) + { + } + + public JsonException (string message, Exception inner_exception) : + base (message, inner_exception) + { + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs.meta new file mode 100644 index 00000000..0623a801 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 38d52ffffed49c84cafd90e1e233bf9e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonException.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs new file mode 100644 index 00000000..40abe94a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs @@ -0,0 +1,1341 @@ +#region Header +/** + * JsonMapper.cs + * JSON to .Net object and object to JSON conversions. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using Best.HTTP.Shared.PlatformSupport.Threading; + +using System; +using System.Collections; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Globalization; +using System.IO; +using System.Reflection; +using System.Threading; + + +namespace Best.HTTP.JSON.LitJson +{ + public interface IFastSetter + { + void SetBool(ReadOnlySpan property, bool value); + void SetInteger(ReadOnlySpan property, long value); + void SetDouble(ReadOnlySpan property, double value); + void SetOther(ReadOnlySpan property, object value); + } + + class ReadOnlyMemoryCharEqualityComparer : IEqualityComparer> + { + public static ReadOnlyMemoryCharEqualityComparer Comparer = new ReadOnlyMemoryCharEqualityComparer(); + + public bool Equals(ReadOnlyMemory x, ReadOnlyMemory y) + { + var eq = MemoryExtensions.Equals(x.Span, y.Span, StringComparison.OrdinalIgnoreCase); + return eq; + } + + public int GetHashCode(ReadOnlyMemory obj) + { + HashCode hash = new HashCode(); + + for (int i = 0; i < obj.Length; ++i) + hash.Add(Char.ToLowerInvariant(obj.Span[i])); + + return hash.ToHashCode(); + } + } + + internal struct PropertyMetadata + { + public MemberInfo Info; + public bool IsField; + public Type Type; + } + + + internal struct ArrayMetadata + { + private Type element_type; + private bool is_array; + private bool is_list; + + + public Type ElementType + { + get + { + if (element_type == null) + return typeof (JsonData); + + return element_type; + } + + set { element_type = value; } + } + + public bool IsArray + { + get { return is_array; } + set { is_array = value; } + } + + public bool IsList + { + get { return is_list; } + set { is_list = value; } + } + } + + + internal struct ObjectMetadata + { + private Type element_type; + private bool is_dictionary; + + private IDictionary, PropertyMetadata> properties; + + + public Type ElementType + { + get + { + if (element_type == null) + return typeof (JsonData); + + return element_type; + } + + set { element_type = value; } + } + + public bool IsDictionary + { + get { return is_dictionary; } + set { is_dictionary = value; } + } + + public IDictionary, PropertyMetadata> Properties + { + get { return properties; } + set { properties = value; } + } + } + + + internal delegate void ExporterFunc (object obj, JsonWriter writer); + public delegate void ExporterFunc (T obj, JsonWriter writer); + + internal delegate object ImporterFunc (object input); + public delegate TValue ImporterFunc (TJson input); + + public delegate IJsonWrapper WrapperFactory (); + + + public sealed class JsonMapper + { + #region Fields + private static readonly int max_nesting_depth; + + private static readonly IFormatProvider datetime_format; + + private static readonly IDictionary base_exporters_table; + private static readonly IDictionary custom_exporters_table; + + private static readonly IDictionary> base_importers_table; + private static readonly IDictionary> custom_importers_table; + + private static readonly IDictionary array_metadata; + private static readonly ReaderWriterLockSlim array_metadata_lock = new(); + + private static readonly IDictionary> conv_ops; + private static readonly ReaderWriterLockSlim conv_ops_lock = new(); + + private static readonly IDictionary object_metadata; + private static readonly ReaderWriterLockSlim object_metadata_lock = new(); + + private static readonly IDictionary> type_properties; + private static readonly ReaderWriterLockSlim type_properties_lock = new(); + + [ThreadStatic] + private static JsonWriter static_writer; + + private static ConcurrentStack _readerPool = new ConcurrentStack(); + + private static ConcurrentDictionary, string> _stringInstanceCache = new ConcurrentDictionary, string>(ReadOnlyMemoryCharEqualityComparer.Comparer); + + [ThreadStatic] + private static char[] _tmpProperty; + + private static Type int_type; + private static Type long_type; + private static Type ulong_type; + private static Type bool_type; + private static Type double_type; + private static Type string_type; + private static Type nullable_type; + #endregion + + + #region Constructors + static JsonMapper () + { + max_nesting_depth = 100; + + array_metadata = new Dictionary (); + conv_ops = new Dictionary>(); + object_metadata = new Dictionary (); + type_properties = new Dictionary>(); + + datetime_format = DateTimeFormatInfo.InvariantInfo; + + base_exporters_table = new Dictionary (); + custom_exporters_table = new Dictionary (); + + base_importers_table = new Dictionary> (); + custom_importers_table = new Dictionary> (); + + int_type = typeof(int); + long_type = typeof(long); + ulong_type = typeof(ulong); + bool_type = typeof(bool); + double_type = typeof(double); + string_type = typeof(string); + nullable_type = typeof(Nullable<>); + + RegisterBaseExporters (); + RegisterBaseImporters (); + } + #endregion + + #region Private Helper Mehtods + + private static bool HasInterface(Type type, string name) + { +#if NET_4_6 + Type[] interfaces = type.GetInterfaces(); + foreach (var iface in interfaces) + { + if (iface.FullName.Equals(name, StringComparison.OrdinalIgnoreCase)) + return true; + } + + return false; +#else + return type.GetInterface(name, true) != null; +#endif + } + + public static PropertyInfo[] GetPublicInstanceProperties(Type type) + { + return type.GetProperties(); + } + + #endregion + + #region Private Methods + private static ArrayMetadata AddArrayMetadata(Type type) + { + ArrayMetadata data = default; + if (array_metadata.TryGetValue(type, out data)) + return data; + + data = new ArrayMetadata(); + + data.IsArray = type.IsArray; + data.IsList = HasInterface(type, "System.Collections.IList"); + + foreach (PropertyInfo p_info in GetPublicInstanceProperties(type)) + { + if (p_info.Name != "Item") + continue; + + ParameterInfo[] parameters = p_info.GetIndexParameters (); + + if (parameters.Length != 1) + continue; + + if (parameters[0].ParameterType == int_type) + data.ElementType = p_info.PropertyType; + } + + using (new WriteLock(array_metadata_lock)) + { + try + { + array_metadata.Add (type, data); + } + catch (ArgumentException) + { + // ?? + } + } + + return data; + } + + private static ObjectMetadata AddObjectMetadata(Type type) + { + ObjectMetadata data; + if (object_metadata.TryGetValue(type, out data)) + return data; + + data = new ObjectMetadata(); + data.IsDictionary = HasInterface(type, "System.Collections.IDictionary"); + + data.Properties = new Dictionary, PropertyMetadata>(ReadOnlyMemoryCharEqualityComparer.Comparer); + + foreach (PropertyInfo p_info in GetPublicInstanceProperties(type)) + { + if (p_info.Name == "Item") + { + ParameterInfo[] parameters = p_info.GetIndexParameters (); + + if (parameters.Length != 1) + continue; + + if (parameters[0].ParameterType == string_type) + data.ElementType = p_info.PropertyType; + + continue; + } + + PropertyMetadata p_data = new PropertyMetadata (); + p_data.Info = p_info; + p_data.Type = p_info.PropertyType; + + data.Properties.Add(p_info.Name.AsMemory(), p_data); + } + + foreach (FieldInfo f_info in type.GetFields()) + { + if (!data.Properties.TryGetValue(f_info.Name.AsMemory(), out var p_data)) + { + p_data = new PropertyMetadata(); + p_data.Info = f_info; + p_data.IsField = true; + p_data.Type = f_info.FieldType; + + data.Properties.Add(f_info.Name.AsMemory(), p_data); + } + } + + using (new WriteLock(object_metadata_lock)) + { + try + { + object_metadata.Add (type, data); + } + catch (ArgumentException) + { + // ?? + } + } + + return data; + } + + private static List AddTypeProperties(Type type) + { + List props; + if (type_properties.TryGetValue(type, out props)) + return props; + + props = new List(); + + foreach (PropertyInfo p_info in GetPublicInstanceProperties(type)) + { + if (p_info.Name == "Item") + continue; + + PropertyMetadata p_data = new PropertyMetadata (); + p_data.Info = p_info; + p_data.IsField = false; + props.Add (p_data); + } + + foreach (FieldInfo f_info in type.GetFields()) + { + PropertyMetadata p_data = new PropertyMetadata (); + p_data.Info = f_info; + p_data.IsField = true; + + props.Add (p_data); + } + + using (new WriteLock(type_properties_lock)) + { + try + { + type_properties.Add (type, props); + } + catch (ArgumentException) + { + // ?? + } + } + + return props; + } + + private static MethodInfo GetConvOp (Type t1, Type t2) + { + Dictionary ops; + using (new WriteLock(conv_ops_lock)) + { + if (!conv_ops.TryGetValue(t1, out ops)) + conv_ops.Add(t1, ops = new Dictionary()); + } + + MethodInfo op; + if (conv_ops[t1].TryGetValue(t2, out op)) + return op; + + op = t1.GetMethod("op_Implicit", new Type[] { t2 }); + + using (new WriteLock(conv_ops_lock)) + { + try + { + conv_ops[t1].Add (t2, op); + } + catch (ArgumentException) + { + return conv_ops[t1][t2]; + } + } + + return op; + } + + private static bool TryReadInt(Type inst_type, JsonReader reader, out int value) + { + value = 0; + + if (reader.Token != JsonToken.Int) + return false; + + value = reader.ValueInt; + return true; + } + + private static bool TryReadLong(Type inst_type, JsonReader reader, out long value) + { + value = 0; + + if (reader.Token != JsonToken.Long) + return false; + + value = reader.ValueLong; + return true; + } + + private static bool TryReadULong(Type inst_type, JsonReader reader, out ulong value) + { + value = 0; + + if (reader.Token != JsonToken.ULong) + return false; + + value = reader.ValueULong; + return true; + } + + private static bool TryReadDouble(Type inst_type, JsonReader reader, out double value) + { + value = 0; + + if (reader.Token != JsonToken.Double) + return false; + + value = reader.ValueDouble; + return true; + } + + private static bool TryReadBool(Type inst_type, JsonReader reader, out bool value) + { + value = false; + + if (reader.Token != JsonToken.Boolean) + return false; + + value = reader.ValueBool; + return true; + } + + private static unsafe object ReadValue(Type inst_type, JsonReader reader, bool skipRead = false) + { + if (!skipRead) + reader.Read (); + + if (reader.Token == JsonToken.ArrayEnd) + return null; + + Type underlying_type = inst_type.IsGenericType && inst_type.GetGenericTypeDefinition() == nullable_type ? Nullable.GetUnderlyingType(inst_type) : null; + Type value_type = underlying_type ?? inst_type; + + if (reader.Token == JsonToken.Null) + { + if (inst_type.IsClass || underlying_type != null) + return null; + + throw new JsonException(String.Format( + "Can't assign null to an instance of type {0}", + inst_type)); + } + + if (reader.Token == JsonToken.Double || + reader.Token == JsonToken.Int || + reader.Token == JsonToken.Long || + reader.Token == JsonToken.ULong || + reader.Token == JsonToken.String || + reader.Token == JsonToken.Boolean) + { + object value = null; + Type json_type = null;// reader.Value.GetType(); + switch (reader.Token) + { + case JsonToken.Int: json_type = int_type; value = reader.ValueInt; break; + case JsonToken.Long: json_type = long_type; value = reader.ValueLong; break; + case JsonToken.ULong: json_type = ulong_type; value = reader.ValueULong; break; + case JsonToken.Boolean: json_type = bool_type; value = reader.ValueBool; break; + case JsonToken.Double: json_type = double_type; value = reader.ValueDouble; break; + case JsonToken.String: json_type = string_type; value = GetStringInstance(reader.ValueString); break; + } + + if (value_type.IsAssignableFrom(json_type)) + return value; + + // If there's a custom importer that fits, use it + if (custom_importers_table.TryGetValue(json_type, out var typeTable) && + typeTable.TryGetValue(value_type, out var cutomImporter)) + { + return cutomImporter(value); + } + + // Maybe there's a base importer that works + if (base_importers_table.TryGetValue(json_type, out var importersTable) && + importersTable.TryGetValue(value_type, out var importersImporter)) + { + return importersImporter(value); + } + + // Maybe it's an enum + if (value_type.IsEnum) + { + if (reader.Token == JsonToken.String) + return Enum.Parse(value_type, value.ToString(), true); + + return Enum.ToObject(value_type, value); + } + + // Try using an implicit conversion operator + MethodInfo conv_op = GetConvOp (value_type, json_type); + + if (conv_op != null) + return conv_op.Invoke(null, new object[] { value }); + + // No luck + throw new JsonException($"Can't assign value '{value}' (type {json_type}) to type {inst_type}"); + } + + object instance = null; + + if (reader.Token == JsonToken.ArrayStart) + { + + //if (inst_type.FullName == "System.Object") + if (inst_type == typeof(System.Object)) + inst_type = typeof(object[]); + + ArrayMetadata t_data = AddArrayMetadata(inst_type); + + if (! t_data.IsArray && ! t_data.IsList) + throw new JsonException (String.Format ( + "Type {0} can't act as an array", + inst_type)); + + IList list; + Type elem_type; + + if (!t_data.IsArray) + { + //list = (IList)Activator.CreateInstance(inst_type); + list = (IList)GetInstance(inst_type); + elem_type = t_data.ElementType; + } + else + { + list = new System.Collections.Generic.List(); + elem_type = inst_type.GetElementType (); + } + + list.Clear(); + + while (true) + { + object item = ReadValue (elem_type, reader); + if (item == null && reader.Token == JsonToken.ArrayEnd) + break; + + list.Add (item); + } + + if (t_data.IsArray) + { + int n = list.Count; + instance = Array.CreateInstance (elem_type, n); + + for (int i = 0; i < n; i++) + ((Array) instance).SetValue (list[i], i); + } + else + instance = list; + + } + else if (reader.Token == JsonToken.ObjectStart) + { + + if (inst_type == typeof(System.Object)) + value_type = inst_type = typeof(Dictionary); + + ObjectMetadata t_data = AddObjectMetadata(value_type); + + //instance = Activator.CreateInstance(value_type); + instance = GetInstance(value_type); + var fastSetter = instance as IFastSetter; + + while (true) + { + reader.Read (); + + if (reader.Token == JsonToken.ObjectEnd) + break; + + if (fastSetter != null) + { + if (_tmpProperty == null || _tmpProperty.Length < reader.ValueString.Length) + _tmpProperty = new char[reader.ValueString.Length]; + + reader.ValueString.CopyTo(_tmpProperty); + + Span prop = stackalloc char[reader.ValueString.Length]; + _tmpProperty.AsSpan(0, reader.ValueString.Length).CopyTo(prop); + + reader.Read(); + + switch (reader.Token) + { + case JsonToken.Int: + if (TryReadInt(inst_type, reader, out var value_int)) + fastSetter.SetInteger(prop, value_int); + break; + + case JsonToken.Long: + if (TryReadLong(inst_type, reader, out var value_long)) + fastSetter.SetInteger(prop, value_long); + break; + + case JsonToken.ULong: + if (TryReadULong(inst_type, reader, out var value_ulong)) + { + if (value_ulong > (ulong)long.MaxValue) + throw new JsonException($"Can't call SetInteger for property '{new string(prop)}', because value_long({value_ulong}) is larger than long.MaxValue!"); + + fastSetter.SetInteger(prop, (long)value_ulong); + } + break; + + case JsonToken.Double: + if (TryReadDouble(inst_type, reader, out var value_double)) + fastSetter.SetDouble(prop, value_double); + break; + + case JsonToken.Boolean: + if (TryReadBool(inst_type, reader, out var value_bool)) + fastSetter.SetBool(prop, value_bool); + break; + + case JsonToken.ObjectStart: + reader.Read(); + goto default; + + default: + if (t_data.Properties.TryGetValue(_tmpProperty.AsMemory(0, prop.Length), out var prop_meta_data)) + { + fastSetter.SetOther(prop, ReadValue(prop_meta_data.Type, reader, reader.Token != JsonToken.ObjectStart)); + } + else + ReadSkip(reader); + + break; + } + } + else if (!t_data.IsDictionary && t_data.Properties.TryGetValue(reader.ValueString, out var prop_data)) + { + try + { + if (prop_data.IsField) + { + ((FieldInfo)prop_data.Info).SetValue( + instance, ReadValue(prop_data.Type, reader)); + } + else + { + PropertyInfo p_info = + (PropertyInfo)prop_data.Info; + + if (p_info.CanWrite) + p_info.SetValue( + instance, + ReadValue(prop_data.Type, reader), + null); + else + ReadValue(prop_data.Type, reader); + } + } + catch(JsonException ex) + { + throw new JsonException($"While parsing property '{new string(reader.ValueString.Span)}': {ex.Message}"); + } + + } + else + { + if (!t_data.IsDictionary) + { + + if (!reader.SkipNonMembers) + { + throw new JsonException (String.Format ( + "The type {0} doesn't have the " + + "property '{1}'", + inst_type, new string(reader.ValueString.Span))); + } + else + { + ReadSkip (reader); + continue; + } + } + + try + { + ((IDictionary)instance).Add( + GetStringInstance(reader.ValueString), ReadValue( + t_data.ElementType, reader)); + } + catch (JsonException ex) + { + throw new JsonException($"While parsing property '{new string(reader.ValueString.Span)}': {ex.Message}"); + } + } + + } + + } + + return instance; + } + + private static IJsonWrapper ReadValue (WrapperFactory factory, + JsonReader reader) + { + reader.Read (); + + if (reader.Token == JsonToken.ArrayEnd || + reader.Token == JsonToken.Null) + return null; + + IJsonWrapper instance = factory?.Invoke(); + + if (reader.Token == JsonToken.String) + { + instance?.SetString(new string(reader.ValueString.Span)); + return instance; + } + + if (reader.Token == JsonToken.Double) + { + instance?.SetDouble(reader.ValueDouble); + return instance; + } + + if (reader.Token == JsonToken.Int) + { + instance?.SetInt(reader.ValueInt); + return instance; + } + + if (reader.Token == JsonToken.Long) + { + instance?.SetLong(reader.ValueLong); + return instance; + } + + if (reader.Token == JsonToken.Boolean) + { + instance?.SetBoolean(reader.ValueBool); + return instance; + } + + if (reader.Token == JsonToken.ArrayStart) + { + instance?.SetJsonType(JsonType.Array); + + while (true) + { + IJsonWrapper item = ReadValue (factory, reader); + if (item == null && reader.Token == JsonToken.ArrayEnd) + break; + + if (instance != null) + ((IList) instance).Add (item); + } + } + else if (reader.Token == JsonToken.ObjectStart) + { + instance?.SetJsonType(JsonType.Object); + + while (true) + { + reader.Read (); + + if (reader.Token == JsonToken.ObjectEnd) + break; + + string property = new string(reader.ValueString.Span); + + if (instance != null) + ((IDictionary)instance)[property] = ReadValue(factory, reader); + } + + } + + return instance; + } + + private static void ReadSkip (JsonReader reader) + { + ToWrapper(null, reader); + } + + private static void RegisterBaseExporters () + { + base_exporters_table[typeof (byte)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToInt32 ((byte) obj)); + }; + + base_exporters_table[typeof (char)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToString ((char) obj)); + }; + + base_exporters_table[typeof (DateTime)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToString ((DateTime) obj, + datetime_format)); + }; + + base_exporters_table[typeof (decimal)] = + delegate (object obj, JsonWriter writer) + { + writer.Write ((decimal) obj); + }; + + base_exporters_table[typeof (sbyte)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToInt32 ((sbyte) obj)); + }; + + base_exporters_table[typeof (short)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToInt32 ((short) obj)); + }; + + base_exporters_table[typeof (ushort)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToInt32 ((ushort) obj)); + }; + + base_exporters_table[typeof (uint)] = + delegate (object obj, JsonWriter writer) + { + writer.Write (Convert.ToUInt64 ((uint) obj)); + }; + + base_exporters_table[typeof (ulong)] = + delegate (object obj, JsonWriter writer) + { + writer.Write ((ulong) obj); + }; + + base_exporters_table[typeof(DateTimeOffset)] = + delegate (object obj, JsonWriter writer) + { + writer.Write(((DateTimeOffset)obj).ToString("yyyy-MM-ddTHH:mm:ss.fffffffzzz", datetime_format)); + }; + } + + private static void RegisterBaseImporters () + { + ImporterFunc importer; + + importer = delegate (object input) + { + return Convert.ToByte ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (byte), importer); + + importer = delegate (object input) + { + return Convert.ToUInt64 ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (ulong), importer); + + importer = delegate (object input) + { + return Convert.ToInt64((int)input); + }; + RegisterImporter(base_importers_table, typeof(int), + typeof(long), importer); + + importer = delegate (object input) + { + return Convert.ToSByte ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (sbyte), importer); + + importer = delegate (object input) + { + return Convert.ToInt16 ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (short), importer); + + importer = delegate (object input) + { + return Convert.ToUInt16 ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (ushort), importer); + + importer = delegate (object input) + { + return Convert.ToUInt32 ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (uint), importer); + + importer = delegate (object input) + { + return Convert.ToSingle ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (float), importer); + + importer = delegate (object input) + { + return Convert.ToDouble ((int) input); + }; + RegisterImporter (base_importers_table, typeof (int), + typeof (double), importer); + + importer = delegate (object input) + { + return Convert.ToDecimal ((double) input); + }; + RegisterImporter (base_importers_table, typeof (double), + typeof (decimal), importer); + + importer = delegate (object input) + { + return Convert.ToSingle((double)input); + }; + RegisterImporter(base_importers_table, typeof(double), + typeof(float), importer); + + importer = delegate (object input) + { + return Convert.ToUInt32 ((long) input); + }; + RegisterImporter (base_importers_table, typeof (long), + typeof (uint), importer); + + importer = delegate (object input) + { + return Convert.ToChar ((string) input); + }; + RegisterImporter (base_importers_table, typeof (string), + typeof (char), importer); + + importer = delegate (object input) + { + return Convert.ToDateTime ((string) input, datetime_format); + }; + RegisterImporter (base_importers_table, typeof (string), + typeof (DateTime), importer); + + importer = delegate (object input) + { + return DateTimeOffset.Parse((string)input, datetime_format); + }; + RegisterImporter(base_importers_table, typeof(string), + typeof(DateTimeOffset), importer); + } + + private static void RegisterImporter ( + IDictionary> table, + Type json_type, Type value_type, ImporterFunc importer) + { + if (!table.TryGetValue(json_type, out var importerTable)) + table.Add(json_type, importerTable = new Dictionary()); + + importerTable[value_type] = importer; + } + + private static void WriteValue (object obj, JsonWriter writer, + bool writer_is_private, + int depth) + { + if (depth > max_nesting_depth) + throw new JsonException ( + String.Format ("Max allowed object depth reached while " + + "trying to export from type {0}", + obj.GetType ())); + + if (obj == null) + { + writer.Write (null); + return; + } + + if (obj is IJsonWrapper) + { + if (writer_is_private) + writer.TextWriter.Write (((IJsonWrapper) obj).ToJson ()); + else + ((IJsonWrapper) obj).ToJson (writer); + + return; + } + + if (obj is String) + { + writer.Write ((string) obj); + return; + } + + if (obj is Double) + { + writer.Write ((double) obj); + return; + } + + if (obj is Single) + { + writer.Write((float)obj); + return; + } + + if (obj is Int32) + { + writer.Write ((int) obj); + return; + } + + if (obj is Boolean) + { + writer.Write ((bool) obj); + return; + } + + if (obj is Int64) + { + writer.Write ((long) obj); + return; + } + + if (obj is Array) + { + writer.WriteArrayStart (); + + foreach (object elem in (Array) obj) + WriteValue (elem, writer, writer_is_private, depth + 1); + + writer.WriteArrayEnd (); + + return; + } + + if (obj is IList) + { + writer.WriteArrayStart (); + foreach (object elem in (IList) obj) + WriteValue (elem, writer, writer_is_private, depth + 1); + writer.WriteArrayEnd (); + + return; + } + + var iDictionary = obj as IDictionary; + if (iDictionary != null) + { + writer.WriteObjectStart (); + foreach (DictionaryEntry entity in iDictionary) + { + var propertyName = entity.Key as string ?? Convert.ToString(entity.Key, CultureInfo.InvariantCulture); + writer.WritePropertyName (propertyName); + WriteValue (entity.Value, writer, writer_is_private, + depth + 1); + } + writer.WriteObjectEnd (); + + return; + } + + Type obj_type = obj.GetType (); + + // See if there's a custom exporter for the object + if (custom_exporters_table.TryGetValue(obj_type, out var customExporter)) + { + customExporter(obj, writer); + + return; + } + + // If not, maybe there's a base exporter + if (base_exporters_table.TryGetValue(obj_type, out var baseExporter)) + { + baseExporter(obj, writer); + + return; + } + + // Last option, let's see if it's an enum + if (obj is Enum) + { + Type e_type = Enum.GetUnderlyingType (obj_type); + + if (e_type == long_type + || e_type == typeof (uint) + || e_type == ulong_type) + writer.Write ((ulong) obj); + else + writer.Write ((int) obj); + + return; + } + + // Okay, so it looks like the input should be exported as an + // object + List props = AddTypeProperties(obj_type); + + writer.WriteObjectStart (); + foreach (PropertyMetadata p_data in props) + { + if (p_data.IsField) + { + writer.WritePropertyName (p_data.Info.Name); + WriteValue (((FieldInfo) p_data.Info).GetValue (obj), + writer, writer_is_private, depth + 1); + } + else + { + PropertyInfo p_info = (PropertyInfo) p_data.Info; + + if (p_info.CanRead) + { + writer.WritePropertyName (p_data.Info.Name); + WriteValue (p_info.GetValue (obj, null), + writer, writer_is_private, depth + 1); + } + } + } + writer.WriteObjectEnd (); + } + #endregion + + + public static string ToJson (object obj) + { + static_writer ??= new JsonWriter(); + static_writer.Reset (); + + WriteValue (obj, static_writer, true, 0); + + return static_writer.ToString (); + } + + public static void ToJson (object obj, JsonWriter writer) + { + WriteValue (obj, writer, false, 0); + } + + public static JsonData ToObject (JsonReader reader) + { + return (JsonData) ToWrapper ( + delegate { return new JsonData (); }, reader); + } + + public static object ToObject(Type toType, JsonReader reader) + { + return ReadValue(toType, reader); + } + + public static JsonData ToObject (TextReader reader) + { + JsonReader json_reader = new JsonReader (reader); + + return (JsonData) ToWrapper ( + delegate { return new JsonData (); }, json_reader); + } + + public static JsonData ToObject (string json) + { + return (JsonData) ToWrapper ( + delegate { return new JsonData (); }, json); + } + + public static T ToObject (JsonReader reader) + { + return (T) ReadValue (typeof (T), reader); + } + + public static T ToObject (TextReader reader) + { + JsonReader json_reader = new JsonReader (reader); + + return (T) ReadValue (typeof (T), json_reader); + } + + public static T ToObject (string json) + { + JsonReader reader = null; + if (_readerPool.TryPop(out reader)) + reader.SetJson(json); + else + reader = new JsonReader(json, true); + + try + { + return (T) ReadValue (typeof (T), reader); + } + finally + { + _readerPool.Push(reader); + } + } + + public static object ToObject(Type toType, string json) + { + JsonReader reader = new JsonReader(json); + + return ReadValue(toType, reader); + } + + public static IJsonWrapper ToWrapper (WrapperFactory factory, + JsonReader reader) + { + return ReadValue (factory, reader); + } + + public static IJsonWrapper ToWrapper (WrapperFactory factory, + string json) + { + JsonReader reader = new JsonReader (json); + + return ReadValue (factory, reader); + } + + public static void RegisterExporter (ExporterFunc exporter) + { + ExporterFunc exporter_wrapper = + delegate (object obj, JsonWriter writer) + { + exporter ((T) obj, writer); + }; + + custom_exporters_table[typeof (T)] = exporter_wrapper; + } + + public static void RegisterImporter ( + ImporterFunc importer) + { + ImporterFunc importer_wrapper = + delegate (object input) + { + return importer ((TJson) input); + }; + + RegisterImporter (custom_importers_table, typeof (TJson), + typeof (TValue), importer_wrapper); + } + + private static System.Func _instanceProvider; + public static void RegisterInstanceProvider(System.Func provider) + { + _instanceProvider = provider; + } + + public static void RegisterStringCache(string str) + { + _stringInstanceCache.TryAdd(str.AsMemory(), str); + } + + public static string GetStringInstance(ReadOnlyMemory chars) + { + if (_stringInstanceCache.TryGetValue(chars, out var value)) + return value; + + return new string(chars.Span); + } + + public static object GetInstance(Type type) + { + var provider = _instanceProvider; + object result = null; + + if (provider != null) + result = provider(type); + + if (result == null) + result = Activator.CreateInstance(type); + + return result; + } + + public static void UnregisterExporters () + { + custom_exporters_table.Clear (); + } + + public static void UnregisterImporters () + { + custom_importers_table.Clear (); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs.meta new file mode 100644 index 00000000..e4403844 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 62a878533312d60458cf706654ef9b9e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs new file mode 100644 index 00000000..8b91ac06 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs @@ -0,0 +1,105 @@ +#region Header +/** + * JsonMockWrapper.cs + * Mock object implementing IJsonWrapper, to facilitate actions like + * skipping data more efficiently. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; +using System.Collections; +using System.Collections.Specialized; + + +namespace Best.HTTP.JSON.LitJson +{ + public sealed class JsonMockWrapper : IJsonWrapper + { + public bool IsArray { get { return false; } } + public bool IsBoolean { get { return false; } } + public bool IsDouble { get { return false; } } + public bool IsInt { get { return false; } } + public bool IsLong { get { return false; } } + public bool IsObject { get { return false; } } + public bool IsString { get { return false; } } + + public bool GetBoolean () { return false; } + public double GetDouble () { return 0.0; } + public int GetInt () { return 0; } + public JsonType GetJsonType () { return JsonType.None; } + public long GetLong () { return 0L; } + public string GetString () { return ""; } + + public void SetBoolean (bool val) {} + public void SetDouble (double val) {} + public void SetInt (int val) {} + public void SetJsonType (JsonType type) {} + public void SetLong (long val) {} + public void SetString (string val) {} + + public string ToJson () { return ""; } + public void ToJson (JsonWriter writer) {} + + + bool IList.IsFixedSize { get { return true; } } + bool IList.IsReadOnly { get { return true; } } + + object IList.this[int index] { + get { return null; } + set {} + } + + int IList.Add (object value) { return 0; } + void IList.Clear () {} + bool IList.Contains (object value) { return false; } + int IList.IndexOf (object value) { return -1; } + void IList.Insert (int i, object v) {} + void IList.Remove (object value) {} + void IList.RemoveAt (int index) {} + + + int ICollection.Count { get { return 0; } } + bool ICollection.IsSynchronized { get { return false; } } + object ICollection.SyncRoot { get { return null; } } + + void ICollection.CopyTo (Array array, int index) {} + + + IEnumerator IEnumerable.GetEnumerator () { return null; } + + + bool IDictionary.IsFixedSize { get { return true; } } + bool IDictionary.IsReadOnly { get { return true; } } + + ICollection IDictionary.Keys { get { return null; } } + ICollection IDictionary.Values { get { return null; } } + + object IDictionary.this[object key] { + get { return null; } + set {} + } + + void IDictionary.Add (object k, object v) {} + void IDictionary.Clear () {} + bool IDictionary.Contains (object key) { return false; } + void IDictionary.Remove (object key) {} + + IDictionaryEnumerator IDictionary.GetEnumerator () { return null; } + + + object IOrderedDictionary.this[int idx] { + get { return null; } + set {} + } + + IDictionaryEnumerator IOrderedDictionary.GetEnumerator () { + return null; + } + void IOrderedDictionary.Insert (int i, object k, object v) {} + void IOrderedDictionary.RemoveAt (int i) {} + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs.meta new file mode 100644 index 00000000..a1cc0cba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 66a205f7a30eadc44a1ecf2aa6556081 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonMockWrapper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs new file mode 100644 index 00000000..1c024434 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs @@ -0,0 +1,563 @@ +#region Header +/** + * JsonReader.cs + * Stream-like access to JSON text. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; +using System.Collections.Generic; +using System.Globalization; +using System.IO; + + +namespace Best.HTTP.JSON.LitJson +{ + public enum JsonToken + { + None, + + ObjectStart, + PropertyName, + ObjectEnd, + + ArrayStart, + ArrayEnd, + + Int, + Long, + ULong, + Double, + + String, + + Boolean, + Null + } + + + public sealed class JsonReader + { + #region Fields + private static readonly IDictionary> parse_table; + + private Stack automaton_stack; + private int current_input; + private int current_symbol; + private bool end_of_json; + private bool end_of_input; + private Lexer lexer; + private bool parser_in_string; + private bool parser_return; + private bool read_started; + private TextReader reader; + private bool reader_is_owned; + private bool skip_non_members; + private object token_value; + private JsonToken token; + private bool keep_open; + + private bool token_bool; + private int token_int; + private long token_long; + private ulong token_ulong; + private double token_double; + #endregion + + + #region Public Properties + public bool AllowComments + { + get { return lexer.AllowComments; } + set { lexer.AllowComments = value; } + } + + public bool AllowSingleQuotedStrings + { + get { return lexer.AllowSingleQuotedStrings; } + set { lexer.AllowSingleQuotedStrings = value; } + } + + public bool SkipNonMembers + { + get { return skip_non_members; } + set { skip_non_members = value; } + } + + public bool EndOfInput + { + get { return end_of_input; } + } + + public bool EndOfJson + { + get { return end_of_json; } + } + + public JsonToken Token + { + get { return token; } + } + + public object Value + { + get { return token_value; } + } + + public bool ValueBool { get { return token_bool; } } + public int ValueInt { get { return token_int; } } + public long ValueLong { get { return token_long; } } + public ulong ValueULong { get { return token_ulong; } } + public double ValueDouble { get { return token_double; } } + + public ReadOnlyMemory ValueString; + private char[] _charSeq; + #endregion + + + #region Constructors + static JsonReader () + { + parse_table = PopulateParseTable (); + } + + public JsonReader (string json_text) : + this(new StringReader(json_text), true, false) + { + } + + public JsonReader (TextReader reader) : + this(reader, false, false) + { + } + + public JsonReader(string json_text, bool keep_open) : + this(new StringReader(json_text), true, keep_open) + { + } + + private JsonReader(TextReader reader, bool owned, bool keep_open) + { + if (reader == null) + throw new ArgumentNullException ("reader"); + + parser_in_string = false; + parser_return = false; + + read_started = false; + automaton_stack = new Stack (); + automaton_stack.Push ((int) ParserToken.End); + automaton_stack.Push ((int) ParserToken.Text); + + lexer = new Lexer (reader); + + end_of_input = false; + end_of_json = false; + + skip_non_members = true; + + this.reader = reader; + reader_is_owned = owned; + this.keep_open = keep_open; + } + #endregion + + + #region Static Methods + private static IDictionary> PopulateParseTable () + { + // See section A.2. of the manual for details + IDictionary> parse_table = new Dictionary> (); + + TableAddRow (parse_table, ParserToken.Array); + TableAddCol (parse_table, ParserToken.Array, '[', + '[', + (int) ParserToken.ArrayPrime); + + TableAddRow (parse_table, ParserToken.ArrayPrime); + TableAddCol (parse_table, ParserToken.ArrayPrime, '"', + (int) ParserToken.Value, + + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, '[', + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, ']', + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, '{', + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, (int) ParserToken.Number, + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, (int) ParserToken.True, + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, (int) ParserToken.False, + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + TableAddCol (parse_table, ParserToken.ArrayPrime, (int) ParserToken.Null, + (int) ParserToken.Value, + (int) ParserToken.ValueRest, + ']'); + + TableAddRow (parse_table, ParserToken.Object); + TableAddCol (parse_table, ParserToken.Object, '{', + '{', + (int) ParserToken.ObjectPrime); + + TableAddRow (parse_table, ParserToken.ObjectPrime); + TableAddCol (parse_table, ParserToken.ObjectPrime, '"', + (int) ParserToken.Pair, + (int) ParserToken.PairRest, + '}'); + TableAddCol (parse_table, ParserToken.ObjectPrime, '}', + '}'); + + TableAddRow (parse_table, ParserToken.Pair); + TableAddCol (parse_table, ParserToken.Pair, '"', + (int) ParserToken.String, + ':', + (int) ParserToken.Value); + + TableAddRow (parse_table, ParserToken.PairRest); + TableAddCol (parse_table, ParserToken.PairRest, ',', + ',', + (int) ParserToken.Pair, + (int) ParserToken.PairRest); + TableAddCol (parse_table, ParserToken.PairRest, '}', + (int) ParserToken.Epsilon); + + TableAddRow (parse_table, ParserToken.String); + TableAddCol (parse_table, ParserToken.String, '"', + '"', + (int) ParserToken.CharSeq, + '"'); + + TableAddRow (parse_table, ParserToken.Text); + TableAddCol (parse_table, ParserToken.Text, '[', + (int) ParserToken.Array); + TableAddCol (parse_table, ParserToken.Text, '{', + (int) ParserToken.Object); + + TableAddRow (parse_table, ParserToken.Value); + TableAddCol (parse_table, ParserToken.Value, '"', + (int) ParserToken.String); + TableAddCol (parse_table, ParserToken.Value, '[', + (int) ParserToken.Array); + TableAddCol (parse_table, ParserToken.Value, '{', + (int) ParserToken.Object); + TableAddCol (parse_table, ParserToken.Value, (int) ParserToken.Number, + (int) ParserToken.Number); + TableAddCol (parse_table, ParserToken.Value, (int) ParserToken.True, + (int) ParserToken.True); + TableAddCol (parse_table, ParserToken.Value, (int) ParserToken.False, + (int) ParserToken.False); + TableAddCol (parse_table, ParserToken.Value, (int) ParserToken.Null, + (int) ParserToken.Null); + + TableAddRow (parse_table, ParserToken.ValueRest); + TableAddCol (parse_table, ParserToken.ValueRest, ',', + ',', + (int) ParserToken.Value, + (int) ParserToken.ValueRest); + TableAddCol (parse_table, ParserToken.ValueRest, ']', + (int) ParserToken.Epsilon); + + return parse_table; + } + + private static void TableAddCol (IDictionary> parse_table, ParserToken row, int col, + params int[] symbols) + { + parse_table[(int) row].Add (col, symbols); + } + + private static void TableAddRow (IDictionary> parse_table, ParserToken rule) + { + parse_table.Add ((int) rule, new Dictionary ()); + } + #endregion + + + #region Private Methods + private void ProcessNumber(ReadOnlySpan number) + { + if (number.IndexOf ('.') != -1 || + number.IndexOf ('e') != -1 || + number.IndexOf('E') != -1) + { + + if (double.TryParse(number, NumberStyles.Any, CultureInfo.InvariantCulture, out token_double)) + { + token = JsonToken.Double; + + return; + } + } + + if (int.TryParse(number, NumberStyles.Integer, CultureInfo.InvariantCulture, out token_int)) + { + token = JsonToken.Int; + + return; + } + + if (long.TryParse(number, NumberStyles.Integer, CultureInfo.InvariantCulture, out token_long)) + { + token = JsonToken.Long; + + return; + } + + if (ulong.TryParse(number, NumberStyles.Integer, CultureInfo.InvariantCulture, out token_ulong)) + { + token = JsonToken.ULong; + + return; + } + + // Shouldn't happen + + throw new JsonException($"Number(\"{new string(number)}\") couldn't parsed!"); + } + + private void ProcessSymbol () + { + if (current_symbol == '[') + { + token = JsonToken.ArrayStart; + parser_return = true; + + } + else if (current_symbol == ']') + { + token = JsonToken.ArrayEnd; + parser_return = true; + + } + else if (current_symbol == '{') + { + token = JsonToken.ObjectStart; + parser_return = true; + + } + else if (current_symbol == '}') + { + token = JsonToken.ObjectEnd; + parser_return = true; + + } + else if (current_symbol == '"') + { + if (parser_in_string) + { + parser_in_string = false; + + parser_return = true; + + } + else + { + if (token == JsonToken.None) + token = JsonToken.String; + + parser_in_string = true; + } + + } + else if (current_symbol == (int)ParserToken.CharSeq) + { + //token_value = new String(lexer.StringValueAsCharSpan); + if (_charSeq == null || _charSeq.Length < lexer.StringValueAsCharSpan.Length) + _charSeq = new char[lexer.StringValueAsCharSpan.Length]; + + lexer.StringValueAsCharSpan.CopyTo(_charSeq); + ValueString = _charSeq.AsMemory(0, lexer.StringValueAsCharSpan.Length); + } + else if (current_symbol == (int)ParserToken.False) + { + token = JsonToken.Boolean; + //token_value = false; + token_bool = false; + parser_return = true; + + } + else if (current_symbol == (int)ParserToken.Null) + { + token = JsonToken.Null; + parser_return = true; + + } + else if (current_symbol == (int)ParserToken.Number) + { + ProcessNumber(lexer.StringValueAsCharSpan); + + parser_return = true; + + } + else if (current_symbol == (int)ParserToken.Pair) + { + token = JsonToken.PropertyName; + + } + else if (current_symbol == (int)ParserToken.True) + { + token = JsonToken.Boolean; + //token_value = true; + token_bool = true; + parser_return = true; + + } + } + + private bool ReadToken () + { + if (end_of_input) + return false; + + lexer.NextToken (); + + if (lexer.EndOfInput) + { + if (!keep_open) + Close (); + + return false; + } + + current_input = lexer.Token; + + return true; + } + #endregion + + public void SetJson(string json_text) + { + parser_in_string = false; + parser_return = false; + + read_started = false; + automaton_stack.Clear(); + automaton_stack.Push((int)ParserToken.End); + automaton_stack.Push((int)ParserToken.Text); + + end_of_input = false; + end_of_json = false; + + skip_non_members = true; + + lexer.Reset(this.reader = new StringReader(json_text)); + reader_is_owned = true; + } + + public void Close () + { + if (end_of_input) + return; + + end_of_input = true; + end_of_json = true; + + if (reader_is_owned) + { + using(reader){} + } + lexer.Clear(); + + reader = null; + } + + public bool Read () + { + if (end_of_input) + return false; + + if (end_of_json) + { + end_of_json = false; + automaton_stack.Clear (); + automaton_stack.Push ((int) ParserToken.End); + automaton_stack.Push ((int) ParserToken.Text); + } + + parser_in_string = false; + parser_return = false; + + token = JsonToken.None; + token_value = null; + + if (!read_started) + { + read_started = true; + + if (! ReadToken ()) + return false; + } + + + int[] entry_symbols; + + while (true) + { + if (parser_return) + { + if (automaton_stack.Peek () == (int) ParserToken.End) + end_of_json = true; + + return true; + } + + current_symbol = automaton_stack.Pop (); + + ProcessSymbol (); + + if (current_symbol == current_input) + { + if (!ReadToken()) + { + if (automaton_stack.Peek () != (int) ParserToken.End) + throw new JsonException ( + "Input doesn't evaluate to proper JSON text"); + + if (parser_return) + return true; + + return false; + } + + continue; + } + + try + { + + entry_symbols = + parse_table[current_symbol][current_input]; + + } + catch (KeyNotFoundException e) + { + throw new JsonException ((ParserToken) current_input, e); + } + + if (entry_symbols[0] == (int) ParserToken.Epsilon) + continue; + + for (int i = entry_symbols.Length - 1; i >= 0; i--) + automaton_stack.Push (entry_symbols[i]); + } + } + + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs.meta new file mode 100644 index 00000000..44cd7a34 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e85f43df1930a4a428bfd56d7df0264f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonReader.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs new file mode 100644 index 00000000..394de4bb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs @@ -0,0 +1,520 @@ +#region Header +/** + * JsonWriter.cs + * Stream-like facility to output JSON text. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; +using System.Collections.Generic; +using System.Globalization; +using System.IO; +using System.Text; + + +namespace Best.HTTP.JSON.LitJson +{ + internal enum Condition + { + InArray, + InObject, + NotAProperty, + Property, + Value + } + + internal class WriterContext + { + public int Count; + public bool InArray; + public bool InObject; + public bool ExpectingValue; + public int Padding; + + internal void Reset() + { + Count = Padding = 0; + InArray = InObject = ExpectingValue = false; + } + } + + public sealed class JsonWriter + { + #region Fields + private static readonly NumberFormatInfo number_format; + + private WriterContext context; + private Stack ctx_stack; + private bool has_reached_end; + private char[] hex_seq; + private int indentation; + private int indent_value; + private StringBuilder inst_string_builder; + private bool pretty_print; + private bool validate; + private bool lower_case_properties; + private TextWriter writer; + + private Queue _contextPool; + #endregion + + + #region Properties + public int IndentValue + { + get { return indent_value; } + set + { + indentation = (indentation / indent_value) * value; + indent_value = value; + } + } + + public bool PrettyPrint + { + get { return pretty_print; } + set { pretty_print = value; } + } + + public TextWriter TextWriter + { + get { return writer; } + } + + public bool Validate + { + get { return validate; } + set { validate = value; } + } + + public bool LowerCaseProperties + { + get { return lower_case_properties; } + set { lower_case_properties = value; } + } + #endregion + + + #region Constructors + static JsonWriter () + { + number_format = NumberFormatInfo.InvariantInfo; + } + + public JsonWriter () + { + inst_string_builder = new StringBuilder (); + writer = new StringWriter (inst_string_builder); + + Init (); + } + + public JsonWriter (StringBuilder sb) : + this (new StringWriter (sb)) + { + } + + public JsonWriter (TextWriter writer) + { + if (writer == null) + throw new ArgumentNullException ("writer"); + + this.writer = writer; + + Init (); + } + #endregion + + + #region Private Methods + private void DoValidation (Condition cond) + { + if (! context.ExpectingValue) + context.Count++; + + if (! validate) + return; + + if (has_reached_end) + throw new JsonException ( + "A complete JSON symbol has already been written"); + + switch (cond) + { + case Condition.InArray: + if (! context.InArray) + throw new JsonException ( + "Can't close an array here"); + break; + + case Condition.InObject: + if (! context.InObject || context.ExpectingValue) + throw new JsonException ( + "Can't close an object here"); + break; + + case Condition.NotAProperty: + if (context.InObject && ! context.ExpectingValue) + throw new JsonException ( + "Expected a property"); + break; + + case Condition.Property: + if (! context.InObject || context.ExpectingValue) + throw new JsonException ( + "Can't add a property here"); + break; + + case Condition.Value: + if (! context.InArray && + (! context.InObject || ! context.ExpectingValue)) + throw new JsonException ( + "Can't add a value here"); + + break; + } + } + + private void Init () + { + _contextPool = new Queue(); + + has_reached_end = false; + hex_seq = new char[4]; + indentation = 0; + indent_value = 4; + pretty_print = false; + validate = true; + lower_case_properties = false; + + ctx_stack = new Stack (); + context = new WriterContext (); + ctx_stack.Push (context); + } + + private static void IntToHex (int n, char[] hex) + { + int num; + + for (int i = 0; i < 4; i++) + { + num = n % 16; + + if (num < 10) + hex[3 - i] = (char) ('0' + num); + else + hex[3 - i] = (char) ('A' + (num - 10)); + + n >>= 4; + } + } + + private void Indent () + { + if (pretty_print) + indentation += indent_value; + } + + + private void Put (string str) + { + if (pretty_print && ! context.ExpectingValue) + for (int i = 0; i < indentation; i++) + writer.Write (' '); + + writer.Write (str); + } + + private void PutNewline () + { + PutNewline (true); + } + + private void PutNewline (bool add_comma) + { + if (add_comma && ! context.ExpectingValue && + context.Count > 1) + writer.Write (','); + + if (pretty_print && ! context.ExpectingValue) + writer.Write (Environment.NewLine); + } + + private void PutString (string str) + { + Put (String.Empty); + + writer.Write ('"'); + + int n = str.Length; + for (int i = 0; i < n; i++) + { + switch (str[i]) + { + case '\n': + writer.Write ("\\n"); + continue; + + case '\r': + writer.Write ("\\r"); + continue; + + case '\t': + writer.Write ("\\t"); + continue; + + case '"': + case '\\': + writer.Write ('\\'); + writer.Write (str[i]); + continue; + + case '\f': + writer.Write ("\\f"); + continue; + + case '\b': + writer.Write ("\\b"); + continue; + } + + if ((int)str[i] >= 32 && (int)str[i] <= 126) + { + writer.Write (str[i]); + continue; + } + + // Default, turn into a \uXXXX sequence + IntToHex ((int) str[i], hex_seq); + writer.Write ("\\u"); + writer.Write (hex_seq); + } + + writer.Write ('"'); + } + + private void Unindent () + { + if (pretty_print) + indentation -= indent_value; + } + #endregion + + + public override string ToString () + { + if (inst_string_builder == null) + return String.Empty; + + return inst_string_builder.ToString (); + } + + public void Reset () + { + has_reached_end = false; + + while (ctx_stack.Count > 0) + _contextPool.Enqueue(ctx_stack.Pop()); + + if (_contextPool.TryDequeue(out context)) + context.Reset(); + else + context = new WriterContext (); + ctx_stack.Push (context); + + if (inst_string_builder != null) + inst_string_builder.Remove (0, inst_string_builder.Length); + } + + public void Write (bool boolean) + { + DoValidation (Condition.Value); + PutNewline (); + + Put (boolean ? "true" : "false"); + + context.ExpectingValue = false; + } + + public void Write (decimal number) + { + DoValidation (Condition.Value); + PutNewline (); + + Put (Convert.ToString (number, number_format)); + + context.ExpectingValue = false; + } + + public void Write (double number) + { + DoValidation (Condition.Value); + PutNewline (); + + string str = Convert.ToString (number, number_format); + Put (str); + + if (str.IndexOf ('.') == -1 && + str.IndexOf ('E') == -1) + writer.Write (".0"); + + context.ExpectingValue = false; + } + + public void Write(float number) + { + DoValidation(Condition.Value); + PutNewline(); + + string str = Convert.ToString(number, number_format); + Put(str); + + context.ExpectingValue = false; + } + + public void Write (int number) + { + DoValidation (Condition.Value); + PutNewline (); + + Put (Convert.ToString (number, number_format)); + + context.ExpectingValue = false; + } + + public void Write (long number) + { + DoValidation (Condition.Value); + PutNewline (); + + Put (Convert.ToString (number, number_format)); + + context.ExpectingValue = false; + } + + public void Write (string str) + { + DoValidation (Condition.Value); + PutNewline (); + + if (str == null) + Put ("null"); + else + PutString (str); + + context.ExpectingValue = false; + } + + //[CLSCompliant(false)] + public void Write (ulong number) + { + DoValidation (Condition.Value); + PutNewline (); + + Put (Convert.ToString (number, number_format)); + + context.ExpectingValue = false; + } + + public void WriteArrayEnd () + { + DoValidation (Condition.InArray); + PutNewline (false); + + _contextPool.Enqueue(ctx_stack.Pop()); + if (ctx_stack.Count == 1) + has_reached_end = true; + else + { + context = ctx_stack.Peek (); + context.ExpectingValue = false; + } + + Unindent (); + Put ("]"); + } + + public void WriteArrayStart () + { + DoValidation (Condition.NotAProperty); + PutNewline (); + + Put ("["); + + if (_contextPool.TryDequeue(out context)) + context.Reset(); + else + context = new WriterContext (); + context.InArray = true; + ctx_stack.Push (context); + + Indent (); + } + + public void WriteObjectEnd () + { + DoValidation (Condition.InObject); + PutNewline (false); + + _contextPool.Enqueue(ctx_stack.Pop()); + if (ctx_stack.Count == 1) + has_reached_end = true; + else + { + context = ctx_stack.Peek (); + context.ExpectingValue = false; + } + + Unindent (); + Put ("}"); + } + + public void WriteObjectStart () + { + DoValidation (Condition.NotAProperty); + PutNewline (); + + Put ("{"); + + if (_contextPool.TryDequeue(out context)) + context.Reset(); + else + context = new WriterContext (); + context.InObject = true; + ctx_stack.Push (context); + + Indent (); + } + + public void WritePropertyName (string property_name) + { + DoValidation (Condition.Property); + PutNewline (); + string propertyName = (property_name == null || !lower_case_properties) + ? property_name + : property_name.ToLowerInvariant(); + + PutString (propertyName); + + if (pretty_print) + { + if (propertyName.Length > context.Padding) + context.Padding = propertyName.Length; + + for (int i = context.Padding - propertyName.Length; + i >= 0; i--) + writer.Write (' '); + + writer.Write (": "); + } + else + writer.Write (':'); + + context.ExpectingValue = true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs.meta new file mode 100644 index 00000000..bd3b0f61 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db6b37e84eef6d94fb7cdd8cf5878c5d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/JsonWriter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs new file mode 100644 index 00000000..5bac6913 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs @@ -0,0 +1,993 @@ +#region Header +/** + * Lexer.cs + * JSON lexer implementation based on a finite state machine. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +using System; +using System.IO; +using System.Text; + +namespace Best.HTTP.JSON.LitJson +{ + internal sealed class FsmContext + { + public bool Return; + public int NextState; + public Lexer L; + public int StateStack; + } + + + internal sealed class Lexer + { + #region Fields + private delegate bool StateHandler(FsmContext ctx); + + private static readonly int[] fsm_return_table; + private static readonly StateHandler[] fsm_handler_table; + + private bool allow_comments; + private bool allow_single_quoted_strings; + private bool end_of_input; + private FsmContext fsm_context; + private int input_buffer; + private int input_char; + private TextReader reader; + private int state; + private StringBuilder string_buffer; + private int token; + private int unichar; + + private char[] char_buffer; + private int char_buffer_length; + #endregion + + + #region Properties + public bool AllowComments + { + get { return allow_comments; } + set { allow_comments = value; } + } + + public bool AllowSingleQuotedStrings + { + get { return allow_single_quoted_strings; } + set { allow_single_quoted_strings = value; } + } + + public bool EndOfInput + { + get { return end_of_input; } + } + + public int Token + { + get { return token; } + } + + public ReadOnlySpan StringValueAsCharSpan => char_buffer.AsSpan(0, char_buffer_length); + #endregion + + + #region Constructors + static Lexer() + { + PopulateFsmTables(out fsm_handler_table, out fsm_return_table); + } + + public Lexer(TextReader reader) + { + allow_comments = true; + allow_single_quoted_strings = true; + + input_buffer = 0; + string_buffer = new StringBuilder(128); + state = 1; + end_of_input = false; + this.reader = reader; + + fsm_context = new FsmContext(); + fsm_context.L = this; + } + + public void Reset(TextReader reader) + { + input_buffer = 0; + state = 1; + end_of_input = false; + this.reader = reader; + + fsm_context.L = this; + fsm_context.Return = false; + fsm_context.StateStack = fsm_context.NextState = 0; + + this.string_buffer.Clear(); + } + + #endregion + + + #region Static Methods + private static int HexValue(int digit) + { + switch (digit) + { + case 'a': + case 'A': + return 10; + + case 'b': + case 'B': + return 11; + + case 'c': + case 'C': + return 12; + + case 'd': + case 'D': + return 13; + + case 'e': + case 'E': + return 14; + + case 'f': + case 'F': + return 15; + + default: + return digit - '0'; + } + } + + private static void PopulateFsmTables(out StateHandler[] fsm_handler_table, out int[] fsm_return_table) + { + // See section A.1. of the manual for details of the finite + // state machine. + fsm_handler_table = new StateHandler[28] { + State1, + State2, + State3, + State4, + State5, + State6, + State7, + State8, + State9, + State10, + State11, + State12, + State13, + State14, + State15, + State16, + State17, + State18, + State19, + State20, + State21, + State22, + State23, + State24, + State25, + State26, + State27, + State28 + }; + + fsm_return_table = new int[28] { + (int) ParserToken.Char, + 0, + (int) ParserToken.Number, + (int) ParserToken.Number, + 0, + (int) ParserToken.Number, + 0, + (int) ParserToken.Number, + 0, + 0, + (int) ParserToken.True, + 0, + 0, + 0, + (int) ParserToken.False, + 0, + 0, + (int) ParserToken.Null, + (int) ParserToken.CharSeq, + (int) ParserToken.Char, + 0, + 0, + (int) ParserToken.CharSeq, + (int) ParserToken.Char, + 0, + 0, + 0, + 0 + }; + } + + private static char ProcessEscChar(int esc_char) + { + switch (esc_char) + { + case '"': + case '\'': + case '\\': + case '/': + return Convert.ToChar(esc_char); + + case 'n': + return '\n'; + + case 't': + return '\t'; + + case 'r': + return '\r'; + + case 'b': + return '\b'; + + case 'f': + return '\f'; + + default: + // Unreachable + return '?'; + } + } + + private static bool State1(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char == ' ' || + ctx.L.input_char >= '\t' && ctx.L.input_char <= '\r') + continue; + + if (ctx.L.input_char >= '1' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 3; + return true; + } + + switch (ctx.L.input_char) + { + case '"': + ctx.NextState = 19; + ctx.Return = true; + return true; + + case ',': + case ':': + case '[': + case ']': + case '{': + case '}': + ctx.NextState = 1; + ctx.Return = true; + return true; + + case '-': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 2; + return true; + + case '0': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 4; + return true; + + case 'f': + ctx.NextState = 12; + return true; + + case 'n': + ctx.NextState = 16; + return true; + + case 't': + ctx.NextState = 9; + return true; + + case '\'': + if (!ctx.L.allow_single_quoted_strings) + return false; + + ctx.L.input_char = '"'; + ctx.NextState = 23; + ctx.Return = true; + return true; + + case '/': + if (!ctx.L.allow_comments) + return false; + + ctx.NextState = 25; + return true; + + default: + return false; + } + } + + return true; + } + + private static bool State2(FsmContext ctx) + { + ctx.L.GetChar(); + + if (ctx.L.input_char >= '1' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 3; + return true; + } + + switch (ctx.L.input_char) + { + case '0': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 4; + return true; + + default: + return false; + } + } + + private static bool State3(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + continue; + } + + if (ctx.L.input_char == ' ' || + ctx.L.input_char >= '\t' && ctx.L.input_char <= '\r') + { + ctx.Return = true; + ctx.NextState = 1; + return true; + } + + switch (ctx.L.input_char) + { + case ',': + case ']': + case '}': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 1; + return true; + + case '.': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 5; + return true; + + case 'e': + case 'E': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 7; + return true; + + default: + return false; + } + } + return true; + } + + private static bool State4(FsmContext ctx) + { + ctx.L.GetChar(); + + if (ctx.L.input_char == ' ' || + ctx.L.input_char >= '\t' && ctx.L.input_char <= '\r') + { + ctx.Return = true; + ctx.NextState = 1; + return true; + } + + switch (ctx.L.input_char) + { + case ',': + case ']': + case '}': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 1; + return true; + + case '.': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 5; + return true; + + case 'e': + case 'E': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 7; + return true; + + default: + return false; + } + } + + private static bool State5(FsmContext ctx) + { + ctx.L.GetChar(); + + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 6; + return true; + } + + return false; + } + + private static bool State6(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + continue; + } + + if (ctx.L.input_char == ' ' || + ctx.L.input_char >= '\t' && ctx.L.input_char <= '\r') + { + ctx.Return = true; + ctx.NextState = 1; + return true; + } + + switch (ctx.L.input_char) + { + case ',': + case ']': + case '}': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 1; + return true; + + case 'e': + case 'E': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 7; + return true; + + default: + return false; + } + } + + return true; + } + + private static bool State7(FsmContext ctx) + { + ctx.L.GetChar(); + + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 8; + return true; + } + + switch (ctx.L.input_char) + { + case '+': + case '-': + ctx.L.string_buffer.Append((char)ctx.L.input_char); + ctx.NextState = 8; + return true; + + default: + return false; + } + } + + private static bool State8(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9') + { + ctx.L.string_buffer.Append((char)ctx.L.input_char); + continue; + } + + if (ctx.L.input_char == ' ' || + ctx.L.input_char >= '\t' && ctx.L.input_char <= '\r') + { + ctx.Return = true; + ctx.NextState = 1; + return true; + } + + switch (ctx.L.input_char) + { + case ',': + case ']': + case '}': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + return true; + } + + private static bool State9(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'r': + ctx.NextState = 10; + return true; + + default: + return false; + } + } + + private static bool State10(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'u': + ctx.NextState = 11; + return true; + + default: + return false; + } + } + + private static bool State11(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'e': + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + private static bool State12(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'a': + ctx.NextState = 13; + return true; + + default: + return false; + } + } + + private static bool State13(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'l': + ctx.NextState = 14; + return true; + + default: + return false; + } + } + + private static bool State14(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 's': + ctx.NextState = 15; + return true; + + default: + return false; + } + } + + private static bool State15(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'e': + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + private static bool State16(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'u': + ctx.NextState = 17; + return true; + + default: + return false; + } + } + + private static bool State17(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'l': + ctx.NextState = 18; + return true; + + default: + return false; + } + } + + private static bool State18(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'l': + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + private static bool State19(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + switch (ctx.L.input_char) + { + case '"': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 20; + return true; + + case '\\': + ctx.StateStack = 19; + ctx.NextState = 21; + return true; + + default: + ctx.L.string_buffer.Append((char)ctx.L.input_char); + continue; + } + } + + return true; + } + + private static bool State20(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case '"': + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + private static bool State21(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case 'u': + ctx.NextState = 22; + return true; + + case '"': + case '\'': + case '/': + case '\\': + case 'b': + case 'f': + case 'n': + case 'r': + case 't': + ctx.L.string_buffer.Append( + ProcessEscChar(ctx.L.input_char)); + ctx.NextState = ctx.StateStack; + return true; + + default: + return false; + } + } + + private static bool State22(FsmContext ctx) + { + int counter = 0; + int mult = 4096; + + ctx.L.unichar = 0; + + while (ctx.L.GetChar()) + { + + if (ctx.L.input_char >= '0' && ctx.L.input_char <= '9' || + ctx.L.input_char >= 'A' && ctx.L.input_char <= 'F' || + ctx.L.input_char >= 'a' && ctx.L.input_char <= 'f') + { + + ctx.L.unichar += HexValue(ctx.L.input_char) * mult; + + counter++; + mult /= 16; + + if (counter == 4) + { + ctx.L.string_buffer.Append( + Convert.ToChar(ctx.L.unichar)); + ctx.NextState = ctx.StateStack; + return true; + } + + continue; + } + + return false; + } + + return true; + } + + private static bool State23(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + switch (ctx.L.input_char) + { + case '\'': + ctx.L.UngetChar(); + ctx.Return = true; + ctx.NextState = 24; + return true; + + case '\\': + ctx.StateStack = 23; + ctx.NextState = 21; + return true; + + default: + ctx.L.string_buffer.Append((char)ctx.L.input_char); + continue; + } + } + + return true; + } + + private static bool State24(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case '\'': + ctx.L.input_char = '"'; + ctx.Return = true; + ctx.NextState = 1; + return true; + + default: + return false; + } + } + + private static bool State25(FsmContext ctx) + { + ctx.L.GetChar(); + + switch (ctx.L.input_char) + { + case '*': + ctx.NextState = 27; + return true; + + case '/': + ctx.NextState = 26; + return true; + + default: + return false; + } + } + + private static bool State26(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char == '\n') + { + ctx.NextState = 1; + return true; + } + } + + return true; + } + + private static bool State27(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char == '*') + { + ctx.NextState = 28; + return true; + } + } + + return true; + } + + private static bool State28(FsmContext ctx) + { + while (ctx.L.GetChar()) + { + if (ctx.L.input_char == '*') + continue; + + if (ctx.L.input_char == '/') + { + ctx.NextState = 1; + return true; + } + + ctx.NextState = 27; + return true; + } + + return true; + } + #endregion + + + private bool GetChar() + { + if ((input_char = NextChar()) != -1) + return true; + + end_of_input = true; + return false; + } + + private int NextChar() + { + if (input_buffer != 0) + { + int tmp = input_buffer; + input_buffer = 0; + + return tmp; + } + + return reader.Read(); + } + + public bool NextToken() + { + StateHandler handler; + fsm_context.Return = false; + + while (true) + { + handler = fsm_handler_table[state - 1]; + + if (!handler(fsm_context)) + throw new JsonException(input_char); + + if (end_of_input) + return false; + + if (fsm_context.Return) + { + if (char_buffer == null || char_buffer.Length < string_buffer.Length) + char_buffer = new char[string_buffer.Length]; + + char_buffer_length = string_buffer.Length; + string_buffer.CopyTo(0, char_buffer, string_buffer.Length); + //string_value = string_buffer.ToString(); + string_buffer.Remove(0, string_buffer.Length); + token = fsm_return_table[state - 1]; + + if (token == (int)ParserToken.Char) + token = input_char; + + state = fsm_context.NextState; + + return true; + } + + state = fsm_context.NextState; + } + } + + private void UngetChar() + { + input_buffer = input_char; + } + + public void Clear() + { + this.string_buffer.Clear(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs.meta new file mode 100644 index 00000000..f30fbf88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: efb84fcc579b1fb49b5c9157bad4e2d7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/Lexer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs new file mode 100644 index 00000000..f0d77799 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs @@ -0,0 +1,44 @@ +#region Header +/** + * ParserToken.cs + * Internal representation of the tokens used by the lexer and the parser. + * + * The authors disclaim copyright to this source code. For more details, see + * the COPYING file included with this distribution. + **/ +#endregion + + +namespace Best.HTTP.JSON.LitJson +{ + internal enum ParserToken + { + // Lexer tokens (see section A.1.1. of the manual) + None = System.Char.MaxValue + 1, + Number, + True, + False, + Null, + CharSeq, + // Single char + Char, + + // Parser Rules (see section A.2.1 of the manual) + Text, + Object, + ObjectPrime, + Pair, + PairRest, + Array, + ArrayPrime, + Value, + ValueRest, + String, + + // End of input + End, + + // The empty rule + Epsilon + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs.meta b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs.meta new file mode 100644 index 00000000..ef5ac883 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35dc4d2d98300944b8d59272de90def2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/3rdParty/JSON/LitJson/ParserToken.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs b/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs new file mode 100644 index 00000000..27a8aa38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs @@ -0,0 +1,10 @@ +using System.Reflection; + +[assembly: AssemblyVersion("3.0.15")] +[assembly: AssemblyCompany("Tivadar György Nagy")] +[assembly: AssemblyCopyright("Copyright © 2025 Tivadar György Nagy")] +[assembly: AssemblyDescription("Best HTTP is a versatile and efficient HTTP client library for Unity, designed for making HTTP requests, handling responses, and providing advanced features such as asynchronous requests, compression, timing analysis, and more.")] + +#if BESTHTTP_WITH_BURST +[assembly: Unity.Burst.BurstCompile(CompileSynchronously = true, OptimizeFor = Unity.Burst.OptimizeFor.Performance)] +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs.meta new file mode 100644 index 00000000..bf9aa7ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c8ac9eff9f64d6c4eae352a2eb3af630 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/AssemblyInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP.meta b/Packages/com.tivadar.best.http/Runtime/HTTP.meta new file mode 100644 index 00000000..1171ba33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 06de7980303528847b157f0d9a0a2505 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching.meta new file mode 100644 index 00000000..66b2bc02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: f98735e2cba6f5f4aa3fa3f53d864a85 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs new file mode 100644 index 00000000..172cd595 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs @@ -0,0 +1,95 @@ +using System; + +namespace Best.HTTP.Caching +{ + /// + /// A builder struct for constructing an instance of the HTTPCache class with optional configuration options and callbacks. + /// + public struct HTTPCacheBuilder + { + private HTTPCacheOptions _options; + private OnBeforeBeginCacheDelegate _callback; + + /// + /// Sets the configuration options for the HTTP cache. + /// + /// The containing cache configuration settings. + /// The current instance for method chaining. + public HTTPCacheBuilder WithOptions(HTTPCacheOptions options) + { + this._options = options; + return this; + } + + /// + /// Sets the configuration options for the HTTP cache using an . + /// + /// An for building cache configuration settings. + /// The current instance for method chaining. + public HTTPCacheBuilder WithOptions(HTTPCacheOptionsBuilder optionsBuilder) + { + this._options = optionsBuilder.Build(); + return this; + } + + /// + /// Sets a callback delegate to be executed before caching of an entity begins. + /// + /// The delegate to be executed before caching starts. + /// The current instance for method chaining. + public HTTPCacheBuilder WithBeforeBeginCacheCallback(OnBeforeBeginCacheDelegate callback) + { + this._callback = callback; + return this; + } + + /// + /// Builds and returns an instance of the with the specified configuration options and callback delegate. + /// + /// An instance configured with the specified options and callback. + public HTTPCache Build() + => new HTTPCache(this._options) { OnBeforeBeginCache = this._callback }; + } + + /// + /// A builder struct for constructing an instance of with optional configuration settings. + /// + public struct HTTPCacheOptionsBuilder + { + private HTTPCacheOptions _options; + + /// + /// Sets the maximum cache size for the HTTP cache. + /// + /// The maximum size, in bytes, that the cache can reach. + /// The current instance for method chaining. + public HTTPCacheOptionsBuilder WithMaxCacheSize(ulong maxCacheSize) + { + this._options = this._options ?? new HTTPCacheOptions(); + this._options.MaxCacheSize = maxCacheSize; + + return this; + } + + /// + /// Sets the maximum duration for which cached entries will be retained. + /// By default all entities (even stalled ones) are kept cached until they are evicted to make room for new, fresh ones. + /// + /// The maximum age for cached entries to be retained. + /// The current instance for method chaining. + public HTTPCacheOptionsBuilder WithDeleteOlderThen(TimeSpan olderThan) + { + this._options = this._options ?? new HTTPCacheOptions(); + this._options.DeleteOlder = olderThan; + + return this; + } + + /// + /// Builds and returns an instance of with the specified configuration settings. + /// + /// An instance configured with the specified settings. + public HTTPCacheOptions Build() + => this._options ?? new HTTPCacheOptions(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs.meta new file mode 100644 index 00000000..0cc75138 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 114a3d036d69b7c4ca732b2f6a48b292 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Caching/Builders.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs new file mode 100644 index 00000000..0bcefc93 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs @@ -0,0 +1,1056 @@ +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.FileSystem; +using Best.HTTP.Shared.PlatformSupport.Threading; + +using System; +using System.Collections.Generic; +using System.IO; +using System.Threading; + +using UnityEngine; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; +using static Best.HTTP.Response.HTTPStatusCodes; +using static System.Math; + +namespace Best.HTTP.Caching +{ + internal sealed class HTTPCacheAcquireLockException : Exception + { + public HTTPCacheAcquireLockException(string message) : base(message) + { + } + } + + /// + /// Types of errors that can occur during cache validation. + /// + public enum ErrorTypeForValidation + { + /// + /// Indicates that no error has occurred during validation. + /// + None, + + /// + /// Indicates a server error has occurred during validation. + /// + ServerError, + + /// + /// Indicates a connection error has occurred during validation. + /// + ConnectionError + } + + /// + /// Represents a delegate that can be used to perform actions before caching of an entity begins. + /// + /// The HTTP method used in the request. + /// The URI of the HTTP request. + /// The HTTP status code of the response. + /// The HTTP response headers. + /// An optional logging context for debugging. + public delegate void OnBeforeBeginCacheDelegate(HTTPMethods method, Uri uri, int statusCode, Dictionary> headers, LoggingContext context = null); + + /// + /// Represents a delegate that can be used to handle cache size change events. + /// + public delegate void OnCacheSizeChangedDelegate(); + + /// + /// Manages caching of HTTP responses and associated metadata. + /// + /// + /// The `HTTPCache` class provides a powerful caching mechanism for HTTP responses in Unity applications. + /// It allows you to store and retrieve HTTP responses efficiently, reducing network requests and improving + /// the performance of your application. By utilizing HTTP caching, you can enhance user experience, reduce + /// bandwidth usage, and optimize loading times. + /// + /// + /// Key features: + /// + /// Optimal User ExperienceUsers experience faster load times and smoother interactions, enhancing user satisfaction. + /// Efficient CachingIt enables efficient caching of HTTP responses, reducing the need to fetch data from the network repeatedly. + /// Improved PerformanceCaching helps improve the performance of your Unity application by reducing latency and decreasing loading times. + /// Bandwidth OptimizationBy storing and reusing cached responses, you can minimize bandwidth usage, making your application more data-friendly. + /// Offline AccessCached responses allow your application to function even when the device is offline or has limited connectivity. + /// Reduced Server LoadFewer network requests mean less load on your server infrastructure, leading to cost savings and improved server performance. + /// Manual Cache ControlYou can also manually control caching by adding, removing, or updating cached responses. + /// + /// + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstruction] + public class HTTPCache : IDisposable, IHeartbeat + { + /// + /// Constants defining folder and file names used in the HTTP cache storage. + /// + + private const string RootFolderName = "LocalCache"; + private const string DatabaseFolderName = "Database"; + private const string ContentFolderName = "Content"; + private const string HeaderFileName = "headers.txt"; + private const string ContentFileName = "content.bin"; + + /// + /// This is the reversed domain the plugin uses for file paths when it have to load content from the local cache. + /// + public const string CacheHostName = "com.Tivadar.Best.HTTP.Local.Cache"; + + /// + /// Event that is triggered when the size of the cache changes. + /// + public OnCacheSizeChangedDelegate OnCacheSizeChanged; + + /// + /// Gets the options that define the behavior of the HTTP cache. + /// + public HTTPCacheOptions Options { get; private set; } + + /// + /// Gets the current size of the HTTP cache in bytes. + /// + public long CacheSize { get => this._cacheSize; } + private long _cacheSize; + + /// + /// Called before the plugin calls to decide whether the content will be cached or not. + /// + public OnBeforeBeginCacheDelegate OnBeforeBeginCache; + + private int _subscribed; + + private bool _isSupported; + private HTTPCacheDatabase _database; + private string _baseDirectory; + + /// + /// Initializes a new instance of the HTTPCache class with the specified cache options. + /// + /// The HTTP cache options specifying cache size and deletion policy. + public HTTPCache(HTTPCacheOptions options) + { + this.Options = options ?? new HTTPCacheOptions(); + + try + { + _baseDirectory = Path.Combine(HTTPManager.GetRootSaveFolder(), RootFolderName); + +#if UNITY_WEBGL && !UNITY_EDITOR + this._isSupported = false; + this._database = null; +#else + + var dbBaseDir = Path.Combine(_baseDirectory, DatabaseFolderName); + + if (!HTTPManager.IOService.DirectoryExists(dbBaseDir)) + HTTPManager.IOService.DirectoryCreate(dbBaseDir); + + _database = new HTTPCacheDatabase(dbBaseDir); + + var cacheDir = Path.Combine(_baseDirectory, ContentFolderName); + if (!HTTPManager.IOService.DirectoryExists(cacheDir)) + HTTPManager.IOService.DirectoryCreate(cacheDir); + + _isSupported = true; +#endif + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(HTTPCache), "ctr", ex); + + _isSupported = false; + _database?.Dispose(); + } + } + + /// + /// Calculates a unique hash identifier based on the HTTP method and URI. + /// + /// The HTTP method used in the request. + /// The URI of the HTTP request. + /// A unique hash identifier for the combination of method and URI. + public static Hash128 CalculateHash(HTTPMethods method, Uri uri) + { + Hash128 hash = new Hash128(); + + hash.Append((byte)method); + hash.Append(uri.ToString()); + + return hash; + } + + /// + /// Generates the directory path based on the given hash where cached content is stored. + /// + /// A unique hash identifier for the cached content, returned by . + /// The directory path for the cached content associated with the given hash. + public string GetHashDirectory(Hash128 hash) + => Path.Combine(_baseDirectory, ContentFolderName, hash.ToString()); + + /// + /// Generates the file path for the header cache associated with the given hash. + /// + /// A unique hash identifier for the cached content, returned by . + /// The file path for the header cache associated with the given hash. + public string GetHeaderPathFromHash(Hash128 hash) + => Path.Combine(_baseDirectory, ContentFolderName, hash.ToString(), "headers.cache"); + + /// + /// Generates the file path for the content cache associated with the given hash. + /// + /// A unique hash identifier for the cached content, returned by . + /// The file path for the content cache associated with the given hash. + public string GetContentPathFromHash(Hash128 hash) + => Path.Combine(_baseDirectory, ContentFolderName, hash.ToString(), "content.cache"); + + /// + /// Checks whether cache files (header and content) associated with the given hash exist. + /// + /// A unique hash identifier for the cached content. + /// true if both header and content cache files exist, otherwise false. + public bool AreCacheFilesExists(Hash128 hash) + => HTTPManager.IOService.FileExists(GetHeaderPathFromHash(hash)) && + HTTPManager.IOService.FileExists(GetContentPathFromHash(hash)); + + /// + /// Sets up validation headers on an HTTP request if a locally cached response exists. + /// + /// The to which validation headers will be added. + public void SetupValidationHeaders(HTTPRequest request) + { + var hash = CalculateHash(request.MethodType, request.CurrentUri); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(SetupValidationHeaders)}({request}, {hash})", request.Context); + + request.RemoveHeader("If-None-Match"); + request.RemoveHeader("If-Modified-Since"); + + if (!_isSupported) + return; + + if (!hash.isValid) + return; + + // find&load content for the hash + var content = _database.FindByHashAndUpdateRequestTime(hash, request.Context); + + if (content == null) + return; + + if (!AreCacheFilesExists(hash)) + { + Delete(hash, request.Context); + return; + } + + if (!string.IsNullOrEmpty(content.ETag)) + request.SetHeader("If-None-Match", content.ETag); + + if (content.LastModified != DateTime.MinValue) + request.SetHeader("If-Modified-Since", content.LastModified.ToString("R")); + } + + /// + /// If necessary tries to make enough space in the cache by calling Maintain. + /// + internal bool IsThereEnoughSpaceAfterMaintain(ulong spaceNeeded, LoggingContext context) + { + // Run maintenance and see whether we have enough space for the new content. + if ((ulong)(CacheSize + (long)spaceNeeded) > Options.MaxCacheSize) + Maintain(contentLength: spaceNeeded, deleteLockedEntries: false, context: context); + + return (ulong)(CacheSize + (long)spaceNeeded) <= Options.MaxCacheSize; + } + + /// + /// Initiates the caching process for an HTTP response, creating an if caching is enabled and all predconditions are met. + /// + /// The method used to fetch the response. + /// The URI for the response. + /// The HTTP status code of the response. + /// The HTTP headers of the response. + /// An optional logging context for debugging. + /// An instance for writing the response content to the cache, or null if caching is not enabled or not possible. + public HTTPCacheContentWriter BeginCache(HTTPMethods method, Uri uri, int statusCode, Dictionary> headers, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(BeginCache)}({method}, {uri}, {statusCode}, {headers?.Count})", context); + + if (!_isSupported) + return null; + + // Check if the response is cacheable based on method, URI, and status code. + // The original IsCachable got split into two: + // - first check method, uri and status code before calling OnBeforeBeginCache + if (!IsCacheble(method, uri, statusCode)) + return null; + + if (headers == null) + return null; + + // Log caching headers for debugging purposes. + LogCachingHeaders(headers, context); + + var onBeforeBeginCache = OnBeforeBeginCache; + if (onBeforeBeginCache != null) + { + try + { + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(BeginCache)} - Calling {nameof(OnBeforeBeginCache)}", context); + + // Invoke the OnBeforeBeginCache callback if provided. + onBeforeBeginCache?.Invoke(method, uri, statusCode, headers, context); + + // Log caching headers after the callback. + LogCachingHeaders(headers, context); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPCache), nameof(OnBeforeBeginCache), ex, context); + } + } + + // Check if there is enough space in the cache for the response content. + var contentLengthStr = headers.GetFirstHeaderValue("content-length"); + if (ulong.TryParse(contentLengthStr, out var contentLength)) + { + if (!IsThereEnoughSpaceAfterMaintain(contentLength, context)) + { + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(BeginCache)} - Not enough space({contentLength:N0}) in cache({CacheSize:N0}), even after Maintain!", context); + return null; + } + } + + // Check if the response headers indicate that the response is cacheable. + // (second half of the original IsCachable) + // - then existence of the required caching headers after OnBeforeBeginCache + if (!IsCacheble(headers)) + return null; + + // Check if the calculated hash is valid. + var hash = CalculateHash(method, uri); + if (!hash.isValid) + return null; + + // Try to get a lock on the cache entity. Prevents other requests from updating or loading from it. + if (!_database.TryAcquireWriteLock(hash, headers, context)) + { + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(BeginCache)} - Couldn't acquire write lock!", context); + return null; + } + + // Add or replace the "Date" header in the response if it is missing or invalid. + // https://www.rfc-editor.org/rfc/rfc9110#section-6.6.1-8 + // A recipient with a clock that receives a response message without a Date header field + // MUST record the time it was received and append a corresponding Date header field + // to the message's header section if it is cached or forwarded downstream. + + var date = headers.GetFirstHeaderValue("date"); + if (string.IsNullOrEmpty(date) || !DateTime.TryParse(date, out var _)) + { + // A recipient with a clock that receives a response with an invalid Date header field value + // MAY replace that value with the time that response was received. + headers.RemoveHeader("date"); + headers.AddHeader("date", DateTime.UtcNow.ToString("R")); + } + + Stream contentStream = null; + try + { + // Create the cache directory if it does not exist. + var hashDir = GetHashDirectory(hash); + if (!HTTPManager.IOService.DirectoryExists(hashDir)) + HTTPManager.IOService.DirectoryCreate(hashDir); + + // Create and write the header cache file. + using (var headStream = HTTPManager.IOService.CreateFileStream(GetHeaderPathFromHash(hash), FileStreamModes.Create)) + WriteHeaders(headStream, headers); + + // Create/open the content cache file. + contentStream = HTTPManager.IOService.CreateFileStream(GetContentPathFromHash(hash), FileStreamModes.Create); + } + catch (Exception ex) + { + // Handle exceptions that may occur during cache file creation + + HTTPManager.Logger.Exception(nameof(HTTPCache), nameof(BeginCache), ex, context); + + contentStream?.Dispose(); + contentStream = null; + + // Delete the cache entry if an exception occurs. + Delete(hash, context); + } + + // Return an HTTPCacheContentWriter for writing response content to the cache. + return new HTTPCacheContentWriter(this, hash, contentStream, contentLength, context); + } + + /// + /// Finalizes the caching process and takes appropriate actions based on the completion status. + /// + /// The instance representing the caching operation. + /// A boolean indicating whether the caching process completed without issues. + /// An optional logging context for debugging. + public void EndCache(HTTPCacheContentWriter cacheResult, bool completedWithoutIssue, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(EndCache)}({cacheResult}, {completedWithoutIssue})", context); + + if (cacheResult == null || !cacheResult.Hash.isValid || !_isSupported) + return; + + var hash = cacheResult.Hash; + + cacheResult.Close(); + + if (completedWithoutIssue) + { + _database.ReleaseWriteLock(hash, cacheResult.ProcessedLength, cacheResult.Context); + IncrementCacheSize(cacheResult.ProcessedLength); + } + else + { + Delete(hash, cacheResult.Context); + } + } + + /// + /// Initiates the process of reading cached content associated with a given hash. Call BeginReadContent to acquire a Stream object that points to the cached resource. + /// + /// A hash from identifying the resource. + /// An optional + /// A stream for reading the cached content, or null if the content could not be read (the resource isn't cached or currently downloading). + public Stream BeginReadContent(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(BeginReadContent)}({hash})", context); + + if (!_isSupported) + return null; + + if (!_database.TryAcquireReadLock(hash, context)) + return null; + + _database.UpdateLastAccessTime(hash, context); + + var contentPath = GetContentPathFromHash(hash); + + return HTTPManager.IOService.CreateFileStream(contentPath, FileStreamModes.OpenRead); + } + + /// + /// Finalizes the process of reading cached content associated with a given hash. + /// + /// The unique hash identifier for the cached content. + /// An optional logging context for debugging. + public void EndReadContent(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(EndReadContent)}({hash})", context); + + if (!_isSupported) + return; + + _database.ReleaseReadLock(hash, context); + } + + /// + /// Deletes a cached entry identified by the given hash, including its associated header and content files. + /// + /// The unique hash identifier for the cached entry to be deleted. + /// An optional logging context for debugging. + public void Delete(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(Delete)}({hash})", context); + + if (!_isSupported) + return; + + // Calling this function more than once with the same hash should be fine, the DB is locked and + // only one will find the metadata. + + try + { + _database.EnterWriteLock(context); + + try + { + var headerPath = GetHeaderPathFromHash(hash); + if (HTTPManager.IOService.FileExists(headerPath)) + HTTPManager.IOService.FileDelete(headerPath); + + var contentPath = GetContentPathFromHash(hash); + if (HTTPManager.IOService.FileExists(contentPath)) + HTTPManager.IOService.FileDelete(contentPath); + + var hashDirectory = GetHashDirectory(hash); + if (HTTPManager.IOService.DirectoryExists(hashDirectory)) + HTTPManager.IOService.DirectoryDelete(hashDirectory); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPCache), $"{nameof(Delete)}({hash})", ex, context); + } + + DecrementCacheSize(_database.Delete(hash, context)); + } + finally + { + _database.ExitWriteLock(context); + } + } + + /// + /// Refreshes the headers of a cached HTTP response with new headers. + /// + /// A unique hash identifier for the cached response from a call. + /// A dictionary of new headers to replace or merge with existing headers. + /// Used by the plugin to add an addition logging context for debugging. It can be null. + /// true if the headers were successfully refreshed; otherwise, false. + public bool RefreshHeaders(Hash128 hash, Dictionary> newHeaders, LoggingContext context) + { + // To Refresh stored cache related values from the headers described here: + // 1.) https://www.rfc-editor.org/rfc/rfc9111.html#name-freshening-stored-responses + // 2.) https://www.rfc-editor.org/rfc/rfc9111.html#name-updating-stored-header-fiel + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(RefreshHeaders)}({hash}, {newHeaders?.Count})", context); + + if (!_isSupported) + return false; + + // Log the new headers for debugging purposes. + LogCachingHeaders(newHeaders, context); + + // Update the metadata with the new headers. + if (_database.Update(hash, newHeaders, context)) + { + // https://www.rfc-editor.org/rfc/rfc9111.html#name-updating-stored-header-fiel + // Load stored header, merge them with the received ones and store them. + try + { + using (var headerStream = HTTPManager.IOService.CreateFileStream(GetHeaderPathFromHash(hash), FileStreamModes.OpenReadWrite)) + { + // Load existing headers. + var oldHeaders = LoadHeaders(headerStream); + + foreach (var kvp in newHeaders) + { + if (oldHeaders.TryGetValue(kvp.Key, out var value)) + { + // Replace existing header values with new values. + value.Clear(); + value.AddRange(kvp.Value); + } + else + { + // Add new headers if they don't already exist. + oldHeaders.Add(kvp.Key, value); + } + } + + // Seek to the beginning of the header file and write the updated headers. + headerStream.Seek(0, SeekOrigin.Begin); + headerStream.SetLength(0); + WriteHeaders(headerStream, oldHeaders); + } + + // Everything went as expected, return true + return true; + } + catch (Exception ex) + { + HTTPManager.Logger.Warning(nameof(HTTPCache), $"{nameof(RefreshHeaders)} - Couldn't merge/store headers. Exception: {ex}", context); + + // Delete the cached response associated with the hash. + Delete(hash, context); + } + } + + return false; + } + + private bool IsCacheble(Dictionary> headers) + { + if (!_isSupported) + return false; + + // Responses with byte ranges not supported. + var byteRanges = headers.GetHeaderValues("content-range"); + if (byteRanges != null) + return false; + + //http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.9.2 + bool hasValidMaxAge = false; + var cacheControls = headers.GetHeaderValues("cache-control"); + + if (cacheControls != null) + { + // A local function that checks the header value for any indication that prohibits caching. + // So, it must return TRUE, if it's NOT cachable. + bool CheckHeader(string headerValue) + { + HeaderParser parser = new HeaderParser(headerValue); + if (parser.Values != null && parser.Values.Count > 0) + { + for (int i = 0; i < parser.Values.Count; ++i) + { + var value = parser.Values[i]; + + // https://csswizardry.com/2019/03/cache-control-for-civilians/#no-store + if (value.Key == "no-store") + return true; + + if (value.Key == "max-age" && value.HasValue) + { + double maxAge; + if (double.TryParse(value.Value, out maxAge)) + { + // A negative max-age value is a no cache + if (maxAge <= 0) + return true; + hasValidMaxAge = true; + } + } + } + } + + return false; + } + + if (cacheControls.Exists(CheckHeader)) + return false; + } + + // It has an ETag header + var etag = headers.GetFirstHeaderValue("etag"); + if (!string.IsNullOrEmpty(etag)) + return true; + + // It has an Expires header, and it's in the future + var expires = headers.GetFirstHeaderValue("expires").ToDateTime(DateTime.FromBinary(0)); + if (expires > DateTime.UtcNow) + return true; + + // It has a Last-Modified header + if (headers.GetFirstHeaderValue("last-modified") != null) + return true; + + return hasValidMaxAge; + } + + private bool IsCacheble(HTTPMethods method, Uri uri, int statusCode) + { + if (!_isSupported) + return false; + + if (!uri.Scheme.StartsWith("http", StringComparison.OrdinalIgnoreCase)) + return false; + + if (method != HTTPMethods.Get) + return false; + + // https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + if (statusCode != OK && statusCode != NoContent) + return false; + + return true; + } + + /// + /// Checks whether the caches resource identified by the hash is can be served from the local store with the given error conditions. + /// + /// This check reflects the very current state, even if it returns true, a request might just executing to get a write lock on it to refresh the content. + /// hash returned by identifying a resource. + /// Possible error condition that can occur during validation. Servers can provision that certain stalled resources can be served if revalidation fails. + /// Used by the plugin to add an addition logging context for debugging. It can be null. + /// true if the cached response can be served without validating it with the origin server; otherwise, false + public bool CanServeWithoutValidation(Hash128 hash, ErrorTypeForValidation errorType, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(CanServeWithoutValidation)}({hash}, {errorType})", context); + + if (!_isSupported || !hash.isValid) + return false; + + (CacheMetadataContent content, CacheMetadata metadata) = (null, null); + try + { + // Attempt to find the cached content and metadata for the given hash. + (content, metadata) = _database.FindContentAndMetadataLocked(hash); + if (content == null) + return false; + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPCache), $"{nameof(_database.FindContentAndMetadataLocked)}", ex, context); + + Delete(hash, context); + + return false; + } + + // + if (metadata.Lock == LockTypes.Write) + return false; + + // Check if cache files associated with the hash exist. + if (!AreCacheFilesExists(hash)) + { + Delete(hash, context); + return false; + } + + if ((content.Flags & CacheFlags.NoCache) != 0) + return false; + + // Calculate the current age of the cached content, described here: + // 1.) https://www.rfc-editor.org/rfc/rfc9111.html#name-freshness + // 2.) https://www.rfc-editor.org/rfc/rfc9111.html#name-calculating-age + if (content.MaxAge > 0) + { + long current_age = content.Age; + + // If there are more than one requests accessing the same resource it's possible that the first one sets the RequestTime + // but ResponseTime is the same old value while the second request tries to calculate the resource's Age. + + var apparent_age = Max(0, (int)(content.ResponseTime - content.Date).TotalSeconds); + var response_delay = (int)(content.ResponseTime - content.RequestTime).TotalSeconds; + var corrected_age_value = content.Age + response_delay; + + var corrected_initial_age = Max(apparent_age, corrected_age_value); + + var resident_time = DateTime.UtcNow - content.ResponseTime; + current_age = corrected_initial_age + (int)resident_time.TotalSeconds; + + var maxAge = content.MaxAge; + + switch (errorType) + { + case ErrorTypeForValidation.None: + // https://www.rfc-editor.org/rfc/rfc5861.html#section-1 + // The stale-while-revalidate HTTP Cache-Control extension allows a + // cache to immediately return a stale response while it revalidates it + // in the background, thereby hiding latency (both in the network and on + // the server) from clients. + + // If it's stalled but there's a value set for StaleWhileRevalidate and it's fresh with its value + if (current_age > maxAge && content.StaleWhileRevalidate > 0 && current_age <= (maxAge + content.StaleWhileRevalidate)) + { + maxAge += content.StaleWhileRevalidate; + // TODO: send revalidate request + } + break; + + case ErrorTypeForValidation.ServerError: + case ErrorTypeForValidation.ConnectionError: + // Handle stale-if-error caching extension: + // https://www.rfc-editor.org/rfc/rfc5861.html#section-4 + if (content.StaleIfError > 0) + maxAge += content.StaleIfError; + break; + } + + return current_age <= maxAge; + } + + // Check if the content has not expired based on the 'Expires' header. + return content.Expires > DateTime.UtcNow; + } + + /// + /// Redirects a request to a cached entity. + /// + /// The that will be redirected. + /// Hash obtained from . + public void Redirect(HTTPRequest request, Hash128 hash) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(Redirect)}({request}, {hash})", request.Context); + + if (!_isSupported || request == null || !hash.isValid) + return; + + // Redirect to the local cache + request.RedirectSettings.RedirectUri = new Uri($"file://{CacheHostName}/{hash}"); + request.RedirectSettings.IsRedirected = true; + } + + internal void Maintain(ulong contentLength, bool deleteLockedEntries, LoggingContext context) + { + if (!_isSupported) + return; + + HTTPManager.Logger.Information(nameof(HTTPCache), $"Maintain({contentLength:N0}, {deleteLockedEntries}, {System.Threading.Thread.CurrentThread.ManagedThreadId})", context); + + if (HTTPUpdateDelegator.Instance.IsMainThread()) + ThreadedRunner.RunShortLiving(MaintainImplementation, contentLength, deleteLockedEntries, HTTPManager.CurrentFrameDateTime, context); + else + MaintainImplementation(contentLength, deleteLockedEntries, HTTPManager.CurrentFrameDateTime, context); + } + + private void ZeroOutCacheSize() + { + //HTTPManager.Logger.Information(nameof(HTTPCache), $"CacheSize - ZeroOutCacheSize()"); + + Interlocked.Exchange(ref this._cacheSize, 0); + if (Interlocked.CompareExchange(ref this._subscribed, 1, 0) == 0) + HTTPManager.Heartbeats.Subscribe(this); + } + + private void IncrementCacheSize(ulong withSize) + { + //HTTPManager.Logger.Information(nameof(HTTPCache), $"CacheSize - IncrementCacheSize({withSize:N0}) => {Interlocked.Add(ref this._cacheSize, (long)withSize):N0}"); + + Interlocked.Add(ref this._cacheSize, (long)withSize); + + if (Interlocked.CompareExchange(ref this._subscribed, 1, 0) == 0) + HTTPManager.Heartbeats.Subscribe(this); + } + + private void DecrementCacheSize(ulong withSize) + { + //HTTPManager.Logger.Information(nameof(HTTPCache), $"CacheSize - DecrementCacheSize({-(long)withSize:N0}) => {Interlocked.Add(ref this._cacheSize, -(long)withSize):N0}"); + + Interlocked.Add(ref this._cacheSize, -(long)withSize); + + if (Interlocked.CompareExchange(ref this._subscribed, 1, 0) == 0) + HTTPManager.Heartbeats.Subscribe(this); + } + + private void MaintainImplementation(ulong contentLength, bool deleteLockedEntries, DateTime now, LoggingContext context) + { + List markedForDelete = null; + + // lock down the whole database + _database.EnterWriteLock(null); + ZeroOutCacheSize(); + try + { + var deleteOlderDT = Options.DeleteOlder == TimeSpan.MaxValue ? DateTime.MinValue : now - Options.DeleteOlder; + + // Go through hashes in the DB metadata and compare them to the directory names in the cache folder + // delete those that aren't in the DB/file system. + + for (int i = 0; i < _database.MetadataService.Metadatas.Count; ++i) + { + var metadata = _database.MetadataService.Metadatas[i]; + + // When Maintain first called on startup, we can search for locked entries. + // An entry can remeain write locked if the process is terminated unexpectedly while a download is in progress. + // By deleting it here we can prevent serving incomplete content. + bool isIncomplete = deleteLockedEntries && metadata.Lock != LockTypes.Unlocked; + if (isIncomplete) + HTTPManager.Logger.Warning(nameof(HTTPCache), $"Incomplete cache entry({metadata}) found!", context); + + bool isAnyFileMissing = !AreCacheFilesExists(metadata.Hash) && metadata.Lock == LockTypes.Unlocked; + + if (isAnyFileMissing || isIncomplete || metadata.LastAccessTime <= deleteOlderDT) + { + if (markedForDelete == null) + markedForDelete = new List(); + + markedForDelete.Add(metadata.Hash); + metadata.MarkForDelete(); + } + else + { + IncrementCacheSize(metadata.ContentLength); + } + } + + var sortedMetadatas = new List(_database.MetadataService.Metadatas); + sortedMetadatas.Sort((x, y) => x.LastAccessTime.CompareTo(y.LastAccessTime)); + + var cacheSize = CacheSize; + var targetCacheSize = (long)(Options.MaxCacheSize - contentLength); + for (int i = 0; i < sortedMetadatas.Count && cacheSize > targetCacheSize; ++i) + { + var metadata = sortedMetadatas[i]; + + // already marked for deletion + if (metadata.IsDeleted) + continue; + + // is in use + if (metadata.Lock != LockTypes.Unlocked) + continue; + + if (markedForDelete == null) + markedForDelete = new List(); + + markedForDelete.Add(metadata.Hash); + cacheSize -= (long)metadata.ContentLength; + } + } + finally + { + _database.ExitWriteLock(null); + } + + if (markedForDelete != null) + { + HTTPManager.Logger.Information(nameof(HTTPCache), $"Maintain - collected {markedForDelete.Count} entries for deletion!", context); + + foreach (Hash128 key in markedForDelete) + Delete(key, context); + + markedForDelete.Clear(); + } + else + HTTPManager.Logger.Information(nameof(HTTPCache), "Maintain - collected 0 entries for deletion!", context); + } + + private static void WriteHeaders(Stream headerStream, Dictionary> headers) + { + if (headerStream == null || headers == null) + return; + + foreach (var kvp in headers) + { + // https://www.rfc-editor.org/rfc/rfc9111.html#name-storing-header-and-trailer- + // TODO: expand the no-save list + if (kvp.Key.Equals("alt-svc", StringComparison.OrdinalIgnoreCase) || + kvp.Key.Equals("content-encoding", StringComparison.OrdinalIgnoreCase) || + kvp.Key.Equals("transfer-encoding", StringComparison.OrdinalIgnoreCase) || + kvp.Key.Equals("connection", StringComparison.OrdinalIgnoreCase) || + kvp.Key.Equals("proxy-authenticate", StringComparison.OrdinalIgnoreCase) || + kvp.Key.Equals("content-length", StringComparison.OrdinalIgnoreCase)) + continue; + + if (kvp.Value == null) + { + headerStream.WriteString(kvp.Key); + headerStream.WriteString(":"); + headerStream.WriteString(string.Empty); + headerStream.WriteLine(); + + continue; + } + + foreach (var value in kvp.Value) + { + headerStream.WriteString(kvp.Key); + headerStream.WriteString(":"); + headerStream.WriteString(value); + headerStream.WriteLine(); + } + } + + headerStream.WriteLine(); + headerStream.Flush(); + } + + private static Dictionary> LoadHeaders(Stream headersStream) + { + var result = new Dictionary>(StringComparer.OrdinalIgnoreCase); + + string headerName = HTTPResponse.ReadTo(headersStream, (byte)':', LF); + while (headerName != string.Empty) + { + string value = HTTPResponse.ReadTo(headersStream, LF); + + result.AddHeader(headerName, value); + + headerName = HTTPResponse.ReadTo(headersStream, (byte)':', LF); + } + + return result; + } + + public void Dispose() + { + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(Dispose)}"); + + ZeroOutCacheSize(); + + try + { + _database?.Dispose(); + _database = null; + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPCache), $"{nameof(Dispose)}", ex); + } + + HTTPManager.Logger.Information(nameof(HTTPCache), $"{nameof(Dispose)} - Disposed!"); + } + + private static void LogCachingHeaders(Dictionary> headers, LoggingContext context) + { + if (!HTTPManager.Logger.IsDiagnostic) + return; + + var etag = headers.GetFirstHeaderValue("etag"); + var expires = headers.GetFirstHeaderValue("expires"); + var lastModified = headers.GetFirstHeaderValue("last-modified"); + var age = headers.GetFirstHeaderValue("age"); + var date = headers.GetFirstHeaderValue("date"); + var cacheControl = headers.GetFirstHeaderValue("cache-control"); + + if (etag != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "ETag: " + etag, context); + + if (expires != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "Expires: " + expires, context); + + if (lastModified != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "Last-Modified: " + lastModified, context); + + if (age != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "Age: " + age, context); + + if (date != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "Date: " + date, context); + + if (cacheControl != null) + HTTPManager.Logger.Verbose(nameof(HTTPCache), "Cache-Control: " + cacheControl, context); + } + + /// + /// Clears the HTTP cache by removing all cached entries and associated metadata. + /// + public void Clear() + { + if (!_isSupported) + return; + + //_database.EnterWriteLock(null); + try + { + var copyOfMetadatas = new List(_database.MetadataService.Metadatas); + + foreach (var metadata in copyOfMetadatas) + Delete(metadata.Hash, null); + } + finally + { + //_database.ExitWriteLock(null); + } + } + + void IHeartbeat.OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + try + { + this.OnCacheSizeChanged?.Invoke(); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPCache), "OnCacheSizeChanged", ex, null); + } + + HTTPManager.Heartbeats.Unsubscribe(this); + Interlocked.Exchange(ref this._subscribed, 0); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs.meta new file mode 100644 index 00000000..026843a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 202cffdfebb3b8e4ba485c44e5f5b1ce +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCache.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs new file mode 100644 index 00000000..7284a314 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs @@ -0,0 +1,103 @@ +using System; +using System.IO; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +using UnityEngine; + +namespace Best.HTTP.Caching +{ + /// + /// Represents a writer for caching HTTP response content. + /// + public class HTTPCacheContentWriter + { + /// + /// Gets the parent HTTPCache instance associated with this content writer. + /// + public HTTPCache Cache { get; private set; } + + /// + /// Hash identifying the resource. If fails, it becomes an invalid one. + /// + public Hash128 Hash { get; private set; } + + /// + /// Expected length of the content. Has a non-zero value only when the server is sending a "content-length" header. + /// + public ulong ExpectedLength { get; private set; } + + /// + /// Number of bytes written to the cache. + /// + public ulong ProcessedLength { get; private set; } + + /// + /// Context of this cache writer used for logging. + /// + public LoggingContext Context { get; private set; } + + /// + /// Underlying stream the download bytes are written into. + /// + private Stream _contentStream; + + internal HTTPCacheContentWriter(HTTPCache cache, Hash128 hash, Stream contentStream, ulong expectedLength, LoggingContext loggingContext) + { + this.Cache = cache; + this.Hash = hash; + this._contentStream = contentStream; + this.ExpectedLength = expectedLength; + this.Context = loggingContext; + } + + /// + /// Writes content to the underlying stream. + /// + /// holding a reference to the data and containing information about the offset and count of the valid range of data. + public void Write(BufferSegment segment) + { + if (!this.Hash.isValid) + return; + + try + { + this._contentStream?.Write(segment.Data, segment.Offset, segment.Count); + this.ProcessedLength += (ulong)segment.Count; + + if (this.ProcessedLength > this.ExpectedLength) + { + if (!this.Cache.IsThereEnoughSpaceAfterMaintain(this.ProcessedLength, this.Context)) + { + HTTPManager.Logger.Information(nameof(HTTPCacheContentWriter), $"Not enough space({this.ProcessedLength:N0}) in cache({this.Cache.CacheSize:N0}), even after Maintain!", this.Context); + + this.Cache?.EndCache(this, false, this.Context); + } + } + } + catch (Exception ex) + { + HTTPManager.Logger.Warning(nameof(HTTPCacheContentWriter), $"{nameof(Write)}({segment}): {ex}", this.Context); + + // EndCache will call Close, we don't have to in this catch block + this.Cache?.EndCache(this, false, this.Context); + } + } + + /// + /// Close the underlying stream and invalidate the hash. + /// + internal void Close() + { + this._contentStream?.Close(); + this._contentStream = null; + + // this will set an invalid cache, further HTTPCaching.EndCache calls will return early. + this.Hash = new Hash128(); + } + + public override string ToString() => $"[{nameof(HTTPCacheContentWriter)} {Hash} {ProcessedLength:N0}]"; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs.meta new file mode 100644 index 00000000..738e6c41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f1a3db4ad5927624182f465b44a2f2ac +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheContentWriter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs new file mode 100644 index 00000000..3f62e033 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs @@ -0,0 +1,727 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Databases; +using Best.HTTP.Shared.Databases.Indexing; +using Best.HTTP.Shared.Databases.Indexing.Comparers; +using Best.HTTP.Shared.Databases.MetadataIndexFinders; +using Best.HTTP.Shared.Databases.Utils; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Threading; + +using UnityEngine; + +namespace Best.HTTP.Caching +{ + struct v128View + { + public ulong low; + public ulong high; + } + + /// + /// Possible lock-states a cache-content can be in. + /// + public enum LockTypes : byte + { + /// + /// No reads or writes are happening on the cached content. + /// + Unlocked, + + /// + /// There's one writer operating on the cached content. No other writes or reads allowed while this lock is held on the content. + /// + Write, + + /// + /// There's at least one read operation happening on the cached content. No writes allowed while this lock is held on the content. + /// + Read + } + + /// + /// Metadata stored for every cached content. It contains only limited data about the content to help early cache decision making and cache management. + /// + internal class CacheMetadata : Metadata + { + /// + /// Unique hash of the cached content, generated by . + /// + public UnityEngine.Hash128 Hash { get; set; } + + /// + /// Size of the stored content in bytes. + /// + public ulong ContentLength { get; set; } + + /// + /// When the last time the content is accessed. Also initialized when the initial download completes. + /// + public DateTime LastAccessTime { get; set; } + + /// + /// What kind of lock the content is currently in. + /// + public LockTypes Lock { get; set; } + + /// + /// Number of readers. + /// + public int ReadLockCount { get; set; } + + public unsafe override void SaveTo(Stream stream) + { + base.SaveTo(stream); + + var hash = this.Hash; + v128View view = *(v128View*)&hash; + + stream.EncodeUnsignedVariableByteInteger(view.low); + stream.EncodeUnsignedVariableByteInteger(view.high); + stream.EncodeUnsignedVariableByteInteger(ContentLength); + stream.EncodeSignedVariableByteInteger(LastAccessTime.ToBinary() >> CacheMetadataContentParser.PrecisionShift); + + // Only Write locks should persist as Reads doesn't alter the cached content + if (this.Lock == LockTypes.Write) + stream.EncodeUnsignedVariableByteInteger((byte)this.Lock); + else + stream.EncodeUnsignedVariableByteInteger((byte)LockTypes.Unlocked); + } + + public unsafe override void LoadFrom(Stream stream) + { + base.LoadFrom(stream); + + var hash = default(v128View); + hash.low = stream.DecodeUnsignedVariableByteInteger(); + hash.high = stream.DecodeUnsignedVariableByteInteger(); + + this.Hash = *(UnityEngine.Hash128*)&hash; + + this.ContentLength = stream.DecodeUnsignedVariableByteInteger(); + this.LastAccessTime = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << CacheMetadataContentParser.PrecisionShift); + + this.Lock = (LockTypes)stream.DecodeUnsignedVariableByteInteger(); + } + + public override string ToString() => $"[Metadata {Hash}, {ContentLength:N0}, {Lock}, {ReadLockCount}]"; + } + + /// + /// Possible caching flags that a `Cache-Control` header can send. + /// + [Flags] + public enum CacheFlags : byte + { + /// + /// No special treatment required. + /// + None = 0x00, + + /// + /// Indicates whether the entity must be revalidated with the server or can be serverd directly from the cache without touching the server when the content is considered stale. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + MustRevalidate = 0x01, + + /// + /// If it's true, the client always have to revalidate the cached content when it's stale. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + NoCache = 0x02 + } + + /// + /// Cached content associated with a . + /// + /// This is NOT the cached content received from the server! It's for storing caching values to decide on how the content can be used. + internal sealed class CacheMetadataContent + { + /// + /// ETag of the entity. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public string ETag; + + /// + /// LastModified date of the entity. Use ToString("r") to convert it to the format defined in RFC 1123. + /// + public DateTime LastModified = DateTime.MinValue; + + /// + /// When the cache will expire. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public DateTime Expires = DateTime.MinValue; + + /// + /// The age that came with the response + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public uint Age; + + /// + /// Maximum how long the entry should served from the cache without revalidation. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public uint MaxAge; + + /// + /// The Date that came with the response. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public DateTime Date = DateTime.MinValue; + + /// + /// It's a grace period to serve staled content without revalidation. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public uint StaleWhileRevalidate; + + /// + /// Allows the client to serve stale content if the server responds with an 5xx error. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public uint StaleIfError; + + /// + /// bool values packed into one single flag. + /// + public CacheFlags Flags = CacheFlags.None; + + /// + /// The value of the clock at the time of the request that resulted in the stored response. + /// + /// + /// More details can be found here: + /// + /// + /// + /// + public DateTime RequestTime = DateTime.MinValue; + + /// + /// The value of the clock at the time the response was received. + /// + public DateTime ResponseTime = DateTime.MinValue; + + public CacheMetadataContent() + { + } + + internal void From(Dictionary> headers) + { + this.ETag = headers.GetFirstHeaderValue("ETag").ToStr(this.ETag ?? string.Empty); + this.Expires = headers.GetFirstHeaderValue("Expires").ToDateTime(this.Expires); + if (this.Expires < DateTime.UtcNow) + this.Expires = DateTime.MinValue; + + this.LastModified = headers.GetFirstHeaderValue("Last-Modified").ToDateTime(DateTime.MinValue); + this.Age = headers.GetFirstHeaderValue("Age").ToUInt32(this.Age); + this.Date = headers.GetFirstHeaderValue("Date").ToDateTime(this.Date); + + // https://www.rfc-editor.org/rfc/rfc9111.html#section-4.2.1-4 + // When there is more than one value present for a given directive + // (e.g., two Expires header field lines or multiple Cache-Control: max-age directives), + // either the first occurrence should be used or the response should be considered stale. + var cacheControl = headers.GetFirstHeaderValue("cache-control"); + if (!string.IsNullOrEmpty(cacheControl)) + { + HeaderParser parser = new HeaderParser(cacheControl); + + if (parser.Values != null) + { + this.Flags = CacheFlags.None; + + for (int i = 0; i < parser.Values.Count; ++i) + { + var kvp = parser.Values[i]; + + switch (kvp.Key.ToLowerInvariant()) + { + // https://www.rfc-editor.org/rfc/rfc9111.html#name-max-age-2 + case "max-age": + if (kvp.HasValue) + { + // Some cache proxies will return float values + double maxAge; + if (double.TryParse(kvp.Value, out maxAge) && maxAge >= 0) + this.MaxAge = (uint)maxAge; + else + this.MaxAge = 0; + } + else + this.MaxAge = 0; + + // https://www.rfc-editor.org/rfc/rfc9111.html#section-5.3-8 + // https://www.rfc-editor.org/rfc/rfc9111.html#cache-response-directive.s-maxage + // If a response includes a Cache-Control header field with the max-age directive (Section 5.2.2.1), a recipient MUST ignore the Expires header field. + this.Expires = DateTime.MinValue; + break; + + // https://www.rfc-editor.org/rfc/rfc9111.html#name-must-revalidate + case "must-revalidate": this.Flags |= CacheFlags.MustRevalidate; break; + // https://www.rfc-editor.org/rfc/rfc9111.html#name-no-cache-2 + case "no-cache": this.Flags |= CacheFlags.NoCache; break; + // https://www.rfc-editor.org/rfc/rfc5861.html#section-3 + case "stale-while-revalidate": this.StaleWhileRevalidate = kvp.HasValue ? kvp.Value.ToUInt32(0) : 0; break; + // https://www.rfc-editor.org/rfc/rfc5861.html#section-4 + case "stale-if-error": this.StaleIfError = kvp.HasValue ? kvp.Value.ToUInt32(0) : 0; break; + } + } + } + + } + } + } + + internal sealed class CacheMetadataContentParser : IDiskContentParser + { + public const int PrecisionShift = 24; + + public void Encode(Stream stream, CacheMetadataContent content) + { + stream.EncodeUnsignedVariableByteInteger(content.MaxAge); + stream.WriteLengthPrefixedString(content.ETag); + stream.EncodeSignedVariableByteInteger(content.LastModified.ToBinary() >> PrecisionShift); + stream.EncodeSignedVariableByteInteger(content.Expires.ToBinary() >> PrecisionShift); + stream.EncodeUnsignedVariableByteInteger(content.Age); + stream.EncodeSignedVariableByteInteger(content.Date.ToBinary() >> PrecisionShift); + stream.EncodeUnsignedVariableByteInteger((byte)content.Flags); + stream.EncodeUnsignedVariableByteInteger(content.StaleWhileRevalidate); + stream.EncodeUnsignedVariableByteInteger(content.StaleIfError); + stream.EncodeSignedVariableByteInteger(content.RequestTime.ToBinary() >> PrecisionShift); + stream.EncodeSignedVariableByteInteger(content.ResponseTime.ToBinary() >> PrecisionShift); + } + + public CacheMetadataContent Parse(Stream stream, int length) + { + CacheMetadataContent content = new CacheMetadataContent(); + + content.MaxAge = (uint)stream.DecodeUnsignedVariableByteInteger(); + content.ETag = stream.ReadLengthPrefixedString(); + content.LastModified = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << PrecisionShift); + content.Expires = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << PrecisionShift); + content.Age = (uint)stream.DecodeUnsignedVariableByteInteger(); + content.Date = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << PrecisionShift); + content.Flags = (CacheFlags)stream.DecodeUnsignedVariableByteInteger(); + content.StaleWhileRevalidate = (uint)stream.DecodeUnsignedVariableByteInteger(); + content.StaleIfError = (uint)stream.DecodeUnsignedVariableByteInteger(); + content.RequestTime = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << PrecisionShift); + content.ResponseTime = DateTime.FromBinary(stream.DecodeSignedVariableByteInteger() << PrecisionShift); + + return content; + } + } + + internal sealed class CacheMetadataIndexingService : IndexingService + { + private AVLTree index_Hash = new AVLTree(new Hash128Comparer()); + + public override void Index(CacheMetadata metadata) + { + base.Index(metadata); + this.index_Hash.Add(metadata.Hash, metadata.Index); + } + + public override void Remove(CacheMetadata metadata) + { + base.Remove(metadata); + this.index_Hash.Remove(metadata.Hash); + } + + public override void Clear() + { + base.Clear(); + this.index_Hash.Clear(); + } + + public override IEnumerable GetOptimizedIndexes() => this.index_Hash.WalkHorizontal(); + + public bool ContainsHash(UnityEngine.Hash128 hash) => this.index_Hash.ContainsKey(hash); + + public List FindByHash(UnityEngine.Hash128 hash) => this.index_Hash.Find(hash); + } + + internal sealed class CacheMetadataService : MetadataService + { + public CacheMetadataService(IndexingService indexingService, IEmptyMetadataIndexFinder emptyMetadataIndexFinder) + : base(indexingService, emptyMetadataIndexFinder) + { + } + + public override CacheMetadata CreateFrom(Stream stream) + { + return base.CreateFrom(stream); + } + + public CacheMetadata Create(UnityEngine.Hash128 hash, CacheMetadataContent value, int filePos, int length) + { + var result = base.CreateDefault(value, filePos, length, (content, metadata) => { + metadata.Hash = hash; + }); + + return result; + } + } + + internal sealed class CacheDatabaseOptions : DatabaseOptions + { + public CacheDatabaseOptions() : base("CacheDatabase") + { + base.UseHashFile = false; + } + } + + internal sealed class HTTPCacheDatabase : Database + { + public HTTPCacheDatabase(string directory) + : this(directory, new CacheDatabaseOptions(), new CacheMetadataIndexingService()) + { + } + + private HTTPCacheDatabase(string directory, + DatabaseOptions options, + CacheMetadataIndexingService indexingService) + : base(directory, options, indexingService, new CacheMetadataContentParser(), new CacheMetadataService(indexingService, new FindDeletedMetadataIndexFinder())) + { + + } + + public CacheMetadataContent FindByHashAndUpdateRequestTime(UnityEngine.Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(FindByHashAndUpdateRequestTime)}({hash})", context); + + if (!hash.isValid) + return default; + + using var _ = new WriteLock(this.rwlock); + + var (content, metadata) = FindContentAndMetadata(hash); + + if (content != null) + { + content.RequestTime = DateTime.UtcNow; + + UpdateMetadataAndContent(metadata, content); + } + + return content; + } + + public bool TryAcquireWriteLock(Hash128 hash, Dictionary> headers, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(TryAcquireWriteLock)}({hash}, {headers?.Count})", context); + + if (!hash.isValid) + return false; + + using var _ = new WriteLock(this.rwlock); + + // FindMetadata filters out logically deleted entries, what we need here because we want to load it too. + var metadata = FindMetadata(hash); + CacheMetadataContent content = null; + if (metadata != null) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(TryAcquireWriteLock)} - Metadata found: {metadata}", context); + + if (metadata.Lock != LockTypes.Unlocked) + return false; + metadata.Lock = LockTypes.Write; + + content = this.FromMetadata(metadata); + content.From(headers); + + UpdateMetadataAndContent(metadata, content); + } + else + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(TryAcquireWriteLock)} - Creating new DB entry", context); + + content = new CacheMetadataContent(); + content.RequestTime = DateTime.UtcNow; + content.From(headers); + + (int filePos, int length) = this.DiskManager.Append(content); + metadata = this.MetadataService.Create(hash, content, filePos, length); + + metadata.Lock = LockTypes.Write; + } + + FlagDirty(1); + + return true; + } + + public bool Update(Hash128 hash, Dictionary> headers, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(Update)}({hash}, {headers?.Count})", context); + + if (!hash.isValid) + return false; + + using var _ = new WriteLock(this.rwlock); + + var (content, metadata) = FindContentAndMetadata(hash); + + if (content != null) + { + content.From(headers); + content.ResponseTime = DateTime.UtcNow; + + UpdateMetadataAndContent(metadata, content); + } + + return content != null; + } + + public void ReleaseWriteLock(Hash128 hash, ulong length, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(ReleaseWriteLock)}({hash}, {length:N0})", context); + + if (!hash.isValid) + return; + + using var _ = new WriteLock(this.rwlock); + + var (content, metadata) = FindContentAndMetadata(hash); + if (content == null) + { + HTTPManager.Logger.Warning(nameof(HTTPCacheDatabase), $"{nameof(ReleaseWriteLock)} - Couldn't find content!", context); + return; + } + + if (metadata.Lock != LockTypes.Write) + HTTPManager.Logger.Error(nameof(HTTPCacheDatabase), $"{nameof(ReleaseWriteLock)} - Is NOT Write Locked! {metadata}", context); + + metadata.Lock = LockTypes.Unlocked; + + if (content != null) + { + metadata.ContentLength = length; + + var now = DateTime.UtcNow; + metadata.LastAccessTime = now; + content.ResponseTime = now; + + UpdateMetadataAndContent(metadata, content); + } + + FlagDirty(1); + } + + public bool TryAcquireReadLock(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(TryAcquireReadLock)}({hash})", context); + + if (!hash.isValid) + return false; + + using var _ = new WriteLock(this.rwlock); + + var metadata = FindMetadata(hash); + if (metadata == null) + return false; + + if (metadata.Lock == LockTypes.Write) + return false; + + metadata.Lock = LockTypes.Read; + // we are behind a write lock, it's safe to increment it like this + metadata.ReadLockCount++; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(TryAcquireReadLock)} - {metadata}", context); + + return true; + } + + public void ReleaseReadLock(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(ReleaseReadLock)}({hash})", context); + + if (!hash.isValid) + return; + + using var _ = new WriteLock(this.rwlock); + + var metadata = FindMetadata(hash); + + if (metadata == null) + { + HTTPManager.Logger.Warning(nameof(HTTPCacheDatabase), $"{nameof(ReleaseReadLock)} - Couldn't find metadata!", context); + return; + } + + if (metadata.Lock != LockTypes.Read) + HTTPManager.Logger.Warning(nameof(HTTPCacheDatabase), $"{nameof(ReleaseReadLock)} - Is NOT Locked!", context); + + if (metadata.ReadLockCount == 0) + HTTPManager.Logger.Error(nameof(HTTPCacheDatabase), $"{nameof(ReleaseReadLock)} - ReadLockCount already zero!", context); + + if (--metadata.ReadLockCount == 0) + metadata.Lock = LockTypes.Unlocked; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(ReleaseReadLock)} - {metadata}", context); + } + + internal ulong Delete(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(Delete)}({hash})", context); + + if (!hash.isValid) + return 0; + + using var _ = new WriteLock(this.rwlock); + + // Don't use FindMetadata, because it would return null for a logically deleted metadata + // so DeleteMetadata wouldn't be called! + var byHash = this.IndexingService.FindByHash(hash); + if (byHash == null || byHash.Count == 0) + return 0; + + var metadata = this.MetadataService.Metadatas[byHash[0]]; + + if (metadata == null) + return 0; + + var contentLength = metadata.ContentLength; + + base.DeleteMetadata(metadata); + + return contentLength; + } + + public void EnterWriteLock(LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(EnterWriteLock)}()", context); + this.rwlock.EnterWriteLock(); + } + + public void ExitWriteLock(LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(ExitWriteLock)}()", context); + this.rwlock.ExitWriteLock(); + } + + public void UpdateLastAccessTime(Hash128 hash, LoggingContext context) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPCacheDatabase), $"{nameof(UpdateLastAccessTime)}({hash})", context); + + if (!hash.isValid) + return; + + using var _ = new WriteLock(this.rwlock); + + var metadata = FindMetadata(hash); + if (metadata != null) + { + metadata.LastAccessTime = DateTime.UtcNow; + FlagDirty(1); + } + } + + private CacheMetadata FindMetadata(Hash128 hash) + { + var byHash = this.IndexingService.FindByHash(hash); + if (byHash == null || byHash.Count == 0) + return null; + + var metadata = this.MetadataService.Metadatas[byHash[0]]; + + if (metadata != null && metadata.IsDeleted) + return null; + + return metadata; + } + + public (CacheMetadataContent, CacheMetadata) FindContentAndMetadataLocked(Hash128 hash) + { + using var _ = new WriteLock(this.rwlock); + return FindContentAndMetadata(hash); + } + + private (CacheMetadataContent, CacheMetadata) FindContentAndMetadata(Hash128 hash) + { + var byHash = this.IndexingService.FindByHash(hash); + if (byHash == null || byHash.Count == 0) + return (null, null); + + var metadata = this.MetadataService.Metadatas[byHash[0]]; + if (metadata != null && metadata.IsDeleted) + return (null, null); + + var content = this.FromMetadataIndex(metadata.Index); + return (content, metadata); + } + + private void UpdateMetadataAndContent(Metadata metadata, CacheMetadataContent content) + { + this.DiskManager.SaveChanged(metadata, content); + + FlagDirty(1); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs.meta new file mode 100644 index 00000000..f9a6cbe7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7dfaadcb592425e458ee6e074d4135c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheDatabase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs new file mode 100644 index 00000000..47a86c18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs @@ -0,0 +1,39 @@ +using System; + +namespace Best.HTTP.Caching +{ + /// + /// Represents the configuration options for the HTTP cache. + /// + public sealed class HTTPCacheOptions + { + /// + /// Gets or sets the maximum duration for which cached entries will be retained. + /// + public TimeSpan DeleteOlder { get; internal set; } = TimeSpan.MaxValue; + + /// + /// Gets or sets the maximum size, in bytes, that the cache can reach. + /// + public ulong MaxCacheSize { get; internal set; } = 512 * 1024 * 1024; + + /// + /// Initializes a new instance of the class with default settings. + /// + public HTTPCacheOptions() + { + // Default constructor with no arguments. + } + + /// + /// Initializes a new instance of the class with custom settings. + /// + /// The maximum age for cached entries to be retained. + /// The maximum size, in bytes, that the cache can reach. + public HTTPCacheOptions(TimeSpan deleteOlder, ulong maxCacheSize) + { + this.DeleteOlder = deleteOlder; + this.MaxCacheSize = maxCacheSize; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs.meta new file mode 100644 index 00000000..333116d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d178cd9aca1ad2e45bbf4112596025e1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Caching/HTTPCacheOptions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies.meta new file mode 100644 index 00000000..0282eb65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: dc9fe3cd5cd50b844b941acec67f5e60 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs new file mode 100644 index 00000000..9dc15abd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs @@ -0,0 +1,417 @@ +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.Cookies +{ + /// + /// The Cookie implementation based on RFC-6265. + /// + public sealed class Cookie : IComparable, IEquatable + { + private const int Version = 1; + + #region Public Properties + + /// + /// The name of the cookie. + /// + public string Name { get; private set; } + + /// + /// The value of the cookie. + /// + public string Value { get; private set; } + + /// + /// The Date when the Cookie is registered. + /// + public DateTime Date { get; internal set; } + + /// + /// When this Cookie last used in a request. + /// + public DateTime LastAccess { get; set; } + + /// + /// The Expires attribute indicates the maximum lifetime of the cookie, represented as the date and time at which the cookie expires. + /// The user agent is not required to retain the cookie until the specified date has passed. + /// In fact, user agents often evict cookies due to memory pressure or privacy concerns. + /// + public DateTime Expires { get; private set; } + + /// + /// The Max-Age attribute indicates the maximum lifetime of the cookie, represented as the number of seconds until the cookie expires. + /// The user agent is not required to retain the cookie for the specified duration. + /// In fact, user agents often evict cookies due to memory pressure or privacy concerns. + /// + public long MaxAge { get; private set; } + + /// + /// If a cookie has neither the Max-Age nor the Expires attribute, the user agent will retain the cookie until "the current session is over". + /// + public bool IsSession { get; private set; } + + /// + /// The Domain attribute specifies those hosts to which the cookie will be sent. + /// For example, if the value of the Domain attribute is "example.com", the user agent will include the cookie + /// in the Cookie header when making HTTP requests to example.com, www.example.com, and www.corp.example.com. + /// If the server omits the Domain attribute, the user agent will return the cookie only to the origin server. + /// + public string Domain { get; internal set; } + + /// + /// The scope of each cookie is limited to a set of paths, controlled by the Path attribute. + /// If the server omits the Path attribute, the user agent will use the "directory" of the request-uri's path component as the default value. + /// + public string Path { get; internal set; } + + /// + /// The Secure attribute limits the scope of the cookie to "secure" channels (where "secure" is defined by the user agent). + /// When a cookie has the Secure attribute, the user agent will include the cookie in an HTTP request only if the request is + /// transmitted over a secure channel (typically HTTP over Transport Layer Security (TLS)). + /// + public bool IsSecure { get; private set; } + + /// + /// The HttpOnly attribute limits the scope of the cookie to HTTP requests. + /// In particular, the attribute instructs the user agent to omit the cookie when providing access to + /// cookies via "non-HTTP" APIs (such as a web browser API that exposes cookies to scripts). + /// + public bool IsHttpOnly { get; private set; } + + /// + /// SameSite prevents the browser from sending this cookie along with cross-site requests. + /// The main goal is mitigate the risk of cross-origin information leakage. + /// It also provides some protection against cross-site request forgery attacks. + /// Possible values for the flag are lax or strict. + /// + /// + /// More details can be found here: + /// + /// SameSite cookies explained + /// + /// + public string SameSite { get; private set; } + + #endregion + + #region Public Constructors + + public Cookie(string name, string value) + : this(name, value, "/", string.Empty) + { } + + public Cookie(string name, string value, string path) + : this(name, value, path, string.Empty) + { } + + public Cookie(string name, string value, string path, string domain) + : this() // call the parameter-less constructor to set default values + { + this.Name = name; + this.Value = value; + this.Path = path; + this.Domain = domain; + } + + public Cookie(Uri uri, string name, string value, DateTime expires, bool isSession = true) + : this(name, value, uri.AbsolutePath, uri.Host) + { + this.Expires = expires; + this.IsSession = isSession; + this.Date = DateTime.UtcNow; + } + + public Cookie(Uri uri, string name, string value, long maxAge = -1, bool isSession = true) + : this(name, value, uri.AbsolutePath, uri.Host) + { + this.MaxAge = maxAge; + this.IsSession = isSession; + this.Date = DateTime.UtcNow; + this.SameSite = "none"; + } + + #endregion + + internal Cookie() + { + // If a cookie has neither the Max-Age nor the Expires attribute, the user agent will retain the cookie + // until "the current session is over" (as defined by the user agent). + IsSession = true; + MaxAge = -1; + LastAccess = DateTime.UtcNow; + } + + public string ToHeaderValue() => string.Concat(this.Name, "=", this.Value); + + public bool WillExpireInTheFuture() + { + // No Expires or Max-Age value sent from the server, we will fake the return value so we will not delete a freshly received cookie + if (IsSession) + return true; + + // If a cookie has both the Max-Age and the Expires attribute, the Max-Age attribute has precedence and controls the expiration date of the cookie. + return MaxAge != -1 ? + Math.Max(0, (long)(DateTime.UtcNow - Date).TotalSeconds) < MaxAge : + Expires > DateTime.UtcNow; + } + + /// + /// Guess the storage size of the cookie. + /// + /// + public uint GuessSize() + { + return (uint)((this.Name != null ? this.Name.Length * sizeof(char) : 0) + + (this.Value != null ? this.Value.Length * sizeof(char) : 0) + + (this.Domain != null ? this.Domain.Length * sizeof(char) : 0) + + (this.Path != null ? this.Path.Length * sizeof(char) : 0) + + (this.SameSite != null ? this.SameSite.Length * sizeof(char) : 0) + + (sizeof(long) * 4) + + (sizeof(bool) * 3)); + } + + public static Cookie Parse(string header, Uri defaultDomain, LoggingContext context) + { + Cookie cookie = new Cookie(); + try + { + var kvps = ParseCookieHeader(header); + + foreach (var kvp in kvps) + { + switch (kvp.Key.ToLowerInvariant()) + { + case "path": + // https://datatracker.ietf.org/doc/html/rfc6265#section-5.1.4 + // If the attribute-value is empty or if the first character of the attribute-value is not %x2F ("/"): + // Let cookie-path be the default-path. + cookie.Path = string.IsNullOrEmpty(kvp.Value) || !kvp.Value.StartsWith("/") ? "/" : cookie.Path = kvp.Value; + break; + + case "domain": + // If the attribute-value is empty, the behavior is undefined. However, the user agent SHOULD ignore the cookie-av entirely. + if (string.IsNullOrEmpty(kvp.Value)) + return null; + + // If the first character of the attribute-value string is %x2E ("."): + // Let cookie-domain be the attribute-value without the leading %x2E (".") character. + cookie.Domain = kvp.Value.StartsWith(".") ? kvp.Value.Substring(1) : kvp.Value; + break; + + case "expires": + cookie.Expires = kvp.Value.ToDateTime(DateTime.FromBinary(0)); + cookie.IsSession = false; + break; + + case "max-age": + cookie.MaxAge = kvp.Value.ToInt64(-1); + cookie.IsSession = false; + break; + + case "secure": + cookie.IsSecure = true; + break; + + case "httponly": + cookie.IsHttpOnly = true; + break; + + case "samesite": + cookie.SameSite = kvp.Value; + break; + + default: + // check whether name is already set to avoid overwriting it with a non-listed setting + if (string.IsNullOrEmpty(cookie.Name)) + { + cookie.Name = kvp.Key; + cookie.Value = kvp.Value; + } + break; + } + } + + // Some user agents provide users the option of preventing persistent storage of cookies across sessions. + // When configured thusly, user agents MUST treat all received cookies as if the persistent-flag were set to false. + if (CookieJar.IsSessionOverride) + cookie.IsSession = true; + + // http://tools.ietf.org/html/rfc6265#section-4.1.2.3 + // WARNING: Some existing user agents treat an absent Domain attribute as if the Domain attribute were present and contained the current host name. + // For example, if example.com returns a Set-Cookie header without a Domain attribute, these user agents will erroneously send the cookie to www.example.com as well. + if (string.IsNullOrEmpty(cookie.Domain)) + cookie.Domain = defaultDomain.Host; + + // http://tools.ietf.org/html/rfc6265#section-5.3 section 7: + // If the cookie-attribute-list contains an attribute with an attribute-name of "Path", + // set the cookie's path to attribute-value of the last attribute in the cookie-attribute-list with an attribute-name of "Path". + // __Otherwise, set the cookie's path to the default-path of the request-uri.__ + if (string.IsNullOrEmpty(cookie.Path)) + { + // https://datatracker.ietf.org/doc/html/rfc6265#section-5.1.4 + // 1. Let uri-path be the path portion of the request-uri if such a portion exists + cookie.Path = defaultDomain.AbsolutePath; + + // 2. If the uri-path is empty or if the first character of the uri-path is not a % x2F("/") character, + // output % x2F("/") and skip the remaining steps. + // Uri's AbsolutePath always emits at least a '/' character. + + // 3. If the uri-path contains no more than one %x2F ("/") character, + // output % x2F("/") and skip the remaining step. + + int slashCount = 1; + int lastSlashIdx = 0; + for (int i = 1; i < cookie.Path.Length; i++) + { + if (cookie.Path[i] == '/') + { + slashCount++; + lastSlashIdx = i; + } + } + + if (slashCount == 1) + { + cookie.Path = "/"; + } + else + { + // 4. Output the characters of the uri-path from the first character up to, + // but not including, the right-most % x2F("/"). + + cookie.Path = cookie.Path.Substring(0, lastSlashIdx); + } + } + + cookie.Date = cookie.LastAccess = DateTime.UtcNow; + } + catch (Exception ex) + { + HTTPManager.Logger.Warning("Cookie", "Parse - Couldn't parse header: " + header + " exception: " + ex.ToString() + " " + ex.StackTrace, context); + } + return cookie; + } + + #region Save & Load + + internal void SaveTo(BinaryWriter stream) + { + stream.Write(Version); + stream.Write(Name ?? string.Empty); + stream.Write(Value ?? string.Empty); + stream.Write(Date.ToBinary()); + stream.Write(LastAccess.ToBinary()); + stream.Write(Expires.ToBinary()); + stream.Write(MaxAge); + stream.Write(IsSession); + stream.Write(Domain ?? string.Empty); + stream.Write(Path ?? string.Empty); + stream.Write(IsSecure); + stream.Write(IsHttpOnly); + } + + internal void LoadFrom(BinaryReader stream) + { + /*int version = */stream.ReadInt32(); + this.Name = stream.ReadString(); + this.Value = stream.ReadString(); + this.Date = DateTime.FromBinary(stream.ReadInt64()); + this.LastAccess = DateTime.FromBinary(stream.ReadInt64()); + this.Expires = DateTime.FromBinary(stream.ReadInt64()); + this.MaxAge = stream.ReadInt64(); + this.IsSession = stream.ReadBoolean(); + this.Domain = stream.ReadString(); + this.Path = stream.ReadString(); + this.IsSecure = stream.ReadBoolean(); + this.IsHttpOnly = stream.ReadBoolean(); + } + + #endregion + + #region Overrides and new Equals function + + public override string ToString() + => $"[Cookie '{this.Name}' = '{this.Value}', {this.IsSession}, '{this.Path}']"; + + public override bool Equals(object obj) + { + if (obj == null) + return false; + + return this.Equals(obj as Cookie); + } + + public bool Equals(Cookie cookie) + { + if (cookie == null) + return false; + + if (Object.ReferenceEquals(this, cookie)) + return true; + + return this.Name.Equals(cookie.Name, StringComparison.Ordinal) && + ((this.Domain == null && cookie.Domain == null) || this.Domain.Equals(cookie.Domain, StringComparison.Ordinal)) && + ((this.Path == null && cookie.Path == null) || this.Path.Equals(cookie.Path, StringComparison.Ordinal)); + } + + public override int GetHashCode() + { + return this.ToString().GetHashCode(); + } + + #endregion + + #region Private Helper Functions + + private static string ReadValue(string str, ref int pos) + { + string result = string.Empty; + if (str == null) + return result; + + return str.Read(ref pos, ';'); + } + + private static List ParseCookieHeader(string str) + { + List result = new List(); + + if (str == null) + return result; + + int idx = 0; + + // process the rest of the text + while (idx < str.Length) + { + // Read key + string key = str.Read(ref idx, (ch) => ch != '=' && ch != ';').Trim(); + HeaderValue qp = new HeaderValue(key); + + if (idx < str.Length && str[idx - 1] == '=') + qp.Value = ReadValue(str, ref idx); + + result.Add(qp); + } + + return result; + } + + #endregion + + #region IComparable implementation + + public int CompareTo(Cookie other) + { + return this.LastAccess.CompareTo(other.LastAccess); + } + + #endregion + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs.meta new file mode 100644 index 00000000..b071ee86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e66d7566eee7c6245bb8a838fe4b3286 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/Cookie.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs new file mode 100644 index 00000000..30f59526 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs @@ -0,0 +1,677 @@ +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.FileSystem; + +using System; +using System.Collections.Generic; +using System.Threading; + +namespace Best.HTTP.Cookies +{ + /// + /// The Cookie Jar implementation based on RFC 6265. + /// + public static class CookieJar + { + /// + /// Maximum size of the Cookie Jar in bytes. It's default value is 10485760 (10 MB). + /// + public static uint MaximumSize { get; set; } = 10 * 1024 * 1024; + + // Version of the cookie store. It may be used in a future version for maintaining compatibility. + private const int Version = 1; + + /// + /// Returns true if File apis are supported. + /// + public static bool IsSavingSupported + { + get + { + if (IsSupportCheckDone) + return _isSavingSupported; + + try + { +#if UNITY_WEBGL && !UNITY_EDITOR + _isSavingSupported = false; +#else + HTTPManager.IOService.DirectoryExists(HTTPManager.GetRootSaveFolder()); + _isSavingSupported = true; +#endif + } + catch + { + _isSavingSupported = false; + + HTTPManager.Logger.Warning(nameof(CookieJar), "Cookie saving and loading disabled!"); + } + finally + { + IsSupportCheckDone = true; + } + + return _isSavingSupported; + } + } + + /// + /// The plugin will delete cookies that are accessed this threshold ago. Its default value is 7 days. + /// + public static TimeSpan AccessThreshold = TimeSpan.FromDays(7); + + /// + /// If this property is set to true, then new cookies treated as session cookies and these cookies are not saved to disk. Its default value is false. + /// + public static bool IsSessionOverride = false; + + /// + /// Enabled or disables storing and handling of cookies. If set to false, HTTPRequests aren't searched for cookies and no cookies will be set for s. + /// + public static bool IsEnabled = true; + + #region Privates + + /// + /// List of the Cookies + /// + private static List Cookies = new List(); + private static string CookieFolder { get; set; } + private static string LibraryPath { get; set; } + + /// + /// Synchronization object for thread safety. + /// + private static ReaderWriterLockSlim rwLock = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + private static bool _isSavingSupported; + private static bool IsSupportCheckDone; + + private static bool Loaded; + private static RunOnceOnMainThread _saveLibraryRunner = new RunOnceOnMainThread(Persist, null); + + #endregion + + #region Internal Functions + + internal static void SetupFolder() + { + if (!CookieJar.IsSavingSupported) + return; + + try + { + if (string.IsNullOrEmpty(CookieFolder) || string.IsNullOrEmpty(LibraryPath)) + { + CookieFolder = System.IO.Path.Combine(HTTPManager.GetRootSaveFolder(), "Cookies"); + LibraryPath = System.IO.Path.Combine(CookieFolder, "Library"); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetupFolder)}() - {nameof(LibraryPath)}: '{LibraryPath}'"); + } + } + catch + { } + } + + /// + /// Will set or update all cookies from the response object. + /// + internal static bool SetFromRequest(HTTPResponse response) + { + if (response == null || !IsEnabled) + return false; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetFromRequest)}({response})", response.Context); + + List newCookies = new List(); + var setCookieHeaders = response.GetHeaderValues("set-cookie"); + + // No cookies. :'( + if (setCookieHeaders == null) + return false; + + foreach (var cookieHeader in setCookieHeaders) + { + Cookie cookie = Cookie.Parse(cookieHeader, response.Request.CurrentUri, response.Request.Context); + if (cookie != null) + { + rwLock.EnterWriteLock(); + try + { + int idx; + var old = Find(cookie, out idx); + + // if no value for the cookie or already expired then the server asked us to delete the cookie + bool expired = string.IsNullOrEmpty(cookie.Value) || !cookie.WillExpireInTheFuture(); + + if (!expired) + { + // no old cookie, add it straight to the list + if (old == null) + { + Cookies.Add(cookie); + + newCookies.Add(cookie); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetFromRequest)}({response}) - new cookie: {cookie}", response.Context); + } + else + { + // Update the creation-time of the newly created cookie to match the creation-time of the old-cookie. + cookie.Date = old.Date; + Cookies[idx] = cookie; + + newCookies.Add(cookie); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetFromRequest)}({response}) - refresh cookie: {cookie}", response.Context); + } + } + else if (idx != -1) // delete the cookie + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetFromRequest)}({response}) - deleting cookie: {Cookies[idx]}", response.Context); + + Cookies.RemoveAt(idx); + } + } + catch (Exception ex) when (HTTPManager.Logger.IsDiagnostic) + { + HTTPManager.Logger.Exception(nameof(CookieJar), $"{nameof(SetFromRequest)}({response})", ex, response.Context); + } + finally + { + rwLock.ExitWriteLock(); + } + } + } + + _saveLibraryRunner.Subscribe(); + + return true; + } + + internal static void SetupRequest(HTTPRequest request) + { + if (!IsEnabled) + return; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(SetFromRequest)}({request})", request.Context); + + // Cookies + // User added cookies are sent even when IsCookiesEnabled is set to false + List cookies = CookieJar.Get(request.CurrentUri); + + // http://tools.ietf.org/html/rfc6265#section-5.4 + // -When the user agent generates an HTTP request, the user agent MUST NOT attach more than one Cookie header field. + if (cookies != null && cookies.Count > 0) + { + // Room for improvement: + // 2. The user agent SHOULD sort the cookie-list in the following order: + // * Cookies with longer paths are listed before cookies with shorter paths. + // * Among cookies that have equal-length path fields, cookies with earlier creation-times are listed before cookies with later creation-times. + + bool first = true; + string cookieStr = string.Empty; + + bool isSecureProtocolInUse = HTTPProtocolFactory.IsSecureProtocol(request.CurrentUri); + + foreach (var cookie in cookies) + if (!cookie.IsSecure || (cookie.IsSecure && isSecureProtocolInUse)) + { + if (!first) + cookieStr += "; "; + else + first = false; + + cookieStr += cookie.ToHeaderValue(); + + // 3. Update the last-access-time of each cookie in the cookie-list to the current date and time. + cookie.LastAccess = DateTime.UtcNow; + } + + if (!string.IsNullOrEmpty(cookieStr)) + request.SetHeader("Cookie", cookieStr); + } + } + + /// + /// Deletes all expired or 'old' cookies, and will keep the sum size of cookies under the given size. + /// + internal static void Maintain(bool sendEvent) + { + // It's not the same as in the rfc: + // http://tools.ietf.org/html/rfc6265#section-5.3 + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Maintain)}({sendEvent})"); + + rwLock.EnterWriteLock(); + try + { + uint size = 0; + + for (int i = 0; i < Cookies.Count;) + { + var cookie = Cookies[i]; + + // Remove expired or not used cookies + if (!cookie.WillExpireInTheFuture() || (cookie.LastAccess + AccessThreshold) < DateTime.UtcNow) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Maintain)}({sendEvent}) - removing expired cookie: {cookie}"); + + Cookies.RemoveAt(i); + } + else + { + if (!cookie.IsSession) + size += cookie.GuessSize(); + i++; + } + } + + if (size > MaximumSize) + { + Cookies.Sort(); + + while (size > MaximumSize && Cookies.Count > 0) + { + var cookie = Cookies[0]; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Maintain)}({sendEvent}) - removing cookie: {cookie}"); + + Cookies.RemoveAt(0); + + size -= cookie.GuessSize(); + } + } + } + catch + { } + finally + { + rwLock.ExitWriteLock(); + } + + if (sendEvent) + _saveLibraryRunner.Subscribe(); + } + + /// + /// Saves the Cookie Jar to a file. + /// + /// Not implemented under Unity WebPlayer + internal static void Persist() + { + if (!IsSavingSupported) + return; + + if (!Loaded) + return; + + if (!IsEnabled) + return; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Persist)}()"); + + // Delete any expired cookie + Maintain(false); + + rwLock.EnterWriteLock(); + try + { + if (!HTTPManager.IOService.DirectoryExists(CookieFolder)) + HTTPManager.IOService.DirectoryCreate(CookieFolder); + + using (var fs = HTTPManager.IOService.CreateFileStream(LibraryPath, FileStreamModes.Create)) + using (var bw = new System.IO.BinaryWriter(fs)) + { + bw.Write(Version); + + // Count how many non-session cookies we have + int count = 0; + foreach (var cookie in Cookies) + if (!cookie.IsSession) + count++; + + bw.Write(count); + + // Save only the persistable cookies + foreach (var cookie in Cookies) + if (!cookie.IsSession) + cookie.SaveTo(bw); + } + } + catch + { } + finally + { + rwLock.ExitWriteLock(); + } + } + + /// + /// Load previously persisted cookie library from the file. + /// + internal static void Load() + { + if (!IsSavingSupported) + return; + + if (Loaded) + return; + + if (!IsEnabled) + return; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Load)}()"); + + SetupFolder(); + + rwLock.EnterWriteLock(); + try + { + Cookies.Clear(); + + if (!HTTPManager.IOService.DirectoryExists(CookieFolder)) + HTTPManager.IOService.DirectoryCreate(CookieFolder); + + if (!HTTPManager.IOService.FileExists(LibraryPath)) + return; + + using (var fs = HTTPManager.IOService.CreateFileStream(LibraryPath, FileStreamModes.OpenRead)) + using (var br = new System.IO.BinaryReader(fs)) + { + /*int version = */br.ReadInt32(); + int cookieCount = br.ReadInt32(); + + for (int i = 0; i < cookieCount; ++i) + { + Cookie cookie = new Cookie(); + cookie.LoadFrom(br); + + if (cookie.WillExpireInTheFuture()) + Cookies.Add(cookie); + } + } + } + catch + { + Cookies.Clear(); + } + finally + { + Loaded = true; + rwLock.ExitWriteLock(); + } + } + + #endregion + + #region Public Functions + + /// + /// Returns all Cookies that corresponds to the given Uri. + /// + public static List Get(Uri uri) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Get)}({uri})"); + + Load(); + + rwLock.EnterReadLock(); + try + { + List result = null; + + for (int i = 0; i < Cookies.Count; ++i) + { + Cookie cookie = Cookies[i]; + + if (cookie == null) + continue; + + bool willExpireInTheFuture = cookie.WillExpireInTheFuture(); + bool domainMatch = uri.Host.IndexOf(cookie.Domain) != -1 || string.Format("{0}:{1}", uri.Host, uri.Port).IndexOf(cookie.Domain) != -1; + + if (willExpireInTheFuture && domainMatch) + { + string requestPath = uri.AbsolutePath; + + // https://datatracker.ietf.org/doc/html/rfc6265#section-5.1.4 + // A request-path path-matches a given cookie-path if at least one of + // the following conditions holds: + // o The cookie-path and the request-path are identical. + bool exactMatch = cookie.Path.Equals(requestPath, StringComparison.Ordinal); + + // o The cookie-path is a prefix of the request-path, and the last + // character of the cookie-path is %x2F ("/"). + bool prefixMatch = cookie.Path[cookie.Path.Length - 1] == '/' && requestPath.StartsWith(cookie.Path, StringComparison.Ordinal); + + // o The cookie-path is a prefix of the request-path, and the first + // character of the request-path that is not included in the cookie- + // path is a %x2F ("/") character. + bool prefixMatch2 = requestPath.Length > cookie.Path.Length && + requestPath.StartsWith(cookie.Path, StringComparison.Ordinal) && + requestPath[cookie.Path.Length] == '/'; + + if (exactMatch || prefixMatch || prefixMatch2) + { + if (result == null) + result = new List(); + + result.Add(cookie); + } + } + } + + return result; + } + finally + { + rwLock.ExitReadLock(); + } + } + + /// + /// Will add a new, or overwrite an old cookie if already exists. + /// + public static void Set(Uri uri, Cookie cookie) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Set)}({uri}, {cookie})"); + + cookie.Domain = uri.Host; + cookie.Path = uri.AbsolutePath; + + Set(cookie); + } + + /// + /// Will add a new, or overwrite an old cookie if already exists. + /// + public static void Set(Cookie cookie) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Set)}({cookie})"); + + Load(); + + rwLock.EnterWriteLock(); + try + { + int idx; + Find(cookie, out idx); + + if (idx >= 0) + Cookies[idx] = cookie; + else + Cookies.Add(cookie); + } + finally + { + rwLock.ExitWriteLock(); + } + + _saveLibraryRunner.Subscribe(); + } + + public static List GetAll() + { + Load(); + + return Cookies; + } + + /// + /// Deletes all cookies from the Jar. + /// + public static void Clear() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Clear)}()"); + + Load(); + + rwLock.EnterWriteLock(); + try + { + Cookies.Clear(); + } + finally + { + rwLock.ExitWriteLock(); + } + + Persist(); + } + + /// + /// Removes cookies that older than the given parameter. + /// + public static void Clear(TimeSpan olderThan) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Clear)}({olderThan})"); + + Load(); + + rwLock.EnterWriteLock(); + try + { + for (int i = 0; i < Cookies.Count;) + { + var cookie = Cookies[i]; + + // Remove expired or not used cookies + if (!cookie.WillExpireInTheFuture() || (cookie.Date + olderThan) < DateTime.UtcNow) + Cookies.RemoveAt(i); + else + i++; + } + } + finally + { + rwLock.ExitWriteLock(); + } + + Persist(); + } + + /// + /// Removes cookies that matches to the given domain. + /// + public static void Clear(string domain) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Clear)}({domain})"); + + Load(); + + rwLock.EnterWriteLock(); + try + { + for (int i = 0; i < Cookies.Count;) + { + var cookie = Cookies[i]; + + // Remove expired or not used cookies + if (!cookie.WillExpireInTheFuture() || cookie.Domain.IndexOf(domain) != -1) + Cookies.RemoveAt(i); + else + i++; + } + } + finally + { + rwLock.ExitWriteLock(); + } + + Persist(); + } + + public static void Remove(Uri uri, string name) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(CookieJar), $"{nameof(Remove)}({uri}, {name})"); + + Load(); + + rwLock.EnterWriteLock(); + try + { + for (int i = 0; i < Cookies.Count;) + { + var cookie = Cookies[i]; + + if (cookie.Name.Equals(name, StringComparison.OrdinalIgnoreCase) && uri.Host.IndexOf(cookie.Domain) != -1) + Cookies.RemoveAt(i); + else + i++; + } + } + finally + { + rwLock.ExitWriteLock(); + } + + _saveLibraryRunner.Subscribe(); + } + + #endregion + + #region Private Helper Functions + + /// + /// Find and return a Cookie and his index in the list. + /// + private static Cookie Find(Cookie cookie, out int idx) + { + for (int i = 0; i < Cookies.Count; ++i) + { + Cookie c = Cookies[i]; + + if (c.Equals(cookie)) + { + idx = i; + return c; + } + } + + idx = -1; + return null; + } + + #endregion + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs.meta new file mode 100644 index 00000000..30dde168 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0788a5d8bbeea264a815fa46ec0012cc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Cookies/CookieJar.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs new file mode 100644 index 00000000..8a09e8a4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs @@ -0,0 +1,127 @@ +namespace Best.HTTP +{ + /// + /// Represents the HTTP methods used in HTTP requests. + /// + public enum HTTPMethods : int + { + /// + /// The GET method means retrieve whatever information (in the form of an entity) is identified by the Request-URI. + /// If the Request-URI refers to a data-producing process, it is the produced data which shall be returned as the + /// entity in the response and not the source text of the process, unless that text happens to be the output of the process. + /// + Get, + + /// + /// The HEAD method is identical to GET except that the server MUST NOT return a message-body in the response. + /// The metainformation contained in the HTTP headers in response to a HEAD request SHOULD be identical to the information sent in response to a GET request. + /// This method can be used for obtaining metainformation about the entity implied by the request without transferring the entity-body itself. + /// This method is often used for testing hypertext links for validity, accessibility, and recent modification. + /// + Head, + + /// + /// The POST method is used to request that the origin server accept the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI in the Request-Line. + /// POST is designed to allow a uniform method to cover the following functions: + /// + /// Annotation of existing resources; + /// Posting a message to a bulletin board, newsgroup, mailing list, or similar group of articles; + /// Providing a block of data, such as the result of submitting a form, to a data-handling process; + /// Extending a database through an append operation. + /// + /// The actual function performed by the POST method is determined by the server and is usually dependent on the Request-URI. + /// The posted entity is subordinate to that URI in the same way that a file is subordinate to a directory containing it, + /// a news article is subordinate to a newsgroup to which it is posted, or a record is subordinate to a database. + /// The action performed by the POST method might not result in a resource that can be identified by a URI. In this case, + /// either 200 (OK) or 204 (No Content) is the appropriate response status, depending on whether or not the response includes an entity that describes the result. + /// + Post, + + /// + /// The PUT method requests that the enclosed entity be stored under the supplied Request-URI. + /// If the Request-URI refers to an already existing resource, the enclosed entity SHOULD be considered as a modified version of the one residing on the origin server. + /// If the Request-URI does not point to an existing resource, and that URI is capable of being defined as a new resource by the requesting user agent, + /// the origin server can create the resource with that URI. If a new resource is created, the origin server MUST inform the user agent via the 201 (Created) response. + /// If an existing resource is modified, either the 200 (OK) or 204 (No Content) response codes SHOULD be sent to indicate successful completion of the request. + /// If the resource could not be created or modified with the Request-URI, an appropriate error response SHOULD be given that reflects the nature of the problem. + /// The recipient of the entity MUST NOT ignore any Content-* (e.g. Content-Range) headers that it does not understand or implement and MUST return a 501 (Not Implemented) response in such cases. + /// + Put, + + /// + /// The DELETE method requests that the origin server delete the resource identified by the Request-URI. This method MAY be overridden by human intervention (or other means) on the origin server. + /// The client cannot be guaranteed that the operation has been carried out, even if the status code returned from the origin server indicates that the action has been completed successfully. + /// However, the server SHOULD NOT indicate success unless, at the time the response is given, it intends to delete the resource or move it to an inaccessible location. + /// A successful response SHOULD be 200 (OK) if the response includes an entity describing the status, 202 (Accepted) if the action has not yet been enacted, or 204 (No Content) + /// if the action has been enacted but the response does not include an entity. + /// + Delete, + + /// + /// The PATCH method requests that a set of changes described in the request entity be applied to the resource identified by the Request-URI. + /// The set of changes is represented in a format called a "patchdocument" identified by a media type. If the Request-URI does not point to an existing resource, + /// the server MAY create a new resource, depending on the patch document type (whether it can logically modify a null resource) and permissions, etc. + /// + /// + /// More details can be found here: + /// + /// RFC-5789 + /// When should we use the PATCH HTTP method? + /// + /// + Patch, + + /// + /// The HTTP TRACE method is used to perform a message loop-back test along the path to the target resource. + /// + Trace, + + /// + /// The HTTP MERGE method is used to apply modifications to an existing resource. + /// The MERGE HTTP method is not as commonly used as other methods like GET, POST, or PUT. + /// It's often used in specific WebDAV (Web Distributed Authoring and Versioning) scenarios. + /// + Merge, + + /// + /// The HTTP OPTIONS method requests permitted communication options for a given URL or server. + /// A client can specify a URL with this method, or an asterisk (*) to refer to the entire server. + /// + /// + /// More details can be found here: + /// + /// Mozilla Developer Networks - OPTIONS + /// + /// + Options, + + /// + /// The CONNECT method is primarily used in the context of HTTP proxies to establish a network connection through the proxy to a target host. + /// It is used in the context of the HTTP CONNECT tunneling method. + /// + /// + /// More details can be found here: + /// + /// RFC-2616 + /// RFC-8441 + /// + /// + Connect, + + /// + /// The HTTP QUERY method is used to retrieve data based on a query parameter or search criteria. + /// The QUERY method is not a standard HTTP method, and its usage may vary depending on the specific application or API you are working with. + /// It might be used for querying data or resources with specific parameters. + /// Details about the QUERY method would depend on the API or service you are interacting with. + /// You should refer to the documentation or specifications provided by the API/service provider. + /// + /// + /// More details can be found here: + /// + /// HTTP's New Method For Data APIs: HTTP QUERY + /// The HTTP QUERY Method (Draft) + /// + /// + Query + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs.meta new file mode 100644 index 00000000..1671aa15 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d27fd3bdca345a47b10b03334d3cd91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/HTTPMethods.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs new file mode 100644 index 00000000..11f67a86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs @@ -0,0 +1,55 @@ +namespace Best.HTTP +{ + /// + /// Represents an HTTP range that specifies the byte range of a response content, received as an answer for a range-request. + /// + public sealed class HTTPRange + { + /// + /// Gets the position of the first byte in the range that the server sent. + /// + public long FirstBytePos { get; private set; } + + /// + /// Gets the position of the last byte in the range that the server sent. + /// + public long LastBytePos { get; private set; } + + /// + /// Gets the total length of the full entity-body on the server. Returns -1 if this length is unknown or difficult to determine. + /// + public long ContentLength { get; private set; } + + /// + /// Gets a value indicating whether the HTTP range is valid. + /// + public bool IsValid { get; private set; } + + internal HTTPRange() + { + this.ContentLength = -1; + this.IsValid = false; + } + + internal HTTPRange(int contentLength) + { + this.ContentLength = contentLength; + this.IsValid = false; + } + + internal HTTPRange(long firstBytePosition, long lastBytePosition, long contentLength) + { + this.FirstBytePos = firstBytePosition; + this.LastBytePos = lastBytePosition; + this.ContentLength = contentLength; + + // A byte-content-range-spec with a byte-range-resp-spec whose last-byte-pos value is less than its first-byte-pos value, or whose instance-length value is less than or equal to its last-byte-pos value, is invalid. + this.IsValid = this.FirstBytePos <= this.LastBytePos && this.ContentLength > this.LastBytePos; + } + + public override string ToString() + { + return string.Format("{0}-{1}/{2} (valid: {3})", FirstBytePos, LastBytePos, ContentLength, IsValid); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs.meta new file mode 100644 index 00000000..e32fc3e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 40f7ef056ce0ae149a73c281f34b2c18 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRange.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs new file mode 100644 index 00000000..9279b741 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs @@ -0,0 +1,679 @@ +using Best.HTTP.Cookies; +using Best.HTTP.Hosts.Connections; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Authenticators; +using Best.HTTP.Request.Settings; +using Best.HTTP.Request.Timings; +using Best.HTTP.Request.Upload; +using Best.HTTP.Response.Decompression; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using System; +using System.Collections; +using System.Collections.Generic; + +namespace Best.HTTP +{ + /// + /// Delegate for a callback function that is called after the request is fully processed. + /// + public delegate void OnRequestFinishedDelegate(HTTPRequest req, HTTPResponse resp); + + /// + /// Delegate for enumerating headers during request preparation. + /// + /// The header name. + /// A list of header values. + public delegate void OnHeaderEnumerationDelegate(string header, List values); + + /// + /// Represents an HTTP request that allows you to send HTTP requests to remote servers and receive responses asynchronously. + /// + /// + /// + /// Asynchronous HTTP requestsUtilize a Task-based API for performing HTTP requests asynchronously. + /// Unity coroutine supportSeamlessly integrate with Unity's coroutine system for coroutine-based request handling. + /// HTTP method supportSupport for various HTTP methods including GET, POST, PUT, DELETE, and more. + /// Compression and decompressionAutomatic request and response compression and decompression for efficient data transfer. + /// Timing informationCollect detailed timing information about the request for performance analysis. + /// Upload and download supportSupport for uploading and downloading files with progress tracking. + /// CustomizableExtensive options for customizing request headers, handling cookies, and more. + /// Redirection handlingAutomatic handling of request redirections for a seamless experience. + /// Proxy server supportAbility to route requests through proxy servers for enhanced privacy and security. + /// AuthenticationAutomatic authentication handling using authenticators for secure communication. + /// Cancellation supportAbility to cancel requests to prevent further processing and release resources. + /// + /// + public sealed class HTTPRequest : IEnumerator + { + /// + /// Creates an HTTP GET request with the specified URL. + /// + /// The URL of the request. + /// An HTTPRequest instance for the GET request. + public static HTTPRequest CreateGet(string url) => new HTTPRequest(url); + + /// + /// Creates an HTTP GET request with the specified URI. + /// + /// The URI of the request. + /// An HTTPRequest instance for the GET request. + public static HTTPRequest CreateGet(Uri uri) => new HTTPRequest(uri); + + /// + /// Creates an HTTP GET request with the specified URL and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URL of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the GET request. + public static HTTPRequest CreateGet(string url, OnRequestFinishedDelegate callback) => new HTTPRequest(url, callback); + + /// + /// Creates an HTTP GET request with the specified URI and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URI of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the GET request. + public static HTTPRequest CreateGet(Uri uri, OnRequestFinishedDelegate callback) => new HTTPRequest(uri, callback); + + /// + /// Creates an HTTP POST request with the specified URL. + /// + /// The URL of the request. + /// An HTTPRequest instance for the POST request. + public static HTTPRequest CreatePost(string url) => new HTTPRequest(url, HTTPMethods.Post); + + /// + /// Creates an HTTP POST request with the specified URI. + /// + /// The URI of the request. + /// An HTTPRequest instance for the POST request. + public static HTTPRequest CreatePost(Uri uri) => new HTTPRequest(uri, HTTPMethods.Post); + + /// + /// Creates an HTTP POST request with the specified URL and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URL of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the POST request. + public static HTTPRequest CreatePost(string url, OnRequestFinishedDelegate callback) => new HTTPRequest(url, HTTPMethods.Post, callback); + + /// + /// Creates an HTTP POST request with the specified URI and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URI of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the POST request. + public static HTTPRequest CreatePost(Uri uri, OnRequestFinishedDelegate callback) => new HTTPRequest(uri, HTTPMethods.Post, callback); + + /// + /// Creates an HTTP PUT request with the specified URL. + /// + /// The URL of the request. + /// An HTTPRequest instance for the PUT request. + public static HTTPRequest CreatePut(string url) => new HTTPRequest(url, HTTPMethods.Put); + + /// + /// Creates an HTTP PUT request with the specified URI. + /// + /// The URI of the request. + /// An HTTPRequest instance for the PUT request. + public static HTTPRequest CreatePut(Uri uri) => new HTTPRequest(uri, HTTPMethods.Put); + + /// + /// Creates an HTTP PUT request with the specified URL and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URL of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the PUT request. + public static HTTPRequest CreatePut(string url, OnRequestFinishedDelegate callback) => new HTTPRequest(url, HTTPMethods.Put, callback); + + /// + /// Creates an HTTP PUT request with the specified URI and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URI of the request. + /// A callback function to be called when the request is finished. + /// An HTTPRequest instance for the PUT request. + public static HTTPRequest CreatePut(Uri uri, OnRequestFinishedDelegate callback) => new HTTPRequest(uri, HTTPMethods.Put, callback); + + /// + /// Cached uppercase values to save some cpu cycles and GC alloc per request. + /// + public static readonly string[] MethodNames = { + HTTPMethods.Get.ToString().ToUpper(), + HTTPMethods.Head.ToString().ToUpper(), + HTTPMethods.Post.ToString().ToUpper(), + HTTPMethods.Put.ToString().ToUpper(), + HTTPMethods.Delete.ToString().ToUpper(), + HTTPMethods.Patch.ToString().ToUpper(), + HTTPMethods.Trace.ToString().ToUpper(), + HTTPMethods.Merge.ToString().ToUpper(), + HTTPMethods.Options.ToString().ToUpper(), + HTTPMethods.Connect.ToString().ToUpper(), + HTTPMethods.Query.ToString().ToUpper() + }; + + /// + /// The method that how we want to process our request the server. + /// + public HTTPMethods MethodType { get; set; } + + /// + /// The original request's Uri. + /// + public Uri Uri { get; set; } + + /// + /// If redirected it contains the RedirectUri. + /// + public Uri CurrentUri { get { return this.RedirectSettings.IsRedirected ? this.RedirectSettings.RedirectUri : Uri; } } + + /// + /// A host-key that can be used to find the right host-variant for the request. + /// + public HostKey CurrentHostKey { get => HostKey.From(this); } + + /// + /// The response received from the server. + /// + /// If an exception occurred during reading of the response stream or can't connect to the server, this will be null! + public HTTPResponse Response { get; set; } + + /// + /// Download related options and settings. + /// + public DownloadSettings DownloadSettings = new DownloadSettings(); + + /// + /// Upload related options and settings. + /// + public UploadSettings UploadSettings = new UploadSettings(); + + /// + /// Timeout settings for the request. + /// + public TimeoutSettings TimeoutSettings; + + /// + /// Retry settings for the request. + /// + public RetrySettings RetrySettings; + + /// + /// Proxy settings for the request. + /// + public ProxySettings ProxySettings; + + /// + /// Redirect settings for the request. + /// + public RedirectSettings RedirectSettings { get; private set; } = new RedirectSettings(10); + + /// + /// The callback function that will be called after the request is fully processed. + /// + public OnRequestFinishedDelegate Callback { get; set; } + + /// + /// Indicates if is called on this request. + /// + public bool IsCancellationRequested { get => this.CancellationTokenSource != null ? this.CancellationTokenSource.IsCancellationRequested : true; } + + /// + /// Gets the cancellation token source for this request. + /// + internal System.Threading.CancellationTokenSource CancellationTokenSource { get; private set; } + + /// + /// Action called when function is invoked. + /// + public Action OnCancellationRequested; + + /// + /// Stores any exception that occurs during processing of the request or response. + /// + /// This property if for debugging purposes as seen here! + public Exception Exception { get; internal set; } + + /// + /// Any user-object that can be passed with the request. + /// + public object Tag { get; set; } + + /// + /// Current state of this request. + /// + public HTTPRequestStates State + { + get { return this._state; } + internal set + { + // In a case where the request is aborted its state is set to a >= Finished state then, + // on another thread the reqest processing will fail too queuing up a >= Finished state again. + if (this._state >= HTTPRequestStates.Finished && value >= HTTPRequestStates.Finished) + { + HTTPManager.Logger.Warning(nameof(HTTPRequest), $"State.Set({this._state} => {value})", this.Context); + return; + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HTTPRequest), $"State.Set({this._state} => {value})", this.Context); + + this._state = value; + } + } + private volatile HTTPRequestStates _state; + + /// + /// Timing information about the request. + /// + public TimingCollector Timing { get; private set; } + + /// + /// An IAuthenticator implementation that can be used to authenticate the request. + /// + /// Out-of-the-box included authenticators are and . + public IAuthenticator Authenticator; + +#if UNITY_WEBGL + /// + /// Its value will be set to the XmlHTTPRequest's withCredentials field, required to send 3rd party cookies with the request. + /// + /// + /// More details can be found here: + /// + /// Mozilla Developer Networks - XMLHttpRequest.withCredentials + /// + /// + public bool WithCredentials { get; set; } +#endif + + /// + /// Logging context of the request. + /// + public LoggingContext Context { get; private set; } + + private Dictionary> Headers { get; set; } + + /// + /// Creates an HTTP GET request with the specified URL. + /// + /// The URL of the request. + public HTTPRequest(string url) + : this(new Uri(url)) { } + + /// + /// Creates an HTTP GET request with the specified URL and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URL of the request. + /// A callback function to be called when the request is finished. + public HTTPRequest(string url, OnRequestFinishedDelegate callback) + : this(new Uri(url), callback) { } + + /// + /// Creates an HTTP GET request with the specified URL and HTTP method type. + /// + /// The URL of the request. + /// The HTTP method type for the request (e.g., GET, POST, PUT). + public HTTPRequest(string url, HTTPMethods methodType) + : this(new Uri(url), methodType) { } + + /// + /// Creates an HTTP request with the specified URL, HTTP method type, and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URL of the request. + /// The HTTP method type for the request (e.g., GET, POST, PUT). + /// A callback function to be called when the request is finished. + public HTTPRequest(string url, HTTPMethods methodType, OnRequestFinishedDelegate callback) + : this(new Uri(url), methodType, callback) { } + + /// + /// Creates an HTTP GET request with the specified URI. + /// + /// The URI of the request. + public HTTPRequest(Uri uri) + : this(uri, HTTPMethods.Get, null) + { + } + + /// + /// Creates an HTTP GET request with the specified URI and registers a callback function to be called + /// when the request is fully processed. + /// + /// The URI of the request. + /// A callback function to be called when the request is finished. + public HTTPRequest(Uri uri, OnRequestFinishedDelegate callback) + : this(uri, HTTPMethods.Get, callback) + { + } + + /// + /// Creates an HTTP request with the specified URI and HTTP method type. + /// + /// The URI of the request. + /// The HTTP method type for the request (e.g., GET, POST, PUT). + public HTTPRequest(Uri uri, HTTPMethods methodType) + : this(uri, methodType, null) + { + } + + /// + /// Creates an HTTP request with the specified URI, HTTP method type, and registers a callback function + /// to be called when the request is fully processed. + /// + /// The URI of the request. + /// The HTTP method type for the request (e.g., GET, POST, PUT). + /// A callback function to be called when the request is finished. + public HTTPRequest(Uri uri, HTTPMethods methodType, OnRequestFinishedDelegate callback) + { + this.Uri = uri; + this.MethodType = methodType; + + this.TimeoutSettings = new TimeoutSettings(this); + this.ProxySettings = new ProxySettings() { Proxy = HTTPManager.Proxy }; + this.RetrySettings = new RetrySettings(methodType == HTTPMethods.Get ? 1 : 0); + + this.Callback = callback; + +#if UNITY_WEBGL && !UNITY_EDITOR + // Just because cookies are enabled, it doesn't justify creating XHR with WithCredentials == 1. + //this.WithCredentials = this.CookieSettings.IsCookiesEnabled; +#endif + + this.Context = new LoggingContext(this); + this.Timing = new TimingCollector(this); + + this.CancellationTokenSource = new System.Threading.CancellationTokenSource(); + } + + /// + /// Adds a header-value pair to the Headers. Use it to add custom headers to the request. + /// + /// AddHeader("User-Agent', "FooBar 1.0") + public void AddHeader(string name, string value) => this.Headers = Headers.AddHeader(name, value); + + /// + /// For the given header name, removes any previously added values and sets the given one. + /// + public void SetHeader(string name, string value) => this.Headers = this.Headers.SetHeader(name, value); + + /// + /// Removes the specified header and all of its associated values. Returns true, if the header found and succesfully removed. + /// + public bool RemoveHeader(string name) => Headers.RemoveHeader(name); + + /// + /// Returns true if the given head name is already in the . + /// + public bool HasHeader(string name) => Headers.HasHeader(name); + + /// + /// Returns the first header or null for the given header name. + /// + public string GetFirstHeaderValue(string name) => Headers.GetFirstHeaderValue(name); + + /// + /// Returns all header values for the given header or null. + /// + public List GetHeaderValues(string name) => Headers.GetHeaderValues(name); + + /// + /// Removes all headers. + /// + public void RemoveHeaders() => Headers.RemoveHeaders(); + + /// + /// Sets the Range header to download the content from the given byte position. See http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.35 + /// + /// Start position of the download. + public void SetRangeHeader(long firstBytePos) + { + SetHeader("Range", string.Format("bytes={0}-", firstBytePos)); + } + + /// + /// Sets the Range header to download the content from the given byte position to the given last position. See http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.35 + /// + /// Start position of the download. + /// The end position of the download. + public void SetRangeHeader(long firstBytePos, long lastBytePos) + { + SetHeader("Range", string.Format("bytes={0}-{1}", firstBytePos, lastBytePos)); + } + + internal void RemoveUnsafeHeaders() + { + // https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx + /* 2. Remove header fields that were automatically generated by the implementation, replacing them with updated values as appropriate to the new request. This includes: + 1. Connection-specific header fields (see Section 7.6.1), + 2. Header fields specific to the client's proxy configuration, including (but not limited to) Proxy-Authorization, + 3. Origin-specific header fields (if any), including (but not limited to) Host, + 4. Validating header fields that were added by the implementation's cache (e.g., If-None-Match, If-Modified-Since), and + 5. Resource-specific header fields, including (but not limited to) Referer, Origin, Authorization, and Cookie. + 3. Consider removing header fields that were not automatically generated by the implementation + (i.e., those present in the request because they were added by the calling context) where there are security implications; + this includes but is not limited to Authorization and Cookie. + * */ + + // 2.1 + RemoveHeader("Connection"); + RemoveHeader("Proxy-Connection"); + RemoveHeader("Keep-Alive"); + RemoveHeader("TE"); + RemoveHeader("Transfer-Encoding"); + RemoveHeader("Upgrade"); + + // 2.2 + RemoveHeader("Proxy-Authorization"); + + // 2.3 + RemoveHeader("Host"); + + // 2.4 + RemoveHeader("If-None-Match"); + RemoveHeader("If-Modified-Since"); + + // 2.5 & 3 + RemoveHeader("Referer"); + RemoveHeader("Origin"); + RemoveHeader("Authorization"); + RemoveHeader("Cookie"); + + RemoveHeader("Accept-Encoding"); + + RemoveHeader("Content-Length"); + } + + internal void Prepare() + { + // Upload settings + this.UploadSettings?.SetupRequest(this, true); + } + + public void EnumerateHeaders(OnHeaderEnumerationDelegate callback, bool callBeforeSendCallback) + { +#if !UNITY_WEBGL || UNITY_EDITOR + if (!HasHeader("Host")) + { + if (CurrentUri.Port == 80 || CurrentUri.Port == 443) + SetHeader("Host", CurrentUri.Host); + else + SetHeader("Host", CurrentUri.Authority); + } + + DecompressorFactory.SetupHeaders(this); + + if (!DownloadSettings.DisableCache) + HTTPManager.LocalCache?.SetupValidationHeaders(this); + + var hostSettings = HTTPManager.PerHostSettings.Get(this.CurrentUri.Host); + + // Websocket would be very, very sad if its "connection: upgrade" header would be overwritten! + if (!HasHeader("Connection")) + AddHeader("Connection", hostSettings.HTTP1ConnectionSettings.TryToReuseConnections ? "Keep-Alive, TE" : "Close, TE"); + + if (hostSettings.HTTP1ConnectionSettings.TryToReuseConnections /*&& !HasHeader("Keep-Alive")*/) + { + // Send the server a slightly larger value to make sure it's not going to close sooner than the client + int seconds = (int)Math.Ceiling(hostSettings.HTTP1ConnectionSettings.MaxConnectionIdleTime.TotalSeconds + 1); + + AddHeader("Keep-Alive", "timeout=" + seconds); + } + + if (!HasHeader("TE")) + AddHeader("TE", "identity"); + + if (!string.IsNullOrEmpty(HTTPManager.UserAgent) && !HasHeader("User-Agent")) + AddHeader("User-Agent", HTTPManager.UserAgent); +#endif + long contentLength = -1; + + if (this.UploadSettings.UploadStream == null) + { + contentLength = 0; + } + else + { + contentLength = this.UploadSettings.UploadStream.Length; + + if (contentLength == BodyLengths.UnknownWithChunkedTransferEncoding) + SetHeader("Transfer-Encoding", "chunked"); + + if (!HasHeader("Content-Type")) + SetHeader("Content-Type", "application/octet-stream"); + } + + // Always set the Content-Length header if possible + // http://tools.ietf.org/html/rfc2616#section-4.4 : For compatibility with HTTP/1.0 applications, HTTP/1.1 requests containing a message-body MUST include a valid Content-Length header field unless the server is known to be HTTP/1.1 compliant. + // 2018.06.03: Changed the condition so that content-length header will be included for zero length too. + // 2022.05.25: Don't send a Content-Length (: 0) header if there's an Upgrade header. Upgrade is set for websocket, and it might be not true that the client doesn't send any bytes. + if (contentLength >= BodyLengths.NoBody && !HasHeader("Content-Length") && !HasHeader("Upgrade")) + SetHeader("Content-Length", contentLength.ToString()); + + // Server authentication + this.Authenticator?.SetupRequest(this); + + // Cookies + //this.CookieSettings?.SetupRequest(this); + CookieJar.SetupRequest(this); + + // Write out the headers to the stream + if (callback != null && this.Headers != null) + foreach (var kvp in this.Headers) + callback(kvp.Key, kvp.Value); + } + + /// + /// Starts processing the request. + /// + public HTTPRequest Send() + { + // TODO: Are we really want to 'reset' the token source? Two problems i see: + // 1.) User code will not know about this change + // 2.) We might dispose the source while the DNS and TCP queries are running and checking the source request's Token. + //if (this.IsRedirected) + //{ + // this.CancellationTokenSource?.Dispose(); + // this.CancellationTokenSource = new System.Threading.CancellationTokenSource(); + //} + this.Exception = null; + + return HTTPManager.SendRequest(this); + } + + /// + /// Cancels any further processing of the HTTP request. + /// + public void Abort() + { + HTTPManager.Logger.Verbose("HTTPRequest", $"Abort({this.State})", this.Context); + + if (this.State >= HTTPRequestStates.Finished || this.CancellationTokenSource == null) + return; + + //this.IsCancellationRequested = true; + this.CancellationTokenSource.Cancel(); + + // There's a race-condition here too, another thread might set it too. + // In this case, both state going to be queued up that we have to handle in RequestEvents.cs. + if (this.TimeoutSettings.IsTimedOut(HTTPManager.CurrentFrameDateTime)) + { + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this, this.TimeoutSettings.IsConnectTimedOut(HTTPManager.CurrentFrameDateTime) ? HTTPRequestStates.ConnectionTimedOut : HTTPRequestStates.TimedOut, null)); + } + else + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this, HTTPRequestStates.Aborted, null)); + + if (this.OnCancellationRequested != null) + { + try + { + this.OnCancellationRequested(this); + } + catch { } + } + } + + /// + /// Resets the request for a state where switching MethodType is possible. + /// + public void Clear() + { + RemoveHeaders(); + + this.RedirectSettings.Reset(); + this.Exception = null; + this.CancellationTokenSource?.Dispose(); + this.CancellationTokenSource = new System.Threading.CancellationTokenSource(); + + this.UploadSettings?.Dispose(); + } + + #region System.Collections.IEnumerator implementation + + /// + /// implementation, required for support. + /// + public object Current { get { return null; } } + + /// + /// implementation, required for support. + /// + /// true if the request isn't finished yet. + public bool MoveNext() => this.State < HTTPRequestStates.Finished; + + /// + /// implementation throwing , required for support. + /// + /// + public void Reset() => throw new NotImplementedException(); + + #endregion + + /// + /// Disposes of resources used by the HTTPRequest instance. + /// + internal void Dispose() + { + this.UploadSettings?.Dispose(); + this.Response?.Dispose(); + + this.CancellationTokenSource?.Dispose(); + this.CancellationTokenSource = null; + } + + public override string ToString() + { + return $"[HTTPRequest {this.State}, {this.Context.Hash}, {this.CurrentUri}, {this.CurrentHostKey}]"; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs.meta new file mode 100644 index 00000000..67232ca7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6c94d72de19ffc743a80c081f0a0a83e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs new file mode 100644 index 00000000..c307c12a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs @@ -0,0 +1,405 @@ +using Best.HTTP.Shared; + +using System; +using System.Threading; +using System.Threading.Tasks; + +using UnityEngine; + +#if WITH_UNITASK +using Cysharp.Threading.Tasks; +#endif + +namespace Best.HTTP +{ + /// + /// Represents an exception thrown during or as a result of a Task-based asynchronous HTTP operations. + /// + public sealed class AsyncHTTPException : Exception + { + /// + /// Gets the status code of the server's response. + /// + public readonly int StatusCode; + + /// + /// Gets the content sent by the server. This is usually an error page for 4xx or 5xx responses. + /// + public readonly string Content; + + public AsyncHTTPException(string message) + : base(message) + { + } + + public AsyncHTTPException(string message, Exception innerException) + : base(message, innerException) + { + } + + public AsyncHTTPException(int statusCode, string message, string content) + : base(message) + { + this.StatusCode = statusCode; + this.Content = content; + } + + public override string ToString() + { + return string.Format("StatusCode: {0}, Message: {1}, Content: {2}, StackTrace: {3}", this.StatusCode, this.Message, this.Content, this.StackTrace); + } + } + + /// + /// A collection of extension methods for working with HTTP requests asynchronously using . + /// + public static class HTTPRequestAsyncExtensions + { + /// + /// Asynchronously sends an HTTP request and retrieves the response as an . + /// + /// The to send. + /// A cancellation token that can be used to cancel the operation. + /// + /// A Task that represents the asynchronous operation. The Task will complete with the retrieved AssetBundle + /// if the request succeeds. If the request fails or is canceled, the Task will complete with an exception. + /// +#if WITH_UNITASK + public static UniTask GetAssetBundleAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetAssetBundleAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return CreateTask(request, token, +#if UNITY_2023_1_OR_NEWER + async +#endif + (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + { + try + { + var bundleLoadOp = AssetBundle.LoadFromMemoryAsync(resp.Data); + +#if !UNITY_2023_1_OR_NEWER + HTTPUpdateDelegator.Instance.StartCoroutine(BundleLoader(bundleLoadOp, tcs)); +#else + await Awaitable.FromAsyncOperation(bundleLoadOp, token); + + tcs.TrySetResult(bundleLoadOp.assetBundle); +#endif + } + catch (Exception ex) + { + tcs.TrySetException(ex); + } + } + else + GenericResponseHandler(req, resp, tcs); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + +#if !UNITY_2023_1_OR_NEWER +#if WITH_UNITASK + static System.Collections.IEnumerator BundleLoader(AssetBundleCreateRequest req, UniTaskCompletionSource tcs) +#else + static System.Collections.IEnumerator BundleLoader(AssetBundleCreateRequest req, TaskCompletionSource tcs) +#endif + { + yield return req; + + tcs.TrySetResult(req.assetBundle); + } +#endif + + /// + /// Asynchronously sends an HTTP request and retrieves the raw . + /// + /// + /// This method is particularly useful when you want to access the raw response without any specific processing + /// like converting the data into a string, texture, or other formats. It provides flexibility in handling + /// the response for custom or advanced use cases. + /// + /// The to send. + /// An optional that can be used to cancel the operation. + /// + /// A that represents the asynchronous operation. The value of TResult is the raw . + /// If the request completes successfully, the task will return the HTTPResponse. If there's an error during the request or if + /// the request gets canceled, the task will throw an exception, which can be caught and processed by the calling method. + /// + /// Thrown if there's an error in the request or if the server returns an error status code. +#if WITH_UNITASK + public static UniTask GetHTTPResponseAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetHTTPResponseAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return CreateTask(request, token, (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + tcs.TrySetResult(resp); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + + /// + /// Asynchronously sends an and retrieves the response content as a string. + /// + /// The to send. + /// A cancellation token that can be used to cancel the operation. + /// + /// A Task that represents the asynchronous operation. The Task will complete with the retrieved string content + /// if the request succeeds. If the request fails or is canceled, the Task will complete with an exception. + /// +#if WITH_UNITASK + public static UniTask GetAsStringAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetAsStringAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return CreateTask(request, token, (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + tcs.TrySetResult(resp.DataAsText); + else + GenericResponseHandler(req, resp, tcs); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + + /// + /// Asynchronously sends an and retrieves the response content as a . + /// + /// The to send. + /// A cancellation token that can be used to cancel the operation. + /// + /// A Task that represents the asynchronous operation. The Task will complete with the retrieved + /// if the request succeeds. If the request fails or is canceled, the Task will complete with an exception. + /// +#if WITH_UNITASK + public static UniTask GetAsTexture2DAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetAsTexture2DAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return CreateTask(request, token, (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + tcs.TrySetResult(resp.DataAsTexture2D); + + else + GenericResponseHandler(req, resp, tcs); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + + /// + /// Asynchronously sends an and retrieves the response content as a byte[]. + /// + /// The to send. + /// A cancellation token that can be used to cancel the operation. + /// + /// A Task that represents the asynchronous operation. The Task will complete with the retrieved byte[] + /// if the request succeeds. If the request fails or is canceled, the Task will complete with an exception. + /// +#if WITH_UNITASK + public static UniTask GetRawDataAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetRawDataAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return CreateTask(request, token, (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + tcs.TrySetResult(resp.Data); + else + GenericResponseHandler(req, resp, tcs); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + + /// + /// Asynchronously sends an and deserializes the response content into an object of type T using JSON deserialization. + /// + /// The type to deserialize the JSON content into. + /// The to send. + /// A cancellation token that can be used to cancel the operation. + /// + /// A Task that represents the asynchronous operation. The Task will complete with the deserialized object + /// if the request succeeds and the response content can be deserialized. If the request fails, is canceled, or + /// the response cannot be deserialized, the Task will complete with an exception. + /// +#if WITH_UNITASK + public static UniTask GetFromJsonResultAsync(this HTTPRequest request, CancellationToken token = default) +#else + public static Task GetFromJsonResultAsync(this HTTPRequest request, CancellationToken token = default) +#endif + { + return HTTPRequestAsyncExtensions.CreateTask(request, token, (req, resp, tcs) => + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (resp.IsSuccess) + { + try + { + tcs.TrySetResult(Best.HTTP.JSON.LitJson.JsonMapper.ToObject(resp.DataAsText)); + } + catch (Exception ex) + { + tcs.TrySetException(ex); + } + } + else + GenericResponseHandler(req, resp, tcs); + break; + + default: + GenericResponseHandler(req, resp, tcs); + break; + } + }); + } + + [System.ComponentModel.EditorBrowsable(System.ComponentModel.EditorBrowsableState.Never)] +#if WITH_UNITASK + public static UniTask CreateTask(HTTPRequest request, CancellationToken token, Action> callback) +#else + public static Task CreateTask(HTTPRequest request, CancellationToken token, Action> callback) +#endif + { + HTTPManager.Setup(); + +#if WITH_UNITASK + var tcs = new UniTaskCompletionSource(); +#else + var tcs = new TaskCompletionSource(); +#endif + + request.Callback = (req, resp) => + { + if (token.IsCancellationRequested) + tcs.TrySetCanceled(); + else + callback(req, resp, tcs); + }; + + if (token.CanBeCanceled) + token.Register((state) => (state as HTTPRequest)?.Abort(), request); + + if (request.State == HTTPRequestStates.Initial) + request.Send(); + + return tcs.Task; + } + +#if WITH_UNITASK + public static void GenericResponseHandler(HTTPRequest req, HTTPResponse resp, UniTaskCompletionSource tcs) +#else + public static void GenericResponseHandler(HTTPRequest req, HTTPResponse resp, TaskCompletionSource tcs) +#endif + { + switch (req.State) + { + // The request finished without any problem. + case HTTPRequestStates.Finished: + if (!resp.IsSuccess) + tcs.TrySetException(CreateException($"Request finished Successfully, but the server sent an error ({resp.StatusCode} - '{resp.Message}').", resp)); + break; + + // The request finished with an unexpected error. The request's Exception property may contain more info about the error. + case HTTPRequestStates.Error: + Log(req, $"Request Finished with Error! {req.Exception?.Message} - {req.Exception?.StackTrace}"); + + tcs.TrySetException(CreateException("No Exception", null, req.Exception)); + break; + + // The request aborted, initiated by the user. + case HTTPRequestStates.Aborted: + Log(req, "Request Aborted!"); + + tcs.TrySetCanceled(); + break; + + // Connecting to the server is timed out. + case HTTPRequestStates.ConnectionTimedOut: + Log(req, "Connection Timed Out!"); + + tcs.TrySetException(CreateException("Connection Timed Out!")); + break; + + // The request didn't finished in the given time. + case HTTPRequestStates.TimedOut: + Log(req, "Processing the request Timed Out!"); + + tcs.TrySetException(CreateException("Processing the request Timed Out!")); + break; + } + } + + [System.ComponentModel.EditorBrowsable(System.ComponentModel.EditorBrowsableState.Never)] + public static void Log(HTTPRequest request, string str) + { + HTTPManager.Logger.Verbose(nameof(HTTPRequestAsyncExtensions), str, request.Context); + } + + [System.ComponentModel.EditorBrowsable(System.ComponentModel.EditorBrowsableState.Never)] + public static Exception CreateException(string errorMessage, HTTPResponse resp = null, Exception ex = null) + { + if (resp != null) + return new AsyncHTTPException(resp.StatusCode, resp.Message, resp.DataAsText); + else if (ex != null) + return new AsyncHTTPException(ex.Message, ex); + else + return new AsyncHTTPException(errorMessage); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs.meta new file mode 100644 index 00000000..906c2eba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 156b3c3f28098b8499aaa2fa550ef45c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestAsyncExtensions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs new file mode 100644 index 00000000..1d33135c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs @@ -0,0 +1,50 @@ +using System; + +namespace Best.HTTP +{ + /// + /// Possible logical states of a HTTTPRequest object. + /// + public enum HTTPRequestStates : int + { + /// + /// Initial status of a request. No callback will be called with this status. + /// + Initial, + + /// + /// The request queued for processing. + /// + Queued, + + /// + /// Processing of the request started. In this state the client will send the request, and parse the response. No callback will be called with this status. + /// + Processing, + + /// + /// The request finished without problem. Parsing the response done, the result can be used. The user defined callback will be called with a valid response object. The request’s Exception property will be null. + /// + Finished, + + /// + /// The request finished with an unexpected error. The user defined callback will be called with a null response object. The request's Exception property may contain more info about the error, but it can be null. + /// + Error, + + /// + /// The request aborted by the client(HTTPRequest’s Abort() function). The user defined callback will be called with a null response. The request’s Exception property will be null. + /// + Aborted, + + /// + /// Connecting to the server timed out. The user defined callback will be called with a null response. The request’s Exception property will be null. + /// + ConnectionTimedOut, + + /// + /// The request didn't finished in the given time. The user defined callback will be called with a null response. The request’s Exception property will be null. + /// + TimedOut + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs.meta new file mode 100644 index 00000000..dd8522b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 90ac4a07ce090bb4196db8a200211974 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/HTTPRequestStates.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts.meta new file mode 100644 index 00000000..94e36234 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ad5bafb2bc9d90c4a8e2f9524d0bcc0d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections.meta new file mode 100644 index 00000000..b3e64604 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3a54f9a32a9b66a4a8de064ca99cfe52 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs new file mode 100644 index 00000000..089c90c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs @@ -0,0 +1,145 @@ +using System; + +using Best.HTTP.HostSetting; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Hosts.Connections +{ + /// + /// Abstract base class for concrete connection implementation (HTTP/1, HTTP/2, WebGL, File). + /// + public abstract class ConnectionBase : IDisposable + { + #region Public Properties + + /// + /// The address of the server that this connection is bound to. + /// + public HostKey HostKey { get; protected set; } + + /// + /// The state of this connection. + /// + public HTTPConnectionStates State { get; internal set; } + + /// + /// If the State is HTTPConnectionStates.Processing, then it holds a HTTPRequest instance. Otherwise it's null. + /// + public HTTPRequest CurrentRequest { get; internal set; } + + /// + /// How much the connection kept alive after its last request processing. + /// + public virtual TimeSpan KeepAliveTime { get; protected set; } + + public virtual bool CanProcessMultiple { get { return false; } } + + /// + /// Number of assigned requests to process. + /// + public virtual int AssignedRequests { get { return this.State != HTTPConnectionStates.Initial && this.State != HTTPConnectionStates.Free ? 1 : 0; } } + + /// + /// Maximum number of assignable requests. + /// + public virtual int MaxAssignedRequests { get; } = 1; + + /// + /// When we start to process the current request. It's set after the connection is established. + /// + public DateTime StartTime { get; protected set; } + + public Uri LastProcessedUri { get; protected set; } + + public DateTime LastProcessTime { get; protected set; } + + public LoggingContext Context { get; protected set; } + + #endregion + + #region Privates + + protected bool IsThreaded; + + #endregion + + public ConnectionBase(HostKey hostKey) + :this(hostKey, true) + {} + + public ConnectionBase(HostKey hostKey, bool threaded) + { + this.HostKey = hostKey; + + this.State = HTTPConnectionStates.Initial; + this.LastProcessTime = HTTPManager.CurrentFrameDateTime; // DateTime.UtcNow; + + // By default we assume an HTTP/1 connection, but in the HTTP-Over-TCP-Connection the request handlers will decide its value. + this.KeepAliveTime = HTTPManager.PerHostSettings.Get(this.HostKey.Host).HTTP1ConnectionSettings.MaxConnectionIdleTime; + + this.IsThreaded = threaded; + + this.Context = new LoggingContext(this); + this.Context.Add("HostKey", this.HostKey.ToString()); + } + + internal virtual void Process(HTTPRequest request) + { + if (State == HTTPConnectionStates.Processing) + throw new Exception("Connection already processing a request! " + this.ToString()); + + this.State = HTTPConnectionStates.Processing; + + this.CurrentRequest = request; + this.LastProcessedUri = this.CurrentRequest.CurrentUri; + + if (IsThreaded) + { + ThreadedRunner.RunLongLiving(ThreadFunc); + } + else + ThreadFunc(); + } + + protected virtual void ThreadFunc() + { + + } + + public ShutdownTypes ShutdownType { get; protected set; } + + /// + /// Called when the plugin shuts down immediately. + /// + public virtual void Shutdown(ShutdownTypes type) + { + this.ShutdownType = type; + } + + #region Dispose Pattern + + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + protected virtual void Dispose(bool disposing) + { + } + + ~ConnectionBase() + { + Dispose(false); + } + + #endregion + + public override string ToString() + { + return string.Format("[{0}:{1}]", this.Context.Hash, this.HostKey.ToString()); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs.meta new file mode 100644 index 00000000..55831db8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 060e50add8ab92b429eba096140dbc83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs new file mode 100644 index 00000000..a7a59ded --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs @@ -0,0 +1,198 @@ +using System; +using System.Collections.Concurrent; + +using Best.HTTP.HostSetting; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +namespace Best.HTTP.Hosts.Connections +{ + public enum ConnectionEvents + { + StateChange, + ProtocolSupport + } + + public readonly struct ConnectionEventInfo + { + public readonly ConnectionBase Source; + + public readonly ConnectionEvents Event; + + public readonly HTTPConnectionStates State; + + public readonly HostProtocolSupport ProtocolSupport; + + public readonly HTTPRequest Request; + + public readonly HTTPRequestStates RequestState; + + public ConnectionEventInfo(ConnectionBase sourceConn, ConnectionEvents @event) + { + this.Source = sourceConn; + this.Event = @event; + + this.State = HTTPConnectionStates.Initial; + + this.ProtocolSupport = HostProtocolSupport.Unknown; + + this.Request = null; + this.RequestState = HTTPRequestStates.Initial; + } + + public ConnectionEventInfo(ConnectionBase sourceConn, HTTPConnectionStates newState) + { + this.Source = sourceConn; + + this.Event = ConnectionEvents.StateChange; + + this.State = newState; + + this.ProtocolSupport = HostProtocolSupport.Unknown; + + this.Request = null; + this.RequestState = HTTPRequestStates.Initial; + } + + public ConnectionEventInfo(ConnectionBase sourceConn, HostProtocolSupport protocolSupport) + { + this.Source = sourceConn; + this.Event = ConnectionEvents.ProtocolSupport; + + this.State = HTTPConnectionStates.Initial; + + this.ProtocolSupport = protocolSupport; + + this.Request = null; + this.RequestState = HTTPRequestStates.Initial; + } + + public ConnectionEventInfo(ConnectionBase sourceConn, HTTPRequest request) + { + this.Source = sourceConn; + + this.Event = ConnectionEvents.StateChange; + + this.State = HTTPConnectionStates.ClosedResendRequest; + + this.ProtocolSupport = HostProtocolSupport.Unknown; + + this.Request = request; + this.RequestState = HTTPRequestStates.Initial; + } + + public override string ToString() + { + switch(this.Event) + { + case ConnectionEvents.StateChange: return $"[ConnectionEventInfo Source: {this.Source.ToString()} To State: {this.State}]"; + case ConnectionEvents.ProtocolSupport: return $"[ConnectionEventInfo Source: {this.Source.ToString()} ProtocolSupport: {this.ProtocolSupport}]"; + default: return string.Format("[ConnectionEventInfo SourceConnection: {0}, Event: {1}, State: {2}, ProtocolSupport: {3}]", this.Source.ToString(), this.Event, this.State, this.ProtocolSupport); + } + } + } + + public static class ConnectionEventHelper + { + private static ConcurrentQueue connectionEventQueue = new ConcurrentQueue(); + +#pragma warning disable 0649 + public static Action OnEvent; +#pragma warning restore + + public static void EnqueueConnectionEvent(ConnectionEventInfo @event) + { + if (HTTPManager.Logger.Level == Loglevels.All) + HTTPManager.Logger.Information("ConnectionEventHelper", "Enqueue " + @event.ToString(), @event.Source.Context); + + connectionEventQueue.Enqueue(@event); + } + + internal static void Clear() + { + connectionEventQueue.Clear(); + } + + internal static void ProcessQueue() + { + ConnectionEventInfo connectionEvent; + while (connectionEventQueue.TryDequeue(out connectionEvent)) + { + //if (HTTPManager.Logger.Level == Loglevels.All) + // HTTPManager.Logger.Information("ConnectionEventHelper", "Processing connection event: " + connectionEvent.ToString(), connectionEvent.Source.Context); + + if (OnEvent != null) + { + try + { + OnEvent(connectionEvent); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("ConnectionEventHelper", "ProcessQueue", ex, connectionEvent.Source.Context); + } + } + + if (connectionEvent.Source.LastProcessedUri == null) + { + HTTPManager.Logger.Information("ConnectionEventHelper", String.Format("Ignoring ConnectionEventInfo({0}) because its LastProcessedUri is null!", connectionEvent.ToString()), connectionEvent.Source.Context); + return; + } + + switch (connectionEvent.Event) + { + case ConnectionEvents.StateChange: + HandleConnectionStateChange(connectionEvent); + break; + + case ConnectionEvents.ProtocolSupport: + HostManager.GetHostVariant(connectionEvent.Source) + .AddProtocol(connectionEvent.ProtocolSupport); + break; + } + } + } + + private static void HandleConnectionStateChange(ConnectionEventInfo @event) + { + try + { + var connection = @event.Source; + + switch (@event.State) + { + case HTTPConnectionStates.Recycle: + HostManager.GetHostVariant(connection) + .RecycleConnection(connection) + .TryToSendQueuedRequests(); + + break; + + case HTTPConnectionStates.WaitForProtocolShutdown: + HostManager.GetHostVariant(connection) + .RemoveConnection(connection, @event.State); + break; + + case HTTPConnectionStates.Closed: + case HTTPConnectionStates.ClosedResendRequest: + // in case of ClosedResendRequest + if (@event.Request != null) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(@event.Request, RequestEvents.Resend)); + + if (connection.LastProcessedUri == null) + UnityEngine.Debug.LogError($"{connection} - LastProcessedUri is null!"); + + HostManager.GetHostVariant(connection) + .RemoveConnection(connection, @event.State) + .TryToSendQueuedRequests(); + break; + } + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("ConnectionEvents", $"HandleConnectionStateChange ({@event.State})", ex, @event.Source.Context); + } + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs.meta new file mode 100644 index 00000000..7e87d254 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 050e6e85c91a93849bade99924033025 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionEvents.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs new file mode 100644 index 00000000..0d73b53a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs @@ -0,0 +1,310 @@ +using System; +using System.Collections.Generic; + +using Best.HTTP.Caching; +using Best.HTTP.Cookies; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using static Best.HTTP.Response.HTTPStatusCodes; + +namespace Best.HTTP.Hosts.Connections +{ + /// + /// https://tools.ietf.org/html/draft-thomson-hybi-http-timeout-03 + /// Test servers: http://tools.ietf.org/ http://nginx.org/ + /// + public sealed class KeepAliveHeader + { + /// + /// A host sets the value of the "timeout" parameter to the time that the host will allow an idle connection to remain open before it is closed. A connection is idle if no data is sent or received by a host. + /// + public TimeSpan TimeOut { get; private set; } + + /// + /// The "max" parameter has been used to indicate the maximum number of requests that would be made on the connection.This parameter is deprecated.Any limit on requests can be enforced by sending "Connection: close" and closing the connection. + /// + public int MaxRequests { get; private set; } + + public void Parse(List headerValues) + { + HeaderParser parser = new HeaderParser(headerValues[0]); + HeaderValue value; + + this.TimeOut = TimeSpan.MaxValue; + this.MaxRequests = int.MaxValue; + + if (parser.TryGet("timeout", out value) && value.HasValue) + { + int intValue = 0; + if (int.TryParse(value.Value, out intValue) && intValue > 1) + this.TimeOut = TimeSpan.FromSeconds(intValue - 1); + } + + if (parser.TryGet("max", out value) && value.HasValue) + { + int intValue = 0; + if (int.TryParse("max", out intValue)) + this.MaxRequests = intValue; + } + } + } + + /// + /// Static helper class to handle cases where the plugin has to do additional logic based on the received response. These are like connection management, handling redirections, loading from local cache, authentication challanges, etc. + /// + public static class ConnectionHelper + { + public static void ResendRequestAndCloseConnection(ConnectionBase connection, HTTPRequest request) + { + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(connection, request)); + } + + public static void EnqueueEvents(ConnectionBase connection, HTTPConnectionStates connectionState, HTTPRequest request, HTTPRequestStates requestState, Exception error) + { + // SetState + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(request, requestState, error)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(connection, connectionState)); + } + + /// + /// Called when the whole response received + /// + public static Exception HandleResponse(HTTPRequest request, + out bool resendRequest, + out HTTPConnectionStates proposedConnectionState, + ref KeepAliveHeader keepAlive, + LoggingContext loggingContext) + { + resendRequest = false; + proposedConnectionState = HTTPConnectionStates.Recycle; + + var resp = request.Response; + var currentUri = request.CurrentUri; + + if (resp == null) + return null; + + // Try to store cookies before we do anything else, as we may remove the response deleting the cookies as well. + CookieJar.SetFromRequest(resp); + + switch (resp.StatusCode) + { + // Not authorized + // https://www.rfc-editor.org/rfc/rfc9110.html#name-www-authenticate + case Unauthorized: + if (request.Authenticator != null) + resendRequest = request.Authenticator.HandleChallange(request, resp); + + goto default; + +#if !UNITY_WEBGL || UNITY_EDITOR + case ProxyAuthenticationRequired: + if (request.ProxySettings == null) + goto default; + + resendRequest = request.ProxySettings.Handle407(request); + + goto default; +#endif + + // https://www.rfc-editor.org/rfc/rfc9110#name-417-expectation-failed + case ExpectationFailed: // expectation failed + // https://www.rfc-editor.org/rfc/rfc9110#section-10.1.1-11.4 + // A client that receives a 417 (Expectation Failed) status code in response to a request + // containing a 100-continue expectation SHOULD repeat that request without a 100-continue expectation, + // since the 417 response merely indicates that the response chain does not support expectations (e.g., it passes through an HTTP/1.0 server). + + //request.UploadSettings.ResetExpects(); + //resendRequest = true; + break; + + // Redirected + case MovedPermanently: // http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.2 + case Found: // http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.3 + case SeeOther: + case TemporaryRedirect: // http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.8 + case PermanentRedirect: // http://tools.ietf.org/html/rfc7238 + { + if (request.RedirectSettings.RedirectCount >= request.RedirectSettings.MaxRedirects) + goto default; + request.RedirectSettings.RedirectCount++; + + string location = resp.GetFirstHeaderValue("location"); + if (!string.IsNullOrEmpty(location)) + { + Uri redirectUri = ConnectionHelper.GetRedirectUri(request, location); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(ConnectionHelper), $"Redirected to Location: '{location}' redirectUri: '{redirectUri}'", loggingContext); + + if (redirectUri == request.CurrentUri) + { + HTTPManager.Logger.Information(nameof(ConnectionHelper), "Redirected to the same location!", loggingContext); + goto default; + } + + // Let the user to take some control over the redirection + if (!request.RedirectSettings.CallOnBeforeRedirection(request, resp, redirectUri)) + { + HTTPManager.Logger.Information(nameof(ConnectionHelper), "OnBeforeRedirection returned False", loggingContext); + goto default; + } + + if (!request.CurrentUri.Host.Equals(redirectUri.Host, StringComparison.OrdinalIgnoreCase)) + { +#if !UNITY_WEBGL || UNITY_EDITOR + //DNSCache.Prefetch(redirectUri.Host); + Shared.PlatformSupport.Network.DNS.Cache.DNSCache.Query(new Shared.PlatformSupport.Network.DNS.Cache.DNSQueryParameters(redirectUri) { Context = loggingContext }); +#endif + + // Remove unsafe headers when redirected to an other host. + // Just like for https://www.rfc-editor.org/rfc/rfc9110#name-redirection-3xx + request.RemoveUnsafeHeaders(); + } + + // Set the Referer header to the last Uri. + request.SetHeader("Referer", request.CurrentUri.ToString()); + + // Set the new Uri, the CurrentUri will return this while the IsRedirected property is true + request.RedirectSettings.RedirectUri = redirectUri; + + request.RedirectSettings.IsRedirected = true; + + resendRequest = true; + } + else + return new Exception($"Got redirect status({resp.StatusCode}) without 'location' header!"); + + goto default; + } + + case NotModified: + if (request.DownloadSettings.DisableCache || HTTPManager.LocalCache == null) + break; + + var hash = HTTPCache.CalculateHash(request.MethodType, request.CurrentUri); + if (HTTPManager.LocalCache.RefreshHeaders(hash, resp.Headers, request.Context)) + { + HTTPManager.LocalCache.Redirect(request, hash); + resendRequest = true; + } + break; + + // https://www.rfc-editor.org/rfc/rfc5861.html#section-4 + // In this context, an error is any situation that would result in a + // 500, 502, 503, or 504 HTTP response status code being returned. + case var statusCode when statusCode == InternalServerError || (statusCode >= BadGateway && statusCode <= GatewayTimeout): + if (HTTPManager.LocalCache != null) + { + hash = HTTPCache.CalculateHash(request.MethodType, request.CurrentUri); + if (HTTPManager.LocalCache.CanServeWithoutValidation(hash, ErrorTypeForValidation.ServerError, request.Context)) + { + HTTPManager.LocalCache.Redirect(request, hash); + resendRequest = true; + } + } + break; + + default: + break; + } + + // If we have a response and the server telling us that it closed the connection after the message sent to us, then + // we will close the connection too. + bool closeByServer = resp.HasHeaderWithValue("connection", "close") || + resp.HasHeaderWithValue("proxy-connection", "close"); + + bool tryToKeepAlive = !string.IsNullOrEmpty(currentUri.Host) && HTTPManager.PerHostSettings.Get(currentUri.Host).HTTP1ConnectionSettings.TryToReuseConnections; + bool closeByClient = !tryToKeepAlive; + + // BugFix: We MUST NOT close the underlying connection when we just upgraded (switched) protocols! + // - Explanation: Setting TryToReuseConnections to false would otherwise force the connection to close for websocket connections too! + if ((closeByServer || closeByClient) && resp.StatusCode != SwitchingProtocols) + { + proposedConnectionState = HTTPConnectionStates.Closed; + } + else if (resp != null) + { + var keepAliveheaderValues = resp.GetHeaderValues("keep-alive"); + if (keepAliveheaderValues != null && keepAliveheaderValues.Count > 0) + { + if (keepAlive == null) + keepAlive = new KeepAliveHeader(); + keepAlive.Parse(keepAliveheaderValues); + } + } + + // Null out the response here instead of the redirected cases (301, 302, 307, 308) + // because response might have a Connection: Close header that we would miss to process. + // If Connection: Close is present, the server is closing the connection and we would + // reuse that closed connection. + if (resendRequest) + { + HTTPManager.Logger.Verbose(nameof(ConnectionHelper), "HandleResponse - discarding response", request.Response?.Context ?? loggingContext); + + request.Response?.Dispose(); + // Discard the redirect response, we don't need it any more + request.Response = null; + + if (proposedConnectionState == HTTPConnectionStates.Closed) + proposedConnectionState = HTTPConnectionStates.ClosedResendRequest; + } + + if (!resendRequest && proposedConnectionState < HTTPConnectionStates.Closed && resp.IsUpgraded) + proposedConnectionState = HTTPConnectionStates.WaitForProtocolShutdown; + else + { + // Do nothing here, the what we are timing for is decived in the caller, outside code. + //request.Timing.Finish(TimingEventNames.Response_Received); + } + + return null; + } + + public static Uri GetRedirectUri(HTTPRequest request, string location) + { + Uri result = null; + try + { + result = new Uri(location); + + if (result.IsFile || result.AbsolutePath == location) + result = null; + } + catch + { + // Sometimes the server sends back only the path and query component of the new uri + result = null; + } + + if (result == null) + { + var baseURL = request.CurrentUri.GetComponents(UriComponents.SchemeAndServer, UriFormat.Unescaped); + + if (!location.StartsWith("/")) + { + var segments = request.CurrentUri.Segments; + segments[segments.Length - 1] = location; + + location = String.Join(string.Empty, segments); + if (location.StartsWith("//")) + location = location.Substring(1); + } + + bool endsWithSlash = baseURL[baseURL.Length - 1] == '/'; + bool startsWithSlash = location[0] == '/'; + if (endsWithSlash && startsWithSlash) + result = new Uri(baseURL + location.Substring(1)); + else if (!endsWithSlash && !startsWithSlash) + result = new Uri(baseURL + '/' + location); + else + result = new Uri(baseURL + location); + } + + return result; + } + + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs.meta new file mode 100644 index 00000000..0fad9922 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 58178ddebb70e5445954339197663a91 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/ConnectionHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File.meta new file mode 100644 index 00000000..4a7fd3f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: cf1d243d47a66dd42af3d2c418120e33 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs new file mode 100644 index 00000000..4c371776 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs @@ -0,0 +1,274 @@ +using System; +using System.Threading; + +using Best.HTTP.Caching; +using Best.HTTP.Hosts.Connections.HTTP1; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Timings; +using Best.HTTP.Response; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.FileSystem; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Hosts.Connections.File +{ + internal sealed class FileConnection : ConnectionBase, IContentConsumer, IDownloadContentBufferAvailable + { + public PeekableContentProviderStream ContentProvider { get; private set; } + + PeekableHTTP1Response _response; + NonblockingUnderlyingStream _stream; + + UnityEngine.Hash128 _cacheHash; + + public FileConnection(HostKey hostKey) + : base(hostKey) + { } + + protected override void ThreadFunc() + { + this.CurrentRequest.Timing.StartNext(TimingEventNames.Waiting_TTFB); + + this.Context.Remove("Request"); + this.Context.Add("Request", this.CurrentRequest.Context); + + bool isFromLocalCache = this.CurrentRequest.CurrentUri.Host.Equals(HTTPCache.CacheHostName, StringComparison.OrdinalIgnoreCase); + + if (this._response == null) + this.CurrentRequest.Response = this._response = new PeekableHTTP1Response(this.CurrentRequest, isFromLocalCache, this); + this._response.Context.Add(nameof(FileConnection), this.Context); + + StreamList stream = new StreamList(); + try + { + var headers = new BufferPoolMemoryStream(); + stream.AppendStream(headers); + + headers.WriteLine("HTTP/1.1 200 Ok"); + + System.IO.Stream contentStream = null; + + if (isFromLocalCache) + { + var hashStr = this.CurrentRequest.CurrentUri.AbsolutePath.Substring(1); + var hash = UnityEngine.Hash128.Parse(hashStr); + + // BeginReadContent tries to acquire a read lock on the content and returns null if couldn't. + contentStream = HTTPManager.LocalCache?.BeginReadContent(hash, this.Context); + if (contentStream == null) + throw new HTTPCacheAcquireLockException($"Coulnd't acquire read lock on cached entity."); + + this._cacheHash = hash; + + headers.WriteLine($"BestHTTP-Origin: cachefile({hashStr})"); + + stream.AppendStream(HTTPManager.IOService.CreateFileStream(HTTPManager.LocalCache.GetHeaderPathFromHash(hash), FileStreamModes.OpenRead)); + } + else + { + headers.WriteLine($"BestHTTP-Origin: file"); + headers.WriteLine("Content-Type: application/octet-stream"); + + contentStream = HTTPManager.IOService.CreateFileStream(this.CurrentRequest.CurrentUri.LocalPath, FileStreamModes.OpenRead); + } + + headers.WriteLine($"Content-Length: {contentStream.Length.ToString()}"); + if (!isFromLocalCache) + headers.WriteLine(); + + headers.Seek(0, System.IO.SeekOrigin.Begin); + + stream.AppendStream(contentStream); + + this.CurrentRequest.TimeoutSettings.SetProcessing(DateTime.UtcNow); + + this._stream = new NonblockingUnderlyingStream(stream, 1024 * 1024, this.Context); + this._stream.SetTwoWayBinding(this); + this._stream.BeginReceive(); + + this.CurrentRequest.OnCancellationRequested += OnCancellationRequested; + } + catch(Exception ex) + { + FinishedProcessing(ex); + stream?.Dispose(); + } + } + + void IDownloadContentBufferAvailable.BufferAvailable(DownloadContentStream stream) + { + //HTTPManager.Logger.Verbose(nameof(FileConnection), "IDownloadContentBufferAvailable.BufferAvailable", this.Context); + + // Here we should trigger somehow the read stream and that should call OnContent(IPeekableContentProvider provider, PeekableStream peekable) + // to go the regular route. + + if (this._response != null) + OnContent(); + } + + public void SetBinding(PeekableContentProviderStream contentProvider) + { + this.ContentProvider = contentProvider; + } + + public void UnsetBinding() => this.ContentProvider = null; + + public void OnContent() + { + try + { + if (this.CurrentRequest.TimeoutSettings.IsTimedOut(DateTime.UtcNow)) + throw new TimeoutException(); + + if (this.CurrentRequest.IsCancellationRequested) + throw new Exception("Cancellation requested!"); + + this._response.ProcessPeekable(this.ContentProvider); + } + catch (Exception e) + { + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + + // After an exception, this._response will be null! + if (this._response != null && this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Finished) + FinishedProcessing(null); + } + + public void OnConnectionClosed() + { + HTTPManager.Logger.Information(nameof(FileConnection), $"OnConnectionClosed({this.ContentProvider?.Length}, {this._response?.ReadState})", this.Context); + + // If the consumer still have a request: error it and close the connection + if (this.CurrentRequest != null && this._response != null) + { + FinishedProcessing(new Exception("Underlying TCP connection closed unexpectedly!")); + } + else // If no current request: close the connection + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + + public void OnError(Exception e) + { + HTTPManager.Logger.Information(nameof(FileConnection), $"OnError({this.ContentProvider?.Length}, {this._response?.ReadState}, {this.ShutdownType})", this.Context); + + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + + private void OnCancellationRequested(HTTPRequest req) + { + HTTPManager.Logger.Information(nameof(FileConnection), "OnCancellationRequested()", this.Context); + + Interlocked.Exchange(ref this._response, null); + req.OnCancellationRequested -= OnCancellationRequested; + this._stream.Dispose(); + } + + void FinishedProcessing(Exception ex) + { + // Warning: FinishedProcessing might be called from different threads in parallel: + // - send thread triggered by a write failure + // - read thread oncontent/OnError/OnConnectionClosed + + var resp = Interlocked.Exchange(ref this._response, null); + if (resp == null) + return; + + HTTPManager.Logger.Verbose(nameof(FileConnection), $"{nameof(FinishedProcessing)}({resp}, {ex})", this.Context); + + HTTPManager.LocalCache?.EndReadContent(this._cacheHash, this.Context); + this._cacheHash = new UnityEngine.Hash128(); + + // Unset the consumer, we no longer expect another OnContent call until further notice. + this._stream?.Unbind(); + this._stream?.Dispose(); + this._stream = null; + + var req = this.CurrentRequest; + + req.OnCancellationRequested -= OnCancellationRequested; + + bool resendRequest = false; + HTTPRequestStates requestState = HTTPRequestStates.Finished; + HTTPConnectionStates connectionState = HTTPConnectionStates.Recycle; + Exception error = ex; + + if (error != null) + { + // Timeout is a non-retryable error + if (ex is TimeoutException) + { + error = null; + requestState = HTTPRequestStates.TimedOut; + } + else if (ex is HTTPCacheAcquireLockException) + { + error = null; + resendRequest = true; + } + else + { + if (req.RetrySettings.Retries < req.RetrySettings.MaxRetries) + { + req.RetrySettings.Retries++; + error = null; + resendRequest = true; + } + else + { + requestState = HTTPRequestStates.Error; + } + } + + // Any exception means that the connection is in an unknown state, we shouldn't try to reuse it. + connectionState = HTTPConnectionStates.Closed; + + resp.Dispose(); + } + else + { + // After HandleResponse connectionState can have the following values: + // - Processing: nothing interesting, caller side can decide what happens with the connection (recycle connection). + // - Closed: server sent an connection: close header. + // - ClosedResendRequest: in this case resendRequest is true, and the connection must not be reused. + // In this case we can send only one ConnectionEvent to handle both case and avoid concurrency issues. + + KeepAliveHeader keepAlive = null; + error = ConnectionHelper.HandleResponse(req, out resendRequest, out connectionState, ref keepAlive, this.Context); + connectionState = HTTPConnectionStates.Recycle; + + if (!resendRequest && resp.IsUpgraded) + requestState = HTTPRequestStates.Processing; + } + + req.Timing.StartNext(TimingEventNames.Queued); + + HTTPManager.Logger.Verbose(nameof(FileConnection), $"{nameof(FinishedProcessing)} final decision. ResendRequest: {resendRequest}, RequestState: {requestState}, ConnectionState: {connectionState}", this.Context); + + // If HandleResponse returned with ClosedResendRequest or there were an error and we can retry the request + if (connectionState == HTTPConnectionStates.ClosedResendRequest || (resendRequest && connectionState == HTTPConnectionStates.Closed)) + { + ConnectionHelper.ResendRequestAndCloseConnection(this, req); + } + else if (resendRequest && requestState == HTTPRequestStates.Finished) + { + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(req, RequestEvents.Resend)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, connectionState)); + } + else + { + // Otherwise set the request's then the connection's state + ConnectionHelper.EnqueueEvents(this, connectionState, req, requestState, error); + } + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs.meta new file mode 100644 index 00000000..5fcbd4e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 589a909d7aa31c64a936621b85c9fe1d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/File/FileConnection.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1.meta new file mode 100644 index 00000000..5604c82b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ce034ab1cdf3f3244a7e21c4251fcccf +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs new file mode 100644 index 00000000..109b2167 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs @@ -0,0 +1,15 @@ +namespace Best.HTTP.Hosts.Connections.HTTP1 +{ + public static class Constants + { + public const byte CR = 13; + public const byte LF = 10; + + public static readonly byte[] EOL = { Constants.CR, Constants.LF }; + + public static readonly byte[] HeaderValueSeparator = { (byte)':', (byte)' ' }; + + // expect: 100-continue + //public static readonly byte[] Expect100Continue = { (byte)'e', (byte)'x', (byte)'p', (byte)'e', (byte)'c', (byte)'t', (byte)':', (byte)' ', (byte)'1', (byte)'0', (byte)'0', (byte)'-', (byte)'c', (byte)'o', (byte)'n', (byte)'t', (byte)'i', (byte)'n', (byte)'u', (byte)'e', CR, LF }; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs.meta new file mode 100644 index 00000000..c64622ba --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c7fa489dfa1912f42974e02a6cf10e9e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/Constants.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs new file mode 100644 index 00000000..685db4ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs @@ -0,0 +1,590 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Request.Timings; +using Best.HTTP.Request.Upload; +using Best.HTTP.Response; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.PlatformSupport.Threading; +using Best.HTTP.Shared.Streams; + +using System; +using System.Threading; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; + +namespace Best.HTTP.Hosts.Connections.HTTP1 +{ + public sealed class HTTP1ContentConsumer : IHTTPRequestHandler, IContentConsumer, IDownloadContentBufferAvailable, IThreadSignaler + { + public ShutdownTypes ShutdownType { get; private set; } + + public KeepAliveHeader KeepAlive { get { return this._keepAlive; } } + private KeepAliveHeader _keepAlive; + + public bool CanProcessMultiple { get { return false; } } + + /// + /// Number of assigned requests to process. + /// + public int AssignedRequests => this.conn.CurrentRequest == null ? 0 : 1; + + /// + /// Maximum number of assignable requests + /// + public int MaxAssignedRequests => 1; + + public LoggingContext Context { get; private set; } + + public PeekableContentProviderStream ContentProvider { get; private set; } + + private readonly HTTPOverTCPConnection conn; + private PeekableHTTP1Response _response; + private int _isAlreadyProcessingContent; + private WriteOnlyBufferedStream _upStream; + + private int _isSendingContent; + private int _hasMoreData; + private bool _isContentSendingFinished; + private int _acceptContentSignals; + + // Initialize the progress report variables + private long _uploaded = 0; + + public HTTP1ContentConsumer(HTTPOverTCPConnection conn) + { + this.Context = new LoggingContext(this); + this.conn = conn; + } + + public void RunHandler() + { + HTTPManager.Logger.Information(nameof(HTTP1ContentConsumer), "Started processing request", this.Context); + + //ThreadedRunner.SetThreadName("Best.HTTP1 Write"); + + try + { + var now = DateTime.UtcNow; + + if (this.conn.CurrentRequest.TimeoutSettings.IsTimedOut(now)) + throw new TimeoutException(); + + if (this.conn.CurrentRequest.IsCancellationRequested) + throw new Exception("Cancellation requested!"); + + // create the response before we would send out the request, because sending out might cause an exception + // and the response is used for decision making in the FinishedProcessing call. + if (this._response == null) + this.conn.CurrentRequest.Response = this._response = new PeekableHTTP1Response(this.conn.CurrentRequest, false, this); + + // Write the request to the stream + this.conn.CurrentRequest.TimeoutSettings.SetProcessing(now); + + this.conn.CurrentRequest.Timing.StartNext(TimingEventNames.Request_Sent); + + SendOutTo(this.conn.CurrentRequest, this.conn.TopStream); + + this.conn.CurrentRequest.OnCancellationRequested += OnCancellationRequested; + } + catch (Exception e) + { + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + } + + private void SendOutTo(HTTPRequest request, System.IO.Stream stream) + { + request.Prepare(); + + string requestPathAndQuery = + request.ProxySettings.HasProxyFor(request.CurrentUri) ? + request.ProxySettings.Proxy.GetRequestPath(request.CurrentUri) : + request.CurrentUri.GetRequestPathAndQueryURL(); + + string requestLine = string.Format("{0} {1} HTTP/1.1", HTTPRequest.MethodNames[(byte)request.MethodType], requestPathAndQuery); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HTTPRequest", string.Format("Sending request: '{0}'", requestLine), request.Context); + + // Create a buffer stream that will not close 'stream' when disposed or closed. + // buffersize should be larger than UploadChunkSize as it might be used for uploading user data and + // it should have enough room for UploadChunkSize data and additional chunk information. + using (WriteOnlyBufferedStream bufferStream = new WriteOnlyBufferedStream(stream, (int)(request.UploadSettings.UploadChunkSize * 1.5f), request.Context)) + { + var requestLineBytes = requestLine.GetASCIIBytes(); + bufferStream.WriteBufferSegment(requestLineBytes); + bufferStream.WriteArray(EOL); + + BufferPool.Release(requestLineBytes); + + // Write headers to the buffer + request.EnumerateHeaders((header, values) => + { + if (string.IsNullOrEmpty(header) || values == null) + return; + + //var headerName = string.Concat(header, ": ").GetASCIIBytes(); + var headerName = header.GetASCIIBytes(); + + for (int i = 0; i < values.Count; ++i) + { + if (string.IsNullOrEmpty(values[i])) + { + HTTPManager.Logger.Warning("HTTPRequest", string.Format("Null/empty value for header: {0}", header), request.Context); + continue; + } + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Verbose("HTTPRequest", $"Header - '{header}': '{values[i]}'", request.Context); + + var valueBytes = values[i].GetASCIIBytes(); + + bufferStream.WriteBufferSegment(headerName); + bufferStream.WriteArray(HeaderValueSeparator); + bufferStream.WriteBufferSegment(valueBytes); + bufferStream.WriteArray(EOL); + + BufferPool.Release(valueBytes); + } + + BufferPool.Release(headerName); + }, /*callBeforeSendCallback:*/ true); + + bufferStream.WriteArray(EOL); + + // Send body content + if (this.conn.CurrentRequest.UploadSettings.UploadStream is Request.Upload.UploadStreamBase upStream) + upStream.BeforeSendBody(this.conn.CurrentRequest, this); + + Interlocked.Exchange(ref this._isSendingContent, 1); + Interlocked.Exchange(ref this._acceptContentSignals, 1); + + SendContent(bufferStream); + } // bufferStream.Dispose + + HTTPManager.Logger.Information("HTTPRequest", "Sent out '" + requestLine + "'", this.Context); + } + + void SendContent(WriteOnlyBufferedStream streamToSend) + { + Interlocked.Exchange(ref this._hasMoreData, 0); + + var request = this.conn.CurrentRequest; + System.IO.Stream uploadStream = request.UploadSettings.UploadStream; + + try + { + if (uploadStream == null) + { + this._isContentSendingFinished = true; + } + else + { + if (streamToSend == null) + { + if (this._upStream == null) + this._upStream = new WriteOnlyBufferedStream(this.conn.TopStream, (int)(request.UploadSettings.UploadChunkSize * 1.5f), request.Context); + streamToSend = this._upStream; + } + long uploadLength = uploadStream.Length; + bool isChunked = uploadLength == BodyLengths.UnknownWithChunkedTransferEncoding; + + // Upload buffer. First we will read the data into this buffer from the UploadStream, then write this buffer to our outStream + byte[] buffer = BufferPool.Get(this.conn.CurrentRequest.UploadSettings.UploadChunkSize, true); + using var _ = new AutoReleaseBuffer(buffer); + + // How many bytes was read from the UploadStream + int count = uploadStream.Read(buffer, 0, buffer.Length); + while (count > 0) + { + if (isChunked) + { + var countBytes = count.ToString("X").GetASCIIBytes(); + streamToSend.WriteBufferSegment(countBytes); + streamToSend.WriteArray(EOL); + + BufferPool.Release(countBytes); + } + + // write out the buffer to the wire + streamToSend.Write(buffer, 0, count); + + // chunk trailing EOL + if (uploadLength < 0) + streamToSend.WriteArray(EOL); + + // update how many bytes are uploaded + _uploaded += count; + + if (this.conn.CurrentRequest.UploadSettings.OnUploadProgress != null) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.conn.CurrentRequest, RequestEvents.UploadProgress, _uploaded, uploadLength)); + + if (this.conn.CurrentRequest.IsCancellationRequested) + return; + + count = uploadStream.Read(buffer, 0, buffer.Length); + } + + this._isContentSendingFinished = count == UploadReadConstants.Completed; + + // All data from the stream are sent, write the 'end' chunk if necessary + if (isChunked && this._isContentSendingFinished) + { + ReadOnlySpan bytes = stackalloc byte[] { (byte)'0' }; + + streamToSend.Write(bytes); + streamToSend.WriteArray(EOL); + streamToSend.WriteArray(EOL); + } + } + } + finally + { + // Make sure all remaining data will be on the wire + streamToSend?.Flush(); + + if (this._isContentSendingFinished) + { + this._upStream?.Dispose(); + this._upStream = null; + if (this.conn.CurrentRequest.UploadSettings.DisposeStream) + uploadStream?.Dispose(); + + this.conn.CurrentRequest.Timing.StartNext(TimingEventNames.Waiting_TTFB); + + Interlocked.Exchange(ref this._isSendingContent, 0); + } + else + { + Interlocked.Exchange(ref this._isSendingContent, 0); + + if (this._hasMoreData > 0) + (this as IThreadSignaler).SignalThread(); + } + } + } + + void IDownloadContentBufferAvailable.BufferAvailable(DownloadContentStream stream) + { + //HTTPManager.Logger.Verbose(nameof(HTTP1ContentConsumer), "IDownloadContentBufferAvailable.BufferAvailable", this.Context); + + // TODO: Do NOT call OnContent on the Unity main thread + if (this._response != null) + OnContent(); + } + + public void SetBinding(PeekableContentProviderStream contentProvider) => this.ContentProvider = contentProvider; + + public void UnsetBinding() => this.ContentProvider = null; + + public void OnContent() + { + if (Interlocked.CompareExchange(ref this._isAlreadyProcessingContent, 1, 0) != 0) + return; + + try + { + //HTTPManager.Logger.Information(nameof(HTTP1ContentConsumer), $"OnContent({peekable?.Length}, {this._response?.ReadState})", this.Context, this.conn.CurrentRequest.Context); + try + { + if (this.conn.CurrentRequest.TimeoutSettings.IsTimedOut(DateTime.UtcNow)) + throw new TimeoutException(); + + if (this.conn.CurrentRequest.IsCancellationRequested) + throw new Exception("Cancellation requested!"); + + this._response.ProcessPeekable(this.ContentProvider); + } + catch (Exception e) + { + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + + // After an exception, this._response will be null! + if (this._response != null) + { + if (this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Finished) + FinishedProcessing(null); + else if (this._response.ReadState == PeekableHTTP1Response.PeekableReadState.WaitForContentSent) + { + (this as IThreadSignaler).SignalThread(); + } + } + } + finally + { + Interlocked.Exchange(ref this._isAlreadyProcessingContent, 0); + } + } + + public void OnConnectionClosed() + { + HTTPManager.Logger.Information(nameof(HTTP1ContentConsumer), $"OnConnectionClosed({this.ContentProvider?.Length}, {this._response?.ReadState})", this.Context); + + if (this._response != null && + this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Content && + this._response.DeliveryMode == PeekableHTTP1Response.ContentDeliveryMode.RawUnknownLength && + "close".Equals(this._response.GetFirstHeaderValue("connection"), StringComparison.OrdinalIgnoreCase)) + { + FinishedProcessing(null); + } + else if (this.ContentProvider != null && this.ContentProvider.Length > 0 && + this._response != null && + this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Content && + this._response.DownStream != null) + { + // Let the stream comsume any buffered data first, and handle closure when the buffer depletes. + // TODO: This require however that the PeekableResponse ping this HTTP1ContentConsumer when buffer space is available in the down-stream. + // Or force-add all remaining data to the stream and see whether we finished downloading or not. + // Problems: + // 1.) OnContent might be already called and a call to it would be dropped. We could spin up a new thread waiting for its finish, then call it again. + //throw new NotImplementedException(); + ThreadedRunner.RunShortLiving(() => + { + SpinWait spinWait = new SpinWait(); + + while (Interlocked.CompareExchange(ref this._isAlreadyProcessingContent, 1, 0) == 1) + spinWait.SpinOnce(); + + try + { + try + { + this._response.DownStream.EmergencyIncreaseMaxBuffered(); + this._response.ProcessPeekable(this.ContentProvider); + } + catch (Exception e) + { + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + finally + { + // After an exception, this._response will be null! + if (this._response != null) + { + if (this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Finished) + FinishedProcessing(null); + else + FinishedProcessing(new Exception("Underlying TCP connection closed unexpectedly!")); + } + } + } + finally + { + Interlocked.Exchange(ref this._isAlreadyProcessingContent, 0); + } + }); + + return; + } + + // If the consumer still have a request: error it and close the connection + if (this.conn.CurrentRequest != null && this._response != null) + { + FinishedProcessing(new Exception("Underlying TCP connection closed unexpectedly!")); + } + else // If no current request: close the connection + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this.conn, HTTPConnectionStates.Closed)); + + } + + public void OnError(Exception e) + { + HTTPManager.Logger.Information(nameof(HTTP1ContentConsumer), $"OnError({this.ContentProvider?.Length}, {this._response?.ReadState}, {this.ShutdownType})", this.Context); + + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + + private void OnCancellationRequested(HTTPRequest req) + { + HTTPManager.Logger.Information(nameof(HTTP1ContentConsumer), "OnCancellationRequested()", this.Context); + + Interlocked.Exchange(ref this._response, null); + req.OnCancellationRequested -= OnCancellationRequested; + this.conn?.Streamer?.Dispose(); + } + + void FinishedProcessing(Exception ex) + { + // Warning: FinishedProcessing might be called from different threads in parallel: + // - send thread triggered by a write failure + // - read thread oncontent/OnError/OnConnectionClosed + + var resp = Interlocked.Exchange(ref this._response, null); + if (resp == null) + return; + + HTTPManager.Logger.Verbose(nameof(HTTP1ContentConsumer), $"{nameof(FinishedProcessing)}({resp.ReadState}, {ex})", this.Context); + + // Unset the consumer, we no longer expect another OnContent call until further notice. + //if (conn.TopStream is IPeekableContentProvider provider && provider?.Consumer == this) + // provider.Consumer = null; + this.ContentProvider.UnbindIf(this); + + var req = this.conn.CurrentRequest; + + req.OnCancellationRequested -= OnCancellationRequested; + + bool resendRequest = false; + HTTPRequestStates requestState = HTTPRequestStates.Finished; + HTTPConnectionStates connectionState = ex != null ? HTTPConnectionStates.Closed : HTTPConnectionStates.Recycle; + + // We could finish the request, ignore the error. + if (resp.ReadState == PeekableHTTP1Response.PeekableReadState.Finished) + ex = null; + + Exception error = ex; + + if (error != null) + { + // Timeout is a non-retryable error + if (ex is TimeoutException) + { + error = null; + requestState = HTTPRequestStates.TimedOut; + } + else + { + if (req.RetrySettings.Retries < req.RetrySettings.MaxRetries) + { + req.RetrySettings.Retries++; + error = null; + resendRequest = true; + } + else + { + requestState = HTTPRequestStates.Error; + } + } + + // Any exception means that the connection is in an unknown state, we shouldn't try to reuse it. + connectionState = HTTPConnectionStates.Closed; + + resp.Dispose(); + } + else + { + // After HandleResponse connectionState can have the following values: + // - Processing: nothing interesting, caller side can decide what happens with the connection (recycle connection). + // - Closed: server sent an connection: close header. + // - ClosedResendRequest: in this case resendRequest is true, and the connection must not be reused. + // In this case we can send only one ConnectionEvent to handle both case and avoid concurrency issues. + + error = ConnectionHelper.HandleResponse(req, out resendRequest, out connectionState, ref this._keepAlive, this.Context); + + if (error != null) + requestState = HTTPRequestStates.Error; + else if (!resendRequest && resp.IsUpgraded) + requestState = HTTPRequestStates.Processing; + } + + req.Timing.StartNext(TimingEventNames.Queued); + + HTTPManager.Logger.Verbose(nameof(HTTP1ContentConsumer), $"{nameof(FinishedProcessing)} final decision. ResendRequest: {resendRequest}, RequestState: {requestState}, ConnectionState: {connectionState}", this.Context); + + // If HandleResponse returned with ClosedResendRequest or there were an error and we can retry the request + if (connectionState == HTTPConnectionStates.ClosedResendRequest || (resendRequest && connectionState == HTTPConnectionStates.Closed)) + { + ConnectionHelper.ResendRequestAndCloseConnection(this.conn, req); + } + else if (resendRequest && requestState == HTTPRequestStates.Finished) + { + (conn.TopStream as IPeekableContentProvider).SwitchIf(null, this.conn as IContentConsumer); + + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(req, RequestEvents.Resend)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this.conn, connectionState)); + } + else + { + if (resp == null || !resp.IsUpgraded) + (conn.TopStream as IPeekableContentProvider).SwitchIf(null, this.conn as IContentConsumer); + + // Otherwise set the request's then the connection's state + ConnectionHelper.EnqueueEvents(this.conn, connectionState, req, requestState, error); + } + } + + public void Process(HTTPRequest request) + { + (conn.TopStream as IPeekableContentProvider).SetTwoWayBinding(this); + + // https://github.com/Benedicht/BestHTTP-Issues/issues/179 + // Toughts: + // - Many requests, especially if they are uploading slowly, can occupy all background threads. + // Use short-living thread when: + // - It's a GET request + // - It's not an upgrade request + + bool isRequestWithoutBody = request.MethodType == HTTPMethods.Get || + request.MethodType == HTTPMethods.Head || + request.MethodType == HTTPMethods.Delete || + request.MethodType == HTTPMethods.Options; + bool isUpgrade = request.HasHeader("upgrade"); + + var useShortLivingThread = HTTPManager.PerHostSettings.Get(request.CurrentHostKey).HTTP1ConnectionSettings.ForceUseThreadPool || + (isRequestWithoutBody && !isUpgrade); + + if (useShortLivingThread) + ThreadedRunner.RunShortLiving(RunHandler); + else + ThreadedRunner.RunLongLiving(RunHandler); + } + + public void Shutdown(ShutdownTypes type) + { + HTTPManager.Logger.Verbose(nameof(HTTP1ContentConsumer), string.Format($"Shutdown({type})"), this.Context); + this.ShutdownType = type; + } + + void IThreadSignaler.SignalThread() + { + Interlocked.Exchange(ref this._hasMoreData, 1); + + if (this._acceptContentSignals == 1 && Interlocked.CompareExchange(ref this._isSendingContent, 1, 0) == 0) + ThreadedRunner.RunShortLiving(SignalThreadHandler); + } + + void SignalThreadHandler() + { + try + { + SendContent(null); + } + catch (Exception e) + { + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + } + + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + private void Dispose(bool disposing) + { + this._upStream?.Dispose(); + this._upStream = null; + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs.meta new file mode 100644 index 00000000..be130fa1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1c761c8505fda1a4e9e6be9f79b74054 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/HTTP1ContentConsumer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs new file mode 100644 index 00000000..43e724ad --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs @@ -0,0 +1,540 @@ +using Best.HTTP.Request.Timings; +using Best.HTTP.Response.Decompression; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +using System; +using System.Collections.Generic; +using System.Runtime.InteropServices; +using System.Threading; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; +using static Best.HTTP.Response.HTTPStatusCodes; + +namespace Best.HTTP.Hosts.Connections.HTTP1 +{ + /// + /// An HTTP 1.1 response implementation that can utilize a peekable stream. + /// Its main entry point is the ProcessPeekable method that should be called after every chunk of data downloaded. + /// + public class PeekableHTTP1Response : HTTPResponse + { + public PeekableReadState ReadState + { + get => this._readState; + private set + { + if (this._readState != value && HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(PeekableHTTP1Response), $"{this._readState} => {value}", this.Context); + this._readState = value; + } + } + private PeekableReadState _readState; + + public bool ForceDepleteContent; + + public enum ContentDeliveryMode + { + Raw, + RawUnknownLength, + Chunked, + } + + public enum PeekableReadState + { + StatusLine, + Headers, + WaitForContentSent, // when received a 100-continue + PrepareForContent, + ContentSetup, + Content, + Finished + } + + public ContentDeliveryMode DeliveryMode => this._deliveryMode; + private ContentDeliveryMode _deliveryMode; + private long _expectedLength; + private Dictionary> _newHeaders; + + long _downloaded = 0; + IDecompressor _decompressor = null; + bool _compressed = false; + bool sendProgressChanged; + + int _chunkLength = -1; + + enum ReadChunkedStates + { + ReadChunkLength, + ReadChunk, + ReadTrailingCRLF, + ReadTrailingHeaders + } + ReadChunkedStates _readChunkedState = ReadChunkedStates.ReadChunkLength; + + IDownloadContentBufferAvailable _bufferAvailableHandler; + + public PeekableHTTP1Response(HTTPRequest request, bool isFromCache, IDownloadContentBufferAvailable bufferAvailableHandler) + : base(request, isFromCache) + { + this._bufferAvailableHandler = bufferAvailableHandler; + } + + private int _isProccessing; + + public void ProcessPeekable(PeekableContentProviderStream peekable) + { + // To avoid executing ProcessPeekable in parallel on two threads, do an atomic CompareExchange and return if the old value wasn't 0. + if (Interlocked.CompareExchange(ref this._isProccessing, 1, 0) != 0) + return; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(PeekableHTTP1Response), $"ProcessPeekable({this.ReadState}, {peekable.Length})", this.Context); + + try + { + // The first call after setting it to PeekableReadState.WaitForContentSent is after the the client could send its content. + // This also works when "If the request did not contain an Expect header field containing the 100-continue expectation, + // the client can simply discard this interim response." + // (https://www.rfc-editor.org/rfc/rfc9110#section-15.2.1-3) + if (this._readState == PeekableReadState.WaitForContentSent) + { + this._newHeaders?.Clear(); + this.Headers?.Clear(); + + this._readState = PeekableReadState.StatusLine; + } + + // It's an unexpected network closure, except when we reading the content in the RawUnknownLength delivery mode. + if (peekable == null && ReadState != PeekableReadState.Content && this._deliveryMode != ContentDeliveryMode.RawUnknownLength) + throw new Exception("Server closed the connection unexpectedly!"); + + switch (ReadState) + { + case PeekableReadState.StatusLine: + if (!IsNewLinePresent(peekable)) + return; + + Request.Timing.StartNext(TimingEventNames.Headers); + + var statusLine = HTTPResponse.ReadTo(peekable, (byte)' '); + string[] versions = statusLine.Split(new char[] { '/', '.' }); + + this.HTTPVersion = new Version(int.Parse(versions[1]), int.Parse(versions[2])); + + int statusCode; + string statusCodeStr = NoTrimReadTo(peekable, (byte)' ', LF); + + if (!int.TryParse(statusCodeStr, out statusCode)) + throw new Exception($"Couldn't parse '{statusCodeStr}' as a status code!"); + + this.StatusCode = statusCode; + + if (statusCodeStr.Length > 0 && (byte)statusCodeStr[statusCodeStr.Length - 1] != LF && (byte)statusCodeStr[statusCodeStr.Length - 1] != CR) + this.Message = ReadTo(peekable, LF); + else + { + HTTPManager.Logger.Warning(nameof(PeekableHTTP1Response), "Skipping Status Message reading!", this.Context); + + this.Message = string.Empty; + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(PeekableHTTP1Response), $"HTTP/'{this.HTTPVersion}' '{this.StatusCode}' '{this.Message}'", this.Context); + + if (this.Request?.DownloadSettings?.OnHeadersReceived != null) + this._newHeaders = new Dictionary>(StringComparer.OrdinalIgnoreCase); + + this.ReadState = PeekableReadState.Headers; + goto case PeekableReadState.Headers; + + case PeekableReadState.Headers: + ProcessReadHeaders(peekable, PeekableReadState.PrepareForContent); + if (this.ReadState == PeekableReadState.PrepareForContent) + { +#if !UNITY_WEBGL || UNITY_EDITOR + // When upgraded, we don't want to read the content here, so set the state to Finished. + if (this.StatusCode == 101 && (HasHeaderWithValue("connection", "upgrade") || HasHeader("upgrade")) && this.Request?.DownloadSettings?.OnUpgraded != null) + { + HTTPManager.Logger.Information(nameof(PeekableHTTP1Response), "Request Upgraded!", this.Context); + + this.IsUpgraded = this.Request.DownloadSettings.OnUpgraded(this.Request, this, peekable); + + if (this.IsUpgraded) + { + this._readState = PeekableReadState.Finished; + goto case PeekableReadState.Finished; + } + } +#endif + + // If it's a 100-continue, restart reading the response after the client could send its content. + if (this.StatusCode == Continue) + { + this._readState = PeekableReadState.WaitForContentSent; + break; + } + + // https://www.rfc-editor.org/rfc/rfc9110#name-informational-1xx + // A 1xx response is terminated by the end of the header section; it cannot contain content or trailers. + if ((this.StatusCode >= Continue && this.StatusCode < OK) || + + // https://www.rfc-editor.org/rfc/rfc9110#name-204-no-content + // A 204 response is terminated by the end of the header section; it cannot contain content or trailers. + this.StatusCode == NoContent || + + // https://www.rfc-editor.org/rfc/rfc9110#name-304-not-modified + // A 304 response is terminated by the end of the header section; it cannot contain content or trailers. + this.StatusCode == NotModified || + + // https://www.rfc-editor.org/rfc/rfc7230#section-3.3 + // Responses to the HEAD request method (Section 4.3.2 + // of [RFC7231]) never include a message body because the associated + // response header fields (e.g., Transfer-Encoding, Content-Length, + // etc.), if present, indicate only what their values would have been if + // the request method had been GET + this.Request.MethodType == HTTPMethods.Head) + { + this._readState = PeekableReadState.Finished; + goto case PeekableReadState.Finished; + } + + Request.Timing.StartNext(TimingEventNames.Response_Received); + + // if not an upgraded response, or OnUpgraded returned false, go for the content too. + goto case PeekableReadState.PrepareForContent; + } + break; + + case PeekableReadState.PrepareForContent: + BeginReceiveContent(); + + // A content-length header might come with chunked transfer-encoding too. + var contentLengthHeader = GetFirstHeaderValue("content-length"); + long.TryParse(contentLengthHeader, out this._expectedLength); + + if (HasHeaderWithValue("transfer-encoding", "chunked") && string.IsNullOrEmpty(contentLengthHeader)) + { + this._deliveryMode = ContentDeliveryMode.Chunked; + this.ReadState = PeekableReadState.ContentSetup; + } + else + { + this._deliveryMode = ContentDeliveryMode.Raw; + this.ReadState = PeekableReadState.ContentSetup; + var contentRangeHeaders = GetHeaderValues("content-range"); + + if (contentLengthHeader == null && contentRangeHeaders == null) + { + this._deliveryMode = ContentDeliveryMode.RawUnknownLength; + } + else if (contentLengthHeader == null && contentRangeHeaders != null) + { + HTTPRange range = GetRange(); + + this._expectedLength = (range.LastBytePos - range.FirstBytePos) + 1; + } + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(PeekableHTTP1Response), $"PrepareForContent - delivery mode selected: {this._deliveryMode}, {this._expectedLength}!", this.Context); + + CreateDownloadStream(this._bufferAvailableHandler); + + string encoding = IsFromCache ? null : GetFirstHeaderValue("content-encoding"); + +#if !UNITY_WEBGL || UNITY_EDITOR + this._compressed = !string.IsNullOrEmpty(encoding); + + // https://github.com/Benedicht/BestHTTP-Issues/issues/183 + // If _decompressor is still null, remove the compressed flag and serve the content as-is. + if ((this._decompressor = DecompressorFactory.GetDecompressor(encoding, this.Context)) == null) + this._compressed = false; +#endif + + this.sendProgressChanged = this.Request.DownloadSettings.OnDownloadProgress != null && this.IsSuccess; + + this.ReadState = PeekableReadState.Content; + goto case PeekableReadState.Content; + + case PeekableReadState.Content: + var downStream = this.DownStream; + if (downStream != null && downStream.MaxBuffered <= downStream.Length) + return; + + switch (this._deliveryMode) + { + case ContentDeliveryMode.Raw: ProcessReadRaw(peekable); break; + case ContentDeliveryMode.RawUnknownLength: ProcessReadRawUnknownLength(peekable); break; + case ContentDeliveryMode.Chunked: ProcessReadChunked(peekable); break; + } + + if (this.ReadState == PeekableReadState.Finished) + goto case PeekableReadState.Finished; + break; + + case PeekableReadState.Finished: + //baseRequest.Timing.StartNext(TimingEventNames.Queued_For_Disptach); + break; + } + } + finally + { + Interlocked.Exchange(ref this._isProccessing, 0); + } + } + + bool IsNewLinePresent(PeekableStream peekable) + { + peekable.BeginPeek(); + + int nextByte = peekable.PeekByte(); + while (nextByte >= 0 && nextByte != 0x0A) + nextByte = peekable.PeekByte(); + + return nextByte == 0x0A; + } + + private void ProcessReadHeaders(PeekableStream peekable, PeekableReadState targetState) + { + if (!IsNewLinePresent(peekable)) + return; + + do + { + string headerName = ReadTo(peekable, (byte)':', LF); + if (headerName == string.Empty) + { + this.ReadState = targetState; + + if (this.Request?.DownloadSettings?.OnHeadersReceived != null) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, this._newHeaders)); + return; + } + + string value = ReadTo(peekable, LF); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(PeekableHTTP1Response), $"Header - '{headerName}': '{value}'", this.Context); + + AddHeader(headerName, value); + + if (this._newHeaders != null) + { + List values; + if (!this._newHeaders.TryGetValue(headerName, out values)) + this._newHeaders.Add(headerName, values = new List(1)); + + values.Add(value); + } + } while (IsNewLinePresent(peekable)); + } + + private void ProcessReadRawUnknownLength(PeekableStream peekable) + { + if (peekable == null) + { + if (sendProgressChanged) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, RequestEvents.DownloadProgress, this._downloaded, this._expectedLength)); + + PostProcessContent(); + + this.ReadState = PeekableReadState.Finished; + + return; + } + + while (peekable.Length > 0) + { + var buffer = BufferPool.Get(64 * 1024, true, this.Context); + + var readCount = peekable.Read(buffer, 0, buffer.Length); + + ProcessChunk(buffer.AsBuffer(readCount)); + } + + if (sendProgressChanged) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, RequestEvents.DownloadProgress, this._downloaded, this._expectedLength)); + } + + private bool TryReadChunkLength(PeekableStream peekable, out int result) + { + result = -1; + if (!IsNewLinePresent(peekable)) + return false; + + // Read until the end of line, then split the string so we will discard any optional chunk extensions + + var buff = ReadToAsByte(peekable, LF); + + if (buff == BufferSegment.Empty) + return false; + + try + { + var chars = MemoryMarshal.Cast(buff.AsSpan()); + + var idx = chars.IndexOf(';'); + + if (idx == -1) + idx = chars.Length; + + return int.TryParse(chars.Slice(0, idx), System.Globalization.NumberStyles.AllowHexSpecifier, null, out result); + } + finally + { + BufferPool.Release(buff); + } + } + + void ProcessReadChunked(PeekableStream peekable) + { + switch(this._readChunkedState) + { + case ReadChunkedStates.ReadChunkLength: + this._readChunkedState = ReadChunkedStates.ReadChunkLength; + + if (TryReadChunkLength(peekable, out this._chunkLength)) + { + if (this._chunkLength == 0) + { + PostProcessContent(); + + if (this.Request?.DownloadSettings?.OnHeadersReceived != null) + this._newHeaders = new Dictionary>(StringComparer.OrdinalIgnoreCase); + goto case ReadChunkedStates.ReadTrailingHeaders; + } + + goto case ReadChunkedStates.ReadChunk; + } + break; + + case ReadChunkedStates.ReadChunk: + this._readChunkedState = ReadChunkedStates.ReadChunk; + + while (this._chunkLength > 0 && peekable.Length > 0) + { + int targetReadCount = Math.Min(Math.Min(64 * 1024, this._chunkLength), (int)peekable.Length); + + var buffer = BufferPool.Get(targetReadCount, true, this.Context); + + var readCount = peekable.Read(buffer, 0, targetReadCount); + + if (readCount < 0) + { + BufferPool.Release(buffer); + throw ExceptionHelper.ServerClosedTCPStream(); + } + + this._chunkLength -= readCount; + + ProcessChunk(buffer.AsBuffer(readCount)); + } + + if (sendProgressChanged) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, RequestEvents.DownloadProgress, this._downloaded, this._expectedLength)); + + // Every chunk data has a trailing CRLF + if (this._chunkLength == 0) + goto case ReadChunkedStates.ReadTrailingCRLF; + break; + + case ReadChunkedStates.ReadTrailingCRLF: + this._readChunkedState = ReadChunkedStates.ReadTrailingCRLF; + + if (IsNewLinePresent(peekable)) + { + BufferPool.Release(HTTPResponse.ReadToAsByte(peekable, LF)); + + goto case ReadChunkedStates.ReadChunkLength; + } + break; + + case ReadChunkedStates.ReadTrailingHeaders: + this._readChunkedState = ReadChunkedStates.ReadTrailingHeaders; + + ProcessReadHeaders(peekable, PeekableReadState.Finished); + break; + } + } + + void ProcessReadRaw(PeekableStream peekable) + { + if (this.DownStream == null) + throw new ArgumentNullException(nameof(this.DownStream)); + if (peekable == null) + throw new ArgumentNullException(nameof(peekable)); + + while (peekable.Length > 0 && !this.DownStream.IsFull) + { + var buffer = BufferPool.Get(64 * 1024, true, this.Context); + + var readCount = peekable.Read(buffer, 0, buffer.Length); + + if (readCount < 0) + { + BufferPool.Release(buffer); + throw ExceptionHelper.ServerClosedTCPStream(); + } + + ProcessChunk(buffer.AsBuffer(readCount)); + } + + if (sendProgressChanged) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, RequestEvents.DownloadProgress, this._downloaded, this._expectedLength)); + + if (this._downloaded >= this._expectedLength) + { + PostProcessContent(); + this.ReadState = PeekableReadState.Finished; + } + } + + void ProcessChunk(BufferSegment chunk) + { + this._downloaded += chunk.Count; + + if (this._compressed) + { + var (decompressed, release) = this._decompressor.Decompress(chunk, false, true, this.Context); + if (decompressed != BufferSegment.Empty) + FeedDownloadedContentChunk(decompressed); + + //if (decompressed.Data != chunk.Data) + if (release) + BufferPool.Release(chunk); + } + else + { + FeedDownloadedContentChunk(chunk); + } + } + + void PostProcessContent() + { + if (this._compressed) + { + var (decompressed, release) = this._decompressor.Decompress(BufferSegment.Empty, true, true, this.Context); + if (decompressed != BufferSegment.Empty) + FeedDownloadedContentChunk(decompressed); + } + + FinishedContentReceiving(); + + if (this._decompressor != null) + { + this._decompressor.Dispose(); + this._decompressor = null; + } + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._decompressor?.Dispose(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs.meta new file mode 100644 index 00000000..f0076347 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 52e5f71e9a1d66d4ab61f2f2eca03ff0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP1/PeekableHTTP1Response.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2.meta new file mode 100644 index 00000000..10297188 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e1d3da817905a4242998820f95474d45 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs new file mode 100644 index 00000000..d078a491 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs @@ -0,0 +1,152 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + public static class BufferHelper + { + public static void SetUInt16(byte[] buffer, int offset, UInt16 value) + { + buffer[offset + 1] = (byte)(value); + buffer[offset + 0] = (byte)(value >> 8); + } + + public static void SetUInt24(byte[] buffer, int offset, UInt32 value) + { + buffer[offset + 2] = (byte)(value); + buffer[offset + 1] = (byte)(value >> 8); + buffer[offset + 0] = (byte)(value >> 16); + } + + public static void SetUInt31(byte[] buffer, int offset, UInt32 value) + { + buffer[offset + 3] = (byte)(value); + buffer[offset + 2] = (byte)(value >> 8); + buffer[offset + 1] = (byte)(value >> 16); + buffer[offset + 0] = (byte)((value >> 24) & 0x7F); + } + + public static void SetUInt32(byte[] buffer, int offset, UInt32 value) + { + buffer[offset + 3] = (byte)(value); + buffer[offset + 2] = (byte)(value >> 8); + buffer[offset + 1] = (byte)(value >> 16); + buffer[offset + 0] = (byte)(value >> 24); + } + + public static void SetLong(byte[] buffer, int offset, long value) + { + buffer[offset + 7] = (byte)(value); + buffer[offset + 6] = (byte)(value >> 8); + buffer[offset + 5] = (byte)(value >> 16); + buffer[offset + 4] = (byte)(value >> 24); + buffer[offset + 3] = (byte)(value >> 32); + buffer[offset + 2] = (byte)(value >> 40); + buffer[offset + 1] = (byte)(value >> 48); + buffer[offset + 0] = (byte)(value >> 56); + } + + public static byte SetBit(byte value, byte bitIdx, bool bitValue) + { + // bitIdx: 01234567 + return SetBit(value, bitIdx, Convert.ToByte(bitValue)); + } + + public static byte SetBit(byte value, byte bitIdx, byte bitValue) + { + // bitIdx: 01234567 + + return (byte)((value ^ (value & (0x80 >> bitIdx))) | bitValue << (7 - bitIdx)); + } + + public static byte ReadBit(byte value, byte bitIdx) + { + // bitIdx: 01234567 + byte mask = (byte)(0x80 >> bitIdx); + + return (byte)((value & mask) >> (7 - bitIdx)); + } + + public static byte ReadValue(byte value, byte fromBit, byte toBit) + { + // bitIdx: 01234567 + + byte result = 0; + short idx = toBit; + + while (idx >= fromBit) + { + result += (byte)(ReadBit(value, (byte)idx) << (toBit - idx)); + idx--; + } + + return result; + } + + public static UInt16 ReadUInt16(byte[] buffer, int offset) + { + return (UInt16)(buffer[offset + 1] | buffer[offset] << 8); + } + + public static UInt32 ReadUInt24(byte[] buffer, int offset) + { + return (UInt32)(buffer[offset + 2] | + buffer[offset + 1] << 8 | + buffer[offset + 0] << 16 + ); + } + + public static UInt32 ReadUInt31(byte[] buffer, int offset) + { + return (UInt32)(buffer[offset + 3] | + buffer[offset + 2] << 8 | + buffer[offset + 1] << 16 | + (buffer[offset] & 0x7F) << 24 + ); + } + + public static UInt32 ReadUInt31(BufferSegment buffer, int offset) + { + return (UInt32)( buffer.Data[offset + 3] | + buffer.Data[offset + 2] << 8 | + buffer.Data[offset + 1] << 16 | + (buffer.Data[offset] & 0x7F) << 24 + ); + } + + public static UInt32 ReadUInt32(byte[] buffer, int offset) + { + return (UInt32)(buffer[offset + 3] | + buffer[offset + 2] << 8 | + buffer[offset + 1] << 16 | + buffer[offset + 0] << 24 + ); + } + + public static UInt32 ReadUInt32(BufferSegment buffer, int offset) + { + return (UInt32)(buffer.Data[offset + 3] | + buffer.Data[offset + 2] << 8 | + buffer.Data[offset + 1] << 16 | + buffer.Data[offset + 0] << 24 + ); + } + + public static long ReadLong(BufferSegment buffer, int offset) + { + return (long)buffer.Data[offset + 7] | + (long)buffer.Data[offset + 6] << 8 | + (long)buffer.Data[offset + 5] << 16 | + (long)buffer.Data[offset + 4] << 24 | + (long)buffer.Data[offset + 3] << 32 | + (long)buffer.Data[offset + 2] << 40 | + (long)buffer.Data[offset + 1] << 48 | + (long)buffer.Data[offset + 0] << 56; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs.meta new file mode 100644 index 00000000..22158d0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3ddab2aecdc1bd94688535c6d3532949 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/BufferHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs new file mode 100644 index 00000000..652a8160 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs @@ -0,0 +1,203 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Text; + +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + public interface IFrameDataView : IDisposable + { + long Length { get; } + long Position { get; } + + void AddFrame(HTTP2FrameHeaderAndPayload frame); + int ReadByte(); + int Read(byte[] buffer, int offset, int count); + } + + public abstract class CommonFrameView : IFrameDataView + { + public long Length { get; protected set; } + public long Position { get; protected set; } + + protected List frames = new List(); + protected int currentFrameIdx = -1; + protected byte[] data; + protected int dataOffset; + protected int maxOffset; + + public abstract void AddFrame(HTTP2FrameHeaderAndPayload frame); + protected abstract long CalculateDataLengthForFrame(HTTP2FrameHeaderAndPayload frame); + + public virtual int Read(byte[] buffer, int offset, int count) + { + if (this.dataOffset >= this.maxOffset && !AdvanceFrame()) + return -1; + + int readCount = 0; + + while (count > 0) + { + long copyCount = Math.Min(count, this.maxOffset - this.dataOffset); + + Array.Copy(this.data, this.dataOffset, buffer, offset + readCount, copyCount); + + count -= (int)copyCount; + readCount += (int)copyCount; + + this.dataOffset += (int)copyCount; + this.Position += copyCount; + + if (this.dataOffset >= this.maxOffset && !AdvanceFrame()) + break; + } + + return readCount; + } + + public virtual int ReadByte() + { + if (this.dataOffset >= this.maxOffset && !AdvanceFrame()) + return -1; + + byte data = this.data[this.dataOffset]; + this.dataOffset++; + this.Position++; + + return data; + } + + protected abstract bool AdvanceFrame(); + + public virtual void Dispose() + { + for (int i = 0; i < this.frames.Count; ++i) + //if (this.frames[i].Payload != null && !this.frames[i].DontUseMemPool) + BufferPool.Release(this.frames[i].Payload); + this.frames.Clear(); + } + + public override string ToString() + { + var sb = StringBuilderPool.Get(this.frames.Count + 2); + sb.Append("[CommonFrameView "); + + for (int i = 0; i < this.frames.Count; ++i) { + sb.AppendFormat("{0} Payload: {1}\n", this.frames[i], this.frames[i].PayloadAsHex()); + } + + sb.Append("]"); + + return StringBuilderPool.ReleaseAndGrab(sb); + } + } + + public sealed class HeaderFrameView : CommonFrameView + { + public override void AddFrame(HTTP2FrameHeaderAndPayload frame) + { + if (frame.Type != HTTP2FrameTypes.HEADERS && frame.Type != HTTP2FrameTypes.CONTINUATION) + throw new ArgumentException("HeaderFrameView - Unexpected frame type: " + frame.Type); + + this.frames.Add(frame); + this.Length += CalculateDataLengthForFrame(frame); + + if (this.currentFrameIdx == -1) + AdvanceFrame(); + } + + protected override long CalculateDataLengthForFrame(HTTP2FrameHeaderAndPayload frame) + { + switch (frame.Type) + { + case HTTP2FrameTypes.HEADERS: + return HTTP2FrameHelper.ReadHeadersFrame(frame).HeaderBlockFragment.Count; + + case HTTP2FrameTypes.CONTINUATION: + return frame.Payload.Count; + } + + return 0; + } + + protected override bool AdvanceFrame() + { + if (this.currentFrameIdx >= this.frames.Count - 1) + return false; + + this.currentFrameIdx++; + HTTP2FrameHeaderAndPayload frame = this.frames[this.currentFrameIdx]; + + this.data = frame.Payload.Data; + + switch (frame.Type) + { + case HTTP2FrameTypes.HEADERS: + var header = HTTP2FrameHelper.ReadHeadersFrame(frame); + this.dataOffset = header.HeaderBlockFragment.Offset; + this.maxOffset = this.dataOffset + header.HeaderBlockFragment.Count; + break; + + case HTTP2FrameTypes.CONTINUATION: + this.dataOffset = 0; + this.maxOffset = frame.Payload.Count; + break; + } + + return true; + } + } + + public sealed class FramesAsStreamView : Stream + { + public override bool CanRead { get { return true; } } + public override bool CanSeek { get { return false; } } + public override bool CanWrite { get { return false; } } + public override long Length { get { return this.view.Length; } } + public override long Position { get { return this.view.Position; } set { throw new NotSupportedException(); } } + + private IFrameDataView view; + + public FramesAsStreamView(IFrameDataView view) + { + this.view = view; + } + + public void AddFrame(HTTP2FrameHeaderAndPayload frame) + { + this.view.AddFrame(frame); + } + + public override int ReadByte() + { + return this.view.ReadByte(); + } + + public override int Read(byte[] buffer, int offset, int count) + { + return this.view.Read(buffer, offset, count); + } + + public override void Close() + { + base.Close(); + this.view.Dispose(); + } + + public override void Flush() {} + public override long Seek(long offset, SeekOrigin origin) { throw new NotImplementedException(); } + public override void SetLength(long value) { throw new NotImplementedException(); } + public override void Write(byte[] buffer, int offset, int count) { throw new NotImplementedException(); } + + public override string ToString() + { + return this.view.ToString(); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs.meta new file mode 100644 index 00000000..f792ae41 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3117e531a50d6f74faedada4b320cebf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/FramesAsStreamView.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs new file mode 100644 index 00000000..b1ae0fb5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs @@ -0,0 +1,813 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +using System; +using System.Collections.Generic; +using System.IO; +using System.Linq; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + public sealed class HPACKEncoder + { + private HTTP2SettingsManager settingsRegistry; + + // https://http2.github.io/http2-spec/compression.html#encoding.context + // When used for bidirectional communication, such as in HTTP, the encoding and decoding dynamic tables + // maintained by an endpoint are completely independent, i.e., the request and response dynamic tables are separate. + private HeaderTable requestTable; + private HeaderTable responseTable; + + private LoggingContext _context; + + public HPACKEncoder(LoggingContext context, HTTP2SettingsManager registry) + { + this._context = context; + this.settingsRegistry = registry; + + // I'm unsure what settings (local or remote) we should use for these two tables! + this.requestTable = new HeaderTable(this.settingsRegistry.MySettings); + this.responseTable = new HeaderTable(this.settingsRegistry.RemoteSettings); + } + + public void Encode(HTTP2Stream context, HTTPRequest request, Queue to, UInt32 streamId) + { + // Add usage of SETTINGS_MAX_HEADER_LIST_SIZE to be able to create a header and one or more continuation fragments + // (https://httpwg.org/specs/rfc7540.html#SettingValues) + + using (BufferPoolMemoryStream bufferStream = new BufferPoolMemoryStream(request.UploadSettings.UploadChunkSize)) + { + request.Prepare(); + + // add :method + switch (request.MethodType) + { + case HTTPMethods.Get: WriteIndexedHeaderField(bufferStream, 2); break; + case HTTPMethods.Post: WriteIndexedHeaderField(bufferStream, 3); break; + default: + WriteLiteralHeaderFieldWithoutIndexing_IndexedName(bufferStream, 2, HTTPRequest.MethodNames[(int)request.MethodType]); + break; + } + + // add :authority + WriteLiteralHeaderFieldWithoutIndexing_IndexedName(bufferStream, 1, request.CurrentUri.Authority); + + // add :scheme + WriteIndexedHeaderField(bufferStream, 7); + + // add :path + WriteLiteralHeaderFieldWithoutIndexing_IndexedName(bufferStream, 4, request.CurrentUri.PathAndQuery); + + //bool hasBody = false; + + // add other, regular headers + request.EnumerateHeaders((header, values) => + { + if (header.Equals("connection", StringComparison.OrdinalIgnoreCase) || + (header.Equals("te", StringComparison.OrdinalIgnoreCase) && !values.Contains("trailers") && values.Count <= 1) || + header.Equals("host", StringComparison.OrdinalIgnoreCase) || + header.Equals("keep-alive", StringComparison.OrdinalIgnoreCase) || + header.StartsWith("proxy-", StringComparison.OrdinalIgnoreCase) || + (header.Equals("content-length", StringComparison.OrdinalIgnoreCase) && values.Count == 1 && int.TryParse(values[0], out int contentLength) && contentLength <= 0)) + return; + + //if (!hasBody) + // hasBody = header.Equals("content-length", StringComparison.OrdinalIgnoreCase) && int.Parse(values[0]) > 0; + + // https://httpwg.org/specs/rfc7540.html#HttpSequence + // The chunked transfer encoding defined in Section 4.1 of [RFC7230] MUST NOT be used in HTTP/2. + if (header.Equals("Transfer-Encoding", StringComparison.OrdinalIgnoreCase)) + { + // error! + return; + } + + // https://httpwg.org/specs/rfc7540.html#HttpHeaders + // Just as in HTTP/1.x, header field names are strings of ASCII characters that are compared in a case-insensitive fashion. + // However, header field names MUST be converted to lowercase prior to their encoding in HTTP/2. + // A request or response containing uppercase header field names MUST be treated as malformed + if (header.Any(Char.IsUpper)) + header = header.ToLowerInvariant(); + + for (int i = 0; i < values.Count; ++i) + { + WriteHeader(bufferStream, header, values[i]); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] - Encode - Header({1}/{2}): '{3}': '{4}'", context.Id, i + 1, values.Count, header, values[i]), this._context); + } + }, true); + + CreateHeaderFrames(to, + streamId, + bufferStream.ToArray(true, this._context), + (UInt32)bufferStream.Length, + request.UploadSettings.UploadStream != null); + } + } + + public void Decode(HTTP2Stream context, Stream stream, List> to) + { + int headerType = stream.ReadByte(); + while (headerType != -1) + { + byte firstDataByte = (byte)headerType; + + // https://http2.github.io/http2-spec/compression.html#indexed.header.representation + if (BufferHelper.ReadBit(firstDataByte, 0) == 1) + { + var header = ReadIndexedHeader(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - IndexedHeader: {1}", context.Id, header.ToString()), this._context); + + to.Add(header); + } + else if (BufferHelper.ReadValue(firstDataByte, 0, 1) == 1) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.with.incremental.indexing + + if (BufferHelper.ReadValue(firstDataByte, 2, 7) == 0) + { + // Literal Header Field with Incremental Indexing — New Name + var header = ReadLiteralHeaderFieldWithIncrementalIndexing_NewName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldWithIncrementalIndexing_NewName: {1}", context.Id, header.ToString()), this._context); + + this.responseTable.Add(header); + to.Add(header); + } + else + { + // Literal Header Field with Incremental Indexing — Indexed Name + var header = ReadLiteralHeaderFieldWithIncrementalIndexing_IndexedName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldWithIncrementalIndexing_IndexedName: {1}", context.Id, header.ToString()), this._context); + + this.responseTable.Add(header); + to.Add(header); + } + } + else if (BufferHelper.ReadValue(firstDataByte, 0, 3) == 0) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.without.indexing + + if (BufferHelper.ReadValue(firstDataByte, 4, 7) == 0) + { + // Literal Header Field without Indexing — New Name + var header = ReadLiteralHeaderFieldwithoutIndexing_NewName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldwithoutIndexing_NewName: {1}", context.Id, header.ToString()), this._context); + + to.Add(header); + } + else + { + // Literal Header Field without Indexing — Indexed Name + var header = ReadLiteralHeaderFieldwithoutIndexing_IndexedName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldwithoutIndexing_IndexedName: {1}", context.Id, header.ToString()), this._context); + + to.Add(header); + } + } + else if (BufferHelper.ReadValue(firstDataByte, 0, 3) == 1) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.never.indexed + + if (BufferHelper.ReadValue(firstDataByte, 4, 7) == 0) + { + // Literal Header Field Never Indexed — New Name + var header = ReadLiteralHeaderFieldNeverIndexed_NewName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldNeverIndexed_NewName: {1}", context.Id, header.ToString()), this._context); + + to.Add(header); + } + else + { + // Literal Header Field Never Indexed — Indexed Name + var header = ReadLiteralHeaderFieldNeverIndexed_IndexedName(firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - LiteralHeaderFieldNeverIndexed_IndexedName: {1}", context.Id, header.ToString()), this._context); + + to.Add(header); + } + } + else if (BufferHelper.ReadValue(firstDataByte, 0, 2) == 1) + { + // https://http2.github.io/http2-spec/compression.html#encoding.context.update + + UInt32 newMaxSize = DecodeInteger(5, firstDataByte, stream); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HPACKEncoder", string.Format("[{0}] Decode - Dynamic Table Size Update: {1}", context.Id, newMaxSize), this._context); + + //this.settingsRegistry[HTTP2Settings.HEADER_TABLE_SIZE] = (UInt16)newMaxSize; + this.responseTable.MaxDynamicTableSize = (UInt16)newMaxSize; + } + else + { + // ERROR + } + + headerType = stream.ReadByte(); + } + } + + private KeyValuePair ReadIndexedHeader(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#indexed.header.representation + + UInt32 index = DecodeInteger(7, firstByte, stream); + return this.responseTable.GetHeader(index); + } + + private KeyValuePair ReadLiteralHeaderFieldWithIncrementalIndexing_IndexedName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.with.incremental.indexing + + UInt32 keyIndex = DecodeInteger(6, firstByte, stream); + + string header = this.responseTable.GetKey(keyIndex); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private KeyValuePair ReadLiteralHeaderFieldWithIncrementalIndexing_NewName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.with.incremental.indexing + + string header = DecodeString(stream); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private KeyValuePair ReadLiteralHeaderFieldwithoutIndexing_IndexedName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.without.indexing + + UInt32 index = DecodeInteger(4, firstByte, stream); + string header = this.responseTable.GetKey(index); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private KeyValuePair ReadLiteralHeaderFieldwithoutIndexing_NewName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.without.indexing + + string header = DecodeString(stream); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private KeyValuePair ReadLiteralHeaderFieldNeverIndexed_IndexedName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.never.indexed + + UInt32 index = DecodeInteger(4, firstByte, stream); + string header = this.responseTable.GetKey(index); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private KeyValuePair ReadLiteralHeaderFieldNeverIndexed_NewName(byte firstByte, Stream stream) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.never.indexed + + string header = DecodeString(stream); + string value = DecodeString(stream); + + return new KeyValuePair(header, value); + } + + private string DecodeString(Stream stream) + { + byte start = (byte)stream.ReadByte(); + bool rawString = BufferHelper.ReadBit(start, 0) == 0; + UInt32 stringLength = DecodeInteger(7, start, stream); + + if (stringLength == 0) + return string.Empty; + + if (rawString) + { + byte[] buffer = BufferPool.Get(stringLength, true); + + stream.Read(buffer, 0, (int)stringLength); + + var result = System.Text.Encoding.UTF8.GetString(buffer, 0, (int)stringLength); + + BufferPool.Release(buffer); + + return result; + } + else + { + var node = HuffmanEncoder.GetRoot(); + byte currentByte = (byte)stream.ReadByte(); + byte bitIdx = 0; // 0..7 + + using (BufferPoolMemoryStream bufferStream = new BufferPoolMemoryStream((int)(stringLength * 1.5f))) + { + do + { + byte bitValue = BufferHelper.ReadBit(currentByte, bitIdx); + + if (++bitIdx > 7) + { + stringLength--; + + if (stringLength > 0) + { + bitIdx = 0; + currentByte = (byte)stream.ReadByte(); + } + } + + node = HuffmanEncoder.GetNext(node, bitValue); + + if (node.Value != 0) + { + if (node.Value != HuffmanEncoder.EOS) + bufferStream.WriteByte((byte)node.Value); + + node = HuffmanEncoder.GetRoot(); + } + } while (stringLength > 0); + + byte[] buffer = bufferStream.GetBuffer(); + + string result = System.Text.Encoding.UTF8.GetString(buffer, 0, (int)bufferStream.Length); + + return result; + } + } + } + + private void CreateHeaderFrames(Queue to, UInt32 streamId, byte[] dataToSend, UInt32 payloadLength, bool hasBody) + { + UInt32 maxFrameSize = this.settingsRegistry.RemoteSettings[HTTP2Settings.MAX_FRAME_SIZE]; + + // Only one headers frame + if (payloadLength <= maxFrameSize) + { + HTTP2FrameHeaderAndPayload frameHeader = new HTTP2FrameHeaderAndPayload(); + frameHeader.Type = HTTP2FrameTypes.HEADERS; + frameHeader.StreamId = streamId; + frameHeader.Flags = (byte)(HTTP2HeadersFlags.END_HEADERS); + + if (!hasBody) + frameHeader.Flags |= (byte)(HTTP2HeadersFlags.END_STREAM); + + frameHeader.Payload = dataToSend.AsBuffer((int)payloadLength); + + to.Enqueue(frameHeader); + } + else + { + HTTP2FrameHeaderAndPayload frameHeader = new HTTP2FrameHeaderAndPayload(); + frameHeader.Type = HTTP2FrameTypes.HEADERS; + frameHeader.StreamId = streamId; + + frameHeader.Payload = dataToSend.AsBuffer((int)maxFrameSize); + frameHeader.DontUseMemPool = true; + + if (!hasBody) + frameHeader.Flags = (byte)(HTTP2HeadersFlags.END_STREAM); + + to.Enqueue(frameHeader); + + UInt32 offset = maxFrameSize; + while (offset < payloadLength) + { + frameHeader = new HTTP2FrameHeaderAndPayload(); + frameHeader.Type = HTTP2FrameTypes.CONTINUATION; + frameHeader.StreamId = streamId; + + frameHeader.Payload = dataToSend.AsBuffer((int)offset, (int)maxFrameSize); + + offset += maxFrameSize; + + if (offset >= payloadLength) + { + frameHeader.Flags = (byte)(HTTP2ContinuationFlags.END_HEADERS); + // last sent continuation fragment will release back the payload buffer + frameHeader.DontUseMemPool = false; + } + else + frameHeader.DontUseMemPool = true; + + to.Enqueue(frameHeader); + } + } + } + + private void WriteHeader(Stream stream, string header, string value) + { + // https://http2.github.io/http2-spec/compression.html#header.representation + + KeyValuePair index = this.requestTable.GetIndex(header, value); + + if (index.Key == 0 && index.Value == 0) + { + WriteLiteralHeaderFieldWithIncrementalIndexing_NewName(stream, header, value); + this.requestTable.Add(new KeyValuePair(header, value)); + } + else if (index.Key != 0 && index.Value == 0) + { + WriteLiteralHeaderFieldWithIncrementalIndexing_IndexedName(stream, index.Key, value); + this.requestTable.Add(new KeyValuePair(header, value)); + } + else + { + WriteIndexedHeaderField(stream, index.Key); + } + } + + private static void WriteIndexedHeaderField(Stream stream, UInt32 index) + { + byte requiredBytes = RequiredBytesToEncodeInteger(index, 7); + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[0] = 0x80; + EncodeInteger(index, 7, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldWithIncrementalIndexing_IndexedName(Stream stream, UInt32 index, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.with.incremental.indexing + + UInt32 requiredBytes = RequiredBytesToEncodeInteger(index, 6) + + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[0] = 0x40; + EncodeInteger(index, 6, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldWithIncrementalIndexing_NewName(Stream stream, string header, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.with.incremental.indexing + + UInt32 requiredBytes = 1 + RequiredBytesToEncodeString(header) + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[offset++] = 0x40; + EncodeString(header, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldWithoutIndexing_IndexedName(Stream stream, UInt32 index, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.without.indexing + + UInt32 requiredBytes = RequiredBytesToEncodeInteger(index, 4) + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[0] = 0; + EncodeInteger(index, 4, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldWithoutIndexing_NewName(Stream stream, string header, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.without.indexing + + UInt32 requiredBytes = 1 + RequiredBytesToEncodeString(header) + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[offset++] = 0; + EncodeString(header, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldNeverIndexed_IndexedName(Stream stream, UInt32 index, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.never.indexed + + UInt32 requiredBytes = RequiredBytesToEncodeInteger(index, 4) + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[0] = 0x10; + EncodeInteger(index, 4, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteLiteralHeaderFieldNeverIndexed_NewName(Stream stream, string header, string value) + { + // https://http2.github.io/http2-spec/compression.html#literal.header.never.indexed + + UInt32 requiredBytes = 1 + RequiredBytesToEncodeString(header) + RequiredBytesToEncodeString(value); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[offset++] = 0x10; + EncodeString(header, buffer, ref offset); + EncodeString(value, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static void WriteDynamicTableSizeUpdate(Stream stream, UInt16 maxSize) + { + // https://http2.github.io/http2-spec/compression.html#encoding.context.update + + UInt32 requiredBytes = RequiredBytesToEncodeInteger(maxSize, 5); + + byte[] buffer = BufferPool.Get(requiredBytes, true); + UInt32 offset = 0; + + buffer[offset] = 0x20; + EncodeInteger(maxSize, 5, buffer, ref offset); + + stream.Write(buffer, 0, (int)offset); + + BufferPool.Release(buffer); + } + + private static UInt32 RequiredBytesToEncodeString(string str) + { + uint requiredBytesForRawStr = RequiredBytesToEncodeRawString(str); + uint requiredBytesForHuffman = RequiredBytesToEncodeStringWithHuffman(str); + requiredBytesForHuffman += RequiredBytesToEncodeInteger(requiredBytesForHuffman, 7); + + return Math.Min(requiredBytesForRawStr, requiredBytesForHuffman); + } + + private static void EncodeString(string str, byte[] buffer, ref UInt32 offset) + { + uint requiredBytesForRawStr = RequiredBytesToEncodeRawString(str); + uint requiredBytesForHuffman = RequiredBytesToEncodeStringWithHuffman(str); + + // if using huffman encoding would produce the same length, we choose raw encoding instead as it requires + // less CPU cicles + if (requiredBytesForRawStr <= requiredBytesForHuffman + RequiredBytesToEncodeInteger(requiredBytesForHuffman, 7)) + EncodeRawStringTo(str, buffer, ref offset); + else + EncodeStringWithHuffman(str, requiredBytesForHuffman, buffer, ref offset); + } + + // This calculates only the length of the compressed string, + // additional header length must be calculated using the value returned by this function + private static UInt32 RequiredBytesToEncodeStringWithHuffman(string str) + { + int requiredBytesForStr = System.Text.Encoding.UTF8.GetByteCount(str); + byte[] strBytes = BufferPool.Get(requiredBytesForStr, true); + + System.Text.Encoding.UTF8.GetBytes(str, 0, str.Length, strBytes, 0); + + UInt32 requiredBits = 0; + + for (int i = 0; i < requiredBytesForStr; ++i) + requiredBits += HuffmanEncoder.GetEntryForCodePoint(strBytes[i]).Bits; + + BufferPool.Release(strBytes); + + return (UInt32)((requiredBits / 8) + ((requiredBits % 8) == 0 ? 0 : 1)); + } + + private static void EncodeStringWithHuffman(string str, UInt32 encodedLength, byte[] buffer, ref UInt32 offset) + { + int requiredBytesForStr = System.Text.Encoding.UTF8.GetByteCount(str); + byte[] strBytes = BufferPool.Get(requiredBytesForStr, true); + + System.Text.Encoding.UTF8.GetBytes(str, 0, str.Length, strBytes, 0); + + // 0. bit: huffman flag + buffer[offset] = 0x80; + + // 1..7+ bit: length + EncodeInteger(encodedLength, 7, buffer, ref offset); + + byte bufferBitIdx = 0; + + for (int i = 0; i < requiredBytesForStr; ++i) + AddCodePointToBuffer(HuffmanEncoder.GetEntryForCodePoint(strBytes[i]), buffer, ref offset, ref bufferBitIdx); + + // https://http2.github.io/http2-spec/compression.html#string.literal.representation + // As the Huffman-encoded data doesn't always end at an octet boundary, some padding is inserted after it, + // up to the next octet boundary. To prevent this padding from being misinterpreted as part of the string literal, + // the most significant bits of the code corresponding to the EOS (end-of-string) symbol are used. + if (bufferBitIdx != 0) + AddCodePointToBuffer(HuffmanEncoder.GetEntryForCodePoint(256), buffer, ref offset, ref bufferBitIdx, true); + + BufferPool.Release(strBytes); + } + + private static void AddCodePointToBuffer(HuffmanTableEntry code, byte[] buffer, ref UInt32 offset, ref byte bufferBitIdx, bool finishOnBoundary = false) + { + for (byte codeBitIdx = 1; codeBitIdx <= code.Bits; ++codeBitIdx) + { + byte bit = code.GetBitAtIdx(codeBitIdx); + buffer[offset] = BufferHelper.SetBit(buffer[offset], bufferBitIdx, bit); + + // octet boundary reached, proceed to the next octet + if (++bufferBitIdx == 8) + { + if (++offset < buffer.Length) + buffer[offset] = 0; + + if (finishOnBoundary) + return; + + bufferBitIdx = 0; + } + } + } + + private static UInt32 RequiredBytesToEncodeRawString(string str) + { + int requiredBytesForStr = System.Text.Encoding.UTF8.GetByteCount(str); + int requiredBytesForLengthPrefix = RequiredBytesToEncodeInteger((UInt32)requiredBytesForStr, 7); + + return (UInt32)(requiredBytesForStr + requiredBytesForLengthPrefix); + } + + // This method encodes a string without huffman encoding + private static void EncodeRawStringTo(string str, byte[] buffer, ref UInt32 offset) + { + uint requiredBytesForStr = (uint)System.Text.Encoding.UTF8.GetByteCount(str); + int requiredBytesForLengthPrefix = RequiredBytesToEncodeInteger((UInt32)requiredBytesForStr, 7); + + UInt32 originalOffset = offset; + buffer[offset] = 0; + EncodeInteger(requiredBytesForStr, 7, buffer, ref offset); + + // Zero out the huffman flag + buffer[originalOffset] = BufferHelper.SetBit(buffer[originalOffset], 0, false); + + if (offset != originalOffset + requiredBytesForLengthPrefix) + throw new Exception(string.Format("offset({0}) != originalOffset({1}) + requiredBytesForLengthPrefix({1})", offset, originalOffset, requiredBytesForLengthPrefix)); + + System.Text.Encoding.UTF8.GetBytes(str, 0, str.Length, buffer, (int)offset); + offset += requiredBytesForStr; + } + + private static byte RequiredBytesToEncodeInteger(UInt32 value, byte N) + { + UInt32 maxValue = (1u << N) - 1; + byte count = 0; + + // If the integer value is small enough, i.e., strictly less than 2^N-1, it is encoded within the N-bit prefix. + if (value < maxValue) + { + count++; + } + else + { + // Otherwise, all the bits of the prefix are set to 1, and the value, decreased by 2^N-1 + count++; + value -= maxValue; + + while (value >= 0x80) + { + // The most significant bit of each octet is used as a continuation flag: its value is set to 1 except for the last octet in the list. + count++; + value = value / 0x80; + } + + count++; + } + + return count; + } + + // https://http2.github.io/http2-spec/compression.html#integer.representation + private static void EncodeInteger(UInt32 value, byte N, byte[] buffer, ref UInt32 offset) + { + // 2^N - 1 + UInt32 maxValue = (1u << N) - 1; + + // If the integer value is small enough, i.e., strictly less than 2^N-1, it is encoded within the N-bit prefix. + if (value < maxValue) + { + buffer[offset++] |= (byte)value; + } + else + { + // Otherwise, all the bits of the prefix are set to 1, and the value, decreased by 2^N-1 + buffer[offset++] |= (byte)(0xFF >> (8 - N)); + value -= maxValue; + + while (value >= 0x80) + { + // The most significant bit of each octet is used as a continuation flag: its value is set to 1 except for the last octet in the list. + buffer[offset++] = (byte)(0x80 | (0x7F & value)); + value = value / 0x80; + } + + buffer[offset++] = (byte)value; + } + } + + // https://http2.github.io/http2-spec/compression.html#integer.representation + private static UInt32 DecodeInteger(byte N, byte[] buffer, ref UInt32 offset) + { + // The starting value is the value behind the mask of the N bits + UInt32 value = (UInt32)(buffer[offset++] & (byte)(0xFF >> (8 - N))); + + // All N bits are 1s ? If so, we have at least one another byte to decode + if (value == (1u << N) - 1) + { + byte shift = 0; + + do + { + // The most significant bit is a continuation flag, so we have to mask it out + value += (UInt32)((buffer[offset] & 0x7F) << shift); + shift += 7; + } while ((buffer[offset++] & 0x80) == 0x80); + } + + return value; + } + + // https://http2.github.io/http2-spec/compression.html#integer.representation + private static UInt32 DecodeInteger(byte N, byte data, Stream stream) + { + // The starting value is the value behind the mask of the N bits + UInt32 value = (UInt32)(data & (byte)(0xFF >> (8 - N))); + + // All N bits are 1s ? If so, we have at least one another byte to decode + if (value == (1u << N) - 1) + { + byte shift = 0; + + do + { + data = (byte)stream.ReadByte(); + + // The most significant bit is a continuation flag, so we have to mask it out + value += (UInt32)((data & 0x7F) << shift); + shift += 7; + } while ((data & 0x80) == 0x80); + } + + return value; + } + + public override string ToString() + { + return this.requestTable.ToString() + this.responseTable.ToString(); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs.meta new file mode 100644 index 00000000..a159469b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa3995669bb00bb4b9662903873154c4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HPACKEncoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs new file mode 100644 index 00000000..d2125ede --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs @@ -0,0 +1,88 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL +using System; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + /// + /// Settings for HTTP/2 connections when the Connect protocol is available. + /// + public sealed class WebSocketOverHTTP2Settings + { + /// + /// Set it to false to disable Websocket Over HTTP/2 (RFC 8441). It's true by default. + /// + public bool EnableWebSocketOverHTTP2 { get; set; } = true; + + /// + /// Set it to disable fallback logic from the Websocket Over HTTP/2 implementation to the 'old' HTTP/1 implementation when it fails to connect. + /// + public bool EnableImplementationFallback { get; set; } = true; + } + + /// + /// Settings for HTTP/2 connections. + /// + public sealed class HTTP2ConnectionSettings + { + /// + /// When set to false, the plugin will not try to use HTTP/2 connections. + /// + public bool EnableHTTP2Connections = true; + + /// + /// Maximum size of the HPACK header table. + /// + public UInt32 HeaderTableSize = 4096; // Spec default: 4096 + + /// + /// Maximum concurrent http2 stream on http2 connection will allow. Its default value is 128; + /// + public UInt32 MaxConcurrentStreams = 128; // Spec default: not defined + + /// + /// Initial window size of a http2 stream. Its default value is 65535, can be controlled through the HTTPRequest's DownloadSettings object. + /// + public UInt32 InitialStreamWindowSize = UInt16.MaxValue; // Spec default: 65535 + + /// + /// Global window size of a http/2 connection. Its default value is the maximum possible value on 31 bits. + /// + public UInt32 InitialConnectionWindowSize = HTTP2ContentConsumer.MaxValueFor31Bits; // Spec default: 65535 + + /// + /// Maximum size of a http2 frame. + /// + public UInt32 MaxFrameSize = 16384; // 16384 spec def. + + /// + /// Not used. + /// + public UInt32 MaxHeaderListSize = UInt32.MaxValue; // Spec default: infinite + + /// + /// With HTTP/2 only one connection will be open so we can keep it open longer as we hope it will be reused more. + /// + public TimeSpan MaxIdleTime = TimeSpan.FromSeconds(120); + + /// + /// Time between two ping messages. + /// + public TimeSpan PingFrequency = TimeSpan.FromSeconds(5); + + /// + /// Timeout to receive a ping acknowledgement from the server. If no ack reveived in this time the connection will be treated as broken. + /// + public TimeSpan Timeout = TimeSpan.FromSeconds(3); + + /// + /// Set to true to enable RFC 8441 "Bootstrapping WebSockets with HTTP/2" (https://tools.ietf.org/html/rfc8441). + /// + public bool EnableConnectProtocol = false; + + /// + /// Settings for WebSockets over HTTP/2 (RFC 8441) + /// + public WebSocketOverHTTP2Settings WebSocketOverHTTP2Settings = new WebSocketOverHTTP2Settings(); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs.meta new file mode 100644 index 00000000..1d2f1dca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 40bfeb8809240f346a1a067b7fed0f3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ConnectionSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs new file mode 100644 index 00000000..4524d4cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs @@ -0,0 +1,695 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL +#define ENABLE_LOGGING +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Threading; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + public delegate HTTP2Stream CustomHTTP2StreamFactory(HTTPRequest request, uint streamId, HTTP2ContentConsumer parentHandler, HTTP2SettingsManager registry, HPACKEncoder hpackEncoder); + + public sealed class HTTP2ContentConsumer : IHTTPRequestHandler, IContentConsumer, IThreadSignaler + { + public KeepAliveHeader KeepAlive { get { return null; } } + + public bool CanProcessMultiple { get { return !this.SentGoAwayFrame && this.isRunning && this._maxAssignedRequests > 1; } } + + public int AssignedRequests => this._assignedRequest; + private int _assignedRequest; + + public int MaxAssignedRequests => this._maxAssignedRequests; + private int _maxAssignedRequests = 1; + + public const UInt32 MaxValueFor31Bits = 0xFFFFFFFF >> 1; + + public double Latency { get; private set; } + + public HTTP2SettingsManager settings; + public HPACKEncoder HPACKEncoder; + + public LoggingContext Context { get; private set; } + + public PeekableContentProviderStream ContentProvider { get; private set; } + + private DateTime lastPingSent = DateTime.MinValue; + private int waitingForPingAck = 0; + + public static int RTTBufferCapacity = 5; + private CircularBuffer rtts = new CircularBuffer(RTTBufferCapacity); + + private volatile bool isRunning; + + private AutoResetEvent newFrameSignal = new AutoResetEvent(false); + + private ConcurrentQueue requestQueue = new ConcurrentQueue(); + + private List clientInitiatedStreams = new List(); + + private ConcurrentQueue newFrames = new ConcurrentQueue(); + + private List outgoingFrames = new List(); + + private UInt32 remoteWindow; + private DateTime lastInteraction; + private DateTime goAwaySentAt = DateTime.MaxValue; + private bool SentGoAwayFrame { get => this.goAwaySentAt != DateTime.MaxValue; } + + private HTTPOverTCPConnection conn; + + private TimeSpan MaxGoAwayWaitTime { get { return !this.SentGoAwayFrame ? TimeSpan.MaxValue : TimeSpan.FromMilliseconds(Math.Max(this.Latency * 2.5, 1500)); } } + + // https://httpwg.org/specs/rfc7540.html#StreamIdentifiers + // Streams initiated by a client MUST use odd-numbered stream identifiers + // With an initial value of -1, the first client initiated stream's id going to be 1. + private long LastStreamId = -1; + + private HTTP2ConnectionSettings _connectionSettings; + + public HTTP2ContentConsumer(HTTPOverTCPConnection conn) + { + this.Context = new LoggingContext(this); + this.Context.Add("Parent", conn.Context); + + this.conn = conn; + this.isRunning = true; + + this._connectionSettings = HTTPManager.PerHostSettings.Get(conn.HostKey).HTTP2ConnectionSettings; + this.settings = new HTTP2SettingsManager(this.Context, this._connectionSettings); + + Process(this.conn.CurrentRequest); + } + + public void Process(HTTPRequest request) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Process request called", this.Context); +#endif + + request.TimeoutSettings.SetProcessing(this.lastInteraction = DateTime.UtcNow); + + Interlocked.Increment(ref this._assignedRequest); + + this.requestQueue.Enqueue(request); + SignalThread(); + } + + public void SignalThread() + { + this.newFrameSignal?.Set(); + } + + public void RunHandler() + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Processing thread up and running!", this.Context); +#endif + + ThreadedRunner.SetThreadName("Best.HTTP2 Process"); + + string abortWithMessage = string.Empty; + + try + { + bool atLeastOneStreamHasAFrameToSend = true; + + this.HPACKEncoder = new HPACKEncoder(this.Context, this.settings); + + // https://httpwg.org/specs/rfc7540.html#InitialWindowSize + // The connection flow-control window is also 65,535 octets. + this.remoteWindow = this.settings.RemoteSettings[HTTP2Settings.INITIAL_WINDOW_SIZE]; + + // we want to pack as many data as we can in one tcp segment, but setting the buffer's size too high + // we might keep data too long and send them in bursts instead of in a steady stream. + // Keeping it too low might result in a full tcp segment and one with very low payload + // Is it possible that one full tcp segment sized buffer would be the best, or multiple of it. + // It would keep the network busy without any fragments. The ethernet layer has a maximum of 1500 bytes, + // but there's two layers of 20 byte headers each, so as a theoretical maximum it's 1500-20-20 bytes. + // On the other hand, if the buffer is small (1-2), that means that for larger data, we have to do a lot + // of system calls, in that case a larger buffer might be better. Still, if we are not cpu bound, + // a well saturated network might serve us better. + using (WriteOnlyBufferedStream bufferedStream = new WriteOnlyBufferedStream(this.conn.TopStream, 1024 * 1024 /*1500 - 20 - 20*/, this.Context)) + { + // The client connection preface starts with a sequence of 24 octets + // Connection preface starts with the string PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n). + ReadOnlySpan MAGIC = stackalloc byte[24] { 0x50, 0x52, 0x49, 0x20, 0x2a, 0x20, 0x48, 0x54, 0x54, 0x50, 0x2f, 0x32, 0x2e, 0x30, 0x0d, 0x0a, 0x0d, 0x0a, 0x53, 0x4d, 0x0d, 0x0a, 0x0d, 0x0a }; + bufferedStream.Write(MAGIC); + + // This sequence MUST be followed by a SETTINGS frame (Section 6.5), which MAY be empty. + // The client sends the client connection preface immediately upon receipt of a + // 101 (Switching Protocols) response (indicating a successful upgrade) + // or as the first application data octets of a TLS connection + + this.settings.InitiatedMySettings[HTTP2Settings.INITIAL_WINDOW_SIZE] = this._connectionSettings.InitialStreamWindowSize; + this.settings.InitiatedMySettings[HTTP2Settings.MAX_CONCURRENT_STREAMS] = this._connectionSettings.MaxConcurrentStreams; + this.settings.InitiatedMySettings[HTTP2Settings.ENABLE_CONNECT_PROTOCOL] = (uint)(this._connectionSettings.EnableConnectProtocol ? 1 : 0); + this.settings.InitiatedMySettings[HTTP2Settings.ENABLE_PUSH] = 0; + this.settings.SendChanges(this.outgoingFrames); + this.settings.RemoteSettings.OnSettingChangedEvent += OnRemoteSettingChanged; + + // The default window size for the whole connection is 65535 bytes, + // but we want to set it to the maximum possible value. + Int64 initialConnectionWindowSize = this._connectionSettings.InitialConnectionWindowSize; + + // yandex.ru returns with an FLOW_CONTROL_ERROR (3) error when the plugin tries to set the connection window to 2^31 - 1 + // and works only with a maximum value of 2^31 - 10Mib (10 * 1024 * 1024). + if (initialConnectionWindowSize == HTTP2ContentConsumer.MaxValueFor31Bits) + initialConnectionWindowSize -= 10 * 1024 * 1024; + + if (initialConnectionWindowSize > 65535) + { + Int64 initialConnectionWindowSizeDiff = initialConnectionWindowSize - 65535; + if (initialConnectionWindowSizeDiff > 0) + this.outgoingFrames.Add(HTTP2FrameHelper.CreateWindowUpdateFrame(0, (UInt32)initialConnectionWindowSizeDiff, this.Context)); + } + + initialConnectionWindowSize -= 65535; + + // local, per-connection window + long localConnectionWindow = initialConnectionWindowSize; + UInt32 updateConnectionWindowAt = (UInt32)(localConnectionWindow / 2); + + while (this.isRunning) + { + DateTime now = DateTime.UtcNow; + + if (!atLeastOneStreamHasAFrameToSend) + { + // buffered stream will call flush automatically if its internal buffer is full. + // But we have to make it sure that we flush remaining data before we go to sleep. + bufferedStream.Flush(); + + // Wait until we have to send the next ping, OR a new frame is received on the read thread. + // lastPingSent Now lastPingSent+frequency lastPingSent+Ping timeout + //----|---------------------|---------------|----------------------|----------------------|------------| + // lastInteraction lastInteraction + MaxIdleTime + + var sendPingAt = this.lastPingSent + this._connectionSettings.PingFrequency; + var timeoutAt = this.waitingForPingAck != 0 ? this.lastPingSent + this._connectionSettings.Timeout : DateTime.MaxValue; + + // sendPingAt can be in the past if Timeout is larger than PingFrequency + var nextPingInteraction = sendPingAt < timeoutAt && sendPingAt >= now ? sendPingAt : timeoutAt; + + var disconnectByIdleAt = this.lastInteraction + this._connectionSettings.MaxIdleTime; + + var nextDueClientInteractionAt = nextPingInteraction < disconnectByIdleAt ? nextPingInteraction : disconnectByIdleAt; + int wait = (int)(nextDueClientInteractionAt - now).TotalMilliseconds; + + wait = (int)Math.Min(wait, this.MaxGoAwayWaitTime.TotalMilliseconds); + + TimeSpan nextStreamInteraction = TimeSpan.MaxValue; + for (int i = 0; i < this.clientInitiatedStreams.Count; i++) + { + var streamInteraction = this.clientInitiatedStreams[i].NextInteraction; + if (streamInteraction < nextStreamInteraction) + nextStreamInteraction = streamInteraction; + } + + wait = (int)Math.Min(wait, nextStreamInteraction.TotalMilliseconds); + wait = (int)Math.Min(wait, 1000); + + if (wait >= 1) + { + //if (HTTPManager.Logger.Level <= Logger.Loglevels.All) + // HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), string.Format("Sleeping for {0:N0}ms", wait), this.Context); + this.newFrameSignal.WaitOne(wait); + + now = DateTime.UtcNow; + } + } + + // Don't send a new ping until a pong isn't received for the last one + if (now - this.lastPingSent >= this._connectionSettings.PingFrequency && Interlocked.CompareExchange(ref this.waitingForPingAck, 1, 0) == 0) + { + this.lastPingSent = now; + + var frame = HTTP2FrameHelper.CreatePingFrame(HTTP2PingFlags.None, this.Context); + BufferHelper.SetLong(frame.Payload.Data, 0, now.Ticks); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), $"PING frame created with payload: {frame.Payload.Slice(0, 8)}", this.Context); +#endif + + this.outgoingFrames.Add(frame); + } + + // Process received frames + HTTP2FrameHeaderAndPayload header; + while (this.newFrames.TryDequeue(out header)) + { + if (header.StreamId > 0) + { + switch (header.Type) + { + case HTTP2FrameTypes.DATA: + localConnectionWindow -= header.Payload.Count; + break; + } + + HTTP2Stream http2Stream = FindStreamById(header.StreamId); + + // Add frame to the stream, so it can process it when its Process function is called + if (http2Stream != null) + { + http2Stream.AddFrame(header, this.outgoingFrames); + } + else + { + // Error? It's possible that we closed and removed the stream while the server was in the middle of sending frames +#if ENABLE_LOGGING + if (HTTPManager.Logger.Level == Loglevels.All) + HTTPManager.Logger.Warning(nameof(HTTP2ContentConsumer), $"Can't deliver frame: {header}, because no stream could be found for its Id!", this.Context); +#endif + + BufferPool.Release(header.Payload); + } + } + else + { + switch (header.Type) + { + case HTTP2FrameTypes.SETTINGS: + this.settings.Process(header, this.outgoingFrames); + + Interlocked.Exchange(ref this._maxAssignedRequests, + (int)Math.Min(this._connectionSettings.MaxConcurrentStreams, + this.settings.RemoteSettings[HTTP2Settings.MAX_CONCURRENT_STREAMS])); + + /* + PluginEventHelper.EnqueuePluginEvent( + new PluginEventInfo(PluginEvents.HTTP2ConnectProtocol, + new HTTP2ConnectProtocolInfo(this.conn.HostKey, + this.settings.MySettings[HTTP2Settings.ENABLE_CONNECT_PROTOCOL] == 1 && this.settings.RemoteSettings[HTTP2Settings.ENABLE_CONNECT_PROTOCOL] == 1))); + */ + break; + + case HTTP2FrameTypes.PING: + var pingFrame = HTTP2FrameHelper.ReadPingFrame(header); + + if ((pingFrame.Flags & HTTP2PingFlags.ACK) != 0) + { + if (Interlocked.CompareExchange(ref this.waitingForPingAck, 0, 1) == 0) + break; // waitingForPingAck was 0 == aren't expecting a ping ack! + + // it was an ack, payload must contain what we sent + + var ticks = BufferHelper.ReadLong(pingFrame.OpaqueData, 0); + + // the difference between the current time and the time when the ping message is sent + TimeSpan diff = TimeSpan.FromTicks(now.Ticks - ticks); + +#if ENABLE_LOGGING + if (diff.TotalSeconds > 10 || diff.TotalSeconds < 0) + HTTPManager.Logger.Warning(nameof(HTTP2ContentConsumer), $"Pong received with weird diff: {diff}! Payload: {pingFrame.OpaqueData}", this.Context); +#endif + + // add it to the buffer + this.rtts.Add(diff.TotalMilliseconds); + + // and calculate the new latency + this.Latency = CalculateLatency(); + +#if ENABLE_LOGGING + HTTPManager.Logger.Verbose(nameof(HTTP2ContentConsumer), string.Format("Latency: {0:F2}ms, RTT buffer: {1}", this.Latency, this.rtts.ToString()), this.Context); +#endif + } + else if ((pingFrame.Flags & HTTP2PingFlags.ACK) == 0) + { + // https://httpwg.org/specs/rfc7540.html#PING + // if it wasn't an ack for our ping, we have to send one + + var frame = HTTP2FrameHelper.CreatePingFrame(HTTP2PingFlags.ACK, this.Context); + Array.Copy(pingFrame.OpaqueData.Data, 0, frame.Payload.Data, 0, pingFrame.OpaqueData.Count); + + this.outgoingFrames.Add(frame); + } + + BufferPool.Release(pingFrame.OpaqueData); + break; + + case HTTP2FrameTypes.WINDOW_UPDATE: + var windowUpdateFrame = HTTP2FrameHelper.ReadWindowUpdateFrame(header); + this.remoteWindow += windowUpdateFrame.WindowSizeIncrement; + break; + + case HTTP2FrameTypes.GOAWAY: + // parse the frame, so we can print out detailed information + HTTP2GoAwayFrame goAwayFrame = HTTP2FrameHelper.ReadGoAwayFrame(header); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Received GOAWAY frame: " + goAwayFrame.ToString(), this.Context); +#endif + + abortWithMessage = string.Format("Server closing the connection! Error code: {0} ({1}) Additonal Debug Data: {2}", + goAwayFrame.Error, goAwayFrame.ErrorCode, goAwayFrame.AdditionalDebugData); + + for (int i = 0; i < this.clientInitiatedStreams.Count; ++i) + this.clientInitiatedStreams[i].Abort(abortWithMessage); + this.clientInitiatedStreams.Clear(); + + // set the running flag to false, so the thread can exit + this.isRunning = false; + + BufferPool.Release(goAwayFrame.AdditionalDebugData); + + //this.conn.State = HTTPConnectionStates.Closed; + break; + + case HTTP2FrameTypes.ALT_SVC: + //HTTP2AltSVCFrame altSvcFrame = HTTP2FrameHelper.ReadAltSvcFrame(header); + + // Implement + //HTTPManager.EnqueuePluginEvent(new PluginEventInfo(PluginEvents.AltSvcHeader, new AltSvcEventInfo(altSvcFrame.Origin, )) + break; + } + + if (header.Payload != null) + BufferPool.Release(header.Payload); + } + } + + // If no pong received in a (configurable) reasonable time, treat the connection broken + if (this.waitingForPingAck != 0 && now - this.lastPingSent >= this._connectionSettings.Timeout) + throw new TimeoutException("Ping ACK isn't received in time!"); + + // pre-test stream count to lock only when truly needed. + if (this.clientInitiatedStreams.Count < _maxAssignedRequests && this.isRunning) + { + // grab requests from queue + HTTPRequest request; + while (this.clientInitiatedStreams.Count < _maxAssignedRequests && this.requestQueue.TryDequeue(out request)) + { + HTTP2Stream newStream = null; + + if (request.Tag is CustomHTTP2StreamFactory factory) + { + newStream = factory(request, (UInt32)Interlocked.Add(ref LastStreamId, 2), this, this.settings, this.HPACKEncoder); + } + else + { + newStream = new HTTP2Stream((UInt32)Interlocked.Add(ref LastStreamId, 2), this, this.settings, this.HPACKEncoder); + } + + newStream.Assign(request); + this.clientInitiatedStreams.Add(newStream); + } + } + + // send any settings changes + this.settings.SendChanges(this.outgoingFrames); + + atLeastOneStreamHasAFrameToSend = false; + + // process other streams + for (int i = 0; i < this.clientInitiatedStreams.Count; ++i) + { + var stream = this.clientInitiatedStreams[i]; + stream.Process(this.outgoingFrames); + + // remove closed, empty streams (not enough to check the closed flag, a closed stream still can contain frames to send) + if (stream.State == HTTP2StreamStates.Closed && !stream.HasFrameToSend) + { + this.clientInitiatedStreams.RemoveAt(i--); + stream.Removed(); + + Interlocked.Decrement(ref this._assignedRequest); + } + + atLeastOneStreamHasAFrameToSend |= stream.HasFrameToSend; + + this.lastInteraction = now; + } + + // If we encounter a data frame that too large for the current remote window, we have to stop + // sending all data frames as we could send smaller data frames before the large ones. + // Room for improvement: An improvement would be here to stop data frame sending per-stream. + bool haltDataSending = false; + + if (this.ShutdownType == ShutdownTypes.Running && !this.SentGoAwayFrame && now - this.lastInteraction >= this._connectionSettings.MaxIdleTime) + { + this.lastInteraction = now; +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Reached idle time, sending GoAway frame!", this.Context); +#endif + this.outgoingFrames.Add(HTTP2FrameHelper.CreateGoAwayFrame(0, HTTP2ErrorCodes.NO_ERROR, this.Context)); + this.goAwaySentAt = now; + } + + // https://httpwg.org/specs/rfc7540.html#GOAWAY + // Endpoints SHOULD always send a GOAWAY frame before closing a connection so that the remote peer can know whether a stream has been partially processed or not. + if (this.ShutdownType == ShutdownTypes.Gentle && !this.SentGoAwayFrame) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Connection abort requested, sending GoAway frame!", this.Context); +#endif + + this.outgoingFrames.Clear(); + this.outgoingFrames.Add(HTTP2FrameHelper.CreateGoAwayFrame(0, HTTP2ErrorCodes.NO_ERROR, this.Context)); + this.goAwaySentAt = now; + } + + if (this.isRunning && this.SentGoAwayFrame && now - goAwaySentAt >= this.MaxGoAwayWaitTime) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "No GoAway frame received back. Really quitting now!", this.Context); +#endif + this.isRunning = false; + continue; + } + + if (localConnectionWindow < updateConnectionWindowAt) + { + UInt32 diff = (UInt32)(initialConnectionWindowSize - localConnectionWindow); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), $"Updating local connection window by {diff:N0} ({initialConnectionWindowSize:N0} - {localConnectionWindow:N0})", this.Context); +#endif + + this.outgoingFrames.Add(HTTP2FrameHelper.CreateWindowUpdateFrame(0, diff, this.Context)); + localConnectionWindow = initialConnectionWindowSize; + } + + // Go through all the collected frames and send them. + for (int i = 0; i < this.outgoingFrames.Count; ++i) + { + var frame = this.outgoingFrames[i]; + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic && frame.Type != HTTP2FrameTypes.DATA /*&& frame.Type != HTTP2FrameTypes.PING*/) + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Sending frame: " + frame.ToString(), this.Context); +#endif + + // post process frames + switch (frame.Type) + { + case HTTP2FrameTypes.DATA: + if (haltDataSending) + continue; + + // if the tracked remoteWindow is smaller than the frame's payload, we stop sending + // data frames until we receive window-update frames + if (frame.Payload.Count > this.remoteWindow) + { + haltDataSending = true; +#if ENABLE_LOGGING + HTTPManager.Logger.Warning(nameof(HTTP2ContentConsumer), string.Format("Data sending halted for this round. Remote Window: {0:N0}, frame: {1}", this.remoteWindow, frame.ToString()), this.Context); +#endif + continue; + } + + break; + } + + this.outgoingFrames.RemoveAt(i--); + + using (var buffer = HTTP2FrameHelper.HeaderAsBinary(frame)) + bufferedStream.Write(buffer.Data, 0, buffer.Count); + + if (frame.Payload.Count > 0) + { + bufferedStream.Write(frame.Payload.Data, frame.Payload.Offset, frame.Payload.Count); + + if (!frame.DontUseMemPool) + BufferPool.Release(frame.Payload); + } + + if (frame.Type == HTTP2FrameTypes.DATA) + this.remoteWindow -= (uint)frame.Payload.Count; + } + + bufferedStream.Flush(); + } // while (this.isRunning) + + bufferedStream.Flush(); + } + } + catch (Exception ex) + { + abortWithMessage = ex.ToString(); + // Log out the exception if it's a non-expected one. + if (this.ShutdownType == ShutdownTypes.Running && this.isRunning && !this.SentGoAwayFrame && !HTTPManager.IsQuitting) + HTTPManager.Logger.Exception(nameof(HTTP2ContentConsumer), "Sender thread", ex, this.Context); + } + finally + { + this.isRunning = false; + +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), $"Sender thread closing - cleaning up remaining requests({this.clientInitiatedStreams.Count})...", this.Context); +#endif + + if (string.IsNullOrEmpty(abortWithMessage)) + abortWithMessage = "Connection closed unexpectedly"; + + for (int i = 0; i < this.clientInitiatedStreams.Count; ++i) + this.clientInitiatedStreams[i].Abort(abortWithMessage); + this.clientInitiatedStreams.Clear(); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Sender thread closing", this.Context); +#endif + + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this.conn, HTTPConnectionStates.Closed)); + } + } + + private void OnRemoteSettingChanged(HTTP2SettingsRegistry registry, HTTP2Settings setting, uint oldValue, uint newValue) + { + switch (setting) + { + case HTTP2Settings.INITIAL_WINDOW_SIZE: + this.remoteWindow = newValue - (oldValue - this.remoteWindow); + break; + } + } + + public void SetBinding(PeekableContentProviderStream contentProvider) => this.ContentProvider = contentProvider; + public void UnsetBinding() => this.ContentProvider = null; + + public void OnContent() + { + try + { + while (this.isRunning && HTTP2FrameHelper.CanReadFullFrame(this.ContentProvider)) + { + HTTP2FrameHeaderAndPayload header = HTTP2FrameHelper.ReadHeader(this.ContentProvider, this.Context); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic /*&& header.Type != HTTP2FrameTypes.DATA /*&& header.Type != HTTP2FrameTypes.PING*/) + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "New frame received: " + header.ToString(), this.Context); +#endif + + // Add the new frame to the queue. Processing it on the write thread gives us the advantage that + // we don't have to deal with too much locking. + this.newFrames.Enqueue(header); + } + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTP2ContentConsumer), "", ex, this.Context); + } + finally + { + // ping write thread to process the new frame + this.newFrameSignal?.Set(); + } + } + + public void OnConnectionClosed() + { +#if ENABLE_LOGGING + HTTPManager.Logger.Verbose(nameof(HTTP2ContentConsumer), $"{nameof(OnConnectionClosed)}({this.isRunning})", this.Context); +#endif + this.isRunning = false; + this.newFrameSignal?.Set(); + } + + public void OnError(Exception ex) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Exception(nameof(HTTP2ContentConsumer), $"{nameof(OnError)}({this.isRunning}, {ex})", ex, this.Context); +#endif + this.isRunning = false; + this.newFrameSignal?.Set(); + } + + private double CalculateLatency() + { + if (this.rtts.Count == 0) + return 0; + + double sumLatency = 0; + for (int i = 0; i < this.rtts.Count; ++i) + sumLatency += this.rtts[i]; + + return sumLatency / this.rtts.Count; + } + + HTTP2Stream FindStreamById(UInt32 streamId) + { + for (int i = 0; i < this.clientInitiatedStreams.Count; ++i) + { + var stream = this.clientInitiatedStreams[i]; + if (stream.Id == streamId) + return stream; + } + + return null; + } + + public ShutdownTypes ShutdownType { get; private set; } + + public void Shutdown(ShutdownTypes type) + { + this.ShutdownType = type; + + switch (this.ShutdownType) + { + case ShutdownTypes.Gentle: + this.newFrameSignal.Set(); + break; + + case ShutdownTypes.Immediate: + this.conn?.TopStream?.Dispose(); + break; + } + } + + public void Dispose() + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), "Dispose", this.Context); +#endif + + while (this.newFrames.TryDequeue(out var frame)) + BufferPool.Release(frame.Payload); + + foreach (var frame in this.outgoingFrames) + BufferPool.Release(frame.Payload); + this.outgoingFrames.Clear(); + + HTTPRequest request = null; + while (this.requestQueue.TryDequeue(out request)) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information(nameof(HTTP2ContentConsumer), string.Format("Dispose - Request '{0}' IsCancellationRequested: {1}", request.CurrentUri.ToString(), request.IsCancellationRequested.ToString()), this.Context); +#endif + RequestEventHelper.EnqueueRequestEvent(request.IsCancellationRequested ? new RequestEventInfo(request, HTTPRequestStates.Aborted, null) : new RequestEventInfo(request, RequestEvents.Resend)); + } + + this.newFrameSignal?.Close(); + this.newFrameSignal = null; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs.meta new file mode 100644 index 00000000..8bcc0b61 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e555764ed1609a4bb57371203918367 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2ContentConsumer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs new file mode 100644 index 00000000..6acfdb8c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs @@ -0,0 +1,434 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Streams; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + // https://httpwg.org/specs/rfc7540.html#ErrorCodes + public enum HTTP2ErrorCodes + { + NO_ERROR = 0x00, + PROTOCOL_ERROR = 0x01, + INTERNAL_ERROR = 0x02, + FLOW_CONTROL_ERROR = 0x03, + SETTINGS_TIMEOUT = 0x04, + STREAM_CLOSED = 0x05, + FRAME_SIZE_ERROR = 0x06, + REFUSED_STREAM = 0x07, + CANCEL = 0x08, + COMPRESSION_ERROR = 0x09, + CONNECT_ERROR = 0x0A, + ENHANCE_YOUR_CALM = 0x0B, + INADEQUATE_SECURITY = 0x0C, + HTTP_1_1_REQUIRED = 0x0D + } + + public static class HTTP2FrameHelper + { + public static HTTP2ContinuationFrame ReadContinuationFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#CONTINUATION + + HTTP2ContinuationFrame frame = new HTTP2ContinuationFrame(header); + + frame.HeaderBlockFragment = header.Payload; + header.Payload = BufferSegment.Empty; + + return frame; + } + + public static HTTP2WindowUpdateFrame ReadWindowUpdateFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#WINDOW_UPDATE + + HTTP2WindowUpdateFrame frame = new HTTP2WindowUpdateFrame(header); + + frame.ReservedBit = BufferHelper.ReadBit(header.Payload.Data[0], 0); + frame.WindowSizeIncrement = BufferHelper.ReadUInt31(header.Payload, 0); + + return frame; + } + + public static HTTP2GoAwayFrame ReadGoAwayFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#GOAWAY + // str id error + // | 0, 1, 2, 3 | 4, 5, 6, 7 | ... + + HTTP2GoAwayFrame frame = new HTTP2GoAwayFrame(header); + + frame.ReservedBit = BufferHelper.ReadBit(header.Payload.Data[0], 0); + frame.LastStreamId = BufferHelper.ReadUInt31(header.Payload, 0); + frame.ErrorCode = BufferHelper.ReadUInt32(header.Payload, 4); + + var additionalDebugDataLength = header.Payload.Count - 8; + if (additionalDebugDataLength > 0) + { + var buff = BufferPool.Get(additionalDebugDataLength, true); + Array.Copy(header.Payload.Data, 8, buff, 0, additionalDebugDataLength); + + frame.AdditionalDebugData = buff.AsBuffer(additionalDebugDataLength); + } + + return frame; + } + + public static HTTP2PingFrame ReadPingFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#PING + + HTTP2PingFrame frame = new HTTP2PingFrame(header); + + Array.Copy(header.Payload.Data, 0, frame.OpaqueData.Data, 0, frame.OpaqueData.Count); + + return frame; + } + + public static HTTP2PushPromiseFrame ReadPush_PromiseFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#PUSH_PROMISE + + HTTP2PushPromiseFrame frame = new HTTP2PushPromiseFrame(header); + int HeaderBlockFragmentLength = header.Payload.Count - 4; // PromisedStreamId + + bool isPadded = (frame.Flags & HTTP2PushPromiseFlags.PADDED) != 0; + if (isPadded) + { + frame.PadLength = header.Payload.Data[0]; + + HeaderBlockFragmentLength -= 1 + (frame.PadLength ?? 0); + } + + frame.ReservedBit = BufferHelper.ReadBit(header.Payload.Data[1], 0); + frame.PromisedStreamId = BufferHelper.ReadUInt31(header.Payload, 1); + + var HeaderBlockFragmentIdx = isPadded ? 5 : 4; + frame.HeaderBlockFragment = header.Payload.Slice(HeaderBlockFragmentIdx, HeaderBlockFragmentLength); + header.Payload = BufferSegment.Empty; + + return frame; + } + + public static HTTP2RSTStreamFrame ReadRST_StreamFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#RST_STREAM + + HTTP2RSTStreamFrame frame = new HTTP2RSTStreamFrame(header); + frame.ErrorCode = BufferHelper.ReadUInt32(header.Payload, 0); + + return frame; + } + + public static HTTP2PriorityFrame ReadPriorityFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#PRIORITY + + if (header.Payload.Count != 5) + { + //throw FRAME_SIZE_ERROR + } + + HTTP2PriorityFrame frame = new HTTP2PriorityFrame(header); + + frame.IsExclusive = BufferHelper.ReadBit(header.Payload.Data[0], 0); + frame.StreamDependency = BufferHelper.ReadUInt31(header.Payload, 0); + frame.Weight = header.Payload.Data[4]; + + return frame; + } + + public static HTTP2HeadersFrame ReadHeadersFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#HEADERS + + HTTP2HeadersFrame frame = new HTTP2HeadersFrame(header); + var HeaderBlockFragmentLength = header.Payload.Count; + + bool isPadded = (frame.Flags & HTTP2HeadersFlags.PADDED) != 0; + bool isPriority = (frame.Flags & HTTP2HeadersFlags.PRIORITY) != 0; + + int payloadIdx = 0; + + if (isPadded) + { + frame.PadLength = header.Payload.Data[payloadIdx++]; + + int subLength = 1 + (frame.PadLength ?? 0); + if (subLength <= HeaderBlockFragmentLength) + HeaderBlockFragmentLength -= subLength; + //else + // throw PROTOCOL_ERROR; + } + + if (isPriority) + { + frame.IsExclusive = BufferHelper.ReadBit(header.Payload.Data[payloadIdx], 0); + frame.StreamDependency = BufferHelper.ReadUInt31(header.Payload, payloadIdx); + payloadIdx += 4; + frame.Weight = header.Payload.Data[payloadIdx++]; + + int subLength = 5; + if (subLength <= HeaderBlockFragmentLength) + HeaderBlockFragmentLength -= subLength; + //else + // throw PROTOCOL_ERROR; + } + + var HeaderBlockFragmentIdx = payloadIdx; + frame.HeaderBlockFragment = header.Payload.Slice(HeaderBlockFragmentIdx, HeaderBlockFragmentLength); + + header.Payload = BufferSegment.Empty; + + return frame; + } + + public static HTTP2DataFrame ReadDataFrame(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#DATA + + HTTP2DataFrame frame = new HTTP2DataFrame(header); + + var DataLength = header.Payload.Count; + + bool isPadded = (frame.Flags & HTTP2DataFlags.PADDED) != 0; + if (isPadded) + { + frame.PadLength = header.Payload.Data[0]; + + int subLength = 1 + (frame.PadLength ?? 0); + if (subLength <= DataLength) + DataLength -= subLength; + //else + // throw PROTOCOL_ERROR; + } + + var DataIdx = isPadded ? 1 : 0; + + frame.Data = header.Payload.Slice(DataIdx, DataLength); + header.Payload = BufferSegment.Empty; + + return frame; + } + + public static HTTP2AltSVCFrame ReadAltSvcFrame(HTTP2FrameHeaderAndPayload header) + { + HTTP2AltSVCFrame frame = new HTTP2AltSVCFrame(header); + + // Implement + + return frame; + } + + public static void StreamRead(Stream stream, byte[] buffer, int offset, uint count) + { + if (count == 0) + return; + + uint sumRead = 0; + do + { + int readCount = (int)(count - sumRead); + int streamReadCount = stream.Read(buffer, (int)(offset + sumRead), readCount); + if (streamReadCount <= 0 && readCount > 0) + throw new Exception("TCP Stream closed!"); + sumRead += (uint)streamReadCount; + } while (sumRead < count); + } + + public static void StreamRead(Stream stream, BufferSegment buffer) + { + if (buffer.Count == 0) + return; + + uint sumRead = 0; + do + { + int readCount = (int)(buffer.Count - sumRead); + int streamReadCount = stream.Read(buffer.Data, (int)(buffer.Offset + sumRead), readCount); + if (streamReadCount <= 0 && readCount > 0) + throw new Exception("TCP Stream closed!"); + sumRead += (uint)streamReadCount; + } while (sumRead < buffer.Count); + } + + public static AutoReleaseBuffer HeaderAsBinary(HTTP2FrameHeaderAndPayload header) + { + // https://httpwg.org/specs/rfc7540.html#FrameHeader + + var buffer = BufferPool.Get(9, true); + + BufferHelper.SetUInt24(buffer, 0, (uint)header.Payload.Count); + buffer[3] = (byte)header.Type; + buffer[4] = header.Flags; + BufferHelper.SetUInt31(buffer, 5, header.StreamId); + + return new AutoReleaseBuffer { Data = buffer, Count = 9 }; + } + + public unsafe static bool CanReadFullFrame(PeekableStream stream) + { + // https://httpwg.org/specs/rfc7540.html#FrameHeader + + // A frame without any payload is 9 bytes + if (stream.Length < 9) + return false; + + stream.BeginPeek(); + + // First 3 bytes are the payload length + var rawLength = stackalloc byte[3]; + rawLength[0] = (byte)stream.PeekByte(); + rawLength[1] = (byte)stream.PeekByte(); + rawLength[2] = (byte)stream.PeekByte(); + + var payloadLength = (UInt32)(rawLength[2] | rawLength[1] << 8 | rawLength[0] << 16); + + return stream.Length >= (9 + payloadLength); + } + + public static HTTP2FrameHeaderAndPayload ReadHeader(Stream stream, LoggingContext context) + { + byte[] buffer = BufferPool.Get(9, true, context); + using var _ = buffer.AsAutoRelease(); + + StreamRead(stream, buffer, 0, 9); + + HTTP2FrameHeaderAndPayload header = new HTTP2FrameHeaderAndPayload(); + + var PayloadLength = (int)BufferHelper.ReadUInt24(buffer, 0); + header.Type = (HTTP2FrameTypes)buffer[3]; + header.Flags = buffer[4]; + header.StreamId = BufferHelper.ReadUInt31(buffer, 5); + + header.Payload = BufferPool.Get(PayloadLength, true, context).AsBuffer(PayloadLength); + + try + { + StreamRead(stream, header.Payload); + } + catch + { + BufferPool.Release(header.Payload); + throw; + } + + return header; + } + + public static HTTP2SettingsFrame ReadSettings(HTTP2FrameHeaderAndPayload header) + { + HTTP2SettingsFrame frame = new HTTP2SettingsFrame(header); + + if (header.Payload.Count > 0) + { + int kvpCount = (int)(header.Payload.Count / 6); + + frame.Settings = new List>(kvpCount); + for (int i = 0; i < kvpCount; ++i) + { + HTTP2Settings key = (HTTP2Settings)BufferHelper.ReadUInt16(header.Payload.Data, i * 6); + UInt32 value = BufferHelper.ReadUInt32(header.Payload, (i * 6) + 2); + + frame.Settings.Add(new KeyValuePair(key, value)); + } + } + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreateACKSettingsFrame() + { + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.SETTINGS; + frame.Flags = (byte)HTTP2SettingsFlags.ACK; + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreateSettingsFrame(List> settings, LoggingContext context) + { + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.SETTINGS; + frame.Flags = 0; + var PayloadLength = settings.Count * 6; + + frame.Payload = BufferPool.Get(PayloadLength, true, context).AsBuffer(PayloadLength); + + for (int i = 0; i < settings.Count; ++i) + { + BufferHelper.SetUInt16(frame.Payload.Data, i * 6, (UInt16)settings[i].Key); + BufferHelper.SetUInt32(frame.Payload.Data, (i * 6) + 2, settings[i].Value); + } + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreatePingFrame(HTTP2PingFlags flags, LoggingContext context) + { + // https://httpwg.org/specs/rfc7540.html#PING + + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.PING; + frame.Flags = (byte)flags; + frame.StreamId = 0; + frame.Payload = BufferPool.Get(8, true, context).AsBuffer(8); + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreateWindowUpdateFrame(UInt32 streamId, UInt32 windowSizeIncrement, LoggingContext context) + { + // https://httpwg.org/specs/rfc7540.html#WINDOW_UPDATE + + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.WINDOW_UPDATE; + frame.Flags = 0; + frame.StreamId = streamId; + frame.Payload = BufferPool.Get(4, true, context).AsBuffer(4); + + BufferHelper.SetBit(0, 0, 0); + BufferHelper.SetUInt31(frame.Payload.Data, 0, windowSizeIncrement); + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreateGoAwayFrame(UInt32 lastStreamId, HTTP2ErrorCodes error, LoggingContext context) + { + // https://httpwg.org/specs/rfc7540.html#GOAWAY + + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.GOAWAY; + frame.Flags = 0; + frame.StreamId = 0; + frame.Payload = BufferPool.Get(8, true, context).AsBuffer(8); + + BufferHelper.SetUInt31(frame.Payload.Data, 0, lastStreamId); + BufferHelper.SetUInt31(frame.Payload.Data, 4, (UInt32)error); + + return frame; + } + + public static HTTP2FrameHeaderAndPayload CreateRSTFrame(UInt32 streamId, HTTP2ErrorCodes errorCode, LoggingContext context) + { + // https://httpwg.org/specs/rfc7540.html#RST_STREAM + + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.RST_STREAM; + frame.Flags = 0; + frame.StreamId = streamId; + frame.Payload = BufferPool.Get(4, true, context).AsBuffer(4); + + BufferHelper.SetUInt32(frame.Payload.Data, 0, (UInt32)errorCode); + + return frame; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs.meta new file mode 100644 index 00000000..f2a6e698 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed90f479cb36204458007c8c20c99490 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2FrameHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs new file mode 100644 index 00000000..a17713a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs @@ -0,0 +1,392 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + // https://httpwg.org/specs/rfc7540.html#iana-frames + public enum HTTP2FrameTypes : byte + { + DATA = 0x00, + HEADERS = 0x01, + PRIORITY = 0x02, + RST_STREAM = 0x03, + SETTINGS = 0x04, + PUSH_PROMISE = 0x05, + PING = 0x06, + GOAWAY = 0x07, + WINDOW_UPDATE = 0x08, + CONTINUATION = 0x09, + + // https://tools.ietf.org/html/rfc7838#section-4 + ALT_SVC = 0x0A + } + + [Flags] + public enum HTTP2DataFlags : byte + { + None = 0x00, + END_STREAM = 0x01, + PADDED = 0x08, + } + + [Flags] + public enum HTTP2HeadersFlags : byte + { + None = 0x00, + END_STREAM = 0x01, + END_HEADERS = 0x04, + PADDED = 0x08, + PRIORITY = 0x20, + } + + [Flags] + public enum HTTP2SettingsFlags : byte + { + None = 0x00, + ACK = 0x01, + } + + [Flags] + public enum HTTP2PushPromiseFlags : byte + { + None = 0x00, + END_HEADERS = 0x04, + PADDED = 0x08, + } + + [Flags] + public enum HTTP2PingFlags : byte + { + None = 0x00, + ACK = 0x01, + } + + [Flags] + public enum HTTP2ContinuationFlags : byte + { + None = 0x00, + END_HEADERS = 0x04, + } + + public struct HTTP2FrameHeaderAndPayload + { + public HTTP2FrameTypes Type; + public byte Flags; + public UInt32 StreamId; + + //public byte[] Payload; + public BufferSegment Payload; + + //public UInt32 PayloadOffset; + //public UInt32 PayloadLength; + + public bool DontUseMemPool; + + public override string ToString() + { + return $"[HTTP2FrameHeaderAndPayload Type: {Type}, Flags: {Flags.ToBinaryStr()}, StreamId: {StreamId}, DontUseMemPool: {DontUseMemPool}, Payload: {Payload}]"; + } + + public string PayloadAsHex() => this.Payload.ToString(); + } + + public struct HTTP2SettingsFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2SettingsFlags Flags { get { return (HTTP2SettingsFlags)this.Header.Flags; } } + public List> Settings; + + public HTTP2SettingsFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.Settings = null; + } + + public override string ToString() + { + string settings = null; + if (this.Settings != null) + { + System.Text.StringBuilder sb = StringBuilderPool.Get(this.Settings.Count + 2); + + sb.Append("["); + foreach (var kvp in this.Settings) + sb.AppendFormat("[{0}: {1}]", kvp.Key, kvp.Value); + sb.Append("]"); + + settings = StringBuilderPool.ReleaseAndGrab(sb); + } + + return string.Format("[HTTP2SettingsFrame Header: {0}, Flags: {1}, Settings: {2}]", this.Header.ToString(), this.Flags, settings ?? "Empty"); + } + } + + public struct HTTP2DataFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2DataFlags Flags { get { return (HTTP2DataFlags)this.Header.Flags; } } + + public byte? PadLength; + + public BufferSegment Data; + + public HTTP2DataFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.PadLength = null; + this.Data = BufferSegment.Empty; + } + + public override string ToString() + { + return string.Format("[HTTP2DataFrame Header: {0}, Flags: {1}, PadLength: {2}, Data: {3}]", + this.Header.ToString(), + this.Flags, + this.PadLength == null ? ":Empty" : this.PadLength.Value.ToString(), + this.Data.ToString()); + } + } + + public struct HTTP2HeadersFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2HeadersFlags Flags { get { return (HTTP2HeadersFlags)this.Header.Flags; } } + + public byte? PadLength; + public byte? IsExclusive; + public UInt32? StreamDependency; + public byte? Weight; + + public BufferSegment HeaderBlockFragment; + + public HTTP2HeadersFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.PadLength = null; + this.IsExclusive = null; + this.StreamDependency = null; + this.Weight = null; + this.HeaderBlockFragment = BufferSegment.Empty; + } + + public override string ToString() + { + return string.Format("[HTTP2HeadersFrame Header: {0}, Flags: {1}, PadLength: {2}, IsExclusive: {3}, StreamDependency: {4}, Weight: {5}, HeaderBlockFragmentLength: {6}]", + this.Header.ToString(), + this.Flags, + this.PadLength == null ? ":Empty" : this.PadLength.Value.ToString(), + this.IsExclusive == null ? "Empty" : this.IsExclusive.Value.ToString(), + this.StreamDependency == null ? "Empty" : this.StreamDependency.Value.ToString(), + this.Weight == null ? "Empty" : this.Weight.Value.ToString(), + this.HeaderBlockFragment.ToString()); + } + } + + public struct HTTP2PriorityFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + + public byte IsExclusive; + public UInt32 StreamDependency; + public byte Weight; + + public HTTP2PriorityFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.IsExclusive = 0; + this.StreamDependency = 0; + this.Weight = 0; + } + + public override string ToString() + { + return string.Format("[HTTP2PriorityFrame Header: {0}, IsExclusive: {1}, StreamDependency: {2}, Weight: {3}]", + this.Header.ToString(), this.IsExclusive, this.StreamDependency, this.Weight); + } + } + + public struct HTTP2RSTStreamFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + + public UInt32 ErrorCode; + public HTTP2ErrorCodes Error { get { return (HTTP2ErrorCodes)this.ErrorCode; } } + + public HTTP2RSTStreamFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.ErrorCode = 0; + } + + public override string ToString() + { + return string.Format("[HTTP2RST_StreamFrame Header: {0}, Error: {1}({2})]", this.Header.ToString(), this.Error, this.ErrorCode); + } + } + + public struct HTTP2PushPromiseFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2PushPromiseFlags Flags { get { return (HTTP2PushPromiseFlags)this.Header.Flags; } } + + public byte? PadLength; + public byte ReservedBit; + public UInt32 PromisedStreamId; + + public BufferSegment HeaderBlockFragment; + //public UInt32 HeaderBlockFragmentIdx; + //public byte[] HeaderBlockFragment; + //public UInt32 HeaderBlockFragmentLength; + + public HTTP2PushPromiseFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.PadLength = null; + this.ReservedBit = 0; + this.PromisedStreamId = 0; + //this.HeaderBlockFragmentIdx = 0; + //this.HeaderBlockFragment = null; + //this.HeaderBlockFragmentLength = 0; + this.HeaderBlockFragment = BufferSegment.Empty; + } + + public override string ToString() + { + return string.Format("[HTTP2Push_PromiseFrame Header: {0}, Flags: {1}, PadLength: {2}, ReservedBit: {3}, PromisedStreamId: {4}, HeaderBlockFragmentLength: {5}]", + this.Header.ToString(), + this.Flags, + this.PadLength == null ? "Empty" : this.PadLength.Value.ToString(), + this.ReservedBit, + this.PromisedStreamId, + this.HeaderBlockFragment); + } + } + + public struct HTTP2PingFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2PingFlags Flags { get { return (HTTP2PingFlags)this.Header.Flags; } } + + //public readonly byte[] OpaqueData; + //public readonly byte OpaqueDataLength; + public readonly BufferSegment OpaqueData; + + public HTTP2PingFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.OpaqueData = BufferPool.Get(8, true).AsBuffer(8); + } + + public override string ToString() + { + return string.Format("[HTTP2PingFrame Header: {0}, Flags: {1}, OpaqueData: {2}]", + this.Header.ToString(), + this.Flags, + this.OpaqueData); + } + } + + public struct HTTP2GoAwayFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + public HTTP2ErrorCodes Error { get { return (HTTP2ErrorCodes)this.ErrorCode; } } + + public byte ReservedBit; + public UInt32 LastStreamId; + public UInt32 ErrorCode; + + public BufferSegment AdditionalDebugData; + //public byte[] AdditionalDebugData; + //public UInt32 AdditionalDebugDataLength; + + public HTTP2GoAwayFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.ReservedBit = 0; + this.LastStreamId = 0; + this.ErrorCode = 0; + this.AdditionalDebugData = BufferSegment.Empty; + } + + public override string ToString() + { + return string.Format("[HTTP2GoAwayFrame Header: {0}, ReservedBit: {1}, LastStreamId: {2}, Error: {3}({4}), AdditionalDebugData: {5}]", + this.Header.ToString(), + this.ReservedBit, + this.LastStreamId, + this.Error, + this.ErrorCode, + this.AdditionalDebugData.ToString()); + } + } + + public struct HTTP2WindowUpdateFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + + public byte ReservedBit; + public UInt32 WindowSizeIncrement; + + public HTTP2WindowUpdateFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.ReservedBit = 0; + this.WindowSizeIncrement = 0; + } + + public override string ToString() + { + return string.Format("[HTTP2WindowUpdateFrame Header: {0}, ReservedBit: {1}, WindowSizeIncrement: {2}]", + this.Header.ToString(), this.ReservedBit, this.WindowSizeIncrement); + } + } + + public struct HTTP2ContinuationFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + + public HTTP2ContinuationFlags Flags { get { return (HTTP2ContinuationFlags)this.Header.Flags; } } + + public BufferSegment HeaderBlockFragment; + + public HTTP2ContinuationFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.HeaderBlockFragment = BufferSegment.Empty; + } + + public override string ToString() + { + return string.Format("[HTTP2ContinuationFrame Header: {0}, Flags: {1}, HeaderBlockFragment: {2}]", + this.Header.ToString(), + this.Flags, + this.HeaderBlockFragment); + } + } + + /// + /// https://tools.ietf.org/html/rfc7838#section-4 + /// + public struct HTTP2AltSVCFrame + { + public readonly HTTP2FrameHeaderAndPayload Header; + + public string Origin; + public string AltSvcFieldValue; + + public HTTP2AltSVCFrame(HTTP2FrameHeaderAndPayload header) + { + this.Header = header; + this.Origin = null; + this.AltSvcFieldValue = null; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs.meta new file mode 100644 index 00000000..5537d9f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d5b1b3f5f21e2324b9a6513e8d458167 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Frames.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs new file mode 100644 index 00000000..b60648eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs @@ -0,0 +1,160 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; +using System.Collections.Generic; + +using Best.HTTP.Response; +using Best.HTTP.Response.Decompression; +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + public sealed class HTTP2Response : HTTPResponse + { + // For progress report + public long ExpectedContentLength { get; private set; } + + private string contentEncoding = null; + + bool isPrepared; + private IDecompressor _decompressor; + + public HTTP2Response(HTTPRequest request, bool isFromCache) + : base(request, isFromCache) + { + this.HTTPVersion = new Version(2, 0); + } + + internal void AddHeaders(List> headers) + { + this.ExpectedContentLength = -1; + Dictionary> newHeaders = this.Request.DownloadSettings.OnHeadersReceived != null ? new Dictionary>() : null; + + for (int i = 0; i < headers.Count; ++i) + { + KeyValuePair header = headers[i]; + + if (header.Key.Equals(":status", StringComparison.Ordinal)) + { + base.StatusCode = int.Parse(header.Value); + base.Message = string.Empty; + } + else + { + if (string.IsNullOrEmpty(this.contentEncoding) && header.Key.Equals("content-encoding", StringComparison.OrdinalIgnoreCase)) + { + this.contentEncoding = header.Value; + } + else if (base.Request.DownloadSettings.OnDownloadProgress != null && header.Key.Equals("content-length", StringComparison.OrdinalIgnoreCase)) + { + long contentLength; + if (long.TryParse(header.Value, out contentLength)) + this.ExpectedContentLength = contentLength; + else + HTTPManager.Logger.Information("HTTP2Response", string.Format("AddHeaders - Can't parse Content-Length as an int: '{0}'", header.Value), this.Context); + } + + base.AddHeader(header.Key, header.Value); + } + + if (newHeaders != null) + { + List values; + if (!newHeaders.TryGetValue(header.Key, out values)) + newHeaders.Add(header.Key, values = new List(1)); + + values.Add(header.Value); + } + } + + if (this.ExpectedContentLength == -1 && base.Request.DownloadSettings.OnDownloadProgress != null) + HTTPManager.Logger.Information("HTTP2Response", "AddHeaders - No Content-Length header found!", this.Context); + + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, newHeaders)); + } + + internal void Prepare(IDownloadContentBufferAvailable bufferAvailable) + { + if (!this.isPrepared) + { + this.isPrepared = true; + + CreateDownloadStream(bufferAvailable); + + base.BeginReceiveContent(); + } + } + + internal void ProcessData(BufferSegment payload) + { + // https://github.com/Benedicht/BestHTTP-Issues/issues/183 + // If _decompressor is still null, remove the content encoding value and serve the content as-is. + if (!string.IsNullOrEmpty(this.contentEncoding) && this._decompressor == null) + { + if ((this._decompressor = DecompressorFactory.GetDecompressor(this.contentEncoding, this.Context)) == null) + this.contentEncoding = null; + } + + if (!string.IsNullOrEmpty(this.contentEncoding)) + { + BufferSegment result = BufferSegment.Empty; + bool release; + try + { + (result, release) = this._decompressor.Decompress(payload, false, true, this.Context); + } + catch + { + BufferPool.Release(payload); + throw; + } + if (release) + BufferPool.Release(payload); + + base.FeedDownloadedContentChunk(result); + } + else + base.FeedDownloadedContentChunk(payload); + } + + internal void FinishProcessData() + { + if (this._decompressor != null) + { + var (decompressed, _) = this._decompressor.Decompress(BufferSegment.Empty, true, true, this.Context); + if (decompressed != BufferSegment.Empty) + base.FeedDownloadedContentChunk(decompressed); + + this._decompressor.Dispose(); + this._decompressor = null; + } + + base.FinishedContentReceiving(); + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (disposing) + { + if (this._decompressor != null) + { + // In some cases, the request is aborted and the decompressor left in an incomplete state. + // Closing it might cause an exception that we don't care about. + try + { + this._decompressor.Dispose(); + } + catch + { } + + this._decompressor = null; + } + } + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs.meta new file mode 100644 index 00000000..b8ee4036 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fe46645d97549c146a8c38f1297a75ce +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Response.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs new file mode 100644 index 00000000..ef7f1ddf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs @@ -0,0 +1,331 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + /// + /// Settings Registry + /// + public enum HTTP2Settings : ushort + { + /// + /// Allows the sender to inform the remote endpoint of the maximum size of the + /// header compression table used to decode header blocks, in octets. + /// The encoder can select any size equal to or less than this value + /// by using signaling specific to the header compression format inside a header block (see [COMPRESSION]). + /// The initial value is 4,096 octets. + /// + HEADER_TABLE_SIZE = 0x01, + + /// + /// This setting can be used to disable server push (Section 8.2). + /// An endpoint MUST NOT send a PUSH_PROMISE frame if it receives this parameter set to a value of 0. + /// An endpoint that has both set this parameter to 0 and had it acknowledged MUST treat the receipt of a + /// PUSH_PROMISE frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR. + /// + /// The initial value is 1, which indicates that server push is permitted. + /// Any value other than 0 or 1 MUST be treated as a connection error (Section 5.4.1) of type PROTOCOL_ERROR. + /// + ENABLE_PUSH = 0x02, + + /// + /// Indicates the maximum number of concurrent streams that the sender will allow. This limit is directional: + /// it applies to the number of streams that the sender permits the receiver to create. + /// Initially, there is no limit to this value. It is recommended that this value be no smaller than 100, + /// so as to not unnecessarily limit parallelism. + /// + /// A value of 0 for SETTINGS_MAX_CONCURRENT_STREAMS SHOULD NOT be treated as special by endpoints. + /// A zero value does prevent the creation of new streams; + /// however, this can also happen for any limit that is exhausted with active streams. + /// Servers SHOULD only set a zero value for short durations; if a server does not wish to accept requests, + /// closing the connection is more appropriate. + /// + MAX_CONCURRENT_STREAMS = 0x03, + + /// + /// Indicates the sender's initial window size (in octets) for stream-level flow control. + /// The initial value is 2^16-1 (65,535) octets. + /// + /// This setting affects the window size of all streams (see Section 6.9.2). + /// + /// Values above the maximum flow-control window size of 2^31-1 MUST be treated as a connection error + /// (Section 5.4.1) of type FLOW_CONTROL_ERROR. + /// + INITIAL_WINDOW_SIZE = 0x04, + + /// + /// Indicates the size of the largest frame payload that the sender is willing to receive, in octets. + /// + /// The initial value is 2^14 (16,384) octets. + /// The value advertised by an endpoint MUST be between this initial value and the maximum allowed frame size + /// (2^24-1 or 16,777,215 octets), inclusive. + /// Values outside this range MUST be treated as a connection error (Section 5.4.1) of type PROTOCOL_ERROR. + /// + MAX_FRAME_SIZE = 0x05, + + /// + /// This advisory setting informs a peer of the maximum size of header list that the sender is prepared to accept, in octets. + /// The value is based on the uncompressed size of header fields, + /// including the length of the name and value in octets plus an overhead of 32 octets for each header field. + /// + /// For any given request, a lower limit than what is advertised MAY be enforced. The initial value of this setting is unlimited. + /// + MAX_HEADER_LIST_SIZE = 0x06, + + RESERVED = 0x07, + + /// + /// https://tools.ietf.org/html/rfc8441 + /// Upon receipt of SETTINGS_ENABLE_CONNECT_PROTOCOL with a value of 1, a client MAY use the Extended CONNECT as defined in this document when creating new streams. + /// Receipt of this parameter by a server does not have any impact. + /// + /// A sender MUST NOT send a SETTINGS_ENABLE_CONNECT_PROTOCOL parameter with the value of 0 after previously sending a value of 1. + /// + ENABLE_CONNECT_PROTOCOL = 0x08, + + /// + /// Allow endpoints to omit or ignore HTTP/2 priority signals. + /// Extensible Prioritization Scheme for HTTP + /// + NO_RFC7540_PRIORITIES = 0x09, + } + + /// + /// Represents a registry for HTTP/2 settings. + /// + public sealed class HTTP2SettingsRegistry + { + /// + /// Gets a value indicating whether the registry is read-only. + /// + public bool IsReadOnly { get; private set; } + + /// + /// Event triggered when a setting changes. + /// + public Action OnSettingChangedEvent; + + private UInt32[] values; + private bool[] changeFlags; + + /// + /// Indexer to get or set values based on an key. + /// + /// The setting key. + /// The value associated with the given setting key. + public UInt32 this[HTTP2Settings setting] + { + get { return this.values[(ushort)setting]; } + + set + { + if (this.IsReadOnly) + throw new NotSupportedException("It's a read-only one!"); + + ushort idx = (ushort)setting; + + // https://httpwg.org/specs/rfc7540.html#SettingValues + // An endpoint that receives a SETTINGS frame with any unknown or unsupported identifier MUST ignore that setting. + if (idx == 0 || idx >= this.values.Length) + return; + + UInt32 oldValue = this.values[idx]; + if (oldValue != value) + { + this.values[idx] = value; + this.changeFlags[idx] = true; + IsChanged = true; + + if (this.OnSettingChangedEvent != null) + this.OnSettingChangedEvent(this, setting, oldValue, value); + } + } + } + + /// + /// Gets a value indicating whether any setting has changed. + /// + public bool IsChanged { get; private set; } + + private HTTP2SettingsManager _parent; + + /// + /// Initializes a new instance of the HTTP2SettingsRegistry class. + /// + /// The parent . + /// Whether this registry is read-only. + /// Whether to treat the registry as if a setting has already changed. + public HTTP2SettingsRegistry(HTTP2SettingsManager parent, bool readOnly, bool treatItAsAlreadyChanged) + { + this._parent = parent; + + this.values = new UInt32[HTTP2SettingsManager.KnownSettingsCount]; + + this.IsReadOnly = readOnly; + if (!this.IsReadOnly) + this.changeFlags = new bool[HTTP2SettingsManager.KnownSettingsCount]; + + // Set default values (https://httpwg.org/specs/rfc7540.html#iana-settings) + this.values[(UInt16)HTTP2Settings.HEADER_TABLE_SIZE] = 4096; + this.values[(UInt16)HTTP2Settings.ENABLE_PUSH] = 1; + this.values[(UInt16)HTTP2Settings.MAX_CONCURRENT_STREAMS] = 128; + this.values[(UInt16)HTTP2Settings.INITIAL_WINDOW_SIZE] = 65535; + this.values[(UInt16)HTTP2Settings.MAX_FRAME_SIZE] = 16384; + this.values[(UInt16)HTTP2Settings.MAX_HEADER_LIST_SIZE] = UInt32.MaxValue; // infinite + + if (this.IsChanged = treatItAsAlreadyChanged) + { + this.changeFlags[(UInt16)HTTP2Settings.MAX_CONCURRENT_STREAMS] = true; + } + } + + /// + /// Merges the specified settings into the current registry. + /// + /// The settings to merge. + public void Merge(List> settings) + { + if (settings == null) + return; + + for (int i = 0; i < settings.Count; ++i) + { + HTTP2Settings setting = settings[i].Key; + UInt16 key = (UInt16)setting; + UInt32 value = settings[i].Value; + + if (key >= this.values.Length) + Array.Resize(ref this.values, (int)key + 1); + + UInt32 oldValue = this.values[key]; + this.values[key] = value; + + if (oldValue != value && this.OnSettingChangedEvent != null) + this.OnSettingChangedEvent(this, setting, oldValue, value); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("HTTP2SettingsRegistry", string.Format("Merge {0}({1}) = {2}", setting, key, value), this._parent.Context); + } + } + + /// + /// Merges settings from another HTTP2SettingsRegistry into the current registry. + /// + /// The registry to merge settings from. + public void Merge(HTTP2SettingsRegistry from) + { + if (this.values != null) + this.values = new uint[from.values.Length]; + + for (int i = 0; i < this.values.Length; ++i) + this.values[i] = from.values[i]; + } + + /// + /// Creates a new HTTP/2 frame based on the current registry settings. + /// + /// The logging context. + /// A new HTTP/2 frame. + internal HTTP2FrameHeaderAndPayload CreateFrame(LoggingContext context) + { + List> keyValuePairs = new List>(HTTP2SettingsManager.KnownSettingsCount); + + for (int i = 1; i < HTTP2SettingsManager.KnownSettingsCount; ++i) + if (this.changeFlags[i]) + { + keyValuePairs.Add(new KeyValuePair((HTTP2Settings)i, this[(HTTP2Settings)i])); + this.changeFlags[i] = false; + } + + this.IsChanged = false; + + return HTTP2FrameHelper.CreateSettingsFrame(keyValuePairs, context); + } + } + + /// + /// Class to manager local and remote HTTP/2 settings. + /// + public sealed class HTTP2SettingsManager + { + public static readonly int KnownSettingsCount = Enum.GetNames(typeof(HTTP2Settings)).Length + 1; + + /// + /// This is the ACKd or default settings that we sent to the server. + /// + public HTTP2SettingsRegistry MySettings { get; private set; } + + /// + /// This is the setting that can be changed. It will be sent to the server ASAP, and when ACKd, it will be copied + /// to MySettings. + /// + public HTTP2SettingsRegistry InitiatedMySettings { get; private set; } + + /// + /// Settings of the remote peer + /// + public HTTP2SettingsRegistry RemoteSettings { get; private set; } + + public DateTime SettingsChangesSentAt { get; private set; } + + public LoggingContext Context { get; private set; } + + private HTTP2ConnectionSettings _connectionSettings; + + public HTTP2SettingsManager(LoggingContext context, HTTP2ConnectionSettings connectionSettings) + { + this.Context = context; + this._connectionSettings = connectionSettings; + + this.MySettings = new HTTP2SettingsRegistry(this, readOnly: true, treatItAsAlreadyChanged: false); + this.InitiatedMySettings = new HTTP2SettingsRegistry(this, readOnly: false, treatItAsAlreadyChanged: true); + this.RemoteSettings = new HTTP2SettingsRegistry(this, readOnly: true, treatItAsAlreadyChanged: false); + this.SettingsChangesSentAt = DateTime.MinValue; + } + + internal void Process(HTTP2FrameHeaderAndPayload frame, List outgoingFrames) + { + if (frame.Type != HTTP2FrameTypes.SETTINGS) + return; + + HTTP2SettingsFrame settingsFrame = HTTP2FrameHelper.ReadSettings(frame); + + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HTTP2SettingsManager", "Processing Settings frame: " + settingsFrame.ToString(), this.Context); + + if ((settingsFrame.Flags & HTTP2SettingsFlags.ACK) == HTTP2SettingsFlags.ACK) + { + this.MySettings.Merge(this.InitiatedMySettings); + this.SettingsChangesSentAt = DateTime.MinValue; + } + else + { + this.RemoteSettings.Merge(settingsFrame.Settings); + outgoingFrames.Add(HTTP2FrameHelper.CreateACKSettingsFrame()); + } + } + + internal void SendChanges(List outgoingFrames) + { + if (this.SettingsChangesSentAt != DateTime.MinValue && DateTime.UtcNow - this.SettingsChangesSentAt >= this._connectionSettings.Timeout) + { + HTTPManager.Logger.Error("HTTP2SettingsManager", "No ACK received for settings frame!", this.Context); + this.SettingsChangesSentAt = DateTime.MinValue; + } + + // Upon receiving a SETTINGS frame with the ACK flag set, the sender of the altered parameters can rely on the setting having been applied. + if (!this.InitiatedMySettings.IsChanged) + return; + + outgoingFrames.Add(this.InitiatedMySettings.CreateFrame(this.Context)); + this.SettingsChangesSentAt = DateTime.UtcNow; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs.meta new file mode 100644 index 00000000..5370a907 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9723be24bbd74214dbff4fc66a5b24bf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2SettingsRegistry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs new file mode 100644 index 00000000..eff3f615 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs @@ -0,0 +1,663 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL +#define ENABLE_LOGGING +using System; +using System.Collections.Generic; + +using Best.HTTP.Request.Upload; +using Best.HTTP.Request.Timings; +using Best.HTTP.Response; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + // https://httpwg.org/specs/rfc7540.html#StreamStates + // + // Idle + // | + // V + // Open + // Receive END_STREAM / | \ Send END_STREAM + // v |R V + // Half Closed Remote |S Half Closed Locale + // \ |T / + // Send END_STREAM | RST_STREAM \ | / Receive END_STREAM | RST_STREAM + // Receive RST_STREAM \ | / Send RST_STREAM + // V + // Closed + // + // IDLE -> send headers -> OPEN -> send data -> HALF CLOSED - LOCAL -> receive headers -> receive Data -> CLOSED + // | ^ | ^ + // +-------------------------------------+ +-----------------------------+ + // END_STREAM flag present? END_STREAM flag present? + // + + public enum HTTP2StreamStates + { + Idle, + //ReservedLocale, + //ReservedRemote, + Open, + HalfClosedLocal, + HalfClosedRemote, + Closed + } + + /// + /// Implements an HTTP/2 logical stream. + /// + public class HTTP2Stream : IDownloadContentBufferAvailable + { + public UInt32 Id { get; private set; } + + public HTTP2StreamStates State { + get { return this._state; } + + protected set { + var oldState = this._state; + + this._state = value; + +#if ENABLE_LOGGING + if (oldState != this._state && HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] State changed from {1} to {2}", this.Id, oldState, this._state), this.Context); +#endif + } + } + private HTTP2StreamStates _state; + + /// + /// This flag is checked by the connection to decide whether to do a new processing-frame sending round before sleeping until new data arrives + /// + public virtual bool HasFrameToSend + { + get + { + // Don't let the connection sleep until + return this.outgoing.Count > 0 || // we already booked at least one frame in advance + (this.State == HTTP2StreamStates.Open && this.remoteWindow > 0 && this.lastReadCount > 0); // we are in the middle of sending request data + } + } + + /// + /// Next interaction scheduled by the stream relative to *now*. Its default is TimeSpan.MaxValue == no interaction. + /// + public virtual TimeSpan NextInteraction { get; } = TimeSpan.MaxValue; + + public HTTPRequest AssignedRequest { get; protected set; } + + public LoggingContext Context { get; protected set; } + + protected uint downloaded; + + protected HTTP2SettingsManager settings; + protected HPACKEncoder encoder; + + // Outgoing frames. The stream will send one frame per Process call, but because one step might be able to + // generate more than one frames, we use a list. + protected Queue outgoing = new Queue(); + + protected Queue incomingFrames = new Queue(); + + protected FramesAsStreamView headerView; + + protected Int64 localWindow; + protected Int64 remoteWindow; + + protected uint windowUpdateThreshold; + + protected UInt32 assignDataLength; + + protected long sentData; + protected long uploadLength; + + protected bool isRSTFrameSent; + protected bool isEndSTRReceived; + + protected HTTP2Response response; + + protected int lastReadCount; + + protected HTTP2ContentConsumer _parentHandler; + + /// + /// Constructor to create a client stream. + /// + public HTTP2Stream(UInt32 id, HTTP2ContentConsumer parentHandler, HTTP2SettingsManager registry, HPACKEncoder hpackEncoder) + { + this.Id = id; + this._parentHandler = parentHandler; + this.settings = registry; + this.encoder = hpackEncoder; + + this.Context = new LoggingContext(this); + this.Context.Add("id", id); + this.Context.Add("Parent", parentHandler.Context); + + this.remoteWindow = this.settings.RemoteSettings[HTTP2Settings.INITIAL_WINDOW_SIZE]; + this.settings.RemoteSettings.OnSettingChangedEvent += OnRemoteSettingChanged; + + // Room for improvement: If INITIAL_WINDOW_SIZE is small (what we can consider a 'small' value?), threshold must be higher + this.windowUpdateThreshold = (uint)(this.remoteWindow / 2); + } + + public virtual void Assign(HTTPRequest request) + { + this.Context.Add("Request", request.Context); + + request.Timing.StartNext(TimingEventNames.Request_Sent); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] Request assigned to stream. Remote Window: {1:N0}. Uri: {2}", this.Id, this.remoteWindow, request.CurrentUri.ToString()), this.Context); +#endif + this.AssignedRequest = request; + + this.downloaded = 0; + } + + public void Process(List outgoingFrames) + { + if (this.AssignedRequest.IsCancellationRequested && !this.isRSTFrameSent) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", $"[{this.Id}] Process({this.State}) - IsCancellationRequested", this.Context); +#endif + + // These two are already set in HTTPRequest's Abort(). + //this.AssignedRequest.Response = null; + //this.AssignedRequest.State = this.AssignedRequest.IsTimedOut ? HTTPRequestStates.TimedOut : HTTPRequestStates.Aborted; + + this.outgoing.Clear(); + if (this.State != HTTP2StreamStates.Idle) + this.outgoing.Enqueue(HTTP2FrameHelper.CreateRSTFrame(this.Id, HTTP2ErrorCodes.CANCEL, this.Context)); + + // We can close the stream if already received headers, or not even sent one + if (this.State == HTTP2StreamStates.HalfClosedRemote || this.State == HTTP2StreamStates.HalfClosedLocal || this.State == HTTP2StreamStates.Idle) + this.State = HTTP2StreamStates.Closed; + + this.isRSTFrameSent = true; + } + + // 1.) Go through incoming frames + ProcessIncomingFrames(outgoingFrames); + + // 2.) Create outgoing frames based on the stream's state and the request processing state. + ProcessState(outgoingFrames); + + // 3.) Send one frame per Process call + if (this.outgoing.Count > 0) + { + HTTP2FrameHeaderAndPayload frame = this.outgoing.Dequeue(); + + outgoingFrames.Add(frame); + + // If END_Stream in header or data frame is present => half closed local + if ((frame.Type == HTTP2FrameTypes.HEADERS && (frame.Flags & (byte)HTTP2HeadersFlags.END_STREAM) != 0) || + (frame.Type == HTTP2FrameTypes.DATA && (frame.Flags & (byte)HTTP2DataFlags.END_STREAM) != 0)) + { + this.State = HTTP2StreamStates.HalfClosedLocal; + } + } + } + + public void AddFrame(HTTP2FrameHeaderAndPayload frame, List outgoingFrames) + { + // Room for improvement: error check for forbidden frames (like settings) and stream state + + this.incomingFrames.Enqueue(frame); + + ProcessIncomingFrames(outgoingFrames); + } + + public void Abort(string msg) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", $"[{this.Id}] Abort(\"{msg}\", {this.State}, {this.AssignedRequest.State})", this.Context); +#endif + + if (this.State != HTTP2StreamStates.Closed) + { + // TODO: Remove AssignedRequest.State checks. If the main thread has delays processing queued up state change requests, + // the request's State can contain old information! + + if (this.AssignedRequest.State != HTTPRequestStates.Processing) + { + // do nothing, its state is already set. + } + else if (this.AssignedRequest.IsCancellationRequested) + { + // These two are already set in HTTPRequest's Abort(). + //this.AssignedRequest.Response = null; + //this.AssignedRequest.State = this.AssignedRequest.IsTimedOut ? HTTPRequestStates.TimedOut : HTTPRequestStates.Aborted; + + this.State = HTTP2StreamStates.Closed; + } + else if (this.AssignedRequest.RetrySettings.Retries >= this.AssignedRequest.RetrySettings.MaxRetries) + { + this.AssignedRequest.Timing.StartNext(TimingEventNames.Queued); + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, HTTPRequestStates.Error, new Exception(msg))); + + this.State = HTTP2StreamStates.Closed; + } + else + { + this.AssignedRequest.RetrySettings.Retries++; + + this.AssignedRequest.Response?.Dispose(); + this.AssignedRequest.Response = null; + + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, RequestEvents.Resend)); + } + } + + this.Removed(); + } + + protected void ProcessIncomingFrames(List outgoingFrames) + { + while (this.incomingFrames.Count > 0) + { + HTTP2FrameHeaderAndPayload frame = this.incomingFrames.Dequeue(); + + if ((this.isRSTFrameSent || this.AssignedRequest.IsCancellationRequested) && frame.Type != HTTP2FrameTypes.HEADERS && frame.Type != HTTP2FrameTypes.CONTINUATION) + { + BufferPool.Release(frame.Payload); + continue; + } + +#if ENABLE_LOGGING + if (/*HTTPManager.Logger.Level == Logger.Loglevels.All && */frame.Type != HTTP2FrameTypes.DATA && frame.Type != HTTP2FrameTypes.WINDOW_UPDATE) + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] Process - processing frame: {1}", this.Id, frame.ToString()), this.Context); +#endif + + switch (frame.Type) + { + case HTTP2FrameTypes.HEADERS: + case HTTP2FrameTypes.CONTINUATION: + if (this.State != HTTP2StreamStates.HalfClosedLocal && this.State != HTTP2StreamStates.Open && this.State != HTTP2StreamStates.Idle) + { + // ERROR! + continue; + } + + // payload will be released by the view + frame.DontUseMemPool = true; + + if (this.headerView == null) + { + this.AssignedRequest.Timing.StartNext(TimingEventNames.Headers); + + this.headerView = new FramesAsStreamView(new HeaderFrameView()); + } + + this.headerView.AddFrame(frame); + + // END_STREAM may arrive sooner than an END_HEADERS, so we have to store that we already received it + if ((frame.Flags & (byte)HTTP2HeadersFlags.END_STREAM) != 0) + this.isEndSTRReceived = true; + + if ((frame.Flags & (byte)HTTP2HeadersFlags.END_HEADERS) != 0) + { + List> headers = new List>(); + + try + { + this.encoder.Decode(this, this.headerView, headers); + } + catch(Exception ex) + { + HTTPManager.Logger.Exception("HTTP2Stream", string.Format("[{0}] ProcessIncomingFrames - Header Frames: {1}, Encoder: {2}", this.Id, this.headerView.ToString(), this.encoder.ToString()), ex, this.Context); + } + + this.headerView.Close(); + this.headerView = null; + + this.AssignedRequest.Timing.StartNext(TimingEventNames.Response_Received); + + if (this.isRSTFrameSent) + { + this.State = HTTP2StreamStates.Closed; + break; + } + + if (this.response == null) + this.AssignedRequest.Response = this.response = new HTTP2Response(this.AssignedRequest, false); + + this.response.AddHeaders(headers); + + if (this.isEndSTRReceived) + { + // If there's any trailing header, no data frame has an END_STREAM flag + this.response.FinishProcessData(); + + FinishRequest(); + + if (this.State == HTTP2StreamStates.HalfClosedLocal) + this.State = HTTP2StreamStates.Closed; + else + this.State = HTTP2StreamStates.HalfClosedRemote; + } + } + break; + + case HTTP2FrameTypes.DATA: + ProcessIncomingDATAFrame(ref frame); + break; + + case HTTP2FrameTypes.WINDOW_UPDATE: + HTTP2WindowUpdateFrame windowUpdateFrame = HTTP2FrameHelper.ReadWindowUpdateFrame(frame); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] Received Window Update: {1:N0}, new remoteWindow: {2:N0}, initial remote window: {3:N0}, total data sent: {4:N0}", this.Id, windowUpdateFrame.WindowSizeIncrement, this.remoteWindow + windowUpdateFrame.WindowSizeIncrement, this.settings.RemoteSettings[HTTP2Settings.INITIAL_WINDOW_SIZE], this.sentData), this.Context); +#endif + + this.remoteWindow += windowUpdateFrame.WindowSizeIncrement; + break; + + case HTTP2FrameTypes.RST_STREAM: + // https://httpwg.org/specs/rfc7540.html#RST_STREAM + + // It's possible to receive an RST_STREAM on a closed stream. In this case, we have to ignore it. + if (this.State == HTTP2StreamStates.Closed) + break; + + var rstStreamFrame = HTTP2FrameHelper.ReadRST_StreamFrame(frame); + + //HTTPManager.Logger.Error("HTTP2Stream", string.Format("[{0}] RST Stream frame ({1}) received in state {2}!", this.Id, rstStreamFrame, this.State), this.Context); + + Abort(string.Format("RST_STREAM frame received! Error code: {0}({1})", rstStreamFrame.Error.ToString(), rstStreamFrame.ErrorCode)); + break; + + default: + HTTPManager.Logger.Warning("HTTP2Stream", string.Format("[{0}] Unexpected frame ({1}, Payload: {2}) in state {3}!", this.Id, frame, frame.PayloadAsHex(), this.State), this.Context); + break; + } + + if (!frame.DontUseMemPool) + BufferPool.Release(frame.Payload); + } + } + + void IDownloadContentBufferAvailable.BufferAvailable(DownloadContentStream stream) + { + // Signal the http2 thread, window update will be sent out in ProcessOpenState. + this._parentHandler.SignalThread(); + } + + protected virtual void ProcessIncomingDATAFrame(ref HTTP2FrameHeaderAndPayload frame) + { + if (this.State != HTTP2StreamStates.HalfClosedLocal && this.State != HTTP2StreamStates.Open) + { + // ERROR! + return; + } + + HTTP2DataFrame dataFrame = HTTP2FrameHelper.ReadDataFrame(frame); + + this.downloaded += (uint)dataFrame.Data.Count; + + this.response.Prepare(this); + + this.response.ProcessData(dataFrame.Data); + frame.DontUseMemPool = true; + + // Because of padding, frame.Payload.Count can be larger than dataFrame.Data.Count! + // "The entire DATA frame payload is included in flow control, including the Pad Length and Padding fields if present." + this.localWindow -= frame.Payload.Count; + + this.isEndSTRReceived = (frame.Flags & (byte)HTTP2DataFlags.END_STREAM) != 0; + + if (this.isEndSTRReceived) + { + this.response.FinishProcessData(); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] All data arrived, data length: {1:N0}", this.Id, this.downloaded), this.Context); +#endif + + FinishRequest(); + + if (this.State == HTTP2StreamStates.HalfClosedLocal) + this.State = HTTP2StreamStates.Closed; + else + this.State = HTTP2StreamStates.HalfClosedRemote; + } + else if (this.AssignedRequest.DownloadSettings.OnDownloadProgress != null) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, + RequestEvents.DownloadProgress, + downloaded, + this.response.ExpectedContentLength)); + } + + protected void ProcessState(List outgoingFrames) + { + switch (this.State) + { + case HTTP2StreamStates.Idle: + // hpack encode the request's headers + this.encoder.Encode(this, this.AssignedRequest, this.outgoing, this.Id); + + // HTTP/2 uses DATA frames to carry message payloads. + // The chunked transfer encoding defined in Section 4.1 of [RFC7230] MUST NOT be used in HTTP/2. + + if (this.AssignedRequest.UploadSettings.UploadStream == null) + { + this.State = HTTP2StreamStates.HalfClosedLocal; + //this.AssignedRequest.Timing.Finish(TimingEventNames.Request_Sent); + this.AssignedRequest.Timing.StartNext(TimingEventNames.Waiting_TTFB); + } + else + { + this.State = HTTP2StreamStates.Open; + this.lastReadCount = 1; + + if (this.AssignedRequest.UploadSettings.UploadStream is UploadStreamBase upStream) + upStream.BeforeSendBody(this.AssignedRequest, this._parentHandler); + + if (this.AssignedRequest.UploadSettings != null && this.AssignedRequest.UploadSettings.UploadStream != null) + this.uploadLength = this.AssignedRequest.UploadSettings.UploadStream.Length; + } + + // Change the initial window size to the request's DownloadSettings.ContentStreamMaxBuffered and send it to the server. + // After this initial setup the sending out window_update frames faces two problems: + // 1.) The local window should be bound to the Down-stream's MaxBuffered (ContentStreamMaxBuffered) and how its current length. + // 2.) Even while the its bound to the stream's current values, when the download finishes, we still have to update the global window. + // So, there's two options to follow: + // 1.) Update the local window based on the stream's usage + // 2.a) Send global window_update for every DATA frame processed/received + + UInt32 initiatedInitialWindowSize = this.settings.InitiatedMySettings[HTTP2Settings.INITIAL_WINDOW_SIZE]; + this.localWindow = initiatedInitialWindowSize; + + // Maximize max buffered to HTTP/2's limit + if (this.AssignedRequest.DownloadSettings.ContentStreamMaxBuffered > HTTP2ContentConsumer.MaxValueFor31Bits) + this.AssignedRequest.DownloadSettings.ContentStreamMaxBuffered = HTTP2ContentConsumer.MaxValueFor31Bits; + + long localWindowDiff = this.AssignedRequest.DownloadSettings.ContentStreamMaxBuffered - this.localWindow; + + if (localWindowDiff > 0) + { + this.localWindow += localWindowDiff; + this.outgoing.Enqueue(HTTP2FrameHelper.CreateWindowUpdateFrame(this.Id, (UInt32)localWindowDiff, this.Context)); + } + break; + + case HTTP2StreamStates.Open: + ProcessOpenState(outgoingFrames); + //HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] New DATA frame created! remoteWindow: {1:N0}", this.Id, this.remoteWindow), this.Context); + break; + + case HTTP2StreamStates.HalfClosedLocal: + if (this.response?.DownStream != null) + { + var windowIncrement = this.response.DownStream.MaxBuffered - this.localWindow - this.response.DownStream.Length; + if (windowIncrement > 0) + { + this.localWindow += windowIncrement; + outgoingFrames.Add(HTTP2FrameHelper.CreateWindowUpdateFrame(this.Id, (UInt32)windowIncrement, this.Context)); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", $"[{this.Id}] Sending window inc. update: {windowIncrement:N0}, {this.localWindow:N0}/{this.response.DownStream.MaxBuffered:N0}", this.Context); +#endif + } + } + break; + + case HTTP2StreamStates.HalfClosedRemote: + break; + + case HTTP2StreamStates.Closed: + break; + } + } + + protected virtual void ProcessOpenState(List outgoingFrames) + { + // remote Window can be negative! See https://httpwg.org/specs/rfc7540.html#InitialWindowSize + if (this.remoteWindow <= 0) + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] Skipping data sending as remote Window is {1}!", this.Id, this.remoteWindow), this.Context); +#endif + return; + } + + // This step will send one frame per ProcessOpenState call. + + Int64 maxFrameSize = Math.Min(this.AssignedRequest.UploadSettings.UploadChunkSize, Math.Min(this.remoteWindow, this.settings.RemoteSettings[HTTP2Settings.MAX_FRAME_SIZE])); + + HTTP2FrameHeaderAndPayload frame = new HTTP2FrameHeaderAndPayload(); + frame.Type = HTTP2FrameTypes.DATA; + frame.StreamId = this.Id; + + frame.Payload = BufferPool.Get(maxFrameSize, true) + .AsBuffer((int)maxFrameSize); + + // Expect a readCount of zero if it's end of the stream. But, to enable non-blocking scenario to wait for data, going to treat a negative value as no data. + this.lastReadCount = this.AssignedRequest.UploadSettings.UploadStream.Read(frame.Payload.Data, 0, (int)Math.Min(maxFrameSize, int.MaxValue)); + if (this.lastReadCount <= 0) + { + BufferPool.Release(frame.Payload); + + frame.Payload = BufferSegment.Empty; + + if (this.lastReadCount < 0) + return; + } + else + frame.Payload = frame.Payload.Slice(0, this.lastReadCount); + + frame.DontUseMemPool = false; + + if (this.lastReadCount <= 0) + { + this.AssignedRequest.UploadSettings.Dispose(); + + frame.Flags = (byte)(HTTP2DataFlags.END_STREAM); + + this.State = HTTP2StreamStates.HalfClosedLocal; + + this.AssignedRequest.Timing.StartNext(TimingEventNames.Waiting_TTFB); + } + + this.outgoing.Enqueue(frame); + + this.remoteWindow -= frame.Payload.Count; + + this.sentData += (uint)frame.Payload.Count; + + if (this.AssignedRequest.UploadSettings.OnUploadProgress != null) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, RequestEvents.UploadProgress, this.sentData, uploadLength)); + } + + protected void OnRemoteSettingChanged(HTTP2SettingsRegistry registry, HTTP2Settings setting, uint oldValue, uint newValue) + { + switch (setting) + { + case HTTP2Settings.INITIAL_WINDOW_SIZE: + // https://httpwg.org/specs/rfc7540.html#InitialWindowSize + // "Prior to receiving a SETTINGS frame that sets a value for SETTINGS_INITIAL_WINDOW_SIZE, + // an endpoint can only use the default initial window size when sending flow-controlled frames." + // "In addition to changing the flow-control window for streams that are not yet active, + // a SETTINGS frame can alter the initial flow-control window size for streams with active flow-control windows + // (that is, streams in the "open" or "half-closed (remote)" state). When the value of SETTINGS_INITIAL_WINDOW_SIZE changes, + // a receiver MUST adjust the size of all stream flow-control windows that it maintains by the difference between the new value and the old value." + + // So, if we created a stream before the remote peer's initial settings frame is received, we + // will adjust the window size. For example: initial window size by default is 65535, if we later + // receive a change to 1048576 (1 MB) we will increase the current remoteWindow by (1 048 576 - 65 535 =) 983 041 + + // But because initial window size in a setting frame can be smaller then the default 65535 bytes, + // the difference can be negative: + // "A change to SETTINGS_INITIAL_WINDOW_SIZE can cause the available space in a flow-control window to become negative. + // A sender MUST track the negative flow-control window and MUST NOT send new flow-controlled frames + // until it receives WINDOW_UPDATE frames that cause the flow-control window to become positive. + + // For example, if the client sends 60 KB immediately on connection establishment + // and the server sets the initial window size to be 16 KB, the client will recalculate + // the available flow - control window to be - 44 KB on receipt of the SETTINGS frame. + // The client retains a negative flow-control window until WINDOW_UPDATE frames restore the + // window to being positive, after which the client can resume sending." + + this.remoteWindow += newValue - oldValue; + +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", string.Format("[{0}] Remote Setting's Initial Window Updated from {1:N0} to {2:N0}, diff: {3:N0}, new remoteWindow: {4:N0}, total data sent: {5:N0}", this.Id, oldValue, newValue, newValue - oldValue, this.remoteWindow, this.sentData), this.Context); +#endif + break; + } + } + + protected void FinishRequest() + { +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", $"FinishRequest({this.Id})", this.Context); +#endif + + try + { + this.AssignedRequest.Timing.StartNext(TimingEventNames.Queued); + + bool resendRequest; + HTTPConnectionStates proposedConnectionStates; // ignored + KeepAliveHeader keepAliveHeader = null; // ignored + + ConnectionHelper.HandleResponse(this.AssignedRequest, out resendRequest, out proposedConnectionStates, ref keepAliveHeader, this.Context); + + if (resendRequest && !this.AssignedRequest.IsCancellationRequested) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, RequestEvents.Resend)); + else + { + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.AssignedRequest, HTTPRequestStates.Finished, null)); + } + } + catch(Exception ex) + { + HTTPManager.Logger.Exception("HTTP2Stream", "FinishRequest", ex, this.Context); + } + } + + public void Removed() + { + this.AssignedRequest.UploadSettings.Dispose(); + + // After receiving a RST_STREAM on a stream, the receiver MUST NOT send additional frames for that stream, with the exception of PRIORITY. + this.outgoing.Clear(); + + // https://github.com/Benedicht/BestHTTP-Issues/issues/77 + // Unsubscribe from OnSettingChangedEvent to remove reference to this instance. + this.settings.RemoteSettings.OnSettingChangedEvent -= OnRemoteSettingChanged; + + this.headerView?.Close(); + +#if ENABLE_LOGGING + HTTPManager.Logger.Information("HTTP2Stream", "Stream removed: " + this.Id.ToString(), this.Context); +#endif + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs.meta new file mode 100644 index 00000000..9f70d8e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2eadc0f2891358d4c9754796420a8e15 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HTTP2Stream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs new file mode 100644 index 00000000..73b4347e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs @@ -0,0 +1,201 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + sealed class HeaderTable + { + // https://http2.github.io/http2-spec/compression.html#static.table.definition + // Valid indexes starts with 1, so there's an empty entry. + static string[] StaticTableValues = new string[] { string.Empty, string.Empty, "GET", "POST", "/", "/index.html", "http", "https", "200", "204", "206", "304", "400", "404", "500", string.Empty, "gzip, deflate" }; + + // https://http2.github.io/http2-spec/compression.html#static.table.definition + // Valid indexes starts with 1, so there's an empty entry. + static string[] StaticTable = new string[62] + { + string.Empty, + ":authority", + ":method", // GET + ":method", // POST + ":path", // / + ":path", // index.html + ":scheme", // http + ":scheme", // https + ":status", // 200 + ":status", // 204 + ":status", // 206 + ":status", // 304 + ":status", // 400 + ":status", // 404 + ":status", // 500 + "accept-charset", + "accept-encoding", // gzip, deflate + "accept-language", + "accept-ranges", + "accept", + "access-control-allow-origin", + "age", + "allow", + "authorization", + "cache-control", + "content-disposition", + "content-encoding", + "content-language", + "content-length", + "content-location", + "content-range", + "content-type", + "cookie", + "date", + "etag", + "expect", + "expires", + "from", + "host", + "if-match", + "if-modified-since", + "if-none-match", + "if-range", + "if-unmodified-since", + "last-modified", + "link", + "location", + "max-forwards", + "proxy-authenticate", + "proxy-authorization", + "range", + "referer", + "refresh", + "retry-after", + "server", + "set-cookie", + "strict-transport-security", + "transfer-encoding", + "user-agent", + "vary", + "via", + "www-authenticate", + }; + + public UInt32 DynamicTableSize { get; private set; } + public UInt32 MaxDynamicTableSize { + get { return this._maxDynamicTableSize; } + set + { + this._maxDynamicTableSize = value; + EvictEntries(0); + } + } + private UInt32 _maxDynamicTableSize; + + private List> DynamicTable = new List>(); + private HTTP2SettingsRegistry settingsRegistry; + + public HeaderTable(HTTP2SettingsRegistry registry) + { + this.settingsRegistry = registry; + this.MaxDynamicTableSize = this.settingsRegistry[HTTP2Settings.HEADER_TABLE_SIZE]; + } + + public KeyValuePair GetIndex(string key, string value) + { + for (int i = 0; i < DynamicTable.Count; ++i) + { + var kvp = DynamicTable[i]; + + // Exact match for both key and value + if (kvp.Key.Equals(key, StringComparison.OrdinalIgnoreCase) && kvp.Value.Equals(value, StringComparison.OrdinalIgnoreCase)) + return new KeyValuePair((UInt32)(StaticTable.Length + i), (UInt32)(StaticTable.Length + i)); + } + + KeyValuePair bestMatch = new KeyValuePair(0, 0); + for (int i = 0; i < StaticTable.Length; ++i) + { + if (StaticTable[i].Equals(key, StringComparison.OrdinalIgnoreCase)) + { + if (i < StaticTableValues.Length && !string.IsNullOrEmpty(StaticTableValues[i]) && StaticTableValues[i].Equals(value, StringComparison.OrdinalIgnoreCase)) + return new KeyValuePair((UInt32)i, (UInt32)i); + else + bestMatch = new KeyValuePair((UInt32)i, 0); + } + } + + return bestMatch; + } + + public string GetKey(UInt32 index) + { + if (index < StaticTable.Length) + return StaticTable[index]; + + return this.DynamicTable[(int)(index - StaticTable.Length)].Key; + } + + public KeyValuePair GetHeader(UInt32 index) + { + if (index < StaticTable.Length) + return new KeyValuePair(StaticTable[index], + index < StaticTableValues.Length ? StaticTableValues[index] : null); + + return this.DynamicTable[(int)(index - StaticTable.Length)]; + } + + public void Add(KeyValuePair header) + { + // https://http2.github.io/http2-spec/compression.html#calculating.table.size + // The size of an entry is the sum of its name's length in octets (as defined in Section 5.2), + // its value's length in octets, and 32. + UInt32 newHeaderSize = CalculateEntrySize(header); + + EvictEntries(newHeaderSize); + + // If the size of the new entry is less than or equal to the maximum size, that entry is added to the table. + // It is not an error to attempt to add an entry that is larger than the maximum size; + // an attempt to add an entry larger than the maximum size causes the table to be + // emptied of all existing entries and results in an empty table. + if (this.DynamicTableSize + newHeaderSize <= this.MaxDynamicTableSize) + { + this.DynamicTable.Insert(0, header); + this.DynamicTableSize += (UInt32)newHeaderSize; + } + } + + private UInt32 CalculateEntrySize(KeyValuePair entry) + { + return 32 + (UInt32)System.Text.Encoding.UTF8.GetByteCount(entry.Key) + + (UInt32)System.Text.Encoding.UTF8.GetByteCount(entry.Value); + } + + private void EvictEntries(uint newHeaderSize) + { + // https://http2.github.io/http2-spec/compression.html#entry.addition + // Before a new entry is added to the dynamic table, entries are evicted from the end of the dynamic + // table until the size of the dynamic table is less than or equal to (maximum size - new entry size) or until the table is empty. + while (this.DynamicTableSize + newHeaderSize > this.MaxDynamicTableSize && this.DynamicTable.Count > 0) + { + KeyValuePair entry = this.DynamicTable[this.DynamicTable.Count - 1]; + this.DynamicTable.RemoveAt(this.DynamicTable.Count - 1); + this.DynamicTableSize -= CalculateEntrySize(entry); + } + } + + public override string ToString() + { + System.Text.StringBuilder sb = StringBuilderPool.Get(this.DynamicTable.Count + 3); + sb.Append("[HeaderTable "); + sb.AppendFormat("DynamicTable count: {0}, DynamicTableSize: {1}, MaxDynamicTableSize: {2}, ", this.DynamicTable.Count, this.DynamicTableSize, this.MaxDynamicTableSize); + + foreach(var kvp in this.DynamicTable) + sb.AppendFormat("\"{0}\": \"{1}\", ", kvp.Key, kvp.Value); + + sb.Append("]"); + return StringBuilderPool.ReleaseAndGrab(sb); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs.meta new file mode 100644 index 00000000..2996ff63 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6a0cd78904e5b8e4095111b9a2d439e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HeaderTable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs new file mode 100644 index 00000000..48a68063 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs @@ -0,0 +1,933 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + +using System; + +namespace Best.HTTP.Hosts.Connections.HTTP2 +{ + /// + /// A pre-generated table entry in a Huffman-Tree. + /// + public readonly struct HuffmanTableEntry + { + public readonly UInt32 Code; + public readonly byte Bits; + + public HuffmanTableEntry(UInt32 code, byte bits) + { + this.Code = code; + this.Bits = bits; + } + + /// + /// It must return 0 or 1 at bit index. Indexing will be relative to the Bits representing the current code. Idx grows from left to right. Idx must be between [1..Bits]. + /// + public byte GetBitAtIdx(byte idx) + { + return (byte)((this.Code >> (this.Bits - idx)) & 1); + } + + public override string ToString() + { + return string.Format("[TableEntry Code: 0x{0:X}, Bits: {1}]", this.Code, this.Bits); + } + } + + public readonly struct HuffmanTreeNode + { + public readonly UInt16 Value; + + public readonly UInt16 NextZeroIdx; + public readonly UInt16 NextOneIdx; + + public HuffmanTreeNode(UInt16 value, UInt16 nextZeroIdx, UInt16 nextOneIdx) + { + this.Value = value; + this.NextZeroIdx = nextZeroIdx; + this.NextOneIdx = nextOneIdx; + } + + public override string ToString() + { + return string.Format("[TreeNode Value: {0}, NextZeroIdx: {1}, NextOneIdx: {2}]", + this.Value, this.NextZeroIdx, this.NextOneIdx); + } + } + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstruction] + static class HuffmanEncoder + { + public const UInt16 EOS = 256; + + static readonly HuffmanTableEntry[] StaticTable = new HuffmanTableEntry[257] + { + new HuffmanTableEntry( 0x1ff8 , 13 ), + new HuffmanTableEntry( 0x7fffd8 , 23 ), + new HuffmanTableEntry( 0xfffffe2, 28 ), + new HuffmanTableEntry( 0xfffffe3, 28 ), + new HuffmanTableEntry( 0xfffffe4, 28 ), + new HuffmanTableEntry( 0xfffffe5, 28 ), + new HuffmanTableEntry( 0xfffffe6, 28 ), + new HuffmanTableEntry( 0xfffffe7, 28 ), + new HuffmanTableEntry( 0xfffffe8, 28 ), + new HuffmanTableEntry( 0xffffea, 24 ), + new HuffmanTableEntry( 0x3ffffffc , 30 ), + new HuffmanTableEntry( 0xfffffe9 , 28 ), + new HuffmanTableEntry( 0xfffffea , 28 ), + new HuffmanTableEntry( 0x3ffffffd , 30 ), + new HuffmanTableEntry( 0xfffffeb , 28 ), + new HuffmanTableEntry( 0xfffffec , 28 ), + new HuffmanTableEntry( 0xfffffed , 28 ), + new HuffmanTableEntry( 0xfffffee , 28 ), + new HuffmanTableEntry( 0xfffffef , 28 ), + new HuffmanTableEntry( 0xffffff0 , 28 ), + new HuffmanTableEntry( 0xffffff1 , 28 ), + new HuffmanTableEntry( 0xffffff2 , 28 ), + new HuffmanTableEntry( 0x3ffffffe, 30 ), + new HuffmanTableEntry( 0xffffff3 , 28 ), + new HuffmanTableEntry( 0xffffff4 , 28 ), + new HuffmanTableEntry( 0xffffff5 , 28 ), + new HuffmanTableEntry( 0xffffff6 , 28 ), + new HuffmanTableEntry( 0xffffff7 , 28 ), + new HuffmanTableEntry( 0xffffff8 , 28 ), + new HuffmanTableEntry( 0xffffff9 , 28 ), + new HuffmanTableEntry( 0xffffffa , 28 ), + new HuffmanTableEntry( 0xffffffb , 28 ), + new HuffmanTableEntry( 0x14 , 6 ), + new HuffmanTableEntry( 0x3f8, 10 ), + new HuffmanTableEntry( 0x3f9, 10 ), + new HuffmanTableEntry( 0xffa, 12 ), + new HuffmanTableEntry( 0x1ff9 , 13 ), + new HuffmanTableEntry( 0x15 , 6 ), + new HuffmanTableEntry( 0xf8 , 8 ), + new HuffmanTableEntry( 0x7fa, 11 ), + new HuffmanTableEntry( 0x3fa, 10 ), + new HuffmanTableEntry( 0x3fb, 10 ), + new HuffmanTableEntry( 0xf9 , 8 ), + new HuffmanTableEntry( 0x7fb, 11 ), + new HuffmanTableEntry( 0xfa , 8 ), + new HuffmanTableEntry( 0x16 , 6 ), + new HuffmanTableEntry( 0x17 , 6 ), + new HuffmanTableEntry( 0x18 , 6 ), + new HuffmanTableEntry( 0x0 , 5 ), + new HuffmanTableEntry( 0x1 , 5 ), + new HuffmanTableEntry( 0x2 , 5 ), + new HuffmanTableEntry( 0x19 , 6 ), + new HuffmanTableEntry( 0x1a , 6 ), + new HuffmanTableEntry( 0x1b , 6 ), + new HuffmanTableEntry( 0x1c , 6 ), + new HuffmanTableEntry( 0x1d , 6 ), + new HuffmanTableEntry( 0x1e , 6 ), + new HuffmanTableEntry( 0x1f , 6 ), + new HuffmanTableEntry( 0x5c , 7 ), + new HuffmanTableEntry( 0xfb , 8 ), + new HuffmanTableEntry( 0x7ffc , 15 ), + new HuffmanTableEntry( 0x20 , 6 ), + new HuffmanTableEntry( 0xffb, 12 ), + new HuffmanTableEntry( 0x3fc, 10 ), + new HuffmanTableEntry( 0x1ffa , 13 ), + new HuffmanTableEntry( 0x21, 6 ), + new HuffmanTableEntry( 0x5d, 7 ), + new HuffmanTableEntry( 0x5e, 7 ), + new HuffmanTableEntry( 0x5f, 7 ), + new HuffmanTableEntry( 0x60, 7 ), + new HuffmanTableEntry( 0x61, 7 ), + new HuffmanTableEntry( 0x62, 7 ), + new HuffmanTableEntry( 0x63, 7 ), + new HuffmanTableEntry( 0x64, 7 ), + new HuffmanTableEntry( 0x65, 7 ), + new HuffmanTableEntry( 0x66, 7 ), + new HuffmanTableEntry( 0x67, 7 ), + new HuffmanTableEntry( 0x68, 7 ), + new HuffmanTableEntry( 0x69, 7 ), + new HuffmanTableEntry( 0x6a, 7 ), + new HuffmanTableEntry( 0x6b, 7 ), + new HuffmanTableEntry( 0x6c, 7 ), + new HuffmanTableEntry( 0x6d, 7 ), + new HuffmanTableEntry( 0x6e, 7 ), + new HuffmanTableEntry( 0x6f, 7 ), + new HuffmanTableEntry( 0x70, 7 ), + new HuffmanTableEntry( 0x71, 7 ), + new HuffmanTableEntry( 0x72, 7 ), + new HuffmanTableEntry( 0xfc, 8 ), + new HuffmanTableEntry( 0x73, 7 ), + new HuffmanTableEntry( 0xfd, 8 ), + new HuffmanTableEntry( 0x1ffb, 13 ), + new HuffmanTableEntry( 0x7fff0, 19 ), + new HuffmanTableEntry( 0x1ffc, 13 ), + new HuffmanTableEntry( 0x3ffc, 14 ), + new HuffmanTableEntry( 0x22, 6 ), + new HuffmanTableEntry( 0x7ffd, 15 ), + new HuffmanTableEntry( 0x3, 5 ), + new HuffmanTableEntry( 0x23, 6 ), + new HuffmanTableEntry( 0x4, 5 ), + new HuffmanTableEntry( 0x24, 6 ), + new HuffmanTableEntry( 0x5, 5 ), + new HuffmanTableEntry( 0x25, 6 ), + new HuffmanTableEntry( 0x26, 6 ), + new HuffmanTableEntry( 0x27, 6 ), + new HuffmanTableEntry( 0x6 , 5 ), + new HuffmanTableEntry( 0x74, 7 ), + new HuffmanTableEntry( 0x75, 7 ), + new HuffmanTableEntry( 0x28, 6 ), + new HuffmanTableEntry( 0x29, 6 ), + new HuffmanTableEntry( 0x2a, 6 ), + new HuffmanTableEntry( 0x7 , 5 ), + new HuffmanTableEntry( 0x2b, 6 ), + new HuffmanTableEntry( 0x76, 7 ), + new HuffmanTableEntry( 0x2c, 6 ), + new HuffmanTableEntry( 0x8 , 5 ), + new HuffmanTableEntry( 0x9 , 5 ), + new HuffmanTableEntry( 0x2d, 6 ), + new HuffmanTableEntry( 0x77, 7 ), + new HuffmanTableEntry( 0x78, 7 ), + new HuffmanTableEntry( 0x79, 7 ), + new HuffmanTableEntry( 0x7a, 7 ), + new HuffmanTableEntry( 0x7b, 7 ), + new HuffmanTableEntry( 0x7ffe, 15 ), + new HuffmanTableEntry( 0x7fc, 11 ), + new HuffmanTableEntry( 0x3ffd, 14 ), + new HuffmanTableEntry( 0x1ffd, 13 ), + new HuffmanTableEntry( 0xffffffc, 28 ), + new HuffmanTableEntry( 0xfffe6 , 20 ), + new HuffmanTableEntry( 0x3fffd2, 22 ), + new HuffmanTableEntry( 0xfffe7 , 20 ), + new HuffmanTableEntry( 0xfffe8 , 20 ), + new HuffmanTableEntry( 0x3fffd3, 22 ), + new HuffmanTableEntry( 0x3fffd4, 22 ), + new HuffmanTableEntry( 0x3fffd5, 22 ), + new HuffmanTableEntry( 0x7fffd9, 23 ), + new HuffmanTableEntry( 0x3fffd6, 22 ), + new HuffmanTableEntry( 0x7fffda, 23 ), + new HuffmanTableEntry( 0x7fffdb, 23 ), + new HuffmanTableEntry( 0x7fffdc, 23 ), + new HuffmanTableEntry( 0x7fffdd, 23 ), + new HuffmanTableEntry( 0x7fffde, 23 ), + new HuffmanTableEntry( 0xffffeb, 24 ), + new HuffmanTableEntry( 0x7fffdf, 23 ), + new HuffmanTableEntry( 0xffffec, 24 ), + new HuffmanTableEntry( 0xffffed, 24 ), + new HuffmanTableEntry( 0x3fffd7, 22 ), + new HuffmanTableEntry( 0x7fffe0, 23 ), + new HuffmanTableEntry( 0xffffee, 24 ), + new HuffmanTableEntry( 0x7fffe1, 23 ), + new HuffmanTableEntry( 0x7fffe2, 23 ), + new HuffmanTableEntry( 0x7fffe3, 23 ), + new HuffmanTableEntry( 0x7fffe4, 23 ), + new HuffmanTableEntry( 0x1fffdc, 21 ), + new HuffmanTableEntry( 0x3fffd8, 22 ), + new HuffmanTableEntry( 0x7fffe5, 23 ), + new HuffmanTableEntry( 0x3fffd9, 22 ), + new HuffmanTableEntry( 0x7fffe6, 23 ), + new HuffmanTableEntry( 0x7fffe7, 23 ), + new HuffmanTableEntry( 0xffffef, 24 ), + new HuffmanTableEntry( 0x3fffda, 22 ), + new HuffmanTableEntry( 0x1fffdd, 21 ), + new HuffmanTableEntry( 0xfffe9 , 20 ), + new HuffmanTableEntry( 0x3fffdb, 22 ), + new HuffmanTableEntry( 0x3fffdc, 22 ), + new HuffmanTableEntry( 0x7fffe8, 23 ), + new HuffmanTableEntry( 0x7fffe9, 23 ), + new HuffmanTableEntry( 0x1fffde, 21 ), + new HuffmanTableEntry( 0x7fffea, 23 ), + new HuffmanTableEntry( 0x3fffdd, 22 ), + new HuffmanTableEntry( 0x3fffde, 22 ), + new HuffmanTableEntry( 0xfffff0, 24 ), + new HuffmanTableEntry( 0x1fffdf, 21 ), + new HuffmanTableEntry( 0x3fffdf, 22 ), + new HuffmanTableEntry( 0x7fffeb, 23 ), + new HuffmanTableEntry( 0x7fffec, 23 ), + new HuffmanTableEntry( 0x1fffe0, 21 ), + new HuffmanTableEntry( 0x1fffe1, 21 ), + new HuffmanTableEntry( 0x3fffe0, 22 ), + new HuffmanTableEntry( 0x1fffe2, 21 ), + new HuffmanTableEntry( 0x7fffed, 23 ), + new HuffmanTableEntry( 0x3fffe1, 22 ), + new HuffmanTableEntry( 0x7fffee, 23 ), + new HuffmanTableEntry( 0x7fffef, 23 ), + new HuffmanTableEntry( 0xfffea , 20 ), + new HuffmanTableEntry( 0x3fffe2, 22 ), + new HuffmanTableEntry( 0x3fffe3, 22 ), + new HuffmanTableEntry( 0x3fffe4, 22 ), + new HuffmanTableEntry( 0x7ffff0, 23 ), + new HuffmanTableEntry( 0x3fffe5, 22 ), + new HuffmanTableEntry( 0x3fffe6, 22 ), + new HuffmanTableEntry( 0x7ffff1, 23 ), + new HuffmanTableEntry( 0x3ffffe0, 26 ), + new HuffmanTableEntry( 0x3ffffe1, 26 ), + new HuffmanTableEntry( 0xfffeb , 20 ), + new HuffmanTableEntry( 0x7fff1 , 19 ), + new HuffmanTableEntry( 0x3fffe7, 22 ), + new HuffmanTableEntry( 0x7ffff2, 23 ), + new HuffmanTableEntry( 0x3fffe8, 22 ), + new HuffmanTableEntry( 0x1ffffec, 25 ), + new HuffmanTableEntry( 0x3ffffe2, 26 ), + new HuffmanTableEntry( 0x3ffffe3, 26 ), + new HuffmanTableEntry( 0x3ffffe4, 26 ), + new HuffmanTableEntry( 0x7ffffde, 27 ), + new HuffmanTableEntry( 0x7ffffdf, 27 ), + new HuffmanTableEntry( 0x3ffffe5, 26 ), + new HuffmanTableEntry( 0xfffff1 , 24 ), + new HuffmanTableEntry( 0x1ffffed, 25 ), + new HuffmanTableEntry( 0x7fff2 , 19 ), + new HuffmanTableEntry( 0x1fffe3 , 21 ), + new HuffmanTableEntry( 0x3ffffe6, 26 ), + new HuffmanTableEntry( 0x7ffffe0, 27 ), + new HuffmanTableEntry( 0x7ffffe1, 27 ), + new HuffmanTableEntry( 0x3ffffe7, 26 ), + new HuffmanTableEntry( 0x7ffffe2, 27 ), + new HuffmanTableEntry( 0xfffff2 , 24 ), + new HuffmanTableEntry( 0x1fffe4 , 21 ), + new HuffmanTableEntry( 0x1fffe5 , 21 ), + new HuffmanTableEntry( 0x3ffffe8, 26 ), + new HuffmanTableEntry( 0x3ffffe9, 26 ), + new HuffmanTableEntry( 0xffffffd, 28 ), + new HuffmanTableEntry( 0x7ffffe3, 27 ), + new HuffmanTableEntry( 0x7ffffe4, 27 ), + new HuffmanTableEntry( 0x7ffffe5, 27 ), + new HuffmanTableEntry( 0xfffec , 20 ), + new HuffmanTableEntry( 0xfffff3, 24 ), + new HuffmanTableEntry( 0xfffed , 20 ), + new HuffmanTableEntry( 0x1fffe6, 21 ), + new HuffmanTableEntry( 0x3fffe9, 22 ), + new HuffmanTableEntry( 0x1fffe7, 21 ), + new HuffmanTableEntry( 0x1fffe8, 21 ), + new HuffmanTableEntry( 0x7ffff3, 23 ), + new HuffmanTableEntry( 0x3fffea, 22 ), + new HuffmanTableEntry( 0x3fffeb, 22 ), + new HuffmanTableEntry( 0x1ffffee, 25 ), + new HuffmanTableEntry( 0x1ffffef, 25 ), + new HuffmanTableEntry( 0xfffff4 , 24 ), + new HuffmanTableEntry( 0xfffff5 , 24 ), + new HuffmanTableEntry( 0x3ffffea, 26 ), + new HuffmanTableEntry( 0x7ffff4 , 23 ), + new HuffmanTableEntry( 0x3ffffeb, 26 ), + new HuffmanTableEntry( 0x7ffffe6, 27 ), + new HuffmanTableEntry( 0x3ffffec, 26 ), + new HuffmanTableEntry( 0x3ffffed, 26 ), + new HuffmanTableEntry( 0x7ffffe7, 27 ), + new HuffmanTableEntry( 0x7ffffe8, 27 ), + new HuffmanTableEntry( 0x7ffffe9, 27 ), + new HuffmanTableEntry( 0x7ffffea, 27 ), + new HuffmanTableEntry( 0x7ffffeb, 27 ), + new HuffmanTableEntry( 0xffffffe, 28 ), + new HuffmanTableEntry( 0x7ffffec, 27 ), + new HuffmanTableEntry( 0x7ffffed, 27 ), + new HuffmanTableEntry( 0x7ffffee, 27 ), + new HuffmanTableEntry( 0x7ffffef, 27 ), + new HuffmanTableEntry( 0x7fffff0, 27 ), + new HuffmanTableEntry( 0x3ffffee, 26 ), + new HuffmanTableEntry( 0x3fffffff, 30 ) + }; + //static List entries = new List(); + + static readonly HuffmanTreeNode[] HuffmanTree = new HuffmanTreeNode[] + { + new HuffmanTreeNode ( 0, 98, 1 ), + new HuffmanTreeNode ( 0, 151, 2 ), + new HuffmanTreeNode ( 0, 173, 3 ), + new HuffmanTreeNode ( 0, 204, 4 ), + new HuffmanTreeNode ( 0, 263, 5 ), + new HuffmanTreeNode ( 0, 113, 6 ), + new HuffmanTreeNode ( 0, 211, 7 ), + new HuffmanTreeNode ( 0, 104, 8 ), + new HuffmanTreeNode ( 0, 116, 9 ), + new HuffmanTreeNode ( 0, 108, 10 ), + new HuffmanTreeNode ( 0, 11, 14 ), + new HuffmanTreeNode ( 0, 12, 166 ), + new HuffmanTreeNode ( 0, 13, 111 ), + new HuffmanTreeNode ( 0, 0, 0 ), + new HuffmanTreeNode ( 0, 220, 15 ), + new HuffmanTreeNode ( 0, 222, 16 ), + new HuffmanTreeNode ( 0, 158, 17 ), + new HuffmanTreeNode ( 0, 270, 18 ), + new HuffmanTreeNode ( 0, 216, 19 ), + new HuffmanTreeNode ( 0, 279, 20 ), + new HuffmanTreeNode ( 0, 21, 27 ), + new HuffmanTreeNode ( 0, 377, 22 ), + new HuffmanTreeNode ( 0, 414, 23 ), + new HuffmanTreeNode ( 0, 24, 301 ), + new HuffmanTreeNode ( 0, 25, 298 ), + new HuffmanTreeNode ( 0, 26, 295 ), + new HuffmanTreeNode ( 1, 0, 0 ), + new HuffmanTreeNode ( 0, 314, 28 ), + new HuffmanTreeNode ( 0, 50, 29 ), + new HuffmanTreeNode ( 0, 362, 30 ), + new HuffmanTreeNode ( 0, 403, 31 ), + new HuffmanTreeNode ( 0, 440, 32 ), + new HuffmanTreeNode ( 0, 33, 55 ), + new HuffmanTreeNode ( 0, 34, 46 ), + new HuffmanTreeNode ( 0, 35, 39 ), + new HuffmanTreeNode ( 0, 510, 36 ), + new HuffmanTreeNode ( 0, 37, 38 ), + new HuffmanTreeNode ( 2, 0, 0 ), + new HuffmanTreeNode ( 3, 0, 0 ), + new HuffmanTreeNode ( 0, 40, 43 ), + new HuffmanTreeNode ( 0, 41, 42 ), + new HuffmanTreeNode ( 4, 0, 0 ), + new HuffmanTreeNode ( 5, 0, 0 ), + new HuffmanTreeNode ( 0, 44, 45 ), + new HuffmanTreeNode ( 6, 0, 0 ), + new HuffmanTreeNode ( 7, 0, 0 ), + new HuffmanTreeNode ( 0, 47, 67 ), + new HuffmanTreeNode ( 0, 48, 63 ), + new HuffmanTreeNode ( 0, 49, 62 ), + new HuffmanTreeNode ( 8, 0, 0 ), + new HuffmanTreeNode ( 0, 396, 51 ), + new HuffmanTreeNode ( 0, 52, 309 ), + new HuffmanTreeNode ( 0, 486, 53 ), + new HuffmanTreeNode ( 0, 54, 307 ), + new HuffmanTreeNode ( 9, 0, 0 ), + new HuffmanTreeNode ( 0, 74, 56 ), + new HuffmanTreeNode ( 0, 91, 57 ), + new HuffmanTreeNode ( 0, 274, 58 ), + new HuffmanTreeNode ( 0, 502, 59 ), + new HuffmanTreeNode ( 0, 60, 81 ), + new HuffmanTreeNode ( 0, 61, 65 ), + new HuffmanTreeNode ( 10, 0, 0 ), + new HuffmanTreeNode ( 11, 0, 0 ), + new HuffmanTreeNode ( 0, 64, 66 ), + new HuffmanTreeNode ( 12, 0, 0 ), + new HuffmanTreeNode ( 13, 0, 0 ), + new HuffmanTreeNode ( 14, 0, 0 ), + new HuffmanTreeNode ( 0, 68, 71 ), + new HuffmanTreeNode ( 0, 69, 70 ), + new HuffmanTreeNode ( 15, 0, 0 ), + new HuffmanTreeNode ( 16, 0, 0 ), + new HuffmanTreeNode ( 0, 72, 73 ), + new HuffmanTreeNode ( 17, 0, 0 ), + new HuffmanTreeNode ( 18, 0, 0 ), + new HuffmanTreeNode ( 0, 75, 84 ), + new HuffmanTreeNode ( 0, 76, 79 ), + new HuffmanTreeNode ( 0, 77, 78 ), + new HuffmanTreeNode ( 19, 0, 0 ), + new HuffmanTreeNode ( 20, 0, 0 ), + new HuffmanTreeNode ( 0, 80, 83 ), + new HuffmanTreeNode ( 21, 0, 0 ), + new HuffmanTreeNode ( 0, 82, 512 ), + new HuffmanTreeNode ( 22, 0, 0 ), + new HuffmanTreeNode ( 23, 0, 0 ), + new HuffmanTreeNode ( 0, 85, 88 ), + new HuffmanTreeNode ( 0, 86, 87 ), + new HuffmanTreeNode ( 24, 0, 0 ), + new HuffmanTreeNode ( 25, 0, 0 ), + new HuffmanTreeNode ( 0, 89, 90 ), + new HuffmanTreeNode ( 26, 0, 0 ), + new HuffmanTreeNode ( 27, 0, 0 ), + new HuffmanTreeNode ( 0, 92, 95 ), + new HuffmanTreeNode ( 0, 93, 94 ), + new HuffmanTreeNode ( 28, 0, 0 ), + new HuffmanTreeNode ( 29, 0, 0 ), + new HuffmanTreeNode ( 0, 96, 97 ), + new HuffmanTreeNode ( 30, 0, 0 ), + new HuffmanTreeNode ( 31, 0, 0 ), + new HuffmanTreeNode ( 0, 133, 99 ), + new HuffmanTreeNode ( 0, 100, 129 ), + new HuffmanTreeNode ( 0, 258, 101 ), + new HuffmanTreeNode ( 0, 102, 126 ), + new HuffmanTreeNode ( 0, 103, 112 ), + new HuffmanTreeNode ( 32, 0, 0 ), + new HuffmanTreeNode ( 0, 105, 119 ), + new HuffmanTreeNode ( 0, 106, 107 ), + new HuffmanTreeNode ( 33, 0, 0 ), + new HuffmanTreeNode ( 34, 0, 0 ), + new HuffmanTreeNode ( 0, 271, 109 ), + new HuffmanTreeNode ( 0, 110, 164 ), + new HuffmanTreeNode ( 35, 0, 0 ), + new HuffmanTreeNode ( 36, 0, 0 ), + new HuffmanTreeNode ( 37, 0, 0 ), + new HuffmanTreeNode ( 0, 114, 124 ), + new HuffmanTreeNode ( 0, 115, 122 ), + new HuffmanTreeNode ( 38, 0, 0 ), + new HuffmanTreeNode ( 0, 165, 117 ), + new HuffmanTreeNode ( 0, 118, 123 ), + new HuffmanTreeNode ( 39, 0, 0 ), + new HuffmanTreeNode ( 0, 120, 121 ), + new HuffmanTreeNode ( 40, 0, 0 ), + new HuffmanTreeNode ( 41, 0, 0 ), + new HuffmanTreeNode ( 42, 0, 0 ), + new HuffmanTreeNode ( 43, 0, 0 ), + new HuffmanTreeNode ( 0, 125, 157 ), + new HuffmanTreeNode ( 44, 0, 0 ), + new HuffmanTreeNode ( 0, 127, 128 ), + new HuffmanTreeNode ( 45, 0, 0 ), + new HuffmanTreeNode ( 46, 0, 0 ), + new HuffmanTreeNode ( 0, 130, 144 ), + new HuffmanTreeNode ( 0, 131, 141 ), + new HuffmanTreeNode ( 0, 132, 140 ), + new HuffmanTreeNode ( 47, 0, 0 ), + new HuffmanTreeNode ( 0, 134, 229 ), + new HuffmanTreeNode ( 0, 135, 138 ), + new HuffmanTreeNode ( 0, 136, 137 ), + new HuffmanTreeNode ( 48, 0, 0 ), + new HuffmanTreeNode ( 49, 0, 0 ), + new HuffmanTreeNode ( 0, 139, 227 ), + new HuffmanTreeNode ( 50, 0, 0 ), + new HuffmanTreeNode ( 51, 0, 0 ), + new HuffmanTreeNode ( 0, 142, 143 ), + new HuffmanTreeNode ( 52, 0, 0 ), + new HuffmanTreeNode ( 53, 0, 0 ), + new HuffmanTreeNode ( 0, 145, 148 ), + new HuffmanTreeNode ( 0, 146, 147 ), + new HuffmanTreeNode ( 54, 0, 0 ), + new HuffmanTreeNode ( 55, 0, 0 ), + new HuffmanTreeNode ( 0, 149, 150 ), + new HuffmanTreeNode ( 56, 0, 0 ), + new HuffmanTreeNode ( 57, 0, 0 ), + new HuffmanTreeNode ( 0, 160, 152 ), + new HuffmanTreeNode ( 0, 246, 153 ), + new HuffmanTreeNode ( 0, 256, 154 ), + new HuffmanTreeNode ( 0, 155, 170 ), + new HuffmanTreeNode ( 0, 156, 169 ), + new HuffmanTreeNode ( 58, 0, 0 ), + new HuffmanTreeNode ( 59, 0, 0 ), + new HuffmanTreeNode ( 0, 159, 226 ), + new HuffmanTreeNode ( 60, 0, 0 ), + new HuffmanTreeNode ( 0, 161, 232 ), + new HuffmanTreeNode ( 0, 162, 224 ), + new HuffmanTreeNode ( 0, 163, 168 ), + new HuffmanTreeNode ( 61, 0, 0 ), + new HuffmanTreeNode ( 62, 0, 0 ), + new HuffmanTreeNode ( 63, 0, 0 ), + new HuffmanTreeNode ( 0, 167, 215 ), + new HuffmanTreeNode ( 64, 0, 0 ), + new HuffmanTreeNode ( 65, 0, 0 ), + new HuffmanTreeNode ( 66, 0, 0 ), + new HuffmanTreeNode ( 0, 171, 172 ), + new HuffmanTreeNode ( 67, 0, 0 ), + new HuffmanTreeNode ( 68, 0, 0 ), + new HuffmanTreeNode ( 0, 174, 189 ), + new HuffmanTreeNode ( 0, 175, 182 ), + new HuffmanTreeNode ( 0, 176, 179 ), + new HuffmanTreeNode ( 0, 177, 178 ), + new HuffmanTreeNode ( 69, 0, 0 ), + new HuffmanTreeNode ( 70, 0, 0 ), + new HuffmanTreeNode ( 0, 180, 181 ), + new HuffmanTreeNode ( 71, 0, 0 ), + new HuffmanTreeNode ( 72, 0, 0 ), + new HuffmanTreeNode ( 0, 183, 186 ), + new HuffmanTreeNode ( 0, 184, 185 ), + new HuffmanTreeNode ( 73, 0, 0 ), + new HuffmanTreeNode ( 74, 0, 0 ), + new HuffmanTreeNode ( 0, 187, 188 ), + new HuffmanTreeNode ( 75, 0, 0 ), + new HuffmanTreeNode ( 76, 0, 0 ), + new HuffmanTreeNode ( 0, 190, 197 ), + new HuffmanTreeNode ( 0, 191, 194 ), + new HuffmanTreeNode ( 0, 192, 193 ), + new HuffmanTreeNode ( 77, 0, 0 ), + new HuffmanTreeNode ( 78, 0, 0 ), + new HuffmanTreeNode ( 0, 195, 196 ), + new HuffmanTreeNode ( 79, 0, 0 ), + new HuffmanTreeNode ( 80, 0, 0 ), + new HuffmanTreeNode ( 0, 198, 201 ), + new HuffmanTreeNode ( 0, 199, 200 ), + new HuffmanTreeNode ( 81, 0, 0 ), + new HuffmanTreeNode ( 82, 0, 0 ), + new HuffmanTreeNode ( 0, 202, 203 ), + new HuffmanTreeNode ( 83, 0, 0 ), + new HuffmanTreeNode ( 84, 0, 0 ), + new HuffmanTreeNode ( 0, 205, 242 ), + new HuffmanTreeNode ( 0, 206, 209 ), + new HuffmanTreeNode ( 0, 207, 208 ), + new HuffmanTreeNode ( 85, 0, 0 ), + new HuffmanTreeNode ( 86, 0, 0 ), + new HuffmanTreeNode ( 0, 210, 213 ), + new HuffmanTreeNode ( 87, 0, 0 ), + new HuffmanTreeNode ( 0, 212, 214 ), + new HuffmanTreeNode ( 88, 0, 0 ), + new HuffmanTreeNode ( 89, 0, 0 ), + new HuffmanTreeNode ( 90, 0, 0 ), + new HuffmanTreeNode ( 91, 0, 0 ), + new HuffmanTreeNode ( 0, 217, 286 ), + new HuffmanTreeNode ( 0, 218, 276 ), + new HuffmanTreeNode ( 0, 219, 410 ), + new HuffmanTreeNode ( 92, 0, 0 ), + new HuffmanTreeNode ( 0, 221, 273 ), + new HuffmanTreeNode ( 93, 0, 0 ), + new HuffmanTreeNode ( 0, 223, 272 ), + new HuffmanTreeNode ( 94, 0, 0 ), + new HuffmanTreeNode ( 0, 225, 228 ), + new HuffmanTreeNode ( 95, 0, 0 ), + new HuffmanTreeNode ( 96, 0, 0 ), + new HuffmanTreeNode ( 97, 0, 0 ), + new HuffmanTreeNode ( 98, 0, 0 ), + new HuffmanTreeNode ( 0, 230, 240 ), + new HuffmanTreeNode ( 0, 231, 235 ), + new HuffmanTreeNode ( 99, 0, 0 ), + new HuffmanTreeNode ( 0, 233, 237 ), + new HuffmanTreeNode ( 0, 234, 236 ), + new HuffmanTreeNode ( 100, 0, 0 ), + new HuffmanTreeNode ( 101, 0, 0 ), + new HuffmanTreeNode ( 102, 0, 0 ), + new HuffmanTreeNode ( 0, 238, 239 ), + new HuffmanTreeNode ( 103, 0, 0 ), + new HuffmanTreeNode ( 104, 0, 0 ), + new HuffmanTreeNode ( 0, 241, 252 ), + new HuffmanTreeNode ( 105, 0, 0 ), + new HuffmanTreeNode ( 0, 243, 254 ), + new HuffmanTreeNode ( 0, 244, 245 ), + new HuffmanTreeNode ( 106, 0, 0 ), + new HuffmanTreeNode ( 107, 0, 0 ), + new HuffmanTreeNode ( 0, 247, 250 ), + new HuffmanTreeNode ( 0, 248, 249 ), + new HuffmanTreeNode ( 108, 0, 0 ), + new HuffmanTreeNode ( 109, 0, 0 ), + new HuffmanTreeNode ( 0, 251, 253 ), + new HuffmanTreeNode ( 110, 0, 0 ), + new HuffmanTreeNode ( 111, 0, 0 ), + new HuffmanTreeNode ( 112, 0, 0 ), + new HuffmanTreeNode ( 0, 255, 262 ), + new HuffmanTreeNode ( 113, 0, 0 ), + new HuffmanTreeNode ( 0, 257, 261 ), + new HuffmanTreeNode ( 114, 0, 0 ), + new HuffmanTreeNode ( 0, 259, 260 ), + new HuffmanTreeNode ( 115, 0, 0 ), + new HuffmanTreeNode ( 116, 0, 0 ), + new HuffmanTreeNode ( 117, 0, 0 ), + new HuffmanTreeNode ( 118, 0, 0 ), + new HuffmanTreeNode ( 0, 264, 267 ), + new HuffmanTreeNode ( 0, 265, 266 ), + new HuffmanTreeNode ( 119, 0, 0 ), + new HuffmanTreeNode ( 120, 0, 0 ), + new HuffmanTreeNode ( 0, 268, 269 ), + new HuffmanTreeNode ( 121, 0, 0 ), + new HuffmanTreeNode ( 122, 0, 0 ), + new HuffmanTreeNode ( 123, 0, 0 ), + new HuffmanTreeNode ( 124, 0, 0 ), + new HuffmanTreeNode ( 125, 0, 0 ), + new HuffmanTreeNode ( 126, 0, 0 ), + new HuffmanTreeNode ( 0, 275, 459 ), + new HuffmanTreeNode ( 127, 0, 0 ), + new HuffmanTreeNode ( 0, 436, 277 ), + new HuffmanTreeNode ( 0, 278, 285 ), + new HuffmanTreeNode ( 128, 0, 0 ), + new HuffmanTreeNode ( 0, 372, 280 ), + new HuffmanTreeNode ( 0, 281, 332 ), + new HuffmanTreeNode ( 0, 282, 291 ), + new HuffmanTreeNode ( 0, 473, 283 ), + new HuffmanTreeNode ( 0, 284, 290 ), + new HuffmanTreeNode ( 129, 0, 0 ), + new HuffmanTreeNode ( 130, 0, 0 ), + new HuffmanTreeNode ( 0, 287, 328 ), + new HuffmanTreeNode ( 0, 288, 388 ), + new HuffmanTreeNode ( 0, 289, 345 ), + new HuffmanTreeNode ( 131, 0, 0 ), + new HuffmanTreeNode ( 132, 0, 0 ), + new HuffmanTreeNode ( 0, 292, 296 ), + new HuffmanTreeNode ( 0, 293, 294 ), + new HuffmanTreeNode ( 133, 0, 0 ), + new HuffmanTreeNode ( 134, 0, 0 ), + new HuffmanTreeNode ( 135, 0, 0 ), + new HuffmanTreeNode ( 0, 297, 313 ), + new HuffmanTreeNode ( 136, 0, 0 ), + new HuffmanTreeNode ( 0, 299, 300 ), + new HuffmanTreeNode ( 137, 0, 0 ), + new HuffmanTreeNode ( 138, 0, 0 ), + new HuffmanTreeNode ( 0, 302, 305 ), + new HuffmanTreeNode ( 0, 303, 304 ), + new HuffmanTreeNode ( 139, 0, 0 ), + new HuffmanTreeNode ( 140, 0, 0 ), + new HuffmanTreeNode ( 0, 306, 308 ), + new HuffmanTreeNode ( 141, 0, 0 ), + new HuffmanTreeNode ( 142, 0, 0 ), + new HuffmanTreeNode ( 143, 0, 0 ), + new HuffmanTreeNode ( 0, 310, 319 ), + new HuffmanTreeNode ( 0, 311, 312 ), + new HuffmanTreeNode ( 144, 0, 0 ), + new HuffmanTreeNode ( 145, 0, 0 ), + new HuffmanTreeNode ( 146, 0, 0 ), + new HuffmanTreeNode ( 0, 315, 350 ), + new HuffmanTreeNode ( 0, 316, 325 ), + new HuffmanTreeNode ( 0, 317, 322 ), + new HuffmanTreeNode ( 0, 318, 321 ), + new HuffmanTreeNode ( 147, 0, 0 ), + new HuffmanTreeNode ( 0, 320, 341 ), + new HuffmanTreeNode ( 148, 0, 0 ), + new HuffmanTreeNode ( 149, 0, 0 ), + new HuffmanTreeNode ( 0, 323, 324 ), + new HuffmanTreeNode ( 150, 0, 0 ), + new HuffmanTreeNode ( 151, 0, 0 ), + new HuffmanTreeNode ( 0, 326, 338 ), + new HuffmanTreeNode ( 0, 327, 336 ), + new HuffmanTreeNode ( 152, 0, 0 ), + new HuffmanTreeNode ( 0, 465, 329 ), + new HuffmanTreeNode ( 0, 330, 355 ), + new HuffmanTreeNode ( 0, 331, 344 ), + new HuffmanTreeNode ( 153, 0, 0 ), + new HuffmanTreeNode ( 0, 333, 347 ), + new HuffmanTreeNode ( 0, 334, 342 ), + new HuffmanTreeNode ( 0, 335, 337 ), + new HuffmanTreeNode ( 154, 0, 0 ), + new HuffmanTreeNode ( 155, 0, 0 ), + new HuffmanTreeNode ( 156, 0, 0 ), + new HuffmanTreeNode ( 0, 339, 340 ), + new HuffmanTreeNode ( 157, 0, 0 ), + new HuffmanTreeNode ( 158, 0, 0 ), + new HuffmanTreeNode ( 159, 0, 0 ), + new HuffmanTreeNode ( 0, 343, 346 ), + new HuffmanTreeNode ( 160, 0, 0 ), + new HuffmanTreeNode ( 161, 0, 0 ), + new HuffmanTreeNode ( 162, 0, 0 ), + new HuffmanTreeNode ( 163, 0, 0 ), + new HuffmanTreeNode ( 0, 348, 360 ), + new HuffmanTreeNode ( 0, 349, 359 ), + new HuffmanTreeNode ( 164, 0, 0 ), + new HuffmanTreeNode ( 0, 351, 369 ), + new HuffmanTreeNode ( 0, 352, 357 ), + new HuffmanTreeNode ( 0, 353, 354 ), + new HuffmanTreeNode ( 165, 0, 0 ), + new HuffmanTreeNode ( 166, 0, 0 ), + new HuffmanTreeNode ( 0, 356, 366 ), + new HuffmanTreeNode ( 167, 0, 0 ), + new HuffmanTreeNode ( 0, 358, 368 ), + new HuffmanTreeNode ( 168, 0, 0 ), + new HuffmanTreeNode ( 169, 0, 0 ), + new HuffmanTreeNode ( 0, 361, 367 ), + new HuffmanTreeNode ( 170, 0, 0 ), + new HuffmanTreeNode ( 0, 363, 417 ), + new HuffmanTreeNode ( 0, 364, 449 ), + new HuffmanTreeNode ( 0, 365, 434 ), + new HuffmanTreeNode ( 171, 0, 0 ), + new HuffmanTreeNode ( 172, 0, 0 ), + new HuffmanTreeNode ( 173, 0, 0 ), + new HuffmanTreeNode ( 174, 0, 0 ), + new HuffmanTreeNode ( 0, 370, 385 ), + new HuffmanTreeNode ( 0, 371, 383 ), + new HuffmanTreeNode ( 175, 0, 0 ), + new HuffmanTreeNode ( 0, 373, 451 ), + new HuffmanTreeNode ( 0, 374, 381 ), + new HuffmanTreeNode ( 0, 375, 376 ), + new HuffmanTreeNode ( 176, 0, 0 ), + new HuffmanTreeNode ( 177, 0, 0 ), + new HuffmanTreeNode ( 0, 378, 393 ), + new HuffmanTreeNode ( 0, 379, 390 ), + new HuffmanTreeNode ( 0, 380, 384 ), + new HuffmanTreeNode ( 178, 0, 0 ), + new HuffmanTreeNode ( 0, 382, 437 ), + new HuffmanTreeNode ( 179, 0, 0 ), + new HuffmanTreeNode ( 180, 0, 0 ), + new HuffmanTreeNode ( 181, 0, 0 ), + new HuffmanTreeNode ( 0, 386, 387 ), + new HuffmanTreeNode ( 182, 0, 0 ), + new HuffmanTreeNode ( 183, 0, 0 ), + new HuffmanTreeNode ( 0, 389, 409 ), + new HuffmanTreeNode ( 184, 0, 0 ), + new HuffmanTreeNode ( 0, 391, 392 ), + new HuffmanTreeNode ( 185, 0, 0 ), + new HuffmanTreeNode ( 186, 0, 0 ), + new HuffmanTreeNode ( 0, 394, 400 ), + new HuffmanTreeNode ( 0, 395, 399 ), + new HuffmanTreeNode ( 187, 0, 0 ), + new HuffmanTreeNode ( 0, 397, 412 ), + new HuffmanTreeNode ( 0, 398, 402 ), + new HuffmanTreeNode ( 188, 0, 0 ), + new HuffmanTreeNode ( 189, 0, 0 ), + new HuffmanTreeNode ( 0, 401, 411 ), + new HuffmanTreeNode ( 190, 0, 0 ), + new HuffmanTreeNode ( 191, 0, 0 ), + new HuffmanTreeNode ( 0, 404, 427 ), + new HuffmanTreeNode ( 0, 405, 424 ), + new HuffmanTreeNode ( 0, 406, 421 ), + new HuffmanTreeNode ( 0, 407, 408 ), + new HuffmanTreeNode ( 192, 0, 0 ), + new HuffmanTreeNode ( 193, 0, 0 ), + new HuffmanTreeNode ( 194, 0, 0 ), + new HuffmanTreeNode ( 195, 0, 0 ), + new HuffmanTreeNode ( 196, 0, 0 ), + new HuffmanTreeNode ( 0, 413, 474 ), + new HuffmanTreeNode ( 197, 0, 0 ), + new HuffmanTreeNode ( 0, 415, 475 ), + new HuffmanTreeNode ( 0, 416, 471 ), + new HuffmanTreeNode ( 198, 0, 0 ), + new HuffmanTreeNode ( 0, 481, 418 ), + new HuffmanTreeNode ( 0, 419, 478 ), + new HuffmanTreeNode ( 0, 420, 435 ), + new HuffmanTreeNode ( 199, 0, 0 ), + new HuffmanTreeNode ( 0, 422, 423 ), + new HuffmanTreeNode ( 200, 0, 0 ), + new HuffmanTreeNode ( 201, 0, 0 ), + new HuffmanTreeNode ( 0, 425, 438 ), + new HuffmanTreeNode ( 0, 426, 433 ), + new HuffmanTreeNode ( 202, 0, 0 ), + new HuffmanTreeNode ( 0, 455, 428 ), + new HuffmanTreeNode ( 0, 490, 429 ), + new HuffmanTreeNode ( 0, 511, 430 ), + new HuffmanTreeNode ( 0, 431, 432 ), + new HuffmanTreeNode ( 203, 0, 0 ), + new HuffmanTreeNode ( 204, 0, 0 ), + new HuffmanTreeNode ( 205, 0, 0 ), + new HuffmanTreeNode ( 206, 0, 0 ), + new HuffmanTreeNode ( 207, 0, 0 ), + new HuffmanTreeNode ( 208, 0, 0 ), + new HuffmanTreeNode ( 209, 0, 0 ), + new HuffmanTreeNode ( 0, 439, 446 ), + new HuffmanTreeNode ( 210, 0, 0 ), + new HuffmanTreeNode ( 0, 441, 494 ), + new HuffmanTreeNode ( 0, 442, 461 ), + new HuffmanTreeNode ( 0, 443, 447 ), + new HuffmanTreeNode ( 0, 444, 445 ), + new HuffmanTreeNode ( 211, 0, 0 ), + new HuffmanTreeNode ( 212, 0, 0 ), + new HuffmanTreeNode ( 213, 0, 0 ), + new HuffmanTreeNode ( 0, 448, 460 ), + new HuffmanTreeNode ( 214, 0, 0 ), + new HuffmanTreeNode ( 0, 450, 467 ), + new HuffmanTreeNode ( 215, 0, 0 ), + new HuffmanTreeNode ( 0, 452, 469 ), + new HuffmanTreeNode ( 0, 453, 454 ), + new HuffmanTreeNode ( 216, 0, 0 ), + new HuffmanTreeNode ( 217, 0, 0 ), + new HuffmanTreeNode ( 0, 456, 484 ), + new HuffmanTreeNode ( 0, 457, 458 ), + new HuffmanTreeNode ( 218, 0, 0 ), + new HuffmanTreeNode ( 219, 0, 0 ), + new HuffmanTreeNode ( 220, 0, 0 ), + new HuffmanTreeNode ( 221, 0, 0 ), + new HuffmanTreeNode ( 0, 462, 488 ), + new HuffmanTreeNode ( 0, 463, 464 ), + new HuffmanTreeNode ( 222, 0, 0 ), + new HuffmanTreeNode ( 223, 0, 0 ), + new HuffmanTreeNode ( 0, 466, 468 ), + new HuffmanTreeNode ( 224, 0, 0 ), + new HuffmanTreeNode ( 225, 0, 0 ), + new HuffmanTreeNode ( 226, 0, 0 ), + new HuffmanTreeNode ( 0, 470, 472 ), + new HuffmanTreeNode ( 227, 0, 0 ), + new HuffmanTreeNode ( 228, 0, 0 ), + new HuffmanTreeNode ( 229, 0, 0 ), + new HuffmanTreeNode ( 230, 0, 0 ), + new HuffmanTreeNode ( 231, 0, 0 ), + new HuffmanTreeNode ( 0, 476, 477 ), + new HuffmanTreeNode ( 232, 0, 0 ), + new HuffmanTreeNode ( 233, 0, 0 ), + new HuffmanTreeNode ( 0, 479, 480 ), + new HuffmanTreeNode ( 234, 0, 0 ), + new HuffmanTreeNode ( 235, 0, 0 ), + new HuffmanTreeNode ( 0, 482, 483 ), + new HuffmanTreeNode ( 236, 0, 0 ), + new HuffmanTreeNode ( 237, 0, 0 ), + new HuffmanTreeNode ( 0, 485, 487 ), + new HuffmanTreeNode ( 238, 0, 0 ), + new HuffmanTreeNode ( 239, 0, 0 ), + new HuffmanTreeNode ( 240, 0, 0 ), + new HuffmanTreeNode ( 0, 489, 493 ), + new HuffmanTreeNode ( 241, 0, 0 ), + new HuffmanTreeNode ( 0, 491, 492 ), + new HuffmanTreeNode ( 242, 0, 0 ), + new HuffmanTreeNode ( 243, 0, 0 ), + new HuffmanTreeNode ( 244, 0, 0 ), + new HuffmanTreeNode ( 0, 495, 503 ), + new HuffmanTreeNode ( 0, 496, 499 ), + new HuffmanTreeNode ( 0, 497, 498 ), + new HuffmanTreeNode ( 245, 0, 0 ), + new HuffmanTreeNode ( 246, 0, 0 ), + new HuffmanTreeNode ( 0, 500, 501 ), + new HuffmanTreeNode ( 247, 0, 0 ), + new HuffmanTreeNode ( 248, 0, 0 ), + new HuffmanTreeNode ( 249, 0, 0 ), + new HuffmanTreeNode ( 0, 504, 507 ), + new HuffmanTreeNode ( 0, 505, 506 ), + new HuffmanTreeNode ( 250, 0, 0 ), + new HuffmanTreeNode ( 251, 0, 0 ), + new HuffmanTreeNode ( 0, 508, 509 ), + new HuffmanTreeNode ( 252, 0, 0 ), + new HuffmanTreeNode ( 253, 0, 0 ), + new HuffmanTreeNode ( 254, 0, 0 ), + new HuffmanTreeNode ( 255, 0, 0 ), + new HuffmanTreeNode ( 256, 0, 0 ) + }; + + //static HuffmanEncoder() + //{ + // BuildTree(); + //} + // + //private static void BuildTree() + //{ + // // Add root + // entries.Add(new TreeNode()); + // + // for (int i = 0; i < StaticTable.Length; ++i) + // { + // var tableEntry = StaticTable[i]; + // var currentNode = entries[0]; + // int currentNodeIdx = 0; + // + // for (byte bitIdx = 1; bitIdx <= tableEntry.Bits; bitIdx++) + // { + // byte bit = tableEntry.GetBitAtIdx(bitIdx); + // + // switch(bit) + // { + // case 0: + // if (currentNode.NextZeroIdx == 0) + // { + // currentNode.NextZeroIdx = (UInt16)entries.Count; + // entries[currentNodeIdx] = currentNode; + // entries.Add(new TreeNode()); + // } + // + // currentNodeIdx = currentNode.NextZeroIdx; + // currentNode = entries[currentNodeIdx]; + // break; + // + // case 1: + // if (currentNode.NextOneIdx == 0) + // { + // currentNode.NextOneIdx = (UInt16)entries.Count; + // entries[currentNodeIdx] = currentNode; + // entries.Add(new TreeNode()); + // } + // + // currentNodeIdx = currentNode.NextOneIdx; + // currentNode = entries[currentNodeIdx]; + // break; + // + // default: + // HTTPManager.Logger.Information("HuffmanEncoder", "BuildTree - GetBitAtIdx returned with an unsupported value: " + bit); + // break; + // } + // } + // + // entries[currentNodeIdx] = new TreeNode { Value = (UInt16)i }; + // + // //HTTPManager.Logger.Information("HuffmanEncoder", string.Format("BuildTree - {0} - Entry({1}) added to idx: {2}", i, entries[currentNodeIdx], currentNodeIdx)); + // } + // + // //HTTPManager.Logger.Information("HuffmanEncoder", "BuildTree - entries: " + entries.Count); + // //for (int i = 0; i < entries.Count; ++i) + // // HTTPManager.Logger.Information("HuffmanEncoder", string.Format("{0} - Entry : {1}", i, entries[i])); + // System.Text.StringBuilder sb = new System.Text.StringBuilder(); + // for (int i = 0; i < entries.Count; ++i) + // { + // sb.AppendFormat("new TreeNode {{ Value = {0}, NextZeroIdx = {1}, NextOneIdx = {2} }},\n", entries[i].Value, entries[i].NextZeroIdx, entries[i].NextOneIdx); + // } + // UnityEngine.Debug.Log(sb.ToString()); + //} + + public static HuffmanTreeNode GetRoot() + { + return HuffmanTree[0]; + } + + public static HuffmanTreeNode GetNext(HuffmanTreeNode current, byte bit) + { + switch(bit) + { + case 0: + return HuffmanTree[current.NextZeroIdx]; + case 1: + return HuffmanTree[current.NextOneIdx]; + } + + throw new Exception("HuffmanEncoder - GetNext - unsupported bit: " + bit); + } + + public static HuffmanTableEntry GetEntryForCodePoint(UInt16 codePoint) + { + return StaticTable[codePoint]; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs.meta new file mode 100644 index 00000000..117ce3f2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: babdeee42980ac84fb76ef946256b076 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTP2/HuffmanEncoder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs new file mode 100644 index 00000000..5b0eb7e6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs @@ -0,0 +1,44 @@ +namespace Best.HTTP.Hosts.Connections +{ + /// + /// Possible states of a Http Connection. + /// The ideal lifecycle of a connection that has KeepAlive is the following: Initial => [Processing => WaitForRecycle => Free] => Closed. + /// + public enum HTTPConnectionStates + { + /// + /// This Connection instance is just created. + /// + Initial, + + /// + /// This Connection is processing a request + /// + Processing, + + /// + /// Wait for the upgraded protocol to shut down. + /// + WaitForProtocolShutdown, + + /// + /// The Connection is finished processing the request, it's waiting now to deliver it's result. + /// + Recycle, + + /// + /// The request result's delivered, it's now up to processing again. + /// + Free, + + /// + /// If it's not a KeepAlive connection, or something happened, then we close this connection and remove from the pool. + /// + Closed, + + /// + /// Same as the Closed state, but processing this request requires resending the last processed request too. + /// + ClosedResendRequest + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs.meta new file mode 100644 index 00000000..660ec8d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: edafbf4cb6d32074a96a4953d3991946 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPConnectionStates.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs new file mode 100644 index 00000000..586d4b5a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs @@ -0,0 +1,451 @@ +#if !UNITY_WEBGL || UNITY_EDITOR + +using System; +using System.Collections.Generic; + +#if !BESTHTTP_DISABLE_ALTERNATE_SSL +using Best.HTTP.Hosts.Connections.HTTP2; +#endif + +using Best.HTTP.Hosts.Connections.HTTP1; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Timings; +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.PlatformSupport.Threading; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Hosts.Connections +{ + // DNS -> TCP -> [ Proxy ] -> [ BC TLS | Framework TLS ] -> (HTTP/1 | HTTP/2) + + /// + /// Represents and manages a connection to a server. + /// + public sealed class HTTPOverTCPConnection : ConnectionBase, INegotiationPeer, IContentConsumer + { + public PeekableContentProviderStream TopStream { get => this._negotiator.Stream; } + public TCPStreamer Streamer { get => this._negotiator.Streamer; } + + public IHTTPRequestHandler requestHandler; + + /// + /// Number of assigned requests to process. + /// + public override int AssignedRequests { get => this.requestHandler != null ? this.requestHandler.AssignedRequests : base.AssignedRequests; } + + /// + /// Maximum number of assignable requests. + /// + public override int MaxAssignedRequests { get => this.requestHandler != null ? this.requestHandler.MaxAssignedRequests : base.MaxAssignedRequests; } + + public override TimeSpan KeepAliveTime + { + get + { + if (this.requestHandler != null && this.requestHandler.KeepAlive != null) + { + if (this.requestHandler.KeepAlive.MaxRequests > 0) + { + if (base.KeepAliveTime < this.requestHandler.KeepAlive.TimeOut) + return base.KeepAliveTime; + else + return this.requestHandler.KeepAlive.TimeOut; + } + else + return TimeSpan.Zero; + } + + return base.KeepAliveTime; + } + + protected set + { + base.KeepAliveTime = value; + } + } + + public override bool CanProcessMultiple + { + get + { + if (this.requestHandler != null) + return this.requestHandler.CanProcessMultiple; + return base.CanProcessMultiple; + } + } + + PeekableContentProviderStream IContentConsumer.ContentProvider { get; } + + private Negotiator _negotiator; + + internal HTTPOverTCPConnection(HostKey hostKey) + : base(hostKey) + { } + + internal override void Process(HTTPRequest request) + { + this.LastProcessedUri = request.CurrentUri; + this.CurrentRequest = request; + this.CurrentRequest.Context.Add("Connection", this.Context.Hash); + + this.State = HTTPConnectionStates.Processing; + + if (this.requestHandler == null) + { + try + { + NegotiationParameters parameters = new NegotiationParameters(); + parameters.context = this.Context; + parameters.proxy = CurrentRequest.ProxySettings.Proxy; + parameters.targetUri = CurrentRequest.CurrentUri; + parameters.negotiateTLS = HTTPProtocolFactory.IsSecureProtocol(CurrentRequest.CurrentUri); + parameters.token = CurrentRequest.CancellationTokenSource.Token; + + //parameters.tryToKeepAlive = HTTPManager.PerHostSettings.Get(CurrentRequest.CurrentUri.Host).HTTP1ConnectionSettings.TryToReuseConnections; + + parameters.hostSettings = HTTPManager.PerHostSettings.Get(CurrentRequest.CurrentUri.Host); + + this._negotiator = new Negotiator(this, parameters); + this._negotiator.Start(); + } + catch(Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPOverTCPConnection), $"Process({request})", ex, this.Context); + TrySetErrorState(request, ex); + } + } + else + { + this.requestHandler.Process(request); + LastProcessTime = DateTime.UtcNow; + } + } + + List INegotiationPeer.GetSupportedProtocolNames(Negotiator negotiator) + { + List protocols = new List(); + + SupportedProtocols protocol = HTTPProtocolFactory.GetProtocolFromUri(negotiator.Parameters.targetUri); + +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + if (protocol == SupportedProtocols.HTTP && negotiator.Parameters.hostSettings.HTTP2ConnectionSettings.EnableHTTP2Connections) + { + // http/2 over tls (https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids) + protocols.Add(HTTPProtocolFactory.W3C_HTTP2); + } +#endif + + protocols.Add(HTTPProtocolFactory.W3C_HTTP1); + + return protocols; + } + + bool INegotiationPeer.MustStopAdvancingToNextStep(Negotiator negotiator, NegotiationSteps finishedStep, NegotiationSteps nextStep, Exception error) + { + if (TrySetErrorState(CurrentRequest, error)) + return true; + + switch (finishedStep) + { + case NegotiationSteps.Start: + this.LastProcessTime = DateTime.UtcNow; + + this.CurrentRequest.Timing.StartNext(TimingEventNames.DNS_Lookup); + break; + + case NegotiationSteps.DNSQuery: + this.CurrentRequest.Timing.StartNext(TimingEventNames.TCP_Connection); + break; + + case NegotiationSteps.TCPRace: + CurrentRequest.OnCancellationRequested += OnCancellationRequested; + + switch(nextStep) + { + case NegotiationSteps.Proxy: + CurrentRequest.Timing.StartNext(TimingEventNames.Proxy_Negotiation); + break; + case NegotiationSteps.TLSNegotiation: + CurrentRequest.Timing.StartNext(TimingEventNames.TLS_Negotiation); + break; + } + break; + + case NegotiationSteps.Proxy: + if (nextStep == NegotiationSteps.TLSNegotiation) + CurrentRequest.Timing.StartNext(TimingEventNames.TLS_Negotiation); + break; + + case NegotiationSteps.TLSNegotiation: + break; + + case NegotiationSteps.Finish: + + break; + } + + return false; + } + + void INegotiationPeer.EvaluateProxyNegotiationFailure(Negotiator negotiator, Exception error, bool resendForAuthentication) + { + if (resendForAuthentication && !this.TrySetErrorState(CurrentRequest, null)) + { + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(CurrentRequest, RequestEvents.Resend)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + else if (!this.TrySetErrorState(CurrentRequest, error)) + { + // TODO: what? + } + } + + void INegotiationPeer.OnNegotiationFailed(Negotiator negotiator, Exception error) + { + PreprocessRequestState(error); + } + + void INegotiationPeer.OnNegotiationFinished(Negotiator negotiator, PeekableContentProviderStream stream, TCPStreamer streamer, string negotiatedProtocol) + { + if (!PreprocessRequestState(null)) + StartWithNegotiatedProtocol(negotiatedProtocol, stream); + } + + private void OnCancellationRequested(HTTPRequest req) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(OnCancellationRequested)}({req})", this.Context); + + CurrentRequest.OnCancellationRequested -= OnCancellationRequested; + + this._negotiator?.OnCancellationRequested(); + + //ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + + private bool PreprocessRequestState(Exception error) + { + CurrentRequest.OnCancellationRequested -= OnCancellationRequested; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"PreprocessRequestState({CurrentRequest}, {error})", this.Context); + + // OnTLSNegotiated might get called _after_ the request is aborted. In this case, we must not set its State! + // So here we have to check its State, if it's one of the Finished state (Finished, Error, etc.) we have to quit early and only enqueue a connection event. + if (CurrentRequest.State >= HTTPRequestStates.Finished) + { + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + return true; + } + + return TrySetErrorState(CurrentRequest, error); + } + + /// + /// Returns true if an error state is set to the request and the connection is closing. + /// + bool TrySetErrorState(HTTPRequest request, Exception ex) + { + // Check wether the request is already in a finshed state. + // For example it can happen in the following case: + // 1.) HTTP proxy sends out a CONNECT request to the proxy + // 2.) Request times out and RequestEventHelper.AbortRequestWhenTimedOut is called + // 2.a) Request's state set to ConnectionTimedOut + // 3.) Request's callback is called + // 4.) Either the Proxy connects or fails to connect to the remote host, but one of the first call in the callbacks is TrySetErrorState, + // where we would try to set the request's State. If we would set a different state (like Error or TimedOut) than the one we already set (ConnectionTimedOut in this specific case) + // then a new RequestEvents.StateChange event would be queued up and resulting in a new calling the request's callback again! + if (request.State >= HTTPRequestStates.Finished) + { + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + return true; + } + + if (ex != null) + { + request.Timing.StartNext(TimingEventNames.Queued); + + ConnectionHelper.EnqueueEvents(this, + HTTPConnectionStates.Closed, + request, + ex is TimeoutException ? HTTPRequestStates.ConnectionTimedOut : HTTPRequestStates.Error, + ex is TimeoutException ? (Exception)null : ex); + return true; + } + else if (request.TimeoutSettings.IsConnectTimedOut(DateTime.UtcNow)) + { + TrySetErrorState(request, new TimeoutException("request.IsConnectTimedOut")); + return true; + } + else if (request.IsCancellationRequested) + { + ConnectionHelper.EnqueueEvents(this, HTTPConnectionStates.Closed, request, HTTPRequestStates.Aborted, null); + return true; + } + + return false; + } + + void StartWithNegotiatedProtocol(string negotiatedProtocol, PeekableContentProviderStream stream) + { + this.CurrentRequest.Timing.StartNext(TimingEventNames.Queued); + + if (string.IsNullOrEmpty(negotiatedProtocol)) + negotiatedProtocol = HTTPProtocolFactory.W3C_HTTP1; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"Negotiated protocol through ALPN: '{negotiatedProtocol}'", this.Context); + + bool useShortLivingThread = false; + switch (negotiatedProtocol) + { + case HTTPProtocolFactory.W3C_HTTP1: + var http1Consumer = new HTTP1ContentConsumer(this); + + this.requestHandler = http1Consumer; + stream.SetTwoWayBinding(http1Consumer); + + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HostProtocolSupport.HTTP1)); + + // https://github.com/Benedicht/BestHTTP-Issues/issues/179 + // Thoughts: + // - Many requests, especially if they are uploading slowly, can occupy all background threads. + // Use short-living thread when: + // - It's a GET request + // - The negotiated protocol is equal to HTTP/1.1 + // - It's not an upgrade request + + bool isRequestWithoutBody = this.CurrentRequest.MethodType == HTTPMethods.Get || + this.CurrentRequest.MethodType == HTTPMethods.Head || + this.CurrentRequest.MethodType == HTTPMethods.Delete || + this.CurrentRequest.MethodType == HTTPMethods.Options; + bool isUpgrade = this.CurrentRequest.HasHeader("upgrade"); + useShortLivingThread = HTTPManager.PerHostSettings.Get(this.HostKey.Host).HTTP1ConnectionSettings.ForceUseThreadPool || + (isRequestWithoutBody && !isUpgrade); + break; + +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + case HTTPProtocolFactory.W3C_HTTP2: + var http2Consumer = new HTTP2ContentConsumer(this); + + this.requestHandler = http2Consumer; + stream.SetTwoWayBinding(http2Consumer); + + this.CurrentRequest = null; + + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HostProtocolSupport.HTTP2)); + break; +#endif + + default: + HTTPManager.Logger.Error(nameof(HTTPOverTCPConnection), $"Unknown negotiated protocol: {negotiatedProtocol}", this.Context); + + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(CurrentRequest, RequestEvents.Resend)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + return; + } + + this.requestHandler.Context.Add("Connection", this.Context.GetStringField("Hash")); + this.Context.Add("RequestHandler", this.requestHandler.Context.GetStringField("Hash")); + + LastProcessTime = DateTime.UtcNow; + if (IsThreaded) + { + if (useShortLivingThread) + ThreadedRunner.RunShortLiving(ThreadFunc); + else + ThreadedRunner.RunLongLiving(ThreadFunc); + } + else + ThreadFunc(); + } + + protected override void ThreadFunc() + { + this.requestHandler.RunHandler(); + } + + public override void Shutdown(ShutdownTypes type) + { + base.Shutdown(type); + + if (this.requestHandler != null) + this.requestHandler.Shutdown(type); + else + { + // if the request handler is null, we can't do a gentle shutdown. + this._negotiator?.Streamer?.Close(); + } + + switch (this.ShutdownType) + { + case ShutdownTypes.Immediate: + this._negotiator.Stream?.Dispose(); + break; + + //case ShutdownTypes.Gentle: + // this._streamer?.Close(); + // break; + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + LastProcessedUri = null; + if (this.State != HTTPConnectionStates.WaitForProtocolShutdown) + { + this._negotiator?.Stream?.Dispose(); + + if (this.requestHandler != null) + { + try + { + this.requestHandler.Dispose(); + } + catch + { } + this.requestHandler = null; + } + + this._negotiator?.Streamer?.Dispose(); + } + } + + base.Dispose(disposing); + } + + void IContentConsumer.SetBinding(PeekableContentProviderStream contentProvider) + { + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(IContentConsumer.SetBinding)}({contentProvider})", this.Context); + } + + void IContentConsumer.UnsetBinding() + { + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(IContentConsumer.UnsetBinding)}()", this.Context); + } + + void IContentConsumer.OnContent() + { + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(IContentConsumer.OnContent)}()", this.Context); + } + + void IContentConsumer.OnConnectionClosed() + { + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(IContentConsumer.OnConnectionClosed)}()", this.Context); + + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + + void IContentConsumer.OnError(Exception ex) + { + HTTPManager.Logger.Information(nameof(HTTPOverTCPConnection), $"{nameof(IContentConsumer.OnError)}({ex})", this.Context); + + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs.meta new file mode 100644 index 00000000..cd325f18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d070df829d416b44a01888044a6c316 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPOverTCPConnection.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs new file mode 100644 index 00000000..84f1bb08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs @@ -0,0 +1,59 @@ +using System; +using System.IO; + +namespace Best.HTTP.Hosts.Connections +{ + public enum SupportedProtocols + { + Unknown, + HTTP, + + WebSocket, + + ServerSentEvents + } + + public static class HTTPProtocolFactory + { + public const string W3C_HTTP1 = "http/1.1"; +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + public const string W3C_HTTP2 = "h2"; +#endif + + public static SupportedProtocols GetProtocolFromUri(Uri uri) + { + if (uri == null || uri.Scheme == null) + throw new Exception("Malformed URI in GetProtocolFromUri"); + + string scheme = uri.Scheme.ToLowerInvariant(); + switch (scheme) + { + case "ws": + case "wss": + return SupportedProtocols.WebSocket; + + default: + return SupportedProtocols.HTTP; + } + } + + public static bool IsSecureProtocol(Uri uri) + { + if (uri == null || uri.Scheme == null) + throw new Exception("Malformed URI in IsSecureProtocol"); + + string scheme = uri.Scheme.ToLowerInvariant(); + switch (scheme) + { + // http + case "https": + + // WebSocket + case "wss": + return true; + } + + return false; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs.meta new file mode 100644 index 00000000..84600a87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1bb1fcd8332d626418af763bd17dcde8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/HTTPProtocolFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs new file mode 100644 index 00000000..6cc358d5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs @@ -0,0 +1,18 @@ +using Best.HTTP.Response; + +namespace Best.HTTP.Hosts.Connections +{ + /// + /// Defines an interface for notifying connections when space becomes available in a buffer for downloading data. + /// Connections implementating of this interface are used to signal their internal logic that they can transfer data into the available buffer space. + /// + public interface IDownloadContentBufferAvailable + { + /// + /// Notifies a connection that space has become available in the buffer for downloading data. + /// When invoked, this method indicates to a connection that it can transfer additional data into the buffer for further processing. + /// + /// The instance associated with the buffer. + void BufferAvailable(DownloadContentStream stream); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs.meta new file mode 100644 index 00000000..ce377c0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 78437af7092039f4aa757f40b4551f6e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IDownloadContentBufferAvailable.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs new file mode 100644 index 00000000..cdfbf4c5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs @@ -0,0 +1,43 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; + +namespace Best.HTTP.Hosts.Connections +{ + /// + /// Common interface for implementations that will coordinate request processing inside a connection. + /// + public interface IHTTPRequestHandler : IDisposable + { + KeepAliveHeader KeepAlive { get; } + + bool CanProcessMultiple { get; } + + /// + /// Number of assigned requests to process. + /// + int AssignedRequests { get; } + + /// + /// Maximum number of assignable requests. + /// + int MaxAssignedRequests { get; } + + ShutdownTypes ShutdownType { get; } + + LoggingContext Context { get; } + + void Process(HTTPRequest request); + + void RunHandler(); + + /// + /// An immediate shutdown request that called only on application closure. + /// + void Shutdown(ShutdownTypes type); + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs.meta new file mode 100644 index 00000000..b0d49eb2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f8e38e7e11973324eba759c722fd904b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IHTTPRequestHandler.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs new file mode 100644 index 00000000..42183f88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs @@ -0,0 +1,24 @@ +using Best.HTTP.Shared.Logger; + +namespace Best.HTTP.Hosts.Connections +{ + /// + /// Interface for signaling upload threads. + /// + public interface IThreadSignaler + { + /// + /// A instance for debugging purposes. + /// + /// + /// To help implementors log in the IThreadSignaler's context, + /// the interface implementors must make their logging context accessible. + /// + public LoggingContext Context { get; } + + /// + /// Signals the associated thread to resume or wake up. + /// + void SignalThread(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs.meta new file mode 100644 index 00000000..87620bf5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 77193f8334848e0409e39d3b4c42a422 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/IThreadSignaler.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs new file mode 100644 index 00000000..7277e21e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs @@ -0,0 +1,635 @@ +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; + +using Best.HTTP.Caching; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Settings; +using Best.HTTP.Request.Timings; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; + +namespace Best.HTTP.Hosts.Connections +{ + public enum RequestEvents + { + Upgraded, + DownloadProgress, + UploadProgress, + StreamingData, + DownloadStarted, + StateChange, + SetState, + QueuedResend, + Resend, + Headers, + Timing, + } + + public readonly struct RequestEventInfo + { + public readonly HTTPRequest SourceRequest; + public readonly RequestEvents Event; + + public readonly HTTPRequestStates State; + + public readonly Exception Error; + + public readonly long Progress; + public readonly long ProgressLength; + + public readonly byte[] Data; + public readonly int DataLength; + + public readonly TimingEventInfo timingEvent; + + // Headers + public readonly Dictionary> Headers; + + public RequestEventInfo(HTTPRequest request, RequestEvents @event) + { + this.SourceRequest = request; + this.Event = @event; + + this.State = HTTPRequestStates.Initial; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, RequestEvents @event, HTTPRequestStates newState) + { + this.SourceRequest = request; + this.Event = @event; + + this.State = newState; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, HTTPRequestStates newState) + { + this.SourceRequest = request; + this.Event = RequestEvents.StateChange; + this.State = newState; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, HTTPRequestStates newState, Exception error) + { + this.SourceRequest = request; + this.Event = RequestEvents.SetState; + this.State = newState; + + this.Error = error; + + this.Progress = this.ProgressLength = 0; + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, RequestEvents @event, long progress, long progressLength) + { + this.SourceRequest = request; + this.Event = @event; + this.State = HTTPRequestStates.Initial; + + this.Error = null; + + this.Progress = progress; + this.ProgressLength = progressLength; + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, byte[] data, int dataLength) + { + this.SourceRequest = request; + this.Event = RequestEvents.StreamingData; + this.State = HTTPRequestStates.Initial; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + this.Data = data; + this.DataLength = dataLength; + + // Headers + this.Headers = null; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, Dictionary> headers) + { + this.SourceRequest = request; + this.Event = RequestEvents.Headers; + this.State = HTTPRequestStates.Initial; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = headers; + + this.timingEvent = default; + } + + public RequestEventInfo(HTTPRequest request, TimingEventInfo timingEvent) + { + this.SourceRequest = request; + this.Event = RequestEvents.Timing; + this.State = HTTPRequestStates.Initial; + + this.Error = null; + + this.Progress = this.ProgressLength = 0; + this.Data = null; + this.DataLength = 0; + + // Headers + this.Headers = null; + + this.timingEvent = timingEvent; + } + + public override string ToString() + { + switch (this.Event) + { + case RequestEvents.Upgraded: + return string.Format("[RequestEventInfo Event: Upgraded, Source: {0}]", this.SourceRequest.Context.Hash); + case RequestEvents.DownloadProgress: + return string.Format("[RequestEventInfo Event: DownloadProgress, Progress: {1}, ProgressLength: {2}, Source: {0}]", this.SourceRequest.Context.Hash, this.Progress, this.ProgressLength); + case RequestEvents.UploadProgress: + return string.Format("[RequestEventInfo Event: UploadProgress, Progress: {1}, ProgressLength: {2}, Source: {0}]", this.SourceRequest.Context.Hash, this.Progress, this.ProgressLength); + case RequestEvents.StreamingData: + return string.Format("[RequestEventInfo Event: StreamingData, DataLength: {1}, Source: {0}]", this.SourceRequest.Context.Hash, this.DataLength); + case RequestEvents.DownloadStarted: + return $"[RequestEventInfo Event: DownloadStarted, Source: {this.SourceRequest.Context.Hash}]"; + case RequestEvents.StateChange: + return string.Format("[RequestEventInfo Event: StateChange, State: {1}, Source: {0}]", this.SourceRequest.Context.Hash, this.State); + case RequestEvents.SetState: + return string.Format("[RequestEventInfo Event: SetState, State: {1}, Source: {0}]", this.SourceRequest.Context.Hash, this.State); + case RequestEvents.Resend: + return string.Format("[RequestEventInfo Event: Resend, Source: {0}]", this.SourceRequest.Context.Hash); + case RequestEvents.Headers: + return string.Format("[RequestEventInfo Event: Headers, Source: {0}]", this.SourceRequest.Context.Hash); + case RequestEvents.QueuedResend: + return $"[RequestEventInfo Event: QueuedResend, Source: {this.SourceRequest.Context.Hash}]"; + case RequestEvents.Timing: + return $"[RequestEventInfo Event: Timing, TimingEvent: {this.timingEvent}, Source:{this.SourceRequest.Context.Hash}]"; + default: + throw new NotImplementedException(this.Event.ToString()); + } + } + } + + class ProgressFlattener + { + struct FlattenedProgress + { + public HTTPRequest request; + public OnProgressDelegate onProgress; + public long progress; + public long length; + } + + private FlattenedProgress[] progresses; + private bool hasProgress; + + public void InsertOrUpdate(RequestEventInfo info, OnProgressDelegate onProgress) + { + if (progresses == null) + progresses = new FlattenedProgress[1]; + + hasProgress = true; + + var newProgress = new FlattenedProgress { request = info.SourceRequest, progress = info.Progress, length = info.ProgressLength, onProgress = onProgress }; + + int firstEmptyIdx = -1; + for (int i = 0; i < progresses.Length; i++) + { + var progress = progresses[i]; + if (object.ReferenceEquals(progress.request, info.SourceRequest)) + { + progresses[i] = newProgress; + return; + } + + if (firstEmptyIdx == -1 && progress.request == null) + firstEmptyIdx = i; + } + + if (firstEmptyIdx == -1) + { + Array.Resize(ref progresses, progresses.Length + 1); + progresses[progresses.Length - 1] = newProgress; + } + else + progresses[firstEmptyIdx] = newProgress; + } + + public void DispatchProgressCallbacks() + { + if (progresses == null || !hasProgress) + return; + + for (int i = 0; i < progresses.Length; ++i) + { + var @event = progresses[i]; + var source = @event.request; + if (source != null && @event.onProgress != null) + { + try + { + @event.onProgress(source, @event.progress, @event.length); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("ProgressFlattener", "DispatchProgressCallbacks", ex, source.Context); + } + } + } + + Array.Clear(progresses, 0, progresses.Length); + hasProgress = false; + } + } + + public static class RequestEventHelper + { + private static ConcurrentQueue requestEventQueue = new ConcurrentQueue(); + +#pragma warning disable 0649 + public static Action OnEvent; +#pragma warning restore + + // Low frame rate and high download/upload speed can add more download/upload progress events to dispatch in one frame. + // This can add higher CPU usage as it might cause updating the UI/do other things unnecessary in the same frame. + // To avoid this, instead of calling the events directly, we store the last event's data and call download/upload callbacks only once per frame. + + private static ProgressFlattener downloadProgress; + private static ProgressFlattener uploadProgress; + + public static void EnqueueRequestEvent(RequestEventInfo ev) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("RequestEventHelper", "Enqueue " + ev.ToString(), ev.SourceRequest.Context); + + requestEventQueue.Enqueue(ev); + } + + internal static void Clear() + { + requestEventQueue.Clear(); + } + + internal static void ProcessQueue() + { + RequestEventInfo requestEvent; + while (requestEventQueue.TryDequeue(out requestEvent)) + { + HTTPRequest source = requestEvent.SourceRequest; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("RequestEventHelper", "Processing request event: " + requestEvent.ToString(), source.Context); + + if (OnEvent != null) + { + try + { + using (var _ = new Unity.Profiling.ProfilerMarker(nameof(OnEvent)).Auto()) + OnEvent(requestEvent); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "ProcessQueue", ex, source.Context); + } + } + + switch (requestEvent.Event) + { + case RequestEvents.DownloadProgress: + try + { + if (source.DownloadSettings.OnDownloadProgress != null) + { + if (downloadProgress == null) + downloadProgress = new ProgressFlattener(); + downloadProgress.InsertOrUpdate(requestEvent, source.DownloadSettings.OnDownloadProgress); + } + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "Process RequestEventQueue - RequestEvents.DownloadProgress", ex, source.Context); + } + break; + + case RequestEvents.UploadProgress: + try + { + if (source.UploadSettings.OnUploadProgress != null) + { + if (uploadProgress == null) + uploadProgress = new ProgressFlattener(); + uploadProgress.InsertOrUpdate(requestEvent, source.UploadSettings.OnUploadProgress); + } + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "Process RequestEventQueue - RequestEvents.UploadProgress", ex, source.Context); + } + break; + + case RequestEvents.QueuedResend: + HandleQueued(source); + goto case RequestEvents.Resend; + + case RequestEvents.Resend: + source.State = HTTPRequestStates.Initial; + + var host = HostManager.GetHostVariant(source); + + host.Send(source); + break; + + case RequestEvents.Headers: + { + try + { + var response = source.Response; + if (source.DownloadSettings.OnHeadersReceived != null && response != null) + source.DownloadSettings.OnHeadersReceived(source, response, requestEvent.Headers); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "Process RequestEventQueue - RequestEvents.Headers", ex, source.Context); + } + break; + } + + case RequestEvents.DownloadStarted: + try + { + // It's possible that response.DownStream is already null when this event is handled! + + var response = source.Response; + var downStream = response?.DownStream; + + if (response != null && downStream != null) + source.DownloadSettings.OnDownloadStarted?.Invoke(source, response, response.DownStream); + } + catch(Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "DownloadStarted", ex, source.Context); + } + break; + + case RequestEvents.Timing: + requestEvent.timingEvent.SourceRequest.Timing.AddEvent(requestEvent.timingEvent); + break; + + case RequestEvents.SetState: + // In a case where the request is aborted its state is set to a >= Finished state then, + // on another thread the request processing will fail too queuing up a >= Finished state again. + if (source.State >= HTTPRequestStates.Finished && requestEvent.State >= HTTPRequestStates.Finished) + continue; + + // It's different from the next condition! (this is >= and the next is only >) + if (requestEvent.State >= HTTPRequestStates.Finished) + source?.Response?.DownStream?.CompleteAdding(requestEvent.Error); + + if (requestEvent.State > HTTPRequestStates.Finished) + { + HTTPManager.Logger.Information("RequestEventHelper", $"{requestEvent.State}: discarding response!", source.Response?.Context ?? source.Context); + + source.Response?.Dispose(); + source.Response = null; + } + + source.Exception = requestEvent.Error; + source.State = requestEvent.State; + + // https://www.rfc-editor.org/rfc/rfc5861.html#section-1 + // The stale-if-error HTTP Cache-Control extension allows a cache to + // return a stale response when an error -- e.g., a 500 Internal Server + // Error, a network segment, or DNS failure -- is encountered, rather + // than returning a "hard" error. + if (requestEvent.State > HTTPRequestStates.Finished && requestEvent.State != HTTPRequestStates.Aborted) + { + if (HTTPManager.LocalCache != null && !source.DownloadSettings.DisableCache) + { + var hash = Caching.HTTPCache.CalculateHash(source.MethodType, source.CurrentUri); + if (HTTPManager.LocalCache.CanServeWithoutValidation(hash, ErrorTypeForValidation.ConnectionError, source.Context)) + { + HTTPManager.LocalCache.Redirect(source, hash); + goto case RequestEvents.Resend; + } + } + } + + goto case RequestEvents.StateChange; + + case RequestEvents.StateChange: + try + { + using (var _ = new Unity.Profiling.ProfilerMarker(nameof(RequestEventHelper.HandleRequestStateChange)).Auto()) + RequestEventHelper.HandleRequestStateChange(ref requestEvent); + } + catch(Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "HandleRequestStateChange", ex, source.Context); + } + break; + } + } + + uploadProgress?.DispatchProgressCallbacks(); + downloadProgress?.DispatchProgressCallbacks(); + } + + // TODO: don't start/repeat if can't time out? + private static bool AbortRequestWhenTimedOut(DateTime now, object context) + { + HTTPRequest request = context as HTTPRequest; + + if (request.State >= HTTPRequestStates.Finished) + return false; // don't repeat + + var downStream= request.Response?.DownStream; + + if (downStream != null && downStream.DoFullCheck(limit: 2)) + { + var warning = $"Request's download stream is full({downStream.Length:N0}/{downStream.MaxBuffered:N0}) without any Read attempt! You can either increase HTTPRequest's DownloadSettings.ContentStreamMaxBuffered or use streaming. Request's uri: {request.Uri}. See https://bestdocshub.pages.dev/HTTP/getting-started/downloads/ for more details!"; + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Warning(nameof(RequestEventHelper), warning, request.Context); + else + UnityEngine.Debug.Log(warning); + + // increase buffer limit + downStream.EmergencyIncreaseMaxBuffered(); + + return false; + } + + // Upgradable protocols will shut down themselves + if (request?.Response?.IsUpgraded is bool upgraded && upgraded) + return false; + + if (request.TimeoutSettings.IsTimedOut(HTTPManager.CurrentFrameDateTime)) + { + HTTPManager.Logger.Information("RequestEventHelper", "AbortRequestWhenTimedOut - Request timed out. CurrentUri: " + request.CurrentUri.ToString(), request.Context); + request.Abort(); + + return false; // don't repeat + } + + return true; // repeat + } + + private static void HandleQueued(HTTPRequest source) + { + source.Timing.StartNext(TimingEventNames.Queued); + + source.TimeoutSettings.QueuedAt = HTTPManager.CurrentFrameDateTime; + Timer.Add(new TimerData(TimeSpan.FromSeconds(1), source, AbortRequestWhenTimedOut)); + } + + static readonly string[] RequestStateNames = new string[] { "Initial", "Queued", "Processing", "Finished", "Error", "Aborted", "ConnectionTimedOut", "TimedOut" }; + + private static void HandleRequestStateChange(ref RequestEventInfo @event) + { + HTTPRequest source = @event.SourceRequest; + + // Because there's a race condition between setting the request's State in its Abort() function running on Unity's main thread + // and the HTTP1/HTTP2 handlers running on an another one. + // Because of these race conditions cases violating expectations can be: + // 1.) State is finished but the response null + // 2.) State is (Connection)TimedOut and the response non-null + // We have to make sure that no callbacks are called twice and in the request must be in a consistent state! + + // State | Request + // --------- +--------- + // 1 Null + // Finished | Skip + // Timeout/Abort | Deliver + // + // 2 Non-Null + // Finished | Deliver + // Timeout/Abort | Skip + + using var _ = new Unity.Profiling.ProfilerMarker(RequestStateNames[(int)@event.State]).Auto(); + + switch (@event.State) + { + case HTTPRequestStates.Queued: + HandleQueued(source); + break; + + case HTTPRequestStates.ConnectionTimedOut: + case HTTPRequestStates.TimedOut: + case HTTPRequestStates.Error: + case HTTPRequestStates.Aborted: + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("RequestEventHelper", $"{@event.State}: discarding response!", source.Response?.Context ?? source.Context); + + source.Response?.Dispose(); + source.Response = null; + goto case HTTPRequestStates.Finished; + + case HTTPRequestStates.Finished: + // Dispatch any collected download/upload progress, otherwise they would _after_ the callback! + uploadProgress?.DispatchProgressCallbacks(); + downloadProgress?.DispatchProgressCallbacks(); + + if (source.Callback != null) + { + source.Timing.AddEvent(new TimingEventInfo(source, TimingEvents.StartNext, TimingEventNames.Callback)); + try + { + using (var __ = new Unity.Profiling.ProfilerMarker(nameof(source.Callback)).Auto()) + source.Callback(source, source.Response); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("RequestEventHelper", "HandleRequestStateChange " + @event.State, ex, source.Context); + } + } + + source.Timing.AddEvent(new TimingEventInfo(source, TimingEvents.Finish, null)); + + if (source.Callback == null) + { + // This delay required because with coroutines these lines are executed first + // before the coroutine has a chance to do something with a finished request. + // By adding a delay there's a time window that the coroutine can run its logic too inbetween. + Timer.Add(new TimerData(TimeSpan.FromSeconds(1), source, OnDelayedDisposeTimer)); + } + else + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("RequestEventHelper", "disposing response!", source.Context); + source.Dispose(); + } + + HostManager.GetHostVariant(source) + .TryToSendQueuedRequests(); + break; + } + } + + private static bool OnDelayedDisposeTimer(DateTime time, object request) + { + var source = request as HTTPRequest; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("RequestEventHelper", $"{nameof(OnDelayedDisposeTimer)} - disposing response!", source.Context); + source.Dispose(); + + return false; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs.meta new file mode 100644 index 00000000..cd5a6438 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2f7c4983d75e7a548aeabb756f98142f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/RequestEvents.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL.meta new file mode 100644 index 00000000..871a2f3b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4e57931c226f15e4182b4668dde0b945 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs new file mode 100644 index 00000000..46b651e0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs @@ -0,0 +1,332 @@ +#if UNITY_WEBGL && !UNITY_EDITOR + +using System; +using System.IO; +using System.Threading; + +using Best.HTTP.Caching; +using Best.HTTP.Hosts.Connections.File; +using Best.HTTP.Hosts.Connections.HTTP1; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Authentication; +using Best.HTTP.Request.Timings; +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Hosts.Connections.WebGL +{ + class PeekableIncomingSegmentContentProviderStream : PeekableContentProviderStream + { + private int peek_listIdx; + private int peek_pos; + + public override void BeginPeek() + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + + public override int PeekByte() + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + } + + + internal sealed class WebGLXHRConnection : ConnectionBase + { + public PeekableContentProviderStream ContentProvider { get; private set; } + + int NativeId; + PeekableHTTP1Response _response; + + public WebGLXHRConnection(HostKey hostKey) + : base(hostKey, false) + { + WebGLXHRNativeInterface.XHR_SetLoglevel((byte)HTTPManager.Logger.Level); + } + + public override void Shutdown(ShutdownTypes type) + { + base.Shutdown(type); + + WebGLXHRNativeInterface.XHR_Abort(this.NativeId); + } + + protected override void ThreadFunc() + { + // XmlHttpRequest setup + + CurrentRequest.Prepare(); + + Credentials credentials = null;// CurrentRequest.Authenticator?.Credentials; + + this.NativeId = WebGLXHRNativeInterface.XHR_Create(HTTPRequest.MethodNames[(byte)CurrentRequest.MethodType], + CurrentRequest.CurrentUri.OriginalString, + credentials?.UserName, credentials?.Password, CurrentRequest.WithCredentials ? 1 : 0); + WebGLXHRNativeConnectionLayer.Add(NativeId, this); + + CurrentRequest.EnumerateHeaders((header, values) => + { + if (!header.Equals("Content-Length")) + for (int i = 0; i < values.Count; ++i) + WebGLXHRNativeInterface.XHR_SetRequestHeader(NativeId, header, values[i]); + }, /*callBeforeSendCallback:*/ true); + + WebGLXHRNativeConnectionLayer.SetupHandlers(NativeId, CurrentRequest); + + WebGLXHRNativeInterface.XHR_SetTimeout(NativeId, (uint)(CurrentRequest.TimeoutSettings.ConnectTimeout.TotalMilliseconds + CurrentRequest.TimeoutSettings.Timeout.TotalMilliseconds)); + + Stream upStream = CurrentRequest.UploadSettings.UploadStream; + byte[] body = null; + int length = 0; + bool releaseBodyBuffer = false; + + if (upStream != null) + { + var internalBuffer = BufferPool.Get(upStream.Length > 0 ? upStream.Length : CurrentRequest.UploadSettings.UploadChunkSize, true); + using (BufferPoolMemoryStream ms = new BufferPoolMemoryStream(internalBuffer, 0, internalBuffer.Length, true, true, false, true)) + { + var buffer = BufferPool.Get(CurrentRequest.UploadSettings.UploadChunkSize, true); + int readCount = -1; + while ((readCount = upStream.Read(buffer, 0, buffer.Length)) > 0) + ms.Write(buffer, 0, readCount); + + BufferPool.Release(buffer); + + length = (int)ms.Position; + body = ms.GetBuffer(); + + releaseBodyBuffer = true; + } + } + + if (this._response == null) + this.CurrentRequest.Response = this._response = new PeekableHTTP1Response(this.CurrentRequest, false, null); + + this.ContentProvider = new PeekableIncomingSegmentContentProviderStream(); + + WebGLXHRNativeInterface.XHR_Send(NativeId, body, length); + + if (releaseBodyBuffer) + BufferPool.Release(body); + + this.CurrentRequest.TimeoutSettings.QueuedAt = DateTime.MinValue; + this.CurrentRequest.TimeoutSettings.ProcessingStarted = DateTime.UtcNow; + this.CurrentRequest.OnCancellationRequested += OnCancellationRequested; + } + + #region Callback Implementations + + private void OnCancellationRequested(HTTPRequest req) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnCancellationRequested()", this.Context); + + Interlocked.Exchange(ref this._response, null); + req.OnCancellationRequested -= OnCancellationRequested; + + WebGLXHRNativeInterface.XHR_Abort(this.NativeId); + } + + internal void OnBuffer(BufferSegment buffer) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnBuffer({buffer})", this.Context); + + try + { + if (this.CurrentRequest.TimeoutSettings.IsTimedOut(DateTime.UtcNow)) + throw new TimeoutException(); + + if (this.CurrentRequest.IsCancellationRequested) + throw new Exception("Cancellation requested!"); + + this.ContentProvider?.Write(buffer); + this._response.ProcessPeekable(this.ContentProvider); + } + catch (Exception e) + { + BufferPool.Release(buffer); + + if (this.ShutdownType == ShutdownTypes.Immediate) + return; + + FinishedProcessing(e); + } + + // After an exception, this._response will be null! + if (this._response != null && this._response.ReadState == PeekableHTTP1Response.PeekableReadState.Finished) + FinishedProcessing(null); + } + + internal void OnError(string error) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnError({error})", this.Context); + + FinishedProcessing(new Exception(error)); + } + + internal void OnResponse(BufferSegment payload) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnResponse({payload})", this.Context); + + this._response.DownStream.EmergencyIncreaseMaxBuffered(); + OnBuffer(payload); + } + + void FinishedProcessing(Exception ex) + { + // Warning: FinishedProcessing might be called from different threads in parallel: + // - send thread triggered by a write failure + // - read thread oncontent/OnError/OnConnectionClosed + + var resp = Interlocked.Exchange(ref this._response, null); + if (resp == null) + return; + + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{nameof(FinishedProcessing)}({resp}, {ex})", this.Context); + + // Unset the consumer, we no longer expect another OnContent call until further notice. + this.ContentProvider?.Unbind(); + this.ContentProvider?.Dispose(); + this.ContentProvider = null; + + var req = this.CurrentRequest; + + req.OnCancellationRequested -= OnCancellationRequested; + + bool resendRequest = false; + HTTPRequestStates requestState = HTTPRequestStates.Finished; + HTTPConnectionStates connectionState = HTTPConnectionStates.Recycle; + Exception error = ex; + + if (error != null) + { + // Timeout is a non-retryable error + if (ex is TimeoutException) + { + error = null; + requestState = HTTPRequestStates.TimedOut; + } + else if (ex is HTTPCacheAcquireLockException) + { + error = null; + resendRequest = true; + } + else + { + if (req.RetrySettings.Retries < req.RetrySettings.MaxRetries) + { + req.RetrySettings.Retries++; + error = null; + resendRequest = true; + } + else + { + requestState = HTTPRequestStates.Error; + } + } + + // Any exception means that the connection is in an unknown state, we shouldn't try to reuse it. + connectionState = HTTPConnectionStates.Closed; + + resp.Dispose(); + } + else + { + // After HandleResponse connectionState can have the following values: + // - Processing: nothing interesting, caller side can decide what happens with the connection (recycle connection). + // - Closed: server sent an connection: close header. + // - ClosedResendRequest: in this case resendRequest is true, and the connection must not be reused. + // In this case we can send only one ConnectionEvent to handle both case and avoid concurrency issues. + + KeepAliveHeader keepAlive = null; + error = ConnectionHelper.HandleResponse(req, out resendRequest, out connectionState, ref keepAlive, this.Context); + connectionState = HTTPConnectionStates.Recycle; + + if (error != null) + requestState = HTTPRequestStates.Error; + else if (!resendRequest && resp.IsUpgraded) + requestState = HTTPRequestStates.Processing; + } + + req.Timing.StartNext(TimingEventNames.Queued); + + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{nameof(FinishedProcessing)} final decision. ResendRequest: {resendRequest}, RequestState: {requestState}, ConnectionState: {connectionState}", this.Context); + + // If HandleResponse returned with ClosedResendRequest or there were an error and we can retry the request + if (connectionState == HTTPConnectionStates.ClosedResendRequest || (resendRequest && connectionState == HTTPConnectionStates.Closed)) + { + ConnectionHelper.ResendRequestAndCloseConnection(this, req); + } + else if (resendRequest && requestState == HTTPRequestStates.Finished) + { + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(req, RequestEvents.Resend)); + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, connectionState)); + } + else + { + // Otherwise set the request's then the connection's state + ConnectionHelper.EnqueueEvents(this, connectionState, req, requestState, error); + } + } + + internal void OnDownloadProgress(int down, int total) => RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.CurrentRequest, RequestEvents.DownloadProgress, down, total)); + internal void OnUploadProgress(int up, int total) => RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.CurrentRequest, RequestEvents.UploadProgress, up, total)); + + internal void OnTimeout() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnTimeout", this.Context); + + CurrentRequest.Response = null; + CurrentRequest.State = HTTPRequestStates.TimedOut; + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + + internal void OnAborted() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"{this.NativeId} - OnAborted", this.Context); + + CurrentRequest.Response = null; + CurrentRequest.State = HTTPRequestStates.Aborted; + ConnectionEventHelper.EnqueueConnectionEvent(new ConnectionEventInfo(this, HTTPConnectionStates.Closed)); + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (disposing) + { + WebGLXHRNativeConnectionLayer.Remove(NativeId); + WebGLXHRNativeInterface.XHR_Release(NativeId); + + this.ContentProvider?.Dispose(); + this.ContentProvider = null; + } + } + + #endregion + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs.meta new file mode 100644 index 00000000..ea5c2d1d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 678df3294a2b9c64ba56e9dd095f08fe +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRConnection.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs new file mode 100644 index 00000000..424a921a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs @@ -0,0 +1,153 @@ +#if UNITY_WEBGL && !UNITY_EDITOR +using System; +using System.Collections.Generic; +using System.Runtime.InteropServices; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Hosts.Connections.WebGL +{ + internal static class WebGLXHRNativeConnectionLayer + { + static Dictionary Connections = new Dictionary(1); + + public static void Add(int nativeId, WebGLXHRConnection connection) => Connections.Add(nativeId, connection); + public static void Remove(int nativeId) => Connections.Remove(nativeId); + + public static void SetupHandlers(int nativeId, HTTPRequest request) + { + WebGLXHRNativeInterface.XHR_SetResponseHandler(nativeId, OnResponse, OnError, OnTimeout, OnAborted, OnBufferCallback, OnAllocArray); + + // Setting OnUploadProgress result in an addEventListener("progress", ...) call making the request non-simple. + // https://forum.unity.com/threads/best-http-released.200006/page-49#post-3696220 + WebGLXHRNativeInterface.XHR_SetProgressHandler(nativeId, + request.DownloadSettings.OnDownloadProgress == null ? (OnWebGLXHRProgressDelegate)null : OnDownloadProgress, + request.UploadSettings.OnUploadProgress == null ? (OnWebGLXHRProgressDelegate)null : OnUploadProgress); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRAllocArray))] + static unsafe IntPtr OnAllocArray(int nativeId, int length) + { + byte[] buffer = BufferPool.Get(length, true); + fixed (byte* ptr = buffer) + { + var p = (IntPtr)ptr; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(WebGLXHRConnection), $"({p}) <= OnAllocArray({nativeId}, {length})"); + + return p; + } + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRRequestHandlerDelegate))] + static void OnResponse(int nativeId, [MarshalAs(UnmanagedType.LPArray, ArraySubType = UnmanagedType.U1, SizeParamIndex = 2)] byte[] pBuffer, int length) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection", $"OnResponse({nativeId}, {pBuffer}, {length}): No WebGL connection found for nativeId({nativeId})!"); + return; + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose("WebGLConnection", $"OnResponse({nativeId}, {pBuffer}, {length})", conn.Context); + + BufferSegment payload = BufferSegment.Empty; + if (length > 0) + payload = pBuffer.AsBuffer(length); + + conn.OnResponse(payload); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRBufferDelegate))] + public static void OnBufferCallback(int nativeId, [MarshalAs(UnmanagedType.LPArray, ArraySubType = UnmanagedType.U1, SizeParamIndex = 2)] byte[] pBuffer, int length) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnBufferCallback", "No WebGL connection found for nativeId: " + nativeId.ToString()); + return; + } + + BufferSegment payload = BufferSegment.Empty; + if (length > 0) + payload = pBuffer.AsBuffer(length); + + conn.OnBuffer(payload); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRProgressDelegate))] + static void OnDownloadProgress(int nativeId, int downloaded, int total) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnDownloadProgress", "No WebGL connection found for nativeId: " + nativeId.ToString()); + return; + } + + HTTPManager.Logger.Information(nativeId + " OnDownloadProgress", downloaded.ToString() + " / " + total.ToString(), conn.Context); + + conn.OnDownloadProgress(downloaded, total); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRProgressDelegate))] + static void OnUploadProgress(int nativeId, int uploaded, int total) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnUploadProgress", "No WebGL connection found for nativeId: " + nativeId.ToString()); + return; + } + + HTTPManager.Logger.Information(nativeId + " OnUploadProgress", uploaded.ToString() + " / " + total.ToString(), conn.Context); + + conn.OnUploadProgress(uploaded, total); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRErrorDelegate))] + static void OnError(int nativeId, string error) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnError", "No WebGL connection found for nativeId: " + nativeId.ToString() + " Error: " + error); + return; + } + + conn.OnError(error); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRTimeoutDelegate))] + static void OnTimeout(int nativeId) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnTimeout", "No WebGL connection found for nativeId: " + nativeId.ToString()); + return; + } + + conn.OnTimeout(); + } + + [AOT.MonoPInvokeCallback(typeof(OnWebGLXHRAbortedDelegate))] + static void OnAborted(int nativeId) + { + WebGLXHRConnection conn = null; + if (!Connections.TryGetValue(nativeId, out conn)) + { + HTTPManager.Logger.Error("WebGLConnection - OnAborted", "No WebGL connection found for nativeId: " + nativeId.ToString()); + return; + } + + conn.OnAborted(); + } + + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs.meta new file mode 100644 index 00000000..6a7653df --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42cfa2a1d7f27744da3528da58df7ef7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeConnectionLayer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs new file mode 100644 index 00000000..06a4bf0f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs @@ -0,0 +1,54 @@ +#if UNITY_WEBGL && !UNITY_EDITOR +using System; +using System.Runtime.InteropServices; + +namespace Best.HTTP.Hosts.Connections.WebGL +{ + delegate void OnWebGLXHRRequestHandlerDelegate(int nativeId, [MarshalAs(UnmanagedType.LPArray, ArraySubType = UnmanagedType.U1, SizeParamIndex = 2)] byte[] pBuffer, int length); + delegate void OnWebGLXHRBufferDelegate(int nativeId, [MarshalAs(UnmanagedType.LPArray, ArraySubType = UnmanagedType.U1, SizeParamIndex = 2)] byte[] pBuffer, int length); + delegate void OnWebGLXHRProgressDelegate(int nativeId, int downloaded, int total); + delegate void OnWebGLXHRErrorDelegate(int nativeId, string error); + delegate void OnWebGLXHRTimeoutDelegate(int nativeId); + delegate void OnWebGLXHRAbortedDelegate(int nativeId); + delegate IntPtr OnWebGLXHRAllocArray(int nativeId, int size); + + internal static class WebGLXHRNativeInterface + { + [DllImport("__Internal")] + public static extern int XHR_Create(string method, string url, string userName, string passwd, int withCredentials); + + /// + /// Is an unsigned long representing the number of milliseconds a request can take before automatically being terminated. A value of 0 (which is the default) means there is no timeout. + /// + [DllImport("__Internal")] + public static extern void XHR_SetTimeout(int nativeId, uint timeout); + + [DllImport("__Internal")] + public static extern void XHR_SetRequestHeader(int nativeId, string header, string value); + + [DllImport("__Internal")] + public static extern void XHR_SetResponseHandler(int nativeId, + OnWebGLXHRRequestHandlerDelegate onresponse, + OnWebGLXHRErrorDelegate onerror, + OnWebGLXHRTimeoutDelegate ontimeout, + OnWebGLXHRAbortedDelegate onabort, + OnWebGLXHRBufferDelegate onbuffer, + OnWebGLXHRAllocArray onallocArray); + + [DllImport("__Internal")] + public static extern void XHR_SetProgressHandler(int nativeId, OnWebGLXHRProgressDelegate onDownloadProgress, OnWebGLXHRProgressDelegate onUploadProgress); + + [DllImport("__Internal")] + public static extern void XHR_Send(int nativeId, [MarshalAs(UnmanagedType.LPArray, ArraySubType = UnmanagedType.U1, SizeParamIndex = 2)] byte[] body, int length); + + [DllImport("__Internal")] + public static extern void XHR_Abort(int nativeId); + + [DllImport("__Internal")] + public static extern void XHR_Release(int nativeId); + + [DllImport("__Internal")] + public static extern void XHR_SetLoglevel(int logLevel); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs.meta new file mode 100644 index 00000000..e9daf6c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ef4c9a06ea58925459016164ae22bedf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Connections/WebGL/WebGLXHRNativeInterface.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager.meta new file mode 100644 index 00000000..1d9fda6a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0b5b158db1b013b48a07aa808b6ff1f5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs new file mode 100644 index 00000000..100a5f67 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs @@ -0,0 +1,134 @@ +using System; +using System.Collections.Generic; + +using Best.HTTP.Request.Settings; + +using UnityEngine; + +namespace Best.HTTP.HostSetting +{ + /// + /// The struct represents a unique key for identifying hosts based on their and . + /// + /// + /// + /// The struct is designed to uniquely identify a host based on its URI (Uniform Resource Identifier) and optional proxy settings. + /// It provides a way to create, compare, and hash host keys, enabling efficient host variant management in the . + /// + /// + /// Key features of the struct include: + /// + /// + /// + /// Uniqueness + /// + /// Each is guaranteed to be unique for a specific host, considering both the URI and proxy settings. + /// + /// + /// + /// Hashing + /// + /// The struct provides a method to calculate a hash code for a , making it suitable for use as a dictionary key. + /// + /// + /// + /// Creation + /// + /// You can create a instance from a and optional . + /// + /// + /// + /// + /// Usage of the struct is typically handled internally by the BestHTTP library to manage unique hosts and optimize resource usage. + /// Developers can use it when dealing with host-specific operations or customization of the library's behavior. + /// + /// + public readonly struct HostKey + { + /// + /// Gets the URI (Uniform Resource Identifier) associated with the host. + /// + public readonly Uri Uri; + + /// + /// Gets the proxy settings associated with the host. + /// + public readonly ProxySettings Proxy; + + /// + /// Gets the unique hash key for the host. + /// + public readonly Hash128 Key; + + /// + /// Gets the host name from the URI or "file" if the URI is a file URI. + /// + public string Host { get => !this.Uri.IsFile ? this.Uri.Host : "file"; } + + /// + /// Initializes a new instance of the struct with the specified URI and proxy settings. + /// + /// The URI of the host. + /// The proxy settings associated with the host, or null if no proxy is used. + public HostKey(Uri uri, ProxySettings proxy) + { + this.Uri = uri; + this.Proxy = proxy; + + this.Key = CalculateHash(uri, proxy); + } + + public override bool Equals(object obj) => obj switch + { + HostKey hostKey => hostKey.Equals(this), + _ => false + }; + + public bool Equals(HostKey hostKey) => this.Key.Equals(hostKey.Key); + + public override int GetHashCode() => this.Key.GetHashCode(); + + public override string ToString() => $"{{\"Uri\":\"{this.Uri.GetComponents(UriComponents.SchemeAndServer, UriFormat.Unescaped)}\", \"Proxy\": {this.Proxy.ToString()}, \"Key\": {this.Key.ToString()}}}"; + + private static Hash128 CalculateHash(Uri uri, ProxySettings proxy) + { + Hash128 hash = new Hash128(); + + Append(uri, ref hash); + proxy?.AddToHash(uri, ref hash); + + return hash; + } + + internal static void Append(Uri uri, ref Hash128 hash) + { + if (uri != null) + { + hash.Append(uri.Scheme); + hash.Append(uri.Host); + hash.Append(uri.Port); + } + } + + /// + /// Creates a instance from an HTTP request. + /// + /// The HTTP request from which to extract the current URI and proxy settings. + /// A representing the host of the HTTP request. + public static HostKey From(HTTPRequest request) => new HostKey(request.CurrentUri, request.ProxySettings); + + /// + /// Creates a instance from a URI and proxy settings. + /// + /// The URI of the host. + /// The proxy settings associated with the host, or null if no proxy is used. + /// A representing the host with the given URI and proxy settings. + public static HostKey From(Uri uri, ProxySettings proxy) => new HostKey(uri, proxy); + } + + internal sealed class HostKeyEqualityComparer : IEqualityComparer + { + public bool Equals(HostKey x, HostKey y) => x.Equals(y); + public int GetHashCode(HostKey obj) => obj.GetHashCode(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs.meta new file mode 100644 index 00000000..aed98fe5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 19e27b6611d69a348b1cd90fe7fb4cfb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostKey.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs new file mode 100644 index 00000000..3a5b229a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs @@ -0,0 +1,150 @@ +using System.Collections.Generic; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared; + +namespace Best.HTTP.HostSetting +{ + /* + ┌───────────────┐ + ┌──────┤ HostManager ├──────────────────────┐ + │ └───────────────┘ │ + │ │ + ┌──────────▼───────┐ ┌──────────▼────────┐ + │ HostVariant │ │ HostVariant │ + │(http://host:port)│ │(https://host:port)│ + ┌────┴──────┬──────────┬┘ ┌────┴──────┬───────────┬┘ + │ │ │ │ │ │ + ┌──────▼──────┐ ┌──▼──┐ ▼ ┌──────▼──────┐ ┌──▼──┐ ▼ + │ Connections │ │Queue│ ProtocolSupport │ Connections │ │Queue│ ProtocolSupport + ├─────────────┤ ├─────┤ (http/1.1) ├─────────────┤ ├─────┤ (http/1.1, h2) + │ ... │ │ ... │ │ ... │ │ ... │ + │ ... │ │ ... │ │ ... │ │ ... │ + │ ... │ │ ... │ │ ... │ │ ... │ + │ ... │ │ ... │ │ ... │ │ ... │ + └─────────────┘ └─────┘ └─────────────┘ └─────┘ + */ + /// + /// The class provides centralized management for objects associated with HTTP requests and connections. + /// + /// + /// + /// The class acts as a central registry for managing objects, each associated with a unique . + /// It facilitates the creation, retrieval, and management of instances based on HTTP requests and connections. + /// + /// + /// A represents a specific host and port combination (e.g., "http://example.com:80" or "https://example.com:443") and + /// manages the connections and request queues for that host. The class ensures that a single instance is used for + /// each unique host, helping optimize resource usage and connection pooling. + /// + /// + /// Key features of the class include: + /// + /// + /// + /// Creation and Retrieval + /// + /// The class allows you to create and retrieve instances based on HTTP requests, connections, or . + /// It ensures that a single is used for each unique host. + /// + /// + /// + /// Queue Management + /// + /// The manages the queue of pending requests for each , ensuring efficient request processing. + /// + /// + /// + /// Connection Management + /// + /// The class handles the management of connections associated with objects, including recycling idle connections, + /// removing idle connections, and shutting down connections when needed. + /// + /// + /// + /// + /// Usage of the class is typically transparent to developers and is handled internally by the Best HTTP library. However, + /// it provides a convenient and efficient way to manage connections and requests when needed. + /// + /// + public static class HostManager + { + /// + /// Dictionary to store - mappings. + /// + private static Dictionary hosts = new Dictionary(new HostKeyEqualityComparer()); + + /// + /// Gets the associated with an HTTP request. + /// + /// The HTTP request. + /// The for the request's host. + public static HostVariant GetHostVariant(HTTPRequest request) => GetHostVariant(request.CurrentHostKey); + + /// + /// Gets the associated with a connection. + /// + /// The HTTP connection. + /// The for the connection's host. + public static HostVariant GetHostVariant(ConnectionBase connection) => GetHostVariant(connection.HostKey); + + /// + /// Gets the associated with a HostKey. + /// + /// The HostKey for which to get the HostVariant. + /// The for the specified HostKey. + public static HostVariant GetHostVariant(HostKey key) + { + if (!hosts.TryGetValue(key, out var variant)) + { + var settings = HTTPManager.PerHostSettings.Get(key).HostVariantSettings; + + variant = settings?.VariantFactory?.Invoke(settings, key) ?? new HostVariant(key); + + hosts.Add(key, variant); + + HTTPManager.Logger.Information("HostManager", $"Variant added with key: {key}"); + } + + return variant; + } + + /// + /// Removes all idle connections for all hosts. + /// + public static void RemoveAllIdleConnections() + { + HTTPManager.Logger.Information("HostManager", "RemoveAllIdleConnections"); + foreach (var host in hosts) + host.Value.RemoveAllIdleConnections(); + } + + /// + /// Tries to send queued requests for all hosts. + /// + public static void TryToSendQueuedRequests() + { + foreach (var kvp in hosts) + kvp.Value.TryToSendQueuedRequests(); + } + + /// + /// Shuts down all connections for all hosts. + /// + public static void Shutdown() + { + HTTPManager.Logger.Information("HostManager", "Shutdown()"); + foreach (var kvp in hosts) + kvp.Value.Shutdown(); + } + + /// + /// Clears all hosts and their associated variants. + /// + public static void Clear() + { + HTTPManager.Logger.Information("HostManager", "Clearing()"); + hosts.Clear(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs.meta new file mode 100644 index 00000000..5e3ef422 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8717fe3a1943db149958dd51a8dc3a86 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs new file mode 100644 index 00000000..92c927dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs @@ -0,0 +1,352 @@ +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Hosts.Connections.File; +using Best.HTTP.Hosts.Settings; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using System; +using System.Collections.Generic; +using System.Globalization; + +namespace Best.HTTP.HostSetting +{ + /// + /// An enumeration representing the protocol support for a host. + /// + public enum HostProtocolSupport : byte + { + /// + /// Protocol support is unknown or undetermined. + /// + Unknown = 0x00, + + /// + /// The host supports HTTP/1. + /// + HTTP1 = 0x01, + + /// + /// The host supports HTTP/2. + /// + HTTP2 = 0x02, + + /// + /// This is a file-based host. + /// + File = 0x03, + } + + /// + /// The HostVariant class is a critical component in managing HTTP connections and handling HTTP requests for a specific host. It maintains a queue of requests and a list of active connections associated with the host, ensuring efficient utilization of available resources. Additionally, it supports protocol version detection (HTTP/1 or HTTP/2) for optimized communication with the host. + /// + /// It maintains a queue of requests to ensure efficient and controlled use of available connections. + /// It supports HTTP/1 and HTTP/2 protocol versions, allowing requests to be sent using the appropriate protocol based on the host's protocol support. + /// Provides methods for sending requests, recycling connections, managing connection state, and handling the shutdown of connections and the host variant itself. + /// It includes logging for diagnostic purposes, helping to monitor and debug the behavior of connections and requests. + /// + /// In summary, the HostVariant class plays a central role in managing HTTP connections and requests for a specific host, ensuring efficient and reliable communication with that host while supporting different protocol versions. + /// + public class HostVariant + { + public HostKey Host { get; private set; } + + public HostProtocolSupport ProtocolSupport { get; private set; } + + public DateTime LastProtocolSupportUpdate { get; private set; } + + public LoggingContext Context { get; private set; } + + // All the connections. Free and processing ones too. + protected List Connections = new List(); + + // Queued requests that aren't passed yet to a connection. + protected Queue Queue = new Queue(); + + // Host-variant settings + protected HostVariantSettings _settings; + + // Cached list + protected List> availableConnections; + + public HostVariant(HostKey host) + { + this.Host = host; + if (this.Host.Uri.IsFile) + this.ProtocolSupport = HostProtocolSupport.File; + + this.Context = new LoggingContext(this); + this.Context.Add("Host", this.Host.Host); + + this._settings = HTTPManager.PerHostSettings.Get(this).HostVariantSettings; + this.availableConnections = new List>(2); + } + + public virtual void AddProtocol(HostProtocolSupport protocolSupport) + { + this.LastProtocolSupportUpdate = HTTPManager.CurrentFrameDateTime; + + var oldProtocol = this.ProtocolSupport; + + if (oldProtocol != protocolSupport) + { + this.ProtocolSupport = protocolSupport; + + HTTPManager.Logger.Information(nameof(HostVariant), $"AddProtocol({oldProtocol} => {protocolSupport})", this.Context); + } + + TryToSendQueuedRequests(); + } + + public virtual HostVariant Send(HTTPRequest request) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HostVariant), $"Send({request})", this.Context); + + request.Context.Remove(nameof(HostVariant)); + request.Context.Add(nameof(HostVariant), this.Context); + + this.Queue.Enqueue(request); + return TryToSendQueuedRequests(); + } + + public virtual HostVariant TryToSendQueuedRequests() + { + if (this.Queue.Count == 0) + return this; + + (int activeConnections, int theoreticalMaximumPerConnection, int assignedRequests) = QueryAnyAvailableOrNew(ref availableConnections); + + if (availableConnections.Count == 0) + { +#if !UNITY_WEBGL || UNITY_EDITOR + if (activeConnections > 0 && this.ProtocolSupport == HostProtocolSupport.Unknown) + return this; +#endif + + if (activeConnections < this._settings.MaxConnectionPerVariant) + { + int queueSize = this.Queue.Count; + int currentMaximum = (activeConnections * theoreticalMaximumPerConnection) - assignedRequests; + + while (activeConnections < this._settings.MaxConnectionPerVariant && currentMaximum < queueSize) + { + availableConnections.Add(new KeyValuePair(0, CreateNew())); + currentMaximum += theoreticalMaximumPerConnection; + activeConnections++; + } + } + else + return this; + } + + // Sort connections by theirs key (assigned requests count) + availableConnections.Sort((a, b) => a.Key - b.Key); + + while (this.Queue.Count > 0 && availableConnections.Count > 0) + { + var nextRequest = this.Queue.Peek(); + + // If the queue is large, or timeouts are set low, a request might be in a queue while its state is set to > Finished. + // So we have to prevent sending it again. + + if (nextRequest.State <= HTTPRequestStates.Queued) + { + var kvp = availableConnections[0]; + + if (HTTPManager.Logger.IsDiagnostic) + { + nextRequest.Context.Remove(nameof(HostVariant)); + nextRequest.Context.Add(nameof(HostVariant), this.Context); + + var key = kvp.Value.GetType().Name; + nextRequest.Context.Add(key, kvp.Value.Context); + + HTTPManager.Logger.Information(nameof(HostVariant), $"Send({nextRequest.Context.Hash}, {key} => {kvp.Value.Context.Hash})", nextRequest.Context); + } + + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(nextRequest, HTTPRequestStates.Processing, null)); + + OnConnectionStartedProcessingRequest(kvp.Value, nextRequest); + // then start process the request + kvp.Value.Process(nextRequest); + + if (kvp.Key + 1 >= kvp.Value.MaxAssignedRequests) + availableConnections.RemoveAt(0); + else + availableConnections[0] = new KeyValuePair(kvp.Key + 1, kvp.Value); + + availableConnections.Sort((a, b) => a.Key - b.Key); + } + + this.Queue.Dequeue(); + } + + return this; + } + + public virtual (int activeConnections, int theoreticalMaximumPerConnection, int assignedRequests) QueryAnyAvailableOrNew(ref List> connectionCollector) + { + int activeConnections = 0; + int maxAssignedRequest = 1; + int assignedRequests = 0; + + connectionCollector.Clear(); + + // Check the last created connection first. This way, if a higher level protocol is present that can handle more requests (== HTTP/2) that protocol will be chosen + // and others will be closed when their inactivity time is reached. + for (int i = Connections.Count - 1; i >= 0; --i) + { + var conn = Connections[i]; + + if (conn.State == HTTPConnectionStates.Initial || + conn.State == HTTPConnectionStates.Free || + (conn.CanProcessMultiple && conn.AssignedRequests < conn.MaxAssignedRequests)) + connectionCollector.Add(new KeyValuePair(conn.AssignedRequests, conn)); + + maxAssignedRequest = Math.Max(maxAssignedRequest, conn.MaxAssignedRequests); + assignedRequests += conn.AssignedRequests; + + activeConnections++; + } + + return (activeConnections, Math.Max(1, (int)(maxAssignedRequest * this._settings.MaxAssignedRequestsFactor)), assignedRequests); + } + + public virtual ConnectionBase CreateNew() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HostVariant), $"CreateNew({this.Host})", this.Context); + + ConnectionBase conn = this._settings.ConnectionFactory?.Invoke(this._settings, this); + + if (conn == null) + { + if (this.ProtocolSupport == HostProtocolSupport.File) + conn = new FileConnection(this.Host); + else + { +#if UNITY_WEBGL && !UNITY_EDITOR + conn = new Best.HTTP.Hosts.Connections.WebGL.WebGLXHRConnection(this.Host); +#else + conn = new HTTPOverTCPConnection(this.Host); +#endif + } + } + + Connections.Add(conn); + + return conn; + } + + protected virtual void OnConnectionStartedProcessingRequest(ConnectionBase connection, HTTPRequest request) + { + + } + + public virtual HostVariant RecycleConnection(ConnectionBase conn) + { + conn.State = HTTPConnectionStates.Free; + + Best.HTTP.Shared.Extensions.Timer.Add(new TimerData(TimeSpan.FromSeconds(1), conn, CloseConnectionAfterInactivity)); + + return this; + } + + protected virtual bool RemoveConnectionImpl(ConnectionBase conn, HTTPConnectionStates setState) + { + HTTPManager.Logger.Information(typeof(HostVariant).Name, $"RemoveConnectionImpl({conn}, {setState})", this.Context); + + conn.State = setState; + conn.Dispose(); + + bool found = this.Connections.Remove(conn); + + if (!found) // + HTTPManager.Logger.Information(typeof(HostVariant).Name, $"RemoveConnectionImpl - Couldn't find connection! key: {conn.HostKey}", this.Context); + + return found; + } + + public virtual HostVariant RemoveConnection(ConnectionBase conn, HTTPConnectionStates setState) + { + RemoveConnectionImpl(conn, setState); + + return this; + } + + public ConnectionBase Find(Predicate match) => this.Connections.Find(match); + + public bool HasConnection(ConnectionBase connection) => this.Connections.Contains(connection); + + protected virtual bool CloseConnectionAfterInactivity(DateTime now, object context) + { + var conn = context as ConnectionBase; + + bool closeConnection = conn.State == HTTPConnectionStates.Free && now - conn.LastProcessTime >= conn.KeepAliveTime; + if (closeConnection) + { + HTTPManager.Logger.Information(typeof(HostVariant).Name, string.Format("CloseConnectionAfterInactivity - [{0}] Closing! State: {1}, Now: {2}, LastProcessTime: {3}, KeepAliveTime: {4}", + conn.ToString(), conn.State, now.ToString(System.Globalization.CultureInfo.InvariantCulture), conn.LastProcessTime.ToString(System.Globalization.CultureInfo.InvariantCulture), conn.KeepAliveTime), this.Context); + + RemoveConnection(conn, HTTPConnectionStates.Closed); + return false; + } + + // repeat until the connection's state is free + return conn.State == HTTPConnectionStates.Free; + } + + public virtual void RemoveAllIdleConnections() + { + for (int i = 0; i < this.Connections.Count; i++) + if (this.Connections[i].State == HTTPConnectionStates.Free) + { + int countBefore = this.Connections.Count; + RemoveConnection(this.Connections[i], HTTPConnectionStates.Closed); + + if (countBefore != this.Connections.Count) + i--; + } + } + + public virtual void Shutdown() + { + this.Queue.Clear(); + + foreach (var conn in this.Connections) + { + // Swallow any exceptions, we are quitting anyway. + try + { + conn.Shutdown(ShutdownTypes.Immediate); + } + catch { } + } + //this.Connections.Clear(); + } + + public virtual void SaveTo(System.IO.BinaryWriter bw) + { + bw.Write(this.LastProtocolSupportUpdate.ToBinary()); + bw.Write((byte)this.ProtocolSupport); + } + + public virtual void LoadFrom(int version, System.IO.BinaryReader br) + { + this.LastProtocolSupportUpdate = DateTime.FromBinary(br.ReadInt64()); + this.ProtocolSupport = (HostProtocolSupport)br.ReadByte(); + + if (DateTime.UtcNow - this.LastProtocolSupportUpdate >= TimeSpan.FromDays(1)) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HostVariant), $"LoadFrom - Too Old! LastProtocolSupportUpdate: {this.LastProtocolSupportUpdate.ToString(CultureInfo.InvariantCulture)}, ProtocolSupport: {this.ProtocolSupport}", this.Context); + this.ProtocolSupport = HostProtocolSupport.Unknown; + } + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(HostVariant), $"LoadFrom - LastProtocolSupportUpdate: {this.LastProtocolSupportUpdate.ToString(CultureInfo.InvariantCulture)}, ProtocolSupport: {this.ProtocolSupport}", this.Context); + } + + public override string ToString() => $"{this.Host}, {this.Queue.Count}/{this.Connections?.Count}, {this.ProtocolSupport}"; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs.meta new file mode 100644 index 00000000..73fbe806 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc3e7ed2db74f6b46aed6ce220fea2e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Manager/HostVariant.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings.meta new file mode 100644 index 00000000..8733acd0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7a347efe8fc532a4ab45fd07ee707989 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs new file mode 100644 index 00000000..6ee23be7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs @@ -0,0 +1,36 @@ +using System.Collections.Generic; + +namespace Best.HTTP.Hosts.Settings +{ + /// + /// Moves any added asterisk(*) to the end of the list. + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstruction] + internal sealed class AsteriskStringComparer : IComparer + { + public static readonly AsteriskStringComparer Instance = new AsteriskStringComparer(); + + public int Compare(string x, string y) + /*{ + var comparedTo = x.CompareTo(y); + + // Equal? + if (comparedTo == 0) + return 0; + + return (x, y) switch + { + ("*", _) => 1, + (_, "*") => -1, + _ => x.CompareTo(y) + }; + }*/ + => (x, y) switch + { + ("*", "*") => 0, + ("*", _) => 1, + (_, "*") => -1, + _ => x.CompareTo(y) + }; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs.meta new file mode 100644 index 00000000..99474028 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: df72827b7ff4ad04cb70fdad8c347622 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/AsteriskStringComparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs new file mode 100644 index 00000000..0c774c62 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs @@ -0,0 +1,304 @@ +using System; +using System.Collections.Generic; +using System.Net.Security; +using System.Security.Cryptography.X509Certificates; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.HostSetting; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; + +namespace Best.HTTP.Hosts.Settings +{ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) + /// + /// Delegate for creating a TLS 1.3 client instance. + /// + /// The URI of the request. + /// A list of supported TLS ALPN protocols. + /// The logging context for the operation. + /// A TLS 1.3 client instance. + public delegate Best.HTTP.Shared.TLS.AbstractTls13Client TlsClientFactoryDelegate(Uri uri, List protocols, LoggingContext context); +#endif + + /// + /// Settings for HTTP requests. + /// + public class HTTRequestSettings + { + /// + /// The timeout for establishing a connection. + /// + public TimeSpan ConnectTimeout = TimeSpan.FromSeconds(20); + + /// + /// The maximum time allowed for the request to complete. + /// + public TimeSpan RequestTimeout = TimeSpan.MaxValue; + } + + /// + /// Settings for HTTP/1 connections. + /// + public class HTTP1ConnectionSettings + { + /// + /// Indicates whether the connection should be open after receiving the response. + /// + /// + /// If set to true, internal TCP connections will be reused whenever possible. + /// If making rare requests to the server, it's recommended to change this to false. + /// + public bool TryToReuseConnections = true; + + /// + /// The maximum time a connection can remain idle before being closed. + /// + public TimeSpan MaxConnectionIdleTime = TimeSpan.FromSeconds(20); + + /// + /// Indicates whether the upload thread should use a ThreadPool thread instead of creating and using a Thread. + /// + /// The plugin tries to use ThreadPool threads for known short-living uploads like requests without upload body. With ForceUseThreadPool all HTTP/1 requests, including long uploads or downloads can be forced to use ThreadPool threads. + public bool ForceUseThreadPool; + + } + +#if !UNITY_WEBGL || UNITY_EDITOR + + /// + /// Delegate for selecting a client certificate. + /// + /// The target host. + /// A collection of local certificates. + /// The remote certificate. + /// An array of acceptable certificate issuers. + /// The selected X.509 certificate. + public delegate X509Certificate ClientCertificateSelector(string targetHost, X509CertificateCollection localCertificates, X509Certificate remoteCertificate, string[] acceptableIssuers); + + /// + /// Available TLS handlers. + /// + public enum TLSHandlers + { +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + /// + /// To use the 3rd party BouncyCastle implementation. + /// + BouncyCastle = 0x00, +#endif + + /// + /// To use .net's SslStream. + /// + Framework = 0x01 + } + + /// + /// Settings for Bouncy Castle TLS. + /// + public class BouncyCastleSettings + { +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + /// + /// Delegate for creating a TLS 1.3 client instance using Bouncy Castle. + /// + public TlsClientFactoryDelegate TlsClientFactory; + + /// + /// The default TLS 1.3 client factory. + /// + /// The URI of the request. + /// A list of supported TLS ALPN protocols. + /// The logging context for the operation. + /// A TLS 1.3 client instance. + public static Best.HTTP.Shared.TLS.AbstractTls13Client DefaultTlsClientFactory(Uri uri, List protocols, LoggingContext context) + { + // http://tools.ietf.org/html/rfc3546#section-3.1 + // -It is RECOMMENDED that clients include an extension of type "server_name" in the client hello whenever they locate a server by a supported name type. + // -Literal IPv4 and IPv6 addresses are not permitted in "HostName". + + // User-defined list has a higher priority + List hostNames = null; + + // If there's no user defined one and the host isn't an IP address, add the default one + if (!uri.IsHostIsAnIPAddress()) + { + hostNames = new List(1); + hostNames.Add(new Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.ServerName(0, System.Text.Encoding.UTF8.GetBytes(uri.Host))); + } + + return new Best.HTTP.Shared.TLS.DefaultTls13Client(hostNames, protocols, context); + } +#endif + } + + /// + /// Settings for .NET's SslStream based handler. + /// + public class FrameworkTLSSettings + { + /// + /// The supported TLS versions. + /// + public System.Security.Authentication.SslProtocols TlsVersions = System.Security.Authentication.SslProtocols.Tls12; + + /// + /// Indicates whether to check certificate revocation. + /// + public bool CheckCertificateRevocation = true; + + /// + /// The default certification validator. + /// + public static Func DefaultCertificationValidator = (host, certificate, chain, sslPolicyErrors) => true; + + public Func CertificationValidator = DefaultCertificationValidator; + + /// + /// Delegate for providing a client certificate. + /// + public ClientCertificateSelector ClientCertificationProvider; + } + + /// + /// Settings for TLS. + /// + public class TLSSettings + { + /// + /// The selected TLS handler. + /// + public TLSHandlers TLSHandler +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + = TLSHandlers.BouncyCastle; +#else + = TLSHandlers.Framework; +#endif + + /// + /// Settings for Bouncy Castle. + /// + public BouncyCastleSettings BouncyCastleSettings = new BouncyCastleSettings(); + + /// + /// .NET's SslStream settings. + /// + public FrameworkTLSSettings FrameworkTLSSettings = new FrameworkTLSSettings(); + } +#endif + + /// + /// Settings for s. + /// + public class HostVariantSettings + { + /// + /// The maximum number of connections allowed per host variant. + /// + public int MaxConnectionPerVariant = 6; + + /// + /// Factor used when calculations are made whether to open a new connection to the server or not. + /// + /// + /// It has an effect on HTTP/2 connections only. + /// Higher values (gte 1.0f) delay, lower values (lte 1.0f) bring forward creation of new connections. + /// + public float MaxAssignedRequestsFactor = 1.2f; + + /// + /// Factory function to generate HostVariant or descendent instances. + /// + public Func VariantFactory = (settings, key) => new HostVariant(key); + + /// + /// Factory function to generate custom connection implementations. + /// + public Func ConnectionFactory; + } + + /// + /// Represents the low-level TCP buffer settings for connections. + /// + public class LowLevelConnectionSettings + { + /// + /// Gets or sets the size of the TCP write buffer in bytes. + /// + /// + /// Default value is 1 MiB. + /// This determines the maximum amount of data that that the class can buffer up if it's already in a write operation. + /// Increasing this value can potentially improve write performance, especially for large messages or data streams. + /// However, setting it too high might consume a significant amount of memory, especially if there are many active connections. + /// + /// + /// The size of the TCP write buffer in bytes. + public uint TCPWriteBufferSize = 1024 * 1024; + + /// + /// Gets or sets the size of the read buffer in bytes. + /// + /// The size of the read buffer in bytes. + /// + /// Default value is 1 MiB. + /// This determines the maximum amount of data that low level streams and the can buffer up for consuming by higher level layers. + /// Adjusting this value can affect the read performance of the application. + /// Like the write buffer, setting this too high might be memory-intensive, especially with many connections. + /// It's advised to find a balance that suits the application's needs and resources. + /// + /// + public uint ReadBufferSize = 1024 * 1024; + } + + /// + /// Contains settings that can be associated with a specific host or host variant. + /// + public class HostSettings + { + /// + /// Gets or sets the low-level TCP buffer settings for connections associated with the host or host variant. + /// + /// The low-level TCP buffer settings. + /// + /// These settings determine the buffer sizes for reading from and writing to TCP connections, + /// which can impact performance and memory usage. + /// + public LowLevelConnectionSettings LowLevelConnectionSettings = new LowLevelConnectionSettings(); + + /// + /// Settings related to HTTP requests made to this host or host variant. + /// + public HTTRequestSettings RequestSettings = new HTTRequestSettings(); + + /// + /// Settings related to HTTP/1.x connection behavior. + /// + public HTTP1ConnectionSettings HTTP1ConnectionSettings = new HTTP1ConnectionSettings(); + +#if !UNITY_WEBGL || UNITY_EDITOR + /// + /// Settings related to TCP Ringmaster used in non-webgl platforms. + /// + public TCPRingmasterSettings TCPRingmasterSettings = new TCPRingmasterSettings(); + +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + /// + /// Settings related to HTTP/2 connection behavior. + /// + public Best.HTTP.Hosts.Connections.HTTP2.HTTP2ConnectionSettings HTTP2ConnectionSettings = new Connections.HTTP2.HTTP2ConnectionSettings(); +#endif + + /// + /// Settings related to TLS (Transport Layer Security) behavior. + /// + public TLSSettings TLSSettings = new TLSSettings(); +#endif + + /// + /// Settings related to behavior. + /// + public HostVariantSettings HostVariantSettings = new HostVariantSettings(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs.meta new file mode 100644 index 00000000..eb988841 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 192e9a6509024184c90042a41aec6274 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs new file mode 100644 index 00000000..b547546a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs @@ -0,0 +1,194 @@ +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Linq; +using System.Threading; + +using Best.HTTP.HostSetting; +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Hosts.Settings +{ + /** + * Host Settings Hierarchy for the following hosts, settings are stored as leafs: + * + * *.com + * *.example.com + * example.com + * + * '*' matches one or more subdomains so *.example.com + * - matches a.example.com and a.b.example.com + * - but doesn't match example.com! + * + * + * + * [com] [localhost] [org] [*] + * +------+------+ | | | + * | | [setting] [*] [setting] + * [example] [*] | + * / \ | [setting] + * [b] [setting] [setting] + * | + * [a] + * | + * [setting] + * */ + + /// + /// Manages host-specific settings for HTTP requests based on hostnames. + /// The HostSettingsManager is a powerful tool for fine-tuning HTTP request and connection behaviors + /// on a per-host basis. It enables you to define custom settings for specific hostnames + /// while maintaining default settings for all other hosts. This level of granularity allows you to + /// optimize and customize HTTP requests for different endpoints within your application. + /// + /// + /// When host-specific settings are not found for a given host variant, the default + /// associated with the "*" host will be returned. + /// + public sealed class HostSettingsManager + { + private const char SPLITTER = '.'; + + private SortedList _rootNodes = new SortedList(AsteriskStringComparer.Instance); + private List _segments = new List(4); + + private ConcurrentDictionary _cache = new ConcurrentDictionary(); + + /// + /// Initializes a new instance of the class with default settings for all hosts ("*"). + /// + public HostSettingsManager() => Add("*", new HostSettings()); + + /// + /// Adds default settings for the host part of the specified URI. This is equivalent to calling with the a new . + /// + /// The URI for which default settings should be applied. Only the host part of the URI will be used. + /// A instance with default values. + public HostSettings AddDefault(Uri uri) => Add(uri, new HostSettings()); + + /// + /// Adds default settings for the the specified host name. This is equivalent to calling with the a new . + /// + /// The hostname for which default settings should be applied. + /// A instance with default values. + public HostSettings AddDefault(string hostname) => Add(hostname, new HostSettings()); + + /// + /// Adds host-specific settings for the host part of the specified URI. + /// + /// The URI for which settings should be applied. Only the host part of the URI will be used. + /// The to apply. + public HostSettings Add(Uri uri, HostSettings settings) => Add(uri.Host, settings); + + /// + /// Adds host-specific settings for the specified hostname. + /// + /// The hostname for which settings should be applied. + /// The to apply. + /// Thrown when either the hostname or settings is null. + /// Thrown when the hostname contains more than one asterisk ('*'). + public HostSettings Add(string hostname, HostSettings settings) + { + if (string.IsNullOrEmpty(hostname)) + throw new ArgumentNullException(nameof(hostname)); + + if (settings == null) + throw new ArgumentNullException(nameof(settings)); + + if (hostname.IndexOf('*') != hostname.LastIndexOf('*')) + throw new FormatException($"{nameof(hostname)} (\"{hostname}\") MUST contain only one '*'!"); + + // From "a.b.example.com" create a list: [ "com", "example", "b", "a"] + lock(this._segments) + { + this._segments.Clear(); + this._segments.AddRange(hostname.Split(SPLITTER, StringSplitOptions.RemoveEmptyEntries)); + this._segments.Reverse(); + + string subKey = this._segments[0]; + this._segments.RemoveAt(0); + + if (!_rootNodes.TryGetValue(subKey, out var node)) + _rootNodes.Add(subKey, node = new Node(subKey, null)); + + node.Add(this._segments, settings); + + this._cache.Clear(); + } + + return settings; + } + + /// + /// Gets for the host part of the specified . Returns the default settings associated with "*" when not found. + /// + /// The for which settings should be retrieved. Only the host part of the variant will be used. + /// The host settings for the specified host variant or the default settings for "*" if not found. + public HostSettings Get(HostVariant variant, bool fallbackToWildcard = true) => Get(variant.Host, fallbackToWildcard); + + /// + /// Gets for the host part of the specified . Returns the default settings associated with "*" when not found. + /// + /// The for which settings should be retrieved. Only the host part of the host key will be used. + /// The host settings for the specified host key or the default settings for "*" if not found. + public HostSettings Get(HostKey hostKey, bool fallbackToWildcard = true) => Get(hostKey.Host, fallbackToWildcard); + + /// + /// Gets for the host part of the specified . Returns the default settings associated with "*" when not found. + /// + /// The for which settings should be retrieved. Only the host part of the URI will be used. + /// The host settings for the specified URI or the default settings for "*" if not found. + public HostSettings Get(Uri uri, bool fallbackToWildcard = true) => Get(uri.Host, fallbackToWildcard); + + /// + /// Gets for the host part of the specified hostname. Returns the default settings associated with "*" when not found. + /// + /// The hostname for which settings should be retrieved. Only the host part of the hostname will be used. + /// The host settings for the specified hostname or the default settings for "*" if not found. + /// Thrown when the hostname is null. + public HostSettings Get(string hostname, bool fallbackToWildcard = true) + { + if (string.IsNullOrEmpty(hostname)) + throw new ArgumentNullException(nameof(hostname)); + + HostSettings foundSettings = null; + + if (this._cache.TryGetValue(hostname, out foundSettings)) + return foundSettings; + + lock (this._segments) + { + // This splits the hostname (a.b.c.tld) into segments (["a", "b", "c", "tld"]), reverse it (["tld", "c", "b", "a"]) + // and creates a final List object. + this._segments.Clear(); + this._segments.AddRange(hostname.Split(SPLITTER, StringSplitOptions.RemoveEmptyEntries)); + this._segments.Reverse(); + + string subKey = this._segments[0]; + this._segments.RemoveAt(0); + + if (_rootNodes.TryGetValue(subKey, out var node)) + foundSettings = node.Find(this._segments); + } + + if (fallbackToWildcard && foundSettings == null && _rootNodes.TryGetValue("*", out var asteriskNode)) + foundSettings = asteriskNode.hostSettings; + + if (foundSettings != null) + this._cache.AddOrUpdate(hostname, foundSettings, (key, settings) => foundSettings); + + return foundSettings; + } + + + /// + /// Clears all host-specific settings and resetting the default ("*") with default values. + /// + public void Clear() + { + _rootNodes.Clear(); + _cache.Clear(); + Add("*", new HostSettings()); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs.meta new file mode 100644 index 00000000..828fb982 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a86d4c63257f0e240a0051293ea70e54 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/HostSettingsManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs new file mode 100644 index 00000000..c7bf2ac4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs @@ -0,0 +1,64 @@ +using System.Collections.Generic; + +namespace Best.HTTP.Hosts.Settings +{ + internal sealed class Node + { + public string key; + public SortedList childNodes; + public HostSettings hostSettings; + + public Node(string key) => this.key = key; + public Node(string key, HostSettings settings) : this(key) => this.hostSettings = settings; + + public void Add(string subKey, Node subNode) + { + if (childNodes == null) + childNodes = new SortedList(AsteriskStringComparer.Instance); + + childNodes.Add(subKey, subNode); + } + + public void AddSetting(HostSettings settings) + { + this.hostSettings = settings; + } + + public void Add(List segments, HostSettings settings) + { + if (segments.Count == 0) + { + this.hostSettings = settings; + return; + } + + string subKey = segments[0]; + segments.RemoveAt(0); + + if (this.childNodes == null) + this.childNodes = new SortedList(AsteriskStringComparer.Instance); + + if (!this.childNodes.TryGetValue(subKey, out var node)) + this.childNodes.Add(subKey, node = new Node(subKey, null)); + + node.Add(segments, settings); + } + + public HostSettings Find(List segments) + { + if (segments.Count == 0) + return this.hostSettings; + + if (this.childNodes == null || this.childNodes.Count == 0) + return null; + + string subKey = segments[0]; + segments.RemoveAt(0); + + if (this.childNodes.TryGetValue(subKey, out var node)) + return node.Find(segments); + + return null; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs.meta new file mode 100644 index 00000000..0401edab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 30f0ce3004e4fb24993e48a1ed91de02 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Hosts/Settings/Node.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies.meta new file mode 100644 index 00000000..7001e7fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 019007b3881225c449e6704b6b0b5058 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect.meta new file mode 100644 index 00000000..493d15d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3369a45fdd3747b44aca8c6fbfd40732 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs new file mode 100644 index 00000000..1f41ae6f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs @@ -0,0 +1,67 @@ +#if UNITY_ANDROID && !UNITY_EDITOR +using System; + +using Best.HTTP.Shared; + +using UnityEngine; + +namespace Best.HTTP.Proxies.Autodetect +{ + public sealed class AndroidProxyDetector : IProxyDetector + { + private const string ClassPath = "com.Best.HTTP.proxy.ProxyFinder"; + + Proxy IProxyDetector.GetProxy(HTTPRequest request) + { + try + { + var proxyUrl = FindFor(request.CurrentUri.ToString()); + + HTTPManager.Logger.Information(nameof(AndroidProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - FindFor returned with proxyUrl: '{proxyUrl}'", request.Context); + + if (proxyUrl == null) + return null; + + if (proxyUrl.StartsWith("socks://", StringComparison.OrdinalIgnoreCase)) + { + return new SOCKSProxy(new Uri(proxyUrl), null); + } + else if (proxyUrl.StartsWith("http://", StringComparison.OrdinalIgnoreCase)) + { + return new HTTPProxy(new Uri(proxyUrl)); + } + else + { + HTTPManager.Logger.Warning(nameof(AndroidProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - FindFor returned with unknown format. proxyUrl: '{proxyUrl}'", request.Context); + } + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(AndroidProxyDetector), nameof(IProxyDetector.GetProxy), ex, request.Context); + } + + return null; + } + + private string FindFor(string uriStr) => Call("FindFor", uriStr); + + private static T Call(string methodName, params object[] args) + { + bool isMainThread = HTTPUpdateDelegator.Instance.IsMainThread(); + try + { + if (!isMainThread) + AndroidJNI.AttachCurrentThread(); + + using (var javaClass = new AndroidJavaClass(ClassPath)) + return javaClass.CallStatic(methodName, args); + } + finally + { + if (!isMainThread) + AndroidJNI.DetachCurrentThread(); + } + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs.meta new file mode 100644 index 00000000..5c4b8366 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa9c1e7ca4f4ea54cba5a91100ffa10b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/AndroidProxyDetector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs new file mode 100644 index 00000000..f39a255a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs @@ -0,0 +1,81 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Linq; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared; + +// Examples on proxy strings: +// https://gist.github.com/yougg/5d2b3353fc5e197a0917aae0b3287d64 + +namespace Best.HTTP.Proxies.Autodetect +{ + /// + /// Based on 's "Environment Variables" section. + /// + public sealed class EnvironmentProxyDetector : IProxyDetector + { + private Proxy _cachedProxy; + + Proxy IProxyDetector.GetProxy(HTTPRequest request) + { + if (this._cachedProxy != null) + return this._cachedProxy; + + string proxyUrl = null; + + if (HTTPProtocolFactory.IsSecureProtocol(request.CurrentUri)) + { + proxyUrl = GetEnv("HTTPS_PROXY"); + HTTPManager.Logger.Information(nameof(EnvironmentProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - HTTPS_PROXY: '{proxyUrl}'", request.Context); + } + else + { + proxyUrl = GetEnv("HTTP_PROXY"); + HTTPManager.Logger.Information(nameof(EnvironmentProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - HTTP_PROXY: '{proxyUrl}'", request.Context); + } + + if (proxyUrl == null) + { + proxyUrl = GetEnv("ALL_PROXY"); + } + else + HTTPManager.Logger.Information(nameof(EnvironmentProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - ALL_PROXY: '{proxyUrl}'", request.Context); + + if (string.IsNullOrEmpty(proxyUrl)) + return null; + + // if the url is just a host[:port], add the http:// part too. Checking for :// should keep and treat the socks:// scheme too. + if (proxyUrl.IndexOf("://") == -1 && !proxyUrl.StartsWith("http", StringComparison.OrdinalIgnoreCase)) + proxyUrl = "http://" + proxyUrl; + + string exceptionList = null; + try + { + var proxyUri = new Uri(proxyUrl); + + Proxy proxy = null; + if (proxyUri.Scheme.StartsWith("socks", StringComparison.OrdinalIgnoreCase)) + proxy = new SOCKSProxy(proxyUri, null); + else + proxy = new HTTPProxy(proxyUri); + + // A comma-separated list of host names that should not go through any proxy is set in (only an asterisk, * matches all hosts) + exceptionList = GetEnv("NO_PROXY"); + if (!string.IsNullOrEmpty(exceptionList)) + proxy.Exceptions = exceptionList.Split(';').ToList(); + + return this._cachedProxy = proxy; + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(EnvironmentProxyDetector), $"GetProxy - proxyUrl: '{proxyUrl}', exceptionList: '{exceptionList}'", ex, request.Context); + } + + return null; + } + + string GetEnv(string key) => System.Environment.GetEnvironmentVariable(key) ?? System.Environment.GetEnvironmentVariable(key.ToLowerInvariant()); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs.meta new file mode 100644 index 00000000..811c26a8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c43a242bd76482c4b9d41d7093047658 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/EnvironmentProxyDetector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs new file mode 100644 index 00000000..40f0c6a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs @@ -0,0 +1,69 @@ +#if !UNITY_WEBGL || UNITY_EDITOR + +using System; + +using Best.HTTP.Shared; + +namespace Best.HTTP.Proxies.Autodetect +{ + /// + /// This is a detector using the .net framework's implementation. It might work not just under Windows but MacOS and Linux too. + /// + /// + /// More details can be found here: + /// + /// HttpClient.DefaultProxy Property + /// + /// + public sealed class FrameworkProxyDetector : IProxyDetector + { + Proxy IProxyDetector.GetProxy(HTTPRequest request) + { + var detectedProxy = System.Net.WebRequest.GetSystemWebProxy() as System.Net.WebProxy; + if (detectedProxy != null && detectedProxy.Address != null) + { + var proxyUri = detectedProxy.GetProxy(request.CurrentUri); + if (proxyUri != null && !proxyUri.Equals(request.CurrentUri)) + { + if (proxyUri.Scheme.StartsWith("socks", StringComparison.OrdinalIgnoreCase)) + { + return SetExceptionList(new SOCKSProxy(proxyUri, null), detectedProxy); + } + else if (proxyUri.Scheme.StartsWith("http", StringComparison.OrdinalIgnoreCase)) + { + return SetExceptionList(new HTTPProxy(proxyUri), detectedProxy); + } + else + { + HTTPManager.Logger.Warning(nameof(FrameworkProxyDetector), $"{nameof(IProxyDetector.GetProxy)} - FindFor returned with unknown format. proxyUri: '{proxyUri}'", request.Context); + } + } + } + + return null; + } + + private Proxy SetExceptionList(Proxy proxy, System.Net.WebProxy detectedProxy) + { + if (detectedProxy.BypassProxyOnLocal) + { + proxy.Exceptions = proxy.Exceptions ?? new System.Collections.Generic.List(); + + proxy.Exceptions.Add("localhost"); + proxy.Exceptions.Add("127.0.0.1"); + } + + // TODO: use BypassList to put more entries to the Exceptions list. + // But because BypassList contains regex strings, we either + // 1.) store and use regex strings in the Exception list (not backward compatible) + // 2.) store non-regex strings but create a new list for regex + // 3.) detect if the stored entry in the Exceptions list is regex or not and use it accordingly + // "^.*\\.httpbin\\.org$" + // https://github.com/Benedicht/BestHTTP-Issues/issues/141 + + return proxy; + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs.meta new file mode 100644 index 00000000..9083cd1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9dcbe5fe0e354414e8e3c134836f4986 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/FrameworkProxyDetector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs new file mode 100644 index 00000000..be0d5e38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs @@ -0,0 +1,16 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Shared; + +namespace Best.HTTP.Proxies.Autodetect +{ + /// + /// This one just returns with HTTPManager.Proxy, + /// so when ProgrammaticallyAddedProxyDetector is used in the first place for the ProxyDetector, + /// HTTPManager.Proxy gets the highest priority. + /// + public sealed class ProgrammaticallyAddedProxyDetector : IProxyDetector + { + Proxy IProxyDetector.GetProxy(HTTPRequest request) => HTTPManager.Proxy; + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs.meta new file mode 100644 index 00000000..6485fbd1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bd7524aaa58af91418ca03146bd55dbc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProgrammaticallyAddedProxyDetector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs new file mode 100644 index 00000000..e9573f5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs @@ -0,0 +1,181 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Request.Timings; +using Best.HTTP.Shared; + +using System; + +namespace Best.HTTP.Proxies.Autodetect +{ + /// + /// Interface for custom proxy-detection logic. + /// + public interface IProxyDetector + { + /// + /// Receives the instance this detector has to try to find a proxy. + /// + /// instance to find a proxy for + /// A concrete implementation, or null if no proxy could be found. + Proxy GetProxy(HTTPRequest request); + } + + /// + /// Possible detection modes the can be in. + /// + public enum ProxyDetectionMode + { + /// + /// In Continuous mode the ProxyDetector will check for a proxy for every request. + /// + Continuous, + + /// + /// This mode will cache the first Proxy found and use it for consecutive requests. + /// + CacheFirstFound + } + + /// + /// Helper class to contain, manage and execute logic to detect available proxy on the network. It's a wrapper class to execute the various s. + /// + public sealed class ProxyDetector + { + public static IProxyDetector[] GetDefaultDetectors() => new IProxyDetector[] { + // HTTPManager.Proxy has the highest priority + new ProgrammaticallyAddedProxyDetector(), + + // then comes the environment set + new EnvironmentProxyDetector(), + + // .net framework's detector + new FrameworkProxyDetector(), + +#if UNITY_ANDROID && !UNITY_EDITOR + new AndroidProxyDetector(), +#endif + }; + + private IProxyDetector[] _proxyDetectors; + private ProxyDetectionMode _detectionMode; + private bool _attached; + + public ProxyDetector() + : this(ProxyDetectionMode.CacheFirstFound, GetDefaultDetectors()) + { } + + public ProxyDetector(ProxyDetectionMode detectionMode) + : this(detectionMode, GetDefaultDetectors()) + { } + + public ProxyDetector(ProxyDetectionMode detectionMode, IProxyDetector[] proxyDetectors) + { + this._detectionMode = detectionMode; + this._proxyDetectors = proxyDetectors; + + if (this._proxyDetectors != null) + Reattach(); + } + + public void Reattach() + { + HTTPManager.Logger.Information(nameof(ProxyDetector), $"{nameof(Reattach)}({this._attached})"); + + if (!this._attached) + { + RequestEventHelper.OnEvent += OnRequestEvent; + this._attached = true; + } + } + + /// + /// Call Detach() to disable ProxyDetector's logic to find and set a proxy. + /// + public void Detach() + { + HTTPManager.Logger.Information(nameof(ProxyDetector), $"{nameof(Detach)}({this._attached})"); + + if (this._attached) + { + RequestEventHelper.OnEvent -= OnRequestEvent; + this._attached = false; + } + } + + private void OnRequestEvent(RequestEventInfo @event) + { + // The Resend event is raised for every request when it's queued up (sent or redirected). + if (@event.Event == RequestEvents.QueuedResend && + @event.SourceRequest.ProxySettings != null && + @event.SourceRequest.ProxySettings.Proxy == null) + { + Uri uri = @event.SourceRequest.CurrentUri; + + if (uri.Scheme.Equals("file")) + return; + + @event.SourceRequest.Timing.StartNext(TimingEventNames.ProxyDetection); + + try + { + for (int i = 0; i < this._proxyDetectors.Length; i++) + { + var detector = this._proxyDetectors[i]; + + if (detector == null) + continue; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(ProxyDetector), $"Calling {detector.GetType().Name}'s GetProxy", @event.SourceRequest.Context); + + Proxy proxy = null; + +#if ENABLE_PROFILER + using (var _ = new Unity.Profiling.ProfilerMarker($"{detector.GetType().Name}.GetProxy").Auto()) +#endif + proxy = detector.GetProxy(@event.SourceRequest); + +#if ENABLE_PROFILER + using (var _ = new Unity.Profiling.ProfilerMarker($"{detector.GetType().Name}.UseProxyForAddress").Auto()) +#endif + if (proxy != null && proxy.UseProxyForAddress(uri)) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(ProxyDetector), $"[{detector.GetType().Name}] Proxy found: {proxy.Address} ", @event.SourceRequest.Context); + + switch (this._detectionMode) + { + case ProxyDetectionMode.Continuous: + @event.SourceRequest.ProxySettings.Proxy = proxy; + break; + + case ProxyDetectionMode.CacheFirstFound: + HTTPManager.Proxy = @event.SourceRequest.ProxySettings.Proxy = proxy; + + HTTPManager.Logger.Verbose(nameof(ProxyDetector), $"Proxy cached in HTTPManager.Proxy!", @event.SourceRequest.Context); + + Detach(); + break; + } + + return; + } + } + + HTTPManager.Logger.Information(nameof(ProxyDetector), $"No Proxy for '{uri}'.", @event.SourceRequest.Context); + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(ProxyDetector), $"GetProxyFor({@event.SourceRequest.CurrentUri})", ex, @event.SourceRequest.Context); + } + finally + { + @event.SourceRequest.Timing.StartNext(TimingEventNames.Queued); + } + } + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs.meta new file mode 100644 index 00000000..a054f10c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 168a0e891e4343544b01417cd5fbdad7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Autodetect/ProxyDetector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs new file mode 100644 index 00000000..614660f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs @@ -0,0 +1,283 @@ +#if !UNITY_WEBGL || UNITY_EDITOR + +using System; +using System.IO; +using System.Text; + +using Best.HTTP.Request.Authentication; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; + +namespace Best.HTTP.Proxies +{ + /// + /// Represents an HTTP proxy server that can be used to route HTTP requests through. + /// + /// + /// The HTTPProxy class is an implementation of the base class, specifically designed for + /// HTTP proxy servers. It provides features such as transparent proxy support, sending the entire URI, and handling proxy + /// authentication. This class is used to configure and manage HTTP proxy settings for HTTP requests. + /// + public sealed class HTTPProxy : Proxy + { + /// + /// Gets or sets whether the proxy can act as a transparent proxy. Default value is true. + /// + /// + /// A transparent proxy forwards client requests without modifying them. When set to true, the proxy behaves as a transparent + /// proxy, meaning it forwards requests as-is. If set to false, it may modify requests, and this can be useful for certain + /// advanced proxy configurations. + /// + public bool IsTransparent { get; set; } + + /// + /// Gets or sets whether the proxy - when it's in non-transparent mode - excepts only the path and query of the request URI. Default value is true. + /// + public bool SendWholeUri { get; set; } + + /// + /// Gets or sets whether the plugin will use the proxy as an explicit proxy for secure protocols (HTTPS://, WSS://). + /// + /// + /// When set to true, the plugin will issue a CONNECT request to the proxy for secure protocols, even if the proxy is + /// marked as transparent. This is commonly used for ensuring proper handling of encrypted traffic through the proxy. + /// + public bool NonTransparentForHTTPS { get; set; } + + /// + /// Creates a new instance of the HTTPProxy class with the specified proxy address. + /// + /// The address of the proxy server. + public HTTPProxy(Uri address) + :this(address, null, true) + {} + + /// + /// Creates a new instance of the HTTPProxy class with the specified proxy address and credentials. + /// + /// The address of the proxy server. + /// The credentials for proxy authentication. + public HTTPProxy(Uri address, Credentials credentials) + :this(address, credentials, true) + {} + + /// + /// Creates a new instance of the HTTPProxy class with the specified proxy address, credentials, and transparency settings. + /// + /// The address of the proxy server. + /// The credentials for proxy authentication. + /// Specifies whether the proxy can act as a transparent proxy (true) or not (false). + public HTTPProxy(Uri address, Credentials credentials, bool isTransparent) + :this(address, credentials, isTransparent, true) + { } + + /// + /// Creates a new instance of the HTTPProxy class with the specified proxy address, credentials, transparency settings, and URI handling. + /// + /// The address of the proxy server. + /// The credentials for proxy authentication. + /// Specifies whether the proxy can act as a transparent proxy (true) or not (false). + /// Specifies whether the proxy should send the entire URI (true) or just the path and query (false) for non-transparent proxies. + public HTTPProxy(Uri address, Credentials credentials, bool isTransparent, bool sendWholeUri) + : this(address, credentials, isTransparent, sendWholeUri, true) + { } + + /// + /// Creates a new instance of the class with the specified proxy address, credentials, transparency settings, URI handling, and HTTPS behavior. + /// + /// The address of the proxy server. + /// The credentials for proxy authentication. + /// Specifies whether the proxy can act as a transparent proxy (true) or not (false). + /// Specifies whether the proxy should send the entire URI (true) or just the path and query (false) for non-transparent proxies. + /// Specifies whether the plugin should use the proxy as an explicit proxy for secure protocols (HTTPS://, WSS://) (true) or not (false). + public HTTPProxy(Uri address, Credentials credentials, bool isTransparent, bool sendWholeUri, bool nonTransparentForHTTPS) + :base(address, credentials) + { + this.IsTransparent = isTransparent; + this.SendWholeUri = sendWholeUri; + this.NonTransparentForHTTPS = nonTransparentForHTTPS; + } + + public override string GetRequestPath(Uri uri) + { + return this.SendWholeUri ? uri.OriginalString : uri.GetRequestPathAndQueryURL(); + } + + internal override bool SetupRequest(HTTPRequest request) + { + if (request == null || request.Response == null || !this.IsTransparent) + return false; + + string authHeader = DigestStore.FindBest(request.Response.GetHeaderValues("proxy-authenticate")); + if (!string.IsNullOrEmpty(authHeader)) + { + var digest = DigestStore.GetOrCreate(this.Address); + digest.ParseChallange(authHeader); + + if (this.Credentials != null && digest.IsUriProtected(this.Address) && (!request.HasHeader("Proxy-Authorization") || digest.Stale)) + { + switch (this.Credentials.Type) + { + case AuthenticationTypes.Basic: + // With Basic authentication we don't want to wait for a challenge, we will send the hash with the first request + var token = Convert.ToBase64String(Encoding.UTF8.GetBytes(this.Credentials.UserName + ":" + this.Credentials.Password)); + request.SetHeader("Proxy-Authorization", $"Basic {token}"); + return true; + + case AuthenticationTypes.Unknown: + case AuthenticationTypes.Digest: + //var digest = DigestStore.Get(request.Proxy.Address); + if (digest != null) + { + string authentication = digest.GenerateResponseHeader(this.Credentials, true, request.MethodType, request.CurrentUri); + if (!string.IsNullOrEmpty(authentication)) + { + request.SetHeader("Proxy-Authorization", authentication); + return true; + } + } + + break; + } + } + } + + return false; + } + + internal override void BeginConnect(ProxyConnectParameters parameters) + { + if (!this.IsTransparent || (parameters.createTunel && this.NonTransparentForHTTPS)) + { + using (var bufferedStream = new WriteOnlyBufferedStream(parameters.stream, 4 * 1024, parameters.context)) + using (var outStream = new BinaryWriter(bufferedStream, Encoding.UTF8)) + { + // https://www.rfc-editor.org/rfc/rfc9110.html#name-connect + + string connectStr = string.Format("CONNECT {0}:{1} HTTP/1.1", parameters.uri.Host, parameters.uri.Port.ToString()); + + HTTPManager.Logger.Information("HTTPProxy", "Sending " + connectStr, parameters.context); + + outStream.SendAsASCII(connectStr); + outStream.Write(EOL); + + outStream.SendAsASCII(string.Format("Host: {0}:{1}", parameters.uri.Host, parameters.uri.Port.ToString())); + outStream.Write(EOL); + + outStream.SendAsASCII("Proxy-Connection: Keep-Alive"); + outStream.Write(EOL); + + outStream.SendAsASCII("Connection: Keep-Alive"); + outStream.Write(EOL); + + // Proxy Authentication + if (this.Credentials != null) + { + switch (this.Credentials.Type) + { + case AuthenticationTypes.Basic: + { + // With Basic authentication we don't want to wait for a challenge, we will send the hash with the first request + var buff = $"Proxy-Authorization: Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes(this.Credentials.UserName + ":" + this.Credentials.Password))}" + .GetASCIIBytes(); + outStream.Write(buff.Data, buff.Offset, buff.Count); + BufferPool.Release(buff); + + outStream.Write(EOL); + break; + } + + case AuthenticationTypes.Unknown: + case AuthenticationTypes.Digest: + { + var digest = DigestStore.Get(this.Address); + if (digest != null) + { + string authentication = digest.GenerateResponseHeader(this.Credentials, true, HTTPMethods.Connect, parameters.uri); + if (!string.IsNullOrEmpty(authentication)) + { + string auth = string.Format("Proxy-Authorization: {0}", authentication); + if (HTTPManager.Logger.Level <= Loglevels.Information) + HTTPManager.Logger.Information("HTTPProxy", "Sending proxy authorization header: " + auth, parameters.context); + + var buff = auth.GetASCIIBytes(); + outStream.Write(buff.Data, buff.Offset, buff.Count); + BufferPool.Release(buff); + + outStream.Write(EOL); + } + } + + break; + } + } + } + + outStream.Write(EOL); + + // Make sure to send all the wrote data to the wire + outStream.Flush(); + } // using outstream + + new HTTPProxyResponse(parameters) + .OnFinished = OnProxyResponse; + } + else + parameters.OnSuccess?.Invoke(parameters); + } + + void OnProxyResponse(ProxyConnectParameters connectParameters, HTTPProxyResponse resp, Exception error) + { + HTTPManager.Logger.Information(nameof(HTTPProxyResponse), $"{nameof(OnProxyResponse)}({connectParameters}, {resp}, {error})", connectParameters.context); + + if (error != null) + { + // Resend request if the proxy response could be read && status code is 407 (authentication required) && we have credentials + connectParameters.OnError?.Invoke(connectParameters, error, resp.ReadState == HTTPProxyResponse.PeekableReadState.Finished && resp.StatusCode == 407 && this.Credentials != null); + } + else + { + if (resp.StatusCode == 200) + { + connectParameters.OnSuccess?.Invoke(connectParameters); + } + else if (resp.StatusCode == 407) + { + // Proxy authentication required + // http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.4.8 + + bool retryNeogitiation = false; + string authHeader = DigestStore.FindBest(resp.GetHeaderValues("proxy-authenticate")); + if (!string.IsNullOrEmpty(authHeader)) + { + var digest = DigestStore.GetOrCreate(this.Address); + digest.ParseChallange(authHeader); + + retryNeogitiation = (connectParameters.AuthenticationAttempts < ProxyConnectParameters.MaxAuthenticationAttempts || digest.Stale) && + this.Credentials != null && + digest.IsUriProtected(this.Address); + } + + if (!retryNeogitiation) + connectParameters.OnError?.Invoke(connectParameters, new Exception($"Can't authenticate Proxy! AuthenticationAttempts: {connectParameters.AuthenticationAttempts} {resp}"), false); + else + { + connectParameters.AuthenticationAttempts++; + BeginConnect(connectParameters); + } + } + else + { + connectParameters.OnError?.Invoke(connectParameters, new Exception($"Proxy returned {resp}"), false); + } + } + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs.meta new file mode 100644 index 00000000..a5ee7adc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5425bc3744cc7b14ca10b851bbcb0916 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs new file mode 100644 index 00000000..2b8f0499 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs @@ -0,0 +1,452 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.Streams; + +using System; +using System.Collections.Generic; +using System.Threading; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; + +namespace Best.HTTP.Proxies +{ + internal sealed class HTTPProxyResponse : IContentConsumer + { + public PeekableReadState ReadState + { + get => this._readState; + private set + { + if (this._readState != value) + HTTPManager.Logger.Information(nameof(HTTPProxyResponse), $"{this._readState} => {value}", this._parameters.context); + this._readState = value; + } + } + + public int VersionMajor { get; private set; } + public int VersionMinor { get; private set; } + public int StatusCode { get; private set; } + public string Message { get; private set; } + + public Dictionary> Headers { get; private set; } + + public PeekableContentProviderStream ContentProvider { get; private set; } + + private PeekableReadState _readState; + + enum ContentDeliveryMode + { + Raw, + RawUnknownLength, + Chunked, + } + + public enum PeekableReadState + { + StatusLine, + Headers, + PrepareForContent, + ContentSetup, + RawContent, + Content, + Finished + } + + + private ContentDeliveryMode _deliveryMode; + private ProxyConnectParameters _parameters; + private long _expectedLength; + private BufferPoolMemoryStream _output; + int _chunkLength = -1; + + enum ReadChunkedStates + { + ReadChunkLength, + ReadChunk, + ReadTrailingCRLF, + ReadTrailingHeaders + } + ReadChunkedStates _readChunkedState = ReadChunkedStates.ReadChunkLength; + private long _downloaded; + + public Action OnFinished; + + public string DataAsText { get; private set; } + + public HTTPProxyResponse(ProxyConnectParameters parameters) + { + this._parameters = parameters; + this._parameters.stream.SetTwoWayBinding(this); + + this.Headers = new Dictionary>(StringComparer.OrdinalIgnoreCase); + } + + public void SetBinding(PeekableContentProviderStream contentProvider) => this.ContentProvider = contentProvider; + public void UnsetBinding() => this.ContentProvider = null; + + public void OnConnectionClosed() + { + Exception error = null; + if (this.ReadState == PeekableReadState.Content && this._deliveryMode == ContentDeliveryMode.RawUnknownLength) + { + PostProcessContent(); + error = new Exception($"Proxy returned with {this.StatusCode} - '{this.Message}' : \"{this.DataAsText}\""); + } + else + { + error = new Exception("Connection to the proxy closed unexpectedly!"); + } + + CallFinished(error); + } + + public void OnError(Exception ex) + { + //(this._parameters.stream as IPeekableContentProvider).Consumer = null; + this.ContentProvider.Unbind(); + + CallFinished(ex); + } + + void CallFinished(Exception error) + { + var callback = Interlocked.Exchange(ref this.OnFinished, null); + callback?.Invoke(this._parameters, this, error); + } + + public void OnContent() + { + switch (ReadState) + { + case PeekableReadState.StatusLine: + if (!IsNewLinePresent(this.ContentProvider)) + return; + + var statusLine = HTTPResponse.ReadTo(this.ContentProvider, (byte)' '); + string[] versions = statusLine.Split(new char[] { '/', '.' }); + this.VersionMajor = int.Parse(versions[1]); + this.VersionMinor = int.Parse(versions[2]); + + int statusCode; + string statusCodeStr = HTTPResponse.NoTrimReadTo(this.ContentProvider, (byte)' ', LF); + + if (!int.TryParse(statusCodeStr, out statusCode)) + throw new Exception($"Couldn't parse '{statusCodeStr}' as a status code!"); + + this.StatusCode = statusCode; + + if (statusCodeStr.Length > 0 && (byte)statusCodeStr[statusCodeStr.Length - 1] != LF && (byte)statusCodeStr[statusCodeStr.Length - 1] != CR) + this.Message = HTTPResponse.ReadTo(this.ContentProvider, LF); + else + { + HTTPManager.Logger.Warning(nameof(HTTPProxyResponse), "Skipping Status Message reading!", this._parameters.context); + + this.Message = string.Empty; + } + + if (HTTPManager.Logger.IsDiagnostic) + VerboseLogging($"HTTP/'{this.VersionMajor}.{this.VersionMinor}' '{this.StatusCode}' '{this.Message}'"); + + this.ReadState = PeekableReadState.Headers; + goto case PeekableReadState.Headers; + + case PeekableReadState.Headers: + ProcessReadHeaders(this.ContentProvider, PeekableReadState.PrepareForContent); + if (this.ReadState == PeekableReadState.PrepareForContent) + { + if (this.StatusCode == 200) + { + this.ReadState = PeekableReadState.Finished; + goto case PeekableReadState.Finished; + } + + // if it's an error response from the proxy, read all from the network + goto case PeekableReadState.PrepareForContent; + } + break; + + case PeekableReadState.PrepareForContent: + // A content-length header might come with chunked transfer-encoding too. + List contentLengthHeaders = GetHeaderValues("content-length"); + if (contentLengthHeaders != null) + this._expectedLength = long.Parse(contentLengthHeaders[0]); + + if (HasHeaderWithValue("transfer-encoding", "chunked")) + { + this._deliveryMode = ContentDeliveryMode.Chunked; + this.ReadState = PeekableReadState.ContentSetup; + } + else + { + this._deliveryMode = ContentDeliveryMode.Raw; + this.ReadState = PeekableReadState.ContentSetup; + var contentRangeHeaders = GetHeaderValues("content-range"); + + if (contentLengthHeaders == null && contentRangeHeaders == null) + { + this._deliveryMode = ContentDeliveryMode.RawUnknownLength; + } + else if (contentLengthHeaders == null && contentRangeHeaders != null) + { + throw new NotImplementedException("ranges"); + } + } + + this._output = new BufferPoolMemoryStream(1024); + + this.ReadState = PeekableReadState.Content; + goto case PeekableReadState.Content; + + case PeekableReadState.Content: + switch (this._deliveryMode) + { + case ContentDeliveryMode.Raw: ProcessReadRaw(this.ContentProvider); break; + case ContentDeliveryMode.RawUnknownLength: ProcessReadRawUnknownLength(this.ContentProvider); break; + case ContentDeliveryMode.Chunked: ProcessReadChunked(this.ContentProvider); break; + } + + if (this.ReadState == PeekableReadState.Finished) + goto case PeekableReadState.Finished; + break; + + case PeekableReadState.Finished: + //(this._parameters.stream as IPeekableContentProvider).Consumer = null; + this.ContentProvider.Unbind(); + if (this.StatusCode == 200 || this.StatusCode == 407) + { + CallFinished(null); + } + else + { + CallFinished(new Exception($"Proxy returned with {this.StatusCode} - '{this.Message}' : \"{this.DataAsText}\"")); + } + break; + } + } + + public List GetHeaderValues(string name) + { + if (Headers == null) + return null; + + List values; + if (!Headers.TryGetValue(name, out values) || values.Count == 0) + return null; + + return values; + } + + public string GetFirstHeaderValue(string name) + { + if (Headers == null) + return null; + + List values; + if (!Headers.TryGetValue(name, out values) || values.Count == 0) + return null; + + return values[0]; + } + + public bool HasHeaderWithValue(string headerName, string value) + { + var values = GetHeaderValues(headerName); + if (values == null) + return false; + + for (int i = 0; i < values.Count; ++i) + if (string.Compare(values[i], value, StringComparison.OrdinalIgnoreCase) == 0) + return true; + + return false; + } + + public void AddHeader(string name, string value) + { + if (Headers == null) + Headers = new Dictionary>(StringComparer.OrdinalIgnoreCase); + + List values; + if (!Headers.TryGetValue(name, out values)) + Headers.Add(name, values = new List(1)); + + values.Add(value); + } + + private void VerboseLogging(string v) + { + HTTPManager.Logger.Verbose(nameof(HTTPProxyResponse), v, this._parameters.context); + } + + bool IsNewLinePresent(PeekableStream peekable) + { + peekable.BeginPeek(); + + int nextByte = peekable.PeekByte(); + while (nextByte >= 0 && nextByte != 0x0A) + nextByte = peekable.PeekByte(); + + return nextByte == 0x0A; + } + + private void ProcessReadHeaders(PeekableStream peekable, PeekableReadState targetState) + { + if (!IsNewLinePresent(peekable)) + return; + + do + { + string headerName = HTTPResponse.ReadTo(peekable, (byte)':', LF); + if (headerName == string.Empty) + { + this.ReadState = targetState; + return; + } + + string value = HTTPResponse.ReadTo(peekable, LF); + + if (HTTPManager.Logger.IsDiagnostic) + VerboseLogging($"Header - '{headerName}': '{value}'"); + + AddHeader(headerName, value); + } while (IsNewLinePresent(peekable)); + } + + private void ProcessReadRawUnknownLength(PeekableStream peekable) + { + while (peekable.Length > 0) + { + var buffer = BufferPool.Get(64 * 1024, true, this._parameters.context); + using var _ = new AutoReleaseBuffer(buffer); + + var readCount = peekable.Read(buffer, 0, buffer.Length); + + ProcessChunk(buffer.AsBuffer(readCount)); + } + } + + private bool TryReadChunkLength(PeekableStream peekable, out int result) + { + result = -1; + if (!IsNewLinePresent(peekable)) + return false; + + // Read until the end of line, then split the string so we will discard any optional chunk extensions + string line = HTTPResponse.ReadTo(peekable, LF); + string[] splits = line.Split(';'); + string num = splits[0]; + + return int.TryParse(num, System.Globalization.NumberStyles.AllowHexSpecifier, null, out result); + } + + void ProcessReadChunked(PeekableStream peekable) + { + switch (this._readChunkedState) + { + case ReadChunkedStates.ReadChunkLength: + this._readChunkedState = ReadChunkedStates.ReadChunkLength; + + if (TryReadChunkLength(peekable, out this._chunkLength)) + { + if (this._chunkLength == 0) + { + PostProcessContent(); + goto case ReadChunkedStates.ReadTrailingHeaders; + } + + goto case ReadChunkedStates.ReadChunk; + } + break; + + case ReadChunkedStates.ReadChunk: + this._readChunkedState = ReadChunkedStates.ReadChunk; + + while (this._chunkLength > 0 && peekable.Length > 0) + { + int targetReadCount = Math.Min(Math.Min(64 * 1024, this._chunkLength), (int)peekable.Length); + + var buffer = BufferPool.Get(targetReadCount, true, this._parameters.context); + using var _ = new AutoReleaseBuffer(buffer); + + var readCount = peekable.Read(buffer, 0, targetReadCount); + + if (readCount < 0) + throw ExceptionHelper.ServerClosedTCPStream(); + + this._chunkLength -= readCount; + + ProcessChunk(buffer.AsBuffer(readCount)); + } + + // Every chunk data has a trailing CRLF + if (this._chunkLength == 0) + goto case ReadChunkedStates.ReadTrailingCRLF; + break; + + case ReadChunkedStates.ReadTrailingCRLF: + this._readChunkedState = ReadChunkedStates.ReadTrailingCRLF; + + if (IsNewLinePresent(peekable)) + { + BufferPool.Release(HTTPResponse.ReadToAsByte(peekable, LF)); + + goto case ReadChunkedStates.ReadChunkLength; + } + break; + + case ReadChunkedStates.ReadTrailingHeaders: + this._readChunkedState = ReadChunkedStates.ReadTrailingHeaders; + + ProcessReadHeaders(peekable, PeekableReadState.Finished); + break; + } + } + + void ProcessReadRaw(PeekableStream peekable) + { + while (peekable.Length > 0) + { + var buffer = BufferPool.Get(64 * 1024, true, this._parameters.context); + using var _ = new AutoReleaseBuffer(buffer); + + var readCount = peekable.Read(buffer, 0, buffer.Length); + + if (readCount < 0) + throw ExceptionHelper.ServerClosedTCPStream(); + + ProcessChunk(buffer.AsBuffer(readCount)); + } + + if (this._downloaded >= this._expectedLength) + { + PostProcessContent(); + } + } + + void ProcessChunk(BufferSegment chunk) + { + this._downloaded += chunk.Count; + this._output.Write(chunk.Data, chunk.Offset, chunk.Count); + } + + void PostProcessContent() + { + this.ReadState = PeekableReadState.Finished; + + if (this._output != null) + { + var buff = this._output.GetBuffer(); + this.DataAsText = System.Text.Encoding.UTF8.GetString(buff, 0, (int)this._output.Length); + + this._output.Dispose(); + this._output = null; + } + } + + public override string ToString() => $"{StatusCode} - {Message}: \"{this.DataAsText}\""; + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs.meta new file mode 100644 index 00000000..98347257 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ec169728fcca515438bec166d5a2069e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/HTTPProxyResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations.meta new file mode 100644 index 00000000..cb83b8c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 96240cd9f920506408200787f767bf23 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs new file mode 100644 index 00000000..667a8ea8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs @@ -0,0 +1,471 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Text; +using System.Threading; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Proxies.Implementations +{ + internal enum SOCKSVersions : byte + { + Unknown = 0x00, + V5 = 0x05 + } + + /// + /// https://tools.ietf.org/html/rfc1928 + /// The values currently defined for METHOD are: + /// o X'00' NO AUTHENTICATION REQUIRED + /// o X'01' GSSAPI + /// o X'02' USERNAME/PASSWORD + /// o X'03' to X'7F' IANA ASSIGNED + /// o X'80' to X'FE' RESERVED FOR PRIVATE METHODS + /// o X'FF' NO ACCEPTABLE METHODS + /// + internal enum SOCKSMethods : byte + { + NoAuthenticationRequired = 0x00, + GSSAPI = 0x01, + UsernameAndPassword = 0x02, + NoAcceptableMethods = 0xFF + } + + internal enum SOCKSReplies : byte + { + Succeeded = 0x00, + GeneralSOCKSServerFailure = 0x01, + ConnectionNotAllowedByRuleset = 0x02, + NetworkUnreachable = 0x03, + HostUnreachable = 0x04, + ConnectionRefused = 0x05, + TTLExpired = 0x06, + CommandNotSupported = 0x07, + AddressTypeNotSupported = 0x08 + } + + internal enum SOCKSAddressTypes + { + IPV4 = 0x00, + DomainName = 0x03, + IPv6 = 0x04 + } + + internal sealed class SOCKSV5Negotiator : IContentConsumer + { + public PeekableContentProviderStream ContentProvider { get; private set; } + + enum NegotiationStates + { + MethodSelection, + ExpectAuthenticationResponse, + ConnectResponse + } + + NegotiationStates _state; + + SOCKSProxy _proxy; + ProxyConnectParameters _parameters; + + public SOCKSV5Negotiator(SOCKSProxy proxy, ProxyConnectParameters parameters) + { + this._proxy = proxy; + this._parameters = parameters; + + //(this._parameters.stream as IPeekableContentProvider).Consumer = this; + (this._parameters.stream as PeekableContentProviderStream).SetTwoWayBinding(this); + + SendHandshake(); + } + + public void SetBinding(PeekableContentProviderStream contentProvider) => this.ContentProvider = contentProvider; + public void UnsetBinding() => this.ContentProvider = null; + + public void OnConnectionClosed() + { + CallOnError(new Exception($"{nameof(SOCKSV5Negotiator)}: connection closed unexpectedly!")); + } + + public void OnError(Exception ex) + { + CallOnError(ex); + } + + void SendHandshake() + { + var buffer = BufferPool.Get(1024, true); + try + { + int count = 0; + + // https://tools.ietf.org/html/rfc1928 + // The client connects to the server, and sends a version + // identifier/method selection message: + // + // +----+----------+----------+ + // |VER | NMETHODS | METHODS | + // +----+----------+----------+ + // | 1 | 1 | 1 to 255 | + // +----+----------+----------+ + // + // The VER field is set to X'05' for this version of the protocol. The + // NMETHODS field contains the number of method identifier octets that + // appear in the METHODS field. + // + + buffer[count++] = (byte)SOCKSVersions.V5; + if (this._proxy.Credentials != null) + { + buffer[count++] = 0x02; // method count + buffer[count++] = (byte)SOCKSMethods.UsernameAndPassword; + buffer[count++] = (byte)SOCKSMethods.NoAuthenticationRequired; + } + else + { + buffer[count++] = 0x01; // method count + buffer[count++] = (byte)SOCKSMethods.NoAuthenticationRequired; + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Sending method negotiation - buffer: {buffer.AsBuffer(count)} ", this._parameters.context); + + // enqueue buffer and move its ownership to the tcp streamer + this._parameters.stream.Write(buffer.AsBuffer(count)); + + // null out the buffer so it won't be released + buffer = null; + + } + catch (Exception ex) + { + CallOnError(ex); + } + finally + { + BufferPool.Release(buffer); + } + } + + void SendConnect() + { + // The SOCKS request is formed as follows: + // + // +----+-----+-------+------+----------+----------+ + // |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT | + // +----+-----+-------+------+----------+----------+ + // | 1 | 1 | X'00' | 1 | Variable | 2 | + // +----+-----+-------+------+----------+----------+ + // + // Where: + // + // o VER protocol version: X'05' + // o CMD + // o CONNECT X'01' + // o BIND X'02' + // o UDP ASSOCIATE X'03' + // o RSV RESERVED + // o ATYP address type of following address + // o IP V4 address: X'01' + // o DOMAINNAME: X'03' + // o IP V6 address: X'04' + // o DST.ADDR desired destination address + // o DST.PORT desired destination port in network octet + // order + + var buffer = BufferPool.Get(512, true); + int count = 0; + buffer[count++] = (byte)SOCKSVersions.V5; // version: 5 + buffer[count++] = 0x01; // command: connect + buffer[count++] = 0x00; // reserved, bust be 0x00 + + if (this._parameters.uri.IsHostIsAnIPAddress()) + { + bool isIPV4 = Extensions.IsIpV4AddressValid(this._parameters.uri.Host); + buffer[count++] = isIPV4 ? (byte)SOCKSAddressTypes.IPV4 : (byte)SOCKSAddressTypes.IPv6; + + var ipAddress = System.Net.IPAddress.Parse(this._parameters.uri.Host); + var ipBytes = ipAddress.GetAddressBytes(); + WriteBytes(buffer, ref count, ipBytes); // destination address + } + else + { + buffer[count++] = (byte)SOCKSAddressTypes.DomainName; + + // The first octet of the address field contains the number of octets of name that + // follow, there is no terminating NUL octet. + WriteString(buffer, ref count, this._parameters.uri.Host); + } + + // destination port in network octet order + buffer[count++] = (byte)((this._parameters.uri.Port >> 8) & 0xFF); + buffer[count++] = (byte)(this._parameters.uri.Port & 0xFF); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Sending connect request - buffer: {buffer.AsBuffer(count)} ", this._parameters.context); + + this._parameters.stream.Write(buffer.AsBuffer(count)); + + this._state = NegotiationStates.ConnectResponse; + } + + public void OnContent() + { + try + { + switch (this._state) + { + case NegotiationStates.MethodSelection: + { + if (this.ContentProvider.Length < 2) + return; + + // Read method selection result + + //count = stream.Read(buffer, 0, buffer.Length); + var buffer = BufferPool.Get(BufferPool.MIN_BUFFER_SIZE, true); + int count = this.ContentProvider.Read(buffer, 0, buffer.Length); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Negotiation response - count: {count} buffer: {buffer.AsBuffer(count)}", this._parameters.context); + + // The server selects from one of the methods given in METHODS, and + // sends a METHOD selection message: + // + // +----+--------+ + // |VER | METHOD | + // +----+--------+ + // | 1 | 1 | + // +----+--------+ + // + // If the selected METHOD is X'FF', none of the methods listed by the + // client are acceptable, and the client MUST close the connection. + // + // The values currently defined for METHOD are: + // + // o X'00' NO AUTHENTICATION REQUIRED + // o X'01' GSSAPI + // o X'02' USERNAME/PASSWORD + // o X'03' to X'7F' IANA ASSIGNED + // o X'80' to X'FE' RESERVED FOR PRIVATE METHODS + // o X'FF' NO ACCEPTABLE METHODS + // + // The client and server then enter a method-specific sub-negotiation. + + SOCKSVersions version = (SOCKSVersions)buffer[0]; + SOCKSMethods method = (SOCKSMethods)buffer[1]; + + // Expected result: + // 1.) Received bytes' count is 2: version + preferred method + // 2.) Version must be 5 + // 3.) Preferred method must NOT be 0xFF + if (count != 2) + throw new Exception($"SOCKS Proxy - Expected read count: 2! buffer: {buffer.AsBuffer(count)}"); + else if (version != SOCKSVersions.V5) + throw new Exception("SOCKS Proxy - Expected version: 5, received version: " + buffer[0].ToString("X2")); + else if (method == SOCKSMethods.NoAcceptableMethods) + throw new Exception("SOCKS Proxy - Received 'NO ACCEPTABLE METHODS' (0xFF)"); + else + { + HTTPManager.Logger.Information("SOCKSProxy", "Method negotiation over. Method: " + method.ToString(), this._parameters.context); + switch (method) + { + case SOCKSMethods.NoAuthenticationRequired: + SendConnect(); + break; + + case SOCKSMethods.UsernameAndPassword: + if (this._proxy.Credentials.UserName.Length > 255) + throw new Exception($"SOCKS Proxy - Credentials.UserName too long! {this._proxy.Credentials.UserName.Length} > 255"); + if (this._proxy.Credentials.Password.Length > 255) + throw new Exception($"SOCKS Proxy - Credentials.Password too long! {this._proxy.Credentials.Password.Length} > 255"); + + // https://tools.ietf.org/html/rfc1929 : Username/Password Authentication for SOCKS V5 + // Once the SOCKS V5 server has started, and the client has selected the + // Username/Password Authentication protocol, the Username/Password + // subnegotiation begins. This begins with the client producing a + // Username/Password request: + // + // +----+------+----------+------+----------+ + // |VER | ULEN | UNAME | PLEN | PASSWD | + // +----+------+----------+------+----------+ + // | 1 | 1 | 1 to 255 | 1 | 1 to 255 | + // +----+------+----------+------+----------+ + + HTTPManager.Logger.Information("SOCKSProxy", "starting sub-negotiation", this._parameters.context); + count = 0; + buffer[count++] = 0x01; // version of sub negotiation + + WriteString(buffer, ref count, this._proxy.Credentials.UserName); + WriteString(buffer, ref count, this._proxy.Credentials.Password); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Sending username and password sub-negotiation - buffer: {buffer.AsBuffer(count)} ", this._parameters.context); + + // Write negotiation and transfer ownership of buffer + this._parameters.stream.Write(buffer.AsBuffer(count)); + + this._state = NegotiationStates.ExpectAuthenticationResponse; + break; + + case SOCKSMethods.GSSAPI: + throw new Exception("SOCKS proxy: GSSAPI not supported!"); + + case SOCKSMethods.NoAcceptableMethods: + throw new Exception("SOCKS proxy: No acceptable method"); + } + } + break; + } + + case NegotiationStates.ExpectAuthenticationResponse: + { + if (this.ContentProvider.Length < 2) + return; + + // Read result + var buffer = BufferPool.Get(512, true); + var count = this._parameters.stream.Read(buffer, 0, buffer.Length); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Username and password sub-negotiation response - buffer: {buffer.AsBuffer(count)} ", this._parameters.context); + + // The server verifies the supplied UNAME and PASSWD, and sends the + // following response: + // + // +----+--------+ + // |VER | STATUS | + // +----+--------+ + // | 1 | 1 | + // +----+--------+ + + // A STATUS field of X'00' indicates success. If the server returns a + // `failure' (STATUS value other than X'00') status, it MUST close the + // connection. + bool success = buffer[1] == 0; + + if (count != 2) + throw new Exception($"SOCKS Proxy - Expected read count: 2! buffer: {buffer.AsBuffer(count)}"); + else if (!success) + throw new Exception("SOCKS proxy: username+password authentication failed!"); + + HTTPManager.Logger.Information("SOCKSProxy", "Authenticated!", this._parameters.context); + + // Send connect + SendConnect(); + break; + } + + case NegotiationStates.ConnectResponse: + { + if (this.ContentProvider.Length < 10) + return; + + var buffer = BufferPool.Get(512, true); + var count = this._parameters.stream.Read(buffer, 0, buffer.Length); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information("SOCKSProxy", $"Connect response - buffer: {buffer.AsBuffer(count)} ", this._parameters.context); + + // The SOCKS request information is sent by the client as soon as it has + // established a connection to the SOCKS server, and completed the + // authentication negotiations. The server evaluates the request, and + // returns a reply formed as follows: + // + // +----+-----+-------+------+----------+----------+ + // |VER | REP | RSV | ATYP | BND.ADDR | BND.PORT | + // +----+-----+-------+------+----------+----------+ + // | 1 | 1 | X'00' | 1 | Variable | 2 | + // +----+-----+-------+------+----------+----------+ + // + // Where: + // o VER protocol version: X'05' + // o REP Reply field: + // o X'00' succeeded + // o X'01' general SOCKS server failure + // o X'02' connection not allowed by ruleset + // o X'03' Network unreachable + // o X'04' Host unreachable + // o X'05' Connection refused + // o X'06' TTL expired + // o X'07' Command not supported + // o X'08' Address type not supported + // o X'09' to X'FF' unassigned + // o RSV RESERVED + // o ATYP address type of following address + // o IP V4 address: X'01' + // o DOMAINNAME: X'03' + // o IP V6 address: X'04' + // o BND.ADDR server bound address + // o BND.PORT server bound port in network octet order + // + // Fields marked RESERVED (RSV) must be set to X'00'. + + SOCKSVersions version = (SOCKSVersions)buffer[0]; + SOCKSReplies reply = (SOCKSReplies)buffer[1]; + + // at least 10 bytes expected as a result + if (count < 10) + throw new Exception($"SOCKS proxy: not enough data returned by the server. Expected count is at least 10 bytes, server returned {count} bytes! content: {buffer.AsBuffer(count)}"); + else if (reply != SOCKSReplies.Succeeded) + throw new Exception("SOCKS proxy error: " + reply.ToString()); + + HTTPManager.Logger.Information("SOCKSProxy", "Connected!", this._parameters.context); + + CallOnSuccess(); + break; + } + } + } + catch(Exception ex) + { + CallOnError(ex); + } + } + + void CallOnError(Exception ex) + { + var callback = Interlocked.Exchange(ref this._parameters.OnError, null); + Interlocked.Exchange(ref this._parameters.OnSuccess, null); + + this.ContentProvider.Unbind(); + callback?.Invoke(this._parameters, ex, false); + } + + void CallOnSuccess() + { + var callback = Interlocked.Exchange(ref this._parameters.OnSuccess, null); + Interlocked.Exchange(ref this._parameters.OnError, null); + + this.ContentProvider.Unbind(); + + callback?.Invoke(this._parameters); + } + + private void WriteString(byte[] buffer, ref int count, string str) + { + // Get the bytes + int byteCount = Encoding.UTF8.GetByteCount(str); + if (byteCount > 255) + throw new Exception(string.Format("SOCKS Proxy - String is too large ({0}) to fit in 255 bytes!", byteCount.ToString())); + + // number of bytes + buffer[count++] = (byte)byteCount; + + // and the bytes itself + Encoding.UTF8.GetBytes(str, 0, str.Length, buffer, count); + + count += byteCount; + } + + private void WriteBytes(byte[] buffer, ref int count, byte[] bytes) + { + Array.Copy(bytes, 0, buffer, count, bytes.Length); + count += bytes.Length; + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs.meta new file mode 100644 index 00000000..77f8c81d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 95c59067ac15d2d4aa5f0e97e0a8d5e5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Implementations/SOCKSV5Negotiator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs new file mode 100644 index 00000000..eb98df33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs @@ -0,0 +1,184 @@ +using System; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.Request.Authentication; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Proxies +{ + /// + /// Represents parameters used when connecting through a proxy server. + /// + /// + /// The ProxyConnectParameters struct defines the parameters required when initiating a connection + /// through a proxy server. It includes information about the proxy, target URI, and callbacks for success and error handling. + /// This struct is commonly used during the negotiation steps in the class. + /// + public struct ProxyConnectParameters + { + /// + /// The maximum number of authentication attempts allowed during proxy connection. + /// + public const int MaxAuthenticationAttempts = 1; + + /// + /// The proxy server through which the connection is established. + /// + public Proxy proxy; + + /// + /// The stream used for communication with the proxy server. + /// + public PeekableContentProviderStream stream; + + /// + /// The target URI to reach through the proxy server. + /// + public Uri uri; + + /// + /// A cancellation token that allows canceling the proxy connection operation. + /// + public CancellationToken token; + + /// + /// The number of authentication attempts made during proxy connection. + /// + public int AuthenticationAttempts; + + /// + /// Gets or sets a value indicating whether to create a proxy tunnel. + /// + /// + /// A proxy tunnel, also known as a TCP tunnel, is established when communication between the client and the target server + /// needs to be relayed through the proxy without modification. Setting this field to true indicates the intention + /// to create a tunnel, allowing the data to pass through the proxy without interpretation or alteration by the proxy. + /// This is typically used for protocols like HTTPS, where end-to-end encryption is desired, and the proxy should act as a + /// pass-through conduit. + /// + public bool createTunel; + + /// + /// The logging context for debugging purposes. + /// + public LoggingContext context; + + /// + /// A callback to be executed upon successful proxy connection. + /// + public Action OnSuccess; + + /// + /// A callback to be executed upon encountering an error during proxy connection. + /// + /// + /// The callback includes parameters for the current connection parameters, the encountered exception, + /// and a flag indicating whether the connection should be retried for authentication. + /// + public Action OnError; + } + + /// + /// Base class for proxy implementations, providing common proxy configuration and behavior. + /// + /// + /// The Proxy class serves as the base class for various proxy client implementations, + /// such as and . It provides a foundation for configuring proxy settings and handling + /// proxy-related functionality common to all proxy types, like connecting to a proxy, setting up a request to go through the proxy + /// and deciding whether an address is usable with the proxy or the plugin must connect directly. + /// + public abstract class Proxy + { + /// + /// Address of the proxy server. It has to be in the http://proxyaddress:port form. + /// + public Uri Address { get; set; } + + /// + /// Credentials for authenticating with the proxy server. + /// + public Credentials Credentials { get; set; } + + /// + /// List of exceptions for which the proxy should not be used. Elements of this list are compared to the Host (DNS or IP address) part of the uri. + /// + public List Exceptions { get; set; } + + /// + /// Initializes a new instance of the Proxy class with the specified proxy address and credentials. + /// + /// The address of the proxy server. + /// The credentials for proxy authentication. + internal Proxy(Uri address, Credentials credentials) + { + this.Address = address; + this.Credentials = credentials; + } + + /// + /// Initiates a connection through the proxy server. Used during the negotiation steps. + /// + /// Parameters for the proxy connection. + internal abstract void BeginConnect(ProxyConnectParameters parameters); + + /// + /// Gets the request path to be used for proxy communication. In some cases with HTTPProxy, the request must send the whole uri as the request path. + /// + /// The target URI. + /// The request path for proxy communication. + public abstract string GetRequestPath(Uri uri); + + /// + /// Sets up an HTTP request to use the proxy as needed. + /// + /// The HTTP request to set up. + /// true if the request should use the proxy; otherwise, false. + internal abstract bool SetupRequest(HTTPRequest request); + + /// + /// Determines whether the proxy should be used for a specific address based on the configured exceptions. + /// + /// The address to check for proxy usage. + /// true if the proxy should be used for the address; otherwise, false. + public bool UseProxyForAddress(Uri address) + { + if (this.Exceptions == null) + return true; + + string host = address.Host; + + // https://github.com/httplib2/httplib2/issues/94 + // If domain starts with a dot (example: .example.com): + // 1. Use endswith to match any subdomain (foo.example.com should match) + // 2. Remove the dot and do an exact match (example.com should also match) + // + // If domain does not start with a dot (example: example.com): + // 1. It should be an exact match. + for (int i = 0; i < this.Exceptions.Count; ++i) + { + var exception = this.Exceptions[i]; + + if (exception == "*") + return false; + + if (exception.StartsWith(".")) + { + // Use EndsWith to match any subdomain + if (host.EndsWith(exception)) + return false; + + // Remove the dot and + exception = exception.Substring(1); + } + + // do an exact match + if (host.Equals(exception)) + return false; + } + + return true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs.meta new file mode 100644 index 00000000..10d81eda --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0dba9c2697d5e17498d9cfd573452f4d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/Proxy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs new file mode 100644 index 00000000..658e4d98 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs @@ -0,0 +1,29 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; + +using Best.HTTP.Proxies.Implementations; +using Best.HTTP.Request.Authentication; +using Best.HTTP.Shared.Extensions; + +namespace Best.HTTP.Proxies +{ + /// + /// Represents a SOCKS proxy used for making HTTP requests, supporting SOCKS version 5 (v5). + /// + public sealed class SOCKSProxy : Proxy + { + /// + /// Initializes a new instance of the SOCKSProxy class with the specified proxy address and credentials. + /// + /// The address of the SOCKS proxy server. + /// The credentials for proxy authentication (if required). + public SOCKSProxy(Uri address, Credentials credentials) + : base(address, credentials) + { } + + public override string GetRequestPath(Uri uri) => uri.GetRequestPathAndQueryURL(); + internal override bool SetupRequest(HTTPRequest request) => false; + internal override void BeginConnect(ProxyConnectParameters parameters) => new SOCKSV5Negotiator(this, parameters); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs.meta new file mode 100644 index 00000000..69444e35 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e67b3f4a37c57d74d9efb5312efb13a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Proxies/SOCKSProxy.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request.meta new file mode 100644 index 00000000..e68cecbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: dacb83398856c154797367e16e2a8b44 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication.meta new file mode 100644 index 00000000..5743654e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 72097693cd5ac1242be01fd21cc24411 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs new file mode 100644 index 00000000..67f13f1a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs @@ -0,0 +1,63 @@ +namespace Best.HTTP.Request.Authentication +{ + /// + /// Authentication types that supported by Best.HTTP. + /// The authentication is defined by the server, so the Basic and Digest are not interchangeable. If you don't know what to use, the preferred way is to choose Unknow. + /// + public enum AuthenticationTypes + { + /// + /// If the authentication type is not known this will do a challenge turn to receive what methode should be choosen. + /// + Unknown, + + /// + /// The most basic authentication type. It's easy to do, and easy to crack, don't use it with plain http:// + /// + Basic, + + /// + /// HTTP Digest authentication + /// + Digest + } + + /// + /// Hold all information that required to authenticate to a remote server. + /// + public sealed class Credentials + { + /// + /// The type of the Authentication. If you don't know what to use, the preferred way is to choose Unknow. + /// + public AuthenticationTypes Type { get; private set; } + + /// + /// The username to authenticate on the remote server. + /// + public string UserName { get; private set; } + + /// + /// The password to use in the authentication process. The password will be stored only in this class. + /// + public string Password { get; private set; } + + /// + /// Set up the authentication credentials with the username and password. The Type will be set to Unknown. + /// + public Credentials(string userName, string password) + :this(AuthenticationTypes.Unknown, userName, password) + { + } + + /// + /// Set up the authentication credentials with the given authentication type, username and password. + /// + public Credentials(AuthenticationTypes type, string userName, string password) + { + this.Type = type; + this.UserName = userName; + this.Password = password; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs.meta new file mode 100644 index 00000000..ff9acfe1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c6eedacad59ed845b685312bc312734 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Credentials.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs new file mode 100644 index 00000000..a91fda31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs @@ -0,0 +1,280 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Request.Authentication +{ + using Best.HTTP.Shared.Extensions; + + using System.Text; + + /// + /// Internal class that stores all information that received from a server in a WWW-Authenticate and need to construct a valid Authorization header. Based on rfc 2617 (http://tools.ietf.org/html/rfc2617). + /// Used only internally by the plugin. + /// + public sealed class Digest + { + #region Public Properties + + /// + /// The Uri that this Digest is bound to. + /// + public Uri Uri { get; private set; } + + public AuthenticationTypes Type { get; private set; } + + /// + /// A string to be displayed to users so they know which username and password to use. + /// This string should contain at least the name of the host performing the authentication and might additionally indicate the collection of users who might have access. + /// + public string Realm { get; private set; } + + /// + /// A flag, indicating that the previous request from the client was rejected because the nonce value was stale. + /// If stale is TRUE (case-insensitive), the client may wish to simply retry the request with a new encrypted response, without the user for a new username and password. + /// The server should only set stale to TRUE if it receives a request for which the nonce is invalid but with a valid digest for that nonce + /// (indicating that the client knows the correct username/password). + /// If stale is FALSE, or anything other than TRUE, or the stale directive is not present, the username and/or password are invalid, and new values must be obtained. + /// + public bool Stale { get; private set; } + + #endregion + + #region Private Properties + + /// + /// A server-specified data string which should be uniquely generated each time a 401 response is made. + /// Specifically, since the string is passed in the header lines as a quoted string, the double-quote character is not allowed. + /// + private string Nonce { get; set; } + + /// + /// A string of data, specified by the server, which should be returned by the client unchanged in the Authorization header of subsequent requests with URIs in the same protection space. + /// It is recommended that this string be base64 or data. + /// + private string Opaque { get; set; } + + /// + /// A string indicating a pair of algorithms used to produce the digest and a checksum. If this is not present it is assumed to be "MD5". + /// If the algorithm is not understood, the challenge should be ignored (and a different one used, if there is more than one). + /// + private string Algorithm { get; set; } + + /// + /// List of URIs, as specified in RFC XURI, that define the protection space. + /// If a URI is an abs_path, it is relative to the canonical root URL (see section 1.2 above) of the server being accessed. + /// An absoluteURI in this list may refer to a different server than the one being accessed. + /// The client can use this list to determine the set of URIs for which the same authentication information may be sent: + /// any URI that has a URI in this list as a prefix (after both have been made absolute) may be assumed to be in the same protection space. + /// If this directive is omitted or its value is empty, the client should assume that the protection space consists of all URIs on the responding server. + /// + public List ProtectedUris { get; private set; } + + /// + /// If present, it is a quoted string of one or more tokens indicating the "quality of protection" values supported by the server. + /// The value "auth" indicates authentication. The value "auth-int" indicates authentication with integrity protection. + /// + private string QualityOfProtections { get; set; } + + /// + /// his MUST be specified if a qop directive is sent (see above), and MUST NOT be specified if the server did not send a qop directive in the WWW-Authenticate header field. + /// The nc-value is the hexadecimal count of the number of requests (including the current request) that the client has sent with the nonce value in this request. + /// + private int NonceCount { get; set; } + + /// + /// Used to store the last HA1 that can be used in the next header generation when Algorithm is set to "md5-sess". + /// + private string HA1Sess { get; set; } + + #endregion + + internal Digest(Uri uri) + { + this.Uri = uri; + this.Algorithm = "md5"; + } + + /// + /// Parses a WWW-Authenticate header's value to retrive all information. + /// + public void ParseChallange(string header) + { + // Reset some values to its defaults. + this.Type = AuthenticationTypes.Unknown; + this.Stale = false; + this.Opaque = null; + this.HA1Sess = null; + this.NonceCount = 0; + this.QualityOfProtections = null; + + if (this.ProtectedUris != null) + this.ProtectedUris.Clear(); + + // Parse the header + WWWAuthenticateHeaderParser qpl = new WWWAuthenticateHeaderParser(header); + + // Then process + foreach (var qp in qpl.Values) + switch (qp.Key) + { + case "basic": this.Type = AuthenticationTypes.Basic; break; + case "digest": this.Type = AuthenticationTypes.Digest; break; + case "realm": this.Realm = qp.Value; break; + case "domain": + { + if (string.IsNullOrEmpty(qp.Value) || qp.Value.Length == 0) + break; + + if (this.ProtectedUris == null) + this.ProtectedUris = new List(); + + int idx = 0; + string val = qp.Value.Read(ref idx, ' '); + do + { + this.ProtectedUris.Add(val); + val = qp.Value.Read(ref idx, ' '); + } while (idx < qp.Value.Length); + + break; + } + case "nonce": this.Nonce = qp.Value; break; + case "qop": this.QualityOfProtections = qp.Value; break; + case "stale": this.Stale = bool.Parse(qp.Value); break; + case "opaque": this.Opaque = qp.Value; break; + case "algorithm": this.Algorithm = qp.Value; break; + } + } + + /// + /// Generates a string that can be set to an Authorization header. + /// + public string GenerateResponseHeader(Credentials credentials, bool isProxy, HTTPMethods methodType, Uri currentUri) + { + try + { + switch (Type) + { + case AuthenticationTypes.Basic: + return string.Concat("Basic ", Convert.ToBase64String(Encoding.UTF8.GetBytes(string.Format("{0}:{1}", credentials.UserName, credentials.Password)))); + + case AuthenticationTypes.Digest: + { + NonceCount++; + + string HA1 = string.Empty; + + // The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, to provide mutual + // authentication, and to provide some message integrity protection. + string cnonce = new System.Random(this.GetHashCode()).Next(int.MinValue, int.MaxValue).ToString("X8"); + + string ncvalue = NonceCount.ToString("X8"); + switch (Algorithm.TrimAndLower()) + { + case "md5": + HA1 = string.Format("{0}:{1}:{2}", credentials.UserName, Realm, credentials.Password).CalculateMD5Hash(); + break; + + case "md5-sess": + if (string.IsNullOrEmpty(this.HA1Sess)) + this.HA1Sess = string.Format("{0}:{1}:{2}:{3}:{4}", credentials.UserName, Realm, credentials.Password, Nonce, ncvalue).CalculateMD5Hash(); + HA1 = this.HA1Sess; + break; + + default: //throw new NotSupportedException("Not supported hash algorithm found in Web Authentication: " + Algorithm); + return string.Empty; + } + + // A string of 32 hex digits, which proves that the user knows a password. Set according to the qop value. + string response = string.Empty; + + // The server sent QoP-value can be a list of supported methodes(if sent at all - in this case it's null). + // The rfc is not specify that this is a space or comma separeted list. So it can be "auth, auth-int" or "auth auth-int". + // We will first check the longer value("auth-int") then the short one ("auth"). If one matches we will reset the qop to the exact value. + string qop = this.QualityOfProtections != null ? this.QualityOfProtections.TrimAndLower() : null; + + // When we authenticate with a proxy and we want to tunnel the request, we have to use the CONNECT method instead of the + // request's, as the proxy will not know about the request itself. + string method = isProxy ? "CONNECT" : HTTPRequest.MethodNames[(byte)methodType]; + + // When we authenticate with a proxy and we want to tunnel the request, the uri must match what we are sending in the CONNECT request's + // Host header. + string uri = isProxy ? currentUri.Host + ":" + currentUri.Port : currentUri.GetRequestPathAndQueryURL(); + + if (qop == null) + { + string HA2 = string.Concat(HTTPRequest.MethodNames[(byte)methodType], ":", currentUri.GetRequestPathAndQueryURL()).CalculateMD5Hash(); + response = string.Format("{0}:{1}:{2}", HA1, Nonce, HA2).CalculateMD5Hash(); + } + else if (qop.Contains("auth-int")) + { + throw new NotSupportedException("Digest (auth-int)"); + + /*qop = "auth-int"; + + byte[] entityBody = null; + + string HA2 = string.Format("{0}:{1}:{2}", method, uri, new BufferSegment(entityBody, 0, entityBody.Length).CalculateMD5Hash()).CalculateMD5Hash(); + + response = string.Format("{0}:{1}:{2}:{3}:{4}:{5}", HA1, Nonce, ncvalue, cnonce, qop, HA2).CalculateMD5Hash();*/ + } + else if (qop.Contains("auth")) + { + qop = "auth"; + string HA2 = string.Concat(method, ":", uri).CalculateMD5Hash(); + + response = string.Format("{0}:{1}:{2}:{3}:{4}:{5}", HA1, Nonce, ncvalue, cnonce, qop, HA2).CalculateMD5Hash(); + } + else //throw new NotSupportedException("Unrecognized Quality of Protection value found: " + this.QualityOfProtections); + return string.Empty; + + string result = string.Format("Digest username=\"{0}\", realm=\"{1}\", nonce=\"{2}\", uri=\"{3}\", cnonce=\"{4}\", response=\"{5}\"", + credentials.UserName, Realm, Nonce, uri, cnonce, response); + + if (qop != null) + result += String.Concat(", qop=\"", qop, "\", nc=", ncvalue); + + if (!string.IsNullOrEmpty(Opaque)) + result = String.Concat(result, ", opaque=\"", Opaque, "\""); + + return result; + }// end of case "digest": + + default: + break; + } + } + catch + { + } + + return string.Empty; + } + + public bool IsUriProtected(Uri uri) + { + // http://tools.ietf.org/html/rfc2617#section-3.2.1 + // An absoluteURI in this list may refer to + // a different server than the one being accessed. The client can use + // this list to determine the set of URIs for which the same + // authentication information may be sent: any URI that has a URI in + // this list as a prefix (after both have been made absolute) may be + // assumed to be in the same protection space. If this directive is + // omitted or its value is empty, the client should assume that the + // protection space consists of all URIs on the responding server. + + if (string.CompareOrdinal(uri.Host, this.Uri.Host) != 0) + return false; + + string uriStr = uri.ToString(); + + if (ProtectedUris != null && ProtectedUris.Count > 0) + for (int i = 0; i < ProtectedUris.Count; ++i) + if (uriStr.Contains(ProtectedUris[i])) + return true; + + + return true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs.meta new file mode 100644 index 00000000..828998e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 113d4dfb584b960498d2b362b1ff1616 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/Digest.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs new file mode 100644 index 00000000..4267307d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs @@ -0,0 +1,57 @@ +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; + +namespace Best.HTTP.Request.Authentication +{ + /// + /// Stores and manages already received digest infos. + /// + public static class DigestStore + { + private static ConcurrentDictionary Digests = new ConcurrentDictionary(); + + /// + /// Array of algorithms that the plugin supports. It's in the order of priority(first has the highest priority). + /// + private static string[] SupportedAlgorithms = new string[] { "digest", "basic" }; + + public static Digest Get(Uri uri) + { + if (Digests.TryGetValue(uri.Host, out var digest)) + if (!digest.IsUriProtected(uri)) + return null; + return digest; + } + + /// + /// It will retrieve or create a new Digest for the given Uri. + /// + /// + /// + public static Digest GetOrCreate(Uri uri) => Digests.GetOrAdd(uri.Host, new Digest(uri)); + + public static void Remove(Uri uri) => Digests.TryRemove(uri.Host, out var _); + + public static void Clear() => Digests.Clear(); + + public static string FindBest(List authHeaders) + { + if (authHeaders == null || authHeaders.Count == 0) + return string.Empty; + + List headers = new List(authHeaders.Count); + for (int i = 0; i < authHeaders.Count; ++i) + headers.Add(authHeaders[i].ToLowerInvariant()); + + for (int i = 0; i < SupportedAlgorithms.Length; ++i) + { + int idx = headers.FindIndex((header) => header.StartsWith(SupportedAlgorithms[i])); + if (idx != -1) + return authHeaders[idx]; + } + + return string.Empty; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs.meta new file mode 100644 index 00000000..bfdcbd89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 323cdedca4b257a4f9b397955046ed55 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/DigestStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs new file mode 100644 index 00000000..43076a74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs @@ -0,0 +1,49 @@ +using System.Collections.Generic; + +using Best.HTTP.Shared.Extensions; + +namespace Best.HTTP.Request.Authentication +{ + /// + /// Used for parsing WWW-Authenticate headers: + /// `Digest realm="my realm", nonce="4664b327a2963503ba58bbe13ad672c0", qop=auth, opaque="f7e38bdc1c66fce214f9019ffe43117c"` + /// + public sealed class WWWAuthenticateHeaderParser : KeyValuePairList + { + public WWWAuthenticateHeaderParser(string headerValue) + { + Values = ParseQuotedHeader(headerValue); + } + + private List ParseQuotedHeader(string str) + { + List result = new List(); + + if (str != null) + { + + int idx = 0; + + // Read Type (Basic|Digest) + string type = str.Read(ref idx, (ch) => !char.IsWhiteSpace(ch) && !char.IsControl(ch)).TrimAndLower(); + result.Add(new HeaderValue(type)); + + // process the rest of the text + while (idx < str.Length) + { + // Read key + string key = str.Read(ref idx, '=').TrimAndLower(); + HeaderValue qp = new HeaderValue(key); + + // Skip any white space + str.SkipWhiteSpace(ref idx); + + qp.Value = str.ReadPossibleQuotedText(ref idx); + + result.Add(qp); + } + } + return result; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs.meta new file mode 100644 index 00000000..ee1513ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5696919a0b17a504a9d304c259874caf +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authentication/WWWAuthenticateHeaderParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators.meta new file mode 100644 index 00000000..c43bca30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: bdceeb0c2c2ffe045b0d65b1625802c2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs new file mode 100644 index 00000000..29da19a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs @@ -0,0 +1,49 @@ +namespace Best.HTTP.Request.Authenticators +{ + /// + /// An implementation for Bearer Token authentication. + /// + /// + /// Bearer Token authentication is a method used to access protected resources on a server. + /// It involves including a bearer token in the Authorization header of an HTTP request to prove the identity of the requester. + /// + public class BearerTokenAuthenticator : IAuthenticator + { + /// + /// Initializes a new instance of the BearerTokenAuthenticator class with the specified Bearer Token. + /// + /// The Bearer Token to use for authentication. + public string Token { get; private set; } + + /// + /// Sets up the required Authorization header with the Bearer Token for the HTTP request. + /// + /// The HTTP request for which the Authorization header should be added. + /// + /// When sending an HTTP request to a server that requires Bearer Token authentication, + /// this method sets the Authorization header with the Bearer Token to prove the identity of the requester. + /// This allows the requester to access protected resources on the server. + /// + public BearerTokenAuthenticator(string token) => this.Token = token; + + public void SetupRequest(HTTPRequest request) + { + if (!string.IsNullOrEmpty(this.Token)) + request.SetHeader("Authorization", $"Bearer {this.Token}"); + } + + /// + /// Handles the server response with a 401 (Unauthorized) status code and a WWW-Authenticate header. + /// This authenticator does not handle challenges and always returns false. + /// + /// The HTTP request that received the 401 response. + /// The HTTP response containing the 401 (Unauthorized) status. + /// false, as this authenticator does not handle challenges. + /// + /// Bearer Token authentication typically does not require handling challenges, + /// as the Bearer Token is included directly in the Authorization header of the request. + /// This method always returns false, as no additional challenge processing is needed. + /// + public bool HandleChallange(HTTPRequest req, HTTPResponse resp) => false; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs.meta new file mode 100644 index 00000000..79060597 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d868e2c2c58ac641a6eb45359eee94b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/BearerTokenAuthenticator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs new file mode 100644 index 00000000..8e077141 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs @@ -0,0 +1,91 @@ +using System; +using System.Text; + +using Best.HTTP.Request.Authentication; +using Best.HTTP.Shared; + +namespace Best.HTTP.Request.Authenticators +{ + /// + /// An implementation for HTTP Basic or Digest authentication. + /// + public class CredentialAuthenticator : IAuthenticator + { + /// + /// Gets or sets the associated with this authenticator. + /// + public Credentials Credentials { get; set; } + + /// + /// Initializes a new instance of the CrendetialAuthenticator class with the specified . + /// + /// The to use for authentication. + /// Thrown if is null. + public CredentialAuthenticator(Credentials credentials) + { + if (credentials == null) + throw new ArgumentNullException(nameof(credentials)); + + this.Credentials = credentials; + } + + /// + /// Sets up the required headers for the HTTP request based on the provided credentials. + /// + /// The HTTP request for which headers should be added. + public void SetupRequest(HTTPRequest request) + { + HTTPManager.Logger.Information(nameof(CredentialAuthenticator), $"SetupRequest({request}, {Credentials?.Type})", request.Context); + + if (Credentials == null) + return; + + switch (Credentials.Type) + { + case AuthenticationTypes.Basic: + // With Basic authentication we don't want to wait for a challenge, we will send the hash with the first request + request.SetHeader("Authorization", string.Concat("Basic ", Convert.ToBase64String(Encoding.UTF8.GetBytes(Credentials.UserName + ":" + Credentials.Password)))); + break; + + case AuthenticationTypes.Unknown: + case AuthenticationTypes.Digest: + var digest = DigestStore.Get(request.CurrentUri); + if (digest != null) + { + string authentication = digest.GenerateResponseHeader(Credentials, false, request.MethodType, request.CurrentUri); + if (!string.IsNullOrEmpty(authentication)) + request.SetHeader("Authorization", authentication); + } + + break; + } + + } + + /// + /// Handles the server response with a 401 (Unauthorized) status code and a WWW-Authenticate header. + /// The authenticator might determine the authentication method to use and initiate authentication if needed. + /// + /// The HTTP request that received the 401 response. + /// The HTTP response containing the 401 (Unauthorized) status. + /// true if the challenge is handled by the authenticator and the request can be resent with authentication; otherwise, false. + public bool HandleChallange(HTTPRequest req, HTTPResponse resp) + { + var www_authenticate = resp.GetHeaderValues("www-authenticate"); + + HTTPManager.Logger.Information(nameof(CredentialAuthenticator), $"HandleChallange({req}, {resp}, \"{www_authenticate}\")", req.Context); + + string authHeader = DigestStore.FindBest(www_authenticate); + if (!string.IsNullOrEmpty(authHeader)) + { + var digest = DigestStore.GetOrCreate(req.CurrentUri); + digest.ParseChallange(authHeader); + + if (this.Credentials != null && digest.IsUriProtected(req.CurrentUri) && (!req.HasHeader("Authorization") || digest.Stale)) + return true; + } + + return false; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs.meta new file mode 100644 index 00000000..10abb15a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 69e23320fe6bb034896f36f5773b06ad +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/CredentialAuthenticator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs new file mode 100644 index 00000000..bd048b33 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs @@ -0,0 +1,36 @@ +namespace Best.HTTP.Request.Authenticators +{ + /// + /// Represents an interface for various authentication implementations used in HTTP requests. + /// + public interface IAuthenticator + { + /// + /// Set required headers or content for the HTTP request. Called right before the request is sent out. + /// + /// + /// + /// The SetupRequest method will be called every time the request is redirected or retried. + /// + /// + /// The HTTP request to which headers or content will be added. + void SetupRequest(HTTPRequest request); + + /// + /// Called when the server is sending a 401 (Unauthorized) response with an WWW-Authenticate header. + /// The authenticator might find additional knowledge about the authentication requirements (like what auth method it should use). + /// If the authenticator is confident it can successfully (re)authenticate the request it can return true and the request will be resent to the server. + /// + /// + /// More details can be found here: + /// + /// RFC-9110 - 401 Unauthorized + /// RFC-9110 - WWW-Authenticate header + /// + /// + /// The HTTP request that received the 401 response. + /// The HTTP response containing the 401 (Unauthorized) status. + /// true if the challange is handled by the authenticator and the request can be re-sent with authentication. + bool HandleChallange(HTTPRequest req, HTTPResponse resp); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs.meta new file mode 100644 index 00000000..031bcab5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07b45cc6303c94540abce76b1370370a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Authenticators/IAuthenticator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings.meta new file mode 100644 index 00000000..b8221319 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: bf3fc2177584a3547b6e00a24f109839 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs new file mode 100644 index 00000000..a57dd3f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs @@ -0,0 +1,132 @@ +using System.Collections.Generic; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Response; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Request.Settings +{ + /// + /// Delegate for handling the event when headers are received in a response. + /// + /// The object. + /// The object. + /// The headers received from the server. + public delegate void OnHeadersReceivedDelegate(HTTPRequest req, HTTPResponse resp, Dictionary> headers); + + /// + /// Delegate for handling progress during the download. + /// + /// The object. + /// The number of bytes downloaded so far. + /// The total length of the content being downloaded, or -1 if the length cannot be determined. + public delegate void OnProgressDelegate(HTTPRequest req, long progress, long length); + + /// + /// Delegate for handling the event when the download of content starts. + /// + /// The object. + /// The object. + /// The used for receiving downloaded content. + public delegate void OnDownloadStartedDelegate(HTTPRequest req, HTTPResponse resp, DownloadContentStream stream); + + /// + /// Delegate for creating a new object. + /// + /// The object. + /// The object. + /// An interface for notifying connections that the buffer has free space for downloading data. + /// The newly created . + public delegate DownloadContentStream OnCreateDownloadStreamDelegate(HTTPRequest req, HTTPResponse resp, IDownloadContentBufferAvailable bufferAvailableHandler); + +#if !UNITY_WEBGL || UNITY_EDITOR + /// + /// Delegate for handling the event when a response is upgraded. + /// + /// The object. + /// The object. + /// A stream that provides content for the upgraded response. + /// true to keep the underlying connection open; otherwise, false. + public delegate bool OnUpgradedDelegate(HTTPRequest req, HTTPResponse resp, PeekableContentProviderStream contentProvider); +#endif + + /// + /// Represents settings for configuring an HTTP request's download behavior. + /// + public class DownloadSettings + { + /// + /// Gets or sets the maximum number of bytes the will buffer before pausing the download until its buffer has free space again. + /// + /// + /// When the download content stream buffers data up to this specified limit, it will temporarily pause downloading until it has free space in its buffer. + /// Increasing this value may help reduce the frequency of pauses during downloads, but it also increases memory usage. + /// + public long ContentStreamMaxBuffered = 1024 * 1024; + + /// + /// Gets or sets a value indicating whether caching should be enabled for this request. + /// + public bool DisableCache { get; set; } + + /// + /// Gets or sets a value indicating whether the response's should be populated with downloaded data or if the content should be written only to the local cache when available. + /// + /// + /// If set to true and the content isn't cacheable (e.g., it doesn't have any cache-related headers), the content will be downloaded but will be lost. + /// + /// + /// Gets or sets a value indicating whether the response's should be populated with downloaded data or if the content should be written only to the local cache when available. + /// + /// + /// If set to true and the content isn't cacheable (e.g., it doesn't have any cache-related headers), the content will be downloaded but will be lost. + /// This is because the downloaded data would be written exclusively to the local cache and will not be stored in memory or the response's for further use. + /// + public bool CacheOnly { get; set; } + + /// + /// This event is called when the plugin received and parsed all headers. + /// + public OnHeadersReceivedDelegate OnHeadersReceived; + + /// + /// Represents a function that creates a new object when needed for downloading content. + /// + public OnCreateDownloadStreamDelegate DownloadStreamFactory = (req, resp, bufferAvailableHandler) + => new DownloadContentStream(resp, req.DownloadSettings.ContentStreamMaxBuffered, bufferAvailableHandler); + + /// + /// Event for handling the start of the download process for 2xx status code responses. + /// + /// The object. + /// The object representing the response. + /// + /// The containing the downloaded data. It might already be populated with some content. + /// + /// + /// This event is called when the plugin expects the server to send content. When called, the + /// might already be populated with some content. It is specifically meant for responses with 2xx status codes. + /// + public OnDownloadStartedDelegate OnDownloadStarted; + + /// + /// Gets or sets the event that is called when new data is downloaded from the server. + /// + /// + /// The first parameter is the original object itself, the second parameter is the downloaded bytes, and the third parameter is the content length. + /// There are download modes where we can't figure out the exact length of the final content. In these cases, we guarantee that the third parameter will be at least the size of the second one. + /// + public OnProgressDelegate OnDownloadProgress; + +#if !UNITY_WEBGL || UNITY_EDITOR +#pragma warning disable 0649 + /// + /// Called when a response with status code 101 (upgrade), "connection: upgrade" header and value or an "upgrade" header received. + /// + /// This callback might be called on a thread other than the main one! + /// Isn't available under WebGL! + public OnUpgradedDelegate OnUpgraded; +#pragma warning restore 0649 +#endif + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs.meta new file mode 100644 index 00000000..610fbf66 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3e413d08106f68d4d84ad8500cf3a765 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/DownloadSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs new file mode 100644 index 00000000..ec07b291 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs @@ -0,0 +1,98 @@ +using System; +using System.Text; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Authentication; +using Best.HTTP.Shared; + +namespace Best.HTTP.Request.Settings +{ + /// + /// Represents settings related to using a proxy server for HTTP requests. + /// + public class ProxySettings + { + /// + /// Checks if there is a proxy configured for the given URI. + /// + /// The URI to check for proxy usage. + /// true if a proxy is configured and should be used for the URI; otherwise, false. + public bool HasProxyFor(Uri uri) => Proxy != null && Proxy.UseProxyForAddress(uri); + + /// + /// Gets or sets the proxy object used for the request. + /// + public Proxies.Proxy Proxy { get; set; } = HTTPManager.Proxy; + + /// + /// Sets up the HTTP request for passing through a proxy server. + /// + /// The HTTP request to set up. + public void SetupRequest(HTTPRequest request) + { + var currentUri = request.CurrentUri; + + bool tryToKeepAlive = HTTPManager.PerHostSettings.Get(currentUri.Host) + .HTTP1ConnectionSettings + .TryToReuseConnections; + + if (!HTTPProtocolFactory.IsSecureProtocol(currentUri) && this.HasProxyFor(currentUri) && !request.HasHeader("Proxy-Connection")) + request.AddHeader("Proxy-Connection", tryToKeepAlive ? "Keep-Alive" : "Close"); + + // Proxy Authentication + if (!HTTPProtocolFactory.IsSecureProtocol(currentUri) && HasProxyFor(currentUri) && this.Proxy.Credentials != null) + { + switch (Proxy.Credentials.Type) + { + case AuthenticationTypes.Basic: + // With Basic authentication we don't want to wait for a challenge, we will send the hash with the first request + var token = Convert.ToBase64String(Encoding.UTF8.GetBytes(this.Proxy.Credentials.UserName + ":" + this.Proxy.Credentials.Password)); + request.SetHeader("Proxy-Authorization", $"Basic {token}"); + break; + + case AuthenticationTypes.Unknown: + case AuthenticationTypes.Digest: + var digest = DigestStore.Get(this.Proxy.Address); + if (digest != null) + { + string authentication = digest.GenerateResponseHeader(this.Proxy.Credentials, false, request.MethodType, currentUri); + if (!string.IsNullOrEmpty(authentication)) + request.SetHeader("Proxy-Authorization", authentication); + } + + break; + } + } + } + + /// + /// Handles the proxy's response with status code 407. + /// + /// The HTTP request that received a 407 response. + /// true to resend the request through the proxy; otherwise, false. + public bool Handle407(HTTPRequest request) + { + if (this.Proxy == null) + return false; + + return this.Proxy.SetupRequest(request); + } + + /// + /// Adds the proxy address to a hash for the given request URI. + /// + /// The request URI for which the proxy address is added to the hash. + /// The hash to which the proxy address is added. + public void AddToHash(Uri requestUri, ref UnityEngine.Hash128 hash) + { + if (HasProxyFor(requestUri)) + HostKey.Append(this.Proxy.Address, ref hash); + } + + public override string ToString() + { + return this.Proxy?.Address?.ToString(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs.meta new file mode 100644 index 00000000..f90812ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 187900d0bbfe66243ad32654d11316f6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/ProxySettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs new file mode 100644 index 00000000..6ee78597 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs @@ -0,0 +1,77 @@ +using System; + +namespace Best.HTTP.Request.Settings +{ + public delegate bool OnBeforeRedirectionDelegate(HTTPRequest req, HTTPResponse resp, Uri redirectUri); + + /// + /// Represents settings related to handling HTTP request redirection. + /// + public class RedirectSettings + { + /// + /// Indicates whether the request has been redirected. + /// A request's IsRedirected might be true while is zero if the redirection is made to the local cache. + /// + public bool IsRedirected { get; internal set; } + + /// + /// The Uri that the request is redirected to. + /// + public Uri RedirectUri { get; internal set; } + + /// + /// How many redirection is supported for this request. The default is 10. Zero or a negative value means no redirections are supported. + /// + + /// + /// Gets or sets the maximum number of redirections supported for this request. The default is 10. + /// A value of zero or a negative value means no redirections are supported. + /// + public int MaxRedirects { get; set; } + + /// + /// Gets the number of times the request has been redirected. + /// + public int RedirectCount { get; internal set; } + + /// + /// Occurs before the plugin makes a new request to the new URI during redirection. + /// The return value of this event handler controls whether the redirection is aborted (false) or allowed (true). + /// This event is called on a thread other than the main Unity thread. + /// + public event OnBeforeRedirectionDelegate OnBeforeRedirection + { + add { onBeforeRedirection += value; } + remove { onBeforeRedirection -= value; } + } + private OnBeforeRedirectionDelegate onBeforeRedirection; + + /// + /// Initializes a new instance of the RedirectSettings class with the specified maximum redirections. + /// + /// The maximum number of redirections allowed. + public RedirectSettings(int maxRedirects) + { + this.MaxRedirects = maxRedirects; + this.RedirectCount = 0; + } + + /// + /// Resets and to their default values. + /// + public void Reset() + { + this.IsRedirected = false; + this.RedirectCount = 0; + } + + internal bool CallOnBeforeRedirection(HTTPRequest req, HTTPResponse resp, Uri redirectUri) + { + if (onBeforeRedirection != null) + return onBeforeRedirection(req, resp, redirectUri); + + return true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs.meta new file mode 100644 index 00000000..9fc40f71 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ab5aa9485b2a13e4196c40a39756ad17 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RedirectSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs new file mode 100644 index 00000000..10dd70b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs @@ -0,0 +1,26 @@ +namespace Best.HTTP.Request.Settings +{ + /// + /// Represents settings related to request retry behavior. + /// + public class RetrySettings + { + /// + /// Gets the number of times that the plugin has retried the request. + /// + public int Retries { get; set; } + + /// + /// Gets or sets the maximum number of retry attempts allowed. To disable retries, set this value to 0. + /// The default value is 1 for GET requests, otherwise 0. + /// + public int MaxRetries { get; set; } + + /// + /// Initializes a new instance of the RetrySettings class with the specified maximum retry attempts. + /// + /// The maximum number of retry attempts allowed. + public RetrySettings(int maxRetries) + => this.MaxRetries = maxRetries; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs.meta new file mode 100644 index 00000000..f12b3055 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6dc0d7446a891b94082c956de0282ef9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/RetrySettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs new file mode 100644 index 00000000..0d636b18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs @@ -0,0 +1,76 @@ +using System; + +using Best.HTTP.Shared; + +namespace Best.HTTP.Request.Settings +{ + /// + /// Represents settings related to connection-timeouts and processing duration. + /// + public class TimeoutSettings + { + /// + /// Gets the timestamp when the request was queued for processing. + /// + public DateTime QueuedAt { get; internal set; } + + /// + /// Gets the timestamp when the processing of the request started by a connection. + /// + public DateTime ProcessingStarted { get; internal set; } + + /// + /// Gets or sets the maximum time to wait for establishing the connection to the target server. + /// If set to TimeSpan.Zero or lower, no connect timeout logic is executed. Default value is 20 seconds. + /// + public TimeSpan ConnectTimeout + { + get => this._connectTimeout ?? HTTPManager.PerHostSettings.Get(this._request.CurrentHostKey.Host).RequestSettings.ConnectTimeout; + set => this._connectTimeout = value; + } + private TimeSpan? _connectTimeout; + + /// + /// Gets or sets the maximum time to wait for the request to finish after the connection is established. + /// + public TimeSpan Timeout + { + get => this._timeout ?? HTTPManager.PerHostSettings.Get(this._request.CurrentHostKey.Host).RequestSettings.RequestTimeout; + set => this._timeout = value; + } + private TimeSpan? _timeout; + + /// + /// Returns true if the request has been stuck in the connection phase for too long. + /// + /// The current timestamp. + /// true if the connection has timed out; otherwise, false. + public bool IsConnectTimedOut(DateTime now) => this.QueuedAt != DateTime.MinValue && now - this.QueuedAt > this.ConnectTimeout; + + /// + /// Returns true if the time has passed the specified Timeout setting since processing started or if the connection has timed out. + /// + /// The current timestamp. + /// true if the request has timed out; otherwise, false. + public bool IsTimedOut(DateTime now) + { + bool result = (this.ProcessingStarted != DateTime.MinValue && now - this.ProcessingStarted > this.Timeout) || this.IsConnectTimedOut(now); ; + return result; + } + + private HTTPRequest _request; + + /// + /// Initializes a new instance of the TimeoutSettings class for a specific . + /// + /// The associated with these timeout settings. + public TimeoutSettings(HTTPRequest request) + => this._request = request; + + public void SetProcessing(DateTime now) + { + this.QueuedAt = DateTime.MinValue; + this.ProcessingStarted = now; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs.meta new file mode 100644 index 00000000..bf4287c3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 39256be26c7ee1b47a5beca18520959d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/TimeoutSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs new file mode 100644 index 00000000..1f582704 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs @@ -0,0 +1,157 @@ +using System; +using System.IO; + +using Best.HTTP.Request.Upload; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; + +namespace Best.HTTP.Request.Settings +{ + public delegate void OnHeadersSentDelegate(HTTPRequest req); + + /// + /// Options for sending the request headers and content, including upload progress monitoring. + /// + /// might be called when redirected or retried! + public class UploadSettings : IDisposable + { + /// + /// Size of the internal buffer, and upload progress will be fired when this size of data sent to the wire. Its default value is 4 KiB. + /// + public int UploadChunkSize = 4 * 1024; + + /// + /// The stream that the plugin will use to send data to the server. + /// + /// + /// The stream can be any regular implementation or a specialized one inheriting from : + /// + /// A specialized for data generated on-the-fly or periodically. The request remains active until the method is invoked, ensuring continuous data feed even during temporary empty states. + /// An implementation to convert and upload the object as JSON data. It sets the "Content-Type" header to "application/json; charset=utf-8". + /// An implementation representing a stream that prepares and sends data as URL-encoded form data in an HTTP request. + /// An based implementation of the multipart/form-data Content-Type. It's very memory-effective, streams are read into memory in chunks. + /// + /// + public Stream UploadStream; + + /// + /// Set to false if the plugin MUST NOT dispose after the request is finished. + /// + public bool DisposeStream = true; + + /// + /// Called periodically when data sent to the server. + /// + public OnProgressDelegate OnUploadProgress; + + /// + /// This event is fired after the headers are sent to the server. + /// + public event OnHeadersSentDelegate OnHeadersSent + { + add { _onHeadersSent += value; } + remove { _onHeadersSent -= value; } + } + private OnHeadersSentDelegate _onHeadersSent; + + // + // Whether to send an "Expect: 100-continue" header and value when there's content to send ( != null). + // By using "Expect: 100-continue" the server is able to respond with an error (like 401-unauthorized, 405-method not allowed, etc.) or redirect before the client sends the whole payload. + // + // + // More details can be found here: + // + // RFC-9110 - Expect header + // EXPECT: TWEAKS IN CURL (by Daniel Stenberg) + // + // + //public bool SendExpect100Continue = true; + + // False by default, set to true only when "Expect: 100-continue" sent out. + //internal bool Expect100Continue = false; + + //internal void ResetExpects() => this.SendExpect100Continue = this.Expect100Continue = false; + + private bool isDisposed; + + /// + /// Called every time the request is sent out (redirected or retried). + /// + /// The being prepared. + /// true if the can be fired. + public virtual void SetupRequest(HTTPRequest request, bool dispatchHeadersSentCallback) + { + if (isDisposed) + throw new ObjectDisposedException(nameof(UploadSettings)); + + if (this.UploadStream is UploadStreamBase upStream) + upStream.BeforeSendHeaders(request); + + // Decide on whether append an "expect: 100-continue" or not. + // https://www.rfc-editor.org/rfc/rfc9110#name-expect + /* + if (this.SendExpect100Continue && this.UploadStream != null) + { + request.AddHeader("expect", "100-continue"); + + this.Expect100Continue = true; + } + else + request.RemoveHeader("expect"); + */ + + if (dispatchHeadersSentCallback) + { + // Call the callback on the unity main thread + if (HTTPUpdateDelegator.Instance.IsMainThread()) + call_onBeforeHeaderSend(request); + else + new RunOnceOnMainThread(() => call_onBeforeHeaderSend(request), request.Context) + .Subscribe(); + } + } + + protected void call_onBeforeHeaderSend(HTTPRequest request) + { + try + { + _onHeadersSent?.Invoke(request); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(UploadSettings), nameof(OnHeadersSent), ex, request.Context); + } + } + + protected virtual void Dispose(bool disposing) + { + if (!isDisposed) + { + if (disposing) + { + if (this.DisposeStream) + { + var stream = this.UploadStream; + + if (stream != null) + { + this.UploadStream?.Dispose(); + this.UploadStream = null; + + isDisposed = true; + } + } + } + } + } + + /// + /// Dispose of resources used by the UploadSettings instance. + /// + public void Dispose() + { + Dispose(disposing: true); + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs.meta new file mode 100644 index 00000000..e45d2b3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7cf0fd5a0cd00cc40b9f5fb9f79956d4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Settings/UploadSettings.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings.meta new file mode 100644 index 00000000..a17d3151 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 389dca70c7a1046429edd02f627fdb07 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs new file mode 100644 index 00000000..0f8179a1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs @@ -0,0 +1,220 @@ +using System; +using System.Collections.Generic; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Request.Timings +{ + struct PartialEvent + { + public string EventName; + public DateTime StartedAt; + + public PartialEvent(string eventName, DateTime startedAt) + { + this.EventName = eventName; + this.StartedAt = startedAt; + } + + public bool IsSet() => !string.IsNullOrEmpty(EventName) && StartedAt != DateTime.MinValue; + + public override string ToString() => $"[PartialEvent '{EventName}', {StartedAt.ToString("hh:mm:ss.fffffff")}]"; + } + + /// + /// Helper class to store, calculate and manage request related events and theirs duration, referenced by field. + /// + public sealed class TimingCollector + { + public HTTPRequest ParentRequest { get; } + + /// + /// When the TimingCollector instance created. + /// + public DateTime Created { get; private set; } + + /// + /// When the closing Finish event is sent. + /// + public DateTime Finished { get; private set; } + + /// + /// List of added events. + /// + public List Events { get; private set; } + + private PartialEvent _partialEvent; + + internal TimingCollector(HTTPRequest parentRequest) + { + this.ParentRequest = parentRequest; + this.Created = DateTime.UtcNow; + this.Finished = DateTime.MinValue; + this._partialEvent = new PartialEvent(TimingEventNames.Initial, this.Created); + } + + public void StartNext(string eventName) => RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.ParentRequest, new TimingEventInfo(this.ParentRequest, TimingEvents.StartNext, eventName))); + + internal void AddEvent(TimingEventInfo timingEvent) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TimingCollector), $"AddEvent({timingEvent}, {this._partialEvent})", ParentRequest.Context); + + switch(timingEvent.Event) + { + case TimingEvents.StartNext: + if (this._partialEvent.IsSet()) + { + // If it's the same event name as the last one, merge the two event by not doing anything now. + if (timingEvent.Name.Equals(this._partialEvent.EventName, StringComparison.OrdinalIgnoreCase)) + break; + + AddEvent(this._partialEvent.EventName, this._partialEvent.StartedAt, timingEvent.Time - this._partialEvent.StartedAt); + } + + if (this.Finished != DateTime.MinValue) + AddEvent(timingEvent.Name, timingEvent.Time, timingEvent.Time - this.Events[^1].Start); + else if (timingEvent.Name != null) + this._partialEvent = new PartialEvent(timingEvent.Name, timingEvent.Time); + break; + + case TimingEvents.Finish: + AddEvent(this._partialEvent.EventName, this._partialEvent.StartedAt, timingEvent.Time - this._partialEvent.StartedAt); + + this._partialEvent = default; + var now = DateTime.UtcNow; + AddEvent(TimingEventNames.Finished, now, now - this.Created); + + this.Finished = now; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TimingCollector), this.ToString(),ParentRequest.Context); + break; + } + } + + /// + /// When the event happened and for how long. + /// + internal void AddEvent(string name, DateTime when, TimeSpan duration) + { + if (this.Events == null) + this.Events = new List(16); + + // Events can have zero ms durations, this block would set the same duration as the previous one, + // and that's clearly wrong. + /*if (duration == TimeSpan.Zero) + { + DateTime prevEventAt = this.Created; + if (this.Events.Count > 0) + prevEventAt = this.Events[this.Events.Count - 1].Start; + duration = when - prevEventAt; + }*/ + + //if (name != TimingEventNames.Queued) + //{ + // int idx = this.Events.FindIndex(e => e.Name.Equals(name)); + // if (idx != -1) + // HTTPManager.Logger.Warning(nameof(TimingCollector), $"'{name}' already present at idx '{idx}'({this.Events[idx].Start.ToString("hh:mm:ss.fffffff")}) new event time: {when.ToString("hh:mm:ss.fffffff")}! Current timing table: {this.ToString()}", this.ParentRequest.Context); + //} + + this.Events.Add(new TimingEvent(name, when, duration)); + } + + public TimingEvent FindFirst(string name) + { + if (this.Events == null) + return TimingEvent.Empty; + + for (int i = 0; i < this.Events.Count; ++i) + { + if (this.Events[i].Name == name) + return this.Events[i]; + } + + return TimingEvent.Empty; + } + + public TimingEvent FindLast(string name) + { + if (this.Events == null) + return TimingEvent.Empty; + + for (int i = this.Events.Count - 1; i >= 0; --i) + { + if (this.Events[i].Name == name) + return this.Events[i]; + } + + return TimingEvent.Empty; + } + + public TimingEvent FindNext(TimingEvent relativeTo, string name) + { + int from = 0; + + if (relativeTo != TimingEvent.Empty) + { + for (int i = 0; i < this.Events.Count; i++) + { + var ev = this.Events[i]; + + if (relativeTo.Equals(ev)) + { + from = i + 1; + break; + } + } + } + + for (int i = from; i < this.Events.Count; i++) + { + var ev = this.Events[i]; + + if (ev.Name == name) + return ev; + } + + return TimingEvent.Empty; + } + + public override string ToString() + { + var sb = StringBuilderPool.Get(0); + + sb.Append("{\"Created\": \""); + sb.Append(this.Created.ToString("yyyy-MM-dd hh:mm:ss.fffffff")); + + sb.Append("\",\"Finished\": \""); + sb.Append(this.Finished.ToString("yyyy-MM-dd hh:mm:ss.fffffff")); + + if (this.Events != null) + { + sb.Append("\", \"Events\": "); + sb.Append('['); + + for (int i = 0; i < this.Events.Count; ++i) + { + var @event = this.Events[i]; + + sb.Append("{\"Name\": \""); + sb.Append(@event.Name); + sb.Append("\", \"Duration\": \""); + sb.Append(@event.Duration); + sb.Append("\"}"); + + if (i < this.Events.Count - 1) + sb.Append(','); + } + + sb.Append(']'); + } + + sb.Append('}'); + + return StringBuilderPool.ReleaseAndGrab(sb); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs.meta new file mode 100644 index 00000000..c60504b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d71df0a057c2faa46a145bf71a3c2f1d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingCollector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs new file mode 100644 index 00000000..20de3db4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs @@ -0,0 +1,73 @@ +using System; + +namespace Best.HTTP.Request.Timings +{ + /// + /// Struct to hold information about one timing event recorded for a . Timing events are managed by the . + /// + public struct TimingEvent : IEquatable + { + public static readonly TimingEvent Empty = new TimingEvent(null, TimeSpan.Zero); + + /// + /// Name of the event + /// + public readonly string Name; + + /// + /// Duration of the event. + /// + public readonly TimeSpan Duration; + + /// + /// When the event started. + /// + public readonly DateTime Start; + + public TimingEvent(string name, TimeSpan duration) + { + this.Name = name; + this.Duration = duration; + this.Start = DateTime.UtcNow; + } + + public TimingEvent(string name, DateTime when, TimeSpan duration) + { + this.Name = name; + this.Start = when; + this.Duration = duration; + } + + public TimeSpan CalculateDuration(TimingEvent tEvent) + { + if (this.Start < tEvent.Start) + return tEvent.Start - this.Start; + + return this.Start - tEvent.Start; + } + + public bool Equals(TimingEvent other) + { + return this.Name == other.Name && + this.Duration == other.Duration && + this.Start == other.Start; + } + + public override bool Equals(object obj) + { + if (obj is TimingEvent) + return this.Equals((TimingEvent)obj); + + return false; + } + + public override int GetHashCode() => (this.Name != null ? this.Name.GetHashCode() : 0) ^ this.Duration.GetHashCode() ^ this.Start.GetHashCode(); + + public static bool operator ==(TimingEvent lhs, TimingEvent rhs) => lhs.Equals(rhs); + + public static bool operator !=(TimingEvent lhs, TimingEvent rhs) => !lhs.Equals(rhs); + + public override string ToString() => $"['{this.Name}': {this.Duration} ({this.Start.ToString("hh:mm:ss.fffffff")})]"; + + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs.meta new file mode 100644 index 00000000..64d18f56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0660f6d607bdf3c4595e0544ca50dc5b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEvent.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs new file mode 100644 index 00000000..34596a99 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs @@ -0,0 +1,39 @@ +using System; + +namespace Best.HTTP.Request.Timings +{ + public enum TimingEvents + { + StartNext, + Finish + } + + public readonly struct TimingEventInfo + { + public readonly HTTPRequest SourceRequest; + public readonly TimingEvents Event; + + public readonly string Name; + public readonly DateTime Time; + + public TimingEventInfo(HTTPRequest parentRequest, TimingEvents timingEvent) + { + this.SourceRequest = parentRequest; + this.Event = timingEvent; + + this.Name = null; + this.Time = DateTime.UtcNow; + } + + public TimingEventInfo(HTTPRequest parentRequest, TimingEvents timingEvent, string eventName) + { + this.SourceRequest = parentRequest; + this.Event = timingEvent; + + this.Name = eventName; + this.Time = DateTime.UtcNow; + } + + public override string ToString() => $"[{Event} \"{Name}\", Time: \"{Time.ToString("hh:mm:ss.fffffff")}\", Source: {SourceRequest.Context.Hash}]"; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs.meta new file mode 100644 index 00000000..8476dcd3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8c72c6b44e87158408cc72cb04fc43ce +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs new file mode 100644 index 00000000..e9e0aa89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs @@ -0,0 +1,23 @@ +namespace Best.HTTP.Request.Timings +{ + public static class TimingEventNames + { + public const string Initial = "Initial"; + public const string Queued = "Queued"; + //public const string Queued_For_Redirection = "Queued for redirection"; + public const string ProxyDetection = "Proxy Detection"; + public const string DNS_Lookup = "DNS Lookup"; + public const string TCP_Connection = "TCP Connection"; + public const string Proxy_Negotiation = "Proxy Negotiation"; + public const string TLS_Negotiation = "TLS Negotiation"; + public const string Request_Sent = "Request Sent"; + public const string Waiting_TTFB = "Waiting (TTFB)"; + public const string Headers = "Headers"; + //public const string Loading_From_Cache = "Loading from Cache"; + //public const string Writing_To_Cache = "Writing to Cache"; + public const string Response_Received = "Response Received"; + //public const string Queued_For_Disptach = "Queued for Dispatch"; + public const string Finished = "Finished in"; + public const string Callback = "Callback"; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs.meta new file mode 100644 index 00000000..f5fba709 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0efad4dc5671b18459733670a6241006 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Timings/TimingEventNames.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload.meta new file mode 100644 index 00000000..2ba5d6cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 8e29c95165d45184d883ca5f901223f8 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs new file mode 100644 index 00000000..178c5896 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs @@ -0,0 +1,23 @@ +namespace Best.HTTP.Request.Upload +{ + /// + /// Provides constants representing different, special body lengths for HTTP requests with upload streams. + /// + public static class BodyLengths + { + /// + /// The 's length is unknown and the plugin have to send data with 'chunked' transfer-encoding. + /// + public const long UnknownWithChunkedTransferEncoding = -2; + + /// + /// The 's length is unknown and the plugin have to send data as-is, without any encoding. + /// + public const long UnknownRaw = -1; + + /// + /// No content to send. + /// + public const long NoBody = 0; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs.meta new file mode 100644 index 00000000..09ea760a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 517183824f3e02745ba784c260724b60 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/BodyLengths.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs new file mode 100644 index 00000000..1e19780d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs @@ -0,0 +1,178 @@ +using System; +using System.Collections.Concurrent; +using System.Threading; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Request.Upload +{ + /// + /// A specialized upload stream designed to handle data that's generated on-the-fly or periodically. + /// + /// + /// This implementation is designed to handle scenarios where data may not always be immediately available for upload. + /// The request will remain active until the method is invoked, ensuring that data can continue to be fed into the stream even if it's temporarily empty during a Read operation. + /// + public sealed class DynamicUploadStream : UploadStreamBase + { + /// + /// Gets the length of the upload stream. + /// + /// + /// This implementation returns a constant value of -1, indicating that the length of the data to be uploaded is unknown. When the processing connection encounters this value, it should utilize chunked uploading to handle the data transfer. + /// + /// The constant value of -1, representing unknown length. + public override long Length + => BodyLengths.UnknownWithChunkedTransferEncoding; + + /// + /// Gets the length of data currently buffered and ready for upload. + /// + /// The length of buffered data in bytes. + public long BufferedLength + => this._bufferedLength; + + private long _bufferedLength; + private bool _isCompleted; + private ConcurrentQueue _chunks = new ConcurrentQueue(); + private BufferSegment _current; + private string _contentType; + + /// + /// Initializes a new instance of the DynamicUploadStream class with an optional content type. + /// + /// The MIME type of the content to be uploaded. Defaults to "application/octet-stream" if not specified. + /// + /// This constructor allows the caller to specify the content type of the data to be uploaded. If not provided, it defaults to a general binary data type. + /// + public DynamicUploadStream(string contentType = "application/octet-stream") + => this._contentType = contentType; + + /// + /// Sets the necessary headers before sending the request. + /// + public override void BeforeSendHeaders(HTTPRequest request) + => request.SetHeader("content-type", this._contentType); + + /// + /// Prepares the stream before the request body is sent. + /// + public override void BeforeSendBody(HTTPRequest request, IThreadSignaler threadSignaler) + => base.BeforeSendBody(request, threadSignaler); + + /// + /// Reads data from the stream to be uploaded. + /// + /// + /// The returned value indicates the state of the stream: + /// + /// -1More data is expected in the future, but isn't currently available. When new data is ready, the IThreadSignaler must be notified. + /// 0The stream has been closed and no more data will be provided. + /// Otherwise it returns with the number bytes copied to the buffer. + /// + /// Note: A zero return value can come after a -1 return, indicating a transition from waiting to completion. + /// + public override int Read(byte[] buffer, int offset, int count) + { + int readCount = 0; + + while (readCount < count && (_current != BufferSegment.Empty || _chunks.TryDequeue(out _current))) + { + int copyCount = Math.Min(count - readCount, _current.Count); + + Array.Copy(_current.Data, _current.Offset, buffer, offset, copyCount); + + readCount += copyCount; + offset += copyCount; + + if (_current.Offset + copyCount >= _current.Count) + { + BufferPool.Release(_current); + _current = BufferSegment.Empty; + } + else + { + _current = _current.Slice(_current.Offset + copyCount); + } + } + + if (!this._isCompleted && readCount == 0) + return UploadReadConstants.WaitForMore; + + Interlocked.Add(ref this._bufferedLength, -readCount); + + return readCount; + } + + /// + /// Writes data to the stream, making it available for upload. + /// + /// + /// After writing data to the stream using this method, the connection is signaled that data is available to send. + /// + /// The array of unsigned bytes from which to copy count bytes to the current stream. + /// The zero-based byte offset in buffer at which to begin copying bytes to the current stream. + /// The number of bytes to be written to the current stream. + /// Thrown when trying to write after the stream has been marked as complete. + public override void Write(byte[] buffer, int offset, int count) + { + if (buffer == null) + throw new ArgumentNullException(nameof(buffer)); + + if (this._isCompleted) + throw new InvalidOperationException("Complete() already called on the stream!"); + + var localCopy = BufferPool.Get(count, true, base.Signaler?.Context); + Array.Copy(buffer, 0, localCopy, offset, count); + + Write(localCopy.AsBuffer(count)); + } + + /// + /// Writes a segment of data to the stream, making it available for upload. + /// + /// A segment of data to be written to the stream. + /// Thrown when trying to write after the stream has been marked as complete. + /// + /// After writing a segment to the stream using this method, the connection is signaled that data is available to send. + /// + public void Write(BufferSegment segment) + { + if (this._isCompleted) + throw new InvalidOperationException("Complete() already called on the stream!"); + + if (segment.Data == null) + return; + + this._chunks.Enqueue(segment); + Interlocked.Add(ref this._bufferedLength, segment.Count); + + this.Signaler?.SignalThread(); + } + + /// + /// Marks the stream as complete, signaling that no more data will be added. + /// + /// + /// All remaining buffered data will be sent to the server. + /// + public void Complete() + { + if (this._isCompleted) + throw new InvalidOperationException("Complete() already called on the stream!"); + + this._isCompleted = true; + base.Signaler?.SignalThread(); + } + + public override bool CanRead => true; + public override bool CanSeek => false; + public override bool CanWrite => true; + public override long Position { get => throw new System.NotImplementedException(); set => throw new System.NotImplementedException(); } + public override long Seek(long offset, System.IO.SeekOrigin origin) => throw new System.NotImplementedException(); + public override void SetLength(long value) => throw new System.NotImplementedException(); + public override void Flush() { } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs.meta new file mode 100644 index 00000000..439c70f1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ebb54a5ce9460664f826e2ff8b5ae38f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/DynamicUploadStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms.meta new file mode 100644 index 00000000..251fcdef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: e43c3ab19497cb84089ea5d4aefa8591 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs new file mode 100644 index 00000000..8a183d57 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs @@ -0,0 +1,271 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +using UnityEngine; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; + +namespace Best.HTTP.Request.Upload.Forms +{ + /// + /// An based implementation of the multipart/form-data Content-Type. It's very memory-effective, streams are read into memory in chunks. + /// + /// + /// The return value of is treated specially in the plugin: + /// + /// + /// Less than zero(-1) value + /// indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled. + /// + /// + /// Zero (0) + /// means that the stream is closed, no more data can be expected. + /// + /// + /// A zero value to signal stream closure can follow a less than zero value. + /// + public sealed class MultipartFormDataStream : UploadStreamBase + { + /// + /// Gets the length of this multipart/form-data stream. + /// + public override long Length { get => this._length; } + private long _length; + + /// + /// A random boundary generated in the constructor. + /// + private string boundary; + + private Queue fields = new Queue(1); + private StreamList currentField; + + /// + /// Initializes a new instance of the MultipartFormDataStream class. + /// + public MultipartFormDataStream() + { + var hash = new Hash128(); + hash.Append(this.GetHashCode()); + + this.boundary = $"com.Tivadar.Best.HTTP.boundary.{hash}"; + } + + /// + /// Initializes a new instance of the MultipartFormDataStream class with a custom boundary. + /// + public MultipartFormDataStream(string boundary) + { + this.boundary = boundary; + } + + public override void BeforeSendHeaders(HTTPRequest request) + { + request.SetHeader("Content-Type", $"multipart/form-data; boundary=\"{this.boundary}\""); + + var boundaryStream = new BufferPoolMemoryStream(); + boundaryStream.WriteLine("--" + this.boundary + "--"); + boundaryStream.Position = 0; + + this.fields.Enqueue(new StreamList(boundaryStream)); + + if (this._length >= 0) + this._length += boundaryStream.Length; + } + + /// + /// Adds a textual field to the multipart/form-data stream. + /// + /// The name of the field. + /// The textual value of the field. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddField(string fieldName, string value) + => AddField(fieldName, value, System.Text.Encoding.UTF8); + + /// + /// Adds a textual field to the multipart/form-data stream. + /// + /// The name of the field. + /// The textual value of the field. + /// The encoding to use for the value. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddField(string fieldName, string value, System.Text.Encoding encoding) + { + var enc = encoding ?? System.Text.Encoding.UTF8; + var byteCount = enc.GetByteCount(value); + var buffer = BufferPool.Get(byteCount, true); + var stream = new BufferPoolMemoryStream(); + + enc.GetBytes(value, 0, value.Length, buffer, 0); + + stream.Write(buffer, 0, byteCount); + + stream.Position = 0; + + string mime = encoding != null ? "text/plain; charset=" + encoding.WebName : null; + return AddStreamField(fieldName, stream, null, mime); + } + + /// + /// Adds a stream field to the multipart/form-data stream. + /// + /// The name of the field. + /// The data containing the field data. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddField(string fieldName, byte[] data) + => AddStreamField(fieldName, new MemoryStream(data)); + + /// + /// Adds a stream field to the multipart/form-data stream. + /// + /// The stream containing the field data. + /// The name of the field. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddStreamField(string fieldName, System.IO.Stream stream) + => AddStreamField(fieldName, stream, null, null); + + /// + /// Adds a stream field to the multipart/form-data stream. + /// + /// The stream containing the field data. + /// The name of the field. + /// The name of the file, if applicable. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddStreamField(string fieldName, System.IO.Stream stream, string fileName) + => AddStreamField(fieldName, stream, fileName, null); + + /// + /// Adds a stream field to the multipart/form-data stream. + /// + /// The stream containing the field data. + /// The name of the field. + /// The name of the file, if applicable. + /// The MIME type of the content. + /// The MultipartFormDataStream instance for method chaining. + public MultipartFormDataStream AddStreamField(string fieldName, System.IO.Stream stream, string fileName, string mimeType) + { + var header = new BufferPoolMemoryStream(); + header.WriteLine("--" + this.boundary); + header.WriteLine("Content-Disposition: form-data; name=\"" + fieldName + "\"" + (!string.IsNullOrEmpty(fileName) ? "; filename=\"" + fileName + "\"" : string.Empty)); + + // Set up Content-Type head for the form. + if (!string.IsNullOrEmpty(mimeType)) + header.WriteLine("Content-Type: " + mimeType); + + header.WriteLine(); + header.Position = 0; + + var footer = new BufferPoolMemoryStream(); + footer.Write(EOL, 0, EOL.Length); + footer.Position = 0; + + // all wrapped streams going to be disposed by the StreamList wrapper. + var wrapper = new StreamList(header, stream, footer); + + try + { + if (this._length >= 0) + this._length += wrapper.Length; + } + catch + { + this._length = -1; + } + + this.fields.Enqueue(wrapper); + + return this; + } + + /// + /// Adds the final boundary to the multipart/form-data stream before sending the request body. + /// + /// The HTTP request. + /// The thread signaler for handling asynchronous operations. + public override void BeforeSendBody(HTTPRequest request, IThreadSignaler threadSignaler) + { + base.BeforeSendBody(request, threadSignaler); + } + + /// + /// Reads data from the multipart/form-data stream into the provided buffer. + /// + /// The buffer to read data into. + /// The starting offset in the buffer. + /// The maximum number of bytes to read. + /// The number of bytes read into the buffer. + public override int Read(byte[] buffer, int offset, int length) + { + if (this.currentField == null && this.fields.Count == 0) + return -1; + + if (this.currentField == null && this.fields.Count > 0) + this.currentField = this.fields.Dequeue(); + + int readCount = 0; + + do + { + // read from the current stream + int count = this.currentField.Read(buffer, offset + readCount, length - readCount); + + if (count > 0) + readCount += count; + else + { + // if the current field's stream is empty, go for the next one. + + // dispose the current one first + try + { + this.currentField.Dispose(); + } + catch + { } + + // no more fields/streams? exit + if (this.fields.Count == 0) + break; + + // grab the next one + this.currentField = this.fields.Dequeue(); + } + + // exit when we reach the length goal, or there's no more streams to read from + } while (readCount < length && this.fields.Count > 0); + + return readCount; + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (fields != null) + { + foreach (var field in fields) + field.Dispose(); + fields.Clear(); + fields = null; + } + + currentField?.Dispose(); + currentField = null; + } + + public override bool CanRead { get { return true; } } + public override bool CanSeek { get { return false; } } + public override bool CanWrite { get { return false; } } + public override long Position { get => throw new NotImplementedException(); set => throw new NotImplementedException(); } + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) => throw new NotImplementedException(); + public override void Write(byte[] buffer, int offset, int count) => throw new NotImplementedException(); + public override void Flush() { } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs.meta new file mode 100644 index 00000000..c5493e72 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d54866f088b8c154db3325a2771b58af +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/MultipartFormDataStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs new file mode 100644 index 00000000..04f543ce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs @@ -0,0 +1,158 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Request.Upload.Forms +{ + /// + /// Readonly struct to hold key -> value pairs, where the value is either textual or binary. + /// + readonly struct FormField + { + public readonly string Key; + public readonly string TextValue; + public readonly byte[] BinaryValue; + + public FormField(string key, string textValue) + { + this.Key = key; + this.TextValue = textValue; + this.BinaryValue = null; + } + + public FormField(string key, byte[] binaryValue) + { + this.Key = key; + this.TextValue = null; + this.BinaryValue = binaryValue; + } + } + + /// + /// An implementation representing a stream that prepares and sends data as URL-encoded form data in an HTTP request. + /// + /// + /// This stream is used to send data as URL-encoded form data in an HTTP request. It sets the "Content-Type" header to "application/x-www-form-urlencoded". + /// URL-encoded form data is typically used for submitting form data to a web server. It is commonly used in HTTP POST requests to send data to a server, such as submitting HTML form data. + /// + /// The return value of is treated specially in the plugin: + /// + /// + /// Less than zero(-1) value + /// indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled. + /// + /// + /// Zero (0) + /// means that the stream is closed, no more data can be expected. + /// + /// + /// A zero value to signal stream closure can follow a less than zero value. + /// While it's possible, it's not advised to send binary data url-encoded! + /// + public sealed class UrlEncodedStream : UploadStreamBase + { + private const int EscapeTreshold = 256; + + /// + /// Gets the length of the stream. + /// + public override long Length { get => this._memoryStream.Length; } + + private MemoryStream _memoryStream; + + /// + /// A list that holds the form's fields. + /// + private List _fields = new List(); + + /// + /// Sets up the HTTP request by adding the "Content-Type" header as "application/x-www-form-urlencoded". + /// + /// The HTTP request. + public override void BeforeSendHeaders(HTTPRequest request) + { + request.SetHeader("Content-Type", "application/x-www-form-urlencoded"); + + StringBuilder sb = StringBuilderPool.Get(_fields.Count * 4); + + // Create a "field1=value1&field2=value2" formatted string + for (int i = 0; i < _fields.Count; ++i) + { + var field = _fields[i]; + + if (i > 0) + sb.Append("&"); + + sb.Append(EscapeString(field.Key)); + sb.Append("="); + + if (!string.IsNullOrEmpty(field.TextValue) || field.BinaryValue == null) + sb.Append(EscapeString(field.TextValue)); + else + // If forced to this form type with binary data, we will create a base64 encoded string from it. + sb.Append(Convert.ToBase64String(field.BinaryValue, 0, field.BinaryValue.Length)); + } + + this._memoryStream = new MemoryStream(Encoding.UTF8.GetBytes(StringBuilderPool.ReleaseAndGrab(sb))); + } + + /// + /// Adds binary data to the form. It is not advised to send binary data with an URL-encoded form due to the conversion cost of binary to text conversion. + /// + /// The name of the field. + /// The binary data content. + /// The UrlEncodedStream instance for method chaining. + public UrlEncodedStream AddBinaryData(string fieldName, byte[] content) + { + _fields.Add(new FormField(fieldName, content)); + + return this; + } + + public UrlEncodedStream AddField(string fieldName, string value) + { + _fields.Add(new FormField(fieldName, value)); + + return this; + } + + public override int Read(byte[] buffer, int offset, int count) => this._memoryStream.Read(buffer, offset, count); + + private static string EscapeString(string originalString) + { + if (originalString.Length < EscapeTreshold) + return Uri.EscapeDataString(originalString); + else + { + int loops = originalString.Length / EscapeTreshold; + StringBuilder sb = StringBuilderPool.Get(loops); //new StringBuilder(loops); + + for (int i = 0; i <= loops; i++) + sb.Append(i < loops ? + Uri.EscapeDataString(originalString.Substring(EscapeTreshold * i, EscapeTreshold)) : + Uri.EscapeDataString(originalString.Substring(EscapeTreshold * i))); + return StringBuilderPool.ReleaseAndGrab(sb); + } + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._memoryStream?.Dispose(); + this._memoryStream = null; + } + + public override bool CanRead => true; + public override bool CanSeek => false; + public override bool CanWrite => false; + public override long Position { get => throw new NotImplementedException(); set => throw new NotImplementedException(); } + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) => throw new NotImplementedException(); + public override void Write(byte[] buffer, int offset, int count) => throw new NotImplementedException(); + public override void Flush() => throw new NotImplementedException(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs.meta new file mode 100644 index 00000000..2f529e80 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0a92cdbf082f89b42b5db8ba2a373498 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/Forms/UrlEncodedStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs new file mode 100644 index 00000000..0ac6239d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs @@ -0,0 +1,101 @@ +using System; +using System.IO; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Request.Upload +{ + /// + /// An implementation to convert and upload the object as JSON data. It sets the "Content-Type" header to "application/json; charset=utf-8". + /// + /// The type of the object to be converted to JSON. + /// + /// This stream keeps a reference to the object until the preparation in . This means, changes to the object after passing it to the constructor will be reflected in the sent data too. + /// The return value of is treated specially in the plugin: + /// + /// + /// Less than zero(-1) value + /// indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled. + /// + /// + /// Zero (0) + /// means that the stream is closed, no more data can be expected. + /// + /// + /// A zero value to signal stream closure can follow a less than zero value. + /// + public sealed class JSonDataStream : UploadStreamBase + { + public override long Length { get => this._innerStream.Length; } + + private BufferPoolMemoryStream _innerStream; + private T _objToJson; + + /// + /// Initializes a new instance of the class with the specified object. + /// + /// The object to be converted to JSON and uploaded. + public JSonDataStream(T obj) => this._objToJson = obj; + + /// + /// Called before sending out the request's headers. It sets the "Content-Type" header to "application/json; charset=utf-8". + /// + /// The HTTP request. + public override void BeforeSendHeaders(HTTPRequest request) + { + request.SetHeader("Content-Type", "application/json; charset=utf-8"); + + if (this._innerStream != null) + { + this._innerStream.Position = 0; + return; + } + + var json = Best.HTTP.JSON.LitJson.JsonMapper.ToJson(this._objToJson); + this._objToJson = default; + + var byteLength = Encoding.UTF8.GetByteCount(json); + var buffer = BufferPool.Get(byteLength, true); + Encoding.UTF8.GetBytes(json, 0, json.Length, buffer, 0); + + this._innerStream = new BufferPoolMemoryStream(byteLength); + this._innerStream.Write(buffer, 0, byteLength); + this._innerStream.Position = 0; + + BufferPool.Release(buffer); + } + + /// + /// Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. + /// + /// An array of bytes. When this method returns, the buffer contains the specified byte array with the values between and ( + - 1) replaced by the bytes read from the current source. + /// The zero-based byte offset in at which to begin storing the data read from the current stream. + /// The maximum number of bytes to be read from the current stream. + /// The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached. + public override int Read(byte[] buffer, int offset, int count) => this._innerStream.Read(buffer, offset, count); + + /// + /// Releases the unmanaged resources used by the and optionally releases the managed resources. + /// + /// true to release both managed and unmanaged resources; false to release only unmanaged resources. + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._objToJson = default; + this._innerStream?.Dispose(); + this._innerStream = null; + } + + public override bool CanRead => true; + public override bool CanSeek => false; + public override bool CanWrite => false; + public override long Position { get => throw new NotImplementedException(); set => throw new NotImplementedException(); } + public override void Flush() { } + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) { throw new NotImplementedException(); } + public override void Write(byte[] buffer, int offset, int count) { throw new NotImplementedException(); } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs.meta new file mode 100644 index 00000000..53747a16 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4843451c7126126409eefb9945ddd4a6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/JSonDataStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs new file mode 100644 index 00000000..b706b67a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs @@ -0,0 +1,84 @@ +using Best.HTTP.Hosts.Connections; + +namespace Best.HTTP.Request.Upload +{ + // [Request Creation] --> [Request Queued] --> [UploadStream.SetupRequestHeaders call] --> [Send Request Headers] --> [UploadStream.PrepareToSend call] --> [UploadStream.Read to Send Request Body] -> [Dispose UploadStream] + + public static class UploadReadConstants + { + public static int WaitForMore = -1; + public static int Completed = 0; + } + + /// + /// Abstract class to serve as a base for non-conventional streams used in HTTP requests. + /// + /// + /// The return value of is treated specially in the plugin: + /// + /// + /// Less than zero(-1) + /// indicates that no data is currently available but more is expected in the future. In this case, when new data becomes available the IThreadSignaler object must be signaled. + /// + /// + /// Zero (0) + /// means that the stream is closed, no more data can be expected. + /// + /// Otherwise it must return with the number bytes copied to the buffer. + /// + /// A zero value to signal stream closure can follow a less than zero value. + /// + public abstract class UploadStreamBase : System.IO.Stream + { + /// + /// Gets the object for signaling when new data is available. + /// + public IThreadSignaler Signaler { get; private set; } + + /// + /// Length in bytes that the stream will upload. + /// + /// + /// The return value of Length is treated specially in the plugin: + /// + /// -2The stream's length is unknown and the plugin have to send data with 'chunked' transfer-encoding. + /// -1The stream's length is unknown and the plugin have to send data as-is, without any encoding. + /// 0No content to send. The content-length header will contain zero (0). + /// >0Length of the content is known, will be sent as-is, without any encoding. The content-length header will contain zero (0). + /// + /// Constants for the first three points can be found in . + /// + public override long Length => throw new System.NotImplementedException(); + + /// + /// Called before sending out the request's headers. Perform content processing to calculate the final length if possible. + /// In this function the implementor can set headers and other parameters to the request. + /// + /// Typically called on a thread. + /// The associated with the stream. + public abstract void BeforeSendHeaders(HTTPRequest request); + + /// + /// Called just before sending out the request's body, and saves the for signaling when new data is available. + /// + /// The HTTPRequest associated with the stream. + /// The object to be used for signaling. + /// Typically called on a separate thread. + + /// + /// Called just before sending out the request's body, saves the that can be used for signaling when new data is available. + /// + /// The HTTPRequest associated with the stream. + /// The object to be used for signaling. + /// Typically called on a separate thread. + public virtual void BeforeSendBody(HTTPRequest request, IThreadSignaler threadSignaler) => this.Signaler = threadSignaler; + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this.Signaler = null; + } + } + +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs.meta new file mode 100644 index 00000000..269d59ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5585905c4d10eba4ca0fe7d011d06b71 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Request/Upload/UploadStreamBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response.meta new file mode 100644 index 00000000..c2aaaa87 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 7f98eb51a1da2ef42bb70c83a4739299 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs new file mode 100644 index 00000000..6c046fdb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs @@ -0,0 +1,226 @@ +using System; +using System.Threading; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Response +{ + /// + /// A blocking variant of the that allows clients to wait for downloaded data when the buffer is empty but not completed. + /// + /// + /// + /// The BlockingDownloadContentStream is a specialized variant of the designed to provide a blocking mechanism for clients waiting for downloaded data. + /// This class is particularly useful when clients need to read from the stream, but the buffer is temporarily empty due to ongoing downloads. + /// + /// + /// Key Features: + /// + /// + /// Blocking Data Retrieval + /// Provides a blocking method that allows clients to wait for data if the buffer is empty but not yet completed. + /// + /// + /// Timeout Support + /// The method accepts a timeout parameter, allowing clients to set a maximum wait time for data availability. + /// + /// + /// Exception Handling + /// Handles exceptions and errors that occur during download, ensuring that clients receive any relevant exception information. + /// + /// + /// + /// + /// Clients can use the method to retrieve data from the stream, and if the buffer is empty, the method will block until new data is downloaded or a timeout occurs. + /// This blocking behavior is particularly useful in scenarios where clients need to consume data sequentially but can't proceed until data is available. + /// + /// + /// When the download is completed or if an error occurs during download, this stream allows clients to inspect the completion status and any associated exceptions, just like the base . + /// + /// + public sealed class BlockingDownloadContentStream : DownloadContentStream + { + private AutoResetEvent _are = new AutoResetEvent(false); + + /// + /// Initializes a new instance of the class. + /// + /// The HTTP response associated with this download stream. + /// The maximum size of the internal buffer. + /// Handler for notifying when buffer space becomes available. + public BlockingDownloadContentStream(HTTPResponse response, long maxBuffered, IDownloadContentBufferAvailable bufferAvailableHandler) + : base(response, maxBuffered, bufferAvailableHandler) + { + } + + /// + /// Attempts to retrieve a downloaded content-segment from the stream, blocking if necessary until a segment is available. + /// + /// When this method returns, contains the instance representing the data, if available; otherwise, contains the value of . This parameter is passed uninitialized. + /// true if a segment could be retrieved; otherwise, false. + /// + /// + /// The TryTake function provides a blocking approach to retrieve data from the stream. + /// If the stream has data available, it immediately returns the data. + /// If there's no data available, the method will block until new data is downloaded or the buffer is marked as completed. + /// + /// + /// This method is designed for scenarios where clients need to read from the stream sequentially and are willing to wait until data is available. + /// It ensures that clients receive data as soon as it becomes available, without having to repeatedly check or poll the stream. + /// + /// + public override bool TryTake(out BufferSegment segment) + { + segment = BufferSegment.Empty; + + while (!base.IsCompleted && segment == BufferSegment.Empty) + segment = Take(); + + return segment != BufferSegment.Empty; + } + + /// + /// Returns with a download content-segment. If the stream is currently empty but not completed the execution is blocked until new data downloaded. + /// A segment is an arbitrary length array of bytes the plugin could read in one operation, it can range from couple of bytes to kilobytes. + /// + /// A BufferSegment holding a reference to the byte[] containing the downloaded data, offset and count of bytes in the array. + /// The stream is disposed. + /// The stream is empty and marked as completed. + public BufferSegment Take() => Take(TimeSpan.FromMilliseconds(-1)); + + /// + /// Returns with a download content-segment. If the stream is currently empty but not completed the execution is blocked until new data downloaded or the timeout is reached. + /// A segment is an arbitrary length array of bytes the plugin could read in one operation, it can range from couple of bytes to kilobytes. + /// + /// A TimeSpan that represents the number of milliseconds to wait, or a TimeSpan that represents -1 milliseconds to wait indefinitely. + /// A BufferSegment holding a reference to the byte[] containing the downloaded data, offset and count of bytes in the array. In case of a timeout, BufferSegment.Empty returned. + /// The stream is disposed. + /// The stream is empty and marked as completed. + public BufferSegment Take(TimeSpan timeout) + { + this.IsDetached = true; + + while (!base.IsCompleted) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + if (this._exceptionInfo != null) + this._exceptionInfo.Throw(); + + if (this._segments.TryDequeue(out var segment) && segment.Count > 0) + { +#pragma warning disable 0197 + Interlocked.Add(ref base._length, -segment.Count); +#pragma warning restore + this._bufferAvailableHandler?.BufferAvailable(this); + return segment; + } + + if (base.IsCompleted) + throw new InvalidOperationException("The stream is empty and marked as completed!"); + + if (WaitForEvent(timeout)) /*!this._are.WaitOne(timeout)*/ + return BufferSegment.Empty; + } + + return BufferSegment.Empty; + } + + /// + /// Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. + /// + /// + /// + /// This override of the method provides blocking behavior, meaning if there are no bytes available in the stream, the method will block until new data is downloaded or until the stream completes. Once data is available, or if the stream completes, the method will return with the number of bytes read. + /// + /// + /// This behavior ensures that consumers of the stream can continue reading data sequentially, even if the stream's internal buffer is temporarily empty due to ongoing downloads. + /// + /// + /// An array of bytes. When this method returns, the buffer contains the specified byte array with the values between and ( + - 1) replaced by the bytes read from the current source. + /// The zero-based byte offset in at which to begin storing the data read from the current stream. + /// The maximum number of bytes to be read from the current stream. + /// + /// The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero if the end of the stream is reached. + /// + public override int Read(byte[] buffer, int offset, int count) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + int readCount = base.Read(buffer, offset, count); + + while (readCount == 0 && !IsCompleted) + { + //this._are?.WaitOne(); + WaitForEvent(TimeSpan.FromMilliseconds(-1)); + readCount = base.Read(buffer, offset, count); + } + + return readCount; + } + + public override void Write(BufferSegment segment) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + base.Write(segment); + + this._are?.Set(); + } + + internal override void CompleteAdding(Exception error) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + base.CompleteAdding(error); + + this._are?.Set(); + } + + /// + /// Instead of calling WaitOne once for the total duration of the timeout, + /// periodically check whether we are disposed or not. + /// + private bool WaitForEvent(TimeSpan timeoutTS) + { + const int CHECK_PERIOD = 100; + var resetEvent = this._are; + + if (this._isDisposed || resetEvent == null) + throw new ObjectDisposedException(GetType().FullName); + + var timeout = (int)timeoutTS.TotalMilliseconds; + if (timeout < 0) + timeout = int.MaxValue; + + while (!this._isDisposed && timeout > 0) + { + int waitTime = Math.Min((int)timeout, CHECK_PERIOD); + + // there's a race condition between checking _isDisposed and using resetEvent. + // There are two cases: + // 1.) resetEvent is already disposed when calling WaitOne in case it will throw an exception + // 2.) resetEvent will be disposed while blocking in WaitOne and in this case it will unblock and exit from the while cycle because of _isDisposed is true + if (resetEvent.WaitOne(waitTime)) + return true; + + timeout -= CHECK_PERIOD; + } + + return false; + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._are?.Dispose(); + this._are = null; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs.meta new file mode 100644 index 00000000..cde0d4d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42215e4fe35fb014da4b25034b22781a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/BlockingDownloadContentStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression.meta new file mode 100644 index 00000000..dab2ecce --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2f91637718600de40b54117f335c01db +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs new file mode 100644 index 00000000..5bd48b5b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs @@ -0,0 +1,98 @@ +using System; + +using Best.HTTP.Shared.Streams; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Response.Decompression +{ + public sealed class BrotliDecompressor : IDecompressor + { +#if ((NET_STANDARD_2_1 || UNITY_2021_2_OR_NEWER) && (UNITY_EDITOR || (!UNITY_WEBGL && !(ENABLE_MONO && UNITY_ANDROID)))) && !BESTHTTP_DISABLE_BROTLI + private BufferSegmentStream decompressorInputStream; + private BufferPoolMemoryStream decompressorOutputStream; + private System.IO.Compression.BrotliStream decompressorStream; + + byte[] copyBuffer = null; +#endif + + private int _minLengthToDecompress; + + public static bool IsSupported() + { + // Not enabled under android with the mono runtime +#if ((NET_STANDARD_2_1 || UNITY_2021_2_OR_NEWER) && (UNITY_EDITOR || (!UNITY_WEBGL && !(ENABLE_MONO && UNITY_ANDROID)))) && !BESTHTTP_DISABLE_BROTLI + return true; +#else + return false; +#endif + } + + public BrotliDecompressor(int minLengthToDecompress) + { + this._minLengthToDecompress = minLengthToDecompress; + } + + public (BufferSegment decompressed, bool releaseTheOld) Decompress(BufferSegment segment, bool forceDecompress, bool dataCanBeLarger, LoggingContext context) + { +#if ((NET_STANDARD_2_1 || UNITY_2021_2_OR_NEWER) && (UNITY_EDITOR || (!UNITY_WEBGL && !(ENABLE_MONO && UNITY_ANDROID)))) && !BESTHTTP_DISABLE_BROTLI + if (decompressorInputStream == null) + decompressorInputStream = new BufferSegmentStream(); + + if (segment.Data != null) + decompressorInputStream.Write(segment); + + if (!forceDecompress && decompressorInputStream.Length < _minLengthToDecompress) + return (BufferSegment.Empty, false); + + if (decompressorStream == null) + { + decompressorStream = new System.IO.Compression.BrotliStream(decompressorInputStream, + System.IO.Compression.CompressionMode.Decompress, + true); + } + + if (decompressorOutputStream == null) + decompressorOutputStream = new BufferPoolMemoryStream(); + decompressorOutputStream.SetLength(0); + + if (copyBuffer == null) + copyBuffer = BufferPool.Get(4 * 1024, true); + + int readCount; + int sumReadCount = 0; + while ((readCount = decompressorStream.Read(copyBuffer, 0, copyBuffer.Length)) != 0) + { + decompressorOutputStream.Write(copyBuffer, 0, readCount); + sumReadCount += readCount; + } + + byte[] result = decompressorOutputStream.ToArray(dataCanBeLarger, context); + + return (new BufferSegment(result, 0, dataCanBeLarger ? (int)decompressorOutputStream.Length : result.Length), false); +#else + return (BufferSegment.Empty, false); +#endif + } + + public void Dispose() + { +#if ((NET_STANDARD_2_1 || UNITY_2021_2_OR_NEWER) && (UNITY_EDITOR || (!UNITY_WEBGL && !(ENABLE_MONO && UNITY_ANDROID)))) && !BESTHTTP_DISABLE_BROTLI + if (decompressorStream != null) + decompressorStream.Dispose(); + decompressorStream = null; + + if (decompressorInputStream != null) + decompressorInputStream.Dispose(); + decompressorInputStream = null; + + if (decompressorOutputStream != null) + decompressorOutputStream.Dispose(); + decompressorOutputStream = null; + + BufferPool.Release(copyBuffer); + copyBuffer = null; +#endif + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs.meta new file mode 100644 index 00000000..a23c852b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c05f975899e847c4891318adccf0d7c7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/BrotliDecompressor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs new file mode 100644 index 00000000..589cecc4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs @@ -0,0 +1,72 @@ +using Best.HTTP.Shared; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Response.Decompression +{ + public static class DecompressorFactory + { + public const int MinLengthToDecompress = 256; + + // cached header value + private static string AcceptEncoding = null; + + public static void SetupHeaders(HTTPRequest request) + { + if (!request.HasHeader("Accept-Encoding")) + { + if (AcceptEncoding == null) + { + var sb = StringBuilderPool.Get(4); + + if (BrotliDecompressor.IsSupported()) + sb.Append("br, "); + + if (GZipDecompressor.IsSupported) + sb.Append("gzip, "); + + if (DeflateDecompressor.IsSupported) + sb.Append("deflate, "); + + sb.Append("identity"); + + AcceptEncoding = StringBuilderPool.ReleaseAndGrab(sb); + } + + request.AddHeader("Accept-Encoding", AcceptEncoding); + } + } + + public static IDecompressor GetDecompressor(string encoding, LoggingContext context) + { + if (encoding == null) + return null; + + switch (encoding.ToLowerInvariant()) + { + // https://github.com/Benedicht/BestHTTP-Issues/issues/183 + case "none": + + case "identity": + case "utf-8": + break; + + case "gzip": return new GZipDecompressor(MinLengthToDecompress); + + case "deflate": return new DeflateDecompressor(MinLengthToDecompress); + + case "br": + if (BrotliDecompressor.IsSupported()) + return new BrotliDecompressor(MinLengthToDecompress); + else + goto default; + + default: + HTTPManager.Logger.Warning(nameof(DecompressorFactory), $"GetDecompressor - unsupported encoding '{encoding}'!", context); + break; + } + + return null; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs.meta new file mode 100644 index 00000000..e6159c8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ce789361386b9024ba2747db2d9072e9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DecompressorFactory.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs new file mode 100644 index 00000000..98c035cf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs @@ -0,0 +1,109 @@ +using System; + +using Best.HTTP.Shared.Compression.Zlib; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Response.Decompression +{ + public sealed class DeflateDecompressor : IDecompressor + { + private BufferPoolMemoryStream decompressorInputStream; + private BufferPoolMemoryStream decompressorOutputStream; + private DeflateStream decompressorStream; + + private int MinLengthToDecompress = 256; + + public static bool IsSupported = true; + + public DeflateDecompressor(int minLengthToDecompress) + { + this.MinLengthToDecompress = minLengthToDecompress; + } + + public (BufferSegment decompressed, bool releaseTheOld) Decompress(BufferSegment segment, bool forceDecompress, bool dataCanBeLarger, LoggingContext context) + { + if (decompressorInputStream == null) + decompressorInputStream = new BufferPoolMemoryStream(segment.Count); + + if (segment.Data != null) + decompressorInputStream.Write(segment.Data, segment.Offset, segment.Count); + + if (!forceDecompress && decompressorInputStream.Length < MinLengthToDecompress) + return (BufferSegment.Empty, true); + + decompressorInputStream.Position = 0; + + if (decompressorStream == null) + { + // Had to change from this + // _baseStream = new ZlibBaseStream(stream, mode, level, ZlibStreamFlavor.DEFLATE, leaveOpen); + // this this: + // _baseStream = new ZlibBaseStream(stream, mode, level, ZlibStreamFlavor.ZLIB, leaveOpen); + // Because there are two bytes in the header additionally to what the deflate flavor expects that the zlib one handles fine. + decompressorStream = new DeflateStream(decompressorInputStream, + CompressionMode.Decompress, + CompressionLevel.Default, + true); + decompressorStream.FlushMode = FlushType.Sync; + } + + if (decompressorOutputStream == null) + decompressorOutputStream = new BufferPoolMemoryStream(); + decompressorOutputStream.SetLength(0); + + byte[] copyBuffer = BufferPool.Get(1024, true); + + int readCount; + int sumReadCount = 0; + while ((readCount = decompressorStream.Read(copyBuffer, 0, copyBuffer.Length)) != 0) + { + decompressorOutputStream.Write(copyBuffer, 0, readCount); + sumReadCount += readCount; + } + + BufferPool.Release(copyBuffer); + + // If no read is done (returned with any data) don't zero out the input stream, as it would delete any not yet used data. + if (sumReadCount > 0) + decompressorStream.SetLength(0); + + byte[] result = decompressorOutputStream.ToArray(dataCanBeLarger, context); + + return (new BufferSegment(result, 0, dataCanBeLarger ? (int)decompressorOutputStream.Length : result.Length), true); + } + + ~DeflateDecompressor() + { + Dispose(); + } + + public void Dispose() + { + if (decompressorInputStream != null) + decompressorInputStream.Dispose(); + decompressorInputStream = null; + + if (decompressorOutputStream != null) + decompressorOutputStream.Dispose(); + decompressorOutputStream = null; + + if (decompressorStream != null) + { + // If the decompressor closed before receiving data, or it's incomplete, disposing (eg. closing) it + // throws an execption like this: + // "Missing or incomplete GZIP trailer. Expected 8 bytes, got 0." + try + { + decompressorStream.Dispose(); + } + catch + { } + } + decompressorStream = null; + + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs.meta new file mode 100644 index 00000000..160c1dfc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 634cdddc7ce7ec144a040e546661043f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/DeflateDecompressor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs new file mode 100644 index 00000000..894658c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs @@ -0,0 +1,104 @@ +using System; + +using Best.HTTP.Shared.Compression.Zlib; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Response.Decompression +{ + public sealed class GZipDecompressor : IDecompressor + { + private BufferPoolMemoryStream decompressorInputStream; + private BufferPoolMemoryStream decompressorOutputStream; + private GZipStream decompressorStream; + + private int MinLengthToDecompress = 256; + + public static bool IsSupported = true; + + public GZipDecompressor(int minLengthToDecompress) + { + this.MinLengthToDecompress = minLengthToDecompress; + } + + public (BufferSegment decompressed, bool releaseTheOld) Decompress(BufferSegment segment, bool forceDecompress, bool dataCanBeLarger, LoggingContext context) + { + if (decompressorInputStream == null) + decompressorInputStream = new BufferPoolMemoryStream(segment.Count); + + if (segment.Data != null) + decompressorInputStream.Write(segment.Data, segment.Offset, segment.Count); + + if (!forceDecompress && decompressorInputStream.Length < MinLengthToDecompress) + return (BufferSegment.Empty, true); + + decompressorInputStream.Position = 0; + + if (decompressorStream == null) + { + decompressorStream = new GZipStream(decompressorInputStream, + CompressionMode.Decompress, + CompressionLevel.Default, + true); + decompressorStream.FlushMode = FlushType.Sync; + } + + if (decompressorOutputStream == null) + decompressorOutputStream = new BufferPoolMemoryStream(); + decompressorOutputStream.SetLength(0); + + byte[] copyBuffer = BufferPool.Get(1024, true); + + int readCount; + int sumReadCount = 0; + while ((readCount = decompressorStream.Read(copyBuffer, 0, copyBuffer.Length)) != 0) + { + decompressorOutputStream.Write(copyBuffer, 0, readCount); + sumReadCount += readCount; + } + + BufferPool.Release(copyBuffer); + + // If no read is done (returned with any data) don't zero out the input stream, as it would delete any not yet used data. + if (sumReadCount > 0) + decompressorStream.SetLength(0); + + byte[] result = decompressorOutputStream.ToArray(dataCanBeLarger, context); + + return (new BufferSegment(result, 0, dataCanBeLarger ? (int)decompressorOutputStream.Length : result.Length), true); + } + + ~GZipDecompressor() + { + Dispose(); + } + + public void Dispose() + { + if (decompressorInputStream != null) + decompressorInputStream.Dispose(); + decompressorInputStream = null; + + if (decompressorOutputStream != null) + decompressorOutputStream.Dispose(); + decompressorOutputStream = null; + + if (decompressorStream != null) + { + // If the decompressor closed before receiving data, or it's incomplete, disposing (eg. closing) it + // throws an execption like this: + // "Missing or incomplete GZIP trailer. Expected 8 bytes, got 0." + try + { + decompressorStream.Dispose(); + } + catch + { } + } + decompressorStream = null; + + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs.meta new file mode 100644 index 00000000..3a1e0e38 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7f98615216f088c4fbe03e782e7c2dde +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/GZipDecompressor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs new file mode 100644 index 00000000..a9d7a48c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs @@ -0,0 +1,12 @@ +using System; + +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Response.Decompression +{ + public interface IDecompressor : IDisposable + { + (BufferSegment decompressed, bool releaseTheOld) Decompress(BufferSegment segment, bool forceDecompress, bool dataCanBeLarger, LoggingContext context); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs.meta new file mode 100644 index 00000000..d30a0605 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a690aef2560186140930ad5934385d48 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/Decompression/IDecompressor.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs new file mode 100644 index 00000000..a451d56d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs @@ -0,0 +1,292 @@ +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Memory; + +using System; +using System.Collections.Concurrent; +using System.IO; +using System.Runtime.ExceptionServices; +using System.Threading; + +namespace Best.HTTP.Response +{ + /// + /// A read-only stream that the plugin uses to store the downloaded content. This stream is designed to buffer downloaded data efficiently and provide it to consumers. + /// + /// + /// + /// The DownloadContentStream serves as a storage medium for content downloaded during HTTP requests. + /// It buffers the downloaded data in segments and allows clients to read from the buffer as needed. + /// This buffering mechanism is essential for optimizing download performance, especially in scenarios where the download rate may vary or be faster than the rate at which data is consumed. + /// + /// + /// The stream operates in conjunction with the interface, which is used to signal connections when buffer space becomes available. + /// Connections can then transfer additional data into the buffer for processing. + /// + /// + /// + /// + /// Efficient Buffering + /// The stream efficiently buffers downloaded content, ensuring that data is readily available for reading without extensive delays. + /// + /// + /// Dynamic Resizing + /// The internal buffer dynamically resizes to accommodate varying amounts of downloaded data, optimizing memory usage. + /// + /// + /// Asynchronous Signal Handling + /// Asynchronous signaling mechanisms are used to notify connections when buffer space is available, enabling efficient data transfer. + /// + /// + /// Error Handling + /// The stream captures and propagates errors that occur during download, allowing clients to handle exceptions gracefully. + /// + /// + /// Blocking Variant + /// A blocking variant, , allows clients to wait for data when the buffer is empty but not completed. + /// + /// + /// + /// + /// Clients can read from this stream using standard stream reading methods, and the stream will release memory segments as data is read. + /// When the download is completed or if an error occurs during download, this stream allows clients to inspect the completion status and any associated exceptions. + /// + /// + public class DownloadContentStream : Stream + { + /// + /// Gets the HTTP response from which this download stream originated. + /// + public HTTPResponse Response { get; protected set; } + + /// + /// Gets a value indicating whether the download is completed, and there's no more data buffered in the stream to read. + /// + public virtual bool IsCompleted { get => this._isCompleted && this._segments.Count == 0 && this._currentSegment == BufferSegment.Empty; } + + /// + /// Gets a reference to an exception if the download completed with an error. + /// + public Exception CompletedWith { get => this._exceptionInfo?.SourceException; } + + /// + /// Gets the length of the buffered data. Because downloads happen in parallel, a call can return with more data after checking Length. + /// + public override long Length => Interlocked.Read(ref this._length); + protected long _length; + + /// + /// Gets the maximum size of the internal buffer of this stream. + /// + /// In some cases, the plugin may put more data into the stream than the specified size. + public long MaxBuffered { get; protected set; } + + /// + /// Gets a value indicating whether the internal buffer holds at least the amount of data. + /// + public bool IsFull { get => this.Length >= this.MaxBuffered; } + + /// + /// Gets or sets whether the stream is detached from the / when is used before the request is finished. + /// When the stream is detached from the response object, their lifetimes are not bound together, + /// meaning that the stream isn't disposed automatically, and the client code is responsible for calling the stream's function. + /// + public bool IsDetached + { + get => this._isDetached; + set + { + if (this._isDetached != value) + { + HTTPManager.Logger.Verbose(nameof(DownloadContentStream), $"IsDetached {this._isDetached} => {value}", this.Response?.Context); + + this._isDetached = value; + } + } + } + private bool _isDetached; + + /// + /// There are cases where the plugin have to put more data into the buffer than its previously set maximum. + /// For example when the underlying connection is closed, but the content provider still have buffered data, + /// in witch case we have to push all processed data to the user facing download stream. + /// + public void EmergencyIncreaseMaxBuffered() => this.MaxBuffered = long.MaxValue; + + protected IDownloadContentBufferAvailable _bufferAvailableHandler; + protected ConcurrentQueue _segments = new ConcurrentQueue(); + protected BufferSegment _currentSegment = BufferSegment.Empty; + + protected bool _isCompleted; + protected ExceptionDispatchInfo _exceptionInfo; + + /// + /// Count of consecutive calls with DoFullCheck that found the stream fully buffered. + /// + private int _isFullCheckCount; + + protected bool _isDisposed; + + /// + /// Initializes a new instance of the DownloadContentStream class. + /// + /// The HTTP response associated with this download stream. + /// The maximum size of the internal buffer. + /// Handler for notifying when buffer space becomes available. + public DownloadContentStream(HTTPResponse response, long maxBuffered, IDownloadContentBufferAvailable bufferAvailableHandler) + { + this.Response = response; + this.MaxBuffered = maxBuffered; + this._bufferAvailableHandler = bufferAvailableHandler; + } + + /// + /// Completes the download stream with an optional error. Called when the download is finished. + /// + /// The exception that occurred during download, if any. + internal virtual void CompleteAdding(Exception error) + { + if (HTTPManager.Logger.Level <= Shared.Logger.Loglevels.Information) + HTTPManager.Logger.Information(nameof(DownloadContentStream), $"CompleteAdding({error})", this.Response?.Context); + + this._isCompleted = true; + + this._exceptionInfo = error != null ? ExceptionDispatchInfo.Capture(error) : null; + this._bufferAvailableHandler = null; + } + + /// + /// Tries to remove a downloaded segment from the stream. If the stream is empty, it returns immediately with false. + /// + /// A containing the reference to a byte[] and the offset and count of the data in the array. + /// true if a downloaded segment was available and could return with, otherwise false + public virtual bool TryTake(out BufferSegment segment) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + this.IsDetached = true; + + if (this._segments.TryDequeue(out segment) && segment.Count > 0) + { + Interlocked.Add(ref this._length, -segment.Count); + this._bufferAvailableHandler?.BufferAvailable(this); + + return true; + } + + return false; + } + + /// + /// A non-blocking Read function. When it returns 0, it doesn't mean the download is complete. If the download interrupted before completing, the next Read call can throw an exception. + /// + /// The buffer to read data into. + /// The zero-based byte offset in the buffer at which to begin copying bytes. + /// The maximum number of bytes to read. + /// The number of bytes copied to the buffer, or zero if no downloaded data is available at the time of the call. + /// If the stream is already disposed. + public override int Read(byte[] buffer, int offset, int count) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + if (this._exceptionInfo != null) + this._exceptionInfo.Throw(); + + this.IsDetached = true; + + if (this._currentSegment == BufferSegment.Empty) + this._segments.TryDequeue(out this._currentSegment); + + int sumReadCount = 0; + while (sumReadCount < count && this._currentSegment != BufferSegment.Empty) + { + int readCount = Math.Min(count - sumReadCount, this._currentSegment.Count); + Array.Copy(this._currentSegment.Data, this._currentSegment.Offset, buffer, offset, readCount); + + offset += readCount; + sumReadCount += readCount; + + if (this._currentSegment.Count == readCount) + { + BufferPool.Release(this._currentSegment); + if (!this._segments.TryDequeue(out this._currentSegment)) + this._currentSegment = BufferSegment.Empty; + } + else + this._currentSegment = this._currentSegment.Slice(this._currentSegment.Offset + readCount); + } + + Interlocked.Add(ref this._length, -sumReadCount); + + this._bufferAvailableHandler?.BufferAvailable(this); + + return sumReadCount; + } + + /// + /// Writes a downloaded data segment to the stream. + /// + /// The downloaded data segment to write. + public virtual void Write(BufferSegment segment) + { + if (this._isDisposed) + throw new ObjectDisposedException(GetType().FullName); + + if (segment.Count <= 0) + return; + + this._segments.Enqueue(segment); + Interlocked.Add(ref this._length, segment.Count); + + this._isFullCheckCount = 0; + } + + /// + /// Checks whether the stream is fully buffered and increases a counter if it's full, resetting it otherwise. + /// + /// The limit for the full check counter. + /// true if the counter is equal to or larger than the limit parameter; otherwise false. + internal bool DoFullCheck(int limit) + { + if (IsFull) + _isFullCheckCount++; + else + _isFullCheckCount = 0; + + return _isFullCheckCount >= limit; + } + + /// + /// Disposes of the stream, releasing any resources held by it. + /// + /// true to release both managed and unmanaged resources; false to release only unmanaged resources. + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (this._isDisposed) + return; + + this._isDisposed = true; + + using (var _ = new Unity.Profiling.ProfilerMarker("DownloadContentStream.Dispose").Auto()) + { + BufferPool.Release(this._currentSegment); + this._currentSegment = BufferSegment.Empty; + + BufferPool.ReleaseBulk(this._segments); + } + } + + public override bool CanRead => true; + public override bool CanSeek => false; + public override bool CanWrite => false; + public override long Position { get => throw new NotImplementedException(); set => throw new NotImplementedException(); } + public override void Flush() => throw new NotImplementedException(); + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) => throw new NotImplementedException(); + public override void Write(byte[] buffer, int offset, int count) => throw new NotImplementedException(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs.meta new file mode 100644 index 00000000..a1d50023 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 336be0919f8d19543b0f83c9f02feedd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/DownloadContentStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs new file mode 100644 index 00000000..2b981c22 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs @@ -0,0 +1,526 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using UnityEngine; + +using static Best.HTTP.Response.HTTPStatusCodes; + +namespace Best.HTTP +{ + using Best.HTTP.Caching; + using Best.HTTP.Hosts.Connections; + using Best.HTTP.Response; + using Best.HTTP.Shared; + using Best.HTTP.Shared.Extensions; + using Best.HTTP.Shared.Logger; + using Best.HTTP.Shared.PlatformSupport.Memory; + + /// + /// Represents an HTTP response received from a remote server, containing information about the response status, headers, and data. + /// + /// + /// + /// The HTTPResponse class represents an HTTP response received from a remote server. It contains information about the response status, headers, and the data content. + /// + /// + /// Key Features: + /// + /// + /// Response Properties + /// Provides access to various properties such as , , , and more, to inspect the response details. + /// + /// + /// Data Access + /// Allows access to the response data in various forms, including raw bytes, UTF-8 text, and as a for image data. + /// + /// + /// Header Management + /// Provides methods to add, retrieve, and manipulate HTTP headers associated with the response, making it easy to inspect and work with header information. + /// + /// + /// Caching Support + /// Supports response caching, enabling the storage of downloaded data in local cache storage for future use. + /// + /// + /// Stream Management + /// Manages the download process and data streaming through a () to optimize memory usage and ensure efficient handling of large response bodies. + /// + /// + /// + /// + public class HTTPResponse : IDisposable + { + #region Public Properties + + /// + /// Gets the version of the HTTP protocol with which the response was received. Typically, this is HTTP/1.1 for local file and cache responses, even if the original response received with a different version. + /// + public Version HTTPVersion { get; protected set; } + + /// + /// Gets the HTTP status code sent from the server, indicating the outcome of the HTTP request. + /// + public int StatusCode { get; protected set; } + + /// + /// Gets the message sent along with the status code from the server. This message can add some details, but it's empty for HTTP/2 responses. + /// + public string Message { get; protected set; } + + /// + /// Gets a value indicating whether the response represents a successful HTTP request. Returns true if the status code is in the range of [200..300[ or 304 (Not Modified). + /// + public bool IsSuccess { get { return (this.StatusCode >= OK && this.StatusCode < MultipleChoices) || this.StatusCode == NotModified; } } + + /// + /// Gets a value indicating whether the response body is read from the cache. + /// + public bool IsFromCache { get; internal set; } + + /// + /// Gets the headers sent from the server as key-value pairs. You can use additional methods to manage and retrieve header information. + /// + /// + /// The Headers property provides access to the headers sent by the server in the HTTP response. You can use the following methods to work with headers: + /// + /// Adds an HTTP header with the specified name and value to the response headers. + /// Retrieves the list of values for a given header name as received from the server. + /// Retrieves the first value for a given header name as received from the server. + /// Checks if a header with the specified name and value exists in the response headers. + /// Checks if a header with the specified name exists in the response headers. + /// Parses the 'Content-Range' header's value and returns a object representing the byte range of the response content. + /// + /// + public Dictionary> Headers { get; protected set; } + + /// + /// The data that downloaded from the server. All Transfer and Content encodings decoded if any(eg. chunked, gzip, deflate). + /// + public byte[] Data + { + get + { + if (this._data != null) + return this._data; + + if (this.DownStream == null) + return null; + + CheckDisposed(); + + this._data = new byte[this.DownStream.Length]; + try + { + this.DownStream.Read(this._data, 0, this._data.Length); + } + catch (Exception ex) + { + this._data = null; + + HTTPManager.Logger.Exception(nameof(HTTPResponse), "get_Data", ex, this.Context); + } + finally + { + this.DownStream.Dispose(); + } + + return this._data; + } + } + private byte[] _data; + + /// + /// The normal HTTP protocol is upgraded to an other. + /// + public bool IsUpgraded { get; internal set; } + + /// + /// Cached, converted data. + /// + protected string dataAsText; + + /// + /// The data converted to an UTF8 string. + /// + public string DataAsText + { + get + { + if (Data == null) + return string.Empty; + + if (!string.IsNullOrEmpty(dataAsText)) + return dataAsText; + + CheckDisposed(); + + return dataAsText = Encoding.UTF8.GetString(Data, 0, Data.Length); + } + } + + /// + /// Cached converted data. + /// + protected Texture2D texture; + + /// + /// The data loaded to a Texture2D. + /// + public Texture2D DataAsTexture2D + { + get + { + if (Data == null) + return null; + + if (texture != null) + return texture; + + CheckDisposed(); + + texture = new Texture2D(1, 1, TextureFormat.RGBA32, false); + texture.LoadImage(Data, true); + + return texture; + } + } + + /// + /// Reference to the instance that contains the downloaded data. + /// + public DownloadContentStream DownStream { get; internal set; } + + /// + /// IProtocol.LoggingContext implementation. + /// + public LoggingContext Context { get; private set; } + + /// + /// The original request that this response is created for. + /// + public HTTPRequest Request { get; private set; } + + #endregion + + protected HTTPCacheContentWriter _cacheWriter; + + private bool _isDisposed; + + internal HTTPResponse(HTTPRequest request, bool isFromCache) + { + this.Request = request; + + this.IsFromCache = isFromCache; + + this.Context = new LoggingContext(this); + this.Context.Add("BaseRequest", request.Context); + } + + #region Header Management + + /// + /// Adds an HTTP header with the specified name and value to the response headers. + /// + /// The name of the header. + /// The value of the header. + public void AddHeader(string name, string value) => this.Headers = this.Headers.AddHeader(name, value); + + /// + /// Retrieves the list of values for a given header name as received from the server. + /// + /// The name of the header. + /// + /// A list of header values if the header exists and contains values; otherwise, returns null. + /// + public List GetHeaderValues(string name) => this.Headers.GetHeaderValues(name); + + /// + /// Retrieves the first value for a given header name as received from the server. + /// + /// The name of the header. + /// + /// The first header value if the header exists and contains values; otherwise, returns null. + /// + public string GetFirstHeaderValue(string name) => this.Headers.GetFirstHeaderValue(name); + + /// + /// Checks if a header with the specified name and value exists in the response headers. + /// + /// The name of the header to check. + /// The value to check for in the header. + /// + /// true if a header with the given name and value exists in the response headers; otherwise, false. + /// + public bool HasHeaderWithValue(string headerName, string value) => this.Headers.HasHeaderWithValue(headerName, value); + + /// + /// Checks if a header with the specified name exists in the response headers. + /// + /// The name of the header to check. + /// + /// true if a header with the given name exists in the response headers; otherwise, false. + /// + public bool HasHeader(string headerName) => this.Headers.HasHeader(headerName); + + /// + /// Parses the 'Content-Range' header's value and returns a object representing the byte range of the response content. + /// + /// + /// If the server ignores a byte-range-spec because it is syntactically invalid, the server SHOULD treat the request as if the invalid Range header field did not exist. + /// (Normally, this means return a 200 response containing the full entity). In this case because there are no 'Content-Range' header values, this function will return null. + /// + /// + /// A object representing the byte range of the response content, or null if no 'Content-Range' header is found. + /// + public HTTPRange GetRange() + { + var rangeHeaders = this.Headers.GetHeaderValues("content-range"); + if (rangeHeaders == null) + return null; + + // A byte-content-range-spec with a byte-range-resp-spec whose last- byte-pos value is less than its first-byte-pos value, + // or whose instance-length value is less than or equal to its last-byte-pos value, is invalid. + // The recipient of an invalid byte-content-range- spec MUST ignore it and any content transferred along with it. + + // A valid content-range sample: "bytes 500-1233/1234" + var ranges = rangeHeaders[0].Split(new char[] { ' ', '-', '/' }, StringSplitOptions.RemoveEmptyEntries); + + // A server sending a response with status code 416 (Requested range not satisfiable) SHOULD include a Content-Range field with a byte-range-resp-spec of "*". + // The instance-length specifies the current length of the selected resource. + // "bytes */1234" + if (ranges[1] == "*") + return new HTTPRange(int.Parse(ranges[2])); + + return new HTTPRange(int.Parse(ranges[1]), int.Parse(ranges[2]), ranges[3] != "*" ? int.Parse(ranges[3]) : -1); + } + + #endregion + + #region Static Stream Management Helper Functions + + internal static string ReadTo(Stream stream, byte blocker) + { + byte[] readBuf = BufferPool.Get(1024, true); + try + { + int bufpos = 0; + + int ch = stream.ReadByte(); + while (ch != blocker && ch != -1) + { + if (ch > 0x7f) //replaces asciitostring + ch = '?'; + + //make buffer larger if too short + if (readBuf.Length <= bufpos) + BufferPool.Resize(ref readBuf, readBuf.Length * 2, true, false); + + if (bufpos > 0 || !char.IsWhiteSpace((char)ch)) //trimstart + readBuf[bufpos++] = (byte)ch; + ch = stream.ReadByte(); + } + + while (bufpos > 0 && char.IsWhiteSpace((char)readBuf[bufpos - 1])) + bufpos--; + + return System.Text.Encoding.UTF8.GetString(readBuf, 0, bufpos); + } + finally + { + BufferPool.Release(readBuf); + } + } + + internal static BufferSegment ReadToAsByte(Stream stream, byte blocker) + { + var readBuf = BufferPool.Get(1024, true, null); + try + { + int bufpos = 0; + + int ch = stream.ReadByte(); + while (ch != blocker && ch != -1) + { + if (ch > 0x7f) //replaces asciitostring + ch = '?'; + + //make buffer larger if too short + if (readBuf.Length <= bufpos + 1) + BufferPool.Resize(ref readBuf, readBuf.Length * 2, true, false); + + if (bufpos > 0 || !char.IsWhiteSpace((char)ch)) //trimstart + { + readBuf[bufpos++] = (byte)ch; + readBuf[bufpos++] = 0; + } + ch = stream.ReadByte(); + } + + while (bufpos > 0 && char.IsWhiteSpace((char)readBuf[bufpos - 2])) + bufpos -= 2; + + return readBuf.AsBuffer(bufpos); + } + catch + { + BufferPool.Release(readBuf); + return BufferSegment.Empty; + } + } + + internal static string ReadTo(Stream stream, byte blocker1, byte blocker2) + { + byte[] readBuf = BufferPool.Get(1024, true); + try + { + int bufpos = 0; + + int ch = stream.ReadByte(); + while (ch != blocker1 && ch != blocker2 && ch != -1) + { + if (ch > 0x7f) //replaces asciitostring + ch = '?'; + + //make buffer larger if too short + if (readBuf.Length <= bufpos) + BufferPool.Resize(ref readBuf, readBuf.Length * 2, true, true); + + if (bufpos > 0 || !char.IsWhiteSpace((char)ch)) //trimstart + readBuf[bufpos++] = (byte)ch; + ch = stream.ReadByte(); + } + + while (bufpos > 0 && char.IsWhiteSpace((char)readBuf[bufpos - 1])) + bufpos--; + + return System.Text.Encoding.UTF8.GetString(readBuf, 0, bufpos); + } + finally + { + BufferPool.Release(readBuf); + } + } + + internal static string NoTrimReadTo(Stream stream, byte blocker1, byte blocker2) + { + byte[] readBuf = BufferPool.Get(1024, true); + try + { + int bufpos = 0; + + int ch = stream.ReadByte(); + while (ch != blocker1 && ch != blocker2 && ch != -1) + { + if (ch > 0x7f) //replaces asciitostring + ch = '?'; + + //make buffer larger if too short + if (readBuf.Length <= bufpos) + BufferPool.Resize(ref readBuf, readBuf.Length * 2, true, true); + + if (bufpos > 0 || !char.IsWhiteSpace((char)ch)) //trimstart + readBuf[bufpos++] = (byte)ch; + ch = stream.ReadByte(); + } + + return System.Text.Encoding.UTF8.GetString(readBuf, 0, bufpos); + } + finally + { + BufferPool.Release(readBuf); + } + } + + #endregion + + protected void BeginReceiveContent() + { + CheckDisposed(); + + if (!Request.DownloadSettings.DisableCache && !IsFromCache) + { + // If caching is enabled and the response not from cache and it's cacheble we will cache the downloaded data + // by writing it to the stream returned by BeginCache + _cacheWriter = HTTPManager.LocalCache?.BeginCache(Request.MethodType, Request.CurrentUri, this.StatusCode, this.Headers, this.Context); + } + } + + /// + /// Add data to the fragments list. + /// + /// The buffer to be added. + /// The position where we start copy the data. + /// How many data we want to copy. + protected void FeedDownloadedContentChunk(BufferSegment segment) + { + if (segment == BufferSegment.Empty) + return; + + CheckDisposed(); + + _cacheWriter?.Write(segment); + + if (!this.Request.DownloadSettings.CacheOnly) + this.DownStream.Write(segment); + else + BufferPool.Release(segment); + } + + protected void FinishedContentReceiving() + { + CheckDisposed(); + + _cacheWriter?.Cache?.EndCache(_cacheWriter, true, this.Context); + _cacheWriter = null; + } + + protected void CreateDownloadStream(IDownloadContentBufferAvailable bufferAvailable) + { + if (this.DownStream != null) + this.DownStream.Dispose(); + + this.DownStream = this.Request.DownloadSettings.DownloadStreamFactory(this.Request, this, bufferAvailable); + + HTTPManager.Logger.Information(this.GetType().Name, $"{nameof(DownloadContentStream)} initialized with Maximum Buffer Size: {this.DownStream.MaxBuffered:N0}", this.Context); + + // Send download-started event only when the final content is expected (2xx status codes). + // Otherwise, for one request multiple download-started even would be trigger every time it gets redirected. + if (this.StatusCode >= OK && this.StatusCode < MultipleChoices) + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(this.Request, RequestEvents.DownloadStarted)); + } + + protected void CheckDisposed() + { + if (this._isDisposed) + throw new ObjectDisposedException(this.GetType().Name); + } + + /// + /// IDisposable implementation. + /// + public void Dispose() + { + Dispose(true); + GC.SuppressFinalize(this); + } + + protected virtual void Dispose(bool disposing) + { + if (disposing && !this._isDisposed) + { + _cacheWriter?.Cache?.EndCache(_cacheWriter, false, this.Context); + _cacheWriter = null; + + if (this.DownStream != null && !this.DownStream.IsDetached) + { + this.DownStream.Dispose(); + this.DownStream = null; + } + } + + this._isDisposed = true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs.meta new file mode 100644 index 00000000..9f5fb47f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 38183ecd0004d83499f342683e2892fd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPResponse.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs new file mode 100644 index 00000000..846fdfbf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs @@ -0,0 +1,75 @@ +using System; + +namespace Best.HTTP.Response +{ + // https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/xxx + // where xxx is the numeric value of the status code (100...) + + /// + /// Provides constants representing various HTTP status codes. + /// + public static class HTTPStatusCodes + { + public const int Continue = 100; + public const int SwitchingProtocols = 101; + public const int Processing = 102; + public const int EarlyHints_Experimental = 103; + public const int OK = 200; + public const int Created = 201; + public const int Accepted = 202; + public const int NonAuthoritativeInformation = 203; + public const int NoContent = 204; + public const int ResetContent = 205; + public const int PartialContent = 206; + public const int MultiStatus = 207; + public const int AlreadyReported = 208; + public const int IMUsed = 226; + public const int MultipleChoices = 300; + public const int MovedPermanently = 301; + public const int Found = 302; + public const int SeeOther = 303; + public const int NotModified = 304; + public const int TemporaryRedirect = 307; + public const int PermanentRedirect = 308; + public const int BadRequest = 400; + public const int Unauthorized = 401; + public const int PaymentRequired = 402; + public const int Forbidden = 403; + public const int NotFound = 404; + public const int MethodNotAllowed = 405; + public const int NotAcceptable = 406; + public const int ProxyAuthenticationRequired = 407; + public const int RequestTimeout = 408; + public const int Conflict = 409; + public const int Gone = 410; + public const int LengthRequired = 411; + public const int PreconditionFailed = 412; + public const int ContentTooLarge = 413; + public const int URITooLong = 414; + public const int UnsupportedMediaType = 415; + public const int RangeNotSatisfiable = 416; + public const int ExpectationFailed = 417; + public const int ImATeapot = 418; + public const int MisdirectedRequest = 421; + public const int UnprocessableContent = 422; + public const int Locked = 423; + public const int FailedDependency = 424; + public const int TooEarly = 425; + public const int UpgradeRequired = 426; + public const int PreconditionRequired = 428; + public const int TooManyRequests = 429; + public const int RequestHeaderFieldsTooLarge = 431; + public const int UnavailableForLegalReasons = 451; + public const int InternalServerError = 500; + public const int NotImplemented = 501; + public const int BadGateway = 502; + public const int ServiceUnavailable = 503; + public const int GatewayTimeout = 504; + public const int HTTPVersionNotSupported = 505; + public const int VariantAlsoNegotiates = 506; + public const int InsufficientStorage = 507; + public const int LoopDetected = 508; + public const int NotExtended = 510; + public const int NetworkAuthenticationRequired = 511; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs.meta b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs.meta new file mode 100644 index 00000000..cd3e9359 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 84b2d3f8b75adee469990b49666e901a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/HTTP/Response/HTTPStatusCodes.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins.meta b/Packages/com.tivadar.best.http/Runtime/Plugins.meta new file mode 100644 index 00000000..9073db6e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 61f9767cb0e541c4fbe70b9de6617471 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/Android.meta b/Packages/com.tivadar.best.http/Runtime/Plugins/Android.meta new file mode 100644 index 00000000..5aad98cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/Android.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c4322f1a5e3d6c54c9128e97a4f76e20 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java b/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java new file mode 100644 index 00000000..ef32951e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java @@ -0,0 +1,35 @@ +package com.Best.HTTP.proxy; + +import java.net.InetSocketAddress; +import java.net.Proxy; +import java.net.ProxySelector; +import java.net.URI; +import java.util.Iterator; +import java.util.List; + +public class ProxyFinder { + + public static String FindFor(String uriStr) { + try { + System.setProperty("java.net.useSystemProxies","true"); + + List proxies = ProxySelector.getDefault().select(new URI(uriStr)); + + for (Iterator iter = proxies.iterator(); iter.hasNext(); ) { + Proxy proxy = iter.next(); + + InetSocketAddress addr = (InetSocketAddress)proxy.address(); + + if(addr == null) { + // no op + } else { + return String.format("%s://%s:%s", proxy.type(), addr.getHostName(), addr.getPort()); + } + } + } catch (Exception e) { + e.printStackTrace(); + } + + return null; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java.meta b/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java.meta new file mode 100644 index 00000000..ba8b7263 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java.meta @@ -0,0 +1,39 @@ +fileFormatVersion: 2 +guid: 428fd57d0540f554ab0c86f966497e07 +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Android: Android + second: + enabled: 1 + settings: {} + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Plugins/Android/ProxyFinder.java + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL.meta b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL.meta new file mode 100644 index 00000000..cf669676 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 82d83a88504c82f4da2af7db34a2cd7d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib new file mode 100644 index 00000000..dfbcfca4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib @@ -0,0 +1,307 @@ +// https://docs.unity3d.com/6000.0/Documentation/Manual/web-interacting-browser-deprecated.html +// Deprecated code | Replacement code +// -----------------+----------------- +// dynCall() | makeDynCall() + +var Lib_BEST_HTTP_WebGL_HTTP_Bridge = +{ + /*LogLevels: { + All: 0, + Information: 1, + Warning: 2, + Error: 3, + Exception: 4, + None: 5 + }*/ + + $_best_http_request_bridge_global: { + requestInstances: {}, + nextRequestId: 1, + loglevel: 2, + + SendTextToCSharpSide: function(request, onbuffer, text) + { + const encoder = new TextEncoder(); + const byteArray = encoder.encode(text); + + const array = {{{ makeDynCall('iii', '_best_http_request_bridge_global.onallocbuffer') }}}(request, byteArray.length); + + HEAPU8.set(byteArray, array); + + {{{ makeDynCall('viii', 'onbuffer') }}}(request, array, byteArray.length); + }, + + GetResponseHeaders: function(request, callback) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`GetResponseHeaders(${request})`); + + var headers = ''; + + if (document && document.cookie) + { + var cookies = document.cookie.split(';'); + for(var i = 0; i < cookies.length; ++i) { + const cookie = cookies[i].trim(); + + if (cookie.length > 0) + headers += "Set-Cookie:" + cookie + "\n"; + } + } + + const arr = _best_http_request_bridge_global.requestInstances[request].getAllResponseHeaders().trim().split(/[\r\n]+/); + + arr.forEach((line) => { + const parts = line.split(": "); + const header = parts.shift(); + const value = parts.join(": "); + + // Skip 'content-length' header. If there's any content-encoding (gzip for example), + // the actual content accessible through XHR's response will have different length (it's uncompressed). + // So we have to remove the header here, and reconstruct it later when the actual content size is known. + if (header !== 'content-length') + headers += `${header}:${value}\n`; + }); + + _best_http_request_bridge_global.SendTextToCSharpSide(request, callback, headers); + }, + }, + + XHR_Create: function(method, url, user, passwd, withCredentials) + { + var _url = new URL(UTF8ToString(url)); + var _method = UTF8ToString(method); + + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_Create (${_best_http_request_bridge_global.nextRequestId}, ${_method}, ${_url.toString()}, ${withCredentials})`); + + var http = new XMLHttpRequest(); + + if (user && passwd) + { + var u = UTF8ToString(user); + var p = UTF8ToString(passwd); + + // https://developer.mozilla.org/en-US/docs/Web/API/XMLHttpRequest/withCredentials + http.withCredentials = true; + http.open(_method, _url.toString(), /*async:*/ true , u, p); + } + else { + http.withCredentials = withCredentials; + http.open(_method, _url.toString(), /*async:*/ true); + } + + http.responseType = 'arraybuffer'; + + _best_http_request_bridge_global.requestInstances[_best_http_request_bridge_global.nextRequestId] = http; + return _best_http_request_bridge_global.nextRequestId++; + }, + + XHR_SetTimeout: function (request, timeout) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetTimeout(${request}, ${timeout})`); + + _best_http_request_bridge_global.requestInstances[request].timeout = timeout; + }, + + XHR_SetRequestHeader: function (request, header, value) + { + var _header = UTF8ToString(header); + var _value = UTF8ToString(value); + + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetRequestHeader(${_header}, ${_value})`); + + if (_header != 'Cookie') + _best_http_request_bridge_global.requestInstances[request].setRequestHeader(_header, _value); + else { + var cookies = _value.split(';'); + for (var i = 0; i < cookies.length; i++) { + document.cookie = cookies[i]; + } + } + }, + + XHR_SetResponseHandler: function (request, onresponse, onerror, ontimeout, onaborted, onbuffer, onallocbuffer) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetResponseHandler(${request})`); + + _best_http_request_bridge_global.onallocbuffer = onallocbuffer; + + var http = _best_http_request_bridge_global.requestInstances[request]; + + // https://developer.mozilla.org/en-US/docs/Web/API/XMLHttpRequest/readystatechange_event + // The readystatechange event is fired whenever the readyState property of the XMLHttpRequest changes. + // https://xhr.spec.whatwg.org/#dom-xmlhttprequest-readystate + http.onreadystatechange = (event) => { + + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`${request} onreadystatechange(${http.readyState})`); + + switch (http.readyState){ + // The object has been constructed. + case XMLHttpRequest.UNSENT: break; + + // The open() method has been successfully invoked. During this state request headers can be set using setRequestHeader() and the fetch can be initiated using the send() method. + case XMLHttpRequest.OPENED: break; + + // All redirects (if any) have been followed and all headers of a response have been received. + case XMLHttpRequest.HEADERS_RECEIVED: { + _best_http_request_bridge_global.SendTextToCSharpSide(request, onbuffer, `HTTP/1.1 ${http.status} ${http.statusText}\n`); + + _best_http_request_bridge_global.GetResponseHeaders(request, onbuffer); + break; + } + + // The response body is being received. + case XMLHttpRequest.LOADING: break; + + // The data transfer has been completed or something went wrong during the transfer (e.g., infinite redirects). + case XMLHttpRequest.DONE: break; + } + }; + + http.onloadstart = (event) => { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`${request} onloadstart: ${event}`); + }; + + // https://developer.mozilla.org/en-US/docs/Web/API/XMLHttpRequest/load_event + // Fired when an XMLHttpRequest transaction completes successfully. Also available via the onload event handler property. + http.onload = function http_onload(e) { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`${request} onload(${http.status}, ${http.statusText})`); + + if (onresponse) + { + var responseLength = 0; + var array = 0; + + if (!!http.response) { + var response = http.response; + responseLength = response.byteLength; + + _best_http_request_bridge_global.SendTextToCSharpSide(request, onbuffer, `content-length:${responseLength}\n\n`); + + array = {{{ makeDynCall('iii', 'onallocbuffer') }}}(request, responseLength); + + var responseBytes = new Uint8Array(response); + var buffer = HEAPU8.subarray(array, array + responseLength); + buffer.set(responseBytes) + } + else { + _best_http_request_bridge_global.SendTextToCSharpSide(request, onbuffer, `content-length:0\n\n`); + } + + {{{ makeDynCall('viii', 'onresponse') }}}(request, array, responseLength); + } + }; + + if (onerror) + { + http.onerror = function http_onerror(e) { + function HandleError(err) + { + var length = lengthBytesUTF8(err) + 1; + var buffer = _malloc(length); + + stringToUTF8Array(err, HEAPU8, buffer, length); + + {{{ makeDynCall('vii', 'onerror') }}}(request, buffer); + + _free(buffer); + } + + if (e.error) + HandleError(e.error); + else + HandleError("Unknown Error! Maybe a CORS porblem?"); + }; + } + + if (ontimeout) + http.ontimeout = function http_onerror(e) { + {{{ makeDynCall('vi', 'ontimeout') }}}(request); + }; + + if (onaborted) + http.onabort = function http_onerror(e) { + {{{ makeDynCall('vi', 'onaborted') }}}(request); + }; + }, + + XHR_SetProgressHandler: function (request, onprogress, onuploadprogress) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetProgressHandler(${request})`); + + var http = _best_http_request_bridge_global.requestInstances[request]; + if (http) + { + if (onprogress) + http.onprogress = function http_onprogress(e) { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetProgressHandler download(${request}, ${e.loaded}, ${e.total})`); + + if (e.lengthComputable) { + {{{ makeDynCall('viii', 'onprogress') }}}(request, e.loaded, e.total); + } + }; + + if (onuploadprogress) + http.upload.addEventListener("progress", function http_onprogress(e) { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_SetProgressHandler upload(${request}, ${e.loaded}, ${e.total})`); + + if (e.lengthComputable) { + {{{ makeDynCall('viii', 'onuploadprogress') }}}(request, e.loaded, e.total); + } + }, true); + } + }, + + XHR_Send: function (request, ptr, length) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_Send(${request}, ${ptr}, ${length})`); + + var http = _best_http_request_bridge_global.requestInstances[request]; + + try { + if (length > 0) + http.send(HEAPU8.subarray(ptr, ptr+length)); + else + http.send(); + } + catch(e) { + if (_best_http_request_bridge_global.loglevel <= 4) /*exception*/ + console.error(`XHR_Send(${request}): ${e.name} : ${e.message}`); + } + }, + + XHR_Abort: function (request) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_Abort(${request})`); + + _best_http_request_bridge_global.requestInstances[request].abort(); + }, + + XHR_Release: function (request) + { + if (_best_http_request_bridge_global.loglevel <= 1) /*information*/ + console.log(`XHR_Release(${request})`); + + delete _best_http_request_bridge_global.requestInstances[request]; + }, + + XHR_SetLoglevel: function (level) + { + _best_http_request_bridge_global.loglevel = level; + } +}; + +autoAddDeps(Lib_BEST_HTTP_WebGL_HTTP_Bridge, '$_best_http_request_bridge_global'); +mergeInto(LibraryManager.library, Lib_BEST_HTTP_WebGL_HTTP_Bridge); diff --git a/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib.meta b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib.meta new file mode 100644 index 00000000..5abc82ea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib.meta @@ -0,0 +1,39 @@ +fileFormatVersion: 2 +guid: 3a8cd111a04391742a3eaa9a96f9a0ac +PluginImporter: + externalObjects: {} + serializedVersion: 2 + iconMap: {} + executionOrder: {} + defineConstraints: [] + isPreloaded: 0 + isOverridable: 0 + isExplicitlyReferenced: 0 + validateReferences: 1 + platformData: + - first: + Any: + second: + enabled: 0 + settings: {} + - first: + Editor: Editor + second: + enabled: 0 + settings: + DefaultValueInitialized: true + - first: + WebGL: WebGL + second: + enabled: 1 + settings: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Plugins/WebGL/BestHTTP_WebRequest.jslib + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler.meta b/Packages/com.tivadar.best.http/Runtime/Profiler.meta new file mode 100644 index 00000000..3853a563 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: cb84b83f604d6c346a278916b98e20c3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Memory.meta b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory.meta new file mode 100644 index 00000000..5d90bfea --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b566c560ca13fcf4f968c89d48ecf6ac +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs new file mode 100644 index 00000000..c045c139 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs @@ -0,0 +1,25 @@ +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER +using Unity.Profiling; + +namespace Best.HTTP.Profiler.Memory +{ + public sealed class MemoryStats + { + public const string CategoryName = "Best - Memory"; + + public static readonly ProfilerCategory Category = new ProfilerCategory(CategoryName, ProfilerCategoryColor.Scripts); + + public const string BorrowedName = "Borrowed"; + public static readonly ProfilerCounterValue Borrowed = new ProfilerCounterValue(Category, BorrowedName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string PooledName = "Pooled"; + public static readonly ProfilerCounterValue Pooled = new ProfilerCounterValue(Category, PooledName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string CacheHitsName = "Cache Hits"; + public static readonly ProfilerCounterValue CacheHits = new ProfilerCounterValue(Category, CacheHitsName, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string ArrayAllocationsName = "Array Allocations (Cache Misses)"; + public static readonly ProfilerCounterValue ArrayAllocations = new ProfilerCounterValue(Category, ArrayAllocationsName, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs.meta b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs.meta new file mode 100644 index 00000000..946f0500 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c8d754ef44a0854ebc55ef458c239a5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Profiler/Memory/MemoryStats.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Network.meta b/Packages/com.tivadar.best.http/Runtime/Profiler/Network.meta new file mode 100644 index 00000000..55f56c28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Network.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4bca0fb7cf5341347b337bb6d891de80 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs new file mode 100644 index 00000000..52a7aa88 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs @@ -0,0 +1,51 @@ +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER +using Unity.Profiling; + +namespace Best.HTTP.Profiler.Network +{ + public sealed class NetworkStats + { + public const string CategoryName = "Best - Network"; + + public static readonly ProfilerCategory Category = new ProfilerCategory(CategoryName, ProfilerCategoryColor.Scripts); + + // Sent + + public const string BufferedToSendName = "Buffered to Send"; + public static readonly ProfilerCounterValue BufferedToSend = new ProfilerCounterValue(Category, BufferedToSendName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string SentSinceLastFrameName = "Sent (Since Last Frame)"; + public static readonly ProfilerCounterValue SentSinceLastFrame = new ProfilerCounterValue(Category, SentSinceLastFrameName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string SentTotalName = "Sent Total"; + public static readonly ProfilerCounterValue SentTotal = new ProfilerCounterValue(Category, SentTotalName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + // Received + + public const string ReceivedSinceLastFrameName = "Received (Since Last Frame)"; + public static readonly ProfilerCounterValue ReceivedSinceLastFrame = new ProfilerCounterValue(Category, ReceivedSinceLastFrameName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string ReceivedAndUnprocessedName = "Received and Unprocessed"; + public static readonly ProfilerCounterValue ReceivedAndUnprocessed = new ProfilerCounterValue(Category, ReceivedAndUnprocessedName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + public const string ReceivedTotalName = "Received Total"; + public static readonly ProfilerCounterValue ReceivedTotal = new ProfilerCounterValue(Category, ReceivedTotalName, ProfilerMarkerDataUnit.Bytes, ProfilerCounterOptions.FlushOnEndOfFrame | ProfilerCounterOptions.ResetToZeroOnFlush); + + // Connections + + public const string OpenConnectionsName = "Open Connections"; + public static readonly ProfilerCounterValue OpenConnectionsCounter = new ProfilerCounterValue(Category, OpenConnectionsName, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame); + + public const string TotalConnectionsName = "Total Connections"; + public static readonly ProfilerCounterValue TotalConnectionsCounter = new ProfilerCounterValue(Category, TotalConnectionsName, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame); + + // DNS + + public const string TotalDNSCacheHits = "DNS Cache Hits"; + public static readonly ProfilerCounterValue TotalDNSCacheHitsCounter = new ProfilerCounterValue(Category, TotalDNSCacheHits, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame); + + public const string TotalDNSCacheMiss = "DNS Cache Miss"; + public static readonly ProfilerCounterValue TotalDNSCacheMissCounter = new ProfilerCounterValue(Category, TotalDNSCacheMiss, ProfilerMarkerDataUnit.Count, ProfilerCounterOptions.FlushOnEndOfFrame); + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs.meta b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs.meta new file mode 100644 index 00000000..e8119dc2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aab4369fdf2a1d04f8e02cd9cc1977d8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStats.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs new file mode 100644 index 00000000..5eca3f70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs @@ -0,0 +1,53 @@ +using System; +using System.Threading; + +namespace Best.HTTP.Profiler.Network +{ + public static class NetworkStatsCollector + { + public static long TotalNetworkBytesReceived { get => _totalNetworkBytesReceived; } + private static long _totalNetworkBytesReceived; + + public static long TotalNetworkBytesSent { get => _totalNetworkBytesSent; } + private static long _totalNetworkBytesSent; + + public static int TotalConnections { get => _totalConnections; } + private static int _totalConnections; + + public static int OpenConnections { get => _openConnections; } + private static int _openConnections; + + public static int BufferedToSend { get => _bufferedToSend; } + private static int _bufferedToSend; + + public static int ReceivedAndUnprocessed { get => _receivedAndUnprocessed; } + private static int _receivedAndUnprocessed; + + internal static void IncrementCurrentConnections() + { + Interlocked.Increment(ref _totalConnections); + Interlocked.Increment(ref _openConnections); + } + + internal static void DecrementCurrentConnections() => Interlocked.Decrement(ref _openConnections); + + internal static void IncrementTotalNetworkBytesReceived(int amount) => Interlocked.Add(ref _totalNetworkBytesReceived, amount); + + internal static void IncrementTotalNetworkBytesSent(int amount) => Interlocked.Add(ref _totalNetworkBytesSent, amount); + + internal static void IncrementBufferedToSend(int amount) => Interlocked.Add(ref _bufferedToSend, amount); + internal static void IncrementReceivedAndUnprocessed(int amount) => Interlocked.Add(ref _receivedAndUnprocessed, amount); + + internal static void ResetNetworkStats() + { + Interlocked.Exchange(ref _totalNetworkBytesReceived, 0); + Interlocked.Exchange(ref _totalNetworkBytesSent, 0); + + Interlocked.Exchange(ref _totalConnections, 0); + Interlocked.Exchange(ref _openConnections, 0); + + Interlocked.Exchange(ref _bufferedToSend, 0); + Interlocked.Exchange(ref _receivedAndUnprocessed, 0); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs.meta b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs.meta new file mode 100644 index 00000000..4b2a691c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2eade542690505e47bed8b5045c1cd3c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Profiler/Network/NetworkStatsCollector.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared.meta b/Packages/com.tivadar.best.http/Runtime/Shared.meta new file mode 100644 index 00000000..d3e9913a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: fe90d46e4f2bd1e438d3990bc89afc3e +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database.meta new file mode 100644 index 00000000..729e0ba6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 566c5447b0e061e4c90deb0de9a596e5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs new file mode 100644 index 00000000..d5e70459 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs @@ -0,0 +1,260 @@ +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Threading; + +using System; +using System.Collections.Generic; +using System.IO; +using System.Linq; +using System.Threading; + +namespace Best.HTTP.Shared.Databases +{ + public sealed class FolderAndFileOptions + { + public string FolderName = "Best.HTTP.Shared.Databases"; + public string DatabaseFolderName = "Databases"; + public string MetadataExtension = "metadata"; + public string DatabaseExtension = "db"; + public string DatabaseFreeListExtension = "freelist"; + public string HashExtension = "hash"; + } + + public abstract class Database : IDisposable, IHeartbeat + where MetadataType : Metadata, new() + where IndexingServiceType : IndexingService + where MetadataServiceType : MetadataService + { + public static FolderAndFileOptions FolderAndFileOptions = new FolderAndFileOptions(); + + public string SaveDir { get; private set; } + public string Name { get { return this.Options.Name; } } + + public string MetadataFileName { get { return Path.ChangeExtension(Path.Combine(this.SaveDir, this.Name), FolderAndFileOptions.MetadataExtension); } } + public string DatabaseFileName { get { return Path.ChangeExtension(Path.Combine(this.SaveDir, this.Name), FolderAndFileOptions.DatabaseExtension); } } + public string DatabaseFreeListFileName { get { return Path.ChangeExtension(Path.Combine(this.SaveDir, this.Name), FolderAndFileOptions.DatabaseFreeListExtension); } } + public string HashFileName { get { return Path.ChangeExtension(Path.Combine(this.SaveDir, this.Name), FolderAndFileOptions.HashExtension); } } + + public MetadataServiceType MetadataService { get; private set; } + + protected DatabaseOptions Options { get; private set; } + protected IndexingServiceType IndexingService { get; private set; } + protected DiskManager DiskManager { get; private set; } + + protected int isDirty = 0; + + protected ReaderWriterLockSlim rwlock = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + public Database(string directory, + DatabaseOptions options, + IndexingServiceType indexingService, + IDiskContentParser diskContentParser, + MetadataServiceType metadataService) + { + this.SaveDir = directory; + this.Options = options; + this.IndexingService = indexingService; + this.MetadataService = metadataService; + + var dir = Path.GetDirectoryName(this.DatabaseFileName); + if (!HTTPManager.IOService.DirectoryExists(dir)) + HTTPManager.IOService.DirectoryCreate(dir); + + this.DiskManager = new DiskManager( + HTTPManager.IOService.CreateFileStream(this.DatabaseFileName, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenReadWrite), + HTTPManager.IOService.CreateFileStream(this.DatabaseFreeListFileName, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenReadWrite), + diskContentParser, + options.DiskManager); + + using (var fileStream = HTTPManager.IOService.CreateFileStream(this.MetadataFileName, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenReadWrite)) + using (var stream = new BufferedStream(fileStream)) + this.MetadataService.LoadFrom(stream); + } + + public int Clear() + { + using (new WriteLock(this.rwlock)) + { + int count = this.MetadataService.Metadatas.Count; + + this.IndexingService.Clear(); + this.DiskManager.Clear(); + this.MetadataService.Clear(); + FlagDirty(1); + + return count; + } + } + + public int Delete(IEnumerable metadatas) + { + if (metadatas == null) + return 0; + + using (new WriteLock(this.rwlock)) + { + int deletedCount = 0; + foreach (var metadata in metadatas) + if (DeleteMetadata(metadata)) + deletedCount++; + + FlagDirty(deletedCount); + + return deletedCount; + } + } + + public int Delete(IEnumerable metadataIndexes) + { + if (metadataIndexes == null) + return 0; + + using (new WriteLock(this.rwlock)) + { + int deletedCount = 0; + foreach (int idx in metadataIndexes) + { + var metadata = this.MetadataService.Metadatas[idx]; + + if (DeleteMetadata(metadata)) + deletedCount++; + } + + FlagDirty(deletedCount); + + return deletedCount; + } + } + + protected bool DeleteMetadata(MetadataType metadata) + { + if (metadata.Length > 0) + this.DiskManager.Delete(metadata); + this.MetadataService.Remove(metadata); + FlagDirty(1); + + return true; + } + + /// + /// Loads the first content from the metadata indexes. + /// + public ContentType FromFirstMetadataIndex(IEnumerable metadataIndexes) + { + if (metadataIndexes == null) + return default; + + var index = metadataIndexes.DefaultIfEmpty(-1).First(); + if (index < 0) + return default; + + return FromMetadataIndex(index); + } + + /// + /// Loads the content from the metadata index. + /// + public ContentType FromMetadataIndex(int metadataIndex) + { + if (metadataIndex < 0 || metadataIndex >= this.MetadataService.Metadatas.Count) + return default; + + //using (new ReadLock(this.rwlock)) + { + var metadata = this.MetadataService.Metadatas[metadataIndex]; + return this.DiskManager.Load(metadata); + } + } + + public ContentType FromMetadata(MetadataType metadata) => this.DiskManager.Load(metadata); + + /// + /// Loads all content from the metadatas. + /// + public IEnumerable FromMetadatas(IEnumerable metadatas) => FromMetadataIndexes(from m in metadatas select m.Index); + + /// + /// Loads all content from the metadata indexes. + /// + public IEnumerable FromMetadataIndexes(IEnumerable metadataIndexes) + { + if (metadataIndexes == null) + yield break; + + //using (new ReadLock(this.rwlock)) + { + foreach (int metadataIndex in metadataIndexes) + { + var metadata = this.MetadataService.Metadatas[metadataIndex]; + var content = this.DiskManager.Load(metadata); + //result.Add(content); + + yield return content; + } + } + } + + protected void FlagDirty(int dirty) + { + if (dirty != 0 && Interlocked.CompareExchange(ref this.isDirty, dirty, 0) == 0) + HTTPManager.Heartbeats.Subscribe(this); + } + + public bool Save() + { + if (!this.rwlock.TryEnterWriteLock(TimeSpan.FromMilliseconds(0))) + return false; + + try + { + int itWasDirty = Interlocked.CompareExchange(ref this.isDirty, 0, 1); + if (itWasDirty == 0) + return true; + + using (var fileStream = HTTPManager.IOService.CreateFileStream(this.MetadataFileName, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.Create)) + using (var stream = new BufferedStream(fileStream)) + this.MetadataService.SaveTo(stream); + + if (this.Options.UseHashFile) + { + using (var hashStream = HTTPManager.IOService.CreateFileStream(this.HashFileName, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.Create)) + { + var hash = this.DiskManager.CalculateHash(); + hashStream.Write(hash.Data, 0, hash.Count); + BufferPool.Release(hash); + } + } + + this.DiskManager.Save(); + + Interlocked.Exchange(ref this.isDirty, 0); + + return true; + } + finally + { + this.rwlock.ExitWriteLock(); + } + } + + void IHeartbeat.OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + if (this.Save()) + HTTPManager.Heartbeats.Unsubscribe(this); + } + + public void Dispose() + { + Save(); + HTTPManager.Heartbeats.Unsubscribe(this); + + this.DiskManager.Dispose(); + this.DiskManager = null; + + this.rwlock.Dispose(); + this.rwlock = null; + + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs.meta new file mode 100644 index 00000000..4d6388c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a166a5458783404a94c362f12b90e88 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Database.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs new file mode 100644 index 00000000..d004fd0c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs @@ -0,0 +1,15 @@ +namespace Best.HTTP.Shared.Databases +{ + public class DatabaseOptions + { + public string Name; + public bool UseHashFile; + + public DiskManagerOptions DiskManager = new DiskManagerOptions(); + + public DatabaseOptions(string dbName) + { + this.Name = dbName; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs.meta new file mode 100644 index 00000000..275d1ae0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2a5df3217523b8e468cf636c4b5ee3fa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/DatabaseOptions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs new file mode 100644 index 00000000..98fd30b5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs @@ -0,0 +1,295 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Threading; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Shared.Databases +{ + public sealed class DiskManagerOptions + { + // avg. size of certificates is 1390 (calculated from 2621 intermediate certificate) + public int MaxCacheSizeInBytes = 5 * 1024; + + public string HashDigest = "SHA256"; + } + + public interface IDiskContentParser + { + T Parse(Stream stream, int length); + void Encode(Stream stream, T content); + } + + public sealed class DiskManager : IDisposable + { + // TODO: store usage date/count and delete the oldest/least used? + + struct CachePointer + { + public static readonly CachePointer Empty = new CachePointer { Position = -1, Length = -1, Content = default(CacheType) }; + + public int Position; + public int Length; + public CacheType Content; + + public override string ToString() + { + return $"[CachePointer<{this.Content.GetType().Name}>({Position}, {Length}, {Content})]"; + } + } + + /// + /// Sum size of the cached contents + /// + public int CacheSize { get; private set; } + + private Stream stream; + + private List> cache = new List>(); + private IDiskContentParser diskContentParser; + private DiskManagerOptions options; + private FreeListManager freeListManager; + + private ReaderWriterLockSlim rwLock = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + public DiskManager(Stream stream, Stream freeListStream, IDiskContentParser contentParser, DiskManagerOptions options) + { + if (!stream.CanSeek) + throw new ArgumentException("DiskManager - stream can't seek!"); + + this.stream = stream; + this.freeListManager = new FreeListManager(freeListStream); + this.diskContentParser = contentParser; + this.options = options; + } + + public (int, int) Append(T content) + { + using (new WriteLock(this.rwLock)) + { + int pos = -1; + int length = -1; + + using (var buffer = new BufferPoolMemoryStream()) + { + diskContentParser.Encode(buffer, content); + + length = (int)buffer.Length; + + var idx = this.freeListManager.FindFreeIndex(length); + + if (idx >= 0) + pos = this.freeListManager.Occupy(idx, length); + else + pos = (int)this.stream.Length; + + this.stream.Seek(pos, SeekOrigin.Begin); + buffer.Seek(0, SeekOrigin.Begin); + buffer.CopyTo(this.stream); + } + + this.stream.Flush(); + + return (pos, length); + } + } + + public void SaveChanged(Metadata metadata, T content) + { + using var _ = new WriteLock(this.rwLock); + + int pos = -1; + int length = -1; + + using (var buffer = new BufferPoolMemoryStream()) + { + diskContentParser.Encode(buffer, content); + + length = (int)buffer.Length; + + this.freeListManager.Add(metadata.FilePosition, metadata.Length); + var idx = this.freeListManager.FindFreeIndex(length); + + if (idx >= 0) + pos = this.freeListManager.Occupy(idx, length); + else + pos = (int)this.stream.Length; + + this.stream.Seek(pos, SeekOrigin.Begin); + buffer.Seek(0, SeekOrigin.Begin); + buffer.CopyTo(this.stream); + } + + this.stream.Flush(); + + metadata.FilePosition = pos; + metadata.Length = length; + } + + public void Delete(Metadata metadata) + { + using (new WriteLock(this.rwLock)) + { + this.freeListManager.Add(metadata.FilePosition, metadata.Length); + this.stream.Seek(metadata.FilePosition, SeekOrigin.Begin); + + var buffer = BufferPool.Get(BufferPool.MIN_BUFFER_SIZE, true); + Array.Clear(buffer, 0, (int)BufferPool.MIN_BUFFER_SIZE); + + int length = metadata.Length; + int iterationCount = length / (int)BufferPool.MIN_BUFFER_SIZE; + for (int i = 0; i < iterationCount; ++i) + { + this.stream.Write(buffer, 0, (int)BufferPool.MIN_BUFFER_SIZE); + length -= (int)BufferPool.MIN_BUFFER_SIZE; + } + this.stream.Write(buffer, 0, length); + + this.stream.Flush(); + BufferPool.Release(buffer); + } + } + + public T Load(Metadata metadata) + { + using (new WriteLock(this.rwLock)) + { + T parsedContent = default(T); + + var cachePointer = GetCached(metadata.FilePosition); + if (cachePointer.Position != -1 && cachePointer.Content != null) + return cachePointer.Content; + + this.stream.Seek(metadata.FilePosition, SeekOrigin.Begin); + + parsedContent = diskContentParser.Parse(this.stream, metadata.Length); + + AddToCache(parsedContent, metadata.FilePosition, metadata.Length); + + return parsedContent; + } + } + + public List> LoadAll(List metadatas) where Meta : Metadata + { + using (new WriteLock(this.rwLock)) + { + if (metadatas == null || metadatas.Count == 0) + return null; + + metadatas.Sort((m1, m2) => m1.FilePosition.CompareTo(m2.FilePosition)); + + List> result = new List>(metadatas.Count); + + for (int i = 0; i < metadatas.Count; ++i) + { + var metadata = metadatas[i]; + + result.Add(new KeyValuePair(metadata, Load(metadata))); + } + + return result; + } + } + + public void Clear() + { + using (new WriteLock(this.rwLock)) + { + this.freeListManager.Clear(); + this.stream.SetLength(0); + this.stream.Flush(); + this.cache.Clear(); + this.CacheSize = 0; + } + } + + private CachePointer GetCached(int position) + { + for (int i = 0; i < this.cache.Count; ++i) + { + var cache = this.cache[i]; + + if (cache.Position == position) + return cache; + } + + return CachePointer.Empty; + } + + private void AddToCache(T parsedContent, int pos, int length) + { + if (this.options.MaxCacheSizeInBytes >= length) + { + this.cache.Insert(0, new CachePointer + { + Position = pos, + Length = length, + Content = parsedContent + }); + this.CacheSize += length; + } + + while (this.CacheSize > this.options.MaxCacheSizeInBytes && this.cache.Count > 0) + { + var removingCache = this.cache[this.cache.Count - 1]; + this.cache.RemoveAt(this.cache.Count - 1); + + this.CacheSize -= removingCache.Length; + } + } + + public BufferSegment CalculateHash() + { + using (new WriteLock(this.rwLock)) + { + this.stream.Seek(0, SeekOrigin.Begin); + +#if UNITY_WEBGL && !UNITY_EDITOR + var hash = System.Security.Cryptography.HashAlgorithm.Create(this.options.HashDigest); + var result = hash.ComputeHash(this.stream); + return new BufferSegment(result, 0, result.Length); +#elif !BESTHTTP_DISABLE_ALTERNATE_SSL + var digest = Best.HTTP.SecureProtocol.Org.BouncyCastle.Security.DigestUtilities.GetDigest(this.options.HashDigest); + + byte[] buffer = BufferPool.Get(4 * 1024, true); + int readCount = 0; + while ((readCount = this.stream.Read(buffer, 0, buffer.Length)) > 0) + { + digest.BlockUpdate(buffer, 0, readCount); + } + + BufferPool.Release(buffer); + + byte[] result = BufferPool.Get(digest.GetDigestSize(), true); + + int length = digest.DoFinal(result, 0); + return new BufferSegment(result, 0, length); +#else + throw new NotImplementedException(nameof(CalculateHash)); +#endif + } + } + + public void Save() + { + this.stream.Flush(); + this.freeListManager.Save(); + } + + public void Dispose() + { + this.freeListManager.Dispose(); + this.stream.Flush(); + this.stream.Close(); + this.stream = null; + this.rwLock.Dispose(); + + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs.meta new file mode 100644 index 00000000..8ddfe6ca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 07c2801d01675b0479bc135ee8327fd1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/DiskManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs new file mode 100644 index 00000000..b5c7e26a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs @@ -0,0 +1,181 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.Databases.Utils; + +namespace Best.HTTP.Shared.Databases +{ + public sealed class FreeListManager : IDisposable + { + struct FreeSpot + { + public int pos; + public int length; + } + + private Stream stream; + private List freeList = new List(); + + public FreeListManager(Stream stream) + { + this.stream = stream; + Load(); + } + + private void Load() + { + this.freeList.Clear(); + this.stream.Seek(0, SeekOrigin.Begin); + + if (this.stream.Length == 0) + return; + + try + { + uint count = (uint)stream.DecodeUnsignedVariableByteInteger(); + for (int i = 0; i < count; ++i) + { + int pos = (int)stream.DecodeUnsignedVariableByteInteger(); + int length = (int)stream.DecodeUnsignedVariableByteInteger(); + + this.freeList.Add(new FreeSpot { pos = pos, length = length }); + } + } + catch + { + this.freeList.Clear(); + this.stream.SetLength(0); + } + } + + public void Save() + { + if (this.freeList.Count == 0) + { + this.stream.SetLength(0); + return; + } + + int count = this.freeList.Count; + + this.stream.Seek(0, SeekOrigin.Begin); + + stream.EncodeUnsignedVariableByteInteger((uint)count); + + for (int i = 0; i < count; ++i) + { + FreeSpot spot = this.freeList[i]; + + stream.EncodeUnsignedVariableByteInteger((uint)spot.pos); + stream.EncodeUnsignedVariableByteInteger((uint)spot.length); + } + + this.stream.Flush(); + } + + public int FindFreeIndex(int length) + { + for (int i = 0; i < this.freeList.Count; ++i) + { + FreeSpot spot = this.freeList[i]; + + if (spot.length >= length) + return i; + } + + return -1; + } + + public int Occupy(int idx, int length) + { + FreeSpot spot = this.freeList[idx]; + int position = spot.pos; + + if (spot.length < length) + throw new Exception($"Can't Occupy a free spot with smaller space ({spot.length} < {length})!"); + + if (spot.length > length) + { + spot.pos += length; + spot.length -= length; + + this.freeList[idx] = spot; + } + else + this.freeList.RemoveAt(idx); + + return position; + } + + public void Add(int pos, int length) + { + int insertToIdx = 0; + + while (insertToIdx < this.freeList.Count && this.freeList[insertToIdx].pos < pos) + insertToIdx++; + + if (insertToIdx > this.freeList.Count) + throw new Exception($"Couldn't find free spot with position '{pos}'!"); + + bool merged = false; + FreeSpot spot = new FreeSpot { pos = pos, length = length }; + + if (insertToIdx > 0) + { + var prev = this.freeList[insertToIdx - 1]; + + // Merge with previous + if (prev.pos + prev.length == pos) + { + prev.length += length; + + this.freeList[insertToIdx - 1] = prev; + + spot = prev; + merged = true; + } + } + + if (insertToIdx < this.freeList.Count) + { + var next = this.freeList[insertToIdx]; + + // merge with next? + if (spot.pos + spot.length == next.pos) + { + spot.length += next.length; + + if (!merged) + { + // Not already merged, extend the one in place + this.freeList[insertToIdx] = spot; + merged = true; + } + else + { + // Already merged. Further extend the previous, and remove the next. + this.freeList[insertToIdx - 1] = spot; + this.freeList.RemoveAt(insertToIdx); + } + } + } + + if (!merged) + this.freeList.Insert(insertToIdx, spot); + } + + public void Clear() + { + this.freeList.Clear(); + } + + public void Dispose() + { + if (this.stream != null) + this.stream.Close(); + this.stream = null; + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs.meta new file mode 100644 index 00000000..1aa18ffc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b0aa37cc0a1f5054f8ffb64d2cef5c5a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/FreeListManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing.meta new file mode 100644 index 00000000..f8abff29 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: fc04de29f38ec7c48b0517fc0ba4d8b2 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs new file mode 100644 index 00000000..86a7cbb1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs @@ -0,0 +1,941 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing +{ + public enum Side + { + Left, + Right + } + + /// + /// Implements most common list functions. With best case (no or only one item) it doesn't do any allocation. + /// + public struct NoAllocList + { + private T _value; + private bool _hasValue; + + private List _values; + + public NoAllocList(T value) + { + this._value = value; + this._hasValue = true; + this._values = null; + } + + public T this[int index] { + get => this._hasValue ? this._value : this._values[index]; + set + { + if (index < 0 || (this._values == null && index > 0)) + throw new IndexOutOfRangeException(index.ToString()); + + if (this._values != null) + this._values[index] = value; + else + { + this._value = value; + this._hasValue = true; + } + } + } + + public int Count { get => this._values != null ? this._values.Count : (this._hasValue ? 1 : 0); } + + public void Add(T item) + { + if (this._values != null) + this._values.Add(item); + else if (this._hasValue) + { + this._values = new List { this._value, item }; + this._value = default(T); + this._hasValue = false; + } + else + { + this._value = item; + this._hasValue = true; + } + } + + public void Clear() + { + this._values?.Clear(); + this._values = null; + this._value = default(T); + this._hasValue = false; + } + + public bool Contains(T item) + { + if (this._values != null) + return this._values.Contains(item); + + // This can thrown a NullRefException if _value is null! + return this._hasValue ? this._value.Equals(item) : false; + } + + public bool Remove(T item) + { + if (this._values != null) + return this._values.Remove(item); + else if (this._hasValue && this._value.Equals(item)) + { + this._value = default(T); + this._hasValue = false; + return true; + } + + return false; + } + + public void RemoveAt(int index) + { + if (index < 0 || (this._values == null && index > 0)) + throw new IndexOutOfRangeException(index.ToString()); + + if (this._values != null) + this._values.RemoveAt(index); + else + { + this._value = default(T); + this._hasValue = false; + } + } + } + + public sealed class Node + { + public Node Parent, Left, Right; + + public KeyT Key { get; private set; } + + /// + /// Depth of the node. + /// + public int Depth; + + /// + /// Difference between LeftDepth and RightDepth. + /// + public int BalanceFactor { get { return this.LeftDepth - this.RightDepth; } } + + /// + /// Left node's Depth, or -1 if it's null. + /// + public int LeftDepth { get { return this.Left == null ? -1 : this.Left.Depth; } } + + /// + /// Right node's Depth, or -1 if it's null. + /// + public int RightDepth { get { return this.Right == null ? -1 : this.Right.Depth; } } + + public bool IsRoot { get { return this.Parent == null; } } + + public int ChildCount { get { return (this.Left == null ? 0 : 1) + (this.Right == null ? 0 : 1); } } + + // Stored values aren't public as modifing them requires special care. + private NoAllocList _item; + + public Node(Node parent, KeyT key, ValueT value) + { + this.Parent = parent; + this.Key = key; + this._item = new NoAllocList(value); + + // Depth is 0 by default, as it has no child + this.Depth = 0; + } + + public void BubbleUpDepthChange() + { + var current = this; + + while (current != null) + { + var oldDepth = current.Depth; + current.Depth = Math.Max(current.LeftDepth, current.RightDepth) + 1; + + if (oldDepth != current.Depth) + current = current.Parent; + else + break; + } + } + + public ValueT this[int index] { get => this._item[index]; } + + public int Count { get => this._item.Count; } + + public void Clear() => this._item = new NoAllocList(); + + public void Add(ValueT value) + { + var tmp = this._item; + tmp.Add(value); + this._item = tmp; + } + + public bool Remove(ValueT value) + { + var tmp = this._item; + var result = tmp.Remove(value); + if (result) + this._item = tmp; + return result; + } + + public List ToList() + { + var list = new List(this._item.Count); + + for (int i = 0; i < this._item.Count; ++i) + list.Add(this._item[i]); + + return list; + } + + public override string ToString() + { + return $"{this.Left?.Key.ToString()} <- {this.Key.ToString()} -> {this.Right?.Key.ToString()}"; + } + } + + // https://www.codesdope.com/course/data-structures-avl-trees/ + public sealed class AVLTree + { + public int ElemCount { get; private set; } + public int NodeCount { get; private set; } + public IComparer Comparer; + + public Node RootNode { get; private set; } = null; + + public AVLTree(IComparer comparer) + { + this.Comparer = comparer; + } + + public void Add(Key key, Value item, bool clearValues = false) + { + if (this.RootNode == null) { + this.NodeCount++; + this.ElemCount++; + this.RootNode = new Node(null, key, item); + return; + } + + var current = this.RootNode; + do + { + // +--------------------+-----------------------+ + // | Value | Meaning | + // +--------------------+-----------------------+ + // | Less than zero | x is less than y. | + // | Zero | x equals y. | + // | Greater than zero | x is greater than y. | + // +--------------------------------------------+ + int comp = this.Comparer.Compare(/*x: */ current.Key, /*y: */ key); + + // equals + if (comp == 0) + { + if (clearValues) + { + this.ElemCount -= current.Count; + current.Clear(); + } + + current.Add(item); + break; + } + + // current's key > key + if (comp > 0) + { + // insert new node + if (current.Left == null) + { + current.Left = new Node(current, key, item); + current.BubbleUpDepthChange(/*Side.Left, 1*/); + + current = current.Left; + + this.NodeCount++; + break; + } + else + { + current = current.Left; + continue; + } + } + + // current's key < key + if (comp < 0) + { + // insert new node + if (current.Right == null) + { + current.Right = new Node(current, key, item); + current.BubbleUpDepthChange(/*Side.Right, 1*/); + + current = current.Right; + + this.NodeCount++; + break; + } + else + { + current = current.Right; + continue; + } + } + } while (true); + + this.ElemCount++; + + while (RebalanceFrom(current) != null) + ; + + //TestBalance(this.root); + } + + public bool TestBalance() => TestBalance(this.RootNode); + + private bool TestBalance(Node node) + { + if (node == null) + return true; + + if (Math.Abs(node.BalanceFactor) > 1) + { + //UnityEngine.Debug.Break(); + return false; + } + + return TestBalance(node.Left) && TestBalance(node.Right); + } + + List path = new List(2); + + private Node RebalanceFrom(Node newNode) + { + if (newNode.IsRoot || newNode.Parent.IsRoot) + return null; + + path.Clear(); + + // find first unbalanced node or exit when found the root node (root still can be unbalanced!) + var current = newNode; + var balanceFactor = current.BalanceFactor; + while (!current.IsRoot && Math.Abs(balanceFactor) <= 1) + { + if (current.Parent.Left == current) + path.Add(Side.Left); + else + path.Add(Side.Right); + + current = current.Parent; + balanceFactor = current.BalanceFactor; + } + + // it's a balanced tree + if (Math.Abs(balanceFactor) <= 1) + return null; + + Side last = path[path.Count - 1];// path[path.StartIdx]; + Side prev = path[path.Count - 2];// path[path.EndIdx]; + + if (last == Side.Left && prev == Side.Left) + { + // insertion to a left child of a left child + RotateRight(current) + .BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + else if (last == Side.Right && prev == Side.Right) + { + // insertion to a right child of a right child + RotateLeft(current) + .BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + else if (last == Side.Right && prev == Side.Left) + { + // insertion to a left child of a right child + var current_right = current.Right; + RotateRight(current.Right); + RotateLeft(current); + + current_right.BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + else if (last == Side.Left && prev == Side.Right) + { + // insertion to a right child of a left child + + var current_left = current.Left; + RotateLeft(current.Left); + RotateRight(current); + + current_left.BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + + return current; + } + + public void Clear() + { + this.RootNode = null; + this.ElemCount = 0; + this.NodeCount = 0; + } + + public List Remove(Key key) + { + if (this.RootNode == null) + return null; + + var current = this.RootNode; + do + { + int comp = this.Comparer.Compare(current.Key, key); + + // equals + if (comp == 0) + { + this.NodeCount--; + this.ElemCount -= current.Count; + + // remove current node from the tree + RemoveNode(current); + + return current.ToList(); + } + + // current's key > key + if (comp > 0) + { + if (current.Left == null) + return null; + else + { + current = current.Left; + continue; + } + } + + // current's key < key + if (comp < 0) + { + if (current.Right == null) + return null; + else + { + current = current.Right; + continue; + } + } + } while (true); + } + + public void Remove(Key key, Value value) + { + if (this.RootNode == null) + return; + + var current = this.RootNode; + do + { + int comp = this.Comparer.Compare(current.Key, key); + + // equals + if (comp == 0) + { + if (current.Remove(value)) + this.ElemCount--; + + if (current.Count == 0) + { + // remove current node from the tree + RemoveNode(current); + + this.NodeCount--; + } + + return; + } + + // current's key > key + if (comp > 0) + { + if (current.Left == null) + return ; + else + { + current = current.Left; + continue; + } + } + + // current's key < key + if (comp < 0) + { + if (current.Right == null) + return ; + else + { + current = current.Right; + continue; + } + } + } while (true); + } + + /// + /// Removes node and reparent any child it has. + /// + private void RemoveNode(Node node) + { + var parent = node.Parent; + Side side = parent?.Left == node ? Side.Left : Side.Right; + int childCount = node.ChildCount; + + var testForRebalanceNode = parent; + + switch(childCount) + { + case 0: + // node has no child + + if (parent == null) + { + this.RootNode = null; + } + else + { + if (parent.Left == node) + parent.Left = null; + else + parent.Right = null; + parent.BubbleUpDepthChange(); + } + + node.Parent = null; + break; + + case 1: + // re-parent the only child + // Example: Removing node 25 will replace it with 30 + // + // 20 + // 15 25 + // 30 + // + var child = node.Left ?? node.Right; + + if (parent == null) + { + this.RootNode = child; + this.RootNode.Parent = null; + } + else + { + if (parent.Left == node) + parent.Left = child; + else + parent.Right = child; + child.Parent = parent; + + parent.BubbleUpDepthChange(); + } + break; + + default: + // two child + + // 1: Replace 20 with 25 + // + // 20 20 + // 15 25 15 25 + // 30 + // + + // 2: Replace 20 with 22 + // + // 20 + // 15 25 + // 22 + + // 3: Re-parent 23 for 25, replace 20 with 22 + // + // 20 + // 15 25 + // 22 + // 23 + + // Cases 1 and 3 are the same, both 25 and 22 has a right child. But in case 3, 22 isn't first child of 20! + + // Find node with the least Key, that's a node without a left node so we have to deal only with its right node. + var nodeToReplaceWith = FindMin(node.Right); + + testForRebalanceNode = nodeToReplaceWith; + side = Side.Right; + + // re-parent 23 in case 3: + if (nodeToReplaceWith.Parent != node) + { + testForRebalanceNode = nodeToReplaceWith.Parent; + if (nodeToReplaceWith.Parent.Left == nodeToReplaceWith) + { + nodeToReplaceWith.Parent.Left = nodeToReplaceWith.Right; + side = Side.Left; + } + else + { + nodeToReplaceWith.Parent.Right = nodeToReplaceWith.Right; + side = Side.Right; + } + + if (nodeToReplaceWith.Right != null) + nodeToReplaceWith.Right.Parent = nodeToReplaceWith.Parent; + } + + if (parent == null) + this.RootNode = nodeToReplaceWith; + else + { + if (parent.Left == node) + parent.Left = nodeToReplaceWith; + else + parent.Right = nodeToReplaceWith; + } + nodeToReplaceWith.Parent = parent; + + // Reparent node's left + nodeToReplaceWith.Left = node.Left; + node.Left.Parent = nodeToReplaceWith; + + // Reparent node's right node, if it's not the one we replaceing it with + if (node.Right != nodeToReplaceWith) + { + nodeToReplaceWith.Right = node.Right; + node.Right.Parent = nodeToReplaceWith; + } + //else + // nodeToReplaceWith.Right = null; + + if (testForRebalanceNode != nodeToReplaceWith) + testForRebalanceNode.BubbleUpDepthChange(); + nodeToReplaceWith.BubbleUpDepthChange(); + + break; + } + + while (RebalanceForRemoval(testForRebalanceNode, side) != null) + ; + + //TestBalance(this.root); + } + + private Node RebalanceForRemoval(Node removedParentNode, Side side) + { + if (removedParentNode == null) + return null; + + path.Clear(); + path.Add(side); + + // find first unbalanced node or exit when found the root node (root still can be unbalanced!) + var current = removedParentNode; + while (!current.IsRoot && Math.Abs(current.BalanceFactor) <= 1) + { + if (current.Parent.Left == current) + path.Add(Side.Left); + else + path.Add(Side.Right); + + current = current.Parent; + } + + // it's a balanced tree + if (Math.Abs(current.BalanceFactor) <= 1) + return null; + + // from what direction we came from + Side fromDirection = path[path.Count - 1]; + + // check weather it's an inside or outside case + switch (fromDirection) + { + case Side.Right: + { + bool isOutside = current.Left.LeftDepth >= current.Left.RightDepth; + if (isOutside) + { + RotateRight(current) + .BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + else + { + var current_left = current.Left; + RotateLeft(current.Left); + RotateRight(current); + + current_left.BubbleUpDepthChange(); + current.BubbleUpDepthChange(); + } + } + break; + + case Side.Left: + { + bool isOutside = current.Right.RightDepth >= current.Right.LeftDepth; + if (isOutside) + { + // Example: Removing node 14 result in a disbalance in node 20 + // + // 20 + // 15 25 + // (14) 22 26 + // 27 + + var current_right = current.Right; // node 25 + RotateLeft(current); + // After RotateLeft(current: node 20): + // 25 + // 20 26 + // 15 22 27 + + current.BubbleUpDepthChange(); // node 20 + current_right.BubbleUpDepthChange(); // node 25 + } + else + { + // Example: Removing node 14 results in a disbalance in node 20. + // + // 20 + // 15 25 + // (14) 22 26 + // 23 + + var current_right = current.Right; + + RotateRight(current.Right); + // After RotateRight(current.Right: node 22): + // 20 + // 15 22 + // 25 + // 23 26 + + RotateLeft(current); + // After RotateLeft(current: node 20): + // 22 + // 20 25 + // 15 23 26 + + current.BubbleUpDepthChange(); + current_right.BubbleUpDepthChange(); + } + } + break; + } + + return current; + } + + private Node FindMin(Node node) + { + var current = node; + + while (current.Left != null) + current = current.Left; + + return current; + } + + private Node FindMax(Node node) + { + var current = node; + while (current.Right != null) + current = current.Right; + + return current; + } + + public List Find(Key key) { + if (this.RootNode == null) + return null; + + var current = this.RootNode; + do + { + int comp = this.Comparer.Compare(current.Key, key); + + // equals + if (comp == 0) + return current.ToList(); + + // current's key > key + if (comp > 0) + { + if (current.Left == null) + return null; + else + { + current = current.Left; + continue; + } + } + + // current's key < key + if (comp < 0) + { + if (current.Right == null) + return null; + else + { + current = current.Right; + continue; + } + } + } while (true); + } + + public IEnumerable WalkHorizontal() + { + if (this.RootNode == null) + yield break; + + Queue> toWalk = new Queue>(); + + toWalk.Enqueue(this.RootNode); + + while (toWalk.Count > 0) + { + var current = toWalk.Dequeue(); + + if (current.Left != null) + toWalk.Enqueue(current.Left); + if (current.Right != null) + toWalk.Enqueue(current.Right); + + for (int i = 0; i < current.Count; i++) + yield return current[i]; + } + } + + public bool ContainsKey(Key key) + { + if (this.RootNode == null) + return false; + + var current = this.RootNode; + do + { + int comp = this.Comparer.Compare(current.Key, key); + + // equals + if (comp == 0) + return true; + + // current's key > key + if (comp > 0) + { + if (current.Left == null) + return false; + else + { + current = current.Left; + continue; + } + } + + // current's key < key + if (comp < 0) + { + if (current.Right == null) + return false; + else + { + current = current.Right; + continue; + } + } + } while (true); + } + + private Node RotateRight(Node current) + { + // Current\ + // 20 15 + // 15 10 20 + // 10 ? ? + var parent = current.Parent; + var leftChild = current.Left; + + // re-parent left child + if (parent != null) + { + if (parent.Left == current) + parent.Left = leftChild; + else + parent.Right = leftChild; + } + else + this.RootNode = leftChild; + leftChild.Parent = parent; + + // re-parent left child's right child + if (leftChild.Right != null) + leftChild.Right.Parent = current; + current.Left = leftChild.Right; + + // re-parent current + current.Parent = leftChild; + leftChild.Right = current; + + // return with the node that took the place of current + return leftChild; + } + + private Node RotateLeft(Node current) + { + // /Current + // 20 15 + // 15 20 10 + // ? 10 ? + var parent = current.Parent; + var rightChild = current.Right; + + // re-parent right child + if (parent != null) + { + if (parent.Left == current) + parent.Left = rightChild; + else + parent.Right = rightChild; + } + else + this.RootNode = rightChild; + rightChild.Parent = parent; + + // re-parent right child's left child + if (rightChild.Left != null) + rightChild.Left.Parent = current; + current.Right = rightChild.Left; + + // re-parent current + current.Parent = rightChild; + rightChild.Left = current; + + return rightChild; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs.meta new file mode 100644 index 00000000..48a8ffab --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7cc4a6484b91bfd489fab519ef4f61eb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/AVLTree.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers.meta new file mode 100644 index 00000000..a07e856a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 1cefb9c5ecaff6a44b77039a56050aac +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs new file mode 100644 index 00000000..0ccf9247 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs @@ -0,0 +1,24 @@ +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class ByteArrayComparer : IComparer + { + public int Compare(byte[] x, byte[] y) + { + int result = x.Length.CompareTo(y.Length); + if (result != 0) + return result; + + for (int i = 0; i < x.Length; ++i) + { + result = x[i].CompareTo(y[i]); + + if (result != 0) + return result; + } + + return 0; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs.meta new file mode 100644 index 00000000..a935efed --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e92d1b70cb4146d47b88bfb3f43c49f8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/ByteArrayComparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs new file mode 100644 index 00000000..27e6ae5f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs @@ -0,0 +1,13 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class DateTimeComparer : IComparer + { + public int Compare(DateTime x, DateTime y) + { + return x.CompareTo(y); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs.meta new file mode 100644 index 00000000..517ef65f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4c788ada3967bfe4dac4ce9e7522dc8c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/DateTimeComparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs new file mode 100644 index 00000000..92d15092 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs @@ -0,0 +1,13 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class Hash128Comparer : IComparer + { + public int Compare(UnityEngine.Hash128 x, UnityEngine.Hash128 y) + { + return x.CompareTo(y); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs.meta new file mode 100644 index 00000000..cef15f60 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0d8da4c912810a742a1af50bb90fb26e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/Hash128Comparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs new file mode 100644 index 00000000..63b6f4cc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs @@ -0,0 +1,12 @@ +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class StringComparer : IComparer + { + public int Compare(string x, string y) + { + return x.CompareTo(y); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs.meta new file mode 100644 index 00000000..8827d6fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c484a2e93b3a84746939c4d2d5cdf8d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/StringComparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs new file mode 100644 index 00000000..7bffc623 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs @@ -0,0 +1,13 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class UInt16Comparer : IComparer + { + public int Compare(ushort x, ushort y) + { + return x.CompareTo(y); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs.meta new file mode 100644 index 00000000..1f744fef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bedd5a1e08a99404fbc747e79b92f17c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt16Comparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs new file mode 100644 index 00000000..0e6d4842 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs @@ -0,0 +1,13 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.Indexing.Comparers +{ + public sealed class UInt32Comparer : IComparer + { + public int Compare(UInt32 x, UInt32 y) + { + return x.CompareTo(y); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs.meta new file mode 100644 index 00000000..c79a586d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7b03ac89356268b40b90d8a46678c699 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Indexing/Comparers/UInt32Comparer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs new file mode 100644 index 00000000..74472d30 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs @@ -0,0 +1,28 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases +{ + public abstract class IndexingService where MetadataType : Metadata + { + /// + /// Index newly added metadata + /// + public virtual void Index(MetadataType metadata) { } + + /// + /// Remove metadata from all indexes. + /// + public virtual void Remove(MetadataType metadata) { } + + /// + /// Clear all indexes + /// + public virtual void Clear() { } + + /// + /// Get indexes in an optimized order. This is usually one of the indexes' WalkHorizontal() call. + /// + public virtual IEnumerable GetOptimizedIndexes() => null; + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs.meta new file mode 100644 index 00000000..662e43aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 161054408a1ecbe4383c76ea478332ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/IndexingService.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs new file mode 100644 index 00000000..ae26ec28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs @@ -0,0 +1,42 @@ +using System; +using System.IO; + +using Best.HTTP.Shared.Databases.Utils; + +namespace Best.HTTP.Shared.Databases +{ + public abstract class Metadata + { + public int Index; + public int FilePosition; + public int Length; + + public bool IsDeleted => this.FilePosition == -1 && this.Length == -1; + + public void MarkForDelete() + { + this.FilePosition = -1; + this.Length = -1; + } + + public virtual void SaveTo(Stream stream) + { + if (this.IsDeleted) + throw new Exception($"Trying to save a deleted metadata({this.ToString()})!"); + + stream.EncodeUnsignedVariableByteInteger((uint)this.FilePosition); + stream.EncodeUnsignedVariableByteInteger((uint)this.Length); + } + + public virtual void LoadFrom(Stream stream) + { + this.FilePosition = (int)stream.DecodeUnsignedVariableByteInteger(); + this.Length = (int)stream.DecodeUnsignedVariableByteInteger(); + } + + public override string ToString() + { + return $"[Metadata Idx: {Index}, Pos: {FilePosition}, Length: {Length}, IsDeleted: {IsDeleted}]"; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs.meta new file mode 100644 index 00000000..2a527b3f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dc2cf4b60fcca484e9aafe612ba9ac51 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Metadata.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders.meta new file mode 100644 index 00000000..e7abe9b2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0bb24b6286ceff24abd558107641cd8b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs new file mode 100644 index 00000000..79f69fd6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs @@ -0,0 +1,13 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.MetadataIndexFinders +{ + public sealed class DefaultEmptyMetadataIndexFinder : IEmptyMetadataIndexFinder where MetadataType : Metadata + { + public int FindFreeIndex(List metadatas) + { + return metadatas.Count; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs.meta new file mode 100644 index 00000000..6b359432 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e3a9d8df83b70404782d3d67884dc1a9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/DefaultEmptyMetadataIndexFinder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs new file mode 100644 index 00000000..a1bfcb55 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs @@ -0,0 +1,17 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.MetadataIndexFinders +{ + public sealed class FindDeletedMetadataIndexFinder : IEmptyMetadataIndexFinder where MetadataType : Metadata + { + public int FindFreeIndex(List metadatas) + { + for (int i = 0; i < metadatas.Count; ++i) + if (metadatas[i].IsDeleted) + return i; + + return metadatas.Count; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs.meta new file mode 100644 index 00000000..e341a885 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8a63cdf33c00b6443bcbd6aa81aa6562 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/FindDeletedMetadataIndexFinder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs new file mode 100644 index 00000000..5d53b3b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs @@ -0,0 +1,10 @@ +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Databases.MetadataIndexFinders +{ + public interface IEmptyMetadataIndexFinder where MetadataType : Metadata + { + int FindFreeIndex(List metadatas); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs.meta new file mode 100644 index 00000000..9d3ed218 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e825306d81906834b84135765d5c3174 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataIndexFinders/IEmptyMetadataIndexFinder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs new file mode 100644 index 00000000..b0318fc8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs @@ -0,0 +1,152 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.Databases.MetadataIndexFinders; + +namespace Best.HTTP.Shared.Databases +{ + public struct MetadataStats + { + public int min; + public int max; + public int count; + public int sum; + } + + public abstract class MetadataService where MetadataType : Metadata, new() + { + public List Metadatas { get; protected set; } + public IndexingService IndexingService { get; protected set; } + public IEmptyMetadataIndexFinder EmptyMetadataIndexFinder { get; protected set; } + + protected MetadataService(IndexingService indexingService, IEmptyMetadataIndexFinder emptyMetadataIndexFinder) + { + this.IndexingService = indexingService; + this.EmptyMetadataIndexFinder = emptyMetadataIndexFinder; + + this.Metadatas = new List(); + } + + /// + /// Called when metadata loaded from file + /// + public virtual MetadataType CreateFrom(Stream stream) + { + var metadata = new MetadataType(); + + metadata.Index = this.Metadatas.Count; + metadata.LoadFrom(stream); + + this.Metadatas.Add(metadata); + + this.IndexingService.Index(metadata); + + return metadata; + } + + /// + /// Called by a concrete MetadataService implementation to create a new metadata + /// + protected MetadataType CreateDefault(ContentType content, int filePos, int length, Action setupCallback) + { + var metadata = new MetadataType(); + metadata.FilePosition = filePos; + metadata.Length = length; + + metadata.Index = this.EmptyMetadataIndexFinder.FindFreeIndex(this.Metadatas); + + if (setupCallback != null) + setupCallback(content, metadata); + + if (metadata.Index == this.Metadatas.Count) + this.Metadatas.Add(metadata); + else + this.Metadatas[metadata.Index] = metadata; + + this.IndexingService.Index(metadata); + + return metadata; + } + + public void Remove(MetadataType metadata) + { + this.IndexingService.Remove(metadata); + + // Mark metadata for deletion. Next time we save, it's not going to written out to disk. + metadata.MarkForDelete(); + } + + public void SaveTo(Stream stream) + { + stream.SetLength(0); + + var optimizedIndexes = this.IndexingService.GetOptimizedIndexes(); + + if (optimizedIndexes != null) + { + foreach (var index in optimizedIndexes) + { + var metadata = this.Metadatas[index]; + + if (metadata.IsDeleted) + continue; + + metadata.SaveTo(stream); + } + } + else + { + for (int i = 0; i < this.Metadatas.Count; ++i) + { + var metadata = this.Metadatas[i]; + + if (metadata.IsDeleted) + continue; + + metadata.SaveTo(stream); + } + } + } + + public void LoadFrom(Stream stream) + { + while (stream.Position < stream.Length) + CreateFrom(stream); + } + + public virtual void Clear() + { + this.Metadatas.Clear(); + this.IndexingService.Clear(); + } + + public MetadataStats GetStats() + { + int min = int.MaxValue; + int max = 0; + int sum = 0; + int count = 0; + foreach (var metadata in this.Metadatas) + { + if (metadata.IsDeleted) + continue; + + if (metadata.Length > max) + max = metadata.Length; + if (metadata.Length < min) + min = metadata.Length; + sum += metadata.Length; + count++; + } + + return new MetadataStats + { + count = count, + min = min, + max = max, + sum = sum + }; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs.meta new file mode 100644 index 00000000..bdfb44e8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 36cd9f102ecc80746bc7ff850f782e32 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/MetadataService.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils.meta new file mode 100644 index 00000000..e73d30d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ea59aadbd0882aa46a9b5c86d137d70a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs new file mode 100644 index 00000000..2a4b5310 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs @@ -0,0 +1,133 @@ +using System; +using System.IO; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.Databases.Utils +{ + public static class StreamUtil + { + public static void WriteLengthPrefixedString(this Stream stream, string str) + { + if (str != null) + { + var byteCount = Encoding.UTF8.GetByteCount(str); + + if (byteCount >= 1 << 16) + throw new ArgumentException($"byteCount({byteCount})"); + + stream.EncodeUnsignedVariableByteInteger((ulong)byteCount); + + byte[] tmp = BufferPool.Get(byteCount, true); + + Encoding.UTF8.GetBytes(str, 0, str.Length, tmp, 0); + stream.Write(tmp, 0, byteCount); + + BufferPool.Release(tmp); + } + else + { + stream.WriteByte(0); + } + } + + public static string ReadLengthPrefixedString(this Stream stream) + { + int strLength = (int)stream.DecodeUnsignedVariableByteInteger(); + string result = null; + + if (strLength != 0) + { + byte[] buffer = BufferPool.Get(strLength, true); + + stream.Read(buffer, 0, strLength); + result = System.Text.Encoding.UTF8.GetString(buffer, 0, strLength); + + BufferPool.Release(buffer); + } + + return result; + } + + public static void EncodeUnsignedVariableByteInteger(this Stream encodeTo, ulong value) + { + if (value < 0) + throw new NotSupportedException($"Can't encode negative value({value:N0})!"); + + byte encodedByte; + do + { + encodedByte = (byte)(value % 128); + value /= 128; + // if there are more data to encode, set the top bit of this byte + if (value > 0) + encodedByte = (byte)(encodedByte | 128); + + encodeTo.WriteByte(encodedByte); + } + while (value > 0); + } + + public static ulong DecodeUnsignedVariableByteInteger(this Stream decodeFrom) + { + ulong multiplier = 1; + ulong value = 0; + byte encodedByte = 0; + do + { + encodedByte = (byte)decodeFrom.ReadByte(); + value += (ulong)((ulong)(encodedByte & 127) * multiplier); + multiplier *= 128; + } while ((encodedByte & 128) != 0); + + return value; + } + + public static void EncodeSignedVariableByteInteger(this Stream encodeTo, long value) + { + bool more = true; + + while (more) + { + byte chunk = (byte)(value & 0x7fL); // extract a 7-bit chunk + value >>= 7; + + bool signBitSet = (chunk & 0x40) != 0; // sign bit is the msb of a 7-bit byte, so 0x40 + more = !((value == 0 && !signBitSet) || (value == -1 && signBitSet)); + if (more) { chunk |= 0x80; } // set msb marker that more bytes are coming + + encodeTo.WriteByte(chunk); + }; + } + + public static long DecodeSignedVariableByteInteger(this Stream stream) + { + long value = 0; + int shift = 0; + bool more = true; + bool signBitSet = false; + + while (more) + { + var next = stream.ReadByte(); + if (next < 0) + throw new InvalidOperationException("Unexpected end of stream"); + + byte b = (byte)next; + + more = (b & 0x80) != 0; // extract msb + signBitSet = (b & 0x40) != 0; // sign bit is the msb of a 7-bit byte, so 0x40 + + long chunk = b & 0x7fL; // extract lower 7 bits + value |= chunk << shift; + shift += 7; + }; + + // extend the sign of shorter negative numbers + if (shift < (sizeof(long) * 8) && signBitSet) { value |= -1L << shift; } + + return value; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs.meta new file mode 100644 index 00000000..5403bf8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 031b34e0ebacb3649a074863a87dd5ed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Database/Utils/StreamUtil.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions.meta new file mode 100644 index 00000000..0b0be29e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: b8a2c2eff9e98f84cb925568bfb30c8c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs new file mode 100644 index 00000000..c0e323a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs @@ -0,0 +1,76 @@ +using System; + +namespace Best.HTTP.Shared.Extensions +{ + public sealed class CircularBuffer + { + public int Capacity { get; private set; } + public int Count { get; private set; } + public int StartIdx { get { return this.startIdx; } } + public int EndIdx { get { return this.endIdx; } } + + public T this[int idx] + { + get + { + int realIdx = (this.startIdx + idx) % this.Capacity; + + return this.buffer[realIdx]; + } + + set + { + int realIdx = (this.startIdx + idx) % this.Capacity; + + this.buffer[realIdx] = value; + } + } + + private T[] buffer; + private int startIdx; + private int endIdx; + + public CircularBuffer(int capacity) + { + this.Capacity = capacity; + } + + public void Add(T element) + { + if (this.buffer == null) + this.buffer = new T[this.Capacity]; + + this.buffer[this.endIdx] = element; + + this.endIdx = (this.endIdx + 1) % this.Capacity; + if (this.endIdx == this.startIdx) + this.startIdx = (this.startIdx + 1) % this.Capacity; + + this.Count = Math.Min(this.Count + 1, this.Capacity); + } + + public void Clear() + { + this.Count = this.startIdx = this.endIdx = 0; + } + + public override string ToString() + { + var sb = PlatformSupport.Text.StringBuilderPool.Get(2); + sb.Append("["); + + int idx = this.startIdx; + while (idx != this.endIdx) + { + sb.Append(this.buffer[idx].ToString()); + + idx = (idx + 1) % this.Capacity; + if (idx != this.endIdx) + sb.Append("; "); + } + sb.Append("]"); + + return sb.ToString(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs.meta new file mode 100644 index 00000000..7f8672b4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d7e67aa2e8ef9344cb04e85bfff0aed5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/CircularBuffer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs new file mode 100644 index 00000000..46999735 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs @@ -0,0 +1,593 @@ +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Text; +using Best.HTTP.Shared.Streams; + +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using static Best.HTTP.Hosts.Connections.HTTP1.Constants; + +using Cryptography = System.Security.Cryptography; + +namespace Best.HTTP.Shared.Extensions +{ + public static class Extensions + { + #region ASCII Encoding (These are required because Windows Phone doesn't supports the Encoding.ASCII class.) + + /// + /// On WP8 platform there are no ASCII encoding. + /// + public static string AsciiToString(this byte[] bytes) + { + StringBuilder sb = StringBuilderPool.Get(bytes.Length); //new StringBuilder(bytes.Length); + foreach (byte b in bytes) + sb.Append(b <= 0x7f ? (char)b : '?'); + return StringBuilderPool.ReleaseAndGrab(sb); + } + + /// + /// On WP8 platform there are no ASCII encoding. + /// + public static BufferSegment GetASCIIBytes(this string str) + { + byte[] result = BufferPool.Get(str.Length, true); + for (int i = 0; i < str.Length; ++i) + { + char ch = str[i]; + result[i] = (byte)((ch < (char)0x80) ? ch : '?'); + } + + return new BufferSegment(result, 0, str.Length); + } + + public static void SendAsASCII(this BinaryWriter stream, string str) + { + for (int i = 0; i < str.Length; ++i) + { + char ch = str[i]; + + stream.Write((byte)((ch < (char)0x80) ? ch : '?')); + } + } + + #endregion + + #region Headers + + public static Dictionary> AddHeader(this Dictionary> headers, string name, string value) + { + if (headers == null) + headers = new Dictionary>(StringComparer.OrdinalIgnoreCase); + + List values; + if (!headers.TryGetValue(name, out values)) + headers.Add(name, values = new List(1)); + + values.Add(value); + + return headers; + } + + public static Dictionary> SetHeader(this Dictionary> headers, string name, string value) + { + if (headers == null) + headers = new Dictionary>(StringComparer.OrdinalIgnoreCase); + + List values; + if (!headers.TryGetValue(name, out values)) + headers.Add(name, values = new List(1)); + + values.Clear(); + values.Add(value); + + return headers; + } + + public static bool RemoveHeader(this Dictionary> headers, string name) => headers != null && headers.Remove(name); + + public static void RemoveHeaders(this Dictionary> headers) => headers?.Clear(); + + public static List GetHeaderValues(this Dictionary> headers, string name) + { + if (headers == null) + return null; + + List values; + if (!headers.TryGetValue(name, out values) || values.Count == 0) + return null; + + return values; + } + + public static string GetFirstHeaderValue(this Dictionary> headers, string name) + { + if (headers == null) + return null; + + List values; + if (!headers.TryGetValue(name, out values) || values.Count == 0) + return null; + + return values[0]; + } + + public static bool HasHeaderWithValue(this Dictionary> headers, string headerName, string value) + { + var values = headers.GetHeaderValues(headerName); + if (values == null) + return false; + + for (int i = 0; i < values.Count; ++i) + if (string.Compare(values[i], value, StringComparison.OrdinalIgnoreCase) == 0) + return true; + + return false; + } + + public static bool HasHeader(this Dictionary> headers, string headerName) + => headers != null && headers.ContainsKey(headerName); + + #endregion + + #region FileSystem WriteLine function support + + public static void WriteString(this Stream fs, string value) + { + int count = System.Text.Encoding.UTF8.GetByteCount(value); + var buffer = BufferPool.Get(count, true); + try + { + System.Text.Encoding.UTF8.GetBytes(value, 0, value.Length, buffer, 0); + fs.Write(buffer, 0, count); + } + finally + { + BufferPool.Release(buffer); + } + } + + public static void WriteLine(this Stream fs) + { + fs.Write(EOL, 0, 2); + } + + public static void WriteLine(this Stream fs, string line) + { + var buff = line.GetASCIIBytes(); + try + { + fs.Write(buff.Data, buff.Offset, buff.Count); + fs.WriteLine(); + } + finally + { + BufferPool.Release(buff); + } + } + + public static void WriteLine(this Stream fs, string format, params object[] values) + { + var buff = string.Format(format, values).GetASCIIBytes(); + try + { + fs.Write(buff.Data, buff.Offset, buff.Count); + fs.WriteLine(); + } + finally + { + BufferPool.Release(buff); + } + } + + #endregion + + #region Other Extensions + + public static AutoReleaseBuffer AsAutoRelease(this byte[] buffer) => new AutoReleaseBuffer(buffer); + + public static BufferSegment AsBuffer(this byte[] bytes) + { + return new BufferSegment(bytes, 0, bytes.Length); + } + + public static BufferSegment AsBuffer(this byte[] bytes, int length) + { + return new BufferSegment(bytes, 0, length); + } + + public static BufferSegment AsBuffer(this byte[] bytes, int offset, int length) + { + return new BufferSegment(bytes, offset, length); + } + + public static BufferSegment CopyAsBuffer(this byte[] bytes, int offset, int length) + { + var newBuff = BufferPool.Get(length, true); + + Array.Copy(bytes, offset, newBuff, 0, length); + + return newBuff.AsBuffer(0, length); + } + + public static string GetRequestPathAndQueryURL(this Uri uri) + { + string requestPathAndQuery = uri.GetComponents(UriComponents.PathAndQuery, UriFormat.UriEscaped); + + // http://forum.unity3d.com/threads/best-http-released.200006/page-26#post-2723250 + if (string.IsNullOrEmpty(requestPathAndQuery)) + requestPathAndQuery = "/"; + + return requestPathAndQuery; + } + + public static string[] FindOption(this string str, string option) + { + //s-maxage=2678400, must-revalidate, max-age=0 + string[] options = str.ToLowerInvariant().Split(new char[] { ',' }, StringSplitOptions.RemoveEmptyEntries); + option = option.ToLowerInvariant(); + + for (int i = 0; i < options.Length; ++i) + if (options[i].Contains(option)) + return options[i].Split(new char[] { '=' }, StringSplitOptions.RemoveEmptyEntries); + + return null; + } + + public static string[] FindOption(this string[] options, string option) + { + for (int i = 0; i < options.Length; ++i) + if (options[i].Contains(option)) + return options[i].Split(new char[] { '=' }, StringSplitOptions.RemoveEmptyEntries); + + return null; + } + + public static void WriteArray(this Stream stream, byte[] array) + { + stream.Write(array, 0, array.Length); + } + + public static void WriteBufferSegment(this Stream stream, BufferSegment buffer) + { + stream.Write(buffer.Data, buffer.Offset, buffer.Count); + } + + /// + /// Returns true if the Uri's host is a valid IPv4 or IPv6 address. + /// + public static bool IsHostIsAnIPAddress(this Uri uri) + { + if (uri == null) + return false; + + return IsIpV4AddressValid(uri.Host) || IsIpV6AddressValid(uri.Host); + } + + // Original idea from: https://www.code4copy.com/csharp/c-validate-ip-address-string/ + // Working regex: https://www.regular-expressions.info/ip.html + private static readonly System.Text.RegularExpressions.Regex validIpV4AddressRegex = new System.Text.RegularExpressions.Regex("\\b(?:\\d{1,3}\\.){3}\\d{1,3}\\b", System.Text.RegularExpressions.RegexOptions.IgnoreCase); + + /// + /// Validates an IPv4 address. + /// + public static bool IsIpV4AddressValid(string address) + { + if (!string.IsNullOrEmpty(address)) + return validIpV4AddressRegex.IsMatch(address.Trim()); + + return false; + } + + /// + /// Validates an IPv6 address. + /// + public static bool IsIpV6AddressValid(string address) + { + if (!string.IsNullOrEmpty(address)) + { + System.Net.IPAddress ip; + if (System.Net.IPAddress.TryParse(address, out ip)) + return ip.AddressFamily == System.Net.Sockets.AddressFamily.InterNetworkV6; + } + + return false; + } + + #endregion + + #region String Conversions + + public static int ToInt32(this string str, int defaultValue = default(int)) => int.TryParse(str, out var value) ? value : defaultValue; + public static uint ToUInt32(this string str, uint defaultValue = default) => uint.TryParse(str, out var value) ? value : defaultValue; + + public static long ToInt64(this string str, long defaultValue = default(long)) => long.TryParse(str, out var value) ? value : defaultValue; + + public static ulong ToUInt64(this string str, ulong defaultValue = default(ulong)) => ulong.TryParse(str, out var value) ? value : defaultValue; + + public static DateTime ToDateTime(this string str, DateTime defaultValue = default(DateTime)) + { + if (str == null) + return defaultValue; + + if (DateTime.TryParse(str, System.Globalization.CultureInfo.InvariantCulture, System.Globalization.DateTimeStyles.None, out var value)) + return value; + + return defaultValue; + } + + public static string ToStrOrEmpty(this string str) + { + if (str == null) + return String.Empty; + + return str; + } + + public static string ToStr(this string str, string defaultVale) + { + if (str == null) + return defaultVale; + + return str; + } + + public static string ToBinaryStr(this byte value) + { + return Convert.ToString(value, 2).PadLeft(8, '0'); + } + + #endregion + + #region MD5 Hashing + + public static string CalculateMD5Hash(this string input) + { + var asciiBuff = input.GetASCIIBytes(); + var hash = asciiBuff.CalculateMD5Hash(); + BufferPool.Release(asciiBuff); + return hash; + } + + public static string CalculateMD5Hash(this BufferSegment input) + { + using (var md5 = Cryptography.MD5.Create()) + { + var hash = md5.ComputeHash(input.Data, input.Offset, input.Count); + var sb = StringBuilderPool.Get(hash.Length); //new StringBuilder(hash.Length); + for (int i = 0; i < hash.Length; ++i) + sb.Append(hash[i].ToString("x2")); + BufferPool.Release(hash); + return StringBuilderPool.ReleaseAndGrab(sb); + } + } + + #endregion + + #region Efficient String Parsing Helpers + + internal static string Read(this string str, ref int pos, char block, bool needResult = true) + { + return str.Read(ref pos, (ch) => ch != block, needResult); + } + + internal static string Read(this string str, ref int pos, Func block, bool needResult = true) + { + if (pos >= str.Length) + return string.Empty; + + str.SkipWhiteSpace(ref pos); + + int startPos = pos; + + while (pos < str.Length && block(str[pos])) + pos++; + + string result = needResult ? str.Substring(startPos, pos - startPos) : null; + + // set position to the next char + pos++; + + return result; + } + + internal static string ReadPossibleQuotedText(this string str, ref int pos) + { + string result = string.Empty; + if (str == null) + return result; + + // It's a quoted text? + if (str[pos] == '\"') + { + // Skip the starting quote + str.Read(ref pos, '\"', false); + + // Read the text until the ending quote + result = str.Read(ref pos, '\"'); + + // Next option + str.Read(ref pos, (ch) => ch != ',' && ch != ';', false); + } + else + // It's not a quoted text, so we will read until the next option + result = str.Read(ref pos, (ch) => ch != ',' && ch != ';'); + + return result; + } + + internal static void SkipWhiteSpace(this string str, ref int pos) + { + if (pos >= str.Length) + return; + + while (pos < str.Length && char.IsWhiteSpace(str[pos])) + pos++; + } + + internal static string TrimAndLower(this string str) + { + if (str == null) + return null; + + char[] buffer = new char[str.Length]; + int length = 0; + + for (int i = 0; i < str.Length; ++i) + { + char ch = str[i]; + if (!char.IsWhiteSpace(ch) && !char.IsControl(ch)) + buffer[length++] = char.ToLowerInvariant(ch); + } + + return new string(buffer, 0, length); + } + + internal static char? Peek(this string str, int pos) + { + if (pos < 0 || pos >= str.Length) + return null; + + return str[pos]; + } + + #endregion + + #region Specialized String Parsers + + //public, max-age=2592000 + internal static List ParseOptionalHeader(this string str) + { + List result = new List(); + + if (str == null) + return result; + + int idx = 0; + + // process the rest of the text + while (idx < str.Length) + { + // Read key + string key = str.Read(ref idx, (ch) => ch != '=' && ch != ',').TrimAndLower(); + HeaderValue qp = new HeaderValue(key); + + if (str[idx - 1] == '=') + qp.Value = str.ReadPossibleQuotedText(ref idx); + + result.Add(qp); + } + + return result; + } + + //deflate, gzip, x-gzip, identity, *;q=0 + internal static List ParseQualityParams(this string str) + { + List result = new List(); + + if (str == null) + return result; + + int idx = 0; + while (idx < str.Length) + { + string key = str.Read(ref idx, (ch) => ch != ',' && ch != ';').TrimAndLower(); + + HeaderValue qp = new HeaderValue(key); + + if (str[idx - 1] == ';') + { + str.Read(ref idx, '=', false); + qp.Value = str.Read(ref idx, ','); + } + + result.Add(qp); + } + + return result; + } + + #endregion + + #region Buffer Filling + + /// + /// Will fill the entire buffer from the stream. Will throw an exception when the underlying stream is closed. + /// + public static void ReadBuffer(this Stream stream, byte[] buffer) + { + int count = 0; + + do + { + int read = stream.Read(buffer, count, buffer.Length - count); + + if (read <= 0) + throw ExceptionHelper.ServerClosedTCPStream(); + + count += read; + } while (count < buffer.Length); + } + + public static void ReadBuffer(this Stream stream, byte[] buffer, int length) + { + int count = 0; + + do + { + int read = stream.Read(buffer, count, length - count); + + if (read <= 0) + throw ExceptionHelper.ServerClosedTCPStream(); + + count += read; + } while (count < length); + } + + #endregion + + #region BufferPoolMemoryStream + + public static void WriteString(this BufferPoolMemoryStream ms, string str) + { + var byteCount = Encoding.UTF8.GetByteCount(str); + byte[] buffer = BufferPool.Get(byteCount, true); + Encoding.UTF8.GetBytes(str, 0, str.Length, buffer, 0); + ms.Write(buffer, 0, byteCount); + BufferPool.Release(buffer); + } + + public static void WriteLine(this BufferPoolMemoryStream ms) + { + ms.Write(EOL, 0, EOL.Length); + } + + public static void WriteLine(this BufferPoolMemoryStream ms, string str) + { + ms.WriteString(str); + ms.Write(EOL, 0, EOL.Length); + } + + #endregion + +#if NET_STANDARD_2_0 || NET_4_6 + public static void Clear(this System.Collections.Concurrent.ConcurrentQueue queue) + { + T result; + while (queue.TryDequeue(out result)) + ; + } +#endif + } + + public static class ExceptionHelper + { + public static Exception ServerClosedTCPStream() + { + return new Exception("TCP Stream closed unexpectedly by the remote server"); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs.meta new file mode 100644 index 00000000..b17baae6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d1436ef67cdb4ca409385774293711b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Extensions.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs new file mode 100644 index 00000000..a11998e7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs @@ -0,0 +1,399 @@ +// Based on https://github.com/nickgravelyn/UnityToolbag/blob/master/Future/Future.cs +/* + * The MIT License (MIT) + +Copyright (c) 2017, Nick Gravelyn + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + * */ + +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Futures +{ + /// + /// Describes the state of a future. + /// + public enum FutureState + { + /// + /// The future hasn't begun to resolve a value. + /// + Pending, + + /// + /// The future is working on resolving a value. + /// + Processing, + + /// + /// The future has a value ready. + /// + Success, + + /// + /// The future failed to resolve a value. + /// + Error + } + + /// + /// Defines the interface of an object that can be used to track a future value. + /// + /// The type of object being retrieved. + public interface IFuture + { + /// + /// Gets the state of the future. + /// + FutureState state { get; } + + /// + /// Gets the value if the State is Success. + /// + T value { get; } + + /// + /// Gets the failure exception if the State is Error. + /// + Exception error { get; } + + /// + /// Adds a new callback to invoke when an intermediate result is known. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + IFuture OnItem(FutureValueCallback callback); + + /// + /// Adds a new callback to invoke if the future value is retrieved successfully. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + IFuture OnSuccess(FutureValueCallback callback); + + /// + /// Adds a new callback to invoke if the future has an error. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + IFuture OnError(FutureErrorCallback callback); + + /// + /// Adds a new callback to invoke if the future value is retrieved successfully or has an error. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + IFuture OnComplete(FutureCallback callback); + } + + /// + /// Defines the signature for callbacks used by the future. + /// + /// The future. + public delegate void FutureCallback(IFuture future); + + public delegate void FutureValueCallback(T value); + public delegate void FutureErrorCallback(Exception error); + + /// + /// An implementation of that can be used internally by methods that return futures. + /// + /// + /// Methods should always return the interface when calling code requests a future. + /// This class is intended to be constructed internally in the method to provide a simple implementation of + /// the interface. By returning the interface instead of the class it ensures the implementation can change + /// later on if requirements change, without affecting the calling code. + /// + /// The type of object being retrieved. + public class Future : IFuture + { + private volatile FutureState _state; + private T _value; + private Exception _error; + private Func _processFunc; + + private readonly List> _itemCallbacks = new List>(); + private readonly List> _successCallbacks = new List>(); + private readonly List _errorCallbacks = new List(); + private readonly List> _complationCallbacks = new List>(); + + /// + /// Gets the state of the future. + /// + public FutureState state { get { return _state; } } + + /// + /// Gets the value if the State is Success. + /// + public T value + { + get + { + if (_state != FutureState.Success && _state != FutureState.Processing) + { + throw new InvalidOperationException("value is not available unless state is Success or Processing."); + } + + return _value; + } + } + + /// + /// Gets the failure exception if the State is Error. + /// + public Exception error + { + get + { + if (_state != FutureState.Error) + { + throw new InvalidOperationException("error is not available unless state is Error."); + } + + return _error; + } + } + + /// + /// Initializes a new instance of the class. + /// + public Future() + { + _state = FutureState.Pending; + } + + public IFuture OnItem(FutureValueCallback callback) + { + if (_state < FutureState.Success && !_itemCallbacks.Contains(callback)) + _itemCallbacks.Add(callback); + + return this; + } + + /// + /// Adds a new callback to invoke if the future value is retrieved successfully. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + public IFuture OnSuccess(FutureValueCallback callback) + { + if (_state == FutureState.Success) + { + callback(this.value); + } + else if (_state != FutureState.Error && !_successCallbacks.Contains(callback)) + { + _successCallbacks.Add(callback); + } + + return this; + } + + /// + /// Adds a new callback to invoke if the future has an error. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + public IFuture OnError(FutureErrorCallback callback) + { + if (_state == FutureState.Error) + { + callback(this.error); + } + else if (_state != FutureState.Success && !_errorCallbacks.Contains(callback)) + { + _errorCallbacks.Add(callback); + } + + return this; + } + + /// + /// Adds a new callback to invoke if the future value is retrieved successfully or has an error. + /// + /// The callback to invoke. + /// The future so additional calls can be chained together. + public IFuture OnComplete(FutureCallback callback) + { + if (_state == FutureState.Success || _state == FutureState.Error) + { + callback(this); + } + else + { + if (!_complationCallbacks.Contains(callback)) + _complationCallbacks.Add(callback); + } + + return this; + } + +#pragma warning disable 1998 + + /// + /// Begins running a given function on a background thread to resolve the future's value, as long + /// as it is still in the Pending state. + /// + /// The function that will retrieve the desired value. + public IFuture Process(Func func) + { + if (_state != FutureState.Pending) + { + throw new InvalidOperationException("Cannot process a future that isn't in the Pending state."); + } + + BeginProcess(); + _processFunc = func; + + System.Threading.ThreadPool.QueueUserWorkItem(ThreadFunc); + + return this; + } + + private void ThreadFunc(object param) + { + try + { + // Directly call the Impl version to avoid the state validation of the public method + AssignImpl(_processFunc()); + } + catch (Exception e) + { + // Directly call the Impl version to avoid the state validation of the public method + FailImpl(e); + } + finally + { + _processFunc = null; + } + } + +#pragma warning restore 1998 + + /// + /// Allows manually assigning a value to a future, as long as it is still in the pending state. + /// + /// + /// There are times where you may not need to do background processing for a value. For example, + /// you may have a cache of values and can just hand one out. In those cases you still want to + /// return a future for the method signature, but can just call this method to fill in the future. + /// + /// The value to assign the future. + public void Assign(T value) + { + if (_state != FutureState.Pending && _state != FutureState.Processing) + { + throw new InvalidOperationException("Cannot assign a value to a future that isn't in the Pending or Processing state."); + } + + AssignImpl(value); + } + + public void BeginProcess(T initialItem = default(T)) + { + _state = FutureState.Processing; + _value = initialItem; + } + + public void AssignItem(T value) + { + _value = value; + _error = null; + + foreach (var callback in _itemCallbacks) + callback(this.value); + } + + public void Finish() + { + _state = FutureState.Success; + + FlushSuccessCallbacks(); + } + + /// + /// Allows manually failing a future, as long as it is still in the pending state. + /// + /// + /// As with the Assign method, there are times where you may know a future value is a failure without + /// doing any background work. In those cases you can simply fail the future manually and return it. + /// + /// The exception to use to fail the future. + public void Fail(Exception error) + { + if (_state != FutureState.Pending && _state != FutureState.Processing) + { + throw new InvalidOperationException("Cannot fail future that isn't in the Pending or Processing state."); + } + + FailImpl(error); + } + + private void AssignImpl(T value) + { + _value = value; + _error = null; + _state = FutureState.Success; + + FlushSuccessCallbacks(); + } + + private void FailImpl(Exception error) + { + _value = default(T); + _error = error; + _state = FutureState.Error; + + FlushErrorCallbacks(); + } + + private void FlushSuccessCallbacks() + { + foreach (var callback in _successCallbacks) + callback(this.value); + + FlushComplationCallbacks(); + } + + private void FlushErrorCallbacks() + { + foreach (var callback in _errorCallbacks) + callback(this.error); + + FlushComplationCallbacks(); + } + + private void FlushComplationCallbacks() + { + foreach (var callback in _complationCallbacks) + callback(this); + ClearCallbacks(); + } + + private void ClearCallbacks() + { + _itemCallbacks.Clear(); + _successCallbacks.Clear(); + _errorCallbacks.Clear(); + _complationCallbacks.Clear(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs.meta new file mode 100644 index 00000000..68a93d70 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 356c46c35b6c6df45abc494c61a7039a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Future.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs new file mode 100644 index 00000000..7e94fdd2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs @@ -0,0 +1,40 @@ +using System.Collections.Generic; + +namespace Best.HTTP.Shared.Extensions +{ + /// + /// Will parse a comma-separeted header value + /// + public sealed class HeaderParser : KeyValuePairList + { + public HeaderParser(string headerStr) + { + base.Values = Parse(headerStr); + } + + private List Parse(string headerStr) + { + List result = new List(); + + int pos = 0; + + try + { + while (pos < headerStr.Length) + { + HeaderValue current = new HeaderValue(); + + current.Parse(headerStr, ref pos); + + result.Add(current); + } + } + catch(System.Exception ex) + { + HTTPManager.Logger.Exception("HeaderParser - Parse", headerStr, ex); + } + + return result; + } + } +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs.meta new file mode 100644 index 00000000..8e9895e1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 35bb5ccf89a1dc545a7be69cc867d08d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderParser.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs new file mode 100644 index 00000000..b8a87e3a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs @@ -0,0 +1,133 @@ +using System; +using System.Collections.Generic; +using System.Linq; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Shared.Extensions +{ + /// + /// Used in string parsers. Its Value is optional. + /// + public sealed class HeaderValue + { + #region Public Properties + + public string Key { get; set; } + public string Value { get; set; } + public List Options { get; set; } + + public bool HasValue { get { return !string.IsNullOrEmpty(this.Value); } } + + #endregion + + #region Constructors + + public HeaderValue() + { } + + public HeaderValue(string key) + { + this.Key = key; + } + + #endregion + + #region Public Helper Functions + + public void Parse(string headerStr, ref int pos) + { + ParseImplementation(headerStr, ref pos, true); + } + + public bool TryGetOption(string key, out HeaderValue option) + { + option = null; + + if (Options == null || Options.Count == 0) + return false; + + for (int i = 0; i < Options.Count; ++i) + if (String.Equals(Options[i].Key, key, StringComparison.OrdinalIgnoreCase)) + { + option = Options[i]; + return true; + } + + return false; + } + + #endregion + + #region Private Helper Functions + + private void ParseImplementation(string headerStr, ref int pos, bool isOptionIsAnOption) + { + // According to https://tools.ietf.org/html/rfc7234#section-5.2.1.1 + // Max-Age has a form "max-age=5", but some (imgur.com specifically) sends it as "max-age:5" + string key = headerStr.Read(ref pos, (ch) => ch != ';' && ch != '=' && ch != ':' && ch != ',', true); + this.Key = key; + + char? skippedChar = headerStr.Peek(pos - 1); + bool isValue = skippedChar == '=' || skippedChar == ':'; + bool isOption = isOptionIsAnOption && skippedChar == ';'; + + while ((skippedChar != null && isValue || isOption) && pos < headerStr.Length) + { + + if (isValue) + { + string value = headerStr.ReadPossibleQuotedText(ref pos); + this.Value = value; + } + else if (isOption) + { + HeaderValue option = new HeaderValue(); + option.ParseImplementation(headerStr, ref pos, false); + + if (this.Options == null) + this.Options = new List(); + + this.Options.Add(option); + } + + if (!isOptionIsAnOption) + return; + + skippedChar = headerStr.Peek(pos - 1); + isValue = skippedChar == '='; + isOption = isOptionIsAnOption && skippedChar == ';'; + } + } + + #endregion + + #region Overrides + + public override string ToString() + { + if (this.Options != null && this.Options.Count > 0) + { + StringBuilder sb = StringBuilderPool.Get(4); //new StringBuilder(4); + sb.Append(Key); + sb.Append("="); + sb.Append(Value); + + foreach(var option in Options) + { + sb.Append(";"); + sb.Append(option.ToString()); + } + + return StringBuilderPool.ReleaseAndGrab(sb); + } + else if (!string.IsNullOrEmpty(Value)) + return Key + '=' + Value; + else + return Key; + } + + #endregion + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs.meta new file mode 100644 index 00000000..dbdf4717 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 01b6bb7a29a6e7447baf8768ab665143 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeaderValue.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs new file mode 100644 index 00000000..b9e5569d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs @@ -0,0 +1,124 @@ +using Best.HTTP.Shared.Logger; + +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Threading; + +namespace Best.HTTP.Shared.Extensions +{ + public sealed class RunOnceOnMainThread : IHeartbeat + { + private Action _action; + private int _subscribed; + private LoggingContext _context; + + public RunOnceOnMainThread(Action action, LoggingContext context) + { + this._action = action; + this._context = context; + } + + public void Subscribe() + { + if (Interlocked.CompareExchange(ref this._subscribed, 1, 0) == 0) + HTTPManager.Heartbeats.Subscribe(this); + } + + public void OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + try + { + this._action?.Invoke(); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(RunOnceOnMainThread.OnHeartbeatUpdate), $"{nameof(_action)}", ex, this._context); + } + finally + { + HTTPManager.Heartbeats.Unsubscribe(this); + } + } + } + + public interface IHeartbeat + { + void OnHeartbeatUpdate(DateTime utcNow, TimeSpan dif); + } + + enum HeartbeatUpdateEventType + { + Subscribe, + Unsubscribe, + Clear + } + + struct HeartbeatUpdateEvent + { + public HeartbeatUpdateEventType Event; + public IHeartbeat Heartbeat; + } + + /// + /// A manager class that can handle subscribing and unsubscribeing in the same update. + /// + public sealed class HeartbeatManager + { + private List _heartbeats = new List(); + private DateTime _lastUpdate = DateTime.MinValue; + + private ConcurrentQueue _updates = new(); + + public void Subscribe(IHeartbeat heartbeat) + { + this._updates.Enqueue(new HeartbeatUpdateEvent { Event = HeartbeatUpdateEventType.Subscribe, Heartbeat = heartbeat }); + } + + public void Unsubscribe(IHeartbeat heartbeat) + { + this._updates.Enqueue(new HeartbeatUpdateEvent { Event = HeartbeatUpdateEventType.Unsubscribe, Heartbeat = heartbeat }); + } + + public void Update() + { + var now = HTTPManager.CurrentFrameDateTime; + + if (_lastUpdate == DateTime.MinValue) + _lastUpdate = now; + else + { + TimeSpan dif = now - _lastUpdate; + _lastUpdate = now; + + while (this._updates.TryDequeue(out var updateEvent)) + { + switch (updateEvent.Event) + { + case HeartbeatUpdateEventType.Subscribe: this._heartbeats.Add(updateEvent.Heartbeat); break; + case HeartbeatUpdateEventType.Unsubscribe: this._heartbeats.Remove(updateEvent.Heartbeat); break; + case HeartbeatUpdateEventType.Clear: this._heartbeats.Clear(); break; + } + } + + for (int i = 0; i < this._heartbeats.Count; ++i) + { + var heartbeat = this._heartbeats[i]; + try + { + heartbeat.OnHeartbeatUpdate(now, dif); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("HeartbeatManager", heartbeat.GetType().Name, ex, null); + } + } + } + } + + public void Clear() + { + this._updates.Enqueue(new HeartbeatUpdateEvent { Event = HeartbeatUpdateEventType.Clear, Heartbeat = null }); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs.meta new file mode 100644 index 00000000..d3f3b1f2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 169261907c72c004eae68f0a8ae6a8a8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/HeartbeatManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs new file mode 100644 index 00000000..aca77d27 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs @@ -0,0 +1,27 @@ +using System; +using System.Collections.Generic; +using System.Linq; +using System.Text; + +namespace Best.HTTP.Shared.Extensions +{ + /// + /// Base class for specialized parsers + /// + public class KeyValuePairList + { + public List Values { get; protected set; } + + public bool TryGet(string valueKeyName, out HeaderValue @param) + { + @param = null; + for (int i = 0; i < Values.Count; ++i) + if (string.CompareOrdinal(Values[i].Key, valueKeyName) == 0) + { + @param = Values[i]; + return true; + } + return false; + } + } +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs.meta new file mode 100644 index 00000000..81405d05 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4ccc301b8038cb64b9e489bafa17d2bc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/KeyValuePairList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs new file mode 100644 index 00000000..a3eadbb6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs @@ -0,0 +1,116 @@ +using System; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.Shared; +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Shared.Extensions +{ + public readonly struct TimerData + { + public readonly DateTime Created; + public readonly TimeSpan Interval; + public readonly object Context; + + public readonly Func OnTimer; + + public bool IsOnTime(DateTime now) + { + return now >= this.Created + this.Interval; + } + + public TimerData(TimeSpan interval, object context, Func onTimer) + { + this.Created = DateTime.UtcNow; + this.Interval = interval; + this.Context = context; + this.OnTimer = onTimer; + } + + /// + /// Create a new TimerData but the Created field will be set to the current time. + /// + public TimerData CreateNew() + { + return new TimerData(this.Interval, this.Context, this.OnTimer); + } + + public override string ToString() + { + return string.Format("[TimerData Created: {0}, Interval: {1}, IsOnTime: {2}]", this.Created.ToString(System.Globalization.CultureInfo.InvariantCulture), this.Interval, this.IsOnTime(DateTime.UtcNow)); + } + } + + public static class Timer + { + private static List _timers = new List(1); + private static ReaderWriterLockSlim _lock = new ReaderWriterLockSlim(); + + private static int _isSubscribed; + +#if UNITY_EDITOR + [UnityEngine.RuntimeInitializeOnLoadMethod(UnityEngine.RuntimeInitializeLoadType.SubsystemRegistration)] + public static void ResetSetup() + { + HTTPManager.Logger.Information(nameof(Timer), "Reset called!"); + Interlocked.Exchange(ref _isSubscribed, 0); + } +#endif + + public static void Add(TimerData timer) + { + using (var _ = new WriteLock(_lock)) + _timers.Add(timer); + + if (Interlocked.CompareExchange(ref _isSubscribed, 1, 0) == 0) + { + HTTPManager.Logger.Information(nameof(Timer), "Subscribing timer to heartbeats!"); + HTTPManager.Heartbeats.Subscribe(new TimerImplementation()); + } + } + + private sealed class TimerImplementation : IHeartbeat + { + public void OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + using var __ = new Unity.Profiling.ProfilerMarker(nameof(Timer)).Auto(); + + using (var _ = new WriteLock(_lock)) + { + if (_timers.Count == 0) + { + HTTPManager.Heartbeats.Unsubscribe(this); + + Interlocked.Exchange(ref _isSubscribed, 0); + + HTTPManager.Logger.Information(nameof(Timer), "Unsubscribing timer from heartbeats!"); + return; + } + + for (int i = 0; i < _timers.Count; ++i) + { + TimerData timer = _timers[i]; + + if (timer.IsOnTime(now)) + { + try + { + bool repeat = timer.OnTimer(now, timer.Context); + + if (repeat) + _timers[i] = timer.CreateNew(); + else + _timers.RemoveAt(i--); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(Timer), "OnTimer", ex); + } + } + } + } + } + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs.meta new file mode 100644 index 00000000..63d76830 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 70785d1a06f961348acdef24b845ba0c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Extensions/Timer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs new file mode 100644 index 00000000..75700cd3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs @@ -0,0 +1,389 @@ +using Best.HTTP.Caching; +using Best.HTTP.Cookies; +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Hosts.Settings; +using Best.HTTP.HostSetting; +using Best.HTTP.Request.Authentication; +using Best.HTTP.Request.Timings; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Text; +using Best.HTTP.Shared.PlatformSupport.Threading; +using System; +using System.IO; + +namespace Best.HTTP.Shared +{ + public enum ShutdownTypes + { + Running, + Gentle, + Immediate + } + + public delegate void OnSetupFinishedDelegate(); + + /// + /// Global entry point to access and manage main services of the plugin. + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public static partial class HTTPManager + { + /// + /// Static constructor. Setup default values. + /// + static HTTPManager() + { + PerHostSettings.Add("*", new HostSettings()); + + // Set the default logger mechanism + logger = new Best.HTTP.Shared.Logger.ThreadedLogger(); + + IOService = new Best.HTTP.Shared.PlatformSupport.FileSystem.DefaultIOService(); + +#if !UNITY_WEBGL || UNITY_EDITOR + ProxyDetector = new HTTP.Proxies.Autodetect.ProxyDetector(); +#endif + + UserAgent = $"com.Tivadar.Best.HTTP v{typeof(HTTPManager)?.Assembly?.GetName()?.Version}/Unity {UnityEngine.Application.unityVersion}"; + } + + /// + /// Delegate for the setup finished event. + /// + public static OnSetupFinishedDelegate OnSetupFinished; + + /// + /// Instance of the per-host settings manager. + /// + public static HostSettingsManager PerHostSettings { get; private set; } = new HostSettingsManager(); + + /// + /// Cached DateTime value for cases where high resolution isn't needed. + /// + /// Warning!! It must be used only on the main update thread! + public static DateTime CurrentFrameDateTime { get; private set; } = DateTime.UtcNow; + + /// + /// By default the plugin will save all cache and cookie data under the path returned by Application.persistentDataPath. + /// You can assign a function to this delegate to return a custom root path to define a new path. + /// This delegate will be called on a non Unity thread! + /// + public static Func RootSaveFolderProvider { get; set; } + +#if !UNITY_WEBGL || UNITY_EDITOR + + public static HTTP.Proxies.Autodetect.ProxyDetector ProxyDetector { + get => _proxyDetector; + set { + _proxyDetector?.Detach(); + _proxyDetector = value; + } + } + private static HTTP.Proxies.Autodetect.ProxyDetector _proxyDetector; +#endif + + /// + /// The global, default proxy for all HTTPRequests. The HTTPRequest's Proxy still can be changed per-request. Default value is null. + /// + public static HTTP.Proxies.Proxy Proxy { get; set; } + + /// + /// Heartbeat manager to use less threads in the plugin. The heartbeat updates are called from the OnUpdate function. + /// + public static HeartbeatManager Heartbeats + { + get + { + if (heartbeats == null) + heartbeats = new HeartbeatManager(); + return heartbeats; + } + } + private static HeartbeatManager heartbeats; + + /// + /// A basic Best.HTTP.Logger.ILogger implementation to be able to log intelligently additional informations about the plugin's internal mechanism. + /// + public static Best.HTTP.Shared.Logger.ILogger Logger + { + get + { + // Make sure that it has a valid logger instance. + if (logger == null) + { + logger = new ThreadedLogger(); + logger.Level = Loglevels.None; + } + + return logger; + } + + set { logger = value; } + } + private static Best.HTTP.Shared.Logger.ILogger logger; + + /// + /// An IIOService implementation to handle filesystem operations. + /// + public static Best.HTTP.Shared.PlatformSupport.FileSystem.IIOService IOService; + + /// + /// User-agent string that will be sent with each requests. + /// + public static string UserAgent; + + /// + /// It's true if the application is quitting and the plugin is shutting down itself. + /// + public static bool IsQuitting { get { return _isQuitting; } private set { _isQuitting = value; } } + private static volatile bool _isQuitting; + + public static string RootFolderName = "com.Tivadar.Best.HTTP.v3"; + + /// + /// The local content cache, maintained by the plugin. When set to a non-null value, Maintain called immediately on the cache. + /// + public static HTTPCache LocalCache + { + get => _httpCache; + set + { + _httpCache?.Dispose(); + (_httpCache = value)?.Maintain(contentLength: 0, deleteLockedEntries: true, context: null); + } + } + private static HTTPCache _httpCache; + + private static bool IsSetupCalled; + + /// + /// Initializes the HTTPManager with default settings. This method should be called on Unity's main thread before using the HTTP plugin. By default it gets called by . + /// + public static void Setup() + { + if (IsSetupCalled) + return; + IsSetupCalled = true; + IsQuitting = false; + + HTTPManager.Logger.Information("HTTPManager", "Setup called! UserAgent: " + UserAgent); + + HTTPUpdateDelegator.CheckInstance(); + + if (LocalCache == null) + { + // this will trigger a maintain call too. + LocalCache = new HTTPCache(new HTTPCacheOptions()); + } + + CookieJar.SetupFolder(); + CookieJar.Load(); + + try + { + OnSetupFinished?.Invoke(); + } + catch(Exception ex) + { + HTTPManager.logger.Exception(nameof(HTTPManager), "OnSetupFinished", ex, null); + } + } + + internal static HTTPRequest SendRequest(HTTPRequest request) + { + if (!IsSetupCalled) + Setup(); + + if (request.IsCancellationRequested || IsQuitting) + return request; + + if (!request.DownloadSettings.DisableCache) + { +#if !UNITY_WEBGL || UNITY_EDITOR + ThreadedRunner.RunShortLiving((request) => + { +#endif + var hash = HTTPCache.CalculateHash(request.MethodType, request.CurrentUri); + if (LocalCache.CanServeWithoutValidation(hash, ErrorTypeForValidation.None, request.Context)) + LocalCache.Redirect(request, hash); + + //RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(request, HTTPRequestStates.Queued, null)); + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(request, RequestEvents.QueuedResend)); +#if !UNITY_WEBGL || UNITY_EDITOR + }, request); +#endif + } + else + { + //RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(request, HTTPRequestStates.Queued, null)); + RequestEventHelper.EnqueueRequestEvent(new RequestEventInfo(request, RequestEvents.QueuedResend)); + } + + return request; + } + + /// + /// Will return where the various caches should be saved. + /// + public static string GetRootSaveFolder() + { + try + { + if (RootSaveFolderProvider != null) + return Path.Combine(RootSaveFolderProvider(), RootFolderName); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPManager), nameof(GetRootSaveFolder), ex); + } + +#if UNITY_SWITCH && !UNITY_EDITOR + throw new NotSupportedException(UnityEngine.Application.platform.ToString()); +#else + return Path.Combine(UnityEngine.Application.persistentDataPath, RootFolderName); +#endif + } + +#if UNITY_EDITOR + [UnityEngine.RuntimeInitializeOnLoadMethod(UnityEngine.RuntimeInitializeLoadType.SubsystemRegistration)] + public static void ResetSetup() + { + IsSetupCalled = false; + Profiler.Network.NetworkStatsCollector.ResetNetworkStats(); +#if !UNITY_WEBGL || UNITY_EDITOR + PlatformSupport.Network.DNS.Cache.DNSCache.Clear(); +#endif + DigestStore.Clear(); + PerHostSettings.Clear(); + PerHostSettings.Add("*", new HostSettings()); + + HostManager.Clear(); + RequestEventHelper.Clear(); + + LocalCache = null; + + HTTPManager.Logger.Information("HTTPManager", "Reset called!"); + } +#endif + + /// + /// Updates the HTTPManager. This method should be called regularly from a Unity event (e.g., Update, LateUpdate). + /// It processes various events and callbacks and manages internal tasks. + /// + public static void OnUpdate() + { + try + { + CurrentFrameDateTime = DateTime.UtcNow; + + using (new Unity.Profiling.ProfilerMarker(nameof(RequestEventHelper)).Auto()) + RequestEventHelper.ProcessQueue(); + + using (new Unity.Profiling.ProfilerMarker(nameof(ConnectionEventHelper)).Auto()) + ConnectionEventHelper.ProcessQueue(); + + if (heartbeats != null) + { + using (new Unity.Profiling.ProfilerMarker(nameof(HeartbeatManager)).Auto()) + heartbeats.Update(); + } + + using (new Unity.Profiling.ProfilerMarker(nameof(BufferPool)).Auto()) + BufferPool.Maintain(); + + using (new Unity.Profiling.ProfilerMarker(nameof(StringBuilderPool)).Auto()) + StringBuilderPool.Maintain(); + +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER + using (new Unity.Profiling.ProfilerMarker("Profile").Auto()) + { + // Sent + { + long newNetworkBytesSent = Profiler.Network.NetworkStatsCollector.TotalNetworkBytesSent; + var diff = newNetworkBytesSent - _lastNetworkBytesSent; + _lastNetworkBytesSent = newNetworkBytesSent; + + Profiler.Network.NetworkStats.SentSinceLastFrame.Value = diff; + Profiler.Network.NetworkStats.SentTotal.Value = newNetworkBytesSent; + + Profiler.Network.NetworkStats.BufferedToSend.Value = Profiler.Network.NetworkStatsCollector.BufferedToSend; + } + + // Received + { + long newNetworkBytesReceived = Profiler.Network.NetworkStatsCollector.TotalNetworkBytesReceived; + var diff = newNetworkBytesReceived - _lastNetworkBytesReceived; + _lastNetworkBytesReceived = newNetworkBytesReceived; + + Profiler.Network.NetworkStats.ReceivedSinceLastFrame.Value = diff; + Profiler.Network.NetworkStats.ReceivedTotal.Value = newNetworkBytesReceived; + + Profiler.Network.NetworkStats.ReceivedAndUnprocessed.Value = Profiler.Network.NetworkStatsCollector.ReceivedAndUnprocessed; + } + + // Open/Total connections + Profiler.Network.NetworkStats.OpenConnectionsCounter.Value = Profiler.Network.NetworkStatsCollector.OpenConnections; + Profiler.Network.NetworkStats.TotalConnectionsCounter.Value = Profiler.Network.NetworkStatsCollector.TotalConnections; + + // Memory stats + BufferPool.GetStatistics(ref bufferPoolStats); + Profiler.Memory.MemoryStats.Borrowed.Value = bufferPoolStats.Borrowed; + Profiler.Memory.MemoryStats.Pooled.Value = bufferPoolStats.PoolSize; + Profiler.Memory.MemoryStats.CacheHits.Value = bufferPoolStats.GetBuffers; + Profiler.Memory.MemoryStats.ArrayAllocations.Value = bufferPoolStats.ArrayAllocations; + } +#endif + } + catch (Exception ex) + { + HTTPManager.logger.Exception(nameof(HTTPManager), nameof(OnUpdate), ex); + } + } + +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER + private static long _lastNetworkBytesSent = 0; + private static long _lastNetworkBytesReceived = 0; + + private static BufferPoolStats bufferPoolStats = default; +#endif + + /// + /// Shuts down the HTTPManager and performs cleanup operations. This method should be called when the application is quitting. + /// + public static void OnQuit() + { + HTTPManager.Logger.Information("HTTPManager", "OnQuit called!"); + + IsQuitting = true; + + AbortAll(); + + CookieJar.Persist(); + + OnUpdate(); + + HostManager.Clear(); + + Heartbeats.Clear(); + + DigestStore.Clear(); + } + + /// + /// Aborts all ongoing HTTP requests and performs an immediate shutdown of the HTTPManager. + /// + public static void AbortAll() + { + HTTPManager.Logger.Information("HTTPManager", "AbortAll called!"); + + // This is an immediate shutdown request! + + RequestEventHelper.Clear(); + ConnectionEventHelper.Clear(); + + HostManager.Shutdown(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs.meta new file mode 100644 index 00000000..5cca67c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8302c34d0db94b447a0969d738d37543 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/HTTPManager.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs new file mode 100644 index 00000000..6c84ca43 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs @@ -0,0 +1,351 @@ +using Best.HTTP.Shared.PlatformSupport.Threading; + +using System.Threading; + +using UnityEngine; + +namespace Best.HTTP.Shared +{ + /// + /// Threading mode the plugin will use to call HTTPManager.OnUpdate(). + /// + public enum ThreadingMode : int + { + /// + /// HTTPManager.OnUpdate() is called from the HTTPUpdateDelegator's Update functions (Unity's main thread). + /// + UnityUpdate, + + /// + /// The plugin starts a dedicated thread to call HTTPManager.OnUpdate() periodically. + /// + Threaded, + + /// + /// HTTPManager.OnUpdate() will not be called automatically. + /// + None + } + + /// + /// Will route some U3D calls to the HTTPManager. + /// + [ExecuteInEditMode] + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class HTTPUpdateDelegator : MonoBehaviour + { + #region Public Properties + + /// + /// The singleton instance of the HTTPUpdateDelegator + /// + public static HTTPUpdateDelegator Instance { get { return CheckInstance(); } } + private volatile static HTTPUpdateDelegator instance; + + /// + /// True, if the Instance property should hold a valid value. + /// + public static bool IsCreated { get; private set; } + + /// + /// It's true if the dispatch thread running. + /// + public static bool IsThreadRunning { get; private set; } + + /// + /// The current threading mode the plugin is in. + /// + public ThreadingMode CurrentThreadingMode { get { return _currentThreadingMode; } set { SetThreadingMode(value); } } + private ThreadingMode _currentThreadingMode = ThreadingMode.UnityUpdate; + + /// + /// How much time the plugin should wait between two update call. Its default value 100 ms. + /// + public static int ThreadFrequencyInMS { get; set; } + + /// + /// Called in the OnApplicationQuit function. If this function returns False, the plugin will not start to + /// shut down itself. + /// + public static System.Func OnBeforeApplicationQuit; + + /// + /// Called when the Unity application's foreground state changed. + /// + public static System.Action OnApplicationForegroundStateChanged; + + public int MainThreadId { get => this.mainThreadId; } + + #endregion + + private static bool isSetupCalled; + private int isHTTPManagerOnUpdateRunning; + private AutoResetEvent pingEvent = new AutoResetEvent(false); + private int updateThreadCount = 0; + private int mainThreadId; + +#if UNITY_EDITOR + /// + /// Called after scene loaded to support Configurable Enter Play Mode (https://docs.unity3d.com/2019.3/Documentation/Manual/ConfigurableEnterPlayMode.html) + /// + [RuntimeInitializeOnLoadMethod(RuntimeInitializeLoadType.SubsystemRegistration)] + static void ResetSetup() + { + isSetupCalled = false; + instance?.SetThreadingMode(ThreadingMode.UnityUpdate); + + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "Reset called!"); + } +#endif + + static HTTPUpdateDelegator() + { + ThreadFrequencyInMS = 100; + } + + /// + /// Will create the HTTPUpdateDelegator instance and set it up. + /// + public static HTTPUpdateDelegator CheckInstance() + { + try + { + if (!IsCreated) + { + GameObject go = GameObject.Find("HTTP Update Delegator"); + + if (go != null) + instance = go.GetComponent(); + + if (instance == null) + { + go = new GameObject("HTTP Update Delegator"); + go.hideFlags = HideFlags.HideAndDontSave; + + instance = go.AddComponent(); + } + IsCreated = true; + +#if UNITY_EDITOR + if (!UnityEditor.EditorApplication.isPlaying) + { + UnityEditor.EditorApplication.update -= instance.Update; + UnityEditor.EditorApplication.update += instance.Update; + } + + UnityEditor.EditorApplication.playModeStateChanged -= instance.OnPlayModeStateChanged; + UnityEditor.EditorApplication.playModeStateChanged += instance.OnPlayModeStateChanged; +#endif + + // https://docs.unity3d.com/ScriptReference/Application-wantsToQuit.html + Application.wantsToQuit -= UnityApplication_WantsToQuit; + Application.wantsToQuit += UnityApplication_WantsToQuit; + + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "Instance Created!"); + } + } + catch + { + HTTPManager.Logger.Error(nameof(HTTPUpdateDelegator), "Please call the Best.HTTPManager.Setup() from one of Unity's event(eg. awake, start) before you send any request!"); + } + + return instance; + } + + public void Setup() + { + if (isSetupCalled) + return; + + isSetupCalled = true; + + // Setup is expected to be called on the Unity main thread only. + mainThreadId = System.Threading.Thread.CurrentThread.ManagedThreadId; + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), $"Setup called Threading Mode: {this._currentThreadingMode}, MainThreadId: {this.mainThreadId}"); + + HTTPManager.Setup(); + + SetThreadingMode(this._currentThreadingMode); + + // Unity doesn't tolerate well if the DontDestroyOnLoad called when purely in editor mode. So, we will set the flag + // only when we are playing, or not in the editor. + if (!Application.isEditor || Application.isPlaying) + GameObject.DontDestroyOnLoad(this.gameObject); + + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "Setup done!"); + } + + /// + /// Return true if the call happens on the Unity main thread. Setup must be called before to save the thread id! + /// + public bool IsMainThread() => System.Threading.Thread.CurrentThread.ManagedThreadId == mainThreadId; + + /// + /// Set directly the threading mode to use. + /// + public void SetThreadingMode(ThreadingMode mode) + { + if (_currentThreadingMode == mode) + return; + + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), $"SetThreadingMode({mode}, {isSetupCalled})"); + + _currentThreadingMode = mode; + + if (!isSetupCalled) + Setup(); + + switch (_currentThreadingMode) + { + case ThreadingMode.UnityUpdate: + case ThreadingMode.None: + IsThreadRunning = false; + PingUpdateThread(); + break; + + case ThreadingMode.Threaded: +#if !UNITY_WEBGL || UNITY_EDITOR + ThreadedRunner.RunLongLiving(ThreadFunc); +#else + HTTPManager.Logger.Warning(nameof(HTTPUpdateDelegator), "Threading mode set to ThreadingMode.Threaded, but threads aren't supported under WebGL!"); +#endif + break; + } + } + + /// + /// Swaps threading mode between Unity's Update function or a distinct thread. + /// + public void SwapThreadingMode() => SetThreadingMode(_currentThreadingMode == ThreadingMode.Threaded ? ThreadingMode.UnityUpdate : ThreadingMode.Threaded); + + /// + /// Pings the update thread to call HTTPManager.OnUpdate immediately. + /// + /// Works only when the current threading mode is Threaded! + public void PingUpdateThread() => pingEvent.Set(); + + void ThreadFunc() + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "Update Thread Started"); + + ThreadedRunner.SetThreadName("Best.HTTP.Update Thread"); + + try + { + if (Interlocked.Increment(ref updateThreadCount) > 1) + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "An update thread already started."); + return; + } + + // Threading mode might be already changed, so set IsThreadRunning to IsThreaded's value. + IsThreadRunning = CurrentThreadingMode == ThreadingMode.Threaded; + while (IsThreadRunning) + { + CallOnUpdate(); + + pingEvent.WaitOne(ThreadFrequencyInMS); + } + } + finally + { + Interlocked.Decrement(ref updateThreadCount); + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "Update Thread Ended"); + } + } + + void Update() + { + if (!isSetupCalled) + Setup(); + + if (CurrentThreadingMode == ThreadingMode.UnityUpdate) + CallOnUpdate(); + } + + private void CallOnUpdate() + { + // Prevent overlapping call of OnUpdate from unity's main thread and a separate thread + if (Interlocked.CompareExchange(ref isHTTPManagerOnUpdateRunning, 1, 0) == 0) + { + try + { + HTTPManager.OnUpdate(); + } + finally + { + Interlocked.Exchange(ref isHTTPManagerOnUpdateRunning, 0); + } + } + } + +#if UNITY_EDITOR + void OnPlayModeStateChanged(UnityEditor.PlayModeStateChange playMode) + { + if (playMode == UnityEditor.PlayModeStateChange.EnteredPlayMode) + { + UnityEditor.EditorApplication.update -= Update; + } + else if (playMode == UnityEditor.PlayModeStateChange.EnteredEditMode) + { + UnityEditor.EditorApplication.update -= Update; + UnityEditor.EditorApplication.update += Update; + + HTTPUpdateDelegator.ResetSetup(); + HTTPManager.ResetSetup(); + } + } +#endif + + void OnDisable() + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "OnDisable Called!"); + +#if UNITY_EDITOR + if (UnityEditor.EditorApplication.isPlaying) +#endif + UnityApplication_WantsToQuit(); + } + + void OnApplicationPause(bool isPaused) + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "OnApplicationPause isPaused: " + isPaused); + + if (HTTPUpdateDelegator.OnApplicationForegroundStateChanged != null) + HTTPUpdateDelegator.OnApplicationForegroundStateChanged(isPaused); + } + + private static bool UnityApplication_WantsToQuit() + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "UnityApplication_WantsToQuit Called!"); + + if (OnBeforeApplicationQuit != null) + { + try + { + if (!OnBeforeApplicationQuit()) + { + HTTPManager.Logger.Information(nameof(HTTPUpdateDelegator), "OnBeforeApplicationQuit call returned false, postponing plugin and application shutdown."); + return false; + } + } + catch (System.Exception ex) + { + HTTPManager.Logger.Exception(nameof(HTTPUpdateDelegator), string.Empty, ex); + } + } + + IsThreadRunning = false; + Instance.PingUpdateThread(); + + if (!IsCreated) + return true; + + IsCreated = false; + + HTTPManager.OnQuit(); + + return true; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs.meta new file mode 100644 index 00000000..77a2c5d2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4cd5cef435d748c4d9b0f7b5cf16341b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/HTTPUpdateDelegator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger.meta new file mode 100644 index 00000000..a453fc21 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3516ff05842cc2b40a7fd4a79efc1fbd +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs new file mode 100644 index 00000000..433951ec --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs @@ -0,0 +1,77 @@ +using System; +using System.IO; + +using Best.HTTP.Shared.PlatformSupport.FileSystem; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.Logger +{ + /// + /// Provides an implementation of that writes log messages to a file. + /// + public sealed class FileOutput : ILogOutput + { + /// + /// Gets a value indicating whether this log output accepts color codes. Always returns false. + /// + public bool AcceptColor { get; } = false; + + private Stream fileStream; + + /// + /// Initializes a new instance of the FileOutput class with the specified file name. + /// + /// The name of the file to write log messages to. + public FileOutput(string fileName) + { + // Create a buffered stream for writing log messages to the specified file. + this.fileStream = new BufferedStream(HTTPManager.IOService.CreateFileStream(fileName, FileStreamModes.Create), 512 * 1024); + } + + /// + /// Writes a log message to the file. + /// + /// The log level of the message. + /// The log message to write. + public void Write(Loglevels level, string logEntry) + { + if (this.fileStream != null && !string.IsNullOrEmpty(logEntry)) + { + int count = System.Text.Encoding.UTF8.GetByteCount(logEntry) + 2; + var buffer = BufferPool.Get(count, true); + + try + { + System.Text.Encoding.UTF8.GetBytes(logEntry, 0, logEntry.Length, buffer, 0); + buffer[count - 2] = (byte)'\r'; + buffer[count - 1] = (byte)'\n'; + + this.fileStream.Write(buffer, 0, count); + } + finally + { + BufferPool.Release(buffer); + } + } + } + + /// + /// Flushes any buffered log messages to the file. + /// + public void Flush() => this.fileStream?.Flush(); + + /// + /// Releases any resources used by the FileOutput instance. + /// + public void Dispose() + { + if (this.fileStream != null) + { + this.fileStream.Close(); + this.fileStream = null; + } + + GC.SuppressFinalize(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs.meta new file mode 100644 index 00000000..ad66a882 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2ad11187a50e381439c128d7d791eb3a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Logger/FileOutput.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs new file mode 100644 index 00000000..48b79a2a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs @@ -0,0 +1,172 @@ +using System; + +namespace Best.HTTP.Shared.Logger +{ + [HideFromDocumentation] + public sealed class HideFromDocumentation : Attribute + { + + } + + /// + /// Available logging levels. + /// + public enum Loglevels : int + { + /// + /// All message will be logged. + /// + All, + + /// + /// Only Informations and above will be logged. + /// + Information, + + /// + /// Only Warnings and above will be logged. + /// + Warning, + + /// + /// Only Errors and above will be logged. + /// + Error, + + /// + /// Only Exceptions will be logged. + /// + Exception, + + /// + /// No logging will occur. + /// + None + } + + /// + /// Represents an output target for log messages. + /// + /// + /// + /// This interface defines methods for writing log messages to an output target. + /// Implementations of this interface are used to configure where log messages + /// should be written. + /// + /// + /// Two of its out-of-the-box implementations are + /// + /// UnityOutput + /// FileOutput + /// + /// + /// + public interface ILogOutput : IDisposable + { + /// + /// Gets a value indicating whether the log output supports colored text. + /// + bool AcceptColor { get; } + + /// + /// Writes a log entry to the output. + /// + /// The logging level of the entry. + /// The log message to write. + void Write(Loglevels level, string logEntry); + + /// + /// Flushes any buffered log entries to the output. + /// + void Flush(); + } + + /// + /// Represents a filter for further sort out what log entries to include in the final log output. + /// + public interface IFilter + { + /// + /// Return true if the division must be included in the output. + /// + bool Include(string division); + } + + /// + /// Represents a logger for recording log messages. + /// + public interface ILogger + { + /// + /// Gets or sets the minimum severity level for logging. + /// + Loglevels Level { get; set; } + + /// + /// Gets or sets the output target for log messages. + /// + /// + /// The instance used to write log messages. + /// + ILogOutput Output { get; set; } + + /// + /// Gets or sets an output filter to decide what messages are included or not. + /// + /// The instance used for filtering. + IFilter Filter { get; set; } + + /// + /// Property indicating whether the logger's internal queue is empty or not. + /// + bool IsEmpty { get; } + + /// + /// Gets a value indicating whether diagnostic logging is enabled. + /// + /// + /// Diagnostic logging is enabled when is set to . + /// + bool IsDiagnostic { get; } + + /// + /// Logs a message with level. + /// + /// The division or category of the log message. + /// The verbose log message. + /// The optional for additional context. + void Verbose(string division, string msg, LoggingContext context = null); + + /// + /// Logs a message with level. + /// + /// The division or category of the log message. + /// The verbose log message. + /// The optional for additional context. + void Information(string division, string msg, LoggingContext context = null); + + /// + /// Logs a message with level. + /// + /// The division or category of the log message. + /// The verbose log message. + /// The optional for additional context. + void Warning(string division, string msg, LoggingContext context = null); + + /// + /// Logs a message with level. + /// + /// The division or category of the log message. + /// The verbose log message. + /// The optional for additional context. + void Error(string division, string msg, LoggingContext context = null); + + /// + /// Logs a message with level. + /// + /// The division or category of the log message. + /// The verbose log message. + /// The optional for additional context. + void Exception(string division, string msg, Exception ex, LoggingContext context = null); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs.meta new file mode 100644 index 00000000..fd4bb63e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 81c5c1596e18e4d46beef29fa682d58d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Logger/ILogger.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs new file mode 100644 index 00000000..de193a66 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs @@ -0,0 +1,205 @@ +using System.Collections.Generic; +using System.Linq; + +namespace Best.HTTP.Shared.Logger +{ + /// + /// Represents a logging context for categorizing and organizing log messages. + /// + /// + /// The LoggingContext class is used to provide additional context information + /// to log messages, allowing for better categorization and organization of log output. It can be + /// associated with specific objects or situations to enrich log entries with context-specific data. + /// + public sealed class LoggingContext + { + /// + /// Gets the unique hash value of this logging context. + /// + public string Hash { get; private set; } + + private enum LoggingContextFieldType + { + Long, + Bool, + String, + AnotherContext + } + + private struct LoggingContextField + { + public string key; + public long longValue; + public bool boolValue; + public string stringValue; + public LoggingContext loggingContextValue; + public LoggingContextFieldType fieldType; + + public override string ToString() + { + object value = this.fieldType switch + { + LoggingContextFieldType.Bool => this.boolValue, + LoggingContextFieldType.Long => this.longValue, + LoggingContextFieldType.String => this.stringValue, + _ => this.loggingContextValue + }; + + return $"[{this.key} => '{value}']"; + } + } + + private List fields = new List(8); + + /// + /// Initializes a new instance of the LoggingContext class associated with the specified object. + /// + /// The object to associate the context with. + public LoggingContext(object boundto) + { + var name = boundto.GetType().Name; + Add("TypeName", name); + + UnityEngine.Hash128 hash = new UnityEngine.Hash128(); + hash.Append(name); + hash.Append(boundto.GetHashCode()); + hash.Append(this.GetHashCode()); + + this.Hash = hash.ToString(); + Add("Hash", this.Hash); + } + + /// + /// Adds a long value to the logging context. + /// + /// The key to associate with the value. + /// The long value to add. + public void Add(string key, long value) => Add(new LoggingContextField { fieldType = LoggingContextFieldType.Long, key = key, longValue = value }); + + /// + /// Adds a bool value to the logging context. + /// + /// The key to associate with the value. + /// The bool value to add. + public void Add(string key, bool value) => Add(new LoggingContextField { fieldType = LoggingContextFieldType.Bool, key = key, boolValue = value }); + + /// + /// Adds a string value to the logging context. + /// + /// The key to associate with the value. + /// The string value to add. + public void Add(string key, string value) => Add(new LoggingContextField { fieldType = LoggingContextFieldType.String, key = key, stringValue = value }); + + /// + /// Adds a LoggingContext value to the logging context. + /// + /// The key to associate with the value. + /// The LoggingContext value to add. + public void Add(string key, LoggingContext value) => Add(new LoggingContextField { fieldType = LoggingContextFieldType.AnotherContext, key = key, loggingContextValue = value }); + + private void Add(LoggingContextField field) + { + Remove(field.key); + this.fields.Add(field); + } + + /// + /// Gets the string field with the specified name from the logging context. + /// + /// The name of the string field to retrieve. + /// The value of the string field or null if not found. + public string GetStringField(string fieldName) => this.fields.FirstOrDefault(f => f.key == fieldName).stringValue; + + /// + /// Removes a field from the logging context by its key. + /// + /// The key of the field to remove. + public void Remove(string key) + { + for (int i = 0; i < this.fields.Count; i++) + { + var field = this.fields[i]; + + if (field.key.Equals(key, System.StringComparison.Ordinal)) + this.fields.RemoveAt(i--); + } + } + + /// + /// Converts the logging context and its associated fields to a JSON string representation. + /// + /// A instance to which the JSON string is appended. + /// + /// This method serializes the logging context and its associated fields into a JSON format + /// for structured logging purposes. The resulting JSON string represents the context and its fields, making it + /// suitable for inclusion in log entries for better analysis and debugging. + /// + public void ToJson(System.Text.StringBuilder sb) + { + if (this.fields == null || this.fields.Count == 0) + { + sb.Append("null"); + return; + } + + sb.Append("{"); + for (int i = 0; i < this.fields.Count; ++i) + { + var field = this.fields[i]; + + if (field.fieldType != LoggingContextFieldType.AnotherContext) + { + if (i > 0) + sb.Append(", "); + + sb.AppendFormat("\"{0}\": ", field.key); + } + + switch (field.fieldType) + { + case LoggingContextFieldType.Long: + sb.Append(field.longValue); + break; + case LoggingContextFieldType.Bool: + sb.Append(field.boolValue ? "true" : "false"); + break; + case LoggingContextFieldType.String: + sb.AppendFormat("\"{0}\"", Escape(field.stringValue)); + break; + } + } + + sb.Append("}"); + + for (int i = 0; i < this.fields.Count; ++i) + { + var field = this.fields[i]; + + if (field.loggingContextValue == null) + continue; + + switch (field.fieldType) + { + case LoggingContextFieldType.AnotherContext: + sb.Append(", "); + field.loggingContextValue.ToJson(sb); + break; + } + } + } + + public static string Escape(string original) + { + return Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool.ReleaseAndGrab(Best.HTTP.Shared.PlatformSupport.Text.StringBuilderPool.Get(1) + .Append(original) + .Replace("\\", "\\\\") + .Replace("\"", "\\\"") + .Replace("/", "\\/") + .Replace("\b", "\\b") + .Replace("\f", "\\f") + .Replace("\n", "\\n") + .Replace("\r", "\\r") + .Replace("\t", "\\t")); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs.meta new file mode 100644 index 00000000..6133acbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 32f8edc3b27d9d24384f41757f618d15 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Logger/LoggingContext.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs new file mode 100644 index 00000000..cc0c7908 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs @@ -0,0 +1,409 @@ +using System; +using System.Collections.Concurrent; +using System.Text; +using Best.HTTP.Shared.PlatformSupport.Text; +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Shared.Logger +{ + /// + /// implementation to include only one division in the log output. + /// + public sealed class SingleDivisionFilter : IFilter + { + private string _division; + + public SingleDivisionFilter(string division) => this._division = division; + + public bool Include(string division) => this._division.Equals(division, StringComparison.Ordinal); + } + + /// + /// implementation to allow filtering for multiple divisions. + /// + public sealed class MultiDivisionFilter : IFilter + { + private string[] _divisions; + + public MultiDivisionFilter(string[] divisions) + { + this._divisions = divisions; + for (int i = 0; i < this._divisions.Length; ++i) + this._divisions[i] = this._divisions[i].Trim(); + } + + public bool Include(string division) + { + for (int i = 0; i < this._divisions.Length; ++i) + { + ref var div = ref this._divisions[i]; + + if (div.Equals(division, StringComparison.Ordinal)) + return true; + } + + return false; + } + } + + public sealed class ThreadedLogger : Best.HTTP.Shared.Logger.ILogger, IDisposable + { + public Loglevels Level { get; set; } + + public bool IsDiagnostic { get => this.Level == Loglevels.All; } + + public ILogOutput Output { get { return this._output; } + set + { + if (this._output != value) + { + if (this._output != null) + this._output.Dispose(); + this._output = value; + } + } + } + private ILogOutput _output; + + public IFilter Filter { get; set; } + + public bool IsEmpty +#if !UNITY_WEBGL || UNITY_EDITOR + => this.jobs.IsEmpty; +#else + => true; +#endif + + public int InitialStringBufferCapacity = 256; + +#if !UNITY_WEBGL || UNITY_EDITOR + public TimeSpan ExitThreadAfterInactivity = TimeSpan.FromMinutes(1); + public int QueuedJobs { get => this.jobs.Count; } + + private ConcurrentQueue jobs = new ConcurrentQueue(); + private System.Threading.AutoResetEvent newJobEvent = new System.Threading.AutoResetEvent(false); + + private volatile int threadCreated; + + private volatile bool isDisposed; +#endif + + private StringBuilder sb = new StringBuilder(0); + + public ThreadedLogger() + { + this.Level = UnityEngine.Debug.isDebugBuild ? Loglevels.Warning : Loglevels.Error; + this.Output = new UnityOutput(); + } + + public void Verbose(string division, string msg, LoggingContext context) { + AddJob(Loglevels.All, division, msg, null, context); + } + + public void Information(string division, string msg, LoggingContext context) { + AddJob(Loglevels.Information, division, msg, null, context); + } + + public void Warning(string division, string msg, LoggingContext context) { + AddJob(Loglevels.Warning, division, msg, null, context); + } + + public void Error(string division, string msg, LoggingContext context) { + AddJob(Loglevels.Error, division, msg, null, context); + } + + public void Exception(string division, string msg, Exception ex, LoggingContext context) { + AddJob(Loglevels.Exception, division, msg, ex, context); + } + + private void AddJob(Loglevels level, string div, string msg, Exception ex, LoggingContext context) + { + if (this.Level > level) + return; + + var filter = this.Filter; + if (filter != null && !filter.Include(div)) + return; + + sb.EnsureCapacity(InitialStringBufferCapacity); + +#if !UNITY_WEBGL || UNITY_EDITOR + if (this.isDisposed) + return; +#endif + + string json = null; + if (context != null) + { + var jsonBuilder = StringBuilderPool.Get(1); + context.ToJson(jsonBuilder); + json = StringBuilderPool.ReleaseAndGrab(jsonBuilder); + } + + var job = new LogJob + { + level = level, + division = div, + msg = msg, + ex = ex, + time = DateTime.UtcNow, + threadId = System.Threading.Thread.CurrentThread.ManagedThreadId, + stackTrace = System.Environment.StackTrace, + context = json + }; + +#if !UNITY_WEBGL || UNITY_EDITOR + // Start the consumer thread before enqueuing to get up and running sooner + if (System.Threading.Interlocked.CompareExchange(ref this.threadCreated, 1, 0) == 0) + Best.HTTP.Shared.PlatformSupport.Threading.ThreadedRunner.RunLongLiving(ThreadFunc); + + this.jobs.Enqueue(job); + try + { + this.newJobEvent.Set(); + } + catch + { + try + { + this.Output.Write(job.level, job.ToJson(sb, this.Output.AcceptColor)); + } + catch + { } + return; + } + + // newJobEvent might timed out between the previous threadCreated check and newJobEvent.Set() calls closing the thread. + // So, here we check threadCreated again and create a new thread if needed. + if (System.Threading.Interlocked.CompareExchange(ref this.threadCreated, 1, 0) == 0) + Best.HTTP.Shared.PlatformSupport.Threading.ThreadedRunner.RunLongLiving(ThreadFunc); +#else + this.Output.Write(job.level, job.ToJson(sb, this.Output.AcceptColor)); +#endif + } + +#if !UNITY_WEBGL || UNITY_EDITOR + private void ThreadFunc() + { + ThreadedRunner.SetThreadName("Best.HTTP.Logger"); + try + { + LogJob job; + /* + LogJob job = new LogJob + { + level = Loglevels.Information, + division = "ThreadFunc", + msg = "Log thread starting!", + ex = null, + time = DateTime.UtcNow, + threadId = System.Threading.Thread.CurrentThread.ManagedThreadId, + stackTrace = null, + context1 = null, + context2 = null, + context3 = null + }; + + WriteJob(ref job); + */ + + do + { + // Waiting for a new log-job timed out + if (!this.newJobEvent.WaitOne(this.ExitThreadAfterInactivity)) + { + /* + job = new LogJob + { + level = Loglevels.Information, + division = "ThreadFunc", + msg = "Log thread quitting!", + ex = null, + time = DateTime.UtcNow, + threadId = System.Threading.Thread.CurrentThread.ManagedThreadId, + stackTrace = null, + context1 = null, + context2 = null, + context3 = null + }; + + WriteJob(ref job); + */ + + // clear StringBuilder's inner cache and exit the thread + sb.Length = 0; + sb.Capacity = 0; + System.Threading.Interlocked.Exchange(ref this.threadCreated, 0); + return; + } + + try + { + int count = 0; + while (this.jobs.TryDequeue(out job)) + { + WriteJob(ref job); + + if (++count >= 1000) + this.Output.Flush(); + } + } + finally + { + this.Output.Flush(); + } + + } while (!HTTPManager.IsQuitting); + System.Threading.Interlocked.Exchange(ref this.threadCreated, 0); + + // When HTTPManager.IsQuitting is true, there is still logging that will create a new thread after the last one quit + // and always writing a new entry about the exiting thread would be too much overhead. + // It would also hard to know what's the last log entry because some are generated on another thread non-deterministically. + + //var lastLog = new LogJob + //{ + // level = Loglevels.All, + // division = "ThreadedLogger", + // msg = "Log Processing Thread Quitting!", + // time = DateTime.UtcNow, + // threadId = System.Threading.Thread.CurrentThread.ManagedThreadId, + //}; + // + //this.Output.WriteVerbose(lastLog.ToJson(sb)); + } + catch + { + System.Threading.Interlocked.Exchange(ref this.threadCreated, 0); + } + } + + void WriteJob(ref LogJob job) + { + try + { + this.Output.Write(job.level, job.ToJson(sb, this.Output.AcceptColor)); + } + catch + { } + } + +#endif + + public void Dispose() + { +#if !UNITY_WEBGL || UNITY_EDITOR + this.isDisposed = true; + + if (this.newJobEvent != null) + { + this.newJobEvent.Close(); + this.newJobEvent = null; + } +#endif + + if (this.Output != null) + { + this.Output.Dispose(); + this.Output = new UnityOutput(); + } + + GC.SuppressFinalize(this); + } + } + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + struct LogJob + { + private static string[] LevelStrings = new string[] { "Verbose", "Information", "Warning", "Error", "Exception" }; + public Loglevels level; + public string division; + public string msg; + public Exception ex; + + public DateTime time; + public int threadId; + public string stackTrace; + + public string context; + + private static string WrapInColor(string str, string color, bool acceptColor) + { +#if UNITY_EDITOR + return acceptColor ? string.Format("{0}", str, color) : str; +#else + return str; +#endif + } + + public string ToJson(StringBuilder sb, bool acceptColor) + { + sb.Length = 0; + + sb.AppendFormat("{{\"tid\":{0},\"div\":\"{1}\",\"msg\":\"{2}\"", + WrapInColor(this.threadId.ToString(), "yellow", acceptColor), + WrapInColor(this.division, "yellow", acceptColor), + WrapInColor(LoggingContext.Escape(this.msg), "yellow", acceptColor)); + + if (ex != null) + { + sb.Append(",\"ex\": ["); + + Exception exception = this.ex; + + while (exception != null) + { + sb.Append("{\"msg\": \""); + sb.Append(LoggingContext.Escape(exception.Message)); + sb.Append("\", \"stack\": \""); + sb.Append(LoggingContext.Escape(exception.StackTrace)); + sb.Append("\"}"); + + exception = exception.InnerException; + + if (exception != null) + sb.Append(","); + } + + sb.Append("]"); + } + + if (this.stackTrace != null) + { + sb.Append(",\"stack\":\""); + ProcessStackTrace(sb); + sb.Append("\""); + } + else + sb.Append(",\"stack\":\"\""); + + if (this.context != null) + { + sb.Append(",\"ctx\": ["); + sb.Append(this.context); + sb.Append("]"); + } + else + sb.Append(",\"ctxs\":[]"); + + sb.AppendFormat(",\"t\":{0},\"ll\":\"{1}\",", + this.time.Ticks.ToString(), + LevelStrings[(int)this.level]); + + sb.Append("\"bh\":1}"); + + return sb.ToString(); + } + + private void ProcessStackTrace(StringBuilder sb) + { + if (string.IsNullOrEmpty(this.stackTrace)) + return; + + var lines = this.stackTrace.Split('\n'); + + // skip top 4 lines that would show the logger. + for (int i = 3; i < lines.Length; ++i) + sb.Append(LoggingContext.Escape(lines[i].Replace("Best.HTTP.", ""))); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs.meta new file mode 100644 index 00000000..0cc5f4a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 780d670e1b8a6a340a1441f844142390 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Logger/ThreadedLogger.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs new file mode 100644 index 00000000..cebf7a08 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs @@ -0,0 +1,50 @@ +using System; + +namespace Best.HTTP.Shared.Logger +{ + /// + /// Provides an implementation of that writes log messages to the Unity Debug Console. + /// + public sealed class UnityOutput : ILogOutput + { + /// + /// Gets a value indicating whether this log output accepts color codes. + /// + /// + /// This property returns true when running in the Unity Editor and false otherwise. + /// + public bool AcceptColor { get; } = UnityEngine.Application.isEditor; + + /// + /// Writes a log message to the Unity Debug Console based on the specified log level. + /// + /// The log level of the message. + /// The log message to write. + public void Write(Loglevels level, string logEntry) + { + switch (level) + { + case Loglevels.All: + case Loglevels.Information: + UnityEngine.Debug.Log(logEntry); + break; + + case Loglevels.Warning: + UnityEngine.Debug.LogWarning(logEntry); + break; + + case Loglevels.Error: + case Loglevels.Exception: + UnityEngine.Debug.LogError(logEntry); + break; + } + } + + /// + /// This implementation does nothing. + /// + void ILogOutput.Flush() {} + + void IDisposable.Dispose() => GC.SuppressFinalize(this); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs.meta new file mode 100644 index 00000000..14d9833f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd86ab6e6f8fab649b1b2a37452aa80f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Logger/UnityOutput.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport.meta new file mode 100644 index 00000000..c58f7378 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: d47c08ea57a56cd49b8c37790efced77 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections.meta new file mode 100644 index 00000000..6ff07733 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 82bd7454309118f4e9fa14dd5afaae6d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel.meta new file mode 100644 index 00000000..efa8316f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5db467dd3130b1349ab57a28f34db155 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs new file mode 100644 index 00000000..b7d7fe86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs @@ -0,0 +1,259 @@ +using System; +using System.Linq; +using System.ComponentModel; +using System.Collections.Generic; +using System.Collections; + +using specialized = PlatformSupport.Collections.Specialized; + +namespace PlatformSupport.Collections.ObjectModel +{ + public class ObservableDictionary : IDictionary, specialized.INotifyCollectionChanged, INotifyPropertyChanged + { + private const string CountString = "Count"; + private const string IndexerName = "Item[]"; + private const string KeysName = "Keys"; + private const string ValuesName = "Values"; + + private IDictionary _Dictionary; + protected IDictionary Dictionary + { + get { return _Dictionary; } + } + +#region Constructors + public ObservableDictionary() + { + _Dictionary = new Dictionary(); + } + public ObservableDictionary(IDictionary dictionary) + { + _Dictionary = new Dictionary(dictionary); + } + public ObservableDictionary(IEqualityComparer comparer) + { + _Dictionary = new Dictionary(comparer); + } + public ObservableDictionary(int capacity) + { + _Dictionary = new Dictionary(capacity); + } + public ObservableDictionary(IDictionary dictionary, IEqualityComparer comparer) + { + _Dictionary = new Dictionary(dictionary, comparer); + } + public ObservableDictionary(int capacity, IEqualityComparer comparer) + { + _Dictionary = new Dictionary(capacity, comparer); + } +#endregion + +#region IDictionary Members + + public void Add(TKey key, TValue value) + { + Insert(key, value, true); + } + + public bool ContainsKey(TKey key) + { + return Dictionary.ContainsKey(key); + } + + public ICollection Keys + { + get { return Dictionary.Keys; } + } + + public bool Remove(TKey key) + { + if (key == null) throw new ArgumentNullException("key"); + + TValue value; + Dictionary.TryGetValue(key, out value); + var removed = Dictionary.Remove(key); + if (removed) + + //OnCollectionChanged(NotifyCollectionChangedAction.Remove, new KeyValuePair(key, value)); + OnCollectionChanged(); + + + return removed; + } + + public bool TryGetValue(TKey key, out TValue value) + { + return Dictionary.TryGetValue(key, out value); + } + + public ICollection Values + { + get { return Dictionary.Values; } + } + + public TValue this[TKey key] + { + get + { + return Dictionary[key]; + } + set + { + Insert(key, value, false); + } + } + +#endregion + +#region ICollection> Members + + public void Add(KeyValuePair item) + { + Insert(item.Key, item.Value, true); + } + + public void Clear() + { + if (Dictionary.Count > 0) + { + Dictionary.Clear(); + OnCollectionChanged(); + } + } + + public bool Contains(KeyValuePair item) + { + return Dictionary.Contains(item); + } + + public void CopyTo(KeyValuePair[] array, int arrayIndex) + { + Dictionary.CopyTo(array, arrayIndex); + } + + public int Count + { + get { return Dictionary.Count; } + } + + public bool IsReadOnly + { + get { return Dictionary.IsReadOnly; } + } + + public bool Remove(KeyValuePair item) + { + return Remove(item.Key); + } + +#endregion + +#region IEnumerable> Members + + public IEnumerator> GetEnumerator() + { + return Dictionary.GetEnumerator(); + } + +#endregion + +#region IEnumerable Members + + IEnumerator IEnumerable.GetEnumerator() + { + return ((IEnumerable)Dictionary).GetEnumerator(); + } + +#endregion + +#region INotifyCollectionChanged Members + + public event specialized.NotifyCollectionChangedEventHandler CollectionChanged; + +#endregion + +#region INotifyPropertyChanged Members + + public event PropertyChangedEventHandler PropertyChanged; + +#endregion + + public void AddRange(IDictionary items) + { + if (items == null) throw new ArgumentNullException("items"); + + if (items.Count > 0) + { + if (Dictionary.Count > 0) + { + if (items.Keys.Any((k) => Dictionary.ContainsKey(k))) + throw new ArgumentException("An item with the same key has already been added."); + else + foreach (var item in items) Dictionary.Add(item); + } + else + _Dictionary = new Dictionary(items); + + OnCollectionChanged(specialized.NotifyCollectionChangedAction.Add, items.ToArray()); + } + } + + private void Insert(TKey key, TValue value, bool add) + { + if (key == null) throw new ArgumentNullException("key"); + + TValue item; + if (Dictionary.TryGetValue(key, out item)) + { + if (add) throw new ArgumentException("An item with the same key has already been added."); + if (Equals(item, value)) return; + Dictionary[key] = value; + + OnCollectionChanged(specialized.NotifyCollectionChangedAction.Replace, new KeyValuePair(key, value), new KeyValuePair(key, item)); + } + else + { + Dictionary[key] = value; + + OnCollectionChanged(specialized.NotifyCollectionChangedAction.Add, new KeyValuePair(key, value)); + } + } + + private void OnPropertyChanged() + { + OnPropertyChanged(CountString); + OnPropertyChanged(IndexerName); + OnPropertyChanged(KeysName); + OnPropertyChanged(ValuesName); + } + + protected virtual void OnPropertyChanged(string propertyName) + { + if (PropertyChanged != null) PropertyChanged(this, new PropertyChangedEventArgs(propertyName)); + } + + private void OnCollectionChanged() + { + OnPropertyChanged(); + if (CollectionChanged != null) CollectionChanged(this, new specialized.NotifyCollectionChangedEventArgs(specialized.NotifyCollectionChangedAction.Reset)); + } + + private void OnCollectionChanged(specialized.NotifyCollectionChangedAction action, KeyValuePair changedItem) + { + OnPropertyChanged(); + if (CollectionChanged != null) CollectionChanged(this, new specialized.NotifyCollectionChangedEventArgs(action, changedItem)); + } + + private void OnCollectionChanged(specialized.NotifyCollectionChangedAction action, KeyValuePair newItem, KeyValuePair oldItem) + { + OnPropertyChanged(); + if (CollectionChanged != null) CollectionChanged(this, new specialized.NotifyCollectionChangedEventArgs(action, newItem, oldItem)); + } + + private void OnCollectionChanged(specialized.NotifyCollectionChangedAction action, IList newItems) + { + OnPropertyChanged(); + if (CollectionChanged != null) CollectionChanged(this, new specialized.NotifyCollectionChangedEventArgs(action, newItems)); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs.meta new file mode 100644 index 00000000..18eb94eb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 902ef36b7f3ace94a83e085968c22e44 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/ObjectModel/ObservableDictionary.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized.meta new file mode 100644 index 00000000..c801ed31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0bded87d86b03f344a35f9b83d8be3b0 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs new file mode 100644 index 00000000..477e62a0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs @@ -0,0 +1,464 @@ +// Copyright (c) Microsoft. All rights reserved. +// Licensed under the MIT license. See LICENSE file in the project root for full license information. + +using System; +using System.Collections; +using System.Diagnostics; + +namespace PlatformSupport.Collections.Specialized +{ + public delegate void NotifyCollectionChangedEventHandler(object sender, PlatformSupport.Collections.Specialized.NotifyCollectionChangedEventArgs e); + + public interface INotifyCollectionChanged + { + event NotifyCollectionChangedEventHandler CollectionChanged; + } + + /// + /// This enum describes the action that caused a CollectionChanged event. + /// + public enum NotifyCollectionChangedAction + { + /// One or more items were added to the collection. + Add, + /// One or more items were removed from the collection. + Remove, + /// One or more items were replaced in the collection. + Replace, + /// One or more items were moved within the collection. + Move, + /// The contents of the collection changed dramatically. + Reset, + } + + /// + /// Arguments for the CollectionChanged event. + /// A collection that supports INotifyCollectionChangedThis raises this event + /// whenever an item is added or removed, or when the contents of the collection + /// changes dramatically. + /// + public class NotifyCollectionChangedEventArgs : EventArgs + { + //------------------------------------------------------ + // + // Constructors + // + //------------------------------------------------------ + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a reset change. + /// + /// The action that caused the event (must be Reset). + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset) + throw new ArgumentException("action"); + + InitializeAdd(action, null, -1); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a one-item change. + /// + /// The action that caused the event; can only be Reset, Add or Remove action. + /// The item affected by the change. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, object changedItem) + { + if ((action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add) && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove) + && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset)) + throw new ArgumentException("action"); + + if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset) + { + if (changedItem != null) + throw new ArgumentException("action"); + + InitializeAdd(action, null, -1); + } + else + { + InitializeAddOrRemove(action, new object[] { changedItem }, -1); + } + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a one-item change. + /// + /// The action that caused the event. + /// The item affected by the change. + /// The index where the change occurred. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, object changedItem, int index) + { + if ((action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add) && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove) + && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset)) + throw new ArgumentException("action"); + + if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset) + { + if (changedItem != null) + throw new ArgumentException("action"); + if (index != -1) + throw new ArgumentException("action"); + + InitializeAdd(action, null, -1); + } + else + { + InitializeAddOrRemove(action, new object[] { changedItem }, index); + } + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a multi-item change. + /// + /// The action that caused the event. + /// The items affected by the change. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList changedItems) + { + if ((action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add) && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove) + && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset)) + throw new ArgumentException("action"); + + if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset) + { + if (changedItems != null) + throw new ArgumentException("action"); + + InitializeAdd(action, null, -1); + } + else + { + if (changedItems == null) + throw new ArgumentNullException("changedItems"); + + InitializeAddOrRemove(action, changedItems, -1); + } + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a multi-item change (or a reset). + /// + /// The action that caused the event. + /// The items affected by the change. + /// The index where the change occurred. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList changedItems, int startingIndex) + { + if ((action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add) && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove) + && (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset)) + throw new ArgumentException("action"); + + if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Reset) + { + if (changedItems != null) + throw new ArgumentException("action"); + if (startingIndex != -1) + throw new ArgumentException("action"); + + InitializeAdd(action, null, -1); + } + else + { + if (changedItems == null) + throw new ArgumentNullException("changedItems"); + if (startingIndex < -1) + throw new ArgumentException("startingIndex"); + + InitializeAddOrRemove(action, changedItems, startingIndex); + } + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a one-item Replace event. + /// + /// Can only be a Replace action. + /// The new item replacing the original item. + /// The original item that is replaced. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, object newItem, object oldItem) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Replace) + throw new ArgumentException("action"); + + InitializeMoveOrReplace(action, new object[] { newItem }, new object[] { oldItem }, -1, -1); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a one-item Replace event. + /// + /// Can only be a Replace action. + /// The new item replacing the original item. + /// The original item that is replaced. + /// The index of the item being replaced. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, object newItem, object oldItem, int index) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Replace) + throw new ArgumentException("action"); + + InitializeMoveOrReplace(action, new object[] { newItem }, new object[] { oldItem }, index, index); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a multi-item Replace event. + /// + /// Can only be a Replace action. + /// The new items replacing the original items. + /// The original items that are replaced. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList newItems, IList oldItems) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Replace) + throw new ArgumentException("action"); + if (newItems == null) + throw new ArgumentNullException("newItems"); + if (oldItems == null) + throw new ArgumentNullException("oldItems"); + + InitializeMoveOrReplace(action, newItems, oldItems, -1, -1); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a multi-item Replace event. + /// + /// Can only be a Replace action. + /// The new items replacing the original items. + /// The original items that are replaced. + /// The starting index of the items being replaced. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList newItems, IList oldItems, int startingIndex) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Replace) + throw new ArgumentException("action"); + if (newItems == null) + throw new ArgumentNullException("newItems"); + if (oldItems == null) + throw new ArgumentNullException("oldItems"); + + InitializeMoveOrReplace(action, newItems, oldItems, startingIndex, startingIndex); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a one-item Move event. + /// + /// Can only be a Move action. + /// The item affected by the change. + /// The new index for the changed item. + /// The old index for the changed item. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, object changedItem, int index, int oldIndex) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Move) + throw new ArgumentException("action"); + if (index < 0) + throw new ArgumentException("index"); + + object[] changedItems = new object[] { changedItem }; + InitializeMoveOrReplace(action, changedItems, changedItems, index, oldIndex); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs that describes a multi-item Move event. + /// + /// The action that caused the event. + /// The items affected by the change. + /// The new index for the changed items. + /// The old index for the changed items. + public NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList changedItems, int index, int oldIndex) + { + if (action != PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Move) + throw new ArgumentException("action"); + if (index < 0) + throw new ArgumentException("index"); + + InitializeMoveOrReplace(action, changedItems, changedItems, index, oldIndex); + } + + /// + /// Construct a NotifyCollectionChangedEventArgs with given fields (no validation). Used by WinRT marshaling. + /// + internal NotifyCollectionChangedEventArgs(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList newItems, IList oldItems, int newIndex, int oldIndex) + { + _action = action; + _newItems = (newItems == null) ? null : new ReadOnlyList(newItems); + _oldItems = (oldItems == null) ? null : new ReadOnlyList(oldItems); + _newStartingIndex = newIndex; + _oldStartingIndex = oldIndex; + } + + private void InitializeAddOrRemove(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList changedItems, int startingIndex) + { + if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Add) + InitializeAdd(action, changedItems, startingIndex); + else if (action == PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction.Remove) + InitializeRemove(action, changedItems, startingIndex); + else + Debug.Assert(false, String.Format("Unsupported action: {0}", action.ToString())); + } + + private void InitializeAdd(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList newItems, int newStartingIndex) + { + _action = action; + _newItems = (newItems == null) ? null : new ReadOnlyList(newItems); + _newStartingIndex = newStartingIndex; + } + + private void InitializeRemove(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList oldItems, int oldStartingIndex) + { + _action = action; + _oldItems = (oldItems == null) ? null : new ReadOnlyList(oldItems); + _oldStartingIndex = oldStartingIndex; + } + + private void InitializeMoveOrReplace(PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction action, IList newItems, IList oldItems, int startingIndex, int oldStartingIndex) + { + InitializeAdd(action, newItems, startingIndex); + InitializeRemove(action, oldItems, oldStartingIndex); + } + + //------------------------------------------------------ + // + // Public Properties + // + //------------------------------------------------------ + + /// + /// The action that caused the event. + /// + public PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction Action + { + get { return _action; } + } + + /// + /// The items affected by the change. + /// + public IList NewItems + { + get { return _newItems; } + } + + /// + /// The old items affected by the change (for Replace events). + /// + public IList OldItems + { + get { return _oldItems; } + } + + /// + /// The index where the change occurred. + /// + public int NewStartingIndex + { + get { return _newStartingIndex; } + } + + /// + /// The old index where the change occurred (for Move events). + /// + public int OldStartingIndex + { + get { return _oldStartingIndex; } + } + + //------------------------------------------------------ + // + // Private Fields + // + //------------------------------------------------------ + + private PlatformSupport.Collections.Specialized.NotifyCollectionChangedAction _action; + private IList _newItems, _oldItems; + private int _newStartingIndex = -1; + private int _oldStartingIndex = -1; + } + + internal sealed class ReadOnlyList : IList + { + private readonly IList _list; + + internal ReadOnlyList(IList list) + { + Debug.Assert(list != null); + + _list = list; + } + + public int Count + { + get { return _list.Count; } + } + + public bool IsReadOnly + { + get { return true; } + } + + public bool IsFixedSize + { + get { return true; } + } + + public bool IsSynchronized + { + get { return _list.IsSynchronized; } + } + + public object this[int index] + { + get + { + return _list[index]; + } + set + { + throw new NotSupportedException(); + } + } + + public object SyncRoot + { + get { return _list.SyncRoot; } + } + + public int Add(object value) + { + throw new NotSupportedException(); + } + + public void Clear() + { + throw new NotSupportedException(); + } + + public bool Contains(object value) + { + return _list.Contains(value); + } + + public void CopyTo(Array array, int index) + { + _list.CopyTo(array, index); + } + + public IEnumerator GetEnumerator() + { + return _list.GetEnumerator(); + } + + public int IndexOf(object value) + { + return _list.IndexOf(value); + } + + public void Insert(int index, object value) + { + throw new NotSupportedException(); + } + + public void Remove(object value) + { + throw new NotSupportedException(); + } + + public void RemoveAt(int index) + { + throw new NotSupportedException(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs.meta new file mode 100644 index 00000000..bd469000 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9cb2ba99046317b4b8fb03f76d994f00 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Collections/Specialized/NotifyCollectionChangedEventArgs.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem.meta new file mode 100644 index 00000000..a67c0f10 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: fd7ddc2ed89fa8643bc32e214898f855 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs new file mode 100644 index 00000000..c548057a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs @@ -0,0 +1,87 @@ +#define _ENABLE_LOGGING +using System; +using System.IO; + +namespace Best.HTTP.Shared.PlatformSupport.FileSystem +{ + public sealed class DefaultIOService : IIOService + { + public Stream CreateFileStream(string path, FileStreamModes mode) + { +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(CreateFileStream)}('{path}', {mode})"); +#endif + + switch (mode) + { + case FileStreamModes.Create: + return new FileStream(path, FileMode.Create, FileAccess.Write, FileShare.Read); + case FileStreamModes.OpenRead: + return new FileStream(path, FileMode.Open, FileAccess.Read, FileShare.Read /*, 64 * 1024, FileOptions.SequentialScan*/); + case FileStreamModes.OpenReadWrite: + return new FileStream(path, FileMode.OpenOrCreate, FileAccess.ReadWrite, FileShare.Read); + case FileStreamModes.Append: + return new FileStream(path, FileMode.Append); + } + + throw new NotImplementedException($"{nameof(DefaultIOService)}.{nameof(CreateFileStream)} - '{mode}' not implemented!"); + } + + public void DirectoryCreate(string path) + { +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(DirectoryCreate)}('{path}')"); +#endif + Directory.CreateDirectory(path); + } + + public void DirectoryDelete(string path) => Directory.Delete(path, true); + + public bool DirectoryExists(string path) + { + bool exists = Directory.Exists(path); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(DirectoryExists)}('{path}', {exists})"); +#endif + + return exists; + } + + public string[] GetFiles(string path) + { + var files = Directory.GetFiles(path); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(GetFiles)}('{path}', {files?.Length})"); +#endif + + return files; + } + + public void FileDelete(string path) + { +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(FileDelete)}('{path}')"); +#endif + File.Delete(path); + } + + public bool FileExists(string path) + { + bool exists = File.Exists(path); + +#if ENABLE_LOGGING + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DefaultIOService), $"{nameof(FileExists)}('{path}', {exists})"); +#endif + + return exists; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs.meta new file mode 100644 index 00000000..27321c5c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 70d8cd7c804fca64ca518e3bb0210fb0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/DefaultIOService.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs new file mode 100644 index 00000000..af3b8727 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs @@ -0,0 +1,74 @@ +using System; +using System.IO; + +namespace Best.HTTP.Shared.PlatformSupport.FileSystem +{ + /// + /// These are the different modes that the plugin want's to use a filestream. + /// + public enum FileStreamModes + { + /// + /// Create a new file. + /// + Create, + + /// + /// Open an existing file for reading. + /// + OpenRead, + + /// + /// Open or create a file for read and write. + /// + OpenReadWrite, + + /// + /// Open an existing file for writing to the end. + /// + Append + } + + /// + /// Interface for file-system abstraction. + /// + public interface IIOService + { + /// + /// Create a directory for the given path. + /// + void DirectoryCreate(string path); + + /// + /// Return true if the directory exists for the given path. + /// + bool DirectoryExists(string path); + + /// + /// Delete the directory. + /// + void DirectoryDelete(string path); + + /// + /// Return with the file names for the given path. + /// + /// + /// + string[] GetFiles(string path); + + /// + /// Delete the file for the given path. + /// + void FileDelete(string path); + + /// + /// Return true if the file exists on the given path. + /// + bool FileExists(string path); + + /// + /// Create a stream that can read and/or write a file on the given path. + /// + Stream CreateFileStream(string path, FileStreamModes mode); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs.meta new file mode 100644 index 00000000..997040a6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9e114e4d1a092534796049799a691aa8 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/FileSystem/IIOService.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP.meta new file mode 100644 index 00000000..525cbe32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 599e163332b86fa4ba9b1f6ba0819c04 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs new file mode 100644 index 00000000..4a40e499 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs @@ -0,0 +1,9 @@ +using System; + +namespace Best.HTTP.Shared.PlatformSupport.IL2CPP +{ + [AttributeUsage(AttributeTargets.Class | AttributeTargets.Struct, Inherited = false, AllowMultiple = false)] + public class Il2CppEagerStaticClassConstructionAttribute : Attribute + { + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs.meta new file mode 100644 index 00000000..358ab309 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f2fa59793a441f54da418bb0438edbc3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppEagerStaticClassConstructionAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs new file mode 100644 index 00000000..7e665864 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs @@ -0,0 +1,75 @@ +// https://forum.unity.com/threads/il2cpp-code-generation-options.367074/ +using System; + +namespace Best.HTTP.Shared.PlatformSupport.IL2CPP +{ + /// + /// The code generation options available for IL to C++ conversion. + /// Enable or disabled these with caution. + /// + public enum Option + { + /// + /// Enable or disable code generation for null checks. + /// + /// Global null check support is enabled by default when il2cpp.exe + /// is launched from the Unity editor. + /// + /// Disabling this will prevent NullReferenceException exceptions from + /// being thrown in generated code. In *most* cases, code that dereferences + /// a null pointer will crash then. Sometimes the point where the crash + /// happens is later than the location where the null reference check would + /// have been emitted though. + /// + NullChecks = 1, + /// + /// Enable or disable code generation for array bounds checks. + /// + /// Global array bounds check support is enabled by default when il2cpp.exe + /// is launched from the Unity editor. + /// + /// Disabling this will prevent IndexOutOfRangeException exceptions from + /// being thrown in generated code. This will allow reading and writing to + /// memory outside of the bounds of an array without any runtime checks. + /// Disable this check with extreme caution. + /// + ArrayBoundsChecks = 2, + /// + /// Enable or disable code generation for divide by zero checks. + /// + /// Global divide by zero check support is disabled by default when il2cpp.exe + /// is launched from the Unity editor. + /// + /// Enabling this will cause DivideByZeroException exceptions to be + /// thrown in generated code. Most code doesn't need to handle this + /// exception, so it is probably safe to leave it disabled. + /// + DivideByZeroChecks = 3, + } + + /// + /// Use this attribute on a class, method, or property to inform the IL2CPP code conversion utility to override the + /// global setting for one of a few different runtime checks. + /// + /// Example: + /// + /// [Il2CppSetOption(Option.NullChecks, false)] + /// public static string MethodWithNullChecksDisabled() + /// { + /// var tmp = new Object(); + /// return tmp.ToString(); + /// } + /// + [AttributeUsage(AttributeTargets.Class | AttributeTargets.Method | AttributeTargets.Property, Inherited = false, AllowMultiple = true)] + public class Il2CppSetOptionAttribute : Attribute + { + public Option Option { get; private set; } + public object Value { get; private set; } + + public Il2CppSetOptionAttribute(Option option, object value) + { + Option = option; + Value = value; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs.meta new file mode 100644 index 00000000..66c07c40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 54d985a2d9f4dd540a34861291c3508e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/Il2CppSetOptionAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs new file mode 100644 index 00000000..aab8f090 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs @@ -0,0 +1,21 @@ +using System; + +namespace Best.HTTP.Shared.PlatformSupport.IL2CPP +{ + /// + /// https://docs.unity3d.com/Manual/ManagedCodeStripping.html + /// + [AttributeUsage( + AttributeTargets.Assembly | + AttributeTargets.Class | + AttributeTargets.Constructor | + AttributeTargets.Delegate | + AttributeTargets.Enum | + AttributeTargets.Event | + AttributeTargets.Field | + AttributeTargets.Interface | + AttributeTargets.Method | + AttributeTargets.Property | + AttributeTargets.Struct)] + public sealed class PreserveAttribute : Attribute {} +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs.meta new file mode 100644 index 00000000..13127ffb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 332261a86aa5bba4b823b2d2bf5f8a26 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/IL2CPP/PreserveAttribute.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory.meta new file mode 100644 index 00000000..bdee4b25 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 3bab02f6ca42fa64b8cfb7d3e2c2d28b +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs new file mode 100644 index 00000000..7fe51058 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs @@ -0,0 +1,103 @@ +using System; + +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public struct AutoReleaseBuffer : IDisposable + { + public static readonly AutoReleaseBuffer Empty = new AutoReleaseBuffer(null); + + public byte[] Data; + public int Offset; + public int Count; + + public AutoReleaseBuffer(byte[] data) + { + this.Data = data; + this.Offset = 0; + this.Count = data != null ? data.Length : 0; + } + + public AutoReleaseBuffer(BufferSegment segment) + { + this.Data = segment.Data; + this.Offset = segment.Offset; + this.Count = segment.Count; + } + + public AutoReleaseBuffer(byte[] data, int offset, int count) + { + this.Data = data; + this.Offset = offset; + this.Count = count; + } + + public BufferSegment Slice(int newOffset) => new BufferSegment(this.Data, newOffset, this.Count - (newOffset - this.Offset)); + + public BufferSegment Slice(int offset, int count) => new BufferSegment(this.Data, offset, count); + + public override bool Equals(object obj) + { + if (obj == null || !(obj is BufferSegment)) + return false; + + return Equals((BufferSegment)obj); + } + + public bool Equals(BufferSegment other) => this.Data == other.Data && this.Offset == other.Offset && this.Count == other.Count; + public bool Equals(AutoReleaseBuffer other) => this.Data == other.Data && this.Offset == other.Offset && this.Count == other.Count; + + public override int GetHashCode() => (this.Data != null ? this.Data.GetHashCode() : 0) * 21 + this.Offset + this.Count; + + public static bool operator ==(AutoReleaseBuffer left, AutoReleaseBuffer right) => left.Equals(right); + + public static bool operator !=(AutoReleaseBuffer left, AutoReleaseBuffer right) => !left.Equals(right); + + public static bool operator ==(AutoReleaseBuffer left, BufferSegment right) => left.Equals(right); + + public static bool operator !=(AutoReleaseBuffer left, BufferSegment right) => !left.Equals(right); + + public static implicit operator byte[](AutoReleaseBuffer left) => left.Data; + public static implicit operator BufferSegment(AutoReleaseBuffer left) => new BufferSegment(left.Data, left.Offset, left.Count); + + public override string ToString() + { + var sb = StringBuilderPool.Get(this.Count + 5); + sb.Append("[AutoReleaseBuffer "); + + if (this.Count > 0) + { + sb.AppendFormat("Offset: {0:N0} ", this.Offset); + sb.AppendFormat("Count: {0:N0} ", this.Count); + sb.Append("Data: ["); + + if (this.Count > 0) + { + int dumpCount = Math.Min(this.Count, BufferSegment.ToStringMaxDumpLength); + + sb.AppendFormat("{0:X2}", this.Data[this.Offset]); + for (int i = 1; i < dumpCount; ++i) + sb.AppendFormat(", {0:X2}", this.Data[this.Offset + i]); + + if (this.Count > dumpCount) + sb.Append(", ..."); + } + + sb.Append("]]"); + } + else + sb.Append(']'); + + return StringBuilderPool.ReleaseAndGrab(sb); + } + + public void Dispose() + { + if (this.Data != null) + BufferPool.Release(this.Data); + this.Data = null; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs.meta new file mode 100644 index 00000000..e3355cbd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 510c03648931e35459c6a7b1f09cb549 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/AutoReleaseBuffer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs new file mode 100644 index 00000000..ddf56e48 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs @@ -0,0 +1,39 @@ +using System.Collections.Concurrent; + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + internal struct Bucket + { +#if UNITY_EDITOR + /// + /// Size the Bucket is associated with. Serves mostly debug purposes. + /// + public readonly int Size; +#endif + + /// + /// What was Items' minimum Count between two checks. + /// + public int MinCount; + + /// + /// Direct access to a buffer, without going throug ConcurrentStack's pop/push logic. + /// + public byte[] FastItem; + public readonly ConcurrentStack Items; + + public Bucket(int size) + { +#if UNITY_EDITOR + this.Size = size; +#endif + this.FastItem = null; + this.Items = new ConcurrentStack(); + this.MinCount = int.MaxValue; + } + +#if UNITY_EDITOR + public override string ToString() => $"[{Size}, {(FastItem != null ? "y" : "n")}, {Items.Count}, {MinCount}]"; +#endif + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs.meta new file mode 100644 index 00000000..435e9d95 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 1cd00a5f117ec2c41b301e57bd825200 +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Bucket.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs new file mode 100644 index 00000000..d6540514 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs @@ -0,0 +1,539 @@ +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER +using Best.HTTP.Shared.Extensions; +#endif +using Best.HTTP.Shared.Logger; + +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Runtime.CompilerServices; +using System.Threading; + +using Unity.Burst; + +using static Unity.Burst.Intrinsics.X86.Bmi1; + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER +using System.Linq; +#endif + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + /// + /// The BufferPool is a foundational element of the Best HTTP package, aiming to reduce dynamic memory allocation overheads by reusing byte arrays. The concept is elegantly simple: rather than allocating and deallocating memory for every requirement, byte arrays can be "borrowed" and "returned" within this pool. Once returned, these arrays are retained for subsequent use, minimizing repetitive memory operations. + /// While the BufferPool is housed within the Best HTTP package, its benefits are not limited to just HTTP operations. All protocols and packages integrated with or built upon the Best HTTP package utilize and benefit from the BufferPool. This ensures that memory is used efficiently and performance remains optimal across all integrated components. + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public static class BufferPool + { + /// + /// Specifies the minimum buffer size that will be allocated. If a request is made for a size smaller than this and canBeLarger is true, + /// this size will be used. + /// + public const long MIN_BUFFER_SIZE = 512; + + /// + /// Specifies the maximum size of a buffer that the system will consider storing back into the pool. + /// + public const long MAX_BUFFER_SIZE = 32 * 1024 * 1024; + + /// + /// Represents an empty byte array that can be returned for zero-length requests. + /// + public static readonly byte[] NoData = new byte[0]; + + /// + /// Gets or sets a value indicating whether the buffer pooling mechanism is enabled or disabled. + /// Disabling will also clear all stored entries. + /// + public static bool IsEnabled + { + get { return _isEnabled; } + set + { + _isEnabled = value; + + // When set to non-enabled remove all stored entries + if (!_isEnabled) + Clear(); + } + } + private static volatile bool _isEnabled = true; + + /// + /// Specifies how frequently the maintenance cycle should run to manage old buffers. + /// + public static TimeSpan RunMaintenanceEvery = TimeSpan.FromSeconds(30); + + /// + /// Specifies the maximum total size of all stored buffers. When the buffer reach this threshold, new releases will be declined. + /// + public static long MaxPoolSize = 100 * 1024 * 1024; + + public static long MinBufferSize => MIN_BUFFER_SIZE; + +#if BESTHTTP_ENABLE_BUFFERPOOL_BUFFER_STEALING + /// + /// Index threshold that getting a larger buffer is allowed in. + /// + public static int MaxIndexThreshold = 3; +#endif + + private static DateTime lastMaintenance = DateTime.MinValue; + + // Statistics + private static long PoolSize = 0; + private static long GetBuffers = 0; + private static long ReleaseBuffers = 0; + private static long Borrowed = 0; + private static long ArrayAllocations = 0; + + private static readonly Bucket[] _buckets; + private static readonly int firstIdx; + private static readonly int lastIdx; + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + private static ConditionalWeakTable _trackers = new ConditionalWeakTable(); +#endif + +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER + private static ConcurrentDictionary _doubleReleaseTracker = new ConcurrentDictionary(); +#endif + + static BufferPool() + { +#if UNITY_ANDROID || UNITY_IOS + UnityEngine.Application.lowMemory -= OnLowMemory; + UnityEngine.Application.lowMemory += OnLowMemory; +#endif + + firstIdx = GetIdx(BufferPool.MIN_BUFFER_SIZE); + lastIdx = GetIdx(BufferPool.MAX_BUFFER_SIZE); + + _buckets = new Bucket[(lastIdx - firstIdx) + 1]; + + for (int i = 0; i < _buckets.Length; i++) + _buckets[i] = new Bucket((int)(MIN_BUFFER_SIZE << i)); + } + +#if UNITY_EDITOR + [UnityEngine.RuntimeInitializeOnLoadMethod(UnityEngine.RuntimeInitializeLoadType.SubsystemRegistration)] + public static void ResetSetup() + { + HTTPManager.Logger.Information("BufferPool", "Reset called!"); + PoolSize = 0; + GetBuffers = 0; + ReleaseBuffers = 0; + Borrowed = 0; + ArrayAllocations = 0; + + for (int i = 0; i < _buckets.Length; i++) + _buckets[i] = new Bucket((int)(MIN_BUFFER_SIZE << i)); + + lastMaintenance = DateTime.MinValue; + +#if UNITY_ANDROID || UNITY_IOS + UnityEngine.Application.lowMemory -= OnLowMemory; + UnityEngine.Application.lowMemory += OnLowMemory; +#endif + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + ClearTrackers(); +#endif + +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER + _doubleReleaseTracker.Clear(); +#endif + } +#endif + +#if UNITY_ANDROID || UNITY_IOS + private static void OnLowMemory() + { + HTTPManager.Logger.Warning(nameof(BufferPool), nameof(OnLowMemory)); + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + ClearTrackers(); +#endif + +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER + _doubleReleaseTracker.Clear(); +#endif + + // Drop all buffers + Clear(); + } +#endif + + /// + /// Fetches a byte array from the pool. + /// + /// Depending on the `canBeLarger` parameter, the returned buffer may be larger than the requested size! + /// Requested size of the buffer. + /// If true, the returned buffer can be larger than the requested size. + /// Optional context for logging purposes. + /// A byte array from the pool or a newly allocated one if suitable size is not available. + public static byte[] Get(long size, bool canBeLarger, LoggingContext context = null) + { + if (!_isEnabled) + return new byte[size]; + + // Return a fix reference for 0 length requests. Any resize call (even Array.Resize) creates a new reference + // so we are safe to expose it to multiple callers. + if (size == 0) + return BufferPool.NoData; + + if (size > BufferPool.MAX_BUFFER_SIZE) + return new byte[size]; + + if (size < BufferPool.MIN_BUFFER_SIZE) + size = BufferPool.MIN_BUFFER_SIZE; + else if (!BufferPool.IsPowerOfTwo(size)) + size = BufferPool.NextPowerOf2(size); + + Interlocked.Add(ref Borrowed, size); + + int idx = GetIdx(size >> firstIdx); + + var buckets = _buckets; + +#if BESTHTTP_ENABLE_BUFFERPOOL_BUFFER_STEALING + int maxIdx = idx + MaxIndexThreshold; + + while (idx < buckets.Length && idx <= maxIdx) +#else + if (idx < buckets.Length) +#endif + { + ref Bucket bucket = ref buckets[idx]; + var item = bucket.FastItem; + + if ((item != null && Interlocked.CompareExchange(ref bucket.FastItem, null, item) == item) || + bucket.Items.TryPop(out item)) + { + Interlocked.Increment(ref GetBuffers); + Interlocked.Add(ref PoolSize, -size); + + UpdateMinCount(ref bucket, 0); + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + _trackers.Add(item, new Tracker(context)); +#endif + +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER + _doubleReleaseTracker.Remove(item, out var _); +#endif + + return item; + } + +#if BESTHTTP_ENABLE_BUFFERPOOL_BUFFER_STEALING + idx++; +#endif + } + + Interlocked.Increment(ref ArrayAllocations); + + var result = new byte[size]; + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + _trackers.Add(result, new Tracker(context)); +#endif + return result; + } + + /// + /// Releases a list of buffer segments back to the pool in a bulk operation. + /// + /// List of buffer segments to release. + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public static void ReleaseBulk(ConcurrentQueue segments) + { + if (!_isEnabled || segments == null) + return; + + while (segments.TryDequeue(out var segment)) + Release(segment); + } + + /// + /// Releases a list of buffer segments back to the pool in a bulk operation. + /// + /// List of buffer segments to release. + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public static void ReleaseBulk(List segments) + { + if (!_isEnabled || segments == null) + return; + + for (int i = 0; i < segments.Count; i++) + Release(segments[i]); + segments.Clear(); + } + + /// + /// Releases a byte array back to the pool. + /// + /// Buffer to be released back to the pool. + public static void Release(byte[] buffer) + { + if (!_isEnabled || buffer == null) + return; + + int size = buffer.Length; + + if (size == 0 || size < MIN_BUFFER_SIZE || size > MAX_BUFFER_SIZE) + return; + + if (!IsPowerOfTwo(size)) + return; + +#if BESTHTTP_ENABLE_BUFFERPOOL_DOUBLE_RELEASE_CHECKER + if (_doubleReleaseTracker.TryGetValue(buffer, out var entry)) + { + HTTPManager.Logger.Error("BufferPool", $"Buffer already added to the pool! Previously added from: {ProcessStackTrace(entry.stackTrace)}. Buffer: {entry.buffer.AsBuffer()}"); + return; + } + else + _doubleReleaseTracker.TryAdd(buffer, new(buffer, Environment.StackTrace)); +#endif + + Interlocked.Add(ref Borrowed, -size); + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + if (_trackers.TryGetValue(buffer, out var tracker)) + { + _trackers.Remove(buffer); + tracker.Dispose(); + } +#endif + + var ps = Interlocked.Read(ref PoolSize); + if (ps + size > MaxPoolSize) + return; + + Interlocked.Add(ref PoolSize, size); + Interlocked.Increment(ref ReleaseBuffers); + + int idx = GetIdx(size >> firstIdx); + var buckets = _buckets; + ref var bucket = ref buckets[idx]; + + if (Interlocked.CompareExchange(ref bucket.FastItem, buffer, null) != null) + { + bucket.Items.Push(buffer); + + UpdateMinCount(ref bucket, 0); + } + else + { + UpdateMinCount(ref bucket, 1); + } + } + + /// + /// Resizes a byte array by returning the old one to the pool and fetching (or creating) a new one of the specified size. + /// + /// Buffer to resize. + /// New size for the buffer. + /// If true, the new buffer can be larger than the specified size. + /// If true, the new buffer will be cleared (set to all zeros). + /// Optional context for logging purposes. + /// A resized buffer. + public static byte[] Resize(ref byte[] buffer, int newSize, bool canBeLarger, bool clear, LoggingContext context = null) + { + if (!_isEnabled) + { + Array.Resize(ref buffer, newSize); + return buffer; + } + + byte[] newBuf = BufferPool.Get(newSize, canBeLarger, context); + if (buffer != null) + { + if (!clear) + Array.Copy(buffer, 0, newBuf, 0, Math.Min(newBuf.Length, buffer.Length)); + BufferPool.Release(buffer); + } + + if (clear) + Array.Clear(newBuf, 0, newSize); + + return buffer = newBuf; + } + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + public static KeyValuePair[] GetBorrowedBuffers() => _trackers.ToArray(); +#endif + +#if BESTHTTP_PROFILE + public static void GetStatistics(ref BufferPoolStats stats) + { + //using (new ReadLock(rwLock)) + stats.GetBuffers = Interlocked.Read(ref GetBuffers); + stats.ReleaseBuffers = Interlocked.Read(ref ReleaseBuffers); + stats.PoolSize = Interlocked.Read(ref PoolSize); + stats.MinBufferSize = MIN_BUFFER_SIZE; + stats.MaxBufferSize = MAX_BUFFER_SIZE; + stats.MaxPoolSize = Interlocked.Read(ref MaxPoolSize); + + stats.Borrowed = Interlocked.Read(ref Borrowed); + stats.ArrayAllocations = Interlocked.Read(ref ArrayAllocations); + + /*stats.FreeBufferCount = FreeBuffers.Count; + if (stats.FreeBufferStats == null) + stats.FreeBufferStats = new List(FreeBuffers.Count); + else + stats.FreeBufferStats.Clear(); + + for (int i = 0; i < FreeBuffers.Count; ++i) + { + BufferStore store = FreeBuffers[i]; + List buffers = store.buffers; + + BufferStats bufferStats = new BufferStats(); + bufferStats.Size = store.Size; + bufferStats.Count = buffers.Count; + + stats.FreeBufferStats.Add(bufferStats); + }*/ + + stats.NextMaintenance = (lastMaintenance + RunMaintenanceEvery) - DateTime.UtcNow; + } +#endif + + /// + /// Clears all stored entries in the buffer pool instantly, releasing memory. + /// + public static void Clear() + { + var buckets = _buckets; + for (int i = 0; i < _buckets.Length; ++i) + { + ref Bucket bucket = ref buckets[i]; + bucket.Items.Clear(); + Interlocked.Exchange(ref bucket.FastItem, null); + } + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + ClearTrackers(); +#endif + + Interlocked.Exchange(ref PoolSize, 0); + } + +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER + private static void ClearTrackers() + { + var all = _trackers.ToArray(); + foreach (var item in all) + _trackers.Remove(item.Key); + _trackers.Clear(); + } +#endif + + /// + /// Internal method called by the plugin to remove old, non-used buffers. + /// + internal static void Maintain() + { + DateTime now = DateTime.UtcNow; + if (!_isEnabled || lastMaintenance + RunMaintenanceEvery > now) + return; + + lastMaintenance = now; + + var buckets = _buckets; + for (int i = 0; i < buckets.Length; ++i) + { + ref Bucket bucket = ref buckets[i]; + + // Size of the bucket, already negated. + int bucketSize = -(int)(MIN_BUFFER_SIZE << i); + var remove = Interlocked.Exchange(ref bucket.MinCount, int.MaxValue); + int removed = 0; + + for (int counter = 0; counter < remove && bucket.Items.TryPop(out var _); ++counter) + { + Interlocked.Add(ref PoolSize, bucketSize); + removed++; + } + + // Remove FastItem too, when it wasn't used in a full maintainence round + if (remove == int.MaxValue && Interlocked.Exchange(ref bucket.FastItem, null) != null) + Interlocked.Add(ref PoolSize, bucketSize); + } + } + + private static void UpdateMinCount(ref Bucket bucket, int fastItem) + { + int newMinCount = bucket.Items.Count + fastItem; + int oldMinCount = bucket.MinCount; + while (newMinCount < oldMinCount && Interlocked.CompareExchange(ref bucket.MinCount, newMinCount, oldMinCount) != oldMinCount) + oldMinCount = bucket.MinCount; + } + + #region Helper functions + + public static bool IsPowerOfTwo(long x) => (x & (x - 1)) == 0; + + public static long NextPowerOf2(long x) + { + long pow = 1; + while (pow <= x) + pow *= 2; + return pow; + } + + [ThreadStatic] + private static System.Text.StringBuilder stacktraceBuilder; + public static string ProcessStackTrace(string stackTrace) + { + if (string.IsNullOrEmpty(stackTrace)) + return string.Empty; + + stacktraceBuilder ??= new System.Text.StringBuilder(); + + var lines = stackTrace.Split('\n'); + + for (int i = 0; i < lines.Length; ++i) + { + var line = lines[i]; + if (!line.Contains("Shared.PlatformSupport.Memory.Tracker..ctor") && + !line.Contains(".Memory.BufferPool") && + !line.Contains("Environment") && + !line.Contains("System.Threading")) + stacktraceBuilder.Append(line.Replace("Best.HTTP.", "")); + } + + return stacktraceBuilder.ToString(); + } + + [BurstCompile] + private static int GetIdx(long po2) + { + if (IsBmi1Supported) + return (int)tzcnt_u64((ulong)(po2 >> firstIdx)); + /*else if (IsNeonSupported) + { + v64 v = new v64((uint)po2, (uint)po2); + var result = vclz_s32(v); + return (int)result.UInt0; + }*/ + + ulong a = (ulong)po2; + ulong c = 64; + a &= (ulong)-(long)(a); + if (a != 0) c--; + if ((a & 0x00000000FFFFFFFF) != 0) c -= 32; + if ((a & 0x0000FFFF0000FFFF) != 0) c -= 16; + if ((a & 0x00FF00FF00FF00FF) != 0) c -= 8; + if ((a & 0x0F0F0F0F0F0F0F0F) != 0) c -= 4; + if ((a & 0x3333333333333333) != 0) c -= 2; + if ((a & 0x5555555555555555) != 0) c -= 1; + return (int)c; + } + + #endregion + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs.meta new file mode 100644 index 00000000..979ac1b1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9d2975ff23d129949bbef756327c52fc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPool.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs new file mode 100644 index 00000000..f590938f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs @@ -0,0 +1,31 @@ +#if BESTHTTP_PROFILE +using System; +using System.Collections.Generic; + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + public struct BufferStats + { + public long Size; + public int Count; + } + + public struct BufferPoolStats + { + public long GetBuffers; + public long ReleaseBuffers; + public long PoolSize; + public long MaxPoolSize; + public long MinBufferSize; + public long MaxBufferSize; + + public long Borrowed; + public long ArrayAllocations; + + public int FreeBufferCount; + public List FreeBufferStats; + + public TimeSpan NextMaintenance; + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs.meta new file mode 100644 index 00000000..bc94845e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 4a63d88aa7b47f049b4f066dc154285a +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferPoolStats.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs new file mode 100644 index 00000000..24f1922e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs @@ -0,0 +1,130 @@ +using Best.HTTP.Shared.PlatformSupport.Text; + +using System; + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + /// + /// Represents a segment (a continuous section) of a byte array, providing functionalities to + /// work with a portion of the data without copying. + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public readonly struct BufferSegment + { + internal const int ToStringMaxDumpLength = 128; + + /// + /// Represents an empty buffer segment. + /// + public static readonly BufferSegment Empty = new BufferSegment(null, 0, 0); + + /// + /// The underlying data of the buffer segment. + /// + public readonly byte[] Data; + + /// + /// The starting offset of the segment within the data. + /// + public readonly int Offset; + + /// + /// The number of bytes in the segment that contain valid data. + /// + public readonly int Count; + + /// + /// Initializes a new instance of the BufferSegment struct. + /// + /// The data for the buffer segment. + /// The starting offset of the segment. + /// The number of bytes in the segment. + public BufferSegment(byte[] data, int offset, int count) + { + this.Data = data; + this.Offset = offset; + this.Count = count; + } + + /// + /// Converts the buffer segment to an AutoReleaseBuffer to use it in a local using statement. + /// + /// A new AutoReleaseBuffer instance containing the data of the buffer segment. + public AutoReleaseBuffer AsAutoRelease() => new AutoReleaseBuffer(this); + + /// + /// Creates a new segment starting from the specified offset. + /// + /// The new segment will reference the same underlying byte[] as the original, without creating a copy of the data. + /// The starting offset of the new segment. + /// A new buffer segment that references the same underlying data. + public BufferSegment Slice(int newOffset) => new BufferSegment(this.Data, newOffset, this.Count - (newOffset - this.Offset)); + + /// + /// Creates a new segment with the specified offset and count. + /// + /// The new segment will reference the same underlying byte[] as the original, without creating a copy of the data. + /// The starting offset of the new segment. + /// The number of bytes in the new segment. + /// A new buffer segment that references the same underlying data. + public BufferSegment Slice(int offset, int count) => new BufferSegment(this.Data, offset, count); + + /// + /// Copyies the buffer's content to the received array. + /// + /// The array the data will be copied into. + public void CopyTo(byte[] to) => Array.Copy(this.Data, this.Offset, to, 0, this.Count); + + public Span AsSpan() => new Span(this.Data, this.Offset, this.Count); + + public override bool Equals(object obj) + { + if (obj == null || !(obj is BufferSegment)) + return false; + + return Equals((BufferSegment)obj); + } + + public bool Equals(BufferSegment other) => this.Data == other.Data && this.Offset == other.Offset && this.Count == other.Count; + public bool Equals(AutoReleaseBuffer other) => this.Data == other.Data && this.Offset == other.Offset && this.Count == other.Count; + + public override int GetHashCode() => (this.Data != null ? this.Data.GetHashCode() : 0) * 21 + this.Offset + this.Count; + + public static bool operator ==(BufferSegment left, BufferSegment right) => left.Equals(right); + public static bool operator !=(BufferSegment left, BufferSegment right) => !left.Equals(right); + public static bool operator ==(BufferSegment left, AutoReleaseBuffer right) => left.Equals(right); + public static bool operator !=(BufferSegment left, AutoReleaseBuffer right) => !left.Equals(right); + public static implicit operator byte[](BufferSegment left) => left.Data; + + public override string ToString() + { + var sb = StringBuilderPool.Get(this.Count + 5); + sb.Append("[BufferSegment "); + + if (this.Count > 0) + { + sb.AppendFormat("Offset: {0:N0} ", this.Offset); + sb.AppendFormat("Count: {0:N0} ", this.Count); + sb.Append("Data: ["); + + if (this.Count > 0) + { + int dumpCount = Math.Min(this.Count, ToStringMaxDumpLength); + + sb.AppendFormat("{0:X2}", this.Data[this.Offset]); + for (int i = 1; i < dumpCount; ++i) + sb.AppendFormat(", {0:X2}", this.Data[this.Offset + i]); + + if (this.Count > dumpCount) + sb.Append(", ..."); + } + + sb.Append("]]"); + } + else + sb.Append(']'); + + return StringBuilderPool.ReleaseAndGrab(sb); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs.meta new file mode 100644 index 00000000..152bf50e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2c6843dc813cfc342b940e61916005b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferSegment.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs new file mode 100644 index 00000000..444228f8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs @@ -0,0 +1,3 @@ +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs.meta new file mode 100644 index 00000000..94f5b213 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cfb0978cefc760443902a234b8369702 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/BufferStore.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs new file mode 100644 index 00000000..c4ad230c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs @@ -0,0 +1,37 @@ +#if BESTHTTP_ENABLE_BUFFERPOOL_BORROW_CHECKER +using Best.HTTP.Shared.Logger; + +using System; + +namespace Best.HTTP.Shared.PlatformSupport.Memory +{ + public sealed class Tracker : IDisposable + { + public string Stack => this._stack; + public LoggingContext Context => this._context; + + private readonly string _stack; + private readonly LoggingContext _context; + private bool _disposed; + + public Tracker(LoggingContext context) + { + this._stack = BufferPool.ProcessStackTrace(Environment.StackTrace); + this._context = context; + } + + public void Dispose() + { + _disposed = true; + GC.SuppressFinalize(this); + } + + ~Tracker() + { + if (!_disposed && !Environment.HasShutdownStarted) + HTTPManager.Logger.Error("BufferPool", $"Buffer Leaked! Borrowed at: {_stack}", this._context); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs.meta new file mode 100644 index 00000000..22275809 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs.meta @@ -0,0 +1,9 @@ +fileFormatVersion: 2 +guid: 258c141187c3a464894a9da73c179d50 +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Memory/Tracker.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network.meta new file mode 100644 index 00000000..6077d2b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 739408cecf3da7349b1a0ae731cdaa54 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS.meta new file mode 100644 index 00000000..f67e4b42 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a7fb60ba1f30cc348a4327d2ef83c4c1 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache.meta new file mode 100644 index 00000000..c6c8d19d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ecb01125967f0e44988bb3d7e893be7f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs new file mode 100644 index 00000000..f1539ac7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs @@ -0,0 +1,519 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using UnityEngine; + +using Best.HTTP.Shared.PlatformSupport.Text; +using System.Net; +using System.Net.Sockets; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache +{ + /// + /// Represents the result of a DNS query, including the original host name, resolved IP addresses, and any error. + /// + public readonly struct DNSQueryResult + { + /// + /// The host name used in the DNS query. + /// + public readonly string HostName; + + /// + /// The resolved IP addresses associated with the host name. + /// + public readonly DNSIPAddress[] Addresses; + + /// + /// Any error that occurred during the DNS query. + /// + public readonly Exception Error; + + internal DNSQueryResult(string hostName, DNSIPAddress[] addresses, Exception error) + { + this.HostName = hostName; + this.Addresses = addresses; + this.Error = error; + } + + public override string ToString() + { + if (this.Error != null) + return $"[{nameof(DNSQueryResult)}(\"{HostName}\", {this.Addresses?.Length}, Error: \"{this.Error?.Message}\")]"; + else + return $"[{nameof(DNSQueryResult)}(\"{HostName}\", {this.Addresses?.Length})]"; + } + } + + /// + /// Represents an IP address obtained from DNS resolution. + /// + public sealed class DNSIPAddress + { + /// + /// The resolved IP address. + /// + public IPAddress IPAddress { get; private set; } + + /// + /// Indicates whether this IP address worked during the last connection attempt. + /// + public bool IsWorkedLastTime { get; internal set; } + + internal DNSIPAddress(IPAddress iPAddress) + { + this.IPAddress = iPAddress; + + // By default, assumme it's a working IP address + this.IsWorkedLastTime = true; + } + + public override string ToString() => $"[{nameof(DNSIPAddress)}({this.IPAddress}, Working: {this.IsWorkedLastTime})]"; + } + + /// + /// Represents options for configuring the DNS cache behavior. + /// + public sealed class DNSCacheOptions + { + /// + /// The time interval after which DNS cache entries should be refreshed. + /// + public TimeSpan RefreshAfter = TimeSpan.FromSeconds(30); + + /// + /// The time interval after which DNS cache entries should be removed if not used. + /// + public TimeSpan RemoveAfter = TimeSpan.FromSeconds(70); + + /// + /// The granularity of cancellation checks for DNS queries. + /// + public TimeSpan CancellationCheckGranularity = TimeSpan.FromMilliseconds(100); + + /// + /// The frequency of cache maintenance. + /// + public TimeSpan MaintenanceFrequency = TimeSpan.FromSeconds(1); + } + + /// + /// Represents parameters for a DNS query, including the host name, address, cancellation token, logging context, callback, and tag. + /// + public sealed class DNSQueryParameters + { + /// + /// The hash key associated with the DNS query. + /// + public Hash128 Key { get; private set; } + + /// + /// The host name used in the DNS query. + /// + public string Hostname { get => this.Address.Host; } + + /// + /// The URI address used in the DNS query. + /// + public Uri Address { get; private set; } + + /// + /// The cancellation token used to cancel the DNS query. + /// + public CancellationToken Token; + + /// + /// Optional logging context. + /// + public LoggingContext Context; + + /// + /// The callback to be invoked upon completion of the DNS query. + /// + public Action Callback; + + /// + /// An optional object reference associated with the DNS query. + /// + public object Tag; + + /// + /// Indicates whether the DNS query is a prefetch query. + /// + public bool IsPrefetch { get => this.Context == null; } + + public DNSQueryParameters(Uri address) + { + this.Address = address; + this.Key = Hash128.Compute(this.Hostname); + } + + public override string ToString() + { + return $"{Key} => {Address}"; + } + } + + /// + /// The DNSCache class is a static utility that manages DNS caching and queries within the Best HTTP library. + /// It helps improve network efficiency by caching DNS query results, reducing the need for redundant DNS resolutions. + /// + /// + /// By utilizing the DNSCache class and its associated features, you can optimize DNS resolution in your network communication, leading to improved performance and reduced latency in your applications. + /// + /// Its key features include: + /// + /// + /// Improving Network Efficiency + /// The DNSCache class is designed to enhance network efficiency by caching DNS query results. + /// When your application needs to resolve hostnames to IP addresses for making network requests, the DNSCache stores previously resolved results. + /// This reduces the need for redundant DNS resolutions, making network communication faster and more efficient. + /// + /// + /// + /// + /// DNS Prefetching + /// You can use the DNSCache to initiate DNS prefetch operations. + /// Prefetching allows you to resolve and cache DNS records for hostnames in advance, reducing latency for future network requests. + /// This is particularly useful when you expect to make multiple network requests to the same hostnames, as it helps to avoid DNS resolution delays. + /// + /// + /// + /// + /// Marking IP Addresses as Non-Working + /// In cases where a previously resolved IP address is determined to be non-functional (e.g., due to network issues), you can use the DNSCache to report IP addresses as non-working. + /// This information helps the cache make better decisions about which IP addresses to use for future network connections. gives higher priority for adresses not marked as non-working. + /// + /// + /// + /// + /// Clearing the DNS Cache + /// If you need to reset the DNS cache and remove all stored DNS resolutions, you can use the Clear method provided by the DNSCache class. + /// This operation can be useful in scenarios where you want to start with a fresh cache. + /// + /// + /// + /// + /// Performing DNS Queries + /// The primary function of the DNSCache class is to perform DNS queries with specified parameters. + /// It resolves DNS records for a given hostname and caches the results. This can be called directly or used internally by the Best HTTP library for resolving hostnames. + /// + /// + /// + /// + /// Configuring Cache Behavior + /// You can configure the behavior of the DNS cache using the DNSCacheOptions class. + /// This includes setting refresh intervals for cache entries, defining the granularity of cancellation checks for DNS queries, and specifying the frequency of cache maintenance. + /// + /// + /// + /// + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstruction] + public static class DNSCache + { + /// + /// Options for configuring the DNS cache behavior, including refresh intervals and maintenance frequency. + /// + public static DNSCacheOptions Options = new DNSCacheOptions(); + private static ConcurrentDictionary _cache = new ConcurrentDictionary(); + private static int _isMaintenanceScheduled = 0; + + /// + /// Initiates a DNS prefetch operation for the specified host name. DNS prefetching is used to resolve and cache + /// DNS records for host names in advance, reducing latency for future network requests. + /// + /// The host name to prefetch. + public static void Prefetch(string hostName) + { + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Prefetch)}(\"{hostName}\")"); + + Query(new DNSQueryParameters(new Uri($"prefetch://{hostName}"))); + } + + /// + /// Reports an IP address as non-working for the specified host name. In cases where a previously resolved IP address + /// is determined to be non-functional, this method updates the cache to mark the IP address as non-working. + /// + /// The host name associated with the IP address. + /// The to report as non-working. + /// Optional logging context for debugging purposes. + public static void ReportAsNonWorking(string hostName, IPAddress address, LoggingContext context) + { + var key = Hash128.Compute(hostName); + + if (_cache.TryGetValue(key, out var entry)) + { + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(ReportAsNonWorking)}(\"{hostName}\", {address}) - CacheEntry found", context); + entry.ReportNonWorking(address, context); + } + else + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(ReportAsNonWorking)}(\"{hostName}\", {address}) - CacheEntry not found!", context); + } + + /// + /// Clears the DNS cache, removing all cached DNS records. This operation can be used to reset the cache + /// and remove all stored DNS resolutions. + /// + public static void Clear() + { + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Clear)}()"); + + _cache.Clear(); + +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER + Profiler.Network.NetworkStats.TotalDNSCacheMissCounter.Value = 0; + Profiler.Network.NetworkStats.TotalDNSCacheHitsCounter.Value = 0; +#endif + } + + /// + /// Performs a DNS query with the specified parameters. It resolves DNS records for a given host name, + /// caching the results to reduce the need for redundant DNS resolutions. + /// + /// The parameters for the DNS query. + public static void Query(DNSQueryParameters parameters) + { + // First check whether it's already an IP address. If so, call the callback without touching any DNS query. + if (IPAddress.TryParse(parameters.Hostname, out var ip) && + (ip.AddressFamily == AddressFamily.InterNetwork || ip.AddressFamily == AddressFamily.InterNetworkV6)) + { + try + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Query)}(\"{parameters.Hostname}\") - It's already an IP address, skipping DNS query...", parameters.Context); + + parameters.Callback?.Invoke(parameters, new DNSQueryResult(parameters.Hostname, new DNSIPAddress[] { new DNSIPAddress(ip) }, null)); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(DNSCache), $"{nameof(Query)} - Callback", ex, parameters.Context); + } + return; + } + + // When context is null, it's a call to refresh cached entry, so it must skip the cache check and have to go straight for the DNS query + if (!parameters.IsPrefetch && _cache.TryGetValue(parameters.Key, out var entry)) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Query)}(\"{parameters.Hostname}\", \"{parameters.Key}\") - Cache hit: {entry}", parameters.Context); + + var addresses = entry.GetAddresses(); + if (addresses != null && addresses.Length > 0) + { +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER + Profiler.Network.NetworkStats.TotalDNSCacheHitsCounter.Value++; +#endif + try + { + var result = new DNSQueryResult(parameters.Hostname, addresses, null); + + ThreadedRunner.RunShortLiving((par, res) => par?.Callback?.Invoke(par, res), parameters, result); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(DNSCache), $"{nameof(Query)}(\"{parameters.Hostname}\", \"{parameters.Key}\") - Cache hit - QueryImpl", ex, parameters.Context); + } + + // Return now, if it's a stalled entry, the regular maintenance call will do its job. + return; + } + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Query)}(\"{parameters.Hostname}\", \"{parameters.Key}\") - CacheEntry found, but no addresses returned!", parameters.Context); + } + + // TODO: Try to combine callbacks for the same query + // - Doing a new query while theres an active query (from prefetch for example) creates two queries. If we could combine callbacks safely, or steal active queries' callback it would be even faster. + // Cases to handle: + // - Thread-safe update of the list of callbacks + // - Query finishing while we try to update it + // - Query is in the middle of dispatching + + var ar = Dns.BeginGetHostAddresses(parameters.Hostname, OnGetHostAddresses, /*query*/ parameters); + + // Apply a timer only when there's a context == it's in the context of a request where it can be cancelled. + // If it's a refresh/prefech request, it would be a waste of resources. + if (!parameters.IsPrefetch) + { +#if BESTHTTP_PROFILE && UNITY_2021_2_OR_NEWER + Profiler.Network.NetworkStats.TotalDNSCacheMissCounter.Value++; +#endif + + if (!ar.CompletedSynchronously && parameters.Token != CancellationToken.None) + Extensions.Timer.Add(new TimerData(Options.CancellationCheckGranularity, /*query*/ parameters, CheckForCanceled)); + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Query)}(\"{parameters.Hostname}\", \"{parameters.Key}\") - Cache miss/Prefetch! {nameof(Dns.BeginGetHostAddresses)} called!", parameters.Context); + } + + private static void OnGetHostAddresses(IAsyncResult ar) + { + var parameters = ar.AsyncState as /*DNSQuery*/DNSQueryParameters; + + var callback = parameters.Callback; + callback = Interlocked.CompareExchange>(ref parameters.Callback, null, callback); + + try + { + // If something went wrong, this will throw an exception. + var addresses = Dns.EndGetHostAddresses(ar); + + if (HTTPManager.Logger.IsDiagnostic) + { + var sb = StringBuilderPool.Get(1); + sb.Append('['); + for (int i = 0; i < addresses.Length; ++i) + { + sb.Append(addresses[i]); + + if (i < addresses.Length - 1) + sb.Append(", "); + } + sb.Append(']'); + var ips = StringBuilderPool.ReleaseAndGrab(sb); + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) - {nameof(Dns.EndGetHostAddresses)} returned with {addresses?.Length} IPs: {ips}", parameters.Context); + } + + DNSCacheEntry AddCacheEntry(Hash128 key) + { + var resolved = new List(addresses.Length); + foreach (var address in addresses) + if (address.AddressFamily == AddressFamily.InterNetwork || address.AddressFamily == AddressFamily.InterNetworkV6) + resolved.Add(new DNSIPAddress(address)); + + var entry = new DNSCacheEntry(key, parameters.Hostname, resolved); + + return entry; + } + + DNSCacheEntry UpdateCacheEntry(Hash128 key, DNSCacheEntry oldEntry) + { + var resolved = new List(addresses.Length); + foreach (var address in addresses) + if (address.AddressFamily == AddressFamily.InterNetwork || address.AddressFamily == AddressFamily.InterNetworkV6) + resolved.Add(new DNSIPAddress(address)); + + var entry = oldEntry.DeriveWith(resolved); + + return entry; + } + + // Store/update cach entry + var entry = _cache.AddOrUpdate(parameters.Key, AddCacheEntry, UpdateCacheEntry); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) - entry added to/updated in the cache: {entry}. Cache size: {_cache.Count}", parameters.Context); + + if (entry != null && Interlocked.CompareExchange(ref _isMaintenanceScheduled, 1, 0) == 0) + { + Extensions.Timer.Add(new TimerData(Options.MaintenanceFrequency, null, Maintenance)); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) - Scheduled maintenance rutin", parameters.Context); + } + + try + { + callback?.Invoke(parameters, new DNSQueryResult(parameters.Hostname, entry.GetAddresses(), null)); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) - callback", ex, parameters.Context); + } + } + catch (Exception ex) + { + // If there's an error (like DNS couldn't resolve the host) old entries are will remain in the cache. + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) calling callback with no addresses!", parameters.Context); + + try + { + callback?.Invoke(parameters, new DNSQueryResult(parameters.Hostname, null, ex)); + } + catch (Exception e) + { + HTTPManager.Logger.Exception(nameof(DNSCache), $"{nameof(OnGetHostAddresses)}({parameters}) - callback", e, parameters.Context); + } + } + } + + /// + /// It's plan-b for the case where BeginGetHostAddresses take too long and no reply in time. If the query's Token is canceled it will call the callback if it's still available. + /// + private static bool CheckForCanceled(DateTime now, object context) + { + var query = context as /*DNSQuery*/ DNSQueryParameters; + + if (query.Token.IsCancellationRequested) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(CheckForCanceled)}({query}) - Token.IsCancellationRequested!", query.Context); + + var callback = query.Callback; + + callback = Interlocked.CompareExchange>(ref query.Callback, null, callback); + + try + { + callback?.Invoke(query, new DNSQueryResult(query.Hostname, null, new TimeoutException("DNS Query Timed Out"))); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(DNSCache), $"{nameof(CheckForCanceled)}({query}) - callback", ex, query.Context); + } + + return false; + } + + return query.Callback != null; + } + + private static bool Maintenance(DateTime now, object context) + { + using var __ = new Unity.Profiling.ProfilerMarker(nameof(DNSCache)).Auto(); + + foreach (var kvp in _cache) + { + Hash128 key = kvp.Key; + DNSCacheEntry entry = kvp.Value; + + if (entry.IsReadyToRemove(now)) + { + if (_cache.TryRemove(key, out _)) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Maintenance)}.{nameof(DNSCacheEntry.IsReadyToRemove)}: Removed entry from cache: {entry}"); + } + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Maintenance)}.{nameof(DNSCacheEntry.IsReadyToRemove)}: Couldn't remove entry from cache: {entry}"); + } + else if (entry.IsStalled(now)) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Maintenance)}.{nameof(DNSCacheEntry.IsStalled)}: Refreshing entry: {entry}"); + + entry.Refresh(); + } + } + + // return true to repeat. So return false if there's no more entries in the cache and we could change _isMaintenanceScheduled. + bool removeShedule = _cache.Count == 0 && Interlocked.CompareExchange(ref _isMaintenanceScheduled, 0, 1) == 1; + + if (removeShedule && HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(DNSCache), $"{nameof(Maintenance)} - Remove scheduled rutin"); + + return !removeShedule; // Timer expects false to remove the timer, so here we actually have to negate removeSchedule to remove. + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs.meta new file mode 100644 index 00000000..c04e4a8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7dffa1d4a664f694faa02c068034ce74 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCache.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs new file mode 100644 index 00000000..48fd1e90 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs @@ -0,0 +1,192 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.Shared.PlatformSupport.Text; +using Best.HTTP.Shared.Logger; + +using UnityEngine; + +namespace Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache +{ + /// + /// Represents a cached entry for DNS query results, including resolved IP addresses and metadata. + /// + /// + /// Almost immutable, all changes are done in-class in a thread-safe manner. + /// + internal class DNSCacheEntry + { + /// + /// Gets the 128-bit hash derived from the host name. + /// + public readonly Hash128 Key; + + /// + /// Gets the host name this entry stores the IP addresses for. + /// + public readonly string Host; + + /// + /// Gets the timestamp when the entry was last resolved. + /// + public readonly DateTime ResolvedAt; + + /// + /// Gets the timestamp when the entry was last used by calling . + /// + public DateTime LastUsed { get => new DateTime(this._lastUsedTicks); } + private long _lastUsedTicks; + + /// + /// Resolved IP addresses. It's private, accesible through the call only. + /// + private readonly List _resolvedAddresses; + + /// + /// Flag that is set to true when the cache is refreshing this host. + /// + /// + /// When set to true, will always return as non-stalled. + /// + private int _isRefreshing; + + public DNSCacheEntry(Hash128 key, string host, List resolvedAddresses) + : this(key, host, DateTime.UtcNow.Ticks, resolvedAddresses) { } + + /// + /// Initializes a new instance of the DNSCacheEntry class. + /// + /// The 128-bit hash key derived from the host name. + /// The host name associated with this entry. + /// The list of containing the resolved IP addresses. + private DNSCacheEntry(Hash128 key, string host, long lastUsedTicks, List resolvedAddresses) + { + this.Key = key; + this.Host = host; + this.ResolvedAt = DateTime.UtcNow; + this._lastUsedTicks = lastUsedTicks; + + this._resolvedAddresses = resolvedAddresses; + } + + /// + /// Called to clone the entry. The new entry will inherit the last used timestamp. + /// + /// The list of containing the resolved IP addresses. + /// A new DNSCacheEntry instance with updated resolved addresses. + public DNSCacheEntry DeriveWith(List resolvedAddresses) => new DNSCacheEntry(this.Key, this.Host, this._lastUsedTicks, resolvedAddresses); + + /// + /// Checks if the entry is stalled and needs to be refreshed. + /// + /// The current timestamp. + /// true if the entry is stalled; otherwise, false. + /// + /// The entry is considered stalled if it is not currently being refreshed (i.e., is false) + /// and the time since the last resolution exceeds the refresh interval specified in . + /// + public bool IsStalled(DateTime now) => Volatile.Read(ref this._isRefreshing) == 0 && this.ResolvedAt + DNSCache.Options.RefreshAfter < now; + + /// + /// Checks if the entry is ready to be removed from the cache. + /// + /// The current timestamp. + /// true if the entry is ready for removal; otherwise, false. + /// + /// The entry is considered ready for removal if the time since it was last used exceeds the removal interval specified in . + /// + public bool IsReadyToRemove(DateTime now) => this.LastUsed + DNSCache.Options.RemoveAfter < now; + + /// + /// Refreshes the entry by initiating a DNS prefetch (by calling ) for the associated host name. + /// + /// + /// This method initiates a DNS prefetch operation for the host name associated with this entry. + /// DNS prefetching is used to resolve and cache DNS records for host names in advance, reducing latency for future network requests. + /// + public void Refresh() + { + if (Volatile.Read(ref this._isRefreshing) != 0) + return; + + // isRefreshing - we set it only to true, when the fresh records are in a new CacheEntry is created with isRefreshing beeing false. + if (Interlocked.CompareExchange(ref this._isRefreshing, 1, 0) == 0) + DNSCache.Prefetch(this.Host); + } + + /// + /// Gets the resolved IP addresses associated with this entry. + /// + /// An array of representing resolved IP addresses. + /// + /// This method returns the resolved IP addresses associated with this entry and updates the last used timestamp. + /// + public DNSIPAddress[] GetAddresses() + { + Interlocked.Exchange(ref this._lastUsedTicks, DateTime.UtcNow.Ticks); + + return this._resolvedAddresses.ToArray(); + } + + /// + /// Reports an IP address as non-working for the specified host name. In cases where a previously resolved IP address + /// is determined to be non-functional, this method updates the cache to mark the IP address as non-working. + /// + /// The non-working IP address to report. + /// Optional logging context for debugging purposes. + /// + /// This method is used to report an IP address associated with a host name as non-working. + /// When a previously resolved IP address is determined to be non-functional, this method updates the cache to mark the IP address as non-working. + /// It can be useful in situations where network errors or issues with specific IP addresses need to be recorded and managed. + /// + public void ReportNonWorking(System.Net.IPAddress nonWorking, LoggingContext context) + { + var address = this._resolvedAddresses.Find(adr => adr.IPAddress == nonWorking); + if (address != null) + { + // Because the TCP ringmaster not just probes an address, but a port of on that address, setting IsWorkedLastTime to false here + // means, that the address will be tried last even for a different port too. + address.IsWorkedLastTime = false; + } + else + { + // It could happen if a refresh query is started while a tcp race probing the previous addresses and when the refresh finished with different addresses the + // tcp race will try report non-working and now non-existing addresses. + + //HTTPManager.Logger.Warning(nameof(DNSCacheEntry), $"{nameof(ReportNonWorking)}({nonWorking}) - couldn't find IP address in resolved addresses!", context); + } + } + + public override string ToString() + { + var sb = StringBuilderPool.Get(1); + + sb.Append('['); + sb.Append(nameof(DNSCacheEntry)); + sb.Append(" Key: "); + sb.Append(this.Key.ToString()); + sb.Append(" ResolvedAt: "); + sb.Append(this.ResolvedAt.ToString()); + sb.Append(" LastUsed: "); + sb.Append(this.LastUsed.ToString()); + sb.Append(" IsRefreshing: "); + sb.Append(this._isRefreshing.ToString()); + sb.Append(" IsStalled: "); + sb.Append(this.IsStalled(DateTime.UtcNow)); + sb.Append(" IsReadyToRemove: "); + sb.Append(this.IsReadyToRemove(DateTime.UtcNow)); + sb.Append(" Resolved: ["); + for (int i = 0; i < this._resolvedAddresses?.Count; ++i) + { + sb.Append(this._resolvedAddresses[i].ToString()); + if (i < this._resolvedAddresses.Count - 1) + sb.Append(", "); + } + sb.Append(']'); + return StringBuilderPool.ReleaseAndGrab(sb); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs.meta new file mode 100644 index 00000000..6839ec78 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bf38c03c8439341498f03965f5313f67 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/DNS/Cache/DNSCacheEntry.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp.meta new file mode 100644 index 00000000..5f2c5212 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4b4965c6a5019e2408513706975c29c9 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs new file mode 100644 index 00000000..5c3ffdb8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs @@ -0,0 +1,114 @@ +using Best.HTTP.Shared.Streams; + +using System; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp +{ + /// + /// The IPeekableContentProvider interface defines an abstraction for providing content to an with the ability to peek at the content without consuming it. + /// It is an essential part of content streaming over a TCP connection. + /// + /// + /// + /// Key Functions of IPeekableContentProvider: + /// + /// + /// + /// Content ProvisionIt provides content to an associated without immediately consuming the content. This allows the consumer to examine the data before processing. + /// + /// + /// Two-Way BindingSupports establishing a two-way binding between the and an , enabling bidirectional communication between the provider and consumer. + /// + /// + /// UnbindingProvides methods for unbinding a content consumer, terminating the association between the provider and consumer. + /// + /// + /// + public interface IPeekableContentProvider + { + /// + /// Gets the associated with this content provider, which allows peeking at the content without consuming it. + /// + PeekableContentProviderStream Peekable { get; } + + /// + /// Gets the implementor that will be notified through calls when new data is available in the TCPStreamer. + /// + IContentConsumer Consumer { get; } + + /// + /// Sets up a two-way binding between this content provider and an . This enables bidirectional communication between the provider and consumer. + /// + /// The to bind to. + void SetTwoWayBinding(IContentConsumer consumer); + + /// + /// Unbinds the content provider from its associated content consumer. This terminates the association between the provider and consumer. + /// + void Unbind(); + + /// + /// Unbinds the content provider from a specific content consumer if it is currently bound to that consumer. + /// + /// The to unbind from. + void UnbindIf(IContentConsumer consumer); + + /// + /// Unbinds the content provider from a specific content consumer if it is currently bound to that consumer, and changes to the new consumer. + /// + /// The to unbind from. + /// The to bin to. + void SwitchIf(IContentConsumer from, IContentConsumer to); + } + + /// + /// The IContentConsumer interface represents a consumer of content provided by an . It defines methods for handling received content and connection-related events. + /// + /// + /// + /// Key Functions of IContentConsumer: + /// + /// + /// + /// Content HandlingDefines methods for handling incoming content, allowing consumers to process data as it becomes available. + /// + /// + /// Connection ManagementProvides event methods to notify consumers of connection closure and error conditions, facilitating graceful handling of connection-related issues. + /// + /// + /// + public interface IContentConsumer + { + /// + /// Gets the associated with this content consumer, which allows access to incoming content. + /// + PeekableContentProviderStream ContentProvider { get; } + + /// + /// This method should not be called directly. It is used internally to set the binding between the content consumer and its associated content provider. + /// + /// The to bind to. + void SetBinding(PeekableContentProviderStream contentProvider); + + /// + /// This method should not be called directly. It is used internally to unset the binding between the content consumer and its associated content provider. + /// + void UnsetBinding(); + + /// + /// Called when new content is available from the associated content provider. + /// + void OnContent(); + + /// + /// Called when the connection is closed by the remote peer. It notifies the content consumer about the connection closure. + /// + void OnConnectionClosed(); + + /// + /// Called when an error occurs during content processing or connection handling. It provides the exception that caused the error. + /// + /// The that represents the error condition. + void OnError(Exception ex); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs.meta new file mode 100644 index 00000000..09652a69 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: aa167ead2479e9b4fb2ccef181e854e2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Interfaces.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs new file mode 100644 index 00000000..61d66fc6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs @@ -0,0 +1,470 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Collections.Generic; +using System.Threading; + +#if !BESTHTTP_DISABLE_ALTERNATE_SSL +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.Shared.TLS; +#endif +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Hosts.Settings; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp +{ + /// + /// Represents the different steps of the negotiation process. + /// + public enum NegotiationSteps + { + Start, + DNSQuery, + TCPRace, + Proxy, + TLSNegotiation, + Finish + } + + /// + /// Interface for a peer that participates in the negotiation process. + /// + public interface INegotiationPeer + { + /// + /// Gets the list of supported ALPN protocol names for negotiation. + /// + /// The negotiation instance. + /// A list of supported ALPN protocol names. + List GetSupportedProtocolNames(Negotiator negotiator); + + /// + /// Indicates whether the negotiation process must stop advancing to the next step. + /// + /// The negotiation instance. + /// The step that has just finished. + /// The next step in the negotiation process. + /// An optional error encountered during negotiation. + /// true if negotiation must stop for any reason advancing to the next step; otherwise, false. + bool MustStopAdvancingToNextStep(Negotiator negotiator, NegotiationSteps finishedStep, NegotiationSteps nextStep, Exception error); + + /// + /// Handles the evaluation of a proxy negotiation failure. + /// + /// The negotiation instance. + /// The error encountered during proxy negotiation. + /// Indicates whether to resend for authentication. + void EvaluateProxyNegotiationFailure(Negotiator negotiator, Exception error, bool resendForAuthentication); + + /// + /// Handles the negotiation failure. + /// + /// The negotiation instance. + /// The error encountered during negotiation. + void OnNegotiationFailed(Negotiator negotiator, Exception error); + + /// + /// Handles the successful completion of negotiation. + /// + /// The negotiation instance. + /// The negotiated stream. + /// The TCP streamer. + /// The negotiated protocol. + void OnNegotiationFinished(Negotiator negotiator, PeekableContentProviderStream stream, TCPStreamer streamer, string negotiatedProtocol); + } + + /// + /// Represents the parameters for a negotiation. + /// + public sealed class NegotiationParameters + { + /// + /// Optional proxy instance must be used during negotiation. + /// + public HTTP.Proxies.Proxy proxy; + + /// + /// Sets a value indicating whether to create a proxy tunnel. + /// + public bool createProxyTunel; + + /// + /// Sets the target URI for negotiation. + /// + public Uri targetUri; + + /// + /// Sets a value indicating whether to negotiate TLS. + /// + public bool negotiateTLS; + + /// + /// Sets the cancellation token for negotiation. + /// + public CancellationToken token; + + /// + /// Sets the that can be used during the negotiation process. + /// + public HostSettings hostSettings; + + /// + /// Optional logging context for debugging purposes. + /// + public LoggingContext context; + } + + /// + /// The Negotiator class acts as a central coordinator for the negotiation of network connections, abstracting away the complexities of DNS resolution, TCP socket creation, proxy negotiation, and TLS setup. + /// It allows for customization and extensibility, making it a versatile tool for establishing network connections in a flexible and controlled manner. + /// + /// The Negotiator class represents a component responsible for managing the negotiation process. It helps facilitate communication with various network layers, such as DNS resolution, TCP socket creation, proxy handling, and TLS negotiation. + /// The class is designed to be flexible and extensible by allowing developers to define a custom negotiation peer that implements the INegotiationPeer interface. This allows developers to adapt the negotiation process to specific requirements and protocols. + /// It orchestrates the negotiation process through a series of steps defined by the NegotiationSteps enum. These steps include DNSQuery, TCPRace, Proxy, TLSNegotiation + /// Handles errors and exceptions that may occur during negotiation, ensuring graceful fallback or termination of the negotiation process when necessary. + /// When TLS negotiation is required, it selects the appropriate TLS negotiation method based on the configuration and available options, such as BouncyCastle or the system's TLS framework. + /// If a proxy is configured, the Negotiator class handles proxy negotiation and tunneling, allowing communication through a proxy server. + /// It supports cancellation through a CancellationToken, allowing the negotiation process to be canceled if needed. + /// The class uses extensive logging to provide information about the progress and outcomes of the negotiation process, making it easier to diagnose and debug issues. + /// + /// + public class Negotiator + { + /// + /// Gets the negotiation peer associated with this negotiator. + /// + public INegotiationPeer Peer { get => this._peer; } + private INegotiationPeer _peer; + + /// + /// Gets the negotiation parameters for this negotiator. + /// + public NegotiationParameters Parameters { get => this._parameters; } + private NegotiationParameters _parameters; + + /// + /// Gets the TCP streamer associated with this negotiator. + /// + public TCPStreamer Streamer { get => this._streamer; } + private TCPStreamer _streamer; + + /// + /// Gets the peekable content provider stream associated with this negotiator. + /// + public PeekableContentProviderStream Stream { get => this._stream; } + private PeekableContentProviderStream _stream; + + /// + /// Initializes a new instance of the Negotiator class. + /// + /// The negotiation peer for this negotiator. + /// The negotiation parameters for this negotiator. + public Negotiator(INegotiationPeer peer, NegotiationParameters parameters) + { + this._peer = peer; + this._parameters = parameters; + } + + /// + /// Starts the negotiation process. + /// + public void Start() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(Start)}()", this._parameters.context); + + if (!this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.Start, NegotiationSteps.DNSQuery, null)) + { + Uri target = this._parameters.proxy != null && this._parameters.proxy.UseProxyForAddress(this._parameters.targetUri) ? this._parameters.proxy.Address : this._parameters.targetUri; + + var parameters = new DNSQueryParameters(target); + parameters.Token = this._parameters.token; + parameters.Context = this._parameters.context; + + parameters.Callback = OnDNSCacheQueryFinished; + + DNSCache.Query(parameters); + } + } + + /// + /// Handles cancellation requests during negotiation. + /// + public void OnCancellationRequested() + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnCancellationRequested)}()", this._parameters.context); + + this._streamer?.Dispose(); + } + + private void OnDNSCacheQueryFinished(DNSQueryParameters dnsParameters, DNSQueryResult result) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnDNSCacheQueryFinished)}({dnsParameters}, {result})", this._parameters.context); + + if (!this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.DNSQuery, NegotiationSteps.TCPRace, result.Error)) + { + var tcpParameters = new TCPRaceParameters + { + Addresses = result.Addresses, + Hostname = dnsParameters.Address.Host, + Port = dnsParameters.Address.Port, + Context = this._parameters.context, + Token = this._parameters.token, + AnnounceWinnerCallback = OnTCPRaceFinished, + }; + + TCPRingmaster.StartCompetion(tcpParameters); + } + } + + private void OnTCPRaceFinished(TCPRaceParameters parameters, TCPRaceResult raceResult) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnTCPRaceFinished)}({parameters}, {raceResult})", this._parameters.context); + + NegotiationSteps nextStep = this._parameters.proxy != null ? NegotiationSteps.Proxy : (this._parameters.negotiateTLS ? NegotiationSteps.TLSNegotiation : NegotiationSteps.Finish); + + if (!this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.TCPRace, nextStep, raceResult.Error)) + { + try + { + SetupSocket(raceResult.WinningSocket, this.Parameters.hostSettings); + + var lowLevelSettings = this.Parameters.hostSettings.LowLevelConnectionSettings; + this._streamer = new TCPStreamer(raceResult.WinningSocket, + lowLevelSettings.ReadBufferSize, + lowLevelSettings.TCPWriteBufferSize, + this._parameters.context); + //this._streamer._debugRequest = this._parameters.optionalRequest; + + this._stream = new NonblockingTCPStream(this._streamer, false, lowLevelSettings.ReadBufferSize); + + if (this._parameters.proxy != null) + { + var proxyParameters = new HTTP.Proxies.ProxyConnectParameters() + { + proxy = this._parameters.proxy, + uri = this._parameters.targetUri, + token = this._parameters.token, + stream = this._stream, + context = this._parameters.context, + createTunel = this._parameters.negotiateTLS || this._parameters.createProxyTunel, + + //request = this._parameters.optionalRequest, + + OnSuccess = OnProxyNegotiated, + OnError = OnProxyNegotiationFailed + }; + + this._parameters.proxy.BeginConnect(proxyParameters); + } + else + { + NegotiateTLS(); + } + } + catch (Exception ex) + { + this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.TCPRace, NegotiationSteps.Finish, ex); + } + } + } + + private void OnProxyNegotiated(HTTP.Proxies.ProxyConnectParameters parameters) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnProxyNegotiated)}({parameters})", this._parameters.context); + + NegotiationSteps nextStep = this._parameters.negotiateTLS ? NegotiationSteps.TLSNegotiation : NegotiationSteps.Finish; + + if (!this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.Proxy, nextStep, null)) + NegotiateTLS(); + } + + private void OnProxyNegotiationFailed(HTTP.Proxies.ProxyConnectParameters parameters, Exception error, bool resendForAuthentication) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnProxyNegotiationFailed)}({parameters}, {error}, {resendForAuthentication})", this._parameters.context); + + this._peer.EvaluateProxyNegotiationFailure(this, error, resendForAuthentication); + } + + private void NegotiateTLS() + { + try + { + var hostSettings = this.Parameters.hostSettings; //HTTPManager.PerHostSettings.Get(this._parameters.targetUri); + + if (this._parameters.negotiateTLS) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(NegotiateTLS)}()", this._parameters.context); + + var handlerType = hostSettings.TLSSettings.TLSHandler; + switch (handlerType) + { +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + case TLSHandlers.BouncyCastle: + { + List protocols = new List(); + + foreach (var protocol in this._peer.GetSupportedProtocolNames(this)) + protocols.Add(ProtocolName.AsUtf8Encoding(protocol)); + + AbstractTls13Client tlsClient = null; + if (hostSettings.TLSSettings.BouncyCastleSettings.TlsClientFactory == null) + { + tlsClient = BouncyCastleSettings.DefaultTlsClientFactory(this._parameters.targetUri, protocols, this._parameters.context); + } + else + { + try + { + tlsClient = hostSettings.TLSSettings.BouncyCastleSettings.TlsClientFactory(this._parameters.targetUri, protocols, this._parameters.context); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(Negotiator), nameof(hostSettings.TLSSettings.BouncyCastleSettings.TlsClientFactory), ex, this._parameters.context); + } + + if (tlsClient == null) + tlsClient = BouncyCastleSettings.DefaultTlsClientFactory(this._parameters.targetUri, protocols, this._parameters.context); + } + + var handler = new TlsClientProtocol(); + handler.Connect(tlsClient); + + new NonblockingBCTLSStream(this._streamer, handler, tlsClient, true, this.Parameters.hostSettings.LowLevelConnectionSettings.ReadBufferSize) + .OnNegotiated = OnBC_TLSNegotiated; + } + break; +#endif + + case TLSHandlers.Framework: + new FrameworkTLSStream(this._streamer, this._parameters.targetUri.Host, this.Parameters.hostSettings) + .OnNegotiated = OnFramework_TLSNegotiated; + break; + + default: + throw new NotImplementedException($"Not Implemented: {handlerType} TLS Negotiation"); + } + } + else + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(this._peer.OnNegotiationFinished)}()", this._parameters.context); + + if (this._stream is not NonblockingTCPStream) + this._stream = new NonblockingTCPStream(this._streamer, true, this.Parameters.hostSettings.LowLevelConnectionSettings.ReadBufferSize); + this._peer.OnNegotiationFinished(this, this._stream, this._streamer, HTTPProtocolFactory.W3C_HTTP1); + } + } + catch (Exception ex) + { + this._peer.MustStopAdvancingToNextStep(this, NegotiationSteps.TLSNegotiation, NegotiationSteps.Finish, ex); + } + } + + private void OnFramework_TLSNegotiated(FrameworkTLSStream stream, TCPStreamer streamer, string alpn, Exception error) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnFramework_TLSNegotiated)}(\"{alpn}\", {error})", this._parameters.context); + + this._stream = stream; + + if (error != null) + this._peer.OnNegotiationFailed(this, error); + else + this._peer.OnNegotiationFinished(this, stream, streamer, alpn); + } + +#if !BESTHTTP_DISABLE_ALTERNATE_SSL + private void OnBC_TLSNegotiated(NonblockingBCTLSStream stream, TCPStreamer streamer, AbstractTls13Client tlsClient, Exception error) + { + string alpn = tlsClient.GetNegotiatedApplicationProtocol(); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(Negotiator), $"{nameof(OnBC_TLSNegotiated)}(\"{alpn}\", {error})", this._parameters.context); + + // set the stream early if we return because of PreprocessRequestState, Dispose wouldn't call stream's Dispose + this._stream = stream; + + if (error != null) + this._peer.OnNegotiationFailed(this, error); + else + this._peer.OnNegotiationFinished(this, stream, streamer, alpn); + } +#endif + + private void SetupSocket(System.Net.Sockets.Socket socket, HostSettings hostSettings) + { +#if UNITY_WINDOWS || UNITY_EDITOR + // Set the keep-alive time and interval on windows + + // https://msdn.microsoft.com/en-us/library/windows/desktop/dd877220%28v=vs.85%29.aspx + // https://msdn.microsoft.com/en-us/library/windows/desktop/ee470551%28v=vs.85%29.aspx + try + { + SetKeepAlive(socket, true, 30000, 1000); + } + catch { } +#endif + + try + { + // data sending is buffered for all protocols, so when we put data into the socket we want to send them asap + socket.NoDelay = true; + } + catch (Exception ex) + { + HTTPManager.Logger.Warning(nameof(Negotiator), $"{nameof(SetupSocket)} - NoDelay- {ex.Message}", this.Parameters.context); + } + + try + { + // Don't let the sockets linger in the CLOSE_WAIT state + socket.SetSocketOption(System.Net.Sockets.SocketOptionLevel.Socket, System.Net.Sockets.SocketOptionName.ReuseAddress, false); + } + catch { } + } + +#if UNITY_WINDOWS || UNITY_EDITOR + private void SetKeepAlive(System.Net.Sockets.Socket socket, bool on, uint keepAliveTime, uint keepAliveInterval) + { + int size = System.Runtime.InteropServices.Marshal.SizeOf(new uint()); + + var inOptionValues = new byte[size * 3]; + + BitConverter.GetBytes((uint)(on ? 1 : 0)).CopyTo(inOptionValues, 0); + BitConverter.GetBytes((uint)keepAliveTime).CopyTo(inOptionValues, size); + BitConverter.GetBytes((uint)keepAliveInterval).CopyTo(inOptionValues, size * 2); + + //client.IOControl(IOControlCode.KeepAliveValues, inOptionValues, null); + int dwBytesRet = 0; + WSAIoctl(socket.Handle, + /*SIO_KEEPALIVE_VALS*/ System.Net.Sockets.IOControlCode.KeepAliveValues, + inOptionValues, + inOptionValues.Length, + /*NULL*/IntPtr.Zero, + 0, + ref dwBytesRet, + /*NULL*/IntPtr.Zero, + /*NULL*/IntPtr.Zero); + } + + [System.Runtime.InteropServices.DllImport("Ws2_32.dll")] + private static extern int WSAIoctl( + /* Socket, Mode */ IntPtr s, System.Net.Sockets.IOControlCode dwIoControlCode, + /* Optional Or IntPtr.Zero, 0 */ byte[] lpvInBuffer, int cbInBuffer, + /* Optional Or IntPtr.Zero, 0 */ IntPtr lpvOutBuffer, int cbOutBuffer, + /* reference to receive Size */ ref int lpcbBytesReturned, + /* IntPtr.Zero, IntPtr.Zero */ IntPtr lpOverlapped, IntPtr lpCompletionRoutine); +#endif + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs.meta new file mode 100644 index 00000000..81ebc8c0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b5c0db4c5f3cd624998d9604696a485e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Negotiator.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams.meta new file mode 100644 index 00000000..fa739a40 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 4a5f7f7b9c37db942b1913910fc1e5a5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs new file mode 100644 index 00000000..ba5b822e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs @@ -0,0 +1,182 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Collections.Generic; +using System.IO; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams +{ + public sealed class FrameworkTLSByteForwarder : Stream, ITCPStreamerContentConsumer + { + public override bool CanRead => true; + public override bool CanSeek => false; + public override bool CanWrite => true; + public override long Length { get { return this._length; } } + private long _length; + + public override long Position { get => throw new NotImplementedException(); set => throw new NotImplementedException(); } + + public long MaxBufferSize { get => Volatile.Read(ref this._maxBufferSize); set => Interlocked.Exchange(ref this._maxBufferSize, value); } + private long _maxBufferSize; + + private TCPStreamer _streamer; + private LoggingContext _context; + private ITCPStreamerContentConsumer _contentConsumer; + + private Queue _segmentsToReadFrom = new Queue(8); + + private AutoResetEvent _are = new AutoResetEvent(false); + private ReaderWriterLockSlim _rws = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + private BufferSegment _currentReadSegment = BufferSegment.Empty; + + public FrameworkTLSByteForwarder(TCPStreamer streamer, ITCPStreamerContentConsumer contentConsumer, long maxBufferSize, LoggingContext context) + { + this._streamer = streamer; + this._streamer.ContentConsumer = this; + + this._contentConsumer = contentConsumer; + + this._context = context; + this._maxBufferSize = maxBufferSize; + } + + public void /*ITCPStreamerContentConsumer.*/ Write(BufferSegment buffer) + { + using var _ = new AutoReleaseBuffer(buffer); + this.Write(buffer.Data, buffer.Offset, buffer.Count); + } + + int _pullContentInProgress; + + void PullContentFromStreamer() + { + //using var _ = new WriteLock(this._rws); + if (Interlocked.CompareExchange(ref _pullContentInProgress, 1, 0) != 0) + return; + + try + { + while (this._streamer.Length > 0 && this._length < this.MaxBufferSize) + { + var tmp = this._streamer.DequeueReceived(); + + if (tmp.Count <= 0) + { + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"DequeueReceived({tmp}) !", this._context); + + BufferPool.Release(tmp); + return; + } + + this._segmentsToReadFrom.Enqueue(tmp); + this._length += tmp.Count; + } + } + finally + { + Interlocked.Exchange(ref _pullContentInProgress, 0); + } + } + + public void /*ITCPStreamerContentConsumer.*/ OnContent(TCPStreamer streamer) + { + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"OnContent({streamer?.Length})", this._context); + + PullContentFromStreamer(); + + this._are?.Set(); + + this._contentConsumer?.OnContent(streamer); + } + + public void /*ITCPStreamerContentConsumer.*/ OnConnectionClosed(TCPStreamer streamer) => this._contentConsumer?.OnConnectionClosed(streamer); + + public void /*ITCPStreamerContentConsumer.*/ OnError(TCPStreamer streamer, Exception ex) => this._contentConsumer?.OnError(streamer, ex); + + // Called by SslStream.Read expecting encrypted content + public override int Read(byte[] buffer, int offset, int count) + { + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"Read({offset}, {count})", this._context); + + PullContentFromStreamer(); + + int sumReadCount = 0; + + while (this._currentReadSegment == BufferSegment.Empty && this._segmentsToReadFrom.Count == 0) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"WaitOne() for new data!", this._context); + + if (this.Length == 0) + this._are.WaitOne(); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"WaitOne() returned!", this._context); + } + + while ((this._currentReadSegment != BufferSegment.Empty || this._segmentsToReadFrom.Count > 0) && count > 0) + { + if (this._currentReadSegment != BufferSegment.Empty) + { + int readCount = Math.Min(count, this._currentReadSegment.Count); + Array.Copy(this._currentReadSegment.Data, this._currentReadSegment.Offset, buffer, offset, readCount); + offset += readCount; + count -= readCount; + sumReadCount += readCount; + + if (this._currentReadSegment.Count <= readCount) + this._currentReadSegment = BufferSegment.Empty; + else + this._currentReadSegment = this._currentReadSegment.Slice(this._currentReadSegment.Offset + readCount); + } + else + { + this._currentReadSegment = this._segmentsToReadFrom.Dequeue(); + } + } + + this._length -= sumReadCount; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"Read() returns with readCount: {sumReadCount}, remaining: {this._length}", this._context); + + return sumReadCount; + } + + // Called by SslStream.Write with encrypted payload + public override void Write(byte[] buffer, int offset, int count) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSByteForwarder), $"Write({buffer.AsBuffer(offset, count)})", this._context); + + var queued = BufferPool.Get(count, true, this._context); + + Array.Copy(buffer, offset, queued, 0, count); + + this._streamer.EnqueueToSend(queued.AsBuffer(count)); + } + + public override void Flush() { } + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) => throw new NotImplementedException(); + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._are?.Dispose(); + this._are = null; + + this._rws?.Dispose(); + this._rws = null; + + this._streamer?.Dispose(); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs.meta new file mode 100644 index 00000000..8cb11159 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c78a502070c09ea489f93f800efb2e28 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSByteForwarder.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs new file mode 100644 index 00000000..56c4fd91 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs @@ -0,0 +1,297 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Net.Security; +using System.Security.Cryptography.X509Certificates; +using System.Threading; + +using Best.HTTP.Hosts.Connections; +using Best.HTTP.Hosts.Settings; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams +{ + /* + * --> FrameworkTLSStream.Write => SslStream.Write => TLSByteForwarder.Write => TCPStream.EnqueueToSend + * + * --> TLSByteForwarder.OnContent => SslStream.Read => FrameworkTLSStream.Read + * */ + public sealed class FrameworkTLSStream : PeekableContentProviderStream, ITCPStreamerContentConsumer + { + public Action OnNegotiated; + public long MaxBufferSize { get => Volatile.Read(ref this._maxBufferSize); set => Interlocked.Exchange(ref this._maxBufferSize, value); } + private long _maxBufferSize; + + private string _targetHost; + private TCPStreamer _streamer; + private FrameworkTLSByteForwarder _forwarder; + private SslStream _sslStream; + private LoggingContext _context; + private HostSettings _hostSettings; + + private int peek_listIdx; + private int peek_pos; + +#if UNITY_2021_2_OR_NEWER + private static bool loggedWarning = false; +#endif + private object locker = new object(); + + public FrameworkTLSStream(TCPStreamer streamer, string targetHost, HostSettings hostSettings) + { + this._streamer = streamer; + this._targetHost = targetHost; + this._context = new LoggingContext(this); + this._context.Add("streamer", this._streamer.Context); + + this._hostSettings = hostSettings; + this._maxBufferSize = hostSettings.LowLevelConnectionSettings.ReadBufferSize; + + this._forwarder = new FrameworkTLSByteForwarder(this._streamer, this, this.MaxBufferSize, this._context); + this._sslStream = new SslStream(this._forwarder, + leaveInnerStreamOpen: false, + OnUserCertificationValidation, + OnUserCertificationSelection, + EncryptionPolicy.RequireEncryption); + + this._sslStream.BeginAuthenticateAsClient(targetHost, + null, + this._hostSettings.TLSSettings.FrameworkTLSSettings.TlsVersions, + true, + OnAuthenticatedAsClient, + null); + } + + private bool OnUserCertificationValidation(object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors) + { + HTTPManager.Logger.Information(nameof(FrameworkTLSStream), $"{nameof(OnUserCertificationValidation)}({sender}, {certificate}, {chain}, {sslPolicyErrors})", this._context); + + var validator = this._hostSettings.TLSSettings.FrameworkTLSSettings.CertificationValidator; + if (validator == null) + return FrameworkTLSSettings.DefaultCertificationValidator(_targetHost, certificate, chain, sslPolicyErrors); + + return validator(this._targetHost, certificate, chain, sslPolicyErrors); + } + + private X509Certificate OnUserCertificationSelection(object sender, string targetHost, X509CertificateCollection localCertificates, X509Certificate remoteCertificate, string[] acceptableIssuers) + { + HTTPManager.Logger.Information(nameof(FrameworkTLSStream), $"{nameof(OnUserCertificationSelection)}({sender}, {targetHost}, {localCertificates}, {remoteCertificate}, {acceptableIssuers?.Length})", this._context); + + return this._hostSettings.TLSSettings.FrameworkTLSSettings.ClientCertificationProvider?.Invoke(targetHost, localCertificates, remoteCertificate, acceptableIssuers); + } + + private void OnAuthenticatedAsClient(IAsyncResult ar) + { + HTTPManager.Logger.Information(nameof(FrameworkTLSStream), $"{nameof(OnAuthenticatedAsClient)}()", this._context); + + try + { + this._sslStream.EndAuthenticateAsClient(ar); + + string alpn = string.Empty; + +#if UNITY_2021_2_OR_NEWER + try + { + alpn = this._sslStream.NegotiatedApplicationProtocol.ToString(); + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(FrameworkTLSStream), $"{nameof(OnAuthenticatedAsClient)}() - NegotiatedApplicationProtocol", ex, this._context); + + if (!loggedWarning) + { + loggedWarning = true; + HTTPManager.Logger.Warning(nameof(FrameworkTLSStream), $"{nameof(OnAuthenticatedAsClient)}(): SslStream's NegotiatedApplicationProtocol inaccessible! Using http/1.", this._context); + } + } +#endif + + if (string.IsNullOrEmpty(alpn)) + alpn = HTTPProtocolFactory.W3C_HTTP1; + + CallOnNegotiated(alpn, null); + + BeginRead(); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(FrameworkTLSStream), $"{nameof(OnAuthenticatedAsClient)}()", ex, this._context); + + CallOnNegotiated(null, ex); + } + } + + bool CallOnNegotiated(string alpn, Exception error) + { + HTTPManager.Logger.Verbose(nameof(FrameworkTLSStream), $"CallOnNegotiated(\"{alpn}\", {error})", this._context); + + var callback = Interlocked.CompareExchange(ref this.OnNegotiated, null, this.OnNegotiated); + if (callback != null) + { + try + { + callback(this, this._streamer, alpn, error); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(FrameworkTLSStream), "OnContent - OnNegotiated", ex, this._streamer.Context); + } + } + + return callback != null; + } + + public override void BeginPeek() + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + + public override int PeekByte() + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + + public void OnContent(TCPStreamer streamer) + { + if (this._sslStream.IsAuthenticated) + BeginRead(); + } + + int _reading; + private void BeginRead() + { + if (Interlocked.CompareExchange(ref _reading, 1, 0) != 0) + { + //HTTPManager.Logger.Warning(nameof(FrameworkTLSStream), $"{nameof(BeginRead)}() - already reading!", this._context); + return; + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSStream), $"{nameof(BeginRead)}()", this._context); + + var buffer = BufferPool.Get(Math.Min(this.MaxBufferSize, 1 * 1024 * 1024), true, this._context); + + this._sslStream.ReadAsync(buffer, 0, buffer.Length) + //.AsTask() + .ContinueWith((ti) => + { + int readCount = 0; + try + { + readCount = ti.Result; + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSStream), $"{nameof(OnRead)}({readCount}, {this.Length})", this._context); + + if (readCount > 0) + { + lock (locker) + base.Write(buffer.AsBuffer(readCount)); + } + + this.Consumer?.OnContent(); + } + finally + { + Interlocked.Exchange(ref _reading, 0); + + if (readCount > 0) + BeginRead(); + } + }) + .ConfigureAwait(false); + + /*IAsyncResult ar = null; + try + { + do + { + var buffer = BufferPool.Get(Math.Min(this.MaxBufferSize, 1 * 1024 * 1024), true, this._context); + + ar = this._sslStream.BeginRead(buffer, 0, buffer.Length, OnRead, buffer); + } while (ar != null && ar.CompletedSynchronously); + } + finally + { + Interlocked.Exchange(ref _reading, 0); + + //if (ar is not null && ar.CompletedSynchronously) + // BeginRead(); + }*/ + } + + private void OnRead(IAsyncResult ar) + { + try + { + var readCount = this._sslStream.EndRead(ar); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(FrameworkTLSStream), $"{nameof(OnRead)}({readCount}, {ar.CompletedSynchronously})", this._context); + + if (readCount > 0) + { + var buffer = ar.AsyncState as byte[]; + lock (locker) + base.Write(buffer.AsBuffer(readCount)); + + this.Consumer?.OnContent(); + } + + // This call might fail if the read completed synchronously. + BeginRead(); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(FrameworkTLSStream), $"EndRead", ex, this._context); + } + finally + { + + } + } + + public void OnConnectionClosed(TCPStreamer streamer) => this.Consumer?.OnConnectionClosed(); + + public void OnError(TCPStreamer streamer, Exception ex) => this.Consumer?.OnError(ex); + + public override int Read(byte[] buffer, int offset, int count) { lock (locker) return base.Read(buffer, offset, count); } + + public override void Write(byte[] buffer, int offset, int count) => this._sslStream.Write(buffer, offset, count); + + public override void Write(BufferSegment bufferSegment) + { + using var _ = new AutoReleaseBuffer(bufferSegment); + this.Write(bufferSegment.Data, bufferSegment.Offset, bufferSegment.Count); + } + + public override void Flush() => this._sslStream.Flush(); + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._sslStream?.Dispose(); + this._sslStream = null; + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs.meta new file mode 100644 index 00000000..2cad6245 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1a8f61b94735e634da61bc8b1324b56f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/FrameworkTLSStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs new file mode 100644 index 00000000..b34190b7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs @@ -0,0 +1,300 @@ +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; +using Best.HTTP.Shared.TLS; + +using System; +using System.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams +{ + public sealed class NonblockingBCTLSStream : PeekableContentProviderStream, ITCPStreamerContentConsumer + { + public Action OnNegotiated; + + public long MaxBufferSize { get => Volatile.Read(ref this._maxBufferSize); set => Interlocked.Exchange(ref this._maxBufferSize, value); } + private long _maxBufferSize; + + private TlsClientProtocol _tlsClientProtocol; + private AbstractTls13Client _tlsClient; + + //private ReaderWriterLockSlim _rwLock = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + private object locker = new object(); + private TCPStreamer _streamer; + private uint _sendBufferSize; + private bool _disposeStreamer; + + private int peek_listIdx; + private int peek_pos; + + private bool _disposed; + + public NonblockingBCTLSStream(TCPStreamer streamer, TlsClientProtocol tlsClientProtocol, AbstractTls13Client tlsClient, bool disposeStreamer, uint maxBufferSize) + { + this._streamer = streamer; + this._streamer.ContentConsumer = this; + this._disposeStreamer = disposeStreamer; + + // Maximize buffer use + this._sendBufferSize = this._streamer.MaxBufferedWriteAmount; + + this._tlsClientProtocol = tlsClientProtocol; + this._tlsClient = tlsClient; + + this.Write(null, 0, 0); + + if (streamer.IsConnectionClosed) + CallOnNegotiated(new Exception("Connection closed before TLS negotiation started!")); + + this._maxBufferSize = maxBufferSize; + } + + public override void BeginPeek() + { + lock (this.locker) + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + } + + public override int PeekByte() + { + lock (this.locker) + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + } + + // Called when content from the server is available + public void OnContent(TCPStreamer streamer) + { + lock (this.locker) + { + var socket = this._streamer?.Socket; + + // Ignore content after a TLS client protocol closure (it can happen because of an error, but the server still pumping data to the client). + if (this._disposed || socket == null || this._tlsClientProtocol.IsClosed) + { + if (this._tlsClientProtocol.IsHandshaking) + CallOnNegotiated(new Exception("Connection closed while TLS negotiation is in progress!")); + return; + } + + try + { + PullContentFromStreamer(); + } + catch (Exception ex) + { + if (!CallOnNegotiated(ex)) + this.Consumer?.OnError(ex); + } + + // There's no read/write when it's still hanshaking, so we have to simulate one. + if (this._tlsClientProtocol.IsHandshaking) + { + this.Write(null, 0, 0); + return; + } + else + CallOnNegotiated(null); + + // Call OnContent only if we have something to offer. + if (this.Length > 0) + this.Consumer?.OnContent(); + } + } + + public void OnConnectionClosed(TCPStreamer streamer) + { + var consumer = this.Consumer; + if (consumer != null) + consumer.OnConnectionClosed(); + else + CallOnNegotiated(new Exception("TCP Connection closed during TLS negotiation!")); + } + + public void OnError(TCPStreamer streamer, Exception ex) + { + var consumer = this.Consumer; + if (consumer != null) + consumer.OnError(ex); + else + CallOnNegotiated(ex); + } + + // TODO: It can throw an exception (for example in case of a bad record mac :/), we have to + // 1.) handle it + // 2.) report to the consumer (through an OnError call) + // 3.) prevent other read/write attempts. + private void PullContentFromStreamer() + { + while (!this._disposed && this._streamer.Length > 0 && this._length < this.MaxBufferSize) + { + var tmp = this._streamer.DequeueReceived(); + + if (tmp.Count <= 0) + { + BufferPool.Release(tmp); + return; + } + + try + { + this._tlsClientProtocol.OfferInput(tmp.Data, tmp.Offset, tmp.Count); + + // each call of OfferInput might generate data (for example alerts) to send to the remote peer! + this.Write(null, 0, 0); + } + catch (Exception ex) + { + BufferPool.Release(tmp); + + // each call of OfferInput might generate data (for example alerts) to send to the remote peer! + this.Write(null, 0, 0); + CallOnNegotiated(ex); + + throw; + } + + int available = this._tlsClientProtocol.GetAvailableInputBytes(); + byte[] readBuffer = tmp.Data; + while (available > 0) + { + if (readBuffer == null) + readBuffer = BufferPool.Get(available, true, this._streamer.Context); + var readCount = this._tlsClientProtocol.ReadInput(readBuffer, 0, readBuffer.Length); + + base.Write(readBuffer.AsBuffer(readCount)); + readBuffer = null; + + available = this._tlsClientProtocol.GetAvailableInputBytes(); + } + + BufferPool.Release(readBuffer); + } + } + + public override int Read(byte[] buffer, int offset, int count) + { + lock (this.locker) + { + var readCount = base.Read(buffer, offset, count); + + // pull content from the streamer, if buffered amount is less then the desired. + if (base.Length <= this.MaxBufferSize) + { + try + { + PullContentFromStreamer(); + } + catch (Exception ex) + { + this.Consumer.OnError(ex); + } + } + + return readCount; + } + } + + // write -> tls encoding -> TCP streamer + public override void Write(byte[] buffer, int offset, int count) + { + lock (this.locker) + { + var streamer = this._streamer; + if (streamer == null) + return; + + if (buffer != null && count > 0) + this._tlsClientProtocol.WriteApplicationData(buffer, offset, count); + + int available = 0; + available = this._tlsClientProtocol.GetAvailableOutputBytes(); + while (available > 0) + { + var tmp = BufferPool.Get(this._sendBufferSize, true, streamer.Context); + int readCount = 0; + + try + { + readCount = this._tlsClientProtocol.ReadOutput(tmp, 0, tmp.Length); + } + catch + { + BufferPool.Release(tmp); + throw; + } + + streamer.EnqueueToSend(tmp.AsBuffer(readCount)); + + available = this._tlsClientProtocol.GetAvailableOutputBytes(); + } + } + } + + public override void Write(BufferSegment bufferSegment) + { + lock (this.locker) + { + using var _ = new AutoReleaseBuffer(bufferSegment); + Write(bufferSegment.Data, bufferSegment.Offset, bufferSegment.Count); + } + } + + bool CallOnNegotiated(Exception error) + { + var callback = Interlocked.CompareExchange(ref this.OnNegotiated, null, this.OnNegotiated); + if (callback != null) + { + try + { + callback(this, this._streamer, this._tlsClient, error); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(NonblockingBCTLSStream), "CallOnNegotiated", ex, this._streamer.Context); + } + } + + return callback != null; + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (this._disposed) + return; + + HTTPManager.Logger.Verbose(nameof(NonblockingBCTLSStream), "Dispose", this._streamer.Context); + + this._disposed = true; + this._tlsClientProtocol?.Close(); + + if (this._disposeStreamer) + this._streamer?.Dispose(); + this._streamer = null; + //this._rwLock?.Dispose(); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs.meta new file mode 100644 index 00000000..20ba3da5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: db49d73dab50cad4a92350516ec20d8d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingBCTLSStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs new file mode 100644 index 00000000..2368e6dd --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs @@ -0,0 +1,153 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +using System; +using System.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams +{ + /// + /// A non-blocking-read stream over a TCPStreamer that buffers the received bytes from the network in a Peekable stream. + /// + public sealed class NonblockingTCPStream : PeekableContentProviderStream, ITCPStreamerContentConsumer + { + public long MaxBufferSize { get => Volatile.Read(ref this._maxBufferSize); set => Interlocked.Exchange(ref this._maxBufferSize, value); } + private long _maxBufferSize; + + private TCPStreamer _streamer; + private bool _disposeStreamer; + + private int peek_listIdx; + private int peek_pos; + + private object _locker = new object(); + + public NonblockingTCPStream(TCPStreamer streamer, bool disposeStreamer, uint maxBufferSize) + { + this._streamer = streamer; + this._streamer.ContentConsumer = this; + this._disposeStreamer = disposeStreamer; + this._maxBufferSize = maxBufferSize; + } + + public override void BeginPeek() + { + lock (this._locker) + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + } + + public override int PeekByte() + { + lock (this._locker) + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + lock (this._locker) + { + if (this._streamer != null) + this._streamer.ContentConsumer = null; + + if (this._disposeStreamer) + this._streamer?.Dispose(); + this._streamer = null; + } + } + + // PeekableStream's default implementation of write would place the buffer into its inner segment list, + // but here we want to send it to the server instead. + public override void Write(byte[] buffer, int offset, int count) => this._streamer.EnqueueToSend(buffer.CopyAsBuffer(offset, count)); + + public override void Write(BufferSegment buffer) => this._streamer.EnqueueToSend(buffer); + + public override int Read(byte[] buffer, int offset, int count) + { + lock (this._locker) + { + int readCount = base.Read(buffer, offset, count); + + // pull content from the streamer, if buffered amount is less then the desired. + if (base.Length <= this.MaxBufferSize) + { + DequeueFromStreamer(); + this._streamer.BeginReceive(); + } + + return readCount; + } + } + + public void OnContent(TCPStreamer streamer) + { + lock (this._locker) + { + DequeueFromStreamer(); + + var consumer = this.Consumer; + if (consumer != null) + consumer?.OnContent(); + else + HTTPManager.Logger.Error(nameof(NonblockingTCPStream), $"{nameof(OnContent)}({streamer}) - No consumer to call OnContent on!", streamer.Context); + } + } + + public void OnConnectionClosed(TCPStreamer streamer) + { + var consumer = this.Consumer; + + if (consumer != null) + consumer?.OnConnectionClosed(); + else + HTTPManager.Logger.Error(nameof(NonblockingTCPStream), $"{nameof(OnConnectionClosed)}({streamer}) - No consumer to call OnConnectionClosed on!", streamer.Context); + } + + public void OnError(TCPStreamer streamer, Exception ex) + { + var consumer = this.Consumer; + if (consumer != null) + consumer?.OnError(ex); + else + HTTPManager.Logger.Error(nameof(NonblockingTCPStream), $"{nameof(OnError)}({streamer}, {ex}) - No consumer to call OnError on!", streamer.Context); + } + + void DequeueFromStreamer() + { + if (this._streamer == null) + return; + + while (this._streamer.Length > 0 && this._length < this.MaxBufferSize) + { + var segment = this._streamer.DequeueReceived(); + + if (segment.Count <= 0) + return; + + base.Write(segment); + } + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs.meta new file mode 100644 index 00000000..16b8dcf8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e4c36b588df49d147981ba1e73401b7e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingTCPStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs new file mode 100644 index 00000000..25ae2d4a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs @@ -0,0 +1,163 @@ +using System; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Streams; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp.Streams +{ + public sealed class NonblockingUnderlyingStream : PeekableContentProviderStream + { + private System.IO.Stream _stream; + private int _receiving; + private uint _maxBufferSize; + + private LoggingContext _context; + + private object _locker = new object(); + private int peek_listIdx; + private int peek_pos; + + public NonblockingUnderlyingStream(System.IO.Stream stream, uint maxBufferSize, LoggingContext context) + { + this._stream = stream; + this._context = context; + this._maxBufferSize = maxBufferSize; + + if (!stream.CanRead) + throw new NotSupportedException("Stream.Read"); + } + + public override int Read(byte[] buffer, int offset, int count) + { + lock (this._locker) + { + int readCount = base.Read(buffer, offset, count); + + if (base.Length <= this._maxBufferSize) + BeginReceive(); + + return readCount; + } + } + + public void BeginReceive() + { + if (base._length < this._maxBufferSize && Interlocked.CompareExchange(ref this._receiving, 1, 0) == 0 && this._stream.CanRead) + { + long readCount = this._maxBufferSize - base._length; + var readBuffer = BufferPool.Get(readCount, true, this._context); + + try + { + var ar = this._stream.BeginRead(readBuffer, 0, (int)readCount, OnReceived, readBuffer); + + if (ar.CompletedSynchronously) + HTTPManager.Logger.Warning(nameof(NonblockingUnderlyingStream), $"CompletedSynchronously!", this._context); + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(NonblockingUnderlyingStream), $"{nameof(this._stream.BeginRead)}", ex, this._context); + + BufferPool.Release(Interlocked.Exchange(ref readBuffer, null)); + + this.Consumer.OnError(ex); + } + } + } + + private void OnReceived(IAsyncResult ar) + { + int readCount = 0; + bool isClosed = true; + var readBuffer = ar.AsyncState as byte[]; + + try + { + readCount = this._stream.EndRead(ar); + isClosed = readCount <= 0; + + if (!isClosed) + { + lock (this._locker) + base.Write(readBuffer.AsBuffer(0, readCount)); + + try + { + this.Consumer?.OnContent(); + } + catch (Exception e) + { + HTTPManager.Logger.Exception(nameof(NonblockingUnderlyingStream), "ContentConsumer.OnContent", e, this._context); + } + } + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(NonblockingUnderlyingStream), $"{nameof(OnReceived)}", ex, this._context); + } + finally + { + if (!isClosed) + { + Interlocked.Exchange(ref this._receiving, 0); + BeginReceive(); + } + else + { + BufferPool.Release(readBuffer); + + try + { + this.Consumer?.OnConnectionClosed(); + } + catch (Exception e) + { + HTTPManager.Logger.Exception(nameof(NonblockingUnderlyingStream), "Consumer.OnConnectionClosed", e, this._context); + } + } + } + } + + public override void BeginPeek() + { + lock (this._locker) + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + } + + public override int PeekByte() + { + lock (this._locker) + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + this._stream.Dispose(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs.meta new file mode 100644 index 00000000..3f48a40d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: efbc3c9e712aef64b8f0de50c6fa0ad5 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/Streams/NonblockingUnderlyingStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs new file mode 100644 index 00000000..69a78dc2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs @@ -0,0 +1,448 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Net.Sockets; +using System.Threading; + +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Network.DNS.Cache; +using Best.HTTP.Shared.PlatformSupport.Text; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp +{ + /// + /// Contains settings related to TCP Ringmaster, which manages and optimizes TCP connections. + /// + public sealed class TCPRingmasterSettings + { + /// + /// The maximum number of simultaneous TCP racers. Racers are used to establish and manage connections. + /// + public int MaxSimultaneousRacers = 4; + + /// + /// Determines whether to shuffle addresses before assigning racing lanes. + /// + public bool ShuffleAddresses = true; + + /// + /// Callback to implement a custom address shuffle algorithm. When assigned, no plugin-defined shuffle algorithm will be executed. + /// + /// It must be thread-safe. + public Action CustomAddressShuffleAlgorithm; + + /// + /// The granularity of cancellation checking for TCP races. It specifies the time interval for checking if a race should be canceled. + /// + public TimeSpan CancellationCheckingGranularity = TimeSpan.FromMilliseconds(100); + + public override string ToString() => $"[{nameof(TCPRingmasterSettings)} {this.MaxSimultaneousRacers}, {this.ShuffleAddresses}, {this.CancellationCheckingGranularity}]"; + } + + /// + /// Represents the result of a TCP race competition, including the winning socket or an error. + /// + public sealed class TCPRaceResult + { + /// + /// The socket that won the race competition, if available. + /// + public Socket WinningSocket; + + /// + /// The error encountered during the race competition, if any. + /// + public Exception Error; + + /// + /// Initializes a new instance of the class with the winning socket and an error, if any. + /// + /// The winning socket of the race competition, if available. + /// The error encountered during the race competition, if any. + public TCPRaceResult(Socket socket, Exception ex) + { + this.WinningSocket = socket; + this.Error = ex; + } + + public override string ToString() => $"[{nameof(TCPRaceResult)} {this.WinningSocket}, {this.Error}]"; + } + + /// + /// Represents a TCP race competition with parameters and status. + /// + sealed class Race + { + /// + /// The parameters for the TCP race competition. + /// + public TCPRaceParameters Parameters; + + /// + /// The index of the next address to connect to. + /// + public int NextAddressIndex; + + /// + /// The number of running lanes in the competition. + /// + public int RunningLanes; + + public override string ToString() => $"[{nameof(Race)} {this.Parameters}, {this.NextAddressIndex}, {this.RunningLanes}]"; + } + + /// + /// Represents a racing lane in a TCP race competition. + /// + sealed class RacingLane + { + /// + /// The associated race and its parameters. + /// + public Race Race; + + /// + /// The index of the address to connect to. + /// + public int AddressIndex; + + /// + /// The index of the racing lane. + /// + public int LaneIndex; + + /// + /// The socket used for the racing lane. + /// + public Socket Socket; + + public override string ToString() => $"[{nameof(RacingLane)} {this.Race}, {this.AddressIndex}, {this.LaneIndex}, {this.Socket}]"; + } + + /// + /// Contains parameters and settings for a TCP race competition to establish connections. + /// + public sealed class TCPRaceParameters + { + /// + /// An array of DNS IP addresses to be used for racing to establish a connection. + /// + public DNSIPAddress[] Addresses; + + /// + /// The hostname to connect to. + /// + public string Hostname; + + /// + /// The port to connect to. + /// + public int Port; + + /// + /// The cancellation token used to cancel the TCP race competition. + /// + public CancellationToken Token; + + /// + /// A callback function to announce the winner of the TCP race competition. + /// + /// The TCPRaceParameters used for the race competition. + /// The result of the race competition, including the winning socket or an error. + public Action AnnounceWinnerCallback; + + /// + /// Optional context for logging and tracking purposes. + /// + public LoggingContext Context; + + /// + /// A user-defined tag associated with the TCP race parameters. + /// + public object Tag; + + public override string ToString() + { + var sb = StringBuilderPool.Get(2 + this.Addresses.Length); + sb.Append('['); + for (int i = 0; i < this.Addresses.Length; ++i) + { + sb.Append(this.Addresses[i]); + + if (i < this.Addresses.Length - 1) + sb.Append(", "); + } + sb.Append(']'); + var ips = StringBuilderPool.ReleaseAndGrab(sb); + + return $"[{nameof(TCPRaceParameters)} \"{this.Hostname}:{this.Port}\" Addresses({this.Addresses.Length}): {ips}]"; + } + } + + /// + /// TCPRingmaster provides a method called , which is used to initiate a competition among multiple TCP connections. + /// Each connection attempt races against the others to establish a connection, and the first successful connection is considered the winner. + /// The class allows to specify a callback function (through ) that gets invoked when a winning connection is established or when the competition is canceled. + /// This callback can be used to take action based on the competition outcome. + /// Additionally it includes logic for optimizing the order in which connection attempts are made: + /// + /// It can shuffle the order of addresses to improve the chances of quickly finding a working address. + /// It handles scenarios where some addresses may not be working and prioritizes working addresses. + /// + /// + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstruction] + public static class TCPRingmaster + { + /// + /// Starts a TCP race competition to establish connections based on the provided parameters. + /// + /// The parameters and settings for the TCP race competition. + public static void StartCompetion(TCPRaceParameters parameters) + { + // Initial idea: + // create Min(racers.Addresses.Length, Options.MaxSimultaneousRacers) lanes + // and increase RunningLanes + // randomize adresses + // assign one address to each lane, put the remaining addresses' index to the IndexQueue + // start connecting for each lane + + var options = HTTPManager.PerHostSettings.Get(parameters.Hostname); + + Race race = new Race + { + Parameters = parameters, + + NextAddressIndex = 0, + RunningLanes = Math.Min(parameters.Addresses.Length, options.TCPRingmasterSettings.MaxSimultaneousRacers), + }; + + // Shuffle addresses? + + var algo = options.TCPRingmasterSettings.CustomAddressShuffleAlgorithm; + if (algo != null) + { + try + { + algo(parameters); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(TCPRingmaster), $"{nameof(options.TCPRingmasterSettings.CustomAddressShuffleAlgorithm)}({parameters})", ex, parameters.Context); + } + } + else + { + // This helps in cases where the DNS query returns with a lot of addresses whos the first half isn't working. + // In this case, after shuffling there's better chance that a working address can be found in the first MaxSimultaneousRacers lanes. + if (options.TCPRingmasterSettings.ShuffleAddresses) + ShuffleAddresses(parameters.Addresses); + } + + // Move non-working addresses to the end of the array, we will give them another chance + // but others will have higher priority + int nonWorkingCount = 0; + for (int i = 0; i < parameters.Addresses.Length - 1; i++) + { + var address = parameters.Addresses[i]; + + if (!address.IsWorkedLastTime) + { + Array.Copy(parameters.Addresses, i + 1, parameters.Addresses, i, parameters.Addresses.Length - i - 1); + parameters.Addresses[parameters.Addresses.Length - 1] = address; + + if (++nonWorkingCount >= parameters.Addresses.Length) + break; + + i--; + } + } + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(StartCompetion)}({parameters}) - creating {race.RunningLanes} lane(s)", parameters.Context); + + int nextIdx = race.NextAddressIndex; + while (nextIdx < race.RunningLanes) + { + var address = race.Parameters.Addresses[nextIdx]; + var socket = new Socket(address.IPAddress.AddressFamily, SocketType.Stream, ProtocolType.Tcp); + + var lane = new RacingLane + { + AddressIndex = nextIdx, + LaneIndex = nextIdx, + Race = race, + Socket = socket + }; + + var asyncResult = socket.BeginConnect(address.IPAddress, parameters.Port, OnLaneFinished, lane); + + // Under Android (and possible under other non-windows platforms) Unity doesn't call the OnLaneFinished callback, only returns with the IAsyncResult instance. + if (asyncResult.CompletedSynchronously && asyncResult.IsCompleted) + OnLaneFinished(asyncResult); + + nextIdx = Interlocked.Increment(ref lane.Race.NextAddressIndex); + } + + if (parameters.Token != CancellationToken.None) + Extensions.Timer.Add(new Extensions.TimerData(options.TCPRingmasterSettings.CancellationCheckingGranularity, race, CheckForCanceled)); + } + + private static void OnLaneFinished(IAsyncResult ar) + { + var lane = ar.AsyncState as RacingLane; + + try + { + // Lane callback logic: + // Increase CompletedRacers + // If there's an error completing the socket, or isn't connected, + // pick the next index and start to connect + // if no more racers (CompletedRacers == racers.Addresses.Length) and no more running lanes, call callback with error + // decrease RunningLanes + // Else If callback isn't null, call callback + + lane.Socket.EndConnect(ar); + + var callback = lane.Race.Parameters.AnnounceWinnerCallback; + callback = Interlocked.CompareExchange(ref lane.Race.Parameters.AnnounceWinnerCallback, null, callback); + + if (callback != null) + { + var runningLanes = Interlocked.Decrement(ref lane.Race.RunningLanes); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) - Winner lane! Address: {lane.Race.Parameters.Addresses[lane.AddressIndex]}, remaining lanes: {runningLanes}", lane.Race.Parameters.Context); + + try + { + callback.Invoke(lane.Race.Parameters, new TCPRaceResult(lane.Socket, null)); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}({lane.LaneIndex}) - callback", ex, lane.Race.Parameters.Context); + } + } + else + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) - Late lane, disconnecting...", lane.Race.Parameters.Context); + + // The callback is already called before this lane finished, we have no use for this socket, have to disconnect. + lane.Socket.Shutdown(SocketShutdown.Both); + lane.Socket.BeginDisconnect(false, OnSocketDisconnect, lane); + } + } + catch (InvalidOperationException) + { + // https://learn.microsoft.com/en-us/dotnet/api/system.net.sockets.socket.endconnect#system-net-sockets-socket-endconnect(system-iasyncresult) + // EndConnect(IAsyncResult) was previously called for the asynchronous connection. + } + catch (Exception ex) + { + lane.Socket.Dispose(); + + DNSCache.ReportAsNonWorking(lane.Race.Parameters.Hostname, lane.Race.Parameters.Addresses[lane.AddressIndex].IPAddress, lane.Race.Parameters.Context); + + var nextIndex = Interlocked.Increment(ref lane.Race.NextAddressIndex); + if (nextIndex < lane.Race.Parameters.Addresses.Length) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) - Couldn't connect to address, grabbing new index: {nextIndex}", lane.Race.Parameters.Context); + + lane.AddressIndex = nextIndex; + lane.Socket = new Socket(lane.Race.Parameters.Addresses[lane.AddressIndex].IPAddress.AddressFamily, SocketType.Stream, ProtocolType.Tcp); + lane.Socket.BeginConnect(lane.Race.Parameters.Addresses[lane.AddressIndex].IPAddress, lane.Race.Parameters.Port, OnLaneFinished, lane); + } + else + { + // no more address to try, decrase the running lanes + var runningLanes = Interlocked.Decrement(ref lane.Race.RunningLanes); + if (runningLanes == 0) + { + // If no more lanes, try to call the callback. + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) Race is over, calling callback if it's still available", lane.Race.Parameters.Context); + + var callback = lane.Race.Parameters.AnnounceWinnerCallback; + callback = Interlocked.CompareExchange(ref lane.Race.Parameters.AnnounceWinnerCallback, null, callback); + + try + { + callback?.Invoke(lane.Race.Parameters, new TCPRaceResult(null, ex)); + } + catch(Exception nex) + { + HTTPManager.Logger.Exception(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) - callback", nex, lane.Race.Parameters.Context); + } + } + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnLaneFinished)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex}) Run out of free racers, there are still running racers({runningLanes}), retiring this lane.", lane.Race.Parameters.Context); + } + } + } + + private static void OnSocketDisconnect(IAsyncResult ar) + { + var lane = ar.AsyncState as RacingLane; + try + { + lane.Socket.EndDisconnect(ar); + } + catch (Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(TCPRingmaster), $"{nameof(OnSocketDisconnect)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex})", ex, lane.Race.Parameters.Context); + } + finally + { + Interlocked.Decrement(ref lane.Race.RunningLanes); + lane.Socket.Dispose(); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(OnSocketDisconnect)}(Lane: {lane.LaneIndex}, Addr.: {lane.AddressIndex})", lane.Race.Parameters.Context); + } + } + + /// + /// Inplace shuffles addresses. + /// + /// The array of to shuffle. + public static void ShuffleAddresses(DNSIPAddress[] addresses) + { + var rand = new Random(); + int n = addresses.Length; + while (n > 1) + { + int k = rand.Next(n--); + (addresses[n], addresses[k]) = (addresses[k], addresses[n]); + } + } + + private static bool CheckForCanceled(DateTime now, object context) + { + var query = context as Race; + + if (query.Parameters.Token.IsCancellationRequested) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPRingmaster), $"{nameof(CheckForCanceled)}({query}) - Token.IsCancellationRequested!", query.Parameters.Context); + + var callback = query.Parameters.AnnounceWinnerCallback; + + callback = Interlocked.CompareExchange>(ref query.Parameters.AnnounceWinnerCallback, null, callback); + + try + { + callback?.Invoke(query.Parameters, new TCPRaceResult(null, new TimeoutException("DNS Query Timed Out"))); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception(nameof(TCPRingmaster), $"{nameof(CheckForCanceled)}({query}) - callback", ex, query.Parameters.Context); + } + } + + return query.Parameters.AnnounceWinnerCallback != null; + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs.meta new file mode 100644 index 00000000..ae79e866 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cd27596f35a31d24981e07594bc30a77 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPRingmaster.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs new file mode 100644 index 00000000..00b46d2d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs @@ -0,0 +1,634 @@ +#define _LOG_TCP_STREAMER + +#if !UNITY_WEBGL || UNITY_EDITOR +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +using System; +using System.Collections.Concurrent; +using System.Net.Sockets; +using System.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Network.Tcp +{ + /// + /// The ITCPStreamerContentConsumer interface represents a specialized content consumer for use with . It offers methods for writing data to the streamer and handling content-related events. + /// + /// + /// + /// Key Functions of ITCPStreamerContentConsumer: + /// + /// + /// + /// Data WritingProvides methods to write data to the associated instance, allowing content to be sent over the TCP connection. + /// + /// + /// Content HandlingDefines event methods for notifying consumers when new content is available, the connection is closed, or errors occur during data transfer. + /// + /// + /// + /// + public interface ITCPStreamerContentConsumer + { + /// + /// Gets or sets the maximum amount of data bufferable in the consumer. + /// + long MaxBufferSize { get; set; } + + /// + /// Writes the specified data buffer to the associated instance. The data is copied into a new buffer and passed to the streamer for transmission. + /// + /// The byte array containing the data to be written. + /// The zero-based byte offset in the buffer from which to begin writing. + /// The number of bytes to write from the buffer. + void Write(byte[] buffer, int offset, int count); + + /// + /// Writes the specified directly to the associated instance. The content of the buffer is passed to the streamer for transmission, and the ownership of the buffer is transferred to the too. + /// + /// The containing the data to be written. + void Write(BufferSegment buffer); + + /// + /// Called when new content is available from the associated instance. + /// + /// The instance providing the content. + void OnContent(TCPStreamer streamer); + + /// + /// Called when the connection is closed by the remote peer. It notifies the content consumer about the connection closure. + /// + /// The instance for which the connection is closed. + void OnConnectionClosed(TCPStreamer streamer); + + /// + /// Called when an error occurs during content processing or connection handling. It provides the instance and the that caused the error. + /// + /// The instance where the error occurred. + /// The that represents the error condition. + void OnError(TCPStreamer streamer, Exception ex); + } + + sealed class ReadState + { + public int minReceiveBufferSize; + + public byte[] receiveBuffer = null; + public int isReceiving; + public long totalReceived; + + public long bufferedLength; + public ConcurrentQueue bufferedSegments = new ConcurrentQueue(); + } + + sealed class WriteState + { + public byte[] _writeBuffer = null; + public int _writeInProgress; + + public ConcurrentQueue _segmentsToWrite = new ConcurrentQueue(); + public long bufferedLength; + + public AutoResetEvent blockEvent = new AutoResetEvent(false); + } + + /// + /// The TCPStreamer class is a versatile component that abstracts the complexities of TCP communication, making it easier to handle data streaming between networked applications or devices. It ensures reliable and efficient data transfer while handling various aspects of network communication and error management. + /// + /// + /// + /// TCPStreamer serves several key functions: + /// + /// + /// + /// Data StreamingIt enables the streaming of data between two endpoints over a TCP connection, ideal for scenarios involving the transfer of large data volumes in manageable chunks. + /// + /// + /// Buffer ManagementThe class efficiently manages buffering for both incoming and outgoing data, ensuring smooth and efficient data transfer. + /// + /// + /// Asynchronous CommunicationUtilizing asynchronous communication patterns, it supports non-blocking operations, essential for applications requiring concurrent data processing. + /// + /// + /// Error HandlingComprehensive error-handling mechanisms address exceptions that may occur during TCP communication, enhancing robustness in the face of network issues or errors. + /// + /// + /// Resource ManagementIt handles memory buffer management and resource disposal when the TCP connection is closed or the class is disposed. + /// + /// + /// Integration with HeartbeatImplementing the interface, it can be seamlessly integrated into systems using heartbeat mechanisms for network connection monitoring and management. + /// + /// + /// + public sealed class TCPStreamer : IDisposable, IHeartbeat + { + /// + /// Gets or sets the content consumer that interacts with this instance, allowing data to be written to the streamer for transmission. + /// + public ITCPStreamerContentConsumer ContentConsumer { get => this._contentConsumer; set { this._contentConsumer = value; } } + private ITCPStreamerContentConsumer _contentConsumer; + + /// + /// Gets the underlying associated with this instance. + /// + public Socket Socket { get => this._socket; } + + /// + /// Gets the optional associated with this instance, facilitating logging and diagnostics. + /// + public LoggingContext Context { get => this._loggingContext; } + + /// + /// Gets a value indicating whether the TCP connection is closed. + /// + public bool IsConnectionClosed { get => this._disposed || this._closed == 1 || this._closeInitiatedByServer; } + + /// + /// Gets the minimum receive buffer size for the TCP socket. + /// + public int MinReceiveBufferSize { get => this.readState.minReceiveBufferSize; } + + /// + /// Gets the total length of buffered data for reading from the stream. + /// + public long Length { get => this.readState.bufferedLength; } + + /// + /// Gets or sets the maximum amount of buffered data allowed for writing to the stream. + /// + public readonly uint MaxBufferedWriteAmount; + + private ReadState readState = new ReadState(); + private WriteState writeState = new WriteState(); + + private Socket _socket; + private LoggingContext _loggingContext; + + private bool _disposed; + private int _closed; + private int _isDisconnected; + public bool _closeInitiatedByServer; + + /// + /// Gets or sets the maximum amount of buffered data allowed for reading from the stream. + /// + private uint MaxBufferedReadAmount; + + /// + /// Initializes a new instance of the TCPStreamer class with the specified and parent . + /// + /// The underlying representing the TCP connection. + /// The optional parent for logging and diagnostics. + public TCPStreamer(Socket socket, uint maxReadBufferSize, uint maxWriteBufferSize, LoggingContext _parentLoggingContext) + { + this._socket = socket; + this.readState.minReceiveBufferSize = this._socket.ReceiveBufferSize; + this.MaxBufferedReadAmount = maxReadBufferSize; + this.MaxBufferedWriteAmount = maxWriteBufferSize; + + this._loggingContext = new LoggingContext(this); + this._loggingContext.Add("Parent", _parentLoggingContext); + + HTTPManager.Logger.Verbose(nameof(TCPStreamer), $"Created with minReceiveBufferSize: ({this.readState.minReceiveBufferSize:N0})", this._loggingContext); + + BeginReceive(); + + HTTPManager.Heartbeats.Subscribe(this); + + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementCurrentConnections(); + } + + /// + /// Dequeues received data from the stream's buffer and returns a containing the data. + /// + /// A containing the received data. + public BufferSegment DequeueReceived() + { + if (this.readState.bufferedSegments.TryDequeue(out var segment)) + { + Interlocked.Add(ref this.readState.bufferedLength, -segment.Count); + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementReceivedAndUnprocessed(-segment.Count); + } + else + { + if (this.IsConnectionClosed) + return new BufferSegment(null, 0, -1); + } + + BeginReceive(); + + return segment; + } + + /// + /// Begins receiving data from the TCP connection asynchronously. This method ensures that only one receive operation happens at a time. + /// + /// + /// When calling this method, it ensures that there is only one active receive operation at a time, preventing overlapping receives. This optimization helps prevent data loss and improves the reliability of the receive process. + /// + public void BeginReceive() + { + var length = this.Length; + var receiving = this.readState.isReceiving; + if (!this.IsConnectionClosed && length < MaxBufferedReadAmount && (receiving = Interlocked.CompareExchange(ref this.readState.isReceiving, 1, 0)) == 0) + { +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(BeginReceive)}()", this._loggingContext); +#endif + + var readBuffer = BufferPool.Get(this.readState.minReceiveBufferSize, true, this._loggingContext); + try + { + Interlocked.Exchange(ref this.readState.receiveBuffer, readBuffer); + + this._socket.BeginReceive( + readBuffer, 0, readBuffer.Length, + SocketFlags.None, + OnReceived, + null); + } + catch (Exception e) + { + BufferPool.Release(Interlocked.Exchange(ref this.readState.receiveBuffer, null)); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(TCPStreamer), $"{nameof(this._socket.BeginReceive)}", e, this._loggingContext); + } + } + } + + private void OnReceived(IAsyncResult asyncResult) + { +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnReceived)}()", this._loggingContext); +#endif + + bool isClosed = true; + int readCount = 0; + SocketError errorCode = SocketError.Success; + try + { + var socket = this._socket; + isClosed = socket == null || !socket.Connected; + long newLength = this.Length; + + if (socket != null) + { + // OnReceived might be still called when we closed&disposed the socket! + readCount = socket.EndReceive(asyncResult, out errorCode); + if (errorCode != SocketError.Success) + isClosed = true; + else + //isClosed = readCount <= 0 && !this._disposed && this._closed == 0; + isClosed = readCount <= 0 || this.IsConnectionClosed; + + if (!isClosed) + { + newLength = Interlocked.Add(ref this.readState.bufferedLength, readCount); + this.readState.totalReceived += readCount; + } + } + + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementTotalNetworkBytesReceived(readCount); + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementReceivedAndUnprocessed(readCount); + +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnReceived)}({readCount:N0}, {isClosed}, {errorCode}, {newLength:N0}, {this.readState.totalReceived:N0})", this._loggingContext); +#endif + + if (!isClosed) + { + byte[] readBuffer = Interlocked.Exchange(ref this.readState.receiveBuffer, null); + this.readState.bufferedSegments.Enqueue(readBuffer.AsBuffer(readCount)); + + try + { + this.ContentConsumer?.OnContent(this); + } + catch (Exception e) + { + HTTPManager.Logger.Exception(nameof(TCPStreamer), "ContentConsumer.OnContent", e, this._loggingContext); + } + } + } + catch (Exception ex) + { + if (!Volatile.Read(ref this._disposed)) + HTTPManager.Logger.Exception(nameof(TCPStreamer), $"{nameof(OnReceived)}({errorCode})", ex, this._loggingContext); + } + finally + { + if (!isClosed) + { + Interlocked.Exchange(ref this.readState.isReceiving, 0); + BeginReceive(); + } + else + { + BufferPool.Release(Interlocked.Exchange(ref this.readState.receiveBuffer, null)); + + Interlocked.Exchange(ref this.readState.isReceiving, 0); + + // Close must be called only when all data read, or initiated by the client too. + this._closeInitiatedByServer = true; + + if (this._closed == 0) + this.writeState.blockEvent.Set(); + + try + { + var consumer = Interlocked.Exchange(ref this._contentConsumer, null); + + if (consumer != null) + consumer?.OnConnectionClosed(this); +#if LOG_TCP_STREAMER + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Error(nameof(TCPStreamer), $"{nameof(OnReceived)}({errorCode}) - No consumer to call OnConnectionClosed on!", this._loggingContext); +#endif + } + catch (Exception e) + { + HTTPManager.Logger.Exception(nameof(TCPStreamer), "ContentConsumer.OnConnectionClosed", e, this._loggingContext); + } + +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Verbose(nameof(TCPStreamer), $"{nameof(OnReceived)}({errorCode}) - closed (readCount({readCount}) <= 0, or other issues), not calling BeginReceive", this._loggingContext); +#endif + } + } + } + + /// + /// Enqueues data to be sent over the TCP connection. The data is added to the stream's outgoing buffer for transmission. + /// + /// The containing the data to be sent. + public void EnqueueToSend(BufferSegment buffer) + { + if (buffer.Count <= 0) + return; + + if (this._closeInitiatedByServer) + { + BufferPool.Release(buffer); + //throw new Exception("TCP connection closed by the server!"); + return; + } + + if (this.IsConnectionClosed) + { + BufferPool.Release(buffer); + //throw new Exception("TCP connection already closed!"); + return; + } + + try + { + long buffered = Interlocked.Add(ref this.writeState.bufferedLength, buffer.Count); + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementBufferedToSend(buffer.Count); + + this.writeState._segmentsToWrite.Enqueue(buffer); + + bool allowedToSend = Interlocked.CompareExchange(ref this.writeState._writeInProgress, 1, 0) == 0; + + if (!allowedToSend) + { + if (buffered >= MaxBufferedWriteAmount) + { +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(EnqueueToSend)} - Enqueued({buffer.Count:N0}) & blocking", this._loggingContext); +#endif + + this.writeState.blockEvent.Reset(); + this.writeState.blockEvent.WaitOne(); + } +#if LOG_TCP_STREAMER + else if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(EnqueueToSend)} - Enqueued({buffer.Count:N0})", this._loggingContext); +#endif + } + else + { + if (!SendFromQueue()) + Interlocked.Exchange(ref this.writeState._writeInProgress, 0); + } + } + catch + { + Interlocked.Exchange(ref this.writeState._writeInProgress, 0); + + BufferPool.Release(Interlocked.Exchange(ref this.writeState._writeBuffer, null)); + throw; + } + } + + private bool SendFromQueue() + { + var socket = this._socket; + + // TODO: merge buffers from the queue into a larger one, to send them at once + + if (this.writeState._segmentsToWrite.TryDequeue(out var writeBuffer)) + { + Interlocked.Exchange(ref this.writeState._writeBuffer, writeBuffer.Data); + +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(SendFromQueue)} - BeginSend({writeBuffer.Count:N0})", this._loggingContext); +#endif + + socket.BeginSend(writeBuffer.Data, writeBuffer.Offset, writeBuffer.Count, SocketFlags.None, OnWroteToNetwork, writeBuffer); + + return true; + } + + return false; + } + + private void OnWroteToNetwork(IAsyncResult ar) + { +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnWroteToNetwork)}()", this._loggingContext); +#endif + + var writeBuffer = (BufferSegment)ar.AsyncState; + bool success = false; + try + { + var socket = this._socket; + + if (this.IsConnectionClosed) + { + this.writeState.blockEvent.Set(); + return; + } + + int result = socket.EndSend(ar, out var errorCode); + success = result > 0; + +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnWroteToNetwork)} - OnWroteToNetwork({result:N0}, {errorCode})", this._loggingContext); +#endif + + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementTotalNetworkBytesSent(result); + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementBufferedToSend(-result); + + if (result > 0 && Interlocked.Add(ref this.writeState.bufferedLength, -result) < MaxBufferedWriteAmount) + this.writeState.blockEvent.Set(); + + if (writeBuffer.Count != result) + { + writeBuffer = writeBuffer.Data.AsBuffer(writeBuffer.Offset + result, writeBuffer.Count - result); + +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnWroteToNetwork)} - OnWroteToNetwork({result:N0})", this._loggingContext); +#endif + + socket.BeginSend(writeBuffer.Data, writeBuffer.Offset, writeBuffer.Count, SocketFlags.None, OnWroteToNetwork, writeBuffer); + } + else + { + BufferPool.Release(Interlocked.Exchange(ref this.writeState._writeBuffer, null)); + + if (!SendFromQueue()) + { +#if LOG_TCP_STREAMER + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Information(nameof(TCPStreamer), $"{nameof(OnWroteToNetwork)} - set _writeInProgress = 0", this._loggingContext); +#endif + + Interlocked.Exchange(ref this.writeState._writeInProgress, 0); + } + } + } + catch (Exception ex) + { + BufferPool.Release(Interlocked.Exchange(ref this.writeState._writeBuffer, null)); + + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(TCPStreamer), $"{nameof(OnWroteToNetwork)}({ex.Message})", ex, this._loggingContext); + } + } + + /// + /// Disposes of the instance, releasing associated resources. + /// + public void Dispose() + { + // If not closed, close + if (Volatile.Read(ref this._closed) == 0) + { + this.Close(); + + // Close will trigger OnDisconnected that calls Dispose again, but this._closed will be set to 0 this time. + return; + } + + // if not disposed, dispose + if (this._disposed) + return; + this._disposed = true; + + this._socket?.Dispose(); + this._socket = null; + + GC.SuppressFinalize(this); + } + + void IHeartbeat.OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + if (this.writeState._segmentsToWrite.Count > 0 && Interlocked.CompareExchange(ref this.writeState._writeInProgress, 1, 0) == 0) + { + if (!SendFromQueue()) + Interlocked.Exchange(ref this.writeState._writeInProgress, 0); + } + } + + /// + /// Closes the TCP connection gracefully and performs cleanup operations. + /// + internal void Close() + { + HTTPManager.Logger.Verbose(nameof(TCPStreamer), $"{nameof(Close)}({this._closed}, {this._socket?.Connected})", this._loggingContext); + + if (Interlocked.CompareExchange(ref this._closed, 1, 0) == 1) + return; + + try + { + this.writeState.blockEvent.Set(); + + //this._socket.Shutdown(SocketShutdown.Both); + this._socket.BeginDisconnect(false, OnDisconnected, null); + } + catch + { + OnDisconnected(null); + } + } + + private void OnDisconnected(IAsyncResult ar) + { + // TODO: move cleanup code into a separate function and call it when both _writeInProgress & isReceiving are zero + HTTPManager.Logger.Verbose(nameof(TCPStreamer), $"{nameof(OnDisconnected)}()", this._loggingContext); + + if (Interlocked.CompareExchange(ref this._isDisconnected, 1, 0) == 1) + return; + + Best.HTTP.Profiler.Network.NetworkStatsCollector.DecrementCurrentConnections(); + + if (ar != null) + { + try + { + this._socket.EndDisconnect(ar); + } + catch { } + } + + while (this.readState.bufferedSegments.TryDequeue(out var segment)) + { + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementReceivedAndUnprocessed(-segment.Count); + BufferPool.Release(segment); + } + + while (this.writeState._segmentsToWrite.TryDequeue(out var segment)) + { + Best.HTTP.Profiler.Network.NetworkStatsCollector.IncrementBufferedToSend(-segment.Count); + BufferPool.Release(segment); + } + + BufferPool.Release(Interlocked.Exchange(ref this.writeState._writeBuffer, null)); + + // Don't release the receiveBuffer until lower layer returns with the OnReceived callback because: + // the plugin would reuse it in other parts, while it's unknown what the lower layer is doing and it can + // decide to write into the buffer while we aren't expect it. + if (this.readState.isReceiving == 0) + BufferPool.Release(Interlocked.Exchange(ref this.readState.receiveBuffer, null)); + + // todo: maybe dispose only if this.writeState._writeInProgress == 0 + // otherwise we could dispose it here, and try to use it + this.writeState.blockEvent.Dispose(); + + HTTPManager.Heartbeats.Unsubscribe(this); + + try + { + Interlocked.Exchange(ref this._contentConsumer, null) + ?.OnConnectionClosed(this); + } + catch { } + + this.Dispose(); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs.meta new file mode 100644 index 00000000..240180f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 90ac6e42bdcbf9e4baa3675a6a2cad75 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Network/Tcp/TCPStreamer.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text.meta new file mode 100644 index 00000000..d38989c1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: bc349b02f1bcbf840b2d9201e25322b5 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs new file mode 100644 index 00000000..140e04f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs @@ -0,0 +1,147 @@ +using System; +using System.Collections.Generic; +using System.Text; +using System.Threading; + +using Best.HTTP.Shared.PlatformSupport.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Text +{ + /// + /// Implements pooling logic for instances. + /// + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public static class StringBuilderPool + { + /// + /// Setting this property to false the pooling mechanism can be disabled. + /// + public static bool IsEnabled + { + get { return _isEnabled; } + set + { + _isEnabled = value; + + // When set to non-enabled remove all stored entries + if (!_isEnabled) + Clear(); + } + } + private static volatile bool _isEnabled = true; + + /// + /// Buffer entries that released back to the pool and older than this value are moved when next maintenance is triggered. + /// + public static TimeSpan RemoveOlderThan = TimeSpan.FromSeconds(10); + + /// + /// How often pool maintenance must run. + /// + public static TimeSpan RunMaintenanceEvery = TimeSpan.FromSeconds(5); + + private static DateTime lastMaintenance = DateTime.MinValue; + + private readonly static ReaderWriterLockSlim rwLock = new ReaderWriterLockSlim(LockRecursionPolicy.NoRecursion); + + struct BuilderShelf + { + public StringBuilder builder; + public DateTime released; + + public BuilderShelf(StringBuilder sb) + { + this.builder = sb; + this.released = DateTime.UtcNow; + } + } + + private static List pooledBuilders = new List(); + + public static StringBuilder Get(int lengthHint) + { + if (!_isEnabled) + return new StringBuilder(lengthHint); + + using (new WriteLock(rwLock)) + { + for (int i = pooledBuilders.Count - 1; i >= 0; i--) + { + BuilderShelf shelf = pooledBuilders[i]; + if (shelf.builder.Capacity >= lengthHint) + { + pooledBuilders.RemoveAt(i); + return shelf.builder; + } + } + + // no builder found with lengthHint, take the first available + if (pooledBuilders.Count > 0) + { + BuilderShelf shelf = pooledBuilders[pooledBuilders.Count - 1]; + pooledBuilders.RemoveAt(pooledBuilders.Count - 1); + return shelf.builder; + } + } + + return new StringBuilder(lengthHint); + } + + public static void Release(StringBuilder builder) + { + if (builder == null) + return; + + if (!_isEnabled) + return; + + builder.Clear(); + + using (new WriteLock(rwLock)) + pooledBuilders.Add(new BuilderShelf(builder)); + } + + public static string ReleaseAndGrab(StringBuilder builder) + { + if (builder == null) + return null; + + var result = builder.ToString(); + if (!_isEnabled) + return result; + + builder.Clear(); + + using (new WriteLock(rwLock)) + pooledBuilders.Add(new BuilderShelf(builder)); + + return result; + } + + internal static void Maintain() + { + DateTime now = DateTime.UtcNow; + if (!_isEnabled || lastMaintenance + RunMaintenanceEvery > now) + return; + lastMaintenance = now; + + DateTime olderThan = now - RemoveOlderThan; + using (new WriteLock(rwLock)) + { + for (int i = 0; i < pooledBuilders.Count; i++) + { + BuilderShelf shelf = pooledBuilders[i]; + + if (shelf.released < olderThan) + pooledBuilders.RemoveAt(i--); + } + } + } + + public static void Clear() + { + using (new WriteLock(rwLock)) + pooledBuilders.Clear(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs.meta new file mode 100644 index 00000000..81564469 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 86c608e2d4d42a34283884f8e9eca2f9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Text/StringBuilderPool.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading.meta new file mode 100644 index 00000000..e02f7c18 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 44047629f354ef84ea121bd4303299d6 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs new file mode 100644 index 00000000..1d5c4641 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs @@ -0,0 +1,46 @@ +using System; +using System.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Threading +{ + public struct ReadLock : IDisposable + { + private ReaderWriterLockSlim rwLock; + private bool locked; + public ReadLock(ReaderWriterLockSlim rwLock) + { + this.rwLock = rwLock; + + this.locked = this.rwLock.IsReadLockHeld; + if (!this.locked) + this.rwLock.EnterReadLock(); + } + + public void Dispose() + { + if (!this.locked) + this.rwLock.ExitReadLock(); + } + } + + public struct WriteLock : IDisposable + { + private ReaderWriterLockSlim rwLock; + private bool locked; + + public WriteLock(ReaderWriterLockSlim rwLock) + { + this.rwLock = rwLock; + this.locked = rwLock.IsWriteLockHeld; + + if (!locked) + this.rwLock.EnterWriteLock(); + } + + public void Dispose() + { + if (!locked) + this.rwLock.ExitWriteLock(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs.meta new file mode 100644 index 00000000..135e7439 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dd25c801571339740b2046ea34732f17 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/LockHelpers.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs new file mode 100644 index 00000000..f2502bca --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs @@ -0,0 +1,96 @@ +using System; +using System.Threading; + +namespace Best.HTTP.Shared.PlatformSupport.Threading +{ + [IL2CPP.Il2CppEagerStaticClassConstruction] + public static class ThreadedRunner + { + public static int ShortLivingThreads { get => _shortLivingThreads; } + private static int _shortLivingThreads; + + public static int LongLivingThreads { get => _LongLivingThreads; } + private static int _LongLivingThreads; + + public static void SetThreadName(string name) + { + try + { + System.Threading.Thread.CurrentThread.Name = name; + } + catch(Exception ex) + { + if (HTTPManager.Logger.IsDiagnostic) + HTTPManager.Logger.Exception(nameof(ThreadedRunner), nameof(SetThreadName), ex); + } + } + + public static void RunShortLiving(Action job, T param) + { + ThreadPool.QueueUserWorkItem(new WaitCallback(_ => + { + using var __ = new IncDecShortLiving(true); + job(param); + })); + } + + public static void RunShortLiving(Action job, T1 param1, T2 param2) + { + ThreadPool.QueueUserWorkItem(new WaitCallback(_ => + { + using var __ = new IncDecShortLiving(true); + job(param1, param2); + })); + } + + public static void RunShortLiving(Action job, T1 param1, T2 param2, T3 param3) + { + ThreadPool.QueueUserWorkItem(new WaitCallback(_ => + { + using var __ = new IncDecShortLiving(true); + job(param1, param2, param3); + })); + } + + public static void RunShortLiving(Action job, T1 param1, T2 param2, T3 param3, T4 param4) + { + ThreadPool.QueueUserWorkItem(new WaitCallback(_ => + { + using var __ = new IncDecShortLiving(true); + job(param1, param2, param3, param4); + })); + } + + public static void RunShortLiving(Action job) + { + ThreadPool.QueueUserWorkItem(new WaitCallback((param) => + { + using var __ = new IncDecShortLiving(true); + job(); + })); + } + + public static void RunLongLiving(Action job) + { + var thread = new Thread(new ParameterizedThreadStart((param) => + { + using var __ = new IncDecLongLiving(true); + job(); + })); + thread.IsBackground = true; + thread.Start(); + } + + struct IncDecShortLiving : IDisposable + { + public IncDecShortLiving(bool dummy) => Interlocked.Increment(ref ThreadedRunner._shortLivingThreads); + public void Dispose() => Interlocked.Decrement(ref ThreadedRunner._shortLivingThreads); + } + + struct IncDecLongLiving : IDisposable + { + public IncDecLongLiving(bool dummy) => Interlocked.Increment(ref ThreadedRunner._LongLivingThreads); + public void Dispose() => Interlocked.Decrement(ref ThreadedRunner._LongLivingThreads); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs.meta new file mode 100644 index 00000000..3e4d6cbc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b5b50a35890b2c64c9a36d487c2ca287 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/PlatformSupport/Threading/ThreadedRunner.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams.meta new file mode 100644 index 00000000..97719a73 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2615349b152e3db43b34a1d4ea25fc28 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs new file mode 100644 index 00000000..fd0473bf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs @@ -0,0 +1,488 @@ +// +// System.IO.MemoryStream.cs +// +// Authors: Marcin Szczepanski (marcins@zipworld.com.au) +// Patrik Torstensson +// Gonzalo Paniagua Javier (gonzalo@ximian.com) +// +// (c) 2001,2002 Marcin Szczepanski, Patrik Torstensson +// (c) 2003 Ximian, Inc. (http://www.ximian.com) +// Copyright (C) 2004 Novell (http://www.novell.com) +// + +// +// Copyright (C) 2004 Novell, Inc (http://www.novell.com) +// +// Permission is hereby granted, free of charge, to any person obtaining +// a copy of this software and associated documentation files (the +// "Software"), to deal in the Software without restriction, including +// without limitation the rights to use, copy, modify, merge, publish, +// distribute, sublicense, and/or sell copies of the Software, and to +// permit persons to whom the Software is furnished to do so, subject to +// the following conditions: +// +// The above copyright notice and this permission notice shall be +// included in all copies or substantial portions of the Software. +// +// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. +// + +using System; +using System.IO; + +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.Streams +{ + /// + /// This is a modified MemoryStream class to use VariableSizedBufferPool + /// + public sealed class BufferPoolMemoryStream : System.IO.Stream + { + bool canWrite; + bool allowGetBuffer; + int capacity; + int length; + byte[] internalBuffer; + int initialIndex; + bool expandable; + bool streamClosed; + int position; + int dirty_bytes; + bool releaseInternalBuffer; + + public BufferPoolMemoryStream() : this(0) + { + } + + public BufferPoolMemoryStream(int capacity) + { + if (capacity < 0) + throw new ArgumentOutOfRangeException("capacity"); + + canWrite = true; + + //internalBuffer = capacity > 0 ? BufferPool.Get(capacity, true) : BufferPool.NoData; + //this.capacity = internalBuffer.Length; + // + //expandable = true; + //allowGetBuffer = true; + var buffer = capacity > 0 ? BufferPool.Get(capacity, true) : BufferPool.NoData; + InternalConstructor(buffer, 0, buffer.Length, true, true, true, true); + } + + public BufferPoolMemoryStream(byte[] buffer) + { + if (buffer == null) + throw new ArgumentNullException("buffer"); + + InternalConstructor(buffer, 0, buffer.Length, true, false, true, false); + } + + public BufferPoolMemoryStream(byte[] buffer, bool writable) + { + if (buffer == null) + throw new ArgumentNullException("buffer"); + + InternalConstructor(buffer, 0, buffer.Length, writable, false, true, false); + } + + public BufferPoolMemoryStream(byte[] buffer, int index, int count) + { + InternalConstructor(buffer, index, count, true, false, true, false); + } + + public BufferPoolMemoryStream(byte[] buffer, int index, int count, bool writable) + { + InternalConstructor(buffer, index, count, writable, false, true, false); + } + + public BufferPoolMemoryStream(byte[] buffer, int index, int count, bool writable, bool publiclyVisible) + { + InternalConstructor(buffer, index, count, writable, publiclyVisible, true, false); + } + + public BufferPoolMemoryStream(byte[] buffer, int index, int count, bool writable, bool publiclyVisible, bool releaseBuffer) + { + InternalConstructor(buffer, index, count, writable, publiclyVisible, releaseBuffer, false); + } + + public BufferPoolMemoryStream(byte[] buffer, int index, int count, bool writable, bool publiclyVisible, bool releaseBuffer, bool canExpand) + { + InternalConstructor(buffer, index, count, writable, publiclyVisible, releaseBuffer, canExpand); + } + + void InternalConstructor(byte[] buffer, int index, int count, bool writable, bool publicallyVisible, bool releaseBuffer, bool canExpand) + { + if (buffer == null) + throw new ArgumentNullException("buffer"); + + if (index < 0 || count < 0) + throw new ArgumentOutOfRangeException("index or count is less than 0."); + + if (buffer.Length - index < count) + throw new ArgumentException("index+count", + "The size of the buffer is less than index + count."); + + canWrite = writable; + + internalBuffer = buffer; + capacity = count + index; + //length = capacity; + length = 0; + position = index; + initialIndex = index; + + allowGetBuffer = publicallyVisible; + releaseInternalBuffer = releaseBuffer; + expandable = canExpand; + } + + void CheckIfClosedThrowDisposed() + { + if (streamClosed) + throw new ObjectDisposedException("MemoryStream"); + } + + public override bool CanRead + { + get { return !streamClosed; } + } + + public override bool CanSeek + { + get { return !streamClosed; } + } + + public override bool CanWrite + { + get { return (!streamClosed && canWrite); } + } + + public int Capacity + { + get + { + CheckIfClosedThrowDisposed(); + return capacity - initialIndex; + } + + set + { + CheckIfClosedThrowDisposed(); + if (value == capacity) + return; // LAMENESS: see MemoryStreamTest.ConstructorFive + + if (!expandable) + throw new NotSupportedException("Cannot expand this MemoryStream"); + + if (value < 0 || value < length) + throw new ArgumentOutOfRangeException("value", + "New capacity cannot be negative or less than the current capacity " + value + " " + capacity); + + byte[] newBuffer = null; + if (value != 0) + { + newBuffer = BufferPool.Get(value, true); + Buffer.BlockCopy(internalBuffer, 0, newBuffer, 0, length); + } + + dirty_bytes = 0; // discard any dirty area beyond previous length + BufferPool.Release(internalBuffer); + internalBuffer = newBuffer; // It's null when capacity is set to 0 + capacity = internalBuffer != null ? internalBuffer.Length : 0; + } + } + + public override long Length + { + get + { + // LAMESPEC: The spec says to throw an IOException if the + // stream is closed and an ObjectDisposedException if + // "methods were called after the stream was closed". What + // is the difference? + + CheckIfClosedThrowDisposed(); + + // This is ok for MemoryStreamTest.ConstructorFive + return length - initialIndex; + } + } + + public override long Position + { + get + { + CheckIfClosedThrowDisposed(); + return position - initialIndex; + } + + set + { + CheckIfClosedThrowDisposed(); + if (value < 0) + throw new ArgumentOutOfRangeException("value", + "Position cannot be negative"); + + if (value > Int32.MaxValue) + throw new ArgumentOutOfRangeException("value", + "Position must be non-negative and less than 2^31 - 1 - origin"); + + position = initialIndex + (int)value; + } + } + + protected override void Dispose (bool disposing) + { + streamClosed = true; + expandable = false; + if (disposing && internalBuffer != null && this.releaseInternalBuffer) + BufferPool.Release(internalBuffer); + internalBuffer = null; + } + + public override void Flush() + { + // Do nothing + } + + public byte[] GetBuffer() + { + if (!allowGetBuffer) + throw new UnauthorizedAccessException(); + + return internalBuffer; + } + + public override int Read(byte[] buffer, int offset, int count) + { + CheckIfClosedThrowDisposed(); + + if (buffer == null) + throw new ArgumentNullException("buffer"); + + if (offset < 0 || count < 0) + throw new ArgumentOutOfRangeException("offset or count less than zero."); + + if (buffer.Length - offset < count) + throw new ArgumentException("offset+count", + "The size of the buffer is less than offset + count."); + + if (position >= length || count == 0) + return 0; + + if (position > length - count) + count = length - position; + + Buffer.BlockCopy(internalBuffer, position, buffer, offset, count); + position += count; + return count; + } + + public override int ReadByte() + { + CheckIfClosedThrowDisposed(); + if (position >= length) + return -1; + + return internalBuffer[position++]; + } + + public override long Seek(long offset, SeekOrigin loc) + { + CheckIfClosedThrowDisposed(); + + // It's funny that they don't throw this exception for < Int32.MinValue + if (offset > (long)Int32.MaxValue) + throw new ArgumentOutOfRangeException("Offset out of range. " + offset); + + int refPoint; + switch (loc) + { + case SeekOrigin.Begin: + if (offset < 0) + throw new IOException("Attempted to seek before start of MemoryStream."); + refPoint = initialIndex; + break; + case SeekOrigin.Current: + refPoint = position; + break; + case SeekOrigin.End: + refPoint = length; + break; + default: + throw new ArgumentException("loc", "Invalid SeekOrigin"); + } + + // LAMESPEC: My goodness, how may LAMESPECs are there in this + // class! :) In the spec for the Position property it's stated + // "The position must not be more than one byte beyond the end of the stream." + // In the spec for seek it says "Seeking to any location beyond the length of the + // stream is supported." That's a contradiction i'd say. + // I guess seek can go anywhere but if you use position it may get moved back. + + refPoint += (int)offset; + if (refPoint < initialIndex) + throw new IOException("Attempted to seek before start of MemoryStream."); + + position = refPoint; + return position; + } + + int CalculateNewCapacity(int minimum) + { + if (minimum < 256) + minimum = 256; // See GetBufferTwo test + + if (minimum < capacity * 2) + minimum = capacity * 2; + + if (!UnityEngine.Mathf.IsPowerOfTwo(minimum)) + minimum = UnityEngine.Mathf.NextPowerOfTwo(minimum); + + return minimum; + } + + void Expand(int newSize) + { + // We don't need to take into account the dirty bytes when incrementing the + // Capacity, as changing it will only preserve the valid clear region. + if (newSize > capacity) + Capacity = CalculateNewCapacity(newSize); + else if (dirty_bytes > 0) + { + Array.Clear(internalBuffer, length, dirty_bytes); + dirty_bytes = 0; + } + } + + public override void SetLength(long value) + { + if (!expandable && value > capacity) + throw new NotSupportedException("Expanding this MemoryStream is not supported"); + + CheckIfClosedThrowDisposed(); + + if (!canWrite) + { + throw new NotSupportedException("Cannot write to this MemoryStream"); + } + + // LAMESPEC: AGAIN! It says to throw this exception if value is + // greater than "the maximum length of the MemoryStream". I haven't + // seen anywhere mention what the maximum length of a MemoryStream is and + // since we're this far this memory stream is expandable. + if (value < 0 || (value + initialIndex) > (long)Int32.MaxValue) + throw new ArgumentOutOfRangeException(); + + int newSize = (int)value + initialIndex; + + if (newSize > length) + Expand(newSize); + else if (newSize < length) // Postpone the call to Array.Clear till expand time + dirty_bytes += length - newSize; + + length = newSize; + if (position > length) + position = length; + } + + public byte[] ToArray() + { + return ToArray(false, null); + } + + public byte[] ToArray(bool canBeLarger, LoggingContext context) + { + int l = length - initialIndex; + byte[] outBuffer = null; + + if (l > 0) + { + if (canBeLarger) + outBuffer = BufferPool.Get(l, true, context); + else + outBuffer = new byte[l]; + } + else + { + outBuffer = BufferPool.NoData; + } + + if (internalBuffer != null) + Buffer.BlockCopy(internalBuffer, initialIndex, outBuffer, 0, l); + return outBuffer; + } + + public BufferSegment ToBufferSegment() + { + int l = length - initialIndex; + byte[] outBuffer = l > 0 ? BufferPool.Get(l, true) : BufferPool.NoData; + + if (internalBuffer != null) + Buffer.BlockCopy(internalBuffer, initialIndex, outBuffer, 0, l); + + return new BufferSegment(outBuffer, 0, l); + } + + public override void Write(byte[] buffer, int offset, int count) + { + CheckIfClosedThrowDisposed(); + + if (!canWrite) + throw new NotSupportedException("Cannot write to this stream."); + + if (buffer == null) + throw new ArgumentNullException("buffer"); + + if (offset < 0 || count < 0) + throw new ArgumentOutOfRangeException(); + + if (buffer.Length - offset < count) + throw new ArgumentException("offset+count", + "The size of the buffer is less than offset + count."); + + // reordered to avoid possible integer overflow + if (position > length - count) + Expand(position + count); + + Buffer.BlockCopy(buffer, offset, internalBuffer, position, count); + position += count; + if (position >= length) + length = position; + } + + public override void WriteByte(byte value) + { + CheckIfClosedThrowDisposed(); + if (!canWrite) + throw new NotSupportedException("Cannot write to this stream."); + + if (position >= length) + { + Expand(position + 1); + length = position + 1; + } + + internalBuffer[position++] = value; + } + + public void WriteTo(Stream stream) + { + CheckIfClosedThrowDisposed(); + + if (stream == null) + throw new ArgumentNullException("stream"); + + stream.Write(internalBuffer, initialIndex, length - initialIndex); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs.meta new file mode 100644 index 00000000..cf17ccb0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9de7df31ed0f2ac4e9d5b3cd4e4230b4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferPoolMemoryStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs new file mode 100644 index 00000000..e9c8e9c7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs @@ -0,0 +1,92 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Threading; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.Streams +{ + public class BufferSegmentStream : Stream + { + public override bool CanRead { get { return true; } } + + public override bool CanSeek { get { return false; } } + + public override bool CanWrite { get { return false; } } + + public override long Length { get { return this._length; } } + protected long _length; + + public override long Position { get { return 0; } set { } } + + protected List bufferList = new List(); + + private byte[] _tempByteArray = new byte[1]; + + public override int ReadByte() + { + if (Read(this._tempByteArray, 0, 1) == 0) + return -1; + + return this._tempByteArray[0]; + } + + public override int Read(byte[] buffer, int offset, int count) + { + int sumReadCount = 0; + + while (count > 0 && bufferList.Count > 0) + { + BufferSegment buff = this.bufferList[0]; + + int readCount = Math.Min(count, buff.Count); + + Array.Copy(buff.Data, buff.Offset, buffer, offset, readCount); + + sumReadCount += readCount; + offset += readCount; + count -= readCount; + + this.bufferList[0] = buff = buff.Slice(buff.Offset + readCount); + + if (buff.Count == 0) + { + this.bufferList.RemoveAt(0); + BufferPool.Release(buff.Data); + } + } + + Interlocked.Add(ref this._length, -sumReadCount); + + return sumReadCount; + } + + public override void Write(byte[] buffer, int offset, int count) => Write(new BufferSegment(buffer, offset, count)); + + public virtual void Write(BufferSegment bufferSegment) + { + this.bufferList.Add(bufferSegment); + Interlocked.Add(ref this._length, bufferSegment.Count); + } + + public virtual void Reset() + { + BufferPool.ReleaseBulk(this.bufferList); + + this.bufferList.Clear(); + Interlocked.Exchange(ref this._length, 0); + } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + Reset(); + } + + public override void Flush() { } + public override long Seek(long offset, SeekOrigin origin) => throw new NotImplementedException(); + public override void SetLength(long value) => throw new NotImplementedException(); + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs.meta new file mode 100644 index 00000000..a83dfff9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2d11dedd4dd2ea541a75567de5234f0c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/BufferSegmentStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs new file mode 100644 index 00000000..44582f7e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs @@ -0,0 +1,50 @@ +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; + +namespace Best.HTTP.Shared.Streams +{ + /// + /// A PeekableStream implementation that also implements the interface too. + /// + public abstract class PeekableContentProviderStream : PeekableStream, IPeekableContentProvider + { + public PeekableContentProviderStream Peekable => this; + + public IContentConsumer Consumer { get; private set; } + + public void SetTwoWayBinding(IContentConsumer consumer) + { + this.Consumer = consumer; + this.Consumer?.SetBinding(this); + } + + /// + /// This will set Consumer to null. + /// + public void Unbind() + { + this.Consumer?.UnsetBinding(); + this.Consumer = null; + } + + /// + /// Set Consumer to null if the current one is the one passed in the parameter. + /// + public void UnbindIf(IContentConsumer consumer) + { + if (consumer == null || consumer == this.Consumer) + { + this.Consumer?.UnsetBinding(); + this.Consumer = null; + } + } + + public void SwitchIf(IContentConsumer from, IContentConsumer to) + { + if (from == null || from == this.Consumer) + { + this.Consumer?.UnsetBinding(); + SetTwoWayBinding(to); + } + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs.meta new file mode 100644 index 00000000..e614478f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5f46be5dbbe57d1448b1a98145826359 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableContentProviderStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs new file mode 100644 index 00000000..51a0851c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs @@ -0,0 +1,32 @@ +namespace Best.HTTP.Shared.Streams +{ + public sealed class PeekableIncomingSegmentStream : PeekableStream + { + private int peek_listIdx; + private int peek_pos; + + public override void BeginPeek() + { + peek_listIdx = 0; + peek_pos = base.bufferList.Count > 0 ? base.bufferList[0].Offset : 0; + } + + public override int PeekByte() + { + if (base.bufferList.Count == 0) + return -1; + + var segment = base.bufferList[this.peek_listIdx]; + if (peek_pos >= segment.Offset + segment.Count) + { + if (base.bufferList.Count <= this.peek_listIdx + 1) + return -1; + + segment = base.bufferList[++this.peek_listIdx]; + this.peek_pos = segment.Offset; + } + + return segment.Data[this.peek_pos++]; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs.meta new file mode 100644 index 00000000..049663b3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 53712de99c0f6f749875bbb192baea22 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableIncomingSegmentStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs new file mode 100644 index 00000000..5a9a643c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs @@ -0,0 +1,9 @@ +namespace Best.HTTP.Shared.Streams +{ + public abstract class PeekableStream : BufferSegmentStream + { + public abstract void BeginPeek(); + public abstract int PeekByte(); + } + +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs.meta new file mode 100644 index 00000000..50d0fee4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 59512fef2c2575e4f98a99b053e5b8d9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/PeekableStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs new file mode 100644 index 00000000..ec8fd09c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs @@ -0,0 +1,144 @@ +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; +using System.IO; + +namespace Best.HTTP.Shared.Streams +{ + public sealed class ReadOnlyBufferedStream : Stream + { + Stream stream; + public const int READBUFFER = 8192; + byte[] buf; + int available = 0; + int pos = 0; + + public ReadOnlyBufferedStream(Stream nstream) + :this(nstream, READBUFFER) + { + } + + public ReadOnlyBufferedStream(Stream nstream, int bufferSize) + { + stream = nstream; + buf = BufferPool.Get(bufferSize, true); + } + + public override int Read(byte[] buffer, int offset, int size) + { + if (available > 0) + { + // copy & return + int copyCount = Math.Min(available, size); + Array.Copy(buf, pos, buffer, offset, copyCount); + pos += copyCount; + available -= copyCount; + return copyCount; + } + else + { + if (size >= buf.Length) + { + // read directly to buffer + return stream.Read(buffer, offset, size); + } + else + { + // read to buf and copy + pos = 0; + available = stream.Read(buf, 0, buf.Length); + + if (available > 0) + return Read(buffer, offset, size); + else + return 0; + } + } + } + + public override int ReadByte() + { + if (available > 0) + { + available -= 1; + pos += 1; + return buf[pos - 1]; + } + else + { + try + { + available = stream.Read(buf, 0, buf.Length); + pos = 0; + } + catch + { + return -1; + } + if (available < 1) + { + return -1; + } + else + { + available -= 1; + pos += 1; + return buf[pos - 1]; + } + } + } + + protected override void Dispose(bool disposing) + { + if (disposing && buf != null) + BufferPool.Release(buf); + + buf = null; + } + + public override bool CanRead + { + get { return true; } + } + + public override bool CanSeek + { + get { throw new NotImplementedException(); } + } + + public override bool CanWrite + { + get { throw new NotImplementedException(); } + } + + public override long Length + { + get { throw new NotImplementedException(); } + } + + public override long Position + { + get { throw new NotImplementedException(); } + set { throw new NotImplementedException(); } + } + + public override void Flush() + { + throw new NotImplementedException(); + } + + public override long Seek(long offset, SeekOrigin origin) + { + throw new NotImplementedException(); + } + + public override void SetLength(long value) + { + throw new NotImplementedException(); + } + + public override void Write(byte[] buffer, int offset, int count) + { + throw new NotImplementedException(); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs.meta new file mode 100644 index 00000000..137e76a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9e8c252d73a95304c9b4639e86366b53 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/ReadOnlyBufferedStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs new file mode 100644 index 00000000..6f765c26 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs @@ -0,0 +1,165 @@ +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using System; + +namespace Best.HTTP.Shared.Streams +{ + /// + /// Wrapper of multiple streams. Writes and reads are both supported. Read goes trough all the streams. + /// + public sealed class StreamList : System.IO.Stream + { + private System.IO.Stream[] Streams; + private int CurrentIdx; + + public StreamList(params System.IO.Stream[] streams) + { + this.Streams = streams; + this.CurrentIdx = 0; + } + + public void AppendStream(System.IO.Stream stream) + { + Array.Resize(ref this.Streams, this.Streams.Length + 1); + this.Streams[this.Streams.Length - 1] = stream; + } + + public override bool CanRead + { + get + { + if (CurrentIdx >= Streams.Length) + return false; + return Streams[CurrentIdx].CanRead; + } + } + + public override bool CanSeek { get { return false; } } + + public override bool CanWrite + { + get + { + if (CurrentIdx >= Streams.Length) + return false; + return Streams[CurrentIdx].CanWrite; + } + } + + public override void Flush() + { + if (CurrentIdx >= Streams.Length) + return; + + // We have to call the flush to all previous streams, as we may advanced the CurrentIdx + for (int i = 0; i <= CurrentIdx; ++i) + Streams[i].Flush(); + } + + public override long Length + { + get + { + if (CurrentIdx >= Streams.Length) + return 0; + + long length = 0; + for (int i = 0; i < Streams.Length; ++i) + length += Streams[i].Length; + + return length; + } + } + + public override int Read(byte[] buffer, int offset, int count) + { + if (CurrentIdx >= Streams.Length) + return -1; + + int readCount = Streams[CurrentIdx].Read(buffer, offset, count); + + while (readCount < count && ++CurrentIdx < Streams.Length) + { + // Dispose previous stream + try + { + Streams[CurrentIdx - 1].Dispose(); + Streams[CurrentIdx - 1] = null; + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("StreamList", "Dispose", ex); + } + + readCount += Streams[CurrentIdx].Read(buffer, offset + readCount, count - readCount); + } + + return readCount; + } + + public override void Write(byte[] buffer, int offset, int count) + { + if (CurrentIdx >= Streams.Length) + return; + + Streams[CurrentIdx].Write(buffer, offset, count); + } + + public void Write(string str) + { + var buffer = str.GetASCIIBytes(); + try + { + this.Write(buffer.Data, buffer.Offset, buffer.Count); + } + finally + { + BufferPool.Release(buffer); + } + } + + protected override void Dispose(bool disposing) + { + if (disposing) + { + for (int i = 0; i < Streams.Length; ++i) + if (Streams[i] != null) + { + try + { + Streams[i].Dispose(); + } + catch (Exception ex) + { + HTTPManager.Logger.Exception("StreamList", "Dispose", ex); + } + } + } + } + + public override long Position + { + get + { + throw new NotImplementedException("Position get"); + } + set + { + throw new NotImplementedException("Position set"); + } + } + + public override long Seek(long offset, System.IO.SeekOrigin origin) + { + if (CurrentIdx >= Streams.Length) + return 0; + + return Streams[CurrentIdx].Seek(offset, origin); + } + + public override void SetLength(long value) + { + throw new NotImplementedException("SetLength"); + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs.meta new file mode 100644 index 00000000..1b01e6fc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 305ba47e83a516c45bd29164da055121 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/StreamList.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs new file mode 100644 index 00000000..0c6a8fe9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs @@ -0,0 +1,110 @@ +using System; +using System.IO; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.Streams +{ + /// + /// A custom buffer stream implementation that will not close the underlying stream. + /// + public sealed class WriteOnlyBufferedStream : Stream + { + public override bool CanRead { get { return false; } } + public override bool CanSeek { get { return false; } } + public override bool CanWrite { get { return true; } } + public override long Length { get { return this.buffer.Length; } } + + public override long Position { get { return this._position; } set { throw new NotImplementedException("Position set"); } } + private int _position; + + private byte[] buffer; + private int _bufferSize; + private Stream stream; + + private LoggingContext _context; + + public WriteOnlyBufferedStream(Stream stream, int bufferSize, LoggingContext context) + { + if (stream == null) + throw new NullReferenceException(nameof(stream)); + + this.stream = stream; + this._context = context; + + this._bufferSize = bufferSize; + this.buffer = BufferPool.Get(this._bufferSize, true, context); + this._position = 0; + } + + public override void Flush() + { + if (this._position > 0) + { +#if !UNITY_WEBGL || UNITY_EDITOR + // if the underlying stream is an ITCPStreamerContentConsumer, we can use an optimized path and avoid copying + // the buffered bytes. + var tcpStreamer = this.stream as Shared.PlatformSupport.Network.Tcp.ITCPStreamerContentConsumer; + if (tcpStreamer != null) + { + // First swap the buffers because tcpStreamer.Write might cause an exception and both the streamer + // and WriteOnlyBufferedStream would release the same buffer + var buff = this.buffer.AsBuffer(this._position); + this.buffer = BufferPool.Get(this._bufferSize, true, this._context); + + tcpStreamer.Write(buff); + } + else +#endif + { + this.stream.Write(this.buffer, 0, this._position); + this.stream.Flush(); + } + + //if (HTTPManager.Logger.IsDiagnostic) + // HTTPManager.Logger.Information("WriteOnlyBufferedStream", string.Format("Flushed {0:N0} bytes", this._position)); + + this._position = 0; + } + } + + public override void Write(byte[] bufferFrom, int offset, int count) + { + while (count > 0) + { + int writeCount = Math.Min(count, this.buffer.Length - this._position); + Array.Copy(bufferFrom, offset, this.buffer, this._position, writeCount); + + this._position += writeCount; + offset += writeCount; + count -= writeCount; + + if (this._position == this.buffer.Length) + this.Flush(); + } + } + + public override int Read(byte[] buffer, int offset, int count) + { + return 0; + } + + public override long Seek(long offset, SeekOrigin origin) + { + return 0; + } + + public override void SetLength(long value) { } + + protected override void Dispose(bool disposing) + { + base.Dispose(disposing); + + if (disposing && this.buffer != null) + BufferPool.Release(this.buffer); + this.buffer = null; + } + } +} diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs.meta new file mode 100644 index 00000000..6244b22e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 8feaa035f81583347b7b28d29bbea34e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/Streams/WriteOnlyBufferedStream.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS.meta new file mode 100644 index 00000000..4b5e7127 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 9d8d452ba8f8e0f489c738967f43296a +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs new file mode 100644 index 00000000..2c3f5075 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs @@ -0,0 +1,170 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; +using System.Collections.Generic; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.Shared.Logger; + +namespace Best.HTTP.Shared.TLS +{ + public abstract class AbstractTls13Client : AbstractTlsClient, TlsAuthentication + { + protected static readonly int[] DefaultCipherSuites = new int[] { + /* + * TLS 1.3 + */ + CipherSuite.TLS_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_AES_256_GCM_SHA384, + CipherSuite.TLS_AES_128_GCM_SHA256, + + /* + * pre-TLS 1.3 + */ + CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA, + CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256, + CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA, + }; + + protected List _sniServerNames; + protected List _protocols; + + protected LoggingContext Context { get; private set; } + + protected AbstractTls13Client(List sniServerNames, List protocols, TlsCrypto crypto, LoggingContext context) + : base(crypto) + { + this.Context = context; + + this._sniServerNames = sniServerNames; + this._protocols = protocols; + } + + /// + /// TCPConnector has to know what protocol got negotiated + /// + public string GetNegotiatedApplicationProtocol() => base.m_context.SecurityParameters.ApplicationProtocol?.GetUtf8Decoding(); + + // (Abstract)TLSClient facing functions + + protected override ProtocolVersion[] GetSupportedVersions() => ProtocolVersion.TLSv13.DownTo(ProtocolVersion.TLSv12); + protected override IList GetProtocolNames() => this._protocols; + protected override IList GetSniServerNames() => this._sniServerNames; + protected override int[] GetSupportedCipherSuites() + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(GetSupportedCipherSuites)}", this.Context); + return TlsUtilities.GetSupportedCipherSuites(Crypto, DefaultCipherSuites); + } + + // TlsAuthentication implementation + public override TlsAuthentication GetAuthentication() + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(GetAuthentication)}", this.Context); + return this; + } + + public virtual TlsCredentials GetClientCredentials(CertificateRequest certificateRequest) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(GetClientCredentials)}", this.Context); + return null; + } + + public virtual void NotifyServerCertificate(TlsServerCertificate serverCertificate) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyServerCertificate)}", this.Context); + } + + public override void NotifyAlertReceived(short alertLevel, short alertDescription) + { + base.NotifyAlertReceived(alertLevel, alertDescription); + + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyAlertReceived)}({alertLevel}, {alertDescription})", this.Context); + } + + public override void NotifyAlertRaised(short alertLevel, short alertDescription, string message, Exception cause) + { + base.NotifyAlertRaised(alertLevel, alertDescription, message, cause); + + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyAlertRaised)}({alertLevel}, {alertDescription}, {message}, {cause?.StackTrace})", this.Context); + } + + public override void NotifyHandshakeBeginning() + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyHandshakeBeginning)}", this.Context); + } + + public override void NotifyHandshakeComplete() + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyHandshakeComplete)}", this.Context); + } + + public override void NotifyNewSessionTicket(NewSessionTicket newSessionTicket) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyNewSessionTicket)}", this.Context); + + base.NotifyNewSessionTicket(newSessionTicket); + } + + public override void NotifySecureRenegotiation(bool secureRenegotiation) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifySecureRenegotiation)}({secureRenegotiation})", this.Context); + + //base.NotifySecureRenegotiation(secureRenegotiation); + } + + public override void NotifySelectedCipherSuite(int selectedCipherSuite) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifySelectedCipherSuite)}({selectedCipherSuite})", this.Context); + + base.NotifySelectedCipherSuite(selectedCipherSuite); + } + + public override void NotifySelectedPsk(TlsPsk selectedPsk) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifySelectedPsk)}({selectedPsk?.PrfAlgorithm})", this.Context); + + base.NotifySelectedPsk(selectedPsk); + } + + public override void NotifyServerVersion(ProtocolVersion serverVersion) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifyServerVersion)}({serverVersion})", this.Context); + + base.NotifyServerVersion(serverVersion); + } + + public override void NotifySessionID(byte[] sessionID) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifySessionID)}", this.Context); + + base.NotifySessionID(sessionID); + } + + public override void NotifySessionToResume(TlsSession session) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(NotifySessionToResume)}", this.Context); + + base.NotifySessionToResume(session); + } + + public override void ProcessServerExtensions(IDictionary serverExtensions) + { + HTTPManager.Logger.Information(nameof(AbstractTls13Client), $"{nameof(ProcessServerExtensions)}", this.Context); + + base.ProcessServerExtensions(serverExtensions); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs.meta new file mode 100644 index 00000000..e43114b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 763881cac405c6a499a333e4daf3e6e7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/AbstractTls13Client.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto.meta new file mode 100644 index 00000000..a9d6f01e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c4d95ed1bc4585446bb9d36fa9f2a04d +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs new file mode 100644 index 00000000..9ba1aa1b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs @@ -0,0 +1,153 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC; +using Best.HTTP.Shared.TLS.Crypto.Impl; + +namespace Best.HTTP.Shared.TLS.Crypto +{ + public sealed class FastTlsCrypto : BcTlsCrypto + { + public FastTlsCrypto(SecureRandom entropySource) + : base(entropySource) + { + } + + public override TlsCipher CreateCipher(TlsCryptoParameters cryptoParams, int encryptionAlgorithm, int macAlgorithm) + { + HTTPManager.Logger.Verbose(nameof(FastTlsCrypto), $"CreateCipher({encryptionAlgorithm}, {macAlgorithm})"); + + switch (encryptionAlgorithm) + { + case EncryptionAlgorithm.CHACHA20_POLY1305: + { + // NOTE: Ignores macAlgorithm + //return CreateChaCha20Poly1305(cryptoParams); + + BcChaCha20Poly1305 encrypt = new BcChaCha20Poly1305(true); + BcChaCha20Poly1305 decrypt = new BcChaCha20Poly1305(false); + + return new TlsAeadCipher(cryptoParams, encrypt, decrypt, 32, 16, TlsAeadCipher.AEAD_CHACHA20_POLY1305); + } + + case EncryptionAlgorithm.AES_128_CBC: + case EncryptionAlgorithm.ARIA_128_CBC: + case EncryptionAlgorithm.CAMELLIA_128_CBC: + case EncryptionAlgorithm.SEED_CBC: + case EncryptionAlgorithm.SM4_CBC: + { + //return CreateCipher_Cbc(cryptoParams, encryptionAlgorithm, 16, macAlgorithm); + FastTlsBlockCipherImpl encrypt = new FastTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), true); + FastTlsBlockCipherImpl decrypt = new FastTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), false); + + TlsHmac clientMac = CreateMac(cryptoParams, macAlgorithm); + TlsHmac serverMac = CreateMac(cryptoParams, macAlgorithm); + + return new FastTlsBlockCipher(cryptoParams, encrypt, decrypt, clientMac, serverMac, 16); + } + + case EncryptionAlgorithm.AES_256_CBC: + case EncryptionAlgorithm.ARIA_256_CBC: + case EncryptionAlgorithm.CAMELLIA_256_CBC: + { + //return CreateCipher_Cbc(cryptoParams, encryptionAlgorithm, 32, macAlgorithm); + FastTlsBlockCipherImpl encrypt = new FastTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), true); + FastTlsBlockCipherImpl decrypt = new FastTlsBlockCipherImpl(CreateCbcBlockCipher(encryptionAlgorithm), false); + + TlsHmac clientMac = CreateMac(cryptoParams, macAlgorithm); + TlsHmac serverMac = CreateMac(cryptoParams, macAlgorithm); + + return new FastTlsBlockCipher(cryptoParams, encrypt, decrypt, clientMac, serverMac, 32); + } + + case EncryptionAlgorithm.AES_128_CCM: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Ccm(cryptoParams, 16, 16); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 16, 16, TlsAeadCipher.AEAD_CCM); + + } + case EncryptionAlgorithm.AES_128_CCM_8: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Ccm(cryptoParams, 16, 8); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 16, 8, TlsAeadCipher.AEAD_CCM); + } + case EncryptionAlgorithm.AES_256_CCM: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Ccm(cryptoParams, 32, 16); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 32, 16, TlsAeadCipher.AEAD_CCM); + } + case EncryptionAlgorithm.AES_256_CCM_8: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Ccm(cryptoParams, 32, 8); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Ccm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 32, 8, TlsAeadCipher.AEAD_CCM); + } + + case EncryptionAlgorithm.AES_128_GCM: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Gcm(cryptoParams, 16, 16); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 16, 16, TlsAeadCipher.AEAD_GCM); + } + + case EncryptionAlgorithm.AES_256_GCM: + { + // NOTE: Ignores macAlgorithm + //return CreateCipher_Aes_Gcm(cryptoParams, 32, 16); + FastTlsAeadCipherImpl encrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), true); + FastTlsAeadCipherImpl decrypt = new FastTlsAeadCipherImpl(CreateAeadCipher_Aes_Gcm(), false); + + return new FastTlsAeadCipher(cryptoParams, encrypt, decrypt, 32, 16, TlsAeadCipher.AEAD_GCM); + } + + default: + return base.CreateCipher(cryptoParams, encryptionAlgorithm, macAlgorithm); + } + } + + protected override IBlockCipher CreateAesEngine() + { + //return new AesEngine(); + return new FastAesEngine(); + } + + protected override IAeadCipher CreateCcmMode(IBlockCipher engine) + { + return new FastCcmBlockCipher(engine); + } + + protected override IAeadCipher CreateGcmMode(IBlockCipher engine) + { + // TODO Consider allowing custom configuration of multiplier + return new FastGcmBlockCipher(engine); + } + + protected override IBlockCipher CreateCbcBlockCipher(IBlockCipher blockCipher) + { + return new FastCbcBlockCipher(blockCipher); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs.meta new file mode 100644 index 00000000..8bcfc00a --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cc1adc146b0f9a64497be22f9e9dac08 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/FastTlsCrypto.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl.meta new file mode 100644 index 00000000..b75dcb02 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: a2d6a733d60dfbd4c8454b8fa51da598 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs new file mode 100644 index 00000000..55ca5f73 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs @@ -0,0 +1,150 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.CompilerServices; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +#if BESTHTTP_WITH_BURST +using Unity.Burst; +using Unity.Collections.LowLevel.Unsafe; +#endif + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] +#if BESTHTTP_WITH_BURST + [BurstCompile] +#endif + public sealed class BurstTables8kGcmMultiplier //: IGcmMultiplier + { + private byte[] H; + private GcmUtilities.FieldElement[][] T; + + public void Init(byte[] H) + { + if (T == null) + { + T = new GcmUtilities.FieldElement[2][]; + } + else if (Arrays.AreEqual(this.H, H)) + { + return; + } + + if (this.H == null) + this.H = Arrays.Clone(H); + else + { + if (this.H.Length != H.Length) + Array.Resize(ref this.H, H.Length); + + Array.Copy(H, this.H, H.Length); + } + + for (int i = 0; i < 2; ++i) + { + if (T[i] == null) + T[i] = new GcmUtilities.FieldElement[256]; + + GcmUtilities.FieldElement[] t = T[i]; + + // t[0] = 0 + + if (i == 0) + { + // t[1] = H.p^7 + GcmUtilities.AsFieldElement(this.H, out t[1]); + GcmUtilities.MultiplyP7(ref t[1]); + } + else + { + // t[1] = T[i-1][1].p^8 + GcmUtilities.MultiplyP8(ref T[i - 1][1], out t[1]); + } + + for (int n = 1; n < 128; ++n) + { + // t[2.n] = t[n].p^-1 + GcmUtilities.DivideP(ref t[n], out t[n << 1]); + + // t[2.n + 1] = t[2.n] + t[1] + GcmUtilities.Xor(ref t[n << 1], ref t[1], out t[(n << 1) + 1]); + } + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public unsafe void MultiplyH(byte[] x) + { + fixed (byte* px = x) + fixed (GcmUtilities.FieldElement* pT0 = this.T[0]) + fixed (GcmUtilities.FieldElement* pT1 = this.T[1]) + MultiplyHImpl(px, pT0, pT1); + } + +#if BESTHTTP_WITH_BURST + [BurstCompile] +#endif + private static unsafe void MultiplyHImpl( +#if BESTHTTP_WITH_BURST + [NoAlias] +#endif + byte* px, +#if BESTHTTP_WITH_BURST + [NoAlias] +#endif + GcmUtilities.FieldElement* pT0, +#if BESTHTTP_WITH_BURST + [NoAlias] +#endif + GcmUtilities.FieldElement* pT1) + { + int vPos = px[15]; + int uPos = px[14]; + ulong z1 = pT0[uPos].n1 ^ pT1[vPos].n1; + ulong z0 = pT0[uPos].n0 ^ pT1[vPos].n0; + + for (int i = 12; i >= 0; i -= 2) + { + vPos = px[i + 1]; + uPos = px[i]; + + ulong c = z1 << 48; + z1 = pT0[uPos].n1 ^ pT1[vPos].n1 ^ ((z1 >> 16) | (z0 << 48)); + z0 = pT0[uPos].n0 ^ pT1[vPos].n0 ^ (z0 >> 16) ^ c ^ (c >> 1) ^ (c >> 2) ^ (c >> 7); + } + + //GcmUtilities.AsBytes(z0, z1, x); + + //UInt32_To_BE((uint)(n >> 32), bs, off); + uint n = (uint)(z0 >> 32); + px[0] = (byte)(n >> 24); + px[1] = (byte)(n >> 16); + px[2] = (byte)(n >> 8); + px[3] = (byte)(n); + //UInt32_To_BE((uint)(n), bs, off + 4); + n = (uint)(z0); + px[4] = (byte)(n >> 24); + px[5] = (byte)(n >> 16); + px[6] = (byte)(n >> 8); + px[7] = (byte)(n); + + n = (uint)(z1 >> 32); + px[8] = (byte)(n >> 24); + px[9] = (byte)(n >> 16); + px[10] = (byte)(n >> 8); + px[11] = (byte)(n); + //UInt32_To_BE((uint)(n), bs, off + 4); + n = (uint)(z1); + px[12] = (byte)(n >> 24); + px[13] = (byte)(n >> 16); + px[14] = (byte)(n >> 8); + px[15] = (byte)(n); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs.meta new file mode 100644 index 00000000..421c4809 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 479342137e6bf344aabeafb51f59c058 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/BurstTables8kGcmMultiplier.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs new file mode 100644 index 00000000..c28943d9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs @@ -0,0 +1,938 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /** + * an implementation of the AES (Rijndael), from FIPS-197. + *

    + * For further details see: http://csrc.nist.gov/encryption/aes/. + * + * This implementation is based on optimizations from Dr. Brian Gladman's paper and C code at + * http://fp.gladman.plus.com/cryptography_technology/rijndael/ + * + * There are three levels of tradeoff of speed vs memory + * Because java has no preprocessor, they are written as three separate classes from which to choose + * + * The fastest uses 8Kbytes of static tables to precompute round calculations, 4 256 word tables for encryption + * and 4 for decryption. + * + * The middle performance version uses only one 256 word table for each, for a total of 2Kbytes, + * adding 12 rotate operations per round to compute the values contained in the other tables from + * the contents of the first. + * + * The slowest version uses no static tables at all and computes the values in each round. + *

    + *

    + * This file contains the middle performance version with 2Kbytes of static tables for round precomputation. + *

    + */ + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastAesEngine + : IBlockCipher + { + // The S box + private static readonly byte[] S = + { + 99, 124, 119, 123, 242, 107, 111, 197, + 48, 1, 103, 43, 254, 215, 171, 118, + 202, 130, 201, 125, 250, 89, 71, 240, + 173, 212, 162, 175, 156, 164, 114, 192, + 183, 253, 147, 38, 54, 63, 247, 204, + 52, 165, 229, 241, 113, 216, 49, 21, + 4, 199, 35, 195, 24, 150, 5, 154, + 7, 18, 128, 226, 235, 39, 178, 117, + 9, 131, 44, 26, 27, 110, 90, 160, + 82, 59, 214, 179, 41, 227, 47, 132, + 83, 209, 0, 237, 32, 252, 177, 91, + 106, 203, 190, 57, 74, 76, 88, 207, + 208, 239, 170, 251, 67, 77, 51, 133, + 69, 249, 2, 127, 80, 60, 159, 168, + 81, 163, 64, 143, 146, 157, 56, 245, + 188, 182, 218, 33, 16, 255, 243, 210, + 205, 12, 19, 236, 95, 151, 68, 23, + 196, 167, 126, 61, 100, 93, 25, 115, + 96, 129, 79, 220, 34, 42, 144, 136, + 70, 238, 184, 20, 222, 94, 11, 219, + 224, 50, 58, 10, 73, 6, 36, 92, + 194, 211, 172, 98, 145, 149, 228, 121, + 231, 200, 55, 109, 141, 213, 78, 169, + 108, 86, 244, 234, 101, 122, 174, 8, + 186, 120, 37, 46, 28, 166, 180, 198, + 232, 221, 116, 31, 75, 189, 139, 138, + 112, 62, 181, 102, 72, 3, 246, 14, + 97, 53, 87, 185, 134, 193, 29, 158, + 225, 248, 152, 17, 105, 217, 142, 148, + 155, 30, 135, 233, 206, 85, 40, 223, + 140, 161, 137, 13, 191, 230, 66, 104, + 65, 153, 45, 15, 176, 84, 187, 22, + }; + + // The inverse S-box + private static readonly byte[] Si = + { + 82, 9, 106, 213, 48, 54, 165, 56, + 191, 64, 163, 158, 129, 243, 215, 251, + 124, 227, 57, 130, 155, 47, 255, 135, + 52, 142, 67, 68, 196, 222, 233, 203, + 84, 123, 148, 50, 166, 194, 35, 61, + 238, 76, 149, 11, 66, 250, 195, 78, + 8, 46, 161, 102, 40, 217, 36, 178, + 118, 91, 162, 73, 109, 139, 209, 37, + 114, 248, 246, 100, 134, 104, 152, 22, + 212, 164, 92, 204, 93, 101, 182, 146, + 108, 112, 72, 80, 253, 237, 185, 218, + 94, 21, 70, 87, 167, 141, 157, 132, + 144, 216, 171, 0, 140, 188, 211, 10, + 247, 228, 88, 5, 184, 179, 69, 6, + 208, 44, 30, 143, 202, 63, 15, 2, + 193, 175, 189, 3, 1, 19, 138, 107, + 58, 145, 17, 65, 79, 103, 220, 234, + 151, 242, 207, 206, 240, 180, 230, 115, + 150, 172, 116, 34, 231, 173, 53, 133, + 226, 249, 55, 232, 28, 117, 223, 110, + 71, 241, 26, 113, 29, 41, 197, 137, + 111, 183, 98, 14, 170, 24, 190, 27, + 252, 86, 62, 75, 198, 210, 121, 32, + 154, 219, 192, 254, 120, 205, 90, 244, + 31, 221, 168, 51, 136, 7, 199, 49, + 177, 18, 16, 89, 39, 128, 236, 95, + 96, 81, 127, 169, 25, 181, 74, 13, + 45, 229, 122, 159, 147, 201, 156, 239, + 160, 224, 59, 77, 174, 42, 245, 176, + 200, 235, 187, 60, 131, 83, 153, 97, + 23, 43, 4, 126, 186, 119, 214, 38, + 225, 105, 20, 99, 85, 33, 12, 125, + }; + + // vector used in calculating key schedule (powers of x in GF(256)) + private static readonly byte[] rcon = + { + 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, + 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91 + }; + + // precomputation tables of calculations for rounds + private static readonly uint[] T0 = + { + 0xa56363c6, 0x847c7cf8, 0x997777ee, 0x8d7b7bf6, 0x0df2f2ff, + 0xbd6b6bd6, 0xb16f6fde, 0x54c5c591, 0x50303060, 0x03010102, + 0xa96767ce, 0x7d2b2b56, 0x19fefee7, 0x62d7d7b5, 0xe6abab4d, + 0x9a7676ec, 0x45caca8f, 0x9d82821f, 0x40c9c989, 0x877d7dfa, + 0x15fafaef, 0xeb5959b2, 0xc947478e, 0x0bf0f0fb, 0xecadad41, + 0x67d4d4b3, 0xfda2a25f, 0xeaafaf45, 0xbf9c9c23, 0xf7a4a453, + 0x967272e4, 0x5bc0c09b, 0xc2b7b775, 0x1cfdfde1, 0xae93933d, + 0x6a26264c, 0x5a36366c, 0x413f3f7e, 0x02f7f7f5, 0x4fcccc83, + 0x5c343468, 0xf4a5a551, 0x34e5e5d1, 0x08f1f1f9, 0x937171e2, + 0x73d8d8ab, 0x53313162, 0x3f15152a, 0x0c040408, 0x52c7c795, + 0x65232346, 0x5ec3c39d, 0x28181830, 0xa1969637, 0x0f05050a, + 0xb59a9a2f, 0x0907070e, 0x36121224, 0x9b80801b, 0x3de2e2df, + 0x26ebebcd, 0x6927274e, 0xcdb2b27f, 0x9f7575ea, 0x1b090912, + 0x9e83831d, 0x742c2c58, 0x2e1a1a34, 0x2d1b1b36, 0xb26e6edc, + 0xee5a5ab4, 0xfba0a05b, 0xf65252a4, 0x4d3b3b76, 0x61d6d6b7, + 0xceb3b37d, 0x7b292952, 0x3ee3e3dd, 0x712f2f5e, 0x97848413, + 0xf55353a6, 0x68d1d1b9, 0x00000000, 0x2cededc1, 0x60202040, + 0x1ffcfce3, 0xc8b1b179, 0xed5b5bb6, 0xbe6a6ad4, 0x46cbcb8d, + 0xd9bebe67, 0x4b393972, 0xde4a4a94, 0xd44c4c98, 0xe85858b0, + 0x4acfcf85, 0x6bd0d0bb, 0x2aefefc5, 0xe5aaaa4f, 0x16fbfbed, + 0xc5434386, 0xd74d4d9a, 0x55333366, 0x94858511, 0xcf45458a, + 0x10f9f9e9, 0x06020204, 0x817f7ffe, 0xf05050a0, 0x443c3c78, + 0xba9f9f25, 0xe3a8a84b, 0xf35151a2, 0xfea3a35d, 0xc0404080, + 0x8a8f8f05, 0xad92923f, 0xbc9d9d21, 0x48383870, 0x04f5f5f1, + 0xdfbcbc63, 0xc1b6b677, 0x75dadaaf, 0x63212142, 0x30101020, + 0x1affffe5, 0x0ef3f3fd, 0x6dd2d2bf, 0x4ccdcd81, 0x140c0c18, + 0x35131326, 0x2fececc3, 0xe15f5fbe, 0xa2979735, 0xcc444488, + 0x3917172e, 0x57c4c493, 0xf2a7a755, 0x827e7efc, 0x473d3d7a, + 0xac6464c8, 0xe75d5dba, 0x2b191932, 0x957373e6, 0xa06060c0, + 0x98818119, 0xd14f4f9e, 0x7fdcdca3, 0x66222244, 0x7e2a2a54, + 0xab90903b, 0x8388880b, 0xca46468c, 0x29eeeec7, 0xd3b8b86b, + 0x3c141428, 0x79dedea7, 0xe25e5ebc, 0x1d0b0b16, 0x76dbdbad, + 0x3be0e0db, 0x56323264, 0x4e3a3a74, 0x1e0a0a14, 0xdb494992, + 0x0a06060c, 0x6c242448, 0xe45c5cb8, 0x5dc2c29f, 0x6ed3d3bd, + 0xefacac43, 0xa66262c4, 0xa8919139, 0xa4959531, 0x37e4e4d3, + 0x8b7979f2, 0x32e7e7d5, 0x43c8c88b, 0x5937376e, 0xb76d6dda, + 0x8c8d8d01, 0x64d5d5b1, 0xd24e4e9c, 0xe0a9a949, 0xb46c6cd8, + 0xfa5656ac, 0x07f4f4f3, 0x25eaeacf, 0xaf6565ca, 0x8e7a7af4, + 0xe9aeae47, 0x18080810, 0xd5baba6f, 0x887878f0, 0x6f25254a, + 0x722e2e5c, 0x241c1c38, 0xf1a6a657, 0xc7b4b473, 0x51c6c697, + 0x23e8e8cb, 0x7cdddda1, 0x9c7474e8, 0x211f1f3e, 0xdd4b4b96, + 0xdcbdbd61, 0x868b8b0d, 0x858a8a0f, 0x907070e0, 0x423e3e7c, + 0xc4b5b571, 0xaa6666cc, 0xd8484890, 0x05030306, 0x01f6f6f7, + 0x120e0e1c, 0xa36161c2, 0x5f35356a, 0xf95757ae, 0xd0b9b969, + 0x91868617, 0x58c1c199, 0x271d1d3a, 0xb99e9e27, 0x38e1e1d9, + 0x13f8f8eb, 0xb398982b, 0x33111122, 0xbb6969d2, 0x70d9d9a9, + 0x898e8e07, 0xa7949433, 0xb69b9b2d, 0x221e1e3c, 0x92878715, + 0x20e9e9c9, 0x49cece87, 0xff5555aa, 0x78282850, 0x7adfdfa5, + 0x8f8c8c03, 0xf8a1a159, 0x80898909, 0x170d0d1a, 0xdabfbf65, + 0x31e6e6d7, 0xc6424284, 0xb86868d0, 0xc3414182, 0xb0999929, + 0x772d2d5a, 0x110f0f1e, 0xcbb0b07b, 0xfc5454a8, 0xd6bbbb6d, + 0x3a16162c + }; + + private static readonly uint[] Tinv0 = + { + 0x50a7f451, 0x5365417e, 0xc3a4171a, 0x965e273a, 0xcb6bab3b, + 0xf1459d1f, 0xab58faac, 0x9303e34b, 0x55fa3020, 0xf66d76ad, + 0x9176cc88, 0x254c02f5, 0xfcd7e54f, 0xd7cb2ac5, 0x80443526, + 0x8fa362b5, 0x495ab1de, 0x671bba25, 0x980eea45, 0xe1c0fe5d, + 0x02752fc3, 0x12f04c81, 0xa397468d, 0xc6f9d36b, 0xe75f8f03, + 0x959c9215, 0xeb7a6dbf, 0xda595295, 0x2d83bed4, 0xd3217458, + 0x2969e049, 0x44c8c98e, 0x6a89c275, 0x78798ef4, 0x6b3e5899, + 0xdd71b927, 0xb64fe1be, 0x17ad88f0, 0x66ac20c9, 0xb43ace7d, + 0x184adf63, 0x82311ae5, 0x60335197, 0x457f5362, 0xe07764b1, + 0x84ae6bbb, 0x1ca081fe, 0x942b08f9, 0x58684870, 0x19fd458f, + 0x876cde94, 0xb7f87b52, 0x23d373ab, 0xe2024b72, 0x578f1fe3, + 0x2aab5566, 0x0728ebb2, 0x03c2b52f, 0x9a7bc586, 0xa50837d3, + 0xf2872830, 0xb2a5bf23, 0xba6a0302, 0x5c8216ed, 0x2b1ccf8a, + 0x92b479a7, 0xf0f207f3, 0xa1e2694e, 0xcdf4da65, 0xd5be0506, + 0x1f6234d1, 0x8afea6c4, 0x9d532e34, 0xa055f3a2, 0x32e18a05, + 0x75ebf6a4, 0x39ec830b, 0xaaef6040, 0x069f715e, 0x51106ebd, + 0xf98a213e, 0x3d06dd96, 0xae053edd, 0x46bde64d, 0xb58d5491, + 0x055dc471, 0x6fd40604, 0xff155060, 0x24fb9819, 0x97e9bdd6, + 0xcc434089, 0x779ed967, 0xbd42e8b0, 0x888b8907, 0x385b19e7, + 0xdbeec879, 0x470a7ca1, 0xe90f427c, 0xc91e84f8, 0x00000000, + 0x83868009, 0x48ed2b32, 0xac70111e, 0x4e725a6c, 0xfbff0efd, + 0x5638850f, 0x1ed5ae3d, 0x27392d36, 0x64d90f0a, 0x21a65c68, + 0xd1545b9b, 0x3a2e3624, 0xb1670a0c, 0x0fe75793, 0xd296eeb4, + 0x9e919b1b, 0x4fc5c080, 0xa220dc61, 0x694b775a, 0x161a121c, + 0x0aba93e2, 0xe52aa0c0, 0x43e0223c, 0x1d171b12, 0x0b0d090e, + 0xadc78bf2, 0xb9a8b62d, 0xc8a91e14, 0x8519f157, 0x4c0775af, + 0xbbdd99ee, 0xfd607fa3, 0x9f2601f7, 0xbcf5725c, 0xc53b6644, + 0x347efb5b, 0x7629438b, 0xdcc623cb, 0x68fcedb6, 0x63f1e4b8, + 0xcadc31d7, 0x10856342, 0x40229713, 0x2011c684, 0x7d244a85, + 0xf83dbbd2, 0x1132f9ae, 0x6da129c7, 0x4b2f9e1d, 0xf330b2dc, + 0xec52860d, 0xd0e3c177, 0x6c16b32b, 0x99b970a9, 0xfa489411, + 0x2264e947, 0xc48cfca8, 0x1a3ff0a0, 0xd82c7d56, 0xef903322, + 0xc74e4987, 0xc1d138d9, 0xfea2ca8c, 0x360bd498, 0xcf81f5a6, + 0x28de7aa5, 0x268eb7da, 0xa4bfad3f, 0xe49d3a2c, 0x0d927850, + 0x9bcc5f6a, 0x62467e54, 0xc2138df6, 0xe8b8d890, 0x5ef7392e, + 0xf5afc382, 0xbe805d9f, 0x7c93d069, 0xa92dd56f, 0xb31225cf, + 0x3b99acc8, 0xa77d1810, 0x6e639ce8, 0x7bbb3bdb, 0x097826cd, + 0xf418596e, 0x01b79aec, 0xa89a4f83, 0x656e95e6, 0x7ee6ffaa, + 0x08cfbc21, 0xe6e815ef, 0xd99be7ba, 0xce366f4a, 0xd4099fea, + 0xd67cb029, 0xafb2a431, 0x31233f2a, 0x3094a5c6, 0xc066a235, + 0x37bc4e74, 0xa6ca82fc, 0xb0d090e0, 0x15d8a733, 0x4a9804f1, + 0xf7daec41, 0x0e50cd7f, 0x2ff69117, 0x8dd64d76, 0x4db0ef43, + 0x544daacc, 0xdf0496e4, 0xe3b5d19e, 0x1b886a4c, 0xb81f2cc1, + 0x7f516546, 0x04ea5e9d, 0x5d358c01, 0x737487fa, 0x2e410bfb, + 0x5a1d67b3, 0x52d2db92, 0x335610e9, 0x1347d66d, 0x8c61d79a, + 0x7a0ca137, 0x8e14f859, 0x893c13eb, 0xee27a9ce, 0x35c961b7, + 0xede51ce1, 0x3cb1477a, 0x59dfd29c, 0x3f73f255, 0x79ce1418, + 0xbf37c773, 0xeacdf753, 0x5baafd5f, 0x146f3ddf, 0x86db4478, + 0x81f3afca, 0x3ec468b9, 0x2c342438, 0x5f40a3c2, 0x72c31d16, + 0x0c25e2bc, 0x8b493c28, 0x41950dff, 0x7101a839, 0xdeb30c08, + 0x9ce4b4d8, 0x90c15664, 0x6184cb7b, 0x70b632d5, 0x745c6c48, + 0x4257b8d0 + }; + + private static uint Shift(uint r, int shift) + { + return (r >> shift) | (r << (32 - shift)); + } + + /* multiply four bytes in GF(2^8) by 'x' {02} in parallel */ + + private const uint m1 = 0x80808080; + private const uint m2 = 0x7f7f7f7f; + private const uint m3 = 0x0000001b; + private const uint m4 = 0xC0C0C0C0; + private const uint m5 = 0x3f3f3f3f; + + private static uint FFmulX(uint x) + { + return ((x & m2) << 1) ^ (((x & m1) >> 7) * m3); + } + + private static uint FFmulX2(uint x) + { + uint t0 = (x & m5) << 2; + uint t1 = (x & m4); + t1 ^= (t1 >> 1); + return t0 ^ (t1 >> 2) ^ (t1 >> 5); + } + + /* + The following defines provide alternative definitions of FFmulX that might + give improved performance if a fast 32-bit multiply is not available. + + private int FFmulX(int x) { int u = x & m1; u |= (u >> 1); return ((x & m2) << 1) ^ ((u >>> 3) | (u >>> 6)); } + private static final int m4 = 0x1b1b1b1b; + private int FFmulX(int x) { int u = x & m1; return ((x & m2) << 1) ^ ((u - (u >>> 7)) & m4); } + + */ + + private static uint Inv_Mcol(uint x) + { + uint t0, t1; + t0 = x; + t1 = t0 ^ Shift(t0, 8); + t0 ^= FFmulX(t1); + t1 ^= FFmulX2(t0); + t0 ^= t1 ^ Shift(t1, 16); + return t0; + } + + private static uint SubWord(uint x) + { + return (uint)S[x & 255] + | (((uint)S[(x >> 8) & 255]) << 8) + | (((uint)S[(x >> 16) & 255]) << 16) + | (((uint)S[(x >> 24) & 255]) << 24); + } + + uint[][] W = null; + + /** + * Calculate the necessary round keys + * The number of calculations depends on key size and block size + * AES specified a fixed block size of 128 bits and key sizes 128/192/256 bits + * This code is written assuming those are the only possible values + */ + private uint[][] GenerateWorkingKey(byte[] key, bool forEncryption) + { + int keyLen = key.Length; + if (keyLen < 16 || keyLen > 32 || (keyLen & 7) != 0) + throw new ArgumentException("Key length not 128/192/256 bits."); + + int KC = keyLen >> 2; + this.ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block sizes + + if (W == null || W.Length < ROUNDS + 1) + { + W = new uint[ROUNDS + 1][]; // 4 words in a block + for (int i = 0; i <= ROUNDS; ++i) + { + W[i] = new uint[4]; + } + } + else + { + for (int i = 0; i < W.Length; ++i) + Array.Clear(W[i], 0, W[i].Length); + } + + switch (KC) + { + case 4: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + + for (int i = 1; i <= 10; ++i) + { + uint u = SubWord(Shift(t3, 8)) ^ rcon[i - 1]; + t0 ^= u; W[i][0] = t0; + t1 ^= t0; W[i][1] = t1; + t2 ^= t1; W[i][2] = t2; + t3 ^= t2; W[i][3] = t3; + } + + break; + } + case 6: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + + uint rcon = 1; + uint u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[1][2] = t0; + t1 ^= t0; W[1][3] = t1; + t2 ^= t1; W[2][0] = t2; + t3 ^= t2; W[2][1] = t3; + t4 ^= t3; W[2][2] = t4; + t5 ^= t4; W[2][3] = t5; + + for (int i = 3; i < 12; i += 3) + { + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i][0] = t0; + t1 ^= t0; W[i][1] = t1; + t2 ^= t1; W[i][2] = t2; + t3 ^= t2; W[i][3] = t3; + t4 ^= t3; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + u = SubWord(Shift(t5, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i + 1][2] = t0; + t1 ^= t0; W[i + 1][3] = t1; + t2 ^= t1; W[i + 2][0] = t2; + t3 ^= t2; W[i + 2][1] = t3; + t4 ^= t3; W[i + 2][2] = t4; + t5 ^= t4; W[i + 2][3] = t5; + } + + u = SubWord(Shift(t5, 8)) ^ rcon; + t0 ^= u; W[12][0] = t0; + t1 ^= t0; W[12][1] = t1; + t2 ^= t1; W[12][2] = t2; + t3 ^= t2; W[12][3] = t3; + + break; + } + case 8: + { + uint t0 = Pack.LE_To_UInt32(key, 0); W[0][0] = t0; + uint t1 = Pack.LE_To_UInt32(key, 4); W[0][1] = t1; + uint t2 = Pack.LE_To_UInt32(key, 8); W[0][2] = t2; + uint t3 = Pack.LE_To_UInt32(key, 12); W[0][3] = t3; + uint t4 = Pack.LE_To_UInt32(key, 16); W[1][0] = t4; + uint t5 = Pack.LE_To_UInt32(key, 20); W[1][1] = t5; + uint t6 = Pack.LE_To_UInt32(key, 24); W[1][2] = t6; + uint t7 = Pack.LE_To_UInt32(key, 28); W[1][3] = t7; + + uint u, rcon = 1; + + for (int i = 2; i < 14; i += 2) + { + u = SubWord(Shift(t7, 8)) ^ rcon; rcon <<= 1; + t0 ^= u; W[i][0] = t0; + t1 ^= t0; W[i][1] = t1; + t2 ^= t1; W[i][2] = t2; + t3 ^= t2; W[i][3] = t3; + u = SubWord(t3); + t4 ^= u; W[i + 1][0] = t4; + t5 ^= t4; W[i + 1][1] = t5; + t6 ^= t5; W[i + 1][2] = t6; + t7 ^= t6; W[i + 1][3] = t7; + } + + u = SubWord(Shift(t7, 8)) ^ rcon; + t0 ^= u; W[14][0] = t0; + t1 ^= t0; W[14][1] = t1; + t2 ^= t1; W[14][2] = t2; + t3 ^= t2; W[14][3] = t3; + + break; + } + default: + { + throw new InvalidOperationException("Should never get here"); + } + } + + if (!forEncryption) + { + for (int j = 1; j < ROUNDS; j++) + { + uint[] w = W[j]; + for (int i = 0; i < 4; i++) + { + w[i] = Inv_Mcol(w[i]); + } + } + } + + return W; + } + + private int ROUNDS; + private uint[][] WorkingKey; + private bool forEncryption; + + private byte[] s; + + private const int BLOCK_SIZE = 16; + + /** + * default constructor - 128 bit block size. + */ + public FastAesEngine() + { + } + + /** + * initialise an AES cipher. + * + * @param forEncryption whether or not we are for encryption. + * @param parameters the parameters required to set up the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + if (!(parameters is KeyParameter keyParameter)) + throw new ArgumentException("invalid parameter passed to AES init - " + + Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); + + WorkingKey = GenerateWorkingKey(keyParameter.GetKey(), forEncryption); + + this.forEncryption = forEncryption; + this.s = /*Arrays.Clone*/(forEncryption ? S : Si); + } + + public string AlgorithmName + { + get { return "AES"; } + } + + public int GetBlockSize() + { + return BLOCK_SIZE; + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, inOff, 16, "input buffer too short"); + Check.OutputLength(output, outOff, 16, "output buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + if (forEncryption) + { + EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } + else + { + DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff), WorkingKey); + } +#else + if (forEncryption) + { + EncryptBlock(input, inOff, output, outOff, WorkingKey); + } + else + { + DecryptBlock(input, inOff, output, outOff, WorkingKey); + } +#endif + + return BLOCK_SIZE; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public unsafe int ProcessBlock(ReadOnlySpan input, Span output) + { + if (WorkingKey == null) + throw new InvalidOperationException("AES engine not initialised"); + + Check.DataLength(input, 16, "input buffer too short"); + Check.OutputLength(output, 16, "output buffer too short"); + + if (forEncryption) + { + //EncryptBlock(input, output, WorkingKey); + + uint C0 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input); + uint C1 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[4..]); + uint C2 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[8..]); + uint C3 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[12..]); + + uint[] kw = WorkingKey[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + uint tmp1, tmp2, tmp3; + uint shift1, shift2, shift3; + + fixed (uint* pT0 = T0) + { + while (r < ROUNDS - 1) + { + kw = WorkingKey[r++]; + fixed (uint* pkw = kw) + { + tmp1 = pT0[(t1 >> 8) & 255]; tmp2 = pT0[(t2 >> 16) & 255]; tmp3 = pT0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r0 = pT0[t0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pT0[(t2 >> 8) & 255]; tmp2 = pT0[(r3 >> 16) & 255]; tmp3 = pT0[(t0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r1 = pT0[t1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pT0[(r3 >> 8) & 255]; tmp2 = pT0[(t0 >> 16) & 255]; tmp3 = pT0[(t1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r2 = pT0[t2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pT0[(t0 >> 8) & 255]; tmp2 = pT0[(t1 >> 16) & 255]; tmp3 = pT0[(t2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pT0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + + kw = WorkingKey[r++]; + + fixed (uint* pkw = kw) + { + tmp1 = pT0[(r1 >> 8) & 255]; tmp2 = pT0[(r2 >> 16) & 255]; tmp3 = pT0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t0 = pT0[r0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pT0[(r2 >> 8) & 255]; tmp2 = pT0[(r3 >> 16) & 255]; tmp3 = pT0[(r0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t1 = pT0[r1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pT0[(r3 >> 8) & 255]; tmp2 = pT0[(r0 >> 16) & 255]; tmp3 = pT0[(r1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t2 = pT0[r2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pT0[(r0 >> 8) & 255]; tmp2 = pT0[(r1 >> 16) & 255]; tmp3 = pT0[(r2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pT0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + } + + kw = WorkingKey[r++]; + fixed (uint* pkw = kw) + { + tmp1 = pT0[(t1 >> 8) & 255]; tmp2 = pT0[(t2 >> 16) & 255]; tmp3 = pT0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r0 = pT0[t0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pT0[(t2 >> 8) & 255]; tmp2 = pT0[(r3 >> 16) & 255]; tmp3 = pT0[(t0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r1 = pT0[t1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pT0[(r3 >> 8) & 255]; tmp2 = pT0[(t0 >> 16) & 255]; tmp3 = pT0[(t1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r2 = pT0[t2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pT0[(t0 >> 8) & 255]; tmp2 = pT0[(t1 >> 16) & 255]; tmp3 = pT0[(t2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pT0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + } + + // the final round's table is a simple function of S so we don't use a whole other four tables for it + + kw = WorkingKey[r]; + fixed (uint* pkw = kw) + fixed (byte* pS = S) + fixed (byte* ps = s) + { + C0 = (uint)pS[r0 & 255] ^ (((uint)pS[(r1 >> 8) & 255]) << 8) ^ (((uint)ps[(r2 >> 16) & 255]) << 16) ^ (((uint)ps[(r3 >> 24) & 255]) << 24) ^ pkw[0]; + C1 = (uint)ps[r1 & 255] ^ (((uint)pS[(r2 >> 8) & 255]) << 8) ^ (((uint)pS[(r3 >> 16) & 255]) << 16) ^ (((uint)ps[(r0 >> 24) & 255]) << 24) ^ pkw[1]; + C2 = (uint)ps[r2 & 255] ^ (((uint)pS[(r3 >> 8) & 255]) << 8) ^ (((uint)pS[(r0 >> 16) & 255]) << 16) ^ (((uint)pS[(r1 >> 24) & 255]) << 24) ^ pkw[2]; + C3 = (uint)ps[r3 & 255] ^ (((uint)ps[(r0 >> 8) & 255]) << 8) ^ (((uint)ps[(r1 >> 16) & 255]) << 16) ^ (((uint)pS[(r2 >> 24) & 255]) << 24) ^ pkw[3]; + } + + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output, C0); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[4..], C1); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[8..], C2); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[12..], C3); + } + else + { + //DecryptBlock(input, output, WorkingKey); + + uint C0 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input); + uint C1 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[4..]); + uint C2 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[8..]); + uint C3 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[12..]); + + uint[] kw = WorkingKey[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + + uint tmp1, tmp2, tmp3; + uint shift1, shift2, shift3; + + fixed (uint* pTinv0 = Tinv0) + { + while (r > 1) + { + kw = WorkingKey[r--]; + fixed (uint* pkw = kw) + { + tmp1 = pTinv0[(r3 >> 8) & 255]; tmp2 = pTinv0[(t2 >> 16) & 255]; tmp3 = pTinv0[(t1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r0 = pTinv0[t0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pTinv0[(t0 >> 8) & 255]; tmp2 = pTinv0[(r3 >> 16) & 255]; tmp3 = pTinv0[(t2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r1 = pTinv0[t1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pTinv0[(t1 >> 8) & 255]; tmp2 = pTinv0[(t0 >> 16) & 255]; tmp3 = pTinv0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r2 = pTinv0[t2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pTinv0[(t2 >> 8) & 255]; tmp2 = pTinv0[(t1 >> 16) & 255]; tmp3 = pTinv0[(t0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pTinv0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + + kw = WorkingKey[r--]; + + fixed (uint* pkw = kw) + { + tmp1 = pTinv0[(r3 >> 8) & 255]; tmp2 = pTinv0[(r2 >> 16) & 255]; tmp3 = pTinv0[(r1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t0 = pTinv0[r0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pTinv0[(r0 >> 8) & 255]; tmp2 = pTinv0[(r3 >> 16) & 255]; tmp3 = pTinv0[(r2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t1 = pTinv0[r1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pTinv0[(r1 >> 8) & 255]; tmp2 = pTinv0[(r0 >> 16) & 255]; tmp3 = pTinv0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + t2 = pTinv0[r2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pTinv0[(r2 >> 8) & 255]; tmp2 = pTinv0[(r1 >> 16) & 255]; tmp3 = pTinv0[(r0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pTinv0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + } + + kw = WorkingKey[1]; + + fixed (uint* pkw = kw) + { + tmp1 = pTinv0[(r3 >> 8) & 255]; tmp2 = pTinv0[(t2 >> 16) & 255]; tmp3 = pTinv0[(t1 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r0 = pTinv0[t0 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[0]; + + tmp1 = pTinv0[(t0 >> 8) & 255]; tmp2 = pTinv0[(r3 >> 16) & 255]; tmp3 = pTinv0[(t2 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r1 = pTinv0[t1 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[1]; + + tmp1 = pTinv0[(t1 >> 8) & 255]; tmp2 = pTinv0[(t0 >> 16) & 255]; tmp3 = pTinv0[(r3 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r2 = pTinv0[t2 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[2]; + + tmp1 = pTinv0[(t2 >> 8) & 255]; tmp2 = pTinv0[(t1 >> 16) & 255]; tmp3 = pTinv0[(t0 >> 24) & 255]; + shift1 = (tmp1 >> 24) | (tmp1 << 8); shift2 = (tmp2 >> 16) | (tmp2 << 16); shift3 = (tmp3 >> 8) | (tmp3 << 24); + r3 = pTinv0[r3 & 255] ^ shift1 ^ shift2 ^ shift3 ^ pkw[3]; + } + } + // the final round's table is a simple function of Si so we don't use a whole other four tables for it + + kw = WorkingKey[0]; + fixed (uint* pkw = kw) + fixed(byte* pSi = Si) + fixed (byte* ps = s) + { + C0 = (uint)pSi[r0 & 255] ^ (((uint)ps[(r3 >> 8) & 255]) << 8) ^ (((uint)ps[(r2 >> 16) & 255]) << 16) ^ (((uint)pSi[(r1 >> 24) & 255]) << 24) ^ pkw[0]; + C1 = (uint)ps[r1 & 255] ^ (((uint)ps[(r0 >> 8) & 255]) << 8) ^ (((uint)pSi[(r3 >> 16) & 255]) << 16) ^ (((uint)ps[(r2 >> 24) & 255]) << 24) ^ pkw[1]; + C2 = (uint)ps[r2 & 255] ^ (((uint)pSi[(r1 >> 8) & 255]) << 8) ^ (((uint)pSi[(r0 >> 16) & 255]) << 16) ^ (((uint)ps[(r3 >> 24) & 255]) << 24) ^ pkw[2]; + C3 = (uint)pSi[r3 & 255] ^ (((uint)ps[(r2 >> 8) & 255]) << 8) ^ (((uint)ps[(r1 >> 16) & 255]) << 16) ^ (((uint)ps[(r0 >> 24) & 255]) << 24) ^ pkw[3]; + } + + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output, C0); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[4..], C1); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[8..], C2); + System.Buffers.Binary.BinaryPrimitives.WriteUInt32LittleEndian(output[12..], C3); + } + + return BLOCK_SIZE; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void EncryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + while (r < ROUNDS - 1) + { + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r++]; + t0 = T0[r0 & 255] ^ Shift(T0[(r1 >> 8) & 255], 24) ^ Shift(T0[(r2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + t1 = T0[r1 & 255] ^ Shift(T0[(r2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(r0 >> 24) & 255], 8) ^ kw[1]; + t2 = T0[r2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(r0 >> 16) & 255], 16) ^ Shift(T0[(r1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(r0 >> 8) & 255], 24) ^ Shift(T0[(r1 >> 16) & 255], 16) ^ Shift(T0[(r2 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[r++]; + r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of S so we don't use a whole other four tables for it + + kw = KW[r]; + C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)s[r3 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } + + private void DecryptBlock(ReadOnlySpan input, Span output, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input); + uint C1 = Pack.LE_To_UInt32(input[4..]); + uint C2 = Pack.LE_To_UInt32(input[8..]); + uint C3 = Pack.LE_To_UInt32(input[12..]); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r--]; + t0 = Tinv0[r0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(r2 >> 16) & 255], 16) ^ Shift(Tinv0[(r1 >> 24) & 255], 8) ^ kw[0]; + t1 = Tinv0[r1 & 255] ^ Shift(Tinv0[(r0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(r2 >> 24) & 255], 8) ^ kw[1]; + t2 = Tinv0[r2 & 255] ^ Shift(Tinv0[(r1 >> 8) & 255], 24) ^ Shift(Tinv0[(r0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(r2 >> 8) & 255], 24) ^ Shift(Tinv0[(r1 >> 16) & 255], 16) ^ Shift(Tinv0[(r0 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[1]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of Si so we don't use a whole other four tables for it + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)s[(r3 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)s[(r2 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output); + Pack.UInt32_To_LE(C1, output[4..]); + Pack.UInt32_To_LE(C2, output[8..]); + Pack.UInt32_To_LE(C3, output[12..]); + } +#else + private void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + FastAesEngineHelper.EncryptBlock(input, inOff, output, outOff, KW, ROUNDS, T0, S, s); + //uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + //uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + //uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + //uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + // + //uint[] kw = KW[0]; + //uint t0 = C0 ^ kw[0]; + //uint t1 = C1 ^ kw[1]; + //uint t2 = C2 ^ kw[2]; + // + //uint r0, r1, r2, r3 = C3 ^ kw[3]; + //int r = 1; + //while (r < ROUNDS - 1) + //{ + // kw = KW[r++]; + // r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + // r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + // r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + // r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + // kw = KW[r++]; + // t0 = T0[r0 & 255] ^ Shift(T0[(r1 >> 8) & 255], 24) ^ Shift(T0[(r2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + // t1 = T0[r1 & 255] ^ Shift(T0[(r2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(r0 >> 24) & 255], 8) ^ kw[1]; + // t2 = T0[r2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(r0 >> 16) & 255], 16) ^ Shift(T0[(r1 >> 24) & 255], 8) ^ kw[2]; + // r3 = T0[r3 & 255] ^ Shift(T0[(r0 >> 8) & 255], 24) ^ Shift(T0[(r1 >> 16) & 255], 16) ^ Shift(T0[(r2 >> 24) & 255], 8) ^ kw[3]; + //} + // + //kw = KW[r++]; + //r0 = T0[t0 & 255] ^ Shift(T0[(t1 >> 8) & 255], 24) ^ Shift(T0[(t2 >> 16) & 255], 16) ^ Shift(T0[(r3 >> 24) & 255], 8) ^ kw[0]; + //r1 = T0[t1 & 255] ^ Shift(T0[(t2 >> 8) & 255], 24) ^ Shift(T0[(r3 >> 16) & 255], 16) ^ Shift(T0[(t0 >> 24) & 255], 8) ^ kw[1]; + //r2 = T0[t2 & 255] ^ Shift(T0[(r3 >> 8) & 255], 24) ^ Shift(T0[(t0 >> 16) & 255], 16) ^ Shift(T0[(t1 >> 24) & 255], 8) ^ kw[2]; + //r3 = T0[r3 & 255] ^ Shift(T0[(t0 >> 8) & 255], 24) ^ Shift(T0[(t1 >> 16) & 255], 16) ^ Shift(T0[(t2 >> 24) & 255], 8) ^ kw[3]; + // + //// the final round's table is a simple function of S so we don't use a whole other four tables for it + // + //kw = KW[r]; + //C0 = (uint)S[r0 & 255] ^ (((uint)S[(r1 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[0]; + //C1 = (uint)s[r1 & 255] ^ (((uint)S[(r2 >> 8) & 255]) << 8) ^ (((uint)S[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[1]; + //C2 = (uint)s[r2 & 255] ^ (((uint)S[(r3 >> 8) & 255]) << 8) ^ (((uint)S[(r0 >> 16) & 255]) << 16) ^ (((uint)S[(r1 >> 24) & 255]) << 24) ^ kw[2]; + //C3 = (uint)s[r3 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)S[(r2 >> 24) & 255]) << 24) ^ kw[3]; + // + //Pack.UInt32_To_LE(C0, output, outOff + 0); + //Pack.UInt32_To_LE(C1, output, outOff + 4); + //Pack.UInt32_To_LE(C2, output, outOff + 8); + //Pack.UInt32_To_LE(C3, output, outOff + 12); + } + + private void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[ROUNDS]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = ROUNDS - 1; + while (r > 1) + { + kw = KW[r--]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + kw = KW[r--]; + t0 = Tinv0[r0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(r2 >> 16) & 255], 16) ^ Shift(Tinv0[(r1 >> 24) & 255], 8) ^ kw[0]; + t1 = Tinv0[r1 & 255] ^ Shift(Tinv0[(r0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(r2 >> 24) & 255], 8) ^ kw[1]; + t2 = Tinv0[r2 & 255] ^ Shift(Tinv0[(r1 >> 8) & 255], 24) ^ Shift(Tinv0[(r0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(r2 >> 8) & 255], 24) ^ Shift(Tinv0[(r1 >> 16) & 255], 16) ^ Shift(Tinv0[(r0 >> 24) & 255], 8) ^ kw[3]; + } + + kw = KW[1]; + r0 = Tinv0[t0 & 255] ^ Shift(Tinv0[(r3 >> 8) & 255], 24) ^ Shift(Tinv0[(t2 >> 16) & 255], 16) ^ Shift(Tinv0[(t1 >> 24) & 255], 8) ^ kw[0]; + r1 = Tinv0[t1 & 255] ^ Shift(Tinv0[(t0 >> 8) & 255], 24) ^ Shift(Tinv0[(r3 >> 16) & 255], 16) ^ Shift(Tinv0[(t2 >> 24) & 255], 8) ^ kw[1]; + r2 = Tinv0[t2 & 255] ^ Shift(Tinv0[(t1 >> 8) & 255], 24) ^ Shift(Tinv0[(t0 >> 16) & 255], 16) ^ Shift(Tinv0[(r3 >> 24) & 255], 8) ^ kw[2]; + r3 = Tinv0[r3 & 255] ^ Shift(Tinv0[(t2 >> 8) & 255], 24) ^ Shift(Tinv0[(t1 >> 16) & 255], 16) ^ Shift(Tinv0[(t0 >> 24) & 255], 8) ^ kw[3]; + + // the final round's table is a simple function of Si so we don't use a whole other four tables for it + + kw = KW[0]; + C0 = (uint)Si[r0 & 255] ^ (((uint)s[(r3 >> 8) & 255]) << 8) ^ (((uint)s[(r2 >> 16) & 255]) << 16) ^ (((uint)Si[(r1 >> 24) & 255]) << 24) ^ kw[0]; + C1 = (uint)s[r1 & 255] ^ (((uint)s[(r0 >> 8) & 255]) << 8) ^ (((uint)Si[(r3 >> 16) & 255]) << 16) ^ (((uint)s[(r2 >> 24) & 255]) << 24) ^ kw[1]; + C2 = (uint)s[r2 & 255] ^ (((uint)Si[(r1 >> 8) & 255]) << 8) ^ (((uint)Si[(r0 >> 16) & 255]) << 16) ^ (((uint)s[(r3 >> 24) & 255]) << 24) ^ kw[2]; + C3 = (uint)Si[r3 & 255] ^ (((uint)s[(r2 >> 8) & 255]) << 8) ^ (((uint)s[(r1 >> 16) & 255]) << 16) ^ (((uint)s[(r0 >> 24) & 255]) << 24) ^ kw[3]; + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs.meta new file mode 100644 index 00000000..21bef32e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d91f51741347500498594c9e67b1ffc9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs new file mode 100644 index 00000000..f355c853 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs @@ -0,0 +1,195 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + internal static class FastAesEngineHelper + { + public unsafe static void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff, uint[][] KW, int ROUNDS, uint[] T0, byte[] S, byte[] s) + { + uint C0 = Pack.LE_To_UInt32(input, inOff + 0); + uint C1 = Pack.LE_To_UInt32(input, inOff + 4); + uint C2 = Pack.LE_To_UInt32(input, inOff + 8); + uint C3 = Pack.LE_To_UInt32(input, inOff + 12); + + uint[] kw = KW[0]; + uint t0 = C0 ^ kw[0]; + uint t1 = C1 ^ kw[1]; + uint t2 = C2 ^ kw[2]; + + uint r0, r1, r2, r3 = C3 ^ kw[3]; + int r = 1; + + byte idx; + uint tmp1, tmp2, tmp3; + + fixed (uint* pT0 = T0) + { + while (r < ROUNDS - 1) + { + kw = KW[r++]; + + fixed (uint* pkw = kw) + { + idx = (byte)(t1 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t2 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r3 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + r0 = pT0[t0 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[0]; + + idx = (byte)(t2 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r3 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t0 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + r1 = pT0[t1 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[1]; + + idx = (byte)(r3 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t0 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t1 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + r2 = pT0[t2 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[2]; + + idx = (byte)(t0 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t1 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t2 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + r3 = pT0[r3 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[3]; + } + + kw = KW[r++]; + + fixed (uint* pkw = kw) + { + idx = (byte)(r1 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r2 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r3 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + t0 = pT0[r0 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[0]; + + idx = (byte)(r2 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r3 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r0 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + t1 = pT0[r1 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[1]; + + idx = (byte)(r3 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r0 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r1 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + t2 = pT0[r2 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[2]; + + idx = (byte)(r0 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r1 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r2 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + r3 = pT0[r3 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[3]; + } + } + + kw = KW[r++]; + + fixed (uint* pkw = kw) + { + idx = (byte)(t1 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t2 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(r3 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + r0 = pT0[t0 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[0]; + + idx = (byte)(t2 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(r3 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t0 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + r1 = pT0[t1 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[1]; + + idx = (byte)(r3 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t0 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t1 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + r2 = pT0[t2 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[2]; + + idx = (byte)(t0 >> 8); + tmp1 = (pT0[idx] >> 24) | (pT0[idx] << 8); + + idx = (byte)(t1 >> 16); + tmp2 = (pT0[idx] >> 16) | (pT0[idx] << 16); + + idx = (byte)(t2 >> 24); + tmp3 = (pT0[idx] >> 8) | (pT0[idx] << 24); + + r3 = pT0[r3 & 255] ^ tmp1 ^ tmp2 ^ tmp3 ^ pkw[3]; + } + + // the final round's table is a simple function of S so we don't use a whole other four tables for it + + kw = KW[r]; + + fixed (byte* pS = S, ps = s) + fixed (uint* pkw = kw) + { + C0 = (uint)pS[(byte)r0] ^ (((uint)pS[(byte)(r1 >> 8)]) << 8) ^ (((uint)ps[(byte)(r2 >> 16)]) << 16) ^ (((uint)ps[(byte)(r3 >> 24)]) << 24) ^ pkw[0]; + C1 = (uint)ps[(byte)r1] ^ (((uint)pS[(byte)(r2 >> 8)]) << 8) ^ (((uint)pS[(byte)(r3 >> 16)]) << 16) ^ (((uint)ps[(byte)(r0 >> 24)]) << 24) ^ pkw[1]; + C2 = (uint)ps[(byte)r2] ^ (((uint)pS[(byte)(r3 >> 8)]) << 8) ^ (((uint)pS[(byte)(r0 >> 16)]) << 16) ^ (((uint)pS[(byte)(r1 >> 24)]) << 24) ^ pkw[2]; + C3 = (uint)ps[(byte)r3] ^ (((uint)ps[(byte)(r0 >> 8)]) << 8) ^ (((uint)ps[(byte)(r1 >> 16)]) << 16) ^ (((uint)pS[(byte)(r2 >> 24)]) << 24) ^ pkw[3]; + } + } + + Pack.UInt32_To_LE(C0, output, outOff + 0); + Pack.UInt32_To_LE(C1, output, outOff + 4); + Pack.UInt32_To_LE(C2, output, outOff + 8); + Pack.UInt32_To_LE(C3, output, outOff + 12); + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs.meta new file mode 100644 index 00000000..9154da54 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 698e9bc1cebe2584cb3f28c203a5f825 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastAesEngineHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs new file mode 100644 index 00000000..4eebe2d6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs @@ -0,0 +1,189 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + public sealed class FastBcChaCha20Poly1305 + : TlsAeadCipherImpl + { + private static readonly byte[] Zeroes = new byte[15]; + + private readonly FastChaCha7539Engine m_cipher = new FastChaCha7539Engine(); + private readonly FastPoly1305 m_mac = new FastPoly1305(); + + private readonly bool m_isEncrypting; + + private int m_additionalDataLength; + + public FastBcChaCha20Poly1305(bool isEncrypting) + { + this.m_isEncrypting = isEncrypting; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + unsafe +#endif + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { + if (m_isEncrypting) + { + int ciphertextLength = inputLength; + + m_cipher.DoFinal(input, inputOffset, inputLength, output, outputOffset); + int outputLength = inputLength; + + if (ciphertextLength != outputLength) + throw new InvalidOperationException(); + + UpdateMac(output, outputOffset, ciphertextLength); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span lengths = stackalloc byte[16]; + + Pack.UInt64_To_LE((ulong)m_additionalDataLength, lengths); + Pack.UInt64_To_LE((ulong)ciphertextLength, lengths[8..]); + + m_mac.BlockUpdate(lengths); + m_mac.DoFinal(output.AsSpan(outputOffset + ciphertextLength)); +#else + byte[] lengths = BufferPool.Get(16, true); + using (var _ = new AutoReleaseBuffer(lengths)) + { + Pack.UInt64_To_LE((ulong)m_additionalDataLength, lengths, 0); + Pack.UInt64_To_LE((ulong)ciphertextLength, lengths, 8); + + m_mac.BlockUpdate(lengths, 0, 16); + m_mac.DoFinal(output, outputOffset + ciphertextLength); + } +#endif + + return ciphertextLength + 16; + } + else + { + int ciphertextLength = inputLength - 16; + + UpdateMac(input, inputOffset, ciphertextLength); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span expectedMac = stackalloc byte[16]; + + Pack.UInt64_To_LE((ulong)m_additionalDataLength, expectedMac); + Pack.UInt64_To_LE((ulong)ciphertextLength, expectedMac[8..]); + + m_mac.BlockUpdate(expectedMac); + m_mac.DoFinal(expectedMac); + + bool badMac = !TlsUtilities.ConstantTimeAreEqual(16, expectedMac, 0, input, inputOffset + ciphertextLength); + + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); +#else + byte[] expectedMac = BufferPool.Get(16, true); + using (var _ = new AutoReleaseBuffer(expectedMac)) + { + Pack.UInt64_To_LE((ulong)m_additionalDataLength, expectedMac, 0); + Pack.UInt64_To_LE((ulong)ciphertextLength, expectedMac, 8); + + m_mac.BlockUpdate(expectedMac, 0, 16); + m_mac.DoFinal(expectedMac, 0); + + bool badMac = !TlsUtilities.ConstantTimeAreEqual(16, expectedMac, 0, input, inputOffset + ciphertextLength); + + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + } +#endif + + m_cipher.DoFinal(input, inputOffset, ciphertextLength, output, outputOffset); + int outputLength = ciphertextLength; + + if (ciphertextLength != outputLength) + throw new InvalidOperationException(); + + return ciphertextLength; + } + } + + public int GetOutputSize(int inputLength) + { + return m_isEncrypting ? inputLength + 16 : inputLength - 16; + } + + public void Init(byte[] nonce, int macSize, byte[] additionalData) + { + if (nonce == null || nonce.Length != 12 || macSize != 16) + throw new TlsFatalAlert(AlertDescription.internal_error); + + m_cipher.Init(m_isEncrypting, new ParametersWithIV(null, nonce)); + InitMac(); + if (additionalData == null) + { + this.m_additionalDataLength = 0; + } + else + { + this.m_additionalDataLength = additionalData.Length; + UpdateMac(additionalData, 0, additionalData.Length); + } + } + + public void Reset() + { + m_cipher.Reset(); + m_mac.Reset(); + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + KeyParameter cipherKey = new KeyParameter(key, keyOff, keyLen); + m_cipher.Init(m_isEncrypting, new ParametersWithIV(cipherKey, Zeroes, 0, 12)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + KeyParameter cipherKey = new KeyParameter(key); + m_cipher.Init(m_isEncrypting, new ParametersWithIV(cipherKey, Zeroes[..12])); + } +#endif + + byte[] firstBlock = new byte[64]; + private void InitMac() + { + m_cipher.ProcessBytes(firstBlock, 0, 64, firstBlock, 0); + m_mac.Init(new KeyParameter(firstBlock, 0, 32)); + Array.Clear(firstBlock, 0, firstBlock.Length); + } + + private void UpdateMac(byte[] buf, int off, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + m_mac.BlockUpdate(buf.AsSpan(off, len)); +#else + m_mac.BlockUpdate(buf, off, len); +#endif + + int partial = len % 16; + if (partial != 0) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + m_mac.BlockUpdate(Zeroes.AsSpan(0, 16 - partial)); +#else + m_mac.BlockUpdate(Zeroes, 0, 16 - partial); +#endif + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs.meta new file mode 100644 index 00000000..7ba86d74 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 465760692abe0d94eb03d73317f2e288 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastBcChaCha20Poly1305.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs new file mode 100644 index 00000000..bf96a9cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs @@ -0,0 +1,229 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.Shared.TLS.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; + +namespace Best.HTTP.Shared.TLS.Crypto +{ + /** + * implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher. + */ + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastCbcBlockCipher + : IBlockCipherMode + { + private byte[] IV, cbcV, cbcNextV; + private int blockSize; + private IBlockCipher cipher; + private bool encrypting; + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used as the basis of chaining. + */ + public FastCbcBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + this.blockSize = cipher.GetBlockSize(); + + this.IV = new byte[blockSize]; + this.cbcV = new byte[blockSize]; + this.cbcNextV = new byte[blockSize]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + /** + * Initialise the cipher and, possibly, the initialisation vector (IV). + * If an IV isn't passed as part of the parameter, the IV will be all zeros. + * + * @param forEncryption if true the cipher is initialised for + * encryption, if false for decryption. + * @param param the key and other data required by the cipher. + * @exception ArgumentException if the parameters argument is + * inappropriate. + */ + public void Init(bool forEncryption, ICipherParameters parameters) + { + bool oldEncrypting = this.encrypting; + + this.encrypting = forEncryption; + + if (parameters is ParametersWithIV ivParam) + { + byte[] iv = ivParam.GetIV(); + + if (iv.Length != blockSize) + throw new ArgumentException("initialisation vector must be the same length as block size"); + + Array.Copy(iv, 0, IV, 0, iv.Length); + + parameters = ivParam.Parameters; + } + + Reset(); + + // if null it's an IV changed only. + if (parameters != null) + { + cipher.Init(encrypting, parameters); + } + else if (oldEncrypting != encrypting) + { + throw new ArgumentException("cannot change encrypting state without providing key."); + } + } + + /** + * return the algorithm name and mode. + * + * @return the name of the underlying algorithm followed by "/CBC". + */ + public string AlgorithmName + { + get { return cipher.AlgorithmName + "/CBC"; } + } + + public bool IsPartialBlockOkay + { + get { return false; } + } + + /** + * return the block size of the underlying cipher. + * + * @return the block size of the underlying cipher. + */ + public int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return encrypting + ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)) + : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff)); +#else + return encrypting + ? EncryptBlock(input, inOff, output, outOff) + : DecryptBlock(input, inOff, output, outOff); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessBlock(ReadOnlySpan input, Span output) + { + return encrypting + ? EncryptBlock(input, output) + : DecryptBlock(input, output); + } +#endif + + /** + * reset the chaining vector back to the IV and reset the underlying + * cipher. + */ + public void Reset() + { + Array.Copy(IV, 0, cbcV, 0, IV.Length); + Array.Clear(cbcNextV, 0, cbcNextV.Length); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int EncryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + for (int i = 0; i < blockSize; i++) + { + cbcV[i] ^= input[i]; + } + + int length = cipher.ProcessBlock(cbcV, output); + + output[..blockSize].CopyTo(cbcV); + + return length; + } + + private int DecryptBlock(ReadOnlySpan input, Span output) + { + Check.DataLength(input, blockSize, "input buffer too short"); + Check.OutputLength(output, blockSize, "output buffer too short"); + + input[..blockSize].CopyTo(cbcNextV); + + int length = cipher.ProcessBlock(input, output); + + for (int i = 0; i < blockSize; i++) + { + output[i] ^= cbcV[i]; + } + + byte[] tmp = cbcV; + cbcV = cbcNextV; + cbcNextV = tmp; + + return length; + } +#else + private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + for (int i = 0; i < blockSize; i++) + { + cbcV[i] ^= input[inOff + i]; + } + + int length = cipher.ProcessBlock(cbcV, 0, outBytes, outOff); + + Array.Copy(outBytes, outOff, cbcV, 0, cbcV.Length); + + return length; + } + + private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff) + { + Check.DataLength(input, inOff, blockSize, "input buffer too short"); + Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short"); + + Array.Copy(input, inOff, cbcNextV, 0, blockSize); + + int length = cipher.ProcessBlock(input, inOff, outBytes, outOff); + + for (int i = 0; i < blockSize; i++) + { + outBytes[outOff + i] ^= cbcV[i]; + } + + byte[] tmp = cbcV; + cbcV = cbcNextV; + cbcNextV = tmp; + + return length; + } +#endif + } + +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs.meta new file mode 100644 index 00000000..f7e475c6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: f61559ca55f77084d8ae68045dc0d52c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCbcBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs new file mode 100644 index 00000000..9f33244f --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs @@ -0,0 +1,661 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /** + * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in + * NIST Special Publication 800-38C. + *

    + * Note: this mode is a packet mode - it needs all the data up front. + *

    + */ + public class FastCcmBlockCipher + : IAeadBlockCipher + { + private static readonly int BlockSize = 16; + + private readonly IBlockCipher cipher; + private readonly byte[] macBlock; + private bool forEncryption; + private byte[] nonce; + private byte[] initialAssociatedText; + private int macSize; + private ICipherParameters keyParam; + private readonly MemoryStream associatedText = new MemoryStream(); + private readonly MemoryStream data = new MemoryStream(); + + /** + * Basic constructor. + * + * @param cipher the block cipher to be used. + */ + public FastCcmBlockCipher( + IBlockCipher cipher) + { + this.cipher = cipher; + this.macBlock = new byte[BlockSize]; + + if (cipher.GetBlockSize() != BlockSize) + throw new ArgumentException("cipher required with a block size of " + BlockSize + "."); + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public virtual IBlockCipher UnderlyingCipher => cipher; + + public virtual void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + + ICipherParameters cipherParameters; + if (parameters is AeadParameters aeadParameters) + { + nonce = aeadParameters.GetNonce(); + initialAssociatedText = aeadParameters.GetAssociatedText(); + macSize = GetMacSize(forEncryption, aeadParameters.MacSize); + cipherParameters = aeadParameters.Key; + } + else if (parameters is ParametersWithIV parametersWithIV) + { + nonce = parametersWithIV.GetIV(); + initialAssociatedText = null; + macSize = GetMacSize(forEncryption, 64); + cipherParameters = parametersWithIV.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to CCM"); + } + + // NOTE: Very basic support for key re-use, but no performance gain from it + if (cipherParameters != null) + { + keyParam = cipherParameters; + } + + if (nonce == null || nonce.Length < 7 || nonce.Length > 13) + throw new ArgumentException("nonce must have length from 7 to 13 octets"); + + Reset(); + } + + public virtual string AlgorithmName => cipher.AlgorithmName + "/CCM"; + + public virtual int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public virtual void ProcessAadByte(byte input) + { + associatedText.WriteByte(input); + } + + public virtual void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { + // TODO: Process AAD online + associatedText.Write(inBytes, inOff, len); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessAadBytes(ReadOnlySpan input) + { + // TODO: Process AAD online + associatedText.Write(input); + } +#endif + + public virtual int ProcessByte(byte input, byte[] outBytes, int outOff) + { + data.WriteByte(input); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessByte(byte input, Span output) + { + data.WriteByte(input); + + return 0; + } +#endif + + public virtual int ProcessBytes(byte[] inBytes, int inOff, int inLen, byte[] outBytes, int outOff) + { + Check.DataLength(inBytes, inOff, inLen, "input buffer too short"); + + data.Write(inBytes, inOff, inLen); + + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBytes(ReadOnlySpan input, Span output) + { + data.Write(input); + + return 0; + } +#endif + + public virtual int DoFinal(byte[] outBytes, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(outBytes.AsSpan(outOff)); +#else + byte[] input = data.GetBuffer(); + int inLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(input, 0, inLen, outBytes, outOff); + + Reset(); + + return len; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int DoFinal(Span output) + { + byte[] input = data.GetBuffer(); + int inLen = Convert.ToInt32(data.Length); + + int len = ProcessPacket(input.AsSpan(0, inLen), output); + + Reset(); + + return len; + } +#endif + + public virtual void Reset() + { + associatedText.SetLength(0); + data.SetLength(0); + } + + /** + * Returns a byte array containing the mac calculated as part of the + * last encrypt or decrypt operation. + * + * @return the last mac calculated. + */ + public virtual byte[] GetMac() + { + return Arrays.CopyOfRange(macBlock, 0, macSize); + } + + public virtual int GetUpdateOutputSize(int len) + { + return 0; + } + + public virtual int GetOutputSize(int len) + { + int totalData = Convert.ToInt32(data.Length) + len; + + if (forEncryption) + { + return totalData + macSize; + } + + return totalData < macSize ? 0 : totalData - macSize; + } + + /** + * Process a packet of data for either CCM decryption or encryption. + * + * @param in data for processing. + * @param inOff offset at which data starts in the input array. + * @param inLen length of the data in the input array. + * @return a byte array containing the processed input.. + * @throws IllegalStateException if the cipher is not appropriately set up. + * @throws InvalidCipherTextException if the input data is truncated or the mac check fails. + */ + public virtual byte[] ProcessPacket(byte[] input, int inOff, int inLen) + { + byte[] output; + + if (forEncryption) + { + output = new byte[inLen + macSize]; + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + output = new byte[inLen - macSize]; + } + + ProcessPacket(input, inOff, inLen, output, 0); + + return output; + } + + /** + * Process a packet of data for either CCM decryption or encryption. + * + * @param in data for processing. + * @param inOff offset at which data starts in the input array. + * @param inLen length of the data in the input array. + * @param output output array. + * @param outOff offset into output array to start putting processed bytes. + * @return the number of bytes added to output. + * @throws IllegalStateException if the cipher is not appropriately set up. + * @throws InvalidCipherTextException if the input data is truncated or the mac check fails. + * @throws DataLengthException if output buffer too short. + */ + public virtual int ProcessPacket(byte[] input, int inOff, int inLen, byte[] output, int outOff) + { + // TODO: handle null keyParam (e.g. via RepeatedKeySpec) + // Need to keep the CTR and CBC Mac parts around and reset + if (keyParam == null) + throw new InvalidOperationException("CCM cipher unitialized."); + + int n = nonce.Length; + int q = 15 - n; + if (q < 4) + { + int limitLen = 1 << (8 * q); + if (inLen >= limitLen) + throw new InvalidOperationException("CCM packet too large for choice of q."); + } + + byte[] iv = new byte[BlockSize]; + iv[0] = (byte)((q - 1) & 0x7); + nonce.CopyTo(iv, 1); + + IBlockCipher ctrCipher = new FastSicBlockCipher(cipher); + ctrCipher.Init(forEncryption, new ParametersWithIV(keyParam, iv)); + + int outputLen; + int inIndex = inOff; + int outIndex = outOff; + + if (forEncryption) + { + outputLen = inLen + macSize; + Check.OutputLength(output, outOff, outputLen, "Output buffer too short."); + + CalculateMac(input, inOff, inLen, macBlock); + + byte[] encMac = new byte[BlockSize]; + ctrCipher.ProcessBlock(macBlock, 0, encMac, 0); // S0 + + while (inIndex < (inOff + inLen - BlockSize)) // S1... + { + ctrCipher.ProcessBlock(input, inIndex, output, outIndex); + outIndex += BlockSize; + inIndex += BlockSize; + } + + byte[] block = new byte[BlockSize]; + + Array.Copy(input, inIndex, block, 0, inLen + inOff - inIndex); + + ctrCipher.ProcessBlock(block, 0, block, 0); + + Array.Copy(block, 0, output, outIndex, inLen + inOff - inIndex); + + Array.Copy(encMac, 0, output, outOff + inLen, macSize); + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + outputLen = inLen - macSize; + Check.OutputLength(output, outOff, outputLen, "Output buffer too short."); + + Array.Copy(input, inOff + outputLen, macBlock, 0, macSize); + + ctrCipher.ProcessBlock(macBlock, 0, macBlock, 0); + + for (int i = macSize; i != macBlock.Length; i++) + { + macBlock[i] = 0; + } + + while (inIndex < (inOff + outputLen - BlockSize)) + { + ctrCipher.ProcessBlock(input, inIndex, output, outIndex); + outIndex += BlockSize; + inIndex += BlockSize; + } + + byte[] block = new byte[BlockSize]; + + Array.Copy(input, inIndex, block, 0, outputLen - (inIndex - inOff)); + + ctrCipher.ProcessBlock(block, 0, block, 0); + + Array.Copy(block, 0, output, outIndex, outputLen - (inIndex - inOff)); + + byte[] calculatedMacBlock = new byte[BlockSize]; + + CalculateMac(output, outOff, outputLen, calculatedMacBlock); + + if (!Arrays.ConstantTimeAreEqual(macBlock, calculatedMacBlock)) + throw new InvalidCipherTextException("mac check in CCM failed"); + } + + return outputLen; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessPacket(ReadOnlySpan input, Span output) + { + int inLen = input.Length; + + // TODO: handle null keyParam (e.g. via RepeatedKeySpec) + // Need to keep the CTR and CBC Mac parts around and reset + if (keyParam == null) + throw new InvalidOperationException("CCM cipher unitialized."); + + int n = nonce.Length; + int q = 15 - n; + if (q < 4) + { + int limitLen = 1 << (8 * q); + if (inLen >= limitLen) + throw new InvalidOperationException("CCM packet too large for choice of q."); + } + + byte[] iv = new byte[BlockSize]; + iv[0] = (byte)((q - 1) & 0x7); + nonce.CopyTo(iv, 1); + + IBlockCipher ctrCipher = new SicBlockCipher(cipher); + ctrCipher.Init(forEncryption, new ParametersWithIV(keyParam, iv)); + + int outputLen; + int index = 0; + Span block = stackalloc byte[BlockSize]; + + if (forEncryption) + { + outputLen = inLen + macSize; + Check.OutputLength(output, outputLen, "output buffer too short"); + + CalculateMac(input, macBlock); + + byte[] encMac = new byte[BlockSize]; + ctrCipher.ProcessBlock(macBlock, encMac); // S0 + + while (index < (inLen - BlockSize)) // S1... + { + ctrCipher.ProcessBlock(input[index..], output[index..]); + index += BlockSize; + } + + input[index..].CopyTo(block); + + ctrCipher.ProcessBlock(block, block); + + block[..(inLen - index)].CopyTo(output[index..]); + + encMac.AsSpan(0, macSize).CopyTo(output[inLen..]); + } + else + { + if (inLen < macSize) + throw new InvalidCipherTextException("data too short"); + + outputLen = inLen - macSize; + Check.OutputLength(output, outputLen, "output buffer too short"); + + input[outputLen..].CopyTo(macBlock); + + ctrCipher.ProcessBlock(macBlock, macBlock); + + for (int i = macSize; i != macBlock.Length; i++) + { + macBlock[i] = 0; + } + + while (index < (outputLen - BlockSize)) + { + ctrCipher.ProcessBlock(input[index..], output[index..]); + index += BlockSize; + } + + input[index..outputLen].CopyTo(block); + + ctrCipher.ProcessBlock(block, block); + + block[..(outputLen - index)].CopyTo(output[index..]); + + Span calculatedMacBlock = stackalloc byte[BlockSize]; + + CalculateMac(output[..outputLen], calculatedMacBlock); + + if (!Arrays.ConstantTimeAreEqual(macBlock, calculatedMacBlock)) + throw new InvalidCipherTextException("mac check in CCM failed"); + } + + return outputLen; + } +#endif + + private int CalculateMac(byte[] data, int dataOff, int dataLen, byte[] macBlock) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return CalculateMac(data.AsSpan(dataOff, dataLen), macBlock); +#else + IMac cMac = new CbcBlockCipherMac(cipher, macSize * 8); + + cMac.Init(keyParam); + + // + // build b0 + // + byte[] b0 = new byte[16]; + + if (HasAssociatedText()) + { + b0[0] |= 0x40; + } + + b0[0] |= (byte)((((cMac.GetMacSize() - 2) / 2) & 0x7) << 3); + + b0[0] |= (byte)(((15 - nonce.Length) - 1) & 0x7); + + Array.Copy(nonce, 0, b0, 1, nonce.Length); + + int q = dataLen; + int count = 1; + while (q > 0) + { + b0[b0.Length - count] = (byte)(q & 0xff); + q >>= 8; + count++; + } + + cMac.BlockUpdate(b0, 0, b0.Length); + + // + // process associated text + // + if (HasAssociatedText()) + { + int extra; + + int textLength = GetAssociatedTextLength(); + if (textLength < ((1 << 16) - (1 << 8))) + { + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 2; + } + else // can't go any higher than 2^32 + { + cMac.Update((byte)0xff); + cMac.Update((byte)0xfe); + cMac.Update((byte)(textLength >> 24)); + cMac.Update((byte)(textLength >> 16)); + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 6; + } + + if (initialAssociatedText != null) + { + cMac.BlockUpdate(initialAssociatedText, 0, initialAssociatedText.Length); + } + if (associatedText.Length > 0) + { + byte[] input = associatedText.GetBuffer(); + int len = Convert.ToInt32(associatedText.Length); + + cMac.BlockUpdate(input, 0, len); + } + + extra = (extra + textLength) % 16; + if (extra != 0) + { + for (int i = extra; i < 16; ++i) + { + cMac.Update((byte)0x00); + } + } + } + + // + // add the text + // + cMac.BlockUpdate(data, dataOff, dataLen); + + return cMac.DoFinal(macBlock, 0); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private int CalculateMac(ReadOnlySpan data, Span macBlock) + { + IMac cMac = new CbcBlockCipherMac(cipher, macSize * 8); + + cMac.Init(keyParam); + + // + // build b0 + // + byte[] b0 = new byte[16]; + + if (HasAssociatedText()) + { + b0[0] |= 0x40; + } + + b0[0] |= (byte)((((cMac.GetMacSize() - 2) / 2) & 0x7) << 3); + + b0[0] |= (byte)(((15 - nonce.Length) - 1) & 0x7); + + Array.Copy(nonce, 0, b0, 1, nonce.Length); + + int q = data.Length; + int count = 1; + while (q > 0) + { + b0[b0.Length - count] = (byte)(q & 0xff); + q >>= 8; + count++; + } + + cMac.BlockUpdate(b0, 0, b0.Length); + + // + // process associated text + // + if (HasAssociatedText()) + { + int extra; + + int textLength = GetAssociatedTextLength(); + if (textLength < ((1 << 16) - (1 << 8))) + { + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 2; + } + else // can't go any higher than 2^32 + { + cMac.Update((byte)0xff); + cMac.Update((byte)0xfe); + cMac.Update((byte)(textLength >> 24)); + cMac.Update((byte)(textLength >> 16)); + cMac.Update((byte)(textLength >> 8)); + cMac.Update((byte)textLength); + + extra = 6; + } + + if (initialAssociatedText != null) + { + cMac.BlockUpdate(initialAssociatedText, 0, initialAssociatedText.Length); + } + if (associatedText.Length > 0) + { + byte[] input = associatedText.GetBuffer(); + int len = Convert.ToInt32(associatedText.Length); + + cMac.BlockUpdate(input, 0, len); + } + + extra = (extra + textLength) % 16; + if (extra != 0) + { + for (int i = extra; i < 16; ++i) + { + cMac.Update((byte)0x00); + } + } + } + + // + // add the text + // + cMac.BlockUpdate(data); + + return cMac.DoFinal(macBlock); + } +#endif + + private int GetMacSize(bool forEncryption, int requestedMacBits) + { + if (forEncryption && (requestedMacBits < 32 || requestedMacBits > 128 || 0 != (requestedMacBits & 15))) + throw new ArgumentException("tag length in octets must be one of {4,6,8,10,12,14,16}"); + + return requestedMacBits >> 3; + } + + private int GetAssociatedTextLength() + { + return Convert.ToInt32(associatedText.Length) + + (initialAssociatedText == null ? 0 : initialAssociatedText.Length); + } + + private bool HasAssociatedText() + { + return GetAssociatedTextLength() > 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs.meta new file mode 100644 index 00000000..e4dc771b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ed2619efe55c95c45b44118594c15c26 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastCcmBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs new file mode 100644 index 00000000..0d780248 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs @@ -0,0 +1,531 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.CompilerServices; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// + /// Implementation of Daniel J. Bernstein's ChaCha stream cipher. + /// + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastChaCha7539Engine + : FastSalsa20Engine + { + /// + /// Creates a 20 rounds ChaCha engine. + /// + public FastChaCha7539Engine() + : base() + { + } + + public override string AlgorithmName + { + get { return "ChaCha7539"; } + } + + protected override int NonceSize + { + get { return 12; } + } + + protected override void AdvanceCounter() + { + if (++engineState[12] == 0) + throw new InvalidOperationException("attempt to increase counter past 2^32."); + } + + protected override void ResetCounter() + { + engineState[12] = 0; + } + + protected override void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if (keyBytes.Length != 32) + throw new ArgumentException(AlgorithmName + " requires 256 bit key"); + + PackTauOrSigma(keyBytes.Length, engineState, 0); + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 4, 8); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 13, 3); + } + + protected override void GenerateKeyStream(byte[] output) + { + FastChaChaEngineHelper.ChachaCore(rounds, engineState, output); + } + + internal void DoFinal(byte[] inBuf, int inOff, int inLen, byte[] outBuf, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (index != 0) + throw new InvalidOperationException(AlgorithmName + " not in block-aligned state"); + + Check.DataLength(inBuf, inOff, inLen, "input buffer too short"); + Check.OutputLength(outBuf, outOff, inLen, "output buffer too short"); + + while (inLen >= 128) + { +#if BESTHTTP_WITH_BURST && (NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER) + FastChaCha7539EngineHelper.ProcessBlocks2(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff), engineState, rounds, keyStream); +#elif NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + //ProcessBlocks2(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff)); + + var input = inBuf.AsSpan(inOff); + var output = outBuf.AsSpan(outOff); + ImplProcessBlock(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff)); + ImplProcessBlock(input[64..], output[64..]); +#else + ProcessBlocks2(inBuf, inOff, outBuf, outOff); +#endif + inOff += 128; + inLen -= 128; + outOff += 128; + } + + if (inLen >= 64) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ImplProcessBlock(inBuf.AsSpan(inOff), outBuf.AsSpan(outOff)); +#else + ImplProcessBlock(inBuf, inOff, outBuf, outOff); +#endif + inOff += 64; + inLen -= 64; + outOff += 64; + } + + if (inLen > 0) + { + GenerateKeyStream(keyStream); + //AdvanceCounter(); + if (++engineState[12] == 0) + throw new InvalidOperationException("attempt to increase counter past 2^32."); + + for (int i = 0; i < inLen; ++i) + { + outBuf[outOff + i] = (byte)(inBuf[i + inOff] ^ keyStream[i]); + } + } + + engineState[12] = 0; + + // TODO Prevent re-use if encrypting + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal void ProcessBlock(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(64U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + UnityEngine.Debug.Assert(index == 0); + + ImplProcessBlock(input, output); + } + + internal void ProcessBlocks2(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(128U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + UnityEngine.Debug.Assert(index == 0); + +#if NETCOREAPP3_0_OR_GREATER + if (Avx2.IsSupported) + { + ImplProcessBlocks2_X86_Avx2(rounds, engineState, input, output); + return; + } + + if (Sse2.IsSupported) + { + ImplProcessBlocks2_X86_Sse2(rounds, engineState, input, output); + return; + } +#endif + + { + ImplProcessBlock(input, output); + ImplProcessBlock(input[64..], output[64..]); + } + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal void ImplProcessBlock(ReadOnlySpan input, Span output) + { + FastChaChaEngineHelper.ChachaCore(rounds, engineState, keyStream); + + //AdvanceCounter(); + if (++engineState[12] == 0) + throw new InvalidOperationException("attempt to increase counter past 2^32."); + + FastChaChaEngineHelper.ImplProcessBlock(input, output, keyStream); + } +#else + internal void ProcessBlock(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(64U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + UnityEngine.Debug.Assert(index == 0); + + ImplProcessBlock(inBytes, inOff, outBytes, outOff); + } + + internal void ProcessBlocks2(byte[] inBytes, int inOff, byte[] outBytes, int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + if (LimitExceeded(128U)) + throw new MaxBytesExceededException("2^38 byte limit per IV would be exceeded; Change IV"); + + UnityEngine.Debug.Assert(index == 0); + + { + ImplProcessBlock(inBytes, inOff, outBytes, outOff); + ImplProcessBlock(inBytes, inOff + 64, outBytes, outOff + 64); + } + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + internal void ImplProcessBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + ChaChaEngine.ChachaCore(rounds, engineState, keyStream); + AdvanceCounter(); + + for (int i = 0; i < 64; ++i) + { + outBuf[outOff + i] = (byte)(keyStream[i] ^ inBuf[inOff + i]); + } + } +#endif + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void ImplProcessBlocks2_X86_Avx2(int rounds, uint[] state, ReadOnlySpan input, + Span output) + { + if (!Avx2.IsSupported) + throw new PlatformNotSupportedException(); + + Debug.Assert(rounds % 2 == 0); + Debug.Assert(state.Length >= 16); + Debug.Assert(input.Length >= 128); + Debug.Assert(output.Length >= 128); + + var t0 = Load128_UInt32(state.AsSpan()); + var t1 = Load128_UInt32(state.AsSpan(4)); + var t2 = Load128_UInt32(state.AsSpan(8)); + var t3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + var t4 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var x0 = Vector256.Create(t0, t0); + var x1 = Vector256.Create(t1, t1); + var x2 = Vector256.Create(t2, t2); + var x3 = Vector256.Create(t3, t4); + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 16), Avx2.ShiftRightLogical(v3, 16)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 12), Avx2.ShiftRightLogical(v1, 20)); + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 8), Avx2.ShiftRightLogical(v3, 24)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 7), Avx2.ShiftRightLogical(v1, 25)); + + v1 = Avx2.Shuffle(v1, 0x39); + v2 = Avx2.Shuffle(v2, 0x4E); + v3 = Avx2.Shuffle(v3, 0x93); + + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 16), Avx2.ShiftRightLogical(v3, 16)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 12), Avx2.ShiftRightLogical(v1, 20)); + v0 = Avx2.Add(v0, v1); + v3 = Avx2.Xor(v3, v0); + v3 = Avx2.Xor(Avx2.ShiftLeftLogical(v3, 8), Avx2.ShiftRightLogical(v3, 24)); + v2 = Avx2.Add(v2, v3); + v1 = Avx2.Xor(v1, v2); + v1 = Avx2.Xor(Avx2.ShiftLeftLogical(v1, 7), Avx2.ShiftRightLogical(v1, 25)); + + v1 = Avx2.Shuffle(v1, 0x93); + v2 = Avx2.Shuffle(v2, 0x4E); + v3 = Avx2.Shuffle(v3, 0x39); + } + + v0 = Avx2.Add(v0, x0); + v1 = Avx2.Add(v1, x1); + v2 = Avx2.Add(v2, x2); + v3 = Avx2.Add(v3, x3); + + var n0 = Avx2.Permute2x128(v0, v1, 0x20).AsByte(); + var n1 = Avx2.Permute2x128(v2, v3, 0x20).AsByte(); + var n2 = Avx2.Permute2x128(v0, v1, 0x31).AsByte(); + var n3 = Avx2.Permute2x128(v2, v3, 0x31).AsByte(); + + n0 = Avx2.Xor(n0, Load256_Byte(input)); + n1 = Avx2.Xor(n1, Load256_Byte(input[0x20..])); + n2 = Avx2.Xor(n2, Load256_Byte(input[0x40..])); + n3 = Avx2.Xor(n3, Load256_Byte(input[0x60..])); + + Store256_Byte(n0, output); + Store256_Byte(n1, output[0x20..]); + Store256_Byte(n2, output[0x40..]); + Store256_Byte(n3, output[0x60..]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static void ImplProcessBlocks2_X86_Sse2(int rounds, uint[] state, ReadOnlySpan input, + Span output) + { + if (!Sse2.IsSupported) + throw new PlatformNotSupportedException(); + + Debug.Assert(rounds % 2 == 0); + Debug.Assert(state.Length >= 16); + Debug.Assert(input.Length >= 128); + Debug.Assert(output.Length >= 128); + + var x0 = Load128_UInt32(state.AsSpan()); + var x1 = Load128_UInt32(state.AsSpan(4)); + var x2 = Load128_UInt32(state.AsSpan(8)); + var x3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + var n0 = Load128_Byte(input); + var n1 = Load128_Byte(input[0x10..]); + var n2 = Load128_Byte(input[0x20..]); + var n3 = Load128_Byte(input[0x30..]); + + n0 = Sse2.Xor(n0, v0.AsByte()); + n1 = Sse2.Xor(n1, v1.AsByte()); + n2 = Sse2.Xor(n2, v2.AsByte()); + n3 = Sse2.Xor(n3, v3.AsByte()); + + Store128_Byte(n0, output); + Store128_Byte(n1, output[0x10..]); + Store128_Byte(n2, output[0x20..]); + Store128_Byte(n3, output[0x30..]); + + x3 = Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + v0 = x0; + v1 = x1; + v2 = x2; + v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + n0 = Load128_Byte(input[0x40..]); + n1 = Load128_Byte(input[0x50..]); + n2 = Load128_Byte(input[0x60..]); + n3 = Load128_Byte(input[0x70..]); + + n0 = Sse2.Xor(n0, v0.AsByte()); + n1 = Sse2.Xor(n1, v1.AsByte()); + n2 = Sse2.Xor(n2, v2.AsByte()); + n3 = Sse2.Xor(n3, v3.AsByte()); + + Store128_Byte(n0, output[0x40..]); + Store128_Byte(n1, output[0x50..]); + Store128_Byte(n2, output[0x60..]); + Store128_Byte(n3, output[0x70..]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_Byte(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(t); + + return Vector128.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[..8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[8..]) + ).AsByte(); +} + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_UInt32(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(MemoryMarshal.AsBytes(t)); + + return Vector128.Create(t[0], t[1], t[2], t[3]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector256 Load256_Byte(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 32) + return MemoryMarshal.Read>(t); + + return Vector256.Create( + BinaryPrimitives.ReadUInt64LittleEndian(t[ 0.. 8]), + BinaryPrimitives.ReadUInt64LittleEndian(t[ 8..16]), + BinaryPrimitives.ReadUInt64LittleEndian(t[16..24]), + BinaryPrimitives.ReadUInt64LittleEndian(t[24..32]) + ).AsByte(); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128_Byte(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store256_Byte(Vector256 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 32) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[ 0.. 8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[ 8..16], u.GetElement(1)); + BinaryPrimitives.WriteUInt64LittleEndian(t[16..24], u.GetElement(2)); + BinaryPrimitives.WriteUInt64LittleEndian(t[24..32], u.GetElement(3)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs.meta new file mode 100644 index 00000000..cd6a1fb7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 004348b2103252948a1809a1317e83bb +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs new file mode 100644 index 00000000..54a8a863 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs @@ -0,0 +1,514 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) && BESTHTTP_WITH_BURST && (NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER) +using System; +using System.Runtime.CompilerServices; + +using Unity.Burst; + +using Unity.Burst.Intrinsics; + +using static Unity.Burst.Intrinsics.X86; +using static Unity.Burst.Intrinsics.Arm; + +// https://github.com/sschoener/burst-simd-exercises/blob/main/Assets/Examples/2-sum-small-numbers-sse3/SumSmallNumbers_SSE3.cs +// https://github.com/jratcliff63367/sse2neon/blob/master/SSE2NEON.h#L789 + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + [BurstCompile] + public unsafe static class FastChaCha7539EngineHelper + { + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public static void ProcessBlocks2(ReadOnlySpan input, Span output, uint[] state, int rounds, byte[] keyStream) + { + fixed (byte* pinput = input) + fixed (byte* poutput = output) + fixed (uint* pstate = state) + fixed(byte* pkeyStream = keyStream) + ProcessBlocks2Impl(pinput, input.Length, poutput, output.Length, pstate, state.Length, rounds, pkeyStream); + } + + [BurstCompile] + private static void ProcessBlocks2Impl([NoAlias] byte* input, int inputLen, [NoAlias] byte* output, int outLen, [NoAlias] uint* state, int stateLen, int rounds, [NoAlias] byte* keyStream) + { + if (Avx2.IsAvx2Supported) + { + var t0 = new v128(state[0], state[1], state[2], state[3]); //Load128_UInt32(state.AsSpan()); + var t1 = new v128(state[4], state[5], state[6], state[7]); //Load128_UInt32(state.AsSpan(4)); + var t2 = new v128(state[8], state[9], state[10], state[11]); //Load128_UInt32(state.AsSpan(8)); + var t3 = new v128(state[12], state[13], state[14], state[15]); //Load128_UInt32(state.AsSpan(12)); + ++state[12]; + var t4 = new v128(state[12], state[13], state[14], state[15]); //Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var x0 = new v256(t0, t0); //Vector256.Create(t0, t0); + var x1 = new v256(t1, t1); //Vector256.Create(t1, t1); + var x2 = new v256(t2, t2); //Vector256.Create(t2, t2); + var x3 = new v256(t3, t4); //Vector256.Create(t3, t4); + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Avx2.mm256_add_epi32(v0, v1); + v3 = Avx2.mm256_xor_si256(v3, v0); + v3 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v3, 16), Avx2.mm256_srli_epi32(v3, 16)); + v2 = Avx2.mm256_add_epi32(v2, v3); + v1 = Avx2.mm256_xor_si256(v1, v2); + v1 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v1, 12), Avx2.mm256_srli_epi32(v1, 20)); + v0 = Avx2.mm256_add_epi32(v0, v1); + v3 = Avx2.mm256_xor_si256(v3, v0); + v3 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v3, 8), Avx2.mm256_srli_epi32(v3, 24)); + v2 = Avx2.mm256_add_epi32(v2, v3); + v1 = Avx2.mm256_xor_si256(v1, v2); + v1 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v1, 7), Avx2.mm256_srli_epi32(v1, 25)); + + v1 = Avx2.mm256_shuffle_epi32(v1, 0x39); + v2 = Avx2.mm256_shuffle_epi32(v2, 0x4E); + v3 = Avx2.mm256_shuffle_epi32(v3, 0x93); + + v0 = Avx2.mm256_add_epi32(v0, v1); + v3 = Avx2.mm256_xor_si256(v3, v0); + v3 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v3, 16), Avx2.mm256_srli_epi32(v3, 16)); + v2 = Avx2.mm256_add_epi32(v2, v3); + v1 = Avx2.mm256_xor_si256(v1, v2); + v1 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v1, 12), Avx2.mm256_srli_epi32(v1, 20)); + v0 = Avx2.mm256_add_epi32(v0, v1); + v3 = Avx2.mm256_xor_si256(v3, v0); + v3 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v3, 8), Avx2.mm256_srli_epi32(v3, 24)); + v2 = Avx2.mm256_add_epi32(v2, v3); + v1 = Avx2.mm256_xor_si256(v1, v2); + v1 = Avx2.mm256_xor_si256(Avx2.mm256_slli_epi32(v1, 7), Avx2.mm256_srli_epi32(v1, 25)); + + v1 = Avx2.mm256_shuffle_epi32(v1, 0x93); + v2 = Avx2.mm256_shuffle_epi32(v2, 0x4E); + v3 = Avx2.mm256_shuffle_epi32(v3, 0x39); + } + + v0 = Avx2.mm256_add_epi32(v0, x0); + v1 = Avx2.mm256_add_epi32(v1, x1); + v2 = Avx2.mm256_add_epi32(v2, x2); + v3 = Avx2.mm256_add_epi32(v3, x3); + + var n0 = Avx2.mm256_permute2x128_si256(v0, v1, 0x20); + var n1 = Avx2.mm256_permute2x128_si256(v2, v3, 0x20); + var n2 = Avx2.mm256_permute2x128_si256(v0, v1, 0x31); + var n3 = Avx2.mm256_permute2x128_si256(v2, v3, 0x31); + + ulong* uInput = (ulong*)input; + n0 = Avx2.mm256_xor_si256(n0, new v256(uInput[0], uInput[1], uInput[2], uInput[3])); // Load256_Byte(input) + n1 = Avx2.mm256_xor_si256(n1, new v256(uInput[4], uInput[5], uInput[6], uInput[7])); // Load256_Byte(input[0x20..]) + n2 = Avx2.mm256_xor_si256(n2, new v256(uInput[8], uInput[9], uInput[10], uInput[11])); // Load256_Byte(input[0x40..]) + n3 = Avx2.mm256_xor_si256(n3, new v256(uInput[12], uInput[13], uInput[14], uInput[15])); // Load256_Byte(input[0x60..]) + + ulong* uOutput = (ulong*)output; + uOutput[0] = n0.ULong0; uOutput[1] = n0.ULong1; uOutput[2] = n0.ULong2; uOutput[3] = n0.ULong3; //Store256_Byte(n0, output); + uOutput[4] = n1.ULong0; uOutput[5] = n1.ULong1; uOutput[6] = n1.ULong2; uOutput[7] = n1.ULong3; //Store256_Byte(n1, output[0x20..]); + uOutput[8] = n2.ULong0; uOutput[9] = n2.ULong1; uOutput[10] = n2.ULong2; uOutput[11] = n2.ULong3; //Store256_Byte(n2, output[0x40..]); + uOutput[12] = n3.ULong0; uOutput[13] = n3.ULong1; uOutput[14] = n3.ULong2; uOutput[15] = n3.ULong3; //Store256_Byte(n3, output[0x60..]); + } +#if !UNITY_ANDROID && !UNITY_IOS + else if (Sse2.IsSse2Supported) + { + var x0 = Sse2.loadu_si128(state); //new v128(state[0], state[1], state[2], state[3]); //Load128_UInt32(state.AsSpan()); + var x1 = Sse2.loadu_si128(state + 4); //new v128(state[4], state[5], state[6], state[7]); //Load128_UInt32(state.AsSpan(4)); + var x2 = Sse2.loadu_si128(state + 8); //new v128(state[8], state[9], state[10], state[11]); //Load128_UInt32(state.AsSpan(8)); + var x3 = Sse2.loadu_si128(state + 12); //new v128(state[12], state[13], state[14], state[15]); //Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 16), Sse2.srli_epi32(v3, 16)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 12), Sse2.srli_epi32(v1, 20)); + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 8), Sse2.srli_epi32(v3, 24)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 7), Sse2.srli_epi32(v1, 25)); + + v1 = Sse2.shuffle_epi32(v1, 0x39); + v2 = Sse2.shuffle_epi32(v2, 0x4E); + v3 = Sse2.shuffle_epi32(v3, 0x93); + + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 16), Sse2.srli_epi32(v3, 16)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 12), Sse2.srli_epi32(v1, 20)); + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 8), Sse2.srli_epi32(v3, 24)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 7), Sse2.srli_epi32(v1, 25)); + + v1 = Sse2.shuffle_epi32(v1, 0x93); + v2 = Sse2.shuffle_epi32(v2, 0x4E); + v3 = Sse2.shuffle_epi32(v3, 0x39); + } + + v0 = Sse2.add_epi32(v0, x0); + v1 = Sse2.add_epi32(v1, x1); + v2 = Sse2.add_epi32(v2, x2); + v3 = Sse2.add_epi32(v3, x3); + + var n0 = Sse2.loadu_si128(input + 0x00); //Load128_Byte(input); + var n1 = Sse2.loadu_si128(input + 0x10); //Load128_Byte(input[0x10..]); + var n2 = Sse2.loadu_si128(input + 0x20); //Load128_Byte(input[0x20..]); + var n3 = Sse2.loadu_si128(input + 0x30); //Load128_Byte(input[0x30..]); + + n0 = Sse2.xor_si128(n0, v0); + n1 = Sse2.xor_si128(n1, v1); + n2 = Sse2.xor_si128(n2, v2); + n3 = Sse2.xor_si128(n3, v3); + + Sse2.storeu_si128(output + 0x00, n0); //Store128_Byte(n0, output); + Sse2.storeu_si128(output + 0x10, n1); //Store128_Byte(n1, output[0x10..]); + Sse2.storeu_si128(output + 0x20, n2); //Store128_Byte(n2, output[0x20..]); + Sse2.storeu_si128(output + 0x30, n3); //Store128_Byte(n3, output[0x30..]); + + + x3 = Sse2.loadu_si128(state + 12); // Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + v0 = x0; + v1 = x1; + v2 = x2; + v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 16), Sse2.srli_epi32(v3, 16)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 12), Sse2.srli_epi32(v1, 20)); + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 8), Sse2.srli_epi32(v3, 24)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 7), Sse2.srli_epi32(v1, 25)); + + v1 = Sse2.shuffle_epi32(v1, 0x39); + v2 = Sse2.shuffle_epi32(v2, 0x4E); + v3 = Sse2.shuffle_epi32(v3, 0x93); + + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 16), Sse2.srli_epi32(v3, 16)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 12), Sse2.srli_epi32(v1, 20)); + v0 = Sse2.add_epi32(v0, v1); + v3 = Sse2.xor_si128(v3, v0); + v3 = Sse2.xor_si128(Sse2.slli_epi32(v3, 8), Sse2.srli_epi32(v3, 24)); + v2 = Sse2.add_epi32(v2, v3); + v1 = Sse2.xor_si128(v1, v2); + v1 = Sse2.xor_si128(Sse2.slli_epi32(v1, 7), Sse2.srli_epi32(v1, 25)); + + v1 = Sse2.shuffle_epi32(v1, 0x93); + v2 = Sse2.shuffle_epi32(v2, 0x4E); + v3 = Sse2.shuffle_epi32(v3, 0x39); + } + + v0 = Sse2.add_epi32(v0, x0); + v1 = Sse2.add_epi32(v1, x1); + v2 = Sse2.add_epi32(v2, x2); + v3 = Sse2.add_epi32(v3, x3); + + n0 = Sse2.loadu_si128(input + 0x40); //Load128_Byte(input[0x40..]); + n1 = Sse2.loadu_si128(input + 0x50); //Load128_Byte(input[0x50..]); + n2 = Sse2.loadu_si128(input + 0x60); //Load128_Byte(input[0x60..]); + n3 = Sse2.loadu_si128(input + 0x70); //Load128_Byte(input[0x70..]); + + n0 = Sse2.xor_si128(n0, v0); + n1 = Sse2.xor_si128(n1, v1); + n2 = Sse2.xor_si128(n2, v2); + n3 = Sse2.xor_si128(n3, v3); + + Sse2.storeu_si128(output + 0x40, n0); //Store128_Byte(n0, output[0x40..]); + Sse2.storeu_si128(output + 0x50, n1); //Store128_Byte(n1, output[0x50..]); + Sse2.storeu_si128(output + 0x60, n2); //Store128_Byte(n2, output[0x60..]); + Sse2.storeu_si128(output + 0x70, n3); //Store128_Byte(n3, output[0x70..]); + } +#endif + else if (Neon.IsNeonSupported) + { + var x0 = Neon.vld1q_u32(state); //new v128(state[0], state[1], state[2], state[3]); //Load128_UInt32(state.AsSpan()); + var x1 = Neon.vld1q_u32(state + 4); //new v128(state[4], state[5], state[6], state[7]); //Load128_UInt32(state.AsSpan(4)); + var x2 = Neon.vld1q_u32(state + 8); //new v128(state[8], state[9], state[10], state[11]); //Load128_UInt32(state.AsSpan(8)); + var x3 = Neon.vld1q_u32(state + 12); + ++state[12]; + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 16), Neon.vshrq_n_u32(v3, 16)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 12), Neon.vshrq_n_u32(v1, 20)); + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 8), Neon.vshrq_n_u32(v3, 24)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 7), Neon.vshrq_n_u32(v1, 25)); + + ///*v1 = */Neon_shuffle_epi32(v1, 0x39, out v1); + v128 ret; + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v1, (0x39) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 4) & 0x3), ret, 2); + v1 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 6) & 0x3), ret, 3); + + ///*v2 = */Neon_shuffle_epi32(v2, 0x4E, out v2); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v2, (0x4E) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 4) & 0x3), ret, 2); + v2 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 6) & 0x3), ret, 3); + + ///*v3 = */Neon_shuffle_epi32(v3, 0x93, out v3); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v3, (0x93) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 4) & 0x3), ret, 2); + v3 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 6) & 0x3), ret, 3); + + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 16), Neon.vshrq_n_u32(v3, 16)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 12), Neon.vshrq_n_u32(v1, 20)); + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 8), Neon.vshrq_n_u32(v3, 24)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 7), Neon.vshrq_n_u32(v1, 25)); + + ///*v1 = */Neon_shuffle_epi32(v1, 0x93, out v1); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v1, (0x93) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 4) & 0x3), ret, 2); + v1 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 6) & 0x3), ret, 3); + + ///*v2 = */Neon_shuffle_epi32(v2, 0x4E, out v2); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v2, (0x4E) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 4) & 0x3), ret, 2); + v2 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 6) & 0x3), ret, 3); + + ///*v3 = */Neon_shuffle_epi32(v3, 0x39, out v3); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v3, (0x39) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 4) & 0x3), ret, 2); + v3 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 6) & 0x3), ret, 3); + } + + v0 = Neon.vaddq_u32(v0, x0); + v1 = Neon.vaddq_u32(v1, x1); + v2 = Neon.vaddq_u32(v2, x2); + v3 = Neon.vaddq_u32(v3, x3); + + var n0 = Neon.vld1q_u32((uint*)(input + 0x00)); //Load128_Byte(input); + var n1 = Neon.vld1q_u32((uint*)(input + 0x10)); //Load128_Byte(input[0x10..]); + var n2 = Neon.vld1q_u32((uint*)(input + 0x20)); //Load128_Byte(input[0x20..]); + var n3 = Neon.vld1q_u32((uint*)(input + 0x30)); //Load128_Byte(input[0x30..]); + + n0 = Neon.veorq_u32(n0, v0); + n1 = Neon.veorq_u32(n1, v1); + n2 = Neon.veorq_u32(n2, v2); + n3 = Neon.veorq_u32(n3, v3); + + Neon.vst1q_u32((uint*)(output + 0x00), n0); //Store128_Byte(n0, output); + Neon.vst1q_u32((uint*)(output + 0x10), n1); //Store128_Byte(n1, output[0x10..]); + Neon.vst1q_u32((uint*)(output + 0x20), n2); //Store128_Byte(n2, output[0x20..]); + Neon.vst1q_u32((uint*)(output + 0x30), n3); //Store128_Byte(n3, output[0x30..]); + + + x3 = Neon.vld1q_u32(state + 12); // Load128_UInt32(state.AsSpan(12)); + ++state[12]; + + v0 = x0; + v1 = x1; + v2 = x2; + v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 16), Neon.vshrq_n_u32(v3, 16)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 12), Neon.vshrq_n_u32(v1, 20)); + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 8), Neon.vshrq_n_u32(v3, 24)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 7), Neon.vshrq_n_u32(v1, 25)); + + ///*v1 = */Neon_shuffle_epi32(v1, 0x39, out v1); + v128 ret; + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v1, (0x39) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 4) & 0x3), ret, 2); + v1 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x39) >> 6) & 0x3), ret, 3); + + ///*v2 = */Neon_shuffle_epi32(v2, 0x4E, out v2); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v2, (0x4E) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 4) & 0x3), ret, 2); + v2 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 6) & 0x3), ret, 3); + + ///*v3 = */Neon_shuffle_epi32(v3, 0x93, out v3); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v3, (0x93) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 4) & 0x3), ret, 2); + v3 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x93) >> 6) & 0x3), ret, 3); + + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 16), Neon.vshrq_n_u32(v3, 16)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 12), Neon.vshrq_n_u32(v1, 20)); + v0 = Neon.vaddq_u32(v0, v1); + v3 = Neon.veorq_u32(v3, v0); + v3 = Neon.veorq_u32(Neon.vshlq_n_u32(v3, 8), Neon.vshrq_n_u32(v3, 24)); + v2 = Neon.vaddq_u32(v2, v3); + v1 = Neon.veorq_u32(v1, v2); + v1 = Neon.veorq_u32(Neon.vshlq_n_u32(v1, 7), Neon.vshrq_n_u32(v1, 25)); + + ///*v1 = */Neon_shuffle_epi32(v1, 0x93, out v1); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v1, (0x93) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 4) & 0x3), ret, 2); + v1 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v1, ((0x93) >> 6) & 0x3), ret, 3); + + ///*v2 = */Neon_shuffle_epi32(v2, 0x4E, out v2); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v2, (0x4E) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 4) & 0x3), ret, 2); + v2 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v2, ((0x4E) >> 6) & 0x3), ret, 3); + + ///*v3 = */Neon_shuffle_epi32(v3, 0x39, out v3); + ret = Neon.vmovq_n_u32(Neon.vgetq_lane_u32(v3, (0x39) & 0x3)); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 2) & 0x3), ret, 1); + ret = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 4) & 0x3), ret, 2); + v3 = Neon.vsetq_lane_u32(Neon.vgetq_lane_u32(v3, ((0x39) >> 6) & 0x3), ret, 3); + } + + v0 = Neon.vaddq_u32(v0, x0); + v1 = Neon.vaddq_u32(v1, x1); + v2 = Neon.vaddq_u32(v2, x2); + v3 = Neon.vaddq_u32(v3, x3); + + n0 = Neon.vld1q_u32((uint*)(input + 0x40)); //Load128_Byte(input[0x40..]); + n1 = Neon.vld1q_u32((uint*)(input + 0x50)); //Load128_Byte(input[0x50..]); + n2 = Neon.vld1q_u32((uint*)(input + 0x60)); //Load128_Byte(input[0x60..]); + n3 = Neon.vld1q_u32((uint*)(input + 0x70)); //Load128_Byte(input[0x70..]); + + n0 = Neon.veorq_u32(n0, v0); + n1 = Neon.veorq_u32(n1, v1); + n2 = Neon.veorq_u32(n2, v2); + n3 = Neon.veorq_u32(n3, v3); + + Neon.vst1q_u32((uint*)(output + 0x40), n0); //Store128_Byte(n0, output[0x40..]); + Neon.vst1q_u32((uint*)(output + 0x50), n1); //Store128_Byte(n1, output[0x50..]); + Neon.vst1q_u32((uint*)(output + 0x60), n2); //Store128_Byte(n2, output[0x60..]); + Neon.vst1q_u32((uint*)(output + 0x70), n3); //Store128_Byte(n3, output[0x70..]); + } + else + { + // Inlined to two ImplProcessBlock calls: + //ImplProcessBlock(input, output); + //ImplProcessBlock(input[64..], output[64..]); + + FastChaChaEngineHelper.ChachaCoreImpl(rounds, state, keyStream); + ++state[12]; + +#if UNITY_ANDROID && !UNITY_EDITOR + if ((long)input % sizeof(ulong) == 0) + { +#endif + var pulinput = (ulong*)input; + var puloutput = (ulong*)output; + var pulkeyStream = (ulong*)keyStream; + + puloutput[7] = pulkeyStream[7] ^ pulinput[7]; + puloutput[6] = pulkeyStream[6] ^ pulinput[6]; + puloutput[5] = pulkeyStream[5] ^ pulinput[5]; + puloutput[4] = pulkeyStream[4] ^ pulinput[4]; + + puloutput[3] = pulkeyStream[3] ^ pulinput[3]; + puloutput[2] = pulkeyStream[2] ^ pulinput[2]; + puloutput[1] = pulkeyStream[1] ^ pulinput[1]; + puloutput[0] = pulkeyStream[0] ^ pulinput[0]; +#if UNITY_ANDROID && !UNITY_EDITOR + } + else + { + for (int i = 0; i < 64; ++i) + output[i] = (byte)(keyStream[i] ^ input[i]); + } +#endif + + FastChaChaEngineHelper.ChachaCoreImpl(rounds, state, keyStream); + ++state[12]; + +#if UNITY_ANDROID && !UNITY_EDITOR + if ((long)input % sizeof(ulong) == 0) + { + ulong* pulinput = null; + ulong* puloutput = null; + ulong* pulkeyStream = null; +#endif + pulinput = (ulong*)&input[64]; + puloutput = (ulong*)&output[64]; + pulkeyStream = (ulong*)keyStream; + + puloutput[7] = pulkeyStream[7] ^ pulinput[7]; + puloutput[6] = pulkeyStream[6] ^ pulinput[6]; + puloutput[5] = pulkeyStream[5] ^ pulinput[5]; + puloutput[4] = pulkeyStream[4] ^ pulinput[4]; + + puloutput[3] = pulkeyStream[3] ^ pulinput[3]; + puloutput[2] = pulkeyStream[2] ^ pulinput[2]; + puloutput[1] = pulkeyStream[1] ^ pulinput[1]; + puloutput[0] = pulkeyStream[0] ^ pulinput[0]; +#if UNITY_ANDROID && !UNITY_EDITOR + } + else + { + for (int i = 64; i < 128; ++i) + output[i] = (byte)(keyStream[i - 64] ^ input[i]); + } +#endif + } + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs.meta new file mode 100644 index 00000000..88bce7b9 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 06f57837362cfd94dbfb9432839c1e56 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaCha7539EngineHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs new file mode 100644 index 00000000..85b193e4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs @@ -0,0 +1,249 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Diagnostics; +#if NETCOREAPP3_0_OR_GREATER +using System.Buffers.Binary; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// + /// Implementation of Daniel J. Bernstein's ChaCha stream cipher. + /// + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastChaChaEngine + : FastSalsa20Engine + { + /// + /// Creates a 20 rounds ChaCha engine. + /// + public FastChaChaEngine() + { + } + + /// + /// Creates a ChaCha engine with a specific number of rounds. + /// + /// the number of rounds (must be an even number). + public FastChaChaEngine(int rounds) + : base(rounds) + { + } + + public override string AlgorithmName + { + get { return "ChaCha" + rounds; } + } + + protected override void AdvanceCounter() + { + if (++engineState[12] == 0) + { + ++engineState[13]; + } + } + + protected override void ResetCounter() + { + engineState[12] = engineState[13] = 0; + } + + protected override void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if ((keyBytes.Length != 16) && (keyBytes.Length != 32)) + throw new ArgumentException(AlgorithmName + " requires 128 bit or 256 bit key"); + + PackTauOrSigma(keyBytes.Length, engineState, 0); + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 4, 4); + Pack.LE_To_UInt32(keyBytes, keyBytes.Length - 16, engineState, 8, 4); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 14, 2); + } + + protected override void GenerateKeyStream(byte[] output) + { + //ChachaCore(rounds, engineState, output); + FastChaChaEngineHelper.ChachaCore(rounds, engineState, output); + } + + internal static void ChachaCore(int rounds, uint[] input, byte[] output) + { + Debug.Assert(rounds % 2 == 0); + Debug.Assert(input.Length >= 16); + Debug.Assert(output.Length >= 64); + +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported) + { + var x0 = Load128_UInt32(input.AsSpan()); + var x1 = Load128_UInt32(input.AsSpan(4)); + var x2 = Load128_UInt32(input.AsSpan(8)); + var x3 = Load128_UInt32(input.AsSpan(12)); + + var v0 = x0; + var v1 = x1; + var v2 = x2; + var v3 = x3; + + for (int i = rounds; i > 0; i -= 2) + { + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x39); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x93); + + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 16), Sse2.ShiftRightLogical(v3, 16)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 12), Sse2.ShiftRightLogical(v1, 20)); + v0 = Sse2.Add(v0, v1); + v3 = Sse2.Xor(v3, v0); + v3 = Sse2.Xor(Sse2.ShiftLeftLogical(v3, 8), Sse2.ShiftRightLogical(v3, 24)); + v2 = Sse2.Add(v2, v3); + v1 = Sse2.Xor(v1, v2); + v1 = Sse2.Xor(Sse2.ShiftLeftLogical(v1, 7), Sse2.ShiftRightLogical(v1, 25)); + + v1 = Sse2.Shuffle(v1, 0x93); + v2 = Sse2.Shuffle(v2, 0x4E); + v3 = Sse2.Shuffle(v3, 0x39); + } + + v0 = Sse2.Add(v0, x0); + v1 = Sse2.Add(v1, x1); + v2 = Sse2.Add(v2, x2); + v3 = Sse2.Add(v3, x3); + + Store128_UInt32(v0, output.AsSpan()); + Store128_UInt32(v1, output.AsSpan(0x10)); + Store128_UInt32(v2, output.AsSpan(0x20)); + Store128_UInt32(v3, output.AsSpan(0x30)); + return; + } +#endif + + { + uint x00 = input[0], x01 = input[1], x02 = input[2], x03 = input[3]; + uint x04 = input[4], x05 = input[5], x06 = input[6], x07 = input[7]; + uint x08 = input[8], x09 = input[9], x10 = input[10], x11 = input[11]; + uint x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + x00 += x04; x12 = Integers.RotateLeft(x12 ^ x00, 16); + x01 += x05; x13 = Integers.RotateLeft(x13 ^ x01, 16); + x02 += x06; x14 = Integers.RotateLeft(x14 ^ x02, 16); + x03 += x07; x15 = Integers.RotateLeft(x15 ^ x03, 16); + + x08 += x12; x04 = Integers.RotateLeft(x04 ^ x08, 12); + x09 += x13; x05 = Integers.RotateLeft(x05 ^ x09, 12); + x10 += x14; x06 = Integers.RotateLeft(x06 ^ x10, 12); + x11 += x15; x07 = Integers.RotateLeft(x07 ^ x11, 12); + + x00 += x04; x12 = Integers.RotateLeft(x12 ^ x00, 8); + x01 += x05; x13 = Integers.RotateLeft(x13 ^ x01, 8); + x02 += x06; x14 = Integers.RotateLeft(x14 ^ x02, 8); + x03 += x07; x15 = Integers.RotateLeft(x15 ^ x03, 8); + + x08 += x12; x04 = Integers.RotateLeft(x04 ^ x08, 7); + x09 += x13; x05 = Integers.RotateLeft(x05 ^ x09, 7); + x10 += x14; x06 = Integers.RotateLeft(x06 ^ x10, 7); + x11 += x15; x07 = Integers.RotateLeft(x07 ^ x11, 7); + x00 += x05; x15 = Integers.RotateLeft(x15 ^ x00, 16); + x01 += x06; x12 = Integers.RotateLeft(x12 ^ x01, 16); + x02 += x07; x13 = Integers.RotateLeft(x13 ^ x02, 16); + x03 += x04; x14 = Integers.RotateLeft(x14 ^ x03, 16); + + x10 += x15; x05 = Integers.RotateLeft(x05 ^ x10, 12); + x11 += x12; x06 = Integers.RotateLeft(x06 ^ x11, 12); + x08 += x13; x07 = Integers.RotateLeft(x07 ^ x08, 12); + x09 += x14; x04 = Integers.RotateLeft(x04 ^ x09, 12); + + x00 += x05; x15 = Integers.RotateLeft(x15 ^ x00, 8); + x01 += x06; x12 = Integers.RotateLeft(x12 ^ x01, 8); + x02 += x07; x13 = Integers.RotateLeft(x13 ^ x02, 8); + x03 += x04; x14 = Integers.RotateLeft(x14 ^ x03, 8); + + x10 += x15; x05 = Integers.RotateLeft(x05 ^ x10, 7); + x11 += x12; x06 = Integers.RotateLeft(x06 ^ x11, 7); + x08 += x13; x07 = Integers.RotateLeft(x07 ^ x08, 7); + x09 += x14; x04 = Integers.RotateLeft(x04 ^ x09, 7); + } + + Pack.UInt32_To_LE(x00 + input[0], output, 0); + Pack.UInt32_To_LE(x01 + input[1], output, 4); + Pack.UInt32_To_LE(x02 + input[2], output, 8); + Pack.UInt32_To_LE(x03 + input[3], output, 12); + Pack.UInt32_To_LE(x04 + input[4], output, 16); + Pack.UInt32_To_LE(x05 + input[5], output, 20); + Pack.UInt32_To_LE(x06 + input[6], output, 24); + Pack.UInt32_To_LE(x07 + input[7], output, 28); + Pack.UInt32_To_LE(x08 + input[8], output, 32); + Pack.UInt32_To_LE(x09 + input[9], output, 36); + Pack.UInt32_To_LE(x10 + input[10], output, 40); + Pack.UInt32_To_LE(x11 + input[11], output, 44); + Pack.UInt32_To_LE(x12 + input[12], output, 48); + Pack.UInt32_To_LE(x13 + input[13], output, 52); + Pack.UInt32_To_LE(x14 + input[14], output, 56); + Pack.UInt32_To_LE(x15 + input[15], output, 60); + } + } + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Load128_UInt32(ReadOnlySpan t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + return MemoryMarshal.Read>(MemoryMarshal.AsBytes(t)); + + return Vector128.Create(t[0], t[1], t[2], t[3]); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void Store128_UInt32(Vector128 s, Span t) + { + if (BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + MemoryMarshal.Write(t, ref s); + return; + } + + var u = s.AsUInt64(); + BinaryPrimitives.WriteUInt64LittleEndian(t[..8], u.GetElement(0)); + BinaryPrimitives.WriteUInt64LittleEndian(t[8..], u.GetElement(1)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs.meta new file mode 100644 index 00000000..bdaf1846 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 918c37e8f849868418f986d0230a1adc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs new file mode 100644 index 00000000..48948081 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs @@ -0,0 +1,166 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; + +#if BESTHTTP_WITH_BURST +using Unity.Burst; +using Unity.Burst.Intrinsics; +using static Unity.Burst.Intrinsics.X86; +using static Unity.Burst.Intrinsics.Arm; +#endif + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ +#if BESTHTTP_WITH_BURST + [Unity.Burst.BurstCompile] +#endif + internal static class FastChaChaEngineHelper + { + internal unsafe static void ChachaCore(int rounds, uint[] input, byte[] output) + { + fixed (uint* pinput = input) + fixed (byte* poutput = output) + ChachaCoreImpl(rounds, pinput, poutput); + } + +#if BESTHTTP_WITH_BURST + [Unity.Burst.BurstCompile] + [Unity.Burst.CompilerServices.SkipLocalsInit] +#endif + internal unsafe static void ChachaCoreImpl(int rounds, +#if BESTHTTP_WITH_BURST + [NoAlias] +#endif + uint* input, +#if BESTHTTP_WITH_BURST + [NoAlias] +#endif + byte* output) + { + uint* x = stackalloc uint[16]; + + for (int i = 0; i < 16; i++) + x[i] = input[i]; + + uint tmp = 0; + for (int i = rounds; i > 0; i -= 2) + { + x[00] += x[04]; tmp = x[12] ^ x[00]; x[12] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[12] ^ x[00], 16); + x[01] += x[05]; tmp = x[13] ^ x[01]; x[13] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[13] ^ x[01], 16); + x[02] += x[06]; tmp = x[14] ^ x[02]; x[14] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[14] ^ x[02], 16); + x[03] += x[07]; tmp = x[15] ^ x[03]; x[15] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[15] ^ x[03], 16); + + x[08] += x[12]; tmp = x[04] ^ x[08]; x[04] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[04] ^ x[08], 12); + x[09] += x[13]; tmp = x[05] ^ x[09]; x[05] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[05] ^ x[09], 12); + x[10] += x[14]; tmp = x[06] ^ x[10]; x[06] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[06] ^ x[10], 12); + x[11] += x[15]; tmp = x[07] ^ x[11]; x[07] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[07] ^ x[11], 12); + + x[00] += x[04]; tmp = x[12] ^ x[00]; x[12] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[12] ^ x[00], 8); + x[01] += x[05]; tmp = x[13] ^ x[01]; x[13] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[13] ^ x[01], 8); + x[02] += x[06]; tmp = x[14] ^ x[02]; x[14] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[14] ^ x[02], 8); + x[03] += x[07]; tmp = x[15] ^ x[03]; x[15] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[15] ^ x[03], 8); + + x[08] += x[12]; tmp = x[04] ^ x[08]; x[04] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[04] ^ x[08], 7); + x[09] += x[13]; tmp = x[05] ^ x[09]; x[05] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[05] ^ x[09], 7); + x[10] += x[14]; tmp = x[06] ^ x[10]; x[06] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[06] ^ x[10], 7); + x[11] += x[15]; tmp = x[07] ^ x[11]; x[07] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[07] ^ x[11], 7); + x[00] += x[05]; tmp = x[15] ^ x[00]; x[15] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[15] ^ x[00], 16); + x[01] += x[06]; tmp = x[12] ^ x[01]; x[12] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[12] ^ x[01], 16); + x[02] += x[07]; tmp = x[13] ^ x[02]; x[13] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[13] ^ x[02], 16); + x[03] += x[04]; tmp = x[14] ^ x[03]; x[14] = (tmp << 16) | (tmp >> -16); // Integers.RotateLeft(x[14] ^ x[03], 16); + + x[10] += x[15]; tmp = x[05] ^ x[10]; x[05] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[05] ^ x[10], 12); + x[11] += x[12]; tmp = x[06] ^ x[11]; x[06] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[06] ^ x[11], 12); + x[08] += x[13]; tmp = x[07] ^ x[08]; x[07] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[07] ^ x[08], 12); + x[09] += x[14]; tmp = x[04] ^ x[09]; x[04] = (tmp << 12) | (tmp >> -12); // Integers.RotateLeft(x[04] ^ x[09], 12); + + x[00] += x[05]; tmp = x[15] ^ x[00]; x[15] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[15] ^ x[00], 8); + x[01] += x[06]; tmp = x[12] ^ x[01]; x[12] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[12] ^ x[01], 8); + x[02] += x[07]; tmp = x[13] ^ x[02]; x[13] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[13] ^ x[02], 8); + x[03] += x[04]; tmp = x[14] ^ x[03]; x[14] = (tmp << 8) | (tmp >> -8); // Integers.RotateLeft(x[14] ^ x[03], 8); + + x[10] += x[15]; tmp = x[05] ^ x[10]; x[05] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[05] ^ x[10], 7); + x[11] += x[12]; tmp = x[06] ^ x[11]; x[06] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[06] ^ x[11], 7); + x[08] += x[13]; tmp = x[07] ^ x[08]; x[07] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[07] ^ x[08], 7); + x[09] += x[14]; tmp = x[04] ^ x[09]; x[04] = (tmp << 7) | (tmp >> -7); // Integers.RotateLeft(x[04] ^ x[09], 7); + } + + for (int i = 0; i < 16; i++) + { + uint n = x[i] + input[i]; + + output[(i * 4)] = (byte)n; + output[(i * 4) + 1] = (byte)(n >> 8); + output[(i * 4) + 2] = (byte)(n >> 16); + output[(i * 4) + 3] = (byte)(n >> 24); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + internal static unsafe void ImplProcessBlock(ReadOnlySpan input, Span output, byte[] keyStream) + { + fixed (byte* pinput = input) + fixed (byte* poutput = output) + fixed (byte* pkeyStream = keyStream) + { +#if UNITY_ANDROID && !UNITY_EDITOR +#if BESTHTTP_WITH_BURST + if (!ImplProcessBlock_Burst(pinput, poutput, pkeyStream)) +#endif + { + if ((long)pinput % sizeof(ulong) == 0) + { +#endif + var pulinput = (ulong*)pinput; + var puloutput = (ulong*)poutput; + var pulkeyStream = (ulong*)pkeyStream; + + puloutput[7] = pulkeyStream[7] ^ pulinput[7]; + puloutput[6] = pulkeyStream[6] ^ pulinput[6]; + puloutput[5] = pulkeyStream[5] ^ pulinput[5]; + puloutput[4] = pulkeyStream[4] ^ pulinput[4]; + + puloutput[3] = pulkeyStream[3] ^ pulinput[3]; + puloutput[2] = pulkeyStream[2] ^ pulinput[2]; + puloutput[1] = pulkeyStream[1] ^ pulinput[1]; + puloutput[0] = pulkeyStream[0] ^ pulinput[0]; +#if UNITY_ANDROID && !UNITY_EDITOR + } + else + { + for (int i = 0; i < 64; ++i) + output[i] = (byte)(keyStream[i] ^ input[i]); + } + } +#endif + } + } + +#if UNITY_ANDROID && !UNITY_EDITOR && BESTHTTP_WITH_BURST + [BurstCompile] + private unsafe static bool ImplProcessBlock_Burst(byte* pinput, byte* poutput, [NoAlias] byte* pkeyStream) + { + if (Neon.IsNeonSupported) + { + for (int offset = 0; offset < 64; offset += 16) + { + var vInput = Neon.vld1q_u8(pinput + offset); + var vKeyStream = Neon.vld1q_u8(pkeyStream + offset); + + var vOut = Neon.veorq_u8(vKeyStream, vInput); + + Neon.vst1q_u8(poutput + offset, vOut); + } + + return true; + } + + return false; + } +#endif +#endif + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs.meta new file mode 100644 index 00000000..991246f3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 20742131b131594469f7ff3f84e76060 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastChaChaEngineHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs new file mode 100644 index 00000000..1bf54869 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs @@ -0,0 +1,1577 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.CompilerServices; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Buffers.Binary; +using System.Runtime.InteropServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes.Gcm; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// + /// Implements the Galois/Counter mode (GCM) detailed in NIST Special Publication 800-38D. + /// + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] +#if BESTHTTP_WITH_BURST + [Unity.Burst.BurstCompile] +#endif + public sealed class FastGcmBlockCipher + : IAeadBlockCipher + { + private static IGcmMultiplier CreateGcmMultiplier() + { +#if NETCOREAPP3_0_OR_GREATER + // TODO Prefer more tightly coupled test + if (Pclmulqdq.IsSupported) + { + return new BasicGcmMultiplier(); + } +#endif + + return new Tables8kGcmMultiplier(); + } + + public const int BlockSize = 16; + byte[] ctrBlock = new byte[BlockSize]; + + private readonly IBlockCipher cipher; + private readonly BurstTables8kGcmMultiplier multiplier; + private IGcmExponentiator exp; + + // These fields are set by Init and not modified by processing + private bool forEncryption; + private bool initialised; + private int macSize; + private byte[] lastKey; + private byte[] nonce; + private byte[] initialAssociatedText; + private byte[] H; + private byte[] J0; + + // These fields are modified during processing + private byte[] bufBlock; + private byte[] macBlock; + private byte[] S, S_at, S_atPre; + private byte[] counter; + private uint counter32; + private uint blocksRemaining; + private int bufOff; + private ulong totalLength; + private byte[] atBlock; + private int atBlockPos; + private ulong atLength; + private ulong atLengthPre; + + public FastGcmBlockCipher( + IBlockCipher c) + : this(c, null) + { + } + + public FastGcmBlockCipher( + IBlockCipher c, + IGcmMultiplier m) + { + if (c.GetBlockSize() != BlockSize) + throw new ArgumentException("cipher required with a block size of " + BlockSize + "."); + + //if (m == null) + //{ + // m = CreateGcmMultiplier(); + //} + + this.cipher = c; + this.multiplier = new BurstTables8kGcmMultiplier(); + } + + public string AlgorithmName => cipher.AlgorithmName + "/GCM"; + + public IBlockCipher UnderlyingCipher => cipher; + + public int GetBlockSize() + { + return BlockSize; + } + + /// + /// MAC sizes from 32 bits to 128 bits (must be a multiple of 8) are supported. The default is 128 bits. + /// Sizes less than 96 are not recommended, but are supported for specialized applications. + /// + public void Init(bool forEncryption, ICipherParameters parameters) + { + this.forEncryption = forEncryption; + //this.macBlock = null; + if (this.macBlock != null) + Array.Clear(this.macBlock, 0, this.macBlock.Length); + this.initialised = true; + + KeyParameter keyParam; + byte[] newNonce = null; + + if (parameters is AeadParameters) + { + AeadParameters param = (AeadParameters)parameters; + + newNonce = param.GetNonce(); + initialAssociatedText = param.GetAssociatedText(); + + int macSizeBits = param.MacSize; + if (macSizeBits < 32 || macSizeBits > 128 || macSizeBits % 8 != 0) + { + throw new ArgumentException("Invalid value for MAC size: " + macSizeBits); + } + + macSize = macSizeBits / 8; + keyParam = param.Key; + } + else if (parameters is ParametersWithIV) + { + ParametersWithIV param = (ParametersWithIV)parameters; + + newNonce = param.GetIV(); + initialAssociatedText = null; + macSize = 16; + keyParam = (KeyParameter)param.Parameters; + } + else + { + throw new ArgumentException("invalid parameters passed to GCM"); + } + + int bufLength = forEncryption ? BlockSize : (BlockSize + macSize); + this.bufBlock = new byte[bufLength]; + + if (newNonce == null || newNonce.Length < 1) + { + throw new ArgumentException("IV must be at least 1 byte"); + } + + if (forEncryption) + { + if (nonce != null && Arrays.AreEqual(nonce, newNonce)) + { + if (keyParam == null) + { + throw new ArgumentException("cannot reuse nonce for GCM encryption"); + } + if (lastKey != null && Arrays.AreEqual(lastKey, keyParam.GetKey())) + { + throw new ArgumentException("cannot reuse nonce for GCM encryption"); + } + } + } + + nonce = newNonce; + if (keyParam != null) + { + lastKey = keyParam.GetKey(); + } + + // TODO Restrict macSize to 16 if nonce length not 12? + + // Cipher always used in forward mode + // if keyParam is null we're reusing the last key. + if (keyParam != null) + { + cipher.Init(true, keyParam); + + this.H = new byte[BlockSize]; + cipher.ProcessBlock(H, 0, H, 0); + + // if keyParam is null we're reusing the last key and the multiplier doesn't need re-init + multiplier.Init(H); + exp = null; + } + else if (this.H == null) + { + throw new ArgumentException("Key must be specified in initial init"); + } + + this.J0 = new byte[BlockSize]; + + if (nonce.Length == 12) + { + Array.Copy(nonce, 0, J0, 0, nonce.Length); + this.J0[BlockSize - 1] = 0x01; + } + else + { + gHASH(J0, nonce, nonce.Length); + byte[] X = new byte[BlockSize]; + Pack.UInt64_To_BE((ulong)nonce.Length * 8UL, X, 8); + gHASHBlock(J0, X); + } + + this.S = new byte[BlockSize]; + this.S_at = new byte[BlockSize]; + this.S_atPre = new byte[BlockSize]; + this.atBlock = new byte[BlockSize]; + this.atBlockPos = 0; + this.atLength = 0; + this.atLengthPre = 0; + this.counter = Arrays.Clone(J0); + this.counter32 = Pack.BE_To_UInt32(counter, 12); + this.blocksRemaining = uint.MaxValue - 1; // page 8, len(P) <= 2^39 - 256, 1 block used by tag + this.bufOff = 0; + this.totalLength = 0; + + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + + public byte[] GetMac() + { + return macBlock == null + ? new byte[macSize] + : Arrays.Clone(macBlock); + } + + public int GetOutputSize(int len) + { + int totalData = len + bufOff; + + if (forEncryption) + { + return totalData + macSize; + } + + return totalData < macSize ? 0 : totalData - macSize; + } + + public int GetUpdateOutputSize(int len) + { + int totalData = len + bufOff; + if (!forEncryption) + { + if (totalData < macSize) + { + return 0; + } + totalData -= macSize; + } + return totalData - totalData % BlockSize; + } + + public void ProcessAadByte(byte input) + { + CheckStatus(); + + atBlock[atBlockPos] = input; + if (++atBlockPos == BlockSize) + { + // Hash each block as it fills + gHASHBlock(S_at, atBlock); + atBlockPos = 0; + atLength += BlockSize; + } + } + + public void ProcessAadBytes(byte[] inBytes, int inOff, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessAadBytes(inBytes.AsSpan(inOff, len)); +#else + CheckStatus(); + + if (atBlockPos > 0) + { + int available = BlockSize - atBlockPos; + if (len < available) + { + Array.Copy(inBytes, inOff, atBlock, atBlockPos, len); + atBlockPos += len; + return; + } + + Array.Copy(inBytes, inOff, atBlock, atBlockPos, available); + gHASHBlock(S_at, atBlock); + atLength += BlockSize; + inOff += available; + len -= available; + //atBlockPos = 0; + } + + int inLimit = inOff + len - BlockSize; + + while (inOff <= inLimit) + { + gHASHBlock(S_at, inBytes, inOff); + atLength += BlockSize; + inOff += BlockSize; + } + + atBlockPos = BlockSize + inLimit - inOff; + Array.Copy(inBytes, inOff, atBlock, 0, atBlockPos); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void ProcessAadBytes(ReadOnlySpan input) + { + CheckStatus(); + + if (atBlockPos > 0) + { + int available = BlockSize - atBlockPos; + if (input.Length < available) + { + input.CopyTo(atBlock.AsSpan(atBlockPos)); + atBlockPos += input.Length; + return; + } + + input[..available].CopyTo(atBlock.AsSpan(atBlockPos)); + gHASHBlock(S_at, atBlock); + atLength += BlockSize; + input = input[available..]; + //atBlockPos = 0; + } + + while (input.Length >= BlockSize) + { + gHASHBlock(S_at, input); + atLength += BlockSize; + input = input[BlockSize..]; + } + + input.CopyTo(atBlock); + atBlockPos = input.Length; + } +#endif + + private void InitCipher() + { + if (atLength > 0) + { + Array.Copy(S_at, 0, S_atPre, 0, BlockSize); + atLengthPre = atLength; + } + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_atPre, atBlock, 0, atBlockPos); + atLengthPre += (uint)atBlockPos; + } + + if (atLengthPre > 0) + { + Array.Copy(S_atPre, 0, S, 0, BlockSize); + } + } + + public int ProcessByte(byte input, byte[] output, int outOff) + { + CheckStatus(); + + bufBlock[bufOff] = input; + if (++bufOff == bufBlock.Length) + { + if (forEncryption) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + EncryptBlock(bufBlock, output.AsSpan(outOff)); +#else + EncryptBlock(bufBlock, 0, output, outOff); +#endif + bufOff = 0; + } + else + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + DecryptBlock(bufBlock, output.AsSpan(outOff)); +#else + DecryptBlock(bufBlock, 0, output, outOff); +#endif + Array.Copy(bufBlock, BlockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + return BlockSize; + } + return 0; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int ProcessByte(byte input, Span output) + { + CheckStatus(); + + bufBlock[bufOff] = input; + if (++bufOff == bufBlock.Length) + { + if (forEncryption) + { + EncryptBlock(bufBlock, output); + bufOff = 0; + } + else + { + DecryptBlock(bufBlock, output); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, macSize); + bufOff = macSize; + } + return BlockSize; + } + return 0; + } +#endif + + public int ProcessBytes(byte[] input, int inOff, int len, byte[] output, int outOff) + { + CheckStatus(); + + Check.DataLength(input, inOff, len, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return ProcessBytes(input.AsSpan(inOff, len), Spans.FromNullable(output, outOff)); +#else + int resultLen = 0; + + if (forEncryption) + { + if (bufOff > 0) + { + int available = BlockSize - bufOff; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return 0; + } + + Array.Copy(input, inOff, bufBlock, bufOff, available); + EncryptBlock(bufBlock, 0, output, outOff); + inOff += available; + len -= available; + resultLen = BlockSize; + //bufOff = 0; + } + + int inLimit1 = inOff + len - BlockSize; + int inLimit2 = inLimit1 - BlockSize; + + while (inOff <= inLimit2) + { + EncryptBlocks2(input, inOff, output, outOff + resultLen); + inOff += BlockSize * 2; + resultLen += BlockSize * 2; + } + + if (inOff <= inLimit1) + { + EncryptBlock(input, inOff, output, outOff + resultLen); + inOff += BlockSize; + resultLen += BlockSize; + } + + bufOff = BlockSize + inLimit1 - inOff; + Array.Copy(input, inOff, bufBlock, 0, bufOff); + } + else + { + int available = bufBlock.Length - bufOff; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return 0; + } + + if (bufOff >= BlockSize) + { + DecryptBlock(bufBlock, 0, output, outOff); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, bufOff -= BlockSize); + resultLen = BlockSize; + + available += BlockSize; + if (len < available) + { + Array.Copy(input, inOff, bufBlock, bufOff, len); + bufOff += len; + return resultLen; + } + } + + int inLimit1 = inOff + len - bufBlock.Length; + int inLimit2 = inLimit1 - BlockSize; + + available = BlockSize - bufOff; + Array.Copy(input, inOff, bufBlock, bufOff, available); + DecryptBlock(bufBlock, 0, output, outOff + resultLen); + inOff += available; + resultLen += BlockSize; + //bufOff = 0; + + while (inOff <= inLimit2) + { + DecryptBlocks2(input, inOff, output, outOff + resultLen); + inOff += BlockSize * 2; + resultLen += BlockSize * 2; + } + + if (inOff <= inLimit1) + { + DecryptBlock(input, inOff, output, outOff + resultLen); + inOff += BlockSize; + resultLen += BlockSize; + } + + bufOff = bufBlock.Length + inLimit1 - inOff; + Array.Copy(input, inOff, bufBlock, 0, bufOff); + } + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public unsafe int ProcessBytes(ReadOnlySpan input, Span output) + { + CheckStatus(); + + int resultLen = 0; + + if (forEncryption) + { + if (bufOff > 0) + { + int available = BlockSize - bufOff; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return 0; + } + + input[..available].CopyTo(bufBlock.AsSpan(bufOff)); + EncryptBlock(bufBlock, output); + input = input[available..]; + resultLen = BlockSize; + //bufOff = 0; + } + + while (input.Length >= BlockSize * 2) + { + EncryptBlocks2(input, output[resultLen..]); + input = input[(BlockSize * 2)..]; + resultLen += BlockSize * 2; + } + + if (input.Length >= BlockSize) + { + EncryptBlock(input, output[resultLen..]); + input = input[BlockSize..]; + resultLen += BlockSize; + } + + bufOff = input.Length; + input.CopyTo(bufBlock); + } + else + { + int available = bufBlock.Length - bufOff; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return 0; + } + + if (bufOff >= BlockSize) + { + DecryptBlock(bufBlock, output); + Array.Copy(bufBlock, BlockSize, bufBlock, 0, bufOff -= BlockSize); + resultLen = BlockSize; + + available += BlockSize; + if (input.Length < available) + { + input.CopyTo(bufBlock.AsSpan(bufOff)); + bufOff += input.Length; + return resultLen; + } + } + + int inLimit1 = bufBlock.Length; + int inLimit2 = inLimit1 + BlockSize; + + available = BlockSize - bufOff; + input[..available].CopyTo(bufBlock.AsSpan(bufOff)); + DecryptBlock(bufBlock, output[resultLen..]); + input = input[available..]; + resultLen += BlockSize; + //bufOff = 0; + + while (input.Length >= inLimit2) + { + //DecryptBlocks2(input, output[resultLen..]); + + var outputSample = output[resultLen..]; + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + //GetNextCtrBlock(ctrBlock); + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32BigEndian(counter.AsSpan(12), ++counter32); +#else + Pack.UInt32_To_BE(++counter32, counter, 12); +#endif + + cipher.ProcessBlock(counter, ctrBlock); + + ReadOnlySpan uInput = MemoryMarshal.Cast(input); + Span uS = MemoryMarshal.Cast(S); + ReadOnlySpan uCtrBlock = MemoryMarshal.Cast(ctrBlock); + Span uOutput = MemoryMarshal.Cast(outputSample); + + uS[0] ^= uInput[0]; + uOutput[0] = uInput[0] ^ uCtrBlock[0]; + + uS[1] ^= uInput[1]; + uOutput[1] = uInput[1] ^ uCtrBlock[1]; + + uS[2] ^= uInput[2]; + uOutput[2] = uInput[2] ^ uCtrBlock[2]; + + uS[3] ^= uInput[3]; + uOutput[3] = uInput[3] ^ uCtrBlock[3]; + + multiplier.MultiplyH(S); + + input = input[BlockSize..]; + outputSample = outputSample[BlockSize..]; + + //GetNextCtrBlock(ctrBlock); + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BinaryPrimitives.WriteUInt32BigEndian(counter.AsSpan(12), ++counter32); +#else + Pack.UInt32_To_BE(++counter32, counter, 12); +#endif + + cipher.ProcessBlock(counter, ctrBlock); + + uInput = MemoryMarshal.Cast(input); + uS = MemoryMarshal.Cast(S); + uCtrBlock = MemoryMarshal.Cast(ctrBlock); + uOutput = MemoryMarshal.Cast(outputSample); + + uS[0] ^= uInput[0]; + uOutput[0] = uInput[0] ^ uCtrBlock[0]; + + uS[1] ^= uInput[1]; + uOutput[1] = uInput[1] ^ uCtrBlock[1]; + + uS[2] ^= uInput[2]; + uOutput[2] = uInput[2] ^ uCtrBlock[2]; + + uS[3] ^= uInput[3]; + uOutput[3] = uInput[3] ^ uCtrBlock[3]; + + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + + //input = input[(BlockSize * 2)..]; + input = input[BlockSize..]; + resultLen += BlockSize * 2; + } + + if (input.Length >= inLimit1) + { + DecryptBlock(input, output[resultLen..]); + input = input[BlockSize..]; + resultLen += BlockSize; + } + + bufOff = input.Length; + input.CopyTo(bufBlock); + } + + return resultLen; + } +#endif + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + CheckStatus(); + + if (totalLength == 0) + { + InitCipher(); + } + + int extra = bufOff; + + if (forEncryption) + { + Check.OutputLength(output, outOff, extra + macSize, "output buffer too short"); + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + extra -= macSize; + + Check.OutputLength(output, outOff, extra, "output buffer too short"); + } + + if (extra > 0) + { + ProcessPartial(bufBlock, 0, extra, output, outOff); + } + + atLength += (uint)atBlockPos; + + if (atLength > atLengthPre) + { + /* + * Some AAD was sent after the cipher started. We determine the difference b/w the hash value + * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at). + * Then we carry this difference forward by multiplying by H^c, where c is the number of (full or + * partial) cipher-text blocks produced, and adjust the current hash. + */ + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_at, atBlock, 0, atBlockPos); + } + + // Find the difference between the AAD hashes + if (atLengthPre > 0) + { + GcmUtilities.Xor(S_at, S_atPre); + } + + // Number of cipher-text blocks produced + long c = (long)(((totalLength * 8) + 127) >> 7); + + // Calculate the adjustment factor + byte[] H_c = new byte[16]; + if (exp == null) + { + exp = new BasicGcmExponentiator(); + exp.Init(H); + } + exp.ExponentiateX(c, H_c); + + // Carry the difference forward + GcmUtilities.Multiply(S_at, H_c); + + // Adjust the current hash + GcmUtilities.Xor(S, S_at); + } + + // Final gHASH + byte[] X = new byte[BlockSize]; + Pack.UInt64_To_BE(atLength * 8UL, X, 0); + Pack.UInt64_To_BE(totalLength * 8UL, X, 8); + + gHASHBlock(S, X); + + // T = MSBt(GCTRk(J0,S)) + byte[] tag = new byte[BlockSize]; + cipher.ProcessBlock(J0, 0, tag, 0); + GcmUtilities.Xor(tag, S); + + int resultLen = extra; + + // We place into macBlock our calculated value for T + this.macBlock = new byte[macSize]; + Array.Copy(tag, 0, macBlock, 0, macSize); + + if (forEncryption) + { + // Append T to the message + Array.Copy(macBlock, 0, output, outOff + bufOff, macSize); + resultLen += macSize; + } + else + { + // Retrieve the T value from the message and compare to calculated one + byte[] msgMac = new byte[macSize]; + Array.Copy(bufBlock, extra, msgMac, 0, macSize); + if (!Arrays.ConstantTimeAreEqual(this.macBlock, msgMac)) + throw new InvalidCipherTextException("mac check in GCM failed"); + } + + Reset(false); + + return resultLen; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + CheckStatus(); + + if (totalLength == 0) + { + InitCipher(); + } + + int extra = bufOff; + + if (forEncryption) + { + Check.OutputLength(output, extra + macSize, "output buffer too short"); + } + else + { + if (extra < macSize) + throw new InvalidCipherTextException("data too short"); + + extra -= macSize; + + Check.OutputLength(output, extra, "output buffer too short"); + } + + if (extra > 0) + { + ProcessPartial(bufBlock.AsSpan(0, extra), output); + } + + atLength += (uint)atBlockPos; + + if (atLength > atLengthPre) + { + /* + * Some AAD was sent after the cipher started. We determine the difference b/w the hash value + * we actually used when the cipher started (S_atPre) and the final hash value calculated (S_at). + * Then we carry this difference forward by multiplying by H^c, where c is the number of (full or + * partial) cipher-text blocks produced, and adjust the current hash. + */ + + // Finish hash for partial AAD block + if (atBlockPos > 0) + { + gHASHPartial(S_at, atBlock, 0, atBlockPos); + } + + // Find the difference between the AAD hashes + if (atLengthPre > 0) + { + GcmUtilities.Xor(S_at, S_atPre); + } + + // Number of cipher-text blocks produced + long c = (long)(((totalLength * 8) + 127) >> 7); + + // Calculate the adjustment factor + byte[] H_c = new byte[16]; + if (exp == null) + { + exp = new BasicGcmExponentiator(); + exp.Init(H); + } + exp.ExponentiateX(c, H_c); + + // Carry the difference forward + GcmUtilities.Multiply(S_at, H_c); + + // Adjust the current hash + GcmUtilities.Xor(S, S_at); + } + + // Final gHASH + Span X = stackalloc byte[BlockSize]; + Pack.UInt64_To_BE(atLength * 8UL, X); + Pack.UInt64_To_BE(totalLength * 8UL, X[8..]); + + gHASHBlock(S, X); + + // T = MSBt(GCTRk(J0,S)) + Span tag = stackalloc byte[BlockSize]; + cipher.ProcessBlock(J0, tag); + GcmUtilities.Xor(tag, S); + + int resultLen = extra; + + // We place into macBlock our calculated value for T + this.macBlock = new byte[macSize]; + tag[..macSize].CopyTo(macBlock); + + if (forEncryption) + { + // Append T to the message + macBlock.CopyTo(output[bufOff..]); + resultLen += macSize; + } + else + { + // Retrieve the T value from the message and compare to calculated one + Span msgMac = stackalloc byte[macSize]; + bufBlock.AsSpan(extra, macSize).CopyTo(msgMac); + if (!Arrays.ConstantTimeAreEqual(this.macBlock, msgMac)) + throw new InvalidCipherTextException("mac check in GCM failed"); + } + + Reset(false); + + return resultLen; + } +#endif + + public void Reset() + { + Reset(true); + } + + private void Reset(bool clearMac) + { + // note: we do not reset the nonce. + + S = new byte[BlockSize]; + S_at = new byte[BlockSize]; + S_atPre = new byte[BlockSize]; + atBlock = new byte[BlockSize]; + atBlockPos = 0; + atLength = 0; + atLengthPre = 0; + counter = Arrays.Clone(J0); + counter32 = Pack.BE_To_UInt32(counter, 12); + blocksRemaining = uint.MaxValue - 1; + bufOff = 0; + totalLength = 0; + + if (bufBlock != null) + { + Arrays.Fill(bufBlock, 0); + } + + if (clearMac) + { + macBlock = null; + } + + if (forEncryption) + { + initialised = false; + } + else + { + if (initialAssociatedText != null) + { + ProcessAadBytes(initialAssociatedText, 0, initialAssociatedText.Length); + } + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + private void DecryptBlock(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if BESTHTTP_WITH_BURST + FastGcmBlockCipherHelper.DecryptBlock(input, output, ctrBlock, S.AsSpan(), BlockSize); +#elif NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t0); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#else + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + output[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + output[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + output[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } +#endif + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void DecryptBlocks2(ReadOnlySpan input, Span outputSample) + { + Check.OutputLength(outputSample, BlockSize * 2, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outputSample[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outputSample[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outputSample[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outputSample[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + + multiplier.MultiplyH(S); + + input = input[BlockSize..]; + outputSample = outputSample[BlockSize..]; + + GetNextCtrBlock(ctrBlock); + + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = input[i + 0]; + byte c1 = input[i + 1]; + byte c2 = input[i + 2]; + byte c3 = input[i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outputSample[i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outputSample[i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outputSample[i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outputSample[i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void EncryptBlock(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize, "output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void EncryptBlocks2(ReadOnlySpan input, Span output) + { + Check.OutputLength(output, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + Span ctrBlock = stackalloc byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + input = input[BlockSize..]; + output = output[BlockSize..]; + + GetNextCtrBlock(ctrBlock); +#if NETCOREAPP3_0_OR_GREATER + if (Sse2.IsSupported && Unsafe.SizeOf>() == BlockSize) + { + var t0 = MemoryMarshal.Read>(input); + var t1 = MemoryMarshal.Read>(ctrBlock); + var t2 = MemoryMarshal.Read>(S.AsSpan()); + + t1 = Sse2.Xor(t1, t0); + t2 = Sse2.Xor(t2, t1); + + MemoryMarshal.Write(output, ref t1); + MemoryMarshal.Write(S.AsSpan(), ref t2); + } + else +#endif + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ input[i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ input[i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ input[i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ input[i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + output[i + 0] = c0; + output[i + 1] = c1; + output[i + 2] = c2; + output[i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void GetNextCtrBlock(Span block) + { + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + + Pack.UInt32_To_BE(++counter32, counter, 12); + + cipher.ProcessBlock(counter, block); + } + + private void ProcessPartial(Span partialBlock, Span output) + { + Span ctrBlock = stackalloc byte[BlockSize]; + GetNextCtrBlock(ctrBlock); + + if (forEncryption) + { + GcmUtilities.Xor(partialBlock, ctrBlock, partialBlock.Length); + gHASHPartial(S, partialBlock); + } + else + { + gHASHPartial(S, partialBlock); + GcmUtilities.Xor(partialBlock, ctrBlock, partialBlock.Length); + } + + partialBlock.CopyTo(output); + totalLength += (uint)partialBlock.Length; + } +#else + private void DecryptBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void DecryptBlocks2(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + inOff += BlockSize; + outOff += BlockSize; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = inBuf[inOff + i + 0]; + byte c1 = inBuf[inOff + i + 1]; + byte c2 = inBuf[inOff + i + 2]; + byte c3 = inBuf[inOff + i + 3]; + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = (byte)(c0 ^ ctrBlock[i + 0]); + outBuf[outOff + i + 1] = (byte)(c1 ^ ctrBlock[i + 1]); + outBuf[outOff + i + 2] = (byte)(c2 ^ ctrBlock[i + 2]); + outBuf[outOff + i + 3] = (byte)(c3 ^ ctrBlock[i + 3]); + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void EncryptBlock(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize; + } + + private void EncryptBlocks2(byte[] inBuf, int inOff, byte[] outBuf, int outOff) + { + Check.OutputLength(outBuf, outOff, BlockSize * 2, "Output buffer too short"); + + if (totalLength == 0) + { + InitCipher(); + } + + //byte[] ctrBlock = new byte[BlockSize]; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + inOff += BlockSize; + outOff += BlockSize; + + GetNextCtrBlock(ctrBlock); + { + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = (byte)(ctrBlock[i + 0] ^ inBuf[inOff + i + 0]); + byte c1 = (byte)(ctrBlock[i + 1] ^ inBuf[inOff + i + 1]); + byte c2 = (byte)(ctrBlock[i + 2] ^ inBuf[inOff + i + 2]); + byte c3 = (byte)(ctrBlock[i + 3] ^ inBuf[inOff + i + 3]); + + S[i + 0] ^= c0; + S[i + 1] ^= c1; + S[i + 2] ^= c2; + S[i + 3] ^= c3; + + outBuf[outOff + i + 0] = c0; + outBuf[outOff + i + 1] = c1; + outBuf[outOff + i + 2] = c2; + outBuf[outOff + i + 3] = c3; + } + } + multiplier.MultiplyH(S); + + totalLength += BlockSize * 2; + } + + private void GetNextCtrBlock(byte[] block) + { + if (blocksRemaining == 0) + throw new InvalidOperationException("Attempt to process too many blocks"); + + blocksRemaining--; + + Pack.UInt32_To_BE(++counter32, counter, 12); + + cipher.ProcessBlock(counter, 0, block, 0); + } + + private void ProcessPartial(byte[] buf, int off, int len, byte[] output, int outOff) + { + //byte[] ctrBlock = new byte[BlockSize]; + GetNextCtrBlock(ctrBlock); + + if (forEncryption) + { + GcmUtilities.Xor(buf, off, ctrBlock, 0, len); + gHASHPartial(S, buf, off, len); + } + else + { + gHASHPartial(S, buf, off, len); + GcmUtilities.Xor(buf, off, ctrBlock, 0, len); + } + + Array.Copy(buf, off, output, outOff, len); + totalLength += (uint)len; + } +#endif + + private void gHASH(byte[] Y, byte[] b, int len) + { + for (int pos = 0; pos < len; pos += BlockSize) + { + int num = System.Math.Min(len - pos, BlockSize); + gHASHPartial(Y, b, pos, num); + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void gHASHBlock(byte[] Y, ReadOnlySpan b) + { + GcmUtilities.Xor(Y, b); + multiplier.MultiplyH(Y); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void gHASHPartial(byte[] Y, ReadOnlySpan b) + { + GcmUtilities.Xor(Y, b, b.Length); + multiplier.MultiplyH(Y); + } +#else + private void gHASHBlock(byte[] Y, byte[] b) + { + GcmUtilities.Xor(Y, b); + multiplier.MultiplyH(Y); + } + + private void gHASHBlock(byte[] Y, byte[] b, int off) + { + GcmUtilities.Xor(Y, b, off); + multiplier.MultiplyH(Y); + } +#endif + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void gHASHPartial(byte[] Y, byte[] b, int off, int len) + { + GcmUtilities.Xor(Y, b, off, len); + multiplier.MultiplyH(Y); + } + + private void CheckStatus() + { + if (!initialised) + { + if (forEncryption) + { + throw new InvalidOperationException("GCM cipher cannot be reused for encryption"); + } + throw new InvalidOperationException("GCM cipher needs to be initialised"); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs.meta new file mode 100644 index 00000000..241ae759 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4ebf1004a35ac1b46a6412f333746200 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs new file mode 100644 index 00000000..f0d5bdc0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs @@ -0,0 +1,81 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) && BESTHTTP_WITH_BURST && (NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER) +using System; +using static Unity.Burst.Intrinsics.X86.Sse2; +using static Unity.Burst.Intrinsics.Arm.Neon; +using System.Runtime.CompilerServices; +using Unity.Burst; + +// https://github.com/sschoener/burst-simd-exercises/blob/main/Assets/Examples/2-sum-small-numbers-sse3/SumSmallNumbers_SSE3.cs + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + [BurstCompile] + internal sealed unsafe class FastGcmBlockCipherHelper + { + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public static unsafe void DecryptBlock(ReadOnlySpan input, Span output, Span ctrBlock, Span S, int BlockSize) + { + fixed (byte* pInput = input) + fixed (byte* pOutput = output) + fixed (byte* pctrBlock = ctrBlock) + fixed (byte* pS = S) { + DecryptBlock_Impl(pInput, input.Length, pOutput, output.Length, pctrBlock, pS, BlockSize); + } + } + + [BurstCompile(CompileSynchronously = true)] + private unsafe static void DecryptBlock_Impl([NoAlias] byte* pinput, int inLen, [NoAlias] byte* poutput, int outLen, [NoAlias] byte* pctrBlock, [NoAlias] byte* pS, int BlockSize) + { +#if !UNITY_ANDROID && !UNITY_IOS + if (IsSse2Supported) + { + var vInput = loadu_si128(pinput); + var vCtrBlock = loadu_si128(pctrBlock); + var vS = loadu_si128(pS); + + vS = xor_si128(vS, vInput); + vCtrBlock = xor_si128(vInput, vCtrBlock); + + storeu_si128(pS, vS); + storeu_si128(poutput, vCtrBlock); + } + else +#endif + if (IsNeonSupported) + { + var vInput = vld1q_u8(pinput); + var vCtrBlock = vld1q_u8(pctrBlock); + var vS = vld1q_u8(pS); + + vS = veorq_u8(vS, vInput); + vCtrBlock = veorq_u8(vInput, vCtrBlock); + + vst1q_u8(pS, vS); + vst1q_u8(poutput, vCtrBlock); + } + else + { + Unity.Burst.CompilerServices.Hint.Assume(BlockSize == 16); + + for (int i = 0; i < BlockSize; i += 4) + { + byte c0 = pinput[i + 0]; + byte c1 = pinput[i + 1]; + byte c2 = pinput[i + 2]; + byte c3 = pinput[i + 3]; + + pS[i + 0] ^= c0; + pS[i + 1] ^= c1; + pS[i + 2] ^= c2; + pS[i + 3] ^= c3; + + poutput[i + 0] = (byte)(c0 ^ pctrBlock[i + 0]); + poutput[i + 1] = (byte)(c1 ^ pctrBlock[i + 1]); + poutput[i + 2] = (byte)(c2 ^ pctrBlock[i + 2]); + poutput[i + 3] = (byte)(c3 ^ pctrBlock[i + 3]); + } + } + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs.meta new file mode 100644 index 00000000..efce6620 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: dca25b6bc918324429915696d32255b1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastGcmBlockCipherHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs new file mode 100644 index 00000000..12fe4faf --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs @@ -0,0 +1,438 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.Runtime.CompilerServices; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + + /// + /// Poly1305 message authentication code, designed by D. J. Bernstein. + /// + /// + /// Poly1305 computes a 128-bit (16 bytes) authenticator, using a 128 bit nonce and a 256 bit key + /// consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106 + /// effective key bits) used in the authenticator. + /// + /// The polynomial calculation in this implementation is adapted from the public domain poly1305-donna-unrolled C implementation + /// by Andrew M (@floodyberry). + /// + /// + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastPoly1305 : IMac + { + private const int BlockSize = 16; + + private readonly IBlockCipher cipher; + + // Initialised state + + /** Polynomial key */ + private uint r0, r1, r2, r3, r4; + + /** Precomputed 5 * r[1..4] */ + private uint s1, s2, s3, s4; + + /** Encrypted nonce */ + private uint k0, k1, k2, k3; + + // Accumulating state + + /** Current block of buffered input */ + private byte[] currentBlock = new byte[BlockSize]; + + /** Current offset in input buffer */ + private int currentBlockOffset = 0; + + /** Polynomial accumulator */ + private uint h0, h1, h2, h3, h4; + + /** + * Constructs a Poly1305 MAC, where the key passed to init() will be used directly. + */ + public FastPoly1305() + { + this.cipher = null; + } + + /** + * Constructs a Poly1305 MAC, using a 128 bit block cipher. + */ + public FastPoly1305(IBlockCipher cipher) + { + if (cipher.GetBlockSize() != BlockSize) + { + throw new ArgumentException("Poly1305 requires a 128 bit block cipher."); + } + this.cipher = cipher; + } + + /// + /// Initialises the Poly1305 MAC. + /// + /// a {@link ParametersWithIV} containing a 128 bit nonce and a {@link KeyParameter} with + /// a 256 bit key complying to the {@link Poly1305KeyGenerator Poly1305 key format}. + public void Init(ICipherParameters parameters) + { + byte[] nonce = null; + + if (cipher != null) + { + if (!(parameters is ParametersWithIV)) + throw new ArgumentException("Poly1305 requires an IV when used with a block cipher.", "parameters"); + + ParametersWithIV ivParams = (ParametersWithIV)parameters; + nonce = ivParams.GetIV(); + parameters = ivParams.Parameters; + } + + if (!(parameters is KeyParameter)) + throw new ArgumentException("Poly1305 requires a key."); + + KeyParameter keyParams = (KeyParameter)parameters; + + SetKey(keyParams.GetKey(), nonce); + + Reset(); + } + + private void SetKey(byte[] key, byte[] nonce) + { + if (key.Length != 32) + throw new ArgumentException("Poly1305 key must be 256 bits."); + + if (cipher != null && (nonce == null || nonce.Length != BlockSize)) + throw new ArgumentException("Poly1305 requires a 128 bit IV."); + + // Extract r portion of key (and "clamp" the values) + uint t0 = Pack.LE_To_UInt32(key, 0); + uint t1 = Pack.LE_To_UInt32(key, 4); + uint t2 = Pack.LE_To_UInt32(key, 8); + uint t3 = Pack.LE_To_UInt32(key, 12); + + // NOTE: The masks perform the key "clamping" implicitly + r0 = t0 & 0x03FFFFFFU; + r1 = ((t0 >> 26) | (t1 << 6)) & 0x03FFFF03U; + r2 = ((t1 >> 20) | (t2 << 12)) & 0x03FFC0FFU; + r3 = ((t2 >> 14) | (t3 << 18)) & 0x03F03FFFU; + r4 = (t3 >> 8) & 0x000FFFFFU; + + // Precompute multipliers + s1 = r1 * 5; + s2 = r2 * 5; + s3 = r3 * 5; + s4 = r4 * 5; + + byte[] kBytes; + int kOff; + + if (cipher == null) + { + kBytes = key; + kOff = BlockSize; + } + else + { + // Compute encrypted nonce + kBytes = new byte[BlockSize]; + kOff = 0; + + cipher.Init(true, new KeyParameter(key, BlockSize, BlockSize)); + cipher.ProcessBlock(nonce, 0, kBytes, 0); + } + + k0 = Pack.LE_To_UInt32(kBytes, kOff + 0); + k1 = Pack.LE_To_UInt32(kBytes, kOff + 4); + k2 = Pack.LE_To_UInt32(kBytes, kOff + 8); + k3 = Pack.LE_To_UInt32(kBytes, kOff + 12); + } + + public string AlgorithmName + { + get { return cipher == null ? "Poly1305" : "Poly1305-" + cipher.AlgorithmName; } + } + + public int GetMacSize() + { + return BlockSize; + } + + public void Update(byte input) + { + currentBlock[currentBlockOffset++] = input; + if (currentBlockOffset == BlockSize) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + ProcessBlock(currentBlock); +#else + ProcessBlock(currentBlock, 0); +#endif + currentBlockOffset = 0; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + public void BlockUpdate(byte[] input, int inOff, int len) + { + Check.DataLength(input, inOff, len, "input buffer too short"); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + BlockUpdate(input.AsSpan(inOff, len)); +#else + int available = BlockSize - currentBlockOffset; + if (len < available) + { + Array.Copy(input, inOff, currentBlock, currentBlockOffset, len); + currentBlockOffset += len; + return; + } + + int pos = 0; + if (currentBlockOffset > 0) + { + Array.Copy(input, inOff, currentBlock, currentBlockOffset, available); + pos = available; + ProcessBlock(currentBlock, 0); + } + + int remaining; + while ((remaining = len - pos) >= BlockSize) + { + ProcessBlock(input, inOff + pos); + pos += BlockSize; + } + + Array.Copy(input, inOff + pos, currentBlock, 0, remaining); + currentBlockOffset = remaining; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#if !UNITY_ANDROID || UNITY_EDITOR + unsafe +#endif + public void BlockUpdate(ReadOnlySpan input) + { + int available = BlockSize - currentBlockOffset; + if (input.Length < available) + { + input.CopyTo(currentBlock.AsSpan(currentBlockOffset)); + currentBlockOffset += input.Length; + return; + } + + int pos = 0; + if (currentBlockOffset > 0) + { + input[..available].CopyTo(currentBlock.AsSpan(currentBlockOffset)); + pos = available; + ProcessBlock(currentBlock); + } + + int remaining; + while ((remaining = input.Length - pos) >= BlockSize) + { +#if UNITY_ANDROID && !UNITY_EDITOR + uint t0 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[pos..]); + uint t1 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[(pos + 4)..]); + uint t2 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[(pos + 8)..]); + uint t3 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(input[(pos + 12)..]); +#else + uint t0 = 0; + uint t1 = 0; + uint t2 = 0; + uint t3 = 0; + + fixed (byte* pblock = &input[pos]) + { + uint* publock = (uint*)pblock; + t0 = publock[0]; + t1 = publock[1]; + t2 = publock[2]; + t3 = publock[3]; + } +#endif + + h0 += t0 & 0x3ffffffU; + h1 += ((t1 << 6) | (t0 >> 26)) & 0x3ffffffU; + h2 += ((t2 << 12) | (t1 >> 20)) & 0x3ffffffU; + h3 += ((t3 << 18) | (t2 >> 14)) & 0x3ffffffU; + h4 += (1 << 24) | (t3 >> 8); + + ulong tp0 = (ulong)h0 * r0 + (ulong)h1 * s4 + (ulong)h2 * s3 + (ulong)h3 * s2 + (ulong)h4 * s1; + ulong tp1 = (ulong)h0 * r1 + (ulong)h1 * r0 + (ulong)h2 * s4 + (ulong)h3 * s3 + (ulong)h4 * s2; + ulong tp2 = (ulong)h0 * r2 + (ulong)h1 * r1 + (ulong)h2 * r0 + (ulong)h3 * s4 + (ulong)h4 * s3; + ulong tp3 = (ulong)h0 * r3 + (ulong)h1 * r2 + (ulong)h2 * r1 + (ulong)h3 * r0 + (ulong)h4 * s4; + ulong tp4 = (ulong)h0 * r4 + (ulong)h1 * r3 + (ulong)h2 * r2 + (ulong)h3 * r1 + (ulong)h4 * r0; + + h0 = (uint)tp0 & 0x3ffffff; tp1 += (tp0 >> 26); + h1 = (uint)tp1 & 0x3ffffff; tp2 += (tp1 >> 26); + h2 = (uint)tp2 & 0x3ffffff; tp3 += (tp2 >> 26); + h3 = (uint)tp3 & 0x3ffffff; tp4 += (tp3 >> 26); + h4 = (uint)tp4 & 0x3ffffff; + h0 += (uint)(tp4 >> 26) * 5; + h1 += h0 >> 26; h0 &= 0x3ffffff; + + pos += BlockSize; + } + + input[pos..].CopyTo(currentBlock); + currentBlockOffset = remaining; + } +#endif + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private void ProcessBlock(ReadOnlySpan block) + { + uint t0 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(block); + uint t1 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(block[4..]); + uint t2 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(block[8..]); + uint t3 = System.Buffers.Binary.BinaryPrimitives.ReadUInt32LittleEndian(block[12..]); +#else + private void ProcessBlock(byte[] buf, int off) + { + uint t0 = Pack.LE_To_UInt32(buf, off + 0); + uint t1 = Pack.LE_To_UInt32(buf, off + 4); + uint t2 = Pack.LE_To_UInt32(buf, off + 8); + uint t3 = Pack.LE_To_UInt32(buf, off + 12); +#endif + + h0 += t0 & 0x3ffffffU; + h1 += ((t1 << 6) | (t0 >> 26)) & 0x3ffffffU; + h2 += ((t2 << 12) | (t1 >> 20)) & 0x3ffffffU; + h3 += ((t3 << 18) | (t2 >> 14)) & 0x3ffffffU; + h4 += (1 << 24) | (t3 >> 8); + + ulong tp0 = (ulong)h0 * r0 + (ulong)h1 * s4 + (ulong)h2 * s3 + (ulong)h3 * s2 + (ulong)h4 * s1; + ulong tp1 = (ulong)h0 * r1 + (ulong)h1 * r0 + (ulong)h2 * s4 + (ulong)h3 * s3 + (ulong)h4 * s2; + ulong tp2 = (ulong)h0 * r2 + (ulong)h1 * r1 + (ulong)h2 * r0 + (ulong)h3 * s4 + (ulong)h4 * s3; + ulong tp3 = (ulong)h0 * r3 + (ulong)h1 * r2 + (ulong)h2 * r1 + (ulong)h3 * r0 + (ulong)h4 * s4; + ulong tp4 = (ulong)h0 * r4 + (ulong)h1 * r3 + (ulong)h2 * r2 + (ulong)h3 * r1 + (ulong)h4 * r0; + + h0 = (uint)tp0 & 0x3ffffff; tp1 += (tp0 >> 26); + h1 = (uint)tp1 & 0x3ffffff; tp2 += (tp1 >> 26); + h2 = (uint)tp2 & 0x3ffffff; tp3 += (tp2 >> 26); + h3 = (uint)tp3 & 0x3ffffff; tp4 += (tp3 >> 26); + h4 = (uint)tp4 & 0x3ffffff; + h0 += (uint)(tp4 >> 26) * 5; + h1 += h0 >> 26; h0 &= 0x3ffffff; + } + + public int DoFinal(byte[] output, int outOff) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return DoFinal(output.AsSpan(outOff)); +#else + Check.OutputLength(output, outOff, BlockSize, "output buffer is too short."); + + if (currentBlockOffset > 0) + { + // Process padded block + if (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 1; + while (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 0; + } + + h4 -= (1 << 24); + } + + ProcessBlock(currentBlock, 0); + } + + UnityEngine.Debug.Assert(h4 >> 26 == 0); + + //h0 += (h4 >> 26) * 5U + 5U; h4 &= 0x3ffffff; + h0 += 5U; + h1 += h0 >> 26; h0 &= 0x3ffffff; + h2 += h1 >> 26; h1 &= 0x3ffffff; + h3 += h2 >> 26; h2 &= 0x3ffffff; + h4 += h3 >> 26; h3 &= 0x3ffffff; + + long c = ((int)(h4 >> 26) - 1) * 5; + c += (long)k0 + ((h0) | (h1 << 26)); + Pack.UInt32_To_LE((uint)c, output, outOff); c >>= 32; + c += (long)k1 + ((h1 >> 6) | (h2 << 20)); + Pack.UInt32_To_LE((uint)c, output, outOff + 4); c >>= 32; + c += (long)k2 + ((h2 >> 12) | (h3 << 14)); + Pack.UInt32_To_LE((uint)c, output, outOff + 8); c >>= 32; + c += (long)k3 + ((h3 >> 18) | (h4 << 8)); + Pack.UInt32_To_LE((uint)c, output, outOff + 12); + + Reset(); + return BlockSize; +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public int DoFinal(Span output) + { + Check.OutputLength(output, BlockSize, "output buffer is too short."); + + if (currentBlockOffset > 0) + { + // Process padded block + if (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 1; + while (currentBlockOffset < BlockSize) + { + currentBlock[currentBlockOffset++] = 0; + } + + h4 -= (1 << 24); + } + + ProcessBlock(currentBlock); + } + + UnityEngine.Debug.Assert(h4 >> 26 == 0); + + //h0 += (h4 >> 26) * 5U + 5U; h4 &= 0x3ffffff; + h0 += 5U; + h1 += h0 >> 26; h0 &= 0x3ffffff; + h2 += h1 >> 26; h1 &= 0x3ffffff; + h3 += h2 >> 26; h2 &= 0x3ffffff; + h4 += h3 >> 26; h3 &= 0x3ffffff; + + long c = ((int)(h4 >> 26) - 1) * 5; + c += (long)k0 + ((h0) | (h1 << 26)); + Pack.UInt32_To_LE((uint)c, output); c >>= 32; + c += (long)k1 + ((h1 >> 6) | (h2 << 20)); + Pack.UInt32_To_LE((uint)c, output[4..]); c >>= 32; + c += (long)k2 + ((h2 >> 12) | (h3 << 14)); + Pack.UInt32_To_LE((uint)c, output[8..]); c >>= 32; + c += (long)k3 + ((h3 >> 18) | (h4 << 8)); + Pack.UInt32_To_LE((uint)c, output[12..]); + + Reset(); + return BlockSize; + } +#endif + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + public void Reset() + { + currentBlockOffset = 0; + + h0 = h1 = h2 = h3 = h4 = 0; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs.meta new file mode 100644 index 00000000..f455c72c --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2627205c5f9cbe643ba4be10fc82bda3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastPoly1305.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs new file mode 100644 index 00000000..82f43109 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs @@ -0,0 +1,560 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER +using System.Runtime.CompilerServices; +using System.Runtime.InteropServices; +#endif +#if NETCOREAPP3_0_OR_GREATER +using System.Runtime.InteropServices; +using System.Runtime.Intrinsics; +using System.Runtime.Intrinsics.X86; +#endif + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// + /// Implementation of Daniel J. Bernstein's Salsa20 stream cipher, Snuffle 2005 + /// + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public class FastSalsa20Engine + : IStreamCipher + { + public static readonly int DEFAULT_ROUNDS = 20; + + /** Constants */ + private const int StateSize = 16; // 16, 32 bit ints = 64 bytes + + private readonly static uint[] TAU_SIGMA = Pack.LE_To_UInt32(Strings.ToAsciiByteArray("expand 16-byte k" + "expand 32-byte k"), 0, 8); + + internal void PackTauOrSigma(int keyLength, uint[] state, int stateOffset) + { + int tsOff = (keyLength - 16) / 4; + state[stateOffset] = TAU_SIGMA[tsOff]; + state[stateOffset + 1] = TAU_SIGMA[tsOff + 1]; + state[stateOffset + 2] = TAU_SIGMA[tsOff + 2]; + state[stateOffset + 3] = TAU_SIGMA[tsOff + 3]; + } + + protected int rounds; + + /* + * variables to hold the state of the engine + * during encryption and decryption + */ + internal int index = 0; + internal uint[] engineState = new uint[StateSize]; // state + internal uint[] x = new uint[StateSize]; // internal buffer + internal byte[] keyStream = new byte[StateSize * 4]; // expanded state, 64 bytes + internal bool initialised = false; + + /* + * internal counter + */ + private uint cW0, cW1, cW2; + + /// + /// Creates a 20 round Salsa20 engine. + /// + public FastSalsa20Engine() + : this(DEFAULT_ROUNDS) + { + } + + /// + /// Creates a Salsa20 engine with a specific number of rounds. + /// + /// the number of rounds (must be an even number). + public FastSalsa20Engine(int rounds) + { + if (rounds <= 0 || (rounds & 1) != 0) + { + throw new ArgumentException("'rounds' must be a positive, even number"); + } + + this.rounds = rounds; + } + + public virtual void Init( + bool forEncryption, + ICipherParameters parameters) + { + /* + * Salsa20 encryption and decryption is completely + * symmetrical, so the 'forEncryption' is + * irrelevant. (Like 90% of stream ciphers) + */ + + ParametersWithIV ivParams = parameters as ParametersWithIV; + if (ivParams == null) + throw new ArgumentException(AlgorithmName + " Init requires an IV", "parameters"); + + byte[] iv = ivParams.GetIV(); + if (iv == null || iv.Length != NonceSize) + throw new ArgumentException(AlgorithmName + " requires exactly " + NonceSize + " bytes of IV"); + + ICipherParameters keyParam = ivParams.Parameters; + if (keyParam == null) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " KeyParameter can not be null for first initialisation"); + + SetKey(null, iv); + } + else if (keyParam is KeyParameter) + { + SetKey(((KeyParameter)keyParam).GetKey(), iv); + } + else + { + throw new ArgumentException(AlgorithmName + " Init parameters must contain a KeyParameter (or null for re-init)"); + } + + Reset(); + initialised = true; + } + + protected virtual int NonceSize + { + get { return 8; } + } + + public virtual string AlgorithmName + { + get + { + string name = "Salsa20"; + if (rounds != DEFAULT_ROUNDS) + { + name += "/" + rounds; + } + return name; + } + } + + public virtual byte ReturnByte( + byte input) + { + if (LimitExceeded()) + { + throw new MaxBytesExceededException("2^70 byte limit per IV; Change IV"); + } + + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + } + + byte output = (byte)(keyStream[index] ^ input); + index = (index + 1) & 63; + + return output; + } + + protected virtual void AdvanceCounter() + { + if (++engineState[8] == 0) + { + ++engineState[9]; + } + } + + public unsafe virtual void ProcessBytes( + byte[] inBytes, + int inOff, + int len, + byte[] outBytes, + int outOff) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.DataLength(inBytes, inOff, len, "input buffer too short"); + Check.OutputLength(outBytes, outOff, len, "output buffer too short"); + + if (LimitExceeded((uint)len)) + throw new MaxBytesExceededException("2^70 byte limit per IV would be exceeded; Change IV"); + + for (int i = 0; i < len; i++) + { + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + + if (len - i >= 64) + { + fixed (byte* pbout = outBytes) + fixed (byte* pbin = inBytes) + fixed (byte* pbkey = keyStream) + { +#if BESTHTTP_WITH_BURST + FastSalsa20EngineHelper.ProcessBytes(pbout, outOff, pbin, inOff, pbkey); +#else + ulong* pulOut = (ulong*)&pbout[outOff]; + ulong* pulIn = (ulong*)&pbin[inOff]; + ulong* pulKeyStream = (ulong*)pbkey; + + pulOut[0] = pulKeyStream[0] ^ pulIn[0]; + pulOut[1] = pulKeyStream[1] ^ pulIn[1]; + pulOut[2] = pulKeyStream[2] ^ pulIn[2]; + pulOut[3] = pulKeyStream[3] ^ pulIn[3]; +#endif + } + + i += 63; + index = 0; + continue; + } + } + outBytes[i + outOff] = (byte)(keyStream[index] ^ inBytes[i + inOff]); + index = (index + 1) & 63; + } + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual void ProcessBytes(ReadOnlySpan input, Span output) + { + if (!initialised) + throw new InvalidOperationException(AlgorithmName + " not initialised"); + + Check.OutputLength(output, input.Length, "output buffer too short"); + + if (LimitExceeded((uint)input.Length)) + throw new MaxBytesExceededException("2^70 byte limit per IV would be exceeded; Change IV"); + + for (int i = 0; i < input.Length; i++) + { + if (index == 0) + { + GenerateKeyStream(keyStream); + AdvanceCounter(); + + if (input.Length - i >= 64) + { + Span lOutput = MemoryMarshal.Cast(output.Slice(i)); + ReadOnlySpan lKeyStream = MemoryMarshal.Cast(keyStream); + ReadOnlySpan lInput = MemoryMarshal.Cast(input.Slice(i)); + + lOutput[0] = lKeyStream[0] ^ lInput[0]; + lOutput[1] = lKeyStream[1] ^ lInput[1]; + lOutput[2] = lKeyStream[2] ^ lInput[2]; + lOutput[3] = lKeyStream[3] ^ lInput[3]; + + i += 63; + index = 0; + continue; + } + } + + output[i] = (byte)(keyStream[index++] ^ input[i]); + index &= 63; + } + } +#endif + + public virtual void Reset() + { + index = 0; + ResetLimitCounter(); + ResetCounter(); + } + + protected virtual void ResetCounter() + { + engineState[8] = engineState[9] = 0; + } + + protected virtual void SetKey(byte[] keyBytes, byte[] ivBytes) + { + if (keyBytes != null) + { + if ((keyBytes.Length != 16) && (keyBytes.Length != 32)) + throw new ArgumentException(AlgorithmName + " requires 128 bit or 256 bit key"); + + int tsOff = (keyBytes.Length - 16) / 4; + engineState[0] = TAU_SIGMA[tsOff]; + engineState[5] = TAU_SIGMA[tsOff + 1]; + engineState[10] = TAU_SIGMA[tsOff + 2]; + engineState[15] = TAU_SIGMA[tsOff + 3]; + + // Key + Pack.LE_To_UInt32(keyBytes, 0, engineState, 1, 4); + Pack.LE_To_UInt32(keyBytes, keyBytes.Length - 16, engineState, 11, 4); + } + + // IV + Pack.LE_To_UInt32(ivBytes, 0, engineState, 6, 2); + } + + protected virtual void GenerateKeyStream(byte[] output) + { + SalsaCore(rounds, engineState, x); + Pack.UInt32_To_LE(x, output, 0); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + internal static void SalsaCore(int rounds, ReadOnlySpan input, Span output) + { + if (input.Length < 16) + throw new ArgumentException(); + if (output.Length < 16) + throw new ArgumentException(); + if (rounds % 2 != 0) + throw new ArgumentException("Number of rounds must be even"); + +#if NETCOREAPP3_0_OR_GREATER + if (Sse41.IsSupported && BitConverter.IsLittleEndian && Unsafe.SizeOf>() == 16) + { + Vector128 b0, b1, b2, b3; + { + var I = MemoryMarshal.AsBytes(input[..16]); + var t0 = MemoryMarshal.Read>(I[0x00..0x10]); + var t1 = MemoryMarshal.Read>(I[0x10..0x20]); + var t2 = MemoryMarshal.Read>(I[0x20..0x30]); + var t3 = MemoryMarshal.Read>(I[0x30..0x40]); + + var u0 = Sse41.Blend(t0, t2, 0xF0); + var u1 = Sse41.Blend(t1, t3, 0xC3); + var u2 = Sse41.Blend(t0, t2, 0x0F); + var u3 = Sse41.Blend(t1, t3, 0x3C); + + b0 = Sse41.Blend(u0, u1, 0xCC).AsUInt32(); + b1 = Sse41.Blend(u0, u1, 0x33).AsUInt32(); + b2 = Sse41.Blend(u2, u3, 0xCC).AsUInt32(); + b3 = Sse41.Blend(u2, u3, 0x33).AsUInt32(); + } + + var c0 = b0; + var c1 = b1; + var c2 = b2; + var c3 = b3; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound_Sse2(ref c0, ref c3, ref c2, ref c1); + QuarterRound_Sse2(ref c0, ref c1, ref c2, ref c3); + } + + b0 = Sse2.Add(b0, c0); + b1 = Sse2.Add(b1, c1); + b2 = Sse2.Add(b2, c2); + b3 = Sse2.Add(b3, c3); + + { + var t0 = b0.AsUInt16(); + var t1 = b1.AsUInt16(); + var t2 = b2.AsUInt16(); + var t3 = b3.AsUInt16(); + + var u0 = Sse41.Blend(t0, t1, 0xCC); + var u1 = Sse41.Blend(t0, t1, 0x33); + var u2 = Sse41.Blend(t2, t3, 0xCC); + var u3 = Sse41.Blend(t2, t3, 0x33); + + var v0 = Sse41.Blend(u0, u2, 0xF0); + var v1 = Sse41.Blend(u1, u3, 0xC3); + var v2 = Sse41.Blend(u0, u2, 0x0F); + var v3 = Sse41.Blend(u1, u3, 0x3C); + + var X = MemoryMarshal.AsBytes(output[..16]); + MemoryMarshal.Write(X[0x00..0x10], ref v0); + MemoryMarshal.Write(X[0x10..0x20], ref v1); + MemoryMarshal.Write(X[0x20..0x30], ref v2); + MemoryMarshal.Write(X[0x30..0x40], ref v3); + } + return; + } +#endif + + uint x00 = input[ 0]; + uint x01 = input[ 1]; + uint x02 = input[ 2]; + uint x03 = input[ 3]; + uint x04 = input[ 4]; + uint x05 = input[ 5]; + uint x06 = input[ 6]; + uint x07 = input[ 7]; + uint x08 = input[ 8]; + uint x09 = input[ 9]; + uint x10 = input[10]; + uint x11 = input[11]; + uint x12 = input[12]; + uint x13 = input[13]; + uint x14 = input[14]; + uint x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound(ref x00, ref x04, ref x08, ref x12); + QuarterRound(ref x05, ref x09, ref x13, ref x01); + QuarterRound(ref x10, ref x14, ref x02, ref x06); + QuarterRound(ref x15, ref x03, ref x07, ref x11); + + QuarterRound(ref x00, ref x01, ref x02, ref x03); + QuarterRound(ref x05, ref x06, ref x07, ref x04); + QuarterRound(ref x10, ref x11, ref x08, ref x09); + QuarterRound(ref x15, ref x12, ref x13, ref x14); + } + + output[ 0] = x00 + input[ 0]; + output[ 1] = x01 + input[ 1]; + output[ 2] = x02 + input[ 2]; + output[ 3] = x03 + input[ 3]; + output[ 4] = x04 + input[ 4]; + output[ 5] = x05 + input[ 5]; + output[ 6] = x06 + input[ 6]; + output[ 7] = x07 + input[ 7]; + output[ 8] = x08 + input[ 8]; + output[ 9] = x09 + input[ 9]; + output[10] = x10 + input[10]; + output[11] = x11 + input[11]; + output[12] = x12 + input[12]; + output[13] = x13 + input[13]; + output[14] = x14 + input[14]; + output[15] = x15 + input[15]; + } +#else + internal static void SalsaCore(int rounds, uint[] input, uint[] output) + { + if (input.Length < 16) + throw new ArgumentException(); + if (output.Length < 16) + throw new ArgumentException(); + if (rounds % 2 != 0) + throw new ArgumentException("Number of rounds must be even"); + + uint x00 = input[0]; + uint x01 = input[1]; + uint x02 = input[2]; + uint x03 = input[3]; + uint x04 = input[4]; + uint x05 = input[5]; + uint x06 = input[6]; + uint x07 = input[7]; + uint x08 = input[8]; + uint x09 = input[9]; + uint x10 = input[10]; + uint x11 = input[11]; + uint x12 = input[12]; + uint x13 = input[13]; + uint x14 = input[14]; + uint x15 = input[15]; + + for (int i = rounds; i > 0; i -= 2) + { + QuarterRound(ref x00, ref x04, ref x08, ref x12); + QuarterRound(ref x05, ref x09, ref x13, ref x01); + QuarterRound(ref x10, ref x14, ref x02, ref x06); + QuarterRound(ref x15, ref x03, ref x07, ref x11); + + QuarterRound(ref x00, ref x01, ref x02, ref x03); + QuarterRound(ref x05, ref x06, ref x07, ref x04); + QuarterRound(ref x10, ref x11, ref x08, ref x09); + QuarterRound(ref x15, ref x12, ref x13, ref x14); + } + + output[ 0] = x00 + input[ 0]; + output[ 1] = x01 + input[ 1]; + output[ 2] = x02 + input[ 2]; + output[ 3] = x03 + input[ 3]; + output[ 4] = x04 + input[ 4]; + output[ 5] = x05 + input[ 5]; + output[ 6] = x06 + input[ 6]; + output[ 7] = x07 + input[ 7]; + output[ 8] = x08 + input[ 8]; + output[ 9] = x09 + input[ 9]; + output[10] = x10 + input[10]; + output[11] = x11 + input[11]; + output[12] = x12 + input[12]; + output[13] = x13 + input[13]; + output[14] = x14 + input[14]; + output[15] = x15 + input[15]; + } +#endif + + internal void ResetLimitCounter() + { + cW0 = 0; + cW1 = 0; + cW2 = 0; + } + + internal bool LimitExceeded() + { + if (++cW0 == 0) + { + if (++cW1 == 0) + { + return (++cW2 & 0x20) != 0; // 2^(32 + 32 + 6) + } + } + + return false; + } + + /* + * this relies on the fact len will always be positive. + */ + internal bool LimitExceeded( + uint len) + { + uint old = cW0; + cW0 += len; + if (cW0 < old) + { + if (++cW1 == 0) + { + return (++cW2 & 0x20) != 0; // 2^(32 + 32 + 6) + } + } + + return false; + } + +#if NETSTANDARD1_0_OR_GREATER || NETCOREAPP1_0_OR_GREATER || UNITY_2021_2_OR_NEWER + [MethodImpl(MethodImplOptions.AggressiveInlining)] +#endif + private static void QuarterRound(ref uint a, ref uint b, ref uint c, ref uint d) + { + b ^= Integers.RotateLeft(a + d, 7); + c ^= Integers.RotateLeft(b + a, 9); + d ^= Integers.RotateLeft(c + b, 13); + a ^= Integers.RotateLeft(d + c, 18); + } + +#if NETCOREAPP3_0_OR_GREATER + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static void QuarterRound_Sse2(ref Vector128 a, ref Vector128 b, ref Vector128 c, + ref Vector128 d) + { + b = Sse2.Xor(b, Rotate_Sse2(Sse2.Add(a, d), 7)); + c = Sse2.Xor(c, Rotate_Sse2(Sse2.Add(b, a), 9)); + d = Sse2.Xor(d, Rotate_Sse2(Sse2.Add(c, b), 13)); + a = Sse2.Xor(a, Rotate_Sse2(Sse2.Add(d, c), 18)); + + b = Sse2.Shuffle(b, 0x93); + c = Sse2.Shuffle(c, 0x4E); + d = Sse2.Shuffle(d, 0x39); + } + + [MethodImpl(MethodImplOptions.AggressiveInlining)] + private static Vector128 Rotate_Sse2(Vector128 x, byte sl) + { + byte sr = (byte)(32 - sl); + return Sse2.Xor(Sse2.ShiftLeftLogical(x, sl), Sse2.ShiftRightLogical(x, sr)); + } +#endif + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs.meta new file mode 100644 index 00000000..221864dc --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cfec180d1c80016408c0852644feb870 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20Engine.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs new file mode 100644 index 00000000..630588ef --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs @@ -0,0 +1,68 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; + +#if BESTHTTP_WITH_BURST +using Unity.Burst.Intrinsics; +using static Unity.Burst.Intrinsics.X86; +using static Unity.Burst.Intrinsics.Arm; +#endif + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ +#if BESTHTTP_WITH_BURST + [Unity.Burst.BurstCompile] +#endif + internal static class FastSalsa20EngineHelper + { +#if BESTHTTP_WITH_BURST + [Unity.Burst.BurstCompile] + public unsafe static void ProcessBytes([Unity.Burst.NoAlias] byte* outBytes, int outOff, [Unity.Burst.NoAlias] byte* inBytes, int inOff, [Unity.Burst.NoAlias] byte* keyStream) + { + //for (int i = 0; i < 64; ++i) + // outBytes[idx + i + outOff] = (byte)(keyStream[i] ^ inBytes[idx + i + inOff]); + +#if !UNITY_ANDROID && !UNITY_IOS + if (Sse2.IsSse2Supported) + { + for (int offset = 0; offset < 64; offset += 16) + { + var vin = Sse2.loadu_si128(inBytes + inOff + offset); + //var vout = Sse2.loadu_si128(outBytes + outOff + offset); + var vkeyStream = Sse2.loadu_si128(keyStream + offset); + + var vout = Sse2.xor_si128(vkeyStream, vin); + + Sse2.storeu_si128(outBytes + outOff + offset, vout); + } + } + else +#endif + if (Neon.IsNeonSupported) + { + for (int offset = 0; offset < 64; offset += 16) + { + var vin = Neon.vld1q_u8(inBytes + inOff + offset); + var vkeyStream = Neon.vld1q_u8(keyStream + offset); + + var vOut = Neon.veorq_u8(vkeyStream, vin); + + Neon.vst1q_u8(outBytes + outOff + offset, vOut); + } + } + else + { + ulong* pulOut = (ulong*)&outBytes[outOff]; + ulong* pulIn = (ulong*)&inBytes[inOff]; + ulong* pulKeyStream = (ulong*)keyStream; + + pulOut[0] = pulKeyStream[0] ^ pulIn[0]; + pulOut[1] = pulKeyStream[1] ^ pulIn[1]; + pulOut[2] = pulKeyStream[2] ^ pulIn[2]; + pulOut[3] = pulKeyStream[3] ^ pulIn[3]; + } + } +#endif + + } + } +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs.meta new file mode 100644 index 00000000..d37fc951 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6ca9a322eaab18f48ada5ed62e55ab5c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSalsa20EngineHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs new file mode 100644 index 00000000..3ad24702 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs @@ -0,0 +1,141 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /** + * Implements the Segmented Integer Counter (SIC) mode on top of a simple + * block cipher. + */ + public class FastSicBlockCipher + : IBlockCipherMode + { + private readonly IBlockCipher cipher; + private readonly int blockSize; + private readonly byte[] counter; + private readonly byte[] counterOut; + private byte[] IV; + + /** + * Basic constructor. + * + * @param c the block cipher to be used. + */ + public FastSicBlockCipher(IBlockCipher cipher) + { + this.cipher = cipher; + this.blockSize = cipher.GetBlockSize(); + this.counter = new byte[blockSize]; + this.counterOut = new byte[blockSize]; + this.IV = new byte[blockSize]; + } + + /** + * return the underlying block cipher that we are wrapping. + * + * @return the underlying block cipher that we are wrapping. + */ + public IBlockCipher UnderlyingCipher => cipher; + + public virtual void Init( + bool forEncryption, //ignored by this CTR mode + ICipherParameters parameters) + { + ParametersWithIV ivParam = parameters as ParametersWithIV; + if (ivParam == null) + throw new ArgumentException("CTR/SIC mode requires ParametersWithIV", "parameters"); + + this.IV = Arrays.Clone(ivParam.GetIV()); + + if (blockSize < IV.Length) + throw new ArgumentException("CTR/SIC mode requires IV no greater than: " + blockSize + " bytes."); + + int maxCounterSize = System.Math.Min(8, blockSize / 2); + if (blockSize - IV.Length > maxCounterSize) + throw new ArgumentException("CTR/SIC mode requires IV of at least: " + (blockSize - maxCounterSize) + " bytes."); + + // if null it's an IV changed only. + if (ivParam.Parameters != null) + { + cipher.Init(true, ivParam.Parameters); + } + + Reset(); + } + + public virtual string AlgorithmName + { + get { return cipher.AlgorithmName + "/SIC"; } + } + + public virtual bool IsPartialBlockOkay + { + get { return true; } + } + + public virtual int GetBlockSize() + { + return cipher.GetBlockSize(); + } + + public virtual int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff) + { + cipher.ProcessBlock(counter, 0, counterOut, 0); + + // + // XOR the counterOut with the plaintext producing the cipher text + // + for (int i = 0; i < counterOut.Length; i++) + { + output[outOff + i] = (byte)(counterOut[i] ^ input[inOff + i]); + } + + // Increment the counter + int j = counter.Length; + while (--j >= 0 && ++counter[j] == 0) + { + } + + return counter.Length; + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual int ProcessBlock(ReadOnlySpan input, Span output) + { + cipher.ProcessBlock(counter, 0, counterOut, 0); + + // + // XOR the counterOut with the plaintext producing the cipher text + // + for (int i = 0; i < counterOut.Length; i++) + { + output[i] = (byte)(counterOut[i] ^ input[i]); + } + + // Increment the counter + int j = counter.Length; + while (--j >= 0 && ++counter[j] == 0) + { + } + + return counter.Length; + } +#endif + + public virtual void Reset() + { + Arrays.Fill(counter, (byte)0); + Array.Copy(IV, 0, counter, 0, IV.Length); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs.meta new file mode 100644 index 00000000..4f9dbaf6 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7748f7b303bd58144a94ce39ecb2c143 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastSicBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs new file mode 100644 index 00000000..6b9253b0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs @@ -0,0 +1,499 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// A generic TLS 1.2 AEAD cipher. + + + + [Best.HTTP.Shared.PlatformSupport.IL2CPP.Il2CppEagerStaticClassConstructionAttribute] + public sealed class FastTlsAeadCipher + : TlsCipher + { + public const int AEAD_CCM = 1; + public const int AEAD_CHACHA20_POLY1305 = 2; + public const int AEAD_GCM = 3; + + private const int NONCE_RFC5288 = 1; + private const int NONCE_RFC7905 = 2; + + private readonly TlsCryptoParameters m_cryptoParams; + private readonly int m_keySize; + private readonly int m_macSize; + private readonly int m_fixed_iv_length; + private readonly int m_record_iv_length; + + private readonly TlsAeadCipherImpl m_decryptCipher, m_encryptCipher; + private readonly byte[] m_decryptNonce, m_encryptNonce; + + private readonly bool m_isTlsV13; + private readonly int m_nonceMode; + + /// + public FastTlsAeadCipher(TlsCryptoParameters cryptoParams, TlsAeadCipherImpl encryptCipher, + TlsAeadCipherImpl decryptCipher, int keySize, int macSize, int aeadType) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (!TlsImplUtilities.IsTlsV12(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_isTlsV13 = TlsImplUtilities.IsTlsV13(negotiatedVersion); + this.m_nonceMode = GetNonceMode(m_isTlsV13, aeadType); + + switch (m_nonceMode) + { + case NONCE_RFC5288: + this.m_fixed_iv_length = 4; + this.m_record_iv_length = 8; + break; + case NONCE_RFC7905: + this.m_fixed_iv_length = 12; + this.m_record_iv_length = 0; + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + this.m_cryptoParams = cryptoParams; + this.m_keySize = keySize; + this.m_macSize = macSize; + + this.m_decryptCipher = decryptCipher; + this.m_encryptCipher = encryptCipher; + + this.m_decryptNonce = new byte[m_fixed_iv_length]; + this.m_encryptNonce = new byte[m_fixed_iv_length]; + + bool isServer = cryptoParams.IsServer; + if (m_isTlsV13) + { + RekeyCipher(securityParameters, decryptCipher, m_decryptNonce, !isServer); + RekeyCipher(securityParameters, encryptCipher, m_encryptNonce, isServer); + return; + } + + int keyBlockSize = (2 * keySize) + (2 * m_fixed_iv_length); + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span keyBlock = keyBlockSize <= 512 + ? stackalloc byte[keyBlockSize] + : new byte[keyBlockSize]; + TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlock); + + if (isServer) + { + decryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + encryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + + keyBlock[..m_fixed_iv_length].CopyTo(m_decryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + keyBlock[..m_fixed_iv_length].CopyTo(m_encryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + } + else + { + encryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + decryptCipher.SetKey(keyBlock[..keySize]); keyBlock = keyBlock[keySize..]; + + keyBlock[..m_fixed_iv_length].CopyTo(m_encryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + keyBlock[..m_fixed_iv_length].CopyTo(m_decryptNonce); keyBlock = keyBlock[m_fixed_iv_length..]; + } + + if (!keyBlock.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); +#else + byte[] keyBlock = TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlockSize); + int pos = 0; + + if (isServer) + { + decryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + encryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + + Array.Copy(keyBlock, pos, m_decryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + Array.Copy(keyBlock, pos, m_encryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + } + else + { + encryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + decryptCipher.SetKey(keyBlock, pos, keySize); pos += keySize; + + Array.Copy(keyBlock, pos, m_encryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + Array.Copy(keyBlock, pos, m_decryptNonce, 0, m_fixed_iv_length); pos += m_fixed_iv_length; + } + + if (pos != keyBlockSize) + throw new TlsFatalAlert(AlertDescription.internal_error); +#endif + + int nonceLength = m_fixed_iv_length + m_record_iv_length; + + // NOTE: Ensure dummy nonce is not part of the generated sequence(s) + byte[] dummyNonce = new byte[nonceLength]; + dummyNonce[0] = (byte)~m_encryptNonce[0]; + dummyNonce[1] = (byte)~m_decryptNonce[1]; + + encryptCipher.Init(dummyNonce, macSize, null); + decryptCipher.Init(dummyNonce, macSize, null); + } + + public int GetCiphertextDecodeLimit(int plaintextLimit) + { + return plaintextLimit + m_macSize + m_record_iv_length + (m_isTlsV13 ? 1 : 0); + } + + public int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + int innerPlaintextLimit = plaintextLength; + if (m_isTlsV13) + { + // TODO[tls13] Add support for padding + int maxPadding = 0; + + innerPlaintextLimit = 1 + System.Math.Min(plaintextLimit, plaintextLength + maxPadding); + } + + return innerPlaintextLimit + m_macSize + m_record_iv_length; + } + + public int GetPlaintextLimit(int ciphertextLimit) + { + return ciphertextLimit - m_macSize - m_record_iv_length - (m_isTlsV13 ? 1 : 0); + } + + public TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int plaintextOffset, int plaintextLength) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return EncodePlaintext(seqNo, contentType, recordVersion, headerAllocation, + plaintext.AsSpan(plaintextOffset, plaintextLength)); +#else + byte[] nonce = new byte[m_encryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_encryptNonce, 0, nonce, 0, m_encryptNonce.Length); + // RFC 5288/6655: The nonce_explicit MAY be the 64-bit sequence number. + TlsUtilities.WriteUint64(seqNo, nonce, m_encryptNonce.Length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_encryptNonce.Length; ++i) + { + nonce[i] ^= m_encryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int extraLength = m_isTlsV13 ? 1 : 0; + + // TODO[tls13] If we support adding padding to TLSInnerPlaintext, this will need review + int encryptionLength = m_encryptCipher.GetOutputSize(plaintextLength + extraLength); + int ciphertextLength = m_record_iv_length + encryptionLength; + + byte[] output = BufferPool.Get(headerAllocation + ciphertextLength, true); //new byte[headerAllocation + ciphertextLength]; + int outputPos = headerAllocation; + + if (m_record_iv_length != 0) + { + Array.Copy(nonce, nonce.Length - m_record_iv_length, output, outputPos, m_record_iv_length); + outputPos += m_record_iv_length; + } + + short recordType = m_isTlsV13 ? ContentType.application_data : contentType; + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintextLength); + + try + { + Array.Copy(plaintext, plaintextOffset, output, outputPos, plaintextLength); + if (m_isTlsV13) + { + output[outputPos + plaintextLength] = (byte)contentType; + } + + m_encryptCipher.Init(nonce, m_macSize, additionalData); + outputPos += m_encryptCipher.DoFinal(output, outputPos, plaintextLength + extraLength, output, + outputPos); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + if (outputPos != headerAllocation + ciphertextLength) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + return new TlsEncodeResult(output, 0, outputPos, recordType, true); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + byte[] nonce = new byte[m_encryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_encryptNonce, 0, nonce, 0, m_encryptNonce.Length); + // RFC 5288/6655: The nonce_explicit MAY be the 64-bit sequence number. + TlsUtilities.WriteUint64(seqNo, nonce, m_encryptNonce.Length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_encryptNonce.Length; ++i) + { + nonce[i] ^= m_encryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int extraLength = m_isTlsV13 ? 1 : 0; + + // TODO[tls13] If we support adding padding to TLSInnerPlaintext, this will need review + int encryptionLength = m_encryptCipher.GetOutputSize(plaintext.Length + extraLength); + int ciphertextLength = m_record_iv_length + encryptionLength; + + byte[] output = new byte[headerAllocation + ciphertextLength]; + int outputPos = headerAllocation; + + if (m_record_iv_length != 0) + { + Array.Copy(nonce, nonce.Length - m_record_iv_length, output, outputPos, m_record_iv_length); + outputPos += m_record_iv_length; + } + + short recordType = m_isTlsV13 ? ContentType.application_data : contentType; + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintext.Length); + + try + { + plaintext.CopyTo(output.AsSpan(outputPos)); + if (m_isTlsV13) + { + output[outputPos + plaintext.Length] = (byte)contentType; + } + + m_encryptCipher.Init(nonce, m_macSize, additionalData); + outputPos += m_encryptCipher.DoFinal(output, outputPos, plaintext.Length + extraLength, output, + outputPos); + } + catch (IOException e) + { + throw e; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.internal_error, e); + } + + if (outputPos != output.Length) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + return new TlsEncodeResult(output, 0, output.Length, recordType); + } +#endif + + public TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int ciphertextOffset, int ciphertextLength) + { + if (GetPlaintextLimit(ciphertextLength) < 0) + throw new TlsFatalAlert(AlertDescription.decode_error); + + byte[] nonce = new byte[m_decryptNonce.Length + m_record_iv_length]; + + switch (m_nonceMode) + { + case NONCE_RFC5288: + Array.Copy(m_decryptNonce, 0, nonce, 0, m_decryptNonce.Length); + Array.Copy(ciphertext, ciphertextOffset, nonce, nonce.Length - m_record_iv_length, + m_record_iv_length); + break; + case NONCE_RFC7905: + TlsUtilities.WriteUint64(seqNo, nonce, nonce.Length - 8); + for (int i = 0; i < m_decryptNonce.Length; ++i) + { + nonce[i] ^= m_decryptNonce[i]; + } + break; + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + int encryptionOffset = ciphertextOffset + m_record_iv_length; + int encryptionLength = ciphertextLength - m_record_iv_length; + int plaintextLength = m_decryptCipher.GetOutputSize(encryptionLength); + + byte[] additionalData = GetAdditionalData(seqNo, recordType, recordVersion, ciphertextLength, + plaintextLength); + + int outputPos; + try + { + m_decryptCipher.Init(nonce, m_macSize, additionalData); + outputPos = m_decryptCipher.DoFinal(ciphertext, encryptionOffset, encryptionLength, ciphertext, + encryptionOffset); + } + catch (IOException e) + { + throw; + } + catch (Exception e) + { + throw new TlsFatalAlert(AlertDescription.bad_record_mac, e); + } + + if (outputPos != plaintextLength) + { + // NOTE: The additional data mechanism for AEAD ciphers requires exact output size prediction. + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + short contentType = recordType; + if (m_isTlsV13) + { + // Strip padding and read true content type from TLSInnerPlaintext + int pos = plaintextLength; + for (; ; ) + { + if (--pos < 0) + throw new TlsFatalAlert(AlertDescription.unexpected_message); + + byte octet = ciphertext[encryptionOffset + pos]; + if (0 != octet) + { + contentType = (short)(octet & 0xFF); + plaintextLength = pos; + break; + } + } + } + + return new TlsDecodeResult(ciphertext, encryptionOffset, plaintextLength, contentType); + } + + public void RekeyDecoder() + { + RekeyCipher(m_cryptoParams.SecurityParameters, m_decryptCipher, m_decryptNonce, !m_cryptoParams.IsServer); + } + + public void RekeyEncoder() + { + RekeyCipher(m_cryptoParams.SecurityParameters, m_encryptCipher, m_encryptNonce, m_cryptoParams.IsServer); + } + + public bool UsesOpaqueRecordType + { + get { return m_isTlsV13; } + } + + private byte[] GetAdditionalData(long seqNo, short recordType, ProtocolVersion recordVersion, + int ciphertextLength, int plaintextLength) + { + if (m_isTlsV13) + { + /* + * TLSCiphertext.opaque_type || TLSCiphertext.legacy_record_version || TLSCiphertext.length + */ + byte[] additional_data = new byte[5]; + + TlsUtilities.WriteUint8(recordType, additional_data, 0); + TlsUtilities.WriteVersion(recordVersion, additional_data, 1); + TlsUtilities.WriteUint16(ciphertextLength, additional_data, 3); + return additional_data; + } + else + { + /* + * seq_num + TLSCompressed.type + TLSCompressed.version + TLSCompressed.length + */ + byte[] additional_data = new byte[13]; + + TlsUtilities.WriteUint64(seqNo, additional_data, 0); + TlsUtilities.WriteUint8(recordType, additional_data, 8); + TlsUtilities.WriteVersion(recordVersion, additional_data, 9); + TlsUtilities.WriteUint16(plaintextLength, additional_data, 11); + return additional_data; + } + } + + private void RekeyCipher(SecurityParameters securityParameters, TlsAeadCipherImpl cipher, + byte[] nonce, bool serverSecret) + { + if (!m_isTlsV13) + throw new TlsFatalAlert(AlertDescription.internal_error); + + TlsSecret secret = serverSecret + ? securityParameters.TrafficSecretServer + : securityParameters.TrafficSecretClient; + + // TODO[tls13] For early data, have to disable server->client + if (null == secret) + throw new TlsFatalAlert(AlertDescription.internal_error); + + Setup13Cipher(cipher, nonce, secret, securityParameters.PrfCryptoHashAlgorithm); + } + + private void Setup13Cipher(TlsAeadCipherImpl cipher, byte[] nonce, TlsSecret secret, + int cryptoHashAlgorithm) + { + byte[] key = TlsCryptoUtilities.HkdfExpandLabel(secret, cryptoHashAlgorithm, "key", + TlsUtilities.EmptyBytes, m_keySize).Extract(); + byte[] iv = TlsCryptoUtilities.HkdfExpandLabel(secret, cryptoHashAlgorithm, "iv", TlsUtilities.EmptyBytes, + m_fixed_iv_length).Extract(); + + cipher.SetKey(key, 0, m_keySize); + Array.Copy(iv, 0, nonce, 0, m_fixed_iv_length); + + // NOTE: Ensure dummy nonce is not part of the generated sequence(s) + iv[0] ^= 0x80; + cipher.Init(iv, m_macSize, null); + } + + private static int GetNonceMode(bool isTLSv13, int aeadType) + { + switch (aeadType) + { + case AEAD_CCM: + case AEAD_GCM: + return isTLSv13 ? NONCE_RFC7905 : NONCE_RFC5288; + + case AEAD_CHACHA20_POLY1305: + return NONCE_RFC7905; + + default: + throw new TlsFatalAlert(AlertDescription.internal_error); + } + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs.meta new file mode 100644 index 00000000..0208a066 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fb72cb7872bbf8d4eaedcc73542e949c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs new file mode 100644 index 00000000..6eefa97b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs @@ -0,0 +1,205 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + //public sealed class NoCopyKeyParameter + // : ICipherParameters + //{ + // private readonly byte[] key; + // + // public NoCopyKeyParameter(byte[] key) + // :this(key, 0, key.Length) + // { + // } + // + // public NoCopyKeyParameter( + // byte[] key, + // int keyOff, + // int keyLen) + // { + // if (key == null) + // throw new ArgumentNullException("key"); + // if (keyOff < 0 || keyOff > key.Length) + // throw new ArgumentOutOfRangeException("keyOff"); + // if (keyLen < 0 || keyLen > (key.Length - keyOff)) + // throw new ArgumentOutOfRangeException("keyLen"); + // + // this.key = new byte[keyLen]; + // Array.Copy(key, keyOff, this.key, 0, keyLen); + // } + // + // public byte[] GetKey() + // { + // return key;// (byte[])key.Clone(); + // } + //} + // + //public sealed class FastAeadParameters + // : ICipherParameters + //{ + // private readonly byte[] associatedText; + // private readonly byte[] nonce; + // private readonly NoCopyKeyParameter key; + // private readonly int macSize; + // + // /** + // * Base constructor. + // * + // * @param key key to be used by underlying cipher + // * @param macSize macSize in bits + // * @param nonce nonce to be used + // */ + // public FastAeadParameters(NoCopyKeyParameter key, int macSize, byte[] nonce) + // : this(key, macSize, nonce, null) + // { + // } + // + // /** + // * Base constructor. + // * + // * @param key key to be used by underlying cipher + // * @param macSize macSize in bits + // * @param nonce nonce to be used + // * @param associatedText associated text, if any + // */ + // public FastAeadParameters( + // NoCopyKeyParameter key, + // int macSize, + // byte[] nonce, + // byte[] associatedText) + // { + // this.key = key; + // this.nonce = nonce; + // this.macSize = macSize; + // this.associatedText = associatedText; + // } + // + // public NoCopyKeyParameter Key + // { + // get { return key; } + // } + // + // public int MacSize + // { + // get { return macSize; } + // } + // + // public byte[] GetAssociatedText() + // { + // return associatedText; + // } + // + // public byte[] GetNonce() + // { + // return nonce; + // } + //} + // + //public sealed class FastParametersWithIV + // : ICipherParameters + //{ + // private readonly ICipherParameters parameters; + // private readonly byte[] iv; + // + // public FastParametersWithIV(ICipherParameters parameters, + // byte[] iv) + // : this(parameters, iv, 0, iv.Length) + // { + // } + // + // public FastParametersWithIV(ICipherParameters parameters, + // byte[] iv, int ivOff, int ivLen) + // { + // // NOTE: 'parameters' may be null to imply key re-use + // if (iv == null) + // throw new ArgumentNullException("iv"); + // + // this.parameters = parameters; + // this.iv = Arrays.CopyOfRange(iv, ivOff, ivOff + ivLen); + // } + // + // public byte[] GetIV() + // { + // return iv; // (byte[])iv.Clone(); + // } + // + // public ICipherParameters Parameters + // { + // get { return parameters; } + // } + //} + + internal sealed class FastTlsAeadCipherImpl + : TlsAeadCipherImpl + { + private readonly bool m_isEncrypting; + private readonly IAeadCipher m_cipher; + + private KeyParameter key; + + internal FastTlsAeadCipherImpl(IAeadCipher cipher, bool isEncrypting) + { + this.m_cipher = cipher; + this.m_isEncrypting = isEncrypting; + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + this.key = new KeyParameter(key, keyOff, keyLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + this.key = new KeyParameter(key); + } +#endif + + public void Init(byte[] nonce, int macSize, byte[] additionalData) + { + m_cipher.Init(m_isEncrypting, new AeadParameters(key, macSize * 8, nonce, additionalData)); + } + + public int GetOutputSize(int inputLength) + { + return m_cipher.GetOutputSize(inputLength); + } + + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + int len = m_cipher.ProcessBytes(input.AsSpan(inputOffset, inputLength), Spans.FromNullable(output, outputOffset)); +#else + int len = m_cipher.ProcessBytes(input, inputOffset, inputLength, output, outputOffset); +#endif + + try + { + len += m_cipher.DoFinal(output, outputOffset + len); + } + catch (InvalidCipherTextException e) + { + throw new TlsFatalAlert(AlertDescription.bad_record_mac, e); + } + + return len; + } + + public void Reset() + { + m_cipher.Reset(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs.meta new file mode 100644 index 00000000..1acaf051 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 50d7ef438a18e3c4c92c635668c9ab85 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsAeadCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs new file mode 100644 index 00000000..68961e6e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs @@ -0,0 +1,535 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + /// A generic TLS 1.0-1.2 block cipher. This can be used for AES or 3DES for example. + public class FastTlsBlockCipher + : TlsCipher + { + protected readonly TlsCryptoParameters m_cryptoParams; + protected readonly byte[] m_randomData; + protected readonly bool m_encryptThenMac; + protected readonly bool m_useExplicitIV; + protected readonly bool m_acceptExtraPadding; + protected readonly bool m_useExtraPadding; + + protected readonly TlsBlockCipherImpl m_decryptCipher, m_encryptCipher; + protected readonly TlsSuiteMac m_readMac, m_writeMac; + + /// + public FastTlsBlockCipher(TlsCryptoParameters cryptoParams, TlsBlockCipherImpl encryptCipher, + TlsBlockCipherImpl decryptCipher, TlsHmac clientMac, TlsHmac serverMac, int cipherKeySize) + { + SecurityParameters securityParameters = cryptoParams.SecurityParameters; + ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion; + + if (TlsImplUtilities.IsTlsV13(negotiatedVersion)) + throw new TlsFatalAlert(AlertDescription.internal_error); + + this.m_cryptoParams = cryptoParams; + this.m_randomData = cryptoParams.NonceGenerator.GenerateNonce(256); + + this.m_encryptThenMac = securityParameters.IsEncryptThenMac; + this.m_useExplicitIV = TlsImplUtilities.IsTlsV11(negotiatedVersion); + + this.m_acceptExtraPadding = !negotiatedVersion.IsSsl; + + /* + * Don't use variable-length padding with truncated MACs. + * + * See "Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol", Paterson, + * Ristenpart, Shrimpton. + * + * TODO[DTLS] Consider supporting in DTLS (without exceeding send limit though) + */ + this.m_useExtraPadding = securityParameters.IsExtendedPadding + && ProtocolVersion.TLSv10.IsEqualOrEarlierVersionOf(negotiatedVersion) + && (m_encryptThenMac || !securityParameters.IsTruncatedHmac); + + this.m_encryptCipher = encryptCipher; + this.m_decryptCipher = decryptCipher; + + TlsBlockCipherImpl clientCipher, serverCipher; + if (cryptoParams.IsServer) + { + clientCipher = decryptCipher; + serverCipher = encryptCipher; + } + else + { + clientCipher = encryptCipher; + serverCipher = decryptCipher; + } + + int keyBlockSize = (2 * cipherKeySize) + clientMac.MacLength + serverMac.MacLength; + + // From TLS 1.1 onwards, block ciphers don't need IVs from the key_block + if (!m_useExplicitIV) + { + keyBlockSize += clientCipher.GetBlockSize() + serverCipher.GetBlockSize(); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + Span keyBlock = keyBlockSize <= 512 + ? stackalloc byte[keyBlockSize] + : new byte[keyBlockSize]; + TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlock); + + clientMac.SetKey(keyBlock[..clientMac.MacLength]); keyBlock = keyBlock[clientMac.MacLength..]; + serverMac.SetKey(keyBlock[..serverMac.MacLength]); keyBlock = keyBlock[serverMac.MacLength..]; + + clientCipher.SetKey(keyBlock[..cipherKeySize]); keyBlock = keyBlock[cipherKeySize..]; + serverCipher.SetKey(keyBlock[..cipherKeySize]); keyBlock = keyBlock[cipherKeySize..]; + + int clientIVLength = clientCipher.GetBlockSize(); + int serverIVLength = serverCipher.GetBlockSize(); + + if (m_useExplicitIV) + { + clientCipher.Init(clientIVLength <= 64 ? stackalloc byte[clientIVLength] : new byte[clientIVLength]); + serverCipher.Init(serverIVLength <= 64 ? stackalloc byte[serverIVLength] : new byte[serverIVLength]); + } + else + { + clientCipher.Init(keyBlock[..clientIVLength]); keyBlock = keyBlock[clientIVLength..]; + serverCipher.Init(keyBlock[..serverIVLength]); keyBlock = keyBlock[serverIVLength..]; + } + + if (!keyBlock.IsEmpty) + throw new TlsFatalAlert(AlertDescription.internal_error); +#else + byte[] keyBlock = TlsImplUtilities.CalculateKeyBlock(cryptoParams, keyBlockSize); + int pos = 0; + + clientMac.SetKey(keyBlock, pos, clientMac.MacLength); + pos += clientMac.MacLength; + serverMac.SetKey(keyBlock, pos, serverMac.MacLength); + pos += serverMac.MacLength; + + clientCipher.SetKey(keyBlock, pos, cipherKeySize); + pos += cipherKeySize; + serverCipher.SetKey(keyBlock, pos, cipherKeySize); + pos += cipherKeySize; + + int clientIVLength = clientCipher.GetBlockSize(); + int serverIVLength = serverCipher.GetBlockSize(); + + if (m_useExplicitIV) + { + clientCipher.Init(new byte[clientIVLength], 0, clientIVLength); + serverCipher.Init(new byte[serverIVLength], 0, serverIVLength); + } + else + { + clientCipher.Init(keyBlock, pos, clientIVLength); + pos += clientIVLength; + serverCipher.Init(keyBlock, pos, serverIVLength); + pos += serverIVLength; + } + + if (pos != keyBlockSize) + throw new TlsFatalAlert(AlertDescription.internal_error); +#endif + + if (cryptoParams.IsServer) + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, serverMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, clientMac); + } + else + { + this.m_writeMac = new TlsSuiteHmac(cryptoParams, clientMac); + this.m_readMac = new TlsSuiteHmac(cryptoParams, serverMac); + } + } + + public virtual int GetCiphertextDecodeLimit(int plaintextLimit) + { + int blockSize = m_decryptCipher.GetBlockSize(); + int macSize = m_readMac.Size; + int maxPadding = 256; + + return GetCiphertextLength(blockSize, macSize, maxPadding, plaintextLimit); + } + + public virtual int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + int maxPadding = m_useExtraPadding ? 256 : blockSize; + + return GetCiphertextLength(blockSize, macSize, maxPadding, plaintextLength); + } + + public virtual int GetPlaintextLimit(int ciphertextLimit) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int plaintextLimit = ciphertextLimit; + + // Leave room for the MAC, and require block-alignment + if (m_encryptThenMac) + { + plaintextLimit -= macSize; + plaintextLimit -= plaintextLimit % blockSize; + } + else + { + plaintextLimit -= plaintextLimit % blockSize; + plaintextLimit -= macSize; + } + + // Minimum 1 byte of padding + --plaintextLimit; + + // An explicit IV consumes 1 block + if (m_useExplicitIV) + { + plaintextLimit -= blockSize; + } + + return plaintextLimit; + } + + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, byte[] plaintext, int offset, int len) + { +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + return EncodePlaintext(seqNo, contentType, recordVersion, headerAllocation, plaintext.AsSpan(offset, len)); +#else + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int enc_input_length = len; + if (!m_encryptThenMac) + { + enc_input_length += macSize; + } + + int padding_length = blockSize - (enc_input_length % blockSize); + if (m_useExtraPadding) + { + // Add a random number of extra blocks worth of padding + int maxExtraPadBlocks = (256 - padding_length) / blockSize; + int actualExtraPadBlocks = ChooseExtraPadBlocks(maxExtraPadBlocks); + padding_length += actualExtraPadBlocks * blockSize; + } + + int totalSize = len + macSize + padding_length; + if (m_useExplicitIV) + { + totalSize += blockSize; + } + + byte[] outBuf = new byte[headerAllocation + totalSize]; + int outOff = headerAllocation; + + if (m_useExplicitIV) + { + // Technically the explicit IV will be the encryption of this nonce + byte[] explicitIV = m_cryptoParams.NonceGenerator.GenerateNonce(blockSize); + Array.Copy(explicitIV, 0, outBuf, outOff, blockSize); + outOff += blockSize; + } + + Array.Copy(plaintext, offset, outBuf, outOff, len); + outOff += len; + + if (!m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext, offset, len); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + byte padByte = (byte)(padding_length - 1); + for (int i = 0; i < padding_length; ++i) + { + outBuf[outOff++] = padByte; + } + + m_encryptCipher.DoFinal(outBuf, headerAllocation, outOff - headerAllocation, outBuf, headerAllocation); + + if (m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, outBuf, headerAllocation, + outOff - headerAllocation); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + if (outOff != outBuf.Length) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return new TlsEncodeResult(outBuf, 0, outBuf.Length, contentType); +#endif + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, + int headerAllocation, ReadOnlySpan plaintext) + { + int blockSize = m_encryptCipher.GetBlockSize(); + int macSize = m_writeMac.Size; + + int enc_input_length = plaintext.Length; + if (!m_encryptThenMac) + { + enc_input_length += macSize; + } + + int padding_length = blockSize - (enc_input_length % blockSize); + if (m_useExtraPadding) + { + // Add a random number of extra blocks worth of padding + int maxExtraPadBlocks = (256 - padding_length) / blockSize; + int actualExtraPadBlocks = ChooseExtraPadBlocks(maxExtraPadBlocks); + padding_length += actualExtraPadBlocks * blockSize; + } + + int totalSize = plaintext.Length + macSize + padding_length; + if (m_useExplicitIV) + { + totalSize += blockSize; + } + + byte[] outBuf = new byte[headerAllocation + totalSize]; + int outOff = headerAllocation; + + if (m_useExplicitIV) + { + // Technically the explicit IV will be the encryption of this nonce + byte[] explicitIV = m_cryptoParams.NonceGenerator.GenerateNonce(blockSize); + Array.Copy(explicitIV, 0, outBuf, outOff, blockSize); + outOff += blockSize; + } + + plaintext.CopyTo(outBuf.AsSpan(outOff)); + outOff += plaintext.Length; + + if (!m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext); + mac.CopyTo(outBuf.AsSpan(outOff)); + outOff += mac.Length; + } + + byte padByte = (byte)(padding_length - 1); + for (int i = 0; i < padding_length; ++i) + { + outBuf[outOff++] = padByte; + } + + m_encryptCipher.DoFinal(outBuf, headerAllocation, outOff - headerAllocation, outBuf, headerAllocation); + + if (m_encryptThenMac) + { + byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, outBuf, headerAllocation, + outOff - headerAllocation); + Array.Copy(mac, 0, outBuf, outOff, mac.Length); + outOff += mac.Length; + } + + if (outOff != outBuf.Length) + throw new TlsFatalAlert(AlertDescription.internal_error); + + return new TlsEncodeResult(outBuf, 0, outBuf.Length, contentType); + } +#endif + + public virtual TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, + byte[] ciphertext, int offset, int len) + { + int blockSize = m_decryptCipher.GetBlockSize(); + int macSize = m_readMac.Size; + + int minLen = blockSize; + if (m_encryptThenMac) + { + minLen += macSize; + } + else + { + minLen = System.Math.Max(minLen, macSize + 1); + } + + if (m_useExplicitIV) + { + minLen += blockSize; + } + + if (len < minLen) + throw new TlsFatalAlert(AlertDescription.decode_error); + + int blocks_length = len; + if (m_encryptThenMac) + { + blocks_length -= macSize; + } + + if (blocks_length % blockSize != 0) + throw new TlsFatalAlert(AlertDescription.decryption_failed); + + if (m_encryptThenMac) + { + byte[] expectedMac = m_readMac.CalculateMac(seqNo, recordType, ciphertext, offset, len - macSize); + + bool checkMac = TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, + offset + len - macSize); + if (!checkMac) + { + /* + * RFC 7366 3. The MAC SHALL be evaluated before any further processing such as + * decryption is performed, and if the MAC verification fails, then processing SHALL + * terminate immediately. For TLS, a fatal bad_record_mac MUST be generated [2]. For + * DTLS, the record MUST be discarded, and a fatal bad_record_mac MAY be generated + * [4]. This immediate response to a bad MAC eliminates any timing channels that may + * be available through the use of manipulated packet data. + */ + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + } + } + + m_decryptCipher.DoFinal(ciphertext, offset, blocks_length, ciphertext, offset); + + if (m_useExplicitIV) + { + offset += blockSize; + blocks_length -= blockSize; + } + + // If there's anything wrong with the padding, this will return zero + int totalPad = CheckPaddingConstantTime(ciphertext, offset, blocks_length, blockSize, + m_encryptThenMac ? 0 : macSize); + bool badMac = (totalPad == 0); + + int dec_output_length = blocks_length - totalPad; + + if (!m_encryptThenMac) + { + dec_output_length -= macSize; + + byte[] expectedMac = m_readMac.CalculateMacConstantTime(seqNo, recordType, ciphertext, offset, + dec_output_length, blocks_length - macSize, m_randomData); + + badMac |= !TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, + offset + dec_output_length); + } + + if (badMac) + throw new TlsFatalAlert(AlertDescription.bad_record_mac); + + return new TlsDecodeResult(ciphertext, offset, dec_output_length, recordType); + } + + public virtual void RekeyDecoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual void RekeyEncoder() + { + throw new TlsFatalAlert(AlertDescription.internal_error); + } + + public virtual bool UsesOpaqueRecordType + { + get { return false; } + } + + protected virtual int CheckPaddingConstantTime(byte[] buf, int off, int len, int blockSize, int macSize) + { + int end = off + len; + byte lastByte = buf[end - 1]; + int padlen = lastByte & 0xff; + int totalPad = padlen + 1; + + int dummyIndex = 0; + byte padDiff = 0; + + int totalPadLimit = System.Math.Min(m_acceptExtraPadding ? 256 : blockSize, len - macSize); + + if (totalPad > totalPadLimit) + { + totalPad = 0; + } + else + { + int padPos = end - totalPad; + do + { + padDiff |= (byte)(buf[padPos++] ^ lastByte); + } + while (padPos < end); + + dummyIndex = totalPad; + + if (padDiff != 0) + { + totalPad = 0; + } + } + + // Run some extra dummy checks so the number of checks is always constant + { + byte[] dummyPad = m_randomData; + while (dummyIndex < 256) + { + padDiff |= (byte)(dummyPad[dummyIndex++] ^ lastByte); + } + // Ensure the above loop is not eliminated + dummyPad[0] ^= padDiff; + } + + return totalPad; + } + + protected virtual int ChooseExtraPadBlocks(int max) + { + byte[] random = m_cryptoParams.NonceGenerator.GenerateNonce(4); + int x = (int)Pack.LE_To_UInt32(random, 0); + int n = Integers.NumberOfTrailingZeros(x); + return System.Math.Min(n, max); + } + + protected virtual int GetCiphertextLength(int blockSize, int macSize, int maxPadding, int plaintextLength) + { + int ciphertextLength = plaintextLength; + + // An explicit IV consumes 1 block + if (m_useExplicitIV) + { + ciphertextLength += blockSize; + } + + // Leave room for the MAC and (block-aligning) padding + + ciphertextLength += maxPadding; + + if (m_encryptThenMac) + { + ciphertextLength -= (ciphertextLength % blockSize); + ciphertextLength += macSize; + } + else + { + ciphertextLength += macSize; + ciphertextLength -= (ciphertextLength % blockSize); + } + + return ciphertextLength; + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs.meta new file mode 100644 index 00000000..a627214d --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 542cbc0c75180ff418b406edfa325e23 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipher.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs new file mode 100644 index 00000000..ede5bf32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs @@ -0,0 +1,68 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +#pragma warning disable +using System; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; + +namespace Best.HTTP.Shared.TLS.Crypto.Impl +{ + internal sealed class FastTlsBlockCipherImpl + : TlsBlockCipherImpl + { + private readonly bool m_isEncrypting; + private readonly IBlockCipher m_cipher; + + private KeyParameter key; + + internal FastTlsBlockCipherImpl(IBlockCipher cipher, bool isEncrypting) + { + this.m_cipher = cipher; + this.m_isEncrypting = isEncrypting; + } + + public void SetKey(byte[] key, int keyOff, int keyLen) + { + this.key = new KeyParameter(key, keyOff, keyLen); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void SetKey(ReadOnlySpan key) + { + this.key = new KeyParameter(key); + } +#endif + + public void Init(byte[] iv, int ivOff, int ivLen) + { + m_cipher.Init(m_isEncrypting, new ParametersWithIV(key, iv, ivOff, ivLen)); + } + +#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER + public void Init(ReadOnlySpan iv) + { + m_cipher.Init(m_isEncrypting, new ParametersWithIV(key, iv)); + } +#endif + + public int DoFinal(byte[] input, int inputOffset, int inputLength, byte[] output, int outputOffset) + { + int blockSize = m_cipher.GetBlockSize(); + + for (int i = 0; i < inputLength; i += blockSize) + { + m_cipher.ProcessBlock(input, inputOffset + i, output, outputOffset + i); + } + + return inputLength; + } + + public int GetBlockSize() + { + return m_cipher.GetBlockSize(); + } + } +} +#pragma warning restore +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs.meta new file mode 100644 index 00000000..8bcd3992 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 33fa47fa3eb3dfb46985a592fcfc4575 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/Crypto/Impl/FastTlsBlockCipherImpl.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs new file mode 100644 index 00000000..b6bdc1c8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs @@ -0,0 +1,20 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared.TLS.Crypto; +using Best.HTTP.Shared.Logger; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; + +namespace Best.HTTP.Shared.TLS +{ + public class DefaultTls13Client : AbstractTls13Client + { + public DefaultTls13Client(List sniServerNames, List protocols, LoggingContext context) + : base(sniServerNames, protocols, new FastTlsCrypto(new SecureRandom()), context) + { + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs.meta new file mode 100644 index 00000000..983e8a1e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 80872f9ea3d55414487509186036e724 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/DefaultTls13Client.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs new file mode 100644 index 00000000..2791b16e --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs @@ -0,0 +1,75 @@ +#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) +using System; +using System.Diagnostics; +using System.IO; + +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl; +using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders; + +// https://www.m00nie.com/2015/05/decrypt-https-ssltls-with-wireshark/ +// https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format +// https://github.com/bcgit/bc-csharp/issues/343 + +namespace Best.HTTP.Shared.TLS +{ + /// + /// https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format + /// + internal enum Labels + { + CLIENT_RANDOM, + CLIENT_EARLY_TRAFFIC_SECRET, + CLIENT_HANDSHAKE_TRAFFIC_SECRET, + SERVER_HANDSHAKE_TRAFFIC_SECRET, + CLIENT_TRAFFIC_SECRET_0, + SERVER_TRAFFIC_SECRET_0, + EARLY_EXPORTER_SECRET, + EXPORTER_SECRET + } + + internal static class KeyLogFileWriter + { + private static string GetKeylogFileName() => Environment.GetEnvironmentVariable("SSLKEYLOGFILE", EnvironmentVariableTarget.User); + + [Conditional("UNITY_EDITOR")] + public static void WriteLabel(Labels label, byte[] clientRandom, TlsSecret secret) + { + if (clientRandom != null && secret != null) + { + string SSLKEYLOGFILE = GetKeylogFileName(); + if (!string.IsNullOrEmpty(SSLKEYLOGFILE)) + using (var writer = new StreamWriter(System.IO.File.Open(SSLKEYLOGFILE, FileMode.Append, FileAccess.Write, FileShare.ReadWrite))) + writer.WriteLine($"{label} {Hex.ToHexString(clientRandom)} {Hex.ToHexString((secret as AbstractTlsSecret).CopyData())}"); + } + } + + [Conditional("UNITY_EDITOR")] + public static void WriteLabel(Labels label, SecurityParameters securityParameters) + { + try + { + TlsSecret secret = null; + switch (label) + { + case Labels.CLIENT_RANDOM: secret = securityParameters.MasterSecret; break; + case Labels.CLIENT_HANDSHAKE_TRAFFIC_SECRET: secret = securityParameters.TrafficSecretClient; break; + case Labels.SERVER_HANDSHAKE_TRAFFIC_SECRET: secret = securityParameters.TrafficSecretServer; break; + case Labels.CLIENT_TRAFFIC_SECRET_0: secret = securityParameters.TrafficSecretClient; break; + case Labels.SERVER_TRAFFIC_SECRET_0: secret = securityParameters.TrafficSecretServer; break; + case Labels.EXPORTER_SECRET: secret = securityParameters.ExporterMasterSecret; break; + + case Labels.CLIENT_EARLY_TRAFFIC_SECRET: break; + case Labels.EARLY_EXPORTER_SECRET: break; + } + + if (secret != null) + WriteLabel(label, securityParameters.ClientRandom, secret); + } + catch + { } + } + } +} +#endif diff --git a/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs.meta b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs.meta new file mode 100644 index 00000000..65d5745b --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d7c35f7c68b4dc469c63a5a61895bd9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/Shared/TLS/KeyLogFileWriter.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef b/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef new file mode 100644 index 00000000..7eb4ec68 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef @@ -0,0 +1,34 @@ +{ + "name": "com.Tivadar.Best.HTTP", + "rootNamespace": "Best.HTTP", + "references": [ + "Unity.Burst", + "Unity.Profiling.Core", + "UniTask" + ], + "includePlatforms": [], + "excludePlatforms": [], + "allowUnsafeCode": true, + "overrideReferences": false, + "precompiledReferences": [], + "autoReferenced": true, + "defineConstraints": [], + "versionDefines": [ + { + "name": "com.unity.burst", + "expression": "1.8.7", + "define": "BESTHTTP_WITH_BURST" + }, + { + "name": "com.unity.profiling.core", + "expression": "1.0.0", + "define": "BESTHTTP_PROFILE" + }, + { + "name": "com.cysharp.unitask", + "expression": "1.0.0", + "define": "WITH_UNITASK" + } + ], + "noEngineReferences": false +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef.meta b/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef.meta new file mode 100644 index 00000000..1c0f7bfe --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 9069ac25d95ca17448a247f3bb1c769f +AssemblyDefinitionImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/com.Tivadar.Best.HTTP.asmdef + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Runtime/csc.rsp b/Packages/com.tivadar.best.http/Runtime/csc.rsp new file mode 100644 index 00000000..ebd6cb44 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/csc.rsp @@ -0,0 +1,5 @@ +#https://forum.unity.com/threads/rsp-file-per-assembly-or-folder.572758/ + +#https://learn.microsoft.com/en-us/dotnet/csharp/language-reference/compiler-options/errors-warnings +-warnaserror +-nowarn:CS1701,CS0612,CS1591,CS1571,CS1572,CS1573,CS1574,CS1587 diff --git a/Packages/com.tivadar.best.http/Runtime/csc.rsp.meta b/Packages/com.tivadar.best.http/Runtime/csc.rsp.meta new file mode 100644 index 00000000..d03a0805 --- /dev/null +++ b/Packages/com.tivadar.best.http/Runtime/csc.rsp.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 87667f1a224126445a2608de455c886f +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Runtime/csc.rsp + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI.meta b/Packages/com.tivadar.best.http/Samples~/With UI.meta new file mode 100644 index 00000000..0ebfa6fd --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: c032d96c4dd7efe47a52cade563a0122 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs new file mode 100644 index 00000000..692172ac --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs @@ -0,0 +1,136 @@ +using System.Collections; +using System.Text; + +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Response; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + /// + /// Example showing the usage of download streaming using the DownloadContentStream class. + /// In this example content processing is done on the Unity main thread wrapped in a coroutine. + /// + class DownStreamSample : SampleBase + { +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with a Text field. + /// + [SerializeField] + private TextListItem _listItemPrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// + private string _baseAddress = "https://besthttpwebgldemo.azurewebsites.net/sse"; + + /// + /// Cached reference to the HTTPRequest instance. + /// + private HTTPRequest _request; + + protected override void Start() + { + base.Start(); + + // Create a regular get request with a regular callback too. We still need a callback, + // because it might encounter an error before able to start a download. + _request = HTTPRequest.CreateGet(this._baseAddress, OnRequestFinishedCallack); + + // Request a notification when download starts. This callback will be fired when + // the status code suggests that we can expect actual content (2xx status codes). + _request.DownloadSettings.OnDownloadStarted += OnDownloadStarted; + + // Don't want to retry when there's a failure + _request.RetrySettings.MaxRetries = 0; + + // Start processing the request + _request.Send(); + + AddUIText("Connecting..."); + } + + private void OnDownloadStarted(HTTPRequest req, HTTPResponse resp, DownloadContentStream stream) + { + AddUIText("Download started!"); + + // We can expect content from the server, start our logic. + StartCoroutine(ParseContent(stream)); + } + + IEnumerator ParseContent(DownloadContentStream stream) + { + try + { + while (!stream.IsCompleted) + { + // Try to take out a download segment from the Download Stream. + if (stream.TryTake(out var buffer)) + { + // Make sure that the buffer is released back to the BufferPool. + using var _ = buffer.AsAutoRelease(); + + try + { + // Try to create a string from the downloaded content + var str = Encoding.UTF8.GetString(buffer.Data, buffer.Offset, buffer.Count).TrimEnd(); + + // And display it in the UI + AddUIText(str); + } + catch { } + } + + yield return null; + } + } + finally + { + // Don't forget to Dispose the stream! + stream.Dispose(); + } + } + + private void OnRequestFinishedCallack(HTTPRequest req, HTTPResponse resp) + { + if (_request == null) + return; + + string log = null; + + if (req.State == HTTPRequestStates.Finished) + { + if (!resp.IsSuccess) + log = resp.StatusCode.ToString(); + } + else + log = req.State.ToString(); + + AddUIText(log); + + _request = null; + } + + private void OnDestroy() + { + _request?.Abort(); + _request = null; + } + + void AddUIText(string text) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(text); + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs.meta new file mode 100644 index 00000000..7e6d3654 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 80dd61b9a62aece4ca0210821aa522b0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab new file mode 100644 index 00000000..cd496edf --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab @@ -0,0 +1,808 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &36352117935193382 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4396972651352598648} + - component: {fileID: 270873996270169637} + - component: {fileID: 8284655380431097187} + - component: {fileID: 4359290172788800828} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4396972651352598648 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 7087416228263299688} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &270873996270169637 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_CullTransparentMesh: 1 +--- !u!114 &8284655380431097187 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4359290172788800828 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 7037635390745691320} + m_HandleRect: {fileID: 1464615813640470266} + m_Direction: 2 + m_Value: 1 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &1091216757308441365 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5913170455756152260} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5913170455756152260 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1091216757308441365} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6085207700209952606} + m_Father: {fileID: 5559688622360281168} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &1629493779330841688 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6085207700209952606} + - component: {fileID: 7341044911464647275} + - component: {fileID: 1744065735946856516} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6085207700209952606 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 5913170455756152260} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7341044911464647275 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_CullTransparentMesh: 1 +--- !u!114 &1744065735946856516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3267905047096051290 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4595210358100734365} + - component: {fileID: 289180774727518637} + m_Layer: 5 + m_Name: DownStreamSample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4595210358100734365 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3267905047096051290} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6126484256121979668} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &289180774727518637 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3267905047096051290} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 80dd61b9a62aece4ca0210821aa522b0, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Download With Coroutine + Description: How to set up a streamed request and use DownloadStream. + BannedPlatforms: 11000000 + _baseAddress: https://besthttpwebgldemo.azurewebsites.net/sse + _contentRoot: {fileID: 8523379654122209293} + _listItemPrefab: {fileID: 114144824129317776, guid: 46bdaff7a8bf5d34da870d286f962c69, type: 3} +--- !u!1 &5248282111890781722 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 454997158802710700} + - component: {fileID: 4407067977278244064} + - component: {fileID: 4878156809823290143} + - component: {fileID: 1553765130997653297} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &454997158802710700 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8523379654122209293} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &4407067977278244064 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_CullTransparentMesh: 1 +--- !u!114 &4878156809823290143 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &1553765130997653297 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 +--- !u!1 &5528412282700882182 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1464615813640470266} + - component: {fileID: 1344981959940883573} + - component: {fileID: 7037635390745691320} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1464615813640470266 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 7087416228263299688} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &1344981959940883573 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_CullTransparentMesh: 1 +--- !u!114 &7037635390745691320 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &6875425832134060244 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8523379654122209293} + - component: {fileID: 8467801820711524616} + - component: {fileID: 43314603465585937} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8523379654122209293 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 454997158802710700} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &8467801820711524616 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &43314603465585937 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7578253454181841833 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5559688622360281168} + - component: {fileID: 5107849480876256908} + - component: {fileID: 2541475870730941614} + - component: {fileID: 271683044073342512} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5559688622360281168 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5913170455756152260} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &5107849480876256908 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_CullTransparentMesh: 1 +--- !u!114 &2541475870730941614 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &271683044073342512 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 1744065735946856516} + m_HandleRect: {fileID: 6085207700209952606} + m_Direction: 0 + m_Value: 0.5 + m_Size: 0 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &8592849189624893854 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7087416228263299688} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7087416228263299688 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8592849189624893854} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1464615813640470266} + m_Father: {fileID: 4396972651352598648} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &9073439726997525922 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6126484256121979668} + - component: {fileID: 1714281319600597337} + - component: {fileID: 8339521616150788089} + - component: {fileID: 7069110676600869071} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6126484256121979668 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 454997158802710700} + - {fileID: 5559688622360281168} + - {fileID: 4396972651352598648} + m_Father: {fileID: 4595210358100734365} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &1714281319600597337 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_CullTransparentMesh: 1 +--- !u!114 &8339521616150788089 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7069110676600869071 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 8523379654122209293} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 454997158802710700} + m_HorizontalScrollbar: {fileID: 271683044073342512} + m_VerticalScrollbar: {fileID: 4359290172788800828} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab.meta new file mode 100644 index 00000000..7280dc84 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: ad299109dd240194aa3847479a80fe2a +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/DownStreamSample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs new file mode 100644 index 00000000..2a570e56 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs @@ -0,0 +1,182 @@ +using System.Threading.Tasks; + +using Best.HTTP.Caching; +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Response; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Compression.Crc; +using Best.HTTP.Shared.PlatformSupport.Memory; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + /// + /// Example showing the usage of download streaming using the DownloadContentStream class. + /// In this example content processing is done on a Thread to make it as fast as possible + /// without causing CPU spikes on the Unity main thread. + /// + class DownStreamWithThreadSample : SampleBase + { + /// + /// Precomputed and expected value of the content _baseAddress points to. + /// + const int EXPECTED_CRC = 0x4B282398; + +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with a Text field. + /// + [SerializeField] + private TextListItem _listItemPrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// + private string _baseAddress = "https://besthttpwebgldemo.azurewebsites.net/test100mb.dat"; + + /// + /// Cached reference to the HTTPRequest instance. + /// + private HTTPRequest _request; + + protected override void Start() + { + base.Start(); + + // Set a custom size to make sure the local cache will accept the downloaded file into its cache. + HTTPManager.LocalCache?.Dispose(); + HTTPManager.LocalCache = new HTTPCacheBuilder() + .WithOptions(new HTTPCacheOptionsBuilder() + .WithMaxCacheSize(128 * 1024 * 1024) + .Build()) + .Build(); + + + // Create a regular get request with a regular callback too. We still need a callback, + // because it might encounter an error before able to start a download. + _request = HTTPRequest.CreateGet(this._baseAddress, OnRequestFinishedCallack); + + // Request a notification when download starts + _request.DownloadSettings.OnDownloadStarted += OnDownloadStarted; + + // When needed, create a BlockingDownloadContentStream instead of the regular DownloadContentStream. + // BlockingDownloadContentStream's Take function will block until new data is available. + _request.DownloadSettings.DownloadStreamFactory = (req, resp, bufferAvailableHandler) + => new BlockingDownloadContentStream(resp, req.DownloadSettings.ContentStreamMaxBuffered, bufferAvailableHandler); + + _request.DownloadSettings.OnDownloadProgress += OnDownloadProgress; + + // Don't want to retry when there's a failure + _request.RetrySettings.MaxRetries = 0; + + // Start processing the request + _request.Send(); + + CreateUIText("Connecting..."); + } + + private void OnDownloadProgress(HTTPRequest req, long progress, long length) + { + var progressUIEntry = req.Tag as TextListItem; + if (progressUIEntry == null) + req.Tag = progressUIEntry = CreateUIText(string.Empty); + + progressUIEntry.SetText($"{progress:N0}/{length:N0}"); + } + + private async void OnDownloadStarted(HTTPRequest req, HTTPResponse resp, DownloadContentStream stream) + { + CreateUIText("Download started!"); + + // Task.Run will execute the ConsumeDownloadStream on a background thread. + // By using a thread we can offload the CPU intensive work and + // it's also desirable because it can block the executing thread if the stream is empty! + // Task returns with the calculated checksum. + var crc = await Task.Run(() => ConsumeDownloadStream(stream as BlockingDownloadContentStream)); + + CreateUIText($"CRC checksum calculation finished. Result: 0x{crc:X}, Expected: 0x{EXPECTED_CRC:X}"); + } + + int ConsumeDownloadStream(BlockingDownloadContentStream blockingStream) + { + var crc = new CRC32(); + + try + { + while (!blockingStream.IsCompleted) + { + // Take out a segment from the downloaded + if (blockingStream.TryTake(out var buffer)) + { + try + { + // In this case content processing is just calculating the CRC checksum of the data. + crc.SlurpBlock(buffer.Data, buffer.Offset, buffer.Count); + } + finally + { + BufferPool.Release(buffer); + } + } + } + } + finally + { + blockingStream.Dispose(); + } + + return crc.Crc32Result; + } + + private void OnRequestFinishedCallack(HTTPRequest req, HTTPResponse resp) + { + // If we leaved the sample, the _request is nulled out and we can ignore this callback. + if (_request == null) + return; + _request = null; + + string log = null; + + if (req.State == HTTPRequestStates.Finished) + { + if (resp.IsSuccess) + { + log = "Done! "; + + // If IsFromCache is true, the response is read from the local cache. + if (resp.IsFromCache) + log += "From Local Cache!"; + else + log += "Fresh From The Server"; + } + else + log = resp.StatusCode.ToString(); + } + else + log = req.State.ToString(); + + CreateUIText(log); + } + + private void OnDestroy() + { + _request?.Abort(); + _request = null; + } + + TextListItem CreateUIText(string text) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(text); + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs.meta new file mode 100644 index 00000000..8c550108 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1ff26cb1f3e46b941aa50f39b36ad28b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab new file mode 100644 index 00000000..f0f54424 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab @@ -0,0 +1,809 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &36352117935193382 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4396972651352598648} + - component: {fileID: 270873996270169637} + - component: {fileID: 8284655380431097187} + - component: {fileID: 4359290172788800828} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 0 +--- !u!224 &4396972651352598648 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 7087416228263299688} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &270873996270169637 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_CullTransparentMesh: 1 +--- !u!114 &8284655380431097187 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4359290172788800828 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 36352117935193382} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 7037635390745691320} + m_HandleRect: {fileID: 1464615813640470266} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &1091216757308441365 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5913170455756152260} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5913170455756152260 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1091216757308441365} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6085207700209952606} + m_Father: {fileID: 5559688622360281168} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &1629493779330841688 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6085207700209952606} + - component: {fileID: 7341044911464647275} + - component: {fileID: 1744065735946856516} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6085207700209952606 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 5913170455756152260} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7341044911464647275 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_CullTransparentMesh: 1 +--- !u!114 &1744065735946856516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1629493779330841688} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3267905047096051290 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4595210358100734365} + - component: {fileID: 289180774727518637} + m_Layer: 5 + m_Name: DownStreamWithThreadSample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4595210358100734365 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3267905047096051290} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6126484256121979668} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &289180774727518637 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3267905047096051290} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1ff26cb1f3e46b941aa50f39b36ad28b, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Download With Thread + Description: How to set up a streamed request and use DownloadStream with the help + of a Thread. + BannedPlatforms: 11000000 + _baseAddress: https://besthttpwebgldemo.azurewebsites.net/test100mb.dat + _contentRoot: {fileID: 8523379654122209293} + _listItemPrefab: {fileID: 114144824129317776, guid: 46bdaff7a8bf5d34da870d286f962c69, type: 3} +--- !u!1 &5248282111890781722 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 454997158802710700} + - component: {fileID: 4407067977278244064} + - component: {fileID: 4878156809823290143} + - component: {fileID: 1553765130997653297} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &454997158802710700 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8523379654122209293} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &4407067977278244064 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_CullTransparentMesh: 1 +--- !u!114 &4878156809823290143 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &1553765130997653297 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5248282111890781722} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 +--- !u!1 &5528412282700882182 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1464615813640470266} + - component: {fileID: 1344981959940883573} + - component: {fileID: 7037635390745691320} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1464615813640470266 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 7087416228263299688} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &1344981959940883573 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_CullTransparentMesh: 1 +--- !u!114 &7037635390745691320 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5528412282700882182} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &6875425832134060244 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8523379654122209293} + - component: {fileID: 8467801820711524616} + - component: {fileID: 43314603465585937} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8523379654122209293 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 454997158802710700} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &8467801820711524616 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &43314603465585937 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6875425832134060244} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7578253454181841833 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5559688622360281168} + - component: {fileID: 5107849480876256908} + - component: {fileID: 2541475870730941614} + - component: {fileID: 271683044073342512} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 0 +--- !u!224 &5559688622360281168 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5913170455756152260} + m_Father: {fileID: 6126484256121979668} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &5107849480876256908 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_CullTransparentMesh: 1 +--- !u!114 &2541475870730941614 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &271683044073342512 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7578253454181841833} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 1744065735946856516} + m_HandleRect: {fileID: 6085207700209952606} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &8592849189624893854 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7087416228263299688} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7087416228263299688 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8592849189624893854} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1464615813640470266} + m_Father: {fileID: 4396972651352598648} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &9073439726997525922 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6126484256121979668} + - component: {fileID: 1714281319600597337} + - component: {fileID: 8339521616150788089} + - component: {fileID: 7069110676600869071} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6126484256121979668 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 454997158802710700} + - {fileID: 5559688622360281168} + - {fileID: 4396972651352598648} + m_Father: {fileID: 4595210358100734365} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &1714281319600597337 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_CullTransparentMesh: 1 +--- !u!114 &8339521616150788089 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7069110676600869071 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9073439726997525922} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 8523379654122209293} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 454997158802710700} + m_HorizontalScrollbar: {fileID: 271683044073342512} + m_VerticalScrollbar: {fileID: 4359290172788800828} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab.meta new file mode 100644 index 00000000..0c201baf --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 4b47f6bb24cee3342808f28e1e5e5123 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/DownStreamWithThreadSample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity b/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity new file mode 100644 index 00000000..3e7a2270 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity @@ -0,0 +1,1523 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!29 &1 +OcclusionCullingSettings: + m_ObjectHideFlags: 0 + serializedVersion: 2 + m_OcclusionBakeSettings: + smallestOccluder: 5 + smallestHole: 0.25 + backfaceThreshold: 100 + m_SceneGUID: 00000000000000000000000000000000 + m_OcclusionCullingData: {fileID: 0} +--- !u!104 &2 +RenderSettings: + m_ObjectHideFlags: 0 + serializedVersion: 9 + m_Fog: 0 + m_FogColor: {r: 0.5, g: 0.5, b: 0.5, a: 1} + m_FogMode: 3 + m_FogDensity: 0.01 + m_LinearFogStart: 0 + m_LinearFogEnd: 300 + m_AmbientSkyColor: {r: 0.212, g: 0.227, b: 0.259, a: 1} + m_AmbientEquatorColor: {r: 0.114, g: 0.125, b: 0.133, a: 1} + m_AmbientGroundColor: {r: 0.047, g: 0.043, b: 0.035, a: 1} + m_AmbientIntensity: 1 + m_AmbientMode: 0 + m_SubtractiveShadowColor: {r: 0.42, g: 0.478, b: 0.627, a: 1} + m_SkyboxMaterial: {fileID: 10304, guid: 0000000000000000f000000000000000, type: 0} + m_HaloStrength: 0.5 + m_FlareStrength: 1 + m_FlareFadeSpeed: 3 + m_HaloTexture: {fileID: 0} + m_SpotCookie: {fileID: 10001, guid: 0000000000000000e000000000000000, type: 0} + m_DefaultReflectionMode: 0 + m_DefaultReflectionResolution: 128 + m_ReflectionBounces: 1 + m_ReflectionIntensity: 1 + m_CustomReflection: {fileID: 0} + m_Sun: {fileID: 0} + m_IndirectSpecularColor: {r: 0.12731713, g: 0.13414736, b: 0.12107852, a: 1} + m_UseRadianceAmbientProbe: 0 +--- !u!157 &3 +LightmapSettings: + m_ObjectHideFlags: 0 + serializedVersion: 12 + m_GIWorkflowMode: 1 + m_GISettings: + serializedVersion: 2 + m_BounceScale: 1 + m_IndirectOutputScale: 1 + m_AlbedoBoost: 1 + m_EnvironmentLightingMode: 0 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 1 + m_LightmapEditorSettings: + serializedVersion: 12 + m_Resolution: 2 + m_BakeResolution: 40 + m_AtlasSize: 1024 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAmbientOcclusion: 0 + m_Padding: 2 + m_LightmapParameters: {fileID: 0} + m_LightmapsBakeMode: 1 + m_TextureCompression: 1 + m_FinalGather: 0 + m_FinalGatherFiltering: 1 + m_FinalGatherRayCount: 256 + m_ReflectionCompression: 2 + m_MixedBakeMode: 2 + m_BakeBackend: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVRBounces: 2 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_PVRFilteringMode: 2 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVREnvironmentMIS: 0 + m_PVRCulling: 1 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_LightProbeSampleCountMultiplier: 4 + m_LightingDataAsset: {fileID: 0} + m_LightingSettings: {fileID: 1288782297} +--- !u!196 &4 +NavMeshSettings: + serializedVersion: 2 + m_ObjectHideFlags: 0 + m_BuildSettings: + serializedVersion: 3 + agentTypeID: 0 + agentRadius: 0.5 + agentHeight: 2 + agentSlope: 45 + agentClimb: 0.4 + ledgeDropHeight: 0 + maxJumpAcrossDistance: 0 + minRegionArea: 2 + manualCellSize: 0 + cellSize: 0.16666667 + manualTileSize: 0 + tileSize: 256 + buildHeightMesh: 0 + maxJobWorkers: 0 + preserveTilesOutsideBounds: 0 + debug: + m_Flags: 0 + m_NavMeshData: {fileID: 0} +--- !u!1 &123556534 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 123556535} + - component: {fileID: 123556537} + - component: {fileID: 123556536} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &123556535 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 123556534} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 1983980535} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &123556536 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 123556534} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &123556537 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 123556534} + m_CullTransparentMesh: 0 +--- !u!1 &281814071 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 281814072} + - component: {fileID: 281814074} + - component: {fileID: 281814073} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &281814072 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 281814071} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 826516845} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &281814073 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 281814071} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &281814074 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 281814071} + m_CullTransparentMesh: 0 +--- !u!1 &619617589 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 619617592} + - component: {fileID: 619617591} + m_Layer: 0 + m_Name: Main Camera + m_TagString: MainCamera + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!20 &619617591 +Camera: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 619617589} + m_Enabled: 1 + serializedVersion: 2 + m_ClearFlags: 2 + m_BackGroundColor: {r: 0.5943396, g: 0.4121917, b: 0.3448291, a: 0} + m_projectionMatrixMode: 1 + m_GateFitMode: 2 + m_FOVAxisMode: 0 + m_Iso: 200 + m_ShutterSpeed: 0.005 + m_Aperture: 16 + m_FocusDistance: 10 + m_FocalLength: 50 + m_BladeCount: 5 + m_Curvature: {x: 2, y: 11} + m_BarrelClipping: 0.25 + m_Anamorphism: 0 + m_SensorSize: {x: 36, y: 24} + m_LensShift: {x: 0, y: 0} + m_NormalizedViewPortRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 + near clip plane: 0.3 + far clip plane: 1000 + field of view: 60 + orthographic: 0 + orthographic size: 5 + m_Depth: -1 + m_CullingMask: + serializedVersion: 2 + m_Bits: 4294967295 + m_RenderingPath: -1 + m_TargetTexture: {fileID: 0} + m_TargetDisplay: 0 + m_TargetEye: 3 + m_HDR: 1 + m_AllowMSAA: 1 + m_AllowDynamicResolution: 0 + m_ForceIntoRT: 0 + m_OcclusionCulling: 1 + m_StereoConvergence: 10 + m_StereoSeparation: 0.022 +--- !u!4 &619617592 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 619617589} + serializedVersion: 2 + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 1, z: -10} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!1 &675661191 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 675661192} + - component: {fileID: 675661194} + - component: {fileID: 675661193} + m_Layer: 5 + m_Name: List Root + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &675661192 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 675661191} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 1163983580} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: -0.0000038146973} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &675661193 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 675661191} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!114 &675661194 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 675661191} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 5 + m_Top: 5 + m_Bottom: 5 + m_ChildAlignment: 0 + m_Spacing: 5 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 0 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &826516844 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 826516845} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &826516845 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 826516844} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 281814072} + m_Father: {fileID: 1792220205} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &985743122 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 985743123} + - component: {fileID: 985743127} + - component: {fileID: 985743126} + - component: {fileID: 985743125} + - component: {fileID: 985743124} + m_Layer: 5 + m_Name: Samples Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &985743123 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 985743122} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1163983580} + - {fileID: 1510314136} + - {fileID: 1792220205} + m_Father: {fileID: 1287029238} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &985743124 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 985743122} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: 200 + m_MinHeight: -1 + m_PreferredWidth: 200 + m_PreferredHeight: -1 + m_FlexibleWidth: -1 + m_FlexibleHeight: 1 + m_LayoutPriority: 1 +--- !u!114 &985743125 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 985743122} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &985743126 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 985743122} + m_CullTransparentMesh: 0 +--- !u!114 &985743127 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 985743122} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 675661192} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 2 + m_Elasticity: 0.1 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 1163983580} + m_HorizontalScrollbar: {fileID: 1510314137} + m_VerticalScrollbar: {fileID: 1792220206} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &1125716475 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1125716479} + - component: {fileID: 1125716478} + - component: {fileID: 1125716481} + - component: {fileID: 1125716480} + - component: {fileID: 1125716477} + - component: {fileID: 1125716482} + m_Layer: 5 + m_Name: SampleRoot + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &1125716477 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 0 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!223 &1125716478 +Canvas: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_Enabled: 1 + serializedVersion: 3 + m_RenderMode: 0 + m_Camera: {fileID: 0} + m_PlaneDistance: 100 + m_PixelPerfect: 1 + m_ReceivesEvents: 1 + m_OverrideSorting: 0 + m_OverridePixelPerfect: 0 + m_SortingBucketNormalizedSize: 0 + m_VertexColorAlwaysGammaSpace: 0 + m_AdditionalShaderChannelsFlag: 0 + m_UpdateRectTransformForStandalone: 0 + m_SortingLayerID: 0 + m_SortingOrder: 0 + m_TargetDisplay: 0 +--- !u!224 &1125716479 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 0, y: 0, z: 0} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1287029238} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 0} +--- !u!114 &1125716480 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: dc42784cf147c0c48a680349fa168899, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreReversedGraphics: 1 + m_BlockingObjects: 0 + m_BlockingMask: + serializedVersion: 2 + m_Bits: 4294967295 +--- !u!114 &1125716481 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 0cd44c1031e13a943bb63640046fad76, type: 3} + m_Name: + m_EditorClassIdentifier: + m_UiScaleMode: 1 + m_ReferencePixelsPerUnit: 100 + m_ScaleFactor: 1 + m_ReferenceResolution: {x: 800, y: 600} + m_ScreenMatchMode: 0 + m_MatchWidthOrHeight: 0.5 + m_PhysicalUnit: 3 + m_FallbackScreenDPI: 96 + m_DefaultSpriteDPI: 96 + m_DynamicPixelsPerUnit: 1 + m_PresetInfoIsWorld: 0 +--- !u!114 &1125716482 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1125716475} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: bd639b2a784de314984c606b7e8329e4, type: 3} + m_Name: + m_EditorClassIdentifier: + BaseURL: https://besthttpwebgldemo.azurewebsites.net + selectedExamplePrefab: {fileID: 0} + _categoryListItemPrefab: {fileID: 114104161713339180, guid: fc69717198f6d93498890b7b67812172, type: 3} + _exampleListItemPrefab: {fileID: 114416681848148688, guid: 216b271b42611e447829c7e7de089ab4, type: 3} + _exampleInfoPrefab: {fileID: 114471653971156696, guid: d57a4ffd57493de4f9f41009f52c658e, type: 3} + _listRoot: {fileID: 675661192} + _dyncamicContentRoot: {fileID: 1222947057} + _samples: + - {fileID: 2555981889066209670, guid: 1d1ccc91162c91a4fb0759db80748a1c, type: 3} + - {fileID: 289180774727518637, guid: ad299109dd240194aa3847479a80fe2a, type: 3} + - {fileID: 289180774727518637, guid: 4b47f6bb24cee3342808f28e1e5e5123, type: 3} + - {fileID: 2555981889066209670, guid: c82742cf845b1344db1162ebdbd34f77, type: 3} + - {fileID: 2555981889066209670, guid: 75cb55a634eeead4798f701197067214, type: 3} + - {fileID: 2555981889066209670, guid: dd49ab0a27df8d246ab3cd4d6aae7de0, type: 3} + - {fileID: 2555981889066209670, guid: a943cc9c19496f043b5ddbc45147560a, type: 3} +--- !u!1 &1163983579 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1163983580} + - component: {fileID: 1163983583} + - component: {fileID: 1163983582} + - component: {fileID: 1163983581} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1163983580 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1163983579} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 675661192} + m_Father: {fileID: 985743123} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &1163983581 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1163983579} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &1163983582 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1163983579} + m_CullTransparentMesh: 0 +--- !u!114 &1163983583 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1163983579} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 +--- !u!1 &1222947056 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1222947057} + - component: {fileID: 1222947059} + - component: {fileID: 1222947058} + - component: {fileID: 1222947061} + - component: {fileID: 1222947060} + m_Layer: 5 + m_Name: Dynamic Content Root + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1222947057 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1222947056} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 1287029238} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &1222947058 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1222947056} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &1222947059 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1222947056} + m_CullTransparentMesh: 0 +--- !u!114 &1222947060 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1222947056} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: 3 + m_FlexibleHeight: 1 + m_LayoutPriority: 1 +--- !u!114 &1222947061 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1222947056} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &1287029237 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1287029238} + - component: {fileID: 1287029243} + - component: {fileID: 1287029242} + - component: {fileID: 1287029241} + - component: {fileID: 1287029240} + m_Layer: 5 + m_Name: Sample Selector + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1287029238 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1287029237} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 985743123} + - {fileID: 1222947057} + m_Father: {fileID: 1125716479} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &1287029240 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1287029237} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: -1 + m_FlexibleHeight: 1 + m_LayoutPriority: 1 +--- !u!114 &1287029241 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1287029237} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 30649d3a9faa99c48a7b1166b86bf2a0, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 0 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &1287029242 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1287029237} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &1287029243 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1287029237} + m_CullTransparentMesh: 0 +--- !u!850595691 &1288782297 +LightingSettings: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_Name: Settings.lighting + serializedVersion: 6 + m_GIWorkflowMode: 1 + m_EnableBakedLightmaps: 1 + m_EnableRealtimeLightmaps: 1 + m_RealtimeEnvironmentLighting: 1 + m_BounceScale: 1 + m_AlbedoBoost: 1 + m_IndirectOutputScale: 1 + m_UsingShadowmask: 1 + m_BakeBackend: 1 + m_LightmapMaxSize: 1024 + m_BakeResolution: 40 + m_Padding: 2 + m_LightmapCompression: 3 + m_AO: 0 + m_AOMaxDistance: 1 + m_CompAOExponent: 1 + m_CompAOExponentDirect: 0 + m_ExtractAO: 0 + m_MixedBakeMode: 2 + m_LightmapsBakeMode: 1 + m_FilterMode: 1 + m_LightmapParameters: {fileID: 15204, guid: 0000000000000000f000000000000000, type: 0} + m_ExportTrainingData: 0 + m_TrainingDataDestination: TrainingData + m_RealtimeResolution: 2 + m_ForceWhiteAlbedo: 0 + m_ForceUpdates: 0 + m_FinalGather: 0 + m_FinalGatherRayCount: 256 + m_FinalGatherFiltering: 1 + m_PVRCulling: 1 + m_PVRSampling: 1 + m_PVRDirectSampleCount: 32 + m_PVRSampleCount: 512 + m_PVREnvironmentSampleCount: 512 + m_PVREnvironmentReferencePointCount: 2048 + m_LightProbeSampleCountMultiplier: 4 + m_PVRBounces: 2 + m_PVRMinBounces: 2 + m_PVREnvironmentImportanceSampling: 0 + m_PVRFilteringMode: 2 + m_PVRDenoiserTypeDirect: 0 + m_PVRDenoiserTypeIndirect: 0 + m_PVRDenoiserTypeAO: 0 + m_PVRFilterTypeDirect: 0 + m_PVRFilterTypeIndirect: 0 + m_PVRFilterTypeAO: 0 + m_PVRFilteringGaussRadiusDirect: 1 + m_PVRFilteringGaussRadiusIndirect: 5 + m_PVRFilteringGaussRadiusAO: 2 + m_PVRFilteringAtrousPositionSigmaDirect: 0.5 + m_PVRFilteringAtrousPositionSigmaIndirect: 2 + m_PVRFilteringAtrousPositionSigmaAO: 1 + m_PVRTiledBaking: 0 + m_NumRaysToShootPerTexel: -1 + m_RespectSceneVisibilityWhenBakingGI: 0 +--- !u!1 &1501798572 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1501798575} + - component: {fileID: 1501798574} + - component: {fileID: 1501798573} + m_Layer: 0 + m_Name: EventSystem + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &1501798573 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1501798572} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 4f231c4fb786f3946a6b90b886c48677, type: 3} + m_Name: + m_EditorClassIdentifier: + m_SendPointerHoverToParent: 1 + m_HorizontalAxis: Horizontal + m_VerticalAxis: Vertical + m_SubmitButton: Submit + m_CancelButton: Cancel + m_InputActionsPerSecond: 10 + m_RepeatDelay: 0.5 + m_ForceModuleActive: 0 +--- !u!114 &1501798574 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1501798572} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 76c392e42b5098c458856cdf6ecaaaa1, type: 3} + m_Name: + m_EditorClassIdentifier: + m_FirstSelected: {fileID: 0} + m_sendNavigationEvents: 1 + m_DragThreshold: 5 +--- !u!4 &1501798575 +Transform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1501798572} + serializedVersion: 2 + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} +--- !u!1 &1510314135 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1510314136} + - component: {fileID: 1510314139} + - component: {fileID: 1510314138} + - component: {fileID: 1510314137} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1510314136 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1510314135} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1983980535} + m_Father: {fileID: 985743123} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!114 &1510314137 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1510314135} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Highlighted + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 123556536} + m_HandleRect: {fileID: 123556535} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!114 &1510314138 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1510314135} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &1510314139 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1510314135} + m_CullTransparentMesh: 0 +--- !u!1 &1792220204 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1792220205} + - component: {fileID: 1792220208} + - component: {fileID: 1792220207} + - component: {fileID: 1792220206} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1792220205 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1792220204} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 826516845} + m_Father: {fileID: 985743123} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!114 &1792220206 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1792220204} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Highlighted + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 281814073} + m_HandleRect: {fileID: 281814072} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!114 &1792220207 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1792220204} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!222 &1792220208 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1792220204} + m_CullTransparentMesh: 0 +--- !u!1 &1983980534 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1983980535} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1983980535 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1983980534} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 123556535} + m_Father: {fileID: 1510314136} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1660057539 &9223372036854775807 +SceneRoots: + m_ObjectHideFlags: 0 + m_Roots: + - {fileID: 619617592} + - {fileID: 1125716479} + - {fileID: 1501798575} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity.meta b/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity.meta new file mode 100644 index 00000000..46b8384e --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 5ed13563a809f06489c3e97e4da02176 +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/HTTP Samples.unity + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs new file mode 100644 index 00000000..0fc79db4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs @@ -0,0 +1,116 @@ +using System; +using System.Threading.Tasks; + +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Hosts.Settings; +using Best.HTTP.Shared; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + /// + /// Demonstrates the usage of HTTPManager.PerHostSettings to set rules and configurations on a per-host basis. + /// + class PerHostManagerSample : SampleBase + { +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with two Text fields. + /// + [SerializeField] + private MultiTextListItem _listItemPrefab; + + /// + /// Prefab of a UI object with Text and (Raw)Image fields. + /// + [SerializeField] + private TextWithImageListItem _listItemWithImagePrefab; + +#pragma warning restore + + + readonly Uri host_1 = new Uri("https://besthttpwebgldemo.azurewebsites.net"); + readonly string[] host_1_image_paths = new string[] { "/images/Demo/Two.png", "/images/Demo/Three.png" }; + + readonly Uri host_2 = new Uri("https://httpbingo.org"); + readonly string[] host_2_image_paths = new string[] { "/image/jpeg", "/image/png" }; + + protected override async void Start() + { + base.Start(); + +#if (!UNITY_WEBGL || UNITY_EDITOR) && !BESTHTTP_DISABLE_ALTERNATE_SSL + CreateUIItem("Disabling HTTP/2 globally, all following request should done over HTTP/1."); + + // Get the global/fallback settings. + var globalSettings = HTTPManager.PerHostSettings.Get("*"); + + // Turn off connection pooling + globalSettings.HTTP1ConnectionSettings.TryToReuseConnections = false; + + // Turn off HTTP/2 connections. + globalSettings.HTTP2ConnectionSettings.EnableHTTP2Connections = false; + + await DownloadImages(); + + CreateUIItem("Enabling HTTP/2 for only a couple hosts"); + + // Add new settings. New connections to these hosts will use these settings instead of the global one. + // By default both connection pooling and HTTP/2 are enabled, downloading the images again will be done over HTTP/2. + HTTPManager.PerHostSettings.Add(host_1, new HostSettings()); + HTTPManager.PerHostSettings.Add(host_2, new HostSettings()); +#else + CreateUIItem("Please note that this sample can't work under WebGL!"); +#endif + + await DownloadImages(); + } + + async Task DownloadImages() + { + // Images from the first host + foreach (var path in host_1_image_paths) + { + var request = HTTPRequest.CreateGet(new Uri(host_1, path)); + request.DownloadSettings.DisableCache = true; + var resp = await request.GetHTTPResponseAsync(); + + CreateUIItemWithImage(host_1.Host) + .SetStatusText($"http/{resp.HTTPVersion}") + .SetImage(resp.DataAsTexture2D); + } + + // Images from the second host + foreach (var path in host_2_image_paths) + { + var request = HTTPRequest.CreateGet(new Uri(host_2, path)); + request.DownloadSettings.DisableCache = true; + var resp = await request.GetHTTPResponseAsync(); + + CreateUIItemWithImage(host_2.Host) + .SetStatusText($"http/{resp.HTTPVersion}") + .SetImage(resp.DataAsTexture2D); + } + } + + private void OnDisable() + => HTTPManager.PerHostSettings.Clear(); + + MultiTextListItem CreateUIItem(string str) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(str) as MultiTextListItem; + + TextWithImageListItem CreateUIItemWithImage(string str) + => Instantiate(this._listItemWithImagePrefab, this._contentRoot) + .SetText(str) as TextWithImageListItem; + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs.meta new file mode 100644 index 00000000..1f5ae31a --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6c3d29acee0c40c4a937fdb5c1a6c29a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab new file mode 100644 index 00000000..387bd2a2 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab @@ -0,0 +1,836 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &903350717354755225 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7007236754976678714} + - component: {fileID: 2555981889066209670} + - component: {fileID: 1151654705137457198} + m_Layer: 5 + m_Name: PerHostManagerSample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7007236754976678714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8650445495067976892} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &2555981889066209670 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 6c3d29acee0c40c4a937fdb5c1a6c29a, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Per-Host Manager Sample + Description: Demonstrates the usage of HTTPManager.PerHostSettings to set rules + and configurations on a per-host basis. + BannedPlatforms: 11000000 + _contentRoot: {fileID: 6604464276219658894} + _listItemPrefab: {fileID: -3498759215503465087, guid: b207057102717c245bc5a19e64fa12c1, type: 3} + _listItemWithImagePrefab: {fileID: 7102102869452703622, guid: 71014fbf405e2aa409e8f884753145e0, type: 3} +--- !u!114 &1151654705137457198 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &1854499400493494727 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8650445495067976892} + - component: {fileID: 9200161450982655203} + - component: {fileID: 5112288953005728145} + - component: {fileID: 7665647606295342865} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8650445495067976892 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 117071753727847718} + - {fileID: 459545209181084714} + - {fileID: 7276839050644030826} + m_Father: {fileID: 7007236754976678714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &9200161450982655203 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_CullTransparentMesh: 1 +--- !u!114 &5112288953005728145 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7665647606295342865 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 6604464276219658894} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 117071753727847718} + m_HorizontalScrollbar: {fileID: 8661630027537866783} + m_VerticalScrollbar: {fileID: 254031285640752516} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2177670345246438811 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 9001054589328223343} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &9001054589328223343 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2177670345246438811} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5760576963063549503} + m_Father: {fileID: 459545209181084714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &2323931042280143310 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 459545209181084714} + - component: {fileID: 8470518558107698889} + - component: {fileID: 8408684624493673837} + - component: {fileID: 8661630027537866783} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &459545209181084714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 9001054589328223343} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &8470518558107698889 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_CullTransparentMesh: 1 +--- !u!114 &8408684624493673837 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &8661630027537866783 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 3255451244186246724} + m_HandleRect: {fileID: 5760576963063549503} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2477997044408603591 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2016231753930208085} + - component: {fileID: 4317566855085328380} + - component: {fileID: 2316099658992057044} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2016231753930208085 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 6184429662520560369} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &4317566855085328380 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_CullTransparentMesh: 1 +--- !u!114 &2316099658992057044 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3600311992825163093 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7276839050644030826} + - component: {fileID: 7755616364947203418} + - component: {fileID: 3326566895285991693} + - component: {fileID: 254031285640752516} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7276839050644030826 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6184429662520560369} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &7755616364947203418 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_CullTransparentMesh: 1 +--- !u!114 &3326566895285991693 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &254031285640752516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 2316099658992057044} + m_HandleRect: {fileID: 2016231753930208085} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &4797047544337289245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6184429662520560369} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6184429662520560369 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4797047544337289245} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2016231753930208085} + m_Father: {fileID: 7276839050644030826} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &4877496602529206417 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5760576963063549503} + - component: {fileID: 7027904230122806289} + - component: {fileID: 3255451244186246724} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5760576963063549503 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 9001054589328223343} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7027904230122806289 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_CullTransparentMesh: 1 +--- !u!114 &3255451244186246724 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &5098610927303858027 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6604464276219658894} + - component: {fileID: 2513128939934536204} + - component: {fileID: 5648973929569191020} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6604464276219658894 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 117071753727847718} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &2513128939934536204 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 2 + m_Right: 2 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &5648973929569191020 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7481711741464053682 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 117071753727847718} + - component: {fileID: 159606425555236561} + - component: {fileID: 3861525948216551917} + - component: {fileID: 4080910020504356785} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &117071753727847718 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6604464276219658894} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &159606425555236561 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_CullTransparentMesh: 1 +--- !u!114 &3861525948216551917 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4080910020504356785 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab.meta new file mode 100644 index 00000000..94aac9f5 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: dd49ab0a27df8d246ab3cd4d6aae7de0 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/PerHostManagerSample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs new file mode 100644 index 00000000..df13099e --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs @@ -0,0 +1,184 @@ +using System; +using System.Collections.Generic; +using System.Text; +using System.Threading.Tasks; + +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Response; +using Best.HTTP.Shared; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; + +using UnityEngine; +using UnityEngine.Scripting; + +namespace Best.HTTP.Examples +{ + /// + /// Example demonstrating usage of BeginCache, EndCache functions and HTTPCacheContentWriter class to manually store content for an url. + /// + class PopulateCacheManuallySample : SampleBase + { + // Constants passed to the API endpoint stored in _baseAddress + const int FromUserId = 1; + const int ToUserId = 10; + + /// + /// String template used for generating unique uris for every user stored individually in the local cache. + /// + const string LocalCacheUserURLTemplate = "httpcache://userapi/user/{0}"; + +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with two Text fields. + /// + [SerializeField] + private MultiTextListItem _listItemPrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// + private string _baseAddress = "https://besthttpwebgldemo.azurewebsites.net/users/{0}/{1}"; + + protected override async void Start() + { + base.Start(); + + CreateUIItem("Loading users..."); + + await PopulateLocalCache(); + await LoadUsersFromLocalCache(); + } + + async Task PopulateLocalCache() + { + try + { + // Load a list of users from the server + var users = await HTTPRequest.CreateGet(string.Format(_baseAddress, FromUserId, ToUserId)) + .GetFromJsonResultAsync>(); + + CreateUIItem($"Received {users.Count} users from /users/{FromUserId}/{ToUserId}"); + + StoreUsersInLocalCache(users); + } + catch (AsyncHTTPException ex) + { + CreateUIItem($"/Users request failed: {ex.Message}"); + } + } + + void StoreUsersInLocalCache(List users) + { + // Go over all the users and save them to the local cache with a custom uri + foreach (var user in users) + { + var userUri = new Uri(string.Format(LocalCacheUserURLTemplate, user.Id)); + + // convert the user object to json string and get the string's bytes + var content = UserToByteArray(user); + + // BeginCache expects at least one caching header ("cache-control" with "max-age" directive, "etag", "expires" or "last-modified"). + // A cache-control with a max-age directive is a good choice for fabricated urls as the plugin will not try to valide the content's freshness. + var headers = new Dictionary> { { "cache-control", new List { $"max-age={TimeSpan.FromDays(360).TotalSeconds}" } } }; + + // Start the caching procedure by calling BeginCache and pass all the required parameters. + var cacheWriter = HTTPManager.LocalCache.BeginCache(HTTPMethods.Get, userUri, HTTPStatusCodes.OK, headers, null); + + // If the writer is null, something prevents caching, these can be one of the following: + // - caching itself isn't supported + // - userUri doesn't start with 'http' + // - can't acquire a write lock on the resource (a request currently reading or writing the same uri) + // - IO error + // - If the headers passed to BeginCache has a "content-length" header too, BeginCache checks whether it's in the limits of the cache. If it can make enough room to fit a null value will be returned. + if (cacheWriter == null) + { + CreateUIItem($"Can't cache user('{user.Id}')!"); + continue; + } + + try + { + // Write content to the cache. + // Under the hood this writes to a file, if presumably it will take a long time (large content and/or slow media) it's advised to use a Thread. + cacheWriter.Write(content); + + // Finish the caching process by calling EndCache. + // This call will do all housekeeping, like disposing internal streams and releasing the write lock on the uri. + // After this call, requests to this very same uri will load and serve from the local cache. + HTTPManager.LocalCache.EndCache(cacheWriter, true, null); + + CreateUIItem($"User cached as '{userUri}'"); + } + catch (Exception ex) + { + Debug.LogException(ex); + + // We must call EndCache even if there's an error, otherwise not all resources are disposed and + // new attempts to write to this cache entry will fail! + HTTPManager.LocalCache.EndCache(cacheWriter, false, null); + + CreateUIItem($"Writing to cache failed with user '{user.Id}'"); + } + finally + { + // content's byte[] is borrowed from the BufferPool, it's a nice thing to return it! + BufferPool.Release(content); + } + } + } + + /// + /// This function will test/emulate requests loading cached individual users + /// + async Task LoadUsersFromLocalCache() + { + for (int id = FromUserId; id < ToUserId; id++) + { + // Create and execute a HTTP request to get one individual user's data from the local cache + var user = await HTTPRequest.CreateGet(string.Format(LocalCacheUserURLTemplate, id)) + .GetFromJsonResultAsync(); + + CreateUIItem($"User '{user.Id}' loaded from local cache (uri: '{string.Format(LocalCacheUserURLTemplate, id)}')!"); + } + } + + /// + /// Converts a User object to JSon string and returns with the byte representation of the string + /// + BufferSegment UserToByteArray(User user) + { + string json = JSON.LitJson.JsonMapper.ToJson(user); + + int length = Encoding.UTF8.GetByteCount(json); + + byte[] result = BufferPool.Get(length, true); + + Encoding.UTF8.GetBytes(json, 0, json.Length, result, 0); + + return result.AsBuffer(length); + } + + MultiTextListItem CreateUIItem(string str) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(str) as MultiTextListItem; + } + + [Preserve] + class User + { + [Preserve] public string Id { get; set; } + [Preserve] public string Name { get; set; } + [Preserve] public DateTime Joined { get; set; } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs.meta new file mode 100644 index 00000000..31b74a0e --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bccd6884b9f05534fb09939de539dfaa +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab new file mode 100644 index 00000000..9143dc9a --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab @@ -0,0 +1,834 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &903350717354755225 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7007236754976678714} + - component: {fileID: 2555981889066209670} + - component: {fileID: 1151654705137457198} + m_Layer: 5 + m_Name: PopulateCacheManuallySample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7007236754976678714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8650445495067976892} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &2555981889066209670 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: bccd6884b9f05534fb09939de539dfaa, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Populate Cache Manually + Description: + BannedPlatforms: 11000000 + _contentRoot: {fileID: 6604464276219658894} + _listItemPrefab: {fileID: -3498759215503465087, guid: b207057102717c245bc5a19e64fa12c1, type: 3} +--- !u!114 &1151654705137457198 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &1854499400493494727 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8650445495067976892} + - component: {fileID: 9200161450982655203} + - component: {fileID: 5112288953005728145} + - component: {fileID: 7665647606295342865} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8650445495067976892 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 117071753727847718} + - {fileID: 459545209181084714} + - {fileID: 7276839050644030826} + m_Father: {fileID: 7007236754976678714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &9200161450982655203 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_CullTransparentMesh: 1 +--- !u!114 &5112288953005728145 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7665647606295342865 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 6604464276219658894} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 117071753727847718} + m_HorizontalScrollbar: {fileID: 8661630027537866783} + m_VerticalScrollbar: {fileID: 254031285640752516} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2177670345246438811 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 9001054589328223343} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &9001054589328223343 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2177670345246438811} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5760576963063549503} + m_Father: {fileID: 459545209181084714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &2323931042280143310 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 459545209181084714} + - component: {fileID: 8470518558107698889} + - component: {fileID: 8408684624493673837} + - component: {fileID: 8661630027537866783} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &459545209181084714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 9001054589328223343} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &8470518558107698889 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_CullTransparentMesh: 1 +--- !u!114 &8408684624493673837 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &8661630027537866783 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 3255451244186246724} + m_HandleRect: {fileID: 5760576963063549503} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2477997044408603591 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2016231753930208085} + - component: {fileID: 4317566855085328380} + - component: {fileID: 2316099658992057044} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2016231753930208085 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 6184429662520560369} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &4317566855085328380 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_CullTransparentMesh: 1 +--- !u!114 &2316099658992057044 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3600311992825163093 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7276839050644030826} + - component: {fileID: 7755616364947203418} + - component: {fileID: 3326566895285991693} + - component: {fileID: 254031285640752516} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7276839050644030826 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6184429662520560369} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &7755616364947203418 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_CullTransparentMesh: 1 +--- !u!114 &3326566895285991693 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &254031285640752516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 2316099658992057044} + m_HandleRect: {fileID: 2016231753930208085} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &4797047544337289245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6184429662520560369} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6184429662520560369 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4797047544337289245} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2016231753930208085} + m_Father: {fileID: 7276839050644030826} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &4877496602529206417 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5760576963063549503} + - component: {fileID: 7027904230122806289} + - component: {fileID: 3255451244186246724} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5760576963063549503 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 9001054589328223343} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7027904230122806289 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_CullTransparentMesh: 1 +--- !u!114 &3255451244186246724 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &5098610927303858027 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6604464276219658894} + - component: {fileID: 2513128939934536204} + - component: {fileID: 5648973929569191020} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6604464276219658894 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 117071753727847718} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &2513128939934536204 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 2 + m_Right: 2 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &5648973929569191020 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7481711741464053682 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 117071753727847718} + - component: {fileID: 159606425555236561} + - component: {fileID: 3861525948216551917} + - component: {fileID: 4080910020504356785} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &117071753727847718 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6604464276219658894} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &159606425555236561 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_CullTransparentMesh: 1 +--- !u!114 &3861525948216551917 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4080910020504356785 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab.meta new file mode 100644 index 00000000..81202387 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 75cb55a634eeead4798f701197067214 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/PopulateCacheManuallySample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs new file mode 100644 index 00000000..4c9f73ee --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs @@ -0,0 +1,582 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Text; + +using Best.HTTP.Cookies; +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Request.Authentication; +using Best.HTTP.Request.Authenticators; +using Best.HTTP.Shared.PlatformSupport.IL2CPP; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + /// + /// Collection of small samples that can be fit in one method and an additional callback. Result of the requests are logged/displayed on the UI. + /// + sealed class SmallSamples : SampleBase + { +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with two Text fields. + /// + [SerializeField] + private MultiTextListItem _listItemPrefab; + + /// + /// Prefab of a UI object with Text and (Raw)Image fields. + /// + [SerializeField] + private TextWithImageListItem _listItemWithImagePrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// + private string _baseAddress = "https://httpbingo.org"; + + /// + /// Queue of the samples executed sequentially. + /// + private Queue examples = new Queue(); + + private AssetBundle _assetBundleToUnload; + + protected override void Start() + { + base.Start(); + + this.examples.Enqueue(SimpleGet); + this.examples.Enqueue(GetImageFromAssetBundle); + + this.examples.Enqueue(PostRaw); + this.examples.Enqueue(PostUrlEncoded); + this.examples.Enqueue(PostMultiPartEncoded); + this.examples.Enqueue(PostJSon); + + this.examples.Enqueue(Redirect); + this.examples.Enqueue(AbsoluteRedirect); + this.examples.Enqueue(RelativeRedirect); + this.examples.Enqueue(RedirectTo); + + this.examples.Enqueue(DecodeBase64); + this.examples.Enqueue(EncodeBase64); + + this.examples.Enqueue(ExpectedToSucceedBasicAuth); + this.examples.Enqueue(ExpectedToFailBasicAuth); + this.examples.Enqueue(ExpectedToSucceedDigestAuth); + this.examples.Enqueue(ExpectedToFailDigestAuth); + this.examples.Enqueue(BearerTokenAuth); + + this.examples.Enqueue(CachedForNSeconds); + this.examples.Enqueue(CachedForNSeconds); + this.examples.Enqueue(SendWithETag); + + this.examples.Enqueue(CheckCookies); + this.examples.Enqueue(SetCustomCookies); + this.examples.Enqueue(RequestCookies); + this.examples.Enqueue(DeleteCookies); + + this.examples.Enqueue(GetGZip); + this.examples.Enqueue(GetDeflate); + this.examples.Enqueue(GetBrotli); + + this.examples.Enqueue(GetJPEGResponse); + this.examples.Enqueue(GetPNGResponse); + this.examples.Enqueue(GetJSonResponseAsync); + + ExecuteNext(); + } + + private void OnDisable() + { + Resources.UnloadUnusedAssets(); +#if UNITY_2023_1_OR_NEWER + _assetBundleToUnload?.UnloadAsync(true); +#else + _assetBundleToUnload?.Unload(true); +#endif + } + + void SimpleGet() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/get", SimpleCallback); + request.Tag = CreateUIItem("Simple GET"); + request.Send(); + } + + async void GetImageFromAssetBundle() + { + var uiEntry = CreateUIItemWithImage($"Image from AssetBundle (using GetAssetBundleAsync with async-await)"); + + string url = null; + +#if UNITY_ANDROID && !UNITY_EDITOR + url = "https://besthttpwebgldemo.azurewebsites.net/AssetBundles/Android/demobundle.assetbundle"; +#else + url = "https://besthttpwebgldemo.azurewebsites.net/AssetBundles/WebGL/demobundle.assetbundle"; +#endif + + var request = HTTPRequest.CreateGet(url); + try + { + _assetBundleToUnload = await request.GetAssetBundleAsync(); + + var texture = _assetBundleToUnload.LoadAsset("9443182_orig"); + + uiEntry.SetImage(texture); + } + catch (AsyncHTTPException ex) + { + uiEntry.SetStatusText(ex.Message); + } + catch (Exception ex) + { + uiEntry.SetStatusText(ex.Message); + } + finally + { + ExecuteNext(); + } + } + + void PostRaw() + { + var request = HTTPRequest.CreatePost($"{_baseAddress}/post", SimpleCallback); + + var data = new byte[] { 1, 2, 3, 4 }; + request.UploadSettings.UploadStream = new MemoryStream(data); + + request.Tag = CreateUIItem("POST - Raw"); + request.Send(); + } + + void PostUrlEncoded() + { + var request = HTTPRequest.CreatePost($"{_baseAddress}/post", SimpleCallback); + + var formStream = new Best.HTTP.Request.Upload.Forms.UrlEncodedStream(); + formStream.AddField("field 1", "value 1"); + formStream.AddField("field 2", "value 2"); + + request.UploadSettings.UploadStream = formStream; + + request.Tag = CreateUIItem("POST - Url Encoded"); + request.Send(); + } + + void PostMultiPartEncoded() + { + var request = HTTPRequest.CreatePost($"{_baseAddress}/post", SimpleCallback); + + var formStream = new Best.HTTP.Request.Upload.Forms.MultipartFormDataStream(); + formStream.AddField("field 1", "value 1"); + formStream.AddField("field 2", "value 2"); + + var data = new byte[] { 1, 2, 3, 4 }; + formStream.AddStreamField("binary field", new MemoryStream(data)); + + request.UploadSettings.UploadStream = formStream; + + request.Tag = CreateUIItem("POST - Multipart/Form-Data Encoded"); + request.Send(); + } + + class SendAsJson { public string key1, key2; } + void PostJSon() + { + var obj = new SendAsJson + { + key1 = "value 1", + key2 = "value 2" + }; + + var request = HTTPRequest.CreatePost($"{_baseAddress}/post", SimpleCallback); + + request.UploadSettings.UploadStream = new Best.HTTP.Request.Upload.JSonDataStream(obj); + + request.Tag = CreateUIItem("POST - JSon"); + request.Send(); + } + + void Redirect() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/redirect/6", SimpleCallback); + request.Tag = CreateUIItem("Redirect"); + request.Send(); + } + + void AbsoluteRedirect() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/absolute-redirect/6", SimpleCallback); + request.Tag = CreateUIItem("Absolute Redirect"); + request.Send(); + } + + void RelativeRedirect() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/relative-redirect/6", SimpleCallback); + request.Tag = CreateUIItem("Relative Redirect"); + request.Send(); + } + + void RedirectTo() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/redirect-to?status_code=307&url={Uri.EscapeUriString(_baseAddress)}", SimpleCallback); + request.Tag = CreateUIItem("Redirect To"); + request.Send(); + } + + void DecodeBase64() + { + string base64 = "aHR0cGJpbmdvLm9yZw=="; + + var request = HTTPRequest.CreateGet($"{_baseAddress}/base64/decode/{base64}", TextCallback); + request.Tag = CreateUIItem("Decode Base64"); + request.Send(); + } + + void EncodeBase64() + { + string strToEncode = "httpbingo.org"; + + var request = HTTPRequest.CreateGet($"{_baseAddress}/base64/encode/{Uri.EscapeUriString(strToEncode)}", TextCallback); + request.Tag = CreateUIItem("Encode Base64"); + request.Send(); + } + + void ExpectedToSucceedBasicAuth() + { + DigestStore.Clear(); + + var request = HTTPRequest.CreateGet($"{_baseAddress}/basic-auth/user/passwd", SimpleCallback); + + request.Authenticator = new CredentialAuthenticator(new Credentials(AuthenticationTypes.Basic, "user", "passwd")); + + request.Tag = CreateUIItem("Basic Auth (Expected to Succeed)"); + request.Send(); + } + + void ExpectedToFailBasicAuth() + { + DigestStore.Clear(); + + var request = HTTPRequest.CreateGet($"{_baseAddress}/basic-auth/user/passwd", SimpleCallback); + + // Here we set a wrong password + request.Authenticator = new CredentialAuthenticator(new Credentials(AuthenticationTypes.Basic, "user", "wrong passwd")); + + request.Tag = CreateUIItem("Basic Auth (Expected to Fail)"); + request.Send(); + } + + void ExpectedToSucceedDigestAuth() + { + DigestStore.Clear(); + + var request = HTTPRequest.CreateGet($"{_baseAddress}/digest-auth/auth/user/passwd/MD5", SimpleCallback); + + request.Authenticator = new CredentialAuthenticator(new Credentials(AuthenticationTypes.Digest, "user", "passwd")); + + request.Tag = CreateUIItem("Digest Auth (Expected to Succeed)"); + request.Send(); + } + + void ExpectedToFailDigestAuth() + { + DigestStore.Clear(); + + var request = HTTPRequest.CreateGet($"{_baseAddress}/digest-auth/auth/user/passwd/MD5", SimpleCallback); + + // Here we set a wrong password + request.Authenticator = new CredentialAuthenticator(new Credentials(AuthenticationTypes.Digest, "user", "wrong passwd")); + + request.Tag = CreateUIItem("Digest Auth (Expected to Succeed)"); + request.Send(); + } + + void BearerTokenAuth() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/bearer", SimpleCallback); + + // here we create a fake token by base64 encoding some bytes. httpbingo just checks for the Authorization header and whether it's bearer or not. + string bearerToken = Convert.ToBase64String(Encoding.UTF8.GetBytes("")); + request.Authenticator = new BearerTokenAuthenticator(bearerToken); + + request.Tag = CreateUIItem("Bearer Token"); + request.Send(); + } + + void CachedForNSeconds() + { + const int CacheTime = 30; + + // By calling /cache/30 the server will send caching headers that informs the client that the content is cachable and valid for 30 seconds. + // For 30 seconds, request to the same uri should return the content from the local cache. + var request = HTTPRequest.CreateGet($"{_baseAddress}/cache/{CacheTime}", CheckCachedCallback); + request.Tag = CreateUIItem($"Cached content for {CacheTime} seconds"); + request.Send(); + } + + void SendWithETag() + { + const string etag = ""; + + var request = HTTPRequest.CreateGet($"{_baseAddress}/etag/{etag}", CheckCachedCallback); + request.Tag = CreateUIItem($"Request response with ETag"); + request.Send(); + } + + void CheckCookies() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/cookies", CookiesCallback); + request.Tag = CreateUIItem($"Check # of Cookies"); + request.Send(); + } + + void SetCustomCookies() + { + var uri = new Uri($"{_baseAddress}/cookies"); + CookieJar.Set(uri, new Cookie("custom1", "value1")); + CookieJar.Set(uri, new Cookie("custom2", "value2")); + + var request = HTTPRequest.CreateGet(uri, CookiesCallback); + request.Tag = CreateUIItem($"Set Custom Cookies"); + request.Send(); + } + + void RequestCookies() + { + // Ask the server to set a few cookies for us. + + var request = HTTPRequest.CreateGet($"{_baseAddress}/cookies/set?k1=v1&k2=v2", CookiesCallback); + request.Tag = CreateUIItem($"Request Cookies from Server"); + request.Send(); + } + + void DeleteCookies() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/cookies/delete?k1=", CookiesCallback); + request.Tag = CreateUIItem($"Delete One Cookie"); + request.Send(); + } + + void GetGZip() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/gzip", SimpleCallback); + request.Tag = CreateUIItem($"gzip"); + request.Send(); + } + + void GetDeflate() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/deflate", SimpleCallback); + request.Tag = CreateUIItem($"Deflate"); + request.Send(); + } + + void GetBrotli() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/brotli", SimpleCallback); + request.Tag = CreateUIItem($"Brotli"); + request.Send(); + } + + void GetJPEGResponse() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/image/jpeg", ImageCallback); + request.Tag = CreateUIItemWithImage($"Image (JPEG) response"); + request.Send(); + } + + void GetPNGResponse() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/image/png", ImageCallback); + request.Tag = CreateUIItemWithImage($"Image (PNG) response"); + request.Send(); + } + +#pragma warning disable 0649 + [Preserve] + class JSonResult + { + [Preserve] public JSonSlideshow slideshow; + } + + [Preserve] + class JSonSlideshow + { + [Preserve] public string author; + [Preserve] public string date; + [Preserve] public string title; + } +#pragma warning restore + + async void GetJSonResponseAsync() + { + var request = HTTPRequest.CreateGet($"{_baseAddress}/json"); + + var uiEntry = CreateUIItem($"JSon response (GetFromJsonResultAsync<> with async-await)"); + + try + { + var jsonResult = await request.GetFromJsonResultAsync(); + + var slideshow = jsonResult.slideshow; + + uiEntry.SetStatusText($"{slideshow.author}: {slideshow.title} ({slideshow.date})"); + } + catch (AsyncHTTPException ex) + { + uiEntry.SetStatusText(ex.Message); + } + catch (Exception ex) + { + uiEntry.SetStatusText(ex.Message); + } + finally + { + ExecuteNext(); + } + } + + /// + /// A simple callback for HTTPRequest, called when the request finished either succesfully or with an error. + /// + /// The original HTTPRequest instance. + /// Reference to a HTTPResponse object or null in case of an error. + private void SimpleCallback(HTTPRequest req, HTTPResponse resp) + { + var uiEntry = req.Tag as MultiTextListItem; + + if (resp != null) + uiEntry.SetStatusText(resp.StatusCode.ToString()); + else + uiEntry.SetStatusText(req.State.ToString()); + + ExecuteNext(); + } + + /// + /// Callback to display the received content as an utf-8 text. + /// + /// The original HTTPRequest instance. + /// Reference to a HTTPResponse object or null in case of an error. + private void TextCallback(HTTPRequest req, HTTPResponse resp) + { + var uiEntry = req.Tag as MultiTextListItem; + + if (resp != null) + { + if (resp.IsSuccess) + uiEntry.SetStatusText(resp.DataAsText); + else + uiEntry.SetStatusText(resp.StatusCode.ToString()); + } + else + uiEntry.SetStatusText(req.State.ToString()); + + ExecuteNext(); + } + + /// + /// Callback to display whether the content is loaded from the local cache or freshly downloaded from the server. + /// + /// The original HTTPRequest instance. + /// Reference to a HTTPResponse object or null in case of an error. + private void CheckCachedCallback(HTTPRequest req, HTTPResponse resp) + { + var uiEntry = req.Tag as MultiTextListItem; + + if (resp != null) + { + if (resp.IsSuccess) + uiEntry.SetStatusText(resp.IsFromCache ? "from cache" : "fresh from the server"); + else + uiEntry.SetStatusText(resp.StatusCode.ToString()); + } + else + uiEntry.SetStatusText(req.State.ToString()); + + ExecuteNext(); + } + + /// + /// Callback to display the number of cookies stored for the request's uri. + /// + /// The original HTTPRequest instance. + /// Reference to a HTTPResponse object or null in case of an error. + private void CookiesCallback(HTTPRequest req, HTTPResponse resp) + { + var uiEntry = req.Tag as MultiTextListItem; + + if (resp != null) + { + if (resp.IsSuccess) + { + var cookies = CookieJar.Get(req.CurrentUri); + int cookieCount = 0; + if (cookies != null) + cookieCount = cookies.Count; + + uiEntry.SetStatusText($"Cookies: {cookieCount}"); + } + else + uiEntry.SetStatusText(resp.StatusCode.ToString()); + } + else + uiEntry.SetStatusText(req.State.ToString()); + + ExecuteNext(); + } + + /// + /// Callback to display the content as image/texture. + /// + /// The original HTTPRequest instance. + /// Reference to a HTTPResponse object or null in case of an error. + private void ImageCallback(HTTPRequest req, HTTPResponse resp) + { + var uiEntry = req.Tag as TextWithImageListItem; + + if (resp != null) + { + if (resp.IsSuccess) + { + uiEntry.SetImage(resp.DataAsTexture2D); + } + else + uiEntry.SetStatusText(resp.StatusCode.ToString()); + } + else + uiEntry.SetStatusText(req.State.ToString()); + + ExecuteNext(); + } + + void ExecuteNext() + { + if (this.examples.Count > 0) + this.examples.Dequeue()?.Invoke(); + } + + MultiTextListItem CreateUIItem(string str) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(str) as MultiTextListItem; + + TextWithImageListItem CreateUIItemWithImage(string str) + => Instantiate(this._listItemWithImagePrefab, this._contentRoot) + .SetText(str) as TextWithImageListItem; + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs.meta new file mode 100644 index 00000000..bc34165b --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: abf084bf590cc664b9eb6fb77128cb7f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab new file mode 100644 index 00000000..d902b8ff --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab @@ -0,0 +1,808 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &903350717354755225 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7007236754976678714} + - component: {fileID: 2555981889066209670} + m_Layer: 5 + m_Name: SmallSamples + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7007236754976678714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6975741742973185561} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &2555981889066209670 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: abf084bf590cc664b9eb6fb77128cb7f, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Small Samples & Snippets + Description: Live demonstration of the thousand faces of a HTTPRequest. + BannedPlatforms: + _contentRoot: {fileID: 5565614333189857617} + _listItemPrefab: {fileID: -3498759215503465087, guid: b207057102717c245bc5a19e64fa12c1, type: 3} + _listItemWithImagePrefab: {fileID: 7102102869452703622, guid: 71014fbf405e2aa409e8f884753145e0, type: 3} +--- !u!1 &3530062954084857227 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 3797218627156725508} + - component: {fileID: 6118133948154023763} + - component: {fileID: 4368185647104968011} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &3797218627156725508 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3530062954084857227} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 1712459561052259112} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &6118133948154023763 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3530062954084857227} + m_CullTransparentMesh: 1 +--- !u!114 &4368185647104968011 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3530062954084857227} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &5374579861491731644 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5565614333189857617} + - component: {fileID: 3191018409810205299} + - component: {fileID: 8090604845643897979} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5565614333189857617 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5374579861491731644} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 5253658781859235398} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &3191018409810205299 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5374579861491731644} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &8090604845643897979 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5374579861491731644} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &5393571506056236089 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1583551496148140993} + - component: {fileID: 2281887274843043050} + - component: {fileID: 2926875212609747814} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1583551496148140993 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5393571506056236089} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 290784940966992751} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &2281887274843043050 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5393571506056236089} + m_CullTransparentMesh: 1 +--- !u!114 &2926875212609747814 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5393571506056236089} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &6998770302130250040 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 1712459561052259112} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &1712459561052259112 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6998770302130250040} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 3797218627156725508} + m_Father: {fileID: 4783943709540326548} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &7279866406925775221 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5253658781859235398} + - component: {fileID: 7508564350764369044} + - component: {fileID: 4137658993421905267} + - component: {fileID: 6801217366933697557} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5253658781859235398 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7279866406925775221} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5565614333189857617} + m_Father: {fileID: 6975741742973185561} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &7508564350764369044 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7279866406925775221} + m_CullTransparentMesh: 1 +--- !u!114 &4137658993421905267 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7279866406925775221} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &6801217366933697557 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7279866406925775221} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 +--- !u!1 &7438435787485989230 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 290784940966992751} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &290784940966992751 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7438435787485989230} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1583551496148140993} + m_Father: {fileID: 2895391065818120872} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &7871890137975364790 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4783943709540326548} + - component: {fileID: 119444013200305309} + - component: {fileID: 2647000099048212911} + - component: {fileID: 1411878288382280761} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4783943709540326548 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7871890137975364790} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 1712459561052259112} + m_Father: {fileID: 6975741742973185561} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &119444013200305309 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7871890137975364790} + m_CullTransparentMesh: 1 +--- !u!114 &2647000099048212911 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7871890137975364790} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &1411878288382280761 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7871890137975364790} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 4368185647104968011} + m_HandleRect: {fileID: 3797218627156725508} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &8255145232871439425 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6975741742973185561} + - component: {fileID: 716861109128402346} + - component: {fileID: 7259165130104971665} + - component: {fileID: 4524262802756624954} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6975741742973185561 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8255145232871439425} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5253658781859235398} + - {fileID: 2895391065818120872} + - {fileID: 4783943709540326548} + m_Father: {fileID: 7007236754976678714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &716861109128402346 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8255145232871439425} + m_CullTransparentMesh: 1 +--- !u!114 &7259165130104971665 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8255145232871439425} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4524262802756624954 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8255145232871439425} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 5565614333189857617} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 5253658781859235398} + m_HorizontalScrollbar: {fileID: 2648583728715394001} + m_VerticalScrollbar: {fileID: 1411878288382280761} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &9136554036310570804 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2895391065818120872} + - component: {fileID: 6484931466066631827} + - component: {fileID: 1163226007420396490} + - component: {fileID: 2648583728715394001} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2895391065818120872 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9136554036310570804} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 290784940966992751} + m_Father: {fileID: 6975741742973185561} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &6484931466066631827 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9136554036310570804} + m_CullTransparentMesh: 1 +--- !u!114 &1163226007420396490 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9136554036310570804} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &2648583728715394001 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 9136554036310570804} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 2926875212609747814} + m_HandleRect: {fileID: 1583551496148140993} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab.meta new file mode 100644 index 00000000..50d8cf8b --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 1d1ccc91162c91a4fb0759db80748a1c +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/SmallSamples.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs new file mode 100644 index 00000000..dbe81c89 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs @@ -0,0 +1,149 @@ +using System; +using System.Threading.Tasks; + +using Best.HTTP.Caching; +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Shared; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + class StraightFromCacheSample : SampleBase + { +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with two Text fields. + /// + [SerializeField] + private MultiTextListItem _listItemPrefab; + + /// + /// Prefab of a UI object with Text and (Raw)Image fields. + /// + [SerializeField] + private TextWithImageListItem _listItemWithImagePrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// +#if UNITY_ANDROID && !UNITY_EDITOR + private string _baseAddress = "https://besthttpwebgldemo.azurewebsites.net/AssetBundles/Android/demobundle.assetbundle"; +#else + private string _baseAddress = "https://besthttpwebgldemo.azurewebsites.net/AssetBundles/WebGL/demobundle.assetbundle"; +#endif + + protected override async void Start() + { + base.Start(); + + var uri = new Uri(this._baseAddress); + + CreateUIItem("Calling await LoadImageFromLocalCacheAsync"); + + // Try load the bundle and texture from local cache + var texture = await LoadImageFromLocalCacheAsync(uri); + + // If it fails, download + if (texture == null) + { + CreateUIItem("Content isn't cached yet! Downloading...."); + + await DownloadIntoLocalCache(uri); + + CreateUIItem("Done! Retrying LoadImageFromLocalCacheAsync"); + + texture = await LoadImageFromLocalCacheAsync(uri); + } + + if (texture == null) + CreateUIItem("Couldn't load image!"); + else + CreateUIItemWithImage("Image loaded!") + .SetImage(texture); + } + + async Task DownloadIntoLocalCache(Uri uri) + { + var request = HTTPRequest.CreateGet(uri); + + // No content will be stored in memory. + request.DownloadSettings.CacheOnly = true; + + try + { + await request.GetHTTPResponseAsync(); + } + catch (AsyncHTTPException ex) + { + Debug.LogException(ex); + } + } + +#if UNITY_2023_1_OR_NEWER + async +#endif + Task LoadImageFromLocalCacheAsync(Uri uri) + { +#if UNITY_2023_1_OR_NEWER + // If Setup isn't called yet, HTTPManager.LocalCache isn't created yet either and would be null. + HTTPManager.Setup(); + + var hash = HTTPCache.CalculateHash(HTTPMethods.Get, uri); + + // Call BeginReadContent to try to acquire a Stream to the cached content + var stream = HTTPManager.LocalCache.BeginReadContent(hash, null); + + if (stream == null) + return null; + + try + { + var bundleLoadAsyncOp = AssetBundle.LoadFromStreamAsync(stream); + + // Unity's GetAwaiter extension is typeless, we can await it but can't await and return with the asset bundle. + // See "Loading resources asynchronously" at https://docs.unity3d.com/2023.2/Documentation/Manual/AwaitSupport.html + await Awaitable.FromAsyncOperation(bundleLoadAsyncOp); + + var assetBundle = bundleLoadAsyncOp.assetBundle; + + var resourceLoadAsyncOp = assetBundle.LoadAssetAsync("9443182_orig"); + await Awaitable.FromAsyncOperation(resourceLoadAsyncOp); + + return resourceLoadAsyncOp.asset as Texture2D; + } + finally + { + // If we called BeginReadContent and it's returned with a non-null value, we have to call EndReadContent too! + HTTPManager.LocalCache.EndReadContent(hash, null); + + // We are responsible disposing the stream! + stream?.Dispose(); + } +#else + return null; +#endif + } + + private void OnDestroy() + => AssetBundle.UnloadAllAssetBundles(true); + + MultiTextListItem CreateUIItem(string str) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(str) as MultiTextListItem; + + TextWithImageListItem CreateUIItemWithImage(string str) + => Instantiate(this._listItemWithImagePrefab, this._contentRoot) + .SetText(str) as TextWithImageListItem; + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs.meta new file mode 100644 index 00000000..e63ebcaf --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 21cdb5e54d5224e459c580c9a537587e +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab new file mode 100644 index 00000000..01be5e3e --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab @@ -0,0 +1,835 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &903350717354755225 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7007236754976678714} + - component: {fileID: 2555981889066209670} + - component: {fileID: 1151654705137457198} + m_Layer: 5 + m_Name: StraightFromCacheSample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7007236754976678714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8650445495067976892} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &2555981889066209670 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 21cdb5e54d5224e459c580c9a537587e, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: Load Straight From Cache + Description: + BannedPlatforms: 11000000 + _contentRoot: {fileID: 6604464276219658894} + _listItemPrefab: {fileID: -3498759215503465087, guid: b207057102717c245bc5a19e64fa12c1, type: 3} + _listItemWithImagePrefab: {fileID: 7102102869452703622, guid: 71014fbf405e2aa409e8f884753145e0, type: 3} +--- !u!114 &1151654705137457198 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &1854499400493494727 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8650445495067976892} + - component: {fileID: 9200161450982655203} + - component: {fileID: 5112288953005728145} + - component: {fileID: 7665647606295342865} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8650445495067976892 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 117071753727847718} + - {fileID: 459545209181084714} + - {fileID: 7276839050644030826} + m_Father: {fileID: 7007236754976678714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &9200161450982655203 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_CullTransparentMesh: 1 +--- !u!114 &5112288953005728145 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7665647606295342865 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 6604464276219658894} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 117071753727847718} + m_HorizontalScrollbar: {fileID: 8661630027537866783} + m_VerticalScrollbar: {fileID: 254031285640752516} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2177670345246438811 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 9001054589328223343} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &9001054589328223343 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2177670345246438811} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5760576963063549503} + m_Father: {fileID: 459545209181084714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &2323931042280143310 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 459545209181084714} + - component: {fileID: 8470518558107698889} + - component: {fileID: 8408684624493673837} + - component: {fileID: 8661630027537866783} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &459545209181084714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 9001054589328223343} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &8470518558107698889 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_CullTransparentMesh: 1 +--- !u!114 &8408684624493673837 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &8661630027537866783 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 3255451244186246724} + m_HandleRect: {fileID: 5760576963063549503} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2477997044408603591 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2016231753930208085} + - component: {fileID: 4317566855085328380} + - component: {fileID: 2316099658992057044} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2016231753930208085 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 6184429662520560369} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &4317566855085328380 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_CullTransparentMesh: 1 +--- !u!114 &2316099658992057044 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3600311992825163093 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7276839050644030826} + - component: {fileID: 7755616364947203418} + - component: {fileID: 3326566895285991693} + - component: {fileID: 254031285640752516} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7276839050644030826 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6184429662520560369} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &7755616364947203418 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_CullTransparentMesh: 1 +--- !u!114 &3326566895285991693 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &254031285640752516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 2316099658992057044} + m_HandleRect: {fileID: 2016231753930208085} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &4797047544337289245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6184429662520560369} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6184429662520560369 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4797047544337289245} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2016231753930208085} + m_Father: {fileID: 7276839050644030826} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &4877496602529206417 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5760576963063549503} + - component: {fileID: 7027904230122806289} + - component: {fileID: 3255451244186246724} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5760576963063549503 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 9001054589328223343} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7027904230122806289 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_CullTransparentMesh: 1 +--- !u!114 &3255451244186246724 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &5098610927303858027 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6604464276219658894} + - component: {fileID: 2513128939934536204} + - component: {fileID: 5648973929569191020} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6604464276219658894 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 117071753727847718} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &2513128939934536204 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 2 + m_Right: 2 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &5648973929569191020 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7481711741464053682 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 117071753727847718} + - component: {fileID: 159606425555236561} + - component: {fileID: 3861525948216551917} + - component: {fileID: 4080910020504356785} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &117071753727847718 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6604464276219658894} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &159606425555236561 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_CullTransparentMesh: 1 +--- !u!114 &3861525948216551917 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4080910020504356785 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab.meta new file mode 100644 index 00000000..df6f0202 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: c82742cf845b1344db1162ebdbd34f77 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/StraightFromCacheSample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers.meta new file mode 100644 index 00000000..458e48a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers.meta @@ -0,0 +1,7 @@ +fileFormatVersion: 2 +guid: 61ccf02e2b33b974b9bc1bfd84f2610c +folderAsset: yes +DefaultImporter: + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs new file mode 100644 index 00000000..36639075 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs @@ -0,0 +1,60 @@ +using System.Collections; + +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers +{ + static class GUIHelper + { + // https://en.wikipedia.org/wiki/Binary_prefix + private static string[] prefixes = new string[] { " B", " KiB", " MiB", " GiB", " TiB" }; + + public static string GetBytesStr(double bytes, byte precision) + { + int prefixIdx = 0; + while (bytes >= 1024) + { + bytes = bytes / 1024; + prefixIdx++; + } + + return bytes.ToString("F" + precision) + prefixes[prefixIdx]; + } + + public static void RemoveChildren(RectTransform transform, int maxChildCount) + { + while (transform.childCount > maxChildCount) + { + var child = transform.GetChild(0); + child.SetParent(null); + + GameObject.Destroy(child.gameObject); + } + } + + public static TextListItem AddText(TextListItem prefab, RectTransform contentRoot, string text, int maxEntries, ScrollRect scrollRect) + { + if (contentRoot == null) + return null; + + var listItem = GameObject.Instantiate(prefab, contentRoot, false); + listItem.SetText(text); + + GUIHelper.RemoveChildren(contentRoot, maxEntries); + + if (scrollRect != null && scrollRect.isActiveAndEnabled) + scrollRect.StartCoroutine(ScrollToBottom(scrollRect)); + + return listItem; + } + + public static IEnumerator ScrollToBottom(ScrollRect scrollRect) + { + yield return null; + + if (scrollRect != null && scrollRect.isActiveAndEnabled) + scrollRect.normalizedPosition = new Vector2(0, 0); + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs.meta new file mode 100644 index 00000000..56553b47 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs.meta @@ -0,0 +1,17 @@ +fileFormatVersion: 2 +guid: fd560ff6f0fa60844a43a82db1ad03be +MonoImporter: + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/GUIHelper.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs new file mode 100644 index 00000000..51895d8f --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs @@ -0,0 +1,25 @@ +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers +{ + class MultiTextListItem : TextListItem + { +#pragma warning disable 0649 + [SerializeField] + protected Text _statusText; +#pragma warning restore + + public new MultiTextListItem SetText(string text) + { + this._text.text = text; + return this; + } + + public MultiTextListItem SetStatusText(string text) + { + this._statusText.text = text; + return this; + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs.meta new file mode 100644 index 00000000..97abb6fb --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5d9373fa7a394804ab96a6ee0203f22c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab new file mode 100644 index 00000000..33465311 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab @@ -0,0 +1,360 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &1213827631941394660 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4882494726244793729} + - component: {fileID: 7821694538642742344} + - component: {fileID: 5465491216742829538} + m_Layer: 5 + m_Name: Panel + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4882494726244793729 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7821694538642742344 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_CullTransparentMesh: 1 +--- !u!114 &5465491216742829538 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: 1000 + m_FlexibleHeight: -1 + m_LayoutPriority: 1 +--- !u!1 &2730082108177940907 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2349869341790252760} + - component: {fileID: 7294666267679755399} + - component: {fileID: 1945985923753374133} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2349869341790252760 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7294666267679755399 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_CullTransparentMesh: 1 +--- !u!114 &1945985923753374133 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5f7201a12d95ffc409449d95f23cf332, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 9 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 1 + m_MaxSize: 40 + m_Alignment: 3 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: +--- !u!1 &4552705929141052376 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2882360993746877331} + - component: {fileID: 2771079376569378743} + - component: {fileID: 8493156114657527991} + - component: {fileID: 6070074926493679699} + - component: {fileID: 3669513657079693600} + - component: {fileID: -3498759215503465087} + m_Layer: 5 + m_Name: MultiTextListItem + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2882360993746877331 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2349869341790252760} + - {fileID: 4882494726244793729} + - {fileID: 4451687393144823326} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 300, y: 0} + m_SizeDelta: {x: 600, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &2771079376569378743 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_CullTransparentMesh: 1 +--- !u!114 &8493156114657527991 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.39215687} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &6070074926493679699 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 30649d3a9faa99c48a7b1166b86bf2a0, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 5 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 4 + m_Spacing: 2 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &3669513657079693600 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!114 &-3498759215503465087 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5d9373fa7a394804ab96a6ee0203f22c, type: 3} + m_Name: + m_EditorClassIdentifier: + _text: {fileID: 1945985923753374133} + _statusText: {fileID: 7080624304052066226} +--- !u!1 &6135673798412074479 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4451687393144823326} + - component: {fileID: 8100882870430957419} + - component: {fileID: 7080624304052066226} + m_Layer: 5 + m_Name: Status Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4451687393144823326 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &8100882870430957419 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_CullTransparentMesh: 1 +--- !u!114 &7080624304052066226 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5f7201a12d95ffc409449d95f23cf332, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 9 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 1 + m_MaxSize: 40 + m_Alignment: 3 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab.meta new file mode 100644 index 00000000..26bc14a3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: b207057102717c245bc5a19e64fa12c1 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/MultiTextListItem.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs new file mode 100644 index 00000000..9f43cb31 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs @@ -0,0 +1,31 @@ +using Best.HTTP.Examples.Helpers.SelectorUI; + +using UnityEngine; + +namespace Best.HTTP.Examples.Helpers +{ + abstract class SampleBase : MonoBehaviour + { +#pragma warning disable 0649, 0169 + [Header("Common Properties")] + public string Category; + public string DisplayName; + + [TextArea] + public string Description; +#pragma warning restore + + public RuntimePlatform[] BannedPlatforms = new RuntimePlatform[0]; + + protected SampleSelectorUI sampleSelector; + + protected virtual void Start() + { +#if UNITY_2023_1_OR_NEWER + this.sampleSelector = FindAnyObjectByType(); +#else + this.sampleSelector = FindObjectOfType(); +#endif + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs.meta new file mode 100644 index 00000000..2f2e1d13 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9f8792c52d9520447a1c9d7139925f57 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SampleBase.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI.meta new file mode 100644 index 00000000..0bc4dd66 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 901494a9e35e283418e26dd2ae48f62c +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs new file mode 100644 index 00000000..53d55dd8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs @@ -0,0 +1,22 @@ +using System; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers.SelectorUI +{ + sealed class Category : MonoBehaviour + { +#pragma warning disable 0649 + + [SerializeField] + private Text _text; + +#pragma warning restore + + public void SetLabel(string category) + { + this._text.text = category; + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs.meta new file mode 100644 index 00000000..288bff24 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1101c9e1e1276414d8062a6a7ca4db45 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab new file mode 100644 index 00000000..16e4d7d3 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab @@ -0,0 +1,171 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1001 &100100000 +Prefab: + m_ObjectHideFlags: 1 + serializedVersion: 2 + m_Modification: + m_TransformParent: {fileID: 0} + m_Modifications: [] + m_RemovedComponents: [] + m_ParentPrefab: {fileID: 0} + m_RootGameObject: {fileID: 1904131878966858} + m_IsPrefabParent: 1 +--- !u!1 &1904131878966858 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224461754452575090} + - component: {fileID: 114104161713339180} + - component: {fileID: 114607162270506794} + - component: {fileID: 114804161523563040} + m_Layer: 5 + m_Name: Category + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1966926200078894 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224471434808036404} + - component: {fileID: 222752501853716432} + - component: {fileID: 114045595599197664} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &114045595599197664 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1966926200078894} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 14 + m_FontStyle: 1 + m_BestFit: 0 + m_MinSize: 10 + m_MaxSize: 40 + m_Alignment: 4 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: Sample Name +--- !u!114 &114104161713339180 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1904131878966858} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1101c9e1e1276414d8062a6a7ca4db45, type: 3} + m_Name: + m_EditorClassIdentifier: + _text: {fileID: 114045595599197664} +--- !u!114 &114607162270506794 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1904131878966858} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1741964061, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 2 + m_VerticalFit: 2 +--- !u!114 &114804161523563040 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1904131878966858} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1297475563, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 +--- !u!222 &222752501853716432 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1966926200078894} +--- !u!224 &224461754452575090 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1904131878966858} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: + - {fileID: 224471434808036404} + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 400, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224471434808036404 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1966926200078894} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224461754452575090} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab.meta new file mode 100644 index 00000000..0d2ad140 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab.meta @@ -0,0 +1,17 @@ +fileFormatVersion: 2 +guid: fc69717198f6d93498890b7b67812172 +timeCreated: 1571212112 +licenseType: Store +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 100100000 + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/Category.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs new file mode 100644 index 00000000..a6ab1bde --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs @@ -0,0 +1,37 @@ +using System; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers.SelectorUI +{ + sealed class ExampleInfo : MonoBehaviour + { +#pragma warning disable 0649 + [SerializeField] + private Text _header; + + [SerializeField] + private Text _description; + +#pragma warning restore + + private SampleSelectorUI _parentUI; + + private SampleBase _example; + + public void Setup(SampleSelectorUI parentUI, SampleBase example) + { + this._parentUI = parentUI; + this._example = example; + + this._header.text = this._example.name; + this._description.text = this._example.Description; + } + + public void OnExecuteExample() + { + this._parentUI.ExecuteExample(this._example); + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs.meta new file mode 100644 index 00000000..601752a7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fd424cc4259865c4ba2fb4d9d68d0272 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab new file mode 100644 index 00000000..575f68f0 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab @@ -0,0 +1,507 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1001 &100100000 +Prefab: + m_ObjectHideFlags: 1 + serializedVersion: 2 + m_Modification: + m_TransformParent: {fileID: 0} + m_Modifications: [] + m_RemovedComponents: [] + m_ParentPrefab: {fileID: 0} + m_RootGameObject: {fileID: 1844362866936956} + m_IsPrefabParent: 1 +--- !u!1 &1164538047482000 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224919186422011706} + - component: {fileID: 222389287056714158} + - component: {fileID: 114764438814610556} + - component: {fileID: 114425745104630664} + - component: {fileID: 114698872193548206} + - component: {fileID: 114431572224555080} + m_Layer: 5 + m_Name: Execute Sample Button + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1248744110497022 +GameObject: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224829437101102402} + - component: {fileID: 222702223361243722} + - component: {fileID: 114859111753421280} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1397735183102074 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224216400874628136} + - component: {fileID: 222516365031537928} + - component: {fileID: 114059492809184142} + - component: {fileID: 114493726555860862} + m_Layer: 5 + m_Name: Description + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1531245648659982 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224368887501416132} + - component: {fileID: 222882642833739976} + - component: {fileID: 114666879149101946} + m_Layer: 5 + m_Name: Header + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1844362866936956 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224811306304922960} + - component: {fileID: 114988937263723000} + - component: {fileID: 114645756897919032} + - component: {fileID: 114471653971156696} + m_Layer: 5 + m_Name: ExampleInfo + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &114059492809184142 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1397735183102074} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 14 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 10 + m_MaxSize: 40 + m_Alignment: 0 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: Description +--- !u!114 &114425745104630664 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1392445389, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 114764438814610556} + m_OnClick: + m_PersistentCalls: + m_Calls: + - m_Target: {fileID: 114471653971156696} + m_MethodName: OnExecuteExample + m_Mode: 1 + m_Arguments: + m_ObjectArgument: {fileID: 0} + m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine + m_IntArgument: 0 + m_FloatArgument: 0 + m_StringArgument: + m_BoolArgument: 0 + m_CallState: 2 + m_TypeName: UnityEngine.UI.Button+ButtonClickedEvent, UnityEngine.UI, Version=1.0.0.0, + Culture=neutral, PublicKeyToken=null +--- !u!114 &114431572224555080 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1741964061, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!114 &114471653971156696 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1844362866936956} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fd424cc4259865c4ba2fb4d9d68d0272, type: 3} + m_Name: + m_EditorClassIdentifier: + _header: {fileID: 114666879149101946} + _description: {fileID: 114059492809184142} +--- !u!114 &114493726555860862 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1397735183102074} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1679637790, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: 1 + m_FlexibleHeight: 1 + m_LayoutPriority: 1 +--- !u!114 &114645756897919032 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1844362866936956} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1679637790, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: 3 + m_FlexibleHeight: 1 + m_LayoutPriority: 1 +--- !u!114 &114666879149101946 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1531245648659982} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 24 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 2 + m_MaxSize: 40 + m_Alignment: 1 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: Header +--- !u!114 &114698872193548206 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1297475563, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 5 + m_Top: 5 + m_Bottom: 5 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 0 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 +--- !u!114 &114764438814610556 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: -765806418, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 +--- !u!114 &114859111753421280 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1248744110497022} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 14 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 10 + m_MaxSize: 40 + m_Alignment: 4 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: Execute +--- !u!114 &114988937263723000 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1844362866936956} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1297475563, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 5 + m_Top: 5 + m_Bottom: 5 + m_ChildAlignment: 0 + m_Spacing: 5 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 0 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 +--- !u!222 &222389287056714158 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} +--- !u!222 &222516365031537928 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1397735183102074} +--- !u!222 &222702223361243722 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1248744110497022} +--- !u!222 &222882642833739976 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1531245648659982} +--- !u!224 &224216400874628136 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1397735183102074} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224811306304922960} + m_RootOrder: 1 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224368887501416132 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1531245648659982} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224811306304922960} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224811306304922960 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1844362866936956} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: + - {fileID: 224368887501416132} + - {fileID: 224216400874628136} + - {fileID: 224919186422011706} + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224829437101102402 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1248744110497022} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224919186422011706} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224919186422011706 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1164538047482000} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: + - {fileID: 224829437101102402} + m_Father: {fileID: 224811306304922960} + m_RootOrder: 2 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 300, y: 0} + m_SizeDelta: {x: 590, y: 0} + m_Pivot: {x: 0.5, y: 0.5} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab.meta new file mode 100644 index 00000000..823272d8 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab.meta @@ -0,0 +1,17 @@ +fileFormatVersion: 2 +guid: d57a4ffd57493de4f9f41009f52c658e +timeCreated: 1571212676 +licenseType: Store +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 100100000 + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleInfo.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs new file mode 100644 index 00000000..ddfa6ea1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs @@ -0,0 +1,32 @@ +using System; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers.SelectorUI +{ + sealed class ExampleListItem : MonoBehaviour + { +#pragma warning disable 0649 + [SerializeField] + private Text _text; +#pragma warning restore + + public SampleSelectorUI ParentUI { get; private set; } + + public SampleBase ExamplePrefab { get; private set; } + + public void Setup(SampleSelectorUI parentUI, SampleBase prefab) + { + this.ParentUI = parentUI; + this.ExamplePrefab = prefab; + + this._text.text = prefab.DisplayName; + } + + public void OnButton() + { + this.ParentUI.SelectSample(this); + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs.meta new file mode 100644 index 00000000..08917f32 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 376fb4eb0776e41479fb60f520aaa1f3 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab new file mode 100644 index 00000000..53317c3c --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab @@ -0,0 +1,222 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1001 &100100000 +Prefab: + m_ObjectHideFlags: 1 + serializedVersion: 2 + m_Modification: + m_TransformParent: {fileID: 0} + m_Modifications: [] + m_RemovedComponents: [] + m_ParentPrefab: {fileID: 0} + m_RootGameObject: {fileID: 1972462828926934} + m_IsPrefabParent: 1 +--- !u!1 &1706707392201452 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224973040142512786} + - component: {fileID: 222441293650573372} + - component: {fileID: 114389340898110916} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1972462828926934 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224145737800144754} + - component: {fileID: 222972952305363732} + - component: {fileID: 114266276035656386} + - component: {fileID: 114629809360314506} + - component: {fileID: 114416681848148688} + m_Layer: 5 + m_Name: ExampleListItem + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &114266276035656386 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1972462828926934} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: -765806418, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 +--- !u!114 &114389340898110916 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1706707392201452} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 14 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 10 + m_MaxSize: 40 + m_Alignment: 4 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: Button +--- !u!114 &114416681848148688 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1972462828926934} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 376fb4eb0776e41479fb60f520aaa1f3, type: 3} + m_Name: + m_EditorClassIdentifier: + _text: {fileID: 114389340898110916} +--- !u!114 &114629809360314506 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1972462828926934} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1392445389, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 114266276035656386} + m_OnClick: + m_PersistentCalls: + m_Calls: + - m_Target: {fileID: 114416681848148688} + m_MethodName: OnButton + m_Mode: 1 + m_Arguments: + m_ObjectArgument: {fileID: 0} + m_ObjectArgumentAssemblyTypeName: UnityEngine.Object, UnityEngine + m_IntArgument: 0 + m_FloatArgument: 0 + m_StringArgument: + m_BoolArgument: 0 + m_CallState: 2 + m_TypeName: UnityEngine.UI.Button+ButtonClickedEvent, UnityEngine.UI, Version=1.0.0.0, + Culture=neutral, PublicKeyToken=null +--- !u!222 &222441293650573372 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1706707392201452} +--- !u!222 &222972952305363732 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1972462828926934} +--- !u!224 &224145737800144754 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1972462828926934} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: + - {fileID: 224973040142512786} + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 160, y: 30} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224973040142512786 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1706707392201452} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224145737800144754} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab.meta new file mode 100644 index 00000000..2b004c2c --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab.meta @@ -0,0 +1,17 @@ +fileFormatVersion: 2 +guid: 216b271b42611e447829c7e7de089ab4 +timeCreated: 1571212394 +licenseType: Store +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 100100000 + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/ExampleListItem.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs new file mode 100644 index 00000000..19390902 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs @@ -0,0 +1,106 @@ +using System; +using System.Linq; +using System.Collections.Generic; +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers.SelectorUI +{ + class SampleSelectorUI : MonoBehaviour + { +#pragma warning disable 0649, 0169 + public string BaseURL = "https://besthttpwebgldemo.azurewebsites.net"; + + [HideInInspector] + public SampleBase selectedExamplePrefab; + + [SerializeField] + private Category _categoryListItemPrefab; + + [SerializeField] + private ExampleListItem _exampleListItemPrefab; + + [SerializeField] + private ExampleInfo _exampleInfoPrefab; + + [SerializeField] + private RectTransform _listRoot; + + [SerializeField] + private RectTransform _dyncamicContentRoot; + + [SerializeField] + private List _samples = new List(); + + private ExampleListItem selectedSample; + private GameObject dynamicContent; + +#pragma warning restore + + private void Start() + { + DisplayExamples(); + } + + private void DisplayExamples() + { + // Sort examples by category + this._samples.Sort((a, b) => { + if (a == null || b == null) + return 0; + + int result = a.Category.CompareTo(b.Category); + if (result == 0) + result = a.DisplayName.CompareTo(b.DisplayName); + return result; + }); + + string currentCategory = null; + + for (int i = 0; i < this._samples.Count; ++i) + { + var examplePrefab = this._samples[i]; + + if (examplePrefab == null) + continue; + + if (examplePrefab.BannedPlatforms.Contains(UnityEngine.Application.platform)) + continue; + + if (currentCategory != examplePrefab.Category) + { + var category = Instantiate(this._categoryListItemPrefab, this._listRoot, false); + category.SetLabel(examplePrefab.Category); + + currentCategory = examplePrefab.Category; + } + + var listItem = Instantiate(this._exampleListItemPrefab, this._listRoot, false); + listItem.Setup(this, examplePrefab); + + if (this.selectedExamplePrefab == null) + { + SelectSample(listItem); + } + } + } + + public void SelectSample(ExampleListItem item) + { + this.selectedExamplePrefab = item.ExamplePrefab; + if (this.dynamicContent != null) + Destroy(this.dynamicContent); + + var example = Instantiate(this._exampleInfoPrefab, this._dyncamicContentRoot, false); + example.Setup(this, item.ExamplePrefab); + this.dynamicContent = example.gameObject; + } + + public void ExecuteExample(SampleBase example) + { + if (this.dynamicContent != null) + Destroy(this.dynamicContent); + this.dynamicContent = Instantiate(example, this._dyncamicContentRoot, false).gameObject; + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs.meta new file mode 100644 index 00000000..d3299a4c --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: bd639b2a784de314984c606b7e8329e4 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/SelectorUI/SampleSelectorUI.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs new file mode 100644 index 00000000..07897b6c --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs @@ -0,0 +1,25 @@ +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples.Helpers +{ + class TextListItem : MonoBehaviour + { +#pragma warning disable 0649 + [SerializeField] + protected Text _text; +#pragma warning restore + + public TextListItem SetText(string text) + { + this._text.text = text; + return this; + } + + public TextListItem AddLeftPadding(int padding) + { + this.GetComponent().padding.left += padding; + return this; + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs.meta new file mode 100644 index 00000000..9a76f51f --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 05975660b0231b84f849693106b207d1 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab new file mode 100644 index 00000000..9bec234d --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab @@ -0,0 +1,206 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1001 &100100000 +Prefab: + m_ObjectHideFlags: 1 + serializedVersion: 2 + m_Modification: + m_TransformParent: {fileID: 0} + m_Modifications: [] + m_RemovedComponents: [] + m_ParentPrefab: {fileID: 0} + m_RootGameObject: {fileID: 1727935926237334} + m_IsPrefabParent: 1 +--- !u!1 &1503879635514882 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224106021874867618} + - component: {fileID: 222738347872656220} + - component: {fileID: 114900463745114476} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!1 &1727935926237334 +GameObject: + m_ObjectHideFlags: 0 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + serializedVersion: 5 + m_Component: + - component: {fileID: 224916463173798366} + - component: {fileID: 222969618919079142} + - component: {fileID: 114878452276715702} + - component: {fileID: 114769119028883068} + - component: {fileID: 114599056085522236} + - component: {fileID: 114144824129317776} + m_Layer: 5 + m_Name: TextListItem + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!114 &114144824129317776 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 05975660b0231b84f849693106b207d1, type: 3} + m_Name: + m_EditorClassIdentifier: + _text: {fileID: 114900463745114476} +--- !u!114 &114599056085522236 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1741964061, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!114 &114769119028883068 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 1297475563, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 2 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 0 + m_Spacing: 2 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 +--- !u!114 &114878452276715702 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: -765806418, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.39215687} + m_RaycastTarget: 0 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 +--- !u!114 &114900463745114476 +MonoBehaviour: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1503879635514882} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 708705254, guid: f5f67c52d1564df4a8936ccd202a3bd8, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_TypeName: UnityEngine.UI.MaskableGraphic+CullStateChangedEvent, UnityEngine.UI, + Version=1.0.0.0, Culture=neutral, PublicKeyToken=null + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 10 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 1 + m_MaxSize: 40 + m_Alignment: 0 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: New Text +--- !u!222 &222738347872656220 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1503879635514882} +--- !u!222 &222969618919079142 +CanvasRenderer: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} +--- !u!224 &224106021874867618 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1503879635514882} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: [] + m_Father: {fileID: 224916463173798366} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!224 &224916463173798366 +RectTransform: + m_ObjectHideFlags: 1 + m_PrefabParentObject: {fileID: 0} + m_PrefabInternal: {fileID: 100100000} + m_GameObject: {fileID: 1727935926237334} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_Children: + - {fileID: 224106021874867618} + m_Father: {fileID: 0} + m_RootOrder: 0 + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 400, y: 0} + m_SizeDelta: {x: 800, y: 0} + m_Pivot: {x: 0.5, y: 0.5} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab.meta new file mode 100644 index 00000000..2d12ec86 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab.meta @@ -0,0 +1,17 @@ +fileFormatVersion: 2 +guid: 46bdaff7a8bf5d34da870d286f962c69 +timeCreated: 1571213203 +licenseType: Store +NativeFormatImporter: + externalObjects: {} + mainObjectFileID: 100100000 + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextListItem.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs new file mode 100644 index 00000000..cb6c80d1 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs @@ -0,0 +1,27 @@ +using Best.HTTP.Examples.Helpers; + +using UnityEngine; +using UnityEngine.UI; + +namespace Best.HTTP.Examples +{ + class TextWithImageListItem : MultiTextListItem + { +#pragma warning disable 0649 + [SerializeField] + protected RawImage _image; +#pragma warning restore + + public new TextWithImageListItem SetStatusText(string text) + { + this._statusText.text = text; + return this; + } + + public TextWithImageListItem SetImage(Texture2D texture) + { + this._image.texture = texture; + return this; + } + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs.meta new file mode 100644 index 00000000..5fe0a7f4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e83916b64c7a21546a271b64f966583a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab new file mode 100644 index 00000000..364acd65 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab @@ -0,0 +1,455 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &1213827631941394660 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4882494726244793729} + - component: {fileID: 7821694538642742344} + - component: {fileID: 5465491216742829538} + m_Layer: 5 + m_Name: Panel + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4882494726244793729 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7821694538642742344 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_CullTransparentMesh: 1 +--- !u!114 &5465491216742829538 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1213827631941394660} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: -1 + m_MinHeight: -1 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: 1000 + m_FlexibleHeight: -1 + m_LayoutPriority: 1 +--- !u!1 &2730082108177940907 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2349869341790252760} + - component: {fileID: 7294666267679755399} + - component: {fileID: 1945985923753374133} + m_Layer: 5 + m_Name: Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2349869341790252760 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7294666267679755399 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_CullTransparentMesh: 1 +--- !u!114 &1945985923753374133 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2730082108177940907} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5f7201a12d95ffc409449d95f23cf332, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 9 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 1 + m_MaxSize: 40 + m_Alignment: 3 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: +--- !u!1 &4552705929141052376 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2882360993746877331} + - component: {fileID: 2771079376569378743} + - component: {fileID: 8493156114657527991} + - component: {fileID: 6070074926493679699} + - component: {fileID: 3669513657079693600} + - component: {fileID: 7102102869452703622} + m_Layer: 5 + m_Name: TextWithImageListItem + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2882360993746877331 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2349869341790252760} + - {fileID: 4882494726244793729} + - {fileID: 4451687393144823326} + - {fileID: 7796849535850586115} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 300, y: 0} + m_SizeDelta: {x: 600, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &2771079376569378743 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_CullTransparentMesh: 1 +--- !u!114 &8493156114657527991 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.39215687} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &6070074926493679699 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 30649d3a9faa99c48a7b1166b86bf2a0, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 5 + m_Right: 5 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 4 + m_Spacing: 2 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &3669513657079693600 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!114 &7102102869452703622 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4552705929141052376} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: e83916b64c7a21546a271b64f966583a, type: 3} + m_Name: + m_EditorClassIdentifier: + _text: {fileID: 1945985923753374133} + _statusText: {fileID: 7080624304052066226} + _image: {fileID: 371465610683618718} +--- !u!1 &6135673798412074479 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 4451687393144823326} + - component: {fileID: 8100882870430957419} + - component: {fileID: 7080624304052066226} + m_Layer: 5 + m_Name: Status Text + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &4451687393144823326 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &8100882870430957419 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_CullTransparentMesh: 1 +--- !u!114 &7080624304052066226 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 6135673798412074479} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 5f7201a12d95ffc409449d95f23cf332, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 0.19607843, g: 0.19607843, b: 0.19607843, a: 1} + m_RaycastTarget: 0 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_FontData: + m_Font: {fileID: 10102, guid: 0000000000000000e000000000000000, type: 0} + m_FontSize: 9 + m_FontStyle: 0 + m_BestFit: 0 + m_MinSize: 1 + m_MaxSize: 40 + m_Alignment: 3 + m_AlignByGeometry: 0 + m_RichText: 1 + m_HorizontalOverflow: 0 + m_VerticalOverflow: 0 + m_LineSpacing: 1 + m_Text: +--- !u!1 &8593035604352705004 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7796849535850586115} + - component: {fileID: 1475763273988903106} + - component: {fileID: 371465610683618718} + - component: {fileID: 4167250943143580359} + m_Layer: 5 + m_Name: RawImage + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7796849535850586115 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8593035604352705004} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 2882360993746877331} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &1475763273988903106 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8593035604352705004} + m_CullTransparentMesh: 1 +--- !u!114 &371465610683618718 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8593035604352705004} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1344c3c82d62a2a41a3576d8abb8e3ea, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Texture: {fileID: 0} + m_UVRect: + serializedVersion: 2 + x: 0 + y: 0 + width: 1 + height: 1 +--- !u!114 &4167250943143580359 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 8593035604352705004} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 306cc8c2b49d7114eaa3623786fc2126, type: 3} + m_Name: + m_EditorClassIdentifier: + m_IgnoreLayout: 0 + m_MinWidth: 32 + m_MinHeight: 32 + m_PreferredWidth: -1 + m_PreferredHeight: -1 + m_FlexibleWidth: -1 + m_FlexibleHeight: -1 + m_LayoutPriority: 1 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab.meta new file mode 100644 index 00000000..d14027c4 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 71014fbf405e2aa409e8f884753145e0 +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UI Helpers/TextWithImageListItem.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs new file mode 100644 index 00000000..3b962c8a --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs @@ -0,0 +1,121 @@ +using System.Collections; + +using Best.HTTP.Examples.Helpers; +using Best.HTTP.Request.Upload; + +using UnityEngine; + +namespace Best.HTTP.Examples +{ + /// + /// On-demand upload + /// + class UploadOnDemand : SampleBase + { +#pragma warning disable 0649, 0169 + [Header("Sample Fields")] + + /// + /// GameObject that will be used as a root for new UI objects. + /// + [SerializeField] + private RectTransform _contentRoot; + + /// + /// Prefab of a UI object with two Text fields. + /// + [SerializeField] + private MultiTextListItem _listItemPrefab; + +#pragma warning restore + + /// + /// Address of the used end point. + /// + private string _baseAddress = "https://httpbin.org/post"; + + protected override void Start() + { + base.Start(); + + // create request + var request = HTTPRequest.CreatePost(_baseAddress, OnUploadFinished); + + // setup + request.UploadSettings.UploadStream = new DynamicUploadStream(); + request.UploadSettings.OnHeadersSent += UploadSettings_OnBeforeHeaderSend; + + // send + request.Send(); + + CreateUIText("Connecting..."); + } + + /// + /// This callback fired before the request's headers are sent. It's a good opportunity to start generating our (fake) data. + /// + private void UploadSettings_OnBeforeHeaderSend(HTTPRequest req) + => StartCoroutine(GenerateData(req)); + + /// + /// This is our main logic to generate fake data and feed it to the upload stream to send it to the server. + /// + private IEnumerator GenerateData(HTTPRequest req) + { + const int MAX_CHUNKS = 10; + const int CHUNK_SIZE = 16 * 1024; + + CreateUIText("Connected, upload can start"); + + // get the upload stream + DynamicUploadStream uploadStream = req.UploadSettings.UploadStream as DynamicUploadStream; + + try + { + int uploadedChunks = 0; + do + { + yield return new WaitForSeconds(2f); + + // check whether the request is finished, it can be in an errored state + if (req.State >= HTTPRequestStates.Finished) + break; + + // write the data to the stream and let the connection know about it + uploadStream.Write(new byte[CHUNK_SIZE], 0, CHUNK_SIZE); + + CreateUIText($"Added new chunk to upload ({uploadedChunks + 1} / {MAX_CHUNKS})"); + + } while (++uploadedChunks < MAX_CHUNKS); + } + finally + { + // complete upload + uploadStream.Complete(); + } + } + + /// + /// Callback of the request when finished. + /// + private void OnUploadFinished(HTTPRequest req, HTTPResponse resp) + { + if (resp != null) + { + if (resp.IsSuccess) + CreateUIText("Response recceived, finished succesfully!"); + else + CreateUIText($"Finished with error: {resp.StatusCode} - {resp.Message}!"); + } + else + CreateUIText(req.State.ToString()); + } + + /// + /// UI helper function to create a list item from a prefab and set its text to display. + /// + TextListItem CreateUIText(string text) + => Instantiate(this._listItemPrefab, this._contentRoot) + .SetText(text); + } +} diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs.meta new file mode 100644 index 00000000..71e68ae7 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ab1416d05b2958a4c8da7c443d3ffb6d +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.cs + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab new file mode 100644 index 00000000..bffa0e28 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab @@ -0,0 +1,834 @@ +%YAML 1.1 +%TAG !u! tag:unity3d.com,2011: +--- !u!1 &903350717354755225 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7007236754976678714} + - component: {fileID: 2555981889066209670} + - component: {fileID: 1151654705137457198} + m_Layer: 5 + m_Name: UploadOnDemandSample + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7007236754976678714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 8650445495067976892} + m_Father: {fileID: 0} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!114 &2555981889066209670 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: ab1416d05b2958a4c8da7c443d3ffb6d, type: 3} + m_Name: + m_EditorClassIdentifier: + Category: HTTP + DisplayName: On-demand upload + Description: Upload data when generated. + BannedPlatforms: 11000000 + _contentRoot: {fileID: 6604464276219658894} + _listItemPrefab: {fileID: -3498759215503465087, guid: b207057102717c245bc5a19e64fa12c1, type: 3} +--- !u!114 &1151654705137457198 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 903350717354755225} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 0 + m_Right: 0 + m_Top: 0 + m_Bottom: 0 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!1 &1854499400493494727 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 8650445495067976892} + - component: {fileID: 9200161450982655203} + - component: {fileID: 5112288953005728145} + - component: {fileID: 7665647606295342865} + m_Layer: 5 + m_Name: Scroll View + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &8650445495067976892 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_LocalRotation: {x: 0, y: 0, z: 0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 117071753727847718} + - {fileID: 459545209181084714} + - {fileID: 7276839050644030826} + m_Father: {fileID: 7007236754976678714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &9200161450982655203 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_CullTransparentMesh: 1 +--- !u!114 &5112288953005728145 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 0.392} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &7665647606295342865 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 1854499400493494727} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 1aa08ab6e0800fa44ae55d278d1423e3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Content: {fileID: 6604464276219658894} + m_Horizontal: 1 + m_Vertical: 1 + m_MovementType: 1 + m_Elasticity: 0.01 + m_Inertia: 1 + m_DecelerationRate: 0.135 + m_ScrollSensitivity: 10 + m_Viewport: {fileID: 117071753727847718} + m_HorizontalScrollbar: {fileID: 8661630027537866783} + m_VerticalScrollbar: {fileID: 254031285640752516} + m_HorizontalScrollbarVisibility: 2 + m_VerticalScrollbarVisibility: 2 + m_HorizontalScrollbarSpacing: -3 + m_VerticalScrollbarSpacing: -3 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2177670345246438811 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 9001054589328223343} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &9001054589328223343 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2177670345246438811} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 5760576963063549503} + m_Father: {fileID: 459545209181084714} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &2323931042280143310 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 459545209181084714} + - component: {fileID: 8470518558107698889} + - component: {fileID: 8408684624493673837} + - component: {fileID: 8661630027537866783} + m_Layer: 5 + m_Name: Scrollbar Horizontal + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &459545209181084714 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 9001054589328223343} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 20} + m_Pivot: {x: 0, y: 0} +--- !u!222 &8470518558107698889 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_CullTransparentMesh: 1 +--- !u!114 &8408684624493673837 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &8661630027537866783 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2323931042280143310} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 3255451244186246724} + m_HandleRect: {fileID: 5760576963063549503} + m_Direction: 0 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &2477997044408603591 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 2016231753930208085} + - component: {fileID: 4317566855085328380} + - component: {fileID: 2316099658992057044} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &2016231753930208085 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 6184429662520560369} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &4317566855085328380 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_CullTransparentMesh: 1 +--- !u!114 &2316099658992057044 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 2477997044408603591} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &3600311992825163093 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 7276839050644030826} + - component: {fileID: 7755616364947203418} + - component: {fileID: 3326566895285991693} + - component: {fileID: 254031285640752516} + m_Layer: 5 + m_Name: Scrollbar Vertical + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &7276839050644030826 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6184429662520560369} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 1, y: 0} + m_AnchorMax: {x: 1, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 0} + m_Pivot: {x: 1, y: 1} +--- !u!222 &7755616364947203418 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_CullTransparentMesh: 1 +--- !u!114 &3326566895285991693 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10907, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &254031285640752516 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 3600311992825163093} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 2a4db7a114972834c8e4117be1d82ba3, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Navigation: + m_Mode: 3 + m_WrapAround: 0 + m_SelectOnUp: {fileID: 0} + m_SelectOnDown: {fileID: 0} + m_SelectOnLeft: {fileID: 0} + m_SelectOnRight: {fileID: 0} + m_Transition: 1 + m_Colors: + m_NormalColor: {r: 1, g: 1, b: 1, a: 1} + m_HighlightedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_PressedColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 1} + m_SelectedColor: {r: 0.9607843, g: 0.9607843, b: 0.9607843, a: 1} + m_DisabledColor: {r: 0.78431374, g: 0.78431374, b: 0.78431374, a: 0.5019608} + m_ColorMultiplier: 1 + m_FadeDuration: 0.1 + m_SpriteState: + m_HighlightedSprite: {fileID: 0} + m_PressedSprite: {fileID: 0} + m_SelectedSprite: {fileID: 0} + m_DisabledSprite: {fileID: 0} + m_AnimationTriggers: + m_NormalTrigger: Normal + m_HighlightedTrigger: Highlighted + m_PressedTrigger: Pressed + m_SelectedTrigger: Selected + m_DisabledTrigger: Disabled + m_Interactable: 1 + m_TargetGraphic: {fileID: 2316099658992057044} + m_HandleRect: {fileID: 2016231753930208085} + m_Direction: 2 + m_Value: 0 + m_Size: 1 + m_NumberOfSteps: 0 + m_OnValueChanged: + m_PersistentCalls: + m_Calls: [] +--- !u!1 &4797047544337289245 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6184429662520560369} + m_Layer: 5 + m_Name: Sliding Area + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6184429662520560369 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4797047544337289245} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 2016231753930208085} + m_Father: {fileID: 7276839050644030826} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: -20, y: -20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!1 &4877496602529206417 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 5760576963063549503} + - component: {fileID: 7027904230122806289} + - component: {fileID: 3255451244186246724} + m_Layer: 5 + m_Name: Handle + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &5760576963063549503 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 9001054589328223343} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 20, y: 20} + m_Pivot: {x: 0.5, y: 0.5} +--- !u!222 &7027904230122806289 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_CullTransparentMesh: 1 +--- !u!114 &3255451244186246724 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 4877496602529206417} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10905, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!1 &5098610927303858027 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 6604464276219658894} + - component: {fileID: 2513128939934536204} + - component: {fileID: 5648973929569191020} + m_Layer: 5 + m_Name: Content + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &6604464276219658894 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: [] + m_Father: {fileID: 117071753727847718} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 1} + m_AnchorMax: {x: 1, y: 1} + m_AnchoredPosition: {x: 0, y: 0.000011444092} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!114 &2513128939934536204 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 59f8146938fff824cb5fd77236b75775, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Padding: + m_Left: 2 + m_Right: 2 + m_Top: 2 + m_Bottom: 2 + m_ChildAlignment: 0 + m_Spacing: 0 + m_ChildForceExpandWidth: 1 + m_ChildForceExpandHeight: 1 + m_ChildControlWidth: 1 + m_ChildControlHeight: 1 + m_ChildScaleWidth: 0 + m_ChildScaleHeight: 0 + m_ReverseArrangement: 0 +--- !u!114 &5648973929569191020 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 5098610927303858027} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 3245ec927659c4140ac4f8d17403cc18, type: 3} + m_Name: + m_EditorClassIdentifier: + m_HorizontalFit: 0 + m_VerticalFit: 2 +--- !u!1 &7481711741464053682 +GameObject: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + serializedVersion: 6 + m_Component: + - component: {fileID: 117071753727847718} + - component: {fileID: 159606425555236561} + - component: {fileID: 3861525948216551917} + - component: {fileID: 4080910020504356785} + m_Layer: 5 + m_Name: Viewport + m_TagString: Untagged + m_Icon: {fileID: 0} + m_NavMeshLayer: 0 + m_StaticEditorFlags: 0 + m_IsActive: 1 +--- !u!224 &117071753727847718 +RectTransform: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_LocalRotation: {x: -0, y: -0, z: -0, w: 1} + m_LocalPosition: {x: 0, y: 0, z: 0} + m_LocalScale: {x: 1, y: 1, z: 1} + m_ConstrainProportionsScale: 0 + m_Children: + - {fileID: 6604464276219658894} + m_Father: {fileID: 8650445495067976892} + m_LocalEulerAnglesHint: {x: 0, y: 0, z: 0} + m_AnchorMin: {x: 0, y: 0} + m_AnchorMax: {x: 0, y: 0} + m_AnchoredPosition: {x: 0, y: 0} + m_SizeDelta: {x: 0, y: 0} + m_Pivot: {x: 0, y: 1} +--- !u!222 &159606425555236561 +CanvasRenderer: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_CullTransparentMesh: 1 +--- !u!114 &3861525948216551917 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: fe87c0e1cc204ed48ad3b37840f39efc, type: 3} + m_Name: + m_EditorClassIdentifier: + m_Material: {fileID: 0} + m_Color: {r: 1, g: 1, b: 1, a: 1} + m_RaycastTarget: 1 + m_RaycastPadding: {x: 0, y: 0, z: 0, w: 0} + m_Maskable: 1 + m_OnCullStateChanged: + m_PersistentCalls: + m_Calls: [] + m_Sprite: {fileID: 10917, guid: 0000000000000000f000000000000000, type: 0} + m_Type: 1 + m_PreserveAspect: 0 + m_FillCenter: 1 + m_FillMethod: 4 + m_FillAmount: 1 + m_FillClockwise: 1 + m_FillOrigin: 0 + m_UseSpriteMesh: 0 + m_PixelsPerUnitMultiplier: 1 +--- !u!114 &4080910020504356785 +MonoBehaviour: + m_ObjectHideFlags: 0 + m_CorrespondingSourceObject: {fileID: 0} + m_PrefabInstance: {fileID: 0} + m_PrefabAsset: {fileID: 0} + m_GameObject: {fileID: 7481711741464053682} + m_Enabled: 1 + m_EditorHideFlags: 0 + m_Script: {fileID: 11500000, guid: 31a19414c41e5ae4aae2af33fee712f6, type: 3} + m_Name: + m_EditorClassIdentifier: + m_ShowMaskGraphic: 0 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab.meta b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab.meta new file mode 100644 index 00000000..78fe2789 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: a943cc9c19496f043b5ddbc45147560a +PrefabImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/UploadOnDemandSample.prefab + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef b/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef new file mode 100644 index 00000000..597d8402 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef @@ -0,0 +1,17 @@ +{ + "name": "com.Tivadar.Best.HTTP.Samples.WithUI", + "rootNamespace": "Best.HTTP.Examples", + "references": [ + "com.Tivadar.Best.HTTP", + "UniTask" + ], + "includePlatforms": [], + "excludePlatforms": [], + "allowUnsafeCode": false, + "overrideReferences": false, + "precompiledReferences": [], + "autoReferenced": false, + "defineConstraints": [], + "versionDefines": [], + "noEngineReferences": false +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef.meta b/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef.meta new file mode 100644 index 00000000..4d14f391 --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 0d3f16b2c39a69f41a5c54013be80913 +AssemblyDefinitionImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/com.Tivadar.Best.HTTP.Samples.WithUI.asmdef + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp b/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp new file mode 100644 index 00000000..eb8e17aa --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp @@ -0,0 +1,5 @@ +#https://forum.unity.com/threads/rsp-file-per-assembly-or-folder.572758/ + +#https://learn.microsoft.com/en-us/dotnet/csharp/language-reference/compiler-options/errors-warnings +-warnaserror +-nowarn:CS1701,CS0612 \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp.meta b/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp.meta new file mode 100644 index 00000000..136fa88d --- /dev/null +++ b/Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: dc506b00296e1f64384535d743f8355a +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Samples~/With UI/csc.rsp + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/Third Party Notices.md b/Packages/com.tivadar.best.http/Third Party Notices.md new file mode 100644 index 00000000..6805a821 --- /dev/null +++ b/Packages/com.tivadar.best.http/Third Party Notices.md @@ -0,0 +1,88 @@ +This asset is governed by the Asset Store EULA; however, the following components are governed by the licenses indicated below: + +(A.) DotNetZip +-------------- + +Microsoft Public License (MS-PL) + +This license governs use of the accompanying software. If you use the software, you accept this license. If you do not accept the license, do not use the software. + +1. Definitions +The terms "reproduce," "reproduction," "derivative works," and "distribution" have the +same meaning here as under U.S. copyright law. + +A "contribution" is the original software, or any additions or changes to the software. + +A "contributor" is any person that distributes its contribution under this license. + +"Licensed patents" are a contributor's patent claims that read directly on its contribution. + +2. Grant of Rights + +(A) Copyright Grant- Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a non-exclusive, worldwide, royalty-free copyright license to reproduce its contribution, prepare derivative works of its contribution, and distribute its contribution or any derivative works that you create. + +(B) Patent Grant- Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a non-exclusive, worldwide, royalty-free license under its licensed patents to make, have made, use, sell, offer for sale, import, and/or otherwise dispose of its contribution in the software or derivative works of the contribution in the software. + +3. Conditions and Limitations + +(A) No Trademark License- This license does not grant you rights to use any contributors' name, logo, or trademarks. + +(B) If you bring a patent claim against any contributor over patents that you claim are infringed by the software, your patent license from such contributor to the software ends automatically. + +(C) If you distribute any portion of the software, you must retain all copyright, patent, trademark, and attribution notices that are present in the software. + +(D) If you distribute any portion of the software in source code form, you may do so only under this license by including a complete copy of this license with your distribution. If you distribute any portion of the software in compiled or object code form, you may only do so under a license that complies with this license. + +(E) The software is licensed "as-is." You bear the risk of using it. The contributors give no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this license cannot change. To the extent permitted under your local laws, the contributors exclude the implied warranties of merchantability, fitness for a particular purpose and non-infringement. + + +(B.) BouncyCastle +----------------- + +MIT + +Copyright (c) 2000 - 2020 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org) + +Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + + +(C.) LitJson +------------ + +Public Domain + +This is free and unencumbered software released into the public domain. + +Anyone is free to copy, modify, publish, use, compile, sell, or +distribute this software, either in source code form or as a compiled +binary, for any purpose, commercial or non-commercial, and by any +means. + +In jurisdictions that recognize copyright laws, the author or authors +of this software dedicate any and all copyright interest in the +software to the public domain. We make this dedication for the benefit +of the public at large and to the detriment of our heirs and +successors. We intend this dedication to be an overt act of +relinquishment in perpetuity of all present and future rights to this +software under copyright law. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. +IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR +OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, +ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR +OTHER DEALINGS IN THE SOFTWARE. + +For more information, please refer to + +Thank you for reading this notice. Following the tradition of other public +domain projects, here's a blessing: + + May you find forgiveness for yourself and forgive others. + May you experience and share the gift of unconditional love. + May you see light, wherever the illusion of darkness appears. \ No newline at end of file diff --git a/Packages/com.tivadar.best.http/Third Party Notices.md.meta b/Packages/com.tivadar.best.http/Third Party Notices.md.meta new file mode 100644 index 00000000..3b4a19cb --- /dev/null +++ b/Packages/com.tivadar.best.http/Third Party Notices.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: babc017ae3bd0284993d6b97b2d7b52c +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/Third Party Notices.md + uploadId: 743984 diff --git a/Packages/com.tivadar.best.http/package.json b/Packages/com.tivadar.best.http/package.json new file mode 100644 index 00000000..f694a586 --- /dev/null +++ b/Packages/com.tivadar.best.http/package.json @@ -0,0 +1,27 @@ +{ + "name": "com.tivadar.best.http", + "displayName": "Best HTTP", + "description": "Best HTTP is a comprehensive networking library for Unity that empowers developers to make HTTP and HTTPS requests with ease. Whether you're building web applications, multiplayer games, or real-time communication solutions, Best HTTP has got you covered.", + "version": "3.0.15", + "unity": "2021.1", + "documentationUrl": "https://bestdocshub.pages.dev/HTTP/", + "changelogUrl": "https://bestdocshub.pages.dev/HTTP/changelog/", + "licensesUrl": "https://bestdocshub.pages.dev/HTTP/third-party-notices/", + "author": { + "name": "Tivadar György Nagy", + "email": "besthttp@gmail.com", + "url": "https://bestdocshub.pages.dev/" + }, + "keywords": [ "best", "besthttp", "http", "http2", "tls", "https", "DNS", "TCP", "request", "response" ], + "dependencies": { + "com.unity.burst": "1.8.19", + "com.unity.profiling.core": "1.0.0" + }, + "samples": [ + { + "displayName": "Samples with UI", + "description": "Contains sample code for various HTTP related scenarios.", + "path": "Samples~/With UI" + } + ] +} diff --git a/Packages/com.tivadar.best.http/package.json.meta b/Packages/com.tivadar.best.http/package.json.meta new file mode 100644 index 00000000..9f3dcd46 --- /dev/null +++ b/Packages/com.tivadar.best.http/package.json.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 7d151bb0d52d83642a2703de438bf02b +PackageManifestImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 267636 + packageName: Best HTTP + packageVersion: 3.0.15 + assetPath: Packages/com.tivadar.best.http/package.json + uploadId: 743984 diff --git a/Packages/com.tivadar.best.mqtt/CHANGELOG.md b/Packages/com.tivadar.best.mqtt/CHANGELOG.md new file mode 100644 index 00000000..30448a2b --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/CHANGELOG.md @@ -0,0 +1,3 @@ +# Changelog + +Up-to-date changelog can be found here: https://bestdocshub.pages.dev/MQTT/changelog/ \ No newline at end of file diff --git a/Packages/com.tivadar.best.mqtt/CHANGELOG.md.meta b/Packages/com.tivadar.best.mqtt/CHANGELOG.md.meta new file mode 100644 index 00000000..ed8ae39f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/CHANGELOG.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: af2983251948b1b4aaa31384b492aca7 +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/CHANGELOG.md + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/LICENSE.md b/Packages/com.tivadar.best.mqtt/LICENSE.md new file mode 100644 index 00000000..58d2a045 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/LICENSE.md @@ -0,0 +1 @@ +The plugin's license falls under the Unity Asset Store EULA that can be found here under Appendix 1: https://unity3d.com/legal/as_terms \ No newline at end of file diff --git a/Packages/com.tivadar.best.mqtt/LICENSE.md.meta b/Packages/com.tivadar.best.mqtt/LICENSE.md.meta new file mode 100644 index 00000000..6becdc46 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/LICENSE.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: fdf8f13d5b1f3c14baba65e0278f0346 +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/LICENSE.md + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/README.md b/Packages/com.tivadar.best.mqtt/README.md new file mode 100644 index 00000000..3f4f901f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/README.md @@ -0,0 +1,88 @@ +# Best MQTT + +Best MQTT is a premier Unity networking library, purpose-built for the seamless integration of the [MQTT protocol](https://mqtt.org/). +Ideal for dynamic real-time experiences like IoT device communication, messaging systems, and live data streams. + +## Overview +In today's interconnected world, real-time data exchange is integral to numerous applications, from IoT device communication to instant messaging. + +**MQTT**, or Message Queuing Telemetry Transport, is a highly efficient publish/subscribe messaging transport protocol. +It's lightweight, making it perfect for communication where bandwidth is a concern. +Unlike the traditional request-response model, MQTT operates on a publisher-subscriber model, ensuring real-time data delivery with minimal overhead. + +Best MQTT makes the task of integrating this powerful protocol into your Unity projects straightforward. +It's optimized for strong bi-directional communication, ensuring your users benefit from a responsive and live data exchange experience. + +## Key Features +- **Supported Unity Versions:** Compatible with Unity versions starting from :fontawesome-brands-unity: **2021.1 onwards**. +- **Compatibility with MQTT:** Aligns with the latest versions of MQTT, placing cutting-edge messaging capabilities in your hands. +- **Cross-Platform Mastery:** Operates smoothly across a spectrum of Unity-supported platforms, making it versatile for a wide range of projects. Specifically, it supports: + - :fontawesome-solid-desktop: **Desktop:** Windows, Linux, MacOS + - :fontawesome-solid-mobile: **Mobile:** iOS, Android + - :material-microsoft-windows: **Universal Windows Platform (UWP)** + - :material-web: **Web Browsers:** WebGL + + With such broad platform coverage, this library emerges as a top choice for various platform needs. + +- **Seamless Integration:** With intuitive APIs and comprehensive documentation, integrating into any Unity project becomes straightforward. +- **Performance Optimized:** Engineered for top-tier performance, ensuring swift data transfers ideal for real-time scenarios. +- **Lightweight and Efficient:** Minimized overheads make it perfect for scenarios with constrained bandwidth. +- **Bi-directional Communications:** Engage in two-way data exchanges effortlessly, enhancing application responsiveness. +- **Reliable Message Delivery:** Ensures messages reach their intended recipients due to its robust delivery mechanisms. +- **Support for Unreliable Networks:** Even in environments with fluctuating connectivity, the library remains steadfast. +- **Topic Subscriptions:** Manage your MQTT subscriptions smoothly, defining channels suited to your application needs. +- **Event-Driven Communication:** Capitalize on event-based communication paradigms to keep your applications engaging and current. +- **Secure Communications:** With support for encrypted connections, your data transmissions are safeguarded. +- **Profiler Integration:** Leverage the comprehensive [Best HTTP profiler](../Shared/profiler/index.md) integration: + - **Memory Profiler:** Assess memory usage patterns, boost performance, and pinpoint potential memory bottlenecks. + - **Network Profiler:** Monitor network behavior, analyzing data transfers, connection health, and more. +- **Effective Data Models:** With support for both JSON and binary data, the library offers flexibility in data interactions. +- **Debugging and Logging:** Robust logging tools assist developers in understanding the library's workings and facilitate debugging. + +## Installation Guide + +!!! Warning "Dependency Alert" + Before installing Best MQTT, ensure you have the [Best HTTP package](../HTTP/index.md) and the [Best WebSockets package](../WebSockets/index.md) installed and set up in your Unity project. + If you haven't done so yet, refer to the [Best HTTP Installation Guide](../HTTP/installation.md) and the [Best WebSockets Installation Guide](../WebSockets/installation.md). + +Getting started with Best MQTT demands a prior setup of both the Best HTTP and Best WebSockets packages. +After ensuring these are properly integrated, you can then effortlessly add Best MQTT to your Unity projects. + +### Installing from the Unity Asset Store using the Package Manager Window + +1. **Purchase:** If you haven't previously purchased the package, proceed to do so. + Once purchased, Unity will recognize your purchase, and you can install the package directly from within the Unity Editor. If you already own the package, you can skip these steps. + 1. **Visit the Unity Asset Store:** Navigate to the [Unity Asset Store](https://assetstore.unity.com/publishers/4137?aid=1101lfX8E) using your web browser. + 2. **Search for Best MQTT:** Locate and choose the official Best MQTT package. + 3. **Buy Best MQTT:** By clicking on the `Buy Now` button go though the purchase process. +2. **Open Unity & Access the Package Manager:** Start Unity and select your project. Head to [Window > Package Manager](https://docs.unity3d.com/Manual/upm-ui.html). +3. **Select 'My Assets':** In the Package Manager, switch to the [My Assets](https://docs.unity3d.com/Manual/upm-ui-import.html) tab to view all accessible assets. +4. **Find Best MQTT and Download:** Scroll to find "Best MQTT". Click to view its details. If it isn't downloaded, you'll notice a Download button. Click and wait. After downloading, this button will change to Import. +5. **Import the Package:** Once downloaded, click the Import button. Unity will display all Best MQTT' assets. Ensure all are selected and click Import. +6. **Confirmation:** After the import, Best MQTT will integrate into your project, signaling a successful installation. + +### Installing from a .unitypackage file + +If you have a .unitypackage file for Best MQTT, follow these steps: + +1. **Download the .unitypackage:** Make sure the Best MQTT.unitypackage file is saved on your device. +2. **Import into Unity:** Open Unity and your project. Go to Assets > Import Package > Custom Package. +3. **Locate and Select the .unitypackage:** Find where you saved the Best MQTT.unitypackage file, select it, and click Open. +4. **Review and Import:** Unity will show a list of all the package's assets. Ensure all assets are selected and click Import. +5. **Confirmation:** Post import, you'll see all the Best MQTT assets in your project's Asset folder, indicating a successful setup. + +!!! Note + Best MQTT also supports other installation techniques as documented in Unity's manual for packages. + For more advanced installation methods, please see the Unity Manual on [Sharing Packages](https://docs.unity3d.com/Manual/cus-share.html). + +### Assembly Definitions and Runtime References +For developers familiar with Unity's development patterns, it's essential to understand how Best MQTT incorporates Unity's systems: + +- **Assembly Definition Files:** Best MQTT incorporates [Unity's Assembly Definition files](https://docs.unity3d.com/Manual/ScriptCompilationAssemblyDefinitionFiles.html). It aids in organizing and managing the codebase efficiently. +- **Auto-Referencing of Runtime DLLs:** The runtime DLLs produced by Best MQTT are [Auto Referenced](https://docs.unity3d.com/Manual/class-AssemblyDefinitionImporter.html), allowing Unity to automatically recognize and utilize them without manual intervention. +- **Manual Package Referencing:** Should you need to reference Best MQTT manually in your project (for advanced setups or specific use cases), you can do so. +Simply [reference the package](https://docs.unity3d.com/Manual/ScriptCompilationAssemblyDefinitionFiles.html#reference-another-assembly) by searching for `com.Tivadar.Best.MQTT`. + +Congratulations! You've successfully integrated Best MQTT into your Unity project. Begin your MQTT adventure with the [Getting Started guide](getting-started/index.md). + +For any issues or additional assistance, please consult the [Community and Support page](../Shared/support.md). \ No newline at end of file diff --git a/Packages/com.tivadar.best.mqtt/README.md.meta b/Packages/com.tivadar.best.mqtt/README.md.meta new file mode 100644 index 00000000..ce6e161b --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/README.md.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 384e265e911284c439d70f2f3e2dce16 +TextScriptImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/README.md + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime.meta b/Packages/com.tivadar.best.mqtt/Runtime.meta new file mode 100644 index 00000000..2186f8dc --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 0496928ba7eb76a4290bbf430d841536 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs b/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs new file mode 100644 index 00000000..382863a8 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs @@ -0,0 +1,6 @@ +using System.Reflection; + +[assembly: AssemblyVersion("3.0.4")] +[assembly: AssemblyCompany("Tivadar György Nagy")] +[assembly: AssemblyCopyright("Copyright © 2025 Tivadar György Nagy")] +[assembly: AssemblyDescription("Best MQTT is a premier Unity networking library, purpose-built for the seamless integration of the MQTT protocol. Ideal for dynamic real-time experiences like IoT device communication, messaging systems, and live data streams.")] \ No newline at end of file diff --git a/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs.meta new file mode 100644 index 00000000..baedf1a0 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3770ba2a6659a144995ab37a6acce666 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/AssemblyInfo.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT.meta new file mode 100644 index 00000000..6973cf90 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 92ed3e1641a75c346baa469e7e0c4b4f +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs new file mode 100644 index 00000000..c905b3ce --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs @@ -0,0 +1,126 @@ +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +using Best.MQTT.Packets; +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901106 + /// + public readonly struct ApplicationMessage + { + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901108 + /// + internal readonly UInt16 PacketId; + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901117 + /// + internal readonly UInt32 SubscriptionId; + + /// + /// Set to true if it's not the first occasion the broker sent this application message. + /// + /// + public readonly bool IsDuplicate; + + /// + /// QoS this application message sent with. + /// + /// + public readonly QoSLevels QoS; + + /// + /// Set to true if this is a retained application message. + /// + /// + public readonly bool Retain; + + /// + /// The topic's name this application message is publish to. + /// + /// + public readonly string Topic; + + /// + /// Payload type (binary or text). + /// + /// + public readonly PayloadTypes PayloadFormat; + + /// + /// Expiry interval of the application message. + /// + /// + public readonly TimeSpan ExpiryInterval; + + /// + /// Topic alias index the broker used. + /// + /// + internal readonly UInt16 TopicAlias; + + /// + /// Topic name where the publisher waiting for a response to this application message. + /// + /// + public readonly string ResponseTopic; + + /// + /// Arbitrary data sent with the application message. + /// + /// + public readonly BufferSegment CorrelationData; + + /// + /// Key-value pairs sent with the application message. + /// + /// + public readonly List> UserProperties; + + /// + /// Arbitrary value set by the publisher. + /// + /// + public readonly string ContentType; + + /// + /// Payload of the application message. + /// + /// + public readonly BufferSegment Payload; + + internal ApplicationMessage(UInt32 sId, Packet packet) + { + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901117 + // Multiple Subscription Identifiers will be included if the publication is the result of a match to more than one subscription, in this case their order is not significant. + this.SubscriptionId = sId; + + this.IsDuplicate = packet.Flags[3]; + this.QoS = (QoSLevels)packet.Flags.Range(2, 1); + this.Retain = packet.Flags[0]; + + this.Topic = packet.VariableHeaderFields[0].UTF8String.Key; + + // The Packet Identifier field is only present in PUBLISH packets where the QoS level is 1 or 2. + this.PacketId = this.QoS >= QoSLevels.AtLeastOnceDelivery ? (UInt16)packet.VariableHeaderFields[1].Integer : (UInt16)0; + + Properties properties = packet.VariableHeaderFields.Properties; + + this.PayloadFormat = properties.TryFindData(PacketProperties.PayloadFormatIndicator, DataTypes.Byte, out var data) ? (PayloadTypes)data.Integer : PayloadTypes.Bytes; + this.ExpiryInterval = properties.TryFindData(PacketProperties.MessageExpiryInterval, DataTypes.FourByteInteger, out data) ? TimeSpan.FromSeconds(data.Integer) : TimeSpan.MaxValue; + this.TopicAlias = properties.TryFindData(PacketProperties.TopicAlias, DataTypes.TwoByteInteger, out data) ? (UInt16)data.Integer : (UInt16)0; + this.ResponseTopic = properties.TryFindData(PacketProperties.ResponseTopic, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + this.CorrelationData = properties.TryFindData(PacketProperties.CorrelationData, DataTypes.Binary, out data) ? data.Binary : BufferSegment.Empty; + this.UserProperties = properties.ConvertAll>(PacketProperties.UserProperty, kvp_data => kvp_data.UTF8String); + this.ContentType = properties.TryFindData(PacketProperties.ContentType, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + this.Payload = packet.Payload.Count > 0 ? packet.Payload[0].Binary : BufferSegment.Empty; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs.meta new file mode 100644 index 00000000..8880599c --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5bf2023467ae48c4f967b25176dcd882 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/ApplicationMessage.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs new file mode 100644 index 00000000..3d13df3c --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs @@ -0,0 +1,176 @@ +using System; + +namespace Best.MQTT +{ + /// + /// Supported transports that can be used to connect with. + /// + public enum SupportedTransports + { +#if !UNITY_WEBGL || UNITY_EDITOR + /// + /// Transport over raw TCP. + /// + /// + /// NOT available under WebGL. + /// + TCP = 0, +#endif + + /// + /// Transport using WebSocket connections. + /// + /// + /// Available on all supported platforms! + /// + WebSocket = 1 + } + + public enum SupportedProtocolVersions + { + MQTT_3_1_1, + MQTT_5_0 + } + + /// + /// Connection related options to pass to the MQTTClient. + /// + /// + /// Simple example on how to create a connection: + /// + /// ConnectionOptions options = new ConnectionOptions + /// { + /// Host = "localhost", + /// Port = 1883, + /// ProtocolVersion = SupportedProtocolVersions.MQTT_3_1_1 + /// }; + /// + /// var client = new MQTTClient(options); + /// + /// + public sealed class ConnectionOptions + { + /// + /// Host name or IP address of the broker. + /// + public string Host { get; set; } + + /// + /// Port number where the broker is listening on. + /// + public int Port { get; set; } + + /// + /// Whether to use a secure protocol (TLS over TCP or wss://). + /// + public bool UseTLS { get; set; } + + /// + /// Selected transport to connect with. + /// + public SupportedTransports Transport { get; set; } + + /// + /// Optional path for websocket, its default is "/mqtt". + /// + public string Path { get; set; } = "/mqtt"; + + /// + /// The protocol version that the plugin has to use to connect with to the server. + /// + public SupportedProtocolVersions ProtocolVersion { get; set; } = SupportedProtocolVersions.MQTT_5_0; + } + + /// + /// Builder class to help creating instances. + /// + /// + /// The following example creates a to connect to localhost on port 1883 using the TCP transport and MQTT protocol version v3.1.1. + /// + /// var options = new ConnectionOptionsBuilder() + /// .WithTCP("localhost", 1883) + /// .WithProtocolVersion(SupportedProtocolVersions.MQTT_3_1_1) + /// .Build(); + /// + /// var client = new MQTTClient(options); + /// + /// + /// + /// + /// This is the same as the previous example, but the builder creates the too. + /// + /// var client = new ConnectionOptionsBuilder() + /// .WithTCP("localhost", 1883) + /// .WithProtocolVersion(SupportedProtocolVersions.MQTT_3_1_1) + /// .CreateClient(); + /// + /// + public sealed class ConnectionOptionsBuilder + { + private ConnectionOptions Options { get; set; } = new ConnectionOptions(); + +#if !UNITY_WEBGL || UNITY_EDITOR + /// + /// Add options for a TCP connection. + /// + public ConnectionOptionsBuilder WithTCP(string host, int port) + { + this.Options.Host = host; + this.Options.Port = port; + this.Options.Transport = SupportedTransports.TCP; + + return this; + } +#endif + + /// + /// Add options for a WebSocket connection. + /// + public ConnectionOptionsBuilder WithWebSocket(string host, int port) + { + this.Options.Host = host; + this.Options.Port = port; + this.Options.Transport = SupportedTransports.WebSocket; + + return this; + } + + /// + /// When used MQTTClient going to use TLS to secure the communication. + /// + public ConnectionOptionsBuilder WithTLS() + { + this.Options.UseTLS = true; + + return this; + } + + /// + /// Used by the WebSocket transport to connect to the given path. + /// + public ConnectionOptionsBuilder WithPath(string path) + { + this.Options.Path = path; + return this; + } + + /// + /// The protocol version that the plugin has to use to connect with to the server. + /// + public ConnectionOptionsBuilder WithProtocolVersion(SupportedProtocolVersions version) + { + this.Options.ProtocolVersion = version; + return this; + } + + /// + /// Creates an MQTTClient object with the already set options. + /// + public MQTTClient CreateClient() => new MQTTClient(this.Build()); + + /// + /// Creates the final ConnectionOptions instance. + /// + public ConnectionOptions Build() => this.Options; + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs.meta new file mode 100644 index 00000000..9450d4b5 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b0330e3309917004a80064a43e8f8aa9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/ConnectionOptions.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases.meta new file mode 100644 index 00000000..743ae9a6 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ada384a2b2a878d44ada8a1d72f917e3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs new file mode 100644 index 00000000..669247eb --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs @@ -0,0 +1,216 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Linq; + +using Best.HTTP.Shared.PlatformSupport.Threading; + +using Best.HTTP.Shared.Databases; +using Best.HTTP.Shared.Databases.Indexing; +using Best.HTTP.Shared.Databases.Indexing.Comparers; +using Best.HTTP.Shared.Databases.MetadataIndexFinders; +using Best.HTTP.Shared.Databases.Utils; +using Best.MQTT.Packets; +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Databases +{ + internal sealed class OutgoingPacketDatabaseOptions : DatabaseOptions + { + public OutgoingPacketDatabaseOptions(string dbName) + : base(dbName) + { + } + } + + internal sealed class OutgoingPacketMetadata : Metadata + { + internal UInt16 packetId; + + public override void SaveTo(Stream stream) + { + base.SaveTo(stream); + + stream.EncodeUnsignedVariableByteInteger(this.packetId); + } + + public override void LoadFrom(Stream stream) + { + base.LoadFrom(stream); + + this.packetId = (UInt16)stream.DecodeUnsignedVariableByteInteger(); + } + } + + internal sealed class OutgoingPacketMetadataService : MetadataService + { + public OutgoingPacketMetadataService(IndexingService indexingService, IEmptyMetadataIndexFinder emptyMetadataIndexFinder) : base(indexingService, emptyMetadataIndexFinder) + { + } + + public OutgoingPacketMetadata Create(UInt16 packetId, in Packet value, int filePos, int length) + { + var result = base.CreateDefault(value, filePos, length, (content, metadata) => { + metadata.packetId = packetId; + }); + + return result; + } + } + + internal sealed class OutgoingPacketIndexingService : IndexingService + { + private AVLTree index_packetId = new AVLTree(new UInt16Comparer()); + + public override void Index(OutgoingPacketMetadata metadata) + { + base.Index(metadata); + + this.index_packetId.Add(metadata.packetId, metadata.Index); + } + + public override void Remove(OutgoingPacketMetadata metadata) + { + base.Remove(metadata); + + this.index_packetId.Remove(metadata.packetId); + } + + public override void Clear() + { + base.Clear(); + + this.index_packetId.Clear(); + } + + public override IEnumerable GetOptimizedIndexes() => this.index_packetId.WalkHorizontal(); + + public bool ContainsKey(UInt16 key) => this.index_packetId.ContainsKey(key); + public List FindByPacketId(UInt16 packetId) => this.index_packetId.Find(packetId); + } + + internal sealed class OutgoingPacketDiskContentParser : IDiskContentParser + { + public void Encode(Stream stream, Packet content) + { + if (content.Type != PacketTypes.Publish) + throw new NotImplementedException($"Storing {content.Type} packets isn't supported!"); + content.EncodeInto(stream); + } + + public Packet Parse(Stream stream, int length) + { + // We know for a fact that we store only PUBLISH packets only in this database + + BitField firstByte = new BitField((byte)stream.ReadByte()); + PacketTypes type = (PacketTypes)firstByte.Range(7, 4); + + if (type != PacketTypes.Publish) + throw new NotImplementedException($"Parsing {type} packets isn't supported!"); + + firstByte.ClearRange(7, 4); + + var packet = new Packet(); + packet.Type = PacketTypes.Publish; + packet.Flags = firstByte; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + packet.AddVariableHeader(Data.ReadAs(DataTypes.UTF8String, stream, ref remainingLength)); + + // The Packet Identifier field is only present in PUBLISH packets where the QoS level is 1 or 2. + if (firstByte.Range(2, 1) > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + if (remainingLength > 0) + packet.AddPayload(Data.ReadAs(DataTypes.Raw, stream, ref remainingLength)); + + return packet; + } + } + + // DefaultEmptyMetadataIndexFinder appends the new metadata to the end of the metadata list, this way we know the order of the packets! + internal sealed class OutgoingPacketDatabase : Database + { + public OutgoingPacketDatabase(string directory, string dbName, OutgoingPacketIndexingService indexingService) + : base(directory, + new OutgoingPacketDatabaseOptions(dbName), + indexingService, + new OutgoingPacketDiskContentParser(), + new OutgoingPacketMetadataService(indexingService, new DefaultEmptyMetadataIndexFinder())) + { + } + + public void Add(UInt16 packetId, in Packet packet) + { + using (new WriteLock(this.rwlock)) + { + (int filePos, int length) = this.DiskManager.Append(packet); + this.MetadataService.Create(packetId, in packet, filePos, length); + + this.FlagDirty(1); + } + } + + /*returns false if packetId not found*/ + public bool TryRemoveByPacketId(UInt16 packetId) + { + List metadataIndexes = null; + using (new ReadLock(this.rwlock)) + { + metadataIndexes = this.IndexingService.FindByPacketId(packetId); + if (metadataIndexes == null || metadataIndexes.Count == 0) + return false; + } + + using (new WriteLock(this.rwlock)) + { + for (int i = 0; i < metadataIndexes.Count; ++i) + this.DeleteMetadata(this.MetadataService.Metadatas[metadataIndexes[i]]); + + this.FlagDirty(1); + } + + return true; + } + + public (bool found, UInt16 packetId, Packet packet) TryDequeue() + { + using(new WriteLock(this.rwlock)) + { + var firstMetadata = this.MetadataService.Metadatas.FirstOrDefault(m => !m.IsDeleted); + if (firstMetadata == null) + return (false, 0, new Packet()); + + var packet = this.DiskManager.Load(firstMetadata); + + this.DeleteMetadata(firstMetadata); + this.FlagDirty(1); + + return (true, firstMetadata.packetId, packet); + } + } + + public (bool found, UInt16 packetId, Packet packet) GetNext(UInt16 packetId) + { + using (new ReadLock(this.rwlock)) + { + var firstMetadata = this.MetadataService.Metadatas.FirstOrDefault(m => !m.IsDeleted && m.packetId > packetId); + if (firstMetadata == null) + return (false, 0, new Packet()); + + var packet = this.DiskManager.Load(firstMetadata); + + return (true, firstMetadata.packetId, packet); + } + } + + public bool IsPacketIDInUse(UInt16 packetId) + { + using (new ReadLock(this.rwlock)) + return this.IndexingService.ContainsKey(packetId); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs.meta new file mode 100644 index 00000000..d53542eb --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9241aeca8b861ad428872ed0bd970304 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/OutgoingPacketDatabase.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs new file mode 100644 index 00000000..5f07b906 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs @@ -0,0 +1,294 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Linq; + +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Threading; + +using Best.HTTP.Shared.Databases; +using Best.HTTP.Shared.Databases.Indexing; +using Best.HTTP.Shared.Databases.Indexing.Comparers; +using Best.HTTP.Shared.Databases.MetadataIndexFinders; +using Best.HTTP.Shared.Databases.Utils; + +namespace Best.MQTT.Databases +{ + public sealed class TopicAliasMappingDatabaseOptions : DatabaseOptions + { + public TopicAliasMappingDatabaseOptions(string dbName) : base(dbName) + { + base.UseHashFile = false; + } + } + + public sealed class TopicAliasMappingMetadata : Metadata + { + internal UInt32 hash; + internal UInt16 alias; + internal bool sentToServer; + + public override void SaveTo(Stream stream) + { + base.SaveTo(stream); + + stream.EncodeUnsignedVariableByteInteger(this.hash); + stream.EncodeUnsignedVariableByteInteger(this.alias); + } + + public override void LoadFrom(Stream stream) + { + base.LoadFrom(stream); + + this.hash = (UInt32)stream.DecodeUnsignedVariableByteInteger(); + this.alias = (UInt16)stream.DecodeUnsignedVariableByteInteger(); + } + } + + public sealed class TopicAliasMappingIndexingService : IndexingService + { + private AVLTree index_Hash = new AVLTree(new UInt32Comparer()); + private AVLTree index_Alias = new AVLTree(new UInt16Comparer()); + + public override void Index(TopicAliasMappingMetadata metadata) + { + base.Index(metadata); + + this.index_Hash.Add(metadata.hash, metadata.Index); + this.index_Alias.Add(metadata.alias, metadata.Index); + } + + public override void Remove(TopicAliasMappingMetadata metadata) + { + base.Remove(metadata); + + this.index_Hash.Remove(metadata.hash); + this.index_Alias.Remove(metadata.alias); + } + + public override void Clear() + { + base.Clear(); + + this.index_Hash.Clear(); + this.index_Alias.Clear(); + } + + public override IEnumerable GetOptimizedIndexes() => this.index_Hash.WalkHorizontal(); + + public bool ContainsHash(UInt32 hash) => this.index_Hash.ContainsKey(hash); + public bool ContainsAlias(UInt16 alias) => this.index_Alias.ContainsKey(alias); + + public List FindByHash(UInt32 hash) => this.index_Hash.Find(hash); + public List FindByAlias(UInt16 alias) => this.index_Alias.Find(alias); + + public int Count() => this.index_Hash.ElemCount; + } + + public sealed class TopicAliasMappingMetadataService : MetadataService + { + public TopicAliasMappingMetadataService(IndexingService indexingService) + : base(indexingService, new FindDeletedMetadataIndexFinder()) + { + } + + public TopicAliasMappingMetadata Create(string hash, UInt16 alias, int filePos, int length) + { + var result = base.CreateDefault(hash, filePos, length, (content, metadata) => { + metadata.hash = MurmurHash2.Hash(content); + metadata.alias = alias; + }); + + return result; + } + } + + public sealed class TopicAliasMappingDiskContentParser : IDiskContentParser + { + public void Encode(Stream stream, string content) + { + StreamUtil.WriteLengthPrefixedString(stream, content); + } + + public string Parse(Stream stream, int length) + { + return StreamUtil.ReadLengthPrefixedString(stream); + } + } + + public sealed class TopicAliasMappingDatabase : Database + { + public TopicAliasMappingDatabase(string directory, string dbName, TopicAliasMappingIndexingService indexingService) + : base(directory, new TopicAliasMappingDatabaseOptions(dbName), indexingService, new TopicAliasMappingDiskContentParser(), new TopicAliasMappingMetadataService(indexingService)) + { + } + + public void Add(string topicName, UInt16 topicAliasMaximum) + { + using (new WriteLock(this.rwlock)) + { + // find free alias + UInt16 alias = 0; + for (UInt16 i = 1; i <= topicAliasMaximum; i++) + { + if (!this.IndexingService.ContainsAlias(i)) + { + alias = i; + break; + } + } + + if (alias == 0) + throw new Exception("Couldn't found free alias!"); + + Add(alias, topicName); + } + } + + private void Add(UInt16 alias, string topicName) + { + var (pos, length) = this.DiskManager.Append(topicName); + this.MetadataService.Create(topicName, alias, pos, length); + + this.FlagDirty(1); + } + + public void Set(UInt16 alias, string topicName) + { + using (new WriteLock(this.rwlock)) + { + var metadataIndexes = this.IndexingService.FindByAlias(alias); + if (metadataIndexes == null) + { + Add(alias, topicName); + return; + } + + this.Delete(metadataIndexes); + + Add(alias, topicName); + } + } + + public string Find(UInt16 alias) + { + if (alias == 0) + return null; + + using (new ReadLock(this.rwlock)) + { + var metadataIndexes = this.IndexingService.FindByAlias(alias); + if (metadataIndexes == null) + return null; + + return this.FromMetadataIndexes(metadataIndexes).FirstOrDefault(); + } + } + + public (UInt16 alias, bool sentToServer) Find(string topicName) + { + if (string.IsNullOrEmpty(topicName)) + return (0, false); + + using (new ReadLock(this.rwlock)) + { + if (this.IndexingService.Count() == 0) + return (0, false); + + var hash = MurmurHash2.Hash(topicName); + + var metadataIndexes = this.IndexingService.FindByHash(hash); + if (metadataIndexes == null) + return (0, false); + + var metadata = this.MetadataService.Metadatas[metadataIndexes[0]]; + return (metadata.alias, metadata.sentToServer); + } + } + + public UInt16 Count() + { + using (new ReadLock(this.rwlock)) + return (UInt16)this.IndexingService.Count(); + } + + internal void SetSent(ushort alias, bool sentToServer) + { + using (new WriteLock(this.rwlock)) + { + var metadataIndexes = this.IndexingService.FindByAlias(alias); + if (metadataIndexes == null) + return; + + this.MetadataService.Metadatas[metadataIndexes[0]].sentToServer = sentToServer; + + this.FlagDirty(1); + } + } + } + + // https://github.com/jitbit/MurmurHash.net + public class MurmurHash2 + { + const uint m = 0x5bd1e995; + const int r = 24; + + public static uint Hash(string str) + { + var count = System.Text.Encoding.UTF8.GetByteCount(str); + var buffer = BufferPool.Get(count, true); + + System.Text.Encoding.UTF8.GetBytes(str, 0, str.Length, buffer, 0); + + var hash = Hash(buffer, count); + + BufferPool.Release(buffer); + + return hash; + } + + private static uint Hash(byte[] data, int dataLength, uint seed = 0xc58f1a7a) + { + int length = dataLength; + if (length == 0) + return 0; + uint h = seed ^ (uint)length; + int currentIndex = 0; + while (length >= 4) + { + uint k = (uint)(data[currentIndex++] | data[currentIndex++] << 8 | data[currentIndex++] << 16 | data[currentIndex++] << 24); + k *= m; + k ^= k >> r; + k *= m; + + h *= m; + h ^= k; + length -= 4; + } + switch (length) + { + case 3: + h ^= (UInt16)(data[currentIndex++] | data[currentIndex++] << 8); + h ^= (uint)(data[currentIndex] << 16); + h *= m; + break; + case 2: + h ^= (UInt16)(data[currentIndex++] | data[currentIndex] << 8); + h *= m; + break; + case 1: + h ^= data[currentIndex]; + h *= m; + break; + default: + break; + } + + h ^= h >> 13; + h *= m; + h ^= h >> 15; + + return h; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs.meta new file mode 100644 index 00000000..791bb616 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 28779be4e5bc4ee4f816ac34835d53ea +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/TopicAliasMappingDatabase.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs new file mode 100644 index 00000000..a7398ba3 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs @@ -0,0 +1,147 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.PlatformSupport.Threading; + +using Best.HTTP.Shared.Databases; +using Best.HTTP.Shared.Databases.Indexing; +using Best.HTTP.Shared.Databases.MetadataIndexFinders; +using Best.HTTP.Shared.Databases.Utils; + +namespace Best.MQTT.Databases +{ + internal class UInt16Metadata : Metadata + { + public UInt16 value; + + public override void SaveTo(Stream stream) + { + base.SaveTo(stream); + + stream.EncodeUnsignedVariableByteInteger(value); + } + + public override void LoadFrom(Stream stream) + { + base.LoadFrom(stream); + + this.value = (UInt16)stream.DecodeUnsignedVariableByteInteger(); + } + + public override string ToString() + { + return $"[Metadata Idx: {Index}, IsDeleted: {IsDeleted}, Value: {value}]"; + } + } + + internal class UInt16MetadataService : MetadataService + { + public UInt16MetadataService(IndexingService indexingService) + : base(indexingService, new FindDeletedMetadataIndexFinder()) + { + } + + public UInt16Metadata Create(UInt16 value) + { + var result = base.CreateDefault(value, 0, 0, (content, metadata) => metadata.value = content); + + return result; + } + } + + internal class UInt16IndexingService : IndexingService + { + internal AVLTree index = new AVLTree(Comparer.Default); + + public override void Index(UInt16Metadata metadata) + { + base.Index(metadata); + this.index.Add(metadata.value, metadata.Index, true); + } + + public override void Remove(UInt16Metadata metadata) + { + base.Remove(metadata); + this.index.Remove(metadata.value); + } + + public override void Clear() + { + base.Clear(); + this.index.Clear(); + } + + public override IEnumerable GetOptimizedIndexes() => this.index.WalkHorizontal(); + } + + internal class UInt16DiskContentParser : IDiskContentParser + { + public void Encode(Stream stream, ushort content) {} + public ushort Parse(Stream stream, int length) => 0; + } + + internal class UInt16DatabaseOptions : DatabaseOptions + { + public UInt16DatabaseOptions(string dbName) : base(dbName) + { + base.UseHashFile = false; + } + } + + internal class UInt16Database : Database + { + public UInt16Database(string directory, string dbName, UInt16IndexingService indexingService) + : base(directory, new UInt16DatabaseOptions(dbName), indexingService, new UInt16DiskContentParser(), new UInt16MetadataService(indexingService)) + { + } + + public void Add(UInt16 value) + { + using (new WriteLock(this.rwlock)) + { + base.MetadataService.Create(value); + base.FlagDirty(1); + } + } + + public bool Contains(UInt16 key) => this.IndexingService.index.ContainsKey(key); + + public void Remove(UInt16 value) + { + using (new WriteLock(this.rwlock)) + { + var metadataIndexes = this.IndexingService.index.Find(value); + + base.Delete(metadataIndexes); + } + } + + public (bool found, UInt16 value) GetNext(UInt16 value) + { + using (new ReadLock(this.rwlock)) + { + // find the smallest one that larger than value + UInt16 smallest = UInt16.MaxValue; + for (int i = 0; i < this.MetadataService.Metadatas.Count; ++i) + { + UInt16 currentValue = this.MetadataService.Metadatas[i].value; + + if (currentValue < smallest && currentValue > value) + smallest = currentValue; + } + + if (smallest == UInt16.MaxValue) + return (false, 0); + + return (true, smallest); + } + } + + internal ushort Count() + { + using (new ReadLock(this.rwlock)) + return (ushort)this.IndexingService.index.ElemCount; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs.meta new file mode 100644 index 00000000..2db31761 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: daba16bb799e31143b4e24500e4c6ee2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Databases/UInt16Database.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs new file mode 100644 index 00000000..92b50291 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs @@ -0,0 +1,582 @@ +using System; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +using Best.MQTT.Packets; +using Best.MQTT.Packets.Builders; +using Best.MQTT.Packets.Readers; +using Best.MQTT.Packets.Utils; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT +{ + public sealed partial class MQTTClient + { + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901251 + /// + private void IncrementAndReplenishQueue() + { + this._sendQuota = Math.Min(this._maxQuota, (UInt16)(this._sendQuota + 1)); + + Logger.Verbose(nameof(MQTTClient), $"{nameof(IncrementAndReplenishQueue)} SendQuota: ({this._sendQuota})", this.Context); + + while (this._sendQuota > 0) + { + var (found, packetId, packet) = this.Session.QueuedPackets.TryDequeue(); + + if (!found) + return; + + if (packetId == 0) + { + Logger.Error(nameof(MQTTClient), $"{nameof(IncrementAndReplenishQueue)} found a packet with packetId set to zero!", this.Context); + continue; + } + + SendPublishPacket(packetId, in packet); + } + } + + private void HandleAuthPacket(Packet packet) + { + var authMessage = new AuthenticationMessage(packet); + try + { + this.OnAuthenticationMessage?.Invoke(this, authMessage); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), nameof(HandleAuthPacket), ex, this.Context); + + this.MQTTError(nameof(HandleAuthPacket), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), nameof(HandleAuthPacket), ex, this.Context); + } + } + + private void HandlePublishAckPacket(Packet packet) + { + // The send quota is incremented by 1: Each time a PUBACK or PUBCOMP packet is received, regardless of whether the PUBACK or PUBCOMP carried an error code. + IncrementAndReplenishQueue(); + + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + PublishAckAndReceivedReasonCodes code = PublishAckAndReceivedReasonCodes.Success; + if (packet.VariableHeaderFields.Count > 1 && packet.VariableHeaderFields[1].Type == DataTypes.Byte) + code = (PublishAckAndReceivedReasonCodes)packet.VariableHeaderFields[1].Integer; + + Logger.Information(nameof(MQTTClient), $"{nameof(HandlePublishAckPacket)}({packetId}, {code})", this.Context); + + bool foundPacket = this.Session.UnacknowledgedPackets.TryRemoveByPacketId(packetId); + if (!foundPacket) + Logger.Warning(nameof(MQTTClient), $"{nameof(HandlePublishAckPacket)}: Couldn't found packet for packetId {packetId}!", this.Context); + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901151 + /// + private void HandlePublishCompletePacket(Packet packet) + { + // The send quota is incremented by 1: Each time a PUBACK or PUBCOMP packet is received, regardless of whether the PUBACK or PUBCOMP carried an error code. + IncrementAndReplenishQueue(); + + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + PublishReleaseAndCompleteReasonCodes code = PublishReleaseAndCompleteReasonCodes.Success; + if (packet.VariableHeaderFields.Count > 1 && packet.VariableHeaderFields[1].Type == DataTypes.Byte) + code = (PublishReleaseAndCompleteReasonCodes)packet.VariableHeaderFields[1].Integer; + + Logger.Information(nameof(MQTTClient), $"{nameof(HandlePublishCompletePacket)}({packetId}, {code})", this.Context); + + // Discard packetId + this.Session.PublishReleasedPacketIDs.Remove(packetId); + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901131 + /// + private void HandlePublishReceivedPacket(Packet packet) + { + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + PublishAckAndReceivedReasonCodes code = PublishAckAndReceivedReasonCodes.Success; + if (packet.VariableHeaderFields.Count > 1 && packet.VariableHeaderFields[1].Type == DataTypes.Byte) + code = (PublishAckAndReceivedReasonCodes)packet.VariableHeaderFields[1].Integer; + + Logger.Information(nameof(MQTTClient), $"{nameof(HandlePublishReceivedPacket)}({packetId}, {code})", this.Context); + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901237 + // MUST treat the PUBLISH packet as “unacknowledged” until it has received the corresponding PUBREC packet from the receiver [MQTT-4.3.3-3]. + bool foundPacket = this.Session.UnacknowledgedPackets.TryRemoveByPacketId(packetId); + + // If it has sent a PUBREC with a Reason Code of 0x80 or greater, the receiver MUST treat any subsequent PUBLISH packet that contains that Packet Identifier as being a new Application Message [MQTT-4.3.3-9]. + if (code >= PublishAckAndReceivedReasonCodes.UnspecifiedError) + { + // The send quota is incremented by 1: Each time a PUBREC packet is received with a Return Code of 0x80 or greater. + IncrementAndReplenishQueue(); + } + else + { + // MUST send a PUBREL packet when it receives a PUBREC packet from the receiver with a Reason Code value less than 0x80. + // This PUBREL packet MUST contain the same Packet Identifier as the original PUBLISH packet [MQTT-4.3.3-4]. + if (foundPacket) + this.Session.PublishReleasedPacketIDs.Add(packetId); + + var outPacket = new PublishReleasePacketBuilder(this) + .WithPacketID(packetId) + .WithReasonCode(foundPacket ? PublishReleaseAndCompleteReasonCodes.Success : PublishReleaseAndCompleteReasonCodes.PacketIdentifierNotFound) + .Build(); + this.Send(in outPacket); + } + } + + private void HandleUnsubscribeAckPacket(Packet packet) + { + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + if (this.pendingUnsubscriptions.TryRemove(packetId, out var topicUnsubscribeRequests)) + { + if (topicUnsubscribeRequests.Count != packet.Payload.Count && this.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + Logger.Warning(nameof(MQTTClient), $"Un-subscribe ACK received with different payload count({packet.Payload.Count}) than the original request ({topicUnsubscribeRequests.Count})", this.Context); + + for (int i = 0; i < topicUnsubscribeRequests.Count; i++) + { + var topic = topicUnsubscribeRequests[i]; + + try + { + topic.AcknowledgementCallback?.Invoke(this, topic.Filter, (UnsubscribeAckReasonCodes)packet.Payload[i].Integer); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.AcknowledgementCallback)}(\"{topic.Filter}\", {(SubscribeAckReasonCodes)packet.Payload[i].Integer})", ex, this.Context); + this.MQTTError(nameof(HandleUnsubscribeAckPacket), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.AcknowledgementCallback)}(\"{topic.Filter}\", {(SubscribeAckReasonCodes)packet.Payload[i].Integer})", ex, this.Context); + } + + // Remove subscription + + var keys = this.subscriptions.Keys; + + foreach (var key in keys) + if (this.subscriptions.TryGetValue(key, out var subscription)) + { + var (topicFound, removeSubscription) = subscription.TryRemoveTopic(topic.Filter); + + if (topicFound && removeSubscription) + this.subscriptions.TryRemove(key, out _); + } + } + } + else + Logger.Warning(nameof(MQTTClient), $"No un-subscribe request could be found with packet ID {packetId}", this.Context); + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html + /// + private void HandlePublishReleasePacket(Packet packet) + { + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + PublishReleaseAndCompleteReasonCodes code = PublishReleaseAndCompleteReasonCodes.Success; + if (packet.VariableHeaderFields.Count > 1) + code = (PublishReleaseAndCompleteReasonCodes)packet.VariableHeaderFields[1].Integer; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901238 + // If PUBACK or PUBREC is received containing a Reason Code of 0x80 or greater the corresponding PUBLISH packet is treated as acknowledged, + // and MUST NOT be retransmitted [MQTT-4.4.0-2]. + if (code != PublishReleaseAndCompleteReasonCodes.Success) + { + // ? + } + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901237 + // MUST respond to a PUBREL packet by sending a PUBCOMP packet containing the same Packet Identifier as the PUBREL [MQTT-4.3.3-11]. + var outPacket = new PublishCompletePacketBuilder(this) + .WithPacketID(packetId) + .WithReasonCode(PublishReleaseAndCompleteReasonCodes.Success) + .Build(); + this.Send(in outPacket); + + this.Session.PublishReceivedPacketIDs.Remove(packetId); + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901100 + /// + private void HandlePublishPacket(Packet packet) + { + // One application message can have multiple subscriber ids + var applicationMessages = PacketReaderImplementations.CreateApplicationMessages(this, packet); + + for (int i = 0; i < applicationMessages.Count; ++i) + { + var applicationMessage = applicationMessages[i]; + + if (applicationMessage.QoS == QoSLevels.ExactlyOnceDelivery) + { + // Until it has received the corresponding PUBREL packet, the receiver MUST acknowledge any subsequent PUBLISH packet with the same Packet Identifier by sending a PUBREC. + // It MUST NOT cause duplicate messages to be delivered to any onward recipients in this case [MQTT-4.3.3-10] + if (this.Session.PublishReceivedPacketIDs.Contains(applicationMessage.PacketId)) + break; + } + + string topicName = applicationMessage.Topic; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901113 + // The sender decides whether to use a Topic Alias and chooses the value. + // It sets a Topic Alias mapping by including a non-zero length Topic Name and a Topic Alias in the PUBLISH packet. + // The receiver processes the PUBLISH as normal but also sets the specified Topic Alias mapping to this Topic Name. + if (applicationMessage.TopicAlias > 0) + { + if (this._serverTopicAliasMapping == null) + this._serverTopicAliasMapping = new System.Collections.Generic.Dictionary(); + + if (!string.IsNullOrEmpty(topicName)) + this._serverTopicAliasMapping[applicationMessage.TopicAlias] = topicName; + else + this._serverTopicAliasMapping.TryGetValue(applicationMessage.TopicAlias, out topicName); + } + + if (this.subscriptions.TryGetValue(applicationMessage.SubscriptionId, out var subscription)) + { + switch (subscription.Topics.Count) + { + // error? + case 0: break; + + case 1: + { + var topic = subscription.Topics[0]; + try + { + topic.MessageCallback?.Invoke(this, topic, topicName, applicationMessage); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.MessageCallback)}(\"{topicName}\")", ex, this.Context); + this.MQTTError(nameof(HandlePublishPacket), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.MessageCallback)}(\"{topicName}\")", ex, this.Context); + } + break; + } + + default: + bool hadAnyMatch = false; + for (int topicIdx = 0; topicIdx < subscription.Topics.Count; ++topicIdx) + { + var topic = subscription.Topics[topicIdx]; + if (topic.Filter.IsMatching(topicName)) + { + Logger.Information(nameof(MQTTClient), $"'{topicName}' matched with filter '{topic.Filter.OriginalFilter}'", this.Context); + try + { + topic.MessageCallback?.Invoke(this, topic, topicName, applicationMessage); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.MessageCallback)}(\"{topicName}\")", ex, this.Context); + this.MQTTError(nameof(HandlePublishPacket), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.MessageCallback)}(\"{topicName}\")", ex, this.Context); + } + hadAnyMatch = true; + } + } + + if (!hadAnyMatch) + { + // Log a warning, however also: "A Client could also receive messages that do not match any of its explicit Subscriptions. + // This can happen if the Server automatically assigned a subscription to the Client." https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901239 + + Logger.Warning(nameof(MQTTClient), $"{topicName} didn't match any of the subscription topics!", this.Context); + } + break; + } + } + + try + { + this.OnApplicationMessage?.Invoke(this, applicationMessage); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), nameof(this.OnApplicationMessage), ex, this.Context); + } + } + + // All of the generated application messages are the very same except the subscription ID, + // so we are safe here only accessing and operating only on the first one until it doesn't + // depend on the subscription id! + if (applicationMessages.Count > 0) + { + var msg = applicationMessages[0]; + BufferPool.Release(msg.Payload); + + switch (msg.QoS) + { + case QoSLevels.AtMostOnceDelivery: break; + + // Take ownership of the Application Message by confirming its delivery. + case QoSLevels.AtLeastOnceDelivery: + var ackPacket = new PublishAckBuilder(this) + .WithPacketID(msg.PacketId) + .WithReasonCode(PublishAckAndReceivedReasonCodes.Success) + .Build(); + this.Send(in ackPacket); + break; + + case QoSLevels.ExactlyOnceDelivery: + // Until it has received the corresponding PUBREL packet, the receiver MUST acknowledge any subsequent PUBLISH packet with the same Packet Identifier by sending a PUBREC. + // It MUST NOT cause duplicate messages to be delivered to any onward recipients in this case [MQTT-4.3.3-10]. + if (!this.Session.PublishReceivedPacketIDs.Contains(msg.PacketId)) + this.Session.PublishReceivedPacketIDs.Add(msg.PacketId); + + // The Client uses this value to limit the number of QoS 1 and QoS 2 publications that it is willing to process concurrently. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901049 + if (this.Session.PublishReceivedPacketIDs.Count() >= this.NegotiatedOptions.ClientReceiveMaximum) + this.MQTTError(nameof(HandlePublishPacket), + MQTTErrorTypes.ReceiveMaximumExceeded, + $"this.publishReceivedPacketIDs.Count() ({this.Session.PublishReceivedPacketIDs.Count()}) >= this.NegotiatedOptions.ClientReceiveMaximum ({this.NegotiatedOptions.ClientReceiveMaximum})"); + + var receivedPacket = new PublishReceivedPacketBuilder(this) + .WithPacketID(msg.PacketId) + .WithReasonCode(PublishAckAndReceivedReasonCodes.Success) + .Build(); + this.Send(in receivedPacket); + break; + } + } + + applicationMessages.Clear(); + } + + private void HandleSubscribeAckPacket(Packet packet) + { + UInt16 packetId = (UInt16)packet.VariableHeaderFields[0].Integer; + + if (this.pendingSubscriptions.TryRemove(packetId, out var subscription)) + { + if (subscription.Topics.Count != packet.Payload.Count) + Logger.Warning(nameof(MQTTClient), $"Subscription's (pID: {packetId}, sID: {subscription.ID}) topic count ({subscription.Topics.Count}) is different from Ack's payload count({packet.Payload.Count})!", this.Context); + + for (int i = 0; i < subscription.Topics.Count; i++) + { + var topic = subscription.Topics[i]; + + try + { + topic.AcknowledgementCallback?.Invoke(this, topic, (SubscribeAckReasonCodes)packet.Payload[i].Integer); + } + catch (MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.AcknowledgementCallback)}(\"{topic.Filter}\", {(SubscribeAckReasonCodes)packet.Payload[i].Integer})", ex, this.Context); + this.MQTTError(nameof(HandleSubscribeAckPacket), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(topic.AcknowledgementCallback)}(\"{topic.Filter}\", {(SubscribeAckReasonCodes)packet.Payload[i].Integer})", ex, this.Context); + } + } + } + else + Logger.Warning(nameof(MQTTClient), $"No subscription could be found with packet ID {packetId}", this.Context); + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901205 + /// + private void HandleDisconnectPacket(Packet packet) + { + var properties = packet.VariableHeaderFields.Properties; + // Byte 1 in the Variable Header is the Disconnect Reason Code. If the Remaining Length is less than 1 the value of 0x00 (Normal disconnection) is used. + DisconnectReasonCodes reasonCode = packet.VariableHeaderFields.Count > 0 ? (DisconnectReasonCodes)packet.VariableHeaderFields[0].Integer : DisconnectReasonCodes.NormalDisconnection; + + string reason = null; + + var reasonProp = properties.Find(PacketProperties.ReasonString); + if (reasonProp.Type != PacketProperties.None) + reason = reasonProp.Data.UTF8String.Key; + else + { + if (reasonCode != DisconnectReasonCodes.NormalDisconnection) + reason = $"Disconnect packet with reason code: {reasonCode}"; + } + + // "HandleDisconnectPacket - Code: KeepAliveTimeout, reason: \"The client was idle for too long without sending an MQTT control packet.\"" + Logger.Verbose(nameof(MQTTClient), $"{nameof(HandleDisconnectPacket)} - Code: {reasonCode}, reason: \"{reason}\"", this.Context); + + //if (reasonCode != DisconnectReasonCodes.NormalDisconnection) + // Error("Disconnect packet", reason); + //else + //{ + // this.transport.BeginDisconnect(); + // //this.State = ClientStates.Disconnected; + // SetDisconnected(reasonCode, reason); + //} + + SetDisconnected(reasonCode, reason); + + this.Session.QueuedPackets.Clear(); + } + + private void HandleConnectAckPacket(Packet packet) + { + var msg = this.NegotiatedOptions.ServerOptions = new ServerConnectAckMessage(packet); + + Logger.Information(nameof(MQTTClient), $"ConnectAck - reason code received: {msg.ReasonCode}", this.Context); + + if (msg.ReasonCode == ConnectAckReasonCodes.Success) + { + // The Client or Server MUST set its initial send quota to a non-zero value not exceeding the Receive Maximum [MQTT-4.9.0-1]. + this._sendQuota = this._maxQuota = Math.Max((UInt16)(msg.ReceiveMaximum - 1), (UInt16)1); + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901087 + // The Client Identifier which was assigned by the Server because a zero length Client Identifier was found in the CONNECT packet. + if (!string.IsNullOrEmpty(msg.AssignedClientIdentifier)) + this.Session = SessionHelper.Get(this.Options.Host, msg.AssignedClientIdentifier); + + // Client doesn't need to store pending QoS 1&2 messages: https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901230 + this.Session.QueuedPackets.Clear(); + + // If a CONNECT packet is received with Clean Start is set to 1, the Client and Server MUST discard any existing Session and start a new Session [MQTT-3.1.2-4]. + + // The Session Present flag informs the Client whether the Server is using Session State from a previous connection for this ClientID. + // This allows the Client and Server to have a consistent view of the Session State. (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901078) + + // When a Client reconnects with Clean Start set to 0 and a session is present, + // both the Client and Server MUST resend any unacknowledged PUBLISH packets (where QoS > 0) and PUBREL packets using their original Packet Identifiers. + // This is the only circumstance where a Client or Server is REQUIRED to resend messages. + // Clients and Servers MUST NOT resend messages at any other time [MQTT-4.4.0-1]. (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901238) + if (!msg.SessionPresent) + { + this.Session.PublishReceivedPacketIDs.Clear(); + this.Session.PublishReleasedPacketIDs.Clear(); + + this.Session.UnacknowledgedPackets.Clear(); + } + else + { + MessageDeliveryRetry(); + } + + // A receiver MUST NOT carry forward any Topic Alias mappings from one Network Connection to another [MQTT-3.3.2-7]. + this.Session.ClientTopicAliasMapping.Clear(); + + this.lastPacketSentAt = DateTime.UtcNow; + this.State = ClientStates.Connected; + + try + { + this.OnConnected?.Invoke(this); + } + catch(Exception ex) + { + Logger.Exception(nameof(MQTTClient), nameof(OnConnected), ex, this.Context); + } + + this.connectBag?.completionSource?.TrySetResult(this); + } + + try + { + this.OnServerConnectAckMessage?.Invoke(this, msg); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), nameof(OnServerConnectAckMessage), ex, this.Context); + } + + if (msg.ReasonCode != ConnectAckReasonCodes.Success) + { + DisconnectReasonCodes SwitchCode(ConnectAckReasonCodes from) => Enum.IsDefined(typeof(DisconnectReasonCodes), (byte)from) ? (DisconnectReasonCodes)from : DisconnectReasonCodes.UnspecifiedError; + + string errorDescription = msg.ReasonString ?? $"Couldn't connect! Server sent reason code: {msg.ReasonCode} and reason: '{msg.ReasonString}'"; + Error("ConnectACK", SwitchCode(msg.ReasonCode), errorDescription); + } + + this.connectBag = null; + } + + /// + /// When a Client reconnects with Clean Start set to 0 and a session is present, + /// both the Client and Server MUST resend any unacknowledged PUBLISH packets (where QoS > 0) and PUBREL packets using their original Packet Identifiers. + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901238 + /// + private void MessageDeliveryRetry() + { + // Publish packets + { + // Re-send all unacknowledged packets when connected. + // Ideally, the count of the packets is the same as the initial send quota sent by the server. + // What could be problematic if the server sends a lower value. + + if (this._sendQuota == 0) + return; + + var (found, packetId, packet) = this.Session.UnacknowledgedPackets.GetNext(0); + + while (found) + { + Logger.Verbose(nameof(MQTTClient), $"{nameof(MessageDeliveryRetry)} packetId: {packetId}, SendQuota: ({this._sendQuota})", this.Context); + + this._sendQuota--; + + // Set DUP flag to true (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901102) + packet.Flags[3] = true; + + // Switch Topic Alias to Topic Name + if (packet.VariableHeaderFields.Properties.TryFindData(PacketProperties.TopicAlias, DataTypes.TwoByteInteger, out var topicAliasData)) + { + var topicName = this.Session.ClientTopicAliasMapping.Find((UInt16)topicAliasData.Integer); + if (string.IsNullOrEmpty(topicName)) + Logger.Error(nameof(MQTTClient), $"{nameof(MessageDeliveryRetry)} packetId: {packetId} Topic Alias({(UInt16)topicAliasData.Integer}) found in packet but no Topic Name!", this.Context); + + packet.VariableHeaderFields[0] = Data.FromString(topicName); + + if (packet.VariableHeaderFields[2].Type == DataTypes.Property) + packet.VariableHeaderFields[2].Properties.RemoveProperty(PacketProperties.TopicAlias); + else + Logger.Error(nameof(MQTTClient), $"{nameof(MessageDeliveryRetry)} packetId: {packetId} Variable Header's second place expected to be Properties, but '{packet.VariableHeaderFields[2].Type}' found!", this.Context); + } + + this.Send(in packet); + + if (this._sendQuota == 0) + return; + + (found, packetId, packet) = this.Session.UnacknowledgedPackets.GetNext(packetId); + } + } + + // Publish Release packets + { + var (found, packetId) = this.Session.PublishReleasedPacketIDs.GetNext(0); + + while (found) + { + var outPacket = new PublishReleasePacketBuilder(this).WithPacketID(packetId).WithReasonCode(PublishReleaseAndCompleteReasonCodes.Success).Build(); + this.Send(in outPacket); + + (found, packetId) = this.Session.PublishReleasedPacketIDs.GetNext(packetId); + } + } + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs.meta new file mode 100644 index 00000000..2bfe38ff --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6d5d3a12339bae24780a10f5ad105594 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.PacketHandlers.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs new file mode 100644 index 00000000..acc6ec52 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs @@ -0,0 +1,372 @@ +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; +using Best.MQTT.Packets; +using Best.MQTT.Packets.Builders; +using Best.MQTT.Packets.Utils; +using Best.MQTT.Transports; + +using System; +using System.Threading; +using System.Threading.Tasks; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT +{ + /// + /// Possible states of the MQTTClient. + /// + public enum ClientStates + { + /// + /// State right after constructing the MQTTClient. + /// + Initial, + + /// + /// Connection process initiated. + /// + TransportConnecting, + + /// + /// Transport successfully connected to the broker. + /// + TransportConnected, + + /// + /// Connect packet sent and acknowledgement received. + /// + Connected, + + /// + /// Disconnect process initiated. + /// + Disconnecting, + + /// + /// Client disconnected from the broker. This could be the result either of a graceful termination or an unexpected error. + /// + Disconnected + } + + /// + /// Private class to hold connection related information. These information are needed only while connecting. + /// + class ConnectBag + { + //public ConnectPacketBuilder builder; + public ConnectPacketBuilderDelegate connectPacketBuilderFactory; + + public string errorReason; + public TaskCompletionSource completionSource; + } + + public sealed partial class MQTTClient + { + private ConnectBag connectBag; + + /// + /// With the use of BeginPacketBuffer and EndPacketBuffer sent messages can be buffered and sent in less network packets. It supports nested Begin-EndPacketBuffer calls. + /// + /// Instead of using and directly, use the instead! + public void BeginPacketBuffer() + { + Interlocked.Increment(ref this._bufferPackets); + } + + /// + /// Call this after a BeginPacketBuffer. + /// + /// Instead of using and directly, use the instead! + public void EndPacketBuffer() + { + if (this._bufferPackets == 0 || Interlocked.Decrement(ref this._bufferPackets) == 0) + { + byte[] initialBuffer = null; + try + { + if (this._outgoingPackets.Count > 0) + { + initialBuffer = BufferPool.Get(256, true); + using (var ms = new BufferPoolMemoryStream(initialBuffer, 0, initialBuffer.Length, true, true, false, true)) + { + var maximumPacketSize = this.NegotiatedOptions.ServerOptions.MaximumPacketSize; + + int packetCount = 0; + while (this._outgoingPackets.TryDequeue(out var packet)) + { + // calculate packet size only if there's a valid value + if (maximumPacketSize > 0 && maximumPacketSize < UInt32.MaxValue) + { + // The Client MUST NOT send packets exceeding Maximum Packet Size to the Server [MQTT-3.2.2-15]. (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901086) + UInt64 packetSize = packet.CalculatePacketSize(); + if (packetSize > maximumPacketSize) + { + Logger.Warning(nameof(MQTTClient), $"Skipping Packet({packet.Type}) because reached({packetSize}) server's maximum payload size limit({this.NegotiatedOptions.ServerOptions.MaximumPacketSize})!", this.Context); + continue; + } + else + packet.EncodeInto(ms); + } + else + packet.EncodeInto(ms); + + packetCount++; + } + + var sendBuffer = ms.GetBuffer(); + + Logger.Information(nameof(MQTTClient), $"{nameof(EndPacketBuffer)}: Sending {packetCount:N0} packet(s) encoded in {ms.Position:N0} bytes...", this.Context); + + this.transport.Send(new BufferSegment(sendBuffer, 0, (int)ms.Position)); + } + + this.lastPacketSentAt = DateTime.UtcNow; + } + } + catch (MQTTException ex) + { + if (initialBuffer != null) + BufferPool.Release(initialBuffer); + + Logger.Exception(nameof(MQTTClient), nameof(EndPacketBuffer), ex, this.Context); + this.MQTTError(nameof(EndPacketBuffer), ex); + } + catch (Exception ex) + { + if (initialBuffer != null) + BufferPool.Release(initialBuffer); + + Logger.Exception(nameof(MQTTClient), nameof(EndPacketBuffer), ex, this.Context); + } + } + } + + /// + /// Creates and returns with a ConnectPacketBuilder instance. + /// + public ConnectPacketBuilder CreateConnectPacketBuilder() => new ConnectPacketBuilder(this); + + /// + /// Starts the connection process to the broker. It's a non-blocking method. ConnectPacketBuilderCallback is a function that will be called after a successfully transport connection to negotiate protocol details. + /// + /// + /// Connect without any customization. + /// + /// client.BeginConnect((client, builder) => builder); + /// + /// + public void BeginConnect(ConnectPacketBuilderDelegate connectPacketBuilderCallback, CancellationToken token = default) + { + if (connectPacketBuilderCallback == null) + throw new ArgumentNullException(nameof(connectPacketBuilderCallback)); + + Logger.Information(nameof(MQTTClient), nameof(BeginConnect), this.Context); + if (this.State != ClientStates.Initial) + throw new Exception("This client is already used."); + + if (this.connectBag == null) + this.connectBag = new ConnectBag(); + this.connectBag.connectPacketBuilderFactory = connectPacketBuilderCallback; + + this.State = ClientStates.TransportConnecting; + + switch (this.Options.Transport) + { +#if !UNITY_WEBGL || UNITY_EDITOR + case SupportedTransports.TCP: + this.transport = new SecureTCPTransport(this); + break; +#endif + + case SupportedTransports.WebSocket: + this.transport = new WebSocketTransport(this); + break; + } + + this.transport.BeginConnect(token); + } + + /// + /// Starts connecting to the broker. + /// + public Task ConnectAsync(ConnectPacketBuilderDelegate connectPacketBuilder, CancellationToken token = default) + { + if (this.connectBag == null) + this.connectBag = new ConnectBag(); + this.connectBag.completionSource = new TaskCompletionSource(TaskCreationOptions.RunContinuationsAsynchronously); + + this.BeginConnect(connectPacketBuilder, token); + + return this.connectBag.completionSource.Task; + } + + /// + /// Creates and returns with a DisconnectPacketBuilder instance. + /// + public DisconnectPacketBuilder CreateDisconnectPacketBuilder() => new DisconnectPacketBuilder(this); + internal void BeginDisconnect(in DisconnectPacketBuilder builder) + { + if (this.State < ClientStates.TransportConnecting || this.State > ClientStates.Connected) + return; + + Logger.Information(nameof(MQTTClient), $"{nameof(BeginDisconnect)}({nameof(MQTTClient)}: {this.State}, Transport: {this.transport?.State})", this.Context); + + this.Session?.QueuedPackets.Clear(); + + if (this.State > ClientStates.Connected) + return; + + if (this.State == ClientStates.Connected) + { + var disconnectPacket = builder.Build(); + this.Send(in disconnectPacket); + } + + if (this.State >= ClientStates.TransportConnecting) + { + this.State = ClientStates.Disconnecting; + this.transport.BeginDisconnect(); + } + else + { + //this.State = ClientStates.Disconnected; + SetDisconnected(DisconnectReasonCodes.NormalDisconnection, string.Empty); + } + + if (IsQuitting) + { + //this.State = ClientStates.Disconnected; + SetDisconnected(DisconnectReasonCodes.NormalDisconnection, string.Empty); + (this as IHeartbeat).OnHeartbeatUpdate(DateTime.UtcNow, TimeSpan.Zero); + } + } + + /// + /// Creates and returns with a SubscribePacketBuilder. + /// + public SubscribePacketBuilder CreateSubscriptionBuilder(string topicFilter) => new SubscribePacketBuilder(this, topicFilter ?? throw new ArgumentNullException(nameof(topicFilter))); + + /// + /// Creates and returns with a BulkSubscribePacketBuilder instance. + /// + public BulkSubscribePacketBuilder CreateBulkSubscriptionBuilder() => new BulkSubscribePacketBuilder(this); + + internal Subscription BeginSubscribe(in BulkSubscribePacketBuilder builder) + { + if (this.State != ClientStates.Connected) + throw new Exception($"Not connected! Current state: {this.State}"); + + var (packet, subscription) = builder.Build(this); + + this.Send(in packet); + + return subscription; + } + + /// + /// Creates and returns with an UnsubscribePacketBuilder instance. + /// + public UnsubscribePacketBuilder CreateUnsubscribePacketBuilder(string topicFilter) => new UnsubscribePacketBuilder(this, topicFilter ?? throw new ArgumentNullException(nameof(topicFilter))); + + /// + /// Creates and returns with a BulkUnsubscribePacketBuilder instance. + /// + public BulkUnsubscribePacketBuilder CreateBulkUnsubscribePacketBuilder() => new BulkUnsubscribePacketBuilder(this); + + internal void BeginUnsubscribe(in BulkUnsubscribePacketBuilder builder) + { + if (this.State != ClientStates.Connected) + throw new Exception($"Not connected! Current state: {this.State}"); + + var outPacket = builder.Build(); + this.Send(in outPacket); + } + + /// + /// Adds a new topic alias. + /// + public void AddTopicAlias(string topicName) + { + Best.MQTT.Packets.Utils.ExceptionHelper.ThrowIfV311(this.Options.ProtocolVersion, $"{nameof(AddTopicAlias)} is available with MQTT v5.0 or newer."); + + if (string.IsNullOrEmpty(topicName)) + throw new ArgumentNullException(nameof(topicName)); + + if (this.State != ClientStates.Connected) + throw new Exception("Can add an alias only when connected!"); + + UInt16 aliases = this.Session.ClientTopicAliasMapping.Count(); + if (aliases >= this.NegotiatedOptions.ServerOptions.TopicAliasMaximum) + throw new Exception($"Can't add more alias, already reached the server's Topic Alias Maximum setting ({this.NegotiatedOptions.ServerOptions.TopicAliasMaximum})!"); + + this.Session.ClientTopicAliasMapping.Add(topicName, this.NegotiatedOptions.ServerOptions.TopicAliasMaximum); + } + + /// + /// Creates and returns with an ApplicationMessagePacketBuilder instance. + /// + public ApplicationMessagePacketBuilder CreateApplicationMessageBuilder(string topicName) => new ApplicationMessagePacketBuilder(this).WithTopicName(topicName); + internal void BeginPublish(in ApplicationMessagePacketBuilder builder) + { + if (this.State != ClientStates.Connected) + throw new Exception($"Not connected! Current state: {this.State}"); + + // If the Server included a Maximum QoS in its CONNACK response to a Client and it receives a PUBLISH packet with a QoS greater than this, + // then it uses DISCONNECT with Reason Code 0x9B (QoS not supported) (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901103) + if (this.NegotiatedOptions.ServerOptions.MaximumQoS > builder.QoS) + builder.WithQoS(this.NegotiatedOptions.ServerOptions.MaximumQoS); + + // Topic Alias + if (builder.PropertyBuilder.Properties.TryFindData(PacketProperties.TopicAlias, DataTypes.TwoByteInteger, out var topicAlias)) + { + if (string.IsNullOrEmpty(builder.TopicName)) + throw new ArgumentException($"TopicName is empty while TopicAlias({topicAlias.Integer}) is set"); + + this.Session.ClientTopicAliasMapping.Set((UInt16)topicAlias.Integer, builder.TopicName); + } + else + { + var (alias, sentToServer) = this.Session.ClientTopicAliasMapping.Find(builder.TopicName); + if (alias > 0 && alias <= this.NegotiatedOptions.ServerOptions.TopicAliasMaximum) + { + // The first publish message must send both the alias and topic name to the server. + if (!sentToServer) + this.Session.ClientTopicAliasMapping.SetSent(alias, sentToServer: true); + else + builder.WithTopicName(string.Empty); + builder.PropertyBuilder.WithTopicAlias(alias); + } + //else + //{ + // throw new Exception("Neither Topic Alias or Topic Name could be found in the builder!"); + //} + } + + var packet = builder.Build(this); + + // Each time the Client or Server sends a PUBLISH packet at QoS > 0, it decrements the send quota. + // If the send quota reaches zero, the Client or Server MUST NOT send any more PUBLISH packets with QoS > 0 [MQTT-4.9.0-2]. + bool queuePacket = builder.QoS > QoSLevels.AtMostOnceDelivery && this._sendQuota == 0; + + if (queuePacket) + { + Logger.Verbose(nameof(MQTTClient), $"{nameof(BeginPublish)} queuing packet ({builder.PacketID}) with QoS({builder.QoS}) and quota({this._sendQuota})", this.Context); + this.Session.QueuedPackets.Add(builder.PacketID, in packet); + } + else + SendPublishPacket(builder.PacketID, in packet); + } + + /// + /// Creates and returns with an AuthenticationPacketBuilder instance. + /// + public AuthenticationPacketBuilder CreateAuthenticationPacketBuilder() => new AuthenticationPacketBuilder(this); + internal void BeginAuthentication(in AuthenticationPacketBuilder builder) + { + var outPacket = builder.Build(); + this.Send(in outPacket); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs.meta new file mode 100644 index 00000000..9b54bf68 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9ed853ce92b71634ba09e35e87db6385 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.Public.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs new file mode 100644 index 00000000..d1ca61c0 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs @@ -0,0 +1,458 @@ +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Threading; +using System.Linq; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; + +using Best.MQTT.Packets; +using Best.MQTT.Packets.Builders; +using Best.MQTT.Transports; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT +{ + public delegate void OnConnectedDelegate(MQTTClient client); + public delegate void OnServerConnectAckMessageDelegate(MQTTClient client, ServerConnectAckMessage message); + public delegate void OnApplicationMessageDelegate(MQTTClient client, ApplicationMessage message); + public delegate void OnAuthenticationMessageDelegate(MQTTClient client, AuthenticationMessage message); + public delegate void OnErrorDelegate(MQTTClient client, string error); + public delegate void OnDisconnectDelegate(MQTTClient client, DisconnectReasonCodes reasonCode, string reasonMessage); + public delegate void OnStateChangedDelegate(MQTTClient client, ClientStates oldState, ClientStates newState); + public delegate ConnectPacketBuilder ConnectPacketBuilderDelegate(MQTTClient client, ConnectPacketBuilder builder); + + /// + /// Represents an MQTT client, providing capabilities to connect to MQTT brokers, + /// send and receive messages, and handle various MQTT events. This class is the central + /// component for managing MQTT communications in an MQTT capable application. + /// + public sealed partial class MQTTClient : IHeartbeat + { + /// + /// Connection related options. + /// + public ConnectionOptions Options { get; private set; } + + /// + /// Called when the client successfully connected to the broker. + /// + public event OnConnectedDelegate OnConnected; + + /// + /// Called when the broker acknowledged the client's connect packet. + /// + public event OnServerConnectAckMessageDelegate OnServerConnectAckMessage; + + /// + /// Called for every application message sent by the broker. + /// + public event OnApplicationMessageDelegate OnApplicationMessage; + + /// + /// Called when an authentication packet is received from the broker as part of the extended authentication process. + /// + public event OnAuthenticationMessageDelegate OnAuthenticationMessage; + + /// + /// Called when an unexpected, unrecoverable error happens. After this event an OnDisconnect event is called too. + /// + public event OnErrorDelegate OnError; + + /// + /// Called after the client disconnects from the broker. + /// + public event OnDisconnectDelegate OnDisconnect; + + /// + /// Called for every internal state change of the client. + /// + public event OnStateChangedDelegate OnStateChanged; + + /// + /// Current state of the client. State changed events are emitted through the OnStateChanged event. + /// + public ClientStates State { get => this._state; + private set + { + var oldState = this._state; + if (oldState != value) + { + this._state = value; + + try + { + this.OnStateChanged?.Invoke(this, oldState, this._state); + } + catch (MQTTException ex) + { + this.MQTTError(nameof(OnStateChanged), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), nameof(OnStateChanged), ex, this.Context); + } + } + } + } + private ClientStates _state; + + /// + /// Options negotiated with the broker. + /// + public NegotiatedOptions NegotiatedOptions { get; private set; } + + /// + /// Session instance to persist QoS data. + /// + public Session Session { get; internal set; } + + /// + /// Get all the Subscriptions associated with the MQTT session. + /// + /// This list will include all the pending subscriptions too (pending for subscribing or unsubscribing). + public List Subscriptions => (from kvp in this.subscriptions select kvp.Value).ToList(); + + /// + /// Context of the MQTTClient and all child instances (like its transport, etc.) that can produce log outputs. + /// + public LoggingContext Context { get; private set; } + + internal UInt32 GetNextSubscriptionID() => (UInt32)Interlocked.Increment(ref this._lastSubscriptionID); + private long _lastSubscriptionID = 0; + + internal UInt16 GetNextPacketID() + { + long nextId = 0; + + do + { + nextId = Interlocked.Increment(ref this._lastPacketID) % UInt16.MaxValue; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901026 + // Each time a Server sends a new PUBLISH (with QoS > 0) MQTT Control Packet it MUST assign it a non zero Packet Identifier that is currently unused [MQTT-2.2.1-4]. + // when restarted it might generate packets in use in unacknowledged packets! + } while (nextId == 0 || + this.Session.UnacknowledgedPackets.IsPacketIDInUse((UInt16)nextId) || + this.Session.PublishReleasedPacketIDs.Contains((UInt16)nextId)); + + return (UInt16)nextId; + } + private long _lastPacketID = 0; + + private Transport transport; + private DateTime lastPacketSentAt; + private DateTime pingSentAt = DateTime.MinValue; + + private Dictionary _serverTopicAliasMapping; + + private ConcurrentDictionary pendingSubscriptions = new ConcurrentDictionary(); + private ConcurrentDictionary subscriptions = new ConcurrentDictionary(); + + private ConcurrentDictionary> pendingUnsubscriptions = new ConcurrentDictionary>(); + + private UInt16 _sendQuota; + private UInt16 _maxQuota; + + private ConcurrentQueue _outgoingPackets = new ConcurrentQueue(); + private volatile int _bufferPackets; + + public MQTTClient(ConnectionOptions options) + { + this.Context = new LoggingContext(this); + + this.Options = options; + this.NegotiatedOptions = new NegotiatedOptions(); + + Setup(); + Heartbeats.Subscribe(this); + } + + private void Send(in Packet packet) + { + Logger.Information(nameof(MQTTClient), $"{nameof(Send)}({packet.ToString()})", this.Context); + + this._outgoingPackets.Enqueue(packet); + + // if buffering is off, prepare and send packets immediately. + if (this._bufferPackets == 0) + EndPacketBuffer(); + } + + internal void TransportConnected() + { + if (this.State >= ClientStates.Disconnecting) + return; + + Logger.Information(nameof(MQTTClient), nameof(TransportConnected), this.Context); + + var packetBuilder = this.CreateConnectPacketBuilder(); + + if (this.connectBag != null && this.connectBag.connectPacketBuilderFactory != null) + { + try + { + packetBuilder = this.connectBag.connectPacketBuilderFactory(this, packetBuilder); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), nameof(this.connectBag.connectPacketBuilderFactory), ex, this.Context); + } + } + else + Logger.Warning(nameof(MQTTClient), $"Not ConnectPacketBuilder function! Connecting with default packet...", this.Context); + + var packetBuilderResult = packetBuilder.Build(); + + this.Session = packetBuilderResult.session; + this.NegotiatedOptions.ClientKeepAlive = packetBuilderResult.clientKeepAlive; + this.NegotiatedOptions.ClientMaximumPacketSize = packetBuilderResult.clientMaximumPacketSize; + this.NegotiatedOptions.ClientReceiveMaximum = packetBuilderResult.clientReceiveMaximum; + + this.Send(in packetBuilderResult.packet); + + this.State = ClientStates.TransportConnected; + } + + internal void TransportDisconnectedWithError(string reason) + { + if (this.State >= ClientStates.Disconnected) + return; + + Logger.Information(nameof(MQTTClient), $"{nameof(TransportDisconnectedWithError)}(\"{reason}\")", this.Context); + + Error("Transport", DisconnectReasonCodes.UnspecifiedError, reason); + } + + internal void TransportDisconnected(string reason) + { + if (this.State >= ClientStates.Disconnected) + return; + + Logger.Information(nameof(MQTTClient), $"{nameof(TransportDisconnected)}(\"{reason}\")", this.Context); + + //Error("Transport", reason); + SetDisconnected(DisconnectReasonCodes.NormalDisconnection, reason); + } + + internal void AddSubscription(UInt16 packetId, Subscription subscription) + { + this.pendingSubscriptions.TryAdd(packetId, subscription); + this.subscriptions.TryAdd(subscription.ID, subscription); + } + + internal IEnumerable FindSubscriptionsWithMatchingTopic(string topic) + { + foreach (var kvp in this.subscriptions) + if (kvp.Value.HasMatchingTopic(topic)) + yield return kvp.Value; + } + + internal void AddUnsubscription(UInt16 packetId, List filter) + { + if (this.State != ClientStates.Connected) + throw new Exception($"Not connected! Current state: {this.State}"); + + this.pendingUnsubscriptions.TryAdd(packetId, filter); + } + + private void SendPublishPacket(UInt16 packetId, in Packet publishPacket) + { + if (publishPacket.Type != PacketTypes.Publish) + throw new ArgumentException($"{nameof(SendPublishPacket)} expected a PUBLISH packet, received {publishPacket.Type}"); + + Logger.Verbose(nameof(MQTTClient), $"{nameof(SendPublishPacket)}({packetId}) SendQuota: {this._sendQuota}", this.Context); + + if (packetId != 0) + { + this.Session.UnacknowledgedPackets.Add(packetId, in publishPacket); + this._sendQuota--; + } + + this.Send(in publishPacket); + } + + internal void MQTTError(string source, MQTTException exception) + { + this.MQTTError(source, exception.MQTTError, exception.Message); + } + + internal void MQTTError(string source, MQTTErrorTypes errorType, string reason) + { + Logger.Error(nameof(MQTTClient), $"MQTTError(\"{source}\", {errorType}, \"{reason}\")", this.Context); + + DisconnectReasonCodes disconnectReason; + + switch (errorType) + { + case MQTTErrorTypes.MalformedPacket: disconnectReason = DisconnectReasonCodes.MalformedPacket; break; + case MQTTErrorTypes.ProtocolError: disconnectReason = DisconnectReasonCodes.ProtocolError; break; + case MQTTErrorTypes.PacketTooLarge: disconnectReason = DisconnectReasonCodes.PacketTooLarge; break; + case MQTTErrorTypes.ReceiveMaximumExceeded: disconnectReason = DisconnectReasonCodes.ReceiveMaximumExceeded; break; + default: + throw new NotImplementedException($"Unknown internal MQTT error type({errorType}) with reason \"{reason}\""); + } + + var builder = new DisconnectPacketBuilder(this); + if (this.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + builder.WithReasonCode(disconnectReason); + this.BeginDisconnect(builder); + + this.Error(source, disconnectReason, reason); + } + + private void Error(string source, DisconnectReasonCodes code, string reason) + { + reason = reason ?? string.Empty; + + Logger.Information(nameof(MQTTClient), $"{nameof(Error)}(\"{source}\", {code}, \"{reason}\"", this.Context); + + try + { + if (this.connectBag != null) + this.connectBag.errorReason = reason; + + this.OnError?.Invoke(this, reason); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(OnError)}(\"{source}\", {code}, \"{reason}\")", ex, this.Context); + } + + this.transport?.BeginDisconnect(); + //this.State = ClientStates.Disconnected; + SetDisconnected(code, reason); + } + + private void SetDisconnected(DisconnectReasonCodes code, string reason) + { + if (this.State >= ClientStates.Disconnected) + return; + + Logger.Information(nameof(MQTTClient), $"{nameof(SetDisconnected)}({code}, \"{reason}\"", this.Context); + + this.State = ClientStates.Disconnected; + + try + { + this.OnDisconnect?.Invoke(this, code, reason); + } + catch(Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{nameof(OnDisconnect)}(\"{code}\", \"{reason}\")", ex, this.Context); + } + } + + void IHeartbeat.OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + this.BeginPacketBuffer(); + try + { + while (this.transport.IncomingPackets.TryDequeue(out var packet)) + { + if (this.State >= ClientStates.Disconnecting) + continue; + + Logger.Information(nameof(MQTTClient), $"Processing Incoming Packet '{packet.Type}'", this.Context); + + try + { + switch (packet.Type) + { + case PacketTypes.ConnectAck: HandleConnectAckPacket(packet); break; + case PacketTypes.Disconnect: HandleDisconnectPacket(packet); break; + + case PacketTypes.SubscribeAck: HandleSubscribeAckPacket(packet); break; + case PacketTypes.UnsubscribeAck: HandleUnsubscribeAckPacket(packet); break; + + case PacketTypes.Publish: HandlePublishPacket(packet); break; + + // QoS 2, delivery part 1 + case PacketTypes.PublishReceived: HandlePublishReceivedPacket(packet); break; + // QoS 2, delivery part 2 + case PacketTypes.PublishRelease: HandlePublishReleasePacket(packet); break; + // QoS 2, delivery part 3 + case PacketTypes.PublishComplete: HandlePublishCompletePacket(packet); break; + + // QoS 1: + case PacketTypes.PublishAck: HandlePublishAckPacket(packet); break; + + case PacketTypes.PingResponse: + Logger.Verbose(nameof(MQTTClient), $"Received Ping Response!", this.Context); + this.pingSentAt = DateTime.MinValue; + break; + + case PacketTypes.Auth: HandleAuthPacket(packet); break; + + default: Logger.Warning(nameof(MQTTClient), $"Unhandled incoming packet '{packet.Type}'!", this.Context); break; + } + } + catch(MQTTException ex) + { + Logger.Exception(nameof(MQTTClient), $"{packet.Type}", ex, this.Context); + this.MQTTError($"OnHeartbeatUpdate.IncomingPackets({packet.Type})", ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(MQTTClient), $"{packet.Type}", ex, this.Context); + } + } + + switch(this.State) + { + case ClientStates.TransportConnecting: + case ClientStates.TransportConnected: + if (this.transport.ConnectCancellationToken.IsCancellationRequested) + this.CreateDisconnectPacketBuilder() + .WithReasonCode(DisconnectReasonCodes.MaximumConnectTime) + .BeginDisconnect(); + break; + + case ClientStates.Connected: + var keepAlive = this.NegotiatedOptions.ServerOptions.ServerKeepAlive ?? this.NegotiatedOptions.ClientKeepAlive; + if (keepAlive > 0) + { + if (this.pingSentAt == DateTime.MinValue && now - lastPacketSentAt >= TimeSpan.FromSeconds(keepAlive)) + { + var pingPacket = new Packet { Type = PacketTypes.PingRequest }; + this.Send(in pingPacket); + this.pingSentAt = now; + + Logger.Verbose(nameof(MQTTClient), $"Sent Ping Request ({now.ToLongTimeString()})", this.Context); + } + + var diff = now - this.pingSentAt; + TimeSpan max = TimeSpan.FromSeconds(Math.Max(keepAlive / 2, 1)); + if (this.pingSentAt != DateTime.MinValue && diff >= max) + { + Logger.Verbose(nameof(MQTTClient), $"Not received Ping Response in the given time! diff: {diff}, max: {max}", this.Context); + Error(nameof(MQTTClient), DisconnectReasonCodes.KeepAliveTimeout, "Not received Ping Response in a reasonable time!"); + } + } + break; + + case ClientStates.Disconnected: + Logger.Verbose(nameof(MQTTClient), $"Final cleanup, closing session", this.Context); + + Heartbeats.Unsubscribe(this); + + if (this.transport.ConnectCancellationToken.IsCancellationRequested) + this.connectBag?.completionSource?.TrySetCanceled(); + else + this.connectBag?.completionSource?.TrySetException(new Exception(this.connectBag?.errorReason)); + this.connectBag = null; + + this.Session?.Close(); + this.Session = null; + break; + } + } + finally + { + this.EndPacketBuffer(); + } + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs.meta new file mode 100644 index 00000000..d3f66d91 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 551a35ef2aca16c47851a88beb7e034a +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClient.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs new file mode 100644 index 00000000..d27c5e5f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs @@ -0,0 +1,103 @@ +using System; + +namespace Best.MQTT +{ + /// + /// Builder class to make MQTTClient creation easier. + /// + public sealed class MQTTClientBuilder + { + private ConnectionOptions _options = new ConnectionOptions(); + private OnConnectedDelegate _onConnected; + private OnServerConnectAckMessageDelegate _onServerConnectAckMessage; + private OnApplicationMessageDelegate _onApplicationMessage; + private OnAuthenticationMessageDelegate _onAuthenticationMessage; + private OnErrorDelegate _onError; + private OnDisconnectDelegate _onDisconnect; + private OnStateChangedDelegate _onStateChanged; + + public MQTTClientBuilder WithOptions(ConnectionOptions options) + { + this._options = options; + return this; + } + + public MQTTClientBuilder WithOptions(ConnectionOptionsBuilder builder) + { + return WithOptions(builder.Build()); + } + + public MQTTClientBuilder WithEventHandler(OnConnectedDelegate onConnected) + { + this._onConnected = onConnected; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnServerConnectAckMessageDelegate onServerConnectAckMessage) + { + this._onServerConnectAckMessage = onServerConnectAckMessage; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnApplicationMessageDelegate onApplicationMessage) + { + this._onApplicationMessage = onApplicationMessage; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnAuthenticationMessageDelegate onAuthenticationMessage) + { + this._onAuthenticationMessage = onAuthenticationMessage; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnErrorDelegate onError) + { + this._onError = onError; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnDisconnectDelegate onDisconnect) + { + this._onDisconnect = onDisconnect; + return this; + } + + public MQTTClientBuilder WithEventHandler(OnStateChangedDelegate onStateChanged) + { + this._onStateChanged = onStateChanged; + return this; + } + + /// + /// Creates an MQTTClient instance. + /// + public MQTTClient CreateClient() + { + var client = new MQTTClient(this._options); + + if (this._onConnected != null) + client.OnConnected += this._onConnected; + + if (this._onServerConnectAckMessage != null) + client.OnServerConnectAckMessage += this._onServerConnectAckMessage; + + if (this._onApplicationMessage != null) + client.OnApplicationMessage += this._onApplicationMessage; + + if (this._onAuthenticationMessage != null) + client.OnAuthenticationMessage += this._onAuthenticationMessage; + + if (this._onError != null) + client.OnError += this._onError; + + if (this._onDisconnect != null) + client.OnDisconnect += this._onDisconnect; + + if (this._onStateChanged != null) + client.OnStateChanged += this._onStateChanged; + + return client; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs.meta new file mode 100644 index 00000000..c0d12d54 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 09ca98030da5cf542ae7cb656e3f1c09 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/MQTTClientBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs new file mode 100644 index 00000000..ac08186a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs @@ -0,0 +1,35 @@ +using System; + +using Best.MQTT.Packets; + +namespace Best.MQTT +{ + /// + /// Options that the client and server must agree on. Values that the client would like to use are the root fields (Client*) and the server's own are in the ServerOptions. + /// + public sealed class NegotiatedOptions + { + /// + /// Client set keep-alive time in seconds. + /// + public UInt16 ClientKeepAlive { get; internal set; } + + /// + /// Maximum Packet Size the Client is willing to accept + /// + public UInt32 ClientMaximumPacketSize { get; internal set; } + + /// + /// The Client uses this value to limit the number of QoS 1 and QoS 2 publications that it is willing to process concurrently. + /// There is no mechanism to limit the QoS 0 publications that the Server might try to send. + /// The value of Receive Maximum applies only to the current Network Connection. + /// If the Receive Maximum value is absent then its value defaults to 65,535. + /// + public UInt16 ClientReceiveMaximum { get; internal set; } + + /// + /// It's available only after the State is changed to Connected! + /// + public ServerConnectAckMessage ServerOptions { get; internal set; } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs.meta new file mode 100644 index 00000000..2d3689fb --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 6aeda3f9487b11c48ab3827b58e34222 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/NegotiatedOptions.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs new file mode 100644 index 00000000..5f617898 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs @@ -0,0 +1,24 @@ +using System; + +namespace Best.MQTT +{ + /// + /// Helper class to help safely use MQTTClient's BeginPacketBuffer-EndPacketBuffer pairs in a using. + /// + public struct PacketBufferHelper : IDisposable + { + private readonly MQTTClient _client; + public PacketBufferHelper(MQTTClient client) + { + this._client = client; + this._client?.BeginPacketBuffer(); + } + + public void Dispose() => this._client?.EndPacketBuffer(); + } + + public static class PacketBufferHelperExtensions + { + public static PacketBufferHelper CreatePacketBufferHelper(this MQTTClient client) => new PacketBufferHelper(client); + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs.meta new file mode 100644 index 00000000..0e46b684 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 0ff8022dcb3ce5e4ca6d640b9ebc1023 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/PacketBufferHelper.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets.meta new file mode 100644 index 00000000..6450c954 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 13d8eff66728a8b48b5abfd3a6279d70 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs new file mode 100644 index 00000000..bb3e8c63 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs @@ -0,0 +1,29 @@ +using System; +using System.Collections.Generic; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.MQTT.Packets +{ + public readonly struct AuthenticationMessage + { + public readonly AuthReasonCodes ReasonCode; + public readonly string Reason; + + public readonly string Method; + public readonly BufferSegment Data; + + public readonly List> UserProperties; + + internal AuthenticationMessage(Packet packet) + { + this.ReasonCode = (AuthReasonCodes)packet.VariableHeaderFields[0].Integer; + this.Reason = packet.VariableHeaderFields.Properties.TryFindData(PacketProperties.ReasonString, Utils.DataTypes.UTF8String, out var data) ? data.UTF8String.Key : null; + + this.Method = packet.VariableHeaderFields.Properties.TryFindData(PacketProperties.AuthenticationMethod, Utils.DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + this.Data = packet.VariableHeaderFields.Properties.TryFindData(PacketProperties.AuthenticationData, Utils.DataTypes.Binary, out data) ? data.Binary : BufferSegment.Empty; + + this.UserProperties = packet.VariableHeaderFields.Properties.ConvertAll>(PacketProperties.UserProperty, kvp_data => kvp_data.UTF8String); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs.meta new file mode 100644 index 00000000..109094bd --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5b9e48cf8e0d20d4688e95c1da0ee167 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/AuthenticationMessage.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders.meta new file mode 100644 index 00000000..b027d93c --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 5363e4da66144e647bd9eac05107fd51 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs new file mode 100644 index 00000000..aeeab451 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs @@ -0,0 +1,359 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// Builder to create an application message. + /// + public struct ApplicationMessagePacketBuilder + { + private MQTTClient _client; + + internal QoSLevels QoS { get => this._qos; } + internal string TopicName { get => this._topicName; } + internal UInt16 PacketID { get => this._packetId; } + internal PublishPropertyBuilder PropertyBuilder { get => this._propertyBuilder; } + + private BitField _flags; + private QoSLevels _qos; + private string _topicName; + private UInt16 _packetId; + + private PublishPropertyBuilder _propertyBuilder; + + private byte[] _payload; + + internal ApplicationMessagePacketBuilder(MQTTClient client) + { + this._client = client; + + this._flags = new BitField(0); + this._qos = QoSLevels.AtMostOnceDelivery; + this._topicName = null; + this._packetId = 0; + + this._propertyBuilder = default(PublishPropertyBuilder); + this._payload = null; + } + + /// + /// Set the duplicate flag. (Not really used, it's set directly in MessageDeliveryRetry function) + /// + /// + internal ApplicationMessagePacketBuilder WithDuplicate() + { + this._flags[3] = true; + return this; + } + + /// + /// Send the packet with a packet ID required for > QoS 0. + /// + internal ApplicationMessagePacketBuilder WithPacketId(UInt16 packetId) + { + if (packetId != 0 && this._qos == QoSLevels.AtMostOnceDelivery) + throw new ArgumentException($"The Packet Identifier field is only present in PUBLISH packets where the QoS level is 1 or 2."); + + this._packetId = packetId; + return this; + } + + /// + /// Build the packet with the given QoS level. + /// + public ApplicationMessagePacketBuilder WithQoS(QoSLevels qos) + { + this._qos = qos; + + switch (this._qos) + { + case QoSLevels.AtMostOnceDelivery: this._flags[2] = this._flags[1] = false; WithPacketId(0); break; + case QoSLevels.AtLeastOnceDelivery: this._flags[2] = false; this._flags[1] = true; WithPacketId(this._client.GetNextPacketID()); break; + case QoSLevels.ExactlyOnceDelivery: this._flags[2] = true; this._flags[1] = false; WithPacketId(this._client.GetNextPacketID()); break; + } + return this; + } + + /// + /// Build the packet with the given retain flag. + /// + public ApplicationMessagePacketBuilder WithRetain(bool retain = true) + { + this._flags[0] = retain; + return this; + } + + /// + /// Build the packet with the given topic name. + /// + internal ApplicationMessagePacketBuilder WithTopicName(string topicName) + { + if (topicName.Contains("#") || topicName.Contains("+")) + throw new ArgumentException("The Topic Name in the PUBLISH packet MUST NOT contain wildcard characters [MQTT-3.3.2-2]."); + this._topicName = topicName; + return this; + } + + /// + /// Build the packet with the given payload format indicator. + /// + /// + public ApplicationMessagePacketBuilder WithPayloadFormatIndicator(PayloadTypes payloadType) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithPayloadFormatIndicator)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithPayloadFormatIndicator(payloadType); + return this; + } + + /// + /// Set the application message's expiry interval (it's in seconds). + /// + /// + public ApplicationMessagePacketBuilder WithMessageExpiryInterval(UInt32 seconds) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithMessageExpiryInterval)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithMessageExpiryInterval(seconds); + return this; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901113 + /// + internal ApplicationMessagePacketBuilder WithTopicAlias(UInt16 alias) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithTopicAlias)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithTopicAlias(alias); + return this; + } + + /// + /// Set the application message's response topic. + /// + /// + public ApplicationMessagePacketBuilder WithResponseTopic(string responseTopic) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithResponseTopic)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithResponseTopic(responseTopic); + return this; + } + + /// + /// Optional data sent with the application message. + /// + /// + public ApplicationMessagePacketBuilder WithCorrelationData(byte[] data) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithCorrelationData)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithCorrelationData(data); + return this; + } + + /// + /// Optional key value pairs that will be sent with the application message. + /// + /// + public ApplicationMessagePacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithUserProperty(key, value); + return this; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901117 + /// + internal ApplicationMessagePacketBuilder WithSubscriptionIdentifier(UInt32 subscriptionId) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithSubscriptionIdentifier)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithSubscriptionIdentifier(subscriptionId); + return this; + } + + /// + /// Optional Content-Type value to help process the application message's payload. + /// + /// + public ApplicationMessagePacketBuilder WithContentType(string contentType) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithContentType)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder.WithContentType(contentType); + return this; + } + + internal ApplicationMessagePacketBuilder WithProperties(PublishPropertyBuilder propertyBuilder) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithProperties)} is available with MQTT v5.0 or newer."); + + this._propertyBuilder = propertyBuilder; + return this; + } + + /// + /// Set the application message's payload. + /// + public ApplicationMessagePacketBuilder WithPayload(byte[] payload) + { + this._payload = payload; + return this; + } + + /// + /// Set the application message's payload. It also sets the payload format indicator to PayloadTypes.UTF8. + /// + public ApplicationMessagePacketBuilder WithPayload(string payload) + { + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + this.WithPayloadFormatIndicator(PayloadTypes.UTF8); + + return this.WithPayload(System.Text.Encoding.UTF8.GetBytes(payload)); + } + + /// + /// Begin sending the application message to the broker. + /// + public void BeginPublish() => this._client.BeginPublish(this); + + internal Packet Build(MQTTClient client) + { + if (client == null) + throw new ArgumentNullException(nameof(client), $"Use {nameof(ApplicationMessagePacketBuilder)} through {nameof(MQTTClient)}'s {nameof(MQTTClient.CreateApplicationMessageBuilder)}!"); + + if (this._qos > client.NegotiatedOptions.ServerOptions.MaximumQoS) + throw new ArgumentException($"QoS({this._qos}) is greater than server's maximum QoS({client.NegotiatedOptions.ServerOptions.MaximumQoS})"); + + if (string.IsNullOrEmpty(this._topicName)) + throw new ArgumentException($"{nameof(TopicName)} must not be empty!"); + + var packet = new Packet(); + packet.Type = PacketTypes.Publish; + + // reserved set + this._flags[4] = true; + + packet.Flags = this._flags; + + // Topic Name + packet.AddVariableHeader(Data.FromString(this._topicName)); + + // Packet Identifier + if (this._packetId > 0) + packet.AddVariableHeader(Data.FromTwoByteInteger(this._packetId)); + + // Properties + var properties = this._propertyBuilder.Build(); + if (properties.TryFindData(PacketProperties.TopicAlias, DataTypes.TwoByteInteger, out var topicAlias)) + { + // A Client MUST NOT send a PUBLISH packet with a Topic Alias greater than the Topic Alias Maximum value returned by the Server in the CONNACK packet [MQTT-3.3.2-9]. + if (topicAlias.Integer > client.NegotiatedOptions.ServerOptions.TopicAliasMaximum) + throw new ArgumentException($"A Client MUST NOT send a PUBLISH packet with a Topic Alias greater than the Topic Alias Maximum value({client.NegotiatedOptions.ServerOptions.TopicAliasMaximum}) returned by the Server in the CONNACK packet"); + } + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.FromProperties(properties)); + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901119 + // The length of the Payload can be calculated by subtracting the length of the Variable Header from the Remaining Length field that is in the Fixed Header. + // It is valid for a PUBLISH packet to contain a zero length Payload. + if (this._payload != null) + packet.AddPayload(Data.FromRaw(this._payload)); + + return packet; + } + } + + /// + /// Internal struct to aid publish-property building. + /// + internal struct PublishPropertyBuilder + { + internal Properties Properties { get => this._properties; } + private Properties _properties; + + /// + /// + /// + public PublishPropertyBuilder WithPayloadFormatIndicator(PayloadTypes payloadType) + { + this._properties.AddProperty(PacketProperties.PayloadFormatIndicator, Data.FromByte((byte)payloadType)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithMessageExpiryInterval(UInt32 seconds) + { + this._properties.AddProperty(PacketProperties.MessageExpiryInterval, Data.FromFourByteInteger(seconds)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithTopicAlias(UInt16 alias) + { + if (alias == 0) + throw new ArgumentException("A Topic Alias of 0 is not permitted."); + + this._properties.AddProperty(PacketProperties.TopicAlias, Data.FromTwoByteInteger(alias)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithResponseTopic(string responseTopic) + { + this._properties.AddProperty(PacketProperties.ResponseTopic, Data.FromString(responseTopic)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithCorrelationData(byte[] data) + { + this._properties.AddProperty(PacketProperties.CorrelationData, Data.FromArray(data)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(PacketProperties.UserProperty, Data.FromStringPair(key, value)); + return this; + } + + /// + /// + /// + internal PublishPropertyBuilder WithSubscriptionIdentifier(UInt32 subscriptionId) + { + this._properties.AddProperty(PacketProperties.SubscriptionIdentifier, Data.FromVariableByteInteger(subscriptionId)); + return this; + } + + /// + /// + /// + public PublishPropertyBuilder WithContentType(string contentType) + { + this._properties.AddProperty(PacketProperties.ContentType, Data.FromString(contentType)); + return this; + } + + internal Properties Build() => this._properties; + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs.meta new file mode 100644 index 00000000..6b6f843e --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a4f9e454c205c4d418196f26a72787c6 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ApplicationMessagePacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs new file mode 100644 index 00000000..79a520f7 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs @@ -0,0 +1,124 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901217 + /// + public struct AuthenticationPacketBuilder + { + private MQTTClient _client; + + private AuthReasonCodes _reasonCode; + private AuthenticationPropertiesBuilder _propertiesBuilder; + + public AuthenticationPacketBuilder(MQTTClient client) + { + this._client = client; + + this._reasonCode = AuthReasonCodes.Success; + this._propertiesBuilder = default(AuthenticationPropertiesBuilder); + + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(AuthenticationPacketBuilder)} is available with MQTT v5.0 or newer."); + } + + public AuthenticationPacketBuilder WithReasonCode(AuthReasonCodes authReason) + { + this._reasonCode = authReason; + return this; + } + + public AuthenticationPacketBuilder WithAuthenticationMethod(string method) + { + this._propertiesBuilder.WithAuthenticationMethod(method); + + return this; + } + + public AuthenticationPacketBuilder WithAuthenticationData(byte[] data) + { + this._propertiesBuilder.WithAuthenticationData(data); + + return this; + } + + public AuthenticationPacketBuilder WithReasonString(string reason) + { + this._propertiesBuilder.WithReasonString(reason); + + return this; + } + + public AuthenticationPacketBuilder WithUserProperty(string key, string value) + { + this._propertiesBuilder.WithUserProperty(key, value); + + return this; + } + + internal AuthenticationPacketBuilder WithPropertyBuilder(AuthenticationPropertiesBuilder builder) + { + this._propertiesBuilder = builder; + + return this; + } + + public void BeginAuthenticate() => this._client.BeginAuthentication(this); + + internal Packet Build() + { + Packet packet = new Packet(); + packet.Type = PacketTypes.Auth; + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. In this case the AUTH has a Remaining Length of 0. + if (this._reasonCode != AuthReasonCodes.Success || this._propertiesBuilder.Count != 0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + packet.AddVariableHeader(Data.FromProperties(this._propertiesBuilder.Build())); + } + + return packet; + } + } + + internal struct AuthenticationPropertiesBuilder + { + private Properties _properties; + internal int Count { get => this._properties.Count; } + + public AuthenticationPropertiesBuilder WithAuthenticationMethod(string method) + { + this._properties.ThrowIfPresent(PacketProperties.AuthenticationMethod); + this._properties.AddProperty(PacketProperties.AuthenticationMethod, Data.FromString(method)); + + return this; + } + + public AuthenticationPropertiesBuilder WithAuthenticationData(byte[] data) + { + this._properties.ThrowIfPresent(PacketProperties.AuthenticationData); + this._properties.AddProperty(PacketProperties.AuthenticationData, Data.FromArray(data)); + + return this; + } + + public AuthenticationPropertiesBuilder WithReasonString(string reason) + { + this._properties.ThrowIfPresent(PacketProperties.ReasonString); + this._properties.AddProperty(PacketProperties.ReasonString, Data.FromString(reason)); + + return this; + } + + public AuthenticationPropertiesBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(PacketProperties.UserProperty, Data.FromStringPair(key, value)); + + return this; + } + + internal Properties Build() => this._properties; + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs.meta new file mode 100644 index 00000000..18ff2d12 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 53323aac15f52ed408d443036554a04c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/AuthenticationPacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs new file mode 100644 index 00000000..88c4d696 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs @@ -0,0 +1,266 @@ +using System; +using System.Collections.Generic; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901161 + /// + public struct SubscribePacketBuilder + { + private MQTTClient _client; + + private Properties _properties; + private SubscribeTopicBuilder _topicBuilder; + + internal SubscribePacketBuilder(MQTTClient client, string topicFilter) + { + this._client = client; + + this._properties = default(Properties); + this._topicBuilder = new SubscribeTopicBuilder(topicFilter); + this._topicBuilder.WithMaximumQoS(client.NegotiatedOptions.ServerOptions.MaximumQoS); + } + + public SubscribePacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + + public SubscribePacketBuilder WithMaximumQoS(QoSLevels maxQoS) + { + this._topicBuilder.WithMaximumQoS(maxQoS); + return this; + } + + public SubscribePacketBuilder WithNoLocal() + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithNoLocal)} is available with MQTT v5.0 or newer."); + + this._topicBuilder.WithNoLocal(); + return this; + } + + public SubscribePacketBuilder WithRetainAsPublished() + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithRetainAsPublished)} is available with MQTT v5.0 or newer."); + + this._topicBuilder.WithRetainAsPublished(); + return this; + } + + public SubscribePacketBuilder WithRetainHandlingOptions(RetainHandlingOptions options) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithRetainHandlingOptions)} is available with MQTT v5.0 or newer."); + + this._topicBuilder.WithRetainHandlingOptions(options); + return this; + } + + + public SubscribePacketBuilder WithAcknowledgementCallback(SubscriptionAcknowledgementDelegate callback) + { + this._topicBuilder.WithAcknowledgementCallback(callback); + return this; + } + + public SubscribePacketBuilder WithMessageCallback(SubscriptionMessageDelegate callback) + { + this._topicBuilder.WithMessageCallback(callback); + return this; + } + + public void BeginSubscribe() + { + var builder = this._client.CreateBulkSubscriptionBuilder() + .WithTopic(this._topicBuilder); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + builder.WithProperties(this._properties); + + builder.BeginSubscribe(); + } + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901161 + /// + public struct BulkSubscribePacketBuilder + { + private MQTTClient _client; + + private Properties _properties; + private SubscribeTopicBuilder _topicBuilder; + private List _topicBuilders; + + internal BulkSubscribePacketBuilder(MQTTClient client) + { + this._client = client; + + this._properties = default(Properties); + this._topicBuilder = default(SubscribeTopicBuilder); + this._topicBuilders = null; + } + + internal BulkSubscribePacketBuilder WithProperties(Properties properties) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithProperties)} is available with MQTT v5.0 or newer."); + + this._properties = properties; + return this; + } + + public BulkSubscribePacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + + public BulkSubscribePacketBuilder WithTopic(SubscribeTopicBuilder topicBuilder) + { + if (this._topicBuilders != null) + this._topicBuilders.Add(topicBuilder); + else if (this._topicBuilder.IsSet) + { + this._topicBuilders = new List(); + this._topicBuilders.Add(this._topicBuilder); + this._topicBuilders.Add(topicBuilder); + this._topicBuilder = new SubscribeTopicBuilder(); + this._topicBuilder.WithMaximumQoS(this._client.NegotiatedOptions.ServerOptions.MaximumQoS); + } + else this._topicBuilder = topicBuilder; + + return this; + } + + public void BeginSubscribe() => this._client.BeginSubscribe(this); + + internal (Packet, Subscription) Build(MQTTClient parentClient) + { + if ((this._topicBuilders == null || this._topicBuilders.Count == 0) && !this._topicBuilder.IsSet) + throw new ArgumentException("At least one topic must be added!"); + + var packet = new Packet(); + + packet.Type = PacketTypes.Subscribe; + packet.Flags = new BitField(0b_0000_0010); + + UInt16 pid = PacketIdentifier.Acquire(); + packet.AddVariableHeader(Data.FromTwoByteInteger(pid)); + + var sID = parentClient.GetNextSubscriptionID(); + + var subscription = new Subscription(parentClient, sID); + + if (parentClient.NegotiatedOptions.ServerOptions.SubscriptionIdentifiersAvailable) + this._properties.AddProperty(new Property { Type = PacketProperties.SubscriptionIdentifier, Data = Data.FromVariableByteInteger(sID) }); + + if (parentClient.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.FromProperties(this._properties)); + + if (this._topicBuilders != null) + { + for (int i = 0; i < this._topicBuilders.Count; ++i) + this._topicBuilders[i].Build(parentClient, subscription, ref packet); + } + else if (this._topicBuilder.IsSet) + this._topicBuilder.Build(parentClient, subscription, ref packet); + + parentClient.AddSubscription(pid, subscription); + + return (packet, subscription); + } + } + + public struct SubscribeTopicBuilder + { + internal bool IsSet { get; private set; } + + internal SubscriptionTopic _topic; + private BitField _flags; + + public SubscribeTopicBuilder(string topicFilter) + { + this.IsSet = true; + this._topic = new SubscriptionTopic(topicFilter); + this._flags = new BitField(); + } + + public SubscribeTopicBuilder WithMaximumQoS(QoSLevels maxQoS) + { + this._flags.ClearRange(1, 0); + switch (maxQoS) + { + case QoSLevels.AtLeastOnceDelivery: this._flags[0] = true; break; + case QoSLevels.ExactlyOnceDelivery: this._flags[1] = true; break; + } + + return this; + } + + public SubscribeTopicBuilder WithNoLocal() + { + this._flags.Set(2, true); + + return this; + } + + public SubscribeTopicBuilder WithRetainAsPublished() + { + this._flags.Set(3, true); + + return this; + } + + public SubscribeTopicBuilder WithRetainHandlingOptions(RetainHandlingOptions options) + { + switch (options) + { + case RetainHandlingOptions.SendWhenSubscribeIfSubscriptionDoesntExist: this._flags[4] = true; break; + case RetainHandlingOptions.DoNotSendRetainedMessages: this._flags[5] = true; break; + } + + return this; + } + + public SubscribeTopicBuilder WithAcknowledgementCallback(SubscriptionAcknowledgementDelegate callback) + { + this._topic.AcknowledgementCallback += callback; + return this; + } + + public SubscribeTopicBuilder WithMessageCallback(SubscriptionMessageDelegate callback) + { + this._topic.MessageCallback += callback; + return this; + } + + internal void Build(MQTTClient client, Subscription subscription, ref Packet packet) + { + if (!this.IsSet) + throw new ArgumentException("No Topic Filter is set!"); + + if (client.Options.ProtocolVersion < SupportedProtocolVersions.MQTT_5_0) + { + if (this._flags.IsSet(2)) + throw new Exception($"{nameof(WithNoLocal)} is available with MQTT v5.0 or newer."); + if (this._flags.IsSet(3)) + throw new Exception($"{nameof(WithRetainAsPublished)} is available with MQTT v5.0 or newer."); + if (this._flags.IsSet(4) || this._flags.IsSet(5)) + throw new Exception($"{nameof(WithRetainHandlingOptions)} is available with MQTT v5.0 or newer."); + } + + packet.AddPayload(Data.FromString(this._topic.Filter.OriginalFilter)); + packet.AddPayload(Data.FromBitField(this._flags)); + + subscription.AddTopic(this._topic); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs.meta new file mode 100644 index 00000000..0b88dfe2 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 63653b1d2f6ca7748b44206c49938fed +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkSubscribePacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs new file mode 100644 index 00000000..c574127a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs @@ -0,0 +1,136 @@ +using System; +using System.Collections.Generic; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + public delegate void UnSubscribeAcknowledgementDelegate(MQTTClient client, string topicName, UnsubscribeAckReasonCodes reasonCode); + + internal readonly struct UnsubscribeTopicFilter + { + public readonly string Filter; + public readonly UnSubscribeAcknowledgementDelegate AcknowledgementCallback; + + public UnsubscribeTopicFilter(string filter, UnSubscribeAcknowledgementDelegate acknowledgementCallback) + { + this.Filter = filter; + this.AcknowledgementCallback = acknowledgementCallback; + } + } + + public struct UnsubscribeTopicFilterBuilder + { + private string _filter; + private UnSubscribeAcknowledgementDelegate _acknowledgementCallback; + + public UnsubscribeTopicFilterBuilder(string filter) + { + this._filter = filter; + this._acknowledgementCallback = null; + } + + public UnsubscribeTopicFilterBuilder WithAcknowledgementCallback(UnSubscribeAcknowledgementDelegate acknowledgementCallback) + { + this._acknowledgementCallback = acknowledgementCallback; + return this; + } + + internal UnsubscribeTopicFilter Build(BulkUnsubscribePacketBuilder parentBuilder, ref Packet packet) + { + if (string.IsNullOrEmpty(this._filter)) + throw new ArgumentException("No Topic Filter is set!"); + + packet.AddPayload(Data.FromString(this._filter)); + + return new UnsubscribeTopicFilter(this._filter, this._acknowledgementCallback); + } + } + + public struct UnsubscribePacketBuilder + { + private MQTTClient _client; + private UnsubscribeTopicFilterBuilder _topic; + + internal UnsubscribePacketBuilder(MQTTClient client, string topicFilter) + { + this._client = client; + this._topic = new UnsubscribeTopicFilterBuilder(topicFilter); + } + + public UnsubscribePacketBuilder WithAcknowledgementCallback(UnSubscribeAcknowledgementDelegate acknowledgementCallback) + { + this._topic.WithAcknowledgementCallback(acknowledgementCallback); + return this; + } + + public void BeginUnsubscribe() + { + new BulkUnsubscribePacketBuilder(this._client) + .WithTopicFilter(this._topic) + .BeginUnsubscribe(); + } + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901179 + /// + public struct BulkUnsubscribePacketBuilder + { + private MQTTClient _client; + private Properties _properties; + private List _topics; + + internal BulkUnsubscribePacketBuilder(MQTTClient client) + { + this._client = client; + + this._properties = default(Properties); + this._topics = null; + } + + public BulkUnsubscribePacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + + public BulkUnsubscribePacketBuilder WithTopicFilter(UnsubscribeTopicFilterBuilder topic) + { + if (this._topics == null) + this._topics = new List(); + + this._topics.Add(topic); + + return this; + } + + public void BeginUnsubscribe() => this._client.BeginUnsubscribe(this); + + internal Packet Build() + { + if (this._topics == null || this._topics.Count == 0) + throw new ArgumentException("At least ONE Topic Filter must be set!"); + + var packet = new Packet(); + packet.Type = PacketTypes.Unsubscribe; + packet.Flags = new BitField(0b0010); + + var packetID = this._client.GetNextPacketID(); + packet.AddVariableHeader(Data.FromTwoByteInteger(packetID)); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.FromProperties(this._properties)); + + List ackTopics = new List(); + for (int i = 0; i < this._topics.Count; ++i) + ackTopics.Add(this._topics[i].Build(this, ref packet)); + + this._client.AddUnsubscription(packetID, ackTopics); + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs.meta new file mode 100644 index 00000000..e9f1dcdd --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: cf7babf5a878ec94d9b3ed042b9ff6b2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/BulkUnsubscribePacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs new file mode 100644 index 00000000..476913de --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs @@ -0,0 +1,642 @@ +using Best.MQTT.Packets.Utils; + +using System; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// TODO: + /// + public struct LastWillBuilder + { + private Data _topic; + private Data _payload; + private QoSLevels _qos; + private bool _retain; + private Properties _properties; + + internal void BuildFlags(ref BitField bitField) + { + if (this._retain) + bitField[5] = true; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901041 + switch (this._qos) + { + case QoSLevels.AtMostOnceDelivery: break; + case QoSLevels.AtLeastOnceDelivery: bitField[3] = true; break; + case QoSLevels.ExactlyOnceDelivery: bitField[4] = true; break; + } + } + + internal void Build(ref Packet packet) + { + + // Will Properties + packet.AddPayload(Data.FromProperties(this._properties)); + + // Will Topic + if (this._topic.IsSet) + packet.AddPayload(this._topic); + else + throw new ArgumentException("Will Topic required!"); + + // Will Payload + if (this._payload.IsSet) + packet.AddPayload(this._payload); + else + throw new ArgumentException("Will Payload required!"); + } + + /// + /// Set the topic the last-will will be published. + /// + public LastWillBuilder WithTopic(string topic) + { + this._topic = Data.FromString(topic); + return this; + } + + /// + /// Binary payload of the last-will. + /// + public LastWillBuilder WithPayload(byte[] binary) + { + this._payload = Data.FromArray(binary); + return this; + } + + /// + /// Textual payload of the last-will. It also sets the Payload Format Indicator to UTF8. + /// + public LastWillBuilder WithPayload(string payload) + { + return this.WithPayload(System.Text.Encoding.UTF8.GetBytes(payload)) + /*.WithPayloadFormatIndicator(PayloadTypes.UTF8)*/; + } + + /// + /// QoS level of the last-will. + /// + public LastWillBuilder WithQoS(QoSLevels qos) + { + this._qos = qos; + return this; + } + + /// + /// Retain flag. + /// + public LastWillBuilder WithRetain(bool retain = true) + { + this._retain = retain; + return this; + } + + /// + /// Delay before the broker will publish the last-will + /// + public LastWillBuilder WithDelayInterval(UInt32 seconds) + { + this._properties.ThrowIfPresent(PacketProperties.WillDelayInterval); + + this._properties.AddProperty(new Property() { Type = PacketProperties.WillDelayInterval, Data = Data.FromFourByteInteger(seconds) }); + return this; + } + + /// + /// Type of the payload, binary or textual. + /// + public LastWillBuilder WithPayloadFormatIndicator(PayloadTypes payloadType) + { + this._properties.ThrowIfPresent(PacketProperties.PayloadFormatIndicator); + + this._properties.AddProperty(new Property { Type = PacketProperties.PayloadFormatIndicator, Data = Data.FromByte((byte)payloadType) }); + return this; + } + + public LastWillBuilder WithMessageExpiryInterval(UInt32 seconds) + { + this._properties.ThrowIfPresent(PacketProperties.MessageExpiryInterval); + + this._properties.AddProperty(new Property { Type = PacketProperties.MessageExpiryInterval, Data = Data.FromFourByteInteger(seconds) }); + return this; + } + + public LastWillBuilder WithContentType(string contentType) + { + this._properties.ThrowIfPresent(PacketProperties.ContentType); + + this._properties.AddProperty(new Property { Type = PacketProperties.ContentType, Data = Data.FromString(contentType) }); + + return this; + } + + public LastWillBuilder WithResponseTopic(string topic) + { + this._properties.ThrowIfPresent(PacketProperties.ResponseTopic); + + this._properties.AddProperty(new Property { Type = PacketProperties.ResponseTopic, Data = Data.FromString(topic) }); + + return this; + } + + public LastWillBuilder WithCorrelationData(byte[] binary) + { + this._properties.ThrowIfPresent(PacketProperties.ResponseTopic); + + this._properties.AddProperty(new Property { Type = PacketProperties.CorrelationData, Data = Data.FromArray(binary) }); + + return this; + } + + public LastWillBuilder WithUserData(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + } + + /// + /// TODO: add detailed description + /// + /// + /// In this example the `ConnectPacketBuilderCallback` returns with the builder received as its second parameter without modifying it. + /// In the callback a new `ConnectPacketBuilder` can be created, but it's easier just to use the one already passed in the parameter. + /// + /// var options = new ConnectionOptionsBuilder() + /// .WithTCP("test.mosquitto.org", 1883) + /// .Build(); + /// client = new MQTTClient(options); + /// client.BeginConnect(ConnectPacketBuilderCallback); + /// + /// ConnectPacketBuilder ConnectPacketBuilderCallback(MQTTClient client, ConnectPacketBuilder builder) + /// { + /// return builder; + /// } + /// + /// + /// + /// Add UserName and Password + /// + /// ConnectPacketBuilder ConnectPacketBuilderCallback(MQTTClient client, ConnectPacketBuilder builder) + /// { + /// return builder.WithUserNameAndPassword("username", "password"); + /// } + /// + /// + public struct ConnectPacketBuilder + { + private MQTTClient _client; + + // Variable Headers + private BitField _connectFlags; + private UInt16 _keepAlive; + private LastWillBuilder _lastWillBuilder; + + // Properties + private ConnectPropertyBuilder _connectPropertyBuilder; + + // Payload + private string _clientId; + private Session _session; + private string _userName; + private string _password; + + internal ConnectPacketBuilder(MQTTClient client) + { + this._client = client; + + this._connectFlags = new BitField(0); + this._keepAlive = 60; + this._lastWillBuilder = default(LastWillBuilder); + + this._connectPropertyBuilder = default(ConnectPropertyBuilder); + + this._clientId = null; + this._session = null; + this._userName = null; + this._password = null; + } + + /// + /// This specifies whether the connection starts a new session or is a continuation of an existing session. + /// When `WithCleanStart` is used, both the broker and client deletes theirs previously stored session data. + /// The client continues to use its client id. + /// + public ConnectPacketBuilder WithCleanStart() + { + this._connectFlags.Set(1, true); + return this; + } + + /// + /// Maximum seconds that can be pass between sending two packets to the broker. If no other packets are sent, the plugin will send ping requests to check and keep the connection alive. + /// + /// + public ConnectPacketBuilder WithKeepAlive(ushort seconds) + { + this._keepAlive = seconds; + return this; + } + + /// + /// A last will can be added to the connection. + /// The will message will be published by the broker after the network connection is subsequently closed and either the Will Delay Interval has elapsed or the session ends, + /// unless the will message has been deleted by the broker on receipt of a DISCONNECT packet with Reason Code `NormalDisconnection` or a new network connection for the ClientID is opened before the Will Delay Interval has elapsed. + /// + /// + /// Situations in which the will message is published include, but are not limited to: + /// + /// An I/O error or network failure detected by the broker. + /// The client fails to communicate within the Keep Alive time. + /// The client closes the network connection without first sending a DISCONNECT packet with a Reason Code `NormalDisconnection`. + /// The broker closes the network connection without first receiving a DISCONNECT packet with a Reason Code `NormalDisconnection`. + /// + /// + /// + /// + public ConnectPacketBuilder WithLastWill(LastWillBuilder lastWillBuilder) + { + this._lastWillBuilder = lastWillBuilder; + this._connectFlags[2] = true; + return this; + } + + /// + /// With this call the plugin's automatic client id generation can be overwritten. If not exists the client creates a session to store its state. If a session is available for this clientId, it loads and uses it. + /// + /// When neither the `WithClientID` or `WithSession` are used, first time connecting to the broker the plugin generates a unique id and will use it for consecutive connections. + /// + /// + public ConnectPacketBuilder WithClientID(string clientId) + { + this._clientId = clientId; + return this; + } + + /// + /// + /// + /// When neither the `WithClientID` or `WithSession` are used, first time connecting to the broker the plugin generates a unique id and will use it for consecutive connections. + /// + /// + public ConnectPacketBuilder WithSession(Session session) + { + this._session = session; + return this; + } + + /// + /// Add a user name for authentication purposes. + /// + /// + /// + public ConnectPacketBuilder WithUserName(string userName) + { + this._userName = userName; + this._connectFlags.Set(7, true); + return this; + } + + /// + /// Add a password for authentication purposes. + /// + /// + /// + public ConnectPacketBuilder WithPassword(string password) + { + this._password = password; + this._connectFlags.Set(6, true); + return this; + } + + /// + /// Add both user name and password for authentication purposes. + /// + /// + /// + /// + public ConnectPacketBuilder WithUserNameAndPassword(string userName, string password) + { + this.WithUserName(userName); + this.WithPassword(password); + + return this; + } + + /// + /// When the Session expires the client and broker need not process the deletion of state atomically. + /// If the Session Expiry Interval is absent the value 0 is used. + /// If it is set to 0, or is absent, the session ends when the network connection is closed. If the *Session Expiry Interval* is 0xFFFFFFFF (uint.MaxValue), the session does not expire. + /// + /// + /// + /// A client that only wants to process messages while connected will call WithCleanStart and set the *Session Expiry Interval* to 0. It will not receive Application Messages published before it connected and has to subscribe afresh to any topics that it is interested in each time it connects. + /// A client might be connecting to a broker using a network that provides intermittent connectivity. This client can use a short *Session Expiry Interval* so that it can reconnect when the network is available again and continue reliable message delivery. If the client does not reconnect, allowing the session to expire, then Application Messages will be lost. + /// When a client connects with a long *Session Expiry Interval*, it is requesting that the broker maintain its MQTT session state after it disconnects for an extended period. Clients should only connect with a long *Session Expiry Interval* if they intend to reconnect to the broker at some later point in time. When a client has determined that it has no further use for the session it should disconnect with a *Session Expiry Interval* set to 0. + /// + /// + /// + /// + public ConnectPacketBuilder WithSessionExpiryInterval(UInt32 seconds) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithSessionExpiryInterval)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithSessionExpiryInterval(seconds); + return this; + } + + /// + /// The client uses this value to limit the number of QoS 1 and QoS 2 publications that it is willing to process concurrently. + /// There is no mechanism to limit the QoS 0 publications that the broker might try to send. + /// The value of Receive Maximum applies only to the current Network Connection. + /// If the Receive Maximum value is absent then its value defaults to 65,535. + /// + /// + /// + public ConnectPacketBuilder WithReceiveMaximum(UInt16 value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithReceiveMaximum)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithReceiveMaximum(value); + return this; + } + + /// + /// The maximum packet size the client is willing to accept. + /// If the maximum packet size is not present, no limit on the packet size is imposed beyond the limitations in the protocol as a result of the remaining length encoding and the protocol header sizes. + /// + /// + /// + public ConnectPacketBuilder WithMaximumPacketSize(UInt32 maximumPacketSize) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithMaximumPacketSize)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithMaximumPacketSize(maximumPacketSize); + return this; + } + + /// + /// This value indicates the highest value that the client will accept as a topic alias sent by the broker. The client uses this value to limit the number of topic aliases that it is willing to hold on this connection. If topic alias maximum is absent or zero, the broker will not send any topic aliases to the client. + /// + /// If not called, the plugin will use `ushort.MaxValue`(65535). To disable receiving topic aliases from the broker call it with 0. + /// + /// + public ConnectPacketBuilder WithTopicAliasMaximum(UInt16 maximum) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithTopicAliasMaximum)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithTopicAliasMaximum(maximum); + return this; + } + + /// + /// When called with `true` the client request the broker to return Response Information in the ServerConnectAckMessage. + /// + /// The broker can choose not to include Response Information in the connect ack message, even if the client requested it! + /// + /// + public ConnectPacketBuilder WithRequestResponseInformation(bool request) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithRequestResponseInformation)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithRequestResponseInformation(request); + return this; + } + + /// + /// The client can use this function to indicate whether the ReasonString or UserProperties are sent in the case of failures. + /// If the value of request problem information is `false`, the broker may return a `ReasonString` or `UserProperties` on a *connect acknowledgement* or* disconnect* packet, + /// but must not send a `ReasonString` or `UserProperties` on any packet other than* publish*, *connect acknowledgement* or* disconnect*. + /// If this value is `true`, the broker may return a `ReasonString` or `UserProperties` on any packet where it is allowed. + /// + /// + /// + public ConnectPacketBuilder WithRequestProblemInformation(bool request) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithRequestProblemInformation)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithRequestProblemInformation(request); + return this; + } + + /// + /// User Properties on the connect packet can be used to send connection related properties from the client to the broker. + /// The meaning of these properties is not defined by this specification. + /// + /// + /// + /// + public ConnectPacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithUserProperty(key, value); + return this; + } + + /// + /// Set the name of the authentication method used for extended authentication. + /// + /// + /// + public ConnectPacketBuilder WithExtendedAuthenticationMethod(string method) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithExtendedAuthenticationMethod)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithExtendedAuthenticationMethod(method); + return this; + } + + /// + /// Set the binary data containing authentication data for extended authentication. + /// The contents of this data are defined by the authentication method. + /// + /// + /// + public ConnectPacketBuilder WithExtendedAuthenticationData(byte[] data) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithExtendedAuthenticationData)} is available with MQTT v5.0 or newer."); + + this._connectPropertyBuilder.WithExtendedAuthenticationData(data); + return this; + } + + internal ConnectPacketBuilder WithProperties(ConnectPropertyBuilder builder) + { + this._connectPropertyBuilder = builder; + return this; + } + + internal (Packet packet, Session session, ushort clientKeepAlive, uint clientMaximumPacketSize, ushort clientReceiveMaximum) Build() + { + // will flag + if (this._connectFlags[2]) + this._lastWillBuilder.BuildFlags(ref this._connectFlags); + + var packet = new Packet(); + + packet.Type = PacketTypes.Connect; + + packet.AddVariableHeader(Data.FromString("MQTT")); // Protocol Name + + switch(this._client.Options.ProtocolVersion) + { + case SupportedProtocolVersions.MQTT_3_1_1: break; + case SupportedProtocolVersions.MQTT_5_0: break; + default: + throw new NotImplementedException($"Version '{this._client.Options.ProtocolVersion}' isn't supported!"); + } + + byte protocolLevel = 0; + switch(this._client.Options.ProtocolVersion) + { + // Protocol Level (v3.1.1): http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html#_Toc398718030 + case SupportedProtocolVersions.MQTT_3_1_1: protocolLevel = 0x04; break; + + // Protocol Version (v5): https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901037 + case SupportedProtocolVersions.MQTT_5_0: protocolLevel = 0x05; break; + + default: throw new NotImplementedException($"Version '{this._client.Options.ProtocolVersion}' isn't supported!"); + }; + packet.AddVariableHeader(Data.FromByte(protocolLevel)); + + packet.AddVariableHeader(this._connectFlags.AsData()); + packet.AddVariableHeader(Data.FromTwoByteInteger(this._keepAlive)); + + var properties = this._connectPropertyBuilder.Build(); + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.FromProperties(properties)); + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901058 + // These fields, if present, MUST appear in the order Client Identifier, Will Properties, Will Topic, Will Payload, User Name, Password + + // Client Identifier + if (this._clientId != null) + this._session = SessionHelper.Get(this._client.Options.Host, this._clientId); + else if (this._session == null) + this._session = SessionHelper.Get(this._client.Options.Host); + + if (this._session.IsNull) + { + // A Server MAY allow a Client to supply a ClientID that has a length of zero bytes, however if it does so the Server MUST treat this as a special case and assign a unique ClientID to that Client [MQTT-3.1.3-6]. + // It MUST then process the CONNECT packet as if the Client had provided that unique ClientID, and MUST return the Assigned Client Identifier in the CONNACK packet [MQTT-3.1.3-7]. + packet.SetPayload(Data.FromString(string.Empty)); + } + else + packet.SetPayload(Data.FromString(this._session.ClientId)); + + // will flag + if (this._connectFlags[2]) + this._lastWillBuilder.Build(ref packet); + + // User Name + if (!string.IsNullOrEmpty(this._userName)) + packet.AddPayload(Data.FromString(this._userName)); + + // Password + if (!string.IsNullOrEmpty(this._password)) + packet.AddPayload(Data.FromString(this._password)); + + // create & return with a tuple + return (packet, + this._session, + this._keepAlive, + properties.TryFindData(PacketProperties.MaximumPacketSize, DataTypes.FourByteInteger, out var maximumPacketSizeData) ? maximumPacketSizeData.Integer : UInt32.MaxValue, + properties.TryFindData(PacketProperties.ReceiveMaximum, DataTypes.TwoByteInteger, out var receiveMaximumData) ? (UInt16)receiveMaximumData.Integer : UInt16.MaxValue); + } + } + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901046 + internal struct ConnectPropertyBuilder + { + private Properties _properties; + + public ConnectPropertyBuilder WithSessionExpiryInterval(UInt32 seconds) + { + this._properties.ThrowIfPresent(PacketProperties.SessionExpiryInterval); + + this._properties.AddProperty(new Property { Type = PacketProperties.SessionExpiryInterval, Data = Data.FromFourByteInteger(seconds) }); + return this; + } + + public ConnectPropertyBuilder WithReceiveMaximum(UInt16 value) + { + if (value == 0) + throw new ArgumentException($"{nameof(value)} must be larger than 0!"); + + this._properties.ThrowIfPresent(PacketProperties.ReceiveMaximum); + + this._properties.AddProperty(new Property { Type = PacketProperties.ReceiveMaximum, Data = Data.FromTwoByteInteger(value) }); + return this; + } + + public ConnectPropertyBuilder WithMaximumPacketSize(UInt32 maximumPacketSize) + { + if (maximumPacketSize == 0) + throw new ArgumentException($"{nameof(maximumPacketSize)} must be larger than zero!"); + + this._properties.ThrowIfPresent(PacketProperties.MaximumPacketSize); + + this._properties.AddProperty(new Property { Type = PacketProperties.MaximumPacketSize, Data = Data.FromFourByteInteger(maximumPacketSize) }); + return this; + } + + public ConnectPropertyBuilder WithTopicAliasMaximum(UInt16 maximum) + { + this._properties.ThrowIfPresent(PacketProperties.TopicAliasMaximum); + + this._properties.AddProperty(new Property { Type = PacketProperties.TopicAliasMaximum, Data = Data.FromTwoByteInteger(maximum) }); + return this; + } + + public ConnectPropertyBuilder WithRequestResponseInformation(bool request) + { + this._properties.ThrowIfPresent(PacketProperties.RequestResponseInformation); + + this._properties.AddProperty(new Property { Type = PacketProperties.RequestResponseInformation, Data = Data.FromByte(request ? 1 : 0) }); + + return this; + } + + public ConnectPropertyBuilder WithRequestProblemInformation(bool request) + { + this._properties.ThrowIfPresent(PacketProperties.RequestProblemInformation); + + this._properties.AddProperty(new Property { Type = PacketProperties.RequestProblemInformation, Data = Data.FromByte(request ? 1 : 0) }); + + return this; + } + + public ConnectPropertyBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + + public ConnectPropertyBuilder WithExtendedAuthenticationMethod(string method) + { + this._properties.ThrowIfPresent(PacketProperties.AuthenticationMethod); + + this._properties.AddProperty(new Property { Type = PacketProperties.AuthenticationMethod, Data = Data.FromString(method) }); + return this; + } + + public ConnectPropertyBuilder WithExtendedAuthenticationData(byte[] data) + { + this._properties.ThrowIfPresent(PacketProperties.AuthenticationData); + + this._properties.AddProperty(new Property { Type = PacketProperties.AuthenticationData, Data = Data.FromArray(data) }); + return this; + } + + internal Properties Build() + { + if (this._properties.Find(PacketProperties.TopicAliasMaximum).Data.Type == DataTypes.UnSet) + WithTopicAliasMaximum(ushort.MaxValue); + + return this._properties; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs.meta new file mode 100644 index 00000000..bc8a0ee6 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 5a401458ec1f9994f961bf21ff96c363 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/ConnectPacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs new file mode 100644 index 00000000..196b7805 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs @@ -0,0 +1,143 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + public enum DisconnectReasonCodes : byte + { + NormalDisconnection = 0x00, + DisconnectWithWillMessage = 0x04, + + UnspecifiedError = 0x80, + MalformedPacket = 0x81, + ProtocolError = 0x82, + ImplementationSpecificError = 0x83, + NotAuthorized = 0x87, + ServerBusy = 0x89, + ServerShuttingDown = 0x8B, + KeepAliveTimeout = 0x8D, + SessionTakenOver = 0x8E, + TopicFilterInvalid = 0x8F, + TopicNameInvalid = 0x90, + ReceiveMaximumExceeded = 0x93, + TopicAliasInvalid = 0x94, + PacketTooLarge = 0x95, + MessageRateTooHigh = 0x96, + QuotaExceeded = 0x97, + AdministrativeAction = 0x98, + PayloadFormatInvalid = 0x99, + RetainNotSupported = 0x9A, + QoSNotSupported = 0x9B, + UseAnotherServer = 0x9C, + ServerMoved = 0x9D, + SharedSubscriptionsNotSupported = 0x9E, + ConnectionRateExceeded = 0x9F, + MaximumConnectTime = 0xA0, + SubscriptionIdentifiersNotSupported = 0xA1, + WildcardSubscriptionsNotSupported = 0xA2, + } + + public struct DisconnectPacketBuilder + { + private MQTTClient _client; + + private DisconnectReasonCodes _reasonCode; + private DisconnectPropertiesBuilder _propertiesBuilder; + + internal DisconnectPacketBuilder(MQTTClient client) + { + this._client = client; + + this._reasonCode = DisconnectReasonCodes.NormalDisconnection; + this._propertiesBuilder = default(DisconnectPropertiesBuilder); + } + + public DisconnectPacketBuilder WithReasonCode(DisconnectReasonCodes reasonCode) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithReasonCode)} is available with MQTT v5.0 or newer."); + + this._reasonCode = reasonCode; + return this; + } + + public DisconnectPacketBuilder WithSessionExpiryInterval(UInt32 seconds) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithSessionExpiryInterval)} is available with MQTT v5.0 or newer."); + + this._propertiesBuilder.WithSessionExpiryInterval(seconds); + return this; + } + + public DisconnectPacketBuilder WithReasonString(string reason) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithReasonString)} is available with MQTT v5.0 or newer."); + + this._propertiesBuilder.WithReasonString(reason); + return this; + } + + public DisconnectPacketBuilder WithUserProperty(string key, string value) + { + ExceptionHelper.ThrowIfV311(this._client.Options.ProtocolVersion, $"{nameof(WithUserProperty)} is available with MQTT v5.0 or newer."); + + this._propertiesBuilder.WithUserProperty(key, value); + return this; + } + + internal DisconnectPacketBuilder WithProperties(DisconnectPropertiesBuilder propertiesBuilder) + { + this._propertiesBuilder = propertiesBuilder; + return this; + } + + public void BeginDisconnect() => this._client.BeginDisconnect(this); + + internal Packet Build() + { + Packet packet = new Packet(); + + packet.Type = PacketTypes.Disconnect; + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + + this._propertiesBuilder.Build(ref packet); + } + + return packet; + } + } + + internal struct DisconnectPropertiesBuilder + { + private Properties _properties; + + public DisconnectPropertiesBuilder WithSessionExpiryInterval(UInt32 seconds) + { + this._properties.ThrowIfPresent(PacketProperties.SessionExpiryInterval); + + this._properties.AddProperty(new Property { Type = PacketProperties.SessionExpiryInterval, Data = Data.FromFourByteInteger(seconds) }); + return this; + } + + public DisconnectPropertiesBuilder WithReasonString(string reason) + { + this._properties.ThrowIfPresent(PacketProperties.ReasonString); + + this._properties.AddProperty(new Property { Type = PacketProperties.ReasonString, Data = Data.FromString(reason) }); + return this; + } + + public DisconnectPropertiesBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + return this; + } + + internal void Build(ref Packet packet) + { + packet.AddVariableHeader(Data.FromProperties(this._properties)); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs.meta new file mode 100644 index 00000000..b13c537a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: fbadfa05a8dcc414b9022a37c03feced +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/DisconnectPacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs new file mode 100644 index 00000000..3993ab29 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs @@ -0,0 +1,71 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901121 + /// + internal struct PublishAckBuilder + { + MQTTClient _client; + UInt16 _packetId; + PublishAckAndReceivedReasonCodes _reasonCode; + + Properties _properties; + + public PublishAckBuilder(MQTTClient client) + { + this._client = client; + this._packetId = 0; + this._reasonCode = PublishAckAndReceivedReasonCodes.Success; + this._properties = default(Properties); + } + + public PublishAckBuilder WithPacketID(UInt16 pid) + { + this._packetId = pid; + + return this; + } + + public PublishAckBuilder WithReasonCode(PublishAckAndReceivedReasonCodes code) + { + this._reasonCode = code; + + return this; + } + + public PublishAckBuilder WithReasonString(string reason) + { + this._properties.AddProperty(new Property { Type = PacketProperties.ReasonString, Data = Data.FromString(reason) }); + + return this; + } + + public PublishAckBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + + return this; + } + + public Packet Build() + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishAck; + packet.Flags = new BitField(0); + + packet.AddVariableHeader(Data.FromTwoByteInteger(this._packetId)); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + packet.AddVariableHeader(Data.FromProperties(this._properties)); + } + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs.meta new file mode 100644 index 00000000..215caf07 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 9b646cd4a3922ea459a3f0862d0df034 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishAckPacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs new file mode 100644 index 00000000..e456b69e --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs @@ -0,0 +1,71 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901151 + /// + internal struct PublishCompletePacketBuilder + { + MQTTClient _client; + UInt16 _packetId; + PublishReleaseAndCompleteReasonCodes _reasonCode; + + Properties _properties; + + public PublishCompletePacketBuilder(MQTTClient client) + { + this._client = client; + this._packetId = 0; + this._reasonCode = PublishReleaseAndCompleteReasonCodes.Success; + this._properties = default(Properties); + } + + public PublishCompletePacketBuilder WithPacketID(UInt16 pid) + { + this._packetId = pid; + + return this; + } + + public PublishCompletePacketBuilder WithReasonCode(PublishReleaseAndCompleteReasonCodes code) + { + this._reasonCode = code; + + return this; + } + + public PublishCompletePacketBuilder WithReasonString(string reason) + { + this._properties.AddProperty(new Property { Type = PacketProperties.ReasonString, Data = Data.FromString(reason) }); + + return this; + } + + public PublishCompletePacketBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + + return this; + } + + public Packet Build() + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishComplete; + packet.Flags = new BitField(0); + + packet.AddVariableHeader(Data.FromTwoByteInteger(this._packetId)); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + packet.AddVariableHeader(Data.FromProperties(this._properties)); + } + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs.meta new file mode 100644 index 00000000..84d18ca5 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 7e35b95ccd3807b47b5b41c68e92038b +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishCompletePacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs new file mode 100644 index 00000000..0d7daba4 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs @@ -0,0 +1,71 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901131 + /// + internal struct PublishReceivedPacketBuilder + { + MQTTClient _client; + UInt16 _packetId; + PublishAckAndReceivedReasonCodes _reasonCode; + + Properties _properties; + + public PublishReceivedPacketBuilder(MQTTClient client) + { + this._client = client; + this._packetId = 0; + this._reasonCode = PublishAckAndReceivedReasonCodes.Success; + this._properties = default(Properties); + } + + public PublishReceivedPacketBuilder WithPacketID(UInt16 pid) + { + this._packetId = pid; + + return this; + } + + public PublishReceivedPacketBuilder WithReasonCode(PublishAckAndReceivedReasonCodes code) + { + this._reasonCode = code; + + return this; + } + + public PublishReceivedPacketBuilder WithReasonString(string reason) + { + this._properties.AddProperty(new Property { Type = PacketProperties.ReasonString, Data = Data.FromString(reason) }); + + return this; + } + + public PublishReceivedPacketBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + + return this; + } + + public Packet Build() + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishReceived; + packet.Flags = new BitField(0); + + packet.AddVariableHeader(Data.FromTwoByteInteger(this._packetId)); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + packet.AddVariableHeader(Data.FromProperties(this._properties)); + } + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs.meta new file mode 100644 index 00000000..6ba0996b --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d0bd89d5e0ed8a34eb2f954f16e085d7 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReceivedPacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs new file mode 100644 index 00000000..d202914d --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs @@ -0,0 +1,71 @@ +using System; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Builders +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901141 + /// + internal struct PublishReleasePacketBuilder + { + MQTTClient _client; + UInt16 _packetId; + PublishReleaseAndCompleteReasonCodes _reasonCode; + + Properties _properties; + + public PublishReleasePacketBuilder(MQTTClient client) + { + this._client = client; + this._packetId = 0; + this._reasonCode = PublishReleaseAndCompleteReasonCodes.Success; + this._properties = default(Properties); + } + + public PublishReleasePacketBuilder WithPacketID(UInt16 pid) + { + this._packetId = pid; + + return this; + } + + public PublishReleasePacketBuilder WithReasonCode(PublishReleaseAndCompleteReasonCodes code) + { + this._reasonCode = code; + + return this; + } + + public PublishReleasePacketBuilder WithReasonString(string reason) + { + this._properties.AddProperty(new Property { Type = PacketProperties.ReasonString, Data = Data.FromString(reason) }); + + return this; + } + + public PublishReleasePacketBuilder WithUserProperty(string key, string value) + { + this._properties.AddProperty(new Property { Type = PacketProperties.UserProperty, Data = Data.FromStringPair(key, value) }); + + return this; + } + + public Packet Build() + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishRelease; + packet.Flags = new BitField(0b_0010); + + packet.AddVariableHeader(Data.FromTwoByteInteger(this._packetId)); + + if (this._client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + packet.AddVariableHeader(Data.FromByte((byte)this._reasonCode)); + packet.AddVariableHeader(Data.FromProperties(this._properties)); + } + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs.meta new file mode 100644 index 00000000..4ff48dc6 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 63a5893e2656ccd4697e361b89aacfba +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Builders/PublishReleasePacketBuilder.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs new file mode 100644 index 00000000..28447bda --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs @@ -0,0 +1,87 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets +{ + public struct DataContainer + { + public int Count { get => this._fields != null ? this._fields.Count : this._field.IsSet ? 1 : 0; } + public Properties Properties { get => this._properties.Properties; } + + private Data _field; + private List _fields; + private Data _properties; + + public Data this[int idx] + { + get => this._fields != null ? this._fields[idx] : this._field; + set + { + if (this._fields != null) + this._fields[idx] = value; + else + this._field = value; + } + } + + public void Add(Data data) + { + if (this._fields != null) + this._fields.Add(data); + else if (this._field.IsSet) + { + if (this._fields == null) + this._fields = new List(); + + this._fields.Add(this._field); + this._fields.Add(data); + + this._field = Data.Empty(); + } + else + this._field = data; + + if (data.Type == DataTypes.Property) + this._properties = data; + } + + public void Set(Data data) + { + this._fields?.Clear(); + this._fields = null; + this._field = data; + + if (data.Type == DataTypes.Property) + this._properties = data; + } + + public UInt32 CalculateByteSize() + { + if (this._field.IsSet) + return this._field.CalculateByteSize(); + else if (this._fields != null) + { + UInt32 size = 0; + for (int i = 0; i < this._fields.Count; ++i) + size += this._fields[i].CalculateByteSize(); + return size; + } + + return 0; + } + + public void EncodeInto(Stream stream) + { + if (this._field.IsSet) + this._field.EncodeInto(stream); + else if (this._fields != null) + { + for (int i = 0; i < this._fields.Count; ++i) + this._fields[i].EncodeInto(stream); + } + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs.meta new file mode 100644 index 00000000..65f49e9a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 88eb8e074ea0f2c4bbcb8149c333b837 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/DataContainer.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs new file mode 100644 index 00000000..8e828c68 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs @@ -0,0 +1,209 @@ +using System; + +namespace Best.MQTT.Packets +{ + public enum PacketTypes : byte + { + Reserved, + Connect, + ConnectAck, + Publish, + PublishAck, + PublishReceived, + PublishRelease, + PublishComplete, + Subscribe, + SubscribeAck, + Unsubscribe, + UnsubscribeAck, + PingRequest, + PingResponse, + Disconnect, + Auth + } + + public enum PacketProperties : uint + { + None = 0x00, + PayloadFormatIndicator = 0x01, + MessageExpiryInterval = 0x02, + ContentType = 0x03, + ResponseTopic = 0x08, + CorrelationData = 0x09, + SubscriptionIdentifier = 0x0B, + SessionExpiryInterval = 0x11, + AssignedClientIdentifier = 0x12, + ServerKeepAlive = 0x13, + AuthenticationMethod = 0x15, + AuthenticationData = 0x16, + RequestProblemInformation = 0x17, + WillDelayInterval = 0x18, + RequestResponseInformation = 0x19, + ResponseInformation = 0x1A, + ServerReference = 0x1C, + ReasonString = 0x1F, + ReceiveMaximum = 0x21, + TopicAliasMaximum = 0x22, + TopicAlias = 0x23, + MaximumQoS = 0x24, + RetainAvailable = 0x25, + UserProperty = 0x26, + MaximumPacketSize = 0x27, + WildcardSubscriptionAvailable = 0x28, + SubscriptionIdentifierAvailable = 0x29, + SharedSubscriptionAvailable = 0x2A + } + + /// + /// Quality of Service Levels + /// + /// + public enum QoSLevels : byte + { + /// + /// The message is delivered according to the capabilities of the underlying network. No response is sent by the receiver and no retry is performed by the sender. The message arrives at the receiver either once or not at all. + /// + /// + AtMostOnceDelivery = 0b00, + + /// + /// This Quality of Service level ensures that the message arrives at the receiver at least once. + /// + /// + AtLeastOnceDelivery = 0b01, + + /// + /// This is the highest Quality of Service level, for use when neither loss nor duplication of messages are acceptable. There is an increased overhead associated with QoS 2. + /// + /// + ExactlyOnceDelivery = 0b10, + + /// + /// Must not be used! + /// + Reserved = 0b11 + } + + /// + /// + /// + public enum RetainHandlingOptions : byte + { + /// + /// Send retained messages at the time of the subscribe. + /// + SendWhenSubscribe, + + /// + /// Send retained messages at subscribe only if the subscription does not currently exist. + /// + SendWhenSubscribeIfSubscriptionDoesntExist, + + /// + /// Do not send retained messages at the time of the subscribe + /// + DoNotSendRetainedMessages + } + + public enum PayloadTypes : byte + { + Bytes = 0b00, + UTF8 = 0b01 + } + + public enum SubscribeAckReasonCodes + { + GrantedQoS0 = 0x00, + GrantedQoS1 = 0x01, + GrantedQoS2 = 0x02, + + UnspecifiedError = 0x80, + ImplementationSpecificError = 0x83, + NotAuthorized = 0x87, + + TopicFilterInvalid = 0x8F, + PacketIdentifierInUse = 0x91, + + QuotaExceeded = 0x97, + SharedSubscriptionsNotSupported = 0x9E, + + SubscriptionIdentifiersNotSupported = 0xA1, + WildcardSubscriptionsNotSupported = 0xA2, + } + + public enum PublishAckAndReceivedReasonCodes + { + Success = 0x00, + NoMatchingSubscribers = 0x10, + + UnspecifiedError = 0x80, + ImplementationSpecificError = 0x83, + NotAuthorized = 0x87, + + TopicNameInvalid = 0x90, + PacketIdentifierInUse = 0x91, + QuotaExceeded = 0x97, + PayloadFormatInvalid = 0x99, + } + + public enum PublishReleaseAndCompleteReasonCodes + { + Success = 0x00, + + PacketIdentifierNotFound = 0x92 + } + + public enum UnsubscribeAckReasonCodes + { + Success = 0x00, + NoSubscriptionExisted = 0x11, + + UnspecifiedError = 0x80, + ImplementationSpecificError = 0x83, + NotAuthorized = 0x87, + + TopicFilterInvalid = 0x8F, + PacketIdentifierInUse = 0x91, + } + + public enum AuthReasonCodes + { + Success = 0x00, + + ContinueAuthentication = 0x18, + ReAuthenticate = 0x19 + } + + public enum ConnectAckReasonCodes : byte + { + Success = 0x00, + + // v3.1.1 errors + v311_UnacceptableProtocolVersion = 0x01, + v311_IdentifierRejected = 0x02, + v311_ServerUnavailable = 0x03, + v311_BadUserNameOrPassword = 0x04, + v311_NotAuthorized = 0x05, + + UnspecifiedError = 0x80, + MalformedPacket = 0x81, + ProtocolError = 0x82, + ImplementationSpecificError = 0x83, + UnsupportedProtocolVersion = 0x84, + ClientIdentifierNotValid = 0x85, + BadUserNameOrPassword = 0x86, + NotAuthorized = 0x87, + ServerBusy = 0x89, + Banned = 0x8A, + BadAuthenticationMethod = 0x8C, + TopicNameInvalid = 0x90, + PacketTooLarge = 0x95, + QuotaExceeded = 0x97, + PayloadFormatInvalid = 0x99, + RetainNotSupported = 0x9A, + QoSNotSupported = 0x9B, + UseAnotherServer = 0x9C, + ServerMoved = 0x9D, + ConnectionRateExceeded = 0x9F, + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs.meta new file mode 100644 index 00000000..7662c888 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1f5ee0ac25dde2945aeaf467eb86d097 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Enums.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs new file mode 100644 index 00000000..b9ad5485 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs @@ -0,0 +1,29 @@ +using System; + +namespace Best.MQTT.Packets +{ + public enum MQTTErrorTypes + { + MalformedPacket, + ProtocolError, + ReceiveMaximumExceeded, + PacketTooLarge + } + + public class MQTTException : Exception + { + public MQTTErrorTypes MQTTError { get; private set; } + + public MQTTException(MQTTErrorTypes errorType, string message) : base(message) { this.MQTTError = errorType; } + } + + public sealed class ProtocolErrorException : MQTTException + { + public ProtocolErrorException(string message) : base(MQTTErrorTypes.ProtocolError, message) { } + } + + public sealed class MalformedPacketException : MQTTException + { + public MalformedPacketException(string message) : base(MQTTErrorTypes.MalformedPacket, message) { } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs.meta new file mode 100644 index 00000000..e0a02b46 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a2c9257e255a423468b4c746826554d0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/MQTTException.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs new file mode 100644 index 00000000..3375519e --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs @@ -0,0 +1,70 @@ +using System; +using System.IO; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets +{ + public struct Packet + { + public PacketTypes Type; + public BitField Flags; + + public DataContainer VariableHeaderFields; + public DataContainer Payload; + + public void AddVariableHeader(Data header) + { + this.VariableHeaderFields.Add(header); + } + + public void SetPayload(Data payload) + { + this.Payload.Set(payload); + } + + public void AddPayload(Data payload) + { + this.Payload.Add(payload); + } + + public UInt64 CalculatePacketSize() + { + UInt32 payloadSize = CalculatePayloadSize(); + + return (UInt64)1 + (UInt64)DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(payloadSize) + (UInt64)payloadSize; + } + + public UInt32 CalculatePayloadSize() + { + return this.VariableHeaderFields.CalculateByteSize() + + this.Payload.CalculateByteSize(); + } + + public void EncodeInto(Stream stream) + { + // Create a copy and modify that one instead of the original Flags + BitField bitField = this.Flags.Clone(); + + bitField.CombineWith((byte)((byte)this.Type << 4)); + bitField.EncodeInto(stream); + + // Calculate payload size + UInt32 payloadSize = this.CalculatePayloadSize(); + + // write everything into the stream + + DataEncoderHelper.EncodeVariableByteInteger(payloadSize, stream); + + this.VariableHeaderFields.EncodeInto(stream); + this.Payload.EncodeInto(stream); + } + + public override string ToString() + { + return $"[Packet {this.Type}, {this.Flags.ToString()}]"; + } + + public static Packet Empty() => new Packet(); + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs.meta new file mode 100644 index 00000000..061fb072 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: d374483fc4eb5a74e8682257183a56fc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Packet.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers.meta new file mode 100644 index 00000000..9c9ce7dc --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: eda771532a2ea574892bc11d9faf0ec4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs new file mode 100644 index 00000000..cb1da15a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs @@ -0,0 +1,95 @@ +using System; + +using Best.HTTP.Shared; + +using Best.MQTT.Packets.Utils; +using Best.MQTT.Transports; + +namespace Best.MQTT.Packets.Readers +{ + internal static class IncomingPacketReader + { + internal static (bool success, Packet packet) TryToReadFrom(Transport transport) + { + var stream = transport.ReceiveStream; + UInt32 clientMaximumPacketSize = transport.Parent.NegotiatedOptions.ClientMaximumPacketSize; + + if (stream.Length < 2) + { + HTTPManager.Logger.Information(nameof(IncomingPacketReader), $"{nameof(TryToReadFrom)}: Not enough data for fixed header! Available: {stream.Length:N0}", transport.Context); + return (false, Packet.Empty()); + } + + stream.BeginPeek(); + BitField bitField = new BitField((byte)stream.PeekByte()); + + try + { + var (success, value) = DataEncoderHelper.TryToDecodeVariableByteInteger(stream); + if (!success) + { + HTTPManager.Logger.Information(nameof(IncomingPacketReader), $"{nameof(TryToReadFrom)}: Not enough data for remaining length! Available: {stream.Length:N0}", transport.Context); + return (false, Packet.Empty()); + } + + UInt32 packetSize = (UInt32)(1 + DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(value) + value); + + if (packetSize > clientMaximumPacketSize) + throw new MQTTException(MQTTErrorTypes.PacketTooLarge, $"Packet({(PacketTypes)bitField.Range(7, 4)}) has larger size({packetSize:N0}) than client's settings({clientMaximumPacketSize:N0})!"); + + if (stream.Length < packetSize) + { + HTTPManager.Logger.Information(nameof(IncomingPacketReader), $"{nameof(TryToReadFrom)}: Not all data available for the whole packet! Available: {stream.Length:N0}, packet size: {packetSize:N0}", transport.Context); + return (false, Packet.Empty()); + } + + BitField firstByte = new BitField((byte)stream.ReadByte()); + PacketTypes type = (PacketTypes)firstByte.Range(7, 4); + + firstByte.ClearRange(7, 4); + + Packet packet; + switch (type) + { + case PacketTypes.ConnectAck: packet = PacketReaderImplementations.ReadConnectAckPacket(stream, firstByte, transport.Parent); break; + case PacketTypes.Disconnect: packet = PacketReaderImplementations.ReadDisconnectPacket(stream, firstByte, transport.Parent); break; + + case PacketTypes.SubscribeAck: packet = PacketReaderImplementations.ReadSubscribeAckPacket(stream, firstByte, transport.Parent); break; + case PacketTypes.UnsubscribeAck: packet = PacketReaderImplementations.ReadUnsubscribeAckPacket(stream, firstByte, transport.Parent); break; + + case PacketTypes.Publish: packet = PacketReaderImplementations.ReadPublishPacket(stream, firstByte, transport.Parent); break; + + case PacketTypes.PublishRelease: packet = PacketReaderImplementations.ReadPublishReleasePacket(stream, firstByte, transport.Parent); break; + case PacketTypes.PublishReceived: packet = PacketReaderImplementations.ReadPublishReceivedPacket(stream, firstByte, transport.Parent); break; + case PacketTypes.PublishComplete: packet = PacketReaderImplementations.ReadPublishCompletePacket(stream, firstByte, transport.Parent); break; + + case PacketTypes.PublishAck: packet = PacketReaderImplementations.ReadPublishAckPacket(stream, firstByte, transport.Parent); break; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901200 + case PacketTypes.PingResponse: + var remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + if (remainingLength != 0) + throw new MalformedPacketException("Ping Response expected to have 0 Remaining Length!"); + packet = new Packet { Type = PacketTypes.PingResponse }; + break; + + case PacketTypes.Auth: packet = PacketReaderImplementations.ReadAuthPacket(stream, firstByte, transport.Parent); break; + + default: + throw new NotImplementedException($"Can't read type '{type}'"); + } + + return (true, packet); + } + catch (MQTTException) + { + throw; + } + catch(Exception ex) + { + HTTPManager.Logger.Exception(nameof(IncomingPacketReader), $"{nameof(TryToReadFrom)}", ex, transport.Context); + return (false, Packet.Empty()); + } + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs.meta new file mode 100644 index 00000000..58e61256 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 3b541177ee16dc9439aa890a1173ddfc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/IncomingPacketReader.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs new file mode 100644 index 00000000..61ecd764 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs @@ -0,0 +1,13 @@ +using System; + +namespace Best.MQTT.Packets.Readers +{ + internal static class PacketReaderHelpers + { + public static void Expect(bool expected, Func message) + { + if (!expected) + throw new MalformedPacketException(message()); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs.meta new file mode 100644 index 00000000..5d8f054b --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 1b98004b9bc18044fa0f5441d1f4e3a2 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderHelpers.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs new file mode 100644 index 00000000..46ebe04c --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs @@ -0,0 +1,324 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets.Readers +{ + /// + /// Static class that contains helper functions to read various packet types. + /// + internal static class PacketReaderImplementations + { + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901074 + /// + public static Packet ReadConnectAckPacket(Stream stream, BitField flags, MQTTClient client) + { + PacketReaderHelpers.Expect(flags.Range(3, 0) == 0, () => $"{PacketTypes.ConnectAck} packet must have all zero flags! Received: {flags.Range(3, 0)}"); + + var packet = new Packet(); + packet.Type = PacketTypes.ConnectAck; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + PacketReaderHelpers.Expect(remainingLength > 0, () => $"{packet.Type} must have non-zero remaining length!"); + + // Connect Acknowledge Flags + packet.AddVariableHeader(Data.ReadAs(DataTypes.Bits, stream, ref remainingLength)); + + // Connect Reason Code + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + + // Properties + if (client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + { + if (remainingLength == 0) + throw new MQTTException(MQTTErrorTypes.MalformedPacket, $"Protocol version set to {client.Options.ProtocolVersion} but most probably the server trying to communicate with {SupportedProtocolVersions.MQTT_3_1_1}! Connect Ack - no more bytes left to read variable header!"); + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + } + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901205 + /// + public static Packet ReadDisconnectPacket(Stream stream, BitField flags, MQTTClient client) + { + PacketReaderHelpers.Expect(flags.Range(3, 0) == 0, () => $"{PacketTypes.Disconnect} packet must have all zero flags! Received: {flags.Range(3, 0)}"); + + var packet = new Packet(); + packet.Type = PacketTypes.Disconnect; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + // Byte 1 in the Variable Header is the Disconnect Reason Code. If the Remaining Length is less than 1 the value of 0x00 (Normal disconnection) is used. + if (remainingLength < 1) + { + packet.AddVariableHeader(Data.FromByte(0)); + } + else + { + // Disconnect Reason Code + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + + // Properties + // The length of Properties in the DISCONNECT packet Variable Header encoded as a Variable Byte Integer. If the Remaining Length is less than 2, a value of 0 is used. + if (remainingLength >= 2 && client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + } + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901171 + /// + public static Packet ReadSubscribeAckPacket(Stream stream, BitField flags, MQTTClient client) + { + PacketReaderHelpers.Expect(flags.Range(3, 0) == 0, () => $"{PacketTypes.SubscribeAck} packet must have all zero flags! Received: {flags.Range(3, 0)}"); + + var packet = new Packet(); + packet.Type = PacketTypes.SubscribeAck; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + PacketReaderHelpers.Expect(remainingLength > 0, () => $"{packet.Type} must have non-zero remaining length!"); + + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + if (client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + while (remainingLength > 0) + packet.Payload.Add(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901187 + /// + public static Packet ReadUnsubscribeAckPacket(Stream stream, BitField flags, MQTTClient client) + { + PacketReaderHelpers.Expect(flags.Range(3, 0) == 0, () => $"{PacketTypes.SubscribeAck} packet must have all zero flags! Received: {flags.Range(3, 0)}"); + + var packet = new Packet(); + packet.Type = PacketTypes.UnsubscribeAck; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + PacketReaderHelpers.Expect(remainingLength > 0, () => $"{packet.Type} must have non-zero remaining length!"); + + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + if (client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + while (remainingLength > 0) + packet.Payload.Add(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901100 + /// + public static Packet ReadPublishPacket(Stream stream, BitField flags, MQTTClient client) + { + var packet = new Packet(); + packet.Type = PacketTypes.Publish; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + packet.AddVariableHeader(Data.ReadAs(DataTypes.UTF8String, stream, ref remainingLength)); + + // The Packet Identifier field is only present in PUBLISH packets where the QoS level is 1 or 2. + if (flags.Range(2, 1) > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + if (client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + if (remainingLength > 0) + packet.Payload.Add(Data.ReadAs(DataTypes.Raw, stream, ref remainingLength)); + + return packet; + } + + private static List applicationMessages = new List(); + + public static List CreateApplicationMessages(MQTTClient client, Packet packet) + { + applicationMessages.Clear(); + + if (packet.VariableHeaderFields.Properties.IsPresent(PacketProperties.SubscriptionIdentifier)) + { + packet.VariableHeaderFields.Properties.ForEach(PacketProperties.SubscriptionIdentifier, sIdData => + applicationMessages.Add(new ApplicationMessage(sIdData.Integer, packet))); + } + else + { + var topicName = packet.VariableHeaderFields[0].UTF8String.Key; + if (!string.IsNullOrEmpty(topicName)) + { + foreach (var subscription in client.FindSubscriptionsWithMatchingTopic(topicName)) + applicationMessages.Add(new ApplicationMessage(subscription.ID, packet)); + } + } + + return applicationMessages; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901131 + /// + public static Packet ReadPublishReleasePacket(Stream stream, BitField flags, MQTTClient client) + { + PacketReaderHelpers.Expect(flags.Range(3, 0) == 0b0010, () => $"{PacketTypes.PublishRelease} packet must have {0b0010} flags! Received: {flags.Range(3, 0)}"); + + var packet = new Packet(); + packet.Type = PacketTypes.PublishRelease; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + PacketReaderHelpers.Expect(remainingLength > 0, () => $"{packet.Type} must have non-zero remaining length!"); + + // packetID + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + if (remainingLength > 0) + { + // Reason Code + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + + // Properties + if (client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + } + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901131 + /// + public static Packet ReadPublishReceivedPacket(Stream stream, BitField flags, MQTTClient client) + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishReceived; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + // Packet Identifier + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + // Reason Code + if (remainingLength > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + else + packet.AddVariableHeader(Data.FromByte((byte)PublishAckAndReceivedReasonCodes.Success)); + + // Property + if (remainingLength > 0 && client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901151 + /// + public static Packet ReadPublishCompletePacket(Stream stream, BitField flags, MQTTClient client) + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishComplete; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + // Packet Identifier + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + // Reason Code + if (remainingLength > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + else + packet.AddVariableHeader(Data.FromByte((byte)PublishReleaseAndCompleteReasonCodes.Success)); + + // Property + if (remainingLength > 0 && client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901121 + /// + public static Packet ReadPublishAckPacket(Stream stream, BitField flags, MQTTClient client) + { + var packet = new Packet(); + packet.Type = PacketTypes.PublishAck; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + // Packet Identifier + packet.AddVariableHeader(Data.ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength)); + + // Reason Code + if (remainingLength > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + else + packet.AddVariableHeader(Data.FromByte((byte)PublishAckAndReceivedReasonCodes.Success)); + + // Property + if (remainingLength > 0 && client.Options.ProtocolVersion >= SupportedProtocolVersions.MQTT_5_0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + + return packet; + } + + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901217 + /// + public static Packet ReadAuthPacket(Stream stream, BitField flags, MQTTClient client) + { + if (client.Options.ProtocolVersion < SupportedProtocolVersions.MQTT_5_0) + throw new MQTTException(MQTTErrorTypes.ProtocolError, "Auth packet encountered while SupportedVersion is set to v3.1.1!"); + + var packet = new Packet(); + packet.Type = PacketTypes.Auth; + packet.Flags = flags; + + UInt32 remainingLength = DataEncoderHelper.DecodeVariableByteInteger(stream); + + // The Reason Code and Property Length can be omitted if the Reason Code is 0x00 (Success) and there are no Properties. + // In this case the AUTH has a Remaining Length of 0. + + // Reason Code + if (remainingLength > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Byte, stream, ref remainingLength)); + else + packet.AddVariableHeader(Data.FromByte((byte)AuthReasonCodes.Success)); + + // Property + if (remainingLength > 0) + packet.AddVariableHeader(Data.ReadAs(DataTypes.Property, stream, ref remainingLength)); + else + packet.AddVariableHeader(Data.FromProperties(new Properties())); + + return packet; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs.meta new file mode 100644 index 00000000..0286e2c1 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 94ea93434c2f6114b85175194fa57567 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Readers/PacketReaderImplementations.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs new file mode 100644 index 00000000..6668cb65 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs @@ -0,0 +1,117 @@ +using System; +using System.Collections.Generic; + +using Best.MQTT.Packets.Utils; + +namespace Best.MQTT.Packets +{ + /// + /// Container for a server-sent Connect acknowledgement message. + /// + /// + public readonly struct ServerConnectAckMessage + { + /// + /// True if the server could resume to a previous session. + /// + public readonly bool SessionPresent; + public readonly ConnectAckReasonCodes ReasonCode; + public readonly UInt32? SessionExpiryInterval; + + /// + /// The Server uses this value to limit the number of QoS 1 and QoS 2 publications that it is willing to process concurrently for the Client. + /// It does not provide a mechanism to limit the QoS 0 publications that the Client might try to send. + /// If the Receive Maximum value is absent, then its value defaults to 65,535. + /// + public readonly UInt16 ReceiveMaximum; + public readonly QoSLevels MaximumQoS; + public readonly bool RetainAvailable; + + /// + /// Maximum Packet Size the Server is willing to accept + /// + public readonly UInt32 MaximumPacketSize; + /// + /// Server assigned ClientId. + /// + /// The Client Identifier which was assigned by the Server because a zero length Client Identifier was found in the CONNECT packet. + public readonly string AssignedClientIdentifier; + public readonly UInt16 TopicAliasMaximum; + public readonly string ReasonString; + public readonly List> UserProperties; + public readonly bool WildcardSubscriptionAvailable; + public readonly bool SubscriptionIdentifiersAvailable; + public readonly bool SharedSubscriptionAvailable; + public readonly UInt16? ServerKeepAlive; + public readonly string ResponseInformation; + public readonly string ServerReference; + public readonly string AuthenticationMethod; + public readonly Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment AuthenticationData; + + internal ServerConnectAckMessage(Packet packet) + { + // Session Present (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901078) + var flags = packet.VariableHeaderFields[0].Bits; + this.SessionPresent = flags[0]; + + // Connect Reason Code + this.ReasonCode = (ConnectAckReasonCodes)packet.VariableHeaderFields[1].Integer; + + // CONNACK Properties (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901080) + Properties properties = packet.VariableHeaderFields.Properties; + + // If the Session Expiry Interval is absent the value in the CONNECT Packet used. + this.SessionExpiryInterval = properties.TryFindData(PacketProperties.SessionExpiryInterval, DataTypes.FourByteInteger, out var data) ? data.Integer : default(UInt32?); + + // If the Receive Maximum value is absent, then its value defaults to 65,535. + this.ReceiveMaximum = properties.TryFindData(PacketProperties.ReceiveMaximum, DataTypes.TwoByteInteger, out data) ? (UInt16)data.Integer : UInt16.MaxValue; + + // If the Maximum QoS is absent, the Client uses a Maximum QoS of 2. (https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901084) + this.MaximumQoS = properties.TryFindData(PacketProperties.MaximumQoS, DataTypes.Byte, out data) ? (QoSLevels)data.Integer : QoSLevels.ExactlyOnceDelivery; + + // A value of 0 means that retained messages are not supported. A value of 1 means retained messages are supported. If not present, then retained messages are supported. + this.RetainAvailable = properties.TryFindData(PacketProperties.RetainAvailable, DataTypes.Byte, out data) ? data.Integer > 0 : true; + + // If the Maximum Packet Size is not present, there is no limit on the packet size imposed beyond the limitations in the protocol as a result of the remaining length encoding and the protocol header sizes. + this.MaximumPacketSize = properties.TryFindData(PacketProperties.MaximumPacketSize, DataTypes.FourByteInteger, out data) ? data.Integer : UInt32.MaxValue; + + this.AssignedClientIdentifier = properties.TryFindData(PacketProperties.AssignedClientIdentifier, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + // If the Topic Alias Maximum property is absent, the default value is 0. + this.TopicAliasMaximum = properties.TryFindData(PacketProperties.TopicAliasMaximum, DataTypes.TwoByteInteger, out data) ? (UInt16)data.Integer : (UInt16)0; + + this.ReasonString = properties.TryFindData(PacketProperties.ReasonString, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + // The User Property is allowed to appear multiple times to represent multiple name, value pairs. + List> tmpList = null; + + properties.ForEach(PacketProperties.UserProperty, d => + { + if (tmpList == null) + tmpList = new List>(); + tmpList.Add(d.UTF8String); + }); + this.UserProperties = tmpList; + + // If not present, then Wildcard Subscriptions are supported. + this.WildcardSubscriptionAvailable = properties.TryFindData(PacketProperties.WildcardSubscriptionAvailable, DataTypes.Byte, out data) ? data.Integer > 0 : true; + + // If not present, then Subscription Identifiers are supported. + this.SubscriptionIdentifiersAvailable = properties.TryFindData(PacketProperties.SubscriptionIdentifierAvailable, DataTypes.Byte, out data) ? data.Integer > 0 : true; + + // If not present, then Shared Subscriptions are supported. + this.SharedSubscriptionAvailable = properties.TryFindData(PacketProperties.SharedSubscriptionAvailable, DataTypes.Byte, out data) ? data.Integer > 0 : true; + + // If the Server does not send the Server Keep Alive, the Server MUST use the Keep Alive value set by the Client on CONNECT [MQTT-3.2.2-22]. + this.ServerKeepAlive = properties.TryFindData(PacketProperties.ServerKeepAlive, DataTypes.TwoByteInteger, out data) ? (UInt16)data.Integer : default(UInt16?); + + this.ResponseInformation = properties.TryFindData(PacketProperties.ResponseInformation, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + this.ServerReference = properties.TryFindData(PacketProperties.ServerReference, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + this.AuthenticationMethod = properties.TryFindData(PacketProperties.AuthenticationMethod, DataTypes.UTF8String, out data) ? data.UTF8String.Key : null; + + this.AuthenticationData = properties.TryFindData(PacketProperties.AuthenticationData, DataTypes.Binary, out data) ? data.Binary : Best.HTTP.Shared.PlatformSupport.Memory.BufferSegment.Empty; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs.meta new file mode 100644 index 00000000..2c879d15 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 84bc34fe50020ba4d8d43e9391f47037 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/ServerConnectAckMessage.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils.meta new file mode 100644 index 00000000..84a94bad --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: ad18f8ea90a87764183fb1324dcf84b3 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs new file mode 100644 index 00000000..a69d8b8f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs @@ -0,0 +1,70 @@ +using System; +using System.IO; + +namespace Best.MQTT.Packets.Utils +{ + // Bits: | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | + public struct BitField + { + private byte Bits; + + public bool this[int idx] + { + get => IsSet(idx); + set => Set(idx, value); + } + + public BitField(byte flags) + { + this.Bits = flags; + } + + public void SetToZero() => this.Bits = 0; + public void CombineWith(byte value) => this.Bits |= value; + + public bool IsSet(int idx) + { + return (this.Bits & (1 << idx)) != 0; + } + + public void Set(int idx, bool value) + { + if (value) // set + this.Bits |= (byte)(1 << idx); + else // reset + this.Bits &= (byte)~(1 << idx); + } + + public byte Range(byte msIdx, byte lsIdx) + { + byte mask = 0; + + for (int idx = msIdx; idx >= lsIdx; idx--) + mask |= (byte)(1 << idx); + + return (byte)((this.Bits & mask) >> lsIdx); + } + + public void ClearRange(byte msIdx, byte lsIdx) + { + byte mask = 0; + for (int idx = msIdx; idx >= lsIdx; idx--) + mask |= (byte)(1 << idx); + + this.Bits ^= (byte)(this.Bits & mask); + } + + public Data AsData() => Data.FromByte(this.Bits); + public void EncodeInto(Stream stream) => stream.WriteByte(this.Bits); + + public BitField Clone() => new BitField(this.Bits); + + public override string ToString() + { + string result = "["; + for (int idx = 7; idx >= 0; idx--) + result += IsSet(idx) ? "X" : "-"; + return result + "]"; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs.meta new file mode 100644 index 00000000..62c31ad7 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 2e4971f3c47990d47b7d545e5d198241 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/BitField.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs new file mode 100644 index 00000000..f45da31f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs @@ -0,0 +1,326 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +namespace Best.MQTT.Packets.Utils +{ + public enum DataTypes + { + UnSet, + + Bits, + + Bool, + + Byte, + TwoByteInteger, + FourByteInteger, + VariableByteInteger, + + UTF8String, + UTF8StringPair, + + Binary, + + Property, + + Raw + } + + public struct Data + { + public bool IsSet => this.Type != DataTypes.UnSet; + + public DataTypes Type; + + public BitField Bits; + public UInt32 Integer; + public KeyValuePair UTF8String; + public BufferSegment Binary; + public Properties Properties; + + public static Data Empty() => new Data { Type = DataTypes.UnSet }; + + public static Data FromBitField(BitField bitField) => new Data { Type = DataTypes.Bits, Bits = bitField }; + public static Data FromBool(bool value) => new Data { Type = DataTypes.Bool, Integer = value ? (uint)1 : (uint)0 }; + public static Data FromByte(int value) => new Data { Type = DataTypes.Byte, Integer = (byte)value }; + public static Data FromTwoByteInteger(uint value) => new Data { Type = DataTypes.TwoByteInteger, Integer = value }; + public static Data FromFourByteInteger(uint value) => new Data { Type = DataTypes.FourByteInteger, Integer = value }; + public static Data FromVariableByteInteger(uint value) => new Data { Type = DataTypes.VariableByteInteger, Integer = value }; + + public static Data FromString(string value) => new Data { Type = DataTypes.UTF8String, UTF8String = new KeyValuePair(value, null) }; + public static Data FromStringPair(string key, string value) => new Data { Type = DataTypes.UTF8StringPair, UTF8String = new KeyValuePair(key, value) }; + + public static Data FromArray(byte[] buffer) => new Data { Type = DataTypes.Binary, Binary = buffer != null ? new BufferSegment(buffer, 0, buffer.Length) : BufferSegment.Empty }; + public static Data FromBuffer(BufferSegment buffer) => new Data { Type = DataTypes.Binary, Binary = buffer }; + public static Data FromRaw(byte[] buffer) => new Data { Type = DataTypes.Raw, Binary = buffer != null ? new BufferSegment(buffer, 0, buffer.Length) : BufferSegment.Empty }; + public static Data FromRaw(BufferSegment buffer) => new Data { Type = DataTypes.Raw, Binary = buffer }; + + public static Data FromProperties(Properties properties) => new Data { Type = DataTypes.Property, Properties = properties }; + + public static implicit operator BitField(Data d) => d.Bits; + public static implicit operator bool(Data d) => d.Integer != 0; + + public static implicit operator byte(Data d) => (byte)d.Integer; + public static implicit operator UInt16(Data d) => (UInt16)d.Integer; + public static implicit operator UInt32(Data d) => d.Integer; + + public static implicit operator string(Data d) => d.UTF8String.Key; + public static implicit operator KeyValuePair(Data d) => d.UTF8String; + + public static implicit operator BufferSegment(Data d) => d.Binary; + + public void EncodeInto(Stream stream) + { + switch (this.Type) + { + default: throw new NotImplementedException($"{this.Type} in {nameof(EncodeInto)}"); + + case DataTypes.Bits: stream.WriteByte((byte)this.Bits.AsData().Integer); break; + case DataTypes.Bool: + case DataTypes.Byte: stream.WriteByte((byte)this.Integer); break; + case DataTypes.TwoByteInteger: DataEncoderHelper.EncodeTwoByteInteger((ushort)this.Integer, stream); break; + case DataTypes.FourByteInteger: DataEncoderHelper.EncodeFourByteInteger(this.Integer, stream); break; + case DataTypes.VariableByteInteger: DataEncoderHelper.EncodeVariableByteInteger(this.Integer, stream); break; + + case DataTypes.UTF8String: DataEncoderHelper.EncodeUTF8String(this.UTF8String.Key, stream); break; + case DataTypes.UTF8StringPair: DataEncoderHelper.EncodeUTF8StringPair(this.UTF8String, stream); break; + + case DataTypes.Binary: DataEncoderHelper.EncodeBinary(this.Binary, stream); break; + + case DataTypes.Property: this.Properties.EncodeInto(stream); break; + + case DataTypes.Raw: if (this.Binary != BufferSegment.Empty) stream.Write(this.Binary.Data, this.Binary.Offset, this.Binary.Count); break; + } + } + + public UInt32 CalculateByteSize() + { + switch (this.Type) + { + case DataTypes.Bits: + case DataTypes.Bool: + case DataTypes.Byte: return 1; + case DataTypes.TwoByteInteger: return 2; + case DataTypes.FourByteInteger: return 4; + case DataTypes.VariableByteInteger: return DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(this.Integer); + case DataTypes.UTF8String: return DataEncoderHelper.CalculateByteSize(this.UTF8String.Key); + case DataTypes.UTF8StringPair: return DataEncoderHelper.CalculateByteSize(this.UTF8String.Key) + DataEncoderHelper.CalculateByteSize(this.UTF8String.Value); + case DataTypes.Binary: return (UInt32)(2 + this.Binary.Count); + case DataTypes.Property: return this.Properties.CalculateByteSize(true); + case DataTypes.Raw: return (UInt32)this.Binary.Count; + default: + throw new NotImplementedException($"{this.Type} in {nameof(CalculateByteSize)}"); + } + } + + public static Data ReadAs(DataTypes type, Stream stream, ref UInt32 remainingLength) + { + switch (type) + { + case DataTypes.Bits: remainingLength--; return Data.FromBitField(new BitField((byte)stream.ReadByte())); + case DataTypes.Bool: remainingLength--; return Data.FromBool(stream.ReadByte() != 0); + case DataTypes.Byte: remainingLength--; return Data.FromByte(stream.ReadByte()); + case DataTypes.TwoByteInteger: remainingLength -= 2; return Data.FromTwoByteInteger((uint)(stream.ReadByte() << 8 | stream.ReadByte())); + case DataTypes.FourByteInteger: + { + remainingLength -= 4; + UInt32 value = (UInt32)(stream.ReadByte() << 24 | + stream.ReadByte() << 16 | + stream.ReadByte() << 8 | + stream.ReadByte()); + + return Data.FromFourByteInteger(value); + } + + case DataTypes.VariableByteInteger: + { + var data = Data.FromVariableByteInteger(DataEncoderHelper.DecodeVariableByteInteger(stream)); + + remainingLength -= DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(data.Integer); + + return data; + } + + case DataTypes.UTF8String: + { + var length = ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength).Integer; + + var buffer = BufferPool.Get(length, true); + + stream.Read(buffer, 0, (int)length); + + string utf8string = System.Text.Encoding.UTF8.GetString(buffer, 0, (int)length); + var data = Data.FromString(utf8string); + + BufferPool.Release(buffer); + + remainingLength -= length; + + return data; + } + + case DataTypes.UTF8StringPair: + { + Data key = ReadAs(DataTypes.UTF8String, stream, ref remainingLength); + Data value = ReadAs(DataTypes.UTF8String, stream, ref remainingLength); + + return Data.FromStringPair(key.UTF8String.Key, value.UTF8String.Key); + } + + case DataTypes.Binary: + { + var length = ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength).Integer; + byte[] buffer = new byte[length]; + + stream.Read(buffer, 0, (int)length); + + remainingLength -= length; + + return Data.FromArray(buffer); + } + + case DataTypes.Property: + { + var length = DataEncoderHelper.DecodeVariableByteInteger(stream); + + remainingLength -= DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(length); + + var properties = ReadProperties(stream, length, ref remainingLength); + + return Data.FromProperties(properties); + } + + case DataTypes.Raw: + { + var buffer = BufferPool.Get(remainingLength, true); + stream.Read(buffer, 0, (int)remainingLength); + + var data = Data.FromRaw(new BufferSegment(buffer, 0, (int)remainingLength)); + + remainingLength = 0; + + return data; + } + + default: + throw new NotImplementedException($"Can't read data type '{type}'!"); + } + } + + public static Properties ReadProperties(Stream stream, UInt32 length, ref UInt32 remainingLength) + { + var properties = new Properties(); + + while (length > 0) + { + //Best.HTTPManager.Logger.Information(nameof(Data), $"{nameof(ReadProperties)}({stream.Position}/{stream.Length}, {length}, {remainingLength})"); + + UInt32 remainingLengthBefore = remainingLength; + + PacketProperties type = (PacketProperties)stream.ReadByte(); + remainingLength--; + + switch (type) + { + // Byte + case PacketProperties.PayloadFormatIndicator: + case PacketProperties.RequestProblemInformation: + case PacketProperties.RequestResponseInformation: + case PacketProperties.MaximumQoS: + case PacketProperties.RetainAvailable: + case PacketProperties.WildcardSubscriptionAvailable: + case PacketProperties.SubscriptionIdentifierAvailable: + case PacketProperties.SharedSubscriptionAvailable: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.Byte, stream, ref remainingLength) }); + break; + + // Four Byte Integer + case PacketProperties.MessageExpiryInterval: + case PacketProperties.SessionExpiryInterval: + case PacketProperties.WillDelayInterval: + case PacketProperties.MaximumPacketSize: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.FourByteInteger, stream, ref remainingLength) }); + break; + + // UTF-8 Encoded String + case PacketProperties.ContentType: + case PacketProperties.ResponseTopic: + case PacketProperties.AssignedClientIdentifier: + case PacketProperties.AuthenticationMethod: + case PacketProperties.ResponseInformation: + case PacketProperties.ServerReference: + case PacketProperties.ReasonString: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.UTF8String, stream, ref remainingLength) }); + break; + + // Binary Data + case PacketProperties.CorrelationData: + case PacketProperties.AuthenticationData: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.Binary, stream, ref remainingLength) }); + break; + + // Variable Byte Integer + case PacketProperties.SubscriptionIdentifier: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.VariableByteInteger, stream, ref remainingLength) }); + break; + + // Two Byte Integer + case PacketProperties.ServerKeepAlive: + case PacketProperties.ReceiveMaximum: + case PacketProperties.TopicAliasMaximum: + case PacketProperties.TopicAlias: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.TwoByteInteger, stream, ref remainingLength) }); + break; + + // UTF-8 String Pair + case PacketProperties.UserProperty: + properties.AddProperty(new Property { Type = type, Data = ReadAs(DataTypes.UTF8StringPair, stream, ref remainingLength) }); + break; + } + + //Best.HTTPManager.Logger.Information(nameof(Data), $"{nameof(ReadProperties)} {remainingLengthBefore} - {remainingLength} = {remainingLengthBefore - remainingLength} => {length} - {remainingLengthBefore - remainingLength} => {length - remainingLengthBefore - remainingLength}"); + + length -= remainingLengthBefore - remainingLength; + } + + return properties; + } + + public override string ToString() + { + string result = $"[{this.Type} "; + switch(this.Type) + { + case DataTypes.Bits: result += this.Bits.ToString(); break; + case DataTypes.Byte: + case DataTypes.TwoByteInteger: + case DataTypes.FourByteInteger: + case DataTypes.VariableByteInteger: + result += this.Integer; + break; + + case DataTypes.UTF8String: + result += this.UTF8String.Key; + break; + + case DataTypes.UTF8StringPair: + result += $"Key: '{this.UTF8String.Key}', Value: '{this.UTF8String.Value}'"; + break; + + case DataTypes.Binary: + case DataTypes.Raw: + result += $"Offset: {this.Binary.Offset}, Count: {this.Binary.Count}"; + break; + + case DataTypes.Property: + result += this.Properties.ToString(); + break; + } + + return result + "]"; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs.meta new file mode 100644 index 00000000..a160228a --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: ef6b3990d9d037c40ae6a7fa663326bd +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Data.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs new file mode 100644 index 00000000..2046f178 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs @@ -0,0 +1,205 @@ +using System; +using System.Collections.Generic; +using System.IO; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; + +namespace Best.MQTT.Packets.Utils +{ + public static class DataEncoderHelper + { + public static void EncodeTwoByteInteger(UInt16 value, Stream encodeTo) + { + encodeTo.WriteByte((byte)(value >> 8)); + encodeTo.WriteByte((byte)(value)); + } + + public static UInt16 DecodeTwoByteInteger(Stream decodeFrom) + { + int msb = decodeFrom.ReadByte(); + int lsb = decodeFrom.ReadByte(); + + return (UInt16)((msb << 8) + lsb); + } + + public static void EncodeFourByteInteger(UInt32 value, Stream encodeTo) + { + encodeTo.WriteByte((byte)(value >> 24)); + encodeTo.WriteByte((byte)(value >> 16)); + encodeTo.WriteByte((byte)(value >> 8)); + encodeTo.WriteByte((byte)(value & 0xFF)); + } + + public static UInt32 DecodeFourByteInteger(Stream decodeFrom) + { + int b4 = decodeFrom.ReadByte(); + int b3 = decodeFrom.ReadByte(); + int b2 = decodeFrom.ReadByte(); + int b1 = decodeFrom.ReadByte(); + + return (UInt32)(b4 << 24 | + b3 << 16 | + b2 << 8 | + b1); + } + + public static void EncodeUTF8String(string value, Stream encodeTo) + { + if (value == null) + value = string.Empty; + + int encodedLength = System.Text.Encoding.UTF8.GetByteCount(value); + if (encodedLength > UInt16.MaxValue) + throw new Exception($"String too long {encodedLength}"); + + EncodeTwoByteInteger((UInt16)encodedLength, encodeTo); + + var buffer = BufferPool.Get(encodedLength, true); + System.Text.Encoding.UTF8.GetBytes(value, 0, value.Length, buffer, 0); + + encodeTo.Write(buffer, 0, encodedLength); + +#if UNITY_EDITOR + Array.Clear(buffer, 0, encodedLength); +#endif + + BufferPool.Release(buffer); + } + + public static uint CalculateByteSize(string value) + { + if (string.IsNullOrEmpty(value)) + return 2; + + return (uint)(2 + System.Text.Encoding.UTF8.GetByteCount(value)); + } + + public static string DecodeUTF8String(Stream decodeFrom) + { + int byteCount = DecodeTwoByteInteger(decodeFrom); + + var buffer = BufferPool.Get(byteCount, true); + + int read = decodeFrom.Read(buffer, 0, byteCount); + if (read < byteCount) + throw new Exception($"Not enough data in {nameof(DecodeUTF8String)}!"); + + var result = System.Text.Encoding.UTF8.GetString(buffer, 0, byteCount); + + BufferPool.Release(buffer); + + return result; + } + + public static void EncodeVariableByteInteger(UInt32 value, Stream encodeTo) + { + byte encodedByte; + do + { + encodedByte = (byte)(value % 128); + value /= 128; + // if there are more data to encode, set the top bit of this byte + if (value > 0) + encodedByte = (byte)(encodedByte | 128); + + encodeTo.WriteByte(encodedByte); + } + while (value > 0); + } + + public static UInt32 DecodeVariableByteInteger(Stream decodeFrom) + { + int multiplier = 1; + UInt32 value = 0; + byte encodedByte = 0; + do + { + encodedByte = (byte)decodeFrom.ReadByte(); + + value += (UInt32)((encodedByte & 127) * multiplier); + if (multiplier > 128 * 128 * 128) + throw new Exception("Malformed Variable Byte Integer"); + multiplier *= 128; + } while ((encodedByte & 128) != 0); + + return value; + } + + public static byte CalculateRequiredBytesForVariableByteInteger(UInt32 value) + { + byte size = 0; + byte encodedByte; + do + { + encodedByte = (byte)(value % 128); + value /= 128; + // if there are more data to encode, set the top bit of this byte + if (value > 0) + encodedByte = (byte)(encodedByte | 128); + + size++; + } + while (value > 0); + + return size; + } + + public static (bool success, UInt32 integer) TryToDecodeVariableByteInteger(PeekableIncomingSegmentStream stream) + { + int multiplier = 1; + UInt32 value = 0; + byte encodedByte = 0; + do + { + int peeked_byte = stream.PeekByte(); + if (peeked_byte < 0) + return (false, 0); + + encodedByte = (byte)peeked_byte; + + value += (UInt32)((encodedByte & 127) * multiplier); + if (multiplier > 128 * 128 * 128) + throw new Exception("Malformed Variable Byte Integer"); + multiplier *= 128; + } while ((encodedByte & 128) != 0); + + return (true, value); + } + + public static void EncodeBinary(BufferSegment binary, Stream encodeTo) + { + if (binary.Count > UInt16.MaxValue) + throw new Exception($"Binary too large {binary.Count}"); + + EncodeTwoByteInteger((UInt16)binary.Count, encodeTo); + if (binary.Data != null) + encodeTo.Write(binary.Data, binary.Offset, binary.Count); + } + + public static BufferSegment DecodeBinary(Stream decodeFrom) + { + int length = DecodeTwoByteInteger(decodeFrom); + + var buffer = BufferPool.Get(length, true); + decodeFrom.Read(buffer, 0, length); + + return new BufferSegment(buffer, 0, length); + } + + public static void EncodeUTF8StringPair(KeyValuePair kvp, Stream encodeTo) + { + EncodeUTF8String(kvp.Key, encodeTo); + EncodeUTF8String(kvp.Value, encodeTo); + } + + public static KeyValuePair DecodeUTF8StringPair(Stream decodeFrom) + { + string key = DecodeUTF8String(decodeFrom); + string value = DecodeUTF8String(decodeFrom); + + return new KeyValuePair(key, value); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs.meta new file mode 100644 index 00000000..508af5d0 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 42abbde6d6099e24896a0a3ec87b5577 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/DataEncoderHelper.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs new file mode 100644 index 00000000..bd41e8e9 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs @@ -0,0 +1,13 @@ +using System; + +namespace Best.MQTT.Packets.Utils +{ + internal static class ExceptionHelper + { + public static void ThrowIfV311(SupportedProtocolVersions version, string msg) + { + if (version < SupportedProtocolVersions.MQTT_5_0) + throw new Exception(msg); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs.meta new file mode 100644 index 00000000..5289cd36 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 584bf4d7d216a874ab8c949e67542e83 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/ExceptionHelper.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs new file mode 100644 index 00000000..6a239b34 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs @@ -0,0 +1,20 @@ +using System; + +namespace Best.MQTT.Packets.Utils +{ + public static class PacketIdentifier + { + private static int nextPID = 1; + + public static UInt16 Acquire() + { + System.Threading.Interlocked.CompareExchange(ref nextPID, 1, UInt16.MaxValue); + return (UInt16)System.Threading.Interlocked.Increment(ref nextPID); + } + + public static void Release(UInt16 pid) + { + + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs.meta new file mode 100644 index 00000000..8cf97fa2 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 65d3bb33d330f1445abc4f78476c3bf0 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/PacketIdentifier.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs new file mode 100644 index 00000000..9f35fdc6 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs @@ -0,0 +1,152 @@ +using System; +using System.Collections.Generic; +using System.IO; + +namespace Best.MQTT.Packets.Utils +{ + public struct Property + { + public PacketProperties Type; + public Data Data; + + internal void EncodeInto(Stream stream) + { + DataEncoderHelper.EncodeVariableByteInteger((uint)this.Type, stream); + this.Data.EncodeInto(stream); + } + + internal UInt32 CalculateByteSize() => DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger((uint)this.Type) + this.Data.CalculateByteSize(); + + public override string ToString() => $"[{this.Type}: {this.Data}]"; + } + + public struct Properties + { + private List properties; + + internal int Count { get => this.properties?.Count ?? 0; } + + public bool IsPresent(PacketProperties property) + { + for (int i = 0; i < this.properties?.Count; ++i) + if (this.properties[i].Type == property) + return true; + + return false; + } + + public void ThrowIfPresent(PacketProperties property) + { + if (IsPresent(property)) + throw new ProtocolErrorException($"Property '{property}' already added!"); + } + + public void AddProperty(Property property) + { + if (this.properties == null) + this.properties = new List(); + + this.properties.Add(property); + } + + public void AddProperty(PacketProperties type, Data data) + { + AddProperty(new Property { Type = type, Data = data }); + } + + public void RemoveProperty(PacketProperties type) + { + this.properties?.RemoveAll(p => p.Type == type); + } + + public UInt32 CalculateByteSize(bool withSize) + { + if (this.properties != null) + { + UInt32 size = 0; + for (int i = 0; i < this.properties.Count; ++i) + size += this.properties[i].CalculateByteSize(); + + if (withSize) + size += DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(size); + + return size; + } + + return DataEncoderHelper.CalculateRequiredBytesForVariableByteInteger(0); + } + + public void EncodeInto(Stream stream) + { + if (this.properties != null) + { + uint size = this.CalculateByteSize(false); + DataEncoderHelper.EncodeVariableByteInteger(size, stream); + + for (int i = 0; i < this.properties.Count; ++i) + this.properties[i].EncodeInto(stream); + } + else + DataEncoderHelper.EncodeVariableByteInteger(0, stream); + } + + public Property Find(PacketProperties property) + { + for (int i = 0; i < this.properties?.Count; i++) + if (this.properties[i].Type == property) + return this.properties[i]; + + return new Property(); + } + + public bool TryFindData(PacketProperties property, DataTypes dataType, out Data data) + { + for (int i = 0; i < this.properties?.Count; i++) { + var prop = this.properties[i]; + if (prop.Type == property && prop.Data.IsSet && prop.Data.Type == dataType) + { + data = prop.Data; + return true; + } + } + + data = Data.Empty(); + + return false; + } + + public void ForEach(PacketProperties property, Action callback) + { + for (int i = 0; i < this.properties?.Count; i++) + { + var prop = this.properties[i]; + if (prop.Type == property) + { + callback(prop.Data); + } + } + } + + public List ConvertAll(PacketProperties property, Func callback) + { + List result = null; + for (int i = 0; i < this.properties?.Count; i++) + { + var prop = this.properties[i]; + if (prop.Type == property) + { + if (result == null) + result = new List(); + result.Add(callback(prop.Data)); + } + } + + return result; + } + + public override string ToString() + { + return $"{this.properties?.Count} ({CalculateByteSize(true):N0} bytes)"; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs.meta new file mode 100644 index 00000000..69b90bc8 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: e2b0a965e09f0b64bb2a62e87ddd566c +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Packets/Utils/Properties.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs new file mode 100644 index 00000000..25ab2192 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs @@ -0,0 +1,235 @@ +using System; +using System.Collections.Generic; +using System.IO; +using System.Linq; + +using Best.MQTT.Databases; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT +{ + /// + /// For ClientId - Encoded ClientId mapping. + /// + sealed class SessionDef + { + public string ClientId; + + /// + /// Base64 encoded client id used for directory naming. + /// + public string Encoded; + + public override string ToString() => this.ClientId; + } + + /// + /// Contains information about one host: the last used SessionId, and all the known, previously used session Ids. + /// + sealed class SessionStoreDef + { + public string Host; + public string LastUsedSessionId; + public List Sessions; + + public SessionDef FindLast() => this.Sessions?.FirstOrDefault(s => s.ClientId == this.LastUsedSessionId); + + public override string ToString() => this.LastUsedSessionId; + } + + /// + /// Helper class to manage sessions. + /// + public static class SessionHelper + { + /// + /// Returns with the root directory of the sessions + /// + internal static string GetRootSessionsDirectory(string host) => Path.Combine(new string[] { GetRootSaveFolder(), "MQTT", "Sessions", ToFileName(host) }); + private static string GetSessionStoreJSonPath(string host) => Path.Combine(SessionHelper.GetRootSessionsDirectory(host), "SessionStore.json"); + private static string ToFileName(string name) => Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(name)).Replace('/', '-'); + + /// + /// Creates and returns with a Null session. + /// + public static Session CreateNullSession(string host) => new Session(host, new SessionDef { ClientId = null, Encoded = null }); + + /// + /// Returns with all the current sessions. + /// + public static IEnumerable GetSessions(string host) => LoadStore(host).Sessions?.Select(def => new Session(host, def)).ToArray() ?? new Session[0]; + + /// + /// Returns true if there's at least one stored session for the given host. + /// + public static bool HasAny(string host) => LoadStore(host).Sessions?.Count > 0; + + /// + /// Loads the session with the matching clientId, or creates a new one with this id. + /// + public static Session Get(string host, string clientId = null) + { + var sessionStoreDef = LoadStore(host); + if (sessionStoreDef.Sessions == null) + sessionStoreDef.Sessions = new List(); + + SessionDef sessionDef = null; + + if (!string.IsNullOrEmpty(clientId)) + { + sessionDef = sessionStoreDef.Sessions?.FirstOrDefault(sd => sd.ClientId == clientId); + if (sessionDef == null) { + sessionDef = Create(clientId); + sessionStoreDef.Sessions.Add(sessionDef); + } + + if (sessionStoreDef.LastUsedSessionId != clientId) + { + sessionStoreDef.LastUsedSessionId = clientId; + Save(host, sessionStoreDef); + } + + return new Session(host, sessionDef); + } + + if (!string.IsNullOrEmpty(sessionStoreDef.LastUsedSessionId)) + { + sessionDef = sessionStoreDef.Sessions?.FirstOrDefault(sd => sd.ClientId == sessionStoreDef.LastUsedSessionId); + if (sessionDef != null) + return new Session(host, sessionDef); + } + + sessionDef = Create(null); + + sessionStoreDef.Sessions.Add(sessionDef); + sessionStoreDef.LastUsedSessionId = sessionDef.ClientId; + + Save(host, sessionStoreDef); + + return new Session(host, sessionDef); + } + + private static SessionDef Create(string clientId) + { + var sessionDef = new SessionDef(); + sessionDef.ClientId = string.IsNullOrEmpty(clientId) ? ("Best.MQTT_" + Guid.NewGuid().ToString().Replace("-", string.Empty)) : clientId; + sessionDef.Encoded = ToFileName(sessionDef.ClientId); + + return sessionDef; + } + + /// + /// Delete session from the store and all of its related files. + /// + public static void Delete(string host, Session session) + { + var sessionStoreDef = LoadStore(host); + + sessionStoreDef.Sessions?.RemoveAll(def => def.ClientId == session.ClientId); + if (sessionStoreDef.LastUsedSessionId == session.ClientId) + sessionStoreDef.LastUsedSessionId = null; + + session.Delete(); + + Save(host, sessionStoreDef); + } + + private static SessionStoreDef LoadStore(string host) + { + var sessionStorePath = GetSessionStoreJSonPath(host); + + if (IOService.FileExists(sessionStorePath)) + { + using (var jsonFile = new StreamReader(IOService.CreateFileStream(sessionStorePath, Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.OpenRead))) + return Best.HTTP.JSON.LitJson.JsonMapper.ToObject(jsonFile); + } + else + { + IOService.DirectoryCreate(Path.GetDirectoryName(sessionStorePath)); + return new SessionStoreDef() { Host = host }; + } + } + + private static void Save(string host, SessionStoreDef sessionStoreDef) + { + using (var jsonFile = new StreamWriter(IOService.CreateFileStream(GetSessionStoreJSonPath(host), Best.HTTP.Shared.PlatformSupport.FileSystem.FileStreamModes.Create))) + Best.HTTP.JSON.LitJson.JsonMapper.ToJson(sessionStoreDef, new Best.HTTP.JSON.LitJson.JsonWriter(jsonFile)); + } + } + + public sealed class Session + { + private SessionDef _sessionDef; + + public string Host { get { return this.__host; } } + private string __host; + + public string ClientId { get { return this._sessionDef.ClientId; } } + + public bool IsNull { get { return this._sessionDef.ClientId == null; } } + + internal UInt16Database PublishReceivedPacketIDs { get { return this._publishReceivedPacketIDs ?? (this._publishReceivedPacketIDs = new UInt16Database(GetRootDir(), "PublishReceivedPacketIDs", new UInt16IndexingService())); } } + private UInt16Database _publishReceivedPacketIDs; + + internal TopicAliasMappingDatabase ClientTopicAliasMapping { get { return this._clientTopicAliasMapping ?? (this._clientTopicAliasMapping = new TopicAliasMappingDatabase(GetQoSDir(), "ClientTopicAliasMapping", new TopicAliasMappingIndexingService())); } } + private TopicAliasMappingDatabase _clientTopicAliasMapping; + + internal OutgoingPacketDatabase UnacknowledgedPackets { get { return this._unacknowledgedPackets ?? (this._unacknowledgedPackets = new OutgoingPacketDatabase(GetQoSDir(), "UnacknowledgedPackets", new OutgoingPacketIndexingService())); } } + private OutgoingPacketDatabase _unacknowledgedPackets; + + internal UInt16Database PublishReleasedPacketIDs { get { return this._publishReleasedPacketIDs ?? (this._publishReleasedPacketIDs = new UInt16Database(GetQoSDir(), "PublishReleasedPacketIDs", new UInt16IndexingService())); } } + private UInt16Database _publishReleasedPacketIDs; + + internal OutgoingPacketDatabase QueuedPackets { get { return this._queuedPackets ?? (this._queuedPackets = new OutgoingPacketDatabase(GetQoSDir(), "QueuedPackets", new OutgoingPacketIndexingService())); } } + private OutgoingPacketDatabase _queuedPackets; + + internal Session(string host, SessionDef sessionDef) + { + this.__host = host; + this._sessionDef = sessionDef; + } + + private string GetRootDir() => Path.Combine(SessionHelper.GetRootSessionsDirectory(this.__host), this._sessionDef.Encoded); + private string GetQoSDir() => Path.Combine(GetRootDir(), "QoS"); + + internal void Close() + { + this.PublishReceivedPacketIDs?.Dispose(); + this.ClientTopicAliasMapping?.Dispose(); + this.UnacknowledgedPackets?.Dispose(); + this.PublishReleasedPacketIDs?.Dispose(); + this.QueuedPackets?.Dispose(); + } + + internal void Delete() + { + var rootDir = GetRootDir(); + var qosDir = GetQoSDir(); + + DeleteFiles(Path.Combine(rootDir, "PublishReceivedPacketIDs")); + + DeleteFiles(Path.Combine(qosDir, "ClientTopicAliasMapping")); + DeleteFiles(Path.Combine(qosDir, "UnacknowledgedPackets")); + DeleteFiles(Path.Combine(qosDir, "PublishReleasedPacketIDs")); + DeleteFiles(Path.Combine(qosDir, "QueuedPackets")); + } + + private void DeleteFiles(string path) + { + DeleteFile(path + ".db"); + DeleteFile(path + ".freelist"); + DeleteFile(path + ".metadata"); + } + + private void DeleteFile(string path) + { + try + { + if (IOService.FileExists(path)) + IOService.FileDelete(path); + } + catch { } + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs.meta new file mode 100644 index 00000000..5500e872 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 4a69418c885810e42a844e69464638ae +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Session.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs new file mode 100644 index 00000000..d97c620f --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs @@ -0,0 +1,162 @@ +using System; +using System.Collections.Generic; + +using Best.MQTT.Packets; + +namespace Best.MQTT +{ + public delegate void SubscriptionAcknowledgementDelegate(MQTTClient client, SubscriptionTopic topic, SubscribeAckReasonCodes reasonCode); + public delegate void SubscriptionMessageDelegate(MQTTClient client, SubscriptionTopic topic, string topicName, ApplicationMessage message); + + public readonly struct TopicFilter + { + public string OriginalFilter { get => this._filter; } + private readonly string _filter; + + public TopicFilter(string filter) + { + if (string.IsNullOrEmpty(filter)) + throw new ArgumentException("All Topic Filters MUST be at least one character long"); + + // “sport/tennis#” is not valid + // “sport/tennis/#/ranking” is not valid + + this._filter = filter; + } + + public bool IsMatching(string topicName) + { + if (string.IsNullOrEmpty(topicName)) + throw new ArgumentException("Topic Names MUST be at least one character long!"); + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901246 + // A subscription to “#” will not receive any messages published to a topic beginning with a $ + // A subscription to “+/monitor/Clients” will not receive any messages published to “$SYS/monitor/Clients” + if (topicName[0] == '$' && (this._filter[0] == '#' || this._filter[0] == '+')) + return false; + + int filterIdx = 0; + int topicNameIdx = 0; + for (; filterIdx < this._filter.Length && topicNameIdx < topicName.Length; filterIdx++) + { + char filterChr = this._filter[filterIdx]; + + switch(filterChr) + { + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901244 + // Multi-level wildcard + case '#': + return true; + //break; + + // https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901245 + // Single-level wildcard + case '+': + // For example, “sport/tennis/+” matches + // “sport/tennis/player1” and + // “sport/tennis/player2”, + // but not “sport/tennis/player1/ranking”. + while (topicNameIdx < topicName.Length && topicName[topicNameIdx] != '/') + { + topicNameIdx++; + } + + break; + + default: + if (filterChr != topicName[topicNameIdx]) + { + // if a Client subscribes to “sport/tennis/player1/#”, it would receive messages published using these Topic Names: + // “sport/tennis/player1” + + // “sport/#” also matches the singular “sport”, since # includes the parent level. + + return false; + } + topicNameIdx++; + break; + } + } + + // matched all + if (topicNameIdx == topicName.Length && filterIdx == this._filter.Length) + return true; + else if (topicNameIdx == topicName.Length) + { + if (filterIdx > 0 && this._filter[filterIdx - 1] == '/' && this._filter[filterIdx] == '#') + return true; + else if (filterIdx < this._filter.Length - 1 && this._filter[filterIdx] == '/' && this._filter[filterIdx + 1] == '#') + return true; + else if (filterIdx < this._filter.Length && this._filter[filterIdx] == '+') + return true; + } + + return false; + } + + public override string ToString() => this.OriginalFilter; + } + + public class SubscriptionTopic + { + public Subscription Subscription { get; internal set; } + public TopicFilter Filter { get; private set; } + + internal SubscriptionAcknowledgementDelegate AcknowledgementCallback; + internal SubscriptionMessageDelegate MessageCallback; + + public SubscriptionTopic(string topicFilter) + { + this.Filter = new TopicFilter(topicFilter); + } + + public override string ToString() => $"[({this.Subscription.ID}){this.Filter}]"; + } + + public sealed class Subscription + { + internal MQTTClient Parent { get; private set; } + internal UInt32 ID { get; private set; } + public List Topics { get => this._topics; } + + private List _topics; + + internal Subscription(MQTTClient parent, UInt32 id) + { + this.Parent = parent; + this.ID = id; + this._topics = new List(); + } + + internal void AddTopic(SubscriptionTopic topic) + { + topic.Subscription = this; + this._topics.Add(topic); + } + + public (bool topicFound, bool removeSubscription) TryRemoveTopic(string topicFilter) + { + int idx = -1; + for (int i = 0; i < this.Topics.Count; ++i) + if (this.Topics[i].Filter.OriginalFilter.Equals(topicFilter)) + { + idx = i; + break; + } + + if (idx != -1) + this.Topics.RemoveAt(idx); + + return (idx != -1, this.Topics.Count == 0); + } + + public bool HasMatchingTopic(string topicName) + { + for (int i = 0; i < this._topics.Count; ++i) + if (this._topics[i].Filter.IsMatching(topicName)) + return true; + + return false; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs.meta new file mode 100644 index 00000000..2160fd5d --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: b1d69d0b2140120419103d4f002c8e0f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Subscription.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports.meta new file mode 100644 index 00000000..37b7f342 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 2ae5a76c541bd2c499a2125b57f1f7a4 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs new file mode 100644 index 00000000..6ae16fd9 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs @@ -0,0 +1,233 @@ +#if !UNITY_WEBGL || UNITY_EDITOR +using System; +using System.Collections.Concurrent; +using System.Collections.Generic; +using System.Threading; + +using Best.HTTP.HostSetting; +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.PlatformSupport.Network.Tcp; +using Best.HTTP.Shared.Streams; + +using Best.MQTT.Packets; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT.Transports +{ + /// + /// Transport to use raw TCP connections with optional secure (TLS) layer use. + /// + public sealed class SecureTCPTransport : Transport, IHeartbeat, INegotiationPeer, IContentConsumer + { + public PeekableContentProviderStream ContentProvider { get; private set; } + + /// + /// Queue for sending packets + /// + private ConcurrentQueue _buffers = new ConcurrentQueue(); + + /// + /// Event to signal the sending thread. + /// + private AutoResetEvent _bufferAvailableEvent = new AutoResetEvent(false); + + private volatile bool closed; + private volatile int runningThreadCount; + + private Negotiator _negotiator; + + public SecureTCPTransport(MQTTClient client) + :base(client) + { + } + + internal override void BeginConnect(CancellationToken token = default) + { + base.BeginConnect(token); + + if (token.IsCancellationRequested) + return; + + if (this.State != TransportStates.Initial) + throw new Exception($"{nameof(SecureTCPTransport)} couldn't {nameof(BeginConnect)} as it's already in state {this.State}!"); + + Logger.Information(nameof(SecureTCPTransport), $"{nameof(BeginConnect)}", this.Context); + + var options = this.Parent.Options; + + NegotiationParameters parameters = new NegotiationParameters(); + parameters.context = this.Context; + //parameters.tryToKeepAlive = true; + parameters.proxy = Proxy; + parameters.createProxyTunel = true; + parameters.targetUri = new Uri($"tcp://{options.Host}:{options.Port}"); + parameters.negotiateTLS = options.UseTLS; + //parameters.optionalRequest = null; + parameters.token = token; + + parameters.hostSettings = PerHostSettings.Get(HostKey.From(parameters.targetUri, new Best.HTTP.Request.Settings.ProxySettings() { Proxy = parameters.proxy })); + + this._negotiator = new Negotiator(this, parameters); + this._negotiator.Start(); + } + + List INegotiationPeer.GetSupportedProtocolNames(Negotiator negotiator) => new List { Best.HTTP.Hosts.Connections.HTTPProtocolFactory.W3C_HTTP1 }; + + bool INegotiationPeer.MustStopAdvancingToNextStep(Negotiator negotiator, NegotiationSteps finishedStep, NegotiationSteps nextStep, Exception error) + { + bool stop = negotiator.Parameters.token.IsCancellationRequested || error != null; + + if (stop) + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, error?.ToString() ?? "IsCancellationRequested")); + + return stop; + } + + void INegotiationPeer.EvaluateProxyNegotiationFailure(Negotiator negotiator, Exception error, bool resendForAuthentication) + { + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, error?.ToString() ?? "Proxy authentication failed")); + } + + void INegotiationPeer.OnNegotiationFailed(Negotiator negotiator, Exception error) + { + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, error.ToString())); + } + + void INegotiationPeer.OnNegotiationFinished(Negotiator negotiator, PeekableContentProviderStream stream, TCPStreamer streamer, string negotiatedProtocol) + { + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.Connected)); + + //(stream as IPeekableContentProvider).Consumer = this; + stream.SetTwoWayBinding(this); + + Best.HTTP.Shared.PlatformSupport.Threading.ThreadedRunner.RunLongLiving(SendThread); + } + + internal override void Send(BufferSegment buffer) + { + if (this.State != TransportStates.Connected) + { + Logger.Warning(nameof(SecureTCPTransport), $"Send called while it's not in the Connected state! State: {this.State}", this.Context); + return; + } + + Logger.Information(nameof(SecureTCPTransport), $"{nameof(Send)}({buffer})", this.Context); + this._buffers.Enqueue(buffer); + this._bufferAvailableEvent.Set(); + } + + internal override void BeginDisconnect() + { + if (this.State >= TransportStates.Disconnecting) + return; + + ChangeStateTo(TransportStates.Disconnecting, string.Empty); + try + { + this.closed = true; + this._bufferAvailableEvent.Set(); + } + catch + { + ChangeStateTo(TransportStates.Disconnected, string.Empty); + } + } + + private void SendThread() + { + try + { + Interlocked.Increment(ref this.runningThreadCount); + Logger.Information(nameof(SecureTCPTransport), $"{nameof(SendThread)} is up and running! runningThreadCount: {this.runningThreadCount}", this.Context); + + while (!closed) + { + this._bufferAvailableEvent.WaitOne(); + while (this._buffers.TryDequeue(out BufferSegment buff)) + { + this._negotiator.Stream.Write(buff); + } + } + } + catch(Exception ex) + { + Logger.Exception(nameof(SecureTCPTransport), nameof(SendThread), ex, this.Context); + } + finally + { + Interlocked.Decrement(ref this.runningThreadCount); + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.Disconnected)); + } + } + + // Call it every time we received a Disconnected event. This means that CleanupAfterDisconnect going to be called 2-3 times. + protected override void CleanupAfterDisconnect() + { + // Run cleanup logic only when both threads are closed + if (this.runningThreadCount == 0 && this._bufferAvailableEvent != null) + { + base.CleanupAfterDisconnect(); + + this._bufferAvailableEvent?.Dispose(); + this._bufferAvailableEvent = null; + + this._negotiator?.Stream?.Dispose(); + + Logger.Information(nameof(SecureTCPTransport), $"{nameof(CleanupAfterDisconnect)} finished!", this.Context); + } + } + + public void SetBinding(PeekableContentProviderStream contentProvider) => this.ContentProvider = contentProvider; + public void UnsetBinding() => this.ContentProvider = null; + + public void OnContent() + { + var available = this.ContentProvider.Length; + var buffer = BufferPool.Get(available, true); + int count = this.ContentProvider.Read(buffer, 0, (int)available); + + if (count == 0) + { + //this.closed = true; + //this._bufferAvailableEvent.Set(); + //this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, "TCP closed")); + //return; + //throw new Exception("TCP connection closed unexpectedly!"); + } + + this.ReceiveStream.Write(new BufferSegment(buffer, 0, count)); + + Logger.Information(nameof(SecureTCPTransport), $"{nameof(OnContent)} - Received ({count})", this.Context); + + try + { + TryParseIncomingPackets(); + } + catch (MQTTException ex) + { + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.MQTTException, ex, nameof(TryParseIncomingPackets))); + } + catch (Exception ex) + { + Logger.Exception(nameof(SecureTCPTransport), $"{nameof(OnContent)}.TryParseIncomingPackets", ex, this.Context); + } + } + + public void OnConnectionClosed() + { + if (State == TransportStates.Disconnecting) + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.Disconnected)); + else + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, "TCP closed by remote peer.")); + } + + public void OnError(Exception ex) + { + this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.DisconnectedWithError, ex.Message)); + } + } +} + +#endif diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs.meta new file mode 100644 index 00000000..1b5f72a1 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: c5c6273d4058f3748ae1a7cc70e1b067 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/SecureTCPTransport.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs new file mode 100644 index 00000000..68144950 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs @@ -0,0 +1,199 @@ +using System; +using System.Collections.Concurrent; +using System.Threading; + +using Best.HTTP.Shared.Extensions; +using Best.HTTP.Shared.Logger; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.HTTP.Shared.Streams; +using Best.MQTT.Packets; +using Best.MQTT.Packets.Readers; + +using static Best.HTTP.Shared.HTTPManager; + +namespace Best.MQTT.Transports +{ + public enum TransportStates + { + Initial, + Connecting, + Connected, + Disconnecting, + Disconnected, + DisconnectedWithError + } + + public enum TransportEventTypes + { + StateChange, + MQTTException + } + + public readonly struct TransportEvent + { + public readonly TransportEventTypes Type; + + public readonly TransportStates ToState; + public readonly string Reason; + + public readonly string Source; + public readonly MQTTException Exception; + + public TransportEvent(TransportEventTypes type, TransportStates toState) + :this(type, toState, null) + { + } + + public TransportEvent(TransportEventTypes type, TransportStates toState, string reason) + { + this.Type = type; + this.ToState = toState; + this.Reason = reason; + + this.Source = null; + this.Exception = null; + } + + public TransportEvent(TransportEventTypes type, MQTTException exception, string source) + { + this.Type = type; + this.ToState = TransportStates.Initial; + this.Reason = null; + + this.Source = source; + this.Exception = exception; + } + } + + /// + /// Abstract base class for concreate transport implementations. + /// + public abstract class Transport : IHeartbeat + { + /// + /// State of the transport. + /// + public TransportStates State { get; private set; } = TransportStates.Initial; + + /// + /// Parent MQTTClient instance that the transport is created for. + /// + public MQTTClient Parent { get; private set; } + + /// + /// Received and parsed packets, sent by the server. + /// + public ConcurrentQueue IncomingPackets { get; private set; } = new ConcurrentQueue(); + + /// + /// Optional for connection cancellation support. + /// + public CancellationToken ConnectCancellationToken { get; protected set; } = default; + + /// + /// Debug context of the transport. + /// + public LoggingContext Context { get; private set; } + + /// + /// Intermediate stream holding incomplete packet bytes. + /// + internal PeekableIncomingSegmentStream ReceiveStream { get; private set; } = new PeekableIncomingSegmentStream(); + + /// + /// Transport event queue generated on receive/send threads that must be processed on the main thread. + /// + protected ConcurrentQueue transportEvents = new ConcurrentQueue(); + + protected Transport(MQTTClient parent) + { + this.Parent = parent; + this.Context = new LoggingContext(this); + this.Context.Add("Parent", this.Parent.Context); + } + + internal virtual void BeginConnect(CancellationToken token) + { + this.ConnectCancellationToken = token; + Heartbeats.Subscribe(this); + } + + internal abstract void Send(BufferSegment buffer); + internal abstract void BeginDisconnect(); + + internal void TryParseIncomingPackets() + { + Logger.Information(nameof(Transport), $"{nameof(TryParseIncomingPackets)} available: {this.ReceiveStream.Length}", this.Context); + + var (success, packet) = IncomingPacketReader.TryToReadFrom(this); + + while (success) + { + Logger.Information(nameof(Transport), $"{nameof(TryParseIncomingPackets)}: Parsed packet {packet.Type}, available: {this.ReceiveStream.Length}", this.Context); + + this.IncomingPackets.Enqueue(packet); + + (success, packet) = IncomingPacketReader.TryToReadFrom(this); + } + } + + protected void ChangeStateTo(TransportStates newState, string reason) + { + Logger.Information(nameof(Transport), $"{nameof(ChangeStateTo)}({this.State} => {newState}, \"{reason}\")", this.Context); + + if (this.State == newState) + return; + + var oldState = this.State; + this.State = newState; + + switch (newState) + { + case TransportStates.Connected: + if (!this.ConnectCancellationToken.IsCancellationRequested) + this.Parent.TransportConnected(); + break; + case TransportStates.DisconnectedWithError: + if (oldState == TransportStates.Disconnected) + break; + this.Parent.TransportDisconnectedWithError(reason); + this.CleanupAfterDisconnect(); + break; + + case TransportStates.Disconnected: + if (oldState == TransportStates.DisconnectedWithError) + break; + this.Parent.TransportDisconnected(reason); + this.CleanupAfterDisconnect(); + break; + } + } + + public void OnHeartbeatUpdate(DateTime now, TimeSpan dif) + { + while (this.transportEvents.TryDequeue(out var result)) + { + switch (result.Type) + { + case TransportEventTypes.StateChange: + ChangeStateTo(result.ToState, reason: result.Reason); + break; + + case TransportEventTypes.MQTTException: + this.Parent.MQTTError(result.Source, result.Exception); + break; + } + } + } + + protected virtual void CleanupAfterDisconnect() + { + Logger.Information(nameof(Transport), $"{nameof(CleanupAfterDisconnect)}", this.Context); + + this.ReceiveStream?.Dispose(); + this.ReceiveStream = null; + + Heartbeats.Unsubscribe(this); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs.meta new file mode 100644 index 00000000..7d292d2b --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a43351a30b452da44997f2257ebe836f +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/Transport.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs new file mode 100644 index 00000000..8fd63938 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs @@ -0,0 +1,116 @@ +using System; +using System.Threading; + +using Best.HTTP.JSON.LitJson; +using Best.HTTP.Shared.PlatformSupport.Memory; +using Best.WebSockets; + +using Best.MQTT.Packets; + +using static Best.HTTP.Shared.HTTPManager; +using Best.HTTP.Shared.Extensions; + +namespace Best.MQTT.Transports +{ + /// + /// https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html#_Toc3901285 + /// + internal sealed class WebSocketTransport : Transport + { + private WebSocket webSocket; + + public WebSocketTransport(MQTTClient parent) + : base(parent) + {} + + internal override void BeginConnect(CancellationToken token = default) + { + base.BeginConnect(token); + + if (token.IsCancellationRequested) + return; + + if (this.State != TransportStates.Initial) + throw new Exception($"{nameof(WebSocketTransport)} couldn't {nameof(BeginConnect)} as it's already in state {this.State}!"); + + var options = this.Parent.Options; + + Logger.Information(nameof(WebSocketTransport), $"{nameof(BeginConnect)} with options: {JsonMapper.ToJson(options)}", this.Context); + + string url = $"{(options.UseTLS ? "wss" : "ws")}://{options.Host}"; + + if (options.Port > 0) + url += $":{options.Port}{(options.Path.StartsWith("/") ? string.Empty : "/")}{options.Path ?? string.Empty}"; + + this.webSocket = new WebSocket(new Uri(url), string.Empty, "mqtt"); + this.webSocket.Context.Add("Parent", this.Context); + this.webSocket.OnOpen += WebSocket_OnOpen; + this.webSocket.OnClosed += WebSocket_OnClosed; + this.webSocket.OnMessage += WebSocket_OnMessage; + this.webSocket.OnBinary += WebSocket_OnBinary; + this.webSocket.Open(); + } + + private void WebSocket_OnOpen(WebSocket webSocket) => this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, TransportStates.Connected)); //ChangeStateTo(TransportStates.Connected, string.Empty); + private void WebSocket_OnClosed(WebSocket webSocket, WebSocketStatusCodes code, string message) + => this.transportEvents.Enqueue(new TransportEvent(TransportEventTypes.StateChange, code == WebSocketStatusCodes.NormalClosure ? TransportStates.Disconnected : TransportStates.DisconnectedWithError, message)); + private void WebSocket_OnMessage(WebSocket webSocket, string message) => ChangeStateTo(TransportStates.Disconnected, "Textual message received! message: " + message); + + private void WebSocket_OnBinary(WebSocket webSocket, BufferSegment buffer) + { + if (this.ReceiveStream == null) + return; + + var data = BufferPool.Get(buffer.Count, true, this.Context); + buffer.CopyTo(data); + this.ReceiveStream.Write(data.AsBuffer(buffer.Count)); + + try + { + TryParseIncomingPackets(); + } + catch (MQTTException ex) + { + this.Parent.MQTTError(nameof(TryParseIncomingPackets), ex); + } + catch (Exception ex) + { + Logger.Exception(nameof(WebSocketTransport), $"{nameof(WebSocket_OnBinary)}.TryParseIncomingPackets", ex, this.Context); + } + } + + internal override void Send(BufferSegment buffer) + { + if (this.State != TransportStates.Connected) + { + Logger.Warning(nameof(WebSocketTransport), $"Send called while it's not in the Connected state! State: {this.State}", this.Context); + return; + } + + if (Logger.IsDiagnostic) + Logger.Information(nameof(WebSocketTransport), $"{nameof(Send)}({buffer})", this.Context); + + this.webSocket.SendAsBinary(buffer); + } + + internal override void BeginDisconnect() + { + if (this.State >= TransportStates.Disconnecting && this.State != TransportStates.DisconnectedWithError) + return; + + Logger.Information(nameof(WebSocketTransport), $"{nameof(BeginDisconnect)}({this.State})", this.Context); + + if (this.State != TransportStates.DisconnectedWithError) + this.ChangeStateTo(TransportStates.Disconnecting, string.Empty); + + this.webSocket.Close(); + } + + protected override void CleanupAfterDisconnect() + { + base.CleanupAfterDisconnect(); + this.webSocket.Close(); + this.webSocket = null; + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs.meta b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs.meta new file mode 100644 index 00000000..bbe868c3 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: a344a9d038a2fa644a093f50c3145bcc +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/MQTT/Transports/WebSocketTransport.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef b/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef new file mode 100644 index 00000000..4a0c7ef2 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef @@ -0,0 +1,17 @@ +{ + "name": "com.Tivadar.Best.MQTT", + "rootNamespace": "Best.MQTT", + "references": [ + "com.Tivadar.Best.HTTP", + "com.Tivadar.Best.WebSockets" + ], + "includePlatforms": [], + "excludePlatforms": [], + "allowUnsafeCode": false, + "overrideReferences": false, + "precompiledReferences": [], + "autoReferenced": true, + "defineConstraints": [], + "versionDefines": [], + "noEngineReferences": true +} \ No newline at end of file diff --git a/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef.meta b/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef.meta new file mode 100644 index 00000000..b97c54f1 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: d9c143f5f90809e41835a785e1aafc2e +AssemblyDefinitionImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/com.Tivadar.Best.MQTT.asmdef + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp b/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp new file mode 100644 index 00000000..ebd6cb44 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp @@ -0,0 +1,5 @@ +#https://forum.unity.com/threads/rsp-file-per-assembly-or-folder.572758/ + +#https://learn.microsoft.com/en-us/dotnet/csharp/language-reference/compiler-options/errors-warnings +-warnaserror +-nowarn:CS1701,CS0612,CS1591,CS1571,CS1572,CS1573,CS1574,CS1587 diff --git a/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp.meta b/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp.meta new file mode 100644 index 00000000..65f70cfc --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Runtime/csc.rsp.meta @@ -0,0 +1,14 @@ +fileFormatVersion: 2 +guid: 09d04dc9b0390bb42885f9ad8ab5c14d +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Runtime/csc.rsp + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Samples~/Generic Client.meta b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client.meta new file mode 100644 index 00000000..40ffc2af --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client.meta @@ -0,0 +1,8 @@ +fileFormatVersion: 2 +guid: 81c8337419acf7843889f90145c1f014 +folderAsset: yes +DefaultImporter: + externalObjects: {} + userData: + assetBundleName: + assetBundleVariant: diff --git a/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs new file mode 100644 index 00000000..47ffe707 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs @@ -0,0 +1,231 @@ +using System; +using System.Collections.Generic; +using System.Linq; +using System.Text; + +using Best.HTTP.Shared.PlatformSupport.Memory; + +using Best.MQTT; +using Best.MQTT.Examples; +using Best.MQTT.Examples.Helpers; +using Best.MQTT.Packets; +using Best.MQTT.Packets.Builders; + +using UnityEngine; + +namespace Best.MQTT.Examples +{ + public partial class GenericClient + { + private MQTTClient client; + + // UI instances of SubscriptionListItem + private List subscriptionListItems = new List(); + + public void OnConnectButton() + { +#if UNITY_WEBGL && !UNITY_EDITOR + if (this.transportDropdown.value == 0) + { + AddText("TCP transport isn't available under WebGL!"); + return; + } +#endif + + SetConnectingUI(); + + var host = this.hostInput.GetValue("broker.mqttdashboard.com"); + AddText($"[{host}] Connecting with client id: {SessionHelper.Get(host).ClientId}"); + + var options = new ConnectionOptions(); + options.Host = host; + options.Port = this.portInput.GetIntValue(1883); + options.Transport = (SupportedTransports)this.transportDropdown.value; + options.UseTLS = this.isSecureToggle.GetBoolValue(); + options.Path = this.pathInput.GetValue("/mqtt"); + options.ProtocolVersion = (SupportedProtocolVersions)this.protocolVersionDropdown.value; + + this.client = new MQTTClient(options); + + this.client.OnConnected += OnConnected; + this.client.OnError += OnError; + this.client.OnDisconnect += OnDisconnected; + this.client.OnStateChanged += OnStateChanged; + + this.client.BeginConnect(ConnectPacketBuilderCallback); + } + + private void OnConnected(MQTTClient client) + { + SetConnectedUI(); + } + + private void OnDisconnected(MQTTClient client, DisconnectReasonCodes code, string reason) + { + SetDisconnectedUI(); + + AddText($"[{client.Options.Host}] OnDisconnected - code: {code}, reason: {reason}"); + } + + private void OnError(MQTTClient client, string reason) + { + AddText($"[{client.Options.Host}] OnError reason: {reason}"); + } + + public void OnDisconnectButton() + { + this.connectButton.interactable = false; + this.client?.CreateDisconnectPacketBuilder().BeginDisconnect(); + } + + private void OnStateChanged(MQTTClient client, ClientStates oldState, ClientStates newState) + { + AddText($"[{client.Options.Host}] {oldState} => {newState}"); + } + + private ConnectPacketBuilder ConnectPacketBuilderCallback(MQTTClient client, ConnectPacketBuilder builder) + { + AddText($"[{client.Options.Host}] Creating connect packet."); + + var userName = this.userNameInput.GetValue(null); + var password = this.passwordInput.GetValue(null); + + var session = SessionHelper.HasAny(client.Options.Host) ? SessionHelper.Get(client.Options.Host) : SessionHelper.CreateNullSession(client.Options.Host); + builder.WithSession(session); + + if (!string.IsNullOrEmpty(userName)) + builder.WithUserName(userName); + + if (!string.IsNullOrEmpty(password)) + builder.WithPassword(password); + + builder.WithKeepAlive((ushort)this.keepAliveInput.GetIntValue(60)); + + // setup last-will + + var lastWillTopic = this.lastWill_TopicInput.GetValue(null); + var lastWillMessage = this.lastWill_MessageInput.GetValue(null); + var retain = this.lastWill_RetainToggle.GetBoolValue(); + + if (!string.IsNullOrEmpty(lastWillTopic) && !string.IsNullOrEmpty(lastWillMessage)) + builder.WithLastWill(new LastWillBuilder() + .WithTopic(lastWillTopic) + .WithContentType("text/utf-8") + .WithPayload(Encoding.UTF8.GetBytes(lastWillMessage)) + .WithQoS(this.lastWill_QoSDropdown.GetQoS()) + .WithRetain(retain)); + + return builder; + } + + public void OnPublishButtonClicked() + { + string topic = this.publish_TopicInput.GetValue("best_mqtt/test"); + QoSLevels qos = this.publish_QoSDropdown.GetQoS(); + bool retain = this.publish_RetainToggle.GetBoolValue(); + string message = this.publish_MessageInput.GetValue("Hello MQTT World..."); + + this.client.CreateApplicationMessageBuilder(topic) + .WithQoS(qos) + .WithRetain(retain) + .WithPayload(message) + .BeginPublish(); + } + + public void OnSubscribeButtonClicked() + { + var colorValue = this.subscribe_ColorInput.GetValue("000000"); + if (!ColorUtility.TryParseHtmlString("#" + colorValue, out var color)) + { + AddText($"[{client.Options.Host}] Couldn't parse '#{colorValue}'"); + return; + } + + var qos = this.subscribe_QoSDropdown.GetQoS(); + var topic = this.subscribe_TopicInput.GetValue("best_mqtt/#"); + + this.client?.CreateBulkSubscriptionBuilder() + .WithTopic(new SubscribeTopicBuilder(topic) + .WithMaximumQoS(qos) + .WithAcknowledgementCallback(OnSubscriptionAcknowledgement) + .WithMessageCallback(OnApplicationMessage)) + .BeginSubscribe(); + + AddText($"[{client.Options.Host}] Subscribe request for topic {topic} sent..."); + + AddSubscriptionUI(topic, colorValue); + } + + private void OnSubscriptionAcknowledgement(MQTTClient client, SubscriptionTopic topic, SubscribeAckReasonCodes reasonCode) + { + var subscription = FindSubscriptionItem(topic.Filter.OriginalFilter); + + string reasonColor = reasonCode <= SubscribeAckReasonCodes.GrantedQoS2 ? "green" : "red"; + AddText($"[{client.Options.Host}] Subscription request to topic {topic.Filter.OriginalFilter} returned with reason code: {reasonCode}"); + } + + private void AddSubscriptionUI(string topic, string color) + { + var item = Instantiate(this.subscription_ListItem, this.subscribe_ListItemRoot); + item.Set(this, topic, color); + + this.subscriptionListItems.Add(item); + } + + public void Unsubscribe(string topic) + { + this.client.CreateUnsubscribePacketBuilder(topic) + .WithAcknowledgementCallback(OnUnsubscribed) + .BeginUnsubscribe(); + + var subscription = FindSubscriptionItem(topic); + + AddText($"[{client.Options.Host}] Unsubscribe request for topic {topic} sent..."); + } + + private void OnUnsubscribed(MQTTClient client, string topic, Best.MQTT.Packets.UnsubscribeAckReasonCodes reason) + { + var instance = this.subscriptionListItems.FirstOrDefault(s => s.Topic.OriginalFilter == topic); + this.subscriptionListItems.Remove(instance); + Destroy(instance.gameObject); + + string reasonColor = reason == UnsubscribeAckReasonCodes.Success ? "green" : "red"; + + AddText($"[{client.Options.Host}] Unsubscription request to topic {topic} returned with reason code: {reason}"); + } + + private void OnApplicationMessage(MQTTClient client, SubscriptionTopic topic, string topicName, ApplicationMessage applicationMessage) + { + // find matching subscription for its color + var subscription = FindSubscriptionItem(topicName); + + string payload = string.Empty; + + // Here we going to try to convert the payload as an UTF-8 string. Note that it's not guaranteed that the payload is a string! + // While MQTT supports an additional Content-Type field in this demo we can't rely on its presense. + if (applicationMessage.Payload != BufferSegment.Empty) + { + payload = Encoding.UTF8.GetString(applicationMessage.Payload.Data, applicationMessage.Payload.Offset, applicationMessage.Payload.Count); + + const int MaxPayloadLength = 512; + if (payload.Length > MaxPayloadLength) + payload = payload?.Remove(MaxPayloadLength); + } + + // Display the Content-Type if present + string contentType = string.Empty; + if (applicationMessage.ContentType != null) + contentType = $" ({applicationMessage.ContentType}) "; + + // Add the final text to the demo's log view. + AddText($"[{client.Options.Host}] [{topicName}] {contentType}{payload}"); + } + + private SubscriptionListItem FindSubscriptionItem(string topicName) => this.subscriptionListItems.FirstOrDefault(s => s.Topic.IsMatching(topicName)); + + private void OnDestroy() + { + this.client?.CreateDisconnectPacketBuilder().BeginDisconnect(); + } + } +} diff --git a/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs.meta b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs.meta new file mode 100644 index 00000000..27b24203 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs.meta @@ -0,0 +1,18 @@ +fileFormatVersion: 2 +guid: 80cb39f4371a29e4d8da5a85303b5ee9 +MonoImporter: + externalObjects: {} + serializedVersion: 2 + defaultReferences: [] + executionOrder: 0 + icon: {instanceID: 0} + userData: + assetBundleName: + assetBundleVariant: +AssetOrigin: + serializedVersion: 1 + productId: 268762 + packageName: Best MQTT + packageVersion: 3.0.4 + assetPath: Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.Logic.cs + uploadId: 737289 diff --git a/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.cs b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.cs new file mode 100644 index 00000000..7fe682a5 --- /dev/null +++ b/Packages/com.tivadar.best.mqtt/Samples~/Generic Client/GenericClient.cs @@ -0,0 +1,302 @@ +using System.Collections.Generic; + +using Best.HTTP.Shared; + +using Best.MQTT; +using Best.MQTT.Examples; +using Best.MQTT.Examples.Helpers; + +using UnityEngine; +using UnityEngine.UI; + +namespace Best.MQTT.Examples +{ + public partial class GenericClient : MonoBehaviour + { +#pragma warning disable 0649 + [Header("Connect")] + [SerializeField] + private Dropdown templatesDropdown; + + [SerializeField] + private InputField hostInput; + + [SerializeField] + private InputField portInput; + + [SerializeField] + private Dropdown transportDropdown; + + [SerializeField] + private InputField pathInput; + + [SerializeField] + private Toggle isSecureToggle; + + [SerializeField] + private InputField userNameInput; + + [SerializeField] + private InputField passwordInput; + + [SerializeField] + private InputField keepAliveInput; + + [SerializeField] + private Dropdown protocolVersionDropdown; + + [SerializeField] + private Button connectButton; + + [Header("Connect Last-Will")] + + [SerializeField] + private InputField lastWill_TopicInput; + + [SerializeField] + private Dropdown lastWill_QoSDropdown; + + [SerializeField] + private Toggle lastWill_RetainToggle; + + [SerializeField] + private InputField lastWill_MessageInput; + + + [Header("Publish")] + [SerializeField] + private InputField publish_TopicInput; + + [SerializeField] + private Dropdown publish_QoSDropdown; + + [SerializeField] + private Toggle publish_RetainToggle; + + [SerializeField] + private InputField publish_MessageInput; + + [Header("Subscribe")] + [SerializeField] + private InputField subscribe_ColorInput; + + [SerializeField] + private Dropdown subscribe_QoSDropdown; + + [SerializeField] + private InputField subscribe_TopicInput; + + [SerializeField] + private Transform subscribe_ListItemRoot; + + [SerializeField] + private SubscriptionListItem subscription_ListItem; + + [SerializeField] + private Transform publishSubscribePanel; + + [Header("Logs")] + [SerializeField] + private InputField logs_MaxEntriesInput; + + [SerializeField] + private Toggle logs_AutoScroll; + + [SerializeField] + private TextListItem textListItem; + + [SerializeField] + private ScrollRect log_view; + + [SerializeField] + private Transform logRoot; + +#pragma warning restore + + private void Awake() + { + InitUI(); + PopulateTemplates(); + } + + private void AddText(string text) + { + int maxEntries = this.logs_MaxEntriesInput.GetIntValue(100); + + if (this.logRoot.childCount >= maxEntries) + { + TrimLogEntries(maxEntries); + + var child = this.logRoot.GetChild(0); + child.GetComponent().SetText(text); + child.SetAsLastSibling(); + } + else + { + var item = Instantiate(this.textListItem, this.logRoot); + item.SetText(text); + } + + bool autoScroll = this.logs_AutoScroll.GetBoolValue(); + if (autoScroll) + { + this.log_view.normalizedPosition = new Vector2(0, 0); + } + } + + private void TrimLogEntries(int maxEntries) + { + while (this.logRoot.childCount > maxEntries) + { + var child = this.logRoot.GetChild(0); + child.transform.SetParent(this.transform); + + Destroy(child.gameObject); + } + } + + private void InitUI() + { + this.connectButton.GetComponentInChildren().text = "Connect"; + this.connectButton.interactable = true; + this.connectButton.onClick.RemoveAllListeners(); + this.connectButton.onClick.AddListener(OnConnectButton); + + foreach (var button in this.publishSubscribePanel.GetComponentsInChildren